| 1 | /*
|
|---|
| 2 | Unix SMB/CIFS implementation.
|
|---|
| 3 | Core SMB2 server
|
|---|
| 4 |
|
|---|
| 5 | Copyright (C) Stefan Metzmacher 2009
|
|---|
| 6 | Copyright (C) Jeremy Allison 2010
|
|---|
| 7 |
|
|---|
| 8 | This program is free software; you can redistribute it and/or modify
|
|---|
| 9 | it under the terms of the GNU General Public License as published by
|
|---|
| 10 | the Free Software Foundation; either version 3 of the License, or
|
|---|
| 11 | (at your option) any later version.
|
|---|
| 12 |
|
|---|
| 13 | This program is distributed in the hope that it will be useful,
|
|---|
| 14 | but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|---|
| 15 | MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|---|
| 16 | GNU General Public License for more details.
|
|---|
| 17 |
|
|---|
| 18 | You should have received a copy of the GNU General Public License
|
|---|
| 19 | along with this program. If not, see <http://www.gnu.org/licenses/>.
|
|---|
| 20 | */
|
|---|
| 21 |
|
|---|
| 22 | #include "includes.h"
|
|---|
| 23 | #include "printing.h"
|
|---|
| 24 | #include "smbd/smbd.h"
|
|---|
| 25 | #include "smbd/globals.h"
|
|---|
| 26 | #include "../libcli/smb/smb_common.h"
|
|---|
| 27 | #include "../librpc/gen_ndr/ndr_security.h"
|
|---|
| 28 | #include "../lib/util/tevent_ntstatus.h"
|
|---|
| 29 |
|
|---|
| 30 | int map_smb2_oplock_levels_to_samba(uint8_t in_oplock_level)
|
|---|
| 31 | {
|
|---|
| 32 | switch(in_oplock_level) {
|
|---|
| 33 | case SMB2_OPLOCK_LEVEL_NONE:
|
|---|
| 34 | return NO_OPLOCK;
|
|---|
| 35 | case SMB2_OPLOCK_LEVEL_II:
|
|---|
| 36 | return LEVEL_II_OPLOCK;
|
|---|
| 37 | case SMB2_OPLOCK_LEVEL_EXCLUSIVE:
|
|---|
| 38 | return EXCLUSIVE_OPLOCK;
|
|---|
| 39 | case SMB2_OPLOCK_LEVEL_BATCH:
|
|---|
| 40 | return BATCH_OPLOCK;
|
|---|
| 41 | case SMB2_OPLOCK_LEVEL_LEASE:
|
|---|
| 42 | DEBUG(2,("map_smb2_oplock_levels_to_samba: "
|
|---|
| 43 | "LEASE_OPLOCK_REQUESTED\n"));
|
|---|
| 44 | return NO_OPLOCK;
|
|---|
| 45 | default:
|
|---|
| 46 | DEBUG(2,("map_smb2_oplock_levels_to_samba: "
|
|---|
| 47 | "unknown level %u\n",
|
|---|
| 48 | (unsigned int)in_oplock_level));
|
|---|
| 49 | return NO_OPLOCK;
|
|---|
| 50 | }
|
|---|
| 51 | }
|
|---|
| 52 |
|
|---|
| 53 | static uint8_t map_samba_oplock_levels_to_smb2(int oplock_type)
|
|---|
| 54 | {
|
|---|
| 55 | if (BATCH_OPLOCK_TYPE(oplock_type)) {
|
|---|
| 56 | return SMB2_OPLOCK_LEVEL_BATCH;
|
|---|
| 57 | } else if (EXCLUSIVE_OPLOCK_TYPE(oplock_type)) {
|
|---|
| 58 | return SMB2_OPLOCK_LEVEL_EXCLUSIVE;
|
|---|
| 59 | } else if (oplock_type == LEVEL_II_OPLOCK) {
|
|---|
| 60 | /*
|
|---|
| 61 | * Don't use LEVEL_II_OPLOCK_TYPE here as
|
|---|
| 62 | * this also includes FAKE_LEVEL_II_OPLOCKs
|
|---|
| 63 | * which are internal only.
|
|---|
| 64 | */
|
|---|
| 65 | return SMB2_OPLOCK_LEVEL_II;
|
|---|
| 66 | } else {
|
|---|
| 67 | return SMB2_OPLOCK_LEVEL_NONE;
|
|---|
| 68 | }
|
|---|
| 69 | }
|
|---|
| 70 |
|
|---|
| 71 | static struct tevent_req *smbd_smb2_create_send(TALLOC_CTX *mem_ctx,
|
|---|
| 72 | struct tevent_context *ev,
|
|---|
| 73 | struct smbd_smb2_request *smb2req,
|
|---|
| 74 | uint8_t in_oplock_level,
|
|---|
| 75 | uint32_t in_impersonation_level,
|
|---|
| 76 | uint32_t in_desired_access,
|
|---|
| 77 | uint32_t in_file_attributes,
|
|---|
| 78 | uint32_t in_share_access,
|
|---|
| 79 | uint32_t in_create_disposition,
|
|---|
| 80 | uint32_t in_create_options,
|
|---|
| 81 | const char *in_name,
|
|---|
| 82 | struct smb2_create_blobs in_context_blobs);
|
|---|
| 83 | static NTSTATUS smbd_smb2_create_recv(struct tevent_req *req,
|
|---|
| 84 | TALLOC_CTX *mem_ctx,
|
|---|
| 85 | uint8_t *out_oplock_level,
|
|---|
| 86 | uint32_t *out_create_action,
|
|---|
| 87 | NTTIME *out_creation_time,
|
|---|
| 88 | NTTIME *out_last_access_time,
|
|---|
| 89 | NTTIME *out_last_write_time,
|
|---|
| 90 | NTTIME *out_change_time,
|
|---|
| 91 | uint64_t *out_allocation_size,
|
|---|
| 92 | uint64_t *out_end_of_file,
|
|---|
| 93 | uint32_t *out_file_attributes,
|
|---|
| 94 | uint64_t *out_file_id_persistent,
|
|---|
| 95 | uint64_t *out_file_id_volatile,
|
|---|
| 96 | struct smb2_create_blobs *out_context_blobs);
|
|---|
| 97 |
|
|---|
| 98 | static void smbd_smb2_request_create_done(struct tevent_req *tsubreq);
|
|---|
| 99 | NTSTATUS smbd_smb2_request_process_create(struct smbd_smb2_request *smb2req)
|
|---|
| 100 | {
|
|---|
| 101 | const uint8_t *inbody;
|
|---|
| 102 | int i = smb2req->current_idx;
|
|---|
| 103 | uint8_t in_oplock_level;
|
|---|
| 104 | uint32_t in_impersonation_level;
|
|---|
| 105 | uint32_t in_desired_access;
|
|---|
| 106 | uint32_t in_file_attributes;
|
|---|
| 107 | uint32_t in_share_access;
|
|---|
| 108 | uint32_t in_create_disposition;
|
|---|
| 109 | uint32_t in_create_options;
|
|---|
| 110 | uint16_t in_name_offset;
|
|---|
| 111 | uint16_t in_name_length;
|
|---|
| 112 | DATA_BLOB in_name_buffer;
|
|---|
| 113 | char *in_name_string;
|
|---|
| 114 | size_t in_name_string_size;
|
|---|
| 115 | uint32_t name_offset = 0;
|
|---|
| 116 | uint32_t name_available_length = 0;
|
|---|
| 117 | uint32_t in_context_offset;
|
|---|
| 118 | uint32_t in_context_length;
|
|---|
| 119 | DATA_BLOB in_context_buffer;
|
|---|
| 120 | struct smb2_create_blobs in_context_blobs;
|
|---|
| 121 | uint32_t context_offset = 0;
|
|---|
| 122 | uint32_t context_available_length = 0;
|
|---|
| 123 | uint32_t dyn_offset;
|
|---|
| 124 | NTSTATUS status;
|
|---|
| 125 | bool ok;
|
|---|
| 126 | struct tevent_req *tsubreq;
|
|---|
| 127 |
|
|---|
| 128 | status = smbd_smb2_request_verify_sizes(smb2req, 0x39);
|
|---|
| 129 | if (!NT_STATUS_IS_OK(status)) {
|
|---|
| 130 | return smbd_smb2_request_error(smb2req, status);
|
|---|
| 131 | }
|
|---|
| 132 | inbody = (const uint8_t *)smb2req->in.vector[i+1].iov_base;
|
|---|
| 133 |
|
|---|
| 134 | in_oplock_level = CVAL(inbody, 0x03);
|
|---|
| 135 | in_impersonation_level = IVAL(inbody, 0x04);
|
|---|
| 136 | in_desired_access = IVAL(inbody, 0x18);
|
|---|
| 137 | in_file_attributes = IVAL(inbody, 0x1C);
|
|---|
| 138 | in_share_access = IVAL(inbody, 0x20);
|
|---|
| 139 | in_create_disposition = IVAL(inbody, 0x24);
|
|---|
| 140 | in_create_options = IVAL(inbody, 0x28);
|
|---|
| 141 | in_name_offset = SVAL(inbody, 0x2C);
|
|---|
| 142 | in_name_length = SVAL(inbody, 0x2E);
|
|---|
| 143 | in_context_offset = IVAL(inbody, 0x30);
|
|---|
| 144 | in_context_length = IVAL(inbody, 0x34);
|
|---|
| 145 |
|
|---|
| 146 | /*
|
|---|
| 147 | * First check if the dynamic name and context buffers
|
|---|
| 148 | * are correctly specified.
