Fix bug noticed by Volker - if sendfile returns zero then
[metze/samba/wip.git] / source3 / smbd / reply.c
1 /*
2    Unix SMB/CIFS implementation.
3    Main SMB reply routines
4    Copyright (C) Andrew Tridgell 1992-1998
5    Copyright (C) Andrew Bartlett      2001
6    Copyright (C) Jeremy Allison 1992-2007.
7    Copyright (C) Volker Lendecke 2007
8
9    This program is free software; you can redistribute it and/or modify
10    it under the terms of the GNU General Public License as published by
11    the Free Software Foundation; either version 3 of the License, or
12    (at your option) any later version.
13
14    This program is distributed in the hope that it will be useful,
15    but WITHOUT ANY WARRANTY; without even the implied warranty of
16    MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
17    GNU General Public License for more details.
18
19    You should have received a copy of the GNU General Public License
20    along with this program.  If not, see <http://www.gnu.org/licenses/>.
21 */
22 /*
23    This file handles most of the reply_ calls that the server
24    makes to handle specific protocols
25 */
26
27 #include "includes.h"
28 #include "smbd/globals.h"
29
30 extern enum protocol_types Protocol;
31
32 /****************************************************************************
33  Ensure we check the path in *exactly* the same way as W2K for a findfirst/findnext
34  path or anything including wildcards.
35  We're assuming here that '/' is not the second byte in any multibyte char
36  set (a safe assumption). '\\' *may* be the second byte in a multibyte char
37  set.
38 ****************************************************************************/
39
40 /* Custom version for processing POSIX paths. */
41 #define IS_PATH_SEP(c,posix_only) ((c) == '/' || (!(posix_only) && (c) == '\\'))
42
43 static NTSTATUS check_path_syntax_internal(char *path,
44                                            bool posix_path,
45                                            bool *p_last_component_contains_wcard)
46 {
47         char *d = path;
48         const char *s = path;
49         NTSTATUS ret = NT_STATUS_OK;
50         bool start_of_name_component = True;
51         bool stream_started = false;
52
53         *p_last_component_contains_wcard = False;
54
55         while (*s) {
56                 if (stream_started) {
57                         switch (*s) {
58                         case '/':
59                         case '\\':
60                                 return NT_STATUS_OBJECT_NAME_INVALID;
61                         case ':':
62                                 if (s[1] == '\0') {
63                                         return NT_STATUS_OBJECT_NAME_INVALID;
64                                 }
65                                 if (strchr_m(&s[1], ':')) {
66                                         return NT_STATUS_OBJECT_NAME_INVALID;
67                                 }
68                                 if (StrCaseCmp(s, ":$DATA") != 0) {
69                                         return NT_STATUS_INVALID_PARAMETER;
70                                 }
71                                 break;
72                         }
73                 }
74
75                 if (!stream_started && *s == ':') {
76                         if (*p_last_component_contains_wcard) {
77                                 return NT_STATUS_OBJECT_NAME_INVALID;
78                         }
79                         /* stream names allow more characters than file names */
80                         stream_started = true;
81                         start_of_name_component = false;
82                         posix_path = true;
83
84                         if (s[1] == '\0') {
85                                 return NT_STATUS_OBJECT_NAME_INVALID;
86                         }
87                 }
88
89                 if (!stream_started && IS_PATH_SEP(*s,posix_path)) {
90                         /*
91                          * Safe to assume is not the second part of a mb char
92                          * as this is handled below.
93                          */
94                         /* Eat multiple '/' or '\\' */
95                         while (IS_PATH_SEP(*s,posix_path)) {
96                                 s++;
97                         }
98                         if ((d != path) && (*s != '\0')) {
99                                 /* We only care about non-leading or trailing '/' or '\\' */
100                                 *d++ = '/';
101                         }
102
103                         start_of_name_component = True;
104                         /* New component. */
105                         *p_last_component_contains_wcard = False;
106                         continue;
107                 }
108
109                 if (start_of_name_component) {
110                         if ((s[0] == '.') && (s[1] == '.') && (IS_PATH_SEP(s[2],posix_path) || s[2] == '\0')) {
111                                 /* Uh oh - "/../" or "\\..\\"  or "/..\0" or "\\..\0" ! */
112
113                                 /*
114                                  * No mb char starts with '.' so we're safe checking the directory separator here.
