2 Unix SMB/CIFS implementation.
4 Copyright (C) Andrew Tridgell 1992-2000
5 Copyright (C) Jeremy Allison 1992-2006
6 Copyright (C) Volker Lendecke 2005
8 This program is free software; you can redistribute it and/or modify
9 it under the terms of the GNU General Public License as published by
10 the Free Software Foundation; either version 3 of the License, or
11 (at your option) any later version.
13 This program is distributed in the hope that it will be useful,
14 but WITHOUT ANY WARRANTY; without even the implied warranty of
15 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
16 GNU General Public License for more details.
18 You should have received a copy of the GNU General Public License
19 along with this program. If not, see <http://www.gnu.org/licenses/>.
23 12 aug 96: Erik.Devriendt@te6.siemens.be
24 added support for shared memory implementation of share mode locking
26 May 1997. Jeremy Allison (jallison@whistle.com). Modified share mode
27 locking to deal with multiple share modes per open file.
29 September 1997. Jeremy Allison (jallison@whistle.com). Added oplock
32 rewritten completely to use new tdb code. Tridge, Dec '99
34 Added POSIX locking support. Jeremy Allison (jeremy@valinux.com), Apr. 2000.
35 Added Unix Extensions POSIX locking support. Jeremy Allison Mar 2006.
39 #include "system/filesys.h"
40 #include "locking/proto.h"
41 #include "smbd/globals.h"
42 #include "dbwrap/dbwrap.h"
43 #include "dbwrap/dbwrap_open.h"
44 #include "../libcli/security/security.h"
48 #include "../librpc/gen_ndr/ndr_open_files.h"
51 #define DBGC_CLASS DBGC_LOCKING
53 #define NO_LOCKING_COUNT (-1)
55 /****************************************************************************
57 ****************************************************************************/
59 const char *lock_type_name(enum brl_type lock_type
)
66 case PENDING_READ_LOCK
:
67 return "PENDING_READ";
68 case PENDING_WRITE_LOCK
:
69 return "PENDING_WRITE";
75 const char *lock_flav_name(enum brl_flavour lock_flav
)
77 return (lock_flav
== WINDOWS_LOCK
) ? "WINDOWS_LOCK" : "POSIX_LOCK";
80 /****************************************************************************
81 Utility function called to see if a file region is locked.
82 Called in the read/write codepath.
83 ****************************************************************************/
85 void init_strict_lock_struct(files_struct
*fsp
,
89 enum brl_type lock_type
,
90 struct lock_struct
*plock
)
92 SMB_ASSERT(lock_type
== READ_LOCK
|| lock_type
== WRITE_LOCK
);
94 plock
->context
.smblctx
= smblctx
;
95 plock
->context
.tid
= fsp
->conn
->cnum
;
96 plock
->context
.pid
= messaging_server_id(fsp
->conn
->sconn
->msg_ctx
);
99 plock
->fnum
= fsp
->fnum
;
100 plock
->lock_type
= lock_type
;
101 plock
->lock_flav
= lp_posix_cifsu_locktype(fsp
);
104 bool strict_lock_default(files_struct
*fsp
, struct lock_struct
*plock
)
106 int strict_locking
= lp_strict_locking(fsp
->conn
->params
);
109 if (plock
->size
== 0) {
113 if (!lp_locking(fsp
->conn
->params
) || !strict_locking
) {
117 if (strict_locking
== Auto
) {
118 if (EXCLUSIVE_OPLOCK_TYPE(fsp
->oplock_type
) && (plock
->lock_type
== READ_LOCK
|| plock
->lock_type
== WRITE_LOCK
)) {
119 DEBUG(10,("is_locked: optimisation - exclusive oplock on file %s\n", fsp_str_dbg(fsp
)));
121 } else if ((fsp
->oplock_type
== LEVEL_II_OPLOCK
) &&
122 (plock
->lock_type
== READ_LOCK
)) {
123 DEBUG(10,("is_locked: optimisation - level II oplock on file %s\n", fsp_str_dbg(fsp
)));
126 struct byte_range_lock
*br_lck
;
128 br_lck
= brl_get_locks_readonly(fsp
);
132 ret
= brl_locktest(br_lck
,
133 plock
->context
.smblctx
,
141 struct byte_range_lock
*br_lck
;
143 br_lck
= brl_get_locks_readonly(fsp
);
147 ret
= brl_locktest(br_lck
,
148 plock
->context
.smblctx
,
156 DEBUG(10,("strict_lock_default: flavour = %s brl start=%.0f "
157 "len=%.0f %s for fnum %d file %s\n",
158 lock_flav_name(plock
->lock_flav
),
159 (double)plock
->start
, (double)plock
->size
,
160 ret
? "unlocked" : "locked",
161 plock
->fnum
, fsp_str_dbg(fsp
)));
166 void strict_unlock_default(files_struct
*fsp
, struct lock_struct
*plock
)
170 /****************************************************************************
