dsdb: Use WERR_DS_ATT_NOT_DEF_IN_SCHEMA for failed schema lookups
[Samba.git] / source3 / modules / vfs_default.c
blob82d059c28fae90afe03c6b0e84ebfcf438bb511e
1 /*
2 Unix SMB/CIFS implementation.
3 Wrap disk only vfs functions to sidestep dodgy compilers.
4 Copyright (C) Tim Potter 1998
5 Copyright (C) Jeremy Allison 2007
7 This program is free software; you can redistribute it and/or modify
8 it under the terms of the GNU General Public License as published by
9 the Free Software Foundation; either version 3 of the License, or
10 (at your option) any later version.
12 This program is distributed in the hope that it will be useful,
13 but WITHOUT ANY WARRANTY; without even the implied warranty of
14 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
15 GNU General Public License for more details.
17 You should have received a copy of the GNU General Public License
18 along with this program. If not, see <http://www.gnu.org/licenses/>.
21 #include "includes.h"
22 #include "system/time.h"
23 #include "system/filesys.h"
24 #include "smbd/smbd.h"
25 #include "smbd/globals.h"
26 #include "ntioctl.h"
27 #include "smbprofile.h"
28 #include "../libcli/security/security.h"
29 #include "passdb/lookup_sid.h"
30 #include "source3/include/msdfs.h"
31 #include "librpc/gen_ndr/ndr_dfsblobs.h"
32 #include "lib/util/tevent_unix.h"
33 #include "lib/asys/asys.h"
34 #include "lib/util/tevent_ntstatus.h"
36 #undef DBGC_CLASS
37 #define DBGC_CLASS DBGC_VFS
39 /* Check for NULL pointer parameters in vfswrap_* functions */
41 /* We don't want to have NULL function pointers lying around. Someone
42 is sure to try and execute them. These stubs are used to prevent
43 this possibility. */
45 static int vfswrap_connect(vfs_handle_struct *handle, const char *service, const char *user)
47 return 0; /* Return >= 0 for success */
50 static void vfswrap_disconnect(vfs_handle_struct *handle)
54 /* Disk operations */
56 static uint64_t vfswrap_disk_free(vfs_handle_struct *handle, const char *path, bool small_query, uint64_t *bsize,
57 uint64_t *dfree, uint64_t *dsize)
59 uint64_t result;
61 result = sys_disk_free(handle->conn, path, small_query, bsize, dfree, dsize);
62 return result;
65 static int vfswrap_get_quota(struct vfs_handle_struct *handle, enum SMB_QUOTA_TYPE qtype, unid_t id, SMB_DISK_QUOTA *qt)
67 #ifdef HAVE_SYS_QUOTAS
68 int result;
70 START_PROFILE(syscall_get_quota);
71 result = sys_get_quota(handle->conn->connectpath, qtype, id, qt);
72 END_PROFILE(syscall_get_quota);
73 return result;
74 #else
75 errno = ENOSYS;
76 return -1;
77 #endif
80 static int vfswrap_set_quota(struct vfs_handle_struct *handle, enum SMB_QUOTA_TYPE qtype, unid_t id, SMB_DISK_QUOTA *qt)
82 #ifdef HAVE_SYS_QUOTAS
83 int result;
85 START_PROFILE(syscall_set_quota);
86 result = sys_set_quota(handle->conn->connectpath, qtype, id, qt);
87 END_PROFILE(syscall_set_quota);
88 return result;
89 #else
90 errno = ENOSYS;
91 return -1;
92 #endif
95 static int vfswrap_get_shadow_copy_data(struct vfs_handle_struct *handle,
96 struct files_struct *fsp,
97 struct shadow_copy_data *shadow_copy_data,
98 bool labels)
100 errno = ENOSYS;
101 return -1; /* Not implemented. */
104 static int vfswrap_statvfs(struct vfs_handle_struct *handle, const char *path, vfs_statvfs_struct *statbuf)
106 return sys_statvfs(path, statbuf);
109 static uint32_t vfswrap_fs_capabilities(struct vfs_handle_struct *handle,
110 enum timestamp_set_resolution *p_ts_res)
112 connection_struct *conn = handle->conn;
113 uint32_t caps = FILE_CASE_SENSITIVE_SEARCH | FILE_CASE_PRESERVED_NAMES;
114 struct smb_filename *smb_fname_cpath = NULL;
115 struct vfs_statvfs_struct statbuf;
116 int ret;
118 ZERO_STRUCT(statbuf);
119 ret = sys_statvfs(conn->connectpath, &statbuf);
120 if (ret == 0) {
121 caps = statbuf.FsCapabilities;
124 *p_ts_res = TIMESTAMP_SET_SECONDS;
126 /* Work out what timestamp resolution we can
127 * use when setting a timestamp. */
129 smb_fname_cpath = synthetic_smb_fname(talloc_tos(), conn->connectpath,
130 NULL, NULL);
131 if (smb_fname_cpath == NULL) {
132 return caps;
135 ret = SMB_VFS_STAT(conn, smb_fname_cpath);
136 if (ret == -1) {
137 TALLOC_FREE(smb_fname_cpath);
138 return caps;
141 if (smb_fname_cpath->st.st_ex_mtime.tv_nsec ||
142 smb_fname_cpath->st.st_ex_atime.tv_nsec ||
143 smb_fname_cpath->st.st_ex_ctime.tv_nsec) {
144 /* If any of the normal UNIX directory timestamps
145 * have a non-zero tv_nsec component assume
146 * we might be able to set sub-second timestamps.
147 * See what filetime set primitives we have.
149 #if defined(HAVE_UTIMENSAT)
150 *p_ts_res = TIMESTAMP_SET_NT_OR_BETTER;
151 #elif defined(HAVE_UTIMES)
152 /* utimes allows msec timestamps to be set. */
153 *p_ts_res = TIMESTAMP_SET_MSEC;
154 #elif defined(HAVE_UTIME)
155 /* utime only allows sec timestamps to be set. */
156 *p_ts_res = TIMESTAMP_SET_SECONDS;
157 #endif
159 DEBUG(10,("vfswrap_fs_capabilities: timestamp "
160 "resolution of %s "
161 "available on share %s, directory %s\n",
162 *p_ts_res == TIMESTAMP_SET_MSEC ? "msec" : "sec",
163 lp_servicename(talloc_tos(), conn->params->service),
164 conn->connectpath ));
166 TALLOC_FREE(smb_fname_cpath);
167 return caps;
170 static NTSTATUS vfswrap_get_dfs_referrals(struct vfs_handle_struct *handle,
171 struct dfs_GetDFSReferral *r)
173 struct junction_map *junction = NULL;
174 int consumedcnt = 0;
175 bool self_referral = false;
176 char *pathnamep = NULL;
177 char *local_dfs_path = NULL;
178 NTSTATUS status;
179 int i;
180 uint16_t max_referral_level = r->in.req.max_referral_level;
182 if (DEBUGLVL(10)) {
183 NDR_PRINT_IN_DEBUG(dfs_GetDFSReferral, r);
186 /* get the junction entry */
187 if (r->in.req.servername == NULL) {
188 return NT_STATUS_NOT_FOUND;
192 * Trim pathname sent by client so it begins with only one backslash.
193 * Two backslashes confuse some dfs clients
196 local_dfs_path = talloc_strdup(r, r->in.req.servername);
197 if (local_dfs_path == NULL) {
198 return NT_STATUS_NO_MEMORY;
200 pathnamep = local_dfs_path;
201 while (IS_DIRECTORY_SEP(pathnamep[0]) &&
202 IS_DIRECTORY_SEP(pathnamep[1])) {
203 pathnamep++;
206 junction = talloc_zero(r, struct junction_map);
207 if (junction == NULL) {
208 return NT_STATUS_NO_MEMORY;
211 /* The following call can change cwd. */
212 status = get_referred_path(r, pathnamep,
213 !handle->conn->sconn->using_smb2,
214 junction, &consumedcnt, &self_referral);
215 if (!NT_STATUS_IS_OK(status)) {
216 vfs_ChDir(handle->conn, handle->conn->connectpath);
217 return status;
219 vfs_ChDir(handle->conn, handle->conn->connectpath);
221 if (!self_referral) {
222 pathnamep[consumedcnt] = '\0';
224 if (DEBUGLVL(3)) {
225 dbgtext("setup_dfs_referral: Path %s to "
226 "alternate path(s):",
227 pathnamep);
228 for (i=0; i < junction->referral_count; i++) {
229 dbgtext(" %s",
230 junction->referral_list[i].alternate_path);
232 dbgtext(".\n");
236 if (r->in.req.max_referral_level <= 2) {
237 max_referral_level = 2;
239 if (r->in.req.max_referral_level >= 3) {
240 max_referral_level = 3;
243 r->out.resp = talloc_zero(r, struct dfs_referral_resp);
244 if (r->out.resp == NULL) {
245 return NT_STATUS_NO_MEMORY;
248 r->out.resp->path_consumed = strlen_m(pathnamep) * 2;
249 r->out.resp->nb_referrals = junction->referral_count;
251 r->out.resp->header_flags = DFS_HEADER_FLAG_STORAGE_SVR;
252 if (self_referral) {
253 r->out.resp->header_flags |= DFS_HEADER_FLAG_REFERAL_SVR;
256 r->out.resp->referral_entries = talloc_zero_array(r,
257 struct dfs_referral_type,
258 r->out.resp->nb_referrals);
259 if (r->out.resp->referral_entries == NULL) {
260 return NT_STATUS_NO_MEMORY;
263 switch (max_referral_level) {
264 case 2:
265 for(i=0; i < junction->referral_count; i++) {
266 struct referral *ref = &junction->referral_list[i];
267 TALLOC_CTX *mem_ctx = r->out.resp->referral_entries;
268 struct dfs_referral_type *t =
269 &r->out.resp->referral_entries[i];
270 struct dfs_referral_v2 *v2 = &t->referral.v2;
272 t->version = 2;
273 v2->size = VERSION2_REFERRAL_SIZE;
274 if (self_referral) {
275 v2->server_type = DFS_SERVER_ROOT;
276 } else {
277 v2->server_type = DFS_SERVER_NON_ROOT;
279 v2->entry_flags = 0;
280 v2->proximity = ref->proximity;
281 v2->ttl = ref->ttl;
282 v2->DFS_path = talloc_strdup(mem_ctx, pathnamep);
283 if (v2->DFS_path == NULL) {
284 return NT_STATUS_NO_MEMORY;
286 v2->DFS_alt_path = talloc_strdup(mem_ctx, pathnamep);
287 if (v2->DFS_alt_path == NULL) {
288 return NT_STATUS_NO_MEMORY;
290 v2->netw_address = talloc_strdup(mem_ctx,
291 ref->alternate_path);
292 if (v2->netw_address == NULL) {
293 return NT_STATUS_NO_MEMORY;
297 break;
298 case 3:
299 for(i=0; i < junction->referral_count; i++) {
300 struct referral *ref = &junction->referral_list[i];
301 TALLOC_CTX *mem_ctx = r->out.resp->referral_entries;
302 struct dfs_referral_type *t =
303 &r->out.resp->referral_entries[i];
304 struct dfs_referral_v3 *v3 = &t->referral.v3;
305 struct dfs_normal_referral *r1 = &v3->referrals.r1;
307 t->version = 3;
308 v3->size = VERSION3_REFERRAL_SIZE;
309 if (self_referral) {
310 v3->server_type = DFS_SERVER_ROOT;
311 } else {
312 v3->server_type = DFS_SERVER_NON_ROOT;
314 v3->entry_flags = 0;
315 v3->ttl = ref->ttl;
316 r1->DFS_path = talloc_strdup(mem_ctx, pathnamep);
317 if (r1->DFS_path == NULL) {
318 return NT_STATUS_NO_MEMORY;
320 r1->DFS_alt_path = talloc_strdup(mem_ctx, pathnamep);
321 if (r1->DFS_alt_path == NULL) {
322 return NT_STATUS_NO_MEMORY;
324 r1->netw_address = talloc_strdup(mem_ctx,
325 ref->alternate_path);
326 if (r1->netw_address == NULL) {
327 return NT_STATUS_NO_MEMORY;
330 break;
331 default:
332 DEBUG(0,("setup_dfs_referral: Invalid dfs referral "
333 "version: %d\n",
334 max_referral_level));
335 return NT_STATUS_INVALID_LEVEL;
338 if (DEBUGLVL(10)) {
339 NDR_PRINT_OUT_DEBUG(dfs_GetDFSReferral, r);
342 return NT_STATUS_OK;
345 /* Directory operations */
347 static DIR *vfswrap_opendir(vfs_handle_struct *handle, const char *fname, const char *mask, uint32 attr)
349 DIR *result;
351 START_PROFILE(syscall_opendir);
352 result = opendir(fname);
353 END_PROFILE(syscall_opendir);
354 return result;
357 static DIR *vfswrap_fdopendir(vfs_handle_struct *handle,
358 files_struct *fsp,
359 const char *mask,
360 uint32 attr)
362 DIR *result;
364 START_PROFILE(syscall_fdopendir);
365 result = sys_fdopendir(fsp->fh->fd);
366 END_PROFILE(syscall_fdopendir);
367 return result;
371 static struct dirent *vfswrap_readdir(vfs_handle_struct *handle,
372 DIR *dirp,
373 SMB_STRUCT_STAT *sbuf)
375 struct dirent *result;
377 START_PROFILE(syscall_readdir);
378 result = readdir(dirp);
379 END_PROFILE(syscall_readdir);
380 if (sbuf) {
381 /* Default Posix readdir() does not give us stat info.
