1998-08-17 17:11:34 +04:00
/*
2002-01-30 09:08:46 +03:00
Unix SMB / CIFS implementation .
1998-08-17 17:11:34 +04:00
file opening and share modes
Copyright ( C ) Andrew Tridgell 1992 - 1998
2004-06-08 20:14:31 +04:00
Copyright ( C ) Jeremy Allison 2001 - 2004
2005-07-08 08:51:27 +04:00
Copyright ( C ) Volker Lendecke 2005
1998-08-17 17:11:34 +04:00
This program is free software ; you can redistribute it and / or modify
it under the terms of the GNU General Public License as published by
2007-07-09 23:25:36 +04:00
the Free Software Foundation ; either version 3 of the License , or
1998-08-17 17:11:34 +04:00
( at your option ) any later version .
This program is distributed in the hope that it will be useful ,
but WITHOUT ANY WARRANTY ; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE . See the
GNU General Public License for more details .
You should have received a copy of the GNU General Public License
2007-07-10 04:52:41 +04:00
along with this program . If not , see < http : //www.gnu.org/licenses/>.
1998-08-17 17:11:34 +04:00
*/
# include "includes.h"
2009-01-08 14:03:45 +03:00
# include "smbd/globals.h"
1998-08-17 17:11:34 +04:00
2007-10-06 01:41:17 +04:00
extern const struct generic_mapping file_generic_mapping ;
1998-08-17 17:11:34 +04:00
2005-09-30 21:13:37 +04:00
struct deferred_open_record {
2007-10-19 04:40:25 +04:00
bool delayed_for_oplocks ;
2007-05-29 13:30:34 +04:00
struct file_id id ;
2004-06-08 20:14:31 +04:00
} ;
2008-11-20 05:03:27 +03:00
static NTSTATUS create_file_unixpath ( connection_struct * conn ,
struct smb_request * req ,
const char * fname ,
uint32_t access_mask ,
uint32_t share_access ,
uint32_t create_disposition ,
uint32_t create_options ,
uint32_t file_attributes ,
uint32_t oplock_request ,
uint64_t allocation_size ,
struct security_descriptor * sd ,
struct ea_list * ea_list ,
files_struct * * result ,
int * pinfo ,
SMB_STRUCT_STAT * psbuf ) ;
2008-11-04 12:34:08 +03:00
/****************************************************************************
SMB1 file varient of se_access_check . Never test FILE_READ_ATTRIBUTES .
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
NTSTATUS smb1_file_se_access_check ( const struct security_descriptor * sd ,
const NT_USER_TOKEN * token ,
uint32_t access_desired ,
uint32_t * access_granted )
{
return se_access_check ( sd ,
token ,
( access_desired & ~ FILE_READ_ATTRIBUTES ) ,
access_granted ) ;
}
/****************************************************************************
Check if we have open rights .
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
static NTSTATUS check_open_rights ( struct connection_struct * conn ,
const char * fname ,
2009-02-03 04:10:27 +03:00
uint32_t access_mask ,
uint32_t * access_granted )
2008-11-04 12:34:08 +03:00
{
/* Check if we have rights to open. */
NTSTATUS status ;
struct security_descriptor * sd ;
2009-02-03 04:10:27 +03:00
* access_granted = 0 ;
2008-11-04 12:34:08 +03:00
status = SMB_VFS_GET_NT_ACL ( conn , fname ,
( OWNER_SECURITY_INFORMATION |
GROUP_SECURITY_INFORMATION |
DACL_SECURITY_INFORMATION ) , & sd ) ;
if ( ! NT_STATUS_IS_OK ( status ) ) {
DEBUG ( 10 , ( " check_open_rights: Could not get acl "
" on %s: %s \n " ,
fname ,
nt_errstr ( status ) ) ) ;
return status ;
}
status = smb1_file_se_access_check ( sd ,
conn - > server_info - > ptok ,
access_mask ,
2009-02-03 04:10:27 +03:00
access_granted ) ;
2008-11-04 12:34:08 +03:00
TALLOC_FREE ( sd ) ;
2009-02-03 04:10:27 +03:00
DEBUG ( 10 , ( " check_open_rights: file %s requesting "
" 0x%x returning 0x%x (%s) \n " ,
fname ,
( unsigned int ) access_mask ,
( unsigned int ) * access_granted ,
nt_errstr ( status ) ) ) ;
2008-11-04 12:34:08 +03:00
return status ;
}
1998-08-17 17:11:34 +04:00
/****************************************************************************
2000-04-12 01:38:45 +04:00
fd support routines - attempt to do a dos_open .
1998-08-17 17:11:34 +04:00
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
2000-04-12 01:38:45 +04:00
2007-02-21 04:55:08 +03:00
static NTSTATUS fd_open ( struct connection_struct * conn ,
2006-07-25 12:51:54 +04:00
const char * fname ,
files_struct * fsp ,
int flags ,
mode_t mode )
1998-08-17 17:11:34 +04:00
{
2007-02-21 04:55:08 +03:00
NTSTATUS status = NT_STATUS_OK ;
2006-07-11 22:01:26 +04:00
2002-01-12 03:50:01 +03:00
# ifdef O_NOFOLLOW
2007-05-23 02:35:13 +04:00
/*
* Never follow symlinks on a POSIX client . The
* client should be doing this .
*/
if ( fsp - > posix_open | | ! lp_symlinks ( SNUM ( conn ) ) ) {
2002-01-12 03:50:01 +03:00
flags | = O_NOFOLLOW ;
2005-07-08 08:51:27 +04:00
}
2002-01-12 03:50:01 +03:00
# endif
2006-07-11 22:01:26 +04:00
fsp - > fh - > fd = SMB_VFS_OPEN ( conn , fname , fsp , flags , mode ) ;
2007-02-21 04:55:08 +03:00
if ( fsp - > fh - > fd = = - 1 ) {
status = map_nt_error_from_unix ( errno ) ;
}
1998-08-17 17:11:34 +04:00
2006-07-11 22:01:26 +04:00
DEBUG ( 10 , ( " fd_open: name %s, flags = 0%o mode = 0%o, fd = %d. %s \n " ,
fname , flags , ( int ) mode , fsp - > fh - > fd ,
( fsp - > fh - > fd = = - 1 ) ? strerror ( errno ) : " " ) ) ;
2000-04-12 01:38:45 +04:00
2007-02-21 04:55:08 +03:00
return status ;
1998-08-17 17:11:34 +04:00
}
/****************************************************************************
2000-04-12 01:38:45 +04:00
Close the file associated with a fsp .
1998-08-17 17:11:34 +04:00
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
2000-04-12 01:38:45 +04:00
2007-12-22 04:01:26 +03:00
NTSTATUS fd_close ( files_struct * fsp )
1998-08-17 17:11:34 +04:00
{
2008-01-11 14:18:33 +03:00
int ret ;
2005-07-08 08:51:27 +04:00
if ( fsp - > fh - > fd = = - 1 ) {
2007-02-07 00:05:34 +03:00
return NT_STATUS_OK ; /* What we used to call a stat open. */
2005-07-08 08:51:27 +04:00
}
if ( fsp - > fh - > ref_count > 1 ) {
2007-02-07 00:05:34 +03:00
return NT_STATUS_OK ; /* Shared handle. Only close last reference. */
2005-07-08 08:51:27 +04:00
}
2008-01-11 14:18:33 +03:00
2008-01-11 16:19:28 +03:00
ret = SMB_VFS_CLOSE ( fsp ) ;
2008-01-11 14:18:33 +03:00
fsp - > fh - > fd = - 1 ;
if ( ret = = - 1 ) {
return map_nt_error_from_unix ( errno ) ;
}
return NT_STATUS_OK ;
1998-08-17 17:11:34 +04:00
}
2005-03-15 04:19:58 +03:00
/****************************************************************************
Change the ownership of a file to that of the parent directory .
Do this by fd if possible .
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
2008-10-30 03:28:19 +03:00
void change_file_owner_to_parent ( connection_struct * conn ,
2006-12-27 13:57:59 +03:00
const char * inherit_from_dir ,
files_struct * fsp )
2006-12-24 18:29:09 +03:00
{
SMB_STRUCT_STAT parent_st ;
int ret ;
2006-12-27 13:57:59 +03:00
ret = SMB_VFS_STAT ( conn , inherit_from_dir , & parent_st ) ;
2006-12-24 18:29:09 +03:00
if ( ret = = - 1 ) {
2006-12-27 13:57:59 +03:00
DEBUG ( 0 , ( " change_file_owner_to_parent: failed to stat parent "
2006-12-24 18:29:09 +03:00
" directory %s. Error was %s \n " ,
2006-12-27 13:57:59 +03:00
inherit_from_dir , strerror ( errno ) ) ) ;
2006-12-24 18:29:09 +03:00
return ;
}
become_root ( ) ;
2008-01-07 16:26:00 +03:00
ret = SMB_VFS_FCHOWN ( fsp , parent_st . st_uid , ( gid_t ) - 1 ) ;
2006-12-24 18:29:09 +03:00
unbecome_root ( ) ;
if ( ret = = - 1 ) {
2006-12-27 13:57:59 +03:00
DEBUG ( 0 , ( " change_file_owner_to_parent: failed to fchown "
2006-12-24 18:29:09 +03:00
" file %s to parent directory uid %u. Error "
" was %s \n " , fsp - > fsp_name ,
( unsigned int ) parent_st . st_uid ,
strerror ( errno ) ) ) ;
}
2006-12-27 13:57:59 +03:00
DEBUG ( 10 , ( " change_file_owner_to_parent: changed new file %s to "
2006-12-24 18:29:09 +03:00
" parent directory uid %u. \n " , fsp - > fsp_name ,
( unsigned int ) parent_st . st_uid ) ) ;
}
2008-10-30 03:28:19 +03:00
NTSTATUS change_dir_owner_to_parent ( connection_struct * conn ,
2006-12-27 13:57:59 +03:00
const char * inherit_from_dir ,
const char * fname ,
SMB_STRUCT_STAT * psbuf )
2005-03-15 04:19:58 +03:00
{
2007-09-13 01:48:20 +04:00
char * saved_dir = NULL ;
2006-12-24 18:29:09 +03:00
SMB_STRUCT_STAT sbuf ;
2005-03-15 04:19:58 +03:00
SMB_STRUCT_STAT parent_st ;
2008-01-10 04:11:04 +03:00
TALLOC_CTX * ctx = talloc_tos ( ) ;
2007-09-13 01:48:20 +04:00
NTSTATUS status = NT_STATUS_OK ;
2005-03-15 04:19:58 +03:00
int ret ;
2006-12-27 13:57:59 +03:00
ret = SMB_VFS_STAT ( conn , inherit_from_dir , & parent_st ) ;
2005-03-15 04:19:58 +03:00
if ( ret = = - 1 ) {
2007-09-13 01:48:20 +04:00
status = map_nt_error_from_unix ( errno ) ;
2006-12-27 13:57:59 +03:00
DEBUG ( 0 , ( " change_dir_owner_to_parent: failed to stat parent "
2005-07-08 08:51:27 +04:00
" directory %s. Error was %s \n " ,
2006-12-27 13:57:59 +03:00
inherit_from_dir , strerror ( errno ) ) ) ;
2007-09-13 01:48:20 +04:00
return status ;
2005-03-15 04:19:58 +03:00
}
2006-12-24 18:29:09 +03:00
/* We've already done an lstat into psbuf, and we know it's a
directory . If we can cd into the directory and the dev / ino
are the same then we can safely chown without races as
we ' re locking the directory in place by being in it . This
should work on any UNIX ( thanks tridge : - ) . JRA .
*/
2005-03-15 04:19:58 +03:00
2007-09-13 01:48:20 +04:00
saved_dir = vfs_GetWd ( ctx , conn ) ;
if ( ! saved_dir ) {
status = map_nt_error_from_unix ( errno ) ;
2006-12-27 13:57:59 +03:00
DEBUG ( 0 , ( " change_dir_owner_to_parent: failed to get "
2007-09-13 01:48:20 +04:00
" current working directory. Error was %s \n " ,
strerror ( errno ) ) ) ;
return status ;
2006-12-24 18:29:09 +03:00
}
2005-03-17 04:50:09 +03:00
2006-12-24 18:29:09 +03:00
/* Chdir into the new path. */
if ( vfs_ChDir ( conn , fname ) = = - 1 ) {
2007-09-13 01:48:20 +04:00
status = map_nt_error_from_unix ( errno ) ;
2006-12-27 13:57:59 +03:00
DEBUG ( 0 , ( " change_dir_owner_to_parent: failed to change "
2006-12-24 18:29:09 +03:00
" current working directory to %s. Error "
" was %s \n " , fname , strerror ( errno ) ) ) ;
goto out ;
}
2005-03-17 04:50:09 +03:00
2006-12-24 18:29:09 +03:00
if ( SMB_VFS_STAT ( conn , " . " , & sbuf ) = = - 1 ) {
2007-09-13 01:48:20 +04:00
status = map_nt_error_from_unix ( errno ) ;
2006-12-27 13:57:59 +03:00
DEBUG ( 0 , ( " change_dir_owner_to_parent: failed to stat "
2006-12-24 18:29:09 +03:00
" directory '.' (%s) Error was %s \n " ,
fname , strerror ( errno ) ) ) ;
goto out ;
}
2005-03-15 04:19:58 +03:00
2006-12-24 18:29:09 +03:00
/* Ensure we're pointing at the same place. */
if ( sbuf . st_dev ! = psbuf - > st_dev | |
sbuf . st_ino ! = psbuf - > st_ino | |
sbuf . st_mode ! = psbuf - > st_mode ) {
2006-12-27 13:57:59 +03:00
DEBUG ( 0 , ( " change_dir_owner_to_parent: "
2006-12-24 18:29:09 +03:00
" device/inode/mode on directory %s changed. "
" Refusing to chown ! \n " , fname ) ) ;
2007-09-13 01:48:20 +04:00
status = NT_STATUS_ACCESS_DENIED ;
2006-12-24 18:29:09 +03:00
goto out ;
}
2005-03-15 04:19:58 +03:00
2006-12-24 18:29:09 +03:00
become_root ( ) ;
ret = SMB_VFS_CHOWN ( conn , " . " , parent_st . st_uid , ( gid_t ) - 1 ) ;
unbecome_root ( ) ;
if ( ret = = - 1 ) {
2007-09-13 01:48:20 +04:00
status = map_nt_error_from_unix ( errno ) ;
2006-12-27 13:57:59 +03:00
DEBUG ( 10 , ( " change_dir_owner_to_parent: failed to chown "
2006-12-24 18:29:09 +03:00
" directory %s to parent directory uid %u. "
" Error was %s \n " , fname ,
( unsigned int ) parent_st . st_uid , strerror ( errno ) ) ) ;
goto out ;
}
2005-03-15 04:19:58 +03:00
2006-12-27 13:57:59 +03:00
DEBUG ( 10 , ( " change_dir_owner_to_parent: changed ownership of new "
2006-12-24 18:29:09 +03:00
" directory %s to parent directory uid %u. \n " ,
fname , ( unsigned int ) parent_st . st_uid ) ) ;
2005-03-15 04:19:58 +03:00
2006-12-24 18:29:09 +03:00
out :
2005-03-15 04:19:58 +03:00
2006-12-24 18:29:09 +03:00
vfs_ChDir ( conn , saved_dir ) ;
2007-09-13 01:48:20 +04:00
return status ;
2005-03-15 04:19:58 +03:00
}
1998-08-17 17:11:34 +04:00
/****************************************************************************
2000-04-12 01:38:45 +04:00
Open a file .
1998-08-17 17:11:34 +04:00
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
1999-12-13 16:27:58 +03:00
2006-07-11 22:01:26 +04:00
static NTSTATUS open_file ( files_struct * fsp ,
2006-07-25 12:51:54 +04:00
connection_struct * conn ,
2007-07-05 20:26:27 +04:00
struct smb_request * req ,
2006-12-27 13:57:59 +03:00
const char * parent_dir ,
2006-12-31 13:16:03 +03:00
const char * name ,
const char * path ,
2006-07-25 12:51:54 +04:00
SMB_STRUCT_STAT * psbuf ,
int flags ,
mode_t unx_mode ,
uint32 access_mask , /* client requested access mask. */
uint32 open_access_mask ) /* what we're actually using in the open. */
1998-08-17 17:11:34 +04:00
{
2007-02-21 04:55:08 +03:00
NTSTATUS status = NT_STATUS_OK ;
2000-04-10 17:05:23 +04:00
int accmode = ( flags & O_ACCMODE ) ;
2001-04-16 04:02:29 +04:00
int local_flags = flags ;
2007-10-19 04:40:25 +04:00
bool file_existed = VALID_STAT ( * psbuf ) ;
1998-08-17 17:11:34 +04:00
2005-07-08 08:51:27 +04:00
fsp - > fh - > fd = - 1 ;
2000-04-10 17:05:23 +04:00
errno = EPERM ;
1998-08-17 17:11:34 +04:00
2000-04-12 01:38:45 +04:00
/* Check permissions */
1998-08-17 17:11:34 +04:00
2000-04-10 17:05:23 +04:00
/*
* This code was changed after seeing a client open request
* containing the open mode of ( DENY_WRITE / read - only ) with
* the ' create if not exist ' bit set . The previous code
* would fail to open the file read only on a read - only share
* as it was checking the flags parameter directly against O_RDONLY ,
* this was failing as the flags parameter was set to O_RDONLY | O_CREAT .
* JRA .
*/
1998-08-17 17:11:34 +04:00
2000-04-10 17:05:23 +04:00
if ( ! CAN_WRITE ( conn ) ) {
/* It's a read-only share - fail if we wanted to write. */
if ( accmode ! = O_RDONLY ) {
2006-12-31 13:16:03 +03:00
DEBUG ( 3 , ( " Permission denied opening %s \n " , path ) ) ;
2006-07-11 22:01:26 +04:00
return NT_STATUS_ACCESS_DENIED ;
2000-04-10 17:05:23 +04:00
} else if ( flags & O_CREAT ) {
2005-07-08 08:51:27 +04:00
/* We don't want to write - but we must make sure that
O_CREAT doesn ' t create the file if we have write
access into the directory .
2000-04-10 17:05:23 +04:00
*/
flags & = ~ O_CREAT ;
2003-07-24 23:10:52 +04:00
local_flags & = ~ O_CREAT ;
2000-04-10 17:05:23 +04:00
}
}
1998-08-17 17:11:34 +04:00
2001-04-16 04:02:29 +04:00
/*
* This little piece of insanity is inspired by the
* fact that an NT client can open a file for O_RDONLY ,
* but set the create disposition to FILE_EXISTS_TRUNCATE .
* If the client * can * write to the file , then it expects to
* truncate the file , even though it is opening for readonly .
* Quicken uses this stupid trick in backup file creation . . .
* Thanks * greatly * to " David W. Chapman Jr. " < dwcjr @ inethouston . net >
* for helping track this one down . It didn ' t bite us in 2.0 . x
* as we always opened files read - write in that release . JRA .
*/
2002-09-25 19:19:00 +04:00
if ( ( accmode = = O_RDONLY ) & & ( ( flags & O_TRUNC ) = = O_TRUNC ) ) {
2005-07-08 08:51:27 +04:00
DEBUG ( 10 , ( " open_file: truncate requested on read-only open "
2006-12-31 13:16:03 +03:00
" for file %s \n " , path ) ) ;
2001-04-16 04:02:29 +04:00
local_flags = ( flags & ~ O_ACCMODE ) | O_RDWR ;
2002-09-25 19:19:00 +04:00
}
2001-04-16 04:02:29 +04:00
2006-07-19 22:45:25 +04:00
if ( ( open_access_mask & ( FILE_READ_DATA | FILE_WRITE_DATA | FILE_APPEND_DATA | FILE_EXECUTE ) ) | |
2006-07-19 09:32:12 +04:00
( ! file_existed & & ( local_flags & O_CREAT ) ) | |
2005-07-08 08:51:27 +04:00
( ( local_flags & O_TRUNC ) = = O_TRUNC ) ) {
2008-12-02 00:27:47 +03:00
const char * wild ;
2001-04-16 04:34:03 +04:00
2002-09-25 19:19:00 +04:00
/*
* We can ' t actually truncate here as the file may be locked .
2006-05-30 03:54:53 +04:00
* open_file_ntcreate will take care of the truncate later . JRA .
2002-09-25 19:19:00 +04:00
*/
2001-04-16 04:34:03 +04:00
2002-09-25 19:19:00 +04:00
local_flags & = ~ O_TRUNC ;
# if defined(O_NONBLOCK) && defined(S_ISFIFO)
/*
* We would block on opening a FIFO with no one else on the
* other end . Do what we used to do and add O_NONBLOCK to the
* open flags . JRA .
