s3-printing: remove pcap_cache_loaded asserts
[Samba.git] / source3 / smbd / process.c
blob4b2e6eb79c26bae105f3940aa637088c0e468460
1 /*
2 Unix SMB/CIFS implementation.
3 process incoming packets - main loop
4 Copyright (C) Andrew Tridgell 1992-1998
5 Copyright (C) Volker Lendecke 2005-2007
7 This program is free software; you can redistribute it and/or modify
8 it under the terms of the GNU General Public License as published by
9 the Free Software Foundation; either version 3 of the License, or
10 (at your option) any later version.
12 This program is distributed in the hope that it will be useful,
13 but WITHOUT ANY WARRANTY; without even the implied warranty of
14 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
15 GNU General Public License for more details.
17 You should have received a copy of the GNU General Public License
18 along with this program. If not, see <http://www.gnu.org/licenses/>.
21 #include "includes.h"
22 #include "smbd/globals.h"
24 extern bool global_machine_password_needs_changing;
26 static void construct_reply_common(struct smb_request *req, const char *inbuf,
27 char *outbuf);
29 /* Accessor function for smb_read_error for smbd functions. */
31 /****************************************************************************
32 Send an smb to a fd.
33 ****************************************************************************/
35 bool srv_send_smb(int fd, char *buffer, bool do_encrypt,
36 struct smb_perfcount_data *pcd)
38 size_t len = 0;
39 size_t nwritten=0;
40 ssize_t ret;
41 char *buf_out = buffer;
43 /* Sign the outgoing packet if required. */
44 srv_calculate_sign_mac(buf_out);
46 if (do_encrypt) {
47 NTSTATUS status = srv_encrypt_buffer(buffer, &buf_out);
48 if (!NT_STATUS_IS_OK(status)) {
49 DEBUG(0, ("send_smb: SMB encryption failed "
50 "on outgoing packet! Error %s\n",
51 nt_errstr(status) ));
52 goto out;
56 len = smb_len(buf_out) + 4;
58 while (nwritten < len) {
59 ret = write_data(fd,buf_out+nwritten,len - nwritten);
60 if (ret <= 0) {
61 DEBUG(0,("Error writing %d bytes to client. %d. (%s)\n",
62 (int)len,(int)ret, strerror(errno) ));
63 srv_free_enc_buffer(buf_out);
64 goto out;
66 nwritten += ret;
69 SMB_PERFCOUNT_SET_MSGLEN_OUT(pcd, len);
70 srv_free_enc_buffer(buf_out);
71 out:
72 SMB_PERFCOUNT_END(pcd);
73 return true;
76 /*******************************************************************
77 Setup the word count and byte count for a smb message.
78 ********************************************************************/
80 int srv_set_message(char *buf,
81 int num_words,
82 int num_bytes,
83 bool zero)
85 if (zero && (num_words || num_bytes)) {
86 memset(buf + smb_size,'\0',num_words*2 + num_bytes);
88 SCVAL(buf,smb_wct,num_words);
89 SSVAL(buf,smb_vwv + num_words*SIZEOFWORD,num_bytes);
90 smb_setlen(buf,(smb_size + num_words*2 + num_bytes - 4));
91 return (smb_size + num_words*2 + num_bytes);
94 static bool valid_smb_header(const uint8_t *inbuf)
96 if (is_encrypted_packet(inbuf)) {
97 return true;
100 * This used to be (strncmp(smb_base(inbuf),"\377SMB",4) == 0)
101 * but it just looks weird to call strncmp for this one.
103 return (IVAL(smb_base(inbuf), 0) == 0x424D53FF);
106 /* Socket functions for smbd packet processing. */
108 static bool valid_packet_size(size_t len)
111 * A WRITEX with CAP_LARGE_WRITEX can be 64k worth of data plus 65 bytes
112 * of header. Don't print the error if this fits.... JRA.
115 if (len > (BUFFER_SIZE + LARGE_WRITEX_HDR_SIZE)) {
116 DEBUG(0,("Invalid packet length! (%lu bytes).\n",
117 (unsigned long)len));
118 return false;
120 return true;
123 static NTSTATUS read_packet_remainder(int fd, char *buffer,
124 unsigned int timeout, ssize_t len)
126 if (len <= 0) {
127 return NT_STATUS_OK;
130 return read_fd_with_timeout(fd, buffer, len, len, timeout, NULL);
133 /****************************************************************************
134 Attempt a zerocopy writeX read. We know here that len > smb_size-4
135 ****************************************************************************/
138 * Unfortunately, earlier versions of smbclient/libsmbclient
139 * don't send this "standard" writeX header. I've fixed this
140 * for 3.2 but we'll use the old method with earlier versions.
141 * Windows and CIFSFS at least use this standard size. Not
142 * sure about MacOSX.
145 #define STANDARD_WRITE_AND_X_HEADER_SIZE (smb_size - 4 + /* basic header */ \
146 (2*14) + /* word count (including bcc) */ \
147 1 /* pad byte */)
149 static NTSTATUS receive_smb_raw_talloc_partial_read(TALLOC_CTX *mem_ctx,
150 const char lenbuf[4],
151 int fd, char **buffer,
152 unsigned int timeout,
153 size_t *p_unread,
154 size_t *len_ret)
156 /* Size of a WRITEX call (+4 byte len). */
157 char writeX_header[4 + STANDARD_WRITE_AND_X_HEADER_SIZE];
158 ssize_t len = smb_len_large(lenbuf); /* Could be a UNIX large writeX. */
159 ssize_t toread;
160 NTSTATUS status;
162 memcpy(writeX_header, lenbuf, 4);
164 status = read_fd_with_timeout(
165 fd, writeX_header + 4,
166 STANDARD_WRITE_AND_X_HEADER_SIZE,
167 STANDARD_WRITE_AND_X_HEADER_SIZE,
168 timeout, NULL);
170 if (!NT_STATUS_IS_OK(status)) {
171 return status;
175 * Ok - now try and see if this is a possible
176 * valid writeX call.
179 if (is_valid_writeX_buffer((uint8_t *)writeX_header)) {
181 * If the data offset is beyond what
182 * we've read, drain the extra bytes.
184 uint16_t doff = SVAL(writeX_header,smb_vwv11);
185 ssize_t newlen;
187 if (doff > STANDARD_WRITE_AND_X_HEADER_SIZE) {
188 size_t drain = doff - STANDARD_WRITE_AND_X_HEADER_SIZE;
189 if (drain_socket(smbd_server_fd(), drain) != drain) {
190 smb_panic("receive_smb_raw_talloc_partial_read:"
191 " failed to drain pending bytes");
193 } else {
194 doff = STANDARD_WRITE_AND_X_HEADER_SIZE;
197 /* Spoof down the length and null out the bcc. */
198 set_message_bcc(writeX_header, 0);
199 newlen = smb_len(writeX_header);
201 /* Copy the header we've written. */
203 *buffer = (char *)TALLOC_MEMDUP(mem_ctx,
204 writeX_header,
205 sizeof(writeX_header));
207 if (*buffer == NULL) {
208 DEBUG(0, ("Could not allocate inbuf of length %d\n",
209 (int)sizeof(writeX_header)));
210 return NT_STATUS_NO_MEMORY;
213 /* Work out the remaining bytes. */
214 *p_unread = len - STANDARD_WRITE_AND_X_HEADER_SIZE;
215 *len_ret = newlen + 4;
216 return NT_STATUS_OK;
219 if (!valid_packet_size(len)) {
220 return NT_STATUS_INVALID_PARAMETER;
224 * Not a valid writeX call. Just do the standard
225 * talloc and return.
228 *buffer = TALLOC_ARRAY(mem_ctx, char, len+4);
230 if (*buffer == NULL) {
231 DEBUG(0, ("Could not allocate inbuf of length %d\n",
232 (int)len+4));
233 return NT_STATUS_NO_MEMORY;
236 /* Copy in what we already read. */
237 memcpy(*buffer,
238 writeX_header,
239 4 + STANDARD_WRITE_AND_X_HEADER_SIZE);
240 toread = len - STANDARD_WRITE_AND_X_HEADER_SIZE;
242 if(toread > 0) {
243 status = read_packet_remainder(
244 fd, (*buffer) + 4 + STANDARD_WRITE_AND_X_HEADER_SIZE,
245 timeout, toread);
247 if (!NT_STATUS_IS_OK(status)) {
248 DEBUG(10, ("receive_smb_raw_talloc_partial_read: %s\n",
249 nt_errstr(status)));
250 return status;
254 *len_ret = len + 4;
255 return NT_STATUS_OK;
258 static NTSTATUS receive_smb_raw_talloc(TALLOC_CTX *mem_ctx, int fd,
259 char **buffer, unsigned int timeout,
260 size_t *p_unread, size_t *plen)
262 char lenbuf[4];
263 size_t len;
264 int min_recv_size = lp_min_receive_file_size();
265 NTSTATUS status;
267 *p_unread = 0;
269 status = read_smb_length_return_keepalive(fd, lenbuf, timeout, &len);
270 if (!NT_STATUS_IS_OK(status)) {
271 DEBUG(10, ("receive_smb_raw: %s\n", nt_errstr(status)));
272 return status;
275 if (CVAL(lenbuf,0) == 0 && min_recv_size &&
276 (smb_len_large(lenbuf) > /* Could be a UNIX large writeX. */
277 (min_recv_size + STANDARD_WRITE_AND_X_HEADER_SIZE)) &&
278 !srv_is_signing_active()) {
280 return receive_smb_raw_talloc_partial_read(
281 mem_ctx, lenbuf, fd, buffer, timeout, p_unread, plen);
284 if (!valid_packet_size(len)) {
285 return NT_STATUS_INVALID_PARAMETER;
289 * The +4 here can't wrap, we've checked the length above already.