382 * Set to invalid to indicate we didn't return this info. */
383 SET_STAT_INVALID(*sbuf);
384 #if defined(HAVE_DIRFD) && defined(HAVE_FSTATAT)
385 if (result != NULL) {
386 /* See if we can efficiently return this. */
387 struct stat st;
388 int flags = (lp_posix_pathnames() ?
389 AT_SYMLINK_NOFOLLOW : 0);
390 int ret = fstatat(dirfd(dirp),
391 result->d_name,
392 &st,
393 flags);
394 if (ret == 0) {
395 init_stat_ex_from_stat(sbuf,
396 &st,
397 lp_fake_dir_create_times(
398 SNUM(handle->conn)));
401 #endif
403 return result;
406 static void vfswrap_seekdir(vfs_handle_struct *handle, DIR *dirp, long offset)
408 START_PROFILE(syscall_seekdir);
409 seekdir(dirp, offset);
410 END_PROFILE(syscall_seekdir);
413 static long vfswrap_telldir(vfs_handle_struct *handle, DIR *dirp)
415 long result;
416 START_PROFILE(syscall_telldir);
417 result = telldir(dirp);
418 END_PROFILE(syscall_telldir);
419 return result;
422 static void vfswrap_rewinddir(vfs_handle_struct *handle, DIR *dirp)
424 START_PROFILE(syscall_rewinddir);
425 rewinddir(dirp);
426 END_PROFILE(syscall_rewinddir);
429 static int vfswrap_mkdir(vfs_handle_struct *handle, const char *path, mode_t mode)
431 int result;
432 bool has_dacl = False;
433 char *parent = NULL;
435 START_PROFILE(syscall_mkdir);
437 if (lp_inherit_acls(SNUM(handle->conn))
438 && parent_dirname(talloc_tos(), path, &parent, NULL)
439 && (has_dacl = directory_has_default_acl(handle->conn, parent)))
440 mode = (0777 & lp_dir_mask(SNUM(handle->conn)));
442 TALLOC_FREE(parent);
444 result = mkdir(path, mode);
446 if (result == 0 && !has_dacl) {
448 * We need to do this as the default behavior of POSIX ACLs
449 * is to set the mask to be the requested group permission
450 * bits, not the group permission bits to be the requested
451 * group permission bits. This is not what we want, as it will
452 * mess up any inherited ACL bits that were set. JRA.
454 int saved_errno = errno; /* We may get ENOSYS */
455 if ((SMB_VFS_CHMOD_ACL(handle->conn, path, mode) == -1) && (errno == ENOSYS))
456 errno = saved_errno;
459 END_PROFILE(syscall_mkdir);
460 return result;
463 static int vfswrap_rmdir(vfs_handle_struct *handle, const char *path)
465 int result;
467 START_PROFILE(syscall_rmdir);
468 result = rmdir(path);
469 END_PROFILE(syscall_rmdir);
470 return result;
473 static int vfswrap_closedir(vfs_handle_struct *handle, DIR *dirp)
475 int result;
477 START_PROFILE(syscall_closedir);
478 result = closedir(dirp);
479 END_PROFILE(syscall_closedir);
480 return result;
483 static void vfswrap_init_search_op(vfs_handle_struct *handle,
484 DIR *dirp)
486 /* Default behavior is a NOOP */
489 /* File operations */
491 static int vfswrap_open(vfs_handle_struct *handle,
492 struct smb_filename *smb_fname,
493 files_struct *fsp, int flags, mode_t mode)
495 int result = -1;
497 START_PROFILE(syscall_open);
499 if (smb_fname->stream_name) {
500 errno = ENOENT;
501 goto out;
504 result = open(smb_fname->base_name, flags, mode);
505 out:
506 END_PROFILE(syscall_open);
507 return result;
510 static NTSTATUS vfswrap_create_file(vfs_handle_struct *handle,
511 struct smb_request *req,
512 uint16_t root_dir_fid,
513 struct smb_filename *smb_fname,
514 uint32_t access_mask,
515 uint32_t share_access,
516 uint32_t create_disposition,
517 uint32_t create_options,
518 uint32_t file_attributes,
519 uint32_t oplock_request,
520 uint64_t allocation_size,
521 uint32_t private_flags,
522 struct security_descriptor *sd,
523 struct ea_list *ea_list,
524 files_struct **result,
525 int *pinfo)
527 return create_file_default(handle->conn, req, root_dir_fid, smb_fname,
528 access_mask, share_access,
529 create_disposition, create_options,
530 file_attributes, oplock_request,
531 allocation_size, private_flags,
532 sd, ea_list, result,
533 pinfo);
536 static int vfswrap_close(vfs_handle_struct *handle, files_struct *fsp)
538 int result;
540 START_PROFILE(syscall_close);
541 result = fd_close_posix(fsp);
542 END_PROFILE(syscall_close);
543 return result;
546 static ssize_t vfswrap_read(vfs_handle_struct *handle, files_struct *fsp, void *data, size_t n)
548 ssize_t result;
550 START_PROFILE_BYTES(syscall_read, n);
551 result = sys_read(fsp->fh->fd, data, n);
552 END_PROFILE(syscall_read);
553 return result;
556 static ssize_t vfswrap_pread(vfs_handle_struct *handle, files_struct *fsp, void *data,
557 size_t n, off_t offset)
559 ssize_t result;
561 #if defined(HAVE_PREAD) || defined(HAVE_PREAD64)
562 START_PROFILE_BYTES(syscall_pread, n);
563 result = sys_pread(fsp->fh->fd, data, n, offset);
564 END_PROFILE(syscall_pread);
566 if (result == -1 && errno == ESPIPE) {
567 /* Maintain the fiction that pipes can be seeked (sought?) on. */
568 result = SMB_VFS_READ(fsp, data, n);
569 fsp->fh->pos = 0;
572 #else /* HAVE_PREAD */
573 off_t curr;
574 int lerrno;
576 curr = SMB_VFS_LSEEK(fsp, 0, SEEK_CUR);
577 if (curr == -1 && errno == ESPIPE) {
578 /* Maintain the fiction that pipes can be seeked (sought?) on. */
579 result = SMB_VFS_READ(fsp, data, n);
580 fsp->fh->pos = 0;
581 return result;
584 if (SMB_VFS_LSEEK(fsp, offset, SEEK_SET) == -1) {
585 return -1;
588 errno = 0;
589 result = SMB_VFS_READ(fsp, data, n);
590 lerrno = errno;
592 SMB_VFS_LSEEK(fsp, curr, SEEK_SET);
593 errno = lerrno;
595 #endif /* HAVE_PREAD */
597 return result;
600 static ssize_t vfswrap_write(vfs_handle_struct *handle, files_struct *fsp, const void *data, size_t n)
602 ssize_t result;
604 START_PROFILE_BYTES(syscall_write, n);
605 result = sys_write(fsp->fh->fd, data, n);
606 END_PROFILE(syscall_write);
607 return result;
610 static ssize_t vfswrap_pwrite(vfs_handle_struct *handle, files_struct *fsp, const void *data,
611 size_t n, off_t offset)
613 ssize_t result;
615 #if defined(HAVE_PWRITE) || defined(HAVE_PRWITE64)
616 START_PROFILE_BYTES(syscall_pwrite, n);
617 result = sys_pwrite(fsp->fh->fd, data, n, offset);
618 END_PROFILE(syscall_pwrite);
620 if (result == -1 && errno == ESPIPE) {
621 /* Maintain the fiction that pipes can be sought on. */
622 result = SMB_VFS_WRITE(fsp, data, n);
625 #else /* HAVE_PWRITE */
626 off_t curr;
627 int lerrno;
629 curr = SMB_VFS_LSEEK(fsp, 0, SEEK_CUR);
630 if (curr == -1) {
631 return -1;
634 if (SMB_VFS_LSEEK(fsp, offset, SEEK_SET) == -1) {
635 return -1;
638 result = SMB_VFS_WRITE(fsp, data, n);
639 lerrno = errno;
641 SMB_VFS_LSEEK(fsp, curr, SEEK_SET);
642 errno = lerrno;
644 #endif /* HAVE_PWRITE */
646 return result;
649 static void vfswrap_asys_finished(struct tevent_context *ev,
650 struct tevent_fd *fde,
651 uint16_t flags, void *p);
653 static bool vfswrap_init_asys_ctx(struct smbXsrv_connection *conn)
655 int ret;
656 int fd;
658 if (conn->asys_ctx != NULL) {
659 return true;
661 ret = asys_context_init(&conn->asys_ctx, aio_pending_size);
662 if (ret != 0) {
663 DEBUG(1, ("asys_context_init failed: %s\n", strerror(ret)));
664 return false;
667 fd = asys_signalfd(conn->asys_ctx);
669 set_blocking(fd, false);
671 conn->asys_fde = tevent_add_fd(conn->ev_ctx, conn, fd,
672 TEVENT_FD_READ,
673 vfswrap_asys_finished,
674 conn->asys_ctx);
675 if (conn->asys_fde == NULL) {
676 DEBUG(1, ("tevent_add_fd failed\n"));
677 asys_context_destroy(conn->asys_ctx);
678 conn->asys_ctx = NULL;
679 return false;
681 return true;
684 struct vfswrap_asys_state {
685 struct asys_context *asys_ctx;
686 struct tevent_req *req;
687 ssize_t ret;
688 int err;
691 static int vfswrap_asys_state_destructor(struct vfswrap_asys_state *s)
693 asys_cancel(s->asys_ctx, s->req);
694 return 0;
697 static struct tevent_req *vfswrap_pread_send(struct vfs_handle_struct *handle,
698 TALLOC_CTX *mem_ctx,
699 struct tevent_context *ev,
700 struct files_struct *fsp,
701 void *data,
702 size_t n, off_t offset)
704 struct tevent_req *req;
705 struct vfswrap_asys_state *state;
706 int ret;
708 req = tevent_req_create(mem_ctx, &state, struct vfswrap_asys_state);
709 if (req == NULL) {
710 return NULL;
712 if (!vfswrap_init_asys_ctx(handle->conn->sconn->conn)) {