|
|---|
| 149 | *
|
|---|
| 150 | * Note: That we don't check if the name and context buffers
|
|---|
| 151 | * overlap
|
|---|
| 152 | */
|
|---|
| 153 |
|
|---|
| 154 | dyn_offset = SMB2_HDR_BODY + smb2req->in.vector[i+1].iov_len;
|
|---|
| 155 |
|
|---|
| 156 | if (in_name_offset == 0 && in_name_length == 0) {
|
|---|
| 157 | /* This is ok */
|
|---|
| 158 | name_offset = 0;
|
|---|
| 159 | } else if (in_name_offset < dyn_offset) {
|
|---|
| 160 | return smbd_smb2_request_error(smb2req, NT_STATUS_INVALID_PARAMETER);
|
|---|
| 161 | } else {
|
|---|
| 162 | name_offset = in_name_offset - dyn_offset;
|
|---|
| 163 | }
|
|---|
| 164 |
|
|---|
| 165 | if (name_offset > smb2req->in.vector[i+2].iov_len) {
|
|---|
| 166 | return smbd_smb2_request_error(smb2req, NT_STATUS_INVALID_PARAMETER);
|
|---|
| 167 | }
|
|---|
| 168 |
|
|---|
| 169 | name_available_length = smb2req->in.vector[i+2].iov_len - name_offset;
|
|---|
| 170 |
|
|---|
| 171 | if (in_name_length > name_available_length) {
|
|---|
| 172 | return smbd_smb2_request_error(smb2req, NT_STATUS_INVALID_PARAMETER);
|
|---|
| 173 | }
|
|---|
| 174 |
|
|---|
| 175 | in_name_buffer.data = (uint8_t *)smb2req->in.vector[i+2].iov_base +
|
|---|
| 176 | name_offset;
|
|---|
| 177 | in_name_buffer.length = in_name_length;
|
|---|
| 178 |
|
|---|
| 179 | if (in_context_offset == 0 && in_context_length == 0) {
|
|---|
| 180 | /* This is ok */
|
|---|
| 181 | context_offset = 0;
|
|---|
| 182 | } else if (in_context_offset < dyn_offset) {
|
|---|
| 183 | return smbd_smb2_request_error(smb2req, NT_STATUS_INVALID_PARAMETER);
|
|---|
| 184 | } else {
|
|---|
| 185 | context_offset = in_context_offset - dyn_offset;
|
|---|
| 186 | }
|
|---|
| 187 |
|
|---|
| 188 | if (context_offset > smb2req->in.vector[i+2].iov_len) {
|
|---|
| 189 | return smbd_smb2_request_error(smb2req, NT_STATUS_INVALID_PARAMETER);
|
|---|
| 190 | }
|
|---|
| 191 |
|
|---|
| 192 | context_available_length = smb2req->in.vector[i+2].iov_len - context_offset;
|
|---|
| 193 |
|
|---|
| 194 | if (in_context_length > context_available_length) {
|
|---|
| 195 | return smbd_smb2_request_error(smb2req, NT_STATUS_INVALID_PARAMETER);
|
|---|
| 196 | }
|
|---|
| 197 |
|
|---|
| 198 | in_context_buffer.data = (uint8_t *)smb2req->in.vector[i+2].iov_base +
|
|---|
| 199 | context_offset;
|
|---|
| 200 | in_context_buffer.length = in_context_length;
|
|---|
| 201 |
|
|---|
| 202 | /*
|
|---|
| 203 | * Now interpret the name and context buffers
|
|---|
| 204 | */
|
|---|
| 205 |
|
|---|
| 206 | ok = convert_string_talloc(smb2req, CH_UTF16, CH_UNIX,
|
|---|
| 207 | in_name_buffer.data,
|
|---|
| 208 | in_name_buffer.length,
|
|---|
| 209 | &in_name_string,
|
|---|
| 210 | &in_name_string_size, false);
|
|---|
| 211 | if (!ok) {
|
|---|
| 212 | return smbd_smb2_request_error(smb2req, NT_STATUS_ILLEGAL_CHARACTER);
|
|---|
| 213 | }
|
|---|
| 214 |
|
|---|
| 215 | if (in_name_buffer.length == 0) {
|
|---|
| 216 | in_name_string_size = 0;
|
|---|
| 217 | }
|
|---|
| 218 |
|
|---|
| 219 | if (strlen(in_name_string) != in_name_string_size) {
|
|---|
| 220 | return smbd_smb2_request_error(smb2req, NT_STATUS_OBJECT_NAME_INVALID);
|
|---|
| 221 | }
|
|---|
| 222 |
|
|---|
| 223 | ZERO_STRUCT(in_context_blobs);
|
|---|
| 224 | status = smb2_create_blob_parse(smb2req, in_context_buffer, &in_context_blobs);
|
|---|
| 225 | if (!NT_STATUS_IS_OK(status)) {
|
|---|
| 226 | return smbd_smb2_request_error(smb2req, status);
|
|---|
| 227 | }
|
|---|
| 228 |
|
|---|
| 229 | tsubreq = smbd_smb2_create_send(smb2req,
|
|---|
| 230 | smb2req->sconn->smb2.event_ctx,
|
|---|
| 231 | smb2req,
|
|---|
| 232 | in_oplock_level,
|
|---|
| 233 | in_impersonation_level,
|
|---|
| 234 | in_desired_access,
|
|---|
| 235 | in_file_attributes,
|
|---|
| 236 | in_share_access,
|
|---|
| 237 | in_create_disposition,
|
|---|
| 238 | in_create_options,
|
|---|
| 239 | in_name_string,
|
|---|
| 240 | in_context_blobs);
|
|---|
| 241 | if (tsubreq == NULL) {
|
|---|
| 242 | smb2req->subreq = NULL;
|
|---|
| 243 | return smbd_smb2_request_error(smb2req, NT_STATUS_NO_MEMORY);
|
|---|
| 244 | }
|
|---|
| 245 | tevent_req_set_callback(tsubreq, smbd_smb2_request_create_done, smb2req);
|
|---|
| 246 |
|
|---|
| 247 | return smbd_smb2_request_pending_queue(smb2req, tsubreq);
|
|---|
| 248 | }
|
|---|
| 249 |
|
|---|
| 250 | static uint64_t get_mid_from_smb2req(struct smbd_smb2_request *smb2req)
|
|---|
| 251 | {
|
|---|
| 252 | uint8_t *reqhdr = (uint8_t *)smb2req->out.vector[smb2req->current_idx].iov_base;
|
|---|
| 253 | return BVAL(reqhdr, SMB2_HDR_MESSAGE_ID);
|
|---|
| 254 | }
|
|---|
| 255 |
|
|---|
| 256 | static void smbd_smb2_request_create_done(struct tevent_req *tsubreq)
|
|---|
| 257 | {
|
|---|
| 258 | struct smbd_smb2_request *smb2req = tevent_req_callback_data(tsubreq,
|
|---|
| 259 | struct smbd_smb2_request);
|
|---|
| 260 | int i = smb2req->current_idx;
|
|---|
| 261 | uint8_t *outhdr;
|
|---|
| 262 | DATA_BLOB outbody;
|
|---|
| 263 | DATA_BLOB outdyn;
|
|---|
| 264 | uint8_t out_oplock_level = 0;
|
|---|
| 265 | uint32_t out_create_action = 0;
|
|---|
| 266 | NTTIME out_creation_time = 0;
|
|---|
| 267 | NTTIME out_last_access_time = 0;
|
|---|
| 268 | NTTIME out_last_write_time = 0;
|
|---|
| 269 | NTTIME out_change_time = 0;
|
|---|
| 270 | uint64_t out_allocation_size = 0;
|
|---|
| 271 | uint64_t out_end_of_file = 0;
|
|---|
| 272 | uint32_t out_file_attributes = 0;
|
|---|
| 273 | uint64_t out_file_id_persistent = 0;
|
|---|
| 274 | uint64_t out_file_id_volatile = 0;
|
|---|
| 275 | struct smb2_create_blobs out_context_blobs;
|
|---|
| 276 | DATA_BLOB out_context_buffer;
|
|---|
| 277 | uint16_t out_context_buffer_offset = 0;
|
|---|
| 278 | NTSTATUS status;
|
|---|
| 279 | NTSTATUS error; /* transport error */
|
|---|
| 280 |
|
|---|
| 281 | if (smb2req->cancelled) {
|
|---|
| 282 | uint64_t mid = get_mid_from_smb2req(smb2req);
|
|---|
| 283 | DEBUG(10,("smbd_smb2_request_create_done: cancelled mid %llu\n",
|
|---|
| 284 | (unsigned long long)mid ));
|
|---|
| 285 | error = smbd_smb2_request_error(smb2req, NT_STATUS_CANCELLED);
|
|---|
| 286 | if (!NT_STATUS_IS_OK(error)) {
|
|---|
| 287 | smbd_server_connection_terminate(smb2req->sconn,
|
|---|
| 288 | nt_errstr(error));
|
|---|
| 289 | return;
|
|---|
| 290 | }
|
|---|
| 291 | return;
|
|---|
| 292 | }
|
|---|
| 293 |
|
|---|
| 294 | status = smbd_smb2_create_recv(tsubreq,
|
|---|
| 295 | smb2req,
