2 Unix SMB/CIFS implementation.
4 Copyright (C) Andrew Tridgell 1992-2000
5 Copyright (C) Jeremy Allison 1992-2006
6 Copyright (C) Volker Lendecke 2005
8 This program is free software; you can redistribute it and/or modify
9 it under the terms of the GNU General Public License as published by
10 the Free Software Foundation; either version 3 of the License, or
11 (at your option) any later version.
13 This program is distributed in the hope that it will be useful,
14 but WITHOUT ANY WARRANTY; without even the implied warranty of
15 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
16 GNU General Public License for more details.
18 You should have received a copy of the GNU General Public License
19 along with this program. If not, see <http://www.gnu.org/licenses/>.
23 12 aug 96: Erik.Devriendt@te6.siemens.be
24 added support for shared memory implementation of share mode locking
26 May 1997. Jeremy Allison (jallison@whistle.com). Modified share mode
27 locking to deal with multiple share modes per open file.
29 September 1997. Jeremy Allison (jallison@whistle.com). Added oplock
32 rewritten completely to use new tdb code. Tridge, Dec '99
34 Added POSIX locking support. Jeremy Allison (jeremy@valinux.com), Apr. 2000.
35 Added Unix Extensions POSIX locking support. Jeremy Allison Mar 2006.
39 #include "system/filesys.h"
40 #include "lib/util/server_id.h"
41 #include "locking/proto.h"
42 #include "smbd/globals.h"
43 #include "dbwrap/dbwrap.h"
44 #include "dbwrap/dbwrap_open.h"
45 #include "../libcli/security/security.h"
49 #include "../librpc/gen_ndr/ndr_open_files.h"
50 #include "librpc/gen_ndr/ndr_file_id.h"
51 #include "locking/leases_db.h"
54 #define DBGC_CLASS DBGC_LOCKING
56 #define NO_LOCKING_COUNT (-1)
58 /****************************************************************************
60 ****************************************************************************/
62 const char *lock_type_name(enum brl_type lock_type)
74 const char *lock_flav_name(enum brl_flavour lock_flav)
76 return (lock_flav == WINDOWS_LOCK) ? "WINDOWS_LOCK" : "POSIX_LOCK";
79 /****************************************************************************
80 Utility function called to see if a file region is locked.
81 Called in the read/write codepath.
82 ****************************************************************************/
84 void init_strict_lock_struct(files_struct *fsp,
88 enum brl_type lock_type,
89 struct lock_struct *plock)
91 SMB_ASSERT(lock_type == READ_LOCK || lock_type == WRITE_LOCK);
93 plock->context.smblctx = smblctx;
94 plock->context.tid = fsp->conn->cnum;
95 plock->context.pid = messaging_server_id(fsp->conn->sconn->msg_ctx);
98 plock->fnum = fsp->fnum;
99 plock->lock_type = lock_type;
100 plock->lock_flav = lp_posix_cifsu_locktype(fsp);
103 bool strict_lock_check_default(files_struct *fsp, struct lock_struct *plock)
105 struct byte_range_lock *br_lck;
106 int strict_locking = lp_strict_locking(fsp->conn->params);
109 if (plock->size == 0) {
113 if (!lp_locking(fsp->conn->params) || !strict_locking) {
117 if (strict_locking == Auto) {
118 uint32_t lease_type = fsp_lease_type(fsp);
120 if ((lease_type & SMB2_LEASE_READ) &&
121 (plock->lock_type == READ_LOCK))
123 DBG_DEBUG("optimisation - read lease on file %s\n",
128 if ((lease_type & SMB2_LEASE_WRITE) &&
129 (plock->lock_type == WRITE_LOCK))
131 DBG_DEBUG("optimisation - write lease on file %s\n",
137 br_lck = brl_get_locks_readonly(fsp);
141 ret = brl_locktest(br_lck, plock);
145 * We got a lock conflict. Retry with rw locks to enable
146 * autocleanup. This is the slow path anyway.
