2 Unix SMB/CIFS implementation.
3 Durable Handle default VFS implementation
5 Copyright (C) Stefan Metzmacher 2012
6 Copyright (C) Michael Adam 2012
7 Copyright (C) Volker Lendecke 2012
9 This program is free software; you can redistribute it and/or modify
10 it under the terms of the GNU General Public License as published by
11 the Free Software Foundation; either version 3 of the License, or
12 (at your option) any later version.
14 This program is distributed in the hope that it will be useful,
15 but WITHOUT ANY WARRANTY; without even the implied warranty of
16 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
17 GNU General Public License for more details.
19 You should have received a copy of the GNU General Public License
20 along with this program. If not, see <http://www.gnu.org/licenses/>.
24 #include "system/filesys.h"
25 #include "smbd/smbd.h"
26 #include "smbd/globals.h"
27 #include "libcli/security/security.h"
29 #include "librpc/gen_ndr/ndr_open_files.h"
31 #include "fake_file.h"
33 NTSTATUS
vfs_default_durable_cookie(struct files_struct
*fsp
,
35 DATA_BLOB
*cookie_blob
)
37 struct connection_struct
*conn
= fsp
->conn
;
38 enum ndr_err_code ndr_err
;
39 struct vfs_default_durable_cookie cookie
;
41 if (!lp_durable_handles(SNUM(conn
))) {
42 return NT_STATUS_NOT_SUPPORTED
;
45 if (lp_kernel_share_modes(SNUM(conn
))) {
47 * We do not support durable handles
48 * if kernel share modes (flocks) are used
50 return NT_STATUS_NOT_SUPPORTED
;
53 if (lp_kernel_oplocks(SNUM(conn
))) {
55 * We do not support durable handles
56 * if kernel oplocks are used
58 return NT_STATUS_NOT_SUPPORTED
;
61 if ((fsp
->current_lock_count
> 0) &&
62 lp_posix_locking(fsp
->conn
->params
))
65 * We do not support durable handles
66 * if the handle has posix locks.
68 return NT_STATUS_NOT_SUPPORTED
;
71 if (fsp
->is_directory
) {
72 return NT_STATUS_NOT_SUPPORTED
;
75 if (fsp
->fh
->fd
== -1) {
76 return NT_STATUS_NOT_SUPPORTED
;
79 if (is_ntfs_stream_smb_fname(fsp
->fsp_name
)) {
81 * We do not support durable handles
84 return NT_STATUS_NOT_SUPPORTED
;
87 if (is_fake_file(fsp
->fsp_name
)) {
89 * We do not support durable handles
92 return NT_STATUS_NOT_SUPPORTED
;
96 cookie
.allow_reconnect
= false;
97 cookie
.id
= fsp
->file_id
;
98 cookie
.servicepath
= conn
->connectpath
;
99 cookie
.base_name
= fsp
->fsp_name
->base_name
;
100 cookie
.initial_allocation_size
= fsp
->initial_allocation_size
;
101 cookie
.position_information
= fsp
->fh
->position_information
;
102 cookie
.update_write_time_triggered
= fsp
->update_write_time_triggered
;
103 cookie
.update_write_time_on_close
= fsp
->update_write_time_on_close
;
104 cookie
.write_time_forced
= fsp
->write_time_forced
;
105 cookie
.close_write_time
= fsp
->close_write_time
;
107 cookie
.stat_info
.st_ex_dev
= fsp
->fsp_name
->st
.st_ex_dev
;
108 cookie
.stat_info
.st_ex_ino
= fsp
->fsp_name
->st
.st_ex_ino
;
109 cookie
.stat_info
.st_ex_mode
= fsp
->fsp_name
->st
.st_ex_mode
;
110 cookie
.stat_info