292 *buffer = TALLOC_ARRAY(mem_ctx, char, len+4);
294 if (*buffer == NULL) {
295 DEBUG(0, ("Could not allocate inbuf of length %d\n",
296 (int)len+4));
297 return NT_STATUS_NO_MEMORY;
300 memcpy(*buffer, lenbuf, sizeof(lenbuf));
302 status = read_packet_remainder(fd, (*buffer)+4, timeout, len);
303 if (!NT_STATUS_IS_OK(status)) {
304 return status;
307 *plen = len + 4;
308 return NT_STATUS_OK;
311 static NTSTATUS receive_smb_talloc(TALLOC_CTX *mem_ctx, int fd,
312 char **buffer, unsigned int timeout,
313 size_t *p_unread, bool *p_encrypted,
314 size_t *p_len)
316 size_t len = 0;
317 NTSTATUS status;
319 *p_encrypted = false;
321 status = receive_smb_raw_talloc(mem_ctx, fd, buffer, timeout,
322 p_unread, &len);
323 if (!NT_STATUS_IS_OK(status)) {
324 return status;
327 if (is_encrypted_packet((uint8_t *)*buffer)) {
328 status = srv_decrypt_buffer(*buffer);
329 if (!NT_STATUS_IS_OK(status)) {
330 DEBUG(0, ("receive_smb_talloc: SMB decryption failed on "
331 "incoming packet! Error %s\n",
332 nt_errstr(status) ));
333 return status;
335 *p_encrypted = true;
338 /* Check the incoming SMB signature. */
339 if (!srv_check_sign_mac(*buffer, true)) {
340 DEBUG(0, ("receive_smb: SMB Signature verification failed on "
341 "incoming packet!\n"));
342 return NT_STATUS_INVALID_NETWORK_RESPONSE;
345 *p_len = len;
346 return NT_STATUS_OK;
350 * Initialize a struct smb_request from an inbuf
353 void init_smb_request(struct smb_request *req,
354 const uint8 *inbuf,
355 size_t unread_bytes,
356 bool encrypted)
358 size_t req_size = smb_len(inbuf) + 4;
359 /* Ensure we have at least smb_size bytes. */
360 if (req_size < smb_size) {
361 DEBUG(0,("init_smb_request: invalid request size %u\n",
362 (unsigned int)req_size ));
363 exit_server_cleanly("Invalid SMB request");
365 req->cmd = CVAL(inbuf, smb_com);
366 req->flags2 = SVAL(inbuf, smb_flg2);
367 req->smbpid = SVAL(inbuf, smb_pid);
368 req->mid = SVAL(inbuf, smb_mid);
369 req->vuid = SVAL(inbuf, smb_uid);
370 req->tid = SVAL(inbuf, smb_tid);
371 req->wct = CVAL(inbuf, smb_wct);
372 req->vwv = (uint16_t *)(inbuf+smb_vwv);
373 req->buflen = smb_buflen(inbuf);
374 req->buf = (const uint8_t *)smb_buf(inbuf);
375 req->unread_bytes = unread_bytes;
376 req->encrypted = encrypted;
377 req->conn = conn_find(req->tid);
378 req->chain_fsp = NULL;
379 req->chain_outbuf = NULL;
380 req->done = false;
381 smb_init_perfcount_data(&req->pcd);
383 /* Ensure we have at least wct words and 2 bytes of bcc. */
384 if (smb_size + req->wct*2 > req_size) {
385 DEBUG(0,("init_smb_request: invalid wct number %u (size %u)\n",
386 (unsigned int)req->wct,
387 (unsigned int)req_size));
388 exit_server_cleanly("Invalid SMB request");
390 /* Ensure bcc is correct. */
391 if (((uint8 *)smb_buf(inbuf)) + req->buflen > inbuf + req_size) {
392 DEBUG(0,("init_smb_request: invalid bcc number %u "
393 "(wct = %u, size %u)\n",
394 (unsigned int)req->buflen,
395 (unsigned int)req->wct,
396 (unsigned int)req_size));
397 exit_server_cleanly("Invalid SMB request");
400 req->outbuf = NULL;
403 static void process_smb(struct smbd_server_connection *conn,
404 uint8_t *inbuf, size_t nread, size_t unread_bytes,
405 bool encrypted, struct smb_perfcount_data *deferred_pcd);
407 static void smbd_deferred_open_timer(struct event_context *ev,
408 struct timed_event *te,
409 struct timeval _tval,
410 void *private_data)
412 struct pending_message_list *msg = talloc_get_type(private_data,
413 struct pending_message_list);
414 TALLOC_CTX *mem_ctx = talloc_tos();
415 uint16_t mid = SVAL(msg->buf.data,smb_mid);
416 uint8_t *inbuf;
418 inbuf = (uint8_t *)talloc_memdup(mem_ctx, msg->buf.data,
419 msg->buf.length);
420 if (inbuf == NULL) {
421 exit_server("smbd_deferred_open_timer: talloc failed\n");
422 return;
425 /* We leave this message on the queue so the open code can
426 know this is a retry. */
427 DEBUG(5,("smbd_deferred_open_timer: trigger mid %u.\n",
428 (unsigned int)mid));
430 /* Mark the message as processed so this is not
431 * re-processed in error. */
432 msg->processed = true;
434 process_smb(smbd_server_conn, inbuf,
435 msg->buf.length, 0,
436 msg->encrypted, &msg->pcd);
438 /* If it's still there and was processed, remove it. */
439 msg = get_open_deferred_message(mid);
440 if (msg && msg->processed) {
441 remove_deferred_open_smb_message(mid);
445 /****************************************************************************
446 Function to push a message onto the tail of a linked list of smb messages ready
447 for processing.
448 ****************************************************************************/
450 static bool push_queued_message(struct smb_request *req,
451 struct timeval request_time,
452 struct timeval end_time,
453 char *private_data, size_t private_len)
455 int msg_len = smb_len(req->inbuf) + 4;
456 struct pending_message_list *msg;
458 msg = TALLOC_ZERO_P(NULL, struct pending_message_list);
460 if(msg == NULL) {
461 DEBUG(0,("push_message: malloc fail (1)\n"));
462 return False;
465 msg->buf = data_blob_talloc(msg, req->inbuf, msg_len);
466 if(msg->buf.data == NULL) {
467 DEBUG(0,("push_message: malloc fail (2)\n"));
468 TALLOC_FREE(msg);
469 return False;
472 msg->request_time = request_time;
473 msg->encrypted = req->encrypted;
474 msg->processed = false;
475 SMB_PERFCOUNT_DEFER_OP(&req->pcd, &msg->pcd);
477 if (private_data) {
478 msg->private_data = data_blob_talloc(msg, private_data,
479 private_len);
480 if (msg->private_data.data == NULL) {
481 DEBUG(0,("push_message: malloc fail (3)\n"));
482 TALLOC_FREE(msg);
483 return False;
487 msg->te = event_add_timed(smbd_event_context(),
488 msg,
489 end_time,
490 smbd_deferred_open_timer,
491 msg);
492 if (!msg->te) {
493 DEBUG(0,("push_message: event_add_timed failed\n"));
494 TALLOC_FREE(msg);
495 return false;
498 DLIST_ADD_END(deferred_open_queue, msg, struct pending_message_list *);
500 DEBUG(10,("push_message: pushed message length %u on "
501 "deferred_open_queue\n", (unsigned int)msg_len));
503 return True;
506 /****************************************************************************
507 Function to delete a sharing violation open message by mid.
508 ****************************************************************************/
510 void remove_deferred_open_smb_message(uint16 mid)
512 struct pending_message_list *pml;
514 for (pml = deferred_open_queue; pml; pml = pml->next) {
515 if (mid == SVAL(pml->buf.data,smb_mid)) {
516 DEBUG(10,("remove_deferred_open_smb_message: "
517 "deleting mid %u len %u\n",
518 (unsigned int)mid,
519 (unsigned int)pml->buf.length ));
520 DLIST_REMOVE(deferred_open_queue, pml);
521 TALLOC_FREE(pml);
522 return;
527 /****************************************************************************
528 Move a sharing violation open retry message to the front of the list and
529 schedule it for immediate processing.
530 ****************************************************************************/
532 void schedule_deferred_open_smb_message(uint16 mid)
534 struct pending_message_list *pml;
535 int i = 0;
537 for (pml = deferred_open_queue; pml; pml = pml->next) {
538 uint16 msg_mid = SVAL(pml->buf.data,smb_mid);
540 DEBUG(10,("schedule_deferred_open_smb_message: [%d] msg_mid = %u\n", i++,
541 (unsigned int)msg_mid ));
543 if (mid == msg_mid) {
544 struct timed_event *te;
546 if (pml->processed) {
547 /* A processed message should not be
548 * rescheduled. */
549 DEBUG(0,("schedule_deferred_open_smb_message: LOGIC ERROR "
550 "message mid %u was already processed\n",
551 msg_mid ));
552 continue;
555 DEBUG(10,("schedule_deferred_open_smb_message: scheduling mid %u\n",
556 mid ));
558 te = event_add_timed(smbd_event_context(),
559 pml,
560 timeval_zero(),
561 smbd_deferred_open_timer,
562 pml);
563 if (!te) {
564 DEBUG(10,("schedule_deferred_open_smb_message: "
565 "event_add_timed() failed, skipping mid %u\n",
566 mid ));
569 TALLOC_FREE(pml->te);
570 pml->te = te;
571 DLIST_PROMOTE(deferred_open_queue, pml);
572 return;
576 DEBUG(10,("schedule_deferred_open_smb_message: failed to find message mid %u\n",
577 mid ));
580 /****************************************************************************
581 Return true if this mid is on the deferred queue and was not yet processed.
582 ****************************************************************************/
584 bool open_was_deferred(uint16 mid)
586 struct pending_message_list *pml;
588 for (pml = deferred_open_queue; pml; pml = pml->next) {
589 if (SVAL(pml->buf.data,smb_mid) == mid && !pml->processed) {
590 return True;
593 return False;
596 /****************************************************************************
597 Return the message queued by this mid.
598 ****************************************************************************/
600 struct pending_message_list *get_open_deferred_message(uint16 mid)
602 struct pending_message_list *pml;
604 for (pml = deferred_open_queue; pml; pml = pml->next) {
605 if (SVAL(pml->buf.data,smb_mid) == mid) {
606 return pml;
609 return NULL;
612 /****************************************************************************
613 Function to push a deferred open smb message onto a linked list of local smb
614 messages ready for processing.
