1
0
mirror of https://github.com/samba-team/samba.git synced 2024-12-28 07:21:54 +03:00
samba-mirror/source3/smbd/dir.c

Ignoring revisions in .git-blame-ignore-revs. Click here to bypass and see the normal blame view.

1768 lines
44 KiB
C
Raw Normal View History

/*
Unix SMB/CIFS implementation.
Directory handling routines
Copyright (C) Andrew Tridgell 1992-1998
Copyright (C) Jeremy Allison 2007
This program is free software; you can redistribute it and/or modify
it under the terms of the GNU General Public License as published by
the Free Software Foundation; either version 3 of the License, or
(at your option) any later version.
This program is distributed in the hope that it will be useful,
but WITHOUT ANY WARRANTY; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
GNU General Public License for more details.
You should have received a copy of the GNU General Public License
along with this program. If not, see <http://www.gnu.org/licenses/>.
*/
#include "includes.h"
#include "system/filesys.h"
#include "locking/share_mode_lock.h"
#include "smbd/smbd.h"
#include "smbd/globals.h"
#include "libcli/security/security.h"
2011-07-07 15:04:31 +04:00
#include "lib/util/bitmap.h"
#include "../lib/util/memcache.h"
#include "../librpc/gen_ndr/open_files.h"
#include "lib/util/string_wrappers.h"
/*
This module implements directory related functions for Samba.
*/
/* "Special" directory offsets. */
#define END_OF_DIRECTORY_OFFSET ((long)-1)
#define START_OF_DIRECTORY_OFFSET ((long)0)
#define DOT_DOT_DIRECTORY_OFFSET ((long)0x80000000)
/* Make directory handle internals available. */
struct name_cache_entry {
char *name;
long offset;
};
struct smb_Dir {
connection_struct *conn;
2012-03-28 06:22:03 +04:00
DIR *dir;
long offset;
struct smb_filename *dir_smb_fname;
size_t name_cache_size;
struct name_cache_entry *name_cache;
unsigned int name_cache_index;
unsigned int file_number;
bool case_sensitive;
files_struct *fsp; /* Back pointer to containing fsp, only
set from OpenDir_fsp(). */
};
struct dptr_struct {
struct dptr_struct *next, *prev;
int dnum;
struct connection_struct *conn;
struct smb_Dir *dir_hnd;
char *wcard;
uint32_t attr;
bool has_wild; /* Set to true if the wcard entry has MS wildcard characters in it. */
bool did_stat; /* Optimisation for non-wcard searches. */
bool priv; /* Directory handle opened with privilege. */
uint32_t counter;
};
static NTSTATUS OpenDir_fsp(
TALLOC_CTX *mem_ctx,
connection_struct *conn,
files_struct *fsp,
const char *mask,
uint32_t attr,
struct smb_Dir **_dir_hnd);
static void DirCacheAdd(struct smb_Dir *dir_hnd, const char *name, long offset);
static int smb_Dir_destructor(struct smb_Dir *dir_hnd);
static bool SearchDir(struct smb_Dir *dir_hnd, const char *name);
static void SeekDir(struct smb_Dir *dirp, long offset);
static long TellDir(struct smb_Dir *dirp);
#define INVALID_DPTR_KEY (-3)
/****************************************************************************
Initialise the dir bitmap.
****************************************************************************/
bool init_dptrs(struct smbd_server_connection *sconn)
{
if (sconn->searches.dptr_bmap) {
return true;
}
sconn->searches.dptr_bmap = bitmap_talloc(
2010-03-28 16:16:55 +04:00
sconn, MAX_DIRECTORY_HANDLES);
if (sconn->searches.dptr_bmap == NULL) {
return false;
}
return true;
}
/****************************************************************************
Get the struct dptr_struct for a dir index.
****************************************************************************/
static struct dptr_struct *dptr_get(struct smbd_server_connection *sconn,
int key)
{
struct dptr_struct *dptr;
for (dptr = sconn->searches.dirptrs; dptr != NULL; dptr = dptr->next) {
if(dptr->dnum != key) {
continue;
}
DLIST_PROMOTE(sconn->searches.dirptrs, dptr);
return dptr;
}
return(NULL);
}
/****************************************************************************
Get the dir path for a dir index.
****************************************************************************/
const char *dptr_path(struct smbd_server_connection *sconn, int key)
{
struct dptr_struct *dptr = dptr_get(sconn, key);
if (dptr)
return(dptr->dir_hnd->dir_smb_fname->base_name);
return(NULL);
}
/****************************************************************************
Get the dir wcard for a dir index.
****************************************************************************/
const char *dptr_wcard(struct smbd_server_connection *sconn, int key)
{
struct dptr_struct *dptr = dptr_get(sconn, key);
if (dptr)
return(dptr->wcard);
return(NULL);
}
/****************************************************************************
Get the dir attrib for a dir index.
****************************************************************************/
uint16_t dptr_attr(struct smbd_server_connection *sconn, int key)
{
struct dptr_struct *dptr = dptr_get(sconn, key);
if (dptr)
return(dptr->attr);
return(0);
}
/****************************************************************************
Close all dptrs for a cnum.
****************************************************************************/
void dptr_closecnum(connection_struct *conn)
{
struct dptr_struct *dptr, *next;
struct smbd_server_connection *sconn = conn->sconn;
if (sconn == NULL) {
return;
}
for(dptr = sconn->searches.dirptrs; dptr; dptr = next) {
next = dptr->next;
if (dptr->conn == conn) {
/*
* Need to make a copy, "dptr" will be gone
* after close_file_free() returns
*/
struct files_struct *fsp = dptr->dir_hnd->fsp;
close_file_free(NULL, &fsp, NORMAL_CLOSE);
}
}
}
/****************************************************************************
Create a new dir ptr. If the flag old_handle is true then we must allocate
from the bitmap range 0 - 255 as old SMBsearch directory handles are only
one byte long. If old_handle is false we allocate from the range
256 - MAX_DIRECTORY_HANDLES. We bias the number we return by 1 to ensure
a directory handle is never zero.
wcard must not be zero.
