2 Unix SMB/CIFS implementation.
4 Copyright (C) Andrew Tridgell 1992-2000
5 Copyright (C) Jeremy Allison 1992-2006
6 Copyright (C) Volker Lendecke 2005
8 This program is free software; you can redistribute it and/or modify
9 it under the terms of the GNU General Public License as published by
10 the Free Software Foundation; either version 3 of the License, or
11 (at your option) any later version.
13 This program is distributed in the hope that it will be useful,
14 but WITHOUT ANY WARRANTY; without even the implied warranty of
15 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
16 GNU General Public License for more details.
18 You should have received a copy of the GNU General Public License
19 along with this program. If not, see <http://www.gnu.org/licenses/>.
23 12 aug 96: Erik.Devriendt@te6.siemens.be
24 added support for shared memory implementation of share mode locking
26 May 1997. Jeremy Allison (jallison@whistle.com). Modified share mode
27 locking to deal with multiple share modes per open file.
29 September 1997. Jeremy Allison (jallison@whistle.com). Added oplock
32 rewritten completely to use new tdb code. Tridge, Dec '99
34 Added POSIX locking support. Jeremy Allison (jeremy@valinux.com), Apr. 2000.
35 Added Unix Extensions POSIX locking support. Jeremy Allison Mar 2006.
39 #include "system/filesys.h"
40 #include "lib/util/server_id.h"
41 #include "locking/proto.h"
42 #include "smbd/globals.h"
43 #include "dbwrap/dbwrap.h"
44 #include "dbwrap/dbwrap_open.h"
45 #include "../libcli/security/security.h"
49 #include "../librpc/gen_ndr/ndr_open_files.h"
50 #include "librpc/gen_ndr/ndr_file_id.h"
51 #include "locking/leases_db.h"
54 #define DBGC_CLASS DBGC_LOCKING
56 #define NO_LOCKING_COUNT (-1)
58 /****************************************************************************
60 ****************************************************************************/
62 const char *lock_type_name(enum brl_type lock_type)
69 case PENDING_READ_LOCK:
70 return "PENDING_READ";
71 case PENDING_WRITE_LOCK:
72 return "PENDING_WRITE";
78 const char *lock_flav_name(enum brl_flavour lock_flav)
80 return (lock_flav == WINDOWS_LOCK) ? "WINDOWS_LOCK" : "POSIX_LOCK";
83 /****************************************************************************
84 Utility function called to see if a file region is locked.
85 Called in the read/write codepath.
86 ****************************************************************************/
88 void init_strict_lock_struct(files_struct *fsp,
92 enum brl_type lock_type,
93 struct lock_struct *plock)
95 SMB_ASSERT(lock_type == READ_LOCK || lock_type == WRITE_LOCK);
97 plock->context.smblctx = smblctx;
98 plock->context.tid = fsp->conn->cnum;
99 plock->context.pid = messaging_server_id(fsp->conn->sconn->msg_ctx);
100 plock->start = start;
102 plock->fnum = fsp->fnum;
103 plock->lock_type = lock_type;
104 plock->lock_flav = lp_posix_cifsu_locktype(fsp);
107 bool strict_lock_check_default(files_struct *fsp, struct lock_struct *plock)
109 struct byte_range_lock *br_lck;
110 int strict_locking = lp_strict_locking(fsp->conn->params);
113 if (plock->size == 0) {
117 if (!lp_locking(fsp->conn->params) || !strict_locking) {
121 if (strict_locking == Auto) {
122 uint32_t lease_type = fsp_lease_type(fsp);
124 if ((lease_type & SMB2_LEASE_READ) &&
125 (plock->lock_type == READ_LOCK))
127 DBG_DEBUG("optimisation - read lease on file %s\n",
132 if ((lease_type & SMB2_LEASE_WRITE) &&
133 (plock->lock_type == WRITE_LOCK))
135 DBG_DEBUG("optimisation - write lease on file %s\n",
141 br_lck = brl_get_locks_readonly(fsp);
145 ret = brl_locktest(br_lck, plock);
149 * We got a lock conflict. Retry with rw locks to enable
150 * autocleanup. This is the slow path anyway.
