#define FILE_HANDLE_OFFSET 0x1000
-/****************************************************************************
- Return a unique number identifying this fsp over the life of this pid.
-****************************************************************************/
-
-static unsigned long get_gen_count(struct smbd_server_connection *sconn)
-{
- sconn->file_gen_counter += 1;
- if (sconn->file_gen_counter == 0) {
- sconn->file_gen_counter += 1;
- }
- return sconn->file_gen_counter;
-}
-
-/****************************************************************************
- Find first available file slot.
-****************************************************************************/
-
-NTSTATUS file_new(struct smb_request *req, connection_struct *conn,
- files_struct **result)
+/**
+ * create new fsp to be used for file_new or a durable handle reconnect
+ */
+NTSTATUS fsp_new(struct connection_struct *conn, TALLOC_CTX *mem_ctx,
+ files_struct **result)
{
+ NTSTATUS status = NT_STATUS_NO_MEMORY;
+ files_struct *fsp = NULL;
struct smbd_server_connection *sconn = conn->sconn;
- int i = -1;
- files_struct *fsp;
- NTSTATUS status;
- if (sconn->file_bmap != NULL) {
-
- /*
- * we want to give out file handles differently on each new
- * connection because of a common bug in MS clients where they
- * try to reuse a file descriptor from an earlier smb
- * connection. This code increases the chance that the errant
- * client will get an error rather than causing corruption
- */
- if (sconn->first_file == 0) {
- sconn->first_file = (getpid() ^ (int)time(NULL));
- sconn->first_file %= sconn->real_max_open_files;
- }
-
- /* TODO: Port the id-tree implementation from Samba4 */
-
- i = bitmap_find(sconn->file_bmap, sconn->first_file);
- if (i == -1) {
- DEBUG(0,("ERROR! Out of file structures\n"));
- /*
- * TODO: We have to unconditionally return a DOS error
- * here, W2k3 even returns ERRDOS/ERRnofids for
- * ntcreate&x with NTSTATUS negotiated
- */
- return NT_STATUS_TOO_MANY_OPENED_FILES;
- }
- }
-
- /*
- * Make a child of the connection_struct as an fsp can't exist
- * independent of a connection.
- */
- fsp = talloc_zero(conn, struct files_struct);
- if (!fsp) {
- return NT_STATUS_NO_MEMORY;
+ fsp = talloc_zero(mem_ctx, struct files_struct);
+ if (fsp == NULL) {
+ goto fail;
}
/*
* when doing a dos/fcb open, which will then share the file_handle
* across multiple fsps.
*/
- fsp->fh = talloc_zero(conn, struct fd_handle);
- if (!fsp->fh) {
- TALLOC_FREE(fsp);
- return NT_STATUS_NO_MEMORY;
+ fsp->fh = talloc_zero(mem_ctx, struct fd_handle);
+ if (fsp->fh == NULL) {
+ goto fail;
}
fsp->fh->ref_count = 1;
fsp->fh->fd = -1;
- fsp->fnum = -1;
+ fsp->fnum = FNUM_FIELD_INVALID;
fsp->conn = conn;
- fsp->fh->gen_id = get_gen_count(sconn);
- GetTimeOfDay(&fsp->open_time);
- if (sconn->file_bmap != NULL) {
- sconn->first_file = (i+1) % (sconn->real_max_open_files);
+ DLIST_ADD(sconn->files, fsp);
+ sconn->num_files += 1;
+
+ conn->num_files_open++;
- bitmap_set(sconn->file_bmap, i);
+ *result = fsp;
+ return NT_STATUS_OK;
- fsp->fnum = i + FILE_HANDLE_OFFSET;
- SMB_ASSERT(fsp->fnum < 65536);
+fail:
+ if (fsp != NULL) {
+ TALLOC_FREE(fsp->fh);
}
+ TALLOC_FREE(fsp);
- DLIST_ADD(sconn->files, fsp);
- sconn->num_files += 1;
+ return status;
+}
- conn->num_files_open++;
+/****************************************************************************
+ Find first available file slot.
