2 Unix SMB/CIFS implementation.
4 Copyright (C) Andrew Tridgell 1994-1998
5 Copyright (C) Jeremy Allison 2001-2009
7 This program is free software; you can redistribute it and/or modify
8 it under the terms of the GNU General Public License as published by
9 the Free Software Foundation; either version 3 of the License, or
10 (at your option) any later version.
12 This program is distributed in the hope that it will be useful,
13 but WITHOUT ANY WARRANTY; without even the implied warranty of
14 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
15 GNU General Public License for more details.
17 You should have received a copy of the GNU General Public License
18 along with this program. If not, see <http://www.gnu.org/licenses/>.
23 /****************************************************************************
24 Hard/Symlink a file (UNIX extensions).
25 Creates new name (sym)linked to oldname.
26 ****************************************************************************/
28 static bool cli_link_internal(struct cli_state *cli, const char *oldname, const char *newname, bool hard_link)
30 unsigned int data_len = 0;
31 unsigned int param_len = 0;
32 uint16_t setup = TRANSACT2_SETPATHINFO;
35 char *rparam=NULL, *rdata=NULL;
37 size_t oldlen = 2*(strlen(oldname)+1);
38 size_t newlen = 2*(strlen(newname)+1);
40 param = SMB_MALLOC_ARRAY(char, 6+newlen+2);
46 data = SMB_MALLOC_ARRAY(char, oldlen+2);
53 SSVAL(param,0,hard_link ? SMB_SET_FILE_UNIX_HLINK : SMB_SET_FILE_UNIX_LINK);
57 p += clistr_push(cli, p, newname, newlen, STR_TERMINATE);
58 param_len = PTR_DIFF(p, param);
61 p += clistr_push(cli, p, oldname, oldlen, STR_TERMINATE);
62 data_len = PTR_DIFF(p, data);
64 if (!cli_send_trans(cli, SMBtrans2,
66 -1, 0, /* fid, flags */
67 &setup, 1, 0, /* setup, length, max */
68 param, param_len, 2, /* param, length, max */
69 data, data_len, cli->max_xmit /* data, length, max */
79 if (!cli_receive_trans(cli, SMBtrans2,
93 /****************************************************************************
94 Map standard UNIX permissions onto wire representations.
95 ****************************************************************************/
97 uint32_t unix_perms_to_wire(mode_t perms)
101 ret |= ((perms & S_IXOTH) ? UNIX_X_OTH : 0);
102 ret |= ((perms & S_IWOTH) ? UNIX_W_OTH : 0);
103 ret |= ((perms & S_IROTH) ? UNIX_R_OTH : 0);
104 ret |= ((perms & S_IXGRP) ? UNIX_X_GRP : 0);
105 ret |= ((perms & S_IWGRP) ? UNIX_W_GRP : 0);
106 ret |= ((perms & S_IRGRP) ? UNIX_R_GRP : 0);
107 ret |= ((perms & S_IXUSR) ? UNIX_X_USR : 0);
108 ret |= ((perms & S_IWUSR) ? UNIX_W_USR : 0);
109 ret |= ((perms & S_IRUSR) ? UNIX_R_USR : 0);
111 ret |= ((perms & S_ISVTX) ? UNIX_STICKY : 0);
114 ret |= ((perms & S_ISGID) ? UNIX_SET_GID : 0);
117 ret |= ((perms & S_ISUID) ? UNIX_SET_UID : 0);
122 /****************************************************************************
123 Map wire permissions to standard UNIX.
124 ****************************************************************************/
126 mode_t wire_perms_to_unix(uint32_t perms)
128 mode_t ret = (mode_t)0;
130 ret |= ((perms & UNIX_X_OTH) ? S_IXOTH : 0);
131 ret |= ((perms & UNIX_W_OTH) ? S_IWOTH : 0);
132 ret |= ((perms & UNIX_R_OTH) ? S_IROTH : 0);
133 ret |= ((perms & UNIX_X_GRP) ? S_IXGRP : 0);
134 ret |= ((perms & UNIX_W_GRP) ? S_IWGRP : 0);
135 ret |= ((perms & UNIX_R_GRP) ? S_IRGRP : 0);
136 ret |= ((perms & UNIX_X_USR) ? S_IXUSR : 0);
137 ret |= ((perms & UNIX_W_USR) ? S_IWUSR : 0);
138 ret |= ((perms & UNIX_R_USR) ? S_IRUSR : 0);
140 ret |= ((perms & UNIX_STICKY) ? S_ISVTX : 0);
143 ret |= ((perms & UNIX_SET_GID) ? S_ISGID : 0);
146 ret |= ((perms & UNIX_SET_UID) ? S_ISUID : 0);
151 /****************************************************************************
152 Return the file type from the wire filetype for UNIX extensions.
153 ****************************************************************************/
155 static mode_t unix_filetype_from_wire(uint32_t wire_type)
163 case UNIX_TYPE_SYMLINK:
167 case UNIX_TYPE_CHARDEV:
171 case UNIX_TYPE_BLKDEV:
179 case UNIX_TYPE_SOCKET:
187 /****************************************************************************
188 Do a POSIX getfacl (UNIX extensions).
189 ****************************************************************************/
191 bool cli_unix_getfacl(struct cli_state *cli, const char *name, size_t *prb_size, char **retbuf)
193 unsigned int param_len = 0;
194 unsigned int data_len = 0;
195 uint16_t setup = TRANSACT2_QPATHINFO;
197 size_t nlen = 2*(strlen(name)+1);
198 char *rparam=NULL, *rdata=NULL;
201 param = SMB_MALLOC_ARRAY(char, 6+nlen+2);
208 SSVAL(p, 0, SMB_QUERY_POSIX_ACL);
210 p += clistr_push(cli, p, name, nlen, STR_TERMINATE);
211 param_len = PTR_DIFF(p, param);
213 if (!cli_send_trans(cli, SMBtrans2,
215 -1, 0, /* fid, flags */
216 &setup, 1, 0, /* setup, length, max */
217 param, param_len, 2, /* param, length, max */
218 NULL, 0, cli->max_xmit /* data, length, max */
226 if (!cli_receive_trans(cli, SMBtrans2,
228 &rdata, &data_len)) {
240 *prb_size = (size_t)data_len;
245 /****************************************************************************
246 Stat a file (UNIX extensions).
247 ****************************************************************************/
249 bool cli_unix_stat(struct cli_state *cli, const char *name, SMB_STRUCT_STAT *sbuf)
251 unsigned int param_len = 0;
252 unsigned int data_len = 0;
253 uint16_t setup = TRANSACT2_QPATHINFO;
255 size_t nlen = 2*(strlen(name)+1);
256 char *rparam=NULL, *rdata=NULL;
261 param = SMB_MALLOC_ARRAY(char, 6+nlen+2);
267 SSVAL(p, 0, SMB_QUERY_FILE_UNIX_BASIC);
269 p += clistr_push(cli, p, name, nlen, STR_TERMINATE);
270 param_len = PTR_DIFF(p, param);
272 if (!cli_send_trans(cli, SMBtrans2,
274 -1, 0, /* fid, flags */
275 &setup, 1, 0, /* setup, length, max */
276 param, param_len, 2, /* param, length, max */
277 NULL, 0, cli->max_xmit /* data, length, max */
285 if (!cli_receive_trans(cli, SMBtrans2,
287 &rdata, &data_len)) {
297 sbuf->st_size = IVAL2_TO_SMB_BIG_UINT(rdata,0); /* total size, in bytes */
298 sbuf->st_blocks = IVAL2_TO_SMB_BIG_UINT(rdata,8); /* number of blocks allocated */
299 #if defined (HAVE_STAT_ST_BLOCKS) && defined(STAT_ST_BLOCKSIZE)
300 sbuf->st_blocks /= STAT_ST_BLOCKSIZE;
302 /* assume 512 byte blocks */
303 sbuf->st_blocks /= 512;
305 set_ctimespec(sbuf, interpret_long_date(rdata + 16)); /* time of last change */
306 set_atimespec(sbuf, interpret_long_date(rdata + 24)); /* time of last access */
307 set_mtimespec(sbuf, interpret_long_date(rdata + 32)); /* time of last modification */
309 sbuf->st_uid = (uid_t) IVAL(rdata,40); /* user ID of owner */
310 sbuf->st_gid = (gid_t) IVAL(rdata,48); /* group ID of owner */
311 sbuf->st_mode |= unix_filetype_from_wire(IVAL(rdata, 56));
312 #if defined(HAVE_MAKEDEV)
314 uint32_t dev_major = IVAL(rdata,60);
315 uint32_t dev_minor = IVAL(rdata,68);
316 sbuf->st_rdev = makedev(dev_major, dev_minor);
319 sbuf->st_ino = (SMB_INO_T)IVAL2_TO_SMB_BIG_UINT(rdata,76); /* inode */
320 sbuf->st_mode |= wire_perms_to_unix(IVAL(rdata,84)); /* protection */
321 sbuf->st_nlink = IVAL(rdata,92); /* number of hard links */
329 /****************************************************************************
330 Symlink a file (UNIX extensions).
331 ****************************************************************************/
333 bool cli_unix_symlink(struct cli_state *cli, const char *oldname, const char *newname)
335 return cli_link_internal(cli, oldname, newname, False);
338 /****************************************************************************
339 Hard a file (UNIX extensions).
340 ****************************************************************************/
342 bool cli_unix_hardlink(struct cli_state *cli, const char *oldname, const char *newname)
344 return cli_link_internal(cli, oldname, newname, True);
347 /****************************************************************************
348 Chmod or chown a file internal (UNIX extensions).
349 ****************************************************************************/
351 static bool cli_unix_chmod_chown_internal(struct cli_state *cli, const char *fname, uint32_t mode, uint32_t uid, uint32_t gid)
353 unsigned int data_len = 0;
354 unsigned int param_len = 0;
355 uint16_t setup = TRANSACT2_SETPATHINFO;
356 size_t nlen = 2*(strlen(fname)+1);
359 char *rparam=NULL, *rdata=NULL;
362 param = SMB_MALLOC_ARRAY(char, 6+nlen+2);
366 memset(param, '\0', 6);
367 memset(data, 0, sizeof(data));
369 SSVAL(param,0,SMB_SET_FILE_UNIX_BASIC);
372 p += clistr_push(cli, p, fname, nlen, STR_TERMINATE);
373 param_len = PTR_DIFF(p, param);
375 memset(data, 0xff, 40); /* Set all sizes/times to no change. */
383 if (!cli_send_trans(cli, SMBtrans2,
385 -1, 0, /* fid, flags */
386 &setup, 1, 0, /* setup, length, max */
387 param, param_len, 2, /* param, length, max */
388 (char *)&data, data_len, cli->max_xmit /* data, length, max */
396 if (!cli_receive_trans(cli, SMBtrans2,
398 &rdata, &data_len)) {
408 /****************************************************************************
409 chmod a file (UNIX extensions).
410 ****************************************************************************/
412 bool cli_unix_chmod(struct cli_state *cli, const char *fname, mode_t mode)
414 return cli_unix_chmod_chown_internal(cli, fname,
415 unix_perms_to_wire(mode), SMB_UID_NO_CHANGE, SMB_GID_NO_CHANGE);
418 /****************************************************************************
419 chown a file (UNIX extensions).