.st_ex_nlink
= fsp
->fsp_name
->st
.st_ex_nlink
;
111 cookie
.stat_info
.st_ex_uid
= fsp
->fsp_name
->st
.st_ex_uid
;
112 cookie
.stat_info
.st_ex_gid
= fsp
->fsp_name
->st
.st_ex_gid
;
113 cookie
.stat_info
.st_ex_rdev
= fsp
->fsp_name
->st
.st_ex_rdev
;
114 cookie
.stat_info
.st_ex_size
= fsp
->fsp_name
->st
.st_ex_size
;
115 cookie
.stat_info
.st_ex_atime
= fsp
->fsp_name
->st
.st_ex_atime
;
116 cookie
.stat_info
.st_ex_mtime
= fsp
->fsp_name
->st
.st_ex_mtime
;
117 cookie
.stat_info
.st_ex_ctime
= fsp
->fsp_name
->st
.st_ex_ctime
;
118 cookie
.stat_info
.st_ex_btime
= fsp
->fsp_name
->st
.st_ex_btime
;
119 cookie
.stat_info
.st_ex_calculated_birthtime
= fsp
->fsp_name
->st
.st_ex_calculated_birthtime
;
120 cookie
.stat_info
.st_ex_blksize
= fsp
->fsp_name
->st
.st_ex_blksize
;
121 cookie
.stat_info
.st_ex_blocks
= fsp
->fsp_name
->st
.st_ex_blocks
;
122 cookie
.stat_info
.st_ex_flags
= fsp
->fsp_name
->st
.st_ex_flags
;
123 cookie
.stat_info
.st_ex_mask
= fsp
->fsp_name
->st
.st_ex_mask
;
125 ndr_err
= ndr_push_struct_blob(cookie_blob
, mem_ctx
, &cookie
,
126 (ndr_push_flags_fn_t
)ndr_push_vfs_default_durable_cookie
);
127 if (!NDR_ERR_CODE_IS_SUCCESS(ndr_err
)) {
128 NTSTATUS status
= ndr_map_error2ntstatus(ndr_err
);
135 NTSTATUS
vfs_default_durable_disconnect(struct files_struct
*fsp
,
136 const DATA_BLOB old_cookie
,
138 DATA_BLOB
*new_cookie
)
140 struct connection_struct
*conn
= fsp
->conn
;
142 enum ndr_err_code ndr_err
;
143 struct vfs_default_durable_cookie cookie
;
144 DATA_BLOB new_cookie_blob
= data_blob_null
;
145 struct share_mode_lock
*lck
;
148 *new_cookie
= data_blob_null
;
152 ndr_err
= ndr_pull_struct_blob(&old_cookie
, talloc_tos(), &cookie
,
153 (ndr_pull_flags_fn_t
)ndr_pull_vfs_default_durable_cookie
);
154 if (!NDR_ERR_CODE_IS_SUCCESS(ndr_err
)) {
155 status
= ndr_map_error2ntstatus(ndr_err
);
159 if (strcmp(cookie
.magic
, VFS_DEFAULT_DURABLE_COOKIE_MAGIC
) != 0) {
160 return NT_STATUS_INVALID_PARAMETER
;
163 if (cookie
.version
!= VFS_DEFAULT_DURABLE_COOKIE_VERSION
) {
164 return NT_STATUS_INVALID_PARAMETER
;
167 if (!file_id_equal(&fsp
->file_id
, &cookie
.id
)) {
168 return NT_STATUS_INVALID_PARAMETER
;
171 if ((fsp_lease_type(fsp
) & SMB2_LEASE_HANDLE
) == 0) {
172 return NT_STATUS_NOT_SUPPORTED
;
176 * For now let it be simple and do not keep
177 * delete on close files durable open
179 if (fsp
->initial_delete_on_close
) {
180 return NT_STATUS_NOT_SUPPORTED
;
182 if (fsp
->delete_on_close
) {
183 return NT_STATUS_NOT_SUPPORTED
;
186 if (!VALID_STAT(fsp
->fsp_name
->st
)) {
187 return NT_STATUS_NOT_SUPPORTED
;
190 if (!S_ISREG(fsp
->fsp_name
->st
.st_ex_mode
)) {
191 return NT_STATUS_NOT_SUPPORTED
;
194 /* Ensure any pending write time updates are done. */
195 if (fsp
->update_write_time_event
) {
196 update_write_time_handler(fsp
->conn
->sconn
->ev_ctx
,
197 fsp
->update_write_time_event
,
203 * The above checks are done in mark_share_mode_disconnected() too
204 * but we want to avoid getting the lock if possible