*/
2005-07-08 08:51:27 +04:00
if ( file_existed & & S_ISFIFO ( psbuf - > st_mode ) ) {
2002-09-25 19:19:00 +04:00
local_flags | = O_NONBLOCK ;
2005-07-08 08:51:27 +04:00
}
2002-09-25 19:19:00 +04:00
# endif
1998-08-17 17:11:34 +04:00
2003-07-29 21:34:20 +04:00
/* Don't create files with Microsoft wildcard characters. */
2008-12-02 00:27:47 +03:00
if ( fsp - > base_fsp ) {
/*
* wildcard characters are allowed in stream names
* only test the basefilename
*/
wild = fsp - > base_fsp - > fsp_name ;
} else {
wild = path ;
}
2005-07-08 08:51:27 +04:00
if ( ( local_flags & O_CREAT ) & & ! file_existed & &
2008-12-02 00:27:47 +03:00
ms_has_wild ( wild ) ) {
2006-07-11 22:01:26 +04:00
return NT_STATUS_OBJECT_NAME_INVALID ;
2003-07-29 21:34:20 +04:00
}
2002-10-23 05:22:32 +04:00
/* Actually do the open */
2007-02-21 04:55:08 +03:00
status = fd_open ( conn , path , fsp , local_flags , unx_mode ) ;
if ( ! NT_STATUS_IS_OK ( status ) ) {
2005-07-08 08:51:27 +04:00
DEBUG ( 3 , ( " Error opening file %s (%s) (local_flags=%d) "
" (flags=%d) \n " ,
2007-02-21 04:55:08 +03:00
path , nt_errstr ( status ) , local_flags , flags ) ) ;
return status ;
2002-03-20 03:46:53 +03:00
}
2003-05-01 21:45:38 +04:00
2006-12-24 19:37:22 +03:00
if ( ( local_flags & O_CREAT ) & & ! file_existed ) {
/* Inherit the ACL if required */
if ( lp_inherit_perms ( SNUM ( conn ) ) ) {
2008-05-02 23:54:53 +04:00
inherit_access_posix_acl ( conn , parent_dir , path ,
2006-12-27 13:57:59 +03:00
unx_mode ) ;
2006-12-24 19:37:22 +03:00
}
/* Change the owner if required. */
if ( lp_inherit_owner ( SNUM ( conn ) ) ) {
2006-12-27 13:57:59 +03:00
change_file_owner_to_parent ( conn , parent_dir ,
fsp ) ;
2006-12-24 19:37:22 +03:00
}
2006-12-31 13:16:03 +03:00
2007-01-31 17:14:57 +03:00
notify_fname ( conn , NOTIFY_ACTION_ADDED ,
FILE_NOTIFY_CHANGE_FILE_NAME , path ) ;
2005-07-08 08:51:27 +04:00
}
2003-05-01 21:45:38 +04:00
2005-07-08 08:51:27 +04:00
} else {
fsp - > fh - > fd = - 1 ; /* What we used to call a stat open. */
2008-11-04 12:34:08 +03:00
if ( file_existed ) {
2009-02-03 04:10:27 +03:00
uint32_t access_granted = 0 ;
2008-11-04 12:34:08 +03:00
status = check_open_rights ( conn ,
path ,
2009-02-03 04:10:27 +03:00
access_mask ,
& access_granted ) ;
2008-11-04 12:34:08 +03:00
if ( ! NT_STATUS_IS_OK ( status ) ) {
2009-02-05 03:33:52 +03:00
if ( NT_STATUS_EQUAL ( status , NT_STATUS_ACCESS_DENIED ) ) {
if ( ( access_mask & DELETE_ACCESS ) & &
( access_granted = = DELETE_ACCESS ) & &
can_delete_file_in_directory ( conn , path ) ) {
/* Were we trying to do a stat open
* for delete and didn ' t get DELETE
* access ( only ) ? Check if the
* directory allows DELETE_CHILD .
* See here :
* http : //blogs.msdn.com/oldnewthing/archive/2004/06/04/148426.aspx
* for details . */
DEBUG ( 10 , ( " open_file: overrode ACCESS_DENIED "
" on file %s \n " ,
path ) ) ;
} else {
DEBUG ( 10 , ( " open_file: Access denied on "
" file %s \n " ,
path ) ) ;
return status ;
}
} else if ( NT_STATUS_EQUAL ( status , NT_STATUS_OBJECT_NAME_NOT_FOUND ) & &
fsp - > posix_open & &
S_ISLNK ( psbuf - > st_mode ) ) {
/* This is a POSIX stat open for delete
* or rename on a symlink that points
* nowhere . Allow . */
DEBUG ( 10 , ( " open_file: allowing POSIX open "
" on bad symlink %s \n " ,
path ) ) ;
} else {
DEBUG ( 10 , ( " open_file: check_open_rights "
" on file %s returned %s \n " ,
path , nt_errstr ( status ) ) ) ;
2009-02-03 04:10:27 +03:00
return status ;
}
2008-11-04 12:34:08 +03:00
}
}
2005-07-08 08:51:27 +04:00
}
1998-08-17 17:11:34 +04:00
2005-07-08 08:51:27 +04:00
if ( ! file_existed ) {
2002-03-20 03:46:53 +03:00
int ret ;
2005-07-08 08:51:27 +04:00
if ( fsp - > fh - > fd = = - 1 ) {
2006-12-31 13:16:03 +03:00
ret = SMB_VFS_STAT ( conn , path , psbuf ) ;
2005-07-08 08:51:27 +04:00
} else {
2008-01-07 15:21:26 +03:00
ret = SMB_VFS_FSTAT ( fsp , psbuf ) ;
2002-07-15 14:35:28 +04:00
/* If we have an fd, this stat should succeed. */
2005-07-08 08:51:27 +04:00
if ( ret = = - 1 ) {
DEBUG ( 0 , ( " Error doing fstat on open file %s "
2006-12-31 13:16:03 +03:00
" (%s) \n " , path , strerror ( errno ) ) ) ;
2005-07-08 08:51:27 +04:00
}
2002-07-15 14:35:28 +04:00
}
2002-03-20 03:46:53 +03:00
2002-07-15 14:35:28 +04:00
/* For a non-io open, this stat failing means file not found. JRA */
2002-03-20 03:46:53 +03:00
if ( ret = = - 1 ) {
2007-02-21 04:55:08 +03:00
status = map_nt_error_from_unix ( errno ) ;
2007-12-22 04:01:26 +03:00
fd_close ( fsp ) ;
2006-07-11 22:01:26 +04:00
return status ;
2000-10-19 06:58:24 +04:00
}
2000-05-12 04:11:49 +04:00
}
1998-08-17 17:11:34 +04:00
2000-04-12 01:38:45 +04:00
/*
* POSIX allows read - only opens of directories . We don ' t
* want to do this ( we use a different code path for this )
* so catch a directory open and return an EISDIR . JRA .
*/
2000-10-19 06:58:24 +04:00
if ( S_ISDIR ( psbuf - > st_mode ) ) {
2007-12-22 04:01:26 +03:00
fd_close ( fsp ) ;
2000-04-12 01:38:45 +04:00
errno = EISDIR ;
2006-07-11 22:01:26 +04:00
return NT_STATUS_FILE_IS_A_DIRECTORY ;
2000-04-12 01:38:45 +04:00
}
2000-10-19 06:58:24 +04:00
fsp - > mode = psbuf - > st_mode ;
2007-08-02 12:53:24 +04:00
fsp - > file_id = vfs_file_id_from_sbuf ( conn , psbuf ) ;
2007-07-05 20:26:27 +04:00
fsp - > vuid = req ? req - > vuid : UID_FIELD_INVALID ;
fsp - > file_pid = req ? req - > smbpid : 0 ;
2000-04-10 17:05:23 +04:00
fsp - > can_lock = True ;
2005-07-08 08:51:27 +04:00
fsp - > can_read = ( access_mask & ( FILE_READ_DATA ) ) ? True : False ;
if ( ! CAN_WRITE ( conn ) ) {
fsp - > can_write = False ;
} else {
2006-07-25 12:51:54 +04:00
fsp - > can_write = ( access_mask & ( FILE_WRITE_DATA | FILE_APPEND_DATA ) ) ?
True : False ;
2005-07-08 08:51:27 +04:00
}
2000-04-10 17:05:23 +04:00
fsp - > print_file = False ;
fsp - > modified = False ;
fsp - > sent_oplock_break = NO_BREAK_SENT ;
fsp - > is_directory = False ;
2007-10-11 00:34:30 +04:00
if ( conn - > aio_write_behind_list & &
is_in_path ( path , conn - > aio_write_behind_list , conn - > case_sensitive ) ) {
fsp - > aio_write_behind = True ;
}
2005-06-28 02:53:56 +04:00
2006-12-31 13:16:03 +03:00
string_set ( & fsp - > fsp_name , path ) ;
2000-04-10 17:05:23 +04:00
fsp - > wcp = NULL ; /* Write cache pointer. */
1998-08-17 17:11:34 +04:00
2000-04-10 17:05:23 +04:00
DEBUG ( 2 , ( " %s opened file %s read=%s write=%s (numopen=%d) \n " ,
2008-06-15 15:41:16 +04:00
conn - > server_info - > unix_name ,
2008-05-08 18:06:42 +04:00
fsp - > fsp_name ,
2000-04-10 17:05:23 +04:00
BOOLSTR ( fsp - > can_read ) , BOOLSTR ( fsp - > can_write ) ,
2008-11-21 23:14:53 +03:00
conn - > num_files_open ) ) ;
2000-04-22 04:33:16 +04:00
2004-06-10 01:03:50 +04:00
errno = 0 ;
2006-07-11 22:01:26 +04:00
return NT_STATUS_OK ;
1998-09-26 03:40:49 +04:00
}
1998-08-17 17:11:34 +04:00
2000-01-16 15:53:12 +03:00
/*******************************************************************
2004-06-08 20:14:31 +04:00
Return True if the filename is one of the special executable types .
2000-01-16 15:53:12 +03:00
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
2004-05-15 02:08:19 +04:00
2008-10-30 03:28:19 +03:00
bool is_executable ( const char * fname )
2000-01-16 15:53:12 +03:00
{
2001-07-04 11:36:09 +04:00
if ( ( fname = strrchr_m ( fname , ' . ' ) ) ) {
2000-01-16 15:53:12 +03:00
if ( strequal ( fname , " .com " ) | |
strequal ( fname , " .dll " ) | |
strequal ( fname , " .exe " ) | |
strequal ( fname , " .sym " ) ) {
return True ;
}
}
return False ;
}
1998-09-05 09:07:05 +04:00
/****************************************************************************
2004-06-08 20:14:31 +04:00
Check if we can open a file with a share mode .
2005-07-08 08:51:27 +04:00
Returns True if conflict , False if not .
1998-09-05 09:07:05 +04:00
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
1999-12-13 16:27:58 +03:00
2007-10-19 04:40:25 +04:00
static bool share_conflict ( struct share_mode_entry * entry ,
2005-07-08 08:51:27 +04:00
uint32 access_mask ,
uint32 share_access )
2000-04-22 04:33:16 +04:00
{
2005-07-08 08:51:27 +04:00
DEBUG ( 10 , ( " share_conflict: entry->access_mask = 0x%x, "
" entry->share_access = 0x%x, "
" entry->private_options = 0x%x \n " ,
( unsigned int ) entry - > access_mask ,
( unsigned int ) entry - > share_access ,
( unsigned int ) entry - > private_options ) ) ;
DEBUG ( 10 , ( " share_conflict: access_mask = 0x%x, share_access = 0x%x \n " ,
( unsigned int ) access_mask , ( unsigned int ) share_access ) ) ;
if ( ( entry - > access_mask & ( FILE_WRITE_DATA |
FILE_APPEND_DATA |
FILE_READ_DATA |
FILE_EXECUTE |
DELETE_ACCESS ) ) = = 0 ) {
DEBUG ( 10 , ( " share_conflict: No conflict due to "
" entry->access_mask = 0x%x \n " ,
( unsigned int ) entry - > access_mask ) ) ;
2000-04-22 04:33:16 +04:00
return False ;
}
2005-07-08 08:51:27 +04:00
if ( ( access_mask & ( FILE_WRITE_DATA |
FILE_APPEND_DATA |
FILE_READ_DATA |
FILE_EXECUTE |
DELETE_ACCESS ) ) = = 0 ) {
DEBUG ( 10 , ( " share_conflict: No conflict due to "
" access_mask = 0x%x \n " ,
( unsigned int ) access_mask ) ) ;
This is a big, rather ugly patch. Whilst investigating the files not truncated
when copying to a full disk problem, I discovered that we were not allowing
the delete on close flag to be set properly, this led to other things, and
after investigation of the proper delete on close semantics and their relationship
to the file_share_delete flag I discovered there were some cases where we
weren't doing the deny modes properly. And this after only 5 years working
on them..... :-) :-).
So here's the latest attempt. I realised the delete on close flag needs to
be set across all smbds with a dev/ino pair open - in addition, the delete
on close flag, allow share delete and delete access requested all need to
be stored in the share mode tdb.
The "delete_on_close" entry in the fsp struct is now redundant and should
really be removed. This may also mean we can get rid of the "iterate_fsp"
calls that I didn't like adding in the first place. Whilst doing this patch,
I also discovered we needed to do the se_map_generic() call for file opens
and POSIX ACL mapping, so I added that also.
This code, although ugly, now passes the deny mode torture tests plus the
delete on close tests I added. I do need to add one more multiple connection
delete on close test to make sure I got the semantics exactly right, plus we
should also (as Andrew suggested) move to random testing here.
The good news is that NT should now correctly delete the file on disk
full error when copying to a disk :-).
Jeremy.
(This used to be commit 51987684bd231c744da2e5f3705fd236d5616173)
2001-03-30 12:57:24 +04:00
return False ;
}
2005-07-08 08:51:27 +04:00
# if 1 /* JRA TEST - Superdebug. */
# define CHECK_MASK(num, am, right, sa, share) \
DEBUG ( 10 , ( " share_conflict: [%d] am (0x%x) & right (0x%x) = 0x%x \n " , \
( unsigned int ) ( num ) , ( unsigned int ) ( am ) , \
( unsigned int ) ( right ) , ( unsigned int ) ( am ) & ( right ) ) ) ; \
DEBUG ( 10 , ( " share_conflict: [%d] sa (0x%x) & share (0x%x) = 0x%x \n " , \
( unsigned int ) ( num ) , ( unsigned int ) ( sa ) , \
( unsigned int ) ( share ) , ( unsigned int ) ( sa ) & ( share ) ) ) ; \
if ( ( ( am ) & ( right ) ) & & ! ( ( sa ) & ( share ) ) ) { \
DEBUG ( 10 , ( " share_conflict: check %d conflict am = 0x%x, right = 0x%x, \
sa = 0 x % x , share = 0 x % x \ n " , (num), (unsigned int)(am), (unsigned int)(right), (unsigned int)(sa), \
( unsigned int ) ( share ) ) ) ; \
return True ; \
}
# else
# define CHECK_MASK(num, am, right, sa, share) \
if ( ( ( am ) & ( right ) ) & & ! ( ( sa ) & ( share ) ) ) { \
DEBUG ( 10 , ( " share_conflict: check %d conflict am = 0x%x, right = 0x%x, \
sa = 0 x % x , share = 0 x % x \ n " , (num), (unsigned int)(am), (unsigned int)(right), (unsigned int)(sa), \
( unsigned int ) ( share ) ) ) ; \
return True ; \
This is a big, rather ugly patch. Whilst investigating the files not truncated
when copying to a full disk problem, I discovered that we were not allowing
the delete on close flag to be set properly, this led to other things, and
after investigation of the proper delete on close semantics and their relationship
to the file_share_delete flag I discovered there were some cases where we
weren't doing the deny modes properly. And this after only 5 years working
on them..... :-) :-).
So here's the latest attempt. I realised the delete on close flag needs to
be set across all smbds with a dev/ino pair open - in addition, the delete
on close flag, allow share delete and delete access requested all need to
be stored in the share mode tdb.
The "delete_on_close" entry in the fsp struct is now redundant and should
really be removed. This may also mean we can get rid of the "iterate_fsp"
calls that I didn't like adding in the first place. Whilst doing this patch,
I also discovered we needed to do the se_map_generic() call for file opens
and POSIX ACL mapping, so I added that also.
This code, although ugly, now passes the deny mode torture tests plus the
delete on close tests I added. I do need to add one more multiple connection
delete on close test to make sure I got the semantics exactly right, plus we
should also (as Andrew suggested) move to random testing here.
The good news is that NT should now correctly delete the file on disk
full error when copying to a disk :-).
Jeremy.
(This used to be commit 51987684bd231c744da2e5f3705fd236d5616173)
2001-03-30 12:57:24 +04:00
}
2005-03-03 00:43:54 +03:00
# endif
This is a big, rather ugly patch. Whilst investigating the files not truncated
when copying to a full disk problem, I discovered that we were not allowing
the delete on close flag to be set properly, this led to other things, and
after investigation of the proper delete on close semantics and their relationship
to the file_share_delete flag I discovered there were some cases where we
weren't doing the deny modes properly. And this after only 5 years working
on them..... :-) :-).
So here's the latest attempt. I realised the delete on close flag needs to
be set across all smbds with a dev/ino pair open - in addition, the delete
on close flag, allow share delete and delete access requested all need to
be stored in the share mode tdb.
The "delete_on_close" entry in the fsp struct is now redundant and should
really be removed. This may also mean we can get rid of the "iterate_fsp"
calls that I didn't like adding in the first place. Whilst doing this patch,
I also discovered we needed to do the se_map_generic() call for file opens
and POSIX ACL mapping, so I added that also.
This code, although ugly, now passes the deny mode torture tests plus the
delete on close tests I added. I do need to add one more multiple connection
delete on close test to make sure I got the semantics exactly right, plus we
should also (as Andrew suggested) move to random testing here.
The good news is that NT should now correctly delete the file on disk
full error when copying to a disk :-).
Jeremy.
(This used to be commit 51987684bd231c744da2e5f3705fd236d5616173)
2001-03-30 12:57:24 +04:00
2005-07-08 08:51:27 +04:00
CHECK_MASK ( 1 , entry - > access_mask , FILE_WRITE_DATA | FILE_APPEND_DATA ,
share_access , FILE_SHARE_WRITE ) ;
CHECK_MASK ( 2 , access_mask , FILE_WRITE_DATA | FILE_APPEND_DATA ,
entry - > share_access , FILE_SHARE_WRITE ) ;
CHECK_MASK ( 3 , entry - > access_mask , FILE_READ_DATA | FILE_EXECUTE ,
share_access , FILE_SHARE_READ ) ;
CHECK_MASK ( 4 , access_mask , FILE_READ_DATA | FILE_EXECUTE ,
entry - > share_access , FILE_SHARE_READ ) ;
2000-04-22 04:33:16 +04:00
2005-07-08 08:51:27 +04:00
CHECK_MASK ( 5 , entry - > access_mask , DELETE_ACCESS ,
share_access , FILE_SHARE_DELETE ) ;
CHECK_MASK ( 6 , access_mask , DELETE_ACCESS ,
entry - > share_access , FILE_SHARE_DELETE ) ;
2000-04-22 04:33:16 +04:00
2005-07-08 08:51:27 +04:00
DEBUG ( 10 , ( " share_conflict: No conflict. \n " ) ) ;
return False ;
2000-04-22 04:33:16 +04:00
}
2003-04-22 21:30:53 +04:00
# if defined(DEVELOPER)
2005-07-08 08:51:27 +04:00
static void validate_my_share_entries ( int num ,
2005-09-30 21:13:37 +04:00
struct share_mode_entry * share_entry )
2003-04-22 21:30:53 +04:00
{
files_struct * fsp ;
2005-09-30 21:13:37 +04:00
if ( ! procid_is_me ( & share_entry - > pid ) ) {
return ;
}
if ( is_deferred_open_entry ( share_entry ) & &
! open_was_deferred ( share_entry - > op_mid ) ) {
2007-09-13 01:48:20 +04:00
char * str = talloc_asprintf ( talloc_tos ( ) ,
" Got a deferred entry without a request: "
" PANIC: %s \n " ,
2007-11-16 05:27:26 +03:00
share_mode_str ( talloc_tos ( ) , num , share_entry ) ) ;
2005-09-30 21:13:37 +04:00
smb_panic ( str ) ;
}
if ( ! is_valid_share_mode_entry ( share_entry ) ) {
2003-04-22 21:30:53 +04:00
return ;
2005-07-08 08:51:27 +04:00
}
2003-04-22 21:30:53 +04:00
2007-05-29 13:30:34 +04:00
fsp = file_find_dif ( share_entry - > id ,
2005-07-08 08:51:27 +04:00
share_entry - > share_file_id ) ;
2003-04-22 21:30:53 +04:00
if ( ! fsp ) {
2005-07-08 08:51:27 +04:00
DEBUG ( 0 , ( " validate_my_share_entries: PANIC : %s \n " ,
2007-11-16 05:27:26 +03:00
share_mode_str ( talloc_tos ( ) , num , share_entry ) ) ) ;
2005-07-08 08:51:27 +04:00
smb_panic ( " validate_my_share_entries: Cannot match a "
" share entry with an open file \n " ) ;
2003-04-22 21:30:53 +04:00
}
2005-09-30 21:13:37 +04:00
if ( is_deferred_open_entry ( share_entry ) | |
is_unused_share_mode_entry ( share_entry ) ) {
goto panic ;
}
if ( ( share_entry - > op_type = = NO_OPLOCK ) & &
( fsp - > oplock_type = = FAKE_LEVEL_II_OPLOCK ) ) {
/* Someone has already written to it, but I haven't yet
* noticed */
return ;
}
2003-04-22 21:30:53 +04:00
if ( ( ( uint16 ) fsp - > oplock_type ) ! = share_entry - > op_type ) {
2005-09-30 21:13:37 +04:00
goto panic ;
}
return ;
panic :
{
2007-09-13 01:48:20 +04:00
char * str ;
2005-07-08 08:51:27 +04:00
DEBUG ( 0 , ( " validate_my_share_entries: PANIC : %s \n " ,
2007-11-16 05:27:26 +03:00
share_mode_str ( talloc_tos ( ) , num , share_entry ) ) ) ;
2007-09-13 01:48:20 +04:00
str = talloc_asprintf ( talloc_tos ( ) ,
" validate_my_share_entries: "
" file %s, oplock_type = 0x%x, op_type = 0x%x \n " ,
2005-07-08 08:51:27 +04:00
fsp - > fsp_name , ( unsigned int ) fsp - > oplock_type ,
( unsigned int ) share_entry - > op_type ) ;
2003-04-22 21:30:53 +04:00
smb_panic ( str ) ;
}
}
# endif
2008-10-30 03:28:19 +03:00
bool is_stat_open ( uint32 access_mask )
2004-06-02 06:12:54 +04:00
{
2005-09-30 21:13:37 +04:00
return ( access_mask & &
( ( access_mask & ~ ( SYNCHRONIZE_ACCESS | FILE_READ_ATTRIBUTES |
FILE_WRITE_ATTRIBUTES ) ) = = 0 ) & &
( ( access_mask & ( SYNCHRONIZE_ACCESS | FILE_READ_ATTRIBUTES |
FILE_WRITE_ATTRIBUTES ) ) ! = 0 ) ) ;
2005-07-08 08:51:27 +04:00
}
2000-04-22 04:33:16 +04:00
/****************************************************************************
2005-09-30 21:13:37 +04:00
Deal with share modes
2000-04-22 04:33:16 +04:00
Invarient : Share mode must be locked on entry and exit .