420 ****************************************************************************/
422 bool cli_unix_chown(struct cli_state *cli, const char *fname, uid_t uid, gid_t gid)
424 return cli_unix_chmod_chown_internal(cli, fname,
425 SMB_MODE_NO_CHANGE, (uint32)uid, (uint32)gid);
428 /****************************************************************************
430 ****************************************************************************/
432 static void cli_rename_done(struct tevent_req *subreq);
434 struct cli_rename_state {
438 struct tevent_req *cli_rename_send(TALLOC_CTX *mem_ctx,
439 struct event_context *ev,
440 struct cli_state *cli,
441 const char *fname_src,
442 const char *fname_dst)
444 struct tevent_req *req = NULL, *subreq = NULL;
445 struct cli_rename_state *state = NULL;
446 uint8_t additional_flags = 0;
447 uint8_t *bytes = NULL;
449 req = tevent_req_create(mem_ctx, &state, struct cli_rename_state);
454 SSVAL(state->vwv+0, 0, aSYSTEM | aHIDDEN | aDIR);
456 bytes = talloc_array(state, uint8_t, 1);
457 if (tevent_req_nomem(bytes, req)) {
458 return tevent_req_post(req, ev);
461 bytes = smb_bytes_push_str(bytes, cli_ucs2(cli), fname_src,
462 strlen(fname_src)+1, NULL);
463 if (tevent_req_nomem(bytes, req)) {
464 return tevent_req_post(req, ev);
467 bytes = TALLOC_REALLOC_ARRAY(state, bytes, uint8_t,
468 talloc_get_size(bytes)+1);
469 if (tevent_req_nomem(bytes, req)) {
470 return tevent_req_post(req, ev);
473 bytes[talloc_get_size(bytes)-1] = 4;
474 bytes = smb_bytes_push_str(bytes, cli_ucs2(cli), fname_dst,
475 strlen(fname_dst)+1, NULL);
476 if (tevent_req_nomem(bytes, req)) {
477 return tevent_req_post(req, ev);
480 subreq = cli_smb_send(state, ev, cli, SMBmv, additional_flags,
481 1, state->vwv, talloc_get_size(bytes), bytes);
482 if (tevent_req_nomem(subreq, req)) {
483 return tevent_req_post(req, ev);
485 tevent_req_set_callback(subreq, cli_rename_done, req);
489 static void cli_rename_done(struct tevent_req *subreq)
491 struct tevent_req *req = tevent_req_callback_data(
492 subreq, struct tevent_req);
495 status = cli_smb_recv(subreq, 0, NULL, NULL, NULL, NULL);
497 if (!NT_STATUS_IS_OK(status)) {
498 tevent_req_nterror(req, status);
501 tevent_req_done(req);
504 NTSTATUS cli_rename_recv(struct tevent_req *req)
506 return tevent_req_simple_recv_ntstatus(req);
509 NTSTATUS cli_rename(struct cli_state *cli, const char *fname_src, const char *fname_dst)
511 TALLOC_CTX *frame = talloc_stackframe();
512 struct event_context *ev;
513 struct tevent_req *req;
514 NTSTATUS status = NT_STATUS_OK;
516 if (cli_has_async_calls(cli)) {
518 * Can't use sync call while an async call is in flight
520 status = NT_STATUS_INVALID_PARAMETER;
524 ev = event_context_init(frame);
526 status = NT_STATUS_NO_MEMORY;
530 req = cli_rename_send(frame, ev, cli, fname_src, fname_dst);
532 status = NT_STATUS_NO_MEMORY;
536 if (!tevent_req_poll(req, ev)) {
537 status = map_nt_error_from_unix(errno);
541 status = cli_rename_recv(req);
545 if (!NT_STATUS_IS_OK(status)) {
546 cli_set_error(cli, status);
551 /****************************************************************************
553 ****************************************************************************/
555 static void cli_ntrename_done(struct tevent_req *subreq);
557 struct cli_ntrename_state {
561 static struct tevent_req *cli_ntrename_send_internal(TALLOC_CTX *mem_ctx,
562 struct event_context *ev,
563 struct cli_state *cli,
564 const char *fname_src,
565 const char *fname_dst,
566 uint16_t rename_flag)
568 struct tevent_req *req = NULL, *subreq = NULL;
569 struct cli_ntrename_state *state = NULL;
570 uint8_t additional_flags = 0;
571 uint8_t *bytes = NULL;
573 req = tevent_req_create(mem_ctx, &state, struct cli_ntrename_state);
578 SSVAL(state->vwv+0, 0 ,aSYSTEM | aHIDDEN | aDIR);
579 SSVAL(state->vwv+1, 0, rename_flag);
581 bytes = talloc_array(state, uint8_t, 1);
582 if (tevent_req_nomem(bytes, req)) {
583 return tevent_req_post(req, ev);
586 bytes = smb_bytes_push_str(bytes, cli_ucs2(cli), fname_src,
587 strlen(fname_src)+1, NULL);
588 if (tevent_req_nomem(bytes, req)) {
589 return tevent_req_post(req, ev);
592 bytes = TALLOC_REALLOC_ARRAY(state, bytes, uint8_t,
593 talloc_get_size(bytes)+1);
594 if (tevent_req_nomem(bytes, req)) {
595 return tevent_req_post(req, ev);
598 bytes[talloc_get_size(bytes)-1] = 4;
599 bytes = smb_bytes_push_str(bytes, cli_ucs2(cli), fname_dst,
600 strlen(fname_dst)+1, NULL);
601 if (tevent_req_nomem(bytes, req)) {
602 return tevent_req_post(req, ev);
605 subreq = cli_smb_send(state, ev, cli, SMBntrename, additional_flags,
606 4, state->vwv, talloc_get_size(bytes), bytes);
607 if (tevent_req_nomem(subreq, req)) {
608 return tevent_req_post(req, ev);
610 tevent_req_set_callback(subreq, cli_ntrename_done, req);
614 struct tevent_req *cli_ntrename_send(TALLOC_CTX *mem_ctx,
615 struct event_context *ev,
616 struct cli_state *cli,
617 const char *fname_src,
618 const char *fname_dst)
620 return cli_ntrename_send_internal(mem_ctx,
628 static void cli_ntrename_done(struct tevent_req *subreq)
630 struct tevent_req *req = tevent_req_callback_data(
631 subreq, struct tevent_req);
634 status = cli_smb_recv(subreq, 0, NULL, NULL, NULL, NULL);
636 if (!NT_STATUS_IS_OK(status)) {
637 tevent_req_nterror(req, status);
640 tevent_req_done(req);
643 NTSTATUS cli_ntrename_recv(struct tevent_req *req)
645 return tevent_req_simple_recv_ntstatus(req);
648 NTSTATUS cli_ntrename(struct cli_state *cli, const char *fname_src, const char *fname_dst)
650 TALLOC_CTX *frame = talloc_stackframe();
651 struct event_context *ev;
652 struct tevent_req *req;
653 NTSTATUS status = NT_STATUS_OK;
655 if (cli_has_async_calls(cli)) {
657 * Can't use sync call while an async call is in flight
659 status = NT_STATUS_INVALID_PARAMETER;
663 ev = event_context_init(frame);
665 status = NT_STATUS_NO_MEMORY;
669 req = cli_ntrename_send(frame, ev, cli, fname_src, fname_dst);
671 status = NT_STATUS_NO_MEMORY;
675 if (!tevent_req_poll(req, ev)) {
676 status = map_nt_error_from_unix(errno);
680 status = cli_ntrename_recv(req);
684 if (!NT_STATUS_IS_OK(status)) {
685 cli_set_error(cli, status);
690 /****************************************************************************
692 ****************************************************************************/
694 struct tevent_req *cli_nt_hardlink_send(TALLOC_CTX *mem_ctx,
695 struct event_context *ev,
696 struct cli_state *cli,
697 const char *fname_src,
698 const char *fname_dst)
700 return cli_ntrename_send_internal(mem_ctx,
705 RENAME_FLAG_HARD_LINK);
708 NTSTATUS cli_nt_hardlink_recv(struct tevent_req *req)
710 return tevent_req_simple_recv_ntstatus(req);
713 NTSTATUS cli_nt_hardlink(struct cli_state *cli, const char *fname_src, const char *fname_dst)
715 TALLOC_CTX *frame = talloc_stackframe();
716 struct event_context *ev;
717 struct tevent_req *req;
718 NTSTATUS status = NT_STATUS_OK;
720 if (cli_has_async_calls(cli)) {
722 * Can't use sync call while an async call is in flight
724 status = NT_STATUS_INVALID_PARAMETER;
728 ev = event_context_init(frame);
730 status = NT_STATUS_NO_MEMORY;
734 req = cli_nt_hardlink_send(frame, ev, cli, fname_src, fname_dst);
736 status = NT_STATUS_NO_MEMORY;
740 if (!tevent_req_poll(req, ev)) {
741 status = map_nt_error_from_unix(errno);
745 status = cli_nt_hardlink_recv(req);
749 if (!NT_STATUS_IS_OK(status)) {
750 cli_set_error(cli, status);
755 /****************************************************************************
757 ****************************************************************************/
759 static void cli_unlink_done(struct tevent_req *subreq);
761 struct cli_unlink_state {
765 struct tevent_req *cli_unlink_send(TALLOC_CTX *mem_ctx,
766 struct event_context *ev,
767 struct cli_state *cli,
769 uint16_t mayhave_attrs)
771 struct tevent_req *req = NULL, *subreq = NULL;
772 struct cli_unlink_state *state = NULL;
773 uint8_t additional_flags = 0;
774 uint8_t *bytes = NULL;
776 req = tevent_req_create(mem_ctx, &state, struct cli_unlink_state);
781 SSVAL(state->vwv+0, 0, mayhave_attrs);
783 bytes = talloc_array(state, uint8_t, 1);
784 if (tevent_req_nomem(bytes, req)) {
785 return tevent_req_post(req, ev);
788 bytes = smb_bytes_push_str(bytes, cli_ucs2(cli), fname,
789 strlen(fname)+1, NULL);
791 if (tevent_req_nomem(bytes, req)) {
792 return tevent_req_post(req, ev);
795 subreq = cli_smb_send(state, ev, cli, SMBunlink, additional_flags,
796 1, state->vwv, talloc_get_size(bytes), bytes);
797 if (tevent_req_nomem(subreq, req)) {
798 return tevent_req_post(req, ev);
800 tevent_req_set_callback(subreq, cli_unlink_done, req);
804 static void cli_unlink_done(struct tevent_req *subreq)
806 struct tevent_req *req = tevent_req_callback_data(
807 subreq, struct tevent_req);