206 lck
= get_existing_share_mode_lock(talloc_tos(), fsp
->file_id
);
208 struct smb_file_time ft
;
212 if (fsp
->write_time_forced
) {
213 ft
.mtime
= lck
->data
->changed_write_time
;
214 } else if (fsp
->update_write_time_on_close
) {
215 if (null_timespec(fsp
->close_write_time
)) {
216 ft
.mtime
= timespec_current();
218 ft
.mtime
= fsp
->close_write_time
;
222 if (!null_timespec(ft
.mtime
)) {
223 round_timespec(conn
->ts_res
, &ft
.mtime
);
224 file_ntimes(conn
, fsp
->fsp_name
, &ft
);
227 ok
= mark_share_mode_disconnected(lck
, fsp
);
233 ok
= brl_mark_disconnected(fsp
);
239 return NT_STATUS_NOT_SUPPORTED
;
243 status
= vfs_stat_fsp(fsp
);
244 if (!NT_STATUS_IS_OK(status
)) {
249 cookie
.allow_reconnect
= true;
250 cookie
.id
= fsp
->file_id
;
251 cookie
.servicepath
= conn
->connectpath
;
252 cookie
.base_name
= fsp
->fsp_name
->base_name
;
253 cookie
.initial_allocation_size
= fsp
->initial_allocation_size
;
254 cookie
.position_information
= fsp
->fh
->position_information
;
255 cookie
.update_write_time_triggered
= fsp
->update_write_time_triggered
;
256 cookie
.update_write_time_on_close
= fsp
->update_write_time_on_close
;
257 cookie
.write_time_forced
= fsp
->write_time_forced
;
258 cookie
.close_write_time
= fsp
->close_write_time
;
260 cookie
.stat_info
.st_ex_dev
= fsp
->fsp_name
->st
.st_ex_dev
;
261 cookie
.stat_info
.st_ex_ino
= fsp
->fsp_name
->st
.st_ex_ino
;
262 cookie
.stat_info
.st_ex_mode
= fsp
->fsp_name
->st
.st_ex_mode
;
263 cookie
.stat_info
.st_ex_nlink
= fsp
->fsp_name
->st
.st_ex_nlink
;
264 cookie
.stat_info
.st_ex_uid
= fsp
->fsp_name
->st
.st_ex_uid
;
265 cookie
.stat_info
.st_ex_gid
= fsp
->fsp_name
->st
.st_ex_gid
;
266 cookie
.stat_info
.st_ex_rdev
= fsp
->fsp_name
->st
.st_ex_rdev
;
267 cookie
.stat_info
.st_ex_size
= fsp
->fsp_name
->st
.st_ex_size
;
268 cookie
.stat_info
.st_ex_atime
= fsp
->fsp_name
->st
.st_ex_atime
;
269 cookie
.stat_info
.st_ex_mtime
= fsp
->fsp_name
->st
.st_ex_mtime
;
270 cookie
.stat_info
.st_ex_ctime
= fsp
->fsp_name
->st
.st_ex_ctime
;
271 cookie
.stat_info
.st_ex_btime
= fsp
->fsp_name
->st
.st_ex_btime
;
272 cookie
.stat_info
.st_ex_calculated_birthtime
= fsp
->fsp_name
->st
.st_ex_calculated_birthtime
;
273 cookie
.stat_info
.st_ex_blksize
= fsp
->fsp_name
->st
.st_ex_blksize
;
274 cookie
.stat_info
.st_ex_blocks
= fsp
->fsp_name
->st
.st_ex_blocks
;
275 cookie
.stat_info
.st_ex_flags
= fsp
->fsp_name
->st
.st_ex_flags
;
276 cookie
.stat_info
.st_ex_mask
= fsp
->fsp_name
->st
.st_ex_mask
;
278 ndr_err
= ndr_push_struct_blob(&new_cookie_blob
, mem_ctx
, &cookie
,
279 (ndr_push_flags_fn_t
)ndr_push_vfs_default_durable_cookie
);
280 if (!NDR_ERR_CODE_IS_SUCCESS(ndr_err
)) {
281 status
= ndr_map_error2ntstatus(ndr_err
);
285 status
= fd_close(fsp
);
286 if (!NT_STATUS_IS_OK(status
)) {
287 data_blob_free(&new_cookie_blob
);
291 *new_cookie
= new_cookie_blob
;
297 * Check whether a cookie-stored struct info is the same
298 * as a given SMB_STRUCT_STAT, as coming with the fsp.
