2 Unix SMB/CIFS implementation.
3 Wrap disk only vfs functions to sidestep dodgy compilers.
4 Copyright (C) Tim Potter 1998
5 Copyright (C) Jeremy Allison 2007
7 This program is free software; you can redistribute it and/or modify
8 it under the terms of the GNU General Public License as published by
9 the Free Software Foundation; either version 3 of the License, or
10 (at your option) any later version.
12 This program is distributed in the hope that it will be useful,
13 but WITHOUT ANY WARRANTY; without even the implied warranty of
14 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
15 GNU General Public License for more details.
17 You should have received a copy of the GNU General Public License
18 along with this program. If not, see <http://www.gnu.org/licenses/>.
22 #include "system/time.h"
23 #include "system/filesys.h"
24 #include "smbd/smbd.h"
25 #include "smbd/globals.h"
27 #include "smbprofile.h"
28 #include "../libcli/security/security.h"
29 #include "passdb/lookup_sid.h"
30 #include "source3/include/msdfs.h"
31 #include "librpc/gen_ndr/ndr_dfsblobs.h"
32 #include "lib/util/tevent_unix.h"
33 #include "lib/asys/asys.h"
36 #define DBGC_CLASS DBGC_VFS
38 /* Check for NULL pointer parameters in vfswrap_* functions */
40 /* We don't want to have NULL function pointers lying around. Someone
41 is sure to try and execute them. These stubs are used to prevent
44 static int vfswrap_connect(vfs_handle_struct
*handle
, const char *service
, const char *user
)
46 return 0; /* Return >= 0 for success */
49 static void vfswrap_disconnect(vfs_handle_struct
*handle
)
55 static uint64_t vfswrap_disk_free(vfs_handle_struct
*handle
, const char *path
, bool small_query
, uint64_t *bsize
,
56 uint64_t *dfree
, uint64_t *dsize
)
60 result
= sys_disk_free(handle
->conn
, path
, small_query
, bsize
, dfree
, dsize
);
64 static int vfswrap_get_quota(struct vfs_handle_struct
*handle
, enum SMB_QUOTA_TYPE qtype
, unid_t id
, SMB_DISK_QUOTA
*qt
)
66 #ifdef HAVE_SYS_QUOTAS
69 START_PROFILE(syscall_get_quota
);
70 result
= sys_get_quota(handle
->conn
->connectpath
, qtype
, id
, qt
);
71 END_PROFILE(syscall_get_quota
);
79 static int vfswrap_set_quota(struct vfs_handle_struct
*handle
, enum SMB_QUOTA_TYPE qtype
, unid_t id
, SMB_DISK_QUOTA
*qt
)
81 #ifdef HAVE_SYS_QUOTAS
84 START_PROFILE(syscall_set_quota
);
85 result
= sys_set_quota(handle
->conn
->connectpath
, qtype
, id
, qt
);
86 END_PROFILE(syscall_set_quota
);
94 static int vfswrap_get_shadow_copy_data(struct vfs_handle_struct
*handle
,
95 struct files_struct
*fsp
,
96 struct shadow_copy_data
*shadow_copy_data
,
100 return -1; /* Not implemented. */
103 static int vfswrap_statvfs(struct vfs_handle_struct
*handle
, const char *path
, vfs_statvfs_struct
*statbuf
)
105 return sys_statvfs(path
, statbuf
);
108 static uint32_t vfswrap_fs_capabilities(struct vfs_handle_struct
*handle
,
109 enum timestamp_set_resolution
*p_ts_res
)
111 connection_struct
*conn
= handle
->conn
;
112 uint32_t caps
= FILE_CASE_SENSITIVE_SEARCH
| FILE_CASE_PRESERVED_NAMES
;
113 struct smb_filename
*smb_fname_cpath
= NULL
;
114 struct vfs_statvfs_struct statbuf
;
118 ZERO_STRUCT(statbuf
);
119 ret
= sys_statvfs(conn
->connectpath
, &statbuf
);
121 caps
= statbuf
.FsCapabilities
;
124 *p_ts_res
= TIMESTAMP_SET_SECONDS
;
126 /* Work out what timestamp resolution we can
127 * use when setting a timestamp. */
129 status
= create_synthetic_smb_fname(talloc_tos(),
134 if (!NT_STATUS_IS_OK(status
)) {
138 ret
= SMB_VFS_STAT(conn
, smb_fname_cpath
);
140 TALLOC_FREE(smb_fname_cpath
);
144 if (smb_fname_cpath
->st
.st_ex_mtime
.tv_nsec
||
145 smb_fname_cpath
->st
.st_ex_atime
.tv_nsec
||
146 smb_fname_cpath
->st
.st_ex_ctime
.tv_nsec
) {
147 /* If any of the normal UNIX directory timestamps
148 * have a non-zero tv_nsec component assume
149 * we might be able to set sub-second timestamps.
150 * See what filetime set primitives we have.
152 #if defined(HAVE_UTIMENSAT)
153 *p_ts_res
= TIMESTAMP_SET_NT_OR_BETTER
;
154 #elif defined(HAVE_UTIMES)
155 /* utimes allows msec timestamps to be set. */
156 *p_ts_res
= TIMESTAMP_SET_MSEC
;
157 #elif defined(HAVE_UTIME)
158 /* utime only allows sec timestamps to be set. */
159 *p_ts_res
= TIMESTAMP_SET_SECONDS
;
162 DEBUG(10,("vfswrap_fs_capabilities: timestamp "
164 "available on share %s, directory %s\n",
165 *p_ts_res
== TIMESTAMP_SET_MSEC
? "msec" : "sec",
166 lp_servicename(talloc_tos(), conn
->params
->service
),
167 conn
->connectpath
));
169 TALLOC_FREE(smb_fname_cpath
);
173 static NTSTATUS
vfswrap_get_dfs_referrals(struct vfs_handle_struct
*handle
,
174 struct dfs_GetDFSReferral
*r
)
176 struct junction_map
*junction
= NULL
;
178 bool self_referral
= false;
179 char *pathnamep
= NULL
;
180 char *local_dfs_path
= NULL
;
183 uint16_t max_referral_level
= r
->in
.req
.max_referral_level
;
186 NDR_PRINT_IN_DEBUG(dfs_GetDFSReferral
, r
);
189 /* get the junction entry */
190 if (r
->in
.req
.servername
== NULL
) {
191 return NT_STATUS_NOT_FOUND
;
195 * Trim pathname sent by client so it begins with only one backslash.
196 * Two backslashes confuse some dfs clients
199 local_dfs_path
= talloc_strdup(r
, r
->in
.req
.servername
);
200 if (local_dfs_path
== NULL
) {
201 return NT_STATUS_NO_MEMORY
;
203 pathnamep
= local_dfs_path
;
204 while (IS_DIRECTORY_SEP(pathnamep
[0]) &&
205 IS_DIRECTORY_SEP(pathnamep
[1])) {
209 junction
= talloc_zero(r
, struct junction_map
);
210 if (junction
== NULL
) {
211 return NT_STATUS_NO_MEMORY
;
214 /* The following call can change cwd. */
215 status
= get_referred_path(r
, pathnamep
,
216 !handle
->conn
->sconn
->using_smb2
,
217 junction
, &consumedcnt
, &self_referral
);
218 if (!NT_STATUS_IS_OK(status
)) {
219 vfs_ChDir(handle
->conn
, handle
->conn
->connectpath
);
222 vfs_ChDir(handle
->conn
, handle
->conn
->connectpath
);
224 if (!self_referral
) {
225 pathnamep
[consumedcnt
] = '\0';
228 dbgtext("setup_dfs_referral: Path %s to "
229 "alternate path(s):",
231 for (i
=0; i
< junction
->referral_count
; i
++) {
233 junction
->referral_list
[i
].alternate_path
);
239 if (r
->in
.req
.max_referral_level
<= 2) {
240 max_referral_level
= 2;
242 if (r
->in
.req
.max_referral_level
>= 3) {
243 max_referral_level
= 3;
246 r
->out
.resp
= talloc_zero(r
, struct dfs_referral_resp
);
247 if (r
->out
.resp
== NULL
) {
248 return NT_STATUS_NO_MEMORY
;
251 r
->out
.resp
->path_consumed
= strlen_m(pathnamep
) * 2;
252 r
->out
.resp
->nb_referrals
= junction
->referral_count
;
254 r
->out
.resp
->header_flags
= DFS_HEADER_FLAG_STORAGE_SVR
;
256 r
->out
.resp
->header_flags
|= DFS_HEADER_FLAG_REFERAL_SVR
;
259 r
->out
.resp
->referral_entries
= talloc_zero_array(r
,
260 struct dfs_referral_type
,
261 r
->out
.resp
->nb_referrals
);
262 if (r
->out
.resp
->referral_entries
== NULL
) {
263 return NT_STATUS_NO_MEMORY
;
266 switch (max_referral_level
) {
268 for(i
=0; i
< junction
->referral_count
; i
++) {
269 struct referral
*ref
= &junction
->referral_list
[i
];
270 TALLOC_CTX
*mem_ctx
= r
->out
.resp
->referral_entries
;
271 struct dfs_referral_type
*t
=
272 &r
->out
.resp
->referral_entries
[i
];
273 struct dfs_referral_v2
*v2
= &t
->referral
.v2
;
276 v2
->size
= VERSION2_REFERRAL_SIZE
;
278 v2
->server_type
= DFS_SERVER_ROOT
;
280 v2
->server_type
= DFS_SERVER_NON_ROOT
;
283 v2
->proximity
= ref
->proximity
;
285 v2
->DFS_path
= talloc_strdup(mem_ctx
, pathnamep
);
286 if (v2
->DFS_path
== NULL
) {
287 return NT_STATUS_NO_MEMORY
;
289 v2
->DFS_alt_path
= talloc_strdup(mem_ctx
, pathnamep
);
290 if (v2
->DFS_alt_path
== NULL
) {
291 return NT_STATUS_NO_MEMORY
;
293 v2
->netw_address
= talloc_strdup(mem_ctx
,
294 ref
->alternate_path
);
295 if (v2
->netw_address
== NULL
) {
296 return NT_STATUS_NO_MEMORY
;
302 for(i
=0; i
< junction
->referral_count
; i
++) {
303 struct referral
*ref
= &junction
->referral_list
[i
];
304 TALLOC_CTX
*mem_ctx
= r
->out
.resp
->referral_entries
;
305 struct dfs_referral_type
*t
=
306 &r
->out
.resp
->referral_entries
[i
];
307 struct dfs_referral_v3
*v3
= &t
->referral
.v3
;
308 struct dfs_normal_referral
*r1
= &v3
->referrals
.r1
;
311 v3
->size
= VERSION3_REFERRAL_SIZE
;
313 v3
->server_type
= DFS_SERVER_ROOT
;
315 v3
->server_type
= DFS_SERVER_NON_ROOT
;
319 r1
->DFS_path
= talloc_strdup(mem_ctx
, pathnamep
);
320 if (r1
->DFS_path
== NULL
) {
321 return NT_STATUS_NO_MEMORY
;
323 r1
->DFS_alt_path
= talloc_strdup(mem_ctx
, pathnamep
);
324 if (r1
->DFS_alt_path
== NULL
) {
325 return NT_STATUS_NO_MEMORY
;
327 r1
->netw_address
= talloc_strdup(mem_ctx
,
328 ref
->alternate_path
);
329 if (r1
->netw_address
== NULL
) {
330 return NT_STATUS_NO_MEMORY
;
335 DEBUG(0,("setup_dfs_referral: Invalid dfs referral "
337 max_referral_level
));
338 return NT_STATUS_INVALID_LEVEL
;
342 NDR_PRINT_OUT_DEBUG(dfs_GetDFSReferral
, r
);
348 /* Directory operations */
350 static DIR *vfswrap_opendir(vfs_handle_struct
*handle
, const char *fname
, const char *mask
, uint32 attr
)
354 START_PROFILE(syscall_opendir
);
355 result
= opendir(fname
);
356 END_PROFILE(syscall_opendir
);
360 static DIR *vfswrap_fdopendir(vfs_handle_struct
*handle
,
367 START_PROFILE(syscall_fdopendir
);
368 result
= sys_fdopendir(fsp
->fh
->fd
);
369 END_PROFILE(syscall_fdopendir
);
374 static struct dirent
*vfswrap_readdir(vfs_handle_struct
*handle
,
376 SMB_STRUCT_STAT
*sbuf
)
378 struct dirent
*result
;
380 START_PROFILE(syscall_readdir
);
381 result
= readdir(dirp
);
382 /* Default Posix readdir() does not give us stat info.