****************************************************************************/
NTSTATUS dptr_create(connection_struct *conn,
struct smb_request *req,
files_struct *fsp,
bool old_handle,
const char *wcard,
uint32_t attr,
struct dptr_struct **dptr_ret)
{
struct smbd_server_connection *sconn = conn->sconn;
struct dptr_struct *dptr = NULL;
struct smb_Dir *dir_hnd = NULL;
NTSTATUS status;
DBG_INFO("dir=%s\n", fsp_str_dbg(fsp));
if (sconn == NULL) {
DEBUG(0,("dptr_create: called with fake connection_struct\n"));
return NT_STATUS_INTERNAL_ERROR;
}
if (!wcard) {
return NT_STATUS_INVALID_PARAMETER;
}
if (!(fsp->access_mask & SEC_DIR_LIST)) {
DBG_INFO("dptr_create: directory %s "
"not open for LIST access\n",
fsp_str_dbg(fsp));
return NT_STATUS_ACCESS_DENIED;
}
status = OpenDir_fsp(NULL, conn, fsp, wcard, attr, &dir_hnd);
if (!NT_STATUS_IS_OK(status)) {
return status;
}
dptr = talloc_zero(NULL, struct dptr_struct);
if(!dptr) {
DEBUG(0,("talloc fail in dptr_create.\n"));
TALLOC_FREE(dir_hnd);
return NT_STATUS_NO_MEMORY;
}
dptr->conn = conn;
dptr->dir_hnd = dir_hnd;
dptr->wcard = talloc_strdup(dptr, wcard);
if (!dptr->wcard) {
TALLOC_FREE(dptr);
TALLOC_FREE(dir_hnd);
return NT_STATUS_NO_MEMORY;
}
if ((req != NULL && req->posix_pathnames) || ISDOT(wcard)) {
dptr->has_wild = True;
} else {
dptr->has_wild = ms_has_wild(dptr->wcard);
}
dptr->attr = attr;
if (sconn->using_smb2) {
goto done;
}
if(old_handle) {
/*
* This is an old-style SMBsearch request. Ensure the
* value we return will fit in the range 1-255.
*/
dptr->dnum = bitmap_find(sconn->searches.dptr_bmap, 0);
if(dptr->dnum == -1 || dptr->dnum > 254) {
DBG_ERR("returned %d: Error - all old "
"dirptrs in use ?\n",
dptr->dnum);
TALLOC_FREE(dptr);
TALLOC_FREE(dir_hnd);
return NT_STATUS_TOO_MANY_OPENED_FILES;
}
} else {
/*
* This is a new-style trans2 request. Allocate from
* a range that will return 256 - MAX_DIRECTORY_HANDLES.
*/
dptr->dnum = bitmap_find(sconn->searches.dptr_bmap, 255);
if(dptr->dnum == -1 || dptr->dnum < 255) {
DBG_ERR("returned %d: Error - all new "
"dirptrs in use ?\n",
dptr->dnum);
TALLOC_FREE(dptr);
TALLOC_FREE(dir_hnd);
return NT_STATUS_TOO_MANY_OPENED_FILES;
}
}
bitmap_set(sconn->searches.dptr_bmap, dptr->dnum);
dptr->dnum += 1; /* Always bias the dnum by one - no zero dnums allowed. */
DLIST_ADD(sconn->searches.dirptrs, dptr);
done:
DBG_INFO("creating new dirptr [%d] for path [%s]\n",
dptr->dnum, fsp_str_dbg(fsp));
*dptr_ret = dptr;
return NT_STATUS_OK;
}
/****************************************************************************
Wrapper functions to access the lower level directory handles.
****************************************************************************/
void dptr_CloseDir(files_struct *fsp)
{
struct smbd_server_connection *sconn = NULL;
if (fsp->dptr == NULL) {
return;
}
sconn = fsp->dptr->conn->sconn;
/*
* The destructor for the struct smb_Dir (fsp->dptr->dir_hnd)
* now handles all resource deallocation.
*/
DBG_INFO("closing dptr key %d\n", fsp->dptr->dnum);
if (sconn != NULL && !sconn->using_smb2) {
DLIST_REMOVE(sconn->searches.dirptrs, fsp->dptr);
/*
* Free the dnum in the bitmap. Remember the dnum value is
* always biased by one with respect to the bitmap.
*/
if (!bitmap_query(sconn->searches.dptr_bmap,
fsp->dptr->dnum - 1))
{
DBG_ERR("closing dnum = %d and bitmap not set !\n",
fsp->dptr->dnum);
}
bitmap_clear(sconn->searches.dptr_bmap, fsp->dptr->dnum - 1);
}
TALLOC_FREE(fsp->dptr->dir_hnd);
TALLOC_FREE(fsp->dptr);
}
void dptr_RewindDir(struct dptr_struct *dptr)
{
long offset;
RewindDir(dptr->dir_hnd, &offset);
dptr->did_stat = false;
}
void dptr_SeekDir(struct dptr_struct *dptr, long offset)
{
SeekDir(dptr->dir_hnd, offset);
dptr->did_stat = false;
}
long dptr_TellDir(struct dptr_struct *dptr)
{
return TellDir(dptr->dir_hnd);
}
unsigned int dptr_FileNumber(struct dptr_struct *dptr)
{
return dptr->dir_hnd->file_number;
}
bool dptr_has_wild(struct dptr_struct *dptr)
{
return dptr->has_wild;
}
int dptr_dnum(struct dptr_struct *dptr)
{
return dptr->dnum;
}
bool dptr_get_priv(struct dptr_struct *dptr)
{
return dptr->priv;
}
void dptr_set_priv(struct dptr_struct *dptr)
{
dptr->priv = true;
}
bool dptr_case_sensitive(struct dptr_struct *dptr)
{
return dptr->dir_hnd->case_sensitive;
}
/****************************************************************************
Return the next visible file name, skipping veto'd and invisible files.
****************************************************************************/
static char *dptr_ReadDirName(TALLOC_CTX *ctx,
struct dptr_struct *dptr,
long *poffset,
SMB_STRUCT_STAT *pst)
{
struct smb_Dir *dir_hnd = dptr->dir_hnd;
struct files_struct *dir_fsp = dir_hnd->fsp;
struct smb_filename *dir_name = dir_fsp->fsp_name;
struct smb_filename smb_fname_base;
bool retry_scanning = false;
int ret;
int flags = 0;
SET_STAT_INVALID(*pst);
if (dptr->has_wild) {
const char *name_temp = NULL;
char *talloced = NULL;
name_temp = ReadDirName(dir_hnd, poffset, pst, &talloced);
if (name_temp == NULL) {
return NULL;
}
if (talloced != NULL) {
return talloc_move(ctx, &talloced);
}
return talloc_strdup(ctx, name_temp);
}
if (dptr->did_stat) {
/*
* No wildcard, this is not a real directory traverse
* but a "stat" call behind a query_directory. We've
* been here, nothing else to look at.
