2 Unix SMB/CIFS implementation.
4 Copyright (C) Andrew Tridgell 2000
5 Copyright (C) Jeremy Allison 1994-1998
6 Copyright (C) Volker Lendecke 2007
8 This program is free software; you can redistribute it and/or modify
9 it under the terms of the GNU General Public License as published by
10 the Free Software Foundation; either version 2 of the License, or
11 (at your option) any later version.
13 This program is distributed in the hope that it will be useful,
14 but WITHOUT ANY WARRANTY; without even the implied warranty of
15 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
16 GNU General Public License for more details.
18 You should have received a copy of the GNU General Public License
19 along with this program; if not, write to the Free Software
20 Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA.
25 struct notify_change_request
{
26 struct notify_change_request
*prev
, *next
;
27 struct files_struct
*fsp
; /* backpointer for cancel by mid */
28 char request_buf
[smb_size
];
30 uint32 max_param_count
;
31 uint32 current_bufsize
;
32 struct notify_mid_map
*mid_map
;
36 static void notify_fsp(files_struct
*fsp
, uint32 action
, const char *name
);
38 static struct notify_mid_map
*notify_changes_by_mid
;
41 * For NTCancel, we need to find the notify_change_request indexed by
42 * mid. Separate list here.
45 struct notify_mid_map
{
46 struct notify_mid_map
*prev
, *next
;
47 struct notify_change_request
*req
;
51 static BOOL
notify_marshall_changes(int num_changes
,
52 struct notify_change
*changes
,
58 for (i
=0; i
<num_changes
; i
++) {
59 struct notify_change
*c
= &changes
[i
];
61 uint32 u32_tmp
; /* Temp arg to prs_uint32 to avoid
62 * signed/unsigned issues */
64 namelen
= convert_string_allocate(
65 NULL
, CH_UNIX
, CH_UTF16LE
, c
->name
, strlen(c
->name
)+1,
66 &uni_name
.buffer
, True
);
67 if ((namelen
== -1) || (uni_name
.buffer
== NULL
)) {
71 namelen
-= 2; /* Dump NULL termination */
74 * Offset to next entry, only if there is one
77 u32_tmp
= (i
== num_changes
-1) ? 0 : namelen
+ 12;
78 if (!prs_uint32("offset", ps
, 1, &u32_tmp
)) goto fail
;
81 if (!prs_uint32("action", ps
, 1, &u32_tmp
)) goto fail
;
84 if (!prs_uint32("namelen", ps
, 1, &u32_tmp
)) goto fail
;
86 if (!prs_unistr("name", ps
, 1, &uni_name
)) goto fail
;
89 * Not NULL terminated, decrease by the 2 UCS2 \0 chars
91 prs_set_offset(ps
, prs_offset(ps
)-2);
93 SAFE_FREE(uni_name
.buffer
);
99 SAFE_FREE(uni_name
.buffer
);
103 /****************************************************************************
104 Setup the common parts of the return packet and send it.
105 *****************************************************************************/
107 static void change_notify_reply_packet(const char *request_buf
,
110 const char *inbuf
= request_buf
;
111 char outbuf
[smb_size
+38];
113 memset(outbuf
, '\0', sizeof(outbuf
));
114 construct_reply_common(request_buf
, outbuf
);
116 ERROR_NT(error_code
);
119 * Seems NT needs a transact command with an error code
120 * in it. This is a longer packet than a simple error.