383 * Set to invalid to indicate we didn't return this info. */
385 SET_STAT_INVALID(*sbuf
);
386 END_PROFILE(syscall_readdir
);
390 static void vfswrap_seekdir(vfs_handle_struct
*handle
, DIR *dirp
, long offset
)
392 START_PROFILE(syscall_seekdir
);
393 seekdir(dirp
, offset
);
394 END_PROFILE(syscall_seekdir
);
397 static long vfswrap_telldir(vfs_handle_struct
*handle
, DIR *dirp
)
400 START_PROFILE(syscall_telldir
);
401 result
= telldir(dirp
);
402 END_PROFILE(syscall_telldir
);
406 static void vfswrap_rewinddir(vfs_handle_struct
*handle
, DIR *dirp
)
408 START_PROFILE(syscall_rewinddir
);
410 END_PROFILE(syscall_rewinddir
);
413 static int vfswrap_mkdir(vfs_handle_struct
*handle
, const char *path
, mode_t mode
)
416 bool has_dacl
= False
;
419 START_PROFILE(syscall_mkdir
);
421 if (lp_inherit_acls(SNUM(handle
->conn
))
422 && parent_dirname(talloc_tos(), path
, &parent
, NULL
)
423 && (has_dacl
= directory_has_default_acl(handle
->conn
, parent
)))
424 mode
= (0777 & lp_dir_mask(SNUM(handle
->conn
)));
428 result
= mkdir(path
, mode
);
430 if (result
== 0 && !has_dacl
) {
432 * We need to do this as the default behavior of POSIX ACLs
433 * is to set the mask to be the requested group permission
434 * bits, not the group permission bits to be the requested
435 * group permission bits. This is not what we want, as it will
436 * mess up any inherited ACL bits that were set. JRA.
438 int saved_errno
= errno
; /* We may get ENOSYS */
439 if ((SMB_VFS_CHMOD_ACL(handle
->conn
, path
, mode
) == -1) && (errno
== ENOSYS
))
443 END_PROFILE(syscall_mkdir
);
447 static int vfswrap_rmdir(vfs_handle_struct
*handle
, const char *path
)
451 START_PROFILE(syscall_rmdir
);
452 result
= rmdir(path
);
453 END_PROFILE(syscall_rmdir
);
457 static int vfswrap_closedir(vfs_handle_struct
*handle
, DIR *dirp
)
461 START_PROFILE(syscall_closedir
);
462 result
= closedir(dirp
);
463 END_PROFILE(syscall_closedir
);
467 static void vfswrap_init_search_op(vfs_handle_struct
*handle
,
470 /* Default behavior is a NOOP */
473 /* File operations */
475 static int vfswrap_open(vfs_handle_struct
*handle
,
476 struct smb_filename
*smb_fname
,
477 files_struct
*fsp
, int flags
, mode_t mode
)
481 START_PROFILE(syscall_open
);
483 if (smb_fname
->stream_name
) {
488 result
= open(smb_fname
->base_name
, flags
, mode
);
490 END_PROFILE(syscall_open
);
494 static NTSTATUS
vfswrap_create_file(vfs_handle_struct
*handle
,
495 struct smb_request
*req
,
496 uint16_t root_dir_fid
,
497 struct smb_filename
*smb_fname
,
498 uint32_t access_mask
,
499 uint32_t share_access
,
500 uint32_t create_disposition
,
501 uint32_t create_options
,
502 uint32_t file_attributes
,
503 uint32_t oplock_request
,
504 uint64_t allocation_size
,
505 uint32_t private_flags
,
506 struct security_descriptor
*sd
,
507 struct ea_list
*ea_list
,
508 files_struct
**result
,
511 return create_file_default(handle
->conn
, req
, root_dir_fid
, smb_fname
,
512 access_mask
, share_access
,
513 create_disposition
, create_options
,
514 file_attributes
, oplock_request
,
515 allocation_size
, private_flags
,
520 static int vfswrap_close(vfs_handle_struct
*handle
, files_struct
*fsp
)
524 START_PROFILE(syscall_close
);
525 result
= fd_close_posix(fsp
);
526 END_PROFILE(syscall_close
);
530 static ssize_t
vfswrap_read(vfs_handle_struct
*handle
, files_struct
*fsp
, void *data
, size_t n
)
534 START_PROFILE_BYTES(syscall_read
, n
);
535 result
= sys_read(fsp
->fh
->fd
, data
, n
);
536 END_PROFILE(syscall_read
);
540 static ssize_t
vfswrap_pread(vfs_handle_struct
*handle
, files_struct
*fsp
, void *data
,
541 size_t n
, off_t offset
)
545 #if defined(HAVE_PREAD) || defined(HAVE_PREAD64)
546 START_PROFILE_BYTES(syscall_pread
, n
);
547 result
= sys_pread(fsp
->fh
->fd
, data
, n
, offset
);
548 END_PROFILE(syscall_pread
);
550 if (result
== -1 && errno
== ESPIPE
) {
551 /* Maintain the fiction that pipes can be seeked (sought?) on. */
552 result
= SMB_VFS_READ(fsp
, data
, n
);
556 #else /* HAVE_PREAD */
560 curr
= SMB_VFS_LSEEK(fsp
, 0, SEEK_CUR
);
561 if (curr
== -1 && errno
== ESPIPE
) {
562 /* Maintain the fiction that pipes can be seeked (sought?) on. */
563 result
= SMB_VFS_READ(fsp
, data
, n
);
568 if (SMB_VFS_LSEEK(fsp
, offset
, SEEK_SET
) == -1) {
573 result
= SMB_VFS_READ(fsp
, data
, n
);
576 SMB_VFS_LSEEK(fsp
, curr
, SEEK_SET
);
579 #endif /* HAVE_PREAD */
584 static ssize_t
vfswrap_write(vfs_handle_struct
*handle
, files_struct
*fsp
, const void *data
, size_t n
)
588 START_PROFILE_BYTES(syscall_write
, n
);
589 result
= sys_write(fsp
->fh
->fd
, data
, n
);
590 END_PROFILE(syscall_write
);
594 static ssize_t
vfswrap_pwrite(vfs_handle_struct
*handle
, files_struct
*fsp
, const void *data
,
595 size_t n
, off_t offset
)
599 #if defined(HAVE_PWRITE) || defined(HAVE_PRWITE64)
600 START_PROFILE_BYTES(syscall_pwrite
, n
);
601 result
= sys_pwrite(fsp
->fh
->fd
, data
, n
, offset
);
602 END_PROFILE(syscall_pwrite
);
604 if (result
== -1 && errno
== ESPIPE
) {
605 /* Maintain the fiction that pipes can be sought on. */
606 result
= SMB_VFS_WRITE(fsp
, data
, n
);
609 #else /* HAVE_PWRITE */
613 curr
= SMB_VFS_LSEEK(fsp
, 0, SEEK_CUR
);
618 if (SMB_VFS_LSEEK(fsp
, offset
, SEEK_SET
) == -1) {
622 result
= SMB_VFS_WRITE(fsp
, data
, n
);
625 SMB_VFS_LSEEK(fsp
, curr
, SEEK_SET
);
628 #endif /* HAVE_PWRITE */
633 static void vfswrap_asys_finished(struct tevent_context
*ev
,
634 struct tevent_fd
*fde
,
635 uint16_t flags
, void *p
);
637 static bool vfswrap_init_asys_ctx(struct smbXsrv_connection
*conn
)
642 if (conn
->asys_ctx
!= NULL
) {
645 ret
= asys_context_init(&conn
->asys_ctx
, aio_pending_size
);
647 DEBUG(1, ("asys_context_init failed: %s\n", strerror(ret
)));
651 fd
= asys_signalfd(conn
->asys_ctx
);
653 set_blocking(fd
, false);
655 conn
->asys_fde
= tevent_add_fd(conn
->ev_ctx
, conn
, fd
,
657 vfswrap_asys_finished
,
659 if (conn
->asys_fde
== NULL
) {
660 DEBUG(1, ("tevent_add_fd failed\n"));
661 asys_context_destroy(conn
->asys_ctx
);
662 conn
->asys_ctx
= NULL
;
668 struct vfswrap_asys_state
{
669 struct asys_context
*asys_ctx
;
670 struct tevent_req
