2 Unix SMB/CIFS implementation.
3 Wrap disk only vfs functions to sidestep dodgy compilers.
4 Copyright (C) Tim Potter 1998
5 Copyright (C) Jeremy Allison 2007
7 This program is free software; you can redistribute it and/or modify
8 it under the terms of the GNU General Public License as published by
9 the Free Software Foundation; either version 3 of the License, or
10 (at your option) any later version.
12 This program is distributed in the hope that it will be useful,
13 but WITHOUT ANY WARRANTY; without even the implied warranty of
14 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
15 GNU General Public License for more details.
17 You should have received a copy of the GNU General Public License
18 along with this program. If not, see <http://www.gnu.org/licenses/>.
22 #include "system/time.h"
23 #include "system/filesys.h"
24 #include "smbd/smbd.h"
25 #include "smbd/globals.h"
27 #include "smbprofile.h"
28 #include "../libcli/security/security.h"
29 #include "passdb/lookup_sid.h"
30 #include "source3/include/msdfs.h"
31 #include "librpc/gen_ndr/ndr_dfsblobs.h"
32 #include "lib/util/tevent_unix.h"
33 #include "lib/asys/asys.h"
36 #define DBGC_CLASS DBGC_VFS
38 /* Check for NULL pointer parameters in vfswrap_* functions */
40 /* We don't want to have NULL function pointers lying around. Someone
41 is sure to try and execute them. These stubs are used to prevent
44 static int vfswrap_connect(vfs_handle_struct
*handle
, const char *service
, const char *user
)
46 return 0; /* Return >= 0 for success */
49 static void vfswrap_disconnect(vfs_handle_struct
*handle
)
55 static uint64_t vfswrap_disk_free(vfs_handle_struct
*handle
, const char *path
, bool small_query
, uint64_t *bsize
,
56 uint64_t *dfree
, uint64_t *dsize
)
60 result
= sys_disk_free(handle
->conn
, path
, small_query
, bsize
, dfree
, dsize
);
64 static int vfswrap_get_quota(struct vfs_handle_struct
*handle
, enum SMB_QUOTA_TYPE qtype
, unid_t id
, SMB_DISK_QUOTA
*qt
)
66 #ifdef HAVE_SYS_QUOTAS
69 START_PROFILE(syscall_get_quota
);
70 result
= sys_get_quota(handle
->conn
->connectpath
, qtype
, id
, qt
);
71 END_PROFILE(syscall_get_quota
);
79 static int vfswrap_set_quota(struct vfs_handle_struct
*handle
, enum SMB_QUOTA_TYPE qtype
, unid_t id
, SMB_DISK_QUOTA
*qt
)
81 #ifdef HAVE_SYS_QUOTAS
84 START_PROFILE(syscall_set_quota
);
85 result
= sys_set_quota(handle
->conn
->connectpath
, qtype
, id
, qt
);
86 END_PROFILE(syscall_set_quota
);
94 static int vfswrap_get_shadow_copy_data(struct vfs_handle_struct
*handle
,
95 struct files_struct
*fsp
,
96 struct shadow_copy_data
*shadow_copy_data
,
100 return -1; /* Not implemented. */
103 static int vfswrap_statvfs(struct vfs_handle_struct
*handle
, const char *path
, vfs_statvfs_struct
*statbuf
)
105 return sys_statvfs(path
, statbuf
);
108 static uint32_t vfswrap_fs_capabilities(struct vfs_handle_struct
*handle
,
109 enum timestamp_set_resolution
*p_ts_res
)
111 connection_struct
*conn
= handle
->conn
;
112 uint32_t caps
= FILE_CASE_SENSITIVE_SEARCH
| FILE_CASE_PRESERVED_NAMES
;
113 struct smb_filename
*smb_fname_cpath
= NULL
;
114 struct vfs_statvfs_struct statbuf
;
118 ZERO_STRUCT(statbuf
);
119 ret
= sys_statvfs(conn
->connectpath
, &statbuf
);
121 caps
= statbuf
.FsCapabilities
;
124 *p_ts_res
= TIMESTAMP_SET_SECONDS
;
126 /* Work out what timestamp resolution we can
127 * use when setting a timestamp. */
129 status
= create_synthetic_smb_fname(talloc_tos(),
134 if (!NT_STATUS_IS_OK(status
)) {
138 ret
= SMB_VFS_STAT(conn
, smb_fname_cpath
);
140 TALLOC_FREE(smb_fname_cpath
);
144 if (smb_fname_cpath
->st
.st_ex_mtime
.tv_nsec
||
145 smb_fname_cpath
->st
.st_ex_atime
.tv_nsec
||
146 smb_fname_cpath
->st
.st_ex_ctime
.tv_nsec
) {
147 /* If any of the normal UNIX directory timestamps
148 * have a non-zero tv_nsec component assume
149 * we might be able to set sub-second timestamps.
150 * See what filetime set primitives we have.
152 #if defined(HAVE_UTIMENSAT)
153 *p_ts_res
= TIMESTAMP_SET_NT_OR_BETTER
;
154 #elif defined(HAVE_UTIMES)
155 /* utimes allows msec timestamps to be set. */
156 *p_ts_res
= TIMESTAMP_SET_MSEC
;
157 #elif defined(HAVE_UTIME)
158 /* utime only allows sec timestamps to be set. */
159 *p_ts_res
= TIMESTAMP_SET_SECONDS
;
162 DEBUG(10,("vfswrap_fs_capabilities: timestamp "
164 "available on share %s, directory %s\n",
165 *p_ts_res
== TIMESTAMP_SET_MSEC
? "msec" : "sec",
166 lp_servicename(talloc_tos(), conn
->params
->service
),
167 conn
->connectpath
));
169 TALLOC_FREE(smb_fname_cpath
);
173 static NTSTATUS
vfswrap_get_dfs_referrals(struct vfs_handle_struct
*handle
,
174 struct dfs_GetDFSReferral
*r
)
176 struct junction_map
*junction
= NULL
;
178 bool self_referral
= false;
179 char *pathnamep
= NULL
;
180 char *local_dfs_path
= NULL
;
183 uint16_t max_referral_level
= r
->in
.req
.max_referral_level
;
186 NDR_PRINT_IN_DEBUG(dfs_GetDFSReferral
, r
);
189 /* get the junction entry */
190 if (r
->in
.req
.servername
== NULL
) {
191 return NT_STATUS_NOT_FOUND
;
195 * Trim pathname sent by client so it begins with only one backslash.
196 * Two backslashes confuse some dfs clients
199 local_dfs_path
= talloc_strdup(r
, r
->in
.req
.servername
);
200 if (local_dfs_path
== NULL
) {
201 return NT_STATUS_NO_MEMORY
;
203 pathnamep
= local_dfs_path
;
204 while (IS_DIRECTORY_SEP(pathnamep
[0]) &&
205 IS_DIRECTORY_SEP(pathnamep
[1])) {
209 junction
= talloc_zero(r
, struct junction_map
);
210 if (junction
== NULL
) {
211 return NT_STATUS_NO_MEMORY
;
214 /* The following call can change cwd. */
215 status
= get_referred_path(r
, pathnamep
,
216 !handle
->conn
->sconn
->using_smb2
,
217 junction
, &consumedcnt
, &self_referral
);
218 if (!NT_STATUS_IS_OK(status
)) {
219 vfs_ChDir(handle
->conn
, handle
->conn
->connectpath
);
222 vfs_ChDir(handle
->conn
, handle
->conn
->connectpath
);
224 if (!self_referral
) {
225 pathnamep
[consumedcnt
] = '\0';
228 dbgtext("setup_dfs_referral: Path %s to "
229 "alternate path(s):",
231 for (i
=0; i
< junction
->referral_count
; i
++) {
233 junction
->referral_list
[i
].alternate_path
);
239 if (r
->in
.req
.max_referral_level
<= 2) {
240 max_referral_level
= 2;
242 if (r
->in
.req
.max_referral_level
>= 3) {
243 max_referral_level
= 3;
246 r
->out
.resp
= talloc_zero(r
, struct dfs_referral_resp
);
247 if (r
->out
.resp
== NULL
) {
248 return NT_STATUS_NO_MEMORY
;
251 r
->out
.resp
->path_consumed
= strlen_m(pathnamep
) * 2;
252 r
->out
.resp
->nb_referrals
= junction
->referral_count
;
254 r
->out
.resp
->header_flags
= DFS_HEADER_FLAG_STORAGE_SVR
;
256 r
->out
.resp
->header_flags
|= DFS_HEADER_FLAG_REFERAL_SVR
;
259 r
->out
.resp
->referral_entries
= talloc_zero_array(r
,
260 struct dfs_referral_type
,
261 r
->out
.resp
->nb_referrals
);
262 if (r
->out
.resp
->referral_entries
== NULL
) {
263 return NT_STATUS_NO_MEMORY
;
266 switch (max_referral_level
) {
268 for(i
=0; i
< junction
->referral_count
; i
++) {
269 struct referral
*ref
= &junction
->referral_list
[i
];
270 TALLOC_CTX
*mem_ctx
= r
->out
.resp
->referral_entries
;
271 struct dfs_referral_type
*t
=
272 &r
->out
.resp
->referral_entries
[i
];
273 struct dfs_referral_v2
*v2
= &t
->referral
.v2
;
276 v2
->size
= VERSION2_REFERRAL_SIZE
;
278 v2
->server_type
= DFS_SERVER_ROOT
;
280 v2
->server_type
= DFS_SERVER_NON_ROOT
;
283 v2
->proximity
= ref
->proximity
;
285 v2
->DFS_path
= talloc_strdup(mem_ctx
, pathnamep
);
286 if (v2
->DFS_path
== NULL
) {
287 return NT_STATUS_NO_MEMORY
;
289 v2
->DFS_alt_path
= talloc_strdup(mem_ctx
, pathnamep
);
290 if (v2
->DFS_alt_path
== NULL
) {
291 return NT_STATUS_NO_MEMORY
;
293 v2
->netw_address
= talloc_strdup(mem_ctx
,
294 ref
->alternate_path
);
295 if (v2
->netw_address
== NULL
) {
296 return NT_STATUS_NO_MEMORY
;
302 for(i
=0; i
< junction
->referral_count
; i
++) {
303 struct referral
*ref
= &junction
->referral_list
[i
];
304 TALLOC_CTX
*mem_ctx
= r
->out
.resp
->referral_entries
;
305 struct dfs_referral_type
*t
=
306 &r
->out
.resp
->referral_entries
[i
];
307 struct dfs_referral_v3
*v3
= &t
->referral
.v3
;
308 struct dfs_normal_referral
*r1
= &v3
->referrals
.r1
;
311 v3
->size
= VERSION3_REFERRAL_SIZE
;
313 v3
->server_type
= DFS_SERVER_ROOT
;
315 v3
->server_type
= DFS_SERVER_NON_ROOT
;
319 r1
->DFS_path
= talloc_strdup(mem_ctx
, pathnamep
);
320 if (r1
->DFS_path
== NULL
) {
321 return NT_STATUS_NO_MEMORY
;
323 r1
->DFS_alt_path
= talloc_strdup(mem_ctx
, pathnamep
);
324 if (r1
->DFS_alt_path
== NULL
) {
325 return NT_STATUS_NO_MEMORY
;
327 r1
->netw_address
= talloc_strdup(mem_ctx
,
328 ref
->alternate_path
);
329 if (r1
->netw_address
== NULL
) {
330 return NT_STATUS_NO_MEMORY
;
335 DEBUG(0,("setup_dfs_referral: Invalid dfs referral "
337 max_referral_level
));
338 return NT_STATUS_INVALID_LEVEL
;
342 NDR_PRINT_OUT_DEBUG(dfs_GetDFSReferral
, r
);
348 /* Directory operations */
350 static DIR *vfswrap_opendir(vfs_handle_struct
*handle
, const char *fname
, const char *mask
, uint32 attr
)
354 START_PROFILE(syscall_opendir
);
355 result
= opendir(fname
);
356 END_PROFILE(syscall_opendir
);
360 static DIR *vfswrap_fdopendir(vfs_handle_struct
*handle
,
367 START_PROFILE(syscall_fdopendir
);
368 result
= sys_fdopendir(fsp
->fh
->fd
);
369 END_PROFILE(syscall_fdopendir
);
374 static struct dirent
*vfswrap_readdir(vfs_handle_struct
*handle
,
376 SMB_STRUCT_STAT
*sbuf
)
378 struct dirent
*result
;
380 START_PROFILE(syscall_readdir
);
381 result
= readdir(dirp
);
382 /* Default Posix readdir() does not give us stat info.