171 Find out if a lock could be granted - return who is blocking us if we can't.
172 ****************************************************************************/
174 NTSTATUS
query_lock(files_struct
*fsp
,
178 enum brl_type
*plock_type
,
179 enum brl_flavour lock_flav
)
181 struct byte_range_lock
*br_lck
= NULL
;
183 if (!fsp
->can_lock
) {
184 return fsp
->is_directory
? NT_STATUS_INVALID_DEVICE_REQUEST
: NT_STATUS_INVALID_HANDLE
;
187 if (!lp_locking(fsp
->conn
->params
)) {
191 br_lck
= brl_get_locks_readonly(fsp
);
193 return NT_STATUS_NO_MEMORY
;
196 return brl_lockquery(br_lck
,
198 messaging_server_id(fsp
->conn
->sconn
->msg_ctx
),
205 static void increment_current_lock_count(files_struct
*fsp
,
206 enum brl_flavour lock_flav
)
208 if (lock_flav
== WINDOWS_LOCK
&&
209 fsp
->current_lock_count
!= NO_LOCKING_COUNT
) {
210 /* blocking ie. pending, locks also count here,
211 * as this is an efficiency counter to avoid checking
212 * the lock db. on close. JRA. */
214 fsp
->current_lock_count
++;
216 /* Notice that this has had a POSIX lock request.
217 * We can't count locks after this so forget them.
219 fsp
->current_lock_count
= NO_LOCKING_COUNT
;
223 static void decrement_current_lock_count(files_struct
*fsp
,
224 enum brl_flavour lock_flav
)
226 if (lock_flav
== WINDOWS_LOCK
&&
227 fsp
->current_lock_count
!= NO_LOCKING_COUNT
) {
228 SMB_ASSERT(fsp
->current_lock_count
> 0);
229 fsp
->current_lock_count
--;
233 /****************************************************************************
234 Utility function called by locking requests.
235 ****************************************************************************/
237 struct byte_range_lock
*do_lock(struct messaging_context
*msg_ctx
,
242 enum brl_type lock_type
,
243 enum brl_flavour lock_flav
,
247 struct blocking_lock_record
*blr
)
249 struct byte_range_lock
*br_lck
= NULL
;
251 /* silently return ok on print files as we don't do locking there */
252 if (fsp
->print_file
) {
253 *perr
= NT_STATUS_OK
;
257 if (!fsp
->can_lock
) {
258 *perr
= fsp
->is_directory
? NT_STATUS_INVALID_DEVICE_REQUEST
: NT_STATUS_INVALID_HANDLE
;
262 if (!lp_locking(fsp
->conn
->params
)) {
263 *perr
= NT_STATUS_OK
;
267 /* NOTE! 0 byte long ranges ARE allowed and should be stored */
269 DEBUG(10,("do_lock: lock flavour %s lock type %s start=%.0f len=%.0f "
270 "blocking_lock=%s requested for fnum %d file %s\n",
271 lock_flav_name(lock_flav
), lock_type_name(lock_type
),
272 (double)offset
, (double)count
, blocking_lock
? "true" :
273 "false", fsp
->fnum
, fsp_str_dbg(fsp
)));
275 br_lck
= brl_get_locks(talloc_tos(), fsp
);
277 *perr
= NT_STATUS_NO_MEMORY
;
281 *perr
= brl_lock(msg_ctx
,
284 messaging_server_id(fsp
->conn
->sconn
->msg_ctx
),
293 DEBUG(10, ("do_lock: returning status=%s\n", nt_errstr(*perr
)));
295 increment_current_lock_count(fsp
, lock_flav
);
299 /****************************************************************************