148 br_lck = brl_get_locks(talloc_tos(), fsp);
149 if (br_lck == NULL) {
152 ret = brl_locktest(br_lck, plock);
156 DEBUG(10, ("strict_lock_default: flavour = %s brl start=%ju "
157 "len=%ju %s for fnum %ju file %s\n",
158 lock_flav_name(plock->lock_flav),
159 (uintmax_t)plock->start, (uintmax_t)plock->size,
160 ret ? "unlocked" : "locked",
161 (uintmax_t)plock->fnum, fsp_str_dbg(fsp)));
166 /****************************************************************************
167 Find out if a lock could be granted - return who is blocking us if we can't.
168 ****************************************************************************/
170 NTSTATUS query_lock(files_struct *fsp,
174 enum brl_type *plock_type,
175 enum brl_flavour lock_flav)
177 struct byte_range_lock *br_lck = NULL;
179 if (!fsp->can_lock) {
180 return fsp->is_directory ? NT_STATUS_INVALID_DEVICE_REQUEST : NT_STATUS_INVALID_HANDLE;
183 if (!lp_locking(fsp->conn->params)) {
187 br_lck = brl_get_locks_readonly(fsp);
189 return NT_STATUS_NO_MEMORY;
192 return brl_lockquery(br_lck,
194 messaging_server_id(fsp->conn->sconn->msg_ctx),
201 static void increment_current_lock_count(files_struct *fsp,
202 enum brl_flavour lock_flav)
204 if (lock_flav == WINDOWS_LOCK &&
205 fsp->current_lock_count != NO_LOCKING_COUNT) {
206 /* blocking ie. pending, locks also count here,
207 * as this is an efficiency counter to avoid checking
208 * the lock db. on close. JRA. */
210 fsp->current_lock_count++;
212 /* Notice that this has had a POSIX lock request.
213 * We can't count locks after this so forget them.
215 fsp->current_lock_count = NO_LOCKING_COUNT;
219 static void decrement_current_lock_count(files_struct *fsp,
220 enum brl_flavour lock_flav)
222 if (lock_flav == WINDOWS_LOCK &&
223 fsp->current_lock_count != NO_LOCKING_COUNT) {
224 SMB_ASSERT(fsp->current_lock_count > 0);
225 fsp->current_lock_count--;
229 /****************************************************************************
230 Utility function called by locking requests.
231 ****************************************************************************/
233 struct do_lock_state {
234 struct files_struct *fsp;
238 enum brl_type lock_type;
239 enum brl_flavour lock_flav;
241 struct server_id blocker_pid;
242 uint64_t blocker_smblctx;
246 static void do_lock_fn(
247 struct db_record *rec,
248 bool *modified_dependent,
251 struct do_lock_state *state = private_data;
252 struct byte_range_lock *br_lck = NULL;
254 br_lck = brl_get_locks(talloc_tos(), state->fsp);
255 if (br_lck == NULL) {
256 state->status = NT_STATUS_NO_MEMORY;
260 state->status = brl_lock(
263 messaging_server_id(state->fsp->conn->sconn->msg_ctx),
269 &state->blocker_smblctx);
274 NTSTATUS do_lock(files_struct *fsp,
278 enum brl_type lock_type,
279 enum brl_flavour lock_flav,
280 struct server_id *pblocker_pid,
283 struct do_lock_state state = {
288 .lock_type = lock_type,
289 .lock_flav = lock_flav,
293 /* silently return ok on print files as we don't do locking there */
294 if (fsp->print_file) {
298 if (!fsp->can_lock) {
299 if (fsp->is_directory) {
300 return NT_STATUS_INVALID_DEVICE_REQUEST;
302 return NT_STATUS_INVALID_HANDLE;
305 if (!lp_locking(fsp->conn->params)) {
309 /* NOTE! 0 byte long ranges ARE allowed and should be stored */
311 DBG_DEBUG("lock flavour %s lock type %s start=%"PRIu64" len=%"PRIu64" "
312 "requested for %s file %s\n",
313 lock_flav_name(lock_flav),
314 lock_type_name(lock_type),
320 status = share_mode_do_locked(fsp->file_id, do_lock_fn, &state);
321 if (!NT_STATUS_IS_OK(status)) {
322 DBG_DEBUG("share_mode_do_locked returned %s\n",
327 if (psmblctx != NULL) {
328 *psmblctx = state.blocker_smblctx;
330 if (pblocker_pid != NULL) {
331 *pblocker_pid = state.blocker_pid;
334 DBG_DEBUG("returning status=%s\n", nt_errstr(state.status));
336 increment_current_lock_count(fsp, lock_flav);
341 /****************************************************************************
