2009-07-02 13:56:23 +04:00
/*
Unix SMB / CIFS implementation .
Core SMB2 server
Copyright ( C ) Stefan Metzmacher 2009
2010-04-29 01:56:12 +04:00
Copyright ( C ) Jeremy Allison 2010
2009-07-02 13:56:23 +04:00
This program is free software ; you can redistribute it and / or modify
it under the terms of the GNU General Public License as published by
the Free Software Foundation ; either version 3 of the License , or
( at your option ) any later version .
This program is distributed in the hope that it will be useful ,
but WITHOUT ANY WARRANTY ; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE . See the
GNU General Public License for more details .
You should have received a copy of the GNU General Public License
along with this program . If not , see < http : //www.gnu.org/licenses/>.
*/
# include "includes.h"
2011-03-22 18:57:01 +03:00
# include "smbd/smbd.h"
2009-07-02 13:56:23 +04:00
# include "smbd/globals.h"
2009-08-12 19:52:55 +04:00
# include "../libcli/smb/smb_common.h"
2011-04-28 19:38:09 +04:00
# include "../lib/util/tevent_ntstatus.h"
2014-10-29 01:31:46 +03:00
# include "locking/leases_db.h"
2018-03-21 22:01:05 +03:00
# undef DBGC_CLASS
# define DBGC_CLASS DBGC_SMB2
2014-10-29 01:31:46 +03:00
static NTSTATUS smbd_smb2_request_process_lease_break (
struct smbd_smb2_request * req ) ;
2009-07-02 13:56:23 +04:00
static struct tevent_req * smbd_smb2_oplock_break_send ( TALLOC_CTX * mem_ctx ,
struct tevent_context * ev ,
struct smbd_smb2_request * smb2req ,
2012-06-08 12:36:24 +04:00
struct files_struct * in_fsp ,
uint8_t in_oplock_level ) ;
2009-07-02 13:56:23 +04:00
static NTSTATUS smbd_smb2_oplock_break_recv ( struct tevent_req * req ,
uint8_t * out_oplock_level ) ;
static void smbd_smb2_request_oplock_break_done ( struct tevent_req * subreq ) ;
NTSTATUS smbd_smb2_request_process_break ( struct smbd_smb2_request * req )
{
2011-09-06 16:01:43 +04:00
NTSTATUS status ;
2009-07-02 13:56:23 +04:00
const uint8_t * inbody ;
uint8_t in_oplock_level ;
uint64_t in_file_id_persistent ;
uint64_t in_file_id_volatile ;
2012-06-08 12:36:24 +04:00
struct files_struct * in_fsp ;
2009-07-02 13:56:23 +04:00
struct tevent_req * subreq ;
2011-09-06 16:01:43 +04:00
status = smbd_smb2_request_verify_sizes ( req , 0x18 ) ;
2014-10-29 01:31:46 +03:00
if ( NT_STATUS_EQUAL ( status , NT_STATUS_INVALID_PARAMETER ) ) {
/*
* Retry as a lease break
*/
return smbd_smb2_request_process_lease_break ( req ) ;
}
2011-09-06 16:01:43 +04:00
if ( ! NT_STATUS_IS_OK ( status ) ) {
return smbd_smb2_request_error ( req , status ) ;
2009-07-02 13:56:23 +04:00
}
2012-08-05 16:55:29 +04:00
inbody = SMBD_SMB2_IN_BODY_PTR ( req ) ;
2009-07-02 13:56:23 +04:00
in_oplock_level = CVAL ( inbody , 0x02 ) ;
2010-04-24 11:29:41 +04:00
2009-07-02 13:56:23 +04:00
/* 0x03 1 bytes reserved */
/* 0x04 4 bytes reserved */
in_file_id_persistent = BVAL ( inbody , 0x08 ) ;
in_file_id_volatile = BVAL ( inbody , 0x10 ) ;
2012-06-08 12:36:24 +04:00
