mirror of
https://github.com/samba-team/samba.git
synced 2024-12-23 17:34:34 +03:00
9f56551275
Signed-off-by: Volker Lendecke <vl@samba.org> Reviewed-by: Andrew Bartlett <abartlet@samba.org>
7487 lines
178 KiB
C
7487 lines
178 KiB
C
/*
|
|
Unix SMB/CIFS implementation.
|
|
client file operations
|
|
Copyright (C) Andrew Tridgell 1994-1998
|
|
Copyright (C) Jeremy Allison 2001-2009
|
|
|
|
This program is free software; you can redistribute it and/or modify
|
|
it under the terms of the GNU General Public License as published by
|
|
the Free Software Foundation; either version 3 of the License, or
|
|
(at your option) any later version.
|
|
|
|
This program is distributed in the hope that it will be useful,
|
|
but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
GNU General Public License for more details.
|
|
|
|
You should have received a copy of the GNU General Public License
|
|
along with this program. If not, see <http://www.gnu.org/licenses/>.
|
|
*/
|
|
|
|
#include "includes.h"
|
|
#include "system/filesys.h"
|
|
#include "libsmb/libsmb.h"
|
|
#include "../lib/util/tevent_ntstatus.h"
|
|
#include "async_smb.h"
|
|
#include "libsmb/clirap.h"
|
|
#include "trans2.h"
|
|
#include "ntioctl.h"
|
|
#include "libcli/security/security.h"
|
|
#include "../libcli/smb/smbXcli_base.h"
|
|
#include "libcli/smb/reparse.h"
|
|
|
|
struct cli_setpathinfo_state {
|
|
uint16_t setup;
|
|
uint8_t *param;
|
|
};
|
|
|
|
static void cli_setpathinfo_done(struct tevent_req *subreq);
|
|
|
|
struct tevent_req *cli_setpathinfo_send(TALLOC_CTX *mem_ctx,
|
|
struct tevent_context *ev,
|
|
struct cli_state *cli,
|
|
uint16_t level,
|
|
const char *path,
|
|
uint8_t *data,
|
|
size_t data_len)
|
|
{
|
|
struct tevent_req *req, *subreq;
|
|
struct cli_setpathinfo_state *state;
|
|
uint16_t additional_flags2 = 0;
|
|
char *path_cp = NULL;
|
|
|
|
req = tevent_req_create(mem_ctx, &state,
|
|
struct cli_setpathinfo_state);
|
|
if (req == NULL) {
|
|
return NULL;
|
|
}
|
|
|
|
/* Setup setup word. */
|
|
SSVAL(&state->setup, 0, TRANSACT2_SETPATHINFO);
|
|
|
|
/* Setup param array. */
|
|
state->param = talloc_zero_array(state, uint8_t, 6);
|
|
if (tevent_req_nomem(state->param, req)) {
|
|
return tevent_req_post(req, ev);
|
|
}
|
|
SSVAL(state->param, 0, level);
|
|
|
|
/* Check for DFS. */
|
|
path_cp = smb1_dfs_share_path(state, cli, path);
|
|
if (tevent_req_nomem(path_cp, req)) {
|
|
return tevent_req_post(req, ev);
|
|
}
|
|
state->param = trans2_bytes_push_str(state->param,
|
|
smbXcli_conn_use_unicode(cli->conn),
|
|
path_cp,
|
|
strlen(path_cp)+1,
|
|
NULL);
|
|
if (tevent_req_nomem(state->param, req)) {
|
|
return tevent_req_post(req, ev);
|
|
}
|
|
|
|
if (clistr_is_previous_version_path(path) &&
|
|
!INFO_LEVEL_IS_UNIX(level)) {
|
|
additional_flags2 = FLAGS2_REPARSE_PATH;
|
|
}
|
|
|
|
subreq = cli_trans_send(
|
|
state, /* mem ctx. */
|
|
ev, /* event ctx. */
|
|
cli, /* cli_state. */
|
|
additional_flags2, /* additional_flags2 */
|
|
SMBtrans2, /* cmd. */
|
|
NULL, /* pipe name. */
|
|
-1, /* fid. */
|
|
0, /* function. */
|
|
0, /* flags. */
|
|
&state->setup, /* setup. */
|
|
1, /* num setup uint16_t words. */
|
|
0, /* max returned setup. */
|
|
state->param, /* param. */
|
|
talloc_get_size(state->param), /* num param. */
|
|
2, /* max returned param. */
|
|
data, /* data. */
|
|
data_len, /* num data. */
|
|
0); /* max returned data. */
|
|
|
|
if (tevent_req_nomem(subreq, req)) {
|
|
return tevent_req_post(req, ev);
|
|
}
|
|
tevent_req_set_callback(subreq, cli_setpathinfo_done, req);
|
|
return req;
|
|
}
|
|
|
|
static void cli_setpathinfo_done(struct tevent_req *subreq)
|
|
{
|
|
NTSTATUS status = cli_trans_recv(subreq, NULL, NULL, NULL, 0, NULL,
|
|
NULL, 0, NULL, NULL, 0, NULL);
|
|
tevent_req_simple_finish_ntstatus(subreq, status);
|
|
}
|
|
|
|
NTSTATUS cli_setpathinfo_recv(struct tevent_req *req)
|
|
{
|
|
return tevent_req_simple_recv_ntstatus(req);
|
|
}
|
|
|
|
NTSTATUS cli_setpathinfo(struct cli_state *cli,
|
|
uint16_t level,
|
|
const char *path,
|
|
uint8_t *data,
|
|
size_t data_len)
|
|
{
|
|
TALLOC_CTX *frame = talloc_stackframe();
|
|
struct tevent_context *ev;
|
|
struct tevent_req *req;
|
|
NTSTATUS status = NT_STATUS_NO_MEMORY;
|
|
|
|
if (smbXcli_conn_has_async_calls(cli->conn)) {
|
|
/*
|
|
* Can't use sync call while an async call is in flight
|
|
*/
|
|
status = NT_STATUS_INVALID_PARAMETER;
|
|
goto fail;
|
|
}
|
|
ev = samba_tevent_context_init(frame);
|
|
if (ev == NULL) {
|
|
goto fail;
|
|
}
|
|
req = cli_setpathinfo_send(ev, ev, cli, level, path, data, data_len);
|
|
if (req == NULL) {
|
|
goto fail;
|
|
}
|
|
if (!tevent_req_poll_ntstatus(req, ev, &status)) {
|
|
goto fail;
|
|
}
|
|
status = cli_setpathinfo_recv(req);
|
|
fail:
|
|
TALLOC_FREE(frame);
|
|
return status;
|
|
}
|
|
|
|
struct cli_setfileinfo_state {
|
|
uint16_t setup;
|
|
uint8_t param[6];
|
|
};
|
|
|
|
static void cli_setfileinfo_done(struct tevent_req *subreq);
|
|
|
|
struct tevent_req *cli_setfileinfo_send(
|
|
TALLOC_CTX *mem_ctx,
|
|
struct tevent_context *ev,
|
|
struct cli_state *cli,
|
|
uint16_t fnum,
|
|
uint16_t level,
|
|
uint8_t *data,
|
|
size_t data_len)
|
|
{
|
|
struct tevent_req *req = NULL, *subreq = NULL;
|
|
struct cli_setfileinfo_state *state = NULL;
|
|
|
|
req = tevent_req_create(mem_ctx, &state, struct cli_setfileinfo_state);
|
|
if (req == NULL) {
|
|
return NULL;
|
|
}
|
|
PUSH_LE_U16(&state->setup, 0, TRANSACT2_SETFILEINFO);
|
|
|
|
PUSH_LE_U16(state->param, 0, fnum);
|
|
PUSH_LE_U16(state->param, 2, level);
|
|
|
|
subreq = cli_trans_send(state, /* mem ctx. */
|
|
ev, /* event ctx. */
|
|
cli, /* cli_state. */
|
|
0, /* additional_flags2 */
|
|
SMBtrans2, /* cmd. */
|
|
NULL, /* pipe name. */
|
|
-1, /* fid. */
|
|
0, /* function. */
|
|
0, /* flags. */
|
|
&state->setup, /* setup. */
|
|
1, /* num setup uint16_t words. */
|
|
0, /* max returned setup. */
|
|
state->param, /* param. */
|
|
6, /* num param. */
|
|
2, /* max returned param. */
|
|
data, /* data. */
|
|
data_len, /* num data. */
|
|
0); /* max returned data. */
|
|
|
|
if (tevent_req_nomem(subreq, req)) {
|
|
return tevent_req_post(req, ev);
|
|
}
|
|
tevent_req_set_callback(subreq, cli_setfileinfo_done, req);
|
|
return req;
|
|
}
|
|
|
|
static void cli_setfileinfo_done(struct tevent_req *subreq)
|
|
{
|
|
NTSTATUS status = cli_trans_recv(
|
|
subreq, /* req */
|
|
NULL, /* mem_ctx */
|
|
NULL, /* recv_flags2 */
|
|
NULL, /* setup */
|
|
0, /* min_setup */
|
|
NULL, /* num_setup */
|
|
NULL, /* param */
|
|
0, /* min_param */
|
|
NULL, /* num_param */
|
|
NULL, /* data */
|
|
0, /* min_data */
|
|
NULL); /* num_data */
|
|
tevent_req_simple_finish_ntstatus(subreq, status);
|
|
}
|
|
|
|
NTSTATUS cli_setfileinfo_recv(struct tevent_req *req)
|
|
{
|
|
return tevent_req_simple_recv_ntstatus(req);
|
|
}
|
|
|
|
/****************************************************************************
|
|
Hard/Symlink a file (UNIX extensions).
|
|
Creates new name (sym)linked to link_target.
|
|
****************************************************************************/
|
|
|
|
struct cli_posix_link_internal_state {
|
|
uint8_t *data;
|
|
};
|
|
|
|
static void cli_posix_link_internal_done(struct tevent_req *subreq);
|
|
|
|
static struct tevent_req *cli_posix_link_internal_send(TALLOC_CTX *mem_ctx,
|
|
struct tevent_context *ev,
|
|
struct cli_state *cli,
|
|
uint16_t level,
|
|
const char *link_target,
|
|
const char *newname)
|
|
{
|
|
struct tevent_req *req = NULL, *subreq = NULL;
|
|
struct cli_posix_link_internal_state *state = NULL;
|
|
|
|
req = tevent_req_create(mem_ctx, &state,
|
|
struct cli_posix_link_internal_state);
|
|
if (req == NULL) {
|
|
return NULL;
|
|
}
|
|
|
|
/* Setup data array. */
|
|
state->data = talloc_array(state, uint8_t, 0);
|
|
if (tevent_req_nomem(state->data, req)) {
|
|
return tevent_req_post(req, ev);
|
|
}
|
|
state->data = trans2_bytes_push_str(
|
|
state->data, smbXcli_conn_use_unicode(cli->conn),
|
|
link_target, strlen(link_target)+1, NULL);
|
|
|
|
subreq = cli_setpathinfo_send(
|
|
state, ev, cli, level, newname,
|
|
state->data, talloc_get_size(state->data));
|
|
if (tevent_req_nomem(subreq, req)) {
|
|
return tevent_req_post(req, ev);
|
|
}
|
|
tevent_req_set_callback(subreq, cli_posix_link_internal_done, req);
|
|
return req;
|
|
}
|
|
|
|
static void cli_posix_link_internal_done(struct tevent_req *subreq)
|
|
{
|
|
NTSTATUS status = cli_setpathinfo_recv(subreq);
|
|
tevent_req_simple_finish_ntstatus(subreq, status);
|
|
}
|
|
|
|
static NTSTATUS cli_posix_link_internal_recv(struct tevent_req *req)
|
|
{
|
|
return tevent_req_simple_recv_ntstatus(req);
|
|
}
|
|
|
|
/****************************************************************************
|
|
Symlink a file (UNIX extensions).
|
|
****************************************************************************/
|
|
|
|
struct cli_posix_symlink_state {
|
|
uint8_t dummy;
|
|
};
|
|
|
|
static void cli_posix_symlink_done(struct tevent_req *subreq);
|
|
|
|
struct tevent_req *cli_posix_symlink_send(TALLOC_CTX *mem_ctx,
|
|
struct tevent_context *ev,
|
|
struct cli_state *cli,
|
|
const char *link_target,
|
|
const char *newname)
|
|
{
|
|
struct tevent_req *req = NULL, *subreq = NULL;
|
|
struct cli_posix_symlink_state *state = NULL;
|
|
|
|
req = tevent_req_create(
|
|
mem_ctx, &state, struct cli_posix_symlink_state);
|
|
if (req == NULL) {
|
|
return NULL;
|
|
}
|
|
|
|
subreq = cli_posix_link_internal_send(
|
|
mem_ctx, ev, cli, SMB_SET_FILE_UNIX_LINK, link_target, newname);
|
|
if (tevent_req_nomem(subreq, req)) {
|
|
return tevent_req_post(req, ev);
|
|
}
|
|
tevent_req_set_callback(subreq, cli_posix_symlink_done, req);
|
|
return req;
|
|
}
|
|
|
|
static void cli_posix_symlink_done(struct tevent_req *subreq)
|
|
{
|
|
NTSTATUS status = cli_posix_link_internal_recv(subreq);
|
|
tevent_req_simple_finish_ntstatus(subreq, status);
|
|
}
|
|
|
|
NTSTATUS cli_posix_symlink_recv(struct tevent_req *req)
|
|
{
|
|
return tevent_req_simple_recv_ntstatus(req);
|
|
}
|
|
|
|
NTSTATUS cli_posix_symlink(struct cli_state *cli,
|
|
const char *link_target,
|
|
const char *newname)
|
|
{
|
|
TALLOC_CTX *frame = talloc_stackframe();
|
|
struct tevent_context *ev = NULL;
|
|
struct tevent_req *req = NULL;
|
|
NTSTATUS status = NT_STATUS_OK;
|
|
|
|
if (smbXcli_conn_has_async_calls(cli->conn)) {
|
|
/*
|
|
* Can't use sync call while an async call is in flight
|
|
*/
|
|
status = NT_STATUS_INVALID_PARAMETER;
|
|
goto fail;
|
|
}
|
|
|
|
ev = samba_tevent_context_init(frame);
|
|
if (ev == NULL) {
|
|
status = NT_STATUS_NO_MEMORY;
|
|
goto fail;
|
|
}
|
|
|
|
req = cli_posix_symlink_send(frame,
|
|
ev,
|
|
cli,
|
|
link_target,
|
|
newname);
|
|
if (req == NULL) {
|
|
status = NT_STATUS_NO_MEMORY;
|
|
goto fail;
|
|
}
|
|
|
|
if (!tevent_req_poll_ntstatus(req, ev, &status)) {
|
|
goto fail;
|
|
}
|
|
|
|
status = cli_posix_symlink_recv(req);
|
|
|
|
fail:
|
|
TALLOC_FREE(frame);
|
|
return status;
|
|
}
|
|
|
|
/****************************************************************************
|
|
Read a POSIX symlink.
|
|
****************************************************************************/
|
|
|
|
struct cli_posix_readlink_state {
|
|
struct cli_state *cli;
|
|
char *converted;
|
|
};
|
|
|
|
static void cli_posix_readlink_done(struct tevent_req *subreq);
|
|
|
|
struct tevent_req *cli_posix_readlink_send(TALLOC_CTX *mem_ctx,
|
|
struct tevent_context *ev,
|
|
struct cli_state *cli,
|
|
const char *fname)
|
|
{
|
|
struct tevent_req *req = NULL, *subreq = NULL;
|
|
struct cli_posix_readlink_state *state = NULL;
|
|
|
|
req = tevent_req_create(
|
|
mem_ctx, &state, struct cli_posix_readlink_state);
|
|
if (req == NULL) {
|
|
return NULL;
|
|
}
|
|
state->cli = cli;
|
|
|
|
subreq = cli_qpathinfo_send(
|
|
state,
|
|
ev,
|
|
cli,
|
|
fname,
|
|
SMB_QUERY_FILE_UNIX_LINK,
|
|
1,
|
|
UINT16_MAX);
|
|
if (tevent_req_nomem(subreq, req)) {
|
|
return tevent_req_post(req, ev);
|
|
}
|
|
tevent_req_set_callback(subreq, cli_posix_readlink_done, req);
|
|
return req;
|
|
}
|
|
|
|
static void cli_posix_readlink_done(struct tevent_req *subreq)
|
|
{
|
|
struct tevent_req *req = tevent_req_callback_data(
|
|
subreq, struct tevent_req);
|
|
struct cli_posix_readlink_state *state = tevent_req_data(
|
|
req, struct cli_posix_readlink_state);
|
|
NTSTATUS status;
|
|
uint8_t *data = NULL;
|
|
uint32_t num_data = 0;
|
|
charset_t charset;
|
|
size_t converted_size;
|
|
bool ok;
|
|
|
|
status = cli_qpathinfo_recv(subreq, state, &data, &num_data);
|
|
TALLOC_FREE(subreq);
|
|
if (tevent_req_nterror(req, status)) {
|
|
return;
|
|
}
|
|
/*
|
|
* num_data is > 1, we've given 1 as minimum to cli_qpathinfo_send
|
|
*/
|
|
if (data == NULL || data[num_data-1] != '\0') {
|
|
tevent_req_nterror(req, NT_STATUS_DATA_ERROR);
|
|
return;
|
|
}
|
|
|
|
charset = smbXcli_conn_use_unicode(state->cli->conn) ?
|
|
CH_UTF16LE : CH_DOS;
|
|
|
|
/* The returned data is a pushed string, not raw data. */
|
|
ok = convert_string_talloc(
|
|
state,
|
|
charset,
|
|
CH_UNIX,
|
|
data,
|
|
num_data,
|
|
&state->converted,
|
|
&converted_size);
|
|
if (!ok) {
|
|
tevent_req_oom(req);
|
|
return;
|
|
}
|
|
tevent_req_done(req);
|
|
}
|
|
|
|
NTSTATUS cli_posix_readlink_recv(
|
|
struct tevent_req *req, TALLOC_CTX *mem_ctx, char **target)
|
|
{
|
|
struct cli_posix_readlink_state *state = tevent_req_data(
|
|
req, struct cli_posix_readlink_state);
|
|
NTSTATUS status;
|
|
|
|
if (tevent_req_is_nterror(req, &status)) {
|
|
return status;
|
|
}
|
|
*target = talloc_move(mem_ctx, &state->converted);
|
|
tevent_req_received(req);
|
|
return NT_STATUS_OK;
|
|
}
|
|
|
|
/****************************************************************************
|
|
Hard link a file (UNIX extensions).
|
|
****************************************************************************/
|
|
|
|
struct cli_posix_hardlink_state {
|
|
uint8_t dummy;
|
|
};
|
|
|
|
static void cli_posix_hardlink_done(struct tevent_req *subreq);
|
|
|
|
struct tevent_req *cli_posix_hardlink_send(TALLOC_CTX *mem_ctx,
|
|
struct tevent_context *ev,
|
|
struct cli_state *cli,
|
|
const char *oldname,
|
|
const char *newname)
|
|
{
|
|
struct tevent_req *req = NULL, *subreq = NULL;
|
|
struct cli_posix_hardlink_state *state = NULL;
|
|
|
|
req = tevent_req_create(
|
|
mem_ctx, &state, struct cli_posix_hardlink_state);
|
|
if (req == NULL) {
|
|
return NULL;
|
|
}
|
|
|
|
subreq = cli_posix_link_internal_send(
|
|
state, ev, cli, SMB_SET_FILE_UNIX_HLINK, oldname, newname);
|
|
if (tevent_req_nomem(subreq, req)) {
|
|
return tevent_req_post(req, ev);
|
|
}
|
|
tevent_req_set_callback(subreq, cli_posix_hardlink_done, req);
|
|
return req;
|
|
}
|
|
|
|
static void cli_posix_hardlink_done(struct tevent_req *subreq)
|
|
{
|
|
NTSTATUS status = cli_posix_link_internal_recv(subreq);
|
|
tevent_req_simple_finish_ntstatus(subreq, status);
|
|
}
|
|
|
|
NTSTATUS cli_posix_hardlink_recv(struct tevent_req *req)
|
|
{
|
|
return tevent_req_simple_recv_ntstatus(req);
|
|
}
|
|
|
|
NTSTATUS cli_posix_hardlink(struct cli_state *cli,
|
|
const char *oldname,
|
|
const char *newname)
|
|
{
|
|
TALLOC_CTX *frame = talloc_stackframe();
|
|
struct tevent_context *ev = NULL;
|
|
struct tevent_req *req = NULL;
|
|
NTSTATUS status = NT_STATUS_OK;
|
|
|
|
if (smbXcli_conn_has_async_calls(cli->conn)) {
|
|
/*
|
|
* Can't use sync call while an async call is in flight
|
|
*/
|
|
status = NT_STATUS_INVALID_PARAMETER;
|
|
goto fail;
|
|
}
|
|
|
|
ev = samba_tevent_context_init(frame);
|
|
if (ev == NULL) {
|
|
status = NT_STATUS_NO_MEMORY;
|
|
goto fail;
|
|
}
|
|
|
|
req = cli_posix_hardlink_send(frame,
|
|
ev,
|
|
cli,
|
|
oldname,
|
|
newname);
|
|
if (req == NULL) {
|
|
status = NT_STATUS_NO_MEMORY;
|
|
goto fail;
|
|
}
|
|
|
|
if (!tevent_req_poll_ntstatus(req, ev, &status)) {
|
|
goto fail;
|
|
}
|
|
|
|
status = cli_posix_hardlink_recv(req);
|
|
|
|
fail:
|
|
TALLOC_FREE(frame);
|
|
return status;
|
|
}
|
|
|
|
/****************************************************************************
|
|
Do a POSIX getacl - pathname based ACL get (UNIX extensions).
|
|
****************************************************************************/
|
|
|
|
struct getacl_state {
|
|
uint32_t num_data;
|
|
uint8_t *data;
|
|
};
|
|
|
|
static void cli_posix_getacl_done(struct tevent_req *subreq);
|
|
|
|
struct tevent_req *cli_posix_getacl_send(TALLOC_CTX *mem_ctx,
|
|
struct tevent_context *ev,
|
|
struct cli_state *cli,
|
|
const char *fname)
|
|
{
|
|
struct tevent_req *req = NULL, *subreq = NULL;
|
|
struct getacl_state *state = NULL;
|
|
|
|
req = tevent_req_create(mem_ctx, &state, struct getacl_state);
|
|
if (req == NULL) {
|
|
return NULL;
|
|
}
|
|
subreq = cli_qpathinfo_send(state, ev, cli, fname, SMB_QUERY_POSIX_ACL,
|
|
0, CLI_BUFFER_SIZE);
|
|
if (tevent_req_nomem(subreq, req)) {
|
|
return tevent_req_post(req, ev);
|
|
}
|
|
tevent_req_set_callback(subreq, cli_posix_getacl_done, req);
|
|
return req;
|
|
}
|
|
|
|
static void cli_posix_getacl_done(struct tevent_req *subreq)
|
|
{
|
|
struct tevent_req *req = tevent_req_callback_data(
|
|
subreq, struct tevent_req);
|
|
struct getacl_state *state = tevent_req_data(
|
|
req, struct getacl_state);
|
|
NTSTATUS status;
|
|
|
|
status = cli_qpathinfo_recv(subreq, state, &state->data,
|
|
&state->num_data);
|
|
TALLOC_FREE(subreq);
|
|
if (tevent_req_nterror(req, status)) {
|
|
return;
|
|
}
|
|
tevent_req_done(req);
|
|
}
|
|
|
|
NTSTATUS cli_posix_getacl_recv(struct tevent_req *req,
|
|
TALLOC_CTX *mem_ctx,
|
|
size_t *prb_size,
|
|
char **retbuf)
|
|
{
|
|
struct getacl_state *state = tevent_req_data(req, struct getacl_state);
|
|
NTSTATUS status;
|
|
|
|
if (tevent_req_is_nterror(req, &status)) {
|
|
return status;
|
|
}
|
|
*prb_size = (size_t)state->num_data;
|
|
*retbuf = (char *)talloc_move(mem_ctx, &state->data);
|
|
return NT_STATUS_OK;
|
|
}
|
|
|
|
NTSTATUS cli_posix_getacl(struct cli_state *cli,
|
|
const char *fname,
|
|
TALLOC_CTX *mem_ctx,
|
|
size_t *prb_size,
|
|
char **retbuf)
|
|
{
|
|
TALLOC_CTX *frame = talloc_stackframe();
|
|
struct tevent_context *ev = NULL;
|
|
struct tevent_req *req = NULL;
|
|
NTSTATUS status = NT_STATUS_OK;
|
|
|
|
if (smbXcli_conn_has_async_calls(cli->conn)) {
|
|
/*
|
|
* Can't use sync call while an async call is in flight
|
|
*/
|
|
status = NT_STATUS_INVALID_PARAMETER;
|
|
goto fail;
|
|
}
|
|
|
|
ev = samba_tevent_context_init(frame);
|
|
if (ev == NULL) {
|
|
status = NT_STATUS_NO_MEMORY;
|
|
goto fail;
|
|
}
|
|
|
|
req = cli_posix_getacl_send(frame,
|
|
ev,
|
|
cli,
|
|
fname);
|
|
if (req == NULL) {
|
|
status = NT_STATUS_NO_MEMORY;
|
|
goto fail;
|
|
}
|
|
|
|
if (!tevent_req_poll_ntstatus(req, ev, &status)) {
|
|
goto fail;
|
|
}
|
|
|
|
status = cli_posix_getacl_recv(req, mem_ctx, prb_size, retbuf);
|
|
|
|
fail:
|
|
TALLOC_FREE(frame);
|
|
return status;
|
|
}
|
|
|
|
/****************************************************************************
|
|
Do a POSIX setacl - pathname based ACL set (UNIX extensions).
|
|
****************************************************************************/
|
|
|
|
struct setacl_state {
|
|
uint8_t *data;
|
|
};
|
|
|
|
static void cli_posix_setacl_done(struct tevent_req *subreq);
|
|
|
|
struct tevent_req *cli_posix_setacl_send(TALLOC_CTX *mem_ctx,
|
|
struct tevent_context *ev,
|
|
struct cli_state *cli,
|
|
const char *fname,
|
|
const void *data,
|
|
size_t num_data)
|
|
{
|
|
struct tevent_req *req = NULL, *subreq = NULL;
|
|
struct setacl_state *state = NULL;
|
|
|
|
req = tevent_req_create(mem_ctx, &state, struct setacl_state);
|
|
if (req == NULL) {
|
|
return NULL;
|
|
}
|
|
state->data = talloc_memdup(state, data, num_data);
|
|
if (tevent_req_nomem(state->data, req)) {
|
|
return tevent_req_post(req, ev);
|
|
}
|
|
|
|
subreq = cli_setpathinfo_send(state,
|
|
ev,
|
|
cli,
|
|
SMB_SET_POSIX_ACL,
|
|
fname,
|
|
state->data,
|
|
num_data);
|
|
if (tevent_req_nomem(subreq, req)) {
|
|
return tevent_req_post(req, ev);
|
|
}
|
|
tevent_req_set_callback(subreq, cli_posix_setacl_done, req);
|
|
return req;
|
|
}
|
|
|
|
static void cli_posix_setacl_done(struct tevent_req *subreq)
|
|
{
|
|
NTSTATUS status = cli_setpathinfo_recv(subreq);
|
|
tevent_req_simple_finish_ntstatus(subreq, status);
|
|
}
|
|
|
|
NTSTATUS cli_posix_setacl_recv(struct tevent_req *req)
|
|
{
|
|
return tevent_req_simple_recv_ntstatus(req);
|
|
}
|
|
|
|
NTSTATUS cli_posix_setacl(struct cli_state *cli,
|
|
const char *fname,
|
|
const void *acl_buf,
|
|
size_t acl_buf_size)
|
|
{
|
|
TALLOC_CTX *frame = talloc_stackframe();
|
|
struct tevent_context *ev = NULL;
|
|
struct tevent_req *req = NULL;
|
|
NTSTATUS status = NT_STATUS_OK;
|
|
|
|
if (smbXcli_conn_has_async_calls(cli->conn)) {
|
|
/*
|
|
* Can't use sync call while an async call is in flight
|
|
*/
|
|
status = NT_STATUS_INVALID_PARAMETER;
|
|
goto fail;
|
|
}
|
|
|
|
ev = samba_tevent_context_init(frame);
|
|
if (ev == NULL) {
|
|
status = NT_STATUS_NO_MEMORY;
|
|
goto fail;
|
|
}
|
|
|
|
req = cli_posix_setacl_send(frame,
|
|
ev,
|
|
cli,
|
|
fname,
|
|
acl_buf,
|
|
acl_buf_size);
|
|
if (req == NULL) {
|
|
status = NT_STATUS_NO_MEMORY;
|
|
goto fail;
|
|
}
|
|
|
|
if (!tevent_req_poll_ntstatus(req, ev, &status)) {
|
|
goto fail;
|
|
}
|
|
|
|
status = cli_posix_setacl_recv(req);
|
|
|
|
fail:
|
|
TALLOC_FREE(frame);
|
|
return status;
|
|
}
|
|
|
|
/****************************************************************************
|
|
Stat a file (UNIX extensions).
|
|
****************************************************************************/
|
|
|
|
struct cli_posix_stat_state {
|
|
struct stat_ex sbuf;
|
|
};
|
|
|
|
static void cli_posix_stat_done(struct tevent_req *subreq);
|
|
|
|
struct tevent_req *cli_posix_stat_send(TALLOC_CTX *mem_ctx,
|
|
struct tevent_context *ev,
|
|
struct cli_state *cli,
|
|
const char *fname)
|
|
{
|
|
struct tevent_req *req = NULL, *subreq = NULL;
|
|
struct stat_state *state = NULL;
|
|
|
|
req = tevent_req_create(mem_ctx, &state, struct cli_posix_stat_state);
|
|
if (req == NULL) {
|
|
return NULL;
|
|
}
|
|
|
|
subreq = cli_qpathinfo_send(state, ev, cli, fname,
|
|
SMB_QUERY_FILE_UNIX_BASIC, 100, 100);
|
|
if (tevent_req_nomem(subreq, req)) {
|
|
return tevent_req_post(req, ev);
|
|
}
|
|
tevent_req_set_callback(subreq, cli_posix_stat_done, req);
|
|
return req;
|
|
}
|
|
|
|
static void cli_posix_stat_done(struct tevent_req *subreq)
|
|
{
|
|
struct tevent_req *req = tevent_req_callback_data(
|
|
subreq, struct tevent_req);
|
|
struct cli_posix_stat_state *state = tevent_req_data(
|
|
req, struct cli_posix_stat_state);
|
|
SMB_STRUCT_STAT *sbuf = &state->sbuf;
|
|
uint8_t *data;
|
|
uint32_t num_data = 0;
|
|
NTSTATUS status;
|
|
|
|
status = cli_qpathinfo_recv(subreq, state, &data, &num_data);
|
|
TALLOC_FREE(subreq);
|
|
if (tevent_req_nterror(req, status)) {
|
|
return;
|
|
}
|
|
|
|
if (num_data != 100) {
|
|
/*
|
|
* Paranoia, cli_qpathinfo should have guaranteed
|
|
* this, but you never know...
|
|
*/
|
|
tevent_req_nterror(req, NT_STATUS_INVALID_NETWORK_RESPONSE);
|
|
return;
|
|
}
|
|
|
|
/* total size, in bytes */
|
|
sbuf->st_ex_size = IVAL2_TO_SMB_BIG_UINT(data, 0);
|
|
|
|
/* number of blocks allocated */
|
|
sbuf->st_ex_blocks = IVAL2_TO_SMB_BIG_UINT(data,8);
|
|
#if defined (HAVE_STAT_ST_BLOCKS) && defined(STAT_ST_BLOCKSIZE)
|
|
sbuf->st_ex_blocks /= STAT_ST_BLOCKSIZE;
|
|
#else
|
|
/* assume 512 byte blocks */
|
|
sbuf->st_ex_blocks /= 512;
|
|
#endif
|
|
/* time of last change */
|
|
sbuf->st_ex_ctime = interpret_long_date(BVAL(data, 16));
|
|
|
|
/* time of last access */
|
|
sbuf->st_ex_atime = interpret_long_date(BVAL(data, 24));
|
|
|
|
/* time of last modification */
|
|
sbuf->st_ex_mtime = interpret_long_date(BVAL(data, 32));
|
|
|
|
sbuf->st_ex_uid = (uid_t) IVAL(data, 40); /* user ID of owner */
|
|
sbuf->st_ex_gid = (gid_t) IVAL(data, 48); /* group ID of owner */
|
|
sbuf->st_ex_mode = unix_filetype_from_wire(IVAL(data, 56));
|
|
|
|
#if defined(HAVE_MAKEDEV)
|
|
{
|
|
uint32_t dev_major = IVAL(data,60);
|
|
uint32_t dev_minor = IVAL(data,68);
|
|
sbuf->st_ex_rdev = makedev(dev_major, dev_minor);
|
|
}
|
|
#endif
|
|
/* inode */
|
|
sbuf->st_ex_ino = (SMB_INO_T)IVAL2_TO_SMB_BIG_UINT(data, 76);
|
|
|
|
/* protection */
|
|
sbuf->st_ex_mode |= wire_perms_to_unix(IVAL(data, 84));
|
|
|
|
/* number of hard links */
|
|
sbuf->st_ex_nlink = BIG_UINT(data, 92);
|
|
|
|
tevent_req_done(req);
|
|
}
|
|
|
|
NTSTATUS cli_posix_stat_recv(struct tevent_req *req, struct stat_ex *sbuf)
|
|
{
|
|
struct cli_posix_stat_state *state = tevent_req_data(
|
|
req, struct cli_posix_stat_state);
|
|
NTSTATUS status;
|
|
|
|
if (tevent_req_is_nterror(req, &status)) {
|
|
return status;
|
|
}
|
|
*sbuf = state->sbuf;
|
|
return NT_STATUS_OK;
|
|
}
|
|
|
|
NTSTATUS cli_posix_stat(struct cli_state *cli,
|
|
const char *fname,
|
|
struct stat_ex *sbuf)
|
|
{
|
|
TALLOC_CTX *frame = talloc_stackframe();
|
|
struct tevent_context *ev = NULL;
|
|
struct tevent_req *req = NULL;
|
|
NTSTATUS status = NT_STATUS_OK;
|
|
|
|
if (smbXcli_conn_has_async_calls(cli->conn)) {
|
|
/*
|
|
* Can't use sync call while an async call is in flight
|
|
*/
|
|
status = NT_STATUS_INVALID_PARAMETER;
|
|
goto fail;
|
|
}
|
|
|
|
ev = samba_tevent_context_init(frame);
|
|
if (ev == NULL) {
|
|
status = NT_STATUS_NO_MEMORY;
|
|
goto fail;
|
|
}
|
|
|
|
req = cli_posix_stat_send(frame, ev, cli, fname);
|
|
if (req == NULL) {
|
|
status = NT_STATUS_NO_MEMORY;
|
|
goto fail;
|
|
}
|
|
|
|
if (!tevent_req_poll_ntstatus(req, ev, &status)) {
|
|
goto fail;
|
|
}
|
|
|
|
status = cli_posix_stat_recv(req, sbuf);
|
|
|
|
fail:
|
|
TALLOC_FREE(frame);
|
|
return status;
|
|
}
|
|
|
|
/****************************************************************************
|
|
Chmod or chown a file internal (UNIX extensions).