+****************************************************************************/
+
+NTSTATUS file_new(struct smb_request *req, connection_struct *conn,
+ files_struct **result)
+{
+ struct smbd_server_connection *sconn = conn->sconn;
+ files_struct *fsp;
+ NTSTATUS status;
+
+ status = fsp_new(conn, conn, &fsp);
+ if (!NT_STATUS_IS_OK(status)) {
+ return status;
+ }
+
+ GetTimeOfDay(&fsp->open_time);
+
+ if (req) {
+ struct smbXsrv_connection *xconn = req->xconn;
+ struct smbXsrv_open *op = NULL;
+ NTTIME now = timeval_to_nttime(&fsp->open_time);
+
+ status = smbXsrv_open_create(xconn,
+ conn->session_info,
+ now, &op);
+ if (!NT_STATUS_IS_OK(status)) {
+ file_free(NULL, fsp);
+ return status;
+ }
+ fsp->op = op;
+ op->compat = fsp;
+ fsp->fnum = op->local_id;
+ fsp->fh->gen_id = smbXsrv_open_hash(op);
+ } else {
+ DEBUG(10, ("%s: req==NULL, INTERNAL_OPEN_ONLY, smbXsrv_open "
+ "allocated\n", __func__));
+ }
/*
* Create an smb_filename with "" for the base_name. There are very
* few NULL checks, so make sure it's initialized with something. to
* be safe until an audit can be done.
*/
- status = create_synthetic_smb_fname(fsp, "", NULL, NULL,
- &fsp->fsp_name);
- if (!NT_STATUS_IS_OK(status)) {
+ fsp->fsp_name = synthetic_smb_fname(fsp, "", NULL, NULL);
+ if (fsp->fsp_name == NULL) {
file_free(NULL, fsp);
- return status;
+ return NT_STATUS_NO_MEMORY;
}
- DEBUG(5,("allocated file structure %d, fnum = %d (%u used)\n",
- i, fsp->fnum, (unsigned int)sconn->num_files));
+ DEBUG(5,("allocated file structure %s (%u used)\n",
+ fsp_fnum_dbg(fsp), (unsigned int)sconn->num_files));
if (req != NULL) {
+ fsp->mid = req->mid;
req->chain_fsp = fsp;
}
for (fsp=conn->sconn->files; fsp; fsp=next) {
next = fsp->next;
- if (fsp->conn == conn) {
- close_file(NULL, fsp, SHUTDOWN_CLOSE);
+ if (fsp->conn != conn) {
+ continue;
}
+ if (fsp->op != NULL && fsp->op->global->durable) {
+ /*
+ * A tree disconnect closes a durable handle
+ */
+ fsp->op->global->durable = false;
+ }
+ close_file(NULL, fsp, SHUTDOWN_CLOSE);
}
}
sconn->real_max_open_files = files_max_open_fds;
- sconn->file_bmap = bitmap_talloc(sconn, sconn->real_max_open_files);
- if (!sconn->file_bmap) {
- return false;
- }
-
return true;
}
int count=0;
files_struct *fsp;
+ if (gen_id == 0) {
+ return NULL;
+ }
+
for (fsp=sconn->files; fsp; fsp=fsp->next,count++) {
/* We can have a fsp->fh->fd == -1 here as it could be a stat open. */
if (file_id_equal(&fsp->file_id, &id) &&
}
/* Paranoia check. */
if ((fsp->fh->fd == -1) &&
- (fsp->oplock_type != NO_OPLOCK) &&
- (fsp->oplock_type != FAKE_LEVEL_II_OPLOCK)) {
+ (fsp->oplock_type != NO_OPLOCK)) {
DEBUG(0,("file_find_dif: file %s file_id = "
"%s, gen = %u oplock_type = %u is a "
"stat open with oplock type !\n",
return NULL;
}
+struct files_struct *file_find_one_fsp_from_lease_key(
+ struct smbd_server_connection *sconn,
+ const struct smb2_lease_key *lease_key)
+{
+ struct files_struct *fsp;
+
+ for (fsp = sconn->files; fsp; fsp=fsp->next) {
+ if ((fsp->lease != NULL) &&
+ (fsp->lease->lease.lease_key.data[0] ==
+ lease_key->data[0]) &&
+ (fsp->lease->lease.lease_key.data[1] ==
+ lease_key->data[1])) {
+ return fsp;
+ }
+ }
+ return NULL;
+}
+
/****************************************************************************
Find any fsp open with a pathname below that of an already open path.
****************************************************************************/
Free up a fsp.