713 tevent_req_oom(req);
714 return tevent_req_post(req, ev);
716 state->asys_ctx = handle->conn->sconn->conn->asys_ctx;
717 state->req = req;
719 ret = asys_pread(state->asys_ctx, fsp->fh->fd, data, n, offset, req);
720 if (ret != 0) {
721 tevent_req_error(req, ret);
722 return tevent_req_post(req, ev);
724 talloc_set_destructor(state, vfswrap_asys_state_destructor);
726 return req;
729 static struct tevent_req *vfswrap_pwrite_send(struct vfs_handle_struct *handle,
730 TALLOC_CTX *mem_ctx,
731 struct tevent_context *ev,
732 struct files_struct *fsp,
733 const void *data,
734 size_t n, off_t offset)
736 struct tevent_req *req;
737 struct vfswrap_asys_state *state;
738 int ret;
740 req = tevent_req_create(mem_ctx, &state, struct vfswrap_asys_state);
741 if (req == NULL) {
742 return NULL;
744 if (!vfswrap_init_asys_ctx(handle->conn->sconn->conn)) {
745 tevent_req_oom(req);
746 return tevent_req_post(req, ev);
748 state->asys_ctx = handle->conn->sconn->conn->asys_ctx;
749 state->req = req;
751 ret = asys_pwrite(state->asys_ctx, fsp->fh->fd, data, n, offset, req);
752 if (ret != 0) {
753 tevent_req_error(req, ret);
754 return tevent_req_post(req, ev);
756 talloc_set_destructor(state, vfswrap_asys_state_destructor);
758 return req;
761 static struct tevent_req *vfswrap_fsync_send(struct vfs_handle_struct *handle,
762 TALLOC_CTX *mem_ctx,
763 struct tevent_context *ev,
764 struct files_struct *fsp)
766 struct tevent_req *req;
767 struct vfswrap_asys_state *state;
768 int ret;
770 req = tevent_req_create(mem_ctx, &state, struct vfswrap_asys_state);
771 if (req == NULL) {
772 return NULL;
774 if (!vfswrap_init_asys_ctx(handle->conn->sconn->conn)) {
775 tevent_req_oom(req);
776 return tevent_req_post(req, ev);
778 state->asys_ctx = handle->conn->sconn->conn->asys_ctx;
779 state->req = req;
781 ret = asys_fsync(state->asys_ctx, fsp->fh->fd, req);
782 if (ret != 0) {
783 tevent_req_error(req, ret);
784 return tevent_req_post(req, ev);
786 talloc_set_destructor(state, vfswrap_asys_state_destructor);
788 return req;
791 static void vfswrap_asys_finished(struct tevent_context *ev,
792 struct tevent_fd *fde,
793 uint16_t flags, void *p)
795 struct asys_context *asys_ctx = (struct asys_context *)p;
796 struct tevent_req *req;
797 struct vfswrap_asys_state *state;
798 int res;
799 ssize_t ret;
800 int err;
801 void *private_data;
803 if ((flags & TEVENT_FD_READ) == 0) {
804 return;
807 while (true) {
808 res = asys_result(asys_ctx, &ret, &err, &private_data);
809 if (res == EINTR || res == EAGAIN) {
810 return;
812 #ifdef EWOULDBLOCK
813 if (res == EWOULDBLOCK) {
814 return;
816 #endif
818 if (res == ECANCELED) {
819 return;
822 if (res != 0) {
823 DEBUG(1, ("asys_result returned %s\n", strerror(res)));
824 return;
827 req = talloc_get_type_abort(private_data, struct tevent_req);
828 state = tevent_req_data(req, struct vfswrap_asys_state);
830 talloc_set_destructor(state, NULL);
832 state->ret = ret;
833 state->err = err;
834 tevent_req_defer_callback(req, ev);
835 tevent_req_done(req);
839 static ssize_t vfswrap_asys_ssize_t_recv(struct tevent_req *req, int *err)
841 struct vfswrap_asys_state *state = tevent_req_data(
842 req, struct vfswrap_asys_state);
844 if (tevent_req_is_unix_error(req, err)) {
845 return -1;
847 *err = state->err;
848 return state->ret;
851 static int vfswrap_asys_int_recv(struct tevent_req *req, int *err)
853 struct vfswrap_asys_state *state = tevent_req_data(
854 req, struct vfswrap_asys_state);
856 if (tevent_req_is_unix_error(req, err)) {
857 return -1;
859 *err = state->err;
860 return state->ret;
863 static off_t vfswrap_lseek(vfs_handle_struct *handle, files_struct *fsp, off_t offset, int whence)
865 off_t result = 0;
867 START_PROFILE(syscall_lseek);
869 /* Cope with 'stat' file opens. */
870 if (fsp->fh->fd != -1)
871 result = lseek(fsp->fh->fd, offset, whence);
874 * We want to maintain the fiction that we can seek
875 * on a fifo for file system purposes. This allows
876 * people to set up UNIX fifo's that feed data to Windows
877 * applications. JRA.
880 if((result == -1) && (errno == ESPIPE)) {
881 result = 0;
882 errno = 0;
885 END_PROFILE(syscall_lseek);
886 return result;
889 static ssize_t vfswrap_sendfile(vfs_handle_struct *handle, int tofd, files_struct *fromfsp, const DATA_BLOB *hdr,
890 off_t offset, size_t n)
892 ssize_t result;
894 START_PROFILE_BYTES(syscall_sendfile, n);
895 result = sys_sendfile(tofd, fromfsp->fh->fd, hdr, offset, n);
896 END_PROFILE(syscall_sendfile);
897 return result;
900 static ssize_t vfswrap_recvfile(vfs_handle_struct *handle,
901 int fromfd,
902 files_struct *tofsp,
903 off_t offset,
904 size_t n)
906 ssize_t result;
908 START_PROFILE_BYTES(syscall_recvfile, n);
909 result = sys_recvfile(fromfd, tofsp->fh->fd, offset, n);
910 END_PROFILE(syscall_recvfile);
911 return result;
914 static int vfswrap_rename(vfs_handle_struct *handle,
915 const struct smb_filename *smb_fname_src,
916 const struct smb_filename *smb_fname_dst)
918 int result = -1;
920 START_PROFILE(syscall_rename);
922 if (smb_fname_src->stream_name || smb_fname_dst->stream_name) {
923 errno = ENOENT;
924 goto out;
927 result = rename(smb_fname_src->base_name, smb_fname_dst->base_name);
929 out:
930 END_PROFILE(syscall_rename);
931 return result;
934 static int vfswrap_fsync(vfs_handle_struct *handle, files_struct *fsp)
936 #ifdef HAVE_FSYNC
937 int result;
939 START_PROFILE(syscall_fsync);
940 result = fsync(fsp->fh->fd);
941 END_PROFILE(syscall_fsync);
942 return result;
943 #else
944 return 0;
945 #endif
948 static int vfswrap_stat(vfs_handle_struct *handle,
949 struct smb_filename *smb_fname)
951 int result = -1;
953 START_PROFILE(syscall_stat);
955 if (smb_fname->stream_name) {
956 errno = ENOENT;
957 goto out;
960 result = sys_stat(smb_fname->base_name, &smb_fname->st,
961 lp_fake_dir_create_times(SNUM(handle->conn)));
962 out:
963 END_PROFILE(syscall_stat);
964 return result;
967 static int vfswrap_fstat(vfs_handle_struct *handle, files_struct *fsp, SMB_STRUCT_STAT *sbuf)
969 int result;
971 START_PROFILE(syscall_fstat);
972 result = sys_fstat(fsp->fh->fd,
973 sbuf, lp_fake_dir_create_times(SNUM(handle->conn)));
974 END_PROFILE(syscall_fstat);
975 return result;
978 static int vfswrap_lstat(vfs_handle_struct *handle,
979 struct smb_filename *smb_fname)
981 int result = -1;
983 START_PROFILE(syscall_lstat);
985 if (smb_fname->stream_name) {
986 errno = ENOENT;
987 goto out;
990 result = sys_lstat(smb_fname->base_name, &smb_fname->st,
991 lp_fake_dir_create_times(SNUM(handle->conn)));
992 out:
993 END_PROFILE(syscall_lstat);
994 return result;
997 static NTSTATUS vfswrap_translate_name(struct vfs_handle_struct *handle,
998 const char *name,
999 enum vfs_translate_direction direction,
1000 TALLOC_CTX *mem_ctx,
1001 char **mapped_name)
1003 return NT_STATUS_NONE_MAPPED;
1007 * Implement the default fsctl operation.
1009 static bool vfswrap_logged_ioctl_message = false;
1011 static NTSTATUS vfswrap_fsctl(struct vfs_handle_struct *handle,
1012 struct files_struct *fsp,
1013 TALLOC_CTX *ctx,
1014 uint32_t function,
1015 uint16_t req_flags, /* Needed for UNICODE ... */
1016 const uint8_t *_in_data,
1017 uint32_t in_len,
1018 uint8_t **_out_data,
1019 uint32_t max_out_len,
1020 uint32_t *out_len)
1022 const char *in_data = (const char *)_in_data;
1023 char **out_data = (char **)_out_data;
1025 switch (function) {
1026 case FSCTL_SET_SPARSE:
1028 bool set_sparse = true;
1029 NTSTATUS status;
1031 if (in_len >= 1 && in_data[0] == 0) {
1032 set_sparse = false;
1035 status = file_set_sparse(handle->conn, fsp, set_sparse);
1037 DEBUG(NT_STATUS_IS_OK(status) ? 10 : 9,
1038 ("FSCTL_SET_SPARSE: fname[%s] set[%u] - %s\n",
1039 smb_fname_str_dbg(fsp->fsp_name), set_sparse,
1040 nt_errstr(status)));
1042 return status;
1045 case FSCTL_CREATE_OR_GET_OBJECT_ID:
1047 unsigned char objid[16];
1048 char *return_data = NULL;
1050 /* This should return the object-id on this file.
