mirror of
https://github.com/samba-team/samba.git
synced 2024-12-25 23:21:54 +03:00
7e0b2af4c0
The offset calculation for the offset that got passed to fetch_write_time_send() in the enumeration loop was wrong as it passed the offset before smbd_dirptr_lanman2_entry() added required padding. This resulted in broken timestamps in the find response. Bug: https://bugzilla.samba.org/show_bug.cgi?id=13024 Signed-off-by: Ralph Boehme <slow@samba.org> Reviewed-by: Jeremy Allison <jra@samba.org> Autobuild-User(master): Ralph Böhme <slow@samba.org> Autobuild-Date(master): Tue Sep 12 02:45:46 CEST 2017 on sn-devel-144
809 lines
21 KiB
C
809 lines
21 KiB
C
/*
|
|
Unix SMB/CIFS implementation.
|
|
Core SMB2 server
|
|
|
|
Copyright (C) Stefan Metzmacher 2009
|
|
|
|
This program is free software; you can redistribute it and/or modify
|
|
it under the terms of the GNU General Public License as published by
|
|
the Free Software Foundation; either version 3 of the License, or
|
|
(at your option) any later version.
|
|
|
|
This program is distributed in the hope that it will be useful,
|
|
but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
GNU General Public License for more details.
|
|
|
|
You should have received a copy of the GNU General Public License
|
|
along with this program. If not, see <http://www.gnu.org/licenses/>.
|
|
*/
|
|
|
|
#include "includes.h"
|
|
#include "smbd/smbd.h"
|
|
#include "smbd/globals.h"
|
|
#include "../libcli/smb/smb_common.h"
|
|
#include "trans2.h"
|
|
#include "../lib/util/tevent_ntstatus.h"
|
|
#include "system/filesys.h"
|
|
|
|
static struct tevent_req *smbd_smb2_query_directory_send(TALLOC_CTX *mem_ctx,
|
|
struct tevent_context *ev,
|
|
struct smbd_smb2_request *smb2req,
|
|
struct files_struct *in_fsp,
|
|
uint8_t in_file_info_class,
|
|
uint8_t in_flags,
|
|
uint32_t in_file_index,
|
|
uint32_t in_output_buffer_length,
|
|
const char *in_file_name);
|
|
static NTSTATUS smbd_smb2_query_directory_recv(struct tevent_req *req,
|
|
TALLOC_CTX *mem_ctx,
|
|
DATA_BLOB *out_output_buffer);
|
|
|
|
static void smbd_smb2_request_find_done(struct tevent_req *subreq);
|
|
NTSTATUS smbd_smb2_request_process_query_directory(struct smbd_smb2_request *req)
|
|
{
|
|
NTSTATUS status;
|
|
const uint8_t *inbody;
|
|
uint8_t in_file_info_class;
|
|
uint8_t in_flags;
|
|
uint32_t in_file_index;
|
|
uint64_t in_file_id_persistent;
|
|
uint64_t in_file_id_volatile;
|
|
struct files_struct *in_fsp;
|
|
uint16_t in_file_name_offset;
|
|
uint16_t in_file_name_length;
|
|
DATA_BLOB in_file_name_buffer;
|
|
char *in_file_name_string;
|
|
size_t in_file_name_string_size;
|
|
uint32_t in_output_buffer_length;
|
|
struct tevent_req *subreq;
|
|
bool ok;
|
|
|
|
status = smbd_smb2_request_verify_sizes(req, 0x21);
|
|
if (!NT_STATUS_IS_OK(status)) {
|
|
return smbd_smb2_request_error(req, status);
|
|
}
|
|
inbody = SMBD_SMB2_IN_BODY_PTR(req);
|
|
|
|