****************************************************************************/
-void file_free(struct smb_request *req, files_struct *fsp)
+void fsp_free(files_struct *fsp)
{
struct smbd_server_connection *sconn = fsp->conn->sconn;
fsp->fh->ref_count--;
}
+ fsp->conn->num_files_open--;
+
+ /* this is paranoia, just in case someone tries to reuse the
+ information */
+ ZERO_STRUCTP(fsp);
+
+ /* fsp->fsp_name is a talloc child and is free'd automatically. */
+ TALLOC_FREE(fsp);
+}
+
+void file_free(struct smb_request *req, files_struct *fsp)
+{
+ struct smbd_server_connection *sconn = fsp->conn->sconn;
+ uint64_t fnum = fsp->fnum;
+
if (fsp->notify) {
struct notify_context *notify_ctx =
fsp->conn->sconn->notify_ctx;
/* Ensure this event will never fire. */
TALLOC_FREE(fsp->update_write_time_event);
- if (sconn->file_bmap != NULL) {
- bitmap_clear(sconn->file_bmap, fsp->fnum - FILE_HANDLE_OFFSET);
+ if (fsp->op != NULL) {
+ fsp->op->compat = NULL;
}
- DEBUG(5,("freed files structure %d (%u used)\n",
- fsp->fnum, (unsigned int)sconn->num_files));
-
- fsp->conn->num_files_open--;
+ TALLOC_FREE(fsp->op);
if ((req != NULL) && (fsp == req->chain_fsp)) {
req->chain_fsp = NULL;
/* Drop all remaining extensions. */
vfs_remove_all_fsp_extensions(fsp);
- /* this is paranoia, just in case someone tries to reuse the
- information */
- ZERO_STRUCTP(fsp);
+ fsp_free(fsp);
- /* fsp->fsp_name is a talloc child and is free'd automatically. */
- TALLOC_FREE(fsp);
-}
-
-/****************************************************************************
- Get an fsp from a 16 bit fnum.
-****************************************************************************/
-
-static struct files_struct *file_fnum(struct smbd_server_connection *sconn,
- uint16 fnum)
-{
- files_struct *fsp;
- int count=0;
-
- for (fsp=sconn->files; fsp; fsp=fsp->next, count++) {
- if (fsp->fnum == -1) {
- continue;
- }
-
- if (fsp->fnum == fnum) {
- if (count > 10) {
- DLIST_PROMOTE(sconn->files, fsp);
- }
- return fsp;
- }
- }
- return NULL;
+ DEBUG(5,("freed files structure %llu (%u used)\n",
+ (unsigned long long)fnum, (unsigned int)sconn->num_files));
}
/****************************************************************************
files_struct *file_fsp(struct smb_request *req, uint16 fid)
{
+ struct smbXsrv_open *op;
+ NTSTATUS status;
+ NTTIME now = 0;
files_struct *fsp;
if (req == NULL) {
}
if (req->chain_fsp != NULL) {
+ if (req->chain_fsp->deferred_close) {
+ return NULL;
+ }
return req->chain_fsp;
}
- fsp = file_fnum(req->sconn, fid);
- if (fsp != NULL) {
- req->chain_fsp = fsp;
+ if (req->xconn == NULL) {
+ return NULL;
}
+
+ now = timeval_to_nttime(&req->request_time);
+
+ status = smb1srv_open_lookup(req->xconn,
+ fid, now, &op);
+ if (!NT_STATUS_IS_OK(status)) {
+ return NULL;
+ }
+
+ fsp = op->compat;
+ if (fsp == NULL) {
+ return NULL;
+ }
+
+ if (fsp->deferred_close) {
+ return NULL;
+ }
+
+ req->chain_fsp = fsp;
+ return fsp;
+}
+
+struct files_struct *file_fsp_get(struct smbd_smb2_request *smb2req,
+ uint64_t persistent_id,
+ uint64_t volatile_id)
+{
+ struct smbXsrv_open *op;
+ NTSTATUS status;
+ NTTIME now = 0;
+ struct files_struct *fsp;
+
+ now = timeval_to_nttime(&smb2req->request_time);