*req
;
675 static int vfswrap_asys_state_destructor(struct vfswrap_asys_state
*s
)
677 asys_cancel(s
->asys_ctx
, s
->req
);
681 static struct tevent_req
*vfswrap_pread_send(struct vfs_handle_struct
*handle
,
683 struct tevent_context
*ev
,
684 struct files_struct
*fsp
,
686 size_t n
, off_t offset
)
688 struct tevent_req
*req
;
689 struct vfswrap_asys_state
*state
;
692 req
= tevent_req_create(mem_ctx
, &state
, struct vfswrap_asys_state
);
696 if (!vfswrap_init_asys_ctx(handle
->conn
->sconn
->conn
)) {
698 return tevent_req_post(req
, ev
);
700 state
->asys_ctx
= handle
->conn
->sconn
->conn
->asys_ctx
;
703 ret
= asys_pread(state
->asys_ctx
, fsp
->fh
->fd
, data
, n
, offset
, req
);
705 tevent_req_error(req
, ret
);
706 return tevent_req_post(req
, ev
);
708 talloc_set_destructor(state
, vfswrap_asys_state_destructor
);
713 static struct tevent_req
*vfswrap_pwrite_send(struct vfs_handle_struct
*handle
,
715 struct tevent_context
*ev
,
716 struct files_struct
*fsp
,
718 size_t n
, off_t offset
)
720 struct tevent_req
*req
;
721 struct vfswrap_asys_state
*state
;
724 req
= tevent_req_create(mem_ctx
, &state
, struct vfswrap_asys_state
);
728 if (!vfswrap_init_asys_ctx(handle
->conn
->sconn
->conn
)) {
730 return tevent_req_post(req
, ev
);
732 state
->asys_ctx
= handle
->conn
->sconn
->conn
->asys_ctx
;
735 ret
= asys_pwrite(state
->asys_ctx
, fsp
->fh
->fd
, data
, n
, offset
, req
);
737 tevent_req_error(req
, ret
);
738 return tevent_req_post(req
, ev
);
740 talloc_set_destructor(state
, vfswrap_asys_state_destructor
);
745 static struct tevent_req
*vfswrap_fsync_send(struct vfs_handle_struct
*handle
,
747 struct tevent_context
*ev
,
748 struct files_struct
*fsp
)
750 struct tevent_req
*req
;
751 struct vfswrap_asys_state
*state
;
754 req
= tevent_req_create(mem_ctx
, &state
, struct vfswrap_asys_state
);
758 if (!vfswrap_init_asys_ctx(handle
->conn
->sconn
->conn
)) {
760 return tevent_req_post(req
, ev
);
762 state
->asys_ctx
= handle
->conn
->sconn
->conn
->asys_ctx
;
765 ret
= asys_fsync(state
->asys_ctx
, fsp
->fh
->fd
, req
);
767 tevent_req_error(req
, ret
);
768 return tevent_req_post(req
, ev
);
770 talloc_set_destructor(state
, vfswrap_asys_state_destructor
);
775 static void vfswrap_asys_finished(struct tevent_context
*ev
,
776 struct tevent_fd
*fde
,
777 uint16_t flags
, void *p
)
779 struct asys_context
*asys_ctx
= (struct asys_context
*)p
;
780 struct tevent_req
*req
;
781 struct vfswrap_asys_state
*state
;
787 if ((flags
& TEVENT_FD_READ
) == 0) {
792 res
= asys_result(asys_ctx
, &ret
, &err
, &private_data
);
793 if (res
== EINTR
|| res
== EAGAIN
) {
797 if (res
== EWOULDBLOCK
) {
802 if (res
== ECANCELED
) {
807 DEBUG(1, ("asys_result returned %s\n", strerror(res
)));
811 req
= talloc_get_type_abort(private_data
, struct tevent_req
);
812 state
= tevent_req_data(req
, struct vfswrap_asys_state
);
814 talloc_set_destructor(state
, NULL
);
818 tevent_req_defer_callback(req
, ev
);
819 tevent_req_done(req
);
823 static ssize_t
vfswrap_asys_ssize_t_recv(struct tevent_req
*req
, int *err
)
825 struct vfswrap_asys_state
*state
= tevent_req_data(
826 req
, struct vfswrap_asys_state
);
828 if (tevent_req_is_unix_error(req
, err
)) {
835 static int vfswrap_asys_int_recv(struct tevent_req
*req
, int *err
)
837 struct vfswrap_asys_state
*state
= tevent_req_data(
838 req
, struct vfswrap_asys_state
);
840 if (tevent_req_is_unix_error(req
, err
)) {
847 static off_t
vfswrap_lseek(vfs_handle_struct
*handle
, files_struct
*fsp
, off_t offset
, int whence
)
851 START_PROFILE(syscall_lseek
);
853 /* Cope with 'stat' file opens. */
854 if (fsp
->fh
->fd
!= -1)
855 result
= lseek(fsp
->fh
->fd
, offset
, whence
);
858 * We want to maintain the fiction that we can seek
859 * on a fifo for file system purposes. This allows
860 * people to set up UNIX fifo's that feed data to Windows
864 if((result
== -1) && (errno
== ESPIPE
)) {
869 END_PROFILE(syscall_lseek
);
873 static ssize_t
vfswrap_sendfile(vfs_handle_struct
*handle
, int tofd
, files_struct
*fromfsp
, const DATA_BLOB
*hdr
,
874 off_t offset
, size_t n
)
878 START_PROFILE_BYTES(syscall_sendfile
, n
);
879 result
= sys_sendfile(tofd
, fromfsp
->fh
->fd
, hdr
, offset
, n
);
880 END_PROFILE(syscall_sendfile
);
884 static ssize_t
vfswrap_recvfile(vfs_handle_struct
*handle
,
892 START_PROFILE_BYTES(syscall_recvfile
, n
);
893 result
= sys_recvfile(fromfd
, tofsp
->fh
->fd
, offset
, n
);
894 END_PROFILE(syscall_recvfile
);
898 static int vfswrap_rename(vfs_handle_struct
*handle
,
899 const struct smb_filename
*smb_fname_src
,
900 const struct smb_filename
*smb_fname_dst
)
904 START_PROFILE(syscall_rename
);
906 if (smb_fname_src
->stream_name
|| smb_fname_dst
->stream_name
) {
911 result
= rename(smb_fname_src
->base_name
, smb_fname_dst
->base_name
);
914 END_PROFILE(syscall_rename
);
918 static int vfswrap_fsync(vfs_handle_struct
*handle
, files_struct
*fsp
)
923 START_PROFILE(syscall_fsync
);
924 result
= fsync(fsp
->fh
->fd
);
925 END_PROFILE(syscall_fsync
);
932 static int vfswrap_stat(vfs_handle_struct
*handle
,
933 struct smb_filename
*smb_fname
)
937 START_PROFILE(syscall_stat
);
939 if (smb_fname
->stream_name
) {
944 result
= sys_stat(smb_fname
->base_name
, &smb_fname
->st
,
945 lp_fake_dir_create_times(SNUM(handle
->conn
)));
947 END_PROFILE(syscall_stat
);
951 static int vfswrap_fstat(vfs_handle_struct
*handle
, files_struct
*fsp
, SMB_STRUCT_STAT
*sbuf
)
955 START_PROFILE(syscall_fstat
);
956 result
= sys_fstat(fsp
->fh
->fd
,
957 sbuf
, lp_fake_dir_create_times(SNUM(handle
->conn
)));
958 END_PROFILE(syscall_fstat
);
962 static int vfswrap_lstat(vfs_handle_struct
*handle
,
963 struct smb_filename
*smb_fname
)
967 START_PROFILE(syscall_lstat
);
969 if (smb_fname
->stream_name
) {
974 result
= sys_lstat(smb_fname
->base_name
, &smb_fname
->st
,
975 lp_fake_dir_create_times(SNUM(handle
->conn
)));
977 END_PROFILE(syscall_lstat
);
981 static NTSTATUS
vfswrap_translate_name(struct vfs_handle_struct
*handle
,
983 enum vfs_translate_direction direction
,
987 return NT_STATUS_NONE_MAPPED
;
991 * Implement the default fsctl operation.