|
|---|
| 296 | &out_oplock_level,
|
|---|
| 297 | &out_create_action,
|
|---|
| 298 | &out_creation_time,
|
|---|
| 299 | &out_last_access_time,
|
|---|
| 300 | &out_last_write_time,
|
|---|
| 301 | &out_change_time,
|
|---|
| 302 | &out_allocation_size,
|
|---|
| 303 | &out_end_of_file,
|
|---|
| 304 | &out_file_attributes,
|
|---|
| 305 | &out_file_id_persistent,
|
|---|
| 306 | &out_file_id_volatile,
|
|---|
| 307 | &out_context_blobs);
|
|---|
| 308 | if (!NT_STATUS_IS_OK(status)) {
|
|---|
| 309 | error = smbd_smb2_request_error(smb2req, status);
|
|---|
| 310 | if (!NT_STATUS_IS_OK(error)) {
|
|---|
| 311 | smbd_server_connection_terminate(smb2req->sconn,
|
|---|
| 312 | nt_errstr(error));
|
|---|
| 313 | return;
|
|---|
| 314 | }
|
|---|
| 315 | return;
|
|---|
| 316 | }
|
|---|
| 317 |
|
|---|
| 318 | status = smb2_create_blob_push(smb2req, &out_context_buffer, out_context_blobs);
|
|---|
| 319 | if (!NT_STATUS_IS_OK(status)) {
|
|---|
| 320 | error = smbd_smb2_request_error(smb2req, status);
|
|---|
| 321 | if (!NT_STATUS_IS_OK(error)) {
|
|---|
| 322 | smbd_server_connection_terminate(smb2req->sconn,
|
|---|
| 323 | nt_errstr(error));
|
|---|
| 324 | return;
|
|---|
| 325 | }
|
|---|
| 326 | return;
|
|---|
| 327 | }
|
|---|
| 328 |
|
|---|
| 329 | if (out_context_buffer.length > 0) {
|
|---|
| 330 | out_context_buffer_offset = SMB2_HDR_BODY + 0x58;
|
|---|
| 331 | }
|
|---|
| 332 |
|
|---|
| 333 | outhdr = (uint8_t *)smb2req->out.vector[i].iov_base;
|
|---|
| 334 |
|
|---|
| 335 | outbody = data_blob_talloc(smb2req->out.vector, NULL, 0x58);
|
|---|
| 336 | if (outbody.data == NULL) {
|
|---|
| 337 | error = smbd_smb2_request_error(smb2req, NT_STATUS_NO_MEMORY);
|
|---|
| 338 | if (!NT_STATUS_IS_OK(error)) {
|
|---|
| 339 | smbd_server_connection_terminate(smb2req->sconn,
|
|---|
| 340 | nt_errstr(error));
|
|---|
| 341 | return;
|
|---|
| 342 | }
|
|---|
| 343 | return;
|
|---|
| 344 | }
|
|---|
| 345 |
|
|---|
| 346 | SSVAL(outbody.data, 0x00, 0x58 + 1); /* struct size */
|
|---|
| 347 | SCVAL(outbody.data, 0x02,
|
|---|
| 348 | out_oplock_level); /* oplock level */
|
|---|
| 349 | SCVAL(outbody.data, 0x03, 0); /* reserved */
|
|---|
| 350 | SIVAL(outbody.data, 0x04,
|
|---|
| 351 | out_create_action); /* create action */
|
|---|
| 352 | SBVAL(outbody.data, 0x08,
|
|---|
| 353 | out_creation_time); /* creation time */
|
|---|
| 354 | SBVAL(outbody.data, 0x10,
|
|---|
| 355 | out_last_access_time); /* last access time */
|
|---|
| 356 | SBVAL(outbody.data, 0x18,
|
|---|
| 357 | out_last_write_time); /* last write time */
|
|---|
| 358 | SBVAL(outbody.data, 0x20,
|
|---|
| 359 | out_change_time); /* change time */
|
|---|
| 360 | SBVAL(outbody.data, 0x28,
|
|---|
| 361 | out_allocation_size); /* allocation size */
|
|---|
| 362 | SBVAL(outbody.data, 0x30,
|
|---|
| 363 | out_end_of_file); /* end of file */
|
|---|
| 364 | SIVAL(outbody.data, 0x38,
|
|---|
| 365 | out_file_attributes); /* file attributes */
|
|---|
| 366 | SIVAL(outbody.data, 0x3C, 0); /* reserved */
|
|---|
| 367 | SBVAL(outbody.data, 0x40,
|
|---|
| 368 | out_file_id_persistent); /* file id (persistent) */
|
|---|
| 369 | SBVAL(outbody.data, 0x48,
|
|---|
| 370 | out_file_id_volatile); /* file id (volatile) */
|
|---|
| 371 | SIVAL(outbody.data, 0x50,
|
|---|
| 372 | out_context_buffer_offset); /* create contexts offset */
|
|---|
| 373 | SIVAL(outbody.data, 0x54,
|
|---|
| 374 | out_context_buffer.length); /* create contexts length */
|
|---|
| 375 |
|
|---|
| 376 | outdyn = out_context_buffer;
|
|---|
| 377 |
|
|---|
| 378 | error = smbd_smb2_request_done(smb2req, outbody, &outdyn);
|
|---|
| 379 | if (!NT_STATUS_IS_OK(error)) {
|
|---|
| 380 | smbd_server_connection_terminate(smb2req->sconn,
|
|---|
| 381 | nt_errstr(error));
|
|---|
| 382 | return;
|
|---|
| 383 | }
|
|---|
| 384 | }
|
|---|
| 385 |
|
|---|
| 386 | struct smbd_smb2_create_state {
|
|---|
| 387 | struct smbd_smb2_request *smb2req;
|
|---|
| 388 | struct smb_request *smb1req;
|
|---|
| 389 | bool open_was_deferred;
|
|---|
| 390 | struct timed_event *te;
|
|---|
| 391 | struct tevent_immediate *im;
|
|---|
| 392 | struct timeval request_time;
|
|---|
| 393 | struct file_id id;
|
|---|
| 394 | DATA_BLOB private_data;
|
|---|
| 395 | uint8_t out_oplock_level;
|
|---|
| 396 | uint32_t out_create_action;
|
|---|
| 397 | NTTIME out_creation_time;
|
|---|
| 398 | NTTIME out_last_access_time;
|
|---|
| 399 | NTTIME out_last_write_time;
|
|---|
| 400 | NTTIME out_change_time;
|
|---|
| 401 | uint64_t out_allocation_size;
|
|---|
| 402 | uint64_t out_end_of_file;
|
|---|
| 403 | uint32_t out_file_attributes;
|
|---|
| 404 | uint64_t out_file_id_persistent;
|
|---|
| 405 | uint64_t out_file_id_volatile;
|
|---|
| 406 | struct smb2_create_blobs out_context_blobs;
|
|---|
| 407 | };
|
|---|
| 408 |
|
|---|
| 409 | static struct tevent_req *smbd_smb2_create_send(TALLOC_CTX *mem_ctx,
|
|---|
| 410 | struct tevent_context *ev,
|
|---|
| 411 | struct smbd_smb2_request *smb2req,
|
|---|
| 412 | uint8_t in_oplock_level,
|
|---|
| 413 | uint32_t in_impersonation_level,
|
|---|
| 414 | uint32_t in_desired_access,
|
|---|
| 415 | uint32_t in_file_attributes,
|
|---|
| 416 | uint32_t in_share_access,
|
|---|
| 417 | uint32_t in_create_disposition,
|
|---|
| 418 | uint32_t in_create_options,
|
|---|
| 419 | const char *in_name,
|
|---|
| 420 | struct smb2_create_blobs in_context_blobs)
|
|---|
| 421 | {
|
|---|
| 422 | struct tevent_req *req = NULL;
|
|---|
| 423 | struct smbd_smb2_create_state *state = NULL;
|
|---|
| 424 | NTSTATUS status;
|
|---|
| 425 | struct smb_request *smb1req = NULL;
|
|---|
| 426 | files_struct *result = NULL;
|
|---|
| 427 | int info;
|
|---|
| 428 | struct timespec write_time_ts;
|
|---|
| 429 | struct smb2_create_blobs out_context_blobs;
|
|---|
| 430 | int requested_oplock_level;
|
|---|
| 431 |
|
|---|
| 432 | ZERO_STRUCT(out_context_blobs);
|
|---|
| 433 |
|
|---|
| 434 | if(lp_fake_oplocks(SNUM(smb2req->tcon->compat_conn))) {
|
|---|
| 435 | requested_oplock_level = SMB2_OPLOCK_LEVEL_NONE;
|
|---|
| 436 | } else {
|
|---|
| 437 | requested_oplock_level = in_oplock_level;
|
|---|
| 438 | }
|
|---|
| 439 |
|
|---|
| 440 |
|
|---|
| 441 | if (!smb2req->async) {
|
|---|
| 442 | /* New create call. */
|
|---|
| 443 | req = tevent_req_create(mem_ctx, &state,
|
|---|
| 444 | struct smbd_smb2_create_state);
|
|---|
| 445 | if (req == NULL) {
|
|---|
| 446 | return NULL;
