1998-08-17 17:11:34 +04:00
/*
2002-01-30 09:08:46 +03:00
Unix SMB / CIFS implementation .
1998-08-17 17:11:34 +04:00
file opening and share modes
Copyright ( C ) Andrew Tridgell 1992 - 1998
2004-06-08 20:14:31 +04:00
Copyright ( C ) Jeremy Allison 2001 - 2004
2005-07-08 08:51:27 +04:00
Copyright ( C ) Volker Lendecke 2005
2017-03-07 21:24:45 +03:00
Copyright ( C ) Ralph Boehme 2017
2011-02-26 14:36:19 +03:00
1998-08-17 17:11:34 +04:00
This program is free software ; you can redistribute it and / or modify
it under the terms of the GNU General Public License as published by
2007-07-09 23:25:36 +04:00
the Free Software Foundation ; either version 3 of the License , or
1998-08-17 17:11:34 +04:00
( at your option ) any later version .
2011-02-26 14:36:19 +03:00
1998-08-17 17:11:34 +04:00
This program is distributed in the hope that it will be useful ,
but WITHOUT ANY WARRANTY ; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE . See the
GNU General Public License for more details .
2011-02-26 14:36:19 +03:00
1998-08-17 17:11:34 +04:00
You should have received a copy of the GNU General Public License
2007-07-10 04:52:41 +04:00
along with this program . If not , see < http : //www.gnu.org/licenses/>.
1998-08-17 17:11:34 +04:00
*/
# include "includes.h"
2019-07-05 10:52:43 +03:00
# include "smb1_utils.h"
2011-02-26 01:20:06 +03:00
# include "system/filesys.h"
2017-01-01 23:00:55 +03:00
# include "lib/util/server_id.h"
2010-05-04 12:28:48 +04:00
# include "printing.h"
2020-10-28 14:09:39 +03:00
# include "locking/share_mode_lock.h"
2011-03-22 18:57:01 +03:00
# include "smbd/smbd.h"
2009-01-08 14:03:45 +03:00
# include "smbd/globals.h"
2010-08-18 18:44:47 +04:00
# include "fake_file.h"
2010-10-12 08:27:50 +04:00
# include "../libcli/security/security.h"
2010-05-28 04:19:32 +04:00
# include "../librpc/gen_ndr/ndr_security.h"
2019-05-16 16:38:26 +03:00
# include "../librpc/gen_ndr/ndr_open_files.h"
2012-11-29 13:00:03 +04:00
# include "../librpc/gen_ndr/idmap.h"
2013-11-18 17:54:37 +04:00
# include "../librpc/gen_ndr/ioctl.h"
2012-11-29 13:00:03 +04:00
# include "passdb/lookup_sid.h"
2011-03-24 15:46:20 +03:00
# include "auth.h"
2012-08-04 17:30:11 +04:00
# include "serverid.h"
2011-03-24 17:31:06 +03:00
# include "messages.h"
2012-11-29 19:10:22 +04:00
# include "source3/lib/dbwrap/dbwrap_watch.h"
2014-10-29 01:31:46 +03:00
# include "locking/leases_db.h"
2014-12-05 23:47:52 +03:00
# include "librpc/gen_ndr/ndr_leases_db.h"
2019-08-01 14:24:49 +03:00
# include "lib/util/time_basic.h"
1998-08-17 17:11:34 +04:00
2007-10-06 01:41:17 +04:00
extern const struct generic_mapping file_generic_mapping ;
1998-08-17 17:11:34 +04:00
2005-09-30 21:13:37 +04:00
struct deferred_open_record {
2019-07-30 13:24:53 +03:00
struct smbXsrv_connection * xconn ;
uint64_t mid ;
2012-06-30 00:00:29 +04:00
bool async_open ;
2017-03-07 17:33:55 +03:00
/*
* Timer for async opens , needed because they don ' t use a watch on
* a locking . tdb record . This is currently only used for real async
* opens and just terminates smbd if the async open times out .
*/
struct tevent_timer * te ;
2019-08-18 09:57:38 +03:00
/*
* For the samba kernel oplock case we use both a timeout and
* a watch on locking . tdb . This way in case it ' s smbd holding
* the kernel oplock we get directly notified for the retry
* once the kernel oplock is properly broken . Store the req
* here so that it can be timely discarded once the timer
* above fires .
*/
struct tevent_req * watch_req ;
2004-06-08 20:14:31 +04:00
} ;
2011-10-27 01:47:52 +04:00
/****************************************************************************
2011-10-28 03:48:13 +04:00
If the requester wanted DELETE_ACCESS and was rejected because
2011-10-27 01:47:52 +04:00
the file ACL didn ' t include DELETE_ACCESS , see if the parent ACL
2012-05-04 13:49:24 +04:00
overrides this .
2011-10-27 01:47:52 +04:00
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
static bool parent_override_delete ( connection_struct * conn ,
2011-11-05 02:39:55 +04:00
const struct smb_filename * smb_fname ,
2011-10-27 01:47:52 +04:00
uint32_t access_mask ,
uint32_t rejected_mask )
{
if ( ( access_mask & DELETE_ACCESS ) & &
2011-10-28 03:48:13 +04:00
( rejected_mask & DELETE_ACCESS ) & &
2020-05-01 01:20:34 +03:00
can_delete_file_in_directory ( conn ,
2020-05-01 01:28:32 +03:00
conn - > cwd_fsp ,
2020-05-01 01:20:34 +03:00
smb_fname ) )
{
2011-10-27 01:47:52 +04:00
return true ;
}
return false ;
}
2008-11-04 12:34:08 +03:00
/****************************************************************************
Check if we have open rights .
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
2020-10-27 13:23:03 +03:00
static NTSTATUS smbd_check_access_rights_sd (
struct connection_struct * conn ,
2011-11-05 02:39:55 +04:00
const struct smb_filename * smb_fname ,
2020-10-27 13:23:03 +03:00
struct security_descriptor * sd ,
2012-09-14 03:11:31 +04:00
bool use_privs ,
2011-10-27 01:58:32 +04:00
uint32_t access_mask )
2008-11-04 12:34:08 +03:00
{
2011-07-05 13:13:07 +04:00
uint32_t rejected_share_access ;
2011-12-20 23:38:37 +04:00
uint32_t rejected_mask = access_mask ;
2013-09-02 19:37:50 +04:00
uint32_t do_not_check_mask = 0 ;
2020-10-27 13:23:03 +03:00
NTSTATUS status ;
2020-05-01 02:02:43 +03:00
2011-07-05 13:13:07 +04:00
rejected_share_access = access_mask & ~ ( conn - > share_access ) ;
if ( rejected_share_access ) {
2020-10-27 13:23:03 +03:00
DBG_DEBUG ( " rejected share access 0x%x on %s (0x%x) \n " ,
( unsigned int ) access_mask ,
smb_fname_str_dbg ( smb_fname ) ,
( unsigned int ) rejected_share_access ) ;
2011-07-05 13:13:07 +04:00
return NT_STATUS_ACCESS_DENIED ;
}
2008-11-04 12:34:08 +03:00
2012-09-14 03:11:31 +04:00
if ( ! use_privs & & get_current_uid ( conn ) = = ( uid_t ) 0 ) {
2011-11-05 01:07:23 +04:00
/* I'm sorry sir, I didn't know you were root... */
2020-10-27 13:23:03 +03:00
DBG_DEBUG ( " root override on %s. Granting 0x%x \n " ,
smb_fname_str_dbg ( smb_fname ) ,
( unsigned int ) access_mask ) ;
2011-11-05 01:07:23 +04:00
return NT_STATUS_OK ;
}
2020-10-27 13:23:03 +03:00
if ( ( access_mask & DELETE_ACCESS ) & &
! lp_acl_check_permissions ( SNUM ( conn ) ) )
{
DBG_DEBUG ( " Not checking ACL on DELETE_ACCESS on file %s. "
" Granting 0x%x \n " ,
smb_fname_str_dbg ( smb_fname ) ,
( unsigned int ) access_mask ) ;
2011-06-24 02:06:16 +04:00
return NT_STATUS_OK ;
}
2011-12-17 03:48:03 +04:00
if ( access_mask = = DELETE_ACCESS & &
2020-10-27 13:23:03 +03:00
VALID_STAT ( smb_fname - > st ) & &
S_ISLNK ( smb_fname - > st . st_ex_mode ) )
{
2011-12-16 04:55:32 +04:00
/* We can always delete a symlink. */
2020-10-27 13:23:03 +03:00
DBG_DEBUG ( " Not checking ACL on DELETE_ACCESS on symlink %s. \n " ,
smb_fname_str_dbg ( smb_fname ) ) ;
2011-12-16 04:55:32 +04:00
return NT_STATUS_OK ;
}
2020-10-27 13:23:03 +03:00
if ( sd = = NULL ) {
goto access_denied ;
2008-11-04 12:34:08 +03:00
}
2011-11-05 01:21:35 +04:00
/*
2012-11-15 02:40:50 +04:00
* If we can access the path to this file , by
* default we have FILE_READ_ATTRIBUTES from the
* containing directory . See the section :
* " Algorithm to Check Access to an Existing File "
* in MS - FSA . pdf .
*
* se_file_access_check ( ) also takes care of
2011-11-05 01:21:35 +04:00
* owner WRITE_DAC and READ_CONTROL .
*/
2013-09-02 19:37:50 +04:00
do_not_check_mask = FILE_READ_ATTRIBUTES ;
/*
* Samba 3.6 and earlier granted execute access even
* if the ACL did not contain execute rights .
* Samba 4.0 is more correct and checks it .
2015-07-27 00:02:57 +03:00
* The compatibilty mode allows one to skip this check
2013-09-02 19:37:50 +04:00
* to smoothen upgrades .
*/
if ( lp_acl_allow_execute_always ( SNUM ( conn ) ) ) {
do_not_check_mask | = FILE_EXECUTE ;
}
2012-08-28 03:07:32 +04:00
status = se_file_access_check ( sd ,
2010-03-13 01:31:47 +03:00
get_current_nttok ( conn ) ,
2012-09-14 03:11:31 +04:00
use_privs ,
2013-09-02 19:37:50 +04:00
( access_mask & ~ do_not_check_mask ) ,
2011-10-27 01:58:32 +04:00
& rejected_mask ) ;
2008-11-04 12:34:08 +03:00
2020-10-27 13:23:03 +03:00
DBG_DEBUG ( " File [%s] requesting [0x%x] returning [0x%x] (%s) \n " ,
smb_fname_str_dbg ( smb_fname ) ,
( unsigned int ) access_mask ,
( unsigned int ) rejected_mask ,
nt_errstr ( status ) ) ;
2009-02-03 04:10:27 +03:00
2009-12-16 21:09:11 +03:00
if ( ! NT_STATUS_IS_OK ( status ) ) {
if ( DEBUGLEVEL > = 10 ) {
2020-10-27 13:23:03 +03:00
DBG_DEBUG ( " acl for %s is: \n " ,
smb_fname_str_dbg ( smb_fname ) ) ;
2009-12-16 21:09:11 +03:00
NDR_PRINT_DEBUG ( security_descriptor , sd ) ;
}
}
TALLOC_FREE ( sd ) ;
2011-10-27 01:58:32 +04:00
if ( NT_STATUS_IS_OK ( status ) | |
2020-10-27 13:23:03 +03:00
! NT_STATUS_EQUAL ( status , NT_STATUS_ACCESS_DENIED ) )
{
2011-10-27 01:58:32 +04:00
return status ;
}
/* Here we know status == NT_STATUS_ACCESS_DENIED. */
2011-12-20 23:38:37 +04:00
2020-10-27 13:23:03 +03:00
access_denied :
2011-12-20 23:38:37 +04:00
2011-10-27 01:58:32 +04:00
if ( ( access_mask & FILE_WRITE_ATTRIBUTES ) & &
2020-10-27 13:23:03 +03:00
( rejected_mask & FILE_WRITE_ATTRIBUTES ) & &
! lp_store_dos_attributes ( SNUM ( conn ) ) & &
( lp_map_readonly ( SNUM ( conn ) ) | |
lp_map_archive ( SNUM ( conn ) ) | |
lp_map_hidden ( SNUM ( conn ) ) | |
lp_map_system ( SNUM ( conn ) ) ) )
{
2011-10-27 01:58:32 +04:00
rejected_mask & = ~ FILE_WRITE_ATTRIBUTES ;
2020-10-27 13:23:03 +03:00
DBG_DEBUG ( " overrode FILE_WRITE_ATTRIBUTES on file %s \n " ,
smb_fname_str_dbg ( smb_fname ) ) ;
2011-10-27 01:58:32 +04:00
}
if ( parent_override_delete ( conn ,
2020-10-27 13:23:03 +03:00
smb_fname ,
access_mask ,
rejected_mask ) )
{
/*
* Were we trying to do an open for delete and didn ' t get DELETE
* access . Check if the directory allows DELETE_CHILD .
2011-10-27 01:58:32 +04:00
* See here :
* http : //blogs.msdn.com/oldnewthing/archive/2004/06/04/148426.aspx
2020-10-27 13:23:03 +03:00
* for details .
*/
2011-10-27 01:58:32 +04:00
rejected_mask & = ~ DELETE_ACCESS ;
2020-10-27 13:23:03 +03:00
DBG_DEBUG ( " Overrode DELETE_ACCESS on file %s \n " ,
smb_fname_str_dbg ( smb_fname ) ) ;
2011-10-27 01:58:32 +04:00
}
if ( rejected_mask ! = 0 ) {
return NT_STATUS_ACCESS_DENIED ;
}
2012-02-18 19:49:47 +04:00
return NT_STATUS_OK ;
2008-11-04 12:34:08 +03:00
}
2020-10-27 13:23:03 +03:00
NTSTATUS smbd_check_access_rights ( struct connection_struct * conn ,
struct files_struct * dirfsp ,
const struct smb_filename * smb_fname ,
bool use_privs ,
uint32_t access_mask )
{
/* Check if we have rights to open. */
NTSTATUS status ;
struct security_descriptor * sd = NULL ;
status = SMB_VFS_GET_NT_ACL_AT ( conn ,
dirfsp ,
smb_fname ,
( SECINFO_OWNER |
SECINFO_GROUP |
SECINFO_DACL ) ,
talloc_tos ( ) ,
& sd ) ;
if ( NT_STATUS_EQUAL ( status , NT_STATUS_ACCESS_DENIED ) ) {
status = NT_STATUS_OK ;
}
if ( ! NT_STATUS_IS_OK ( status ) ) {
DEBUG ( 10 , ( " smbd_check_access_rights: Could not get acl "
" on %s: %s \n " ,
smb_fname_str_dbg ( smb_fname ) ,
nt_errstr ( status ) ) ) ;
return status ;
}
return smbd_check_access_rights_sd ( conn ,
smb_fname ,
sd ,
use_privs ,
access_mask ) ;
}
2020-10-27 13:24:03 +03:00
NTSTATUS smbd_check_access_rights_fsp ( struct files_struct * fsp ,
bool use_privs ,
uint32_t access_mask )
{
struct security_descriptor * sd = NULL ;
NTSTATUS status ;
2021-06-04 03:37:57 +03:00
/* Cope with fake/printer fsp's. */
if ( fsp - > fake_file_handle ! = NULL | | fsp - > print_file ! = NULL ) {
if ( ( fsp - > access_mask & access_mask ) ! = access_mask ) {
return NT_STATUS_ACCESS_DENIED ;
}
return NT_STATUS_OK ;
}
2021-06-08 00:45:24 +03:00
if ( fsp_get_pathref_fd ( fsp ) = = - 1 ) {
/*
* This is a POSIX open on a symlink . For the pathname
* verison of this function we used to return the st_mode
* bits turned into an NT ACL . For a symlink the mode bits
* are always rwxrwxrwx which means the pathname version always
* returned NT_STATUS_OK for a symlink . For the handle reference
* to a symlink use the handle access bits .
*/
if ( ( fsp - > access_mask & access_mask ) ! = access_mask ) {
return NT_STATUS_ACCESS_DENIED ;
}
return NT_STATUS_OK ;
}
2020-10-27 13:24:03 +03:00
status = SMB_VFS_FGET_NT_ACL ( fsp ,
( SECINFO_OWNER |
SECINFO_GROUP |
SECINFO_DACL ) ,
talloc_tos ( ) ,
& sd ) ;
if ( ! NT_STATUS_IS_OK ( status ) ) {
DBG_DEBUG ( " Could not get acl on %s: %s \n " ,
fsp_str_dbg ( fsp ) ,
nt_errstr ( status ) ) ;
return status ;
}
return smbd_check_access_rights_sd ( fsp - > conn ,
fsp - > fsp_name ,
sd ,
use_privs ,
access_mask ) ;
}
2021-05-21 01:17:09 +03:00
/*
* Given an fsp that represents a parent directory ,
* check if the requested access can be granted .
*/
NTSTATUS check_parent_access_fsp ( struct files_struct * fsp ,
uint32_t access_mask )
{
NTSTATUS status ;
struct security_descriptor * parent_sd = NULL ;
uint32_t access_granted = 0 ;
struct share_mode_lock * lck = NULL ;
uint32_t name_hash ;
bool delete_on_close_set ;
TALLOC_CTX * frame = talloc_stackframe ( ) ;
if ( get_current_uid ( fsp - > conn ) = = ( uid_t ) 0 ) {
/* I'm sorry sir, I didn't know you were root... */
DBG_DEBUG ( " root override on %s. Granting 0x%x \n " ,
fsp_str_dbg ( fsp ) ,
( unsigned int ) access_mask ) ;
status = NT_STATUS_OK ;
goto out ;
}
status = SMB_VFS_FGET_NT_ACL ( fsp ,
SECINFO_DACL ,
frame ,
& parent_sd ) ;
if ( ! NT_STATUS_IS_OK ( status ) ) {
DBG_INFO ( " SMB_VFS_FGET_NT_ACL failed for "
" %s with error %s \n " ,
fsp_str_dbg ( fsp ) ,
nt_errstr ( status ) ) ;
goto out ;
}
/*
* If we can access the path to this file , by
* default we have FILE_READ_ATTRIBUTES from the
* containing directory . See the section :
* " Algorithm to Check Access to an Existing File "
* in MS - FSA . pdf .
*
* se_file_access_check ( ) also takes care of
* owner WRITE_DAC and READ_CONTROL .
*/
status = se_file_access_check ( parent_sd ,
get_current_nttok ( fsp - > conn ) ,
false ,
( access_mask & ~ FILE_READ_ATTRIBUTES ) ,
& access_granted ) ;
if ( ! NT_STATUS_IS_OK ( status ) ) {
DBG_INFO ( " access check "
" on directory %s for mask 0x%x returned (0x%x) %s \n " ,
fsp_str_dbg ( fsp ) ,
access_mask ,
access_granted ,
nt_errstr ( status ) ) ;
goto out ;
}
if ( ! ( access_mask & ( SEC_DIR_ADD_FILE | SEC_DIR_ADD_SUBDIR ) ) ) {
status = NT_STATUS_OK ;
goto out ;
}
if ( ! lp_check_parent_directory_delete_on_close ( SNUM ( fsp - > conn ) ) ) {
status = NT_STATUS_OK ;
goto out ;
}
/* Check if the directory has delete-on-close set */
status = file_name_hash ( fsp - > conn ,
fsp - > fsp_name - > base_name ,
& name_hash ) ;
if ( ! NT_STATUS_IS_OK ( status ) ) {
goto out ;
}
/*
* Don ' t take a lock here . We just need a snapshot
* of the current state of delete on close and this is
* called in a codepath where we may already have a lock
* ( and we explicitly can ' t hold 2 locks at the same time
* as that may deadlock ) .
*/
lck = fetch_share_mode_unlocked ( frame , fsp - > file_id ) ;
if ( lck = = NULL ) {
status = NT_STATUS_OK ;
goto out ;
}
delete_on_close_set = is_delete_on_close_set ( lck , name_hash ) ;
if ( delete_on_close_set ) {
status = NT_STATUS_DELETE_PENDING ;
goto out ;
}
status = NT_STATUS_OK ;
out :
TALLOC_FREE ( frame ) ;
return status ;
}
2013-10-29 03:59:20 +04:00
/****************************************************************************
Ensure when opening a base file for a stream open that we have permissions
to do so given the access mask on the base file .
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
static NTSTATUS check_base_file_access ( struct connection_struct * conn ,
struct smb_filename * smb_fname ,
uint32_t access_mask )
{
NTSTATUS status ;
2020-05-01 20:09:53 +03:00
status = smbd_calculate_access_mask ( conn ,
2020-05-01 20:13:58 +03:00
conn - > cwd_fsp ,
2020-05-01 20:09:53 +03:00
smb_fname ,
2013-10-29 03:59:20 +04:00
false ,
access_mask ,
& access_mask ) ;
if ( ! NT_STATUS_IS_OK ( status ) ) {
DEBUG ( 10 , ( " smbd_calculate_access_mask "
" on file %s returned %s \n " ,
smb_fname_str_dbg ( smb_fname ) ,
nt_errstr ( status ) ) ) ;
return status ;
}
if ( access_mask & ( FILE_WRITE_DATA | FILE_APPEND_DATA ) ) {
uint32_t dosattrs ;
if ( ! CAN_WRITE ( conn ) ) {
return NT_STATUS_ACCESS_DENIED ;
}
2020-10-19 21:39:37 +03:00
dosattrs = fdos_mode ( smb_fname - > fsp ) ;
2013-10-29 03:59:20 +04:00
if ( IS_DOS_READONLY ( dosattrs ) ) {
return NT_STATUS_ACCESS_DENIED ;
}
}
2021-06-08 00:58:39 +03:00
return smbd_check_access_rights_fsp ( smb_fname - > fsp ,
2013-10-29 03:59:20 +04:00
false ,
access_mask ) ;
}
2016-12-15 23:56:08 +03:00
/****************************************************************************
Handle differing symlink errno ' s
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
2020-11-24 14:30:58 +03:00
static NTSTATUS link_errno_convert ( int err )
2016-12-15 23:56:08 +03:00
{
# if defined(ENOTSUP) && defined(OSF1)
/* handle special Tru64 errno */
if ( err = = ENOTSUP ) {
err = ELOOP ;
}
# endif /* ENOTSUP */
# ifdef EFTYPE
/* fix broken NetBSD errno */
if ( err = = EFTYPE ) {
err = ELOOP ;
}
# endif /* EFTYPE */
/* fix broken FreeBSD errno */
if ( err = = EMLINK ) {
err = ELOOP ;
}
2020-11-24 14:30:58 +03:00
if ( err = = ELOOP ) {
return NT_STATUS_STOPPED_ON_SYMLINK ;
}
return map_nt_error_from_unix ( err ) ;
2016-12-15 23:56:08 +03:00
}
2020-11-24 14:30:58 +03:00
static NTSTATUS non_widelink_open ( const struct files_struct * dirfsp ,
2020-10-13 17:38:18 +03:00
files_struct * fsp ,
2016-12-16 00:04:46 +03:00
struct smb_filename * smb_fname ,
int flags ,
mode_t mode ,
unsigned int link_depth ) ;
/****************************************************************************
Follow a symlink in userspace .
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
2020-11-24 14:30:58 +03:00
static NTSTATUS process_symlink_open ( const struct files_struct * dirfsp ,
2016-12-16 00:04:46 +03:00
files_struct * fsp ,
struct smb_filename * smb_fname ,
int flags ,
mode_t mode ,
unsigned int link_depth )
{
2020-10-13 17:38:18 +03:00
struct connection_struct * conn = dirfsp - > conn ;
2020-04-07 19:41:15 +03:00
const char * conn_rootdir = NULL ;
2021-05-27 08:41:53 +03:00
struct smb_filename conn_rootdir_fname = { 0 } ;
2016-12-16 00:04:46 +03:00
char * link_target = NULL ;
int link_len = - 1 ;
2017-06-30 00:32:47 +03:00
struct smb_filename * oldwd_fname = NULL ;
2016-12-16 00:04:46 +03:00
size_t rootdir_len = 0 ;
2017-06-30 21:32:59 +03:00
struct smb_filename * resolved_fname = NULL ;
2016-12-16 00:04:46 +03:00
char * resolved_name = NULL ;
bool matched = false ;
2020-10-13 17:38:18 +03:00
struct smb_filename * full_fname = NULL ;
2020-11-24 14:30:58 +03:00
NTSTATUS status ;
2016-12-16 00:04:46 +03:00
2020-04-07 19:41:15 +03:00
conn_rootdir = SMB_VFS_CONNECTPATH ( conn , smb_fname ) ;
if ( conn_rootdir = = NULL ) {
2020-11-24 14:30:58 +03:00
return NT_STATUS_NO_MEMORY ;
2020-04-07 19:41:15 +03:00
}
2021-05-27 08:41:53 +03:00
/*
* With shadow_copy2 conn_rootdir can be talloc_freed
* whilst we use it in this function . We must take a copy .
*/
conn_rootdir_fname . base_name = talloc_strdup ( talloc_tos ( ) ,
conn_rootdir ) ;
if ( conn_rootdir_fname . base_name = = NULL ) {
return NT_STATUS_NO_MEMORY ;
}
2020-04-07 19:41:15 +03:00
2016-12-16 00:04:46 +03:00
/*
* Ensure we don ' t get stuck in a symlink loop .
*/
link_depth + + ;
if ( link_depth > = 20 ) {
2020-11-24 14:30:58 +03:00
status = NT_STATUS_STOPPED_ON_SYMLINK ;
2016-12-16 00:04:46 +03:00
goto out ;
}
/* Allocate space for the link target. */
link_target = talloc_array ( talloc_tos ( ) , char , PATH_MAX ) ;
if ( link_target = = NULL ) {
2020-11-24 14:30:58 +03:00
status = NT_STATUS_NO_MEMORY ;
2016-12-16 00:04:46 +03:00
goto out ;
}
2020-04-09 16:42:59 +03:00
/*
* Read the link target . We do this just to verify that smb_fname indeed
2020-11-24 14:30:58 +03:00
* points at a symbolic link and return NT_STATUS_NOT_A_DIRECTORY
2020-04-09 16:42:59 +03:00
* and failure in case smb_fname is NOT a symlink .
*
* The caller needs this piece of information to distinguish two cases
* where open ( ) fails with errno = ENOTDIR , cf the comment in
* non_widelink_open ( ) .
*
* We rely on SMB_VFS_REALPATH ( ) to resolve the path including the
* symlink . Once we have SMB_VFS_STATX ( ) or something similar in our VFS
* we may want to use that instead of SMB_VFS_READLINKAT ( ) .
*/
2019-08-23 00:41:27 +03:00
link_len = SMB_VFS_READLINKAT ( conn ,
2020-10-13 17:38:18 +03:00
dirfsp ,
2017-06-08 01:03:37 +03:00
smb_fname ,
2016-12-16 00:04:46 +03:00
link_target ,
PATH_MAX - 1 ) ;
if ( link_len = = - 1 ) {
2020-11-24 14:30:58 +03:00
status = NT_STATUS_INVALID_PARAMETER ;
2016-12-16 00:04:46 +03:00
goto out ;
}
2020-10-13 17:38:18 +03:00
full_fname = full_path_from_dirfsp_atname (
talloc_tos ( ) , dirfsp , smb_fname ) ;
if ( full_fname = = NULL ) {
2020-11-24 14:30:58 +03:00
status = NT_STATUS_NO_MEMORY ;
2020-10-13 17:38:18 +03:00
goto out ;
}
2016-12-16 00:04:46 +03:00
/* Convert to an absolute path. */
2020-10-13 17:38:18 +03:00
resolved_fname = SMB_VFS_REALPATH ( conn , talloc_tos ( ) , full_fname ) ;
2017-06-30 21:32:59 +03:00
if ( resolved_fname = = NULL ) {
2020-11-24 14:30:58 +03:00
status = map_nt_error_from_unix ( errno ) ;
2016-12-16 00:04:46 +03:00
goto out ;
}
2017-06-30 21:32:59 +03:00
resolved_name = resolved_fname - > base_name ;
2016-12-16 00:04:46 +03:00
/*
* We know conn_rootdir starts with ' / ' and
* does not end in ' / ' . FIXME ! Should we
* smb_assert this ?
*/
2020-04-07 19:41:15 +03:00
rootdir_len = strlen ( conn_rootdir_fname . base_name ) ;
2016-12-16 00:04:46 +03:00
2020-04-07 19:41:15 +03:00
matched = ( strncmp ( conn_rootdir_fname . base_name ,
2017-06-29 21:29:33 +03:00
resolved_name ,
rootdir_len ) = = 0 ) ;
2016-12-16 00:04:46 +03:00
if ( ! matched ) {
2020-11-24 14:30:58 +03:00
status = NT_STATUS_STOPPED_ON_SYMLINK ;
2016-12-16 00:04:46 +03:00
goto out ;
}
/*
* Turn into a path relative to the share root .
*/
if ( resolved_name [ rootdir_len ] = = ' \0 ' ) {
/* Link to the root of the share. */
2017-06-30 21:32:59 +03:00
TALLOC_FREE ( smb_fname - > base_name ) ;
smb_fname - > base_name = talloc_strdup ( smb_fname , " . " ) ;
2016-12-16 00:04:46 +03:00
} else if ( resolved_name [ rootdir_len ] = = ' / ' ) {
2017-06-30 21:32:59 +03:00
TALLOC_FREE ( smb_fname - > base_name ) ;
smb_fname - > base_name = talloc_strdup ( smb_fname ,
& resolved_name [ rootdir_len + 1 ] ) ;
2016-12-16 00:04:46 +03:00
} else {
2020-11-24 14:30:58 +03:00
status = NT_STATUS_STOPPED_ON_SYMLINK ;
2016-12-16 00:04:46 +03:00
goto out ;
}
2017-06-30 21:32:59 +03:00
if ( smb_fname - > base_name = = NULL ) {
2020-11-24 14:30:58 +03:00
status = NT_STATUS_NO_MEMORY ;
2017-06-30 21:32:59 +03:00
goto out ;
}
2020-10-13 17:38:18 +03:00
oldwd_fname = vfs_GetWd ( talloc_tos ( ) , dirfsp - > conn ) ;
2017-06-30 00:32:47 +03:00
if ( oldwd_fname = = NULL ) {
2020-11-24 14:30:58 +03:00
status = map_nt_error_from_unix ( errno ) ;
2016-12-16 00:04:46 +03:00
goto out ;
}
/* Ensure we operate from the root of the share. */
2020-04-07 19:41:15 +03:00
if ( vfs_ChDir ( conn , & conn_rootdir_fname ) = = - 1 ) {
2020-11-24 14:30:58 +03:00
status = map_nt_error_from_unix ( errno ) ;
2016-12-16 00:04:46 +03:00
goto out ;
}
2020-10-13 17:38:18 +03:00
/*
* And do it all again . . . As smb_fname is not relative to the passed in
* dirfsp anymore , we pass conn - > cwd_fsp as dirfsp to
* non_widelink_open ( ) to trigger the chdir ( parentdir ) logic .
*/
2020-11-24 14:30:58 +03:00
status = non_widelink_open ( conn - > cwd_fsp ,
2020-10-13 17:38:18 +03:00
fsp ,
2016-12-16 00:04:46 +03:00
smb_fname ,
flags ,
mode ,
link_depth ) ;
out :
2017-06-30 21:32:59 +03:00
TALLOC_FREE ( resolved_fname ) ;
2016-12-16 00:04:46 +03:00
TALLOC_FREE ( link_target ) ;
2021-05-27 08:41:53 +03:00
TALLOC_FREE ( conn_rootdir_fname . base_name ) ;
2017-06-30 00:32:47 +03:00
if ( oldwd_fname ! = NULL ) {
int ret = vfs_ChDir ( conn , oldwd_fname ) ;
2016-12-16 00:04:46 +03:00
if ( ret = = - 1 ) {
smb_panic ( " unable to get back to old directory \n " ) ;
}
2017-06-30 00:32:47 +03:00
TALLOC_FREE ( oldwd_fname ) ;
2016-12-16 00:04:46 +03:00
}
2020-11-24 14:30:58 +03:00
return status ;
2016-12-16 00:04:46 +03:00
}
/****************************************************************************
Non - widelink open .
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
2020-11-24 14:30:58 +03:00
static NTSTATUS non_widelink_open ( const struct files_struct * dirfsp ,
2020-10-13 17:38:18 +03:00
files_struct * fsp ,
2020-05-08 16:45:11 +03:00
struct smb_filename * smb_fname ,
int flags ,
mode_t mode ,
unsigned int link_depth )
2016-12-16 00:04:46 +03:00
{
2020-05-08 16:46:02 +03:00
struct connection_struct * conn = fsp - > conn ;
2020-11-24 14:30:58 +03:00
NTSTATUS saved_status ;
NTSTATUS status = NT_STATUS_OK ;
2016-12-16 00:04:46 +03:00
int fd = - 1 ;
2020-10-19 11:16:06 +03:00
struct smb_filename * orig_fsp_name = fsp - > fsp_name ;
2020-11-16 15:54:49 +03:00
struct smb_filename * orig_base_fsp_name = NULL ;
2016-12-16 00:04:46 +03:00
struct smb_filename * smb_fname_rel = NULL ;
2020-11-16 15:54:49 +03:00
struct smb_filename base_smb_fname_rel ;
2017-06-30 00:32:47 +03:00
struct smb_filename * oldwd_fname = NULL ;
2020-04-28 17:40:25 +03:00
struct smb_filename * parent_dir_fname = NULL ;
2020-09-29 11:00:21 +03:00
bool have_opath = false ;
2020-11-16 15:54:49 +03:00
int ret ;
2016-12-16 00:04:46 +03:00
2020-09-29 11:00:21 +03:00
# ifdef O_PATH
have_opath = true ;
# endif
2020-11-24 14:30:28 +03:00
if ( dirfsp = = conn - > cwd_fsp ) {
if ( fsp - > fsp_flags . is_directory ) {
parent_dir_fname = cp_smb_filename ( talloc_tos ( ) , smb_fname ) ;
if ( parent_dir_fname = = NULL ) {
2020-11-24 14:30:58 +03:00
status = NT_STATUS_NO_MEMORY ;
2020-11-24 14:30:28 +03:00
goto out ;
}
smb_fname_rel = synthetic_smb_fname ( parent_dir_fname ,
" . " ,
smb_fname - > stream_name ,
& smb_fname - > st ,
smb_fname - > twrp ,
smb_fname - > flags ) ;
if ( smb_fname_rel = = NULL ) {
2020-11-24 14:30:58 +03:00
status = NT_STATUS_NO_MEMORY ;
2020-11-24 14:30:28 +03:00
goto out ;
}
} else {
2021-05-26 21:43:16 +03:00
status = SMB_VFS_PARENT_PATHNAME ( fsp - > conn ,
talloc_tos ( ) ,
smb_fname ,
& parent_dir_fname ,
& smb_fname_rel ) ;
if ( ! NT_STATUS_IS_OK ( status ) ) {
2020-11-24 14:30:28 +03:00
goto out ;
}
2017-07-07 13:57:57 +03:00
}
2020-11-24 14:30:28 +03:00
oldwd_fname = vfs_GetWd ( talloc_tos ( ) , conn ) ;
if ( oldwd_fname = = NULL ) {
2020-11-24 14:30:58 +03:00
status = map_nt_error_from_unix ( errno ) ;
2020-04-28 17:40:25 +03:00
goto out ;
}
2020-11-24 14:30:28 +03:00
/* Pin parent directory in place. */
if ( vfs_ChDir ( conn , parent_dir_fname ) = = - 1 ) {
2020-11-24 14:30:58 +03:00
status = map_nt_error_from_unix ( errno ) ;
2017-07-07 13:57:57 +03:00
goto out ;
}
2016-12-16 00:04:46 +03:00
2020-11-24 14:30:28 +03:00
/* Ensure the relative path is below the share. */
status = check_reduced_name ( conn , parent_dir_fname , smb_fname_rel ) ;
if ( ! NT_STATUS_IS_OK ( status ) ) {
goto out ;
}
2016-12-16 00:04:46 +03:00
2020-11-24 14:30:28 +03:00
/* Setup fsp->fsp_name to be relative to cwd */
fsp - > fsp_name = smb_fname_rel ;
2020-11-16 15:54:49 +03:00
/* Also setup base_fsp to be relative to the new cwd */
if ( fsp - > base_fsp ! = NULL ) {
base_smb_fname_rel = ( struct smb_filename ) {
. base_name = smb_fname_rel - > base_name ,
} ;
orig_base_fsp_name = fsp - > base_fsp - > fsp_name ;
fsp - > base_fsp - > fsp_name = & base_smb_fname_rel ;
}
2020-11-24 14:30:28 +03:00
} else {
/*
* fsp - > fsp_name is unchanged as it is already correctly
* relative to conn - > cwd .
*/
smb_fname_rel = smb_fname ;
2017-06-30 21:59:20 +03:00
}
2016-12-16 00:04:46 +03:00
flags | = O_NOFOLLOW ;
2020-07-02 09:02:45 +03:00
fd = SMB_VFS_OPENAT ( conn ,
2020-10-13 17:38:18 +03:00
dirfsp ,
2020-07-02 09:02:45 +03:00
smb_fname_rel ,
fsp ,
flags ,
mode ) ;
2020-11-24 14:30:58 +03:00
if ( fd = = - 1 ) {
status = link_errno_convert ( errno ) ;
}
2020-10-12 14:21:07 +03:00
fsp_set_fd ( fsp , fd ) ;
2016-12-16 00:04:46 +03:00
2020-11-16 15:54:49 +03:00
if ( fd ! = - 1 ) {
ret = SMB_VFS_FSTAT ( fsp , & orig_fsp_name - > st ) ;
if ( ret ! = 0 ) {
status = map_nt_error_from_unix ( errno ) ;
goto out ;
}
fsp - > fsp_name - > st = orig_fsp_name - > st ;
}
if ( ! is_ntfs_stream_smb_fname ( fsp - > fsp_name ) & &
2020-09-29 11:00:21 +03:00
fsp - > fsp_flags . is_pathref & &
have_opath )
{
/*
* Opening with O_PATH and O_NOFOLLOW opens a handle on the
* symlink . In follow symlink = yes mode we must avoid this and
* instead should open a handle on the symlink target .
*
* Check for this case by doing an fstat , forcing
* process_symlink_open ( ) codepath down below by setting fd = - 1
* and errno = ELOOP .