Returns - 1 on error , or number of share modes on success ( may be zero ) .
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
2005-09-30 21:13:37 +04:00
static NTSTATUS open_mode_check ( connection_struct * conn ,
const char * fname ,
struct share_mode_lock * lck ,
uint32 access_mask ,
uint32 share_access ,
uint32 create_options ,
2007-10-19 04:40:25 +04:00
bool * file_existed )
1998-09-05 09:07:05 +04:00
{
2001-09-06 01:11:52 +04:00
int i ;
2004-05-30 11:21:50 +04:00
2005-09-30 21:13:37 +04:00
if ( lck - > num_share_modes = = 0 ) {
return NT_STATUS_OK ;
2004-08-27 05:16:25 +04:00
}
2005-09-30 21:13:37 +04:00
* file_existed = True ;
2004-05-30 11:21:50 +04:00
2005-07-08 08:51:27 +04:00
/* A delete on close prohibits everything */
2005-09-30 21:13:37 +04:00
if ( lck - > delete_on_close ) {
return NT_STATUS_DELETE_PENDING ;
2005-07-08 08:51:27 +04:00
}
2008-01-11 14:35:04 +03:00
if ( is_stat_open ( access_mask ) ) {
/* Stat open that doesn't trigger oplock breaks or share mode
* checks . . . ! JRA . */
return NT_STATUS_OK ;
}
2001-09-06 01:11:52 +04:00
/*
* Check if the share modes will give us access .
*/
2003-04-22 21:30:53 +04:00
# if defined(DEVELOPER)
2005-09-30 21:13:37 +04:00
for ( i = 0 ; i < lck - > num_share_modes ; i + + ) {
validate_my_share_entries ( i , & lck - > share_modes [ i ] ) ;
}
2003-04-22 21:30:53 +04:00
# endif
2005-09-30 21:13:37 +04:00
if ( ! lp_share_modes ( SNUM ( conn ) ) ) {
return NT_STATUS_OK ;
}
2005-07-08 08:51:27 +04:00
2005-09-30 21:13:37 +04:00
/* Now we check the share modes, after any oplock breaks. */
for ( i = 0 ; i < lck - > num_share_modes ; i + + ) {
2004-06-02 06:12:54 +04:00
2005-09-30 21:13:37 +04:00
if ( ! is_valid_share_mode_entry ( & lck - > share_modes [ i ] ) ) {
continue ;
2004-06-02 06:12:54 +04:00
}
2005-09-30 21:13:37 +04:00
/* someone else has a share lock on it, check to see if we can
* too */
if ( share_conflict ( & lck - > share_modes [ i ] ,
access_mask , share_access ) ) {
return NT_STATUS_SHARING_VIOLATION ;
2004-06-02 06:12:54 +04:00
}
2001-09-06 01:11:52 +04:00
}
2005-09-30 21:13:37 +04:00
return NT_STATUS_OK ;
1998-09-05 09:07:05 +04:00
}
2007-10-19 04:40:25 +04:00
static bool is_delete_request ( files_struct * fsp ) {
2005-09-30 21:13:37 +04:00
return ( ( fsp - > access_mask = = DELETE_ACCESS ) & &
( fsp - > oplock_type = = NO_OPLOCK ) ) ;
}
2004-06-08 20:14:31 +04:00
2008-12-18 04:23:13 +03:00
/*
* Send a break message to the oplock holder and delay the open for
* our client .
*/
static NTSTATUS send_break_message ( files_struct * fsp ,
struct share_mode_entry * exclusive ,
uint16 mid ,
int oplock_request )
{
NTSTATUS status ;
char msg [ MSG_SMB_SHARE_MODE_ENTRY_SIZE ] ;
DEBUG ( 10 , ( " Sending break request to PID %s \n " ,
procid_str_static ( & exclusive - > pid ) ) ) ;
exclusive - > op_mid = mid ;
/* Create the message. */
share_mode_entry_to_message ( msg , exclusive ) ;
/* Add in the FORCE_OPLOCK_BREAK_TO_NONE bit in the message if set. We
don ' t want this set in the share mode struct pointed to by lck . */
if ( oplock_request & FORCE_OPLOCK_BREAK_TO_NONE ) {
SSVAL ( msg , 6 , exclusive - > op_type | FORCE_OPLOCK_BREAK_TO_NONE ) ;
}
status = messaging_send_buf ( smbd_messaging_context ( ) , exclusive - > pid ,
MSG_SMB_BREAK_REQUEST ,
( uint8 * ) msg ,
MSG_SMB_SHARE_MODE_ENTRY_SIZE ) ;
if ( ! NT_STATUS_IS_OK ( status ) ) {
DEBUG ( 3 , ( " Could not send oplock break message: %s \n " ,
nt_errstr ( status ) ) ) ;
}
return status ;
}
2005-09-30 21:13:37 +04:00
/*
2006-05-30 09:08:15 +04:00
* 1 ) No files open at all or internal open : Grant whatever the client wants .
2005-09-30 21:13:37 +04:00
*
* 2 ) Exclusive ( or batch ) oplock around : If the requested access is a delete
* request , break if the oplock around is a batch oplock . If it ' s another
* requested access type , break .
2008-12-18 04:23:13 +03:00
*
2005-09-30 21:13:37 +04:00
* 3 ) Only level2 around : Grant level2 and do nothing else .
*/
2007-10-19 04:40:25 +04:00
static bool delay_for_oplocks ( struct share_mode_lock * lck ,
2006-07-25 12:51:54 +04:00
files_struct * fsp ,
2007-07-05 20:27:47 +04:00
uint16 mid ,
2006-07-25 12:51:54 +04:00
int pass_number ,
int oplock_request )
2004-06-08 20:14:31 +04:00
{
2005-10-13 01:42:03 +04:00
int i ;
2005-09-30 21:13:37 +04:00
struct share_mode_entry * exclusive = NULL ;
2008-12-18 04:23:13 +03:00
bool valid_entry = false ;
bool have_level2 = false ;
bool have_a_none_oplock = false ;
bool allow_level2 = ( global_client_caps & CAP_LEVEL_II_OPLOCKS ) & &
lp_level2_oplocks ( SNUM ( fsp - > conn ) ) ;
2004-06-08 20:14:31 +04:00
2006-07-19 05:30:30 +04:00
if ( oplock_request & INTERNAL_OPEN_ONLY ) {
2005-09-30 21:13:37 +04:00
fsp - > oplock_type = NO_OPLOCK ;
2006-07-19 05:30:30 +04:00
}
if ( ( oplock_request & INTERNAL_OPEN_ONLY ) | | is_stat_open ( fsp - > access_mask ) ) {
2008-12-18 04:23:13 +03:00
return false ;
2004-06-26 04:47:58 +04:00
}
2005-09-30 21:13:37 +04:00
for ( i = 0 ; i < lck - > num_share_modes ; i + + ) {
if ( ! is_valid_share_mode_entry ( & lck - > share_modes [ i ] ) ) {
continue ;
}
2006-03-21 09:53:49 +03:00
/* At least one entry is not an invalid or deferred entry. */
2008-12-18 04:23:13 +03:00
valid_entry = true ;
2006-03-21 09:53:49 +03:00
2006-04-19 22:48:14 +04:00
if ( pass_number = = 1 ) {
if ( BATCH_OPLOCK_TYPE ( lck - > share_modes [ i ] . op_type ) ) {
2008-12-18 04:23:13 +03:00
SMB_ASSERT ( exclusive = = NULL ) ;
2006-04-19 22:48:14 +04:00
exclusive = & lck - > share_modes [ i ] ;
}
} else {
if ( EXCLUSIVE_OPLOCK_TYPE ( lck - > share_modes [ i ] . op_type ) ) {
2008-12-18 04:23:13 +03:00
SMB_ASSERT ( exclusive = = NULL ) ;
2006-04-19 22:48:14 +04:00
exclusive = & lck - > share_modes [ i ] ;
}
2005-09-30 21:13:37 +04:00
}
2008-12-18 04:23:13 +03:00
if ( LEVEL_II_OPLOCK_TYPE ( lck - > share_modes [ i ] . op_type ) ) {
SMB_ASSERT ( exclusive = = NULL ) ;
have_level2 = true ;
2004-06-08 20:14:31 +04:00
}
2005-09-30 21:13:37 +04:00
2008-12-18 04:23:13 +03:00
if ( lck - > share_modes [ i ] . op_type = = NO_OPLOCK ) {
have_a_none_oplock = true ;
2006-03-21 09:53:49 +03:00
}
}
2005-09-30 21:13:37 +04:00
if ( exclusive ! = NULL ) { /* Found an exclusive oplock */
2008-12-18 04:23:13 +03:00
bool delay_it = is_delete_request ( fsp ) ?
BATCH_OPLOCK_TYPE ( exclusive - > op_type ) : true ;
2005-09-30 21:13:37 +04:00
SMB_ASSERT ( ! have_level2 ) ;
2008-12-18 04:23:13 +03:00
if ( delay_it ) {
send_break_message ( fsp , exclusive , mid , oplock_request ) ;
return true ;
}
2005-09-30 21:13:37 +04:00
}
2008-12-18 04:23:13 +03:00
/*
* Match what was requested ( fsp - > oplock_type ) with
* what was found in the existing share modes .
*/
2005-09-30 21:13:37 +04:00
2008-12-18 04:23:13 +03:00
if ( ! valid_entry ) {
/* All entries are placeholders or deferred.
* Directly grant whatever the client wants . */
if ( fsp - > oplock_type = = NO_OPLOCK ) {
/* Store a level2 oplock, but don't tell the client */
fsp - > oplock_type = FAKE_LEVEL_II_OPLOCK ;
}
} else if ( have_a_none_oplock ) {
fsp - > oplock_type = NO_OPLOCK ;
} else if ( have_level2 ) {
if ( fsp - > oplock_type = = NO_OPLOCK | |
fsp - > oplock_type = = FAKE_LEVEL_II_OPLOCK ) {
/* Store a level2 oplock, but don't tell the client */
fsp - > oplock_type = FAKE_LEVEL_II_OPLOCK ;
} else {
fsp - > oplock_type = LEVEL_II_OPLOCK ;
}
} else {
/* This case can never happen. */
SMB_ASSERT ( 1 ) ;
2006-07-26 12:08:48 +04:00
}
2006-01-13 01:17:54 +03:00
2006-07-26 12:08:48 +04:00
/*
2008-12-18 04:23:13 +03:00
* Don ' t grant level2 to clients that don ' t want them
* or if we ' ve turned them off .
2006-07-26 12:08:48 +04:00
*/
2008-12-18 04:23:13 +03:00
if ( fsp - > oplock_type = = LEVEL_II_OPLOCK & & ! allow_level2 ) {
fsp - > oplock_type = FAKE_LEVEL_II_OPLOCK ;
2006-07-26 12:08:48 +04:00
}
2008-12-18 04:23:13 +03:00
DEBUG ( 10 , ( " delay_for_oplocks: oplock type 0x%x on file %s \n " ,
fsp - > oplock_type , fsp - > fsp_name ) ) ;
2005-09-30 21:13:37 +04:00
2008-12-18 04:23:13 +03:00
/* No delay. */
return false ;
2005-09-30 21:13:37 +04:00
}
2008-10-30 03:28:19 +03:00
bool request_timed_out ( struct timeval request_time ,
struct timeval timeout )
2005-09-30 21:13:37 +04:00
{
struct timeval now , end_time ;
GetTimeOfDay ( & now ) ;
end_time = timeval_sum ( & request_time , & timeout ) ;
return ( timeval_compare ( & end_time , & now ) < 0 ) ;
2004-06-08 20:14:31 +04:00
}
/****************************************************************************
Handle the 1 second delay in returning a SHARING_VIOLATION error .
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
2005-09-30 21:13:37 +04:00
static void defer_open ( struct share_mode_lock * lck ,
struct timeval request_time ,
struct timeval timeout ,
2007-08-27 16:04:09 +04:00
struct smb_request * req ,
2005-09-30 21:13:37 +04:00
struct deferred_open_record * state )
2004-06-08 20:14:31 +04:00
{
2005-09-30 21:13:37 +04:00
int i ;
2004-06-08 20:14:31 +04:00
2005-09-30 21:13:37 +04:00
/* Paranoia check */
2004-06-26 04:47:58 +04:00
2005-09-30 21:13:37 +04:00
for ( i = 0 ; i < lck - > num_share_modes ; i + + ) {
struct share_mode_entry * e = & lck - > share_modes [ i ] ;
2004-06-08 20:14:31 +04:00
2005-09-30 21:13:37 +04:00
if ( ! is_deferred_open_entry ( e ) ) {
continue ;
}
2007-08-27 16:04:09 +04:00
if ( procid_is_me ( & e - > pid ) & & ( e - > op_mid = = req - > mid ) ) {
2005-09-30 21:13:37 +04:00
DEBUG ( 0 , ( " Trying to defer an already deferred "
2007-08-27 16:04:09 +04:00
" request: mid=%d, exiting \n " , req - > mid ) ) ;
2006-04-04 04:27:50 +04:00
exit_server ( " attempt to defer a deferred request " ) ;
2004-06-08 20:14:31 +04:00
}
}
2005-09-30 21:13:37 +04:00
/* End paranoia check */
2005-07-08 08:51:27 +04:00
DEBUG ( 10 , ( " defer_open_sharing_error: time [%u.%06u] adding deferred "
2005-09-30 21:13:37 +04:00
" open entry for mid %u \n " ,
( unsigned int ) request_time . tv_sec ,
( unsigned int ) request_time . tv_usec ,
2007-08-27 16:04:09 +04:00
( unsigned int ) req - > mid ) ) ;
2004-06-08 20:14:31 +04:00
2007-08-27 16:04:09 +04:00
if ( ! push_deferred_smb_message ( req , request_time , timeout ,
2005-09-30 21:13:37 +04:00
( char * ) state , sizeof ( * state ) ) ) {
2006-04-04 04:27:50 +04:00
exit_server ( " push_deferred_smb_message failed " ) ;
2004-06-08 20:14:31 +04:00
}
2007-08-27 16:04:09 +04:00
add_deferred_open ( lck , req - > mid , request_time , state - > id ) ;
2004-06-09 02:13:59 +04:00
/*
* Push the MID of this packet on the signing queue .
* We only do this once , the first time we push the packet
* onto the deferred open queue , as this has a side effect
* of incrementing the response sequence number .
*/
2007-08-27 16:04:09 +04:00
srv_defer_sign_response ( req - > mid ) ;
2004-06-08 20:14:31 +04:00
}
2000-06-15 13:35:37 +04:00
2005-07-08 08:51:27 +04:00
/****************************************************************************
On overwrite open ensure that the attributes match .
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
1999-12-13 16:27:58 +03:00
2008-10-30 03:28:19 +03:00
bool open_match_attributes ( connection_struct * conn ,
const char * path ,
uint32 old_dos_attr ,
uint32 new_dos_attr ,
mode_t existing_unx_mode ,
mode_t new_unx_mode ,
mode_t * returned_unx_mode )
2002-09-25 19:19:00 +04:00
{
2005-07-08 08:51:27 +04:00
uint32 noarch_old_dos_attr , noarch_new_dos_attr ;
2002-09-25 19:19:00 +04:00
2005-07-08 08:51:27 +04:00
noarch_old_dos_attr = ( old_dos_attr & ~ FILE_ATTRIBUTE_ARCHIVE ) ;
noarch_new_dos_attr = ( new_dos_attr & ~ FILE_ATTRIBUTE_ARCHIVE ) ;
2003-02-04 04:11:56 +03:00
2005-07-08 08:51:27 +04:00
if ( ( noarch_old_dos_attr = = 0 & & noarch_new_dos_attr ! = 0 ) | |
( noarch_old_dos_attr ! = 0 & & ( ( noarch_old_dos_attr & noarch_new_dos_attr ) = = noarch_old_dos_attr ) ) ) {
* returned_unx_mode = new_unx_mode ;
} else {
* returned_unx_mode = ( mode_t ) 0 ;
}
2003-01-08 05:09:18 +03:00
2005-07-08 08:51:27 +04:00
DEBUG ( 10 , ( " open_match_attributes: file %s old_dos_attr = 0x%x, "
" existing_unx_mode = 0%o, new_dos_attr = 0x%x "
" returned_unx_mode = 0%o \n " ,
path ,
( unsigned int ) old_dos_attr ,
( unsigned int ) existing_unx_mode ,
( unsigned int ) new_dos_attr ,
( unsigned int ) * returned_unx_mode ) ) ;
2003-01-08 05:09:18 +03:00
2002-09-25 19:19:00 +04:00
/* If we're mapping SYSTEM and HIDDEN ensure they match. */
2004-04-02 22:46:19 +04:00
if ( lp_map_system ( SNUM ( conn ) ) | | lp_store_dos_attributes ( SNUM ( conn ) ) ) {
2005-07-08 08:51:27 +04:00
if ( ( old_dos_attr & FILE_ATTRIBUTE_SYSTEM ) & &
! ( new_dos_attr & FILE_ATTRIBUTE_SYSTEM ) ) {
2002-09-25 19:19:00 +04:00
return False ;
2005-07-08 08:51:27 +04:00
}
2002-09-25 19:19:00 +04:00
}
2004-04-02 22:46:19 +04:00
if ( lp_map_hidden ( SNUM ( conn ) ) | | lp_store_dos_attributes ( SNUM ( conn ) ) ) {
2005-07-08 08:51:27 +04:00
if ( ( old_dos_attr & FILE_ATTRIBUTE_HIDDEN ) & &
! ( new_dos_attr & FILE_ATTRIBUTE_HIDDEN ) ) {
2002-09-25 19:19:00 +04:00
return False ;
2005-07-08 08:51:27 +04:00
}
2002-09-25 19:19:00 +04:00
}
return True ;
}
2000-06-15 13:35:37 +04:00
/****************************************************************************
2005-07-08 08:51:27 +04:00
Special FCB or DOS processing in the case of a sharing violation .
Try and find a duplicated file handle .
2000-06-15 13:35:37 +04:00
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
2003-01-08 05:09:18 +03:00
2008-10-30 03:28:19 +03:00
NTSTATUS fcb_or_dos_open ( struct smb_request * req ,
2008-10-09 17:38:53 +04:00
connection_struct * conn ,
2008-11-21 23:14:53 +03:00
files_struct * fsp_to_dup_into ,
const char * fname ,
2007-05-29 13:30:34 +04:00
struct file_id id ,
2007-07-05 20:26:27 +04:00
uint16 file_pid ,
uint16 vuid ,
2005-07-08 08:51:27 +04:00
uint32 access_mask ,
uint32 share_access ,
uint32 create_options )
2002-02-26 08:45:33 +03:00
{
2005-07-08 08:51:27 +04:00
files_struct * fsp ;
DEBUG ( 5 , ( " fcb_or_dos_open: attempting old open semantics for "
" file %s. \n " , fname ) ) ;
2007-05-29 13:30:34 +04:00
for ( fsp = file_find_di_first ( id ) ; fsp ;
2005-07-08 08:51:27 +04:00
fsp = file_find_di_next ( fsp ) ) {
DEBUG ( 10 , ( " fcb_or_dos_open: checking file %s, fd = %d, "
" vuid = %u, file_pid = %u, private_options = 0x%x "
" access_mask = 0x%x \n " , fsp - > fsp_name ,
fsp - > fh - > fd , ( unsigned int ) fsp - > vuid ,
( unsigned int ) fsp - > file_pid ,
( unsigned int ) fsp - > fh - > private_options ,
( unsigned int ) fsp - > access_mask ) ) ;
if ( fsp - > fh - > fd ! = - 1 & &
2007-07-05 20:26:27 +04:00
fsp - > vuid = = vuid & &
fsp - > file_pid = = file_pid & &
2005-07-08 08:51:27 +04:00
( fsp - > fh - > private_options & ( NTCREATEX_OPTIONS_PRIVATE_DENY_DOS |
NTCREATEX_OPTIONS_PRIVATE_DENY_FCB ) ) & &
( fsp - > access_mask & FILE_WRITE_DATA ) & &
strequal ( fsp - > fsp_name , fname ) ) {
DEBUG ( 10 , ( " fcb_or_dos_open: file match \n " ) ) ;
break ;
}
}
if ( ! fsp ) {
2008-11-21 23:14:53 +03:00
return NT_STATUS_NOT_FOUND ;
2005-07-08 08:51:27 +04:00
}
/* quite an insane set of semantics ... */
if ( is_executable ( fname ) & &
( fsp - > fh - > private_options & NTCREATEX_OPTIONS_PRIVATE_DENY_DOS ) ) {
DEBUG ( 10 , ( " fcb_or_dos_open: file fail due to is_executable. \n " ) ) ;
2008-11-21 23:14:53 +03:00
return NT_STATUS_INVALID_PARAMETER ;
2005-07-08 08:51:27 +04:00
}
/* We need to duplicate this fsp. */
2008-11-21 23:14:53 +03:00
dup_file_fsp ( req , fsp , access_mask , share_access ,
create_options , fsp_to_dup_into ) ;
2005-07-08 08:51:27 +04:00
2008-11-21 23:14:53 +03:00
return NT_STATUS_OK ;
2005-07-08 08:51:27 +04:00
}
/****************************************************************************
Open a file with a share mode - old openX method - map into NTCreate .