615 ****************************************************************************/
617 bool push_deferred_smb_message(struct smb_request *req,
618 struct timeval request_time,
619 struct timeval timeout,
620 char *private_data, size_t priv_len)
622 struct timeval end_time;
624 if (req->unread_bytes) {
625 DEBUG(0,("push_deferred_smb_message: logic error ! "
626 "unread_bytes = %u\n",
627 (unsigned int)req->unread_bytes ));
628 smb_panic("push_deferred_smb_message: "
629 "logic error unread_bytes != 0" );
632 end_time = timeval_sum(&request_time, &timeout);
634 DEBUG(10,("push_deferred_open_smb_message: pushing message len %u mid %u "
635 "timeout time [%u.%06u]\n",
636 (unsigned int) smb_len(req->inbuf)+4, (unsigned int)req->mid,
637 (unsigned int)end_time.tv_sec,
638 (unsigned int)end_time.tv_usec));
640 return push_queued_message(req, request_time, end_time,
641 private_data, priv_len);
644 struct idle_event {
645 struct timed_event *te;
646 struct timeval interval;
647 char *name;
648 bool (*handler)(const struct timeval *now, void *private_data);
649 void *private_data;
652 static void smbd_idle_event_handler(struct event_context *ctx,
653 struct timed_event *te,
654 struct timeval now,
655 void *private_data)
657 struct idle_event *event =
658 talloc_get_type_abort(private_data, struct idle_event);
660 TALLOC_FREE(event->te);
662 DEBUG(10,("smbd_idle_event_handler: %s %p called\n",
663 event->name, event->te));
665 if (!event->handler(&now, event->private_data)) {
666 DEBUG(10,("smbd_idle_event_handler: %s %p stopped\n",
667 event->name, event->te));
668 /* Don't repeat, delete ourselves */
669 TALLOC_FREE(event);
670 return;
673 DEBUG(10,("smbd_idle_event_handler: %s %p rescheduled\n",
674 event->name, event->te));
676 event->te = event_add_timed(ctx, event,
677 timeval_sum(&now, &event->interval),
678 smbd_idle_event_handler, event);
680 /* We can't do much but fail here. */
681 SMB_ASSERT(event->te != NULL);
684 struct idle_event *event_add_idle(struct event_context *event_ctx,
685 TALLOC_CTX *mem_ctx,
686 struct timeval interval,
687 const char *name,
688 bool (*handler)(const struct timeval *now,
689 void *private_data),
690 void *private_data)
692 struct idle_event *result;
693 struct timeval now = timeval_current();
695 result = TALLOC_P(mem_ctx, struct idle_event);
696 if (result == NULL) {
697 DEBUG(0, ("talloc failed\n"));
698 return NULL;
701 result->interval = interval;
702 result->handler = handler;
703 result->private_data = private_data;
705 if (!(result->name = talloc_asprintf(result, "idle_evt(%s)", name))) {
706 DEBUG(0, ("talloc failed\n"));
707 TALLOC_FREE(result);
708 return NULL;
711 result->te = event_add_timed(event_ctx, result,
712 timeval_sum(&now, &interval),
713 smbd_idle_event_handler, result);
714 if (result->te == NULL) {
715 DEBUG(0, ("event_add_timed failed\n"));
716 TALLOC_FREE(result);
717 return NULL;
720 DEBUG(10,("event_add_idle: %s %p\n", result->name, result->te));
721 return result;
724 static void smbd_sig_term_handler(struct tevent_context *ev,
725 struct tevent_signal *se,
726 int signum,
727 int count,
728 void *siginfo,
729 void *private_data)
731 exit_server_cleanly("termination signal");
734 void smbd_setup_sig_term_handler(void)
736 struct tevent_signal *se;
738 se = tevent_add_signal(smbd_event_context(),
739 smbd_event_context(),
740 SIGTERM, 0,
741 smbd_sig_term_handler,
742 NULL);
743 if (!se) {
744 exit_server("failed to setup SIGTERM handler");
748 static void smbd_sig_hup_handler(struct tevent_context *ev,
749 struct tevent_signal *se,
750 int signum,
751 int count,
752 void *siginfo,
753 void *private_data)
755 change_to_root_user();
756 DEBUG(1,("Reloading services after SIGHUP\n"));
757 reload_services(False);
760 void smbd_setup_sig_hup_handler(void)
762 struct tevent_signal *se;
764 se = tevent_add_signal(smbd_event_context(),
765 smbd_event_context(),
766 SIGHUP, 0,
767 smbd_sig_hup_handler,
768 NULL);
769 if (!se) {
770 exit_server("failed to setup SIGHUP handler");
774 static NTSTATUS smbd_server_connection_loop_once(struct smbd_server_connection *conn)
776 fd_set r_fds, w_fds;
777 int selrtn;
778 struct timeval to;
779 int maxfd = 0;
781 to.tv_sec = SMBD_SELECT_TIMEOUT;
782 to.tv_usec = 0;
785 * Setup the select fd sets.
788 FD_ZERO(&r_fds);
789 FD_ZERO(&w_fds);
792 * Are there any timed events waiting ? If so, ensure we don't
793 * select for longer than it would take to wait for them.
797 struct timeval now;
798 GetTimeOfDay(&now);
800 event_add_to_select_args(smbd_event_context(), &now,
801 &r_fds, &w_fds, &to, &maxfd);
804 /* Process a signal and timed events now... */
805 if (run_events(smbd_event_context(), 0, NULL, NULL)) {
806 return NT_STATUS_RETRY;
810 int sav;
811 START_PROFILE(smbd_idle);
813 selrtn = sys_select(maxfd+1,&r_fds,&w_fds,NULL,&to);
814 sav = errno;
816 END_PROFILE(smbd_idle);
817 errno = sav;
820 if (run_events(smbd_event_context(), selrtn, &r_fds, &w_fds)) {
821 return NT_STATUS_RETRY;
824 /* Check if error */
825 if (selrtn == -1) {
826 /* something is wrong. Maybe the socket is dead? */
827 return map_nt_error_from_unix(errno);
830 /* Did we timeout ? */
831 if (selrtn == 0) {
832 return NT_STATUS_RETRY;
835 /* should not be reached */
836 return NT_STATUS_INTERNAL_ERROR;
840 * Only allow 5 outstanding trans requests. We're allocating memory, so
841 * prevent a DoS.
844 NTSTATUS allow_new_trans(struct trans_state *list, int mid)
846 int count = 0;
847 for (; list != NULL; list = list->next) {
849 if (list->mid == mid) {
850 return NT_STATUS_INVALID_PARAMETER;
853 count += 1;
855 if (count > 5) {
856 return NT_STATUS_INSUFFICIENT_RESOURCES;
859 return NT_STATUS_OK;
863 These flags determine some of the permissions required to do an operation
865 Note that I don't set NEED_WRITE on some write operations because they
866 are used by some brain-dead clients when printing, and I don't want to
867 force write permissions on print services.
869 #define AS_USER (1<<0)
870 #define NEED_WRITE (1<<1) /* Must be paired with AS_USER */
871 #define TIME_INIT (1<<2)
872 #define CAN_IPC (1<<3) /* Must be paired with AS_USER */
873 #define AS_GUEST (1<<5) /* Must *NOT* be paired with AS_USER */
874 #define DO_CHDIR (1<<6)
877 define a list of possible SMB messages and their corresponding
878 functions. Any message that has a NULL function is unimplemented -
879 please feel free to contribute implementations!