810 status = cli_smb_recv(subreq, 0, NULL, NULL, NULL, NULL);
812 if (!NT_STATUS_IS_OK(status)) {
813 tevent_req_nterror(req, status);
816 tevent_req_done(req);
819 NTSTATUS cli_unlink_recv(struct tevent_req *req)
821 return tevent_req_simple_recv_ntstatus(req);
824 NTSTATUS cli_unlink(struct cli_state *cli, const char *fname, uint16_t mayhave_attrs)
826 TALLOC_CTX *frame = talloc_stackframe();
827 struct event_context *ev;
828 struct tevent_req *req;
829 NTSTATUS status = NT_STATUS_OK;
831 if (cli_has_async_calls(cli)) {
833 * Can't use sync call while an async call is in flight
835 status = NT_STATUS_INVALID_PARAMETER;
839 ev = event_context_init(frame);
841 status = NT_STATUS_NO_MEMORY;
845 req = cli_unlink_send(frame, ev, cli, fname, mayhave_attrs);
847 status = NT_STATUS_NO_MEMORY;
851 if (!tevent_req_poll(req, ev)) {
852 status = map_nt_error_from_unix(errno);
856 status = cli_unlink_recv(req);
860 if (!NT_STATUS_IS_OK(status)) {
861 cli_set_error(cli, status);
866 /****************************************************************************
868 ****************************************************************************/
870 static void cli_mkdir_done(struct tevent_req *subreq);
872 struct cli_mkdir_state {
876 struct tevent_req *cli_mkdir_send(TALLOC_CTX *mem_ctx,
877 struct event_context *ev,
878 struct cli_state *cli,
881 struct tevent_req *req = NULL, *subreq = NULL;
882 struct cli_mkdir_state *state = NULL;
883 uint8_t additional_flags = 0;
884 uint8_t *bytes = NULL;
886 req = tevent_req_create(mem_ctx, &state, struct cli_mkdir_state);
891 bytes = talloc_array(state, uint8_t, 1);
892 if (tevent_req_nomem(bytes, req)) {
893 return tevent_req_post(req, ev);
896 bytes = smb_bytes_push_str(bytes, cli_ucs2(cli), dname,
897 strlen(dname)+1, NULL);
899 if (tevent_req_nomem(bytes, req)) {
900 return tevent_req_post(req, ev);
903 subreq = cli_smb_send(state, ev, cli, SMBmkdir, additional_flags,
904 0, NULL, talloc_get_size(bytes), bytes);
905 if (tevent_req_nomem(subreq, req)) {
906 return tevent_req_post(req, ev);
908 tevent_req_set_callback(subreq, cli_mkdir_done, req);
912 static void cli_mkdir_done(struct tevent_req *subreq)
914 struct tevent_req *req = tevent_req_callback_data(
915 subreq, struct tevent_req);
918 status = cli_smb_recv(subreq, 0, NULL, NULL, NULL, NULL);
920 if (!NT_STATUS_IS_OK(status)) {
921 tevent_req_nterror(req, status);
924 tevent_req_done(req);
927 NTSTATUS cli_mkdir_recv(struct tevent_req *req)
929 return tevent_req_simple_recv_ntstatus(req);
932 NTSTATUS cli_mkdir(struct cli_state *cli, const char *dname)
934 TALLOC_CTX *frame = talloc_stackframe();
935 struct event_context *ev;
936 struct tevent_req *req;
937 NTSTATUS status = NT_STATUS_OK;
939 if (cli_has_async_calls(cli)) {
941 * Can't use sync call while an async call is in flight
943 status = NT_STATUS_INVALID_PARAMETER;
947 ev = event_context_init(frame);
949 status = NT_STATUS_NO_MEMORY;
953 req = cli_mkdir_send(frame, ev, cli, dname);
955 status = NT_STATUS_NO_MEMORY;
959 if (!tevent_req_poll(req, ev)) {
960 status = map_nt_error_from_unix(errno);
964 status = cli_mkdir_recv(req);
968 if (!NT_STATUS_IS_OK(status)) {
969 cli_set_error(cli, status);
974 /****************************************************************************
976 ****************************************************************************/
978 static void cli_rmdir_done(struct tevent_req *subreq);
980 struct cli_rmdir_state {
984 struct tevent_req *cli_rmdir_send(TALLOC_CTX *mem_ctx,
985 struct event_context *ev,
986 struct cli_state *cli,
989 struct tevent_req *req = NULL, *subreq = NULL;
990 struct cli_rmdir_state *state = NULL;
991 uint8_t additional_flags = 0;
992 uint8_t *bytes = NULL;
994 req = tevent_req_create(mem_ctx, &state, struct cli_rmdir_state);
999 bytes = talloc_array(state, uint8_t, 1);
1000 if (tevent_req_nomem(bytes, req)) {
1001 return tevent_req_post(req, ev);
1004 bytes = smb_bytes_push_str(bytes, cli_ucs2(cli), dname,
1005 strlen(dname)+1, NULL);
1007 if (tevent_req_nomem(bytes, req)) {
1008 return tevent_req_post(req, ev);
1011 subreq = cli_smb_send(state, ev, cli, SMBrmdir, additional_flags,
1012 0, NULL, talloc_get_size(bytes), bytes);
1013 if (tevent_req_nomem(subreq, req)) {
1014 return tevent_req_post(req, ev);
1016 tevent_req_set_callback(subreq, cli_rmdir_done, req);
1020 static void cli_rmdir_done(struct tevent_req *subreq)
1022 struct tevent_req *req = tevent_req_callback_data(
1023 subreq, struct tevent_req);
1026 status = cli_smb_recv(subreq, 0, NULL, NULL, NULL, NULL);
1027 TALLOC_FREE(subreq);
1028 if (!NT_STATUS_IS_OK(status)) {
1029 tevent_req_nterror(req, status);
1032 tevent_req_done(req);
1035 NTSTATUS cli_rmdir_recv(struct tevent_req *req)
1037 return tevent_req_simple_recv_ntstatus(req);
1040 NTSTATUS cli_rmdir(struct cli_state *cli, const char *dname)
1042 TALLOC_CTX *frame = talloc_stackframe();
1043 struct event_context *ev;
1044 struct tevent_req *req;
1045 NTSTATUS status = NT_STATUS_OK;
1047 if (cli_has_async_calls(cli)) {
1049 * Can't use sync call while an async call is in flight
1051 status = NT_STATUS_INVALID_PARAMETER;
1055 ev = event_context_init(frame);
1057 status = NT_STATUS_NO_MEMORY;
1061 req = cli_rmdir_send(frame, ev, cli, dname);
1063 status = NT_STATUS_NO_MEMORY;
1067 if (!tevent_req_poll(req, ev)) {
1068 status = map_nt_error_from_unix(errno);
1072 status = cli_rmdir_recv(req);
1076 if (!NT_STATUS_IS_OK(status)) {
1077 cli_set_error(cli, status);
1082 /****************************************************************************
1083 Set or clear the delete on close flag.
1084 ****************************************************************************/
1086 int cli_nt_delete_on_close(struct cli_state *cli, int fnum, bool flag)
1088 unsigned int data_len = 1;
1089 unsigned int param_len = 6;
1090 uint16_t setup = TRANSACT2_SETFILEINFO;
1093 char *rparam=NULL, *rdata=NULL;
1095 memset(param, 0, param_len);
1096 SSVAL(param,0,fnum);
1097 SSVAL(param,2,SMB_SET_FILE_DISPOSITION_INFO);
1099 data = flag ? 1 : 0;
1101 if (!cli_send_trans(cli, SMBtrans2,
1103 -1, 0, /* fid, flags */
1104 &setup, 1, 0, /* setup, length, max */
1105 param, param_len, 2, /* param, length, max */
1106 (char *)&data, data_len, cli->max_xmit /* data, length, max */
1111 if (!cli_receive_trans(cli, SMBtrans2,
1112 &rparam, ¶m_len,
1113 &rdata, &data_len)) {
1123 /****************************************************************************
1124 Open a file - exposing the full horror of the NT API :-).
1126 ****************************************************************************/
1128 int cli_nt_create_full(struct cli_state *cli, const char *fname,
1129 uint32_t CreatFlags, uint32_t DesiredAccess,
1130 uint32_t FileAttributes, uint32_t ShareAccess,
1131 uint32_t CreateDisposition, uint32_t CreateOptions,
1132 uint8_t SecurityFlags)
1137 memset(cli->outbuf,'\0',smb_size);
1138 memset(cli->inbuf,'\0',smb_size);
1140 cli_set_message(cli->outbuf,24,0, true);
1142 SCVAL(cli->outbuf,smb_com,SMBntcreateX);
1143 SSVAL(cli->outbuf,smb_tid,cli->cnum);
1144 cli_setup_packet(cli);
1146 SSVAL(cli->outbuf,smb_vwv0,0xFF);
1147 if (cli->use_oplocks)
1148 CreatFlags |= (REQUEST_OPLOCK|REQUEST_BATCH_OPLOCK);
1150 SIVAL(cli->outbuf,smb_ntcreate_Flags, CreatFlags);
1151 SIVAL(cli->outbuf,smb_ntcreate_RootDirectoryFid, 0x0);
1152 SIVAL(cli->outbuf,smb_ntcreate_DesiredAccess, DesiredAccess);
1153 SIVAL(cli->outbuf,smb_ntcreate_FileAttributes, FileAttributes);
1154 SIVAL(cli->outbuf,smb_ntcreate_ShareAccess, ShareAccess);
1155 SIVAL(cli->outbuf,smb_ntcreate_CreateDisposition, CreateDisposition);
1156 SIVAL(cli->outbuf,smb_ntcreate_CreateOptions, CreateOptions);
1157 SIVAL(cli->outbuf,smb_ntcreate_ImpersonationLevel, 0x02);
1158 SCVAL(cli->outbuf,smb_ntcreate_SecurityFlags, SecurityFlags);
1160 p = smb_buf(cli->outbuf);
1161 /* this alignment and termination is critical for netapp filers. Don't change */
1162 p += clistr_align_out(cli, p, 0);
1163 len = clistr_push(cli, p, fname,
1164 cli->bufsize - PTR_DIFF(p,cli->outbuf), 0);
1166 SSVAL(cli->outbuf,smb_ntcreate_NameLength, len);
1167 /* sigh. this copes with broken netapp filer behaviour */
1168 p += clistr_push(cli, p, "",
1169 cli->bufsize - PTR_DIFF(p,cli->outbuf), STR_TERMINATE);
1171 cli_setup_bcc(cli, p);
1174 if (!cli_receive_smb(cli)) {
1178 if (cli_is_error(cli)) {
1182 return SVAL(cli->inbuf,smb_vwv2 + 1);
1185 struct cli_ntcreate_state {
1190 static void cli_ntcreate_done(struct tevent_req *subreq);
1192 struct tevent_req *cli_ntcreate_send(TALLOC_CTX *mem_ctx,
1193 struct event_context *ev,
1194 struct cli_state *cli,
1196 uint32_t CreatFlags,
1197 uint32_t DesiredAccess,
1198 uint32_t FileAttributes,
1199 uint32_t ShareAccess,
1200 uint32_t CreateDisposition,
1201 uint32_t CreateOptions,
