2 Unix SMB/CIFS implementation.
3 file opening and share modes
4 Copyright (C) Andrew Tridgell 1992-1998
5 Copyright (C) Jeremy Allison 2001-2004
6 Copyright (C) Volker Lendecke 2005
8 This program is free software; you can redistribute it and/or modify
9 it under the terms of the GNU General Public License as published by
10 the Free Software Foundation; either version 2 of the License, or
11 (at your option) any later version.
13 This program is distributed in the hope that it will be useful,
14 but WITHOUT ANY WARRANTY; without even the implied warranty of
15 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
16 GNU General Public License for more details.
18 You should have received a copy of the GNU General Public License
19 along with this program; if not, write to the Free Software
20 Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA.
25 extern struct generic_mapping file_generic_mapping;
26 extern struct current_user current_user;
27 extern userdom_struct current_user_info;
28 extern uint16 global_smbpid;
29 extern BOOL global_client_failed_oplock_break;
31 struct deferred_open_record {
32 BOOL delayed_for_oplocks;
37 /****************************************************************************
38 fd support routines - attempt to do a dos_open.
39 ****************************************************************************/
41 static BOOL fd_open(struct connection_struct *conn,
50 if (!lp_symlinks(SNUM(conn))) {
55 fsp->fh->fd = SMB_VFS_OPEN(conn,fname,fsp,flags,mode);
58 DEBUG(10,("fd_open: name %s, flags = 0%o mode = 0%o, fd = %d. %s\n",
59 fname, flags, (int)mode, fsp->fh->fd,
60 (fsp->fh->fd == -1) ? strerror(errno) : "" ));
63 return fsp->fh->fd != -1;
66 /****************************************************************************
67 Close the file associated with a fsp.
68 ****************************************************************************/
70 int fd_close(struct connection_struct *conn,
73 if (fsp->fh->fd == -1) {
74 return 0; /* What we used to call a stat open. */
76 if (fsp->fh->ref_count > 1) {
77 return 0; /* Shared handle. Only close last reference. */
79 return fd_close_posix(conn, fsp);
82 /****************************************************************************
83 Change the ownership of a file to that of the parent directory.
84 Do this by fd if possible.
85 ****************************************************************************/
87 void change_owner_to_parent(connection_struct *conn,
90 SMB_STRUCT_STAT *psbuf)
92 const char *parent_path = parent_dirname(fname);
93 SMB_STRUCT_STAT parent_st;
96 ret = SMB_VFS_STAT(conn, parent_path, &parent_st);
98 DEBUG(0,("change_owner_to_parent: failed to stat parent "
99 "directory %s. Error was %s\n",
100 parent_path, strerror(errno) ));
104 if (fsp && fsp->fh->fd != -1) {
106 ret = SMB_VFS_FCHOWN(fsp, fsp->fh->fd, parent_st.st_uid, (gid_t)-1);
109 DEBUG(0,("change_owner_to_parent: failed to fchown "
110 "file %s to parent directory uid %u. Error "
112 (unsigned int)parent_st.st_uid,
116 DEBUG(10,("change_owner_to_parent: changed new file %s to "
117 "parent directory uid %u.\n", fname,
118 (unsigned int)parent_st.st_uid ));
121 /* We've already done an lstat into psbuf, and we know it's a
122 directory. If we can cd into the directory and the dev/ino
123 are the same then we can safely chown without races as
124 we're locking the directory in place by being in it. This
125 should work on any UNIX (thanks tridge :-). JRA.
129 SMB_STRUCT_STAT sbuf;
131 if (!vfs_GetWd(conn,saved_dir)) {
132 DEBUG(0,("change_owner_to_parent: failed to get "
133 "current working directory\n"));
137 /* Chdir into the new path. */
138 if (vfs_ChDir(conn, fname) == -1) {
139 DEBUG(0,("change_owner_to_parent: failed to change "
140 "current working directory to %s. Error "
141 "was %s\n", fname, strerror(errno) ));
145 if (SMB_VFS_STAT(conn,".",&sbuf) == -1) {
146 DEBUG(0,("change_owner_to_parent: failed to stat "
147 "directory '.' (%s) Error was %s\n",
148 fname, strerror(errno)));
152 /* Ensure we're pointing at the same place. */
153 if (sbuf.st_dev != psbuf->st_dev ||
154 sbuf.st_ino != psbuf->st_ino ||
155 sbuf.st_mode != psbuf->st_mode ) {
156 DEBUG(0,("change_owner_to_parent: "
157 "device/inode/mode on directory %s changed. "
158 "Refusing to chown !\n", fname ));
163 ret = SMB_VFS_CHOWN(conn, ".", parent_st.st_uid, (gid_t)-1);
166 DEBUG(10,("change_owner_to_parent: failed to chown "
167 "directory %s to parent directory uid %u. "
168 "Error was %s\n", fname,
169 (unsigned int)parent_st.st_uid, strerror(errno) ));
173 DEBUG(10,("change_owner_to_parent: changed ownership of new "
174 "directory %s to parent directory uid %u.\n",
175 fname, (unsigned int)parent_st.st_uid ));
179 vfs_ChDir(conn,saved_dir);
183 /****************************************************************************
185 ****************************************************************************/
187 static NTSTATUS open_file(files_struct *fsp,
188 connection_struct *conn,
190 SMB_STRUCT_STAT *psbuf,
193 uint32 access_mask, /* client requested access mask. */
194 uint32 open_access_mask) /* what we're actually using in the open. */
196 int accmode = (flags & O_ACCMODE);
197 int local_flags = flags;
198 BOOL file_existed = VALID_STAT(*psbuf);
203 /* Check permissions */
206 * This code was changed after seeing a client open request
207 * containing the open mode of (DENY_WRITE/read-only) with
208 * the 'create if not exist' bit set. The previous code
209 * would fail to open the file read only on a read-only share
210 * as it was checking the flags parameter directly against O_RDONLY,
211 * this was failing as the flags parameter was set to O_RDONLY|O_CREAT.
215 if (!CAN_WRITE(conn)) {
216 /* It's a read-only share - fail if we wanted to write. */
217 if(accmode != O_RDONLY) {
218 DEBUG(3,("Permission denied opening %s\n",fname));
219 return NT_STATUS_ACCESS_DENIED;
220 } else if(flags & O_CREAT) {
221 /* We don't want to write - but we must make sure that
222 O_CREAT doesn't create the file if we have write
223 access into the directory.
226 local_flags &= ~O_CREAT;
231 * This little piece of insanity is inspired by the
232 * fact that an NT client can open a file for O_RDONLY,
233 * but set the create disposition to FILE_EXISTS_TRUNCATE.
234 * If the client *can* write to the file, then it expects to
235 * truncate the file, even though it is opening for readonly.
236 * Quicken uses this stupid trick in backup file creation...
237 * Thanks *greatly* to "David W. Chapman Jr." <dwcjr@inethouston.net>
238 * for helping track this one down. It didn't bite us in 2.0.x
239 * as we always opened files read-write in that release. JRA.
242 if ((accmode == O_RDONLY) && ((flags & O_TRUNC) == O_TRUNC)) {
243 DEBUG(10,("open_file: truncate requested on read-only open "
244 "for file %s\n",fname ));
245 local_flags = (flags & ~O_ACCMODE)|O_RDWR;
248 if ((open_access_mask & (FILE_READ_DATA|FILE_WRITE_DATA|FILE_APPEND_DATA|FILE_EXECUTE)) ||
249 (!file_existed && (local_flags & O_CREAT)) ||
250 ((local_flags & O_TRUNC) == O_TRUNC) ) {
253 * We can't actually truncate here as the file may be locked.
254 * open_file_ntcreate will take care of the truncate later. JRA.