*/
if ( S_ISLNK ( fsp - > fsp_name - > st . st_ex_mode ) ) {
ret = SMB_VFS_CLOSE ( fsp ) ;
SMB_ASSERT ( ret = = 0 ) ;
fsp_set_fd ( fsp , - 1 ) ;
fd = - 1 ;
2020-11-24 14:30:58 +03:00
status = NT_STATUS_STOPPED_ON_SYMLINK ;
2020-09-29 11:00:21 +03:00
}
}
2020-11-24 14:30:58 +03:00
if ( ( fd = = - 1 ) & &
( NT_STATUS_EQUAL ( status , NT_STATUS_STOPPED_ON_SYMLINK ) | |
NT_STATUS_EQUAL ( status , NT_STATUS_NOT_A_DIRECTORY ) ) )
{
2017-06-23 16:39:21 +03:00
/*
* Trying to open a symlink to a directory with O_NOFOLLOW and
* O_DIRECTORY can return either of ELOOP and ENOTDIR . So
* ENOTDIR really means : might be a symlink , but we ' re not sure .
* In this case , we just assume there ' s a symlink . If we were
* wrong , process_symlink_open ( ) will return EINVAL . We check
* this below , and fall back to returning the initial
* saved_errno .
*
* BUG : https : //bugzilla.samba.org/show_bug.cgi?id=12860
*/
2020-11-24 14:30:58 +03:00
saved_status = status ;
2020-10-19 11:19:28 +03:00
2020-11-24 14:30:58 +03:00
if ( fsp - > fsp_name - > flags & SMB_FILENAME_POSIX_PATH ) {
/* Never follow symlinks on posix open. */
goto out ;
}
if ( ! lp_follow_symlinks ( SNUM ( conn ) ) ) {
/* Explicitly no symlinks. */
goto out ;
}
fsp - > fsp_name = orig_fsp_name ;
/*
* We may have a symlink . Follow in userspace
* to ensure it ' s under the share definition .
*/
status = process_symlink_open ( dirfsp ,
fsp ,
smb_fname_rel ,
flags ,
mode ,
link_depth ) ;
if ( NT_STATUS_EQUAL ( status , NT_STATUS_INVALID_PARAMETER ) & &
NT_STATUS_EQUAL ( saved_status , NT_STATUS_NOT_A_DIRECTORY ) )
{
status = saved_status ;
2016-12-16 00:04:46 +03:00
}
}
out :
2020-10-19 11:19:28 +03:00
fsp - > fsp_name = orig_fsp_name ;
2020-11-16 15:54:49 +03:00
if ( fsp - > base_fsp ! = NULL ) {
fsp - > base_fsp - > fsp_name = orig_base_fsp_name ;
}
2020-04-28 17:40:25 +03:00
TALLOC_FREE ( parent_dir_fname ) ;
2016-12-16 00:04:46 +03:00
2017-06-30 00:32:47 +03:00
if ( oldwd_fname ! = NULL ) {
2020-11-16 15:54:49 +03:00
ret = vfs_ChDir ( conn , oldwd_fname ) ;
2016-12-16 00:04:46 +03:00
if ( ret = = - 1 ) {
smb_panic ( " unable to get back to old directory \n " ) ;
}
2017-06-30 00:32:47 +03:00
TALLOC_FREE ( oldwd_fname ) ;
2016-12-16 00:04:46 +03:00
}
2020-11-24 14:30:58 +03:00
return status ;
2016-12-16 00:04:46 +03:00
}
1998-08-17 17:11:34 +04:00
/****************************************************************************
2000-04-12 01:38:45 +04:00
fd support routines - attempt to do a dos_open .
1998-08-17 17:11:34 +04:00
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
2000-04-12 01:38:45 +04:00
2020-10-13 15:38:28 +03:00
NTSTATUS fd_openat ( const struct files_struct * dirfsp ,
struct smb_filename * smb_fname ,
files_struct * fsp ,
int flags ,
mode_t mode )
1998-08-17 17:11:34 +04:00
{
2020-04-10 17:58:16 +03:00
struct connection_struct * conn = fsp - > conn ;
2007-02-21 04:55:08 +03:00
NTSTATUS status = NT_STATUS_OK ;
2006-07-11 22:01:26 +04:00
2016-12-15 23:52:13 +03:00
/*
2007-05-23 02:35:13 +04:00
* Never follow symlinks on a POSIX client . The
* client should be doing this .
*/
2015-11-27 20:29:55 +03:00
if ( ( fsp - > posix_flags & FSP_POSIX_FLAGS_OPEN ) | | ! lp_follow_symlinks ( SNUM ( conn ) ) ) {
2002-01-12 03:50:01 +03:00
flags | = O_NOFOLLOW ;
2005-07-08 08:51:27 +04:00
}
2002-01-12 03:50:01 +03:00
2020-04-07 03:44:56 +03:00
/*
* Only follow symlinks within a share
* definition .
*/
2020-11-24 14:30:58 +03:00
status = non_widelink_open ( dirfsp , fsp , smb_fname , flags , mode , 0 ) ;
if ( ! NT_STATUS_IS_OK ( status ) ) {
if ( NT_STATUS_EQUAL ( status , NT_STATUS_TOO_MANY_OPENED_FILES ) ) {
2009-02-19 20:33:30 +03:00
static time_t last_warned = 0L ;
if ( time ( ( time_t * ) NULL ) > last_warned ) {
DEBUG ( 0 , ( " Too many open files, unable "
" to open more! smbd's max "
" open files = %d \n " ,
lp_max_open_files ( ) ) ) ;
last_warned = time ( ( time_t * ) NULL ) ;
}
}
2020-03-04 12:32:43 +03:00
DBG_DEBUG ( " name %s, flags = 0%o mode = 0%o, fd = %d. %s \n " ,
smb_fname_str_dbg ( smb_fname ) , flags , ( int ) mode ,
2020-11-24 14:30:58 +03:00
fsp_get_pathref_fd ( fsp ) , nt_errstr ( status ) ) ;
2020-03-04 12:32:43 +03:00
return status ;
2007-02-21 04:55:08 +03:00
}
1998-08-17 17:11:34 +04:00
2020-03-04 12:32:43 +03:00
DBG_DEBUG ( " name %s, flags = 0%o mode = 0%o, fd = %d \n " ,
2020-11-24 14:30:58 +03:00
smb_fname_str_dbg ( smb_fname ) , flags , ( int ) mode ,
fsp_get_pathref_fd ( fsp ) ) ;
2000-04-12 01:38:45 +04:00
2007-02-21 04:55:08 +03:00
return status ;
1998-08-17 17:11:34 +04:00
}
/****************************************************************************
2000-04-12 01:38:45 +04:00
Close the file associated with a fsp .
1998-08-17 17:11:34 +04:00
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
2000-04-12 01:38:45 +04:00
2007-12-22 04:01:26 +03:00
NTSTATUS fd_close ( files_struct * fsp )
1998-08-17 17:11:34 +04:00
{
2008-01-11 14:18:33 +03:00
int ret ;
2020-06-13 17:22:20 +03:00
if ( fsp = = fsp - > conn - > cwd_fsp ) {
return NT_STATUS_OK ;
}
2011-02-09 02:05:00 +03:00
if ( fsp - > dptr ) {
dptr_CloseDir ( fsp ) ;
}
2020-10-03 22:24:29 +03:00
if ( fsp_get_pathref_fd ( fsp ) = = - 1 ) {
2019-08-04 10:29:44 +03:00
/*
* Either a directory where the dptr_CloseDir ( ) already closed
* the fd or a stat open .
*/
return NT_STATUS_OK ;
2005-07-08 08:51:27 +04:00
}
2020-09-28 11:37:36 +03:00
if ( fh_get_refcount ( fsp - > fh ) > 1 ) {
2007-02-07 00:05:34 +03:00
return NT_STATUS_OK ; /* Shared handle. Only close last reference. */
2005-07-08 08:51:27 +04:00
}
2008-01-11 14:18:33 +03:00
2008-01-11 16:19:28 +03:00
ret = SMB_VFS_CLOSE ( fsp ) ;
2020-09-26 22:46:51 +03:00
fsp_set_fd ( fsp , - 1 ) ;
2008-01-11 14:18:33 +03:00
if ( ret = = - 1 ) {
return map_nt_error_from_unix ( errno ) ;
}
return NT_STATUS_OK ;
1998-08-17 17:11:34 +04:00
}
2005-03-15 04:19:58 +03:00
/****************************************************************************
Change the ownership of a file to that of the parent directory .
Do this by fd if possible .
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
2008-10-30 03:28:19 +03:00
void change_file_owner_to_parent ( connection_struct * conn ,
2020-04-29 12:03:11 +03:00
struct smb_filename * smb_fname_parent ,
files_struct * fsp )
2006-12-24 18:29:09 +03:00
{
int ret ;
2009-06-23 02:26:56 +04:00
ret = SMB_VFS_STAT ( conn , smb_fname_parent ) ;
2006-12-24 18:29:09 +03:00
if ( ret = = - 1 ) {
2006-12-27 13:57:59 +03:00
DEBUG ( 0 , ( " change_file_owner_to_parent: failed to stat parent "
2006-12-24 18:29:09 +03:00
" directory %s. Error was %s \n " ,
2009-06-23 02:26:56 +04:00
smb_fname_str_dbg ( smb_fname_parent ) ,
strerror ( errno ) ) ) ;
2011-04-14 23:49:58 +04:00
TALLOC_FREE ( smb_fname_parent ) ;
return ;
}
if ( smb_fname_parent - > st . st_ex_uid = = fsp - > fsp_name - > st . st_ex_uid ) {
/* Already this uid - no need to change. */
DEBUG ( 10 , ( " change_file_owner_to_parent: file %s "
" is already owned by uid %d \n " ,
fsp_str_dbg ( fsp ) ,
( int ) fsp - > fsp_name - > st . st_ex_uid ) ) ;
TALLOC_FREE ( smb_fname_parent ) ;
2006-12-24 18:29:09 +03:00
return ;
}
become_root ( ) ;
2009-06-23 02:26:56 +04:00
ret = SMB_VFS_FCHOWN ( fsp , smb_fname_parent - > st . st_ex_uid , ( gid_t ) - 1 ) ;
2006-12-24 18:29:09 +03:00
unbecome_root ( ) ;
if ( ret = = - 1 ) {
2006-12-27 13:57:59 +03:00
DEBUG ( 0 , ( " change_file_owner_to_parent: failed to fchown "
2006-12-24 18:29:09 +03:00
" file %s to parent directory uid %u. Error "
2009-07-11 01:50:37 +04:00
" was %s \n " , fsp_str_dbg ( fsp ) ,
2009-06-23 02:26:56 +04:00
( unsigned int ) smb_fname_parent - > st . st_ex_uid ,
2006-12-24 18:29:09 +03:00
strerror ( errno ) ) ) ;
2011-04-13 03:32:37 +04:00
} else {
DEBUG ( 10 , ( " change_file_owner_to_parent: changed new file %s to "
" parent directory uid %u. \n " , fsp_str_dbg ( fsp ) ,
( unsigned int ) smb_fname_parent - > st . st_ex_uid ) ) ;
2011-06-08 03:48:14 +04:00
/* Ensure the uid entry is updated. */
fsp - > fsp_name - > st . st_ex_uid = smb_fname_parent - > st . st_ex_uid ;
2006-12-24 18:29:09 +03:00
}
}
2017-06-29 21:29:33 +03:00
static NTSTATUS change_dir_owner_to_parent ( connection_struct * conn ,
2020-04-29 12:05:25 +03:00
struct smb_filename * smb_fname_parent ,
2017-06-29 21:29:33 +03:00
struct smb_filename * smb_dname ,
SMB_STRUCT_STAT * psbuf )
2005-03-15 04:19:58 +03:00
{
int ret ;
2009-06-23 02:26:56 +04:00
ret = SMB_VFS_STAT ( conn , smb_fname_parent ) ;
2005-03-15 04:19:58 +03:00
if ( ret = = - 1 ) {
2006-12-27 13:57:59 +03:00
DEBUG ( 0 , ( " change_dir_owner_to_parent: failed to stat parent "
2005-07-08 08:51:27 +04:00
" directory %s. Error was %s \n " ,
2009-06-23 02:26:56 +04:00
smb_fname_str_dbg ( smb_fname_parent ) ,
strerror ( errno ) ) ) ;
2020-12-14 13:20:46 +03:00
return map_nt_error_from_unix ( errno ) ;
2006-12-24 18:29:09 +03:00
}
2005-03-15 04:19:58 +03:00
2020-12-14 13:20:46 +03:00
if ( smb_fname_parent - > st . st_ex_uid = = smb_dname - > st . st_ex_uid ) {
2011-04-14 23:49:58 +04:00
/* Already this uid - no need to change. */
DEBUG ( 10 , ( " change_dir_owner_to_parent: directory %s "
" is already owned by uid %d \n " ,
2017-06-29 21:29:33 +03:00
smb_dname - > base_name ,
2020-12-14 13:20:46 +03:00
( int ) smb_dname - > st . st_ex_uid ) ) ;
return NT_STATUS_OK ;
2011-04-14 23:49:58 +04:00
}
2006-12-24 18:29:09 +03:00
become_root ( ) ;
2020-12-14 13:20:46 +03:00
ret = SMB_VFS_FCHOWN ( smb_dname - > fsp ,
smb_fname_parent - > st . st_ex_uid ,
( gid_t ) - 1 ) ;
2006-12-24 18:29:09 +03:00
unbecome_root ( ) ;
if ( ret = = - 1 ) {
2006-12-27 13:57:59 +03:00
DEBUG ( 10 , ( " change_dir_owner_to_parent: failed to chown "
2006-12-24 18:29:09 +03:00
" directory %s to parent directory uid %u. "
2017-06-29 21:29:33 +03:00
" Error was %s \n " ,
smb_dname - > base_name ,
2009-06-23 02:26:56 +04:00
( unsigned int ) smb_fname_parent - > st . st_ex_uid ,
strerror ( errno ) ) ) ;
2020-12-14 13:20:46 +03:00
return map_nt_error_from_unix ( errno ) ;
2006-12-24 18:29:09 +03:00
}
2005-03-15 04:19:58 +03:00
2020-12-14 13:20:46 +03:00
DBG_DEBUG ( " changed ownership of new "
" directory %s to parent directory uid %u. \n " ,
smb_dname - > base_name ,
( unsigned int ) smb_fname_parent - > st . st_ex_uid ) ;
/* Ensure the uid entry is updated. */
psbuf - > st_ex_uid = smb_fname_parent - > st . st_ex_uid ;
return NT_STATUS_OK ;
2005-03-15 04:19:58 +03:00
}
2012-07-10 03:59:49 +04:00
/****************************************************************************
Open a file - returning a guaranteed ATOMIC indication of if the
file was created or not .
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
2020-04-10 17:54:53 +03:00
static NTSTATUS fd_open_atomic ( files_struct * fsp ,
2020-05-08 16:24:04 +03:00
int flags ,
mode_t mode ,
bool * file_created )
2012-07-10 03:59:49 +04:00
{
NTSTATUS status = NT_STATUS_UNSUCCESSFUL ;
2017-02-16 02:42:52 +03:00
NTSTATUS retry_status ;
2012-07-10 03:59:49 +04:00
bool file_existed = VALID_STAT ( fsp - > fsp_name - > st ) ;
2017-02-16 02:42:52 +03:00
int curr_flags ;
2012-07-10 03:59:49 +04:00
if ( ! ( flags & O_CREAT ) ) {
/*
* We ' re not creating the file , just pass through .
*/
2020-10-13 15:38:28 +03:00
status = fd_openat ( fsp - > conn - > cwd_fsp , fsp - > fsp_name , fsp , flags , mode ) ;
2019-07-24 18:39:59 +03:00
* file_created = false ;
return status ;
2012-07-10 03:59:49 +04:00
}
if ( flags & O_EXCL ) {
/*
* Fail if already exists , just pass through .
*/
2020-10-13 15:38:28 +03:00
status = fd_openat ( fsp - > conn - > cwd_fsp , fsp - > fsp_name , fsp , flags , mode ) ;
2012-09-03 14:57:18 +04:00
/*
* Here we ' ve opened with O_CREAT | O_EXCL . If that went
* NT_STATUS_OK , we * know * we created this file .
*/
* file_created = NT_STATUS_IS_OK ( status ) ;
2012-07-10 03:59:49 +04:00
return status ;
}
/*
* Now it gets tricky . We have O_CREAT , but not O_EXCL .
* To know absolutely if we created the file or not ,
* we can never call O_CREAT without O_EXCL . So if
* we think the file existed , try without O_CREAT | O_EXCL .
* If we think the file didn ' t exist , try with
2017-02-16 02:42:52 +03:00
* O_CREAT | O_EXCL .
*
* The big problem here is dangling symlinks . Opening
* without O_NOFOLLOW means both bad symlink
* and missing path return - 1 , ENOENT from open ( ) . As POSIX
* is pathname based it ' s not possible to tell
* the difference between these two cases in a
* non - racy way , so change to try only two attempts before
* giving up .
*
* We don ' t have this problem for the O_NOFOLLOW
* case as it just returns NT_STATUS_OBJECT_PATH_NOT_FOUND
* mapped from the ELOOP POSIX error .
2012-07-10 03:59:49 +04:00
*/
2017-02-16 02:42:52 +03:00
if ( file_existed ) {
2019-07-24 18:39:59 +03:00
curr_flags = flags & ~ ( O_CREAT ) ;
2017-02-16 02:42:52 +03:00
retry_status = NT_STATUS_OBJECT_NAME_NOT_FOUND ;
} else {
2019-07-24 18:39:59 +03:00
curr_flags = flags | O_EXCL ;
2017-02-16 02:42:52 +03:00
retry_status = NT_STATUS_OBJECT_NAME_COLLISION ;
}
2020-10-13 15:38:28 +03:00
status = fd_openat ( fsp - > conn - > cwd_fsp , fsp - > fsp_name , fsp , curr_flags , mode ) ;
2017-02-16 02:42:52 +03:00
if ( NT_STATUS_IS_OK ( status ) ) {
2019-07-24 18:39:59 +03:00
* file_created = ! file_existed ;
2017-02-16 02:42:52 +03:00
return NT_STATUS_OK ;
}
2019-07-24 18:39:59 +03:00
if ( NT_STATUS_EQUAL ( status , retry_status ) ) {
2017-02-16 02:42:52 +03:00
2019-07-24 18:39:59 +03:00
file_existed = ! file_existed ;
2017-02-16 02:42:52 +03:00
2019-07-24 18:39:59 +03:00
DBG_DEBUG ( " File %s %s. Retry. \n " ,
fsp_str_dbg ( fsp ) ,
file_existed ? " existed " : " did not exist " ) ;
2017-02-16 02:42:52 +03:00
2019-07-24 18:39:59 +03:00
if ( file_existed ) {
curr_flags = flags & ~ ( O_CREAT ) ;
} else {
curr_flags = flags | O_EXCL ;
}
2017-02-16 02:42:52 +03:00
2020-10-13 15:38:28 +03:00
status = fd_openat ( fsp - > conn - > cwd_fsp , fsp - > fsp_name , fsp , curr_flags , mode ) ;
2017-02-16 02:42:52 +03:00
}
2019-07-24 18:39:59 +03:00
* file_created = ( NT_STATUS_IS_OK ( status ) & & ! file_existed ) ;
2012-07-10 03:59:49 +04:00
return status ;
}
2020-10-12 16:28:08 +03:00
static NTSTATUS reopen_from_procfd ( struct files_struct * fsp ,
int flags ,
mode_t mode )
{
struct smb_filename proc_fname ;
const char * p = NULL ;
char buf [ PATH_MAX ] ;
int old_fd ;
int new_fd ;
NTSTATUS status ;
int ret ;
if ( ! fsp - > fsp_flags . have_proc_fds ) {
return NT_STATUS_MORE_PROCESSING_REQUIRED ;
}
old_fd = fsp_get_pathref_fd ( fsp ) ;
if ( old_fd = = - 1 ) {
return NT_STATUS_MORE_PROCESSING_REQUIRED ;
}
if ( ! fsp - > fsp_flags . is_pathref ) {
DBG_ERR ( " [%s] is not a pathref \n " ,
2020-12-23 18:03:37 +03:00
fsp_str_dbg ( fsp ) ) ;
2020-10-12 16:28:08 +03:00
# ifdef DEVELOPER
smb_panic ( " Not a pathref " ) ;
# endif
return NT_STATUS_INVALID_HANDLE ;
}
p = sys_proc_fd_path ( old_fd , buf , sizeof ( buf ) ) ;
if ( p = = NULL ) {
return NT_STATUS_NO_MEMORY ;
}
proc_fname = ( struct smb_filename ) {
. base_name = discard_const_p ( char , p ) ,
} ;
fsp - > fsp_flags . is_pathref = false ;
new_fd = SMB_VFS_OPENAT ( fsp - > conn ,
fsp - > conn - > cwd_fsp ,
& proc_fname ,
fsp ,
flags ,
mode ) ;
if ( new_fd = = - 1 ) {
status = map_nt_error_from_unix ( errno ) ;
SMB_VFS_CLOSE ( fsp ) ;
fsp_set_fd ( fsp , - 1 ) ;
return status ;
}
ret = SMB_VFS_CLOSE ( fsp ) ;
fsp_set_fd ( fsp , - 1 ) ;
if ( ret ! = 0 ) {
return map_nt_error_from_unix ( errno ) ;
}
fsp_set_fd ( fsp , new_fd ) ;
return NT_STATUS_OK ;
}
2020-12-23 17:48:36 +03:00
static NTSTATUS reopen_from_fsp ( struct files_struct * fsp ,
int flags ,
mode_t mode ,
bool * p_file_created )
{
bool __unused_file_created = false ;
NTSTATUS status ;
if ( p_file_created = = NULL ) {
p_file_created = & __unused_file_created ;
}
/*
* TODO : should we move this to the VFS layer ?
* SMB_VFS_REOPEN_FSP ( ) ?
*/
status = reopen_from_procfd ( fsp ,
flags ,
mode ) ;
if ( NT_STATUS_EQUAL ( status , NT_STATUS_MORE_PROCESSING_REQUIRED ) ) {
/*
* Close the existing pathref fd and set the fsp flag
* is_pathref to false so we get a " normal " fd this
* time .
*/
status = fd_close ( fsp ) ;
if ( ! NT_STATUS_IS_OK ( status ) ) {
return status ;
}
fsp - > fsp_flags . is_pathref = false ;
status = fd_open_atomic ( fsp ,
flags ,
mode ,
p_file_created ) ;
}
return status ;
}
1998-08-17 17:11:34 +04:00
/****************************************************************************
2000-04-12 01:38:45 +04:00
Open a file .
1998-08-17 17:11:34 +04:00
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
1999-12-13 16:27:58 +03:00
2006-07-11 22:01:26 +04:00
static NTSTATUS open_file ( files_struct * fsp ,
2007-07-05 20:26:27 +04:00
struct smb_request * req ,
2020-04-29 11:43:05 +03:00
struct smb_filename * parent_dir ,
2006-07-25 12:51:54 +04:00
int flags ,
mode_t unx_mode ,
2015-04-27 02:02:55 +03:00
uint32_t access_mask , /* client requested access mask. */
uint32_t open_access_mask , /* what we're actually using in the open. */
2020-10-26 14:31:10 +03:00
uint32_t private_flags ,
2012-07-10 03:59:49 +04:00
bool * p_file_created )
1998-08-17 17:11:34 +04:00
{
2020-04-10 17:52:07 +03:00
connection_struct * conn = fsp - > conn ;
2009-12-04 03:45:35 +03:00
struct smb_filename * smb_fname = fsp - > fsp_name ;
2007-02-21 04:55:08 +03:00
NTSTATUS status = NT_STATUS_OK ;
2000-04-10 17:05:23 +04:00
int accmode = ( flags & O_ACCMODE ) ;
2001-04-16 04:02:29 +04:00
int local_flags = flags ;
2009-12-04 03:45:35 +03:00
bool file_existed = VALID_STAT ( fsp - > fsp_name - > st ) ;
2020-03-04 12:54:18 +03:00
uint32_t need_fd_mask =
FILE_READ_DATA |
FILE_WRITE_DATA |
FILE_APPEND_DATA |
FILE_EXECUTE |
WRITE_DAC_ACCESS |
WRITE_OWNER_ACCESS |
2020-04-18 00:16:36 +03:00
SEC_FLAG_SYSTEM_SECURITY |
2020-03-04 12:54:18 +03:00
READ_CONTROL_ACCESS ;
bool creating = ! file_existed & & ( flags & O_CREAT ) ;
bool truncating = ( flags & O_TRUNC ) ;
2020-06-07 17:42:50 +03:00
bool open_fd = false ;
1998-08-17 17:11:34 +04:00
2021-06-07 23:10:30 +03:00
/*
* Catch early an attempt to open an existing
* directory as a file .
*/
if ( file_existed & & S_ISDIR ( fsp - > fsp_name - > st . st_ex_mode ) ) {
return NT_STATUS_FILE_IS_A_DIRECTORY ;
}
2000-04-12 01:38:45 +04:00
/* Check permissions */
1998-08-17 17:11:34 +04:00
2000-04-10 17:05:23 +04:00
/*
* This code was changed after seeing a client open request
* containing the open mode of ( DENY_WRITE / read - only ) with
* the ' create if not exist ' bit set . The previous code
* would fail to open the file read only on a read - only share
* as it was checking the flags parameter directly against O_RDONLY ,
* this was failing as the flags parameter was set to O_RDONLY | O_CREAT .
* JRA .
*/
1998-08-17 17:11:34 +04:00
2000-04-10 17:05:23 +04:00
if ( ! CAN_WRITE ( conn ) ) {
/* It's a read-only share - fail if we wanted to write. */
2009-05-31 00:28:03 +04:00
if ( accmode ! = O_RDONLY | | ( flags & O_TRUNC ) | | ( flags & O_APPEND ) ) {
2009-06-16 01:14:31 +04:00
DEBUG ( 3 , ( " Permission denied opening %s \n " ,
smb_fname_str_dbg ( smb_fname ) ) ) ;
2006-07-11 22:01:26 +04:00
return NT_STATUS_ACCESS_DENIED ;
2012-09-04 12:36:47 +04:00
}
if ( flags & O_CREAT ) {
2005-07-08 08:51:27 +04:00
/* We don't want to write - but we must make sure that
O_CREAT doesn ' t create the file if we have write
access into the directory .
2000-04-10 17:05:23 +04:00
*/
2009-05-31 00:28:03 +04:00
flags & = ~ ( O_CREAT | O_EXCL ) ;
local_flags & = ~ ( O_CREAT | O_EXCL ) ;
2000-04-10 17:05:23 +04:00
}
}
1998-08-17 17:11:34 +04:00
2001-04-16 04:02:29 +04:00
/*
* This little piece of insanity is inspired by the
* fact that an NT client can open a file for O_RDONLY ,
* but set the create disposition to FILE_EXISTS_TRUNCATE .
* If the client * can * write to the file , then it expects to
* truncate the file , even though it is opening for readonly .
* Quicken uses this stupid trick in backup file creation . . .
* Thanks * greatly * to " David W. Chapman Jr. " < dwcjr @ inethouston . net >
* for helping track this one down . It didn ' t bite us in 2.0 . x
* as we always opened files read - write in that release . JRA .
*/
2002-09-25 19:19:00 +04:00
if ( ( accmode = = O_RDONLY ) & & ( ( flags & O_TRUNC ) = = O_TRUNC ) ) {
2005-07-08 08:51:27 +04:00
DEBUG ( 10 , ( " open_file: truncate requested on read-only open "
2009-06-16 01:14:31 +04:00
" for file %s \n " , smb_fname_str_dbg ( smb_fname ) ) ) ;
2001-04-16 04:02:29 +04:00
local_flags = ( flags & ~ O_ACCMODE ) | O_RDWR ;
2002-09-25 19:19:00 +04:00
}
2001-04-16 04:02:29 +04:00
2020-03-04 12:54:18 +03:00
if ( ( open_access_mask & need_fd_mask ) | | creating | | truncating ) {
2020-06-07 17:42:50 +03:00
open_fd = true ;
}
if ( open_fd ) {
2008-12-02 00:27:47 +03:00
const char * wild ;
2012-07-10 03:08:01 +04:00
int ret ;
2001-04-16 04:34:03 +04:00
2002-09-25 19:19:00 +04:00
# if defined(O_NONBLOCK) && defined(S_ISFIFO)
/*
* We would block on opening a FIFO with no one else on the
* other end . Do what we used to do and add O_NONBLOCK to the
* open flags . JRA .
*/
2009-06-16 01:14:31 +04:00
if ( file_existed & & S_ISFIFO ( smb_fname - > st . st_ex_mode ) ) {
2012-09-05 21:46:16 +04:00
local_flags & = ~ O_TRUNC ; /* Can't truncate a FIFO. */
2002-09-25 19:19:00 +04:00
local_flags | = O_NONBLOCK ;
2020-03-04 12:54:18 +03:00
truncating = false ;
2005-07-08 08:51:27 +04:00
}
2002-09-25 19:19:00 +04:00
# endif
1998-08-17 17:11:34 +04:00
2003-07-29 21:34:20 +04:00
/* Don't create files with Microsoft wildcard characters. */
2008-12-02 00:27:47 +03:00
if ( fsp - > base_fsp ) {
/*
* wildcard characters are allowed in stream names
* only test the basefilename
*/
2009-07-11 01:50:37 +04:00
wild = fsp - > base_fsp - > fsp_name - > base_name ;
2008-12-02 00:27:47 +03:00
} else {
2009-07-09 03:53:01 +04:00
wild = smb_fname - > base_name ;
2008-12-02 00:27:47 +03:00
}
2005-07-08 08:51:27 +04:00
if ( ( local_flags & O_CREAT ) & & ! file_existed & &
2015-12-12 01:49:44 +03:00
! ( fsp - > posix_flags & FSP_POSIX_FLAGS_PATHNAMES ) & &
2008-12-02 00:27:47 +03:00
ms_has_wild ( wild ) ) {
2006-07-11 22:01:26 +04:00
return NT_STATUS_OBJECT_NAME_INVALID ;
2003-07-29 21:34:20 +04:00
}
2011-10-27 02:03:28 +04:00
/* Can we access this file ? */
if ( ! fsp - > base_fsp ) {
/* Only do this check on non-stream open. */
if ( file_existed ) {
2021-06-08 01:08:06 +03:00
status = smbd_check_access_rights_fsp ( fsp ,
2012-09-14 03:11:31 +04:00
false ,
2011-10-27 02:03:28 +04:00
access_mask ) ;
2014-09-10 02:31:25 +04:00
if ( ! NT_STATUS_IS_OK ( status ) ) {
2021-06-08 02:24:42 +03:00
DBG_DEBUG ( " smbd_check_access_rights_fsp "
" on file %s returned %s \n " ,
fsp_str_dbg ( fsp ) ,
nt_errstr ( status ) ) ;
2014-09-10 02:31:25 +04:00
}
if ( ! NT_STATUS_IS_OK ( status ) & &
! NT_STATUS_EQUAL ( status ,
NT_STATUS_OBJECT_NAME_NOT_FOUND ) )
{
return status ;
}
2014-09-10 23:58:04 +04:00
if ( NT_STATUS_EQUAL ( status ,
NT_STATUS_OBJECT_NAME_NOT_FOUND ) )
{
2014-09-10 02:31:25 +04:00
DEBUG ( 10 , ( " open_file: "
" file %s vanished since we "
" checked for existence. \n " ,
smb_fname_str_dbg ( smb_fname ) ) ) ;
file_existed = false ;
SET_STAT_INVALID ( fsp - > fsp_name - > st ) ;
}
2011-10-27 02:03:28 +04:00
}
2014-09-10 02:31:25 +04:00
if ( ! file_existed ) {
if ( ! ( local_flags & O_CREAT ) ) {
/* File didn't exist and no O_CREAT. */
return NT_STATUS_OBJECT_NAME_NOT_FOUND ;
}
2021-05-24 21:15:29 +03:00
status = check_parent_access_fsp (
parent_dir - > fsp ,
2020-05-01 04:16:51 +03:00
SEC_DIR_ADD_FILE ) ;
2014-09-10 02:31:25 +04:00
if ( ! NT_STATUS_IS_OK ( status ) ) {
2021-05-24 21:15:29 +03:00
DBG_DEBUG ( " check_parent_access_fsp on "
" directory %s for file %s "
" returned %s \n " ,
smb_fname_str_dbg ( parent_dir ) ,
smb_fname_str_dbg ( smb_fname ) ,
nt_errstr ( status ) ) ;
2014-09-10 02:31:25 +04:00
return status ;
}
2011-10-27 02:03:28 +04:00
}
}
2014-06-25 01:19:30 +04:00
/*
* Actually do the open - if O_TRUNC is needed handle it
* below under the share mode lock .
*/
2020-12-23 17:48:36 +03:00
status = reopen_from_fsp ( fsp ,
local_flags & ~ O_TRUNC ,
unx_mode ,
p_file_created ) ;
2020-10-23 13:16:38 +03:00
if ( NT_STATUS_EQUAL ( status , NT_STATUS_STOPPED_ON_SYMLINK ) ) {
/*
* POSIX client that hit a symlink . We don ' t want to
* return NT_STATUS_STOPPED_ON_SYMLINK to avoid handling
* this special error code in all callers , so we map
* this to NT_STATUS_OBJECT_PATH_NOT_FOUND . Historically
* the lower level functions returned status code mapped
* from errno by map_nt_error_from_unix ( ) where ELOOP is
* mapped to NT_STATUS_OBJECT_PATH_NOT_FOUND .
*/
status = NT_STATUS_OBJECT_PATH_NOT_FOUND ;
}
2007-02-21 04:55:08 +03:00
if ( ! NT_STATUS_IS_OK ( status ) ) {
2005-07-08 08:51:27 +04:00
DEBUG ( 3 , ( " Error opening file %s (%s) (local_flags=%d) "
2009-06-16 01:14:31 +04:00
" (flags=%d) \n " , smb_fname_str_dbg ( smb_fname ) ,
nt_errstr ( status ) , local_flags , flags ) ) ;
2007-02-21 04:55:08 +03:00
return status ;
2002-03-20 03:46:53 +03:00
}
2003-05-01 21:45:38 +04:00
2016-08-29 10:58:45 +03:00
if ( local_flags & O_NONBLOCK ) {
/*
* GPFS can return ETIMEDOUT for pread on
* nonblocking file descriptors when files
* migrated to tape need to be recalled . I
2019-05-21 21:37:30 +03:00
* could imagine this happens elsewhere
2016-08-29 10:58:45 +03:00
* too . With blocking file descriptors this
* does not happen .
*/
2019-09-27 09:37:40 +03:00
ret = vfs_set_blocking ( fsp , true ) ;
2016-08-29 10:58:45 +03:00
if ( ret = = - 1 ) {
status = map_nt_error_from_unix ( errno ) ;
DBG_WARNING ( " Could not set fd to blocking: "
" %s \n " , strerror ( errno ) ) ;
fd_close ( fsp ) ;
return status ;
}
}
2012-07-10 03:59:49 +04:00
if ( * p_file_created ) {
2012-07-10 03:13:06 +04:00
/* We created this file. */
bool need_re_stat = false ;
/* Do all inheritance work after we've
done a successful fstat call and filled
in the stat struct in fsp - > fsp_name . */
2003-05-01 21:45:38 +04:00
2012-07-10 03:13:06 +04:00
/* Inherit the ACL if required */
2014-02-04 06:09:10 +04:00
if ( lp_inherit_permissions ( SNUM ( conn ) ) ) {
2020-04-29 11:43:05 +03:00
inherit_access_posix_acl ( conn ,
2020-04-29 11:56:23 +03:00
parent_dir ,
2017-05-24 03:11:18 +03:00
smb_fname ,
2012-07-10 03:13:06 +04:00
unx_mode ) ;
need_re_stat = true ;
}
/* Change the owner if required. */
2016-08-02 09:37:00 +03:00
if ( lp_inherit_owner ( SNUM ( conn ) ) ! = INHERIT_OWNER_NO ) {
2020-04-29 11:43:05 +03:00
change_file_owner_to_parent ( conn ,
2020-04-29 12:03:11 +03:00
parent_dir ,
2012-07-10 03:13:06 +04:00
fsp ) ;
need_re_stat = true ;
}
if ( need_re_stat ) {
ret = SMB_VFS_FSTAT ( fsp , & smb_fname - > st ) ;
2021-06-07 23:16:31 +03:00
/*
* If we have an fd , this stat should succeed .
*/
2012-07-10 03:13:06 +04:00
if ( ret = = - 1 ) {
2021-06-07 23:16:31 +03:00
status = map_nt_error_from_unix ( errno ) ;
DBG_ERR ( " Error doing fstat on open "
" file %s (%s) \n " ,
2012-07-10 03:13:06 +04:00
smb_fname_str_dbg ( smb_fname ) ,
2021-06-07 23:16:31 +03:00
nt_errstr ( status ) ) ;
fd_close ( fsp ) ;
return status ;
2012-07-10 03:13:06 +04:00
}
}
notify_fname ( conn , NOTIFY_ACTION_ADDED ,
FILE_NOTIFY_CHANGE_FILE_NAME ,
smb_fname - > base_name ) ;
}
2005-07-08 08:51:27 +04:00
} else {
2011-10-26 23:08:51 +04:00
if ( ! file_existed ) {
/* File must exist for a stat open. */
return NT_STATUS_OBJECT_NAME_NOT_FOUND ;
}
2009-02-03 04:10:27 +03:00
2020-10-01 15:40:33 +03:00
if ( S_ISLNK ( smb_fname - > st . st_ex_mode ) & &
! ( fsp - > posix_flags & FSP_POSIX_FLAGS_OPEN ) )
{
/*
* Don ' t allow stat opens on symlinks directly unless
* it ' s a POSIX open .
*/
return NT_STATUS_OBJECT_PATH_NOT_FOUND ;
}
2020-10-02 18:40:41 +03:00
if ( ! fsp - > fsp_flags . is_pathref ) {
/*
* There is only one legit case where end up here :
* openat_pathref_fsp ( ) failed to open a symlink , so the
* fsp was created by fsp_new ( ) which doesn ' t set
* is_pathref . Other then that , we should always have a
* pathref fsp at this point . The subsequent checks
* assert this .