|
|
****************************************************************************/
|
|
|
|
struct cli_posix_chown_chmod_internal_state {
|
|
uint8_t data[100];
|
|
};
|
|
|
|
static void cli_posix_chown_chmod_internal_done(struct tevent_req *subreq);
|
|
|
|
static struct tevent_req *cli_posix_chown_chmod_internal_send(TALLOC_CTX *mem_ctx,
|
|
struct tevent_context *ev,
|
|
struct cli_state *cli,
|
|
const char *fname,
|
|
uint32_t mode,
|
|
uint32_t uid,
|
|
uint32_t gid)
|
|
{
|
|
struct tevent_req *req = NULL, *subreq = NULL;
|
|
struct cli_posix_chown_chmod_internal_state *state = NULL;
|
|
|
|
req = tevent_req_create(mem_ctx, &state,
|
|
struct cli_posix_chown_chmod_internal_state);
|
|
if (req == NULL) {
|
|
return NULL;
|
|
}
|
|
|
|
memset(state->data, 0xff, 40); /* Set all sizes/times to no change. */
|
|
SIVAL(state->data,40,uid);
|
|
SIVAL(state->data,48,gid);
|
|
SIVAL(state->data,84,mode);
|
|
|
|
subreq = cli_setpathinfo_send(state, ev, cli, SMB_SET_FILE_UNIX_BASIC,
|
|
fname, state->data, sizeof(state->data));
|
|
if (tevent_req_nomem(subreq, req)) {
|
|
return tevent_req_post(req, ev);
|
|
}
|
|
tevent_req_set_callback(subreq, cli_posix_chown_chmod_internal_done,
|
|
req);
|
|
return req;
|
|
}
|
|
|
|
static void cli_posix_chown_chmod_internal_done(struct tevent_req *subreq)
|
|
{
|
|
NTSTATUS status = cli_setpathinfo_recv(subreq);
|
|
tevent_req_simple_finish_ntstatus(subreq, status);
|
|
}
|
|
|
|
static NTSTATUS cli_posix_chown_chmod_internal_recv(struct tevent_req *req)
|
|
{
|
|
return tevent_req_simple_recv_ntstatus(req);
|
|
}
|
|
|
|
/****************************************************************************
|
|
chmod a file (UNIX extensions).
|
|
****************************************************************************/
|
|
|
|
struct cli_posix_chmod_state {
|
|
uint8_t dummy;
|
|
};
|
|
|
|
static void cli_posix_chmod_done(struct tevent_req *subreq);
|
|
|
|
struct tevent_req *cli_posix_chmod_send(TALLOC_CTX *mem_ctx,
|
|
struct tevent_context *ev,
|
|
struct cli_state *cli,
|
|
const char *fname,
|
|
mode_t mode)
|
|
{
|
|
struct tevent_req *req = NULL, *subreq = NULL;
|
|
struct cli_posix_chmod_state *state = NULL;
|
|
|
|
req = tevent_req_create(mem_ctx, &state, struct cli_posix_chmod_state);
|
|
if (req == NULL) {
|
|
return NULL;
|
|
}
|
|
|
|
subreq = cli_posix_chown_chmod_internal_send(
|
|
state,
|
|
ev,
|
|
cli,
|
|
fname,
|
|
unix_perms_to_wire(mode),
|
|
SMB_UID_NO_CHANGE,
|
|
SMB_GID_NO_CHANGE);
|
|
if (tevent_req_nomem(subreq, req)) {
|
|
return tevent_req_post(req, ev);
|
|
}
|
|
tevent_req_set_callback(subreq, cli_posix_chmod_done, req);
|
|
return req;
|
|
}
|
|
|
|
static void cli_posix_chmod_done(struct tevent_req *subreq)
|
|
{
|
|
NTSTATUS status = cli_posix_chown_chmod_internal_recv(subreq);
|
|
tevent_req_simple_finish_ntstatus(subreq, status);
|
|
}
|
|
|
|
NTSTATUS cli_posix_chmod_recv(struct tevent_req *req)
|
|
{
|
|
return tevent_req_simple_recv_ntstatus(req);
|
|
}
|
|
|
|
NTSTATUS cli_posix_chmod(struct cli_state *cli, const char *fname, mode_t mode)
|
|
{
|
|
TALLOC_CTX *frame = talloc_stackframe();
|
|
struct tevent_context *ev = NULL;
|
|
struct tevent_req *req = NULL;
|
|
NTSTATUS status = NT_STATUS_OK;
|
|
|
|
if (smbXcli_conn_has_async_calls(cli->conn)) {
|
|
/*
|
|
* Can't use sync call while an async call is in flight
|
|
*/
|
|
status = NT_STATUS_INVALID_PARAMETER;
|
|
goto fail;
|
|
}
|
|
|
|
ev = samba_tevent_context_init(frame);
|
|
if (ev == NULL) {
|
|
status = NT_STATUS_NO_MEMORY;
|
|
goto fail;
|
|
}
|
|
|
|
req = cli_posix_chmod_send(frame,
|
|
ev,
|
|
cli,
|
|
fname,
|
|
mode);
|
|
if (req == NULL) {
|
|
status = NT_STATUS_NO_MEMORY;
|
|
goto fail;
|
|
}
|
|
|
|
if (!tevent_req_poll_ntstatus(req, ev, &status)) {
|
|
goto fail;
|
|
}
|
|
|
|
status = cli_posix_chmod_recv(req);
|
|
|
|
fail:
|
|
TALLOC_FREE(frame);
|
|
return status;
|
|
}
|
|
|
|
/****************************************************************************
|
|
chown a file (UNIX extensions).
|
|
****************************************************************************/
|
|
|
|
struct cli_posix_chown_state {
|
|
uint8_t dummy;
|
|
};
|
|
|
|
static void cli_posix_chown_done(struct tevent_req *subreq);
|
|
|
|
struct tevent_req *cli_posix_chown_send(TALLOC_CTX *mem_ctx,
|
|
struct tevent_context *ev,
|
|
struct cli_state *cli,
|
|
const char *fname,
|
|
uid_t uid,
|
|
gid_t gid)
|
|
{
|
|
struct tevent_req *req = NULL, *subreq = NULL;
|
|
struct cli_posix_chown_state *state = NULL;
|
|
|
|
req = tevent_req_create(
|
|
mem_ctx, &state, struct cli_posix_chown_state);
|
|
if (req == NULL) {
|
|
return NULL;
|
|
}
|
|
|
|
subreq = cli_posix_chown_chmod_internal_send(
|
|
state,
|
|
ev,
|
|
cli,
|
|
fname,
|
|
SMB_MODE_NO_CHANGE,
|
|
(uint32_t)uid,
|
|
(uint32_t)gid);
|
|
if (tevent_req_nomem(subreq, req)) {
|
|
return tevent_req_post(req, ev);
|
|
}
|
|
tevent_req_set_callback(subreq, cli_posix_chown_done, req);
|
|
return req;
|
|
}
|
|
|
|
static void cli_posix_chown_done(struct tevent_req *subreq)
|
|
{
|
|
NTSTATUS status = cli_posix_chown_chmod_internal_recv(subreq);
|
|
tevent_req_simple_finish_ntstatus(subreq, status);
|
|
}
|
|
|
|
NTSTATUS cli_posix_chown_recv(struct tevent_req *req)
|
|
{
|
|
return tevent_req_simple_recv_ntstatus(req);
|
|
}
|
|
|
|
NTSTATUS cli_posix_chown(struct cli_state *cli,
|
|
const char *fname,
|
|
uid_t uid,
|
|
gid_t gid)
|
|
{
|
|
TALLOC_CTX *frame = talloc_stackframe();
|
|
struct tevent_context *ev = NULL;
|
|
struct tevent_req *req = NULL;
|
|
NTSTATUS status = NT_STATUS_OK;
|
|
|
|
if (smbXcli_conn_has_async_calls(cli->conn)) {
|
|
/*
|
|
* Can't use sync call while an async call is in flight
|
|
*/
|
|
status = NT_STATUS_INVALID_PARAMETER;
|
|
goto fail;
|
|
}
|
|
|
|
ev = samba_tevent_context_init(frame);
|
|
if (ev == NULL) {
|
|
status = NT_STATUS_NO_MEMORY;
|
|
goto fail;
|
|
}
|
|
|
|
req = cli_posix_chown_send(frame,
|
|
ev,
|
|
cli,
|
|
fname,
|
|
uid,
|
|
gid);
|
|
if (req == NULL) {
|
|
status = NT_STATUS_NO_MEMORY;
|
|
goto fail;
|
|
}
|
|
|
|
if (!tevent_req_poll_ntstatus(req, ev, &status)) {
|
|
goto fail;
|
|
}
|
|
|
|
status = cli_posix_chown_recv(req);
|
|
|
|
fail:
|
|
TALLOC_FREE(frame);
|
|
return status;
|
|
}
|
|
|
|
struct cli_smb1_posix_mknod_state {
|
|
uint8_t data[100];
|
|
};
|
|
|
|
static void cli_smb1_posix_mknod_done(struct tevent_req *subreq);
|
|
|
|
static struct tevent_req *cli_smb1_posix_mknod_send(
|
|
TALLOC_CTX *mem_ctx,
|
|
struct tevent_context *ev,
|
|
struct cli_state *cli,
|
|
const char *fname,
|
|
mode_t mode,
|
|
dev_t dev)
|
|
{
|
|
struct tevent_req *req = NULL, *subreq = NULL;
|
|
struct cli_smb1_posix_mknod_state *state = NULL;
|
|
mode_t type = mode & S_IFMT;
|
|
uint32_t smb_unix_type = 0xFFFFFFFF;
|
|
|
|
req = tevent_req_create(
|
|
mem_ctx, &state, struct cli_smb1_posix_mknod_state);
|
|
if (req == NULL) {
|
|
return NULL;
|
|
}
|
|
/*
|
|
* Set all sizes/times/ids to no change.
|
|
*/
|
|
memset(state->data, 0xff, 56);
|
|
|
|
switch (type) {
|
|
case S_IFREG:
|
|
smb_unix_type = UNIX_TYPE_FILE;
|
|
break;
|
|
case S_IFDIR:
|
|
smb_unix_type = UNIX_TYPE_DIR;
|
|
break;
|
|
case S_IFLNK:
|
|
smb_unix_type = UNIX_TYPE_SYMLINK;
|
|
break;
|
|
case S_IFCHR:
|
|
smb_unix_type = UNIX_TYPE_CHARDEV;
|
|
break;
|
|
case S_IFBLK:
|
|
smb_unix_type = UNIX_TYPE_BLKDEV;
|
|
break;
|
|
case S_IFIFO:
|
|
smb_unix_type = UNIX_TYPE_FIFO;
|
|
break;
|
|
case S_IFSOCK:
|
|
smb_unix_type = UNIX_TYPE_SOCKET;
|
|
break;
|
|
}
|
|
PUSH_LE_U32(state->data, 56, smb_unix_type);
|
|
|
|
if ((type == S_IFCHR) || (type == S_IFBLK)) {
|
|
PUSH_LE_U64(state->data, 60, unix_dev_major(dev));
|
|
PUSH_LE_U64(state->data, 68, unix_dev_minor(dev));
|
|
}
|
|
|
|
PUSH_LE_U32(state->data, 84, unix_perms_to_wire(mode));
|
|
|
|
subreq = cli_setpathinfo_send(
|
|
state,
|
|
ev,
|
|
cli,
|
|
SMB_SET_FILE_UNIX_BASIC,
|
|
fname,
|
|
state->data,
|
|
sizeof(state->data));
|
|
if (tevent_req_nomem(subreq, req)) {
|
|
return tevent_req_post(req, ev);
|
|
}
|
|
tevent_req_set_callback(subreq, cli_smb1_posix_mknod_done, req);
|
|
return req;
|
|
}
|
|
|
|
static void cli_smb1_posix_mknod_done(struct tevent_req *subreq)
|
|
{
|
|
NTSTATUS status = cli_setpathinfo_recv(subreq);
|
|
tevent_req_simple_finish_ntstatus(subreq, status);
|
|
}
|
|
|
|
static NTSTATUS cli_smb1_posix_mknod_recv(struct tevent_req *req)
|
|
{
|
|
return tevent_req_simple_recv_ntstatus(req);
|
|
}
|
|
|
|
struct cli_mknod_state {
|
|
uint8_t buf[24];
|
|
};
|
|
|
|
static void cli_mknod_done1(struct tevent_req *subreq);
|
|
static void cli_mknod_reparse_done(struct tevent_req *subreq);
|
|
|
|
struct tevent_req *cli_mknod_send(
|
|
TALLOC_CTX *mem_ctx,
|
|
struct tevent_context *ev,
|
|
struct cli_state *cli,
|
|
const char *fname,
|
|
mode_t mode,
|
|
dev_t dev)
|
|
{
|
|
struct tevent_req *req = NULL, *subreq = NULL;
|
|
struct cli_mknod_state *state = NULL;
|
|
struct reparse_data_buffer reparse_buf = {
|
|
.tag = IO_REPARSE_TAG_NFS,
|
|
};
|
|
struct nfs_reparse_data_buffer *nfs = &reparse_buf.parsed.nfs;
|
|
ssize_t buflen;
|
|
|
|
req = tevent_req_create(mem_ctx, &state, struct cli_mknod_state);
|
|
if (req == NULL) {
|
|
return NULL;
|
|
}
|
|
|
|
if (cli->requested_posix_capabilities != 0) {
|
|
subreq = cli_smb1_posix_mknod_send(
|
|
state, ev, cli, fname, mode, dev);
|
|
if (tevent_req_nomem(subreq, req)) {
|
|
return tevent_req_post(req, ev);
|
|
}
|
|
tevent_req_set_callback(subreq, cli_mknod_done1, req);
|
|
return req;
|
|
}
|
|
|
|
/*
|
|
* Ignored for all but BLK and CHR
|
|
*/
|
|
nfs->data.dev.major = major(dev);
|
|
nfs->data.dev.minor = minor(dev);
|
|
|
|
switch (mode & S_IFMT) {
|
|
case S_IFIFO:
|
|
nfs->type = NFS_SPECFILE_FIFO;
|
|
break;
|
|
case S_IFSOCK:
|
|
nfs->type = NFS_SPECFILE_SOCK;
|
|
break;
|
|
case S_IFCHR:
|
|
nfs->type = NFS_SPECFILE_CHR;
|
|
break;
|
|
case S_IFBLK:
|
|
nfs->type = NFS_SPECFILE_BLK;
|
|
break;
|
|
}
|
|
|
|
buflen = reparse_data_buffer_marshall(&reparse_buf,
|
|
state->buf,
|
|
sizeof(state->buf));
|
|
if ((buflen == -1) || (buflen > sizeof(state->buf))) {
|
|
tevent_req_nterror(req, NT_STATUS_INTERNAL_ERROR);
|
|
return tevent_req_post(req, ev);
|
|
}
|
|
|
|
subreq = cli_create_reparse_point_send(state,
|
|
ev,
|
|
cli,
|
|
fname,
|
|
(DATA_BLOB){
|
|
.data = state->buf,
|
|
.length = buflen,
|
|
});
|
|
if (tevent_req_nomem(subreq, req)) {
|
|
return tevent_req_post(req, ev);
|
|
}
|
|
tevent_req_set_callback(subreq, cli_mknod_reparse_done, req);
|
|
return req;
|
|
}
|
|
|
|
static void cli_mknod_done1(struct tevent_req *subreq)
|
|
{
|
|
NTSTATUS status = cli_smb1_posix_mknod_recv(subreq);
|
|
tevent_req_simple_finish_ntstatus(subreq, status);
|
|
}
|
|
|
|
static void cli_mknod_reparse_done(struct tevent_req *subreq)
|
|
{
|
|
NTSTATUS status = cli_create_reparse_point_recv(subreq);
|
|
tevent_req_simple_finish_ntstatus(subreq, status);
|
|
}
|
|
|
|
NTSTATUS cli_mknod_recv(struct tevent_req *req)
|
|
{
|
|
return tevent_req_simple_recv_ntstatus(req);
|
|
}
|
|
|
|
NTSTATUS
|
|
cli_mknod(struct cli_state *cli, const char *fname, mode_t mode, dev_t dev)
|
|
{
|
|
TALLOC_CTX *frame = talloc_stackframe();
|
|
struct tevent_context *ev;
|
|
struct tevent_req *req;
|
|
NTSTATUS status = NT_STATUS_NO_MEMORY;
|
|
|
|
if (smbXcli_conn_has_async_calls(cli->conn)) {
|
|
/*
|
|
* Can't use sync call while an async call is in flight
|
|
*/
|
|
status = NT_STATUS_INVALID_PARAMETER;
|
|
goto fail;
|
|
}
|
|
ev = samba_tevent_context_init(frame);
|
|
if (ev == NULL) {
|
|
goto fail;
|
|
}
|
|
req = cli_mknod_send(ev, ev, cli, fname, mode, dev);
|
|
if (req == NULL) {
|
|
goto fail;
|
|
}
|
|
if (!tevent_req_poll_ntstatus(req, ev, &status)) {
|
|
goto fail;
|
|
}
|
|
status = cli_mknod_recv(req);
|
|
fail:
|
|
TALLOC_FREE(frame);
|
|
return status;
|
|
}
|
|
|
|
/****************************************************************************
|
|
Rename a file.
|
|
****************************************************************************/
|
|
|
|
struct cli_smb1_rename_state {
|
|
uint8_t *data;
|
|
};
|
|
|
|
static void cli_smb1_rename_done(struct tevent_req *subreq);
|
|
|
|
static struct tevent_req *cli_smb1_rename_send(TALLOC_CTX *mem_ctx,
|
|
struct tevent_context *ev,
|
|
struct cli_state *cli,
|
|
const char *fname_src,
|
|
const char *fname_dst,
|
|
bool replace)
|
|
{
|
|
NTSTATUS status;
|
|
struct tevent_req *req = NULL, *subreq = NULL;
|
|
struct cli_smb1_rename_state *state = NULL;
|
|
smb_ucs2_t *converted_str = NULL;
|
|
size_t converted_size_bytes = 0;
|
|
|
|
req = tevent_req_create(mem_ctx, &state, struct cli_smb1_rename_state);
|
|
if (req == NULL) {
|
|
return NULL;
|
|
}
|
|
|
|
/*
|
|
* Strip a MSDFS path from fname_dst if we were given one.
|
|
*/
|
|
status = cli_dfs_target_check(state,
|
|
cli,
|
|
fname_dst,
|
|
&fname_dst);
|
|
if (!NT_STATUS_IS_OK(status)) {
|
|
goto fail;
|
|
}
|
|
|
|
if (!push_ucs2_talloc(talloc_tos(), &converted_str, fname_dst,
|
|
&converted_size_bytes)) {
|
|
status = NT_STATUS_INVALID_PARAMETER;
|
|
goto fail;
|
|
}
|
|
|
|
/* W2K8 insists the dest name is not null
|
|
terminated. Remove the last 2 zero bytes
|
|
and reduce the name length. */
|
|
|
|
if (converted_size_bytes < 2) {
|
|
status = NT_STATUS_INVALID_PARAMETER;
|
|
goto fail;
|
|
}
|
|
converted_size_bytes -= 2;
|
|
|
|
state->data =
|
|
talloc_zero_array(state, uint8_t, 12 + converted_size_bytes);
|
|
if (state->data == NULL) {
|
|
status = NT_STATUS_NO_MEMORY;
|
|
goto fail;
|
|
}
|
|
|
|
if (replace) {
|
|
SCVAL(state->data, 0, 1);
|
|
}
|
|
|
|
SIVAL(state->data, 8, converted_size_bytes);
|
|
memcpy(state->data + 12, converted_str, converted_size_bytes);
|
|
|
|
TALLOC_FREE(converted_str);
|
|
|
|
subreq = cli_setpathinfo_send(
|
|
state, ev, cli, SMB_FILE_RENAME_INFORMATION, fname_src, state->data,
|
|
talloc_get_size(state->data));
|
|
if (tevent_req_nomem(subreq, req)) {
|
|
status = NT_STATUS_NO_MEMORY;
|
|
goto fail;
|
|
}
|
|
tevent_req_set_callback(subreq, cli_smb1_rename_done, req);
|
|
return req;
|
|
|
|
fail:
|
|
TALLOC_FREE(converted_str);
|
|
tevent_req_nterror(req, status);
|
|
return tevent_req_post(req, ev);
|
|
}
|
|
|
|
static void cli_smb1_rename_done(struct tevent_req *subreq)
|
|
{
|
|
NTSTATUS status = cli_setpathinfo_recv(subreq);
|
|
tevent_req_simple_finish_ntstatus(subreq, status);
|
|
}
|
|
|
|
static NTSTATUS cli_smb1_rename_recv(struct tevent_req *req)
|
|
{
|
|
return tevent_req_simple_recv_ntstatus(req);
|
|
}
|
|
|
|
static void cli_cifs_rename_done(struct tevent_req *subreq);
|
|
|
|
struct cli_cifs_rename_state {
|
|
uint16_t vwv[1];
|
|
};
|
|
|
|
static struct tevent_req *cli_cifs_rename_send(TALLOC_CTX *mem_ctx,
|
|
struct tevent_context *ev,
|
|
struct cli_state *cli,
|
|
const char *fname_src,
|
|
const char *fname_dst,
|
|
bool replace)
|
|
{
|
|
struct tevent_req *req = NULL, *subreq = NULL;
|
|
struct cli_cifs_rename_state *state = NULL;
|
|
uint8_t additional_flags = 0;
|
|
uint16_t additional_flags2 = 0;
|
|
uint8_t *bytes = NULL;
|
|
char *fname_src_cp = NULL;
|
|
char *fname_dst_cp = NULL;
|
|
|
|
req = tevent_req_create(mem_ctx, &state, struct cli_cifs_rename_state);
|
|
if (req == NULL) {
|
|
return NULL;
|
|
}
|
|
|
|
if (replace) {
|
|
/*
|
|
* CIFS doesn't support replace
|
|
*/
|
|
tevent_req_nterror(req, NT_STATUS_INVALID_PARAMETER);
|
|
return tevent_req_post(req, ev);
|
|
}
|
|
|
|
SSVAL(state->vwv+0, 0, FILE_ATTRIBUTE_SYSTEM | FILE_ATTRIBUTE_HIDDEN | FILE_ATTRIBUTE_DIRECTORY);
|
|
|
|
bytes = talloc_array(state, uint8_t, 1);
|
|
if (tevent_req_nomem(bytes, req)) {
|
|
return tevent_req_post(req, ev);
|
|
}
|
|
|
|
/*
|
|
* SMBmv on a DFS share uses DFS names for src and dst.
|
|
* See smbtorture3: SMB1-DFS-PATHS: test_smb1_mv().
|
|
*/
|
|
|
|
fname_src_cp = smb1_dfs_share_path(state, cli, fname_src);
|
|
if (tevent_req_nomem(fname_src_cp, req)) {
|
|
return tevent_req_post(req, ev);
|
|
}
|
|
bytes[0] = 4;
|
|
bytes = smb_bytes_push_str(bytes,
|
|
smbXcli_conn_use_unicode(cli->conn),
|
|
fname_src_cp,
|
|
strlen(fname_src_cp)+1,
|
|
NULL);
|
|
if (tevent_req_nomem(bytes, req)) {
|
|
return tevent_req_post(req, ev);
|
|
}
|
|
|
|
if (clistr_is_previous_version_path(fname_src)) {
|
|
additional_flags2 = FLAGS2_REPARSE_PATH;
|
|
}
|
|
|
|
bytes = talloc_realloc(state, bytes, uint8_t,
|
|
talloc_get_size(bytes)+1);
|
|
if (tevent_req_nomem(bytes, req)) {
|
|
return tevent_req_post(req, ev);
|
|
}
|
|
|
|
/*
|
|
* SMBmv on a DFS share uses DFS names for src and dst.
|
|
* See smbtorture3: SMB1-DFS-PATHS: test_smb1_mv().
|
|
*/
|
|
|
|
fname_dst_cp = smb1_dfs_share_path(state, cli, fname_dst);
|
|
if (tevent_req_nomem(fname_dst_cp, req)) {
|
|
return tevent_req_post(req, ev);
|
|
}
|
|
bytes[talloc_get_size(bytes)-1] = 4;
|
|
bytes = smb_bytes_push_str(bytes,
|
|
smbXcli_conn_use_unicode(cli->conn),
|
|
fname_dst_cp,
|
|
strlen(fname_dst_cp)+1,
|
|
NULL);
|
|
if (tevent_req_nomem(bytes, req)) {
|
|
return tevent_req_post(req, ev);
|
|
}
|
|
|
|
subreq = cli_smb_send(state, ev, cli, SMBmv, additional_flags,
|
|
additional_flags2,
|
|
1, state->vwv, talloc_get_size(bytes), bytes);
|
|
if (tevent_req_nomem(subreq, req)) {
|
|
return tevent_req_post(req, ev);
|
|
}
|
|
tevent_req_set_callback(subreq, cli_cifs_rename_done, req);
|
|
return req;
|
|
}
|
|
|
|
static void cli_cifs_rename_done(struct tevent_req *subreq)
|
|
{
|
|
NTSTATUS status = cli_smb_recv(
|
|
subreq, NULL, NULL, 0, NULL, NULL, NULL, NULL);
|
|
tevent_req_simple_finish_ntstatus(subreq, status);
|
|
}
|
|
|
|
static NTSTATUS cli_cifs_rename_recv(struct tevent_req *req)
|
|
{
|
|
return tevent_req_simple_recv_ntstatus(req);
|
|
}
|
|
|
|
struct cli_rename_state {
|
|
uint8_t dummy;
|
|
};
|
|
|
|
static void cli_rename_done1(struct tevent_req *subreq);
|
|
static void cli_rename_done_cifs(struct tevent_req *subreq);
|
|
static void cli_rename_done2(struct tevent_req *subreq);
|
|
|
|
struct tevent_req *cli_rename_send(TALLOC_CTX *mem_ctx,
|
|
struct tevent_context *ev,
|
|
struct cli_state *cli,
|
|
const char *fname_src,
|
|
const char *fname_dst,
|
|
bool replace)
|
|
{
|
|
struct tevent_req *req = NULL, *subreq = NULL;
|
|
struct cli_rename_state *state = NULL;
|
|
|
|
req = tevent_req_create(mem_ctx, &state, struct cli_rename_state);
|
|
if (req == NULL) {
|
|
return NULL;
|
|
}
|
|
|
|
if (smbXcli_conn_protocol(cli->conn) >= PROTOCOL_SMB2_02) {
|
|
subreq = cli_smb2_rename_send(
|
|
state, ev, cli, fname_src, fname_dst, replace);
|
|
if (tevent_req_nomem(subreq, req)) {
|
|
return tevent_req_post(req, ev);
|
|
}
|
|
tevent_req_set_callback(subreq, cli_rename_done2, req);
|
|
return req;
|
|
}
|
|
|
|
if (replace && smbXcli_conn_support_passthrough(cli->conn)) {
|
|
subreq = cli_smb1_rename_send(
|
|
state, ev, cli, fname_src, fname_dst, replace);
|
|
if (tevent_req_nomem(subreq, req)) {
|
|
return tevent_req_post(req, ev);
|
|
}
|
|
tevent_req_set_callback(subreq, cli_rename_done1, req);
|
|
return req;
|
|
}
|
|
|
|
subreq = cli_cifs_rename_send(
|
|
state, ev, cli, fname_src,fname_dst, replace);
|
|
if (tevent_req_nomem(subreq, req)) {
|
|
return tevent_req_post(req, ev);
|
|
}
|
|
tevent_req_set_callback(subreq, cli_rename_done_cifs, req);
|
|
return req;
|
|
}
|
|
|
|
static void cli_rename_done1(struct tevent_req *subreq)
|
|
{
|
|
NTSTATUS status = cli_smb1_rename_recv(subreq);
|
|
tevent_req_simple_finish_ntstatus(subreq, status);
|
|
}
|
|
|
|
static void cli_rename_done_cifs(struct tevent_req *subreq)
|
|
{
|
|
NTSTATUS status = cli_cifs_rename_recv(subreq);
|
|
tevent_req_simple_finish_ntstatus(subreq, status);
|
|
}
|
|
|
|
static void cli_rename_done2(struct tevent_req *subreq)
|
|
{
|
|
NTSTATUS status = cli_smb2_rename_recv(subreq);
|
|
tevent_req_simple_finish_ntstatus(subreq, status);
|
|
}
|
|
|
|
NTSTATUS cli_rename_recv(struct tevent_req *req)
|
|
{
|
|
return tevent_req_simple_recv_ntstatus(req);
|
|
}
|
|
|
|
NTSTATUS cli_rename(struct cli_state *cli,
|
|
const char *fname_src,
|
|
const char *fname_dst,
|
|
bool replace)
|
|
{
|
|
TALLOC_CTX *frame = NULL;
|
|
struct tevent_context *ev;
|
|
struct tevent_req *req;
|
|
NTSTATUS status = NT_STATUS_OK;
|
|
|
|
frame = talloc_stackframe();
|
|
|
|
if (smbXcli_conn_has_async_calls(cli->conn)) {
|
|
/*
|
|
* Can't use sync call while an async call is in flight
|
|
*/
|
|
status = NT_STATUS_INVALID_PARAMETER;
|
|
goto fail;
|
|
}
|
|
|
|
ev = samba_tevent_context_init(frame);
|
|
if (ev == NULL) {
|
|
status = NT_STATUS_NO_MEMORY;
|
|
goto fail;
|
|
}
|
|
|
|
req = cli_rename_send(frame, ev, cli, fname_src, fname_dst, replace);
|
|
if (req == NULL) {
|
|
status = NT_STATUS_NO_MEMORY;
|
|
goto fail;
|
|
}
|
|
|
|
if (!tevent_req_poll_ntstatus(req, ev, &status)) {
|
|
goto fail;
|
|
}
|
|
|
|
status = cli_rename_recv(req);
|
|
cli->raw_status = status; /* cli_smb2_rename_recv doesn't set this */
|
|
|
|
fail:
|
|
TALLOC_FREE(frame);
|
|
return status;
|
|
}
|
|
|
|
/****************************************************************************
|
|
NT Rename a file.
|
|
****************************************************************************/
|
|
|
|
static void cli_ntrename_internal_done(struct tevent_req *subreq);
|
|
|
|
struct cli_ntrename_internal_state {
|
|
uint16_t vwv[4];
|
|
};
|
|
|
|
static struct tevent_req *cli_ntrename_internal_send(TALLOC_CTX *mem_ctx,
|
|
struct tevent_context *ev,
|
|
struct cli_state *cli,
|
|
const char *fname_src,
|
|
const char *fname_dst,
|
|
uint16_t rename_flag)
|
|
{
|
|
struct tevent_req *req = NULL, *subreq = NULL;
|
|
struct cli_ntrename_internal_state *state = NULL;
|
|
uint8_t additional_flags = 0;
|
|
uint16_t additional_flags2 = 0;
|
|
uint8_t *bytes = NULL;
|
|
char *fname_src_cp = NULL;
|
|
char *fname_dst_cp = NULL;
|
|
|
|
req = tevent_req_create(mem_ctx, &state,
|
|
struct cli_ntrename_internal_state);
|
|
if (req == NULL) {
|
|
return NULL;
|
|
}
|
|
|
|
SSVAL(state->vwv+0, 0 ,FILE_ATTRIBUTE_SYSTEM | FILE_ATTRIBUTE_HIDDEN | FILE_ATTRIBUTE_DIRECTORY);
|
|
SSVAL(state->vwv+1, 0, rename_flag);
|
|
|
|
bytes = talloc_array(state, uint8_t, 1);
|
|
if (tevent_req_nomem(bytes, req)) {
|
|
return tevent_req_post(req, ev);
|
|
}
|
|
/*
|
|
* SMBntrename on a DFS share uses DFS names for src and dst.
|
|
* See smbtorture3: SMB1-DFS-PATHS: test_smb1_ntrename_rename().
|
|
*/
|
|
fname_src_cp = smb1_dfs_share_path(state, cli, fname_src);
|
|
if (tevent_req_nomem(fname_src_cp, req)) {
|
|
return tevent_req_post(req, ev);
|
|
}
|
|
bytes[0] = 4;
|
|
bytes = smb_bytes_push_str(bytes,
|
|
smbXcli_conn_use_unicode(cli->conn),
|
|
fname_src_cp,
|
|
strlen(fname_src_cp)+1,
|
|
NULL);
|
|
if (tevent_req_nomem(bytes, req)) {
|
|
return tevent_req_post(req, ev);
|
|
}
|
|
|
|
if (clistr_is_previous_version_path(fname_src)) {
|
|
additional_flags2 = FLAGS2_REPARSE_PATH;
|
|
}
|
|
|
|
bytes = talloc_realloc(state, bytes, uint8_t,
|
|
talloc_get_size(bytes)+1);
|
|
if (tevent_req_nomem(bytes, req)) {
|
|
return tevent_req_post(req, ev);
|
|
}
|
|
|
|
/*
|
|
* SMBntrename on a DFS share uses DFS names for src and dst.
|
|
* See smbtorture3: SMB1-DFS-PATHS: test_smb1_ntrename_rename().
|
|
* and smbtorture3: SMB1-DFS-PATHS: test_smb1_ntrename_hardlink()
|
|
*/
|
|
fname_dst_cp = smb1_dfs_share_path(state, cli, fname_dst);
|
|
if (tevent_req_nomem(fname_dst_cp, req)) {
|
|
return tevent_req_post(req, ev);
|
|
}
|
|
bytes[talloc_get_size(bytes)-1] = 4;
|
|
bytes = smb_bytes_push_str(bytes,
|
|
smbXcli_conn_use_unicode(cli->conn),
|
|
fname_dst_cp,
|
|
strlen(fname_dst_cp)+1,
|
|
NULL);
|
|
if (tevent_req_nomem(bytes, req)) {
|
|
return tevent_req_post(req, ev);
|
|
}
|
|
|
|
subreq = cli_smb_send(state, ev, cli, SMBntrename, additional_flags,
|
|
additional_flags2,
|
|
4, state->vwv, talloc_get_size(bytes), bytes);
|
|
if (tevent_req_nomem(subreq, req)) {
|
|
return tevent_req_post(req, ev);
|
|
}
|
|
tevent_req_set_callback(subreq, cli_ntrename_internal_done, req);
|
|
return req;
|
|
}
|
|
|
|
static void cli_ntrename_internal_done(struct tevent_req *subreq)
|
|
{
|
|
NTSTATUS status = cli_smb_recv(
|
|
subreq, NULL, NULL, 0, NULL, NULL, NULL, NULL);
|
|
tevent_req_simple_finish_ntstatus(subreq, status);
|
|
}
|
|
|
|
static NTSTATUS cli_ntrename_internal_recv(struct tevent_req *req)
|
|
{
|
|
return tevent_req_simple_recv_ntstatus(req);
|
|
}
|
|
|
|
struct tevent_req *cli_ntrename_send(TALLOC_CTX *mem_ctx,
|
|
struct tevent_context *ev,
|
|
struct cli_state *cli,
|
|
const char *fname_src,
|
|
const char *fname_dst)
|
|
{
|
|
return cli_ntrename_internal_send(mem_ctx,
|
|
ev,
|
|
cli,
|
|
fname_src,
|
|
fname_dst,
|
|
RENAME_FLAG_RENAME);
|
|
}
|
|
|
|
NTSTATUS cli_ntrename_recv(struct tevent_req *req)
|
|
{
|
|
return cli_ntrename_internal_recv(req);
|
|
}
|
|
|
|
NTSTATUS cli_ntrename(struct cli_state *cli, const char *fname_src, const char *fname_dst)
|
|
{
|
|
TALLOC_CTX *frame = talloc_stackframe();
|
|
struct tevent_context *ev;
|
|
struct tevent_req *req;
|
|
NTSTATUS status = NT_STATUS_OK;
|
|
|
|
if (smbXcli_conn_has_async_calls(cli->conn)) {
|
|
/*
|
|
* Can't use sync call while an async call is in flight
|
|
*/
|
|
status = NT_STATUS_INVALID_PARAMETER;
|
|
goto fail;
|
|
}
|
|
|
|
ev = samba_tevent_context_init(frame);
|
|
if (ev == NULL) {
|
|
status = NT_STATUS_NO_MEMORY;
|
|
goto fail;
|
|
}
|
|
|
|
req = cli_ntrename_send(frame, ev, cli, fname_src, fname_dst);
|
|
if (req == NULL) {
|
|
status = NT_STATUS_NO_MEMORY;
|
|
goto fail;
|
|
}
|
|
|
|
if (!tevent_req_poll_ntstatus(req, ev, &status)) {
|
|
goto fail;
|
|
}
|
|
|
|
status = cli_ntrename_recv(req);
|
|
|
|
fail:
|
|
TALLOC_FREE(frame);
|
|
return status;
|
|
}
|
|
|
|
/****************************************************************************
|
|
NT hardlink a file.