300 static bool vfs_default_durable_reconnect_check_stat(
301 struct vfs_default_durable_stat
*cookie_st
,
302 SMB_STRUCT_STAT
*fsp_st
,
307 if (cookie_st
->st_ex_dev
!= fsp_st
->st_ex_dev
) {
308 DEBUG(1, ("vfs_default_durable_reconnect (%s): "
309 "stat_ex.%s differs: "
310 "cookie:%llu != stat:%llu, "
311 "denying durable reconnect\n",
314 (unsigned long long)cookie_st
->st_ex_dev
,
315 (unsigned long long)fsp_st
->st_ex_dev
));
319 if (cookie_st
->st_ex_ino
!= fsp_st
->st_ex_ino
) {
320 DEBUG(1, ("vfs_default_durable_reconnect (%s): "
321 "stat_ex.%s differs: "
322 "cookie:%llu != stat:%llu, "
323 "denying durable reconnect\n",
326 (unsigned long long)cookie_st
->st_ex_ino
,
327 (unsigned long long)fsp_st
->st_ex_ino
));
331 if (cookie_st
->st_ex_mode
!= fsp_st
->st_ex_mode
) {
332 DEBUG(1, ("vfs_default_durable_reconnect (%s): "
333 "stat_ex.%s differs: "
334 "cookie:%llu != stat:%llu, "
335 "denying durable reconnect\n",
338 (unsigned long long)cookie_st
->st_ex_mode
,
339 (unsigned long long)fsp_st
->st_ex_mode
));
343 if (cookie_st
->st_ex_nlink
!= fsp_st
->st_ex_nlink
) {
344 DEBUG(1, ("vfs_default_durable_reconnect (%s): "
345 "stat_ex.%s differs: "
346 "cookie:%llu != stat:%llu, "
347 "denying durable reconnect\n",
350 (unsigned long long)cookie_st
->st_ex_nlink
,
351 (unsigned long long)fsp_st
->st_ex_nlink
));
355 if (cookie_st
->st_ex_uid
!= fsp_st
->st_ex_uid
) {
356 DEBUG(1, ("vfs_default_durable_reconnect (%s): "
357 "stat_ex.%s differs: "
358 "cookie:%llu != stat:%llu, "
359 "denying durable reconnect\n",
362 (unsigned long long)cookie_st
->st_ex_uid
,
363 (unsigned long long)fsp_st
->st_ex_uid
));
367 if (cookie_st
->st_ex_gid
!= fsp_st
->st_ex_gid
) {
368 DEBUG(1, ("vfs_default_durable_reconnect (%s): "
369 "stat_ex.%s differs: "
370 "cookie:%llu != stat:%llu, "
371 "denying durable reconnect\n",
374 (unsigned long long)cookie_st
->st_ex_gid
,
375 (unsigned long long)fsp_st
->st_ex_gid
));
379 if (cookie_st
->st_ex_rdev
!= fsp_st
->st_ex_rdev
) {
380 DEBUG(1, ("vfs_default_durable_reconnect (%s): "
381 "stat_ex.%s differs: "
382 "cookie:%llu != stat:%llu, "
383 "denying durable reconnect\n",
386 (unsigned long long)cookie_st
->st_ex_rdev
,
387 (unsigned long long)fsp_st
->st_ex_rdev
));
391 if (cookie_st
->st_ex_size
!= fsp_st
->st_ex_size
) {
392 DEBUG(1, ("vfs_default_durable_reconnect (%s): "
393 "stat_ex.%s differs: "
394 "cookie:%llu != stat:%llu, "
395 "denying durable reconnect\n",
398 (unsigned long long)cookie_st
->st_ex_size
,
399 (unsigned long long)fsp_st
->st_ex_size
));
403 ret
= timespec_compare(&cookie_st
->st_ex_atime
,
404 &fsp_st
->st_ex_atime
);
406 struct timeval tc
, ts
;
407 tc
= convert_timespec_to_timeval(cookie_st
->st_ex_atime
);
408 ts
= convert_timespec_to_timeval(fsp_st
->st_ex_atime
);
410 DEBUG(1, ("vfs_default_durable_reconnect (%s): "
411 "stat_ex.%s differs: "
412 "cookie:'%s' != stat:'%s', "
413 "denying durable reconnect\n",
416 timeval_string(talloc_tos(), &tc
, true),
417 timeval_string(talloc_tos(), &ts
, true)));
421 ret
= timespec_compare(&cookie_st
->st_ex_mtime
,
422 &fsp_st
->st_ex_mtime
);
424 struct timeval tc
, ts
;
425 tc
= convert_timespec_to_timeval(cookie_st