115                                  */
116
117                                 /* If  we just added a '/' - delete it */
118                                 if ((d > path) && (*(d-1) == '/')) {
119                                         *(d-1) = '\0';
120                                         d--;
121                                 }
122
123                                 /* Are we at the start ? Can't go back further if so. */
124                                 if (d <= path) {
125                                         ret = NT_STATUS_OBJECT_PATH_SYNTAX_BAD;
126                                         break;
127                                 }
128                                 /* Go back one level... */
129                                 /* We know this is safe as '/' cannot be part of a mb sequence. */
130                                 /* NOTE - if this assumption is invalid we are not in good shape... */
131                                 /* Decrement d first as d points to the *next* char to write into. */
132                                 for (d--; d > path; d--) {
133                                         if (*d == '/')
134                                                 break;
135                                 }
136                                 s += 2; /* Else go past the .. */
137                                 /* We're still at the start of a name component, just the previous one. */
138                                 continue;
139
140                         } else if ((s[0] == '.') && ((s[1] == '\0') || IS_PATH_SEP(s[1],posix_path))) {
141                                 if (posix_path) {
142                                         /* Eat the '.' */
143                                         s++;
144                                         continue;
145                                 }
146                         }
147
148                 }
149
150                 if (!(*s & 0x80)) {
151                         if (!posix_path) {
152                                 if (*s <= 0x1f || *s == '|') {
153                                         return NT_STATUS_OBJECT_NAME_INVALID;
154                                 }
155                                 switch (*s) {
156                                         case '*':
157                                         case '?':
158                                         case '<':
159                                         case '>':
160                                         case '"':
161                                                 *p_last_component_contains_wcard = True;
162                                                 break;
163                                         default:
164                                                 break;
165                                 }
166                         }
167                         *d++ = *s++;
168                 } else {
169                         size_t siz;
170                         /* Get the size of the next MB character. */
171                         next_codepoint(s,&siz);
172                         switch(siz) {
173                                 case 5:
174                                         *d++ = *s++;
175                                         /*fall through*/
176                                 case 4:
177                                         *d++ = *s++;
178                                         /*fall through*/
179                                 case 3:
180                                         *d++ = *s++;
181                                         /*fall through*/
182                                 case 2:
183                                         *d++ = *s++;
184                                         /*fall through*/
185                                 case 1:
186                                         *d++ = *s++;
187                                         break;
188                                 default:
189                                         DEBUG(0,("check_path_syntax_internal: character length assumptions invalid !\n"));
190                                         *d = '\0';
191                                         return NT_STATUS_INVALID_PARAMETER;
192                         }
193                 }
194                 start_of_name_component = False;
195         }
196
197         *d = '\0';
198
199         return ret;
200 }
201
202 /****************************************************************************
203  Ensure we check the path in *exactly* the same way as W2K for regular pathnames.
204  No wildcards allowed.
205 ****************************************************************************/
206
207 NTSTATUS check_path_syntax(char *path)
208 {
209         bool ignore;
210         return check_path_syntax_internal(path, False, &ignore);
211 }
212
213 /****************************************************************************
214  Ensure we check the path in *exactly* the same way as W2K for regular pathnames.
215  Wildcards allowed - p_contains_wcard returns true if the last component contained
216  a wildcard.
217 ****************************************************************************/
218
219 NTSTATUS check_path_syntax_wcard(char *path, bool *p_contains_wcard)
220 {
221         return check_path_syntax_internal(path, False, p_contains_wcard);
222 }
223
224 /****************************************************************************
225  Check the path for a POSIX client.
226  We're assuming here that '/' is not the second byte in any multibyte char
227  set (a safe assumption).