1202 uint8_t SecurityFlags)
1204 struct tevent_req *req, *subreq;
1205 struct cli_ntcreate_state *state;
1208 size_t converted_len;
1210 req = tevent_req_create(mem_ctx, &state, struct cli_ntcreate_state);
1216 SCVAL(vwv+0, 0, 0xFF);
1221 if (cli->use_oplocks) {
1222 CreatFlags |= (REQUEST_OPLOCK|REQUEST_BATCH_OPLOCK);
1224 SIVAL(vwv+3, 1, CreatFlags);
1225 SIVAL(vwv+5, 1, 0x0); /* RootDirectoryFid */
1226 SIVAL(vwv+7, 1, DesiredAccess);
1227 SIVAL(vwv+9, 1, 0x0); /* AllocationSize */
1228 SIVAL(vwv+11, 1, 0x0); /* AllocationSize */
1229 SIVAL(vwv+13, 1, FileAttributes);
1230 SIVAL(vwv+15, 1, ShareAccess);
1231 SIVAL(vwv+17, 1, CreateDisposition);
1232 SIVAL(vwv+19, 1, CreateOptions);
1233 SIVAL(vwv+21, 1, 0x02); /* ImpersonationLevel */
1234 SCVAL(vwv+23, 1, SecurityFlags);
1236 bytes = talloc_array(state, uint8_t, 0);
1237 bytes = smb_bytes_push_str(bytes, cli_ucs2(cli),
1238 fname, strlen(fname)+1,
1241 /* sigh. this copes with broken netapp filer behaviour */
1242 bytes = smb_bytes_push_str(bytes, cli_ucs2(cli), "", 1, NULL);
1244 if (tevent_req_nomem(bytes, req)) {
1245 return tevent_req_post(req, ev);
1248 SIVAL(vwv+2, 1, converted_len);
1250 subreq = cli_smb_send(state, ev, cli, SMBntcreateX, 0, 24, vwv,
1251 talloc_get_size(bytes), bytes);
1252 if (tevent_req_nomem(subreq, req)) {
1253 return tevent_req_post(req, ev);
1255 tevent_req_set_callback(subreq, cli_ntcreate_done, req);
1259 static void cli_ntcreate_done(struct tevent_req *subreq)
1261 struct tevent_req *req = tevent_req_callback_data(
1262 subreq, struct tevent_req);
1263 struct cli_ntcreate_state *state = tevent_req_data(
1264 req, struct cli_ntcreate_state);
1271 status = cli_smb_recv(subreq, 3, &wct, &vwv, &num_bytes, &bytes);
1272 if (!NT_STATUS_IS_OK(status)) {
1273 TALLOC_FREE(subreq);
1274 tevent_req_nterror(req, status);
1277 state->fnum = SVAL(vwv+2, 1);
1278 tevent_req_done(req);
1281 NTSTATUS cli_ntcreate_recv(struct tevent_req *req, uint16_t *pfnum)
1283 struct cli_ntcreate_state *state = tevent_req_data(
1284 req, struct cli_ntcreate_state);
1287 if (tevent_req_is_nterror(req, &status)) {
1290 *pfnum = state->fnum;
1291 return NT_STATUS_OK;
1294 NTSTATUS cli_ntcreate(struct cli_state *cli,
1296 uint32_t CreatFlags,
1297 uint32_t DesiredAccess,
1298 uint32_t FileAttributes,
1299 uint32_t ShareAccess,
1300 uint32_t CreateDisposition,
1301 uint32_t CreateOptions,
1302 uint8_t SecurityFlags,
1305 TALLOC_CTX *frame = talloc_stackframe();
1306 struct event_context *ev;
1307 struct tevent_req *req;
1308 NTSTATUS status = NT_STATUS_OK;
1310 if (cli_has_async_calls(cli)) {
1312 * Can't use sync call while an async call is in flight
1314 status = NT_STATUS_INVALID_PARAMETER;
1318 ev = event_context_init(frame);
1320 status = NT_STATUS_NO_MEMORY;
1324 req = cli_ntcreate_send(frame, ev, cli, fname, CreatFlags,
1325 DesiredAccess, FileAttributes, ShareAccess,
1326 CreateDisposition, CreateOptions,
1329 status = NT_STATUS_NO_MEMORY;
1333 if (!tevent_req_poll(req, ev)) {
1334 status = map_nt_error_from_unix(errno);
1338 status = cli_ntcreate_recv(req, pfid);
1341 if (!NT_STATUS_IS_OK(status)) {
1342 cli_set_error(cli, status);
1347 /****************************************************************************
1349 ****************************************************************************/
1351 int cli_nt_create(struct cli_state *cli, const char *fname, uint32_t DesiredAccess)
1353 return cli_nt_create_full(cli, fname, 0, DesiredAccess, 0,
1354 FILE_SHARE_READ|FILE_SHARE_WRITE, FILE_OPEN, 0x0, 0x0);
1357 uint8_t *smb_bytes_push_str(uint8_t *buf, bool ucs2,
1358 const char *str, size_t str_len,
1359 size_t *pconverted_size)
1363 size_t converted_size;
1369 buflen = talloc_get_size(buf);
1371 * We're pushing into an SMB buffer, align odd
1373 if (ucs2 && (buflen % 2 == 0)) {
1374 buf = TALLOC_REALLOC_ARRAY(NULL, buf, uint8_t, buflen + 1);
1382 if (!convert_string_talloc(talloc_tos(), CH_UNIX,
1383 ucs2 ? CH_UTF16LE : CH_DOS,
1384 str, str_len, &converted,
1385 &converted_size, true)) {
1389 buf = TALLOC_REALLOC_ARRAY(NULL, buf, uint8_t,
1390 buflen + converted_size);
1392 TALLOC_FREE(converted);
1396 memcpy(buf + buflen, converted, converted_size);
1398 TALLOC_FREE(converted);
1400 if (pconverted_size) {
1401 *pconverted_size = converted_size;
1407 /****************************************************************************
1409 WARNING: if you open with O_WRONLY then getattrE won't work!
1410 ****************************************************************************/
1412 struct cli_open_state {
1418 static void cli_open_done(struct tevent_req *subreq);
1420 struct tevent_req *cli_open_create(TALLOC_CTX *mem_ctx,
1421 struct event_context *ev,
1422 struct cli_state *cli, const char *fname,
1423 int flags, int share_mode,
1424 struct tevent_req **psmbreq)
1426 struct tevent_req *req, *subreq;
1427 struct cli_open_state *state;
1429 unsigned accessmode;
1430 uint8_t additional_flags;
1433 req = tevent_req_create(mem_ctx, &state, struct cli_open_state);
1439 if (flags & O_CREAT) {
1442 if (!(flags & O_EXCL)) {
1443 if (flags & O_TRUNC)
1449 accessmode = (share_mode<<4);
1451 if ((flags & O_ACCMODE) == O_RDWR) {
1453 } else if ((flags & O_ACCMODE) == O_WRONLY) {
1458 if ((flags & O_SYNC) == O_SYNC) {
1459 accessmode |= (1<<14);
1463 if (share_mode == DENY_FCB) {
1467 SCVAL(state->vwv + 0, 0, 0xFF);
1468 SCVAL(state->vwv + 0, 1, 0);
1469 SSVAL(state->vwv + 1, 0, 0);
1470 SSVAL(state->vwv + 2, 0, 0); /* no additional info */
1471 SSVAL(state->vwv + 3, 0, accessmode);
1472 SSVAL(state->vwv + 4, 0, aSYSTEM | aHIDDEN);
1473 SSVAL(state->vwv + 5, 0, 0);
1474 SIVAL(state->vwv + 6, 0, 0);
1475 SSVAL(state->vwv + 8, 0, openfn);
1476 SIVAL(state->vwv + 9, 0, 0);
1477 SIVAL(state->vwv + 11, 0, 0);
1478 SIVAL(state->vwv + 13, 0, 0);
1480 additional_flags = 0;
1482 if (cli->use_oplocks) {
1483 /* if using oplocks then ask for a batch oplock via
1484 core and extended methods */
1486 FLAG_REQUEST_OPLOCK|FLAG_REQUEST_BATCH_OPLOCK;
1487 SSVAL(state->vwv+2, 0, SVAL(state->vwv+2, 0) | 6);
1490 bytes = talloc_array(state, uint8_t, 0);
1491 bytes = smb_bytes_push_str(bytes, cli_ucs2(cli), fname,
1492 strlen(fname)+1, NULL);
1494 if (tevent_req_nomem(bytes, req)) {
1495 return tevent_req_post(req, ev);
1498 state->bytes.iov_base = bytes;
1499 state->bytes.iov_len = talloc_get_size(bytes);
1501 subreq = cli_smb_req_create(state, ev, cli, SMBopenX, additional_flags,
1502 15, state->vwv, 1, &state->bytes);
1503 if (subreq == NULL) {
1507 tevent_req_set_callback(subreq, cli_open_done, req);
1512 struct tevent_req *cli_open_send(TALLOC_CTX *mem_ctx, struct event_context *ev,
1513 struct cli_state *cli, const char *fname,
1514 int flags, int share_mode)
1516 struct tevent_req *req, *subreq;
1518 req = cli_open_create(mem_ctx, ev, cli, fname, flags, share_mode,
1520 if ((req == NULL) || !cli_smb_req_send(subreq)) {
1527 static void cli_open_done(struct tevent_req *subreq)
1529 struct tevent_req *req = tevent_req_callback_data(
1530 subreq, struct tevent_req);
1531 struct cli_open_state *state = tevent_req_data(
1532 req, struct cli_open_state);
1537 status = cli_smb_recv(subreq, 3, &wct, &vwv, NULL, NULL);
1538 if (!NT_STATUS_IS_OK(status)) {
1539 TALLOC_FREE(subreq);
1540 tevent_req_nterror(req, status);
1543 state->fnum = SVAL(vwv+2, 0);
1544 tevent_req_done(req);
1547 NTSTATUS cli_open_recv(struct tevent_req *req, int *fnum)
1549 struct cli_open_state *state = tevent_req_data(
1550 req, struct cli_open_state);
1553 if (tevent_req_is_nterror(req, &status)) {
1556 *fnum = state->fnum;
1557 return NT_STATUS_OK;
1560 int cli_open(struct cli_state *cli, const char *fname, int flags,
1563 TALLOC_CTX *frame = talloc_stackframe();
1564 struct event_context *ev;
1565 struct tevent_req *req;
1566 NTSTATUS status = NT_STATUS_OK;
1569 if (cli_has_async_calls(cli)) {
1571 * Can't use sync call while an async call is in flight
1573 status = NT_STATUS_INVALID_PARAMETER;
1577 ev = event_context_init(frame);
1579 status = NT_STATUS_NO_MEMORY;
1583 req = cli_open_send(frame, ev, cli, fname, flags, share_mode);
1585 status = NT_STATUS_NO_MEMORY;
1589 if (!tevent_req_poll(req, ev)) {
1590 status = map_nt_error_from_unix(errno);
1594 cli_open_recv(req, &result);
1597 if (!NT_STATUS_IS_OK(status)) {
1598 cli_set_error(cli, status);
1603 /****************************************************************************
1605 ****************************************************************************/
1607 struct cli_close_state {
1611 static void cli_close_done(struct tevent_req *subreq);
1613 struct tevent_req *cli_close_create(TALLOC_CTX *mem_ctx,
1614 struct event_context *ev,
1615 struct cli_state *cli, int fnum,
1616 struct tevent_req **psubreq)
1618 struct tevent_req *req, *subreq;