*/
if ( ! ( smb_fname - > flags & SMB_FILENAME_POSIX_PATH ) ) {
DBG_ERR ( " [%s] is not a POSIX pathname \n " ,
smb_fname_str_dbg ( smb_fname ) ) ;
return NT_STATUS_INTERNAL_ERROR ;
}
if ( ! S_ISLNK ( smb_fname - > st . st_ex_mode ) ) {
DBG_ERR ( " [%s] is not a symlink \n " ,
smb_fname_str_dbg ( smb_fname ) ) ;
return NT_STATUS_INTERNAL_ERROR ;
}
if ( fsp_get_pathref_fd ( fsp ) ! = - 1 ) {
DBG_ERR ( " fd for [%s] is not -1: fd [%d] \n " ,
smb_fname_str_dbg ( smb_fname ) ,
fsp_get_pathref_fd ( fsp ) ) ;
return NT_STATUS_INTERNAL_ERROR ;
}
}
2021-06-08 00:55:38 +03:00
status = smbd_check_access_rights_fsp ( fsp ,
false ,
access_mask ) ;
2011-10-26 22:00:11 +04:00
2011-10-27 01:58:32 +04:00
if ( NT_STATUS_EQUAL ( status , NT_STATUS_OBJECT_NAME_NOT_FOUND ) & &
2015-11-27 20:29:55 +03:00
( fsp - > posix_flags & FSP_POSIX_FLAGS_OPEN ) & &
2011-10-27 01:58:32 +04:00
S_ISLNK ( smb_fname - > st . st_ex_mode ) ) {
2011-10-26 22:00:11 +04:00
/* This is a POSIX stat open for delete
* or rename on a symlink that points
* nowhere . Allow . */
DEBUG ( 10 , ( " open_file: allowing POSIX "
" open on bad symlink %s \n " ,
2011-10-27 01:58:32 +04:00
smb_fname_str_dbg ( smb_fname ) ) ) ;
status = NT_STATUS_OK ;
}
if ( ! NT_STATUS_IS_OK ( status ) ) {
2021-06-08 02:25:54 +03:00
DBG_DEBUG ( " smbd_check_access_rights_fsp on file "
2011-10-27 01:58:32 +04:00
" %s returned %s \n " ,
2021-06-08 02:25:54 +03:00
fsp_str_dbg ( fsp ) ,
nt_errstr ( status ) ) ;
2011-10-26 22:00:11 +04:00
return status ;
2008-11-04 12:34:08 +03:00
}
2005-07-08 08:51:27 +04:00
}
1998-08-17 17:11:34 +04:00
2009-06-16 01:14:31 +04:00
fsp - > file_id = vfs_file_id_from_sbuf ( conn , & smb_fname - > st ) ;
2007-07-05 20:26:27 +04:00
fsp - > vuid = req ? req - > vuid : UID_FIELD_INVALID ;
fsp - > file_pid = req ? req - > smbpid : 0 ;
2020-04-02 18:09:36 +03:00
fsp - > fsp_flags . can_lock = true ;
2020-04-02 18:18:43 +03:00
fsp - > fsp_flags . can_read = ( ( access_mask & FILE_READ_DATA ) ! = 0 ) ;
2020-04-02 18:28:32 +03:00
fsp - > fsp_flags . can_write =
2012-06-08 16:26:52 +04:00
CAN_WRITE ( conn ) & &
( ( access_mask & ( FILE_WRITE_DATA | FILE_APPEND_DATA ) ) ! = 0 ) ;
2010-04-24 01:26:33 +04:00
fsp - > print_file = NULL ;
2020-04-02 18:37:02 +03:00
fsp - > fsp_flags . modified = false ;
2000-04-10 17:05:23 +04:00
fsp - > sent_oplock_break = NO_BREAK_SENT ;
2020-04-02 19:21:11 +03:00
fsp - > fsp_flags . is_directory = false ;
2007-10-11 00:34:30 +04:00
if ( conn - > aio_write_behind_list & &
2009-06-16 01:14:31 +04:00
is_in_path ( smb_fname - > base_name , conn - > aio_write_behind_list ,
2009-11-23 18:33:53 +03:00
conn - > case_sensitive ) ) {
2020-04-03 08:39:34 +03:00
fsp - > fsp_flags . aio_write_behind = true ;
2007-10-11 00:34:30 +04:00
}
2009-07-09 03:53:01 +04:00
2000-04-10 17:05:23 +04:00
DEBUG ( 2 , ( " %s opened file %s read=%s write=%s (numopen=%d) \n " ,
2011-07-15 09:55:31 +04:00
conn - > session_info - > unix_info - > unix_name ,
2009-07-09 03:53:01 +04:00
smb_fname_str_dbg ( smb_fname ) ,
2020-04-02 18:18:43 +03:00
BOOLSTR ( fsp - > fsp_flags . can_read ) ,
2020-04-02 18:28:32 +03:00
BOOLSTR ( fsp - > fsp_flags . can_write ) ,
2008-11-21 23:14:53 +03:00
conn - > num_files_open ) ) ;
2000-04-22 04:33:16 +04:00
2006-07-11 22:01:26 +04:00
return NT_STATUS_OK ;
1998-09-26 03:40:49 +04:00
}
1998-08-17 17:11:34 +04:00
2019-08-12 13:44:39 +03:00
static bool mask_conflict (
uint32_t new_access ,
uint32_t existing_access ,
uint32_t access_mask ,
uint32_t new_sharemode ,
uint32_t existing_sharemode ,
uint32_t sharemode_mask )
{
bool want_access = ( new_access & access_mask ) ;
bool allow_existing = ( existing_sharemode & sharemode_mask ) ;
bool have_access = ( existing_access & access_mask ) ;
bool allow_new = ( new_sharemode & sharemode_mask ) ;
if ( want_access & & ! allow_existing ) {
DBG_DEBUG ( " Access request 0x% " PRIx32 " /0x% " PRIx32 " conflicts "
" with existing sharemode 0x% " PRIx32 " /0x% " PRIx32 " \n " ,
new_access ,
access_mask ,
existing_sharemode ,
sharemode_mask ) ;
return true ;
}
if ( have_access & & ! allow_new ) {
DBG_DEBUG ( " Sharemode request 0x% " PRIx32 " /0x% " PRIx32 " conflicts "
" with existing access 0x% " PRIx32 " /0x% " PRIx32 " \n " ,
new_sharemode ,
sharemode_mask ,
existing_access ,
access_mask ) ;
return true ;
}
return false ;
}
1998-09-05 09:07:05 +04:00
/****************************************************************************
2004-06-08 20:14:31 +04:00
Check if we can open a file with a share mode .
2005-07-08 08:51:27 +04:00
Returns True if conflict , False if not .
1998-09-05 09:07:05 +04:00
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
1999-12-13 16:27:58 +03:00
2020-05-11 14:42:39 +03:00
static const uint32_t conflicting_access =
FILE_WRITE_DATA |
FILE_APPEND_DATA |
FILE_READ_DATA |
FILE_EXECUTE |
DELETE_ACCESS ;
2019-09-06 12:15:27 +03:00
static bool share_conflict ( uint32_t e_access_mask ,
uint32_t e_share_access ,
2015-04-27 02:02:55 +03:00
uint32_t access_mask ,
uint32_t share_access )
2000-04-22 04:33:16 +04:00
{
2019-08-12 13:44:39 +03:00
bool conflict ;
2019-09-06 12:15:27 +03:00
DBG_DEBUG ( " existing access_mask = 0x% " PRIx32 " , "
" existing share access = 0x% " PRIx32 " , "
2019-08-12 13:12:48 +03:00
" access_mask = 0x% " PRIx32 " , "
" share_access = 0x% " PRIx32 " \n " ,
2019-09-06 12:15:27 +03:00
e_access_mask ,
e_share_access ,
2019-08-12 13:12:48 +03:00
access_mask ,
share_access ) ;
2005-07-08 08:51:27 +04:00
2019-09-06 12:15:27 +03:00
if ( ( e_access_mask & conflicting_access ) = = 0 ) {
2019-08-12 12:44:39 +03:00
DBG_DEBUG ( " No conflict due to "
2019-09-06 12:15:27 +03:00
" existing access_mask = 0x% " PRIx32 " \n " ,
e_access_mask ) ;
2019-08-12 13:44:39 +03:00
return false ;
2000-04-22 04:33:16 +04:00
}
2019-08-12 13:44:39 +03:00
if ( ( access_mask & conflicting_access ) = = 0 ) {
2019-08-12 12:44:39 +03:00
DBG_DEBUG ( " No conflict due to access_mask = 0x% " PRIx32 " \n " ,
access_mask ) ;
2019-08-12 13:44:39 +03:00
return false ;
This is a big, rather ugly patch. Whilst investigating the files not truncated
when copying to a full disk problem, I discovered that we were not allowing
the delete on close flag to be set properly, this led to other things, and
after investigation of the proper delete on close semantics and their relationship
to the file_share_delete flag I discovered there were some cases where we
weren't doing the deny modes properly. And this after only 5 years working
on them..... :-) :-).
So here's the latest attempt. I realised the delete on close flag needs to
be set across all smbds with a dev/ino pair open - in addition, the delete
on close flag, allow share delete and delete access requested all need to
be stored in the share mode tdb.
The "delete_on_close" entry in the fsp struct is now redundant and should
really be removed. This may also mean we can get rid of the "iterate_fsp"
calls that I didn't like adding in the first place. Whilst doing this patch,
I also discovered we needed to do the se_map_generic() call for file opens
and POSIX ACL mapping, so I added that also.
This code, although ugly, now passes the deny mode torture tests plus the
delete on close tests I added. I do need to add one more multiple connection
delete on close test to make sure I got the semantics exactly right, plus we
should also (as Andrew suggested) move to random testing here.
The good news is that NT should now correctly delete the file on disk
full error when copying to a disk :-).
Jeremy.
(This used to be commit 51987684bd231c744da2e5f3705fd236d5616173)
2001-03-30 12:57:24 +04:00
}
2000-04-22 04:33:16 +04:00
2019-08-12 13:44:39 +03:00
conflict = mask_conflict (
2019-09-06 12:15:27 +03:00
access_mask , e_access_mask , FILE_WRITE_DATA | FILE_APPEND_DATA ,
share_access , e_share_access , FILE_SHARE_WRITE ) ;
2019-08-12 13:44:39 +03:00
conflict | = mask_conflict (
2019-09-06 12:15:27 +03:00
access_mask , e_access_mask , FILE_READ_DATA | FILE_EXECUTE ,
share_access , e_share_access , FILE_SHARE_READ ) ;
2019-08-12 13:44:39 +03:00
conflict | = mask_conflict (
2019-09-06 12:15:27 +03:00
access_mask , e_access_mask , DELETE_ACCESS ,
share_access , e_share_access , FILE_SHARE_DELETE ) ;
2000-04-22 04:33:16 +04:00
2019-08-12 13:44:39 +03:00
DBG_DEBUG ( " conflict=%s \n " , conflict ? " true " : " false " ) ;
return conflict ;
2000-04-22 04:33:16 +04:00
}
2003-04-22 21:30:53 +04:00
# if defined(DEVELOPER)
2019-08-16 13:48:15 +03:00
struct validate_my_share_entries_state {
struct smbd_server_connection * sconn ;
struct file_id fid ;
struct server_id self ;
} ;
static bool validate_my_share_entries_fn (
struct share_mode_entry * e ,
bool * modified ,
void * private_data )
2003-04-22 21:30:53 +04:00
{
2019-08-16 13:48:15 +03:00
struct validate_my_share_entries_state * state = private_data ;
2003-04-22 21:30:53 +04:00
files_struct * fsp ;
2019-10-09 22:38:04 +03:00
if ( ! server_id_equal ( & state - > self , & e - > pid ) ) {
2019-08-16 13:48:15 +03:00
return false ;
2005-09-30 21:13:37 +04:00
}
2019-08-16 13:48:15 +03:00
if ( e - > op_mid = = 0 ) {
2014-05-01 22:01:03 +04:00
/* INTERNAL_OPEN_ONLY */
2019-08-16 13:48:15 +03:00
return false ;
2005-07-08 08:51:27 +04:00
}
2003-04-22 21:30:53 +04:00
2019-08-16 13:48:15 +03:00
fsp = file_find_dif ( state - > sconn , state - > fid , e - > share_file_id ) ;
2003-04-22 21:30:53 +04:00
if ( ! fsp ) {
2018-02-07 13:05:33 +03:00
DBG_ERR ( " PANIC : %s \n " ,
2019-08-16 13:48:15 +03:00
share_mode_str ( talloc_tos ( ) , 0 , & state - > fid , e ) ) ;
2005-07-08 08:51:27 +04:00
smb_panic ( " validate_my_share_entries: Cannot match a "
" share entry with an open file \n " ) ;
2003-04-22 21:30:53 +04:00
}
2019-08-16 13:48:15 +03:00
if ( ( ( uint16_t ) fsp - > oplock_type ) ! = e - > op_type ) {
2005-09-30 21:13:37 +04:00
goto panic ;
}
2019-08-16 13:48:15 +03:00
return false ;
2005-09-30 21:13:37 +04:00
panic :
{
2007-09-13 01:48:20 +04:00
char * str ;
2018-02-07 13:05:33 +03:00
DBG_ERR ( " validate_my_share_entries: PANIC : %s \n " ,
2019-08-16 13:48:15 +03:00
share_mode_str ( talloc_tos ( ) , 0 , & state - > fid , e ) ) ;
2007-09-13 01:48:20 +04:00
str = talloc_asprintf ( talloc_tos ( ) ,
" validate_my_share_entries: "
" file %s, oplock_type = 0x%x, op_type = 0x%x \n " ,
2009-07-11 01:50:37 +04:00
fsp - > fsp_name - > base_name ,
( unsigned int ) fsp - > oplock_type ,
2019-08-16 13:48:15 +03:00
( unsigned int ) e - > op_type ) ;
2003-04-22 21:30:53 +04:00
smb_panic ( str ) ;
}
2019-08-16 13:48:15 +03:00
return false ;
2003-04-22 21:30:53 +04:00
}
# endif
2020-03-05 17:12:20 +03:00
/**
* Allowed access mask for stat opens relevant to oplocks
* */
bool is_oplock_stat_open ( uint32_t access_mask )
2004-06-02 06:12:54 +04:00
{
2012-09-05 17:19:28 +04:00
const uint32_t stat_open_bits =
( SYNCHRONIZE_ACCESS |
FILE_READ_ATTRIBUTES |
FILE_WRITE_ATTRIBUTES ) ;
2012-09-05 17:24:46 +04:00
return ( ( ( access_mask & stat_open_bits ) ! = 0 ) & &
( ( access_mask & ~ stat_open_bits ) = = 0 ) ) ;
2005-07-08 08:51:27 +04:00
}
2020-03-05 17:14:21 +03:00
/**
* Allowed access mask for stat opens relevant to leases
* */
bool is_lease_stat_open ( uint32_t access_mask )
{
const uint32_t stat_open_bits =
( SYNCHRONIZE_ACCESS |
FILE_READ_ATTRIBUTES |
FILE_WRITE_ATTRIBUTES |
READ_CONTROL_ACCESS ) ;
return ( ( ( access_mask & stat_open_bits ) ! = 0 ) & &
( ( access_mask & ~ stat_open_bits ) = = 0 ) ) ;
}
2019-08-16 12:11:36 +03:00
struct has_delete_on_close_state {
bool ret ;
} ;
static bool has_delete_on_close_fn (
struct share_mode_entry * e ,
bool * modified ,
void * private_data )
{
struct has_delete_on_close_state * state = private_data ;
state - > ret = ! share_entry_stale_pid ( e ) ;
return state - > ret ;
}
2013-09-26 05:41:07 +04:00
static bool has_delete_on_close ( struct share_mode_lock * lck ,
uint32_t name_hash )
{
2019-08-16 12:11:36 +03:00
struct has_delete_on_close_state state = { . ret = false } ;
bool ok ;
2013-09-26 05:41:07 +04:00
if ( ! is_delete_on_close_set ( lck , name_hash ) ) {
return false ;
}
2019-08-16 12:11:36 +03:00
ok = share_mode_forall_entries ( lck , has_delete_on_close_fn , & state ) ;
if ( ! ok ) {
DBG_DEBUG ( " share_mode_forall_entries failed \n " ) ;
return false ;
2013-09-26 05:41:07 +04:00
}
2019-08-16 12:11:36 +03:00
return state . ret ;
2013-09-26 05:41:07 +04:00
}
2020-11-05 17:39:51 +03:00
static void share_mode_flags_restrict (
struct share_mode_lock * lck ,
2019-09-17 02:16:40 +03:00
uint32_t access_mask ,
uint32_t share_mode ,
uint32_t lease_type )
{
uint32_t existing_access_mask , existing_share_mode ;
uint32_t existing_lease_type ;
share_mode_flags_get (
2020-11-05 17:39:51 +03:00
lck ,
2019-09-17 02:16:40 +03:00
& existing_access_mask ,
& existing_share_mode ,
& existing_lease_type ) ;
existing_access_mask | = access_mask ;
2020-05-09 16:13:54 +03:00
if ( access_mask & conflicting_access ) {
existing_share_mode & = share_mode ;
}
2019-09-17 02:16:40 +03:00
existing_lease_type | = lease_type ;
2020-11-05 17:39:51 +03:00
share_mode_flags_set (
lck ,
2019-09-17 02:16:40 +03:00
existing_access_mask ,
existing_share_mode ,
2020-11-05 17:39:51 +03:00
existing_lease_type ,
NULL ) ;
2019-09-17 02:16:40 +03:00
}
2000-04-22 04:33:16 +04:00
/****************************************************************************
2005-09-30 21:13:37 +04:00
Deal with share modes
2014-05-23 17:19:05 +04:00
Invariant : Share mode must be locked on entry and exit .
2000-04-22 04:33:16 +04:00
Returns - 1 on error , or number of share modes on success ( may be zero ) .
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
2019-08-16 14:08:23 +03:00
struct open_mode_check_state {
2019-09-17 02:16:40 +03:00
struct file_id fid ;
2019-08-16 14:08:23 +03:00
uint32_t access_mask ;
uint32_t share_access ;
2019-09-17 02:16:40 +03:00
uint32_t lease_type ;
2019-08-16 14:08:23 +03:00
} ;
static bool open_mode_check_fn (
struct share_mode_entry * e ,
bool * modified ,
void * private_data )
{
struct open_mode_check_state * state = private_data ;
2019-09-17 02:16:40 +03:00
bool disconnected , stale ;
uint32_t access_mask , share_access , lease_type ;
2019-08-16 14:08:23 +03:00
disconnected = server_id_is_disconnected ( & e - > pid ) ;
if ( disconnected ) {
return false ;
}
2019-09-17 02:16:40 +03:00
access_mask = state - > access_mask | e - > access_mask ;
2020-05-09 16:13:54 +03:00
share_access = state - > share_access ;
if ( e - > access_mask & conflicting_access ) {
share_access & = e - > share_access ;
}
2019-09-17 02:16:40 +03:00
lease_type = state - > lease_type | get_lease_type ( e , state - > fid ) ;
if ( ( access_mask = = state - > access_mask ) & &
( share_access = = state - > share_access ) & &
( lease_type = = state - > lease_type ) ) {
2019-08-16 14:08:23 +03:00
return false ;
}
2019-09-17 02:16:40 +03:00
2019-08-16 14:08:23 +03:00
stale = share_entry_stale_pid ( e ) ;
if ( stale ) {
return false ;
}
2019-09-17 02:16:40 +03:00
state - > access_mask = access_mask ;
state - > share_access = share_access ;
state - > lease_type = lease_type ;
return false ;
2019-08-16 14:08:23 +03:00
}
2005-09-30 21:13:37 +04:00
static NTSTATUS open_mode_check ( connection_struct * conn ,
2020-11-05 12:42:10 +03:00
struct file_id fid ,
2005-09-30 21:13:37 +04:00
struct share_mode_lock * lck ,
2015-04-27 02:02:55 +03:00
uint32_t access_mask ,
uint32_t share_access )
1998-09-05 09:07:05 +04:00
{
2019-09-17 02:16:40 +03:00
struct open_mode_check_state state ;
2020-12-03 18:18:25 +03:00
bool ok , conflict ;
2020-11-05 17:39:51 +03:00
bool modified = false ;
2004-05-30 11:21:50 +04:00
2020-03-05 17:12:20 +03:00
if ( is_oplock_stat_open ( access_mask ) ) {
2008-01-11 14:35:04 +03:00
/* Stat open that doesn't trigger oplock breaks or share mode
* checks . . . ! JRA . */
return NT_STATUS_OK ;
}
2001-09-06 01:11:52 +04:00
/*
* Check if the share modes will give us access .
*/
2011-02-26 14:36:19 +03:00
2003-04-22 21:30:53 +04:00
# if defined(DEVELOPER)
2019-08-16 13:48:15 +03:00
{
struct validate_my_share_entries_state validate_state = {
. sconn = conn - > sconn ,
2020-11-05 12:42:10 +03:00
. fid = fid ,
2019-08-16 13:48:15 +03:00
. self = messaging_server_id ( conn - > sconn - > msg_ctx ) ,
} ;
ok = share_mode_forall_entries (
lck , validate_my_share_entries_fn , & validate_state ) ;
SMB_ASSERT ( ok ) ;
2005-09-30 21:13:37 +04:00
}
2003-04-22 21:30:53 +04:00
# endif
2019-09-17 02:16:40 +03:00
share_mode_flags_get (
2020-11-05 17:39:51 +03:00
lck , & state . access_mask , & state . share_access , NULL ) ;
2019-09-17 02:16:40 +03:00
conflict = share_conflict (
state . access_mask ,
state . share_access ,
access_mask ,
share_access ) ;
if ( ! conflict ) {
DBG_DEBUG ( " No conflict due to share_mode_flags access \n " ) ;
return NT_STATUS_OK ;
}
state = ( struct open_mode_check_state ) {
2020-11-05 12:42:10 +03:00
. fid = fid ,
2019-09-17 02:16:40 +03:00
. share_access = ( FILE_SHARE_READ |
FILE_SHARE_WRITE |
FILE_SHARE_DELETE ) ,
} ;
/*
* Walk the share mode array to recalculate d - > flags
*/
2019-08-16 14:08:23 +03:00
ok = share_mode_forall_entries ( lck , open_mode_check_fn , & state ) ;
if ( ! ok ) {
DBG_DEBUG ( " share_mode_forall_entries failed \n " ) ;
return NT_STATUS_INTERNAL_ERROR ;
}
2019-09-17 02:16:40 +03:00
2020-11-05 17:39:51 +03:00
share_mode_flags_set (
lck ,
state . access_mask ,
state . share_access ,
state . lease_type ,
& modified ) ;
if ( ! modified ) {
2019-09-17 02:16:40 +03:00
/*
* We only end up here if we had a sharing violation
* from d - > flags and have recalculated it .
*/
2019-08-16 14:08:23 +03:00
return NT_STATUS_SHARING_VIOLATION ;
2001-09-06 01:11:52 +04:00
}
2011-02-26 14:36:19 +03:00
2019-09-17 02:16:40 +03:00
conflict = share_conflict (
state . access_mask ,
state . share_access ,
access_mask ,
share_access ) ;
if ( ! conflict ) {
DBG_DEBUG ( " No conflict due to share_mode_flags access \n " ) ;
return NT_STATUS_OK ;
}
return NT_STATUS_SHARING_VIOLATION ;
1998-09-05 09:07:05 +04:00
}
2008-12-18 04:23:13 +03:00
/*
* Send a break message to the oplock holder and delay the open for
* our client .
*/
2014-12-05 08:15:24 +03:00
NTSTATUS send_break_message ( struct messaging_context * msg_ctx ,
2018-02-07 14:24:35 +03:00
const struct file_id * id ,
const struct share_mode_entry * exclusive ,
uint16_t break_to )
2008-12-18 04:23:13 +03:00
{
2019-05-16 16:38:26 +03:00
struct oplock_break_message msg = {
. id = * id ,
. share_file_id = exclusive - > share_file_id ,
. break_to = break_to ,
} ;
enum ndr_err_code ndr_err ;
DATA_BLOB blob ;
2008-12-18 04:23:13 +03:00
NTSTATUS status ;
2019-05-16 16:38:26 +03:00
if ( DEBUGLVL ( 10 ) ) {
struct server_id_buf buf ;
DBG_DEBUG ( " Sending break message to %s \n " ,
server_id_str_buf ( exclusive - > pid , & buf ) ) ;
NDR_PRINT_DEBUG ( oplock_break_message , & msg ) ;
}
2008-12-18 04:23:13 +03:00
2019-05-16 16:38:26 +03:00
ndr_err = ndr_push_struct_blob (
& blob ,
talloc_tos ( ) ,
& msg ,
( ndr_push_flags_fn_t ) ndr_push_oplock_break_message ) ;
if ( ! NDR_ERR_CODE_IS_SUCCESS ( ndr_err ) ) {
DBG_WARNING ( " ndr_push_oplock_break_message failed: %s \n " ,
ndr_errstr ( ndr_err ) ) ;
return ndr_map_error2ntstatus ( ndr_err ) ;
}
2013-09-27 03:15:31 +04:00
2019-05-16 16:38:26 +03:00
status = messaging_send (
msg_ctx , exclusive - > pid , MSG_SMB_BREAK_REQUEST , & blob ) ;
TALLOC_FREE ( blob . data ) ;
2008-12-18 04:23:13 +03:00
if ( ! NT_STATUS_IS_OK ( status ) ) {
DEBUG ( 3 , ( " Could not send oplock break message: %s \n " ,
nt_errstr ( status ) ) ) ;
}
return status ;
}
2019-08-18 18:49:23 +03:00
struct validate_oplock_types_state {
bool valid ;
bool batch ;
bool ex_or_batch ;
bool level2 ;
bool no_oplock ;
uint32_t num_non_stat_opens ;
} ;
2005-09-30 21:13:37 +04:00
2019-08-18 18:49:23 +03:00
static bool validate_oplock_types_fn (
struct share_mode_entry * e ,
bool * modified ,
void * private_data )
2004-06-08 20:14:31 +04:00
{
2019-08-18 18:49:23 +03:00
struct validate_oplock_types_state * state = private_data ;
2005-09-30 21:13:37 +04:00
2019-08-18 18:49:23 +03:00
if ( e - > op_mid = = 0 ) {
/* INTERNAL_OPEN_ONLY */
return false ;
}
2014-09-09 14:53:52 +04:00
2020-03-05 17:12:20 +03:00
if ( e - > op_type = = NO_OPLOCK & & is_oplock_stat_open ( e - > access_mask ) ) {
2019-08-18 18:49:23 +03:00
/*
* We ignore stat opens in the table - they always
* have NO_OPLOCK and never get or cause breaks . JRA .
*/
return false ;
}
2011-05-16 23:20:14 +04:00
2019-08-18 18:49:23 +03:00
state - > num_non_stat_opens + = 1 ;
2013-10-18 19:12:35 +04:00
2019-08-18 18:49:23 +03:00
if ( BATCH_OPLOCK_TYPE ( e - > op_type ) ) {
/* batch - can only be one. */
if ( share_entry_stale_pid ( e ) ) {
DBG_DEBUG ( " Found stale batch oplock \n " ) ;
return false ;
2011-02-02 03:01:57 +03:00
}
2019-08-18 18:49:23 +03:00
if ( state - > ex_or_batch | |
state - > batch | |
state - > level2 | |
state - > no_oplock ) {
DBG_ERR ( " Bad batch oplock entry \n " ) ;
state - > valid = false ;
return true ;
}
state - > batch = true ;
}
2011-02-02 03:01:57 +03:00
2019-08-18 18:49:23 +03:00
if ( EXCLUSIVE_OPLOCK_TYPE ( e - > op_type ) ) {
if ( share_entry_stale_pid ( e ) ) {
DBG_DEBUG ( " Found stale duplicate oplock \n " ) ;
return false ;
2005-09-30 21:13:37 +04:00
}
2019-08-18 18:49:23 +03:00
/* Exclusive or batch - can only be one. */
if ( state - > ex_or_batch | |
state - > level2 | |
state - > no_oplock ) {
DBG_ERR ( " Bad exclusive or batch oplock entry \n " ) ;
state - > valid = false ;
return true ;
}
state - > ex_or_batch = true ;
}
2005-09-30 21:13:37 +04:00
2019-08-18 18:49:23 +03:00
if ( LEVEL_II_OPLOCK_TYPE ( e - > op_type ) ) {
if ( state - > batch | | state - > ex_or_batch ) {
if ( share_entry_stale_pid ( e ) ) {
DBG_DEBUG ( " Found stale LevelII oplock \n " ) ;
2013-10-15 14:01:54 +04:00
return false ;
2011-02-02 03:01:57 +03:00
}
2019-08-18 18:49:23 +03:00
DBG_DEBUG ( " Bad levelII oplock entry \n " ) ;
state - > valid = false ;
return true ;
2004-06-08 20:14:31 +04:00
}
2019-08-18 18:49:23 +03:00
state - > level2 = true ;
}
2005-09-30 21:13:37 +04:00
2019-08-18 18:49:23 +03:00
if ( e - > op_type = = NO_OPLOCK ) {
if ( state - > batch | | state - > ex_or_batch ) {
if ( share_entry_stale_pid ( e ) ) {
DBG_DEBUG ( " Found stale NO_OPLOCK entry \n " ) ;
2013-10-15 14:01:54 +04:00
return false ;
2011-02-02 03:01:57 +03:00
}
2019-08-18 18:49:23 +03:00
DBG_ERR ( " Bad no oplock entry \n " ) ;
state - > valid = false ;
return true ;
2006-03-21 09:53:49 +03:00
}
2019-08-18 18:49:23 +03:00
state - > no_oplock = true ;
}
return false ;
}
/*
* Do internal consistency checks on the share mode for a file .
*/
static bool validate_oplock_types ( struct share_mode_lock * lck )
{
struct validate_oplock_types_state state = { . valid = true } ;
bool ok ;
ok = share_mode_forall_entries ( lck , validate_oplock_types_fn , & state ) ;
if ( ! ok ) {
DBG_DEBUG ( " share_mode_forall_entries failed \n " ) ;
return false ;
}
if ( ! state . valid ) {
DBG_DEBUG ( " Got invalid oplock configuration \n " ) ;
return false ;
2006-03-21 09:53:49 +03:00
}
2013-09-02 16:25:07 +04:00
2019-08-18 18:49:23 +03:00
if ( ( state . batch | | state . ex_or_batch ) & &
( state . num_non_stat_opens ! = 1 ) ) {
DBG_WARNING ( " got batch (%d) or ex (%d) non-exclusively "
" (% " PRIu32 " ) \n " ,
( int ) state . batch ,
( int ) state . ex_or_batch ,
state . num_non_stat_opens ) ;
2013-09-02 16:25:07 +04:00
return false ;
}
2013-10-15 14:01:54 +04:00
return true ;
2011-02-02 03:01:57 +03:00
}
2019-08-10 16:01:00 +03:00
static bool is_same_lease ( const files_struct * fsp ,
const struct share_mode_entry * e ,
const struct smb2_lease * lease )
{
if ( e - > op_type ! = LEASE_OPLOCK ) {
return false ;
}
if ( lease = = NULL ) {
return false ;
}
return smb2_lease_equal ( fsp_client_guid ( fsp ) ,
& lease - > lease_key ,
& e - > client_guid ,
& e - > lease_key ) ;
}
2012-01-13 17:10:44 +04:00
static bool file_has_brlocks ( files_struct * fsp )
{
struct byte_range_lock * br_lck ;
br_lck = brl_get_locks_readonly ( fsp ) ;
if ( ! br_lck )
return false ;
2013-09-10 21:40:43 +04:00
return ( brl_num_locks ( br_lck ) > 0 ) ;
2012-01-13 17:10:44 +04:00
}
2014-10-29 01:31:46 +03:00
struct fsp_lease * find_fsp_lease ( struct files_struct * new_fsp ,
const struct smb2_lease_key * key ,
2018-09-18 10:55:51 +03:00
uint32_t current_state ,
uint16_t lease_version ,
uint16_t lease_epoch )
2014-10-29 01:31:46 +03:00
{
struct files_struct * fsp ;
/*
* TODO : Measure how expensive this loop is with thousands of open
* handles . . .
*/
2020-11-19 13:35:23 +03:00
for ( fsp = file_find_di_first ( new_fsp - > conn - > sconn , new_fsp - > file_id , true ) ;
2014-10-29 01:31:46 +03:00
fsp ! = NULL ;
2020-11-19 13:35:23 +03:00
fsp = file_find_di_next ( fsp , true ) ) {
2014-10-29 01:31:46 +03:00
if ( fsp = = new_fsp ) {
continue ;
}
if ( fsp - > oplock_type ! = LEASE_OPLOCK ) {
continue ;
}
if ( smb2_lease_key_equal ( & fsp - > lease - > lease . lease_key , key ) ) {
fsp - > lease - > ref_count + = 1 ;
return fsp - > lease ;
}
}
/* Not found - must be leased in another smbd. */
new_fsp - > lease = talloc_zero ( new_fsp - > conn - > sconn , struct fsp_lease ) ;
if ( new_fsp - > lease = = NULL ) {
return NULL ;
}
new_fsp - > lease - > ref_count = 1 ;
new_fsp - > lease - > sconn = new_fsp - > conn - > sconn ;
new_fsp - > lease - > lease . lease_key = * key ;
2018-09-18 10:55:51 +03:00
new_fsp - > lease - > lease . lease_state = current_state ;
2014-10-29 01:31:46 +03:00
/*
* We internally treat all leases as V2 and update
* the epoch , but when sending breaks it matters if
* the requesting lease was v1 or v2 .
*/
2018-09-18 10:55:51 +03:00
new_fsp - > lease - > lease . lease_version = lease_version ;
new_fsp - > lease - > lease . lease_epoch = lease_epoch ;
2014-10-29 01:31:46 +03:00
return new_fsp - > lease ;
}
2018-09-18 14:00:49 +03:00
static NTSTATUS try_lease_upgrade ( struct files_struct * fsp ,
struct share_mode_lock * lck ,
const struct GUID * client_guid ,
const struct smb2_lease * lease ,
uint32_t granted )
2014-10-29 01:31:46 +03:00
{
2018-09-18 14:00:49 +03:00
bool do_upgrade ;
2018-09-18 14:51:01 +03:00
uint32_t current_state , breaking_to_requested , breaking_to_required ;
bool breaking ;
uint16_t lease_version , epoch ;
2018-09-18 14:00:49 +03:00
uint32_t existing , requested ;
2018-09-18 14:51:01 +03:00
NTSTATUS status ;
2014-10-29 01:31:46 +03:00
2018-09-18 14:51:01 +03:00
status = leases_db_get (
client_guid ,
& lease - > lease_key ,
& fsp - > file_id ,
& current_state ,
& breaking ,
& breaking_to_requested ,
& breaking_to_required ,
& lease_version ,
& epoch ) ;
if ( ! NT_STATUS_IS_OK ( status ) ) {
return status ;
2018-09-18 14:00:49 +03:00
}
2014-10-29 01:31:46 +03:00
2018-09-18 14:00:49 +03:00
fsp - > lease = find_fsp_lease (
fsp ,
& lease - > lease_key ,
2018-09-18 14:51:01 +03:00
current_state ,
lease_version ,
epoch ) ;
2018-09-18 14:00:49 +03:00
if ( fsp - > lease = = NULL ) {
DEBUG ( 1 , ( " Did not find existing lease for file %s \n " ,
fsp_str_dbg ( fsp ) ) ) ;
return NT_STATUS_NO_MEMORY ;
}
2014-10-29 01:31:46 +03:00
2018-09-18 14:00:49 +03:00
/*
* Upgrade only if the requested lease is a strict upgrade .
*/
2018-09-18 14:51:01 +03:00
existing = current_state ;
2018-09-18 14:00:49 +03:00
requested = lease - > lease_state ;
2014-10-29 01:31:46 +03:00
2018-09-18 14:00:49 +03:00
/*
* Tricky : This test makes sure that " requested " is a
* strict bitwise superset of " existing " .
*/
do_upgrade = ( ( existing & requested ) = = existing ) ;
2014-10-29 01:31:46 +03:00
2018-09-18 14:00:49 +03:00
/*
* Upgrade only if there ' s a change .
*/
do_upgrade & = ( granted ! = existing ) ;
2014-10-29 01:31:46 +03:00
2018-09-18 14:00:49 +03:00
/*
* Upgrade only if other leases don ' t prevent what was asked
* for .
*/
do_upgrade & = ( granted = = requested ) ;
2014-10-29 01:31:46 +03:00
2018-09-18 14:00:49 +03:00
/*
* only upgrade if we are not in breaking state
*/
2018-09-18 14:51:01 +03:00
do_upgrade & = ! breaking ;
2014-10-29 01:31:46 +03:00
2018-09-18 14:00:49 +03:00
DEBUG ( 10 , ( " existing=% " PRIu32 " , requested=% " PRIu32 " , "
" granted=% " PRIu32 " , do_upgrade=%d \n " ,
existing , requested , granted , ( int ) do_upgrade ) ) ;
2014-10-29 01:31:46 +03:00
2018-09-18 14:00:49 +03:00
if ( do_upgrade ) {
NTSTATUS set_status ;
2014-10-29 01:31:46 +03:00
2018-09-18 14:51:01 +03:00
current_state = granted ;
epoch + = 1 ;
2018-09-18 14:00:49 +03:00
set_status = leases_db_set (
client_guid ,
& lease - > lease_key ,
2018-09-18 14:51:01 +03:00
current_state ,
breaking ,
breaking_to_requested ,
breaking_to_required ,
lease_version ,
epoch ) ;
2019-04-08 17:21:41 +03:00
2018-09-18 14:00:49 +03:00
if ( ! NT_STATUS_IS_OK ( set_status ) ) {
DBG_DEBUG ( " leases_db_set failed: %s \n " ,
nt_errstr ( set_status ) ) ;
return set_status ;
2019-04-08 17:21:41 +03:00
}
2014-10-29 01:31:46 +03:00
}
2019-05-24 16:58:09 +03:00
fsp_lease_update ( fsp ) ;
2018-09-18 14:00:49 +03:00
return NT_STATUS_OK ;
}
static NTSTATUS grant_new_fsp_lease ( struct files_struct * fsp ,
struct share_mode_lock * lck ,
const struct GUID * client_guid ,
const struct smb2_lease * lease ,
uint32_t granted )
{
NTSTATUS status ;
2014-10-29 01:31:46 +03:00
fsp - > lease = talloc_zero ( fsp - > conn - > sconn , struct fsp_lease ) ;
if ( fsp - > lease = = NULL ) {
return NT_STATUS_INSUFFICIENT_RESOURCES ;
}
fsp - > lease - > ref_count = 1 ;
fsp - > lease - > sconn = fsp - > conn - > sconn ;
fsp - > lease - > lease . lease_version = lease - > lease_version ;
fsp - > lease - > lease . lease_key = lease - > lease_key ;
fsp - > lease - > lease . lease_state = granted ;
fsp - > lease - > lease . lease_epoch = lease - > lease_epoch + 1 ;
2014-12-05 23:58:39 +03:00
status = leases_db_add ( client_guid ,
& lease - > lease_key ,
& fsp - > file_id ,
2018-09-11 17:13:24 +03:00
fsp - > lease - > lease . lease_state ,
fsp - > lease - > lease . lease_version ,
fsp - > lease - > lease . lease_epoch ,
2014-12-05 23:58:39 +03:00
fsp - > conn - > connectpath ,
fsp - > fsp_name - > base_name ,
2014-10-29 01:31:46 +03:00
fsp - > fsp_name - > stream_name ) ;
if ( ! NT_STATUS_IS_OK ( status ) ) {
DEBUG ( 10 , ( " %s: leases_db_add failed: %s \n " , __func__ ,
nt_errstr ( status ) ) ) ;
TALLOC_FREE ( fsp - > lease ) ;
return NT_STATUS_INSUFFICIENT_RESOURCES ;
}
2020-11-04 17:51:51 +03:00
/*
* We used to set lck - > data - > modified = true here without
* actually modifying lck - > data , triggering a needless
* writeback of lck - > data .
