2 Unix SMB/CIFS implementation.
4 POSIX NTVFS backend - rename
6 Copyright (C) Andrew Tridgell 2004
8 This program is free software; you can redistribute it and/or modify
9 it under the terms of the GNU General Public License as published by
10 the Free Software Foundation; either version 3 of the License, or
11 (at your option) any later version.
13 This program is distributed in the hope that it will be useful,
14 but WITHOUT ANY WARRANTY; without even the implied warranty of
15 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
16 GNU General Public License for more details.
18 You should have received a copy of the GNU General Public License
19 along with this program. If not, see <http://www.gnu.org/licenses/>.
23 #include "vfs_posix.h"
24 #include "librpc/gen_ndr/security.h"
25 #include "param/param.h"
29 do a file rename, and send any notify triggers
31 NTSTATUS
pvfs_do_rename(struct pvfs_state
*pvfs
,
33 const struct pvfs_filename
*name1
,
40 if (pvfs_sys_rename(pvfs
, name1
->full_name
, name2
) == -1) {
41 return pvfs_map_errno(pvfs
, errno
);
44 status
= odb_rename(lck
, name2
);
45 NT_STATUS_NOT_OK_RETURN(status
);
47 if (name1
->dos
.attrib
& FILE_ATTRIBUTE_DIRECTORY
) {
48 mask
= FILE_NOTIFY_CHANGE_DIR_NAME
;
50 mask
= FILE_NOTIFY_CHANGE_FILE_NAME
;
53 renames to the same directory cause a OLD_NAME->NEW_NAME notify.
54 renames to a different directory are considered a remove/add
56 r1
= strrchr_m(name1
->full_name
, '/');
57 r2
= strrchr_m(name2
, '/');
59 if ((r1
-name1
->full_name
) != (r2
-name2
) ||
60 strncmp(name1
->full_name
, name2
, r1
-name1
->full_name
) != 0) {
61 notify_trigger(pvfs
->notify_context
,
62 NOTIFY_ACTION_REMOVED
,
65 notify_trigger(pvfs
->notify_context
,
70 notify_trigger(pvfs
->notify_context
,
71 NOTIFY_ACTION_OLD_NAME
,
74 notify_trigger(pvfs
->notify_context
,
75 NOTIFY_ACTION_NEW_NAME
,
80 /* this is a strange one. w2k3 gives an additional event for CHANGE_ATTRIBUTES
81 and CHANGE_CREATION on the new file when renaming files, but not
83 if ((name1
->dos
.attrib
& FILE_ATTRIBUTE_DIRECTORY
) == 0) {
84 notify_trigger(pvfs
->notify_context
,
85 NOTIFY_ACTION_MODIFIED
,
86 FILE_NOTIFY_CHANGE_ATTRIBUTES
|FILE_NOTIFY_CHANGE_CREATION
,
95 resolve a wildcard rename pattern. This works on one component of the name
97 static const char *pvfs_resolve_wildcard_component(TALLOC_CTX
*mem_ctx
,
104 /* the length is bounded by the length of the two strings combined */
105 dest
= talloc_array(mem_ctx
, char, strlen(fname
) + strlen(pattern
) + 1);
116 size_t c_size1
, c_size2
;
117 c1
= next_codepoint(p1
, &c_size1
);
118 c2
= next_codepoint(p2
, &c_size2
);
120 d
+= push_codepoint(d
, c1
);
121 } else if (c2
== '*') {
122 memcpy(d
, p1
, strlen(p1
));
126 d
+= push_codepoint(d
, c2
);
135 talloc_set_name_const(dest
, dest
);
141 resolve a wildcard rename pattern.