1051 * I think I'll make this be the inode+dev. JRA.
1054 DEBUG(10,("FSCTL_CREATE_OR_GET_OBJECT_ID: called on %s\n",
1055 fsp_fnum_dbg(fsp)));
1057 *out_len = (max_out_len >= 64) ? 64 : max_out_len;
1058 /* Hmmm, will this cause problems if less data asked for? */
1059 return_data = talloc_array(ctx, char, 64);
1060 if (return_data == NULL) {
1061 return NT_STATUS_NO_MEMORY;
1064 /* For backwards compatibility only store the dev/inode. */
1065 push_file_id_16(return_data, &fsp->file_id);
1066 memcpy(return_data+16,create_volume_objectid(fsp->conn,objid),16);
1067 push_file_id_16(return_data+32, &fsp->file_id);
1068 *out_data = return_data;
1069 return NT_STATUS_OK;
1072 case FSCTL_GET_REPARSE_POINT:
1074 /* Fail it with STATUS_NOT_A_REPARSE_POINT */
1075 DEBUG(10, ("FSCTL_GET_REPARSE_POINT: called on %s. "
1076 "Status: NOT_IMPLEMENTED\n", fsp_fnum_dbg(fsp)));
1077 return NT_STATUS_NOT_A_REPARSE_POINT;
1080 case FSCTL_SET_REPARSE_POINT:
1082 /* Fail it with STATUS_NOT_A_REPARSE_POINT */
1083 DEBUG(10, ("FSCTL_SET_REPARSE_POINT: called on %s. "
1084 "Status: NOT_IMPLEMENTED\n", fsp_fnum_dbg(fsp)));
1085 return NT_STATUS_NOT_A_REPARSE_POINT;
1088 case FSCTL_GET_SHADOW_COPY_DATA:
1091 * This is called to retrieve the number of Shadow Copies (a.k.a. snapshots)
1092 * and return their volume names. If max_data_count is 16, then it is just
1093 * asking for the number of volumes and length of the combined names.
1095 * pdata is the data allocated by our caller, but that uses
1096 * total_data_count (which is 0 in our case) rather than max_data_count.
1097 * Allocate the correct amount and return the pointer to let
1098 * it be deallocated when we return.
1100 struct shadow_copy_data *shadow_data = NULL;
1101 bool labels = False;
1102 uint32 labels_data_count = 0;
1103 uint32 i;
1104 char *cur_pdata = NULL;
1106 if (max_out_len < 16) {
1107 DEBUG(0,("FSCTL_GET_SHADOW_COPY_DATA: max_data_count(%u) < 16 is invalid!\n",
1108 max_out_len));
1109 return NT_STATUS_INVALID_PARAMETER;
1112 if (max_out_len > 16) {
1113 labels = True;
1116 shadow_data = talloc_zero(ctx, struct shadow_copy_data);
1117 if (shadow_data == NULL) {
1118 DEBUG(0,("TALLOC_ZERO() failed!\n"));
1119 return NT_STATUS_NO_MEMORY;
1123 * Call the VFS routine to actually do the work.
1125 if (SMB_VFS_GET_SHADOW_COPY_DATA(fsp, shadow_data, labels)!=0) {
1126 TALLOC_FREE(shadow_data);
1127 if (errno == ENOSYS) {
1128 DEBUG(5,("FSCTL_GET_SHADOW_COPY_DATA: connectpath %s, not supported.\n",
1129 fsp->conn->connectpath));
1130 return NT_STATUS_NOT_SUPPORTED;
1131 } else {
1132 DEBUG(0,("FSCTL_GET_SHADOW_COPY_DATA: connectpath %s, failed.\n",
1133 fsp->conn->connectpath));
1134 return NT_STATUS_UNSUCCESSFUL;
1138 labels_data_count = (shadow_data->num_volumes * 2 *
1139 sizeof(SHADOW_COPY_LABEL)) + 2;
1141 if (!labels) {
1142 *out_len = 16;
1143 } else {
1144 *out_len = 12 + labels_data_count + 4;
1147 if (max_out_len < *out_len) {
1148 DEBUG(0,("FSCTL_GET_SHADOW_COPY_DATA: max_data_count(%u) too small (%u) bytes needed!\n",
1149 max_out_len, *out_len));
1150 TALLOC_FREE(shadow_data);
1151 return NT_STATUS_BUFFER_TOO_SMALL;
1154 cur_pdata = talloc_array(ctx, char, *out_len);
1155 if (cur_pdata == NULL) {
1156 TALLOC_FREE(shadow_data);
1157 return NT_STATUS_NO_MEMORY;
1160 *out_data = cur_pdata;
1162 /* num_volumes 4 bytes */
1163 SIVAL(cur_pdata, 0, shadow_data->num_volumes);
1165 if (labels) {
1166 /* num_labels 4 bytes */
1167 SIVAL(cur_pdata, 4, shadow_data->num_volumes);
1170 /* needed_data_count 4 bytes */
1171 SIVAL(cur_pdata, 8, labels_data_count + 4);
1173 cur_pdata += 12;
1175 DEBUG(10,("FSCTL_GET_SHADOW_COPY_DATA: %u volumes for path[%s].\n",
1176 shadow_data->num_volumes, fsp_str_dbg(fsp)));
1177 if (labels && shadow_data->labels) {
1178 for (i=0; i<shadow_data->num_volumes; i++) {
1179 srvstr_push(cur_pdata, req_flags,
1180 cur_pdata, shadow_data->labels[i],
1181 2 * sizeof(SHADOW_COPY_LABEL),
1182 STR_UNICODE|STR_TERMINATE);
1183 cur_pdata += 2 * sizeof(SHADOW_COPY_LABEL);
1184 DEBUGADD(10,("Label[%u]: '%s'\n",i,shadow_data->labels[i]));
1188 TALLOC_FREE(shadow_data);
1190 return NT_STATUS_OK;
1193 case FSCTL_FIND_FILES_BY_SID:
1195 /* pretend this succeeded -
1197 * we have to send back a list with all files owned by this SID
1199 * but I have to check that --metze
1201 struct dom_sid sid;
1202 uid_t uid;
1203 size_t sid_len;
1205 DEBUG(10, ("FSCTL_FIND_FILES_BY_SID: called on %s\n",
1206 fsp_fnum_dbg(fsp)));
1208 if (in_len < 8) {
1209 /* NT_STATUS_BUFFER_TOO_SMALL maybe? */
1210 return NT_STATUS_INVALID_PARAMETER;
1213 sid_len = MIN(in_len - 4,SID_MAX_SIZE);
1215 /* unknown 4 bytes: this is not the length of the sid :-( */
1216 /*unknown = IVAL(pdata,0);*/
1218 if (!sid_parse(in_data + 4, sid_len, &sid)) {
1219 return NT_STATUS_INVALID_PARAMETER;
1221 DEBUGADD(10, ("for SID: %s\n", sid_string_dbg(&sid)));
1223 if (!sid_to_uid(&sid, &uid)) {
1224 DEBUG(0,("sid_to_uid: failed, sid[%s] sid_len[%lu]\n",
1225 sid_string_dbg(&sid),
1226 (unsigned long)sid_len));
1227 uid = (-1);
1230 /* we can take a look at the find source :-)
1232 * find ./ -uid $uid -name '*' is what we need here
1235 * and send 4bytes len and then NULL terminated unicode strings
1236 * for each file
1238 * but I don't know how to deal with the paged results
1239 * (maybe we can hang the result anywhere in the fsp struct)
1241 * but I don't know how to deal with the paged results
1242 * (maybe we can hang the result anywhere in the fsp struct)
1244 * we don't send all files at once
1245 * and at the next we should *not* start from the beginning,
1246 * so we have to cache the result
1248 * --metze
1251 /* this works for now... */
1252 return NT_STATUS_OK;
1255 case FSCTL_QUERY_ALLOCATED_RANGES:
1257 /* FIXME: This is just a dummy reply, telling that all of the
1258 * file is allocated. MKS cp needs that.
1259 * Adding the real allocated ranges via FIEMAP on Linux
1260 * and SEEK_DATA/SEEK_HOLE on Solaris is needed to make
1261 * this FSCTL correct for sparse files.
1263 NTSTATUS status;
1264 uint64_t offset, length;
1265 char *out_data_tmp = NULL;
1267 if (in_len != 16) {
1268 DEBUG(0,("FSCTL_QUERY_ALLOCATED_RANGES: data_count(%u) != 16 is invalid!\n",
1269 in_len));
1270 return NT_STATUS_INVALID_PARAMETER;
1273 if (max_out_len < 16) {
1274 DEBUG(0,("FSCTL_QUERY_ALLOCATED_RANGES: max_out_len (%u) < 16 is invalid!\n",
1275 max_out_len));
1276 return NT_STATUS_INVALID_PARAMETER;
1279 offset = BVAL(in_data,0);
1280 length = BVAL(in_data,8);
1282 if (offset + length < offset) {
1283 /* No 64-bit integer wrap. */
1284 return NT_STATUS_INVALID_PARAMETER;
1287 /* Shouldn't this be SMB_VFS_STAT ... ? */
1288 status = vfs_stat_fsp(fsp);
1289 if (!NT_STATUS_IS_OK(status)) {
1290 return status;
1293 *out_len = 16;
1294 out_data_tmp = talloc_array(ctx, char, *out_len);
1295 if (out_data_tmp == NULL) {
1296 DEBUG(10, ("unable to allocate memory for response\n"));
1297 return NT_STATUS_NO_MEMORY;
1300 if (offset > fsp->fsp_name->st.st_ex_size ||
1301 fsp->fsp_name->st.st_ex_size == 0 ||
1302 length == 0) {
1303 memset(out_data_tmp, 0, *out_len);
1304 } else {
1305 uint64_t end = offset + length;
1306 end = MIN(end, fsp->fsp_name->st.st_ex_size);
1307 SBVAL(out_data_tmp, 0, 0);
1308 SBVAL(out_data_tmp, 8, end);
1311 *out_data = out_data_tmp;
1313 return NT_STATUS_OK;
1316 case FSCTL_IS_VOLUME_DIRTY:
1318 DEBUG(10,("FSCTL_IS_VOLUME_DIRTY: called on %s "
1319 "(but remotely not supported)\n", fsp_fnum_dbg(fsp)));
1321 * http://msdn.microsoft.com/en-us/library/cc232128%28PROT.10%29.aspx
1322 * says we have to respond with NT_STATUS_INVALID_PARAMETER
1324 return NT_STATUS_INVALID_PARAMETER;
1327 default:
1329 * Only print once ... unfortunately there could be lots of
1330 * different FSCTLs that are called.