228 ****************************************************************************/
229
230 NTSTATUS check_path_syntax_posix(char *path)
231 {
232         bool ignore;
233         return check_path_syntax_internal(path, True, &ignore);
234 }
235
236 /****************************************************************************
237  Pull a string and check the path allowing a wilcard - provide for error return.
238 ****************************************************************************/
239
240 size_t srvstr_get_path_wcard(TALLOC_CTX *ctx,
241                         const char *base_ptr,
242                         uint16 smb_flags2,
243                         char **pp_dest,
244                         const char *src,
245                         size_t src_len,
246                         int flags,
247                         NTSTATUS *err,
248                         bool *contains_wcard)
249 {
250         size_t ret;
251
252         *pp_dest = NULL;
253
254         ret = srvstr_pull_talloc(ctx, base_ptr, smb_flags2, pp_dest, src,
255                                  src_len, flags);
256
257         if (!*pp_dest) {
258                 *err = NT_STATUS_INVALID_PARAMETER;
259                 return ret;
260         }
261
262         *contains_wcard = False;
263
264         if (smb_flags2 & FLAGS2_DFS_PATHNAMES) {
265                 /*
266                  * For a DFS path the function parse_dfs_path()
267                  * will do the path processing, just make a copy.
268                  */
269                 *err = NT_STATUS_OK;
270                 return ret;
271         }
272
273         if (lp_posix_pathnames()) {
274                 *err = check_path_syntax_posix(*pp_dest);
275         } else {
276                 *err = check_path_syntax_wcard(*pp_dest, contains_wcard);
277         }
278
279         return ret;
280 }
281
282 /****************************************************************************
283  Pull a string and check the path - provide for error return.
284 ****************************************************************************/
285
286 size_t srvstr_get_path(TALLOC_CTX *ctx,
287                         const char *base_ptr,
288                         uint16 smb_flags2,
289                         char **pp_dest,
290                         const char *src,
291                         size_t src_len,
292                         int flags,
293                         NTSTATUS *err)
294 {
295         bool ignore;
296         return srvstr_get_path_wcard(ctx, base_ptr, smb_flags2, pp_dest, src,
297                                      src_len, flags, err, &ignore);
298 }
299
300 size_t srvstr_get_path_req_wcard(TALLOC_CTX *mem_ctx, struct smb_request *req,
301                                  char **pp_dest, const char *src, int flags,
302                                  NTSTATUS *err, bool *contains_wcard)
303 {
304         return srvstr_get_path_wcard(mem_ctx, (char *)req->inbuf, req->flags2,
305                                      pp_dest, src, smbreq_bufrem(req, src),
306                                      flags, err, contains_wcard);
307 }
308
309 size_t srvstr_get_path_req(TALLOC_CTX *mem_ctx, struct smb_request *req,
310                            char **pp_dest, const char *src, int flags,
311                            NTSTATUS *err)
312 {
313         bool ignore;
314         return srvstr_get_path_req_wcard(mem_ctx, req, pp_dest, src,
315                                          flags, err, &ignore);
316 }
317
318 /****************************************************************************
319  Check if we have a correct fsp pointing to a file. Basic check for open fsp.
320 ****************************************************************************/
321
322 bool check_fsp_open(connection_struct *conn, struct smb_request *req,
323                     files_struct *fsp)
324 {
325         if (!(fsp) || !(conn)) {
326                 reply_nterror(req, NT_STATUS_INVALID_HANDLE);
327                 return False;
328         }
329         if (((conn) != (fsp)->conn) || req->vuid != (fsp)->vuid) {
330                 reply_nterror(req, NT_STATUS_INVALID_HANDLE);
331                 return False;
332         }
333         return True;
334 }
335
336 /****************************************************************************
337  Check if we have a correct fsp pointing to a file.
338 ****************************************************************************/
339
340 bool check_fsp(connection_struct *conn, struct smb_request *req,
341                files_struct *fsp)
342 {
343         if (!check_fsp_open(conn, req, fsp)) {
344                 return False;
345         }
346         if ((fsp)->is_directory) {
347                 reply_nterror(req, NT_STATUS_INVALID_DEVICE_REQUEST);
348                 return False;
349         }
350         if ((fsp)->fh->fd == -1) {
351                 reply_nterror(req, NT_STATUS_ACCESS_DENIED);
352                 return False;
353         }
354         (fsp)->num_smb_operations++;
355         return True;
356 }
357
358 /****************************************************************************
359  Check if we have a correct fsp pointing to a quota fake file. Replacement for
360  the CHECK_NTQUOTA_HANDLE_OK macro.