->st_ex_mtime
);
426 ts
= convert_timespec_to_timeval(fsp_st
->st_ex_mtime
);
428 DEBUG(1, ("vfs_default_durable_reconnect (%s): "
429 "stat_ex.%s differs: "
430 "cookie:'%s' != stat:'%s', "
431 "denying durable reconnect\n",
434 timeval_string(talloc_tos(), &tc
, true),
435 timeval_string(talloc_tos(), &ts
, true)));
439 ret
= timespec_compare(&cookie_st
->st_ex_ctime
,
440 &fsp_st
->st_ex_ctime
);
442 struct timeval tc
, ts
;
443 tc
= convert_timespec_to_timeval(cookie_st
->st_ex_ctime
);
444 ts
= convert_timespec_to_timeval(fsp_st
->st_ex_ctime
);
446 DEBUG(1, ("vfs_default_durable_reconnect (%s): "
447 "stat_ex.%s differs: "
448 "cookie:'%s' != stat:'%s', "
449 "denying durable reconnect\n",
452 timeval_string(talloc_tos(), &tc
, true),
453 timeval_string(talloc_tos(), &ts
, true)));
457 ret
= timespec_compare(&cookie_st
->st_ex_btime
,
458 &fsp_st
->st_ex_btime
);
460 struct timeval tc
, ts
;
461 tc
= convert_timespec_to_timeval(cookie_st
->st_ex_btime
);
462 ts
= convert_timespec_to_timeval(fsp_st
->st_ex_btime
);
464 DEBUG(1, ("vfs_default_durable_reconnect (%s): "
465 "stat_ex.%s differs: "
466 "cookie:'%s' != stat:'%s', "
467 "denying durable reconnect\n",
470 timeval_string(talloc_tos(), &tc
, true),
471 timeval_string(talloc_tos(), &ts
, true)));
475 if (cookie_st
->st_ex_calculated_birthtime
!=
476 fsp_st
->st_ex_calculated_birthtime
)
478 DEBUG(1, ("vfs_default_durable_reconnect (%s): "
479 "stat_ex.%s differs: "
480 "cookie:%llu != stat:%llu, "
481 "denying durable reconnect\n",
483 "st_ex_calculated_birthtime",
484 (unsigned long long)cookie_st
->st_ex_calculated_birthtime
,
485 (unsigned long long)fsp_st
->st_ex_calculated_birthtime
));
489 if (cookie_st
->st_ex_blksize
!= fsp_st
->st_ex_blksize
) {
490 DEBUG(1, ("vfs_default_durable_reconnect (%s): "
491 "stat_ex.%s differs: "
492 "cookie:%llu != stat:%llu, "
493 "denying durable reconnect\n",
496 (unsigned long long)cookie_st
->st_ex_blksize
,
497 (unsigned long long)fsp_st
->st_ex_blksize
));
501 if (cookie_st
->st_ex_blocks
!= fsp_st
->st_ex_blocks
) {
502 DEBUG(1, ("vfs_default_durable_reconnect (%s): "
503 "stat_ex.%s differs: "
504 "cookie:%llu != stat:%llu, "
505 "denying durable reconnect\n",
508 (unsigned long long)cookie_st
->st_ex_blocks
,
509 (unsigned long long)fsp_st
->st_ex_blocks
));
513 if (cookie_st
->st_ex_flags
!= fsp_st
->st_ex_flags
) {
514 DEBUG(1, ("vfs_default_durable_reconnect (%s): "
515 "stat_ex.%s differs: "
516 "cookie:%llu != stat:%llu, "
517 "denying durable reconnect\n",
520 (unsigned long long)cookie_st
->st_ex_flags
,
521 (unsigned long long)fsp_st
->st_ex_flags
));
525 if (cookie_st
->st_ex_mask
!= fsp_st
->st_ex_mask
) {
526 DEBUG(1, ("vfs_default_durable_reconnect (%s): "
527 "stat_ex.%s differs: "
528 "cookie:%llu != stat:%llu, "
529 "denying durable reconnect\n",
532 (unsigned long long)cookie_st
->st_ex_mask
,
533 (unsigned long long)fsp_st
->st_ex_mask
));
540 NTSTATUS
vfs_default_durable_reconnect(struct connection_struct
*conn
,
541 struct smb_request
*smb1req
,
542 struct smbXsrv_open
*op
,
543 const DATA_BLOB old_cookie
,
545 files_struct
**result
,
546 DATA_BLOB
*new_cookie
)
548 struct share_mode_lock
*lck
;
549 struct share_mode_entry