383 * Set to invalid to indicate we didn't return this info. */
385 SET_STAT_INVALID(*sbuf
);
386 END_PROFILE(syscall_readdir
);
390 static void vfswrap_seekdir(vfs_handle_struct
*handle
, DIR *dirp
, long offset
)
392 START_PROFILE(syscall_seekdir
);
393 seekdir(dirp
, offset
);
394 END_PROFILE(syscall_seekdir
);
397 static long vfswrap_telldir(vfs_handle_struct
*handle
, DIR *dirp
)
400 START_PROFILE(syscall_telldir
);
401 result
= telldir(dirp
);
402 END_PROFILE(syscall_telldir
);
406 static void vfswrap_rewinddir(vfs_handle_struct
*handle
, DIR *dirp
)
408 START_PROFILE(syscall_rewinddir
);
410 END_PROFILE(syscall_rewinddir
);
413 static int vfswrap_mkdir(vfs_handle_struct
*handle
, const char *path
, mode_t mode
)
416 bool has_dacl
= False
;
419 START_PROFILE(syscall_mkdir
);
421 if (lp_inherit_acls(SNUM(handle
->conn
))
422 && parent_dirname(talloc_tos(), path
, &parent
, NULL
)
423 && (has_dacl
= directory_has_default_acl(handle
->conn
, parent
)))
424 mode
= (0777 & lp_dir_mask(SNUM(handle
->conn
)));
428 result
= mkdir(path
, mode
);
430 if (result
== 0 && !has_dacl
) {
432 * We need to do this as the default behavior of POSIX ACLs
433 * is to set the mask to be the requested group permission
434 * bits, not the group permission bits to be the requested
435 * group permission bits. This is not what we want, as it will
436 * mess up any inherited ACL bits that were set. JRA.
438 int saved_errno
= errno
; /* We may get ENOSYS */
439 if ((SMB_VFS_CHMOD_ACL(handle
->conn
, path
, mode
) == -1) && (errno
== ENOSYS
))
443 END_PROFILE(syscall_mkdir
);
447 static int vfswrap_rmdir(vfs_handle_struct
*handle
, const char *path
)
451 START_PROFILE(syscall_rmdir
);
452 result
= rmdir(path
);
453 END_PROFILE(syscall_rmdir
);
457 static int vfswrap_closedir(vfs_handle_struct
*handle
, DIR *dirp
)
461 START_PROFILE(syscall_closedir
);
462 result
= closedir(dirp
);
463 END_PROFILE(syscall_closedir
);
467 static void vfswrap_init_search_op(vfs_handle_struct
*handle
,
470 /* Default behavior is a NOOP */
473 /* File operations */
475 static int vfswrap_open(vfs_handle_struct
*handle
,
476 struct smb_filename
*smb_fname
,
477 files_struct
*fsp
, int flags
, mode_t mode
)
481 START_PROFILE(syscall_open
);
483 if (smb_fname
->stream_name
) {
488 result
= open(smb_fname
->base_name
, flags
, mode
);
490 END_PROFILE(syscall_open
);
494 static NTSTATUS
vfswrap_create_file(vfs_handle_struct
*handle
,
495 struct smb_request
*req
,
496 uint16_t root_dir_fid
,
497 struct smb_filename
*smb_fname
,
498 uint32_t access_mask
,
499 uint32_t share_access
,
500 uint32_t create_disposition
,
501 uint32_t create_options
,
502 uint32_t file_attributes
,
503 uint32_t oplock_request
,
504 uint64_t allocation_size
,
505 uint32_t private_flags
,
506 struct security_descriptor
*sd
,
507 struct ea_list
*ea_list
,
508 files_struct
**result
,
511 return create_file_default(handle
->conn
, req
, root_dir_fid
, smb_fname
,
512 access_mask
, share_access
,
513 create_disposition
, create_options
,
514 file_attributes
, oplock_request
,
515 allocation_size
, private_flags
,
520 static int vfswrap_close(vfs_handle_struct
*handle
, files_struct
*fsp
)
524 START_PROFILE(syscall_close
);
525 result
= fd_close_posix(fsp
);
526 END_PROFILE(syscall_close
);
530 static ssize_t
vfswrap_read(vfs_handle_struct
*handle
, files_struct
*fsp
, void *data
, size_t n
)
534 START_PROFILE_BYTES(syscall_read
, n
);
535 result
= sys_read(fsp
->fh
->fd
, data
, n
);
536 END_PROFILE(syscall_read
);
540 static ssize_t
vfswrap_pread(vfs_handle_struct
*handle
, files_struct
*fsp
, void *data
,
541 size_t n
, off_t offset
)
545 #if defined(HAVE_PREAD) || defined(HAVE_PREAD64)
546 START_PROFILE_BYTES(syscall_pread
, n
);
547 result
= sys_pread(fsp
->fh
->fd
, data
, n
, offset
);
548 END_PROFILE(syscall_pread
);
550 if (result
== -1 && errno
== ESPIPE
) {
551 /* Maintain the fiction that pipes can be seeked (sought?) on. */
552 result
= SMB_VFS_READ(fsp
, data
, n
);
556 #else /* HAVE_PREAD */
560 curr
= SMB_VFS_LSEEK(fsp
, 0, SEEK_CUR
);
561 if (curr
== -1 && errno
== ESPIPE
) {
562 /* Maintain the fiction that pipes can be seeked (sought?) on. */
563 result
= SMB_VFS_READ(fsp
, data
, n
);
568 if (SMB_VFS_LSEEK(fsp
, offset
, SEEK_SET
) == -1) {
573 result
= SMB_VFS_READ(fsp
, data
, n
);
576 SMB_VFS_LSEEK(fsp
, curr
, SEEK_SET
);
579 #endif /* HAVE_PREAD */
584 static ssize_t
vfswrap_write(vfs_handle_struct
*handle
, files_struct
*fsp
, const void *data
, size_t n
)
588 START_PROFILE_BYTES(syscall_write
, n
);
589 result
= sys_write(fsp
->fh
->fd
, data
, n
);
590 END_PROFILE(syscall_write
);
594 static ssize_t
vfswrap_pwrite(vfs_handle_struct
*handle
, files_struct
*fsp
, const void *data
,
595 size_t n
, off_t offset
)
599 #if defined(HAVE_PWRITE) || defined(HAVE_PRWITE64)
600 START_PROFILE_BYTES(syscall_pwrite
, n
);
601 result
= sys_pwrite(fsp
->fh
->fd
, data
, n
, offset
);
602 END_PROFILE(syscall_pwrite
);
604 if (result
== -1 && errno
== ESPIPE
) {
605 /* Maintain the fiction that pipes can be sought on. */
606 result
= SMB_VFS_WRITE(fsp
, data
, n
);
609 #else /* HAVE_PWRITE */
613 curr
= SMB_VFS_LSEEK(fsp
, 0, SEEK_CUR
);
618 if (SMB_VFS_LSEEK(fsp
, offset
, SEEK_SET
) == -1) {
622 result
= SMB_VFS_WRITE(fsp
, data
, n
);
625 SMB_VFS_LSEEK(fsp
, curr
, SEEK_SET
);
628 #endif /* HAVE_PWRITE */
633 static void vfswrap_asys_finished(struct tevent_context
*ev
,
634 struct tevent_fd
*fde
,
635 uint16_t flags
, void *p
);
637 static bool vfswrap_init_asys_ctx(struct smbXsrv_connection
*conn
)
642 if (conn
->asys_ctx
!= NULL
) {
645 ret
= asys_context_init(&conn
->asys_ctx
, aio_pending_size
);
647 DEBUG(1, ("asys_context_init failed: %s\n", strerror(ret
)));
651 fd
= asys_signalfd(conn
->asys_ctx
);
653 set_blocking(fd
, false);
655 conn
->asys_fde
= tevent_add_fd(conn
->ev_ctx
, conn
, fd
,
657 vfswrap_asys_finished
,
659 if (conn
->asys_fde
== NULL
) {
660 DEBUG(1, ("tevent_add_fd failed\n"));
661 asys_context_destroy(conn
->asys_ctx
);
662 conn
->asys_ctx
= NULL
;
668 struct vfswrap_asys_state
{
669 struct asys_context
*asys_ctx
;
670 struct tevent_req