300 Utility function called by unlocking requests.
301 ****************************************************************************/
303 NTSTATUS
do_unlock(struct messaging_context
*msg_ctx
,
308 enum brl_flavour lock_flav
)
311 struct byte_range_lock
*br_lck
= NULL
;
313 if (!fsp
->can_lock
) {
314 return fsp
->is_directory
? NT_STATUS_INVALID_DEVICE_REQUEST
: NT_STATUS_INVALID_HANDLE
;
317 if (!lp_locking(fsp
->conn
->params
)) {
321 DEBUG(10,("do_unlock: unlock start=%.0f len=%.0f requested for fnum %d file %s\n",
322 (double)offset
, (double)count
, fsp
->fnum
,
325 br_lck
= brl_get_locks(talloc_tos(), fsp
);
327 return NT_STATUS_NO_MEMORY
;
330 ok
= brl_unlock(msg_ctx
,
333 messaging_server_id(fsp
->conn
->sconn
->msg_ctx
),
341 DEBUG(10,("do_unlock: returning ERRlock.\n" ));
342 return NT_STATUS_RANGE_NOT_LOCKED
;
345 decrement_current_lock_count(fsp
, lock_flav
);
349 /****************************************************************************
350 Cancel any pending blocked locks.
351 ****************************************************************************/
353 NTSTATUS
do_lock_cancel(files_struct
*fsp
,
357 enum brl_flavour lock_flav
,
358 struct blocking_lock_record
*blr
)
361 struct byte_range_lock
*br_lck
= NULL
;
363 if (!fsp
->can_lock
) {
364 return fsp
->is_directory
?
365 NT_STATUS_INVALID_DEVICE_REQUEST
: NT_STATUS_INVALID_HANDLE
;
368 if (!lp_locking(fsp
->conn
->params
)) {
369 return NT_STATUS_DOS(ERRDOS
, ERRcancelviolation
);
372 DEBUG(10,("do_lock_cancel: cancel start=%.0f len=%.0f requested for fnum %d file %s\n",
373 (double)offset
, (double)count
, fsp
->fnum
,
376 br_lck
= brl_get_locks(talloc_tos(), fsp
);
378 return NT_STATUS_NO_MEMORY
;
381 ok
= brl_lock_cancel(br_lck
,
383 messaging_server_id(fsp
->conn
->sconn
->msg_ctx
),
392 DEBUG(10,("do_lock_cancel: returning ERRcancelviolation.\n" ));
393 return NT_STATUS_DOS(ERRDOS
, ERRcancelviolation
);
396 decrement_current_lock_count(fsp
, lock_flav
);
400 /****************************************************************************
401 Remove any locks on this fd. Called from file_close().
402 ****************************************************************************/
404 void locking_close_file(struct messaging_context
*msg_ctx
,
406 enum file_close_type close_type
)
408 struct byte_range_lock
*br_lck
;
410 if (!lp_locking(fsp
->conn
->params
)) {
414 /* If we have not outstanding locks or pending
415 * locks then we don't need to look in the lock db.
