Fix bug #5986 - Editing a stream is broken (rename problems).
[Samba.git] / source / smbd / reply.c
blob762fab1a03084ef2b20b317dbf8023f395364796
1 /*
2 Unix SMB/CIFS implementation.
3 Main SMB reply routines
4 Copyright (C) Andrew Tridgell 1992-1998
5 Copyright (C) Andrew Bartlett 2001
6 Copyright (C) Jeremy Allison 1992-2007.
7 Copyright (C) Volker Lendecke 2007
9 This program is free software; you can redistribute it and/or modify
10 it under the terms of the GNU General Public License as published by
11 the Free Software Foundation; either version 3 of the License, or
12 (at your option) any later version.
14 This program is distributed in the hope that it will be useful,
15 but WITHOUT ANY WARRANTY; without even the implied warranty of
16 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
17 GNU General Public License for more details.
19 You should have received a copy of the GNU General Public License
20 along with this program. If not, see <http://www.gnu.org/licenses/>.
23 This file handles most of the reply_ calls that the server
24 makes to handle specific protocols
27 #include "includes.h"
29 /* look in server.c for some explanation of these variables */
30 extern enum protocol_types Protocol;
31 extern int max_recv;
32 unsigned int smb_echo_count = 0;
33 extern uint32 global_client_caps;
35 extern struct current_user current_user;
36 extern bool global_encrypted_passwords_negotiated;
38 /****************************************************************************
39 Ensure we check the path in *exactly* the same way as W2K for a findfirst/findnext
40 path or anything including wildcards.
41 We're assuming here that '/' is not the second byte in any multibyte char
42 set (a safe assumption). '\\' *may* be the second byte in a multibyte char
43 set.
44 ****************************************************************************/
46 /* Custom version for processing POSIX paths. */
47 #define IS_PATH_SEP(c,posix_only) ((c) == '/' || (!(posix_only) && (c) == '\\'))
49 static NTSTATUS check_path_syntax_internal(char *path,
50 bool posix_path,
51 bool *p_last_component_contains_wcard)
53 char *d = path;
54 const char *s = path;
55 NTSTATUS ret = NT_STATUS_OK;
56 bool start_of_name_component = True;
57 bool stream_started = false;
59 *p_last_component_contains_wcard = False;
61 while (*s) {
62 if (stream_started) {
63 switch (*s) {
64 case '/':
65 case '\\':
66 return NT_STATUS_OBJECT_NAME_INVALID;
67 case ':':
68 if (s[1] == '\0') {
69 return NT_STATUS_OBJECT_NAME_INVALID;
71 if (strchr_m(&s[1], ':')) {
72 return NT_STATUS_OBJECT_NAME_INVALID;
74 if (StrCaseCmp(s, ":$DATA") != 0) {
75 return NT_STATUS_INVALID_PARAMETER;
77 break;
81 if (!stream_started && *s == ':') {
82 if (*p_last_component_contains_wcard) {
83 return NT_STATUS_OBJECT_NAME_INVALID;
85 /* stream names allow more characters than file names */
86 stream_started = true;
87 start_of_name_component = false;
88 posix_path = true;
90 if (s[1] == '\0') {
91 return NT_STATUS_OBJECT_NAME_INVALID;
95 if (!stream_started && IS_PATH_SEP(*s,posix_path)) {
97 * Safe to assume is not the second part of a mb char
98 * as this is handled below.
100 /* Eat multiple '/' or '\\' */
101 while (IS_PATH_SEP(*s,posix_path)) {
102 s++;
104 if ((d != path) && (*s != '\0')) {
105 /* We only care about non-leading or trailing '/' or '\\' */
106 *d++ = '/';
109 start_of_name_component = True;
110 /* New component. */
111 *p_last_component_contains_wcard = False;
112 continue;
115 if (start_of_name_component) {
116 if ((s[0] == '.') && (s[1] == '.') && (IS_PATH_SEP(s[2],posix_path) || s[2] == '\0')) {
117 /* Uh oh - "/../" or "\\..\\" or "/..\0" or "\\..\0" ! */
120 * No mb char starts with '.' so we're safe checking the directory separator here.
123 /* If we just added a '/' - delete it */
124 if ((d > path) && (*(d-1) == '/')) {
125 *(d-1) = '\0';
126 d--;
129 /* Are we at the start ? Can't go back further if so. */
130 if (d <= path) {
131 ret = NT_STATUS_OBJECT_PATH_SYNTAX_BAD;
132 break;
134 /* Go back one level... */
135 /* We know this is safe as '/' cannot be part of a mb sequence. */
136 /* NOTE - if this assumption is invalid we are not in good shape... */
137 /* Decrement d first as d points to the *next* char to write into. */
138 for (d--; d > path; d--) {
139 if (*d == '/')
140 break;
142 s += 2; /* Else go past the .. */
143 /* We're still at the start of a name component, just the previous one. */
144 continue;
146 } else if ((s[0] == '.') && ((s[1] == '\0') || IS_PATH_SEP(s[1],posix_path))) {
147 if (posix_path) {
148 /* Eat the '.' */
149 s++;
150 continue;
156 if (!(*s & 0x80)) {
157 if (!posix_path) {
158 if (*s <= 0x1f || *s == '|') {
159 return NT_STATUS_OBJECT_NAME_INVALID;
161 switch (*s) {
162 case '*':
163 case '?':
164 case '<':
165 case '>':
166 case '"':
167 *p_last_component_contains_wcard = True;
168 break;
169 default:
170 break;
173 *d++ = *s++;
174 } else {
175 size_t siz;
176 /* Get the size of the next MB character. */
177 next_codepoint(s,&siz);
178 switch(siz) {
179 case 5:
180 *d++ = *s++;
181 /*fall through*/
182 case 4:
183 *d++ = *s++;
184 /*fall through*/
185 case 3:
186 *d++ = *s++;
187 /*fall through*/
188 case 2:
189 *d++ = *s++;
190 /*fall through*/
191 case 1:
192 *d++ = *s++;
193 break;
194 default:
195 DEBUG(0,("check_path_syntax_internal: character length assumptions invalid !\n"));
196 *d = '\0';
197 return NT_STATUS_INVALID_PARAMETER;
200 start_of_name_component = False;
203 *d = '\0';
205 return ret;
208 /****************************************************************************
209 Ensure we check the path in *exactly* the same way as W2K for regular pathnames.
210 No wildcards allowed.
211 ****************************************************************************/
213 NTSTATUS check_path_syntax(char *path)
215 bool ignore;
216 return check_path_syntax_internal(path, False, &ignore);
219 /****************************************************************************
220 Ensure we check the path in *exactly* the same way as W2K for regular pathnames.
221 Wildcards allowed - p_contains_wcard returns true if the last component contained
222 a wildcard.
223 ****************************************************************************/
225 NTSTATUS check_path_syntax_wcard(char *path, bool *p_contains_wcard)
227 return check_path_syntax_internal(path, False, p_contains_wcard);
230 /****************************************************************************
231 Check the path for a POSIX client.
232 We're assuming here that '/' is not the second byte in any multibyte char
233 set (a safe assumption).
234 ****************************************************************************/
236 NTSTATUS check_path_syntax_posix(char *path)
238 bool ignore;
239 return check_path_syntax_internal(path, True, &ignore);
242 /****************************************************************************
243 Pull a string and check the path allowing a wilcard - provide for error return.
244 ****************************************************************************/
246 size_t srvstr_get_path_wcard(TALLOC_CTX *ctx,
247 const char *inbuf,
248 uint16 smb_flags2,
249 char **pp_dest,
250 const char *src,
251 size_t src_len,
252 int flags,
253 NTSTATUS *err,
254 bool *contains_wcard)
256 size_t ret;
258 *pp_dest = NULL;
260 if (src_len == 0) {
261 ret = srvstr_pull_buf_talloc(ctx,
262 inbuf,
263 smb_flags2,
264 pp_dest,
265 src,
266 flags);
267 } else {
268 ret = srvstr_pull_talloc(ctx,
269 inbuf,
270 smb_flags2,
271 pp_dest,
272 src,
273 src_len,
274 flags);
277 if (!*pp_dest) {
278 *err = NT_STATUS_INVALID_PARAMETER;
279 return ret;
282 *contains_wcard = False;
284 if (smb_flags2 & FLAGS2_DFS_PATHNAMES) {
286 * For a DFS path the function parse_dfs_path()
287 * will do the path processing, just make a copy.
289 *err = NT_STATUS_OK;
290 return ret;
293 if (lp_posix_pathnames()) {
294 *err = check_path_syntax_posix(*pp_dest);
295 } else {
296 *err = check_path_syntax_wcard(*pp_dest, contains_wcard);
299 return ret;
302 /****************************************************************************
303 Pull a string and check the path - provide for error return.
304 ****************************************************************************/
306 size_t srvstr_get_path(TALLOC_CTX *ctx,
307 const char *inbuf,
308 uint16 smb_flags2,
309 char **pp_dest,
310 const char *src,
311 size_t src_len,
312 int flags,
313 NTSTATUS *err)
315 size_t ret;
317 *pp_dest = NULL;
319 if (src_len == 0) {
320 ret = srvstr_pull_buf_talloc(ctx,
321 inbuf,
322 smb_flags2,
323 pp_dest,
324 src,
325 flags);
326 } else {
327 ret = srvstr_pull_talloc(ctx,
328 inbuf,
329 smb_flags2,
330 pp_dest,
331 src,
332 src_len,
333 flags);
336 if (!*pp_dest) {
337 *err = NT_STATUS_INVALID_PARAMETER;
338 return ret;
341 if (smb_flags2 & FLAGS2_DFS_PATHNAMES) {
343 * For a DFS path the function parse_dfs_path()
344 * will do the path processing, just make a copy.
346 *err = NT_STATUS_OK;
347 return ret;
350 if (lp_posix_pathnames()) {
351 *err = check_path_syntax_posix(*pp_dest);
352 } else {
353 *err = check_path_syntax(*pp_dest);
356 return ret;
359 /****************************************************************************
360 Check if we have a correct fsp pointing to a file. Basic check for open fsp.
361 ****************************************************************************/
363 bool check_fsp_open(connection_struct *conn, struct smb_request *req,
364 files_struct *fsp, struct current_user *user)
366 if (!(fsp) || !(conn)) {
367 reply_nterror(req, NT_STATUS_INVALID_HANDLE);
368 return False;
370 if (((conn) != (fsp)->conn) || user->vuid != (fsp)->vuid) {
371 reply_nterror(req, NT_STATUS_INVALID_HANDLE);
372 return False;
374 return True;
377 /****************************************************************************
378 Check if we have a correct fsp pointing to a file. Replacement for the
379 CHECK_FSP macro.
380 ****************************************************************************/
382 bool check_fsp(connection_struct *conn, struct smb_request *req,
383 files_struct *fsp, struct current_user *user)
385 if (!check_fsp_open(conn, req, fsp, user)) {
386 return False;
388 if ((fsp)->is_directory) {
389 reply_nterror(req, NT_STATUS_INVALID_DEVICE_REQUEST);
390 return False;
392 if ((fsp)->fh->fd == -1) {
393 reply_nterror(req, NT_STATUS_ACCESS_DENIED);
394 return False;
396 (fsp)->num_smb_operations++;
397 return True;
400 /****************************************************************************
401 Check if we have a correct fsp. Replacement for the FSP_BELONGS_CONN macro
402 ****************************************************************************/
404 bool fsp_belongs_conn(connection_struct *conn, struct smb_request *req,
405 files_struct *fsp, struct current_user *user)
407 if ((fsp) && (conn) && ((conn)==(fsp)->conn)
408 && (current_user.vuid==(fsp)->vuid)) {
409 return True;
412 reply_nterror(req, NT_STATUS_INVALID_HANDLE);
413 return False;
416 /****************************************************************************
417 Reply to a (netbios-level) special message.
418 ****************************************************************************/
420 void reply_special(char *inbuf)
422 int msg_type = CVAL(inbuf,0);
423 int msg_flags = CVAL(inbuf,1);
424 fstring name1,name2;
425 char name_type = 0;
428 * We only really use 4 bytes of the outbuf, but for the smb_setlen
429 * calculation & friends (srv_send_smb uses that) we need the full smb
430 * header.
432 char outbuf[smb_size];
434 static bool already_got_session = False;
436 *name1 = *name2 = 0;
438 memset(outbuf, '\0', sizeof(outbuf));
440 smb_setlen(outbuf,0);
442 switch (msg_type) {
443 case 0x81: /* session request */
445 if (already_got_session) {
446 exit_server_cleanly("multiple session request not permitted");
449 SCVAL(outbuf,0,0x82);
450 SCVAL(outbuf,3,0);
451 if (name_len(inbuf+4) > 50 ||
452 name_len(inbuf+4 + name_len(inbuf + 4)) > 50) {
453 DEBUG(0,("Invalid name length in session request\n"));
454 return;
456 name_extract(inbuf,4,name1);
457 name_type = name_extract(inbuf,4 + name_len(inbuf + 4),name2);
458 DEBUG(2,("netbios connect: name1=%s name2=%s\n",
459 name1,name2));
461 set_local_machine_name(name1, True);
462 set_remote_machine_name(name2, True);
464 DEBUG(2,("netbios connect: local=%s remote=%s, name type = %x\n",
465 get_local_machine_name(), get_remote_machine_name(),
466 name_type));
468 if (name_type == 'R') {
469 /* We are being asked for a pathworks session ---
470 no thanks! */
471 SCVAL(outbuf, 0,0x83);
472 break;
475 /* only add the client's machine name to the list
476 of possibly valid usernames if we are operating
477 in share mode security */
478 if (lp_security() == SEC_SHARE) {
479 add_session_user(get_remote_machine_name());
482 reload_services(True);
483 reopen_logs();
485 already_got_session = True;
486 break;
488 case 0x89: /* session keepalive request
489 (some old clients produce this?) */
490 SCVAL(outbuf,0,SMBkeepalive);
491 SCVAL(outbuf,3,0);
492 break;
494 case 0x82: /* positive session response */
495 case 0x83: /* negative session response */
496 case 0x84: /* retarget session response */
497 DEBUG(0,("Unexpected session response\n"));
498 break;
500 case SMBkeepalive: /* session keepalive */
501 default:
502 return;
505 DEBUG(5,("init msg_type=0x%x msg_flags=0x%x\n",
506 msg_type, msg_flags));
508 srv_send_smb(smbd_server_fd(), outbuf, false);
509 return;
512 /****************************************************************************
513 Reply to a tcon.
514 conn POINTER CAN BE NULL HERE !
515 ****************************************************************************/
517 void reply_tcon(struct smb_request *req)
519 connection_struct *conn = req->conn;
520 const char *service;
521 char *service_buf = NULL;
522 char *password = NULL;
523 char *dev = NULL;
524 int pwlen=0;
525 NTSTATUS nt_status;
526 char *p;
527 DATA_BLOB password_blob;
528 TALLOC_CTX *ctx = talloc_tos();
530 START_PROFILE(SMBtcon);
532 if (smb_buflen(req->inbuf) < 4) {
533 reply_nterror(req, NT_STATUS_INVALID_PARAMETER);
534 END_PROFILE(SMBtcon);
535 return;
538 p = smb_buf(req->inbuf)+1;
539 p += srvstr_pull_buf_talloc(ctx, req->inbuf, req->flags2,
540 &service_buf, p, STR_TERMINATE) + 1;
541 pwlen = srvstr_pull_buf_talloc(ctx, req->inbuf, req->flags2,
542 &password, p, STR_TERMINATE) + 1;
543 p += pwlen;
544 p += srvstr_pull_buf_talloc(ctx, req->inbuf, req->flags2,
545 &dev, p, STR_TERMINATE) + 1;
547 if (service_buf == NULL || password == NULL || dev == NULL) {
548 reply_nterror(req, NT_STATUS_INVALID_PARAMETER);
549 END_PROFILE(SMBtcon);
550 return;
552 p = strrchr_m(service_buf,'\\');
553 if (p) {
554 service = p+1;
555 } else {
556 service = service_buf;
559 password_blob = data_blob(password, pwlen+1);
561 conn = make_connection(service,password_blob,dev,req->vuid,&nt_status);
562 req->conn = conn;
564 data_blob_clear_free(&password_blob);
566 if (!conn) {
567 reply_nterror(req, nt_status);
568 END_PROFILE(SMBtcon);
569 return;
572 reply_outbuf(req, 2, 0);
573 SSVAL(req->outbuf,smb_vwv0,max_recv);
574 SSVAL(req->outbuf,smb_vwv1,conn->cnum);
575 SSVAL(req->outbuf,smb_tid,conn->cnum);
577 DEBUG(3,("tcon service=%s cnum=%d\n",
578 service, conn->cnum));
580 END_PROFILE(SMBtcon);
581 return;
584 /****************************************************************************
585 Reply to a tcon and X.
586 conn POINTER CAN BE NULL HERE !
587 ****************************************************************************/
589 void reply_tcon_and_X(struct smb_request *req)
591 connection_struct *conn = req->conn;
592 char *service = NULL;
593 DATA_BLOB password;
594 TALLOC_CTX *ctx = talloc_tos();
595 /* what the cleint thinks the device is */
596 char *client_devicetype = NULL;
597 /* what the server tells the client the share represents */
598 const char *server_devicetype;
599 NTSTATUS nt_status;
600 int passlen;
601 char *path = NULL;
602 char *p, *q;
603 uint16 tcon_flags;
605 START_PROFILE(SMBtconX);
607 if (req->wct < 4) {
608 reply_nterror(req, NT_STATUS_INVALID_PARAMETER);
609 END_PROFILE(SMBtconX);
610 return;
613 passlen = SVAL(req->inbuf,smb_vwv3);
614 tcon_flags = SVAL(req->inbuf,smb_vwv2);
616 /* we might have to close an old one */
617 if ((tcon_flags & 0x1) && conn) {
618 close_cnum(conn,req->vuid);
619 req->conn = NULL;
620 conn = NULL;
623 if ((passlen > MAX_PASS_LEN) || (passlen >= smb_buflen(req->inbuf))) {
624 reply_doserror(req, ERRDOS, ERRbuftoosmall);
625 END_PROFILE(SMBtconX);
626 return;
629 if (global_encrypted_passwords_negotiated) {
630 password = data_blob_talloc(talloc_tos(), smb_buf(req->inbuf),
631 passlen);
632 if (lp_security() == SEC_SHARE) {
634 * Security = share always has a pad byte
635 * after the password.
637 p = smb_buf(req->inbuf) + passlen + 1;
638 } else {
639 p = smb_buf(req->inbuf) + passlen;
641 } else {
642 password = data_blob_talloc(talloc_tos(), smb_buf(req->inbuf),
643 passlen+1);
644 /* Ensure correct termination */
645 password.data[passlen]=0;
646 p = smb_buf(req->inbuf) + passlen + 1;
649 p += srvstr_pull_buf_talloc(ctx, req->inbuf, req->flags2, &path, p,
650 STR_TERMINATE);
652 if (path == NULL) {
653 data_blob_clear_free(&password);
654 reply_nterror(req, NT_STATUS_INVALID_PARAMETER);
655 END_PROFILE(SMBtconX);
656 return;
660 * the service name can be either: \\server\share
661 * or share directly like on the DELL PowerVault 705
663 if (*path=='\\') {
664 q = strchr_m(path+2,'\\');
665 if (!q) {
666 data_blob_clear_free(&password);
667 reply_doserror(req, ERRDOS, ERRnosuchshare);
668 END_PROFILE(SMBtconX);
669 return;
671 service = q+1;
672 } else {
673 service = path;
676 p += srvstr_pull_talloc(ctx, req->inbuf, req->flags2,
677 &client_devicetype, p,
678 MIN(6,smb_bufrem(req->inbuf, p)), STR_ASCII);
680 if (client_devicetype == NULL) {
681 data_blob_clear_free(&password);
682 reply_nterror(req, NT_STATUS_INVALID_PARAMETER);
683 END_PROFILE(SMBtconX);
684 return;
687 DEBUG(4,("Client requested device type [%s] for share [%s]\n", client_devicetype, service));
689 conn = make_connection(service, password, client_devicetype,
690 req->vuid, &nt_status);
691 req->conn =conn;
693 data_blob_clear_free(&password);
695 if (!conn) {
696 reply_nterror(req, nt_status);
697 END_PROFILE(SMBtconX);
698 return;
701 if ( IS_IPC(conn) )
702 server_devicetype = "IPC";
703 else if ( IS_PRINT(conn) )
704 server_devicetype = "LPT1:";
705 else
706 server_devicetype = "A:";
708 if (Protocol < PROTOCOL_NT1) {
709 reply_outbuf(req, 2, 0);
710 if (message_push_string(&req->outbuf, server_devicetype,
711 STR_TERMINATE|STR_ASCII) == -1) {
712 reply_nterror(req, NT_STATUS_NO_MEMORY);
713 END_PROFILE(SMBtconX);
714 return;
716 } else {
717 /* NT sets the fstype of IPC$ to the null string */
718 const char *fstype = IS_IPC(conn) ? "" : lp_fstype(SNUM(conn));
720 if (tcon_flags & TCONX_FLAG_EXTENDED_RESPONSE) {
721 /* Return permissions. */
722 uint32 perm1 = 0;
723 uint32 perm2 = 0;
725 reply_outbuf(req, 7, 0);
727 if (IS_IPC(conn)) {
728 perm1 = FILE_ALL_ACCESS;
729 perm2 = FILE_ALL_ACCESS;
730 } else {
731 perm1 = CAN_WRITE(conn) ?
732 SHARE_ALL_ACCESS :
733 SHARE_READ_ONLY;
736 SIVAL(req->outbuf, smb_vwv3, perm1);
737 SIVAL(req->outbuf, smb_vwv5, perm2);
738 } else {
739 reply_outbuf(req, 3, 0);
742 if ((message_push_string(&req->outbuf, server_devicetype,
743 STR_TERMINATE|STR_ASCII) == -1)
744 || (message_push_string(&req->outbuf, fstype,
745 STR_TERMINATE) == -1)) {
746 reply_nterror(req, NT_STATUS_NO_MEMORY);
747 END_PROFILE(SMBtconX);
748 return;
751 /* what does setting this bit do? It is set by NT4 and
752 may affect the ability to autorun mounted cdroms */
753 SSVAL(req->outbuf, smb_vwv2, SMB_SUPPORT_SEARCH_BITS|
754 (lp_csc_policy(SNUM(conn)) << 2));
756 init_dfsroot(conn, req->inbuf, req->outbuf);
760 DEBUG(3,("tconX service=%s \n",
761 service));
763 /* set the incoming and outgoing tid to the just created one */
764 SSVAL(req->inbuf,smb_tid,conn->cnum);
765 SSVAL(req->outbuf,smb_tid,conn->cnum);
767 END_PROFILE(SMBtconX);
769 chain_reply(req);
770 return;
773 /****************************************************************************
774 Reply to an unknown type.
775 ****************************************************************************/
777 void reply_unknown_new(struct smb_request *req, uint8 type)
779 DEBUG(0, ("unknown command type (%s): type=%d (0x%X)\n",
780 smb_fn_name(type), type, type));
781 reply_doserror(req, ERRSRV, ERRunknownsmb);
782 return;
785 /****************************************************************************
786 Reply to an ioctl.
787 conn POINTER CAN BE NULL HERE !
788 ****************************************************************************/
790 void reply_ioctl(struct smb_request *req)
792 connection_struct *conn = req->conn;
793 uint16 device;
794 uint16 function;
795 uint32 ioctl_code;
796 int replysize;
797 char *p;
799 START_PROFILE(SMBioctl);
801 if (req->wct < 3) {
802 reply_nterror(req, NT_STATUS_INVALID_PARAMETER);
803 END_PROFILE(SMBioctl);
804 return;
807 device = SVAL(req->inbuf,smb_vwv1);
808 function = SVAL(req->inbuf,smb_vwv2);
809 ioctl_code = (device << 16) + function;
811 DEBUG(4, ("Received IOCTL (code 0x%x)\n", ioctl_code));
813 switch (ioctl_code) {
814 case IOCTL_QUERY_JOB_INFO:
815 replysize = 32;
816 break;
817 default:
818 reply_doserror(req, ERRSRV, ERRnosupport);
819 END_PROFILE(SMBioctl);
820 return;
823 reply_outbuf(req, 8, replysize+1);
824 SSVAL(req->outbuf,smb_vwv1,replysize); /* Total data bytes returned */
825 SSVAL(req->outbuf,smb_vwv5,replysize); /* Data bytes this buffer */
826 SSVAL(req->outbuf,smb_vwv6,52); /* Offset to data */
827 p = smb_buf(req->outbuf);
828 memset(p, '\0', replysize+1); /* valgrind-safe. */
829 p += 1; /* Allow for alignment */
831 switch (ioctl_code) {
832 case IOCTL_QUERY_JOB_INFO:
834 files_struct *fsp = file_fsp(SVAL(req->inbuf,
835 smb_vwv0));
836 if (!fsp) {
837 reply_doserror(req, ERRDOS, ERRbadfid);
838 END_PROFILE(SMBioctl);
839 return;
841 SSVAL(p,0,fsp->rap_print_jobid); /* Job number */
842 srvstr_push((char *)req->outbuf, req->flags2, p+2,
843 global_myname(), 15,
844 STR_TERMINATE|STR_ASCII);
845 if (conn) {
846 srvstr_push((char *)req->outbuf, req->flags2,
847 p+18, lp_servicename(SNUM(conn)),
848 13, STR_TERMINATE|STR_ASCII);
849 } else {
850 memset(p+18, 0, 13);
852 break;
856 END_PROFILE(SMBioctl);
857 return;
860 /****************************************************************************
861 Strange checkpath NTSTATUS mapping.
862 ****************************************************************************/
864 static NTSTATUS map_checkpath_error(const char *inbuf, NTSTATUS status)
866 /* Strange DOS error code semantics only for checkpath... */
867 if (!(SVAL(inbuf,smb_flg2) & FLAGS2_32_BIT_ERROR_CODES)) {
868 if (NT_STATUS_EQUAL(NT_STATUS_OBJECT_NAME_INVALID,status)) {
869 /* We need to map to ERRbadpath */
870 return NT_STATUS_OBJECT_PATH_NOT_FOUND;
873 return status;
876 /****************************************************************************
877 Reply to a checkpath.
878 ****************************************************************************/
880 void reply_checkpath(struct smb_request *req)
882 connection_struct *conn = req->conn;
883 char *name = NULL;
884 SMB_STRUCT_STAT sbuf;
885 NTSTATUS status;
886 TALLOC_CTX *ctx = talloc_tos();
888 START_PROFILE(SMBcheckpath);
890 srvstr_get_path(ctx,(char *)req->inbuf, req->flags2, &name,
891 smb_buf(req->inbuf) + 1, 0,
892 STR_TERMINATE, &status);
893 if (!NT_STATUS_IS_OK(status)) {
894 status = map_checkpath_error((char *)req->inbuf, status);
895 reply_nterror(req, status);
896 END_PROFILE(SMBcheckpath);
897 return;
900 status = resolve_dfspath(ctx, conn,
901 req->flags2 & FLAGS2_DFS_PATHNAMES,
902 name,
903 &name);
904 if (!NT_STATUS_IS_OK(status)) {
905 if (NT_STATUS_EQUAL(status,NT_STATUS_PATH_NOT_COVERED)) {
906 reply_botherror(req, NT_STATUS_PATH_NOT_COVERED,
907 ERRSRV, ERRbadpath);
908 END_PROFILE(SMBcheckpath);
909 return;
911 goto path_err;
914 DEBUG(3,("reply_checkpath %s mode=%d\n", name, (int)SVAL(req->inbuf,smb_vwv0)));
916 status = unix_convert(ctx, conn, name, False, &name, NULL, &sbuf);
917 if (!NT_STATUS_IS_OK(status)) {
918 goto path_err;
921 status = check_name(conn, name);
922 if (!NT_STATUS_IS_OK(status)) {
923 DEBUG(3,("reply_checkpath: check_name of %s failed (%s)\n",name,nt_errstr(status)));
924 goto path_err;
927 if (!VALID_STAT(sbuf) && (SMB_VFS_STAT(conn,name,&sbuf) != 0)) {
928 DEBUG(3,("reply_checkpath: stat of %s failed (%s)\n",name,strerror(errno)));
929 status = map_nt_error_from_unix(errno);
930 goto path_err;
933 if (!S_ISDIR(sbuf.st_mode)) {
934 reply_botherror(req, NT_STATUS_NOT_A_DIRECTORY,
935 ERRDOS, ERRbadpath);
936 END_PROFILE(SMBcheckpath);
937 return;
940 reply_outbuf(req, 0, 0);
942 END_PROFILE(SMBcheckpath);
943 return;
945 path_err:
947 END_PROFILE(SMBcheckpath);
949 /* We special case this - as when a Windows machine
950 is parsing a path is steps through the components
951 one at a time - if a component fails it expects
952 ERRbadpath, not ERRbadfile.
954 status = map_checkpath_error((char *)req->inbuf, status);
955 if (NT_STATUS_EQUAL(status, NT_STATUS_OBJECT_NAME_NOT_FOUND)) {
957 * Windows returns different error codes if
958 * the parent directory is valid but not the
959 * last component - it returns NT_STATUS_OBJECT_NAME_NOT_FOUND
960 * for that case and NT_STATUS_OBJECT_PATH_NOT_FOUND
961 * if the path is invalid.