|
|---|
| 447 | }
|
|---|
| 448 | state->smb2req = smb2req;
|
|---|
| 449 | smb2req->subreq = req; /* So we can find this when going async. */
|
|---|
| 450 |
|
|---|
| 451 | smb1req = smbd_smb2_fake_smb_request(smb2req);
|
|---|
| 452 | if (tevent_req_nomem(smb1req, req)) {
|
|---|
| 453 | return tevent_req_post(req, ev);
|
|---|
| 454 | }
|
|---|
| 455 | state->smb1req = smb1req;
|
|---|
| 456 | DEBUG(10,("smbd_smb2_create: name[%s]\n",
|
|---|
| 457 | in_name));
|
|---|
| 458 | } else {
|
|---|
| 459 | /* Re-entrant create call. */
|
|---|
| 460 | req = smb2req->subreq;
|
|---|
| 461 | state = tevent_req_data(req,
|
|---|
| 462 | struct smbd_smb2_create_state);
|
|---|
| 463 | smb1req = state->smb1req;
|
|---|
| 464 | DEBUG(10,("smbd_smb2_create_send: reentrant for file %s\n",
|
|---|
| 465 | in_name ));
|
|---|
| 466 | }
|
|---|
| 467 |
|
|---|
| 468 | if (IS_IPC(smb1req->conn)) {
|
|---|
| 469 | const char *pipe_name = in_name;
|
|---|
| 470 |
|
|---|
| 471 | if (!lp_nt_pipe_support()) {
|
|---|
| 472 | tevent_req_nterror(req, NT_STATUS_ACCESS_DENIED);
|
|---|
| 473 | return tevent_req_post(req, ev);
|
|---|
| 474 | }
|
|---|
| 475 |
|
|---|
| 476 | /* Strip \\ off the name. */
|
|---|
| 477 | if (pipe_name[0] == '\\') {
|
|---|
| 478 | pipe_name++;
|
|---|
| 479 | }
|
|---|
| 480 |
|
|---|
| 481 | status = open_np_file(smb1req, pipe_name, &result);
|
|---|
| 482 | if (!NT_STATUS_IS_OK(status)) {
|
|---|
| 483 | tevent_req_nterror(req, status);
|
|---|
| 484 | return tevent_req_post(req, ev);
|
|---|
| 485 | }
|
|---|
| 486 | info = FILE_WAS_OPENED;
|
|---|
| 487 | } else if (CAN_PRINT(smb1req->conn)) {
|
|---|
| 488 | status = file_new(smb1req, smb1req->conn, &result);
|
|---|
| 489 | if(!NT_STATUS_IS_OK(status)) {
|
|---|
| 490 | tevent_req_nterror(req, status);
|
|---|
| 491 | return tevent_req_post(req, ev);
|
|---|
| 492 | }
|
|---|
| 493 |
|
|---|
| 494 | status = print_spool_open(result, in_name,
|
|---|
| 495 | smb1req->vuid);
|
|---|
| 496 | if (!NT_STATUS_IS_OK(status)) {
|
|---|
| 497 | file_free(smb1req, result);
|
|---|
| 498 | tevent_req_nterror(req, status);
|
|---|
| 499 | return tevent_req_post(req, ev);
|
|---|
| 500 | }
|
|---|
| 501 | info = FILE_WAS_CREATED;
|
|---|
| 502 | } else {
|
|---|
| 503 | char *fname;
|
|---|
| 504 | struct smb_filename *smb_fname = NULL;
|
|---|
| 505 | struct smb2_create_blob *exta = NULL;
|
|---|
| 506 | struct ea_list *ea_list = NULL;
|
|---|
| 507 | struct smb2_create_blob *mxac = NULL;
|
|---|
| 508 | NTTIME max_access_time = 0;
|
|---|
| 509 | struct smb2_create_blob *secd = NULL;
|
|---|
| 510 | struct security_descriptor *sec_desc = NULL;
|
|---|
| 511 | struct smb2_create_blob *dhnq = NULL;
|
|---|
| 512 | struct smb2_create_blob *dhnc = NULL;
|
|---|
| 513 | struct smb2_create_blob *alsi = NULL;
|
|---|
| 514 | uint64_t allocation_size = 0;
|
|---|
| 515 | struct smb2_create_blob *twrp = NULL;
|
|---|
| 516 | struct smb2_create_blob *qfid = NULL;
|
|---|
| 517 |
|
|---|
| 518 | exta = smb2_create_blob_find(&in_context_blobs,
|
|---|
| 519 | SMB2_CREATE_TAG_EXTA);
|
|---|
| 520 | mxac = smb2_create_blob_find(&in_context_blobs,
|
|---|
| 521 | SMB2_CREATE_TAG_MXAC);
|
|---|
| 522 | secd = smb2_create_blob_find(&in_context_blobs,
|
|---|
| 523 | SMB2_CREATE_TAG_SECD);
|
|---|
| 524 | dhnq = smb2_create_blob_find(&in_context_blobs,
|
|---|
| 525 | SMB2_CREATE_TAG_DHNQ);
|
|---|
| 526 | dhnc = smb2_create_blob_find(&in_context_blobs,
|
|---|
| 527 | SMB2_CREATE_TAG_DHNC);
|
|---|
| 528 | alsi = smb2_create_blob_find(&in_context_blobs,
|
|---|
| 529 | SMB2_CREATE_TAG_ALSI);
|
|---|
| 530 | twrp = smb2_create_blob_find(&in_context_blobs,
|
|---|
| 531 | SMB2_CREATE_TAG_TWRP);
|
|---|
| 532 | qfid = smb2_create_blob_find(&in_context_blobs,
|
|---|
| 533 | SMB2_CREATE_TAG_QFID);
|
|---|
| 534 |
|
|---|
| 535 | fname = talloc_strdup(state, in_name);
|
|---|
| 536 | if (tevent_req_nomem(fname, req)) {
|
|---|
| 537 | return tevent_req_post(req, ev);
|
|---|
| 538 | }
|
|---|
| 539 |
|
|---|
| 540 | if (exta) {
|
|---|
| 541 | if (dhnc) {
|
|---|
| 542 | tevent_req_nterror(req,NT_STATUS_OBJECT_NAME_NOT_FOUND);
|
|---|
| 543 | return tevent_req_post(req, ev);
|
|---|
| 544 | }
|
|---|
| 545 |
|
|---|
| 546 | ea_list = read_nttrans_ea_list(mem_ctx,
|
|---|
| 547 | (const char *)exta->data.data, exta->data.length);
|
|---|
| 548 | if (!ea_list) {
|
|---|
| 549 | DEBUG(10,("smbd_smb2_create_send: read_ea_name_list failed.\n"));
|
|---|
| 550 | tevent_req_nterror(req, NT_STATUS_INVALID_PARAMETER);
|
|---|
| 551 | return tevent_req_post(req, ev);
|
|---|
| 552 | }
|
|---|
| 553 | }
|
|---|
| 554 |
|
|---|
| 555 | if (mxac) {
|
|---|
| 556 | if (dhnc) {
|
|---|
| 557 | tevent_req_nterror(req, NT_STATUS_OBJECT_NAME_NOT_FOUND);
|
|---|
| 558 | return tevent_req_post(req, ev);
|
|---|
| 559 | }
|
|---|
| 560 |
|
|---|
| 561 | if (mxac->data.length == 0) {
|
|---|
| 562 | max_access_time = 0;
|
|---|
| 563 | } else if (mxac->data.length == 8) {
|
|---|
| 564 | max_access_time = BVAL(mxac->data.data, 0);
|
|---|
| 565 | } else {
|
|---|
| 566 | tevent_req_nterror(req, NT_STATUS_INVALID_PARAMETER);
|
|---|
| 567 | return tevent_req_post(req, ev);
|
|---|
| 568 | }
|
|---|
| 569 | }
|
|---|
| 570 |
|
|---|
| 571 | if (secd) {
|
|---|
| 572 | enum ndr_err_code ndr_err;
|
|---|
| 573 |
|
|---|
| 574 | if (dhnc) {
|
|---|
| 575 | tevent_req_nterror(req, NT_STATUS_OBJECT_NAME_NOT_FOUND);
|
|---|
| 576 | return tevent_req_post(req, ev);
|
|---|
| 577 | }
|
|---|
| 578 |
|
|---|
| 579 | sec_desc = talloc_zero(state, struct security_descriptor);
|
|---|
| 580 | if (tevent_req_nomem(sec_desc, req)) {
|
|---|
| 581 | return tevent_req_post(req, ev);
|
|---|
| 582 | }
|
|---|
| 583 |
|
|---|
| 584 | ndr_err = ndr_pull_struct_blob(&secd->data,
|
|---|
| 585 | sec_desc, sec_desc,
|
|---|
| 586 | (ndr_pull_flags_fn_t)ndr_pull_security_descriptor);
|
|---|
| 587 | if (!NDR_ERR_CODE_IS_SUCCESS(ndr_err)) {
|
|---|
| 588 | DEBUG(2,("ndr_pull_security_descriptor failed: %s\n",
|
|---|
| 589 | ndr_errstr(ndr_err)));
|
|---|
| 590 | tevent_req_nterror(req, NT_STATUS_INVALID_PARAMETER);
|
|---|
| 591 | return tevent_req_post(req, ev);
|
|---|
| 592 | }
|
|---|
| 593 | }
|
|---|
| 594 |
|
|---|
| 595 | if (dhnq) {
|
|---|
| 596 | if (dhnc) {
|
|---|
| 597 | tevent_req_nterror(req, NT_STATUS_OBJECT_NAME_NOT_FOUND);
|
|---|
| 598 | return tevent_req_post(req, ev);
|
|---|
| 599 | }
|
|---|