418 if (fsp
->current_lock_count
== 0) {
422 br_lck
= brl_get_locks(talloc_tos(),fsp
);
425 cancel_pending_lock_requests_by_fid(fsp
, br_lck
, close_type
);
426 brl_close_fnum(msg_ctx
, br_lck
);
431 /*******************************************************************
432 Print out a share mode.
433 ********************************************************************/
435 char *share_mode_str(TALLOC_CTX
*ctx
, int num
, const struct share_mode_entry
*e
)
437 return talloc_asprintf(ctx
, "share_mode_entry[%d]: "
438 "pid = %s, share_access = 0x%x, private_options = 0x%x, "
439 "access_mask = 0x%x, mid = 0x%llx, type= 0x%x, gen_id = %llu, "
440 "uid = %u, flags = %u, file_id %s, name_hash = 0x%x",
442 procid_str_static(&e
->pid
),
443 e
->share_access
, e
->private_options
,
444 e
->access_mask
, (unsigned long long)e
->op_mid
,
445 e
->op_type
, (unsigned long long)e
->share_file_id
,
446 (unsigned int)e
->uid
, (unsigned int)e
->flags
,
447 file_id_string_tos(&e
->id
),
448 (unsigned int)e
->name_hash
);
451 /*******************************************************************
452 Fetch a share mode where we know one MUST exist. This call reference
453 counts it internally to allow for nested lock fetches.
454 ********************************************************************/
456 struct share_mode_lock
*get_existing_share_mode_lock(TALLOC_CTX
*mem_ctx
,
457 const struct file_id id
)
459 return get_share_mode_lock(mem_ctx
, id
, NULL
, NULL
, NULL
);
462 /*******************************************************************
463 Sets the service name and filename for rename.
464 At this point we emit "file renamed" messages to all
465 process id's that have this file open.
466 Based on an initial code idea from SATOH Fumiyasu <fumiya@samba.gr.jp>
467 ********************************************************************/
469 bool rename_share_filename(struct messaging_context
*msg_ctx
,
470 struct share_mode_lock
*lck
,
471 const char *servicepath
,
472 uint32_t orig_name_hash
,
473 uint32_t new_name_hash
,
474 const struct smb_filename
*smb_fname_dst
)
476 struct share_mode_data
*d
= lck
->data
;
483 bool strip_two_chars
= false;
484 bool has_stream
= smb_fname_dst
->stream_name
!= NULL
;
486 DEBUG(10, ("rename_share_filename: servicepath %s newname %s\n",
487 servicepath
, smb_fname_dst
->base_name
));
490 * rename_internal_fsp() and rename_internals() add './' to
491 * head of newname if newname does not contain a '/'.
493 if (smb_fname_dst
->base_name
[0] &&
494 smb_fname_dst
->base_name
[1] &&
495 smb_fname_dst
->base_name
[0] == '.' &&
496 smb_fname_dst
->base_name
[1] == '/') {
497 strip_two_chars
= true;
500 d
->servicepath
= talloc_strdup(d
, servicepath
);
501 d
->base_name
= talloc_strdup(d
, smb_fname_dst
->base_name
+
502 (strip_two_chars
? 2 : 0));
503 d
->stream_name
= talloc_strdup(d
, smb_fname_dst
->stream_name
);
504 if (d
->base_name
== NULL
||
505 (has_stream
&& d
->stream_name
== NULL
) ||
506 d
->servicepath
== NULL
) {
507 DEBUG(0, ("rename_share_filename: talloc failed\n"));
512 sp_len
= strlen(d
->servicepath
);
513 bn_len
= strlen(d
->base_name
);
514 sn_len
= has_stream
? strlen(d
->stream_name
) : 0;
516 msg_len
= MSG_FILE_RENAMED_MIN_SIZE
+ sp_len
+ 1 + bn_len
+ 1 +
519 /* Set up the name changed message. */
520 frm
= talloc_array(d
, char, msg_len
);
525 push_file_id_24(frm
, &d
->id
);
527 DEBUG(10,("rename_share_filename: msg_len = %u\n", (unsigned int)msg_len
));
530 d
->servicepath
? d
->servicepath
: "",
532 strlcpy(&frm
[24 + sp_len
+ 1],
533 d
->base_name
? d
->base_name
: "",
535 strlcpy(&frm
[24 + sp_len
+ 1 + bn_len
+ 1],
536 d
->stream_name
? d
->stream_name
: "",
539 /* Send the messages. */
540 for (i
=0; i
<d
->num_share_modes
; i
++) {
541 struct share_mode_entry