|
|
****************************************************************************/
|
|
|
|
static struct tevent_req *cli_nt_hardlink_send(TALLOC_CTX *mem_ctx,
|
|
struct tevent_context *ev,
|
|
struct cli_state *cli,
|
|
const char *fname_src,
|
|
const char *fname_dst)
|
|
{
|
|
return cli_ntrename_internal_send(mem_ctx,
|
|
ev,
|
|
cli,
|
|
fname_src,
|
|
fname_dst,
|
|
RENAME_FLAG_HARD_LINK);
|
|
}
|
|
|
|
static NTSTATUS cli_nt_hardlink_recv(struct tevent_req *req)
|
|
{
|
|
return cli_ntrename_internal_recv(req);
|
|
}
|
|
|
|
struct cli_smb2_hardlink_state {
|
|
struct tevent_context *ev;
|
|
struct cli_state *cli;
|
|
uint16_t fnum_src;
|
|
const char *fname_dst;
|
|
bool overwrite;
|
|
NTSTATUS status;
|
|
};
|
|
|
|
static void cli_smb2_hardlink_opened(struct tevent_req *subreq);
|
|
static void cli_smb2_hardlink_info_set(struct tevent_req *subreq);
|
|
static void cli_smb2_hardlink_closed(struct tevent_req *subreq);
|
|
|
|
static struct tevent_req *cli_smb2_hardlink_send(
|
|
TALLOC_CTX *mem_ctx,
|
|
struct tevent_context *ev,
|
|
struct cli_state *cli,
|
|
const char *fname_src,
|
|
const char *fname_dst,
|
|
bool overwrite,
|
|
struct smb2_create_blobs *in_cblobs)
|
|
{
|
|
struct tevent_req *req = NULL, *subreq = NULL;
|
|
struct cli_smb2_hardlink_state *state = NULL;
|
|
NTSTATUS status;
|
|
|
|
req = tevent_req_create(
|
|
mem_ctx, &state, struct cli_smb2_hardlink_state);
|
|
if (req == NULL) {
|
|
return NULL;
|
|
}
|
|
|
|
/*
|
|
* Strip a MSDFS path from fname_dst if we were given one.
|
|
*/
|
|
status = cli_dfs_target_check(state,
|
|
cli,
|
|
fname_dst,
|
|
&fname_dst);
|
|
if (tevent_req_nterror(req, status)) {
|
|
return tevent_req_post(req, ev);
|
|
}
|
|
|
|
state->ev = ev;
|
|
state->cli = cli;
|
|
state->fname_dst = fname_dst;
|
|
state->overwrite = overwrite;
|
|
|
|
subreq = cli_smb2_create_fnum_send(
|
|
state,
|
|
ev,
|
|
cli,
|
|
fname_src,
|
|
(struct cli_smb2_create_flags){0},
|
|
SMB2_IMPERSONATION_IMPERSONATION,
|
|
FILE_WRITE_ATTRIBUTES,
|
|
0, /* file attributes */
|
|
FILE_SHARE_READ|
|
|
FILE_SHARE_WRITE|
|
|
FILE_SHARE_DELETE, /* share_access */
|
|
FILE_OPEN, /* create_disposition */
|
|
FILE_NON_DIRECTORY_FILE, /* no hardlinks on directories */
|
|
in_cblobs);
|
|
if (tevent_req_nomem(subreq, req)) {
|
|
return tevent_req_post(req, ev);
|
|
}
|
|
tevent_req_set_callback(subreq, cli_smb2_hardlink_opened, req);
|
|
return req;
|
|
}
|
|
|
|
static void cli_smb2_hardlink_opened(struct tevent_req *subreq)
|
|
{
|
|
struct tevent_req *req = tevent_req_callback_data(
|
|
subreq, struct tevent_req);
|
|
struct cli_smb2_hardlink_state *state = tevent_req_data(
|
|
req, struct cli_smb2_hardlink_state);
|
|
NTSTATUS status;
|
|
smb_ucs2_t *ucs2_dst;
|
|
size_t ucs2_len;
|
|
DATA_BLOB inbuf;
|
|
bool ok;
|
|
|
|
status = cli_smb2_create_fnum_recv(
|
|
subreq, &state->fnum_src, NULL, NULL, NULL, NULL);
|
|
TALLOC_FREE(subreq);
|
|
if (tevent_req_nterror(req, status)) {
|
|
return;
|
|
}
|
|
|
|
ok = push_ucs2_talloc(state, &ucs2_dst, state->fname_dst, &ucs2_len);
|
|
if (!ok || (ucs2_len < 2)) {
|
|
tevent_req_nterror(req, NT_STATUS_INVALID_PARAMETER);
|
|
return;
|
|
}
|
|
/* Don't 0-terminate the name */
|
|
ucs2_len -= 2;
|
|
|
|
inbuf = data_blob_talloc_zero(state, ucs2_len + 20);
|
|
if (tevent_req_nomem(inbuf.data, req)) {
|
|
return;
|
|
}
|
|
|
|
if (state->overwrite) {
|
|
SCVAL(inbuf.data, 0, 1);
|
|
}
|
|
SIVAL(inbuf.data, 16, ucs2_len);
|
|
memcpy(inbuf.data + 20, ucs2_dst, ucs2_len);
|
|
TALLOC_FREE(ucs2_dst);
|
|
|
|
subreq = cli_smb2_set_info_fnum_send(
|
|
state,
|
|
state->ev,
|
|
state->cli,
|
|
state->fnum_src,
|
|
1, /* in_info_type */
|
|
SMB_FILE_LINK_INFORMATION - 1000, /* in_file_info_class */
|
|
&inbuf,
|
|
0); /* in_additional_info */
|
|
if (tevent_req_nomem(subreq, req)) {
|
|
return;
|
|
}
|
|
tevent_req_set_callback(subreq, cli_smb2_hardlink_info_set, req);
|
|
}
|
|
|
|
static void cli_smb2_hardlink_info_set(struct tevent_req *subreq)
|
|
{
|
|
struct tevent_req *req = tevent_req_callback_data(
|
|
subreq, struct tevent_req);
|
|
struct cli_smb2_hardlink_state *state = tevent_req_data(
|
|
req, struct cli_smb2_hardlink_state);
|
|
|
|
state->status = cli_smb2_set_info_fnum_recv(subreq);
|
|
TALLOC_FREE(subreq);
|
|
|
|
/* ignore error here, we need to close the file */
|
|
|
|
subreq = cli_smb2_close_fnum_send(state,
|
|
state->ev,
|
|
state->cli,
|
|
state->fnum_src,
|
|
0);
|
|
if (tevent_req_nomem(subreq, req)) {
|
|
return;
|
|
}
|
|
tevent_req_set_callback(subreq, cli_smb2_hardlink_closed, req);
|
|
}
|
|
|
|
static void cli_smb2_hardlink_closed(struct tevent_req *subreq)
|
|
{
|
|
NTSTATUS status = cli_smb2_close_fnum_recv(subreq);
|
|
tevent_req_simple_finish_ntstatus(subreq, status);
|
|
}
|
|
|
|
static NTSTATUS cli_smb2_hardlink_recv(struct tevent_req *req)
|
|
{
|
|
struct cli_smb2_hardlink_state *state = tevent_req_data(
|
|
req, struct cli_smb2_hardlink_state);
|
|
NTSTATUS status;
|
|
|
|
if (tevent_req_is_nterror(req, &status)) {
|
|
return status;
|
|
}
|
|
return state->status;
|
|
}
|
|
|
|
struct cli_hardlink_state {
|
|
uint8_t dummy;
|
|
};
|
|
|
|
static void cli_hardlink_done(struct tevent_req *subreq);
|
|
static void cli_hardlink_done2(struct tevent_req *subreq);
|
|
|
|
struct tevent_req *cli_hardlink_send(
|
|
TALLOC_CTX *mem_ctx,
|
|
struct tevent_context *ev,
|
|
struct cli_state *cli,
|
|
const char *fname_src,
|
|
const char *fname_dst)
|
|
{
|
|
struct tevent_req *req = NULL, *subreq = NULL;
|
|
struct cli_hardlink_state *state;
|
|
|
|
req = tevent_req_create(mem_ctx, &state, struct cli_hardlink_state);
|
|
if (req == NULL) {
|
|
return NULL;
|
|
}
|
|
|
|
if (smbXcli_conn_protocol(cli->conn) >= PROTOCOL_SMB2_02) {
|
|
subreq = cli_smb2_hardlink_send(
|
|
state, ev, cli, fname_src, fname_dst, false, NULL);
|
|
if (tevent_req_nomem(subreq, req)) {
|
|
return tevent_req_post(req, ev);
|
|
}
|
|
tevent_req_set_callback(subreq, cli_hardlink_done2, req);
|
|
return req;
|
|
}
|
|
|
|
subreq = cli_nt_hardlink_send(state, ev, cli, fname_src, fname_dst);
|
|
if (tevent_req_nomem(subreq, req)) {
|
|
return tevent_req_post(req, ev);
|
|
}
|
|
tevent_req_set_callback(subreq, cli_hardlink_done, req);
|
|
return req;
|
|
}
|
|
|
|
static void cli_hardlink_done(struct tevent_req *subreq)
|
|
{
|
|
NTSTATUS status = cli_nt_hardlink_recv(subreq);
|
|
tevent_req_simple_finish_ntstatus(subreq, status);
|
|
}
|
|
|
|
static void cli_hardlink_done2(struct tevent_req *subreq)
|
|
{
|
|
NTSTATUS status = cli_smb2_hardlink_recv(subreq);
|
|
tevent_req_simple_finish_ntstatus(subreq, status);
|
|
}
|
|
|
|
NTSTATUS cli_hardlink_recv(struct tevent_req *req)
|
|
{
|
|
return tevent_req_simple_recv_ntstatus(req);
|
|
}
|
|
|
|
NTSTATUS cli_hardlink(
|
|
struct cli_state *cli, const char *fname_src, const char *fname_dst)
|
|
{
|
|
TALLOC_CTX *frame = talloc_stackframe();
|
|
struct tevent_context *ev = NULL;
|
|
struct tevent_req *req = NULL;
|
|
NTSTATUS status = NT_STATUS_NO_MEMORY;
|
|
|
|
if (smbXcli_conn_has_async_calls(cli->conn)) {
|
|
status = NT_STATUS_INVALID_PARAMETER;
|
|
goto fail;
|
|
}
|
|
ev = samba_tevent_context_init(frame);
|
|
if (ev == NULL) {
|
|
goto fail;
|
|
}
|
|
req = cli_hardlink_send(frame, ev, cli, fname_src, fname_dst);
|
|
if (req == NULL) {
|
|
goto fail;
|
|
}
|
|
if (!tevent_req_poll_ntstatus(req, ev, &status)) {
|
|
goto fail;
|
|
}
|
|
status = cli_hardlink_recv(req);
|
|
fail:
|
|
TALLOC_FREE(frame);
|
|
return status;
|
|
}
|
|
|
|
/****************************************************************************
|
|
Delete a file.
|
|
****************************************************************************/
|
|
|
|
static void cli_unlink_done(struct tevent_req *subreq);
|
|
static void cli_unlink_done2(struct tevent_req *subreq);
|
|
|
|
struct cli_unlink_state {
|
|
uint16_t vwv[1];
|
|
};
|
|
|
|
struct tevent_req *cli_unlink_send(TALLOC_CTX *mem_ctx,
|
|
struct tevent_context *ev,
|
|
struct cli_state *cli,
|
|
const char *fname,
|
|
uint32_t mayhave_attrs)
|
|
{
|
|
struct tevent_req *req = NULL, *subreq = NULL;
|
|
struct cli_unlink_state *state = NULL;
|
|
uint8_t additional_flags = 0;
|
|
uint16_t additional_flags2 = 0;
|
|
uint8_t *bytes = NULL;
|
|
char *fname_cp = NULL;
|
|
|
|
req = tevent_req_create(mem_ctx, &state, struct cli_unlink_state);
|
|
if (req == NULL) {
|
|
return NULL;
|
|
}
|
|
|
|
if (smbXcli_conn_protocol(cli->conn) >= PROTOCOL_SMB2_02) {
|
|
subreq = cli_smb2_unlink_send(state, ev, cli, fname, NULL);
|
|
if (tevent_req_nomem(subreq, req)) {
|
|
return tevent_req_post(req, ev);
|
|
}
|
|
tevent_req_set_callback(subreq, cli_unlink_done2, req);
|
|
return req;
|
|
}
|
|
|
|
if (mayhave_attrs & 0xFFFF0000) {
|
|
/*
|
|
* Don't allow attributes greater than
|
|
* 16-bits for a 16-bit protocol value.
|
|
*/
|
|
if (tevent_req_nterror(req, NT_STATUS_INVALID_PARAMETER)) {
|
|
return tevent_req_post(req, ev);
|
|
}
|
|
}
|
|
|
|
SSVAL(state->vwv+0, 0, mayhave_attrs);
|
|
|
|
bytes = talloc_array(state, uint8_t, 1);
|
|
if (tevent_req_nomem(bytes, req)) {
|
|
return tevent_req_post(req, ev);
|
|
}
|
|
/*
|
|
* SMBunlink on a DFS share must use DFS names.
|
|
*/
|
|
fname_cp = smb1_dfs_share_path(state, cli, fname);
|
|
if (tevent_req_nomem(fname_cp, req)) {
|
|
return tevent_req_post(req, ev);
|
|
}
|
|
bytes[0] = 4;
|
|
bytes = smb_bytes_push_str(bytes,
|
|
smbXcli_conn_use_unicode(cli->conn),
|
|
fname_cp,
|
|
strlen(fname_cp)+1,
|
|
NULL);
|
|
|
|
if (tevent_req_nomem(bytes, req)) {
|
|
return tevent_req_post(req, ev);
|
|
}
|
|
|
|
if (clistr_is_previous_version_path(fname)) {
|
|
additional_flags2 = FLAGS2_REPARSE_PATH;
|
|
}
|
|
|
|
subreq = cli_smb_send(state, ev, cli, SMBunlink, additional_flags,
|
|
additional_flags2,
|
|
1, state->vwv, talloc_get_size(bytes), bytes);
|
|
if (tevent_req_nomem(subreq, req)) {
|
|
return tevent_req_post(req, ev);
|
|
}
|
|
tevent_req_set_callback(subreq, cli_unlink_done, req);
|
|
return req;
|
|
}
|
|
|
|
static void cli_unlink_done(struct tevent_req *subreq)
|
|
{
|
|
NTSTATUS status = cli_smb_recv(
|
|
subreq, NULL, NULL, 0, NULL, NULL, NULL, NULL);
|
|
tevent_req_simple_finish_ntstatus(subreq, status);
|
|
}
|
|
|
|
static void cli_unlink_done2(struct tevent_req *subreq)
|
|
{
|
|
NTSTATUS status = cli_smb2_unlink_recv(subreq);
|
|
tevent_req_simple_finish_ntstatus(subreq, status);
|
|
}
|
|
|
|
NTSTATUS cli_unlink_recv(struct tevent_req *req)
|
|
{
|
|
return tevent_req_simple_recv_ntstatus(req);
|
|
}
|
|
|
|
NTSTATUS cli_unlink(struct cli_state *cli, const char *fname, uint32_t mayhave_attrs)
|
|
{
|
|
TALLOC_CTX *frame = NULL;
|
|
struct tevent_context *ev;
|
|
struct tevent_req *req;
|
|
NTSTATUS status = NT_STATUS_OK;
|
|
|
|
frame = talloc_stackframe();
|
|
|
|
if (smbXcli_conn_has_async_calls(cli->conn)) {
|
|
/*
|
|
* Can't use sync call while an async call is in flight
|
|
*/
|
|
status = NT_STATUS_INVALID_PARAMETER;
|
|
goto fail;
|
|
}
|
|
|
|
ev = samba_tevent_context_init(frame);
|
|
if (ev == NULL) {
|
|
status = NT_STATUS_NO_MEMORY;
|
|
goto fail;
|
|
}
|
|
|
|
req = cli_unlink_send(frame, ev, cli, fname, mayhave_attrs);
|
|
if (req == NULL) {
|
|
status = NT_STATUS_NO_MEMORY;
|
|
goto fail;
|
|
}
|
|
|
|
if (!tevent_req_poll_ntstatus(req, ev, &status)) {
|
|
goto fail;
|
|
}
|
|
|
|
status = cli_unlink_recv(req);
|
|
cli->raw_status = status; /* cli_smb2_unlink_recv doesn't set this */
|
|
|
|
fail:
|
|
TALLOC_FREE(frame);
|
|
return status;
|
|
}
|
|
|
|
/****************************************************************************
|
|
Create a directory.
|
|
****************************************************************************/
|
|
|
|
static void cli_mkdir_done(struct tevent_req *subreq);
|
|
static void cli_mkdir_done2(struct tevent_req *subreq);
|
|
|
|
struct cli_mkdir_state {
|
|
int dummy;
|
|
};
|
|
|
|
struct tevent_req *cli_mkdir_send(TALLOC_CTX *mem_ctx,
|
|
struct tevent_context *ev,
|
|
struct cli_state *cli,
|
|
const char *dname)
|
|
{
|
|
struct tevent_req *req = NULL, *subreq = NULL;
|
|
struct cli_mkdir_state *state = NULL;
|
|
uint8_t additional_flags = 0;
|
|
uint16_t additional_flags2 = 0;
|
|
uint8_t *bytes = NULL;
|
|
char *dname_cp = NULL;
|
|
|
|
req = tevent_req_create(mem_ctx, &state, struct cli_mkdir_state);
|
|
if (req == NULL) {
|
|
return NULL;
|
|
}
|
|
|
|
if (smbXcli_conn_protocol(cli->conn) >= PROTOCOL_SMB2_02) {
|
|
subreq = cli_smb2_mkdir_send(state, ev, cli, dname);
|
|
if (tevent_req_nomem(subreq, req)) {
|
|
return tevent_req_post(req, ev);
|
|
}
|
|
tevent_req_set_callback(subreq, cli_mkdir_done2, req);
|
|
return req;
|
|
}
|
|
|
|
bytes = talloc_array(state, uint8_t, 1);
|
|
if (tevent_req_nomem(bytes, req)) {
|
|
return tevent_req_post(req, ev);
|
|
}
|
|
/*
|
|
* SMBmkdir on a DFS share must use DFS names.
|
|
*/
|
|
dname_cp = smb1_dfs_share_path(state, cli, dname);
|
|
if (tevent_req_nomem(dname_cp, req)) {
|
|
return tevent_req_post(req, ev);
|
|
}
|
|
bytes[0] = 4;
|
|
bytes = smb_bytes_push_str(bytes,
|
|
smbXcli_conn_use_unicode(cli->conn),
|
|
dname_cp,
|
|
strlen(dname_cp)+1,
|
|
NULL);
|
|
|
|
if (tevent_req_nomem(bytes, req)) {
|
|
return tevent_req_post(req, ev);
|
|
}
|
|
|
|
if (clistr_is_previous_version_path(dname)) {
|
|
additional_flags2 = FLAGS2_REPARSE_PATH;
|
|
}
|
|
|
|
subreq = cli_smb_send(state, ev, cli, SMBmkdir, additional_flags,
|
|
additional_flags2,
|
|
0, NULL, talloc_get_size(bytes), bytes);
|
|
if (tevent_req_nomem(subreq, req)) {
|
|
return tevent_req_post(req, ev);
|
|
}
|
|
tevent_req_set_callback(subreq, cli_mkdir_done, req);
|
|
return req;
|
|
}
|
|
|
|
static void cli_mkdir_done(struct tevent_req *subreq)
|
|
{
|
|
struct tevent_req *req = tevent_req_callback_data(
|
|
subreq, struct tevent_req);
|
|
NTSTATUS status;
|
|
|
|
status = cli_smb_recv(subreq, NULL, NULL, 0, NULL, NULL, NULL, NULL);
|
|
TALLOC_FREE(subreq);
|
|
if (tevent_req_nterror(req, status)) {
|
|
return;
|
|
}
|
|
tevent_req_done(req);
|
|
}
|
|
|
|
static void cli_mkdir_done2(struct tevent_req *subreq)
|
|
{
|
|
NTSTATUS status = cli_smb2_mkdir_recv(subreq);
|
|
tevent_req_simple_finish_ntstatus(subreq, status);
|
|
}
|
|
|
|
NTSTATUS cli_mkdir_recv(struct tevent_req *req)
|
|
{
|
|
return tevent_req_simple_recv_ntstatus(req);
|
|
}
|
|
|
|
NTSTATUS cli_mkdir(struct cli_state *cli, const char *dname)
|
|
{
|
|
TALLOC_CTX *frame = NULL;
|
|
struct tevent_context *ev;
|
|
struct tevent_req *req;
|
|
NTSTATUS status = NT_STATUS_OK;
|
|
|
|
frame = talloc_stackframe();
|
|
|
|
if (smbXcli_conn_has_async_calls(cli->conn)) {
|
|
/*
|
|
* Can't use sync call while an async call is in flight
|
|
*/
|
|
status = NT_STATUS_INVALID_PARAMETER;
|
|
goto fail;
|
|
}
|
|
|
|
ev = samba_tevent_context_init(frame);
|
|
if (ev == NULL) {
|
|
status = NT_STATUS_NO_MEMORY;
|
|
goto fail;
|
|
}
|
|
|
|
req = cli_mkdir_send(frame, ev, cli, dname);
|
|
if (req == NULL) {
|
|
status = NT_STATUS_NO_MEMORY;
|
|
goto fail;
|
|
}
|
|
|
|
if (!tevent_req_poll_ntstatus(req, ev, &status)) {
|
|
goto fail;
|
|
}
|
|
|
|
status = cli_mkdir_recv(req);
|
|
cli->raw_status = status; /* cli_smb2_mkdir_recv doesn't set this */
|
|
|
|
fail:
|
|
TALLOC_FREE(frame);
|
|
return status;
|
|
}
|
|
|
|
/****************************************************************************
|
|
Remove a directory.
|
|
****************************************************************************/
|
|
|
|
static void cli_rmdir_done(struct tevent_req *subreq);
|
|
static void cli_rmdir_done2(struct tevent_req *subreq);
|
|
|
|
struct cli_rmdir_state {
|
|
int dummy;
|
|
};
|
|
|
|
struct tevent_req *cli_rmdir_send(TALLOC_CTX *mem_ctx,
|
|
struct tevent_context *ev,
|
|
struct cli_state *cli,
|
|
const char *dname)
|
|
{
|
|
struct tevent_req *req = NULL, *subreq = NULL;
|
|
struct cli_rmdir_state *state = NULL;
|
|
uint8_t additional_flags = 0;
|
|
uint16_t additional_flags2 = 0;
|
|
uint8_t *bytes = NULL;
|
|
char *dname_cp = NULL;
|
|
|
|
req = tevent_req_create(mem_ctx, &state, struct cli_rmdir_state);
|
|
if (req == NULL) {
|
|
return NULL;
|
|
}
|
|
|
|
if (smbXcli_conn_protocol(cli->conn) >= PROTOCOL_SMB2_02) {
|
|
subreq = cli_smb2_rmdir_send(state, ev, cli, dname, NULL);
|
|
if (tevent_req_nomem(subreq, req)) {
|
|
return tevent_req_post(req, ev);
|
|
}
|
|
tevent_req_set_callback(subreq, cli_rmdir_done2, req);
|
|
return req;
|
|
}
|
|
|
|
bytes = talloc_array(state, uint8_t, 1);
|
|
if (tevent_req_nomem(bytes, req)) {
|
|
return tevent_req_post(req, ev);
|
|
}
|
|
/*
|
|
* SMBrmdir on a DFS share must use DFS names.
|
|
*/
|
|
dname_cp = smb1_dfs_share_path(state, cli, dname);
|
|
if (tevent_req_nomem(dname_cp, req)) {
|
|
return tevent_req_post(req, ev);
|
|
}
|
|
bytes[0] = 4;
|
|
bytes = smb_bytes_push_str(bytes,
|
|
smbXcli_conn_use_unicode(cli->conn),
|
|
dname_cp,
|
|
strlen(dname_cp)+1,
|
|
NULL);
|
|
|
|
if (tevent_req_nomem(bytes, req)) {
|
|
return tevent_req_post(req, ev);
|
|
}
|
|
|
|
if (clistr_is_previous_version_path(dname)) {
|
|
additional_flags2 = FLAGS2_REPARSE_PATH;
|
|
}
|
|
|
|
subreq = cli_smb_send(state, ev, cli, SMBrmdir, additional_flags,
|
|
additional_flags2,
|
|
0, NULL, talloc_get_size(bytes), bytes);
|
|
if (tevent_req_nomem(subreq, req)) {
|
|
return tevent_req_post(req, ev);
|
|
}
|
|
tevent_req_set_callback(subreq, cli_rmdir_done, req);
|
|
return req;
|
|
}
|
|
|
|
static void cli_rmdir_done(struct tevent_req *subreq)
|
|
{
|
|
NTSTATUS status = cli_smb_recv(
|
|
subreq, NULL, NULL, 0, NULL, NULL, NULL, NULL);
|
|
tevent_req_simple_finish_ntstatus(subreq, status);
|
|
}
|
|
|
|
static void cli_rmdir_done2(struct tevent_req *subreq)
|
|
{
|
|
NTSTATUS status = cli_smb2_rmdir_recv(subreq);
|
|
tevent_req_simple_finish_ntstatus(subreq, status);
|
|
}
|
|
|
|
NTSTATUS cli_rmdir_recv(struct tevent_req *req)
|
|
{
|
|
return tevent_req_simple_recv_ntstatus(req);
|
|
}
|
|
|
|
NTSTATUS cli_rmdir(struct cli_state *cli, const char *dname)
|
|
{
|
|
TALLOC_CTX *frame = NULL;
|
|
struct tevent_context *ev;
|
|
struct tevent_req *req;
|
|
NTSTATUS status = NT_STATUS_OK;
|
|
|
|
frame = talloc_stackframe();
|
|
|
|
if (smbXcli_conn_has_async_calls(cli->conn)) {
|
|
/*
|
|
* Can't use sync call while an async call is in flight
|
|
*/
|
|
status = NT_STATUS_INVALID_PARAMETER;
|
|
goto fail;
|
|
}
|
|
|
|
ev = samba_tevent_context_init(frame);
|
|
if (ev == NULL) {
|
|
status = NT_STATUS_NO_MEMORY;
|
|
goto fail;
|
|
}
|
|
|
|
req = cli_rmdir_send(frame, ev, cli, dname);
|
|
if (req == NULL) {
|
|
status = NT_STATUS_NO_MEMORY;
|
|
goto fail;
|
|
}
|
|
|
|
if (!tevent_req_poll_ntstatus(req, ev, &status)) {
|
|
goto fail;
|
|
}
|
|
|
|
status = cli_rmdir_recv(req);
|
|
cli->raw_status = status; /* cli_smb2_rmdir_recv doesn't set this */
|
|
|
|
fail:
|
|
TALLOC_FREE(frame);
|
|
return status;
|
|
}
|
|
|
|
/****************************************************************************
|
|
Set or clear the delete on close flag.
|
|
****************************************************************************/
|
|
|
|
struct doc_state {
|
|
uint8_t data[1];
|
|
};
|
|
|
|
static void cli_nt_delete_on_close_smb1_done(struct tevent_req *subreq);
|
|
static void cli_nt_delete_on_close_smb2_done(struct tevent_req *subreq);
|
|
|
|
struct tevent_req *cli_nt_delete_on_close_send(TALLOC_CTX *mem_ctx,
|
|
struct tevent_context *ev,
|
|
struct cli_state *cli,
|
|
uint16_t fnum,
|
|
bool flag)
|
|
{
|
|
struct tevent_req *req = NULL, *subreq = NULL;
|
|
struct doc_state *state = NULL;
|
|
|
|
req = tevent_req_create(mem_ctx, &state, struct doc_state);
|
|
if (req == NULL) {
|
|
return NULL;
|
|
}
|
|
|
|
if (smbXcli_conn_protocol(cli->conn) >= PROTOCOL_SMB2_02) {
|
|
subreq = cli_smb2_delete_on_close_send(state, ev, cli,
|
|
fnum, flag);
|
|
if (tevent_req_nomem(subreq, req)) {
|
|
return tevent_req_post(req, ev);
|
|
}
|
|
tevent_req_set_callback(subreq,
|
|
cli_nt_delete_on_close_smb2_done,
|
|
req);
|
|
return req;
|
|
}
|
|
|
|
/* Setup data array. */
|
|
SCVAL(&state->data[0], 0, flag ? 1 : 0);
|
|
|
|
subreq = cli_setfileinfo_send(
|
|
state,
|
|
ev,
|
|
cli,
|
|
fnum,
|
|
SMB_SET_FILE_DISPOSITION_INFO,
|
|
state->data,
|
|
sizeof(state->data));
|
|
|
|
if (tevent_req_nomem(subreq, req)) {
|
|
return tevent_req_post(req, ev);
|
|
}
|
|
tevent_req_set_callback(subreq,
|
|
cli_nt_delete_on_close_smb1_done,
|
|
req);
|
|
return req;
|
|
}
|
|
|
|
static void cli_nt_delete_on_close_smb1_done(struct tevent_req *subreq)
|
|
{
|
|
NTSTATUS status = cli_setfileinfo_recv(subreq);
|
|
tevent_req_simple_finish_ntstatus(subreq, status);
|
|
}
|
|
|
|
static void cli_nt_delete_on_close_smb2_done(struct tevent_req *subreq)
|
|
{
|
|
NTSTATUS status = cli_smb2_delete_on_close_recv(subreq);
|
|
tevent_req_simple_finish_ntstatus(subreq, status);
|
|
}
|
|
|
|
NTSTATUS cli_nt_delete_on_close_recv(struct tevent_req *req)
|
|
{
|
|
return tevent_req_simple_recv_ntstatus(req);
|
|
}
|
|
|
|
NTSTATUS cli_nt_delete_on_close(struct cli_state *cli, uint16_t fnum, bool flag)
|
|
{
|
|
TALLOC_CTX *frame = talloc_stackframe();
|
|
struct tevent_context *ev = NULL;
|
|
struct tevent_req *req = NULL;
|
|
NTSTATUS status = NT_STATUS_OK;
|
|
|
|
if (smbXcli_conn_has_async_calls(cli->conn)) {
|
|
/*
|
|
* Can't use sync call while an async call is in flight
|
|
*/
|
|
status = NT_STATUS_INVALID_PARAMETER;
|
|
goto fail;
|
|
}
|
|
|
|
ev = samba_tevent_context_init(frame);
|
|
if (ev == NULL) {
|
|
status = NT_STATUS_NO_MEMORY;
|
|
goto fail;
|
|
}
|
|
|
|
req = cli_nt_delete_on_close_send(frame,
|
|
ev,
|
|
cli,
|
|
fnum,
|
|
flag);
|
|
if (req == NULL) {
|
|
status = NT_STATUS_NO_MEMORY;
|
|
goto fail;
|
|
}
|
|
|
|
if (!tevent_req_poll_ntstatus(req, ev, &status)) {
|
|
goto fail;
|
|
}
|
|
|
|
status = cli_nt_delete_on_close_recv(req);
|
|
|
|
fail:
|
|
TALLOC_FREE(frame);
|
|
return status;
|
|
}
|
|
|
|
struct cli_ntcreate1_state {
|
|
uint16_t vwv[24];
|
|
uint16_t fnum;
|
|
struct smb_create_returns cr;
|
|
struct tevent_req *subreq;
|
|
};
|
|
|
|
static void cli_ntcreate1_done(struct tevent_req *subreq);
|
|
static bool cli_ntcreate1_cancel(struct tevent_req *req);
|
|
|
|
static struct tevent_req *cli_ntcreate1_send(TALLOC_CTX *mem_ctx,
|
|
struct tevent_context *ev,
|
|
struct cli_state *cli,
|
|
const char *fname,
|
|
uint32_t CreatFlags,
|
|
uint32_t DesiredAccess,
|
|
uint32_t FileAttributes,
|
|
uint32_t ShareAccess,
|
|
uint32_t CreateDisposition,
|
|
uint32_t CreateOptions,
|
|
uint32_t ImpersonationLevel,
|
|
uint8_t SecurityFlags)
|
|
{
|
|
struct tevent_req *req, *subreq;
|
|
struct cli_ntcreate1_state *state;
|
|
uint16_t *vwv;
|
|
uint8_t *bytes;
|
|
size_t converted_len;
|
|
uint16_t additional_flags2 = 0;
|
|
char *fname_cp = NULL;
|
|
|
|
req = tevent_req_create(mem_ctx, &state, struct cli_ntcreate1_state);
|
|
if (req == NULL) {
|
|
return NULL;
|
|
}
|
|
|
|
vwv = state->vwv;
|
|
|
|
SCVAL(vwv+0, 0, 0xFF);
|
|
SCVAL(vwv+0, 1, 0);
|
|
SSVAL(vwv+1, 0, 0);
|
|
SCVAL(vwv+2, 0, 0);
|
|
|
|
if (cli->use_oplocks) {
|
|
CreatFlags |= (REQUEST_OPLOCK|REQUEST_BATCH_OPLOCK);
|
|
}
|
|
SIVAL(vwv+3, 1, CreatFlags);
|
|
SIVAL(vwv+5, 1, 0x0); /* RootDirectoryFid */
|
|
SIVAL(vwv+7, 1, DesiredAccess);
|
|
SIVAL(vwv+9, 1, 0x0); /* AllocationSize */
|
|
SIVAL(vwv+11, 1, 0x0); /* AllocationSize */
|
|
SIVAL(vwv+13, 1, FileAttributes);
|
|
SIVAL(vwv+15, 1, ShareAccess);
|
|
SIVAL(vwv+17, 1, CreateDisposition);
|
|
SIVAL(vwv+19, 1, CreateOptions |
|
|
(cli->backup_intent ? FILE_OPEN_FOR_BACKUP_INTENT : 0));
|
|
SIVAL(vwv+21, 1, ImpersonationLevel);
|
|
SCVAL(vwv+23, 1, SecurityFlags);
|
|
|
|
bytes = talloc_array(state, uint8_t, 0);
|
|
if (tevent_req_nomem(bytes, req)) {
|
|
return tevent_req_post(req, ev);
|
|
}
|
|
/*
|
|
* SMBntcreateX on a DFS share must use DFS names.