in_fsp = file_fsp_smb2 ( req , in_file_id_persistent , in_file_id_volatile ) ;
if ( in_fsp = = NULL ) {
2009-07-02 13:56:23 +04:00
return smbd_smb2_request_error ( req , NT_STATUS_FILE_CLOSED ) ;
}
2014-09-23 20:49:46 +04:00
/* Are we awaiting a break message ? */
if ( in_fsp - > oplock_timeout = = NULL ) {
return smbd_smb2_request_error (
req , NT_STATUS_INVALID_OPLOCK_PROTOCOL ) ;
}
if ( in_oplock_level ! = SMB2_OPLOCK_LEVEL_NONE & &
in_oplock_level ! = SMB2_OPLOCK_LEVEL_II ) {
return smbd_smb2_request_error ( req , NT_STATUS_INVALID_PARAMETER ) ;
}
2018-12-27 17:18:55 +03:00
subreq = smbd_smb2_oplock_break_send ( req , req - > sconn - > ev_ctx ,
2012-06-08 12:36:24 +04:00
req , in_fsp , in_oplock_level ) ;
2009-07-02 13:56:23 +04:00
if ( subreq = = NULL ) {
return smbd_smb2_request_error ( req , NT_STATUS_NO_MEMORY ) ;
}
tevent_req_set_callback ( subreq , smbd_smb2_request_oplock_break_done , req ) ;
2011-11-14 18:42:55 +04:00
return smbd_smb2_request_pending_queue ( req , subreq , 500 ) ;
2009-07-02 13:56:23 +04:00
}
static void smbd_smb2_request_oplock_break_done ( struct tevent_req * subreq )
{
struct smbd_smb2_request * req = tevent_req_callback_data ( subreq ,
struct smbd_smb2_request ) ;
const uint8_t * inbody ;
uint64_t in_file_id_persistent ;
uint64_t in_file_id_volatile ;
2009-07-24 18:21:07 +04:00
uint8_t out_oplock_level = 0 ;
2009-07-02 13:56:23 +04:00
DATA_BLOB outbody ;
NTSTATUS status ;
NTSTATUS error ; /* transport error */
status = smbd_smb2_oplock_break_recv ( subreq , & out_oplock_level ) ;
TALLOC_FREE ( subreq ) ;
if ( ! NT_STATUS_IS_OK ( status ) ) {
error = smbd_smb2_request_error ( req , status ) ;
if ( ! NT_STATUS_IS_OK ( error ) ) {
2014-06-11 14:15:48 +04:00
smbd_server_connection_terminate ( req - > xconn ,
2009-07-02 13:56:23 +04:00
nt_errstr ( error ) ) ;
return ;
}
return ;
}
2012-08-05 16:55:29 +04:00
inbody = SMBD_SMB2_IN_BODY_PTR ( req ) ;
2009-07-02 13:56:23 +04:00
in_file_id_persistent = BVAL ( inbody , 0x08 ) ;
in_file_id_volatile = BVAL ( inbody , 0x10 ) ;
2013-12-04 17:59:07 +04:00
outbody = smbd_smb2_generate_outbody ( req , 0x18 ) ;
2009-07-02 13:56:23 +04:00
if ( outbody . data = = NULL ) {
error = smbd_smb2_request_error ( req , NT_STATUS_NO_MEMORY ) ;
if ( ! NT_STATUS_IS_OK ( error ) ) {
2014-06-11 14:15:48 +04:00
smbd_server_connection_terminate ( req - > xconn ,
2009-07-02 13:56:23 +04:00
nt_errstr ( error ) ) ;
return ;
}
return ;
}
SSVAL ( outbody . data , 0x00 , 0x18 ) ; /* struct size */
SCVAL ( outbody . data , 0x02 ,
2010-04-24 11:29:41 +04:00
out_oplock_level ) ; /* SMB2 oplock level */
2009-07-02 13:56:23 +04:00
SCVAL ( outbody . data , 0x03 , 0 ) ; /* reserved */
SIVAL ( outbody . data , 0x04 , 0 ) ; /* reserved */
SBVAL ( outbody . data , 0x08 ,
in_file_id_persistent ) ; /* file id (persistent) */
SBVAL ( outbody . data , 0x10 ,
in_file_id_volatile ) ; /* file id (volatile) */
error = smbd_smb2_request_done ( req , outbody , NULL ) ;
if ( ! NT_STATUS_IS_OK ( error ) ) {
2014-06-11 14:15:48 +04:00