152 br_lck = brl_get_locks(talloc_tos(), fsp);
153 if (br_lck == NULL) {
156 ret = brl_locktest(br_lck, plock);
160 DEBUG(10, ("strict_lock_default: flavour = %s brl start=%ju "
161 "len=%ju %s for fnum %ju file %s\n",
162 lock_flav_name(plock->lock_flav),
163 (uintmax_t)plock->start, (uintmax_t)plock->size,
164 ret ? "unlocked" : "locked",
165 (uintmax_t)plock->fnum, fsp_str_dbg(fsp)));
170 /****************************************************************************
171 Find out if a lock could be granted - return who is blocking us if we can't.
172 ****************************************************************************/
174 NTSTATUS query_lock(files_struct *fsp,
178 enum brl_type *plock_type,
179 enum brl_flavour lock_flav)
181 struct byte_range_lock *br_lck = NULL;
183 if (!fsp->can_lock) {
184 return fsp->is_directory ? NT_STATUS_INVALID_DEVICE_REQUEST : NT_STATUS_INVALID_HANDLE;
187 if (!lp_locking(fsp->conn->params)) {
191 br_lck = brl_get_locks_readonly(fsp);
193 return NT_STATUS_NO_MEMORY;
196 return brl_lockquery(br_lck,
198 messaging_server_id(fsp->conn->sconn->msg_ctx),
205 static void increment_current_lock_count(files_struct *fsp,
206 enum brl_flavour lock_flav)
208 if (lock_flav == WINDOWS_LOCK &&
209 fsp->current_lock_count != NO_LOCKING_COUNT) {
210 /* blocking ie. pending, locks also count here,
211 * as this is an efficiency counter to avoid checking
212 * the lock db. on close. JRA. */
214 fsp->current_lock_count++;
216 /* Notice that this has had a POSIX lock request.
217 * We can't count locks after this so forget them.
219 fsp->current_lock_count = NO_LOCKING_COUNT;
223 static void decrement_current_lock_count(files_struct *fsp,
224 enum brl_flavour lock_flav)
226 if (lock_flav == WINDOWS_LOCK &&
227 fsp->current_lock_count != NO_LOCKING_COUNT) {
228 SMB_ASSERT(fsp->current_lock_count > 0);
229 fsp->current_lock_count--;
233 /****************************************************************************
234 Utility function called by locking requests.
235 ****************************************************************************/
237 struct byte_range_lock *do_lock(struct messaging_context *msg_ctx,
242 enum brl_type lock_type,
243 enum brl_flavour lock_flav,
248 struct byte_range_lock *br_lck = NULL;
250 /* silently return ok on print files as we don't do locking there */
251 if (fsp->print_file) {
252 *perr = NT_STATUS_OK;
256 if (!fsp->can_lock) {
257 *perr = fsp->is_directory ? NT_STATUS_INVALID_DEVICE_REQUEST : NT_STATUS_INVALID_HANDLE;
261 if (!lp_locking(fsp->conn->params)) {
262 *perr = NT_STATUS_OK;
266 /* NOTE! 0 byte long ranges ARE allowed and should be stored */
268 DEBUG(10,("do_lock: lock flavour %s lock type %s start=%ju len=%ju "
269 "blocking_lock=%s requested for %s file %s\n",
270 lock_flav_name(lock_flav), lock_type_name(lock_type),
271 (uintmax_t)offset, (uintmax_t)count, blocking_lock ? "true" :
272 "false", fsp_fnum_dbg(fsp), fsp_str_dbg(fsp)));
274 br_lck = brl_get_locks(talloc_tos(), fsp);
276 *perr = NT_STATUS_NO_MEMORY;
280 *perr = brl_lock(msg_ctx,
283 messaging_server_id(fsp->conn->sconn->msg_ctx),
291 DEBUG(10, ("do_lock: returning status=%s\n", nt_errstr(*perr)));
293 increment_current_lock_count(fsp, lock_flav);
297 /****************************************************************************
298 Utility function called by unlocking requests.
299 ****************************************************************************/
301 NTSTATUS do_unlock(struct messaging_context *msg_ctx,
306 enum brl_flavour lock_flav)
309 struct byte_range_lock *br_lck = NULL;
311 if (!fsp->can_lock) {
312 return fsp->is_directory ? NT_STATUS_INVALID_DEVICE_REQUEST : NT_STATUS_INVALID_HANDLE;
315 if (!lp_locking(fsp->conn->params)) {
319 DEBUG(10, ("do_unlock: unlock start=%ju len=%ju requested for %s file "
320 "%s\n", (uintmax_t)offset, (uintmax_t)count,
321 fsp_fnum_dbg(fsp), fsp_str_dbg(fsp)));
323 br_lck = brl_get_locks(talloc_tos(), fsp);
325 return NT_STATUS_NO_MEMORY;
328 ok = brl_unlock(msg_ctx,
331 messaging_server_id(fsp->conn->sconn->msg_ctx),
339 DEBUG(10,("do_unlock: returning ERRlock.\n" ));
340 return NT_STATUS_RANGE_NOT_LOCKED;
343 decrement_current_lock_count(fsp, lock_flav);
347 /****************************************************************************
