s4-dns: dlz_bind9: Fix ipv6 updates
[samba.git] / source3 / smbd / blocking.c
index 1d5b8613fb08c86b8758cde312f169d485a61ee5..5d198fc1f2c57e9a6ef8eebaef645763f754ee85 100644 (file)
@@ -18,8 +18,9 @@
 */
 
 #include "includes.h"
+#include "smbd/smbd.h"
 #include "smbd/globals.h"
-#include "librpc/gen_ndr/messaging.h"
+#include "messages.h"
 
 #undef DBGC_CLASS
 #define DBGC_CLASS DBGC_LOCKING
@@ -34,8 +35,8 @@ static void received_unlock_msg(struct messaging_context *msg,
                                struct server_id server_id,
                                DATA_BLOB *data);
 
-void brl_timeout_fn(struct event_context *event_ctx,
-                          struct timed_event *te,
+void brl_timeout_fn(struct tevent_context *event_ctx,
+                          struct tevent_timer *te,
                           struct timeval now,
                           void *private_data)
 {
@@ -53,7 +54,7 @@ void brl_timeout_fn(struct event_context *event_ctx,
        change_to_root_user();  /* TODO: Possibly run all timed events as
                                 * root */
 
-       process_blocking_lock_queue();
+       process_blocking_lock_queue(sconn);
 }
 
 /****************************************************************************
@@ -110,7 +111,7 @@ static bool recalc_brl_timeout(struct smbd_server_connection *sconn)
                return True;
        }
 
-       /* 
+       /*
         to account for unclean shutdowns by clients we need a
         maximum timeout that we use for checking pending locks. If
         we have any pending locks at all, then check if the pending
@@ -138,9 +139,9 @@ static bool recalc_brl_timeout(struct smbd_server_connection *sconn)
                    (int)from_now.tv_sec, (int)from_now.tv_usec));
        }
 
-       sconn->smb1.locks.brl_timeout = event_add_timed(smbd_event_context(),
-                                                       NULL, next_timeout,
-                                                       brl_timeout_fn, sconn);
+       sconn->smb1.locks.brl_timeout = tevent_add_timer(sconn->ev_ctx,
+                                                        NULL, next_timeout,
+                                                        brl_timeout_fn, sconn);
        if (sconn->smb1.locks.brl_timeout == NULL) {
                return False;
        }
@@ -207,8 +208,7 @@ bool push_blocking_lock_request( struct byte_range_lock *br_lck,
                blr->expire_time.tv_sec = 0;
                blr->expire_time.tv_usec = 0; /* Never expire. */
        } else {
-               blr->expire_time = timeval_current_ofs(lock_timeout/1000,
-                                       (lock_timeout % 1000) * 1000);
+               blr->expire_time = timeval_current_ofs_msec(lock_timeout);
        }
        blr->lock_num = lock_num;
        blr->smblctx = smblctx;
@@ -217,15 +217,15 @@ bool push_blocking_lock_request( struct byte_range_lock *br_lck,
        blr->lock_type = lock_type;
        blr->offset = offset;
        blr->count = count;
-      
+
        /* Specific brl_lock() implementations can fill this in. */
        blr->blr_private = NULL;
 
        /* Add a pending lock record for this. */
-       status = brl_lock(smbd_messaging_context(),
+       status = brl_lock(req->sconn->msg_ctx,
                        br_lck,
                        smblctx,
-                       procid_self(),
+                       messaging_server_id(req->sconn->msg_ctx),
                        offset,
                        count,
                        lock_type == READ_LOCK ? PENDING_READ_LOCK : PENDING_WRITE_LOCK,
@@ -248,16 +248,16 @@ bool push_blocking_lock_request( struct byte_range_lock *br_lck,
 
        /* Ensure we'll receive messages when this is unlocked. */
        if (!sconn->smb1.locks.blocking_lock_unlock_state) {
-               messaging_register(smbd_messaging_context(), NULL,
+               messaging_register(sconn->msg_ctx, sconn,
                                   MSG_SMB_UNLOCK, received_unlock_msg);
                sconn->smb1.locks.blocking_lock_unlock_state = true;
        }
 