*req
;
675 static int vfswrap_asys_state_destructor(struct vfswrap_asys_state
*s
)
677 asys_cancel(s
->asys_ctx
, s
->req
);
681 static struct tevent_req
*vfswrap_pread_send(struct vfs_handle_struct
*handle
,
683 struct tevent_context
*ev
,
684 struct files_struct
*fsp
,
686 size_t n
, off_t offset
)
688 struct tevent_req
*req
;
689 struct vfswrap_asys_state
*state
;
692 req
= tevent_req_create(mem_ctx
, &state
, struct vfswrap_asys_state
);
696 if (!vfswrap_init_asys_ctx(handle
->conn
->sconn
->conn
)) {
698 return tevent_req_post(req
, ev
);
700 state
->asys_ctx
= handle
->conn
->sconn
->conn
->asys_ctx
;
703 ret
= asys_pread(state
->asys_ctx
, fsp
->fh
->fd
, data
, n
, offset
, req
);
705 tevent_req_error(req
, ret
);
706 return tevent_req_post(req
, ev
);
708 talloc_set_destructor(state
, vfswrap_asys_state_destructor
);
713 static struct tevent_req
*vfswrap_pwrite_send(struct vfs_handle_struct
*handle
,
715 struct tevent_context
*ev
,
716 struct files_struct
*fsp
,
718 size_t n
, off_t offset
)
720 struct tevent_req
*req
;
721 struct vfswrap_asys_state
*state
;
724 req
= tevent_req_create(mem_ctx
, &state
, struct vfswrap_asys_state
);
728 if (!vfswrap_init_asys_ctx(handle
->conn
->sconn
->conn
)) {
730 return tevent_req_post(req
, ev
);
732 state
->asys_ctx
= handle
->conn
->sconn
->conn
->asys_ctx
;
735 ret
= asys_pwrite(state
->asys_ctx
, fsp
->fh
->fd
, data
, n
, offset
, req
);
737 tevent_req_error(req
, ret
);
738 return tevent_req_post(req
, ev
);
740 talloc_set_destructor(state
, vfswrap_asys_state_destructor
);
745 static struct tevent_req
*vfswrap_fsync_send(struct vfs_handle_struct
*handle
,
747 struct tevent_context
*ev
,
748 struct files_struct
*fsp
)
750 struct tevent_req
*req
;
751 struct vfswrap_asys_state
*state
;
754 req
= tevent_req_create(mem_ctx
, &state
, struct vfswrap_asys_state
);
758 if (!vfswrap_init_asys_ctx(handle
->conn
->sconn
->conn
)) {
760 return tevent_req_post(req
, ev
);
762 state
->asys_ctx
= handle
->conn
->sconn
->conn
->asys_ctx
;
765 ret
= asys_fsync(state
->asys_ctx
, fsp
->fh
->fd
, req
);
767 tevent_req_error(req
, ret
);
768 return tevent_req_post(req
, ev
);
770 talloc_set_destructor(state
, vfswrap_asys_state_destructor
);
775 static void vfswrap_asys_finished(struct tevent_context
*ev
,
776 struct tevent_fd
*fde
,
777 uint16_t flags
, void *p
)
779 struct asys_context
*asys_ctx
= (struct asys_context
*)p
;
780 struct tevent_req
*req
;
781 struct vfswrap_asys_state
*state
;
787 if ((flags
& TEVENT_FD_READ
) == 0) {
792 res
= asys_result(asys_ctx
, &ret
, &err
, &private_data
);
793 if (res
== EINTR
|| res
== EAGAIN
) {
797 if (res
== EWOULDBLOCK
) {
802 if (res
== ECANCELED
) {
807 DEBUG(1, ("asys_result returned %s\n", strerror(res
)));
811 req
= talloc_get_type_abort(private_data
, struct tevent_req
);
812 state
= tevent_req_data(req
, struct vfswrap_asys_state
);
814 talloc_set_destructor(state
, NULL
);
818 tevent_req_defer_callback(req
, ev
);
819 tevent_req_done(req
);
823 static ssize_t
vfswrap_asys_ssize_t_recv(struct tevent_req
*req
, int *err
)
825 struct vfswrap_asys_state
*state
= tevent_req_data(
826 req
, struct vfswrap_asys_state
);
828 if (tevent_req_is_unix_error(req
, err
)) {
835 static int vfswrap_asys_int_recv(struct tevent_req
*req
, int *err
)
837 struct vfswrap_asys_state
*state
= tevent_req_data(
838 req
, struct vfswrap_asys_state
);
840 if (tevent_req_is_unix_error(req
, err
)) {
847 static off_t
vfswrap_lseek(vfs_handle_struct
*handle
, files_struct
*fsp
, off_t offset
, int whence
)
851 START_PROFILE(syscall_lseek
);
853 /* Cope with 'stat' file opens. */
854 if (fsp
->fh
->fd
!= -1)
855 result
= lseek(fsp
->fh
->fd
, offset
, whence
);
858 * We want to maintain the fiction that we can seek
859 * on a fifo for file system purposes. This allows
860 * people to set up UNIX fifo's that feed data to Windows
864 if((result
== -1) && (errno
== ESPIPE
)) {
869 END_PROFILE(syscall_lseek
);
873 static ssize_t
vfswrap_sendfile(vfs_handle_struct
*handle
, int tofd
, files_struct
*fromfsp
, const DATA_BLOB
*hdr
,
874 off_t offset
, size_t n
)
878 START_PROFILE_BYTES(syscall_sendfile
, n
);
879 result
= sys_sendfile(tofd
, fromfsp
->fh
->fd
, hdr
, offset
, n
);
880 END_PROFILE(syscall_sendfile
);
884 static ssize_t
vfswrap_recvfile(vfs_handle_struct
*handle
,
892 START_PROFILE_BYTES(syscall_recvfile
, n
);
893 result
= sys_recvfile(fromfd
, tofsp
->fh
->fd
, offset
, n
);
894 END_PROFILE(syscall_recvfile
);
898 static int vfswrap_rename(vfs_handle_struct
*handle
,
899 const struct smb_filename
*smb_fname_src
,
900 const struct smb_filename
*smb_fname_dst
)
904 START_PROFILE(syscall_rename
);
906 if (smb_fname_src
->stream_name
|| smb_fname_dst
->stream_name
) {
911 result
= rename(smb_fname_src
->base_name
, smb_fname_dst
->base_name
);
914 END_PROFILE(syscall_rename
);
918 static int vfswrap_fsync(vfs_handle_struct
*handle
, files_struct
*fsp
)
923 START_PROFILE(syscall_fsync
);
924 result
= fsync(fsp
->fh
->fd
);
925 END_PROFILE(syscall_fsync
);
932 static int vfswrap_stat(vfs_handle_struct
*handle
,
933 struct smb_filename
*smb_fname
)
937 START_PROFILE(syscall_stat
);
939 if (smb_fname
->stream_name
) {
944 result
= sys_stat(smb_fname
->base_name
, &smb_fname
->st
,
945 lp_fake_dir_create_times(SNUM(handle
->conn
)));
947 END_PROFILE(syscall_stat
);
951 static int vfswrap_fstat(vfs_handle_struct
*handle
, files_struct
*fsp
, SMB_STRUCT_STAT
*sbuf
)
955 START_PROFILE(syscall_fstat
);
956 result
= sys_fstat(fsp
->fh
->fd
,
957 sbuf
, lp_fake_dir_create_times(SNUM(handle
->conn
)));
958 END_PROFILE(syscall_fstat
);
962 static int vfswrap_lstat(vfs_handle_struct
*handle
,
963 struct smb_filename
*smb_fname
)
967 START_PROFILE(syscall_lstat
);
969 if (smb_fname
->stream_name
) {
974 result
= sys_lstat(smb_fname
->base_name
, &smb_fname
->st
,
975 lp_fake_dir_create_times(SNUM(handle
->conn
)));
977 END_PROFILE(syscall_lstat
);
981 static NTSTATUS
vfswrap_translate_name(struct vfs_handle_struct
*handle
,
983 enum vfs_translate_direction direction
,
987 return NT_STATUS_NONE_MAPPED
;
991 * Implement the default fsctl operation.