993 static bool vfswrap_logged_ioctl_message
= false;
995 static NTSTATUS
vfswrap_fsctl(struct vfs_handle_struct
*handle
,
996 struct files_struct
*fsp
,
999 uint16_t req_flags
, /* Needed for UNICODE ... */
1000 const uint8_t *_in_data
,
1002 uint8_t **_out_data
,
1003 uint32_t max_out_len
,
1006 const char *in_data
= (const char *)_in_data
;
1007 char **out_data
= (char **)_out_data
;
1010 case FSCTL_SET_SPARSE
:
1012 bool set_sparse
= true;
1015 if (in_len
>= 1 && in_data
[0] == 0) {
1019 status
= file_set_sparse(handle
->conn
, fsp
, set_sparse
);
1021 DEBUG(NT_STATUS_IS_OK(status
) ? 10 : 9,
1022 ("FSCTL_SET_SPARSE: fname[%s] set[%u] - %s\n",
1023 smb_fname_str_dbg(fsp
->fsp_name
), set_sparse
,
1024 nt_errstr(status
)));
1029 case FSCTL_CREATE_OR_GET_OBJECT_ID
:
1031 unsigned char objid
[16];
1032 char *return_data
= NULL
;
1034 /* This should return the object-id on this file.
1035 * I think I'll make this be the inode+dev. JRA.
1038 DEBUG(10,("FSCTL_CREATE_OR_GET_OBJECT_ID: called on %s\n",
1039 fsp_fnum_dbg(fsp
)));
1041 *out_len
= (max_out_len
>= 64) ? 64 : max_out_len
;
1042 /* Hmmm, will this cause problems if less data asked for? */
1043 return_data
= talloc_array(ctx
, char, 64);
1044 if (return_data
== NULL
) {
1045 return NT_STATUS_NO_MEMORY
;
1048 /* For backwards compatibility only store the dev/inode. */
1049 push_file_id_16(return_data
, &fsp
->file_id
);
1050 memcpy(return_data
+16,create_volume_objectid(fsp
->conn
,objid
),16);
1051 push_file_id_16(return_data
+32, &fsp
->file_id
);
1052 *out_data
= return_data
;
1053 return NT_STATUS_OK
;
1056 case FSCTL_GET_REPARSE_POINT
:
1058 /* Fail it with STATUS_NOT_A_REPARSE_POINT */
1059 DEBUG(10, ("FSCTL_GET_REPARSE_POINT: called on %s. "
1060 "Status: NOT_IMPLEMENTED\n", fsp_fnum_dbg(fsp
)));
1061 return NT_STATUS_NOT_A_REPARSE_POINT
;
1064 case FSCTL_SET_REPARSE_POINT
:
1066 /* Fail it with STATUS_NOT_A_REPARSE_POINT */
1067 DEBUG(10, ("FSCTL_SET_REPARSE_POINT: called on %s. "
1068 "Status: NOT_IMPLEMENTED\n", fsp_fnum_dbg(fsp
)));
1069 return NT_STATUS_NOT_A_REPARSE_POINT
;
1072 case FSCTL_GET_SHADOW_COPY_DATA
:
1075 * This is called to retrieve the number of Shadow Copies (a.k.a. snapshots)
1076 * and return their volume names. If max_data_count is 16, then it is just
1077 * asking for the number of volumes and length of the combined names.
1079 * pdata is the data allocated by our caller, but that uses
1080 * total_data_count (which is 0 in our case) rather than max_data_count.
1081 * Allocate the correct amount and return the pointer to let
1082 * it be deallocated when we return.
1084 struct shadow_copy_data
*shadow_data
= NULL
;
1085 bool labels
= False
;
1086 uint32 labels_data_count
= 0;
1088 char *cur_pdata
= NULL
;
1090 if (max_out_len
< 16) {
1091 DEBUG(0,("FSCTL_GET_SHADOW_COPY_DATA: max_data_count(%u) < 16 is invalid!\n",
1093 return NT_STATUS_INVALID_PARAMETER
;
1096 if (max_out_len
> 16) {
1100 shadow_data
= talloc_zero(ctx
, struct shadow_copy_data
);
1101 if (shadow_data
== NULL
) {
1102 DEBUG(0,("TALLOC_ZERO() failed!\n"));
1103 return NT_STATUS_NO_MEMORY
;
1107 * Call the VFS routine to actually do the work.
1109 if (SMB_VFS_GET_SHADOW_COPY_DATA(fsp
, shadow_data
, labels
)!=0) {
1110 TALLOC_FREE(shadow_data
);
1111 if (errno
== ENOSYS
) {
1112 DEBUG(5,("FSCTL_GET_SHADOW_COPY_DATA: connectpath %s, not supported.\n",
1113 fsp
->conn
->connectpath
));
1114 return NT_STATUS_NOT_SUPPORTED
;
1116 DEBUG(0,("FSCTL_GET_SHADOW_COPY_DATA: connectpath %s, failed.\n",
1117 fsp
->conn
->connectpath
));
1118 return NT_STATUS_UNSUCCESSFUL
;
1122 labels_data_count
= (shadow_data
->num_volumes
* 2 *
1123 sizeof(SHADOW_COPY_LABEL
)) + 2;
1128 *out_len
= 12 + labels_data_count
;
1131 if (max_out_len
< *out_len
) {
1132 DEBUG(0,("FSCTL_GET_SHADOW_COPY_DATA: max_data_count(%u) too small (%u) bytes needed!\n",
1133 max_out_len
, *out_len
));
1134 TALLOC_FREE(shadow_data
);
1135 return NT_STATUS_BUFFER_TOO_SMALL
;
1138 cur_pdata
= talloc_zero_array(ctx
, char, *out_len
);
1139 if (cur_pdata
== NULL
) {
1140 TALLOC_FREE(shadow_data
);
1141 return NT_STATUS_NO_MEMORY
;
1144 *out_data
= cur_pdata
;
1146 /* num_volumes 4 bytes */
1147 SIVAL(cur_pdata
, 0, shadow_data
->num_volumes
);
1150 /* num_labels 4 bytes */
1151 SIVAL(cur_pdata
, 4, shadow_data
->num_volumes
);
1154 /* needed_data_count 4 bytes */
1155 SIVAL(cur_pdata
, 8, labels_data_count
);
1159 DEBUG(10,("FSCTL_GET_SHADOW_COPY_DATA: %u volumes for path[%s].\n",
1160 shadow_data
->num_volumes
, fsp_str_dbg(fsp
)));
1161 if (labels
&& shadow_data
->labels
) {
1162 for (i
=0; i
<shadow_data
->num_volumes
; i
++) {
1163 srvstr_push(cur_pdata
, req_flags
,
1164 cur_pdata
, shadow_data
->labels
[i
],
1165 2 * sizeof(SHADOW_COPY_LABEL
),
1166 STR_UNICODE
|STR_TERMINATE
);
1167 cur_pdata
+= 2 * sizeof(SHADOW_COPY_LABEL
);
1168 DEBUGADD(10,("Label[%u]: '%s'\n",i
,shadow_data
->labels
[i
]));
1172 TALLOC_FREE(shadow_data
);
1174 return NT_STATUS_OK
;
1177 case FSCTL_FIND_FILES_BY_SID
:
1179 /* pretend this succeeded -
1181 * we have to send back a list with all files owned by this SID
1183 * but I have to check that --metze
1189 DEBUG(10, ("FSCTL_FIND_FILES_BY_SID: called on %s\n",
1190 fsp_fnum_dbg(fsp
)));
1193 /* NT_STATUS_BUFFER_TOO_SMALL maybe? */
1194 return NT_STATUS_INVALID_PARAMETER
;
1197 sid_len
= MIN(in_len
- 4,SID_MAX_SIZE
);
1199 /* unknown 4 bytes: this is not the length of the sid :-( */
1200 /*unknown = IVAL(pdata,0);*/
1202 if (!sid_parse(in_data
+ 4, sid_len
, &sid
)) {
1203 return NT_STATUS_INVALID_PARAMETER
;
1205 DEBUGADD(10, ("for SID: %s\n", sid_string_dbg(&sid
)));
1207 if (!sid_to_uid(&sid
, &uid
)) {
1208 DEBUG(0,("sid_to_uid: failed, sid[%s] sid_len[%lu]\n",
1209 sid_string_dbg(&sid
),
1210 (unsigned long)sid_len
));
1214 /* we can take a look at the find source :-)
1216 * find ./ -uid $uid -name '*' is what we need here
1219 * and send 4bytes len and then NULL terminated unicode strings
1222 * but I don't know how to deal with the paged results
1223 * (maybe we can hang the result anywhere in the fsp struct)
1225 * but I don't know how to deal with the paged results
1226 * (maybe we can hang the result anywhere in the fsp struct)
1228 * we don't send all files at once
1229 * and at the next we should *not* start from the beginning,
1230 * so we have to cache the result
1235 /* this works for now... */
1236 return NT_STATUS_OK
;
1239 case FSCTL_QUERY_ALLOCATED_RANGES
:
1241 /* FIXME: This is just a dummy reply, telling that all of the
1242 * file is allocated. MKS cp needs that.
1243 * Adding the real allocated ranges via FIEMAP on Linux
1244 * and SEEK_DATA/SEEK_HOLE on Solaris is needed to make
1245 * this FSCTL correct for sparse files.