| 600 |
|
|---|
| 601 | if (dhnq->data.length != 16) {
|
|---|
| 602 | tevent_req_nterror(req, NT_STATUS_INVALID_PARAMETER);
|
|---|
| 603 | return tevent_req_post(req, ev);
|
|---|
| 604 | }
|
|---|
| 605 | /*
|
|---|
| 606 | * we don't support durable handles yet
|
|---|
| 607 | * and have to ignore this
|
|---|
| 608 | */
|
|---|
| 609 | }
|
|---|
| 610 |
|
|---|
| 611 | if (dhnc) {
|
|---|
| 612 | if (dhnc->data.length != 16) {
|
|---|
| 613 | tevent_req_nterror(req, NT_STATUS_INVALID_PARAMETER);
|
|---|
| 614 | return tevent_req_post(req, ev);
|
|---|
| 615 | }
|
|---|
| 616 | /* we don't support durable handles yet */
|
|---|
| 617 | tevent_req_nterror(req, NT_STATUS_OBJECT_NAME_NOT_FOUND);
|
|---|
| 618 | return tevent_req_post(req, ev);
|
|---|
| 619 | }
|
|---|
| 620 |
|
|---|
| 621 | if (alsi) {
|
|---|
| 622 | if (dhnc) {
|
|---|
| 623 | tevent_req_nterror(req, NT_STATUS_OBJECT_NAME_NOT_FOUND);
|
|---|
| 624 | return tevent_req_post(req, ev);
|
|---|
| 625 | }
|
|---|
| 626 |
|
|---|
| 627 | if (alsi->data.length != 8) {
|
|---|
| 628 | tevent_req_nterror(req, NT_STATUS_INVALID_PARAMETER);
|
|---|
| 629 | return tevent_req_post(req, ev);
|
|---|
| 630 | }
|
|---|
| 631 | allocation_size = BVAL(alsi->data.data, 0);
|
|---|
| 632 | }
|
|---|
| 633 |
|
|---|
| 634 | if (twrp) {
|
|---|
| 635 | NTTIME nttime;
|
|---|
| 636 | time_t t;
|
|---|
| 637 | struct tm *tm;
|
|---|
| 638 |
|
|---|
| 639 | if (dhnc) {
|
|---|
| 640 | tevent_req_nterror(req, NT_STATUS_OBJECT_NAME_NOT_FOUND);
|
|---|
| 641 | return tevent_req_post(req, ev);
|
|---|
| 642 | }
|
|---|
| 643 |
|
|---|
| 644 | if (twrp->data.length != 8) {
|
|---|
| 645 | tevent_req_nterror(req, NT_STATUS_INVALID_PARAMETER);
|
|---|
| 646 | return tevent_req_post(req, ev);
|
|---|
| 647 | }
|
|---|
| 648 |
|
|---|
| 649 | nttime = BVAL(twrp->data.data, 0);
|
|---|
| 650 | t = nt_time_to_unix(nttime);
|
|---|
| 651 | tm = gmtime(&t);
|
|---|
| 652 |
|
|---|
| 653 | TALLOC_FREE(fname);
|
|---|
| 654 | fname = talloc_asprintf(state,
|
|---|
| 655 | "@GMT-%04u.%02u.%02u-%02u.%02u.%02u\\%s",
|
|---|
| 656 | tm->tm_year + 1900,
|
|---|
| 657 | tm->tm_mon + 1,
|
|---|
| 658 | tm->tm_mday,
|
|---|
| 659 | tm->tm_hour,
|
|---|
| 660 | tm->tm_min,
|
|---|
| 661 | tm->tm_sec,
|
|---|
| 662 | in_name);
|
|---|
| 663 | if (tevent_req_nomem(fname, req)) {
|
|---|
| 664 | return tevent_req_post(req, ev);
|
|---|
| 665 | }
|
|---|
| 666 | }
|
|---|
| 667 |
|
|---|
| 668 | if (qfid) {
|
|---|
| 669 | if (qfid->data.length != 0) {
|
|---|
| 670 | tevent_req_nterror(req, NT_STATUS_INVALID_PARAMETER);
|
|---|
| 671 | return tevent_req_post(req, ev);
|
|---|
| 672 | }
|
|---|
| 673 | }
|
|---|
| 674 |
|
|---|
| 675 | /* these are ignored for SMB2 */
|
|---|
| 676 | in_create_options &= ~(0x10);/* NTCREATEX_OPTIONS_SYNC_ALERT */
|
|---|
| 677 | in_create_options &= ~(0x20);/* NTCREATEX_OPTIONS_ASYNC_ALERT */
|
|---|
| 678 |
|
|---|
| 679 | /*
|
|---|
| 680 | * For a DFS path the function parse_dfs_path()
|
|---|
| 681 | * will do the path processing.
|
|---|
| 682 | */
|
|---|
| 683 |
|
|---|
| 684 | if (!(smb1req->flags2 & FLAGS2_DFS_PATHNAMES)) {
|
|---|
| 685 | /* convert '\\' into '/' */
|
|---|
| 686 | status = check_path_syntax(fname);
|
|---|
| 687 | if (!NT_STATUS_IS_OK(status)) {
|
|---|
| 688 | tevent_req_nterror(req, status);
|
|---|
| 689 | return tevent_req_post(req, ev);
|
|---|
| 690 | }
|
|---|
| 691 | }
|
|---|
| 692 |
|
|---|
| 693 | status = filename_convert(req,
|
|---|
| 694 | smb1req->conn,
|
|---|
| 695 | smb1req->flags2 & FLAGS2_DFS_PATHNAMES,
|
|---|
| 696 | fname,
|
|---|
| 697 | 0,
|
|---|
| 698 | NULL,
|
|---|
| 699 | &smb_fname);
|
|---|
| 700 | if (!NT_STATUS_IS_OK(status)) {
|
|---|
| 701 | tevent_req_nterror(req, status);
|
|---|
| 702 | return tevent_req_post(req, ev);
|
|---|
| 703 | }
|
|---|
| 704 |
|
|---|
| 705 | in_file_attributes &= ~FILE_FLAG_POSIX_SEMANTICS;
|
|---|
| 706 |
|
|---|
| 707 | status = SMB_VFS_CREATE_FILE(smb1req->conn,
|
|---|
| 708 | smb1req,
|
|---|
| 709 | 0, /* root_dir_fid */
|
|---|
| 710 | smb_fname,
|
|---|
| 711 | in_desired_access,
|
|---|
| 712 | in_share_access,
|
|---|
| 713 | in_create_disposition,
|
|---|
| 714 | in_create_options,
|
|---|
| 715 | in_file_attributes,
|
|---|
| 716 | map_smb2_oplock_levels_to_samba(requested_oplock_level),
|
|---|
| 717 | allocation_size,
|
|---|
| 718 | 0, /* private_flags */
|
|---|
| 719 | sec_desc,
|
|---|
| 720 | ea_list,
|
|---|
| 721 | &result,
|
|---|
| 722 | &info);
|
|---|
| 723 | if (!NT_STATUS_IS_OK(status)) {
|
|---|
| 724 | if (open_was_deferred(smb1req->mid)) {
|
|---|
| 725 | return req;
|
|---|
| 726 | }
|
|---|
| 727 | tevent_req_nterror(req, status);
|
|---|
| 728 | return tevent_req_post(req, ev);
|
|---|
| 729 | }
|
|---|
| 730 |
|
|---|
| 731 | if (mxac) {
|
|---|
| 732 | NTTIME last_write_time;
|
|---|
| 733 |
|
|---|
| 734 | unix_timespec_to_nt_time(&last_write_time,
|
|---|
| 735 | result->fsp_name->st.st_ex_mtime);
|
|---|
| 736 | if (last_write_time != max_access_time) {
|
|---|
| 737 | uint8_t p[8];
|
|---|
| 738 | uint32_t max_access_granted;
|
|---|
| 739 | DATA_BLOB blob = data_blob_const(p, sizeof(p));
|
|---|
| 740 |
|
|---|
| 741 | status = smbd_calculate_access_mask(smb1req->conn,
|
|---|
| 742 | result->fsp_name,
|
|---|
| 743 | /*
|
|---|
| 744 | * at this stage
|
|---|
| 745 | * it exists
|
|---|
| 746 | */
|
|---|
| 747 | true,
|
|---|
| 748 | SEC_FLAG_MAXIMUM_ALLOWED,
|
|---|
| 749 | &max_access_granted);
|
|---|
| 750 |
|
|---|
| 751 | SIVAL(p, 0, NT_STATUS_V(status));
|
|---|
| 752 | SIVAL(p, 4, max_access_granted);
|
|---|
| 753 |
|
|---|
| 754 | status = smb2_create_blob_add(state,
|
|---|
| 755 | &out_context_blobs,
|
|---|
| 756 | SMB2_CREATE_TAG_MXAC,
|
|---|
| 757 | blob);
|
|---|
| 758 | if (!NT_STATUS_IS_OK(status)) {
|
|---|
| 759 | tevent_req_nterror(req, status);
|
|---|
| 760 | return tevent_req_post(req, ev);
|
|---|
| 761 | }
|
|---|
| 762 | }
|
|---|
| 763 | }
|
|---|
| 764 |
|
|---|
| 765 | if (qfid) {
|
|---|
| 766 | uint8_t p[32];
|
|---|
| 767 | uint64_t file_index = get_FileIndex(result->conn,
|
|---|
| 768 | &result->fsp_name->st);
|
|---|
| 769 | DATA_BLOB blob = data_blob_const(p, sizeof(p));
|
|---|
| 770 |
|
|---|
| 771 | ZERO_STRUCT(p);
|
|---|
| 772 |
|
|---|
| 773 | /* From conversations with Microsoft engineers at
|
|---|
| 774 | the MS plugfest. The first 8 bytes are the "volume index"
|
|---|