143 static const char *pvfs_resolve_wildcard(TALLOC_CTX
*mem_ctx
,
147 const char *base1
, *base2
;
148 const char *ext1
, *ext2
;
151 /* break into base part plus extension */
152 p
= strrchr_m(fname
, '.');
157 ext1
= talloc_strdup(mem_ctx
, p
+1);
158 base1
= talloc_strndup(mem_ctx
, fname
, p
-fname
);
160 if (ext1
== NULL
|| base1
== NULL
) {
164 p
= strrchr_m(pattern
, '.');
169 ext2
= talloc_strdup(mem_ctx
, p
+1);
170 base2
= talloc_strndup(mem_ctx
, pattern
, p
-pattern
);
172 if (ext2
== NULL
|| base2
== NULL
) {
176 base1
= pvfs_resolve_wildcard_component(mem_ctx
, base1
, base2
);
177 ext1
= pvfs_resolve_wildcard_component(mem_ctx
, ext1
, ext2
);
178 if (base1
== NULL
|| ext1
== NULL
) {
186 return talloc_asprintf(mem_ctx
, "%s.%s", base1
, ext1
);
190 retry an rename after a sharing violation
192 static void pvfs_retry_rename(struct pvfs_odb_retry
*r
,
193 struct ntvfs_module_context
*ntvfs
,
194 struct ntvfs_request
*req
,
197 enum pvfs_wait_notice reason
)
199 union smb_rename
*io
= talloc_get_type(_io
, union smb_rename
);
200 NTSTATUS status
= NT_STATUS_INTERNAL_ERROR
;
205 case PVFS_WAIT_CANCEL
:
207 status
= NT_STATUS_CANCELLED
;
209 case PVFS_WAIT_TIMEOUT
:
210 /* if it timed out, then give the failure
213 status
= NT_STATUS_SHARING_VIOLATION
;
215 case PVFS_WAIT_EVENT
:
217 /* try the open again, which could trigger another retry setup
218 if it wants to, so we have to unmark the async flag so we
219 will know if it does a second async reply */
220 req
->async_states
->state
&= ~NTVFS_ASYNC_STATE_ASYNC
;
222 status
= pvfs_rename(ntvfs
, req
, io
);
223 if (req
->async_states
->state
& NTVFS_ASYNC_STATE_ASYNC
) {
224 /* the 2nd try also replied async, so we don't send
229 /* re-mark it async, just in case someone up the chain does
231 req
->async_states
->state
|= NTVFS_ASYNC_STATE_ASYNC
;
235 /* send the reply up the chain */
236 req
->async_states
->status
= status
;
237 req
->async_states
->send_fn(req
);
241 setup for a rename retry after a sharing violation
242 or a non granted oplock
244 static NTSTATUS
pvfs_rename_setup_retry(struct ntvfs_module_context
*ntvfs
,
245 struct ntvfs_request
*req
,
246 union smb_rename
*io
,
247 struct odb_lock
*lck
,
250 struct pvfs_state
*pvfs
= talloc_get_type(ntvfs
->private_data
,
252 struct timeval end_time
;
254 if (NT_STATUS_EQUAL(status
, NT_STATUS_SHARING_VIOLATION
)) {
255 end_time
= timeval_add(&req
->statistics
.request_time
,
256 0, pvfs
->sharing_violation_delay
);
257 } else if (NT_STATUS_EQUAL(status
, NT_STATUS_OPLOCK_NOT_GRANTED
)) {
258 end_time
= timeval_add(&req
->statistics
.request_time
,
259 pvfs
->oplock_break_timeout
, 0);
261 return NT_STATUS_INTERNAL_ERROR
;
264 return pvfs_odb_retry_setup(ntvfs
, req
, lck
, end_time
, io
, NULL
,
269 rename one file from a wildcard set
271 static NTSTATUS
pvfs_rename_one(struct pvfs_state
*pvfs
,
272 struct ntvfs_request
*req
,
273 const char *dir_path
,
278 struct pvfs_filename
*name1
, *name2
;
279 TALLOC_CTX
*mem_ctx
= talloc_new(req
);
280 struct odb_lock
*lck
= NULL
;
283 /* resolve the wildcard pattern for this name */
284 fname2
= pvfs_resolve_wildcard(mem_ctx
, fname1
, fname2
);
285 if (fname2
== NULL
) {