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
2007-10-19 04:40:25 +04:00
bool map_open_params_to_ntcreate ( const char * fname , int deny_mode , int open_func ,
2006-07-25 12:51:54 +04:00
uint32 * paccess_mask ,
uint32 * pshare_mode ,
uint32 * pcreate_disposition ,
uint32 * pcreate_options )
2005-07-08 08:51:27 +04:00
{
uint32 access_mask ;
uint32 share_mode ;
uint32 create_disposition ;
2008-12-12 15:47:41 +03:00
uint32 create_options = FILE_NON_DIRECTORY_FILE ;
2005-07-08 08:51:27 +04:00
DEBUG ( 10 , ( " map_open_params_to_ntcreate: fname = %s, deny_mode = 0x%x, "
" open_func = 0x%x \n " ,
fname , ( unsigned int ) deny_mode , ( unsigned int ) open_func ) ) ;
/* Create the NT compatible access_mask. */
switch ( GET_OPENX_MODE ( deny_mode ) ) {
2005-09-10 01:49:16 +04:00
case DOS_OPEN_EXEC : /* Implies read-only - used to be FILE_READ_DATA */
2005-07-08 08:51:27 +04:00
case DOS_OPEN_RDONLY :
access_mask = FILE_GENERIC_READ ;
break ;
case DOS_OPEN_WRONLY :
access_mask = FILE_GENERIC_WRITE ;
break ;
case DOS_OPEN_RDWR :
case DOS_OPEN_FCB :
access_mask = FILE_GENERIC_READ | FILE_GENERIC_WRITE ;
break ;
default :
DEBUG ( 10 , ( " map_open_params_to_ntcreate: bad open mode = 0x%x \n " ,
( unsigned int ) GET_OPENX_MODE ( deny_mode ) ) ) ;
return False ;
}
/* Create the NT compatible create_disposition. */
switch ( open_func ) {
case OPENX_FILE_EXISTS_FAIL | OPENX_FILE_CREATE_IF_NOT_EXIST :
create_disposition = FILE_CREATE ;
break ;
case OPENX_FILE_EXISTS_OPEN :
create_disposition = FILE_OPEN ;
break ;
case OPENX_FILE_EXISTS_OPEN | OPENX_FILE_CREATE_IF_NOT_EXIST :
create_disposition = FILE_OPEN_IF ;
break ;
case OPENX_FILE_EXISTS_TRUNCATE :
create_disposition = FILE_OVERWRITE ;
break ;
case OPENX_FILE_EXISTS_TRUNCATE | OPENX_FILE_CREATE_IF_NOT_EXIST :
create_disposition = FILE_OVERWRITE_IF ;
break ;
default :
/* From samba4 - to be confirmed. */
if ( GET_OPENX_MODE ( deny_mode ) = = DOS_OPEN_EXEC ) {
create_disposition = FILE_CREATE ;
break ;
}
DEBUG ( 10 , ( " map_open_params_to_ntcreate: bad "
" open_func 0x%x \n " , ( unsigned int ) open_func ) ) ;
return False ;
}
/* Create the NT compatible share modes. */
switch ( GET_DENY_MODE ( deny_mode ) ) {
case DENY_ALL :
share_mode = FILE_SHARE_NONE ;
break ;
case DENY_WRITE :
share_mode = FILE_SHARE_READ ;
break ;
case DENY_READ :
share_mode = FILE_SHARE_WRITE ;
break ;
case DENY_NONE :
share_mode = FILE_SHARE_READ | FILE_SHARE_WRITE ;
break ;
case DENY_DOS :
create_options | = NTCREATEX_OPTIONS_PRIVATE_DENY_DOS ;
if ( is_executable ( fname ) ) {
share_mode = FILE_SHARE_READ | FILE_SHARE_WRITE ;
} else {
if ( GET_OPENX_MODE ( deny_mode ) = = DOS_OPEN_RDONLY ) {
share_mode = FILE_SHARE_READ ;
} else {
share_mode = FILE_SHARE_NONE ;
}
}
break ;
case DENY_FCB :
create_options | = NTCREATEX_OPTIONS_PRIVATE_DENY_FCB ;
share_mode = FILE_SHARE_NONE ;
break ;
default :
DEBUG ( 10 , ( " map_open_params_to_ntcreate: bad deny_mode 0x%x \n " ,
( unsigned int ) GET_DENY_MODE ( deny_mode ) ) ) ;
return False ;
}
DEBUG ( 10 , ( " map_open_params_to_ntcreate: file %s, access_mask = 0x%x, "
" share_mode = 0x%x, create_disposition = 0x%x, "
" create_options = 0x%x \n " ,
fname ,
( unsigned int ) access_mask ,
( unsigned int ) share_mode ,
( unsigned int ) create_disposition ,
( unsigned int ) create_options ) ) ;
if ( paccess_mask ) {
* paccess_mask = access_mask ;
}
if ( pshare_mode ) {
* pshare_mode = share_mode ;
}
if ( pcreate_disposition ) {
* pcreate_disposition = create_disposition ;
}
if ( pcreate_options ) {
* pcreate_options = create_options ;
}
return True ;
2002-02-26 08:45:33 +03:00
}
2007-07-05 20:27:47 +04:00
static void schedule_defer_open ( struct share_mode_lock * lck ,
struct timeval request_time ,
2007-08-27 16:04:09 +04:00
struct smb_request * req )
2006-04-19 22:48:14 +04:00
{
struct deferred_open_record state ;
/* This is a relative time, added to the absolute
request_time value to get the absolute timeout time .
Note that if this is the second or greater time we enter
this codepath for this particular request mid then
request_time is left as the absolute time of the * first *
time this request mid was processed . This is what allows
the request to eventually time out . */
struct timeval timeout ;
/* Normally the smbd we asked should respond within
* OPLOCK_BREAK_TIMEOUT seconds regardless of whether
* the client did , give twice the timeout as a safety
* measure here in case the other smbd is stuck
* somewhere else . */
timeout = timeval_set ( OPLOCK_BREAK_TIMEOUT * 2 , 0 ) ;
/* Nothing actually uses state.delayed_for_oplocks
but it ' s handy to differentiate in debug messages
between a 30 second delay due to oplock break , and
a 1 second delay for share mode conflicts . */
state . delayed_for_oplocks = True ;
2007-05-29 13:30:34 +04:00
state . id = lck - > id ;
2006-04-19 22:48:14 +04:00
if ( ! request_timed_out ( request_time , timeout ) ) {
2007-08-27 16:04:09 +04:00
defer_open ( lck , request_time , timeout , req , & state ) ;
2006-04-19 22:48:14 +04:00
}
}
2008-11-04 10:18:43 +03:00
/****************************************************************************
Work out what access_mask to use from what the client sent us .
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
static NTSTATUS calculate_access_mask ( connection_struct * conn ,
const char * fname ,
bool file_existed ,
uint32_t access_mask ,
uint32_t * access_mask_out )
{
NTSTATUS status ;
/*
* Convert GENERIC bits to specific bits .
*/
se_map_generic ( & access_mask , & file_generic_mapping ) ;
/* Calculate MAXIMUM_ALLOWED_ACCESS if requested. */
if ( access_mask & MAXIMUM_ALLOWED_ACCESS ) {
if ( file_existed ) {
2008-11-04 12:34:08 +03:00
2008-11-04 10:18:43 +03:00
struct security_descriptor * sd ;
uint32_t access_granted = 0 ;
status = SMB_VFS_GET_NT_ACL ( conn , fname ,
( OWNER_SECURITY_INFORMATION |
GROUP_SECURITY_INFORMATION |
DACL_SECURITY_INFORMATION ) , & sd ) ;
if ( ! NT_STATUS_IS_OK ( status ) ) {
DEBUG ( 10 , ( " calculate_access_mask: Could not get acl "
" on file %s: %s \n " ,
fname ,
nt_errstr ( status ) ) ) ;
return NT_STATUS_ACCESS_DENIED ;
}
2008-11-04 12:34:08 +03:00
status = smb1_file_se_access_check ( sd ,
conn - > server_info - > ptok ,
access_mask ,
& access_granted ) ;
2008-11-04 10:18:43 +03:00
TALLOC_FREE ( sd ) ;
if ( ! NT_STATUS_IS_OK ( status ) ) {
DEBUG ( 10 , ( " calculate_access_mask: Access denied on "
" file %s: when calculating maximum access \n " ,
fname ) ) ;
return NT_STATUS_ACCESS_DENIED ;
}
access_mask = access_granted ;
} else {
access_mask = FILE_GENERIC_ALL ;
}
}
* access_mask_out = access_mask ;
return NT_STATUS_OK ;
}
2002-02-26 08:45:33 +03:00
/****************************************************************************
2008-11-21 23:14:53 +03:00
Open a file with a share mode . Passed in an already created files_struct * .
2002-02-26 08:45:33 +03:00
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
2003-01-08 05:09:18 +03:00
2008-11-23 06:40:09 +03:00
static NTSTATUS open_file_ntcreate ( connection_struct * conn ,
2007-07-05 20:26:27 +04:00
struct smb_request * req ,
2006-07-25 12:51:54 +04:00
const char * fname ,
SMB_STRUCT_STAT * psbuf ,
uint32 access_mask , /* access bits (FILE_READ_DATA etc.) */
uint32 share_access , /* share constants (FILE_SHARE_READ etc) */
uint32 create_disposition , /* FILE_OPEN_IF etc. */
uint32 create_options , /* options such as delete on close. */
uint32 new_dos_attributes , /* attributes used for new file. */
int oplock_request , /* internal Samba oplock codes. */
/* Information (FILE_EXISTS etc.) */
int * pinfo ,
2008-11-21 23:14:53 +03:00
files_struct * fsp )
1998-08-17 17:11:34 +04:00
{
2000-04-22 04:33:16 +04:00
int flags = 0 ;
int flags2 = 0 ;
2007-10-19 04:40:25 +04:00
bool file_existed = VALID_STAT ( * psbuf ) ;
bool def_acl = False ;
bool posix_open = False ;
bool new_file_created = False ;
2009-01-09 22:07:45 +03:00
bool clear_ads = false ;
2007-05-29 13:30:34 +04:00
struct file_id id ;
2006-07-11 22:01:26 +04:00
NTSTATUS fsp_open = NT_STATUS_ACCESS_DENIED ;
2005-07-08 08:51:27 +04:00
mode_t new_unx_mode = ( mode_t ) 0 ;
mode_t unx_mode = ( mode_t ) 0 ;
int info ;
uint32 existing_dos_attributes = 0 ;
2004-06-08 20:14:31 +04:00
struct pending_message_list * pml = NULL ;
2005-09-30 21:13:37 +04:00
struct timeval request_time = timeval_zero ( ) ;
struct share_mode_lock * lck = NULL ;
2006-07-19 22:34:19 +04:00
uint32 open_access_mask = access_mask ;
2005-09-30 21:13:37 +04:00
NTSTATUS status ;
2006-11-09 23:29:31 +03:00
int ret_flock ;
2006-12-29 00:50:31 +03:00
char * parent_dir ;
const char * newname ;
2005-07-08 08:51:27 +04:00
2007-05-29 13:30:34 +04:00
ZERO_STRUCT ( id ) ;
2005-07-08 08:51:27 +04:00
if ( conn - > printer ) {
2008-11-21 23:14:53 +03:00
/*
2005-07-08 08:51:27 +04:00
* Printers are handled completely differently .
* Most of the passed parameters are ignored .
*/
if ( pinfo ) {
* pinfo = FILE_WAS_CREATED ;
}
DEBUG ( 10 , ( " open_file_ntcreate: printer open fname=%s \n " , fname ) ) ;
2008-12-31 00:49:01 +03:00
return print_fsp_open ( req , conn , fname , req - > vuid , fsp , psbuf ) ;
2005-07-08 08:51:27 +04:00
}
2008-12-24 15:51:47 +03:00
if ( ! parent_dirname ( talloc_tos ( ) , fname , & parent_dir , & newname ) ) {
2006-12-27 13:57:59 +03:00
return NT_STATUS_NO_MEMORY ;
}
2007-02-07 00:05:34 +03:00
if ( new_dos_attributes & FILE_FLAG_POSIX_SEMANTICS ) {
posix_open = True ;
unx_mode = ( mode_t ) ( new_dos_attributes & ~ FILE_FLAG_POSIX_SEMANTICS ) ;
new_dos_attributes = 0 ;
} else {
/* We add aARCH to this as this mode is only used if the file is
* created new . */
unx_mode = unix_mode ( conn , new_dos_attributes | aARCH , fname ,
parent_dir ) ;
}
2005-07-08 08:51:27 +04:00
DEBUG ( 10 , ( " open_file_ntcreate: fname=%s, dos_attrs=0x%x "
" access_mask=0x%x share_access=0x%x "
" create_disposition = 0x%x create_options=0x%x "
" unix mode=0%o oplock_request=%d \n " ,
fname , new_dos_attributes , access_mask , share_access ,
create_disposition , create_options , unx_mode ,
oplock_request ) ) ;
2000-04-22 04:33:16 +04:00
2007-07-05 20:26:27 +04:00
if ( ( req = = NULL ) & & ( ( oplock_request & INTERNAL_OPEN_ONLY ) = = 0 ) ) {
DEBUG ( 0 , ( " No smb request but not an internal only open! \n " ) ) ;
return NT_STATUS_INTERNAL_ERROR ;
}
/*
* Only non - internal opens can be deferred at all
*/
if ( ( req ! = NULL )
& & ( ( pml = get_open_deferred_message ( req - > mid ) ) ! = NULL ) ) {
2005-09-30 21:13:37 +04:00
struct deferred_open_record * state =
( struct deferred_open_record * ) pml - > private_data . data ;
2004-06-08 20:14:31 +04:00
2006-03-21 02:40:43 +03:00
/* Remember the absolute time of the original
request with this mid . We ' ll use it later to
see if this has timed out . */
2005-09-30 21:13:37 +04:00
request_time = pml - > request_time ;
2004-06-08 20:14:31 +04:00
2006-03-21 02:40:43 +03:00
/* Remove the deferred open entry under lock. */
2008-03-12 17:32:47 +03:00
lck = get_share_mode_lock ( talloc_tos ( ) , state - > id , NULL , NULL ,
NULL ) ;
2005-09-30 21:13:37 +04:00
if ( lck = = NULL ) {
DEBUG ( 0 , ( " could not get share mode lock \n " ) ) ;
} else {
2007-07-05 20:26:27 +04:00
del_deferred_open_entry ( lck , req - > mid ) ;
2006-02-26 17:20:29 +03:00
TALLOC_FREE ( lck ) ;
2004-06-08 20:14:31 +04:00
}
2005-09-30 21:13:37 +04:00
2004-06-08 20:14:31 +04:00
/* Ensure we don't reprocess this message. */
2007-07-05 20:26:27 +04:00
remove_deferred_open_smb_message ( req - > mid ) ;
2000-04-22 04:33:16 +04:00
}
1998-08-17 17:11:34 +04:00
2007-01-17 05:44:27 +03:00
status = check_name ( conn , fname ) ;
if ( ! NT_STATUS_IS_OK ( status ) ) {
return status ;
2008-11-21 23:14:53 +03:00
}
2000-04-22 04:33:16 +04:00
2007-02-07 00:05:34 +03:00
if ( ! posix_open ) {
new_dos_attributes & = SAMBA_ATTRIBUTES_MASK ;
if ( file_existed ) {
existing_dos_attributes = dos_mode ( conn , fname , psbuf ) ;
}
2004-04-02 22:46:19 +04:00
}
2000-04-22 04:33:16 +04:00
/* ignore any oplock requests if oplocks are disabled */
2005-09-30 21:13:37 +04:00
if ( ! lp_oplocks ( SNUM ( conn ) ) | | global_client_failed_oplock_break | |
IS_VETO_OPLOCK_PATH ( conn , fname ) ) {
2006-05-30 22:17:37 +04:00
/* Mask off everything except the private Samba bits. */
oplock_request & = SAMBA_PRIVATE_OPLOCK_MASK ;
2000-04-22 04:33:16 +04:00
}
2005-03-17 17:32:52 +03:00
/* this is for OS/2 long file names - say we don't support them */
2005-07-08 08:51:27 +04:00
if ( ! lp_posix_pathnames ( ) & & strstr ( fname , " .+,;=[]. " ) ) {
/* OS/2 Workplace shell fix may be main code stream in a later
2006-12-27 13:57:59 +03:00
* release . */
2005-07-08 08:51:27 +04:00
DEBUG ( 5 , ( " open_file_ntcreate: OS/2 long filenames are not "
" supported. \n " ) ) ;
2006-07-11 22:01:26 +04:00
if ( use_nt_status ( ) ) {
return NT_STATUS_OBJECT_NAME_NOT_FOUND ;
}
return NT_STATUS_DOS ( ERRDOS , ERRcannotopen ) ;
2000-04-22 04:33:16 +04:00
}
1998-08-17 17:11:34 +04:00
2005-07-08 08:51:27 +04:00
switch ( create_disposition ) {
/*
* Currently we ' re using FILE_SUPERSEDE as the same as
* FILE_OVERWRITE_IF but they really are
* different . FILE_SUPERSEDE deletes an existing file
* ( requiring delete access ) then recreates it .
*/
case FILE_SUPERSEDE :
/* If file exists replace/overwrite. If file doesn't
* exist create . */
flags2 | = ( O_CREAT | O_TRUNC ) ;
2009-01-09 22:07:45 +03:00
clear_ads = true ;
2005-07-08 08:51:27 +04:00
break ;
2000-04-22 04:33:16 +04:00
2005-07-08 08:51:27 +04:00
case FILE_OVERWRITE_IF :
/* If file exists replace/overwrite. If file doesn't
* exist create . */
flags2 | = ( O_CREAT | O_TRUNC ) ;
2009-01-09 22:07:45 +03:00
clear_ads = true ;
2005-07-08 08:51:27 +04:00
break ;
2000-04-22 04:33:16 +04:00
2005-07-08 08:51:27 +04:00
case FILE_OPEN :
/* If file exists open. If file doesn't exist error. */
if ( ! file_existed ) {
DEBUG ( 5 , ( " open_file_ntcreate: FILE_OPEN "
" requested for file %s and file "
" doesn't exist. \n " , fname ) ) ;
errno = ENOENT ;
2006-07-11 22:01:26 +04:00
return NT_STATUS_OBJECT_NAME_NOT_FOUND ;
2005-07-08 08:51:27 +04:00
}
break ;
case FILE_OVERWRITE :
/* If file exists overwrite. If file doesn't exist
* error . */
if ( ! file_existed ) {
DEBUG ( 5 , ( " open_file_ntcreate: FILE_OVERWRITE "
" requested for file %s and file "
" doesn't exist. \n " , fname ) ) ;
errno = ENOENT ;
2006-07-11 22:01:26 +04:00
return NT_STATUS_OBJECT_NAME_NOT_FOUND ;
2005-07-08 08:51:27 +04:00
}
flags2 | = O_TRUNC ;
2009-01-09 22:07:45 +03:00
clear_ads = true ;
2005-07-08 08:51:27 +04:00
break ;
case FILE_CREATE :
/* If file exists error. If file doesn't exist
* create . */
if ( file_existed ) {
DEBUG ( 5 , ( " open_file_ntcreate: FILE_CREATE "
" requested for file %s and file "
" already exists. \n " , fname ) ) ;
if ( S_ISDIR ( psbuf - > st_mode ) ) {
errno = EISDIR ;
} else {
errno = EEXIST ;
}
2006-07-11 22:01:26 +04:00
return map_nt_error_from_unix ( errno ) ;
2005-07-08 08:51:27 +04:00
}
flags2 | = ( O_CREAT | O_EXCL ) ;
break ;
case FILE_OPEN_IF :
/* If file exists open. If file doesn't exist
* create . */
flags2 | = O_CREAT ;
break ;
default :
2006-07-11 22:01:26 +04:00
return NT_STATUS_INVALID_PARAMETER ;
2005-07-08 08:51:27 +04:00
}
/* We only care about matching attributes on file exists and
* overwrite . */
2007-02-07 00:05:34 +03:00
if ( ! posix_open & & file_existed & & ( ( create_disposition = = FILE_OVERWRITE ) | |
2005-07-08 08:51:27 +04:00
( create_disposition = = FILE_OVERWRITE_IF ) ) ) {
if ( ! open_match_attributes ( conn , fname ,
existing_dos_attributes ,
new_dos_attributes , psbuf - > st_mode ,
unx_mode , & new_unx_mode ) ) {
DEBUG ( 5 , ( " open_file_ntcreate: attributes missmatch "
" for file %s (%x %x) (0%o, 0%o) \n " ,
fname , existing_dos_attributes ,
new_dos_attributes ,
( unsigned int ) psbuf - > st_mode ,
( unsigned int ) unx_mode ) ) ;
2002-09-25 19:19:00 +04:00
errno = EACCES ;
2006-07-11 22:01:26 +04:00
return NT_STATUS_ACCESS_DENIED ;
2002-09-25 19:19:00 +04:00
}
}
2008-11-04 10:18:43 +03:00
status = calculate_access_mask ( conn , fname , file_existed ,
access_mask ,
& access_mask ) ;
if ( ! NT_STATUS_IS_OK ( status ) ) {
DEBUG ( 10 , ( " open_file_ntcreate: calculate_access_mask "
" on file %s returned %s \n " ,
fname ,
nt_errstr ( status ) ) ) ;
return status ;
2008-11-01 04:04:53 +03:00
}
2006-07-26 05:53:23 +04:00
open_access_mask = access_mask ;
2005-07-08 08:51:27 +04:00
2008-03-11 22:37:01 +03:00
if ( ( flags2 & O_TRUNC ) | | ( oplock_request & FORCE_OPLOCK_BREAK_TO_NONE ) ) {
2006-07-26 06:15:01 +04:00
open_access_mask | = FILE_WRITE_DATA ; /* This will cause oplock breaks. */
}
2005-07-08 08:51:27 +04:00
DEBUG ( 10 , ( " open_file_ntcreate: fname=%s, after mapping "
" access_mask=0x%x \n " , fname , access_mask ) ) ;
/*
* Note that we ignore the append flag as append does not
* mean the same thing under DOS and Unix .