| 775 | == inode, the second 8 bytes are the "volume id",
|
|---|
| 776 | == dev. This will be updated in the SMB2 doc. */
|
|---|
| 777 | SBVAL(p, 0, file_index);
|
|---|
| 778 | SIVAL(p, 8, result->fsp_name->st.st_ex_dev);/* FileIndexHigh */
|
|---|
| 779 |
|
|---|
| 780 | status = smb2_create_blob_add(state, &out_context_blobs,
|
|---|
| 781 | SMB2_CREATE_TAG_QFID,
|
|---|
| 782 | blob);
|
|---|
| 783 | if (!NT_STATUS_IS_OK(status)) {
|
|---|
| 784 | tevent_req_nterror(req, status);
|
|---|
| 785 | return tevent_req_post(req, ev);
|
|---|
| 786 | }
|
|---|
| 787 | }
|
|---|
| 788 | }
|
|---|
| 789 |
|
|---|
| 790 | smb2req->compat_chain_fsp = smb1req->chain_fsp;
|
|---|
| 791 |
|
|---|
| 792 | if(lp_fake_oplocks(SNUM(smb2req->tcon->compat_conn))) {
|
|---|
| 793 | state->out_oplock_level = in_oplock_level;
|
|---|
| 794 | } else {
|
|---|
| 795 | state->out_oplock_level = map_samba_oplock_levels_to_smb2(result->oplock_type);
|
|---|
| 796 | }
|
|---|
| 797 |
|
|---|
| 798 | if ((in_create_disposition == FILE_SUPERSEDE)
|
|---|
| 799 | && (info == FILE_WAS_OVERWRITTEN)) {
|
|---|
| 800 | state->out_create_action = FILE_WAS_SUPERSEDED;
|
|---|
| 801 | } else {
|
|---|
| 802 | state->out_create_action = info;
|
|---|
| 803 | }
|
|---|
| 804 | state->out_file_attributes = dos_mode(result->conn,
|
|---|
| 805 | result->fsp_name);
|
|---|
| 806 | /* Deal with other possible opens having a modified
|
|---|
| 807 | write time. JRA. */
|
|---|
| 808 | ZERO_STRUCT(write_time_ts);
|
|---|
| 809 | get_file_infos(result->file_id, 0, NULL, &write_time_ts);
|
|---|
| 810 | if (!null_timespec(write_time_ts)) {
|
|---|
| 811 | update_stat_ex_mtime(&result->fsp_name->st, write_time_ts);
|
|---|
| 812 | }
|
|---|
| 813 |
|
|---|
| 814 | unix_timespec_to_nt_time(&state->out_creation_time,
|
|---|
| 815 | get_create_timespec(smb1req->conn, result,
|
|---|
| 816 | result->fsp_name));
|
|---|
| 817 | unix_timespec_to_nt_time(&state->out_last_access_time,
|
|---|
| 818 | result->fsp_name->st.st_ex_atime);
|
|---|
| 819 | unix_timespec_to_nt_time(&state->out_last_write_time,
|
|---|
| 820 | result->fsp_name->st.st_ex_mtime);
|
|---|
| 821 | unix_timespec_to_nt_time(&state->out_change_time,
|
|---|
| 822 | get_change_timespec(smb1req->conn, result,
|
|---|
| 823 | result->fsp_name));
|
|---|
| 824 | state->out_allocation_size =
|
|---|
| 825 | SMB_VFS_GET_ALLOC_SIZE(smb1req->conn, result,
|
|---|
| 826 | &(result->fsp_name->st));
|
|---|
| 827 | state->out_end_of_file = result->fsp_name->st.st_ex_size;
|
|---|
| 828 | if (state->out_file_attributes == 0) {
|
|---|
| 829 | state->out_file_attributes = FILE_ATTRIBUTE_NORMAL;
|
|---|
| 830 | }
|
|---|
| 831 | state->out_file_id_persistent = fsp_persistent_id(result);
|
|---|
| 832 | state->out_file_id_volatile = result->fnum;
|
|---|
| 833 | state->out_context_blobs = out_context_blobs;
|
|---|
| 834 |
|
|---|
| 835 | tevent_req_done(req);
|
|---|
| 836 | return tevent_req_post(req, ev);
|
|---|
| 837 | }
|
|---|
| 838 |
|
|---|
| 839 | static NTSTATUS smbd_smb2_create_recv(struct tevent_req *req,
|
|---|
| 840 | TALLOC_CTX *mem_ctx,
|
|---|
| 841 | uint8_t *out_oplock_level,
|
|---|
| 842 | uint32_t *out_create_action,
|
|---|
| 843 | NTTIME *out_creation_time,
|
|---|
| 844 | NTTIME *out_last_access_time,
|
|---|
| 845 | NTTIME *out_last_write_time,
|
|---|
| 846 | NTTIME *out_change_time,
|
|---|
| 847 | uint64_t *out_allocation_size,
|
|---|
| 848 | uint64_t *out_end_of_file,
|
|---|
| 849 | uint32_t *out_file_attributes,
|
|---|
| 850 | uint64_t *out_file_id_persistent,
|
|---|
| 851 | uint64_t *out_file_id_volatile,
|
|---|
| 852 | struct smb2_create_blobs *out_context_blobs)
|
|---|
| 853 | {
|
|---|
| 854 | NTSTATUS status;
|
|---|
| 855 | struct smbd_smb2_create_state *state = tevent_req_data(req,
|
|---|
| 856 | struct smbd_smb2_create_state);
|
|---|
| 857 |
|
|---|
| 858 | if (tevent_req_is_nterror(req, &status)) {
|
|---|
| 859 | tevent_req_received(req);
|
|---|
| 860 | return status;
|
|---|
| 861 | }
|
|---|
| 862 |
|
|---|
| 863 | *out_oplock_level = state->out_oplock_level;
|
|---|
| 864 | *out_create_action = state->out_create_action;
|
|---|
| 865 | *out_creation_time = state->out_creation_time;
|
|---|
| 866 | *out_last_access_time = state->out_last_access_time;
|
|---|
| 867 | *out_last_write_time = state->out_last_write_time;
|
|---|
| 868 | *out_change_time = state->out_change_time;
|
|---|
| 869 | *out_allocation_size = state->out_allocation_size;
|
|---|
| 870 | *out_end_of_file = state->out_end_of_file;
|
|---|
| 871 | *out_file_attributes = state->out_file_attributes;
|
|---|
| 872 | *out_file_id_persistent = state->out_file_id_persistent;
|
|---|
| 873 | *out_file_id_volatile = state->out_file_id_volatile;
|
|---|
| 874 | *out_context_blobs = state->out_context_blobs;
|
|---|
| 875 |
|
|---|
| 876 | talloc_steal(mem_ctx, state->out_context_blobs.blobs);
|
|---|
| 877 |
|
|---|
| 878 | tevent_req_received(req);
|
|---|
| 879 | return NT_STATUS_OK;
|
|---|
| 880 | }
|
|---|
| 881 |
|
|---|
| 882 | /*********************************************************
|
|---|
| 883 | Code for dealing with deferred opens.
|
|---|
| 884 | *********************************************************/
|
|---|
| 885 |
|
|---|
| 886 | bool get_deferred_open_message_state_smb2(struct smbd_smb2_request *smb2req,
|
|---|
| 887 | struct timeval *p_request_time,
|
|---|
| 888 | void **pp_state)
|
|---|
| 889 | {
|
|---|
| 890 | struct smbd_smb2_create_state *state = NULL;
|
|---|
| 891 | struct tevent_req *req = NULL;
|
|---|
| 892 |
|
|---|
| 893 | if (!smb2req) {
|
|---|
| 894 | return false;
|
|---|
| 895 | }
|
|---|
| 896 | if (!smb2req->async) {
|
|---|
| 897 | return false;
|
|---|
| 898 | }
|
|---|
| 899 | req = smb2req->subreq;
|
|---|
| 900 | if (!req) {
|
|---|
| 901 | return false;
|
|---|
| 902 | }
|
|---|
| 903 | state = tevent_req_data(req, struct smbd_smb2_create_state);
|
|---|
| 904 | if (!state) {
|
|---|
| 905 | return false;
|
|---|
| 906 | }
|
|---|
| 907 | if (p_request_time) {
|
|---|
| 908 | *p_request_time = state->request_time;
|
|---|
| 909 | }
|
|---|
| 910 | if (pp_state) {
|
|---|
| 911 | *pp_state = (void *)state->private_data.data;
|
|---|
| 912 | }
|
|---|
| 913 | return true;
|
|---|
| 914 | }
|
|---|
| 915 |
|
|---|
| 916 | /*********************************************************
|
|---|
| 917 | Re-process this call early - requested by message or
|
|---|
| 918 | close.
