Only call sendfile_short_read() if we need it.
[ira/wip.git] / source3 / smbd / reply.c
1 /*
2    Unix SMB/CIFS implementation.
3    Main SMB reply routines
4    Copyright (C) Andrew Tridgell 1992-1998
5    Copyright (C) Andrew Bartlett      2001
6    Copyright (C) Jeremy Allison 1992-2007.
7    Copyright (C) Volker Lendecke 2007
8
9    This program is free software; you can redistribute it and/or modify
10    it under the terms of the GNU General Public License as published by
11    the Free Software Foundation; either version 3 of the License, or
12    (at your option) any later version.
13
14    This program is distributed in the hope that it will be useful,
15    but WITHOUT ANY WARRANTY; without even the implied warranty of
16    MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
17    GNU General Public License for more details.
18
19    You should have received a copy of the GNU General Public License
20    along with this program.  If not, see <http://www.gnu.org/licenses/>.
21 */
22 /*
23    This file handles most of the reply_ calls that the server
24    makes to handle specific protocols
25 */
26
27 #include "includes.h"
28 #include "smbd/globals.h"
29
30 extern enum protocol_types Protocol;
31
32 /****************************************************************************
33  Ensure we check the path in *exactly* the same way as W2K for a findfirst/findnext
34  path or anything including wildcards.
35  We're assuming here that '/' is not the second byte in any multibyte char
36  set (a safe assumption). '\\' *may* be the second byte in a multibyte char
37  set.
38 ****************************************************************************/
39
40 /* Custom version for processing POSIX paths. */
41 #define IS_PATH_SEP(c,posix_only) ((c) == '/' || (!(posix_only) && (c) == '\\'))
42
43 static NTSTATUS check_path_syntax_internal(char *path,
44                                            bool posix_path,
45                                            bool *p_last_component_contains_wcard)
46 {
47         char *d = path;
48         const char *s = path;
49         NTSTATUS ret = NT_STATUS_OK;
50         bool start_of_name_component = True;
51         bool stream_started = false;
52
53         *p_last_component_contains_wcard = False;
54
55         while (*s) {
56                 if (stream_started) {
57                         switch (*s) {
58                         case '/':
59                         case '\\':
60                                 return NT_STATUS_OBJECT_NAME_INVALID;
61                         case ':':
62                                 if (s[1] == '\0') {
63                                         return NT_STATUS_OBJECT_NAME_INVALID;
64                                 }
65                                 if (strchr_m(&s[1], ':')) {
66                                         return NT_STATUS_OBJECT_NAME_INVALID;
67                                 }
68                                 if (StrCaseCmp(s, ":$DATA") != 0) {
69                                         return NT_STATUS_INVALID_PARAMETER;
70                                 }
71                                 break;
72                         }
73                 }
74
75                 if (!stream_started && *s == ':') {
76                         if (*p_last_component_contains_wcard) {
77                                 return NT_STATUS_OBJECT_NAME_INVALID;
78                         }
79                         /* stream names allow more characters than file names */
80                         stream_started = true;
81                         start_of_name_component = false;
82                         posix_path = true;
83
84                         if (s[1] == '\0') {
85                                 return NT_STATUS_OBJECT_NAME_INVALID;
86                         }
87                 }
88
89                 if (!stream_started && IS_PATH_SEP(*s,posix_path)) {
90                         /*
91                          * Safe to assume is not the second part of a mb char
92                          * as this is handled below.
93                          */
94                         /* Eat multiple '/' or '\\' */
95                         while (IS_PATH_SEP(*s,posix_path)) {
96                                 s++;
97                         }
98                         if ((d != path) && (*s != '\0')) {
99                                 /* We only care about non-leading or trailing '/' or '\\' */
100                                 *d++ = '/';
101                         }
102
103                         start_of_name_component = True;
104                         /* New component. */
105                         *p_last_component_contains_wcard = False;
106                         continue;
107                 }
108
109                 if (start_of_name_component) {
110                         if ((s[0] == '.') && (s[1] == '.') && (IS_PATH_SEP(s[2],posix_path) || s[2] == '\0')) {
111                                 /* Uh oh - "/../" or "\\..\\"  or "/..\0" or "\\..\0" ! */
112
113                                 /*
114                                  * No mb char starts with '.' so we're safe checking the directory separator here.
115                                  */
116
117                                 /* If  we just added a '/' - delete it */
118                                 if ((d > path) && (*(d-1) == '/')) {
119                                         *(d-1) = '\0';
120                                         d--;
121                                 }
122
123                                 /* Are we at the start ? Can't go back further if so. */
124                                 if (d <= path) {
125                                         ret = NT_STATUS_OBJECT_PATH_SYNTAX_BAD;
126                                         break;
127                                 }
128                                 /* Go back one level... */
129                                 /* We know this is safe as '/' cannot be part of a mb sequence. */
130                                 /* NOTE - if this assumption is invalid we are not in good shape... */
131                                 /* Decrement d first as d points to the *next* char to write into. */
132                                 for (d--; d > path; d--) {
133                                         if (*d == '/')
134                                                 break;
135                                 }
136                                 s += 2; /* Else go past the .. */
137                                 /* We're still at the start of a name component, just the previous one. */
138                                 continue;
139
140                         } else if ((s[0] == '.') && ((s[1] == '\0') || IS_PATH_SEP(s[1],posix_path))) {
141                                 if (posix_path) {
142                                         /* Eat the '.' */
143                                         s++;
144                                         continue;
145                                 }
146                         }
147
148                 }
149
150                 if (!(*s & 0x80)) {
151                         if (!posix_path) {
152                                 if (*s <= 0x1f || *s == '|') {
153                                         return NT_STATUS_OBJECT_NAME_INVALID;
154                                 }
155                                 switch (*s) {
156                                         case '*':
157                                         case '?':
158                                         case '<':
159                                         case '>':
160                                         case '"':
161                                                 *p_last_component_contains_wcard = True;
162                                                 break;
163                                         default:
164                                                 break;
165                                 }
166                         }
167                         *d++ = *s++;
168                 } else {
169                         size_t siz;
170                         /* Get the size of the next MB character. */
171                         next_codepoint(s,&siz);
172                         switch(siz) {
173                                 case 5:
174                                         *d++ = *s++;
175                                         /*fall through*/
176                                 case 4:
177                                         *d++ = *s++;
178                                         /*fall through*/
179                                 case 3:
180                                         *d++ = *s++;
181                                         /*fall through*/
182                                 case 2:
183                                         *d++ = *s++;
184                                         /*fall through*/
185                                 case 1:
186                                         *d++ = *s++;
187                                         break;
188                                 default:
189                                         DEBUG(0,("check_path_syntax_internal: character length assumptions invalid !\n"));
190                                         *d = '\0';
191                                         return NT_STATUS_INVALID_PARAMETER;
192                         }
193                 }
194                 start_of_name_component = False;
195         }
196
197         *d = '\0';
198
199         return ret;
200 }
201
202 /****************************************************************************
203  Ensure we check the path in *exactly* the same way as W2K for regular pathnames.
204  No wildcards allowed.
205 ****************************************************************************/
206
207 NTSTATUS check_path_syntax(char *path)
208 {
209         bool ignore;
210         return check_path_syntax_internal(path, False, &ignore);
211 }
212
213 /****************************************************************************
214  Ensure we check the path in *exactly* the same way as W2K for regular pathnames.
215  Wildcards allowed - p_contains_wcard returns true if the last component contained
216  a wildcard.
217 ****************************************************************************/
218
219 NTSTATUS check_path_syntax_wcard(char *path, bool *p_contains_wcard)
220 {
221         return check_path_syntax_internal(path, False, p_contains_wcard);
222 }
223
224 /****************************************************************************
225  Check the path for a POSIX client.
226  We're assuming here that '/' is not the second byte in any multibyte char
227  set (a safe assumption).
228 ****************************************************************************/
229
230 NTSTATUS check_path_syntax_posix(char *path)
231 {
232         bool ignore;
233         return check_path_syntax_internal(path, True, &ignore);
234 }
235
236 /****************************************************************************
237  Pull a string and check the path allowing a wilcard - provide for error return.
238 ****************************************************************************/
239
240 size_t srvstr_get_path_wcard(TALLOC_CTX *ctx,
241                         const char *base_ptr,
242                         uint16 smb_flags2,
243                         char **pp_dest,
244                         const char *src,
245                         size_t src_len,
246                         int flags,
247                         NTSTATUS *err,
248                         bool *contains_wcard)
249 {
250         size_t ret;
251
252         *pp_dest = NULL;
253
254         ret = srvstr_pull_talloc(ctx, base_ptr, smb_flags2, pp_dest, src,
255                                  src_len, flags);
256
257         if (!*pp_dest) {
258                 *err = NT_STATUS_INVALID_PARAMETER;
259                 return ret;
260         }
261
262         *contains_wcard = False;
263
264         if (smb_flags2 & FLAGS2_DFS_PATHNAMES) {
265                 /*
266                  * For a DFS path the function parse_dfs_path()
267                  * will do the path processing, just make a copy.
268                  */
269                 *err = NT_STATUS_OK;
270                 return ret;
271         }
272
273         if (lp_posix_pathnames()) {
274                 *err = check_path_syntax_posix(*pp_dest);
275         } else {
276                 *err = check_path_syntax_wcard(*pp_dest, contains_wcard);
277         }
278
279         return ret;
280 }
281
282 /****************************************************************************
283  Pull a string and check the path - provide for error return.
284 ****************************************************************************/
285
286 size_t srvstr_get_path(TALLOC_CTX *ctx,
287                         const char *base_ptr,
288                         uint16 smb_flags2,
289                         char **pp_dest,
290                         const char *src,
291                         size_t src_len,
292                         int flags,
293                         NTSTATUS *err)
294 {
295         bool ignore;
296         return srvstr_get_path_wcard(ctx, base_ptr, smb_flags2, pp_dest, src,
297                                      src_len, flags, err, &ignore);
298 }
299
300 size_t srvstr_get_path_req_wcard(TALLOC_CTX *mem_ctx, struct smb_request *req,
301                                  char **pp_dest, const char *src, int flags,
302                                  NTSTATUS *err, bool *contains_wcard)
303 {
304         return srvstr_get_path_wcard(mem_ctx, (char *)req->inbuf, req->flags2,
305                                      pp_dest, src, smbreq_bufrem(req, src),
306                                      flags, err, contains_wcard);
307 }
308
309 size_t srvstr_get_path_req(TALLOC_CTX *mem_ctx, struct smb_request *req,
310                            char **pp_dest, const char *src, int flags,
311                            NTSTATUS *err)
312 {
313         bool ignore;
314         return srvstr_get_path_req_wcard(mem_ctx, req, pp_dest, src,
315                                          flags, err, &ignore);
316 }
317
318 /****************************************************************************
319  Check if we have a correct fsp pointing to a file. Basic check for open fsp.
320 ****************************************************************************/
321
322 bool check_fsp_open(connection_struct *conn, struct smb_request *req,
323                     files_struct *fsp)
324 {
325         if (!(fsp) || !(conn)) {
326                 reply_nterror(req, NT_STATUS_INVALID_HANDLE);
327                 return False;
328         }
329         if (((conn) != (fsp)->conn) || req->vuid != (fsp)->vuid) {
330                 reply_nterror(req, NT_STATUS_INVALID_HANDLE);
331                 return False;
332         }
333         return True;
334 }
335
336 /****************************************************************************
337  Check if we have a correct fsp pointing to a file.
338 ****************************************************************************/
339
340 bool check_fsp(connection_struct *conn, struct smb_request *req,
341                files_struct *fsp)
342 {
343         if (!check_fsp_open(conn, req, fsp)) {
344                 return False;
345         }
346         if ((fsp)->is_directory) {
347                 reply_nterror(req, NT_STATUS_INVALID_DEVICE_REQUEST);
348                 return False;
349         }
350         if ((fsp)->fh->fd == -1) {
351                 reply_nterror(req, NT_STATUS_ACCESS_DENIED);
352                 return False;
353         }
354         (fsp)->num_smb_operations++;
355         return True;
356 }
357
358 /****************************************************************************
359  Check if we have a correct fsp pointing to a quota fake file. Replacement for
360  the CHECK_NTQUOTA_HANDLE_OK macro.
361 ****************************************************************************/
362
363 bool check_fsp_ntquota_handle(connection_struct *conn, struct smb_request *req,
364                               files_struct *fsp)
365 {
366         if (!check_fsp_open(conn, req, fsp)) {
367                 return false;
368         }
369
370         if (fsp->is_directory) {
371                 return false;
372         }
373
374         if (fsp->fake_file_handle == NULL) {
375                 return false;
376         }
377
378         if (fsp->fake_file_handle->type != FAKE_FILE_TYPE_QUOTA) {
379                 return false;
380         }
381
382         if (fsp->fake_file_handle->private_data == NULL) {
383                 return false;
384         }
385
386         return true;
387 }
388
389 /****************************************************************************
390  Check if we have a correct fsp. Replacement for the FSP_BELONGS_CONN macro
391 ****************************************************************************/
392
393 bool fsp_belongs_conn(connection_struct *conn, struct smb_request *req,
394                       files_struct *fsp)
395 {
396         if ((fsp) && (conn) && ((conn)==(fsp)->conn)
397             && (req->vuid == (fsp)->vuid)) {
398                 return True;
399         }
400
401         reply_nterror(req, NT_STATUS_INVALID_HANDLE);
402         return False;
403 }
404
405 /****************************************************************************
406  Reply to a (netbios-level) special message.
407 ****************************************************************************/
408
409 void reply_special(char *inbuf)
410 {
411         int msg_type = CVAL(inbuf,0);
412         int msg_flags = CVAL(inbuf,1);
413         fstring name1,name2;
414         char name_type = 0;
415
416         /*
417          * We only really use 4 bytes of the outbuf, but for the smb_setlen
418          * calculation & friends (srv_send_smb uses that) we need the full smb
419          * header.
420          */
421         char outbuf[smb_size];
422
423         *name1 = *name2 = 0;
424
425         memset(outbuf, '\0', sizeof(outbuf));
426
427         smb_setlen(outbuf,0);
428
429         switch (msg_type) {
430         case 0x81: /* session request */
431
432                 if (already_got_session) {
433                         exit_server_cleanly("multiple session request not permitted");
434                 }
435
436                 SCVAL(outbuf,0,0x82);
437                 SCVAL(outbuf,3,0);
438                 if (name_len(inbuf+4) > 50 || 
439                     name_len(inbuf+4 + name_len(inbuf + 4)) > 50) {
440                         DEBUG(0,("Invalid name length in session request\n"));
441                         return;
442                 }
443                 name_extract(inbuf,4,name1);
444                 name_type = name_extract(inbuf,4 + name_len(inbuf + 4),name2);
445                 DEBUG(2,("netbios connect: name1=%s name2=%s\n",
446                          name1,name2));      
447
448                 set_local_machine_name(name1, True);
449                 set_remote_machine_name(name2, True);
450
451                 DEBUG(2,("netbios connect: local=%s remote=%s, name type = %x\n",
452                          get_local_machine_name(), get_remote_machine_name(),
453                          name_type));
454
455                 if (name_type == 'R') {
456                         /* We are being asked for a pathworks session --- 
457                            no thanks! */
458                         SCVAL(outbuf, 0,0x83);
459                         break;
460                 }
461
462                 /* only add the client's machine name to the list
463                    of possibly valid usernames if we are operating
464                    in share mode security */
465                 if (lp_security() == SEC_SHARE) {
466                         add_session_user(get_remote_machine_name());
467                 }
468
469                 reload_services(True);
470                 reopen_logs();
471
472                 already_got_session = True;
473                 break;
474
475         case 0x89: /* session keepalive request 
476                       (some old clients produce this?) */
477                 SCVAL(outbuf,0,SMBkeepalive);
478                 SCVAL(outbuf,3,0);
479                 break;
480
481         case 0x82: /* positive session response */
482         case 0x83: /* negative session response */
483         case 0x84: /* retarget session response */
484                 DEBUG(0,("Unexpected session response\n"));
485                 break;
486
487         case SMBkeepalive: /* session keepalive */
488         default:
489                 return;
490         }
491
492         DEBUG(5,("init msg_type=0x%x msg_flags=0x%x\n",
493                     msg_type, msg_flags));
494
495         srv_send_smb(smbd_server_fd(), outbuf, false);
496         return;
497 }
498
499 /****************************************************************************
500  Reply to a tcon.
501  conn POINTER CAN BE NULL HERE !
502 ****************************************************************************/
503
504 void reply_tcon(struct smb_request *req)
505 {
506         connection_struct *conn = req->conn;
507         const char *service;
508         char *service_buf = NULL;
509         char *password = NULL;
510         char *dev = NULL;
511         int pwlen=0;
512         NTSTATUS nt_status;
513         const char *p;
514         DATA_BLOB password_blob;
515         TALLOC_CTX *ctx = talloc_tos();
516
517         START_PROFILE(SMBtcon);
518
519         if (req->buflen < 4) {
520                 reply_nterror(req, NT_STATUS_INVALID_PARAMETER);
521                 END_PROFILE(SMBtcon);
522                 return;
523         }
524
525         p = (const char *)req->buf + 1;
526         p += srvstr_pull_req_talloc(ctx, req, &service_buf, p, STR_TERMINATE);
527         p += 1;
528         pwlen = srvstr_pull_req_talloc(ctx, req, &password, p, STR_TERMINATE);
529         p += pwlen+1;
530         p += srvstr_pull_req_talloc(ctx, req, &dev, p, STR_TERMINATE);
531         p += 1;
532
533         if (service_buf == NULL || password == NULL || dev == NULL) {
534                 reply_nterror(req, NT_STATUS_INVALID_PARAMETER);
535                 END_PROFILE(SMBtcon);
536                 return;
537         }
538         p = strrchr_m(service_buf,'\\');
539         if (p) {
540                 service = p+1;
541         } else {
542                 service = service_buf;
543         }
544
545         password_blob = data_blob(password, pwlen+1);
546
547         conn = make_connection(service,password_blob,dev,req->vuid,&nt_status);
548         req->conn = conn;
549
550         data_blob_clear_free(&password_blob);
551
552         if (!conn) {
553                 reply_nterror(req, nt_status);
554                 END_PROFILE(SMBtcon);
555                 return;
556         }
557
558         reply_outbuf(req, 2, 0);
559         SSVAL(req->outbuf,smb_vwv0,max_recv);
560         SSVAL(req->outbuf,smb_vwv1,conn->cnum);
561         SSVAL(req->outbuf,smb_tid,conn->cnum);
562
563         DEBUG(3,("tcon service=%s cnum=%d\n",
564                  service, conn->cnum));
565
566         END_PROFILE(SMBtcon);
567         return;
568 }
569
570 /****************************************************************************
571  Reply to a tcon and X.
572  conn POINTER CAN BE NULL HERE !
573 ****************************************************************************/
574
575 void reply_tcon_and_X(struct smb_request *req)
576 {
577         connection_struct *conn = req->conn;
578         const char *service = NULL;
579         DATA_BLOB password;
580         TALLOC_CTX *ctx = talloc_tos();
581         /* what the cleint thinks the device is */
582         char *client_devicetype = NULL;
583         /* what the server tells the client the share represents */
584         const char *server_devicetype;
585         NTSTATUS nt_status;
586         int passlen;
587         char *path = NULL;
588         const char *p, *q;
589         uint16 tcon_flags;
590
591         START_PROFILE(SMBtconX);
592
593         if (req->wct < 4) {
594                 reply_nterror(req, NT_STATUS_INVALID_PARAMETER);
595                 END_PROFILE(SMBtconX);
596                 return;
597         }
598
599         passlen = SVAL(req->vwv+3, 0);
600         tcon_flags = SVAL(req->vwv+2, 0);
601
602         /* we might have to close an old one */
603         if ((tcon_flags & 0x1) && conn) {
604                 close_cnum(conn,req->vuid);
605                 req->conn = NULL;
606                 conn = NULL;
607         }
608
609         if ((passlen > MAX_PASS_LEN) || (passlen >= req->buflen)) {
610                 reply_doserror(req, ERRDOS, ERRbuftoosmall);
611                 END_PROFILE(SMBtconX);
612                 return;
613         }
614
615         if (global_encrypted_passwords_negotiated) {
616                 password = data_blob_talloc(talloc_tos(), req->buf, passlen);
617                 if (lp_security() == SEC_SHARE) {
618                         /*
619                          * Security = share always has a pad byte
620                          * after the password.
621                          */
622                         p = (const char *)req->buf + passlen + 1;
623                 } else {
624                         p = (const char *)req->buf + passlen;
625                 }
626         } else {
627                 password = data_blob_talloc(talloc_tos(), req->buf, passlen+1);
628                 /* Ensure correct termination */
629                 password.data[passlen]=0;
630                 p = (const char *)req->buf + passlen + 1;
631         }
632
633         p += srvstr_pull_req_talloc(ctx, req, &path, p, STR_TERMINATE);
634
635         if (path == NULL) {
636                 data_blob_clear_free(&password);
637                 reply_nterror(req, NT_STATUS_INVALID_PARAMETER);
638                 END_PROFILE(SMBtconX);
639                 return;
640         }
641
642         /*
643          * the service name can be either: \\server\share
644          * or share directly like on the DELL PowerVault 705
645          */
646         if (*path=='\\') {
647                 q = strchr_m(path+2,'\\');
648                 if (!q) {
649                         data_blob_clear_free(&password);
650                         reply_doserror(req, ERRDOS, ERRnosuchshare);
651                         END_PROFILE(SMBtconX);
652                         return;
653                 }
654                 service = q+1;
655         } else {
656                 service = path;
657         }
658
659         p += srvstr_pull_talloc(ctx, req->inbuf, req->flags2,
660                                 &client_devicetype, p,
661                                 MIN(6, smbreq_bufrem(req, p)), STR_ASCII);
662
663         if (client_devicetype == NULL) {
664                 data_blob_clear_free(&password);
665                 reply_nterror(req, NT_STATUS_INVALID_PARAMETER);
666                 END_PROFILE(SMBtconX);
667                 return;
668         }
669
670         DEBUG(4,("Client requested device type [%s] for share [%s]\n", client_devicetype, service));
671
672         conn = make_connection(service, password, client_devicetype,
673                                req->vuid, &nt_status);
674         req->conn =conn;
675
676         data_blob_clear_free(&password);
677
678         if (!conn) {
679                 reply_nterror(req, nt_status);
680                 END_PROFILE(SMBtconX);
681                 return;
682         }
683
684         if ( IS_IPC(conn) )
685                 server_devicetype = "IPC";
686         else if ( IS_PRINT(conn) )
687                 server_devicetype = "LPT1:";
688         else
689                 server_devicetype = "A:";
690
691         if (Protocol < PROTOCOL_NT1) {
692                 reply_outbuf(req, 2, 0);
693                 if (message_push_string(&req->outbuf, server_devicetype,
694                                         STR_TERMINATE|STR_ASCII) == -1) {
695                         reply_nterror(req, NT_STATUS_NO_MEMORY);
696                         END_PROFILE(SMBtconX);
697                         return;
698                 }
699         } else {
700                 /* NT sets the fstype of IPC$ to the null string */
701                 const char *fstype = IS_IPC(conn) ? "" : lp_fstype(SNUM(conn));
702
703                 if (tcon_flags & TCONX_FLAG_EXTENDED_RESPONSE) {
704                         /* Return permissions. */
705                         uint32 perm1 = 0;
706                         uint32 perm2 = 0;
707
708                         reply_outbuf(req, 7, 0);
709
710                         if (IS_IPC(conn)) {
711                                 perm1 = FILE_ALL_ACCESS;
712                                 perm2 = FILE_ALL_ACCESS;
713                         } else {
714                                 perm1 = CAN_WRITE(conn) ?
715                                                 SHARE_ALL_ACCESS :
716                                                 SHARE_READ_ONLY;
717                         }
718
719                         SIVAL(req->outbuf, smb_vwv3, perm1);
720                         SIVAL(req->outbuf, smb_vwv5, perm2);
721                 } else {
722                         reply_outbuf(req, 3, 0);
723                 }
724
725                 if ((message_push_string(&req->outbuf, server_devicetype,
726                                          STR_TERMINATE|STR_ASCII) == -1)
727                     || (message_push_string(&req->outbuf, fstype,
728                                             STR_TERMINATE) == -1)) {
729                         reply_nterror(req, NT_STATUS_NO_MEMORY);
730                         END_PROFILE(SMBtconX);
731                         return;
732                 }
733
734                 /* what does setting this bit do? It is set by NT4 and
735                    may affect the ability to autorun mounted cdroms */
736                 SSVAL(req->outbuf, smb_vwv2, SMB_SUPPORT_SEARCH_BITS|
737                       (lp_csc_policy(SNUM(conn)) << 2));
738
739                 if (lp_msdfs_root(SNUM(conn)) && lp_host_msdfs()) {
740                         DEBUG(2,("Serving %s as a Dfs root\n",
741                                  lp_servicename(SNUM(conn)) ));
742                         SSVAL(req->outbuf, smb_vwv2,
743                               SMB_SHARE_IN_DFS | SVAL(req->outbuf, smb_vwv2));
744                 }
745         }
746
747
748         DEBUG(3,("tconX service=%s \n",
749                  service));
750
751         /* set the incoming and outgoing tid to the just created one */
752         SSVAL(req->inbuf,smb_tid,conn->cnum);
753         SSVAL(req->outbuf,smb_tid,conn->cnum);
754
755         END_PROFILE(SMBtconX);
756
757         chain_reply(req);
758         return;
759 }
760
761 /****************************************************************************
762  Reply to an unknown type.
763 ****************************************************************************/
764
765 void reply_unknown_new(struct smb_request *req, uint8 type)
766 {
767         DEBUG(0, ("unknown command type (%s): type=%d (0x%X)\n",
768                   smb_fn_name(type), type, type));
769         reply_doserror(req, ERRSRV, ERRunknownsmb);
770         return;
771 }
772
773 /****************************************************************************
774  Reply to an ioctl.
775  conn POINTER CAN BE NULL HERE !
776 ****************************************************************************/
777
778 void reply_ioctl(struct smb_request *req)
779 {
780         connection_struct *conn = req->conn;
781         uint16 device;
782         uint16 function;
783         uint32 ioctl_code;
784         int replysize;
785         char *p;
786
787         START_PROFILE(SMBioctl);
788
789         if (req->wct < 3) {
790                 reply_nterror(req, NT_STATUS_INVALID_PARAMETER);
791                 END_PROFILE(SMBioctl);
792                 return;
793         }
794
795         device     = SVAL(req->vwv+1, 0);
796         function   = SVAL(req->vwv+2, 0);
797         ioctl_code = (device << 16) + function;
798
799         DEBUG(4, ("Received IOCTL (code 0x%x)\n", ioctl_code));
800
801         switch (ioctl_code) {
802             case IOCTL_QUERY_JOB_INFO:
803                     replysize = 32;
804                     break;
805             default:
806                     reply_doserror(req, ERRSRV, ERRnosupport);
807                     END_PROFILE(SMBioctl);
808                     return;
809         }
810
811         reply_outbuf(req, 8, replysize+1);
812         SSVAL(req->outbuf,smb_vwv1,replysize); /* Total data bytes returned */
813         SSVAL(req->outbuf,smb_vwv5,replysize); /* Data bytes this buffer */
814         SSVAL(req->outbuf,smb_vwv6,52);        /* Offset to data */
815         p = smb_buf(req->outbuf);
816         memset(p, '\0', replysize+1); /* valgrind-safe. */
817         p += 1;          /* Allow for alignment */
818
819         switch (ioctl_code) {
820                 case IOCTL_QUERY_JOB_INFO:                  
821                 {
822                         files_struct *fsp = file_fsp(
823                                 req, SVAL(req->vwv+0, 0));
824                         if (!fsp) {
825                                 reply_doserror(req, ERRDOS, ERRbadfid);
826                                 END_PROFILE(SMBioctl);
827                                 return;
828                         }
829                         SSVAL(p,0,fsp->rap_print_jobid);             /* Job number */
830                         srvstr_push((char *)req->outbuf, req->flags2, p+2,
831                                     global_myname(), 15,
832                                     STR_TERMINATE|STR_ASCII);
833                         if (conn) {
834                                 srvstr_push((char *)req->outbuf, req->flags2,
835                                             p+18, lp_servicename(SNUM(conn)),
836                                             13, STR_TERMINATE|STR_ASCII);
837                         } else {
838                                 memset(p+18, 0, 13);
839                         }
840                         break;
841                 }
842         }
843
844         END_PROFILE(SMBioctl);
845         return;
846 }
847
848 /****************************************************************************
849  Strange checkpath NTSTATUS mapping.
850 ****************************************************************************/
851
852 static NTSTATUS map_checkpath_error(uint16_t flags2, NTSTATUS status)
853 {
854         /* Strange DOS error code semantics only for checkpath... */
855         if (!(flags2 & FLAGS2_32_BIT_ERROR_CODES)) {
856                 if (NT_STATUS_EQUAL(NT_STATUS_OBJECT_NAME_INVALID,status)) {
857                         /* We need to map to ERRbadpath */
858                         return NT_STATUS_OBJECT_PATH_NOT_FOUND;
859                 }
860         }
861         return status;
862 }
863
864 /****************************************************************************
865  Reply to a checkpath.
866 ****************************************************************************/
867
868 void reply_checkpath(struct smb_request *req)
869 {
870         connection_struct *conn = req->conn;
871         char *name = NULL;
872         SMB_STRUCT_STAT sbuf;
873         NTSTATUS status;
874         TALLOC_CTX *ctx = talloc_tos();
875
876         START_PROFILE(SMBcheckpath);
877
878         srvstr_get_path_req(ctx, req, &name, (const char *)req->buf + 1,
879                             STR_TERMINATE, &status);
880
881         if (!NT_STATUS_IS_OK(status)) {
882                 status = map_checkpath_error(req->flags2, status);
883                 reply_nterror(req, status);
884                 END_PROFILE(SMBcheckpath);
885                 return;
886         }
887
888         status = resolve_dfspath(ctx, conn,
889                         req->flags2 & FLAGS2_DFS_PATHNAMES,
890                         name,
891                         &name);
892         if (!NT_STATUS_IS_OK(status)) {
893                 if (NT_STATUS_EQUAL(status,NT_STATUS_PATH_NOT_COVERED)) {
894                         reply_botherror(req, NT_STATUS_PATH_NOT_COVERED,
895                                         ERRSRV, ERRbadpath);
896                         END_PROFILE(SMBcheckpath);
897                         return;
898                 }
899                 goto path_err;
900         }
901
902         DEBUG(3,("reply_checkpath %s mode=%d\n", name, (int)SVAL(req->vwv+0, 0)));
903
904         status = unix_convert(ctx, conn, name, False, &name, NULL, &sbuf);
905         if (!NT_STATUS_IS_OK(status)) {
906                 goto path_err;
907         }
908
909         status = check_name(conn, name);
910         if (!NT_STATUS_IS_OK(status)) {
911                 DEBUG(3,("reply_checkpath: check_name of %s failed (%s)\n",name,nt_errstr(status)));
912                 goto path_err;
913         }
914
915         if (!VALID_STAT(sbuf) && (SMB_VFS_STAT(conn,name,&sbuf) != 0)) {
916                 DEBUG(3,("reply_checkpath: stat of %s failed (%s)\n",name,strerror(errno)));
917                 status = map_nt_error_from_unix(errno);
918                 goto path_err;
919         }
920
921         if (!S_ISDIR(sbuf.st_mode)) {
922                 reply_botherror(req, NT_STATUS_NOT_A_DIRECTORY,
923                                 ERRDOS, ERRbadpath);
924                 END_PROFILE(SMBcheckpath);
925                 return;
926         }
927
928         reply_outbuf(req, 0, 0);
929
930         END_PROFILE(SMBcheckpath);
931         return;
932
933   path_err:
934
935         END_PROFILE(SMBcheckpath);
936
937         /* We special case this - as when a Windows machine
938                 is parsing a path is steps through the components
939                 one at a time - if a component fails it expects
940                 ERRbadpath, not ERRbadfile.
941         */
942         status = map_checkpath_error(req->flags2, status);
943         if (NT_STATUS_EQUAL(status, NT_STATUS_OBJECT_NAME_NOT_FOUND)) {
944                 /*
945                  * Windows returns different error codes if
946                  * the parent directory is valid but not the
947                  * last component - it returns NT_STATUS_OBJECT_NAME_NOT_FOUND
948                  * for that case and NT_STATUS_OBJECT_PATH_NOT_FOUND
949                  * if the path is invalid.