*se
= &d
->share_modes
[i
];
542 if (!is_valid_share_mode_entry(se
)) {
546 /* If this is a hardlink to the inode
547 with a different name, skip this. */
548 if (se
->name_hash
!= orig_name_hash
) {
552 se
->name_hash
= new_name_hash
;
554 /* But not to ourselves... */
555 if (procid_is_me(&se
->pid
)) {
559 DEBUG(10,("rename_share_filename: sending rename message to "
560 "pid %s file_id %s sharepath %s base_name %s "
562 procid_str_static(&se
->pid
),
563 file_id_string_tos(&d
->id
),
564 d
->servicepath
, d
->base_name
,
565 has_stream
? d
->stream_name
: ""));
567 messaging_send_buf(msg_ctx
, se
->pid
, MSG_SMB_FILE_RENAME
,
568 (uint8
*)frm
, msg_len
);
574 void get_file_infos(struct file_id id
,
576 bool *delete_on_close
,
577 struct timespec
*write_time
)
579 struct share_mode_lock
*lck
;
581 if (delete_on_close
) {
582 *delete_on_close
= false;
586 ZERO_STRUCTP(write_time
);
589 if (!(lck
= fetch_share_mode_unlocked(talloc_tos(), id
))) {
593 if (delete_on_close
) {
594 *delete_on_close
= is_delete_on_close_set(lck
, name_hash
);
600 wt
= lck
->data
->changed_write_time
;
601 if (null_timespec(wt
)) {
602 wt
= lck
->data
->old_write_time
;
611 bool is_valid_share_mode_entry(const struct share_mode_entry
*e
)
615 num_props
+= ((e
->op_type
== NO_OPLOCK
) ? 1 : 0);
616 num_props
+= (EXCLUSIVE_OPLOCK_TYPE(e
->op_type
) ? 1 : 0);
617 num_props
+= (LEVEL_II_OPLOCK_TYPE(e
->op_type
) ? 1 : 0);
619 SMB_ASSERT(num_props
<= 1);
620 return (num_props
!= 0);
623 bool is_deferred_open_entry(const struct share_mode_entry
*e
)
625 return (e
->op_type
== DEFERRED_OPEN_ENTRY
);
628 /*******************************************************************
629 Fill a share mode entry.
630 ********************************************************************/
632 static void fill_share_mode_entry(struct share_mode_entry
*e
,
634 uid_t uid
, uint64_t mid
, uint16 op_type
)
637 e
->pid
= messaging_server_id(fsp
->conn
->sconn
->msg_ctx
);
638 e
->share_access
= fsp
->share_access
;
639 e
->private_options
= fsp
->fh
->private_options
;
640 e
->access_mask
= fsp
->access_mask
;
642 e
->op_type
= op_type
;
643 e
->time
.tv_sec
= fsp
->open_time
.tv_sec
;
644 e
->time
.tv_usec
= fsp
->open_time
.tv_usec
;
645 e
->id
= fsp
->file_id
;
646 e
->share_file_id
= fsp
->fh
->gen_id
;
647 e
->uid
= (uint32
)uid
;
648 e
->flags
= fsp
->posix_open
? SHARE_MODE_FLAG_POSIX_OPEN
: 0;
649 e
->name_hash
= fsp
->name_hash
;
652 static void fill_deferred_open_entry(struct share_mode_entry
*e
,
653 const struct timeval request_time
,
655 struct server_id pid
,
661 e
->op_type
= DEFERRED_OPEN_ENTRY
;
662 e
->time
.tv_sec
= request_time
.tv_sec
;
663 e
->time
.tv_usec
= request_time
.tv_usec
;
669 static void add_share_mode_entry(struct share_mode_data
*d
,
670 const struct share_mode_entry
*entry
)
672 ADD_TO_ARRAY(d
, struct share_mode_entry
, *entry
,
673 &d
->share_modes
, &d
->num_share_modes
);
677 void set_share_mode(struct share_mode_lock
*lck
, files_struct
*fsp
,
678 uid_t uid
, uint64_t mid
, uint16 op_type
)
680 struct share_mode_entry entry
;
681 fill_share_mode_entry(&entry
, fsp
, uid
, mid
, op_type
);
682 add_share_mode_entry(lck
->data
, &entry
);
685 void add_deferred_open(struct share_mode_lock
*lck
, uint64_t mid
,
686 struct timeval request_time
,
687 struct server_id pid
, struct file_id id
)
689 struct share_mode_entry entry
;
690 fill_deferred_open_entry(&entry
, request_time
, id
, pid
, mid
);
691 add_share_mode_entry(lck
->data
, &entry
);
694 /*******************************************************************
695 Check if two share mode entries are identical, ignoring oplock
696 and mid info and desired_access. (Removed paranoia test - it's
697 not automatically a logic error if they are identical. JRA.)