1332 if (!vfswrap_logged_ioctl_message) {
1333 vfswrap_logged_ioctl_message = true;
1334 DEBUG(2, ("%s (0x%x): Currently not implemented.\n",
1335 __func__, function));
1339 return NT_STATUS_NOT_SUPPORTED;
1342 struct vfs_cc_state {
1343 off_t copied;
1344 uint8_t buf[65536];
1347 static struct tevent_req *vfswrap_copy_chunk_send(struct vfs_handle_struct *handle,
1348 TALLOC_CTX *mem_ctx,
1349 struct tevent_context *ev,
1350 struct files_struct *src_fsp,
1351 off_t src_off,
1352 struct files_struct *dest_fsp,
1353 off_t dest_off,
1354 off_t num)
1356 struct tevent_req *req;
1357 struct vfs_cc_state *vfs_cc_state;
1358 NTSTATUS status;
1360 DEBUG(10, ("performing server side copy chunk of length %lu\n",
1361 (unsigned long)num));
1363 req = tevent_req_create(mem_ctx, &vfs_cc_state, struct vfs_cc_state);
1364 if (req == NULL) {
1365 return NULL;
1368 status = vfs_stat_fsp(src_fsp);
1369 if (tevent_req_nterror(req, status)) {
1370 return tevent_req_post(req, ev);
1373 if (src_fsp->fsp_name->st.st_ex_size < src_off + num) {
1375 * [MS-SMB2] 3.3.5.15.6 Handling a Server-Side Data Copy Request
1376 * If the SourceOffset or SourceOffset + Length extends beyond
1377 * the end of file, the server SHOULD<240> treat this as a
1378 * STATUS_END_OF_FILE error.
1379 * ...
1380 * <240> Section 3.3.5.15.6: Windows servers will return
1381 * STATUS_INVALID_VIEW_SIZE instead of STATUS_END_OF_FILE.
1383 tevent_req_nterror(req, NT_STATUS_INVALID_VIEW_SIZE);
1384 return tevent_req_post(req, ev);
1387 /* could use 2.6.33+ sendfile here to do this in kernel */
1388 while (vfs_cc_state->copied < num) {
1389 ssize_t ret;
1390 struct lock_struct lck;
1391 int saved_errno;
1393 off_t this_num = MIN(sizeof(vfs_cc_state->buf),
1394 num - vfs_cc_state->copied);
1396 init_strict_lock_struct(src_fsp,
1397 src_fsp->op->global->open_persistent_id,
1398 src_off,
1399 this_num,
1400 READ_LOCK,
1401 &lck);
1403 if (!SMB_VFS_STRICT_LOCK(src_fsp->conn, src_fsp, &lck)) {
1404 tevent_req_nterror(req, NT_STATUS_FILE_LOCK_CONFLICT);
1405 return tevent_req_post(req, ev);
1408 ret = SMB_VFS_PREAD(src_fsp, vfs_cc_state->buf,
1409 this_num, src_off);
1410 if (ret == -1) {
1411 saved_errno = errno;
1414 SMB_VFS_STRICT_UNLOCK(src_fsp->conn, src_fsp, &lck);
1416 if (ret == -1) {
1417 errno = saved_errno;
1418 tevent_req_nterror(req, map_nt_error_from_unix(errno));
1419 return tevent_req_post(req, ev);
1421 if (ret != this_num) {
1422 /* zero tolerance for short reads */
1423 tevent_req_nterror(req, NT_STATUS_IO_DEVICE_ERROR);
1424 return tevent_req_post(req, ev);
1427 src_off += ret;
1429 init_strict_lock_struct(dest_fsp,
1430 dest_fsp->op->global->open_persistent_id,
1431 dest_off,
1432 this_num,
1433 WRITE_LOCK,
1434 &lck);
1436 if (!SMB_VFS_STRICT_LOCK(dest_fsp->conn, dest_fsp, &lck)) {
1437 tevent_req_nterror(req, NT_STATUS_FILE_LOCK_CONFLICT);
1438 return tevent_req_post(req, ev);
1441 ret = SMB_VFS_PWRITE(dest_fsp, vfs_cc_state->buf,
1442 this_num, dest_off);
1443 if (ret == -1) {
1444 saved_errno = errno;
1447 SMB_VFS_STRICT_UNLOCK(src_fsp->conn, src_fsp, &lck);
1449 if (ret == -1) {
1450 errno = saved_errno;
1451 tevent_req_nterror(req, map_nt_error_from_unix(errno));
1452 return tevent_req_post(req, ev);
1454 if (ret != this_num) {
1455 /* zero tolerance for short writes */
1456 tevent_req_nterror(req, NT_STATUS_IO_DEVICE_ERROR);
1457 return tevent_req_post(req, ev);
1459 dest_off += ret;
1461 vfs_cc_state->copied += this_num;
1464 tevent_req_done(req);
1465 return tevent_req_post(req, ev);
1468 static NTSTATUS vfswrap_copy_chunk_recv(struct vfs_handle_struct *handle,
1469 struct tevent_req *req,
1470 off_t *copied)
1472 struct vfs_cc_state *vfs_cc_state = tevent_req_data(req,
1473 struct vfs_cc_state);
1474 NTSTATUS status;
1476 if (tevent_req_is_nterror(req, &status)) {
1477 DEBUG(2, ("server side copy chunk failed: %s\n",
1478 nt_errstr(status)));
1479 *copied = 0;
1480 tevent_req_received(req);
1481 return status;
1484 *copied = vfs_cc_state->copied;
1485 DEBUG(10, ("server side copy chunk copied %lu\n",
1486 (unsigned long)*copied));
1487 tevent_req_received(req);
1489 return NT_STATUS_OK;
1492 /********************************************************************
1493 Given a stat buffer return the allocated size on disk, taking into
1494 account sparse files.
1495 ********************************************************************/
1496 static uint64_t vfswrap_get_alloc_size(vfs_handle_struct *handle,
1497 struct files_struct *fsp,
1498 const SMB_STRUCT_STAT *sbuf)
1500 uint64_t result;
1502 START_PROFILE(syscall_get_alloc_size);
1504 if(S_ISDIR(sbuf->st_ex_mode)) {
1505 result = 0;
1506 goto out;
1509 #if defined(HAVE_STAT_ST_BLOCKS) && defined(STAT_ST_BLOCKSIZE)
1510 /* The type of st_blocksize is blkcnt_t which *MUST* be
1511 signed (according to POSIX) and can be less than 64-bits.
1512 Ensure when we're converting to 64 bits wide we don't
1513 sign extend. */
1514 #if defined(SIZEOF_BLKCNT_T_8)
1515 result = (uint64_t)STAT_ST_BLOCKSIZE * (uint64_t)sbuf->st_ex_blocks;
1516 #elif defined(SIZEOF_BLKCNT_T_4)
1518 uint64_t bs = ((uint64_t)sbuf->st_ex_blocks) & 0xFFFFFFFFLL;
1519 result = (uint64_t)STAT_ST_BLOCKSIZE * bs;
1521 #else
1522 #error SIZEOF_BLKCNT_T_NOT_A_SUPPORTED_VALUE
1523 #endif
1524 #else
1525 result = get_file_size_stat(sbuf);
1526 #endif
1528 if (fsp && fsp->initial_allocation_size)
1529 result = MAX(result,fsp->initial_allocation_size);
1531 result = smb_roundup(handle->conn, result);
1533 out:
1534 END_PROFILE(syscall_get_alloc_size);
1535 return result;
1538 static int vfswrap_unlink(vfs_handle_struct *handle,
1539 const struct smb_filename *smb_fname)
1541 int result = -1;
1543 START_PROFILE(syscall_unlink);
1545 if (smb_fname->stream_name) {
1546 errno = ENOENT;
1547 goto out;
1549 result = unlink(smb_fname->base_name);
1551 out:
1552 END_PROFILE(syscall_unlink);
1553 return result;
1556 static int vfswrap_chmod(vfs_handle_struct *handle, const char *path, mode_t mode)
1558 int result;
1560 START_PROFILE(syscall_chmod);
1563 * We need to do this due to the fact that the default POSIX ACL
1564 * chmod modifies the ACL *mask* for the group owner, not the
1565 * group owner bits directly. JRA.
1570 int saved_errno = errno; /* We might get ENOSYS */
1571 if ((result = SMB_VFS_CHMOD_ACL(handle->conn, path, mode)) == 0) {
1572 END_PROFILE(syscall_chmod);
1573 return result;
1575 /* Error - return the old errno. */
1576 errno = saved_errno;
1579 result = chmod(path, mode);
1580 END_PROFILE(syscall_chmod);
1581 return result;
1584 static int vfswrap_fchmod(vfs_handle_struct *handle, files_struct *fsp, mode_t mode)
1586 int result;
1588 START_PROFILE(syscall_fchmod);
1591 * We need to do this due to the fact that the default POSIX ACL
1592 * chmod modifies the ACL *mask* for the group owner, not the
1593 * group owner bits directly. JRA.
1597 int saved_errno = errno; /* We might get ENOSYS */
1598 if ((result = SMB_VFS_FCHMOD_ACL(fsp, mode)) == 0) {
1599 END_PROFILE(syscall_fchmod);
1600 return result;
1602 /* Error - return the old errno. */
1603 errno = saved_errno;
1606 #if defined(HAVE_FCHMOD)
1607 result = fchmod(fsp->fh->fd, mode);
1608 #else
1609 result = -1;
1610 errno = ENOSYS;
1611 #endif
1613 END_PROFILE(syscall_fchmod);
1614 return result;
1617 static int vfswrap_chown(vfs_handle_struct *handle, const char *path, uid_t uid, gid_t gid)
1619 int result;
1621 START_PROFILE(syscall_chown);
1622 result = chown(path, uid, gid);
1623 END_PROFILE(syscall_chown);
1624 return result;
1627 static int vfswrap_fchown(vfs_handle_struct *handle, files_struct *fsp, uid_t uid, gid_t gid)
1629 #ifdef HAVE_FCHOWN
1630 int result;
1632 START_PROFILE(syscall_fchown);
1633 result = fchown(fsp->fh->fd, uid, gid);
1634 END_PROFILE(syscall_fchown);
1635 return result;
1636 #else
1637 errno = ENOSYS;
1638 return -1;
1639 #endif
1642 static int vfswrap_lchown(vfs_handle_struct *handle, const char *path, uid_t uid, gid_t gid)
1644 int result;
1646 START_PROFILE(syscall_lchown);
1647 result = lchown(path, uid, gid);
1648 END_PROFILE(syscall_lchown);
1649 return result;
1652 static int vfswrap_chdir(vfs_handle_struct *handle, const char *path)
1654 int result;
1656 START_PROFILE(syscall_chdir);
1657 result = chdir(path);
1658 END_PROFILE(syscall_chdir);
1659 return result;
1662 static char *vfswrap_getwd(vfs_handle_struct *handle)
1664 char *result;
1666 START_PROFILE(syscall_getwd);
1667 result = sys_getwd();
1668 END_PROFILE(syscall_getwd);
1669 return result;
1672 /*********************************************************************
1673 nsec timestamp resolution call. Convert down to whatever the underlying
1674 system will support.