963 reply_botherror(req, NT_STATUS_OBJECT_NAME_NOT_FOUND,
964 ERRDOS, ERRbadpath);
965 return;
968 reply_nterror(req, status);
971 /****************************************************************************
972 Reply to a getatr.
973 ****************************************************************************/
975 void reply_getatr(struct smb_request *req)
977 connection_struct *conn = req->conn;
978 char *fname = NULL;
979 SMB_STRUCT_STAT sbuf;
980 int mode=0;
981 SMB_OFF_T size=0;
982 time_t mtime=0;
983 char *p;
984 NTSTATUS status;
985 TALLOC_CTX *ctx = talloc_tos();
987 START_PROFILE(SMBgetatr);
989 p = smb_buf(req->inbuf) + 1;
990 p += srvstr_get_path(ctx, (char *)req->inbuf, req->flags2, &fname, p,
991 0, STR_TERMINATE, &status);
992 if (!NT_STATUS_IS_OK(status)) {
993 reply_nterror(req, status);
994 END_PROFILE(SMBgetatr);
995 return;
998 status = resolve_dfspath(ctx, conn,
999 req->flags2 & FLAGS2_DFS_PATHNAMES,
1000 fname,
1001 &fname);
1002 if (!NT_STATUS_IS_OK(status)) {
1003 if (NT_STATUS_EQUAL(status,NT_STATUS_PATH_NOT_COVERED)) {
1004 reply_botherror(req, NT_STATUS_PATH_NOT_COVERED,
1005 ERRSRV, ERRbadpath);
1006 END_PROFILE(SMBgetatr);
1007 return;
1009 reply_nterror(req, status);
1010 END_PROFILE(SMBgetatr);
1011 return;
1014 /* dos smetimes asks for a stat of "" - it returns a "hidden directory"
1015 under WfWg - weird! */
1016 if (*fname == '\0') {
1017 mode = aHIDDEN | aDIR;
1018 if (!CAN_WRITE(conn)) {
1019 mode |= aRONLY;
1021 size = 0;
1022 mtime = 0;
1023 } else {
1024 status = unix_convert(ctx, conn, fname, False, &fname, NULL,&sbuf);
1025 if (!NT_STATUS_IS_OK(status)) {
1026 reply_nterror(req, status);
1027 END_PROFILE(SMBgetatr);
1028 return;
1030 status = check_name(conn, fname);
1031 if (!NT_STATUS_IS_OK(status)) {
1032 DEBUG(3,("reply_getatr: check_name of %s failed (%s)\n",fname,nt_errstr(status)));
1033 reply_nterror(req, status);
1034 END_PROFILE(SMBgetatr);
1035 return;
1037 if (!VALID_STAT(sbuf) && (SMB_VFS_STAT(conn,fname,&sbuf) != 0)) {
1038 DEBUG(3,("reply_getatr: stat of %s failed (%s)\n",fname,strerror(errno)));
1039 reply_unixerror(req, ERRDOS,ERRbadfile);
1040 END_PROFILE(SMBgetatr);
1041 return;
1044 mode = dos_mode(conn,fname,&sbuf);
1045 size = sbuf.st_size;
1046 mtime = sbuf.st_mtime;
1047 if (mode & aDIR) {
1048 size = 0;
1052 reply_outbuf(req, 10, 0);
1054 SSVAL(req->outbuf,smb_vwv0,mode);
1055 if(lp_dos_filetime_resolution(SNUM(conn)) ) {
1056 srv_put_dos_date3((char *)req->outbuf,smb_vwv1,mtime & ~1);
1057 } else {
1058 srv_put_dos_date3((char *)req->outbuf,smb_vwv1,mtime);
1060 SIVAL(req->outbuf,smb_vwv3,(uint32)size);
1062 if (Protocol >= PROTOCOL_NT1) {
1063 SSVAL(req->outbuf, smb_flg2,
1064 SVAL(req->outbuf, smb_flg2) | FLAGS2_IS_LONG_NAME);
1067 DEBUG(3,("reply_getatr: name=%s mode=%d size=%u\n", fname, mode, (unsigned int)size ) );
1069 END_PROFILE(SMBgetatr);
1070 return;
1073 /****************************************************************************
1074 Reply to a setatr.
1075 ****************************************************************************/
1077 void reply_setatr(struct smb_request *req)
1079 struct timespec ts[2];
1080 connection_struct *conn = req->conn;
1081 char *fname = NULL;
1082 int mode;
1083 time_t mtime;
1084 SMB_STRUCT_STAT sbuf;
1085 char *p;
1086 NTSTATUS status;
1087 TALLOC_CTX *ctx = talloc_tos();
1089 START_PROFILE(SMBsetatr);
1091 ZERO_STRUCT(ts);
1093 if (req->wct < 2) {
1094 reply_nterror(req, NT_STATUS_INVALID_PARAMETER);
1095 return;
1098 p = smb_buf(req->inbuf) + 1;
1099 p += srvstr_get_path(ctx, (char *)req->inbuf, req->flags2, &fname, p,
1100 0, STR_TERMINATE, &status);
1101 if (!NT_STATUS_IS_OK(status)) {
1102 reply_nterror(req, status);
1103 END_PROFILE(SMBsetatr);
1104 return;
1107 status = resolve_dfspath(ctx, conn,
1108 req->flags2 & FLAGS2_DFS_PATHNAMES,
1109 fname,
1110 &fname);
1111 if (!NT_STATUS_IS_OK(status)) {
1112 if (NT_STATUS_EQUAL(status,NT_STATUS_PATH_NOT_COVERED)) {
1113 reply_botherror(req, NT_STATUS_PATH_NOT_COVERED,
1114 ERRSRV, ERRbadpath);
1115 END_PROFILE(SMBsetatr);
1116 return;
1118 reply_nterror(req, status);
1119 END_PROFILE(SMBsetatr);
1120 return;
1123 status = unix_convert(ctx, conn, fname, False, &fname, NULL, &sbuf);
1124 if (!NT_STATUS_IS_OK(status)) {
1125 reply_nterror(req, status);
1126 END_PROFILE(SMBsetatr);
1127 return;
1130 status = check_name(conn, fname);
1131 if (!NT_STATUS_IS_OK(status)) {
1132 reply_nterror(req, status);
1133 END_PROFILE(SMBsetatr);
1134 return;
1137 if (fname[0] == '.' && fname[1] == '\0') {
1139 * Not sure here is the right place to catch this
1140 * condition. Might be moved to somewhere else later -- vl
1142 reply_nterror(req, NT_STATUS_ACCESS_DENIED);
1143 END_PROFILE(SMBsetatr);
1144 return;
1147 mode = SVAL(req->inbuf,smb_vwv0);
1148 mtime = srv_make_unix_date3(req->inbuf+smb_vwv1);
1150 ts[1] = convert_time_t_to_timespec(mtime);
1151 status = smb_set_file_time(conn, NULL, fname,
1152 &sbuf, ts, true);
1153 if (!NT_STATUS_IS_OK(status)) {
1154 reply_unixerror(req, ERRDOS, ERRnoaccess);
1155 END_PROFILE(SMBsetatr);
1156 return;
1159 if (mode != FILE_ATTRIBUTE_NORMAL) {
1160 if (VALID_STAT_OF_DIR(sbuf))
1161 mode |= aDIR;
1162 else
1163 mode &= ~aDIR;
1165 if (file_set_dosmode(conn,fname,mode,&sbuf,NULL,false) != 0) {
1166 reply_unixerror(req, ERRDOS, ERRnoaccess);
1167 END_PROFILE(SMBsetatr);
1168 return;
1172 reply_outbuf(req, 0, 0);
1174 DEBUG( 3, ( "setatr name=%s mode=%d\n", fname, mode ) );
1176 END_PROFILE(SMBsetatr);
1177 return;
1180 /****************************************************************************
1181 Reply to a dskattr.
1182 ****************************************************************************/
1184 void reply_dskattr(struct smb_request *req)
1186 connection_struct *conn = req->conn;
1187 SMB_BIG_UINT dfree,dsize,bsize;
1188 START_PROFILE(SMBdskattr);
1190 if (get_dfree_info(conn,".",True,&bsize,&dfree,&dsize) == (SMB_BIG_UINT)-1) {
1191 reply_unixerror(req, ERRHRD, ERRgeneral);
1192 END_PROFILE(SMBdskattr);
1193 return;
1196 reply_outbuf(req, 5, 0);
1198 if (Protocol <= PROTOCOL_LANMAN2) {
1199 double total_space, free_space;
1200 /* we need to scale this to a number that DOS6 can handle. We
1201 use floating point so we can handle large drives on systems
1202 that don't have 64 bit integers
1204 we end up displaying a maximum of 2G to DOS systems
1206 total_space = dsize * (double)bsize;
1207 free_space = dfree * (double)bsize;
1209 dsize = (SMB_BIG_UINT)((total_space+63*512) / (64*512));
1210 dfree = (SMB_BIG_UINT)((free_space+63*512) / (64*512));
1212 if (dsize > 0xFFFF) dsize = 0xFFFF;
1213 if (dfree > 0xFFFF) dfree = 0xFFFF;
1215 SSVAL(req->outbuf,smb_vwv0,dsize);
1216 SSVAL(req->outbuf,smb_vwv1,64); /* this must be 64 for dos systems */
1217 SSVAL(req->outbuf,smb_vwv2,512); /* and this must be 512 */
1218 SSVAL(req->outbuf,smb_vwv3,dfree);
1219 } else {
1220 SSVAL(req->outbuf,smb_vwv0,dsize);
1221 SSVAL(req->outbuf,smb_vwv1,bsize/512);
1222 SSVAL(req->outbuf,smb_vwv2,512);
1223 SSVAL(req->outbuf,smb_vwv3,dfree);
1226 DEBUG(3,("dskattr dfree=%d\n", (unsigned int)dfree));
1228 END_PROFILE(SMBdskattr);
1229 return;
1232 /****************************************************************************
1233 Reply to a search.
1234 Can be called from SMBsearch, SMBffirst or SMBfunique.
1235 ****************************************************************************/
1237 void reply_search(struct smb_request *req)
1239 connection_struct *conn = req->conn;
1240 char *mask = NULL;
1241 char *directory = NULL;
1242 char *fname = NULL;
1243 SMB_OFF_T size;
1244 uint32 mode;
1245 time_t date;
1246 uint32 dirtype;
1247 unsigned int numentries = 0;
1248 unsigned int maxentries = 0;
1249 bool finished = False;
1250 char *p;
1251 int status_len;
1252 char *path = NULL;
1253 char status[21];
1254 int dptr_num= -1;
1255 bool check_descend = False;
1256 bool expect_close = False;
1257 NTSTATUS nt_status;
1258 bool mask_contains_wcard = False;
1259 bool allow_long_path_components = (req->flags2 & FLAGS2_LONG_PATH_COMPONENTS) ? True : False;
1260 TALLOC_CTX *ctx = talloc_tos();
1261 bool ask_sharemode = lp_parm_bool(SNUM(conn), "smbd", "search ask sharemode", true);
1263 START_PROFILE(SMBsearch);
1265 if (req->wct < 2) {
1266 reply_nterror(req, NT_STATUS_INVALID_PARAMETER);
1267 END_PROFILE(SMBsearch);
1268 return;
1271 if (lp_posix_pathnames()) {
1272 reply_unknown_new(req, CVAL(req->inbuf, smb_com));
1273 END_PROFILE(SMBsearch);
1274 return;
1277 /* If we were called as SMBffirst then we must expect close. */
1278 if(CVAL(req->inbuf,smb_com) == SMBffirst) {
1279 expect_close = True;
1282 reply_outbuf(req, 1, 3);
1283 maxentries = SVAL(req->inbuf,smb_vwv0);
1284 dirtype = SVAL(req->inbuf,smb_vwv1);
1285 p = smb_buf(req->inbuf) + 1;
1286 p += srvstr_get_path_wcard(ctx,
1287 (char *)req->inbuf,
1288 req->flags2,
1289 &path,
1292 STR_TERMINATE,
1293 &nt_status,
1294 &mask_contains_wcard);
1295 if (!NT_STATUS_IS_OK(nt_status)) {
1296 reply_nterror(req, nt_status);
1297 END_PROFILE(SMBsearch);
1298 return;
1301 nt_status = resolve_dfspath_wcard(ctx, conn,
1302 req->flags2 & FLAGS2_DFS_PATHNAMES,
1303 path,
1304 &path,
1305 &mask_contains_wcard);
1306 if (!NT_STATUS_IS_OK(nt_status)) {
1307 if (NT_STATUS_EQUAL(nt_status,NT_STATUS_PATH_NOT_COVERED)) {
1308 reply_botherror(req, NT_STATUS_PATH_NOT_COVERED,
1309 ERRSRV, ERRbadpath);
1310 END_PROFILE(SMBsearch);
1311 return;
1313 reply_nterror(req, nt_status);
1314 END_PROFILE(SMBsearch);
1315 return;
1318 p++;
1319 status_len = SVAL(p, 0);
1320 p += 2;
1322 /* dirtype &= ~aDIR; */
1324 if (status_len == 0) {
1325 SMB_STRUCT_STAT sbuf;
1327 nt_status = unix_convert(ctx, conn, path, True,
1328 &directory, NULL, &sbuf);
1329 if (!NT_STATUS_IS_OK(nt_status)) {
1330 reply_nterror(req, nt_status);
1331 END_PROFILE(SMBsearch);
1332 return;
1335 nt_status = check_name(conn, directory);
1336 if (!NT_STATUS_IS_OK(nt_status)) {
1337 reply_nterror(req, nt_status);
1338 END_PROFILE(SMBsearch);
1339 return;
1342 p = strrchr_m(directory,'/');
1343 if (!p) {
1344 mask = directory;
1345 directory = talloc_strdup(ctx,".");
1346 if (!directory) {
1347 reply_nterror(req, NT_STATUS_NO_MEMORY);
1348 END_PROFILE(SMBsearch);
1349 return;
1351 } else {
1352 *p = 0;
1353 mask = p+1;
1356 if (*directory == '\0') {
1357 directory = talloc_strdup(ctx,".");
1358 if (!directory) {
1359 reply_nterror(req, NT_STATUS_NO_MEMORY);
1360 END_PROFILE(SMBsearch);
1361 return;
1364 memset((char *)status,'\0',21);
1365 SCVAL(status,0,(dirtype & 0x1F));
1367 nt_status = dptr_create(conn,
1368 directory,
1369 True,
1370 expect_close,
1371 req->smbpid,
1372 mask,
1373 mask_contains_wcard,
1374 dirtype,
1375 &conn->dirptr);
1376 if (!NT_STATUS_IS_OK(nt_status)) {
1377 reply_nterror(req, nt_status);
1378 END_PROFILE(SMBsearch);
1379 return;
1381 dptr_num = dptr_dnum(conn->dirptr);
1382 } else {
1383 int status_dirtype;
1385 memcpy(status,p,21);
1386 status_dirtype = CVAL(status,0) & 0x1F;
1387 if (status_dirtype != (dirtype & 0x1F)) {
1388 dirtype = status_dirtype;
1391 conn->dirptr = dptr_fetch(status+12,&dptr_num);
1392 if (!conn->dirptr) {
1393 goto SearchEmpty;
1395 string_set(&conn->dirpath,dptr_path(dptr_num));
1396 mask = dptr_wcard(dptr_num);
1397 if (!mask) {
1398 goto SearchEmpty;
1401 * For a 'continue' search we have no string. So
1402 * check from the initial saved string.
1404 mask_contains_wcard = ms_has_wild(mask);
1405 dirtype = dptr_attr(dptr_num);
1408 DEBUG(4,("dptr_num is %d\n",dptr_num));
1410 if ((dirtype&0x1F) == aVOLID) {
1411 char buf[DIR_STRUCT_SIZE];
1412 memcpy(buf,status,21);
1413 if (!make_dir_struct(ctx,buf,"???????????",volume_label(SNUM(conn)),
1414 0,aVOLID,0,!allow_long_path_components)) {
1415 reply_nterror(req, NT_STATUS_NO_MEMORY);
1416 END_PROFILE(SMBsearch);
1417 return;
1419 dptr_fill(buf+12,dptr_num);
1420 if (dptr_zero(buf+12) && (status_len==0)) {
1421 numentries = 1;
1422 } else {
1423 numentries = 0;
1425 if (message_push_blob(&req->outbuf,
1426 data_blob_const(buf, sizeof(buf)))
1427 == -1) {
1428 reply_nterror(req, NT_STATUS_NO_MEMORY);
1429 END_PROFILE(SMBsearch);
1430 return;
1432 } else {
1433 unsigned int i;
1434 maxentries = MIN(
1435 maxentries,
1436 ((BUFFER_SIZE -
1437 ((uint8 *)smb_buf(req->outbuf) + 3 - req->outbuf))
1438 /DIR_STRUCT_SIZE));
1440 DEBUG(8,("dirpath=<%s> dontdescend=<%s>\n",
1441 conn->dirpath,lp_dontdescend(SNUM(conn))));
1442 if (in_list(conn->dirpath, lp_dontdescend(SNUM(conn)),True)) {
1443 check_descend = True;
1446 for (i=numentries;(i<maxentries) && !finished;i++) {
1447 finished = !get_dir_entry(ctx,
1448 conn,
1449 mask,
1450 dirtype,
1451 &fname,
1452 &size,
1453 &mode,
1454 &date,
1455 check_descend,
1456 ask_sharemode);
1457 if (!finished) {
1458 char buf[DIR_STRUCT_SIZE];
1459 memcpy(buf,status,21);
1460 if (!make_dir_struct(ctx,
1461 buf,
1462 mask,
1463 fname,
1464 size,
1465 mode,
1466 date,
1467 !allow_long_path_components)) {
1468 reply_nterror(req, NT_STATUS_NO_MEMORY);
1469 END_PROFILE(SMBsearch);
1470 return;
1472 if (!dptr_fill(buf+12,dptr_num)) {
1473 break;
1475 if (message_push_blob(&req->outbuf,
1476 data_blob_const(buf, sizeof(buf)))
1477 == -1) {
1478 reply_nterror(req, NT_STATUS_NO_MEMORY);
1479 END_PROFILE(SMBsearch);
1480 return;
1482 numentries++;
1487 SearchEmpty:
1489 /* If we were called as SMBffirst with smb_search_id == NULL
1490 and no entries were found then return error and close dirptr
1491 (X/Open spec) */
1493 if (numentries == 0) {
1494 dptr_close(&dptr_num);
1495 } else if(expect_close && status_len == 0) {
1496 /* Close the dptr - we know it's gone */
1497 dptr_close(&dptr_num);
1500 /* If we were called as SMBfunique, then we can close the dirptr now ! */
1501 if(dptr_num >= 0 && CVAL(req->inbuf,smb_com) == SMBfunique) {
1502 dptr_close(&dptr_num);
1505 if ((numentries == 0) && !mask_contains_wcard) {
1506 reply_botherror(req, STATUS_NO_MORE_FILES, ERRDOS, ERRnofiles);
1507 END_PROFILE(SMBsearch);
1508 return;
1511 SSVAL(req->outbuf,smb_vwv0,numentries);
1512 SSVAL(req->outbuf,smb_vwv1,3 + numentries * DIR_STRUCT_SIZE);
1513 SCVAL(smb_buf(req->outbuf),0,5);
1514 SSVAL(smb_buf(req->outbuf),1,numentries*DIR_STRUCT_SIZE);
1516 /* The replies here are never long name. */
1517 SSVAL(req->outbuf, smb_flg2,
1518 SVAL(req->outbuf, smb_flg2) & (~FLAGS2_IS_LONG_NAME));
1519 if (!allow_long_path_components) {
1520 SSVAL(req->outbuf, smb_flg2,
1521 SVAL(req->outbuf, smb_flg2)
1522 & (~FLAGS2_LONG_PATH_COMPONENTS));
1525 /* This SMB *always* returns ASCII names. Remove the unicode bit in flags2. */
1526 SSVAL(req->outbuf, smb_flg2,
1527 (SVAL(req->outbuf, smb_flg2) & (~FLAGS2_UNICODE_STRINGS)));
1529 if (!directory) {
1530 directory = dptr_path(dptr_num);
1533 DEBUG(4,("%s mask=%s path=%s dtype=%d nument=%u of %u\n",
1534 smb_fn_name(CVAL(req->inbuf,smb_com)),
1535 mask,
1536 directory ? directory : "./",
1537 dirtype,
1538 numentries,
1539 maxentries ));
1541 END_PROFILE(SMBsearch);
1542 return;
1545 /****************************************************************************
1546 Reply to a fclose (stop directory search).
1547 ****************************************************************************/
1549 void reply_fclose(struct smb_request *req)
1551 int status_len;
1552 char status[21];
1553 int dptr_num= -2;
1554 char *p;
1555 char *path = NULL;
1556 NTSTATUS err;
1557 bool path_contains_wcard = False;
1558 TALLOC_CTX *ctx = talloc_tos();
1560 START_PROFILE(SMBfclose);
1562 if (lp_posix_pathnames()) {
1563 reply_unknown_new(req, CVAL(req->inbuf, smb_com));
1564 END_PROFILE(SMBfclose);
1565 return;
1568 p = smb_buf(req->inbuf) + 1;
1569 p += srvstr_get_path_wcard(ctx,
1570 (char *)req->inbuf,
1571 req->flags2,
1572 &path,
1575 STR_TERMINATE,
1576 &err,
1577 &path_contains_wcard);
1578 if (!NT_STATUS_IS_OK(err)) {
1579 reply_nterror(req, err);
1580 END_PROFILE(SMBfclose);
1581 return;
1583 p++;
1584 status_len = SVAL(p,0);
1585 p += 2;
1587 if (status_len == 0) {
1588 reply_doserror(req, ERRSRV, ERRsrverror);
1589 END_PROFILE(SMBfclose);
1590 return;
1593 memcpy(status,p,21);
1595 if(dptr_fetch(status+12,&dptr_num)) {
1596 /* Close the dptr - we know it's gone */
1597 dptr_close(&dptr_num);
1600 reply_outbuf(req, 1, 0);
1601 SSVAL(req->outbuf,smb_vwv0,0);
1603 DEBUG(3,("search close\n"));
1605 END_PROFILE(SMBfclose);
1606 return;
1609 /****************************************************************************
1610 Reply to an open.
1611 ****************************************************************************/
1613 void reply_open(struct smb_request *req)
1615 connection_struct *conn = req->conn;
1616 char *fname = NULL;
1617 uint32 fattr=0;
1618 SMB_OFF_T size = 0;
1619 time_t mtime=0;
1620 int info;
1621 SMB_STRUCT_STAT sbuf;
1622 files_struct *fsp;
1623 int oplock_request;
1624 int deny_mode;
1625 uint32 dos_attr;
1626 uint32 access_mask;
1627 uint32 share_mode;
1628 uint32 create_disposition;
1629 uint32 create_options = 0;
1630 NTSTATUS status;
1631 TALLOC_CTX *ctx = talloc_tos();
1633 START_PROFILE(SMBopen);
1635 if (req->wct < 2) {
1636 reply_nterror(req, NT_STATUS_INVALID_PARAMETER);
1637 END_PROFILE(SMBopen);
1638 return;
1641 oplock_request = CORE_OPLOCK_REQUEST(req->inbuf);
1642 deny_mode = SVAL(req->inbuf,smb_vwv0);
1643 dos_attr = SVAL(req->inbuf,smb_vwv1);
1645 srvstr_get_path(ctx, (char *)req->inbuf, req->flags2, &fname,
1646 smb_buf(req->inbuf)+1, 0,
1647 STR_TERMINATE, &status);
1648 if (!NT_STATUS_IS_OK(status)) {
1649 reply_nterror(req, status);
1650 END_PROFILE(SMBopen);
1651 return;
1654 if (!map_open_params_to_ntcreate(
1655 fname, deny_mode, OPENX_FILE_EXISTS_OPEN, &access_mask,
1656 &share_mode, &create_disposition, &create_options)) {
1657 reply_nterror(req, NT_STATUS_DOS(ERRDOS, ERRbadaccess));
1658 END_PROFILE(SMBopen);
1659 return;
1662 status = create_file(conn, /* conn */
1663 req, /* req */
1664 0, /* root_dir_fid */
1665 fname, /* fname */
1666 access_mask, /* access_mask */
1667 share_mode, /* share_access */
1668 create_disposition, /* create_disposition*/
1669 create_options, /* create_options */
1670 dos_attr, /* file_attributes */
1671 oplock_request, /* oplock_request */
1672 0, /* allocation_size */
1673 NULL, /* sd */
1674 NULL, /* ea_list */
1675 &fsp, /* result */
1676 &info, /* pinfo */
1677 &sbuf); /* psbuf */
1679 if (!NT_STATUS_IS_OK(status)) {
1680 if (open_was_deferred(req->mid)) {
1681 /* We have re-scheduled this call. */
1682 END_PROFILE(SMBopen);
1683 return;
1685 reply_openerror(req, status);
1686 END_PROFILE(SMBopen);
1687 return;
1690 size = sbuf.st_size;
1691 fattr = dos_mode(conn,fsp->fsp_name,&sbuf);
1692 mtime = sbuf.st_mtime;
1694 if (fattr & aDIR) {
1695 DEBUG(3,("attempt to open a directory %s\n",fsp->fsp_name));
1696 close_file(fsp,ERROR_CLOSE);
1697 reply_doserror(req, ERRDOS,ERRnoaccess);
1698 END_PROFILE(SMBopen);
1699 return;
1702 reply_outbuf(req, 7, 0);
1703 SSVAL(req->outbuf,smb_vwv0,fsp->fnum);
1704 SSVAL(req->outbuf,smb_vwv1,fattr);
1705 if(lp_dos_filetime_resolution(SNUM(conn)) ) {
1706 srv_put_dos_date3((char *)req->outbuf,smb_vwv2,mtime & ~1);
1707 } else {
1708 srv_put_dos_date3((char *)req->outbuf,smb_vwv2,mtime);
1710 SIVAL(req->outbuf,smb_vwv4,(uint32)size);
1711 SSVAL(req->outbuf,smb_vwv6,deny_mode);
1713 if (oplock_request && lp_fake_oplocks(SNUM(conn))) {
1714 SCVAL(req->outbuf,smb_flg,
1715 CVAL(req->outbuf,smb_flg)|CORE_OPLOCK_GRANTED);
1718 if(EXCLUSIVE_OPLOCK_TYPE(fsp->oplock_type)) {
1719 SCVAL(req->outbuf,smb_flg,
1720 CVAL(req->outbuf,smb_flg)|CORE_OPLOCK_GRANTED);
1722 END_PROFILE(SMBopen);
1723 return;
1726 /****************************************************************************
1727 Reply to an open and X.
1728 ****************************************************************************/
1730 void reply_open_and_X(struct smb_request *req)
1732 connection_struct *conn = req->conn;
1733 char *fname = NULL;
1734 uint16 open_flags;
1735 int deny_mode;
1736 uint32 smb_attr;
1737 /* Breakout the oplock request bits so we can set the
1738 reply bits separately. */
1739 int ex_oplock_request;
1740 int core_oplock_request;
1741 int oplock_request;
1742 #if 0
1743 int smb_sattr = SVAL(req->inbuf,smb_vwv4);
1744 uint32 smb_time = make_unix_date3(req->inbuf+smb_vwv6);
1745 #endif
1746 int smb_ofun;
1747 uint32 fattr=0;
1748 int mtime=0;
1749 SMB_STRUCT_STAT sbuf;
1750 int smb_action = 0;
1751 files_struct *fsp;
1752 NTSTATUS status;
1753 SMB_BIG_UINT allocation_size;
1754 ssize_t retval = -1;
1755 uint32 access_mask;
1756 uint32 share_mode;
1757 uint32 create_disposition;
1758 uint32 create_options = 0;
1759 TALLOC_CTX *ctx = talloc_tos();
1761 START_PROFILE(SMBopenX);
1763 if (req->wct < 15) {
1764 reply_nterror(req, NT_STATUS_INVALID_PARAMETER);
1765 END_PROFILE(SMBopenX);
1766 return;
1769 open_flags = SVAL(req->inbuf,smb_vwv2);
1770 deny_mode = SVAL(req->inbuf,smb_vwv3);
1771 smb_attr = SVAL(req->inbuf,smb_vwv5);
1772 ex_oplock_request = EXTENDED_OPLOCK_REQUEST(req->inbuf);
1773 core_oplock_request = CORE_OPLOCK_REQUEST(req->inbuf);
1774 oplock_request = ex_oplock_request | core_oplock_request;
1775 smb_ofun = SVAL(req->inbuf,smb_vwv8);
1776 allocation_size = (SMB_BIG_UINT)IVAL(req->inbuf,smb_vwv9);
1778 /* If it's an IPC, pass off the pipe handler. */
1779 if (IS_IPC(conn)) {
1780 if (lp_nt_pipe_support()) {
1781 reply_open_pipe_and_X(conn, req);
1782 } else {
1783 reply_doserror(req, ERRSRV, ERRaccess);
1785 END_PROFILE(SMBopenX);
1786 return;
1789 /* XXXX we need to handle passed times, sattr and flags */
1790 srvstr_get_path(ctx, (char *)req->inbuf, req->flags2, &fname,
1791 smb_buf(req->inbuf), 0, STR_TERMINATE,
1792 &status);
1793 if (!NT_STATUS_IS_OK(status)) {
1794 reply_nterror(req, status);
1795 END_PROFILE(SMBopenX);
1796 return;
1799 if (!map_open_params_to_ntcreate(
1800 fname, deny_mode, smb_ofun, &access_mask,
1801 &share_mode, &create_disposition, &create_options)) {
1802 reply_nterror(req, NT_STATUS_DOS(ERRDOS, ERRbadaccess));
1803 END_PROFILE(SMBopenX);
1804 return;
1807 status = create_file(conn, /* conn */
1808 req, /* req */
1809 0, /* root_dir_fid */
1810 fname, /* fname */
1811 access_mask, /* access_mask */
1812 share_mode, /* share_access */
1813 create_disposition, /* create_disposition*/
1814 create_options, /* create_options */
1815 smb_attr, /* file_attributes */
1816 oplock_request, /* oplock_request */
1817 0, /* allocation_size */
1818 NULL, /* sd */
1819 NULL, /* ea_list */
1820 &fsp, /* result */
1821 &smb_action, /* pinfo */
1822 &sbuf); /* psbuf */
1824 if (!NT_STATUS_IS_OK(status)) {
1825 END_PROFILE(SMBopenX);
1826 if (open_was_deferred(req->mid)) {
1827 /* We have re-scheduled this call. */
1828 return;
1830 reply_openerror(req, status);
1831 return;
1834 /* Setting the "size" field in vwv9 and vwv10 causes the file to be set to this size,
1835 if the file is truncated or created. */
1836 if (((smb_action == FILE_WAS_CREATED) || (smb_action == FILE_WAS_OVERWRITTEN)) && allocation_size) {
1837 fsp->initial_allocation_size = smb_roundup(fsp->conn, allocation_size);
1838 if (vfs_allocate_file_space(fsp, fsp->initial_allocation_size) == -1) {
1839 close_file(fsp,ERROR_CLOSE);
1840 reply_nterror(req, NT_STATUS_DISK_FULL);
1841 END_PROFILE(SMBopenX);
1842 return;
1844 retval = vfs_set_filelen(fsp, (SMB_OFF_T)allocation_size);
1845 if (retval < 0) {
1846 close_file(fsp,ERROR_CLOSE);
1847 reply_nterror(req, NT_STATUS_DISK_FULL);
1848 END_PROFILE(SMBopenX);
1849 return;
1851 sbuf.st_size = get_allocation_size(conn,fsp,&sbuf);
1854 fattr = dos_mode(conn,fsp->fsp_name,&sbuf);
1855 mtime = sbuf.st_mtime;
1856 if (fattr & aDIR) {
1857 close_file(fsp,ERROR_CLOSE);
1858 reply_doserror(req, ERRDOS, ERRnoaccess);
1859 END_PROFILE(SMBopenX);
1860 return;
1863 /* If the caller set the extended oplock request bit
1864 and we granted one (by whatever means) - set the
1865 correct bit for extended oplock reply.