342 Utility function called by unlocking requests.
343 ****************************************************************************/
345 NTSTATUS do_unlock(files_struct *fsp,
349 enum brl_flavour lock_flav)
352 struct byte_range_lock *br_lck = NULL;
354 if (!fsp->can_lock) {
355 return fsp->is_directory ? NT_STATUS_INVALID_DEVICE_REQUEST : NT_STATUS_INVALID_HANDLE;
358 if (!lp_locking(fsp->conn->params)) {
362 DBG_DEBUG("unlock start=%"PRIu64" len=%"PRIu64" requested for %s file "
369 br_lck = brl_get_locks(talloc_tos(), fsp);
371 return NT_STATUS_NO_MEMORY;
374 ok = brl_unlock(br_lck,
376 messaging_server_id(fsp->conn->sconn->msg_ctx),
384 DEBUG(10,("do_unlock: returning ERRlock.\n" ));
385 return NT_STATUS_RANGE_NOT_LOCKED;
388 decrement_current_lock_count(fsp, lock_flav);
392 /****************************************************************************
393 Remove any locks on this fd. Called from file_close().
394 ****************************************************************************/
396 void locking_close_file(files_struct *fsp,
397 enum file_close_type close_type)
399 struct byte_range_lock *br_lck;
401 if (!lp_locking(fsp->conn->params)) {
405 /* If we have no outstanding locks or pending
406 * locks then we don't need to look in the lock db.
409 if (fsp->current_lock_count == 0) {
413 br_lck = brl_get_locks(talloc_tos(),fsp);
417 * Unlocks must trigger dbwrap_watch watchers,
418 * normally in smbd_do_unlocking. Here it's done
419 * implictly, we're closing the file and thus remove a
420 * share mode. This will wake the waiters.
422 brl_close_fnum(br_lck);
427 /*******************************************************************
428 Print out a share mode.
429 ********************************************************************/
431 char *share_mode_str(TALLOC_CTX *ctx, int num,
432 const struct file_id *id,
433 const struct share_mode_entry *e)
435 struct server_id_buf tmp;
437 return talloc_asprintf(ctx, "share_mode_entry[%d]: "
438 "pid = %s, share_access = 0x%x, private_options = 0x%x, "
439 "access_mask = 0x%x, mid = 0x%llx, type= 0x%x, gen_id = %llu, "
440 "uid = %u, flags = %u, file_id %s, name_hash = 0x%x",
442 server_id_str_buf(e->pid, &tmp),
443 e->share_access, e->private_options,
444 e->access_mask, (unsigned long long)e->op_mid,
445 e->op_type, (unsigned long long)e->share_file_id,
446 (unsigned int)e->uid, (unsigned int)e->flags,
447 file_id_string_tos(id),
448 (unsigned int)e->name_hash);
451 /*******************************************************************
452 Fetch a share mode where we know one MUST exist. This call reference
453 counts it internally to allow for nested lock fetches.
454 ********************************************************************/
456 struct share_mode_lock *get_existing_share_mode_lock(TALLOC_CTX *mem_ctx,
457 const struct file_id id)
459 return get_share_mode_lock(mem_ctx, id, NULL, NULL, NULL);
462 static bool rename_lease_fn(struct share_mode_lock *lck,
463 struct share_mode_entry *e,
466 struct share_mode_data *d = lck->data;
469 status = leases_db_rename(&e->client_guid,
476 if (!NT_STATUS_IS_OK(status)) {
477 /* Any error recovery possible here ? */
478 DBG_WARNING("Failed to rename lease key for "
479 "renamed file %s:%s. %s\n",
488 /*******************************************************************
489 Sets the service name and filename for rename.
490 At this point we emit "file renamed" messages to all
491 process id's that have this file open.