257 local_flags &= ~O_TRUNC;
259 #if defined(O_NONBLOCK) && defined(S_ISFIFO)
261 * We would block on opening a FIFO with no one else on the
262 * other end. Do what we used to do and add O_NONBLOCK to the
266 if (file_existed && S_ISFIFO(psbuf->st_mode)) {
267 local_flags |= O_NONBLOCK;
271 /* Don't create files with Microsoft wildcard characters. */
272 if ((local_flags & O_CREAT) && !file_existed &&
273 ms_has_wild(fname)) {
274 return NT_STATUS_OBJECT_NAME_INVALID;
277 /* Actually do the open */
278 if (!fd_open(conn, fname, fsp, local_flags, unx_mode)) {
279 DEBUG(3,("Error opening file %s (%s) (local_flags=%d) "
281 fname,strerror(errno),local_flags,flags));
282 return map_nt_error_from_unix(errno);
285 /* Inherit the ACL if the file was created. */
286 if ((local_flags & O_CREAT) && !file_existed) {
287 inherit_access_acl(conn, fname, unx_mode);
291 fsp->fh->fd = -1; /* What we used to call a stat open. */
297 if (fsp->fh->fd == -1) {
298 ret = SMB_VFS_STAT(conn, fname, psbuf);
300 ret = SMB_VFS_FSTAT(fsp,fsp->fh->fd,psbuf);
301 /* If we have an fd, this stat should succeed. */
303 DEBUG(0,("Error doing fstat on open file %s "
304 "(%s)\n", fname,strerror(errno) ));
308 /* For a non-io open, this stat failing means file not found. JRA */
310 NTSTATUS status = map_nt_error_from_unix(errno);
317 * POSIX allows read-only opens of directories. We don't
318 * want to do this (we use a different code path for this)
319 * so catch a directory open and return an EISDIR. JRA.
322 if(S_ISDIR(psbuf->st_mode)) {
325 return NT_STATUS_FILE_IS_A_DIRECTORY;
328 fsp->mode = psbuf->st_mode;
329 fsp->inode = psbuf->st_ino;
330 fsp->dev = psbuf->st_dev;
331 fsp->vuid = current_user.vuid;
332 fsp->file_pid = global_smbpid;
333 fsp->can_lock = True;
334 fsp->can_read = (access_mask & (FILE_READ_DATA)) ? True : False;
335 if (!CAN_WRITE(conn)) {
336 fsp->can_write = False;
338 fsp->can_write = (access_mask & (FILE_WRITE_DATA | FILE_APPEND_DATA)) ?
341 fsp->print_file = False;
342 fsp->modified = False;
343 fsp->sent_oplock_break = NO_BREAK_SENT;
344 fsp->is_directory = False;
345 fsp->is_stat = False;
346 if (conn->aio_write_behind_list &&
347 is_in_path(fname, conn->aio_write_behind_list, conn->case_sensitive)) {
348 fsp->aio_write_behind = True;
351 string_set(&fsp->fsp_name,fname);
352 fsp->wcp = NULL; /* Write cache pointer. */
354 DEBUG(2,("%s opened file %s read=%s write=%s (numopen=%d)\n",
355 *current_user_info.smb_name ?
356 current_user_info.smb_name : conn->user,fsp->fsp_name,
357 BOOLSTR(fsp->can_read), BOOLSTR(fsp->can_write),
358 conn->num_files_open + 1));
364 /*******************************************************************
365 Return True if the filename is one of the special executable types.
366 ********************************************************************/
368 static BOOL is_executable(const char *fname)
370 if ((fname = strrchr_m(fname,'.'))) {
371 if (strequal(fname,".com") ||
372 strequal(fname,".dll") ||
373 strequal(fname,".exe") ||
374 strequal(fname,".sym")) {
381 /****************************************************************************
382 Check if we can open a file with a share mode.
383 Returns True if conflict, False if not.
384 ****************************************************************************/
386 static BOOL share_conflict(struct share_mode_entry *entry,
390 DEBUG(10,("share_conflict: entry->access_mask = 0x%x, "
391 "entry->share_access = 0x%x, "
392 "entry->private_options = 0x%x\n",
393 (unsigned int)entry->access_mask,
394 (unsigned int)entry->share_access,
395 (unsigned int)entry->private_options));
397 DEBUG(10,("share_conflict: access_mask = 0x%x, share_access = 0x%x\n",
398 (unsigned int)access_mask, (unsigned int)share_access));
400 if ((entry->access_mask & (FILE_WRITE_DATA|
404 DELETE_ACCESS)) == 0) {
405 DEBUG(10,("share_conflict: No conflict due to "
406 "entry->access_mask = 0x%x\n",
407 (unsigned int)entry->access_mask ));
411 if ((access_mask & (FILE_WRITE_DATA|
415 DELETE_ACCESS)) == 0) {
416 DEBUG(10,("share_conflict: No conflict due to "
417 "access_mask = 0x%x\n",
418 (unsigned int)access_mask ));
422 #if 1 /* JRA TEST - Superdebug. */
423 #define CHECK_MASK(num, am, right, sa, share) \
424 DEBUG(10,("share_conflict: [%d] am (0x%x) & right (0x%x) = 0x%x\n", \
425 (unsigned int)(num), (unsigned int)(am), \
426 (unsigned int)(right), (unsigned int)(am)&(right) )); \
427 DEBUG(10,("share_conflict: [%d] sa (0x%x) & share (0x%x) = 0x%x\n", \
428 (unsigned int)(num), (unsigned int)(sa), \
429 (unsigned int)(share), (unsigned int)(sa)&(share) )); \
430 if (((am) & (right)) && !((sa) & (share))) { \
431 DEBUG(10,("share_conflict: check %d conflict am = 0x%x, right = 0x%x, \
432 sa = 0x%x, share = 0x%x\n", (num), (unsigned int)(am), (unsigned int)(right), (unsigned int)(sa), \
433 (unsigned int)(share) )); \
437 #define CHECK_MASK(num, am, right, sa, share) \
438 if (((am) & (right)) && !((sa) & (share))) { \
439 DEBUG(10,("share_conflict: check %d conflict am = 0x%x, right = 0x%x, \
440 sa = 0x%x, share = 0x%x\n", (num), (unsigned int)(am), (unsigned int)(right), (unsigned int)(sa), \
441 (unsigned int)(share) )); \
446 CHECK_MASK(1, entry->access_mask, FILE_WRITE_DATA | FILE_APPEND_DATA,
447 share_access, FILE_SHARE_WRITE);
448 CHECK_MASK(2, access_mask, FILE_WRITE_DATA | FILE_APPEND_DATA,
449 entry->share_access, FILE_SHARE_WRITE);
451 CHECK_MASK(3, entry->access_mask, FILE_READ_DATA | FILE_EXECUTE,
452 share_access, FILE_SHARE_READ);
453 CHECK_MASK(4, access_mask, FILE_READ_DATA | FILE_EXECUTE,
454 entry->share_access, FILE_SHARE_READ);
456 CHECK_MASK(5, entry->access_mask, DELETE_ACCESS,
457 share_access, FILE_SHARE_DELETE);
458 CHECK_MASK(6, access_mask, DELETE_ACCESS,
459 entry->share_access, FILE_SHARE_DELETE);
461 DEBUG(10,("share_conflict: No conflict.\n"));
465 #if defined(DEVELOPER)
466 static void validate_my_share_entries(int num,
467 struct share_mode_entry *share_entry)
471 if (!procid_is_me(&share_entry->pid)) {
475 if (is_deferred_open_entry(share_entry) &&
476 !open_was_deferred(share_entry->op_mid)) {
478 DEBUG(0, ("Got a deferred entry without a request: "
479 "PANIC: %s\n", share_mode_str(num, share_entry)));
483 if (!is_valid_share_mode_entry(share_entry)) {
487 fsp = file_find_dif(share_entry->dev, share_entry->inode,
488 share_entry->share_file_id);
490 DEBUG(0,("validate_my_share_entries: PANIC : %s\n",
491 share_mode_str(num, share_entry) ));
492 smb_panic("validate_my_share_entries: Cannot match a "
493 "share entry with an open file\n");
496 if (is_deferred_open_entry(share_entry) ||
497 is_unused_share_mode_entry(share_entry)) {
501 if ((share_entry->op_type == NO_OPLOCK) &&
502 (fsp->oplock_type == FAKE_LEVEL_II_OPLOCK)) {
503 /* Someone has already written to it, but I haven't yet
508 if (((uint16)fsp->oplock_type) != share_entry->op_type) {
517 DEBUG(0,("validate_my_share_entries: PANIC : %s\n",
518 share_mode_str(num, share_entry) ));
519 slprintf(str, sizeof(str)-1, "validate_my_share_entries: "
520 "file %s, oplock_type = 0x%x, op_type = 0x%x\n",
521 fsp->fsp_name, (unsigned int)fsp->oplock_type,
522 (unsigned int)share_entry->op_type );
528 static BOOL is_stat_open(uint32 access_mask)
530 return (access_mask &&
531 ((access_mask & ~(SYNCHRONIZE_ACCESS| FILE_READ_ATTRIBUTES|
532 FILE_WRITE_ATTRIBUTES))==0) &&
533 ((access_mask & (SYNCHRONIZE_ACCESS|FILE_READ_ATTRIBUTES|
534 FILE_WRITE_ATTRIBUTES)) != 0));
537 /****************************************************************************