881 static const struct smb_message_struct {
882 const char *name;
883 void (*fn)(struct smb_request *req);
884 int flags;
885 } smb_messages[256] = {
887 /* 0x00 */ { "SMBmkdir",reply_mkdir,AS_USER | NEED_WRITE},
888 /* 0x01 */ { "SMBrmdir",reply_rmdir,AS_USER | NEED_WRITE},
889 /* 0x02 */ { "SMBopen",reply_open,AS_USER },
890 /* 0x03 */ { "SMBcreate",reply_mknew,AS_USER},
891 /* 0x04 */ { "SMBclose",reply_close,AS_USER | CAN_IPC },
892 /* 0x05 */ { "SMBflush",reply_flush,AS_USER},
893 /* 0x06 */ { "SMBunlink",reply_unlink,AS_USER | NEED_WRITE },
894 /* 0x07 */ { "SMBmv",reply_mv,AS_USER | NEED_WRITE },
895 /* 0x08 */ { "SMBgetatr",reply_getatr,AS_USER},
896 /* 0x09 */ { "SMBsetatr",reply_setatr,AS_USER | NEED_WRITE},
897 /* 0x0a */ { "SMBread",reply_read,AS_USER},
898 /* 0x0b */ { "SMBwrite",reply_write,AS_USER | CAN_IPC },
899 /* 0x0c */ { "SMBlock",reply_lock,AS_USER},
900 /* 0x0d */ { "SMBunlock",reply_unlock,AS_USER},
901 /* 0x0e */ { "SMBctemp",reply_ctemp,AS_USER },
902 /* 0x0f */ { "SMBmknew",reply_mknew,AS_USER},
903 /* 0x10 */ { "SMBcheckpath",reply_checkpath,AS_USER},
904 /* 0x11 */ { "SMBexit",reply_exit,DO_CHDIR},
905 /* 0x12 */ { "SMBlseek",reply_lseek,AS_USER},
906 /* 0x13 */ { "SMBlockread",reply_lockread,AS_USER},
907 /* 0x14 */ { "SMBwriteunlock",reply_writeunlock,AS_USER},
908 /* 0x15 */ { NULL, NULL, 0 },
909 /* 0x16 */ { NULL, NULL, 0 },
910 /* 0x17 */ { NULL, NULL, 0 },
911 /* 0x18 */ { NULL, NULL, 0 },
912 /* 0x19 */ { NULL, NULL, 0 },
913 /* 0x1a */ { "SMBreadbraw",reply_readbraw,AS_USER},
914 /* 0x1b */ { "SMBreadBmpx",reply_readbmpx,AS_USER},
915 /* 0x1c */ { "SMBreadBs",reply_readbs,AS_USER },
916 /* 0x1d */ { "SMBwritebraw",reply_writebraw,AS_USER},
917 /* 0x1e */ { "SMBwriteBmpx",reply_writebmpx,AS_USER},
918 /* 0x1f */ { "SMBwriteBs",reply_writebs,AS_USER},
919 /* 0x20 */ { "SMBwritec", NULL,0},
920 /* 0x21 */ { NULL, NULL, 0 },
921 /* 0x22 */ { "SMBsetattrE",reply_setattrE,AS_USER | NEED_WRITE },
922 /* 0x23 */ { "SMBgetattrE",reply_getattrE,AS_USER },
923 /* 0x24 */ { "SMBlockingX",reply_lockingX,AS_USER },
924 /* 0x25 */ { "SMBtrans",reply_trans,AS_USER | CAN_IPC },
925 /* 0x26 */ { "SMBtranss",reply_transs,AS_USER | CAN_IPC},
926 /* 0x27 */ { "SMBioctl",reply_ioctl,0},
927 /* 0x28 */ { "SMBioctls", NULL,AS_USER},
928 /* 0x29 */ { "SMBcopy",reply_copy,AS_USER | NEED_WRITE },
929 /* 0x2a */ { "SMBmove", NULL,AS_USER | NEED_WRITE },
930 /* 0x2b */ { "SMBecho",reply_echo,0},
931 /* 0x2c */ { "SMBwriteclose",reply_writeclose,AS_USER},
932 /* 0x2d */ { "SMBopenX",reply_open_and_X,AS_USER | CAN_IPC },
933 /* 0x2e */ { "SMBreadX",reply_read_and_X,AS_USER | CAN_IPC },
934 /* 0x2f */ { "SMBwriteX",reply_write_and_X,AS_USER | CAN_IPC },
935 /* 0x30 */ { NULL, NULL, 0 },
936 /* 0x31 */ { NULL, NULL, 0 },
937 /* 0x32 */ { "SMBtrans2",reply_trans2, AS_USER | CAN_IPC },
938 /* 0x33 */ { "SMBtranss2",reply_transs2, AS_USER | CAN_IPC },
939 /* 0x34 */ { "SMBfindclose",reply_findclose,AS_USER},
940 /* 0x35 */ { "SMBfindnclose",reply_findnclose,AS_USER},
941 /* 0x36 */ { NULL, NULL, 0 },
942 /* 0x37 */ { NULL, NULL, 0 },
943 /* 0x38 */ { NULL, NULL, 0 },
944 /* 0x39 */ { NULL, NULL, 0 },
945 /* 0x3a */ { NULL, NULL, 0 },
946 /* 0x3b */ { NULL, NULL, 0 },
947 /* 0x3c */ { NULL, NULL, 0 },
948 /* 0x3d */ { NULL, NULL, 0 },
949 /* 0x3e */ { NULL, NULL, 0 },
950 /* 0x3f */ { NULL, NULL, 0 },
951 /* 0x40 */ { NULL, NULL, 0 },
952 /* 0x41 */ { NULL, NULL, 0 },
953 /* 0x42 */ { NULL, NULL, 0 },
954 /* 0x43 */ { NULL, NULL, 0 },
955 /* 0x44 */ { NULL, NULL, 0 },
956 /* 0x45 */ { NULL, NULL, 0 },
957 /* 0x46 */ { NULL, NULL, 0 },
958 /* 0x47 */ { NULL, NULL, 0 },
959 /* 0x48 */ { NULL, NULL, 0 },
960 /* 0x49 */ { NULL, NULL, 0 },
961 /* 0x4a */ { NULL, NULL, 0 },
962 /* 0x4b */ { NULL, NULL, 0 },
963 /* 0x4c */ { NULL, NULL, 0 },
964 /* 0x4d */ { NULL, NULL, 0 },
965 /* 0x4e */ { NULL, NULL, 0 },
966 /* 0x4f */ { NULL, NULL, 0 },
967 /* 0x50 */ { NULL, NULL, 0 },
968 /* 0x51 */ { NULL, NULL, 0 },
969 /* 0x52 */ { NULL, NULL, 0 },
970 /* 0x53 */ { NULL, NULL, 0 },
971 /* 0x54 */ { NULL, NULL, 0 },
972 /* 0x55 */ { NULL, NULL, 0 },
973 /* 0x56 */ { NULL, NULL, 0 },
974 /* 0x57 */ { NULL, NULL, 0 },
975 /* 0x58 */ { NULL, NULL, 0 },
976 /* 0x59 */ { NULL, NULL, 0 },
977 /* 0x5a */ { NULL, NULL, 0 },
978 /* 0x5b */ { NULL, NULL, 0 },
979 /* 0x5c */ { NULL, NULL, 0 },
980 /* 0x5d */ { NULL, NULL, 0 },
981 /* 0x5e */ { NULL, NULL, 0 },
982 /* 0x5f */ { NULL, NULL, 0 },
983 /* 0x60 */ { NULL, NULL, 0 },
984 /* 0x61 */ { NULL, NULL, 0 },
985 /* 0x62 */ { NULL, NULL, 0 },
986 /* 0x63 */ { NULL, NULL, 0 },
987 /* 0x64 */ { NULL, NULL, 0 },
988 /* 0x65 */ { NULL, NULL, 0 },
989 /* 0x66 */ { NULL, NULL, 0 },
990 /* 0x67 */ { NULL, NULL, 0 },
991 /* 0x68 */ { NULL, NULL, 0 },
992 /* 0x69 */ { NULL, NULL, 0 },
993 /* 0x6a */ { NULL, NULL, 0 },
994 /* 0x6b */ { NULL, NULL, 0 },
995 /* 0x6c */ { NULL, NULL, 0 },
996 /* 0x6d */ { NULL, NULL, 0 },
997 /* 0x6e */ { NULL, NULL, 0 },
998 /* 0x6f */ { NULL, NULL, 0 },
999 /* 0x70 */ { "SMBtcon",reply_tcon,0},
1000 /* 0x71 */ { "SMBtdis",reply_tdis,DO_CHDIR},
1001 /* 0x72 */ { "SMBnegprot",reply_negprot,0},
1002 /* 0x73 */ { "SMBsesssetupX",reply_sesssetup_and_X,0},
1003 /* 0x74 */ { "SMBulogoffX",reply_ulogoffX, 0}, /* ulogoff doesn't give a valid TID */
1004 /* 0x75 */ { "SMBtconX",reply_tcon_and_X,0},
1005 /* 0x76 */ { NULL, NULL, 0 },
1006 /* 0x77 */ { NULL, NULL, 0 },
1007 /* 0x78 */ { NULL, NULL, 0 },
1008 /* 0x79 */ { NULL, NULL, 0 },
1009 /* 0x7a */ { NULL, NULL, 0 },
1010 /* 0x7b */ { NULL, NULL, 0 },
1011 /* 0x7c */ { NULL, NULL, 0 },
1012 /* 0x7d */ { NULL, NULL, 0 },
1013 /* 0x7e */ { NULL, NULL, 0 },
1014 /* 0x7f */ { NULL, NULL, 0 },
1015 /* 0x80 */ { "SMBdskattr",reply_dskattr,AS_USER},
1016 /* 0x81 */ { "SMBsearch",reply_search,AS_USER},
1017 /* 0x82 */ { "SMBffirst",reply_search,AS_USER},
1018 /* 0x83 */ { "SMBfunique",reply_search,AS_USER},
1019 /* 0x84 */ { "SMBfclose",reply_fclose,AS_USER},
1020 /* 0x85 */ { NULL, NULL, 0 },
1021 /* 0x86 */ { NULL, NULL, 0 },
1022 /* 0x87 */ { NULL, NULL, 0 },
1023 /* 0x88 */ { NULL, NULL, 0 },
1024 /* 0x89 */ { NULL, NULL, 0 },
1025 /* 0x8a */ { NULL, NULL, 0 },
1026 /* 0x8b */ { NULL, NULL, 0 },
1027 /* 0x8c */ { NULL, NULL, 0 },
1028 /* 0x8d */ { NULL, NULL, 0 },
1029 /* 0x8e */ { NULL, NULL, 0 },
1030 /* 0x8f */ { NULL, NULL, 0 },
1031 /* 0x90 */ { NULL, NULL, 0 },
1032 /* 0x91 */ { NULL, NULL, 0 },
1033 /* 0x92 */ { NULL, NULL, 0 },
1034 /* 0x93 */ { NULL, NULL, 0 },
1035 /* 0x94 */ { NULL, NULL, 0 },
1036 /* 0x95 */ { NULL, NULL, 0 },
1037 /* 0x96 */ { NULL, NULL, 0 },
1038 /* 0x97 */ { NULL, NULL, 0 },
1039 /* 0x98 */ { NULL, NULL, 0 },
1040 /* 0x99 */ { NULL, NULL, 0 },
1041 /* 0x9a */ { NULL, NULL, 0 },
1042 /* 0x9b */ { NULL, NULL, 0 },
1043 /* 0x9c */ { NULL, NULL, 0 },
1044 /* 0x9d */ { NULL, NULL, 0 },
1045 /* 0x9e */ { NULL, NULL, 0 },
1046 /* 0x9f */ { NULL, NULL, 0 },
1047 /* 0xa0 */ { "SMBnttrans",reply_nttrans, AS_USER | CAN_IPC },
1048 /* 0xa1 */ { "SMBnttranss",reply_nttranss, AS_USER | CAN_IPC },
1049 /* 0xa2 */ { "SMBntcreateX",reply_ntcreate_and_X, AS_USER | CAN_IPC },
1050 /* 0xa3 */ { NULL, NULL, 0 },
1051 /* 0xa4 */ { "SMBntcancel",reply_ntcancel, 0 },
1052 /* 0xa5 */ { "SMBntrename",reply_ntrename, AS_USER | NEED_WRITE },
1053 /* 0xa6 */ { NULL, NULL, 0 },
1054 /* 0xa7 */ { NULL, NULL, 0 },
1055 /* 0xa8 */ { NULL, NULL, 0 },
1056 /* 0xa9 */ { NULL, NULL, 0 },