286 return NT_STATUS_NO_MEMORY
;
289 /* get a pvfs_filename source object */
290 status
= pvfs_resolve_partial(pvfs
, mem_ctx
,
292 PVFS_RESOLVE_NO_OPENDB
,
294 if (!NT_STATUS_IS_OK(status
)) {
298 /* make sure its matches the given attributes */
299 status
= pvfs_match_attrib(pvfs
, name1
, attrib
, 0);
300 if (!NT_STATUS_IS_OK(status
)) {
304 status
= pvfs_can_rename(pvfs
, req
, name1
, &lck
);
305 if (!NT_STATUS_IS_OK(status
)) {
310 /* get a pvfs_filename dest object */
311 status
= pvfs_resolve_partial(pvfs
, mem_ctx
,
313 PVFS_RESOLVE_NO_OPENDB
,
315 if (NT_STATUS_IS_OK(status
)) {
316 status
= pvfs_can_delete(pvfs
, req
, name2
, NULL
);
317 if (!NT_STATUS_IS_OK(status
)) {
322 status
= NT_STATUS_OK
;
324 fname2
= talloc_asprintf(mem_ctx
, "%s/%s", dir_path
, fname2
);
325 if (fname2
== NULL
) {
326 return NT_STATUS_NO_MEMORY
;
329 status
= pvfs_do_rename(pvfs
, lck
, name1
, fname2
);
332 talloc_free(mem_ctx
);
338 rename a set of files with wildcards
340 static NTSTATUS
pvfs_rename_wildcard(struct pvfs_state
*pvfs
,
341 struct ntvfs_request
*req
,
342 union smb_rename
*ren
,
343 struct pvfs_filename
*name1
,
344 struct pvfs_filename
*name2
)
346 struct pvfs_dir
*dir
;
349 const char *fname
, *fname2
, *dir_path
;
350 uint16_t attrib
= ren
->rename
.in
.attrib
;
351 int total_renamed
= 0;
353 /* get list of matching files */
354 status
= pvfs_list_start(pvfs
, name1
, req
, &dir
);
355 if (!NT_STATUS_IS_OK(status
)) {
359 status
= NT_STATUS_NO_SUCH_FILE
;
361 dir_path
= pvfs_list_unix_path(dir
);
363 /* only allow wildcard renames within a directory */
364 if (strncmp(dir_path
, name2
->full_name
, strlen(dir_path
)) != 0 ||
365 name2
->full_name
[strlen(dir_path
)] != '/' ||
366 strchr(name2
->full_name
+ strlen(dir_path
) + 1, '/')) {
367 DEBUG(3,(__location__
": Invalid rename for %s -> %s\n",
368 name1
->original_name
, name2
->original_name
));
369 return NT_STATUS_INVALID_PARAMETER
;
372 fname2
= talloc_strdup(name2
, name2
->full_name
+ strlen(dir_path
) + 1);
373 if (fname2
== NULL
) {
374 return NT_STATUS_NO_MEMORY
;
377 while ((fname
= pvfs_list_next(dir
, &ofs
))) {
378 status
= pvfs_rename_one(pvfs
, req
,
380 fname
, fname2
, attrib
);
381 if (NT_STATUS_IS_OK(status
)) {
386 if (total_renamed
== 0) {
394 rename a set of files - SMBmv interface
396 static NTSTATUS
pvfs_rename_mv(struct ntvfs_module_context
*ntvfs
,
397 struct ntvfs_request
*req
, union smb_rename
*ren
)
399 struct pvfs_state
*pvfs
= talloc_get_type(ntvfs
->private_data
,
402 struct pvfs_filename
*name1
, *name2
;
403 struct odb_lock
*lck
= NULL
;
405 /* resolve the cifs name to a posix name */
406 status
= pvfs_resolve_name(pvfs
, req
, ren
->rename
.in
.pattern1
,
407 PVFS_RESOLVE_WILDCARD
, &name1
);
408 if (!NT_STATUS_IS_OK(status
)) {
412 status
= pvfs_resolve_name(pvfs
, req
, ren
->rename
.in
.pattern2
,
413 PVFS_RESOLVE_WILDCARD
, &name2
);
414 if (!NT_STATUS_IS_OK(status
)) {
418 if (name1
->has_wildcard
|| name2
->has_wildcard
) {
419 return pvfs_rename_wildcard(pvfs
, req
, ren
, name1
, name2
);
422 if (!name1
->exists
) {
423 return NT_STATUS_OBJECT_NAME_NOT_FOUND
;
426 if (strcmp(name1
->full_name
, name2
->full_name
) == 0) {