|
|
*/
|
|
fname_cp = smb1_dfs_share_path(state, cli, fname);
|
|
if (tevent_req_nomem(fname_cp, req)) {
|
|
return tevent_req_post(req, ev);
|
|
}
|
|
bytes = smb_bytes_push_str(bytes,
|
|
smbXcli_conn_use_unicode(cli->conn),
|
|
fname_cp,
|
|
strlen(fname_cp)+1,
|
|
&converted_len);
|
|
if (tevent_req_nomem(bytes, req)) {
|
|
return tevent_req_post(req, ev);
|
|
}
|
|
|
|
if (clistr_is_previous_version_path(fname)) {
|
|
additional_flags2 = FLAGS2_REPARSE_PATH;
|
|
}
|
|
|
|
/* sigh. this copes with broken netapp filer behaviour */
|
|
bytes = smb_bytes_push_str(bytes, smbXcli_conn_use_unicode(cli->conn), "", 1, NULL);
|
|
|
|
if (tevent_req_nomem(bytes, req)) {
|
|
return tevent_req_post(req, ev);
|
|
}
|
|
|
|
SSVAL(vwv+2, 1, converted_len);
|
|
|
|
subreq = cli_smb_send(state, ev, cli, SMBntcreateX, 0,
|
|
additional_flags2, 24, vwv,
|
|
talloc_get_size(bytes), bytes);
|
|
if (tevent_req_nomem(subreq, req)) {
|
|
return tevent_req_post(req, ev);
|
|
}
|
|
tevent_req_set_callback(subreq, cli_ntcreate1_done, req);
|
|
|
|
state->subreq = subreq;
|
|
tevent_req_set_cancel_fn(req, cli_ntcreate1_cancel);
|
|
|
|
return req;
|
|
}
|
|
|
|
static void cli_ntcreate1_done(struct tevent_req *subreq)
|
|
{
|
|
struct tevent_req *req = tevent_req_callback_data(
|
|
subreq, struct tevent_req);
|
|
struct cli_ntcreate1_state *state = tevent_req_data(
|
|
req, struct cli_ntcreate1_state);
|
|
uint8_t wct;
|
|
uint16_t *vwv;
|
|
uint32_t num_bytes;
|
|
uint8_t *bytes;
|
|
NTSTATUS status;
|
|
|
|
status = cli_smb_recv(subreq, state, NULL, 34, &wct, &vwv,
|
|
&num_bytes, &bytes);
|
|
TALLOC_FREE(subreq);
|
|
if (tevent_req_nterror(req, status)) {
|
|
return;
|
|
}
|
|
state->cr.oplock_level = CVAL(vwv+2, 0);
|
|
state->fnum = SVAL(vwv+2, 1);
|
|
state->cr.create_action = IVAL(vwv+3, 1);
|
|
state->cr.creation_time = BVAL(vwv+5, 1);
|
|
state->cr.last_access_time = BVAL(vwv+9, 1);
|
|
state->cr.last_write_time = BVAL(vwv+13, 1);
|
|
state->cr.change_time = BVAL(vwv+17, 1);
|
|
state->cr.file_attributes = IVAL(vwv+21, 1);
|
|
state->cr.allocation_size = BVAL(vwv+23, 1);
|
|
state->cr.end_of_file = BVAL(vwv+27, 1);
|
|
|
|
tevent_req_done(req);
|
|
}
|
|
|
|
static bool cli_ntcreate1_cancel(struct tevent_req *req)
|
|
{
|
|
struct cli_ntcreate1_state *state = tevent_req_data(
|
|
req, struct cli_ntcreate1_state);
|
|
return tevent_req_cancel(state->subreq);
|
|
}
|
|
|
|
static NTSTATUS cli_ntcreate1_recv(struct tevent_req *req,
|
|
uint16_t *pfnum,
|
|
struct smb_create_returns *cr)
|
|
{
|
|
struct cli_ntcreate1_state *state = tevent_req_data(
|
|
req, struct cli_ntcreate1_state);
|
|
NTSTATUS status;
|
|
|
|
if (tevent_req_is_nterror(req, &status)) {
|
|
return status;
|
|
}
|
|
*pfnum = state->fnum;
|
|
if (cr != NULL) {
|
|
*cr = state->cr;
|
|
}
|
|
return NT_STATUS_OK;
|
|
}
|
|
|
|
struct cli_ntcreate_state {
|
|
struct smb_create_returns cr;
|
|
uint16_t fnum;
|
|
struct tevent_req *subreq;
|
|
};
|
|
|
|
static void cli_ntcreate_done_nt1(struct tevent_req *subreq);
|
|
static void cli_ntcreate_done_smb2(struct tevent_req *subreq);
|
|
static bool cli_ntcreate_cancel(struct tevent_req *req);
|
|
|
|
struct tevent_req *cli_ntcreate_send(TALLOC_CTX *mem_ctx,
|
|
struct tevent_context *ev,
|
|
struct cli_state *cli,
|
|
const char *fname,
|
|
uint32_t create_flags,
|
|
uint32_t desired_access,
|
|
uint32_t file_attributes,
|
|
uint32_t share_access,
|
|
uint32_t create_disposition,
|
|
uint32_t create_options,
|
|
uint32_t impersonation_level,
|
|
uint8_t security_flags)
|
|
{
|
|
struct tevent_req *req, *subreq;
|
|
struct cli_ntcreate_state *state;
|
|
|
|
req = tevent_req_create(mem_ctx, &state, struct cli_ntcreate_state);
|
|
if (req == NULL) {
|
|
return NULL;
|
|
}
|
|
|
|
if (smbXcli_conn_protocol(cli->conn) >= PROTOCOL_SMB2_02) {
|
|
struct cli_smb2_create_flags cflags = {0};
|
|
|
|
if (cli->use_oplocks) {
|
|
create_flags |= REQUEST_OPLOCK|REQUEST_BATCH_OPLOCK;
|
|
}
|
|
|
|
cflags = (struct cli_smb2_create_flags) {
|
|
.batch_oplock = (create_flags & REQUEST_BATCH_OPLOCK),
|
|
.exclusive_oplock = (create_flags & REQUEST_OPLOCK),
|
|
};
|
|
|
|
subreq = cli_smb2_create_fnum_send(
|
|
state,
|
|
ev,
|
|
cli,
|
|
fname,
|
|
cflags,
|
|
impersonation_level,
|
|
desired_access,
|
|
file_attributes,
|
|
share_access,
|
|
create_disposition,
|
|
create_options,
|
|
NULL);
|
|
if (tevent_req_nomem(subreq, req)) {
|
|
return tevent_req_post(req, ev);
|
|
}
|
|
tevent_req_set_callback(subreq, cli_ntcreate_done_smb2, req);
|
|
} else {
|
|
subreq = cli_ntcreate1_send(
|
|
state, ev, cli, fname, create_flags, desired_access,
|
|
file_attributes, share_access, create_disposition,
|
|
create_options, impersonation_level, security_flags);
|
|
if (tevent_req_nomem(subreq, req)) {
|
|
return tevent_req_post(req, ev);
|
|
}
|
|
tevent_req_set_callback(subreq, cli_ntcreate_done_nt1, req);
|
|
}
|
|
|
|
state->subreq = subreq;
|
|
tevent_req_set_cancel_fn(req, cli_ntcreate_cancel);
|
|
|
|
return req;
|
|
}
|
|
|
|
static void cli_ntcreate_done_nt1(struct tevent_req *subreq)
|
|
{
|
|
struct tevent_req *req = tevent_req_callback_data(
|
|
subreq, struct tevent_req);
|
|
struct cli_ntcreate_state *state = tevent_req_data(
|
|
req, struct cli_ntcreate_state);
|
|
NTSTATUS status;
|
|
|
|
status = cli_ntcreate1_recv(subreq, &state->fnum, &state->cr);
|
|
TALLOC_FREE(subreq);
|
|
if (tevent_req_nterror(req, status)) {
|
|
return;
|
|
}
|
|
tevent_req_done(req);
|
|
}
|
|
|
|
static void cli_ntcreate_done_smb2(struct tevent_req *subreq)
|
|
{
|
|
struct tevent_req *req = tevent_req_callback_data(
|
|
subreq, struct tevent_req);
|
|
struct cli_ntcreate_state *state = tevent_req_data(
|
|
req, struct cli_ntcreate_state);
|
|
NTSTATUS status;
|
|
|
|
status = cli_smb2_create_fnum_recv(
|
|
subreq,
|
|
&state->fnum,
|
|
&state->cr,
|
|
NULL,
|
|
NULL,
|
|
NULL);
|
|
TALLOC_FREE(subreq);
|
|
if (tevent_req_nterror(req, status)) {
|
|
return;
|
|
}
|
|
tevent_req_done(req);
|
|
}
|
|
|
|
static bool cli_ntcreate_cancel(struct tevent_req *req)
|
|
{
|
|
struct cli_ntcreate_state *state = tevent_req_data(
|
|
req, struct cli_ntcreate_state);
|
|
return tevent_req_cancel(state->subreq);
|
|
}
|
|
|
|
NTSTATUS cli_ntcreate_recv(struct tevent_req *req, uint16_t *fnum,
|
|
struct smb_create_returns *cr)
|
|
{
|
|
struct cli_ntcreate_state *state = tevent_req_data(
|
|
req, struct cli_ntcreate_state);
|
|
NTSTATUS status;
|
|
|
|
if (tevent_req_is_nterror(req, &status)) {
|
|
return status;
|
|
}
|
|
if (fnum != NULL) {
|
|
*fnum = state->fnum;
|
|
}
|
|
if (cr != NULL) {
|
|
*cr = state->cr;
|
|
}
|
|
return NT_STATUS_OK;
|
|
}
|
|
|
|
NTSTATUS cli_ntcreate(struct cli_state *cli,
|
|
const char *fname,
|
|
uint32_t CreatFlags,
|
|
uint32_t DesiredAccess,
|
|
uint32_t FileAttributes,
|
|
uint32_t ShareAccess,
|
|
uint32_t CreateDisposition,
|
|
uint32_t CreateOptions,
|
|
uint8_t SecurityFlags,
|
|
uint16_t *pfid,
|
|
struct smb_create_returns *cr)
|
|
{
|
|
TALLOC_CTX *frame = talloc_stackframe();
|
|
struct tevent_context *ev;
|
|
struct tevent_req *req;
|
|
uint32_t ImpersonationLevel = SMB2_IMPERSONATION_IMPERSONATION;
|
|
NTSTATUS status = NT_STATUS_NO_MEMORY;
|
|
|
|
if (smbXcli_conn_has_async_calls(cli->conn)) {
|
|
/*
|
|
* Can't use sync call while an async call is in flight
|
|
*/
|
|
status = NT_STATUS_INVALID_PARAMETER;
|
|
goto fail;
|
|
}
|
|
|
|
ev = samba_tevent_context_init(frame);
|
|
if (ev == NULL) {
|
|
goto fail;
|
|
}
|
|
|
|
req = cli_ntcreate_send(frame, ev, cli, fname, CreatFlags,
|
|
DesiredAccess, FileAttributes, ShareAccess,
|
|
CreateDisposition, CreateOptions,
|
|
ImpersonationLevel, SecurityFlags);
|
|
if (req == NULL) {
|
|
goto fail;
|
|
}
|
|
|
|
if (!tevent_req_poll_ntstatus(req, ev, &status)) {
|
|
goto fail;
|
|
}
|
|
|
|
status = cli_ntcreate_recv(req, pfid, cr);
|
|
fail:
|
|
TALLOC_FREE(frame);
|
|
return status;
|
|
}
|
|
|
|
struct cli_nttrans_create_state {
|
|
uint16_t fnum;
|
|
struct smb_create_returns cr;
|
|
};
|
|
|
|
static void cli_nttrans_create_done(struct tevent_req *subreq);
|
|
|
|
struct tevent_req *cli_nttrans_create_send(TALLOC_CTX *mem_ctx,
|
|
struct tevent_context *ev,
|
|
struct cli_state *cli,
|
|
const char *fname,
|
|
uint32_t CreatFlags,
|
|
uint32_t DesiredAccess,
|
|
uint32_t FileAttributes,
|
|
uint32_t ShareAccess,
|
|
uint32_t CreateDisposition,
|
|
uint32_t CreateOptions,
|
|
uint8_t SecurityFlags,
|
|
struct security_descriptor *secdesc,
|
|
struct ea_struct *eas,
|
|
int num_eas)
|
|
{
|
|
struct tevent_req *req, *subreq;
|
|
struct cli_nttrans_create_state *state;
|
|
uint8_t *param;
|
|
uint8_t *secdesc_buf;
|
|
size_t secdesc_len;
|
|
NTSTATUS status;
|
|
size_t converted_len;
|
|
uint16_t additional_flags2 = 0;
|
|
char *fname_cp = NULL;
|
|
|
|
req = tevent_req_create(mem_ctx,
|
|
&state, struct cli_nttrans_create_state);
|
|
if (req == NULL) {
|
|
return NULL;
|
|
}
|
|
|
|
if (secdesc != NULL) {
|
|
status = marshall_sec_desc(talloc_tos(), secdesc,
|
|
&secdesc_buf, &secdesc_len);
|
|
if (tevent_req_nterror(req, status)) {
|
|
DEBUG(10, ("marshall_sec_desc failed: %s\n",
|
|
nt_errstr(status)));
|
|
return tevent_req_post(req, ev);
|
|
}
|
|
} else {
|
|
secdesc_buf = NULL;
|
|
secdesc_len = 0;
|
|
}
|
|
|
|
if (num_eas != 0) {
|
|
/*
|
|
* TODO ;-)
|
|
*/
|
|
tevent_req_nterror(req, NT_STATUS_NOT_IMPLEMENTED);
|
|
return tevent_req_post(req, ev);
|
|
}
|
|
|
|
param = talloc_array(state, uint8_t, 53);
|
|
if (tevent_req_nomem(param, req)) {
|
|
return tevent_req_post(req, ev);
|
|
}
|
|
|
|
/*
|
|
* SMBntcreateX on a DFS share must use DFS names.
|
|
*/
|
|
fname_cp = smb1_dfs_share_path(state, cli, fname);
|
|
if (tevent_req_nomem(fname_cp, req)) {
|
|
return tevent_req_post(req, ev);
|
|
}
|
|
param = trans2_bytes_push_str(param,
|
|
smbXcli_conn_use_unicode(cli->conn),
|
|
fname_cp,
|
|
strlen(fname_cp),
|
|
&converted_len);
|
|
if (tevent_req_nomem(param, req)) {
|
|
return tevent_req_post(req, ev);
|
|
}
|
|
|
|
if (clistr_is_previous_version_path(fname)) {
|
|
additional_flags2 = FLAGS2_REPARSE_PATH;
|
|
}
|
|
|
|
SIVAL(param, 0, CreatFlags);
|
|
SIVAL(param, 4, 0x0); /* RootDirectoryFid */
|
|
SIVAL(param, 8, DesiredAccess);
|
|
SIVAL(param, 12, 0x0); /* AllocationSize */
|
|
SIVAL(param, 16, 0x0); /* AllocationSize */
|
|
SIVAL(param, 20, FileAttributes);
|
|
SIVAL(param, 24, ShareAccess);
|
|
SIVAL(param, 28, CreateDisposition);
|
|
SIVAL(param, 32, CreateOptions |
|
|
(cli->backup_intent ? FILE_OPEN_FOR_BACKUP_INTENT : 0));
|
|
SIVAL(param, 36, secdesc_len);
|
|
SIVAL(param, 40, 0); /* EA length*/
|
|
SIVAL(param, 44, converted_len);
|
|
SIVAL(param, 48, 0x02); /* ImpersonationLevel */
|
|
SCVAL(param, 52, SecurityFlags);
|
|
|
|
subreq = cli_trans_send(state, ev, cli,
|
|
additional_flags2, /* additional_flags2 */
|
|
SMBnttrans,
|
|
NULL, -1, /* name, fid */
|
|
NT_TRANSACT_CREATE, 0,
|
|
NULL, 0, 0, /* setup */
|
|
param, talloc_get_size(param), 128, /* param */
|
|
secdesc_buf, secdesc_len, 0); /* data */
|
|
if (tevent_req_nomem(subreq, req)) {
|
|
return tevent_req_post(req, ev);
|
|
}
|
|
tevent_req_set_callback(subreq, cli_nttrans_create_done, req);
|
|
return req;
|
|
}
|
|
|
|
static void cli_nttrans_create_done(struct tevent_req *subreq)
|
|
{
|
|
struct tevent_req *req = tevent_req_callback_data(
|
|
subreq, struct tevent_req);
|
|
struct cli_nttrans_create_state *state = tevent_req_data(
|
|
req, struct cli_nttrans_create_state);
|
|
uint8_t *param;
|
|
uint32_t num_param;
|
|
NTSTATUS status;
|
|
|
|
status = cli_trans_recv(subreq, talloc_tos(), NULL,
|
|
NULL, 0, NULL, /* rsetup */
|
|
¶m, 69, &num_param,
|
|
NULL, 0, NULL);
|
|
if (tevent_req_nterror(req, status)) {
|
|
return;
|
|
}
|
|
state->cr.oplock_level = CVAL(param, 0);
|
|
state->fnum = SVAL(param, 2);
|
|
state->cr.create_action = IVAL(param, 4);
|
|
state->cr.creation_time = BVAL(param, 12);
|
|
state->cr.last_access_time = BVAL(param, 20);
|
|
state->cr.last_write_time = BVAL(param, 28);
|
|
state->cr.change_time = BVAL(param, 36);
|
|
state->cr.file_attributes = IVAL(param, 44);
|
|
state->cr.allocation_size = BVAL(param, 48);
|
|
state->cr.end_of_file = BVAL(param, 56);
|
|
|
|
TALLOC_FREE(param);
|
|
tevent_req_done(req);
|
|
}
|
|
|
|
NTSTATUS cli_nttrans_create_recv(struct tevent_req *req,
|
|
uint16_t *fnum,
|
|
struct smb_create_returns *cr)
|
|
{
|
|
struct cli_nttrans_create_state *state = tevent_req_data(
|
|
req, struct cli_nttrans_create_state);
|
|
NTSTATUS status;
|
|
|
|
if (tevent_req_is_nterror(req, &status)) {
|
|
return status;
|
|
}
|
|
*fnum = state->fnum;
|
|
if (cr != NULL) {
|
|
*cr = state->cr;
|
|
}
|
|
return NT_STATUS_OK;
|
|
}
|
|
|
|
NTSTATUS cli_nttrans_create(struct cli_state *cli,
|
|
const char *fname,
|
|
uint32_t CreatFlags,
|
|
uint32_t DesiredAccess,
|
|
uint32_t FileAttributes,
|
|
uint32_t ShareAccess,
|
|
uint32_t CreateDisposition,
|
|
uint32_t CreateOptions,
|
|
uint8_t SecurityFlags,
|
|
struct security_descriptor *secdesc,
|
|
struct ea_struct *eas,
|
|
int num_eas,
|
|
uint16_t *pfid,
|
|
struct smb_create_returns *cr)
|
|
{
|
|
TALLOC_CTX *frame = talloc_stackframe();
|
|
struct tevent_context *ev;
|
|
struct tevent_req *req;
|
|
NTSTATUS status = NT_STATUS_NO_MEMORY;
|
|
|
|
if (smbXcli_conn_has_async_calls(cli->conn)) {
|
|
/*
|
|
* Can't use sync call while an async call is in flight
|
|
*/
|
|
status = NT_STATUS_INVALID_PARAMETER;
|
|
goto fail;
|
|
}
|
|
ev = samba_tevent_context_init(frame);
|
|
if (ev == NULL) {
|
|
goto fail;
|
|
}
|
|
req = cli_nttrans_create_send(frame, ev, cli, fname, CreatFlags,
|
|
DesiredAccess, FileAttributes,
|
|
ShareAccess, CreateDisposition,
|
|
CreateOptions, SecurityFlags,
|
|
secdesc, eas, num_eas);
|
|
if (req == NULL) {
|
|
goto fail;
|
|
}
|
|
if (!tevent_req_poll_ntstatus(req, ev, &status)) {
|
|
goto fail;
|
|
}
|
|
status = cli_nttrans_create_recv(req, pfid, cr);
|
|
fail:
|
|
TALLOC_FREE(frame);
|
|
return status;
|
|
}
|
|
|
|
/****************************************************************************
|
|
Open a file
|
|
WARNING: if you open with O_WRONLY then getattrE won't work!
|
|
****************************************************************************/
|
|
|
|
struct cli_openx_state {
|
|
const char *fname;
|
|
uint16_t vwv[15];
|
|
uint16_t fnum;
|
|
struct iovec bytes;
|
|
};
|
|
|
|
static void cli_openx_done(struct tevent_req *subreq);
|
|
|
|
struct tevent_req *cli_openx_create(TALLOC_CTX *mem_ctx,
|
|
struct tevent_context *ev,
|
|
struct cli_state *cli, const char *fname,
|
|
int flags, int share_mode,
|
|
struct tevent_req **psmbreq)
|
|
{
|
|
struct tevent_req *req, *subreq;
|
|
struct cli_openx_state *state;
|
|
unsigned openfn;
|
|
unsigned accessmode;
|
|
uint8_t additional_flags;
|
|
uint16_t additional_flags2 = 0;
|
|
uint8_t *bytes;
|
|
char *fname_cp = NULL;
|
|
|
|
req = tevent_req_create(mem_ctx, &state, struct cli_openx_state);
|
|
if (req == NULL) {
|
|
return NULL;
|
|
}
|
|
|
|
openfn = 0;
|
|
if (flags & O_CREAT) {
|
|
openfn |= (1<<4);
|
|
}
|
|
if (!(flags & O_EXCL)) {
|
|
if (flags & O_TRUNC)
|
|
openfn |= (1<<1);
|
|
else
|
|
openfn |= (1<<0);
|
|
}
|
|
|
|
accessmode = (share_mode<<4);
|
|
|
|
if ((flags & O_ACCMODE) == O_RDWR) {
|
|
accessmode |= 2;
|
|
} else if ((flags & O_ACCMODE) == O_WRONLY) {
|
|
accessmode |= 1;
|
|
}
|
|
|
|
#if defined(O_SYNC)
|
|
if ((flags & O_SYNC) == O_SYNC) {
|
|
accessmode |= (1<<14);
|
|
}
|
|
#endif /* O_SYNC */
|
|
|
|
if (share_mode == DENY_FCB) {
|
|
accessmode = 0xFF;
|
|
}
|
|
|
|
SCVAL(state->vwv + 0, 0, 0xFF);
|
|
SCVAL(state->vwv + 0, 1, 0);
|
|
SSVAL(state->vwv + 1, 0, 0);
|
|
SSVAL(state->vwv + 2, 0, 0); /* no additional info */
|
|
SSVAL(state->vwv + 3, 0, accessmode);
|
|
SSVAL(state->vwv + 4, 0, FILE_ATTRIBUTE_SYSTEM | FILE_ATTRIBUTE_HIDDEN);
|
|
SSVAL(state->vwv + 5, 0, 0);
|
|
SIVAL(state->vwv + 6, 0, 0);
|
|
SSVAL(state->vwv + 8, 0, openfn);
|
|
SIVAL(state->vwv + 9, 0, 0);
|
|
SIVAL(state->vwv + 11, 0, 0);
|
|
SIVAL(state->vwv + 13, 0, 0);
|
|
|
|
additional_flags = 0;
|
|
|
|
if (cli->use_oplocks) {
|
|
/* if using oplocks then ask for a batch oplock via
|
|
core and extended methods */
|
|
additional_flags =
|
|
FLAG_REQUEST_OPLOCK|FLAG_REQUEST_BATCH_OPLOCK;
|
|
SSVAL(state->vwv+2, 0, SVAL(state->vwv+2, 0) | 6);
|
|
}
|
|
|
|
bytes = talloc_array(state, uint8_t, 0);
|
|
if (tevent_req_nomem(bytes, req)) {
|
|
return tevent_req_post(req, ev);
|
|
}
|
|
/*
|
|
* SMBopenX on a DFS share must use DFS names.
|
|
*/
|
|
fname_cp = smb1_dfs_share_path(state, cli, fname);
|
|
if (tevent_req_nomem(fname_cp, req)) {
|
|
return tevent_req_post(req, ev);
|
|
}
|
|
bytes = smb_bytes_push_str(bytes,
|
|
smbXcli_conn_use_unicode(cli->conn),
|
|
fname_cp,
|
|
strlen(fname_cp)+1,
|
|
NULL);
|
|
|
|
if (tevent_req_nomem(bytes, req)) {
|
|
return tevent_req_post(req, ev);
|
|
}
|
|
|
|
if (clistr_is_previous_version_path(fname)) {
|
|
additional_flags2 = FLAGS2_REPARSE_PATH;
|
|
}
|
|
|
|
state->bytes.iov_base = (void *)bytes;
|
|
state->bytes.iov_len = talloc_get_size(bytes);
|
|
|
|
subreq = cli_smb_req_create(state, ev, cli, SMBopenX, additional_flags,
|
|
additional_flags2, 15, state->vwv, 1, &state->bytes);
|
|
if (subreq == NULL) {
|
|
TALLOC_FREE(req);
|
|
return NULL;
|
|
}
|
|
tevent_req_set_callback(subreq, cli_openx_done, req);
|
|
*psmbreq = subreq;
|
|
return req;
|
|
}
|
|
|
|
struct tevent_req *cli_openx_send(TALLOC_CTX *mem_ctx, struct tevent_context *ev,
|
|
struct cli_state *cli, const char *fname,
|
|
int flags, int share_mode)
|
|
{
|
|
struct tevent_req *req, *subreq;
|
|
NTSTATUS status;
|
|
|
|
req = cli_openx_create(mem_ctx, ev, cli, fname, flags, share_mode,
|
|
&subreq);
|
|
if (req == NULL) {
|
|
return NULL;
|
|
}
|
|
|
|
status = smb1cli_req_chain_submit(&subreq, 1);
|
|
if (tevent_req_nterror(req, status)) {
|
|
return tevent_req_post(req, ev);
|
|
}
|
|
return req;
|
|
}
|
|
|
|
static void cli_openx_done(struct tevent_req *subreq)
|
|
{
|
|
struct tevent_req *req = tevent_req_callback_data(
|
|
subreq, struct tevent_req);
|
|
struct cli_openx_state *state = tevent_req_data(
|
|
req, struct cli_openx_state);
|
|
uint8_t wct;
|
|
uint16_t *vwv;
|
|
NTSTATUS status;
|
|
|
|
status = cli_smb_recv(subreq, state, NULL, 3, &wct, &vwv, NULL,
|
|
NULL);
|
|
TALLOC_FREE(subreq);
|
|
if (tevent_req_nterror(req, status)) {
|
|
return;
|
|
}
|
|
state->fnum = SVAL(vwv+2, 0);
|
|
tevent_req_done(req);
|
|
}
|
|
|
|
NTSTATUS cli_openx_recv(struct tevent_req *req, uint16_t *pfnum)
|
|
{
|
|
struct cli_openx_state *state = tevent_req_data(
|
|
req, struct cli_openx_state);
|
|
NTSTATUS status;
|
|
|
|
if (tevent_req_is_nterror(req, &status)) {
|
|
return status;
|
|
}
|
|
*pfnum = state->fnum;
|
|
return NT_STATUS_OK;
|
|
}
|
|
|
|
NTSTATUS cli_openx(struct cli_state *cli, const char *fname, int flags,
|
|
int share_mode, uint16_t *pfnum)
|
|
{
|
|
TALLOC_CTX *frame = talloc_stackframe();
|
|
struct tevent_context *ev;
|
|
struct tevent_req *req;
|
|
NTSTATUS status = NT_STATUS_NO_MEMORY;
|
|
|
|
if (smbXcli_conn_has_async_calls(cli->conn)) {
|
|
/*
|
|
* Can't use sync call while an async call is in flight
|
|
*/
|
|
status = NT_STATUS_INVALID_PARAMETER;
|
|
goto fail;
|
|
}
|
|
|
|
ev = samba_tevent_context_init(frame);
|
|
if (ev == NULL) {
|
|
goto fail;
|
|
}
|
|
|
|
req = cli_openx_send(frame, ev, cli, fname, flags, share_mode);
|
|
if (req == NULL) {
|
|
goto fail;
|
|
}
|
|
|
|
if (!tevent_req_poll_ntstatus(req, ev, &status)) {
|
|
goto fail;
|
|
}
|
|
|
|
status = cli_openx_recv(req, pfnum);
|
|
fail:
|
|
TALLOC_FREE(frame);
|
|
return status;
|
|
}
|
|
/****************************************************************************
|
|
Synchronous wrapper function that does an NtCreateX open by preference
|
|
and falls back to openX if this fails.
|
|
****************************************************************************/
|
|
|
|
NTSTATUS cli_open(struct cli_state *cli, const char *fname, int flags,
|
|
int share_mode_in, uint16_t *pfnum)
|
|
{
|
|
NTSTATUS status;
|
|
unsigned int openfn = 0;
|
|
unsigned int dos_deny = 0;
|
|
uint32_t access_mask, share_mode, create_disposition, create_options;
|
|
struct smb_create_returns cr = {0};
|
|
|
|
/* Do the initial mapping into OpenX parameters. */
|
|
if (flags & O_CREAT) {
|
|
openfn |= (1<<4);
|
|
}
|
|
if (!(flags & O_EXCL)) {
|
|
if (flags & O_TRUNC)
|
|
openfn |= (1<<1);
|
|
else
|
|
openfn |= (1<<0);
|
|
}
|
|
|
|
dos_deny = (share_mode_in<<4);
|
|
|
|
if ((flags & O_ACCMODE) == O_RDWR) {
|
|
dos_deny |= 2;
|
|
} else if ((flags & O_ACCMODE) == O_WRONLY) {
|
|
dos_deny |= 1;
|
|
}
|
|
|
|
#if defined(O_SYNC)
|
|
if (flags & O_SYNC) {
|
|
dos_deny |= (1<<14);
|
|
}
|
|
#endif /* O_SYNC */
|
|
|
|
if (share_mode_in == DENY_FCB) {
|
|
dos_deny = 0xFF;
|
|
}
|
|
|
|
if (!map_open_params_to_ntcreate(fname, dos_deny,
|
|
openfn, &access_mask,
|
|
&share_mode, &create_disposition,
|
|
&create_options, NULL)) {
|
|
goto try_openx;
|
|
}
|
|
|
|
status = cli_ntcreate(cli,
|
|
fname,
|
|
0,
|
|
access_mask,
|
|
0,
|
|
share_mode,
|
|
create_disposition,
|
|
create_options,
|
|
0,
|
|
pfnum,
|
|
&cr);
|
|
|
|
/* Try and cope will all variants of "we don't do this call"
|
|
and fall back to openX. */
|
|
|
|
if (NT_STATUS_EQUAL(status,NT_STATUS_NOT_IMPLEMENTED) ||
|
|
NT_STATUS_EQUAL(status,NT_STATUS_INVALID_INFO_CLASS) ||
|
|
NT_STATUS_EQUAL(status,NT_STATUS_PROCEDURE_NOT_FOUND) ||
|
|
NT_STATUS_EQUAL(status,NT_STATUS_INVALID_LEVEL) ||
|
|
NT_STATUS_EQUAL(status,NT_STATUS_INVALID_PARAMETER) ||
|
|
NT_STATUS_EQUAL(status,NT_STATUS_INVALID_DEVICE_REQUEST) ||
|
|
NT_STATUS_EQUAL(status,NT_STATUS_INVALID_DEVICE_STATE) ||
|
|
NT_STATUS_EQUAL(status,NT_STATUS_CTL_FILE_NOT_SUPPORTED) ||
|
|
NT_STATUS_EQUAL(status,NT_STATUS_UNSUCCESSFUL)) {
|
|
goto try_openx;
|
|
}
|
|
|
|
if (NT_STATUS_IS_OK(status) &&
|
|
(create_options & FILE_NON_DIRECTORY_FILE) &&
|
|
(cr.file_attributes & FILE_ATTRIBUTE_DIRECTORY))
|
|
{
|
|
/*
|
|
* Some (broken) servers return a valid handle
|
|
* for directories even if FILE_NON_DIRECTORY_FILE
|
|
* is set. Just close the handle and set the
|
|
* error explicitly to NT_STATUS_FILE_IS_A_DIRECTORY.
|
|
*/
|
|
status = cli_close(cli, *pfnum);
|
|
if (!NT_STATUS_IS_OK(status)) {
|
|
return status;
|
|
}
|
|
status = NT_STATUS_FILE_IS_A_DIRECTORY;
|
|
/* Set this so libsmbclient can retrieve it. */
|
|
cli->raw_status = status;
|
|
}
|
|
|
|
return status;
|
|
|
|
try_openx:
|
|
|
|
return cli_openx(cli, fname, flags, share_mode_in, pfnum);
|
|
}
|
|
|
|
/****************************************************************************
|
|
Close a file.