538 Deal with share modes
539 Invarient: Share mode must be locked on entry and exit.
540 Returns -1 on error, or number of share modes on success (may be zero).
541 ****************************************************************************/
543 static NTSTATUS open_mode_check(connection_struct *conn,
545 struct share_mode_lock *lck,
548 uint32 create_options,
553 if(lck->num_share_modes == 0) {
557 *file_existed = True;
559 if (is_stat_open(access_mask)) {
560 /* Stat open that doesn't trigger oplock breaks or share mode
561 * checks... ! JRA. */
565 /* A delete on close prohibits everything */
567 if (lck->delete_on_close) {
568 return NT_STATUS_DELETE_PENDING;
572 * Check if the share modes will give us access.
575 #if defined(DEVELOPER)
576 for(i = 0; i < lck->num_share_modes; i++) {
577 validate_my_share_entries(i, &lck->share_modes[i]);
581 if (!lp_share_modes(SNUM(conn))) {
585 /* Now we check the share modes, after any oplock breaks. */
586 for(i = 0; i < lck->num_share_modes; i++) {
588 if (!is_valid_share_mode_entry(&lck->share_modes[i])) {
592 /* someone else has a share lock on it, check to see if we can
594 if (share_conflict(&lck->share_modes[i],
595 access_mask, share_access)) {
596 return NT_STATUS_SHARING_VIOLATION;
603 static BOOL is_delete_request(files_struct *fsp) {
604 return ((fsp->access_mask == DELETE_ACCESS) &&
605 (fsp->oplock_type == NO_OPLOCK));
609 * 1) No files open at all or internal open: Grant whatever the client wants.
611 * 2) Exclusive (or batch) oplock around: If the requested access is a delete
612 * request, break if the oplock around is a batch oplock. If it's another
613 * requested access type, break.
615 * 3) Only level2 around: Grant level2 and do nothing else.
618 static BOOL delay_for_oplocks(struct share_mode_lock *lck,
624 struct share_mode_entry *exclusive = NULL;
625 BOOL valid_entry = False;
626 BOOL delay_it = False;
627 BOOL have_level2 = False;
629 char msg[MSG_SMB_SHARE_MODE_ENTRY_SIZE];
631 if (oplock_request & INTERNAL_OPEN_ONLY) {
632 fsp->oplock_type = NO_OPLOCK;
635 if ((oplock_request & INTERNAL_OPEN_ONLY) || is_stat_open(fsp->access_mask)) {
639 for (i=0; i<lck->num_share_modes; i++) {
641 if (!is_valid_share_mode_entry(&lck->share_modes[i])) {
645 /* At least one entry is not an invalid or deferred entry. */
648 if (pass_number == 1) {
649 if (BATCH_OPLOCK_TYPE(lck->share_modes[i].op_type)) {
650 SMB_ASSERT(exclusive == NULL);
651 exclusive = &lck->share_modes[i];
654 if (EXCLUSIVE_OPLOCK_TYPE(lck->share_modes[i].op_type)) {
655 SMB_ASSERT(exclusive == NULL);
656 exclusive = &lck->share_modes[i];
660 if (lck->share_modes[i].op_type == LEVEL_II_OPLOCK) {
661 SMB_ASSERT(exclusive == NULL);
667 /* All entries are placeholders or deferred.
668 * Directly grant whatever the client wants. */
669 if (fsp->oplock_type == NO_OPLOCK) {
670 /* Store a level2 oplock, but don't tell the client */
671 fsp->oplock_type = FAKE_LEVEL_II_OPLOCK;
676 if (exclusive != NULL) { /* Found an exclusive oplock */
677 SMB_ASSERT(!have_level2);
678 delay_it = is_delete_request(fsp) ?
679 BATCH_OPLOCK_TYPE(exclusive->op_type) : True;
682 if (EXCLUSIVE_OPLOCK_TYPE(fsp->oplock_type)) {
683 /* We can at most grant level2 as there are other
684 * level2 or NO_OPLOCK entries. */
685 fsp->oplock_type = LEVEL_II_OPLOCK;
688 if ((fsp->oplock_type == NO_OPLOCK) && have_level2) {
689 /* Store a level2 oplock, but don't tell the client */
690 fsp->oplock_type = FAKE_LEVEL_II_OPLOCK;
698 * Send a break message to the oplock holder and delay the open for
702 DEBUG(10, ("Sending break request to PID %s\n",
703 procid_str_static(&exclusive->pid)));
704 exclusive->op_mid = get_current_mid();
706 /* Create the message. */
707 share_mode_entry_to_message(msg, exclusive);
709 /* Add in the FORCE_OPLOCK_BREAK_TO_NONE bit in the message if set. We
710 don't want this set in the share mode struct pointed to by lck. */
712 if (oplock_request & FORCE_OPLOCK_BREAK_TO_NONE) {
713 SSVAL(msg,6,exclusive->op_type | FORCE_OPLOCK_BREAK_TO_NONE);
716 ret = message_send_pid(exclusive->pid, MSG_SMB_BREAK_REQUEST,
717 msg, MSG_SMB_SHARE_MODE_ENTRY_SIZE, True);
719 DEBUG(3, ("Could not send oplock break message\n"));
725 static BOOL request_timed_out(struct timeval request_time,
726 struct timeval timeout)
728 struct timeval now, end_time;
730 end_time = timeval_sum(&request_time, &timeout);
731 return (timeval_compare(&end_time, &now) < 0);
734 /****************************************************************************
735 Handle the 1 second delay in returning a SHARING_VIOLATION error.
736 ****************************************************************************/
738 static void defer_open(struct share_mode_lock *lck,
739 struct timeval request_time,
740 struct timeval timeout,
741 struct deferred_open_record *state)
743 uint16 mid = get_current_mid();
748 for (i=0; i<lck->num_share_modes; i++) {
749 struct share_mode_entry *e = &lck->share_modes[i];
751 if (!is_deferred_open_entry(e)) {
755 if (procid_is_me(&e->pid) && (e->op_mid == mid)) {
756 DEBUG(0, ("Trying to defer an already deferred "
757 "request: mid=%d, exiting\n", mid));
758 exit_server("attempt to defer a deferred request");
762 /* End paranoia check */
764 DEBUG(10,("defer_open_sharing_error: time [%u.%06u] adding deferred "
765 "open entry for mid %u\n",
766 (unsigned int)request_time.tv_sec,
767 (unsigned int)request_time.tv_usec,
770 if (!push_deferred_smb_message(mid, request_time, timeout,
771 (char *)state, sizeof(*state))) {
772 exit_server("push_deferred_smb_message failed");
774 add_deferred_open(lck, mid, request_time, state->dev, state->inode);
777 * Push the MID of this packet on the signing queue.
778 * We only do this once, the first time we push the packet
779 * onto the deferred open queue, as this has a side effect
780 * of incrementing the response sequence number.