        DEBUG(3,("push_blocking_lock_request: lock request blocked with "
-               "expiry time (%u sec. %u usec) (+%d msec) for fnum = %d, name = %s\n",
+               "expiry time (%u sec. %u usec) (+%d msec) for %s, name = %s\n",
                (unsigned int)blr->expire_time.tv_sec,
                (unsigned int)blr->expire_time.tv_usec, lock_timeout,
-               blr->fsp->fnum, fsp_str_dbg(blr->fsp)));
+               fsp_fnum_dbg(blr->fsp), fsp_str_dbg(blr->fsp)));
 
        return True;
 }
@@ -268,7 +268,11 @@ bool push_blocking_lock_request( struct byte_range_lock *br_lck,
 
 static void reply_lockingX_success(struct blocking_lock_record *blr)
 {
-       reply_outbuf(blr->req, 2, 0);
+       struct smb_request *req = blr->req;
+
+       reply_outbuf(req, 2, 0);
+       SSVAL(req->outbuf, smb_vwv0, 0xff); /* andx chain ends */
+       SSVAL(req->outbuf, smb_vwv1, 0);    /* no andx offset */
 
        /*
         * As this message is a lockingX call we must handle
@@ -278,8 +282,15 @@ static void reply_lockingX_success(struct blocking_lock_record *blr)
         * that here and must set up the chain info manually.
         */
 
-       chain_reply(blr->req);
-       TALLOC_FREE(blr->req->outbuf);
+       if (!srv_send_smb(req->sconn,
+                       (char *)req->outbuf,
+                       true, req->seqnum+1,
+                       IS_CONN_ENCRYPTED(req->conn)||req->encrypted,
+                       &req->pcd)) {
+               exit_server_cleanly("construct_reply: srv_send_smb failed.");
+       }
+
+       TALLOC_FREE(req->outbuf);
 }
 
 /****************************************************************************
@@ -301,7 +312,8 @@ static void generic_blocking_lock_error(struct blocking_lock_record *blr, NTSTAT
                if (fsp) {
                        fsp->last_lock_failure.context.smblctx = blr->smblctx;
                        fsp->last_lock_failure.context.tid = fsp->conn->cnum;
-                       fsp->last_lock_failure.context.pid = procid_self();
+                       fsp->last_lock_failure.context.pid =
+                               messaging_server_id(fsp->conn->sconn->msg_ctx);
                        fsp->last_lock_failure.start = blr->offset;
                        fsp->last_lock_failure.size = blr->count;
                        fsp->last_lock_failure.fnum = fsp->fnum;
@@ -311,7 +323,7 @@ static void generic_blocking_lock_error(struct blocking_lock_record *blr, NTSTAT
        }
 
        reply_nterror(blr->req, status);
-       if (!srv_send_smb(smbd_server_fd(), (char *)blr->req->outbuf,
+       if (!srv_send_smb(blr->req->sconn, (char *)blr->req->outbuf,
                          true, blr->req->seqnum+1,
                          blr->req->encrypted, NULL)) {
                exit_server_cleanly("generic_blocking_lock_error: srv_send_smb failed.");
@@ -320,11 +332,11 @@ static void generic_blocking_lock_error(struct blocking_lock_record *blr, NTSTAT
 }
 
 /****************************************************************************
- Return a lock fail error for a lockingX call. Undo all the locks we have 
+ Return a lock fail error for a lockingX call. Undo all the locks we have
  obtained first.
 *****************************************************************************/
 
-static void reply_lockingX_error(struct blocking_lock_record *blr, NTSTATUS status)
+static void undo_locks_obtained(struct blocking_lock_record *blr)
 {
        files_struct *fsp = blr->fsp;
        uint16 num_ulocks = SVAL(blr->req->vwv+6, 0);
@@ -335,10 +347,10 @@ static void reply_lockingX_error(struct blocking_lock_record *blr, NTSTATUS stat
        uint8_t *data;
        int i;
 