*/
return NULL;
}
dptr->did_stat = true;
/* Create an smb_filename with stream_name == NULL. */
smb_fname_base = (struct smb_filename){
.base_name = dptr->wcard,
.flags = dir_name->flags,
.twrp = dir_name->twrp,
};
if (dir_name->flags & SMB_FILENAME_POSIX_PATH) {
flags |= AT_SYMLINK_NOFOLLOW;
}
ret = SMB_VFS_FSTATAT(dptr->conn, dir_fsp, &smb_fname_base, pst, flags);
if (ret == 0) {
return talloc_strdup(ctx, dptr->wcard);
}
/*
* If we get any other error than ENOENT or ENOTDIR
* then the file exists, we just can't stat it.
*/
if (errno != ENOENT && errno != ENOTDIR) {
return talloc_strdup(ctx, dptr->wcard);
}
/*
* A scan will find the long version of a mangled name as
* wildcard.
*/
retry_scanning |= mangle_is_mangled(dptr->wcard, dptr->conn->params);
/*
* Also retry scanning if the client requested case
* insensitive semantics and the file system does not provide
* it.
*/
retry_scanning |=
(!dir_hnd->case_sensitive &&
(dptr->conn->fs_capabilities & FILE_CASE_SENSITIVE_SEARCH));
if (retry_scanning) {
char *found_name = NULL;
NTSTATUS status;
status = get_real_filename_at(dir_fsp,
dptr->wcard,
ctx,
&found_name);
if (NT_STATUS_IS_OK(status)) {
return found_name;
}
}
return NULL;
}
/****************************************************************************
Search for a file by name.
****************************************************************************/
bool dptr_SearchDir(struct dptr_struct *dptr, const char *name)
{
if (!dptr->has_wild && (dptr->dir_hnd->offset == END_OF_DIRECTORY_OFFSET)) {
/* This is a singleton directory and we're already at the end. */
return False;
}
return SearchDir(dptr->dir_hnd, name);
}
struct files_struct *dir_hnd_fetch_fsp(struct smb_Dir *dir_hnd)
{
return dir_hnd->fsp;
}
/****************************************************************************
Fetch the fsp associated with the dptr_num.
****************************************************************************/
files_struct *dptr_fetch_lanman2_fsp(struct smbd_server_connection *sconn,
int dptr_num)
{
struct dptr_struct *dptr = dptr_get(sconn, dptr_num);
if (dptr == NULL) {
return NULL;
}
DBG_NOTICE("fetching dirptr %d for path %s\n",
dptr_num,
dptr->dir_hnd->dir_smb_fname->base_name);
return dptr->dir_hnd->fsp;
}
bool smbd_dirptr_get_entry(TALLOC_CTX *ctx,
struct dptr_struct *dirptr,
const char *mask,
uint32_t dirtype,
bool dont_descend,
bool ask_sharemode,
bool get_dosmode_in,
bool (*match_fn)(TALLOC_CTX *ctx,
void *private_data,
const char *dname,
const char *mask,
char **_fname),
bool (*mode_fn)(TALLOC_CTX *ctx,
void *private_data,
struct files_struct *dirfsp,
struct smb_filename *atname,
struct smb_filename *smb_fname,
bool get_dosmode,
uint32_t *_mode),
void *private_data,
char **_fname,
struct smb_filename **_smb_fname,
uint32_t *_mode,
long *_prev_offset)
{
connection_struct *conn = dirptr->conn;
struct smb_Dir *dir_hnd = dirptr->dir_hnd;
size_t slashlen;
size_t pathlen;
const char *dpath = dir_hnd->dir_smb_fname->base_name;
bool dirptr_path_is_dot = ISDOT(dpath);
NTSTATUS status;
int ret;
*_smb_fname = NULL;
*_mode = 0;
pathlen = strlen(dpath);
slashlen = ( dpath[pathlen-1] != '/') ? 1 : 0;
while (true) {
long cur_offset;
long prev_offset;
SMB_STRUCT_STAT sbuf = { 0 };
char *dname = NULL;
bool isdots;
char *fname = NULL;
char *pathreal = NULL;
struct smb_filename *atname = NULL;
struct smb_filename *smb_fname = NULL;
uint32_t mode = 0;
bool check_dfs_symlink = false;
bool get_dosmode = get_dosmode_in;
bool ok;
cur_offset = dptr_TellDir(dirptr);
prev_offset = cur_offset;
dname = dptr_ReadDirName(ctx, dirptr, &cur_offset, &sbuf);
DBG_DEBUG("dir [%s] dirptr [0x%lx] offset [%ld] => "
"dname [%s]\n",
smb_fname_str_dbg(dir_hnd->dir_smb_fname),
(long)dirptr,
cur_offset,
dname ? dname : "(finished)");
if (dname == NULL) {
return false;
}
isdots = (ISDOT(dname) || ISDOTDOT(dname));
if (dont_descend && !isdots) {
TALLOC_FREE(dname);
continue;
}
if (IS_VETO_PATH(conn, dname)) {
TALLOC_FREE(dname);
continue;
}
/*
* fname may get mangled, dname is never mangled.
* Whenever we're accessing the filesystem we use
* pathreal which is composed from dname.
*/
ok = match_fn(ctx, private_data, dname, mask, &fname);
if (!ok) {
TALLOC_FREE(dname);
continue;
}
/*
* This used to be
* pathreal = talloc_asprintf(ctx, "%s%s%s", dirptr->path,
* needslash?"/":"", dname);
* but this was measurably slower than doing the memcpy.
*/
pathreal = talloc_array(
ctx, char,
pathlen + slashlen + talloc_get_size(dname));
if (!pathreal) {
TALLOC_FREE(dname);
TALLOC_FREE(fname);
return false;
}
/*
* We don't want to pass ./xxx to modules below us so don't
* add the path if it is just . by itself.