*
* Apart from that writeback , setting modified = true has the
* effect of triggering all waiters for this file to
* retry . This only makes sense if any blocking condition
* ( i . e . waiting for a lease to be downgraded or removed ) is
* gone . This routine here only adds a lease , so it will never
* free up resources that blocked waiters can now claim . So
* that second effect also does not matter in this
* routine . Thus setting lck - > data - > modified = true does not
* need to be done here .
*/
2014-10-29 01:31:46 +03:00
return NT_STATUS_OK ;
}
2018-09-18 14:00:49 +03:00
static NTSTATUS grant_fsp_lease ( struct files_struct * fsp ,
struct share_mode_lock * lck ,
const struct smb2_lease * lease ,
uint32_t granted )
{
const struct GUID * client_guid = fsp_client_guid ( fsp ) ;
NTSTATUS status ;
status = try_lease_upgrade ( fsp , lck , client_guid , lease , granted ) ;
if ( NT_STATUS_EQUAL ( status , NT_STATUS_NOT_FOUND ) ) {
status = grant_new_fsp_lease (
fsp , lck , client_guid , lease , granted ) ;
}
return status ;
}
2018-09-18 11:53:23 +03:00
static int map_lease_type_to_oplock ( uint32_t lease_type )
{
int result = NO_OPLOCK ;
switch ( lease_type ) {
case SMB2_LEASE_READ | SMB2_LEASE_WRITE | SMB2_LEASE_HANDLE :
result = BATCH_OPLOCK | EXCLUSIVE_OPLOCK ;
break ;
case SMB2_LEASE_READ | SMB2_LEASE_WRITE :
result = EXCLUSIVE_OPLOCK ;
break ;
case SMB2_LEASE_READ | SMB2_LEASE_HANDLE :
case SMB2_LEASE_READ :
result = LEVEL_II_OPLOCK ;
break ;
}
return result ;
}
2019-08-20 15:47:27 +03:00
struct delay_for_oplock_state {
struct files_struct * fsp ;
const struct smb2_lease * lease ;
bool will_overwrite ;
uint32_t delay_mask ;
bool first_open_attempt ;
bool got_handle_lease ;
bool got_oplock ;
bool have_other_lease ;
bool delay ;
} ;
static bool delay_for_oplock_fn (
struct share_mode_entry * e ,
bool * modified ,
void * private_data )
{
struct delay_for_oplock_state * state = private_data ;
struct files_struct * fsp = state - > fsp ;
const struct smb2_lease * lease = state - > lease ;
bool e_is_lease = ( e - > op_type = = LEASE_OPLOCK ) ;
uint32_t e_lease_type = get_lease_type ( e , fsp - > file_id ) ;
uint32_t break_to ;
bool lease_is_breaking = false ;
if ( e_is_lease ) {
NTSTATUS status ;
if ( lease ! = NULL ) {
bool our_lease = is_same_lease ( fsp , e , lease ) ;
if ( our_lease ) {
DBG_DEBUG ( " Ignoring our own lease \n " ) ;
return false ;
}
}
status = leases_db_get (
& e - > client_guid ,
& e - > lease_key ,
& fsp - > file_id ,
NULL , /* current_state */
& lease_is_breaking ,
NULL , /* breaking_to_requested */
NULL , /* breaking_to_required */
NULL , /* lease_version */
NULL ) ; /* epoch */
2020-07-06 09:58:22 +03:00
/*
* leases_db_get ( ) can return NT_STATUS_NOT_FOUND
* if the share_mode_entry e is stale and the
* lease record was already removed . In this case return
* false so the traverse continues .
*/
if ( NT_STATUS_EQUAL ( status , NT_STATUS_NOT_FOUND ) & &
share_entry_stale_pid ( e ) )
{
struct GUID_txt_buf guid_strbuf ;
struct file_id_buf file_id_strbuf ;
DBG_DEBUG ( " leases_db_get for client_guid [%s] "
" lease_key [% " PRIu64 " /% " PRIu64 " ] "
" file_id [%s] failed for stale "
" share_mode_entry \n " ,
GUID_buf_string ( & e - > client_guid , & guid_strbuf ) ,
e - > lease_key . data [ 0 ] ,
e - > lease_key . data [ 1 ] ,
file_id_str_buf ( fsp - > file_id , & file_id_strbuf ) ) ;
return false ;
}
if ( ! NT_STATUS_IS_OK ( status ) ) {
struct GUID_txt_buf guid_strbuf ;
struct file_id_buf file_id_strbuf ;
DBG_ERR ( " leases_db_get for client_guid [%s] "
" lease_key [% " PRIu64 " /% " PRIu64 " ] "
" file_id [%s] failed: %s \n " ,
GUID_buf_string ( & e - > client_guid , & guid_strbuf ) ,
e - > lease_key . data [ 0 ] ,
e - > lease_key . data [ 1 ] ,
file_id_str_buf ( fsp - > file_id , & file_id_strbuf ) ,
nt_errstr ( status ) ) ;
smb_panic ( " leases_db_get() failed " ) ;
}
2019-08-20 15:47:27 +03:00
}
if ( ! state - > got_handle_lease & &
( ( e_lease_type & SMB2_LEASE_HANDLE ) ! = 0 ) & &
! share_entry_stale_pid ( e ) ) {
state - > got_handle_lease = true ;
}
if ( ! state - > got_oplock & &
( e - > op_type ! = LEASE_OPLOCK ) & &
! share_entry_stale_pid ( e ) ) {
state - > got_oplock = true ;
}
if ( ! state - > have_other_lease & &
! is_same_lease ( fsp , e , lease ) & &
! share_entry_stale_pid ( e ) ) {
state - > have_other_lease = true ;
}
2020-03-05 17:16:07 +03:00
if ( e_is_lease & & is_lease_stat_open ( fsp - > access_mask ) ) {
return false ;
}
2019-08-20 15:47:27 +03:00
break_to = e_lease_type & ~ state - > delay_mask ;
if ( state - > will_overwrite ) {
break_to & = ~ ( SMB2_LEASE_HANDLE | SMB2_LEASE_READ ) ;
}
DBG_DEBUG ( " e_lease_type %u, will_overwrite: %u \n " ,
( unsigned ) e_lease_type ,
( unsigned ) state - > will_overwrite ) ;
if ( ( e_lease_type & ~ break_to ) = = 0 ) {
if ( lease_is_breaking ) {
state - > delay = true ;
}
return false ;
}
if ( share_entry_stale_pid ( e ) ) {
return false ;
}
if ( state - > will_overwrite ) {
/*
* If we break anyway break to NONE directly .
* Otherwise vfs_set_filelen ( ) will trigger the
* break .
*/
break_to & = ~ ( SMB2_LEASE_READ | SMB2_LEASE_WRITE ) ;
}
if ( ! e_is_lease ) {
/*
* Oplocks only support breaking to R or NONE .
*/
break_to & = ~ ( SMB2_LEASE_HANDLE | SMB2_LEASE_WRITE ) ;
}
DBG_DEBUG ( " breaking from %d to %d \n " ,
( int ) e_lease_type ,
( int ) break_to ) ;
send_break_message (
fsp - > conn - > sconn - > msg_ctx , & fsp - > file_id , e , break_to ) ;
if ( e_lease_type & state - > delay_mask ) {
state - > delay = true ;
}
if ( lease_is_breaking & & ! state - > first_open_attempt ) {
state - > delay = true ;
}
return false ;
} ;
2019-08-10 22:17:05 +03:00
static NTSTATUS delay_for_oplock ( files_struct * fsp ,
int oplock_request ,
const struct smb2_lease * lease ,
struct share_mode_lock * lck ,
bool have_sharing_violation ,
uint32_t create_disposition ,
bool first_open_attempt )
{
2019-08-20 15:47:27 +03:00
struct delay_for_oplock_state state = {
. fsp = fsp ,
. lease = lease ,
. first_open_attempt = first_open_attempt ,
} ;
2019-08-10 22:23:24 +03:00
uint32_t granted ;
NTSTATUS status ;
2019-08-20 15:47:27 +03:00
bool ok ;
2019-08-10 22:17:05 +03:00
2020-03-05 17:12:20 +03:00
if ( is_oplock_stat_open ( fsp - > access_mask ) ) {
2019-08-10 22:23:24 +03:00
goto grant ;
2019-08-10 22:17:05 +03:00
}
2019-08-20 15:47:27 +03:00
state . delay_mask = have_sharing_violation ?
SMB2_LEASE_HANDLE : SMB2_LEASE_WRITE ;
2019-08-10 22:17:05 +03:00
switch ( create_disposition ) {
case FILE_SUPERSEDE :
case FILE_OVERWRITE :
case FILE_OVERWRITE_IF :
2019-08-20 15:47:27 +03:00
state . will_overwrite = true ;
2019-08-10 22:17:05 +03:00
break ;
default :
2019-08-20 15:47:27 +03:00
state . will_overwrite = false ;
2019-08-10 22:17:05 +03:00
break ;
}
2019-08-20 15:47:27 +03:00
ok = share_mode_forall_entries ( lck , delay_for_oplock_fn , & state ) ;
if ( ! ok ) {
return NT_STATUS_INTERNAL_ERROR ;
2019-08-10 22:17:05 +03:00
}
2019-08-20 15:47:27 +03:00
if ( state . delay ) {
2019-08-10 22:17:05 +03:00
return NT_STATUS_RETRY ;
}
2019-08-10 22:23:24 +03:00
grant :
if ( have_sharing_violation ) {
return NT_STATUS_SHARING_VIOLATION ;
}
2011-02-02 03:01:57 +03:00
2014-10-29 01:31:46 +03:00
if ( oplock_request = = LEASE_OPLOCK ) {
if ( lease = = NULL ) {
/*
* The SMB2 layer should have checked this
*/
return NT_STATUS_INTERNAL_ERROR ;
}
granted = lease - > lease_state ;
if ( lp_kernel_oplocks ( SNUM ( fsp - > conn ) ) ) {
DEBUG ( 10 , ( " No lease granted because kernel oplocks are enabled \n " ) ) ;
granted = SMB2_LEASE_NONE ;
}
if ( ( granted & ( SMB2_LEASE_READ | SMB2_LEASE_WRITE ) ) = = 0 ) {
DEBUG ( 10 , ( " No read or write lease requested \n " ) ) ;
granted = SMB2_LEASE_NONE ;
}
if ( granted = = SMB2_LEASE_WRITE ) {
DEBUG ( 10 , ( " pure write lease requested \n " ) ) ;
granted = SMB2_LEASE_NONE ;
}
if ( granted = = ( SMB2_LEASE_WRITE | SMB2_LEASE_HANDLE ) ) {
DEBUG ( 10 , ( " write and handle lease requested \n " ) ) ;
granted = SMB2_LEASE_NONE ;
}
} else {
granted = map_oplock_to_lease_type (
oplock_request & ~ SAMBA_PRIVATE_OPLOCK_MASK ) ;
2012-05-30 13:28:19 +04:00
}
if ( lp_locking ( fsp - > conn - > params ) & & file_has_brlocks ( fsp ) ) {
2019-08-10 22:23:24 +03:00
DBG_DEBUG ( " file %s has byte range locks \n " ,
fsp_str_dbg ( fsp ) ) ;
2014-10-29 01:31:46 +03:00
granted & = ~ SMB2_LEASE_READ ;
2013-10-24 22:53:36 +04:00
}
2019-08-20 15:47:27 +03:00
if ( state . have_other_lease ) {
2019-08-13 17:56:58 +03:00
/*
* Can grant only one writer
*/
granted & = ~ SMB2_LEASE_WRITE ;
2013-09-03 13:02:12 +04:00
}
2014-10-29 01:31:46 +03:00
if ( ( granted & SMB2_LEASE_READ ) & & ! ( granted & SMB2_LEASE_WRITE ) ) {
bool allow_level2 =
( global_client_caps & CAP_LEVEL_II_OPLOCKS ) & &
lp_level2_oplocks ( SNUM ( fsp - > conn ) ) ;
2005-09-30 21:13:37 +04:00
2014-10-29 01:31:46 +03:00
if ( ! allow_level2 ) {
granted = SMB2_LEASE_NONE ;
2008-12-18 04:23:13 +03:00
}
2006-07-26 12:08:48 +04:00
}
2006-01-13 01:17:54 +03:00
2014-10-29 01:31:46 +03:00
if ( oplock_request = = LEASE_OPLOCK ) {
2019-08-20 15:47:27 +03:00
if ( state . got_oplock ) {
2014-10-29 01:31:46 +03:00
granted & = ~ SMB2_LEASE_HANDLE ;
}
2014-10-29 01:27:09 +03:00
2014-10-29 01:31:46 +03:00
fsp - > oplock_type = LEASE_OPLOCK ;
2018-09-18 12:37:28 +03:00
status = grant_fsp_lease ( fsp , lck , lease , granted ) ;
2014-10-29 01:31:46 +03:00
if ( ! NT_STATUS_IS_OK ( status ) ) {
return status ;
}
2018-09-18 12:31:27 +03:00
2019-08-07 22:27:42 +03:00
DBG_DEBUG ( " lease_state=%d \n " , fsp - > lease - > lease . lease_state ) ;
2014-10-29 01:31:46 +03:00
} else {
2019-08-20 15:47:27 +03:00
if ( state . got_handle_lease ) {
2014-10-29 01:31:46 +03:00
granted = SMB2_LEASE_NONE ;
}
2018-09-18 11:53:23 +03:00
fsp - > oplock_type = map_lease_type_to_oplock ( granted ) ;
2014-10-29 01:31:46 +03:00
status = set_file_oplock ( fsp ) ;
if ( ! NT_STATUS_IS_OK ( status ) ) {
/*
* Could not get the kernel oplock
*/
fsp - > oplock_type = NO_OPLOCK ;
}
2014-10-29 01:27:09 +03:00
}
2020-11-05 17:39:51 +03:00
if ( granted & SMB2_LEASE_READ ) {
uint32_t acc , sh , ls ;
share_mode_flags_get ( lck , & acc , & sh , & ls ) ;
ls | = SHARE_MODE_LEASE_READ ;
share_mode_flags_set ( lck , acc , sh , ls , NULL ) ;
2019-06-30 10:15:48 +03:00
}
2019-08-10 22:23:24 +03:00
DBG_DEBUG ( " oplock type 0x%x on file %s \n " ,
fsp - > oplock_type , fsp_str_dbg ( fsp ) ) ;
2014-10-29 01:27:09 +03:00
return NT_STATUS_OK ;
2005-09-30 21:13:37 +04:00
}
2019-08-07 13:15:45 +03:00
static NTSTATUS handle_share_mode_lease (
files_struct * fsp ,
struct share_mode_lock * lck ,
uint32_t create_disposition ,
uint32_t access_mask ,
uint32_t share_access ,
int oplock_request ,
const struct smb2_lease * lease ,
bool first_open_attempt )
{
bool sharing_violation = false ;
NTSTATUS status ;
status = open_mode_check (
2020-11-05 12:42:10 +03:00
fsp - > conn , fsp - > file_id , lck , access_mask , share_access ) ;
2019-08-07 13:15:45 +03:00
if ( NT_STATUS_EQUAL ( status , NT_STATUS_SHARING_VIOLATION ) ) {
sharing_violation = true ;
status = NT_STATUS_OK ; /* handled later */
}
if ( ! NT_STATUS_IS_OK ( status ) ) {
return status ;
}
if ( oplock_request = = INTERNAL_OPEN_ONLY ) {
if ( sharing_violation ) {
DBG_DEBUG ( " Sharing violation for internal open \n " ) ;
return NT_STATUS_SHARING_VIOLATION ;
}
/*
* Internal opens never do oplocks or leases . We don ' t
* need to go through delay_for_oplock ( ) .
*/
fsp - > oplock_type = NO_OPLOCK ;
return NT_STATUS_OK ;
}
2019-08-10 22:15:22 +03:00
status = delay_for_oplock (
2019-08-07 13:15:45 +03:00
fsp ,
oplock_request ,
lease ,
lck ,
sharing_violation ,
create_disposition ,
first_open_attempt ) ;
2019-08-10 22:15:22 +03:00
if ( ! NT_STATUS_IS_OK ( status ) ) {
return status ;
2019-08-07 13:15:45 +03:00
}
2019-08-10 22:23:24 +03:00
return NT_STATUS_OK ;
2019-08-07 13:15:45 +03:00
}
2019-08-01 18:00:45 +03:00
static bool request_timed_out ( struct smb_request * req , struct timeval timeout )
2005-09-30 21:13:37 +04:00
{
struct timeval now , end_time ;
GetTimeOfDay ( & now ) ;
2019-08-01 18:00:45 +03:00
end_time = timeval_sum ( & req - > request_time , & timeout ) ;
2005-09-30 21:13:37 +04:00
return ( timeval_compare ( & end_time , & now ) < 0 ) ;
2004-06-08 20:14:31 +04:00
}
2012-11-29 19:10:22 +04:00
struct defer_open_state {
2014-09-16 09:38:44 +04:00
struct smbXsrv_connection * xconn ;
2012-11-29 19:10:22 +04:00
uint64_t mid ;
} ;
static void defer_open_done ( struct tevent_req * req ) ;
2017-03-07 17:48:05 +03:00
/**
* Defer an open and watch a locking . tdb record
*
* This defers an open that gets rescheduled once the locking . tdb record watch
* is triggered by a change to the record .
*
* It is used to defer opens that triggered an oplock break and for the SMB1
* sharing violation delay .
* */
2005-09-30 21:13:37 +04:00
static void defer_open ( struct share_mode_lock * lck ,
struct timeval timeout ,
2007-08-27 16:04:09 +04:00
struct smb_request * req ,
2017-03-07 16:37:54 +03:00
struct file_id id )
2004-06-08 20:14:31 +04:00
{
2017-03-07 16:37:54 +03:00
struct deferred_open_record * open_rec = NULL ;
struct timeval abs_timeout ;
2017-03-07 17:48:05 +03:00
struct defer_open_state * watch_state ;
struct tevent_req * watch_req ;
2019-08-01 14:24:49 +03:00
struct timeval_buf tvbuf1 , tvbuf2 ;
2019-09-09 17:30:57 +03:00
struct file_id_buf fbuf ;
2017-03-07 17:48:05 +03:00
bool ok ;
2017-03-07 16:37:54 +03:00
2019-08-01 17:42:59 +03:00
abs_timeout = timeval_sum ( & req - > request_time , & timeout ) ;
2017-03-07 16:37:54 +03:00
DBG_DEBUG ( " request time [%s] timeout [%s] mid [% " PRIu64 " ] "
2019-12-22 20:20:12 +03:00
" file_id [%s] \n " ,
2019-08-01 14:24:49 +03:00
timeval_str_buf ( & req - > request_time , false , true , & tvbuf1 ) ,
timeval_str_buf ( & abs_timeout , false , true , & tvbuf2 ) ,
2017-03-07 16:37:54 +03:00
req - > mid ,
2019-09-09 17:30:57 +03:00
file_id_str_buf ( id , & fbuf ) ) ;
2017-03-07 16:37:54 +03:00
2019-07-30 08:20:42 +03:00
open_rec = talloc_zero ( NULL , struct deferred_open_record ) ;
2014-06-20 18:12:14 +04:00
if ( open_rec = = NULL ) {
TALLOC_FREE ( lck ) ;
exit_server ( " talloc failed " ) ;
}
2017-03-07 17:48:05 +03:00
watch_state = talloc ( open_rec , struct defer_open_state ) ;
if ( watch_state = = NULL ) {
exit_server ( " talloc failed " ) ;
}
watch_state - > xconn = req - > xconn ;
watch_state - > mid = req - > mid ;
2012-11-29 19:10:22 +04:00
2017-03-07 17:48:05 +03:00
DBG_DEBUG ( " defering mid % " PRIu64 " \n " , req - > mid ) ;
2012-11-29 19:10:22 +04:00
2019-11-04 15:06:20 +03:00
watch_req = share_mode_watch_send (
watch_state ,
req - > sconn - > ev_ctx ,
2020-11-03 19:36:08 +03:00
lck ,
2019-11-04 15:06:20 +03:00
( struct server_id ) { 0 } ) ;
2017-03-07 17:48:05 +03:00
if ( watch_req = = NULL ) {
exit_server ( " Could not watch share mode record " ) ;
}
tevent_req_set_callback ( watch_req , defer_open_done , watch_state ) ;
2012-11-29 19:10:22 +04:00
2018-12-27 17:18:55 +03:00
ok = tevent_req_set_endtime ( watch_req , req - > sconn - > ev_ctx , abs_timeout ) ;
2017-03-07 17:48:05 +03:00
if ( ! ok ) {
exit_server ( " tevent_req_set_endtime failed " ) ;
2012-11-29 19:10:22 +04:00
}
2014-06-20 18:15:19 +04:00
2019-07-26 20:16:09 +03:00
ok = push_deferred_open_message_smb ( req , timeout , id , open_rec ) ;
2017-03-07 17:48:05 +03:00
if ( ! ok ) {
2014-06-20 18:15:19 +04:00
TALLOC_FREE ( lck ) ;
exit_server ( " push_deferred_open_message_smb failed " ) ;
}
2012-11-29 19:10:22 +04:00
}
static void defer_open_done ( struct tevent_req * req )
{
struct defer_open_state * state = tevent_req_callback_data (
req , struct defer_open_state ) ;
NTSTATUS status ;
2017-11-04 00:47:01 +03:00
bool ret ;
2012-11-29 19:10:22 +04:00
2019-11-04 15:06:20 +03:00
status = share_mode_watch_recv ( req , NULL , NULL ) ;
2012-11-29 19:10:22 +04:00
TALLOC_FREE ( req ) ;
if ( ! NT_STATUS_IS_OK ( status ) ) {
2016-07-13 08:27:30 +03:00
DEBUG ( 5 , ( " dbwrap_watched_watch_recv returned %s \n " ,
2012-11-29 19:10:22 +04:00
nt_errstr ( status ) ) ) ;
/*
* Even if it failed , retry anyway . TODO : We need a way to
* tell a re - scheduled open about that error .
*/
s3/smbd: fix deferred open with streams and kernel oplocks
I noticed smbd can get stuck in an open() call with kernel oplocks
enabled and named streams (provided by vfs_streams_xattr):
- client opens a file and with an exclusive oplock
- client starts writing to the file
- client opens an existing stream of the file
- the smbd process gets stuck in an open()
What happens is:
we had setup a locking.tdb record watch in defer_open(), the watch was
triggered, we reattempted the open and got stuck in a blocking open
because the oplock holder (ourselves) hadn't given up the oplock yet.
Cf e576bf5310bc9de9686a71539e9a1b60b4fba5cc for the commit that added
the kernel oplock retry logic. tldr: with kernel oplocks the first open
is non-blocking, but the second one is blocking.
Detailed analysis follows.
When opening a named stream of a file, Samba internally opens the
underlying "base" file first. This internal open of the basefile suceeds
and does *not* trigger an oplock break (because it is an internal open
that doesn't call open() at all) but it is added as an entry to the
locking.tdb record of the file.
Next, the stream open ends up in streams_xattr where a non-blocking
open() on the base file is called. This open fails with EWOULDBLOCK
because we have another fd with a kernel oplock on the file.
So we call defer_open() which sets up a watch on the locking.tdb record.
In the subsequent error unwinding code in open_file_ntcreate() and
callers we close the internal open file handle of the basefile which
also removes the entry from the locking.tdb record and so *changes the
record*.
This fires the record watch and in the callback defer_open_done() we
don't check whether the condition (oplock gone) we're interested in is
actually met. The callback blindly reschedules the open request with
schedule_deferred_open_message_smb().
schedule_deferred_open_message_smb() schedules an immediate tevent event
which has precedence over the IPC fd events in messaging, so the open is
always (!) reattempted before processing the oplock break message.
As explained above, this second open will be a blocking one so we get
stuck in a blocking open.
It doesn't help to make all opens non-blocking, that would just result
in a busy loop failing the open, as we never process the oplock break
message (remember, schedule_deferred_open_message_smb() used immediate
tevent events).
To fix this we must add some logic to the record watch callback to check
whether the record watch was done for a kernel oplock file and if yes,
check if the oplock state changed. If not, simply reschedule the
deferred open and keep waiting.
This logic is only needed for kernel oplocks, not for Samba-level
oplocks, because there's no risk of deadlocking, the worst that can
happen is a rescheduled open that fails again in the oplock checks and
gets deferred again.
Bug: https://bugzilla.samba.org/show_bug.cgi?id=7537
Signed-off-by: Ralph Boehme <slow@samba.org>
Reviewed-by: Jeremy Allison <jra@samba.org>
2017-03-07 18:27:39 +03:00
}
2017-11-04 00:47:01 +03:00
DEBUG ( 10 , ( " scheduling mid %llu \n " , ( unsigned long long ) state - > mid ) ) ;
s3/smbd: fix deferred open with streams and kernel oplocks
I noticed smbd can get stuck in an open() call with kernel oplocks
enabled and named streams (provided by vfs_streams_xattr):
- client opens a file and with an exclusive oplock
- client starts writing to the file
- client opens an existing stream of the file
- the smbd process gets stuck in an open()
What happens is:
we had setup a locking.tdb record watch in defer_open(), the watch was
triggered, we reattempted the open and got stuck in a blocking open
because the oplock holder (ourselves) hadn't given up the oplock yet.
Cf e576bf5310bc9de9686a71539e9a1b60b4fba5cc for the commit that added
the kernel oplock retry logic. tldr: with kernel oplocks the first open
is non-blocking, but the second one is blocking.
Detailed analysis follows.
When opening a named stream of a file, Samba internally opens the
underlying "base" file first. This internal open of the basefile suceeds
and does *not* trigger an oplock break (because it is an internal open
that doesn't call open() at all) but it is added as an entry to the
locking.tdb record of the file.
Next, the stream open ends up in streams_xattr where a non-blocking
open() on the base file is called. This open fails with EWOULDBLOCK
because we have another fd with a kernel oplock on the file.
So we call defer_open() which sets up a watch on the locking.tdb record.
In the subsequent error unwinding code in open_file_ntcreate() and
callers we close the internal open file handle of the basefile which
also removes the entry from the locking.tdb record and so *changes the
record*.
This fires the record watch and in the callback defer_open_done() we
don't check whether the condition (oplock gone) we're interested in is
actually met. The callback blindly reschedules the open request with
schedule_deferred_open_message_smb().
schedule_deferred_open_message_smb() schedules an immediate tevent event
which has precedence over the IPC fd events in messaging, so the open is
always (!) reattempted before processing the oplock break message.
As explained above, this second open will be a blocking one so we get
stuck in a blocking open.
It doesn't help to make all opens non-blocking, that would just result
in a busy loop failing the open, as we never process the oplock break
message (remember, schedule_deferred_open_message_smb() used immediate
tevent events).
To fix this we must add some logic to the record watch callback to check
whether the record watch was done for a kernel oplock file and if yes,
check if the oplock state changed. If not, simply reschedule the
deferred open and keep waiting.
This logic is only needed for kernel oplocks, not for Samba-level
oplocks, because there's no risk of deadlocking, the worst that can
happen is a rescheduled open that fails again in the oplock checks and
gets deferred again.
Bug: https://bugzilla.samba.org/show_bug.cgi?id=7537
Signed-off-by: Ralph Boehme <slow@samba.org>
Reviewed-by: Jeremy Allison <jra@samba.org>
2017-03-07 18:27:39 +03:00
2017-11-04 00:47:01 +03:00
ret = schedule_deferred_open_message_smb ( state - > xconn , state - > mid ) ;
SMB_ASSERT ( ret ) ;
TALLOC_FREE ( state ) ;
2004-06-08 20:14:31 +04:00
}
2017-03-07 17:03:12 +03:00
/**
2017-11-09 23:48:15 +03:00
* Actually attempt the kernel oplock polling open .
*/
2019-07-30 15:00:17 +03:00
static void poll_open_fn ( struct tevent_context * ev ,
struct tevent_timer * te ,
struct timeval current_time ,
void * private_data )
2017-11-09 23:48:15 +03:00
{
2019-07-30 13:24:53 +03:00
struct deferred_open_record * open_rec = talloc_get_type_abort (
private_data , struct deferred_open_record ) ;
2017-11-09 23:48:15 +03:00
bool ok ;
2019-08-18 09:57:38 +03:00
TALLOC_FREE ( open_rec - > watch_req ) ;
2019-07-30 13:24:53 +03:00
ok = schedule_deferred_open_message_smb (
open_rec - > xconn , open_rec - > mid ) ;
2017-11-09 23:48:15 +03:00
if ( ! ok ) {
exit_server ( " schedule_deferred_open_message_smb failed " ) ;
}
2019-07-30 15:00:17 +03:00
DBG_DEBUG ( " timer fired. Retrying open ! \n " ) ;
2017-11-09 23:48:15 +03:00
}
2019-08-18 09:55:14 +03:00
static void poll_open_done ( struct tevent_req * subreq ) ;
2017-11-09 23:48:15 +03:00
/**
* Reschedule an open for 1 second from now , if not timed out .
2017-03-07 17:03:12 +03:00
* */
2019-07-30 15:51:00 +03:00
static bool setup_poll_open (
2019-07-30 15:00:17 +03:00
struct smb_request * req ,
2019-08-18 09:55:14 +03:00
struct share_mode_lock * lck ,
2019-07-30 15:00:17 +03:00
struct file_id id ,
struct timeval max_timeout ,
struct timeval interval )
2017-03-07 17:03:12 +03:00
{
bool ok ;
2017-11-09 23:48:15 +03:00
struct deferred_open_record * open_rec = NULL ;
2019-08-02 15:33:22 +03:00
struct timeval endtime , next_interval ;
2019-09-09 17:32:21 +03:00
struct file_id_buf ftmp ;
2017-03-07 17:03:12 +03:00
2019-07-30 15:00:17 +03:00
if ( request_timed_out ( req , max_timeout ) ) {
2019-07-30 15:51:00 +03:00
return false ;
2017-11-09 23:48:15 +03:00
}
2017-03-07 17:03:12 +03:00
2019-07-30 08:20:42 +03:00
open_rec = talloc_zero ( NULL , struct deferred_open_record ) ;
2017-03-07 17:03:12 +03:00
if ( open_rec = = NULL ) {
2019-07-30 14:41:17 +03:00
DBG_WARNING ( " talloc failed \n " ) ;
2019-07-30 15:51:00 +03:00
return false ;
2017-03-07 17:03:12 +03:00
}
2019-07-30 13:24:53 +03:00
open_rec - > xconn = req - > xconn ;
open_rec - > mid = req - > mid ;
2017-03-07 17:03:12 +03:00
2019-08-02 15:33:22 +03:00
/*
* Make sure open_rec - > te does not come later than the
* request ' s maximum endtime .
*/
endtime = timeval_sum ( & req - > request_time , & max_timeout ) ;
next_interval = timeval_current_ofs ( interval . tv_sec , interval . tv_usec ) ;
next_interval = timeval_min ( & endtime , & next_interval ) ;
2019-07-30 15:00:17 +03:00
open_rec - > te = tevent_add_timer (
req - > sconn - > ev_ctx ,
open_rec ,
2019-08-02 15:33:22 +03:00
next_interval ,
2019-07-30 15:00:17 +03:00
poll_open_fn ,
open_rec ) ;
2017-11-09 23:48:15 +03:00
if ( open_rec - > te = = NULL ) {
2019-07-30 14:41:17 +03:00
DBG_WARNING ( " tevent_add_timer failed \n " ) ;
TALLOC_FREE ( open_rec ) ;
2019-07-30 15:51:00 +03:00
return false ;
2019-07-30 14:41:17 +03:00
}
2019-08-18 09:55:14 +03:00
if ( lck ! = NULL ) {
2019-11-04 15:06:20 +03:00
open_rec - > watch_req = share_mode_watch_send (
2019-08-18 09:55:14 +03:00
open_rec ,
req - > sconn - > ev_ctx ,
2020-11-03 19:36:08 +03:00
lck ,
2019-08-18 09:55:14 +03:00
( struct server_id ) { 0 } ) ;
2019-08-18 09:57:38 +03:00
if ( open_rec - > watch_req = = NULL ) {
2019-11-04 15:06:20 +03:00
DBG_WARNING ( " share_mode_watch_send failed \n " ) ;
2019-08-18 09:55:14 +03:00
TALLOC_FREE ( open_rec ) ;
return false ;
}
2019-08-18 09:57:38 +03:00
tevent_req_set_callback (
open_rec - > watch_req , poll_open_done , open_rec ) ;
2019-08-18 09:55:14 +03:00
}
2019-07-30 15:00:17 +03:00
ok = push_deferred_open_message_smb ( req , max_timeout , id , open_rec ) ;
2019-07-30 14:41:17 +03:00
if ( ! ok ) {
DBG_WARNING ( " push_deferred_open_message_smb failed \n " ) ;
TALLOC_FREE ( open_rec ) ;
2019-07-30 15:51:00 +03:00
return false ;
2017-03-07 17:03:12 +03:00
}
2017-11-09 23:48:15 +03:00
DBG_DEBUG ( " poll request time [%s] mid [% " PRIu64 " ] file_id [%s] \n " ,
2019-08-01 17:42:59 +03:00
timeval_string ( talloc_tos ( ) , & req - > request_time , false ) ,
2017-11-09 23:48:15 +03:00
req - > mid ,
2019-09-09 17:32:21 +03:00
file_id_str_buf ( id , & ftmp ) ) ;
2019-07-30 15:51:00 +03:00
return true ;
2017-03-07 17:03:12 +03:00
}
2000-06-15 13:35:37 +04:00
2019-08-18 09:55:14 +03:00
static void poll_open_done ( struct tevent_req * subreq )
{
struct deferred_open_record * open_rec = tevent_req_callback_data (
subreq , struct deferred_open_record ) ;
NTSTATUS status ;
bool ok ;
2019-11-04 15:06:20 +03:00
status = share_mode_watch_recv ( subreq , NULL , NULL ) ;
2019-08-18 09:55:14 +03:00
TALLOC_FREE ( subreq ) ;
2021-03-17 18:22:37 +03:00
open_rec - > watch_req = NULL ;
2021-03-17 18:24:28 +03:00
TALLOC_FREE ( open_rec - > te ) ;
2021-03-17 18:22:37 +03:00
2019-08-18 09:55:14 +03:00
DBG_DEBUG ( " dbwrap_watched_watch_recv returned %s \n " ,
nt_errstr ( status ) ) ;
ok = schedule_deferred_open_message_smb (
open_rec - > xconn , open_rec - > mid ) ;
if ( ! ok ) {
exit_server ( " schedule_deferred_open_message_smb failed " ) ;
}
}
2019-07-30 15:54:18 +03:00
bool defer_smb1_sharing_violation ( struct smb_request * req )
{
bool ok ;
int timeout_usecs ;
if ( ! lp_defer_sharing_violations ( ) ) {
return false ;
}
/*
* Try every 200 msec up to ( by default ) one second . To be
* precise , according to behaviour note < 247 > in [ MS - CIFS ] ,
* the server tries 5 times . But up to one second should be
* close enough .
*/
timeout_usecs = lp_parm_int (
SNUM ( req - > conn ) ,
" smbd " ,
" sharedelay " ,
SHARING_VIOLATION_USEC_WAIT ) ;
ok = setup_poll_open (
req ,
2019-08-18 09:55:14 +03:00
NULL ,
2019-07-30 15:54:18 +03:00
( struct file_id ) { 0 } ,
( struct timeval ) { . tv_usec = timeout_usecs } ,
( struct timeval ) { . tv_usec = 200000 } ) ;
return ok ;
}
2005-07-08 08:51:27 +04:00
/****************************************************************************
On overwrite open ensure that the attributes match .
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
1999-12-13 16:27:58 +03:00
2012-08-31 16:52:21 +04:00
static bool open_match_attributes ( connection_struct * conn ,
2015-04-27 02:02:55 +03:00
uint32_t old_dos_attr ,
uint32_t new_dos_attr ,
2012-08-31 16:52:21 +04:00
mode_t new_unx_mode ,
mode_t * returned_unx_mode )
2002-09-25 19:19:00 +04:00
{
2015-04-27 02:02:55 +03:00
uint32_t noarch_old_dos_attr , noarch_new_dos_attr ;
2002-09-25 19:19:00 +04:00
2005-07-08 08:51:27 +04:00
noarch_old_dos_attr = ( old_dos_attr & ~ FILE_ATTRIBUTE_ARCHIVE ) ;
noarch_new_dos_attr = ( new_dos_attr & ~ FILE_ATTRIBUTE_ARCHIVE ) ;
2003-02-04 04:11:56 +03:00
2005-07-08 08:51:27 +04:00
if ( ( noarch_old_dos_attr = = 0 & & noarch_new_dos_attr ! = 0 ) | |
( noarch_old_dos_attr ! = 0 & & ( ( noarch_old_dos_attr & noarch_new_dos_attr ) = = noarch_old_dos_attr ) ) ) {
* returned_unx_mode = new_unx_mode ;
} else {
* returned_unx_mode = ( mode_t ) 0 ;
}
2003-01-08 05:09:18 +03:00
2009-06-16 01:14:31 +04:00
DEBUG ( 10 , ( " open_match_attributes: old_dos_attr = 0x%x, "
2018-05-17 19:37:23 +03:00
" new_dos_attr = 0x%x "
2005-07-08 08:51:27 +04:00
" returned_unx_mode = 0%o \n " ,
( unsigned int ) old_dos_attr ,
( unsigned int ) new_dos_attr ,
( unsigned int ) * returned_unx_mode ) ) ;
2003-01-08 05:09:18 +03:00
2002-09-25 19:19:00 +04:00
/* If we're mapping SYSTEM and HIDDEN ensure they match. */
2004-04-02 22:46:19 +04:00
if ( lp_map_system ( SNUM ( conn ) ) | | lp_store_dos_attributes ( SNUM ( conn ) ) ) {
2005-07-08 08:51:27 +04:00
if ( ( old_dos_attr & FILE_ATTRIBUTE_SYSTEM ) & &
! ( new_dos_attr & FILE_ATTRIBUTE_SYSTEM ) ) {
2002-09-25 19:19:00 +04:00
return False ;
2005-07-08 08:51:27 +04:00
}
2002-09-25 19:19:00 +04:00
}
2004-04-02 22:46:19 +04:00
if ( lp_map_hidden ( SNUM ( conn ) ) | | lp_store_dos_attributes ( SNUM ( conn ) ) ) {
2005-07-08 08:51:27 +04:00
if ( ( old_dos_attr & FILE_ATTRIBUTE_HIDDEN ) & &
! ( new_dos_attr & FILE_ATTRIBUTE_HIDDEN ) ) {
2002-09-25 19:19:00 +04:00
return False ;
2005-07-08 08:51:27 +04:00
}
2002-09-25 19:19:00 +04:00
}
return True ;
}
2007-07-05 20:27:47 +04:00
static void schedule_defer_open ( struct share_mode_lock * lck ,
2014-03-20 17:36:11 +04:00
struct file_id id ,
2017-11-04 00:47:01 +03:00
struct smb_request * req )
2006-04-19 22:48:14 +04:00
{
/* This is a relative time, added to the absolute
request_time value to get the absolute timeout time .