*e
;
550 struct files_struct
*fsp
= NULL
;
555 struct file_id file_id
;
556 struct smb_filename
*smb_fname
= NULL
;
557 enum ndr_err_code ndr_err
;
558 struct vfs_default_durable_cookie cookie
;
559 DATA_BLOB new_cookie_blob
= data_blob_null
;
562 *new_cookie
= data_blob_null
;
564 if (!lp_durable_handles(SNUM(conn
))) {
565 return NT_STATUS_NOT_SUPPORTED
;
569 * the checks for kernel oplocks
570 * and similar things are done
571 * in the vfs_default_durable_cookie()
577 ndr_err
= ndr_pull_struct_blob(&old_cookie
, talloc_tos(), &cookie
,
578 (ndr_pull_flags_fn_t
)ndr_pull_vfs_default_durable_cookie
);
579 if (!NDR_ERR_CODE_IS_SUCCESS(ndr_err
)) {
580 status
= ndr_map_error2ntstatus(ndr_err
);
584 if (strcmp(cookie
.magic
, VFS_DEFAULT_DURABLE_COOKIE_MAGIC
) != 0) {
585 return NT_STATUS_INVALID_PARAMETER
;
588 if (cookie
.version
!= VFS_DEFAULT_DURABLE_COOKIE_VERSION
) {
589 return NT_STATUS_INVALID_PARAMETER
;
592 if (!cookie
.allow_reconnect
) {
593 return NT_STATUS_OBJECT_NAME_NOT_FOUND
;
596 if (strcmp(cookie
.servicepath
, conn
->connectpath
) != 0) {
597 return NT_STATUS_OBJECT_NAME_NOT_FOUND
;
600 /* Create an smb_filename with stream_name == NULL. */
601 smb_fname
= synthetic_smb_fname(talloc_tos(), cookie
.base_name
,
603 if (smb_fname
== NULL
) {
604 return NT_STATUS_NO_MEMORY
;
607 ret
= SMB_VFS_LSTAT(conn
, smb_fname
);
609 status
= map_nt_error_from_unix_common(errno
);
610 DEBUG(1, ("Unable to lstat stream: %s => %s\n",
611 smb_fname_str_dbg(smb_fname
),
616 if (!S_ISREG(smb_fname
->st
.st_ex_mode
)) {
617 return NT_STATUS_OBJECT_NAME_NOT_FOUND
;
620 file_id
= vfs_file_id_from_sbuf(conn
, &smb_fname
->st
);
621 if (!file_id_equal(&cookie
.id
, &file_id
)) {
622 return NT_STATUS_OBJECT_NAME_NOT_FOUND
;
626 * 1. check entry in locking.tdb
629 lck
= get_existing_share_mode_lock(mem_ctx
, file_id
);
631 DEBUG(5, ("vfs_default_durable_reconnect: share-mode lock "
632 "not obtained from db\n"));
633 return NT_STATUS_OBJECT_NAME_NOT_FOUND
;
636 if (lck
->data
->num_share_modes
== 0) {
637 DEBUG(1, ("vfs_default_durable_reconnect: Error: no share-mode "
638 "entry in existing share mode lock\n"));
640 return NT_STATUS_INTERNAL_DB_ERROR
;
643 if (lck
->data
->num_share_modes
> 1) {
645 * It can't be durable if there is more than one handle
648 DEBUG(5, ("vfs_default_durable_reconnect: more than one "
649 "share-mode entry - can not be durable\n"));
651 return NT_STATUS_OBJECT_NAME_NOT_FOUND
;
654 e
= &lck
->data
->share_modes
[0];
656 if (!server_id_is_disconnected(&e
->pid
)) {
657 DEBUG(5, ("vfs_default_durable_reconnect: denying durable "
658 "reconnect for handle that was not marked "
659 "disconnected (e.g. smbd or cluster node died)\n"));
661 return NT_STATUS_OBJECT_NAME_NOT_FOUND
;
664 if (e
->share_file_id
!= op
->global
->open_persistent_id
) {
665 DEBUG(5, ("vfs_default_durable_reconnect: denying durable "
666 "share_file_id changed %llu != %llu"
667 "(e.g. another client had opened the file)\n",
668 (unsigned long long)e
->share_file_id
,
669 (unsigned long long)op
->global
->open_persistent_id
));
671 return NT_STATUS_OBJECT_NAME_NOT_FOUND
;
674 if ((e
->access_mask
& (FILE_WRITE_DATA
|FILE_APPEND_DATA