1675 **********************************************************************/
1677 static int vfswrap_ntimes(vfs_handle_struct *handle,
1678 const struct smb_filename *smb_fname,
1679 struct smb_file_time *ft)
1681 int result = -1;
1683 START_PROFILE(syscall_ntimes);
1685 if (smb_fname->stream_name) {
1686 errno = ENOENT;
1687 goto out;
1690 if (ft != NULL) {
1691 if (null_timespec(ft->atime)) {
1692 ft->atime= smb_fname->st.st_ex_atime;
1695 if (null_timespec(ft->mtime)) {
1696 ft->mtime = smb_fname->st.st_ex_mtime;
1699 if (!null_timespec(ft->create_time)) {
1700 set_create_timespec_ea(handle->conn,
1701 smb_fname,
1702 ft->create_time);
1705 if ((timespec_compare(&ft->atime,
1706 &smb_fname->st.st_ex_atime) == 0) &&
1707 (timespec_compare(&ft->mtime,
1708 &smb_fname->st.st_ex_mtime) == 0)) {
1709 return 0;
1713 #if defined(HAVE_UTIMENSAT)
1714 if (ft != NULL) {
1715 struct timespec ts[2];
1716 ts[0] = ft->atime;
1717 ts[1] = ft->mtime;
1718 result = utimensat(AT_FDCWD, smb_fname->base_name, ts, 0);
1719 } else {
1720 result = utimensat(AT_FDCWD, smb_fname->base_name, NULL, 0);
1722 if (!((result == -1) && (errno == ENOSYS))) {
1723 goto out;
1725 #endif
1726 #if defined(HAVE_UTIMES)
1727 if (ft != NULL) {
1728 struct timeval tv[2];
1729 tv[0] = convert_timespec_to_timeval(ft->atime);
1730 tv[1] = convert_timespec_to_timeval(ft->mtime);
1731 result = utimes(smb_fname->base_name, tv);
1732 } else {
1733 result = utimes(smb_fname->base_name, NULL);
1735 if (!((result == -1) && (errno == ENOSYS))) {
1736 goto out;
1738 #endif
1739 #if defined(HAVE_UTIME)
1740 if (ft != NULL) {
1741 struct utimbuf times;
1742 times.actime = convert_timespec_to_time_t(ft->atime);
1743 times.modtime = convert_timespec_to_time_t(ft->mtime);
1744 result = utime(smb_fname->base_name, &times);
1745 } else {
1746 result = utime(smb_fname->base_name, NULL);
1748 if (!((result == -1) && (errno == ENOSYS))) {
1749 goto out;
1751 #endif
1752 errno = ENOSYS;
1753 result = -1;
1755 out:
1756 END_PROFILE(syscall_ntimes);
1757 return result;
1760 /*********************************************************************
1761 A version of ftruncate that will write the space on disk if strict
1762 allocate is set.
1763 **********************************************************************/
1765 static int strict_allocate_ftruncate(vfs_handle_struct *handle, files_struct *fsp, off_t len)
1767 off_t space_to_write;
1768 uint64_t space_avail;
1769 uint64_t bsize,dfree,dsize;
1770 int ret;
1771 NTSTATUS status;
1772 SMB_STRUCT_STAT *pst;
1774 status = vfs_stat_fsp(fsp);
1775 if (!NT_STATUS_IS_OK(status)) {
1776 return -1;
1778 pst = &fsp->fsp_name->st;
1780 #ifdef S_ISFIFO
1781 if (S_ISFIFO(pst->st_ex_mode))
1782 return 0;
1783 #endif
1785 if (pst->st_ex_size == len)
1786 return 0;
1788 /* Shrink - just ftruncate. */
1789 if (pst->st_ex_size > len)
1790 return ftruncate(fsp->fh->fd, len);
1792 space_to_write = len - pst->st_ex_size;
1794 /* for allocation try fallocate first. This can fail on some
1795 platforms e.g. when the filesystem doesn't support it and no
1796 emulation is being done by the libc (like on AIX with JFS1). In that
1797 case we do our own emulation. fallocate implementations can
1798 return ENOTSUP or EINVAL in cases like that. */
1799 ret = SMB_VFS_FALLOCATE(fsp, VFS_FALLOCATE_EXTEND_SIZE,
1800 pst->st_ex_size, space_to_write);
1801 if (ret == ENOSPC) {
1802 errno = ENOSPC;
1803 return -1;
1805 if (ret == 0) {
1806 return 0;
1808 DEBUG(10,("strict_allocate_ftruncate: SMB_VFS_FALLOCATE failed with "
1809 "error %d. Falling back to slow manual allocation\n", ret));
1811 /* available disk space is enough or not? */
1812 space_avail = get_dfree_info(fsp->conn,
1813 fsp->fsp_name->base_name, false,
1814 &bsize,&dfree,&dsize);
1815 /* space_avail is 1k blocks */
1816 if (space_avail == (uint64_t)-1 ||
1817 ((uint64_t)space_to_write/1024 > space_avail) ) {
1818 errno = ENOSPC;
1819 return -1;
1822 /* Write out the real space on disk. */
1823 ret = vfs_slow_fallocate(fsp, pst->st_ex_size, space_to_write);
1824 if (ret != 0) {
1825 errno = ret;
1826 ret = -1;
1829 return 0;
1832 static int vfswrap_ftruncate(vfs_handle_struct *handle, files_struct *fsp, off_t len)
1834 int result = -1;
1835 SMB_STRUCT_STAT *pst;
1836 NTSTATUS status;
1837 char c = 0;
1839 START_PROFILE(syscall_ftruncate);
1841 if (lp_strict_allocate(SNUM(fsp->conn)) && !fsp->is_sparse) {
1842 result = strict_allocate_ftruncate(handle, fsp, len);
1843 END_PROFILE(syscall_ftruncate);
1844 return result;
1847 /* we used to just check HAVE_FTRUNCATE_EXTEND and only use
1848 ftruncate if the system supports it. Then I discovered that
1849 you can have some filesystems that support ftruncate
1850 expansion and some that don't! On Linux fat can't do
1851 ftruncate extend but ext2 can. */
1853 result = ftruncate(fsp->fh->fd, len);
1854 if (result == 0)
1855 goto done;
1857 /* According to W. R. Stevens advanced UNIX prog. Pure 4.3 BSD cannot
1858 extend a file with ftruncate. Provide alternate implementation
1859 for this */
1861 /* Do an fstat to see if the file is longer than the requested
1862 size in which case the ftruncate above should have
1863 succeeded or shorter, in which case seek to len - 1 and
1864 write 1 byte of zero */
1865 status = vfs_stat_fsp(fsp);
1866 if (!NT_STATUS_IS_OK(status)) {
1867 goto done;
1869 pst = &fsp->fsp_name->st;
1871 #ifdef S_ISFIFO
1872 if (S_ISFIFO(pst->st_ex_mode)) {
1873 result = 0;
1874 goto done;
1876 #endif
1878 if (pst->st_ex_size == len) {
1879 result = 0;
1880 goto done;
1883 if (pst->st_ex_size > len) {
1884 /* the ftruncate should have worked */
1885 goto done;
1888 if (SMB_VFS_PWRITE(fsp, &c, 1, len-1)!=1) {
1889 goto done;
1892 result = 0;
1894 done:
1896 END_PROFILE(syscall_ftruncate);
1897 return result;
1900 static int vfswrap_fallocate(vfs_handle_struct *handle,
1901 files_struct *fsp,
1902 enum vfs_fallocate_mode mode,
1903 off_t offset,
1904 off_t len)
1906 int result;
1908 START_PROFILE(syscall_fallocate);
1909 if (mode == VFS_FALLOCATE_EXTEND_SIZE) {
1910 result = sys_posix_fallocate(fsp->fh->fd, offset, len);
1911 } else if (mode == VFS_FALLOCATE_KEEP_SIZE) {
1912 result = sys_fallocate(fsp->fh->fd, mode, offset, len);
1913 } else {
1914 errno = EINVAL;
1915 result = -1;
1917 END_PROFILE(syscall_fallocate);
1918 return result;
1921 static bool vfswrap_lock(vfs_handle_struct *handle, files_struct *fsp, int op, off_t offset, off_t count, int type)
1923 bool result;
1925 START_PROFILE(syscall_fcntl_lock);
1926 result = fcntl_lock(fsp->fh->fd, op, offset, count, type);
1927 END_PROFILE(syscall_fcntl_lock);
1928 return result;
1931 static int vfswrap_kernel_flock(vfs_handle_struct *handle, files_struct *fsp,
1932 uint32 share_mode, uint32 access_mask)
1934 START_PROFILE(syscall_kernel_flock);
1935 kernel_flock(fsp->fh->fd, share_mode, access_mask);
1936 END_PROFILE(syscall_kernel_flock);
1937 return 0;
1940 static bool vfswrap_getlock(vfs_handle_struct *handle, files_struct *fsp, off_t *poffset, off_t *pcount, int *ptype, pid_t *ppid)
1942 bool result;
1944 START_PROFILE(syscall_fcntl_getlock);
1945 result = fcntl_getlock(fsp->fh->fd, poffset, pcount, ptype, ppid);
1946 END_PROFILE(syscall_fcntl_getlock);
1947 return result;
1950 static int vfswrap_linux_setlease(vfs_handle_struct *handle, files_struct *fsp,
1951 int leasetype)
1953 int result = -1;
1955 START_PROFILE(syscall_linux_setlease);
1957 #ifdef HAVE_KERNEL_OPLOCKS_LINUX
1958 result = linux_setlease(fsp->fh->fd, leasetype);
1959 #else
1960 errno = ENOSYS;
1961 #endif
1962 END_PROFILE(syscall_linux_setlease);
1963 return result;
1966 static int vfswrap_symlink(vfs_handle_struct *handle, const char *oldpath, const char *newpath)
1968 int result;
1970 START_PROFILE(syscall_symlink);
1971 result = symlink(oldpath, newpath);
1972 END_PROFILE(syscall_symlink);
1973 return result;
1976 static int vfswrap_readlink(vfs_handle_struct *handle, const char *path, char *buf, size_t bufsiz)
1978 int result;
1980 START_PROFILE(syscall_readlink);
1981 result = readlink(path, buf, bufsiz);
1982 END_PROFILE(syscall_readlink);
1983 return result;
1986 static int vfswrap_link(vfs_handle_struct *handle, const char *oldpath, const char *newpath)
1988 int result;
1990 START_PROFILE(syscall_link);
1991 result = link(oldpath, newpath);
1992 END_PROFILE(syscall_link);
1993 return result;
1996 static int vfswrap_mknod(vfs_handle_struct *handle, const char *pathname, mode_t mode, SMB_DEV_T dev)
1998 int result;
2000 START_PROFILE(syscall_mknod);
2001 result = sys_mknod(pathname, mode, dev);
2002 END_PROFILE(syscall_mknod);
2003 return result;
2006 static char *vfswrap_realpath(vfs_handle_struct *handle, const char *path)
2008 char *result;
2010 START_PROFILE(syscall_realpath);
2011 #ifdef REALPATH_TAKES_NULL
2012 result = realpath(path, NULL);
2013 #else
2014 result = SMB_MALLOC_ARRAY(char, PATH_MAX+1);
2015 if (result) {
2016 char *resolved_path = realpath(path, result);
2017 if (!resolved_path) {
2018 SAFE_FREE(result);
2019 } else {
2020 /* SMB_ASSERT(result == resolved_path) ? */
2021 result = resolved_path;
2024 #endif
2025 END_PROFILE(syscall_realpath);
2026 return result;
2029 static NTSTATUS vfswrap_notify_watch(vfs_handle_struct *vfs_handle,
2030 struct sys_notify_context *ctx,
2031 const char *path,
2032 uint32_t *filter,
2033 uint32_t *subdir_filter,
2034 void (*callback)(struct sys_notify_context *ctx,
2035 void *private_data,
2036 struct notify_event *ev),
2037 void *private_data, void *handle)
2040 * So far inotify is the only supported default notify mechanism. If
2041 * another platform like the the BSD's or a proprietary Unix comes
2042 * along and wants another default, we can play the same trick we
2043 * played with Posix ACLs.