in_file_info_class = CVAL(inbody, 0x02);
|
|
in_flags = CVAL(inbody, 0x03);
|
|
in_file_index = IVAL(inbody, 0x04);
|
|
in_file_id_persistent = BVAL(inbody, 0x08);
|
|
in_file_id_volatile = BVAL(inbody, 0x10);
|
|
in_file_name_offset = SVAL(inbody, 0x18);
|
|
in_file_name_length = SVAL(inbody, 0x1A);
|
|
in_output_buffer_length = IVAL(inbody, 0x1C);
|
|
|
|
if (in_file_name_offset == 0 && in_file_name_length == 0) {
|
|
/* This is ok */
|
|
} else if (in_file_name_offset !=
|
|
(SMB2_HDR_BODY + SMBD_SMB2_IN_BODY_LEN(req))) {
|
|
return smbd_smb2_request_error(req, NT_STATUS_INVALID_PARAMETER);
|
|
}
|
|
|
|
if (in_file_name_length > SMBD_SMB2_IN_DYN_LEN(req)) {
|
|
return smbd_smb2_request_error(req, NT_STATUS_INVALID_PARAMETER);
|
|
}
|
|
|
|
/* The output header is 8 bytes. */
|
|
if (in_output_buffer_length <= 8) {
|
|
return smbd_smb2_request_error(req, NT_STATUS_INVALID_PARAMETER);
|
|
}
|
|
|
|
DEBUG(10,("smbd_smb2_request_find_done: in_output_buffer_length = %u\n",
|
|
(unsigned int)in_output_buffer_length ));
|
|
|
|
/* Take into account the output header. */
|
|
in_output_buffer_length -= 8;
|
|
|
|
in_file_name_buffer.data = SMBD_SMB2_IN_DYN_PTR(req);
|
|
in_file_name_buffer.length = in_file_name_length;
|
|
|
|
ok = convert_string_talloc(req, CH_UTF16, CH_UNIX,
|
|
in_file_name_buffer.data,
|
|
in_file_name_buffer.length,
|
|
&in_file_name_string,
|
|
&in_file_name_string_size);
|
|
if (!ok) {
|
|
return smbd_smb2_request_error(req, NT_STATUS_ILLEGAL_CHARACTER);
|
|
}
|
|
|
|
if (in_file_name_buffer.length == 0) {
|
|
in_file_name_string_size = 0;
|
|
}
|
|
|
|
if (strlen(in_file_name_string) != in_file_name_string_size) {
|
|
return smbd_smb2_request_error(req, NT_STATUS_OBJECT_NAME_INVALID);
|
|
}
|
|
|
|
in_fsp = file_fsp_smb2(req, in_file_id_persistent, in_file_id_volatile);
|
|
if (in_fsp == NULL) {
|
|
return smbd_smb2_request_error(req, NT_STATUS_FILE_CLOSED);
|
|
}
|
|
|
|
subreq = smbd_smb2_query_directory_send(req, req->sconn->ev_ctx,
|
|
req, in_fsp,
|
|
in_file_info_class,
|
|
in_flags,
|
|
in_file_index,
|
|
in_output_buffer_length,
|
|
in_file_name_string);
|
|
if (subreq == NULL) {
|
|
return smbd_smb2_request_error(req, NT_STATUS_NO_MEMORY);
|
|
}
|
|
tevent_req_set_callback(subreq, smbd_smb2_request_find_done, req);
|
|
|
|
return smbd_smb2_request_pending_queue(req, subreq, 500);
|
|
}
|
|
|
|
static void smbd_smb2_request_find_done(struct tevent_req *subreq)
|
|
{
|
|
struct smbd_smb2_request *req = tevent_req_callback_data(subreq,
|
|
struct smbd_smb2_request);
|
|
DATA_BLOB outbody;
|
|
DATA_BLOB outdyn;
|
|
uint16_t out_output_buffer_offset;
|
|
DATA_BLOB out_output_buffer = data_blob_null;
|
|
NTSTATUS status;
|
|
NTSTATUS error; /* transport error */
|
|
|
|
status = smbd_smb2_query_directory_recv(subreq,
|
|
req,
|
|
&out_output_buffer);
|
|
TALLOC_FREE(subreq);
|
|
if (!NT_STATUS_IS_OK(status)) {
|
|