950                  */
951                 reply_botherror(req, NT_STATUS_OBJECT_NAME_NOT_FOUND,
952                                 ERRDOS, ERRbadpath);
953                 return;
954         }
955
956         reply_nterror(req, status);
957 }
958
959 /****************************************************************************
960  Reply to a getatr.
961 ****************************************************************************/
962
963 void reply_getatr(struct smb_request *req)
964 {
965         connection_struct *conn = req->conn;
966         char *fname = NULL;
967         SMB_STRUCT_STAT sbuf;
968         int mode=0;
969         SMB_OFF_T size=0;
970         time_t mtime=0;
971         const char *p;
972         NTSTATUS status;
973         TALLOC_CTX *ctx = talloc_tos();
974
975         START_PROFILE(SMBgetatr);
976
977         p = (const char *)req->buf + 1;
978         p += srvstr_get_path_req(ctx, req, &fname, p, STR_TERMINATE, &status);
979         if (!NT_STATUS_IS_OK(status)) {
980                 reply_nterror(req, status);
981                 END_PROFILE(SMBgetatr);
982                 return;
983         }
984
985         status = resolve_dfspath(ctx, conn,
986                                 req->flags2 & FLAGS2_DFS_PATHNAMES,
987                                 fname,
988                                 &fname);
989         if (!NT_STATUS_IS_OK(status)) {
990                 if (NT_STATUS_EQUAL(status,NT_STATUS_PATH_NOT_COVERED)) {
991                         reply_botherror(req, NT_STATUS_PATH_NOT_COVERED,
992                                         ERRSRV, ERRbadpath);
993                         END_PROFILE(SMBgetatr);
994                         return;
995                 }
996                 reply_nterror(req, status);
997                 END_PROFILE(SMBgetatr);
998                 return;
999         }
1000
1001         /* dos smetimes asks for a stat of "" - it returns a "hidden directory"
1002                 under WfWg - weird! */
1003         if (*fname == '\0') {
1004                 mode = aHIDDEN | aDIR;
1005                 if (!CAN_WRITE(conn)) {
1006                         mode |= aRONLY;
1007                 }
1008                 size = 0;
1009                 mtime = 0;
1010         } else {
1011                 status = unix_convert(ctx, conn, fname, False, &fname, NULL,&sbuf);
1012                 if (!NT_STATUS_IS_OK(status)) {
1013                         reply_nterror(req, status);
1014                         END_PROFILE(SMBgetatr);
1015                         return;
1016                 }
1017                 status = check_name(conn, fname);
1018                 if (!NT_STATUS_IS_OK(status)) {
1019                         DEBUG(3,("reply_getatr: check_name of %s failed (%s)\n",fname,nt_errstr(status)));
1020                         reply_nterror(req, status);
1021                         END_PROFILE(SMBgetatr);
1022                         return;
1023                 }
1024                 if (!VALID_STAT(sbuf) && (SMB_VFS_STAT(conn,fname,&sbuf) != 0)) {
1025                         DEBUG(3,("reply_getatr: stat of %s failed (%s)\n",fname,strerror(errno)));
1026                         reply_unixerror(req, ERRDOS,ERRbadfile);
1027                         END_PROFILE(SMBgetatr);
1028                         return;
1029                 }
1030
1031                 mode = dos_mode(conn,fname,&sbuf);
1032                 size = sbuf.st_size;
1033                 mtime = sbuf.st_mtime;
1034                 if (mode & aDIR) {
1035                         size = 0;
1036                 }
1037         }
1038
1039         reply_outbuf(req, 10, 0);
1040
1041         SSVAL(req->outbuf,smb_vwv0,mode);
1042         if(lp_dos_filetime_resolution(SNUM(conn)) ) {
1043                 srv_put_dos_date3((char *)req->outbuf,smb_vwv1,mtime & ~1);
1044         } else {
1045                 srv_put_dos_date3((char *)req->outbuf,smb_vwv1,mtime);
1046         }
1047         SIVAL(req->outbuf,smb_vwv3,(uint32)size);
1048
1049         if (Protocol >= PROTOCOL_NT1) {
1050                 SSVAL(req->outbuf, smb_flg2,
1051                       SVAL(req->outbuf, smb_flg2) | FLAGS2_IS_LONG_NAME);
1052         }
1053
1054         DEBUG(3,("reply_getatr: name=%s mode=%d size=%u\n", fname, mode, (unsigned int)size ) );
1055
1056         END_PROFILE(SMBgetatr);
1057         return;
1058 }
1059
1060 /****************************************************************************
1061  Reply to a setatr.
1062 ****************************************************************************/
1063
1064 void reply_setatr(struct smb_request *req)
1065 {
1066         struct timespec ts[2];
1067         connection_struct *conn = req->conn;
1068         char *fname = NULL;
1069         int mode;
1070         time_t mtime;
1071         SMB_STRUCT_STAT sbuf;
1072         const char *p;
1073         NTSTATUS status;
1074         TALLOC_CTX *ctx = talloc_tos();
1075
1076         START_PROFILE(SMBsetatr);
1077
1078         ZERO_STRUCT(ts);
1079
1080         if (req->wct < 2) {
1081                 reply_nterror(req, NT_STATUS_INVALID_PARAMETER);
1082                 return;
1083         }
1084
1085         p = (const char *)req->buf + 1;
1086         p += srvstr_get_path_req(ctx, req, &fname, p, STR_TERMINATE, &status);
1087         if (!NT_STATUS_IS_OK(status)) {
1088                 reply_nterror(req, status);
1089                 END_PROFILE(SMBsetatr);
1090                 return;
1091         }
1092
1093         status = resolve_dfspath(ctx, conn,
1094                                 req->flags2 & FLAGS2_DFS_PATHNAMES,
1095                                 fname,
1096                                 &fname);
1097         if (!NT_STATUS_IS_OK(status)) {
1098                 if (NT_STATUS_EQUAL(status,NT_STATUS_PATH_NOT_COVERED)) {
1099                         reply_botherror(req, NT_STATUS_PATH_NOT_COVERED,
1100                                         ERRSRV, ERRbadpath);
1101                         END_PROFILE(SMBsetatr);
1102                         return;
1103                 }
1104                 reply_nterror(req, status);
1105                 END_PROFILE(SMBsetatr);
1106                 return;
1107         }
1108
1109         status = unix_convert(ctx, conn, fname, False, &fname, NULL, &sbuf);
1110         if (!NT_STATUS_IS_OK(status)) {
1111                 reply_nterror(req, status);
1112                 END_PROFILE(SMBsetatr);
1113                 return;
1114         }
1115
1116         status = check_name(conn, fname);
1117         if (!NT_STATUS_IS_OK(status)) {
1118                 reply_nterror(req, status);
1119                 END_PROFILE(SMBsetatr);
1120                 return;
1121         }
1122
1123         if (fname[0] == '.' && fname[1] == '\0') {
1124                 /*
1125                  * Not sure here is the right place to catch this
1126                  * condition. Might be moved to somewhere else later -- vl
1127                  */
1128                 reply_nterror(req, NT_STATUS_ACCESS_DENIED);
1129                 END_PROFILE(SMBsetatr);
1130                 return;
1131         }
1132
1133         mode = SVAL(req->vwv+0, 0);
1134         mtime = srv_make_unix_date3(req->vwv+1);
1135
1136         ts[1] = convert_time_t_to_timespec(mtime);
1137         status = smb_set_file_time(conn, NULL, fname,
1138                                    &sbuf, ts, true);
1139         if (!NT_STATUS_IS_OK(status)) {
1140                 reply_unixerror(req, ERRDOS, ERRnoaccess);
1141                 END_PROFILE(SMBsetatr);
1142                 return;
1143         }
1144
1145         if (mode != FILE_ATTRIBUTE_NORMAL) {
1146                 if (VALID_STAT_OF_DIR(sbuf))
1147                         mode |= aDIR;
1148                 else
1149                         mode &= ~aDIR;
1150
1151                 if (file_set_dosmode(conn,fname,mode,&sbuf,NULL,false) != 0) {
1152                         reply_unixerror(req, ERRDOS, ERRnoaccess);
1153                         END_PROFILE(SMBsetatr);
1154                         return;
1155                 }
1156         }
1157
1158         reply_outbuf(req, 0, 0);
1159
1160         DEBUG( 3, ( "setatr name=%s mode=%d\n", fname, mode ) );
1161
1162         END_PROFILE(SMBsetatr);
1163         return;
1164 }
1165
1166 /****************************************************************************
1167  Reply to a dskattr.
1168 ****************************************************************************/
1169
1170 void reply_dskattr(struct smb_request *req)
1171 {
1172         connection_struct *conn = req->conn;
1173         uint64_t dfree,dsize,bsize;
1174         START_PROFILE(SMBdskattr);
1175
1176         if (get_dfree_info(conn,".",True,&bsize,&dfree,&dsize) == (uint64_t)-1) {
1177                 reply_unixerror(req, ERRHRD, ERRgeneral);
1178                 END_PROFILE(SMBdskattr);
1179                 return;
1180         }
1181
1182         reply_outbuf(req, 5, 0);
1183
1184         if (Protocol <= PROTOCOL_LANMAN2) {
1185                 double total_space, free_space;
1186                 /* we need to scale this to a number that DOS6 can handle. We
1187                    use floating point so we can handle large drives on systems
1188                    that don't have 64 bit integers 
1189
1190                    we end up displaying a maximum of 2G to DOS systems
1191                 */
1192                 total_space = dsize * (double)bsize;
1193                 free_space = dfree * (double)bsize;
1194
1195                 dsize = (uint64_t)((total_space+63*512) / (64*512));
1196                 dfree = (uint64_t)((free_space+63*512) / (64*512));
1197
1198                 if (dsize > 0xFFFF) dsize = 0xFFFF;
1199                 if (dfree > 0xFFFF) dfree = 0xFFFF;
1200
1201                 SSVAL(req->outbuf,smb_vwv0,dsize);
1202                 SSVAL(req->outbuf,smb_vwv1,64); /* this must be 64 for dos systems */
1203                 SSVAL(req->outbuf,smb_vwv2,512); /* and this must be 512 */
1204                 SSVAL(req->outbuf,smb_vwv3,dfree);
1205         } else {
1206                 SSVAL(req->outbuf,smb_vwv0,dsize);
1207                 SSVAL(req->outbuf,smb_vwv1,bsize/512);
1208                 SSVAL(req->outbuf,smb_vwv2,512);
1209                 SSVAL(req->outbuf,smb_vwv3,dfree);
1210         }
1211
1212         DEBUG(3,("dskattr dfree=%d\n", (unsigned int)dfree));
1213
1214         END_PROFILE(SMBdskattr);
1215         return;
1216 }
1217
1218 /****************************************************************************
1219  Reply to a search.
1220  Can be called from SMBsearch, SMBffirst or SMBfunique.
1221 ****************************************************************************/
1222
1223 void reply_search(struct smb_request *req)
1224 {
1225         connection_struct *conn = req->conn;
1226         const char *mask = NULL;
1227         char *directory = NULL;
1228         char *fname = NULL;
1229         SMB_OFF_T size;
1230         uint32 mode;
1231         time_t date;
1232         uint32 dirtype;
1233         unsigned int numentries = 0;
1234         unsigned int maxentries = 0;
1235         bool finished = False;
1236         const char *p;
1237         int status_len;
1238         char *path = NULL;
1239         char status[21];
1240         int dptr_num= -1;
1241         bool check_descend = False;
1242         bool expect_close = False;
1243         NTSTATUS nt_status;
1244         bool mask_contains_wcard = False;
1245         bool allow_long_path_components = (req->flags2 & FLAGS2_LONG_PATH_COMPONENTS) ? True : False;
1246         TALLOC_CTX *ctx = talloc_tos();
1247         bool ask_sharemode = lp_parm_bool(SNUM(conn), "smbd", "search ask sharemode", true);
1248
1249         START_PROFILE(SMBsearch);
1250
1251         if (req->wct < 2) {
1252                 reply_nterror(req, NT_STATUS_INVALID_PARAMETER);
1253                 END_PROFILE(SMBsearch);
1254                 return;
1255         }
1256
1257         if (lp_posix_pathnames()) {
1258                 reply_unknown_new(req, req->cmd);
1259                 END_PROFILE(SMBsearch);
1260                 return;
1261         }
1262
1263         /* If we were called as SMBffirst then we must expect close. */
1264         if(req->cmd == SMBffirst) {
1265                 expect_close = True;
1266         }
1267
1268         reply_outbuf(req, 1, 3);
1269         maxentries = SVAL(req->vwv+0, 0);
1270         dirtype = SVAL(req->vwv+1, 0);
1271         p = (const char *)req->buf + 1;
1272         p += srvstr_get_path_req_wcard(ctx, req, &path, p, STR_TERMINATE,
1273                                        &nt_status, &mask_contains_wcard);
1274         if (!NT_STATUS_IS_OK(nt_status)) {
1275                 reply_nterror(req, nt_status);
1276                 END_PROFILE(SMBsearch);
1277                 return;
1278         }
1279
1280         nt_status = resolve_dfspath_wcard(ctx, conn,
1281                                           req->flags2 & FLAGS2_DFS_PATHNAMES,
1282                                           path,
1283                                           &path,
1284                                           &mask_contains_wcard);
1285         if (!NT_STATUS_IS_OK(nt_status)) {
1286                 if (NT_STATUS_EQUAL(nt_status,NT_STATUS_PATH_NOT_COVERED)) {
1287                         reply_botherror(req, NT_STATUS_PATH_NOT_COVERED,
1288                                         ERRSRV, ERRbadpath);
1289                         END_PROFILE(SMBsearch);
1290                         return;
1291                 }
1292                 reply_nterror(req, nt_status);
1293                 END_PROFILE(SMBsearch);
1294                 return;
1295         }
1296
1297         p++;
1298         status_len = SVAL(p, 0);
1299         p += 2;
1300
1301         /* dirtype &= ~aDIR; */
1302
1303         if (status_len == 0) {
1304                 SMB_STRUCT_STAT sbuf;
1305
1306                 nt_status = unix_convert(ctx, conn, path, True,
1307                                 &directory, NULL, &sbuf);
1308                 if (!NT_STATUS_IS_OK(nt_status)) {
1309                         reply_nterror(req, nt_status);
1310                         END_PROFILE(SMBsearch);
1311                         return;
1312                 }
1313
1314                 nt_status = check_name(conn, directory);
1315                 if (!NT_STATUS_IS_OK(nt_status)) {
1316                         reply_nterror(req, nt_status);
1317                         END_PROFILE(SMBsearch);
1318                         return;
1319                 }
1320
1321                 p = strrchr_m(directory,'/');
1322                 if ((p != NULL) && (*directory != '/')) {
1323                         mask = p + 1;
1324                         directory = talloc_strndup(ctx, directory,
1325                                                    PTR_DIFF(p, directory));
1326                 } else {
1327                         mask = directory;
1328                         directory = talloc_strdup(ctx,".");
1329                 }
1330
1331                 if (!directory) {
1332                         reply_nterror(req, NT_STATUS_NO_MEMORY);
1333                         END_PROFILE(SMBsearch);
1334                         return;
1335                 }
1336
1337                 memset((char *)status,'\0',21);
1338                 SCVAL(status,0,(dirtype & 0x1F));
1339
1340                 nt_status = dptr_create(conn,
1341                                         directory,
1342                                         True,
1343                                         expect_close,
1344                                         req->smbpid,
1345                                         mask,
1346                                         mask_contains_wcard,
1347                                         dirtype,
1348                                         &conn->dirptr);
1349                 if (!NT_STATUS_IS_OK(nt_status)) {
1350                         reply_nterror(req, nt_status);
1351                         END_PROFILE(SMBsearch);
1352                         return;
1353                 }
1354                 dptr_num = dptr_dnum(conn->dirptr);
1355         } else {
1356                 int status_dirtype;
1357
1358                 memcpy(status,p,21);
1359                 status_dirtype = CVAL(status,0) & 0x1F;
1360                 if (status_dirtype != (dirtype & 0x1F)) {
1361                         dirtype = status_dirtype;
1362                 }
1363
1364                 conn->dirptr = dptr_fetch(status+12,&dptr_num);
1365                 if (!conn->dirptr) {
1366                         goto SearchEmpty;
1367                 }
1368                 string_set(&conn->dirpath,dptr_path(dptr_num));
1369                 mask = dptr_wcard(dptr_num);
1370                 if (!mask) {
1371                         goto SearchEmpty;
1372                 }
1373                 /*
1374                  * For a 'continue' search we have no string. So
1375                  * check from the initial saved string.
1376                  */
1377                 mask_contains_wcard = ms_has_wild(mask);
1378                 dirtype = dptr_attr(dptr_num);
1379         }
1380
1381         DEBUG(4,("dptr_num is %d\n",dptr_num));
1382
1383         if ((dirtype&0x1F) == aVOLID) {
1384                 char buf[DIR_STRUCT_SIZE];
1385                 memcpy(buf,status,21);
1386                 if (!make_dir_struct(ctx,buf,"???????????",volume_label(SNUM(conn)),
1387                                 0,aVOLID,0,!allow_long_path_components)) {
1388                         reply_nterror(req, NT_STATUS_NO_MEMORY);
1389                         END_PROFILE(SMBsearch);
1390                         return;
1391                 }
1392                 dptr_fill(buf+12,dptr_num);
1393                 if (dptr_zero(buf+12) && (status_len==0)) {
1394                         numentries = 1;
1395                 } else {
1396                         numentries = 0;
1397                 }
1398                 if (message_push_blob(&req->outbuf,
1399                                       data_blob_const(buf, sizeof(buf)))
1400                     == -1) {
1401                         reply_nterror(req, NT_STATUS_NO_MEMORY);
1402                         END_PROFILE(SMBsearch);
1403                         return;
1404                 }
1405         } else {
1406                 unsigned int i;
1407                 maxentries = MIN(
1408                         maxentries,
1409                         ((BUFFER_SIZE -
1410                           ((uint8 *)smb_buf(req->outbuf) + 3 - req->outbuf))
1411                          /DIR_STRUCT_SIZE));
1412
1413                 DEBUG(8,("dirpath=<%s> dontdescend=<%s>\n",
1414                         conn->dirpath,lp_dontdescend(SNUM(conn))));
1415                 if (in_list(conn->dirpath, lp_dontdescend(SNUM(conn)),True)) {
1416                         check_descend = True;
1417                 }
1418
1419                 for (i=numentries;(i<maxentries) && !finished;i++) {
1420                         finished = !get_dir_entry(ctx,
1421                                                   conn,
1422                                                   mask,
1423                                                   dirtype,
1424                                                   &fname,
1425                                                   &size,
1426                                                   &mode,
1427                                                   &date,
1428                                                   check_descend,
1429                                                   ask_sharemode);
1430                         if (!finished) {
1431                                 char buf[DIR_STRUCT_SIZE];
1432                                 memcpy(buf,status,21);
1433                                 if (!make_dir_struct(ctx,
1434                                                 buf,
1435                                                 mask,
1436                                                 fname,
1437                                                 size,
1438                                                 mode,
1439                                                 date,
1440                                                 !allow_long_path_components)) {
1441                                         reply_nterror(req, NT_STATUS_NO_MEMORY);
1442                                         END_PROFILE(SMBsearch);
1443                                         return;
1444                                 }
1445                                 if (!dptr_fill(buf+12,dptr_num)) {
1446                                         break;
1447                                 }
1448                                 if (message_push_blob(&req->outbuf,
1449                                                       data_blob_const(buf, sizeof(buf)))
1450                                     == -1) {
1451                                         reply_nterror(req, NT_STATUS_NO_MEMORY);
1452                                         END_PROFILE(SMBsearch);
1453                                         return;
1454                                 }
1455                                 numentries++;
1456                         }
1457                 }
1458         }
1459
1460   SearchEmpty:
1461
1462         /* If we were called as SMBffirst with smb_search_id == NULL
1463                 and no entries were found then return error and close dirptr 
1464                 (X/Open spec) */
1465
1466         if (numentries == 0) {
1467                 dptr_close(&dptr_num);
1468         } else if(expect_close && status_len == 0) {
1469                 /* Close the dptr - we know it's gone */
1470                 dptr_close(&dptr_num);
1471         }
1472
1473         /* If we were called as SMBfunique, then we can close the dirptr now ! */
1474         if(dptr_num >= 0 && req->cmd == SMBfunique) {
1475                 dptr_close(&dptr_num);
1476         }
1477
1478         if ((numentries == 0) && !mask_contains_wcard) {
1479                 reply_botherror(req, STATUS_NO_MORE_FILES, ERRDOS, ERRnofiles);
1480                 END_PROFILE(SMBsearch);
1481                 return;
1482         }
1483
1484         SSVAL(req->outbuf,smb_vwv0,numentries);
1485         SSVAL(req->outbuf,smb_vwv1,3 + numentries * DIR_STRUCT_SIZE);
1486         SCVAL(smb_buf(req->outbuf),0,5);
1487         SSVAL(smb_buf(req->outbuf),1,numentries*DIR_STRUCT_SIZE);
1488
1489         /* The replies here are never long name. */
1490         SSVAL(req->outbuf, smb_flg2,
1491               SVAL(req->outbuf, smb_flg2) & (~FLAGS2_IS_LONG_NAME));
1492         if (!allow_long_path_components) {
1493                 SSVAL(req->outbuf, smb_flg2,
1494                       SVAL(req->outbuf, smb_flg2)
1495                       & (~FLAGS2_LONG_PATH_COMPONENTS));
1496         }
1497
1498         /* This SMB *always* returns ASCII names. Remove the unicode bit in flags2. */
1499         SSVAL(req->outbuf, smb_flg2,
1500               (SVAL(req->outbuf, smb_flg2) & (~FLAGS2_UNICODE_STRINGS)));
1501
1502         if (!directory) {
1503                 directory = dptr_path(dptr_num);
1504         }
1505
1506         DEBUG(4,("%s mask=%s path=%s dtype=%d nument=%u of %u\n",
1507                 smb_fn_name(req->cmd),
1508                 mask,
1509                 directory ? directory : "./",
1510                 dirtype,
1511                 numentries,
1512                 maxentries ));
1513
1514         END_PROFILE(SMBsearch);
1515         return;
1516 }
1517
1518 /****************************************************************************
1519  Reply to a fclose (stop directory search).
1520 ****************************************************************************/
1521
1522 void reply_fclose(struct smb_request *req)
1523 {
1524         int status_len;
1525         char status[21];
1526         int dptr_num= -2;
1527         const char *p;
1528         char *path = NULL;
1529         NTSTATUS err;
1530         bool path_contains_wcard = False;
1531         TALLOC_CTX *ctx = talloc_tos();
1532
1533         START_PROFILE(SMBfclose);
1534
1535         if (lp_posix_pathnames()) {
1536                 reply_unknown_new(req, req->cmd);
1537                 END_PROFILE(SMBfclose);
1538                 return;
1539         }
1540
1541         p = (const char *)req->buf + 1;
1542         p += srvstr_get_path_req_wcard(ctx, req, &path, p, STR_TERMINATE,
1543                                        &err, &path_contains_wcard);
1544         if (!NT_STATUS_IS_OK(err)) {
1545                 reply_nterror(req, err);
1546                 END_PROFILE(SMBfclose);
1547                 return;
1548         }
1549         p++;
1550         status_len = SVAL(p,0);
1551         p += 2;
1552
1553         if (status_len == 0) {
1554                 reply_doserror(req, ERRSRV, ERRsrverror);
1555                 END_PROFILE(SMBfclose);
1556                 return;
1557         }
1558
1559         memcpy(status,p,21);
1560
1561         if(dptr_fetch(status+12,&dptr_num)) {
1562                 /*  Close the dptr - we know it's gone */
1563                 dptr_close(&dptr_num);
1564         }
1565
1566         reply_outbuf(req, 1, 0);
1567         SSVAL(req->outbuf,smb_vwv0,0);
1568
1569         DEBUG(3,("search close\n"));
1570
1571         END_PROFILE(SMBfclose);
1572         return;
1573 }
1574
1575 /****************************************************************************
1576  Reply to an open.
1577 ****************************************************************************/
1578
1579 void reply_open(struct smb_request *req)
1580 {
1581         connection_struct *conn = req->conn;
1582         char *fname = NULL;
1583         uint32 fattr=0;
1584         SMB_OFF_T size = 0;
1585         time_t mtime=0;
1586         int info;
1587         SMB_STRUCT_STAT sbuf;
1588         files_struct *fsp;
1589         int oplock_request;
1590         int deny_mode;
1591         uint32 dos_attr;
1592         uint32 access_mask;
1593         uint32 share_mode;
1594         uint32 create_disposition;
1595         uint32 create_options = 0;
1596         NTSTATUS status;
1597         TALLOC_CTX *ctx = talloc_tos();
1598
1599         START_PROFILE(SMBopen);
1600
1601         if (req->wct < 2) {
1602                 reply_nterror(req, NT_STATUS_INVALID_PARAMETER);
1603                 END_PROFILE(SMBopen);
1604                 return;
1605         }
1606
1607         oplock_request = CORE_OPLOCK_REQUEST(req->inbuf);
1608         deny_mode = SVAL(req->vwv+0, 0);
1609         dos_attr = SVAL(req->vwv+1, 0);
1610
1611         srvstr_get_path_req(ctx, req, &fname, (const char *)req->buf+1,
1612                             STR_TERMINATE, &status);
1613         if (!NT_STATUS_IS_OK(status)) {
1614                 reply_nterror(req, status);
1615                 END_PROFILE(SMBopen);
1616                 return;
1617         }
1618
1619         if (!map_open_params_to_ntcreate(
1620                     fname, deny_mode, OPENX_FILE_EXISTS_OPEN, &access_mask,
1621                     &share_mode, &create_disposition, &create_options)) {
1622                 reply_nterror(req, NT_STATUS_DOS(ERRDOS, ERRbadaccess));
1623                 END_PROFILE(SMBopen);
1624                 return;
1625         }
1626
1627         status = SMB_VFS_CREATE_FILE(
1628                 conn,                                   /* conn */
1629                 req,                                    /* req */
1630                 0,                                      /* root_dir_fid */
1631                 fname,                                  /* fname */
1632                 CFF_DOS_PATH,                           /* create_file_flags */
1633                 access_mask,                            /* access_mask */
1634                 share_mode,                             /* share_access */
1635                 create_disposition,                     /* create_disposition*/
1636                 create_options,                         /* create_options */
1637                 dos_attr,                               /* file_attributes */
1638                 oplock_request,                         /* oplock_request */
1639                 0,                                      /* allocation_size */
1640                 NULL,                                   /* sd */
1641                 NULL,                                   /* ea_list */
1642                 &fsp,                                   /* result */
1643                 &info,                                  /* pinfo */
1644                 &sbuf);                                 /* psbuf */
1645
1646         if (!NT_STATUS_IS_OK(status)) {
1647                 if (open_was_deferred(req->mid)) {
1648                         /* We have re-scheduled this call. */
1649                         END_PROFILE(SMBopen);
1650                         return;
1651                 }
1652                 reply_openerror(req, status);
1653                 END_PROFILE(SMBopen);
1654                 return;
1655         }
1656
1657         size = sbuf.st_size;
1658         fattr = dos_mode(conn,fsp->fsp_name,&sbuf);
1659         mtime = sbuf.st_mtime;
1660
1661         if (fattr & aDIR) {
1662                 DEBUG(3,("attempt to open a directory %s\n",fsp->fsp_name));
1663                 close_file(req, fsp, ERROR_CLOSE);
1664                 reply_doserror(req, ERRDOS,ERRnoaccess);
1665                 END_PROFILE(SMBopen);
1666                 return;
1667         }
1668
1669         reply_outbuf(req, 7, 0);
1670         SSVAL(req->outbuf,smb_vwv0,fsp->fnum);
1671         SSVAL(req->outbuf,smb_vwv1,fattr);
1672         if(lp_dos_filetime_resolution(SNUM(conn)) ) {
1673                 srv_put_dos_date3((char *)req->outbuf,smb_vwv2,mtime & ~1);
1674         } else {
1675                 srv_put_dos_date3((char *)req->outbuf,smb_vwv2,mtime);
1676         }
1677         SIVAL(req->outbuf,smb_vwv4,(uint32)size);
1678         SSVAL(req->outbuf,smb_vwv6,deny_mode);
1679
1680         if (oplock_request && lp_fake_oplocks(SNUM(conn))) {
1681                 SCVAL(req->outbuf,smb_flg,
1682                       CVAL(req->outbuf,smb_flg)|CORE_OPLOCK_GRANTED);
1683         }
1684
1685         if(EXCLUSIVE_OPLOCK_TYPE(fsp->oplock_type)) {
1686                 SCVAL(req->outbuf,smb_flg,
1687                       CVAL(req->outbuf,smb_flg)|CORE_OPLOCK_GRANTED);
1688         }
1689         END_PROFILE(SMBopen);
1690         return;
1691 }
1692
1693 /****************************************************************************
1694  Reply to an open and X.
1695 ****************************************************************************/
1696
1697 void reply_open_and_X(struct smb_request *req)
1698 {
1699         connection_struct *conn = req->conn;
1700         char *fname = NULL;
1701         uint16 open_flags;
1702         int deny_mode;
1703         uint32 smb_attr;
1704         /* Breakout the oplock request bits so we can set the
1705                 reply bits separately. */
1706         int ex_oplock_request;
1707         int core_oplock_request;
1708         int oplock_request;
1709 #if 0
1710         int smb_sattr = SVAL(req->vwv+4, 0);
1711         uint32 smb_time = make_unix_date3(req->vwv+6);
1712 #endif
1713         int smb_ofun;
1714         uint32 fattr=0;
1715         int mtime=0;
1716         SMB_STRUCT_STAT sbuf;
1717         int smb_action = 0;
1718         files_struct *fsp;
1719         NTSTATUS status;
1720         uint64_t allocation_size;
1721         ssize_t retval = -1;
1722         uint32 access_mask;
1723         uint32 share_mode;
1724         uint32 create_disposition;
1725         uint32 create_options = 0;
1726         TALLOC_CTX *ctx = talloc_tos();
1727
1728         START_PROFILE(SMBopenX);
1729
1730         if (req->wct < 15) {
1731                 reply_nterror(req, NT_STATUS_INVALID_PARAMETER);
1732                 END_PROFILE(SMBopenX);
1733                 return;
1734         }
1735
1736         open_flags = SVAL(req->vwv+2, 0);
1737         deny_mode = SVAL(req->vwv+3, 0);
1738         smb_attr = SVAL(req->vwv+5, 0);
1739         ex_oplock_request = EXTENDED_OPLOCK_REQUEST(req->inbuf);
1740         core_oplock_request = CORE_OPLOCK_REQUEST(req->inbuf);
1741         oplock_request = ex_oplock_request | core_oplock_request;
1742         smb_ofun = SVAL(req->vwv+8, 0);
1743         allocation_size = (uint64_t)IVAL(req->vwv+9, 0);
1744
1745         /* If it's an IPC, pass off the pipe handler. */
1746         if (IS_IPC(conn)) {
1747                 if (lp_nt_pipe_support()) {
1748                         reply_open_pipe_and_X(conn, req);
1749                 } else {
1750                         reply_doserror(req, ERRSRV, ERRaccess);
1751                 }
1752                 END_PROFILE(SMBopenX);
1753                 return;
1754         }
1755
1756         /* XXXX we need to handle passed times, sattr and flags */
1757         srvstr_get_path_req(ctx, req, &fname, (const char *)req->buf,
1758                         STR_TERMINATE, &status);
1759         if (!NT_STATUS_IS_OK(status)) {
1760                 reply_nterror(req, status);
1761                 END_PROFILE(SMBopenX);
1762                 return;
1763         }
1764
1765         if (!map_open_params_to_ntcreate(
1766                     fname, deny_mode, smb_ofun, &access_mask,
1767                     &share_mode, &create_disposition, &create_options)) {
1768                 reply_nterror(req, NT_STATUS_DOS(ERRDOS, ERRbadaccess));
1769                 END_PROFILE(SMBopenX);
1770                 return;
1771         }
1772
1773         status = SMB_VFS_CREATE_FILE(
1774                 conn,                                   /* conn */
1775                 req,                                    /* req */
1776                 0,                                      /* root_dir_fid */
1777                 fname,                                  /* fname */
1778                 CFF_DOS_PATH,                           /* create_file_flags */
1779                 access_mask,                            /* access_mask */
1780                 share_mode,                             /* share_access */
1781                 create_disposition,                     /* create_disposition*/
1782                 create_options,                         /* create_options */
1783                 smb_attr,                               /* file_attributes */
1784                 oplock_request,                         /* oplock_request */
1785                 0,                                      /* allocation_size */
1786                 NULL,                                   /* sd */
1787                 NULL,                                   /* ea_list */
1788                 &fsp,                                   /* result */
1789                 &smb_action,                            /* pinfo */
1790                 &sbuf);                                 /* psbuf */
1791
1792         if (!NT_STATUS_IS_OK(status)) {
1793                 END_PROFILE(SMBopenX);
1794                 if (open_was_deferred(req->mid)) {
1795                         /* We have re-scheduled this call. */
1796                         return;
1797                 }
1798                 reply_openerror(req, status);
1799                 return;
1800         }
1801
1802         /* Setting the "size" field in vwv9 and vwv10 causes the file to be set to this size,
1803            if the file is truncated or created. */
1804         if (((smb_action == FILE_WAS_CREATED) || (smb_action == FILE_WAS_OVERWRITTEN)) && allocation_size) {
1805                 fsp->initial_allocation_size = smb_roundup(fsp->conn, allocation_size);
1806                 if (vfs_allocate_file_space(fsp, fsp->initial_allocation_size) == -1) {
1807                         close_file(req, fsp, ERROR_CLOSE);
1808                         reply_nterror(req, NT_STATUS_DISK_FULL);
1809                         END_PROFILE(SMBopenX);
1810                         return;
1811                 }
1812                 retval = vfs_set_filelen(fsp, (SMB_OFF_T)allocation_size);
1813                 if (retval < 0) {
1814                         close_file(req, fsp, ERROR_CLOSE);
1815                         reply_nterror(req, NT_STATUS_DISK_FULL);
1816                         END_PROFILE(SMBopenX);
1817                         return;
1818                 }
1819                 sbuf.st_size = get_allocation_size(conn,fsp,&sbuf);
1820         }
1821
1822         fattr = dos_mode(conn,fsp->fsp_name,&sbuf);
1823         mtime = sbuf.st_mtime;
1824         if (fattr & aDIR) {
1825                 close_file(req, fsp, ERROR_CLOSE);
1826                 reply_doserror(req, ERRDOS, ERRnoaccess);
1827                 END_PROFILE(SMBopenX);
1828                 return;
1829         }
1830
1831         /* If the caller set the extended oplock request bit
1832                 and we granted one (by whatever means) - set the
1833                 correct bit for extended oplock reply.