+
+ status = smb2srv_open_lookup(smb2req->xconn,
+ persistent_id, volatile_id,
+ now, &op);
+ if (!NT_STATUS_IS_OK(status)) {
+ return NULL;
+ }
+
+ fsp = op->compat;
+ if (fsp == NULL) {
+ return NULL;
+ }
+
+ if (smb2req->tcon == NULL) {
+ return NULL;
+ }
+
+ if (smb2req->tcon->compat != fsp->conn) {
+ return NULL;
+ }
+
+ if (smb2req->session == NULL) {
+ return NULL;
+ }
+
+ if (smb2req->session->compat == NULL) {
+ return NULL;
+ }
+
+ if (smb2req->session->compat->vuid != fsp->vuid) {
+ return NULL;
+ }
+
+ if (fsp->deferred_close) {
+ return NULL;
+ }
+
+ return fsp;
+}
+
+struct files_struct *file_fsp_smb2(struct smbd_smb2_request *smb2req,
+ uint64_t persistent_id,
+ uint64_t volatile_id)
+{
+ struct files_struct *fsp;
+
+ if (smb2req->compat_chain_fsp != NULL) {
+ if (smb2req->compat_chain_fsp->deferred_close) {
+ return NULL;
+ }
+ return smb2req->compat_chain_fsp;
+ }
+
+ fsp = file_fsp_get(smb2req, persistent_id, volatile_id);
+ if (fsp == NULL) {
+ return NULL;
+ }
+
+ smb2req->compat_chain_fsp = fsp;
return fsp;
}
to->share_access = share_access;
to->oplock_type = from->oplock_type;
to->can_lock = from->can_lock;
- to->can_read = (access_mask & (FILE_READ_DATA)) ? True : False;
- if (!CAN_WRITE(from->conn)) {
- to->can_write = False;
- } else {
- to->can_write = (access_mask & (FILE_WRITE_DATA | FILE_APPEND_DATA)) ? True : False;
- }
+ to->can_read = ((access_mask & FILE_READ_DATA) != 0);
+ to->can_write =
+ CAN_WRITE(from->conn) &&
+ ((access_mask & (FILE_WRITE_DATA | FILE_APPEND_DATA)) != 0);
to->modified = from->modified;
to->is_directory = from->is_directory;
to->aio_write_behind = from->aio_write_behind;
NTSTATUS file_name_hash(connection_struct *conn,
const char *name, uint32_t *p_name_hash)
{
- char *fullpath = NULL;
+ char tmpbuf[PATH_MAX];
+ char *fullpath, *to_free;
+ size_t len;
/* Set the hash of the full pathname. */
- fullpath = talloc_asprintf(talloc_tos(),
- "%s/%s",
- conn->connectpath,
- name);
- if (!fullpath) {
+
+ len = full_path_tos(conn->connectpath, name, tmpbuf, sizeof(tmpbuf),
+ &fullpath, &to_free);
+ if (len == -1) {
return NT_STATUS_NO_MEMORY;
}
- *p_name_hash = hash(fullpath, talloc_get_size(fullpath), 0);
+ *p_name_hash = hash(fullpath, len+1, 0);
DEBUG(10,("file_name_hash: %s hash 0x%x\n",
- fullpath,
+ fullpath,
(unsigned int)*p_name_hash ));
- TALLOC_FREE(fullpath);
+ TALLOC_FREE(to_free);
return NT_STATUS_OK;
}
NTSTATUS fsp_set_smb_fname(struct files_struct *fsp,
const struct smb_filename *smb_fname_in)
{
- NTSTATUS status;
struct smb_filename *smb_fname_new;
- status = copy_smb_filename(fsp, smb_fname_in, &smb_fname_new);
- if (!NT_STATUS_IS_OK(status)) {
- return status;
+ smb_fname_new = cp_smb_filename(fsp, smb_fname_in);
+ if (smb_fname_new == NULL) {
+ return NT_STATUS_NO_MEMORY;
}
TALLOC_FREE(fsp->fsp_name);
smb_fname_str_dbg(fsp->fsp_name),
&fsp->name_hash);
}
+
+const struct GUID *fsp_client_guid(const files_struct *fsp)
+{
+ return &fsp->conn->sconn->client->connections->smb2.client.guid;
+}
+
+uint32_t fsp_lease_type(struct files_struct *fsp)
+{
+ if (fsp->oplock_type == LEASE_OPLOCK) {
+ return fsp->lease->lease.lease_state;
+ }
+ return map_oplock_to_lease_type(fsp->oplock_type);
+}