492 Based on an initial code idea from SATOH Fumiyasu <fumiya@samba.gr.jp>
493 ********************************************************************/
495 bool rename_share_filename(struct messaging_context *msg_ctx,
496 struct share_mode_lock *lck,
498 const char *servicepath,
499 uint32_t orig_name_hash,
500 uint32_t new_name_hash,
501 const struct smb_filename *smb_fname_dst)
503 struct share_mode_data *d = lck->data;
504 struct file_rename_message msg = {
506 .servicepath = servicepath,
507 .base_name = smb_fname_dst->base_name,
508 .stream_name = smb_fname_dst->stream_name,
511 struct server_id self_pid = messaging_server_id(msg_ctx);
514 DEBUG(10, ("rename_share_filename: servicepath %s newname %s\n",
515 servicepath, smb_fname_dst->base_name));
518 * rename_internal_fsp() and rename_internals() add './' to
519 * head of newname if newname does not contain a '/'.
522 if (strncmp(msg.base_name, "./", 2) == 0) {
526 d->servicepath = talloc_strdup(d, msg.servicepath);
527 d->base_name = talloc_strdup(d, msg.base_name);
528 d->stream_name = talloc_strdup(d, msg.stream_name);
529 if ((d->servicepath == NULL) ||
530 (d->base_name == NULL) ||
531 ((msg.stream_name != NULL) && (d->stream_name == NULL))) {
532 DBG_WARNING("talloc failed\n");
537 /* Send the messages. */
538 for (i=0; i<d->num_share_modes; i++) {
539 struct share_mode_entry *se = &d->share_modes[i];
541 enum ndr_err_code ndr_err;
543 if (!is_valid_share_mode_entry(se)) {
547 /* If this is a hardlink to the inode
548 with a different name, skip this. */
549 if (se->name_hash != orig_name_hash) {
553 se->name_hash = new_name_hash;
555 /* But not to ourselves... */
556 if (serverid_equal(&se->pid, &self_pid)) {
560 if (share_mode_stale_pid(d, i)) {
564 msg.share_file_id = se->share_file_id;
566 ndr_err = ndr_push_struct_blob(
570 (ndr_push_flags_fn_t)ndr_push_file_rename_message);
571 if (!NDR_ERR_CODE_IS_SUCCESS(ndr_err)) {
572 DBG_DEBUG("ndr_push_file_rename_message failed: %s\n",
573 ndr_errstr(ndr_err));
576 if (DEBUGLEVEL >= 10) {
577 struct server_id_buf tmp;
578 DBG_DEBUG("sending rename message to %s\n",
579 server_id_str_buf(se->pid, &tmp));
580 NDR_PRINT_DEBUG(file_rename_message, &msg);
583 messaging_send(msg_ctx, se->pid, MSG_SMB_FILE_RENAME, &blob);
585 TALLOC_FREE(blob.data);
588 ok = share_mode_forall_leases(lck, rename_lease_fn, NULL);
591 * Ignore error here. Not sure what to do..
593 DBG_WARNING("share_mode_forall_leases failed\n");
599 void get_file_infos(struct file_id id,
601 bool *delete_on_close,
602 struct timespec *write_time)
604 struct share_mode_lock *lck;
606 if (delete_on_close) {
607 *delete_on_close = false;
611 ZERO_STRUCTP(write_time);
614 if (!(lck = fetch_share_mode_unlocked(talloc_tos(), id))) {
618 if (delete_on_close) {
619 *delete_on_close = is_delete_on_close_set(lck, name_hash);
623 *write_time = get_share_mode_write_time(lck);
629 bool is_valid_share_mode_entry(const struct share_mode_entry *e)
637 num_props += ((e->op_type == NO_OPLOCK) ? 1 : 0);
638 num_props += (EXCLUSIVE_OPLOCK_TYPE(e->op_type) ? 1 : 0);
639 num_props += (LEVEL_II_OPLOCK_TYPE(e->op_type) ? 1 : 0);
640 num_props += (e->op_type == LEASE_OPLOCK);
642 if ((num_props > 1) && serverid_exists(&e->pid)) {
643 smb_panic("Invalid share mode entry");
645 return (num_props != 0);
648 NTSTATUS remove_lease_if_stale(const struct share_mode_data *d,
649 const struct GUID *client_guid,
650 const struct smb2_lease_key *lease_key)
655 for (i=0; i<d->num_share_modes; i++) {
656 const struct share_mode_entry *e = &d->share_modes[i];
662 if (e->op_type != LEASE_OPLOCK) {
666 same = smb2_lease_equal(
672 return NT_STATUS_RESOURCE_IN_USE;
676 status = leases_db_del(client_guid, lease_key, &d->id);
677 if (!NT_STATUS_IS_OK(status)) {
678 DBG_DEBUG("leases_db_del failed: %s\n",
685 * See if we need to remove a lease being referred to by a
686 * share mode that is being marked stale or deleted.