|
|
****************************************************************************/
|
|
|
|
struct cli_smb1_close_state {
|
|
uint16_t vwv[3];
|
|
};
|
|
|
|
static void cli_smb1_close_done(struct tevent_req *subreq);
|
|
|
|
struct tevent_req *cli_smb1_close_create(TALLOC_CTX *mem_ctx,
|
|
struct tevent_context *ev,
|
|
struct cli_state *cli,
|
|
uint16_t fnum,
|
|
struct tevent_req **psubreq)
|
|
{
|
|
struct tevent_req *req, *subreq;
|
|
struct cli_smb1_close_state *state;
|
|
|
|
req = tevent_req_create(mem_ctx, &state, struct cli_smb1_close_state);
|
|
if (req == NULL) {
|
|
return NULL;
|
|
}
|
|
|
|
SSVAL(state->vwv+0, 0, fnum);
|
|
SIVALS(state->vwv+1, 0, -1);
|
|
|
|
subreq = cli_smb_req_create(state, ev, cli, SMBclose, 0, 0,
|
|
3, state->vwv, 0, NULL);
|
|
if (subreq == NULL) {
|
|
TALLOC_FREE(req);
|
|
return NULL;
|
|
}
|
|
tevent_req_set_callback(subreq, cli_smb1_close_done, req);
|
|
*psubreq = subreq;
|
|
return req;
|
|
}
|
|
|
|
static void cli_smb1_close_done(struct tevent_req *subreq)
|
|
{
|
|
struct tevent_req *req = tevent_req_callback_data(
|
|
subreq, struct tevent_req);
|
|
NTSTATUS status;
|
|
|
|
status = cli_smb_recv(subreq, NULL, NULL, 0, NULL, NULL, NULL, NULL);
|
|
TALLOC_FREE(subreq);
|
|
if (tevent_req_nterror(req, status)) {
|
|
return;
|
|
}
|
|
tevent_req_done(req);
|
|
}
|
|
|
|
struct cli_close_state {
|
|
int dummy;
|
|
};
|
|
|
|
static void cli_close_done(struct tevent_req *subreq);
|
|
|
|
struct tevent_req *cli_close_send(TALLOC_CTX *mem_ctx,
|
|
struct tevent_context *ev,
|
|
struct cli_state *cli,
|
|
uint16_t fnum,
|
|
uint16_t flags)
|
|
{
|
|
struct tevent_req *req, *subreq;
|
|
struct cli_close_state *state;
|
|
NTSTATUS status;
|
|
|
|
req = tevent_req_create(mem_ctx, &state, struct cli_close_state);
|
|
if (req == NULL) {
|
|
return NULL;
|
|
}
|
|
|
|
if (smbXcli_conn_protocol(cli->conn) >= PROTOCOL_SMB2_02) {
|
|
subreq = cli_smb2_close_fnum_send(state, ev, cli, fnum, flags);
|
|
if (tevent_req_nomem(subreq, req)) {
|
|
return tevent_req_post(req, ev);
|
|
}
|
|
} else {
|
|
struct tevent_req *ch_req = NULL;
|
|
subreq = cli_smb1_close_create(state, ev, cli, fnum, &ch_req);
|
|
if (tevent_req_nomem(subreq, req)) {
|
|
return tevent_req_post(req, ev);
|
|
}
|
|
status = smb1cli_req_chain_submit(&ch_req, 1);
|
|
if (tevent_req_nterror(req, status)) {
|
|
return tevent_req_post(req, ev);
|
|
}
|
|
}
|
|
|
|
tevent_req_set_callback(subreq, cli_close_done, req);
|
|
return req;
|
|
}
|
|
|
|
static void cli_close_done(struct tevent_req *subreq)
|
|
{
|
|
struct tevent_req *req = tevent_req_callback_data(
|
|
subreq, struct tevent_req);
|
|
NTSTATUS status = NT_STATUS_OK;
|
|
bool err = tevent_req_is_nterror(subreq, &status);
|
|
|
|
TALLOC_FREE(subreq);
|
|
if (err) {
|
|
tevent_req_nterror(req, status);
|
|
return;
|
|
}
|
|
tevent_req_done(req);
|
|
}
|
|
|
|
NTSTATUS cli_close_recv(struct tevent_req *req)
|
|
{
|
|
return tevent_req_simple_recv_ntstatus(req);
|
|
}
|
|
|
|
NTSTATUS cli_close(struct cli_state *cli, uint16_t fnum)
|
|
{
|
|
TALLOC_CTX *frame = NULL;
|
|
struct tevent_context *ev;
|
|
struct tevent_req *req;
|
|
NTSTATUS status = NT_STATUS_OK;
|
|
|
|
frame = talloc_stackframe();
|
|
|
|
if (smbXcli_conn_has_async_calls(cli->conn)) {
|
|
/*
|
|
* Can't use sync call while an async call is in flight
|
|
*/
|
|
status = NT_STATUS_INVALID_PARAMETER;
|
|
goto fail;
|
|
}
|
|
|
|
ev = samba_tevent_context_init(frame);
|
|
if (ev == NULL) {
|
|
status = NT_STATUS_NO_MEMORY;
|
|
goto fail;
|
|
}
|
|
|
|
req = cli_close_send(frame, ev, cli, fnum, 0);
|
|
if (req == NULL) {
|
|
status = NT_STATUS_NO_MEMORY;
|
|
goto fail;
|
|
}
|
|
|
|
if (!tevent_req_poll_ntstatus(req, ev, &status)) {
|
|
goto fail;
|
|
}
|
|
|
|
status = cli_close_recv(req);
|
|
fail:
|
|
TALLOC_FREE(frame);
|
|
return status;
|
|
}
|
|
|
|
/****************************************************************************
|
|
Truncate a file to a specified size
|
|
****************************************************************************/
|
|
|
|
struct ftrunc_state {
|
|
uint8_t data[8];
|
|
};
|
|
|
|
static void cli_ftruncate_done(struct tevent_req *subreq)
|
|
{
|
|
NTSTATUS status = cli_setfileinfo_recv(subreq);
|
|
tevent_req_simple_finish_ntstatus(subreq, status);
|
|
}
|
|
|
|
struct tevent_req *cli_ftruncate_send(TALLOC_CTX *mem_ctx,
|
|
struct tevent_context *ev,
|
|
struct cli_state *cli,
|
|
uint16_t fnum,
|
|
uint64_t size)
|
|
{
|
|
struct tevent_req *req = NULL, *subreq = NULL;
|
|
struct ftrunc_state *state = NULL;
|
|
|
|
req = tevent_req_create(mem_ctx, &state, struct ftrunc_state);
|
|
if (req == NULL) {
|
|
return NULL;
|
|
}
|
|
|
|
/* Setup data array. */
|
|
SBVAL(state->data, 0, size);
|
|
|
|
subreq = cli_setfileinfo_send(
|
|
state,
|
|
ev,
|
|
cli,
|
|
fnum,
|
|
SMB_SET_FILE_END_OF_FILE_INFO,
|
|
state->data,
|
|
sizeof(state->data));
|
|
|
|
if (tevent_req_nomem(subreq, req)) {
|
|
return tevent_req_post(req, ev);
|
|
}
|
|
tevent_req_set_callback(subreq, cli_ftruncate_done, req);
|
|
return req;
|
|
}
|
|
|
|
NTSTATUS cli_ftruncate_recv(struct tevent_req *req)
|
|
{
|
|
return tevent_req_simple_recv_ntstatus(req);
|
|
}
|
|
|
|
NTSTATUS cli_ftruncate(struct cli_state *cli, uint16_t fnum, uint64_t size)
|
|
{
|
|
TALLOC_CTX *frame = NULL;
|
|
struct tevent_context *ev = NULL;
|
|
struct tevent_req *req = NULL;
|
|
NTSTATUS status = NT_STATUS_OK;
|
|
|
|
if (smbXcli_conn_protocol(cli->conn) >= PROTOCOL_SMB2_02) {
|
|
return cli_smb2_ftruncate(cli, fnum, size);
|
|
}
|
|
|
|
frame = talloc_stackframe();
|
|
|
|
if (smbXcli_conn_has_async_calls(cli->conn)) {
|
|
/*
|
|
* Can't use sync call while an async call is in flight
|
|
*/
|
|
status = NT_STATUS_INVALID_PARAMETER;
|
|
goto fail;
|
|
}
|
|
|
|
ev = samba_tevent_context_init(frame);
|
|
if (ev == NULL) {
|
|
status = NT_STATUS_NO_MEMORY;
|
|
goto fail;
|
|
}
|
|
|
|
req = cli_ftruncate_send(frame,
|
|
ev,
|
|
cli,
|
|
fnum,
|
|
size);
|
|
if (req == NULL) {
|
|
status = NT_STATUS_NO_MEMORY;
|
|
goto fail;
|
|
}
|
|
|
|
if (!tevent_req_poll_ntstatus(req, ev, &status)) {
|
|
goto fail;
|
|
}
|
|
|
|
status = cli_ftruncate_recv(req);
|
|
|
|
fail:
|
|
TALLOC_FREE(frame);
|
|
return status;
|
|
}
|
|
|
|
static uint8_t *cli_lockingx_put_locks(
|
|
uint8_t *buf,
|
|
bool large,
|
|
uint16_t num_locks,
|
|
const struct smb1_lock_element *locks)
|
|
{
|
|
uint16_t i;
|
|
|
|
for (i=0; i<num_locks; i++) {
|
|
const struct smb1_lock_element *e = &locks[i];
|
|
if (large) {
|
|
SSVAL(buf, 0, e->pid);
|
|
SSVAL(buf, 2, 0);
|
|
SOFF_T_R(buf, 4, e->offset);
|
|
SOFF_T_R(buf, 12, e->length);
|
|
buf += 20;
|
|
} else {
|
|
SSVAL(buf, 0, e->pid);
|
|
SIVAL(buf, 2, e->offset);
|
|
SIVAL(buf, 6, e->length);
|
|
buf += 10;
|
|
}
|
|
}
|
|
return buf;
|
|
}
|
|
|
|
struct cli_lockingx_state {
|
|
uint16_t vwv[8];
|
|
struct iovec bytes;
|
|
struct tevent_req *subreq;
|
|
};
|
|
|
|
static void cli_lockingx_done(struct tevent_req *subreq);
|
|
static bool cli_lockingx_cancel(struct tevent_req *req);
|
|
|
|
struct tevent_req *cli_lockingx_create(
|
|
TALLOC_CTX *mem_ctx,
|
|
struct tevent_context *ev,
|
|
struct cli_state *cli,
|
|
uint16_t fnum,
|
|
uint8_t typeoflock,
|
|
uint8_t newoplocklevel,
|
|
int32_t timeout,
|
|
uint16_t num_unlocks,
|
|
const struct smb1_lock_element *unlocks,
|
|
uint16_t num_locks,
|
|
const struct smb1_lock_element *locks,
|
|
struct tevent_req **psmbreq)
|
|
{
|
|
struct tevent_req *req = NULL, *subreq = NULL;
|
|
struct cli_lockingx_state *state = NULL;
|
|
uint16_t *vwv;
|
|
uint8_t *p;
|
|
const bool large = (typeoflock & LOCKING_ANDX_LARGE_FILES);
|
|
const size_t element_len = large ? 20 : 10;
|
|
|
|
/* uint16->size_t, no overflow */
|
|
const size_t num_elements = (size_t)num_locks + (size_t)num_unlocks;
|
|
|
|
/* at most 20*2*65535 = 2621400, no overflow */
|
|
const size_t num_bytes = num_elements * element_len;
|
|
|
|
req = tevent_req_create(mem_ctx, &state, struct cli_lockingx_state);
|
|
if (req == NULL) {
|
|
return NULL;
|
|
}
|
|
vwv = state->vwv;
|
|
|
|
SCVAL(vwv + 0, 0, 0xFF);
|
|
SCVAL(vwv + 0, 1, 0);
|
|
SSVAL(vwv + 1, 0, 0);
|
|
SSVAL(vwv + 2, 0, fnum);
|
|
SCVAL(vwv + 3, 0, typeoflock);
|
|
SCVAL(vwv + 3, 1, newoplocklevel);
|
|
SIVALS(vwv + 4, 0, timeout);
|
|
SSVAL(vwv + 6, 0, num_unlocks);
|
|
SSVAL(vwv + 7, 0, num_locks);
|
|
|
|
state->bytes.iov_len = num_bytes;
|
|
state->bytes.iov_base = talloc_array(state, uint8_t, num_bytes);
|
|
if (tevent_req_nomem(state->bytes.iov_base, req)) {
|
|
return tevent_req_post(req, ev);
|
|
}
|
|
|
|
p = cli_lockingx_put_locks(
|
|
state->bytes.iov_base, large, num_unlocks, unlocks);
|
|
cli_lockingx_put_locks(p, large, num_locks, locks);
|
|
|
|
subreq = cli_smb_req_create(
|
|
state, ev, cli, SMBlockingX, 0, 0, 8, vwv, 1, &state->bytes);
|
|
if (tevent_req_nomem(subreq, req)) {
|
|
return tevent_req_post(req, ev);
|
|
}
|
|
tevent_req_set_callback(subreq, cli_lockingx_done, req);
|
|
*psmbreq = subreq;
|
|
return req;
|
|
}
|
|
|
|
struct tevent_req *cli_lockingx_send(
|
|
TALLOC_CTX *mem_ctx,
|
|
struct tevent_context *ev,
|
|
struct cli_state *cli,
|
|
uint16_t fnum,
|
|
uint8_t typeoflock,
|
|
uint8_t newoplocklevel,
|
|
int32_t timeout,
|
|
uint16_t num_unlocks,
|
|
const struct smb1_lock_element *unlocks,
|
|
uint16_t num_locks,
|
|
const struct smb1_lock_element *locks)
|
|
{
|
|
struct tevent_req *req = NULL, *subreq = NULL;
|
|
struct cli_lockingx_state *state = NULL;
|
|
NTSTATUS status;
|
|
|
|
req = cli_lockingx_create(
|
|
mem_ctx,
|
|
ev,
|
|
cli,
|
|
fnum,
|
|
typeoflock,
|
|
newoplocklevel,
|
|
timeout,
|
|
num_unlocks,
|
|
unlocks,
|
|
num_locks,
|
|
locks,
|
|
&subreq);
|
|
if (req == NULL) {
|
|
return NULL;
|
|
}
|
|
state = tevent_req_data(req, struct cli_lockingx_state);
|
|
state->subreq = subreq;
|
|
|
|
status = smb1cli_req_chain_submit(&subreq, 1);
|
|
if (tevent_req_nterror(req, status)) {
|
|
return tevent_req_post(req, ev);
|
|
}
|
|
tevent_req_set_cancel_fn(req, cli_lockingx_cancel);
|
|
return req;
|
|
}
|
|
|
|
static void cli_lockingx_done(struct tevent_req *subreq)
|
|
{
|
|
NTSTATUS status = cli_smb_recv(
|
|
subreq, NULL, NULL, 0, NULL, NULL, NULL, NULL);
|
|
tevent_req_simple_finish_ntstatus(subreq, status);
|
|
}
|
|
|
|
static bool cli_lockingx_cancel(struct tevent_req *req)
|
|
{
|
|
struct cli_lockingx_state *state = tevent_req_data(
|
|
req, struct cli_lockingx_state);
|
|
if (state->subreq == NULL) {
|
|
return false;
|
|
}
|
|
return tevent_req_cancel(state->subreq);
|
|
}
|
|
|
|
NTSTATUS cli_lockingx_recv(struct tevent_req *req)
|
|
{
|
|
return tevent_req_simple_recv_ntstatus(req);
|
|
}
|
|
|
|
NTSTATUS cli_lockingx(
|
|
struct cli_state *cli,
|
|
uint16_t fnum,
|
|
uint8_t typeoflock,
|
|
uint8_t newoplocklevel,
|
|
int32_t timeout,
|
|
uint16_t num_unlocks,
|
|
const struct smb1_lock_element *unlocks,
|
|
uint16_t num_locks,
|
|
const struct smb1_lock_element *locks)
|
|
{
|
|
TALLOC_CTX *frame = talloc_stackframe();
|
|
struct tevent_context *ev = NULL;
|
|
struct tevent_req *req = NULL;
|
|
NTSTATUS status = NT_STATUS_NO_MEMORY;
|
|
unsigned int set_timeout = 0;
|
|
unsigned int saved_timeout = 0;
|
|
|
|
if (smbXcli_conn_has_async_calls(cli->conn)) {
|
|
return NT_STATUS_INVALID_PARAMETER;
|
|
}
|
|
ev = samba_tevent_context_init(frame);
|
|
if (ev == NULL) {
|
|
goto fail;
|
|
}
|
|
|
|
if (timeout != 0) {
|
|
if (timeout == -1) {
|
|
set_timeout = 0x7FFFFFFF;
|
|
} else {
|
|
set_timeout = timeout + 2*1000;
|
|
}
|
|
saved_timeout = cli_set_timeout(cli, set_timeout);
|
|
}
|
|
|
|
req = cli_lockingx_send(
|
|
frame,
|
|
ev,
|
|
cli,
|
|
fnum,
|
|
typeoflock,
|
|
newoplocklevel,
|
|
timeout,
|
|
num_unlocks,
|
|
unlocks,
|
|
num_locks,
|
|
locks);
|
|
if (req == NULL) {
|
|
goto fail;
|
|
}
|
|
if (!tevent_req_poll_ntstatus(req, ev, &status)) {
|
|
goto fail;
|
|
}
|
|
status = cli_lockingx_recv(req);
|
|
|
|
if (saved_timeout != 0) {
|
|
cli_set_timeout(cli, saved_timeout);
|
|
}
|
|
fail:
|
|
TALLOC_FREE(frame);
|
|
return status;
|
|
}
|
|
|
|
/****************************************************************************
|
|
send a lock with a specified locktype
|
|
this is used for testing LOCKING_ANDX_CANCEL_LOCK
|
|
****************************************************************************/
|
|
|
|
NTSTATUS cli_locktype(struct cli_state *cli, uint16_t fnum,
|
|
uint32_t offset, uint32_t len,
|
|
int timeout, unsigned char locktype)
|
|
{
|
|
struct smb1_lock_element lck = {
|
|
.pid = cli_getpid(cli),
|
|
.offset = offset,
|
|
.length = len,
|
|
};
|
|
NTSTATUS status;
|
|
|
|
status = cli_lockingx(
|
|
cli, /* cli */
|
|
fnum, /* fnum */
|
|
locktype, /* typeoflock */
|
|
0, /* newoplocklevel */
|
|
timeout, /* timeout */
|
|
0, /* num_unlocks */
|
|
NULL, /* unlocks */
|
|
1, /* num_locks */
|
|
&lck); /* locks */
|
|
return status;
|
|
}
|
|
|
|
/****************************************************************************
|
|
Lock a file.
|
|
note that timeout is in units of 2 milliseconds
|
|
****************************************************************************/
|
|
|
|
NTSTATUS cli_lock32(struct cli_state *cli, uint16_t fnum,
|
|
uint32_t offset, uint32_t len, int timeout,
|
|
enum brl_type lock_type)
|
|
{
|
|
NTSTATUS status;
|
|
|
|
status = cli_locktype(cli, fnum, offset, len, timeout,
|
|
(lock_type == READ_LOCK? 1 : 0));
|
|
return status;
|
|
}
|
|
|
|
/****************************************************************************
|
|
Unlock a file.
|
|
****************************************************************************/
|
|
|
|
struct cli_unlock_state {
|
|
struct smb1_lock_element lck;
|
|
};
|
|
|
|
static void cli_unlock_done(struct tevent_req *subreq);
|
|
|
|
struct tevent_req *cli_unlock_send(TALLOC_CTX *mem_ctx,
|
|
struct tevent_context *ev,
|
|
struct cli_state *cli,
|
|
uint16_t fnum,
|
|
uint64_t offset,
|
|
uint64_t len)
|
|
|
|
{
|
|
struct tevent_req *req = NULL, *subreq = NULL;
|
|
struct cli_unlock_state *state = NULL;
|
|
|
|
req = tevent_req_create(mem_ctx, &state, struct cli_unlock_state);
|
|
if (req == NULL) {
|
|
return NULL;
|
|
}
|
|
state->lck = (struct smb1_lock_element) {
|
|
.pid = cli_getpid(cli),
|
|
.offset = offset,
|
|
.length = len,
|
|
};
|
|
|
|
subreq = cli_lockingx_send(
|
|
state, /* mem_ctx */
|
|
ev, /* tevent_context */
|
|
cli, /* cli */
|
|
fnum, /* fnum */
|
|
0, /* typeoflock */
|
|
0, /* newoplocklevel */
|
|
0, /* timeout */
|
|
1, /* num_unlocks */
|
|
&state->lck, /* unlocks */
|
|
0, /* num_locks */
|
|
NULL); /* locks */
|
|
if (tevent_req_nomem(subreq, req)) {
|
|
return tevent_req_post(req, ev);
|
|
}
|
|
tevent_req_set_callback(subreq, cli_unlock_done, req);
|
|
return req;
|
|
}
|
|
|
|
static void cli_unlock_done(struct tevent_req *subreq)
|
|
{
|
|
NTSTATUS status = cli_lockingx_recv(subreq);
|
|
tevent_req_simple_finish_ntstatus(subreq, status);
|
|
}
|
|
|
|
NTSTATUS cli_unlock_recv(struct tevent_req *req)
|
|
{
|
|
return tevent_req_simple_recv_ntstatus(req);
|
|
}
|
|
|
|
NTSTATUS cli_unlock(struct cli_state *cli,
|
|
uint16_t fnum,
|
|
uint32_t offset,
|
|
uint32_t len)
|
|
{
|
|
TALLOC_CTX *frame = talloc_stackframe();
|
|
struct tevent_context *ev;
|
|
struct tevent_req *req;
|
|
NTSTATUS status = NT_STATUS_OK;
|
|
|
|
if (smbXcli_conn_has_async_calls(cli->conn)) {
|
|
/*
|
|
* Can't use sync call while an async call is in flight
|
|
*/
|
|
status = NT_STATUS_INVALID_PARAMETER;
|
|
goto fail;
|
|
}
|
|
|
|
ev = samba_tevent_context_init(frame);
|
|
if (ev == NULL) {
|
|
status = NT_STATUS_NO_MEMORY;
|
|
goto fail;
|
|
}
|
|
|
|
req = cli_unlock_send(frame, ev, cli,
|
|
fnum, offset, len);
|
|
if (req == NULL) {
|
|
status = NT_STATUS_NO_MEMORY;
|
|
goto fail;
|
|
}
|
|
|
|
if (!tevent_req_poll_ntstatus(req, ev, &status)) {
|
|
goto fail;
|
|
}
|
|
|
|
status = cli_unlock_recv(req);
|
|
|
|
fail:
|
|
TALLOC_FREE(frame);
|
|
return status;
|
|
}
|
|
|
|
/****************************************************************************
|
|
Get/unlock a POSIX lock on a file - internal function.
|
|
****************************************************************************/
|
|
|
|
struct posix_lock_state {
|
|
uint16_t setup;
|
|
uint8_t param[4];
|
|
uint8_t data[POSIX_LOCK_DATA_SIZE];
|
|
};
|
|
|
|
static void cli_posix_unlock_internal_done(struct tevent_req *subreq)
|
|
{
|
|
NTSTATUS status = cli_trans_recv(subreq, NULL, NULL, NULL, 0, NULL,
|
|
NULL, 0, NULL, NULL, 0, NULL);
|
|
tevent_req_simple_finish_ntstatus(subreq, status);
|
|
}
|
|
|
|
static struct tevent_req *cli_posix_lock_internal_send(TALLOC_CTX *mem_ctx,
|
|
struct tevent_context *ev,
|
|
struct cli_state *cli,
|
|
uint16_t fnum,
|
|
uint64_t offset,
|
|
uint64_t len,
|
|
bool wait_lock,
|
|
enum brl_type lock_type)
|
|
{
|
|
struct tevent_req *req = NULL, *subreq = NULL;
|
|
struct posix_lock_state *state = NULL;
|
|
|
|
req = tevent_req_create(mem_ctx, &state, struct posix_lock_state);
|
|
if (req == NULL) {
|
|
return NULL;
|
|
}
|
|
|
|
/* Setup setup word. */
|
|
SSVAL(&state->setup, 0, TRANSACT2_SETFILEINFO);
|
|
|
|
/* Setup param array. */
|
|
SSVAL(&state->param, 0, fnum);
|
|
SSVAL(&state->param, 2, SMB_SET_POSIX_LOCK);
|
|
|
|
/* Setup data array. */
|
|
switch (lock_type) {
|
|
case READ_LOCK:
|
|
SSVAL(&state->data, POSIX_LOCK_TYPE_OFFSET,
|
|
POSIX_LOCK_TYPE_READ);
|
|
break;
|
|
case WRITE_LOCK:
|
|
SSVAL(&state->data, POSIX_LOCK_TYPE_OFFSET,
|
|
POSIX_LOCK_TYPE_WRITE);
|
|
break;
|
|
case UNLOCK_LOCK:
|
|
SSVAL(&state->data, POSIX_LOCK_TYPE_OFFSET,
|
|
POSIX_LOCK_TYPE_UNLOCK);
|
|
break;
|
|
default:
|
|
return NULL;
|
|
}
|
|
|
|
if (wait_lock) {
|
|
SSVAL(&state->data, POSIX_LOCK_FLAGS_OFFSET,
|
|
POSIX_LOCK_FLAG_WAIT);
|
|
} else {
|
|
SSVAL(state->data, POSIX_LOCK_FLAGS_OFFSET,
|
|
POSIX_LOCK_FLAG_NOWAIT);
|
|
}
|
|
|
|
SIVAL(&state->data, POSIX_LOCK_PID_OFFSET, cli_getpid(cli));
|
|
SOFF_T(&state->data, POSIX_LOCK_START_OFFSET, offset);
|
|
SOFF_T(&state->data, POSIX_LOCK_LEN_OFFSET, len);
|
|
|
|
subreq = cli_trans_send(state, /* mem ctx. */
|
|
ev, /* event ctx. */
|
|
cli, /* cli_state. */
|
|
0, /* additional_flags2 */
|
|
SMBtrans2, /* cmd. */
|
|
NULL, /* pipe name. */
|
|
-1, /* fid. */
|
|
0, /* function. */
|
|
0, /* flags. */
|
|
&state->setup, /* setup. */
|
|
1, /* num setup uint16_t words. */
|
|
0, /* max returned setup. */
|
|
state->param, /* param. */
|
|
4, /* num param. */
|
|
2, /* max returned param. */
|
|
state->data, /* data. */
|
|
POSIX_LOCK_DATA_SIZE, /* num data. */
|
|
0); /* max returned data. */
|
|
|
|
if (tevent_req_nomem(subreq, req)) {
|
|
return tevent_req_post(req, ev);
|
|
}
|
|
tevent_req_set_callback(subreq, cli_posix_unlock_internal_done, req);
|
|
return req;
|
|
}
|
|
|
|
/****************************************************************************
|
|
POSIX Lock a file.
|
|
****************************************************************************/
|
|
|
|
struct tevent_req *cli_posix_lock_send(TALLOC_CTX *mem_ctx,
|
|
struct tevent_context *ev,
|
|
struct cli_state *cli,
|
|
uint16_t fnum,
|
|
uint64_t offset,
|
|
uint64_t len,
|
|
bool wait_lock,
|
|
enum brl_type lock_type)
|
|
{
|
|
return cli_posix_lock_internal_send(mem_ctx, ev, cli, fnum, offset, len,
|
|
wait_lock, lock_type);
|
|
}
|
|
|
|
NTSTATUS cli_posix_lock_recv(struct tevent_req *req)
|
|
{
|
|
return tevent_req_simple_recv_ntstatus(req);
|
|
}
|
|
|
|
NTSTATUS cli_posix_lock(struct cli_state *cli, uint16_t fnum,
|
|
uint64_t offset, uint64_t len,
|
|
bool wait_lock, enum brl_type lock_type)
|
|
{
|
|
TALLOC_CTX *frame = talloc_stackframe();
|
|
struct tevent_context *ev = NULL;
|
|
struct tevent_req *req = NULL;
|
|
NTSTATUS status = NT_STATUS_OK;
|
|
|
|
if (smbXcli_conn_has_async_calls(cli->conn)) {
|
|
/*
|
|
* Can't use sync call while an async call is in flight
|
|
*/
|
|
status = NT_STATUS_INVALID_PARAMETER;
|
|
goto fail;
|
|
}
|
|
|
|
if (lock_type != READ_LOCK && lock_type != WRITE_LOCK) {
|
|
status = NT_STATUS_INVALID_PARAMETER;
|
|
goto fail;
|
|
}
|
|
|
|
ev = samba_tevent_context_init(frame);
|
|
if (ev == NULL) {
|
|
status = NT_STATUS_NO_MEMORY;
|
|
goto fail;
|
|
}
|
|
|
|
req = cli_posix_lock_send(frame,
|
|
ev,
|
|
cli,
|
|
fnum,
|
|
offset,
|
|
len,
|
|
wait_lock,
|
|
lock_type);
|
|
if (req == NULL) {
|
|
status = NT_STATUS_NO_MEMORY;
|
|
goto fail;
|
|
}
|
|
|
|
if (!tevent_req_poll_ntstatus(req, ev, &status)) {
|
|
goto fail;
|
|
}
|
|
|
|
status = cli_posix_lock_recv(req);
|
|
|
|
fail:
|
|
TALLOC_FREE(frame);
|
|
return status;
|
|
}
|
|
|
|
/****************************************************************************
|
|
POSIX Unlock a file.
|
|
****************************************************************************/
|
|
|
|
struct tevent_req *cli_posix_unlock_send(TALLOC_CTX *mem_ctx,
|
|
struct tevent_context *ev,
|
|
struct cli_state *cli,
|
|
uint16_t fnum,
|
|
uint64_t offset,
|
|
uint64_t len)
|
|
{
|
|
return cli_posix_lock_internal_send(mem_ctx, ev, cli, fnum, offset, len,
|
|
false, UNLOCK_LOCK);
|
|
}
|
|
|
|
NTSTATUS cli_posix_unlock_recv(struct tevent_req *req)
|
|
{
|
|
return tevent_req_simple_recv_ntstatus(req);
|
|
}
|
|
|
|
NTSTATUS cli_posix_unlock(struct cli_state *cli, uint16_t fnum, uint64_t offset, uint64_t len)
|
|
{
|
|
TALLOC_CTX *frame = talloc_stackframe();
|
|
struct tevent_context *ev = NULL;
|
|
struct tevent_req *req = NULL;
|
|
NTSTATUS status = NT_STATUS_OK;
|
|
|
|
if (smbXcli_conn_has_async_calls(cli->conn)) {
|
|
/*
|
|
* Can't use sync call while an async call is in flight
|
|
*/
|
|
status = NT_STATUS_INVALID_PARAMETER;
|
|
goto fail;
|
|
}
|
|
|
|
ev = samba_tevent_context_init(frame);
|
|
if (ev == NULL) {
|
|
status = NT_STATUS_NO_MEMORY;
|
|
goto fail;
|
|
}
|
|
|
|
req = cli_posix_unlock_send(frame,
|
|
ev,
|
|
cli,
|
|
fnum,
|
|
offset,
|
|
len);
|
|
if (req == NULL) {
|
|
status = NT_STATUS_NO_MEMORY;
|
|
goto fail;
|
|
}
|
|
|
|
if (!tevent_req_poll_ntstatus(req, ev, &status)) {
|
|
goto fail;
|
|
}
|
|
|
|
status = cli_posix_unlock_recv(req);
|
|
|
|
fail:
|
|
TALLOC_FREE(frame);
|
|
return status;
|
|
}
|
|
|
|
/****************************************************************************
|
|
Do a SMBgetattrE call.
|
|
****************************************************************************/
|
|
|
|
static void cli_getattrE_done(struct tevent_req *subreq);
|
|
|
|
struct cli_getattrE_state {
|
|
uint16_t vwv[1];
|
|
int zone_offset;
|
|
uint32_t attr;
|
|
off_t size;
|
|
time_t change_time;
|
|
time_t access_time;
|
|
time_t write_time;
|
|
};
|
|
|
|
struct tevent_req *cli_getattrE_send(TALLOC_CTX *mem_ctx,
|
|
struct tevent_context *ev,
|
|
struct cli_state *cli,
|
|
uint16_t fnum)
|
|
{
|
|
struct tevent_req *req = NULL, *subreq = NULL;
|
|
struct cli_getattrE_state *state = NULL;
|
|
uint8_t additional_flags = 0;
|
|
|
|
req = tevent_req_create(mem_ctx, &state, struct cli_getattrE_state);
|
|
if (req == NULL) {
|
|
return NULL;
|
|
}
|
|
|
|
state->zone_offset = smb1cli_conn_server_time_zone(cli->conn);
|
|
SSVAL(state->vwv+0,0,fnum);
|
|
|
|
subreq = cli_smb_send(state, ev, cli, SMBgetattrE, additional_flags, 0,
|
|
1, state->vwv, 0, NULL);
|
|
if (tevent_req_nomem(subreq, req)) {
|
|
return tevent_req_post(req, ev);
|
|
}
|
|
tevent_req_set_callback(subreq, cli_getattrE_done, req);
|
|
return req;
|
|
}
|
|
|
|
static void cli_getattrE_done(struct tevent_req *subreq)
|
|
{
|
|
struct tevent_req *req = tevent_req_callback_data(
|
|
subreq, struct tevent_req);
|
|
struct cli_getattrE_state *state = tevent_req_data(
|
|
req, struct cli_getattrE_state);
|
|
uint8_t wct;
|
|
uint16_t *vwv = NULL;
|
|
NTSTATUS status;
|
|
|
|
status = cli_smb_recv(subreq, state, NULL, 11, &wct, &vwv,
|
|
NULL, NULL);
|
|
TALLOC_FREE(subreq);
|
|
if (tevent_req_nterror(req, status)) {
|
|
return;
|
|
}
|
|
|
|
state->size = (off_t)IVAL(vwv+6,0);
|
|
state->attr = SVAL(vwv+10,0);
|
|
state->change_time = make_unix_date2(vwv+0, state->zone_offset);
|
|
state->access_time = make_unix_date2(vwv+2, state->zone_offset);
|
|
state->write_time = make_unix_date2(vwv+4, state->zone_offset);
|
|
|
|
tevent_req_done(req);
|
|
}
|
|
|
|
NTSTATUS cli_getattrE_recv(struct tevent_req *req,
|
|
uint32_t *pattr,
|
|
off_t *size,
|
|
time_t *change_time,
|
|
time_t *access_time,
|
|
time_t *write_time)
|
|
{
|
|
struct cli_getattrE_state *state = tevent_req_data(
|
|
req, struct cli_getattrE_state);
|
|
NTSTATUS status;
|
|
|
|
if (tevent_req_is_nterror(req, &status)) {
|
|
return status;
|
|
}
|
|
if (pattr) {
|
|
*pattr = state->attr;
|
|
}
|
|
if (size) {
|
|
*size = state->size;
|
|
}
|
|
if (change_time) {
|
|
*change_time = state->change_time;
|
|
}
|
|
if (access_time) {
|
|
*access_time = state->access_time;
|
|
}
|
|
if (write_time) {
|
|
*write_time = state->write_time;
|
|
}
|
|
return NT_STATUS_OK;
|
|
}
|
|
|
|
/****************************************************************************
|
|
Do a SMBgetatr call
|
|
****************************************************************************/
|
|
|
|
static void cli_getatr_done(struct tevent_req *subreq);
|
|
|
|
struct cli_getatr_state {
|
|
int zone_offset;
|
|
uint32_t attr;
|
|
off_t size;
|
|
time_t write_time;
|
|
};
|
|
|
|
struct tevent_req *cli_getatr_send(TALLOC_CTX *mem_ctx,
|
|
struct tevent_context *ev,
|
|
struct cli_state *cli,
|
|
const char *fname)
|
|
{
|
|
struct tevent_req *req = NULL, *subreq = NULL;
|
|
struct cli_getatr_state *state = NULL;
|
|
uint8_t additional_flags = 0;
|
|
uint16_t additional_flags2 = 0;
|
|
uint8_t *bytes = NULL;
|
|
char *fname_cp = NULL;
|
|
|
|
req = tevent_req_create(mem_ctx, &state, struct cli_getatr_state);
|
|
if (req == NULL) {
|
|
return NULL;
|
|
}
|
|
|
|
state->zone_offset = smb1cli_conn_server_time_zone(cli->conn);
|
|
|
|
bytes = talloc_array(state, uint8_t, 1);
|
|
if (tevent_req_nomem(bytes, req)) {
|
|
return tevent_req_post(req, ev);
|
|
}
|
|
/*
|
|
* SMBgetatr on a DFS share must use DFS names.
|
|
*/
|
|
fname_cp = smb1_dfs_share_path(state, cli, fname);
|
|
if (tevent_req_nomem(fname_cp, req)) {
|
|
return tevent_req_post(req, ev);
|
|
}
|
|
bytes[0] = 4;
|
|
bytes = smb_bytes_push_str(bytes,
|
|
smbXcli_conn_use_unicode(cli->conn),
|
|
fname_cp,
|
|
strlen(fname_cp)+1,
|
|
NULL);
|
|
|
|
if (tevent_req_nomem(bytes, req)) {
|
|
return tevent_req_post(req, ev);
|
|
}
|
|
|
|
if (clistr_is_previous_version_path(fname)) {
|
|
additional_flags2 = FLAGS2_REPARSE_PATH;
|
|
}
|
|
|
|
subreq = cli_smb_send(state, ev, cli, SMBgetatr, additional_flags,
|
|
additional_flags2,
|
|
0, NULL, talloc_get_size(bytes), bytes);
|
|
if (tevent_req_nomem(subreq, req)) {
|
|
return tevent_req_post(req, ev);
|
|
}
|
|
tevent_req_set_callback(subreq, cli_getatr_done, req);
|
|
return req;
|
|
}
|
|
|
|
static void cli_getatr_done(struct tevent_req *subreq)
|
|
{
|
|
struct tevent_req *req = tevent_req_callback_data(
|
|
subreq, struct tevent_req);
|
|
struct cli_getatr_state *state = tevent_req_data(
|
|
req, struct cli_getatr_state);
|
|
uint8_t wct;
|
|
uint16_t *vwv = NULL;
|
|
NTSTATUS status;
|
|
|
|
status = cli_smb_recv(subreq, state, NULL, 4, &wct, &vwv, NULL,
|
|
NULL);
|
|
TALLOC_FREE(subreq);
|
|
if (tevent_req_nterror(req, status)) {
|
|
return;
|
|
}
|
|
|
|
state->attr = SVAL(vwv+0,0);
|
|
state->size = (off_t)IVAL(vwv+3,0);
|
|
state->write_time = make_unix_date3(vwv+1, state->zone_offset);
|
|
|
|
tevent_req_done(req);
|
|
}
|
|
|
|
NTSTATUS cli_getatr_recv(struct tevent_req *req,
|
|
uint32_t *pattr,
|
|
off_t *size,
|
|
time_t *write_time)
|
|
{
|
|
struct cli_getatr_state *state = tevent_req_data(
|
|
req, struct cli_getatr_state);
|
|
NTSTATUS status;
|
|
|
|
if (tevent_req_is_nterror(req, &status)) {
|
|
return status;
|
|
}
|
|
if (pattr) {
|
|
*pattr = state->attr;
|
|
}
|
|
if (size) {
|
|
*size = state->size;
|
|
}
|
|
if (write_time) {
|
|
*write_time = state->write_time;
|
|
}
|
|
return NT_STATUS_OK;
|
|
}
|
|
|
|
NTSTATUS cli_getatr(struct cli_state *cli,
|
|
const char *fname,
|
|
uint32_t *pattr,
|
|
off_t *size,
|
|
time_t *write_time)
|
|
{
|
|
TALLOC_CTX *frame = NULL;
|
|
struct tevent_context *ev = NULL;
|
|
struct tevent_req *req = NULL;
|
|
NTSTATUS status = NT_STATUS_OK;
|
|
|
|
if (smbXcli_conn_protocol(cli->conn) >= PROTOCOL_SMB2_02) {
|
|
struct stat_ex sbuf = {
|
|
.st_ex_nlink = 0,
|
|
};
|
|
uint32_t attr;
|
|
|
|
status = cli_smb2_qpathinfo_basic(cli, fname, &sbuf, &attr);
|
|
if (!NT_STATUS_IS_OK(status)) {
|
|
return status;
|
|
}
|
|
|
|
if (pattr != NULL) {
|
|
*pattr = attr;
|
|
}
|
|
if (size != NULL) {
|
|
*size = sbuf.st_ex_size;
|
|
}
|
|
if (write_time != NULL) {
|
|
*write_time = sbuf.st_ex_mtime.tv_sec;
|
|
}
|
|
return NT_STATUS_OK;
|
|
}
|
|
|
|
frame = talloc_stackframe();
|
|
|
|
if (smbXcli_conn_has_async_calls(cli->conn)) {
|
|
/*
|
|
* Can't use sync call while an async call is in flight
|
|
*/
|
|
status = NT_STATUS_INVALID_PARAMETER;
|
|
goto fail;
|
|
}
|
|
|
|
ev = samba_tevent_context_init(frame);
|
|
if (ev == NULL) {
|
|
status = NT_STATUS_NO_MEMORY;
|
|
goto fail;
|
|
}
|
|
|
|
req = cli_getatr_send(frame, ev, cli, fname);
|
|
if (req == NULL) {
|
|
status = NT_STATUS_NO_MEMORY;
|
|
goto fail;
|
|
}
|
|
|
|
if (!tevent_req_poll_ntstatus(req, ev, &status)) {
|
|
goto fail;
|
|
}
|
|
|
|
status = cli_getatr_recv(req,
|
|
pattr,
|
|
size,
|
|
write_time);
|
|
|
|
fail:
|
|
TALLOC_FREE(frame);
|
|
return status;
|
|
}
|
|
|
|
/****************************************************************************
|
|
Do a SMBsetattrE call.