error = smbd_smb2_request_error(req, status);
|
|
if (!NT_STATUS_IS_OK(error)) {
|
|
smbd_server_connection_terminate(req->xconn,
|
|
nt_errstr(error));
|
|
return;
|
|
}
|
|
return;
|
|
}
|
|
|
|
out_output_buffer_offset = SMB2_HDR_BODY + 0x08;
|
|
|
|
outbody = smbd_smb2_generate_outbody(req, 0x08);
|
|
if (outbody.data == NULL) {
|
|
error = smbd_smb2_request_error(req, NT_STATUS_NO_MEMORY);
|
|
if (!NT_STATUS_IS_OK(error)) {
|
|
smbd_server_connection_terminate(req->xconn,
|
|
nt_errstr(error));
|
|
return;
|
|
}
|
|
return;
|
|
}
|
|
|
|
SSVAL(outbody.data, 0x00, 0x08 + 1); /* struct size */
|
|
SSVAL(outbody.data, 0x02,
|
|
out_output_buffer_offset); /* output buffer offset */
|
|
SIVAL(outbody.data, 0x04,
|
|
out_output_buffer.length); /* output buffer length */
|
|
|
|
DEBUG(10,("smbd_smb2_request_find_done: out_output_buffer.length = %u\n",
|
|
(unsigned int)out_output_buffer.length ));
|
|
|
|
outdyn = out_output_buffer;
|
|
|
|
error = smbd_smb2_request_done(req, outbody, &outdyn);
|
|
if (!NT_STATUS_IS_OK(error)) {
|
|
smbd_server_connection_terminate(req->xconn,
|
|
nt_errstr(error));
|
|
return;
|
|
}
|
|
}
|
|
|
|
static struct tevent_req *fetch_write_time_send(TALLOC_CTX *mem_ctx,
|
|
struct tevent_context *ev,
|
|
connection_struct *conn,
|
|
struct file_id id,
|
|
int info_level,
|
|
char *entry_marshall_buf,
|
|
bool *stop);
|
|
static NTSTATUS fetch_write_time_recv(struct tevent_req *req);
|
|
|
|
|
|
struct smbd_smb2_query_directory_state {
|
|
struct tevent_context *ev;
|
|
struct smbd_smb2_request *smb2req;
|
|
uint64_t async_count;
|
|
uint32_t find_async_delay_usec;
|
|
DATA_BLOB out_output_buffer;
|
|
};
|
|
|
|
static void smb2_query_directory_fetch_write_time_done(struct tevent_req *subreq);
|
|
static void smb2_query_directory_waited(struct tevent_req *subreq);
|
|
|
|
static struct tevent_req *smbd_smb2_query_directory_send(TALLOC_CTX *mem_ctx,
|
|
struct tevent_context *ev,
|
|
struct smbd_smb2_request *smb2req,
|
|
struct files_struct *fsp,
|
|
uint8_t in_file_info_class,
|
|
uint8_t in_flags,
|
|
uint32_t in_file_index,
|
|
uint32_t in_output_buffer_length,
|
|
const char *in_file_name)
|
|
{
|
|
struct smbXsrv_connection *xconn = smb2req->xconn;
|
|
struct tevent_req *req;
|
|
struct smbd_smb2_query_directory_state *state;
|
|
struct smb_request *smbreq;
|
|
connection_struct *conn = smb2req->tcon->compat;
|
|
NTSTATUS status;
|
|
NTSTATUS empty_status;
|
|
uint32_t info_level;
|
|
uint32_t max_count;
|
|
char *pdata;
|
|
char *base_data;
|
|
char *end_data;
|
|
int last_entry_off = 0;
|
|
int off = 0;
|
|
uint32_t num = 0;
|
|
uint32_t dirtype = FILE_ATTRIBUTE_HIDDEN | FILE_ATTRIBUTE_SYSTEM | FILE_ATTRIBUTE_DIRECTORY;
|
|
bool dont_descend = false;
|
|
bool ask_sharemode = false;
|
|
bool async_ask_sharemode = false;
|
|
bool wcard_has_wild = false;
|
|
struct tm tm;
|
|
char *p;
|
|
|
|
req = tevent_req_create(mem_ctx, &state,
|
|