1248 uint64_t offset
, length
;
1249 char *out_data_tmp
= NULL
;
1252 DEBUG(0,("FSCTL_QUERY_ALLOCATED_RANGES: data_count(%u) != 16 is invalid!\n",
1254 return NT_STATUS_INVALID_PARAMETER
;
1257 if (max_out_len
< 16) {
1258 DEBUG(0,("FSCTL_QUERY_ALLOCATED_RANGES: max_out_len (%u) < 16 is invalid!\n",
1260 return NT_STATUS_INVALID_PARAMETER
;
1263 offset
= BVAL(in_data
,0);
1264 length
= BVAL(in_data
,8);
1266 if (offset
+ length
< offset
) {
1267 /* No 64-bit integer wrap. */
1268 return NT_STATUS_INVALID_PARAMETER
;
1271 /* Shouldn't this be SMB_VFS_STAT ... ? */
1272 status
= vfs_stat_fsp(fsp
);
1273 if (!NT_STATUS_IS_OK(status
)) {
1278 out_data_tmp
= talloc_array(ctx
, char, *out_len
);
1279 if (out_data_tmp
== NULL
) {
1280 DEBUG(10, ("unable to allocate memory for response\n"));
1281 return NT_STATUS_NO_MEMORY
;
1284 if (offset
> fsp
->fsp_name
->st
.st_ex_size
||
1285 fsp
->fsp_name
->st
.st_ex_size
== 0 ||
1287 memset(out_data_tmp
, 0, *out_len
);
1289 uint64_t end
= offset
+ length
;
1290 end
= MIN(end
, fsp
->fsp_name
->st
.st_ex_size
);
1291 SBVAL(out_data_tmp
, 0, 0);
1292 SBVAL(out_data_tmp
, 8, end
);
1295 *out_data
= out_data_tmp
;
1297 return NT_STATUS_OK
;
1300 case FSCTL_IS_VOLUME_DIRTY
:
1302 DEBUG(10,("FSCTL_IS_VOLUME_DIRTY: called on %s "
1303 "(but remotely not supported)\n", fsp_fnum_dbg(fsp
)));
1305 * http://msdn.microsoft.com/en-us/library/cc232128%28PROT.10%29.aspx
1306 * says we have to respond with NT_STATUS_INVALID_PARAMETER
1308 return NT_STATUS_INVALID_PARAMETER
;
1313 * Only print once ... unfortunately there could be lots of
1314 * different FSCTLs that are called.
1316 if (!vfswrap_logged_ioctl_message
) {
1317 vfswrap_logged_ioctl_message
= true;
1318 DEBUG(2, ("%s (0x%x): Currently not implemented.\n",
1319 __func__
, function
));
1323 return NT_STATUS_NOT_SUPPORTED
;
1326 /********************************************************************
1327 Given a stat buffer return the allocated size on disk, taking into
1328 account sparse files.
1329 ********************************************************************/
1330 static uint64_t vfswrap_get_alloc_size(vfs_handle_struct
*handle
,
1331 struct files_struct
*fsp
,
1332 const SMB_STRUCT_STAT
*sbuf
)
1336 START_PROFILE(syscall_get_alloc_size
);
1338 if(S_ISDIR(sbuf
->st_ex_mode
)) {
1343 #if defined(HAVE_STAT_ST_BLOCKS) && defined(STAT_ST_BLOCKSIZE)
1344 /* The type of st_blocksize is blkcnt_t which *MUST* be
1345 signed (according to POSIX) and can be less than 64-bits.
1346 Ensure when we're converting to 64 bits wide we don't
1348 #if defined(SIZEOF_BLKCNT_T_8)
1349 result
= (uint64_t)STAT_ST_BLOCKSIZE
* (uint64_t)sbuf
->st_ex_blocks
;
1350 #elif defined(SIZEOF_BLKCNT_T_4)
1352 uint64_t bs
= ((uint64_t)sbuf
->st_ex_blocks
) & 0xFFFFFFFFLL
;
1353 result
= (uint64_t)STAT_ST_BLOCKSIZE
* bs
;
1356 #error SIZEOF_BLKCNT_T_NOT_A_SUPPORTED_VALUE
1360 * Some file systems do not allocate a block for very
1361 * small files. But for non-empty file should report a
1365 uint64_t filesize
= get_file_size_stat(sbuf
);
1367 result
= MIN((uint64_t)STAT_ST_BLOCKSIZE
, filesize
);
1371 result
= get_file_size_stat(sbuf
);
1374 if (fsp
&& fsp
->initial_allocation_size
)
1375 result
= MAX(result
,fsp
->initial_allocation_size
);
1377 result
= smb_roundup(handle
->conn
, result
);
1380 END_PROFILE(syscall_get_alloc_size
);
1384 static int vfswrap_unlink(vfs_handle_struct
*handle
,
1385 const struct smb_filename
*smb_fname
)
1389 START_PROFILE(syscall_unlink
);
1391 if (smb_fname
->stream_name
) {
1395 result
= unlink(smb_fname
->base_name
);
1398 END_PROFILE(syscall_unlink
);
1402 static int vfswrap_chmod(vfs_handle_struct
*handle
, const char *path
, mode_t mode
)
1406 START_PROFILE(syscall_chmod
);
1409 * We need to do this due to the fact that the default POSIX ACL
1410 * chmod modifies the ACL *mask* for the group owner, not the
1411 * group owner bits directly. JRA.
1416 int saved_errno
= errno
; /* We might get ENOSYS */
1417 if ((result
= SMB_VFS_CHMOD_ACL(handle
->conn
, path
, mode
)) == 0) {
1418 END_PROFILE(syscall_chmod
);
1421 /* Error - return the old errno. */
1422 errno
= saved_errno
;
1425 result
= chmod(path
, mode
);
1426 END_PROFILE(syscall_chmod
);
1430 static int vfswrap_fchmod(vfs_handle_struct
*handle
, files_struct
*fsp
, mode_t mode
)
1434 START_PROFILE(syscall_fchmod
);
1437 * We need to do this due to the fact that the default POSIX ACL
1438 * chmod modifies the ACL *mask* for the group owner, not the
1439 * group owner bits directly. JRA.
1443 int saved_errno
= errno
; /* We might get ENOSYS */
1444 if ((result
= SMB_VFS_FCHMOD_ACL(fsp
, mode
)) == 0) {
1445 END_PROFILE(syscall_fchmod
);
1448 /* Error - return the old errno. */
1449 errno
= saved_errno
;
1452 #if defined(HAVE_FCHMOD)
1453 result
= fchmod(fsp
->fh
->fd
, mode
);
1459 END_PROFILE(syscall_fchmod
);
1463 static int vfswrap_chown(vfs_handle_struct
*handle
, const char *path
, uid_t uid
, gid_t gid
)
1467 START_PROFILE(syscall_chown
);
1468 result
= chown(path
, uid
, gid
);
1469 END_PROFILE(syscall_chown
);
1473 static int vfswrap_fchown(vfs_handle_struct
*handle
, files_struct
*fsp
, uid_t uid
, gid_t gid
)
1478 START_PROFILE(syscall_fchown
);
1479 result
= fchown(fsp
->fh
->fd
, uid
, gid
);
1480 END_PROFILE(syscall_fchown
);
1488 static int vfswrap_lchown(vfs_handle_struct
*handle
, const char *path
, uid_t uid
, gid_t gid
)
1492 START_PROFILE(syscall_lchown
);
1493 result
= lchown(path
, uid
, gid
);
1494 END_PROFILE(syscall_lchown
);
1498 static int vfswrap_chdir(vfs_handle_struct
*handle
, const char *path
)
1502 START_PROFILE(syscall_chdir
);
1503 result
= chdir(path
);
1504 END_PROFILE(syscall_chdir
);
1508 static char *vfswrap_getwd(vfs_handle_struct
*handle
)
1512 START_PROFILE(syscall_getwd
);
1513 result
= sys_getwd();
1514 END_PROFILE(syscall_getwd
);
1518 /*********************************************************************
1519 nsec timestamp resolution call. Convert down to whatever the underlying
1520 system will support.