|
|
****************************************************************************/
|
|
|
|
static void cli_setattrE_done(struct tevent_req *subreq);
|
|
|
|
struct cli_setattrE_state {
|
|
uint16_t vwv[7];
|
|
};
|
|
|
|
struct tevent_req *cli_setattrE_send(TALLOC_CTX *mem_ctx,
|
|
struct tevent_context *ev,
|
|
struct cli_state *cli,
|
|
uint16_t fnum,
|
|
time_t change_time,
|
|
time_t access_time,
|
|
time_t write_time)
|
|
{
|
|
struct tevent_req *req = NULL, *subreq = NULL;
|
|
struct cli_setattrE_state *state = NULL;
|
|
uint8_t additional_flags = 0;
|
|
|
|
req = tevent_req_create(mem_ctx, &state, struct cli_setattrE_state);
|
|
if (req == NULL) {
|
|
return NULL;
|
|
}
|
|
|
|
SSVAL(state->vwv+0, 0, fnum);
|
|
push_dos_date2((uint8_t *)&state->vwv[1], 0, change_time,
|
|
smb1cli_conn_server_time_zone(cli->conn));
|
|
push_dos_date2((uint8_t *)&state->vwv[3], 0, access_time,
|
|
smb1cli_conn_server_time_zone(cli->conn));
|
|
push_dos_date2((uint8_t *)&state->vwv[5], 0, write_time,
|
|
smb1cli_conn_server_time_zone(cli->conn));
|
|
|
|
subreq = cli_smb_send(state, ev, cli, SMBsetattrE, additional_flags, 0,
|
|
7, state->vwv, 0, NULL);
|
|
if (tevent_req_nomem(subreq, req)) {
|
|
return tevent_req_post(req, ev);
|
|
}
|
|
tevent_req_set_callback(subreq, cli_setattrE_done, req);
|
|
return req;
|
|
}
|
|
|
|
static void cli_setattrE_done(struct tevent_req *subreq)
|
|
{
|
|
struct tevent_req *req = tevent_req_callback_data(
|
|
subreq, struct tevent_req);
|
|
NTSTATUS status;
|
|
|
|
status = cli_smb_recv(subreq, NULL, NULL, 0, NULL, NULL, NULL, NULL);
|
|
TALLOC_FREE(subreq);
|
|
if (tevent_req_nterror(req, status)) {
|
|
return;
|
|
}
|
|
tevent_req_done(req);
|
|
}
|
|
|
|
NTSTATUS cli_setattrE_recv(struct tevent_req *req)
|
|
{
|
|
return tevent_req_simple_recv_ntstatus(req);
|
|
}
|
|
|
|
NTSTATUS cli_setattrE(struct cli_state *cli,
|
|
uint16_t fnum,
|
|
time_t change_time,
|
|
time_t access_time,
|
|
time_t write_time)
|
|
{
|
|
TALLOC_CTX *frame = NULL;
|
|
struct tevent_context *ev = NULL;
|
|
struct tevent_req *req = NULL;
|
|
NTSTATUS status = NT_STATUS_OK;
|
|
|
|
if (smbXcli_conn_protocol(cli->conn) >= PROTOCOL_SMB2_02) {
|
|
return cli_smb2_setattrE(cli,
|
|
fnum,
|
|
change_time,
|
|
access_time,
|
|
write_time);
|
|
}
|
|
|
|
frame = talloc_stackframe();
|
|
|
|
if (smbXcli_conn_has_async_calls(cli->conn)) {
|
|
/*
|
|
* Can't use sync call while an async call is in flight
|
|
*/
|
|
status = NT_STATUS_INVALID_PARAMETER;
|
|
goto fail;
|
|
}
|
|
|
|
ev = samba_tevent_context_init(frame);
|
|
if (ev == NULL) {
|
|
status = NT_STATUS_NO_MEMORY;
|
|
goto fail;
|
|
}
|
|
|
|
req = cli_setattrE_send(frame, ev,
|
|
cli,
|
|
fnum,
|
|
change_time,
|
|
access_time,
|
|
write_time);
|
|
|
|
if (req == NULL) {
|
|
status = NT_STATUS_NO_MEMORY;
|
|
goto fail;
|
|
}
|
|
|
|
if (!tevent_req_poll_ntstatus(req, ev, &status)) {
|
|
goto fail;
|
|
}
|
|
|
|
status = cli_setattrE_recv(req);
|
|
|
|
fail:
|
|
TALLOC_FREE(frame);
|
|
return status;
|
|
}
|
|
|
|
/****************************************************************************
|
|
Do a SMBsetatr call.
|
|
****************************************************************************/
|
|
|
|
static void cli_setatr_done(struct tevent_req *subreq);
|
|
|
|
struct cli_setatr_state {
|
|
uint16_t vwv[8];
|
|
};
|
|
|
|
struct tevent_req *cli_setatr_send(TALLOC_CTX *mem_ctx,
|
|
struct tevent_context *ev,
|
|
struct cli_state *cli,
|
|
const char *fname,
|
|
uint32_t attr,
|
|
time_t mtime)
|
|
{
|
|
struct tevent_req *req = NULL, *subreq = NULL;
|
|
struct cli_setatr_state *state = NULL;
|
|
uint8_t additional_flags = 0;
|
|
uint16_t additional_flags2 = 0;
|
|
uint8_t *bytes = NULL;
|
|
char *fname_cp = NULL;
|
|
|
|
req = tevent_req_create(mem_ctx, &state, struct cli_setatr_state);
|
|
if (req == NULL) {
|
|
return NULL;
|
|
}
|
|
|
|
if (attr & 0xFFFF0000) {
|
|
/*
|
|
* Don't allow attributes greater than
|
|
* 16-bits for a 16-bit protocol value.
|
|
*/
|
|
if (tevent_req_nterror(req, NT_STATUS_INVALID_PARAMETER)) {
|
|
return tevent_req_post(req, ev);
|
|
}
|
|
}
|
|
|
|
SSVAL(state->vwv+0, 0, attr);
|
|
push_dos_date3((uint8_t *)&state->vwv[1], 0, mtime, smb1cli_conn_server_time_zone(cli->conn));
|
|
|
|
bytes = talloc_array(state, uint8_t, 1);
|
|
if (tevent_req_nomem(bytes, req)) {
|
|
return tevent_req_post(req, ev);
|
|
}
|
|
/*
|
|
* SMBsetatr on a DFS share must use DFS names.
|
|
*/
|
|
fname_cp = smb1_dfs_share_path(state, cli, fname);
|
|
if (tevent_req_nomem(fname_cp, req)) {
|
|
return tevent_req_post(req, ev);
|
|
}
|
|
bytes[0] = 4;
|
|
bytes = smb_bytes_push_str(bytes,
|
|
smbXcli_conn_use_unicode(cli->conn),
|
|
fname_cp,
|
|
strlen(fname_cp)+1,
|
|
NULL);
|
|
if (tevent_req_nomem(bytes, req)) {
|
|
return tevent_req_post(req, ev);
|
|
}
|
|
bytes = talloc_realloc(state, bytes, uint8_t,
|
|
talloc_get_size(bytes)+1);
|
|
if (tevent_req_nomem(bytes, req)) {
|
|
return tevent_req_post(req, ev);
|
|
}
|
|
|
|
bytes[talloc_get_size(bytes)-1] = 4;
|
|
bytes = smb_bytes_push_str(bytes, smbXcli_conn_use_unicode(cli->conn), "",
|
|
1, NULL);
|
|
if (tevent_req_nomem(bytes, req)) {
|
|
return tevent_req_post(req, ev);
|
|
}
|
|
|
|
if (clistr_is_previous_version_path(fname)) {
|
|
additional_flags2 = FLAGS2_REPARSE_PATH;
|
|
}
|
|
|
|
subreq = cli_smb_send(state, ev, cli, SMBsetatr, additional_flags,
|
|
additional_flags2,
|
|
8, state->vwv, talloc_get_size(bytes), bytes);
|
|
if (tevent_req_nomem(subreq, req)) {
|
|
return tevent_req_post(req, ev);
|
|
}
|
|
tevent_req_set_callback(subreq, cli_setatr_done, req);
|
|
return req;
|
|
}
|
|
|
|
static void cli_setatr_done(struct tevent_req *subreq)
|
|
{
|
|
struct tevent_req *req = tevent_req_callback_data(
|
|
subreq, struct tevent_req);
|
|
NTSTATUS status;
|
|
|
|
status = cli_smb_recv(subreq, NULL, NULL, 0, NULL, NULL, NULL, NULL);
|
|
TALLOC_FREE(subreq);
|
|
if (tevent_req_nterror(req, status)) {
|
|
return;
|
|
}
|
|
tevent_req_done(req);
|
|
}
|
|
|
|
NTSTATUS cli_setatr_recv(struct tevent_req *req)
|
|
{
|
|
return tevent_req_simple_recv_ntstatus(req);
|
|
}
|
|
|
|
NTSTATUS cli_setatr(struct cli_state *cli,
|
|
const char *fname,
|
|
uint32_t attr,
|
|
time_t mtime)
|
|
{
|
|
TALLOC_CTX *frame = NULL;
|
|
struct tevent_context *ev = NULL;
|
|
struct tevent_req *req = NULL;
|
|
NTSTATUS status = NT_STATUS_OK;
|
|
|
|
if (smbXcli_conn_protocol(cli->conn) >= PROTOCOL_SMB2_02) {
|
|
return cli_smb2_setatr(cli,
|
|
fname,
|
|
attr,
|
|
mtime);
|
|
}
|
|
|
|
frame = talloc_stackframe();
|
|
|
|
if (smbXcli_conn_has_async_calls(cli->conn)) {
|
|
/*
|
|
* Can't use sync call while an async call is in flight
|
|
*/
|
|
status = NT_STATUS_INVALID_PARAMETER;
|
|
goto fail;
|
|
}
|
|
|
|
ev = samba_tevent_context_init(frame);
|
|
if (ev == NULL) {
|
|
status = NT_STATUS_NO_MEMORY;
|
|
goto fail;
|
|
}
|
|
|
|
req = cli_setatr_send(frame, ev, cli, fname, attr, mtime);
|
|
if (req == NULL) {
|
|
status = NT_STATUS_NO_MEMORY;
|
|
goto fail;
|
|
}
|
|
|
|
if (!tevent_req_poll_ntstatus(req, ev, &status)) {
|
|
goto fail;
|
|
}
|
|
|
|
status = cli_setatr_recv(req);
|
|
|
|
fail:
|
|
TALLOC_FREE(frame);
|
|
return status;
|
|
}
|
|
|
|
/****************************************************************************
|
|
Check for existence of a dir.
|
|
****************************************************************************/
|
|
|
|
static void cli_chkpath_done(struct tevent_req *subreq);
|
|
static void cli_chkpath_opened(struct tevent_req *subreq);
|
|
static void cli_chkpath_closed(struct tevent_req *subreq);
|
|
|
|
struct cli_chkpath_state {
|
|
struct tevent_context *ev;
|
|
struct cli_state *cli;
|
|
};
|
|
|
|
struct tevent_req *cli_chkpath_send(TALLOC_CTX *mem_ctx,
|
|
struct tevent_context *ev,
|
|
struct cli_state *cli,
|
|
const char *fname)
|
|
{
|
|
struct tevent_req *req = NULL, *subreq = NULL;
|
|
struct cli_chkpath_state *state = NULL;
|
|
uint8_t additional_flags = 0;
|
|
uint16_t additional_flags2 = 0;
|
|
uint8_t *bytes = NULL;
|
|
char *fname_cp = NULL;
|
|
|
|
req = tevent_req_create(mem_ctx, &state, struct cli_chkpath_state);
|
|
if (req == NULL) {
|
|
return NULL;
|
|
}
|
|
state->ev = ev;
|
|
state->cli = cli;
|
|
|
|
if (smbXcli_conn_protocol(cli->conn) >= PROTOCOL_NT1) {
|
|
subreq = cli_ntcreate_send(
|
|
state, /* mem_ctx */
|
|
state->ev, /* ev */
|
|
state->cli, /* cli */
|
|
fname, /* fname */
|
|
0, /* create_flags */
|
|
FILE_READ_ATTRIBUTES, /* desired_access */
|
|
FILE_ATTRIBUTE_DIRECTORY, /* FileAttributes */
|
|
FILE_SHARE_READ|
|
|
FILE_SHARE_WRITE|
|
|
FILE_SHARE_DELETE, /* share_access */
|
|
FILE_OPEN, /* CreateDisposition */
|
|
FILE_DIRECTORY_FILE, /* CreateOptions */
|
|
SMB2_IMPERSONATION_IMPERSONATION,
|
|
0); /* SecurityFlags */
|
|
if (tevent_req_nomem(subreq, req)) {
|
|
return tevent_req_post(req, ev);
|
|
}
|
|
tevent_req_set_callback(subreq, cli_chkpath_opened, req);
|
|
return req;
|
|
}
|
|
|
|
bytes = talloc_array(state, uint8_t, 1);
|
|
if (tevent_req_nomem(bytes, req)) {
|
|
return tevent_req_post(req, ev);
|
|
}
|
|
/*
|
|
* SMBcheckpath on a DFS share must use DFS names.
|
|
*/
|
|
fname_cp = smb1_dfs_share_path(state, cli, fname);
|
|
if (tevent_req_nomem(fname_cp, req)) {
|
|
return tevent_req_post(req, ev);
|
|
}
|
|
bytes[0] = 4;
|
|
bytes = smb_bytes_push_str(bytes,
|
|
smbXcli_conn_use_unicode(cli->conn),
|
|
fname_cp,
|
|
strlen(fname_cp)+1,
|
|
NULL);
|
|
|
|
if (tevent_req_nomem(bytes, req)) {
|
|
return tevent_req_post(req, ev);
|
|
}
|
|
|
|
if (clistr_is_previous_version_path(fname)) {
|
|
additional_flags2 = FLAGS2_REPARSE_PATH;
|
|
}
|
|
|
|
subreq = cli_smb_send(state, ev, cli, SMBcheckpath, additional_flags,
|
|
additional_flags2,
|
|
0, NULL, talloc_get_size(bytes), bytes);
|
|
if (tevent_req_nomem(subreq, req)) {
|
|
return tevent_req_post(req, ev);
|
|
}
|
|
tevent_req_set_callback(subreq, cli_chkpath_done, req);
|
|
return req;
|
|
}
|
|
|
|
static void cli_chkpath_done(struct tevent_req *subreq)
|
|
{
|
|
NTSTATUS status = cli_smb_recv(
|
|
subreq, NULL, NULL, 0, NULL, NULL, NULL, NULL);
|
|
tevent_req_simple_finish_ntstatus(subreq, status);
|
|
}
|
|
|
|
static void cli_chkpath_opened(struct tevent_req *subreq)
|
|
{
|
|
struct tevent_req *req = tevent_req_callback_data(
|
|
subreq, struct tevent_req);
|
|
struct cli_chkpath_state *state = tevent_req_data(
|
|
req, struct cli_chkpath_state);
|
|
NTSTATUS status;
|
|
uint16_t fnum;
|
|
|
|
status = cli_ntcreate_recv(subreq, &fnum, NULL);
|
|
TALLOC_FREE(subreq);
|
|
if (tevent_req_nterror(req, status)) {
|
|
return;
|
|
}
|
|
|
|
subreq = cli_close_send(state, state->ev, state->cli, fnum, 0);
|
|
if (tevent_req_nomem(subreq, req)) {
|
|
return;
|
|
}
|
|
tevent_req_set_callback(subreq, cli_chkpath_closed, req);
|
|
}
|
|
|
|
static void cli_chkpath_closed(struct tevent_req *subreq)
|
|
{
|
|
NTSTATUS status = cli_close_recv(subreq);
|
|
tevent_req_simple_finish_ntstatus(subreq, status);
|
|
}
|
|
|
|
NTSTATUS cli_chkpath_recv(struct tevent_req *req)
|
|
{
|
|
return tevent_req_simple_recv_ntstatus(req);
|
|
}
|
|
|
|
NTSTATUS cli_chkpath(struct cli_state *cli, const char *path)
|
|
{
|
|
TALLOC_CTX *frame = NULL;
|
|
struct tevent_context *ev = NULL;
|
|
struct tevent_req *req = NULL;
|
|
char *path2 = NULL;
|
|
NTSTATUS status = NT_STATUS_OK;
|
|
|
|
frame = talloc_stackframe();
|
|
|
|
if (smbXcli_conn_has_async_calls(cli->conn)) {
|
|
/*
|
|
* Can't use sync call while an async call is in flight
|
|
*/
|
|
status = NT_STATUS_INVALID_PARAMETER;
|
|
goto fail;
|
|
}
|
|
|
|
path2 = talloc_strdup(frame, path);
|
|
if (!path2) {
|
|
status = NT_STATUS_NO_MEMORY;
|
|
goto fail;
|
|
}
|
|
trim_char(path2,'\0','\\');
|
|
if (!*path2) {
|
|
path2 = talloc_strdup(frame, "\\");
|
|
if (!path2) {
|
|
status = NT_STATUS_NO_MEMORY;
|
|
goto fail;
|
|
}
|
|
}
|
|
|
|
ev = samba_tevent_context_init(frame);
|
|
if (ev == NULL) {
|
|
status = NT_STATUS_NO_MEMORY;
|
|
goto fail;
|
|
}
|
|
|
|
req = cli_chkpath_send(frame, ev, cli, path2);
|
|
if (req == NULL) {
|
|
status = NT_STATUS_NO_MEMORY;
|
|
goto fail;
|
|
}
|
|
|
|
if (!tevent_req_poll_ntstatus(req, ev, &status)) {
|
|
goto fail;
|
|
}
|
|
|
|
status = cli_chkpath_recv(req);
|
|
cli->raw_status = status; /* cli_smb2_chkpath_recv doesn't set this */
|
|
|
|
fail:
|
|
TALLOC_FREE(frame);
|
|
return status;
|
|
}
|
|
|
|
/****************************************************************************
|
|
Query disk space.
|
|
****************************************************************************/
|
|
|
|
static void cli_dskattr_done(struct tevent_req *subreq);
|
|
|
|
struct cli_dskattr_state {
|
|
int bsize;
|
|
int total;
|
|
int avail;
|
|
};
|
|
|
|
struct tevent_req *cli_dskattr_send(TALLOC_CTX *mem_ctx,
|
|
struct tevent_context *ev,
|
|
struct cli_state *cli)
|
|
{
|
|
struct tevent_req *req = NULL, *subreq = NULL;
|
|
struct cli_dskattr_state *state = NULL;
|
|
uint8_t additional_flags = 0;
|
|
|
|
req = tevent_req_create(mem_ctx, &state, struct cli_dskattr_state);
|
|
if (req == NULL) {
|
|
return NULL;
|
|
}
|
|
|
|
subreq = cli_smb_send(state, ev, cli, SMBdskattr, additional_flags, 0,
|
|
0, NULL, 0, NULL);
|
|
if (tevent_req_nomem(subreq, req)) {
|
|
return tevent_req_post(req, ev);
|
|
}
|
|
tevent_req_set_callback(subreq, cli_dskattr_done, req);
|
|
return req;
|
|
}
|
|
|
|
static void cli_dskattr_done(struct tevent_req *subreq)
|
|
{
|
|
struct tevent_req *req = tevent_req_callback_data(
|
|
subreq, struct tevent_req);
|
|
struct cli_dskattr_state *state = tevent_req_data(
|
|
req, struct cli_dskattr_state);
|
|
uint8_t wct;
|
|
uint16_t *vwv = NULL;
|
|
NTSTATUS status;
|
|
|
|
status = cli_smb_recv(subreq, state, NULL, 4, &wct, &vwv, NULL,
|
|
NULL);
|
|
TALLOC_FREE(subreq);
|
|
if (tevent_req_nterror(req, status)) {
|
|
return;
|
|
}
|
|
state->bsize = SVAL(vwv+1, 0)*SVAL(vwv+2,0);
|
|
state->total = SVAL(vwv+0, 0);
|
|
state->avail = SVAL(vwv+3, 0);
|
|
tevent_req_done(req);
|
|
}
|
|
|
|
NTSTATUS cli_dskattr_recv(struct tevent_req *req, int *bsize, int *total, int *avail)
|
|
{
|
|
struct cli_dskattr_state *state = tevent_req_data(
|
|
req, struct cli_dskattr_state);
|
|
NTSTATUS status;
|
|
|
|
if (tevent_req_is_nterror(req, &status)) {
|
|
return status;
|
|
}
|
|
*bsize = state->bsize;
|
|
*total = state->total;
|
|
*avail = state->avail;
|
|
return NT_STATUS_OK;
|
|
}
|
|
|
|
NTSTATUS cli_dskattr(struct cli_state *cli, int *bsize, int *total, int *avail)
|
|
{
|
|
TALLOC_CTX *frame = NULL;
|
|
struct tevent_context *ev = NULL;
|
|
struct tevent_req *req = NULL;
|
|
NTSTATUS status = NT_STATUS_OK;
|
|
|
|
frame = talloc_stackframe();
|
|
|
|
if (smbXcli_conn_has_async_calls(cli->conn)) {
|
|
/*
|
|
* Can't use sync call while an async call is in flight
|
|
*/
|
|
status = NT_STATUS_INVALID_PARAMETER;
|
|
goto fail;
|
|
}
|
|
|
|
ev = samba_tevent_context_init(frame);
|
|
if (ev == NULL) {
|
|
status = NT_STATUS_NO_MEMORY;
|
|
goto fail;
|
|
}
|
|
|
|
req = cli_dskattr_send(frame, ev, cli);
|
|
if (req == NULL) {
|
|
status = NT_STATUS_NO_MEMORY;
|
|
goto fail;
|
|
}
|
|
|
|
if (!tevent_req_poll_ntstatus(req, ev, &status)) {
|
|
goto fail;
|
|
}
|
|
|
|
status = cli_dskattr_recv(req, bsize, total, avail);
|
|
|
|
fail:
|
|
TALLOC_FREE(frame);
|
|
return status;
|
|
}
|
|
|
|
NTSTATUS cli_disk_size(struct cli_state *cli, const char *path, uint64_t *bsize,
|
|
uint64_t *total, uint64_t *avail)
|
|
{
|
|
uint64_t sectors_per_block;
|
|
uint64_t bytes_per_sector;
|
|
int old_bsize = 0, old_total = 0, old_avail = 0;
|
|
NTSTATUS status;
|
|
|
|
if (smbXcli_conn_protocol(cli->conn) >= PROTOCOL_SMB2_02) {
|
|
return cli_smb2_dskattr(cli, path, bsize, total, avail);
|
|
}
|
|
|
|
/*
|
|
* Try the trans2 disk full size info call first.
|
|
* We already use this in SMBC_fstatvfs_ctx().
|
|
* Ignore 'actual_available_units' as we only
|
|
* care about the quota for the caller.
|
|
*/
|
|
|
|
status = cli_get_fs_full_size_info(cli,
|
|
total,
|
|
avail,
|
|
NULL,
|
|
§ors_per_block,
|
|
&bytes_per_sector);
|
|
|
|
/* Try and cope will all variants of "we don't do this call"
|
|
and fall back to cli_dskattr. */
|
|
|
|
if (NT_STATUS_EQUAL(status,NT_STATUS_NOT_IMPLEMENTED) ||
|
|
NT_STATUS_EQUAL(status,NT_STATUS_NOT_SUPPORTED) ||
|
|
NT_STATUS_EQUAL(status,NT_STATUS_INVALID_INFO_CLASS) ||
|
|
NT_STATUS_EQUAL(status,NT_STATUS_PROCEDURE_NOT_FOUND) ||
|
|
NT_STATUS_EQUAL(status,NT_STATUS_INVALID_LEVEL) ||
|
|
NT_STATUS_EQUAL(status,NT_STATUS_INVALID_PARAMETER) ||
|
|
NT_STATUS_EQUAL(status,NT_STATUS_INVALID_DEVICE_REQUEST) ||
|
|
NT_STATUS_EQUAL(status,NT_STATUS_INVALID_DEVICE_STATE) ||
|
|
NT_STATUS_EQUAL(status,NT_STATUS_CTL_FILE_NOT_SUPPORTED) ||
|
|
NT_STATUS_EQUAL(status,NT_STATUS_UNSUCCESSFUL)) {
|
|
goto try_dskattr;
|
|
}
|
|
|
|
if (!NT_STATUS_IS_OK(status)) {
|
|
return status;
|
|
}
|
|
|
|
if (bsize) {
|
|
*bsize = sectors_per_block *
|
|
bytes_per_sector;
|
|
}
|
|
|
|
return NT_STATUS_OK;
|
|
|
|
try_dskattr:
|
|
|
|
/* Old SMB1 core protocol fallback. */
|
|
status = cli_dskattr(cli, &old_bsize, &old_total, &old_avail);
|
|
if (!NT_STATUS_IS_OK(status)) {
|
|
return status;
|
|
}
|
|
if (bsize) {
|
|
*bsize = (uint64_t)old_bsize;
|
|
}
|
|
if (total) {
|
|
*total = (uint64_t)old_total;
|
|
}
|
|
if (avail) {
|
|
*avail = (uint64_t)old_avail;
|
|
}
|
|
return NT_STATUS_OK;
|
|
}
|
|
|
|
/****************************************************************************
|
|
Create and open a temporary file.
|
|
****************************************************************************/
|
|
|
|
static void cli_ctemp_done(struct tevent_req *subreq);
|
|
|
|
struct ctemp_state {
|
|
uint16_t vwv[3];
|
|
char *ret_path;
|
|
uint16_t fnum;
|
|
};
|
|
|
|
struct tevent_req *cli_ctemp_send(TALLOC_CTX *mem_ctx,
|
|
struct tevent_context *ev,
|
|
struct cli_state *cli,
|
|
const char *path)
|
|
{
|
|
struct tevent_req *req = NULL, *subreq = NULL;
|
|
struct ctemp_state *state = NULL;
|
|
uint8_t additional_flags = 0;
|
|
uint16_t additional_flags2 = 0;
|
|
uint8_t *bytes = NULL;
|
|
char *path_cp = NULL;
|
|
|
|
req = tevent_req_create(mem_ctx, &state, struct ctemp_state);
|
|
if (req == NULL) {
|
|
return NULL;
|
|
}
|
|
|
|
SSVAL(state->vwv,0,0);
|
|
SIVALS(state->vwv+1,0,-1);
|
|
|
|
bytes = talloc_array(state, uint8_t, 1);
|
|
if (tevent_req_nomem(bytes, req)) {
|
|
return tevent_req_post(req, ev);
|
|
}
|
|
/*
|
|
* SMBctemp on a DFS share must use DFS names.
|
|
*/
|
|
path_cp = smb1_dfs_share_path(state, cli, path);
|
|
if (tevent_req_nomem(path_cp, req)) {
|
|
return tevent_req_post(req, ev);
|
|
}
|
|
bytes[0] = 4;
|
|
bytes = smb_bytes_push_str(bytes,
|
|
smbXcli_conn_use_unicode(cli->conn),
|
|
path_cp,
|
|
strlen(path_cp)+1,
|
|
NULL);
|
|
if (tevent_req_nomem(bytes, req)) {
|
|
return tevent_req_post(req, ev);
|
|
}
|
|
|
|
if (clistr_is_previous_version_path(path)) {
|
|
additional_flags2 = FLAGS2_REPARSE_PATH;
|
|
}
|
|
|
|
subreq = cli_smb_send(state, ev, cli, SMBctemp, additional_flags,
|
|
additional_flags2,
|
|
3, state->vwv, talloc_get_size(bytes), bytes);
|
|
if (tevent_req_nomem(subreq, req)) {
|
|
return tevent_req_post(req, ev);
|
|
}
|
|
tevent_req_set_callback(subreq, cli_ctemp_done, req);
|
|
return req;
|
|
}
|
|
|
|
static void cli_ctemp_done(struct tevent_req *subreq)
|
|
{
|
|
struct tevent_req *req = tevent_req_callback_data(
|
|
subreq, struct tevent_req);
|
|
struct ctemp_state *state = tevent_req_data(
|
|
req, struct ctemp_state);
|
|
NTSTATUS status;
|
|
uint8_t wcnt;
|
|
uint16_t *vwv;
|
|
uint32_t num_bytes = 0;
|
|
uint8_t *bytes = NULL;
|
|
|
|
status = cli_smb_recv(subreq, state, NULL, 1, &wcnt, &vwv,
|
|
&num_bytes, &bytes);
|
|
TALLOC_FREE(subreq);
|
|
if (tevent_req_nterror(req, status)) {
|
|
return;
|
|
}
|
|
|
|
state->fnum = SVAL(vwv+0, 0);
|
|
|
|
/* From W2K3, the result is just the ASCII name */
|
|
if (num_bytes < 2) {
|
|
tevent_req_nterror(req, NT_STATUS_DATA_ERROR);
|
|
return;
|
|
}
|
|
|
|
if (pull_string_talloc(state,
|
|
NULL,
|
|
0,
|
|
&state->ret_path,
|
|
bytes,
|
|
num_bytes,
|
|
STR_ASCII) == 0) {
|
|
tevent_req_nterror(req, NT_STATUS_NO_MEMORY);
|
|
return;
|
|
}
|
|
tevent_req_done(req);
|
|
}
|
|
|
|
NTSTATUS cli_ctemp_recv(struct tevent_req *req,
|
|
TALLOC_CTX *ctx,
|
|
uint16_t *pfnum,
|
|
char **outfile)
|
|
{
|
|
struct ctemp_state *state = tevent_req_data(req,
|
|
struct ctemp_state);
|
|
NTSTATUS status;
|
|
|
|
if (tevent_req_is_nterror(req, &status)) {
|
|
return status;
|
|
}
|
|
*pfnum = state->fnum;
|
|
*outfile = talloc_strdup(ctx, state->ret_path);
|
|
if (!*outfile) {
|
|
return NT_STATUS_NO_MEMORY;
|
|
}
|
|
return NT_STATUS_OK;
|
|
}
|
|
|
|
NTSTATUS cli_ctemp(struct cli_state *cli,
|
|
TALLOC_CTX *ctx,
|
|
const char *path,
|
|
uint16_t *pfnum,
|
|
char **out_path)
|
|
{
|
|
TALLOC_CTX *frame = talloc_stackframe();
|
|
struct tevent_context *ev;
|
|
struct tevent_req *req;
|
|
NTSTATUS status = NT_STATUS_OK;
|
|
|
|
if (smbXcli_conn_has_async_calls(cli->conn)) {
|
|
/*
|
|
* Can't use sync call while an async call is in flight
|
|
*/
|
|
status = NT_STATUS_INVALID_PARAMETER;
|
|
goto fail;
|
|
}
|
|
|
|
ev = samba_tevent_context_init(frame);
|
|
if (ev == NULL) {
|
|
status = NT_STATUS_NO_MEMORY;
|
|
goto fail;
|
|
}
|
|
|
|
req = cli_ctemp_send(frame, ev, cli, path);
|
|
if (req == NULL) {
|
|
status = NT_STATUS_NO_MEMORY;
|
|
goto fail;
|
|
}
|
|
|
|
if (!tevent_req_poll_ntstatus(req, ev, &status)) {
|
|
goto fail;
|
|
}
|
|
|
|
status = cli_ctemp_recv(req, ctx, pfnum, out_path);
|
|
|
|
fail:
|
|
TALLOC_FREE(frame);
|
|
return status;
|
|
}
|
|
|
|
/*********************************************************
|
|
Set an extended attribute utility fn.
|
|
*********************************************************/
|
|
|
|
static NTSTATUS cli_set_ea(struct cli_state *cli, uint16_t setup_val,
|
|
uint8_t *param, unsigned int param_len,
|
|
const char *ea_name,
|
|
const char *ea_val, size_t ea_len)
|
|
{
|
|
uint16_t setup[1];
|
|
unsigned int data_len = 0;
|
|
uint8_t *data = NULL;
|
|
char *p;
|
|
size_t ea_namelen = strlen(ea_name);
|
|
NTSTATUS status;
|
|
|
|
SSVAL(setup, 0, setup_val);
|
|
|
|
if (ea_namelen == 0 && ea_len == 0) {
|
|
data_len = 4;
|
|
data = talloc_array(talloc_tos(),
|
|
uint8_t,
|
|
data_len);
|
|
if (!data) {
|
|
return NT_STATUS_NO_MEMORY;
|
|
}
|
|
p = (char *)data;
|
|
SIVAL(p,0,data_len);
|
|
} else {
|
|
data_len = 4 + 4 + ea_namelen + 1 + ea_len;
|
|
data = talloc_array(talloc_tos(),
|
|
uint8_t,
|
|
data_len);
|
|
if (!data) {
|
|
return NT_STATUS_NO_MEMORY;
|
|
}
|
|
p = (char *)data;
|
|
SIVAL(p,0,data_len);
|
|
p += 4;
|
|
SCVAL(p, 0, 0); /* EA flags. */
|
|
SCVAL(p, 1, ea_namelen);
|
|
SSVAL(p, 2, ea_len);
|
|
memcpy(p+4, ea_name, ea_namelen+1); /* Copy in the name. */
|
|
memcpy(p+4+ea_namelen+1, ea_val, ea_len);
|
|
}
|
|
|
|
/*
|
|
* FIXME - if we want to do previous version path
|
|
* processing on an EA set call we need to turn this
|
|
* into calls to cli_trans_send()/cli_trans_recv()
|
|
* with a temporary event context, as cli_trans_send()
|
|
* have access to the additional_flags2 needed to
|
|
* send @GMT- paths. JRA.