2045 * Until that is the case, hard-code inotify here.
2047 #ifdef HAVE_INOTIFY
2048 if (lp_kernel_change_notify(vfs_handle->conn->params)) {
2049 return inotify_watch(ctx, path, filter, subdir_filter,
2050 callback, private_data, handle);
2052 #endif
2054 * Do nothing, leave everything to notify_internal.c
2056 return NT_STATUS_OK;
2059 static int vfswrap_chflags(vfs_handle_struct *handle, const char *path,
2060 unsigned int flags)
2062 #ifdef HAVE_CHFLAGS
2063 return chflags(path, flags);
2064 #else
2065 errno = ENOSYS;
2066 return -1;
2067 #endif
2070 static struct file_id vfswrap_file_id_create(struct vfs_handle_struct *handle,
2071 const SMB_STRUCT_STAT *sbuf)
2073 struct file_id key;
2075 /* the ZERO_STRUCT ensures padding doesn't break using the key as a
2076 * blob */
2077 ZERO_STRUCT(key);
2079 key.devid = sbuf->st_ex_dev;
2080 key.inode = sbuf->st_ex_ino;
2081 /* key.extid is unused by default. */
2083 return key;
2086 static NTSTATUS vfswrap_streaminfo(vfs_handle_struct *handle,
2087 struct files_struct *fsp,
2088 const char *fname,
2089 TALLOC_CTX *mem_ctx,
2090 unsigned int *pnum_streams,
2091 struct stream_struct **pstreams)
2093 SMB_STRUCT_STAT sbuf;
2094 struct stream_struct *tmp_streams = NULL;
2095 int ret;
2097 if ((fsp != NULL) && (fsp->is_directory)) {
2099 * No default streams on directories
2101 goto done;
2104 if ((fsp != NULL) && (fsp->fh->fd != -1)) {
2105 ret = SMB_VFS_FSTAT(fsp, &sbuf);
2107 else {
2108 struct smb_filename smb_fname;
2110 ZERO_STRUCT(smb_fname);
2111 smb_fname.base_name = discard_const_p(char, fname);
2113 if (lp_posix_pathnames()) {
2114 ret = SMB_VFS_LSTAT(handle->conn, &smb_fname);
2115 } else {
2116 ret = SMB_VFS_STAT(handle->conn, &smb_fname);
2118 sbuf = smb_fname.st;
2121 if (ret == -1) {
2122 return map_nt_error_from_unix(errno);
2125 if (S_ISDIR(sbuf.st_ex_mode)) {
2126 goto done;
2129 tmp_streams = talloc_realloc(mem_ctx, *pstreams, struct stream_struct,
2130 (*pnum_streams) + 1);
2131 if (tmp_streams == NULL) {
2132 return NT_STATUS_NO_MEMORY;
2134 tmp_streams[*pnum_streams].name = talloc_strdup(tmp_streams, "::$DATA");
2135 if (tmp_streams[*pnum_streams].name == NULL) {
2136 return NT_STATUS_NO_MEMORY;
2138 tmp_streams[*pnum_streams].size = sbuf.st_ex_size;
2139 tmp_streams[*pnum_streams].alloc_size = SMB_VFS_GET_ALLOC_SIZE(handle->conn, fsp, &sbuf);
2141 *pnum_streams += 1;
2142 *pstreams = tmp_streams;
2143 done:
2144 return NT_STATUS_OK;
2147 static int vfswrap_get_real_filename(struct vfs_handle_struct *handle,
2148 const char *path,
2149 const char *name,
2150 TALLOC_CTX *mem_ctx,
2151 char **found_name)
2154 * Don't fall back to get_real_filename so callers can differentiate
2155 * between a full directory scan and an actual case-insensitive stat.
2157 errno = EOPNOTSUPP;
2158 return -1;
2161 static const char *vfswrap_connectpath(struct vfs_handle_struct *handle,
2162 const char *fname)
2164 return handle->conn->connectpath;
2167 static NTSTATUS vfswrap_brl_lock_windows(struct vfs_handle_struct *handle,
2168 struct byte_range_lock *br_lck,
2169 struct lock_struct *plock,
2170 bool blocking_lock,
2171 struct blocking_lock_record *blr)
2173 SMB_ASSERT(plock->lock_flav == WINDOWS_LOCK);
2175 /* Note: blr is not used in the default implementation. */
2176 return brl_lock_windows_default(br_lck, plock, blocking_lock);
2179 static bool vfswrap_brl_unlock_windows(struct vfs_handle_struct *handle,
2180 struct messaging_context *msg_ctx,
2181 struct byte_range_lock *br_lck,
2182 const struct lock_struct *plock)
2184 SMB_ASSERT(plock->lock_flav == WINDOWS_LOCK);
2186 return brl_unlock_windows_default(msg_ctx, br_lck, plock);
2189 static bool vfswrap_brl_cancel_windows(struct vfs_handle_struct *handle,
2190 struct byte_range_lock *br_lck,
2191 struct lock_struct *plock,
2192 struct blocking_lock_record *blr)
2194 SMB_ASSERT(plock->lock_flav == WINDOWS_LOCK);
2196 /* Note: blr is not used in the default implementation. */
2197 return brl_lock_cancel_default(br_lck, plock);
2200 static bool vfswrap_strict_lock(struct vfs_handle_struct *handle,
2201 files_struct *fsp,
2202 struct lock_struct *plock)
2204 SMB_ASSERT(plock->lock_type == READ_LOCK ||
2205 plock->lock_type == WRITE_LOCK);
2207 return strict_lock_default(fsp, plock);
2210 static void vfswrap_strict_unlock(struct vfs_handle_struct *handle,
2211 files_struct *fsp,
2212 struct lock_struct *plock)
2214 SMB_ASSERT(plock->lock_type == READ_LOCK ||
2215 plock->lock_type == WRITE_LOCK);
2217 strict_unlock_default(fsp, plock);
2220 /* NT ACL operations. */
2222 static NTSTATUS vfswrap_fget_nt_acl(vfs_handle_struct *handle,
2223 files_struct *fsp,
2224 uint32 security_info,
2225 TALLOC_CTX *mem_ctx,
2226 struct security_descriptor **ppdesc)
2228 NTSTATUS result;
2230 START_PROFILE(fget_nt_acl);
2231 result = posix_fget_nt_acl(fsp, security_info,
2232 mem_ctx, ppdesc);
2233 END_PROFILE(fget_nt_acl);
2234 return result;
2237 static NTSTATUS vfswrap_get_nt_acl(vfs_handle_struct *handle,
2238 const char *name,
2239 uint32 security_info,
2240 TALLOC_CTX *mem_ctx,
2241 struct security_descriptor **ppdesc)
2243 NTSTATUS result;
2245 START_PROFILE(get_nt_acl);
2246 result = posix_get_nt_acl(handle->conn, name, security_info,
2247 mem_ctx, ppdesc);
2248 END_PROFILE(get_nt_acl);
2249 return result;
2252 static NTSTATUS vfswrap_fset_nt_acl(vfs_handle_struct *handle, files_struct *fsp, uint32 security_info_sent, const struct security_descriptor *psd)
2254 NTSTATUS result;
2256 START_PROFILE(fset_nt_acl);
2257 result = set_nt_acl(fsp, security_info_sent, psd);
2258 END_PROFILE(fset_nt_acl);
2259 return result;
2262 static NTSTATUS vfswrap_audit_file(struct vfs_handle_struct *handle,
2263 struct smb_filename *file,
2264 struct security_acl *sacl,
2265 uint32_t access_requested,
2266 uint32_t access_denied)
2268 return NT_STATUS_OK; /* Nothing to do here ... */
2271 static int vfswrap_chmod_acl(vfs_handle_struct *handle, const char *name, mode_t mode)
2273 #ifdef HAVE_NO_ACL
2274 errno = ENOSYS;
2275 return -1;
2276 #else
2277 int result;
2279 START_PROFILE(chmod_acl);
2280 result = chmod_acl(handle->conn, name, mode);
2281 END_PROFILE(chmod_acl);
2282 return result;
2283 #endif
2286 static int vfswrap_fchmod_acl(vfs_handle_struct *handle, files_struct *fsp, mode_t mode)
2288 #ifdef HAVE_NO_ACL
2289 errno = ENOSYS;
2290 return -1;
2291 #else
2292 int result;
2294 START_PROFILE(fchmod_acl);
2295 result = fchmod_acl(fsp, mode);
2296 END_PROFILE(fchmod_acl);
2297 return result;
2298 #endif
2301 static SMB_ACL_T vfswrap_sys_acl_get_file(vfs_handle_struct *handle,
2302 const char *path_p,
2303 SMB_ACL_TYPE_T type,
2304 TALLOC_CTX *mem_ctx)
2306 return sys_acl_get_file(handle, path_p, type, mem_ctx);
2309 static SMB_ACL_T vfswrap_sys_acl_get_fd(vfs_handle_struct *handle,
2310 files_struct *fsp,
2311 TALLOC_CTX *mem_ctx)
2313 return sys_acl_get_fd(handle, fsp, mem_ctx);
2316 static int vfswrap_sys_acl_set_file(vfs_handle_struct *handle, const char *name, SMB_ACL_TYPE_T acltype, SMB_ACL_T theacl)
2318 return sys_acl_set_file(handle, name, acltype, theacl);
2321 static int vfswrap_sys_acl_set_fd(vfs_handle_struct *handle, files_struct *fsp, SMB_ACL_T theacl)
2323 return sys_acl_set_fd(handle, fsp, theacl);
2326 static int vfswrap_sys_acl_delete_def_file(vfs_handle_struct *handle, const char *path)
2328 return sys_acl_delete_def_file(handle, path);