Note that if this is the second or greater time we enter
this codepath for this particular request mid then
request_time is left as the absolute time of the * first *
time this request mid was processed . This is what allows
the request to eventually time out . */
struct timeval timeout ;
/* Normally the smbd we asked should respond within
* OPLOCK_BREAK_TIMEOUT seconds regardless of whether
* the client did , give twice the timeout as a safety
* measure here in case the other smbd is stuck
* somewhere else . */
timeout = timeval_set ( OPLOCK_BREAK_TIMEOUT * 2 , 0 ) ;
2019-08-01 18:00:45 +03:00
if ( request_timed_out ( req , timeout ) ) {
2017-03-07 16:37:54 +03:00
return ;
2006-04-19 22:48:14 +04:00
}
2017-03-07 16:37:54 +03:00
2019-12-22 20:20:12 +03:00
defer_open ( lck , timeout , req , id ) ;
2006-04-19 22:48:14 +04:00
}
2012-06-30 00:14:10 +04:00
/****************************************************************************
Reschedule an open call that went asynchronous .
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
2017-03-07 17:33:55 +03:00
static void schedule_async_open_timer ( struct tevent_context * ev ,
struct tevent_timer * te ,
struct timeval current_time ,
void * private_data )
{
exit_server ( " async open timeout " ) ;
}
2019-08-01 17:42:59 +03:00
static void schedule_async_open ( struct smb_request * req )
2012-06-30 00:14:10 +04:00
{
2017-03-07 17:33:55 +03:00
struct deferred_open_record * open_rec = NULL ;
struct timeval timeout = timeval_set ( 20 , 0 ) ;
bool ok ;
2012-06-30 00:14:10 +04:00
2019-08-01 18:00:45 +03:00
if ( request_timed_out ( req , timeout ) ) {
2017-03-07 16:37:54 +03:00
return ;
2012-06-30 00:14:10 +04:00
}
2017-03-07 16:37:54 +03:00
2019-07-30 08:20:42 +03:00
open_rec = talloc_zero ( NULL , struct deferred_open_record ) ;
2017-03-07 17:33:55 +03:00
if ( open_rec = = NULL ) {
exit_server ( " deferred_open_record_create failed " ) ;
}
2019-07-30 08:20:42 +03:00
open_rec - > async_open = true ;
2017-03-07 17:33:55 +03:00
2019-08-01 17:42:59 +03:00
ok = push_deferred_open_message_smb (
req , timeout , ( struct file_id ) { 0 } , open_rec ) ;
2017-03-07 17:33:55 +03:00
if ( ! ok ) {
exit_server ( " push_deferred_open_message_smb failed " ) ;
}
2018-12-27 17:18:55 +03:00
open_rec - > te = tevent_add_timer ( req - > sconn - > ev_ctx ,
2017-03-07 17:33:55 +03:00
req ,
timeval_current_ofs ( 20 , 0 ) ,
schedule_async_open_timer ,
open_rec ) ;
if ( open_rec - > te = = NULL ) {
exit_server ( " tevent_add_timer failed " ) ;
}
2012-06-30 00:14:10 +04:00
}
2008-11-04 10:18:43 +03:00
/****************************************************************************
Work out what access_mask to use from what the client sent us .
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
2011-12-16 21:42:30 +04:00
static NTSTATUS smbd_calculate_maximum_allowed_access (
connection_struct * conn ,
2020-05-01 20:18:08 +03:00
struct files_struct * dirfsp ,
2011-12-16 21:42:30 +04:00
const struct smb_filename * smb_fname ,
2012-09-14 04:12:24 +04:00
bool use_privs ,
2011-12-16 21:42:30 +04:00
uint32_t * p_access_mask )
{
2011-12-16 21:51:19 +04:00
struct security_descriptor * sd ;
uint32_t access_granted ;
2011-12-16 21:42:30 +04:00
NTSTATUS status ;
2020-05-01 20:18:08 +03:00
SMB_ASSERT ( dirfsp = = conn - > cwd_fsp ) ;
2012-09-14 04:12:24 +04:00
if ( ! use_privs & & ( get_current_uid ( conn ) = = ( uid_t ) 0 ) ) {
2011-12-16 21:45:14 +04:00
* p_access_mask | = FILE_GENERIC_ALL ;
2011-12-16 21:47:03 +04:00
return NT_STATUS_OK ;
}
2020-04-14 07:28:47 +03:00
status = SMB_VFS_GET_NT_ACL_AT ( conn ,
dirfsp ,
smb_fname ,
( SECINFO_OWNER |
SECINFO_GROUP |
SECINFO_DACL ) ,
talloc_tos ( ) ,
& sd ) ;
2011-12-16 21:42:30 +04:00
2011-12-16 21:51:19 +04:00
if ( NT_STATUS_EQUAL ( status , NT_STATUS_OBJECT_NAME_NOT_FOUND ) ) {
2011-12-16 21:42:30 +04:00
/*
2011-12-16 21:51:19 +04:00
* File did not exist
2011-12-16 21:42:30 +04:00
*/
2011-12-16 21:51:19 +04:00
* p_access_mask = FILE_GENERIC_ALL ;
return NT_STATUS_OK ;
}
if ( ! NT_STATUS_IS_OK ( status ) ) {
2012-09-14 04:08:43 +04:00
DEBUG ( 10 , ( " Could not get acl on file %s: %s \n " ,
2011-12-16 21:51:19 +04:00
smb_fname_str_dbg ( smb_fname ) ,
nt_errstr ( status ) ) ) ;
return NT_STATUS_ACCESS_DENIED ;
}
2011-12-16 21:42:30 +04:00
2011-12-16 21:51:19 +04:00
/*
2012-11-15 02:40:50 +04:00
* If we can access the path to this file , by
* default we have FILE_READ_ATTRIBUTES from the
* containing directory . See the section :
* " Algorithm to Check Access to an Existing File "
* in MS - FSA . pdf .
*
* se_file_access_check ( )
2011-12-16 21:51:19 +04:00
* also takes care of owner WRITE_DAC and READ_CONTROL .
*/
2012-08-28 03:07:32 +04:00
status = se_file_access_check ( sd ,
2011-12-16 21:51:19 +04:00
get_current_nttok ( conn ) ,
2012-09-14 04:12:24 +04:00
use_privs ,
2011-12-16 21:51:19 +04:00
( * p_access_mask & ~ FILE_READ_ATTRIBUTES ) ,
& access_granted ) ;
2011-12-16 21:42:30 +04:00
2011-12-16 21:51:19 +04:00
TALLOC_FREE ( sd ) ;
2011-12-16 21:42:30 +04:00
2011-12-16 21:51:19 +04:00
if ( ! NT_STATUS_IS_OK ( status ) ) {
2012-09-14 04:08:43 +04:00
DEBUG ( 10 , ( " Access denied on file %s: "
2011-12-16 21:51:19 +04:00
" when calculating maximum access \n " ,
smb_fname_str_dbg ( smb_fname ) ) ) ;
return NT_STATUS_ACCESS_DENIED ;
2011-12-16 21:42:30 +04:00
}
2011-12-16 21:51:19 +04:00
* p_access_mask = ( access_granted | FILE_READ_ATTRIBUTES ) ;
2012-09-20 23:32:10 +04:00
if ( ! ( access_granted & DELETE_ACCESS ) ) {
2020-05-01 01:20:34 +03:00
if ( can_delete_file_in_directory ( conn ,
2020-05-01 01:28:32 +03:00
conn - > cwd_fsp ,
2020-05-01 01:20:34 +03:00
smb_fname ) )
{
2012-09-20 23:32:10 +04:00
* p_access_mask | = DELETE_ACCESS ;
}
}
2011-12-16 21:42:30 +04:00
return NT_STATUS_OK ;
}
2011-07-10 15:00:25 +04:00
NTSTATUS smbd_calculate_access_mask ( connection_struct * conn ,
2020-05-01 20:13:58 +03:00
struct files_struct * dirfsp ,
2020-05-01 20:09:53 +03:00
const struct smb_filename * smb_fname ,
bool use_privs ,
uint32_t access_mask ,
uint32_t * access_mask_out )
2008-11-04 10:18:43 +03:00
{
NTSTATUS status ;
2011-07-10 15:03:51 +04:00
uint32_t orig_access_mask = access_mask ;
uint32_t rejected_share_access ;
2008-11-04 10:18:43 +03:00
2020-05-01 20:13:58 +03:00
SMB_ASSERT ( dirfsp = = conn - > cwd_fsp ) ;
2017-01-23 18:19:06 +03:00
if ( access_mask & SEC_MASK_INVALID ) {
DBG_DEBUG ( " access_mask [%8x] contains invalid bits \n " ,
access_mask ) ;
return NT_STATUS_ACCESS_DENIED ;
}
2008-11-04 10:18:43 +03:00
/*
* Convert GENERIC bits to specific bits .
*/
se_map_generic ( & access_mask , & file_generic_mapping ) ;
/* Calculate MAXIMUM_ALLOWED_ACCESS if requested. */
if ( access_mask & MAXIMUM_ALLOWED_ACCESS ) {
2020-05-01 20:15:14 +03:00
status = smbd_calculate_maximum_allowed_access ( conn ,
2020-05-01 20:18:08 +03:00
dirfsp ,
2020-05-01 20:15:14 +03:00
smb_fname ,
use_privs ,
& access_mask ) ;
2008-11-04 10:18:43 +03:00
2011-12-16 21:42:30 +04:00
if ( ! NT_STATUS_IS_OK ( status ) ) {
return status ;
2008-11-04 10:18:43 +03:00
}
2011-07-10 15:03:51 +04:00
access_mask & = conn - > share_access ;
}
rejected_share_access = access_mask & ~ ( conn - > share_access ) ;
if ( rejected_share_access ) {
DEBUG ( 10 , ( " smbd_calculate_access_mask: Access denied on "
" file %s: rejected by share access mask[0x%08X] "
" orig[0x%08X] mapped[0x%08X] reject[0x%08X] \n " ,
smb_fname_str_dbg ( smb_fname ) ,
conn - > share_access ,
orig_access_mask , access_mask ,
rejected_share_access ) ) ;
return NT_STATUS_ACCESS_DENIED ;
2008-11-04 10:18:43 +03:00
}
* access_mask_out = access_mask ;
return NT_STATUS_OK ;
}
2010-04-24 00:10:15 +04:00
/****************************************************************************
Remove the deferred open entry under lock .
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
2012-06-30 01:25:53 +04:00
/****************************************************************************
Return true if this is a state pointer to an asynchronous create .
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
2014-06-20 18:12:14 +04:00
bool is_deferred_open_async ( const struct deferred_open_record * rec )
2012-06-30 01:25:53 +04:00
{
2014-06-20 18:12:14 +04:00
return rec - > async_open ;
2012-06-30 01:25:53 +04:00
}
2012-09-02 15:06:22 +04:00
static bool clear_ads ( uint32_t create_disposition )
{
bool ret = false ;
switch ( create_disposition ) {
case FILE_SUPERSEDE :
case FILE_OVERWRITE_IF :
case FILE_OVERWRITE :
ret = true ;
break ;
default :
break ;
}
return ret ;
}
2012-09-02 22:47:46 +04:00
static int disposition_to_open_flags ( uint32_t create_disposition )
{
int ret = 0 ;
/*
* Currently we ' re using FILE_SUPERSEDE as the same as
* FILE_OVERWRITE_IF but they really are
* different . FILE_SUPERSEDE deletes an existing file
* ( requiring delete access ) then recreates it .
*/
switch ( create_disposition ) {
case FILE_SUPERSEDE :
case FILE_OVERWRITE_IF :
/*
* If file exists replace / overwrite . If file doesn ' t
* exist create .
*/
ret = O_CREAT | O_TRUNC ;
break ;
case FILE_OPEN :
/*
* If file exists open . If file doesn ' t exist error .
*/
ret = 0 ;
break ;
case FILE_OVERWRITE :
/*
* If file exists overwrite . If file doesn ' t exist
* error .
*/
ret = O_TRUNC ;
break ;
case FILE_CREATE :
/*
* If file exists error . If file doesn ' t exist create .
*/
ret = O_CREAT | O_EXCL ;
break ;
case FILE_OPEN_IF :
/*
* If file exists open . If file doesn ' t exist create .
*/
ret = O_CREAT ;
break ;
}
return ret ;
}
2012-09-04 11:22:49 +04:00
static int calculate_open_access_flags ( uint32_t access_mask ,
uint32_t private_flags )
{
2012-09-04 11:28:26 +04:00
bool need_write , need_read ;
2012-09-04 11:22:49 +04:00
/*
* Note that we ignore the append flag as append does not
* mean the same thing under DOS and Unix .
*/
2013-09-04 19:26:30 +04:00
need_write = ( access_mask & ( FILE_WRITE_DATA | FILE_APPEND_DATA ) ) ;
2012-09-04 11:26:28 +04:00
if ( ! need_write ) {
return O_RDONLY ;
}
/* DENY_DOS opens are always underlying read-write on the
file handle , no matter what the requested access mask
says . */
2012-09-04 11:28:26 +04:00
need_read =
2020-10-23 18:41:33 +03:00
( ( private_flags & NTCREATEX_FLAG_DENY_DOS ) | |
2012-09-04 11:28:26 +04:00
access_mask & ( FILE_READ_ATTRIBUTES | FILE_READ_DATA |
FILE_READ_EA | FILE_EXECUTE ) ) ;
if ( ! need_read ) {
return O_WRONLY ;
2012-09-04 11:22:49 +04:00
}
2012-09-04 11:28:26 +04:00
return O_RDWR ;
2012-09-04 11:22:49 +04:00
}
2002-02-26 08:45:33 +03:00
/****************************************************************************
2008-11-21 23:14:53 +03:00
Open a file with a share mode . Passed in an already created files_struct * .
2002-02-26 08:45:33 +03:00
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
2003-01-08 05:09:18 +03:00
2008-11-23 06:40:09 +03:00
static NTSTATUS open_file_ntcreate ( connection_struct * conn ,
2007-07-05 20:26:27 +04:00
struct smb_request * req ,
2015-04-27 02:02:55 +03:00
uint32_t access_mask , /* access bits (FILE_READ_DATA etc.) */
uint32_t share_access , /* share constants (FILE_SHARE_READ etc) */
uint32_t create_disposition , /* FILE_OPEN_IF etc. */
uint32_t create_options , /* options such as delete on close. */
uint32_t new_dos_attributes , /* attributes used for new file. */
2006-07-25 12:51:54 +04:00
int oplock_request , /* internal Samba oplock codes. */
2019-08-07 22:30:56 +03:00
const struct smb2_lease * lease ,
2006-07-25 12:51:54 +04:00
/* Information (FILE_EXISTS etc.) */
2010-03-06 02:10:30 +03:00
uint32_t private_flags , /* Samba specific flags. */
2021-05-25 02:51:16 +03:00
struct smb_filename * parent_dir_fname , /* parent. */
struct smb_filename * smb_fname_atname , /* atname relative to parent. */
2006-07-25 12:51:54 +04:00
int * pinfo ,
2008-11-21 23:14:53 +03:00
files_struct * fsp )
1998-08-17 17:11:34 +04:00
{
2009-12-04 03:45:35 +03:00
struct smb_filename * smb_fname = fsp - > fsp_name ;
2000-04-22 04:33:16 +04:00
int flags = 0 ;
int flags2 = 0 ;
2009-06-16 01:14:31 +04:00
bool file_existed = VALID_STAT ( smb_fname - > st ) ;
2007-10-19 04:40:25 +04:00
bool def_acl = False ;
bool posix_open = False ;
bool new_file_created = False ;
2012-09-25 22:37:33 +04:00
bool first_open_attempt = true ;
2006-07-11 22:01:26 +04:00
NTSTATUS fsp_open = NT_STATUS_ACCESS_DENIED ;
2005-07-08 08:51:27 +04:00
mode_t new_unx_mode = ( mode_t ) 0 ;
mode_t unx_mode = ( mode_t ) 0 ;
int info ;
2015-04-27 02:02:55 +03:00
uint32_t existing_dos_attributes = 0 ;
2005-09-30 21:13:37 +04:00
struct share_mode_lock * lck = NULL ;
2015-04-27 02:02:55 +03:00
uint32_t open_access_mask = access_mask ;
2005-09-30 21:13:37 +04:00
NTSTATUS status ;
2012-07-10 21:15:07 +04:00
SMB_STRUCT_STAT saved_stat = smb_fname - > st ;
2012-09-26 21:52:14 +04:00
struct timespec old_write_time ;
2020-02-20 16:13:35 +03:00
bool setup_poll = false ;
2019-08-06 17:28:29 +03:00
bool ok ;
2005-07-08 08:51:27 +04:00
if ( conn - > printer ) {
2008-11-21 23:14:53 +03:00
/*
2005-07-08 08:51:27 +04:00
* Printers are handled completely differently .
* Most of the passed parameters are ignored .
*/
if ( pinfo ) {
* pinfo = FILE_WAS_CREATED ;
}
2009-06-16 01:14:31 +04:00
DEBUG ( 10 , ( " open_file_ntcreate: printer open fname=%s \n " ,
smb_fname_str_dbg ( smb_fname ) ) ) ;
2005-07-08 08:51:27 +04:00
2009-06-20 01:55:00 +04:00
if ( ! req ) {
DEBUG ( 0 , ( " open_file_ntcreate: printer open without "
" an SMB request! \n " ) ) ;
return NT_STATUS_INTERNAL_ERROR ;
}
2010-05-04 12:28:48 +04:00
return print_spool_open ( fsp , smb_fname - > base_name ,
req - > vuid ) ;
2005-07-08 08:51:27 +04:00
}
2007-02-07 00:05:34 +03:00
if ( new_dos_attributes & FILE_FLAG_POSIX_SEMANTICS ) {
posix_open = True ;
unx_mode = ( mode_t ) ( new_dos_attributes & ~ FILE_FLAG_POSIX_SEMANTICS ) ;
new_dos_attributes = 0 ;
} else {
2011-10-05 01:46:00 +04:00
/* Windows allows a new file to be created and
silently removes a FILE_ATTRIBUTE_DIRECTORY
sent by the client . Do the same . */
new_dos_attributes & = ~ FILE_ATTRIBUTE_DIRECTORY ;
2011-04-29 06:00:57 +04:00
/* We add FILE_ATTRIBUTE_ARCHIVE to this as this mode is only used if the file is
2007-02-07 00:05:34 +03:00
* created new . */
2011-04-29 06:00:57 +04:00
unx_mode = unix_mode ( conn , new_dos_attributes | FILE_ATTRIBUTE_ARCHIVE ,
2020-04-28 19:18:08 +03:00
smb_fname , parent_dir_fname ) ;
2007-02-07 00:05:34 +03:00
}
2005-07-08 08:51:27 +04:00
DEBUG ( 10 , ( " open_file_ntcreate: fname=%s, dos_attrs=0x%x "
" access_mask=0x%x share_access=0x%x "
" create_disposition = 0x%x create_options=0x%x "
2010-03-06 02:10:30 +03:00
" unix mode=0%o oplock_request=%d private_flags = 0x%x \n " ,
2009-06-16 01:14:31 +04:00
smb_fname_str_dbg ( smb_fname ) , new_dos_attributes ,
access_mask , share_access , create_disposition ,
2010-03-06 02:10:30 +03:00
create_options , ( unsigned int ) unx_mode , oplock_request ,
( unsigned int ) private_flags ) ) ;
2000-04-22 04:33:16 +04:00
2014-05-01 22:01:03 +04:00
if ( req = = NULL ) {
/* Ensure req == NULL means INTERNAL_OPEN_ONLY */
2019-08-06 18:27:12 +03:00
SMB_ASSERT ( oplock_request = = INTERNAL_OPEN_ONLY ) ;
2014-05-01 22:01:03 +04:00
} else {
/* And req != NULL means no INTERNAL_OPEN_ONLY */
SMB_ASSERT ( ( ( oplock_request & INTERNAL_OPEN_ONLY ) = = 0 ) ) ;
2007-07-05 20:26:27 +04:00
}
/*
* Only non - internal opens can be deferred at all
*/
2010-04-10 06:26:34 +04:00
if ( req ) {
2014-06-20 18:12:14 +04:00
struct deferred_open_record * open_rec ;
2019-08-02 12:54:11 +03:00
if ( get_deferred_open_message_state ( req , NULL , & open_rec ) ) {
2019-08-01 17:36:48 +03:00
2012-06-30 00:14:10 +04:00
/* If it was an async create retry, the file
didn ' t exist . */
2012-06-30 01:25:53 +04:00
2014-06-20 18:12:14 +04:00
if ( is_deferred_open_async ( open_rec ) ) {
2012-06-30 00:14:10 +04:00
SET_STAT_INVALID ( smb_fname - > st ) ;
file_existed = false ;
}
2004-06-08 20:14:31 +04:00
2010-04-10 06:26:34 +04:00
/* Ensure we don't reprocess this message. */
2014-09-16 09:32:14 +04:00
remove_deferred_open_message_smb ( req - > xconn , req - > mid ) ;
2012-09-25 22:37:33 +04:00
first_open_attempt = false ;
2004-06-08 20:14:31 +04:00
}
2000-04-22 04:33:16 +04:00
}
1998-08-17 17:11:34 +04:00
2007-02-07 00:05:34 +03:00
if ( ! posix_open ) {
new_dos_attributes & = SAMBA_ATTRIBUTES_MASK ;
if ( file_existed ) {
2016-06-23 13:24:33 +03:00
/*
2019-06-14 20:08:57 +03:00
* Only use stored DOS attributes for checks
2016-06-23 13:24:33 +03:00
* against requested attributes ( below via
* open_match_attributes ( ) ) , cf bug # 11992
* for details . - slow
*/
uint32_t attr = 0 ;
2020-10-19 22:36:33 +03:00
status = SMB_VFS_FGET_DOS_ATTRIBUTES ( conn , smb_fname - > fsp , & attr ) ;
2016-06-23 13:24:33 +03:00
if ( NT_STATUS_IS_OK ( status ) ) {
existing_dos_attributes = attr ;
}
2007-02-07 00:05:34 +03:00
}
2004-04-02 22:46:19 +04:00
}
2000-04-22 04:33:16 +04:00
/* ignore any oplock requests if oplocks are disabled */
2010-05-13 22:33:02 +04:00
if ( ! lp_oplocks ( SNUM ( conn ) ) | |
2009-11-23 18:33:53 +03:00
IS_VETO_OPLOCK_PATH ( conn , smb_fname - > base_name ) ) {
2006-05-30 22:17:37 +04:00
/* Mask off everything except the private Samba bits. */
oplock_request & = SAMBA_PRIVATE_OPLOCK_MASK ;
2000-04-22 04:33:16 +04:00
}
2005-03-17 17:32:52 +03:00
/* this is for OS/2 long file names - say we don't support them */
2015-12-23 00:45:30 +03:00
if ( req ! = NULL & & ! req - > posix_pathnames & &
strstr ( smb_fname - > base_name , " .+,;=[]. " ) ) {
2005-07-08 08:51:27 +04:00
/* OS/2 Workplace shell fix may be main code stream in a later
2006-12-27 13:57:59 +03:00
* release . */
2005-07-08 08:51:27 +04:00
DEBUG ( 5 , ( " open_file_ntcreate: OS/2 long filenames are not "
" supported. \n " ) ) ;
2006-07-11 22:01:26 +04:00
if ( use_nt_status ( ) ) {
return NT_STATUS_OBJECT_NAME_NOT_FOUND ;
}
return NT_STATUS_DOS ( ERRDOS , ERRcannotopen ) ;
2000-04-22 04:33:16 +04:00
}
1998-08-17 17:11:34 +04:00
2005-07-08 08:51:27 +04:00
switch ( create_disposition ) {
case FILE_OPEN :
/* If file exists open. If file doesn't exist error. */
if ( ! file_existed ) {
DEBUG ( 5 , ( " open_file_ntcreate: FILE_OPEN "
" requested for file %s and file "
2009-06-16 01:14:31 +04:00
" doesn't exist. \n " ,
smb_fname_str_dbg ( smb_fname ) ) ) ;
2006-07-11 22:01:26 +04:00
return NT_STATUS_OBJECT_NAME_NOT_FOUND ;
2005-07-08 08:51:27 +04:00
}
break ;
case FILE_OVERWRITE :
/* If file exists overwrite. If file doesn't exist
* error . */
if ( ! file_existed ) {
DEBUG ( 5 , ( " open_file_ntcreate: FILE_OVERWRITE "
" requested for file %s and file "
2009-06-16 01:14:31 +04:00
" doesn't exist. \n " ,
smb_fname_str_dbg ( smb_fname ) ) ) ;
2006-07-11 22:01:26 +04:00
return NT_STATUS_OBJECT_NAME_NOT_FOUND ;
2005-07-08 08:51:27 +04:00
}
break ;
case FILE_CREATE :
/* If file exists error. If file doesn't exist
* create . */
if ( file_existed ) {
DEBUG ( 5 , ( " open_file_ntcreate: FILE_CREATE "
" requested for file %s and file "
2009-06-16 01:14:31 +04:00
" already exists. \n " ,
smb_fname_str_dbg ( smb_fname ) ) ) ;
if ( S_ISDIR ( smb_fname - > st . st_ex_mode ) ) {
2021-06-07 22:17:14 +03:00
return NT_STATUS_FILE_IS_A_DIRECTORY ;
2005-07-08 08:51:27 +04:00
} else {
2021-06-07 22:17:14 +03:00
return NT_STATUS_OBJECT_NAME_COLLISION ;
2005-07-08 08:51:27 +04:00
}
}
break ;
2012-09-02 22:47:46 +04:00
case FILE_SUPERSEDE :
case FILE_OVERWRITE_IF :
2005-07-08 08:51:27 +04:00
case FILE_OPEN_IF :
break ;
default :
2006-07-11 22:01:26 +04:00
return NT_STATUS_INVALID_PARAMETER ;
2005-07-08 08:51:27 +04:00
}
2012-09-02 22:47:46 +04:00
flags2 = disposition_to_open_flags ( create_disposition ) ;
2005-07-08 08:51:27 +04:00
/* We only care about matching attributes on file exists and
* overwrite . */
2012-08-31 16:11:45 +04:00
if ( ! posix_open & & file_existed & &
( ( create_disposition = = FILE_OVERWRITE ) | |
( create_disposition = = FILE_OVERWRITE_IF ) ) ) {
2009-06-16 01:14:31 +04:00
if ( ! open_match_attributes ( conn , existing_dos_attributes ,
new_dos_attributes ,
2005-07-08 08:51:27 +04:00
unx_mode , & new_unx_mode ) ) {
2018-05-04 23:21:41 +03:00
DEBUG ( 5 , ( " open_file_ntcreate: attributes mismatch "
2005-07-08 08:51:27 +04:00
" for file %s (%x %x) (0%o, 0%o) \n " ,
2009-06-16 01:14:31 +04:00
smb_fname_str_dbg ( smb_fname ) ,
existing_dos_attributes ,
2005-07-08 08:51:27 +04:00
new_dos_attributes ,
2009-06-16 01:14:31 +04:00
( unsigned int ) smb_fname - > st . st_ex_mode ,
2005-07-08 08:51:27 +04:00
( unsigned int ) unx_mode ) ) ;
2006-07-11 22:01:26 +04:00
return NT_STATUS_ACCESS_DENIED ;
2002-09-25 19:19:00 +04:00
}
}
2020-05-01 20:09:53 +03:00
status = smbd_calculate_access_mask ( conn ,
2020-05-01 20:13:58 +03:00
conn - > cwd_fsp ,
2020-05-01 20:09:53 +03:00
smb_fname ,
2012-09-14 04:12:24 +04:00
false ,
2008-11-04 10:18:43 +03:00
access_mask ,
2020-05-01 20:09:53 +03:00
& access_mask ) ;
2008-11-04 10:18:43 +03:00
if ( ! NT_STATUS_IS_OK ( status ) ) {
2011-07-10 15:00:25 +04:00
DEBUG ( 10 , ( " open_file_ntcreate: smbd_calculate_access_mask "
2008-11-04 10:18:43 +03:00
" on file %s returned %s \n " ,
2009-06-16 01:14:31 +04:00
smb_fname_str_dbg ( smb_fname ) , nt_errstr ( status ) ) ) ;
2008-11-04 10:18:43 +03:00
return status ;
2008-11-01 04:04:53 +03:00
}
2006-07-26 05:53:23 +04:00
open_access_mask = access_mask ;
2005-07-08 08:51:27 +04:00
2013-09-04 19:26:30 +04:00
if ( flags2 & O_TRUNC ) {
2006-07-26 06:15:01 +04:00
open_access_mask | = FILE_WRITE_DATA ; /* This will cause oplock breaks. */
}
2019-07-25 12:52:21 +03:00
if ( file_existed ) {
/*
* stat opens on existing files don ' t get oplocks .
* They can get leases .
*
* Note that we check for stat open on the * open_access_mask * ,
* i . e . the access mask we actually used to do the open ,
* not the one the client asked for ( which is in
* fsp - > access_mask ) . This is due to the fact that
* FILE_OVERWRITE and FILE_OVERWRITE_IF add in O_TRUNC ,
* which adds FILE_WRITE_DATA to open_access_mask .
*/
2020-03-05 17:12:20 +03:00
if ( is_oplock_stat_open ( open_access_mask ) & & lease = = NULL ) {
2019-07-25 12:52:21 +03:00
oplock_request = NO_OPLOCK ;
}
}
2005-07-08 08:51:27 +04:00
DEBUG ( 10 , ( " open_file_ntcreate: fname=%s, after mapping "
2009-06-16 01:14:31 +04:00
" access_mask=0x%x \n " , smb_fname_str_dbg ( smb_fname ) ,
access_mask ) ) ;
2005-07-08 08:51:27 +04:00
/*
* Note that we ignore the append flag as append does not
* mean the same thing under DOS and Unix .
*/
2015-10-07 15:28:32 +03:00
flags = calculate_open_access_flags ( access_mask , private_flags ) ;
1998-08-17 17:11:34 +04:00
2005-07-08 08:51:27 +04:00
/*
* Currently we only look at FILE_WRITE_THROUGH for create options .
*/
1998-08-17 17:11:34 +04:00
# if defined(O_SYNC)
2006-05-03 07:42:56 +04:00
if ( ( create_options & FILE_WRITE_THROUGH ) & & lp_strict_sync ( SNUM ( conn ) ) ) {
2000-04-22 04:33:16 +04:00
flags2 | = O_SYNC ;
}
1998-08-17 17:11:34 +04:00
# endif /* O_SYNC */
2008-11-21 23:14:53 +03:00
2008-01-05 10:17:38 +03:00
if ( posix_open & & ( access_mask & FILE_APPEND_DATA ) ) {
2007-02-07 00:05:34 +03:00
flags2 | = O_APPEND ;
}
if ( ! posix_open & & ! CAN_WRITE ( conn ) ) {
2005-07-08 08:51:27 +04:00
/*
* We should really return a permission denied error if either
* O_CREAT or O_TRUNC are set , but for compatibility with
* older versions of Samba we just AND them out .
*/
flags2 & = ~ ( O_CREAT | O_TRUNC ) ;
2000-04-22 04:33:16 +04:00
}
1998-08-17 17:11:34 +04:00
2019-07-29 21:45:51 +03:00
/*
* With kernel oplocks the open breaking an oplock
* blocks until the oplock holder has given up the
* oplock or closed the file . We prevent this by always
* trying to open the file with O_NONBLOCK ( see " man
* fcntl " on Linux).
*
* If a process that doesn ' t use the smbd open files
* database or communication methods holds a kernel
* oplock we must periodically poll for available open
* using O_NONBLOCK .
*/
flags2 | = O_NONBLOCK ;
2012-09-25 22:37:33 +04:00
2005-07-08 08:51:27 +04:00
/*
* Ensure we can ' t write on a read - only share or file .
*/
1998-08-17 17:11:34 +04:00
2005-07-08 08:51:27 +04:00
if ( flags ! = O_RDONLY & & file_existed & &
( ! CAN_WRITE ( conn ) | | IS_DOS_READONLY ( existing_dos_attributes ) ) ) {
DEBUG ( 5 , ( " open_file_ntcreate: write access requested for "
" file %s on read only %s \n " ,
2009-06-16 01:14:31 +04:00
smb_fname_str_dbg ( smb_fname ) ,
! CAN_WRITE ( conn ) ? " share " : " file " ) ) ;
2006-07-11 22:01:26 +04:00
return NT_STATUS_ACCESS_DENIED ;
2004-05-30 11:21:50 +04:00
}
2020-01-17 12:56:00 +03:00
if ( VALID_STAT ( smb_fname - > st ) ) {
/*
* Only try and create a file id before open
* for an existing file . For a file being created
* this won ' t do anything useful until the file
* exists and has a valid stat struct .
*/
fsp - > file_id = vfs_file_id_from_sbuf ( conn , & smb_fname - > st ) ;
}
2020-10-23 18:47:46 +03:00
fh_set_private_options ( fsp - > fh , private_flags ) ;
2006-07-25 12:40:04 +04:00
fsp - > access_mask = open_access_mask ; /* We change this to the
* requested access_mask after
* the open is done . */
2015-12-13 20:52:50 +03:00
if ( posix_open ) {
fsp - > posix_flags | = FSP_POSIX_FLAGS_ALL ;
}
2007-02-07 00:05:34 +03:00
2018-11-02 22:08:23 +03:00
if ( ( create_options & FILE_DELETE_ON_CLOSE ) & &
( flags2 & O_CREAT ) & &
! file_existed ) {
/* Delete on close semantics for new files. */
status = can_set_delete_on_close ( fsp ,
new_dos_attributes ) ;
if ( ! NT_STATUS_IS_OK ( status ) ) {
fd_close ( fsp ) ;
return status ;
}
}
2002-03-12 00:57:12 +03:00
/*
* Ensure we pay attention to default ACLs on directories if required .
*/
if ( ( flags2 & O_CREAT ) & & lp_inherit_acls ( SNUM ( conn ) ) & &
2021-05-25 02:59:30 +03:00
( def_acl = directory_has_default_acl_fsp ( parent_dir_fname - > fsp ) ) )
2020-04-30 01:11:33 +03:00
{
2010-10-16 01:12:04 +04:00
unx_mode = ( 0777 & lp_create_mask ( SNUM ( conn ) ) ) ;
2005-07-08 08:51:27 +04:00
}
2002-03-12 00:57:12 +03:00
2006-07-26 05:53:23 +04:00
DEBUG ( 4 , ( " calling open_file with flags=0x%X flags2=0x%X mode=0%o, "
" access_mask = 0x%x, open_access_mask = 0x%x \n " ,
2005-09-30 21:13:37 +04:00
( unsigned int ) flags , ( unsigned int ) flags2 ,
2006-07-26 05:53:23 +04:00
( unsigned int ) unx_mode , ( unsigned int ) access_mask ,
( unsigned int ) open_access_mask ) ) ;
1999-12-13 16:27:58 +03:00
2020-05-07 21:46:06 +03:00
fsp_open = open_file ( fsp ,
req ,
parent_dir_fname ,
flags | flags2 ,
unx_mode ,
access_mask ,
open_access_mask ,
2020-10-26 14:31:10 +03:00
private_flags ,
2020-05-07 21:46:06 +03:00
& new_file_created ) ;
2012-09-25 22:37:33 +04:00
if ( NT_STATUS_EQUAL ( fsp_open , NT_STATUS_NETWORK_BUSY ) ) {
2020-02-20 16:13:35 +03:00
if ( file_existed & & S_ISFIFO ( fsp - > fsp_name - > st . st_ex_mode ) ) {
DEBUG ( 10 , ( " FIFO busy \n " ) ) ;
return NT_STATUS_NETWORK_BUSY ;
}
if ( req = = NULL ) {
DEBUG ( 10 , ( " Internal open busy \n " ) ) ;
return NT_STATUS_NETWORK_BUSY ;
}
2012-09-25 22:37:33 +04:00
/*
2017-03-06 13:43:08 +03:00
* This handles the kernel oplock case :
*
* the file has an active kernel oplock and the open ( ) returned
* EWOULDBLOCK / EAGAIN which maps to NETWORK_BUSY .
*
* " Samba locking.tdb oplocks " are handled below after acquiring
* the sharemode lock with get_share_mode_lock ( ) .
2012-09-25 22:37:33 +04:00
*/
2020-02-20 16:13:35 +03:00
setup_poll = true ;
}
if ( NT_STATUS_EQUAL ( fsp_open , NT_STATUS_RETRY ) ) {
/*
* EINTR from the open ( 2 ) syscall . Just setup a retry
* in a bit . We can ' t use the sys_write ( ) tight retry
* loop here , as we might have to actually deal with
* lease - break signals to avoid a deadlock .