1521 **********************************************************************/
1523 static int vfswrap_ntimes(vfs_handle_struct
*handle
,
1524 const struct smb_filename
*smb_fname
,
1525 struct smb_file_time
*ft
)
1529 START_PROFILE(syscall_ntimes
);
1531 if (smb_fname
->stream_name
) {
1537 if (null_timespec(ft
->atime
)) {
1538 ft
->atime
= smb_fname
->st
.st_ex_atime
;
1541 if (null_timespec(ft
->mtime
)) {
1542 ft
->mtime
= smb_fname
->st
.st_ex_mtime
;
1545 if (!null_timespec(ft
->create_time
)) {
1546 set_create_timespec_ea(handle
->conn
,
1551 if ((timespec_compare(&ft
->atime
,
1552 &smb_fname
->st
.st_ex_atime
) == 0) &&
1553 (timespec_compare(&ft
->mtime
,
1554 &smb_fname
->st
.st_ex_mtime
) == 0)) {
1559 #if defined(HAVE_UTIMENSAT)
1561 struct timespec ts
[2];
1564 result
= utimensat(AT_FDCWD
, smb_fname
->base_name
, ts
, 0);
1566 result
= utimensat(AT_FDCWD
, smb_fname
->base_name
, NULL
, 0);
1568 if (!((result
== -1) && (errno
== ENOSYS
))) {
1572 #if defined(HAVE_UTIMES)
1574 struct timeval tv
[2];
1575 tv
[0] = convert_timespec_to_timeval(ft
->atime
);
1576 tv
[1] = convert_timespec_to_timeval(ft
->mtime
);
1577 result
= utimes(smb_fname
->base_name
, tv
);
1579 result
= utimes(smb_fname
->base_name
, NULL
);
1581 if (!((result
== -1) && (errno
== ENOSYS
))) {
1585 #if defined(HAVE_UTIME)
1587 struct utimbuf times
;
1588 times
.actime
= convert_timespec_to_time_t(ft
->atime
);
1589 times
.modtime
= convert_timespec_to_time_t(ft
->mtime
);
1590 result
= utime(smb_fname
->base_name
, ×
);
1592 result
= utime(smb_fname
->base_name
, NULL
);
1594 if (!((result
== -1) && (errno
== ENOSYS
))) {
1602 END_PROFILE(syscall_ntimes
);
1606 /*********************************************************************
1607 A version of ftruncate that will write the space on disk if strict
1609 **********************************************************************/
1611 static int strict_allocate_ftruncate(vfs_handle_struct
*handle
, files_struct
*fsp
, off_t len
)
1613 off_t space_to_write
;
1614 uint64_t space_avail
;
1615 uint64_t bsize
,dfree
,dsize
;
1618 SMB_STRUCT_STAT
*pst
;
1620 status
= vfs_stat_fsp(fsp
);
1621 if (!NT_STATUS_IS_OK(status
)) {
1624 pst
= &fsp
->fsp_name
->st
;
1627 if (S_ISFIFO(pst
->st_ex_mode
))
1631 if (pst
->st_ex_size
== len
)
1634 /* Shrink - just ftruncate. */
1635 if (pst
->st_ex_size
> len
)
1636 return ftruncate(fsp
->fh
->fd
, len
);
1638 space_to_write
= len
- pst
->st_ex_size
;
1640 /* for allocation try fallocate first. This can fail on some
1641 platforms e.g. when the filesystem doesn't support it and no
1642 emulation is being done by the libc (like on AIX with JFS1). In that
1643 case we do our own emulation. fallocate implementations can
1644 return ENOTSUP or EINVAL in cases like that. */
1645 ret
= SMB_VFS_FALLOCATE(fsp
, VFS_FALLOCATE_EXTEND_SIZE
,
1646 pst
->st_ex_size
, space_to_write
);
1647 if (ret
== ENOSPC
) {
1654 DEBUG(10,("strict_allocate_ftruncate: SMB_VFS_FALLOCATE failed with "
1655 "error %d. Falling back to slow manual allocation\n", ret
));
1657 /* available disk space is enough or not? */
1658 space_avail
= get_dfree_info(fsp
->conn
,
1659 fsp
->fsp_name
->base_name
, false,
1660 &bsize
,&dfree
,&dsize
);
1661 /* space_avail is 1k blocks */
1662 if (space_avail
== (uint64_t)-1 ||
1663 ((uint64_t)space_to_write
/1024 > space_avail
) ) {
1668 /* Write out the real space on disk. */
1669 ret
= vfs_slow_fallocate(fsp
, pst
->st_ex_size
, space_to_write
);
1678 static int vfswrap_ftruncate(vfs_handle_struct
*handle
, files_struct
*fsp
, off_t len
)
1681 SMB_STRUCT_STAT
*pst
;
1685 START_PROFILE(syscall_ftruncate
);
1687 if (lp_strict_allocate(SNUM(fsp
->conn
)) && !fsp
->is_sparse
) {
1688 result
= strict_allocate_ftruncate(handle
, fsp
, len
);
1689 END_PROFILE(syscall_ftruncate
);
1693 /* we used to just check HAVE_FTRUNCATE_EXTEND and only use
1694 ftruncate if the system supports it. Then I discovered that
1695 you can have some filesystems that support ftruncate
1696 expansion and some that don't! On Linux fat can't do
1697 ftruncate extend but ext2 can. */
1699 result
= ftruncate(fsp
->fh
->fd
, len
);
1703 /* According to W. R. Stevens advanced UNIX prog. Pure 4.3 BSD cannot
1704 extend a file with ftruncate. Provide alternate implementation
1707 /* Do an fstat to see if the file is longer than the requested
1708 size in which case the ftruncate above should have
1709 succeeded or shorter, in which case seek to len - 1 and
1710 write 1 byte of zero */
1711 status
= vfs_stat_fsp(fsp
);
1712 if (!NT_STATUS_IS_OK(status
)) {
1715 pst
= &fsp
->fsp_name
->st
;
1718 if (S_ISFIFO(pst
->st_ex_mode
)) {
1724 if (pst
->st_ex_size
== len
) {
1729 if (pst
->st_ex_size
> len
) {
1730 /* the ftruncate should have worked */
1734 if (SMB_VFS_PWRITE(fsp
, &c
, 1, len
-1)!=1) {
1742 END_PROFILE(syscall_ftruncate
);
1746 static int vfswrap_fallocate(vfs_handle_struct
*handle
,
1748 enum vfs_fallocate_mode mode
,
1754 START_PROFILE(syscall_fallocate
);
1755 if (mode
== VFS_FALLOCATE_EXTEND_SIZE
) {
1756 result
= sys_posix_fallocate(fsp
->fh
->fd
, offset
, len
);
1757 } else if (mode
== VFS_FALLOCATE_KEEP_SIZE
) {
1758 result
= sys_fallocate(fsp
->fh
->fd
, mode
, offset
, len
);
1763 END_PROFILE(syscall_fallocate
);
1767 static bool vfswrap_lock(vfs_handle_struct
*handle
, files_struct
*fsp
, int op
, off_t offset
, off_t count
, int type
)
1771 START_PROFILE(syscall_fcntl_lock
);
1772 result
= fcntl_lock(fsp
->fh
->fd
, op
, offset
, count
, type
);
1773 END_PROFILE(syscall_fcntl_lock
);
1777 static int vfswrap_kernel_flock(vfs_handle_struct
*handle
, files_struct
*fsp
,
1778 uint32 share_mode
, uint32 access_mask
)
1780 START_PROFILE(syscall_kernel_flock
);
1781 kernel_flock(fsp
->fh
->fd
, share_mode
, access_mask
);
1782 END_PROFILE(syscall_kernel_flock
);
1786 static bool vfswrap_getlock(vfs_handle_struct
*handle
, files_struct
*fsp
, off_t
*poffset
, off_t
*pcount
, int *ptype
, pid_t
*ppid
)
1790 START_PROFILE(syscall_fcntl_getlock
);
1791 result
= fcntl_getlock(fsp
->fh
->fd
, poffset
, pcount
, ptype
, ppid
);
1792 END_PROFILE(syscall_fcntl_getlock
);
1796 static int vfswrap_linux_setlease(vfs_handle_struct
*handle
, files_struct
*fsp
,
1801 START_PROFILE(syscall_linux_setlease
);
1803 #ifdef HAVE_KERNEL_OPLOCKS_LINUX
1804 result
= linux_setlease(fsp
->fh
->fd
, leasetype
);
1808 END_PROFILE(syscall_linux_setlease
);
1812 static int vfswrap_symlink(vfs_handle_struct
*handle
, const char *oldpath
, const char *newpath
)
1816 START_PROFILE(syscall_symlink
);
1817 result
= symlink(oldpath
, newpath
);
1818 END_PROFILE(syscall_symlink
);
1822 static int vfswrap_readlink(vfs_handle_struct
*handle
, const char *path
, char *buf
, size_t bufsiz
)
1826 START_PROFILE(syscall_readlink
);
1827 result
= readlink(path
, buf
, bufsiz
);
1828 END_PROFILE(syscall_readlink
);
1832 static int vfswrap_link(vfs_handle_struct
*handle
, const char *oldpath
, const char *newpath
)
1836 START_PROFILE(syscall_link
);
1837 result
= link(oldpath
, newpath
);
1838 END_PROFILE(syscall_link
);
1842 static int vfswrap_mknod(vfs_handle_struct
*handle
, const char *pathname
, mode_t mode
, SMB_DEV_T dev
)
1846 START_PROFILE(syscall_mknod
);
1847 result
= sys_mknod(pathname
, mode
, dev
);
1848 END_PROFILE(syscall_mknod
);
1852 static char *vfswrap_realpath(vfs_handle_struct
*handle
, const char *path
)
1856 START_PROFILE(syscall_realpath
);
1857 #ifdef REALPATH_TAKES_NULL
1858 result
= realpath(path
, NULL
);
1860 result
= SMB_MALLOC_ARRAY(char, PATH_MAX
+1);
1862 char *resolved_path
= realpath(path
, result
);
1863 if (!resolved_path
) {
1866 /* SMB_ASSERT(result == resolved_path) ? */
1867 result
= resolved_path
;
1871 END_PROFILE(syscall_realpath
);
1875 static NTSTATUS
vfswrap_notify_watch(vfs_handle_struct
*vfs_handle
,
1876 struct sys_notify_context
*ctx
,
1879 uint32_t *subdir_filter
,
1880 void (*callback
)(struct sys_notify_context
*ctx
,
1882 struct notify_event
*ev
),
1883 void *private_data
, void *handle
)
1886 * So far inotify is the only supported default notify mechanism. If
1887 * another platform like the the BSD's or a proprietary Unix comes
1888 * along and wants another default, we can play the same trick we
1889 * played with Posix ACLs.
1891 * Until that is the case, hard-code inotify here.