1868 if (ex_oplock_request && lp_fake_oplocks(SNUM(conn))) {
1869 smb_action |= EXTENDED_OPLOCK_GRANTED;
1872 if(ex_oplock_request && EXCLUSIVE_OPLOCK_TYPE(fsp->oplock_type)) {
1873 smb_action |= EXTENDED_OPLOCK_GRANTED;
1876 /* If the caller set the core oplock request bit
1877 and we granted one (by whatever means) - set the
1878 correct bit for core oplock reply.
1881 if (open_flags & EXTENDED_RESPONSE_REQUIRED) {
1882 reply_outbuf(req, 19, 0);
1883 } else {
1884 reply_outbuf(req, 15, 0);
1887 if (core_oplock_request && lp_fake_oplocks(SNUM(conn))) {
1888 SCVAL(req->outbuf, smb_flg,
1889 CVAL(req->outbuf,smb_flg)|CORE_OPLOCK_GRANTED);
1892 if(core_oplock_request && EXCLUSIVE_OPLOCK_TYPE(fsp->oplock_type)) {
1893 SCVAL(req->outbuf, smb_flg,
1894 CVAL(req->outbuf,smb_flg)|CORE_OPLOCK_GRANTED);
1897 SSVAL(req->outbuf,smb_vwv2,fsp->fnum);
1898 SSVAL(req->outbuf,smb_vwv3,fattr);
1899 if(lp_dos_filetime_resolution(SNUM(conn)) ) {
1900 srv_put_dos_date3((char *)req->outbuf,smb_vwv4,mtime & ~1);
1901 } else {
1902 srv_put_dos_date3((char *)req->outbuf,smb_vwv4,mtime);
1904 SIVAL(req->outbuf,smb_vwv6,(uint32)sbuf.st_size);
1905 SSVAL(req->outbuf,smb_vwv8,GET_OPENX_MODE(deny_mode));
1906 SSVAL(req->outbuf,smb_vwv11,smb_action);
1908 if (open_flags & EXTENDED_RESPONSE_REQUIRED) {
1909 SIVAL(req->outbuf, smb_vwv15, STD_RIGHT_ALL_ACCESS);
1912 END_PROFILE(SMBopenX);
1913 chain_reply(req);
1914 return;
1917 /****************************************************************************
1918 Reply to a SMBulogoffX.
1919 ****************************************************************************/
1921 void reply_ulogoffX(struct smb_request *req)
1923 user_struct *vuser;
1925 START_PROFILE(SMBulogoffX);
1927 vuser = get_valid_user_struct(req->vuid);
1929 if(vuser == NULL) {
1930 DEBUG(3,("ulogoff, vuser id %d does not map to user.\n",
1931 req->vuid));
1934 /* in user level security we are supposed to close any files
1935 open by this user */
1936 if ((vuser != NULL) && (lp_security() != SEC_SHARE)) {
1937 file_close_user(req->vuid);
1940 invalidate_vuid(req->vuid);
1942 reply_outbuf(req, 2, 0);
1944 DEBUG( 3, ( "ulogoffX vuid=%d\n", req->vuid ) );
1946 END_PROFILE(SMBulogoffX);
1947 chain_reply(req);
1950 /****************************************************************************
1951 Reply to a mknew or a create.
1952 ****************************************************************************/
1954 void reply_mknew(struct smb_request *req)
1956 connection_struct *conn = req->conn;
1957 char *fname = NULL;
1958 int com;
1959 uint32 fattr = 0;
1960 struct timespec ts[2];
1961 files_struct *fsp;
1962 int oplock_request = 0;
1963 SMB_STRUCT_STAT sbuf;
1964 NTSTATUS status;
1965 uint32 access_mask = FILE_GENERIC_READ | FILE_GENERIC_WRITE;
1966 uint32 share_mode = FILE_SHARE_READ|FILE_SHARE_WRITE;
1967 uint32 create_disposition;
1968 uint32 create_options = 0;
1969 TALLOC_CTX *ctx = talloc_tos();
1971 START_PROFILE(SMBcreate);
1973 if (req->wct < 3) {
1974 reply_nterror(req, NT_STATUS_INVALID_PARAMETER);
1975 END_PROFILE(SMBcreate);
1976 return;
1979 fattr = SVAL(req->inbuf,smb_vwv0);
1980 oplock_request = CORE_OPLOCK_REQUEST(req->inbuf);
1981 com = SVAL(req->inbuf,smb_com);
1983 ts[1] =convert_time_t_to_timespec(
1984 srv_make_unix_date3(req->inbuf + smb_vwv1));
1985 /* mtime. */
1987 srvstr_get_path(ctx, (char *)req->inbuf, req->flags2, &fname,
1988 smb_buf(req->inbuf) + 1, 0,
1989 STR_TERMINATE, &status);
1990 if (!NT_STATUS_IS_OK(status)) {
1991 reply_nterror(req, status);
1992 END_PROFILE(SMBcreate);
1993 return;
1996 if (fattr & aVOLID) {
1997 DEBUG(0,("Attempt to create file (%s) with volid set - "
1998 "please report this\n", fname));
2001 if(com == SMBmknew) {
2002 /* We should fail if file exists. */
2003 create_disposition = FILE_CREATE;
2004 } else {
2005 /* Create if file doesn't exist, truncate if it does. */
2006 create_disposition = FILE_OVERWRITE_IF;
2009 status = create_file(conn, /* conn */
2010 req, /* req */
2011 0, /* root_dir_fid */
2012 fname, /* fname */
2013 access_mask, /* access_mask */
2014 share_mode, /* share_access */
2015 create_disposition, /* create_disposition*/
2016 create_options, /* create_options */
2017 fattr, /* file_attributes */
2018 oplock_request, /* oplock_request */
2019 0, /* allocation_size */
2020 NULL, /* sd */
2021 NULL, /* ea_list */
2022 &fsp, /* result */
2023 NULL, /* pinfo */
2024 &sbuf); /* psbuf */
2026 if (!NT_STATUS_IS_OK(status)) {
2027 END_PROFILE(SMBcreate);
2028 if (open_was_deferred(req->mid)) {
2029 /* We have re-scheduled this call. */
2030 return;
2032 reply_openerror(req, status);
2033 return;
2036 ts[0] = get_atimespec(&sbuf); /* atime. */
2037 status = smb_set_file_time(conn, fsp, fsp->fsp_name, &sbuf, ts, true);
2038 if (!NT_STATUS_IS_OK(status)) {
2039 END_PROFILE(SMBcreate);
2040 reply_openerror(req, status);
2041 return;
2044 reply_outbuf(req, 1, 0);
2045 SSVAL(req->outbuf,smb_vwv0,fsp->fnum);
2047 if (oplock_request && lp_fake_oplocks(SNUM(conn))) {
2048 SCVAL(req->outbuf,smb_flg,
2049 CVAL(req->outbuf,smb_flg)|CORE_OPLOCK_GRANTED);
2052 if(EXCLUSIVE_OPLOCK_TYPE(fsp->oplock_type)) {
2053 SCVAL(req->outbuf,smb_flg,
2054 CVAL(req->outbuf,smb_flg)|CORE_OPLOCK_GRANTED);
2057 DEBUG( 2, ( "reply_mknew: file %s\n", fsp->fsp_name ) );
2058 DEBUG( 3, ( "reply_mknew %s fd=%d dmode=0x%x\n",
2059 fsp->fsp_name, fsp->fh->fd, (unsigned int)fattr ) );
2061 END_PROFILE(SMBcreate);
2062 return;
2065 /****************************************************************************
2066 Reply to a create temporary file.
2067 ****************************************************************************/
2069 void reply_ctemp(struct smb_request *req)
2071 connection_struct *conn = req->conn;
2072 char *fname = NULL;
2073 uint32 fattr;
2074 files_struct *fsp;
2075 int oplock_request;
2076 int tmpfd;
2077 SMB_STRUCT_STAT sbuf;
2078 char *s;
2079 NTSTATUS status;
2080 TALLOC_CTX *ctx = talloc_tos();
2082 START_PROFILE(SMBctemp);
2084 if (req->wct < 3) {
2085 reply_nterror(req, NT_STATUS_INVALID_PARAMETER);
2086 END_PROFILE(SMBctemp);
2087 return;
2090 fattr = SVAL(req->inbuf,smb_vwv0);
2091 oplock_request = CORE_OPLOCK_REQUEST(req->inbuf);
2093 srvstr_get_path(ctx, (char *)req->inbuf, req->flags2, &fname,
2094 smb_buf(req->inbuf)+1, 0, STR_TERMINATE,
2095 &status);
2096 if (!NT_STATUS_IS_OK(status)) {
2097 reply_nterror(req, status);
2098 END_PROFILE(SMBctemp);
2099 return;
2101 if (*fname) {
2102 fname = talloc_asprintf(ctx,
2103 "%s/TMXXXXXX",
2104 fname);
2105 } else {
2106 fname = talloc_strdup(ctx, "TMXXXXXX");
2109 if (!fname) {
2110 reply_nterror(req, NT_STATUS_NO_MEMORY);
2111 END_PROFILE(SMBctemp);
2112 return;
2115 status = resolve_dfspath(ctx, conn,
2116 req->flags2 & FLAGS2_DFS_PATHNAMES,
2117 fname,
2118 &fname);
2119 if (!NT_STATUS_IS_OK(status)) {
2120 if (NT_STATUS_EQUAL(status,NT_STATUS_PATH_NOT_COVERED)) {
2121 reply_botherror(req, NT_STATUS_PATH_NOT_COVERED,
2122 ERRSRV, ERRbadpath);
2123 END_PROFILE(SMBctemp);
2124 return;
2126 reply_nterror(req, status);
2127 END_PROFILE(SMBctemp);
2128 return;
2131 status = unix_convert(ctx, conn, fname, False, &fname, NULL, &sbuf);
2132 if (!NT_STATUS_IS_OK(status)) {
2133 reply_nterror(req, status);
2134 END_PROFILE(SMBctemp);
2135 return;
2138 status = check_name(conn, CONST_DISCARD(char *,fname));
2139 if (!NT_STATUS_IS_OK(status)) {
2140 reply_nterror(req, status);
2141 END_PROFILE(SMBctemp);
2142 return;
2145 tmpfd = smb_mkstemp(fname);
2146 if (tmpfd == -1) {
2147 reply_unixerror(req, ERRDOS, ERRnoaccess);
2148 END_PROFILE(SMBctemp);
2149 return;
2152 SMB_VFS_STAT(conn,fname,&sbuf);
2154 /* We should fail if file does not exist. */
2155 status = open_file_ntcreate(conn, req, fname, &sbuf,
2156 FILE_GENERIC_READ | FILE_GENERIC_WRITE,
2157 FILE_SHARE_READ|FILE_SHARE_WRITE,
2158 FILE_OPEN,
2160 fattr,
2161 oplock_request,
2162 NULL, &fsp);
2164 /* close fd from smb_mkstemp() */
2165 close(tmpfd);
2167 if (!NT_STATUS_IS_OK(status)) {
2168 if (open_was_deferred(req->mid)) {
2169 /* We have re-scheduled this call. */
2170 END_PROFILE(SMBctemp);
2171 return;
2173 reply_openerror(req, status);
2174 END_PROFILE(SMBctemp);
2175 return;
2178 reply_outbuf(req, 1, 0);
2179 SSVAL(req->outbuf,smb_vwv0,fsp->fnum);
2181 /* the returned filename is relative to the directory */
2182 s = strrchr_m(fsp->fsp_name, '/');
2183 if (!s) {
2184 s = fsp->fsp_name;
2185 } else {
2186 s++;
2189 #if 0
2190 /* Tested vs W2K3 - this doesn't seem to be here - null terminated filename is the only
2191 thing in the byte section. JRA */
2192 SSVALS(p, 0, -1); /* what is this? not in spec */
2193 #endif
2194 if (message_push_string(&req->outbuf, s, STR_ASCII|STR_TERMINATE)
2195 == -1) {
2196 reply_nterror(req, NT_STATUS_NO_MEMORY);
2197 END_PROFILE(SMBctemp);
2198 return;
2201 if (oplock_request && lp_fake_oplocks(SNUM(conn))) {
2202 SCVAL(req->outbuf, smb_flg,
2203 CVAL(req->outbuf,smb_flg)|CORE_OPLOCK_GRANTED);
2206 if (EXCLUSIVE_OPLOCK_TYPE(fsp->oplock_type)) {
2207 SCVAL(req->outbuf, smb_flg,
2208 CVAL(req->outbuf,smb_flg)|CORE_OPLOCK_GRANTED);
2211 DEBUG( 2, ( "reply_ctemp: created temp file %s\n", fsp->fsp_name ) );
2212 DEBUG( 3, ( "reply_ctemp %s fd=%d umode=0%o\n", fsp->fsp_name,
2213 fsp->fh->fd, (unsigned int)sbuf.st_mode ) );
2215 END_PROFILE(SMBctemp);
2216 return;
2219 /*******************************************************************
2220 Check if a user is allowed to rename a file.
2221 ********************************************************************/
2223 static NTSTATUS can_rename(connection_struct *conn, files_struct *fsp,
2224 uint16 dirtype, SMB_STRUCT_STAT *pst)
2226 uint32 fmode;
2228 if (!CAN_WRITE(conn)) {
2229 return NT_STATUS_MEDIA_WRITE_PROTECTED;
2232 fmode = dos_mode(conn, fsp->fsp_name, pst);
2233 if ((fmode & ~dirtype) & (aHIDDEN | aSYSTEM)) {
2234 return NT_STATUS_NO_SUCH_FILE;
2237 if (S_ISDIR(pst->st_mode)) {
2238 return NT_STATUS_OK;
2241 if (fsp->access_mask & (DELETE_ACCESS|FILE_WRITE_ATTRIBUTES)) {
2242 return NT_STATUS_OK;
2245 return NT_STATUS_ACCESS_DENIED;
2248 /*******************************************************************
2249 * unlink a file with all relevant access checks
2250 *******************************************************************/
2252 static NTSTATUS do_unlink(connection_struct *conn,
2253 struct smb_request *req,
2254 const char *fname,
2255 uint32 dirtype)
2257 SMB_STRUCT_STAT sbuf;
2258 uint32 fattr;
2259 files_struct *fsp;
2260 uint32 dirtype_orig = dirtype;
2261 NTSTATUS status;
2263 DEBUG(10,("do_unlink: %s, dirtype = %d\n", fname, dirtype ));
2265 if (!CAN_WRITE(conn)) {
2266 return NT_STATUS_MEDIA_WRITE_PROTECTED;
2269 if (SMB_VFS_LSTAT(conn,fname,&sbuf) != 0) {
2270 return map_nt_error_from_unix(errno);
2273 fattr = dos_mode(conn,fname,&sbuf);
2275 if (dirtype & FILE_ATTRIBUTE_NORMAL) {
2276 dirtype = aDIR|aARCH|aRONLY;
2279 dirtype &= (aDIR|aARCH|aRONLY|aHIDDEN|aSYSTEM);
2280 if (!dirtype) {
2281 return NT_STATUS_NO_SUCH_FILE;
2284 if (!dir_check_ftype(conn, fattr, dirtype)) {
2285 if (fattr & aDIR) {
2286 return NT_STATUS_FILE_IS_A_DIRECTORY;
2288 return NT_STATUS_NO_SUCH_FILE;
2291 if (dirtype_orig & 0x8000) {
2292 /* These will never be set for POSIX. */
2293 return NT_STATUS_NO_SUCH_FILE;
2296 #if 0
2297 if ((fattr & dirtype) & FILE_ATTRIBUTE_DIRECTORY) {
2298 return NT_STATUS_FILE_IS_A_DIRECTORY;
2301 if ((fattr & ~dirtype) & (FILE_ATTRIBUTE_HIDDEN|FILE_ATTRIBUTE_SYSTEM)) {
2302 return NT_STATUS_NO_SUCH_FILE;
2305 if (dirtype & 0xFF00) {
2306 /* These will never be set for POSIX. */
2307 return NT_STATUS_NO_SUCH_FILE;
2310 dirtype &= 0xFF;
2311 if (!dirtype) {
2312 return NT_STATUS_NO_SUCH_FILE;
2315 /* Can't delete a directory. */
2316 if (fattr & aDIR) {
2317 return NT_STATUS_FILE_IS_A_DIRECTORY;
2319 #endif
2321 #if 0 /* JRATEST */
2322 else if (dirtype & aDIR) /* Asked for a directory and it isn't. */
2323 return NT_STATUS_OBJECT_NAME_INVALID;
2324 #endif /* JRATEST */
2326 /* Fix for bug #3035 from SATOH Fumiyasu <fumiyas@miraclelinux.com>
2328 On a Windows share, a file with read-only dosmode can be opened with
2329 DELETE_ACCESS. But on a Samba share (delete readonly = no), it
2330 fails with NT_STATUS_CANNOT_DELETE error.
2332 This semantic causes a problem that a user can not
2333 rename a file with read-only dosmode on a Samba share
2334 from a Windows command prompt (i.e. cmd.exe, but can rename
2335 from Windows Explorer).
2338 if (!lp_delete_readonly(SNUM(conn))) {
2339 if (fattr & aRONLY) {
2340 return NT_STATUS_CANNOT_DELETE;
2344 /* On open checks the open itself will check the share mode, so
2345 don't do it here as we'll get it wrong. */
2347 status = create_file_unixpath
2348 (conn, /* conn */
2349 req, /* req */
2350 fname, /* fname */
2351 DELETE_ACCESS, /* access_mask */
2352 FILE_SHARE_NONE, /* share_access */
2353 FILE_OPEN, /* create_disposition*/
2354 FILE_NON_DIRECTORY_FILE, /* create_options */
2355 FILE_ATTRIBUTE_NORMAL, /* file_attributes */
2356 0, /* oplock_request */
2357 0, /* allocation_size */
2358 NULL, /* sd */
2359 NULL, /* ea_list */
2360 &fsp, /* result */
2361 NULL, /* pinfo */
2362 &sbuf); /* psbuf */
2364 if (!NT_STATUS_IS_OK(status)) {
2365 DEBUG(10, ("open_file_ntcreate failed: %s\n",
2366 nt_errstr(status)));
2367 return status;
2370 /* The set is across all open files on this dev/inode pair. */
2371 if (!set_delete_on_close(fsp, True, &current_user.ut)) {
2372 close_file(fsp, NORMAL_CLOSE);
2373 return NT_STATUS_ACCESS_DENIED;
2376 return close_file(fsp,NORMAL_CLOSE);
2379 /****************************************************************************
2380 The guts of the unlink command, split out so it may be called by the NT SMB
2381 code.
2382 ****************************************************************************/
2384 NTSTATUS unlink_internals(connection_struct *conn, struct smb_request *req,
2385 uint32 dirtype, const char *name_in, bool has_wild)
2387 const char *directory = NULL;
2388 char *mask = NULL;
2389 char *name = NULL;
2390 char *p = NULL;
2391 int count=0;
2392 NTSTATUS status = NT_STATUS_OK;
2393 SMB_STRUCT_STAT sbuf;
2394 TALLOC_CTX *ctx = talloc_tos();
2396 status = unix_convert(ctx, conn, name_in, has_wild, &name, NULL, &sbuf);
2397 if (!NT_STATUS_IS_OK(status)) {
2398 return status;
2401 p = strrchr_m(name,'/');
2402 if (!p) {
2403 directory = talloc_strdup(ctx, ".");
2404 if (!directory) {
2405 return NT_STATUS_NO_MEMORY;
2407 mask = name;
2408 } else {
2409 *p = 0;
2410 directory = name;
2411 mask = p+1;
2415 * We should only check the mangled cache
2416 * here if unix_convert failed. This means
2417 * that the path in 'mask' doesn't exist
2418 * on the file system and so we need to look
2419 * for a possible mangle. This patch from
2420 * Tine Smukavec <valentin.smukavec@hermes.si>.
2423 if (!VALID_STAT(sbuf) && mangle_is_mangled(mask,conn->params)) {
2424 char *new_mask = NULL;
2425 mangle_lookup_name_from_8_3(ctx,
2426 mask,
2427 &new_mask,
2428 conn->params );
2429 if (new_mask) {
2430 mask = new_mask;
2434 if (!has_wild) {
2435 directory = talloc_asprintf(ctx,
2436 "%s/%s",
2437 directory,
2438 mask);
2439 if (!directory) {
2440 return NT_STATUS_NO_MEMORY;
2442 if (dirtype == 0) {
2443 dirtype = FILE_ATTRIBUTE_NORMAL;
2446 status = check_name(conn, directory);
2447 if (!NT_STATUS_IS_OK(status)) {
2448 return status;
2451 status = do_unlink(conn, req, directory, dirtype);
2452 if (!NT_STATUS_IS_OK(status)) {
2453 return status;
2456 count++;
2457 } else {
2458 struct smb_Dir *dir_hnd = NULL;
2459 long offset = 0;
2460 const char *dname;
2462 if ((dirtype & SAMBA_ATTRIBUTES_MASK) == aDIR) {
2463 return NT_STATUS_OBJECT_NAME_INVALID;
2466 if (strequal(mask,"????????.???")) {
2467 mask[0] = '*';
2468 mask[1] = '\0';
2471 status = check_name(conn, directory);
2472 if (!NT_STATUS_IS_OK(status)) {
2473 return status;
2476 dir_hnd = OpenDir(talloc_tos(), conn, directory, mask,
2477 dirtype);
2478 if (dir_hnd == NULL) {
2479 return map_nt_error_from_unix(errno);
2482 /* XXXX the CIFS spec says that if bit0 of the flags2 field is set then
2483 the pattern matches against the long name, otherwise the short name
2484 We don't implement this yet XXXX
2487 status = NT_STATUS_NO_SUCH_FILE;
2489 while ((dname = ReadDirName(dir_hnd, &offset))) {
2490 SMB_STRUCT_STAT st;
2491 char *fname = NULL;
2493 if (!is_visible_file(conn, directory, dname, &st, True)) {
2494 continue;
2497 /* Quick check for "." and ".." */
2498 if (ISDOT(dname) || ISDOTDOT(dname)) {
2499 continue;
2502 if(!mask_match(dname, mask, conn->case_sensitive)) {
2503 continue;
2506 fname = talloc_asprintf(ctx, "%s/%s",
2507 directory,
2508 dname);
2509 if (!fname) {
2510 return NT_STATUS_NO_MEMORY;
2513 status = check_name(conn, fname);
2514 if (!NT_STATUS_IS_OK(status)) {
2515 TALLOC_FREE(dir_hnd);
2516 return status;
2519 status = do_unlink(conn, req, fname, dirtype);
2520 if (!NT_STATUS_IS_OK(status)) {
2521 TALLOC_FREE(fname);
2522 continue;
2525 count++;
2526 DEBUG(3,("unlink_internals: successful unlink [%s]\n",
2527 fname));
2529 TALLOC_FREE(fname);
2531 TALLOC_FREE(dir_hnd);
2534 if (count == 0 && NT_STATUS_IS_OK(status) && errno != 0) {
2535 status = map_nt_error_from_unix(errno);
2538 return status;
2541 /****************************************************************************
2542 Reply to a unlink
2543 ****************************************************************************/
2545 void reply_unlink(struct smb_request *req)
2547 connection_struct *conn = req->conn;
2548 char *name = NULL;
2549 uint32 dirtype;
2550 NTSTATUS status;
2551 bool path_contains_wcard = False;
2552 TALLOC_CTX *ctx = talloc_tos();
2554 START_PROFILE(SMBunlink);
2556 if (req->wct < 1) {
2557 reply_nterror(req, NT_STATUS_INVALID_PARAMETER);
2558 END_PROFILE(SMBunlink);
2559 return;
2562 dirtype = SVAL(req->inbuf,smb_vwv0);
2564 srvstr_get_path_wcard(ctx, (char *)req->inbuf, req->flags2, &name,
2565 smb_buf(req->inbuf) + 1, 0,
2566 STR_TERMINATE, &status, &path_contains_wcard);
2567 if (!NT_STATUS_IS_OK(status)) {
2568 reply_nterror(req, status);
2569 END_PROFILE(SMBunlink);
2570 return;
2573 status = resolve_dfspath_wcard(ctx, conn,
2574 req->flags2 & FLAGS2_DFS_PATHNAMES,
2575 name,
2576 &name,
2577 &path_contains_wcard);
2578 if (!NT_STATUS_IS_OK(status)) {
2579 if (NT_STATUS_EQUAL(status,NT_STATUS_PATH_NOT_COVERED)) {
2580 reply_botherror(req, NT_STATUS_PATH_NOT_COVERED,
2581 ERRSRV, ERRbadpath);
2582 END_PROFILE(SMBunlink);
2583 return;
2585 reply_nterror(req, status);
2586 END_PROFILE(SMBunlink);
2587 return;
2590 DEBUG(3,("reply_unlink : %s\n",name));
2592 status = unlink_internals(conn, req, dirtype, name,
2593 path_contains_wcard);
2594 if (!NT_STATUS_IS_OK(status)) {
2595 if (open_was_deferred(req->mid)) {
2596 /* We have re-scheduled this call. */
2597 END_PROFILE(SMBunlink);
2598 return;
2600 reply_nterror(req, status);
2601 END_PROFILE(SMBunlink);
2602 return;
2605 reply_outbuf(req, 0, 0);
2606 END_PROFILE(SMBunlink);
2608 return;
2611 /****************************************************************************
2612 Fail for readbraw.
2613 ****************************************************************************/
2615 static void fail_readraw(void)
2617 const char *errstr = talloc_asprintf(talloc_tos(),
2618 "FAIL ! reply_readbraw: socket write fail (%s)",
2619 strerror(errno));
2620 if (!errstr) {
2621 errstr = "";
2623 exit_server_cleanly(errstr);
2626 /****************************************************************************
2627 Fake (read/write) sendfile. Returns -1 on read or write fail.
2628 ****************************************************************************/
2630 static ssize_t fake_sendfile(files_struct *fsp, SMB_OFF_T startpos,
2631 size_t nread)
2633 size_t bufsize;
2634 size_t tosend = nread;
2635 char *buf;
2637 if (nread == 0) {
2638 return 0;
2641 bufsize = MIN(nread, 65536);
2643 if (!(buf = SMB_MALLOC_ARRAY(char, bufsize))) {
2644 return -1;
2647 while (tosend > 0) {
2648 ssize_t ret;
2649 size_t cur_read;
2651 if (tosend > bufsize) {
2652 cur_read = bufsize;
2653 } else {
2654 cur_read = tosend;
2656 ret = read_file(fsp,buf,startpos,cur_read);
2657 if (ret == -1) {
2658 SAFE_FREE(buf);
2659 return -1;
2662 /* If we had a short read, fill with zeros. */
2663 if (ret < cur_read) {
2664 memset(buf, '\0', cur_read - ret);
2667 if (write_data(smbd_server_fd(),buf,cur_read) != cur_read) {
2668 SAFE_FREE(buf);
2669 return -1;
2671 tosend -= cur_read;
2672 startpos += cur_read;
2675 SAFE_FREE(buf);
2676 return (ssize_t)nread;
2679 /****************************************************************************
2680 Return a readbraw error (4 bytes of zero).
2681 ****************************************************************************/
2683 static void reply_readbraw_error(void)
2685 char header[4];
2686 SIVAL(header,0,0);
2687 if (write_data(smbd_server_fd(),header,4) != 4) {
2688 fail_readraw();
2692 /****************************************************************************
2693 Use sendfile in readbraw.
2694 ****************************************************************************/
2696 void send_file_readbraw(connection_struct *conn,
2697 files_struct *fsp,
2698 SMB_OFF_T startpos,
2699 size_t nread,
2700 ssize_t mincount)
2702 char *outbuf = NULL;
2703 ssize_t ret=0;
2705 #if defined(WITH_SENDFILE)
2707 * We can only use sendfile on a non-chained packet
2708 * but we can use on a non-oplocked file. tridge proved this
2709 * on a train in Germany :-). JRA.
2710 * reply_readbraw has already checked the length.