1834         */
1835
1836         if (ex_oplock_request && lp_fake_oplocks(SNUM(conn))) {
1837                 smb_action |= EXTENDED_OPLOCK_GRANTED;
1838         }
1839
1840         if(ex_oplock_request && EXCLUSIVE_OPLOCK_TYPE(fsp->oplock_type)) {
1841                 smb_action |= EXTENDED_OPLOCK_GRANTED;
1842         }
1843
1844         /* If the caller set the core oplock request bit
1845                 and we granted one (by whatever means) - set the
1846                 correct bit for core oplock reply.
1847         */
1848
1849         if (open_flags & EXTENDED_RESPONSE_REQUIRED) {
1850                 reply_outbuf(req, 19, 0);
1851         } else {
1852                 reply_outbuf(req, 15, 0);
1853         }
1854
1855         if (core_oplock_request && lp_fake_oplocks(SNUM(conn))) {
1856                 SCVAL(req->outbuf, smb_flg,
1857                       CVAL(req->outbuf,smb_flg)|CORE_OPLOCK_GRANTED);
1858         }
1859
1860         if(core_oplock_request && EXCLUSIVE_OPLOCK_TYPE(fsp->oplock_type)) {
1861                 SCVAL(req->outbuf, smb_flg,
1862                       CVAL(req->outbuf,smb_flg)|CORE_OPLOCK_GRANTED);
1863         }
1864
1865         SSVAL(req->outbuf,smb_vwv2,fsp->fnum);
1866         SSVAL(req->outbuf,smb_vwv3,fattr);
1867         if(lp_dos_filetime_resolution(SNUM(conn)) ) {
1868                 srv_put_dos_date3((char *)req->outbuf,smb_vwv4,mtime & ~1);
1869         } else {
1870                 srv_put_dos_date3((char *)req->outbuf,smb_vwv4,mtime);
1871         }
1872         SIVAL(req->outbuf,smb_vwv6,(uint32)sbuf.st_size);
1873         SSVAL(req->outbuf,smb_vwv8,GET_OPENX_MODE(deny_mode));
1874         SSVAL(req->outbuf,smb_vwv11,smb_action);
1875
1876         if (open_flags & EXTENDED_RESPONSE_REQUIRED) {
1877                 SIVAL(req->outbuf, smb_vwv15, STD_RIGHT_ALL_ACCESS);
1878         }
1879
1880         END_PROFILE(SMBopenX);
1881         chain_reply(req);
1882         return;
1883 }
1884
1885 /****************************************************************************
1886  Reply to a SMBulogoffX.
1887 ****************************************************************************/
1888
1889 void reply_ulogoffX(struct smb_request *req)
1890 {
1891         user_struct *vuser;
1892
1893         START_PROFILE(SMBulogoffX);
1894
1895         vuser = get_valid_user_struct(req->vuid);
1896
1897         if(vuser == NULL) {
1898                 DEBUG(3,("ulogoff, vuser id %d does not map to user.\n",
1899                          req->vuid));
1900         }
1901
1902         /* in user level security we are supposed to close any files
1903                 open by this user */
1904         if ((vuser != NULL) && (lp_security() != SEC_SHARE)) {
1905                 file_close_user(req->vuid);
1906         }
1907
1908         invalidate_vuid(req->vuid);
1909
1910         reply_outbuf(req, 2, 0);
1911
1912         DEBUG( 3, ( "ulogoffX vuid=%d\n", req->vuid ) );
1913
1914         END_PROFILE(SMBulogoffX);
1915         chain_reply(req);
1916 }
1917
1918 /****************************************************************************
1919  Reply to a mknew or a create.
1920 ****************************************************************************/
1921
1922 void reply_mknew(struct smb_request *req)
1923 {
1924         connection_struct *conn = req->conn;
1925         char *fname = NULL;
1926         uint32 fattr = 0;
1927         struct timespec ts[2];
1928         files_struct *fsp;
1929         int oplock_request = 0;
1930         SMB_STRUCT_STAT sbuf;
1931         NTSTATUS status;
1932         uint32 access_mask = FILE_GENERIC_READ | FILE_GENERIC_WRITE;
1933         uint32 share_mode = FILE_SHARE_READ|FILE_SHARE_WRITE;
1934         uint32 create_disposition;
1935         uint32 create_options = 0;
1936         TALLOC_CTX *ctx = talloc_tos();
1937
1938         START_PROFILE(SMBcreate);
1939
1940         if (req->wct < 3) {
1941                 reply_nterror(req, NT_STATUS_INVALID_PARAMETER);
1942                 END_PROFILE(SMBcreate);
1943                 return;
1944         }
1945
1946         fattr = SVAL(req->vwv+0, 0);
1947         oplock_request = CORE_OPLOCK_REQUEST(req->inbuf);
1948
1949         ts[1] = convert_time_t_to_timespec(srv_make_unix_date3(req->vwv+1));
1950                         /* mtime. */
1951
1952         srvstr_get_path_req(ctx, req, &fname, (const char *)req->buf + 1,
1953                             STR_TERMINATE, &status);
1954         if (!NT_STATUS_IS_OK(status)) {
1955                 reply_nterror(req, status);
1956                 END_PROFILE(SMBcreate);
1957                 return;
1958         }
1959
1960         if (fattr & aVOLID) {
1961                 DEBUG(0,("Attempt to create file (%s) with volid set - "
1962                         "please report this\n", fname));
1963         }
1964
1965         if(req->cmd == SMBmknew) {
1966                 /* We should fail if file exists. */
1967                 create_disposition = FILE_CREATE;
1968         } else {
1969                 /* Create if file doesn't exist, truncate if it does. */
1970                 create_disposition = FILE_OVERWRITE_IF;
1971         }
1972
1973         status = SMB_VFS_CREATE_FILE(
1974                 conn,                                   /* conn */
1975                 req,                                    /* req */
1976                 0,                                      /* root_dir_fid */
1977                 fname,                                  /* fname */
1978                 CFF_DOS_PATH,                           /* create_file_flags */
1979                 access_mask,                            /* access_mask */
1980                 share_mode,                             /* share_access */
1981                 create_disposition,                     /* create_disposition*/
1982                 create_options,                         /* create_options */
1983                 fattr,                                  /* file_attributes */
1984                 oplock_request,                         /* oplock_request */
1985                 0,                                      /* allocation_size */
1986                 NULL,                                   /* sd */
1987                 NULL,                                   /* ea_list */
1988                 &fsp,                                   /* result */
1989                 NULL,                                   /* pinfo */
1990                 &sbuf);                                 /* psbuf */
1991
1992         if (!NT_STATUS_IS_OK(status)) {
1993                 END_PROFILE(SMBcreate);
1994                 if (open_was_deferred(req->mid)) {
1995                         /* We have re-scheduled this call. */
1996                         return;
1997                 }
1998                 reply_openerror(req, status);
1999                 return;
2000         }
2001
2002         ts[0] = get_atimespec(&sbuf); /* atime. */
2003         status = smb_set_file_time(conn, fsp, fsp->fsp_name, &sbuf, ts, true);
2004         if (!NT_STATUS_IS_OK(status)) {
2005                 END_PROFILE(SMBcreate);
2006                 reply_openerror(req, status);
2007                 return;
2008         }
2009
2010         reply_outbuf(req, 1, 0);
2011         SSVAL(req->outbuf,smb_vwv0,fsp->fnum);
2012
2013         if (oplock_request && lp_fake_oplocks(SNUM(conn))) {
2014                 SCVAL(req->outbuf,smb_flg,
2015                                 CVAL(req->outbuf,smb_flg)|CORE_OPLOCK_GRANTED);
2016         }
2017
2018         if(EXCLUSIVE_OPLOCK_TYPE(fsp->oplock_type)) {
2019                 SCVAL(req->outbuf,smb_flg,
2020                                 CVAL(req->outbuf,smb_flg)|CORE_OPLOCK_GRANTED);
2021         }
2022
2023         DEBUG( 2, ( "reply_mknew: file %s\n", fsp->fsp_name ) );
2024         DEBUG( 3, ( "reply_mknew %s fd=%d dmode=0x%x\n",
2025                     fsp->fsp_name, fsp->fh->fd, (unsigned int)fattr ) );
2026
2027         END_PROFILE(SMBcreate);
2028         return;
2029 }
2030
2031 /****************************************************************************
2032  Reply to a create temporary file.
2033 ****************************************************************************/
2034
2035 void reply_ctemp(struct smb_request *req)
2036 {
2037         connection_struct *conn = req->conn;
2038         char *fname = NULL;
2039         uint32 fattr;
2040         files_struct *fsp;
2041         int oplock_request;
2042         int tmpfd;
2043         SMB_STRUCT_STAT sbuf;
2044         char *s;
2045         NTSTATUS status;
2046         TALLOC_CTX *ctx = talloc_tos();
2047
2048         START_PROFILE(SMBctemp);
2049
2050         if (req->wct < 3) {
2051                 reply_nterror(req, NT_STATUS_INVALID_PARAMETER);
2052                 END_PROFILE(SMBctemp);
2053                 return;
2054         }
2055
2056         fattr = SVAL(req->vwv+0, 0);
2057         oplock_request = CORE_OPLOCK_REQUEST(req->inbuf);
2058
2059         srvstr_get_path_req(ctx, req, &fname, (const char *)req->buf+1,
2060                             STR_TERMINATE, &status);
2061         if (!NT_STATUS_IS_OK(status)) {
2062                 reply_nterror(req, status);
2063                 END_PROFILE(SMBctemp);
2064                 return;
2065         }
2066         if (*fname) {
2067                 fname = talloc_asprintf(ctx,
2068                                 "%s/TMXXXXXX",
2069                                 fname);
2070         } else {
2071                 fname = talloc_strdup(ctx, "TMXXXXXX");
2072         }
2073
2074         if (!fname) {
2075                 reply_nterror(req, NT_STATUS_NO_MEMORY);
2076                 END_PROFILE(SMBctemp);
2077                 return;
2078         }
2079
2080         status = resolve_dfspath(ctx, conn,
2081                                 req->flags2 & FLAGS2_DFS_PATHNAMES,
2082                                 fname,
2083                                 &fname);
2084         if (!NT_STATUS_IS_OK(status)) {
2085                 if (NT_STATUS_EQUAL(status,NT_STATUS_PATH_NOT_COVERED)) {
2086                         reply_botherror(req, NT_STATUS_PATH_NOT_COVERED,
2087                                         ERRSRV, ERRbadpath);
2088                         END_PROFILE(SMBctemp);
2089                         return;
2090                 }
2091                 reply_nterror(req, status);
2092                 END_PROFILE(SMBctemp);
2093                 return;
2094         }
2095
2096         status = unix_convert(ctx, conn, fname, False, &fname, NULL, &sbuf);
2097         if (!NT_STATUS_IS_OK(status)) {
2098                 reply_nterror(req, status);
2099                 END_PROFILE(SMBctemp);
2100                 return;
2101         }
2102
2103         status = check_name(conn, fname);
2104         if (!NT_STATUS_IS_OK(status)) {
2105                 reply_nterror(req, status);
2106                 END_PROFILE(SMBctemp);
2107                 return;
2108         }
2109
2110         tmpfd = smb_mkstemp(fname);
2111         if (tmpfd == -1) {
2112                 reply_unixerror(req, ERRDOS, ERRnoaccess);
2113                 END_PROFILE(SMBctemp);
2114                 return;
2115         }
2116
2117         SMB_VFS_STAT(conn,fname,&sbuf);
2118
2119         /* We should fail if file does not exist. */
2120         status = SMB_VFS_CREATE_FILE(
2121                 conn,                                   /* conn */
2122                 req,                                    /* req */
2123                 0,                                      /* root_dir_fid */
2124                 fname,                                  /* fname */
2125                 0,                                      /* create_file_flags */
2126                 FILE_GENERIC_READ | FILE_GENERIC_WRITE, /* access_mask */
2127                 FILE_SHARE_READ | FILE_SHARE_WRITE,     /* share_access */
2128                 FILE_OPEN,                              /* create_disposition*/
2129                 0,                                      /* create_options */
2130                 fattr,                                  /* file_attributes */
2131                 oplock_request,                         /* oplock_request */
2132                 0,                                      /* allocation_size */
2133                 NULL,                                   /* sd */
2134                 NULL,                                   /* ea_list */
2135                 &fsp,                                   /* result */
2136                 NULL,                                   /* pinfo */
2137                 &sbuf);                                 /* psbuf */
2138
2139         /* close fd from smb_mkstemp() */
2140         close(tmpfd);
2141
2142         if (!NT_STATUS_IS_OK(status)) {
2143                 if (open_was_deferred(req->mid)) {
2144                         /* We have re-scheduled this call. */
2145                         END_PROFILE(SMBctemp);
2146                         return;
2147                 }
2148                 reply_openerror(req, status);
2149                 END_PROFILE(SMBctemp);
2150                 return;
2151         }
2152
2153         reply_outbuf(req, 1, 0);
2154         SSVAL(req->outbuf,smb_vwv0,fsp->fnum);
2155
2156         /* the returned filename is relative to the directory */
2157         s = strrchr_m(fsp->fsp_name, '/');
2158         if (!s) {
2159                 s = fsp->fsp_name;
2160         } else {
2161                 s++;
2162         }
2163
2164 #if 0
2165         /* Tested vs W2K3 - this doesn't seem to be here - null terminated filename is the only
2166            thing in the byte section. JRA */
2167         SSVALS(p, 0, -1); /* what is this? not in spec */
2168 #endif
2169         if (message_push_string(&req->outbuf, s, STR_ASCII|STR_TERMINATE)
2170             == -1) {
2171                 reply_nterror(req, NT_STATUS_NO_MEMORY);
2172                 END_PROFILE(SMBctemp);
2173                 return;
2174         }
2175
2176         if (oplock_request && lp_fake_oplocks(SNUM(conn))) {
2177                 SCVAL(req->outbuf, smb_flg,
2178                       CVAL(req->outbuf,smb_flg)|CORE_OPLOCK_GRANTED);
2179         }
2180
2181         if (EXCLUSIVE_OPLOCK_TYPE(fsp->oplock_type)) {
2182                 SCVAL(req->outbuf, smb_flg,
2183                       CVAL(req->outbuf,smb_flg)|CORE_OPLOCK_GRANTED);
2184         }
2185
2186         DEBUG( 2, ( "reply_ctemp: created temp file %s\n", fsp->fsp_name ) );
2187         DEBUG( 3, ( "reply_ctemp %s fd=%d umode=0%o\n", fsp->fsp_name,
2188                     fsp->fh->fd, (unsigned int)sbuf.st_mode ) );
2189
2190         END_PROFILE(SMBctemp);
2191         return;
2192 }
2193
2194 /*******************************************************************
2195  Check if a user is allowed to rename a file.
2196 ********************************************************************/
2197
2198 static NTSTATUS can_rename(connection_struct *conn, files_struct *fsp,
2199                            uint16 dirtype, SMB_STRUCT_STAT *pst)
2200 {
2201         uint32 fmode;
2202
2203         if (!CAN_WRITE(conn)) {
2204                 return NT_STATUS_MEDIA_WRITE_PROTECTED;
2205         }
2206
2207         fmode = dos_mode(conn, fsp->fsp_name, pst);
2208         if ((fmode & ~dirtype) & (aHIDDEN | aSYSTEM)) {
2209                 return NT_STATUS_NO_SUCH_FILE;
2210         }
2211
2212         if (S_ISDIR(pst->st_mode)) {
2213                 return NT_STATUS_OK;
2214         }
2215
2216         if (fsp->access_mask & (DELETE_ACCESS|FILE_WRITE_ATTRIBUTES)) {
2217                 return NT_STATUS_OK;
2218         }
2219
2220         return NT_STATUS_ACCESS_DENIED;
2221 }
2222
2223 /*******************************************************************
2224  * unlink a file with all relevant access checks
2225  *******************************************************************/
2226
2227 static NTSTATUS do_unlink(connection_struct *conn,
2228                         struct smb_request *req,
2229                         const char *fname,
2230                         uint32 dirtype)
2231 {
2232         SMB_STRUCT_STAT sbuf;
2233         uint32 fattr;
2234         files_struct *fsp;
2235         uint32 dirtype_orig = dirtype;
2236         NTSTATUS status;
2237
2238         DEBUG(10,("do_unlink: %s, dirtype = %d\n", fname, dirtype ));
2239
2240         if (!CAN_WRITE(conn)) {
2241                 return NT_STATUS_MEDIA_WRITE_PROTECTED;
2242         }
2243
2244         if (SMB_VFS_LSTAT(conn,fname,&sbuf) != 0) {
2245                 return map_nt_error_from_unix(errno);
2246         }
2247
2248         fattr = dos_mode(conn,fname,&sbuf);
2249
2250         if (dirtype & FILE_ATTRIBUTE_NORMAL) {
2251                 dirtype = aDIR|aARCH|aRONLY;
2252         }
2253
2254         dirtype &= (aDIR|aARCH|aRONLY|aHIDDEN|aSYSTEM);
2255         if (!dirtype) {
2256                 return NT_STATUS_NO_SUCH_FILE;
2257         }
2258
2259         if (!dir_check_ftype(conn, fattr, dirtype)) {
2260                 if (fattr & aDIR) {
2261                         return NT_STATUS_FILE_IS_A_DIRECTORY;
2262                 }
2263                 return NT_STATUS_NO_SUCH_FILE;
2264         }
2265
2266         if (dirtype_orig & 0x8000) {
2267                 /* These will never be set for POSIX. */
2268                 return NT_STATUS_NO_SUCH_FILE;
2269         }
2270
2271 #if 0
2272         if ((fattr & dirtype) & FILE_ATTRIBUTE_DIRECTORY) {
2273                 return NT_STATUS_FILE_IS_A_DIRECTORY;
2274         }
2275
2276         if ((fattr & ~dirtype) & (FILE_ATTRIBUTE_HIDDEN|FILE_ATTRIBUTE_SYSTEM)) {
2277                 return NT_STATUS_NO_SUCH_FILE;
2278         }
2279
2280         if (dirtype & 0xFF00) {
2281                 /* These will never be set for POSIX. */
2282                 return NT_STATUS_NO_SUCH_FILE;
2283         }
2284
2285         dirtype &= 0xFF;
2286         if (!dirtype) {
2287                 return NT_STATUS_NO_SUCH_FILE;
2288         }
2289
2290         /* Can't delete a directory. */
2291         if (fattr & aDIR) {
2292                 return NT_STATUS_FILE_IS_A_DIRECTORY;
2293         }
2294 #endif
2295
2296 #if 0 /* JRATEST */
2297         else if (dirtype & aDIR) /* Asked for a directory and it isn't. */
2298                 return NT_STATUS_OBJECT_NAME_INVALID;
2299 #endif /* JRATEST */
2300
2301         /* Fix for bug #3035 from SATOH Fumiyasu <fumiyas@miraclelinux.com>
2302
2303           On a Windows share, a file with read-only dosmode can be opened with
2304           DELETE_ACCESS. But on a Samba share (delete readonly = no), it
2305           fails with NT_STATUS_CANNOT_DELETE error.
2306
2307           This semantic causes a problem that a user can not
2308           rename a file with read-only dosmode on a Samba share
2309           from a Windows command prompt (i.e. cmd.exe, but can rename
2310           from Windows Explorer).
2311         */
2312
2313         if (!lp_delete_readonly(SNUM(conn))) {
2314                 if (fattr & aRONLY) {
2315                         return NT_STATUS_CANNOT_DELETE;
2316                 }
2317         }
2318
2319         /* On open checks the open itself will check the share mode, so
2320            don't do it here as we'll get it wrong. */
2321
2322         status = SMB_VFS_CREATE_FILE
2323                 (conn,                  /* conn */
2324                  req,                   /* req */
2325                  0,                     /* root_dir_fid */
2326                  fname,                 /* fname */
2327                  0,                     /* create_file_flags */
2328                  DELETE_ACCESS,         /* access_mask */
2329                  FILE_SHARE_NONE,       /* share_access */
2330                  FILE_OPEN,             /* create_disposition*/
2331                  FILE_NON_DIRECTORY_FILE, /* create_options */
2332                  FILE_ATTRIBUTE_NORMAL, /* file_attributes */
2333                  0,                     /* oplock_request */
2334                  0,                     /* allocation_size */
2335                  NULL,                  /* sd */
2336                  NULL,                  /* ea_list */
2337                  &fsp,                  /* result */
2338                  NULL,                  /* pinfo */
2339                  &sbuf);                /* psbuf */
2340
2341         if (!NT_STATUS_IS_OK(status)) {
2342                 DEBUG(10, ("SMB_VFS_CREATEFILE failed: %s\n",
2343                            nt_errstr(status)));
2344                 return status;
2345         }
2346
2347         /* The set is across all open files on this dev/inode pair. */
2348         if (!set_delete_on_close(fsp, True, &conn->server_info->utok)) {
2349                 close_file(req, fsp, NORMAL_CLOSE);
2350                 return NT_STATUS_ACCESS_DENIED;
2351         }
2352
2353         return close_file(req, fsp, NORMAL_CLOSE);
2354 }
2355
2356 /****************************************************************************
2357  The guts of the unlink command, split out so it may be called by the NT SMB
2358  code.
2359 ****************************************************************************/
2360
2361 NTSTATUS unlink_internals(connection_struct *conn, struct smb_request *req,
2362                           uint32 dirtype, const char *name_in, bool has_wild)
2363 {
2364         const char *directory = NULL;
2365         char *mask = NULL;
2366         char *name = NULL;
2367         char *p = NULL;
2368         int count=0;
2369         NTSTATUS status = NT_STATUS_OK;
2370         SMB_STRUCT_STAT sbuf;
2371         TALLOC_CTX *ctx = talloc_tos();
2372
2373         status = unix_convert(ctx, conn, name_in, has_wild, &name, NULL, &sbuf);
2374         if (!NT_STATUS_IS_OK(status)) {
2375                 return status;
2376         }
2377
2378         p = strrchr_m(name,'/');
2379         if (!p) {
2380                 directory = talloc_strdup(ctx, ".");
2381                 if (!directory) {
2382                         return NT_STATUS_NO_MEMORY;
2383                 }
2384                 mask = name;
2385         } else {
2386                 *p = 0;
2387                 directory = name;
2388                 mask = p+1;
2389         }
2390
2391         /*
2392          * We should only check the mangled cache
2393          * here if unix_convert failed. This means
2394          * that the path in 'mask' doesn't exist
2395          * on the file system and so we need to look
2396          * for a possible mangle. This patch from
2397          * Tine Smukavec <valentin.smukavec@hermes.si>.
2398          */
2399
2400         if (!VALID_STAT(sbuf) && mangle_is_mangled(mask,conn->params)) {
2401                 char *new_mask = NULL;
2402                 mangle_lookup_name_from_8_3(ctx,
2403                                 mask,
2404                                 &new_mask,
2405                                 conn->params );
2406                 if (new_mask) {
2407                         mask = new_mask;
2408                 }
2409         }
2410
2411         if (!has_wild) {
2412                 directory = talloc_asprintf(ctx,
2413                                 "%s/%s",
2414                                 directory,
2415                                 mask);
2416                 if (!directory) {
2417                         return NT_STATUS_NO_MEMORY;
2418                 }
2419                 if (dirtype == 0) {
2420                         dirtype = FILE_ATTRIBUTE_NORMAL;
2421                 }
2422
2423                 status = check_name(conn, directory);
2424                 if (!NT_STATUS_IS_OK(status)) {
2425                         return status;
2426                 }
2427
2428                 status = do_unlink(conn, req, directory, dirtype);
2429                 if (!NT_STATUS_IS_OK(status)) {
2430                         return status;
2431                 }
2432
2433                 count++;
2434         } else {
2435                 struct smb_Dir *dir_hnd = NULL;
2436                 long offset = 0;
2437                 const char *dname;
2438
2439                 if ((dirtype & SAMBA_ATTRIBUTES_MASK) == aDIR) {
2440                         return NT_STATUS_OBJECT_NAME_INVALID;
2441                 }
2442
2443                 if (strequal(mask,"????????.???")) {
2444                         mask[0] = '*';
2445                         mask[1] = '\0';
2446                 }
2447
2448                 status = check_name(conn, directory);
2449                 if (!NT_STATUS_IS_OK(status)) {
2450                         return status;
2451                 }
2452
2453                 dir_hnd = OpenDir(talloc_tos(), conn, directory, mask,
2454                                   dirtype);
2455                 if (dir_hnd == NULL) {
2456                         return map_nt_error_from_unix(errno);
2457                 }
2458
2459                 /* XXXX the CIFS spec says that if bit0 of the flags2 field is set then
2460                    the pattern matches against the long name, otherwise the short name 
2461                    We don't implement this yet XXXX
2462                 */
2463
2464                 status = NT_STATUS_NO_SUCH_FILE;
2465
2466                 while ((dname = ReadDirName(dir_hnd, &offset))) {
2467                         SMB_STRUCT_STAT st;
2468                         char *fname = NULL;
2469
2470                         if (!is_visible_file(conn, directory, dname, &st, True)) {
2471                                 continue;
2472                         }
2473
2474                         /* Quick check for "." and ".." */
2475                         if (ISDOT(dname) || ISDOTDOT(dname)) {
2476                                 continue;
2477                         }
2478
2479                         if(!mask_match(dname, mask, conn->case_sensitive)) {
2480                                 continue;
2481                         }
2482
2483                         fname = talloc_asprintf(ctx, "%s/%s",
2484                                         directory,
2485                                         dname);
2486                         if (!fname) {
2487                                 return NT_STATUS_NO_MEMORY;
2488                         }
2489
2490                         status = check_name(conn, fname);
2491                         if (!NT_STATUS_IS_OK(status)) {
2492                                 TALLOC_FREE(dir_hnd);
2493                                 return status;
2494                         }
2495
2496                         status = do_unlink(conn, req, fname, dirtype);
2497                         if (!NT_STATUS_IS_OK(status)) {
2498                                 TALLOC_FREE(fname);
2499                                 continue;
2500                         }
2501
2502                         count++;
2503                         DEBUG(3,("unlink_internals: successful unlink [%s]\n",
2504                                  fname));
2505
2506                         TALLOC_FREE(fname);
2507                 }
2508                 TALLOC_FREE(dir_hnd);
2509         }
2510
2511         if (count == 0 && NT_STATUS_IS_OK(status) && errno != 0) {
2512                 status = map_nt_error_from_unix(errno);
2513         }
2514
2515         return status;
2516 }
2517
2518 /****************************************************************************
2519  Reply to a unlink
2520 ****************************************************************************/
2521
2522 void reply_unlink(struct smb_request *req)
2523 {
2524         connection_struct *conn = req->conn;
2525         char *name = NULL;
2526         uint32 dirtype;
2527         NTSTATUS status;
2528         bool path_contains_wcard = False;
2529         TALLOC_CTX *ctx = talloc_tos();
2530
2531         START_PROFILE(SMBunlink);
2532
2533         if (req->wct < 1) {
2534                 reply_nterror(req, NT_STATUS_INVALID_PARAMETER);
2535                 END_PROFILE(SMBunlink);
2536                 return;
2537         }
2538
2539         dirtype = SVAL(req->vwv+0, 0);
2540
2541         srvstr_get_path_req_wcard(ctx, req, &name, (const char *)req->buf + 1,
2542                                   STR_TERMINATE, &status,
2543                                   &path_contains_wcard);
2544         if (!NT_STATUS_IS_OK(status)) {
2545                 reply_nterror(req, status);
2546                 END_PROFILE(SMBunlink);
2547                 return;
2548         }
2549
2550         status = resolve_dfspath_wcard(ctx, conn,
2551                                        req->flags2 & FLAGS2_DFS_PATHNAMES,
2552                                        name,
2553                                        &name,
2554                                        &path_contains_wcard);
2555         if (!NT_STATUS_IS_OK(status)) {
2556                 if (NT_STATUS_EQUAL(status,NT_STATUS_PATH_NOT_COVERED)) {
2557                         reply_botherror(req, NT_STATUS_PATH_NOT_COVERED,
2558                                         ERRSRV, ERRbadpath);
2559                         END_PROFILE(SMBunlink);
2560                         return;
2561                 }
2562                 reply_nterror(req, status);
2563                 END_PROFILE(SMBunlink);
2564                 return;
2565         }
2566
2567         DEBUG(3,("reply_unlink : %s\n",name));
2568
2569         status = unlink_internals(conn, req, dirtype, name,
2570                                   path_contains_wcard);
2571         if (!NT_STATUS_IS_OK(status)) {
2572                 if (open_was_deferred(req->mid)) {
2573                         /* We have re-scheduled this call. */
2574                         END_PROFILE(SMBunlink);
2575                         return;
2576                 }
2577                 reply_nterror(req, status);
2578                 END_PROFILE(SMBunlink);
2579                 return;
2580         }
2581
2582         reply_outbuf(req, 0, 0);
2583         END_PROFILE(SMBunlink);
2584
2585         return;
2586 }
2587
2588 /****************************************************************************
2589  Fail for readbraw.
2590 ****************************************************************************/
2591
2592 static void fail_readraw(void)
2593 {
2594         const char *errstr = talloc_asprintf(talloc_tos(),
2595                         "FAIL ! reply_readbraw: socket write fail (%s)",
2596                         strerror(errno));
2597         if (!errstr) {
2598                 errstr = "";
2599         }
2600         exit_server_cleanly(errstr);
2601 }
2602
2603 /****************************************************************************
2604  Fake (read/write) sendfile. Returns -1 on read or write fail.
2605 ****************************************************************************/
2606
2607 static ssize_t fake_sendfile(files_struct *fsp, SMB_OFF_T startpos,
2608                              size_t nread)
2609 {
2610         size_t bufsize;
2611         size_t tosend = nread;
2612         char *buf;
2613
2614         if (nread == 0) {
2615                 return 0;
2616         }
2617
2618         bufsize = MIN(nread, 65536);
2619
2620         if (!(buf = SMB_MALLOC_ARRAY(char, bufsize))) {
2621                 return -1;
2622         }
2623
2624         while (tosend > 0) {
2625                 ssize_t ret;
2626                 size_t cur_read;
2627
2628                 if (tosend > bufsize) {
2629                         cur_read = bufsize;
2630                 } else {
2631                         cur_read = tosend;
2632                 }
2633                 ret = read_file(fsp,buf,startpos,cur_read);
2634                 if (ret == -1) {
2635                         SAFE_FREE(buf);
2636                         return -1;
2637                 }
2638
2639                 /* If we had a short read, fill with zeros. */
2640                 if (ret < cur_read) {
2641                         memset(buf, '\0', cur_read - ret);
2642                 }
2643
2644                 if (write_data(smbd_server_fd(),buf,cur_read) != cur_read) {
2645                         SAFE_FREE(buf);
2646                         return -1;
2647                 }
2648                 tosend -= cur_read;
2649                 startpos += cur_read;
2650         }
2651
2652         SAFE_FREE(buf);
2653         return (ssize_t)nread;
2654 }
2655
2656 /****************************************************************************
2657  Deal with the case of sendfile reading less bytes from the file than
2658  requested. Fill with zeros (all we can do).
2659 ****************************************************************************/
2660
2661 static void sendfile_short_send(files_struct *fsp,
2662                                 ssize_t nread,
2663                                 size_t headersize,
2664                                 size_t smb_maxcnt)
2665 {
2666         if (nread < headersize) {
2667                 DEBUG(0,("sendfile_short_send: sendfile failed to send "
2668                         "header for file %s (%s). Terminating\n",
2669                         fsp->fsp_name, strerror(errno) ));
2670                 exit_server_cleanly("sendfile_short_send failed");
2671         }
2672
2673         nread -= headersize;
2674
2675         if (nread < smb_maxcnt) {
2676                 char *buf = SMB_CALLOC_ARRAY(char, 1024);
2677                 if (!buf) {
2678                         exit_server_cleanly("sendfile_short_send: "
2679                                 "malloc failed");
2680                 }
2681
2682                 DEBUG(0,("sendfile_short_send: filling truncated file %s "
2683                         "with zeros !\n", fsp->fsp_name));
2684
2685                 while (nread < smb_maxcnt) {
2686                         /*
2687                          * We asked for the real file size and told sendfile
2688                          * to not go beyond the end of the file. But it can
2689                          * happen that in between our fstat call and the
2690                          * sendfile call the file was truncated. This is very
2691                          * bad because we have already announced the larger
2692                          * number of bytes to the client.
2693                          *
2694                          * The best we can do now is to send 0-bytes, just as
2695                          * a read from a hole in a sparse file would do.
2696                          *
2697                          * This should happen rarely enough that I don't care
2698                          * about efficiency here :-)
2699                          */
2700                         size_t to_write;
2701
2702                         to_write = MIN(sizeof(buf), smb_maxcnt - nread);
2703                         if (write_data(smbd_server_fd(), buf, to_write) != to_write) {
2704                                 exit_server_cleanly("sendfile_short_send: "
2705                                         "write_data failed");
2706                         }
2707                         nread += to_write;
2708                 }
2709                 SAFE_FREE(buf);
2710         }
2711 }
2712
2713 /****************************************************************************
2714  Return a readbraw error (4 bytes of zero).
2715 ****************************************************************************/
2716
2717 static void reply_readbraw_error(void)
2718 {
2719         char header[4];
2720         SIVAL(header,0,0);
2721         if (write_data(smbd_server_fd(),header,4) != 4) {
2722                 fail_readraw();
2723         }
2724 }
2725
2726 /****************************************************************************
2727  Use sendfile in readbraw.
2728 ****************************************************************************/
2729
2730 void send_file_readbraw(connection_struct *conn,
2731                         files_struct *fsp,
2732                         SMB_OFF_T startpos,
2733                         size_t nread,
2734                         ssize_t mincount)
2735 {
2736         char *outbuf = NULL;
2737         ssize_t ret=0;
2738
2739 #if defined(WITH_SENDFILE)
2740         /*
2741          * We can only use sendfile on a non-chained packet 
2742          * but we can use on a non-oplocked file. tridge proved this
2743          * on a train in Germany :-). JRA.
