2 Unix SMB/CIFS implementation.
3 Files[] structure handling
4 Copyright (C) Andrew Tridgell 1998
6 This program is free software; you can redistribute it and/or modify
7 it under the terms of the GNU General Public License as published by
8 the Free Software Foundation; either version 3 of the License, or
9 (at your option) any later version.
11 This program is distributed in the hope that it will be useful,
12 but WITHOUT ANY WARRANTY; without even the implied warranty of
13 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
14 GNU General Public License for more details.
16 You should have received a copy of the GNU General Public License
17 along with this program. If not, see <http://www.gnu.org/licenses/>.
21 #include "smbd/smbd.h"
22 #include "smbd/globals.h"
23 #include "libcli/security/security.h"
26 #define VALID_FNUM(fnum) (((fnum) >= 0) && ((fnum) < real_max_open_files))
28 #define FILE_HANDLE_OFFSET 0x1000
30 /****************************************************************************
31 Return a unique number identifying this fsp over the life of this pid.
32 ****************************************************************************/
34 static unsigned long get_gen_count(struct smbd_server_connection
*sconn
)
36 sconn
->file_gen_counter
+= 1;
37 if (sconn
->file_gen_counter
== 0) {
38 sconn
->file_gen_counter
+= 1;
40 return sconn
->file_gen_counter
;
43 /****************************************************************************
44 Find first available file slot.
45 ****************************************************************************/
47 NTSTATUS
file_new(struct smb_request
*req
, connection_struct
*conn
,
48 files_struct
**result
)
50 struct smbd_server_connection
*sconn
= conn
->sconn
;
55 /* we want to give out file handles differently on each new
56 connection because of a common bug in MS clients where they try to
57 reuse a file descriptor from an earlier smb connection. This code
58 increases the chance that the errant client will get an error rather
59 than causing corruption */
60 if (sconn
->first_file
== 0) {
61 sconn
->first_file
= (sys_getpid() ^ (int)time(NULL
));
62 sconn
->first_file
%= sconn
->real_max_open_files
;
65 /* TODO: Port the id-tree implementation from Samba4 */
67 i
= bitmap_find(sconn
->file_bmap
, sconn
->first_file
);
69 DEBUG(0,("ERROR! Out of file structures\n"));
70 /* TODO: We have to unconditionally return a DOS error here,
71 * W2k3 even returns ERRDOS/ERRnofids for ntcreate&x with
72 * NTSTATUS negotiated */
73 return NT_STATUS_TOO_MANY_OPENED_FILES
;
77 * Make a child of the connection_struct as an fsp can't exist
78 * independent of a connection.
80 fsp
= talloc_zero(conn
, struct files_struct
);
82 return NT_STATUS_NO_MEMORY
;
86 * This can't be a child of fsp because the file_handle can be ref'd
87 * when doing a dos/fcb open, which will then share the file_handle
88 * across multiple fsps.
90 fsp
->fh
= talloc_zero(conn
, struct fd_handle
);
93 return NT_STATUS_NO_MEMORY
;
96 fsp
->fh
->ref_count
= 1;
100 fsp
->fh
->gen_id
= get_gen_count(sconn
);
101 GetTimeOfDay(&fsp
->open_time
);
103 sconn
->first_file
= (i
+1) % (sconn
->real_max_open_files
);
105 bitmap_set(sconn
->file_bmap
, i
);
106 sconn
->files_used
+= 1;
108 fsp
->fnum
= i
+ FILE_HANDLE_OFFSET
;
109 SMB_ASSERT(fsp
->fnum
< 65536);
112 * Create an smb_filename with "" for the base_name. There are very
113 * few NULL checks, so make sure it's initialized with something. to
114 * be safe until an audit can be done.
116 status
= create_synthetic_smb_fname(fsp
, "", NULL
, NULL
,
118 if (!NT_STATUS_IS_OK(status
)) {
120 TALLOC_FREE(fsp
->fh
);
123 DLIST_ADD(sconn
->files
, fsp
);
125 DEBUG(5,("allocated file structure %d, fnum = %d (%d used)\n",
126 i
, fsp
->fnum
, sconn
->files_used
));
129 req
->chain_fsp
= fsp
;
132 /* A new fsp invalidates the positive and
133 negative fsp_fi_cache as the new fsp is pushed
134 at the start of the list and we search from
135 a cache hit to the *end* of the list. */
137 ZERO_STRUCT(sconn
->fsp_fi_cache
);
139 conn
->num_files_open
++;
145 /****************************************************************************