993 static bool vfswrap_logged_ioctl_message
= false;
995 static NTSTATUS
vfswrap_fsctl(struct vfs_handle_struct
*handle
,
996 struct files_struct
*fsp
,
999 uint16_t req_flags
, /* Needed for UNICODE ... */
1000 const uint8_t *_in_data
,
1002 uint8_t **_out_data
,
1003 uint32_t max_out_len
,
1006 const char *in_data
= (const char *)_in_data
;
1007 char **out_data
= (char **)_out_data
;
1010 case FSCTL_SET_SPARSE
:
1012 bool set_sparse
= true;
1015 if (in_len
>= 1 && in_data
[0] == 0) {
1019 status
= file_set_sparse(handle
->conn
, fsp
, set_sparse
);
1021 DEBUG(NT_STATUS_IS_OK(status
) ? 10 : 9,
1022 ("FSCTL_SET_SPARSE: fname[%s] set[%u] - %s\n",
1023 smb_fname_str_dbg(fsp
->fsp_name
), set_sparse
,
1024 nt_errstr(status
)));
1029 case FSCTL_CREATE_OR_GET_OBJECT_ID
:
1031 unsigned char objid
[16];
1032 char *return_data
= NULL
;
1034 /* This should return the object-id on this file.
1035 * I think I'll make this be the inode+dev. JRA.
1038 DEBUG(10,("FSCTL_CREATE_OR_GET_OBJECT_ID: called on %s\n",
1039 fsp_fnum_dbg(fsp
)));
1041 *out_len
= (max_out_len
>= 64) ? 64 : max_out_len
;
1042 /* Hmmm, will this cause problems if less data asked for? */
1043 return_data
= talloc_array(ctx
, char, 64);
1044 if (return_data
== NULL
) {
1045 return NT_STATUS_NO_MEMORY
;
1048 /* For backwards compatibility only store the dev/inode. */
1049 push_file_id_16(return_data
, &fsp
->file_id
);
1050 memcpy(return_data
+16,create_volume_objectid(fsp
->conn
,objid
),16);
1051 push_file_id_16(return_data
+32, &fsp
->file_id
);
1052 *out_data
= return_data
;
1053 return NT_STATUS_OK
;
1056 case FSCTL_GET_REPARSE_POINT
:
1058 /* Fail it with STATUS_NOT_A_REPARSE_POINT */
1059 DEBUG(10, ("FSCTL_GET_REPARSE_POINT: called on %s. "
1060 "Status: NOT_IMPLEMENTED\n", fsp_fnum_dbg(fsp
)));
1061 return NT_STATUS_NOT_A_REPARSE_POINT
;
1064 case FSCTL_SET_REPARSE_POINT
:
1066 /* Fail it with STATUS_NOT_A_REPARSE_POINT */
1067 DEBUG(10, ("FSCTL_SET_REPARSE_POINT: called on %s. "
1068 "Status: NOT_IMPLEMENTED\n", fsp_fnum_dbg(fsp
)));
1069 return NT_STATUS_NOT_A_REPARSE_POINT
;
1072 case FSCTL_GET_SHADOW_COPY_DATA
:
1075 * This is called to retrieve the number of Shadow Copies (a.k.a. snapshots)
1076 * and return their volume names. If max_data_count is 16, then it is just
1077 * asking for the number of volumes and length of the combined names.
1079 * pdata is the data allocated by our caller, but that uses
1080 * total_data_count (which is 0 in our case) rather than max_data_count.
1081 * Allocate the correct amount and return the pointer to let
1082 * it be deallocated when we return.
1084 struct shadow_copy_data
*shadow_data
= NULL
;
1085 bool labels
= False
;
1086 uint32 labels_data_count
= 0;
1088 char *cur_pdata
= NULL
;
1090 if (max_out_len
< 16) {
1091 DEBUG(0,("FSCTL_GET_SHADOW_COPY_DATA: max_data_count(%u) < 16 is invalid!\n",
1093 return NT_STATUS_INVALID_PARAMETER
;
1096 if (max_out_len
> 16) {
1100 shadow_data
= talloc_zero(ctx
, struct shadow_copy_data
);
1101 if (shadow_data
== NULL
) {
1102 DEBUG(0,("TALLOC_ZERO() failed!\n"));
1103 return NT_STATUS_NO_MEMORY
;
1107 * Call the VFS routine to actually do the work.
1109 if (SMB_VFS_GET_SHADOW_COPY_DATA(fsp
, shadow_data
, labels
)!=0) {
1110 TALLOC_FREE(shadow_data
);
1111 if (errno
== ENOSYS
) {
1112 DEBUG(5,("FSCTL_GET_SHADOW_COPY_DATA: connectpath %s, not supported.\n",
1113 fsp
->conn
->connectpath
));
1114 return NT_STATUS_NOT_SUPPORTED
;
1116 DEBUG(0,("FSCTL_GET_SHADOW_COPY_DATA: connectpath %s, failed.\n",
1117 fsp
->conn
->connectpath
));
1118 return NT_STATUS_UNSUCCESSFUL
;
1122 labels_data_count
= (shadow_data
->num_volumes
* 2 *
1123 sizeof(SHADOW_COPY_LABEL
)) + 2;
1128 *out_len
= 12 + labels_data_count
;
1131 if (max_out_len
< *out_len
) {
1132 DEBUG(0,("FSCTL_GET_SHADOW_COPY_DATA: max_data_count(%u) too small (%u) bytes needed!\n",
1133 max_out_len
, *out_len
));
1134 TALLOC_FREE(shadow_data
);
1135 return NT_STATUS_BUFFER_TOO_SMALL
;
1138 cur_pdata
= talloc_zero_array(ctx
, char, *out_len
);
1139 if (cur_pdata
== NULL
) {
1140 TALLOC_FREE(shadow_data
);
1141 return NT_STATUS_NO_MEMORY
;
1144 *out_data
= cur_pdata
;
1146 /* num_volumes 4 bytes */
1147 SIVAL(cur_pdata
, 0, shadow_data
->num_volumes
);
1150 /* num_labels 4 bytes */
1151 SIVAL(cur_pdata
, 4, shadow_data
->num_volumes
);
1154 /* needed_data_count 4 bytes */
1155 SIVAL(cur_pdata
, 8, labels_data_count
);
1159 DEBUG(10,("FSCTL_GET_SHADOW_COPY_DATA: %u volumes for path[%s].\n",
1160 shadow_data
->num_volumes
, fsp_str_dbg(fsp
)));
1161 if (labels
&& shadow_data
->labels
) {
1162 for (i
=0; i
<shadow_data
->num_volumes
; i
++) {
1163 srvstr_push(cur_pdata
, req_flags
,
1164 cur_pdata
, shadow_data
->labels
[i
],
1165 2 * sizeof(SHADOW_COPY_LABEL
),
1166 STR_UNICODE
|STR_TERMINATE
);
1167 cur_pdata
+= 2 * sizeof(SHADOW_COPY_LABEL
);
1168 DEBUGADD(10,("Label[%u]: '%s'\n",i
,shadow_data
->labels
[i
]));
1172 TALLOC_FREE(shadow_data
);
1174 return NT_STATUS_OK
;
1177 case FSCTL_FIND_FILES_BY_SID
:
1179 /* pretend this succeeded -
1181 * we have to send back a list with all files owned by this SID
1183 * but I have to check that --metze
1189 DEBUG(10, ("FSCTL_FIND_FILES_BY_SID: called on %s\n",
1190 fsp_fnum_dbg(fsp
)));
1193 /* NT_STATUS_BUFFER_TOO_SMALL maybe? */
1194 return NT_STATUS_INVALID_PARAMETER
;
1197 sid_len
= MIN(in_len
- 4,SID_MAX_SIZE
);
1199 /* unknown 4 bytes: this is not the length of the sid :-( */
1200 /*unknown = IVAL(pdata,0);*/
1202 if (!sid_parse(in_data
+ 4, sid_len
, &sid
)) {
1203 return NT_STATUS_INVALID_PARAMETER
;
1205 DEBUGADD(10, ("for SID: %s\n", sid_string_dbg(&sid
)));
1207 if (!sid_to_uid(&sid
, &uid
)) {
1208 DEBUG(0,("sid_to_uid: failed, sid[%s] sid_len[%lu]\n",
1209 sid_string_dbg(&sid
),
1210 (unsigned long)sid_len
));
1214 /* we can take a look at the find source :-)
1216 * find ./ -uid $uid -name '*' is what we need here
1219 * and send 4bytes len and then NULL terminated unicode strings
1222 * but I don't know how to deal with the paged results
1223 * (maybe we can hang the result anywhere in the fsp struct)
1225 * but I don't know how to deal with the paged results
1226 * (maybe we can hang the result anywhere in the fsp struct)
1228 * we don't send all files at once
1229 * and at the next we should *not* start from the beginning,
1230 * so we have to cache the result
1235 /* this works for now... */
1236 return NT_STATUS_OK
;
1239 case FSCTL_QUERY_ALLOCATED_RANGES
:
1241 /* FIXME: This is just a dummy reply, telling that all of the
1242 * file is allocated. MKS cp needs that.
1243 * Adding the real allocated ranges via FIEMAP on Linux
1244 * and SEEK_DATA/SEEK_HOLE on Solaris is needed to make
1245 * this FSCTL correct for sparse files.