698 ********************************************************************/
700 static bool share_modes_identical(struct share_mode_entry
*e1
,
701 struct share_mode_entry
*e2
)
703 /* We used to check for e1->share_access == e2->share_access here
704 as well as the other fields but 2 different DOS or FCB opens
705 sharing the same share mode entry may validly differ in
706 fsp->share_access field. */
708 return (procid_equal(&e1
->pid
, &e2
->pid
) &&
709 file_id_equal(&e1
->id
, &e2
->id
) &&
710 e1
->share_file_id
== e2
->share_file_id
);
713 static bool deferred_open_identical(struct share_mode_entry
*e1
,
714 struct share_mode_entry
*e2
)
716 return (procid_equal(&e1
->pid
, &e2
->pid
) &&
717 (e1
->op_mid
== e2
->op_mid
) &&
718 file_id_equal(&e1
->id
, &e2
->id
));
721 static struct share_mode_entry
*find_share_mode_entry(struct share_mode_data
*d
,
722 struct share_mode_entry
*entry
)
726 for (i
=0; i
<d
->num_share_modes
; i
++) {
727 struct share_mode_entry
*e
= &d
->share_modes
[i
];
728 if (is_valid_share_mode_entry(entry
) &&
729 is_valid_share_mode_entry(e
) &&
730 share_modes_identical(e
, entry
)) {
733 if (is_deferred_open_entry(entry
) &&
734 is_deferred_open_entry(e
) &&
735 deferred_open_identical(e
, entry
)) {
742 /*******************************************************************
743 Del the share mode of a file for this process. Return the number of
745 ********************************************************************/
747 bool del_share_mode(struct share_mode_lock
*lck
, files_struct
*fsp
)
749 struct share_mode_entry entry
, *e
;
751 /* Don't care about the pid owner being correct here - just a search. */
752 fill_share_mode_entry(&entry
, fsp
, (uid_t
)-1, 0, NO_OPLOCK
);
754 e
= find_share_mode_entry(lck
->data
, &entry
);
758 *e
= lck
->data
->share_modes
[lck
->data
->num_share_modes
-1];
759 lck
->data
->num_share_modes
-= 1;
760 lck
->data
->modified
= True
;
764 void del_deferred_open_entry(struct share_mode_lock
*lck
, uint64_t mid
,
765 struct server_id pid
)
767 struct share_mode_entry entry
, *e
;
769 fill_deferred_open_entry(&entry
, timeval_zero(),
770 lck
->data
->id
, pid
, mid
);
772 e
= find_share_mode_entry(lck
->data
, &entry
);
776 *e
= lck
->data
->share_modes
[lck
->data
->num_share_modes
-1];
777 lck
->data
->num_share_modes
-= 1;
778 lck
->data
->modified
= True
;