2744          * reply_readbraw has already checked the length.
2745          */
2746
2747         if ( (chain_size == 0) && (nread > 0) && (fsp->base_fsp == NULL) &&
2748             (fsp->wcp == NULL) && lp_use_sendfile(SNUM(conn)) ) {
2749                 ssize_t sendfile_read = -1;
2750                 char header[4];
2751                 DATA_BLOB header_blob;
2752
2753                 _smb_setlen(header,nread);
2754                 header_blob = data_blob_const(header, 4);
2755
2756                 if ((sendfile_read = SMB_VFS_SENDFILE(smbd_server_fd(), fsp,
2757                                 &header_blob, startpos, nread)) == -1) {
2758                         /* Returning ENOSYS means no data at all was sent.
2759                          * Do this as a normal read. */
2760                         if (errno == ENOSYS) {
2761                                 goto normal_readbraw;
2762                         }
2763
2764                         /*
2765                          * Special hack for broken Linux with no working sendfile. If we
2766                          * return EINTR we sent the header but not the rest of the data.
2767                          * Fake this up by doing read/write calls.
2768                          */
2769                         if (errno == EINTR) {
2770                                 /* Ensure we don't do this again. */
2771                                 set_use_sendfile(SNUM(conn), False);
2772                                 DEBUG(0,("send_file_readbraw: sendfile not available. Faking..\n"));
2773
2774                                 if (fake_sendfile(fsp, startpos, nread) == -1) {
2775                                         DEBUG(0,("send_file_readbraw: fake_sendfile failed for file %s (%s).\n",
2776                                                 fsp->fsp_name, strerror(errno) ));
2777                                         exit_server_cleanly("send_file_readbraw fake_sendfile failed");
2778                                 }
2779                                 return;
2780                         }
2781
2782                         DEBUG(0,("send_file_readbraw: sendfile failed for file %s (%s). Terminating\n",
2783                                 fsp->fsp_name, strerror(errno) ));
2784                         exit_server_cleanly("send_file_readbraw sendfile failed");
2785                 }
2786
2787                 /* Deal with possible short send. */
2788                 if (sendfile_read != 4+nread) {
2789                         sendfile_short_send(fsp, sendfile_read, 4, nread);
2790                 }
2791                 return;
2792         }
2793 #endif
2794
2795 normal_readbraw:
2796
2797         outbuf = TALLOC_ARRAY(NULL, char, nread+4);
2798         if (!outbuf) {
2799                 DEBUG(0,("send_file_readbraw: TALLOC_ARRAY failed for size %u.\n",
2800                         (unsigned)(nread+4)));
2801                 reply_readbraw_error();
2802                 return;
2803         }
2804
2805         if (nread > 0) {
2806                 ret = read_file(fsp,outbuf+4,startpos,nread);
2807 #if 0 /* mincount appears to be ignored in a W2K server. JRA. */
2808                 if (ret < mincount)
2809                         ret = 0;
2810 #else
2811                 if (ret < nread)
2812                         ret = 0;
2813 #endif
2814         }
2815
2816         _smb_setlen(outbuf,ret);
2817         if (write_data(smbd_server_fd(),outbuf,4+ret) != 4+ret)
2818                 fail_readraw();
2819
2820         TALLOC_FREE(outbuf);
2821 }
2822
2823 /****************************************************************************
2824  Reply to a readbraw (core+ protocol).
2825 ****************************************************************************/
2826
2827 void reply_readbraw(struct smb_request *req)
2828 {
2829         connection_struct *conn = req->conn;
2830         ssize_t maxcount,mincount;
2831         size_t nread = 0;
2832         SMB_OFF_T startpos;
2833         files_struct *fsp;
2834         SMB_STRUCT_STAT st;
2835         SMB_OFF_T size = 0;
2836
2837         START_PROFILE(SMBreadbraw);
2838
2839         if (srv_is_signing_active() || is_encrypted_packet(req->inbuf)) {
2840                 exit_server_cleanly("reply_readbraw: SMB signing/sealing is active - "
2841                         "raw reads/writes are disallowed.");
2842         }
2843
2844         if (req->wct < 8) {
2845                 reply_readbraw_error();
2846                 END_PROFILE(SMBreadbraw);
2847                 return;
2848         }
2849
2850         /*
2851          * Special check if an oplock break has been issued
2852          * and the readraw request croses on the wire, we must
2853          * return a zero length response here.
2854          */
2855
2856         fsp = file_fsp(req, SVAL(req->vwv+0, 0));
2857
2858         /*
2859          * We have to do a check_fsp by hand here, as
2860          * we must always return 4 zero bytes on error,
2861          * not a NTSTATUS.
2862          */
2863
2864         if (!fsp || !conn || conn != fsp->conn ||
2865                         req->vuid != fsp->vuid ||
2866                         fsp->is_directory || fsp->fh->fd == -1) {
2867                 /*
2868                  * fsp could be NULL here so use the value from the packet. JRA.
2869                  */
2870                 DEBUG(3,("reply_readbraw: fnum %d not valid "
2871                         "- cache prime?\n",
2872                         (int)SVAL(req->vwv+0, 0)));
2873                 reply_readbraw_error();
2874                 END_PROFILE(SMBreadbraw);
2875                 return;
2876         }
2877
2878         /* Do a "by hand" version of CHECK_READ. */
2879         if (!(fsp->can_read ||
2880                         ((req->flags2 & FLAGS2_READ_PERMIT_EXECUTE) &&
2881                                 (fsp->access_mask & FILE_EXECUTE)))) {
2882                 DEBUG(3,("reply_readbraw: fnum %d not readable.\n",
2883                                 (int)SVAL(req->vwv+0, 0)));
2884                 reply_readbraw_error();
2885                 END_PROFILE(SMBreadbraw);
2886                 return;
2887         }
2888
2889         flush_write_cache(fsp, READRAW_FLUSH);
2890
2891         startpos = IVAL_TO_SMB_OFF_T(req->vwv+1, 0);
2892         if(req->wct == 10) {
2893                 /*
2894                  * This is a large offset (64 bit) read.
2895                  */
2896 #ifdef LARGE_SMB_OFF_T
2897
2898                 startpos |= (((SMB_OFF_T)IVAL(req->vwv+8, 0)) << 32);
2899
2900 #else /* !LARGE_SMB_OFF_T */
2901
2902                 /*
2903                  * Ensure we haven't been sent a >32 bit offset.
2904                  */
2905
2906                 if(IVAL(req->vwv+8, 0) != 0) {
2907                         DEBUG(0,("reply_readbraw: large offset "
2908                                 "(%x << 32) used and we don't support "
2909                                 "64 bit offsets.\n",
2910                         (unsigned int)IVAL(req->vwv+8, 0) ));
2911                         reply_readbraw_error();
2912                         END_PROFILE(SMBreadbraw);
2913                         return;
2914                 }
2915
2916 #endif /* LARGE_SMB_OFF_T */
2917
2918                 if(startpos < 0) {
2919                         DEBUG(0,("reply_readbraw: negative 64 bit "
2920                                 "readraw offset (%.0f) !\n",
2921                                 (double)startpos ));
2922                         reply_readbraw_error();
2923                         END_PROFILE(SMBreadbraw);
2924                         return;
2925                 }      
2926         }
2927
2928         maxcount = (SVAL(req->vwv+3, 0) & 0xFFFF);
2929         mincount = (SVAL(req->vwv+4, 0) & 0xFFFF);
2930
2931         /* ensure we don't overrun the packet size */
2932         maxcount = MIN(65535,maxcount);
2933
2934         if (is_locked(fsp,(uint32)req->smbpid,
2935                         (uint64_t)maxcount,
2936                         (uint64_t)startpos,
2937                         READ_LOCK)) {
2938                 reply_readbraw_error();
2939                 END_PROFILE(SMBreadbraw);
2940                 return;
2941         }
2942
2943         if (SMB_VFS_FSTAT(fsp, &st) == 0) {
2944                 size = st.st_size;
2945         }
2946
2947         if (startpos >= size) {
2948                 nread = 0;
2949         } else {
2950                 nread = MIN(maxcount,(size - startpos));
2951         }
2952
2953 #if 0 /* mincount appears to be ignored in a W2K server. JRA. */
2954         if (nread < mincount)
2955                 nread = 0;
2956 #endif
2957
2958         DEBUG( 3, ( "reply_readbraw: fnum=%d start=%.0f max=%lu "
2959                 "min=%lu nread=%lu\n",
2960                 fsp->fnum, (double)startpos,
2961                 (unsigned long)maxcount,
2962                 (unsigned long)mincount,
2963                 (unsigned long)nread ) );
2964
2965         send_file_readbraw(conn, fsp, startpos, nread, mincount);
2966
2967         DEBUG(5,("reply_readbraw finished\n"));
2968         END_PROFILE(SMBreadbraw);
2969 }
2970
2971 #undef DBGC_CLASS
2972 #define DBGC_CLASS DBGC_LOCKING
2973
2974 /****************************************************************************
2975  Reply to a lockread (core+ protocol).
2976 ****************************************************************************/
2977
2978 void reply_lockread(struct smb_request *req)
2979 {
2980         connection_struct *conn = req->conn;
2981         ssize_t nread = -1;
2982         char *data;
2983         SMB_OFF_T startpos;
2984         size_t numtoread;
2985         NTSTATUS status;
2986         files_struct *fsp;
2987         struct byte_range_lock *br_lck = NULL;
2988         char *p = NULL;
2989
2990         START_PROFILE(SMBlockread);
2991
2992         if (req->wct < 5) {
2993                 reply_nterror(req, NT_STATUS_INVALID_PARAMETER);
2994                 END_PROFILE(SMBlockread);
2995                 return;
2996         }
2997
2998         fsp = file_fsp(req, SVAL(req->vwv+0, 0));
2999
3000         if (!check_fsp(conn, req, fsp)) {
3001                 END_PROFILE(SMBlockread);
3002                 return;
3003         }
3004
3005         if (!CHECK_READ(fsp,req)) {
3006                 reply_doserror(req, ERRDOS, ERRbadaccess);
3007                 END_PROFILE(SMBlockread);
3008                 return;
3009         }
3010
3011         release_level_2_oplocks_on_change(fsp);
3012
3013         numtoread = SVAL(req->vwv+1, 0);
3014         startpos = IVAL_TO_SMB_OFF_T(req->vwv+2, 0);
3015
3016         numtoread = MIN(BUFFER_SIZE - (smb_size + 3*2 + 3), numtoread);
3017
3018         reply_outbuf(req, 5, numtoread + 3);
3019
3020         data = smb_buf(req->outbuf) + 3;
3021
3022         /*
3023          * NB. Discovered by Menny Hamburger at Mainsoft. This is a core+
3024          * protocol request that predates the read/write lock concept. 
3025          * Thus instead of asking for a read lock here we need to ask
3026          * for a write lock. JRA.
3027          * Note that the requested lock size is unaffected by max_recv.
3028          */
3029
3030         br_lck = do_lock(smbd_messaging_context(),
3031                         fsp,
3032                         req->smbpid,
3033                         (uint64_t)numtoread,
3034                         (uint64_t)startpos,
3035                         WRITE_LOCK,
3036                         WINDOWS_LOCK,
3037                         False, /* Non-blocking lock. */
3038                         &status,
3039                         NULL);
3040         TALLOC_FREE(br_lck);
3041
3042         if (NT_STATUS_V(status)) {
3043                 reply_nterror(req, status);
3044                 END_PROFILE(SMBlockread);
3045                 return;
3046         }
3047
3048         /*
3049          * However the requested READ size IS affected by max_recv. Insanity.... JRA.
3050          */
3051
3052         if (numtoread > max_recv) {
3053                 DEBUG(0,("reply_lockread: requested read size (%u) is greater than maximum allowed (%u). \
3054 Returning short read of maximum allowed for compatibility with Windows 2000.\n",
3055                         (unsigned int)numtoread, (unsigned int)max_recv ));
3056                 numtoread = MIN(numtoread,max_recv);
3057         }
3058         nread = read_file(fsp,data,startpos,numtoread);
3059
3060         if (nread < 0) {
3061                 reply_unixerror(req, ERRDOS, ERRnoaccess);
3062                 END_PROFILE(SMBlockread);
3063                 return;
3064         }
3065
3066         srv_set_message((char *)req->outbuf, 5, nread+3, False);
3067
3068         SSVAL(req->outbuf,smb_vwv0,nread);
3069         SSVAL(req->outbuf,smb_vwv5,nread+3);
3070         p = smb_buf(req->outbuf);
3071         SCVAL(p,0,0); /* pad byte. */
3072         SSVAL(p,1,nread);
3073
3074         DEBUG(3,("lockread fnum=%d num=%d nread=%d\n",
3075                  fsp->fnum, (int)numtoread, (int)nread));
3076
3077         END_PROFILE(SMBlockread);
3078         return;
3079 }
3080
3081 #undef DBGC_CLASS
3082 #define DBGC_CLASS DBGC_ALL
3083
3084 /****************************************************************************
3085  Reply to a read.
3086 ****************************************************************************/
3087
3088 void reply_read(struct smb_request *req)
3089 {
3090         connection_struct *conn = req->conn;
3091         size_t numtoread;
3092         ssize_t nread = 0;
3093         char *data;
3094         SMB_OFF_T startpos;
3095         int outsize = 0;
3096         files_struct *fsp;
3097
3098         START_PROFILE(SMBread);
3099
3100         if (req->wct < 3) {
3101                 reply_nterror(req, NT_STATUS_INVALID_PARAMETER);
3102                 END_PROFILE(SMBread);
3103                 return;
3104         }
3105
3106         fsp = file_fsp(req, SVAL(req->vwv+0, 0));
3107
3108         if (!check_fsp(conn, req, fsp)) {
3109                 END_PROFILE(SMBread);
3110                 return;
3111         }
3112
3113         if (!CHECK_READ(fsp,req)) {
3114                 reply_doserror(req, ERRDOS, ERRbadaccess);
3115                 END_PROFILE(SMBread);
3116                 return;
3117         }
3118
3119         numtoread = SVAL(req->vwv+1, 0);
3120         startpos = IVAL_TO_SMB_OFF_T(req->vwv+2, 0);
3121
3122         numtoread = MIN(BUFFER_SIZE-outsize,numtoread);
3123
3124         /*
3125          * The requested read size cannot be greater than max_recv. JRA.
3126          */
3127         if (numtoread > max_recv) {
3128                 DEBUG(0,("reply_read: requested read size (%u) is greater than maximum allowed (%u). \
3129 Returning short read of maximum allowed for compatibility with Windows 2000.\n",
3130                         (unsigned int)numtoread, (unsigned int)max_recv ));
3131                 numtoread = MIN(numtoread,max_recv);
3132         }
3133
3134         reply_outbuf(req, 5, numtoread+3);
3135
3136         data = smb_buf(req->outbuf) + 3;
3137
3138         if (is_locked(fsp, (uint32)req->smbpid, (uint64_t)numtoread,
3139                       (uint64_t)startpos, READ_LOCK)) {
3140                 reply_doserror(req, ERRDOS,ERRlock);
3141                 END_PROFILE(SMBread);
3142                 return;
3143         }
3144
3145         if (numtoread > 0)
3146                 nread = read_file(fsp,data,startpos,numtoread);
3147
3148         if (nread < 0) {
3149                 reply_unixerror(req, ERRDOS,ERRnoaccess);
3150                 END_PROFILE(SMBread);
3151                 return;
3152         }
3153
3154         srv_set_message((char *)req->outbuf, 5, nread+3, False);
3155
3156         SSVAL(req->outbuf,smb_vwv0,nread);
3157         SSVAL(req->outbuf,smb_vwv5,nread+3);
3158         SCVAL(smb_buf(req->outbuf),0,1);
3159         SSVAL(smb_buf(req->outbuf),1,nread);
3160
3161         DEBUG( 3, ( "read fnum=%d num=%d nread=%d\n",
3162                 fsp->fnum, (int)numtoread, (int)nread ) );
3163
3164         END_PROFILE(SMBread);
3165         return;
3166 }
3167
3168 /****************************************************************************
3169  Setup readX header.
3170 ****************************************************************************/
3171
3172 static int setup_readX_header(char *outbuf, size_t smb_maxcnt)
3173 {
3174         int outsize;
3175         char *data;
3176
3177         outsize = srv_set_message(outbuf,12,smb_maxcnt,False);
3178         data = smb_buf(outbuf);
3179
3180         memset(outbuf+smb_vwv0,'\0',24); /* valgrind init. */
3181
3182         SCVAL(outbuf,smb_vwv0,0xFF);
3183         SSVAL(outbuf,smb_vwv2,0xFFFF); /* Remaining - must be -1. */
3184         SSVAL(outbuf,smb_vwv5,smb_maxcnt);
3185         SSVAL(outbuf,smb_vwv6,smb_offset(data,outbuf));
3186         SSVAL(outbuf,smb_vwv7,(smb_maxcnt >> 16));
3187         SSVAL(smb_buf(outbuf),-2,smb_maxcnt);
3188         /* Reset the outgoing length, set_message truncates at 0x1FFFF. */
3189         _smb_setlen_large(outbuf,(smb_size + 12*2 + smb_maxcnt - 4));
3190         return outsize;
3191 }
3192
3193 /****************************************************************************
3194  Reply to a read and X - possibly using sendfile.
3195 ****************************************************************************/
3196
3197 static void send_file_readX(connection_struct *conn, struct smb_request *req,
3198                             files_struct *fsp, SMB_OFF_T startpos,
3199                             size_t smb_maxcnt)
3200 {
3201         SMB_STRUCT_STAT sbuf;
3202         ssize_t nread = -1;
3203
3204         if(SMB_VFS_FSTAT(fsp, &sbuf) == -1) {
3205                 reply_unixerror(req, ERRDOS, ERRnoaccess);
3206                 return;
3207         }
3208
3209         if (startpos > sbuf.st_size) {
3210                 smb_maxcnt = 0;
3211         } else if (smb_maxcnt > (sbuf.st_size - startpos)) {
3212                 smb_maxcnt = (sbuf.st_size - startpos);
3213         }
3214
3215         if (smb_maxcnt == 0) {
3216                 goto normal_read;
3217         }
3218
3219 #if defined(WITH_SENDFILE)
3220         /*
3221          * We can only use sendfile on a non-chained packet
3222          * but we can use on a non-oplocked file. tridge proved this
3223          * on a train in Germany :-). JRA.
3224          */
3225
3226         if ((chain_size == 0) && (CVAL(req->vwv+0, 0) == 0xFF) &&
3227             !is_encrypted_packet(req->inbuf) && (fsp->base_fsp == NULL) &&
3228             lp_use_sendfile(SNUM(conn)) && (fsp->wcp == NULL) ) {
3229                 uint8 headerbuf[smb_size + 12 * 2];
3230                 DATA_BLOB header;
3231
3232                 /*
3233                  * Set up the packet header before send. We
3234                  * assume here the sendfile will work (get the
3235                  * correct amount of data).
3236                  */
3237
3238                 header = data_blob_const(headerbuf, sizeof(headerbuf));
3239
3240                 construct_reply_common_req(req, (char *)headerbuf);
3241                 setup_readX_header((char *)headerbuf, smb_maxcnt);
3242
3243                 if ((nread = SMB_VFS_SENDFILE(smbd_server_fd(), fsp, &header, startpos, smb_maxcnt)) == -1) {
3244                         /* Returning ENOSYS means no data at all was sent.
3245                            Do this as a normal read. */
3246                         if (errno == ENOSYS) {
3247                                 goto normal_read;
3248                         }
3249
3250                         /*
3251                          * Special hack for broken Linux with no working sendfile. If we
3252                          * return EINTR we sent the header but not the rest of the data.
3253                          * Fake this up by doing read/write calls.
3254                          */
3255
3256                         if (errno == EINTR) {
3257                                 /* Ensure we don't do this again. */
3258                                 set_use_sendfile(SNUM(conn), False);
3259                                 DEBUG(0,("send_file_readX: sendfile not available. Faking..\n"));
3260                                 nread = fake_sendfile(fsp, startpos,
3261                                                       smb_maxcnt);
3262                                 if (nread == -1) {
3263                                         DEBUG(0,("send_file_readX: fake_sendfile failed for file %s (%s).\n",
3264                                                 fsp->fsp_name, strerror(errno) ));
3265                                         exit_server_cleanly("send_file_readX: fake_sendfile failed");
3266                                 }
3267                                 DEBUG( 3, ( "send_file_readX: fake_sendfile fnum=%d max=%d nread=%d\n",
3268                                         fsp->fnum, (int)smb_maxcnt, (int)nread ) );
3269                                 /* No outbuf here means successful sendfile. */
3270                                 TALLOC_FREE(req->outbuf);
3271                                 return;
3272                         }
3273
3274                         DEBUG(0,("send_file_readX: sendfile failed for file %s (%s). Terminating\n",
3275                                 fsp->fsp_name, strerror(errno) ));
3276                         exit_server_cleanly("send_file_readX sendfile failed");
3277                 }
3278
3279                 DEBUG( 3, ( "send_file_readX: sendfile fnum=%d max=%d nread=%d\n",
3280                         fsp->fnum, (int)smb_maxcnt, (int)nread ) );
3281
3282                 /* Deal with possible short send. */
3283                 if (nread != smb_maxcnt + sizeof(headerbuf)) {
3284                         sendfile_short_send(fsp, nread, sizeof(headerbuf), smb_maxcnt);
3285                 }
3286
3287                 /* No outbuf here means successful sendfile. */
3288                 TALLOC_FREE(req->outbuf);
3289                 return;
3290         }
3291 #endif
3292
3293 normal_read:
3294
3295         if ((smb_maxcnt & 0xFF0000) > 0x10000) {
3296                 uint8 headerbuf[smb_size + 2*12];
3297
3298                 construct_reply_common_req(req, (char *)headerbuf);
3299                 setup_readX_header((char *)headerbuf, smb_maxcnt);
3300
3301                 /* Send out the header. */
3302                 if (write_data(smbd_server_fd(), (char *)headerbuf,
3303                                sizeof(headerbuf)) != sizeof(headerbuf)) {
3304                         DEBUG(0,("send_file_readX: write_data failed for file %s (%s). Terminating\n",
3305                                 fsp->fsp_name, strerror(errno) ));
3306                         exit_server_cleanly("send_file_readX sendfile failed");
3307                 }
3308                 nread = fake_sendfile(fsp, startpos, smb_maxcnt);
3309                 if (nread == -1) {
3310                         DEBUG(0,("send_file_readX: fake_sendfile failed for file %s (%s).\n",
3311                                 fsp->fsp_name, strerror(errno) ));
3312                         exit_server_cleanly("send_file_readX: fake_sendfile failed");
3313                 }
3314                 TALLOC_FREE(req->outbuf);
3315                 return;
3316         }
3317
3318         reply_outbuf(req, 12, smb_maxcnt);
3319
3320         nread = read_file(fsp, smb_buf(req->outbuf), startpos, smb_maxcnt);
3321         if (nread < 0) {
3322                 reply_unixerror(req, ERRDOS, ERRnoaccess);
3323                 return;
3324         }
3325
3326         setup_readX_header((char *)req->outbuf, nread);
3327
3328         DEBUG( 3, ( "send_file_readX fnum=%d max=%d nread=%d\n",
3329                     fsp->fnum, (int)smb_maxcnt, (int)nread ) );
3330
3331         chain_reply(req);
3332 }
3333
3334 /****************************************************************************
3335  Reply to a read and X.
3336 ****************************************************************************/
3337
3338 void reply_read_and_X(struct smb_request *req)
3339 {
3340         connection_struct *conn = req->conn;
3341         files_struct *fsp;
3342         SMB_OFF_T startpos;
3343         size_t smb_maxcnt;
3344         bool big_readX = False;
3345 #if 0
3346         size_t smb_mincnt = SVAL(req->vwv+6, 0);
3347 #endif
3348
3349         START_PROFILE(SMBreadX);
3350
3351         if ((req->wct != 10) && (req->wct != 12)) {
3352                 reply_nterror(req, NT_STATUS_INVALID_PARAMETER);
3353                 return;
3354         }
3355
3356         fsp = file_fsp(req, SVAL(req->vwv+2, 0));
3357         startpos = IVAL_TO_SMB_OFF_T(req->vwv+3, 0);
3358         smb_maxcnt = SVAL(req->vwv+5, 0);
3359
3360         /* If it's an IPC, pass off the pipe handler. */
3361         if (IS_IPC(conn)) {
3362                 reply_pipe_read_and_X(req);
3363                 END_PROFILE(SMBreadX);
3364                 return;
3365         }
3366
3367         if (!check_fsp(conn, req, fsp)) {
3368                 END_PROFILE(SMBreadX);
3369                 return;
3370         }
3371
3372         if (!CHECK_READ(fsp,req)) {
3373                 reply_doserror(req, ERRDOS,ERRbadaccess);
3374                 END_PROFILE(SMBreadX);
3375                 return;
3376         }
3377
3378         if (global_client_caps & CAP_LARGE_READX) {
3379                 size_t upper_size = SVAL(req->vwv+7, 0);
3380                 smb_maxcnt |= (upper_size<<16);
3381                 if (upper_size > 1) {
3382                         /* Can't do this on a chained packet. */
3383                         if ((CVAL(req->vwv+0, 0) != 0xFF)) {
3384                                 reply_nterror(req, NT_STATUS_NOT_SUPPORTED);
3385                                 END_PROFILE(SMBreadX);
3386                                 return;
3387                         }
3388                         /* We currently don't do this on signed or sealed data. */
3389                         if (srv_is_signing_active() || is_encrypted_packet(req->inbuf)) {
3390                                 reply_nterror(req, NT_STATUS_NOT_SUPPORTED);
3391                                 END_PROFILE(SMBreadX);
3392                                 return;
3393                         }
3394                         /* Is there room in the reply for this data ? */
3395                         if (smb_maxcnt > (0xFFFFFF - (smb_size -4 + 12*2)))  {
3396                                 reply_nterror(req,
3397                                               NT_STATUS_INVALID_PARAMETER);
3398                                 END_PROFILE(SMBreadX);
3399                                 return;
3400                         }
3401                         big_readX = True;
3402                 }
3403         }
3404
3405         if (req->wct == 12) {
3406 #ifdef LARGE_SMB_OFF_T
3407                 /*
3408                  * This is a large offset (64 bit) read.
3409                  */
3410                 startpos |= (((SMB_OFF_T)IVAL(req->vwv+10, 0)) << 32);
3411
3412 #else /* !LARGE_SMB_OFF_T */
3413
3414                 /*
3415                  * Ensure we haven't been sent a >32 bit offset.
3416                  */
3417
3418                 if(IVAL(req->vwv+10, 0) != 0) {
3419                         DEBUG(0,("reply_read_and_X - large offset (%x << 32) "
3420                                  "used and we don't support 64 bit offsets.\n",
3421                                  (unsigned int)IVAL(req->vwv+10, 0) ));
3422                         END_PROFILE(SMBreadX);
3423                         reply_doserror(req, ERRDOS, ERRbadaccess);
3424                         return;
3425                 }
3426
3427 #endif /* LARGE_SMB_OFF_T */
3428
3429         }
3430
3431         if (is_locked(fsp, (uint32)req->smbpid, (uint64_t)smb_maxcnt,
3432                       (uint64_t)startpos, READ_LOCK)) {
3433                 END_PROFILE(SMBreadX);
3434                 reply_doserror(req, ERRDOS, ERRlock);
3435                 return;
3436         }
3437
3438         if (!big_readX &&
3439             schedule_aio_read_and_X(conn, req, fsp, startpos, smb_maxcnt)) {
3440                 END_PROFILE(SMBreadX);
3441                 return;
3442         }
3443
3444         send_file_readX(conn, req, fsp, startpos, smb_maxcnt);
3445
3446         END_PROFILE(SMBreadX);
3447         return;
3448 }
3449
3450 /****************************************************************************
3451  Error replies to writebraw must have smb_wct == 1. Fix this up.
3452 ****************************************************************************/
3453
3454 void error_to_writebrawerr(struct smb_request *req)
3455 {
3456         uint8 *old_outbuf = req->outbuf;
3457
3458         reply_outbuf(req, 1, 0);
3459
3460         memcpy(req->outbuf, old_outbuf, smb_size);
3461         TALLOC_FREE(old_outbuf);
3462 }
3463
3464 /****************************************************************************
3465  Reply to a writebraw (core+ or LANMAN1.0 protocol).
3466 ****************************************************************************/
3467
3468 void reply_writebraw(struct smb_request *req)
3469 {
3470         connection_struct *conn = req->conn;
3471         char *buf = NULL;
3472         ssize_t nwritten=0;
3473         ssize_t total_written=0;
3474         size_t numtowrite=0;
3475         size_t tcount;
3476         SMB_OFF_T startpos;
3477         char *data=NULL;
3478         bool write_through;
3479         files_struct *fsp;
3480         NTSTATUS status;
3481
3482         START_PROFILE(SMBwritebraw);
3483
3484         /*
3485          * If we ever reply with an error, it must have the SMB command
3486          * type of SMBwritec, not SMBwriteBraw, as this tells the client
3487          * we're finished.
3488          */
3489         SCVAL(req->inbuf,smb_com,SMBwritec);
3490
3491         if (srv_is_signing_active()) {
3492                 END_PROFILE(SMBwritebraw);
3493                 exit_server_cleanly("reply_writebraw: SMB signing is active - "
3494                                 "raw reads/writes are disallowed.");
3495         }
3496
3497         if (req->wct < 12) {
3498                 reply_nterror(req, NT_STATUS_INVALID_PARAMETER);
3499                 error_to_writebrawerr(req);
3500                 END_PROFILE(SMBwritebraw);
3501                 return;
3502         }
3503
3504         fsp = file_fsp(req, SVAL(req->vwv+0, 0));
3505         if (!check_fsp(conn, req, fsp)) {
3506                 error_to_writebrawerr(req);
3507                 END_PROFILE(SMBwritebraw);
3508                 return;
3509         }
3510
3511         if (!CHECK_WRITE(fsp)) {
3512                 reply_doserror(req, ERRDOS, ERRbadaccess);
3513                 error_to_writebrawerr(req);
3514                 END_PROFILE(SMBwritebraw);
3515                 return;
3516         }
3517
3518         tcount = IVAL(req->vwv+1, 0);
3519         startpos = IVAL_TO_SMB_OFF_T(req->vwv+3, 0);
3520         write_through = BITSETW(req->vwv+7,0);
3521
3522         /* We have to deal with slightly different formats depending
3523                 on whether we are using the core+ or lanman1.0 protocol */
3524
3525         if(Protocol <= PROTOCOL_COREPLUS) {
3526                 numtowrite = SVAL(smb_buf(req->inbuf),-2);
3527                 data = smb_buf(req->inbuf);
3528         } else {
3529                 numtowrite = SVAL(req->vwv+10, 0);
3530                 data = smb_base(req->inbuf) + SVAL(req->vwv+11, 0);
3531         }
3532
3533         /* Ensure we don't write bytes past the end of this packet. */
3534         if (data + numtowrite > smb_base(req->inbuf) + smb_len(req->inbuf)) {
3535                 reply_nterror(req, NT_STATUS_INVALID_PARAMETER);
3536                 error_to_writebrawerr(req);
3537                 END_PROFILE(SMBwritebraw);
3538                 return;
3539         }
3540
3541         if (is_locked(fsp,(uint32)req->smbpid,(uint64_t)tcount,
3542                                 (uint64_t)startpos, WRITE_LOCK)) {
3543                 reply_doserror(req, ERRDOS, ERRlock);
3544                 error_to_writebrawerr(req);
3545                 END_PROFILE(SMBwritebraw);
3546                 return;
3547         }
3548
3549         if (numtowrite>0) {
3550                 nwritten = write_file(req,fsp,data,startpos,numtowrite);
3551         }
3552
3553         DEBUG(3,("reply_writebraw: initial write fnum=%d start=%.0f num=%d "
3554                         "wrote=%d sync=%d\n",
3555                 fsp->fnum, (double)startpos, (int)numtowrite,
3556                 (int)nwritten, (int)write_through));
3557
3558         if (nwritten < (ssize_t)numtowrite)  {
3559                 reply_unixerror(req, ERRHRD, ERRdiskfull);
3560                 error_to_writebrawerr(req);
3561                 END_PROFILE(SMBwritebraw);
3562                 return;
3563         }
3564
3565         total_written = nwritten;
3566
3567         /* Allocate a buffer of 64k + length. */
3568         buf = TALLOC_ARRAY(NULL, char, 65540);
3569         if (!buf) {
3570                 reply_doserror(req, ERRDOS, ERRnomem);
3571                 error_to_writebrawerr(req);
3572                 END_PROFILE(SMBwritebraw);
3573                 return;
3574         }
3575
3576         /* Return a SMBwritebraw message to the redirector to tell
3577          * it to send more bytes */
3578
3579         memcpy(buf, req->inbuf, smb_size);
3580         srv_set_message(buf,Protocol>PROTOCOL_COREPLUS?1:0,0,True);
3581         SCVAL(buf,smb_com,SMBwritebraw);
3582         SSVALS(buf,smb_vwv0,0xFFFF);
3583         show_msg(buf);
3584         if (!srv_send_smb(smbd_server_fd(),
3585                         buf,
3586                         IS_CONN_ENCRYPTED(conn))) {
3587                 exit_server_cleanly("reply_writebraw: srv_send_smb "
3588                         "failed.");
3589         }
3590
3591         /* Now read the raw data into the buffer and write it */
3592         status = read_smb_length(smbd_server_fd(), buf, SMB_SECONDARY_WAIT,
3593                                  &numtowrite);
3594         if (!NT_STATUS_IS_OK(status)) {
3595                 exit_server_cleanly("secondary writebraw failed");
3596         }
3597
3598         /* Set up outbuf to return the correct size */
3599         reply_outbuf(req, 1, 0);
3600
3601         if (numtowrite != 0) {
3602
3603                 if (numtowrite > 0xFFFF) {
3604                         DEBUG(0,("reply_writebraw: Oversize secondary write "
3605                                 "raw requested (%u). Terminating\n",
3606                                 (unsigned int)numtowrite ));
3607                         exit_server_cleanly("secondary writebraw failed");
3608                 }
3609
3610                 if (tcount > nwritten+numtowrite) {
3611                         DEBUG(3,("reply_writebraw: Client overestimated the "
3612                                 "write %d %d %d\n",
3613                                 (int)tcount,(int)nwritten,(int)numtowrite));
3614                 }
3615
3616                 status = read_data(smbd_server_fd(), buf+4, numtowrite);
3617
3618                 if (!NT_STATUS_IS_OK(status)) {
3619                         DEBUG(0,("reply_writebraw: Oversize secondary write "
3620                                  "raw read failed (%s). Terminating\n",
3621                                  nt_errstr(status)));
3622                         exit_server_cleanly("secondary writebraw failed");
3623                 }
3624
3625                 nwritten = write_file(req,fsp,buf+4,startpos+nwritten,numtowrite);
3626                 if (nwritten == -1) {
3627                         TALLOC_FREE(buf);
3628                         reply_unixerror(req, ERRHRD, ERRdiskfull);
3629                         error_to_writebrawerr(req);
3630                         END_PROFILE(SMBwritebraw);
3631                         return;
3632                 }
3633
3634                 if (nwritten < (ssize_t)numtowrite) {
3635                         SCVAL(req->outbuf,smb_rcls,ERRHRD);
3636                         SSVAL(req->outbuf,smb_err,ERRdiskfull);
3637                 }
3638
3639                 if (nwritten > 0) {
3640                         total_written += nwritten;
3641                 }
3642         }
3643
3644         TALLOC_FREE(buf);
3645         SSVAL(req->outbuf,smb_vwv0,total_written);
3646
3647         status = sync_file(conn, fsp, write_through);
3648         if (!NT_STATUS_IS_OK(status)) {
3649                 DEBUG(5,("reply_writebraw: sync_file for %s returned %s\n",
3650                         fsp->fsp_name, nt_errstr(status) ));
3651                 reply_nterror(req, status);
3652                 error_to_writebrawerr(req);
3653                 END_PROFILE(SMBwritebraw);
3654                 return;
3655         }
3656
3657         DEBUG(3,("reply_writebraw: secondart write fnum=%d start=%.0f num=%d "
3658                 "wrote=%d\n",
3659                 fsp->fnum, (double)startpos, (int)numtowrite,
3660                 (int)total_written));
3661
3662         /* We won't return a status if write through is not selected - this
3663          * follows what WfWg does */
3664         END_PROFILE(SMBwritebraw);
3665
3666         if (!write_through && total_written==tcount) {
3667
3668 #if RABBIT_PELLET_FIX
3669                 /*
3670                  * Fix for "rabbit pellet" mode, trigger an early TCP ack by
3671                  * sending a SMBkeepalive. Thanks to DaveCB at Sun for this.