146 Close all open files for a connection.
147 ****************************************************************************/
149 void file_close_conn(connection_struct
*conn
)
151 files_struct
*fsp
, *next
;
153 for (fsp
=conn
->sconn
->files
; fsp
; fsp
=next
) {
155 if (fsp
->conn
== conn
) {
156 close_file(NULL
, fsp
, SHUTDOWN_CLOSE
);
161 /****************************************************************************
162 Close all open files for a pid and a vuid.
163 ****************************************************************************/
165 void file_close_pid(struct smbd_server_connection
*sconn
, uint16 smbpid
,
168 files_struct
*fsp
, *next
;
170 for (fsp
=sconn
->files
;fsp
;fsp
=next
) {
172 if ((fsp
->file_pid
== smbpid
) && (fsp
->vuid
== vuid
)) {
173 close_file(NULL
, fsp
, SHUTDOWN_CLOSE
);
178 /****************************************************************************
179 Initialise file structures.
180 ****************************************************************************/
182 bool file_init(struct smbd_server_connection
*sconn
)
184 int request_max_open_files
= lp_max_open_files();
188 * Set the max_open files to be the requested
189 * max plus a fudgefactor to allow for the extra
190 * fd's we need such as log files etc...
192 real_lim
= set_maxfiles(request_max_open_files
+ MAX_OPEN_FUDGEFACTOR
);
194 sconn
->real_max_open_files
= real_lim
- MAX_OPEN_FUDGEFACTOR
;
196 if (sconn
->real_max_open_files
+ FILE_HANDLE_OFFSET
+ MAX_OPEN_PIPES
198 sconn
->real_max_open_files
=
199 65536 - FILE_HANDLE_OFFSET
- MAX_OPEN_PIPES
;
201 if(sconn
->real_max_open_files
!= request_max_open_files
) {
202 DEBUG(1, ("file_init: Information only: requested %d "
203 "open files, %d are available.\n",
204 request_max_open_files
, sconn
->real_max_open_files
));
207 SMB_ASSERT(sconn
->real_max_open_files
> 100);
209 sconn
->file_bmap
= bitmap_talloc(sconn
, sconn
->real_max_open_files
);
211 if (!sconn
->file_bmap
) {
217 /****************************************************************************
218 Close files open by a specified vuid.
219 ****************************************************************************/
221 void file_close_user(struct smbd_server_connection
*sconn
, int vuid
)
223 files_struct
*fsp
, *next
;
225 for (fsp
=sconn
->files
; fsp
; fsp
=next
) {
227 if (fsp
->vuid
== vuid
) {
228 close_file(NULL
, fsp
, SHUTDOWN_CLOSE
);
234 * Walk the files table until "fn" returns non-NULL
237 struct files_struct
*files_forall(
238 struct smbd_server_connection
*sconn
,
239 struct files_struct
*(*fn
)(struct files_struct
*fsp
,
243 struct files_struct
*fsp
, *next
;
245 for (fsp
= sconn
->files
; fsp
; fsp
= next
) {
246 struct files_struct
*ret
;
248 ret
= fn(fsp
, private_data
);
256 /****************************************************************************
257 Find a fsp given a file descriptor.
258 ****************************************************************************/
260 files_struct
*file_find_fd(struct smbd_server_connection
*sconn
, int fd
)
265 for (fsp
=sconn
->files
; fsp
; fsp
=fsp
->next
,count
++) {
266 if (fsp
->fh
->fd
== fd
) {
268 DLIST_PROMOTE(sconn
->files
, fsp
);
277 /****************************************************************************
278 Find a fsp given a device, inode and file_id.
279 ****************************************************************************/
281 files_struct
*file_find_dif(struct smbd_server_connection
*sconn
,
282 struct file_id id
, unsigned long gen_id
)
287 for (fsp
=sconn
->files
; fsp
; fsp
=fsp
->next
,count
++) {
288 /* We can have a fsp->fh->fd == -1 here as it could be a stat open. */
289 if (file_id_equal(&fsp
->file_id
, &id
) &&
290 fsp
->fh
->gen_id
== gen_id
) {
292 DLIST_PROMOTE(sconn
->files
, fsp
);
294 /* Paranoia check. */
295 if ((fsp
->fh
->fd
== -1) &&
296 (fsp
->oplock_type
!= NO_OPLOCK
) &&
297 (fsp
->oplock_type
!= FAKE_LEVEL_II_OPLOCK
)) {
298 DEBUG(0,("file_find_dif: file %s file_id = "
299 "%s, gen = %u oplock_type = %u is a "
300 "stat open with oplock type !\n",
302 file_id_string_tos(&fsp
->file_id
),
303 (unsigned int)fsp
->fh
->gen_id
,
304 (unsigned int)fsp
->oplock_type
));
305 smb_panic("file_find_dif");
314 /****************************************************************************