*/
2008-03-11 22:37:01 +03:00
if ( ( access_mask & ( FILE_WRITE_DATA | FILE_APPEND_DATA ) ) | |
( oplock_request & FORCE_OPLOCK_BREAK_TO_NONE ) ) {
2006-12-02 02:46:07 +03:00
/* DENY_DOS opens are always underlying read-write on the
file handle , no matter what the requested access mask
says . */
if ( ( create_options & NTCREATEX_OPTIONS_PRIVATE_DENY_DOS ) | |
access_mask & ( FILE_READ_ATTRIBUTES | FILE_READ_DATA | FILE_READ_EA | FILE_EXECUTE ) ) {
flags = O_RDWR ;
} else {
flags = O_WRONLY ;
}
2005-07-08 08:51:27 +04:00
} else {
flags = O_RDONLY ;
2000-04-22 04:33:16 +04:00
}
1998-08-17 17:11:34 +04:00
2005-07-08 08:51:27 +04:00
/*
* Currently we only look at FILE_WRITE_THROUGH for create options .
*/
1998-08-17 17:11:34 +04:00
# if defined(O_SYNC)
2006-05-03 07:42:56 +04:00
if ( ( create_options & FILE_WRITE_THROUGH ) & & lp_strict_sync ( SNUM ( conn ) ) ) {
2000-04-22 04:33:16 +04:00
flags2 | = O_SYNC ;
}
1998-08-17 17:11:34 +04:00
# endif /* O_SYNC */
2008-11-21 23:14:53 +03:00
2008-01-05 10:17:38 +03:00
if ( posix_open & & ( access_mask & FILE_APPEND_DATA ) ) {
2007-02-07 00:05:34 +03:00
flags2 | = O_APPEND ;
}
if ( ! posix_open & & ! CAN_WRITE ( conn ) ) {
2005-07-08 08:51:27 +04:00
/*
* We should really return a permission denied error if either
* O_CREAT or O_TRUNC are set , but for compatibility with
* older versions of Samba we just AND them out .
*/
flags2 & = ~ ( O_CREAT | O_TRUNC ) ;
2000-04-22 04:33:16 +04:00
}
1998-08-17 17:11:34 +04:00
2005-07-08 08:51:27 +04:00
/*
* Ensure we can ' t write on a read - only share or file .
*/
1998-08-17 17:11:34 +04:00
2005-07-08 08:51:27 +04:00
if ( flags ! = O_RDONLY & & file_existed & &
( ! CAN_WRITE ( conn ) | | IS_DOS_READONLY ( existing_dos_attributes ) ) ) {
DEBUG ( 5 , ( " open_file_ntcreate: write access requested for "
" file %s on read only %s \n " ,
fname , ! CAN_WRITE ( conn ) ? " share " : " file " ) ) ;
errno = EACCES ;
2006-07-11 22:01:26 +04:00
return NT_STATUS_ACCESS_DENIED ;
2004-05-30 11:21:50 +04:00
}
2007-08-02 12:53:24 +04:00
fsp - > file_id = vfs_file_id_from_sbuf ( conn , psbuf ) ;
2005-09-30 21:13:37 +04:00
fsp - > share_access = share_access ;
fsp - > fh - > private_options = create_options ;
2006-07-25 12:40:04 +04:00
fsp - > access_mask = open_access_mask ; /* We change this to the
* requested access_mask after
* the open is done . */
2007-02-07 00:05:34 +03:00
fsp - > posix_open = posix_open ;
2006-05-30 22:17:37 +04:00
/* Ensure no SAMBA_PRIVATE bits can be set. */
fsp - > oplock_type = ( oplock_request & ~ SAMBA_PRIVATE_OPLOCK_MASK ) ;
2005-09-30 21:13:37 +04:00
if ( timeval_is_zero ( & request_time ) ) {
request_time = fsp - > open_time ;
}
2000-04-22 04:33:16 +04:00
if ( file_existed ) {
2008-03-12 17:32:47 +03:00
struct timespec old_write_time = get_mtimespec ( psbuf ) ;
2007-08-02 12:53:24 +04:00
id = vfs_file_id_from_sbuf ( conn , psbuf ) ;
1998-08-17 17:11:34 +04:00
2008-01-06 16:21:25 +03:00
lck = get_share_mode_lock ( talloc_tos ( ) , id ,
2006-07-25 12:40:04 +04:00
conn - > connectpath ,
2008-03-12 17:32:47 +03:00
fname , & old_write_time ) ;
2005-09-30 21:13:37 +04:00
if ( lck = = NULL ) {
DEBUG ( 0 , ( " Could not get share mode lock \n " ) ) ;
2006-07-11 22:01:26 +04:00
return NT_STATUS_SHARING_VIOLATION ;
2005-09-30 21:13:37 +04:00
}
2006-04-19 22:48:14 +04:00
/* First pass - send break only on batch oplocks. */
2007-07-05 20:27:47 +04:00
if ( ( req ! = NULL )
& & delay_for_oplocks ( lck , fsp , req - > mid , 1 ,
oplock_request ) ) {
2007-08-27 16:04:09 +04:00
schedule_defer_open ( lck , request_time , req ) ;
2006-02-20 20:59:58 +03:00
TALLOC_FREE ( lck ) ;
2006-07-11 22:01:26 +04:00
return NT_STATUS_SHARING_VIOLATION ;
2005-09-30 21:13:37 +04:00
}
2006-07-25 12:40:04 +04:00
/* Use the client requested access mask here, not the one we
* open with . */
2005-09-30 21:13:37 +04:00
status = open_mode_check ( conn , fname , lck ,
access_mask , share_access ,
create_options , & file_existed ) ;
2006-04-19 22:48:14 +04:00
if ( NT_STATUS_IS_OK ( status ) ) {
2006-07-25 12:40:04 +04:00
/* We might be going to allow this open. Check oplock
* status again . */
/* Second pass - send break for both batch or
* exclusive oplocks . */
2007-07-05 20:27:47 +04:00
if ( ( req ! = NULL )
& & delay_for_oplocks ( lck , fsp , req - > mid , 2 ,
oplock_request ) ) {
2007-08-27 16:04:09 +04:00
schedule_defer_open ( lck , request_time , req ) ;
2006-04-19 22:48:14 +04:00
TALLOC_FREE ( lck ) ;
2006-07-11 22:01:26 +04:00
return NT_STATUS_SHARING_VIOLATION ;
2006-04-19 22:48:14 +04:00
}
}
2005-09-30 21:13:37 +04:00
if ( NT_STATUS_EQUAL ( status , NT_STATUS_DELETE_PENDING ) ) {
/* DELETE_PENDING is not deferred for a second */
2006-02-20 20:59:58 +03:00
TALLOC_FREE ( lck ) ;
2006-07-11 22:01:26 +04:00
return status ;
2005-09-30 21:13:37 +04:00
}
if ( ! NT_STATUS_IS_OK ( status ) ) {
2006-07-19 04:13:28 +04:00
uint32 can_access_mask ;
2007-10-19 04:40:25 +04:00
bool can_access = True ;
2005-09-30 21:13:37 +04:00
SMB_ASSERT ( NT_STATUS_EQUAL ( status , NT_STATUS_SHARING_VIOLATION ) ) ;
/* Check if this can be done with the deny_dos and fcb
* calls . */
if ( create_options &
( NTCREATEX_OPTIONS_PRIVATE_DENY_DOS |
NTCREATEX_OPTIONS_PRIVATE_DENY_FCB ) ) {
2007-07-05 20:26:27 +04:00
if ( req = = NULL ) {
DEBUG ( 0 , ( " DOS open without an SMB "
" request! \n " ) ) ;
TALLOC_FREE ( lck ) ;
return NT_STATUS_INTERNAL_ERROR ;
}
2006-07-25 12:40:04 +04:00
/* Use the client requested access mask here,
* not the one we open with . */
2008-11-21 23:14:53 +03:00
status = fcb_or_dos_open ( req ,
conn ,
fsp ,
fname ,
id ,
req - > smbpid ,
req - > vuid ,
access_mask ,
share_access ,
create_options ) ;
2008-11-22 02:42:03 +03:00
if ( NT_STATUS_IS_OK ( status ) ) {
2006-02-20 20:59:58 +03:00
TALLOC_FREE ( lck ) ;
2005-09-30 21:13:37 +04:00
if ( pinfo ) {
* pinfo = FILE_WAS_OPENED ;
2005-07-08 08:51:27 +04:00
}
2006-07-11 22:01:26 +04:00
return NT_STATUS_OK ;
2005-07-08 08:51:27 +04:00
}
}
2000-12-12 00:09:48 +03:00
/*
2005-07-08 08:51:27 +04:00
* This next line is a subtlety we need for
* MS - Access . If a file open will fail due to share
* permissions and also for security ( access ) reasons ,
* we need to return the access failed error , not the
2006-07-19 04:13:28 +04:00
* share error . We can ' t open the file due to kernel
* oplock deadlock ( it ' s possible we failed above on
* the open_mode_check ( ) ) so use a userspace check .
2000-12-12 00:09:48 +03:00
*/
2006-07-19 04:13:28 +04:00
if ( flags & O_RDWR ) {
can_access_mask = FILE_READ_DATA | FILE_WRITE_DATA ;
2006-12-02 02:46:07 +03:00
} else if ( flags & O_WRONLY ) {
can_access_mask = FILE_WRITE_DATA ;
2006-07-19 04:13:28 +04:00
} else {
can_access_mask = FILE_READ_DATA ;
}
2006-12-02 02:46:07 +03:00
if ( ( ( can_access_mask & FILE_WRITE_DATA ) & & ! CAN_WRITE ( conn ) ) | |
2008-05-03 04:22:10 +04:00
! can_access_file_data ( conn , fname , psbuf , can_access_mask ) ) {
2006-07-19 04:13:28 +04:00
can_access = False ;
2003-02-12 04:13:35 +03:00
}
2008-11-21 23:14:53 +03:00
/*
2005-07-08 08:51:27 +04:00
* If we ' re returning a share violation , ensure we
* cope with the braindead 1 second delay .
2004-06-08 20:14:31 +04:00
*/
2006-05-30 22:17:37 +04:00
if ( ! ( oplock_request & INTERNAL_OPEN_ONLY ) & &
2005-09-30 21:13:37 +04:00
lp_defer_sharing_violations ( ) ) {
struct timeval timeout ;
struct deferred_open_record state ;
2006-04-03 14:43:34 +04:00
int timeout_usecs ;
/* this is a hack to speed up torture tests
in ' make test ' */
2006-07-11 22:01:26 +04:00
timeout_usecs = lp_parm_int ( SNUM ( conn ) ,
2006-04-03 14:43:34 +04:00
" smbd " , " sharedelay " ,
SHARING_VIOLATION_USEC_WAIT ) ;
2005-09-30 21:13:37 +04:00
2006-03-21 02:40:43 +03:00
/* This is a relative time, added to the absolute
request_time value to get the absolute timeout time .
Note that if this is the second or greater time we enter
this codepath for this particular request mid then
request_time is left as the absolute time of the * first *
time this request mid was processed . This is what allows
the request to eventually time out . */
2006-04-03 14:43:34 +04:00
timeout = timeval_set ( 0 , timeout_usecs ) ;
2005-09-30 21:13:37 +04:00
2006-03-21 02:40:43 +03:00
/* Nothing actually uses state.delayed_for_oplocks
but it ' s handy to differentiate in debug messages
between a 30 second delay due to oplock break , and
a 1 second delay for share mode conflicts . */
2005-09-30 21:13:37 +04:00
state . delayed_for_oplocks = False ;
2007-05-29 13:30:34 +04:00
state . id = id ;
2005-09-30 21:13:37 +04:00
2007-07-05 20:27:47 +04:00
if ( ( req ! = NULL )
& & ! request_timed_out ( request_time ,
timeout ) ) {
2005-09-30 21:13:37 +04:00
defer_open ( lck , request_time , timeout ,
2007-08-27 16:04:09 +04:00
req , & state ) ;
2005-04-02 03:11:28 +04:00
}
2004-06-08 20:14:31 +04:00
}
2006-02-20 20:59:58 +03:00
TALLOC_FREE ( lck ) ;
2006-07-19 04:13:28 +04:00
if ( can_access ) {
2004-06-08 20:14:31 +04:00
/*
* We have detected a sharing violation here
* so return the correct error code
*/
2006-07-11 22:01:26 +04:00
status = NT_STATUS_SHARING_VIOLATION ;
2006-07-19 04:13:28 +04:00
} else {
status = NT_STATUS_ACCESS_DENIED ;
2004-06-08 20:14:31 +04:00
}
2006-07-11 22:01:26 +04:00
return status ;
2000-04-22 04:33:16 +04:00
}
1998-08-17 17:11:34 +04:00
2000-04-22 04:33:16 +04:00
/*
* We exit this block with the share entry * locked * . . . . .
*/
}
1998-08-17 17:11:34 +04:00
2005-09-30 21:13:37 +04:00
SMB_ASSERT ( ! file_existed | | ( lck ! = NULL ) ) ;
2002-03-12 00:57:12 +03:00
/*
* Ensure we pay attention to default ACLs on directories if required .
*/
if ( ( flags2 & O_CREAT ) & & lp_inherit_acls ( SNUM ( conn ) ) & &
2006-12-27 13:57:59 +03:00
( def_acl = directory_has_default_acl ( conn , parent_dir ) ) ) {
2005-07-08 08:51:27 +04:00
unx_mode = 0777 ;
}
2002-03-12 00:57:12 +03:00
2006-07-26 05:53:23 +04:00
DEBUG ( 4 , ( " calling open_file with flags=0x%X flags2=0x%X mode=0%o, "
" access_mask = 0x%x, open_access_mask = 0x%x \n " ,
2005-09-30 21:13:37 +04:00
( unsigned int ) flags , ( unsigned int ) flags2 ,
2006-07-26 05:53:23 +04:00
( unsigned int ) unx_mode , ( unsigned int ) access_mask ,
( unsigned int ) open_access_mask ) ) ;
1999-12-13 16:27:58 +03:00
2001-04-16 04:34:03 +04:00
/*
* open_file strips any O_TRUNC flags itself .
*/
2007-07-05 20:26:27 +04:00
fsp_open = open_file ( fsp , conn , req , parent_dir , newname , fname , psbuf ,
2006-12-31 13:16:03 +03:00
flags | flags2 , unx_mode , access_mask ,
open_access_mask ) ;
1998-08-17 17:11:34 +04:00
2006-07-11 22:01:26 +04:00
if ( ! NT_STATUS_IS_OK ( fsp_open ) ) {
2006-07-19 22:34:19 +04:00
if ( lck ! = NULL ) {
TALLOC_FREE ( lck ) ;
}
2006-07-11 22:01:26 +04:00
return fsp_open ;
2000-04-22 04:33:16 +04:00
}
1998-08-17 17:11:34 +04:00
2006-07-19 22:34:19 +04:00
if ( ! file_existed ) {
2008-03-12 17:32:47 +03:00
struct timespec old_write_time = get_mtimespec ( psbuf ) ;
2006-07-19 22:34:19 +04:00
/*
* Deal with the race condition where two smbd ' s detect the
* file doesn ' t exist and do the create at the same time . One
* of them will win and set a share mode , the other ( ie . this
* one ) should check if the requested share mode for this
* create is allowed .
*/
2005-09-30 21:13:37 +04:00
2006-07-19 22:34:19 +04:00
/*
* Now the file exists and fsp is successfully opened ,
* fsp - > dev and fsp - > inode are valid and should replace the
* dev = 0 , inode = 0 from a non existent file . Spotted by
* Nadav Danieli < nadavd @ exanet . com > . JRA .
*/
2006-07-19 05:30:30 +04:00
2007-05-29 13:30:34 +04:00
id = fsp - > file_id ;
2006-07-19 05:30:30 +04:00
2008-01-06 16:21:25 +03:00
lck = get_share_mode_lock ( talloc_tos ( ) , id ,
2006-07-25 12:40:04 +04:00
conn - > connectpath ,
2008-03-12 17:32:47 +03:00
fname , & old_write_time ) ;
2001-07-06 03:37:09 +04:00
2006-07-19 22:34:19 +04:00
if ( lck = = NULL ) {
2006-07-25 12:40:04 +04:00
DEBUG ( 0 , ( " open_file_ntcreate: Could not get share "
" mode lock for %s \n " , fname ) ) ;
2007-12-22 04:01:26 +03:00
fd_close ( fsp ) ;
2006-07-19 05:30:30 +04:00
return NT_STATUS_SHARING_VIOLATION ;
}
2007-05-26 05:19:51 +04:00
/* First pass - send break only on batch oplocks. */
2007-07-05 20:27:47 +04:00
if ( ( req ! = NULL )
& & delay_for_oplocks ( lck , fsp , req - > mid , 1 ,
oplock_request ) ) {
2007-08-27 16:04:09 +04:00
schedule_defer_open ( lck , request_time , req ) ;
2007-05-26 05:19:51 +04:00
TALLOC_FREE ( lck ) ;
2007-12-22 04:01:26 +03:00
fd_close ( fsp ) ;
2007-05-26 05:19:51 +04:00
return NT_STATUS_SHARING_VIOLATION ;
}
2006-07-19 22:34:19 +04:00
status = open_mode_check ( conn , fname , lck ,
access_mask , share_access ,
create_options , & file_existed ) ;
2007-05-26 05:26:09 +04:00
if ( NT_STATUS_IS_OK ( status ) ) {
/* We might be going to allow this open. Check oplock
* status again . */
/* Second pass - send break for both batch or
* exclusive oplocks . */
2007-07-05 20:27:47 +04:00
if ( ( req ! = NULL )
& & delay_for_oplocks ( lck , fsp , req - > mid , 2 ,
oplock_request ) ) {
2007-08-27 16:04:09 +04:00
schedule_defer_open ( lck , request_time , req ) ;
2007-05-26 05:26:09 +04:00
TALLOC_FREE ( lck ) ;
2007-12-22 04:01:26 +03:00
fd_close ( fsp ) ;
2007-05-26 05:26:09 +04:00
return NT_STATUS_SHARING_VIOLATION ;
}
}
2006-07-19 22:34:19 +04:00
if ( ! NT_STATUS_IS_OK ( status ) ) {
struct deferred_open_record state ;
2005-09-30 21:13:37 +04:00
2007-12-22 04:01:26 +03:00
fd_close ( fsp ) ;
2005-09-30 21:13:37 +04:00
2006-07-19 22:34:19 +04:00
state . delayed_for_oplocks = False ;
2007-05-29 13:30:34 +04:00
state . id = id ;
2005-09-30 21:13:37 +04:00
2006-07-19 22:34:19 +04:00
/* Do it all over again immediately. In the second
* round we will find that the file existed and handle
* the DELETE_PENDING and FCB cases correctly . No need
* to duplicate the code here . Essentially this is a
* " goto top of this function " , but don ' t tell
* anybody . . . */
2007-07-05 20:27:47 +04:00
if ( req ! = NULL ) {
defer_open ( lck , request_time , timeval_zero ( ) ,
2007-08-27 16:04:09 +04:00
req , & state ) ;
2007-07-05 20:27:47 +04:00
}
2006-07-19 22:34:19 +04:00
TALLOC_FREE ( lck ) ;
return status ;
}
/*
* We exit this block with the share entry * locked * . . . . .