689 static void remove_share_mode_lease(struct share_mode_data *d,
690 struct share_mode_entry *e)
694 op_type = e->op_type;
695 e->op_type = NO_OPLOCK;
699 if (op_type != LEASE_OPLOCK) {
703 remove_lease_if_stale(d, &e->client_guid, &e->lease_key);
707 * In case d->share_modes[i] conflicts with something or otherwise is
708 * being used, we need to make sure the corresponding process still
711 bool share_mode_stale_pid(struct share_mode_data *d, uint32_t idx)
713 struct server_id_buf tmp;
714 struct share_mode_entry *e;
716 if (idx > d->num_share_modes) {
717 DBG_WARNING("Asking for index %"PRIu32", "
718 "only %"PRIu32" around\n",
723 e = &d->share_modes[idx];
730 if (serverid_exists(&e->pid)) {
731 DBG_DEBUG("PID %s (index %"PRIu32" out of %"PRIu32") "
733 server_id_str_buf(e->pid, &tmp),
738 DBG_DEBUG("PID %s (index %"PRIu32" out of %"PRIu32") "
739 "does not exist anymore\n",
740 server_id_str_buf(e->pid, &tmp),
746 if (d->num_delete_tokens != 0) {
749 for (i=0; i<d->num_share_modes; i++) {
750 bool valid = !d->share_modes[i].stale;
756 if (i == d->num_share_modes) {
758 * No valid (non-stale) share mode found, all
759 * who might have set the delete token are
762 TALLOC_FREE(d->delete_tokens);
763 d->num_delete_tokens = 0;
767 remove_share_mode_lease(d, e);
773 void remove_stale_share_mode_entries(struct share_mode_data *d)
778 while (i < d->num_share_modes) {
779 if (d->share_modes[i].stale) {
780 struct share_mode_entry *m = d->share_modes;
781 m[i] = m[d->num_share_modes-1];
782 d->num_share_modes -= 1;
789 bool set_share_mode(struct share_mode_lock *lck,
790 struct files_struct *fsp,
794 uint32_t share_access,
795 uint32_t access_mask)
797 struct share_mode_data *d = lck->data;
798 struct share_mode_entry *tmp, *e;
800 tmp = talloc_realloc(d, d->share_modes, struct share_mode_entry,
801 d->num_share_modes+1);
805 d->share_modes = tmp;
806 e = &d->share_modes[d->num_share_modes];
807 d->num_share_modes += 1;
811 e->pid = messaging_server_id(fsp->conn->sconn->msg_ctx);
812 e->share_access = share_access;
813 e->private_options = fsp->fh->private_options;
814 e->access_mask = access_mask;
816 e->op_type = op_type;
818 if (op_type == LEASE_OPLOCK) {
819 const struct GUID *client_guid = fsp_client_guid(fsp);
820 e->client_guid = *client_guid;
821 e->lease_key = fsp->lease->lease.lease_key;
824 e->time.tv_sec = fsp->open_time.tv_sec;
825 e->time.tv_usec = fsp->open_time.tv_usec;
826 e->share_file_id = fsp->fh->gen_id;
827 e->uid = (uint32_t)uid;
828 e->flags = (fsp->posix_flags & FSP_POSIX_FLAGS_OPEN) ?