2713 if ( (chain_size == 0) && (nread > 0) && (fsp->base_fsp == NULL) &&
2714 (fsp->wcp == NULL) && lp_use_sendfile(SNUM(conn)) ) {
2715 char header[4];
2716 DATA_BLOB header_blob;
2718 _smb_setlen(header,nread);
2719 header_blob = data_blob_const(header, 4);
2721 if (SMB_VFS_SENDFILE(smbd_server_fd(), fsp,
2722 &header_blob, startpos, nread) == -1) {
2723 /* Returning ENOSYS means no data at all was sent.
2724 * Do this as a normal read. */
2725 if (errno == ENOSYS) {
2726 goto normal_readbraw;
2730 * Special hack for broken Linux with no working sendfile. If we
2731 * return EINTR we sent the header but not the rest of the data.
2732 * Fake this up by doing read/write calls.
2734 if (errno == EINTR) {
2735 /* Ensure we don't do this again. */
2736 set_use_sendfile(SNUM(conn), False);
2737 DEBUG(0,("send_file_readbraw: sendfile not available. Faking..\n"));
2739 if (fake_sendfile(fsp, startpos, nread) == -1) {
2740 DEBUG(0,("send_file_readbraw: fake_sendfile failed for file %s (%s).\n",
2741 fsp->fsp_name, strerror(errno) ));
2742 exit_server_cleanly("send_file_readbraw fake_sendfile failed");
2744 return;
2747 DEBUG(0,("send_file_readbraw: sendfile failed for file %s (%s). Terminating\n",
2748 fsp->fsp_name, strerror(errno) ));
2749 exit_server_cleanly("send_file_readbraw sendfile failed");
2752 return;
2754 #endif
2756 normal_readbraw:
2758 outbuf = TALLOC_ARRAY(NULL, char, nread+4);
2759 if (!outbuf) {
2760 DEBUG(0,("send_file_readbraw: TALLOC_ARRAY failed for size %u.\n",
2761 (unsigned)(nread+4)));
2762 reply_readbraw_error();
2763 return;
2766 if (nread > 0) {
2767 ret = read_file(fsp,outbuf+4,startpos,nread);
2768 #if 0 /* mincount appears to be ignored in a W2K server. JRA. */
2769 if (ret < mincount)
2770 ret = 0;
2771 #else
2772 if (ret < nread)
2773 ret = 0;
2774 #endif
2777 _smb_setlen(outbuf,ret);
2778 if (write_data(smbd_server_fd(),outbuf,4+ret) != 4+ret)
2779 fail_readraw();
2781 TALLOC_FREE(outbuf);
2784 /****************************************************************************
2785 Reply to a readbraw (core+ protocol).
2786 ****************************************************************************/
2788 void reply_readbraw(struct smb_request *req)
2790 connection_struct *conn = req->conn;
2791 ssize_t maxcount,mincount;
2792 size_t nread = 0;
2793 SMB_OFF_T startpos;
2794 files_struct *fsp;
2795 SMB_STRUCT_STAT st;
2796 SMB_OFF_T size = 0;
2798 START_PROFILE(SMBreadbraw);
2800 if (srv_is_signing_active() || is_encrypted_packet(req->inbuf)) {
2801 exit_server_cleanly("reply_readbraw: SMB signing/sealing is active - "
2802 "raw reads/writes are disallowed.");
2805 if (req->wct < 8) {
2806 reply_readbraw_error();
2807 END_PROFILE(SMBreadbraw);
2808 return;
2812 * Special check if an oplock break has been issued
2813 * and the readraw request croses on the wire, we must
2814 * return a zero length response here.
2817 fsp = file_fsp(SVAL(req->inbuf,smb_vwv0));
2820 * We have to do a check_fsp by hand here, as
2821 * we must always return 4 zero bytes on error,
2822 * not a NTSTATUS.
2825 if (!fsp || !conn || conn != fsp->conn ||
2826 current_user.vuid != fsp->vuid ||
2827 fsp->is_directory || fsp->fh->fd == -1) {
2829 * fsp could be NULL here so use the value from the packet. JRA.
2831 DEBUG(3,("reply_readbraw: fnum %d not valid "
2832 "- cache prime?\n",
2833 (int)SVAL(req->inbuf,smb_vwv0)));
2834 reply_readbraw_error();
2835 END_PROFILE(SMBreadbraw);
2836 return;
2839 /* Do a "by hand" version of CHECK_READ. */
2840 if (!(fsp->can_read ||
2841 ((req->flags2 & FLAGS2_READ_PERMIT_EXECUTE) &&
2842 (fsp->access_mask & FILE_EXECUTE)))) {
2843 DEBUG(3,("reply_readbraw: fnum %d not readable.\n",
2844 (int)SVAL(req->inbuf,smb_vwv0)));
2845 reply_readbraw_error();
2846 END_PROFILE(SMBreadbraw);
2847 return;
2850 flush_write_cache(fsp, READRAW_FLUSH);
2852 startpos = IVAL_TO_SMB_OFF_T(req->inbuf,smb_vwv1);
2853 if(req->wct == 10) {
2855 * This is a large offset (64 bit) read.
2857 #ifdef LARGE_SMB_OFF_T
2859 startpos |= (((SMB_OFF_T)IVAL(req->inbuf,smb_vwv8)) << 32);
2861 #else /* !LARGE_SMB_OFF_T */
2864 * Ensure we haven't been sent a >32 bit offset.
2867 if(IVAL(req->inbuf,smb_vwv8) != 0) {
2868 DEBUG(0,("reply_readbraw: large offset "
2869 "(%x << 32) used and we don't support "
2870 "64 bit offsets.\n",
2871 (unsigned int)IVAL(req->inbuf,smb_vwv8) ));
2872 reply_readbraw_error();
2873 END_PROFILE(SMBreadbraw);
2874 return;
2877 #endif /* LARGE_SMB_OFF_T */
2879 if(startpos < 0) {
2880 DEBUG(0,("reply_readbraw: negative 64 bit "
2881 "readraw offset (%.0f) !\n",
2882 (double)startpos ));
2883 reply_readbraw_error();
2884 END_PROFILE(SMBreadbraw);
2885 return;
2889 maxcount = (SVAL(req->inbuf,smb_vwv3) & 0xFFFF);
2890 mincount = (SVAL(req->inbuf,smb_vwv4) & 0xFFFF);
2892 /* ensure we don't overrun the packet size */
2893 maxcount = MIN(65535,maxcount);
2895 if (is_locked(fsp,(uint32)req->smbpid,
2896 (SMB_BIG_UINT)maxcount,
2897 (SMB_BIG_UINT)startpos,
2898 READ_LOCK)) {
2899 reply_readbraw_error();
2900 END_PROFILE(SMBreadbraw);
2901 return;
2904 if (SMB_VFS_FSTAT(fsp, &st) == 0) {
2905 size = st.st_size;
2908 if (startpos >= size) {
2909 nread = 0;
2910 } else {
2911 nread = MIN(maxcount,(size - startpos));
2914 #if 0 /* mincount appears to be ignored in a W2K server. JRA. */
2915 if (nread < mincount)
2916 nread = 0;
2917 #endif
2919 DEBUG( 3, ( "reply_readbraw: fnum=%d start=%.0f max=%lu "
2920 "min=%lu nread=%lu\n",
2921 fsp->fnum, (double)startpos,
2922 (unsigned long)maxcount,
2923 (unsigned long)mincount,
2924 (unsigned long)nread ) );
2926 send_file_readbraw(conn, fsp, startpos, nread, mincount);
2928 DEBUG(5,("reply_readbraw finished\n"));
2929 END_PROFILE(SMBreadbraw);
2932 #undef DBGC_CLASS
2933 #define DBGC_CLASS DBGC_LOCKING
2935 /****************************************************************************
2936 Reply to a lockread (core+ protocol).
2937 ****************************************************************************/
2939 void reply_lockread(struct smb_request *req)
2941 connection_struct *conn = req->conn;
2942 ssize_t nread = -1;
2943 char *data;
2944 SMB_OFF_T startpos;
2945 size_t numtoread;
2946 NTSTATUS status;
2947 files_struct *fsp;
2948 struct byte_range_lock *br_lck = NULL;
2949 char *p = NULL;
2951 START_PROFILE(SMBlockread);
2953 if (req->wct < 5) {
2954 reply_nterror(req, NT_STATUS_INVALID_PARAMETER);
2955 END_PROFILE(SMBlockread);
2956 return;
2959 fsp = file_fsp(SVAL(req->inbuf,smb_vwv0));
2961 if (!check_fsp(conn, req, fsp, &current_user)) {
2962 END_PROFILE(SMBlockread);
2963 return;
2966 if (!CHECK_READ(fsp,req->inbuf)) {
2967 reply_doserror(req, ERRDOS, ERRbadaccess);
2968 END_PROFILE(SMBlockread);
2969 return;
2972 release_level_2_oplocks_on_change(fsp);
2974 numtoread = SVAL(req->inbuf,smb_vwv1);
2975 startpos = IVAL_TO_SMB_OFF_T(req->inbuf,smb_vwv2);
2977 numtoread = MIN(BUFFER_SIZE - (smb_size + 3*2 + 3), numtoread);
2979 reply_outbuf(req, 5, numtoread + 3);
2981 data = smb_buf(req->outbuf) + 3;
2984 * NB. Discovered by Menny Hamburger at Mainsoft. This is a core+
2985 * protocol request that predates the read/write lock concept.
2986 * Thus instead of asking for a read lock here we need to ask
2987 * for a write lock. JRA.
2988 * Note that the requested lock size is unaffected by max_recv.
2991 br_lck = do_lock(smbd_messaging_context(),
2992 fsp,
2993 req->smbpid,
2994 (SMB_BIG_UINT)numtoread,
2995 (SMB_BIG_UINT)startpos,
2996 WRITE_LOCK,
2997 WINDOWS_LOCK,
2998 False, /* Non-blocking lock. */
2999 &status,
3000 NULL);
3001 TALLOC_FREE(br_lck);
3003 if (NT_STATUS_V(status)) {
3004 reply_nterror(req, status);
3005 END_PROFILE(SMBlockread);
3006 return;
3010 * However the requested READ size IS affected by max_recv. Insanity.... JRA.
3013 if (numtoread > max_recv) {
3014 DEBUG(0,("reply_lockread: requested read size (%u) is greater than maximum allowed (%u). \
3015 Returning short read of maximum allowed for compatibility with Windows 2000.\n",
3016 (unsigned int)numtoread, (unsigned int)max_recv ));
3017 numtoread = MIN(numtoread,max_recv);
3019 nread = read_file(fsp,data,startpos,numtoread);
3021 if (nread < 0) {
3022 reply_unixerror(req, ERRDOS, ERRnoaccess);
3023 END_PROFILE(SMBlockread);
3024 return;
3027 srv_set_message((char *)req->outbuf, 5, nread+3, False);
3029 SSVAL(req->outbuf,smb_vwv0,nread);
3030 SSVAL(req->outbuf,smb_vwv5,nread+3);
3031 p = smb_buf(req->outbuf);
3032 SCVAL(p,0,0); /* pad byte. */
3033 SSVAL(p,1,nread);
3035 DEBUG(3,("lockread fnum=%d num=%d nread=%d\n",
3036 fsp->fnum, (int)numtoread, (int)nread));
3038 END_PROFILE(SMBlockread);
3039 return;
3042 #undef DBGC_CLASS
3043 #define DBGC_CLASS DBGC_ALL
3045 /****************************************************************************
3046 Reply to a read.
3047 ****************************************************************************/
3049 void reply_read(struct smb_request *req)
3051 connection_struct *conn = req->conn;
3052 size_t numtoread;
3053 ssize_t nread = 0;
3054 char *data;
3055 SMB_OFF_T startpos;
3056 int outsize = 0;
3057 files_struct *fsp;
3059 START_PROFILE(SMBread);
3061 if (req->wct < 3) {
3062 reply_nterror(req, NT_STATUS_INVALID_PARAMETER);
3063 END_PROFILE(SMBread);
3064 return;
3067 fsp = file_fsp(SVAL(req->inbuf,smb_vwv0));
3069 if (!check_fsp(conn, req, fsp, &current_user)) {
3070 END_PROFILE(SMBread);
3071 return;
3074 if (!CHECK_READ(fsp,req->inbuf)) {
3075 reply_doserror(req, ERRDOS, ERRbadaccess);
3076 END_PROFILE(SMBread);
3077 return;
3080 numtoread = SVAL(req->inbuf,smb_vwv1);
3081 startpos = IVAL_TO_SMB_OFF_T(req->inbuf,smb_vwv2);
3083 numtoread = MIN(BUFFER_SIZE-outsize,numtoread);
3086 * The requested read size cannot be greater than max_recv. JRA.
3088 if (numtoread > max_recv) {
3089 DEBUG(0,("reply_read: requested read size (%u) is greater than maximum allowed (%u). \
3090 Returning short read of maximum allowed for compatibility with Windows 2000.\n",
3091 (unsigned int)numtoread, (unsigned int)max_recv ));
3092 numtoread = MIN(numtoread,max_recv);
3095 reply_outbuf(req, 5, numtoread+3);
3097 data = smb_buf(req->outbuf) + 3;
3099 if (is_locked(fsp, (uint32)req->smbpid, (SMB_BIG_UINT)numtoread,
3100 (SMB_BIG_UINT)startpos, READ_LOCK)) {
3101 reply_doserror(req, ERRDOS,ERRlock);
3102 END_PROFILE(SMBread);
3103 return;
3106 if (numtoread > 0)
3107 nread = read_file(fsp,data,startpos,numtoread);
3109 if (nread < 0) {
3110 reply_unixerror(req, ERRDOS,ERRnoaccess);
3111 END_PROFILE(SMBread);
3112 return;
3115 srv_set_message((char *)req->outbuf, 5, nread+3, False);
3117 SSVAL(req->outbuf,smb_vwv0,nread);
3118 SSVAL(req->outbuf,smb_vwv5,nread+3);
3119 SCVAL(smb_buf(req->outbuf),0,1);
3120 SSVAL(smb_buf(req->outbuf),1,nread);
3122 DEBUG( 3, ( "read fnum=%d num=%d nread=%d\n",
3123 fsp->fnum, (int)numtoread, (int)nread ) );
3125 END_PROFILE(SMBread);
3126 return;
3129 /****************************************************************************
3130 Setup readX header.
3131 ****************************************************************************/
3133 static int setup_readX_header(char *outbuf, size_t smb_maxcnt)
3135 int outsize;
3136 char *data;
3138 outsize = srv_set_message(outbuf,12,smb_maxcnt,False);
3139 data = smb_buf(outbuf);
3141 memset(outbuf+smb_vwv0,'\0',24); /* valgrind init. */
3143 SCVAL(outbuf,smb_vwv0,0xFF);
3144 SSVAL(outbuf,smb_vwv2,0xFFFF); /* Remaining - must be -1. */
3145 SSVAL(outbuf,smb_vwv5,smb_maxcnt);
3146 SSVAL(outbuf,smb_vwv6,smb_offset(data,outbuf));
3147 SSVAL(outbuf,smb_vwv7,(smb_maxcnt >> 16));
3148 SSVAL(smb_buf(outbuf),-2,smb_maxcnt);
3149 /* Reset the outgoing length, set_message truncates at 0x1FFFF. */
3150 _smb_setlen_large(outbuf,(smb_size + 12*2 + smb_maxcnt - 4));
3151 return outsize;
3154 /****************************************************************************
3155 Reply to a read and X - possibly using sendfile.
3156 ****************************************************************************/
3158 static void send_file_readX(connection_struct *conn, struct smb_request *req,
3159 files_struct *fsp, SMB_OFF_T startpos,
3160 size_t smb_maxcnt)
3162 SMB_STRUCT_STAT sbuf;
3163 ssize_t nread = -1;
3165 if(SMB_VFS_FSTAT(fsp, &sbuf) == -1) {
3166 reply_unixerror(req, ERRDOS, ERRnoaccess);
3167 return;
3170 if (startpos > sbuf.st_size) {
3171 smb_maxcnt = 0;
3172 } else if (smb_maxcnt > (sbuf.st_size - startpos)) {
3173 smb_maxcnt = (sbuf.st_size - startpos);
3176 if (smb_maxcnt == 0) {
3177 goto normal_read;
3180 #if defined(WITH_SENDFILE)
3182 * We can only use sendfile on a non-chained packet
3183 * but we can use on a non-oplocked file. tridge proved this
3184 * on a train in Germany :-). JRA.
3187 if ((chain_size == 0) && (CVAL(req->inbuf,smb_vwv0) == 0xFF) &&
3188 !is_encrypted_packet(req->inbuf) && (fsp->base_fsp == NULL) &&
3189 lp_use_sendfile(SNUM(conn)) && (fsp->wcp == NULL) ) {
3190 uint8 headerbuf[smb_size + 12 * 2];
3191 DATA_BLOB header;
3194 * Set up the packet header before send. We
3195 * assume here the sendfile will work (get the
3196 * correct amount of data).
3199 header = data_blob_const(headerbuf, sizeof(headerbuf));
3201 construct_reply_common((char *)req->inbuf, (char *)headerbuf);
3202 setup_readX_header((char *)headerbuf, smb_maxcnt);
3204 if ((nread = SMB_VFS_SENDFILE(smbd_server_fd(), fsp, &header, startpos, smb_maxcnt)) == -1) {
3205 /* Returning ENOSYS or EINVAL means no data at all was sent.
3206 Do this as a normal read. */
3207 if (errno == ENOSYS || errno == EINVAL) {
3208 goto normal_read;
3212 * Special hack for broken Linux with no working sendfile. If we
3213 * return EINTR we sent the header but not the rest of the data.
3214 * Fake this up by doing read/write calls.
3217 if (errno == EINTR) {
3218 /* Ensure we don't do this again. */
3219 set_use_sendfile(SNUM(conn), False);
3220 DEBUG(0,("send_file_readX: sendfile not available. Faking..\n"));
3221 nread = fake_sendfile(fsp, startpos,
3222 smb_maxcnt);
3223 if (nread == -1) {
3224 DEBUG(0,("send_file_readX: fake_sendfile failed for file %s (%s).\n",
3225 fsp->fsp_name, strerror(errno) ));
3226 exit_server_cleanly("send_file_readX: fake_sendfile failed");
3228 DEBUG( 3, ( "send_file_readX: fake_sendfile fnum=%d max=%d nread=%d\n",
3229 fsp->fnum, (int)smb_maxcnt, (int)nread ) );
3230 /* No outbuf here means successful sendfile. */
3231 TALLOC_FREE(req->outbuf);
3232 return;
3235 DEBUG(0,("send_file_readX: sendfile failed for file %s (%s). Terminating\n",
3236 fsp->fsp_name, strerror(errno) ));
3237 exit_server_cleanly("send_file_readX sendfile failed");
3240 DEBUG( 3, ( "send_file_readX: sendfile fnum=%d max=%d nread=%d\n",
3241 fsp->fnum, (int)smb_maxcnt, (int)nread ) );
3242 /* No outbuf here means successful sendfile. */
3243 TALLOC_FREE(req->outbuf);
3244 return;
3246 #endif
3248 normal_read:
3250 if ((smb_maxcnt & 0xFF0000) > 0x10000) {
3251 uint8 headerbuf[smb_size + 2*12];
3253 construct_reply_common((char *)req->inbuf, (char *)headerbuf);
3254 setup_readX_header((char *)headerbuf, smb_maxcnt);
3256 /* Send out the header. */
3257 if (write_data(smbd_server_fd(), (char *)headerbuf,
3258 sizeof(headerbuf)) != sizeof(headerbuf)) {
3259 DEBUG(0,("send_file_readX: write_data failed for file %s (%s). Terminating\n",
3260 fsp->fsp_name, strerror(errno) ));
3261 exit_server_cleanly("send_file_readX sendfile failed");
3263 nread = fake_sendfile(fsp, startpos, smb_maxcnt);
3264 if (nread == -1) {
3265 DEBUG(0,("send_file_readX: fake_sendfile failed for file %s (%s).\n",
3266 fsp->fsp_name, strerror(errno) ));
3267 exit_server_cleanly("send_file_readX: fake_sendfile failed");
3269 TALLOC_FREE(req->outbuf);
3270 return;
3271 } else {
3272 reply_outbuf(req, 12, smb_maxcnt);
3274 nread = read_file(fsp, smb_buf(req->outbuf), startpos,
3275 smb_maxcnt);
3276 if (nread < 0) {
3277 reply_unixerror(req, ERRDOS, ERRnoaccess);
3278 return;
3281 setup_readX_header((char *)req->outbuf, nread);
3283 DEBUG( 3, ( "send_file_readX fnum=%d max=%d nread=%d\n",
3284 fsp->fnum, (int)smb_maxcnt, (int)nread ) );
3286 chain_reply(req);
3288 return;
3292 /****************************************************************************
3293 Reply to a read and X.
3294 ****************************************************************************/
3296 void reply_read_and_X(struct smb_request *req)
3298 connection_struct *conn = req->conn;
3299 files_struct *fsp;
3300 SMB_OFF_T startpos;
3301 size_t smb_maxcnt;
3302 bool big_readX = False;
3303 #if 0
3304 size_t smb_mincnt = SVAL(req->inbuf,smb_vwv6);
3305 #endif
3307 START_PROFILE(SMBreadX);
3309 if ((req->wct != 10) && (req->wct != 12)) {
3310 reply_nterror(req, NT_STATUS_INVALID_PARAMETER);
3311 return;
3314 fsp = file_fsp(SVAL(req->inbuf,smb_vwv2));
3315 startpos = IVAL_TO_SMB_OFF_T(req->inbuf,smb_vwv3);
3316 smb_maxcnt = SVAL(req->inbuf,smb_vwv5);
3318 /* If it's an IPC, pass off the pipe handler. */
3319 if (IS_IPC(conn)) {
3320 reply_pipe_read_and_X(req);
3321 END_PROFILE(SMBreadX);
3322 return;
3325 if (!check_fsp(conn, req, fsp, &current_user)) {
3326 END_PROFILE(SMBreadX);
3327 return;
3330 if (!CHECK_READ(fsp,req->inbuf)) {
3331 reply_doserror(req, ERRDOS,ERRbadaccess);
3332 END_PROFILE(SMBreadX);
3333 return;
3336 if (global_client_caps & CAP_LARGE_READX) {
3337 size_t upper_size = SVAL(req->inbuf,smb_vwv7);
3338 smb_maxcnt |= (upper_size<<16);
3339 if (upper_size > 1) {
3340 /* Can't do this on a chained packet. */
3341 if ((CVAL(req->inbuf,smb_vwv0) != 0xFF)) {
3342 reply_nterror(req, NT_STATUS_NOT_SUPPORTED);
3343 END_PROFILE(SMBreadX);
3344 return;
3346 /* We currently don't do this on signed or sealed data. */
3347 if (srv_is_signing_active() || is_encrypted_packet(req->inbuf)) {
3348 reply_nterror(req, NT_STATUS_NOT_SUPPORTED);
3349 END_PROFILE(SMBreadX);
3350 return;
3352 /* Is there room in the reply for this data ? */
3353 if (smb_maxcnt > (0xFFFFFF - (smb_size -4 + 12*2))) {
3354 reply_nterror(req,
3355 NT_STATUS_INVALID_PARAMETER);
3356 END_PROFILE(SMBreadX);
3357 return;
3359 big_readX = True;
3363 if (req->wct == 12) {
3364 #ifdef LARGE_SMB_OFF_T
3366 * This is a large offset (64 bit) read.
3368 startpos |= (((SMB_OFF_T)IVAL(req->inbuf,smb_vwv10)) << 32);
3370 #else /* !LARGE_SMB_OFF_T */
3373 * Ensure we haven't been sent a >32 bit offset.
3376 if(IVAL(req->inbuf,smb_vwv10) != 0) {
3377 DEBUG(0,("reply_read_and_X - large offset (%x << 32) "
3378 "used and we don't support 64 bit offsets.\n",
3379 (unsigned int)IVAL(req->inbuf,smb_vwv10) ));
3380 END_PROFILE(SMBreadX);
3381 reply_doserror(req, ERRDOS, ERRbadaccess);
3382 return;
3385 #endif /* LARGE_SMB_OFF_T */
3389 if (is_locked(fsp, (uint32)req->smbpid, (SMB_BIG_UINT)smb_maxcnt,
3390 (SMB_BIG_UINT)startpos, READ_LOCK)) {
3391 END_PROFILE(SMBreadX);
3392 reply_doserror(req, ERRDOS, ERRlock);
3393 return;
3396 if (!big_readX &&
3397 schedule_aio_read_and_X(conn, req, fsp, startpos, smb_maxcnt)) {
3398 END_PROFILE(SMBreadX);
3399 return;
3402 send_file_readX(conn, req, fsp, startpos, smb_maxcnt);
3404 END_PROFILE(SMBreadX);
3405 return;
3408 /****************************************************************************
3409 Error replies to writebraw must have smb_wct == 1. Fix this up.
3410 ****************************************************************************/
3412 void error_to_writebrawerr(struct smb_request *req)
3414 uint8 *old_outbuf = req->outbuf;
3416 reply_outbuf(req, 1, 0);
3418 memcpy(req->outbuf, old_outbuf, smb_size);
3419 TALLOC_FREE(old_outbuf);
3422 /****************************************************************************
3423 Reply to a writebraw (core+ or LANMAN1.0 protocol).
3424 ****************************************************************************/
3426 void reply_writebraw(struct smb_request *req)
3428 connection_struct *conn = req->conn;
3429 char *buf = NULL;
3430 ssize_t nwritten=0;
3431 ssize_t total_written=0;
3432 size_t numtowrite=0;
3433 size_t tcount;
3434 SMB_OFF_T startpos;
3435 char *data=NULL;
3436 bool write_through;
3437 files_struct *fsp;
3438 NTSTATUS status;
3440 START_PROFILE(SMBwritebraw);
3443 * If we ever reply with an error, it must have the SMB command
3444 * type of SMBwritec, not SMBwriteBraw, as this tells the client
3445 * we're finished.
3447 SCVAL(req->inbuf,smb_com,SMBwritec);
3449 if (srv_is_signing_active()) {
3450 END_PROFILE(SMBwritebraw);
3451 exit_server_cleanly("reply_writebraw: SMB signing is active - "
3452 "raw reads/writes are disallowed.");
3455 if (req->wct < 12) {
3456 reply_nterror(req, NT_STATUS_INVALID_PARAMETER);
3457 error_to_writebrawerr(req);
3458 END_PROFILE(SMBwritebraw);
3459 return;
3462 fsp = file_fsp(SVAL(req->inbuf,smb_vwv0));
3463 if (!check_fsp(conn, req, fsp, &current_user)) {
3464 error_to_writebrawerr(req);
3465 END_PROFILE(SMBwritebraw);
3466 return;
3469 if (!CHECK_WRITE(fsp)) {
3470 reply_doserror(req, ERRDOS, ERRbadaccess);
3471 error_to_writebrawerr(req);
3472 END_PROFILE(SMBwritebraw);
3473 return;
3476 tcount = IVAL(req->inbuf,smb_vwv1);
3477 startpos = IVAL_TO_SMB_OFF_T(req->inbuf,smb_vwv3);
3478 write_through = BITSETW(req->inbuf+smb_vwv7,0);
3480 /* We have to deal with slightly different formats depending
3481 on whether we are using the core+ or lanman1.0 protocol */
3483 if(Protocol <= PROTOCOL_COREPLUS) {
3484 numtowrite = SVAL(smb_buf(req->inbuf),-2);
3485 data = smb_buf(req->inbuf);
3486 } else {
3487 numtowrite = SVAL(req->inbuf,smb_vwv10);
3488 data = smb_base(req->inbuf) + SVAL(req->inbuf, smb_vwv11);
3491 /* Ensure we don't write bytes past the end of this packet. */
3492 if (data + numtowrite > smb_base(req->inbuf) + smb_len(req->inbuf)) {
3493 reply_nterror(req, NT_STATUS_INVALID_PARAMETER);
3494 error_to_writebrawerr(req);
3495 END_PROFILE(SMBwritebraw);
3496 return;
3499 if (is_locked(fsp,(uint32)req->smbpid,(SMB_BIG_UINT)tcount,
3500 (SMB_BIG_UINT)startpos, WRITE_LOCK)) {
3501 reply_doserror(req, ERRDOS, ERRlock);
3502 error_to_writebrawerr(req);
3503 END_PROFILE(SMBwritebraw);
3504 return;
3507 if (numtowrite>0) {
3508 nwritten = write_file(req,fsp,data,startpos,numtowrite);
3511 DEBUG(3,("reply_writebraw: initial write fnum=%d start=%.0f num=%d "
3512 "wrote=%d sync=%d\n",
3513 fsp->fnum, (double)startpos, (int)numtowrite,
3514 (int)nwritten, (int)write_through));
3516 if (nwritten < (ssize_t)numtowrite) {
3517 reply_unixerror(req, ERRHRD, ERRdiskfull);
3518 error_to_writebrawerr(req);
3519 END_PROFILE(SMBwritebraw);
3520 return;
3523 total_written = nwritten;
3525 /* Allocate a buffer of 64k + length. */
3526 buf = TALLOC_ARRAY(NULL, char, 65540);
3527 if (!buf) {
3528 reply_doserror(req, ERRDOS, ERRnomem);
3529 error_to_writebrawerr(req);
3530 END_PROFILE(SMBwritebraw);
3531 return;
3534 /* Return a SMBwritebraw message to the redirector to tell
3535 * it to send more bytes */
3537 memcpy(buf, req->inbuf, smb_size);
3538 srv_set_message(buf,Protocol>PROTOCOL_COREPLUS?1:0,0,True);
3539 SCVAL(buf,smb_com,SMBwritebraw);
3540 SSVALS(buf,smb_vwv0,0xFFFF);
3541 show_msg(buf);
3542 if (!srv_send_smb(smbd_server_fd(),
3543 buf,
3544 IS_CONN_ENCRYPTED(conn))) {
3545 exit_server_cleanly("reply_writebraw: srv_send_smb "
3546 "failed.");
3549 /* Now read the raw data into the buffer and write it */
3550 status = read_smb_length(smbd_server_fd(), buf, SMB_SECONDARY_WAIT,
3551 &numtowrite);
3552 if (!NT_STATUS_IS_OK(status)) {
3553 exit_server_cleanly("secondary writebraw failed");
3556 /* Set up outbuf to return the correct size */
3557 reply_outbuf(req, 1, 0);
3559 if (numtowrite != 0) {
3561 if (numtowrite > 0xFFFF) {
3562 DEBUG(0,("reply_writebraw: Oversize secondary write "
3563 "raw requested (%u). Terminating\n",
3564 (unsigned int)numtowrite ));
3565 exit_server_cleanly("secondary writebraw failed");
3568 if (tcount > nwritten+numtowrite) {
3569 DEBUG(3,("reply_writebraw: Client overestimated the "
3570 "write %d %d %d\n",
3571 (int)tcount,(int)nwritten,(int)numtowrite));
3574 status = read_data(smbd_server_fd(), buf+4, numtowrite);
3576 if (!NT_STATUS_IS_OK(status)) {
3577 DEBUG(0,("reply_writebraw: Oversize secondary write "
3578 "raw read failed (%s). Terminating\n",
3579 nt_errstr(status)));
3580 exit_server_cleanly("secondary writebraw failed");
3583 nwritten = write_file(req,fsp,buf+4,startpos+nwritten,numtowrite);
3584 if (nwritten == -1) {
3585 TALLOC_FREE(buf);
3586 reply_unixerror(req, ERRHRD, ERRdiskfull);
3587 error_to_writebrawerr(req);
3588 END_PROFILE(SMBwritebraw);
3589 return;
3592 if (nwritten < (ssize_t)numtowrite) {
3593 SCVAL(req->outbuf,smb_rcls,ERRHRD);
3594 SSVAL(req->outbuf,smb_err,ERRdiskfull);
3597 if (nwritten > 0) {
3598 total_written += nwritten;
3602 TALLOC_FREE(buf);
3603 SSVAL(req->outbuf,smb_vwv0,total_written);
3605 status = sync_file(conn, fsp, write_through);
3606 if (!NT_STATUS_IS_OK(status)) {
3607 DEBUG(5,("reply_writebraw: sync_file for %s returned %s\n",
3608 fsp->fsp_name, nt_errstr(status) ));
3609 reply_nterror(req, status);
3610 error_to_writebrawerr(req);
3611 END_PROFILE(SMBwritebraw);
3612 return;
3615 DEBUG(3,("reply_writebraw: secondart write fnum=%d start=%.0f num=%d "
3616 "wrote=%d\n",
3617 fsp->fnum, (double)startpos, (int)numtowrite,
3618 (int)total_written));
3620 /* We won't return a status if write through is not selected - this
3621 * follows what WfWg does */
3622 END_PROFILE(SMBwritebraw);
3624 if (!write_through && total_written==tcount) {
3626 #if RABBIT_PELLET_FIX
3628 * Fix for "rabbit pellet" mode, trigger an early TCP ack by
3629 * sending a SMBkeepalive. Thanks to DaveCB at Sun for this.