361 ****************************************************************************/
362
363 bool check_fsp_ntquota_handle(connection_struct *conn, struct smb_request *req,
364                               files_struct *fsp)
365 {
366         if (!check_fsp_open(conn, req, fsp)) {
367                 return false;
368         }
369
370         if (fsp->is_directory) {
371                 return false;
372         }
373
374         if (fsp->fake_file_handle == NULL) {
375                 return false;
376         }
377
378         if (fsp->fake_file_handle->type != FAKE_FILE_TYPE_QUOTA) {
379                 return false;
380         }
381
382         if (fsp->fake_file_handle->private_data == NULL) {
383                 return false;
384         }
385
386         return true;
387 }
388
389 /****************************************************************************
390  Check if we have a correct fsp. Replacement for the FSP_BELONGS_CONN macro
391 ****************************************************************************/
392
393 bool fsp_belongs_conn(connection_struct *conn, struct smb_request *req,
394                       files_struct *fsp)
395 {
396         if ((fsp) && (conn) && ((conn)==(fsp)->conn)
397             && (req->vuid == (fsp)->vuid)) {
398                 return True;
399         }
400
401         reply_nterror(req, NT_STATUS_INVALID_HANDLE);
402         return False;
403 }
404
405 /****************************************************************************
406  Reply to a (netbios-level) special message.
407 ****************************************************************************/
408
409 void reply_special(char *inbuf)
410 {
411         int msg_type = CVAL(inbuf,0);
412         int msg_flags = CVAL(inbuf,1);
413         fstring name1,name2;
414         char name_type = 0;
415
416         /*
417          * We only really use 4 bytes of the outbuf, but for the smb_setlen
418          * calculation & friends (srv_send_smb uses that) we need the full smb
419          * header.
420          */
421         char outbuf[smb_size];
422
423         *name1 = *name2 = 0;
424
425         memset(outbuf, '\0', sizeof(outbuf));
426
427         smb_setlen(outbuf,0);
428
429         switch (msg_type) {
430         case 0x81: /* session request */
431
432                 if (already_got_session) {
433                         exit_server_cleanly("multiple session request not permitted");
434                 }
435
436                 SCVAL(outbuf,0,0x82);
437                 SCVAL(outbuf,3,0);
438                 if (name_len(inbuf+4) > 50 || 
439                     name_len(inbuf+4 + name_len(inbuf + 4)) > 50) {
440                         DEBUG(0,("Invalid name length in session request\n"));
441                         return;
442                 }
443                 name_extract(inbuf,4,name1);
444                 name_type = name_extract(inbuf,4 + name_len(inbuf + 4),name2);
445                 DEBUG(2,("netbios connect: name1=%s name2=%s\n",
446                          name1,name2));      
447
448                 set_local_machine_name(name1, True);
449                 set_remote_machine_name(name2, True);
450
451                 DEBUG(2,("netbios connect: local=%s remote=%s, name type = %x\n",
452                          get_local_machine_name(), get_remote_machine_name(),
453                          name_type));
454
455                 if (name_type == 'R') {
456                         /* We are being asked for a pathworks session --- 
457                            no thanks! */
458                         SCVAL(outbuf, 0,0x83);
459                         break;
460                 }
461
462                 /* only add the client's machine name to the list
463                    of possibly valid usernames if we are operating
464                    in share mode security */
465                 if (lp_security() == SEC_SHARE) {
466                         add_session_user(get_remote_machine_name());
467                 }
468
469                 reload_services(True);
470                 reopen_logs();
471
472                 already_got_session = True;
473                 break;
474
475         case 0x89: /* session keepalive request 
476                       (some old clients produce this?) */
477                 SCVAL(outbuf,0,SMBkeepalive);
478                 SCVAL(outbuf,3,0);
479                 break;
480
481         case 0x82: /* positive session response */
482         case 0x83: /* negative session response */
483         case 0x84: /* retarget session response */
484                 DEBUG(0,("Unexpected session response\n"));
485                 break;
486
487         case SMBkeepalive: /* session keepalive */
488         default:
489                 return;
490         }
491
492         DEBUG(5,("init msg_type=0x%x msg_flags=0x%x\n",
493                     msg_type, msg_flags));
494
495         srv_send_smb(smbd_server_fd(), outbuf, false);
496         return;
497 }
498
499 /****************************************************************************
500  Reply to a tcon.
501  conn POINTER CAN BE NULL HERE !