348 Cancel any pending blocked locks.
349 ****************************************************************************/
351 NTSTATUS do_lock_cancel(files_struct *fsp,
355 enum brl_flavour lock_flav)
358 struct byte_range_lock *br_lck = NULL;
360 if (!fsp->can_lock) {
361 return fsp->is_directory ?
362 NT_STATUS_INVALID_DEVICE_REQUEST : NT_STATUS_INVALID_HANDLE;
365 if (!lp_locking(fsp->conn->params)) {
366 return NT_STATUS_DOS(ERRDOS, ERRcancelviolation);
369 DEBUG(10, ("do_lock_cancel: cancel start=%ju len=%ju requested for "
370 "%s file %s\n", (uintmax_t)offset, (uintmax_t)count,
371 fsp_fnum_dbg(fsp), fsp_str_dbg(fsp)));
373 br_lck = brl_get_locks(talloc_tos(), fsp);
375 return NT_STATUS_NO_MEMORY;
378 ok = brl_lock_cancel(br_lck,
380 messaging_server_id(fsp->conn->sconn->msg_ctx),
388 DEBUG(10,("do_lock_cancel: returning ERRcancelviolation.\n" ));
389 return NT_STATUS_DOS(ERRDOS, ERRcancelviolation);
392 decrement_current_lock_count(fsp, lock_flav);
396 /****************************************************************************
397 Remove any locks on this fd. Called from file_close().
398 ****************************************************************************/
400 void locking_close_file(struct messaging_context *msg_ctx,
402 enum file_close_type close_type)
404 struct byte_range_lock *br_lck;
406 if (!lp_locking(fsp->conn->params)) {
410 /* If we have no outstanding locks or pending
411 * locks then we don't need to look in the lock db.
414 if (fsp->current_lock_count == 0) {
418 br_lck = brl_get_locks(talloc_tos(),fsp);
421 cancel_pending_lock_requests_by_fid(fsp, br_lck, close_type);
422 brl_close_fnum(msg_ctx, br_lck);
427 /*******************************************************************
428 Print out a share mode.
429 ********************************************************************/
431 char *share_mode_str(TALLOC_CTX *ctx, int num,
432 const struct file_id *id,
433 const struct share_mode_entry *e)
435 struct server_id_buf tmp;
437 return talloc_asprintf(ctx, "share_mode_entry[%d]: "
438 "pid = %s, share_access = 0x%x, private_options = 0x%x, "
439 "access_mask = 0x%x, mid = 0x%llx, type= 0x%x, gen_id = %llu, "
440 "uid = %u, flags = %u, file_id %s, name_hash = 0x%x",
442 server_id_str_buf(e->pid, &tmp),
443 e->share_access, e->private_options,
444 e->access_mask, (unsigned long long)e->op_mid,
445 e->op_type, (unsigned long long)e->share_file_id,
446 (unsigned int)e->uid, (unsigned int)e->flags,
447 file_id_string_tos(id),
448 (unsigned int)e->name_hash);
451 /*******************************************************************
452 Fetch a share mode where we know one MUST exist. This call reference
453 counts it internally to allow for nested lock fetches.
454 ********************************************************************/
456 struct share_mode_lock *get_existing_share_mode_lock(TALLOC_CTX *mem_ctx,
457 const struct file_id id)
459 return get_share_mode_lock(mem_ctx, id, NULL, NULL, NULL);
462 static bool rename_lease_fn(struct share_mode_lock *lck,
463 struct share_mode_entry *e,
466 struct share_mode_data *d = lck->data;
469 status = leases_db_rename(&e->client_guid,
476 if (!NT_STATUS_IS_OK(status)) {
477 /* Any error recovery possible here ? */
478 DBG_WARNING("Failed to rename lease key for "
479 "renamed file %s:%s. %s\n",
488 /*******************************************************************
489 Sets the service name and filename for rename.
490 At this point we emit "file renamed" messages to all
491 process id's that have this file open.