783 srv_defer_sign_response(mid);
786 /****************************************************************************
787 Set a kernel flock on a file for NFS interoperability.
788 This requires a patch to Linux.
789 ****************************************************************************/
791 static void kernel_flock(files_struct *fsp, uint32 share_mode)
793 #if HAVE_KERNEL_SHARE_MODES
795 if (share_mode == FILE_SHARE_WRITE) {
796 kernel_mode = LOCK_MAND|LOCK_WRITE;
797 } else if (share_mode == FILE_SHARE_READ) {
798 kernel_mode = LOCK_MAND|LOCK_READ;
799 } else if (share_mode == FILE_SHARE_NONE) {
800 kernel_mode = LOCK_MAND;
803 flock(fsp->fh->fd, kernel_mode);
809 /****************************************************************************
810 On overwrite open ensure that the attributes match.
811 ****************************************************************************/
813 static BOOL open_match_attributes(connection_struct *conn,
817 mode_t existing_unx_mode,
819 mode_t *returned_unx_mode)
821 uint32 noarch_old_dos_attr, noarch_new_dos_attr;
823 noarch_old_dos_attr = (old_dos_attr & ~FILE_ATTRIBUTE_ARCHIVE);
824 noarch_new_dos_attr = (new_dos_attr & ~FILE_ATTRIBUTE_ARCHIVE);
826 if((noarch_old_dos_attr == 0 && noarch_new_dos_attr != 0) ||
827 (noarch_old_dos_attr != 0 && ((noarch_old_dos_attr & noarch_new_dos_attr) == noarch_old_dos_attr))) {
828 *returned_unx_mode = new_unx_mode;
830 *returned_unx_mode = (mode_t)0;
833 DEBUG(10,("open_match_attributes: file %s old_dos_attr = 0x%x, "
834 "existing_unx_mode = 0%o, new_dos_attr = 0x%x "
835 "returned_unx_mode = 0%o\n",
837 (unsigned int)old_dos_attr,
838 (unsigned int)existing_unx_mode,
839 (unsigned int)new_dos_attr,
840 (unsigned int)*returned_unx_mode ));
842 /* If we're mapping SYSTEM and HIDDEN ensure they match. */
843 if (lp_map_system(SNUM(conn)) || lp_store_dos_attributes(SNUM(conn))) {
844 if ((old_dos_attr & FILE_ATTRIBUTE_SYSTEM) &&
845 !(new_dos_attr & FILE_ATTRIBUTE_SYSTEM)) {
849 if (lp_map_hidden(SNUM(conn)) || lp_store_dos_attributes(SNUM(conn))) {
850 if ((old_dos_attr & FILE_ATTRIBUTE_HIDDEN) &&
851 !(new_dos_attr & FILE_ATTRIBUTE_HIDDEN)) {
858 /****************************************************************************
859 Special FCB or DOS processing in the case of a sharing violation.
860 Try and find a duplicated file handle.
861 ****************************************************************************/
863 static files_struct *fcb_or_dos_open(connection_struct *conn,
864 const char *fname, SMB_DEV_T dev,
868 uint32 create_options)
871 files_struct *dup_fsp;
873 DEBUG(5,("fcb_or_dos_open: attempting old open semantics for "
874 "file %s.\n", fname ));
876 for(fsp = file_find_di_first(dev, inode); fsp;
877 fsp = file_find_di_next(fsp)) {
879 DEBUG(10,("fcb_or_dos_open: checking file %s, fd = %d, "
880 "vuid = %u, file_pid = %u, private_options = 0x%x "
881 "access_mask = 0x%x\n", fsp->fsp_name,
882 fsp->fh->fd, (unsigned int)fsp->vuid,
883 (unsigned int)fsp->file_pid,
884 (unsigned int)fsp->fh->private_options,
885 (unsigned int)fsp->access_mask ));
887 if (fsp->fh->fd != -1 &&
888 fsp->vuid == current_user.vuid &&
889 fsp->file_pid == global_smbpid &&
890 (fsp->fh->private_options & (NTCREATEX_OPTIONS_PRIVATE_DENY_DOS |
891 NTCREATEX_OPTIONS_PRIVATE_DENY_FCB)) &&
892 (fsp->access_mask & FILE_WRITE_DATA) &&
893 strequal(fsp->fsp_name, fname)) {
894 DEBUG(10,("fcb_or_dos_open: file match\n"));
903 /* quite an insane set of semantics ... */
904 if (is_executable(fname) &&
905 (fsp->fh->private_options & NTCREATEX_OPTIONS_PRIVATE_DENY_DOS)) {
906 DEBUG(10,("fcb_or_dos_open: file fail due to is_executable.\n"));
910 /* We need to duplicate this fsp. */
911 if (!NT_STATUS_IS_OK(dup_file_fsp(fsp, access_mask, share_access,
912 create_options, &dup_fsp))) {
919 /****************************************************************************
920 Open a file with a share mode - old openX method - map into NTCreate.
921 ****************************************************************************/
923 BOOL map_open_params_to_ntcreate(const char *fname, int deny_mode, int open_func,
924 uint32 *paccess_mask,
926 uint32 *pcreate_disposition,
927 uint32 *pcreate_options)
931 uint32 create_disposition;
932 uint32 create_options = 0;
934 DEBUG(10,("map_open_params_to_ntcreate: fname = %s, deny_mode = 0x%x, "
935 "open_func = 0x%x\n",
936 fname, (unsigned int)deny_mode, (unsigned int)open_func ));
938 /* Create the NT compatible access_mask. */
939 switch (GET_OPENX_MODE(deny_mode)) {
940 case DOS_OPEN_EXEC: /* Implies read-only - used to be FILE_READ_DATA */
941 case DOS_OPEN_RDONLY:
942 access_mask = FILE_GENERIC_READ;
944 case DOS_OPEN_WRONLY:
945 access_mask = FILE_GENERIC_WRITE;
949 access_mask = FILE_GENERIC_READ|FILE_GENERIC_WRITE;
952 DEBUG(10,("map_open_params_to_ntcreate: bad open mode = 0x%x\n",
953 (unsigned int)GET_OPENX_MODE(deny_mode)));
957 /* Create the NT compatible create_disposition. */
959 case OPENX_FILE_EXISTS_FAIL|OPENX_FILE_CREATE_IF_NOT_EXIST:
960 create_disposition = FILE_CREATE;
963 case OPENX_FILE_EXISTS_OPEN:
964 create_disposition = FILE_OPEN;
967 case OPENX_FILE_EXISTS_OPEN|OPENX_FILE_CREATE_IF_NOT_EXIST:
968 create_disposition = FILE_OPEN_IF;
971 case OPENX_FILE_EXISTS_TRUNCATE:
972 create_disposition = FILE_OVERWRITE;
975 case OPENX_FILE_EXISTS_TRUNCATE|OPENX_FILE_CREATE_IF_NOT_EXIST:
976 create_disposition = FILE_OVERWRITE_IF;
980 /* From samba4 - to be confirmed. */
981 if (GET_OPENX_MODE(deny_mode) == DOS_OPEN_EXEC) {
982 create_disposition = FILE_CREATE;
985 DEBUG(10,("map_open_params_to_ntcreate: bad "
986 "open_func 0x%x\n", (unsigned int)open_func));
990 /* Create the NT compatible share modes. */
991 switch (GET_DENY_MODE(deny_mode)) {
993 share_mode = FILE_SHARE_NONE;
997 share_mode = FILE_SHARE_READ;
1001 share_mode = FILE_SHARE_WRITE;
1005 share_mode = FILE_SHARE_READ|FILE_SHARE_WRITE;
1009 create_options |= NTCREATEX_OPTIONS_PRIVATE_DENY_DOS;
1010 if (is_executable(fname)) {
1011 share_mode = FILE_SHARE_READ|FILE_SHARE_WRITE;
1013 if (GET_OPENX_MODE(deny_mode) == DOS_OPEN_RDONLY) {
1014 share_mode = FILE_SHARE_READ;
1016 share_mode = FILE_SHARE_NONE;
1022 create_options |= NTCREATEX_OPTIONS_PRIVATE_DENY_FCB;
1023 share_mode = FILE_SHARE_NONE;
1027 DEBUG(10,("map_open_params_to_ntcreate: bad deny_mode 0x%x\n",
1028 (unsigned int)GET_DENY_MODE(deny_mode) ));
1032 DEBUG(10,("map_open_params_to_ntcreate: file %s, access_mask = 0x%x, "
1033 "share_mode = 0x%x, create_disposition = 0x%x, "
1034 "create_options = 0x%x\n",
1036 (unsigned int)access_mask,
1037 (unsigned int)share_mode,
1038 (unsigned int)create_disposition,
1039 (unsigned int)create_options ));
1042 *paccess_mask = access_mask;
1045 *pshare_mode = share_mode;
1047 if (pcreate_disposition) {
1048 *pcreate_disposition = create_disposition;
1050 if (pcreate_options) {
1051 *pcreate_options = create_options;
1058 static void schedule_defer_open(struct share_mode_lock *lck, struct timeval request_time)
1060 struct deferred_open_record state;
1062 /* This is a relative time, added to the absolute
1063 request_time value to get the absolute timeout time.