3672                  * JRA.
3673                  */
3674                 if (!send_keepalive(smbd_server_fd())) {
3675                         exit_server_cleanly("reply_writebraw: send of "
3676                                 "keepalive failed");
3677                 }
3678 #endif
3679                 TALLOC_FREE(req->outbuf);
3680         }
3681         return;
3682 }
3683
3684 #undef DBGC_CLASS
3685 #define DBGC_CLASS DBGC_LOCKING
3686
3687 /****************************************************************************
3688  Reply to a writeunlock (core+).
3689 ****************************************************************************/
3690
3691 void reply_writeunlock(struct smb_request *req)
3692 {
3693         connection_struct *conn = req->conn;
3694         ssize_t nwritten = -1;
3695         size_t numtowrite;
3696         SMB_OFF_T startpos;
3697         const char *data;
3698         NTSTATUS status = NT_STATUS_OK;
3699         files_struct *fsp;
3700
3701         START_PROFILE(SMBwriteunlock);
3702
3703         if (req->wct < 5) {
3704                 reply_nterror(req, NT_STATUS_INVALID_PARAMETER);
3705                 END_PROFILE(SMBwriteunlock);
3706                 return;
3707         }
3708
3709         fsp = file_fsp(req, SVAL(req->vwv+0, 0));
3710
3711         if (!check_fsp(conn, req, fsp)) {
3712                 END_PROFILE(SMBwriteunlock);
3713                 return;
3714         }
3715
3716         if (!CHECK_WRITE(fsp)) {
3717                 reply_doserror(req, ERRDOS,ERRbadaccess);
3718                 END_PROFILE(SMBwriteunlock);
3719                 return;
3720         }
3721
3722         numtowrite = SVAL(req->vwv+1, 0);
3723         startpos = IVAL_TO_SMB_OFF_T(req->vwv+2, 0);
3724         data = (const char *)req->buf + 3;
3725
3726         if (numtowrite
3727             && is_locked(fsp, (uint32)req->smbpid, (uint64_t)numtowrite,
3728                          (uint64_t)startpos, WRITE_LOCK)) {
3729                 reply_doserror(req, ERRDOS, ERRlock);
3730                 END_PROFILE(SMBwriteunlock);
3731                 return;
3732         }
3733
3734         /* The special X/Open SMB protocol handling of
3735            zero length writes is *NOT* done for
3736            this call */
3737         if(numtowrite == 0) {
3738                 nwritten = 0;
3739         } else {
3740                 nwritten = write_file(req,fsp,data,startpos,numtowrite);
3741         }
3742
3743         status = sync_file(conn, fsp, False /* write through */);
3744         if (!NT_STATUS_IS_OK(status)) {
3745                 DEBUG(5,("reply_writeunlock: sync_file for %s returned %s\n",
3746                         fsp->fsp_name, nt_errstr(status) ));
3747                 reply_nterror(req, status);
3748                 END_PROFILE(SMBwriteunlock);
3749                 return;
3750         }
3751
3752         if(((nwritten < numtowrite) && (numtowrite != 0))||(nwritten < 0)) {
3753                 reply_unixerror(req, ERRHRD, ERRdiskfull);
3754                 END_PROFILE(SMBwriteunlock);
3755                 return;
3756         }
3757
3758         if (numtowrite) {
3759                 status = do_unlock(smbd_messaging_context(),
3760                                 fsp,
3761                                 req->smbpid,
3762                                 (uint64_t)numtowrite, 
3763                                 (uint64_t)startpos,
3764                                 WINDOWS_LOCK);
3765
3766                 if (NT_STATUS_V(status)) {
3767                         reply_nterror(req, status);
3768                         END_PROFILE(SMBwriteunlock);
3769                         return;
3770                 }
3771         }
3772
3773         reply_outbuf(req, 1, 0);
3774
3775         SSVAL(req->outbuf,smb_vwv0,nwritten);
3776
3777         DEBUG(3,("writeunlock fnum=%d num=%d wrote=%d\n",
3778                  fsp->fnum, (int)numtowrite, (int)nwritten));
3779
3780         END_PROFILE(SMBwriteunlock);
3781         return;
3782 }
3783
3784 #undef DBGC_CLASS
3785 #define DBGC_CLASS DBGC_ALL
3786
3787 /****************************************************************************
3788  Reply to a write.
3789 ****************************************************************************/
3790
3791 void reply_write(struct smb_request *req)
3792 {
3793         connection_struct *conn = req->conn;
3794         size_t numtowrite;
3795         ssize_t nwritten = -1;
3796         SMB_OFF_T startpos;
3797         const char *data;
3798         files_struct *fsp;
3799         NTSTATUS status;
3800
3801         START_PROFILE(SMBwrite);
3802
3803         if (req->wct < 5) {
3804                 END_PROFILE(SMBwrite);
3805                 reply_nterror(req, NT_STATUS_INVALID_PARAMETER);
3806                 return;
3807         }
3808
3809         /* If it's an IPC, pass off the pipe handler. */
3810         if (IS_IPC(conn)) {
3811                 reply_pipe_write(req);
3812                 END_PROFILE(SMBwrite);
3813                 return;
3814         }
3815
3816         fsp = file_fsp(req, SVAL(req->vwv+0, 0));
3817
3818         if (!check_fsp(conn, req, fsp)) {
3819                 END_PROFILE(SMBwrite);
3820                 return;
3821         }
3822
3823         if (!CHECK_WRITE(fsp)) {
3824                 reply_doserror(req, ERRDOS, ERRbadaccess);
3825                 END_PROFILE(SMBwrite);
3826                 return;
3827         }
3828
3829         numtowrite = SVAL(req->vwv+1, 0);
3830         startpos = IVAL_TO_SMB_OFF_T(req->vwv+2, 0);
3831         data = (const char *)req->buf + 3;
3832
3833         if (is_locked(fsp, (uint32)req->smbpid, (uint64_t)numtowrite,
3834                       (uint64_t)startpos, WRITE_LOCK)) {
3835                 reply_doserror(req, ERRDOS, ERRlock);
3836                 END_PROFILE(SMBwrite);
3837                 return;
3838         }
3839
3840         /*
3841          * X/Open SMB protocol says that if smb_vwv1 is
3842          * zero then the file size should be extended or
3843          * truncated to the size given in smb_vwv[2-3].
3844          */
3845
3846         if(numtowrite == 0) {
3847                 /*
3848                  * This is actually an allocate call, and set EOF. JRA.
3849                  */
3850                 nwritten = vfs_allocate_file_space(fsp, (SMB_OFF_T)startpos);
3851                 if (nwritten < 0) {
3852                         reply_nterror(req, NT_STATUS_DISK_FULL);
3853                         END_PROFILE(SMBwrite);
3854                         return;
3855                 }
3856                 nwritten = vfs_set_filelen(fsp, (SMB_OFF_T)startpos);
3857                 if (nwritten < 0) {
3858                         reply_nterror(req, NT_STATUS_DISK_FULL);
3859                         END_PROFILE(SMBwrite);
3860                         return;
3861                 }
3862                 trigger_write_time_update_immediate(fsp);
3863         } else {
3864                 nwritten = write_file(req,fsp,data,startpos,numtowrite);
3865         }
3866
3867         status = sync_file(conn, fsp, False);
3868         if (!NT_STATUS_IS_OK(status)) {
3869                 DEBUG(5,("reply_write: sync_file for %s returned %s\n",
3870                         fsp->fsp_name, nt_errstr(status) ));
3871                 reply_nterror(req, status);
3872                 END_PROFILE(SMBwrite);
3873                 return;
3874         }
3875
3876         if(((nwritten == 0) && (numtowrite != 0))||(nwritten < 0)) {
3877                 reply_unixerror(req, ERRHRD, ERRdiskfull);
3878                 END_PROFILE(SMBwrite);
3879                 return;
3880         }
3881
3882         reply_outbuf(req, 1, 0);
3883
3884         SSVAL(req->outbuf,smb_vwv0,nwritten);
3885
3886         if (nwritten < (ssize_t)numtowrite) {
3887                 SCVAL(req->outbuf,smb_rcls,ERRHRD);
3888                 SSVAL(req->outbuf,smb_err,ERRdiskfull);
3889         }
3890
3891         DEBUG(3,("write fnum=%d num=%d wrote=%d\n", fsp->fnum, (int)numtowrite, (int)nwritten));
3892
3893         END_PROFILE(SMBwrite);
3894         return;
3895 }
3896
3897 /****************************************************************************
3898  Ensure a buffer is a valid writeX for recvfile purposes.
3899 ****************************************************************************/
3900
3901 #define STANDARD_WRITE_AND_X_HEADER_SIZE (smb_size - 4 + /* basic header */ \
3902                                                 (2*14) + /* word count (including bcc) */ \
3903                                                 1 /* pad byte */)
3904
3905 bool is_valid_writeX_buffer(const uint8_t *inbuf)
3906 {
3907         size_t numtowrite;
3908         connection_struct *conn = NULL;
3909         unsigned int doff = 0;
3910         size_t len = smb_len_large(inbuf);
3911
3912         if (is_encrypted_packet(inbuf)) {
3913                 /* Can't do this on encrypted
3914                  * connections. */
3915                 return false;
3916         }
3917
3918         if (CVAL(inbuf,smb_com) != SMBwriteX) {
3919                 return false;
3920         }
3921
3922         if (CVAL(inbuf,smb_vwv0) != 0xFF ||
3923                         CVAL(inbuf,smb_wct) != 14) {
3924                 DEBUG(10,("is_valid_writeX_buffer: chained or "
3925                         "invalid word length.\n"));
3926                 return false;
3927         }
3928
3929         conn = conn_find(SVAL(inbuf, smb_tid));
3930         if (conn == NULL) {
3931                 DEBUG(10,("is_valid_writeX_buffer: bad tid\n"));
3932                 return false;
3933         }
3934         if (IS_IPC(conn)) {
3935                 DEBUG(10,("is_valid_writeX_buffer: IPC$ tid\n"));
3936                 return false;
3937         }
3938         if (IS_PRINT(conn)) {
3939                 DEBUG(10,("is_valid_writeX_buffer: printing tid\n"));
3940                 return false;
3941         }
3942         doff = SVAL(inbuf,smb_vwv11);
3943
3944         numtowrite = SVAL(inbuf,smb_vwv10);
3945
3946         if (len > doff && len - doff > 0xFFFF) {
3947                 numtowrite |= (((size_t)SVAL(inbuf,smb_vwv9))<<16);
3948         }
3949
3950         if (numtowrite == 0) {
3951                 DEBUG(10,("is_valid_writeX_buffer: zero write\n"));
3952                 return false;
3953         }
3954
3955         /* Ensure the sizes match up. */
3956         if (doff < STANDARD_WRITE_AND_X_HEADER_SIZE) {
3957                 /* no pad byte...old smbclient :-( */
3958                 DEBUG(10,("is_valid_writeX_buffer: small doff %u (min %u)\n",
3959                         (unsigned int)doff,
3960                         (unsigned int)STANDARD_WRITE_AND_X_HEADER_SIZE));
3961                 return false;
3962         }
3963
3964         if (len - doff != numtowrite) {
3965                 DEBUG(10,("is_valid_writeX_buffer: doff mismatch "
3966                         "len = %u, doff = %u, numtowrite = %u\n",
3967                         (unsigned int)len,
3968                         (unsigned int)doff,
3969                         (unsigned int)numtowrite ));
3970                 return false;
3971         }
3972
3973         DEBUG(10,("is_valid_writeX_buffer: true "
3974                 "len = %u, doff = %u, numtowrite = %u\n",
3975                 (unsigned int)len,
3976                 (unsigned int)doff,
3977                 (unsigned int)numtowrite ));
3978
3979         return true;
3980 }
3981
3982 /****************************************************************************
3983  Reply to a write and X.
3984 ****************************************************************************/
3985
3986 void reply_write_and_X(struct smb_request *req)
3987 {
3988         connection_struct *conn = req->conn;
3989         files_struct *fsp;
3990         SMB_OFF_T startpos;
3991         size_t numtowrite;
3992         bool write_through;
3993         ssize_t nwritten;
3994         unsigned int smb_doff;
3995         unsigned int smblen;
3996         char *data;
3997         NTSTATUS status;
3998
3999         START_PROFILE(SMBwriteX);
4000
4001         if ((req->wct != 12) && (req->wct != 14)) {
4002                 reply_nterror(req, NT_STATUS_INVALID_PARAMETER);
4003                 END_PROFILE(SMBwriteX);
4004                 return;
4005         }
4006
4007         numtowrite = SVAL(req->vwv+10, 0);
4008         smb_doff = SVAL(req->vwv+11, 0);
4009         smblen = smb_len(req->inbuf);
4010
4011         if (req->unread_bytes > 0xFFFF ||
4012                         (smblen > smb_doff &&
4013                                 smblen - smb_doff > 0xFFFF)) {
4014                 numtowrite |= (((size_t)SVAL(req->vwv+9, 0))<<16);
4015         }
4016
4017         if (req->unread_bytes) {
4018                 /* Can't do a recvfile write on IPC$ */
4019                 if (IS_IPC(conn)) {
4020                         reply_nterror(req, NT_STATUS_INVALID_PARAMETER);
4021                         END_PROFILE(SMBwriteX);
4022                         return;
4023                 }
4024                 if (numtowrite != req->unread_bytes) {
4025                         reply_doserror(req, ERRDOS, ERRbadmem);
4026                         END_PROFILE(SMBwriteX);
4027                         return;
4028                 }
4029         } else {
4030                 if (smb_doff > smblen || smb_doff + numtowrite < numtowrite ||
4031                                 smb_doff + numtowrite > smblen) {
4032                         reply_doserror(req, ERRDOS, ERRbadmem);
4033                         END_PROFILE(SMBwriteX);
4034                         return;
4035                 }
4036         }
4037
4038         /* If it's an IPC, pass off the pipe handler. */
4039         if (IS_IPC(conn)) {
4040                 if (req->unread_bytes) {
4041                         reply_doserror(req, ERRDOS, ERRbadmem);
4042                         END_PROFILE(SMBwriteX);
4043                         return;
4044                 }
4045                 reply_pipe_write_and_X(req);
4046                 END_PROFILE(SMBwriteX);
4047                 return;
4048         }
4049
4050         fsp = file_fsp(req, SVAL(req->vwv+2, 0));
4051         startpos = IVAL_TO_SMB_OFF_T(req->vwv+3, 0);
4052         write_through = BITSETW(req->vwv+7,0);
4053
4054         if (!check_fsp(conn, req, fsp)) {
4055                 END_PROFILE(SMBwriteX);
4056                 return;
4057         }
4058
4059         if (!CHECK_WRITE(fsp)) {
4060                 reply_doserror(req, ERRDOS, ERRbadaccess);
4061                 END_PROFILE(SMBwriteX);
4062                 return;
4063         }
4064
4065         data = smb_base(req->inbuf) + smb_doff;
4066
4067         if(req->wct == 14) {
4068 #ifdef LARGE_SMB_OFF_T
4069                 /*
4070                  * This is a large offset (64 bit) write.
4071                  */
4072                 startpos |= (((SMB_OFF_T)IVAL(req->vwv+12, 0)) << 32);
4073
4074 #else /* !LARGE_SMB_OFF_T */
4075
4076                 /*
4077                  * Ensure we haven't been sent a >32 bit offset.
4078                  */
4079
4080                 if(IVAL(req->vwv+12, 0) != 0) {
4081                         DEBUG(0,("reply_write_and_X - large offset (%x << 32) "
4082                                  "used and we don't support 64 bit offsets.\n",
4083                                  (unsigned int)IVAL(req->vwv+12, 0) ));
4084                         reply_doserror(req, ERRDOS, ERRbadaccess);
4085                         END_PROFILE(SMBwriteX);
4086                         return;
4087                 }
4088
4089 #endif /* LARGE_SMB_OFF_T */
4090         }
4091
4092         if (is_locked(fsp,(uint32)req->smbpid,
4093                       (uint64_t)numtowrite,
4094                       (uint64_t)startpos, WRITE_LOCK)) {
4095                 reply_doserror(req, ERRDOS, ERRlock);
4096                 END_PROFILE(SMBwriteX);
4097                 return;
4098         }
4099
4100         /* X/Open SMB protocol says that, unlike SMBwrite
4101         if the length is zero then NO truncation is
4102         done, just a write of zero. To truncate a file,
4103         use SMBwrite. */
4104
4105         if(numtowrite == 0) {
4106                 nwritten = 0;
4107         } else {
4108
4109                 if ((req->unread_bytes == 0) &&
4110                     schedule_aio_write_and_X(conn, req, fsp, data, startpos,
4111                                              numtowrite)) {
4112                         END_PROFILE(SMBwriteX);
4113                         return;
4114                 }
4115
4116                 nwritten = write_file(req,fsp,data,startpos,numtowrite);
4117         }
4118
4119         if(((nwritten == 0) && (numtowrite != 0))||(nwritten < 0)) {
4120                 reply_unixerror(req, ERRHRD, ERRdiskfull);
4121                 END_PROFILE(SMBwriteX);
4122                 return;
4123         }
4124
4125         reply_outbuf(req, 6, 0);
4126         SSVAL(req->outbuf,smb_vwv2,nwritten);
4127         SSVAL(req->outbuf,smb_vwv4,nwritten>>16);
4128
4129         if (nwritten < (ssize_t)numtowrite) {
4130                 SCVAL(req->outbuf,smb_rcls,ERRHRD);
4131                 SSVAL(req->outbuf,smb_err,ERRdiskfull);
4132         }
4133
4134         DEBUG(3,("writeX fnum=%d num=%d wrote=%d\n",
4135                 fsp->fnum, (int)numtowrite, (int)nwritten));
4136
4137         status = sync_file(conn, fsp, write_through);
4138         if (!NT_STATUS_IS_OK(status)) {
4139                 DEBUG(5,("reply_write_and_X: sync_file for %s returned %s\n",
4140                         fsp->fsp_name, nt_errstr(status) ));
4141                 reply_nterror(req, status);
4142                 END_PROFILE(SMBwriteX);
4143                 return;
4144         }
4145
4146         END_PROFILE(SMBwriteX);
4147         chain_reply(req);
4148         return;
4149 }
4150
4151 /****************************************************************************
4152  Reply to a lseek.
4153 ****************************************************************************/
4154
4155 void reply_lseek(struct smb_request *req)
4156 {
4157         connection_struct *conn = req->conn;
4158         SMB_OFF_T startpos;
4159         SMB_OFF_T res= -1;
4160         int mode,umode;
4161         files_struct *fsp;
4162
4163         START_PROFILE(SMBlseek);
4164
4165         if (req->wct < 4) {
4166                 reply_nterror(req, NT_STATUS_INVALID_PARAMETER);
4167                 END_PROFILE(SMBlseek);
4168                 return;
4169         }
4170
4171         fsp = file_fsp(req, SVAL(req->vwv+0, 0));
4172
4173         if (!check_fsp(conn, req, fsp)) {
4174                 return;
4175         }
4176
4177         flush_write_cache(fsp, SEEK_FLUSH);
4178
4179         mode = SVAL(req->vwv+1, 0) & 3;
4180         /* NB. This doesn't use IVAL_TO_SMB_OFF_T as startpos can be signed in this case. */
4181         startpos = (SMB_OFF_T)IVALS(req->vwv+2, 0);
4182
4183         switch (mode) {
4184                 case 0:
4185                         umode = SEEK_SET;
4186                         res = startpos;
4187                         break;
4188                 case 1:
4189                         umode = SEEK_CUR;
4190                         res = fsp->fh->pos + startpos;
4191                         break;
4192                 case 2:
4193                         umode = SEEK_END;
4194                         break;
4195                 default:
4196                         umode = SEEK_SET;
4197                         res = startpos;
4198                         break;
4199         }
4200
4201         if (umode == SEEK_END) {
4202                 if((res = SMB_VFS_LSEEK(fsp,startpos,umode)) == -1) {
4203                         if(errno == EINVAL) {
4204                                 SMB_OFF_T current_pos = startpos;
4205                                 SMB_STRUCT_STAT sbuf;
4206
4207                                 if(SMB_VFS_FSTAT(fsp, &sbuf) == -1) {
4208                                         reply_unixerror(req, ERRDOS,
4209                                                         ERRnoaccess);
4210                                         END_PROFILE(SMBlseek);
4211                                         return;
4212                                 }
4213
4214                                 current_pos += sbuf.st_size;
4215                                 if(current_pos < 0)
4216                                         res = SMB_VFS_LSEEK(fsp,0,SEEK_SET);
4217                         }
4218                 }
4219
4220                 if(res == -1) {
4221                         reply_unixerror(req, ERRDOS, ERRnoaccess);
4222                         END_PROFILE(SMBlseek);
4223                         return;
4224                 }
4225         }
4226
4227         fsp->fh->pos = res;
4228
4229         reply_outbuf(req, 2, 0);
4230         SIVAL(req->outbuf,smb_vwv0,res);
4231
4232         DEBUG(3,("lseek fnum=%d ofs=%.0f newpos = %.0f mode=%d\n",
4233                 fsp->fnum, (double)startpos, (double)res, mode));
4234
4235         END_PROFILE(SMBlseek);
4236         return;
4237 }
4238
4239 /****************************************************************************
4240  Reply to a flush.
4241 ****************************************************************************/
4242
4243 void reply_flush(struct smb_request *req)
4244 {
4245         connection_struct *conn = req->conn;
4246         uint16 fnum;
4247         files_struct *fsp;
4248
4249         START_PROFILE(SMBflush);
4250
4251         if (req->wct < 1) {
4252                 reply_nterror(req, NT_STATUS_INVALID_PARAMETER);
4253                 return;
4254         }
4255
4256         fnum = SVAL(req->vwv+0, 0);
4257         fsp = file_fsp(req, fnum);
4258
4259         if ((fnum != 0xFFFF) && !check_fsp(conn, req, fsp)) {
4260                 return;
4261         }
4262
4263         if (!fsp) {
4264                 file_sync_all(conn);
4265         } else {
4266                 NTSTATUS status = sync_file(conn, fsp, True);
4267                 if (!NT_STATUS_IS_OK(status)) {
4268                         DEBUG(5,("reply_flush: sync_file for %s returned %s\n",
4269                                 fsp->fsp_name, nt_errstr(status) ));
4270                         reply_nterror(req, status);
4271                         END_PROFILE(SMBflush);
4272                         return;
4273                 }
4274         }
4275
4276         reply_outbuf(req, 0, 0);
4277
4278         DEBUG(3,("flush\n"));
4279         END_PROFILE(SMBflush);
4280         return;
4281 }
4282
4283 /****************************************************************************
4284  Reply to a exit.
4285  conn POINTER CAN BE NULL HERE !
4286 ****************************************************************************/
4287
4288 void reply_exit(struct smb_request *req)
4289 {
4290         START_PROFILE(SMBexit);
4291
4292         file_close_pid(req->smbpid, req->vuid);
4293
4294         reply_outbuf(req, 0, 0);
4295
4296         DEBUG(3,("exit\n"));
4297
4298         END_PROFILE(SMBexit);
4299         return;
4300 }
4301
4302 /****************************************************************************
4303  Reply to a close - has to deal with closing a directory opened by NT SMB's.
4304 ****************************************************************************/
4305
4306 void reply_close(struct smb_request *req)
4307 {
4308         connection_struct *conn = req->conn;
4309         NTSTATUS status = NT_STATUS_OK;
4310         files_struct *fsp = NULL;
4311         START_PROFILE(SMBclose);
4312
4313         if (req->wct < 3) {
4314                 reply_nterror(req, NT_STATUS_INVALID_PARAMETER);
4315                 END_PROFILE(SMBclose);
4316                 return;
4317         }
4318
4319         fsp = file_fsp(req, SVAL(req->vwv+0, 0));
4320
4321         /*
4322          * We can only use check_fsp if we know it's not a directory.
4323          */
4324
4325         if(!fsp || (fsp->conn != conn) || (fsp->vuid != req->vuid)) {
4326                 reply_doserror(req, ERRDOS, ERRbadfid);
4327                 END_PROFILE(SMBclose);
4328                 return;
4329         }
4330
4331         if(fsp->is_directory) {
4332                 /*
4333                  * Special case - close NT SMB directory handle.
4334                  */
4335                 DEBUG(3,("close directory fnum=%d\n", fsp->fnum));
4336                 status = close_file(req, fsp, NORMAL_CLOSE);
4337         } else {
4338                 time_t t;
4339                 /*
4340                  * Close ordinary file.
4341                  */
4342
4343                 DEBUG(3,("close fd=%d fnum=%d (numopen=%d)\n",
4344                          fsp->fh->fd, fsp->fnum,
4345                          conn->num_files_open));
4346
4347                 /*
4348                  * Take care of any time sent in the close.
4349                  */
4350
4351                 t = srv_make_unix_date3(req->vwv+1);
4352                 set_close_write_time(fsp, convert_time_t_to_timespec(t));
4353
4354                 /*
4355                  * close_file() returns the unix errno if an error
4356                  * was detected on close - normally this is due to
4357                  * a disk full error. If not then it was probably an I/O error.
4358                  */
4359
4360                 status = close_file(req, fsp, NORMAL_CLOSE);
4361         }  
4362
4363         if (!NT_STATUS_IS_OK(status)) {
4364                 reply_nterror(req, status);
4365                 END_PROFILE(SMBclose);
4366                 return;
4367         }
4368
4369         reply_outbuf(req, 0, 0);
4370         END_PROFILE(SMBclose);
4371         return;
4372 }
4373
4374 /****************************************************************************
4375  Reply to a writeclose (Core+ protocol).
4376 ****************************************************************************/
4377
4378 void reply_writeclose(struct smb_request *req)
4379 {
4380         connection_struct *conn = req->conn;
4381         size_t numtowrite;
4382         ssize_t nwritten = -1;
4383         NTSTATUS close_status = NT_STATUS_OK;
4384         SMB_OFF_T startpos;
4385         const char *data;
4386         struct timespec mtime;
4387         files_struct *fsp;
4388
4389         START_PROFILE(SMBwriteclose);
4390
4391         if (req->wct < 6) {
4392                 reply_nterror(req, NT_STATUS_INVALID_PARAMETER);
4393                 END_PROFILE(SMBwriteclose);
4394                 return;
4395         }
4396
4397         fsp = file_fsp(req, SVAL(req->vwv+0, 0));
4398
4399         if (!check_fsp(conn, req, fsp)) {
4400                 END_PROFILE(SMBwriteclose);
4401                 return;
4402         }
4403         if (!CHECK_WRITE(fsp)) {
4404                 reply_doserror(req, ERRDOS,ERRbadaccess);
4405                 END_PROFILE(SMBwriteclose);
4406                 return;
4407         }
4408
4409         numtowrite = SVAL(req->vwv+1, 0);
4410         startpos = IVAL_TO_SMB_OFF_T(req->vwv+2, 0);
4411         mtime = convert_time_t_to_timespec(srv_make_unix_date3(req->vwv+4));
4412         data = (const char *)req->buf + 1;
4413
4414         if (numtowrite
4415             && is_locked(fsp, (uint32)req->smbpid, (uint64_t)numtowrite,
4416                          (uint64_t)startpos, WRITE_LOCK)) {
4417                 reply_doserror(req, ERRDOS,ERRlock);
4418                 END_PROFILE(SMBwriteclose);
4419                 return;
4420         }
4421
4422         nwritten = write_file(req,fsp,data,startpos,numtowrite);
4423
4424         set_close_write_time(fsp, mtime);
4425
4426         /*
4427          * More insanity. W2K only closes the file if writelen > 0.
4428          * JRA.
4429          */
4430
4431         if (numtowrite) {
4432                 DEBUG(3,("reply_writeclose: zero length write doesn't close file %s\n",
4433                         fsp->fsp_name ));
4434                 close_status = close_file(req, fsp, NORMAL_CLOSE);
4435         }
4436
4437         DEBUG(3,("writeclose fnum=%d num=%d wrote=%d (numopen=%d)\n",
4438                  fsp->fnum, (int)numtowrite, (int)nwritten,
4439                  conn->num_files_open));
4440
4441         if(((nwritten == 0) && (numtowrite != 0))||(nwritten < 0)) {
4442                 reply_doserror(req, ERRHRD, ERRdiskfull);
4443                 END_PROFILE(SMBwriteclose);
4444                 return;
4445         }
4446
4447         if(!NT_STATUS_IS_OK(close_status)) {
4448                 reply_nterror(req, close_status);
4449                 END_PROFILE(SMBwriteclose);
4450                 return;
4451         }
4452
4453         reply_outbuf(req, 1, 0);
4454
4455         SSVAL(req->outbuf,smb_vwv0,nwritten);
4456         END_PROFILE(SMBwriteclose);
4457         return;
4458 }
4459
4460 #undef DBGC_CLASS
4461 #define DBGC_CLASS DBGC_LOCKING
4462
4463 /****************************************************************************
4464  Reply to a lock.
4465 ****************************************************************************/
4466
4467 void reply_lock(struct smb_request *req)
4468 {
4469         connection_struct *conn = req->conn;
4470         uint64_t count,offset;
4471         NTSTATUS status;
4472         files_struct *fsp;
4473         struct byte_range_lock *br_lck = NULL;
4474
4475         START_PROFILE(SMBlock);
4476
4477         if (req->wct < 5) {
4478                 reply_nterror(req, NT_STATUS_INVALID_PARAMETER);
4479                 END_PROFILE(SMBlock);
4480                 return;
4481         }
4482
4483         fsp = file_fsp(req, SVAL(req->vwv+0, 0));
4484
4485         if (!check_fsp(conn, req, fsp)) {
4486                 END_PROFILE(SMBlock);
4487                 return;
4488         }
4489
4490         release_level_2_oplocks_on_change(fsp);
4491
4492         count = (uint64_t)IVAL(req->vwv+1, 0);
4493         offset = (uint64_t)IVAL(req->vwv+3, 0);
4494
4495         DEBUG(3,("lock fd=%d fnum=%d offset=%.0f count=%.0f\n",
4496                  fsp->fh->fd, fsp->fnum, (double)offset, (double)count));
4497
4498         br_lck = do_lock(smbd_messaging_context(),
4499                         fsp,
4500                         req->smbpid,
4501                         count,
4502                         offset,
4503                         WRITE_LOCK,
4504                         WINDOWS_LOCK,
4505                         False, /* Non-blocking lock. */
4506                         &status,
4507                         NULL);
4508
4509         TALLOC_FREE(br_lck);
4510
4511         if (NT_STATUS_V(status)) {
4512                 reply_nterror(req, status);
4513                 END_PROFILE(SMBlock);
4514                 return;
4515         }
4516
4517         reply_outbuf(req, 0, 0);
4518
4519         END_PROFILE(SMBlock);
4520         return;
4521 }
4522
4523 /****************************************************************************
4524  Reply to a unlock.
4525 ****************************************************************************/
4526
4527 void reply_unlock(struct smb_request *req)
4528 {
4529         connection_struct *conn = req->conn;
4530         uint64_t count,offset;
4531         NTSTATUS status;
4532         files_struct *fsp;
4533
4534         START_PROFILE(SMBunlock);
4535
4536         if (req->wct < 5) {
4537                 reply_nterror(req, NT_STATUS_INVALID_PARAMETER);
4538                 END_PROFILE(SMBunlock);
4539                 return;
4540         }
4541
4542         fsp = file_fsp(req, SVAL(req->vwv+0, 0));
4543
4544         if (!check_fsp(conn, req, fsp)) {
4545                 END_PROFILE(SMBunlock);
4546                 return;
4547         }
4548
4549         count = (uint64_t)IVAL(req->vwv+1, 0);
4550         offset = (uint64_t)IVAL(req->vwv+3, 0);
4551
4552         status = do_unlock(smbd_messaging_context(),
4553                         fsp,
4554                         req->smbpid,
4555                         count,
4556                         offset,
4557                         WINDOWS_LOCK);
4558
4559         if (NT_STATUS_V(status)) {
4560                 reply_nterror(req, status);
4561                 END_PROFILE(SMBunlock);
4562                 return;
4563         }
4564
4565         DEBUG( 3, ( "unlock fd=%d fnum=%d offset=%.0f count=%.0f\n",
4566                     fsp->fh->fd, fsp->fnum, (double)offset, (double)count ) );
4567
4568         reply_outbuf(req, 0, 0);
4569
4570         END_PROFILE(SMBunlock);
4571         return;
4572 }
4573
4574 #undef DBGC_CLASS
4575 #define DBGC_CLASS DBGC_ALL
4576
4577 /****************************************************************************
4578  Reply to a tdis.
4579  conn POINTER CAN BE NULL HERE !