*/
if (dirptr_path_is_dot) {
memcpy(pathreal, dname, talloc_get_size(dname));
} else {
memcpy(pathreal, dpath, pathlen);
pathreal[pathlen] = '/';
memcpy(pathreal + slashlen + pathlen, dname,
talloc_get_size(dname));
}
/* Create smb_fname with NULL stream_name. */
smb_fname = synthetic_smb_fname(talloc_tos(),
pathreal,
NULL,
&sbuf,
dir_hnd->dir_smb_fname->twrp,
dir_hnd->dir_smb_fname->flags);
TALLOC_FREE(pathreal);
if (smb_fname == NULL) {
TALLOC_FREE(dname);
TALLOC_FREE(fname);
return false;
}
if (!VALID_STAT(smb_fname->st)) {
/*
* If stat() fails with ENOENT it might be a
* msdfs-symlink in Windows context, this is checked
* below, for now we just want to fill stat info as good
* as we can.
*/
ret = vfs_stat(conn, smb_fname);
if (ret != 0 && errno != ENOENT) {
TALLOC_FREE(smb_fname);
TALLOC_FREE(dname);
TALLOC_FREE(fname);
continue;
}
}
/* Create smb_fname with NULL stream_name. */
atname = synthetic_smb_fname(talloc_tos(),
dname,
NULL,
&smb_fname->st,
dir_hnd->dir_smb_fname->twrp,
dir_hnd->dir_smb_fname->flags);
if (atname == NULL) {
TALLOC_FREE(dname);
TALLOC_FREE(fname);
TALLOC_FREE(smb_fname);
return false;
}
/*
* openat_pathref_fsp() will return
* NT_STATUS_OBJECT_NAME_NOT_FOUND in non-POSIX context when
* hitting a dangling symlink. It may be a DFS symlink, this is
* checked below by the mode_fn() call, so we have to allow this
* here.
*
* NT_STATUS_STOPPED_ON_SYMLINK is returned in POSIX context
* when hitting a symlink and ensures we always return directory
* entries that are symlinks in POSIX context.
*/
status = openat_pathref_fsp(dir_hnd->fsp, atname);
if (!NT_STATUS_IS_OK(status) &&
!NT_STATUS_EQUAL(status, NT_STATUS_OBJECT_NAME_NOT_FOUND))
{
TALLOC_FREE(atname);
TALLOC_FREE(dname);
TALLOC_FREE(fname);
TALLOC_FREE(smb_fname);
continue;
}
if (NT_STATUS_EQUAL(status, NT_STATUS_OBJECT_NAME_NOT_FOUND)) {
if (!(atname->flags & SMB_FILENAME_POSIX_PATH)) {
check_dfs_symlink = true;
}
/*
* Check if it's a symlink. We only want to return this
* if it's a DFS symlink or in POSIX mode. Disable
* getting dosmode in the mode_fn() and prime the mode
* as FILE_ATTRIBUTE_NORMAL.
*/
mode = FILE_ATTRIBUTE_NORMAL;
get_dosmode = false;
}
status = move_smb_fname_fsp_link(smb_fname, atname);
if (!NT_STATUS_IS_OK(status)) {
DBG_WARNING("Failed to move pathref for [%s]: %s\n",
smb_fname_str_dbg(smb_fname),
nt_errstr(status));
TALLOC_FREE(atname);
TALLOC_FREE(smb_fname);
TALLOC_FREE(dname);
TALLOC_FREE(fname);
continue;
}
if (!is_visible_fsp(smb_fname->fsp)) {
TALLOC_FREE(atname);
TALLOC_FREE(smb_fname);
TALLOC_FREE(dname);
TALLOC_FREE(fname);
continue;
}
/*
* Don't leak metadata about the containing
* directory of the share.
*/
if (dirptr_path_is_dot && ISDOTDOT(dname)) {
/*
* Making a copy here, then freeing
* the original will close the smb_fname->fsp.
*/
struct smb_filename *tmp_smb_fname =
cp_smb_filename(ctx, smb_fname);
if (tmp_smb_fname == NULL) {
TALLOC_FREE(atname);
TALLOC_FREE(smb_fname);
TALLOC_FREE(dname);
TALLOC_FREE(fname);
return false;
}
TALLOC_FREE(smb_fname);
smb_fname = tmp_smb_fname;
mode = FILE_ATTRIBUTE_DIRECTORY;
get_dosmode = false;
}
ok = mode_fn(ctx,
private_data,
dir_hnd->fsp,
atname,
smb_fname,
get_dosmode,
&mode);
if (!ok) {
TALLOC_FREE(atname);
TALLOC_FREE(smb_fname);
TALLOC_FREE(dname);
TALLOC_FREE(fname);
continue;
}
TALLOC_FREE(atname);
/*
* Don't leak INO/DEV/User SID/Group SID about the containing
* directory of the share. This MUST happen AFTER the call to
* mode_fn().
*/
if (dirptr_path_is_dot && ISDOTDOT(dname)) {
/* Ensure posix fileid and sids are hidden
*/
smb_fname->st.st_ex_ino = 0;
smb_fname->st.st_ex_dev = 0;
smb_fname->st.st_ex_uid = -1;
smb_fname->st.st_ex_gid = -1;
}
/*
* The only valid cases where we return the directory entry if
* it's a symlink are:
*
* 1. POSIX context, always return it, or
*
* 2. a DFS symlink where the mode_fn() call above has verified
* this and set mode to FILE_ATTRIBUTE_REPARSE_POINT.
*/
if (check_dfs_symlink &&
!(mode & FILE_ATTRIBUTE_REPARSE_POINT))
{
TALLOC_FREE(smb_fname);
TALLOC_FREE(dname);
TALLOC_FREE(fname);
continue;
}
if (!dir_check_ftype(mode, dirtype)) {
DEBUG(5,("[%s] attribs 0x%x didn't match 0x%x\n",
fname, (unsigned int)mode, (unsigned int)dirtype));
TALLOC_FREE(smb_fname);
TALLOC_FREE(dname);
TALLOC_FREE(fname);
continue;
}
if (ask_sharemode && !S_ISDIR(smb_fname->st.st_ex_mode)) {
struct timespec write_time_ts;
struct file_id fileid;
fileid = vfs_file_id_from_sbuf(conn,
&smb_fname->st);
get_file_infos(fileid, 0, NULL, &write_time_ts);
if (!is_omit_timespec(&write_time_ts)) {
update_stat_ex_mtime(&smb_fname->st,
write_time_ts);
}
}
DEBUG(3,("smbd_dirptr_get_entry mask=[%s] found %s "
"fname=%s (%s)\n",
mask, smb_fname_str_dbg(smb_fname),
dname, fname));
if (!conn->sconn->using_smb2) {
/*
* The dircache is only needed for SMB1 because SMB1
* uses a name for the resume wheras SMB2 always
* continues from the next position (unless it's told to
* restart or close-and-reopen the listing).