)) &&
677 DEBUG(5, ("vfs_default_durable_reconnect: denying durable "
678 "share[%s] is not writeable anymore\n",
679 lp_servicename(talloc_tos(), SNUM(conn
))));
681 return NT_STATUS_OBJECT_NAME_NOT_FOUND
;
685 * 2. proceed with opening file
688 status
= fsp_new(conn
, conn
, &fsp
);
689 if (!NT_STATUS_IS_OK(status
)) {
690 DEBUG(0, ("vfs_default_durable_reconnect: failed to create "
691 "new fsp: %s\n", nt_errstr(status
)));
696 fsp
->fh
->private_options
= e
->private_options
;
697 fsp
->fh
->gen_id
= smbXsrv_open_hash(op
);
698 fsp
->file_id
= file_id
;
699 fsp
->file_pid
= smb1req
->smbpid
;
700 fsp
->vuid
= smb1req
->vuid
;
701 fsp
->open_time
= e
->time
;
702 fsp
->access_mask
= e
->access_mask
;
703 fsp
->share_access
= e
->share_access
;
704 fsp
->can_read
= ((fsp
->access_mask
& (FILE_READ_DATA
)) != 0);
705 fsp
->can_write
= ((fsp
->access_mask
& (FILE_WRITE_DATA
|FILE_APPEND_DATA
)) != 0);
706 fsp
->fnum
= op
->local_id
;
710 * Do we need to store the modified flag in the DB?
712 fsp
->modified
= false;
714 * no durables for directories
716 fsp
->is_directory
= false;
718 * For normal files, can_lock == !is_directory
720 fsp
->can_lock
= true;
722 * We do not support aio write behind for smb2
724 fsp
->aio_write_behind
= false;
725 fsp
->oplock_type
= e
->op_type
;
727 if (fsp
->oplock_type
== LEASE_OPLOCK
) {
728 struct share_mode_lease
*l
= &lck
->data
->leases
[e
->lease_idx
];
729 struct smb2_lease_key key
;
731 key
.data
[0] = l
->lease_key
.data
[0];
732 key
.data
[1] = l
->lease_key
.data
[1];
734 fsp
->lease
= find_fsp_lease(fsp
, &key
, l
);
735 if (fsp
->lease
== NULL
) {
738 return NT_STATUS_NO_MEMORY
;
742 * Ensure the existing client guid matches the
743 * stored one in the share_mode_lease.
745 if (!GUID_equal(fsp_client_guid(fsp
),
749 return NT_STATUS_OBJECT_NAME_NOT_FOUND
;
753 fsp
->initial_allocation_size
= cookie
.initial_allocation_size
;
754 fsp
->fh
->position_information
= cookie
.position_information
;
755 fsp
->update_write_time_triggered
= cookie
.update_write_time_triggered
;
756 fsp
->update_write_time_on_close
= cookie
.update_write_time_on_close
;
757 fsp
->write_time_forced
= cookie
.write_time_forced
;
758 fsp
->close_write_time
= cookie
.close_write_time
;
760 status
= fsp_set_smb_fname(fsp
, smb_fname
);
761 if (!NT_STATUS_IS_OK(status
)) {
764 DEBUG(0, ("vfs_default_durable_reconnect: "
765 "fsp_set_smb_fname failed: %s\n",
773 e
->pid
= messaging_server_id(conn
->sconn
->msg_ctx
);
774 e
->op_mid
= smb1req
->mid
;
775 e
->share_file_id
= fsp
->fh
->gen_id
;
777 ok
= brl_reconnect_disconnected(fsp
);
779 status
= NT_STATUS_INTERNAL_ERROR
;
780 DEBUG(1, ("vfs_default_durable_reconnect: "
781 "failed to reopen brlocks: %s\n",
790 * TODO: properly calculate open flags
792 if (fsp
->can_write
&& fsp
->can_read
) {
794 } else if (fsp
->can_write
) {
796 } else if (fsp
->can_read
) {
800 status
= fd_open(conn
, fsp
, flags
, 0 /* mode */);
801 if (!NT_STATUS_IS_OK(status
)) {
803 DEBUG(1, ("vfs_default_durable_reconnect: failed to open "
804 "file: %s\n", nt_errstr(status
)));
811 * We now check the stat info stored in the cookie against
812 * the current stat data from the file we just opened.