502 ****************************************************************************/
503
504 void reply_tcon(struct smb_request *req)
505 {
506         connection_struct *conn = req->conn;
507         const char *service;
508         char *service_buf = NULL;
509         char *password = NULL;
510         char *dev = NULL;
511         int pwlen=0;
512         NTSTATUS nt_status;
513         const char *p;
514         DATA_BLOB password_blob;
515         TALLOC_CTX *ctx = talloc_tos();
516
517         START_PROFILE(SMBtcon);
518
519         if (req->buflen < 4) {
520                 reply_nterror(req, NT_STATUS_INVALID_PARAMETER);
521                 END_PROFILE(SMBtcon);
522                 return;
523         }
524
525         p = (const char *)req->buf + 1;
526         p += srvstr_pull_req_talloc(ctx, req, &service_buf, p, STR_TERMINATE);
527         p += 1;
528         pwlen = srvstr_pull_req_talloc(ctx, req, &password, p, STR_TERMINATE);
529         p += pwlen+1;
530         p += srvstr_pull_req_talloc(ctx, req, &dev, p, STR_TERMINATE);
531         p += 1;
532
533         if (service_buf == NULL || password == NULL || dev == NULL) {
534                 reply_nterror(req, NT_STATUS_INVALID_PARAMETER);
535                 END_PROFILE(SMBtcon);
536                 return;
537         }
538         p = strrchr_m(service_buf,'\\');
539         if (p) {
540                 service = p+1;
541         } else {
542                 service = service_buf;
543         }
544
545         password_blob = data_blob(password, pwlen+1);
546
547         conn = make_connection(service,password_blob,dev,req->vuid,&nt_status);
548         req->conn = conn;
549
550         data_blob_clear_free(&password_blob);
551
552         if (!conn) {
553                 reply_nterror(req, nt_status);
554                 END_PROFILE(SMBtcon);
555                 return;
556         }
557
558         reply_outbuf(req, 2, 0);
559         SSVAL(req->outbuf,smb_vwv0,max_recv);
560         SSVAL(req->outbuf,smb_vwv1,conn->cnum);
561         SSVAL(req->outbuf,smb_tid,conn->cnum);
562
563         DEBUG(3,("tcon service=%s cnum=%d\n",
564                  service, conn->cnum));
565
566         END_PROFILE(SMBtcon);
567         return;
568 }
569
570 /****************************************************************************
571  Reply to a tcon and X.
572  conn POINTER CAN BE NULL HERE !
573 ****************************************************************************/
574
575 void reply_tcon_and_X(struct smb_request *req)
576 {
577         connection_struct *conn = req->conn;
578         const char *service = NULL;
579         DATA_BLOB password;
580         TALLOC_CTX *ctx = talloc_tos();
581         /* what the cleint thinks the device is */
582         char *client_devicetype = NULL;
583         /* what the server tells the client the share represents */
584         const char *server_devicetype;
585         NTSTATUS nt_status;
586         int passlen;
587         char *path = NULL;
588         const char *p, *q;
589         uint16 tcon_flags;
590
591         START_PROFILE(SMBtconX);
592
593         if (req->wct < 4) {
594                 reply_nterror(req, NT_STATUS_INVALID_PARAMETER);
595                 END_PROFILE(SMBtconX);
596                 return;
597         }
598
599         passlen = SVAL(req->vwv+3, 0);
600         tcon_flags = SVAL(req->vwv+2, 0);
601
602         /* we might have to close an old one */
603         if ((tcon_flags & 0x1) && conn) {
604                 close_cnum(conn,req->vuid);
605                 req->conn = NULL;
606                 conn = NULL;
607         }
608
609         if ((passlen > MAX_PASS_LEN) || (passlen >= req->buflen)) {
610                 reply_doserror(req, ERRDOS, ERRbuftoosmall);
611                 END_PROFILE(SMBtconX);
612                 return;
613         }
614
615         if (global_encrypted_passwords_negotiated) {
616                 password = data_blob_talloc(talloc_tos(), req->buf, passlen);
617                 if (lp_security() == SEC_SHARE) {
618                         /*
619                          * Security = share always has a pad byte
620                          * after the password.