*/
DirCacheAdd(dir_hnd, dname, cur_offset);
}
TALLOC_FREE(dname);
*_smb_fname = talloc_move(ctx, &smb_fname);
if (*_smb_fname == NULL) {
return false;
}
*_fname = fname;
*_mode = mode;
*_prev_offset = prev_offset;
return true;
}
return false;
}
/*******************************************************************
Check to see if a user can read an fsp . This is only approximate,
it is used as part of the "hide unreadable" option. Don't
use it for anything security sensitive.
********************************************************************/
static bool user_can_read_fsp(struct files_struct *fsp)
{
NTSTATUS status;
uint32_t rejected_share_access = 0;
uint32_t rejected_mask = 0;
struct security_descriptor *sd = NULL;
uint32_t access_mask = FILE_READ_DATA|
FILE_READ_EA|
FILE_READ_ATTRIBUTES|
SEC_STD_READ_CONTROL;
/*
* Never hide files from the root user.
* We use (uid_t)0 here not sec_initial_uid()
* as make test uses a single user context.
*/
if (get_current_uid(fsp->conn) == (uid_t)0) {
return true;
}
/*
* We can't directly use smbd_check_access_rights_fsp()
* here, as this implicitly grants FILE_READ_ATTRIBUTES
* which the Windows access-based-enumeration code
* explicitly checks for on the file security descriptor.
* See bug:
*
* https://bugzilla.samba.org/show_bug.cgi?id=10252
*
* and the smb2.acl2.ACCESSBASED test for details.
*/
rejected_share_access = access_mask & ~(fsp->conn->share_access);
if (rejected_share_access) {
DBG_DEBUG("rejected share access 0x%x "
"on %s (0x%x)\n",
(unsigned int)access_mask,
fsp_str_dbg(fsp),
(unsigned int)rejected_share_access);
return false;
}
status = SMB_VFS_FGET_NT_ACL(metadata_fsp(fsp),
(SECINFO_OWNER |
SECINFO_GROUP |
SECINFO_DACL),
talloc_tos(),
&sd);
if (!NT_STATUS_IS_OK(status)) {
DBG_DEBUG("Could not get acl "
"on %s: %s\n",
fsp_str_dbg(fsp),
nt_errstr(status));
return false;
}
status = se_file_access_check(sd,
get_current_nttok(fsp->conn),
false,
access_mask,
&rejected_mask);
TALLOC_FREE(sd);
if (NT_STATUS_EQUAL(status, NT_STATUS_ACCESS_DENIED)) {
DBG_DEBUG("rejected bits 0x%x read access for %s\n",
(unsigned int)rejected_mask,
fsp_str_dbg(fsp));
return false;
}
return true;
}
/*******************************************************************
Check to see if a user can write to an fsp.
Always return true for directories.
This is only approximate,
it is used as part of the "hide unwriteable" option. Don't
use it for anything security sensitive.
********************************************************************/
static bool user_can_write_fsp(struct files_struct *fsp)
{
/*
* Never hide files from the root user.
* We use (uid_t)0 here not sec_initial_uid()
* as make test uses a single user context.
*/
if (get_current_uid(fsp->conn) == (uid_t)0) {
return true;
}
if (fsp->fsp_flags.is_directory) {
return true;
}
return can_write_to_fsp(fsp);
}
/*******************************************************************
Is a file a "special" type ?
********************************************************************/
static bool file_is_special(connection_struct *conn,
const struct smb_filename *smb_fname)
{
/*
* Never hide files from the root user.
* We use (uid_t)0 here not sec_initial_uid()
* as make test uses a single user context.
*/
if (get_current_uid(conn) == (uid_t)0) {
return False;
}
SMB_ASSERT(VALID_STAT(smb_fname->st));
if (S_ISREG(smb_fname->st.st_ex_mode) ||
S_ISDIR(smb_fname->st.st_ex_mode) ||
S_ISLNK(smb_fname->st.st_ex_mode))
return False;
return True;
}
/*******************************************************************
Should the file be seen by the client?
********************************************************************/
bool is_visible_fsp(struct files_struct *fsp)
{
bool hide_unreadable = false;
bool hide_unwriteable = false;
bool hide_special = false;
int hide_new_files_timeout = 0;
const char *last_component = NULL;
/*
* If the file does not exist, there's no point checking
* the configuration options. We succeed, on the basis that the
* checks *might* have passed if the file was present.
*/
if (fsp == NULL) {
return true;
}
hide_unreadable = lp_hide_unreadable(SNUM(fsp->conn));
hide_unwriteable = lp_hide_unwriteable_files(SNUM(fsp->conn));
hide_special = lp_hide_special_files(SNUM(fsp->conn));
hide_new_files_timeout = lp_hide_new_files_timeout(SNUM(fsp->conn));
if (!hide_unreadable &&
!hide_unwriteable &&
!hide_special &&
(hide_new_files_timeout == 0))
{
return true;
}
fsp = metadata_fsp(fsp);
/* Get the last component of the base name. */
last_component = strrchr_m(fsp->fsp_name->base_name, '/');
if (!last_component) {
last_component = fsp->fsp_name->base_name;
} else {
last_component++; /* Go past '/' */
}
if (ISDOT(last_component) || ISDOTDOT(last_component)) {
return true; /* . and .. are always visible. */
}
if (fsp_get_pathref_fd(fsp) == -1) {
/*
* Symlink in POSIX mode or MS-DFS.
* We've checked veto files so the
* only thing we can check is the
* hide_new_files_timeout.