1248 uint64_t offset
, length
;
1249 char *out_data_tmp
= NULL
;
1252 DEBUG(0,("FSCTL_QUERY_ALLOCATED_RANGES: data_count(%u) != 16 is invalid!\n",
1254 return NT_STATUS_INVALID_PARAMETER
;
1257 if (max_out_len
< 16) {
1258 DEBUG(0,("FSCTL_QUERY_ALLOCATED_RANGES: max_out_len (%u) < 16 is invalid!\n",
1260 return NT_STATUS_INVALID_PARAMETER
;
1263 offset
= BVAL(in_data
,0);
1264 length
= BVAL(in_data
,8);
1266 if (offset
+ length
< offset
) {
1267 /* No 64-bit integer wrap. */
1268 return NT_STATUS_INVALID_PARAMETER
;
1271 /* Shouldn't this be SMB_VFS_STAT ... ? */
1272 status
= vfs_stat_fsp(fsp
);
1273 if (!NT_STATUS_IS_OK(status
)) {
1278 out_data_tmp
= talloc_array(ctx
, char, *out_len
);
1279 if (out_data_tmp
== NULL
) {
1280 DEBUG(10, ("unable to allocate memory for response\n"));
1281 return NT_STATUS_NO_MEMORY
;
1284 if (offset
> fsp
->fsp_name
->st
.st_ex_size
||
1285 fsp
->fsp_name
->st
.st_ex_size
== 0 ||
1287 memset(out_data_tmp
, 0, *out_len
);
1289 uint64_t end
= offset
+ length
;
1290 end
= MIN(end
, fsp
->fsp_name
->st
.st_ex_size
);
1291 SBVAL(out_data_tmp
, 0, 0);
1292 SBVAL(out_data_tmp
, 8, end
);
1295 *out_data
= out_data_tmp
;
1297 return NT_STATUS_OK
;
1300 case FSCTL_IS_VOLUME_DIRTY
:
1302 DEBUG(10,("FSCTL_IS_VOLUME_DIRTY: called on %s "
1303 "(but remotely not supported)\n", fsp_fnum_dbg(fsp
)));
1305 * http://msdn.microsoft.com/en-us/library/cc232128%28PROT.10%29.aspx
1306 * says we have to respond with NT_STATUS_INVALID_PARAMETER
1308 return NT_STATUS_INVALID_PARAMETER
;
1313 * Only print once ... unfortunately there could be lots of
1314 * different FSCTLs that are called.
1316 if (!vfswrap_logged_ioctl_message
) {
1317 vfswrap_logged_ioctl_message
= true;
1318 DEBUG(2, ("%s (0x%x): Currently not implemented.\n",
1319 __func__
, function
));
1323 return NT_STATUS_NOT_SUPPORTED
;
1326 /********************************************************************
1327 Given a stat buffer return the allocated size on disk, taking into
1328 account sparse files.
1329 ********************************************************************/
1330 static uint64_t vfswrap_get_alloc_size(vfs_handle_struct
*handle
,
1331 struct files_struct
*fsp
,
1332 const SMB_STRUCT_STAT
*sbuf
)
1336 START_PROFILE(syscall_get_alloc_size
);
1338 if(S_ISDIR(sbuf
->st_ex_mode
)) {
1343 #if defined(HAVE_STAT_ST_BLOCKS) && defined(STAT_ST_BLOCKSIZE)
1344 /* The type of st_blocksize is blkcnt_t which *MUST* be
1345 signed (according to POSIX) and can be less than 64-bits.
1346 Ensure when we're converting to 64 bits wide we don't
1348 #if defined(SIZEOF_BLKCNT_T_8)
1349 result
= (uint64_t)STAT_ST_BLOCKSIZE
* (uint64_t)sbuf
->st_ex_blocks
;
1350 #elif defined(SIZEOF_BLKCNT_T_4)
1352 uint64_t bs
= ((uint64_t)sbuf
->st_ex_blocks
) & 0xFFFFFFFFLL
;
1353 result
= (uint64_t)STAT_ST_BLOCKSIZE
* bs
;
1356 #error SIZEOF_BLKCNT_T_NOT_A_SUPPORTED_VALUE
1360 * Some file systems do not allocate a block for very
1361 * small files. But for non-empty file should report a
1365 uint64_t filesize
= get_file_size_stat(sbuf
);
1367 result
= MIN((uint64_t)STAT_ST_BLOCKSIZE
, filesize
);
1371 result
= get_file_size_stat(sbuf
);
1374 if (fsp
&& fsp
->initial_allocation_size
)
1375 result
= MAX(result
,fsp
->initial_allocation_size
);
1377 result
= smb_roundup(handle
->conn
, result
);
1380 END_PROFILE(syscall_get_alloc_size
);
1384 static int vfswrap_unlink(vfs_handle_struct
*handle
,
1385 const struct smb_filename
*smb_fname
)
1389 START_PROFILE(syscall_unlink
);
1391 if (smb_fname
->stream_name
) {
1395 result
= unlink(smb_fname
->base_name
);
1398 END_PROFILE(syscall_unlink
);
1402 static int vfswrap_chmod(vfs_handle_struct
*handle
, const char *path
, mode_t mode
)
1406 START_PROFILE(syscall_chmod
);
1409 * We need to do this due to the fact that the default POSIX ACL
1410 * chmod modifies the ACL *mask* for the group owner, not the
1411 * group owner bits directly. JRA.
1416 int saved_errno
= errno
; /* We might get ENOSYS */
1417 if ((result
= SMB_VFS_CHMOD_ACL(handle
->conn
, path
, mode
)) == 0) {
1418 END_PROFILE(syscall_chmod
);
1421 /* Error - return the old errno. */
1422 errno
= saved_errno
;
1425 result
= chmod(path
, mode
);
1426 END_PROFILE(syscall_chmod
);
1430 static int vfswrap_fchmod(vfs_handle_struct
*handle
, files_struct
*fsp
, mode_t mode
)
1434 START_PROFILE(syscall_fchmod
);
1437 * We need to do this due to the fact that the default POSIX ACL
1438 * chmod modifies the ACL *mask* for the group owner, not the
1439 * group owner bits directly. JRA.
1443 int saved_errno
= errno
; /* We might get ENOSYS */
1444 if ((result
= SMB_VFS_FCHMOD_ACL(fsp
, mode
)) == 0) {
1445 END_PROFILE(syscall_fchmod
);
1448 /* Error - return the old errno. */
1449 errno
= saved_errno
;
1452 #if defined(HAVE_FCHMOD)
1453 result
= fchmod(fsp
->fh
->fd
, mode
);
1459 END_PROFILE(syscall_fchmod
);
1463 static int vfswrap_chown(vfs_handle_struct
*handle
, const char *path
, uid_t uid
, gid_t gid
)
1467 START_PROFILE(syscall_chown
);
1468 result
= chown(path
, uid
, gid
);
1469 END_PROFILE(syscall_chown
);
1473 static int vfswrap_fchown(vfs_handle_struct
*handle
, files_struct
*fsp
, uid_t uid
, gid_t gid
)
1478 START_PROFILE(syscall_fchown
);
1479 result
= fchown(fsp
->fh
->fd
, uid
, gid
);
1480 END_PROFILE(syscall_fchown
);
1488 static int vfswrap_lchown(vfs_handle_struct
*handle
, const char *path
, uid_t uid
, gid_t gid
)
1492 START_PROFILE(syscall_lchown
);
1493 result
= lchown(path
, uid
, gid
);
1494 END_PROFILE(syscall_lchown
);
1498 static int vfswrap_chdir(vfs_handle_struct
*handle
, const char *path
)
1502 START_PROFILE(syscall_chdir
);
1503 result
= chdir(path
);
1504 END_PROFILE(syscall_chdir
);
1508 static char *vfswrap_getwd(vfs_handle_struct
*handle
)
1512 START_PROFILE(syscall_getwd
);
1513 result
= sys_getwd();
1514 END_PROFILE(syscall_getwd
);
1518 /*********************************************************************
1519 nsec timestamp resolution call. Convert down to whatever the underlying
1520 system will support.