492 Based on an initial code idea from SATOH Fumiyasu <fumiya@samba.gr.jp>
493 ********************************************************************/
495 bool rename_share_filename(struct messaging_context *msg_ctx,
496 struct share_mode_lock *lck,
498 const char *servicepath,
499 uint32_t orig_name_hash,
500 uint32_t new_name_hash,
501 const struct smb_filename *smb_fname_dst)
503 struct share_mode_data *d = lck->data;
510 bool strip_two_chars = false;
511 bool has_stream = smb_fname_dst->stream_name != NULL;
512 struct server_id self_pid = messaging_server_id(msg_ctx);
515 DEBUG(10, ("rename_share_filename: servicepath %s newname %s\n",
516 servicepath, smb_fname_dst->base_name));
519 * rename_internal_fsp() and rename_internals() add './' to
520 * head of newname if newname does not contain a '/'.
522 if (smb_fname_dst->base_name[0] &&
523 smb_fname_dst->base_name[1] &&
524 smb_fname_dst->base_name[0] == '.' &&
525 smb_fname_dst->base_name[1] == '/') {
526 strip_two_chars = true;
529 d->servicepath = talloc_strdup(d, servicepath);
530 d->base_name = talloc_strdup(d, smb_fname_dst->base_name +
531 (strip_two_chars ? 2 : 0));
532 d->stream_name = talloc_strdup(d, smb_fname_dst->stream_name);
533 if (d->base_name == NULL ||
534 (has_stream && d->stream_name == NULL) ||
535 d->servicepath == NULL) {
536 DEBUG(0, ("rename_share_filename: talloc failed\n"));
541 sp_len = strlen(d->servicepath);
542 bn_len = strlen(d->base_name);
543 sn_len = has_stream ? strlen(d->stream_name) : 0;
545 msg_len = MSG_FILE_RENAMED_MIN_SIZE + sp_len + 1 + bn_len + 1 +
548 /* Set up the name changed message. */
549 frm = talloc_array(d, char, msg_len);
554 push_file_id_24(frm, &id);
556 DEBUG(10,("rename_share_filename: msg_len = %u\n", (unsigned int)msg_len ));
559 d->servicepath ? d->servicepath : "",
561 strlcpy(&frm[24 + sp_len + 1],
562 d->base_name ? d->base_name : "",
564 strlcpy(&frm[24 + sp_len + 1 + bn_len + 1],
565 d->stream_name ? d->stream_name : "",
568 /* Send the messages. */
569 for (i=0; i<d->num_share_modes; i++) {
570 struct share_mode_entry *se = &d->share_modes[i];
571 struct server_id_buf tmp;
573 if (!is_valid_share_mode_entry(se)) {
577 /* If this is a hardlink to the inode
578 with a different name, skip this. */
579 if (se->name_hash != orig_name_hash) {
583 se->name_hash = new_name_hash;
585 /* But not to ourselves... */
586 if (serverid_equal(&se->pid, &self_pid)) {
590 if (share_mode_stale_pid(d, i)) {
594 DEBUG(10,("rename_share_filename: sending rename message to "
595 "pid %s file_id %s sharepath %s base_name %s "
597 server_id_str_buf(se->pid, &tmp),
598 file_id_string_tos(&id),
599 d->servicepath, d->base_name,
600 has_stream ? d->stream_name : ""));
602 messaging_send_buf(msg_ctx, se->pid, MSG_SMB_FILE_RENAME,
603 (uint8_t *)frm, msg_len);
606 ok = share_mode_forall_leases(lck, rename_lease_fn, NULL);
609 * Ignore error here. Not sure what to do..
611 DBG_WARNING("share_mode_forall_leases failed\n");
617 void get_file_infos(struct file_id id,
619 bool *delete_on_close,
620 struct timespec *write_time)
622 struct share_mode_lock *lck;
624 if (delete_on_close) {
625 *delete_on_close = false;
629 ZERO_STRUCTP(write_time);
632 if (!(lck = fetch_share_mode_unlocked(talloc_tos(), id))) {
636 if (delete_on_close) {
637 *delete_on_close = is_delete_on_close_set(lck, name_hash);
641 *write_time = get_share_mode_write_time(lck);
647 bool is_valid_share_mode_entry(const struct share_mode_entry *e)
655 num_props += ((e->op_type == NO_OPLOCK) ? 1 : 0);
656 num_props += (EXCLUSIVE_OPLOCK_TYPE(e->op_type) ? 1 : 0);
657 num_props += (LEVEL_II_OPLOCK_TYPE(e->op_type) ? 1 : 0);
658 num_props += (e->op_type == LEASE_OPLOCK);
660 if ((num_props > 1) && serverid_exists(&e->pid)) {
661 smb_panic("Invalid share mode entry");
663 return (num_props != 0);
667 * See if we need to remove a lease being referred to by a
668 * share mode that is being marked stale or deleted.