smbd_server_connection_terminate ( req - > xconn ,
2009-07-02 13:56:23 +04:00
nt_errstr ( error ) ) ;
return ;
}
}
struct smbd_smb2_oplock_break_state {
struct smbd_smb2_request * smb2req ;
2010-04-24 11:29:41 +04:00
uint8_t out_oplock_level ; /* SMB2 oplock level. */
2009-07-02 13:56:23 +04:00
} ;
static struct tevent_req * smbd_smb2_oplock_break_send ( TALLOC_CTX * mem_ctx ,
struct tevent_context * ev ,
struct smbd_smb2_request * smb2req ,
2012-06-08 12:36:24 +04:00
struct files_struct * fsp ,
uint8_t in_oplock_level )
2009-07-02 13:56:23 +04:00
{
struct tevent_req * req ;
struct smbd_smb2_oplock_break_state * state ;
struct smb_request * smbreq ;
2010-04-24 11:29:41 +04:00
int oplocklevel = map_smb2_oplock_levels_to_samba ( in_oplock_level ) ;
bool break_to_none = ( oplocklevel = = NO_OPLOCK ) ;
bool result ;
2009-07-02 13:56:23 +04:00
req = tevent_req_create ( mem_ctx , & state ,
struct smbd_smb2_oplock_break_state ) ;
if ( req = = NULL ) {
return NULL ;
}
state - > smb2req = smb2req ;
state - > out_oplock_level = SMB2_OPLOCK_LEVEL_NONE ;
2012-06-14 15:11:58 +04:00
DEBUG ( 10 , ( " smbd_smb2_oplock_break_send: %s - %s, "
2012-06-08 12:36:24 +04:00
" samba level %d \n " ,
2012-06-14 15:11:58 +04:00
fsp_str_dbg ( fsp ) , fsp_fnum_dbg ( fsp ) ,
2012-06-08 12:36:24 +04:00
oplocklevel ) ) ;
2009-07-02 13:56:23 +04:00
smbreq = smbd_smb2_fake_smb_request ( smb2req ) ;
if ( tevent_req_nomem ( smbreq , req ) ) {
return tevent_req_post ( req , ev ) ;
}
2010-04-24 11:29:41 +04:00
DEBUG ( 5 , ( " smbd_smb2_oplock_break_send: got SMB2 oplock break (%u) from client "
2012-06-14 15:11:58 +04:00
" for file %s, %s \n " ,
2010-04-24 11:29:41 +04:00
( unsigned int ) in_oplock_level ,
fsp_str_dbg ( fsp ) ,
2012-06-14 15:11:58 +04:00
fsp_fnum_dbg ( fsp ) ) ) ;
2010-04-24 11:29:41 +04:00
if ( ( fsp - > sent_oplock_break = = BREAK_TO_NONE_SENT ) | |
( break_to_none ) ) {
result = remove_oplock ( fsp ) ;
state - > out_oplock_level = SMB2_OPLOCK_LEVEL_NONE ;
} else {
result = downgrade_oplock ( fsp ) ;
state - > out_oplock_level = SMB2_OPLOCK_LEVEL_II ;
}
if ( ! result ) {
DEBUG ( 0 , ( " smbd_smb2_oplock_break_send: error in removing "
" oplock on file %s \n " , fsp_str_dbg ( fsp ) ) ) ;
/* Hmmm. Is this panic justified? */
smb_panic ( " internal tdb error " ) ;
}
tevent_req_done ( req ) ;
2009-07-02 13:56:23 +04:00
return tevent_req_post ( req , ev ) ;
}
static NTSTATUS smbd_smb2_oplock_break_recv ( struct tevent_req * req ,
uint8_t * out_oplock_level )
{
NTSTATUS status ;
struct smbd_smb2_oplock_break_state * state =
tevent_req_data ( req ,
struct smbd_smb2_oplock_break_state ) ;
if ( tevent_req_is_nterror ( req , & status ) ) {
tevent_req_received ( req ) ;
return status ;
}
* out_oplock_level = state - > out_oplock_level ;
tevent_req_received ( req ) ;
return NT_STATUS_OK ;
}
2010-04-08 06:00:44 +04:00
2014-10-29 01:31:46 +03:00
static void smbd_smb2_request_lease_break_done ( struct tevent_req * subreq ) ;
static struct tevent_req * smbd_smb2_lease_break_send (