315 Find the first fsp given a device and inode.
316 We use a singleton cache here to speed up searching from getfilepathinfo
318 ****************************************************************************/
320 files_struct
*file_find_di_first(struct smbd_server_connection
*sconn
,
325 if (file_id_equal(&sconn
->fsp_fi_cache
.id
, &id
)) {
326 /* Positive or negative cache hit. */
327 return sconn
->fsp_fi_cache
.fsp
;
330 sconn
->fsp_fi_cache
.id
= id
;
332 for (fsp
=sconn
->files
;fsp
;fsp
=fsp
->next
) {
333 if (file_id_equal(&fsp
->file_id
, &id
)) {
334 /* Setup positive cache. */
335 sconn
->fsp_fi_cache
.fsp
= fsp
;
340 /* Setup negative cache. */
341 sconn
->fsp_fi_cache
.fsp
= NULL
;
345 /****************************************************************************
346 Find the next fsp having the same device and inode.
347 ****************************************************************************/
349 files_struct
*file_find_di_next(files_struct
*start_fsp
)
353 for (fsp
= start_fsp
->next
;fsp
;fsp
=fsp
->next
) {
354 if (file_id_equal(&fsp
->file_id
, &start_fsp
->file_id
)) {
362 /****************************************************************************
363 Find any fsp open with a pathname below that of an already open path.
364 ****************************************************************************/
366 bool file_find_subpath(files_struct
*dir_fsp
)
370 char *d_fullname
= NULL
;
372 d_fullname
= talloc_asprintf(talloc_tos(), "%s/%s",
373 dir_fsp
->conn
->connectpath
,
374 dir_fsp
->fsp_name
->base_name
);
380 dlen
= strlen(d_fullname
);
382 for (fsp
=dir_fsp
->conn
->sconn
->files
; fsp
; fsp
=fsp
->next
) {
385 if (fsp
== dir_fsp
) {
389 d1_fullname
= talloc_asprintf(talloc_tos(),
391 fsp
->conn
->connectpath
,
392 fsp
->fsp_name
->base_name
);
395 * If the open file has a path that is a longer
396 * component, then it's a subpath.
398 if (strnequal(d_fullname
, d1_fullname
, dlen
) &&
399 (d1_fullname
[dlen
] == '/')) {
400 TALLOC_FREE(d1_fullname
);
401 TALLOC_FREE(d_fullname
);
404 TALLOC_FREE(d1_fullname
);
407 TALLOC_FREE(d_fullname
);
411 /****************************************************************************
412 Sync open files on a connection.
413 ****************************************************************************/
415 void file_sync_all(connection_struct
*conn
)
417 files_struct
*fsp
, *next
;
419 for (fsp
=conn
->sconn
->files
; fsp
; fsp
=next
) {
421 if ((conn
== fsp
->conn
) && (fsp
->fh
->fd
!= -1)) {
422 sync_file(conn
, fsp
, True
/* write through */);
427 /****************************************************************************
429 ****************************************************************************/
431 void file_free(struct smb_request
*req
, files_struct
*fsp
)
433 struct smbd_server_connection
*sconn
= fsp
->conn
->sconn
;
435 DLIST_REMOVE(sconn
->files
, fsp
);
437 TALLOC_FREE(fsp
->fake_file_handle
);
439 if (fsp
->fh
->ref_count
== 1) {
440 TALLOC_FREE(fsp
->fh
);
442 fsp
->fh
->ref_count
--;
446 if (fsp
->is_directory
) {
447 notify_remove_onelevel(fsp
->conn
->notify_ctx
,
450 notify_remove(fsp
->conn
->notify_ctx
, fsp
);
451 TALLOC_FREE(fsp
->notify
);
454 /* Ensure this event will never fire. */
455 TALLOC_FREE(fsp
->oplock_timeout
);
457 /* Ensure this event will never fire. */
458 TALLOC_FREE(fsp
->update_write_time_event
);
460 bitmap_clear(sconn
->file_bmap
, fsp
->fnum
- FILE_HANDLE_OFFSET
);
463 DEBUG(5,("freed files structure %d (%d used)\n",
464 fsp
->fnum
, sconn
->files_used
));
466 fsp
->conn
->num_files_open
--;
468 if ((req
!= NULL
) && (fsp
== req
->chain_fsp
)) {
469 req
->chain_fsp
= NULL
;
473 * Clear all possible chained fsp
474 * pointers in the SMB2 request queue.