671 static void remove_share_mode_lease(struct share_mode_data *d,
672 struct share_mode_entry *e)
678 op_type = e->op_type;
679 e->op_type = NO_OPLOCK;
683 if (op_type != LEASE_OPLOCK) {
688 * This used to reference a lease. If there's no other one referencing
692 lease_idx = e->lease_idx;
693 e->lease_idx = UINT32_MAX;
695 for (i=0; i<d->num_share_modes; i++) {
696 struct share_mode_entry *e2 = &d->share_modes[i];
705 if (smb2_lease_equal(&e->client_guid,
712 if (i < d->num_share_modes) {
720 d->leases[lease_idx] = d->leases[d->num_leases];
723 * We changed the lease array. Fix all references to it.
725 for (i=0; i<d->num_share_modes; i++) {
726 if (d->share_modes[i].lease_idx == d->num_leases) {
727 d->share_modes[i].lease_idx = lease_idx;
734 status = leases_db_del(&e->client_guid,
738 DEBUG(10, ("%s: leases_db_del returned %s\n", __func__,
744 * In case d->share_modes[i] conflicts with something or otherwise is
745 * being used, we need to make sure the corresponding process still
748 bool share_mode_stale_pid(struct share_mode_data *d, uint32_t idx)
750 struct server_id_buf tmp;
751 struct share_mode_entry *e;
753 if (idx > d->num_share_modes) {
754 DBG_WARNING("Asking for index %"PRIu32", "
755 "only %"PRIu32" around\n",
760 e = &d->share_modes[idx];
767 if (serverid_exists(&e->pid)) {
768 DBG_DEBUG("PID %s (index %"PRIu32" out of %"PRIu32") "
770 server_id_str_buf(e->pid, &tmp),
775 DBG_DEBUG("PID %s (index %"PRIu32" out of %"PRIu32") "
776 "does not exist anymore\n",
777 server_id_str_buf(e->pid, &tmp),
783 if (d->num_delete_tokens != 0) {
786 for (i=0; i<d->num_share_modes; i++) {
787 bool valid = !d->share_modes[i].stale;
793 if (i == d->num_share_modes) {
795 * No valid (non-stale) share mode found, all
796 * who might have set the delete token are
799 TALLOC_FREE(d->delete_tokens);
800 d->num_delete_tokens = 0;
804 remove_share_mode_lease(d, e);
810 void remove_stale_share_mode_entries(struct share_mode_data *d)
815 while (i < d->num_share_modes) {
816 if (d->share_modes[i].stale) {
817 struct share_mode_entry *m = d->share_modes;
818 m[i] = m[d->num_share_modes-1];
819 d->num_share_modes -= 1;
826 bool set_share_mode(struct share_mode_lock *lck,
827 struct files_struct *fsp,
831 const struct GUID *client_guid,
832 const struct smb2_lease_key *lease_key)
834 struct share_mode_data *d = lck->data;
835 struct share_mode_entry *tmp, *e;
837 tmp = talloc_realloc(d, d->share_modes, struct share_mode_entry,
838 d->num_share_modes+1);
842 d->share_modes = tmp;
843 e = &d->share_modes[d->num_share_modes];
844 d->num_share_modes += 1;
848 e->pid = messaging_server_id(fsp->conn->sconn->msg_ctx);
849 e->share_access = fsp->share_access;
850 e->private_options = fsp->fh->private_options;
851 e->access_mask = fsp->access_mask;
853 e->op_type = op_type;
855 if (op_type == LEASE_OPLOCK) {
858 e->client_guid = *client_guid;
859 e->lease_key = *lease_key;
862 * Need to set lease_idx. This is essentially
863 * find_share_mode_lease(), but that will go away
864 * soon. So don't add the dependency here.