TALLOC_CTX * mem_ctx , struct tevent_context * ev ,
struct smbd_smb2_request * smb2_req , struct smb2_lease_key in_lease_key ,
uint32_t in_lease_state ) ;
static NTSTATUS smbd_smb2_lease_break_recv ( struct tevent_req * req ,
uint32_t * out_lease_state ) ;
static NTSTATUS smbd_smb2_request_process_lease_break (
struct smbd_smb2_request * req )
{
NTSTATUS status ;
const uint8_t * inbody ;
struct smb2_lease_key in_lease_key ;
uint32_t in_lease_state ;
struct tevent_req * subreq ;
status = smbd_smb2_request_verify_sizes ( req , 0x24 ) ;
if ( ! NT_STATUS_IS_OK ( status ) ) {
return smbd_smb2_request_error ( req , status ) ;
}
inbody = SMBD_SMB2_IN_BODY_PTR ( req ) ;
in_lease_key . data [ 0 ] = BVAL ( inbody , 8 ) ;
in_lease_key . data [ 1 ] = BVAL ( inbody , 16 ) ;
in_lease_state = IVAL ( inbody , 24 ) ;
2018-12-27 17:18:55 +03:00
subreq = smbd_smb2_lease_break_send ( req , req - > sconn - > ev_ctx , req ,
2014-10-29 01:31:46 +03:00
in_lease_key , in_lease_state ) ;
if ( subreq = = NULL ) {
return smbd_smb2_request_error ( req , NT_STATUS_NO_MEMORY ) ;
}
tevent_req_set_callback ( subreq , smbd_smb2_request_lease_break_done , req ) ;
return smbd_smb2_request_pending_queue ( req , subreq , 500 ) ;
}
static void smbd_smb2_request_lease_break_done ( struct tevent_req * subreq )
{
struct smbd_smb2_request * req = tevent_req_callback_data (
subreq , struct smbd_smb2_request ) ;
const uint8_t * inbody ;
struct smb2_lease_key in_lease_key ;
uint32_t out_lease_state = 0 ;
DATA_BLOB outbody ;
NTSTATUS status ;
NTSTATUS error ; /* transport error */
status = smbd_smb2_lease_break_recv ( subreq , & out_lease_state ) ;
TALLOC_FREE ( subreq ) ;
if ( ! NT_STATUS_IS_OK ( status ) ) {
error = smbd_smb2_request_error ( req , status ) ;
if ( ! NT_STATUS_IS_OK ( error ) ) {
smbd_server_connection_terminate ( req - > xconn ,
nt_errstr ( error ) ) ;
return ;
}
return ;
}
inbody = SMBD_SMB2_IN_BODY_PTR ( req ) ;
in_lease_key . data [ 0 ] = BVAL ( inbody , 8 ) ;
in_lease_key . data [ 1 ] = BVAL ( inbody , 16 ) ;
outbody = smbd_smb2_generate_outbody ( req , 0x24 ) ;
if ( outbody . data = = NULL ) {
error = smbd_smb2_request_error ( req , NT_STATUS_NO_MEMORY ) ;
if ( ! NT_STATUS_IS_OK ( error ) ) {
smbd_server_connection_terminate ( req - > xconn ,
nt_errstr ( error ) ) ;
return ;
}
return ;
}
SSVAL ( outbody . data , 0x00 , 0x24 ) ; /* struct size */
SSVAL ( outbody . data , 0x02 , 0 ) ; /* reserved */
SIVAL ( outbody . data , 0x04 , 0 ) ; /* flags, must be 0 */
SBVAL ( outbody . data , 0x08 , in_lease_key . data [ 0 ] ) ;
SBVAL ( outbody . data , 0x10 , in_lease_key . data [ 1 ] ) ;
SIVAL ( outbody . data , 0x18 , out_lease_state ) ;
SBVAL ( outbody . data , 0x1c , 0 ) ; /* leaseduration, must be 0 */
error = smbd_smb2_request_done ( req , outbody , NULL ) ;
if ( ! NT_STATUS_IS_OK ( error ) ) {
smbd_server_connection_terminate ( req - > xconn ,
nt_errstr ( error ) ) ;
return ;
}
}
struct smbd_smb2_lease_break_state {
uint32_t lease_state ;