621                          */
622                         p = (const char *)req->buf + passlen + 1;
623                 } else {
624                         p = (const char *)req->buf + passlen;
625                 }
626         } else {
627                 password = data_blob_talloc(talloc_tos(), req->buf, passlen+1);
628                 /* Ensure correct termination */
629                 password.data[passlen]=0;
630                 p = (const char *)req->buf + passlen + 1;
631         }
632
633         p += srvstr_pull_req_talloc(ctx, req, &path, p, STR_TERMINATE);
634
635         if (path == NULL) {
636                 data_blob_clear_free(&password);
637                 reply_nterror(req, NT_STATUS_INVALID_PARAMETER);
638                 END_PROFILE(SMBtconX);
639                 return;
640         }
641
642         /*
643          * the service name can be either: \\server\share
644          * or share directly like on the DELL PowerVault 705
645          */
646         if (*path=='\\') {
647                 q = strchr_m(path+2,'\\');
648                 if (!q) {
649                         data_blob_clear_free(&password);
650                         reply_doserror(req, ERRDOS, ERRnosuchshare);
651                         END_PROFILE(SMBtconX);
652                         return;
653                 }
654                 service = q+1;
655         } else {
656                 service = path;
657         }
658
659         p += srvstr_pull_talloc(ctx, req->inbuf, req->flags2,
660                                 &client_devicetype, p,
661                                 MIN(6, smbreq_bufrem(req, p)), STR_ASCII);
662
663         if (client_devicetype == NULL) {
664                 data_blob_clear_free(&password);
665                 reply_nterror(req, NT_STATUS_INVALID_PARAMETER);
666                 END_PROFILE(SMBtconX);
667                 return;
668         }
669
670         DEBUG(4,("Client requested device type [%s] for share [%s]\n", client_devicetype, service));
671
672         conn = make_connection(service, password, client_devicetype,
673                                req->vuid, &nt_status);
674         req->conn =conn;
675
676         data_blob_clear_free(&password);
677
678         if (!conn) {
679                 reply_nterror(req, nt_status);
680                 END_PROFILE(SMBtconX);
681                 return;
682         }
683
684         if ( IS_IPC(conn) )
685                 server_devicetype = "IPC";
686         else if ( IS_PRINT(conn) )
687                 server_devicetype = "LPT1:";
688         else
689                 server_devicetype = "A:";
690
691         if (Protocol < PROTOCOL_NT1) {
692                 reply_outbuf(req, 2, 0);
693                 if (message_push_string(&req->outbuf, server_devicetype,
694                                         STR_TERMINATE|STR_ASCII) == -1) {
695                         reply_nterror(req, NT_STATUS_NO_MEMORY);
696                         END_PROFILE(SMBtconX);
697                         return;
698                 }
699         } else {
700                 /* NT sets the fstype of IPC$ to the null string */
701                 const char *fstype = IS_IPC(conn) ? "" : lp_fstype(SNUM(conn));
702
703                 if (tcon_flags & TCONX_FLAG_EXTENDED_RESPONSE) {
704                         /* Return permissions. */
705                         uint32 perm1 = 0;
706                         uint32 perm2 = 0;
707
708                         reply_outbuf(req, 7, 0);
709
710                         if (IS_IPC(conn)) {
711                                 perm1 = FILE_ALL_ACCESS;
712                                 perm2 = FILE_ALL_ACCESS;
713                         } else {
714                                 perm1 = CAN_WRITE(conn) ?