|
|
*/
|
|
|
|
status = cli_trans(talloc_tos(), cli, SMBtrans2, NULL, -1, 0, 0,
|
|
setup, 1, 0,
|
|
param, param_len, 2,
|
|
data, data_len, 0,
|
|
NULL,
|
|
NULL, 0, NULL, /* rsetup */
|
|
NULL, 0, NULL, /* rparam */
|
|
NULL, 0, NULL); /* rdata */
|
|
talloc_free(data);
|
|
return status;
|
|
}
|
|
|
|
/*********************************************************
|
|
Set an extended attribute on a pathname.
|
|
*********************************************************/
|
|
|
|
NTSTATUS cli_set_ea_path(struct cli_state *cli, const char *path,
|
|
const char *ea_name, const char *ea_val,
|
|
size_t ea_len)
|
|
{
|
|
unsigned int param_len = 0;
|
|
uint8_t *param;
|
|
NTSTATUS status;
|
|
TALLOC_CTX *frame = NULL;
|
|
char *path_cp = NULL;
|
|
|
|
if (smbXcli_conn_protocol(cli->conn) >= PROTOCOL_SMB2_02) {
|
|
return cli_smb2_set_ea_path(cli,
|
|
path,
|
|
ea_name,
|
|
ea_val,
|
|
ea_len);
|
|
}
|
|
|
|
frame = talloc_stackframe();
|
|
|
|
param = talloc_array(frame, uint8_t, 6);
|
|
if (!param) {
|
|
status = NT_STATUS_NO_MEMORY;
|
|
goto fail;
|
|
}
|
|
SSVAL(param,0,SMB_INFO_SET_EA);
|
|
SSVAL(param,2,0);
|
|
SSVAL(param,4,0);
|
|
|
|
/*
|
|
* TRANSACT2_SETPATHINFO on a DFS share must use DFS names.
|
|
*/
|
|
path_cp = smb1_dfs_share_path(frame, cli, path);
|
|
if (path_cp == NULL) {
|
|
status = NT_STATUS_NO_MEMORY;
|
|
goto fail;
|
|
}
|
|
param = trans2_bytes_push_str(param,
|
|
smbXcli_conn_use_unicode(cli->conn),
|
|
path_cp,
|
|
strlen(path_cp)+1,
|
|
NULL);
|
|
param_len = talloc_get_size(param);
|
|
|
|
status = cli_set_ea(cli, TRANSACT2_SETPATHINFO, param, param_len,
|
|
ea_name, ea_val, ea_len);
|
|
|
|
fail:
|
|
|
|
TALLOC_FREE(frame);
|
|
return status;
|
|
}
|
|
|
|
/*********************************************************
|
|
Set an extended attribute on an fnum.
|
|
*********************************************************/
|
|
|
|
NTSTATUS cli_set_ea_fnum(struct cli_state *cli, uint16_t fnum,
|
|
const char *ea_name, const char *ea_val,
|
|
size_t ea_len)
|
|
{
|
|
uint8_t param[6] = { 0, };
|
|
|
|
if (smbXcli_conn_protocol(cli->conn) >= PROTOCOL_SMB2_02) {
|
|
return cli_smb2_set_ea_fnum(cli,
|
|
fnum,
|
|
ea_name,
|
|
ea_val,
|
|
ea_len);
|
|
}
|
|
|
|
SSVAL(param,0,fnum);
|
|
SSVAL(param,2,SMB_INFO_SET_EA);
|
|
|
|
return cli_set_ea(cli, TRANSACT2_SETFILEINFO, param, 6,
|
|
ea_name, ea_val, ea_len);
|
|
}
|
|
|
|
/*********************************************************
|
|
Get an extended attribute list utility fn.
|
|
*********************************************************/
|
|
|
|
static bool parse_ea_blob(TALLOC_CTX *ctx, const uint8_t *rdata,
|
|
size_t rdata_len,
|
|
size_t *pnum_eas, struct ea_struct **pea_list)
|
|
{
|
|
struct ea_struct *ea_list = NULL;
|
|
size_t num_eas;
|
|
size_t ea_size;
|
|
const uint8_t *p;
|
|
|
|
if (rdata_len < 4) {
|
|
return false;
|
|
}
|
|
|
|
ea_size = (size_t)IVAL(rdata,0);
|
|
if (ea_size > rdata_len) {
|
|
return false;
|
|
}
|
|
|
|
if (ea_size == 0) {
|
|
/* No EA's present. */
|
|
*pnum_eas = 0;
|
|
*pea_list = NULL;
|
|
return true;
|
|
}
|
|
|
|
p = rdata + 4;
|
|
ea_size -= 4;
|
|
|
|
/* Validate the EA list and count it. */
|
|
for (num_eas = 0; ea_size >= 4; num_eas++) {
|
|
unsigned int ea_namelen = CVAL(p,1);
|
|
unsigned int ea_valuelen = SVAL(p,2);
|
|
if (ea_namelen == 0) {
|
|
return false;
|
|
}
|
|
if (4 + ea_namelen + 1 + ea_valuelen > ea_size) {
|
|
return false;
|
|
}
|
|
ea_size -= 4 + ea_namelen + 1 + ea_valuelen;
|
|
p += 4 + ea_namelen + 1 + ea_valuelen;
|
|
}
|
|
|
|
if (num_eas == 0) {
|
|
*pnum_eas = 0;
|
|
*pea_list = NULL;
|
|
return true;
|
|
}
|
|
|
|
*pnum_eas = num_eas;
|
|
if (!pea_list) {
|
|
/* Caller only wants number of EA's. */
|
|
return true;
|
|
}
|
|
|
|
ea_list = talloc_array(ctx, struct ea_struct, num_eas);
|
|
if (!ea_list) {
|
|
return false;
|
|
}
|
|
|
|
p = rdata + 4;
|
|
|
|
for (num_eas = 0; num_eas < *pnum_eas; num_eas++ ) {
|
|
struct ea_struct *ea = &ea_list[num_eas];
|
|
fstring unix_ea_name;
|
|
unsigned int ea_namelen = CVAL(p,1);
|
|
unsigned int ea_valuelen = SVAL(p,2);
|
|
|
|
ea->flags = CVAL(p,0);
|
|
unix_ea_name[0] = '\0';
|
|
pull_ascii(unix_ea_name, p + 4, sizeof(unix_ea_name), rdata_len - PTR_DIFF(p+4, rdata), STR_TERMINATE);
|
|
ea->name = talloc_strdup(ea_list, unix_ea_name);
|
|
if (!ea->name) {
|
|
goto fail;
|
|
}
|
|
/* Ensure the value is null terminated (in case it's a string). */
|
|
ea->value = data_blob_talloc(ea_list, NULL, ea_valuelen + 1);
|
|
if (!ea->value.data) {
|
|
goto fail;
|
|
}
|
|
if (ea_valuelen) {
|
|
memcpy(ea->value.data, p+4+ea_namelen+1, ea_valuelen);
|
|
}
|
|
ea->value.data[ea_valuelen] = 0;
|
|
ea->value.length--;
|
|
p += 4 + ea_namelen + 1 + ea_valuelen;
|
|
}
|
|
|
|
*pea_list = ea_list;
|
|
return true;
|
|
|
|
fail:
|
|
TALLOC_FREE(ea_list);
|
|
return false;
|
|
}
|
|
|
|
/*********************************************************
|
|
Get an extended attribute list from a pathname.
|
|
*********************************************************/
|
|
|
|
struct cli_get_ea_list_path_state {
|
|
uint32_t num_data;
|
|
uint8_t *data;
|
|
};
|
|
|
|
static void cli_get_ea_list_path_done(struct tevent_req *subreq);
|
|
|
|
struct tevent_req *cli_get_ea_list_path_send(TALLOC_CTX *mem_ctx,
|
|
struct tevent_context *ev,
|
|
struct cli_state *cli,
|
|
const char *fname)
|
|
{
|
|
struct tevent_req *req, *subreq;
|
|
struct cli_get_ea_list_path_state *state;
|
|
|
|
req = tevent_req_create(mem_ctx, &state,
|
|
struct cli_get_ea_list_path_state);
|
|
if (req == NULL) {
|
|
return NULL;
|
|
}
|
|
subreq = cli_qpathinfo_send(state, ev, cli, fname,
|
|
SMB_INFO_QUERY_ALL_EAS, 4,
|
|
CLI_BUFFER_SIZE);
|
|
if (tevent_req_nomem(subreq, req)) {
|
|
return tevent_req_post(req, ev);
|
|
}
|
|
tevent_req_set_callback(subreq, cli_get_ea_list_path_done, req);
|
|
return req;
|
|
}
|
|
|
|
static void cli_get_ea_list_path_done(struct tevent_req *subreq)
|
|
{
|
|
struct tevent_req *req = tevent_req_callback_data(
|
|
subreq, struct tevent_req);
|
|
struct cli_get_ea_list_path_state *state = tevent_req_data(
|
|
req, struct cli_get_ea_list_path_state);
|
|
NTSTATUS status;
|
|
|
|
status = cli_qpathinfo_recv(subreq, state, &state->data,
|
|
&state->num_data);
|
|
TALLOC_FREE(subreq);
|
|
if (tevent_req_nterror(req, status)) {
|
|
return;
|
|
}
|
|
tevent_req_done(req);
|
|
}
|
|
|
|
NTSTATUS cli_get_ea_list_path_recv(struct tevent_req *req, TALLOC_CTX *mem_ctx,
|
|
size_t *pnum_eas, struct ea_struct **peas)
|
|
{
|
|
struct cli_get_ea_list_path_state *state = tevent_req_data(
|
|
req, struct cli_get_ea_list_path_state);
|
|
NTSTATUS status;
|
|
|
|
if (tevent_req_is_nterror(req, &status)) {
|
|
return status;
|
|
}
|
|
if (!parse_ea_blob(mem_ctx, state->data, state->num_data,
|
|
pnum_eas, peas)) {
|
|
return NT_STATUS_INVALID_NETWORK_RESPONSE;
|
|
}
|
|
return NT_STATUS_OK;
|
|
}
|
|
|
|
NTSTATUS cli_get_ea_list_path(struct cli_state *cli, const char *path,
|
|
TALLOC_CTX *ctx,
|
|
size_t *pnum_eas,
|
|
struct ea_struct **pea_list)
|
|
{
|
|
TALLOC_CTX *frame = NULL;
|
|
struct tevent_context *ev = NULL;
|
|
struct tevent_req *req = NULL;
|
|
NTSTATUS status = NT_STATUS_NO_MEMORY;
|
|
|
|
if (smbXcli_conn_protocol(cli->conn) >= PROTOCOL_SMB2_02) {
|
|
return cli_smb2_get_ea_list_path(cli,
|
|
path,
|
|
ctx,
|
|
pnum_eas,
|
|
pea_list);
|
|
}
|
|
|
|
frame = talloc_stackframe();
|
|
|
|
if (smbXcli_conn_has_async_calls(cli->conn)) {
|
|
/*
|
|
* Can't use sync call while an async call is in flight
|
|
*/
|
|
status = NT_STATUS_INVALID_PARAMETER;
|
|
goto fail;
|
|
}
|
|
ev = samba_tevent_context_init(frame);
|
|
if (ev == NULL) {
|
|
goto fail;
|
|
}
|
|
req = cli_get_ea_list_path_send(frame, ev, cli, path);
|
|
if (req == NULL) {
|
|
goto fail;
|
|
}
|
|
if (!tevent_req_poll_ntstatus(req, ev, &status)) {
|
|
goto fail;
|
|
}
|
|
status = cli_get_ea_list_path_recv(req, ctx, pnum_eas, pea_list);
|
|
fail:
|
|
TALLOC_FREE(frame);
|
|
return status;
|
|
}
|
|
|
|
/****************************************************************************
|
|
Convert open "flags" arg to uint32_t on wire.
|
|
****************************************************************************/
|
|
|
|
static uint32_t open_flags_to_wire(int flags)
|
|
{
|
|
int open_mode = flags & O_ACCMODE;
|
|
uint32_t ret = 0;
|
|
|
|
switch (open_mode) {
|
|
case O_WRONLY:
|
|
ret |= SMB_O_WRONLY;
|
|
break;
|
|
case O_RDWR:
|
|
ret |= SMB_O_RDWR;
|
|
break;
|
|
default:
|
|
case O_RDONLY:
|
|
ret |= SMB_O_RDONLY;
|
|
break;
|
|
}
|
|
|
|
if (flags & O_CREAT) {
|
|
ret |= SMB_O_CREAT;
|
|
}
|
|
if (flags & O_EXCL) {
|
|
ret |= SMB_O_EXCL;
|
|
}
|
|
if (flags & O_TRUNC) {
|
|
ret |= SMB_O_TRUNC;
|
|
}
|
|
#if defined(O_SYNC)
|
|
if (flags & O_SYNC) {
|
|
ret |= SMB_O_SYNC;
|
|
}
|
|
#endif /* O_SYNC */
|
|
if (flags & O_APPEND) {
|
|
ret |= SMB_O_APPEND;
|
|
}
|
|
#if defined(O_DIRECT)
|
|
if (flags & O_DIRECT) {
|
|
ret |= SMB_O_DIRECT;
|
|
}
|
|
#endif
|
|
#if defined(O_DIRECTORY)
|
|
if (flags & O_DIRECTORY) {
|
|
ret |= SMB_O_DIRECTORY;
|
|
}
|
|
#endif
|
|
return ret;
|
|
}
|
|
|
|
/****************************************************************************
|
|
Open a file - POSIX semantics. Returns fnum. Doesn't request oplock.
|
|
****************************************************************************/
|
|
|
|
struct cli_posix_open_internal_state {
|
|
uint16_t setup;
|
|
uint8_t *param;
|
|
uint8_t data[18];
|
|
uint16_t fnum; /* Out */
|
|
};
|
|
|
|
static void cli_posix_open_internal_done(struct tevent_req *subreq);
|
|
|
|
static struct tevent_req *cli_posix_open_internal_send(TALLOC_CTX *mem_ctx,
|
|
struct tevent_context *ev,
|
|
struct cli_state *cli,
|
|
const char *fname,
|
|
uint32_t wire_flags,
|
|
mode_t mode)
|
|
{
|
|
struct tevent_req *req = NULL, *subreq = NULL;
|
|
struct cli_posix_open_internal_state *state = NULL;
|
|
char *fname_cp = NULL;
|
|
|
|
req = tevent_req_create(
|
|
mem_ctx, &state, struct cli_posix_open_internal_state);
|
|
if (req == NULL) {
|
|
return NULL;
|
|
}
|
|
|
|
/* Setup setup word. */
|
|
SSVAL(&state->setup, 0, TRANSACT2_SETPATHINFO);
|
|
|
|
/* Setup param array. */
|
|
state->param = talloc_zero_array(state, uint8_t, 6);
|
|
if (tevent_req_nomem(state->param, req)) {
|
|
return tevent_req_post(req, ev);
|
|
}
|
|
SSVAL(state->param, 0, SMB_POSIX_PATH_OPEN);
|
|
|
|
/*
|
|
* TRANSACT2_SETPATHINFO on a DFS share must use DFS names.
|
|
*/
|
|
fname_cp = smb1_dfs_share_path(state, cli, fname);
|
|
if (tevent_req_nomem(fname_cp, req)) {
|
|
return tevent_req_post(req, ev);
|
|
}
|
|
state->param = trans2_bytes_push_str(
|
|
state->param,
|
|
smbXcli_conn_use_unicode(cli->conn),
|
|
fname_cp,
|
|
strlen(fname_cp)+1,
|
|
NULL);
|
|
|
|
if (tevent_req_nomem(state->param, req)) {
|
|
return tevent_req_post(req, ev);
|
|
}
|
|
|
|
SIVAL(state->data,0,0); /* No oplock. */
|
|
SIVAL(state->data,4,wire_flags);
|
|
SIVAL(state->data,8,unix_perms_to_wire(mode));
|
|
SIVAL(state->data,12,0); /* Top bits of perms currently undefined. */
|
|
SSVAL(state->data,16,SMB_NO_INFO_LEVEL_RETURNED); /* No info level returned. */
|
|
|
|
subreq = cli_trans_send(state, /* mem ctx. */
|
|
ev, /* event ctx. */
|
|
cli, /* cli_state. */
|
|
0, /* additional_flags2 */
|
|
SMBtrans2, /* cmd. */
|
|
NULL, /* pipe name. */
|
|
-1, /* fid. */
|
|
0, /* function. */
|
|
0, /* flags. */
|
|
&state->setup, /* setup. */
|
|
1, /* num setup uint16_t words. */
|
|
0, /* max returned setup. */
|
|
state->param, /* param. */
|
|
talloc_get_size(state->param),/* num param. */
|
|
2, /* max returned param. */
|
|
state->data, /* data. */
|
|
18, /* num data. */
|
|
12); /* max returned data. */
|
|
|
|
if (tevent_req_nomem(subreq, req)) {
|
|
return tevent_req_post(req, ev);
|
|
}
|
|
tevent_req_set_callback(subreq, cli_posix_open_internal_done, req);
|
|
return req;
|
|
}
|
|
|
|
static void cli_posix_open_internal_done(struct tevent_req *subreq)
|
|
{
|
|
struct tevent_req *req = tevent_req_callback_data(
|
|
subreq, struct tevent_req);
|
|
struct cli_posix_open_internal_state *state = tevent_req_data(
|
|
req, struct cli_posix_open_internal_state);
|
|
NTSTATUS status;
|
|
uint8_t *data;
|
|
uint32_t num_data;
|
|
|
|
status = cli_trans_recv(
|
|
subreq,
|
|
state,
|
|
NULL,
|
|
NULL,
|
|
0,
|
|
NULL,
|
|
NULL,
|
|
0,
|
|
NULL,
|
|
&data,
|
|
12,
|
|
&num_data);
|
|
TALLOC_FREE(subreq);
|
|
if (tevent_req_nterror(req, status)) {
|
|
return;
|
|
}
|
|
state->fnum = SVAL(data,2);
|
|
tevent_req_done(req);
|
|
}
|
|
|
|
static NTSTATUS cli_posix_open_internal_recv(struct tevent_req *req,
|
|
uint16_t *pfnum)
|
|
{
|
|
struct cli_posix_open_internal_state *state = tevent_req_data(
|
|
req, struct cli_posix_open_internal_state);
|
|
NTSTATUS status;
|
|
|
|
if (tevent_req_is_nterror(req, &status)) {
|
|
return status;
|
|
}
|
|
*pfnum = state->fnum;
|
|
return NT_STATUS_OK;
|
|
}
|
|
|
|
struct cli_posix_open_state {
|
|
uint16_t fnum;
|
|
};
|
|
|
|
static void cli_posix_open_done(struct tevent_req *subreq);
|
|
|
|
struct tevent_req *cli_posix_open_send(TALLOC_CTX *mem_ctx,
|
|
struct tevent_context *ev,
|
|
struct cli_state *cli,
|
|
const char *fname,
|
|
int flags,
|
|
mode_t mode)
|
|
{
|
|
struct tevent_req *req = NULL, *subreq = NULL;
|
|
struct cli_posix_open_state *state = NULL;
|
|
uint32_t wire_flags;
|
|
|
|
req = tevent_req_create(mem_ctx, &state,
|
|
struct cli_posix_open_state);
|
|
if (req == NULL) {
|
|
return NULL;
|
|
}
|
|
|
|
wire_flags = open_flags_to_wire(flags);
|
|
|
|
subreq = cli_posix_open_internal_send(
|
|
mem_ctx, ev, cli, fname, wire_flags, mode);
|
|
if (tevent_req_nomem(subreq, req)) {
|
|
return tevent_req_post(req, ev);
|
|
}
|
|
tevent_req_set_callback(subreq, cli_posix_open_done, req);
|
|
return req;
|
|
}
|
|
|
|
static void cli_posix_open_done(struct tevent_req *subreq)
|
|
{
|
|
struct tevent_req *req = tevent_req_callback_data(
|
|
subreq, struct tevent_req);
|
|
struct cli_posix_open_state *state = tevent_req_data(
|
|
req, struct cli_posix_open_state);
|
|
NTSTATUS status;
|
|
|
|
status = cli_posix_open_internal_recv(subreq, &state->fnum);
|
|
tevent_req_simple_finish_ntstatus(subreq, status);
|
|
}
|
|
|
|
NTSTATUS cli_posix_open_recv(struct tevent_req *req, uint16_t *pfnum)
|
|
{
|
|
struct cli_posix_open_state *state = tevent_req_data(
|
|
req, struct cli_posix_open_state);
|
|
NTSTATUS status;
|
|
|
|
if (tevent_req_is_nterror(req, &status)) {
|
|
return status;
|
|
}
|
|
*pfnum = state->fnum;
|
|
return NT_STATUS_OK;
|
|
}
|
|
|
|
/****************************************************************************
|
|
Open - POSIX semantics. Doesn't request oplock.
|
|
****************************************************************************/
|
|
|
|
NTSTATUS cli_posix_open(struct cli_state *cli, const char *fname,
|
|
int flags, mode_t mode, uint16_t *pfnum)
|
|
{
|
|
|
|
TALLOC_CTX *frame = talloc_stackframe();
|
|
struct tevent_context *ev = NULL;
|
|
struct tevent_req *req = NULL;
|
|
NTSTATUS status = NT_STATUS_NO_MEMORY;
|
|
|
|
if (smbXcli_conn_has_async_calls(cli->conn)) {
|
|
/*
|
|
* Can't use sync call while an async call is in flight
|
|
*/
|
|
status = NT_STATUS_INVALID_PARAMETER;
|
|
goto fail;
|
|
}
|
|
ev = samba_tevent_context_init(frame);
|
|
if (ev == NULL) {
|
|
goto fail;
|
|
}
|
|
req = cli_posix_open_send(
|
|
frame, ev, cli, fname, flags, mode);
|
|
if (req == NULL) {
|
|
goto fail;
|
|
}
|
|
if (!tevent_req_poll_ntstatus(req, ev, &status)) {
|
|
goto fail;
|
|
}
|
|
status = cli_posix_open_recv(req, pfnum);
|
|
fail:
|
|
TALLOC_FREE(frame);
|
|
return status;
|
|
}
|
|
|
|
struct cli_posix_mkdir_state {
|
|
struct tevent_context *ev;
|
|
struct cli_state *cli;
|
|
};
|
|
|
|
static void cli_posix_mkdir_done(struct tevent_req *subreq);
|
|
|
|
struct tevent_req *cli_posix_mkdir_send(TALLOC_CTX *mem_ctx,
|
|
struct tevent_context *ev,
|
|
struct cli_state *cli,
|
|
const char *fname,
|
|
mode_t mode)
|
|
{
|
|
struct tevent_req *req = NULL, *subreq = NULL;
|
|
struct cli_posix_mkdir_state *state = NULL;
|
|
uint32_t wire_flags;
|
|
|
|
req = tevent_req_create(
|
|
mem_ctx, &state, struct cli_posix_mkdir_state);
|
|
if (req == NULL) {
|
|
return NULL;
|
|
}
|
|
state->ev = ev;
|
|
state->cli = cli;
|
|
|
|
wire_flags = SMB_O_CREAT | SMB_O_DIRECTORY;
|
|
|
|
subreq = cli_posix_open_internal_send(
|
|
mem_ctx, ev, cli, fname, wire_flags, mode);
|
|
if (tevent_req_nomem(subreq, req)) {
|
|
return tevent_req_post(req, ev);
|
|
}
|
|
tevent_req_set_callback(subreq, cli_posix_mkdir_done, req);
|
|
return req;
|
|
}
|
|
|
|
static void cli_posix_mkdir_done(struct tevent_req *subreq)
|
|
{
|
|
struct tevent_req *req = tevent_req_callback_data(
|
|
subreq, struct tevent_req);
|
|
NTSTATUS status;
|
|
uint16_t fnum;
|
|
|
|
status = cli_posix_open_internal_recv(subreq, &fnum);
|
|
TALLOC_FREE(subreq);
|
|
if (tevent_req_nterror(req, status)) {
|
|
return;
|
|
}
|
|
tevent_req_done(req);
|
|
}
|
|
|
|
NTSTATUS cli_posix_mkdir_recv(struct tevent_req *req)
|
|
{
|
|
return tevent_req_simple_recv_ntstatus(req);
|
|
}
|
|
|
|
NTSTATUS cli_posix_mkdir(struct cli_state *cli, const char *fname, mode_t mode)
|
|
{
|
|
TALLOC_CTX *frame = talloc_stackframe();
|
|
struct tevent_context *ev = NULL;
|
|
struct tevent_req *req = NULL;
|
|
NTSTATUS status = NT_STATUS_NO_MEMORY;
|
|
|
|
if (smbXcli_conn_has_async_calls(cli->conn)) {
|
|
/*
|
|
* Can't use sync call while an async call is in flight
|
|
*/
|
|
status = NT_STATUS_INVALID_PARAMETER;
|
|
goto fail;
|
|
}
|
|
|
|
ev = samba_tevent_context_init(frame);
|
|
if (ev == NULL) {
|
|
goto fail;
|
|
}
|
|
req = cli_posix_mkdir_send(
|
|
frame, ev, cli, fname, mode);
|
|
if (req == NULL) {
|
|
goto fail;
|
|
}
|
|
if (!tevent_req_poll_ntstatus(req, ev, &status)) {
|
|
goto fail;
|
|
}
|
|
status = cli_posix_mkdir_recv(req);
|
|
fail:
|
|
TALLOC_FREE(frame);
|
|
return status;
|
|
}
|
|
|
|
/****************************************************************************
|
|
unlink or rmdir - POSIX semantics.
|
|
****************************************************************************/
|
|
|
|
struct cli_posix_unlink_internal_state {
|
|
uint8_t data[2];
|
|
};
|
|
|
|
static void cli_posix_unlink_internal_done(struct tevent_req *subreq);
|
|
|
|
static struct tevent_req *cli_posix_unlink_internal_send(TALLOC_CTX *mem_ctx,
|
|
struct tevent_context *ev,
|
|
struct cli_state *cli,
|
|
const char *fname,
|
|
uint16_t level)
|
|
{
|
|
struct tevent_req *req = NULL, *subreq = NULL;
|
|
struct cli_posix_unlink_internal_state *state = NULL;
|
|
|
|
req = tevent_req_create(mem_ctx, &state,
|
|
struct cli_posix_unlink_internal_state);
|
|
if (req == NULL) {
|
|
return NULL;
|
|
}
|
|
|
|
/* Setup data word. */
|
|
SSVAL(state->data, 0, level);
|
|
|
|
subreq = cli_setpathinfo_send(state, ev, cli,
|
|
SMB_POSIX_PATH_UNLINK,
|
|
fname,
|
|
state->data, sizeof(state->data));
|
|
if (tevent_req_nomem(subreq, req)) {
|
|
return tevent_req_post(req, ev);
|
|
}
|
|
tevent_req_set_callback(subreq, cli_posix_unlink_internal_done, req);
|
|
return req;
|
|
}
|
|
|
|
static void cli_posix_unlink_internal_done(struct tevent_req *subreq)
|
|
{
|
|
NTSTATUS status = cli_setpathinfo_recv(subreq);
|
|
tevent_req_simple_finish_ntstatus(subreq, status);
|
|
}
|
|
|
|
static NTSTATUS cli_posix_unlink_internal_recv(struct tevent_req *req)
|
|
{
|
|
return tevent_req_simple_recv_ntstatus(req);
|
|
}
|
|
|
|
struct cli_posix_unlink_state {
|
|
uint8_t dummy;
|
|
};
|
|
|
|
static void cli_posix_unlink_done(struct tevent_req *subreq);
|
|
|
|
struct tevent_req *cli_posix_unlink_send(TALLOC_CTX *mem_ctx,
|
|
struct tevent_context *ev,
|
|
struct cli_state *cli,
|
|
const char *fname)
|
|
{
|
|
struct tevent_req *req = NULL, *subreq = NULL;
|
|
struct cli_posix_unlink_state *state;
|
|
|
|
req = tevent_req_create(
|
|
mem_ctx, &state, struct cli_posix_unlink_state);
|
|
if (req == NULL) {
|
|
return NULL;
|
|
}
|
|
subreq = cli_posix_unlink_internal_send(
|
|
mem_ctx, ev, cli, fname, SMB_POSIX_UNLINK_FILE_TARGET);
|
|
if (tevent_req_nomem(subreq, req)) {
|
|
return tevent_req_post(req, ev);
|
|
}
|
|
tevent_req_set_callback(subreq, cli_posix_unlink_done, req);
|
|
return req;
|
|
}
|
|
|
|
static void cli_posix_unlink_done(struct tevent_req *subreq)
|
|
{
|
|
NTSTATUS status = cli_posix_unlink_internal_recv(subreq);
|
|
tevent_req_simple_finish_ntstatus(subreq, status);
|
|
}
|
|
|
|
NTSTATUS cli_posix_unlink_recv(struct tevent_req *req)
|
|
{
|
|
return tevent_req_simple_recv_ntstatus(req);
|
|
}
|
|
|
|
/****************************************************************************
|
|
unlink - POSIX semantics.
|
|
****************************************************************************/
|
|
|
|
NTSTATUS cli_posix_unlink(struct cli_state *cli, const char *fname)
|
|
{
|
|
TALLOC_CTX *frame = talloc_stackframe();
|
|
struct tevent_context *ev = NULL;
|
|
struct tevent_req *req = NULL;
|
|
NTSTATUS status = NT_STATUS_OK;
|
|
|
|
if (smbXcli_conn_has_async_calls(cli->conn)) {
|
|
/*
|
|
* Can't use sync call while an async call is in flight
|
|
*/
|
|
status = NT_STATUS_INVALID_PARAMETER;
|
|
goto fail;
|
|
}
|
|
|
|
ev = samba_tevent_context_init(frame);
|
|
if (ev == NULL) {
|
|
status = NT_STATUS_NO_MEMORY;
|
|
goto fail;
|
|
}
|
|
|
|
req = cli_posix_unlink_send(frame,
|
|
ev,
|
|
cli,
|
|
fname);
|
|
if (req == NULL) {
|
|
status = NT_STATUS_NO_MEMORY;
|
|
goto fail;
|
|
}
|
|
|
|
if (!tevent_req_poll_ntstatus(req, ev, &status)) {
|
|
goto fail;
|
|
}
|
|
|
|
status = cli_posix_unlink_recv(req);
|
|
|
|
fail:
|
|
TALLOC_FREE(frame);
|
|
return status;
|
|
}
|
|
|
|
/****************************************************************************
|
|
rmdir - POSIX semantics.