*/
2001-07-06 03:37:09 +04:00
2000-04-22 04:33:16 +04:00
}
1999-12-13 16:27:58 +03:00
2006-07-19 22:34:19 +04:00
SMB_ASSERT ( lck ! = NULL ) ;
2009-01-09 22:07:45 +03:00
/* Delete streams if create_disposition requires it */
2009-02-19 10:10:41 +03:00
if ( file_existed & & clear_ads & & ! is_ntfs_stream_name ( fname ) ) {
2009-01-09 22:07:45 +03:00
status = delete_all_streams ( conn , fname ) ;
if ( ! NT_STATUS_IS_OK ( status ) ) {
TALLOC_FREE ( lck ) ;
fd_close ( fsp ) ;
return status ;
}
}
2000-12-12 00:09:48 +03:00
/* note that we ignore failure for the following. It is
basically a hack for NFS , and NFS will never set one of
these only read them . Nobody but Samba can ever set a deny
mode and we have already checked our more authoritative
locking database for permission to set this deny mode . If
2006-11-09 23:29:31 +03:00
the kernel refuses the operations then the kernel is wrong .
note that GPFS supports it as well - jmcd */
2008-01-11 23:53:29 +03:00
if ( fsp - > fh - > fd ! = - 1 ) {
ret_flock = SMB_VFS_KERNEL_FLOCK ( fsp , share_access ) ;
if ( ret_flock = = - 1 ) {
2005-07-08 08:51:27 +04:00
2008-01-11 23:53:29 +03:00
TALLOC_FREE ( lck ) ;
fd_close ( fsp ) ;
return NT_STATUS_SHARING_VIOLATION ;
}
2006-11-09 23:29:31 +03:00
}
2000-12-12 00:09:48 +03:00
2000-04-22 04:33:16 +04:00
/*
* At this point onwards , we can guarentee that the share entry
* is locked , whether we created the file or not , and that the
* deny mode is compatible with all current opens .
*/
1998-08-17 17:11:34 +04:00
2000-04-22 04:33:16 +04:00
/*
* If requested , truncate the file .
*/
1998-08-17 17:11:34 +04:00
2000-10-19 06:58:24 +04:00
if ( flags2 & O_TRUNC ) {
/*
2005-07-08 08:51:27 +04:00
* We are modifing the file after open - update the stat
* struct . .
2000-10-19 06:58:24 +04:00
*/
2008-01-07 17:55:09 +03:00
if ( ( SMB_VFS_FTRUNCATE ( fsp , 0 ) = = - 1 ) | |
2008-01-07 15:21:26 +03:00
( SMB_VFS_FSTAT ( fsp , psbuf ) = = - 1 ) ) {
2006-07-11 22:01:26 +04:00
status = map_nt_error_from_unix ( errno ) ;
2006-02-20 20:59:58 +03:00
TALLOC_FREE ( lck ) ;
2007-12-22 04:01:26 +03:00
fd_close ( fsp ) ;
2006-07-11 22:01:26 +04:00
return status ;
2000-10-19 06:58:24 +04:00
}
2000-04-22 04:33:16 +04:00
}
1998-08-17 17:11:34 +04:00
2005-07-08 08:51:27 +04:00
/* Record the options we were opened with. */
fsp - > share_access = share_access ;
fsp - > fh - > private_options = create_options ;
2008-11-04 09:42:53 +03:00
/*
* According to Samba4 , SEC_FILE_READ_ATTRIBUTE is always granted ,
*/
fsp - > access_mask = access_mask | FILE_READ_ATTRIBUTES ;
1998-08-17 17:11:34 +04:00
2005-07-08 08:51:27 +04:00
if ( file_existed ) {
2006-07-19 05:30:30 +04:00
/* stat opens on existing files don't get oplocks. */
2006-07-19 22:34:19 +04:00
if ( is_stat_open ( open_access_mask ) ) {
2006-07-19 05:30:30 +04:00
fsp - > oplock_type = NO_OPLOCK ;
}
2005-07-08 08:51:27 +04:00
if ( ! ( flags2 & O_TRUNC ) ) {
info = FILE_WAS_OPENED ;
} else {
info = FILE_WAS_OVERWRITTEN ;
}
} else {
info = FILE_WAS_CREATED ;
2005-03-15 04:19:58 +03:00
}
1998-08-17 17:11:34 +04:00
2005-07-08 08:51:27 +04:00
if ( pinfo ) {
* pinfo = info ;
2000-04-22 04:33:16 +04:00
}
1998-08-17 17:11:34 +04:00
2008-11-21 23:14:53 +03:00
/*
2000-04-22 04:33:16 +04:00
* Setup the oplock info in both the shared memory and
* file structs .
*/
1998-09-23 05:48:45 +04:00
2008-12-18 04:23:13 +03:00
if ( ! set_file_oplock ( fsp , fsp - > oplock_type ) ) {
/* Could not get the kernel oplock */
fsp - > oplock_type = NO_OPLOCK ;
2000-04-22 04:33:16 +04:00
}
1998-09-23 05:48:45 +04:00
2007-05-24 01:32:10 +04:00
if ( info = = FILE_WAS_OVERWRITTEN | | info = = FILE_WAS_CREATED | | info = = FILE_WAS_SUPERSEDED ) {
new_file_created = True ;
}
2005-07-08 08:51:27 +04:00
2008-06-19 18:54:12 +04:00
set_share_mode ( lck , fsp , conn - > server_info - > utok . uid , 0 ,
2008-12-07 03:08:35 +03:00
fsp - > oplock_type ) ;
2006-02-01 07:14:07 +03:00
2007-05-24 01:32:10 +04:00
/* Handle strange delete on close create semantics. */
2008-12-07 21:30:01 +03:00
if ( create_options & FILE_DELETE_ON_CLOSE ) {
2007-05-24 01:32:10 +04:00
status = can_set_delete_on_close ( fsp , True , new_dos_attributes ) ;
if ( ! NT_STATUS_IS_OK ( status ) ) {
/* Remember to delete the mode we just added. */
del_share_mode ( lck , fsp ) ;
TALLOC_FREE ( lck ) ;
2007-12-22 04:01:26 +03:00
fd_close ( fsp ) ;
2007-05-24 01:32:10 +04:00
return status ;
2001-11-23 14:18:20 +03:00
}
2007-05-24 01:32:10 +04:00
/* Note that here we set the *inital* delete on close flag,
not the regular one . The magic gets handled in close . */
fsp - > initial_delete_on_close = True ;
}
2008-11-21 23:14:53 +03:00
2007-05-24 01:32:10 +04:00
if ( new_file_created ) {
2004-04-02 22:46:19 +04:00
/* Files should be initially set as archive */
2005-07-08 08:51:27 +04:00
if ( lp_map_archive ( SNUM ( conn ) ) | |
lp_store_dos_attributes ( SNUM ( conn ) ) ) {
2007-02-07 00:05:34 +03:00
if ( ! posix_open ) {
2007-12-27 23:31:08 +03:00
SMB_STRUCT_STAT tmp_sbuf ;
SET_STAT_INVALID ( tmp_sbuf ) ;
if ( file_set_dosmode (
conn , fname ,
new_dos_attributes | aARCH ,
& tmp_sbuf , parent_dir ,
true ) = = 0 ) {
unx_mode = tmp_sbuf . st_mode ;
}
2007-02-07 00:05:34 +03:00
}
2004-04-02 22:46:19 +04:00
}
}
2001-12-17 02:44:38 +03:00
/*
2002-03-12 00:57:12 +03:00
* Take care of inherited ACLs on created files - if default ACL not
* selected .
2001-12-17 02:44:38 +03:00
*/
2007-02-07 00:05:34 +03:00
if ( ! posix_open & & ! file_existed & & ! def_acl ) {
2003-01-08 05:09:18 +03:00
2005-07-08 08:51:27 +04:00
int saved_errno = errno ; /* We might get ENOSYS in the next
* call . . */
2003-01-08 05:09:18 +03:00
2008-01-08 03:14:24 +03:00
if ( SMB_VFS_FCHMOD_ACL ( fsp , unx_mode ) = = - 1 & &
2006-07-25 12:40:04 +04:00
errno = = ENOSYS ) {
2001-12-17 02:44:38 +03:00
errno = saved_errno ; /* Ignore ENOSYS */
2005-07-08 08:51:27 +04:00
}
2003-01-08 05:09:18 +03:00
2005-07-08 08:51:27 +04:00
} else if ( new_unx_mode ) {
2003-01-08 05:09:18 +03:00
int ret = - 1 ;
/* Attributes need changing. File already existed. */
2003-05-12 20:03:16 +04:00
{
2005-07-08 08:51:27 +04:00
int saved_errno = errno ; /* We might get ENOSYS in the
* next call . . */
2008-01-08 03:14:24 +03:00
ret = SMB_VFS_FCHMOD_ACL ( fsp , new_unx_mode ) ;
2003-01-08 05:09:18 +03:00
if ( ret = = - 1 & & errno = = ENOSYS ) {
errno = saved_errno ; /* Ignore ENOSYS */
} else {
2006-05-30 03:54:53 +04:00
DEBUG ( 5 , ( " open_file_ntcreate: reset "
2005-07-08 08:51:27 +04:00
" attributes of file %s to 0%o \n " ,
2006-07-25 12:40:04 +04:00
fname , ( unsigned int ) new_unx_mode ) ) ;
2003-01-08 05:09:18 +03:00
ret = 0 ; /* Don't do the fchmod below. */
}
}
2005-07-08 08:51:27 +04:00
if ( ( ret = = - 1 ) & &
2008-01-07 15:44:37 +03:00
( SMB_VFS_FCHMOD ( fsp , new_unx_mode ) = = - 1 ) )
2006-05-30 03:54:53 +04:00
DEBUG ( 5 , ( " open_file_ntcreate: failed to reset "
2005-07-08 08:51:27 +04:00
" attributes of file %s to 0%o \n " ,
2006-07-25 12:40:04 +04:00
fname , ( unsigned int ) new_unx_mode ) ) ;
2001-12-17 02:44:38 +03:00
}
2003-01-08 05:09:18 +03:00
2005-07-08 08:51:27 +04:00
/* If this is a successful open, we must remove any deferred open
* records . */
2007-07-05 20:26:27 +04:00
if ( req ! = NULL ) {
del_deferred_open_entry ( lck , req - > mid ) ;
}
2006-02-20 20:59:58 +03:00
TALLOC_FREE ( lck ) ;
1998-08-17 17:11:34 +04:00
2008-11-21 23:14:53 +03:00
return NT_STATUS_OK ;
}
1998-08-17 17:11:34 +04:00
2001-04-14 04:19:12 +04:00
/****************************************************************************
Open a file for for write to ensure that we can fchmod it .
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
2008-10-09 17:38:53 +04:00
NTSTATUS open_file_fchmod ( struct smb_request * req , connection_struct * conn ,
const char * fname ,
2006-07-11 22:01:26 +04:00
SMB_STRUCT_STAT * psbuf , files_struct * * result )
2001-04-14 04:19:12 +04:00
{
files_struct * fsp = NULL ;
2006-07-11 22:01:26 +04:00
NTSTATUS status ;
2001-04-14 04:19:12 +04:00
2005-07-08 08:51:27 +04:00
if ( ! VALID_STAT ( * psbuf ) ) {
2006-07-11 22:01:26 +04:00
return NT_STATUS_INVALID_PARAMETER ;
2005-07-08 08:51:27 +04:00
}
2001-04-14 04:19:12 +04:00
2008-10-09 17:38:53 +04:00
status = file_new ( req , conn , & fsp ) ;
2006-07-11 22:01:26 +04:00
if ( ! NT_STATUS_IS_OK ( status ) ) {
return status ;
2005-07-08 08:51:27 +04:00
}
2001-04-14 04:19:12 +04:00
2008-11-23 06:37:24 +03:00
status = SMB_VFS_CREATE_FILE (
conn , /* conn */
NULL , /* req */
0 , /* root_dir_fid */
fname , /* fname */
2008-12-01 23:47:31 +03:00
0 , /* create_file_flags */
2008-11-23 06:37:24 +03:00
FILE_WRITE_DATA , /* access_mask */
( FILE_SHARE_READ | FILE_SHARE_WRITE | /* share_access */
FILE_SHARE_DELETE ) ,
FILE_OPEN , /* create_disposition*/
0 , /* create_options */
0 , /* file_attributes */
0 , /* oplock_request */
0 , /* allocation_size */
NULL , /* sd */
NULL , /* ea_list */
& fsp , /* result */
NULL , /* pinfo */
psbuf ) ; /* psbuf */
2001-04-14 04:19:12 +04:00
2008-11-21 23:14:53 +03:00
/*
2001-04-14 04:19:12 +04:00
* This is not a user visible file open .
2008-11-21 23:14:53 +03:00
* Don ' t set a share mode .
2001-04-14 04:19:12 +04:00
*/
2006-07-11 22:01:26 +04:00
if ( ! NT_STATUS_IS_OK ( status ) ) {
2008-10-09 18:27:49 +04:00
file_free ( req , fsp ) ;
2006-07-11 22:01:26 +04:00
return status ;
2001-04-14 04:19:12 +04:00
}
2006-07-11 22:01:26 +04:00
* result = fsp ;
return NT_STATUS_OK ;
2001-04-14 04:19:12 +04:00
}
/****************************************************************************
Close the fchmod file fd - ensure no locks are lost .
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
2008-10-09 18:27:49 +04:00
NTSTATUS close_file_fchmod ( struct smb_request * req , files_struct * fsp )
2001-04-14 04:19:12 +04:00
{
2007-12-22 04:01:26 +03:00
NTSTATUS status = fd_close ( fsp ) ;
2008-10-09 18:27:49 +04:00
file_free ( req , fsp ) ;
2007-02-07 00:05:34 +03:00
return status ;
2001-04-14 04:19:12 +04:00
}
2007-02-07 00:05:34 +03:00
static NTSTATUS mkdir_internal ( connection_struct * conn ,
const char * name ,
uint32 file_attributes ,
SMB_STRUCT_STAT * psbuf )
2006-12-24 14:45:55 +03:00
{
2006-12-24 17:29:19 +03:00
mode_t mode ;
2006-12-29 00:50:31 +03:00
char * parent_dir ;
const char * dirname ;
2007-01-17 05:44:27 +03:00
NTSTATUS status ;
2007-09-28 03:28:35 +04:00
bool posix_open = false ;
2006-12-24 17:29:19 +03:00
2006-12-24 14:45:55 +03:00
if ( ! CAN_WRITE ( conn ) ) {
DEBUG ( 5 , ( " mkdir_internal: failing create on read-only share "
" %s \n " , lp_servicename ( SNUM ( conn ) ) ) ) ;
return NT_STATUS_ACCESS_DENIED ;
}
2007-01-17 05:44:27 +03:00
status = check_name ( conn , name ) ;
if ( ! NT_STATUS_IS_OK ( status ) ) {
return status ;
2006-12-24 14:45:55 +03:00
}
2008-12-24 15:51:47 +03:00
if ( ! parent_dirname ( talloc_tos ( ) , name , & parent_dir , & dirname ) ) {
2006-12-27 13:57:59 +03:00
return NT_STATUS_NO_MEMORY ;
}
2007-02-07 00:05:34 +03:00
if ( file_attributes & FILE_FLAG_POSIX_SEMANTICS ) {
2007-09-28 03:28:35 +04:00
posix_open = true ;
2007-02-07 00:05:34 +03:00
mode = ( mode_t ) ( file_attributes & ~ FILE_FLAG_POSIX_SEMANTICS ) ;
} else {
mode = unix_mode ( conn , aDIR , name , parent_dir ) ;
}
2006-12-24 14:45:55 +03:00
2007-03-03 01:19:53 +03:00
if ( SMB_VFS_MKDIR ( conn , name , mode ) ! = 0 ) {
2006-12-24 14:45:55 +03:00
return map_nt_error_from_unix ( errno ) ;
}
2006-12-24 17:29:19 +03:00
2006-12-24 18:11:03 +03:00
/* Ensure we're checking for a symlink here.... */
/* We don't want to get caught by a symlink racer. */
if ( SMB_VFS_LSTAT ( conn , name , psbuf ) = = - 1 ) {
DEBUG ( 2 , ( " Could not stat directory '%s' just created: %s \n " ,
name , strerror ( errno ) ) ) ;
return map_nt_error_from_unix ( errno ) ;
}
if ( ! S_ISDIR ( psbuf - > st_mode ) ) {
DEBUG ( 0 , ( " Directory just '%s' created is not a directory \n " ,
name ) ) ;
return NT_STATUS_ACCESS_DENIED ;
}
2007-09-28 03:28:35 +04:00
if ( lp_store_dos_attributes ( SNUM ( conn ) ) ) {
if ( ! posix_open ) {
file_set_dosmode ( conn , name ,
file_attributes | aDIR , NULL ,
2007-11-01 01:45:45 +03:00
parent_dir ,
true ) ;
2007-09-28 03:28:35 +04:00
}
}
2006-12-24 17:29:19 +03:00
if ( lp_inherit_perms ( SNUM ( conn ) ) ) {
2008-05-02 23:54:53 +04:00
inherit_access_posix_acl ( conn , parent_dir , name , mode ) ;
2006-12-24 17:29:19 +03:00
}
2007-02-07 00:05:34 +03:00
if ( ! ( file_attributes & FILE_FLAG_POSIX_SEMANTICS ) ) {
/*
* Check if high bits should have been set ,
* then ( if bits are missing ) : add them .
* Consider bits automagically set by UNIX , i . e . SGID bit from parent
* dir .
*/
if ( mode & ~ ( S_IRWXU | S_IRWXG | S_IRWXO ) & & ( mode & ~ psbuf - > st_mode ) ) {
SMB_VFS_CHMOD ( conn , name ,
psbuf - > st_mode | ( mode & ~ psbuf - > st_mode ) ) ;
}
2006-12-24 17:29:19 +03:00
}
2006-12-24 19:37:22 +03:00
/* Change the owner if required. */
if ( lp_inherit_owner ( SNUM ( conn ) ) ) {
2006-12-27 13:57:59 +03:00
change_dir_owner_to_parent ( conn , parent_dir , name , psbuf ) ;
2006-12-24 19:37:22 +03:00
}
2007-01-31 19:56:27 +03:00
notify_fname ( conn , NOTIFY_ACTION_ADDED , FILE_NOTIFY_CHANGE_DIR_NAME ,
name ) ;
2007-01-17 19:23:45 +03:00
2006-12-24 14:45:55 +03:00
return NT_STATUS_OK ;
}
1998-08-17 17:11:34 +04:00
/****************************************************************************
Open a directory from an NT SMB call .
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
1998-10-23 04:58:28 +04:00
2008-11-23 06:40:09 +03:00
static NTSTATUS open_directory ( connection_struct * conn ,
struct smb_request * req ,
const char * fname ,
SMB_STRUCT_STAT * psbuf ,
uint32 access_mask ,
uint32 share_access ,
uint32 create_disposition ,
uint32 create_options ,
uint32 file_attributes ,
int * pinfo ,
files_struct * * result )
1998-08-17 17:11:34 +04:00
{
2005-07-08 08:51:27 +04:00
files_struct * fsp = NULL ;
2007-10-19 04:40:25 +04:00
bool dir_existed = VALID_STAT ( * psbuf ) ? True : False ;
2005-10-28 02:35:08 +04:00
struct share_mode_lock * lck = NULL ;
NTSTATUS status ;
2008-03-12 17:32:47 +03:00
struct timespec mtimespec ;
2005-07-08 08:51:27 +04:00
int info = 0 ;
DEBUG ( 5 , ( " open_directory: opening directory %s, access_mask = 0x%x, "
" share_access = 0x%x create_options = 0x%x, "
2007-02-07 00:05:34 +03:00
" create_disposition = 0x%x, file_attributes = 0x%x \n " ,
2005-07-08 08:51:27 +04:00
fname ,
( unsigned int ) access_mask ,
( unsigned int ) share_access ,
( unsigned int ) create_options ,
2007-02-07 00:05:34 +03:00
( unsigned int ) create_disposition ,
( unsigned int ) file_attributes ) ) ;
2005-07-08 08:51:27 +04:00
2008-09-16 01:21:28 +04:00
if ( ! ( file_attributes & FILE_FLAG_POSIX_SEMANTICS ) & &
( conn - > fs_capabilities & FILE_NAMED_STREAMS ) & &
is_ntfs_stream_name ( fname ) ) {
2007-12-07 12:45:33 +03:00
DEBUG ( 2 , ( " open_directory: %s is a stream name! \n " , fname ) ) ;
2006-07-11 22:01:26 +04:00
return NT_STATUS_NOT_A_DIRECTORY ;
2005-07-08 08:51:27 +04:00
}
1998-08-17 17:11:34 +04:00
2008-11-04 10:18:43 +03:00
status = calculate_access_mask ( conn , fname , dir_existed ,
access_mask ,
& access_mask ) ;
if ( ! NT_STATUS_IS_OK ( status ) ) {
DEBUG ( 10 , ( " open_directory: calculate_access_mask "
" on file %s returned %s \n " ,
fname ,
nt_errstr ( status ) ) ) ;
return status ;
}
2005-07-08 08:51:27 +04:00
switch ( create_disposition ) {
case FILE_OPEN :
2006-12-24 18:11:03 +03:00
info = FILE_WAS_OPENED ;
2006-12-24 14:13:32 +03:00
/*
2006-12-24 18:11:03 +03:00
* We want to follow symlinks here .