867 for (i=0; i<d->num_leases; i++) {
868 struct share_mode_lease *l = &d->leases[i];
870 if (smb2_lease_equal(client_guid,
878 if (i == d->num_leases) {
879 DBG_WARNING("lease not found\n");
880 d->num_share_modes -= 1;
886 e->lease_idx = UINT32_MAX;
889 e->time.tv_sec = fsp->open_time.tv_sec;
890 e->time.tv_usec = fsp->open_time.tv_usec;
891 e->share_file_id = fsp->fh->gen_id;
892 e->uid = (uint32_t)uid;
893 e->flags = (fsp->posix_flags & FSP_POSIX_FLAGS_OPEN) ?
894 SHARE_MODE_FLAG_POSIX_OPEN : 0;
895 e->name_hash = fsp->name_hash;
900 struct share_mode_entry *find_share_mode_entry(
901 struct share_mode_lock *lck, files_struct *fsp)
903 struct share_mode_data *d = lck->data;
904 struct server_id pid;
907 pid = messaging_server_id(fsp->conn->sconn->msg_ctx);
909 for (i=0; i<d->num_share_modes; i++) {
910 struct share_mode_entry *e = &d->share_modes[i];
912 if (!is_valid_share_mode_entry(e)) {
915 if (!serverid_equal(&pid, &e->pid)) {
918 if (fsp->fh->gen_id != e->share_file_id) {
926 /*******************************************************************
927 Del the share mode of a file for this process.
928 ********************************************************************/
930 bool del_share_mode(struct share_mode_lock *lck, files_struct *fsp)
932 struct share_mode_entry *e;
934 e = find_share_mode_entry(lck, fsp);
938 remove_share_mode_lease(lck->data, e);
939 *e = lck->data->share_modes[lck->data->num_share_modes-1];
940 lck->data->num_share_modes -= 1;
941 lck->data->modified = True;
945 bool mark_share_mode_disconnected(struct share_mode_lock *lck,
946 struct files_struct *fsp)
948 struct share_mode_entry *e;
950 if (lck->data->num_share_modes != 1) {
954 if (fsp->op == NULL) {
957 if (!fsp->op->global->durable) {
961 e = find_share_mode_entry(lck, fsp);
966 DEBUG(10, ("Marking share mode entry disconnected for durable handle\n"));
968 server_id_set_disconnected(&e->pid);
971 * On reopen the caller needs to check that
972 * the client comes with the correct handle.
974 e->share_file_id = fsp->op->global->open_persistent_id;
976 lck->data->modified = true;
980 /*******************************************************************
981 Remove an oplock mid and mode entry from a share mode.
982 ********************************************************************/
984 bool remove_share_oplock(struct share_mode_lock *lck, files_struct *fsp)
986 struct share_mode_data *d = lck->data;
987 struct share_mode_entry *e;
989 e = find_share_mode_entry(lck, fsp);
994 remove_share_mode_lease(d, e);
999 /*******************************************************************
1000 Downgrade a oplock type from exclusive to level II.
1001 ********************************************************************/
1003 bool downgrade_share_oplock(struct share_mode_lock *lck, files_struct *fsp)
1005 struct share_mode_entry *e;
1007 e = find_share_mode_entry(lck, fsp);
1012 e->op_type = LEVEL_II_OPLOCK;
1013 lck->data->modified = True;
1017 /****************************************************************************
1018 Adds a delete on close token.
1019 ****************************************************************************/
1021 static bool add_delete_on_close_token(struct share_mode_data *d,
1023 const struct security_token *nt_tok,
1024 const struct security_unix_token *tok)
1026 struct delete_token *tmp, *dtl;
1028 tmp = talloc_realloc(d, d->delete_tokens, struct delete_token,
1029 d->num_delete_tokens+1);
1033 d->delete_tokens = tmp;
1034 dtl = &d->delete_tokens[d->num_delete_tokens];
1036 dtl->name_hash = name_hash;
1037 dtl->delete_nt_token = dup_nt_token(d->delete_tokens, nt_tok);
1038 if (dtl->delete_nt_token == NULL) {
1041 dtl->delete_token = copy_unix_token(d->delete_tokens, tok);
1042 if (dtl->delete_token == NULL) {
1045 d->num_delete_tokens += 1;
1050 void reset_delete_on_close_lck(files_struct *fsp,
1051 struct share_mode_lock *lck)
1053 struct share_mode_data *d = lck->data;
1056 for (i=0; i<d->num_delete_tokens; i++) {
1057 struct delete_token *dt = &d->delete_tokens[i];
1059 if (dt->name_hash == fsp->name_hash) {
1062 /* Delete this entry. */
1063 TALLOC_FREE(dt->delete_nt_token);
1064 TALLOC_FREE(dt->delete_token);
1065 *dt = d->delete_tokens[d->num_delete_tokens-1];
1066 d->num_delete_tokens -= 1;
1071 /****************************************************************************