struct smbd_smb2_query_directory_state);
|
|
if (req == NULL) {
|
|
return NULL;
|
|
}
|
|
state->ev = ev;
|
|
state->smb2req = smb2req;
|
|
state->out_output_buffer = data_blob_null;
|
|
|
|
DEBUG(10,("smbd_smb2_query_directory_send: %s - %s\n",
|
|
fsp_str_dbg(fsp), fsp_fnum_dbg(fsp)));
|
|
|
|
smbreq = smbd_smb2_fake_smb_request(smb2req);
|
|
if (tevent_req_nomem(smbreq, req)) {
|
|
return tevent_req_post(req, ev);
|
|
}
|
|
|
|
if (!fsp->is_directory) {
|
|
tevent_req_nterror(req, NT_STATUS_NOT_SUPPORTED);
|
|
return tevent_req_post(req, ev);
|
|
}
|
|
|
|
if (strcmp(in_file_name, "") == 0) {
|
|
tevent_req_nterror(req, NT_STATUS_OBJECT_NAME_INVALID);
|
|
return tevent_req_post(req, ev);
|
|
}
|
|
if (strchr_m(in_file_name, '\\') != NULL) {
|
|
tevent_req_nterror(req, NT_STATUS_OBJECT_NAME_INVALID);
|
|
return tevent_req_post(req, ev);
|
|
}
|
|
if (strchr_m(in_file_name, '/') != NULL) {
|
|
tevent_req_nterror(req, NT_STATUS_OBJECT_NAME_INVALID);
|
|
return tevent_req_post(req, ev);
|
|
}
|
|
|
|
p = strptime(in_file_name, GMT_FORMAT, &tm);
|
|
if ((p != NULL) && (*p =='\0')) {
|
|
/*
|
|
* Bogus find that asks for a shadow copy timestamp as a
|
|
* directory. The correct response is that it does not exist as
|
|
* a directory.
|
|
*/
|
|
tevent_req_nterror(req, NT_STATUS_NO_SUCH_FILE);
|
|
return tevent_req_post(req, ev);
|
|
}
|
|
|
|
if (in_output_buffer_length > xconn->smb2.server.max_trans) {
|
|
DEBUG(2,("smbd_smb2_query_directory_send: "
|
|
"client ignored max trans:%s: 0x%08X: 0x%08X\n",
|
|
__location__, in_output_buffer_length,
|
|
xconn->smb2.server.max_trans));
|
|
tevent_req_nterror(req, NT_STATUS_INVALID_PARAMETER);
|
|
return tevent_req_post(req, ev);
|
|
}
|
|
|
|
status = smbd_smb2_request_verify_creditcharge(smb2req,
|
|
in_output_buffer_length);
|
|
|
|
if (!NT_STATUS_IS_OK(status)) {
|
|
tevent_req_nterror(req, NT_STATUS_INVALID_PARAMETER);
|
|
return tevent_req_post(req, ev);
|
|
}
|
|
|
|
switch (in_file_info_class) {
|
|
case SMB2_FIND_DIRECTORY_INFO:
|
|
info_level = SMB_FIND_FILE_DIRECTORY_INFO;
|
|
break;
|
|
|
|
case SMB2_FIND_FULL_DIRECTORY_INFO:
|
|
info_level = SMB_FIND_FILE_FULL_DIRECTORY_INFO;
|
|
break;
|
|
|
|
case SMB2_FIND_BOTH_DIRECTORY_INFO:
|
|
info_level = SMB_FIND_FILE_BOTH_DIRECTORY_INFO;
|
|
break;
|
|
|
|
case SMB2_FIND_NAME_INFO:
|
|
info_level = SMB_FIND_FILE_NAMES_INFO;
|
|
break;
|
|
|
|
case SMB2_FIND_ID_BOTH_DIRECTORY_INFO:
|
|
info_level = SMB_FIND_ID_BOTH_DIRECTORY_INFO;
|
|
break;
|
|
|
|
case SMB2_FIND_ID_FULL_DIRECTORY_INFO:
|
|
info_level = SMB_FIND_ID_FULL_DIRECTORY_INFO;
|
|
break;
|
|
|
|
default:
|
|
tevent_req_nterror(req, NT_STATUS_INVALID_INFO_CLASS);
|
|
return tevent_req_post(req, ev);
|
|
}
|
|
|
|
if (in_flags & SMB2_CONTINUE_FLAG_REOPEN) {
|
|
int flags;
|
|
|
|
dptr_CloseDir(fsp);
|
|
|
|
/*
|
|
* dptr_CloseDir() will close and invalidate the fsp's file
|
|
* descriptor, we have to reopen it.