2006-12-24 14:13:32 +03:00
*/
2006-12-24 18:11:03 +03:00
if ( SMB_VFS_STAT ( conn , fname , psbuf ) ! = 0 ) {
return map_nt_error_from_unix ( errno ) ;
}
2005-07-08 08:51:27 +04:00
break ;
2003-07-29 21:34:20 +04:00
2005-07-08 08:51:27 +04:00
case FILE_CREATE :
2006-12-24 14:13:32 +03:00
2005-07-08 08:51:27 +04:00
/* If directory exists error. If directory doesn't
* exist create . */
2006-12-24 14:13:32 +03:00
2007-02-07 00:05:34 +03:00
status = mkdir_internal ( conn ,
fname ,
file_attributes ,
psbuf ) ;
2006-12-24 14:13:32 +03:00
if ( ! NT_STATUS_IS_OK ( status ) ) {
DEBUG ( 2 , ( " open_directory: unable to create "
" %s. Error was %s \n " , fname ,
nt_errstr ( status ) ) ) ;
return status ;
2004-02-24 03:55:05 +03:00
}
2006-12-24 14:13:32 +03:00
2005-07-08 08:51:27 +04:00
info = FILE_WAS_CREATED ;
break ;
2004-02-24 03:55:05 +03:00
2005-07-08 08:51:27 +04:00
case FILE_OPEN_IF :
2006-12-24 14:13:32 +03:00
/*
* If directory exists open . If directory doesn ' t
* exist create .
*/
2007-02-07 00:05:34 +03:00
status = mkdir_internal ( conn ,
fname ,
file_attributes ,
psbuf ) ;
2006-12-24 14:13:32 +03:00
if ( NT_STATUS_IS_OK ( status ) ) {
2005-07-08 08:51:27 +04:00
info = FILE_WAS_CREATED ;
2006-12-24 14:13:32 +03:00
}
if ( NT_STATUS_EQUAL ( status ,
NT_STATUS_OBJECT_NAME_COLLISION ) ) {
2005-07-08 08:51:27 +04:00
info = FILE_WAS_OPENED ;
2006-12-24 14:13:32 +03:00
status = NT_STATUS_OK ;
1999-12-13 16:27:58 +03:00
}
2006-12-24 14:13:32 +03:00
2005-07-08 08:51:27 +04:00
break ;
2000-10-19 06:58:24 +04:00
2005-07-08 08:51:27 +04:00
case FILE_SUPERSEDE :
case FILE_OVERWRITE :
case FILE_OVERWRITE_IF :
default :
DEBUG ( 5 , ( " open_directory: invalid create_disposition "
" 0x%x for directory %s \n " ,
( unsigned int ) create_disposition , fname ) ) ;
2006-07-11 22:01:26 +04:00
return NT_STATUS_INVALID_PARAMETER ;
2005-07-08 08:51:27 +04:00
}
2006-12-24 14:13:32 +03:00
if ( ! S_ISDIR ( psbuf - > st_mode ) ) {
2006-12-24 14:45:55 +03:00
DEBUG ( 5 , ( " open_directory: %s is not a directory ! \n " ,
2006-12-24 14:13:32 +03:00
fname ) ) ;
return NT_STATUS_NOT_A_DIRECTORY ;
2005-07-08 08:51:27 +04:00
}
1999-12-13 16:27:58 +03:00
2008-11-04 12:34:08 +03:00
if ( info = = FILE_WAS_OPENED ) {
2009-02-03 04:10:27 +03:00
uint32_t access_granted = 0 ;
2008-11-04 12:34:08 +03:00
status = check_open_rights ( conn ,
fname ,
2009-02-03 04:10:27 +03:00
access_mask ,
& access_granted ) ;
2008-11-04 12:34:08 +03:00
if ( ! NT_STATUS_IS_OK ( status ) ) {
DEBUG ( 10 , ( " open_directory: check_open_rights on "
" file %s failed with %s \n " ,
fname ,
nt_errstr ( status ) ) ) ;
return status ;
}
}
2008-10-09 17:38:53 +04:00
status = file_new ( req , conn , & fsp ) ;
2006-07-11 22:01:26 +04:00
if ( ! NT_STATUS_IS_OK ( status ) ) {
return status ;
1998-08-17 17:11:34 +04:00
}
/*
* Setup the files_struct for it .
*/
2000-10-19 06:58:24 +04:00
fsp - > mode = psbuf - > st_mode ;
2007-08-02 12:53:24 +04:00
fsp - > file_id = vfs_file_id_from_sbuf ( conn , psbuf ) ;
2007-07-05 20:26:27 +04:00
fsp - > vuid = req ? req - > vuid : UID_FIELD_INVALID ;
fsp - > file_pid = req ? req - > smbpid : 0 ;
2006-07-11 22:01:26 +04:00
fsp - > can_lock = False ;
1998-08-17 17:11:34 +04:00
fsp - > can_read = False ;
fsp - > can_write = False ;
2005-07-08 08:51:27 +04:00
fsp - > share_access = share_access ;
fsp - > fh - > private_options = create_options ;
2008-11-04 10:18:43 +03:00
/*
* According to Samba4 , SEC_FILE_READ_ATTRIBUTE is always granted ,
*/
fsp - > access_mask = access_mask | FILE_READ_ATTRIBUTES ;
1998-08-17 17:11:34 +04:00
fsp - > print_file = False ;
fsp - > modified = False ;
1999-12-13 16:27:58 +03:00
fsp - > oplock_type = NO_OPLOCK ;
fsp - > sent_oplock_break = NO_BREAK_SENT ;
1998-08-17 17:11:34 +04:00
fsp - > is_directory = True ;
2007-02-07 00:05:34 +03:00
fsp - > posix_open = ( file_attributes & FILE_FLAG_POSIX_SEMANTICS ) ? True : False ;
1998-08-17 17:11:34 +04:00
string_set ( & fsp - > fsp_name , fname ) ;
2008-03-12 17:32:47 +03:00
mtimespec = get_mtimespec ( psbuf ) ;
2008-01-06 16:21:25 +03:00
lck = get_share_mode_lock ( talloc_tos ( ) , fsp - > file_id ,
2006-07-25 12:51:54 +04:00
conn - > connectpath ,
2008-03-12 17:32:47 +03:00
fname , & mtimespec ) ;
2005-10-28 02:35:08 +04:00
if ( lck = = NULL ) {
DEBUG ( 0 , ( " open_directory: Could not get share mode lock for %s \n " , fname ) ) ;
2008-10-09 18:27:49 +04:00
file_free ( req , fsp ) ;
2006-07-11 22:01:26 +04:00
return NT_STATUS_SHARING_VIOLATION ;
2005-10-28 02:35:08 +04:00
}
status = open_mode_check ( conn , fname , lck ,
access_mask , share_access ,
create_options , & dir_existed ) ;
if ( ! NT_STATUS_IS_OK ( status ) ) {
2006-02-20 20:59:58 +03:00
TALLOC_FREE ( lck ) ;
2008-10-09 18:27:49 +04:00
file_free ( req , fsp ) ;
2006-07-11 22:01:26 +04:00
return status ;
2005-10-28 02:35:08 +04:00
}
2008-12-07 03:08:35 +03:00
set_share_mode ( lck , fsp , conn - > server_info - > utok . uid , 0 , NO_OPLOCK ) ;
2005-10-28 02:35:08 +04:00
2006-02-03 05:16:35 +03:00
/* For directories the delete on close bit at open time seems
always to be honored on close . . . See test 19 in Samba4 BASE - DELETE . */
if ( create_options & FILE_DELETE_ON_CLOSE ) {
2005-10-28 02:35:08 +04:00
status = can_set_delete_on_close ( fsp , True , 0 ) ;
2007-01-18 09:19:24 +03:00
if ( ! NT_STATUS_IS_OK ( status ) & & ! NT_STATUS_EQUAL ( status , NT_STATUS_DIRECTORY_NOT_EMPTY ) ) {
2006-02-20 20:59:58 +03:00
TALLOC_FREE ( lck ) ;
2008-10-09 18:27:49 +04:00
file_free ( req , fsp ) ;
2006-07-11 22:01:26 +04:00
return status ;
2001-11-23 14:18:20 +03:00
}
2005-10-28 02:35:08 +04:00
2007-01-18 09:19:24 +03:00
if ( NT_STATUS_IS_OK ( status ) ) {
2007-01-19 00:51:52 +03:00
/* Note that here we set the *inital* delete on close flag,
not the regular one . The magic gets handled in close . */
fsp - > initial_delete_on_close = True ;
2007-01-18 09:19:24 +03:00
}
2001-11-23 14:18:20 +03:00
}
2005-03-15 04:19:58 +03:00
2006-02-20 20:59:58 +03:00
TALLOC_FREE ( lck ) ;
2005-10-28 02:35:08 +04:00
2005-07-08 08:51:27 +04:00
if ( pinfo ) {
* pinfo = info ;
}
2006-07-11 22:01:26 +04:00
* result = fsp ;
return NT_STATUS_OK ;
1998-08-17 17:11:34 +04:00
}
2002-03-23 05:57:44 +03:00
2008-01-04 23:56:23 +03:00
NTSTATUS create_directory ( connection_struct * conn , struct smb_request * req , const char * directory )
2006-12-24 14:45:55 +03:00
{
NTSTATUS status ;
SMB_STRUCT_STAT sbuf ;
files_struct * fsp ;
SET_STAT_INVALID ( sbuf ) ;
2008-11-21 05:55:24 +03:00
status = SMB_VFS_CREATE_FILE (
conn , /* conn */
req , /* req */
0 , /* root_dir_fid */
directory , /* fname */
2008-12-01 23:47:31 +03:00
0 , /* create_file_flags */
2008-11-21 05:55:24 +03:00
FILE_READ_ATTRIBUTES , /* access_mask */
FILE_SHARE_NONE , /* share_access */
FILE_CREATE , /* create_disposition*/
FILE_DIRECTORY_FILE , /* create_options */
FILE_ATTRIBUTE_DIRECTORY , /* file_attributes */
0 , /* oplock_request */
0 , /* allocation_size */
NULL , /* sd */
NULL , /* ea_list */
& fsp , /* result */
NULL , /* pinfo */
& sbuf ) ; /* psbuf */
2006-12-24 14:45:55 +03:00
if ( NT_STATUS_IS_OK ( status ) ) {
2008-10-09 18:27:49 +04:00
close_file ( req , fsp , NORMAL_CLOSE ) ;
2006-12-24 14:45:55 +03:00
}
return status ;
}
2005-12-13 21:11:50 +03:00
/****************************************************************************
Receive notification that one of our open files has been renamed by another
smbd process .
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
2007-05-16 18:24:06 +04:00
void msg_file_was_renamed ( struct messaging_context * msg ,
void * private_data ,
uint32_t msg_type ,
struct server_id server_id ,
DATA_BLOB * data )
2005-12-13 21:11:50 +03:00
{
files_struct * fsp ;
2007-05-16 18:24:06 +04:00
char * frm = ( char * ) data - > data ;
2007-05-29 13:30:34 +04:00
struct file_id id ;
2005-12-13 21:11:50 +03:00
const char * sharepath ;
const char * newname ;
size_t sp_len ;
2007-05-16 18:24:06 +04:00
if ( data - > data = = NULL
| | data - > length < MSG_FILE_RENAMED_MIN_SIZE + 2 ) {
DEBUG ( 0 , ( " msg_file_was_renamed: Got invalid msg len %d \n " ,
2007-06-07 11:49:43 +04:00
( int ) data - > length ) ) ;
2005-12-13 21:11:50 +03:00
return ;
}
2006-01-13 01:17:54 +03:00
/* Unpack the message. */
2007-05-29 13:30:34 +04:00
pull_file_id_16 ( frm , & id ) ;
2006-01-13 01:17:54 +03:00
sharepath = & frm [ 16 ] ;
2005-12-13 21:11:50 +03:00
newname = sharepath + strlen ( sharepath ) + 1 ;
sp_len = strlen ( sharepath ) ;
DEBUG ( 10 , ( " msg_file_was_renamed: Got rename message for sharepath %s, new name %s, "
2007-05-29 13:30:34 +04:00
" file_id %s \n " ,
2007-09-10 14:56:07 +04:00
sharepath , newname , file_id_string_tos ( & id ) ) ) ;
2005-12-13 21:11:50 +03:00
2007-05-29 13:30:34 +04:00
for ( fsp = file_find_di_first ( id ) ; fsp ; fsp = file_find_di_next ( fsp ) ) {
2005-12-13 21:11:50 +03:00
if ( memcmp ( fsp - > conn - > connectpath , sharepath , sp_len ) = = 0 ) {
DEBUG ( 10 , ( " msg_file_was_renamed: renaming file fnum %d from %s -> %s \n " ,
fsp - > fnum , fsp - > fsp_name , newname ) ) ;
string_set ( & fsp - > fsp_name , newname ) ;
} else {
/* TODO. JRA. */
/* Now we have the complete path we can work out if this is
actually within this share and adjust newname accordingly . */
DEBUG ( 10 , ( " msg_file_was_renamed: share mismatch (sharepath %s "
" not sharepath %s) "
" fnum %d from %s -> %s \n " ,
fsp - > conn - > connectpath ,
sharepath ,
fsp - > fnum ,
fsp - > fsp_name ,
newname ) ) ;
}
}
}
2007-12-02 17:35:22 +03:00
struct case_semantics_state {
connection_struct * conn ;
bool case_sensitive ;
bool case_preserve ;
bool short_case_preserve ;
} ;
/****************************************************************************
Restore case semantics .
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
static int restore_case_semantics ( struct case_semantics_state * state )
{
state - > conn - > case_sensitive = state - > case_sensitive ;
state - > conn - > case_preserve = state - > case_preserve ;
state - > conn - > short_case_preserve = state - > short_case_preserve ;
return 0 ;
}
/****************************************************************************
Save case semantics .
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
2008-10-30 03:28:19 +03:00
struct case_semantics_state * set_posix_case_semantics ( TALLOC_CTX * mem_ctx ,
connection_struct * conn )
2007-12-02 17:35:22 +03:00
{
struct case_semantics_state * result ;
if ( ! ( result = talloc ( mem_ctx , struct case_semantics_state ) ) ) {
DEBUG ( 0 , ( " talloc failed \n " ) ) ;
return NULL ;
}
result - > conn = conn ;
result - > case_sensitive = conn - > case_sensitive ;
result - > case_preserve = conn - > case_preserve ;
result - > short_case_preserve = conn - > short_case_preserve ;
/* Set to POSIX. */
conn - > case_sensitive = True ;
conn - > case_preserve = True ;
conn - > short_case_preserve = True ;
talloc_set_destructor ( result , restore_case_semantics ) ;
return result ;
}
2008-01-20 01:25:36 +03:00
/*
* If a main file is opened for delete , all streams need to be checked for
* ! FILE_SHARE_DELETE . Do this by opening with DELETE_ACCESS .
* If that works , delete them all by setting the delete on close and close .
*/
static NTSTATUS open_streams_for_delete ( connection_struct * conn ,
const char * fname )
{
struct stream_struct * stream_info ;
files_struct * * streams ;
int i ;
unsigned int num_streams ;
TALLOC_CTX * frame = talloc_stackframe ( ) ;
NTSTATUS status ;
status = SMB_VFS_STREAMINFO ( conn , NULL , fname , talloc_tos ( ) ,
& num_streams , & stream_info ) ;
2008-01-20 16:44:07 +03:00
if ( NT_STATUS_EQUAL ( status , NT_STATUS_NOT_IMPLEMENTED )
| | NT_STATUS_EQUAL ( status , NT_STATUS_OBJECT_NAME_NOT_FOUND ) ) {
2008-01-20 01:25:36 +03:00
DEBUG ( 10 , ( " no streams around \n " ) ) ;
TALLOC_FREE ( frame ) ;
return NT_STATUS_OK ;
}
if ( ! NT_STATUS_IS_OK ( status ) ) {
DEBUG ( 10 , ( " SMB_VFS_STREAMINFO failed: %s \n " ,
nt_errstr ( status ) ) ) ;
goto fail ;
}
DEBUG ( 10 , ( " open_streams_for_delete found %d streams \n " ,
num_streams ) ) ;
if ( num_streams = = 0 ) {
TALLOC_FREE ( frame ) ;
return NT_STATUS_OK ;
}
streams = TALLOC_ARRAY ( talloc_tos ( ) , files_struct * , num_streams ) ;
if ( streams = = NULL ) {
DEBUG ( 0 , ( " talloc failed \n " ) ) ;
status = NT_STATUS_NO_MEMORY ;
goto fail ;
}
for ( i = 0 ; i < num_streams ; i + + ) {
char * streamname ;
if ( strequal ( stream_info [ i ] . name , " ::$DATA " ) ) {
streams [ i ] = NULL ;
continue ;
}
streamname = talloc_asprintf ( talloc_tos ( ) , " %s%s " , fname ,
stream_info [ i ] . name ) ;
if ( streamname = = NULL ) {
DEBUG ( 0 , ( " talloc_aprintf failed \n " ) ) ;
status = NT_STATUS_NO_MEMORY ;
goto fail ;
}
status = create_file_unixpath
( conn , /* conn */
NULL , /* req */
streamname , /* fname */
DELETE_ACCESS , /* access_mask */
FILE_SHARE_READ | FILE_SHARE_WRITE
| FILE_SHARE_DELETE , /* share_access */
FILE_OPEN , /* create_disposition*/
NTCREATEX_OPTIONS_PRIVATE_STREAM_DELETE , /* create_options */
FILE_ATTRIBUTE_NORMAL , /* file_attributes */
0 , /* oplock_request */
0 , /* allocation_size */
NULL , /* sd */
NULL , /* ea_list */
& streams [ i ] , /* result */
NULL , /* pinfo */
NULL ) ; /* psbuf */
TALLOC_FREE ( streamname ) ;
if ( ! NT_STATUS_IS_OK ( status ) ) {
DEBUG ( 10 , ( " Could not open stream %s: %s \n " ,
streamname , nt_errstr ( status ) ) ) ;
break ;
}
}
/*
* don ' t touch the variable " status " beyond this point : - )
*/
for ( i - = 1 ; i > = 0 ; i - - ) {
if ( streams [ i ] = = NULL ) {
continue ;
}
DEBUG ( 10 , ( " Closing stream # %d, %s \n " , i ,
streams [ i ] - > fsp_name ) ) ;
2008-10-09 18:27:49 +04:00
close_file ( NULL , streams [ i ] , NORMAL_CLOSE ) ;
2008-01-20 01:25:36 +03:00
}
fail :
TALLOC_FREE ( frame ) ;
return status ;
}
2007-12-02 17:35:22 +03:00
/*
* Wrapper around open_file_ntcreate and open_directory
*/
2008-11-20 05:03:27 +03:00
static NTSTATUS create_file_unixpath ( connection_struct * conn ,
struct smb_request * req ,
const char * fname ,
uint32_t access_mask ,
uint32_t share_access ,
uint32_t create_disposition ,
uint32_t create_options ,
uint32_t file_attributes ,
uint32_t oplock_request ,
uint64_t allocation_size ,
struct security_descriptor * sd ,
struct ea_list * ea_list ,
files_struct * * result ,
int * pinfo ,
SMB_STRUCT_STAT * psbuf )
2007-12-11 13:14:30 +03:00
{
SMB_STRUCT_STAT sbuf ;
int info = FILE_WAS_OPENED ;
2008-01-20 01:25:36 +03:00
files_struct * base_fsp = NULL ;
2007-12-11 13:14:30 +03:00
files_struct * fsp = NULL ;
NTSTATUS status ;
DEBUG ( 10 , ( " create_file_unixpath: access_mask = 0x%x "
" file_attributes = 0x%x, share_access = 0x%x, "
" create_disposition = 0x%x create_options = 0x%x "
" oplock_request = 0x%x ea_list = 0x%p, sd = 0x%p, "
" fname = %s \n " ,
( unsigned int ) access_mask ,
( unsigned int ) file_attributes ,
( unsigned int ) share_access ,
( unsigned int ) create_disposition ,
( unsigned int ) create_options ,
( unsigned int ) oplock_request ,
ea_list , sd , fname ) ) ;
if ( create_options & FILE_OPEN_BY_FILE_ID ) {
status = NT_STATUS_NOT_SUPPORTED ;
goto fail ;
}
2008-08-19 18:34:50 +04:00
if ( create_options & NTCREATEX_OPTIONS_INVALID_PARAM_MASK ) {
status = NT_STATUS_INVALID_PARAMETER ;
goto fail ;
}
2007-12-11 13:14:30 +03:00
if ( req = = NULL ) {
oplock_request | = INTERNAL_OPEN_ONLY ;
}
if ( psbuf ! = NULL ) {
sbuf = * psbuf ;
}
else {
2008-01-20 01:25:36 +03:00
if ( SMB_VFS_STAT ( conn , fname , & sbuf ) = = - 1 ) {
SET_STAT_INVALID ( sbuf ) ;
}
}
if ( ( conn - > fs_capabilities & FILE_NAMED_STREAMS )
& & ( access_mask & DELETE_ACCESS )
& & ! is_ntfs_stream_name ( fname ) ) {
/*
* We can ' t open a file with DELETE access if any of the
* streams is open without FILE_SHARE_DELETE
*/
status = open_streams_for_delete ( conn , fname ) ;
if ( ! NT_STATUS_IS_OK ( status ) ) {
goto fail ;
}
2007-12-11 13:14:30 +03:00
}
/* This is the correct thing to do (check every time) but can_delete
* is expensive ( it may have to read the parent directory
* permissions ) . So for now we ' re not doing it unless we have a strong
* hint the client is really going to delete this file . If the client
* is forcing FILE_CREATE let the filesystem take care of the
* permissions . */
/* Setting FILE_SHARE_DELETE is the hint. */
if ( lp_acl_check_permissions ( SNUM ( conn ) )
& & ( create_disposition ! = FILE_CREATE )
& & ( share_access & FILE_SHARE_DELETE )
& & ( access_mask & DELETE_ACCESS )
2009-02-03 04:10:27 +03:00
& & ( ! ( can_delete_file_in_directory ( conn , fname ) | |
can_access_file_acl ( conn , fname , DELETE_ACCESS ) ) ) ) {
2007-12-11 13:14:30 +03:00
status = NT_STATUS_ACCESS_DENIED ;
2009-02-03 04:10:27 +03:00
DEBUG ( 10 , ( " create_file_unixpath: open file %s "
" for delete ACCESS_DENIED \n " , fname ) ) ;
2007-12-11 13:14:30 +03:00
goto fail ;
}
#if 0
/* We need to support SeSecurityPrivilege for this. */
if ( ( access_mask & SEC_RIGHT_SYSTEM_SECURITY ) & &
! user_has_privileges ( current_user . nt_user_token ,
& se_security ) ) {
status = NT_STATUS_PRIVILEGE_NOT_HELD ;
goto fail ;
}
# endif
2008-01-20 01:25:36 +03:00
if ( ( conn - > fs_capabilities & FILE_NAMED_STREAMS )
& & is_ntfs_stream_name ( fname )
& & ( ! ( create_options & NTCREATEX_OPTIONS_PRIVATE_STREAM_DELETE ) ) ) {
char * base ;
uint32 base_create_disposition ;
if ( create_options & FILE_DIRECTORY_FILE ) {
status = NT_STATUS_NOT_A_DIRECTORY ;
goto fail ;
}
status = split_ntfs_stream_name ( talloc_tos ( ) , fname ,
& base , NULL ) ;
if ( ! NT_STATUS_IS_OK ( status ) ) {
2008-02-23 03:12:57 +03:00
DEBUG ( 10 , ( " create_file_unixpath: "
" split_ntfs_stream_name failed: %s \n " ,
nt_errstr ( status ) ) ) ;
2008-01-20 01:25:36 +03:00
goto fail ;
}
SMB_ASSERT ( ! is_ntfs_stream_name ( base ) ) ; /* paranoia.. */
switch ( create_disposition ) {
case FILE_OPEN :
base_create_disposition = FILE_OPEN ;
break ;
default :
base_create_disposition = FILE_OPEN_IF ;
break ;
}
2008-11-22 09:48:37 +03:00
status = create_file_unixpath ( conn , NULL , base , 0 ,
2008-01-20 01:25:36 +03:00
FILE_SHARE_READ
| FILE_SHARE_WRITE
| FILE_SHARE_DELETE ,
base_create_disposition ,
0 , 0 , 0 , 0 , NULL , NULL ,
& base_fsp , NULL , NULL ) ;
if ( ! NT_STATUS_IS_OK ( status ) ) {
DEBUG ( 10 , ( " create_file_unixpath for base %s failed: "
" %s \n " , base , nt_errstr ( status ) ) ) ;
goto fail ;
}
2008-12-02 01:28:27 +03:00
/* we don't need to low level fd */
fd_close ( base_fsp ) ;
2008-01-20 01:25:36 +03:00
}
2007-12-11 13:14:30 +03:00
/*
* If it ' s a request for a directory open , deal with it separately .