1057 /* 0xaa */ { NULL, NULL, 0 },
1058 /* 0xab */ { NULL, NULL, 0 },
1059 /* 0xac */ { NULL, NULL, 0 },
1060 /* 0xad */ { NULL, NULL, 0 },
1061 /* 0xae */ { NULL, NULL, 0 },
1062 /* 0xaf */ { NULL, NULL, 0 },
1063 /* 0xb0 */ { NULL, NULL, 0 },
1064 /* 0xb1 */ { NULL, NULL, 0 },
1065 /* 0xb2 */ { NULL, NULL, 0 },
1066 /* 0xb3 */ { NULL, NULL, 0 },
1067 /* 0xb4 */ { NULL, NULL, 0 },
1068 /* 0xb5 */ { NULL, NULL, 0 },
1069 /* 0xb6 */ { NULL, NULL, 0 },
1070 /* 0xb7 */ { NULL, NULL, 0 },
1071 /* 0xb8 */ { NULL, NULL, 0 },
1072 /* 0xb9 */ { NULL, NULL, 0 },
1073 /* 0xba */ { NULL, NULL, 0 },
1074 /* 0xbb */ { NULL, NULL, 0 },
1075 /* 0xbc */ { NULL, NULL, 0 },
1076 /* 0xbd */ { NULL, NULL, 0 },
1077 /* 0xbe */ { NULL, NULL, 0 },
1078 /* 0xbf */ { NULL, NULL, 0 },
1079 /* 0xc0 */ { "SMBsplopen",reply_printopen,AS_USER},
1080 /* 0xc1 */ { "SMBsplwr",reply_printwrite,AS_USER},
1081 /* 0xc2 */ { "SMBsplclose",reply_printclose,AS_USER},
1082 /* 0xc3 */ { "SMBsplretq",reply_printqueue,AS_USER},
1083 /* 0xc4 */ { NULL, NULL, 0 },
1084 /* 0xc5 */ { NULL, NULL, 0 },
1085 /* 0xc6 */ { NULL, NULL, 0 },
1086 /* 0xc7 */ { NULL, NULL, 0 },
1087 /* 0xc8 */ { NULL, NULL, 0 },
1088 /* 0xc9 */ { NULL, NULL, 0 },
1089 /* 0xca */ { NULL, NULL, 0 },
1090 /* 0xcb */ { NULL, NULL, 0 },
1091 /* 0xcc */ { NULL, NULL, 0 },
1092 /* 0xcd */ { NULL, NULL, 0 },
1093 /* 0xce */ { NULL, NULL, 0 },
1094 /* 0xcf */ { NULL, NULL, 0 },
1095 /* 0xd0 */ { "SMBsends",reply_sends,AS_GUEST},
1096 /* 0xd1 */ { "SMBsendb", NULL,AS_GUEST},
1097 /* 0xd2 */ { "SMBfwdname", NULL,AS_GUEST},
1098 /* 0xd3 */ { "SMBcancelf", NULL,AS_GUEST},
1099 /* 0xd4 */ { "SMBgetmac", NULL,AS_GUEST},
1100 /* 0xd5 */ { "SMBsendstrt",reply_sendstrt,AS_GUEST},
1101 /* 0xd6 */ { "SMBsendend",reply_sendend,AS_GUEST},
1102 /* 0xd7 */ { "SMBsendtxt",reply_sendtxt,AS_GUEST},
1103 /* 0xd8 */ { NULL, NULL, 0 },
1104 /* 0xd9 */ { NULL, NULL, 0 },
1105 /* 0xda */ { NULL, NULL, 0 },
1106 /* 0xdb */ { NULL, NULL, 0 },
1107 /* 0xdc */ { NULL, NULL, 0 },
1108 /* 0xdd */ { NULL, NULL, 0 },
1109 /* 0xde */ { NULL, NULL, 0 },
1110 /* 0xdf */ { NULL, NULL, 0 },
1111 /* 0xe0 */ { NULL, NULL, 0 },
1112 /* 0xe1 */ { NULL, NULL, 0 },
1113 /* 0xe2 */ { NULL, NULL, 0 },
1114 /* 0xe3 */ { NULL, NULL, 0 },
1115 /* 0xe4 */ { NULL, NULL, 0 },
1116 /* 0xe5 */ { NULL, NULL, 0 },
1117 /* 0xe6 */ { NULL, NULL, 0 },
1118 /* 0xe7 */ { NULL, NULL, 0 },
1119 /* 0xe8 */ { NULL, NULL, 0 },
1120 /* 0xe9 */ { NULL, NULL, 0 },
1121 /* 0xea */ { NULL, NULL, 0 },
1122 /* 0xeb */ { NULL, NULL, 0 },
1123 /* 0xec */ { NULL, NULL, 0 },
1124 /* 0xed */ { NULL, NULL, 0 },
1125 /* 0xee */ { NULL, NULL, 0 },
1126 /* 0xef */ { NULL, NULL, 0 },
1127 /* 0xf0 */ { NULL, NULL, 0 },
1128 /* 0xf1 */ { NULL, NULL, 0 },
1129 /* 0xf2 */ { NULL, NULL, 0 },
1130 /* 0xf3 */ { NULL, NULL, 0 },
1131 /* 0xf4 */ { NULL, NULL, 0 },
1132 /* 0xf5 */ { NULL, NULL, 0 },
1133 /* 0xf6 */ { NULL, NULL, 0 },
1134 /* 0xf7 */ { NULL, NULL, 0 },
1135 /* 0xf8 */ { NULL, NULL, 0 },
1136 /* 0xf9 */ { NULL, NULL, 0 },
1137 /* 0xfa */ { NULL, NULL, 0 },
1138 /* 0xfb */ { NULL, NULL, 0 },
1139 /* 0xfc */ { NULL, NULL, 0 },
1140 /* 0xfd */ { NULL, NULL, 0 },
1141 /* 0xfe */ { NULL, NULL, 0 },
1142 /* 0xff */ { NULL, NULL, 0 }
1146 /*******************************************************************
1147 allocate and initialize a reply packet
1148 ********************************************************************/
1150 static bool create_outbuf(TALLOC_CTX *mem_ctx, struct smb_request *req,
1151 const char *inbuf, char **outbuf, uint8_t num_words,
1152 uint32_t num_bytes)
1155 * Protect against integer wrap
1157 if ((num_bytes > 0xffffff)
1158 || ((num_bytes + smb_size + num_words*2) > 0xffffff)) {
1159 char *msg;
1160 if (asprintf(&msg, "num_bytes too large: %u",
1161 (unsigned)num_bytes) == -1) {
1162 msg = CONST_DISCARD(char *, "num_bytes too large");
1164 smb_panic(msg);
1167 *outbuf = TALLOC_ARRAY(mem_ctx, char,
1168 smb_size + num_words*2 + num_bytes);
1169 if (*outbuf == NULL) {
1170 return false;
1173 construct_reply_common(req, inbuf, *outbuf);
1174 srv_set_message(*outbuf, num_words, num_bytes, false);
1176 * Zero out the word area, the caller has to take care of the bcc area
1177 * himself
1179 if (num_words != 0) {
1180 memset(*outbuf + smb_vwv0, 0, num_words*2);
1183 return true;
1186 void reply_outbuf(struct smb_request *req, uint8 num_words, uint32 num_bytes)
1188 char *outbuf;
1189 if (!create_outbuf(req, req, (char *)req->inbuf, &outbuf, num_words,
1190 num_bytes)) {
1191 smb_panic("could not allocate output buffer\n");
1193 req->outbuf = (uint8_t *)outbuf;
1197 /*******************************************************************
1198 Dump a packet to a file.
1199 ********************************************************************/
1201 static void smb_dump(const char *name, int type, const char *data, ssize_t len)
1203 int fd, i;
1204 char *fname = NULL;
1205 if (DEBUGLEVEL < 50) {
1206 return;
1209 if (len < 4) len = smb_len(data)+4;
1210 for (i=1;i<100;i++) {
1211 if (asprintf(&fname, "/tmp/%s.%d.%s", name, i,
1212 type ? "req" : "resp") == -1) {
1213 return;
1215 fd = open(fname, O_WRONLY|O_CREAT|O_EXCL, 0644);
1216 if (fd != -1 || errno != EEXIST) break;
1218 if (fd != -1) {
1219 ssize_t ret = write(fd, data, len);
1220 if (ret != len)
1221 DEBUG(0,("smb_dump: problem: write returned %d\n", (int)ret ));
1222 close(fd);
1223 DEBUG(0,("created %s len %lu\n", fname, (unsigned long)len));
1225 SAFE_FREE(fname);
1228 /****************************************************************************
1229 Prepare everything for calling the actual request function, and potentially
1230 call the request function via the "new" interface.
1232 Return False if the "legacy" function needs to be called, everything is
1233 prepared.
1235 Return True if we're done.
1237 I know this API sucks, but it is the one with the least code change I could
1238 find.
1239 ****************************************************************************/
1241 static connection_struct *switch_message(uint8 type, struct smb_request *req, int size)
1243 int flags;
1244 uint16 session_tag;
1245 connection_struct *conn = NULL;
1247 errno = 0;
1249 /* Make sure this is an SMB packet. smb_size contains NetBIOS header
1250 * so subtract 4 from it. */
1251 if (!valid_smb_header(req->inbuf)
1252 || (size < (smb_size - 4))) {
1253 DEBUG(2,("Non-SMB packet of length %d. Terminating server\n",
1254 smb_len(req->inbuf)));
1255 exit_server_cleanly("Non-SMB packet");
1258 if (smb_messages[type].fn == NULL) {
1259 DEBUG(0,("Unknown message type %d!\n",type));
1260 smb_dump("Unknown", 1, (char *)req->inbuf, size);
1261 reply_unknown_new(req, type);
1262 return NULL;
1265 flags = smb_messages[type].flags;
1267 /* In share mode security we must ignore the vuid. */
1268 session_tag = (lp_security() == SEC_SHARE)
1269 ? UID_FIELD_INVALID : req->vuid;
1270 conn = req->conn;
1272 DEBUG(3,("switch message %s (pid %d) conn 0x%lx\n", smb_fn_name(type),
1273 (int)sys_getpid(), (unsigned long)conn));
1275 smb_dump(smb_fn_name(type), 1, (char *)req->inbuf, size);
1277 /* Ensure this value is replaced in the incoming packet. */
1278 SSVAL(req->inbuf,smb_uid,session_tag);
1281 * Ensure the correct username is in current_user_info. This is a
1282 * really ugly bugfix for problems with multiple session_setup_and_X's
1283 * being done and allowing %U and %G substitutions to work correctly.