2331 /****************************************************************
2332 Extended attribute operations.
2333 *****************************************************************/
2335 static ssize_t vfswrap_getxattr(struct vfs_handle_struct *handle,const char *path, const char *name, void *value, size_t size)
2337 return getxattr(path, name, value, size);
2340 static ssize_t vfswrap_fgetxattr(struct vfs_handle_struct *handle, struct files_struct *fsp, const char *name, void *value, size_t size)
2342 return fgetxattr(fsp->fh->fd, name, value, size);
2345 static ssize_t vfswrap_listxattr(struct vfs_handle_struct *handle, const char *path, char *list, size_t size)
2347 return listxattr(path, list, size);
2350 static ssize_t vfswrap_flistxattr(struct vfs_handle_struct *handle, struct files_struct *fsp, char *list, size_t size)
2352 return flistxattr(fsp->fh->fd, list, size);
2355 static int vfswrap_removexattr(struct vfs_handle_struct *handle, const char *path, const char *name)
2357 return removexattr(path, name);
2360 static int vfswrap_fremovexattr(struct vfs_handle_struct *handle, struct files_struct *fsp, const char *name)
2362 return fremovexattr(fsp->fh->fd, name);
2365 static int vfswrap_setxattr(struct vfs_handle_struct *handle, const char *path, const char *name, const void *value, size_t size, int flags)
2367 return setxattr(path, name, value, size, flags);
2370 static int vfswrap_fsetxattr(struct vfs_handle_struct *handle, struct files_struct *fsp, const char *name, const void *value, size_t size, int flags)
2372 return fsetxattr(fsp->fh->fd, name, value, size, flags);
2375 static bool vfswrap_aio_force(struct vfs_handle_struct *handle, struct files_struct *fsp)
2377 return false;
2380 static bool vfswrap_is_offline(struct vfs_handle_struct *handle,
2381 const struct smb_filename *fname,
2382 SMB_STRUCT_STAT *sbuf)
2384 NTSTATUS status;
2385 char *path;
2386 bool offline = false;
2388 if (ISDOT(fname->base_name) || ISDOTDOT(fname->base_name)) {
2389 return false;
2392 if (!lp_dmapi_support(SNUM(handle->conn)) || !dmapi_have_session()) {
2393 #if defined(ENOTSUP)
2394 errno = ENOTSUP;
2395 #endif
2396 return false;
2399 status = get_full_smb_filename(talloc_tos(), fname, &path);
2400 if (!NT_STATUS_IS_OK(status)) {
2401 errno = map_errno_from_nt_status(status);
2402 return false;
2405 offline = (dmapi_file_flags(path) & FILE_ATTRIBUTE_OFFLINE) != 0;
2407 TALLOC_FREE(path);
2409 return offline;
2412 static int vfswrap_set_offline(struct vfs_handle_struct *handle,
2413 const struct smb_filename *fname)
2415 /* We don't know how to set offline bit by default, needs to be overriden in the vfs modules */
2416 #if defined(ENOTSUP)
2417 errno = ENOTSUP;
2418 #endif
2419 return -1;
2422 static NTSTATUS vfswrap_durable_cookie(struct vfs_handle_struct *handle,
2423 struct files_struct *fsp,
2424 TALLOC_CTX *mem_ctx,
2425 DATA_BLOB *cookie)
2427 return vfs_default_durable_cookie(fsp, mem_ctx, cookie);
2430 static NTSTATUS vfswrap_durable_disconnect(struct vfs_handle_struct *handle,
2431 struct files_struct *fsp,
2432 const DATA_BLOB old_cookie,
2433 TALLOC_CTX *mem_ctx,
2434 DATA_BLOB *new_cookie)
2436 return vfs_default_durable_disconnect(fsp, old_cookie, mem_ctx,
2437 new_cookie);
2440 static NTSTATUS vfswrap_durable_reconnect(struct vfs_handle_struct *handle,
2441 struct smb_request *smb1req,
2442 struct smbXsrv_open *op,
2443 const DATA_BLOB old_cookie,
2444 TALLOC_CTX *mem_ctx,
2445 struct files_struct **fsp,
2446 DATA_BLOB *new_cookie)
2448 return vfs_default_durable_reconnect(handle->conn, smb1req, op,
2449 old_cookie, mem_ctx,
2450 fsp, new_cookie);
2453 static struct vfs_fn_pointers vfs_default_fns = {
2454 /* Disk operations */
2456 .connect_fn = vfswrap_connect,
2457 .disconnect_fn = vfswrap_disconnect,
2458 .disk_free_fn = vfswrap_disk_free,
2459 .get_quota_fn = vfswrap_get_quota,
2460 .set_quota_fn = vfswrap_set_quota,
2461 .get_shadow_copy_data_fn = vfswrap_get_shadow_copy_data,
2462 .statvfs_fn = vfswrap_statvfs,
2463 .fs_capabilities_fn = vfswrap_fs_capabilities,
2464 .get_dfs_referrals_fn = vfswrap_get_dfs_referrals,
2466 /* Directory operations */
2468 .opendir_fn = vfswrap_opendir,
2469 .fdopendir_fn = vfswrap_fdopendir,
2470 .readdir_fn = vfswrap_readdir,
2471 .seekdir_fn = vfswrap_seekdir,
2472 .telldir_fn = vfswrap_telldir,
2473 .rewind_dir_fn = vfswrap_rewinddir,
2474 .mkdir_fn = vfswrap_mkdir,
2475 .rmdir_fn = vfswrap_rmdir,
2476 .closedir_fn = vfswrap_closedir,
2477 .init_search_op_fn = vfswrap_init_search_op,
2479 /* File operations */
2481 .open_fn = vfswrap_open,
2482 .create_file_fn = vfswrap_create_file,
2483 .close_fn = vfswrap_close,
2484 .read_fn = vfswrap_read,
2485 .pread_fn = vfswrap_pread,
2486 .pread_send_fn = vfswrap_pread_send,
2487 .pread_recv_fn = vfswrap_asys_ssize_t_recv,
2488 .write_fn = vfswrap_write,
2489 .pwrite_fn = vfswrap_pwrite,
2490 .pwrite_send_fn = vfswrap_pwrite_send,
2491 .pwrite_recv_fn = vfswrap_asys_ssize_t_recv,
2492 .lseek_fn = vfswrap_lseek,
2493 .sendfile_fn = vfswrap_sendfile,
2494 .recvfile_fn = vfswrap_recvfile,
2495 .rename_fn = vfswrap_rename,
2496 .fsync_fn = vfswrap_fsync,
2497 .fsync_send_fn = vfswrap_fsync_send,
2498 .fsync_recv_fn = vfswrap_asys_int_recv,
2499 .stat_fn = vfswrap_stat,
2500 .fstat_fn = vfswrap_fstat,
2501 .lstat_fn = vfswrap_lstat,
2502 .get_alloc_size_fn = vfswrap_get_alloc_size,
2503 .unlink_fn = vfswrap_unlink,
2504 .chmod_fn = vfswrap_chmod,
2505 .fchmod_fn = vfswrap_fchmod,
2506 .chown_fn = vfswrap_chown,
2507 .fchown_fn = vfswrap_fchown,
2508 .lchown_fn = vfswrap_lchown,
2509 .chdir_fn = vfswrap_chdir,
2510 .getwd_fn = vfswrap_getwd,
2511 .ntimes_fn = vfswrap_ntimes,
2512 .ftruncate_fn = vfswrap_ftruncate,
2513 .fallocate_fn = vfswrap_fallocate,
2514 .lock_fn = vfswrap_lock,
2515 .kernel_flock_fn = vfswrap_kernel_flock,
2516 .linux_setlease_fn = vfswrap_linux_setlease,
2517 .getlock_fn = vfswrap_getlock,
2518 .symlink_fn = vfswrap_symlink,
2519 .readlink_fn = vfswrap_readlink,
2520 .link_fn = vfswrap_link,
2521 .mknod_fn = vfswrap_mknod,
2522 .realpath_fn = vfswrap_realpath,
2523 .notify_watch_fn = vfswrap_notify_watch,
2524 .chflags_fn = vfswrap_chflags,
2525 .file_id_create_fn = vfswrap_file_id_create,
2526 .streaminfo_fn = vfswrap_streaminfo,
2527 .get_real_filename_fn = vfswrap_get_real_filename,
2528 .connectpath_fn = vfswrap_connectpath,
2529 .brl_lock_windows_fn = vfswrap_brl_lock_windows,
2530 .brl_unlock_windows_fn = vfswrap_brl_unlock_windows,
2531 .brl_cancel_windows_fn = vfswrap_brl_cancel_windows,
2532 .strict_lock_fn = vfswrap_strict_lock,
2533 .strict_unlock_fn = vfswrap_strict_unlock,
2534 .translate_name_fn = vfswrap_translate_name,
2535 .fsctl_fn = vfswrap_fsctl,
2536 .copy_chunk_send_fn = vfswrap_copy_chunk_send,
2537 .copy_chunk_recv_fn = vfswrap_copy_chunk_recv,
2539 /* NT ACL operations. */
2541 .fget_nt_acl_fn = vfswrap_fget_nt_acl,
2542 .get_nt_acl_fn = vfswrap_get_nt_acl,
2543 .fset_nt_acl_fn = vfswrap_fset_nt_acl,
2544 .audit_file_fn = vfswrap_audit_file,
2546 /* POSIX ACL operations. */
2548 .chmod_acl_fn = vfswrap_chmod_acl,
2549 .fchmod_acl_fn = vfswrap_fchmod_acl,
2551 .sys_acl_get_file_fn = vfswrap_sys_acl_get_file,
2552 .sys_acl_get_fd_fn = vfswrap_sys_acl_get_fd,
2553 .sys_acl_blob_get_file_fn = posix_sys_acl_blob_get_file,
2554 .sys_acl_blob_get_fd_fn = posix_sys_acl_blob_get_fd,
2555 .sys_acl_set_file_fn = vfswrap_sys_acl_set_file,
2556 .sys_acl_set_fd_fn = vfswrap_sys_acl_set_fd,
2557 .sys_acl_delete_def_file_fn = vfswrap_sys_acl_delete_def_file,
2559 /* EA operations. */
2560 .getxattr_fn = vfswrap_getxattr,
2561 .fgetxattr_fn = vfswrap_fgetxattr,
2562 .listxattr_fn = vfswrap_listxattr,
2563 .flistxattr_fn = vfswrap_flistxattr,
2564 .removexattr_fn = vfswrap_removexattr,
2565 .fremovexattr_fn = vfswrap_fremovexattr,
2566 .setxattr_fn = vfswrap_setxattr,
2567 .fsetxattr_fn = vfswrap_fsetxattr,
2569 /* aio operations */
2570 .aio_force_fn = vfswrap_aio_force,
2572 /* offline operations */
2573 .is_offline_fn = vfswrap_is_offline,
2574 .set_offline_fn = vfswrap_set_offline,
2576 /* durable handle operations */
2577 .durable_cookie_fn = vfswrap_durable_cookie,
2578 .durable_disconnect_fn = vfswrap_durable_disconnect,
2579 .durable_reconnect_fn = vfswrap_durable_reconnect,
2582 NTSTATUS vfs_default_init(void);
2583 NTSTATUS vfs_default_init(void)
2585 return smb_register_vfs(SMB_VFS_INTERFACE_VERSION,
2586 DEFAULT_VFS_MODULE_NAME, &vfs_default_fns);