781 /*******************************************************************
782 Remove an oplock mid and mode entry from a share mode.
783 ********************************************************************/
785 bool remove_share_oplock(struct share_mode_lock
*lck
, files_struct
*fsp
)
787 struct share_mode_entry entry
, *e
;
789 /* Don't care about the pid owner being correct here - just a search. */
790 fill_share_mode_entry(&entry
, fsp
, (uid_t
)-1, 0, NO_OPLOCK
);
792 e
= find_share_mode_entry(lck
->data
, &entry
);
797 if (EXCLUSIVE_OPLOCK_TYPE(e
->op_type
)) {
799 * Going from exclusive or batch,
800 * we always go through FAKE_LEVEL_II
803 if (!EXCLUSIVE_OPLOCK_TYPE(fsp
->oplock_type
)) {
804 smb_panic("remove_share_oplock: logic error");
806 e
->op_type
= FAKE_LEVEL_II_OPLOCK
;
808 e
->op_type
= NO_OPLOCK
;
810 lck
->data
->modified
= True
;
814 /*******************************************************************
815 Downgrade a oplock type from exclusive to level II.
816 ********************************************************************/
818 bool downgrade_share_oplock(struct share_mode_lock
*lck
, files_struct
*fsp
)
820 struct share_mode_entry entry
, *e
;
822 /* Don't care about the pid owner being correct here - just a search. */
823 fill_share_mode_entry(&entry
, fsp
, (uid_t
)-1, 0, NO_OPLOCK
);
825 e
= find_share_mode_entry(lck
->data
, &entry
);
830 e
->op_type
= LEVEL_II_OPLOCK
;
831 lck
->data
->modified
= True
;
835 /*************************************************************************
836 Return a talloced copy of a struct security_unix_token. NULL on fail.
837 (Should this be in locking.c.... ?).
838 *************************************************************************/
840 static struct security_unix_token
*copy_unix_token(TALLOC_CTX
*ctx
, const struct security_unix_token
*tok
)
842 struct security_unix_token
*cpy
;
844 cpy
= talloc(ctx
, struct security_unix_token
);
851 cpy
->ngroups
= tok
->ngroups
;
853 /* Make this a talloc child of cpy. */
854 cpy
->groups
= (gid_t
*)talloc_memdup(
855 cpy
, tok
->groups
, tok
->ngroups
* sizeof(gid_t
));
864 /****************************************************************************
865 Adds a delete on close token.
866 ****************************************************************************/
868 static bool add_delete_on_close_token(struct share_mode_data
*d
,
870 const struct security_unix_token
*tok
)
872 struct delete_token
*tmp
, *dtl
;
874 tmp
= talloc_realloc(d
, d
->delete_tokens
, struct delete_token
,
875 d
->num_delete_tokens
+1);
879 d
->delete_tokens
= tmp
;
880 dtl
= &d
->delete_tokens
[d
->num_delete_tokens
];
882 dtl
->name_hash
= name_hash
;
883 dtl
->delete_token
= copy_unix_token(d
->delete_tokens
, tok
);
884 if (dtl
->delete_token
== NULL
) {
887 d
->num_delete_tokens
+= 1;
892 /****************************************************************************
893 Sets the delete on close flag over all share modes on this file.
894 Modify the share mode entry for all files open
895 on this device and inode to tell other smbds we have
896 changed the delete on close flag. This will be noticed
897 in the close code, the last closer will delete the file
899 This makes a copy of any struct security_unix_token into the
900 lck entry. This function is used when the lock is already granted.