829 SHARE_MODE_FLAG_POSIX_OPEN : 0;
830 e->name_hash = fsp->name_hash;
835 static struct share_mode_entry *find_share_mode_entry(
836 struct share_mode_lock *lck, files_struct *fsp)
838 struct share_mode_data *d = lck->data;
839 struct server_id pid = messaging_server_id(fsp->conn->sconn->msg_ctx);
842 for (i=0; i<d->num_share_modes; i++) {
843 struct share_mode_entry *e = &d->share_modes[i];
845 if (!is_valid_share_mode_entry(e)) {
848 if (!serverid_equal(&pid, &e->pid)) {
851 if (fsp->fh->gen_id != e->share_file_id) {
859 /*******************************************************************
860 Del the share mode of a file for this process.
861 ********************************************************************/
863 bool del_share_mode(struct share_mode_lock *lck, files_struct *fsp)
865 struct share_mode_entry *e;
867 e = find_share_mode_entry(lck, fsp);
871 remove_share_mode_lease(lck->data, e);
872 *e = lck->data->share_modes[lck->data->num_share_modes-1];
873 lck->data->num_share_modes -= 1;
874 lck->data->modified = True;
878 bool mark_share_mode_disconnected(struct share_mode_lock *lck,
879 struct files_struct *fsp)
881 struct share_mode_entry *e;
883 if (lck->data->num_share_modes != 1) {
887 if (fsp->op == NULL) {
890 if (!fsp->op->global->durable) {
894 e = find_share_mode_entry(lck, fsp);
899 DEBUG(10, ("Marking share mode entry disconnected for durable handle\n"));
901 server_id_set_disconnected(&e->pid);
904 * On reopen the caller needs to check that
905 * the client comes with the correct handle.
907 e->share_file_id = fsp->op->global->open_persistent_id;
909 lck->data->modified = true;
913 /*******************************************************************
914 Remove an oplock mid and mode entry from a share mode.
915 ********************************************************************/
917 bool remove_share_oplock(struct share_mode_lock *lck, files_struct *fsp)
919 struct share_mode_data *d = lck->data;
920 struct share_mode_entry *e;
922 e = find_share_mode_entry(lck, fsp);
927 remove_share_mode_lease(d, e);
932 /*******************************************************************
933 Downgrade a oplock type from exclusive to level II.
934 ********************************************************************/
936 bool downgrade_share_oplock(struct share_mode_lock *lck, files_struct *fsp)
938 struct share_mode_entry *e;
940 e = find_share_mode_entry(lck, fsp);
945 e->op_type = LEVEL_II_OPLOCK;
946 lck->data->flags |= SHARE_MODE_HAS_READ_LEASE;
947 lck->data->modified = True;
951 /****************************************************************************
952 Adds a delete on close token.
953 ****************************************************************************/
955 static bool add_delete_on_close_token(struct share_mode_data *d,
957 const struct security_token *nt_tok,
958 const struct security_unix_token *tok)
960 struct delete_token *tmp, *dtl;
962 tmp = talloc_realloc(d, d->delete_tokens, struct delete_token,
963 d->num_delete_tokens+1);
967 d->delete_tokens = tmp;
968 dtl = &d->delete_tokens[d->num_delete_tokens];
970 dtl->name_hash = name_hash;
971 dtl->delete_nt_token = dup_nt_token(d->delete_tokens, nt_tok);
972 if (dtl->delete_nt_token == NULL) {
975 dtl->delete_token = copy_unix_token(d->delete_tokens, tok);
976 if (dtl->delete_token == NULL) {
979 d->num_delete_tokens += 1;
984 void reset_delete_on_close_lck(files_struct *fsp,
985 struct share_mode_lock *lck)
987 struct share_mode_data *d = lck->data;
990 for (i=0; i<d->num_delete_tokens; i++) {
991 struct delete_token *dt = &d->delete_tokens[i];
993 if (dt->name_hash == fsp->name_hash) {
996 /* Delete this entry. */
997 TALLOC_FREE(dt->delete_nt_token);
998 TALLOC_FREE(dt->delete_token);
999 *dt = d->delete_tokens[d->num_delete_tokens-1];
1000 d->num_delete_tokens -= 1;
1005 /****************************************************************************
1006 Sets the delete on close flag over all share modes on this file.
1007 Modify the share mode entry for all files open
1008 on this device and inode to tell other smbds we have
1009 changed the delete on close flag. This will be noticed
1010 in the close code, the last closer will delete the file
1012 This makes a copy of any struct security_unix_token into the
1013 lck entry. This function is used when the lock is already granted.