1619 struct cli_close_state *state;
1621 req = tevent_req_create(mem_ctx, &state, struct cli_close_state);
1625 SSVAL(state->vwv+0, 0, fnum);
1626 SIVALS(state->vwv+1, 0, -1);
1628 subreq = cli_smb_req_create(state, ev, cli, SMBclose, 0, 3, state->vwv,
1630 if (subreq == NULL) {
1634 tevent_req_set_callback(subreq, cli_close_done, req);
1639 struct tevent_req *cli_close_send(TALLOC_CTX *mem_ctx,
1640 struct event_context *ev,
1641 struct cli_state *cli, int fnum)
1643 struct tevent_req *req, *subreq;
1645 req = cli_close_create(mem_ctx, ev, cli, fnum, &subreq);
1646 if ((req == NULL) || !cli_smb_req_send(subreq)) {
1653 static void cli_close_done(struct tevent_req *subreq)
1655 struct tevent_req *req = tevent_req_callback_data(
1656 subreq, struct tevent_req);
1659 status = cli_smb_recv(subreq, 0, NULL, NULL, NULL, NULL);
1660 TALLOC_FREE(subreq);
1661 if (!NT_STATUS_IS_OK(status)) {
1662 tevent_req_nterror(req, status);
1665 tevent_req_done(req);
1668 NTSTATUS cli_close_recv(struct tevent_req *req)
1670 return tevent_req_simple_recv_ntstatus(req);
1673 bool cli_close(struct cli_state *cli, int fnum)
1675 TALLOC_CTX *frame = talloc_stackframe();
1676 struct event_context *ev;
1677 struct tevent_req *req;
1678 NTSTATUS status = NT_STATUS_OK;
1679 bool result = false;
1681 if (cli_has_async_calls(cli)) {
1683 * Can't use sync call while an async call is in flight
1685 status = NT_STATUS_INVALID_PARAMETER;
1689 ev = event_context_init(frame);
1691 status = NT_STATUS_NO_MEMORY;
1695 req = cli_close_send(frame, ev, cli, fnum);
1697 status = NT_STATUS_NO_MEMORY;
1701 if (!tevent_req_poll(req, ev)) {
1702 status = map_nt_error_from_unix(errno);
1706 result = NT_STATUS_IS_OK(cli_close_recv(req));
1709 if (!NT_STATUS_IS_OK(status)) {
1710 cli_set_error(cli, status);
1715 /****************************************************************************
1716 Truncate a file to a specified size
1717 ****************************************************************************/
1719 bool cli_ftruncate(struct cli_state *cli, int fnum, uint64_t size)
1721 unsigned int param_len = 6;
1722 unsigned int data_len = 8;
1723 uint16_t setup = TRANSACT2_SETFILEINFO;
1725 unsigned char data[8];
1726 char *rparam=NULL, *rdata=NULL;
1727 int saved_timeout = cli->timeout;
1729 SSVAL(param,0,fnum);
1730 SSVAL(param,2,SMB_SET_FILE_END_OF_FILE_INFO);
1733 SBVAL(data, 0, size);
1735 if (!cli_send_trans(cli, SMBtrans2,
1737 -1, 0, /* fid, flags */
1738 &setup, 1, 0, /* setup, length, max */
1739 param, param_len, 2, /* param, length, max */
1740 (char *)&data, data_len,/* data, length, ... */
1741 cli->max_xmit)) { /* ... max */
1742 cli->timeout = saved_timeout;
1746 if (!cli_receive_trans(cli, SMBtrans2,
1747 &rparam, ¶m_len,
1748 &rdata, &data_len)) {
1749 cli->timeout = saved_timeout;
1755 cli->timeout = saved_timeout;
1764 /****************************************************************************
1765 send a lock with a specified locktype
1766 this is used for testing LOCKING_ANDX_CANCEL_LOCK
1767 ****************************************************************************/
1769 NTSTATUS cli_locktype(struct cli_state *cli, int fnum,
1770 uint32_t offset, uint32_t len,
1771 int timeout, unsigned char locktype)
1774 int saved_timeout = cli->timeout;
1776 memset(cli->outbuf,'\0',smb_size);
1777 memset(cli->inbuf,'\0', smb_size);
1779 cli_set_message(cli->outbuf,8,0,True);
1781 SCVAL(cli->outbuf,smb_com,SMBlockingX);
1782 SSVAL(cli->outbuf,smb_tid,cli->cnum);
1783 cli_setup_packet(cli);
1785 SCVAL(cli->outbuf,smb_vwv0,0xFF);
1786 SSVAL(cli->outbuf,smb_vwv2,fnum);
1787 SCVAL(cli->outbuf,smb_vwv3,locktype);
1788 SIVALS(cli->outbuf, smb_vwv4, timeout);
1789 SSVAL(cli->outbuf,smb_vwv6,0);
1790 SSVAL(cli->outbuf,smb_vwv7,1);
1792 p = smb_buf(cli->outbuf);
1793 SSVAL(p, 0, cli->pid);
1794 SIVAL(p, 2, offset);
1799 cli_setup_bcc(cli, p);
1804 cli->timeout = (timeout == -1) ? 0x7FFFFFFF : (timeout + 2*1000);
1807 if (!cli_receive_smb(cli)) {
1808 cli->timeout = saved_timeout;
1809 return NT_STATUS_UNSUCCESSFUL;
1812 cli->timeout = saved_timeout;
1814 return cli_nt_error(cli);
1817 /****************************************************************************
1819 note that timeout is in units of 2 milliseconds
1820 ****************************************************************************/
1822 bool cli_lock(struct cli_state *cli, int fnum,
1823 uint32_t offset, uint32_t len, int timeout, enum brl_type lock_type)
1826 int saved_timeout = cli->timeout;
1828 memset(cli->outbuf,'\0',smb_size);
1829 memset(cli->inbuf,'\0', smb_size);
1831 cli_set_message(cli->outbuf,8,0,True);
1833 SCVAL(cli->outbuf,smb_com,SMBlockingX);
1834 SSVAL(cli->outbuf,smb_tid,cli->cnum);
1835 cli_setup_packet(cli);
1837 SCVAL(cli->outbuf,smb_vwv0,0xFF);
1838 SSVAL(cli->outbuf,smb_vwv2,fnum);
1839 SCVAL(cli->outbuf,smb_vwv3,(lock_type == READ_LOCK? 1 : 0));
1840 SIVALS(cli->outbuf, smb_vwv4, timeout);
1841 SSVAL(cli->outbuf,smb_vwv6,0);
1842 SSVAL(cli->outbuf,smb_vwv7,1);
1844 p = smb_buf(cli->outbuf);
1845 SSVAL(p, 0, cli->pid);
1846 SIVAL(p, 2, offset);
1851 cli_setup_bcc(cli, p);
1856 cli->timeout = (timeout == -1) ? 0x7FFFFFFF : (timeout*2 + 5*1000);
1859 if (!cli_receive_smb(cli)) {
1860 cli->timeout = saved_timeout;
1864 cli->timeout = saved_timeout;
1866 if (cli_is_error(cli)) {
1873 /****************************************************************************
1875 ****************************************************************************/
1877 bool cli_unlock(struct cli_state *cli, int fnum, uint32_t offset, uint32_t len)
1881 memset(cli->outbuf,'\0',smb_size);
1882 memset(cli->inbuf,'\0',smb_size);
1884 cli_set_message(cli->outbuf,8,0,True);
1886 SCVAL(cli->outbuf,smb_com,SMBlockingX);
1887 SSVAL(cli->outbuf,smb_tid,cli->cnum);
1888 cli_setup_packet(cli);
1890 SCVAL(cli->outbuf,smb_vwv0,0xFF);
1891 SSVAL(cli->outbuf,smb_vwv2,fnum);
1892 SCVAL(cli->outbuf,smb_vwv3,0);
1893 SIVALS(cli->outbuf, smb_vwv4, 0);
1894 SSVAL(cli->outbuf,smb_vwv6,1);
1895 SSVAL(cli->outbuf,smb_vwv7,0);
1897 p = smb_buf(cli->outbuf);
1898 SSVAL(p, 0, cli->pid);
1899 SIVAL(p, 2, offset);
1902 cli_setup_bcc(cli, p);
1904 if (!cli_receive_smb(cli)) {
1908 if (cli_is_error(cli)) {
1915 /****************************************************************************
1916 Lock a file with 64 bit offsets.
1917 ****************************************************************************/
1919 bool cli_lock64(struct cli_state *cli, int fnum,
1920 uint64_t offset, uint64_t len, int timeout, enum brl_type lock_type)
1923 int saved_timeout = cli->timeout;
1926 if (! (cli->capabilities & CAP_LARGE_FILES)) {
1927 return cli_lock(cli, fnum, offset, len, timeout, lock_type);
1930 ltype = (lock_type == READ_LOCK? 1 : 0);
1931 ltype |= LOCKING_ANDX_LARGE_FILES;
1933 memset(cli->outbuf,'\0',smb_size);
1934 memset(cli->inbuf,'\0', smb_size);
1936 cli_set_message(cli->outbuf,8,0,True);
1938 SCVAL(cli->outbuf,smb_com,SMBlockingX);
1939 SSVAL(cli->outbuf,smb_tid,cli->cnum);
1940 cli_setup_packet(cli);
1942 SCVAL(cli->outbuf,smb_vwv0,0xFF);
1943 SSVAL(cli->outbuf,smb_vwv2,fnum);
1944 SCVAL(cli->outbuf,smb_vwv3,ltype);
1945 SIVALS(cli->outbuf, smb_vwv4, timeout);
1946 SSVAL(cli->outbuf,smb_vwv6,0);
1947 SSVAL(cli->outbuf,smb_vwv7,1);
1949 p = smb_buf(cli->outbuf);
1950 SIVAL(p, 0, cli->pid);
1951 SOFF_T_R(p, 4, offset);
1952 SOFF_T_R(p, 12, len);
1955 cli_setup_bcc(cli, p);
1959 cli->timeout = (timeout == -1) ? 0x7FFFFFFF : (timeout + 5*1000);
1962 if (!cli_receive_smb(cli)) {
1963 cli->timeout = saved_timeout;
1967 cli->timeout = saved_timeout;
1969 if (cli_is_error(cli)) {
1976 /****************************************************************************
1977 Unlock a file with 64 bit offsets.
1978 ****************************************************************************/
1980 bool cli_unlock64(struct cli_state *cli, int fnum, uint64_t offset, uint64_t len)
1984 if (! (cli->capabilities & CAP_LARGE_FILES)) {
1985 return cli_unlock(cli, fnum, offset, len);
1988 memset(cli->outbuf,'\0',smb_size);
1989 memset(cli->inbuf,'\0',smb_size);
1991 cli_set_message(cli->outbuf,8,0,True);
1993 SCVAL(cli->outbuf,smb_com,SMBlockingX);
1994 SSVAL(cli->outbuf,smb_tid,cli->cnum);
1995 cli_setup_packet(cli);
1997 SCVAL(cli->outbuf,smb_vwv0,0xFF);
1998 SSVAL(cli->outbuf,smb_vwv2,fnum);
1999 SCVAL(cli->outbuf,smb_vwv3,LOCKING_ANDX_LARGE_FILES);
2000 SIVALS(cli->outbuf, smb_vwv4, 0);
2001 SSVAL(cli->outbuf,smb_vwv6,1);
2002 SSVAL(cli->outbuf,smb_vwv7,0);
2004 p = smb_buf(cli->outbuf);
2005 SIVAL(p, 0, cli->pid);
2006 SOFF_T_R(p, 4, offset);
2007 SOFF_T_R(p, 12, len);
2009 cli_setup_bcc(cli, p);
2011 if (!cli_receive_smb(cli)) {
2015 if (cli_is_error(cli)) {
2022 /****************************************************************************