431 return NT_STATUS_OBJECT_NAME_COLLISION
;
434 status
= pvfs_match_attrib(pvfs
, name1
, ren
->rename
.in
.attrib
, 0);
435 if (!NT_STATUS_IS_OK(status
)) {
439 status
= pvfs_access_check_parent(pvfs
, req
, name2
, SEC_DIR_ADD_FILE
);
440 if (!NT_STATUS_IS_OK(status
)) {
444 status
= pvfs_can_rename(pvfs
, req
, name1
, &lck
);
446 * on a sharing violation we need to retry when the file is closed by
447 * the other user, or after 1 second
448 * on a non granted oplock we need to retry when the file is closed by
449 * the other user, or after 30 seconds
451 if ((NT_STATUS_EQUAL(status
, NT_STATUS_SHARING_VIOLATION
) ||
452 NT_STATUS_EQUAL(status
, NT_STATUS_OPLOCK_NOT_GRANTED
)) &&
453 (req
->async_states
->state
& NTVFS_ASYNC_STATE_MAY_ASYNC
)) {
454 return pvfs_rename_setup_retry(pvfs
->ntvfs
, req
, ren
, lck
, status
);
457 if (!NT_STATUS_IS_OK(status
)) {
461 status
= pvfs_do_rename(pvfs
, lck
, name1
, name2
->full_name
);
462 if (!NT_STATUS_IS_OK(status
)) {
473 static NTSTATUS
pvfs_rename_stream(struct ntvfs_module_context
*ntvfs
,
474 struct ntvfs_request
*req
, union smb_rename
*ren
,
475 struct pvfs_filename
*name1
)
477 struct pvfs_state
*pvfs
= talloc_get_type(ntvfs
->private_data
,
480 struct odb_lock
*lck
= NULL
;
482 if (name1
->has_wildcard
) {
483 DEBUG(3,(__location__
": Invalid wildcard rename for %s\n",
484 name1
->original_name
));
485 return NT_STATUS_INVALID_PARAMETER
;
488 if (ren
->ntrename
.in
.new_name
[0] != ':') {
489 DEBUG(3,(__location__
": Invalid rename for %s\n",
490 ren
->ntrename
.in
.new_name
));
491 return NT_STATUS_INVALID_PARAMETER
;
494 if (!name1
->exists
) {
495 return NT_STATUS_OBJECT_NAME_NOT_FOUND
;
498 if (ren
->ntrename
.in
.flags
!= RENAME_FLAG_RENAME
) {
499 DEBUG(3,(__location__
": Invalid rename flags 0x%x for %s\n",
500 ren
->ntrename
.in
.flags
, ren
->ntrename
.in
.new_name
));
501 return NT_STATUS_INVALID_PARAMETER
;
504 status
= pvfs_can_rename(pvfs
, req
, name1
, &lck
);
506 * on a sharing violation we need to retry when the file is closed by
507 * the other user, or after 1 second
508 * on a non granted oplock we need to retry when the file is closed by
509 * the other user, or after 30 seconds
511 if ((NT_STATUS_EQUAL(status
, NT_STATUS_SHARING_VIOLATION
) ||
512 NT_STATUS_EQUAL(status
, NT_STATUS_OPLOCK_NOT_GRANTED
)) &&
513 (req
->async_states
->state
& NTVFS_ASYNC_STATE_MAY_ASYNC
)) {
514 return pvfs_rename_setup_retry(pvfs
->ntvfs
, req
, ren
, lck
, status
);
516 if (!NT_STATUS_IS_OK(status
)) {
520 status
= pvfs_access_check_simple(pvfs
, req
, name1
, SEC_FILE_WRITE_ATTRIBUTE
);
521 NT_STATUS_NOT_OK_RETURN(status
);
523 status
= pvfs_stream_rename(pvfs
, name1
, -1,
524 ren
->ntrename
.in
.new_name
+1,
526 NT_STATUS_NOT_OK_RETURN(status
);
532 rename a set of files - ntrename interface
534 static NTSTATUS
pvfs_rename_nt(struct ntvfs_module_context
*ntvfs
,
535 struct ntvfs_request
*req
, union smb_rename
*ren
)
537 struct pvfs_state
*pvfs
= talloc_get_type(ntvfs
->private_data
,
540 struct pvfs_filename
*name1
, *name2
;
541 struct odb_lock
*lck
= NULL
;
543 switch (ren
->ntrename
.in
.flags
) {
544 case RENAME_FLAG_RENAME
:
545 case RENAME_FLAG_HARD_LINK
:
546 case RENAME_FLAG_COPY
:
547 case RENAME_FLAG_MOVE_CLUSTER_INFORMATION
:
550 return NT_STATUS_ACCESS_DENIED
;
553 /* resolve the cifs name to a posix name */
554 status
= pvfs_resolve_name(pvfs
, req
, ren
->ntrename
.in
.old_name
,
555 PVFS_RESOLVE_WILDCARD
| PVFS_RESOLVE_STREAMS
, &name1
);
556 if (!NT_STATUS_IS_OK(status
)) {
560 if (name1
->stream_name
) {
561 /* stream renames need to be handled separately */
562 return pvfs_rename_stream(ntvfs
, req
, ren
, name1
);
565 status
= pvfs_resolve_name(pvfs
, req
, ren
->ntrename
.in
.new_name
,
566 PVFS_RESOLVE_WILDCARD
, &name2
);
567 if (!NT_STATUS_IS_OK(status
)) {
571 if (name1
->has_wildcard
|| name2
->has_wildcard
) {
572 return NT_STATUS_OBJECT_PATH_SYNTAX_BAD
;
575 if (!name1
->exists
) {
576 return NT_STATUS_OBJECT_NAME_NOT_FOUND
;
579 if (strcmp(name1
->full_name
, name2
->full_name
) == 0) {
584 return NT_STATUS_OBJECT_NAME_COLLISION
;
587 status
= pvfs_match_attrib(pvfs
, name1
, ren
->ntrename
.in
.attrib
, 0);
588 if (!NT_STATUS_IS_OK(status
)) {
592 status
= pvfs_can_rename(pvfs
, req
, name1
, &lck
);
594 * on a sharing violation we need to retry when the file is closed by
595 * the other user, or after 1 second
596 * on a non granted oplock we need to retry when the file is closed by
597 * the other user, or after 30 seconds
599 if ((NT_STATUS_EQUAL(status
, NT_STATUS_SHARING_VIOLATION
) ||
600 NT_STATUS_EQUAL(status
, NT_STATUS_OPLOCK_NOT_GRANTED
)) &&
601 (req
->async_states
->state
& NTVFS_ASYNC_STATE_MAY_ASYNC
)) {
602 return pvfs_rename_setup_retry(pvfs
->ntvfs
, req
, ren
, lck
, status
);
604 if (!NT_STATUS_IS_OK(status
)) {
608 switch (ren
->ntrename
.in
.flags
) {
609 case RENAME_FLAG_RENAME
:
610 status
= pvfs_access_check_parent(pvfs
, req
, name2
, SEC_DIR_ADD_FILE
);
611 NT_STATUS_NOT_OK_RETURN(status
);
612 status
= pvfs_do_rename(pvfs
, lck
, name1
, name2
->full_name
);
613 NT_STATUS_NOT_OK_RETURN(status
);
616 case RENAME_FLAG_HARD_LINK
:
617 status
= pvfs_access_check_parent(pvfs
, req
, name2
, SEC_DIR_ADD_FILE
);
618 NT_STATUS_NOT_OK_RETURN(status
);
619 if (link(name1
->full_name
, name2
->full_name
) == -1) {
620 return pvfs_map_errno(pvfs
, errno
);
624 case RENAME_FLAG_COPY
:
625 status
= pvfs_access_check_parent(pvfs
, req
, name2
, SEC_DIR_ADD_FILE
);
626 NT_STATUS_NOT_OK_RETURN(status
);
627 return pvfs_copy_file(pvfs
, name1
, name2
);
629 case RENAME_FLAG_MOVE_CLUSTER_INFORMATION
:
630 DEBUG(3,(__location__
": Invalid rename cluster for %s\n",
631 name1
->original_name
));
632 return NT_STATUS_INVALID_PARAMETER
;
635 return NT_STATUS_ACCESS_DENIED
;
643 rename a set of files - ntrename interface
645 NTSTATUS
pvfs_rename(struct ntvfs_module_context
*ntvfs
,
646 struct ntvfs_request
*req
, union smb_rename
*ren
)
648 struct pvfs_state
*pvfs
= talloc_get_type(ntvfs
->private_data
,
652 switch (ren
->generic
.level
) {
653 case RAW_RENAME_RENAME
:
654 return pvfs_rename_mv(ntvfs
, req
, ren
);
656 case RAW_RENAME_NTRENAME
:
657 return pvfs_rename_nt(ntvfs
, req
, ren
);
659 case RAW_RENAME_NTTRANS
:
660 f
= pvfs_find_fd(pvfs
, req
, ren
->nttrans
.in
.file
.ntvfs
);
662 return NT_STATUS_INVALID_HANDLE
;
665 /* wk23 ignores the request */
672 return NT_STATUS_INVALID_LEVEL
;