3630 * JRA.
3632 if (!send_keepalive(smbd_server_fd())) {
3633 exit_server_cleanly("reply_writebraw: send of "
3634 "keepalive failed");
3636 #endif
3637 TALLOC_FREE(req->outbuf);
3639 return;
3642 #undef DBGC_CLASS
3643 #define DBGC_CLASS DBGC_LOCKING
3645 /****************************************************************************
3646 Reply to a writeunlock (core+).
3647 ****************************************************************************/
3649 void reply_writeunlock(struct smb_request *req)
3651 connection_struct *conn = req->conn;
3652 ssize_t nwritten = -1;
3653 size_t numtowrite;
3654 SMB_OFF_T startpos;
3655 char *data;
3656 NTSTATUS status = NT_STATUS_OK;
3657 files_struct *fsp;
3659 START_PROFILE(SMBwriteunlock);
3661 if (req->wct < 5) {
3662 reply_nterror(req, NT_STATUS_INVALID_PARAMETER);
3663 END_PROFILE(SMBwriteunlock);
3664 return;
3667 fsp = file_fsp(SVAL(req->inbuf,smb_vwv0));
3669 if (!check_fsp(conn, req, fsp, &current_user)) {
3670 END_PROFILE(SMBwriteunlock);
3671 return;
3674 if (!CHECK_WRITE(fsp)) {
3675 reply_doserror(req, ERRDOS,ERRbadaccess);
3676 END_PROFILE(SMBwriteunlock);
3677 return;
3680 numtowrite = SVAL(req->inbuf,smb_vwv1);
3681 startpos = IVAL_TO_SMB_OFF_T(req->inbuf,smb_vwv2);
3682 data = smb_buf(req->inbuf) + 3;
3684 if (numtowrite
3685 && is_locked(fsp, (uint32)req->smbpid, (SMB_BIG_UINT)numtowrite,
3686 (SMB_BIG_UINT)startpos, WRITE_LOCK)) {
3687 reply_doserror(req, ERRDOS, ERRlock);
3688 END_PROFILE(SMBwriteunlock);
3689 return;
3692 /* The special X/Open SMB protocol handling of
3693 zero length writes is *NOT* done for
3694 this call */
3695 if(numtowrite == 0) {
3696 nwritten = 0;
3697 } else {
3698 nwritten = write_file(req,fsp,data,startpos,numtowrite);
3701 status = sync_file(conn, fsp, False /* write through */);
3702 if (!NT_STATUS_IS_OK(status)) {
3703 DEBUG(5,("reply_writeunlock: sync_file for %s returned %s\n",
3704 fsp->fsp_name, nt_errstr(status) ));
3705 reply_nterror(req, status);
3706 END_PROFILE(SMBwriteunlock);
3707 return;
3710 if(((nwritten < numtowrite) && (numtowrite != 0))||(nwritten < 0)) {
3711 reply_unixerror(req, ERRHRD, ERRdiskfull);
3712 END_PROFILE(SMBwriteunlock);
3713 return;
3716 if (numtowrite) {
3717 status = do_unlock(smbd_messaging_context(),
3718 fsp,
3719 req->smbpid,
3720 (SMB_BIG_UINT)numtowrite,
3721 (SMB_BIG_UINT)startpos,
3722 WINDOWS_LOCK);
3724 if (NT_STATUS_V(status)) {
3725 reply_nterror(req, status);
3726 END_PROFILE(SMBwriteunlock);
3727 return;
3731 reply_outbuf(req, 1, 0);
3733 SSVAL(req->outbuf,smb_vwv0,nwritten);
3735 DEBUG(3,("writeunlock fnum=%d num=%d wrote=%d\n",
3736 fsp->fnum, (int)numtowrite, (int)nwritten));
3738 END_PROFILE(SMBwriteunlock);
3739 return;
3742 #undef DBGC_CLASS
3743 #define DBGC_CLASS DBGC_ALL
3745 /****************************************************************************
3746 Reply to a write.
3747 ****************************************************************************/
3749 void reply_write(struct smb_request *req)
3751 connection_struct *conn = req->conn;
3752 size_t numtowrite;
3753 ssize_t nwritten = -1;
3754 SMB_OFF_T startpos;
3755 char *data;
3756 files_struct *fsp;
3757 NTSTATUS status;
3759 START_PROFILE(SMBwrite);
3761 if (req->wct < 5) {
3762 END_PROFILE(SMBwrite);
3763 reply_nterror(req, NT_STATUS_INVALID_PARAMETER);
3764 return;
3767 /* If it's an IPC, pass off the pipe handler. */
3768 if (IS_IPC(conn)) {
3769 reply_pipe_write(req);
3770 END_PROFILE(SMBwrite);
3771 return;
3774 fsp = file_fsp(SVAL(req->inbuf,smb_vwv0));
3776 if (!check_fsp(conn, req, fsp, &current_user)) {
3777 END_PROFILE(SMBwrite);
3778 return;
3781 if (!CHECK_WRITE(fsp)) {
3782 reply_doserror(req, ERRDOS, ERRbadaccess);
3783 END_PROFILE(SMBwrite);
3784 return;
3787 numtowrite = SVAL(req->inbuf,smb_vwv1);
3788 startpos = IVAL_TO_SMB_OFF_T(req->inbuf,smb_vwv2);
3789 data = smb_buf(req->inbuf) + 3;
3791 if (is_locked(fsp, (uint32)req->smbpid, (SMB_BIG_UINT)numtowrite,
3792 (SMB_BIG_UINT)startpos, WRITE_LOCK)) {
3793 reply_doserror(req, ERRDOS, ERRlock);
3794 END_PROFILE(SMBwrite);
3795 return;
3799 * X/Open SMB protocol says that if smb_vwv1 is
3800 * zero then the file size should be extended or
3801 * truncated to the size given in smb_vwv[2-3].
3804 if(numtowrite == 0) {
3806 * This is actually an allocate call, and set EOF. JRA.
3808 nwritten = vfs_allocate_file_space(fsp, (SMB_OFF_T)startpos);
3809 if (nwritten < 0) {
3810 reply_nterror(req, NT_STATUS_DISK_FULL);
3811 END_PROFILE(SMBwrite);
3812 return;
3814 nwritten = vfs_set_filelen(fsp, (SMB_OFF_T)startpos);
3815 if (nwritten < 0) {
3816 reply_nterror(req, NT_STATUS_DISK_FULL);
3817 END_PROFILE(SMBwrite);
3818 return;
3820 trigger_write_time_update_immediate(fsp);
3821 } else {
3822 nwritten = write_file(req,fsp,data,startpos,numtowrite);
3825 status = sync_file(conn, fsp, False);
3826 if (!NT_STATUS_IS_OK(status)) {
3827 DEBUG(5,("reply_write: sync_file for %s returned %s\n",
3828 fsp->fsp_name, nt_errstr(status) ));
3829 reply_nterror(req, status);
3830 END_PROFILE(SMBwrite);
3831 return;
3834 if(((nwritten == 0) && (numtowrite != 0))||(nwritten < 0)) {
3835 reply_unixerror(req, ERRHRD, ERRdiskfull);
3836 END_PROFILE(SMBwrite);
3837 return;
3840 reply_outbuf(req, 1, 0);
3842 SSVAL(req->outbuf,smb_vwv0,nwritten);
3844 if (nwritten < (ssize_t)numtowrite) {
3845 SCVAL(req->outbuf,smb_rcls,ERRHRD);
3846 SSVAL(req->outbuf,smb_err,ERRdiskfull);
3849 DEBUG(3,("write fnum=%d num=%d wrote=%d\n", fsp->fnum, (int)numtowrite, (int)nwritten));
3851 END_PROFILE(SMBwrite);
3852 return;
3855 /****************************************************************************
3856 Ensure a buffer is a valid writeX for recvfile purposes.
3857 ****************************************************************************/
3859 #define STANDARD_WRITE_AND_X_HEADER_SIZE (smb_size - 4 + /* basic header */ \
3860 (2*14) + /* word count (including bcc) */ \
3861 1 /* pad byte */)
3863 bool is_valid_writeX_buffer(const uint8_t *inbuf)
3865 size_t numtowrite;
3866 connection_struct *conn = NULL;
3867 unsigned int doff = 0;
3868 size_t len = smb_len_large(inbuf);
3870 if (is_encrypted_packet(inbuf)) {
3871 /* Can't do this on encrypted
3872 * connections. */
3873 return false;
3876 if (CVAL(inbuf,smb_com) != SMBwriteX) {
3877 return false;
3880 if (CVAL(inbuf,smb_vwv0) != 0xFF ||
3881 CVAL(inbuf,smb_wct) != 14) {
3882 DEBUG(10,("is_valid_writeX_buffer: chained or "
3883 "invalid word length.\n"));
3884 return false;
3887 conn = conn_find(SVAL(inbuf, smb_tid));
3888 if (conn == NULL) {
3889 DEBUG(10,("is_valid_writeX_buffer: bad tid\n"));
3890 return false;
3892 if (IS_IPC(conn)) {
3893 DEBUG(10,("is_valid_writeX_buffer: IPC$ tid\n"));
3894 return false;
3896 doff = SVAL(inbuf,smb_vwv11);
3898 numtowrite = SVAL(inbuf,smb_vwv10);
3900 if (len > doff && len - doff > 0xFFFF) {
3901 numtowrite |= (((size_t)SVAL(inbuf,smb_vwv9))<<16);
3904 if (numtowrite == 0) {
3905 DEBUG(10,("is_valid_writeX_buffer: zero write\n"));
3906 return false;
3909 /* Ensure the sizes match up. */
3910 if (doff < STANDARD_WRITE_AND_X_HEADER_SIZE) {
3911 /* no pad byte...old smbclient :-( */
3912 DEBUG(10,("is_valid_writeX_buffer: small doff %u (min %u)\n",
3913 (unsigned int)doff,
3914 (unsigned int)STANDARD_WRITE_AND_X_HEADER_SIZE));
3915 return false;
3918 if (len - doff != numtowrite) {
3919 DEBUG(10,("is_valid_writeX_buffer: doff mismatch "
3920 "len = %u, doff = %u, numtowrite = %u\n",
3921 (unsigned int)len,
3922 (unsigned int)doff,
3923 (unsigned int)numtowrite ));
3924 return false;
3927 DEBUG(10,("is_valid_writeX_buffer: true "
3928 "len = %u, doff = %u, numtowrite = %u\n",
3929 (unsigned int)len,
3930 (unsigned int)doff,
3931 (unsigned int)numtowrite ));
3933 return true;
3936 /****************************************************************************
3937 Reply to a write and X.
3938 ****************************************************************************/
3940 void reply_write_and_X(struct smb_request *req)
3942 connection_struct *conn = req->conn;
3943 files_struct *fsp;
3944 SMB_OFF_T startpos;
3945 size_t numtowrite;
3946 bool write_through;
3947 ssize_t nwritten;
3948 unsigned int smb_doff;
3949 unsigned int smblen;
3950 char *data;
3951 NTSTATUS status;
3953 START_PROFILE(SMBwriteX);
3955 if ((req->wct != 12) && (req->wct != 14)) {
3956 reply_nterror(req, NT_STATUS_INVALID_PARAMETER);
3957 END_PROFILE(SMBwriteX);
3958 return;
3961 numtowrite = SVAL(req->inbuf,smb_vwv10);
3962 smb_doff = SVAL(req->inbuf,smb_vwv11);
3963 smblen = smb_len(req->inbuf);
3965 if (req->unread_bytes > 0xFFFF ||
3966 (smblen > smb_doff &&
3967 smblen - smb_doff > 0xFFFF)) {
3968 numtowrite |= (((size_t)SVAL(req->inbuf,smb_vwv9))<<16);
3971 if (req->unread_bytes) {
3972 /* Can't do a recvfile write on IPC$ */
3973 if (IS_IPC(conn)) {
3974 reply_nterror(req, NT_STATUS_INVALID_PARAMETER);
3975 END_PROFILE(SMBwriteX);
3976 return;
3978 if (numtowrite != req->unread_bytes) {
3979 reply_doserror(req, ERRDOS, ERRbadmem);
3980 END_PROFILE(SMBwriteX);
3981 return;
3983 } else {
3984 if (smb_doff > smblen || smb_doff + numtowrite < numtowrite ||
3985 smb_doff + numtowrite > smblen) {
3986 reply_doserror(req, ERRDOS, ERRbadmem);
3987 END_PROFILE(SMBwriteX);
3988 return;
3992 /* If it's an IPC, pass off the pipe handler. */
3993 if (IS_IPC(conn)) {
3994 if (req->unread_bytes) {
3995 reply_doserror(req, ERRDOS, ERRbadmem);
3996 END_PROFILE(SMBwriteX);
3997 return;
3999 reply_pipe_write_and_X(req);
4000 END_PROFILE(SMBwriteX);
4001 return;
4004 fsp = file_fsp(SVAL(req->inbuf,smb_vwv2));
4005 startpos = IVAL_TO_SMB_OFF_T(req->inbuf,smb_vwv3);
4006 write_through = BITSETW(req->inbuf+smb_vwv7,0);
4008 if (!check_fsp(conn, req, fsp, &current_user)) {
4009 END_PROFILE(SMBwriteX);
4010 return;
4013 if (!CHECK_WRITE(fsp)) {
4014 reply_doserror(req, ERRDOS, ERRbadaccess);
4015 END_PROFILE(SMBwriteX);
4016 return;
4019 data = smb_base(req->inbuf) + smb_doff;
4021 if(req->wct == 14) {
4022 #ifdef LARGE_SMB_OFF_T
4024 * This is a large offset (64 bit) write.
4026 startpos |= (((SMB_OFF_T)IVAL(req->inbuf,smb_vwv12)) << 32);
4028 #else /* !LARGE_SMB_OFF_T */
4031 * Ensure we haven't been sent a >32 bit offset.
4034 if(IVAL(req->inbuf,smb_vwv12) != 0) {
4035 DEBUG(0,("reply_write_and_X - large offset (%x << 32) "
4036 "used and we don't support 64 bit offsets.\n",
4037 (unsigned int)IVAL(req->inbuf,smb_vwv12) ));
4038 reply_doserror(req, ERRDOS, ERRbadaccess);
4039 END_PROFILE(SMBwriteX);
4040 return;
4043 #endif /* LARGE_SMB_OFF_T */
4046 if (is_locked(fsp,(uint32)req->smbpid,
4047 (SMB_BIG_UINT)numtowrite,
4048 (SMB_BIG_UINT)startpos, WRITE_LOCK)) {
4049 reply_doserror(req, ERRDOS, ERRlock);
4050 END_PROFILE(SMBwriteX);
4051 return;
4054 /* X/Open SMB protocol says that, unlike SMBwrite
4055 if the length is zero then NO truncation is
4056 done, just a write of zero. To truncate a file,
4057 use SMBwrite. */
4059 if(numtowrite == 0) {
4060 nwritten = 0;
4061 } else {
4063 if ((req->unread_bytes == 0) &&
4064 schedule_aio_write_and_X(conn, req, fsp, data, startpos,
4065 numtowrite)) {
4066 END_PROFILE(SMBwriteX);
4067 return;
4070 nwritten = write_file(req,fsp,data,startpos,numtowrite);
4073 if(((nwritten == 0) && (numtowrite != 0))||(nwritten < 0)) {
4074 reply_unixerror(req, ERRHRD, ERRdiskfull);
4075 END_PROFILE(SMBwriteX);
4076 return;
4079 reply_outbuf(req, 6, 0);
4080 SSVAL(req->outbuf,smb_vwv2,nwritten);
4081 SSVAL(req->outbuf,smb_vwv4,nwritten>>16);
4083 if (nwritten < (ssize_t)numtowrite) {
4084 SCVAL(req->outbuf,smb_rcls,ERRHRD);
4085 SSVAL(req->outbuf,smb_err,ERRdiskfull);
4088 DEBUG(3,("writeX fnum=%d num=%d wrote=%d\n",
4089 fsp->fnum, (int)numtowrite, (int)nwritten));
4091 status = sync_file(conn, fsp, write_through);
4092 if (!NT_STATUS_IS_OK(status)) {
4093 DEBUG(5,("reply_write_and_X: sync_file for %s returned %s\n",
4094 fsp->fsp_name, nt_errstr(status) ));
4095 reply_nterror(req, status);
4096 END_PROFILE(SMBwriteX);
4097 return;
4100 END_PROFILE(SMBwriteX);
4101 chain_reply(req);
4102 return;
4105 /****************************************************************************
4106 Reply to a lseek.
4107 ****************************************************************************/
4109 void reply_lseek(struct smb_request *req)
4111 connection_struct *conn = req->conn;
4112 SMB_OFF_T startpos;
4113 SMB_OFF_T res= -1;
4114 int mode,umode;
4115 files_struct *fsp;
4117 START_PROFILE(SMBlseek);
4119 if (req->wct < 4) {
4120 reply_nterror(req, NT_STATUS_INVALID_PARAMETER);
4121 END_PROFILE(SMBlseek);
4122 return;
4125 fsp = file_fsp(SVAL(req->inbuf,smb_vwv0));
4127 if (!check_fsp(conn, req, fsp, &current_user)) {
4128 return;
4131 flush_write_cache(fsp, SEEK_FLUSH);
4133 mode = SVAL(req->inbuf,smb_vwv1) & 3;
4134 /* NB. This doesn't use IVAL_TO_SMB_OFF_T as startpos can be signed in this case. */
4135 startpos = (SMB_OFF_T)IVALS(req->inbuf,smb_vwv2);
4137 switch (mode) {
4138 case 0:
4139 umode = SEEK_SET;
4140 res = startpos;
4141 break;
4142 case 1:
4143 umode = SEEK_CUR;
4144 res = fsp->fh->pos + startpos;
4145 break;
4146 case 2:
4147 umode = SEEK_END;
4148 break;
4149 default:
4150 umode = SEEK_SET;
4151 res = startpos;
4152 break;
4155 if (umode == SEEK_END) {
4156 if((res = SMB_VFS_LSEEK(fsp,startpos,umode)) == -1) {
4157 if(errno == EINVAL) {
4158 SMB_OFF_T current_pos = startpos;
4159 SMB_STRUCT_STAT sbuf;
4161 if(SMB_VFS_FSTAT(fsp, &sbuf) == -1) {
4162 reply_unixerror(req, ERRDOS,
4163 ERRnoaccess);
4164 END_PROFILE(SMBlseek);
4165 return;
4168 current_pos += sbuf.st_size;
4169 if(current_pos < 0)
4170 res = SMB_VFS_LSEEK(fsp,0,SEEK_SET);
4174 if(res == -1) {
4175 reply_unixerror(req, ERRDOS, ERRnoaccess);
4176 END_PROFILE(SMBlseek);
4177 return;
4181 fsp->fh->pos = res;
4183 reply_outbuf(req, 2, 0);
4184 SIVAL(req->outbuf,smb_vwv0,res);
4186 DEBUG(3,("lseek fnum=%d ofs=%.0f newpos = %.0f mode=%d\n",
4187 fsp->fnum, (double)startpos, (double)res, mode));
4189 END_PROFILE(SMBlseek);
4190 return;
4193 /****************************************************************************
4194 Reply to a flush.
4195 ****************************************************************************/
4197 void reply_flush(struct smb_request *req)
4199 connection_struct *conn = req->conn;
4200 uint16 fnum;
4201 files_struct *fsp;
4203 START_PROFILE(SMBflush);
4205 if (req->wct < 1) {
4206 reply_nterror(req, NT_STATUS_INVALID_PARAMETER);
4207 return;
4210 fnum = SVAL(req->inbuf,smb_vwv0);
4211 fsp = file_fsp(fnum);
4213 if ((fnum != 0xFFFF) && !check_fsp(conn, req, fsp, &current_user)) {
4214 return;
4217 if (!fsp) {
4218 file_sync_all(conn);
4219 } else {
4220 NTSTATUS status = sync_file(conn, fsp, True);
4221 if (!NT_STATUS_IS_OK(status)) {
4222 DEBUG(5,("reply_flush: sync_file for %s returned %s\n",
4223 fsp->fsp_name, nt_errstr(status) ));
4224 reply_nterror(req, status);
4225 END_PROFILE(SMBflush);
4226 return;
4230 reply_outbuf(req, 0, 0);
4232 DEBUG(3,("flush\n"));
4233 END_PROFILE(SMBflush);
4234 return;
4237 /****************************************************************************
4238 Reply to a exit.
4239 conn POINTER CAN BE NULL HERE !
4240 ****************************************************************************/
4242 void reply_exit(struct smb_request *req)
4244 START_PROFILE(SMBexit);
4246 file_close_pid(req->smbpid, req->vuid);
4248 reply_outbuf(req, 0, 0);
4250 DEBUG(3,("exit\n"));
4252 END_PROFILE(SMBexit);
4253 return;
4256 /****************************************************************************
4257 Reply to a close - has to deal with closing a directory opened by NT SMB's.
4258 ****************************************************************************/
4260 void reply_close(struct smb_request *req)
4262 connection_struct *conn = req->conn;
4263 NTSTATUS status = NT_STATUS_OK;
4264 files_struct *fsp = NULL;
4265 START_PROFILE(SMBclose);
4267 if (req->wct < 3) {
4268 reply_nterror(req, NT_STATUS_INVALID_PARAMETER);
4269 END_PROFILE(SMBclose);
4270 return;
4273 /* If it's an IPC, pass off to the pipe handler. */
4274 if (IS_IPC(conn)) {
4275 reply_pipe_close(conn, req);
4276 END_PROFILE(SMBclose);
4277 return;
4280 fsp = file_fsp(SVAL(req->inbuf,smb_vwv0));
4283 * We can only use CHECK_FSP if we know it's not a directory.
4286 if(!fsp || (fsp->conn != conn) || (fsp->vuid != current_user.vuid)) {
4287 reply_doserror(req, ERRDOS, ERRbadfid);
4288 END_PROFILE(SMBclose);
4289 return;
4292 if(fsp->is_directory) {
4294 * Special case - close NT SMB directory handle.
4296 DEBUG(3,("close directory fnum=%d\n", fsp->fnum));
4297 status = close_file(fsp,NORMAL_CLOSE);
4298 } else {
4299 time_t t;
4301 * Close ordinary file.
4304 DEBUG(3,("close fd=%d fnum=%d (numopen=%d)\n",
4305 fsp->fh->fd, fsp->fnum,
4306 conn->num_files_open));
4309 * Take care of any time sent in the close.
4312 t = srv_make_unix_date3(req->inbuf+smb_vwv1);
4313 set_close_write_time(fsp, convert_time_t_to_timespec(t));
4316 * close_file() returns the unix errno if an error
4317 * was detected on close - normally this is due to
4318 * a disk full error. If not then it was probably an I/O error.
4321 status = close_file(fsp,NORMAL_CLOSE);
4324 if (!NT_STATUS_IS_OK(status)) {
4325 reply_nterror(req, status);
4326 END_PROFILE(SMBclose);
4327 return;
4330 reply_outbuf(req, 0, 0);
4331 END_PROFILE(SMBclose);
4332 return;
4335 /****************************************************************************
4336 Reply to a writeclose (Core+ protocol).
4337 ****************************************************************************/
4339 void reply_writeclose(struct smb_request *req)
4341 connection_struct *conn = req->conn;
4342 size_t numtowrite;
4343 ssize_t nwritten = -1;
4344 NTSTATUS close_status = NT_STATUS_OK;
4345 SMB_OFF_T startpos;
4346 char *data;
4347 struct timespec mtime;
4348 files_struct *fsp;
4350 START_PROFILE(SMBwriteclose);
4352 if (req->wct < 6) {
4353 reply_nterror(req, NT_STATUS_INVALID_PARAMETER);
4354 END_PROFILE(SMBwriteclose);
4355 return;
4358 fsp = file_fsp(SVAL(req->inbuf,smb_vwv0));
4360 if (!check_fsp(conn, req, fsp, &current_user)) {
4361 END_PROFILE(SMBwriteclose);
4362 return;
4364 if (!CHECK_WRITE(fsp)) {
4365 reply_doserror(req, ERRDOS,ERRbadaccess);
4366 END_PROFILE(SMBwriteclose);
4367 return;
4370 numtowrite = SVAL(req->inbuf,smb_vwv1);
4371 startpos = IVAL_TO_SMB_OFF_T(req->inbuf,smb_vwv2);
4372 mtime = convert_time_t_to_timespec(srv_make_unix_date3(
4373 req->inbuf+smb_vwv4));
4374 data = smb_buf(req->inbuf) + 1;
4376 if (numtowrite
4377 && is_locked(fsp, (uint32)req->smbpid, (SMB_BIG_UINT)numtowrite,
4378 (SMB_BIG_UINT)startpos, WRITE_LOCK)) {
4379 reply_doserror(req, ERRDOS,ERRlock);
4380 END_PROFILE(SMBwriteclose);
4381 return;
4384 nwritten = write_file(req,fsp,data,startpos,numtowrite);
4386 set_close_write_time(fsp, mtime);
4389 * More insanity. W2K only closes the file if writelen > 0.
4390 * JRA.
