bfdb2d87384a5712df30984bfba8cc6c97e8ec17
[metze/samba/wip.git] / source3 / smbd / smb2_flush.c
1 /*
2    Unix SMB/CIFS implementation.
3    Core SMB2 server
4
5    Copyright (C) Stefan Metzmacher 2009
6
7    This program is free software; you can redistribute it and/or modify
8    it under the terms of the GNU General Public License as published by
9    the Free Software Foundation; either version 3 of the License, or
10    (at your option) any later version.
11
12    This program is distributed in the hope that it will be useful,
13    but WITHOUT ANY WARRANTY; without even the implied warranty of
14    MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
15    GNU General Public License for more details.
16
17    You should have received a copy of the GNU General Public License
18    along with this program.  If not, see <http://www.gnu.org/licenses/>.
19 */
20
21 #include "includes.h"
22 #include "smbd/globals.h"
23 #include "../libcli/smb/smb_common.h"
24
25 static struct tevent_req *smbd_smb2_flush_send(TALLOC_CTX *mem_ctx,
26                                                struct tevent_context *ev,
27                                                struct smbd_smb2_request *smb2req,
28                                                uint64_t in_file_id_volatile);
29 static NTSTATUS smbd_smb2_flush_recv(struct tevent_req *req);
30
31 static void smbd_smb2_request_flush_done(struct tevent_req *subreq);
32 NTSTATUS smbd_smb2_request_process_flush(struct smbd_smb2_request *req)
33 {
34         const uint8_t *inhdr;
35         const uint8_t *inbody;
36         int i = req->current_idx;
37         size_t expected_body_size = 0x18;
38         size_t body_size;
39         uint64_t in_file_id_persistent;
40         uint64_t in_file_id_volatile;
41         struct tevent_req *subreq;
42
43         inhdr = (const uint8_t *)req->in.vector[i+0].iov_base;
44         if (req->in.vector[i+1].iov_len != (expected_body_size & 0xFFFFFFFE)) {
45                 return smbd_smb2_request_error(req, NT_STATUS_INVALID_PARAMETER);
46         }
47
48         inbody = (const uint8_t *)req->in.vector[i+1].iov_base;
49
50         body_size = SVAL(inbody, 0x00);
51         if (body_size != expected_body_size) {
52                 return smbd_smb2_request_error(req, NT_STATUS_INVALID_PARAMETER);
53         }
54
55         in_file_id_persistent   = BVAL(inbody, 0x08);
56         in_file_id_volatile     = BVAL(inbody, 0x10);
57
58         if (req->compat_chain_fsp) {
59                 /* skip check */
60         } else if (in_file_id_persistent != 0) {
61                 return smbd_smb2_request_error(req, NT_STATUS_FILE_CLOSED);
62         }
63
64         subreq = smbd_smb2_flush_send(req,
65                                       req->sconn->smb2.event_ctx,
66                                       req,
67                                       in_file_id_volatile);
68         if (subreq == NULL) {
69                 return smbd_smb2_request_error(req, NT_STATUS_NO_MEMORY);
70         }
71         tevent_req_set_callback(subreq, smbd_smb2_request_flush_done, req);
72
73         if (tevent_req_is_in_progress(subreq)) {
74                 return smbd_smb2_request_pending_queue(req);
75         }
76
77         return NT_STATUS_OK;
78 }
79
80 static void smbd_smb2_request_flush_done(struct tevent_req *subreq)
81 {
82         struct smbd_smb2_request *req = tevent_req_callback_data(subreq,
83                                         struct smbd_smb2_request);
84         DATA_BLOB outbody;
85         NTSTATUS status;
86         NTSTATUS error; /* transport error */
87
88         status = smbd_smb2_flush_recv(subreq);
89         TALLOC_FREE(subreq);
90         if (!NT_STATUS_IS_OK(status)) {
91                 error = smbd_smb2_request_error(req, status);
92                 if (!NT_STATUS_IS_OK(error)) {
93                         smbd_server_connection_terminate(req->sconn,
94                                                          nt_errstr(error));