|
|---|
| 919 | *********************************************************/
|
|---|
| 920 |
|
|---|
| 921 | static struct smbd_smb2_request *find_open_smb2req(
|
|---|
| 922 | struct smbd_server_connection *sconn, uint64_t mid)
|
|---|
| 923 | {
|
|---|
| 924 | struct smbd_smb2_request *smb2req;
|
|---|
| 925 |
|
|---|
| 926 | for (smb2req = sconn->smb2.requests; smb2req; smb2req = smb2req->next) {
|
|---|
| 927 | uint64_t message_id;
|
|---|
| 928 | if (smb2req->subreq == NULL) {
|
|---|
| 929 | /* This message has been processed. */
|
|---|
| 930 | continue;
|
|---|
| 931 | }
|
|---|
| 932 | if (!tevent_req_is_in_progress(smb2req->subreq)) {
|
|---|
| 933 | /* This message has been processed. */
|
|---|
| 934 | continue;
|
|---|
| 935 | }
|
|---|
| 936 | message_id = get_mid_from_smb2req(smb2req);
|
|---|
| 937 | if (message_id == mid) {
|
|---|
| 938 | return smb2req;
|
|---|
| 939 | }
|
|---|
| 940 | }
|
|---|
| 941 | return NULL;
|
|---|
| 942 | }
|
|---|
| 943 |
|
|---|
| 944 | bool open_was_deferred_smb2(struct smbd_server_connection *sconn, uint64_t mid)
|
|---|
| 945 | {
|
|---|
| 946 | struct smbd_smb2_create_state *state = NULL;
|
|---|
| 947 | struct smbd_smb2_request *smb2req;
|
|---|
| 948 |
|
|---|
| 949 | smb2req = find_open_smb2req(sconn, mid);
|
|---|
| 950 |
|
|---|
| 951 | if (!smb2req) {
|
|---|
| 952 | DEBUG(10,("open_was_deferred_smb2: mid %llu smb2req == NULL\n",
|
|---|
| 953 | (unsigned long long)mid));
|
|---|
| 954 | return false;
|
|---|
| 955 | }
|
|---|
| 956 | if (!smb2req->subreq) {
|
|---|
| 957 | return false;
|
|---|
| 958 | }
|
|---|
| 959 | if (!tevent_req_is_in_progress(smb2req->subreq)) {
|
|---|
| 960 | return false;
|
|---|
| 961 | }
|
|---|
| 962 | state = tevent_req_data(smb2req->subreq,
|
|---|
| 963 | struct smbd_smb2_create_state);
|
|---|
| 964 | if (!state) {
|
|---|
| 965 | return false;
|
|---|
| 966 | }
|
|---|
| 967 | /* It's not in progress if there's no timeout event. */
|
|---|
| 968 | if (!state->open_was_deferred) {
|
|---|
| 969 | return false;
|
|---|
| 970 | }
|
|---|
| 971 |
|
|---|
| 972 | DEBUG(10,("open_was_deferred_smb2: mid = %llu\n",
|
|---|
| 973 | (unsigned long long)mid));
|
|---|
| 974 |
|
|---|
| 975 | return true;
|
|---|
| 976 | }
|
|---|
| 977 |
|
|---|
| 978 | static void remove_deferred_open_message_smb2_internal(struct smbd_smb2_request *smb2req,
|
|---|
| 979 | uint64_t mid)
|
|---|
| 980 | {
|
|---|
| 981 | struct smbd_smb2_create_state *state = NULL;
|
|---|
| 982 |
|
|---|
| 983 | if (!smb2req->subreq) {
|
|---|
| 984 | return;
|
|---|
| 985 | }
|
|---|
| 986 | if (!tevent_req_is_in_progress(smb2req->subreq)) {
|
|---|
| 987 | return;
|
|---|
| 988 | }
|
|---|
| 989 | state = tevent_req_data(smb2req->subreq,
|
|---|
| 990 | struct smbd_smb2_create_state);
|
|---|
| 991 | if (!state) {
|
|---|
| 992 | return;
|
|---|
| 993 | }
|
|---|
| 994 |
|
|---|
| 995 | DEBUG(10,("remove_deferred_open_message_smb2_internal: "
|
|---|
| 996 | "mid %llu\n",
|
|---|
| 997 | (unsigned long long)mid ));
|
|---|
| 998 |
|
|---|
| 999 | state->open_was_deferred = false;
|
|---|
| 1000 | /* Ensure we don't have any outstanding timer event. */
|
|---|
| 1001 | TALLOC_FREE(state->te);
|
|---|
| 1002 | /* Ensure we don't have any outstanding immediate event. */
|
|---|
| 1003 | TALLOC_FREE(state->im);
|
|---|
| 1004 | }
|
|---|
| 1005 |
|
|---|
| 1006 | void remove_deferred_open_message_smb2(
|
|---|
| 1007 | struct smbd_server_connection *sconn, uint64_t mid)
|
|---|
| 1008 | {
|
|---|
| 1009 | struct smbd_smb2_request *smb2req;
|
|---|
| 1010 |
|
|---|
| 1011 | smb2req = find_open_smb2req(sconn, mid);
|
|---|
| 1012 |
|
|---|
| 1013 | if (!smb2req) {
|
|---|
| 1014 | DEBUG(10,("remove_deferred_open_message_smb2: "
|
|---|
| 1015 | "can't find mid %llu\n",
|
|---|
| 1016 | (unsigned long long)mid ));
|
|---|
| 1017 | return;
|
|---|
| 1018 | }
|
|---|
| 1019 | remove_deferred_open_message_smb2_internal(smb2req, mid);
|
|---|
| 1020 | }
|
|---|
| 1021 |
|
|---|
| 1022 | static void smbd_smb2_create_request_dispatch_immediate(struct tevent_context *ctx,
|
|---|
| 1023 | struct tevent_immediate *im,
|
|---|
| 1024 | void *private_data)
|
|---|
| 1025 | {
|
|---|
| 1026 | struct smbd_smb2_request *smb2req = talloc_get_type_abort(private_data,
|
|---|
| 1027 | struct smbd_smb2_request);
|
|---|
| 1028 | struct smbd_server_connection *sconn = smb2req->sconn;
|
|---|
| 1029 | uint64_t mid = get_mid_from_smb2req(smb2req);
|
|---|
| 1030 | NTSTATUS status;
|
|---|
| 1031 |
|
|---|
| 1032 | DEBUG(10,("smbd_smb2_create_request_dispatch_immediate: "
|
|---|
| 1033 | "re-dispatching mid %llu\n",
|
|---|
| 1034 | (unsigned long long)mid ));
|
|---|
| 1035 |
|
|---|
| 1036 | status = smbd_smb2_request_dispatch(smb2req);
|
|---|
| 1037 | if (!NT_STATUS_IS_OK(status)) {
|
|---|
| 1038 | smbd_server_connection_terminate(sconn, nt_errstr(status));
|
|---|
| 1039 | return;
|
|---|
| 1040 | }
|
|---|
| 1041 | }
|
|---|
| 1042 |
|
|---|
| 1043 | void schedule_deferred_open_message_smb2(
|
|---|
| 1044 | struct smbd_server_connection *sconn, uint64_t mid)
|
|---|
| 1045 | {
|
|---|
| 1046 | struct smbd_smb2_create_state *state = NULL;
|
|---|
| 1047 | struct smbd_smb2_request *smb2req;
|
|---|
| 1048 |
|
|---|
| 1049 | smb2req = find_open_smb2req(sconn, mid);
|
|---|
| 1050 |
|
|---|
| 1051 | if (!smb2req) {
|
|---|
| 1052 | DEBUG(10,("schedule_deferred_open_message_smb2: "
|
|---|
| 1053 | "can't find mid %llu\n",
|
|---|
| 1054 | (unsigned long long)mid ));
|
|---|
| 1055 | return;
|
|---|
| 1056 | }
|
|---|
| 1057 | if (!smb2req->subreq) {
|
|---|
| 1058 | return;
|
|---|
| 1059 | }
|
|---|
| 1060 | if (!tevent_req_is_in_progress(smb2req->subreq)) {
|
|---|
| 1061 | return;
|
|---|
| 1062 | }
|
|---|
| 1063 | state = tevent_req_data(smb2req->subreq,
|
|---|
| 1064 | struct smbd_smb2_create_state);
|
|---|
| 1065 | if (!state) {
|
|---|
| 1066 | return;
|
|---|
| 1067 | }
|
|---|
| 1068 |
|
|---|
| 1069 | /* Ensure we don't have any outstanding timer event. */
|
|---|
| 1070 | TALLOC_FREE(state->te);
|
|---|
| 1071 | /* Ensure we don't have any outstanding immediate event. */
|
|---|
| 1072 | TALLOC_FREE(state->im);
|
|---|
| 1073 |
|
|---|
| 1074 | /*
|
|---|
| 1075 | * This is subtle. We must null out the callback
|
|---|
| 1076 | * before resheduling, else the first call to
|
|---|
| 1077 | * tevent_req_nterror() causes the _receive()
|
|---|
| 1078 | * function to be called, this causing tevent_req_post()
|
|---|
| 1079 | * to crash.
|
|---|
| 1080 | */
|
|---|
| 1081 | tevent_req_set_callback(smb2req->subreq, NULL, NULL);
|
|---|
| 1082 |
|
|---|
| 1083 | state->im = tevent_create_immediate(smb2req);
|
|---|
| 1084 | if (!state->im) {
|
|---|
| 1085 | smbd_server_connection_terminate(smb2req->sconn,
|
|---|
| 1086 | nt_errstr(NT_STATUS_NO_MEMORY));
|
|---|
| 1087 | }
|
|---|
| 1088 |
|
|---|
| 1089 | DEBUG(10,("schedule_deferred_open_message_smb2: "
|
|---|
| 1090 | "re-processing mid %llu\n",
|
|---|
| 1091 | (unsigned long long)mid ));
|
|---|
| 1092 |
|
|---|
| 1093 | tevent_schedule_immediate(state->im,
|
|---|
| 1094 | smb2req->sconn->smb2.event_ctx,
|
|---|
| 1095 | smbd_smb2_create_request_dispatch_immediate,
|
|---|
| 1096 | smb2req);
|
|---|
| 1097 | }
|
|---|
| 1098 |
|
|---|
| 1099 | /*********************************************************
|
|---|
| 1100 | Re-process this call.