901 ****************************************************************************/
903 void set_delete_on_close_lck(files_struct
*fsp
,
904 struct share_mode_lock
*lck
,
905 bool delete_on_close
,
906 const struct security_unix_token
*tok
)
908 struct share_mode_data
*d
= lck
->data
;
912 if (delete_on_close
) {
913 SMB_ASSERT(tok
!= NULL
);
915 SMB_ASSERT(tok
== NULL
);
918 for (i
=0; i
<d
->num_delete_tokens
; i
++) {
919 struct delete_token
*dt
= &d
->delete_tokens
[i
];
920 if (dt
->name_hash
== fsp
->name_hash
) {
922 if (delete_on_close
== false) {
923 /* Delete this entry. */
924 TALLOC_FREE(dt
->delete_token
);
925 *dt
= d
->delete_tokens
[
926 d
->num_delete_tokens
-1];
927 d
->num_delete_tokens
-= 1;
930 /* Replace this token with the
932 TALLOC_FREE(dt
->delete_token
);
933 dt
->delete_token
= copy_unix_token(dt
, tok
);
934 SMB_ASSERT(dt
->delete_token
!= NULL
);
938 if (!delete_on_close
) {
939 /* Nothing to delete - not found. */
943 ret
= add_delete_on_close_token(lck
->data
, fsp
->name_hash
, tok
);
947 bool set_delete_on_close(files_struct
*fsp
, bool delete_on_close
, const struct security_unix_token
*tok
)
949 struct share_mode_lock
*lck
;
951 DEBUG(10,("set_delete_on_close: %s delete on close flag for "
952 "fnum = %d, file %s\n",
953 delete_on_close
? "Adding" : "Removing", fsp
->fnum
,
956 lck
= get_existing_share_mode_lock(talloc_tos(), fsp
->file_id
);
961 set_delete_on_close_lck(fsp
, lck
, delete_on_close
,
962 delete_on_close
? tok
: NULL
);
964 if (fsp
->is_directory
) {
965 SMB_ASSERT(!is_ntfs_stream_smb_fname(fsp
->fsp_name
));
966 send_stat_cache_delete_message(fsp
->conn
->sconn
->msg_ctx
,
967 fsp
->fsp_name
->base_name
);
972 fsp
->delete_on_close
= delete_on_close
;
977 const struct security_unix_token
*get_delete_on_close_token(struct share_mode_lock
*lck
, uint32_t name_hash
)
981 DEBUG(10,("get_delete_on_close_token: name_hash = 0x%x\n",
982 (unsigned int)name_hash
));
984 for (i
=0; i
<lck
->data
->num_delete_tokens
; i
++) {
985 struct delete_token
*dt
= &lck
->data
->delete_tokens
[i
];
986 DEBUG(10,("get_delete_on_close_token: dtl->name_hash = 0x%x\n",
987 (unsigned int)dt
->name_hash
));
988 if (dt
->name_hash
== name_hash
) {
989 return dt
->delete_token
;
995 bool is_delete_on_close_set(struct share_mode_lock
*lck
, uint32_t name_hash
)
997 return (get_delete_on_close_token(lck
, name_hash
) != NULL
);
1000 bool set_sticky_write_time(struct file_id fileid
, struct timespec write_time
)
1002 struct share_mode_lock
*lck
;
1004 DEBUG(5,("set_sticky_write_time: %s id=%s\n",
1005 timestring(talloc_tos(),
1006 convert_timespec_to_time_t(write_time
)),
1007 file_id_string_tos(&fileid
)));
1009 lck
= get_existing_share_mode_lock(talloc_tos(), fileid
);
1014 if (timespec_compare(&lck
->data
->changed_write_time
, &write_time
) != 0) {
1015 lck
->data
->modified
= True
;
1016 lck
->data
->changed_write_time
= write_time
;
1023 bool set_write_time(struct file_id fileid
, struct timespec write_time
)
1025 struct share_mode_lock
*lck
;
1027 DEBUG(5,("set_write_time: %s id=%s\n",
1028 timestring(talloc_tos(),
1029 convert_timespec_to_time_t(write_time
)),
1030 file_id_string_tos(&fileid
)));
1032 lck
= get_existing_share_mode_lock(talloc_tos(), fileid
);
1037 if (timespec_compare(&lck
->data
->old_write_time
, &write_time
) != 0) {
1038 lck
->data
->modified
= True
;
1039 lck
->data
->old_write_time
= write_time
;