|
|
*/
|
|
|
|
flags = O_RDONLY;
|
|
#ifdef O_DIRECTORY
|
|
flags |= O_DIRECTORY;
|
|
#endif
|
|
status = fd_open(conn, fsp, flags, 0);
|
|
if (tevent_req_nterror(req, status)) {
|
|
return tevent_req_post(req, ev);
|
|
}
|
|
}
|
|
|
|
if (!smbreq->posix_pathnames) {
|
|
wcard_has_wild = ms_has_wild(in_file_name);
|
|
}
|
|
|
|
/* Ensure we've canonicalized any search path if not a wildcard. */
|
|
if (!wcard_has_wild) {
|
|
struct smb_filename *smb_fname = NULL;
|
|
const char *fullpath;
|
|
char tmpbuf[PATH_MAX];
|
|
char *to_free = NULL;
|
|
uint32_t ucf_flags = UCF_SAVE_LCOMP |
|
|
UCF_ALWAYS_ALLOW_WCARD_LCOMP |
|
|
(smbreq->posix_pathnames ?
|
|
UCF_POSIX_PATHNAMES : 0);
|
|
|
|
if (ISDOT(fsp->fsp_name->base_name)) {
|
|
fullpath = in_file_name;
|
|
} else {
|
|
size_t len;
|
|
char *tmp;
|
|
|
|
len = full_path_tos(
|
|
fsp->fsp_name->base_name, in_file_name,
|
|
tmpbuf, sizeof(tmpbuf), &tmp, &to_free);
|
|
if (len == -1) {
|
|
tevent_req_oom(req);
|
|
return tevent_req_post(req, ev);
|
|
}
|
|
fullpath = tmp;
|
|
}
|
|
status = filename_convert(state,
|
|
conn,
|
|
fullpath,
|
|
ucf_flags,
|
|
&wcard_has_wild,
|
|
&smb_fname);
|
|
|
|
TALLOC_FREE(to_free);
|
|
|
|
if (tevent_req_nterror(req, status)) {
|
|
return tevent_req_post(req, ev);
|
|
}
|
|
|
|
in_file_name = smb_fname->original_lcomp;
|
|
}
|
|
|
|
if (fsp->dptr == NULL) {
|
|
status = dptr_create(conn,
|
|
NULL, /* req */
|
|
fsp,
|
|
fsp->fsp_name,
|
|
false, /* old_handle */
|
|
false, /* expect_close */
|
|
0, /* spid */
|
|
in_file_name, /* wcard */
|
|
wcard_has_wild,
|
|
dirtype,
|
|
&fsp->dptr);
|
|
if (!NT_STATUS_IS_OK(status)) {
|
|
tevent_req_nterror(req, status);
|
|
return tevent_req_post(req, ev);
|
|
}
|
|
|
|
empty_status = NT_STATUS_NO_SUCH_FILE;
|
|
} else {
|
|
empty_status = STATUS_NO_MORE_FILES;
|
|
}
|
|
|
|
if (in_flags & SMB2_CONTINUE_FLAG_RESTART) {
|
|
dptr_SeekDir(fsp->dptr, 0);
|
|
}
|
|
|
|
if (in_flags & SMB2_CONTINUE_FLAG_SINGLE) {
|
|
max_count = 1;
|
|
} else {
|
|
max_count = UINT16_MAX;
|
|
}
|
|
|
|
#define DIR_ENTRY_SAFETY_MARGIN 4096
|
|
|
|
state->out_output_buffer = data_blob_talloc(state, NULL,
|
|
in_output_buffer_length + DIR_ENTRY_SAFETY_MARGIN);
|
|
if (tevent_req_nomem(state->out_output_buffer.data, req)) {
|
|
return tevent_req_post(req, ev);
|
|
}
|
|
|
|
state->out_output_buffer.length = 0;
|
|
pdata = (char *)state->out_output_buffer.data;
|
|
base_data = pdata;
|
|
/*
|
|
* end_data must include the safety margin as it's what is
|
|
* used to determine if pushed strings have been truncated.