-       data = (uint8_t *)blr->req->buf
+       data = discard_const_p(uint8_t, blr->req->buf)
                + ((large_file_format ? 20 : 10)*num_ulocks);
 
-       /* 
+       /*
         * Data now points at the beginning of the list
         * of smb_lkrng structs.
         */
@@ -361,15 +373,13 @@ static void reply_lockingX_error(struct blocking_lock_record *blr, NTSTATUS stat
                 * request would never have been queued. JRA.
                 */
 
-               do_unlock(smbd_messaging_context(),
+               do_unlock(fsp->conn->sconn->msg_ctx,
                        fsp,
                        smblctx,
                        count,
                        offset,
                        WINDOWS_LOCK);
        }
-
-       generic_blocking_lock_error(blr, status);
 }
 
 /****************************************************************************
@@ -382,7 +392,16 @@ static void blocking_lock_reply_error(struct blocking_lock_record *blr, NTSTATUS
 
        switch(blr->req->cmd) {
        case SMBlockingX:
-               reply_lockingX_error(blr, status);
+               /*
+                * This code can be called during the rundown of a
+                * file after it was already closed. In that case,
+                * blr->fsp==NULL and we do not need to undo any
+                * locks, they are already gone.
+                */
+               if (blr->fsp != NULL) {
+                       undo_locks_obtained(blr);
+               }
+               generic_blocking_lock_error(blr, status);
                break;
        case SMBtrans2:
        case SMBtranss2:
@@ -394,7 +413,7 @@ static void blocking_lock_reply_error(struct blocking_lock_record *blr, NTSTATUS
                 */
                SCVAL(blr->req->outbuf,smb_com,SMBtrans2);
 
-               if (!srv_send_smb(smbd_server_fd(),
+               if (!srv_send_smb(blr->req->sconn,
                                  (char *)blr->req->outbuf,
                                  true, blr->req->seqnum+1,
                                  IS_CONN_ENCRYPTED(blr->fsp->conn),
@@ -427,10 +446,10 @@ static bool process_lockingX(struct blocking_lock_record *blr)
        uint8_t *data;
        NTSTATUS status = NT_STATUS_OK;
 
-       data = (uint8_t *)blr->req->buf
+       data = discard_const_p(uint8_t, blr->req->buf)
                + ((large_file_format ? 20 : 10)*num_ulocks);
 
-       /* 
+       /*
         * Data now points at the beginning of the list
         * of smb_lkrng structs.
         */
@@ -448,7 +467,7 @@ static bool process_lockingX(struct blocking_lock_record *blr)
                 * request would never have been queued. JRA.
                 */
                errno = 0;
-               br_lck = do_lock(smbd_messaging_context(),
+               br_lck = do_lock(fsp->conn->sconn->msg_ctx,
                                fsp,
                                smblctx,
                                count,
@@ -473,8 +492,8 @@ static bool process_lockingX(struct blocking_lock_record *blr)
                 * Success - we got all the locks.
                 */
 
-               DEBUG(3,("process_lockingX file = %s, fnum=%d type=%d "
-                        "num_locks=%d\n", fsp_str_dbg(fsp), fsp->fnum,
+               DEBUG(3,("process_lockingX file = %s, %s, type=%d "
+                        "num_locks=%d\n", fsp_str_dbg(fsp), fsp_fnum_dbg(fsp),
                         (unsigned int)locktype, num_locks));
 
                reply_lockingX_success(blr);
@@ -496,9 +515,10 @@ static bool process_lockingX(struct blocking_lock_record *blr)
         * Still can't get all the locks - keep waiting.
         */
 