*/
setup_poll = true ;
}
2012-09-25 22:37:33 +04:00
2020-02-20 16:13:35 +03:00
if ( setup_poll ) {
2012-09-25 22:37:33 +04:00
/*
* From here on we assume this is an oplock break triggered
*/
lck = get_existing_share_mode_lock ( talloc_tos ( ) , fsp - > file_id ) ;
2019-08-18 09:57:38 +03:00
if ( ( lck ! = NULL ) & & ! validate_oplock_types ( lck ) ) {
2013-09-03 13:02:12 +04:00
smb_panic ( " validate_oplock_types failed " ) ;
2013-10-15 14:01:54 +04:00
}
2012-09-25 22:37:33 +04:00
/*
2019-08-18 09:57:38 +03:00
* Retry once a second . If there ' s a share_mode_lock
* around , also wait for it in case it was smbd
* holding that kernel oplock that can quickly tell us
* the oplock got removed .
2012-09-25 22:37:33 +04:00
*/
2019-08-18 09:57:38 +03:00
2019-07-30 15:00:17 +03:00
setup_poll_open (
req ,
2019-08-18 09:57:38 +03:00
lck ,
2019-07-30 15:00:17 +03:00
fsp - > file_id ,
timeval_set ( OPLOCK_BREAK_TIMEOUT * 2 , 0 ) ,
timeval_set ( 1 , 0 ) ) ;
2017-03-07 16:37:54 +03:00
2012-09-25 22:37:33 +04:00
TALLOC_FREE ( lck ) ;
2019-08-18 09:57:38 +03:00
2012-09-25 22:37:33 +04:00
return NT_STATUS_SHARING_VIOLATION ;
}
2006-07-11 22:01:26 +04:00
if ( ! NT_STATUS_IS_OK ( fsp_open ) ) {
2020-02-20 16:13:35 +03:00
bool wait_for_aio = NT_STATUS_EQUAL (
fsp_open , NT_STATUS_MORE_PROCESSING_REQUIRED ) ;
if ( wait_for_aio ) {
2019-08-01 17:42:59 +03:00
schedule_async_open ( req ) ;
2012-06-30 00:14:10 +04:00
}
2006-07-11 22:01:26 +04:00
return fsp_open ;
2000-04-22 04:33:16 +04:00
}
1998-08-17 17:11:34 +04:00
2014-09-11 21:03:01 +04:00
if ( new_file_created ) {
/*
* As we atomically create using O_CREAT | O_EXCL ,
* then if new_file_created is true , then
* file_existed * MUST * have been false ( even
* if the file was previously detected as being
* there ) .
*/
file_existed = false ;
}
2012-07-10 21:15:07 +04:00
if ( file_existed & & ! check_same_dev_ino ( & saved_stat , & smb_fname - > st ) ) {
/*
* The file did exist , but some other ( local or NFS )
* process either renamed / unlinked and re - created the
* file with different dev / ino after we walked the path ,
* but before we did the open . We could retry the
* open but it ' s a rare enough case it ' s easier to
* just fail the open to prevent creating any problems
* in the open file db having the wrong dev / ino key .
*/
fd_close ( fsp ) ;
2018-10-31 17:16:18 +03:00
DBG_WARNING ( " file %s - dev/ino mismatch. "
" Old (dev=%ju, ino=%ju). "
" New (dev=%ju, ino=%ju). Failing open "
" with NT_STATUS_ACCESS_DENIED. \n " ,
smb_fname_str_dbg ( smb_fname ) ,
( uintmax_t ) saved_stat . st_ex_dev ,
( uintmax_t ) saved_stat . st_ex_ino ,
( uintmax_t ) smb_fname - > st . st_ex_dev ,
( uintmax_t ) smb_fname - > st . st_ex_ino ) ;
2012-07-10 21:15:07 +04:00
return NT_STATUS_ACCESS_DENIED ;
}
2012-09-26 21:52:14 +04:00
old_write_time = smb_fname - > st . st_ex_mtime ;
2005-09-30 21:13:37 +04:00
2012-09-26 21:52:14 +04:00
/*
* Deal with the race condition where two smbd ' s detect the
* file doesn ' t exist and do the create at the same time . One
* of them will win and set a share mode , the other ( ie . this
* one ) should check if the requested share mode for this
* create is allowed .
*/
2006-07-19 05:30:30 +04:00
2012-09-26 21:52:14 +04:00
/*
* Now the file exists and fsp is successfully opened ,
* fsp - > dev and fsp - > inode are valid and should replace the
* dev = 0 , inode = 0 from a non existent file . Spotted by
* Nadav Danieli < nadavd @ exanet . com > . JRA .
*/
2006-07-19 05:30:30 +04:00
2020-11-05 12:39:10 +03:00
lck = get_share_mode_lock ( talloc_tos ( ) , fsp - > file_id ,
2012-09-26 21:52:14 +04:00
conn - > connectpath ,
smb_fname , & old_write_time ) ;
2006-07-19 05:30:30 +04:00
2012-09-26 21:52:14 +04:00
if ( lck = = NULL ) {
DEBUG ( 0 , ( " open_file_ntcreate: Could not get share "
" mode lock for %s \n " ,
smb_fname_str_dbg ( smb_fname ) ) ) ;
fd_close ( fsp ) ;
return NT_STATUS_SHARING_VIOLATION ;
}
/* Get the types we need to examine. */
2013-10-15 16:41:11 +04:00
if ( ! validate_oplock_types ( lck ) ) {
2013-09-03 13:02:12 +04:00
smb_panic ( " validate_oplock_types failed " ) ;
2013-10-15 14:01:54 +04:00
}
2012-09-26 21:52:14 +04:00
2013-09-26 05:41:07 +04:00
if ( has_delete_on_close ( lck , fsp - > name_hash ) ) {
TALLOC_FREE ( lck ) ;
fd_close ( fsp ) ;
return NT_STATUS_DELETE_PENDING ;
}
2019-08-07 13:15:45 +03:00
status = handle_share_mode_lease (
fsp ,
lck ,
create_disposition ,
access_mask ,
share_access ,
oplock_request ,
lease ,
first_open_attempt ) ;
2012-09-26 21:52:14 +04:00
2019-08-07 13:15:45 +03:00
if ( NT_STATUS_EQUAL ( status , NT_STATUS_RETRY ) ) {
schedule_defer_open ( lck , fsp - > file_id , req ) ;
2012-09-26 21:52:14 +04:00
TALLOC_FREE ( lck ) ;
2012-09-27 00:20:57 +04:00
fd_close ( fsp ) ;
2019-07-26 13:09:14 +03:00
return NT_STATUS_SHARING_VIOLATION ;
2012-09-26 21:52:14 +04:00
}
2011-02-02 03:01:57 +03:00
2019-07-25 17:31:17 +03:00
if ( ! NT_STATUS_IS_OK ( status ) ) {
TALLOC_FREE ( lck ) ;
fd_close ( fsp ) ;
return status ;
}
2020-11-05 17:39:51 +03:00
share_mode_flags_restrict ( lck , access_mask , share_access , 0 ) ;
2019-09-17 02:16:40 +03:00
2019-08-06 17:28:29 +03:00
ok = set_share_mode (
lck ,
fsp ,
get_current_uid ( fsp - > conn ) ,
req ? req - > mid : 0 ,
fsp - > oplock_type ,
share_access ,
access_mask ) ;
if ( ! ok ) {
if ( fsp - > oplock_type = = LEASE_OPLOCK ) {
status = remove_lease_if_stale (
2019-08-26 17:51:56 +03:00
lck ,
2019-08-06 17:28:29 +03:00
fsp_client_guid ( fsp ) ,
& fsp - > lease - > lease . lease_key ) ;
if ( ! NT_STATUS_IS_OK ( status ) ) {
DBG_WARNING ( " remove_lease_if_stale "
" failed: %s \n " ,
nt_errstr ( status ) ) ;
}
}
2021-01-29 22:38:07 +03:00
TALLOC_FREE ( lck ) ;
fd_close ( fsp ) ;
2019-08-06 17:28:29 +03:00
return NT_STATUS_NO_MEMORY ;
}
2014-06-25 01:19:30 +04:00
/* Should we atomically (to the client at least) truncate ? */
2014-06-25 12:36:47 +04:00
if ( ( ! new_file_created ) & &
( flags2 & O_TRUNC ) & &
2019-07-24 16:48:50 +03:00
( S_ISREG ( fsp - > fsp_name - > st . st_ex_mode ) ) ) {
2014-06-25 12:36:47 +04:00
int ret ;
2019-05-21 16:26:55 +03:00
ret = SMB_VFS_FTRUNCATE ( fsp , 0 ) ;
2014-06-25 12:36:47 +04:00
if ( ret ! = 0 ) {
status = map_nt_error_from_unix ( errno ) ;
2019-07-25 17:31:17 +03:00
del_share_mode ( lck , fsp ) ;
2014-06-25 12:36:47 +04:00
TALLOC_FREE ( lck ) ;
fd_close ( fsp ) ;
return status ;
2014-06-25 01:19:30 +04:00
}
2019-05-21 16:26:55 +03:00
notify_fname ( fsp - > conn , NOTIFY_ACTION_MODIFIED ,
FILE_NOTIFY_CHANGE_SIZE
| FILE_NOTIFY_CHANGE_ATTRIBUTES ,
fsp - > fsp_name - > base_name ) ;
2014-06-25 01:19:30 +04:00
}
2012-09-26 21:52:14 +04:00
/*
* We have the share entry * locked * . . . . .
*/
1999-12-13 16:27:58 +03:00
2009-01-09 22:07:45 +03:00
/* Delete streams if create_disposition requires it */
2012-09-02 15:06:22 +04:00
if ( ! new_file_created & & clear_ads ( create_disposition ) & &
2009-06-16 01:14:31 +04:00
! is_ntfs_stream_smb_fname ( smb_fname ) ) {
2016-03-05 01:07:04 +03:00
status = delete_all_streams ( conn , smb_fname ) ;
2009-01-09 22:07:45 +03:00
if ( ! NT_STATUS_IS_OK ( status ) ) {
2019-07-25 17:31:17 +03:00
del_share_mode ( lck , fsp ) ;
2009-01-09 22:07:45 +03:00
TALLOC_FREE ( lck ) ;
fd_close ( fsp ) ;
return status ;
}
}
2020-09-26 22:52:52 +03:00
if ( ! fsp - > fsp_flags . is_pathref & &
fsp_get_io_fd ( fsp ) ! = - 1 & &
lp_kernel_share_modes ( SNUM ( conn ) ) )
{
2009-11-23 13:54:19 +03:00
int ret_flock ;
2015-04-29 17:53:04 +03:00
/*
* Beware : streams implementing VFS modules may
* implement streams in a way that fsp will have the
* basefile open in the fsp fd , so lacking a distinct
* fd for the stream kernel_flock will apply on the
* basefile which is wrong . The actual check is
2019-07-23 18:46:22 +03:00
* deferred to the VFS module implementing the
2015-04-29 17:53:04 +03:00
* kernel_flock call .
*/
2009-10-06 19:14:56 +04:00
ret_flock = SMB_VFS_KERNEL_FLOCK ( fsp , share_access , access_mask ) ;
2008-01-11 23:53:29 +03:00
if ( ret_flock = = - 1 ) {
2005-07-08 08:51:27 +04:00
2019-07-25 17:31:17 +03:00
del_share_mode ( lck , fsp ) ;
2008-01-11 23:53:29 +03:00
TALLOC_FREE ( lck ) ;
fd_close ( fsp ) ;
return NT_STATUS_SHARING_VIOLATION ;
}
2016-05-16 00:24:08 +03:00
2020-04-01 12:59:10 +03:00
fsp - > fsp_flags . kernel_share_modes_taken = true ;
2006-11-09 23:29:31 +03:00
}
2000-12-12 00:09:48 +03:00
2000-04-22 04:33:16 +04:00
/*
2012-09-25 21:34:49 +04:00
* At this point onwards , we can guarantee that the share entry
2000-04-22 04:33:16 +04:00
* is locked , whether we created the file or not , and that the
* deny mode is compatible with all current opens .
*/
1998-08-17 17:11:34 +04:00
2008-11-04 09:42:53 +03:00
/*
* According to Samba4 , SEC_FILE_READ_ATTRIBUTE is always granted ,
2011-02-25 03:04:09 +03:00
* but we don ' t have to store this - just ignore it on access check .
2008-11-04 09:42:53 +03:00
*/
2011-04-09 03:18:56 +04:00
if ( conn - > sconn - > using_smb2 ) {
/*
* SMB2 doesn ' t return it ( according to Microsoft tests ) .
* Test Case : TestSuite_ScenarioNo009GrantedAccessTestS0
* File created with access = 0x7 ( Read , Write , Delete )
* Query Info on file returns 0x87 ( Read , Write , Delete , Read Attributes )
*/
fsp - > access_mask = access_mask ;
} else {
/* But SMB1 does. */
fsp - > access_mask = access_mask | FILE_READ_ATTRIBUTES ;
}
1998-08-17 17:11:34 +04:00
2012-07-10 04:03:45 +04:00
if ( new_file_created ) {
info = FILE_WAS_CREATED ;
} else {
2011-12-15 19:30:08 +04:00
if ( flags2 & O_TRUNC ) {
2005-07-08 08:51:27 +04:00
info = FILE_WAS_OVERWRITTEN ;
2011-12-15 19:30:08 +04:00
} else {
info = FILE_WAS_OPENED ;
2005-07-08 08:51:27 +04:00
}
2005-03-15 04:19:58 +03:00
}
1998-08-17 17:11:34 +04:00
2005-07-08 08:51:27 +04:00
if ( pinfo ) {
* pinfo = info ;
2000-04-22 04:33:16 +04:00
}
1998-08-17 17:11:34 +04:00
2007-05-24 01:32:10 +04:00
/* Handle strange delete on close create semantics. */
2008-12-07 21:30:01 +03:00
if ( create_options & FILE_DELETE_ON_CLOSE ) {
2018-11-02 22:08:23 +03:00
if ( ! new_file_created ) {
status = can_set_delete_on_close ( fsp ,
existing_dos_attributes ) ;
2008-12-07 21:30:01 +03:00
2018-11-02 22:08:23 +03:00
if ( ! NT_STATUS_IS_OK ( status ) ) {
/* Remember to delete the mode we just added. */
del_share_mode ( lck , fsp ) ;
TALLOC_FREE ( lck ) ;
fd_close ( fsp ) ;
return status ;
}
2001-11-23 14:18:20 +03:00
}
2018-11-28 01:10:17 +03:00
/* Note that here we set the *initial* delete on close flag,
2007-05-24 01:32:10 +04:00
not the regular one . The magic gets handled in close . */
2020-04-03 08:43:38 +03:00
fsp - > fsp_flags . initial_delete_on_close = true ;
2007-05-24 01:32:10 +04:00
}
2008-11-21 23:14:53 +03:00
2019-09-26 20:41:37 +03:00
/*
* If we created a file and it ' s not a stream , this is the point where
* we set the itime ( aka invented time ) that get ' s stored in the DOS
* attribute xattr . The value is going to be either what the filesystem
* provided or a copy of the creation date .
*
* Either way , we turn the itime into a File - ID , unless the filesystem
* provided one ( unlikely ) .
*/
2019-09-24 22:49:38 +03:00
if ( info = = FILE_WAS_CREATED & & ! is_named_stream ( smb_fname ) ) {
2019-06-26 14:40:05 +03:00
smb_fname - > st . st_ex_iflags & = ~ ST_EX_IFLAG_CALCULATED_ITIME ;
2019-08-30 15:48:40 +03:00
if ( lp_store_dos_attributes ( SNUM ( conn ) ) & &
smb_fname - > st . st_ex_iflags & ST_EX_IFLAG_CALCULATED_FILE_ID )
{
uint64_t file_id ;
file_id = make_file_id_from_itime ( & smb_fname - > st ) ;
update_stat_ex_file_id ( & smb_fname - > st , file_id ) ;
}
2019-06-26 14:40:05 +03:00
}
2012-07-10 04:03:45 +04:00
if ( info ! = FILE_WAS_OPENED ) {
2016-02-04 05:58:19 +03:00
/* Overwritten files should be initially set as archive */
if ( ( info = = FILE_WAS_OVERWRITTEN & & lp_map_archive ( SNUM ( conn ) ) ) | |
2005-07-08 08:51:27 +04:00
lp_store_dos_attributes ( SNUM ( conn ) ) ) {
2020-10-19 21:40:51 +03:00
( void ) fdos_mode ( fsp ) ;
2007-02-07 00:05:34 +03:00
if ( ! posix_open ) {
2009-07-07 01:36:16 +04:00
if ( file_set_dosmode ( conn , smb_fname ,
2011-04-29 06:00:57 +04:00
new_dos_attributes | FILE_ATTRIBUTE_ARCHIVE ,
2020-04-28 19:09:18 +03:00
parent_dir_fname , true ) = = 0 ) {
2009-07-07 01:36:16 +04:00
unx_mode = smb_fname - > st . st_ex_mode ;
2007-12-27 23:31:08 +03:00
}
2007-02-07 00:05:34 +03:00
}
2004-04-02 22:46:19 +04:00
}
}
2010-12-21 04:58:33 +03:00
/* Determine sparse flag. */
if ( posix_open ) {
/* POSIX opens are sparse by default. */
2020-04-03 08:52:10 +03:00
fsp - > fsp_flags . is_sparse = true ;
2010-12-21 04:58:33 +03:00
} else {
2020-04-03 08:52:10 +03:00
fsp - > fsp_flags . is_sparse =
2019-08-02 16:21:49 +03:00
( existing_dos_attributes & FILE_ATTRIBUTE_SPARSE ) ;
2010-12-21 04:58:33 +03:00
}
2001-12-17 02:44:38 +03:00
/*
2002-03-12 00:57:12 +03:00
* Take care of inherited ACLs on created files - if default ACL not
* selected .
2001-12-17 02:44:38 +03:00
*/
2012-07-10 04:03:45 +04:00
if ( ! posix_open & & new_file_created & & ! def_acl ) {
2018-05-17 20:35:58 +03:00
if ( unx_mode ! = smb_fname - > st . st_ex_mode ) {
2018-05-17 20:38:34 +03:00
int ret = SMB_VFS_FCHMOD ( fsp , unx_mode ) ;
if ( ret = = - 1 ) {
DBG_INFO ( " failed to reset "
" attributes of file %s to 0%o \n " ,
smb_fname_str_dbg ( smb_fname ) ,
( unsigned int ) unx_mode ) ;
2018-05-17 20:35:58 +03:00
}
2005-07-08 08:51:27 +04:00
}
2003-01-08 05:09:18 +03:00
2005-07-08 08:51:27 +04:00
} else if ( new_unx_mode ) {
2018-05-17 20:24:35 +03:00
/*
* We only get here in the case of :
*
* a ) . Not a POSIX open .
* b ) . File already existed .
* c ) . File was overwritten .
* d ) . Requested DOS attributes didn ' t match
* the DOS attributes on the existing file .
*
* In that case new_unx_mode has been set
* equal to the calculated mode ( including
* possible inheritance of the mode from the
* containing directory ) .
*
* Note this mode was calculated with the
* DOS attribute FILE_ATTRIBUTE_ARCHIVE added ,
* so the mode change here is suitable for
* an overwritten file .
*/
2003-01-08 05:09:18 +03:00
2018-05-17 20:33:38 +03:00
if ( new_unx_mode ! = smb_fname - > st . st_ex_mode ) {
int ret = SMB_VFS_FCHMOD ( fsp , new_unx_mode ) ;
if ( ret = = - 1 ) {
DBG_INFO ( " failed to reset "
2005-07-08 08:51:27 +04:00
" attributes of file %s to 0%o \n " ,
2009-06-16 01:14:31 +04:00
smb_fname_str_dbg ( smb_fname ) ,
2018-05-17 20:27:11 +03:00
( unsigned int ) new_unx_mode ) ;
2018-05-17 20:33:38 +03:00
}
2018-05-17 20:27:11 +03:00
}
2001-12-17 02:44:38 +03:00
}
2003-01-08 05:09:18 +03:00
2013-11-22 20:24:42 +04:00
{
/*
* Deal with other opens having a modified write time .
*/
struct timespec write_time = get_share_mode_write_time ( lck ) ;
2019-12-02 18:30:50 +03:00
if ( ! is_omit_timespec ( & write_time ) ) {
2013-11-22 20:24:42 +04:00
update_stat_ex_mtime ( & fsp - > fsp_name - > st , write_time ) ;
}
}
2006-02-20 20:59:58 +03:00
TALLOC_FREE ( lck ) ;
1998-08-17 17:11:34 +04:00
2008-11-21 23:14:53 +03:00
return NT_STATUS_OK ;
}
2007-02-07 00:05:34 +03:00
static NTSTATUS mkdir_internal ( connection_struct * conn ,
2021-05-25 02:39:35 +03:00
struct smb_filename * parent_dir_fname , /* parent. */
2021-05-25 02:36:43 +03:00
struct smb_filename * smb_fname_atname , /* atname relative to parent. */
2021-05-25 02:28:08 +03:00
struct smb_filename * smb_dname , /* full pathname from root of share. */
2020-12-17 14:31:13 +03:00
uint32_t file_attributes ,
struct files_struct * fsp )
2006-12-24 14:45:55 +03:00
{
2019-11-07 13:01:05 +03:00
const struct loadparm_substitution * lp_sub =
loadparm_s3_global_substitution ( ) ;
2006-12-24 17:29:19 +03:00
mode_t mode ;
2007-01-17 05:44:27 +03:00
NTSTATUS status ;
2007-09-28 03:28:35 +04:00
bool posix_open = false ;
2011-06-09 01:36:12 +04:00
bool need_re_stat = false ;
2011-10-20 03:56:00 +04:00
uint32_t access_mask = SEC_DIR_ADD_SUBDIR ;
2019-09-07 01:05:36 +03:00
int ret ;
2006-12-24 17:29:19 +03:00
2012-09-27 01:53:59 +04:00
if ( ! CAN_WRITE ( conn ) | | ( access_mask & ~ ( conn - > share_access ) ) ) {
2011-10-20 03:56:00 +04:00
DEBUG ( 5 , ( " mkdir_internal: failing share access "
2019-11-07 13:01:05 +03:00
" %s \n " , lp_servicename ( talloc_tos ( ) , lp_sub , SNUM ( conn ) ) ) ) ;
2006-12-24 14:45:55 +03:00
return NT_STATUS_ACCESS_DENIED ;
}
2007-02-07 00:05:34 +03:00
if ( file_attributes & FILE_FLAG_POSIX_SEMANTICS ) {
2007-09-28 03:28:35 +04:00
posix_open = true ;
2007-02-07 00:05:34 +03:00
mode = ( mode_t ) ( file_attributes & ~ FILE_FLAG_POSIX_SEMANTICS ) ;
} else {
2020-04-28 19:18:08 +03:00
mode = unix_mode ( conn ,
FILE_ATTRIBUTE_DIRECTORY ,
smb_dname ,
parent_dir_fname ) ;
2007-02-07 00:05:34 +03:00
}
2006-12-24 14:45:55 +03:00
2021-05-21 01:20:42 +03:00
status = check_parent_access_fsp ( parent_dir_fname - > fsp , access_mask ) ;
2011-10-20 03:56:00 +04:00
if ( ! NT_STATUS_IS_OK ( status ) ) {
2021-05-21 01:20:42 +03:00
DBG_INFO ( " check_parent_access_fsp "
2011-10-20 21:01:12 +04:00
" on directory %s for path %s returned %s \n " ,
2020-04-29 12:06:26 +03:00
smb_fname_str_dbg ( parent_dir_fname ) ,
2011-10-20 03:56:00 +04:00
smb_dname - > base_name ,
2021-05-21 01:20:42 +03:00
nt_errstr ( status ) ) ;
2011-10-20 03:56:00 +04:00
return status ;
}
2020-12-14 13:51:20 +03:00
if ( lp_inherit_acls ( SNUM ( conn ) ) ) {
2021-05-25 02:59:30 +03:00
if ( directory_has_default_acl_fsp ( parent_dir_fname - > fsp ) ) {
2020-12-14 13:51:20 +03:00
mode = ( 0777 & lp_directory_mask ( SNUM ( conn ) ) ) ;
}
}
2019-09-07 01:05:36 +03:00
ret = SMB_VFS_MKDIRAT ( conn ,
2020-12-16 17:27:39 +03:00
parent_dir_fname - > fsp ,
2021-05-25 02:36:43 +03:00
smb_fname_atname ,
2020-05-07 18:51:42 +03:00
mode ) ;
2019-09-07 01:05:36 +03:00
if ( ret ! = 0 ) {
2006-12-24 14:45:55 +03:00
return map_nt_error_from_unix ( errno ) ;
}
2006-12-24 17:29:19 +03:00
2020-12-16 17:25:47 +03:00
/*
* Make this a pathref fsp for now . open_directory ( ) will reopen as a
* full fsp .
*/
fsp - > fsp_flags . is_pathref = true ;
status = fd_openat ( conn - > cwd_fsp , smb_dname , fsp , O_RDONLY | O_DIRECTORY , 0 ) ;
if ( ! NT_STATUS_IS_OK ( status ) ) {
return status ;
}
2006-12-24 18:11:03 +03:00
/* Ensure we're checking for a symlink here.... */
/* We don't want to get caught by a symlink racer. */
2020-12-16 17:25:47 +03:00
if ( SMB_VFS_FSTAT ( fsp , & smb_dname - > st ) = = - 1 ) {
2006-12-24 18:11:03 +03:00
DEBUG ( 2 , ( " Could not stat directory '%s' just created: %s \n " ,
2009-07-07 01:36:16 +04:00
smb_fname_str_dbg ( smb_dname ) , strerror ( errno ) ) ) ;
2006-12-24 18:11:03 +03:00
return map_nt_error_from_unix ( errno ) ;
}
2009-07-07 01:36:16 +04:00
if ( ! S_ISDIR ( smb_dname - > st . st_ex_mode ) ) {
2011-10-20 01:25:45 +04:00
DEBUG ( 0 , ( " Directory '%s' just created is not a directory ! \n " ,
2009-07-07 01:36:16 +04:00
smb_fname_str_dbg ( smb_dname ) ) ) ;
2011-10-20 01:25:45 +04:00
return NT_STATUS_NOT_A_DIRECTORY ;
2006-12-24 18:11:03 +03:00
}
2019-06-26 14:40:05 +03:00
smb_dname - > st . st_ex_iflags & = ~ ST_EX_IFLAG_CALCULATED_ITIME ;
2007-09-28 03:28:35 +04:00
if ( lp_store_dos_attributes ( SNUM ( conn ) ) ) {
2019-08-30 15:48:40 +03:00
if ( smb_dname - > st . st_ex_iflags & ST_EX_IFLAG_CALCULATED_FILE_ID )
{
uint64_t file_id ;
file_id = make_file_id_from_itime ( & smb_dname - > st ) ;
update_stat_ex_file_id ( & smb_dname - > st , file_id ) ;
}
2007-09-28 03:28:35 +04:00
if ( ! posix_open ) {
2009-07-07 01:36:16 +04:00
file_set_dosmode ( conn , smb_dname ,
2011-04-29 05:57:02 +04:00
file_attributes | FILE_ATTRIBUTE_DIRECTORY ,
2020-04-28 19:09:18 +03:00
parent_dir_fname , true ) ;
2007-09-28 03:28:35 +04:00
}
}
2014-02-04 06:09:10 +04:00
if ( lp_inherit_permissions ( SNUM ( conn ) ) ) {
2020-04-29 11:56:23 +03:00
inherit_access_posix_acl ( conn , parent_dir_fname ,
2017-05-24 03:11:18 +03:00
smb_dname , mode ) ;
2011-06-09 01:36:12 +04:00
need_re_stat = true ;
2006-12-24 17:29:19 +03:00
}
2009-11-21 04:23:20 +03:00
if ( ! posix_open ) {
2007-02-07 00:05:34 +03:00
/*
* Check if high bits should have been set ,
* then ( if bits are missing ) : add them .
* Consider bits automagically set by UNIX , i . e . SGID bit from parent
* dir .
*/
2009-07-07 01:36:16 +04:00
if ( ( mode & ~ ( S_IRWXU | S_IRWXG | S_IRWXO ) ) & &
( mode & ~ smb_dname - > st . st_ex_mode ) ) {
2020-12-16 17:25:47 +03:00
SMB_VFS_FCHMOD ( fsp ,
2009-07-07 01:36:16 +04:00
( smb_dname - > st . st_ex_mode |
( mode & ~ smb_dname - > st . st_ex_mode ) ) ) ;
2011-06-09 01:36:12 +04:00
need_re_stat = true ;
2007-02-07 00:05:34 +03:00
}
2006-12-24 17:29:19 +03:00
}
2006-12-24 19:37:22 +03:00
/* Change the owner if required. */
2016-08-02 09:37:00 +03:00
if ( lp_inherit_owner ( SNUM ( conn ) ) ! = INHERIT_OWNER_NO ) {
2020-04-29 12:05:25 +03:00
change_dir_owner_to_parent ( conn , parent_dir_fname ,
2017-06-29 21:29:33 +03:00
smb_dname ,
2009-07-07 01:36:16 +04:00
& smb_dname - > st ) ;
2011-06-09 01:36:12 +04:00
need_re_stat = true ;
}
if ( need_re_stat ) {
2020-12-16 17:25:47 +03:00
if ( SMB_VFS_FSTAT ( fsp , & smb_dname - > st ) = = - 1 ) {
2011-06-09 01:36:12 +04:00
DEBUG ( 2 , ( " Could not stat directory '%s' just created: %s \n " ,
smb_fname_str_dbg ( smb_dname ) , strerror ( errno ) ) ) ;
return map_nt_error_from_unix ( errno ) ;
}
2006-12-24 19:37:22 +03:00
}
2007-01-31 19:56:27 +03:00
notify_fname ( conn , NOTIFY_ACTION_ADDED , FILE_NOTIFY_CHANGE_DIR_NAME ,
2009-07-07 01:36:16 +04:00
smb_dname - > base_name ) ;
2007-01-17 19:23:45 +03:00
2006-12-24 14:45:55 +03:00
return NT_STATUS_OK ;
}
1998-08-17 17:11:34 +04:00
/****************************************************************************
Open a directory from an NT SMB call .
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
1998-10-23 04:58:28 +04:00
2008-11-23 06:40:09 +03:00
static NTSTATUS open_directory ( connection_struct * conn ,
struct smb_request * req ,
2015-04-27 02:02:55 +03:00
uint32_t access_mask ,
uint32_t share_access ,
uint32_t create_disposition ,
uint32_t create_options ,
uint32_t file_attributes ,
2021-05-25 02:13:14 +03:00
struct smb_filename * parent_dir_fname ,
struct smb_filename * smb_fname_atname ,
2008-11-23 06:40:09 +03:00
int * pinfo ,
2020-06-19 10:40:37 +03:00
struct files_struct * fsp )
1998-08-17 17:11:34 +04:00
{
2020-06-19 10:40:37 +03:00
struct smb_filename * smb_dname = fsp - > fsp_name ;
2019-12-16 18:47:38 +03:00
bool dir_existed = VALID_STAT ( smb_dname - > st ) ;
2005-10-28 02:35:08 +04:00
struct share_mode_lock * lck = NULL ;
NTSTATUS status ;
2008-03-12 17:32:47 +03:00
struct timespec mtimespec ;
2005-07-08 08:51:27 +04:00
int info = 0 ;
2020-03-04 12:56:56 +03:00
int flags ;
2014-11-27 20:34:56 +03:00
bool ok ;
2005-07-08 08:51:27 +04:00
2012-01-31 20:26:34 +04:00
if ( is_ntfs_stream_smb_fname ( smb_dname ) ) {
DEBUG ( 2 , ( " open_directory: %s is a stream name! \n " ,
smb_fname_str_dbg ( smb_dname ) ) ) ;
return NT_STATUS_NOT_A_DIRECTORY ;
}
2009-07-08 04:56:49 +04:00
2012-06-05 04:34:54 +04:00
if ( ! ( file_attributes & FILE_FLAG_POSIX_SEMANTICS ) ) {
/* Ensure we have a directory attribute. */
file_attributes | = FILE_ATTRIBUTE_DIRECTORY ;
}
2010-10-16 00:30:07 +04:00
2019-12-13 18:05:05 +03:00
DBG_INFO ( " opening directory %s, access_mask = 0x% " PRIx32 " , "
" share_access = 0x% " PRIx32 " create_options = 0x% " PRIx32 " , "
" create_disposition = 0x% " PRIx32 " , "
" file_attributes = 0x% " PRIx32 " \n " ,
2009-06-16 01:14:31 +04:00
smb_fname_str_dbg ( smb_dname ) ,
2019-12-13 18:05:05 +03:00
access_mask ,
share_access ,
create_options ,
create_disposition ,
file_attributes ) ;
2005-07-08 08:51:27 +04:00
2020-05-01 20:09:53 +03:00
status = smbd_calculate_access_mask ( conn ,
2020-10-02 17:30:03 +03:00
conn - > cwd_fsp ,
2020-05-01 20:09:53 +03:00
smb_dname ,
false ,
access_mask ,
& access_mask ) ;
2008-11-04 10:18:43 +03:00
if ( ! NT_STATUS_IS_OK ( status ) ) {
2011-07-10 15:00:25 +04:00
DEBUG ( 10 , ( " open_directory: smbd_calculate_access_mask "
2008-11-04 10:18:43 +03:00
" on file %s returned %s \n " ,
2009-06-16 01:14:31 +04:00
smb_fname_str_dbg ( smb_dname ) ,
2008-11-04 10:18:43 +03:00
nt_errstr ( status ) ) ) ;
return status ;
}
2010-12-02 04:29:05 +03:00
if ( ( access_mask & SEC_FLAG_SYSTEM_SECURITY ) & &
2010-10-23 02:58:40 +04:00
! security_token_has_privilege ( get_current_nttok ( conn ) ,
2010-10-21 03:31:18 +04:00
SEC_PRIV_SECURITY ) ) {
2009-03-05 20:04:16 +03:00
DEBUG ( 10 , ( " open_directory: open on %s "
2009-04-15 03:19:30 +04:00
" failed - SEC_FLAG_SYSTEM_SECURITY denied. \n " ,
2009-06-16 01:14:31 +04:00
smb_fname_str_dbg ( smb_dname ) ) ) ;
2009-03-05 20:04:16 +03:00
return NT_STATUS_PRIVILEGE_NOT_HELD ;
}
2005-07-08 08:51:27 +04:00
switch ( create_disposition ) {
case FILE_OPEN :
2006-12-24 18:11:03 +03:00
2011-02-09 03:51:17 +03:00
if ( ! dir_existed ) {
return NT_STATUS_OBJECT_NAME_NOT_FOUND ;
2006-12-24 18:11:03 +03:00
}
2011-02-09 03:51:17 +03:00
info = FILE_WAS_OPENED ;
2005-07-08 08:51:27 +04:00
break ;
2003-07-29 21:34:20 +04:00
2005-07-08 08:51:27 +04:00
case FILE_CREATE :
2006-12-24 14:13:32 +03:00
2005-07-08 08:51:27 +04:00
/* If directory exists error. If directory doesn't
* exist create . */
2006-12-24 14:13:32 +03:00
2011-10-20 01:23:38 +04:00
if ( dir_existed ) {
status = NT_STATUS_OBJECT_NAME_COLLISION ;
DEBUG ( 2 , ( " open_directory: unable to create "
" %s. Error was %s \n " ,
smb_fname_str_dbg ( smb_dname ) ,
nt_errstr ( status ) ) ) ;
return status ;
}
2020-06-23 15:10:21 +03:00
status = mkdir_internal ( conn ,
2021-05-25 02:28:08 +03:00
parent_dir_fname ,
smb_fname_atname ,
2020-06-23 15:10:21 +03:00
smb_dname ,
2020-12-17 14:31:13 +03:00
file_attributes ,
fsp ) ;
2007-02-07 00:05:34 +03:00
2006-12-24 14:13:32 +03:00
if ( ! NT_STATUS_IS_OK ( status ) ) {
DEBUG ( 2 , ( " open_directory: unable to create "
2009-06-16 01:14:31 +04:00
" %s. Error was %s \n " ,
smb_fname_str_dbg ( smb_dname ) ,
2006-12-24 14:13:32 +03:00
nt_errstr ( status ) ) ) ;
return status ;
2004-02-24 03:55:05 +03:00
}
2006-12-24 14:13:32 +03:00
2005-07-08 08:51:27 +04:00
info = FILE_WAS_CREATED ;
break ;
2004-02-24 03:55:05 +03:00
2005-07-08 08:51:27 +04:00
case FILE_OPEN_IF :
2006-12-24 14:13:32 +03:00
/*
* If directory exists open . If directory doesn ' t
* exist create .
*/
2011-10-20 01:23:38 +04:00
if ( dir_existed ) {
status = NT_STATUS_OK ;
info = FILE_WAS_OPENED ;
} else {
2020-06-23 15:10:21 +03:00
status = mkdir_internal ( conn ,
2021-05-25 02:28:08 +03:00
parent_dir_fname ,
smb_fname_atname ,
2020-06-23 15:10:21 +03:00
smb_dname ,
2020-12-17 14:31:13 +03:00
file_attributes ,
fsp ) ;
2006-12-24 14:13:32 +03:00
2011-10-20 01:23:38 +04:00
if ( NT_STATUS_IS_OK ( status ) ) {
info = FILE_WAS_CREATED ;
} else {
/* Cope with create race. */
if ( ! NT_STATUS_EQUAL ( status ,
NT_STATUS_OBJECT_NAME_COLLISION ) ) {
DEBUG ( 2 , ( " open_directory: unable to create "
" %s. Error was %s \n " ,
smb_fname_str_dbg ( smb_dname ) ,
nt_errstr ( status ) ) ) ;
return status ;
}
2015-09-23 04:02:53 +03:00
/*
* If mkdir_internal ( ) returned
* NT_STATUS_OBJECT_NAME_COLLISION
* we still must lstat the path .