1521 **********************************************************************/
1523 static int vfswrap_ntimes(vfs_handle_struct
*handle
,
1524 const struct smb_filename
*smb_fname
,
1525 struct smb_file_time
*ft
)
1529 START_PROFILE(syscall_ntimes
);
1531 if (smb_fname
->stream_name
) {
1537 if (null_timespec(ft
->atime
)) {
1538 ft
->atime
= smb_fname
->st
.st_ex_atime
;
1541 if (null_timespec(ft
->mtime
)) {
1542 ft
->mtime
= smb_fname
->st
.st_ex_mtime
;
1545 if (!null_timespec(ft
->create_time
)) {
1546 set_create_timespec_ea(handle
->conn
,
1551 if ((timespec_compare(&ft
->atime
,
1552 &smb_fname
->st
.st_ex_atime
) == 0) &&
1553 (timespec_compare(&ft
->mtime
,
1554 &smb_fname
->st
.st_ex_mtime
) == 0)) {
1559 #if defined(HAVE_UTIMENSAT)
1561 struct timespec ts
[2];
1564 result
= utimensat(AT_FDCWD
, smb_fname
->base_name
, ts
, 0);
1566 result
= utimensat(AT_FDCWD
, smb_fname
->base_name
, NULL
, 0);
1568 if (!((result
== -1) && (errno
== ENOSYS
))) {
1572 #if defined(HAVE_UTIMES)
1574 struct timeval tv
[2];
1575 tv
[0] = convert_timespec_to_timeval(ft
->atime
);
1576 tv
[1] = convert_timespec_to_timeval(ft
->mtime
);
1577 result
= utimes(smb_fname
->base_name
, tv
);
1579 result
= utimes(smb_fname
->base_name
, NULL
);
1581 if (!((result
== -1) && (errno
== ENOSYS
))) {
1585 #if defined(HAVE_UTIME)
1587 struct utimbuf times
;
1588 times
.actime
= convert_timespec_to_time_t(ft
->atime
);
1589 times
.modtime
= convert_timespec_to_time_t(ft
->mtime
);
1590 result
= utime(smb_fname
->base_name
, ×
);
1592 result
= utime(smb_fname
->base_name
, NULL
);
1594 if (!((result
== -1) && (errno
== ENOSYS
))) {
1602 END_PROFILE(syscall_ntimes
);
1606 /*********************************************************************
1607 A version of ftruncate that will write the space on disk if strict
1609 **********************************************************************/
1611 static int strict_allocate_ftruncate(vfs_handle_struct
*handle
, files_struct
*fsp
, off_t len
)
1613 off_t space_to_write
;
1614 uint64_t space_avail
;
1615 uint64_t bsize
,dfree
,dsize
;
1618 SMB_STRUCT_STAT
*pst
;
1620 status
= vfs_stat_fsp(fsp
);
1621 if (!NT_STATUS_IS_OK(status
)) {
1624 pst
= &fsp
->fsp_name
->st
;
1627 if (S_ISFIFO(pst
->st_ex_mode
))
1631 if (pst
->st_ex_size
== len
)
1634 /* Shrink - just ftruncate. */
1635 if (pst
->st_ex_size
> len
)
1636 return ftruncate(fsp
->fh
->fd
, len
);
1638 space_to_write
= len
- pst
->st_ex_size
;
1640 /* for allocation try fallocate first. This can fail on some
1641 platforms e.g. when the filesystem doesn't support it and no
1642 emulation is being done by the libc (like on AIX with JFS1). In that
1643 case we do our own emulation. fallocate implementations can
1644 return ENOTSUP or EINVAL in cases like that. */
1645 ret
= SMB_VFS_FALLOCATE(fsp
, VFS_FALLOCATE_EXTEND_SIZE
,
1646 pst
->st_ex_size
, space_to_write
);
1647 if (ret
== -1 && errno
== ENOSPC
) {
1653 DEBUG(10,("strict_allocate_ftruncate: SMB_VFS_FALLOCATE failed with "
1654 "error %d. Falling back to slow manual allocation\n", errno
));
1656 /* available disk space is enough or not? */
1657 space_avail
= get_dfree_info(fsp
->conn
,
1658 fsp
->fsp_name
->base_name
, false,
1659 &bsize
,&dfree
,&dsize
);
1660 /* space_avail is 1k blocks */
1661 if (space_avail
== (uint64_t)-1 ||
1662 ((uint64_t)space_to_write
/1024 > space_avail
) ) {
1667 /* Write out the real space on disk. */
1668 ret
= vfs_slow_fallocate(fsp
, pst
->st_ex_size
, space_to_write
);
1676 static int vfswrap_ftruncate(vfs_handle_struct
*handle
, files_struct
*fsp
, off_t len
)
1679 SMB_STRUCT_STAT
*pst
;
1683 START_PROFILE(syscall_ftruncate
);
1685 if (lp_strict_allocate(SNUM(fsp
->conn
)) && !fsp
->is_sparse
) {
1686 result
= strict_allocate_ftruncate(handle
, fsp
, len
);
1687 END_PROFILE(syscall_ftruncate
);
1691 /* we used to just check HAVE_FTRUNCATE_EXTEND and only use
1692 ftruncate if the system supports it. Then I discovered that
1693 you can have some filesystems that support ftruncate
1694 expansion and some that don't! On Linux fat can't do
1695 ftruncate extend but ext2 can. */
1697 result
= ftruncate(fsp
->fh
->fd
, len
);
1701 /* According to W. R. Stevens advanced UNIX prog. Pure 4.3 BSD cannot
1702 extend a file with ftruncate. Provide alternate implementation
1705 /* Do an fstat to see if the file is longer than the requested
1706 size in which case the ftruncate above should have
1707 succeeded or shorter, in which case seek to len - 1 and
1708 write 1 byte of zero */
1709 status
= vfs_stat_fsp(fsp
);
1710 if (!NT_STATUS_IS_OK(status
)) {
1713 pst
= &fsp
->fsp_name
->st
;
1716 if (S_ISFIFO(pst
->st_ex_mode
)) {
1722 if (pst
->st_ex_size
== len
) {
1727 if (pst
->st_ex_size
> len
) {
1728 /* the ftruncate should have worked */
1732 if (SMB_VFS_PWRITE(fsp
, &c
, 1, len
-1)!=1) {
1740 END_PROFILE(syscall_ftruncate
);
1744 static int vfswrap_fallocate(vfs_handle_struct
*handle
,
1746 enum vfs_fallocate_mode mode
,
1752 START_PROFILE(syscall_fallocate
);
1753 if (mode
== VFS_FALLOCATE_EXTEND_SIZE
) {
1754 result
= sys_posix_fallocate(fsp
->fh
->fd
, offset
, len
);
1756 * posix_fallocate returns 0 on success, errno on error
1757 * and doesn't set errno. Make it behave like fallocate()
1758 * which returns -1, and sets errno on failure.
1764 } else if (mode
== VFS_FALLOCATE_KEEP_SIZE
) {
1765 result
= sys_fallocate(fsp
->fh
->fd
, mode
, offset
, len
);
1770 END_PROFILE(syscall_fallocate
);
1774 static bool vfswrap_lock(vfs_handle_struct
*handle
, files_struct
*fsp
, int op
, off_t offset
, off_t count
, int type
)
1778 START_PROFILE(syscall_fcntl_lock
);
1779 result
= fcntl_lock(fsp
->fh
->fd
, op
, offset
, count
, type
);
1780 END_PROFILE(syscall_fcntl_lock
);
1784 static int vfswrap_kernel_flock(vfs_handle_struct
*handle
, files_struct
*fsp
,
1785 uint32 share_mode
, uint32 access_mask
)
1787 START_PROFILE(syscall_kernel_flock
);
1788 kernel_flock(fsp
->fh
->fd
, share_mode
, access_mask
);
1789 END_PROFILE(syscall_kernel_flock
);
1793 static bool vfswrap_getlock(vfs_handle_struct
*handle
, files_struct
*fsp
, off_t
*poffset
, off_t
*pcount
, int *ptype
, pid_t
*ppid
)
1797 START_PROFILE(syscall_fcntl_getlock
);
1798 result
= fcntl_getlock(fsp
->fh
->fd
, poffset
, pcount
, ptype
, ppid
);
1799 END_PROFILE(syscall_fcntl_getlock
);
1803 static int vfswrap_linux_setlease(vfs_handle_struct
*handle
, files_struct
*fsp
,
1808 START_PROFILE(syscall_linux_setlease
);
1810 #ifdef HAVE_KERNEL_OPLOCKS_LINUX
1811 result
= linux_setlease(fsp
->fh
->fd
, leasetype
);
1815 END_PROFILE(syscall_linux_setlease
);
1819 static int vfswrap_symlink(vfs_handle_struct
*handle
, const char *oldpath
, const char *newpath
)
1823 START_PROFILE(syscall_symlink
);
1824 result
= symlink(oldpath
, newpath
);
1825 END_PROFILE(syscall_symlink
);
1829 static int vfswrap_readlink(vfs_handle_struct
*handle
, const char *path
, char *buf
, size_t bufsiz
)
1833 START_PROFILE(syscall_readlink
);
1834 result
= readlink(path
, buf
, bufsiz
);
1835 END_PROFILE(syscall_readlink
);
1839 static int vfswrap_link(vfs_handle_struct
*handle
, const char *oldpath
, const char *newpath
)
1843 START_PROFILE(syscall_link
);
1844 result
= link(oldpath
, newpath
);
1845 END_PROFILE(syscall_link
);
1849 static int vfswrap_mknod(vfs_handle_struct
*handle
, const char *pathname
, mode_t mode
, SMB_DEV_T dev
)
1853 START_PROFILE(syscall_mknod
);
1854 result
= sys_mknod(pathname
, mode
, dev
);
1855 END_PROFILE(syscall_mknod
);
1859 static char *vfswrap_realpath(vfs_handle_struct
*handle
, const char *path
)
1863 START_PROFILE(syscall_realpath
);
1864 #ifdef REALPATH_TAKES_NULL
1865 result
= realpath(path
, NULL
);
1867 result
= SMB_MALLOC_ARRAY(char, PATH_MAX
+1);
1869 char *resolved_path
= realpath(path
, result
);
1870 if (!resolved_path
) {
1873 /* SMB_ASSERT(result == resolved_path) ? */
1874 result
= resolved_path
;
1878 END_PROFILE(syscall_realpath
);
1882 static NTSTATUS
vfswrap_notify_watch(vfs_handle_struct
*vfs_handle
,
1883 struct sys_notify_context
*ctx
,
1886 uint32_t *subdir_filter
,
1887 void (*callback
)(struct sys_notify_context
*ctx
,
1889 struct notify_event
*ev
),
1890 void *private_data
, void *handle
)
1893 * So far inotify is the only supported default notify mechanism. If
1894 * another platform like the the BSD's or a proprietary Unix comes
1895 * along and wants another default, we can play the same trick we
1896 * played with Posix ACLs.
1898 * Until that is the case, hard-code inotify here.