1064 Note that if this is the second or greater time we enter
1065 this codepath for this particular request mid then
1066 request_time is left as the absolute time of the *first*
1067 time this request mid was processed. This is what allows
1068 the request to eventually time out. */
1070 struct timeval timeout;
1072 /* Normally the smbd we asked should respond within
1073 * OPLOCK_BREAK_TIMEOUT seconds regardless of whether
1074 * the client did, give twice the timeout as a safety
1075 * measure here in case the other smbd is stuck
1076 * somewhere else. */
1078 timeout = timeval_set(OPLOCK_BREAK_TIMEOUT*2, 0);
1080 /* Nothing actually uses state.delayed_for_oplocks
1081 but it's handy to differentiate in debug messages
1082 between a 30 second delay due to oplock break, and
1083 a 1 second delay for share mode conflicts. */
1085 state.delayed_for_oplocks = True;
1086 state.dev = lck->dev;
1087 state.inode = lck->ino;
1089 if (!request_timed_out(request_time, timeout)) {
1090 defer_open(lck, request_time, timeout, &state);
1094 /****************************************************************************
1095 Open a file with a share mode.
1096 ****************************************************************************/
1098 NTSTATUS open_file_ntcreate(connection_struct *conn,
1100 SMB_STRUCT_STAT *psbuf,
1101 uint32 access_mask, /* access bits (FILE_READ_DATA etc.) */
1102 uint32 share_access, /* share constants (FILE_SHARE_READ etc) */
1103 uint32 create_disposition, /* FILE_OPEN_IF etc. */
1104 uint32 create_options, /* options such as delete on close. */
1105 uint32 new_dos_attributes, /* attributes used for new file. */
1106 int oplock_request, /* internal Samba oplock codes. */
1107 /* Information (FILE_EXISTS etc.) */
1109 files_struct **result)
1113 BOOL file_existed = VALID_STAT(*psbuf);
1114 BOOL def_acl = False;
1116 SMB_INO_T inode = 0;
1117 NTSTATUS fsp_open = NT_STATUS_ACCESS_DENIED;
1118 files_struct *fsp = NULL;
1119 mode_t new_unx_mode = (mode_t)0;
1120 mode_t unx_mode = (mode_t)0;
1122 uint32 existing_dos_attributes = 0;
1123 struct pending_message_list *pml = NULL;
1124 uint16 mid = get_current_mid();
1125 struct timeval request_time = timeval_zero();
1126 struct share_mode_lock *lck = NULL;
1127 uint32 open_access_mask = access_mask;
1130 if (conn->printer) {
1132 * Printers are handled completely differently.
1133 * Most of the passed parameters are ignored.
1137 *pinfo = FILE_WAS_CREATED;
1140 DEBUG(10, ("open_file_ntcreate: printer open fname=%s\n", fname));
1142 return print_fsp_open(conn, fname, &fsp);
1145 /* We add aARCH to this as this mode is only used if the file is
1147 unx_mode = unix_mode(conn, new_dos_attributes | aARCH,fname, True);
1149 DEBUG(10, ("open_file_ntcreate: fname=%s, dos_attrs=0x%x "
1150 "access_mask=0x%x share_access=0x%x "
1151 "create_disposition = 0x%x create_options=0x%x "
1152 "unix mode=0%o oplock_request=%d\n",
1153 fname, new_dos_attributes, access_mask, share_access,
1154 create_disposition, create_options, unx_mode,
1157 if ((pml = get_open_deferred_message(mid)) != NULL) {
1158 struct deferred_open_record *state =
1159 (struct deferred_open_record *)pml->private_data.data;
1161 /* Remember the absolute time of the original
1162 request with this mid. We'll use it later to
1163 see if this has timed out. */
1165 request_time = pml->request_time;
1167 /* Remove the deferred open entry under lock. */
1168 lck = get_share_mode_lock(NULL, state->dev, state->inode, NULL, NULL);
1170 DEBUG(0, ("could not get share mode lock\n"));
1172 del_deferred_open_entry(lck, mid);
1176 /* Ensure we don't reprocess this message. */
1177 remove_deferred_open_smb_message(mid);
1180 if (!check_name(fname,conn)) {
1181 return map_nt_error_from_unix(errno);
1184 new_dos_attributes &= SAMBA_ATTRIBUTES_MASK;
1186 existing_dos_attributes = dos_mode(conn, fname, psbuf);
1189 /* ignore any oplock requests if oplocks are disabled */
1190 if (!lp_oplocks(SNUM(conn)) || global_client_failed_oplock_break ||
1191 IS_VETO_OPLOCK_PATH(conn, fname)) {
1192 /* Mask off everything except the private Samba bits. */
1193 oplock_request &= SAMBA_PRIVATE_OPLOCK_MASK;
1196 /* this is for OS/2 long file names - say we don't support them */
1197 if (!lp_posix_pathnames() && strstr(fname,".+,;=[].")) {
1198 /* OS/2 Workplace shell fix may be main code stream in a later
1200 DEBUG(5,("open_file_ntcreate: OS/2 long filenames are not "
1202 if (use_nt_status()) {
1203 return NT_STATUS_OBJECT_NAME_NOT_FOUND;
1205 return NT_STATUS_DOS(ERRDOS, ERRcannotopen);
1208 switch( create_disposition ) {
1210 * Currently we're using FILE_SUPERSEDE as the same as
1211 * FILE_OVERWRITE_IF but they really are
1212 * different. FILE_SUPERSEDE deletes an existing file
1213 * (requiring delete access) then recreates it.
1215 case FILE_SUPERSEDE:
1216 /* If file exists replace/overwrite. If file doesn't
1218 flags2 |= (O_CREAT | O_TRUNC);
1221 case FILE_OVERWRITE_IF:
1222 /* If file exists replace/overwrite. If file doesn't
1224 flags2 |= (O_CREAT | O_TRUNC);
1228 /* If file exists open. If file doesn't exist error. */
1229 if (!file_existed) {
1230 DEBUG(5,("open_file_ntcreate: FILE_OPEN "
1231 "requested for file %s and file "
1232 "doesn't exist.\n", fname ));
1234 return NT_STATUS_OBJECT_NAME_NOT_FOUND;
1238 case FILE_OVERWRITE:
1239 /* If file exists overwrite. If file doesn't exist
1241 if (!file_existed) {
1242 DEBUG(5,("open_file_ntcreate: FILE_OVERWRITE "
1243 "requested for file %s and file "
1244 "doesn't exist.\n", fname ));
1246 return NT_STATUS_OBJECT_NAME_NOT_FOUND;
1252 /* If file exists error. If file doesn't exist
1255 DEBUG(5,("open_file_ntcreate: FILE_CREATE "
1256 "requested for file %s and file "
1257 "already exists.\n", fname ));
1258 if (S_ISDIR(psbuf->st_mode)) {
1263 return map_nt_error_from_unix(errno);
1265 flags2 |= (O_CREAT|O_EXCL);
1269 /* If file exists open. If file doesn't exist
1275 return NT_STATUS_INVALID_PARAMETER;
1278 /* We only care about matching attributes on file exists and
1281 if (file_existed && ((create_disposition == FILE_OVERWRITE) ||
1282 (create_disposition == FILE_OVERWRITE_IF))) {
1283 if (!open_match_attributes(conn, fname,
1284 existing_dos_attributes,
1285 new_dos_attributes, psbuf->st_mode,
1286 unx_mode, &new_unx_mode)) {
1287 DEBUG(5,("open_file_ntcreate: attributes missmatch "
1288 "for file %s (%x %x) (0%o, 0%o)\n",
1289 fname, existing_dos_attributes,
1291 (unsigned int)psbuf->st_mode,
1292 (unsigned int)unx_mode ));
1294 return NT_STATUS_ACCESS_DENIED;
1298 /* This is a nasty hack - must fix... JRA. */
1299 if (access_mask == MAXIMUM_ALLOWED_ACCESS) {
1300 open_access_mask = access_mask = FILE_GENERIC_ALL;
1304 * Convert GENERIC bits to specific bits.