*/
if ( SMB_VFS_LSTAT ( conn , smb_dname )
= = - 1 ) {
DEBUG ( 2 , ( " Could not stat "
" directory '%s' just "
" opened: %s \n " ,
smb_fname_str_dbg (
smb_dname ) ,
strerror ( errno ) ) ) ;
return map_nt_error_from_unix (
errno ) ;
}
2011-10-20 01:23:38 +04:00
info = FILE_WAS_OPENED ;
}
2006-12-24 14:13:32 +03:00
}
2005-07-08 08:51:27 +04:00
break ;
2000-10-19 06:58:24 +04:00
2005-07-08 08:51:27 +04:00
case FILE_SUPERSEDE :
case FILE_OVERWRITE :
case FILE_OVERWRITE_IF :
default :
DEBUG ( 5 , ( " open_directory: invalid create_disposition "
" 0x%x for directory %s \n " ,
2009-06-16 01:14:31 +04:00
( unsigned int ) create_disposition ,
smb_fname_str_dbg ( smb_dname ) ) ) ;
2006-07-11 22:01:26 +04:00
return NT_STATUS_INVALID_PARAMETER ;
2005-07-08 08:51:27 +04:00
}
2009-06-16 01:14:31 +04:00
if ( ! S_ISDIR ( smb_dname - > st . st_ex_mode ) ) {
2006-12-24 14:45:55 +03:00
DEBUG ( 5 , ( " open_directory: %s is not a directory ! \n " ,
2009-06-16 01:14:31 +04:00
smb_fname_str_dbg ( smb_dname ) ) ) ;
2006-12-24 14:13:32 +03:00
return NT_STATUS_NOT_A_DIRECTORY ;
2005-07-08 08:51:27 +04:00
}
1999-12-13 16:27:58 +03:00
1998-08-17 17:11:34 +04:00
/*
* Setup the files_struct for it .
*/
2011-02-26 14:36:19 +03:00
2009-06-16 01:14:31 +04:00
fsp - > file_id = vfs_file_id_from_sbuf ( conn , & smb_dname - > st ) ;
2007-07-05 20:26:27 +04:00
fsp - > vuid = req ? req - > vuid : UID_FIELD_INVALID ;
fsp - > file_pid = req ? req - > smbpid : 0 ;
2020-04-02 18:09:36 +03:00
fsp - > fsp_flags . can_lock = false ;
2020-04-02 18:18:43 +03:00
fsp - > fsp_flags . can_read = false ;
2020-04-02 18:28:32 +03:00
fsp - > fsp_flags . can_write = false ;
2005-07-08 08:51:27 +04:00
2020-10-23 18:47:46 +03:00
fh_set_private_options ( fsp - > fh , 0 ) ;
2008-11-04 10:18:43 +03:00
/*
* According to Samba4 , SEC_FILE_READ_ATTRIBUTE is always granted ,
*/
fsp - > access_mask = access_mask | FILE_READ_ATTRIBUTES ;
2010-04-24 01:26:33 +04:00
fsp - > print_file = NULL ;
2020-04-02 18:37:02 +03:00
fsp - > fsp_flags . modified = false ;
1999-12-13 16:27:58 +03:00
fsp - > oplock_type = NO_OPLOCK ;
fsp - > sent_oplock_break = NO_BREAK_SENT ;
2020-04-02 19:21:11 +03:00
fsp - > fsp_flags . is_directory = true ;
2015-11-27 20:29:55 +03:00
if ( file_attributes & FILE_FLAG_POSIX_SEMANTICS ) {
fsp - > posix_flags | = FSP_POSIX_FLAGS_ALL ;
}
2020-05-18 15:30:56 +03:00
2013-12-04 05:22:19 +04:00
/* Don't store old timestamps for directory
handles in the internal database . We don ' t
update them in there if new objects
2019-12-13 18:06:43 +03:00
are created in the directory . Currently
2013-12-04 05:22:19 +04:00
we only update timestamps on file writes .
See bug # 9870.
*/
2019-12-02 18:30:50 +03:00
mtimespec = make_omit_timespec ( ) ;
2008-03-12 17:32:47 +03:00
2019-06-28 20:20:35 +03:00
/* POSIX allows us to open a directory with O_RDONLY. */
2020-03-04 12:56:56 +03:00
flags = O_RDONLY ;
# ifdef O_DIRECTORY
flags | = O_DIRECTORY ;
2011-02-09 04:04:19 +03:00
# endif
2020-03-04 12:56:56 +03:00
2020-12-23 17:48:36 +03:00
status = reopen_from_fsp ( fsp , flags , 0 , NULL ) ;
2019-06-28 20:20:35 +03:00
if ( ! NT_STATUS_IS_OK ( status ) ) {
2020-10-12 16:28:08 +03:00
DBG_INFO ( " Could not open fd for%s (%s) \n " ,
smb_fname_str_dbg ( smb_dname ) ,
nt_errstr ( status ) ) ;
2019-06-28 20:20:35 +03:00
return status ;
2011-02-08 07:46:36 +03:00
}
2011-02-09 04:04:19 +03:00
status = vfs_stat_fsp ( fsp ) ;
2011-02-09 23:18:55 +03:00
if ( ! NT_STATUS_IS_OK ( status ) ) {
2011-02-09 04:04:19 +03:00
fd_close ( fsp ) ;
return status ;
}
2016-03-11 04:27:53 +03:00
if ( ! S_ISDIR ( fsp - > fsp_name - > st . st_ex_mode ) ) {
DEBUG ( 5 , ( " open_directory: %s is not a directory ! \n " ,
smb_fname_str_dbg ( smb_dname ) ) ) ;
fd_close ( fsp ) ;
return NT_STATUS_NOT_A_DIRECTORY ;
}
/* Ensure there was no race condition. We need to check
* dev / inode but not permissions , as these can change
* legitimately */
if ( ! check_same_dev_ino ( & smb_dname - > st , & fsp - > fsp_name - > st ) ) {
2011-02-09 04:04:19 +03:00
DEBUG ( 5 , ( " open_directory: stat struct differs for "
" directory %s. \n " ,
smb_fname_str_dbg ( smb_dname ) ) ) ;
fd_close ( fsp ) ;
return NT_STATUS_ACCESS_DENIED ;
}
2011-02-08 07:46:36 +03:00
2021-06-08 06:58:34 +03:00
if ( info = = FILE_WAS_OPENED ) {
2021-06-08 01:03:41 +03:00
status = smbd_check_access_rights_fsp ( fsp ,
2021-06-08 06:58:34 +03:00
false ,
access_mask ) ;
if ( ! NT_STATUS_IS_OK ( status ) ) {
2021-06-08 02:27:22 +03:00
DBG_DEBUG ( " smbd_check_access_rights_fsp on "
" file %s failed with %s \n " ,
fsp_str_dbg ( fsp ) ,
nt_errstr ( status ) ) ;
2021-06-08 06:58:34 +03:00
fd_close ( fsp ) ;
return status ;
}
}
2012-02-19 17:27:49 +04:00
lck = get_share_mode_lock ( talloc_tos ( ) , fsp - > file_id ,
conn - > connectpath , smb_dname ,
& mtimespec ) ;
2005-10-28 02:35:08 +04:00
if ( lck = = NULL ) {
2009-06-16 01:14:31 +04:00
DEBUG ( 0 , ( " open_directory: Could not get share mode lock for "
" %s \n " , smb_fname_str_dbg ( smb_dname ) ) ) ;
2011-02-08 07:46:36 +03:00
fd_close ( fsp ) ;
2006-07-11 22:01:26 +04:00
return NT_STATUS_SHARING_VIOLATION ;
2005-10-28 02:35:08 +04:00
}
2013-09-26 05:41:07 +04:00
if ( has_delete_on_close ( lck , fsp - > name_hash ) ) {
TALLOC_FREE ( lck ) ;
fd_close ( fsp ) ;
return NT_STATUS_DELETE_PENDING ;
}
2020-11-05 12:42:10 +03:00
status = open_mode_check ( conn , fsp - > file_id , lck ,
2013-09-27 01:32:09 +04:00
access_mask , share_access ) ;
2005-10-28 02:35:08 +04:00
if ( ! NT_STATUS_IS_OK ( status ) ) {
2006-02-20 20:59:58 +03:00
TALLOC_FREE ( lck ) ;
2011-02-08 07:46:36 +03:00
fd_close ( fsp ) ;
2006-07-11 22:01:26 +04:00
return status ;
2005-10-28 02:35:08 +04:00
}
2020-11-05 17:39:51 +03:00
share_mode_flags_restrict ( lck , access_mask , share_access , 0 ) ;
2019-09-17 02:16:40 +03:00
2018-09-18 12:31:27 +03:00
ok = set_share_mode (
lck ,
fsp ,
get_current_uid ( conn ) ,
req ? req - > mid : 0 ,
NO_OPLOCK ,
2019-07-25 17:15:46 +03:00
share_access ,
2019-08-05 15:59:18 +03:00
fsp - > access_mask ) ;
2014-11-27 20:34:56 +03:00
if ( ! ok ) {
2013-09-14 15:49:14 +04:00
TALLOC_FREE ( lck ) ;
fd_close ( fsp ) ;
return NT_STATUS_NO_MEMORY ;
}
2005-10-28 02:35:08 +04:00
2006-02-03 05:16:35 +03:00
/* For directories the delete on close bit at open time seems
always to be honored on close . . . See test 19 in Samba4 BASE - DELETE . */
if ( create_options & FILE_DELETE_ON_CLOSE ) {
2009-12-03 05:06:40 +03:00
status = can_set_delete_on_close ( fsp , 0 ) ;
2007-01-18 09:19:24 +03:00
if ( ! NT_STATUS_IS_OK ( status ) & & ! NT_STATUS_EQUAL ( status , NT_STATUS_DIRECTORY_NOT_EMPTY ) ) {
2013-10-08 00:13:28 +04:00
del_share_mode ( lck , fsp ) ;
2006-02-20 20:59:58 +03:00
TALLOC_FREE ( lck ) ;
2011-02-08 07:46:36 +03:00
fd_close ( fsp ) ;
2006-07-11 22:01:26 +04:00
return status ;
2001-11-23 14:18:20 +03:00
}
2005-10-28 02:35:08 +04:00
2007-01-18 09:19:24 +03:00
if ( NT_STATUS_IS_OK ( status ) ) {
2018-11-28 01:10:17 +03:00
/* Note that here we set the *initial* delete on close flag,
2007-01-19 00:51:52 +03:00
not the regular one . The magic gets handled in close . */
2020-04-03 08:43:38 +03:00
fsp - > fsp_flags . initial_delete_on_close = true ;
2007-01-18 09:19:24 +03:00
}
2001-11-23 14:18:20 +03:00
}
2005-03-15 04:19:58 +03:00
2013-11-22 20:24:42 +04:00
{
/*
* Deal with other opens having a modified write time . Is this
* possible for directories ?
*/
struct timespec write_time = get_share_mode_write_time ( lck ) ;
2019-12-02 18:30:50 +03:00
if ( ! is_omit_timespec ( & write_time ) ) {
2013-11-22 20:24:42 +04:00
update_stat_ex_mtime ( & fsp - > fsp_name - > st , write_time ) ;
}
}
2006-02-20 20:59:58 +03:00
TALLOC_FREE ( lck ) ;
2005-10-28 02:35:08 +04:00
2005-07-08 08:51:27 +04:00
if ( pinfo ) {
* pinfo = info ;
}
2006-07-11 22:01:26 +04:00
return NT_STATUS_OK ;
1998-08-17 17:11:34 +04:00
}
2002-03-23 05:57:44 +03:00
2009-06-10 21:37:57 +04:00
NTSTATUS create_directory ( connection_struct * conn , struct smb_request * req ,
2009-06-12 23:54:11 +04:00
struct smb_filename * smb_dname )
2006-12-24 14:45:55 +03:00
{
NTSTATUS status ;
files_struct * fsp ;
2008-11-21 05:55:24 +03:00
status = SMB_VFS_CREATE_FILE (
conn , /* conn */
req , /* req */
2009-06-12 23:54:11 +04:00
smb_dname , /* fname */
2008-11-21 05:55:24 +03:00
FILE_READ_ATTRIBUTES , /* access_mask */
FILE_SHARE_NONE , /* share_access */
FILE_CREATE , /* create_disposition*/
FILE_DIRECTORY_FILE , /* create_options */
FILE_ATTRIBUTE_DIRECTORY , /* file_attributes */
0 , /* oplock_request */
2013-08-21 17:56:14 +04:00
NULL , /* lease */
2008-11-21 05:55:24 +03:00
0 , /* allocation_size */
2010-03-06 02:10:30 +03:00
0 , /* private_flags */
2008-11-21 05:55:24 +03:00
NULL , /* sd */
NULL , /* ea_list */
& fsp , /* result */
2014-11-26 16:12:51 +03:00
NULL , /* pinfo */
NULL , NULL ) ; /* create context */
2006-12-24 14:45:55 +03:00
if ( NT_STATUS_IS_OK ( status ) ) {
2008-10-09 18:27:49 +04:00
close_file ( req , fsp , NORMAL_CLOSE ) ;
2006-12-24 14:45:55 +03:00
}
2009-06-12 23:54:11 +04:00
2006-12-24 14:45:55 +03:00
return status ;
}
2005-12-13 21:11:50 +03:00
/****************************************************************************
Receive notification that one of our open files has been renamed by another
smbd process .
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
2019-05-17 11:41:25 +03:00
void msg_file_was_renamed ( struct messaging_context * msg_ctx ,
2007-05-16 18:24:06 +04:00
void * private_data ,
uint32_t msg_type ,
2019-05-17 11:41:25 +03:00
struct server_id src ,
2007-05-16 18:24:06 +04:00
DATA_BLOB * data )
2005-12-13 21:11:50 +03:00
{
2019-05-17 11:41:25 +03:00
struct file_rename_message * msg = NULL ;
enum ndr_err_code ndr_err ;
2005-12-13 21:11:50 +03:00
files_struct * fsp ;
2009-07-09 03:22:44 +04:00
struct smb_filename * smb_fname = NULL ;
2011-12-13 11:11:58 +04:00
struct smbd_server_connection * sconn =
2011-12-14 12:50:24 +04:00
talloc_get_type_abort ( private_data ,
2011-12-13 11:11:58 +04:00
struct smbd_server_connection ) ;
2005-12-13 21:11:50 +03:00
2019-05-17 11:41:25 +03:00
msg = talloc ( talloc_tos ( ) , struct file_rename_message ) ;
if ( msg = = NULL ) {
DBG_WARNING ( " talloc failed \n " ) ;
return ;
}
2005-12-13 21:11:50 +03:00
2019-05-17 11:41:25 +03:00
ndr_err = ndr_pull_struct_blob_all (
data ,
msg ,
msg ,
( ndr_pull_flags_fn_t ) ndr_pull_file_rename_message ) ;
if ( ! NDR_ERR_CODE_IS_SUCCESS ( ndr_err ) ) {
DBG_DEBUG ( " ndr_pull_oplock_break_message failed: %s \n " ,
ndr_errstr ( ndr_err ) ) ;
goto out ;
}
2019-05-17 11:44:23 +03:00
if ( DEBUGLEVEL > = 10 ) {
2019-05-17 11:41:25 +03:00
struct server_id_buf buf ;
DBG_DEBUG ( " Got rename message from %s \n " ,
server_id_str_buf ( src , & buf ) ) ;
NDR_PRINT_DEBUG ( file_rename_message , msg ) ;
}
2009-07-09 03:22:44 +04:00
2009-07-11 01:50:37 +04:00
/* stream_name must always be NULL if there is no stream. */
2019-05-17 11:41:25 +03:00
if ( ( msg - > stream_name ! = NULL ) & & ( msg - > stream_name [ 0 ] = = ' \0 ' ) ) {
msg - > stream_name = NULL ;
2009-07-11 01:50:37 +04:00
}
2020-05-03 16:08:03 +03:00
smb_fname = synthetic_smb_fname ( msg ,
msg - > base_name ,
msg - > stream_name ,
NULL ,
2020-04-30 12:48:32 +03:00
0 ,
2020-05-03 16:08:03 +03:00
0 ) ;
2013-04-15 13:22:43 +04:00
if ( smb_fname = = NULL ) {
2019-05-17 11:41:25 +03:00
DBG_DEBUG ( " synthetic_smb_fname failed \n " ) ;
goto out ;
2009-07-09 03:22:44 +04:00
}
2005-12-13 21:11:50 +03:00
2019-05-17 11:44:23 +03:00
fsp = file_find_dif ( sconn , msg - > id , msg - > share_file_id ) ;
if ( fsp = = NULL ) {
DBG_DEBUG ( " fsp not found \n " ) ;
goto out ;
}
2009-07-09 03:22:44 +04:00
2019-05-17 11:44:23 +03:00
if ( strcmp ( fsp - > conn - > connectpath , msg - > servicepath ) = = 0 ) {
NTSTATUS status ;
DBG_DEBUG ( " renaming file %s from %s -> %s \n " ,
fsp_fnum_dbg ( fsp ) ,
fsp_str_dbg ( fsp ) ,
smb_fname_str_dbg ( smb_fname ) ) ;
status = fsp_set_smb_fname ( fsp , smb_fname ) ;
if ( ! NT_STATUS_IS_OK ( status ) ) {
DBG_DEBUG ( " fsp_set_smb_fname failed: %s \n " ,
nt_errstr ( status ) ) ;
2005-12-13 21:11:50 +03:00
}
2019-05-17 11:44:23 +03:00
} else {
/* TODO. JRA. */
/*
* Now we have the complete path we can work out if
* this is actually within this share and adjust
* newname accordingly .
*/
DBG_DEBUG ( " share mismatch (sharepath %s not sharepath %s) "
" %s from %s -> %s \n " ,
fsp - > conn - > connectpath ,
msg - > servicepath ,
fsp_fnum_dbg ( fsp ) ,
fsp_str_dbg ( fsp ) ,
smb_fname_str_dbg ( smb_fname ) ) ;
}
2009-07-09 03:22:44 +04:00
out :
2019-05-17 11:41:25 +03:00
TALLOC_FREE ( msg ) ;
2005-12-13 21:11:50 +03:00
}
2007-12-02 17:35:22 +03:00
2008-01-20 01:25:36 +03:00
/*
* If a main file is opened for delete , all streams need to be checked for
* ! FILE_SHARE_DELETE . Do this by opening with DELETE_ACCESS .
* If that works , delete them all by setting the delete on close and close .
*/
2016-03-05 01:13:22 +03:00
static NTSTATUS open_streams_for_delete ( connection_struct * conn ,
2016-03-05 01:16:13 +03:00
const struct smb_filename * smb_fname )
2008-01-20 01:25:36 +03:00
{
2011-10-14 02:41:53 +04:00
struct stream_struct * stream_info = NULL ;
files_struct * * streams = NULL ;
2019-07-30 07:55:45 +03:00
int j ;
unsigned int i , num_streams = 0 ;
2008-01-20 01:25:36 +03:00
TALLOC_CTX * frame = talloc_stackframe ( ) ;
2021-02-08 13:42:22 +03:00
const struct smb_filename * pathref = NULL ;
2008-01-20 01:25:36 +03:00
NTSTATUS status ;
2021-02-08 13:42:22 +03:00
if ( smb_fname - > fsp = = NULL ) {
struct smb_filename * tmp = NULL ;
status = synthetic_pathref ( frame ,
conn - > cwd_fsp ,
smb_fname - > base_name ,
NULL ,
NULL ,
smb_fname - > twrp ,
smb_fname - > flags ,
& tmp ) ;
if ( ! NT_STATUS_IS_OK ( status ) ) {
if ( NT_STATUS_EQUAL ( status , NT_STATUS_NOT_IMPLEMENTED )
| | NT_STATUS_EQUAL ( status ,
NT_STATUS_OBJECT_NAME_NOT_FOUND ) ) {
DBG_DEBUG ( " no streams around \n " ) ;
TALLOC_FREE ( frame ) ;
return NT_STATUS_OK ;
}
DBG_DEBUG ( " synthetic_pathref failed: %s \n " ,
nt_errstr ( status ) ) ;
goto fail ;
}
pathref = tmp ;
} else {
pathref = smb_fname ;
}
2021-04-28 17:35:59 +03:00
status = vfs_fstreaminfo ( pathref - > fsp , talloc_tos ( ) ,
2011-10-17 22:10:29 +04:00
& num_streams , & stream_info ) ;
2008-01-20 01:25:36 +03:00
2008-01-20 16:44:07 +03:00
if ( NT_STATUS_EQUAL ( status , NT_STATUS_NOT_IMPLEMENTED )
| | NT_STATUS_EQUAL ( status , NT_STATUS_OBJECT_NAME_NOT_FOUND ) ) {
2008-01-20 01:25:36 +03:00
DEBUG ( 10 , ( " no streams around \n " ) ) ;
TALLOC_FREE ( frame ) ;
return NT_STATUS_OK ;
}
if ( ! NT_STATUS_IS_OK ( status ) ) {
2021-04-28 17:35:59 +03:00
DEBUG ( 10 , ( " vfs_fstreaminfo failed: %s \n " ,
2008-01-20 01:25:36 +03:00
nt_errstr ( status ) ) ) ;
goto fail ;
}
DEBUG ( 10 , ( " open_streams_for_delete found %d streams \n " ,
num_streams ) ) ;
if ( num_streams = = 0 ) {
TALLOC_FREE ( frame ) ;
return NT_STATUS_OK ;
}
2011-06-07 05:30:12 +04:00
streams = talloc_array ( talloc_tos ( ) , files_struct * , num_streams ) ;
2008-01-20 01:25:36 +03:00
if ( streams = = NULL ) {
DEBUG ( 0 , ( " talloc failed \n " ) ) ;
status = NT_STATUS_NO_MEMORY ;
goto fail ;
}
for ( i = 0 ; i < num_streams ; i + + ) {
2016-03-05 01:16:13 +03:00
struct smb_filename * smb_fname_cp ;
2008-01-20 01:25:36 +03:00
if ( strequal ( stream_info [ i ] . name , " ::$DATA " ) ) {
streams [ i ] = NULL ;
continue ;
}
2016-03-05 01:16:13 +03:00
smb_fname_cp = synthetic_smb_fname ( talloc_tos ( ) ,
smb_fname - > base_name ,
stream_info [ i ] . name ,
2016-03-19 07:19:38 +03:00
NULL ,
2020-04-30 12:48:32 +03:00
smb_fname - > twrp ,
2016-07-19 19:21:08 +03:00
( smb_fname - > flags &
~ SMB_FILENAME_POSIX_PATH ) ) ;
2016-03-05 01:16:13 +03:00
if ( smb_fname_cp = = NULL ) {
2013-04-15 13:23:44 +04:00
status = NT_STATUS_NO_MEMORY ;
2008-01-20 01:25:36 +03:00
goto fail ;
}
2016-03-05 01:16:13 +03:00
if ( SMB_VFS_STAT ( conn , smb_fname_cp ) = = - 1 ) {
2009-06-23 02:26:56 +04:00
DEBUG ( 10 , ( " Unable to stat stream: %s \n " ,
2016-03-05 01:16:13 +03:00
smb_fname_str_dbg ( smb_fname_cp ) ) ) ;
2009-06-23 02:26:56 +04:00
}
2020-11-12 14:56:56 +03:00
status = openat_pathref_fsp ( conn - > cwd_fsp , smb_fname_cp ) ;
if ( ! NT_STATUS_IS_OK ( status ) ) {
DBG_DEBUG ( " Unable to open stream [%s]: %s \n " ,
smb_fname_str_dbg ( smb_fname_cp ) ,
nt_errstr ( status ) ) ;
TALLOC_FREE ( smb_fname_cp ) ;
break ;
}
2009-03-04 06:23:33 +03:00
status = SMB_VFS_CREATE_FILE (
conn , /* conn */
2008-01-20 01:25:36 +03:00
NULL , /* req */
2016-03-05 01:16:13 +03:00
smb_fname_cp , /* fname */
2008-01-20 01:25:36 +03:00
DELETE_ACCESS , /* access_mask */
2009-03-04 06:23:33 +03:00
( FILE_SHARE_READ | /* share_access */
FILE_SHARE_WRITE | FILE_SHARE_DELETE ) ,
2008-01-20 01:25:36 +03:00
FILE_OPEN , /* create_disposition*/
2010-03-06 02:10:30 +03:00
0 , /* create_options */
2008-01-20 01:25:36 +03:00
FILE_ATTRIBUTE_NORMAL , /* file_attributes */
0 , /* oplock_request */
2013-08-21 17:56:14 +04:00
NULL , /* lease */
2008-01-20 01:25:36 +03:00
0 , /* allocation_size */
2020-06-08 10:29:01 +03:00
0 , /* private_flags */
2008-01-20 01:25:36 +03:00
NULL , /* sd */
NULL , /* ea_list */
& streams [ i ] , /* result */
2014-11-26 16:12:51 +03:00
NULL , /* pinfo */
NULL , NULL ) ; /* create context */
2008-01-20 01:25:36 +03:00
if ( ! NT_STATUS_IS_OK ( status ) ) {
DEBUG ( 10 , ( " Could not open stream %s: %s \n " ,
2016-03-05 01:16:13 +03:00
smb_fname_str_dbg ( smb_fname_cp ) ,
2009-06-12 23:54:11 +04:00
nt_errstr ( status ) ) ) ;
2016-03-05 01:16:13 +03:00
TALLOC_FREE ( smb_fname_cp ) ;
2008-01-20 01:25:36 +03:00
break ;
}
2016-03-05 01:16:13 +03:00
TALLOC_FREE ( smb_fname_cp ) ;
2008-01-20 01:25:36 +03:00
}
/*
* don ' t touch the variable " status " beyond this point : - )
*/
2019-07-30 07:55:45 +03:00
for ( j = i - 1 ; j > = 0 ; j - - ) {
if ( streams [ j ] = = NULL ) {
2008-01-20 01:25:36 +03:00
continue ;
}
2019-07-30 07:55:45 +03:00
DEBUG ( 10 , ( " Closing stream # %d, %s \n " , j ,
fsp_str_dbg ( streams [ j ] ) ) ) ;
close_file ( NULL , streams [ j ] , NORMAL_CLOSE ) ;
2008-01-20 01:25:36 +03:00
}
fail :
TALLOC_FREE ( frame ) ;
return status ;
}
2011-11-23 00:33:27 +04:00
/*********************************************************************
Create a default ACL by inheriting from the parent . If no inheritance
from the parent available , don ' t set anything . This will leave the actual
permissions the new file or directory already got from the filesystem
as the NT ACL when read .
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
2021-05-25 04:38:06 +03:00
static NTSTATUS inherit_new_acl ( struct smb_filename * parent_dir_fname ,
files_struct * fsp )
2011-11-23 00:33:27 +04:00
{
2012-10-10 04:50:27 +04:00
TALLOC_CTX * frame = talloc_stackframe ( ) ;
2011-11-23 00:33:27 +04:00
struct security_descriptor * parent_desc = NULL ;
NTSTATUS status = NT_STATUS_OK ;
struct security_descriptor * psd = NULL ;
2012-11-29 13:00:03 +04:00
const struct dom_sid * owner_sid = NULL ;
const struct dom_sid * group_sid = NULL ;
2011-11-23 00:33:27 +04:00
uint32_t security_info_sent = ( SECINFO_OWNER | SECINFO_GROUP | SECINFO_DACL ) ;
2012-11-29 13:00:03 +04:00
struct security_token * token = fsp - > conn - > session_info - > security_token ;
2016-08-02 09:37:00 +03:00
bool inherit_owner =
( lp_inherit_owner ( SNUM ( fsp - > conn ) ) = = INHERIT_OWNER_WINDOWS_AND_UNIX ) ;
2011-11-23 00:33:27 +04:00
bool inheritable_components = false ;
2012-11-29 13:00:03 +04:00
bool try_builtin_administrators = false ;
const struct dom_sid * BA_U_sid = NULL ;
2012-11-30 16:33:59 +04:00
const struct dom_sid * BA_G_sid = NULL ;
bool try_system = false ;
const struct dom_sid * SY_U_sid = NULL ;
const struct dom_sid * SY_G_sid = NULL ;
2011-11-23 00:33:27 +04:00
size_t size = 0 ;
2020-04-28 17:52:09 +03:00
bool ok ;
2016-02-12 21:30:10 +03:00
2021-05-25 04:39:52 +03:00
status = SMB_VFS_FGET_NT_ACL ( parent_dir_fname - > fsp ,
2020-04-14 07:29:31 +03:00
( SECINFO_OWNER | SECINFO_GROUP | SECINFO_DACL ) ,
frame ,
& parent_desc ) ;
2011-11-23 00:33:27 +04:00
if ( ! NT_STATUS_IS_OK ( status ) ) {
2012-11-28 14:38:13 +04:00
TALLOC_FREE ( frame ) ;
2011-11-23 00:33:27 +04:00
return status ;
}
inheritable_components = sd_has_inheritable_components ( parent_desc ,
2020-04-02 19:21:11 +03:00
fsp - > fsp_flags . is_directory ) ;
2011-11-23 00:33:27 +04:00
if ( ! inheritable_components & & ! inherit_owner ) {
2012-10-10 04:50:27 +04:00
TALLOC_FREE ( frame ) ;
2011-11-23 00:33:27 +04:00
/* Nothing to inherit and not setting owner. */
return NT_STATUS_OK ;
}
/* Create an inherited descriptor from the parent. */
if ( DEBUGLEVEL > = 10 ) {
DEBUG ( 10 , ( " inherit_new_acl: parent acl for %s is: \n " ,
fsp_str_dbg ( fsp ) ) ) ;
NDR_PRINT_DEBUG ( security_descriptor , parent_desc ) ;
}
/* Inherit from parent descriptor if "inherit owner" set. */
if ( inherit_owner ) {
owner_sid = parent_desc - > owner_sid ;
group_sid = parent_desc - > group_sid ;
}
if ( owner_sid = = NULL ) {
2012-11-29 13:00:03 +04:00
if ( security_token_has_builtin_administrators ( token ) ) {
try_builtin_administrators = true ;
} else if ( security_token_is_system ( token ) ) {
try_builtin_administrators = true ;
2012-11-30 16:33:59 +04:00
try_system = true ;
}
}
if ( group_sid = = NULL & &
token - > num_sids = = PRIMARY_GROUP_SID_INDEX )
{
if ( security_token_is_system ( token ) ) {
try_builtin_administrators = true ;
try_system = true ;
2012-11-29 13:00:03 +04:00
}
}
if ( try_builtin_administrators ) {
struct unixid ids ;
ZERO_STRUCT ( ids ) ;
ok = sids_to_unixids ( & global_sid_Builtin_Administrators , 1 , & ids ) ;
if ( ok ) {
switch ( ids . type ) {
case ID_TYPE_BOTH :
BA_U_sid = & global_sid_Builtin_Administrators ;
2012-11-30 16:33:59 +04:00
BA_G_sid = & global_sid_Builtin_Administrators ;
2012-11-29 13:00:03 +04:00
break ;
case ID_TYPE_UID :
BA_U_sid = & global_sid_Builtin_Administrators ;
break ;
2012-11-30 16:33:59 +04:00
case ID_TYPE_GID :
BA_G_sid = & global_sid_Builtin_Administrators ;
break ;
default :
break ;
}
}
}
if ( try_system ) {
struct unixid ids ;
ZERO_STRUCT ( ids ) ;
ok = sids_to_unixids ( & global_sid_System , 1 , & ids ) ;
if ( ok ) {
switch ( ids . type ) {
case ID_TYPE_BOTH :
SY_U_sid = & global_sid_System ;
SY_G_sid = & global_sid_System ;
break ;
case ID_TYPE_UID :
SY_U_sid = & global_sid_System ;
break ;
case ID_TYPE_GID :
SY_G_sid = & global_sid_System ;
break ;
2012-11-29 13:00:03 +04:00
default :
break ;
}
}
}
if ( owner_sid = = NULL ) {
owner_sid = BA_U_sid ;
}
2012-11-30 16:33:59 +04:00
if ( owner_sid = = NULL ) {
owner_sid = SY_U_sid ;
}
if ( group_sid = = NULL ) {
group_sid = SY_G_sid ;
}
if ( try_system & & group_sid = = NULL ) {
group_sid = BA_G_sid ;
}
2012-11-29 13:00:03 +04:00
if ( owner_sid = = NULL ) {
owner_sid = & token - > sids [ PRIMARY_USER_SID_INDEX ] ;
2011-11-23 00:33:27 +04:00
}
if ( group_sid = = NULL ) {
2012-11-30 16:32:04 +04:00
if ( token - > num_sids = = PRIMARY_GROUP_SID_INDEX ) {
group_sid = & token - > sids [ PRIMARY_USER_SID_INDEX ] ;
} else {
group_sid = & token - > sids [ PRIMARY_GROUP_SID_INDEX ] ;
}
2011-11-23 00:33:27 +04:00
}
2012-10-10 04:50:27 +04:00
status = se_create_child_secdesc ( frame ,
2011-11-23 00:33:27 +04:00
& psd ,
& size ,
parent_desc ,
owner_sid ,
group_sid ,
2020-04-02 19:21:11 +03:00
fsp - > fsp_flags . is_directory ) ;
2011-11-23 00:33:27 +04:00
if ( ! NT_STATUS_IS_OK ( status ) ) {
2012-10-10 04:50:27 +04:00
TALLOC_FREE ( frame ) ;
2011-11-23 00:33:27 +04:00
return status ;
}
/* If inheritable_components == false,
se_create_child_secdesc ( )
2018-05-04 23:18:54 +03:00
creates a security descriptor with a NULL dacl
2011-11-23 00:33:27 +04:00
entry , but with SEC_DESC_DACL_PRESENT . We need
to remove that flag . */
if ( ! inheritable_components ) {
security_info_sent & = ~ SECINFO_DACL ;
psd - > type & = ~ SEC_DESC_DACL_PRESENT ;
}
if ( DEBUGLEVEL > = 10 ) {
DEBUG ( 10 , ( " inherit_new_acl: child acl for %s is: \n " ,
fsp_str_dbg ( fsp ) ) ) ;
NDR_PRINT_DEBUG ( security_descriptor , psd ) ;
}
if ( inherit_owner ) {
/* We need to be root to force this. */
become_root ( ) ;
}
status = SMB_VFS_FSET_NT_ACL ( fsp ,
security_info_sent ,
psd ) ;
if ( inherit_owner ) {
unbecome_root ( ) ;
}
2012-10-10 04:50:27 +04:00
TALLOC_FREE ( frame ) ;
2011-11-23 00:33:27 +04:00
return status ;
}
2014-10-29 01:31:46 +03:00
/*
* If we already have a lease , it must match the new file id . [ MS - SMB2 ]
* 3.3 .5 .9 .8 speaks about INVALID_PARAMETER if an already used lease key is
* used for a different file name .
*/
2014-12-05 23:47:52 +03:00
struct lease_match_state {
2014-10-29 01:31:46 +03:00
/* Input parameters. */
2014-12-05 23:47:52 +03:00
TALLOC_CTX * mem_ctx ;
const char * servicepath ;
2014-10-29 01:31:46 +03:00
const struct smb_filename * fname ;
bool file_existed ;
struct file_id id ;
/* Return parameters. */
uint32_t num_file_ids ;
struct file_id * ids ;
NTSTATUS match_status ;
} ;
2014-12-05 23:47:52 +03:00
/*************************************************************
File doesn ' t exist but this lease key + guid is already in use .
This is only allowable in the dynamic share case where the
service path must be different .
There is a small race condition here in the multi - connection
case where a client sends two create calls on different connections ,
where the file doesn ' t exist and one smbd creates the leases_db
entry first , but this will get fixed by the multichannel cleanup
when all identical client_guids get handled by a single smbd .
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
static void lease_match_parser_new_file (
uint32_t num_files ,
const struct leases_db_file * files ,
struct lease_match_state * state )
{
uint32_t i ;
for ( i = 0 ; i < num_files ; i + + ) {
const struct leases_db_file * f = & files [ i ] ;
if ( strequal ( state - > servicepath , f - > servicepath ) ) {
state - > match_status = NT_STATUS_INVALID_PARAMETER ;
return ;
}
}
/* Dynamic share case. Break leases on all other files. */
state - > match_status = leases_db_copy_file_ids ( state - > mem_ctx ,
num_files ,
files ,
& state - > ids ) ;
if ( ! NT_STATUS_IS_OK ( state - > match_status ) ) {
return ;
}
state - > num_file_ids = num_files ;
state - > match_status = NT_STATUS_OPLOCK_NOT_GRANTED ;
return ;
}
static void lease_match_parser (
uint32_t num_files ,
const struct leases_db_file * files ,
2014-10-29 01:31:46 +03:00
void * private_data )
{
2014-12-05 23:47:52 +03:00
struct lease_match_state * state =
( struct lease_match_state * ) private_data ;
uint32_t i ;
2014-10-29 01:31:46 +03:00
2014-12-05 23:47:52 +03:00
if ( ! state - > file_existed ) {
/*
* Deal with name mismatch or
* possible dynamic share case separately
* to make code clearer .
*/
lease_match_parser_new_file ( num_files ,
files ,
state ) ;
2014-10-29 01:31:46 +03:00
return ;
}
2014-12-05 23:47:52 +03:00
/* File existed. */
state - > match_status = NT_STATUS_OK ;
for ( i = 0 ; i < num_files ; i + + ) {
const struct leases_db_file * f = & files [ i ] ;
/* Everything should be the same. */
if ( ! file_id_equal ( & state - > id , & f - > id ) ) {
/* This should catch all dynamic share cases. */
state - > match_status = NT_STATUS_OPLOCK_NOT_GRANTED ;
break ;
}
if ( ! strequal ( f - > servicepath , state - > servicepath ) ) {
state - > match_status = NT_STATUS_INVALID_PARAMETER ;
break ;
}
if ( ! strequal ( f - > base_name , state - > fname - > base_name ) ) {
state - > match_status = NT_STATUS_INVALID_PARAMETER ;
break ;
}
if ( ! strequal ( f - > stream_name , state - > fname - > stream_name ) ) {
state - > match_status = NT_STATUS_INVALID_PARAMETER ;
break ;
}
}
if ( NT_STATUS_IS_OK ( state - > match_status ) ) {
/*
* Common case - just opening another handle on a
* file on a non - dynamic share .
*/
return ;
}
if ( NT_STATUS_EQUAL ( state - > match_status , NT_STATUS_INVALID_PARAMETER ) ) {
/* Mismatched path. Error back to client. */
2014-10-29 01:31:46 +03:00
return ;
}
/*
2014-12-05 23:47:52 +03:00
* File id mismatch . Dynamic share case NT_STATUS_OPLOCK_NOT_GRANTED .
2014-10-29 01:31:46 +03:00
* Don ' t allow leases .