122 set_message(inbuf
,outbuf
,18,0,False
);
125 if (!send_smb(smbd_server_fd(),outbuf
))
126 exit_server_cleanly("change_notify_reply_packet: send_smb "
130 void change_notify_reply(const char *request_buf
, uint32 max_param_count
,
131 struct notify_change_buf
*notify_buf
)
135 size_t buflen
= smb_size
+38+max_param_count
;
137 if (notify_buf
->num_changes
== -1) {
138 change_notify_reply_packet(request_buf
, NT_STATUS_OK
);
142 if (!prs_init(&ps
, 0, NULL
, False
)
143 || !notify_marshall_changes(notify_buf
->num_changes
,
144 notify_buf
->changes
, &ps
)) {
145 change_notify_reply_packet(request_buf
, NT_STATUS_NO_MEMORY
);
149 if (prs_offset(&ps
) > max_param_count
) {
151 * We exceed what the client is willing to accept. Send
154 change_notify_reply_packet(request_buf
, NT_STATUS_OK
);
158 if (!(outbuf
= SMB_MALLOC_ARRAY(char, buflen
))) {
159 change_notify_reply_packet(request_buf
, NT_STATUS_NO_MEMORY
);
163 construct_reply_common(request_buf
, outbuf
);
165 if (send_nt_replies(request_buf
, outbuf
, buflen
, NT_STATUS_OK
, prs_data_p(&ps
),
166 prs_offset(&ps
), NULL
, 0) == -1) {
167 exit_server("change_notify_reply_packet: send_smb failed.");
174 TALLOC_FREE(notify_buf
->changes
);
175 notify_buf
->num_changes
= 0;
178 static void notify_callback(void *private_data
, const struct notify_event
*e
)
180 files_struct
*fsp
= (files_struct
*)private_data
;
181 DEBUG(10, ("notify_callback called for %s\n", fsp
->fsp_name
));
182 notify_fsp(fsp
, e
->action
, e
->path
);
185 NTSTATUS
change_notify_create(struct files_struct
*fsp
, uint32 filter
,
189 struct notify_entry e
;
192 SMB_ASSERT(fsp
->notify
== NULL
);
194 if (!(fsp
->notify
= TALLOC_ZERO_P(NULL
, struct notify_change_buf
))) {
195 DEBUG(0, ("talloc failed\n"));
196 return NT_STATUS_NO_MEMORY
;
199 if (asprintf(&fullpath
, "%s/%s", fsp
->conn
->connectpath
,
200 fsp
->fsp_name
) == -1) {
201 DEBUG(0, ("asprintf failed\n"));
202 return NT_STATUS_NO_MEMORY
;
209 e
.subdir_filter
= filter
;
212 status
= notify_add(fsp
->conn
->notify_ctx
, &e
, notify_callback
, fsp
);
218 NTSTATUS
change_notify_add_request(const char *inbuf
, uint32 max_param_count
,
219 uint32 filter
, BOOL recursive
,
220 struct files_struct
*fsp
)
222 struct notify_change_request
*request
= NULL
;
223 struct notify_mid_map
*map
= NULL
;
225 if (!(request
= SMB_MALLOC_P(struct notify_change_request
))
226 || !(map
= SMB_MALLOC_P(struct notify_mid_map
))) {
228 return NT_STATUS_NO_MEMORY
;
231 request
->mid_map
= map
;
234 memcpy(request
->request_buf
, inbuf
, sizeof(request
->request_buf
));
235 request
->max_param_count
= max_param_count
;
236 request
->current_bufsize
= 0;
237 request
->filter
= filter
;
239 request
->backend_data
= NULL
;
241 DLIST_ADD_END(fsp
->notify
->requests
, request
,
242 struct notify_change_request
*);
244 map
->mid
= SVAL(inbuf
, smb_mid
);
245 DLIST_ADD(notify_changes_by_mid
, map
);
247 /* Push the MID of this packet on the signing queue. */
248 srv_defer_sign_response(SVAL(inbuf
,smb_mid
));
253 static void change_notify_remove_request(struct notify_change_request
*remove_req
)
256 struct notify_change_request
*req
;
259 * Paranoia checks, the fsp referenced must must have the request in
260 * its list of pending requests
263 fsp
= remove_req
->fsp
;
264 SMB_ASSERT(fsp
->notify
!= NULL
);
266 for (req
= fsp
->notify
->requests
; req
; req
= req
->next
) {
267 if (req
== remove_req
) {
273 smb_panic("notify_req not found in fsp's requests\n");
276 DLIST_REMOVE(fsp
->notify
->requests
, req
);
277 DLIST_REMOVE(notify_changes_by_mid
, req
->mid_map
);
278 SAFE_FREE(req
->mid_map
);
279 TALLOC_FREE(req
->backend_data
);
283 /****************************************************************************
284 Delete entries by mid from the change notify pending queue. Always send reply.
285 *****************************************************************************/
287 void remove_pending_change_notify_requests_by_mid(uint16 mid
)
289 struct notify_mid_map
*map
;
291 for (map
= notify_changes_by_mid
; map
; map
= map
->next
) {
292 if (map
->mid
== mid
) {
301 change_notify_reply_packet(map
->req
->request_buf
, NT_STATUS_CANCELLED
);
302 change_notify_remove_request(map
->req
);
305 /****************************************************************************
306 Delete entries by fnum from the change notify pending queue.
307 *****************************************************************************/
309 void remove_pending_change_notify_requests_by_fid(files_struct
*fsp
,
312 if (fsp
->notify
== NULL
) {
316 while (fsp
->notify
->requests
!= NULL
) {
317 change_notify_reply_packet(
318 fsp
->notify
->requests
->request_buf
, status
);
319 change_notify_remove_request(fsp
->notify
->requests
);
323 void notify_fname(connection_struct
*conn
, uint32 action
, uint32 filter
,
328 if (asprintf(&fullpath
, "%s/%s", conn
->connectpath
, path
) == -1) {
329 DEBUG(0, ("asprintf failed\n"));
333 notify_trigger(conn
->notify_ctx
, action
, filter
, fullpath
);
337 static void notify_fsp(files_struct
*fsp
, uint32 action
, const char *name
)
339 struct notify_change
*change
, *changes
;
342 if (fsp
->notify
== NULL
) {
344 * Nobody is waiting, don't queue
349 pstrcpy(name2
, name
);
350 string_replace(name2
, '/', '\\');
353 * Someone has triggered a notify previously, queue the change for
357 if ((fsp
->notify
->num_changes
> 1000) || (name
== NULL
)) {
359 * The real number depends on the client buf, just provide a
360 * guard against a DoS here.