1014 ****************************************************************************/
1016 void set_delete_on_close_lck(files_struct *fsp,
1017 struct share_mode_lock *lck,
1018 const struct security_token *nt_tok,
1019 const struct security_unix_token *tok)
1021 struct messaging_context *msg_ctx = fsp->conn->sconn->msg_ctx;
1022 struct share_mode_data *d = lck->data;
1025 DATA_BLOB fid_blob = {};
1026 enum ndr_err_code ndr_err;
1028 SMB_ASSERT(nt_tok != NULL);
1029 SMB_ASSERT(tok != NULL);
1031 for (i=0; i<d->num_delete_tokens; i++) {
1032 struct delete_token *dt = &d->delete_tokens[i];
1033 if (dt->name_hash == fsp->name_hash) {
1036 /* Replace this token with the given tok. */
1037 TALLOC_FREE(dt->delete_nt_token);
1038 dt->delete_nt_token = dup_nt_token(dt, nt_tok);
1039 SMB_ASSERT(dt->delete_nt_token != NULL);
1040 TALLOC_FREE(dt->delete_token);
1041 dt->delete_token = copy_unix_token(dt, tok);
1042 SMB_ASSERT(dt->delete_token != NULL);
1048 ret = add_delete_on_close_token(lck->data, fsp->name_hash, nt_tok, tok);
1051 ndr_err = ndr_push_struct_blob(&fid_blob, talloc_tos(), &fsp->file_id,
1052 (ndr_push_flags_fn_t)ndr_push_file_id);
1053 if (!NDR_ERR_CODE_IS_SUCCESS(ndr_err)) {
1054 DEBUG(10, ("ndr_push_file_id failed: %s\n",
1055 ndr_errstr(ndr_err)));
1058 for (i=0; i<d->num_share_modes; i++) {
1059 struct share_mode_entry *e = &d->share_modes[i];
1062 status = messaging_send(
1063 msg_ctx, e->pid, MSG_SMB_NOTIFY_CANCEL_DELETED,
1066 if (!NT_STATUS_IS_OK(status)) {
1067 struct server_id_buf tmp;
1068 DEBUG(10, ("%s: messaging_send to %s returned %s\n",
1069 __func__, server_id_str_buf(e->pid, &tmp),
1070 nt_errstr(status)));
1074 TALLOC_FREE(fid_blob.data);
1077 bool set_delete_on_close(files_struct *fsp, bool delete_on_close,
1078 const struct security_token *nt_tok,
1079 const struct security_unix_token *tok)
1081 struct share_mode_lock *lck;
1083 DEBUG(10,("set_delete_on_close: %s delete on close flag for "
1085 delete_on_close ? "Adding" : "Removing", fsp_fnum_dbg(fsp),
1088 lck = get_existing_share_mode_lock(talloc_tos(), fsp->file_id);
1093 if (delete_on_close) {
1094 set_delete_on_close_lck(fsp, lck, nt_tok, tok);
1096 reset_delete_on_close_lck(fsp, lck);
1099 if (fsp->is_directory) {
1100 SMB_ASSERT(!is_ntfs_stream_smb_fname(fsp->fsp_name));
1101 send_stat_cache_delete_message(fsp->conn->sconn->msg_ctx,
1102 fsp->fsp_name->base_name);
1107 fsp->delete_on_close = delete_on_close;
1112 static struct delete_token *find_delete_on_close_token(
1113 struct share_mode_data *d, uint32_t name_hash)
1117 DEBUG(10, ("find_delete_on_close_token: name_hash = 0x%x\n",
1118 (unsigned int)name_hash));
1120 for (i=0; i<d->num_delete_tokens; i++) {
1121 struct delete_token *dt = &d->delete_tokens[i];
1123 DEBUG(10, ("find__delete_on_close_token: dt->name_hash = 0x%x\n",
1124 (unsigned int)dt->name_hash ));
1125 if (dt->name_hash == name_hash) {
1132 /****************************************************************************
1133 Return the NT token and UNIX token if there's a match. Return true if
1134 found, false if not.