|
|
*/
|
|
end_data = pdata + in_output_buffer_length + DIR_ENTRY_SAFETY_MARGIN - 1;
|
|
last_entry_off = 0;
|
|
off = 0;
|
|
num = 0;
|
|
|
|
DEBUG(8,("smbd_smb2_query_directory_send: dirpath=<%s> dontdescend=<%s>, "
|
|
"in_output_buffer_length = %u\n",
|
|
fsp->fsp_name->base_name, lp_dont_descend(talloc_tos(), SNUM(conn)),
|
|
(unsigned int)in_output_buffer_length ));
|
|
if (in_list(fsp->fsp_name->base_name,lp_dont_descend(talloc_tos(), SNUM(conn)),
|
|
conn->case_sensitive)) {
|
|
dont_descend = true;
|
|
}
|
|
|
|
/*
|
|
* SMB_FIND_FILE_NAMES_INFO doesn't need stat information
|
|
*
|
|
* This may change when we try to improve the delete on close
|
|
* handling in future.
|
|
*/
|
|
if (info_level != SMB_FIND_FILE_NAMES_INFO) {
|
|
ask_sharemode = lp_parm_bool(SNUM(conn),
|
|
"smbd", "search ask sharemode",
|
|
true);
|
|
}
|
|
|
|
if (ask_sharemode && lp_clustering()) {
|
|
ask_sharemode = false;
|
|
async_ask_sharemode = true;
|
|
|
|
/*
|
|
* Should we only set async_internal
|
|
* if we're not the last request in
|
|
* a compound chain?
|
|
*/
|
|
smb2_request_set_async_internal(smb2req, true);
|
|
}
|
|
|
|
/*
|
|
* This gets set in autobuild for some tests
|
|
*/
|
|
state->find_async_delay_usec = lp_parm_ulong(SNUM(conn), "smbd",
|
|
"find async delay usec",
|
|
0);
|
|
|
|
while (true) {
|
|
bool got_exact_match = false;
|
|
int space_remaining = in_output_buffer_length - off;
|
|
struct file_id file_id;
|
|
bool stop = false;
|
|
|
|
SMB_ASSERT(space_remaining >= 0);
|
|
|
|
status = smbd_dirptr_lanman2_entry(state,
|
|
conn,
|
|
fsp->dptr,
|
|
smbreq->flags2,
|
|
in_file_name,
|
|
dirtype,
|
|
info_level,
|
|
false, /* requires_resume_key */
|
|
dont_descend,
|
|
ask_sharemode,
|
|
8, /* align to 8 bytes */
|
|
false, /* no padding */
|
|
&pdata,
|
|
base_data,
|
|
end_data,
|
|
space_remaining,
|
|
&got_exact_match,
|
|
&last_entry_off,
|
|
NULL,
|
|
&file_id);
|
|
|
|
off = (int)PTR_DIFF(pdata, base_data);
|
|
|
|
if (!NT_STATUS_IS_OK(status)) {
|
|
if (NT_STATUS_EQUAL(status, NT_STATUS_ILLEGAL_CHARACTER)) {
|
|
/*
|
|
* Bad character conversion on name. Ignore this
|
|
* entry.
|
|
*/
|
|
continue;
|
|
} else if (num > 0) {
|
|
goto last_entry_done;
|
|
} else if (NT_STATUS_EQUAL(status, STATUS_MORE_ENTRIES)) {
|
|
tevent_req_nterror(req, NT_STATUS_INFO_LENGTH_MISMATCH);
|
|
return tevent_req_post(req, ev);
|
|
} else {
|
|
tevent_req_nterror(req, empty_status);
|
|
return tevent_req_post(req, ev);
|
|
}
|
|
}
|
|
|
|
if (async_ask_sharemode) {
|
|
struct tevent_req *subreq = NULL;
|
|
|
|
subreq = fetch_write_time_send(req,
|
|
ev,
|
|
conn,
|
|
file_id,
|
|
info_level,
|
|
base_data + last_entry_off,
|
|
&stop);
|
|
if (tevent_req_nomem(subreq, req)) {
|
|
return tevent_req_post(req, ev);
|
|
}
|
|
tevent_req_set_callback(
|
|
subreq,
|
|
smb2_query_directory_fetch_write_time_done,
|
|
req);
|
|
|
|
state->async_count++;
|
|
}
|
|
|
|
num++;
|
|
state->out_output_buffer.length = off;
|
|
|
|
if (num >= max_count) {
|
|
stop = true;
|
|
}
|
|
|
|
if (!stop) {
|
|
continue;
|
|
}
|
|
|
|
last_entry_done:
|
|
SIVAL(state->out_output_buffer.data, last_entry_off, 0);
|
|
if (state->async_count > 0) {
|
|
DBG_DEBUG("Stopping after %"PRIu64" async mtime "
|
|
"updates\n", state->async_count);
|
|
return req;
|
|
}
|
|
|
|
if (state->find_async_delay_usec > 0) {
|
|
struct timeval tv;
|
|
struct tevent_req *subreq = NULL;
|
|
|
|
/*
|
|
* Should we only set async_internal
|
|
* if we're not the last request in
|
|
* a compound chain?