1307 se_map_generic(&access_mask, &file_generic_mapping);
1308 open_access_mask = access_mask;
1310 if (flags2 & O_TRUNC) {
1311 open_access_mask |= FILE_WRITE_DATA; /* This will cause oplock breaks. */
1314 DEBUG(10, ("open_file_ntcreate: fname=%s, after mapping "
1315 "access_mask=0x%x\n", fname, access_mask ));
1318 * Note that we ignore the append flag as append does not
1319 * mean the same thing under DOS and Unix.
1322 if (access_mask & (FILE_WRITE_DATA | FILE_APPEND_DATA)) {
1329 * Currently we only look at FILE_WRITE_THROUGH for create options.
1333 if ((create_options & FILE_WRITE_THROUGH) && lp_strict_sync(SNUM(conn))) {
1338 if (!CAN_WRITE(conn)) {
1340 * We should really return a permission denied error if either
1341 * O_CREAT or O_TRUNC are set, but for compatibility with
1342 * older versions of Samba we just AND them out.
1344 flags2 &= ~(O_CREAT|O_TRUNC);
1348 * Ensure we can't write on a read-only share or file.
1351 if (flags != O_RDONLY && file_existed &&
1352 (!CAN_WRITE(conn) || IS_DOS_READONLY(existing_dos_attributes))) {
1353 DEBUG(5,("open_file_ntcreate: write access requested for "
1354 "file %s on read only %s\n",
1355 fname, !CAN_WRITE(conn) ? "share" : "file" ));
1357 return NT_STATUS_ACCESS_DENIED;
1360 status = file_new(conn, &fsp);
1361 if(!NT_STATUS_IS_OK(status)) {
1365 fsp->dev = psbuf->st_dev;
1366 fsp->inode = psbuf->st_ino;
1367 fsp->share_access = share_access;
1368 fsp->fh->private_options = create_options;
1369 fsp->access_mask = open_access_mask; /* We change this to the
1370 * requested access_mask after
1371 * the open is done. */
1372 /* Ensure no SAMBA_PRIVATE bits can be set. */
1373 fsp->oplock_type = (oplock_request & ~SAMBA_PRIVATE_OPLOCK_MASK);
1375 if (timeval_is_zero(&request_time)) {
1376 request_time = fsp->open_time;
1380 dev = psbuf->st_dev;
1381 inode = psbuf->st_ino;
1383 lck = get_share_mode_lock(NULL, dev, inode,
1389 DEBUG(0, ("Could not get share mode lock\n"));
1390 return NT_STATUS_SHARING_VIOLATION;
1393 /* First pass - send break only on batch oplocks. */
1394 if (delay_for_oplocks(lck, fsp, 1, oplock_request)) {
1395 schedule_defer_open(lck, request_time);
1398 return NT_STATUS_SHARING_VIOLATION;
1401 /* Use the client requested access mask here, not the one we
1403 status = open_mode_check(conn, fname, lck,
1404 access_mask, share_access,
1405 create_options, &file_existed);
1407 if (NT_STATUS_IS_OK(status)) {
1408 /* We might be going to allow this open. Check oplock
1410 /* Second pass - send break for both batch or
1411 * exclusive oplocks. */
1412 if (delay_for_oplocks(lck, fsp, 2, oplock_request)) {
1413 schedule_defer_open(lck, request_time);
1416 return NT_STATUS_SHARING_VIOLATION;
1420 if (NT_STATUS_EQUAL(status, NT_STATUS_DELETE_PENDING)) {
1421 /* DELETE_PENDING is not deferred for a second */
1427 if (!NT_STATUS_IS_OK(status)) {
1428 uint32 can_access_mask;
1429 BOOL can_access = True;
1431 SMB_ASSERT(NT_STATUS_EQUAL(status, NT_STATUS_SHARING_VIOLATION));
1433 /* Check if this can be done with the deny_dos and fcb
1435 if (create_options &
1436 (NTCREATEX_OPTIONS_PRIVATE_DENY_DOS|
1437 NTCREATEX_OPTIONS_PRIVATE_DENY_FCB)) {
1438 files_struct *fsp_dup;
1440 /* Use the client requested access mask here,
1441 * not the one we open with. */
1442 fsp_dup = fcb_or_dos_open(conn, fname, dev,
1451 *pinfo = FILE_WAS_OPENED;
1453 conn->num_files_open++;
1455 return NT_STATUS_OK;
1460 * This next line is a subtlety we need for
1461 * MS-Access. If a file open will fail due to share
1462 * permissions and also for security (access) reasons,
1463 * we need to return the access failed error, not the
1464 * share error. We can't open the file due to kernel
1465 * oplock deadlock (it's possible we failed above on
1466 * the open_mode_check()) so use a userspace check.
1469 if (flags & O_RDWR) {
1470 can_access_mask = FILE_READ_DATA|FILE_WRITE_DATA;
1472 can_access_mask = FILE_READ_DATA;
1475 if (((flags & O_RDWR) && !CAN_WRITE(conn)) ||
1476 !can_access_file(conn,fname,psbuf,can_access_mask)) {
1481 * If we're returning a share violation, ensure we
1482 * cope with the braindead 1 second delay.
1485 if (!(oplock_request & INTERNAL_OPEN_ONLY) &&
1486 lp_defer_sharing_violations()) {
1487 struct timeval timeout;
1488 struct deferred_open_record state;
1491 /* this is a hack to speed up torture tests
1493 timeout_usecs = lp_parm_int(SNUM(conn),
1494 "smbd","sharedelay",
1495 SHARING_VIOLATION_USEC_WAIT);
1497 /* This is a relative time, added to the absolute
1498 request_time value to get the absolute timeout time.
1499 Note that if this is the second or greater time we enter
1500 this codepath for this particular request mid then
1501 request_time is left as the absolute time of the *first*
1502 time this request mid was processed. This is what allows
1503 the request to eventually time out. */
1505 timeout = timeval_set(0, timeout_usecs);
1507 /* Nothing actually uses state.delayed_for_oplocks
1508 but it's handy to differentiate in debug messages
1509 between a 30 second delay due to oplock break, and
1510 a 1 second delay for share mode conflicts. */
1512 state.delayed_for_oplocks = False;
1514 state.inode = inode;
1516 if (!request_timed_out(request_time,
1518 defer_open(lck, request_time, timeout,
1526 * We have detected a sharing violation here
1527 * so return the correct error code
1529 status = NT_STATUS_SHARING_VIOLATION;
1531 status = NT_STATUS_ACCESS_DENIED;
1538 * We exit this block with the share entry *locked*.....
1542 SMB_ASSERT(!file_existed || (lck != NULL));
1545 * Ensure we pay attention to default ACLs on directories if required.
1548 if ((flags2 & O_CREAT) && lp_inherit_acls(SNUM(conn)) &&
1549 (def_acl = directory_has_default_acl(conn,
1550 parent_dirname(fname)))) {
1554 DEBUG(4,("calling open_file with flags=0x%X flags2=0x%X mode=0%o, "
1555 "access_mask = 0x%x, open_access_mask = 0x%x\n",
1556 (unsigned int)flags, (unsigned int)flags2,
1557 (unsigned int)unx_mode, (unsigned int)access_mask,
1558 (unsigned int)open_access_mask));
1561 * open_file strips any O_TRUNC flags itself.
1564 fsp_open = open_file(fsp,conn,fname,psbuf,flags|flags2,unx_mode,
1565 access_mask, open_access_mask);
1567 if (!NT_STATUS_IS_OK(fsp_open)) {
1575 if (!file_existed) {
1578 * Deal with the race condition where two smbd's detect the
1579 * file doesn't exist and do the create at the same time. One
1580 * of them will win and set a share mode, the other (ie. this
1581 * one) should check if the requested share mode for this
1582 * create is allowed.