*/
if ((hide_new_files_timeout != 0) &&
!S_ISDIR(fsp->fsp_name->st.st_ex_mode)) {
double age = timespec_elapsed(
&fsp->fsp_name->st.st_ex_mtime);
if (age < (double)hide_new_files_timeout) {
return false;
}
}
return true;
}
/* Honour _hide unreadable_ option */
if (hide_unreadable && !user_can_read_fsp(fsp)) {
DBG_DEBUG("file %s is unreadable.\n", fsp_str_dbg(fsp));
return false;
}
/* Honour _hide unwriteable_ option */
if (hide_unwriteable && !user_can_write_fsp(fsp)) {
DBG_DEBUG("file %s is unwritable.\n", fsp_str_dbg(fsp));
return false;
}
/* Honour _hide_special_ option */
if (hide_special && file_is_special(fsp->conn, fsp->fsp_name)) {
DBG_DEBUG("file %s is special.\n", fsp_str_dbg(fsp));
return false;
}
if ((hide_new_files_timeout != 0) &&
!S_ISDIR(fsp->fsp_name->st.st_ex_mode)) {
double age = timespec_elapsed(&fsp->fsp_name->st.st_ex_mtime);
if (age < (double)hide_new_files_timeout) {
return false;
}
}
return true;
}
static int smb_Dir_destructor(struct smb_Dir *dir_hnd)
{
files_struct *fsp = dir_hnd->fsp;
SMB_VFS_CLOSEDIR(dir_hnd->conn, dir_hnd->dir);
fsp_set_fd(fsp, -1);
if (fsp->dptr != NULL) {
SMB_ASSERT(fsp->dptr->dir_hnd == dir_hnd);
fsp->dptr->dir_hnd = NULL;
}
dir_hnd->fsp = NULL;
return 0;
}
/*******************************************************************
Open a directory.
********************************************************************/
static int smb_Dir_OpenDir_destructor(struct smb_Dir *dir_hnd)
{
files_struct *fsp = dir_hnd->fsp;
smb_Dir_destructor(dir_hnd);
file_free(NULL, fsp);
return 0;
}
NTSTATUS OpenDir(TALLOC_CTX *mem_ctx,
connection_struct *conn,
const struct smb_filename *smb_dname,
const char *mask,
uint32_t attr,
struct smb_Dir **_dir_hnd)
{
struct files_struct *fsp = NULL;
struct smb_Dir *dir_hnd = NULL;
NTSTATUS status;
status = open_internal_dirfsp(conn,
smb_dname,
O_RDONLY,
&fsp);
if (!NT_STATUS_IS_OK(status)) {
return status;
}
status = OpenDir_fsp(mem_ctx, conn, fsp, mask, attr, &dir_hnd);
if (!NT_STATUS_IS_OK(status)) {
return status;
}
/*
* This overwrites the destructor set by OpenDir_fsp() but
* smb_Dir_OpenDir_destructor() calls the OpenDir_fsp()
* destructor.
*/
talloc_set_destructor(dir_hnd, smb_Dir_OpenDir_destructor);
*_dir_hnd = dir_hnd;
return NT_STATUS_OK;
}
NTSTATUS OpenDir_from_pathref(TALLOC_CTX *mem_ctx,
struct files_struct *dirfsp,
const char *mask,
uint32_t attr,
struct smb_Dir **_dir_hnd)
{
struct files_struct *fsp = NULL;
struct smb_Dir *dir_hnd = NULL;
NTSTATUS status;
status = openat_internal_dir_from_pathref(dirfsp, O_RDONLY, &fsp);
if (!NT_STATUS_IS_OK(status)) {
return status;
}
status = OpenDir_fsp(mem_ctx, fsp->conn, fsp, mask, attr, &dir_hnd);
if (!NT_STATUS_IS_OK(status)) {
return status;
}
/*
* This overwrites the destructor set by OpenDir_fsp() but
* smb_Dir_OpenDir_destructor() calls the OpenDir_fsp()
* destructor.
*/
talloc_set_destructor(dir_hnd, smb_Dir_OpenDir_destructor);
*_dir_hnd = dir_hnd;
return NT_STATUS_OK;
}
/*******************************************************************
Open a directory from an fsp.
********************************************************************/
static NTSTATUS OpenDir_fsp(
TALLOC_CTX *mem_ctx,
connection_struct *conn,
files_struct *fsp,
const char *mask,
uint32_t attr,
struct smb_Dir **_dir_hnd)
{
struct smb_Dir *dir_hnd = talloc_zero(mem_ctx, struct smb_Dir);
NTSTATUS status;
if (!dir_hnd) {
return NT_STATUS_NO_MEMORY;
}
if (!fsp->fsp_flags.is_directory) {
status = NT_STATUS_INVALID_HANDLE;
goto fail;
}
if (fsp_get_io_fd(fsp) == -1) {
status = NT_STATUS_INVALID_HANDLE;
goto fail;
}
dir_hnd->conn = conn;
if (!conn->sconn->using_smb2) {
/*
* The dircache is only needed for SMB1 because SMB1 uses a name
* for the resume wheras SMB2 always continues from the next
* position (unless it's told to restart or close-and-reopen the
* listing).
*/
dir_hnd->name_cache_size =
lp_directory_name_cache_size(SNUM(conn));
}
dir_hnd->dir_smb_fname = cp_smb_filename(dir_hnd, fsp->fsp_name);
if (!dir_hnd->dir_smb_fname) {
status = NT_STATUS_NO_MEMORY;
goto fail;
}
dir_hnd->dir = SMB_VFS_FDOPENDIR(fsp, mask, attr);
if (dir_hnd->dir == NULL) {
status = map_nt_error_from_unix(errno);
goto fail;
}
dir_hnd->fsp = fsp;
if (fsp->posix_flags & FSP_POSIX_FLAGS_OPEN) {
dir_hnd->case_sensitive = true;
} else {
dir_hnd->case_sensitive = conn->case_sensitive;
}
talloc_set_destructor(dir_hnd, smb_Dir_destructor);
*_dir_hnd = dir_hnd;
return NT_STATUS_OK;
fail:
TALLOC_FREE(dir_hnd);
return status;
}
/*******************************************************************
Read from a directory.
Return directory entry, current offset, and optional stat information.
Don't check for veto or invisible files.
********************************************************************/
const char *ReadDirName(struct smb_Dir *dir_hnd, long *poffset,
SMB_STRUCT_STAT *sbuf, char **ptalloced)
{
const char *n;
char *talloced = NULL;
connection_struct *conn = dir_hnd->conn;
/* Cheat to allow . and .. to be the first entries returned. */
if (((*poffset == START_OF_DIRECTORY_OFFSET) ||
(*poffset == DOT_DOT_DIRECTORY_OFFSET)) &&
(dir_hnd->file_number < 2))
{
if (dir_hnd->file_number == 0) {
n = ".";
*poffset = dir_hnd->offset = START_OF_DIRECTORY_OFFSET;
} else {
n = "..";
*poffset = dir_hnd->offset = DOT_DOT_DIRECTORY_OFFSET;
}
dir_hnd->file_number++;
*ptalloced = NULL;
return n;
}
if (*poffset == END_OF_DIRECTORY_OFFSET) {
*poffset = dir_hnd->offset = END_OF_DIRECTORY_OFFSET;
return NULL;
}
/* A real offset, seek to it. */
SeekDir(dir_hnd, *poffset);
while ((n = vfs_readdirname(conn, dir_hnd->fsp, dir_hnd->dir, sbuf, &talloced))) {
/* Ignore . and .. - we've already returned them. */
if (ISDOT(n) || ISDOTDOT(n)) {
TALLOC_FREE(talloced);
continue;
}
*poffset = dir_hnd->offset = SMB_VFS_TELLDIR(conn, dir_hnd->dir);
*ptalloced = talloced;
dir_hnd->file_number++;
return n;
}
*poffset = dir_hnd->offset = END_OF_DIRECTORY_OFFSET;
*ptalloced = NULL;
return NULL;
}
/*******************************************************************
Rewind to the start.