813 * If any detail differs, we deny the durable reconnect,
814 * because in that case it is very likely that someone
815 * opened the file while the handle was disconnected,
816 * which has to be interpreted as an oplock break.
819 ret
= SMB_VFS_FSTAT(fsp
, &fsp
->fsp_name
->st
);
821 status
= map_nt_error_from_unix_common(errno
);
822 DEBUG(1, ("Unable to fstat stream: %s => %s\n",
823 smb_fname_str_dbg(smb_fname
),
825 ret
= SMB_VFS_CLOSE(fsp
);
827 DEBUG(0, ("vfs_default_durable_reconnect: "
828 "SMB_VFS_CLOSE failed (%s) - leaking file "
829 "descriptor\n", strerror(errno
)));
837 if (!S_ISREG(fsp
->fsp_name
->st
.st_ex_mode
)) {
838 ret
= SMB_VFS_CLOSE(fsp
);
840 DEBUG(0, ("vfs_default_durable_reconnect: "
841 "SMB_VFS_CLOSE failed (%s) - leaking file "
842 "descriptor\n", strerror(errno
)));
847 return NT_STATUS_OBJECT_NAME_NOT_FOUND
;
850 file_id
= vfs_file_id_from_sbuf(conn
, &fsp
->fsp_name
->st
);
851 if (!file_id_equal(&cookie
.id
, &file_id
)) {
852 ret
= SMB_VFS_CLOSE(fsp
);
854 DEBUG(0, ("vfs_default_durable_reconnect: "
855 "SMB_VFS_CLOSE failed (%s) - leaking file "
856 "descriptor\n", strerror(errno
)));
861 return NT_STATUS_OBJECT_NAME_NOT_FOUND
;
864 ok
= vfs_default_durable_reconnect_check_stat(&cookie
.stat_info
,
868 ret
= SMB_VFS_CLOSE(fsp
);
870 DEBUG(0, ("vfs_default_durable_reconnect: "
871 "SMB_VFS_CLOSE failed (%s) - leaking file "
872 "descriptor\n", strerror(errno
)));
877 return NT_STATUS_OBJECT_NAME_NOT_FOUND
;
880 status
= set_file_oplock(fsp
);
881 if (!NT_STATUS_IS_OK(status
)) {
882 DEBUG(1, ("vfs_default_durable_reconnect failed to set oplock "
883 "after opening file: %s\n", nt_errstr(status
)));
884 ret
= SMB_VFS_CLOSE(fsp
);
886 DEBUG(0, ("vfs_default_durable_reconnect: "
887 "SMB_VFS_CLOSE failed (%s) - leaking file "
888 "descriptor\n", strerror(errno
)));
896 status
= vfs_default_durable_cookie(fsp
, mem_ctx
, &new_cookie_blob
);
897 if (!NT_STATUS_IS_OK(status
)) {
899 DEBUG(1, ("vfs_default_durable_reconnect: "
900 "vfs_default_durable_cookie - %s\n",
907 smb1req
->chain_fsp
= fsp
;
908 smb1req
->smb2req
->compat_chain_fsp
= fsp
;
910 DEBUG(10, ("vfs_default_durable_reconnect: opened file '%s'\n",
914 * release the sharemode lock: this writes the changes
916 lck
->data
->modified
= true;
920 *new_cookie
= new_cookie_blob
;