1284 * There is a reason this code is done here, don't move it unless you
1285 * know what you're doing... :-).
1286 * JRA.
1289 if (session_tag != last_session_tag) {
1290 user_struct *vuser = NULL;
1292 last_session_tag = session_tag;
1293 if(session_tag != UID_FIELD_INVALID) {
1294 vuser = get_valid_user_struct(session_tag);
1295 if (vuser) {
1296 set_current_user_info(
1297 vuser->server_info->sanitized_username,
1298 vuser->server_info->unix_name,
1299 pdb_get_domain(vuser->server_info
1300 ->sam_account));
1305 /* Does this call need to be run as the connected user? */
1306 if (flags & AS_USER) {
1308 /* Does this call need a valid tree connection? */
1309 if (!conn) {
1311 * Amazingly, the error code depends on the command
1312 * (from Samba4).
1314 if (type == SMBntcreateX) {
1315 reply_nterror(req, NT_STATUS_INVALID_HANDLE);
1316 } else {
1317 reply_doserror(req, ERRSRV, ERRinvnid);
1319 return NULL;
1322 if (!change_to_user(conn,session_tag)) {
1323 reply_nterror(req, NT_STATUS_DOS(ERRSRV, ERRbaduid));
1324 return conn;
1327 /* All NEED_WRITE and CAN_IPC flags must also have AS_USER. */
1329 /* Does it need write permission? */
1330 if ((flags & NEED_WRITE) && !CAN_WRITE(conn)) {
1331 reply_nterror(req, NT_STATUS_MEDIA_WRITE_PROTECTED);
1332 return conn;
1335 /* IPC services are limited */
1336 if (IS_IPC(conn) && !(flags & CAN_IPC)) {
1337 reply_doserror(req, ERRSRV,ERRaccess);
1338 return conn;
1340 } else {
1341 /* This call needs to be run as root */
1342 change_to_root_user();
1345 /* load service specific parameters */
1346 if (conn) {
1347 if (req->encrypted) {
1348 conn->encrypted_tid = true;
1349 /* encrypted required from now on. */
1350 conn->encrypt_level = Required;
1351 } else if (ENCRYPTION_REQUIRED(conn)) {
1352 if (req->cmd != SMBtrans2 && req->cmd != SMBtranss2) {
1353 exit_server_cleanly("encryption required "
1354 "on connection");
1355 return conn;
1359 if (!set_current_service(conn,SVAL(req->inbuf,smb_flg),
1360 (flags & (AS_USER|DO_CHDIR)
1361 ?True:False))) {
1362 reply_doserror(req, ERRSRV, ERRaccess);
1363 return conn;
1365 conn->num_smb_operations++;
1368 /* does this protocol need to be run as guest? */
1369 if ((flags & AS_GUEST)
1370 && (!change_to_guest() ||
1371 !check_access(smbd_server_fd(), lp_hostsallow(-1),
1372 lp_hostsdeny(-1)))) {
1373 reply_doserror(req, ERRSRV, ERRaccess);
1374 return conn;
1377 smb_messages[type].fn(req);
1378 return req->conn;
1381 /****************************************************************************
1382 Construct a reply to the incoming packet.
1383 ****************************************************************************/
1385 static void construct_reply(char *inbuf, int size, size_t unread_bytes,
1386 bool encrypted,
1387 struct smb_perfcount_data *deferred_pcd)
1389 connection_struct *conn;
1390 struct smb_request *req;
1392 if (!(req = talloc(talloc_tos(), struct smb_request))) {
1393 smb_panic("could not allocate smb_request");
1396 init_smb_request(req, (uint8 *)inbuf, unread_bytes, encrypted);
1397 req->inbuf = (uint8_t *)talloc_move(req, &inbuf);
1399 /* we popped this message off the queue - keep original perf data */
1400 if (deferred_pcd)
1401 req->pcd = *deferred_pcd;
1402 else {
1403 SMB_PERFCOUNT_START(&req->pcd);
1404 SMB_PERFCOUNT_SET_OP(&req->pcd, req->cmd);
1405 SMB_PERFCOUNT_SET_MSGLEN_IN(&req->pcd, size);
1408 conn = switch_message(req->cmd, req, size);
1410 if (req->unread_bytes) {
1411 /* writeX failed. drain socket. */
1412 if (drain_socket(smbd_server_fd(), req->unread_bytes) !=
1413 req->unread_bytes) {
1414 smb_panic("failed to drain pending bytes");
1416 req->unread_bytes = 0;
1419 if (req->done) {
1420 TALLOC_FREE(req);
1421 return;
1424 if (req->outbuf == NULL) {
1425 return;
1428 if (CVAL(req->outbuf,0) == 0) {
1429 show_msg((char *)req->outbuf);
1432 if (!srv_send_smb(smbd_server_fd(),
1433 (char *)req->outbuf,
1434 IS_CONN_ENCRYPTED(conn)||req->encrypted,
1435 &req->pcd)) {
1436 exit_server_cleanly("construct_reply: srv_send_smb failed.");
1439 TALLOC_FREE(req);
1441 return;
1444 /****************************************************************************
1445 Process an smb from the client
1446 ****************************************************************************/
1447 static void process_smb(struct smbd_server_connection *conn,
1448 uint8_t *inbuf, size_t nread, size_t unread_bytes,
1449 bool encrypted, struct smb_perfcount_data *deferred_pcd)
1451 int msg_type = CVAL(inbuf,0);
1453 DO_PROFILE_INC(smb_count);
1455 DEBUG( 6, ( "got message type 0x%x of len 0x%x\n", msg_type,
1456 smb_len(inbuf) ) );
1457 DEBUG( 3, ( "Transaction %d of length %d (%u toread)\n", trans_num,
1458 (int)nread,
1459 (unsigned int)unread_bytes ));
1461 if (msg_type != 0) {
1463 * NetBIOS session request, keepalive, etc.
1465 reply_special((char *)inbuf);
1466 goto done;
1469 show_msg((char *)inbuf);
1471 construct_reply((char *)inbuf,nread,unread_bytes,encrypted,deferred_pcd);
1472 trans_num++;
1474 done:
1475 conn->num_requests++;
1477 /* The timeout_processing function isn't run nearly
1478 often enough to implement 'max log size' without
1479 overrunning the size of the file by many megabytes.
1480 This is especially true if we are running at debug
1481 level 10. Checking every 50 SMBs is a nice
1482 tradeoff of performance vs log file size overrun. */
1484 if ((conn->num_requests % 50) == 0 &&
1485 need_to_check_log_size()) {
1486 change_to_root_user();
1487 check_log_size();
1491 /****************************************************************************
1492 Return a string containing the function name of a SMB command.
1493 ****************************************************************************/
1495 const char *smb_fn_name(int type)
1497 const char *unknown_name = "SMBunknown";
1499 if (smb_messages[type].name == NULL)
1500 return(unknown_name);
1502 return(smb_messages[type].name);
1505 /****************************************************************************
1506 Helper functions for contruct_reply.
1507 ****************************************************************************/
1509 void add_to_common_flags2(uint32 v)
1511 common_flags2 |= v;
1514 void remove_from_common_flags2(uint32 v)
1516 common_flags2 &= ~v;
1519 static void construct_reply_common(struct smb_request *req, const char *inbuf,
1520 char *outbuf)
1522 srv_set_message(outbuf,0,0,false);
1524 SCVAL(outbuf, smb_com, req->cmd);
1525 SIVAL(outbuf,smb_rcls,0);
1526 SCVAL(outbuf,smb_flg, FLAG_REPLY | (CVAL(inbuf,smb_flg) & FLAG_CASELESS_PATHNAMES));
1527 SSVAL(outbuf,smb_flg2,
1528 (SVAL(inbuf,smb_flg2) & FLAGS2_UNICODE_STRINGS) |
1529 common_flags2);
1530 memset(outbuf+smb_pidhigh,'\0',(smb_tid-smb_pidhigh));
1532 SSVAL(outbuf,smb_tid,SVAL(inbuf,smb_tid));
1533 SSVAL(outbuf,smb_pid,SVAL(inbuf,smb_pid));
1534 SSVAL(outbuf,smb_uid,SVAL(inbuf,smb_uid));
1535 SSVAL(outbuf,smb_mid,SVAL(inbuf,smb_mid));
1538 void construct_reply_common_req(struct smb_request *req, char *outbuf)
1540 construct_reply_common(req, (char *)req->inbuf, outbuf);
1544 * How many bytes have we already accumulated up to the current wct field
1545 * offset?
1548 size_t req_wct_ofs(struct smb_request *req)
1550 size_t buf_size;
1552 if (req->chain_outbuf == NULL) {
1553 return smb_wct - 4;
1555 buf_size = talloc_get_size(req->chain_outbuf);
1556 if ((buf_size % 4) != 0) {
1557 buf_size += (4 - (buf_size % 4));
1559 return buf_size - 4;
1563 * Hack around reply_nterror & friends not being aware of chained requests,
1564 * generating illegal (i.e. wct==0) chain replies.
1567 static void fixup_chain_error_packet(struct smb_request *req)
1569 uint8_t *outbuf = req->outbuf;
1570 req->outbuf = NULL;
1571 reply_outbuf(req, 2, 0);
1572 memcpy(req->outbuf, outbuf, smb_wct);
1573 TALLOC_FREE(outbuf);
1574 SCVAL(req->outbuf, smb_vwv0, 0xff);
1577 /****************************************************************************
1578 Construct a chained reply and add it to the already made reply
1579 ****************************************************************************/
1581 void chain_reply(struct smb_request *req)
1583 size_t smblen = smb_len(req->inbuf);
1584 size_t already_used, length_needed;
1585 uint8_t chain_cmd;
1586 uint32_t chain_offset; /* uint32_t to avoid overflow */
1588 uint8_t wct;
1589 uint16_t *vwv;
1590 uint16_t buflen;
1591 uint8_t *buf;
1593 if (IVAL(req->outbuf, smb_rcls) != 0) {
1594 fixup_chain_error_packet(req);
1598 * Any of the AndX requests and replies have at least a wct of
1599 * 2. vwv[0] is the next command, vwv[1] is the offset from the
1600 * beginning of the SMB header to the next wct field.