4580 ****************************************************************************/
4581
4582 void reply_tdis(struct smb_request *req)
4583 {
4584         connection_struct *conn = req->conn;
4585         START_PROFILE(SMBtdis);
4586
4587         if (!conn) {
4588                 DEBUG(4,("Invalid connection in tdis\n"));
4589                 reply_doserror(req, ERRSRV, ERRinvnid);
4590                 END_PROFILE(SMBtdis);
4591                 return;
4592         }
4593
4594         conn->used = False;
4595
4596         close_cnum(conn,req->vuid);
4597         req->conn = NULL;
4598
4599         reply_outbuf(req, 0, 0);
4600         END_PROFILE(SMBtdis);
4601         return;
4602 }
4603
4604 /****************************************************************************
4605  Reply to a echo.
4606  conn POINTER CAN BE NULL HERE !
4607 ****************************************************************************/
4608
4609 void reply_echo(struct smb_request *req)
4610 {
4611         connection_struct *conn = req->conn;
4612         int smb_reverb;
4613         int seq_num;
4614
4615         START_PROFILE(SMBecho);
4616
4617         if (req->wct < 1) {
4618                 reply_nterror(req, NT_STATUS_INVALID_PARAMETER);
4619                 END_PROFILE(SMBecho);
4620                 return;
4621         }
4622
4623         smb_reverb = SVAL(req->vwv+0, 0);
4624
4625         reply_outbuf(req, 1, req->buflen);
4626
4627         /* copy any incoming data back out */
4628         if (req->buflen > 0) {
4629                 memcpy(smb_buf(req->outbuf), req->buf, req->buflen);
4630         }
4631
4632         if (smb_reverb > 100) {
4633                 DEBUG(0,("large reverb (%d)?? Setting to 100\n",smb_reverb));
4634                 smb_reverb = 100;
4635         }
4636
4637         for (seq_num =1 ; seq_num <= smb_reverb ; seq_num++) {
4638                 SSVAL(req->outbuf,smb_vwv0,seq_num);
4639
4640                 show_msg((char *)req->outbuf);
4641                 if (!srv_send_smb(smbd_server_fd(),
4642                                 (char *)req->outbuf,
4643                                 IS_CONN_ENCRYPTED(conn)||req->encrypted))
4644                         exit_server_cleanly("reply_echo: srv_send_smb failed.");
4645         }
4646
4647         DEBUG(3,("echo %d times\n", smb_reverb));
4648
4649         TALLOC_FREE(req->outbuf);
4650
4651         END_PROFILE(SMBecho);
4652         return;
4653 }
4654
4655 /****************************************************************************
4656  Reply to a printopen.
4657 ****************************************************************************/
4658
4659 void reply_printopen(struct smb_request *req)
4660 {
4661         connection_struct *conn = req->conn;
4662         files_struct *fsp;
4663         SMB_STRUCT_STAT sbuf;
4664         NTSTATUS status;
4665
4666         START_PROFILE(SMBsplopen);
4667
4668         if (req->wct < 2) {
4669                 reply_nterror(req, NT_STATUS_INVALID_PARAMETER);
4670                 END_PROFILE(SMBsplopen);
4671                 return;
4672         }
4673
4674         if (!CAN_PRINT(conn)) {
4675                 reply_doserror(req, ERRDOS, ERRnoaccess);
4676                 END_PROFILE(SMBsplopen);
4677                 return;
4678         }
4679
4680         status = file_new(req, conn, &fsp);
4681         if(!NT_STATUS_IS_OK(status)) {
4682                 reply_nterror(req, status);
4683                 END_PROFILE(SMBsplopen);
4684                 return;
4685         }
4686
4687         /* Open for exclusive use, write only. */
4688         status = print_fsp_open(req, conn, NULL, req->vuid, fsp, &sbuf);
4689
4690         if (!NT_STATUS_IS_OK(status)) {
4691                 reply_nterror(req, status);
4692                 END_PROFILE(SMBsplopen);
4693                 return;
4694         }
4695
4696         reply_outbuf(req, 1, 0);
4697         SSVAL(req->outbuf,smb_vwv0,fsp->fnum);
4698
4699         DEBUG(3,("openprint fd=%d fnum=%d\n",
4700                  fsp->fh->fd, fsp->fnum));
4701
4702         END_PROFILE(SMBsplopen);
4703         return;
4704 }
4705
4706 /****************************************************************************
4707  Reply to a printclose.
4708 ****************************************************************************/
4709
4710 void reply_printclose(struct smb_request *req)
4711 {
4712         connection_struct *conn = req->conn;
4713         files_struct *fsp;
4714         NTSTATUS status;
4715
4716         START_PROFILE(SMBsplclose);
4717
4718         if (req->wct < 1) {
4719                 reply_nterror(req, NT_STATUS_INVALID_PARAMETER);
4720                 END_PROFILE(SMBsplclose);
4721                 return;
4722         }
4723
4724         fsp = file_fsp(req, SVAL(req->vwv+0, 0));
4725
4726         if (!check_fsp(conn, req, fsp)) {
4727                 END_PROFILE(SMBsplclose);
4728                 return;
4729         }
4730
4731         if (!CAN_PRINT(conn)) {
4732                 reply_nterror(req, NT_STATUS_DOS(ERRSRV, ERRerror));
4733                 END_PROFILE(SMBsplclose);
4734                 return;
4735         }
4736
4737         DEBUG(3,("printclose fd=%d fnum=%d\n",
4738                  fsp->fh->fd,fsp->fnum));
4739
4740         status = close_file(req, fsp, NORMAL_CLOSE);
4741
4742         if(!NT_STATUS_IS_OK(status)) {
4743                 reply_nterror(req, status);
4744                 END_PROFILE(SMBsplclose);
4745                 return;
4746         }
4747
4748         reply_outbuf(req, 0, 0);
4749
4750         END_PROFILE(SMBsplclose);
4751         return;
4752 }
4753
4754 /****************************************************************************
4755  Reply to a printqueue.
4756 ****************************************************************************/
4757
4758 void reply_printqueue(struct smb_request *req)
4759 {
4760         connection_struct *conn = req->conn;
4761         int max_count;
4762         int start_index;
4763
4764         START_PROFILE(SMBsplretq);
4765
4766         if (req->wct < 2) {
4767                 reply_nterror(req, NT_STATUS_INVALID_PARAMETER);
4768                 END_PROFILE(SMBsplretq);
4769                 return;
4770         }
4771
4772         max_count = SVAL(req->vwv+0, 0);
4773         start_index = SVAL(req->vwv+1, 0);
4774
4775         /* we used to allow the client to get the cnum wrong, but that
4776            is really quite gross and only worked when there was only
4777            one printer - I think we should now only accept it if they
4778            get it right (tridge) */
4779         if (!CAN_PRINT(conn)) {
4780                 reply_doserror(req, ERRDOS, ERRnoaccess);
4781                 END_PROFILE(SMBsplretq);
4782                 return;
4783         }
4784
4785         reply_outbuf(req, 2, 3);
4786         SSVAL(req->outbuf,smb_vwv0,0);
4787         SSVAL(req->outbuf,smb_vwv1,0);
4788         SCVAL(smb_buf(req->outbuf),0,1);
4789         SSVAL(smb_buf(req->outbuf),1,0);
4790
4791         DEBUG(3,("printqueue start_index=%d max_count=%d\n",
4792                  start_index, max_count));
4793
4794         {
4795                 print_queue_struct *queue = NULL;
4796                 print_status_struct status;
4797                 int count = print_queue_status(SNUM(conn), &queue, &status);
4798                 int num_to_get = ABS(max_count);
4799                 int first = (max_count>0?start_index:start_index+max_count+1);
4800                 int i;
4801
4802                 if (first >= count)
4803                         num_to_get = 0;
4804                 else
4805                         num_to_get = MIN(num_to_get,count-first);
4806
4807
4808                 for (i=first;i<first+num_to_get;i++) {
4809                         char blob[28];
4810                         char *p = blob;
4811
4812                         srv_put_dos_date2(p,0,queue[i].time);
4813                         SCVAL(p,4,(queue[i].status==LPQ_PRINTING?2:3));
4814                         SSVAL(p,5, queue[i].job);
4815                         SIVAL(p,7,queue[i].size);
4816                         SCVAL(p,11,0);
4817                         srvstr_push(blob, req->flags2, p+12,
4818                                     queue[i].fs_user, 16, STR_ASCII);
4819
4820                         if (message_push_blob(
4821                                     &req->outbuf,
4822                                     data_blob_const(
4823                                             blob, sizeof(blob))) == -1) {
4824                                 reply_nterror(req, NT_STATUS_NO_MEMORY);
4825                                 END_PROFILE(SMBsplretq);
4826                                 return;
4827                         }
4828                 }
4829
4830                 if (count > 0) {
4831                         SSVAL(req->outbuf,smb_vwv0,count);
4832                         SSVAL(req->outbuf,smb_vwv1,
4833                               (max_count>0?first+count:first-1));
4834                         SCVAL(smb_buf(req->outbuf),0,1);
4835                         SSVAL(smb_buf(req->outbuf),1,28*count);
4836                 }
4837
4838                 SAFE_FREE(queue);
4839
4840                 DEBUG(3,("%d entries returned in queue\n",count));
4841         }
4842
4843         END_PROFILE(SMBsplretq);
4844         return;
4845 }
4846
4847 /****************************************************************************
4848  Reply to a printwrite.
4849 ****************************************************************************/
4850
4851 void reply_printwrite(struct smb_request *req)
4852 {
4853         connection_struct *conn = req->conn;
4854         int numtowrite;
4855         const char *data;
4856         files_struct *fsp;
4857
4858         START_PROFILE(SMBsplwr);
4859
4860         if (req->wct < 1) {
4861                 reply_nterror(req, NT_STATUS_INVALID_PARAMETER);
4862                 END_PROFILE(SMBsplwr);
4863                 return;
4864         }
4865
4866         fsp = file_fsp(req, SVAL(req->vwv+0, 0));
4867
4868         if (!check_fsp(conn, req, fsp)) {
4869                 END_PROFILE(SMBsplwr);
4870                 return;
4871         }
4872
4873         if (!CAN_PRINT(conn)) {
4874                 reply_doserror(req, ERRDOS, ERRnoaccess);
4875                 END_PROFILE(SMBsplwr);
4876                 return;
4877         }
4878
4879         if (!CHECK_WRITE(fsp)) {
4880                 reply_doserror(req, ERRDOS, ERRbadaccess);
4881                 END_PROFILE(SMBsplwr);
4882                 return;
4883         }
4884
4885         numtowrite = SVAL(req->buf, 1);
4886
4887         if (req->buflen < numtowrite + 3) {
4888                 reply_nterror(req, NT_STATUS_INVALID_PARAMETER);
4889                 END_PROFILE(SMBsplwr);
4890                 return;
4891         }
4892
4893         data = (const char *)req->buf + 3;
4894
4895         if (write_file(req,fsp,data,-1,numtowrite) != numtowrite) {
4896                 reply_unixerror(req, ERRHRD, ERRdiskfull);
4897                 END_PROFILE(SMBsplwr);
4898                 return;
4899         }
4900
4901         DEBUG( 3, ( "printwrite fnum=%d num=%d\n", fsp->fnum, numtowrite ) );
4902
4903         END_PROFILE(SMBsplwr);
4904         return;
4905 }
4906
4907 /****************************************************************************
4908  Reply to a mkdir.
4909 ****************************************************************************/
4910
4911 void reply_mkdir(struct smb_request *req)
4912 {
4913         connection_struct *conn = req->conn;
4914         char *directory = NULL;
4915         NTSTATUS status;
4916         SMB_STRUCT_STAT sbuf;
4917         TALLOC_CTX *ctx = talloc_tos();
4918
4919         START_PROFILE(SMBmkdir);
4920
4921         srvstr_get_path_req(ctx, req, &directory, (const char *)req->buf + 1,
4922                             STR_TERMINATE, &status);
4923         if (!NT_STATUS_IS_OK(status)) {
4924                 reply_nterror(req, status);
4925                 END_PROFILE(SMBmkdir);
4926                 return;
4927         }
4928
4929         status = resolve_dfspath(ctx, conn,
4930                                  req->flags2 & FLAGS2_DFS_PATHNAMES,
4931                                  directory,
4932                                  &directory);
4933         if (!NT_STATUS_IS_OK(status)) {
4934                 if (NT_STATUS_EQUAL(status,NT_STATUS_PATH_NOT_COVERED)) {
4935                         reply_botherror(req, NT_STATUS_PATH_NOT_COVERED,
4936                                         ERRSRV, ERRbadpath);
4937                         END_PROFILE(SMBmkdir);
4938                         return;
4939                 }
4940                 reply_nterror(req, status);
4941                 END_PROFILE(SMBmkdir);
4942                 return;
4943         }
4944
4945         status = unix_convert(ctx, conn, directory, False, &directory, NULL, &sbuf);
4946         if (!NT_STATUS_IS_OK(status)) {
4947                 reply_nterror(req, status);
4948                 END_PROFILE(SMBmkdir);
4949                 return;
4950         }
4951
4952         status = check_name(conn, directory);
4953         if (!NT_STATUS_IS_OK(status)) {
4954                 reply_nterror(req, status);
4955                 END_PROFILE(SMBmkdir);
4956                 return;
4957         }
4958
4959         status = create_directory(conn, req, directory);
4960
4961         DEBUG(5, ("create_directory returned %s\n", nt_errstr(status)));
4962
4963         if (!NT_STATUS_IS_OK(status)) {
4964
4965                 if (!use_nt_status()
4966                     && NT_STATUS_EQUAL(status,
4967                                        NT_STATUS_OBJECT_NAME_COLLISION)) {
4968                         /*
4969                          * Yes, in the DOS error code case we get a
4970                          * ERRDOS:ERRnoaccess here. See BASE-SAMBA3ERROR
4971                          * samba4 torture test.
4972                          */
4973                         status = NT_STATUS_DOS(ERRDOS, ERRnoaccess);
4974                 }
4975
4976                 reply_nterror(req, status);
4977                 END_PROFILE(SMBmkdir);
4978                 return;
4979         }
4980
4981         reply_outbuf(req, 0, 0);
4982
4983         DEBUG( 3, ( "mkdir %s\n", directory ) );
4984
4985         END_PROFILE(SMBmkdir);
4986         return;
4987 }
4988
4989 /****************************************************************************
4990  Static function used by reply_rmdir to delete an entire directory
4991  tree recursively. Return True on ok, False on fail.
4992 ****************************************************************************/
4993
4994 static bool recursive_rmdir(TALLOC_CTX *ctx,
4995                         connection_struct *conn,
4996                         char *directory)
4997 {
4998         const char *dname = NULL;
4999         bool ret = True;
5000         long offset = 0;
5001         struct smb_Dir *dir_hnd = OpenDir(talloc_tos(), conn, directory,
5002                                           NULL, 0);
5003
5004         if(dir_hnd == NULL)
5005                 return False;
5006
5007         while((dname = ReadDirName(dir_hnd, &offset))) {
5008                 char *fullname = NULL;
5009                 SMB_STRUCT_STAT st;
5010
5011                 if (ISDOT(dname) || ISDOTDOT(dname)) {
5012                         continue;
5013                 }
5014
5015                 if (!is_visible_file(conn, directory, dname, &st, False)) {
5016                         continue;
5017                 }
5018
5019                 /* Construct the full name. */
5020                 fullname = talloc_asprintf(ctx,
5021                                 "%s/%s",
5022                                 directory,
5023                                 dname);
5024                 if (!fullname) {
5025                         errno = ENOMEM;
5026                         ret = False;
5027                         break;
5028                 }
5029
5030                 if(SMB_VFS_LSTAT(conn,fullname, &st) != 0) {
5031                         ret = False;
5032                         break;
5033                 }
5034
5035                 if(st.st_mode & S_IFDIR) {
5036                         if(!recursive_rmdir(ctx, conn, fullname)) {
5037                                 ret = False;
5038                                 break;
5039                         }
5040                         if(SMB_VFS_RMDIR(conn,fullname) != 0) {
5041                                 ret = False;
5042                                 break;
5043                         }
5044                 } else if(SMB_VFS_UNLINK(conn,fullname) != 0) {
5045                         ret = False;
5046                         break;
5047                 }
5048                 TALLOC_FREE(fullname);
5049         }
5050         TALLOC_FREE(dir_hnd);
5051         return ret;
5052 }
5053
5054 /****************************************************************************
5055  The internals of the rmdir code - called elsewhere.
5056 ****************************************************************************/
5057
5058 NTSTATUS rmdir_internals(TALLOC_CTX *ctx,
5059                         connection_struct *conn,
5060                         const char *directory)
5061 {
5062         int ret;
5063         SMB_STRUCT_STAT st;
5064
5065         /* Might be a symlink. */
5066         if(SMB_VFS_LSTAT(conn, directory, &st) != 0) {
5067                 return map_nt_error_from_unix(errno);
5068         }
5069
5070         if (S_ISLNK(st.st_mode)) {
5071                 /* Is what it points to a directory ? */
5072                 if(SMB_VFS_STAT(conn, directory, &st) != 0) {
5073                         return map_nt_error_from_unix(errno);
5074                 }
5075                 if (!(S_ISDIR(st.st_mode))) {
5076                         return NT_STATUS_NOT_A_DIRECTORY;
5077                 }
5078                 ret = SMB_VFS_UNLINK(conn,directory);
5079         } else {
5080                 ret = SMB_VFS_RMDIR(conn,directory);
5081         }
5082         if (ret == 0) {
5083                 notify_fname(conn, NOTIFY_ACTION_REMOVED,
5084                              FILE_NOTIFY_CHANGE_DIR_NAME,
5085                              directory);
5086                 return NT_STATUS_OK;
5087         }
5088
5089         if(((errno == ENOTEMPTY)||(errno == EEXIST)) && lp_veto_files(SNUM(conn))) {
5090                 /*
5091                  * Check to see if the only thing in this directory are
5092                  * vetoed files/directories. If so then delete them and
5093                  * retry. If we fail to delete any of them (and we *don't*
5094                  * do a recursive delete) then fail the rmdir.
5095                  */
5096                 const char *dname;
5097                 long dirpos = 0;
5098                 struct smb_Dir *dir_hnd = OpenDir(talloc_tos(), conn,
5099                                                   directory, NULL, 0);
5100
5101                 if(dir_hnd == NULL) {
5102                         errno = ENOTEMPTY;
5103                         goto err;
5104                 }
5105
5106                 while ((dname = ReadDirName(dir_hnd,&dirpos))) {
5107                         if((strcmp(dname, ".") == 0) || (strcmp(dname, "..")==0))
5108                                 continue;
5109                         if (!is_visible_file(conn, directory, dname, &st, False))
5110                                 continue;
5111                         if(!IS_VETO_PATH(conn, dname)) {
5112                                 TALLOC_FREE(dir_hnd);
5113                                 errno = ENOTEMPTY;
5114                                 goto err;
5115                         }
5116                 }
5117
5118                 /* We only have veto files/directories.
5119                  * Are we allowed to delete them ? */
5120
5121                 if(!lp_recursive_veto_delete(SNUM(conn))) {
5122                         TALLOC_FREE(dir_hnd);
5123                         errno = ENOTEMPTY;
5124                         goto err;
5125                 }
5126
5127                 /* Do a recursive delete. */
5128                 RewindDir(dir_hnd,&dirpos);
5129                 while ((dname = ReadDirName(dir_hnd,&dirpos))) {
5130                         char *fullname = NULL;
5131
5132                         if (ISDOT(dname) || ISDOTDOT(dname)) {
5133                                 continue;
5134                         }
5135                         if (!is_visible_file(conn, directory, dname, &st, False)) {
5136                                 continue;
5137                         }
5138
5139                         fullname = talloc_asprintf(ctx,
5140                                         "%s/%s",
5141                                         directory,
5142                                         dname);
5143
5144                         if(!fullname) {
5145                                 errno = ENOMEM;
5146                                 break;
5147                         }
5148
5149                         if(SMB_VFS_LSTAT(conn,fullname, &st) != 0) {
5150                                 break;
5151                         }
5152                         if(st.st_mode & S_IFDIR) {
5153                                 if(!recursive_rmdir(ctx, conn, fullname)) {
5154                                         break;
5155                                 }
5156                                 if(SMB_VFS_RMDIR(conn,fullname) != 0) {
5157                                         break;
5158                                 }
5159                         } else if(SMB_VFS_UNLINK(conn,fullname) != 0) {
5160                                 break;
5161                         }
5162                         TALLOC_FREE(fullname);
5163                 }
5164                 TALLOC_FREE(dir_hnd);
5165                 /* Retry the rmdir */
5166                 ret = SMB_VFS_RMDIR(conn,directory);
5167         }
5168
5169   err:
5170
5171         if (ret != 0) {
5172                 DEBUG(3,("rmdir_internals: couldn't remove directory %s : "
5173                          "%s\n", directory,strerror(errno)));
5174                 return map_nt_error_from_unix(errno);
5175         }
5176
5177         notify_fname(conn, NOTIFY_ACTION_REMOVED,
5178                      FILE_NOTIFY_CHANGE_DIR_NAME,
5179                      directory);
5180
5181         return NT_STATUS_OK;
5182 }
5183
5184 /****************************************************************************
5185  Reply to a rmdir.
5186 ****************************************************************************/
5187
5188 void reply_rmdir(struct smb_request *req)
5189 {
5190         connection_struct *conn = req->conn;
5191         char *directory = NULL;
5192         SMB_STRUCT_STAT sbuf;
5193         NTSTATUS status;
5194         TALLOC_CTX *ctx = talloc_tos();
5195
5196         START_PROFILE(SMBrmdir);
5197
5198         srvstr_get_path_req(ctx, req, &directory, (const char *)req->buf + 1,
5199                             STR_TERMINATE, &status);
5200         if (!NT_STATUS_IS_OK(status)) {
5201                 reply_nterror(req, status);
5202                 END_PROFILE(SMBrmdir);
5203                 return;
5204         }
5205
5206         status = resolve_dfspath(ctx, conn,
5207                                  req->flags2 & FLAGS2_DFS_PATHNAMES,
5208                                  directory,
5209                                  &directory);
5210         if (!NT_STATUS_IS_OK(status)) {
5211                 if (NT_STATUS_EQUAL(status,NT_STATUS_PATH_NOT_COVERED)) {
5212                         reply_botherror(req, NT_STATUS_PATH_NOT_COVERED,
5213                                         ERRSRV, ERRbadpath);
5214                         END_PROFILE(SMBrmdir);
5215                         return;
5216                 }
5217                 reply_nterror(req, status);
5218                 END_PROFILE(SMBrmdir);
5219                 return;
5220         }
5221
5222         status = unix_convert(ctx, conn, directory, False, &directory,
5223                         NULL, &sbuf);
5224         if (!NT_STATUS_IS_OK(status)) {
5225                 reply_nterror(req, status);
5226                 END_PROFILE(SMBrmdir);
5227                 return;
5228         }
5229
5230         status = check_name(conn, directory);
5231         if (!NT_STATUS_IS_OK(status)) {
5232                 reply_nterror(req, status);
5233                 END_PROFILE(SMBrmdir);
5234                 return;
5235         }
5236
5237         dptr_closepath(directory, req->smbpid);
5238         status = rmdir_internals(ctx, conn, directory);
5239         if (!NT_STATUS_IS_OK(status)) {
5240                 reply_nterror(req, status);
5241                 END_PROFILE(SMBrmdir);
5242                 return;
5243         }
5244
5245         reply_outbuf(req, 0, 0);
5246
5247         DEBUG( 3, ( "rmdir %s\n", directory ) );
5248
5249         END_PROFILE(SMBrmdir);
5250         return;
5251 }
5252
5253 /*******************************************************************
5254  Resolve wildcards in a filename rename.
5255 ********************************************************************/
5256
5257 static bool resolve_wildcards(TALLOC_CTX *ctx,
5258                                 const char *name1,
5259                                 const char *name2,
5260                                 char **pp_newname)
5261 {
5262         char *name2_copy = NULL;
5263         char *root1 = NULL;
5264         char *root2 = NULL;
5265         char *ext1 = NULL;
5266         char *ext2 = NULL;
5267         char *p,*p2, *pname1, *pname2;
5268
5269         name2_copy = talloc_strdup(ctx, name2);
5270         if (!name2_copy) {
5271                 return False;
5272         }
5273
5274         pname1 = strrchr_m(name1,'/');
5275         pname2 = strrchr_m(name2_copy,'/');
5276
5277         if (!pname1 || !pname2) {
5278                 return False;
5279         }
5280
5281         /* Truncate the copy of name2 at the last '/' */
5282         *pname2 = '\0';
5283
5284         /* Now go past the '/' */
5285         pname1++;
5286         pname2++;
5287
5288         root1 = talloc_strdup(ctx, pname1);
5289         root2 = talloc_strdup(ctx, pname2);
5290
5291         if (!root1 || !root2) {
5292                 return False;
5293         }
5294
5295         p = strrchr_m(root1,'.');
5296         if (p) {
5297                 *p = 0;
5298                 ext1 = talloc_strdup(ctx, p+1);
5299         } else {
5300                 ext1 = talloc_strdup(ctx, "");
5301         }
5302         p = strrchr_m(root2,'.');
5303         if (p) {
5304                 *p = 0;
5305                 ext2 = talloc_strdup(ctx, p+1);
5306         } else {
5307                 ext2 = talloc_strdup(ctx, "");
5308         }
5309
5310         if (!ext1 || !ext2) {
5311                 return False;
5312         }
5313
5314         p = root1;
5315         p2 = root2;
5316         while (*p2) {
5317                 if (*p2 == '?') {
5318                         /* Hmmm. Should this be mb-aware ? */
5319                         *p2 = *p;
5320                         p2++;
5321                 } else if (*p2 == '*') {
5322                         *p2 = '\0';
5323                         root2 = talloc_asprintf(ctx, "%s%s",
5324                                                 root2,
5325                                                 p);
5326                         if (!root2) {
5327                                 return False;
5328                         }
5329                         break;
5330                 } else {
5331                         p2++;
5332                 }
5333                 if (*p) {
5334                         p++;
5335                 }
5336         }
5337
5338         p = ext1;
5339         p2 = ext2;
5340         while (*p2) {
5341                 if (*p2 == '?') {
5342                         /* Hmmm. Should this be mb-aware ? */
5343                         *p2 = *p;
5344                         p2++;
5345                 } else if (*p2 == '*') {
5346                         *p2 = '\0';
5347                         ext2 = talloc_asprintf(ctx, "%s%s",
5348                                                 ext2,
5349                                                 p);
5350                         if (!ext2) {
5351                                 return False;
5352                         }
5353                         break;
5354                 } else {
5355                         p2++;
5356                 }
5357                 if (*p) {
5358                         p++;
5359                 }
5360         }
5361
5362         if (*ext2) {
5363                 *pp_newname = talloc_asprintf(ctx, "%s/%s.%s",
5364                                 name2_copy,
5365                                 root2,
5366                                 ext2);
5367         } else {
5368                 *pp_newname = talloc_asprintf(ctx, "%s/%s",
5369                                 name2_copy,
5370                                 root2);
5371         }
5372
5373         if (!*pp_newname) {
5374                 return False;
5375         }
5376
5377         return True;
5378 }
5379
5380 /****************************************************************************
5381  Ensure open files have their names updated. Updated to notify other smbd's
5382  asynchronously.
5383 ****************************************************************************/
5384
5385 static void rename_open_files(connection_struct *conn,
5386                               struct share_mode_lock *lck,
5387                               const char *newname)
5388 {
5389         files_struct *fsp;
5390         bool did_rename = False;
5391
5392         for(fsp = file_find_di_first(lck->id); fsp;
5393             fsp = file_find_di_next(fsp)) {
5394                 /* fsp_name is a relative path under the fsp. To change this for other
5395                    sharepaths we need to manipulate relative paths. */
5396                 /* TODO - create the absolute path and manipulate the newname
5397                    relative to the sharepath. */
5398                 if (!strequal(fsp->conn->connectpath, conn->connectpath)) {
5399                         continue;
5400                 }
5401                 DEBUG(10,("rename_open_files: renaming file fnum %d (file_id %s) from %s -> %s\n",
5402                           fsp->fnum, file_id_string_tos(&fsp->file_id),
5403                         fsp->fsp_name, newname ));
5404                 string_set(&fsp->fsp_name, newname);
5405                 did_rename = True;
5406         }
5407
5408         if (!did_rename) {
5409                 DEBUG(10,("rename_open_files: no open files on file_id %s for %s\n",
5410                           file_id_string_tos(&lck->id), newname ));
5411         }
5412
5413         /* Send messages to all smbd's (not ourself) that the name has changed. */
5414         rename_share_filename(smbd_messaging_context(), lck, conn->connectpath,
5415                               newname);
5416 }
5417
5418 /****************************************************************************
5419  We need to check if the source path is a parent directory of the destination
5420  (ie. a rename of /foo/bar/baz -> /foo/bar/baz/bibble/bobble. If so we must
5421  refuse the rename with a sharing violation. Under UNIX the above call can
5422  *succeed* if /foo/bar/baz is a symlink to another area in the share. We
5423  probably need to check that the client is a Windows one before disallowing
5424  this as a UNIX client (one with UNIX extensions) can know the source is a
5425  symlink and make this decision intelligently. Found by an excellent bug
5426  report from <AndyLiebman@aol.com>.
5427 ****************************************************************************/
5428
5429 static bool rename_path_prefix_equal(const char *src, const char *dest)
5430 {
5431         const char *psrc = src;
5432         const char *pdst = dest;
5433         size_t slen;
5434
5435         if (psrc[0] == '.' && psrc[1] == '/') {
5436                 psrc += 2;
5437         }
5438         if (pdst[0] == '.' && pdst[1] == '/') {
5439                 pdst += 2;
5440         }
5441         if ((slen = strlen(psrc)) > strlen(pdst)) {
5442                 return False;
5443         }
5444         return ((memcmp(psrc, pdst, slen) == 0) && pdst[slen] == '/');
5445 }
5446
5447 /*
5448  * Do the notify calls from a rename
5449  */
5450
5451 static void notify_rename(connection_struct *conn, bool is_dir,
5452                           const char *oldpath, const char *newpath)
5453 {
5454         char *olddir, *newdir;
5455         const char *oldname, *newname;
5456         uint32 mask;
5457
5458         mask = is_dir ? FILE_NOTIFY_CHANGE_DIR_NAME
5459                 : FILE_NOTIFY_CHANGE_FILE_NAME;
5460
5461         if (!parent_dirname(talloc_tos(), oldpath, &olddir, &oldname)
5462             || !parent_dirname(talloc_tos(), newpath, &newdir, &newname)) {
5463                 TALLOC_FREE(olddir);
5464                 return;
5465         }
5466
5467         if (strcmp(olddir, newdir) == 0) {
5468                 notify_fname(conn, NOTIFY_ACTION_OLD_NAME, mask, oldpath);
5469                 notify_fname(conn, NOTIFY_ACTION_NEW_NAME, mask, newpath);
5470         }
5471         else {
5472                 notify_fname(conn, NOTIFY_ACTION_REMOVED, mask, oldpath);
5473                 notify_fname(conn, NOTIFY_ACTION_ADDED, mask, newpath);
5474         }
5475         TALLOC_FREE(olddir);
5476         TALLOC_FREE(newdir);
5477
5478         /* this is a strange one. w2k3 gives an additional event for
5479            CHANGE_ATTRIBUTES and CHANGE_CREATION on the new file when renaming
5480            files, but not directories */
5481         if (!is_dir) {
5482                 notify_fname(conn, NOTIFY_ACTION_MODIFIED,
5483                              FILE_NOTIFY_CHANGE_ATTRIBUTES
5484                              |FILE_NOTIFY_CHANGE_CREATION,
5485                              newpath);
5486         }
5487 }
5488
5489 /****************************************************************************
5490  Rename an open file - given an fsp.
5491 ****************************************************************************/
5492
5493 NTSTATUS rename_internals_fsp(connection_struct *conn,
5494                         files_struct *fsp,
5495                         char *newname,
5496                         const char *newname_last_component,
5497                         uint32 attrs,
5498                         bool replace_if_exists)
5499 {
5500         TALLOC_CTX *ctx = talloc_tos();
5501         SMB_STRUCT_STAT sbuf, sbuf1;
5502         NTSTATUS status = NT_STATUS_OK;
5503         struct share_mode_lock *lck = NULL;
5504         bool dst_exists, old_is_stream, new_is_stream;
5505
5506         ZERO_STRUCT(sbuf);
5507
5508         status = check_name(conn, newname);
5509         if (!NT_STATUS_IS_OK(status)) {
5510                 return status;
5511         }
5512
5513         /* Ensure newname contains a '/' */
5514         if(strrchr_m(newname,'/') == 0) {
5515                 newname = talloc_asprintf(ctx,
5516                                         "./%s",
5517                                         newname);
5518                 if (!newname) {
5519                         return NT_STATUS_NO_MEMORY;
5520                 }
5521         }
5522
5523         /*
5524          * Check for special case with case preserving and not
5525          * case sensitive. If the old last component differs from the original
5526          * last component only by case, then we should allow
5527          * the rename (user is trying to change the case of the
5528          * filename).