1586 * Now the file exists and fsp is successfully opened,
1587 * fsp->dev and fsp->inode are valid and should replace the
1588 * dev=0,inode=0 from a non existent file. Spotted by
1589 * Nadav Danieli <nadavd@exanet.com>. JRA.
1595 lck = get_share_mode_lock(NULL, dev, inode,
1600 DEBUG(0, ("open_file_ntcreate: Could not get share "
1601 "mode lock for %s\n", fname));
1602 fd_close(conn, fsp);
1604 return NT_STATUS_SHARING_VIOLATION;
1607 status = open_mode_check(conn, fname, lck,
1608 access_mask, share_access,
1609 create_options, &file_existed);
1611 if (!NT_STATUS_IS_OK(status)) {
1612 struct deferred_open_record state;
1614 fd_close(conn, fsp);
1617 state.delayed_for_oplocks = False;
1619 state.inode = inode;
1621 /* Do it all over again immediately. In the second
1622 * round we will find that the file existed and handle
1623 * the DELETE_PENDING and FCB cases correctly. No need
1624 * to duplicate the code here. Essentially this is a
1625 * "goto top of this function", but don't tell
1628 defer_open(lck, request_time, timeval_zero(),
1635 * We exit this block with the share entry *locked*.....
1640 SMB_ASSERT(lck != NULL);
1642 /* note that we ignore failure for the following. It is
1643 basically a hack for NFS, and NFS will never set one of
1644 these only read them. Nobody but Samba can ever set a deny
1645 mode and we have already checked our more authoritative
1646 locking database for permission to set this deny mode. If
1647 the kernel refuses the operations then the kernel is wrong */
1649 kernel_flock(fsp, share_access);
1652 * At this point onwards, we can guarentee that the share entry
1653 * is locked, whether we created the file or not, and that the
1654 * deny mode is compatible with all current opens.
1658 * If requested, truncate the file.
1661 if (flags2&O_TRUNC) {
1663 * We are modifing the file after open - update the stat
1666 if ((SMB_VFS_FTRUNCATE(fsp,fsp->fh->fd,0) == -1) ||
1667 (SMB_VFS_FSTAT(fsp,fsp->fh->fd,psbuf)==-1)) {
1668 status = map_nt_error_from_unix(errno);
1676 /* Record the options we were opened with. */
1677 fsp->share_access = share_access;
1678 fsp->fh->private_options = create_options;
1679 fsp->access_mask = access_mask;
1682 /* stat opens on existing files don't get oplocks. */
1683 if (is_stat_open(open_access_mask)) {
1684 fsp->oplock_type = NO_OPLOCK;
1687 if (!(flags2 & O_TRUNC)) {
1688 info = FILE_WAS_OPENED;
1690 info = FILE_WAS_OVERWRITTEN;
1693 info = FILE_WAS_CREATED;
1694 /* Change the owner if required. */
1695 if (lp_inherit_owner(SNUM(conn))) {
1696 change_owner_to_parent(conn, fsp, fsp->fsp_name,
1706 * Setup the oplock info in both the shared memory and
1710 if ((fsp->oplock_type != NO_OPLOCK) &&
1711 (fsp->oplock_type != FAKE_LEVEL_II_OPLOCK)) {
1712 if (!set_file_oplock(fsp, fsp->oplock_type)) {
1713 /* Could not get the kernel oplock */
1714 fsp->oplock_type = NO_OPLOCK;
1717 set_share_mode(lck, fsp, current_user.ut.uid, 0, fsp->oplock_type);
1719 if (info == FILE_WAS_OVERWRITTEN || info == FILE_WAS_CREATED ||
1720 info == FILE_WAS_SUPERSEDED) {
1722 /* Handle strange delete on close create semantics. */
1723 if (create_options & FILE_DELETE_ON_CLOSE) {
1724 status = can_set_delete_on_close(fsp, True, new_dos_attributes);
1726 if (!NT_STATUS_IS_OK(status)) {
1727 /* Remember to delete the mode we just added. */
1728 del_share_mode(lck, fsp);
1734 /* Note that here we set the *inital* delete on close flag,
1735 not the regular one. */
1736 set_delete_on_close_token(lck, ¤t_user.ut);
1737 lck->initial_delete_on_close = True;
1738 lck->modified = True;
1741 /* Files should be initially set as archive */
1742 if (lp_map_archive(SNUM(conn)) ||
1743 lp_store_dos_attributes(SNUM(conn))) {
1744 file_set_dosmode(conn, fname,
1745 new_dos_attributes | aARCH, NULL,
1751 * Take care of inherited ACLs on created files - if default ACL not
1755 if (!file_existed && !def_acl) {
1757 int saved_errno = errno; /* We might get ENOSYS in the next
1760 if (SMB_VFS_FCHMOD_ACL(fsp, fsp->fh->fd, unx_mode) == -1 &&
1762 errno = saved_errno; /* Ignore ENOSYS */
1765 } else if (new_unx_mode) {
1769 /* Attributes need changing. File already existed. */
1772 int saved_errno = errno; /* We might get ENOSYS in the
1774 ret = SMB_VFS_FCHMOD_ACL(fsp, fsp->fh->fd,
1777 if (ret == -1 && errno == ENOSYS) {
1778 errno = saved_errno; /* Ignore ENOSYS */
1780 DEBUG(5, ("open_file_ntcreate: reset "
1781 "attributes of file %s to 0%o\n",
1782 fname, (unsigned int)new_unx_mode));
1783 ret = 0; /* Don't do the fchmod below. */
1788 (SMB_VFS_FCHMOD(fsp, fsp->fh->fd, new_unx_mode) == -1))
1789 DEBUG(5, ("open_file_ntcreate: failed to reset "
1790 "attributes of file %s to 0%o\n",
1791 fname, (unsigned int)new_unx_mode));
1794 /* If this is a successful open, we must remove any deferred open
1796 del_deferred_open_entry(lck, mid);
1799 conn->num_files_open++;
1802 return NT_STATUS_OK;
1805 /****************************************************************************
1806 Open a file for for write to ensure that we can fchmod it.
1807 ****************************************************************************/
1809 NTSTATUS open_file_fchmod(connection_struct *conn, const char *fname,
1810 SMB_STRUCT_STAT *psbuf, files_struct **result)
1812 files_struct *fsp = NULL;
1815 if (!VALID_STAT(*psbuf)) {
1816 return NT_STATUS_INVALID_PARAMETER;
1819 status = file_new(conn, &fsp);
1820 if(!NT_STATUS_IS_OK(status)) {
1824 /* note! we must use a non-zero desired access or we don't get
1825 a real file descriptor. Oh what a twisted web we weave. */
1826 status = open_file(fsp,conn,fname,psbuf,O_WRONLY,0,FILE_WRITE_DATA,FILE_WRITE_DATA);
1829 * This is not a user visible file open.
1830 * Don't set a share mode and don't increment
1831 * the conn->num_files_open.