*/
2014-12-05 23:47:52 +03:00
state - > match_status = leases_db_copy_file_ids ( state - > mem_ctx ,
num_files ,
files ,
& state - > ids ) ;
if ( ! NT_STATUS_IS_OK ( state - > match_status ) ) {
return ;
2014-10-29 01:31:46 +03:00
}
2014-12-05 23:47:52 +03:00
state - > num_file_ids = num_files ;
state - > match_status = NT_STATUS_OPLOCK_NOT_GRANTED ;
return ;
2014-10-29 01:31:46 +03:00
}
2019-08-19 14:16:53 +03:00
struct lease_match_break_state {
struct messaging_context * msg_ctx ;
const struct smb2_lease_key * lease_key ;
struct file_id id ;
bool found_lease ;
uint16_t version ;
uint16_t epoch ;
} ;
static bool lease_match_break_fn (
struct share_mode_entry * e ,
void * private_data )
{
struct lease_match_break_state * state = private_data ;
bool stale , equal ;
uint32_t e_lease_type ;
NTSTATUS status ;
stale = share_entry_stale_pid ( e ) ;
if ( stale ) {
return false ;
}
equal = smb2_lease_key_equal ( & e - > lease_key , state - > lease_key ) ;
if ( ! equal ) {
return false ;
}
status = leases_db_get (
& e - > client_guid ,
& e - > lease_key ,
& state - > id ,
NULL , /* current_state */
NULL , /* breaking */
NULL , /* breaking_to_requested */
NULL , /* breaking_to_required */
& state - > version , /* lease_version */
& state - > epoch ) ; /* epoch */
if ( NT_STATUS_IS_OK ( status ) ) {
state - > found_lease = true ;
} else {
DBG_WARNING ( " Could not find version/epoch: %s \n " ,
nt_errstr ( status ) ) ;
}
e_lease_type = get_lease_type ( e , state - > id ) ;
if ( e_lease_type = = SMB2_LEASE_NONE ) {
return false ;
}
send_break_message ( state - > msg_ctx , & state - > id , e , SMB2_LEASE_NONE ) ;
/*
* Windows 7 and 8 lease clients are broken in that they will
* not respond to lease break requests whilst waiting for an
* outstanding open request on that lease handle on the same
* TCP connection , due to holding an internal inode lock .
*
* This means we can ' t reschedule ourselves here , but must
* return from the create .
*
* Work around :
*
* Send the breaks and then return SMB2_LEASE_NONE in the
* lease handle to cause them to acknowledge the lease
* break . Consultation with Microsoft engineering confirmed
* this approach is safe .
*/
return false ;
}
2014-10-29 01:31:46 +03:00
static NTSTATUS lease_match ( connection_struct * conn ,
struct smb_request * req ,
2019-08-07 22:36:25 +03:00
const struct smb2_lease_key * lease_key ,
2014-12-05 23:47:52 +03:00
const char * servicepath ,
2014-10-29 01:31:46 +03:00
const struct smb_filename * fname ,
uint16_t * p_version ,
uint16_t * p_epoch )
{
struct smbd_server_connection * sconn = req - > sconn ;
2014-12-05 23:47:52 +03:00
TALLOC_CTX * tos = talloc_tos ( ) ;
struct lease_match_state state = {
. mem_ctx = tos ,
. servicepath = servicepath ,
2014-10-29 01:31:46 +03:00
. fname = fname ,
. match_status = NT_STATUS_OK
} ;
uint32_t i ;
NTSTATUS status ;
state . file_existed = VALID_STAT ( fname - > st ) ;
if ( state . file_existed ) {
state . id = vfs_file_id_from_sbuf ( conn , & fname - > st ) ;
}
2020-07-08 11:15:56 +03:00
status = leases_db_parse ( & sconn - > client - > global - > client_guid ,
2014-12-05 23:47:52 +03:00
lease_key , lease_match_parser , & state ) ;
2014-10-29 01:31:46 +03:00
if ( ! NT_STATUS_IS_OK ( status ) ) {
/*
* Not found or error means okay : We can make the lease pass
*/
return NT_STATUS_OK ;
}
if ( ! NT_STATUS_EQUAL ( state . match_status , NT_STATUS_OPLOCK_NOT_GRANTED ) ) {
/*
* Anything but NT_STATUS_OPLOCK_NOT_GRANTED , let the caller
* deal with it .
*/
return state . match_status ;
}
/* We have to break all existing leases. */
for ( i = 0 ; i < state . num_file_ids ; i + + ) {
2019-08-19 14:16:53 +03:00
struct lease_match_break_state break_state = {
. msg_ctx = conn - > sconn - > msg_ctx ,
. lease_key = lease_key ,
} ;
2014-10-29 01:31:46 +03:00
struct share_mode_lock * lck ;
2019-08-19 14:16:53 +03:00
bool ok ;
2014-10-29 01:31:46 +03:00
if ( file_id_equal ( & state . ids [ i ] , & state . id ) ) {
/* Don't need to break our own file. */
continue ;
}
2019-08-19 14:16:53 +03:00
break_state . id = state . ids [ i ] ;
lck = get_existing_share_mode_lock (
talloc_tos ( ) , break_state . id ) ;
2014-10-29 01:31:46 +03:00
if ( lck = = NULL ) {
/* Race condition - file already closed. */
continue ;
}
2018-09-19 17:31:55 +03:00
2019-08-19 14:16:53 +03:00
ok = share_mode_forall_leases (
lck , lease_match_break_fn , & break_state ) ;
if ( ! ok ) {
DBG_DEBUG ( " share_mode_forall_leases failed \n " ) ;
continue ;
2018-09-19 17:31:55 +03:00
}
2014-10-29 01:31:46 +03:00
TALLOC_FREE ( lck ) ;
2019-08-19 14:16:53 +03:00
if ( break_state . found_lease ) {
* p_version = break_state . version ;
* p_epoch = break_state . epoch ;
}
2014-10-29 01:31:46 +03:00
}
/*
* Ensure we don ' t grant anything more so we
* never upgrade .
*/
return NT_STATUS_OPLOCK_NOT_GRANTED ;
}
2007-12-02 17:35:22 +03:00
/*
* Wrapper around open_file_ntcreate and open_directory
*/
2008-11-20 05:03:27 +03:00
static NTSTATUS create_file_unixpath ( connection_struct * conn ,
struct smb_request * req ,
2009-06-16 01:14:31 +04:00
struct smb_filename * smb_fname ,
2008-11-20 05:03:27 +03:00
uint32_t access_mask ,
uint32_t share_access ,
uint32_t create_disposition ,
uint32_t create_options ,
uint32_t file_attributes ,
uint32_t oplock_request ,
2019-08-07 22:37:31 +03:00
const struct smb2_lease * lease ,
2008-11-20 05:03:27 +03:00
uint64_t allocation_size ,
2010-03-06 02:10:30 +03:00
uint32_t private_flags ,
2008-11-20 05:03:27 +03:00
struct security_descriptor * sd ,
struct ea_list * ea_list ,
files_struct * * result ,
2009-06-16 01:14:31 +04:00
int * pinfo )
2007-12-11 13:14:30 +03:00
{
2019-08-07 22:37:31 +03:00
struct smb2_lease none_lease ;
2007-12-11 13:14:30 +03:00
int info = FILE_WAS_OPENED ;
2008-01-20 01:25:36 +03:00
files_struct * base_fsp = NULL ;
2007-12-11 13:14:30 +03:00
files_struct * fsp = NULL ;
NTSTATUS status ;
2021-02-01 14:01:22 +03:00
int ret ;
2021-05-25 02:09:24 +03:00
struct smb_filename * parent_dir_fname = NULL ;
struct smb_filename * smb_fname_atname = NULL ;
2007-12-11 13:14:30 +03:00
2018-05-13 07:18:21 +03:00
DBG_DEBUG ( " create_file_unixpath: access_mask = 0x%x "
2007-12-11 13:14:30 +03:00
" file_attributes = 0x%x, share_access = 0x%x, "
" create_disposition = 0x%x create_options = 0x%x "
2010-03-06 02:10:30 +03:00
" oplock_request = 0x%x private_flags = 0x%x "
2018-05-10 05:28:07 +03:00
" ea_list = %p, sd = %p, "
2007-12-11 13:14:30 +03:00
" fname = %s \n " ,
( unsigned int ) access_mask ,
( unsigned int ) file_attributes ,
( unsigned int ) share_access ,
( unsigned int ) create_disposition ,
( unsigned int ) create_options ,
( unsigned int ) oplock_request ,
2010-03-06 02:10:30 +03:00
( unsigned int ) private_flags ,
2018-05-13 07:18:21 +03:00
ea_list , sd , smb_fname_str_dbg ( smb_fname ) ) ;
2009-06-16 01:14:31 +04:00
2007-12-11 13:14:30 +03:00
if ( create_options & FILE_OPEN_BY_FILE_ID ) {
status = NT_STATUS_NOT_SUPPORTED ;
goto fail ;
}
2008-08-19 18:34:50 +04:00
if ( create_options & NTCREATEX_OPTIONS_INVALID_PARAM_MASK ) {
status = NT_STATUS_INVALID_PARAMETER ;
goto fail ;
}
2007-12-11 13:14:30 +03:00
if ( req = = NULL ) {
oplock_request | = INTERNAL_OPEN_ONLY ;
}
2014-10-29 01:31:46 +03:00
if ( lease ! = NULL ) {
uint16_t epoch = lease - > lease_epoch ;
uint16_t version = lease - > lease_version ;
2018-03-30 19:37:49 +03:00
if ( req = = NULL ) {
DBG_WARNING ( " Got lease on internal open \n " ) ;
status = NT_STATUS_INTERNAL_ERROR ;
goto fail ;
}
2014-10-29 01:31:46 +03:00
status = lease_match ( conn ,
req ,
& lease - > lease_key ,
2014-12-05 23:47:52 +03:00
conn - > connectpath ,
2014-10-29 01:31:46 +03:00
smb_fname ,
& version ,
& epoch ) ;
if ( NT_STATUS_EQUAL ( status , NT_STATUS_OPLOCK_NOT_GRANTED ) ) {
/* Dynamic share file. No leases and update epoch... */
2019-08-07 22:37:31 +03:00
none_lease = * lease ;
none_lease . lease_state = SMB2_LEASE_NONE ;
none_lease . lease_epoch = epoch ;
none_lease . lease_version = version ;
lease = & none_lease ;
2014-10-29 01:31:46 +03:00
} else if ( ! NT_STATUS_IS_OK ( status ) ) {
goto fail ;
}
}
2008-01-20 01:25:36 +03:00
if ( ( conn - > fs_capabilities & FILE_NAMED_STREAMS )
& & ( access_mask & DELETE_ACCESS )
2009-06-16 01:14:31 +04:00
& & ! is_ntfs_stream_smb_fname ( smb_fname ) ) {
2008-01-20 01:25:36 +03:00
/*
* We can ' t open a file with DELETE access if any of the
* streams is open without FILE_SHARE_DELETE
*/
2016-03-05 01:16:13 +03:00
status = open_streams_for_delete ( conn , smb_fname ) ;
2008-01-20 01:25:36 +03:00
if ( ! NT_STATUS_IS_OK ( status ) ) {
goto fail ;
}
2007-12-11 13:14:30 +03:00
}
2020-04-18 00:20:13 +03:00
if ( access_mask & SEC_FLAG_SYSTEM_SECURITY ) {
bool ok ;
ok = security_token_has_privilege ( get_current_nttok ( conn ) ,
SEC_PRIV_SECURITY ) ;
if ( ! ok ) {
DBG_DEBUG ( " open on %s failed - "
" SEC_FLAG_SYSTEM_SECURITY denied. \n " ,
smb_fname_str_dbg ( smb_fname ) ) ;
status = NT_STATUS_PRIVILEGE_NOT_HELD ;
goto fail ;
}
2020-04-18 00:23:07 +03:00
if ( conn - > sconn - > using_smb2 & &
( access_mask = = SEC_FLAG_SYSTEM_SECURITY ) )
{
/*
* No other bits set . Windows SMB2 refuses this .
* See smbtorture3 SMB2 - SACL test .
*
* Note this is an SMB2 - only behavior ,
* smbtorture3 SMB1 - SYSTEM - SECURITY already tests
* that SMB1 allows this .
*/
status = NT_STATUS_ACCESS_DENIED ;
goto fail ;
}
2009-03-05 20:04:16 +03:00
}
2007-12-11 13:14:30 +03:00
2018-03-28 22:42:20 +03:00
/*
* Files or directories can ' t be opened DELETE_ON_CLOSE without
* delete access .
* BUG : https : //bugzilla.samba.org/show_bug.cgi?id=13358
*/
if ( create_options & FILE_DELETE_ON_CLOSE ) {
if ( ( access_mask & DELETE_ACCESS ) = = 0 ) {
status = NT_STATUS_INVALID_PARAMETER ;
goto fail ;
}
}
2008-01-20 01:25:36 +03:00
if ( ( conn - > fs_capabilities & FILE_NAMED_STREAMS )
2020-06-08 10:26:41 +03:00
& & is_ntfs_stream_smb_fname ( smb_fname ) )
{
2015-04-27 02:02:55 +03:00
uint32_t base_create_disposition ;
2009-06-16 01:14:31 +04:00
struct smb_filename * smb_fname_base = NULL ;
2018-05-27 14:01:50 +03:00
uint32_t base_privflags ;
2008-01-20 01:25:36 +03:00
if ( create_options & FILE_DIRECTORY_FILE ) {
status = NT_STATUS_NOT_A_DIRECTORY ;
goto fail ;
}
switch ( create_disposition ) {
case FILE_OPEN :
base_create_disposition = FILE_OPEN ;
break ;
default :
base_create_disposition = FILE_OPEN_IF ;
break ;
}
2009-06-16 01:14:31 +04:00
/* Create an smb_filename with stream_name == NULL. */
2013-04-15 13:55:53 +04:00
smb_fname_base = synthetic_smb_fname ( talloc_tos ( ) ,
2016-03-19 07:19:38 +03:00
smb_fname - > base_name ,
NULL ,
2021-01-12 14:23:38 +03:00
& smb_fname - > st ,
2020-04-30 12:48:32 +03:00
smb_fname - > twrp ,
2016-03-19 07:19:38 +03:00
smb_fname - > flags ) ;
2013-04-15 13:55:53 +04:00
if ( smb_fname_base = = NULL ) {
status = NT_STATUS_NO_MEMORY ;
2009-06-16 01:14:31 +04:00
goto fail ;
}
2020-11-23 09:46:42 +03:00
/*
* We may be creating the basefile as part of creating the
* stream , so it ' s legal if the basefile doesn ' t exist at this
* point , the create_file_unixpath ( ) below will create it . But
* if the basefile exists we want a handle so we can fstat ( ) it .
*/
2021-02-01 14:01:22 +03:00
ret = vfs_stat ( conn , smb_fname_base ) ;
if ( ret = = - 1 & & errno ! = ENOENT ) {
status = map_nt_error_from_unix ( errno ) ;
2020-11-23 09:46:42 +03:00
TALLOC_FREE ( smb_fname_base ) ;
goto fail ;
}
2021-02-01 14:01:22 +03:00
if ( ret = = 0 ) {
status = openat_pathref_fsp ( conn - > cwd_fsp ,
smb_fname_base ) ;
if ( ! NT_STATUS_IS_OK ( status ) ) {
DBG_ERR ( " open_smb_fname_fsp [%s] failed: %s \n " ,
smb_fname_str_dbg ( smb_fname_base ) ,
nt_errstr ( status ) ) ;
TALLOC_FREE ( smb_fname_base ) ;
goto fail ;
}
2020-11-23 09:46:42 +03:00
2013-10-29 03:59:20 +04:00
/*
* https : //bugzilla.samba.org/show_bug.cgi?id=10229
* We need to check if the requested access mask
* could be used to open the underlying file ( if
* it existed ) , as we ' re passing in zero for the
* access mask to the base filename .
*/
status = check_base_file_access ( conn ,
smb_fname_base ,
access_mask ) ;
if ( ! NT_STATUS_IS_OK ( status ) ) {
DEBUG ( 10 , ( " Permission check "
" for base %s failed: "
" %s \n " , smb_fname - > base_name ,
nt_errstr ( status ) ) ) ;
2021-02-01 14:01:01 +03:00
TALLOC_FREE ( smb_fname_base ) ;
2013-10-29 03:59:20 +04:00
goto fail ;
}
2009-06-23 02:26:56 +04:00
}
2020-10-23 14:08:50 +03:00
base_privflags = NTCREATEX_FLAG_STREAM_BASEOPEN ;
2018-05-27 14:01:50 +03:00
2009-06-16 01:14:31 +04:00
/* Open the base file. */
2020-05-07 17:24:16 +03:00
status = create_file_unixpath ( conn ,
NULL ,
smb_fname_base ,
0 ,
2008-01-20 01:25:36 +03:00
FILE_SHARE_READ
| FILE_SHARE_WRITE
| FILE_SHARE_DELETE ,
base_create_disposition ,
2020-05-07 17:24:16 +03:00
0 ,
0 ,
0 ,
NULL ,
0 ,
2018-05-27 14:01:50 +03:00
base_privflags ,
2020-05-07 17:24:16 +03:00
NULL ,
NULL ,
& base_fsp ,
NULL ) ;
2009-06-16 01:14:31 +04:00
TALLOC_FREE ( smb_fname_base ) ;
2008-01-20 01:25:36 +03:00
if ( ! NT_STATUS_IS_OK ( status ) ) {
DEBUG ( 10 , ( " create_file_unixpath for base %s failed: "
2009-06-16 01:14:31 +04:00
" %s \n " , smb_fname - > base_name ,
nt_errstr ( status ) ) ) ;
2008-01-20 01:25:36 +03:00
goto fail ;
}
}
2020-10-02 18:40:41 +03:00
/*
* Now either reuse smb_fname - > fsp or allocate a new fsp if
* smb_fname - > fsp is NULL . The latter will be the case when processing a
* request to create a file that doesn ' t exist .
*/
if ( smb_fname - > fsp ! = NULL ) {
2021-06-08 19:53:18 +03:00
bool need_fsp_unlink = true ;
2020-10-02 18:40:41 +03:00
/*
2021-06-08 19:53:18 +03:00
* This is really subtle . If someone passes in an smb_fname
* where smb_fname actually is taken from fsp - > fsp_name , then
* the lifetime of these objects is meant to be the same .
*
* This is commonly the case from an SMB1 path - based call ,
* ( call_trans2qfilepathinfo ) where we use the pathref fsp
* ( smb_fname - > fsp ) as the handle . In this case we must not
* unlink smb_fname - > fsp from it ' s owner .
*
* The asserts below :
*
* SMB_ASSERT ( fsp - > fsp_name - > fsp ! = NULL ) ;
* SMB_ASSERT ( fsp - > fsp_name - > fsp = = fsp ) ;
*
* ensure the required invarients are met .
2020-10-02 18:40:41 +03:00
*/
2021-06-08 19:53:18 +03:00
if ( smb_fname - > fsp - > fsp_name = = smb_fname ) {
need_fsp_unlink = false ;
}
fsp = smb_fname - > fsp ;
if ( need_fsp_unlink ) {
/*
* Unlink the fsp from the smb_fname so the fsp is not
* autoclosed by the smb_fname pathref fsp talloc
* destructor .
*/
smb_fname_fsp_unlink ( smb_fname ) ;
}
2020-10-02 18:40:41 +03:00
status = fsp_bind_smb ( fsp , req ) ;
if ( ! NT_STATUS_IS_OK ( status ) ) {
2020-12-21 18:40:01 +03:00
goto fail ;
2020-10-02 18:40:41 +03:00
}
if ( fsp - > base_fsp ! = NULL ) {
2020-12-21 18:35:11 +03:00
struct files_struct * tmp_base_fsp = fsp - > base_fsp ;
fsp_set_base_fsp ( fsp , NULL ) ;
fd_close ( tmp_base_fsp ) ;
file_free ( NULL , tmp_base_fsp ) ;
2020-10-02 18:40:41 +03:00
}
2020-06-19 10:40:37 +03:00
}
2020-10-02 18:40:41 +03:00
if ( fsp = = NULL ) {
/* Creating file */
status = file_new ( req , conn , & fsp ) ;
if ( ! NT_STATUS_IS_OK ( status ) ) {
goto fail ;
}
status = fsp_set_smb_fname ( fsp , smb_fname ) ;
if ( ! NT_STATUS_IS_OK ( status ) ) {
goto fail ;
}
2020-06-19 10:40:37 +03:00
}
2021-06-08 19:53:18 +03:00
SMB_ASSERT ( fsp - > fsp_name - > fsp ! = NULL ) ;
SMB_ASSERT ( fsp - > fsp_name - > fsp = = fsp ) ;
2020-06-19 10:40:37 +03:00
if ( base_fsp ) {
/*
* We ' re opening the stream element of a
* base_fsp we already opened . Set up the
* base_fsp pointer .
*/
2020-12-21 18:35:11 +03:00
fsp_set_base_fsp ( fsp , base_fsp ) ;
2020-06-19 10:40:37 +03:00
}
2021-05-25 02:09:24 +03:00
/*
* Get a pathref on the parent . We can re - use this
* for multiple calls to check parent ACLs etc . to
* avoid pathname calls .
*/
status = parent_pathref ( talloc_tos ( ) ,
conn - > cwd_fsp ,
smb_fname ,
& parent_dir_fname ,
& smb_fname_atname ) ;
if ( ! NT_STATUS_IS_OK ( status ) ) {
goto fail ;
}
2007-12-11 13:14:30 +03:00
/*
* If it ' s a request for a directory open , deal with it separately .
*/
if ( create_options & FILE_DIRECTORY_FILE ) {
2008-01-20 01:25:36 +03:00
if ( create_options & FILE_NON_DIRECTORY_FILE ) {
status = NT_STATUS_INVALID_PARAMETER ;
goto fail ;
}
2007-12-11 13:14:30 +03:00
/* Can't open a temp directory. IFS kit test. */
2008-12-02 01:13:14 +03:00
if ( ! ( file_attributes & FILE_FLAG_POSIX_SEMANTICS ) & &
( file_attributes & FILE_ATTRIBUTE_TEMPORARY ) ) {
2007-12-11 13:14:30 +03:00
status = NT_STATUS_INVALID_PARAMETER ;
goto fail ;
}
/*
* We will get a create directory here if the Win32
* app specified a security descriptor in the
* CreateDirectory ( ) call .
*/
oplock_request = 0 ;
2020-05-07 17:50:20 +03:00
status = open_directory ( conn ,
req ,
access_mask ,
share_access ,
create_disposition ,
create_options ,
file_attributes ,
2021-05-25 02:13:14 +03:00
parent_dir_fname ,
smb_fname_atname ,
2020-05-07 17:50:20 +03:00
& info ,
2020-06-19 10:40:37 +03:00
fsp ) ;
2007-12-11 13:14:30 +03:00
} else {
/*
* Ordinary file case .
*/
2012-07-12 21:09:37 +04:00
if ( allocation_size ) {
fsp - > initial_allocation_size = smb_roundup ( fsp - > conn ,
allocation_size ) ;
}
2008-11-23 06:40:09 +03:00
status = open_file_ntcreate ( conn ,
req ,
access_mask ,
share_access ,
create_disposition ,
create_options ,
file_attributes ,
oplock_request ,
2013-08-21 19:58:23 +04:00
lease ,
2010-03-06 02:10:30 +03:00
private_flags ,
2021-05-25 02:47:34 +03:00
parent_dir_fname ,
smb_fname_atname ,
2008-11-23 06:40:09 +03:00
& info ,
fsp ) ;
2007-12-11 13:14:30 +03:00
if ( NT_STATUS_EQUAL ( status , NT_STATUS_FILE_IS_A_DIRECTORY ) ) {
2008-12-02 00:52:28 +03:00
/* A stream open never opens a directory */
if ( base_fsp ) {
status = NT_STATUS_FILE_IS_A_DIRECTORY ;
goto fail ;
}
2007-12-11 13:14:30 +03:00
/*
* Fail the open if it was explicitly a non - directory
* file .
*/
if ( create_options & FILE_NON_DIRECTORY_FILE ) {
status = NT_STATUS_FILE_IS_A_DIRECTORY ;
goto fail ;
}
oplock_request = 0 ;
2020-05-07 17:50:20 +03:00
status = open_directory ( conn ,
req ,
access_mask ,
share_access ,
create_disposition ,
create_options ,
file_attributes ,
2021-05-25 02:13:14 +03:00
parent_dir_fname ,
smb_fname_atname ,
2020-05-07 17:50:20 +03:00
& info ,
2020-06-19 10:40:37 +03:00
fsp ) ;
2007-12-11 13:14:30 +03:00
}
}
if ( ! NT_STATUS_IS_OK ( status ) ) {
goto fail ;
}
2020-11-22 15:54:51 +03:00
fsp - > fsp_flags . is_fsa = true ;
2011-11-22 22:28:52 +04:00
if ( ( ea_list ! = NULL ) & &
( ( info = = FILE_WAS_CREATED ) | | ( info = = FILE_WAS_OVERWRITTEN ) ) ) {
2020-12-14 23:15:48 +03:00
status = set_ea ( conn , fsp , ea_list ) ;
2011-11-22 22:28:52 +04:00
if ( ! NT_STATUS_IS_OK ( status ) ) {
goto fail ;
}
}
2020-04-02 19:21:11 +03:00
if ( ! fsp - > fsp_flags . is_directory & &
S_ISDIR ( fsp - > fsp_name - > st . st_ex_mode ) )
{
2011-11-22 22:28:52 +04:00
status = NT_STATUS_ACCESS_DENIED ;
goto fail ;
}
/* Save the requested allocation size. */
if ( ( info = = FILE_WAS_CREATED ) | | ( info = = FILE_WAS_OVERWRITTEN ) ) {
2019-07-30 08:10:28 +03:00
if ( ( allocation_size > ( uint64_t ) fsp - > fsp_name - > st . st_ex_size )
2020-04-02 19:21:11 +03:00
& & ! ( fsp - > fsp_flags . is_directory ) )
2015-11-25 17:23:26 +03:00
{
2011-11-22 22:28:52 +04:00
fsp - > initial_allocation_size = smb_roundup (
fsp - > conn , allocation_size ) ;
if ( vfs_allocate_file_space (
fsp , fsp - > initial_allocation_size ) = = - 1 ) {
status = NT_STATUS_DISK_FULL ;
goto fail ;
}
} else {
fsp - > initial_allocation_size = smb_roundup (
fsp - > conn , ( uint64_t ) fsp - > fsp_name - > st . st_ex_size ) ;
}
2012-07-12 03:35:32 +04:00
} else {
fsp - > initial_allocation_size = 0 ;
2011-11-22 22:28:52 +04:00
}
2011-11-22 23:53:51 +04:00
if ( ( info = = FILE_WAS_CREATED ) & & lp_nt_acl_support ( SNUM ( conn ) ) & &
fsp - > base_fsp = = NULL ) {
if ( sd ! = NULL ) {
/*
* According to the MS documentation , the only time the security
* descriptor is applied to the opened file is iff we * created * the
* file ; an existing file stays the same .
*
* Also , it seems ( from observation ) that you can open the file with
* any access mask but you can still write the sd . We need to override
* the granted access before we call set_sd
* Patch for bug # 2242 from Tom Lackemann < cessnatomny @ yahoo . com > .
*/
2007-12-11 13:14:30 +03:00
2011-11-22 23:53:51 +04:00
uint32_t sec_info_sent ;
uint32_t saved_access_mask = fsp - > access_mask ;
2007-12-11 13:14:30 +03:00
2011-11-22 23:53:51 +04:00
sec_info_sent = get_sec_info ( sd ) ;
2007-12-11 13:14:30 +03:00
2011-11-22 23:53:51 +04:00
fsp - > access_mask = FILE_GENERIC_ALL ;
2007-12-11 13:14:30 +03:00
2011-11-22 23:53:51 +04:00
if ( sec_info_sent & ( SECINFO_OWNER |
SECINFO_GROUP |
SECINFO_DACL |
SECINFO_SACL ) ) {
2012-08-30 00:37:51 +04:00
status = set_sd ( fsp , sd , sec_info_sent ) ;
2011-11-22 23:53:51 +04:00
}
2007-12-11 13:14:30 +03:00
2011-11-22 23:53:51 +04:00
fsp - > access_mask = saved_access_mask ;
2007-12-11 13:14:30 +03:00
2011-11-22 23:53:51 +04:00
if ( ! NT_STATUS_IS_OK ( status ) ) {
goto fail ;
}
} else if ( lp_inherit_acls ( SNUM ( conn ) ) ) {
2011-11-23 00:33:27 +04:00
/* Inherit from parent. Errors here are not fatal. */
2021-05-25 04:38:06 +03:00
status = inherit_new_acl ( parent_dir_fname , fsp ) ;
2011-11-23 00:33:27 +04:00
if ( ! NT_STATUS_IS_OK ( status ) ) {
DEBUG ( 10 , ( " inherit_new_acl: failed for %s with %s \n " ,
fsp_str_dbg ( fsp ) ,
nt_errstr ( status ) ) ) ;
}
2007-12-11 13:14:30 +03:00
}
}
2013-11-18 17:54:37 +04:00
if ( ( conn - > fs_capabilities & FILE_FILE_COMPRESSION )
& & ( create_options & FILE_NO_COMPRESSION )
& & ( info = = FILE_WAS_CREATED ) ) {
status = SMB_VFS_SET_COMPRESSION ( conn , fsp , fsp ,
COMPRESSION_FORMAT_NONE ) ;
if ( ! NT_STATUS_IS_OK ( status ) ) {
DEBUG ( 1 , ( " failed to disable compression: %s \n " ,
nt_errstr ( status ) ) ) ;
}
}
2008-02-23 03:12:57 +03:00
DEBUG ( 10 , ( " create_file_unixpath: info=%d \n " , info ) ) ;
2007-12-11 13:14:30 +03:00
* result = fsp ;
if ( pinfo ! = NULL ) {
* pinfo = info ;
}
2009-08-13 00:00:54 +04:00
2009-11-18 01:55:02 +03:00
smb_fname - > st = fsp - > fsp_name - > st ;
2009-08-13 00:00:54 +04:00
2021-05-25 02:09:24 +03:00
TALLOC_FREE ( parent_dir_fname ) ;
2007-12-11 13:14:30 +03:00
return NT_STATUS_OK ;
fail :
2008-02-23 03:12:57 +03:00
DEBUG ( 10 , ( " create_file_unixpath: %s \n " , nt_errstr ( status ) ) ) ;
2007-12-11 13:14:30 +03:00
if ( fsp ! = NULL ) {
2020-12-21 18:49:03 +03:00
/*
* The close_file below will close
* fsp - > base_fsp .
*/
base_fsp = NULL ;
close_file ( req , fsp , ERROR_CLOSE ) ;
2007-12-11 13:14:30 +03:00
fsp = NULL ;
}
2008-01-20 01:25:36 +03:00
if ( base_fsp ! = NULL ) {
2008-10-09 18:27:49 +04:00
close_file ( req , base_fsp , ERROR_CLOSE ) ;
2008-01-20 01:25:36 +03:00
base_fsp = NULL ;
}
2021-05-25 02:09:24 +03:00
TALLOC_FREE ( parent_dir_fname ) ;
2007-12-11 13:14:30 +03:00
return status ;
}
2008-10-21 04:43:45 +04:00
NTSTATUS create_file_default ( connection_struct * conn ,
struct smb_request * req ,
2009-06-12 23:54:11 +04:00
struct smb_filename * smb_fname ,
2008-10-21 04:43:45 +04:00
uint32_t access_mask ,
uint32_t share_access ,
uint32_t create_disposition ,
uint32_t create_options ,
uint32_t file_attributes ,
uint32_t oplock_request ,
2019-08-07 22:41:22 +03:00
const struct smb2_lease * lease ,
2008-10-21 04:43:45 +04:00
uint64_t allocation_size ,
2010-03-06 02:10:30 +03:00
uint32_t private_flags ,
2008-10-21 04:43:45 +04:00
struct security_descriptor * sd ,
struct ea_list * ea_list ,
files_struct * * result ,
2014-11-26 16:12:51 +03:00
int * pinfo ,
const struct smb2_create_blobs * in_context_blobs ,
struct smb2_create_blobs * out_context_blobs )
2007-12-02 17:35:22 +03:00
{
int info = FILE_WAS_OPENED ;
files_struct * fsp = NULL ;
NTSTATUS status ;
2010-05-13 21:54:15 +04:00
bool stream_name = false ;
2020-02-04 17:46:09 +03:00
struct smb2_create_blob * posx = NULL ;
2007-12-02 17:35:22 +03:00
2018-05-13 07:18:21 +03:00
DBG_DEBUG ( " create_file: access_mask = 0x%x "
2007-12-02 17:35:22 +03:00
" file_attributes = 0x%x, share_access = 0x%x, "
" create_disposition = 0x%x create_options = 0x%x "
2007-12-07 14:57:11 +03:00
" oplock_request = 0x%x "
2010-03-06 02:10:30 +03:00
" private_flags = 0x%x "
2020-05-14 16:59:33 +03:00
" ea_list = %p, sd = %p, "
2009-06-12 23:54:11 +04:00
" fname = %s \n " ,
2007-12-02 17:35:22 +03:00
( unsigned int ) access_mask ,
( unsigned int ) file_attributes ,
( unsigned int ) share_access ,
( unsigned int ) create_disposition ,
( unsigned int ) create_options ,
2007-12-07 14:57:11 +03:00
( unsigned int ) oplock_request ,
2010-03-06 02:10:30 +03:00
( unsigned int ) private_flags ,
2020-05-14 15:00:22 +03:00
ea_list ,
sd ,
smb_fname_str_dbg ( smb_fname ) ) ;
2007-12-02 17:35:22 +03:00
2019-08-02 12:54:11 +03:00
if ( req ! = NULL ) {
/*
* Remember the absolute time of the original request
* with this mid . We ' ll use it later to see if this
* has timed out .
*/
get_deferred_open_message_state ( req , & req - > request_time , NULL ) ;
}
2008-01-20 01:25:36 +03:00
/*
* Check to see if this is a mac fork of some kind .
*/
2007-12-02 17:35:22 +03:00
2010-05-13 21:54:15 +04:00
stream_name = is_ntfs_stream_smb_fname ( smb_fname ) ;
if ( stream_name ) {
2008-01-20 01:25:36 +03:00
enum FAKE_FILE_TYPE fake_file_type ;
2007-12-02 17:35:22 +03:00
2009-07-11 02:43:21 +04:00
fake_file_type = is_fake_file ( smb_fname ) ;
2007-12-02 17:35:22 +03:00
2020-06-15 11:32:49 +03:00
if ( req ! = NULL & & fake_file_type ! = FAKE_FILE_TYPE_NONE ) {
2007-12-02 17:35:22 +03:00
/*
* Here we go ! support for changing the disk quotas
* - - metze
*
* We need to fake up to open this MAGIC QUOTA file
* and return a valid FID .
*
* w2k close this file directly after openening xp
* also tries a QUERY_FILE_INFO on the file and then
* close it
*/
2008-10-09 17:38:53 +04:00
status = open_fake_file ( req , conn , req - > vuid ,
2009-07-11 02:43:21 +04:00
fake_file_type , smb_fname ,
2007-12-02 17:35:22 +03:00
access_mask , & fsp ) ;
if ( ! NT_STATUS_IS_OK ( status ) ) {
goto fail ;
}
2009-06-12 23:54:11 +04:00
ZERO_STRUCT ( smb_fname - > st ) ;
2007-12-02 17:35:22 +03:00
goto done ;
}
2008-07-25 05:12:12 +04:00
if ( ! ( conn - > fs_capabilities & FILE_NAMED_STREAMS ) ) {
2009-07-04 00:36:11 +04:00
status = NT_STATUS_OBJECT_NAME_NOT_FOUND ;
2008-07-25 05:12:12 +04:00
goto fail ;
}
2007-12-02 17:35:22 +03:00
}
2012-01-31 20:47:07 +04:00
if ( is_ntfs_default_stream_smb_fname ( smb_fname ) ) {
2010-05-13 21:54:15 +04:00
int ret ;
smb_fname - > stream_name = NULL ;
/* We have to handle this error here. */
if ( create_options & FILE_DIRECTORY_FILE ) {
status = NT_STATUS_NOT_A_DIRECTORY ;
goto fail ;
}
2020-11-25 14:29:40 +03:00
ret = vfs_stat ( conn , smb_fname ) ;
2010-05-13 21:54:15 +04:00
if ( ret = = 0 & & VALID_STAT_OF_DIR ( smb_fname - > st ) ) {
status = NT_STATUS_FILE_IS_A_DIRECTORY ;
goto fail ;
}
}
2020-02-04 17:46:09 +03:00
posx = smb2_create_blob_find (
in_context_blobs , SMB2_CREATE_TAG_POSIX ) ;
if ( posx ! = NULL ) {
uint32_t wire_mode_bits = 0 ;
mode_t mode_bits = 0 ;
SMB_STRUCT_STAT sbuf = { 0 } ;
enum perm_type ptype =
( create_options & FILE_DIRECTORY_FILE ) ?
PERM_NEW_DIR : PERM_NEW_FILE ;
if ( posx - > data . length ! = 4 ) {
status = NT_STATUS_INVALID_PARAMETER ;
goto fail ;
}
wire_mode_bits = IVAL ( posx - > data . data , 0 ) ;
status = unix_perms_from_wire (
conn , & sbuf , wire_mode_bits , ptype , & mode_bits ) ;
if ( ! NT_STATUS_IS_OK ( status ) ) {
goto fail ;
}
/*
* Remove type info from mode , leaving only the
* permissions and setuid / gid bits .
*/
mode_bits & = ~ S_IFMT ;
file_attributes = ( FILE_FLAG_POSIX_SEMANTICS | mode_bits ) ;
}
2020-05-07 17:24:16 +03:00
status = create_file_unixpath ( conn ,
req ,
smb_fname ,
access_mask ,
share_access ,
create_disposition ,
create_options ,
file_attributes ,
oplock_request ,
lease ,
allocation_size ,
private_flags ,
sd ,
ea_list ,
& fsp ,
& info ) ;
2007-12-02 17:35:22 +03:00
if ( ! NT_STATUS_IS_OK ( status ) ) {
goto fail ;
}
done :
2007-12-07 14:57:11 +03:00
DEBUG ( 10 , ( " create_file: info=%d \n " , info ) ) ;
2007-12-02 17:35:22 +03:00
* result = fsp ;
2007-12-05 17:34:07 +03:00
if ( pinfo ! = NULL ) {
* pinfo = info ;
}
2007-12-02 17:35:22 +03:00
return NT_STATUS_OK ;
fail :
DEBUG ( 10 , ( " create_file: %s \n " , nt_errstr ( status ) ) ) ;
if ( fsp ! = NULL ) {
2008-10-09 18:27:49 +04:00
close_file ( req , fsp , ERROR_CLOSE ) ;
2007-12-02 17:35:22 +03:00
fsp = NULL ;
}
return status ;
}