*/
if ( create_options & FILE_DIRECTORY_FILE ) {
2008-01-20 01:25:36 +03:00
if ( create_options & FILE_NON_DIRECTORY_FILE ) {
status = NT_STATUS_INVALID_PARAMETER ;
goto fail ;
}
2007-12-11 13:14:30 +03:00
/* Can't open a temp directory. IFS kit test. */
2008-12-02 01:13:14 +03:00
if ( ! ( file_attributes & FILE_FLAG_POSIX_SEMANTICS ) & &
( file_attributes & FILE_ATTRIBUTE_TEMPORARY ) ) {
2007-12-11 13:14:30 +03:00
status = NT_STATUS_INVALID_PARAMETER ;
goto fail ;
}
/*
* We will get a create directory here if the Win32
* app specified a security descriptor in the
* CreateDirectory ( ) call .
*/
oplock_request = 0 ;
status = open_directory (
conn , req , fname , & sbuf , access_mask , share_access ,
create_disposition , create_options , file_attributes ,
& info , & fsp ) ;
} else {
/*
* Ordinary file case .
*/
2008-11-23 06:40:09 +03:00
status = file_new ( req , conn , & fsp ) ;
if ( ! NT_STATUS_IS_OK ( status ) ) {
goto fail ;
}
2008-11-22 02:42:03 +03:00
2008-11-23 06:40:09 +03:00
/*
* We ' re opening the stream element of a base_fsp
* we already opened . Set up the base_fsp pointer .
*/
if ( base_fsp ) {
2008-11-22 02:42:03 +03:00
fsp - > base_fsp = base_fsp ;
2008-11-23 06:40:09 +03:00
}
2008-11-22 02:42:03 +03:00
2008-11-23 06:40:09 +03:00
status = open_file_ntcreate ( conn ,
req ,
fname ,
& sbuf ,
access_mask ,
share_access ,
create_disposition ,
create_options ,
file_attributes ,
oplock_request ,
& info ,
fsp ) ;
if ( ! NT_STATUS_IS_OK ( status ) ) {
file_free ( req , fsp ) ;
fsp = NULL ;
2008-11-22 02:42:03 +03:00
}
2007-12-11 13:14:30 +03:00
if ( NT_STATUS_EQUAL ( status , NT_STATUS_FILE_IS_A_DIRECTORY ) ) {
2008-12-02 00:52:28 +03:00
/* A stream open never opens a directory */
if ( base_fsp ) {
status = NT_STATUS_FILE_IS_A_DIRECTORY ;
goto fail ;
}
2007-12-11 13:14:30 +03:00
/*
* Fail the open if it was explicitly a non - directory
* file .
*/
if ( create_options & FILE_NON_DIRECTORY_FILE ) {
status = NT_STATUS_FILE_IS_A_DIRECTORY ;
goto fail ;
}
oplock_request = 0 ;
status = open_directory (
conn , req , fname , & sbuf , access_mask ,
share_access , create_disposition ,
create_options , file_attributes ,
& info , & fsp ) ;
}
}
if ( ! NT_STATUS_IS_OK ( status ) ) {
goto fail ;
}
2008-11-22 02:42:03 +03:00
fsp - > base_fsp = base_fsp ;
2007-12-11 13:14:30 +03:00
/*
* According to the MS documentation , the only time the security
* descriptor is applied to the opened file is iff we * created * the
* file ; an existing file stays the same .
*
* Also , it seems ( from observation ) that you can open the file with
* any access mask but you can still write the sd . We need to override
* the granted access before we call set_sd
* Patch for bug # 2242 from Tom Lackemann < cessnatomny @ yahoo . com > .
*/
if ( ( sd ! = NULL ) & & ( info = = FILE_WAS_CREATED )
& & lp_nt_acl_support ( SNUM ( conn ) ) ) {
2008-11-05 05:08:03 +03:00
uint32_t sec_info_sent ;
2007-12-11 13:14:30 +03:00
uint32_t saved_access_mask = fsp - > access_mask ;
2008-11-05 05:08:03 +03:00
sec_info_sent = get_sec_info ( sd ) ;
2007-12-11 13:14:30 +03:00
fsp - > access_mask = FILE_GENERIC_ALL ;
2008-10-09 05:06:58 +04:00
/* Convert all the generic bits. */
security_acl_map_generic ( sd - > dacl , & file_generic_mapping ) ;
security_acl_map_generic ( sd - > sacl , & file_generic_mapping ) ;
2008-11-06 12:40:21 +03:00
if ( sec_info_sent & ( OWNER_SECURITY_INFORMATION |
GROUP_SECURITY_INFORMATION |
DACL_SECURITY_INFORMATION |
SACL_SECURITY_INFORMATION ) ) {
status = SMB_VFS_FSET_NT_ACL ( fsp , sec_info_sent , sd ) ;
}
2007-12-11 13:14:30 +03:00
fsp - > access_mask = saved_access_mask ;
if ( ! NT_STATUS_IS_OK ( status ) ) {
goto fail ;
}
}
if ( ( ea_list ! = NULL ) & & ( info = = FILE_WAS_CREATED ) ) {
status = set_ea ( conn , fsp , fname , ea_list ) ;
if ( ! NT_STATUS_IS_OK ( status ) ) {
goto fail ;
}
}
if ( ! fsp - > is_directory & & S_ISDIR ( sbuf . st_mode ) ) {
status = NT_STATUS_ACCESS_DENIED ;
goto fail ;
}
/* Save the requested allocation size. */
if ( ( info = = FILE_WAS_CREATED ) | | ( info = = FILE_WAS_OVERWRITTEN ) ) {
if ( allocation_size
& & ( allocation_size > sbuf . st_size ) ) {
fsp - > initial_allocation_size = smb_roundup (
fsp - > conn , allocation_size ) ;
if ( fsp - > is_directory ) {
/* Can't set allocation size on a directory. */
status = NT_STATUS_ACCESS_DENIED ;
goto fail ;
}
if ( vfs_allocate_file_space (
fsp , fsp - > initial_allocation_size ) = = - 1 ) {
status = NT_STATUS_DISK_FULL ;
goto fail ;
}
} else {
fsp - > initial_allocation_size = smb_roundup (
2008-10-14 03:59:36 +04:00
fsp - > conn , ( uint64_t ) sbuf . st_size ) ;
2007-12-11 13:14:30 +03:00
}
}
2008-02-23 03:12:57 +03:00
DEBUG ( 10 , ( " create_file_unixpath: info=%d \n " , info ) ) ;
2007-12-11 13:14:30 +03:00
* result = fsp ;
if ( pinfo ! = NULL ) {
* pinfo = info ;
}
if ( psbuf ! = NULL ) {
2007-12-26 16:18:11 +03:00
if ( ( fsp - > fh = = NULL ) | | ( fsp - > fh - > fd = = - 1 ) ) {
* psbuf = sbuf ;
}
else {
2008-01-07 15:21:26 +03:00
SMB_VFS_FSTAT ( fsp , psbuf ) ;
2007-12-26 16:18:11 +03:00
}
2007-12-11 13:14:30 +03:00
}
return NT_STATUS_OK ;
fail :
2008-02-23 03:12:57 +03:00
DEBUG ( 10 , ( " create_file_unixpath: %s \n " , nt_errstr ( status ) ) ) ;
2007-12-11 13:14:30 +03:00
if ( fsp ! = NULL ) {
2008-11-22 02:42:03 +03:00
if ( base_fsp & & fsp - > base_fsp = = base_fsp ) {
/*
* The close_file below will close
* fsp - > base_fsp .
*/
base_fsp = NULL ;
}
2008-10-09 18:27:49 +04:00
close_file ( req , fsp , ERROR_CLOSE ) ;
2007-12-11 13:14:30 +03:00
fsp = NULL ;
}
2008-01-20 01:25:36 +03:00
if ( base_fsp ! = NULL ) {
2008-10-09 18:27:49 +04:00
close_file ( req , base_fsp , ERROR_CLOSE ) ;
2008-01-20 01:25:36 +03:00
base_fsp = NULL ;
}
2007-12-11 13:14:30 +03:00
return status ;
}
2008-11-20 08:26:42 +03:00
/*
* Calculate the full path name given a relative fid .
*/
NTSTATUS get_relative_fid_filename ( connection_struct * conn ,
struct smb_request * req ,
uint16_t root_dir_fid ,
const char * fname , char * * new_fname )
{
files_struct * dir_fsp ;
char * parent_fname = NULL ;
2008-12-13 12:31:11 +03:00
if ( root_dir_fid = = 0 | | ! fname | | ! new_fname ) {
2008-11-20 08:26:42 +03:00
return NT_STATUS_INTERNAL_ERROR ;
}
dir_fsp = file_fsp ( req , root_dir_fid ) ;
if ( dir_fsp = = NULL ) {
return NT_STATUS_INVALID_HANDLE ;
}
if ( ! dir_fsp - > is_directory ) {
/*
* Check to see if this is a mac fork of some kind .
*/
if ( ( conn - > fs_capabilities & FILE_NAMED_STREAMS ) & &
is_ntfs_stream_name ( fname ) ) {
return NT_STATUS_OBJECT_PATH_NOT_FOUND ;
}
/*
we need to handle the case when we get a
relative open relative to a file and the
pathname is blank - this is a reopen !
( hint from demyn plantenberg )
*/
return NT_STATUS_INVALID_HANDLE ;
}
if ( ISDOT ( dir_fsp - > fsp_name ) ) {
/*
* We ' re at the toplevel dir , the final file name
* must not contain . / , as this is filtered out
* normally by srvstr_get_path and unix_convert
* explicitly rejects paths containing . / .
*/
parent_fname = talloc_strdup ( talloc_tos ( ) , " " ) ;
if ( parent_fname = = NULL ) {
return NT_STATUS_NO_MEMORY ;
}
} else {
size_t dir_name_len = strlen ( dir_fsp - > fsp_name ) ;
/*
* Copy in the base directory name .
*/
parent_fname = TALLOC_ARRAY ( talloc_tos ( ) , char ,
dir_name_len + 2 ) ;
if ( parent_fname = = NULL ) {
return NT_STATUS_NO_MEMORY ;
}
memcpy ( parent_fname , dir_fsp - > fsp_name ,
dir_name_len + 1 ) ;
/*
* Ensure it ends in a ' / ' .
* We used TALLOC_SIZE + 2 to add space for the ' / ' .
*/
if ( dir_name_len
& & ( parent_fname [ dir_name_len - 1 ] ! = ' \\ ' )
& & ( parent_fname [ dir_name_len - 1 ] ! = ' / ' ) ) {
parent_fname [ dir_name_len ] = ' / ' ;
parent_fname [ dir_name_len + 1 ] = ' \0 ' ;
}
}
* new_fname = talloc_asprintf ( talloc_tos ( ) , " %s%s " , parent_fname ,
fname ) ;
if ( * new_fname = = NULL ) {
return NT_STATUS_NO_MEMORY ;
}
return NT_STATUS_OK ;
}
2008-10-21 04:43:45 +04:00
NTSTATUS create_file_default ( connection_struct * conn ,
struct smb_request * req ,
uint16_t root_dir_fid ,
const char * fname ,
2008-12-01 23:47:31 +03:00
uint32_t create_file_flags ,
2008-10-21 04:43:45 +04:00
uint32_t access_mask ,
uint32_t share_access ,
uint32_t create_disposition ,
uint32_t create_options ,
uint32_t file_attributes ,
uint32_t oplock_request ,
uint64_t allocation_size ,
struct security_descriptor * sd ,
struct ea_list * ea_list ,
files_struct * * result ,
int * pinfo ,
SMB_STRUCT_STAT * psbuf )
2007-12-02 17:35:22 +03:00
{
struct case_semantics_state * case_state = NULL ;
SMB_STRUCT_STAT sbuf ;
int info = FILE_WAS_OPENED ;
files_struct * fsp = NULL ;
NTSTATUS status ;
2007-12-07 14:57:11 +03:00
DEBUG ( 10 , ( " create_file: access_mask = 0x%x "
2007-12-02 17:35:22 +03:00
" file_attributes = 0x%x, share_access = 0x%x, "
" create_disposition = 0x%x create_options = 0x%x "
2007-12-07 14:57:11 +03:00
" oplock_request = 0x%x "
2007-12-02 17:35:22 +03:00
" root_dir_fid = 0x%x, ea_list = 0x%p, sd = 0x%p, "
2008-12-01 23:47:31 +03:00
" create_file_flags = 0x%x, fname = %s \n " ,
2007-12-02 17:35:22 +03:00
( unsigned int ) access_mask ,
( unsigned int ) file_attributes ,
( unsigned int ) share_access ,
( unsigned int ) create_disposition ,
( unsigned int ) create_options ,
2007-12-07 14:57:11 +03:00
( unsigned int ) oplock_request ,
2007-12-02 17:35:22 +03:00
( unsigned int ) root_dir_fid ,
2008-12-01 23:47:31 +03:00
ea_list , sd , create_file_flags , fname ) ) ;
2007-12-02 17:35:22 +03:00
/*
2008-11-20 08:26:42 +03:00
* Calculate the filename from the root_dir_if if necessary .
2007-12-02 17:35:22 +03:00
*/
if ( root_dir_fid ! = 0 ) {
2008-11-20 08:26:42 +03:00
char * new_fname ;
2007-12-02 17:35:22 +03:00
2008-11-20 08:26:42 +03:00
status = get_relative_fid_filename ( conn , req , root_dir_fid ,
fname , & new_fname ) ;
if ( ! NT_STATUS_IS_OK ( status ) ) {
2007-12-02 17:35:22 +03:00
goto fail ;
}
2008-11-20 08:26:42 +03:00
fname = new_fname ;
2008-01-20 01:25:36 +03:00
}
/*
* Check to see if this is a mac fork of some kind .
*/
2007-12-02 17:35:22 +03:00
2008-01-20 01:25:36 +03:00
if ( is_ntfs_stream_name ( fname ) ) {
enum FAKE_FILE_TYPE fake_file_type ;
2007-12-02 17:35:22 +03:00
2008-01-20 01:25:36 +03:00
fake_file_type = is_fake_file ( fname ) ;
2007-12-02 17:35:22 +03:00
2008-01-20 01:25:36 +03:00
if ( fake_file_type ! = FAKE_FILE_TYPE_NONE ) {
2007-12-02 17:35:22 +03:00
/*
* Here we go ! support for changing the disk quotas
* - - metze
*
* We need to fake up to open this MAGIC QUOTA file
* and return a valid FID .
*
* w2k close this file directly after openening xp
* also tries a QUERY_FILE_INFO on the file and then
* close it
*/
2008-10-09 17:38:53 +04:00
status = open_fake_file ( req , conn , req - > vuid ,
2008-06-15 15:37:53 +04:00
fake_file_type , fname ,
2007-12-02 17:35:22 +03:00
access_mask , & fsp ) ;
if ( ! NT_STATUS_IS_OK ( status ) ) {
goto fail ;
}
2008-01-22 11:22:14 +03:00
ZERO_STRUCT ( sbuf ) ;
2007-12-02 17:35:22 +03:00
goto done ;
}
2008-07-25 05:12:12 +04:00
if ( ! ( conn - > fs_capabilities & FILE_NAMED_STREAMS ) ) {
status = NT_STATUS_OBJECT_PATH_NOT_FOUND ;
goto fail ;
}
2007-12-02 17:35:22 +03:00
}
2007-12-05 17:34:07 +03:00
if ( ( req ! = NULL ) & & ( req - > flags2 & FLAGS2_DFS_PATHNAMES ) ) {
2007-12-07 12:46:11 +03:00
char * resolved_fname ;
status = resolve_dfspath ( talloc_tos ( ) , conn , true , fname ,
& resolved_fname ) ;
2007-12-05 17:34:07 +03:00
if ( ! NT_STATUS_IS_OK ( status ) ) {
/*
* For PATH_NOT_COVERED we had
* reply_botherror ( req , NT_STATUS_PATH_NOT_COVERED ,
* ERRSRV , ERRbadpath ) ;
* Need to fix in callers
*/
goto fail ;
}
2007-12-07 12:46:11 +03:00
fname = resolved_fname ;
2007-12-02 17:35:22 +03:00
}
/*
* Check if POSIX semantics are wanted .
*/
if ( file_attributes & FILE_FLAG_POSIX_SEMANTICS ) {
case_state = set_posix_case_semantics ( talloc_tos ( ) , conn ) ;
}
2008-12-01 23:47:31 +03:00
if ( create_file_flags & CFF_DOS_PATH ) {
2007-12-07 12:46:11 +03:00
char * converted_fname ;
2007-12-11 12:49:26 +03:00
SET_STAT_INVALID ( sbuf ) ;
2007-12-07 12:46:11 +03:00
status = unix_convert ( talloc_tos ( ) , conn , fname , False ,
& converted_fname , NULL , & sbuf ) ;
if ( ! NT_STATUS_IS_OK ( status ) ) {
goto fail ;
}
fname = converted_fname ;
2008-11-20 05:03:27 +03:00
} else {
if ( psbuf ! = NULL ) {
sbuf = * psbuf ;
} else {
if ( SMB_VFS_STAT ( conn , fname , & sbuf ) = = - 1 ) {
SET_STAT_INVALID ( sbuf ) ;
}
}
2007-12-02 17:35:22 +03:00
}
2008-01-20 19:32:19 +03:00
TALLOC_FREE ( case_state ) ;
2007-12-02 17:35:22 +03:00
/* All file access must go through check_name() */
status = check_name ( conn , fname ) ;
if ( ! NT_STATUS_IS_OK ( status ) ) {
goto fail ;
}
2007-12-11 13:14:30 +03:00
status = create_file_unixpath (
conn , req , fname , access_mask , share_access ,
create_disposition , create_options , file_attributes ,
oplock_request , allocation_size , sd , ea_list ,
& fsp , & info , & sbuf ) ;
2007-12-02 17:35:22 +03:00
if ( ! NT_STATUS_IS_OK ( status ) ) {
goto fail ;
}
done :
2007-12-07 14:57:11 +03:00
DEBUG ( 10 , ( " create_file: info=%d \n " , info ) ) ;
2007-12-02 17:35:22 +03:00
* result = fsp ;
2007-12-05 17:34:07 +03:00
if ( pinfo ! = NULL ) {
* pinfo = info ;
}
if ( psbuf ! = NULL ) {
* psbuf = sbuf ;
}
2007-12-02 17:35:22 +03:00
return NT_STATUS_OK ;
fail :
DEBUG ( 10 , ( " create_file: %s \n " , nt_errstr ( status ) ) ) ;
if ( fsp ! = NULL ) {
2008-10-09 18:27:49 +04:00
close_file ( req , fsp , ERROR_CLOSE ) ;
2007-12-02 17:35:22 +03:00
fsp = NULL ;
}
return status ;
}