1834 if (!NT_STATUS_IS_OK(status)) {
1840 return NT_STATUS_OK;
1843 /****************************************************************************
1844 Close the fchmod file fd - ensure no locks are lost.
1845 ****************************************************************************/
1847 int close_file_fchmod(files_struct *fsp)
1849 int ret = fd_close(fsp->conn, fsp);
1854 /****************************************************************************
1855 Open a directory from an NT SMB call.
1856 ****************************************************************************/
1858 NTSTATUS open_directory(connection_struct *conn,
1860 SMB_STRUCT_STAT *psbuf,
1862 uint32 share_access,
1863 uint32 create_disposition,
1864 uint32 create_options,
1866 files_struct **result)
1868 files_struct *fsp = NULL;
1869 BOOL dir_existed = VALID_STAT(*psbuf) ? True : False;
1870 BOOL create_dir = False;
1871 struct share_mode_lock *lck = NULL;
1875 DEBUG(5,("open_directory: opening directory %s, access_mask = 0x%x, "
1876 "share_access = 0x%x create_options = 0x%x, "
1877 "create_disposition = 0x%x\n",
1879 (unsigned int)access_mask,
1880 (unsigned int)share_access,
1881 (unsigned int)create_options,
1882 (unsigned int)create_disposition));
1884 if (is_ntfs_stream_name(fname)) {
1885 DEBUG(0,("open_directory: %s is a stream name!\n", fname ));
1886 return NT_STATUS_NOT_A_DIRECTORY;
1889 switch( create_disposition ) {
1891 /* If directory exists open. If directory doesn't
1894 DEBUG(5,("open_directory: FILE_OPEN requested "
1895 "for directory %s and it doesn't "
1896 "exist.\n", fname ));
1897 return NT_STATUS_OBJECT_NAME_NOT_FOUND;
1899 info = FILE_WAS_OPENED;
1903 /* If directory exists error. If directory doesn't
1906 DEBUG(5,("open_directory: FILE_CREATE "
1907 "requested for directory %s and it "
1908 "already exists.\n", fname ));
1909 if (use_nt_status()) {
1910 return NT_STATUS_OBJECT_NAME_COLLISION;
1912 return NT_STATUS_DOS(ERRDOS,
1917 info = FILE_WAS_CREATED;
1921 /* If directory exists open. If directory doesn't
1925 info = FILE_WAS_CREATED;
1927 info = FILE_WAS_OPENED;
1931 case FILE_SUPERSEDE:
1932 case FILE_OVERWRITE:
1933 case FILE_OVERWRITE_IF:
1935 DEBUG(5,("open_directory: invalid create_disposition "
1936 "0x%x for directory %s\n",
1937 (unsigned int)create_disposition, fname));
1938 return NT_STATUS_INVALID_PARAMETER;
1943 * Try and create the directory.
1946 /* We know bad_path is false as it's caught earlier. */
1948 status = mkdir_internal(conn, fname, False);
1950 if (!NT_STATUS_IS_OK(status)) {
1951 DEBUG(2,("open_directory: unable to create %s. "
1952 "Error was %s\n", fname, strerror(errno) ));
1953 /* Ensure we return the correct NT status to the
1958 /* Ensure we're checking for a symlink here.... */
1959 /* We don't want to get caught by a symlink racer. */
1961 if(SMB_VFS_LSTAT(conn,fname, psbuf) != 0) {
1962 return map_nt_error_from_unix(errno);
1965 if(!S_ISDIR(psbuf->st_mode)) {
1966 DEBUG(0,("open_directory: %s is not a directory !\n",
1968 return NT_STATUS_NOT_A_DIRECTORY;
1972 status = file_new(conn, &fsp);
1973 if(!NT_STATUS_IS_OK(status)) {
1978 * Setup the files_struct for it.
1981 fsp->mode = psbuf->st_mode;
1982 fsp->inode = psbuf->st_ino;
1983 fsp->dev = psbuf->st_dev;
1984 fsp->vuid = current_user.vuid;
1985 fsp->file_pid = global_smbpid;
1986 fsp->can_lock = False;
1987 fsp->can_read = False;
1988 fsp->can_write = False;
1990 fsp->share_access = share_access;
1991 fsp->fh->private_options = create_options;
1992 fsp->access_mask = access_mask;
1994 fsp->print_file = False;
1995 fsp->modified = False;
1996 fsp->oplock_type = NO_OPLOCK;
1997 fsp->sent_oplock_break = NO_BREAK_SENT;
1998 fsp->is_directory = True;
1999 fsp->is_stat = False;
2000 string_set(&fsp->fsp_name,fname);
2002 lck = get_share_mode_lock(NULL, fsp->dev, fsp->inode,
2007 DEBUG(0, ("open_directory: Could not get share mode lock for %s\n", fname));
2009 return NT_STATUS_SHARING_VIOLATION;
2012 status = open_mode_check(conn, fname, lck,
2013 access_mask, share_access,
2014 create_options, &dir_existed);
2016 if (!NT_STATUS_IS_OK(status)) {
2022 set_share_mode(lck, fsp, current_user.ut.uid, 0, NO_OPLOCK);
2024 /* For directories the delete on close bit at open time seems
2025 always to be honored on close... See test 19 in Samba4 BASE-DELETE. */
2026 if (create_options & FILE_DELETE_ON_CLOSE) {
2027 status = can_set_delete_on_close(fsp, True, 0);
2028 if (!NT_STATUS_IS_OK(status)) {
2034 set_delete_on_close_token(lck, ¤t_user.ut);
2035 lck->initial_delete_on_close = True;
2036 lck->modified = True;
2041 /* Change the owner if required. */
2042 if ((info == FILE_WAS_CREATED) && lp_inherit_owner(SNUM(conn))) {
2043 change_owner_to_parent(conn, fsp, fsp->fsp_name, psbuf);
2050 conn->num_files_open++;
2053 return NT_STATUS_OK;
2056 /****************************************************************************
2057 Open a pseudo-file (no locking checks - a 'stat' open).
2058 ****************************************************************************/
2060 NTSTATUS open_file_stat(connection_struct *conn, char *fname,
2061 SMB_STRUCT_STAT *psbuf, files_struct **result)
2063 files_struct *fsp = NULL;
2066 if (!VALID_STAT(*psbuf)) {
2067 return NT_STATUS_INVALID_PARAMETER;
2070 /* Can't 'stat' open directories. */
2071 if(S_ISDIR(psbuf->st_mode)) {
2072 return NT_STATUS_FILE_IS_A_DIRECTORY;
2075 status = file_new(conn, &fsp);
2076 if(!NT_STATUS_IS_OK(status)) {
2080 DEBUG(5,("open_file_stat: 'opening' file %s\n", fname));
2083 * Setup the files_struct for it.
2086 fsp->mode = psbuf->st_mode;
2087 fsp->inode = psbuf->st_ino;
2088 fsp->dev = psbuf->st_dev;
2089 fsp->vuid = current_user.vuid;
2090 fsp->file_pid = global_smbpid;
2091 fsp->can_lock = False;
2092 fsp->can_read = False;
2093 fsp->can_write = False;
2094 fsp->print_file = False;
2095 fsp->modified = False;
2096 fsp->oplock_type = NO_OPLOCK;
2097 fsp->sent_oplock_break = NO_BREAK_SENT;
2098 fsp->is_directory = False;
2099 fsp->is_stat = True;
2100 string_set(&fsp->fsp_name,fname);
2102 conn->num_files_open++;
2105 return NT_STATUS_OK;
2108 /****************************************************************************
2109 Receive notification that one of our open files has been renamed by another
2111 ****************************************************************************/
2113 void msg_file_was_renamed(int msg_type, struct process_id src, void *buf, size_t len)
2116 char *frm = (char *)buf;
2119 const char *sharepath;
2120 const char *newname;
2123 if (buf == NULL || len < MSG_FILE_RENAMED_MIN_SIZE + 2) {
2124 DEBUG(0, ("msg_file_was_renamed: Got invalid msg len %d\n", (int)len));
2128 /* Unpack the message. */
2129 dev = DEV_T_VAL(frm,0);
2130 inode = INO_T_VAL(frm,8);
2131 sharepath = &frm[16];
2132 newname = sharepath + strlen(sharepath) + 1;
2133 sp_len = strlen(sharepath);
2135 DEBUG(10,("msg_file_was_renamed: Got rename message for sharepath %s, new name %s, "
2136 "dev %x, inode %.0f\n",
2137 sharepath, newname, (unsigned int)dev, (double)inode ));
2139 for(fsp = file_find_di_first(dev, inode); fsp; fsp = file_find_di_next(fsp)) {
2140 if (memcmp(fsp->conn->connectpath, sharepath, sp_len) == 0) {
2141 DEBUG(10,("msg_file_was_renamed: renaming file fnum %d from %s -> %s\n",
2142 fsp->fnum, fsp->fsp_name, newname ));
2143 string_set(&fsp->fsp_name, newname);
2146 /* Now we have the complete path we can work out if this is
2147 actually within this share and adjust newname accordingly. */
2148 DEBUG(10,("msg_file_was_renamed: share mismatch (sharepath %s "
2149 "not sharepath %s) "
2150 "fnum %d from %s -> %s\n",
2151 fsp->conn->connectpath,