1894 if (lp_kernel_change_notify(vfs_handle
->conn
->params
)) {
1895 return inotify_watch(ctx
, path
, filter
, subdir_filter
,
1896 callback
, private_data
, handle
);
1900 * Do nothing, leave everything to notify_internal.c
1902 return NT_STATUS_OK
;
1905 static int vfswrap_chflags(vfs_handle_struct
*handle
, const char *path
,
1909 return chflags(path
, flags
);
1916 static struct file_id
vfswrap_file_id_create(struct vfs_handle_struct
*handle
,
1917 const SMB_STRUCT_STAT
*sbuf
)
1921 /* the ZERO_STRUCT ensures padding doesn't break using the key as a
1925 key
.devid
= sbuf
->st_ex_dev
;
1926 key
.inode
= sbuf
->st_ex_ino
;
1927 /* key.extid is unused by default. */
1932 static NTSTATUS
vfswrap_streaminfo(vfs_handle_struct
*handle
,
1933 struct files_struct
*fsp
,
1935 TALLOC_CTX
*mem_ctx
,
1936 unsigned int *pnum_streams
,
1937 struct stream_struct
**pstreams
)
1939 SMB_STRUCT_STAT sbuf
;
1940 struct stream_struct
*tmp_streams
= NULL
;
1943 if ((fsp
!= NULL
) && (fsp
->is_directory
)) {
1945 * No default streams on directories
1950 if ((fsp
!= NULL
) && (fsp
->fh
->fd
!= -1)) {
1951 ret
= SMB_VFS_FSTAT(fsp
, &sbuf
);
1954 struct smb_filename smb_fname
;
1956 ZERO_STRUCT(smb_fname
);
1957 smb_fname
.base_name
= discard_const_p(char, fname
);
1959 if (lp_posix_pathnames()) {
1960 ret
= SMB_VFS_LSTAT(handle
->conn
, &smb_fname
);
1962 ret
= SMB_VFS_STAT(handle
->conn
, &smb_fname
);
1964 sbuf
= smb_fname
.st
;
1968 return map_nt_error_from_unix(errno
);
1971 if (S_ISDIR(sbuf
.st_ex_mode
)) {
1975 tmp_streams
= talloc_realloc(mem_ctx
, *pstreams
, struct stream_struct
,
1976 (*pnum_streams
) + 1);
1977 if (tmp_streams
== NULL
) {
1978 return NT_STATUS_NO_MEMORY
;
1980 tmp_streams
[*pnum_streams
].name
= talloc_strdup(tmp_streams
, "::$DATA");
1981 if (tmp_streams
[*pnum_streams
].name
== NULL
) {
1982 return NT_STATUS_NO_MEMORY
;
1984 tmp_streams
[*pnum_streams
].size
= sbuf
.st_ex_size
;
1985 tmp_streams
[*pnum_streams
].alloc_size
= SMB_VFS_GET_ALLOC_SIZE(handle
->conn
, fsp
, &sbuf
);
1988 *pstreams
= tmp_streams
;
1990 return NT_STATUS_OK
;
1993 static int vfswrap_get_real_filename(struct vfs_handle_struct
*handle
,
1996 TALLOC_CTX
*mem_ctx
,
2000 * Don't fall back to get_real_filename so callers can differentiate
2001 * between a full directory scan and an actual case-insensitive stat.
2007 static const char *vfswrap_connectpath(struct vfs_handle_struct
*handle
,
2010 return handle
->conn
->connectpath
;
2013 static NTSTATUS
vfswrap_brl_lock_windows(struct vfs_handle_struct
*handle
,
2014 struct byte_range_lock
*br_lck
,
2015 struct lock_struct
*plock
,
2017 struct blocking_lock_record
*blr
)
2019 SMB_ASSERT(plock
->lock_flav
== WINDOWS_LOCK
);
2021 /* Note: blr is not used in the default implementation. */
2022 return brl_lock_windows_default(br_lck
, plock
, blocking_lock
);
2025 static bool vfswrap_brl_unlock_windows(struct vfs_handle_struct
*handle
,
2026 struct messaging_context
*msg_ctx
,
2027 struct byte_range_lock
*br_lck
,
2028 const struct lock_struct
*plock
)
2030 SMB_ASSERT(plock
->lock_flav
== WINDOWS_LOCK
);
2032 return brl_unlock_windows_default(msg_ctx
, br_lck
, plock
);
2035 static bool vfswrap_brl_cancel_windows(struct vfs_handle_struct
*handle
,
2036 struct byte_range_lock
*br_lck
,
2037 struct lock_struct
*plock
,
2038 struct blocking_lock_record
*blr
)
2040 SMB_ASSERT(plock
->lock_flav
== WINDOWS_LOCK
);
2042 /* Note: blr is not used in the default implementation. */
2043 return brl_lock_cancel_default(br_lck
, plock
);
2046 static bool vfswrap_strict_lock(struct vfs_handle_struct
*handle
,
2048 struct lock_struct
*plock
)
2050 SMB_ASSERT(plock
->lock_type
== READ_LOCK
||
2051 plock
->lock_type
== WRITE_LOCK
);
2053 return strict_lock_default(fsp
, plock
);
2056 static void vfswrap_strict_unlock(struct vfs_handle_struct
*handle
,
2058 struct lock_struct
*plock
)
2060 SMB_ASSERT(plock
->lock_type
== READ_LOCK
||
2061 plock
->lock_type
== WRITE_LOCK
);
2063 strict_unlock_default(fsp
, plock
);
2066 /* NT ACL operations. */
2068 static NTSTATUS
vfswrap_fget_nt_acl(vfs_handle_struct
*handle
,
2070 uint32 security_info
,
2071 TALLOC_CTX
*mem_ctx
,
2072 struct security_descriptor
**ppdesc
)
2076 START_PROFILE(fget_nt_acl
);
2077 result
= posix_fget_nt_acl(fsp
, security_info
,
2079 END_PROFILE(fget_nt_acl
);
2083 static NTSTATUS
vfswrap_get_nt_acl(vfs_handle_struct
*handle
,
2085 uint32 security_info
,
2086 TALLOC_CTX
*mem_ctx
,
2087 struct security_descriptor
**ppdesc
)
2091 START_PROFILE(get_nt_acl
);
2092 result
= posix_get_nt_acl(handle
->conn
, name
, security_info
,
2094 END_PROFILE(get_nt_acl
);
2098 static NTSTATUS
vfswrap_fset_nt_acl(vfs_handle_struct
*handle
, files_struct
*fsp
, uint32 security_info_sent
, const struct security_descriptor
*psd
)
2102 START_PROFILE(fset_nt_acl
);
2103 result
= set_nt_acl(fsp
, security_info_sent
, psd
);
2104 END_PROFILE(fset_nt_acl
);
2108 static NTSTATUS
vfswrap_audit_file(struct vfs_handle_struct
*handle
,
2109 struct smb_filename
*file
,
2110 struct security_acl
*sacl
,
2111 uint32_t access_requested
,
2112 uint32_t access_denied
)
2114 return NT_STATUS_OK
; /* Nothing to do here ... */
2117 static int vfswrap_chmod_acl(vfs_handle_struct
*handle
, const char *name
, mode_t mode
)
2125 START_PROFILE(chmod_acl
);
2126 result
= chmod_acl(handle
->conn
, name
, mode
);
2127 END_PROFILE(chmod_acl
);
2132 static int vfswrap_fchmod_acl(vfs_handle_struct
*handle
, files_struct
*fsp
, mode_t mode
)
2140 START_PROFILE(fchmod_acl
);
2141 result
= fchmod_acl(fsp
, mode
);
2142 END_PROFILE(fchmod_acl
);
2147 static SMB_ACL_T
vfswrap_sys_acl_get_file(vfs_handle_struct
*handle
,
2149 SMB_ACL_TYPE_T type
,
2150 TALLOC_CTX
*mem_ctx
)
2152 return sys_acl_get_file(handle
, path_p
, type
, mem_ctx
);
2155 static SMB_ACL_T
vfswrap_sys_acl_get_fd(vfs_handle_struct
*handle
,
2157 TALLOC_CTX
*mem_ctx
)
2159 return sys_acl_get_fd(handle
, fsp
, mem_ctx
);
2162 static int vfswrap_sys_acl_blob_get_file(vfs_handle_struct
*handle
,
2164 TALLOC_CTX
*mem_ctx
,
2165 char **blob_description
,
2172 static int vfswrap_sys_acl_blob_get_fd(vfs_handle_struct
*handle
,
2174 TALLOC_CTX
*mem_ctx
,
2175 char **blob_description
,
2182 static int vfswrap_sys_acl_set_file(vfs_handle_struct
*handle
, const char *name
, SMB_ACL_TYPE_T acltype
, SMB_ACL_T theacl
)
2184 return sys_acl_set_file(handle
, name
, acltype
, theacl
);
2187 static int vfswrap_sys_acl_set_fd(vfs_handle_struct
*handle
, files_struct
*fsp
, SMB_ACL_T theacl
)
2189 return sys_acl_set_fd(handle
, fsp
, theacl
);
2192 static int vfswrap_sys_acl_delete_def_file(vfs_handle_struct
*handle
, const char *path
)
2194 return sys_acl_delete_def_file(handle
, path
);