-       DEBUG(10,("process_lockingX: only got %d locks of %d needed for file %s, fnum = %d. \
-Waiting....\n", 
-                blr->lock_num, num_locks, fsp_str_dbg(fsp), fsp->fnum));
+       DEBUG(10, ("process_lockingX: only got %d locks of %d needed for "
+                  "file %s, %s. Waiting....\n",
+                  blr->lock_num, num_locks, fsp_str_dbg(fsp),
+                  fsp_fnum_dbg(fsp)));
 
        return False;
 }
@@ -512,7 +532,8 @@ static bool process_trans2(struct blocking_lock_record *blr)
 {
        char params[2];
        NTSTATUS status;
-       struct byte_range_lock *br_lck = do_lock(smbd_messaging_context(),
+       struct byte_range_lock *br_lck = do_lock(
+                                               blr->fsp->conn->sconn->msg_ctx,
                                                blr->fsp,
                                                blr->smblctx,
                                                blr->count,
@@ -529,7 +550,7 @@ static bool process_trans2(struct blocking_lock_record *blr)
                if (ERROR_WAS_LOCK_DENIED(status)) {
                        /* Still can't get the lock, just keep waiting. */
                        return False;
-               }       
+               }
                /*
                 * We have other than a "can't get lock"
                 * error. Send an error and return True so we get dequeued.
@@ -542,7 +563,7 @@ static bool process_trans2(struct blocking_lock_record *blr)
 
        SSVAL(params,0,0);
        /* Fake up max_data_bytes here - we know it fits. */
-       send_trans2_replies(blr->fsp->conn, blr->req, params, 2, NULL, 0, 0xffff);
+       send_trans2_replies(blr->fsp->conn, blr->req, NT_STATUS_OK, params, 2, NULL, 0, 0xffff);
        return True;
 }
 
@@ -572,9 +593,9 @@ static bool blocking_lock_record_process(struct blocking_lock_record *blr)
  Called when a file is closed.
 *****************************************************************************/
 
-void cancel_pending_lock_requests_by_fid(files_struct *fsp,
-                       struct byte_range_lock *br_lck,
-                       enum file_close_type close_type)
+void smbd_cancel_pending_lock_requests_by_fid(files_struct *fsp,
+                                             struct byte_range_lock *br_lck,
+                                             enum file_close_type close_type)
 {
        struct smbd_server_connection *sconn = fsp->conn->sconn;
        struct blocking_lock_record *blr, *blr_cancelled, *next = NULL;
@@ -599,8 +620,8 @@ void cancel_pending_lock_requests_by_fid(files_struct *fsp,
                }
 
                DEBUG(10, ("remove_pending_lock_requests_by_fid - removing "
-                          "request type %d for file %s fnum = %d\n",
-                          blr->req->cmd, fsp_str_dbg(fsp), fsp->fnum));
+                          "request type %d for file %s, %s\n",
+                          blr->req->cmd, fsp_str_dbg(fsp), fsp_fnum_dbg(fsp)));
 
                blr_cancelled = blocking_lock_cancel_smb1(fsp,
                                     blr->smblctx,
@@ -614,7 +635,7 @@ void cancel_pending_lock_requests_by_fid(files_struct *fsp,
 
                brl_lock_cancel(br_lck,
                                blr->smblctx,
-                               procid_self(),
+                               messaging_server_id(sconn->msg_ctx),
                                blr->offset,
                                blr->count,
                                blr->lock_flav,
@@ -651,13 +672,13 @@ void remove_pending_lock_requests_by_mid_smb1(
 
                if (br_lck) {
                        DEBUG(10, ("remove_pending_lock_requests_by_mid_smb1 - "
-                                  "removing request type %d for file %s fnum "
-                                  "= %d\n", blr->req->cmd, fsp_str_dbg(fsp),
-                                  fsp->fnum ));
+                                  "removing request type %d for file %s, %s\n",
+                                  blr->req->cmd, fsp_str_dbg(fsp),
+                                  fsp_fnum_dbg(fsp)));
 
                        brl_lock_cancel(br_lck,
                                        blr->smblctx,
-                                       procid_self(),
+                                       messaging_server_id(sconn->msg_ctx),
                                        blr->offset,
                                        blr->count,
                                        blr->lock_flav,
@@ -700,22 +721,25 @@ static void received_unlock_msg(struct messaging_context *msg,
                                struct server_id server_id,
                                DATA_BLOB *data)
 {
+       struct smbd_server_connection *sconn =
+               talloc_get_type_abort(private_data,
+               struct smbd_server_connection);
+
        DEBUG(10,("received_unlock_msg\n"));
-       process_blocking_lock_queue();
+       process_blocking_lock_queue(sconn);
 }
 