|
|---|
| 1101 | *********************************************************/
|
|---|
| 1102 |
|
|---|
| 1103 | static void smb2_deferred_open_timer(struct event_context *ev,
|
|---|
| 1104 | struct timed_event *te,
|
|---|
| 1105 | struct timeval _tval,
|
|---|
| 1106 | void *private_data)
|
|---|
| 1107 | {
|
|---|
| 1108 | NTSTATUS status;
|
|---|
| 1109 | struct smbd_smb2_create_state *state = NULL;
|
|---|
| 1110 | struct smbd_smb2_request *smb2req = talloc_get_type(private_data,
|
|---|
| 1111 | struct smbd_smb2_request);
|
|---|
| 1112 |
|
|---|
| 1113 | DEBUG(10,("smb2_deferred_open_timer: [idx=%d], %s\n",
|
|---|
| 1114 | smb2req->current_idx,
|
|---|
| 1115 | tevent_req_default_print(smb2req->subreq, talloc_tos()) ));
|
|---|
| 1116 |
|
|---|
| 1117 | state = tevent_req_data(smb2req->subreq,
|
|---|
| 1118 | struct smbd_smb2_create_state);
|
|---|
| 1119 | if (!state) {
|
|---|
| 1120 | return;
|
|---|
| 1121 | }
|
|---|
| 1122 | /*
|
|---|
| 1123 | * Null this out, don't talloc_free. It will
|
|---|
| 1124 | * be talloc_free'd by the tevent library when
|
|---|
| 1125 | * this returns.
|
|---|
| 1126 | */
|
|---|
| 1127 | state->te = NULL;
|
|---|
| 1128 | /* Ensure we don't have any outstanding immediate event. */
|
|---|
| 1129 | TALLOC_FREE(state->im);
|
|---|
| 1130 |
|
|---|
| 1131 | /*
|
|---|
| 1132 | * This is subtle. We must null out the callback
|
|---|
| 1133 | * before resheduling, else the first call to
|
|---|
| 1134 | * tevent_req_nterror() causes the _receive()
|
|---|
| 1135 | * function to be called, this causing tevent_req_post()
|
|---|
| 1136 | * to crash.
|
|---|
| 1137 | */
|
|---|
| 1138 | tevent_req_set_callback(smb2req->subreq, NULL, NULL);
|
|---|
| 1139 |
|
|---|
| 1140 | status = smbd_smb2_request_dispatch(smb2req);
|
|---|
| 1141 |
|
|---|
| 1142 | if (!NT_STATUS_IS_OK(status)) {
|
|---|
| 1143 | smbd_server_connection_terminate(smb2req->sconn,
|
|---|
| 1144 | nt_errstr(status));
|
|---|
| 1145 | }
|
|---|
| 1146 | }
|
|---|
| 1147 |
|
|---|
| 1148 | static bool smbd_smb2_create_cancel(struct tevent_req *req)
|
|---|
| 1149 | {
|
|---|
| 1150 | struct smbd_smb2_request *smb2req = NULL;
|
|---|
| 1151 | struct smbd_smb2_create_state *state = tevent_req_data(req,
|
|---|
| 1152 | struct smbd_smb2_create_state);
|
|---|
| 1153 | uint64_t mid;
|
|---|
| 1154 |
|
|---|
| 1155 | if (!state) {
|
|---|
| 1156 | return false;
|
|---|
| 1157 | }
|
|---|
| 1158 |
|
|---|
| 1159 | if (!state->smb2req) {
|
|---|
| 1160 | return false;
|
|---|
| 1161 | }
|
|---|
| 1162 |
|
|---|
| 1163 | smb2req = state->smb2req;
|
|---|
| 1164 | mid = get_mid_from_smb2req(smb2req);
|
|---|
| 1165 |
|
|---|
| 1166 | remove_deferred_open_entry(state->id, mid,
|
|---|
| 1167 | sconn_server_id(smb2req->sconn));
|
|---|
| 1168 | remove_deferred_open_message_smb2_internal(smb2req, mid);
|
|---|
| 1169 | smb2req->cancelled = true;
|
|---|
| 1170 |
|
|---|
| 1171 | tevent_req_done(req);
|
|---|
| 1172 | return true;
|
|---|
| 1173 | }
|
|---|
| 1174 |
|
|---|
| 1175 | bool push_deferred_open_message_smb2(struct smbd_smb2_request *smb2req,
|
|---|
| 1176 | struct timeval request_time,
|
|---|
| 1177 | struct timeval timeout,
|
|---|
| 1178 | struct file_id id,
|
|---|
| 1179 | char *private_data,
|
|---|
| 1180 | size_t priv_len)
|
|---|
| 1181 | {
|
|---|
| 1182 | struct tevent_req *req = NULL;
|
|---|
| 1183 | struct smbd_smb2_create_state *state = NULL;
|
|---|
| 1184 | struct timeval end_time;
|
|---|
| 1185 |
|
|---|
| 1186 | if (!smb2req) {
|
|---|
| 1187 | return false;
|
|---|
| 1188 | }
|
|---|
| 1189 | req = smb2req->subreq;
|
|---|
| 1190 | if (!req) {
|
|---|
| 1191 | return false;
|
|---|
| 1192 | }
|
|---|
| 1193 | state = tevent_req_data(req, struct smbd_smb2_create_state);
|
|---|
| 1194 | if (!state) {
|
|---|
| 1195 | return false;
|
|---|
| 1196 | }
|
|---|
| 1197 | state->id = id;
|
|---|
| 1198 | state->request_time = request_time;
|
|---|
| 1199 | state->private_data = data_blob_talloc(state, private_data,
|
|---|
| 1200 | priv_len);
|
|---|
| 1201 | if (!state->private_data.data) {
|
|---|
| 1202 | return false;
|
|---|
| 1203 | }
|
|---|
| 1204 |
|
|---|
| 1205 | #if 1
|
|---|
| 1206 | /* Boo - turns out this isn't what W2K8R2
|
|---|
| 1207 | does. It actually sends the STATUS_PENDING
|
|---|
| 1208 | message followed by the STATUS_SHARING_VIOLATION
|
|---|
| 1209 | message. Surely this means that all open
|
|---|
| 1210 | calls (even on directories) will potentially
|
|---|
| 1211 | fail in a chain.... ? And I've seen directory
|
|---|
| 1212 | opens as the start of a chain. JRA.
|
|---|
| 1213 |
|
|---|
| 1214 | Update: 19th May 2010. Talking with Microsoft
|
|---|
| 1215 | engineers at the plugfest this is a bug in
|
|---|
| 1216 | Windows. Re-enable this code.
|
|---|
| 1217 | */
|
|---|
| 1218 | /*
|
|---|
| 1219 | * More subtlety. To match W2K8R2 don't
|
|---|
| 1220 | * send a "gone async" message if it's simply
|
|---|
| 1221 | * a STATUS_SHARING_VIOLATION (short) wait, not
|
|---|
| 1222 | * an oplock break wait. We do this by prematurely
|
|---|
| 1223 | * setting smb2req->async flag.
|
|---|
| 1224 | */
|
|---|
| 1225 | if (timeout.tv_sec < 2) {
|
|---|
| 1226 | DEBUG(10,("push_deferred_open_message_smb2: "
|
|---|
| 1227 | "short timer wait (usec = %u). "
|
|---|
| 1228 | "Don't send async message.\n",
|
|---|
| 1229 | (unsigned int)timeout.tv_usec ));
|
|---|
| 1230 | smb2req->async = true;
|
|---|
| 1231 | }
|
|---|
| 1232 | #endif
|
|---|
| 1233 |
|
|---|
| 1234 | /* Re-schedule us to retry on timer expiry. */
|
|---|
| 1235 | end_time = timeval_sum(&request_time, &timeout);
|
|---|
| 1236 |
|
|---|
| 1237 | DEBUG(10,("push_deferred_open_message_smb2: "
|
|---|
| 1238 | "timeout at %s\n",
|
|---|
| 1239 | timeval_string(talloc_tos(),
|
|---|
| 1240 | &end_time,
|
|---|
| 1241 | true) ));
|
|---|
| 1242 |
|
|---|
| 1243 | state->open_was_deferred = true;
|
|---|
| 1244 | state->te = event_add_timed(smb2req->sconn->smb2.event_ctx,
|
|---|
| 1245 | state,
|
|---|
| 1246 | end_time,
|
|---|
| 1247 | smb2_deferred_open_timer,
|
|---|
| 1248 | smb2req);
|
|---|
| 1249 | if (!state->te) {
|
|---|
| 1250 | return false;
|
|---|
| 1251 | }
|
|---|
| 1252 |
|
|---|
| 1253 | /* allow this request to be canceled */
|
|---|
| 1254 | tevent_req_set_cancel_fn(req, smbd_smb2_create_cancel);
|
|---|
| 1255 |
|
|---|
| 1256 | return true;
|
|---|
| 1257 | }
|
|---|