|
|
*/
|
|
smb2_request_set_async_internal(smb2req, true);
|
|
|
|
tv = timeval_current_ofs(0, state->find_async_delay_usec);
|
|
|
|
subreq = tevent_wakeup_send(state, ev, tv);
|
|
if (tevent_req_nomem(subreq, req)) {
|
|
return tevent_req_post(req, ev);
|
|
}
|
|
tevent_req_set_callback(subreq,
|
|
smb2_query_directory_waited,
|
|
req);
|
|
return req;
|
|
}
|
|
|
|
tevent_req_done(req);
|
|
return tevent_req_post(req, ev);
|
|
}
|
|
|
|
tevent_req_nterror(req, NT_STATUS_INTERNAL_ERROR);
|
|
return tevent_req_post(req, ev);
|
|
}
|
|
|
|
static void smb2_query_directory_fetch_write_time_done(struct tevent_req *subreq)
|
|
{
|
|
struct tevent_req *req = tevent_req_callback_data(
|
|
subreq, struct tevent_req);
|
|
struct smbd_smb2_query_directory_state *state = tevent_req_data(
|
|
req, struct smbd_smb2_query_directory_state);
|
|
NTSTATUS status;
|
|
|
|
state->async_count--;
|
|
|
|
status = fetch_write_time_recv(subreq);
|
|
TALLOC_FREE(subreq);
|
|
if (tevent_req_nterror(req, status)) {
|
|
return;
|
|
}
|
|
|
|
if (state->async_count > 0) {
|
|
return;
|
|
}
|
|
|
|
if (state->find_async_delay_usec > 0) {
|
|
struct timeval tv;
|
|
|
|
tv = timeval_current_ofs(0, state->find_async_delay_usec);
|
|
|
|
subreq = tevent_wakeup_send(state, state->ev, tv);
|
|
if (tevent_req_nomem(subreq, req)) {
|
|
tevent_req_post(req, state->ev);
|
|
return;
|
|
}
|
|
tevent_req_set_callback(subreq,
|
|
smb2_query_directory_waited,
|
|
req);
|
|
return;
|
|
}
|
|
|
|
tevent_req_done(req);
|
|
return;
|
|
}
|
|
|
|
static void smb2_query_directory_waited(struct tevent_req *subreq)
|
|
{
|
|
struct tevent_req *req = tevent_req_callback_data(
|
|
subreq, struct tevent_req);
|
|
bool ok;
|
|
|
|
ok = tevent_wakeup_recv(subreq);
|
|
TALLOC_FREE(subreq);
|
|
if (!ok) {
|
|
tevent_req_oom(req);
|
|
return;
|
|
}
|
|
tevent_req_done(req);
|
|
}
|
|
|
|
static NTSTATUS smbd_smb2_query_directory_recv(struct tevent_req *req,
|
|
TALLOC_CTX *mem_ctx,
|
|
DATA_BLOB *out_output_buffer)
|
|
{
|
|
NTSTATUS status;
|
|
struct smbd_smb2_query_directory_state *state = tevent_req_data(req,
|
|
struct smbd_smb2_query_directory_state);
|
|
|
|
if (tevent_req_is_nterror(req, &status)) {
|
|
tevent_req_received(req);
|
|
return status;
|
|
}
|
|
|
|
*out_output_buffer = state->out_output_buffer;
|
|
talloc_steal(mem_ctx, out_output_buffer->data);
|
|
|
|
tevent_req_received(req);
|
|
return NT_STATUS_OK;
|
|
}
|
|
|
|
struct fetch_write_time_state {
|
|
connection_struct *conn;
|
|
struct file_id id;
|
|
int info_level;
|
|
char *entry_marshall_buf;
|
|
};
|
|
|
|
static void fetch_write_time_done(struct tevent_req *subreq);
|