} ;
struct lease_lookup_state {
TALLOC_CTX * mem_ctx ;
/* Return parameters. */
uint32_t num_file_ids ;
struct file_id * ids ;
NTSTATUS status ;
} ;
static void lease_parser (
2014-12-05 23:47:52 +03:00
uint32_t num_files ,
const struct leases_db_file * files ,
2014-10-29 01:31:46 +03:00
void * private_data )
{
struct lease_lookup_state * lls =
( struct lease_lookup_state * ) private_data ;
lls - > status = NT_STATUS_OK ;
2014-12-05 23:47:52 +03:00
lls - > num_file_ids = num_files ;
lls - > status = leases_db_copy_file_ids ( lls - > mem_ctx ,
num_files ,
files ,
& lls - > ids ) ;
2014-10-29 01:31:46 +03:00
}
static struct tevent_req * smbd_smb2_lease_break_send (
TALLOC_CTX * mem_ctx , struct tevent_context * ev ,
struct smbd_smb2_request * smb2_req , struct smb2_lease_key in_lease_key ,
uint32_t in_lease_state )
{
struct tevent_req * req ;
struct smbd_smb2_lease_break_state * state ;
struct lease_lookup_state lls = { . mem_ctx = mem_ctx } ;
NTSTATUS status ;
req = tevent_req_create ( mem_ctx , & state ,
struct smbd_smb2_lease_break_state ) ;
if ( req = = NULL ) {
return NULL ;
}
state - > lease_state = in_lease_state ;
/* Find any file ids with this lease key. */
status = leases_db_parse ( & smb2_req - > xconn - > smb2 . client . guid ,
& in_lease_key ,
lease_parser ,
& lls ) ;
if ( ! NT_STATUS_IS_OK ( status ) ) {
if ( NT_STATUS_EQUAL ( status , NT_STATUS_NOT_FOUND ) ) {
status = NT_STATUS_OBJECT_NAME_NOT_FOUND ;
DEBUG ( 10 , ( " No record for lease key found \n " ) ) ;
}
2018-07-26 15:52:55 +03:00
tevent_req_nterror ( req , status ) ;
return tevent_req_post ( req , ev ) ;
2014-10-29 01:31:46 +03:00
}
2018-07-26 15:52:55 +03:00
if ( tevent_req_nterror ( req , lls . status ) ) {
return tevent_req_post ( req , ev ) ;
}
if ( lls . num_file_ids = = 0 ) {
tevent_req_nterror ( req , NT_STATUS_OBJECT_NAME_NOT_FOUND ) ;
2014-10-29 01:31:46 +03:00
return tevent_req_post ( req , ev ) ;
}
2020-06-02 17:33:23 +03:00
status = downgrade_lease ( smb2_req - > xconn - > client ,
2014-10-29 01:31:46 +03:00
lls . num_file_ids ,
lls . ids ,
& in_lease_key ,
in_lease_state ) ;
if ( NT_STATUS_EQUAL ( status , NT_STATUS_OPLOCK_BREAK_IN_PROGRESS ) ) {
tevent_req_done ( req ) ;
return tevent_req_post ( req , ev ) ;
}
if ( tevent_req_nterror ( req , status ) ) {
DEBUG ( 10 , ( " downgrade_lease returned %s \n " ,
nt_errstr ( status ) ) ) ;
return tevent_req_post ( req , ev ) ;
}
tevent_req_done ( req ) ;
return tevent_req_post ( req , ev ) ;
}
static NTSTATUS smbd_smb2_lease_break_recv ( struct tevent_req * req ,
uint32_t * out_lease_state )
{
struct smbd_smb2_lease_break_state * state = tevent_req_data (
req , struct smbd_smb2_lease_break_state ) ;
NTSTATUS status ;
if ( tevent_req_is_nterror ( req , & status ) ) {
return status ;
}
* out_lease_state = state - > lease_state ;
return NT_STATUS_OK ;
}
2010-04-24 11:29:41 +04:00
/*********************************************************
Create and send an asynchronous
SMB2 OPLOCK_BREAK_NOTIFICATION .