1135 ****************************************************************************/
1137 bool get_delete_on_close_token(struct share_mode_lock *lck,
1139 const struct security_token **pp_nt_tok,
1140 const struct security_unix_token **pp_tok)
1142 struct delete_token *dt;
1144 dt = find_delete_on_close_token(lck->data, name_hash);
1148 *pp_nt_tok = dt->delete_nt_token;
1149 *pp_tok = dt->delete_token;
1153 bool is_delete_on_close_set(struct share_mode_lock *lck, uint32_t name_hash)
1155 return find_delete_on_close_token(lck->data, name_hash) != NULL;
1158 bool set_sticky_write_time(struct file_id fileid, struct timespec write_time)
1160 struct share_mode_lock *lck;
1162 DEBUG(5,("set_sticky_write_time: %s id=%s\n",
1163 timestring(talloc_tos(),
1164 convert_timespec_to_time_t(write_time)),
1165 file_id_string_tos(&fileid)));
1167 lck = get_existing_share_mode_lock(talloc_tos(), fileid);
1172 if (timespec_compare(&lck->data->changed_write_time, &write_time) != 0) {
1173 lck->data->modified = True;
1174 lck->data->changed_write_time = write_time;
1181 bool set_write_time(struct file_id fileid, struct timespec write_time)
1183 struct share_mode_lock *lck;
1185 DEBUG(5,("set_write_time: %s id=%s\n",
1186 timestring(talloc_tos(),
1187 convert_timespec_to_time_t(write_time)),
1188 file_id_string_tos(&fileid)));
1190 lck = get_existing_share_mode_lock(talloc_tos(), fileid);
1195 if (timespec_compare(&lck->data->old_write_time, &write_time) != 0) {
1196 lck->data->modified = True;
1197 lck->data->old_write_time = write_time;
1204 struct timespec get_share_mode_write_time(struct share_mode_lock *lck)
1206 struct share_mode_data *d = lck->data;
1208 if (!null_timespec(d->changed_write_time)) {
1209 return d->changed_write_time;
1211 return d->old_write_time;
1214 bool file_has_open_streams(files_struct *fsp)
1216 struct share_mode_lock *lock = NULL;
1217 struct share_mode_data *d = NULL;
1220 lock = get_existing_share_mode_lock(talloc_tos(), fsp->file_id);
1226 for (i = 0; i < d->num_share_modes; i++) {
1227 struct share_mode_entry *e = &d->share_modes[i];
1229 if (share_mode_stale_pid(d, i)) {
1233 if (e->private_options &
1234 NTCREATEX_OPTIONS_PRIVATE_STREAM_BASEOPEN)
1246 * Walk share mode entries, looking at every lease only once
1249 bool share_mode_forall_leases(
1250 struct share_mode_lock *lck,
1251 bool (*fn)(struct share_mode_lock *lck,
1252 struct share_mode_entry *e,
1253 void *private_data),
1256 struct share_mode_data *d = lck->data;
1257 uint32_t *leases = NULL;
1258 uint32_t num_leases = 0;
1261 leases = talloc_array(talloc_tos(), uint32_t, d->num_share_modes);
1262 if (leases == NULL) {
1266 for (i=0; i<d->num_share_modes; i++) {
1267 struct share_mode_entry *e = &d->share_modes[i];
1271 ok = is_valid_share_mode_entry(e);
1276 if (e->op_type != LEASE_OPLOCK) {
1281 * See if we have already seen "e"'s lease. This is
1282 * O(n^2). If we sort "leases", we can get this down
1286 for (j=0; j<num_leases; j++) {
1287 uint32_t idx = leases[j];
1288 struct share_mode_entry *l = &d->share_modes[idx];
1290 if (smb2_lease_equal(&e->client_guid,
1297 if (j < num_leases) {
1299 * Don't look at "e"'s lease, we've already
1305 stop = fn(lck, e, private_data);
1307 TALLOC_FREE(leases);
1311 leases[num_leases] = i;
1315 TALLOC_FREE(leases);