|
|
|
static struct tevent_req *fetch_write_time_send(TALLOC_CTX *mem_ctx,
|
|
struct tevent_context *ev,
|
|
connection_struct *conn,
|
|
struct file_id id,
|
|
int info_level,
|
|
char *entry_marshall_buf,
|
|
bool *stop)
|
|
{
|
|
struct tevent_req *req = NULL;
|
|
struct fetch_write_time_state *state = NULL;
|
|
struct tevent_req *subreq = NULL;
|
|
bool req_queued;
|
|
|
|
*stop = false;
|
|
|
|
req = tevent_req_create(mem_ctx, &state, struct fetch_write_time_state);
|
|
if (req == NULL) {
|
|
return NULL;
|
|
}
|
|
|
|
*state = (struct fetch_write_time_state) {
|
|
.conn = conn,
|
|
.id = id,
|
|
.info_level = info_level,
|
|
.entry_marshall_buf = entry_marshall_buf,
|
|
};
|
|
|
|
subreq = fetch_share_mode_send(state, ev, id, &req_queued);
|
|
if (tevent_req_nomem(subreq, req)) {
|
|
return tevent_req_post(req, ev);
|
|
}
|
|
tevent_req_set_callback(subreq, fetch_write_time_done, req);
|
|
|
|
if (req_queued) {
|
|
*stop = true;
|
|
}
|
|
return req;
|
|
}
|
|
|
|
static void fetch_write_time_done(struct tevent_req *subreq)
|
|
{
|
|
struct tevent_req *req = tevent_req_callback_data(
|
|
subreq, struct tevent_req);
|
|
struct fetch_write_time_state *state = tevent_req_data(
|
|
req, struct fetch_write_time_state);
|
|
struct timespec write_time;
|
|
struct share_mode_lock *lck = NULL;
|
|
NTSTATUS status;
|
|
size_t off;
|
|
|
|
status = fetch_share_mode_recv(subreq, state, &lck);
|
|
TALLOC_FREE(subreq);
|
|
if (NT_STATUS_EQUAL(status, NT_STATUS_NOT_FOUND)) {
|
|
tevent_req_done(req);
|
|
return;
|
|
}
|
|
if (!NT_STATUS_IS_OK(status)) {
|
|
tevent_req_nterror(req, status);
|
|
return;
|
|
}
|
|
|
|
write_time = get_share_mode_write_time(lck);
|
|
TALLOC_FREE(lck);
|
|
|
|
if (null_timespec(write_time)) {
|
|
tevent_req_done(req);
|
|
return;
|
|
}
|
|
|
|
switch (state->info_level) {
|
|
case SMB_FIND_FILE_DIRECTORY_INFO:
|
|
case SMB_FIND_FILE_FULL_DIRECTORY_INFO:
|
|
case SMB_FIND_FILE_BOTH_DIRECTORY_INFO:
|
|
case SMB_FIND_ID_FULL_DIRECTORY_INFO:
|
|
case SMB_FIND_ID_BOTH_DIRECTORY_INFO:
|
|
off = 24;
|
|
break;
|
|
|
|
default:
|
|
DBG_ERR("Unsupported info_level [%d]\n", state->info_level);
|
|
tevent_req_nterror(req, NT_STATUS_INVALID_LEVEL);
|
|
return;
|
|
}
|
|
|
|
put_long_date_timespec(state->conn->ts_res,
|
|
state->entry_marshall_buf + off,
|
|
write_time);
|
|
|
|
tevent_req_done(req);
|
|
return;
|
|
}
|
|
|
|
static NTSTATUS fetch_write_time_recv(struct tevent_req *req)
|
|
{
|
|
NTSTATUS status;
|
|
|
|
if (tevent_req_is_nterror(req, &status)) {
|
|
tevent_req_received(req);
|
|
return status;
|
|
}
|
|
|
|
tevent_req_received(req);
|
|
return NT_STATUS_OK;
|
|
}
|