1072 Sets the delete on close flag over all share modes on this file.
1073 Modify the share mode entry for all files open
1074 on this device and inode to tell other smbds we have
1075 changed the delete on close flag. This will be noticed
1076 in the close code, the last closer will delete the file
1078 This makes a copy of any struct security_unix_token into the
1079 lck entry. This function is used when the lock is already granted.
1080 ****************************************************************************/
1082 void set_delete_on_close_lck(files_struct *fsp,
1083 struct share_mode_lock *lck,
1084 const struct security_token *nt_tok,
1085 const struct security_unix_token *tok)
1087 struct messaging_context *msg_ctx = fsp->conn->sconn->msg_ctx;
1088 struct share_mode_data *d = lck->data;
1091 DATA_BLOB fid_blob = {};
1092 enum ndr_err_code ndr_err;
1094 SMB_ASSERT(nt_tok != NULL);
1095 SMB_ASSERT(tok != NULL);
1097 for (i=0; i<d->num_delete_tokens; i++) {
1098 struct delete_token *dt = &d->delete_tokens[i];
1099 if (dt->name_hash == fsp->name_hash) {
1102 /* Replace this token with the given tok. */
1103 TALLOC_FREE(dt->delete_nt_token);
1104 dt->delete_nt_token = dup_nt_token(dt, nt_tok);
1105 SMB_ASSERT(dt->delete_nt_token != NULL);
1106 TALLOC_FREE(dt->delete_token);
1107 dt->delete_token = copy_unix_token(dt, tok);
1108 SMB_ASSERT(dt->delete_token != NULL);
1114 ret = add_delete_on_close_token(lck->data, fsp->name_hash, nt_tok, tok);
1117 ndr_err = ndr_push_struct_blob(&fid_blob, talloc_tos(), &fsp->file_id,
1118 (ndr_push_flags_fn_t)ndr_push_file_id);
1119 if (!NDR_ERR_CODE_IS_SUCCESS(ndr_err)) {
1120 DEBUG(10, ("ndr_push_file_id failed: %s\n",
1121 ndr_errstr(ndr_err)));
1124 for (i=0; i<d->num_share_modes; i++) {
1125 struct share_mode_entry *e = &d->share_modes[i];
1128 status = messaging_send(
1129 msg_ctx, e->pid, MSG_SMB_NOTIFY_CANCEL_DELETED,
1132 if (!NT_STATUS_IS_OK(status)) {
1133 struct server_id_buf tmp;
1134 DEBUG(10, ("%s: messaging_send to %s returned %s\n",
1135 __func__, server_id_str_buf(e->pid, &tmp),
1136 nt_errstr(status)));
1140 TALLOC_FREE(fid_blob.data);
1143 bool set_delete_on_close(files_struct *fsp, bool delete_on_close,
1144 const struct security_token *nt_tok,
1145 const struct security_unix_token *tok)
1147 struct share_mode_lock *lck;
1149 DEBUG(10,("set_delete_on_close: %s delete on close flag for "
1151 delete_on_close ? "Adding" : "Removing", fsp_fnum_dbg(fsp),
1154 lck = get_existing_share_mode_lock(talloc_tos(), fsp->file_id);
1159 if (delete_on_close) {
1160 set_delete_on_close_lck(fsp, lck, nt_tok, tok);
1162 reset_delete_on_close_lck(fsp, lck);
1165 if (fsp->is_directory) {
1166 SMB_ASSERT(!is_ntfs_stream_smb_fname(fsp->fsp_name));
1167 send_stat_cache_delete_message(fsp->conn->sconn->msg_ctx,
1168 fsp->fsp_name->base_name);
1173 fsp->delete_on_close = delete_on_close;
1178 static struct delete_token *find_delete_on_close_token(
1179 struct share_mode_data *d, uint32_t name_hash)
1183 DEBUG(10, ("find_delete_on_close_token: name_hash = 0x%x\n",
1184 (unsigned int)name_hash));
1186 for (i=0; i<d->num_delete_tokens; i++) {
1187 struct delete_token *dt = &d->delete_tokens[i];
1189 DEBUG(10, ("find__delete_on_close_token: dt->name_hash = 0x%x\n",
1190 (unsigned int)dt->name_hash ));
1191 if (dt->name_hash == name_hash) {
1198 /****************************************************************************
1199 Return the NT token and UNIX token if there's a match. Return true if
1200 found, false if not.