5529          */
5530
5531         if((conn->case_sensitive == False) && (conn->case_preserve == True) &&
5532                         strequal(newname, fsp->fsp_name)) {
5533                 char *p;
5534                 char *newname_modified_last_component = NULL;
5535
5536                 /*
5537                  * Get the last component of the modified name.
5538                  * Note that we guarantee that newname contains a '/'
5539                  * character above.
5540                  */
5541                 p = strrchr_m(newname,'/');
5542                 newname_modified_last_component = talloc_strdup(ctx,
5543                                                 p+1);
5544                 if (!newname_modified_last_component) {
5545                         return NT_STATUS_NO_MEMORY;
5546                 }
5547
5548                 if(strcsequal(newname_modified_last_component,
5549                               newname_last_component) == False) {
5550                         /*
5551                          * Replace the modified last component with
5552                          * the original.
5553                          */
5554                         *p = '\0'; /* Truncate at the '/' */
5555                         newname = talloc_asprintf(ctx,
5556                                         "%s/%s",
5557                                         newname,
5558                                         newname_last_component);
5559                 }
5560         }
5561
5562         /*
5563          * If the src and dest names are identical - including case,
5564          * don't do the rename, just return success.
5565          */
5566
5567         if (strcsequal(fsp->fsp_name, newname)) {
5568                 DEBUG(3,("rename_internals_fsp: identical names in rename %s - returning success\n",
5569                         newname));
5570                 return NT_STATUS_OK;
5571         }
5572
5573         old_is_stream = is_ntfs_stream_name(fsp->fsp_name);
5574         new_is_stream = is_ntfs_stream_name(newname);
5575
5576         /* Return the correct error code if both names aren't streams. */
5577         if (!old_is_stream && new_is_stream) {
5578                 return NT_STATUS_OBJECT_NAME_INVALID;
5579         }
5580
5581         if (old_is_stream && !new_is_stream) {
5582                 return NT_STATUS_INVALID_PARAMETER;
5583         }
5584
5585         /*
5586          * Have vfs_object_exist also fill sbuf1
5587          */
5588         dst_exists = vfs_object_exist(conn, newname, &sbuf1);
5589
5590         if(!replace_if_exists && dst_exists) {
5591                 DEBUG(3,("rename_internals_fsp: dest exists doing rename %s -> %s\n",
5592                         fsp->fsp_name,newname));
5593                 return NT_STATUS_OBJECT_NAME_COLLISION;
5594         }
5595
5596         if (dst_exists) {
5597                 struct file_id fileid = vfs_file_id_from_sbuf(conn, &sbuf1);
5598                 files_struct *dst_fsp = file_find_di_first(fileid);
5599                 /* The file can be open when renaming a stream */
5600                 if (dst_fsp && !new_is_stream) {
5601                         DEBUG(3, ("rename_internals_fsp: Target file open\n"));
5602                         return NT_STATUS_ACCESS_DENIED;
5603                 }
5604         }
5605
5606         /* Ensure we have a valid stat struct for the source. */
5607         if (fsp->fh->fd != -1) {
5608                 if (SMB_VFS_FSTAT(fsp, &sbuf) == -1) {
5609                         return map_nt_error_from_unix(errno);
5610                 }
5611         } else {
5612                 if (SMB_VFS_STAT(conn,fsp->fsp_name,&sbuf) == -1) {
5613                         return map_nt_error_from_unix(errno);
5614                 }
5615         }
5616
5617         status = can_rename(conn, fsp, attrs, &sbuf);
5618
5619         if (!NT_STATUS_IS_OK(status)) {
5620                 DEBUG(3,("rename_internals_fsp: Error %s rename %s -> %s\n",
5621                         nt_errstr(status), fsp->fsp_name,newname));
5622                 if (NT_STATUS_EQUAL(status,NT_STATUS_SHARING_VIOLATION))
5623                         status = NT_STATUS_ACCESS_DENIED;
5624                 return status;
5625         }
5626
5627         if (rename_path_prefix_equal(fsp->fsp_name, newname)) {
5628                 return NT_STATUS_ACCESS_DENIED;
5629         }
5630
5631         lck = get_share_mode_lock(talloc_tos(), fsp->file_id, NULL, NULL,
5632                                   NULL);
5633
5634         /*
5635          * We have the file open ourselves, so not being able to get the
5636          * corresponding share mode lock is a fatal error.
5637          */
5638
5639         SMB_ASSERT(lck != NULL);
5640
5641         if(SMB_VFS_RENAME(conn,fsp->fsp_name, newname) == 0) {
5642                 uint32 create_options = fsp->fh->private_options;
5643
5644                 DEBUG(3,("rename_internals_fsp: succeeded doing rename on %s -> %s\n",
5645                         fsp->fsp_name,newname));
5646
5647                 notify_rename(conn, fsp->is_directory, fsp->fsp_name, newname);
5648
5649                 rename_open_files(conn, lck, newname);
5650
5651                 /*
5652                  * A rename acts as a new file create w.r.t. allowing an initial delete
5653                  * on close, probably because in Windows there is a new handle to the
5654                  * new file. If initial delete on close was requested but not
5655                  * originally set, we need to set it here. This is probably not 100% correct,
5656                  * but will work for the CIFSFS client which in non-posix mode
5657                  * depends on these semantics. JRA.
5658                  */
5659
5660                 if (create_options & FILE_DELETE_ON_CLOSE) {
5661                         status = can_set_delete_on_close(fsp, True, 0);
5662
5663                         if (NT_STATUS_IS_OK(status)) {
5664                                 /* Note that here we set the *inital* delete on close flag,
5665                                  * not the regular one. The magic gets handled in close. */
5666                                 fsp->initial_delete_on_close = True;
5667                         }
5668                 }
5669                 TALLOC_FREE(lck);
5670                 return NT_STATUS_OK;
5671         }
5672
5673         TALLOC_FREE(lck);
5674
5675         if (errno == ENOTDIR || errno == EISDIR) {
5676                 status = NT_STATUS_OBJECT_NAME_COLLISION;
5677         } else {
5678                 status = map_nt_error_from_unix(errno);
5679         }
5680
5681         DEBUG(3,("rename_internals_fsp: Error %s rename %s -> %s\n",
5682                 nt_errstr(status), fsp->fsp_name,newname));
5683
5684         return status;
5685 }
5686
5687 /****************************************************************************
5688  The guts of the rename command, split out so it may be called by the NT SMB
5689  code.
5690 ****************************************************************************/
5691
5692 NTSTATUS rename_internals(TALLOC_CTX *ctx,
5693                         connection_struct *conn,
5694                         struct smb_request *req,
5695                         const char *name_in,
5696                         const char *newname_in,
5697                         uint32 attrs,
5698                         bool replace_if_exists,
5699                         bool src_has_wild,
5700                         bool dest_has_wild,
5701                         uint32_t access_mask)
5702 {
5703         char *directory = NULL;
5704         char *mask = NULL;
5705         char *last_component_src = NULL;
5706         char *last_component_dest = NULL;
5707         char *name = NULL;
5708         char *newname = NULL;
5709         char *p;
5710         int count=0;
5711         NTSTATUS status = NT_STATUS_OK;
5712         SMB_STRUCT_STAT sbuf1, sbuf2;
5713         struct smb_Dir *dir_hnd = NULL;
5714         const char *dname;
5715         long offset = 0;
5716         int create_options = 0;
5717
5718         ZERO_STRUCT(sbuf1);
5719         ZERO_STRUCT(sbuf2);
5720
5721         status = unix_convert(ctx, conn, name_in, src_has_wild, &name,
5722                         &last_component_src, &sbuf1);
5723         if (!NT_STATUS_IS_OK(status)) {
5724                 return status;
5725         }
5726
5727         status = unix_convert(ctx, conn, newname_in, dest_has_wild, &newname,
5728                         &last_component_dest, &sbuf2);
5729         if (!NT_STATUS_IS_OK(status)) {
5730                 return status;
5731         }
5732
5733         /*
5734          * Split the old name into directory and last component
5735          * strings. Note that unix_convert may have stripped off a
5736          * leading ./ from both name and newname if the rename is
5737          * at the root of the share. We need to make sure either both
5738          * name and newname contain a / character or neither of them do
5739          * as this is checked in resolve_wildcards().
5740          */
5741
5742         p = strrchr_m(name,'/');
5743         if (!p) {
5744                 directory = talloc_strdup(ctx, ".");
5745                 if (!directory) {
5746                         return NT_STATUS_NO_MEMORY;
5747                 }
5748                 mask = name;
5749         } else {
5750                 *p = 0;
5751                 directory = talloc_strdup(ctx, name);
5752                 if (!directory) {
5753                         return NT_STATUS_NO_MEMORY;
5754                 }
5755                 mask = p+1;
5756                 *p = '/'; /* Replace needed for exceptional test below. */
5757         }
5758
5759         /*
5760          * We should only check the mangled cache
5761          * here if unix_convert failed. This means
5762          * that the path in 'mask' doesn't exist
5763          * on the file system and so we need to look
5764          * for a possible mangle. This patch from
5765          * Tine Smukavec <valentin.smukavec@hermes.si>.
5766          */
5767
5768         if (!VALID_STAT(sbuf1) && mangle_is_mangled(mask, conn->params)) {
5769                 char *new_mask = NULL;
5770                 mangle_lookup_name_from_8_3(ctx,
5771                                         mask,
5772                                         &new_mask,
5773                                         conn->params );
5774                 if (new_mask) {
5775                         mask = new_mask;
5776                 }
5777         }
5778
5779         if (!src_has_wild) {
5780                 files_struct *fsp;
5781
5782                 /*
5783                  * No wildcards - just process the one file.
5784                  */
5785                 bool is_short_name = mangle_is_8_3(name, True, conn->params);
5786
5787                 /* Add a terminating '/' to the directory name. */
5788                 directory = talloc_asprintf_append(directory,
5789                                 "/%s",
5790                                 mask);
5791                 if (!directory) {
5792                         return NT_STATUS_NO_MEMORY;
5793                 }
5794
5795                 /* Ensure newname contains a '/' also */
5796                 if(strrchr_m(newname,'/') == 0) {
5797                         newname = talloc_asprintf(ctx,
5798                                                 "./%s",
5799                                                 newname);
5800                         if (!newname) {
5801                                 return NT_STATUS_NO_MEMORY;
5802                         }
5803                 }
5804
5805                 DEBUG(3, ("rename_internals: case_sensitive = %d, "
5806                           "case_preserve = %d, short case preserve = %d, "
5807                           "directory = %s, newname = %s, "
5808                           "last_component_dest = %s, is_8_3 = %d\n",
5809                           conn->case_sensitive, conn->case_preserve,
5810                           conn->short_case_preserve, directory,
5811                           newname, last_component_dest, is_short_name));
5812
5813                 /* The dest name still may have wildcards. */
5814                 if (dest_has_wild) {
5815                         char *mod_newname = NULL;
5816                         if (!resolve_wildcards(ctx,
5817                                         directory,newname,&mod_newname)) {
5818                                 DEBUG(6, ("rename_internals: resolve_wildcards "
5819                                         "%s %s failed\n",
5820                                         directory,
5821                                         newname));
5822                                 return NT_STATUS_NO_MEMORY;
5823                         }
5824                         newname = mod_newname;
5825                 }
5826
5827                 ZERO_STRUCT(sbuf1);
5828                 SMB_VFS_STAT(conn, directory, &sbuf1);
5829
5830                 if (S_ISDIR(sbuf1.st_mode)) {
5831                         create_options |= FILE_DIRECTORY_FILE;
5832                 }
5833
5834                 status = SMB_VFS_CREATE_FILE(
5835                         conn,                           /* conn */
5836                         req,                            /* req */
5837                         0,                              /* root_dir_fid */
5838                         directory,                      /* fname */
5839                         0,                              /* create_file_flags */
5840                         access_mask,                    /* access_mask */
5841                         (FILE_SHARE_READ |              /* share_access */
5842                             FILE_SHARE_WRITE),
5843                         FILE_OPEN,                      /* create_disposition*/
5844                         create_options,                 /* create_options */
5845                         0,                              /* file_attributes */
5846                         0,                              /* oplock_request */
5847                         0,                              /* allocation_size */
5848                         NULL,                           /* sd */
5849                         NULL,                           /* ea_list */
5850                         &fsp,                           /* result */
5851                         NULL,                           /* pinfo */
5852                         &sbuf1);                        /* psbuf */
5853
5854                 if (!NT_STATUS_IS_OK(status)) {
5855                         DEBUG(3, ("Could not open rename source %s: %s\n",
5856                                   directory, nt_errstr(status)));
5857                         return status;
5858                 }
5859
5860                 status = rename_internals_fsp(conn, fsp, newname,
5861                                               last_component_dest,
5862                                               attrs, replace_if_exists);
5863
5864                 close_file(req, fsp, NORMAL_CLOSE);
5865
5866                 DEBUG(3, ("rename_internals: Error %s rename %s -> %s\n",
5867                           nt_errstr(status), directory,newname));
5868
5869                 return status;
5870         }
5871
5872         /*
5873          * Wildcards - process each file that matches.
5874          */
5875         if (strequal(mask,"????????.???")) {
5876                 mask[0] = '*';
5877                 mask[1] = '\0';
5878         }
5879
5880         status = check_name(conn, directory);
5881         if (!NT_STATUS_IS_OK(status)) {
5882                 return status;
5883         }
5884
5885         dir_hnd = OpenDir(talloc_tos(), conn, directory, mask, attrs);
5886         if (dir_hnd == NULL) {
5887                 return map_nt_error_from_unix(errno);
5888         }
5889
5890         status = NT_STATUS_NO_SUCH_FILE;
5891         /*
5892          * Was status = NT_STATUS_OBJECT_NAME_NOT_FOUND;
5893          * - gentest fix. JRA
5894          */
5895
5896         while ((dname = ReadDirName(dir_hnd, &offset))) {
5897                 files_struct *fsp = NULL;
5898                 char *fname = NULL;
5899                 char *destname = NULL;
5900                 bool sysdir_entry = False;
5901
5902                 /* Quick check for "." and ".." */
5903                 if (ISDOT(dname) || ISDOTDOT(dname)) {
5904                         if (attrs & aDIR) {
5905                                 sysdir_entry = True;
5906                         } else {
5907                                 continue;
5908                         }
5909                 }
5910
5911                 if (!is_visible_file(conn, directory, dname, &sbuf1, False)) {
5912                         continue;
5913                 }
5914
5915                 if(!mask_match(dname, mask, conn->case_sensitive)) {
5916                         continue;
5917                 }
5918
5919                 if (sysdir_entry) {
5920                         status = NT_STATUS_OBJECT_NAME_INVALID;
5921                         break;
5922                 }
5923
5924                 fname = talloc_asprintf(ctx,
5925                                 "%s/%s",
5926                                 directory,
5927                                 dname);
5928                 if (!fname) {
5929                         return NT_STATUS_NO_MEMORY;
5930                 }
5931
5932                 if (!resolve_wildcards(ctx,
5933                                 fname,newname,&destname)) {
5934                         DEBUG(6, ("resolve_wildcards %s %s failed\n",
5935                                   fname, destname));
5936                         TALLOC_FREE(fname);
5937                         continue;
5938                 }
5939                 if (!destname) {
5940                         return NT_STATUS_NO_MEMORY;
5941                 }
5942
5943                 ZERO_STRUCT(sbuf1);
5944                 SMB_VFS_STAT(conn, fname, &sbuf1);
5945
5946                 create_options = 0;
5947
5948                 if (S_ISDIR(sbuf1.st_mode)) {
5949                         create_options |= FILE_DIRECTORY_FILE;
5950                 }
5951
5952                 status = SMB_VFS_CREATE_FILE(
5953                         conn,                           /* conn */
5954                         req,                            /* req */
5955                         0,                              /* root_dir_fid */
5956                         fname,                          /* fname */
5957                         0,                              /* create_file_flags */
5958                         access_mask,                    /* access_mask */
5959                         (FILE_SHARE_READ |              /* share_access */
5960                             FILE_SHARE_WRITE),
5961                         FILE_OPEN,                      /* create_disposition*/
5962                         create_options,                 /* create_options */
5963                         0,                              /* file_attributes */
5964                         0,                              /* oplock_request */
5965                         0,                              /* allocation_size */
5966                         NULL,                           /* sd */
5967                         NULL,                           /* ea_list */
5968                         &fsp,                           /* result */
5969                         NULL,                           /* pinfo */
5970                         &sbuf1);                        /* psbuf */
5971
5972                 if (!NT_STATUS_IS_OK(status)) {
5973                         DEBUG(3,("rename_internals: SMB_VFS_CREATE_FILE "
5974                                  "returned %s rename %s -> %s\n",
5975                                  nt_errstr(status), directory, newname));
5976                         break;
5977                 }
5978
5979                 status = rename_internals_fsp(conn, fsp, destname, dname,
5980                                               attrs, replace_if_exists);
5981
5982                 close_file(req, fsp, NORMAL_CLOSE);
5983
5984                 if (!NT_STATUS_IS_OK(status)) {
5985                         DEBUG(3, ("rename_internals_fsp returned %s for "
5986                                   "rename %s -> %s\n", nt_errstr(status),
5987                                   directory, newname));
5988                         break;
5989                 }
5990
5991                 count++;
5992
5993                 DEBUG(3,("rename_internals: doing rename on %s -> "
5994                          "%s\n",fname,destname));
5995
5996                 TALLOC_FREE(fname);
5997                 TALLOC_FREE(destname);
5998         }
5999         TALLOC_FREE(dir_hnd);
6000
6001         if (count == 0 && NT_STATUS_IS_OK(status) && errno != 0) {
6002                 status = map_nt_error_from_unix(errno);
6003         }
6004
6005         return status;
6006 }
6007
6008 /****************************************************************************
6009  Reply to a mv.
6010 ****************************************************************************/
6011
6012 void reply_mv(struct smb_request *req)
6013 {
6014         connection_struct *conn = req->conn;
6015         char *name = NULL;
6016         char *newname = NULL;
6017         const char *p;
6018         uint32 attrs;
6019         NTSTATUS status;
6020         bool src_has_wcard = False;
6021         bool dest_has_wcard = False;
6022         TALLOC_CTX *ctx = talloc_tos();
6023
6024         START_PROFILE(SMBmv);
6025
6026         if (req->wct < 1) {
6027                 reply_nterror(req, NT_STATUS_INVALID_PARAMETER);
6028                 END_PROFILE(SMBmv);
6029                 return;
6030         }
6031
6032         attrs = SVAL(req->vwv+0, 0);
6033
6034         p = (const char *)req->buf + 1;
6035         p += srvstr_get_path_req_wcard(ctx, req, &name, p, STR_TERMINATE,
6036                                        &status, &src_has_wcard);
6037         if (!NT_STATUS_IS_OK(status)) {
6038                 reply_nterror(req, status);
6039                 END_PROFILE(SMBmv);
6040                 return;
6041         }
6042         p++;
6043         p += srvstr_get_path_req_wcard(ctx, req, &newname, p, STR_TERMINATE,
6044                                        &status, &dest_has_wcard);
6045         if (!NT_STATUS_IS_OK(status)) {
6046                 reply_nterror(req, status);
6047                 END_PROFILE(SMBmv);
6048                 return;
6049         }
6050
6051         status = resolve_dfspath_wcard(ctx, conn,
6052                                        req->flags2 & FLAGS2_DFS_PATHNAMES,
6053                                        name,
6054                                        &name,
6055                                        &src_has_wcard);
6056         if (!NT_STATUS_IS_OK(status)) {
6057                 if (NT_STATUS_EQUAL(status,NT_STATUS_PATH_NOT_COVERED)) {
6058                         reply_botherror(req, NT_STATUS_PATH_NOT_COVERED,
6059                                         ERRSRV, ERRbadpath);
6060                         END_PROFILE(SMBmv);
6061                         return;
6062                 }
6063                 reply_nterror(req, status);
6064                 END_PROFILE(SMBmv);
6065                 return;
6066         }
6067
6068         status = resolve_dfspath_wcard(ctx, conn,
6069                                        req->flags2 & FLAGS2_DFS_PATHNAMES,
6070                                        newname,
6071                                        &newname,
6072                                        &dest_has_wcard);
6073         if (!NT_STATUS_IS_OK(status)) {
6074                 if (NT_STATUS_EQUAL(status,NT_STATUS_PATH_NOT_COVERED)) {
6075                         reply_botherror(req, NT_STATUS_PATH_NOT_COVERED,
6076                                         ERRSRV, ERRbadpath);
6077                         END_PROFILE(SMBmv);
6078                         return;
6079                 }
6080                 reply_nterror(req, status);
6081                 END_PROFILE(SMBmv);
6082                 return;
6083         }
6084
6085         DEBUG(3,("reply_mv : %s -> %s\n",name,newname));
6086
6087         status = rename_internals(ctx, conn, req, name, newname, attrs, False,
6088                                   src_has_wcard, dest_has_wcard, DELETE_ACCESS);
6089         if (!NT_STATUS_IS_OK(status)) {
6090                 if (open_was_deferred(req->mid)) {
6091                         /* We have re-scheduled this call. */
6092                         END_PROFILE(SMBmv);
6093                         return;
6094                 }
6095                 reply_nterror(req, status);
6096                 END_PROFILE(SMBmv);
6097                 return;
6098         }
6099
6100         reply_outbuf(req, 0, 0);
6101
6102         END_PROFILE(SMBmv);
6103         return;
6104 }
6105
6106 /*******************************************************************
6107  Copy a file as part of a reply_copy.
6108 ******************************************************************/
6109
6110 /*
6111  * TODO: check error codes on all callers
6112  */
6113
6114 NTSTATUS copy_file(TALLOC_CTX *ctx,
6115                         connection_struct *conn,
6116                         const char *src,
6117                         const char *dest1,
6118                         int ofun,
6119                         int count,
6120                         bool target_is_directory)
6121 {
6122         SMB_STRUCT_STAT src_sbuf, sbuf2;
6123         SMB_OFF_T ret=-1;
6124         files_struct *fsp1,*fsp2;
6125         char *dest = NULL;
6126         uint32 dosattrs;
6127         uint32 new_create_disposition;
6128         NTSTATUS status;
6129
6130         dest = talloc_strdup(ctx, dest1);
6131         if (!dest) {
6132                 return NT_STATUS_NO_MEMORY;
6133         }
6134         if (target_is_directory) {
6135                 const char *p = strrchr_m(src,'/');
6136                 if (p) {
6137                         p++;
6138                 } else {
6139                         p = src;
6140                 }
6141                 dest = talloc_asprintf_append(dest,
6142                                 "/%s",
6143                                 p);
6144                 if (!dest) {
6145                         return NT_STATUS_NO_MEMORY;
6146                 }
6147         }
6148
6149         if (!vfs_file_exist(conn,src,&src_sbuf)) {
6150                 TALLOC_FREE(dest);
6151                 return NT_STATUS_OBJECT_NAME_NOT_FOUND;
6152         }
6153
6154         if (!target_is_directory && count) {
6155                 new_create_disposition = FILE_OPEN;
6156         } else {
6157                 if (!map_open_params_to_ntcreate(dest1,0,ofun,
6158                                 NULL, NULL, &new_create_disposition, NULL)) {
6159                         TALLOC_FREE(dest);
6160                         return NT_STATUS_INVALID_PARAMETER;
6161                 }
6162         }
6163
6164         status = SMB_VFS_CREATE_FILE(
6165                 conn,                                   /* conn */
6166                 NULL,                                   /* req */
6167                 0,                                      /* root_dir_fid */
6168                 src,                                    /* fname */
6169                 0,                                      /* create_file_flags */
6170                 FILE_GENERIC_READ,                      /* access_mask */
6171                 FILE_SHARE_READ | FILE_SHARE_WRITE,     /* share_access */
6172                 FILE_OPEN,                              /* create_disposition*/
6173                 0,                                      /* create_options */
6174                 FILE_ATTRIBUTE_NORMAL,                  /* file_attributes */
6175                 INTERNAL_OPEN_ONLY,                     /* oplock_request */
6176                 0,                                      /* allocation_size */
6177                 NULL,                                   /* sd */
6178                 NULL,                                   /* ea_list */
6179                 &fsp1,                                  /* result */
6180                 NULL,                                   /* pinfo */
6181                 &src_sbuf);                             /* psbuf */
6182
6183         if (!NT_STATUS_IS_OK(status)) {
6184                 TALLOC_FREE(dest);
6185                 return status;
6186         }
6187
6188         dosattrs = dos_mode(conn, src, &src_sbuf);
6189         if (SMB_VFS_STAT(conn,dest,&sbuf2) == -1) {
6190                 ZERO_STRUCTP(&sbuf2);
6191         }
6192
6193         status = SMB_VFS_CREATE_FILE(
6194                 conn,                                   /* conn */
6195                 NULL,                                   /* req */
6196                 0,                                      /* root_dir_fid */
6197                 dest,                                   /* fname */
6198                 0,                                      /* create_file_flags */
6199                 FILE_GENERIC_WRITE,                     /* access_mask */
6200                 FILE_SHARE_READ | FILE_SHARE_WRITE,     /* share_access */
6201                 new_create_disposition,                 /* create_disposition*/
6202                 0,                                      /* create_options */
6203                 dosattrs,                               /* file_attributes */
6204                 INTERNAL_OPEN_ONLY,                     /* oplock_request */
6205                 0,                                      /* allocation_size */
6206                 NULL,                                   /* sd */
6207                 NULL,                                   /* ea_list */
6208                 &fsp2,                                  /* result */
6209                 NULL,                                   /* pinfo */
6210                 &sbuf2);                                /* psbuf */
6211
6212         TALLOC_FREE(dest);
6213
6214         if (!NT_STATUS_IS_OK(status)) {
6215                 close_file(NULL, fsp1, ERROR_CLOSE);
6216                 return status;
6217         }
6218
6219         if ((ofun&3) == 1) {
6220                 if(SMB_VFS_LSEEK(fsp2,0,SEEK_END) == -1) {
6221                         DEBUG(0,("copy_file: error - vfs lseek returned error %s\n", strerror(errno) ));
6222                         /*
6223                          * Stop the copy from occurring.
6224                          */
6225                         ret = -1;
6226                         src_sbuf.st_size = 0;
6227                 }
6228         }
6229
6230         if (src_sbuf.st_size) {
6231                 ret = vfs_transfer_file(fsp1, fsp2, src_sbuf.st_size);
6232         }
6233
6234         close_file(NULL, fsp1, NORMAL_CLOSE);
6235
6236         /* Ensure the modtime is set correctly on the destination file. */
6237         set_close_write_time(fsp2, get_mtimespec(&src_sbuf));
6238
6239         /*
6240          * As we are opening fsp1 read-only we only expect
6241          * an error on close on fsp2 if we are out of space.
6242          * Thus we don't look at the error return from the
6243          * close of fsp1.
6244          */
6245         status = close_file(NULL, fsp2, NORMAL_CLOSE);
6246
6247         if (!NT_STATUS_IS_OK(status)) {
6248                 return status;
6249         }
6250
6251         if (ret != (SMB_OFF_T)src_sbuf.st_size) {
6252                 return NT_STATUS_DISK_FULL;
6253         }
6254
6255         return NT_STATUS_OK;
6256 }
6257
6258 /****************************************************************************
6259  Reply to a file copy.
6260 ****************************************************************************/
6261
6262 void reply_copy(struct smb_request *req)
6263 {
6264         connection_struct *conn = req->conn;
6265         char *name = NULL;
6266         char *newname = NULL;
6267         char *directory = NULL;
6268         const char *mask = NULL;
6269         const char mask_star[] = "*";
6270         const char *p;
6271         int count=0;
6272         int error = ERRnoaccess;
6273         int err = 0;
6274         int tid2;
6275         int ofun;
6276         int flags;
6277         bool target_is_directory=False;
6278         bool source_has_wild = False;
6279         bool dest_has_wild = False;
6280         SMB_STRUCT_STAT sbuf1, sbuf2;
6281         NTSTATUS status;
6282         TALLOC_CTX *ctx = talloc_tos();
6283
6284         START_PROFILE(SMBcopy);
6285
6286         if (req->wct < 3) {
6287                 reply_nterror(req, NT_STATUS_INVALID_PARAMETER);
6288                 END_PROFILE(SMBcopy);
6289                 return;
6290         }
6291
6292         tid2 = SVAL(req->vwv+0, 0);
6293         ofun = SVAL(req->vwv+1, 0);
6294         flags = SVAL(req->vwv+2, 0);
6295
6296         p = (const char *)req->buf;
6297         p += srvstr_get_path_req_wcard(ctx, req, &name, p, STR_TERMINATE,
6298                                        &status, &source_has_wild);
6299         if (!NT_STATUS_IS_OK(status)) {
6300                 reply_nterror(req, status);
6301                 END_PROFILE(SMBcopy);
6302                 return;
6303         }
6304         p += srvstr_get_path_req_wcard(ctx, req, &newname, p, STR_TERMINATE,
6305                                        &status, &dest_has_wild);
6306         if (!NT_STATUS_IS_OK(status)) {
6307                 reply_nterror(req, status);
6308                 END_PROFILE(SMBcopy);
6309                 return;
6310         }
6311
6312         DEBUG(3,("reply_copy : %s -> %s\n",name,newname));
6313
6314         if (tid2 != conn->cnum) {
6315                 /* can't currently handle inter share copies XXXX */
6316                 DEBUG(3,("Rejecting inter-share copy\n"));
6317                 reply_doserror(req, ERRSRV, ERRinvdevice);
6318                 END_PROFILE(SMBcopy);
6319                 return;
6320         }
6321
6322         status = resolve_dfspath_wcard(ctx, conn,
6323                                        req->flags2 & FLAGS2_DFS_PATHNAMES,
6324                                        name,
6325                                        &name,
6326                                        &source_has_wild);
6327         if (!NT_STATUS_IS_OK(status)) {
6328                 if (NT_STATUS_EQUAL(status,NT_STATUS_PATH_NOT_COVERED)) {
6329                         reply_botherror(req, NT_STATUS_PATH_NOT_COVERED,
6330                                         ERRSRV, ERRbadpath);
6331                         END_PROFILE(SMBcopy);
6332                         return;
6333                 }
6334                 reply_nterror(req, status);
6335                 END_PROFILE(SMBcopy);
6336                 return;
6337         }
6338
6339         status = resolve_dfspath_wcard(ctx, conn,
6340                                        req->flags2 & FLAGS2_DFS_PATHNAMES,
6341                                        newname,
6342                                        &newname,
6343                                        &dest_has_wild);
6344         if (!NT_STATUS_IS_OK(status)) {
6345                 if (NT_STATUS_EQUAL(status,NT_STATUS_PATH_NOT_COVERED)) {
6346                         reply_botherror(req, NT_STATUS_PATH_NOT_COVERED,
6347                                         ERRSRV, ERRbadpath);
6348                         END_PROFILE(SMBcopy);
6349                         return;
6350                 }
6351                 reply_nterror(req, status);
6352                 END_PROFILE(SMBcopy);
6353                 return;
6354         }
6355
6356         status = unix_convert(ctx, conn, name, source_has_wild,
6357                         &name, NULL, &sbuf1);
6358         if (!NT_STATUS_IS_OK(status)) {
6359                 reply_nterror(req, status);
6360                 END_PROFILE(SMBcopy);
6361                 return;
6362         }
6363
6364         status = unix_convert(ctx, conn, newname, dest_has_wild,
6365                         &newname, NULL, &sbuf2);
6366         if (!NT_STATUS_IS_OK(status)) {
6367                 reply_nterror(req, status);
6368                 END_PROFILE(SMBcopy);
6369                 return;
6370         }
6371
6372         target_is_directory = VALID_STAT_OF_DIR(sbuf2);
6373
6374         if ((flags&1) && target_is_directory) {
6375                 reply_doserror(req, ERRDOS, ERRbadfile);
6376                 END_PROFILE(SMBcopy);
6377                 return;
6378         }
6379
6380         if ((flags&2) && !target_is_directory) {
6381                 reply_doserror(req, ERRDOS, ERRbadpath);
6382                 END_PROFILE(SMBcopy);
6383                 return;
6384         }
6385
6386         if ((flags&(1<<5)) && VALID_STAT_OF_DIR(sbuf1)) {
6387                 /* wants a tree copy! XXXX */
6388                 DEBUG(3,("Rejecting tree copy\n"));
6389                 reply_doserror(req, ERRSRV, ERRerror);
6390                 END_PROFILE(SMBcopy);
6391                 return;
6392         }
6393
6394         p = strrchr_m(name,'/');
6395         if (p != NULL) {
6396                 directory = talloc_strndup(ctx, name, PTR_DIFF(p, name));
6397                 mask = p+1;
6398         } else {
6399                 directory = talloc_strdup(ctx, "./");
6400                 mask = name;
6401         }
6402
6403         if (!directory) {
6404                 reply_nterror(req, NT_STATUS_NO_MEMORY);
6405                 END_PROFILE(SMBcopy);
6406                 return;
6407         }
6408
6409         /*
6410          * We should only check the mangled cache
6411          * here if unix_convert failed. This means
6412          * that the path in 'mask' doesn't exist
6413          * on the file system and so we need to look
6414          * for a possible mangle. This patch from
6415          * Tine Smukavec <valentin.smukavec@hermes.si>.