362 TALLOC_FREE(fsp
->notify
->changes
);
363 fsp
->notify
->num_changes
= -1;
367 if (fsp
->notify
->num_changes
== -1) {
371 if (!(changes
= TALLOC_REALLOC_ARRAY(
372 fsp
->notify
, fsp
->notify
->changes
,
373 struct notify_change
, fsp
->notify
->num_changes
+1))) {
374 DEBUG(0, ("talloc_realloc failed\n"));
378 fsp
->notify
->changes
= changes
;
380 change
= &(fsp
->notify
->changes
[fsp
->notify
->num_changes
]);
382 if (!(change
->name
= talloc_strdup(changes
, name2
))) {
383 DEBUG(0, ("talloc_strdup failed\n"));
387 change
->action
= action
;
388 fsp
->notify
->num_changes
+= 1;
390 if (fsp
->notify
->requests
== NULL
) {
392 * Nobody is waiting, so don't send anything. The ot
397 if (action
== NOTIFY_ACTION_OLD_NAME
) {
399 * We have to send the two rename events in one reply. So hold
400 * the first part back.
406 * Someone is waiting for the change, trigger the reply immediately.
408 * TODO: do we have to walk the lists of requests pending?
411 change_notify_reply(fsp
->notify
->requests
->request_buf
,
412 fsp
->notify
->requests
->max_param_count
,
415 change_notify_remove_request(fsp
->notify
->requests
);
418 char *notify_filter_string(TALLOC_CTX
*mem_ctx
, uint32 filter
)
422 result
= talloc_strdup(mem_ctx
, "");
424 if (filter
& FILE_NOTIFY_CHANGE_FILE_NAME
)
425 result
= talloc_asprintf_append(result
, "FILE_NAME|");
426 if (filter
& FILE_NOTIFY_CHANGE_DIR_NAME
)
427 result
= talloc_asprintf_append(result
, "DIR_NAME|");
428 if (filter
& FILE_NOTIFY_CHANGE_ATTRIBUTES
)
429 result
= talloc_asprintf_append(result
, "ATTRIBUTES|");
430 if (filter
& FILE_NOTIFY_CHANGE_SIZE
)
431 result
= talloc_asprintf_append(result
, "SIZE|");
432 if (filter
& FILE_NOTIFY_CHANGE_LAST_WRITE
)
433 result
= talloc_asprintf_append(result
, "LAST_WRITE|");
434 if (filter
& FILE_NOTIFY_CHANGE_LAST_ACCESS
)
435 result
= talloc_asprintf_append(result
, "LAST_ACCESS|");
436 if (filter
& FILE_NOTIFY_CHANGE_CREATION
)
437 result
= talloc_asprintf_append(result
, "CREATION|");
438 if (filter
& FILE_NOTIFY_CHANGE_EA
)
439 result
= talloc_asprintf_append(result
, "EA|");
440 if (filter
& FILE_NOTIFY_CHANGE_SECURITY
)
441 result
= talloc_asprintf_append(result
, "SECURITY|");
442 if (filter
& FILE_NOTIFY_CHANGE_STREAM_NAME
)
443 result
= talloc_asprintf_append(result
, "STREAM_NAME|");
444 if (filter
& FILE_NOTIFY_CHANGE_STREAM_SIZE
)
445 result
= talloc_asprintf_append(result
, "STREAM_SIZE|");
446 if (filter
& FILE_NOTIFY_CHANGE_STREAM_WRITE
)
447 result
= talloc_asprintf_append(result
, "STREAM_WRITE|");
449 if (result
== NULL
) return NULL
;
450 if (*result
== '\0') return result
;
452 result
[strlen(result
)-1] = '\0';
456 struct sys_notify_context
*sys_notify_context_create(connection_struct
*conn
,
458 struct event_context
*ev
)
460 struct sys_notify_context
*ctx
;
462 if (!(ctx
= TALLOC_P(mem_ctx
, struct sys_notify_context
))) {
463 DEBUG(0, ("talloc failed\n"));
469 ctx
->private_data
= NULL
;
473 NTSTATUS
sys_notify_watch(struct sys_notify_context
*ctx
,
474 struct notify_entry
*e
,
475 void (*callback
)(struct sys_notify_context
*ctx
,
477 struct notify_event
*ev
),
478 void *private_data
, void *handle
)
480 return SMB_VFS_NOTIFY_WATCH(ctx
->conn
, ctx
, e
, callback
, private_data
,