1201 ****************************************************************************/
1203 bool get_delete_on_close_token(struct share_mode_lock *lck,
1205 const struct security_token **pp_nt_tok,
1206 const struct security_unix_token **pp_tok)
1208 struct delete_token *dt;
1210 dt = find_delete_on_close_token(lck->data, name_hash);
1214 *pp_nt_tok = dt->delete_nt_token;
1215 *pp_tok = dt->delete_token;
1219 bool is_delete_on_close_set(struct share_mode_lock *lck, uint32_t name_hash)
1221 return find_delete_on_close_token(lck->data, name_hash) != NULL;
1224 bool set_sticky_write_time(struct file_id fileid, struct timespec write_time)
1226 struct share_mode_lock *lck;
1228 DEBUG(5,("set_sticky_write_time: %s id=%s\n",
1229 timestring(talloc_tos(),
1230 convert_timespec_to_time_t(write_time)),
1231 file_id_string_tos(&fileid)));
1233 lck = get_existing_share_mode_lock(talloc_tos(), fileid);
1238 if (timespec_compare(&lck->data->changed_write_time, &write_time) != 0) {
1239 lck->data->modified = True;
1240 lck->data->changed_write_time = write_time;
1247 bool set_write_time(struct file_id fileid, struct timespec write_time)
1249 struct share_mode_lock *lck;
1251 DEBUG(5,("set_write_time: %s id=%s\n",
1252 timestring(talloc_tos(),
1253 convert_timespec_to_time_t(write_time)),
1254 file_id_string_tos(&fileid)));
1256 lck = get_existing_share_mode_lock(talloc_tos(), fileid);
1261 if (timespec_compare(&lck->data->old_write_time, &write_time) != 0) {
1262 lck->data->modified = True;
1263 lck->data->old_write_time = write_time;
1270 struct timespec get_share_mode_write_time(struct share_mode_lock *lck)
1272 struct share_mode_data *d = lck->data;
1274 if (!null_timespec(d->changed_write_time)) {
1275 return d->changed_write_time;
1277 return d->old_write_time;
1280 bool file_has_open_streams(files_struct *fsp)
1282 struct share_mode_lock *lock = NULL;
1283 struct share_mode_data *d = NULL;
1286 lock = get_existing_share_mode_lock(talloc_tos(), fsp->file_id);
1292 for (i = 0; i < d->num_share_modes; i++) {
1293 struct share_mode_entry *e = &d->share_modes[i];
1295 if (share_mode_stale_pid(d, i)) {
1299 if (e->private_options &
1300 NTCREATEX_OPTIONS_PRIVATE_STREAM_BASEOPEN)
1312 * Walk share mode entries, looking at every lease only once
1315 bool share_mode_forall_leases(
1316 struct share_mode_lock *lck,
1317 bool (*fn)(struct share_mode_lock *lck,
1318 struct share_mode_entry *e,
1319 void *private_data),
1322 struct share_mode_data *d = lck->data;
1323 uint32_t *leases = NULL;
1324 uint32_t num_leases = 0;
1327 leases = talloc_array(talloc_tos(), uint32_t, d->num_share_modes);
1328 if (leases == NULL) {
1332 for (i=0; i<d->num_share_modes; i++) {
1333 struct share_mode_entry *e = &d->share_modes[i];
1337 ok = is_valid_share_mode_entry(e);
1342 if (e->op_type != LEASE_OPLOCK) {
1347 * See if we have already seen "e"'s lease. This is
1348 * O(n^2). If we sort "leases", we can get this down
1352 for (j=0; j<num_leases; j++) {
1353 uint32_t idx = leases[j];
1354 struct share_mode_entry *l = &d->share_modes[idx];
1356 if (smb2_lease_equal(&e->client_guid,
1363 if (j < num_leases) {
1365 * Don't look at "e"'s lease, we've already
1371 stop = fn(lck, e, private_data);
1373 TALLOC_FREE(leases);
1377 leases[num_leases] = i;
1381 TALLOC_FREE(leases);