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
2014-10-29 01:31:46 +03:00
void send_break_message_smb2 ( files_struct * fsp ,
uint32_t break_from ,
uint32_t break_to )
2010-04-08 06:00:44 +04:00
{
2020-06-02 17:50:22 +03:00
struct smbXsrv_client * client =
fsp - > conn - > sconn - > client ;
2010-04-24 11:29:41 +04:00
NTSTATUS status ;
2014-09-16 11:23:54 +04:00
2020-05-19 15:10:21 +03:00
if ( ! NT_STATUS_IS_OK ( fsp - > op - > status ) ) {
DBG_DEBUG ( " skip oplock break for file %s, %s, "
" smb2 level %u fsp status=%s \n " ,
fsp_str_dbg ( fsp ) ,
fsp_fnum_dbg ( fsp ) ,
( unsigned int ) break_to ,
nt_errstr ( fsp - > op - > status ) ) ;
2012-08-22 12:33:07 +04:00
return ;
}
2010-04-24 11:29:41 +04:00
2020-05-19 15:10:21 +03:00
DBG_DEBUG ( " sending oplock break "
" for file %s, %s, smb2 level %u \n " ,
fsp_str_dbg ( fsp ) ,
fsp_fnum_dbg ( fsp ) ,
( unsigned int ) break_to ) ;
2010-04-29 01:56:12 +04:00
2014-10-29 01:31:46 +03:00
if ( fsp - > oplock_type = = LEASE_OPLOCK ) {
uint32_t break_flags = 0 ;
uint16_t new_epoch ;
if ( fsp - > lease - > lease . lease_state ! = SMB2_LEASE_NONE ) {
break_flags = SMB2_NOTIFY_BREAK_LEASE_FLAG_ACK_REQUIRED ;
}
if ( fsp - > lease - > lease . lease_version > 1 ) {
new_epoch = fsp - > lease - > lease . lease_epoch ;
} else {
new_epoch = 0 ;
}
2020-06-02 17:50:22 +03:00
status = smbd_smb2_send_lease_break ( client , new_epoch , break_flags ,
2014-10-29 01:31:46 +03:00
& fsp - > lease - > lease . lease_key ,
break_from , break_to ) ;
} else {
uint8_t smb2_oplock_level ;
smb2_oplock_level = ( break_to & SMB2_LEASE_READ ) ?
SMB2_OPLOCK_LEVEL_II : SMB2_OPLOCK_LEVEL_NONE ;
2020-06-02 17:50:22 +03:00
status = smbd_smb2_send_oplock_break ( client ,
2014-10-29 01:31:46 +03:00
fsp - > op ,
smb2_oplock_level ) ;
}
2010-04-24 11:29:41 +04:00
if ( ! NT_STATUS_IS_OK ( status ) ) {
2020-06-02 17:50:22 +03:00
smbd_server_disconnect_client ( client ,
nt_errstr ( status ) ) ;
2014-06-11 14:15:48 +04:00
return ;
2010-04-24 11:29:41 +04:00
}
2010-04-08 06:00:44 +04:00
}