1901 if (lp_kernel_change_notify(vfs_handle
->conn
->params
)) {
1902 return inotify_watch(ctx
, path
, filter
, subdir_filter
,
1903 callback
, private_data
, handle
);
1907 * Do nothing, leave everything to notify_internal.c
1909 return NT_STATUS_OK
;
1912 static int vfswrap_chflags(vfs_handle_struct
*handle
, const char *path
,
1916 return chflags(path
, flags
);
1923 static struct file_id
vfswrap_file_id_create(struct vfs_handle_struct
*handle
,
1924 const SMB_STRUCT_STAT
*sbuf
)
1928 /* the ZERO_STRUCT ensures padding doesn't break using the key as a
1932 key
.devid
= sbuf
->st_ex_dev
;
1933 key
.inode
= sbuf
->st_ex_ino
;
1934 /* key.extid is unused by default. */
1939 static NTSTATUS
vfswrap_streaminfo(vfs_handle_struct
*handle
,
1940 struct files_struct
*fsp
,
1942 TALLOC_CTX
*mem_ctx
,
1943 unsigned int *pnum_streams
,
1944 struct stream_struct
**pstreams
)
1946 SMB_STRUCT_STAT sbuf
;
1947 struct stream_struct
*tmp_streams
= NULL
;
1950 if ((fsp
!= NULL
) && (fsp
->is_directory
)) {
1952 * No default streams on directories
1957 if ((fsp
!= NULL
) && (fsp
->fh
->fd
!= -1)) {
1958 ret
= SMB_VFS_FSTAT(fsp
, &sbuf
);
1961 struct smb_filename smb_fname
;
1963 ZERO_STRUCT(smb_fname
);
1964 smb_fname
.base_name
= discard_const_p(char, fname
);
1966 if (lp_posix_pathnames()) {
1967 ret
= SMB_VFS_LSTAT(handle
->conn
, &smb_fname
);
1969 ret
= SMB_VFS_STAT(handle
->conn
, &smb_fname
);
1971 sbuf
= smb_fname
.st
;
1975 return map_nt_error_from_unix(errno
);
1978 if (S_ISDIR(sbuf
.st_ex_mode
)) {
1982 tmp_streams
= talloc_realloc(mem_ctx
, *pstreams
, struct stream_struct
,
1983 (*pnum_streams
) + 1);
1984 if (tmp_streams
== NULL
) {
1985 return NT_STATUS_NO_MEMORY
;
1987 tmp_streams
[*pnum_streams
].name
= talloc_strdup(tmp_streams
, "::$DATA");
1988 if (tmp_streams
[*pnum_streams
].name
== NULL
) {
1989 return NT_STATUS_NO_MEMORY
;
1991 tmp_streams
[*pnum_streams
].size
= sbuf
.st_ex_size
;
1992 tmp_streams
[*pnum_streams
].alloc_size
= SMB_VFS_GET_ALLOC_SIZE(handle
->conn
, fsp
, &sbuf
);
1995 *pstreams
= tmp_streams
;
1997 return NT_STATUS_OK
;
2000 static int vfswrap_get_real_filename(struct vfs_handle_struct
*handle
,
2003 TALLOC_CTX
*mem_ctx
,
2007 * Don't fall back to get_real_filename so callers can differentiate
2008 * between a full directory scan and an actual case-insensitive stat.
2014 static const char *vfswrap_connectpath(struct vfs_handle_struct
*handle
,
2017 return handle
->conn
->connectpath
;
2020 static NTSTATUS
vfswrap_brl_lock_windows(struct vfs_handle_struct
*handle
,
2021 struct byte_range_lock
*br_lck
,
2022 struct lock_struct
*plock
,
2024 struct blocking_lock_record
*blr
)
2026 SMB_ASSERT(plock
->lock_flav
== WINDOWS_LOCK
);
2028 /* Note: blr is not used in the default implementation. */
2029 return brl_lock_windows_default(br_lck
, plock
, blocking_lock
);
2032 static bool vfswrap_brl_unlock_windows(struct vfs_handle_struct
*handle
,
2033 struct messaging_context
*msg_ctx
,
2034 struct byte_range_lock
*br_lck
,
2035 const struct lock_struct
*plock
)
2037 SMB_ASSERT(plock
->lock_flav
== WINDOWS_LOCK
);
2039 return brl_unlock_windows_default(msg_ctx
, br_lck
, plock
);
2042 static bool vfswrap_brl_cancel_windows(struct vfs_handle_struct
*handle
,
2043 struct byte_range_lock
*br_lck
,
2044 struct lock_struct
*plock
,
2045 struct blocking_lock_record
*blr
)
2047 SMB_ASSERT(plock
->lock_flav
== WINDOWS_LOCK
);
2049 /* Note: blr is not used in the default implementation. */
2050 return brl_lock_cancel_default(br_lck
, plock
);
2053 static bool vfswrap_strict_lock(struct vfs_handle_struct
*handle
,
2055 struct lock_struct
*plock
)
2057 SMB_ASSERT(plock
->lock_type
== READ_LOCK
||
2058 plock
->lock_type
== WRITE_LOCK
);
2060 return strict_lock_default(fsp
, plock
);
2063 static void vfswrap_strict_unlock(struct vfs_handle_struct
*handle
,
2065 struct lock_struct
*plock
)
2067 SMB_ASSERT(plock
->lock_type
== READ_LOCK
||
2068 plock
->lock_type
== WRITE_LOCK
);
2070 strict_unlock_default(fsp
, plock
);
2073 /* NT ACL operations. */
2075 static NTSTATUS
vfswrap_fget_nt_acl(vfs_handle_struct
*handle
,
2077 uint32 security_info
,
2078 TALLOC_CTX
*mem_ctx
,
2079 struct security_descriptor
**ppdesc
)
2083 START_PROFILE(fget_nt_acl
);
2084 result
= posix_fget_nt_acl(fsp
, security_info
,
2086 END_PROFILE(fget_nt_acl
);
2090 static NTSTATUS
vfswrap_get_nt_acl(vfs_handle_struct
*handle
,
2092 uint32 security_info
,
2093 TALLOC_CTX
*mem_ctx
,
2094 struct security_descriptor
**ppdesc
)
2098 START_PROFILE(get_nt_acl
);
2099 result
= posix_get_nt_acl(handle
->conn
, name
, security_info
,
2101 END_PROFILE(get_nt_acl
);
2105 static NTSTATUS
vfswrap_fset_nt_acl(vfs_handle_struct
*handle
, files_struct
*fsp
, uint32 security_info_sent
, const struct security_descriptor
*psd
)
2109 START_PROFILE(fset_nt_acl
);
2110 result
= set_nt_acl(fsp
, security_info_sent
, psd
);
2111 END_PROFILE(fset_nt_acl
);
2115 static NTSTATUS
vfswrap_audit_file(struct vfs_handle_struct
*handle
,
2116 struct smb_filename
*file
,
2117 struct security_acl
*sacl
,
2118 uint32_t access_requested
,
2119 uint32_t access_denied
)
2121 return NT_STATUS_OK
; /* Nothing to do here ... */
2124 static int vfswrap_chmod_acl(vfs_handle_struct
*handle
, const char *name
, mode_t mode
)
2132 START_PROFILE(chmod_acl
);
2133 result
= chmod_acl(handle
->conn
, name
, mode
);
2134 END_PROFILE(chmod_acl
);
2139 static int vfswrap_fchmod_acl(vfs_handle_struct
*handle
, files_struct
*fsp
, mode_t mode
)
2147 START_PROFILE(fchmod_acl
);
2148 result
= fchmod_acl(fsp
, mode
);
2149 END_PROFILE(fchmod_acl
);
2154 static SMB_ACL_T
vfswrap_sys_acl_get_file(vfs_handle_struct
*handle
,
2156 SMB_ACL_TYPE_T type
,
2157 TALLOC_CTX
*mem_ctx
)
2159 return sys_acl_get_file(handle
, path_p
, type
, mem_ctx
);
2162 static SMB_ACL_T
vfswrap_sys_acl_get_fd(vfs_handle_struct
*handle
,
2164 TALLOC_CTX
*mem_ctx
)
2166 return sys_acl_get_fd(handle
, fsp
, mem_ctx
);
2169 static int vfswrap_sys_acl_blob_get_file(vfs_handle_struct
*handle
,
2171 TALLOC_CTX
*mem_ctx
,
2172 char **blob_description
,
2179 static int vfswrap_sys_acl_blob_get_fd(vfs_handle_struct
*handle
,
2181 TALLOC_CTX
*mem_ctx
,
2182 char **blob_description
,
2189 static int vfswrap_sys_acl_set_file(vfs_handle_struct
*handle
, const char *name
, SMB_ACL_TYPE_T acltype
, SMB_ACL_T theacl
)
2191 return sys_acl_set_file(handle
, name
, acltype
, theacl
);
2194 static int vfswrap_sys_acl_set_fd(vfs_handle_struct
*handle
, files_struct
*fsp
, SMB_ACL_T theacl
)
2196 return sys_acl_set_fd(handle
, fsp
, theacl
);
2199 static int vfswrap_sys_acl_delete_def_file(vfs_handle_struct
*handle
, const char *path
)
2201 return sys_acl_delete_def_file(handle
, path
);