4393 if (numtowrite) {
4394 DEBUG(3,("reply_writeclose: zero length write doesn't close file %s\n",
4395 fsp->fsp_name ));
4396 close_status = close_file(fsp,NORMAL_CLOSE);
4399 DEBUG(3,("writeclose fnum=%d num=%d wrote=%d (numopen=%d)\n",
4400 fsp->fnum, (int)numtowrite, (int)nwritten,
4401 conn->num_files_open));
4403 if(((nwritten == 0) && (numtowrite != 0))||(nwritten < 0)) {
4404 reply_doserror(req, ERRHRD, ERRdiskfull);
4405 END_PROFILE(SMBwriteclose);
4406 return;
4409 if(!NT_STATUS_IS_OK(close_status)) {
4410 reply_nterror(req, close_status);
4411 END_PROFILE(SMBwriteclose);
4412 return;
4415 reply_outbuf(req, 1, 0);
4417 SSVAL(req->outbuf,smb_vwv0,nwritten);
4418 END_PROFILE(SMBwriteclose);
4419 return;
4422 #undef DBGC_CLASS
4423 #define DBGC_CLASS DBGC_LOCKING
4425 /****************************************************************************
4426 Reply to a lock.
4427 ****************************************************************************/
4429 void reply_lock(struct smb_request *req)
4431 connection_struct *conn = req->conn;
4432 SMB_BIG_UINT count,offset;
4433 NTSTATUS status;
4434 files_struct *fsp;
4435 struct byte_range_lock *br_lck = NULL;
4437 START_PROFILE(SMBlock);
4439 if (req->wct < 5) {
4440 reply_nterror(req, NT_STATUS_INVALID_PARAMETER);
4441 END_PROFILE(SMBlock);
4442 return;
4445 fsp = file_fsp(SVAL(req->inbuf,smb_vwv0));
4447 if (!check_fsp(conn, req, fsp, &current_user)) {
4448 END_PROFILE(SMBlock);
4449 return;
4452 release_level_2_oplocks_on_change(fsp);
4454 count = (SMB_BIG_UINT)IVAL(req->inbuf,smb_vwv1);
4455 offset = (SMB_BIG_UINT)IVAL(req->inbuf,smb_vwv3);
4457 DEBUG(3,("lock fd=%d fnum=%d offset=%.0f count=%.0f\n",
4458 fsp->fh->fd, fsp->fnum, (double)offset, (double)count));
4460 br_lck = do_lock(smbd_messaging_context(),
4461 fsp,
4462 req->smbpid,
4463 count,
4464 offset,
4465 WRITE_LOCK,
4466 WINDOWS_LOCK,
4467 False, /* Non-blocking lock. */
4468 &status,
4469 NULL);
4471 TALLOC_FREE(br_lck);
4473 if (NT_STATUS_V(status)) {
4474 reply_nterror(req, status);
4475 END_PROFILE(SMBlock);
4476 return;
4479 reply_outbuf(req, 0, 0);
4481 END_PROFILE(SMBlock);
4482 return;
4485 /****************************************************************************
4486 Reply to a unlock.
4487 ****************************************************************************/
4489 void reply_unlock(struct smb_request *req)
4491 connection_struct *conn = req->conn;
4492 SMB_BIG_UINT count,offset;
4493 NTSTATUS status;
4494 files_struct *fsp;
4496 START_PROFILE(SMBunlock);
4498 if (req->wct < 5) {
4499 reply_nterror(req, NT_STATUS_INVALID_PARAMETER);
4500 END_PROFILE(SMBunlock);
4501 return;
4504 fsp = file_fsp(SVAL(req->inbuf,smb_vwv0));
4506 if (!check_fsp(conn, req, fsp, &current_user)) {
4507 END_PROFILE(SMBunlock);
4508 return;
4511 count = (SMB_BIG_UINT)IVAL(req->inbuf,smb_vwv1);
4512 offset = (SMB_BIG_UINT)IVAL(req->inbuf,smb_vwv3);
4514 status = do_unlock(smbd_messaging_context(),
4515 fsp,
4516 req->smbpid,
4517 count,
4518 offset,
4519 WINDOWS_LOCK);
4521 if (NT_STATUS_V(status)) {
4522 reply_nterror(req, status);
4523 END_PROFILE(SMBunlock);
4524 return;
4527 DEBUG( 3, ( "unlock fd=%d fnum=%d offset=%.0f count=%.0f\n",
4528 fsp->fh->fd, fsp->fnum, (double)offset, (double)count ) );
4530 reply_outbuf(req, 0, 0);
4532 END_PROFILE(SMBunlock);
4533 return;
4536 #undef DBGC_CLASS
4537 #define DBGC_CLASS DBGC_ALL
4539 /****************************************************************************
4540 Reply to a tdis.
4541 conn POINTER CAN BE NULL HERE !
4542 ****************************************************************************/
4544 void reply_tdis(struct smb_request *req)
4546 connection_struct *conn = req->conn;
4547 START_PROFILE(SMBtdis);
4549 if (!conn) {
4550 DEBUG(4,("Invalid connection in tdis\n"));
4551 reply_doserror(req, ERRSRV, ERRinvnid);
4552 END_PROFILE(SMBtdis);
4553 return;
4556 conn->used = False;
4558 close_cnum(conn,req->vuid);
4559 req->conn = NULL;
4561 reply_outbuf(req, 0, 0);
4562 END_PROFILE(SMBtdis);
4563 return;
4566 /****************************************************************************
4567 Reply to a echo.
4568 conn POINTER CAN BE NULL HERE !
4569 ****************************************************************************/
4571 void reply_echo(struct smb_request *req)
4573 connection_struct *conn = req->conn;
4574 int smb_reverb;
4575 int seq_num;
4576 unsigned int data_len = smb_buflen(req->inbuf);
4578 START_PROFILE(SMBecho);
4580 if (req->wct < 1) {
4581 reply_nterror(req, NT_STATUS_INVALID_PARAMETER);
4582 END_PROFILE(SMBecho);
4583 return;
4586 if (data_len > BUFFER_SIZE) {
4587 DEBUG(0,("reply_echo: data_len too large.\n"));
4588 reply_nterror(req, NT_STATUS_INSUFFICIENT_RESOURCES);
4589 END_PROFILE(SMBecho);
4590 return;
4593 smb_reverb = SVAL(req->inbuf,smb_vwv0);
4595 reply_outbuf(req, 1, data_len);
4597 /* copy any incoming data back out */
4598 if (data_len > 0) {
4599 memcpy(smb_buf(req->outbuf),smb_buf(req->inbuf),data_len);
4602 if (smb_reverb > 100) {
4603 DEBUG(0,("large reverb (%d)?? Setting to 100\n",smb_reverb));
4604 smb_reverb = 100;
4607 for (seq_num =1 ; seq_num <= smb_reverb ; seq_num++) {
4608 SSVAL(req->outbuf,smb_vwv0,seq_num);
4610 show_msg((char *)req->outbuf);
4611 if (!srv_send_smb(smbd_server_fd(),
4612 (char *)req->outbuf,
4613 IS_CONN_ENCRYPTED(conn)||req->encrypted))
4614 exit_server_cleanly("reply_echo: srv_send_smb failed.");
4617 DEBUG(3,("echo %d times\n", smb_reverb));
4619 TALLOC_FREE(req->outbuf);
4621 smb_echo_count++;
4623 END_PROFILE(SMBecho);
4624 return;
4627 /****************************************************************************
4628 Reply to a printopen.
4629 ****************************************************************************/
4631 void reply_printopen(struct smb_request *req)
4633 connection_struct *conn = req->conn;
4634 files_struct *fsp;
4635 NTSTATUS status;
4637 START_PROFILE(SMBsplopen);
4639 if (req->wct < 2) {
4640 reply_nterror(req, NT_STATUS_INVALID_PARAMETER);
4641 END_PROFILE(SMBsplopen);
4642 return;
4645 if (!CAN_PRINT(conn)) {
4646 reply_doserror(req, ERRDOS, ERRnoaccess);
4647 END_PROFILE(SMBsplopen);
4648 return;
4651 status = file_new(conn, &fsp);
4652 if(!NT_STATUS_IS_OK(status)) {
4653 reply_nterror(req, status);
4654 END_PROFILE(SMBsplopen);
4655 return;
4658 /* Open for exclusive use, write only. */
4659 status = print_fsp_open(conn, NULL, fsp);
4661 if (!NT_STATUS_IS_OK(status)) {
4662 file_free(fsp);
4663 reply_nterror(req, status);
4664 END_PROFILE(SMBsplopen);
4665 return;
4668 reply_outbuf(req, 1, 0);
4669 SSVAL(req->outbuf,smb_vwv0,fsp->fnum);
4671 DEBUG(3,("openprint fd=%d fnum=%d\n",
4672 fsp->fh->fd, fsp->fnum));
4674 END_PROFILE(SMBsplopen);
4675 return;
4678 /****************************************************************************
4679 Reply to a printclose.
4680 ****************************************************************************/
4682 void reply_printclose(struct smb_request *req)
4684 connection_struct *conn = req->conn;
4685 files_struct *fsp;
4686 NTSTATUS status;
4688 START_PROFILE(SMBsplclose);
4690 if (req->wct < 1) {
4691 reply_nterror(req, NT_STATUS_INVALID_PARAMETER);
4692 END_PROFILE(SMBsplclose);
4693 return;
4696 fsp = file_fsp(SVAL(req->inbuf,smb_vwv0));
4698 if (!check_fsp(conn, req, fsp, &current_user)) {
4699 END_PROFILE(SMBsplclose);
4700 return;
4703 if (!CAN_PRINT(conn)) {
4704 reply_nterror(req, NT_STATUS_DOS(ERRSRV, ERRerror));
4705 END_PROFILE(SMBsplclose);
4706 return;
4709 DEBUG(3,("printclose fd=%d fnum=%d\n",
4710 fsp->fh->fd,fsp->fnum));
4712 status = close_file(fsp,NORMAL_CLOSE);
4714 if(!NT_STATUS_IS_OK(status)) {
4715 reply_nterror(req, status);
4716 END_PROFILE(SMBsplclose);
4717 return;
4720 reply_outbuf(req, 0, 0);
4722 END_PROFILE(SMBsplclose);
4723 return;
4726 /****************************************************************************
4727 Reply to a printqueue.
4728 ****************************************************************************/
4730 void reply_printqueue(struct smb_request *req)
4732 connection_struct *conn = req->conn;
4733 int max_count;
4734 int start_index;
4736 START_PROFILE(SMBsplretq);
4738 if (req->wct < 2) {
4739 reply_nterror(req, NT_STATUS_INVALID_PARAMETER);
4740 END_PROFILE(SMBsplretq);
4741 return;
4744 max_count = SVAL(req->inbuf,smb_vwv0);
4745 start_index = SVAL(req->inbuf,smb_vwv1);
4747 /* we used to allow the client to get the cnum wrong, but that
4748 is really quite gross and only worked when there was only
4749 one printer - I think we should now only accept it if they
4750 get it right (tridge) */
4751 if (!CAN_PRINT(conn)) {
4752 reply_doserror(req, ERRDOS, ERRnoaccess);
4753 END_PROFILE(SMBsplretq);
4754 return;
4757 reply_outbuf(req, 2, 3);
4758 SSVAL(req->outbuf,smb_vwv0,0);
4759 SSVAL(req->outbuf,smb_vwv1,0);
4760 SCVAL(smb_buf(req->outbuf),0,1);
4761 SSVAL(smb_buf(req->outbuf),1,0);
4763 DEBUG(3,("printqueue start_index=%d max_count=%d\n",
4764 start_index, max_count));
4767 print_queue_struct *queue = NULL;
4768 print_status_struct status;
4769 int count = print_queue_status(SNUM(conn), &queue, &status);
4770 int num_to_get = ABS(max_count);
4771 int first = (max_count>0?start_index:start_index+max_count+1);
4772 int i;
4774 if (first >= count)
4775 num_to_get = 0;
4776 else
4777 num_to_get = MIN(num_to_get,count-first);
4780 for (i=first;i<first+num_to_get;i++) {
4781 char blob[28];
4782 char *p = blob;
4784 srv_put_dos_date2(p,0,queue[i].time);
4785 SCVAL(p,4,(queue[i].status==LPQ_PRINTING?2:3));
4786 SSVAL(p,5, queue[i].job);
4787 SIVAL(p,7,queue[i].size);
4788 SCVAL(p,11,0);
4789 srvstr_push(blob, req->flags2, p+12,
4790 queue[i].fs_user, 16, STR_ASCII);
4792 if (message_push_blob(
4793 &req->outbuf,
4794 data_blob_const(
4795 blob, sizeof(blob))) == -1) {
4796 reply_nterror(req, NT_STATUS_NO_MEMORY);
4797 END_PROFILE(SMBsplretq);
4798 return;
4802 if (count > 0) {
4803 SSVAL(req->outbuf,smb_vwv0,count);
4804 SSVAL(req->outbuf,smb_vwv1,
4805 (max_count>0?first+count:first-1));
4806 SCVAL(smb_buf(req->outbuf),0,1);
4807 SSVAL(smb_buf(req->outbuf),1,28*count);
4810 SAFE_FREE(queue);
4812 DEBUG(3,("%d entries returned in queue\n",count));
4815 END_PROFILE(SMBsplretq);
4816 return;
4819 /****************************************************************************
4820 Reply to a printwrite.
4821 ****************************************************************************/
4823 void reply_printwrite(struct smb_request *req)
4825 connection_struct *conn = req->conn;
4826 int numtowrite;
4827 char *data;
4828 files_struct *fsp;
4830 START_PROFILE(SMBsplwr);
4832 if (req->wct < 1) {
4833 reply_nterror(req, NT_STATUS_INVALID_PARAMETER);
4834 END_PROFILE(SMBsplwr);
4835 return;
4838 fsp = file_fsp(SVAL(req->inbuf,smb_vwv0));
4840 if (!check_fsp(conn, req, fsp, &current_user)) {
4841 END_PROFILE(SMBsplwr);
4842 return;
4845 if (!CAN_PRINT(conn)) {
4846 reply_doserror(req, ERRDOS, ERRnoaccess);
4847 END_PROFILE(SMBsplwr);
4848 return;
4851 if (!CHECK_WRITE(fsp)) {
4852 reply_doserror(req, ERRDOS, ERRbadaccess);
4853 END_PROFILE(SMBsplwr);
4854 return;
4857 numtowrite = SVAL(smb_buf(req->inbuf),1);
4859 if (smb_buflen(req->inbuf) < numtowrite + 3) {
4860 reply_nterror(req, NT_STATUS_INVALID_PARAMETER);
4861 END_PROFILE(SMBsplwr);
4862 return;
4865 data = smb_buf(req->inbuf) + 3;
4867 if (write_file(req,fsp,data,-1,numtowrite) != numtowrite) {
4868 reply_unixerror(req, ERRHRD, ERRdiskfull);
4869 END_PROFILE(SMBsplwr);
4870 return;
4873 DEBUG( 3, ( "printwrite fnum=%d num=%d\n", fsp->fnum, numtowrite ) );
4875 END_PROFILE(SMBsplwr);
4876 return;
4879 /****************************************************************************
4880 Reply to a mkdir.
4881 ****************************************************************************/
4883 void reply_mkdir(struct smb_request *req)
4885 connection_struct *conn = req->conn;
4886 char *directory = NULL;
4887 NTSTATUS status;
4888 SMB_STRUCT_STAT sbuf;
4889 TALLOC_CTX *ctx = talloc_tos();
4891 START_PROFILE(SMBmkdir);
4893 srvstr_get_path(ctx, (char *)req->inbuf, req->flags2, &directory,
4894 smb_buf(req->inbuf) + 1, 0,
4895 STR_TERMINATE, &status);
4896 if (!NT_STATUS_IS_OK(status)) {
4897 reply_nterror(req, status);
4898 END_PROFILE(SMBmkdir);
4899 return;
4902 status = resolve_dfspath(ctx, conn,
4903 req->flags2 & FLAGS2_DFS_PATHNAMES,
4904 directory,
4905 &directory);
4906 if (!NT_STATUS_IS_OK(status)) {
4907 if (NT_STATUS_EQUAL(status,NT_STATUS_PATH_NOT_COVERED)) {
4908 reply_botherror(req, NT_STATUS_PATH_NOT_COVERED,
4909 ERRSRV, ERRbadpath);
4910 END_PROFILE(SMBmkdir);
4911 return;
4913 reply_nterror(req, status);
4914 END_PROFILE(SMBmkdir);
4915 return;
4918 status = unix_convert(ctx, conn, directory, False, &directory, NULL, &sbuf);
4919 if (!NT_STATUS_IS_OK(status)) {
4920 reply_nterror(req, status);
4921 END_PROFILE(SMBmkdir);
4922 return;
4925 status = check_name(conn, directory);
4926 if (!NT_STATUS_IS_OK(status)) {
4927 reply_nterror(req, status);
4928 END_PROFILE(SMBmkdir);
4929 return;
4932 status = create_directory(conn, req, directory);
4934 DEBUG(5, ("create_directory returned %s\n", nt_errstr(status)));
4936 if (!NT_STATUS_IS_OK(status)) {
4938 if (!use_nt_status()
4939 && NT_STATUS_EQUAL(status,
4940 NT_STATUS_OBJECT_NAME_COLLISION)) {
4942 * Yes, in the DOS error code case we get a
4943 * ERRDOS:ERRnoaccess here. See BASE-SAMBA3ERROR
4944 * samba4 torture test.
4946 status = NT_STATUS_DOS(ERRDOS, ERRnoaccess);
4949 reply_nterror(req, status);
4950 END_PROFILE(SMBmkdir);
4951 return;
4954 reply_outbuf(req, 0, 0);
4956 DEBUG( 3, ( "mkdir %s\n", directory ) );
4958 END_PROFILE(SMBmkdir);
4959 return;
4962 /****************************************************************************
4963 Static function used by reply_rmdir to delete an entire directory
4964 tree recursively. Return True on ok, False on fail.
4965 ****************************************************************************/
4967 static bool recursive_rmdir(TALLOC_CTX *ctx,
4968 connection_struct *conn,
4969 char *directory)
4971 const char *dname = NULL;
4972 bool ret = True;
4973 long offset = 0;
4974 struct smb_Dir *dir_hnd = OpenDir(talloc_tos(), conn, directory,
4975 NULL, 0);
4977 if(dir_hnd == NULL)
4978 return False;
4980 while((dname = ReadDirName(dir_hnd, &offset))) {
4981 char *fullname = NULL;
4982 SMB_STRUCT_STAT st;
4984 if (ISDOT(dname) || ISDOTDOT(dname)) {
4985 continue;
4988 if (!is_visible_file(conn, directory, dname, &st, False)) {
4989 continue;
4992 /* Construct the full name. */
4993 fullname = talloc_asprintf(ctx,
4994 "%s/%s",
4995 directory,
4996 dname);
4997 if (!fullname) {
4998 errno = ENOMEM;
4999 ret = False;
5000 break;
5003 if(SMB_VFS_LSTAT(conn,fullname, &st) != 0) {
5004 ret = False;
5005 break;
5008 if(st.st_mode & S_IFDIR) {
5009 if(!recursive_rmdir(ctx, conn, fullname)) {
5010 ret = False;
5011 break;
5013 if(SMB_VFS_RMDIR(conn,fullname) != 0) {
5014 ret = False;
5015 break;
5017 } else if(SMB_VFS_UNLINK(conn,fullname) != 0) {
5018 ret = False;
5019 break;
5021 TALLOC_FREE(fullname);
5023 TALLOC_FREE(dir_hnd);
5024 return ret;
5027 /****************************************************************************
5028 The internals of the rmdir code - called elsewhere.
5029 ****************************************************************************/
5031 NTSTATUS rmdir_internals(TALLOC_CTX *ctx,
5032 connection_struct *conn,
5033 const char *directory)
5035 int ret;
5036 SMB_STRUCT_STAT st;
5038 /* Might be a symlink. */
5039 if(SMB_VFS_LSTAT(conn, directory, &st) != 0) {
5040 return map_nt_error_from_unix(errno);
5043 if (S_ISLNK(st.st_mode)) {
5044 /* Is what it points to a directory ? */
5045 if(SMB_VFS_STAT(conn, directory, &st) != 0) {
5046 return map_nt_error_from_unix(errno);
5048 if (!(S_ISDIR(st.st_mode))) {
5049 return NT_STATUS_NOT_A_DIRECTORY;
5051 ret = SMB_VFS_UNLINK(conn,directory);
5052 } else {
5053 ret = SMB_VFS_RMDIR(conn,directory);
5055 if (ret == 0) {
5056 notify_fname(conn, NOTIFY_ACTION_REMOVED,
5057 FILE_NOTIFY_CHANGE_DIR_NAME,
5058 directory);
5059 return NT_STATUS_OK;
5062 if(((errno == ENOTEMPTY)||(errno == EEXIST)) && lp_veto_files(SNUM(conn))) {
5064 * Check to see if the only thing in this directory are
5065 * vetoed files/directories. If so then delete them and
5066 * retry. If we fail to delete any of them (and we *don't*
5067 * do a recursive delete) then fail the rmdir.
5069 const char *dname;
5070 long dirpos = 0;
5071 struct smb_Dir *dir_hnd = OpenDir(talloc_tos(), conn,
5072 directory, NULL, 0);
5074 if(dir_hnd == NULL) {
5075 errno = ENOTEMPTY;
5076 goto err;
5079 while ((dname = ReadDirName(dir_hnd,&dirpos))) {
5080 if((strcmp(dname, ".") == 0) || (strcmp(dname, "..")==0))
5081 continue;
5082 if (!is_visible_file(conn, directory, dname, &st, False))
5083 continue;
5084 if(!IS_VETO_PATH(conn, dname)) {
5085 TALLOC_FREE(dir_hnd);
5086 errno = ENOTEMPTY;
5087 goto err;
5091 /* We only have veto files/directories.
5092 * Are we allowed to delete them ? */
5094 if(!lp_recursive_veto_delete(SNUM(conn))) {
5095 TALLOC_FREE(dir_hnd);
5096 errno = ENOTEMPTY;
5097 goto err;
5100 /* Do a recursive delete. */
5101 RewindDir(dir_hnd,&dirpos);
5102 while ((dname = ReadDirName(dir_hnd,&dirpos))) {
5103 char *fullname = NULL;
5105 if (ISDOT(dname) || ISDOTDOT(dname)) {
5106 continue;
5108 if (!is_visible_file(conn, directory, dname, &st, False)) {
5109 continue;
5112 fullname = talloc_asprintf(ctx,
5113 "%s/%s",
5114 directory,
5115 dname);
5117 if(!fullname) {
5118 errno = ENOMEM;
5119 break;
5122 if(SMB_VFS_LSTAT(conn,fullname, &st) != 0) {
5123 break;
5125 if(st.st_mode & S_IFDIR) {
5126 if(!recursive_rmdir(ctx, conn, fullname)) {
5127 break;
5129 if(SMB_VFS_RMDIR(conn,fullname) != 0) {
5130 break;
5132 } else if(SMB_VFS_UNLINK(conn,fullname) != 0) {
5133 break;
5135 TALLOC_FREE(fullname);
5137 TALLOC_FREE(dir_hnd);
5138 /* Retry the rmdir */
5139 ret = SMB_VFS_RMDIR(conn,directory);
5142 err:
5144 if (ret != 0) {
5145 DEBUG(3,("rmdir_internals: couldn't remove directory %s : "
5146 "%s\n", directory,strerror(errno)));
5147 return map_nt_error_from_unix(errno);
5150 notify_fname(conn, NOTIFY_ACTION_REMOVED,
5151 FILE_NOTIFY_CHANGE_DIR_NAME,
5152 directory);
5154 return NT_STATUS_OK;
5157 /****************************************************************************
5158 Reply to a rmdir.
5159 ****************************************************************************/
5161 void reply_rmdir(struct smb_request *req)
5163 connection_struct *conn = req->conn;
5164 char *directory = NULL;
5165 SMB_STRUCT_STAT sbuf;
5166 NTSTATUS status;
5167 TALLOC_CTX *ctx = talloc_tos();
5169 START_PROFILE(SMBrmdir);
5171 srvstr_get_path(ctx, (char *)req->inbuf, req->flags2, &directory,
5172 smb_buf(req->inbuf) + 1, 0,
5173 STR_TERMINATE, &status);
5174 if (!NT_STATUS_IS_OK(status)) {
5175 reply_nterror(req, status);
5176 END_PROFILE(SMBrmdir);
5177 return;
5180 status = resolve_dfspath(ctx, conn,
5181 req->flags2 & FLAGS2_DFS_PATHNAMES,
5182 directory,
5183 &directory);
5184 if (!NT_STATUS_IS_OK(status)) {
5185 if (NT_STATUS_EQUAL(status,NT_STATUS_PATH_NOT_COVERED)) {
5186 reply_botherror(req, NT_STATUS_PATH_NOT_COVERED,
5187 ERRSRV, ERRbadpath);
5188 END_PROFILE(SMBrmdir);
5189 return;
5191 reply_nterror(req, status);
5192 END_PROFILE(SMBrmdir);
5193 return;
5196 status = unix_convert(ctx, conn, directory, False, &directory,
5197 NULL, &sbuf);
5198 if (!NT_STATUS_IS_OK(status)) {
5199 reply_nterror(req, status);
5200 END_PROFILE(SMBrmdir);
5201 return;
5204 status = check_name(conn, directory);
5205 if (!NT_STATUS_IS_OK(status)) {
5206 reply_nterror(req, status);
5207 END_PROFILE(SMBrmdir);
5208 return;
5211 dptr_closepath(directory, req->smbpid);
5212 status = rmdir_internals(ctx, conn, directory);
5213 if (!NT_STATUS_IS_OK(status)) {
5214 reply_nterror(req, status);
5215 END_PROFILE(SMBrmdir);
5216 return;
5219 reply_outbuf(req, 0, 0);
5221 DEBUG( 3, ( "rmdir %s\n", directory ) );
5223 END_PROFILE(SMBrmdir);
5224 return;
5227 /*******************************************************************
5228 Resolve wildcards in a filename rename.
5229 ********************************************************************/
5231 static bool resolve_wildcards(TALLOC_CTX *ctx,
5232 const char *name1,
5233 const char *name2,
5234 char **pp_newname)
5236 char *name2_copy = NULL;
5237 char *root1 = NULL;
5238 char *root2 = NULL;
5239 char *ext1 = NULL;
5240 char *ext2 = NULL;
5241 char *p,*p2, *pname1, *pname2;
5243 name2_copy = talloc_strdup(ctx, name2);
5244 if (!name2_copy) {
5245 return False;
5248 pname1 = strrchr_m(name1,'/');
5249 pname2 = strrchr_m(name2_copy,'/');
5251 if (!pname1 || !pname2) {
5252 return False;
5255 /* Truncate the copy of name2 at the last '/' */
5256 *pname2 = '\0';
5258 /* Now go past the '/' */
5259 pname1++;
5260 pname2++;
5262 root1 = talloc_strdup(ctx, pname1);
5263 root2 = talloc_strdup(ctx, pname2);
5265 if (!root1 || !root2) {
5266 return False;
5269 p = strrchr_m(root1,'.');
5270 if (p) {
5271 *p = 0;
5272 ext1 = talloc_strdup(ctx, p+1);
5273 } else {
5274 ext1 = talloc_strdup(ctx, "");
5276 p = strrchr_m(root2,'.');
5277 if (p) {
5278 *p = 0;
5279 ext2 = talloc_strdup(ctx, p+1);
5280 } else {
5281 ext2 = talloc_strdup(ctx, "");
5284 if (!ext1 || !ext2) {
5285 return False;
5288 p = root1;
5289 p2 = root2;
5290 while (*p2) {
5291 if (*p2 == '?') {
5292 /* Hmmm. Should this be mb-aware ? */
5293 *p2 = *p;
5294 p2++;
5295 } else if (*p2 == '*') {
5296 *p2 = '\0';
5297 root2 = talloc_asprintf(ctx, "%s%s",
5298 root2,
5300 if (!root2) {
5301 return False;
5303 break;
5304 } else {
5305 p2++;
5307 if (*p) {
5308 p++;
5312 p = ext1;
5313 p2 = ext2;
5314 while (*p2) {
5315 if (*p2 == '?') {
5316 /* Hmmm. Should this be mb-aware ? */
5317 *p2 = *p;
5318 p2++;
5319 } else if (*p2 == '*') {
5320 *p2 = '\0';
5321 ext2 = talloc_asprintf(ctx, "%s%s",
5322 ext2,
5324 if (!ext2) {
5325 return False;
5327 break;
5328 } else {
5329 p2++;
5331 if (*p) {
5332 p++;
5336 if (*ext2) {
5337 *pp_newname = talloc_asprintf(ctx, "%s/%s.%s",
5338 name2_copy,
5339 root2,
5340 ext2);
5341 } else {
5342 *pp_newname = talloc_asprintf(ctx, "%s/%s",
5343 name2_copy,
5344 root2);
5347 if (!*pp_newname) {
5348 return False;
5351 return True;
5354 /****************************************************************************
5355 Ensure open files have their names updated. Updated to notify other smbd's
5356 asynchronously.
5357 ****************************************************************************/
5359 static void rename_open_files(connection_struct *conn,
5360 struct share_mode_lock *lck,
5361 const char *newname)
5363 files_struct *fsp;
5364 bool did_rename = False;
5366 for(fsp = file_find_di_first(lck->id); fsp;
5367 fsp = file_find_di_next(fsp)) {
5368 /* fsp_name is a relative path under the fsp. To change this for other
5369 sharepaths we need to manipulate relative paths. */
5370 /* TODO - create the absolute path and manipulate the newname
5371 relative to the sharepath. */
5372 if (!strequal(fsp->conn->connectpath, conn->connectpath)) {
5373 continue;
5375 DEBUG(10,("rename_open_files: renaming file fnum %d (file_id %s) from %s -> %s\n",
5376 fsp->fnum, file_id_string_tos(&fsp->file_id),
5377 fsp->fsp_name, newname ));
5378 string_set(&fsp->fsp_name, newname);
5379 did_rename = True;
5382 if (!did_rename) {
5383 DEBUG(10,("rename_open_files: no open files on file_id %s for %s\n",
5384 file_id_string_tos(&lck->id), newname ));
5387 /* Send messages to all smbd's (not ourself) that the name has changed. */
5388 rename_share_filename(smbd_messaging_context(), lck, conn->connectpath,
5389 newname);
5392 /****************************************************************************
5393 We need to check if the source path is a parent directory of the destination
5394 (ie. a rename of /foo/bar/baz -> /foo/bar/baz/bibble/bobble. If so we must
5395 refuse the rename with a sharing violation. Under UNIX the above call can
5396 *succeed* if /foo/bar/baz is a symlink to another area in the share. We
5397 probably need to check that the client is a Windows one before disallowing
5398 this as a UNIX client (one with UNIX extensions) can know the source is a
5399 symlink and make this decision intelligently. Found by an excellent bug
5400 report from <AndyLiebman@aol.com>.