********************************************************************/
void RewindDir(struct smb_Dir *dir_hnd, long *poffset)
{
SMB_VFS_REWINDDIR(dir_hnd->conn, dir_hnd->dir);
dir_hnd->file_number = 0;
dir_hnd->offset = START_OF_DIRECTORY_OFFSET;
*poffset = START_OF_DIRECTORY_OFFSET;
}
/*******************************************************************
Seek a dir.
********************************************************************/
static void SeekDir(struct smb_Dir *dirp, long offset)
{
if (offset == dirp->offset) {
/*
* Nothing to do
*/
return;
}
if (offset == START_OF_DIRECTORY_OFFSET) {
RewindDir(dirp, &offset);
/*
* Ok we should really set the file number here
* to 1 to enable ".." to be returned next. Trouble
* is I'm worried about callers using SeekDir(dirp,0)
* as equivalent to RewindDir(). So leave this alone
* for now.
*/
} else if (offset == DOT_DOT_DIRECTORY_OFFSET) {
RewindDir(dirp, &offset);
/*
* Set the file number to 2 - we want to get the first
* real file entry (the one we return after "..")
* on the next ReadDir.
*/
dirp->file_number = 2;
} else if (offset == END_OF_DIRECTORY_OFFSET) {
; /* Don't seek in this case. */
} else {
SMB_VFS_SEEKDIR(dirp->conn, dirp->dir, offset);
}
dirp->offset = offset;
}
/*******************************************************************
Tell a dir position.
********************************************************************/
static long TellDir(struct smb_Dir *dir_hnd)
{
return(dir_hnd->offset);
}
/*******************************************************************
Add an entry into the dcache.
********************************************************************/
static void DirCacheAdd(struct smb_Dir *dir_hnd, const char *name, long offset)
{
struct name_cache_entry *e;
if (dir_hnd->name_cache_size == 0) {
return;
}
if (dir_hnd->name_cache == NULL) {
dir_hnd->name_cache = talloc_zero_array(dir_hnd,
struct name_cache_entry,
dir_hnd->name_cache_size);
if (dir_hnd->name_cache == NULL) {
return;
}
}
dir_hnd->name_cache_index = (dir_hnd->name_cache_index+1) %
dir_hnd->name_cache_size;
e = &dir_hnd->name_cache[dir_hnd->name_cache_index];
TALLOC_FREE(e->name);
e->name = talloc_strdup(dir_hnd, name);
e->offset = offset;
}
/*******************************************************************
Find an entry by name. Leave us at the offset after it.
Don't check for veto or invisible files.
********************************************************************/
static bool SearchDir(struct smb_Dir *dir_hnd, const char *name)
{
int i;
const char *entry = NULL;
char *talloced = NULL;
connection_struct *conn = dir_hnd->conn;
long offset = 0;
/* Search back in the name cache. */
if (dir_hnd->name_cache_size && dir_hnd->name_cache) {
for (i = dir_hnd->name_cache_index; i >= 0; i--) {
struct name_cache_entry *e = &dir_hnd->name_cache[i];
if (e->name && (dir_hnd->case_sensitive ? (strcmp(e->name, name) == 0) : strequal(e->name, name))) {
SeekDir(dir_hnd, e->offset);
return True;
}
}
for (i = dir_hnd->name_cache_size - 1;
i > dir_hnd->name_cache_index; i--) {
struct name_cache_entry *e = &dir_hnd->name_cache[i];
if (e->name && (dir_hnd->case_sensitive ? (strcmp(e->name, name) == 0) : strequal(e->name, name))) {
SeekDir(dir_hnd, e->offset);
return True;
}
}
}
/* Not found in the name cache. Rewind directory and start from scratch. */
SMB_VFS_REWINDDIR(conn, dir_hnd->dir);
dir_hnd->file_number = 0;
while ((entry = ReadDirName(dir_hnd, &offset, NULL, &talloced))) {
if (dir_hnd->case_sensitive ? (strcmp(entry, name) == 0) : strequal(entry, name)) {
TALLOC_FREE(talloced);
return True;
}
TALLOC_FREE(talloced);
}
return False;
}
struct files_below_forall_state {
char *dirpath;
ssize_t dirpath_len;
int (*fn)(struct file_id fid, const struct share_mode_data *data,
void *private_data);
void *private_data;
};
static int files_below_forall_fn(struct file_id fid,
const struct share_mode_data *data,
void *private_data)
{
struct files_below_forall_state *state = private_data;
char tmpbuf[PATH_MAX];
char *fullpath, *to_free;
ssize_t len;
len = full_path_tos(data->servicepath, data->base_name,
tmpbuf, sizeof(tmpbuf),
&fullpath, &to_free);
if (len == -1) {
return 0;
}
if (state->dirpath_len >= len) {
/*
* Filter files above dirpath
*/
goto out;
}
if (fullpath[state->dirpath_len] != '/') {
/*
* Filter file that don't have a path separator at the end of
* dirpath's length
*/
goto out;
}
if (memcmp(state->dirpath, fullpath, state->dirpath_len) != 0) {
/*
* Not a parent
*/
goto out;
}
TALLOC_FREE(to_free);
return state->fn(fid, data, state->private_data);
out:
TALLOC_FREE(to_free);
return 0;
}
static int files_below_forall(connection_struct *conn,
const struct smb_filename *dir_name,
int (*fn)(struct file_id fid,
const struct share_mode_data *data,
void *private_data),
void *private_data)
{
struct files_below_forall_state state = {
.fn = fn,
.private_data = private_data,
};
int ret;
char tmpbuf[PATH_MAX];
char *to_free;
state.dirpath_len = full_path_tos(conn->connectpath,
dir_name->base_name,
tmpbuf, sizeof(tmpbuf),
&state.dirpath, &to_free);
if (state.dirpath_len == -1) {
return -1;
}
ret = share_mode_forall(files_below_forall_fn, &state);
TALLOC_FREE(to_free);
return ret;
}
struct have_file_open_below_state {
bool found_one;
};
static int have_file_open_below_fn(struct file_id fid,
const struct share_mode_data *data,
void *private_data)
{
struct have_file_open_below_state *state = private_data;
state->found_one = true;
return 1;
}
bool have_file_open_below(connection_struct *conn,
const struct smb_filename *name)
{
struct have_file_open_below_state state = {
.found_one = false,
};
int ret;
if (!VALID_STAT(name->st)) {
return false;
}
if (!S_ISDIR(name->st.st_ex_mode)) {
return false;
}
ret = files_below_forall(conn, name, have_file_open_below_fn, &state);
if (ret == -1) {
return false;
}
return state.found_one;
}
/*****************************************************************
Is this directory empty ?