6416          */
6417
6418         if (!VALID_STAT(sbuf1) && mangle_is_mangled(mask, conn->params)) {
6419                 char *new_mask = NULL;
6420                 mangle_lookup_name_from_8_3(ctx,
6421                                         mask,
6422                                         &new_mask,
6423                                         conn->params );
6424                 if (new_mask) {
6425                         mask = new_mask;
6426                 }
6427         }
6428
6429         if (!source_has_wild) {
6430                 directory = talloc_asprintf_append(directory,
6431                                 "/%s",
6432                                 mask);
6433                 if (dest_has_wild) {
6434                         char *mod_newname = NULL;
6435                         if (!resolve_wildcards(ctx,
6436                                         directory,newname,&mod_newname)) {
6437                                 reply_nterror(req, NT_STATUS_NO_MEMORY);
6438                                 END_PROFILE(SMBcopy);
6439                                 return;
6440                         }
6441                         newname = mod_newname;
6442                 }
6443
6444                 status = check_name(conn, directory);
6445                 if (!NT_STATUS_IS_OK(status)) {
6446                         reply_nterror(req, status);
6447                         END_PROFILE(SMBcopy);
6448                         return;
6449                 }
6450
6451                 status = check_name(conn, newname);
6452                 if (!NT_STATUS_IS_OK(status)) {
6453                         reply_nterror(req, status);
6454                         END_PROFILE(SMBcopy);
6455                         return;
6456                 }
6457
6458                 status = copy_file(ctx,conn,directory,newname,ofun,
6459                                 count,target_is_directory);
6460
6461                 if(!NT_STATUS_IS_OK(status)) {
6462                         reply_nterror(req, status);
6463                         END_PROFILE(SMBcopy);
6464                         return;
6465                 } else {
6466                         count++;
6467                 }
6468         } else {
6469                 struct smb_Dir *dir_hnd = NULL;
6470                 const char *dname = NULL;
6471                 long offset = 0;
6472
6473                 if (strequal(mask,"????????.???")) {
6474                         mask = mask_star;
6475                 }
6476
6477                 status = check_name(conn, directory);
6478                 if (!NT_STATUS_IS_OK(status)) {
6479                         reply_nterror(req, status);
6480                         END_PROFILE(SMBcopy);
6481                         return;
6482                 }
6483
6484                 dir_hnd = OpenDir(talloc_tos(), conn, directory, mask, 0);
6485                 if (dir_hnd == NULL) {
6486                         status = map_nt_error_from_unix(errno);
6487                         reply_nterror(req, status);
6488                         END_PROFILE(SMBcopy);
6489                         return;
6490                 }
6491
6492                 error = ERRbadfile;
6493
6494                 while ((dname = ReadDirName(dir_hnd, &offset))) {
6495                         char *destname = NULL;
6496                         char *fname = NULL;
6497
6498                         if (ISDOT(dname) || ISDOTDOT(dname)) {
6499                                 continue;
6500                         }
6501
6502                         if (!is_visible_file(conn, directory, dname, &sbuf1, False)) {
6503                                 continue;
6504                         }
6505
6506                         if(!mask_match(dname, mask, conn->case_sensitive)) {
6507                                 continue;
6508                         }
6509
6510                         error = ERRnoaccess;
6511                         fname = talloc_asprintf(ctx,
6512                                         "%s/%s",
6513                                         directory,
6514                                         dname);
6515                         if (!fname) {
6516                                 TALLOC_FREE(dir_hnd);
6517                                 reply_nterror(req, NT_STATUS_NO_MEMORY);
6518                                 END_PROFILE(SMBcopy);
6519                                 return;
6520                         }
6521
6522                         if (!resolve_wildcards(ctx,
6523                                         fname,newname,&destname)) {
6524                                 continue;
6525                         }
6526                         if (!destname) {
6527                                 TALLOC_FREE(dir_hnd);
6528                                 reply_nterror(req, NT_STATUS_NO_MEMORY);
6529                                 END_PROFILE(SMBcopy);
6530                                 return;
6531                         }
6532
6533                         status = check_name(conn, fname);
6534                         if (!NT_STATUS_IS_OK(status)) {
6535                                 TALLOC_FREE(dir_hnd);
6536                                 reply_nterror(req, status);
6537                                 END_PROFILE(SMBcopy);
6538                                 return;
6539                         }
6540
6541                         status = check_name(conn, destname);
6542                         if (!NT_STATUS_IS_OK(status)) {
6543                                 TALLOC_FREE(dir_hnd);
6544                                 reply_nterror(req, status);
6545                                 END_PROFILE(SMBcopy);
6546                                 return;
6547                         }
6548
6549                         DEBUG(3,("reply_copy : doing copy on %s -> %s\n",fname, destname));
6550
6551                         status = copy_file(ctx,conn,fname,destname,ofun,
6552                                         count,target_is_directory);
6553                         if (NT_STATUS_IS_OK(status)) {
6554                                 count++;
6555                         }
6556                         TALLOC_FREE(fname);
6557                         TALLOC_FREE(destname);
6558                 }
6559                 TALLOC_FREE(dir_hnd);
6560         }
6561
6562         if (count == 0) {
6563                 if(err) {
6564                         /* Error on close... */
6565                         errno = err;
6566                         reply_unixerror(req, ERRHRD, ERRgeneral);
6567                         END_PROFILE(SMBcopy);
6568                         return;
6569                 }
6570
6571                 reply_doserror(req, ERRDOS, error);
6572                 END_PROFILE(SMBcopy);
6573                 return;
6574         }
6575
6576         reply_outbuf(req, 1, 0);
6577         SSVAL(req->outbuf,smb_vwv0,count);
6578
6579         END_PROFILE(SMBcopy);
6580         return;
6581 }
6582
6583 #undef DBGC_CLASS
6584 #define DBGC_CLASS DBGC_LOCKING
6585
6586 /****************************************************************************
6587  Get a lock pid, dealing with large count requests.
6588 ****************************************************************************/
6589
6590 uint32 get_lock_pid(const uint8_t *data, int data_offset,
6591                     bool large_file_format)
6592 {
6593         if(!large_file_format)
6594                 return (uint32)SVAL(data,SMB_LPID_OFFSET(data_offset));
6595         else
6596                 return (uint32)SVAL(data,SMB_LARGE_LPID_OFFSET(data_offset));
6597 }
6598
6599 /****************************************************************************
6600  Get a lock count, dealing with large count requests.
6601 ****************************************************************************/
6602
6603 uint64_t get_lock_count(const uint8_t *data, int data_offset,
6604                         bool large_file_format)
6605 {
6606         uint64_t count = 0;
6607
6608         if(!large_file_format) {
6609                 count = (uint64_t)IVAL(data,SMB_LKLEN_OFFSET(data_offset));
6610         } else {
6611
6612 #if defined(HAVE_LONGLONG)
6613                 count = (((uint64_t) IVAL(data,SMB_LARGE_LKLEN_OFFSET_HIGH(data_offset))) << 32) |
6614                         ((uint64_t) IVAL(data,SMB_LARGE_LKLEN_OFFSET_LOW(data_offset)));
6615 #else /* HAVE_LONGLONG */
6616
6617                 /*
6618                  * NT4.x seems to be broken in that it sends large file (64 bit)
6619                  * lockingX calls even if the CAP_LARGE_FILES was *not*
6620                  * negotiated. For boxes without large unsigned ints truncate the
6621                  * lock count by dropping the top 32 bits.
6622                  */
6623
6624                 if(IVAL(data,SMB_LARGE_LKLEN_OFFSET_HIGH(data_offset)) != 0) {
6625                         DEBUG(3,("get_lock_count: truncating lock count (high)0x%x (low)0x%x to just low count.\n",
6626                                 (unsigned int)IVAL(data,SMB_LARGE_LKLEN_OFFSET_HIGH(data_offset)),
6627                                 (unsigned int)IVAL(data,SMB_LARGE_LKLEN_OFFSET_LOW(data_offset)) ));
6628                                 SIVAL(data,SMB_LARGE_LKLEN_OFFSET_HIGH(data_offset),0);
6629                 }
6630
6631                 count = (uint64_t)IVAL(data,SMB_LARGE_LKLEN_OFFSET_LOW(data_offset));
6632 #endif /* HAVE_LONGLONG */
6633         }
6634
6635         return count;
6636 }
6637
6638 #if !defined(HAVE_LONGLONG)
6639 /****************************************************************************
6640  Pathetically try and map a 64 bit lock offset into 31 bits. I hate Windows :-).
6641 ****************************************************************************/
6642
6643 static uint32 map_lock_offset(uint32 high, uint32 low)
6644 {
6645         unsigned int i;
6646         uint32 mask = 0;
6647         uint32 highcopy = high;
6648
6649         /*
6650          * Try and find out how many significant bits there are in high.
6651          */
6652
6653         for(i = 0; highcopy; i++)
6654                 highcopy >>= 1;
6655
6656         /*
6657          * We use 31 bits not 32 here as POSIX
6658          * lock offsets may not be negative.
6659          */
6660
6661         mask = (~0) << (31 - i);
6662
6663         if(low & mask)
6664                 return 0; /* Fail. */
6665
6666         high <<= (31 - i);
6667
6668         return (high|low);
6669 }
6670 #endif /* !defined(HAVE_LONGLONG) */
6671
6672 /****************************************************************************
6673  Get a lock offset, dealing with large offset requests.
6674 ****************************************************************************/
6675
6676 uint64_t get_lock_offset(const uint8_t *data, int data_offset,
6677                          bool large_file_format, bool *err)
6678 {
6679         uint64_t offset = 0;
6680
6681         *err = False;
6682
6683         if(!large_file_format) {
6684                 offset = (uint64_t)IVAL(data,SMB_LKOFF_OFFSET(data_offset));
6685         } else {
6686
6687 #if defined(HAVE_LONGLONG)
6688                 offset = (((uint64_t) IVAL(data,SMB_LARGE_LKOFF_OFFSET_HIGH(data_offset))) << 32) |
6689                                 ((uint64_t) IVAL(data,SMB_LARGE_LKOFF_OFFSET_LOW(data_offset)));
6690 #else /* HAVE_LONGLONG */
6691
6692                 /*
6693                  * NT4.x seems to be broken in that it sends large file (64 bit)
6694                  * lockingX calls even if the CAP_LARGE_FILES was *not*
6695                  * negotiated. For boxes without large unsigned ints mangle the
6696                  * lock offset by mapping the top 32 bits onto the lower 32.
6697                  */
6698
6699                 if(IVAL(data,SMB_LARGE_LKOFF_OFFSET_HIGH(data_offset)) != 0) {
6700                         uint32 low = IVAL(data,SMB_LARGE_LKOFF_OFFSET_LOW(data_offset));
6701                         uint32 high = IVAL(data,SMB_LARGE_LKOFF_OFFSET_HIGH(data_offset));
6702                         uint32 new_low = 0;
6703
6704                         if((new_low = map_lock_offset(high, low)) == 0) {
6705                                 *err = True;
6706                                 return (uint64_t)-1;
6707                         }
6708
6709                         DEBUG(3,("get_lock_offset: truncating lock offset (high)0x%x (low)0x%x to offset 0x%x.\n",
6710                                 (unsigned int)high, (unsigned int)low, (unsigned int)new_low ));
6711                         SIVAL(data,SMB_LARGE_LKOFF_OFFSET_HIGH(data_offset),0);
6712                         SIVAL(data,SMB_LARGE_LKOFF_OFFSET_LOW(data_offset),new_low);
6713                 }
6714
6715                 offset = (uint64_t)IVAL(data,SMB_LARGE_LKOFF_OFFSET_LOW(data_offset));
6716 #endif /* HAVE_LONGLONG */
6717         }
6718
6719         return offset;
6720 }
6721
6722 /****************************************************************************
6723  Reply to a lockingX request.
6724 ****************************************************************************/
6725
6726 void reply_lockingX(struct smb_request *req)
6727 {
6728         connection_struct *conn = req->conn;
6729         files_struct *fsp;
6730         unsigned char locktype;
6731         unsigned char oplocklevel;
6732         uint16 num_ulocks;
6733         uint16 num_locks;
6734         uint64_t count = 0, offset = 0;
6735         uint32 lock_pid;
6736         int32 lock_timeout;
6737         int i;
6738         const uint8_t *data;
6739         bool large_file_format;
6740         bool err;
6741         NTSTATUS status = NT_STATUS_UNSUCCESSFUL;
6742
6743         START_PROFILE(SMBlockingX);
6744
6745         if (req->wct < 8) {
6746                 reply_nterror(req, NT_STATUS_INVALID_PARAMETER);
6747                 END_PROFILE(SMBlockingX);
6748                 return;
6749         }
6750
6751         fsp = file_fsp(req, SVAL(req->vwv+2, 0));
6752         locktype = CVAL(req->vwv+3, 0);
6753         oplocklevel = CVAL(req->vwv+3, 1);
6754         num_ulocks = SVAL(req->vwv+6, 0);
6755         num_locks = SVAL(req->vwv+7, 0);
6756         lock_timeout = IVAL(req->vwv+4, 0);
6757         large_file_format = (locktype & LOCKING_ANDX_LARGE_FILES)?True:False;
6758
6759         if (!check_fsp(conn, req, fsp)) {
6760                 END_PROFILE(SMBlockingX);
6761                 return;
6762         }
6763
6764         data = req->buf;
6765
6766         if (locktype & LOCKING_ANDX_CHANGE_LOCKTYPE) {
6767                 /* we don't support these - and CANCEL_LOCK makes w2k
6768                    and XP reboot so I don't really want to be
6769                    compatible! (tridge) */
6770                 reply_nterror(req, NT_STATUS_DOS(ERRDOS, ERRnoatomiclocks));
6771                 END_PROFILE(SMBlockingX);
6772                 return;
6773         }
6774
6775         /* Check if this is an oplock break on a file
6776            we have granted an oplock on.
6777         */
6778         if ((locktype & LOCKING_ANDX_OPLOCK_RELEASE)) {
6779                 /* Client can insist on breaking to none. */
6780                 bool break_to_none = (oplocklevel == 0);
6781                 bool result;
6782
6783                 DEBUG(5,("reply_lockingX: oplock break reply (%u) from client "
6784                          "for fnum = %d\n", (unsigned int)oplocklevel,
6785                          fsp->fnum ));
6786
6787                 /*
6788                  * Make sure we have granted an exclusive or batch oplock on
6789                  * this file.
6790                  */
6791
6792                 if (fsp->oplock_type == 0) {
6793
6794                         /* The Samba4 nbench simulator doesn't understand
6795                            the difference between break to level2 and break
6796                            to none from level2 - it sends oplock break
6797                            replies in both cases. Don't keep logging an error
6798                            message here - just ignore it. JRA. */
6799
6800                         DEBUG(5,("reply_lockingX: Error : oplock break from "
6801                                  "client for fnum = %d (oplock=%d) and no "
6802                                  "oplock granted on this file (%s).\n",
6803                                  fsp->fnum, fsp->oplock_type, fsp->fsp_name));
6804
6805                         /* if this is a pure oplock break request then don't
6806                          * send a reply */
6807                         if (num_locks == 0 && num_ulocks == 0) {
6808                                 END_PROFILE(SMBlockingX);
6809                                 return;
6810                         } else {
6811                                 END_PROFILE(SMBlockingX);
6812                                 reply_doserror(req, ERRDOS, ERRlock);
6813                                 return;
6814                         }
6815                 }
6816
6817                 if ((fsp->sent_oplock_break == BREAK_TO_NONE_SENT) ||
6818                     (break_to_none)) {
6819                         result = remove_oplock(fsp);
6820                 } else {
6821                         result = downgrade_oplock(fsp);
6822                 }
6823
6824                 if (!result) {
6825                         DEBUG(0, ("reply_lockingX: error in removing "
6826                                   "oplock on file %s\n", fsp->fsp_name));
6827                         /* Hmmm. Is this panic justified? */
6828                         smb_panic("internal tdb error");
6829                 }
6830
6831                 reply_to_oplock_break_requests(fsp);
6832
6833                 /* if this is a pure oplock break request then don't send a
6834                  * reply */
6835                 if (num_locks == 0 && num_ulocks == 0) {
6836                         /* Sanity check - ensure a pure oplock break is not a
6837                            chained request. */
6838                         if(CVAL(req->vwv+0, 0) != 0xff)
6839                                 DEBUG(0,("reply_lockingX: Error : pure oplock "
6840                                          "break is a chained %d request !\n",
6841                                          (unsigned int)CVAL(req->vwv+0, 0)));
6842                         END_PROFILE(SMBlockingX);
6843                         return;
6844                 }
6845         }
6846
6847         /*
6848          * We do this check *after* we have checked this is not a oplock break
6849          * response message. JRA.
6850          */
6851
6852         release_level_2_oplocks_on_change(fsp);
6853
6854         if (req->buflen <
6855             (num_ulocks + num_locks) * (large_file_format ? 20 : 10)) {
6856                 reply_nterror(req, NT_STATUS_INVALID_PARAMETER);
6857                 END_PROFILE(SMBlockingX);
6858                 return;
6859         }
6860
6861         /* Data now points at the beginning of the list
6862            of smb_unlkrng structs */
6863         for(i = 0; i < (int)num_ulocks; i++) {
6864                 lock_pid = get_lock_pid( data, i, large_file_format);
6865                 count = get_lock_count( data, i, large_file_format);
6866                 offset = get_lock_offset( data, i, large_file_format, &err);
6867
6868                 /*
6869                  * There is no error code marked "stupid client bug".... :-).
6870                  */
6871                 if(err) {
6872                         END_PROFILE(SMBlockingX);
6873                         reply_doserror(req, ERRDOS, ERRnoaccess);
6874                         return;
6875                 }
6876
6877                 DEBUG(10,("reply_lockingX: unlock start=%.0f, len=%.0f for "
6878                           "pid %u, file %s\n", (double)offset, (double)count,
6879                           (unsigned int)lock_pid, fsp->fsp_name ));
6880
6881                 status = do_unlock(smbd_messaging_context(),
6882                                 fsp,
6883                                 lock_pid,
6884                                 count,
6885                                 offset,
6886                                 WINDOWS_LOCK);
6887
6888                 if (NT_STATUS_V(status)) {
6889                         END_PROFILE(SMBlockingX);
6890                         reply_nterror(req, status);
6891                         return;
6892                 }
6893         }
6894
6895         /* Setup the timeout in seconds. */
6896
6897         if (!lp_blocking_locks(SNUM(conn))) {
6898                 lock_timeout = 0;
6899         }
6900
6901         /* Now do any requested locks */
6902         data += ((large_file_format ? 20 : 10)*num_ulocks);
6903
6904         /* Data now points at the beginning of the list
6905            of smb_lkrng structs */
6906
6907         for(i = 0; i < (int)num_locks; i++) {
6908                 enum brl_type lock_type = ((locktype & LOCKING_ANDX_SHARED_LOCK) ?
6909                                 READ_LOCK:WRITE_LOCK);
6910                 lock_pid = get_lock_pid( data, i, large_file_format);
6911                 count = get_lock_count( data, i, large_file_format);
6912                 offset = get_lock_offset( data, i, large_file_format, &err);
6913
6914                 /*
6915                  * There is no error code marked "stupid client bug".... :-).
6916                  */
6917                 if(err) {
6918                         END_PROFILE(SMBlockingX);
6919                         reply_doserror(req, ERRDOS, ERRnoaccess);
6920                         return;
6921                 }
6922
6923                 DEBUG(10,("reply_lockingX: lock start=%.0f, len=%.0f for pid "
6924                           "%u, file %s timeout = %d\n", (double)offset,
6925                           (double)count, (unsigned int)lock_pid,
6926                           fsp->fsp_name, (int)lock_timeout ));
6927
6928                 if (locktype & LOCKING_ANDX_CANCEL_LOCK) {
6929                         if (lp_blocking_locks(SNUM(conn))) {
6930
6931                                 /* Schedule a message to ourselves to
6932                                    remove the blocking lock record and
6933                                    return the right error. */
6934
6935                                 if (!blocking_lock_cancel(fsp,
6936                                                 lock_pid,
6937                                                 offset,
6938                                                 count,
6939                                                 WINDOWS_LOCK,
6940                                                 locktype,
6941                                                 NT_STATUS_FILE_LOCK_CONFLICT)) {
6942                                         END_PROFILE(SMBlockingX);
6943                                         reply_nterror(
6944                                                 req,
6945                                                 NT_STATUS_DOS(
6946                                                         ERRDOS,
6947                                                         ERRcancelviolation));
6948                                         return;
6949                                 }
6950                         }
6951                         /* Remove a matching pending lock. */
6952                         status = do_lock_cancel(fsp,
6953                                                 lock_pid,
6954                                                 count,
6955                                                 offset,
6956                                                 WINDOWS_LOCK);
6957                 } else {
6958                         bool blocking_lock = lock_timeout ? True : False;
6959                         bool defer_lock = False;
6960                         struct byte_range_lock *br_lck;
6961                         uint32 block_smbpid;
6962
6963                         br_lck = do_lock(smbd_messaging_context(),
6964                                         fsp,
6965                                         lock_pid,
6966                                         count,
6967                                         offset, 
6968                                         lock_type,
6969                                         WINDOWS_LOCK,
6970                                         blocking_lock,
6971                                         &status,
6972                                         &block_smbpid);
6973
6974                         if (br_lck && blocking_lock && ERROR_WAS_LOCK_DENIED(status)) {
6975                                 /* Windows internal resolution for blocking locks seems
6976                                    to be about 200ms... Don't wait for less than that. JRA. */
6977                                 if (lock_timeout != -1 && lock_timeout < lp_lock_spin_time()) {
6978                                         lock_timeout = lp_lock_spin_time();
6979                                 }
6980                                 defer_lock = True;
6981                         }
6982
6983                         /* This heuristic seems to match W2K3 very well. If a
6984                            lock sent with timeout of zero would fail with NT_STATUS_FILE_LOCK_CONFLICT
6985                            it pretends we asked for a timeout of between 150 - 300 milliseconds as
6986                            far as I can tell. Replacement for do_lock_spin(). JRA. */
6987
6988                         if (br_lck && lp_blocking_locks(SNUM(conn)) && !blocking_lock &&
6989                                         NT_STATUS_EQUAL((status), NT_STATUS_FILE_LOCK_CONFLICT)) {
6990                                 defer_lock = True;
6991                                 lock_timeout = lp_lock_spin_time();
6992                         }
6993
6994                         if (br_lck && defer_lock) {
6995                                 /*
6996                                  * A blocking lock was requested. Package up
6997                                  * this smb into a queued request and push it
6998                                  * onto the blocking lock queue.
6999                                  */
7000                                 if(push_blocking_lock_request(br_lck,
7001                                                         req,
7002                                                         fsp,
7003                                                         lock_timeout,
7004                                                         i,
7005                                                         lock_pid,
7006                                                         lock_type,
7007                                                         WINDOWS_LOCK,
7008                                                         offset,
7009                                                         count,
7010                                                         block_smbpid)) {
7011                                         TALLOC_FREE(br_lck);
7012                                         END_PROFILE(SMBlockingX);
7013                                         return;
7014                                 }
7015                         }
7016
7017                         TALLOC_FREE(br_lck);
7018                 }
7019
7020                 if (NT_STATUS_V(status)) {
7021                         END_PROFILE(SMBlockingX);
7022                         reply_nterror(req, status);
7023                         return;
7024                 }
7025         }
7026
7027         /* If any of the above locks failed, then we must unlock
7028            all of the previous locks (X/Open spec). */
7029
7030         if (!(locktype & LOCKING_ANDX_CANCEL_LOCK) &&
7031                         (i != num_locks) &&
7032                         (num_locks != 0)) {
7033                 /*
7034                  * Ensure we don't do a remove on the lock that just failed,
7035                  * as under POSIX rules, if we have a lock already there, we
7036                  * will delete it (and we shouldn't) .....
7037                  */
7038                 for(i--; i >= 0; i--) {
7039                         lock_pid = get_lock_pid( data, i, large_file_format);
7040                         count = get_lock_count( data, i, large_file_format);
7041                         offset = get_lock_offset( data, i, large_file_format,
7042                                                   &err);
7043
7044                         /*
7045                          * There is no error code marked "stupid client
7046                          * bug".... :-).
7047                          */
7048                         if(err) {
7049                                 END_PROFILE(SMBlockingX);
7050                                 reply_doserror(req, ERRDOS, ERRnoaccess);
7051                                 return;
7052                         }
7053
7054                         do_unlock(smbd_messaging_context(),
7055                                 fsp,
7056                                 lock_pid,
7057                                 count,
7058                                 offset,
7059                                 WINDOWS_LOCK);
7060                 }
7061                 END_PROFILE(SMBlockingX);
7062                 reply_nterror(req, status);
7063                 return;
7064         }
7065
7066         reply_outbuf(req, 2, 0);
7067
7068         DEBUG(3, ("lockingX fnum=%d type=%d num_locks=%d num_ulocks=%d\n",
7069                   fsp->fnum, (unsigned int)locktype, num_locks, num_ulocks));
7070
7071         END_PROFILE(SMBlockingX);
7072         chain_reply(req);
7073 }
7074
7075 #undef DBGC_CLASS
7076 #define DBGC_CLASS DBGC_ALL
7077
7078 /****************************************************************************
7079  Reply to a SMBreadbmpx (read block multiplex) request.
7080  Always reply with an error, if someone has a platform really needs this,
7081  please contact vl@samba.org
7082 ****************************************************************************/
7083
7084 void reply_readbmpx(struct smb_request *req)
7085 {
7086         START_PROFILE(SMBreadBmpx);
7087         reply_doserror(req, ERRSRV, ERRuseSTD);
7088         END_PROFILE(SMBreadBmpx);
7089         return;
7090 }
7091
7092 /****************************************************************************
7093  Reply to a SMBreadbs (read block multiplex secondary) request.
7094  Always reply with an error, if someone has a platform really needs this,
7095  please contact vl@samba.org
7096 ****************************************************************************/
7097
7098 void reply_readbs(struct smb_request *req)
7099 {
7100         START_PROFILE(SMBreadBs);
7101         reply_doserror(req, ERRSRV, ERRuseSTD);
7102         END_PROFILE(SMBreadBs);
7103         return;
7104 }
7105
7106 /****************************************************************************
7107  Reply to a SMBsetattrE.
7108 ****************************************************************************/
7109
7110 void reply_setattrE(struct smb_request *req)
7111 {
7112         connection_struct *conn = req->conn;
7113         struct timespec ts[2];
7114         files_struct *fsp;
7115         SMB_STRUCT_STAT sbuf;
7116         NTSTATUS status;
7117
7118         START_PROFILE(SMBsetattrE);
7119
7120         if (req->wct < 7) {
7121                 reply_nterror(req, NT_STATUS_INVALID_PARAMETER);
7122                 END_PROFILE(SMBsetattrE);
7123                 return;
7124         }
7125
7126         fsp = file_fsp(req, SVAL(req->vwv+0, 0));
7127
7128         if(!fsp || (fsp->conn != conn)) {
7129                 reply_doserror(req, ERRDOS, ERRbadfid);
7130                 END_PROFILE(SMBsetattrE);
7131                 return;
7132         }
7133
7134
7135         /*
7136          * Convert the DOS times into unix times. Ignore create
7137          * time as UNIX can't set this.
7138          */
7139
7140         ts[0] = convert_time_t_to_timespec(
7141                 srv_make_unix_date2(req->vwv+3)); /* atime. */
7142         ts[1] = convert_time_t_to_timespec(
7143                 srv_make_unix_date2(req->vwv+5)); /* mtime. */
7144
7145         reply_outbuf(req, 0, 0);
7146
7147         /* 
7148          * Patch from Ray Frush <frush@engr.colostate.edu>
7149          * Sometimes times are sent as zero - ignore them.
7150          */
7151
7152         /* Ensure we have a valid stat struct for the source. */
7153         if (fsp->fh->fd != -1) {
7154                 if (SMB_VFS_FSTAT(fsp, &sbuf) == -1) {
7155                         status = map_nt_error_from_unix(errno);
7156                         reply_nterror(req, status);
7157                         END_PROFILE(SMBsetattrE);
7158                         return;
7159                 }
7160         } else {
7161                 if (SMB_VFS_STAT(conn, fsp->fsp_name, &sbuf) == -1) {
7162                         status = map_nt_error_from_unix(errno);
7163                         reply_nterror(req, status);
7164                         END_PROFILE(SMBsetattrE);
7165                         return;
7166                 }
7167         }
7168
7169         status = smb_set_file_time(conn, fsp, fsp->fsp_name,
7170                                    &sbuf, ts, true);
7171         if (!NT_STATUS_IS_OK(status)) {
7172                 reply_doserror(req, ERRDOS, ERRnoaccess);
7173                 END_PROFILE(SMBsetattrE);
7174                 return;
7175         }
7176
7177         DEBUG( 3, ( "reply_setattrE fnum=%d actime=%u modtime=%u\n",
7178                 fsp->fnum,
7179                 (unsigned int)ts[0].tv_sec,
7180                 (unsigned int)ts[1].tv_sec));
7181
7182         END_PROFILE(SMBsetattrE);
7183         return;
7184 }
7185
7186
7187 /* Back from the dead for OS/2..... JRA. */
7188
7189 /****************************************************************************
7190  Reply to a SMBwritebmpx (write block multiplex primary) request.
7191  Always reply with an error, if someone has a platform really needs this,
7192  please contact vl@samba.org
7193 ****************************************************************************/
7194
7195 void reply_writebmpx(struct smb_request *req)
7196 {
7197         START_PROFILE(SMBwriteBmpx);
7198         reply_doserror(req, ERRSRV, ERRuseSTD);
7199         END_PROFILE(SMBwriteBmpx);
7200         return;
7201 }
7202
7203 /****************************************************************************
7204  Reply to a SMBwritebs (write block multiplex secondary) request.
7205  Always reply with an error, if someone has a platform really needs this,
7206  please contact vl@samba.org
7207 ****************************************************************************/
7208
7209 void reply_writebs(struct smb_request *req)
7210 {
7211         START_PROFILE(SMBwriteBs);
7212         reply_doserror(req, ERRSRV, ERRuseSTD);
7213         END_PROFILE(SMBwriteBs);
7214         return;
7215 }
7216
7217 /****************************************************************************
7218  Reply to a SMBgetattrE.
7219 ****************************************************************************/
7220
7221 void reply_getattrE(struct smb_request *req)
7222 {
7223         connection_struct *conn = req->conn;
7224         SMB_STRUCT_STAT sbuf;
7225         int mode;
7226         files_struct *fsp;
7227         struct timespec create_ts;
7228
7229         START_PROFILE(SMBgetattrE);
7230
7231         if (req->wct < 1) {
7232                 reply_nterror(req, NT_STATUS_INVALID_PARAMETER);
7233                 END_PROFILE(SMBgetattrE);
7234                 return;
7235         }
7236
7237         fsp = file_fsp(req, SVAL(req->vwv+0, 0));
7238
7239         if(!fsp || (fsp->conn != conn)) {
7240                 reply_doserror(req, ERRDOS, ERRbadfid);
7241                 END_PROFILE(SMBgetattrE);
7242                 return;
7243         }
7244
7245         /* Do an fstat on this file */
7246         if(fsp_stat(fsp, &sbuf)) {
7247                 reply_unixerror(req, ERRDOS, ERRnoaccess);
7248                 END_PROFILE(SMBgetattrE);
7249                 return;
7250         }
7251
7252         mode = dos_mode(conn,fsp->fsp_name,&sbuf);
7253
7254         /*
7255          * Convert the times into dos times. Set create
7256          * date to be last modify date as UNIX doesn't save
7257          * this.
7258          */
7259
7260         reply_outbuf(req, 11, 0);
7261
7262         create_ts = get_create_timespec(&sbuf,
7263                                   lp_fake_dir_create_times(SNUM(conn)));
7264         srv_put_dos_date2((char *)req->outbuf, smb_vwv0, create_ts.tv_sec);
7265         srv_put_dos_date2((char *)req->outbuf, smb_vwv2, sbuf.st_atime);
7266         /* Should we check pending modtime here ? JRA */
7267         srv_put_dos_date2((char *)req->outbuf, smb_vwv4, sbuf.st_mtime);
7268
7269         if (mode & aDIR) {
7270                 SIVAL(req->outbuf, smb_vwv6, 0);
7271                 SIVAL(req->outbuf, smb_vwv8, 0);
7272         } else {
7273                 uint32 allocation_size = get_allocation_size(conn,fsp, &sbuf);
7274                 SIVAL(req->outbuf, smb_vwv6, (uint32)sbuf.st_size);
7275                 SIVAL(req->outbuf, smb_vwv8, allocation_size);
7276         }
7277         SSVAL(req->outbuf,smb_vwv10, mode);
7278
7279         DEBUG( 3, ( "reply_getattrE fnum=%d\n", fsp->fnum));
7280
7281         END_PROFILE(SMBgetattrE);
7282         return;
7283 }