2023 Get/unlock a POSIX lock on a file - internal function.
2024 ****************************************************************************/
2026 static bool cli_posix_lock_internal(struct cli_state *cli, int fnum,
2027 uint64_t offset, uint64_t len, bool wait_lock, enum brl_type lock_type)
2029 unsigned int param_len = 4;
2030 unsigned int data_len = POSIX_LOCK_DATA_SIZE;
2031 uint16_t setup = TRANSACT2_SETFILEINFO;
2033 unsigned char data[POSIX_LOCK_DATA_SIZE];
2034 char *rparam=NULL, *rdata=NULL;
2035 int saved_timeout = cli->timeout;
2037 SSVAL(param,0,fnum);
2038 SSVAL(param,2,SMB_SET_POSIX_LOCK);
2040 switch (lock_type) {
2042 SSVAL(data, POSIX_LOCK_TYPE_OFFSET, POSIX_LOCK_TYPE_READ);
2045 SSVAL(data, POSIX_LOCK_TYPE_OFFSET, POSIX_LOCK_TYPE_WRITE);
2048 SSVAL(data, POSIX_LOCK_TYPE_OFFSET, POSIX_LOCK_TYPE_UNLOCK);
2055 SSVAL(data, POSIX_LOCK_FLAGS_OFFSET, POSIX_LOCK_FLAG_WAIT);
2056 cli->timeout = 0x7FFFFFFF;
2058 SSVAL(data, POSIX_LOCK_FLAGS_OFFSET, POSIX_LOCK_FLAG_NOWAIT);
2061 SIVAL(data, POSIX_LOCK_PID_OFFSET, cli->pid);
2062 SOFF_T(data, POSIX_LOCK_START_OFFSET, offset);
2063 SOFF_T(data, POSIX_LOCK_LEN_OFFSET, len);
2065 if (!cli_send_trans(cli, SMBtrans2,
2067 -1, 0, /* fid, flags */
2068 &setup, 1, 0, /* setup, length, max */
2069 param, param_len, 2, /* param, length, max */
2070 (char *)&data, data_len, cli->max_xmit /* data, length, max */
2072 cli->timeout = saved_timeout;
2076 if (!cli_receive_trans(cli, SMBtrans2,
2077 &rparam, ¶m_len,
2078 &rdata, &data_len)) {
2079 cli->timeout = saved_timeout;
2085 cli->timeout = saved_timeout;
2093 /****************************************************************************
2095 ****************************************************************************/
2097 bool cli_posix_lock(struct cli_state *cli, int fnum,
2098 uint64_t offset, uint64_t len,
2099 bool wait_lock, enum brl_type lock_type)
2101 if (lock_type != READ_LOCK && lock_type != WRITE_LOCK) {
2104 return cli_posix_lock_internal(cli, fnum, offset, len, wait_lock, lock_type);
2107 /****************************************************************************
2108 POSIX Unlock a file.
2109 ****************************************************************************/
2111 bool cli_posix_unlock(struct cli_state *cli, int fnum, uint64_t offset, uint64_t len)
2113 return cli_posix_lock_internal(cli, fnum, offset, len, False, UNLOCK_LOCK);
2116 /****************************************************************************
2117 POSIX Get any lock covering a file.
2118 ****************************************************************************/
2120 bool cli_posix_getlock(struct cli_state *cli, int fnum, uint64_t *poffset, uint64_t *plen)
2125 /****************************************************************************
2126 Do a SMBgetattrE call.
2127 ****************************************************************************/
2129 bool cli_getattrE(struct cli_state *cli, int fd,
2130 uint16_t *attr, SMB_OFF_T *size,
2131 time_t *change_time,
2132 time_t *access_time,
2135 memset(cli->outbuf,'\0',smb_size);
2136 memset(cli->inbuf,'\0',smb_size);
2138 cli_set_message(cli->outbuf,1,0,True);
2140 SCVAL(cli->outbuf,smb_com,SMBgetattrE);
2141 SSVAL(cli->outbuf,smb_tid,cli->cnum);
2142 cli_setup_packet(cli);
2144 SSVAL(cli->outbuf,smb_vwv0,fd);
2147 if (!cli_receive_smb(cli)) {
2151 if (cli_is_error(cli)) {
2156 *size = IVAL(cli->inbuf, smb_vwv6);
2160 *attr = SVAL(cli->inbuf,smb_vwv10);
2164 *change_time = cli_make_unix_date2(cli, cli->inbuf+smb_vwv0);
2168 *access_time = cli_make_unix_date2(cli, cli->inbuf+smb_vwv2);
2172 *write_time = cli_make_unix_date2(cli, cli->inbuf+smb_vwv4);
2178 /****************************************************************************
2180 ****************************************************************************/
2182 bool cli_getatr(struct cli_state *cli, const char *fname,
2183 uint16_t *attr, SMB_OFF_T *size, time_t *write_time)
2187 memset(cli->outbuf,'\0',smb_size);
2188 memset(cli->inbuf,'\0',smb_size);
2190 cli_set_message(cli->outbuf,0,0,True);
2192 SCVAL(cli->outbuf,smb_com,SMBgetatr);
2193 SSVAL(cli->outbuf,smb_tid,cli->cnum);
2194 cli_setup_packet(cli);
2196 p = smb_buf(cli->outbuf);
2198 p += clistr_push(cli, p, fname,
2199 cli->bufsize - PTR_DIFF(p,cli->outbuf), STR_TERMINATE);
2201 cli_setup_bcc(cli, p);
2204 if (!cli_receive_smb(cli)) {
2208 if (cli_is_error(cli)) {
2213 *size = IVAL(cli->inbuf, smb_vwv3);
2217 *write_time = cli_make_unix_date3(cli, cli->inbuf+smb_vwv1);
2221 *attr = SVAL(cli->inbuf,smb_vwv0);
2227 /****************************************************************************
2228 Do a SMBsetattrE call.
2229 ****************************************************************************/
2231 bool cli_setattrE(struct cli_state *cli, int fd,
2239 memset(cli->outbuf,'\0',smb_size);
2240 memset(cli->inbuf,'\0',smb_size);
2242 cli_set_message(cli->outbuf,7,0,True);
2244 SCVAL(cli->outbuf,smb_com,SMBsetattrE);
2245 SSVAL(cli->outbuf,smb_tid,cli->cnum);
2246 cli_setup_packet(cli);
2248 SSVAL(cli->outbuf,smb_vwv0, fd);
2249 cli_put_dos_date2(cli, cli->outbuf,smb_vwv1, change_time);
2250 cli_put_dos_date2(cli, cli->outbuf,smb_vwv3, access_time);
2251 cli_put_dos_date2(cli, cli->outbuf,smb_vwv5, write_time);
2253 p = smb_buf(cli->outbuf);
2256 cli_setup_bcc(cli, p);
2259 if (!cli_receive_smb(cli)) {
2263 if (cli_is_error(cli)) {
2270 /****************************************************************************
2271 Do a SMBsetatr call.
2272 ****************************************************************************/
2274 bool cli_setatr(struct cli_state *cli, const char *fname, uint16_t attr, time_t t)
2278 memset(cli->outbuf,'\0',smb_size);
2279 memset(cli->inbuf,'\0',smb_size);
2281 cli_set_message(cli->outbuf,8,0,True);
2283 SCVAL(cli->outbuf,smb_com,SMBsetatr);
2284 SSVAL(cli->outbuf,smb_tid,cli->cnum);
2285 cli_setup_packet(cli);
2287 SSVAL(cli->outbuf,smb_vwv0, attr);
2288 cli_put_dos_date3(cli, cli->outbuf,smb_vwv1, t);
2290 p = smb_buf(cli->outbuf);
2292 p += clistr_push(cli, p, fname,
2293 cli->bufsize - PTR_DIFF(p,cli->outbuf), STR_TERMINATE);
2296 cli_setup_bcc(cli, p);
2299 if (!cli_receive_smb(cli)) {
2303 if (cli_is_error(cli)) {
2310 /****************************************************************************
