mirror of
https://github.com/samba-team/samba.git
synced 2024-12-23 17:34:34 +03:00
09221cea5a
We must always do SMB3+POSIX operations on fsp's opened with a posix create context. Signed-off-by: Jeremy Allison <jra@samba.org> Reviewed-by: Ralph Boehme <slow@samba.org>
255 lines
6.7 KiB
C
255 lines
6.7 KiB
C
/*
|
|
Unix SMB/CIFS implementation.
|
|
Core SMB2 server
|
|
|
|
Copyright (C) Stefan Metzmacher 2009
|
|
|
|
This program is free software; you can redistribute it and/or modify
|
|
it under the terms of the GNU General Public License as published by
|
|
the Free Software Foundation; either version 3 of the License, or
|
|
(at your option) any later version.
|
|
|
|
This program is distributed in the hope that it will be useful,
|
|
but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
GNU General Public License for more details.
|
|
|
|
You should have received a copy of the GNU General Public License
|
|
along with this program. If not, see <http://www.gnu.org/licenses/>.
|
|
*/
|
|
|
|
#include "includes.h"
|
|
#include "smbd/smbd.h"
|
|
#include "smbd/globals.h"
|
|
#include "../libcli/smb/smb_common.h"
|
|
#include "../lib/util/tevent_ntstatus.h"
|
|
#include "libcli/security/security.h"
|
|
|
|
#undef DBGC_CLASS
|
|
#define DBGC_CLASS DBGC_SMB2
|
|
|
|
static struct tevent_req *smbd_smb2_flush_send(TALLOC_CTX *mem_ctx,
|
|
struct tevent_context *ev,
|
|
struct smbd_smb2_request *smb2req,
|
|
struct files_struct *fsp);
|
|
static NTSTATUS smbd_smb2_flush_recv(struct tevent_req *req);
|
|
|
|
static void smbd_smb2_request_flush_done(struct tevent_req *subreq);
|
|
NTSTATUS smbd_smb2_request_process_flush(struct smbd_smb2_request *req)
|
|
{
|
|
NTSTATUS status;
|
|
const uint8_t *inbody;
|
|
uint64_t in_file_id_persistent;
|
|
uint64_t in_file_id_volatile;
|
|
struct files_struct *in_fsp;
|
|
struct tevent_req *subreq;
|
|
|
|
status = smbd_smb2_request_verify_sizes(req, 0x18);
|
|
if (!NT_STATUS_IS_OK(status)) {
|
|
return smbd_smb2_request_error(req, status);
|
|
}
|
|
inbody = SMBD_SMB2_IN_BODY_PTR(req);
|
|
|
|
in_file_id_persistent = BVAL(inbody, 0x08);
|
|
in_file_id_volatile = BVAL(inbody, 0x10);
|
|
|
|
in_fsp = file_fsp_smb2(req, in_file_id_persistent, in_file_id_volatile);
|
|
if (in_fsp == NULL) {
|
|
return smbd_smb2_request_error(req, NT_STATUS_FILE_CLOSED);
|
|
}
|
|
|
|
subreq = smbd_smb2_flush_send(req, req->sconn->ev_ctx,
|
|
req, in_fsp);
|
|
if (subreq == NULL) {
|
|
return smbd_smb2_request_error(req, NT_STATUS_NO_MEMORY);
|
|
}
|
|
tevent_req_set_callback(subreq, smbd_smb2_request_flush_done, req);
|
|
|
|
return smbd_smb2_request_pending_queue(req, subreq, 500);
|
|
}
|
|
|
|
static void smbd_smb2_request_flush_done(struct tevent_req *subreq)
|
|
{
|
|
struct smbd_smb2_request *req = tevent_req_callback_data(subreq,
|
|
struct smbd_smb2_request);
|
|
DATA_BLOB outbody;
|
|
NTSTATUS status;
|
|
NTSTATUS error; /* transport error */
|
|
|
|
status = smbd_smb2_flush_recv(subreq);
|
|
TALLOC_FREE(subreq);
|
|
if (!NT_STATUS_IS_OK(status)) {
|
|
error = smbd_smb2_request_error(req, status);
|
|
if (!NT_STATUS_IS_OK(error)) {
|
|
smbd_server_connection_terminate(req->xconn,
|
|
nt_errstr(error));
|
|
return;
|
|
}
|
|
return;
|
|
}
|
|
|
|
outbody = smbd_smb2_generate_outbody(req, 0x04);
|
|
if (outbody.data == NULL) {
|
|
error = smbd_smb2_request_error(req, NT_STATUS_NO_MEMORY);
|
|
if (!NT_STATUS_IS_OK(error)) {
|
|
smbd_server_connection_terminate(req->xconn,
|
|
nt_errstr(error));
|
|
return;
|
|
}
|
|
return;
|
|
}
|
|
|
|
SSVAL(outbody.data, 0x00, 0x04); /* struct size */
|
|
SSVAL(outbody.data, 0x02, 0); /* reserved */
|
|
|
|
error = smbd_smb2_request_done(req, outbody, NULL);
|
|
if (!NT_STATUS_IS_OK(error)) {
|
|
smbd_server_connection_terminate(req->xconn,
|
|
nt_errstr(error));
|
|
return;
|
|
}
|
|
}
|
|
|
|
struct smbd_smb2_flush_state {