 /****************************************************************************
  Process the blocking lock queue. Note that this is only called as root.
 *****************************************************************************/
 
-void process_blocking_lock_queue(void)
+void process_blocking_lock_queue(struct smbd_server_connection *sconn)
 {
-       struct smbd_server_connection *sconn = smbd_server_conn;
        struct timeval tv_curr = timeval_current();
        struct blocking_lock_record *blr, *next = NULL;
 
        if (sconn->using_smb2) {
-               process_blocking_lock_queue_smb2(tv_curr);
+               process_blocking_lock_queue_smb2(sconn, tv_curr);
                return;
        }
 
@@ -753,7 +777,7 @@ void process_blocking_lock_queue(void)
                        if (br_lck) {
                                brl_lock_cancel(br_lck,
                                        blr->smblctx,
-                                       procid_self(),
+                                       messaging_server_id(sconn->msg_ctx),
                                        blr->offset,
                                        blr->count,
                                        blr->lock_flav,
@@ -784,13 +808,13 @@ void process_blocking_lock_queue(void)
 
                        if (br_lck) {
                                DEBUG(5,("process_blocking_lock_queue: "
-                                        "pending lock fnum = %d for file %s "
-                                        "timed out.\n", blr->fsp->fnum,
+                                        "pending lock for %s, file %s "
+                                        "timed out.\n", fsp_fnum_dbg(blr->fsp),
                                         fsp_str_dbg(blr->fsp)));
 
                                brl_lock_cancel(br_lck,
                                        blr->smblctx,
-                                       procid_self(),
+                                       messaging_server_id(sconn->msg_ctx),
                                        blr->offset,
                                        blr->count,
                                        blr->lock_flav,
@@ -819,10 +843,12 @@ static void process_blocking_lock_cancel_message(struct messaging_context *ctx,
                                                 struct server_id server_id,
                                                 DATA_BLOB *data)
 {
-       struct smbd_server_connection *sconn = smbd_server_conn;
        NTSTATUS err;
        const char *msg = (const char *)data->data;
        struct blocking_lock_record *blr;
+       struct smbd_server_connection *sconn =
+               talloc_get_type_abort(private_data,
+               struct smbd_server_connection);
 
        if (data->data == NULL) {
                smb_panic("process_blocking_lock_cancel_message: null msg");
@@ -859,13 +885,13 @@ struct blocking_lock_record *blocking_lock_cancel_smb1(files_struct *fsp,
                        unsigned char locktype,
                         NTSTATUS err)
 {
-       struct smbd_server_connection *sconn = smbd_server_conn;
+       struct smbd_server_connection *sconn = fsp->conn->sconn;
        char msg[MSG_BLOCKING_LOCK_CANCEL_SIZE];
        struct blocking_lock_record *blr;
 
        if (!sconn->smb1.locks.blocking_lock_cancel_state) {
                /* Register our message. */
-               messaging_register(smbd_messaging_context(), NULL,
+               messaging_register(sconn->msg_ctx, sconn,
                                   MSG_SMB_BLOCKING_LOCK_CANCEL,
                                   process_blocking_lock_cancel_message);
 
@@ -901,7 +927,7 @@ struct blocking_lock_record *blocking_lock_cancel_smb1(files_struct *fsp,
        memcpy(msg, &blr, sizeof(blr));
        memcpy(&msg[sizeof(blr)], &err, sizeof(NTSTATUS));
 
-       messaging_send_buf(smbd_messaging_context(), procid_self(),
+       messaging_send_buf(sconn->msg_ctx, messaging_server_id(sconn->msg_ctx),
                           MSG_SMB_BLOCKING_LOCK_CANCEL,
                           (uint8 *)&msg, sizeof(msg));