2204 /****************************************************************
2205 Extended attribute operations.
2206 *****************************************************************/
2208 static ssize_t
vfswrap_getxattr(struct vfs_handle_struct
*handle
,const char *path
, const char *name
, void *value
, size_t size
)
2210 return getxattr(path
, name
, value
, size
);
2213 static ssize_t
vfswrap_fgetxattr(struct vfs_handle_struct
*handle
, struct files_struct
*fsp
, const char *name
, void *value
, size_t size
)
2215 return fgetxattr(fsp
->fh
->fd
, name
, value
, size
);
2218 static ssize_t
vfswrap_listxattr(struct vfs_handle_struct
*handle
, const char *path
, char *list
, size_t size
)
2220 return listxattr(path
, list
, size
);
2223 static ssize_t
vfswrap_flistxattr(struct vfs_handle_struct
*handle
, struct files_struct
*fsp
, char *list
, size_t size
)
2225 return flistxattr(fsp
->fh
->fd
, list
, size
);
2228 static int vfswrap_removexattr(struct vfs_handle_struct
*handle
, const char *path
, const char *name
)
2230 return removexattr(path
, name
);
2233 static int vfswrap_fremovexattr(struct vfs_handle_struct
*handle
, struct files_struct
*fsp
, const char *name
)
2235 return fremovexattr(fsp
->fh
->fd
, name
);
2238 static int vfswrap_setxattr(struct vfs_handle_struct
*handle
, const char *path
, const char *name
, const void *value
, size_t size
, int flags
)
2240 return setxattr(path
, name
, value
, size
, flags
);
2243 static int vfswrap_fsetxattr(struct vfs_handle_struct
*handle
, struct files_struct
*fsp
, const char *name
, const void *value
, size_t size
, int flags
)
2245 return fsetxattr(fsp
->fh
->fd
, name
, value
, size
, flags
);
2248 static bool vfswrap_aio_force(struct vfs_handle_struct
*handle
, struct files_struct
*fsp
)
2253 static bool vfswrap_is_offline(struct vfs_handle_struct
*handle
,
2254 const struct smb_filename
*fname
,
2255 SMB_STRUCT_STAT
*sbuf
)
2259 bool offline
= false;
2261 if (ISDOT(fname
->base_name
) || ISDOTDOT(fname
->base_name
)) {
2265 if (!lp_dmapi_support(SNUM(handle
->conn
)) || !dmapi_have_session()) {
2266 #if defined(ENOTSUP)
2272 status
= get_full_smb_filename(talloc_tos(), fname
, &path
);
2273 if (!NT_STATUS_IS_OK(status
)) {
2274 errno
= map_errno_from_nt_status(status
);
2278 offline
= (dmapi_file_flags(path
) & FILE_ATTRIBUTE_OFFLINE
) != 0;
2285 static int vfswrap_set_offline(struct vfs_handle_struct
*handle
,
2286 const struct smb_filename
*fname
)
2288 /* We don't know how to set offline bit by default, needs to be overriden in the vfs modules */
2289 #if defined(ENOTSUP)
2295 static NTSTATUS
vfswrap_durable_cookie(struct vfs_handle_struct
*handle
,
2296 struct files_struct
*fsp
,
2297 TALLOC_CTX
*mem_ctx
,
2300 return vfs_default_durable_cookie(fsp
, mem_ctx
, cookie
);
2303 static NTSTATUS
vfswrap_durable_disconnect(struct vfs_handle_struct
*handle
,
2304 struct files_struct
*fsp
,
2305 const DATA_BLOB old_cookie
,
2306 TALLOC_CTX
*mem_ctx
,
2307 DATA_BLOB
*new_cookie
)
2309 return vfs_default_durable_disconnect(fsp
, old_cookie
, mem_ctx
,
2313 static NTSTATUS
vfswrap_durable_reconnect(struct vfs_handle_struct
*handle
,
2314 struct smb_request
*smb1req
,
2315 struct smbXsrv_open
*op
,
2316 const DATA_BLOB old_cookie
,
2317 TALLOC_CTX
*mem_ctx
,
2318 struct files_struct
**fsp
,
2319 DATA_BLOB
*new_cookie
)
2321 return vfs_default_durable_reconnect(handle
->conn
, smb1req
, op
,
2322 old_cookie
, mem_ctx
,
2326 static struct vfs_fn_pointers vfs_default_fns
= {
2327 /* Disk operations */
2329 .connect_fn
= vfswrap_connect
,
2330 .disconnect_fn
= vfswrap_disconnect
,
2331 .disk_free_fn
= vfswrap_disk_free
,
2332 .get_quota_fn
= vfswrap_get_quota
,
2333 .set_quota_fn
= vfswrap_set_quota
,
2334 .get_shadow_copy_data_fn
= vfswrap_get_shadow_copy_data
,
2335 .statvfs_fn
= vfswrap_statvfs
,
2336 .fs_capabilities_fn
= vfswrap_fs_capabilities
,
2337 .get_dfs_referrals_fn
= vfswrap_get_dfs_referrals
,
2339 /* Directory operations */
2341 .opendir_fn
= vfswrap_opendir
,
2342 .fdopendir_fn
= vfswrap_fdopendir
,
2343 .readdir_fn
= vfswrap_readdir
,
2344 .seekdir_fn
= vfswrap_seekdir
,
2345 .telldir_fn
= vfswrap_telldir
,
2346 .rewind_dir_fn
= vfswrap_rewinddir
,
2347 .mkdir_fn
= vfswrap_mkdir
,
2348 .rmdir_fn
= vfswrap_rmdir
,
2349 .closedir_fn
= vfswrap_closedir
,
2350 .init_search_op_fn
= vfswrap_init_search_op
,
2352 /* File operations */
2354 .open_fn
= vfswrap_open
,
2355 .create_file_fn
= vfswrap_create_file
,
2356 .close_fn
= vfswrap_close
,
2357 .read_fn
= vfswrap_read
,
2358 .pread_fn
= vfswrap_pread
,
2359 .pread_send_fn
= vfswrap_pread_send
,
2360 .pread_recv_fn
= vfswrap_asys_ssize_t_recv
,
2361 .write_fn
= vfswrap_write
,
2362 .pwrite_fn
= vfswrap_pwrite
,
2363 .pwrite_send_fn
= vfswrap_pwrite_send
,
2364 .pwrite_recv_fn
= vfswrap_asys_ssize_t_recv
,
2365 .lseek_fn
= vfswrap_lseek
,
2366 .sendfile_fn
= vfswrap_sendfile
,
2367 .recvfile_fn
= vfswrap_recvfile
,
2368 .rename_fn
= vfswrap_rename
,
2369 .fsync_fn
= vfswrap_fsync
,
2370 .fsync_send_fn
= vfswrap_fsync_send
,
2371 .fsync_recv_fn
= vfswrap_asys_int_recv
,
2372 .stat_fn
= vfswrap_stat
,
2373 .fstat_fn
= vfswrap_fstat
,
2374 .lstat_fn
= vfswrap_lstat
,
2375 .get_alloc_size_fn
= vfswrap_get_alloc_size
,
2376 .unlink_fn
= vfswrap_unlink
,
2377 .chmod_fn
= vfswrap_chmod
,
2378 .fchmod_fn
= vfswrap_fchmod
,
2379 .chown_fn
= vfswrap_chown
,
2380 .fchown_fn
= vfswrap_fchown
,
2381 .lchown_fn
= vfswrap_lchown
,
2382 .chdir_fn
= vfswrap_chdir
,
2383 .getwd_fn
= vfswrap_getwd
,
2384 .ntimes_fn
= vfswrap_ntimes
,
2385 .ftruncate_fn
= vfswrap_ftruncate
,
2386 .fallocate_fn
= vfswrap_fallocate
,
2387 .lock_fn
= vfswrap_lock
,
2388 .kernel_flock_fn
= vfswrap_kernel_flock
,
2389 .linux_setlease_fn
= vfswrap_linux_setlease
,
2390 .getlock_fn
= vfswrap_getlock
,
2391 .symlink_fn
= vfswrap_symlink
,
2392 .readlink_fn
= vfswrap_readlink
,
2393 .link_fn
= vfswrap_link
,
2394 .mknod_fn
= vfswrap_mknod
,
2395 .realpath_fn
= vfswrap_realpath
,
2396 .notify_watch_fn
= vfswrap_notify_watch
,
2397 .chflags_fn
= vfswrap_chflags
,
2398 .file_id_create_fn
= vfswrap_file_id_create
,
2399 .streaminfo_fn
= vfswrap_streaminfo
,
2400 .get_real_filename_fn
= vfswrap_get_real_filename
,
2401 .connectpath_fn
= vfswrap_connectpath
,
2402 .brl_lock_windows_fn
= vfswrap_brl_lock_windows
,
2403 .brl_unlock_windows_fn
= vfswrap_brl_unlock_windows
,
2404 .brl_cancel_windows_fn
= vfswrap_brl_cancel_windows
,
2405 .strict_lock_fn
= vfswrap_strict_lock
,
2406 .strict_unlock_fn
= vfswrap_strict_unlock
,
2407 .translate_name_fn
= vfswrap_translate_name
,
2408 .fsctl_fn
= vfswrap_fsctl
,
2410 /* NT ACL operations. */
2412 .fget_nt_acl_fn
= vfswrap_fget_nt_acl
,
2413 .get_nt_acl_fn
= vfswrap_get_nt_acl
,
2414 .fset_nt_acl_fn
= vfswrap_fset_nt_acl
,
2415 .audit_file_fn
= vfswrap_audit_file
,
2417 /* POSIX ACL operations. */
2419 .chmod_acl_fn
= vfswrap_chmod_acl
,
2420 .fchmod_acl_fn
= vfswrap_fchmod_acl
,
2422 .sys_acl_get_file_fn
= vfswrap_sys_acl_get_file
,
2423 .sys_acl_get_fd_fn
= vfswrap_sys_acl_get_fd
,
2424 .sys_acl_blob_get_file_fn
= vfswrap_sys_acl_blob_get_file
,
2425 .sys_acl_blob_get_fd_fn
= vfswrap_sys_acl_blob_get_fd
,
2426 .sys_acl_set_file_fn
= vfswrap_sys_acl_set_file
,
2427 .sys_acl_set_fd_fn
= vfswrap_sys_acl_set_fd
,
2428 .sys_acl_delete_def_file_fn
= vfswrap_sys_acl_delete_def_file
,
2430 /* EA operations. */
2431 .getxattr_fn
= vfswrap_getxattr
,
2432 .fgetxattr_fn
= vfswrap_fgetxattr
,
2433 .listxattr_fn
= vfswrap_listxattr
,
2434 .flistxattr_fn
= vfswrap_flistxattr
,
2435 .removexattr_fn
= vfswrap_removexattr
,
2436 .fremovexattr_fn
= vfswrap_fremovexattr
,
2437 .setxattr_fn
= vfswrap_setxattr
,
2438 .fsetxattr_fn
= vfswrap_fsetxattr
,
2440 /* aio operations */
2441 .aio_force_fn
= vfswrap_aio_force
,
2443 /* offline operations */
2444 .is_offline_fn
= vfswrap_is_offline
,
2445 .set_offline_fn
= vfswrap_set_offline
,
2447 /* durable handle operations */
2448 .durable_cookie_fn
= vfswrap_durable_cookie
,
2449 .durable_disconnect_fn
= vfswrap_durable_disconnect
,
2450 .durable_reconnect_fn
= vfswrap_durable_reconnect
,
2453 NTSTATUS
vfs_default_init(void);
2454 NTSTATUS
vfs_default_init(void)
2456 return smb_register_vfs(SMB_VFS_INTERFACE_VERSION
,
2457 DEFAULT_VFS_MODULE_NAME
, &vfs_default_fns
);