5401 ****************************************************************************/
5403 static bool rename_path_prefix_equal(const char *src, const char *dest)
5405 const char *psrc = src;
5406 const char *pdst = dest;
5407 size_t slen;
5409 if (psrc[0] == '.' && psrc[1] == '/') {
5410 psrc += 2;
5412 if (pdst[0] == '.' && pdst[1] == '/') {
5413 pdst += 2;
5415 if ((slen = strlen(psrc)) > strlen(pdst)) {
5416 return False;
5418 return ((memcmp(psrc, pdst, slen) == 0) && pdst[slen] == '/');
5422 * Do the notify calls from a rename
5425 static void notify_rename(connection_struct *conn, bool is_dir,
5426 const char *oldpath, const char *newpath)
5428 char *olddir, *newdir;
5429 const char *oldname, *newname;
5430 uint32 mask;
5432 mask = is_dir ? FILE_NOTIFY_CHANGE_DIR_NAME
5433 : FILE_NOTIFY_CHANGE_FILE_NAME;
5435 if (!parent_dirname_talloc(NULL, oldpath, &olddir, &oldname)
5436 || !parent_dirname_talloc(NULL, newpath, &newdir, &newname)) {
5437 TALLOC_FREE(olddir);
5438 return;
5441 if (strcmp(olddir, newdir) == 0) {
5442 notify_fname(conn, NOTIFY_ACTION_OLD_NAME, mask, oldpath);
5443 notify_fname(conn, NOTIFY_ACTION_NEW_NAME, mask, newpath);
5445 else {
5446 notify_fname(conn, NOTIFY_ACTION_REMOVED, mask, oldpath);
5447 notify_fname(conn, NOTIFY_ACTION_ADDED, mask, newpath);
5449 TALLOC_FREE(olddir);
5450 TALLOC_FREE(newdir);
5452 /* this is a strange one. w2k3 gives an additional event for
5453 CHANGE_ATTRIBUTES and CHANGE_CREATION on the new file when renaming
5454 files, but not directories */
5455 if (!is_dir) {
5456 notify_fname(conn, NOTIFY_ACTION_MODIFIED,
5457 FILE_NOTIFY_CHANGE_ATTRIBUTES
5458 |FILE_NOTIFY_CHANGE_CREATION,
5459 newpath);
5463 /****************************************************************************
5464 Rename an open file - given an fsp.
5465 ****************************************************************************/
5467 NTSTATUS rename_internals_fsp(connection_struct *conn,
5468 files_struct *fsp,
5469 char *newname,
5470 const char *newname_last_component,
5471 uint32 attrs,
5472 bool replace_if_exists)
5474 TALLOC_CTX *ctx = talloc_tos();
5475 SMB_STRUCT_STAT sbuf, sbuf1;
5476 NTSTATUS status = NT_STATUS_OK;
5477 struct share_mode_lock *lck = NULL;
5478 bool dst_exists;
5480 ZERO_STRUCT(sbuf);
5482 status = check_name(conn, newname);
5483 if (!NT_STATUS_IS_OK(status)) {
5484 return status;
5487 /* Ensure newname contains a '/' */
5488 if(strrchr_m(newname,'/') == 0) {
5489 newname = talloc_asprintf(ctx,
5490 "./%s",
5491 newname);
5492 if (!newname) {
5493 return NT_STATUS_NO_MEMORY;
5498 * Check for special case with case preserving and not
5499 * case sensitive. If the old last component differs from the original
5500 * last component only by case, then we should allow
5501 * the rename (user is trying to change the case of the
5502 * filename).
5505 if((conn->case_sensitive == False) && (conn->case_preserve == True) &&
5506 strequal(newname, fsp->fsp_name)) {
5507 char *p;
5508 char *newname_modified_last_component = NULL;
5511 * Get the last component of the modified name.
5512 * Note that we guarantee that newname contains a '/'
5513 * character above.
5515 p = strrchr_m(newname,'/');
5516 newname_modified_last_component = talloc_strdup(ctx,
5517 p+1);
5518 if (!newname_modified_last_component) {
5519 return NT_STATUS_NO_MEMORY;
5522 if(strcsequal(newname_modified_last_component,
5523 newname_last_component) == False) {
5525 * Replace the modified last component with
5526 * the original.
5528 *p = '\0'; /* Truncate at the '/' */
5529 newname = talloc_asprintf(ctx,
5530 "%s/%s",
5531 newname,
5532 newname_last_component);
5537 * If the src and dest names are identical - including case,
5538 * don't do the rename, just return success.
5541 if (strcsequal(fsp->fsp_name, newname)) {
5542 DEBUG(3,("rename_internals_fsp: identical names in rename %s - returning success\n",
5543 newname));
5544 return NT_STATUS_OK;
5548 * Have vfs_object_exist also fill sbuf1
5550 dst_exists = vfs_object_exist(conn, newname, &sbuf1);
5552 if(!replace_if_exists && dst_exists) {
5553 DEBUG(3,("rename_internals_fsp: dest exists doing rename %s -> %s\n",
5554 fsp->fsp_name,newname));
5555 return NT_STATUS_OBJECT_NAME_COLLISION;
5558 if(replace_if_exists && dst_exists) {
5559 /* Ensure both or neither are stream names. */
5560 if (is_ntfs_stream_name(fsp->fsp_name) !=
5561 is_ntfs_stream_name(newname)) {
5562 return NT_STATUS_INVALID_PARAMETER;
5566 if (dst_exists) {
5567 struct file_id fileid = vfs_file_id_from_sbuf(conn, &sbuf1);
5568 files_struct *dst_fsp = file_find_di_first(fileid);
5569 if (dst_fsp) {
5570 DEBUG(3, ("rename_internals_fsp: Target file open\n"));
5571 return NT_STATUS_ACCESS_DENIED;
5575 /* Ensure we have a valid stat struct for the source. */
5576 if (fsp->fh->fd != -1) {
5577 if (SMB_VFS_FSTAT(fsp, &sbuf) == -1) {
5578 return map_nt_error_from_unix(errno);
5580 } else {
5581 if (SMB_VFS_STAT(conn,fsp->fsp_name,&sbuf) == -1) {
5582 return map_nt_error_from_unix(errno);
5586 status = can_rename(conn, fsp, attrs, &sbuf);
5588 if (!NT_STATUS_IS_OK(status)) {
5589 DEBUG(3,("rename_internals_fsp: Error %s rename %s -> %s\n",
5590 nt_errstr(status), fsp->fsp_name,newname));
5591 if (NT_STATUS_EQUAL(status,NT_STATUS_SHARING_VIOLATION))
5592 status = NT_STATUS_ACCESS_DENIED;
5593 return status;
5596 if (rename_path_prefix_equal(fsp->fsp_name, newname)) {
5597 return NT_STATUS_ACCESS_DENIED;
5600 lck = get_share_mode_lock(talloc_tos(), fsp->file_id, NULL, NULL,
5601 NULL);
5604 * We have the file open ourselves, so not being able to get the
5605 * corresponding share mode lock is a fatal error.
5608 SMB_ASSERT(lck != NULL);
5610 if(SMB_VFS_RENAME(conn,fsp->fsp_name, newname) == 0) {
5611 uint32 create_options = fsp->fh->private_options;
5613 DEBUG(3,("rename_internals_fsp: succeeded doing rename on %s -> %s\n",
5614 fsp->fsp_name,newname));
5616 notify_rename(conn, fsp->is_directory, fsp->fsp_name, newname);
5618 rename_open_files(conn, lck, newname);
5621 * A rename acts as a new file create w.r.t. allowing an initial delete
5622 * on close, probably because in Windows there is a new handle to the
5623 * new file. If initial delete on close was requested but not
5624 * originally set, we need to set it here. This is probably not 100% correct,
5625 * but will work for the CIFSFS client which in non-posix mode
5626 * depends on these semantics. JRA.
5629 set_allow_initial_delete_on_close(lck, fsp, True);
5631 if (create_options & FILE_DELETE_ON_CLOSE) {
5632 status = can_set_delete_on_close(fsp, True, 0);
5634 if (NT_STATUS_IS_OK(status)) {
5635 /* Note that here we set the *inital* delete on close flag,
5636 * not the regular one. The magic gets handled in close. */
5637 fsp->initial_delete_on_close = True;
5640 TALLOC_FREE(lck);
5641 return NT_STATUS_OK;
5644 TALLOC_FREE(lck);
5646 if (errno == ENOTDIR || errno == EISDIR) {
5647 status = NT_STATUS_OBJECT_NAME_COLLISION;
5648 } else {
5649 status = map_nt_error_from_unix(errno);
5652 DEBUG(3,("rename_internals_fsp: Error %s rename %s -> %s\n",
5653 nt_errstr(status), fsp->fsp_name,newname));
5655 return status;
5658 /****************************************************************************
5659 The guts of the rename command, split out so it may be called by the NT SMB
5660 code.
5661 ****************************************************************************/
5663 NTSTATUS rename_internals(TALLOC_CTX *ctx,
5664 connection_struct *conn,
5665 struct smb_request *req,
5666 const char *name_in,
5667 const char *newname_in,
5668 uint32 attrs,
5669 bool replace_if_exists,
5670 bool src_has_wild,
5671 bool dest_has_wild,
5672 uint32_t access_mask)
5674 char *directory = NULL;
5675 char *mask = NULL;
5676 char *last_component_src = NULL;
5677 char *last_component_dest = NULL;
5678 char *name = NULL;
5679 char *newname = NULL;
5680 char *p;
5681 int count=0;
5682 NTSTATUS status = NT_STATUS_OK;
5683 SMB_STRUCT_STAT sbuf1, sbuf2;
5684 struct smb_Dir *dir_hnd = NULL;
5685 const char *dname;
5686 long offset = 0;
5688 ZERO_STRUCT(sbuf1);
5689 ZERO_STRUCT(sbuf2);
5691 status = unix_convert(ctx, conn, name_in, src_has_wild, &name,
5692 &last_component_src, &sbuf1);
5693 if (!NT_STATUS_IS_OK(status)) {
5694 return status;
5697 status = unix_convert(ctx, conn, newname_in, dest_has_wild, &newname,
5698 &last_component_dest, &sbuf2);
5699 if (!NT_STATUS_IS_OK(status)) {
5700 return status;
5704 * Split the old name into directory and last component
5705 * strings. Note that unix_convert may have stripped off a
5706 * leading ./ from both name and newname if the rename is
5707 * at the root of the share. We need to make sure either both
5708 * name and newname contain a / character or neither of them do
5709 * as this is checked in resolve_wildcards().
5712 p = strrchr_m(name,'/');
5713 if (!p) {
5714 directory = talloc_strdup(ctx, ".");
5715 if (!directory) {
5716 return NT_STATUS_NO_MEMORY;
5718 mask = name;
5719 } else {
5720 *p = 0;
5721 directory = talloc_strdup(ctx, name);
5722 if (!directory) {
5723 return NT_STATUS_NO_MEMORY;
5725 mask = p+1;
5726 *p = '/'; /* Replace needed for exceptional test below. */
5730 * We should only check the mangled cache
5731 * here if unix_convert failed. This means
5732 * that the path in 'mask' doesn't exist
5733 * on the file system and so we need to look
5734 * for a possible mangle. This patch from
5735 * Tine Smukavec <valentin.smukavec@hermes.si>.
5738 if (!VALID_STAT(sbuf1) && mangle_is_mangled(mask, conn->params)) {
5739 char *new_mask = NULL;
5740 mangle_lookup_name_from_8_3(ctx,
5741 mask,
5742 &new_mask,
5743 conn->params );
5744 if (new_mask) {
5745 mask = new_mask;
5749 if (!src_has_wild) {
5750 files_struct *fsp;
5753 * No wildcards - just process the one file.
5755 bool is_short_name = mangle_is_8_3(name, True, conn->params);
5757 /* Add a terminating '/' to the directory name. */
5758 directory = talloc_asprintf_append(directory,
5759 "/%s",
5760 mask);
5761 if (!directory) {
5762 return NT_STATUS_NO_MEMORY;
5765 /* Ensure newname contains a '/' also */
5766 if(strrchr_m(newname,'/') == 0) {
5767 newname = talloc_asprintf(ctx,
5768 "./%s",
5769 newname);
5770 if (!newname) {
5771 return NT_STATUS_NO_MEMORY;
5775 DEBUG(3, ("rename_internals: case_sensitive = %d, "
5776 "case_preserve = %d, short case preserve = %d, "
5777 "directory = %s, newname = %s, "
5778 "last_component_dest = %s, is_8_3 = %d\n",
5779 conn->case_sensitive, conn->case_preserve,
5780 conn->short_case_preserve, directory,
5781 newname, last_component_dest, is_short_name));
5783 /* The dest name still may have wildcards. */
5784 if (dest_has_wild) {
5785 char *mod_newname = NULL;
5786 if (!resolve_wildcards(ctx,
5787 directory,newname,&mod_newname)) {
5788 DEBUG(6, ("rename_internals: resolve_wildcards "
5789 "%s %s failed\n",
5790 directory,
5791 newname));
5792 return NT_STATUS_NO_MEMORY;
5794 newname = mod_newname;
5797 ZERO_STRUCT(sbuf1);
5798 SMB_VFS_STAT(conn, directory, &sbuf1);
5800 status = S_ISDIR(sbuf1.st_mode) ?
5801 open_directory(conn, req, directory, &sbuf1,
5802 access_mask,
5803 FILE_SHARE_READ|FILE_SHARE_WRITE,
5804 FILE_OPEN, 0, 0, NULL,
5805 &fsp)
5806 : open_file_ntcreate(conn, req, directory, &sbuf1,
5807 access_mask,
5808 FILE_SHARE_READ|FILE_SHARE_WRITE,
5809 FILE_OPEN, 0, 0, 0, NULL,
5810 &fsp);
5812 if (!NT_STATUS_IS_OK(status)) {
5813 DEBUG(3, ("Could not open rename source %s: %s\n",
5814 directory, nt_errstr(status)));
5815 return status;
5818 status = rename_internals_fsp(conn, fsp, newname,
5819 last_component_dest,
5820 attrs, replace_if_exists);
5822 close_file(fsp, NORMAL_CLOSE);
5824 DEBUG(3, ("rename_internals: Error %s rename %s -> %s\n",
5825 nt_errstr(status), directory,newname));
5827 return status;
5831 * Wildcards - process each file that matches.
5833 if (strequal(mask,"????????.???")) {
5834 mask[0] = '*';
5835 mask[1] = '\0';
5838 status = check_name(conn, directory);
5839 if (!NT_STATUS_IS_OK(status)) {
5840 return status;
5843 dir_hnd = OpenDir(talloc_tos(), conn, directory, mask, attrs);
5844 if (dir_hnd == NULL) {
5845 return map_nt_error_from_unix(errno);
5848 status = NT_STATUS_NO_SUCH_FILE;
5850 * Was status = NT_STATUS_OBJECT_NAME_NOT_FOUND;
5851 * - gentest fix. JRA
5854 while ((dname = ReadDirName(dir_hnd, &offset))) {
5855 files_struct *fsp = NULL;
5856 char *fname = NULL;
5857 char *destname = NULL;
5858 bool sysdir_entry = False;
5860 /* Quick check for "." and ".." */
5861 if (ISDOT(dname) || ISDOTDOT(dname)) {
5862 if (attrs & aDIR) {
5863 sysdir_entry = True;
5864 } else {
5865 continue;
5869 if (!is_visible_file(conn, directory, dname, &sbuf1, False)) {
5870 continue;
5873 if(!mask_match(dname, mask, conn->case_sensitive)) {
5874 continue;
5877 if (sysdir_entry) {
5878 status = NT_STATUS_OBJECT_NAME_INVALID;
5879 break;
5882 fname = talloc_asprintf(ctx,
5883 "%s/%s",
5884 directory,
5885 dname);
5886 if (!fname) {
5887 return NT_STATUS_NO_MEMORY;
5890 if (!resolve_wildcards(ctx,
5891 fname,newname,&destname)) {
5892 DEBUG(6, ("resolve_wildcards %s %s failed\n",
5893 fname, destname));
5894 TALLOC_FREE(fname);
5895 continue;
5897 if (!destname) {
5898 return NT_STATUS_NO_MEMORY;
5901 ZERO_STRUCT(sbuf1);
5902 SMB_VFS_STAT(conn, fname, &sbuf1);
5904 status = S_ISDIR(sbuf1.st_mode) ?
5905 open_directory(conn, req, fname, &sbuf1,
5906 access_mask,
5907 FILE_SHARE_READ|FILE_SHARE_WRITE,
5908 FILE_OPEN, 0, 0, NULL,
5909 &fsp)
5910 : open_file_ntcreate(conn, req, fname, &sbuf1,
5911 access_mask,
5912 FILE_SHARE_READ|FILE_SHARE_WRITE,
5913 FILE_OPEN, 0, 0, 0, NULL,
5914 &fsp);
5916 if (!NT_STATUS_IS_OK(status)) {
5917 DEBUG(3,("rename_internals: open_file_ntcreate "
5918 "returned %s rename %s -> %s\n",
5919 nt_errstr(status), directory, newname));
5920 break;
5923 status = rename_internals_fsp(conn, fsp, destname, dname,
5924 attrs, replace_if_exists);
5926 close_file(fsp, NORMAL_CLOSE);
5928 if (!NT_STATUS_IS_OK(status)) {
5929 DEBUG(3, ("rename_internals_fsp returned %s for "
5930 "rename %s -> %s\n", nt_errstr(status),
5931 directory, newname));
5932 break;
5935 count++;
5937 DEBUG(3,("rename_internals: doing rename on %s -> "
5938 "%s\n",fname,destname));
5940 TALLOC_FREE(fname);
5941 TALLOC_FREE(destname);
5943 TALLOC_FREE(dir_hnd);
5945 if (count == 0 && NT_STATUS_IS_OK(status) && errno != 0) {
5946 status = map_nt_error_from_unix(errno);
5949 return status;
5952 /****************************************************************************
5953 Reply to a mv.
5954 ****************************************************************************/
5956 void reply_mv(struct smb_request *req)
5958 connection_struct *conn = req->conn;
5959 char *name = NULL;
5960 char *newname = NULL;
5961 char *p;
5962 uint32 attrs;
5963 NTSTATUS status;
5964 bool src_has_wcard = False;
5965 bool dest_has_wcard = False;
5966 TALLOC_CTX *ctx = talloc_tos();
5968 START_PROFILE(SMBmv);
5970 if (req->wct < 1) {
5971 reply_nterror(req, NT_STATUS_INVALID_PARAMETER);
5972 END_PROFILE(SMBmv);
5973 return;
5976 attrs = SVAL(req->inbuf,smb_vwv0);
5978 p = smb_buf(req->inbuf) + 1;
5979 p += srvstr_get_path_wcard(ctx, (char *)req->inbuf, req->flags2, &name, p,
5980 0, STR_TERMINATE, &status,
5981 &src_has_wcard);
5982 if (!NT_STATUS_IS_OK(status)) {
5983 reply_nterror(req, status);
5984 END_PROFILE(SMBmv);
5985 return;
5987 p++;
5988 p += srvstr_get_path_wcard(ctx, (char *)req->inbuf, req->flags2, &newname, p,
5989 0, STR_TERMINATE, &status,
5990 &dest_has_wcard);
5991 if (!NT_STATUS_IS_OK(status)) {
5992 reply_nterror(req, status);
5993 END_PROFILE(SMBmv);
5994 return;
5997 status = resolve_dfspath_wcard(ctx, conn,
5998 req->flags2 & FLAGS2_DFS_PATHNAMES,
5999 name,
6000 &name,
6001 &src_has_wcard);
6002 if (!NT_STATUS_IS_OK(status)) {
6003 if (NT_STATUS_EQUAL(status,NT_STATUS_PATH_NOT_COVERED)) {
6004 reply_botherror(req, NT_STATUS_PATH_NOT_COVERED,
6005 ERRSRV, ERRbadpath);
6006 END_PROFILE(SMBmv);
6007 return;
6009 reply_nterror(req, status);
6010 END_PROFILE(SMBmv);
6011 return;
6014 status = resolve_dfspath_wcard(ctx, conn,
6015 req->flags2 & FLAGS2_DFS_PATHNAMES,
6016 newname,
6017 &newname,
6018 &dest_has_wcard);
6019 if (!NT_STATUS_IS_OK(status)) {
6020 if (NT_STATUS_EQUAL(status,NT_STATUS_PATH_NOT_COVERED)) {
6021 reply_botherror(req, NT_STATUS_PATH_NOT_COVERED,
6022 ERRSRV, ERRbadpath);
6023 END_PROFILE(SMBmv);
6024 return;
6026 reply_nterror(req, status);
6027 END_PROFILE(SMBmv);
6028 return;
6031 DEBUG(3,("reply_mv : %s -> %s\n",name,newname));
6033 status = rename_internals(ctx, conn, req, name, newname, attrs, False,
6034 src_has_wcard, dest_has_wcard, DELETE_ACCESS);
6035 if (!NT_STATUS_IS_OK(status)) {
6036 if (open_was_deferred(req->mid)) {
6037 /* We have re-scheduled this call. */
6038 END_PROFILE(SMBmv);
6039 return;
6041 reply_nterror(req, status);
6042 END_PROFILE(SMBmv);
6043 return;
6046 reply_outbuf(req, 0, 0);
6048 END_PROFILE(SMBmv);
6049 return;
6052 /*******************************************************************
6053 Copy a file as part of a reply_copy.
6054 ******************************************************************/
6057 * TODO: check error codes on all callers
6060 NTSTATUS copy_file(TALLOC_CTX *ctx,
6061 connection_struct *conn,
6062 const char *src,
6063 const char *dest1,
6064 int ofun,
6065 int count,
6066 bool target_is_directory)
6068 SMB_STRUCT_STAT src_sbuf, sbuf2;
6069 SMB_OFF_T ret=-1;
6070 files_struct *fsp1,*fsp2;
6071 char *dest = NULL;
6072 uint32 dosattrs;
6073 uint32 new_create_disposition;
6074 NTSTATUS status;
6076 dest = talloc_strdup(ctx, dest1);
6077 if (!dest) {
6078 return NT_STATUS_NO_MEMORY;
6080 if (target_is_directory) {
6081 const char *p = strrchr_m(src,'/');
6082 if (p) {
6083 p++;
6084 } else {
6085 p = src;
6087 dest = talloc_asprintf_append(dest,
6088 "/%s",
6090 if (!dest) {
6091 return NT_STATUS_NO_MEMORY;
6095 if (!vfs_file_exist(conn,src,&src_sbuf)) {
6096 TALLOC_FREE(dest);
6097 return NT_STATUS_OBJECT_NAME_NOT_FOUND;
6100 if (!target_is_directory && count) {
6101 new_create_disposition = FILE_OPEN;
6102 } else {
6103 if (!map_open_params_to_ntcreate(dest1,0,ofun,
6104 NULL, NULL, &new_create_disposition, NULL)) {
6105 TALLOC_FREE(dest);
6106 return NT_STATUS_INVALID_PARAMETER;
6110 status = open_file_ntcreate(conn, NULL, src, &src_sbuf,
6111 FILE_GENERIC_READ,
6112 FILE_SHARE_READ|FILE_SHARE_WRITE,
6113 FILE_OPEN,
6115 FILE_ATTRIBUTE_NORMAL,
6116 INTERNAL_OPEN_ONLY,
6117 NULL, &fsp1);
6119 if (!NT_STATUS_IS_OK(status)) {
6120 TALLOC_FREE(dest);
6121 return status;
6124 dosattrs = dos_mode(conn, src, &src_sbuf);
6125 if (SMB_VFS_STAT(conn,dest,&sbuf2) == -1) {
6126 ZERO_STRUCTP(&sbuf2);
6129 status = open_file_ntcreate(conn, NULL, dest, &sbuf2,
6130 FILE_GENERIC_WRITE,
6131 FILE_SHARE_READ|FILE_SHARE_WRITE,
6132 new_create_disposition,
6134 dosattrs,
6135 INTERNAL_OPEN_ONLY,
6136 NULL, &fsp2);
6138 TALLOC_FREE(dest);
6140 if (!NT_STATUS_IS_OK(status)) {
6141 close_file(fsp1,ERROR_CLOSE);
6142 return status;
6145 if ((ofun&3) == 1) {
6146 if(SMB_VFS_LSEEK(fsp2,0,SEEK_END) == -1) {
6147 DEBUG(0,("copy_file: error - vfs lseek returned error %s\n", strerror(errno) ));
6149 * Stop the copy from occurring.
6151 ret = -1;
6152 src_sbuf.st_size = 0;
6156 if (src_sbuf.st_size) {
6157 ret = vfs_transfer_file(fsp1, fsp2, src_sbuf.st_size);
6160 close_file(fsp1,NORMAL_CLOSE);
6162 /* Ensure the modtime is set correctly on the destination file. */
6163 set_close_write_time(fsp2, get_mtimespec(&src_sbuf));
6166 * As we are opening fsp1 read-only we only expect
6167 * an error on close on fsp2 if we are out of space.
6168 * Thus we don't look at the error return from the
6169 * close of fsp1.
6171 status = close_file(fsp2,NORMAL_CLOSE);
6173 if (!NT_STATUS_IS_OK(status)) {
6174 return status;
6177 if (ret != (SMB_OFF_T)src_sbuf.st_size) {
6178 return NT_STATUS_DISK_FULL;
6181 return NT_STATUS_OK;
6184 /****************************************************************************
6185 Reply to a file copy.
6186 ****************************************************************************/
6188 void reply_copy(struct smb_request *req)
6190 connection_struct *conn = req->conn;
6191 char *name = NULL;
6192 char *newname = NULL;
6193 char *directory = NULL;
6194 char *mask = NULL;
6195 char *p;
6196 int count=0;
6197 int error = ERRnoaccess;
6198 int err = 0;
6199 int tid2;
6200 int ofun;
6201 int flags;
6202 bool target_is_directory=False;
6203 bool source_has_wild = False;
6204 bool dest_has_wild = False;
6205 SMB_STRUCT_STAT sbuf1, sbuf2;
6206 NTSTATUS status;
6207 TALLOC_CTX *ctx = talloc_tos();
6209 START_PROFILE(SMBcopy);
6211 if (req->wct < 3) {
6212 reply_nterror(req, NT_STATUS_INVALID_PARAMETER);
6213 END_PROFILE(SMBcopy);
6214 return;
6217 tid2 = SVAL(req->inbuf,smb_vwv0);
6218 ofun = SVAL(req->inbuf,smb_vwv1);
6219 flags = SVAL(req->inbuf,smb_vwv2);
6221 p = smb_buf(req->inbuf);
6222 p += srvstr_get_path_wcard(ctx, (char *)req->inbuf, req->flags2, &name, p,
6223 0, STR_TERMINATE, &status,
6224 &source_has_wild);
6225 if (!NT_STATUS_IS_OK(status)) {
6226 reply_nterror(req, status);
6227 END_PROFILE(SMBcopy);
6228 return;
6230 p += srvstr_get_path_wcard(ctx, (char *)req->inbuf, req->flags2, &newname, p,
6231 0, STR_TERMINATE, &status,
6232 &dest_has_wild);
6233 if (!NT_STATUS_IS_OK(status)) {
6234 reply_nterror(req, status);
6235 END_PROFILE(SMBcopy);
6236 return;
6239 DEBUG(3,("reply_copy : %s -> %s\n",name,newname));
6241 if (tid2 != conn->cnum) {
6242 /* can't currently handle inter share copies XXXX */
6243 DEBUG(3,("Rejecting inter-share copy\n"));
6244 reply_doserror(req, ERRSRV, ERRinvdevice);
6245 END_PROFILE(SMBcopy);
6246 return;
6249 status = resolve_dfspath_wcard(ctx, conn,
6250 req->flags2 & FLAGS2_DFS_PATHNAMES,
6251 name,
6252 &name,
6253 &source_has_wild);
6254 if (!NT_STATUS_IS_OK(status)) {
6255 if (NT_STATUS_EQUAL(status,NT_STATUS_PATH_NOT_COVERED)) {
6256 reply_botherror(req, NT_STATUS_PATH_NOT_COVERED,
6257 ERRSRV, ERRbadpath);
6258 END_PROFILE(SMBcopy);
6259 return;
6261 reply_nterror(req, status);
6262 END_PROFILE(SMBcopy);
6263 return;
6266 status = resolve_dfspath_wcard(ctx, conn,
6267 req->flags2 & FLAGS2_DFS_PATHNAMES,
6268 newname,
6269 &newname,
6270 &dest_has_wild);
6271 if (!NT_STATUS_IS_OK(status)) {
6272 if (NT_STATUS_EQUAL(status,NT_STATUS_PATH_NOT_COVERED)) {
6273 reply_botherror(req, NT_STATUS_PATH_NOT_COVERED,
6274 ERRSRV, ERRbadpath);
6275 END_PROFILE(SMBcopy);
6276 return;
6278 reply_nterror(req, status);
6279 END_PROFILE(SMBcopy);
6280 return;
6283 status = unix_convert(ctx, conn, name, source_has_wild,
6284 &name, NULL, &sbuf1);
6285 if (!NT_STATUS_IS_OK(status)) {
6286 reply_nterror(req, status);
6287 END_PROFILE(SMBcopy);
6288 return;
6291 status = unix_convert(ctx, conn, newname, dest_has_wild,
6292 &newname, NULL, &sbuf2);
6293 if (!NT_STATUS_IS_OK(status)) {
6294 reply_nterror(req, status);
6295 END_PROFILE(SMBcopy);
6296 return;
6299 target_is_directory = VALID_STAT_OF_DIR(sbuf2);
6301 if ((flags&1) && target_is_directory) {
6302 reply_doserror(req, ERRDOS, ERRbadfile);
6303 END_PROFILE(SMBcopy);
6304 return;
6307 if ((flags&2) && !target_is_directory) {
6308 reply_doserror(req, ERRDOS, ERRbadpath);
6309 END_PROFILE(SMBcopy);
6310 return;
6313 if ((flags&(1<<5)) && VALID_STAT_OF_DIR(sbuf1)) {
6314 /* wants a tree copy! XXXX */
6315 DEBUG(3,("Rejecting tree copy\n"));
6316 reply_doserror(req, ERRSRV, ERRerror);
6317 END_PROFILE(SMBcopy);
6318 return;
6321 p = strrchr_m(name,'/');
6322 if (!p) {
6323 directory = talloc_strdup(ctx, "./");
6324 if (!directory) {
6325 reply_nterror(req, NT_STATUS_NO_MEMORY);
6326 END_PROFILE(SMBcopy);
6327 return;
6329 mask = name;
6330 } else {
6331 *p = 0;
6332 directory = talloc_strdup(ctx, name);
6333 if (!directory) {
6334 reply_nterror(req, NT_STATUS_NO_MEMORY);
6335 END_PROFILE(SMBcopy);
6336 return;
6338 mask = p+1;
6342 * We should only check the mangled cache
6343 * here if unix_convert failed. This means
6344 * that the path in 'mask' doesn't exist
6345 * on the file system and so we need to look
6346 * for a possible mangle. This patch from
6347 * Tine Smukavec <valentin.smukavec@hermes.si>.