|
|
struct smbd_smb2_request *smb2req;
|
|
struct files_struct *fsp;
|
|
};
|
|
|
|
static void smbd_smb2_flush_done(struct tevent_req *subreq);
|
|
|
|
static struct tevent_req *smbd_smb2_flush_send(TALLOC_CTX *mem_ctx,
|
|
struct tevent_context *ev,
|
|
struct smbd_smb2_request *smb2req,
|
|
struct files_struct *fsp)
|
|
{
|
|
struct tevent_req *req;
|
|
struct tevent_req *subreq;
|
|
struct smbd_smb2_flush_state *state;
|
|
struct smb_request *smbreq;
|
|
bool is_compound = false;
|
|
bool is_last_in_compound = false;
|
|
|
|
req = tevent_req_create(mem_ctx, &state,
|
|
struct smbd_smb2_flush_state);
|
|
if (req == NULL) {
|
|
return NULL;
|
|
}
|
|
state->smb2req = smb2req;
|
|
state->fsp = fsp;
|
|
|
|
DEBUG(10,("smbd_smb2_flush: %s - %s\n",
|
|
fsp_str_dbg(fsp), fsp_fnum_dbg(fsp)));
|
|
|
|
smbreq = smbd_smb2_fake_smb_request(smb2req, fsp);
|
|
if (tevent_req_nomem(smbreq, req)) {
|
|
return tevent_req_post(req, ev);
|
|
}
|
|
|
|
if (IS_IPC(smbreq->conn)) {
|
|
tevent_req_nterror(req, NT_STATUS_NOT_IMPLEMENTED);
|
|
return tevent_req_post(req, ev);
|
|
}
|
|
|
|
if (!CHECK_WRITE(fsp)) {
|
|
bool allow_dir_flush = false;
|
|
uint32_t flush_access = FILE_ADD_FILE | FILE_ADD_SUBDIRECTORY;
|
|
|
|
if (!fsp->fsp_flags.is_directory) {
|
|
tevent_req_nterror(req, NT_STATUS_ACCESS_DENIED);
|
|
return tevent_req_post(req, ev);
|
|
}
|
|
|
|
/*
|
|
* Directories are not writable in the conventional
|
|
* sense, but if opened with *either*
|
|
* FILE_ADD_FILE or FILE_ADD_SUBDIRECTORY
|
|
* they can be flushed.
|
|
*/
|
|
|
|
if ((fsp->access_mask & flush_access) != 0) {
|
|
allow_dir_flush = true;
|
|
}
|
|
|
|
if (allow_dir_flush == false) {
|
|
tevent_req_nterror(req, NT_STATUS_ACCESS_DENIED);
|
|
return tevent_req_post(req, ev);
|
|
}
|
|
}
|
|
|
|
if (fsp_get_io_fd(fsp) == -1) {
|
|
tevent_req_nterror(req, NT_STATUS_INVALID_HANDLE);
|
|
return tevent_req_post(req, ev);
|
|
}
|
|
|
|
if (!lp_strict_sync(SNUM(smbreq->conn))) {
|
|
/*
|
|
* No strict sync. Don't really do
|
|
* anything here.
|
|
*/
|
|
tevent_req_done(req);
|
|
return tevent_req_post(req, ev);
|
|
}
|
|
|
|
subreq = SMB_VFS_FSYNC_SEND(state, ev, fsp);
|
|
if (tevent_req_nomem(subreq, req)) {
|
|
return tevent_req_post(req, ev);
|
|
}
|
|
|
|
tevent_req_set_callback(subreq, smbd_smb2_flush_done, req);
|
|
|
|
is_compound = smbd_smb2_is_compound(smb2req);
|
|
is_last_in_compound = smbd_smb2_is_last_in_compound(smb2req);
|
|
|
|
if (is_compound && !is_last_in_compound) {
|
|
/*
|
|
* Can't go async if we're not the
|
|
* last request in a compound request.
|
|
* Cause this request to complete synchronously.
|
|
*/
|
|
smb2_request_set_async_internal(state->smb2req, true);
|
|
}
|
|
|
|
/* Ensure any close request knows about this outstanding IO. */
|
|
if (!aio_add_req_to_fsp(fsp, req)) {
|
|
tevent_req_nterror(req, NT_STATUS_NO_MEMORY);
|
|
return tevent_req_post(req, ev);
|
|
}
|
|
|
|
return req;
|
|
|
|
}
|
|
|
|
static void smbd_smb2_flush_done(struct tevent_req *subreq)
|
|
{
|
|
struct tevent_req *req = tevent_req_callback_data(
|
|
subreq, struct tevent_req);
|
|
struct smbd_smb2_flush_state *state = tevent_req_data(
|
|
req, struct smbd_smb2_flush_state);
|
|
int ret;
|
|
struct vfs_aio_state vfs_aio_state;
|
|
|
|
ret = SMB_VFS_FSYNC_RECV(subreq, &vfs_aio_state);
|
|
TALLOC_FREE(subreq);
|
|
if (ret == -1) {
|
|
tevent_req_nterror(req, map_nt_error_from_unix(vfs_aio_state.error));
|
|
return;
|
|
}
|
|
if (state->fsp->fsp_flags.modified) {
|
|
trigger_write_time_update_immediate(state->fsp);
|
|
}
|
|
tevent_req_done(req);
|
|
}
|
|
|
|
static NTSTATUS smbd_smb2_flush_recv(struct tevent_req *req)
|
|
{
|
|
NTSTATUS status;
|
|
|
|
if (tevent_req_is_nterror(req, &status)) {
|
|
tevent_req_received(req);
|
|
return status;
|
|
}
|
|
|
|
tevent_req_received(req);
|
|
return NT_STATUS_OK;
|
|
}
|