2311 Check for existance of a dir.
2312 ****************************************************************************/
2314 static void cli_chkpath_done(struct tevent_req *subreq);
2316 struct cli_chkpath_state {
2320 struct tevent_req *cli_chkpath_send(TALLOC_CTX *mem_ctx,
2321 struct event_context *ev,
2322 struct cli_state *cli,
2325 struct tevent_req *req = NULL, *subreq = NULL;
2326 struct cli_chkpath_state *state = NULL;
2327 uint8_t additional_flags = 0;
2328 uint8_t *bytes = NULL;
2330 req = tevent_req_create(mem_ctx, &state, struct cli_chkpath_state);
2335 bytes = talloc_array(state, uint8_t, 1);
2336 if (tevent_req_nomem(bytes, req)) {
2337 return tevent_req_post(req, ev);
2340 bytes = smb_bytes_push_str(bytes, cli_ucs2(cli), fname,
2341 strlen(fname)+1, NULL);
2343 if (tevent_req_nomem(bytes, req)) {
2344 return tevent_req_post(req, ev);
2347 subreq = cli_smb_send(state, ev, cli, SMBcheckpath, additional_flags,
2348 0, NULL, talloc_get_size(bytes), bytes);
2349 if (tevent_req_nomem(subreq, req)) {
2350 return tevent_req_post(req, ev);
2352 tevent_req_set_callback(subreq, cli_chkpath_done, req);
2356 static void cli_chkpath_done(struct tevent_req *subreq)
2358 struct tevent_req *req = tevent_req_callback_data(
2359 subreq, struct tevent_req);
2362 status = cli_smb_recv(subreq, 0, NULL, NULL, NULL, NULL);
2363 TALLOC_FREE(subreq);
2364 if (!NT_STATUS_IS_OK(status)) {
2365 tevent_req_nterror(req, status);
2368 tevent_req_done(req);
2371 NTSTATUS cli_chkpath_recv(struct tevent_req *req)
2373 return tevent_req_simple_recv_ntstatus(req);
2376 NTSTATUS cli_chkpath(struct cli_state *cli, const char *path)
2378 TALLOC_CTX *frame = talloc_stackframe();
2379 struct event_context *ev = NULL;
2380 struct tevent_req *req = NULL;
2382 NTSTATUS status = NT_STATUS_OK;
2384 if (cli_has_async_calls(cli)) {
2386 * Can't use sync call while an async call is in flight
2388 status = NT_STATUS_INVALID_PARAMETER;
2392 path2 = talloc_strdup(frame, path);
2394 status = NT_STATUS_NO_MEMORY;
2397 trim_char(path2,'\0','\\');
2399 path2 = talloc_strdup(frame, "\\");
2401 status = NT_STATUS_NO_MEMORY;
2406 ev = event_context_init(frame);
2408 status = NT_STATUS_NO_MEMORY;
2412 req = cli_chkpath_send(frame, ev, cli, path2);
2414 status = NT_STATUS_NO_MEMORY;
2418 if (!tevent_req_poll(req, ev)) {
2419 status = map_nt_error_from_unix(errno);
2423 status = cli_chkpath_recv(req);
2427 if (!NT_STATUS_IS_OK(status)) {
2428 cli_set_error(cli, status);
2433 /****************************************************************************
2435 ****************************************************************************/
2437 static void cli_dskattr_done(struct tevent_req *subreq);
2439 struct cli_dskattr_state {
2445 struct tevent_req *cli_dskattr_send(TALLOC_CTX *mem_ctx,
2446 struct event_context *ev,
2447 struct cli_state *cli)
2449 struct tevent_req *req = NULL, *subreq = NULL;
2450 struct cli_dskattr_state *state = NULL;
2451 uint8_t additional_flags = 0;
2453 req = tevent_req_create(mem_ctx, &state, struct cli_dskattr_state);
2458 subreq = cli_smb_send(state, ev, cli, SMBdskattr, additional_flags,
2460 if (tevent_req_nomem(subreq, req)) {
2461 return tevent_req_post(req, ev);
2463 tevent_req_set_callback(subreq, cli_dskattr_done, req);
2467 static void cli_dskattr_done(struct tevent_req *subreq)
2469 struct tevent_req *req = tevent_req_callback_data(
2470 subreq, struct tevent_req);
2471 struct cli_dskattr_state *state = tevent_req_data(
2472 req, struct cli_dskattr_state);
2474 uint16_t *vwv = NULL;
2477 status = cli_smb_recv(subreq, 4, &wct, &vwv, NULL, NULL);
2478 if (!NT_STATUS_IS_OK(status)) {
2479 tevent_req_nterror(req, status);
2482 state->bsize = SVAL(vwv+1, 0)*SVAL(vwv+2,0);
2483 state->total = SVAL(vwv+0, 0);
2484 state->avail = SVAL(vwv+3, 0);
2485 TALLOC_FREE(subreq);
2486 tevent_req_done(req);
2489 NTSTATUS cli_dskattr_recv(struct tevent_req *req, int *bsize, int *total, int *avail)
2491 struct cli_dskattr_state *state = tevent_req_data(
2492 req, struct cli_dskattr_state);
2495 if (tevent_req_is_nterror(req, &status)) {
2498 *bsize = state->bsize;
2499 *total = state->total;
2500 *avail = state->avail;
2501 return NT_STATUS_OK;
2504 NTSTATUS cli_dskattr(struct cli_state *cli, int *bsize, int *total, int *avail)
2506 TALLOC_CTX *frame = talloc_stackframe();
2507 struct event_context *ev = NULL;
2508 struct tevent_req *req = NULL;
2509 NTSTATUS status = NT_STATUS_OK;
2511 if (cli_has_async_calls(cli)) {
2513 * Can't use sync call while an async call is in flight
2515 status = NT_STATUS_INVALID_PARAMETER;
2519 ev = event_context_init(frame);
2521 status = NT_STATUS_NO_MEMORY;
2525 req = cli_dskattr_send(frame, ev, cli);
2527 status = NT_STATUS_NO_MEMORY;
2531 if (!tevent_req_poll(req, ev)) {
2532 status = map_nt_error_from_unix(errno);
2536 status = cli_dskattr_recv(req, bsize, total, avail);
2540 if (!NT_STATUS_IS_OK(status)) {
2541 cli_set_error(cli, status);
2546 /****************************************************************************
2547 Create and open a temporary file.
2548 ****************************************************************************/
2550 int cli_ctemp(struct cli_state *cli, const char *path, char **tmp_path)
2555 memset(cli->outbuf,'\0',smb_size);
2556 memset(cli->inbuf,'\0',smb_size);
2558 cli_set_message(cli->outbuf,3,0,True);
2560 SCVAL(cli->outbuf,smb_com,SMBctemp);
2561 SSVAL(cli->outbuf,smb_tid,cli->cnum);
2562 cli_setup_packet(cli);
2564 SSVAL(cli->outbuf,smb_vwv0,0);
2565 SIVALS(cli->outbuf,smb_vwv1,-1);
2567 p = smb_buf(cli->outbuf);
2569 p += clistr_push(cli, p, path,
2570 cli->bufsize - PTR_DIFF(p,cli->outbuf), STR_TERMINATE);
2572 cli_setup_bcc(cli, p);
2575 if (!cli_receive_smb(cli)) {
2579 if (cli_is_error(cli)) {
2583 /* despite the spec, the result has a -1, followed by
2584 length, followed by name */
2585 p = smb_buf(cli->inbuf);
2587 len = smb_buflen(cli->inbuf) - 4;
2588 if (len <= 0 || len > PATH_MAX) return -1;
2591 char *path2 = SMB_MALLOC_ARRAY(char, len+1);
2595 clistr_pull(cli->inbuf, path2, p,
2596 len+1, len, STR_ASCII);
2600 return SVAL(cli->inbuf,smb_vwv0);
2604 send a raw ioctl - used by the torture code
2606 NTSTATUS cli_raw_ioctl(struct cli_state *cli, int fnum, uint32_t code, DATA_BLOB *blob)
2608 memset(cli->outbuf,'\0',smb_size);
2609 memset(cli->inbuf,'\0',smb_size);
2611 cli_set_message(cli->outbuf, 3, 0, True);
2612 SCVAL(cli->outbuf,smb_com,SMBioctl);
2613 cli_setup_packet(cli);
2615 SSVAL(cli->outbuf, smb_vwv0, fnum);
2616 SSVAL(cli->outbuf, smb_vwv1, code>>16);
2617 SSVAL(cli->outbuf, smb_vwv2, (code&0xFFFF));
2620 if (!cli_receive_smb(cli)) {
2621 return NT_STATUS_UNEXPECTED_NETWORK_ERROR;
2624 if (cli_is_error(cli)) {
2625 return cli_nt_error(cli);
2628 *blob = data_blob_null;
2630 return NT_STATUS_OK;
2633 /*********************************************************
2634 Set an extended attribute utility fn.
2635 *********************************************************/
2637 static bool cli_set_ea(struct cli_state *cli, uint16_t setup, char *param, unsigned int param_len,
2638 const char *ea_name, const char *ea_val, size_t ea_len)
2640 unsigned int data_len = 0;
2642 char *rparam=NULL, *rdata=NULL;
2644 size_t ea_namelen = strlen(ea_name);
2646 if (ea_namelen == 0 && ea_len == 0) {
2648 data = (char *)SMB_MALLOC(data_len);
2653 SIVAL(p,0,data_len);
2655 data_len = 4 + 4 + ea_namelen + 1 + ea_len;
2656 data = (char *)SMB_MALLOC(data_len);
2661 SIVAL(p,0,data_len);
2663 SCVAL(p, 0, 0); /* EA flags. */
2664 SCVAL(p, 1, ea_namelen);
2665 SSVAL(p, 2, ea_len);
2666 memcpy(p+4, ea_name, ea_namelen+1); /* Copy in the name. */
2667 memcpy(p+4+ea_namelen+1, ea_val, ea_len);
2670 if (!cli_send_trans(cli, SMBtrans2,
2672 -1, 0, /* fid, flags */
2673 &setup, 1, 0, /* setup, length, max */
2674 param, param_len, 2, /* param, length, max */
2675 data, data_len, cli->max_xmit /* data, length, max */
2681 if (!cli_receive_trans(cli, SMBtrans2,
2682 &rparam, ¶m_len,
2683 &rdata, &data_len)) {
2695 /*********************************************************
2696 Set an extended attribute on a pathname.
2697 *********************************************************/
2699 bool cli_set_ea_path(struct cli_state *cli, const char *path, const char *ea_name, const char *ea_val, size_t ea_len)
2701 uint16_t setup = TRANSACT2_SETPATHINFO;
2702 unsigned int param_len = 0;
2704 size_t srclen = 2*(strlen(path)+1);
2708 param = SMB_MALLOC_ARRAY(char, 6+srclen+2);
2712 memset(param, '\0', 6);
2713 SSVAL(param,0,SMB_INFO_SET_EA);
2716 p += clistr_push(cli, p, path, srclen, STR_TERMINATE);
2717 param_len = PTR_DIFF(p, param);
2719 ret = cli_set_ea(cli, setup, param, param_len, ea_name, ea_val, ea_len);
2724 /*********************************************************
2725 Set an extended attribute on an fnum.
2726 *********************************************************/
2728 bool cli_set_ea_fnum(struct cli_state *cli, int fnum, const char *ea_name, const char *ea_val, size_t ea_len)
2731 uint16_t setup = TRANSACT2_SETFILEINFO;
2733 memset(param, 0, 6);
2734 SSVAL(param,0,fnum);
2735 SSVAL(param,2,SMB_INFO_SET_EA);
2737 return cli_set_ea(cli, setup, param, 6, ea_name, ea_val, ea_len);
2740 /*********************************************************
2741 Get an extended attribute list utility fn.
2742 *********************************************************/
2744 static bool cli_get_ea_list(struct cli_state *cli,
2745 uint16_t setup, char *param, unsigned int param_len,
2748 struct ea_struct **pea_list)
2750 unsigned int data_len = 0;
2751 unsigned int rparam_len, rdata_len;
2752 char *rparam=NULL, *rdata=NULL;
2757 struct ea_struct *ea_list;
2764 if (!cli_send_trans(cli, SMBtrans2,
2766 -1, 0, /* fid, flags */
2767 &setup, 1, 0, /* setup, length, max */
2768 param, param_len, 10, /* param, length, max */
2769 NULL, data_len, cli->max_xmit /* data, length, max */
2774 if (!cli_receive_trans(cli, SMBtrans2,
2775 &rparam, &rparam_len,
2776 &rdata, &rdata_len)) {
2780 if (!rdata || rdata_len < 4) {
2784 ea_size = (size_t)IVAL(rdata,0);
2785 if (ea_size > rdata_len) {
2790 /* No EA's present. */
2798 /* Validate the EA list and count it. */
2799 for (num_eas = 0; ea_size >= 4; num_eas++) {
2800 unsigned int ea_namelen = CVAL(p,1);
2801 unsigned int ea_valuelen = SVAL(p,2);
2802 if (ea_namelen == 0) {
2805 if (4 + ea_namelen + 1 + ea_valuelen > ea_size) {
2808 ea_size -= 4 + ea_namelen + 1 + ea_valuelen;
2809 p += 4 + ea_namelen + 1 + ea_valuelen;
2817 *pnum_eas = num_eas;
2819 /* Caller only wants number of EA's. */
2824 ea_list = TALLOC_ARRAY(ctx, struct ea_struct, num_eas);
2829 ea_size = (size_t)IVAL(rdata,0);
2832 for (num_eas = 0; num_eas < *pnum_eas; num_eas++ ) {
2833 struct ea_struct *ea = &ea_list[num_eas];
2834 fstring unix_ea_name;
2835 unsigned int ea_namelen = CVAL(p,1);
2836 unsigned int ea_valuelen = SVAL(p,2);
2838 ea->flags = CVAL(p,0);
2839 unix_ea_name[0] = '\0';
2840 pull_ascii_fstring(unix_ea_name, p + 4);
2841 ea->name = talloc_strdup(ctx, unix_ea_name);
2842 /* Ensure the value is null terminated (in case it's a string). */
2843 ea->value = data_blob_talloc(ctx, NULL, ea_valuelen + 1);
2844 if (!ea->value.data) {
2848 memcpy(ea->value.data, p+4+ea_namelen+1, ea_valuelen);
2850 ea->value.data[ea_valuelen] = 0;
2852 p += 4 + ea_namelen + 1 + ea_valuelen;
2855 *pea_list = ea_list;