*****************************************************************/
NTSTATUS can_delete_directory_fsp(files_struct *fsp)
{
NTSTATUS status = NT_STATUS_OK;
long dirpos = 0;
const char *dname = NULL;
char *talloced = NULL;
struct connection_struct *conn = fsp->conn;
struct smb_Dir *dir_hnd = NULL;
status = OpenDir(
talloc_tos(), conn, fsp->fsp_name, NULL, 0, &dir_hnd);
if (!NT_STATUS_IS_OK(status)) {
return status;
}
while ((dname = ReadDirName(dir_hnd, &dirpos, NULL, &talloced))) {
struct smb_filename *smb_dname_full = NULL;
struct smb_filename *direntry_fname = NULL;
char *fullname = NULL;
int ret;
if (ISDOT(dname) || (ISDOTDOT(dname))) {
TALLOC_FREE(talloced);
continue;
}
if (IS_VETO_PATH(conn, dname)) {
TALLOC_FREE(talloced);
continue;
}
fullname = talloc_asprintf(talloc_tos(),
"%s/%s",
fsp->fsp_name->base_name,
dname);
if (fullname == NULL) {
status = NT_STATUS_NO_MEMORY;
break;
}
smb_dname_full = synthetic_smb_fname(talloc_tos(),
fullname,
NULL,
NULL,
fsp->fsp_name->twrp,
fsp->fsp_name->flags);
if (smb_dname_full == NULL) {
TALLOC_FREE(talloced);
TALLOC_FREE(fullname);
status = NT_STATUS_NO_MEMORY;
break;
}
ret = SMB_VFS_LSTAT(conn, smb_dname_full);
if (ret != 0) {
status = map_nt_error_from_unix(errno);
TALLOC_FREE(talloced);
TALLOC_FREE(fullname);
TALLOC_FREE(smb_dname_full);
break;
}
if (S_ISLNK(smb_dname_full->st.st_ex_mode)) {
/* Could it be an msdfs link ? */
if (lp_host_msdfs() &&
lp_msdfs_root(SNUM(conn))) {
struct smb_filename *smb_dname;
smb_dname = synthetic_smb_fname(talloc_tos(),
dname,
NULL,
&smb_dname_full->st,
fsp->fsp_name->twrp,
fsp->fsp_name->flags);
if (smb_dname == NULL) {
TALLOC_FREE(talloced);
TALLOC_FREE(fullname);
TALLOC_FREE(smb_dname_full);
status = NT_STATUS_NO_MEMORY;
break;
}
if (is_msdfs_link(fsp, smb_dname)) {
TALLOC_FREE(talloced);
TALLOC_FREE(fullname);
TALLOC_FREE(smb_dname_full);
TALLOC_FREE(smb_dname);
DBG_DEBUG("got msdfs link name %s "
"- can't delete directory %s\n",
dname,
fsp_str_dbg(fsp));
status = NT_STATUS_DIRECTORY_NOT_EMPTY;
break;
}
TALLOC_FREE(smb_dname);
}
/* Not a DFS link - could it be a dangling symlink ? */
ret = SMB_VFS_STAT(conn, smb_dname_full);
if (ret == -1 && (errno == ENOENT || errno == ELOOP)) {
/*
* Dangling symlink.
* Allow if "delete veto files = yes"
*/
if (lp_delete_veto_files(SNUM(conn))) {
TALLOC_FREE(talloced);
TALLOC_FREE(fullname);
TALLOC_FREE(smb_dname_full);
continue;
}
}
DBG_DEBUG("got symlink name %s - "
"can't delete directory %s\n",
dname,
fsp_str_dbg(fsp));
TALLOC_FREE(talloced);
TALLOC_FREE(fullname);
TALLOC_FREE(smb_dname_full);
status = NT_STATUS_DIRECTORY_NOT_EMPTY;
break;
}
/* Not a symlink, get a pathref. */
status = synthetic_pathref(talloc_tos(),
fsp,
dname,
NULL,
&smb_dname_full->st,
fsp->fsp_name->twrp,
fsp->fsp_name->flags,
&direntry_fname);
if (!NT_STATUS_IS_OK(status)) {
status = map_nt_error_from_unix(errno);
TALLOC_FREE(talloced);
TALLOC_FREE(fullname);
TALLOC_FREE(smb_dname_full);
break;
}
if (!is_visible_fsp(direntry_fname->fsp)) {
/*
* Hidden file.
* Allow if "delete veto files = yes"
*/
if (lp_delete_veto_files(SNUM(conn))) {
TALLOC_FREE(talloced);
TALLOC_FREE(fullname);
TALLOC_FREE(smb_dname_full);
TALLOC_FREE(direntry_fname);
continue;
}
}
TALLOC_FREE(talloced);
TALLOC_FREE(fullname);
TALLOC_FREE(smb_dname_full);
TALLOC_FREE(direntry_fname);
DBG_DEBUG("got name %s - can't delete\n", dname);
status = NT_STATUS_DIRECTORY_NOT_EMPTY;
break;
}
TALLOC_FREE(talloced);
TALLOC_FREE(dir_hnd);
if (!NT_STATUS_IS_OK(status)) {
return status;
}
if (!(fsp->posix_flags & FSP_POSIX_FLAGS_RENAME) &&
lp_strict_rename(SNUM(conn)) &&
have_file_open_below(fsp->conn, fsp->fsp_name))
{
return NT_STATUS_ACCESS_DENIED;
}
return NT_STATUS_OK;
}