6350 if (!VALID_STAT(sbuf1) && mangle_is_mangled(mask, conn->params)) {
6351 char *new_mask = NULL;
6352 mangle_lookup_name_from_8_3(ctx,
6353 mask,
6354 &new_mask,
6355 conn->params );
6356 if (new_mask) {
6357 mask = new_mask;
6361 if (!source_has_wild) {
6362 directory = talloc_asprintf_append(directory,
6363 "/%s",
6364 mask);
6365 if (dest_has_wild) {
6366 char *mod_newname = NULL;
6367 if (!resolve_wildcards(ctx,
6368 directory,newname,&mod_newname)) {
6369 reply_nterror(req, NT_STATUS_NO_MEMORY);
6370 END_PROFILE(SMBcopy);
6371 return;
6373 newname = mod_newname;
6376 status = check_name(conn, directory);
6377 if (!NT_STATUS_IS_OK(status)) {
6378 reply_nterror(req, status);
6379 END_PROFILE(SMBcopy);
6380 return;
6383 status = check_name(conn, newname);
6384 if (!NT_STATUS_IS_OK(status)) {
6385 reply_nterror(req, status);
6386 END_PROFILE(SMBcopy);
6387 return;
6390 status = copy_file(ctx,conn,directory,newname,ofun,
6391 count,target_is_directory);
6393 if(!NT_STATUS_IS_OK(status)) {
6394 reply_nterror(req, status);
6395 END_PROFILE(SMBcopy);
6396 return;
6397 } else {
6398 count++;
6400 } else {
6401 struct smb_Dir *dir_hnd = NULL;
6402 const char *dname = NULL;
6403 long offset = 0;
6405 if (strequal(mask,"????????.???")) {
6406 mask[0] = '*';
6407 mask[1] = '\0';
6410 status = check_name(conn, directory);
6411 if (!NT_STATUS_IS_OK(status)) {
6412 reply_nterror(req, status);
6413 END_PROFILE(SMBcopy);
6414 return;
6417 dir_hnd = OpenDir(talloc_tos(), conn, directory, mask, 0);
6418 if (dir_hnd == NULL) {
6419 status = map_nt_error_from_unix(errno);
6420 reply_nterror(req, status);
6421 END_PROFILE(SMBcopy);
6422 return;
6425 error = ERRbadfile;
6427 while ((dname = ReadDirName(dir_hnd, &offset))) {
6428 char *destname = NULL;
6429 char *fname = NULL;
6431 if (ISDOT(dname) || ISDOTDOT(dname)) {
6432 continue;
6435 if (!is_visible_file(conn, directory, dname, &sbuf1, False)) {
6436 continue;
6439 if(!mask_match(dname, mask, conn->case_sensitive)) {
6440 continue;
6443 error = ERRnoaccess;
6444 fname = talloc_asprintf(ctx,
6445 "%s/%s",
6446 directory,
6447 dname);
6448 if (!fname) {
6449 TALLOC_FREE(dir_hnd);
6450 reply_nterror(req, NT_STATUS_NO_MEMORY);
6451 END_PROFILE(SMBcopy);
6452 return;
6455 if (!resolve_wildcards(ctx,
6456 fname,newname,&destname)) {
6457 continue;
6459 if (!destname) {
6460 TALLOC_FREE(dir_hnd);
6461 reply_nterror(req, NT_STATUS_NO_MEMORY);
6462 END_PROFILE(SMBcopy);
6463 return;
6466 status = check_name(conn, fname);
6467 if (!NT_STATUS_IS_OK(status)) {
6468 TALLOC_FREE(dir_hnd);
6469 reply_nterror(req, status);
6470 END_PROFILE(SMBcopy);
6471 return;
6474 status = check_name(conn, destname);
6475 if (!NT_STATUS_IS_OK(status)) {
6476 TALLOC_FREE(dir_hnd);
6477 reply_nterror(req, status);
6478 END_PROFILE(SMBcopy);
6479 return;
6482 DEBUG(3,("reply_copy : doing copy on %s -> %s\n",fname, destname));
6484 status = copy_file(ctx,conn,fname,destname,ofun,
6485 count,target_is_directory);
6486 if (NT_STATUS_IS_OK(status)) {
6487 count++;
6489 TALLOC_FREE(fname);
6490 TALLOC_FREE(destname);
6492 TALLOC_FREE(dir_hnd);
6495 if (count == 0) {
6496 if(err) {
6497 /* Error on close... */
6498 errno = err;
6499 reply_unixerror(req, ERRHRD, ERRgeneral);
6500 END_PROFILE(SMBcopy);
6501 return;
6504 reply_doserror(req, ERRDOS, error);
6505 END_PROFILE(SMBcopy);
6506 return;
6509 reply_outbuf(req, 1, 0);
6510 SSVAL(req->outbuf,smb_vwv0,count);
6512 END_PROFILE(SMBcopy);
6513 return;
6516 #undef DBGC_CLASS
6517 #define DBGC_CLASS DBGC_LOCKING
6519 /****************************************************************************
6520 Get a lock pid, dealing with large count requests.
6521 ****************************************************************************/
6523 uint32 get_lock_pid( char *data, int data_offset, bool large_file_format)
6525 if(!large_file_format)
6526 return (uint32)SVAL(data,SMB_LPID_OFFSET(data_offset));
6527 else
6528 return (uint32)SVAL(data,SMB_LARGE_LPID_OFFSET(data_offset));
6531 /****************************************************************************
6532 Get a lock count, dealing with large count requests.
6533 ****************************************************************************/
6535 SMB_BIG_UINT get_lock_count( char *data, int data_offset, bool large_file_format)
6537 SMB_BIG_UINT count = 0;
6539 if(!large_file_format) {
6540 count = (SMB_BIG_UINT)IVAL(data,SMB_LKLEN_OFFSET(data_offset));
6541 } else {
6543 #if defined(HAVE_LONGLONG)
6544 count = (((SMB_BIG_UINT) IVAL(data,SMB_LARGE_LKLEN_OFFSET_HIGH(data_offset))) << 32) |
6545 ((SMB_BIG_UINT) IVAL(data,SMB_LARGE_LKLEN_OFFSET_LOW(data_offset)));
6546 #else /* HAVE_LONGLONG */
6549 * NT4.x seems to be broken in that it sends large file (64 bit)
6550 * lockingX calls even if the CAP_LARGE_FILES was *not*
6551 * negotiated. For boxes without large unsigned ints truncate the
6552 * lock count by dropping the top 32 bits.
6555 if(IVAL(data,SMB_LARGE_LKLEN_OFFSET_HIGH(data_offset)) != 0) {
6556 DEBUG(3,("get_lock_count: truncating lock count (high)0x%x (low)0x%x to just low count.\n",
6557 (unsigned int)IVAL(data,SMB_LARGE_LKLEN_OFFSET_HIGH(data_offset)),
6558 (unsigned int)IVAL(data,SMB_LARGE_LKLEN_OFFSET_LOW(data_offset)) ));
6559 SIVAL(data,SMB_LARGE_LKLEN_OFFSET_HIGH(data_offset),0);
6562 count = (SMB_BIG_UINT)IVAL(data,SMB_LARGE_LKLEN_OFFSET_LOW(data_offset));
6563 #endif /* HAVE_LONGLONG */
6566 return count;
6569 #if !defined(HAVE_LONGLONG)
6570 /****************************************************************************
6571 Pathetically try and map a 64 bit lock offset into 31 bits. I hate Windows :-).
6572 ****************************************************************************/
6574 static uint32 map_lock_offset(uint32 high, uint32 low)
6576 unsigned int i;
6577 uint32 mask = 0;
6578 uint32 highcopy = high;
6581 * Try and find out how many significant bits there are in high.
6584 for(i = 0; highcopy; i++)
6585 highcopy >>= 1;
6588 * We use 31 bits not 32 here as POSIX
6589 * lock offsets may not be negative.
6592 mask = (~0) << (31 - i);
6594 if(low & mask)
6595 return 0; /* Fail. */
6597 high <<= (31 - i);
6599 return (high|low);
6601 #endif /* !defined(HAVE_LONGLONG) */
6603 /****************************************************************************
6604 Get a lock offset, dealing with large offset requests.
6605 ****************************************************************************/
6607 SMB_BIG_UINT get_lock_offset( char *data, int data_offset, bool large_file_format, bool *err)
6609 SMB_BIG_UINT offset = 0;
6611 *err = False;
6613 if(!large_file_format) {
6614 offset = (SMB_BIG_UINT)IVAL(data,SMB_LKOFF_OFFSET(data_offset));
6615 } else {
6617 #if defined(HAVE_LONGLONG)
6618 offset = (((SMB_BIG_UINT) IVAL(data,SMB_LARGE_LKOFF_OFFSET_HIGH(data_offset))) << 32) |
6619 ((SMB_BIG_UINT) IVAL(data,SMB_LARGE_LKOFF_OFFSET_LOW(data_offset)));
6620 #else /* HAVE_LONGLONG */
6623 * NT4.x seems to be broken in that it sends large file (64 bit)
6624 * lockingX calls even if the CAP_LARGE_FILES was *not*
6625 * negotiated. For boxes without large unsigned ints mangle the
6626 * lock offset by mapping the top 32 bits onto the lower 32.
6629 if(IVAL(data,SMB_LARGE_LKOFF_OFFSET_HIGH(data_offset)) != 0) {
6630 uint32 low = IVAL(data,SMB_LARGE_LKOFF_OFFSET_LOW(data_offset));
6631 uint32 high = IVAL(data,SMB_LARGE_LKOFF_OFFSET_HIGH(data_offset));
6632 uint32 new_low = 0;
6634 if((new_low = map_lock_offset(high, low)) == 0) {
6635 *err = True;
6636 return (SMB_BIG_UINT)-1;
6639 DEBUG(3,("get_lock_offset: truncating lock offset (high)0x%x (low)0x%x to offset 0x%x.\n",
6640 (unsigned int)high, (unsigned int)low, (unsigned int)new_low ));
6641 SIVAL(data,SMB_LARGE_LKOFF_OFFSET_HIGH(data_offset),0);
6642 SIVAL(data,SMB_LARGE_LKOFF_OFFSET_LOW(data_offset),new_low);
6645 offset = (SMB_BIG_UINT)IVAL(data,SMB_LARGE_LKOFF_OFFSET_LOW(data_offset));
6646 #endif /* HAVE_LONGLONG */
6649 return offset;
6652 /****************************************************************************
6653 Reply to a lockingX request.
6654 ****************************************************************************/
6656 void reply_lockingX(struct smb_request *req)
6658 connection_struct *conn = req->conn;
6659 files_struct *fsp;
6660 unsigned char locktype;
6661 unsigned char oplocklevel;
6662 uint16 num_ulocks;
6663 uint16 num_locks;
6664 SMB_BIG_UINT count = 0, offset = 0;
6665 uint32 lock_pid;
6666 int32 lock_timeout;
6667 int i;
6668 char *data;
6669 bool large_file_format;
6670 bool err;
6671 NTSTATUS status = NT_STATUS_UNSUCCESSFUL;
6673 START_PROFILE(SMBlockingX);
6675 if (req->wct < 8) {
6676 reply_nterror(req, NT_STATUS_INVALID_PARAMETER);
6677 END_PROFILE(SMBlockingX);
6678 return;
6681 fsp = file_fsp(SVAL(req->inbuf,smb_vwv2));
6682 locktype = CVAL(req->inbuf,smb_vwv3);
6683 oplocklevel = CVAL(req->inbuf,smb_vwv3+1);
6684 num_ulocks = SVAL(req->inbuf,smb_vwv6);
6685 num_locks = SVAL(req->inbuf,smb_vwv7);
6686 lock_timeout = IVAL(req->inbuf,smb_vwv4);
6687 large_file_format = (locktype & LOCKING_ANDX_LARGE_FILES)?True:False;
6689 if (!check_fsp(conn, req, fsp, &current_user)) {
6690 END_PROFILE(SMBlockingX);
6691 return;
6694 data = smb_buf(req->inbuf);
6696 if (locktype & LOCKING_ANDX_CHANGE_LOCKTYPE) {
6697 /* we don't support these - and CANCEL_LOCK makes w2k
6698 and XP reboot so I don't really want to be
6699 compatible! (tridge) */
6700 reply_nterror(req, NT_STATUS_DOS(ERRDOS, ERRnoatomiclocks));
6701 END_PROFILE(SMBlockingX);
6702 return;
6705 /* Check if this is an oplock break on a file
6706 we have granted an oplock on.
6708 if ((locktype & LOCKING_ANDX_OPLOCK_RELEASE)) {
6709 /* Client can insist on breaking to none. */
6710 bool break_to_none = (oplocklevel == 0);
6711 bool result;
6713 DEBUG(5,("reply_lockingX: oplock break reply (%u) from client "
6714 "for fnum = %d\n", (unsigned int)oplocklevel,
6715 fsp->fnum ));
6718 * Make sure we have granted an exclusive or batch oplock on
6719 * this file.
6722 if (fsp->oplock_type == 0) {
6724 /* The Samba4 nbench simulator doesn't understand
6725 the difference between break to level2 and break
6726 to none from level2 - it sends oplock break
6727 replies in both cases. Don't keep logging an error
6728 message here - just ignore it. JRA. */
6730 DEBUG(5,("reply_lockingX: Error : oplock break from "
6731 "client for fnum = %d (oplock=%d) and no "
6732 "oplock granted on this file (%s).\n",
6733 fsp->fnum, fsp->oplock_type, fsp->fsp_name));
6735 /* if this is a pure oplock break request then don't
6736 * send a reply */
6737 if (num_locks == 0 && num_ulocks == 0) {
6738 END_PROFILE(SMBlockingX);
6739 return;
6740 } else {
6741 END_PROFILE(SMBlockingX);
6742 reply_doserror(req, ERRDOS, ERRlock);
6743 return;
6747 if ((fsp->sent_oplock_break == BREAK_TO_NONE_SENT) ||
6748 (break_to_none)) {
6749 result = remove_oplock(fsp);
6750 } else {
6751 result = downgrade_oplock(fsp);
6754 if (!result) {
6755 DEBUG(0, ("reply_lockingX: error in removing "
6756 "oplock on file %s\n", fsp->fsp_name));
6757 /* Hmmm. Is this panic justified? */
6758 smb_panic("internal tdb error");
6761 reply_to_oplock_break_requests(fsp);
6763 /* if this is a pure oplock break request then don't send a
6764 * reply */
6765 if (num_locks == 0 && num_ulocks == 0) {
6766 /* Sanity check - ensure a pure oplock break is not a
6767 chained request. */
6768 if(CVAL(req->inbuf,smb_vwv0) != 0xff)
6769 DEBUG(0,("reply_lockingX: Error : pure oplock "
6770 "break is a chained %d request !\n",
6771 (unsigned int)CVAL(req->inbuf,
6772 smb_vwv0) ));
6773 END_PROFILE(SMBlockingX);
6774 return;
6779 * We do this check *after* we have checked this is not a oplock break
6780 * response message. JRA.
6783 release_level_2_oplocks_on_change(fsp);
6785 if (smb_buflen(req->inbuf) <
6786 (num_ulocks + num_locks) * (large_file_format ? 20 : 10)) {
6787 reply_nterror(req, NT_STATUS_INVALID_PARAMETER);
6788 END_PROFILE(SMBlockingX);
6789 return;
6792 /* Data now points at the beginning of the list
6793 of smb_unlkrng structs */
6794 for(i = 0; i < (int)num_ulocks; i++) {
6795 lock_pid = get_lock_pid( data, i, large_file_format);
6796 count = get_lock_count( data, i, large_file_format);
6797 offset = get_lock_offset( data, i, large_file_format, &err);
6800 * There is no error code marked "stupid client bug".... :-).
6802 if(err) {
6803 END_PROFILE(SMBlockingX);
6804 reply_doserror(req, ERRDOS, ERRnoaccess);
6805 return;
6808 DEBUG(10,("reply_lockingX: unlock start=%.0f, len=%.0f for "
6809 "pid %u, file %s\n", (double)offset, (double)count,
6810 (unsigned int)lock_pid, fsp->fsp_name ));
6812 status = do_unlock(smbd_messaging_context(),
6813 fsp,
6814 lock_pid,
6815 count,
6816 offset,
6817 WINDOWS_LOCK);
6819 if (NT_STATUS_V(status)) {
6820 END_PROFILE(SMBlockingX);
6821 reply_nterror(req, status);
6822 return;
6826 /* Setup the timeout in seconds. */
6828 if (!lp_blocking_locks(SNUM(conn))) {
6829 lock_timeout = 0;
6832 /* Now do any requested locks */
6833 data += ((large_file_format ? 20 : 10)*num_ulocks);
6835 /* Data now points at the beginning of the list
6836 of smb_lkrng structs */
6838 for(i = 0; i < (int)num_locks; i++) {
6839 enum brl_type lock_type = ((locktype & LOCKING_ANDX_SHARED_LOCK) ?
6840 READ_LOCK:WRITE_LOCK);
6841 lock_pid = get_lock_pid( data, i, large_file_format);
6842 count = get_lock_count( data, i, large_file_format);
6843 offset = get_lock_offset( data, i, large_file_format, &err);
6846 * There is no error code marked "stupid client bug".... :-).
6848 if(err) {
6849 END_PROFILE(SMBlockingX);
6850 reply_doserror(req, ERRDOS, ERRnoaccess);
6851 return;
6854 DEBUG(10,("reply_lockingX: lock start=%.0f, len=%.0f for pid "
6855 "%u, file %s timeout = %d\n", (double)offset,
6856 (double)count, (unsigned int)lock_pid,
6857 fsp->fsp_name, (int)lock_timeout ));
6859 if (locktype & LOCKING_ANDX_CANCEL_LOCK) {
6860 if (lp_blocking_locks(SNUM(conn))) {
6862 /* Schedule a message to ourselves to
6863 remove the blocking lock record and
6864 return the right error. */
6866 if (!blocking_lock_cancel(fsp,
6867 lock_pid,
6868 offset,
6869 count,
6870 WINDOWS_LOCK,
6871 locktype,
6872 NT_STATUS_FILE_LOCK_CONFLICT)) {
6873 END_PROFILE(SMBlockingX);
6874 reply_nterror(
6875 req,
6876 NT_STATUS_DOS(
6877 ERRDOS,
6878 ERRcancelviolation));
6879 return;
6882 /* Remove a matching pending lock. */
6883 status = do_lock_cancel(fsp,
6884 lock_pid,
6885 count,
6886 offset,
6887 WINDOWS_LOCK);
6888 } else {
6889 bool blocking_lock = lock_timeout ? True : False;
6890 bool defer_lock = False;
6891 struct byte_range_lock *br_lck;
6892 uint32 block_smbpid;
6894 br_lck = do_lock(smbd_messaging_context(),
6895 fsp,
6896 lock_pid,
6897 count,
6898 offset,
6899 lock_type,
6900 WINDOWS_LOCK,
6901 blocking_lock,
6902 &status,
6903 &block_smbpid);
6905 if (br_lck && blocking_lock && ERROR_WAS_LOCK_DENIED(status)) {
6906 /* Windows internal resolution for blocking locks seems
6907 to be about 200ms... Don't wait for less than that. JRA. */
6908 if (lock_timeout != -1 && lock_timeout < lp_lock_spin_time()) {
6909 lock_timeout = lp_lock_spin_time();
6911 defer_lock = True;
6914 /* This heuristic seems to match W2K3 very well. If a
6915 lock sent with timeout of zero would fail with NT_STATUS_FILE_LOCK_CONFLICT
6916 it pretends we asked for a timeout of between 150 - 300 milliseconds as
6917 far as I can tell. Replacement for do_lock_spin(). JRA. */
6919 if (br_lck && lp_blocking_locks(SNUM(conn)) && !blocking_lock &&
6920 NT_STATUS_EQUAL((status), NT_STATUS_FILE_LOCK_CONFLICT)) {
6921 defer_lock = True;
6922 lock_timeout = lp_lock_spin_time();
6925 if (br_lck && defer_lock) {
6927 * A blocking lock was requested. Package up
6928 * this smb into a queued request and push it
6929 * onto the blocking lock queue.
6931 if(push_blocking_lock_request(br_lck,
6932 req,
6933 fsp,
6934 lock_timeout,
6936 lock_pid,
6937 lock_type,
6938 WINDOWS_LOCK,
6939 offset,
6940 count,
6941 block_smbpid)) {
6942 TALLOC_FREE(br_lck);
6943 END_PROFILE(SMBlockingX);
6944 return;
6948 TALLOC_FREE(br_lck);
6951 if (NT_STATUS_V(status)) {
6952 END_PROFILE(SMBlockingX);
6953 reply_nterror(req, status);
6954 return;
6958 /* If any of the above locks failed, then we must unlock
6959 all of the previous locks (X/Open spec). */
6961 if (!(locktype & LOCKING_ANDX_CANCEL_LOCK) &&
6962 (i != num_locks) &&
6963 (num_locks != 0)) {
6965 * Ensure we don't do a remove on the lock that just failed,
6966 * as under POSIX rules, if we have a lock already there, we
6967 * will delete it (and we shouldn't) .....
6969 for(i--; i >= 0; i--) {
6970 lock_pid = get_lock_pid( data, i, large_file_format);
6971 count = get_lock_count( data, i, large_file_format);
6972 offset = get_lock_offset( data, i, large_file_format,
6973 &err);
6976 * There is no error code marked "stupid client
6977 * bug".... :-).
6979 if(err) {
6980 END_PROFILE(SMBlockingX);
6981 reply_doserror(req, ERRDOS, ERRnoaccess);
6982 return;
6985 do_unlock(smbd_messaging_context(),
6986 fsp,
6987 lock_pid,
6988 count,
6989 offset,
6990 WINDOWS_LOCK);
6992 END_PROFILE(SMBlockingX);
6993 reply_nterror(req, status);
6994 return;
6997 reply_outbuf(req, 2, 0);
6999 DEBUG(3, ("lockingX fnum=%d type=%d num_locks=%d num_ulocks=%d\n",
7000 fsp->fnum, (unsigned int)locktype, num_locks, num_ulocks));
7002 END_PROFILE(SMBlockingX);
7003 chain_reply(req);
7006 #undef DBGC_CLASS
7007 #define DBGC_CLASS DBGC_ALL
7009 /****************************************************************************
7010 Reply to a SMBreadbmpx (read block multiplex) request.
7011 Always reply with an error, if someone has a platform really needs this,
7012 please contact vl@samba.org
7013 ****************************************************************************/
7015 void reply_readbmpx(struct smb_request *req)
7017 START_PROFILE(SMBreadBmpx);
7018 reply_doserror(req, ERRSRV, ERRuseSTD);
7019 END_PROFILE(SMBreadBmpx);
7020 return;
7023 /****************************************************************************
7024 Reply to a SMBreadbs (read block multiplex secondary) request.
7025 Always reply with an error, if someone has a platform really needs this,
7026 please contact vl@samba.org
7027 ****************************************************************************/
7029 void reply_readbs(struct smb_request *req)
7031 START_PROFILE(SMBreadBs);
7032 reply_doserror(req, ERRSRV, ERRuseSTD);
7033 END_PROFILE(SMBreadBs);
7034 return;
7037 /****************************************************************************
7038 Reply to a SMBsetattrE.
7039 ****************************************************************************/
7041 void reply_setattrE(struct smb_request *req)
7043 connection_struct *conn = req->conn;
7044 struct timespec ts[2];
7045 files_struct *fsp;
7046 SMB_STRUCT_STAT sbuf;
7047 NTSTATUS status;
7049 START_PROFILE(SMBsetattrE);
7051 if (req->wct < 7) {
7052 reply_nterror(req, NT_STATUS_INVALID_PARAMETER);
7053 END_PROFILE(SMBsetattrE);
7054 return;
7057 fsp = file_fsp(SVAL(req->inbuf,smb_vwv0));
7059 if(!fsp || (fsp->conn != conn)) {
7060 reply_doserror(req, ERRDOS, ERRbadfid);
7061 END_PROFILE(SMBsetattrE);
7062 return;
7067 * Convert the DOS times into unix times. Ignore create
7068 * time as UNIX can't set this.
7071 ts[0] = convert_time_t_to_timespec(
7072 srv_make_unix_date2(req->inbuf+smb_vwv3)); /* atime. */
7073 ts[1] = convert_time_t_to_timespec(
7074 srv_make_unix_date2(req->inbuf+smb_vwv5)); /* mtime. */
7076 reply_outbuf(req, 0, 0);
7079 * Patch from Ray Frush <frush@engr.colostate.edu>
7080 * Sometimes times are sent as zero - ignore them.
7083 /* Ensure we have a valid stat struct for the source. */
7084 if (fsp->fh->fd != -1) {
7085 if (SMB_VFS_FSTAT(fsp, &sbuf) == -1) {
7086 status = map_nt_error_from_unix(errno);
7087 reply_nterror(req, status);
7088 END_PROFILE(SMBsetattrE);
7089 return;
7091 } else {
7092 if (SMB_VFS_STAT(conn, fsp->fsp_name, &sbuf) == -1) {
7093 status = map_nt_error_from_unix(errno);
7094 reply_nterror(req, status);
7095 END_PROFILE(SMBsetattrE);
7096 return;
7100 status = smb_set_file_time(conn, fsp, fsp->fsp_name,
7101 &sbuf, ts, true);
7102 if (!NT_STATUS_IS_OK(status)) {
7103 reply_doserror(req, ERRDOS, ERRnoaccess);
7104 END_PROFILE(SMBsetattrE);
7105 return;
7108 DEBUG( 3, ( "reply_setattrE fnum=%d actime=%u modtime=%u\n",
7109 fsp->fnum,
7110 (unsigned int)ts[0].tv_sec,
7111 (unsigned int)ts[1].tv_sec));
7113 END_PROFILE(SMBsetattrE);
7114 return;
7118 /* Back from the dead for OS/2..... JRA. */
7120 /****************************************************************************
7121 Reply to a SMBwritebmpx (write block multiplex primary) request.
7122 Always reply with an error, if someone has a platform really needs this,
7123 please contact vl@samba.org
7124 ****************************************************************************/
7126 void reply_writebmpx(struct smb_request *req)
7128 START_PROFILE(SMBwriteBmpx);
7129 reply_doserror(req, ERRSRV, ERRuseSTD);
7130 END_PROFILE(SMBwriteBmpx);
7131 return;
7134 /****************************************************************************
7135 Reply to a SMBwritebs (write block multiplex secondary) request.
7136 Always reply with an error, if someone has a platform really needs this,
7137 please contact vl@samba.org
7138 ****************************************************************************/
7140 void reply_writebs(struct smb_request *req)
7142 START_PROFILE(SMBwriteBs);
7143 reply_doserror(req, ERRSRV, ERRuseSTD);
7144 END_PROFILE(SMBwriteBs);
7145 return;
7148 /****************************************************************************
7149 Reply to a SMBgetattrE.
7150 ****************************************************************************/
7152 void reply_getattrE(struct smb_request *req)
7154 connection_struct *conn = req->conn;
7155 SMB_STRUCT_STAT sbuf;
7156 int mode;
7157 files_struct *fsp;
7158 struct timespec create_ts;
7160 START_PROFILE(SMBgetattrE);
7162 if (req->wct < 1) {
7163 reply_nterror(req, NT_STATUS_INVALID_PARAMETER);
7164 END_PROFILE(SMBgetattrE);
7165 return;
7168 fsp = file_fsp(SVAL(req->inbuf,smb_vwv0));
7170 if(!fsp || (fsp->conn != conn)) {
7171 reply_doserror(req, ERRDOS, ERRbadfid);
7172 END_PROFILE(SMBgetattrE);
7173 return;
7176 /* Do an fstat on this file */
7177 if(fsp_stat(fsp, &sbuf)) {
7178 reply_unixerror(req, ERRDOS, ERRnoaccess);
7179 END_PROFILE(SMBgetattrE);
7180 return;
7183 mode = dos_mode(conn,fsp->fsp_name,&sbuf);
7186 * Convert the times into dos times. Set create
7187 * date to be last modify date as UNIX doesn't save
7188 * this.
7191 reply_outbuf(req, 11, 0);
7193 create_ts = get_create_timespec(&sbuf,
7194 lp_fake_dir_create_times(SNUM(conn)));
7195 srv_put_dos_date2((char *)req->outbuf, smb_vwv0, create_ts.tv_sec);
7196 srv_put_dos_date2((char *)req->outbuf, smb_vwv2, sbuf.st_atime);
7197 /* Should we check pending modtime here ? JRA */
7198 srv_put_dos_date2((char *)req->outbuf, smb_vwv4, sbuf.st_mtime);
7200 if (mode & aDIR) {
7201 SIVAL(req->outbuf, smb_vwv6, 0);
7202 SIVAL(req->outbuf, smb_vwv8, 0);
7203 } else {
7204 uint32 allocation_size = get_allocation_size(conn,fsp, &sbuf);
7205 SIVAL(req->outbuf, smb_vwv6, (uint32)sbuf.st_size);
7206 SIVAL(req->outbuf, smb_vwv8, allocation_size);
7208 SSVAL(req->outbuf,smb_vwv10, mode);
7210 DEBUG( 3, ( "reply_getattrE fnum=%d\n", fsp->fnum));
7212 END_PROFILE(SMBgetattrE);
7213 return;