1602 * None of the AndX requests put anything valuable in vwv[0] and [1],
1603 * so we can overwrite it here to form the chain.
1606 if ((req->wct < 2) || (CVAL(req->outbuf, smb_wct) < 2)) {
1607 if (req->chain_outbuf == NULL) {
1608 req->chain_outbuf = TALLOC_REALLOC_ARRAY(
1609 req, req->outbuf, uint8_t,
1610 smb_len(req->outbuf) + 4);
1611 if (req->chain_outbuf == NULL) {
1612 smb_panic("talloc failed");
1615 req->outbuf = NULL;
1616 goto error;
1620 * Here we assume that this is the end of the chain. For that we need
1621 * to set "next command" to 0xff and the offset to 0. If we later find
1622 * more commands in the chain, this will be overwritten again.
1625 SCVAL(req->outbuf, smb_vwv0, 0xff);
1626 SCVAL(req->outbuf, smb_vwv0+1, 0);
1627 SSVAL(req->outbuf, smb_vwv1, 0);
1629 if (req->chain_outbuf == NULL) {
1631 * In req->chain_outbuf we collect all the replies. Start the
1632 * chain by copying in the first reply.
1634 * We do the realloc because later on we depend on
1635 * talloc_get_size to determine the length of
1636 * chain_outbuf. The reply_xxx routines might have
1637 * over-allocated (reply_pipe_read_and_X used to be such an
1638 * example).
1640 req->chain_outbuf = TALLOC_REALLOC_ARRAY(
1641 req, req->outbuf, uint8_t, smb_len(req->outbuf) + 4);
1642 if (req->chain_outbuf == NULL) {
1643 smb_panic("talloc failed");
1645 req->outbuf = NULL;
1646 } else {
1648 * Update smb headers where subsequent chained commands
1649 * may have updated them.
1651 SCVAL(req->chain_outbuf, smb_tid, CVAL(req->outbuf, smb_tid));
1652 SCVAL(req->chain_outbuf, smb_uid, CVAL(req->outbuf, smb_uid));
1654 if (!smb_splice_chain(&req->chain_outbuf,
1655 CVAL(req->outbuf, smb_com),
1656 CVAL(req->outbuf, smb_wct),
1657 (uint16_t *)(req->outbuf + smb_vwv),
1658 0, smb_buflen(req->outbuf),
1659 (uint8_t *)smb_buf(req->outbuf))) {
1660 goto error;
1662 TALLOC_FREE(req->outbuf);
1666 * We use the old request's vwv field to grab the next chained command
1667 * and offset into the chained fields.
1670 chain_cmd = CVAL(req->vwv+0, 0);
1671 chain_offset = SVAL(req->vwv+1, 0);
1673 if (chain_cmd == 0xff) {
1675 * End of chain, no more requests from the client. So ship the
1676 * replies.
1678 smb_setlen((char *)(req->chain_outbuf),
1679 talloc_get_size(req->chain_outbuf) - 4);
1681 if (!srv_send_smb(smbd_server_fd(), (char *)req->chain_outbuf,
1682 IS_CONN_ENCRYPTED(req->conn)
1683 ||req->encrypted,
1684 &req->pcd)) {
1685 exit_server_cleanly("chain_reply: srv_send_smb "
1686 "failed.");
1688 TALLOC_FREE(req->chain_outbuf);
1689 req->done = true;
1690 return;
1693 /* add a new perfcounter for this element of chain */
1694 SMB_PERFCOUNT_ADD(&req->pcd);
1695 SMB_PERFCOUNT_SET_OP(&req->pcd, chain_cmd);
1696 SMB_PERFCOUNT_SET_MSGLEN_IN(&req->pcd, smblen);
1699 * Check if the client tries to fool us. The request so far uses the
1700 * space to the end of the byte buffer in the request just
1701 * processed. The chain_offset can't point into that area. If that was
1702 * the case, we could end up with an endless processing of the chain,
1703 * we would always handle the same request.
1706 already_used = PTR_DIFF(req->buf+req->buflen, smb_base(req->inbuf));
1707 if (chain_offset < already_used) {
1708 goto error;
1712 * Next check: Make sure the chain offset does not point beyond the
1713 * overall smb request length.
1716 length_needed = chain_offset+1; /* wct */
1717 if (length_needed > smblen) {
1718 goto error;
1722 * Now comes the pointer magic. Goal here is to set up req->vwv and
1723 * req->buf correctly again to be able to call the subsequent
1724 * switch_message(). The chain offset (the former vwv[1]) points at
1725 * the new wct field.
1728 wct = CVAL(smb_base(req->inbuf), chain_offset);
1731 * Next consistency check: Make the new vwv array fits in the overall
1732 * smb request.
1735 length_needed += (wct+1)*sizeof(uint16_t); /* vwv+buflen */
1736 if (length_needed > smblen) {
1737 goto error;
1739 vwv = (uint16_t *)(smb_base(req->inbuf) + chain_offset + 1);
1742 * Now grab the new byte buffer....
1745 buflen = SVAL(vwv+wct, 0);
1748 * .. and check that it fits.
1751 length_needed += buflen;
1752 if (length_needed > smblen) {
1753 goto error;
1755 buf = (uint8_t *)(vwv+wct+1);
1757 req->cmd = chain_cmd;
1758 req->wct = wct;
1759 req->vwv = vwv;
1760 req->buflen = buflen;
1761 req->buf = buf;
1763 switch_message(chain_cmd, req, smblen);
1765 if (req->outbuf == NULL) {
1767 * This happens if the chained command has suspended itself or
1768 * if it has called srv_send_smb() itself.
1770 return;
1774 * We end up here if the chained command was not itself chained or
1775 * suspended, but for example a close() command. We now need to splice
1776 * the chained commands' outbuf into the already built up chain_outbuf
1777 * and ship the result.
1779 goto done;
1781 error:
1783 * We end up here if there's any error in the chain syntax. Report a
1784 * DOS error, just like Windows does.
1786 reply_nterror(req, NT_STATUS_DOS(ERRSRV, ERRerror));
1787 fixup_chain_error_packet(req);
1789 done:
1790 if (!smb_splice_chain(&req->chain_outbuf,
1791 CVAL(req->outbuf, smb_com),
1792 CVAL(req->outbuf, smb_wct),
1793 (uint16_t *)(req->outbuf + smb_vwv),
1794 0, smb_buflen(req->outbuf),
1795 (uint8_t *)smb_buf(req->outbuf))) {
1796 exit_server_cleanly("chain_reply: smb_splice_chain failed\n");
1798 TALLOC_FREE(req->outbuf);
1800 smb_setlen((char *)(req->chain_outbuf),
1801 talloc_get_size(req->chain_outbuf) - 4);
1803 show_msg((char *)(req->chain_outbuf));
1805 if (!srv_send_smb(smbd_server_fd(), (char *)req->chain_outbuf,
1806 IS_CONN_ENCRYPTED(req->conn)||req->encrypted,
1807 &req->pcd)) {
1808 exit_server_cleanly("construct_reply: srv_send_smb failed.");
1810 TALLOC_FREE(req->chain_outbuf);
1811 req->done = true;
1814 /****************************************************************************
1815 Check if services need reloading.
1816 ****************************************************************************/
1818 void check_reload(time_t t)
1820 time_t printcap_cache_time = (time_t)lp_printcap_cache_time();
1822 if(last_smb_conf_reload_time == 0) {
1823 last_smb_conf_reload_time = t;
1824 /* Our printing subsystem might not be ready at smbd start up.