476 if (req
!= NULL
&& req
->smb2req
) {
477 remove_smb2_chained_fsp(fsp
);
480 /* Closing a file can invalidate the positive cache. */
481 if (fsp
== sconn
->fsp_fi_cache
.fsp
) {
482 ZERO_STRUCT(sconn
->fsp_fi_cache
);
485 /* Drop all remaining extensions. */
486 while (fsp
->vfs_extension
) {
487 vfs_remove_fsp_extension(fsp
->vfs_extension
->owner
, fsp
);
490 /* this is paranoia, just in case someone tries to reuse the
494 /* fsp->fsp_name is a talloc child and is free'd automatically. */
498 /****************************************************************************
499 Get an fsp from a 16 bit fnum.
500 ****************************************************************************/
502 static struct files_struct
*file_fnum(struct smbd_server_connection
*sconn
,
508 for (fsp
=sconn
->files
; fsp
; fsp
=fsp
->next
, count
++) {
509 if (fsp
->fnum
== fnum
) {
511 DLIST_PROMOTE(sconn
->files
, fsp
);
519 /****************************************************************************
520 Get an fsp from a packet given a 16 bit fnum.
521 ****************************************************************************/
523 files_struct
*file_fsp(struct smb_request
*req
, uint16 fid
)
529 * We should never get here. req==NULL could in theory
530 * only happen from internal opens with a non-zero
531 * root_dir_fid. Internal opens just don't do that, at
532 * least they are not supposed to do so. And if they
533 * start to do so, they better fake up a smb_request
534 * from which we get the right smbd_server_conn. While
535 * this should never happen, let's return NULL here.
540 if (req
->chain_fsp
!= NULL
) {
541 return req
->chain_fsp
;
544 fsp
= file_fnum(req
->sconn
, fid
);
546 req
->chain_fsp
= fsp
;
551 /****************************************************************************
552 Duplicate the file handle part for a DOS or FCB open.
553 ****************************************************************************/
555 NTSTATUS
dup_file_fsp(struct smb_request
*req
, files_struct
*from
,
556 uint32 access_mask
, uint32 share_access
,
557 uint32 create_options
, files_struct
*to
)
564 to
->file_id
= from
->file_id
;
565 to
->initial_allocation_size
= from
->initial_allocation_size
;
566 to
->mode
= from
->mode
;
567 to
->file_pid
= from
->file_pid
;
568 to
->vuid
= from
->vuid
;
569 to
->open_time
= from
->open_time
;
570 to
->access_mask
= access_mask
;
571 to
->share_access
= share_access
;
572 to
->oplock_type
= from
->oplock_type
;
573 to
->can_lock
= from
->can_lock
;
574 to
->can_read
= (access_mask
& (FILE_READ_DATA
)) ? True
: False
;
575 if (!CAN_WRITE(from
->conn
)) {
576 to
->can_write
= False
;
578 to
->can_write
= (access_mask
& (FILE_WRITE_DATA
| FILE_APPEND_DATA
)) ? True
: False
;
580 to
->modified
= from
->modified
;
581 to
->is_directory
= from
->is_directory
;
582 to
->aio_write_behind
= from
->aio_write_behind
;
584 if (from
->print_file
) {
585 to
->print_file
= talloc(to
, struct print_file_data
);
586 if (!to
->print_file
) return NT_STATUS_NO_MEMORY
;
587 to
->print_file
->rap_jobid
= from
->print_file
->rap_jobid
;
589 to
->print_file
= NULL
;
592 return fsp_set_smb_fname(to
, from
->fsp_name
);
596 * Return a jenkins hash of a pathname on a connection.
599 NTSTATUS
file_name_hash(connection_struct
*conn
,
600 const char *name
, uint32_t *p_name_hash
)
603 char *fullpath
= NULL
;
605 /* Set the hash of the full pathname. */
606 fullpath
= talloc_asprintf(talloc_tos(),
611 return NT_STATUS_NO_MEMORY
;
613 key
= string_term_tdb_data(fullpath
);
614 *p_name_hash
= tdb_jenkins_hash(&key
);
616 DEBUG(10,("file_name_hash: %s hash 0x%x\n",
618 (unsigned int)*p_name_hash
));
620 TALLOC_FREE(fullpath
);
625 * The only way that the fsp->fsp_name field should ever be set.
627 NTSTATUS
fsp_set_smb_fname(struct files_struct
*fsp
,
628 const struct smb_filename
*smb_fname_in
)
631 struct smb_filename
*smb_fname_new
;
633 status
= copy_smb_filename(fsp
, smb_fname_in
, &smb_fname_new
);
634 if (!NT_STATUS_IS_OK(status
)) {
638 TALLOC_FREE(fsp
->fsp_name
);
639 fsp
->fsp_name
= smb_fname_new
;
641 return file_name_hash(fsp
->conn
,
642 smb_fname_str_dbg(fsp
->fsp_name
),