715                                                 SHARE_ALL_ACCESS :
716                                                 SHARE_READ_ONLY;
717                         }
718
719                         SIVAL(req->outbuf, smb_vwv3, perm1);
720                         SIVAL(req->outbuf, smb_vwv5, perm2);
721                 } else {
722                         reply_outbuf(req, 3, 0);
723                 }
724
725                 if ((message_push_string(&req->outbuf, server_devicetype,
726                                          STR_TERMINATE|STR_ASCII) == -1)
727                     || (message_push_string(&req->outbuf, fstype,
728                                             STR_TERMINATE) == -1)) {
729                         reply_nterror(req, NT_STATUS_NO_MEMORY);
730                         END_PROFILE(SMBtconX);
731                         return;
732                 }
733
734                 /* what does setting this bit do? It is set by NT4 and
735                    may affect the ability to autorun mounted cdroms */
736                 SSVAL(req->outbuf, smb_vwv2, SMB_SUPPORT_SEARCH_BITS|
737                       (lp_csc_policy(SNUM(conn)) << 2));
738
739                 if (lp_msdfs_root(SNUM(conn)) && lp_host_msdfs()) {
740                         DEBUG(2,("Serving %s as a Dfs root\n",
741                                  lp_servicename(SNUM(conn)) ));
742                         SSVAL(req->outbuf, smb_vwv2,
743                               SMB_SHARE_IN_DFS | SVAL(req->outbuf, smb_vwv2));
744                 }
745         }
746
747
748         DEBUG(3,("tconX service=%s \n",
749                  service));
750
751         /* set the incoming and outgoing tid to the just created one */
752         SSVAL(req->inbuf,smb_tid,conn->cnum);
753         SSVAL(req->outbuf,smb_tid,conn->cnum);
754
755         END_PROFILE(SMBtconX);
756
757         chain_reply(req);
758         return;
759 }
760
761 /****************************************************************************
762  Reply to an unknown type.
763 ****************************************************************************/
764
765 void reply_unknown_new(struct smb_request *req, uint8 type)
766 {
767         DEBUG(0, ("unknown command type (%s): type=%d (0x%X)\n",
768                   smb_fn_name(type), type, type));
769         reply_doserror(req, ERRSRV, ERRunknownsmb);
770         return;
771 }
772
773 /****************************************************************************
774  Reply to an ioctl.
775  conn POINTER CAN BE NULL HERE !
776 ****************************************************************************/
777
778 void reply_ioctl(struct smb_request *req)
779 {
780         connection_struct *conn = req->conn;
781         uint16 device;
782         uint16 function;
783         uint32 ioctl_code;
784         int replysize;
785         char *p;
786
787         START_PROFILE(SMBioctl);
788
789         if (req->wct < 3) {
790                 reply_nterror(req, NT_STATUS_INVALID_PARAMETER);
791                 END_PROFILE(SMBioctl);
792                 return;
793         }
794
795         device     = SVAL(req->vwv+1, 0);
796         function   = SVAL(req->vwv+2, 0);
797         ioctl_code = (device << 16) + function;
798
799         DEBUG(4, ("Received IOCTL (code 0x%x)\n", ioctl_code));
800
801         switch (ioctl_code) {
802             case IOCTL_QUERY_JOB_INFO:
803                     replysize = 32;
804                     break;
805             default:
806                     reply_doserror(req, ERRSRV, ERRnosupport);
807                     END_PROFILE(SMBioctl);
808                     return;
809         }
810
811         reply_outbuf(req, 8, replysize+1);
812         SSVAL(req->outbuf,smb_vwv1,replysize); /* Total data bytes returned */
813         SSVAL(req->outbuf,smb_vwv5,replysize); /* Data bytes this buffer */
814         SSVAL(req->outbuf,smb_vwv6,52);        /* Offset to data */
815         p = smb_buf(req->outbuf);
816         memset(p, '\0', replysize+1); /* valgrind-safe. */
817         p += 1;          /* Allow for alignment */
818
819         switch (ioctl_code) {
820                 case IOCTL_QUERY_JOB_INFO:                  
821                 {
822                         files_struct *fsp = file_fsp(
823                                 req, SVAL(req->vwv+0, 0));
824                         if (!fsp) {
825                                 reply_doserror(req, ERRDOS, ERRbadfid);
826                                 END_PROFILE(SMBioctl);
827                                 return;
828                         }
829                         SSVAL(p,0,fsp->rap_print_jobid);             /* Job number */
830                         srvstr_push((char *)req->outbuf, req->flags2, p+2,
831                                     global_myname(), 15,
832                                     STR_TERMINATE|STR_ASCII);
833                         if (conn) {
834                                 srvstr_push((char *)req->outbuf, req->flags2,
835                                             p+18, lp_servicename(SNUM(conn)),
836                                             13, STR_TERMINATE|STR_ASCII);
837                         } else {
838                                 memset(p+18, 0, 13);
839                         }
840                         break;
841                 }
842         }
843
844         END_PROFILE(SMBioctl);
845         return;
846 }
847
848 /****************************************************************************