95                         return;
96                 }
97                 return;
98         }
99
100         outbody = data_blob_talloc(req->out.vector, NULL, 0x10);
101         if (outbody.data == NULL) {
102                 error = smbd_smb2_request_error(req, NT_STATUS_NO_MEMORY);
103                 if (!NT_STATUS_IS_OK(error)) {
104                         smbd_server_connection_terminate(req->sconn,
105                                                          nt_errstr(error));
106                         return;
107                 }
108                 return;
109         }
110
111         SSVAL(outbody.data, 0x00, 0x04);        /* struct size */
112         SSVAL(outbody.data, 0x02, 0);           /* reserved */
113
114         error = smbd_smb2_request_done(req, outbody, NULL);
115         if (!NT_STATUS_IS_OK(error)) {
116                 smbd_server_connection_terminate(req->sconn,
117                                                  nt_errstr(error));
118                 return;
119         }
120 }
121
122 struct smbd_smb2_flush_state {
123         struct smbd_smb2_request *smb2req;
124 };
125
126 static struct tevent_req *smbd_smb2_flush_send(TALLOC_CTX *mem_ctx,
127                                                struct tevent_context *ev,
128                                                struct smbd_smb2_request *smb2req,
129                                                uint64_t in_file_id_volatile)
130 {
131         struct tevent_req *req;
132         struct smbd_smb2_flush_state *state;
133         NTSTATUS status;
134         struct smb_request *smbreq;
135         files_struct *fsp;
136
137         req = tevent_req_create(mem_ctx, &state,
138                                 struct smbd_smb2_flush_state);
139         if (req == NULL) {
140                 return NULL;
141         }
142         state->smb2req = smb2req;
143
144         DEBUG(10,("smbd_smb2_flush: file_id[0x%016llX]\n",
145                   (unsigned long long)in_file_id_volatile));
146
147         smbreq = smbd_smb2_fake_smb_request(smb2req);
148         if (tevent_req_nomem(smbreq, req)) {
149                 return tevent_req_post(req, ev);
150         }
151
152         if (IS_IPC(smbreq->conn)) {
153                 tevent_req_nterror(req, NT_STATUS_NOT_IMPLEMENTED);
154                 return tevent_req_post(req, ev);
155         }
156
157         fsp = file_fsp(smbreq, (uint16_t)in_file_id_volatile);
158         if (fsp == NULL) {
159                 tevent_req_nterror(req, NT_STATUS_FILE_CLOSED);
160                 return tevent_req_post(req, ev);
161         }
162         if (smbreq->conn != fsp->conn) {
163                 tevent_req_nterror(req, NT_STATUS_FILE_CLOSED);
164                 return tevent_req_post(req, ev);
165         }
166         if (smb2req->session->vuid != fsp->vuid) {
167                 tevent_req_nterror(req, NT_STATUS_FILE_CLOSED);
168                 return tevent_req_post(req, ev);
169         }
170
171         if (!CHECK_WRITE(fsp)) {
172                 tevent_req_nterror(req, NT_STATUS_ACCESS_DENIED);
173                 return tevent_req_post(req, ev);
174         }
175
176         status = sync_file(smbreq->conn, fsp, true);
177         if (!NT_STATUS_IS_OK(status)) {
178                 DEBUG(5,("smbd_smb2_flush: sync_file for %s returned %s\n",
179                          fsp_str_dbg(fsp), nt_errstr(status)));
180                 tevent_req_nterror(req, status);
181                 return tevent_req_post(req, ev);
182         }
183
184         tevent_req_done(req);
185         return tevent_req_post(req, ev);
186 }
187
188 static NTSTATUS smbd_smb2_flush_recv(struct tevent_req *req)
189 {
190         NTSTATUS status;
191
192         if (tevent_req_is_nterror(req, &status)) {
193                 tevent_req_received(req);
194                 return status;
195         }
196
197         tevent_req_received(req);
198         return NT_STATUS_OK;
199 }