2197 /****************************************************************
2198 Extended attribute operations.
2199 *****************************************************************/
2201 static ssize_t
vfswrap_getxattr(struct vfs_handle_struct
*handle
,const char *path
, const char *name
, void *value
, size_t size
)
2203 return getxattr(path
, name
, value
, size
);
2206 static ssize_t
vfswrap_fgetxattr(struct vfs_handle_struct
*handle
, struct files_struct
*fsp
, const char *name
, void *value
, size_t size
)
2208 return fgetxattr(fsp
->fh
->fd
, name
, value
, size
);
2211 static ssize_t
vfswrap_listxattr(struct vfs_handle_struct
*handle
, const char *path
, char *list
, size_t size
)
2213 return listxattr(path
, list
, size
);
2216 static ssize_t
vfswrap_flistxattr(struct vfs_handle_struct
*handle
, struct files_struct
*fsp
, char *list
, size_t size
)
2218 return flistxattr(fsp
->fh
->fd
, list
, size
);
2221 static int vfswrap_removexattr(struct vfs_handle_struct
*handle
, const char *path
, const char *name
)
2223 return removexattr(path
, name
);
2226 static int vfswrap_fremovexattr(struct vfs_handle_struct
*handle
, struct files_struct
*fsp
, const char *name
)
2228 return fremovexattr(fsp
->fh
->fd
, name
);
2231 static int vfswrap_setxattr(struct vfs_handle_struct
*handle
, const char *path
, const char *name
, const void *value
, size_t size
, int flags
)
2233 return setxattr(path
, name
, value
, size
, flags
);
2236 static int vfswrap_fsetxattr(struct vfs_handle_struct
*handle
, struct files_struct
*fsp
, const char *name
, const void *value
, size_t size
, int flags
)
2238 return fsetxattr(fsp
->fh
->fd
, name
, value
, size
, flags
);
2241 static bool vfswrap_aio_force(struct vfs_handle_struct
*handle
, struct files_struct
*fsp
)
2246 static bool vfswrap_is_offline(struct vfs_handle_struct
*handle
,
2247 const struct smb_filename
*fname
,
2248 SMB_STRUCT_STAT
*sbuf
)
2252 bool offline
= false;
2254 if (ISDOT(fname
->base_name
) || ISDOTDOT(fname
->base_name
)) {
2258 if (!lp_dmapi_support(SNUM(handle
->conn
)) || !dmapi_have_session()) {
2259 #if defined(ENOTSUP)
2265 status
= get_full_smb_filename(talloc_tos(), fname
, &path
);
2266 if (!NT_STATUS_IS_OK(status
)) {
2267 errno
= map_errno_from_nt_status(status
);
2271 offline
= (dmapi_file_flags(path
) & FILE_ATTRIBUTE_OFFLINE
) != 0;
2278 static int vfswrap_set_offline(struct vfs_handle_struct
*handle
,
2279 const struct smb_filename
*fname
)
2281 /* We don't know how to set offline bit by default, needs to be overriden in the vfs modules */
2282 #if defined(ENOTSUP)
2288 static NTSTATUS
vfswrap_durable_cookie(struct vfs_handle_struct
*handle
,
2289 struct files_struct
*fsp
,
2290 TALLOC_CTX
*mem_ctx
,
2293 return vfs_default_durable_cookie(fsp
, mem_ctx
, cookie
);
2296 static NTSTATUS
vfswrap_durable_disconnect(struct vfs_handle_struct
*handle
,
2297 struct files_struct
*fsp
,
2298 const DATA_BLOB old_cookie
,
2299 TALLOC_CTX
*mem_ctx
,
2300 DATA_BLOB
*new_cookie
)
2302 return vfs_default_durable_disconnect(fsp
, old_cookie
, mem_ctx
,
2306 static NTSTATUS
vfswrap_durable_reconnect(struct vfs_handle_struct
*handle
,
2307 struct smb_request
*smb1req
,
2308 struct smbXsrv_open
*op
,
2309 const DATA_BLOB old_cookie
,
2310 TALLOC_CTX
*mem_ctx
,
2311 struct files_struct
**fsp
,
2312 DATA_BLOB
*new_cookie
)
2314 return vfs_default_durable_reconnect(handle
->conn
, smb1req
, op
,
2315 old_cookie
, mem_ctx
,
2319 static struct vfs_fn_pointers vfs_default_fns
= {
2320 /* Disk operations */
2322 .connect_fn
= vfswrap_connect
,
2323 .disconnect_fn
= vfswrap_disconnect
,
2324 .disk_free_fn
= vfswrap_disk_free
,
2325 .get_quota_fn
= vfswrap_get_quota
,
2326 .set_quota_fn
= vfswrap_set_quota
,
2327 .get_shadow_copy_data_fn
= vfswrap_get_shadow_copy_data
,
2328 .statvfs_fn
= vfswrap_statvfs
,
2329 .fs_capabilities_fn
= vfswrap_fs_capabilities
,
2330 .get_dfs_referrals_fn
= vfswrap_get_dfs_referrals
,
2332 /* Directory operations */
2334 .opendir_fn
= vfswrap_opendir
,
2335 .fdopendir_fn
= vfswrap_fdopendir
,
2336 .readdir_fn
= vfswrap_readdir
,
2337 .seekdir_fn
= vfswrap_seekdir
,
2338 .telldir_fn
= vfswrap_telldir
,
2339 .rewind_dir_fn
= vfswrap_rewinddir
,
2340 .mkdir_fn
= vfswrap_mkdir
,
2341 .rmdir_fn
= vfswrap_rmdir
,
2342 .closedir_fn
= vfswrap_closedir
,
2343 .init_search_op_fn
= vfswrap_init_search_op
,
2345 /* File operations */
2347 .open_fn
= vfswrap_open
,
2348 .create_file_fn
= vfswrap_create_file
,
2349 .close_fn
= vfswrap_close
,
2350 .read_fn
= vfswrap_read
,
2351 .pread_fn
= vfswrap_pread
,
2352 .pread_send_fn
= vfswrap_pread_send
,
2353 .pread_recv_fn
= vfswrap_asys_ssize_t_recv
,
2354 .write_fn
= vfswrap_write
,
2355 .pwrite_fn
= vfswrap_pwrite
,
2356 .pwrite_send_fn
= vfswrap_pwrite_send
,
2357 .pwrite_recv_fn
= vfswrap_asys_ssize_t_recv
,
2358 .lseek_fn
= vfswrap_lseek
,
2359 .sendfile_fn
= vfswrap_sendfile
,
2360 .recvfile_fn
= vfswrap_recvfile
,
2361 .rename_fn
= vfswrap_rename
,
2362 .fsync_fn
= vfswrap_fsync
,
2363 .fsync_send_fn
= vfswrap_fsync_send
,
2364 .fsync_recv_fn
= vfswrap_asys_int_recv
,
2365 .stat_fn
= vfswrap_stat
,
2366 .fstat_fn
= vfswrap_fstat
,
2367 .lstat_fn
= vfswrap_lstat
,
2368 .get_alloc_size_fn
= vfswrap_get_alloc_size
,
2369 .unlink_fn
= vfswrap_unlink
,
2370 .chmod_fn
= vfswrap_chmod
,
2371 .fchmod_fn
= vfswrap_fchmod
,
2372 .chown_fn
= vfswrap_chown
,
2373 .fchown_fn
= vfswrap_fchown
,
2374 .lchown_fn
= vfswrap_lchown
,
2375 .chdir_fn
= vfswrap_chdir
,
2376 .getwd_fn
= vfswrap_getwd
,
2377 .ntimes_fn
= vfswrap_ntimes
,
2378 .ftruncate_fn
= vfswrap_ftruncate
,
2379 .fallocate_fn
= vfswrap_fallocate
,
2380 .lock_fn
= vfswrap_lock
,
2381 .kernel_flock_fn
= vfswrap_kernel_flock
,
2382 .linux_setlease_fn
= vfswrap_linux_setlease
,
2383 .getlock_fn
= vfswrap_getlock
,
2384 .symlink_fn
= vfswrap_symlink
,
2385 .readlink_fn
= vfswrap_readlink
,
2386 .link_fn
= vfswrap_link
,
2387 .mknod_fn
= vfswrap_mknod
,
2388 .realpath_fn
= vfswrap_realpath
,
2389 .notify_watch_fn
= vfswrap_notify_watch
,
2390 .chflags_fn
= vfswrap_chflags
,
2391 .file_id_create_fn
= vfswrap_file_id_create
,
2392 .streaminfo_fn
= vfswrap_streaminfo
,
2393 .get_real_filename_fn
= vfswrap_get_real_filename
,
2394 .connectpath_fn
= vfswrap_connectpath
,
2395 .brl_lock_windows_fn
= vfswrap_brl_lock_windows
,
2396 .brl_unlock_windows_fn
= vfswrap_brl_unlock_windows
,
2397 .brl_cancel_windows_fn
= vfswrap_brl_cancel_windows
,
2398 .strict_lock_fn
= vfswrap_strict_lock
,
2399 .strict_unlock_fn
= vfswrap_strict_unlock
,
2400 .translate_name_fn
= vfswrap_translate_name
,
2401 .fsctl_fn
= vfswrap_fsctl
,
2403 /* NT ACL operations. */
2405 .fget_nt_acl_fn
= vfswrap_fget_nt_acl
,
2406 .get_nt_acl_fn
= vfswrap_get_nt_acl
,
2407 .fset_nt_acl_fn
= vfswrap_fset_nt_acl
,
2408 .audit_file_fn
= vfswrap_audit_file
,
2410 /* POSIX ACL operations. */
2412 .chmod_acl_fn
= vfswrap_chmod_acl
,
2413 .fchmod_acl_fn
= vfswrap_fchmod_acl
,
2415 .sys_acl_get_file_fn
= vfswrap_sys_acl_get_file
,
2416 .sys_acl_get_fd_fn
= vfswrap_sys_acl_get_fd
,
2417 .sys_acl_blob_get_file_fn
= vfswrap_sys_acl_blob_get_file
,
2418 .sys_acl_blob_get_fd_fn
= vfswrap_sys_acl_blob_get_fd
,
2419 .sys_acl_set_file_fn
= vfswrap_sys_acl_set_file
,
2420 .sys_acl_set_fd_fn
= vfswrap_sys_acl_set_fd
,
2421 .sys_acl_delete_def_file_fn
= vfswrap_sys_acl_delete_def_file
,
2423 /* EA operations. */
2424 .getxattr_fn
= vfswrap_getxattr
,
2425 .fgetxattr_fn
= vfswrap_fgetxattr
,
2426 .listxattr_fn
= vfswrap_listxattr
,
2427 .flistxattr_fn
= vfswrap_flistxattr
,
2428 .removexattr_fn
= vfswrap_removexattr
,
2429 .fremovexattr_fn
= vfswrap_fremovexattr
,
2430 .setxattr_fn
= vfswrap_setxattr
,
2431 .fsetxattr_fn
= vfswrap_fsetxattr
,
2433 /* aio operations */
2434 .aio_force_fn
= vfswrap_aio_force
,
2436 /* offline operations */
2437 .is_offline_fn
= vfswrap_is_offline
,
2438 .set_offline_fn
= vfswrap_set_offline
,
2440 /* durable handle operations */
2441 .durable_cookie_fn
= vfswrap_durable_cookie
,
2442 .durable_disconnect_fn
= vfswrap_durable_disconnect
,
2443 .durable_reconnect_fn
= vfswrap_durable_reconnect
,
2446 NTSTATUS
vfs_default_init(void);
2447 NTSTATUS
vfs_default_init(void)
2449 return smb_register_vfs(SMB_VFS_INTERFACE_VERSION
,
2450 DEFAULT_VFS_MODULE_NAME
, &vfs_default_fns
);