1825 Then no printer is available till the first printers check
1826 is performed. A lower initial interval circumvents this. */
1827 if ( printcap_cache_time > 60 )
1828 last_printer_reload_time = t - printcap_cache_time + 60;
1829 else
1830 last_printer_reload_time = t;
1833 if (mypid != getpid()) { /* First time or fork happened meanwhile */
1834 /* randomize over 60 second the printcap reload to avoid all
1835 * process hitting cupsd at the same time */
1836 int time_range = 60;
1838 last_printer_reload_time += random() % time_range;
1839 mypid = getpid();
1842 if (t >= last_smb_conf_reload_time+SMBD_RELOAD_CHECK) {
1843 reload_services(True);
1844 last_smb_conf_reload_time = t;
1847 /* 'printcap cache time = 0' disable the feature */
1849 if ( printcap_cache_time != 0 )
1851 /* see if it's time to reload or if the clock has been set back */
1853 if ( (t >= last_printer_reload_time+printcap_cache_time)
1854 || (t-last_printer_reload_time < 0) )
1856 DEBUG( 3,( "Printcap cache time expired.\n"));
1857 pcap_cache_reload(&reload_printers);
1858 last_printer_reload_time = t;
1863 static void smbd_server_connection_write_handler(struct smbd_server_connection *conn)
1865 /* TODO: make write nonblocking */
1868 static void smbd_server_connection_read_handler(struct smbd_server_connection *conn)
1870 uint8_t *inbuf = NULL;
1871 size_t inbuf_len = 0;
1872 size_t unread_bytes = 0;
1873 bool encrypted = false;
1874 TALLOC_CTX *mem_ctx = talloc_tos();
1875 NTSTATUS status;
1877 /* TODO: make this completely nonblocking */
1879 status = receive_smb_talloc(mem_ctx, smbd_server_fd(),
1880 (char **)(void *)&inbuf,
1881 0, /* timeout */
1882 &unread_bytes,
1883 &encrypted,
1884 &inbuf_len);
1885 if (NT_STATUS_EQUAL(status, NT_STATUS_RETRY)) {
1886 goto process;
1888 if (NT_STATUS_IS_ERR(status)) {
1889 exit_server_cleanly("failed to receive smb request");
1891 if (!NT_STATUS_IS_OK(status)) {
1892 return;
1895 process:
1896 process_smb(conn, inbuf, inbuf_len, unread_bytes, encrypted, NULL);
1899 static void smbd_server_connection_handler(struct event_context *ev,
1900 struct fd_event *fde,
1901 uint16_t flags,
1902 void *private_data)
1904 struct smbd_server_connection *conn = talloc_get_type(private_data,
1905 struct smbd_server_connection);
1907 if (flags & EVENT_FD_WRITE) {
1908 smbd_server_connection_write_handler(conn);
1909 } else if (flags & EVENT_FD_READ) {
1910 smbd_server_connection_read_handler(conn);
1915 /****************************************************************************
1916 received when we should release a specific IP
1917 ****************************************************************************/
1918 static void release_ip(const char *ip, void *priv)
1920 char addr[INET6_ADDRSTRLEN];
1921 char *p = addr;
1923 client_socket_addr(get_client_fd(),addr,sizeof(addr));
1925 if (strncmp("::ffff:", addr, 7) == 0) {
1926 p = addr + 7;
1929 if ((strcmp(p, ip) == 0) || ((p != addr) && strcmp(addr, ip) == 0)) {
1930 /* we can't afford to do a clean exit - that involves
1931 database writes, which would potentially mean we
1932 are still running after the failover has finished -
1933 we have to get rid of this process ID straight
1934 away */
1935 DEBUG(0,("Got release IP message for our IP %s - exiting immediately\n",
1936 ip));
1937 /* note we must exit with non-zero status so the unclean handler gets
1938 called in the parent, so that the brl database is tickled */
1939 _exit(1);
1943 static void msg_release_ip(struct messaging_context *msg_ctx, void *private_data,
1944 uint32_t msg_type, struct server_id server_id, DATA_BLOB *data)
1946 release_ip((char *)data->data, NULL);
1949 #ifdef CLUSTER_SUPPORT
1950 static int client_get_tcp_info(struct sockaddr_storage *server,
1951 struct sockaddr_storage *client)
1953 socklen_t length;
1954 if (server_fd == -1) {
1955 return -1;
1957 length = sizeof(*server);
1958 if (getsockname(server_fd, (struct sockaddr *)server, &length) != 0) {
1959 return -1;
1961 length = sizeof(*client);
1962 if (getpeername(server_fd, (struct sockaddr *)client, &length) != 0) {
1963 return -1;
1965 return 0;
1967 #endif
1970 * Send keepalive packets to our client
1972 static bool keepalive_fn(const struct timeval *now, void *private_data)
1974 if (!send_keepalive(smbd_server_fd())) {
1975 DEBUG( 2, ( "Keepalive failed - exiting.\n" ) );
1976 return False;
1978 return True;
1982 * Do the recurring check if we're idle
1984 static bool deadtime_fn(const struct timeval *now, void *private_data)
1986 if ((conn_num_open() == 0)
1987 || (conn_idle_all(now->tv_sec))) {
1988 DEBUG( 2, ( "Closing idle connection\n" ) );
1989 messaging_send(smbd_messaging_context(), procid_self(),
1990 MSG_SHUTDOWN, &data_blob_null);
1991 return False;
1994 return True;
1998 * Do the recurring log file and smb.conf reload checks.
2001 static bool housekeeping_fn(const struct timeval *now, void *private_data)
2003 change_to_root_user();
2005 /* update printer queue caches if necessary */
2006 update_monitored_printq_cache();
2008 /* check if we need to reload services */
2009 check_reload(time(NULL));
2011 /* Change machine password if neccessary. */
2012 attempt_machine_password_change();
2015 * Force a log file check.
2017 force_check_log_size();
2018 check_log_size();
2019 return true;
2022 /****************************************************************************
2023 Process commands from the client
2024 ****************************************************************************/
2026 void smbd_process(void)
2028 TALLOC_CTX *frame = talloc_stackframe();
2029 char remaddr[INET6_ADDRSTRLEN];
2031 smbd_server_conn = talloc_zero(smbd_event_context(), struct smbd_server_connection);
2032 if (!smbd_server_conn) {
2033 exit_server("failed to create smbd_server_connection");
2036 /* Ensure child is set to blocking mode */
2037 set_blocking(smbd_server_fd(),True);
2039 set_socket_options(smbd_server_fd(),"SO_KEEPALIVE");
2040 set_socket_options(smbd_server_fd(), lp_socket_options());
2042 /* this is needed so that we get decent entries
2043 in smbstatus for port 445 connects */
2044 set_remote_machine_name(get_peer_addr(smbd_server_fd(),
2045 remaddr,
2046 sizeof(remaddr)),
2047 false);
2048 reload_services(true);
2051 * Before the first packet, check the global hosts allow/ hosts deny
2052 * parameters before doing any parsing of packets passed to us by the
2053 * client. This prevents attacks on our parsing code from hosts not in
2054 * the hosts allow list.
2057 if (!check_access(smbd_server_fd(), lp_hostsallow(-1),
2058 lp_hostsdeny(-1))) {
2059 char addr[INET6_ADDRSTRLEN];
2062 * send a negative session response "not listening on calling
2063 * name"
2065 unsigned char buf[5] = {0x83, 0, 0, 1, 0x81};
2066 DEBUG( 1, ("Connection denied from %s\n",
2067 client_addr(get_client_fd(),addr,sizeof(addr)) ) );
2068 (void)srv_send_smb(smbd_server_fd(),(char *)buf,false, NULL);
2069 exit_server_cleanly("connection denied");
2072 static_init_rpc;
2074 init_modules();
2076 smb_perfcount_init();
2078 if (!init_account_policy()) {
2079 exit_server("Could not open account policy tdb.\n");
2082 if (*lp_rootdir()) {
2083 if (chroot(lp_rootdir()) != 0) {
2084 DEBUG(0,("Failed to change root to %s\n", lp_rootdir()));
2085 exit_server("Failed to chroot()");
2087 if (chdir("/") == -1) {
2088 DEBUG(0,("Failed to chdir to / on chroot to %s\n", lp_rootdir()));
2089 exit_server("Failed to chroot()");
2091 DEBUG(0,("Changed root to %s\n", lp_rootdir()));
2094 /* Setup oplocks */
2095 if (!init_oplocks(smbd_messaging_context()))
2096 exit_server("Failed to init oplocks");
2098 /* Setup aio signal handler. */
2099 initialize_async_io_handler();
2101 /* register our message handlers */
2102 messaging_register(smbd_messaging_context(), NULL,
2103 MSG_SMB_FORCE_TDIS, msg_force_tdis);
2104 messaging_register(smbd_messaging_context(), NULL,
2105 MSG_SMB_RELEASE_IP, msg_release_ip);
2106 messaging_register(smbd_messaging_context(), NULL,
2107 MSG_SMB_CLOSE_FILE, msg_close_file);
2109 if ((lp_keepalive() != 0)
2110 && !(event_add_idle(smbd_event_context(), NULL,
2111 timeval_set(lp_keepalive(), 0),
2112 "keepalive", keepalive_fn,
2113 NULL))) {
2114 DEBUG(0, ("Could not add keepalive event\n"));
2115 exit(1);
2118 if (!(event_add_idle(smbd_event_context(), NULL,
2119 timeval_set(IDLE_CLOSED_TIMEOUT, 0),
2120 "deadtime", deadtime_fn, NULL))) {
2121 DEBUG(0, ("Could not add deadtime event\n"));
2122 exit(1);
2125 if (!(event_add_idle(smbd_event_context(), NULL,
2126 timeval_set(SMBD_HOUSEKEEPING_INTERVAL, 0),
2127 "housekeeping", housekeeping_fn, NULL))) {
2128 DEBUG(0, ("Could not add housekeeping event\n"));
2129 exit(1);
2132 #ifdef CLUSTER_SUPPORT
2134 if (lp_clustering()) {
2136 * We need to tell ctdb about our client's TCP
2137 * connection, so that for failover ctdbd can send
2138 * tickle acks, triggering a reconnection by the
2139 * client.
2142 struct sockaddr_storage srv, clnt;
2144 if (client_get_tcp_info(&srv, &clnt) == 0) {
2146 NTSTATUS status;
2148 status = ctdbd_register_ips(
2149 messaging_ctdbd_connection(),
2150 &srv, &clnt, release_ip, NULL);
2152 if (!NT_STATUS_IS_OK(status)) {
2153 DEBUG(0, ("ctdbd_register_ips failed: %s\n",
2154 nt_errstr(status)));
2156 } else
2158 DEBUG(0,("Unable to get tcp info for "
2159 "CTDB_CONTROL_TCP_CLIENT: %s\n",
2160 strerror(errno)));
2164 #endif
2166 max_recv = MIN(lp_maxxmit(),BUFFER_SIZE);
2168 smbd_server_conn->fde = event_add_fd(smbd_event_context(),
2169 smbd_server_conn,
2170 smbd_server_fd(),
2171 EVENT_FD_READ,
2172 smbd_server_connection_handler,
2173 smbd_server_conn);
2174 if (!smbd_server_conn->fde) {
2175 exit_server("failed to create smbd_server_connection fde");
2178 TALLOC_FREE(frame);
2180 while (True) {
2181 NTSTATUS status;
2183 frame = talloc_stackframe_pool(8192);
2185 errno = 0;
2187 status = smbd_server_connection_loop_once(smbd_server_conn);
2188 if (!NT_STATUS_EQUAL(status, NT_STATUS_RETRY) &&
2189 !NT_STATUS_IS_OK(status)) {
2190 DEBUG(3, ("smbd_server_connection_loop_once failed: %s,"
2191 " exiting\n", nt_errstr(status)));
2192 break;
2195 TALLOC_FREE(frame);
2198 exit_server_cleanly(NULL);
2201 bool req_is_in_chain(struct smb_request *req)
2203 if (req->vwv != (uint16_t *)(req->inbuf+smb_vwv)) {
2205 * We're right now handling a subsequent request, so we must
2206 * be in a chain
2208 return true;
2211 if (!is_andx_req(req->cmd)) {
2212 return false;
2215 if (req->wct < 2) {
2217 * Okay, an illegal request, but definitely not chained :-)
2219 return false;
2222 return (CVAL(req->vwv+0, 0) != 0xFF);