|
|
****************************************************************************/
|
|
|
|
struct cli_posix_rmdir_state {
|
|
uint8_t dummy;
|
|
};
|
|
|
|
static void cli_posix_rmdir_done(struct tevent_req *subreq);
|
|
|
|
struct tevent_req *cli_posix_rmdir_send(TALLOC_CTX *mem_ctx,
|
|
struct tevent_context *ev,
|
|
struct cli_state *cli,
|
|
const char *fname)
|
|
{
|
|
struct tevent_req *req = NULL, *subreq = NULL;
|
|
struct cli_posix_rmdir_state *state;
|
|
|
|
req = tevent_req_create(mem_ctx, &state, struct cli_posix_rmdir_state);
|
|
if (req == NULL) {
|
|
return NULL;
|
|
}
|
|
subreq = cli_posix_unlink_internal_send(
|
|
mem_ctx, ev, cli, fname, SMB_POSIX_UNLINK_DIRECTORY_TARGET);
|
|
if (tevent_req_nomem(subreq, req)) {
|
|
return tevent_req_post(req, ev);
|
|
}
|
|
tevent_req_set_callback(subreq, cli_posix_rmdir_done, req);
|
|
return req;
|
|
}
|
|
|
|
static void cli_posix_rmdir_done(struct tevent_req *subreq)
|
|
{
|
|
NTSTATUS status = cli_posix_unlink_internal_recv(subreq);
|
|
tevent_req_simple_finish_ntstatus(subreq, status);
|
|
}
|
|
|
|
NTSTATUS cli_posix_rmdir_recv(struct tevent_req *req, TALLOC_CTX *mem_ctx)
|
|
{
|
|
return tevent_req_simple_recv_ntstatus(req);
|
|
}
|
|
|
|
NTSTATUS cli_posix_rmdir(struct cli_state *cli, const char *fname)
|
|
{
|
|
TALLOC_CTX *frame = talloc_stackframe();
|
|
struct tevent_context *ev = NULL;
|
|
struct tevent_req *req = NULL;
|
|
NTSTATUS status = NT_STATUS_OK;
|
|
|
|
if (smbXcli_conn_has_async_calls(cli->conn)) {
|
|
/*
|
|
* Can't use sync call while an async call is in flight
|
|
*/
|
|
status = NT_STATUS_INVALID_PARAMETER;
|
|
goto fail;
|
|
}
|
|
|
|
ev = samba_tevent_context_init(frame);
|
|
if (ev == NULL) {
|
|
status = NT_STATUS_NO_MEMORY;
|
|
goto fail;
|
|
}
|
|
|
|
req = cli_posix_rmdir_send(frame,
|
|
ev,
|
|
cli,
|
|
fname);
|
|
if (req == NULL) {
|
|
status = NT_STATUS_NO_MEMORY;
|
|
goto fail;
|
|
}
|
|
|
|
if (!tevent_req_poll_ntstatus(req, ev, &status)) {
|
|
goto fail;
|
|
}
|
|
|
|
status = cli_posix_rmdir_recv(req, frame);
|
|
|
|
fail:
|
|
TALLOC_FREE(frame);
|
|
return status;
|
|
}
|
|
|
|
/****************************************************************************
|
|
filechangenotify
|
|
****************************************************************************/
|
|
|
|
struct cli_notify_state {
|
|
struct tevent_req *subreq;
|
|
uint8_t setup[8];
|
|
uint32_t num_changes;
|
|
struct notify_change *changes;
|
|
};
|
|
|
|
static void cli_notify_done(struct tevent_req *subreq);
|
|
static void cli_notify_done_smb2(struct tevent_req *subreq);
|
|
static bool cli_notify_cancel(struct tevent_req *req);
|
|
|
|
struct tevent_req *cli_notify_send(TALLOC_CTX *mem_ctx,
|
|
struct tevent_context *ev,
|
|
struct cli_state *cli, uint16_t fnum,
|
|
uint32_t buffer_size,
|
|
uint32_t completion_filter, bool recursive)
|
|
{
|
|
struct tevent_req *req;
|
|
struct cli_notify_state *state;
|
|
unsigned old_timeout;
|
|
|
|
req = tevent_req_create(mem_ctx, &state, struct cli_notify_state);
|
|
if (req == NULL) {
|
|
return NULL;
|
|
}
|
|
|
|
if (smbXcli_conn_protocol(cli->conn) >= PROTOCOL_SMB2_02) {
|
|
/*
|
|
* Notifies should not time out
|
|
*/
|
|
old_timeout = cli_set_timeout(cli, 0);
|
|
|
|
state->subreq = cli_smb2_notify_send(
|
|
state,
|
|
ev,
|
|
cli,
|
|
fnum,
|
|
buffer_size,
|
|
completion_filter,
|
|
recursive);
|
|
|
|
cli_set_timeout(cli, old_timeout);
|
|
|
|
if (tevent_req_nomem(state->subreq, req)) {
|
|
return tevent_req_post(req, ev);
|
|
}
|
|
tevent_req_set_callback(
|
|
state->subreq, cli_notify_done_smb2, req);
|
|
goto done;
|
|
}
|
|
|
|
SIVAL(state->setup, 0, completion_filter);
|
|
SSVAL(state->setup, 4, fnum);
|
|
SSVAL(state->setup, 6, recursive);
|
|
|
|
/*
|
|
* Notifies should not time out
|
|
*/
|
|
old_timeout = cli_set_timeout(cli, 0);
|
|
|
|
state->subreq = cli_trans_send(
|
|
state, /* mem ctx. */
|
|
ev, /* event ctx. */
|
|
cli, /* cli_state. */
|
|
0, /* additional_flags2 */
|
|
SMBnttrans, /* cmd. */
|
|
NULL, /* pipe name. */
|
|
-1, /* fid. */
|
|
NT_TRANSACT_NOTIFY_CHANGE, /* function. */
|
|
0, /* flags. */
|
|
(uint16_t *)state->setup, /* setup. */
|
|
4, /* num setup uint16_t words. */
|
|
0, /* max returned setup. */
|
|
NULL, /* param. */
|
|
0, /* num param. */
|
|
buffer_size, /* max returned param. */
|
|
NULL, /* data. */
|
|
0, /* num data. */
|
|
0); /* max returned data. */
|
|
|
|
cli_set_timeout(cli, old_timeout);
|
|
|
|
if (tevent_req_nomem(state->subreq, req)) {
|
|
return tevent_req_post(req, ev);
|
|
}
|
|
tevent_req_set_callback(state->subreq, cli_notify_done, req);
|
|
done:
|
|
tevent_req_set_cancel_fn(req, cli_notify_cancel);
|
|
return req;
|
|
}
|
|
|
|
static bool cli_notify_cancel(struct tevent_req *req)
|
|
{
|
|
struct cli_notify_state *state = tevent_req_data(
|
|
req, struct cli_notify_state);
|
|
bool ok;
|
|
|
|
ok = tevent_req_cancel(state->subreq);
|
|
return ok;
|
|
}
|
|
|
|
static void cli_notify_done(struct tevent_req *subreq)
|
|
{
|
|
struct tevent_req *req = tevent_req_callback_data(
|
|
subreq, struct tevent_req);
|
|
struct cli_notify_state *state = tevent_req_data(
|
|
req, struct cli_notify_state);
|
|
NTSTATUS status;
|
|
uint8_t *params;
|
|
uint32_t i, ofs, num_params;
|
|
uint16_t flags2;
|
|
|
|
status = cli_trans_recv(subreq, talloc_tos(), &flags2, NULL, 0, NULL,
|
|
¶ms, 0, &num_params, NULL, 0, NULL);
|
|
TALLOC_FREE(subreq);
|
|
state->subreq = NULL;
|
|
if (tevent_req_nterror(req, status)) {
|
|
DEBUG(10, ("cli_trans_recv returned %s\n", nt_errstr(status)));
|
|
return;
|
|
}
|
|
|
|
state->num_changes = 0;
|
|
ofs = 0;
|
|
|
|
while (num_params - ofs > 12) {
|
|
uint32_t next = IVAL(params, ofs);
|
|
state->num_changes += 1;
|
|
|
|
if ((next == 0) || (ofs+next >= num_params)) {
|
|
break;
|
|
}
|
|
ofs += next;
|
|
}
|
|
|
|
state->changes = talloc_array(state, struct notify_change,
|
|
state->num_changes);
|
|
if (tevent_req_nomem(state->changes, req)) {
|
|
TALLOC_FREE(params);
|
|
return;
|
|
}
|
|
|
|
ofs = 0;
|
|
|
|
for (i=0; i<state->num_changes; i++) {
|
|
uint32_t next = IVAL(params, ofs);
|
|
uint32_t len = IVAL(params, ofs+8);
|
|
ssize_t ret;
|
|
char *name;
|
|
|
|
if (smb_buffer_oob(num_params, ofs + 12, len)) {
|
|
TALLOC_FREE(params);
|
|
tevent_req_nterror(
|
|
req, NT_STATUS_INVALID_NETWORK_RESPONSE);
|
|
return;
|
|
}
|
|
|
|
state->changes[i].action = IVAL(params, ofs+4);
|
|
ret = pull_string_talloc(state->changes,
|
|
(char *)params,
|
|
flags2,
|
|
&name,
|
|
params+ofs+12,
|
|
len,
|
|
STR_TERMINATE|STR_UNICODE);
|
|
if (ret == -1) {
|
|
TALLOC_FREE(params);
|
|
tevent_req_nterror(req, NT_STATUS_INTERNAL_ERROR);
|
|
return;
|
|
}
|
|
state->changes[i].name = name;
|
|
ofs += next;
|
|
}
|
|
|
|
TALLOC_FREE(params);
|
|
tevent_req_done(req);
|
|
}
|
|
|
|
static void cli_notify_done_smb2(struct tevent_req *subreq)
|
|
{
|
|
struct tevent_req *req = tevent_req_callback_data(
|
|
subreq, struct tevent_req);
|
|
struct cli_notify_state *state = tevent_req_data(
|
|
req, struct cli_notify_state);
|
|
NTSTATUS status;
|
|
|
|
status = cli_smb2_notify_recv(
|
|
subreq,
|
|
state,
|
|
&state->changes,
|
|
&state->num_changes);
|
|
TALLOC_FREE(subreq);
|
|
if (tevent_req_nterror(req, status)) {
|
|
return;
|
|
}
|
|
tevent_req_done(req);
|
|
}
|
|
|
|
NTSTATUS cli_notify_recv(struct tevent_req *req, TALLOC_CTX *mem_ctx,
|
|
uint32_t *pnum_changes,
|
|
struct notify_change **pchanges)
|
|
{
|
|
struct cli_notify_state *state = tevent_req_data(
|
|
req, struct cli_notify_state);
|
|
NTSTATUS status;
|
|
|
|
if (tevent_req_is_nterror(req, &status)) {
|
|
return status;
|
|
}
|
|
|
|
*pnum_changes = state->num_changes;
|
|
*pchanges = talloc_move(mem_ctx, &state->changes);
|
|
return NT_STATUS_OK;
|
|
}
|
|
|
|
NTSTATUS cli_notify(struct cli_state *cli, uint16_t fnum, uint32_t buffer_size,
|
|
uint32_t completion_filter, bool recursive,
|
|
TALLOC_CTX *mem_ctx, uint32_t *pnum_changes,
|
|
struct notify_change **pchanges)
|
|
{
|
|
TALLOC_CTX *frame;
|
|
struct tevent_context *ev;
|
|
struct tevent_req *req;
|
|
NTSTATUS status = NT_STATUS_NO_MEMORY;
|
|
|
|
frame = talloc_stackframe();
|
|
|
|
if (smbXcli_conn_has_async_calls(cli->conn)) {
|
|
/*
|
|
* Can't use sync call while an async call is in flight
|
|
*/
|
|
status = NT_STATUS_INVALID_PARAMETER;
|
|
goto fail;
|
|
}
|
|
ev = samba_tevent_context_init(frame);
|
|
if (ev == NULL) {
|
|
goto fail;
|
|
}
|
|
req = cli_notify_send(ev, ev, cli, fnum, buffer_size,
|
|
completion_filter, recursive);
|
|
if (req == NULL) {
|
|
goto fail;
|
|
}
|
|
if (!tevent_req_poll_ntstatus(req, ev, &status)) {
|
|
goto fail;
|
|
}
|
|
status = cli_notify_recv(req, mem_ctx, pnum_changes, pchanges);
|
|
fail:
|
|
TALLOC_FREE(frame);
|
|
return status;
|
|
}
|
|
|
|
struct cli_qpathinfo_state {
|
|
uint8_t *param;
|
|
uint8_t *data;
|
|
uint16_t setup[1];
|
|
uint32_t min_rdata;
|
|
uint8_t *rdata;
|
|
uint32_t num_rdata;
|
|
};
|
|
|
|
static void cli_qpathinfo_done(struct tevent_req *subreq);
|
|
static void cli_qpathinfo_done2(struct tevent_req *subreq);
|
|
|
|
struct tevent_req *cli_qpathinfo_send(TALLOC_CTX *mem_ctx,
|
|
struct tevent_context *ev,
|
|
struct cli_state *cli, const char *fname,
|
|
uint16_t level, uint32_t min_rdata,
|
|
uint32_t max_rdata)
|
|
{
|
|
struct tevent_req *req, *subreq;
|
|
struct cli_qpathinfo_state *state;
|
|
uint16_t additional_flags2 = 0;
|
|
char *fname_cp = NULL;
|
|
|
|
req = tevent_req_create(mem_ctx, &state, struct cli_qpathinfo_state);
|
|
if (req == NULL) {
|
|
return NULL;
|
|
}
|
|
|
|
if (smbXcli_conn_protocol(cli->conn) >= PROTOCOL_SMB2_02) {
|
|
uint16_t smb2_level = 0;
|
|
|
|
switch (level) {
|
|
case SMB_QUERY_FILE_ALT_NAME_INFO:
|
|
smb2_level = FSCC_FILE_ALTERNATE_NAME_INFORMATION;
|
|
break;
|
|
default:
|
|
tevent_req_nterror(req, NT_STATUS_INVALID_LEVEL);
|
|
return tevent_req_post(req, ev);
|
|
}
|
|
|
|
subreq = cli_smb2_qpathinfo_send(state,
|
|
ev,
|
|
cli,
|
|
fname,
|
|
smb2_level,
|
|
min_rdata,
|
|
max_rdata);
|
|
if (tevent_req_nomem(subreq, req)) {
|
|
return tevent_req_post(req, ev);
|
|
}
|
|
tevent_req_set_callback(subreq, cli_qpathinfo_done2, req);
|
|
return req;
|
|
}
|
|
|
|
state->min_rdata = min_rdata;
|
|
SSVAL(state->setup, 0, TRANSACT2_QPATHINFO);
|
|
|
|
state->param = talloc_zero_array(state, uint8_t, 6);
|
|
if (tevent_req_nomem(state->param, req)) {
|
|
return tevent_req_post(req, ev);
|
|
}
|
|
SSVAL(state->param, 0, level);
|
|
/*
|
|
* qpathinfo on a DFS share must use DFS names.
|
|
*/
|
|
fname_cp = smb1_dfs_share_path(state, cli, fname);
|
|
if (tevent_req_nomem(fname_cp, req)) {
|
|
return tevent_req_post(req, ev);
|
|
}
|
|
state->param = trans2_bytes_push_str(state->param,
|
|
smbXcli_conn_use_unicode(cli->conn),
|
|
fname_cp,
|
|
strlen(fname_cp)+1,
|
|
NULL);
|
|
if (tevent_req_nomem(state->param, req)) {
|
|
return tevent_req_post(req, ev);
|
|
}
|
|
|
|
if (clistr_is_previous_version_path(fname) &&
|
|
!INFO_LEVEL_IS_UNIX(level)) {
|
|
additional_flags2 = FLAGS2_REPARSE_PATH;
|
|
}
|
|
|
|
subreq = cli_trans_send(
|
|
state, /* mem ctx. */
|
|
ev, /* event ctx. */
|
|
cli, /* cli_state. */
|
|
additional_flags2, /* additional_flags2 */
|
|
SMBtrans2, /* cmd. */
|
|
NULL, /* pipe name. */
|
|
-1, /* fid. */
|
|
0, /* function. */
|
|
0, /* flags. */
|
|
state->setup, /* setup. */
|
|
1, /* num setup uint16_t words. */
|
|
0, /* max returned setup. */
|
|
state->param, /* param. */
|
|
talloc_get_size(state->param), /* num param. */
|
|
2, /* max returned param. */
|
|
NULL, /* data. */
|
|
0, /* num data. */
|
|
max_rdata); /* max returned data. */
|
|
|
|
if (tevent_req_nomem(subreq, req)) {
|
|
return tevent_req_post(req, ev);
|
|
}
|
|
tevent_req_set_callback(subreq, cli_qpathinfo_done, req);
|
|
return req;
|
|
}
|
|
|
|
static void cli_qpathinfo_done(struct tevent_req *subreq)
|
|
{
|
|
struct tevent_req *req = tevent_req_callback_data(
|
|
subreq, struct tevent_req);
|
|
struct cli_qpathinfo_state *state = tevent_req_data(
|
|
req, struct cli_qpathinfo_state);
|
|
NTSTATUS status;
|
|
|
|
status = cli_trans_recv(subreq, state, NULL, NULL, 0, NULL,
|
|
NULL, 0, NULL,
|
|
&state->rdata, state->min_rdata,
|
|
&state->num_rdata);
|
|
if (tevent_req_nterror(req, status)) {
|
|
return;
|
|
}
|
|
tevent_req_done(req);
|
|
}
|
|
|
|
static void cli_qpathinfo_done2(struct tevent_req *subreq)
|
|
{
|
|
struct tevent_req *req =
|
|
tevent_req_callback_data(subreq, struct tevent_req);
|
|
struct cli_qpathinfo_state *state =
|
|
tevent_req_data(req, struct cli_qpathinfo_state);
|
|
NTSTATUS status;
|
|
|
|
status = cli_smb2_qpathinfo_recv(subreq,
|
|
state,
|
|
&state->rdata,
|
|
&state->num_rdata);
|
|
if (tevent_req_nterror(req, status)) {
|
|
return;
|
|
}
|
|
tevent_req_done(req);
|
|
}
|
|
|
|
NTSTATUS cli_qpathinfo_recv(struct tevent_req *req, TALLOC_CTX *mem_ctx,
|
|
uint8_t **rdata, uint32_t *num_rdata)
|
|
{
|
|
struct cli_qpathinfo_state *state = tevent_req_data(
|
|
req, struct cli_qpathinfo_state);
|
|
NTSTATUS status;
|
|
|
|
if (tevent_req_is_nterror(req, &status)) {
|
|
return status;
|
|
}
|
|
if (rdata != NULL) {
|
|
*rdata = talloc_move(mem_ctx, &state->rdata);
|
|
} else {
|
|
TALLOC_FREE(state->rdata);
|
|
}
|
|
if (num_rdata != NULL) {
|
|
*num_rdata = state->num_rdata;
|
|
}
|
|
return NT_STATUS_OK;
|
|
}
|
|
|
|
NTSTATUS cli_qpathinfo(TALLOC_CTX *mem_ctx, struct cli_state *cli,
|
|
const char *fname, uint16_t level, uint32_t min_rdata,
|
|
uint32_t max_rdata,
|
|
uint8_t **rdata, uint32_t *num_rdata)
|
|
{
|
|
TALLOC_CTX *frame = talloc_stackframe();
|
|
struct tevent_context *ev;
|
|
struct tevent_req *req;
|
|
NTSTATUS status = NT_STATUS_NO_MEMORY;
|
|
|
|
if (smbXcli_conn_has_async_calls(cli->conn)) {
|
|
/*
|
|
* Can't use sync call while an async call is in flight
|
|
*/
|
|
status = NT_STATUS_INVALID_PARAMETER;
|
|
goto fail;
|
|
}
|
|
ev = samba_tevent_context_init(frame);
|
|
if (ev == NULL) {
|
|
goto fail;
|
|
}
|
|
req = cli_qpathinfo_send(frame, ev, cli, fname, level, min_rdata,
|
|
max_rdata);
|
|
if (req == NULL) {
|
|
goto fail;
|
|
}
|
|
if (!tevent_req_poll_ntstatus(req, ev, &status)) {
|
|
goto fail;
|
|
}
|
|
status = cli_qpathinfo_recv(req, mem_ctx, rdata, num_rdata);
|
|
fail:
|
|
TALLOC_FREE(frame);
|
|
return status;
|
|
}
|
|
|
|
struct cli_qfileinfo_state {
|
|
uint16_t setup[1];
|
|
uint8_t param[4];
|
|
uint8_t *data;
|
|
uint16_t recv_flags2;
|
|
uint32_t min_rdata;
|
|
uint8_t *rdata;
|
|
uint32_t num_rdata;
|
|
};
|
|
|
|
static void cli_qfileinfo_done(struct tevent_req *subreq);
|
|
|
|
struct tevent_req *cli_qfileinfo_send(TALLOC_CTX *mem_ctx,
|
|
struct tevent_context *ev,
|
|
struct cli_state *cli, uint16_t fnum,
|
|
uint16_t level, uint32_t min_rdata,
|
|
uint32_t max_rdata)
|
|
{
|
|
struct tevent_req *req, *subreq;
|
|
struct cli_qfileinfo_state *state;
|
|
|
|
req = tevent_req_create(mem_ctx, &state, struct cli_qfileinfo_state);
|
|
if (req == NULL) {
|
|
return NULL;
|
|
}
|
|
state->min_rdata = min_rdata;
|
|
SSVAL(state->param, 0, fnum);
|
|
SSVAL(state->param, 2, level);
|
|
SSVAL(state->setup, 0, TRANSACT2_QFILEINFO);
|
|
|
|
subreq = cli_trans_send(
|
|
state, /* mem ctx. */
|
|
ev, /* event ctx. */
|
|
cli, /* cli_state. */
|
|
0, /* additional_flags2 */
|
|
SMBtrans2, /* cmd. */
|
|
NULL, /* pipe name. */
|
|
-1, /* fid. */
|
|
0, /* function. */
|
|
0, /* flags. */
|
|
state->setup, /* setup. */
|
|
1, /* num setup uint16_t words. */
|
|
0, /* max returned setup. */
|
|
state->param, /* param. */
|
|
sizeof(state->param), /* num param. */
|
|
2, /* max returned param. */
|
|
NULL, /* data. */
|
|
0, /* num data. */
|
|
max_rdata); /* max returned data. */
|
|
|
|
if (tevent_req_nomem(subreq, req)) {
|
|
return tevent_req_post(req, ev);
|
|
}
|
|
tevent_req_set_callback(subreq, cli_qfileinfo_done, req);
|
|
return req;
|
|
}
|
|
|
|
static void cli_qfileinfo_done(struct tevent_req *subreq)
|
|
{
|
|
struct tevent_req *req = tevent_req_callback_data(
|
|
subreq, struct tevent_req);
|
|
struct cli_qfileinfo_state *state = tevent_req_data(
|
|
req, struct cli_qfileinfo_state);
|
|
NTSTATUS status;
|
|
|
|
status = cli_trans_recv(subreq, state,
|
|
&state->recv_flags2,
|
|
NULL, 0, NULL,
|
|
NULL, 0, NULL,
|
|
&state->rdata, state->min_rdata,
|
|
&state->num_rdata);
|
|
if (tevent_req_nterror(req, status)) {
|
|
return;
|
|
}
|
|
tevent_req_done(req);
|
|
}
|
|
|
|
NTSTATUS cli_qfileinfo_recv(struct tevent_req *req, TALLOC_CTX *mem_ctx,
|
|
uint16_t *recv_flags2,
|
|
uint8_t **rdata, uint32_t *num_rdata)
|
|
{
|
|
struct cli_qfileinfo_state *state = tevent_req_data(
|
|
req, struct cli_qfileinfo_state);
|
|
NTSTATUS status;
|
|
|
|
if (tevent_req_is_nterror(req, &status)) {
|
|
return status;
|
|
}
|
|
|
|
if (recv_flags2 != NULL) {
|
|
*recv_flags2 = state->recv_flags2;
|
|
}
|
|
if (rdata != NULL) {
|
|
*rdata = talloc_move(mem_ctx, &state->rdata);
|
|
}
|
|
if (num_rdata != NULL) {
|
|
*num_rdata = state->num_rdata;
|
|
}
|
|
|
|
tevent_req_received(req);
|
|
return NT_STATUS_OK;
|
|
}
|
|
|
|
NTSTATUS cli_qfileinfo(TALLOC_CTX *mem_ctx, struct cli_state *cli,
|
|
uint16_t fnum, uint16_t level, uint32_t min_rdata,
|
|
uint32_t max_rdata, uint16_t *recv_flags2,
|
|
uint8_t **rdata, uint32_t *num_rdata)
|
|
{
|
|
TALLOC_CTX *frame = talloc_stackframe();
|
|
struct tevent_context *ev;
|
|
struct tevent_req *req;
|
|
NTSTATUS status = NT_STATUS_NO_MEMORY;
|
|
|
|
if (smbXcli_conn_has_async_calls(cli->conn)) {
|
|
/*
|
|
* Can't use sync call while an async call is in flight
|
|
*/
|
|
status = NT_STATUS_INVALID_PARAMETER;
|
|
goto fail;
|
|
}
|
|
ev = samba_tevent_context_init(frame);
|
|
if (ev == NULL) {
|
|
goto fail;
|
|
}
|
|
req = cli_qfileinfo_send(frame, ev, cli, fnum, level, min_rdata,
|
|
max_rdata);
|
|
if (req == NULL) {
|
|
goto fail;
|
|
}
|
|
if (!tevent_req_poll_ntstatus(req, ev, &status)) {
|
|
goto fail;
|
|
}
|
|
status = cli_qfileinfo_recv(req, mem_ctx, recv_flags2, rdata, num_rdata);
|
|
fail:
|
|
TALLOC_FREE(frame);
|
|
return status;
|
|
}
|
|
|
|
struct cli_flush_state {
|
|
uint16_t vwv[1];
|
|
};
|
|
|
|
static void cli_flush_done(struct tevent_req *subreq);
|
|
|
|
struct tevent_req *cli_flush_send(TALLOC_CTX *mem_ctx,
|
|
struct tevent_context *ev,
|
|
struct cli_state *cli,
|
|
uint16_t fnum)
|
|
{
|
|
struct tevent_req *req, *subreq;
|
|
struct cli_flush_state *state;
|
|
|
|
req = tevent_req_create(mem_ctx, &state, struct cli_flush_state);
|
|
if (req == NULL) {
|
|
return NULL;
|
|
}
|
|
SSVAL(state->vwv + 0, 0, fnum);
|
|
|
|
subreq = cli_smb_send(state, ev, cli, SMBflush, 0, 0, 1, state->vwv,
|
|
0, NULL);
|
|
if (tevent_req_nomem(subreq, req)) {
|
|
return tevent_req_post(req, ev);
|
|
}
|
|
tevent_req_set_callback(subreq, cli_flush_done, req);
|
|
return req;
|
|
}
|
|
|
|
static void cli_flush_done(struct tevent_req *subreq)
|
|
{
|
|
struct tevent_req *req = tevent_req_callback_data(
|
|
subreq, struct tevent_req);
|
|
NTSTATUS status;
|
|
|
|
status = cli_smb_recv(subreq, NULL, NULL, 0, NULL, NULL, NULL, NULL);
|
|
TALLOC_FREE(subreq);
|
|
if (tevent_req_nterror(req, status)) {
|
|
return;
|
|
}
|
|
tevent_req_done(req);
|
|
}
|
|
|
|
NTSTATUS cli_flush_recv(struct tevent_req *req)
|
|
{
|
|
return tevent_req_simple_recv_ntstatus(req);
|
|
}
|
|
|
|
NTSTATUS cli_flush(TALLOC_CTX *mem_ctx, struct cli_state *cli, uint16_t fnum)
|
|
{
|
|
TALLOC_CTX *frame = talloc_stackframe();
|
|
struct tevent_context *ev;
|
|
struct tevent_req *req;
|
|
NTSTATUS status = NT_STATUS_NO_MEMORY;
|
|
|
|
if (smbXcli_conn_has_async_calls(cli->conn)) {
|
|
/*
|
|
* Can't use sync call while an async call is in flight
|
|
*/
|
|
status = NT_STATUS_INVALID_PARAMETER;
|
|
goto fail;
|
|
}
|
|
ev = samba_tevent_context_init(frame);
|
|
if (ev == NULL) {
|
|
goto fail;
|
|
}
|
|
req = cli_flush_send(frame, ev, cli, fnum);
|
|
if (req == NULL) {
|
|
goto fail;
|
|
}
|
|
if (!tevent_req_poll_ntstatus(req, ev, &status)) {
|
|
goto fail;
|
|
}
|
|
status = cli_flush_recv(req);
|
|
fail:
|
|
TALLOC_FREE(frame);
|
|
return status;
|
|
}
|
|
|
|
struct cli_shadow_copy_data_state {
|
|
uint16_t setup[4];
|
|
uint8_t *data;
|
|
uint32_t num_data;
|
|
bool get_names;
|
|
};
|
|
|
|
static void cli_shadow_copy_data_done(struct tevent_req *subreq);
|
|
|
|
struct tevent_req *cli_shadow_copy_data_send(TALLOC_CTX *mem_ctx,
|
|
struct tevent_context *ev,
|
|
struct cli_state *cli,
|
|
uint16_t fnum,
|
|
bool get_names)
|
|
{
|
|
struct tevent_req *req, *subreq;
|
|
struct cli_shadow_copy_data_state *state;
|
|
uint32_t ret_size;
|
|
|
|
req = tevent_req_create(mem_ctx, &state,
|
|
struct cli_shadow_copy_data_state);
|
|
if (req == NULL) {
|
|
return NULL;
|
|
}
|
|
state->get_names = get_names;
|
|
ret_size = get_names ? CLI_BUFFER_SIZE : 16;
|
|
|
|
SIVAL(state->setup + 0, 0, FSCTL_GET_SHADOW_COPY_DATA);
|
|
SSVAL(state->setup + 2, 0, fnum);
|
|
SCVAL(state->setup + 3, 0, 1); /* isFsctl */
|
|
SCVAL(state->setup + 3, 1, 0); /* compfilter, isFlags (WSSP) */
|
|
|
|
subreq = cli_trans_send(
|
|
state, ev, cli, 0, SMBnttrans, NULL, 0, NT_TRANSACT_IOCTL, 0,
|
|
state->setup, ARRAY_SIZE(state->setup),
|
|
ARRAY_SIZE(state->setup),
|
|
NULL, 0, 0,
|
|
NULL, 0, ret_size);
|
|
if (tevent_req_nomem(subreq, req)) {
|
|
return tevent_req_post(req, ev);
|
|
}
|
|
tevent_req_set_callback(subreq, cli_shadow_copy_data_done, req);
|
|
return req;
|
|
}
|
|
|
|
static void cli_shadow_copy_data_done(struct tevent_req *subreq)
|
|
{
|
|
struct tevent_req *req = tevent_req_callback_data(
|
|
subreq, struct tevent_req);
|
|
struct cli_shadow_copy_data_state *state = tevent_req_data(
|
|
req, struct cli_shadow_copy_data_state);
|
|
NTSTATUS status;
|
|
|
|
status = cli_trans_recv(subreq, state, NULL,
|
|
NULL, 0, NULL, /* setup */
|
|
NULL, 0, NULL, /* param */
|
|
&state->data, 12, &state->num_data);
|
|
TALLOC_FREE(subreq);
|
|
if (tevent_req_nterror(req, status)) {
|
|
return;
|
|
}
|
|
tevent_req_done(req);
|
|
}
|
|
|
|
NTSTATUS cli_shadow_copy_data_recv(struct tevent_req *req, TALLOC_CTX *mem_ctx,
|
|
char ***pnames, int *pnum_names)
|
|
{
|
|
struct cli_shadow_copy_data_state *state = tevent_req_data(
|
|
req, struct cli_shadow_copy_data_state);
|
|
char **names = NULL;
|
|
uint32_t i, num_names;
|
|
uint32_t dlength;
|
|
uint8_t *endp = NULL;
|
|
NTSTATUS status;
|
|
|
|
if (tevent_req_is_nterror(req, &status)) {
|
|
return status;
|
|
}
|
|
|
|
if (state->num_data < 16) {
|
|
return NT_STATUS_INVALID_NETWORK_RESPONSE;
|
|
}
|
|
|
|
num_names = IVAL(state->data, 4);
|
|
dlength = IVAL(state->data, 8);
|
|
|
|
if (num_names > 0x7FFFFFFF) {
|
|
return NT_STATUS_INVALID_NETWORK_RESPONSE;
|
|
}
|
|
|
|
if (!state->get_names) {
|
|
*pnum_names = (int)num_names;
|
|
return NT_STATUS_OK;
|
|
}
|
|
|
|
if (dlength + 12 < 12) {
|
|
return NT_STATUS_INVALID_NETWORK_RESPONSE;
|
|
}
|
|
if (dlength + 12 > state->num_data) {
|
|
return NT_STATUS_INVALID_NETWORK_RESPONSE;
|
|
}
|
|
if (state->num_data + (2 * sizeof(SHADOW_COPY_LABEL)) <
|
|
state->num_data) {
|
|
return NT_STATUS_INVALID_NETWORK_RESPONSE;
|
|
}
|
|
|
|
names = talloc_array(mem_ctx, char *, num_names);
|
|
if (names == NULL) {
|
|
return NT_STATUS_NO_MEMORY;
|
|
}
|
|
|
|
endp = state->data + state->num_data;
|
|
|
|
for (i=0; i<num_names; i++) {
|
|
bool ret;
|
|
uint8_t *src;
|
|
size_t converted_size;
|
|
|
|
src = state->data + 12 + i * 2 * sizeof(SHADOW_COPY_LABEL);
|
|
|
|
if (src + (2 * sizeof(SHADOW_COPY_LABEL)) > endp) {
|
|
return NT_STATUS_INVALID_NETWORK_RESPONSE;
|
|
}
|
|
|
|
ret = convert_string_talloc(
|
|
names, CH_UTF16LE, CH_UNIX,
|
|
src, 2 * sizeof(SHADOW_COPY_LABEL),
|
|
&names[i], &converted_size);
|
|
if (!ret) {
|
|
TALLOC_FREE(names);
|
|
return NT_STATUS_INVALID_NETWORK_RESPONSE;
|
|
}
|
|
}
|
|
*pnum_names = (int)num_names;
|
|
*pnames = names;
|
|
return NT_STATUS_OK;
|
|
}
|
|
|
|
NTSTATUS cli_shadow_copy_data(TALLOC_CTX *mem_ctx, struct cli_state *cli,
|
|
uint16_t fnum, bool get_names,
|
|
char ***pnames, int *pnum_names)
|
|
{
|
|
TALLOC_CTX *frame = NULL;
|
|
struct tevent_context *ev;
|
|
struct tevent_req *req;
|
|
NTSTATUS status = NT_STATUS_NO_MEMORY;
|
|
|
|
if (smbXcli_conn_protocol(cli->conn) >= PROTOCOL_SMB2_02) {
|
|
return cli_smb2_shadow_copy_data(mem_ctx,
|
|
cli,
|
|
fnum,
|
|
get_names,
|
|
pnames,
|
|
pnum_names);
|
|
}
|
|
|
|
frame = talloc_stackframe();
|
|
|
|
if (smbXcli_conn_has_async_calls(cli->conn)) {
|
|
/*
|
|
* Can't use sync call while an async call is in flight
|
|
*/
|
|
status = NT_STATUS_INVALID_PARAMETER;
|
|
goto fail;
|
|
}
|
|
ev = samba_tevent_context_init(frame);
|
|
if (ev == NULL) {
|
|
goto fail;
|
|
}
|
|
req = cli_shadow_copy_data_send(frame, ev, cli, fnum, get_names);
|
|
if (req == NULL) {
|
|
goto fail;
|
|
}
|
|
if (!tevent_req_poll_ntstatus(req, ev, &status)) {
|
|
goto fail;
|
|
}
|
|
status = cli_shadow_copy_data_recv(req, mem_ctx, pnames, pnum_names);
|
|
fail:
|
|
TALLOC_FREE(frame);
|
|
return status;
|
|
}
|
|
|
|
struct cli_fsctl_state {
|
|
DATA_BLOB out;
|
|
};
|
|
|
|
static void cli_fsctl_smb1_done(struct tevent_req *subreq);
|
|
static void cli_fsctl_smb2_done(struct tevent_req *subreq);
|
|
|
|
struct tevent_req *cli_fsctl_send(
|
|
TALLOC_CTX *mem_ctx,
|
|
struct tevent_context *ev,
|
|
struct cli_state *cli,
|
|
uint16_t fnum,
|
|
uint32_t ctl_code,
|
|
const DATA_BLOB *in,
|
|
uint32_t max_out)
|
|
{
|
|
struct tevent_req *req = NULL, *subreq = NULL;
|
|
struct cli_fsctl_state *state = NULL;
|
|
uint16_t *setup = NULL;
|
|
uint8_t *data = NULL;
|
|
uint32_t num_data = 0;
|
|
|
|
req = tevent_req_create(mem_ctx, &state, struct cli_fsctl_state);
|
|
if (req == NULL) {
|
|
return NULL;
|
|
}
|
|
|
|
if (smbXcli_conn_protocol(cli->conn) >= PROTOCOL_SMB2_02) {
|
|
subreq = cli_smb2_fsctl_send(
|
|
state, ev, cli, fnum, ctl_code, in, max_out);
|
|
if (tevent_req_nomem(subreq, req)) {
|
|
return tevent_req_post(req, ev);
|
|
}
|
|
tevent_req_set_callback(subreq, cli_fsctl_smb2_done, req);
|
|
return req;
|
|
}
|
|
|
|
setup = talloc_array(state, uint16_t, 4);
|
|
if (tevent_req_nomem(setup, req)) {
|
|
return tevent_req_post(req, ev);
|
|
}
|
|
SIVAL(setup, 0, ctl_code);
|
|
SSVAL(setup, 4, fnum);
|
|
SCVAL(setup, 6, 1); /* IsFcntl */
|
|
SCVAL(setup, 7, 0); /* IsFlags */
|
|
|
|
if (in) {
|
|
data = in->data;
|
|
num_data = in->length;
|
|
}
|
|
|
|
subreq = cli_trans_send(state,
|
|
ev,
|
|
cli,
|
|
0, /* additional_flags2 */
|
|
SMBnttrans, /* cmd */
|
|
NULL, /* name */
|
|
-1, /* fid */
|
|
NT_TRANSACT_IOCTL, /* function */
|
|
0, /* flags */
|
|
setup,
|
|
4,
|
|
0, /* setup */
|
|
NULL,
|
|
0,
|
|
0, /* param */
|
|
data,
|
|
num_data,
|
|
max_out); /* data */
|
|
|
|
if (tevent_req_nomem(subreq, req)) {
|
|
return tevent_req_post(req, ev);
|
|
}
|
|
tevent_req_set_callback(subreq, cli_fsctl_smb1_done, req);
|
|
return req;
|
|
}
|
|
|
|
static void cli_fsctl_smb2_done(struct tevent_req *subreq)
|
|
{
|
|
struct tevent_req *req = tevent_req_callback_data(
|
|
subreq, struct tevent_req);
|
|
struct cli_fsctl_state *state = tevent_req_data(
|
|
req, struct cli_fsctl_state);
|
|
NTSTATUS status;
|
|
|
|
status = cli_smb2_fsctl_recv(subreq, state, &state->out);
|
|
tevent_req_simple_finish_ntstatus(subreq, status);
|
|
}
|
|
|
|
static void cli_fsctl_smb1_done(struct tevent_req *subreq)
|
|
{
|
|
struct tevent_req *req = tevent_req_callback_data(
|
|
subreq, struct tevent_req);
|
|
struct cli_fsctl_state *state = tevent_req_data(
|
|
req, struct cli_fsctl_state);
|
|
uint8_t *out = NULL;
|
|
uint32_t out_len;
|
|
NTSTATUS status;
|
|
|
|
status = cli_trans_recv(
|
|
subreq, state, NULL,
|
|
NULL, 0, NULL, /* rsetup */
|
|
NULL, 0, NULL, /* rparam */
|
|
&out, 0, &out_len);
|
|
TALLOC_FREE(subreq);
|
|
if (tevent_req_nterror(req, status)) {
|
|
return;
|
|
}
|
|
state->out = (DATA_BLOB) {
|
|
.data = out, .length = out_len,
|
|
};
|
|
tevent_req_done(req);
|
|
}
|
|
|
|
NTSTATUS cli_fsctl_recv(
|
|
struct tevent_req *req, TALLOC_CTX *mem_ctx, DATA_BLOB *out)
|
|
{
|
|
struct cli_fsctl_state *state = tevent_req_data(
|
|
req, struct cli_fsctl_state);
|
|
NTSTATUS status;
|
|
|
|
if (tevent_req_is_nterror(req, &status)) {
|
|
return status;
|
|
}
|
|
|
|
if (out != NULL) {
|
|
*out = (DATA_BLOB) {
|
|
.data = talloc_move(mem_ctx, &state->out.data),
|
|
.length = state->out.length,
|
|
};
|
|
}
|
|
|
|
return NT_STATUS_OK;
|
|
}
|