2865 /*********************************************************
2866 Get an extended attribute list from a pathname.
2867 *********************************************************/
2869 bool cli_get_ea_list_path(struct cli_state *cli, const char *path,
2872 struct ea_struct **pea_list)
2874 uint16_t setup = TRANSACT2_QPATHINFO;
2875 unsigned int param_len = 0;
2878 size_t srclen = 2*(strlen(path)+1);
2881 param = SMB_MALLOC_ARRAY(char, 6+srclen+2);
2887 SSVAL(p, 0, SMB_INFO_QUERY_ALL_EAS);
2889 p += clistr_push(cli, p, path, srclen, STR_TERMINATE);
2890 param_len = PTR_DIFF(p, param);
2892 ret = cli_get_ea_list(cli, setup, param, param_len, ctx, pnum_eas, pea_list);
2897 /*********************************************************
2898 Get an extended attribute list from an fnum.
2899 *********************************************************/
2901 bool cli_get_ea_list_fnum(struct cli_state *cli, int fnum,
2904 struct ea_struct **pea_list)
2906 uint16_t setup = TRANSACT2_QFILEINFO;
2909 memset(param, 0, 6);
2910 SSVAL(param,0,fnum);
2911 SSVAL(param,2,SMB_INFO_SET_EA);
2913 return cli_get_ea_list(cli, setup, param, 6, ctx, pnum_eas, pea_list);
2916 /****************************************************************************
2917 Convert open "flags" arg to uint32_t on wire.
2918 ****************************************************************************/
2920 static uint32_t open_flags_to_wire(int flags)
2922 int open_mode = flags & O_ACCMODE;
2925 switch (open_mode) {
2927 ret |= SMB_O_WRONLY;
2934 ret |= SMB_O_RDONLY;
2938 if (flags & O_CREAT) {
2941 if (flags & O_EXCL) {
2944 if (flags & O_TRUNC) {
2948 if (flags & O_SYNC) {
2952 if (flags & O_APPEND) {
2953 ret |= SMB_O_APPEND;
2955 #if defined(O_DIRECT)
2956 if (flags & O_DIRECT) {
2957 ret |= SMB_O_DIRECT;
2960 #if defined(O_DIRECTORY)
2961 if (flags & O_DIRECTORY) {
2962 ret &= ~(SMB_O_RDONLY|SMB_O_RDWR|SMB_O_WRONLY);
2963 ret |= SMB_O_DIRECTORY;
2969 /****************************************************************************
2970 Open a file - POSIX semantics. Returns fnum. Doesn't request oplock.
2971 ****************************************************************************/
2973 static int cli_posix_open_internal(struct cli_state *cli, const char *fname, int flags, mode_t mode, bool is_dir)
2975 unsigned int data_len = 0;
2976 unsigned int param_len = 0;
2977 uint16_t setup = TRANSACT2_SETPATHINFO;
2980 char *rparam=NULL, *rdata=NULL;
2983 uint32_t wire_flags = open_flags_to_wire(flags);
2984 size_t srclen = 2*(strlen(fname)+1);
2986 param = SMB_MALLOC_ARRAY(char, 6+srclen+2);
2990 memset(param, '\0', 6);
2991 SSVAL(param,0, SMB_POSIX_PATH_OPEN);
2994 p += clistr_push(cli, p, fname, srclen, STR_TERMINATE);
2995 param_len = PTR_DIFF(p, param);
2998 wire_flags &= ~(SMB_O_RDONLY|SMB_O_RDWR|SMB_O_WRONLY);
2999 wire_flags |= SMB_O_DIRECTORY;
3003 SIVAL(p,0,0); /* No oplock. */
3004 SIVAL(p,4,wire_flags);
3005 SIVAL(p,8,unix_perms_to_wire(mode));
3006 SIVAL(p,12,0); /* Top bits of perms currently undefined. */
3007 SSVAL(p,16,SMB_NO_INFO_LEVEL_RETURNED); /* No info level returned. */
3011 if (!cli_send_trans(cli, SMBtrans2,
3013 -1, 0, /* fid, flags */
3014 &setup, 1, 0, /* setup, length, max */
3015 param, param_len, 2, /* param, length, max */
3016 (char *)&data, data_len, cli->max_xmit /* data, length, max */
3024 if (!cli_receive_trans(cli, SMBtrans2,
3025 &rparam, ¶m_len,
3026 &rdata, &data_len)) {
3030 fnum = SVAL(rdata,2);
3038 /****************************************************************************
3039 open - POSIX semantics.
3040 ****************************************************************************/
3042 int cli_posix_open(struct cli_state *cli, const char *fname, int flags, mode_t mode)
3044 return cli_posix_open_internal(cli, fname, flags, mode, False);
3047 /****************************************************************************
3048 mkdir - POSIX semantics.
3049 ****************************************************************************/
3051 int cli_posix_mkdir(struct cli_state *cli, const char *fname, mode_t mode)
3053 return (cli_posix_open_internal(cli, fname, O_CREAT, mode, True) == -1) ? -1 : 0;
3056 /****************************************************************************
3057 unlink or rmdir - POSIX semantics.
3058 ****************************************************************************/
3060 struct unlink_state {
3064 static void cli_posix_unlink_internal_done(struct tevent_req *subreq)
3066 struct tevent_req *req = tevent_req_callback_data(
3067 subreq, struct tevent_req);
3068 struct unlink_state *state = tevent_req_data(req, struct unlink_state);
3071 status = cli_trans_recv(subreq, state, NULL, NULL, NULL, NULL, NULL, NULL);
3072 TALLOC_FREE(subreq);
3073 if (!NT_STATUS_IS_OK(status)) {
3074 tevent_req_nterror(req, status);
3077 tevent_req_done(req);
3080 static struct tevent_req *cli_posix_unlink_internal_send(TALLOC_CTX *mem_ctx,
3081 struct event_context *ev,
3082 struct cli_state *cli,
3086 struct tevent_req *req = NULL, *subreq = NULL;
3087 struct unlink_state *state = NULL;
3089 uint8_t *param = NULL;
3092 req = tevent_req_create(mem_ctx, &state, struct unlink_state);
3097 /* Setup setup word. */
3098 SSVAL(&setup+0, 0, TRANSACT2_SETPATHINFO);
3100 /* Setup param array. */
3101 param = talloc_array(state, uint8_t, 6);
3102 if (tevent_req_nomem(data, req)) {
3103 return tevent_req_post(req, ev);
3105 memset(param, '\0', 6);
3106 SSVAL(param, 0, SMB_POSIX_PATH_UNLINK);
3108 param = smb_bytes_push_str(param, cli_ucs2(cli), fname,
3109 strlen(fname)+1, NULL);
3111 if (tevent_req_nomem(param, req)) {
3112 return tevent_req_post(req, ev);
3115 /* Setup data word. */
3116 SSVAL(data, 0, is_dir ? SMB_POSIX_UNLINK_DIRECTORY_TARGET :
3117 SMB_POSIX_UNLINK_FILE_TARGET);
3119 subreq = cli_trans_send(state, /* mem ctx. */
3120 ev, /* event ctx. */
3121 cli, /* cli_state. */
3122 SMBtrans2, /* cmd. */
3123 NULL, /* pipe name. */
3127 &setup, /* setup. */
3131 talloc_get_size(param), /* num param. */
3137 if (tevent_req_nomem(subreq, req)) {
3138 return tevent_req_post(req, ev);
3140 tevent_req_set_callback(subreq, cli_posix_unlink_internal_done, req);
3144 struct tevent_req *cli_posix_unlink_send(TALLOC_CTX *mem_ctx,
3145 struct event_context *ev,
3146 struct cli_state *cli,
3149 return cli_posix_unlink_internal_send(mem_ctx, ev, cli, fname, false);
3152 NTSTATUS cli_posix_unlink_recv(struct tevent_req *req, TALLOC_CTX *mem_ctx)
3156 if (tevent_req_is_nterror(req, &status)) {
3159 return NT_STATUS_OK;
3162 /****************************************************************************
3163 unlink - POSIX semantics.
3164 ****************************************************************************/
3166 NTSTATUS cli_posix_unlink(struct cli_state *cli, const char *fname)
3168 TALLOC_CTX *frame = talloc_stackframe();
3169 struct event_context *ev = NULL;
3170 struct tevent_req *req = NULL;
3171 NTSTATUS status = NT_STATUS_OK;
3173 if (cli_has_async_calls(cli)) {
3175 * Can't use sync call while an async call is in flight
3177 status = NT_STATUS_INVALID_PARAMETER;
3181 ev = event_context_init(frame);
3183 status = NT_STATUS_NO_MEMORY;
3187 req = cli_posix_unlink_send(frame,
3192 status = NT_STATUS_NO_MEMORY;
3196 if (!tevent_req_poll(req, ev)) {
3197 status = map_nt_error_from_unix(errno);
3201 status = cli_posix_unlink_recv(req, frame);
3205 if (!NT_STATUS_IS_OK(status)) {
3206 cli_set_error(cli, status);
3211 /****************************************************************************
3212 rmdir - POSIX semantics.
3213 ****************************************************************************/
3215 struct tevent_req *cli_posix_rmdir_send(TALLOC_CTX *mem_ctx,
3216 struct event_context *ev,
3217 struct cli_state *cli,
3220 return cli_posix_unlink_internal_send(mem_ctx, ev, cli, fname, true);
3223 NTSTATUS cli_posix_rmdir_recv(struct tevent_req *req, TALLOC_CTX *mem_ctx)
3227 if (tevent_req_is_nterror(req, &status)) {
3230 return NT_STATUS_OK;
3233 NTSTATUS cli_posix_rmdir(struct cli_state *cli, const char *fname)
3235 TALLOC_CTX *frame = talloc_stackframe();
3236 struct event_context *ev = NULL;
3237 struct tevent_req *req = NULL;
3238 NTSTATUS status = NT_STATUS_OK;
3240 if (cli_has_async_calls(cli)) {
3242 * Can't use sync call while an async call is in flight
3244 status = NT_STATUS_INVALID_PARAMETER;
3248 ev = event_context_init(frame);
3250 status = NT_STATUS_NO_MEMORY;
3254 req = cli_posix_rmdir_send(frame,
3259 status = NT_STATUS_NO_MEMORY;
3263 if (!tevent_req_poll(req, ev)) {
3264 status = map_nt_error_from_unix(errno);
3268 status = cli_posix_rmdir_recv(req, frame);
3272 if (!NT_STATUS_IS_OK(status)) {
3273 cli_set_error(cli, status);