849  Strange checkpath NTSTATUS mapping.
850 ****************************************************************************/
851
852 static NTSTATUS map_checkpath_error(uint16_t flags2, NTSTATUS status)
853 {
854         /* Strange DOS error code semantics only for checkpath... */
855         if (!(flags2 & FLAGS2_32_BIT_ERROR_CODES)) {
856                 if (NT_STATUS_EQUAL(NT_STATUS_OBJECT_NAME_INVALID,status)) {
857                         /* We need to map to ERRbadpath */
858                         return NT_STATUS_OBJECT_PATH_NOT_FOUND;
859                 }
860         }
861         return status;
862 }
863
864 /****************************************************************************
865  Reply to a checkpath.
866 ****************************************************************************/
867
868 void reply_checkpath(struct smb_request *req)
869 {
870         connection_struct *conn = req->conn;
871         char *name = NULL;
872         SMB_STRUCT_STAT sbuf;
873         NTSTATUS status;
874         TALLOC_CTX *ctx = talloc_tos();
875
876         START_PROFILE(SMBcheckpath);
877
878         srvstr_get_path_req(ctx, req, &name, (const char *)req->buf + 1,
879                             STR_TERMINATE, &status);
880
881         if (!NT_STATUS_IS_OK(status)) {
882                 status = map_checkpath_error(req->flags2, status);
883                 reply_nterror(req, status);
884                 END_PROFILE(SMBcheckpath);
885                 return;
886         }
887
888         status = resolve_dfspath(ctx, conn,
889                         req->flags2 & FLAGS2_DFS_PATHNAMES,
890                         name,
891                         &name);
892         if (!NT_STATUS_IS_OK(status)) {
893                 if (NT_STATUS_EQUAL(status,NT_STATUS_PATH_NOT_COVERED)) {
894                         reply_botherror(req, NT_STATUS_PATH_NOT_COVERED,
895                                         ERRSRV, ERRbadpath);
896                         END_PROFILE(SMBcheckpath);
897                         return;
898                 }
899                 goto path_err;
900         }
901
902         DEBUG(3,("reply_checkpath %s mode=%d\n", name, (int)SVAL(req->vwv+0, 0)));
903
904         status = unix_convert(ctx, conn, name, False, &name, NULL, &sbuf);
905         if (!NT_STATUS_IS_OK(status)) {
906                 goto path_err;
907         }
908
909         status = check_name(conn, name);
910         if (!NT_STATUS_IS_OK(status)) {
911                 DEBUG(3,("reply_checkpath: check_name of %s failed (%s)\n",name,nt_errstr(status)));
912                 goto path_err;
913         }
914
915         if (!VALID_STAT(sbuf) && (SMB_VFS_STAT(conn,name,&sbuf) != 0)) {
916                 DEBUG(3,("reply_checkpath: stat of %s failed (%s)\n",name,strerror(errno)));
917                 status = map_nt_error_from_unix(errno);
918                 goto path_err;
919         }
920
921         if (!S_ISDIR(sbuf.st_mode)) {
922                 reply_botherror(req, NT_STATUS_NOT_A_DIRECTORY,
923                                 ERRDOS, ERRbadpath);
924                 END_PROFILE(SMBcheckpath);
925                 return;
926         }
927
928         reply_outbuf(req, 0, 0);
929
930         END_PROFILE(SMBcheckpath);
931         return;
932
933   path_err:
934
935         END_PROFILE(SMBcheckpath);
936
937         /* We special case this - as when a Windows machine
938                 is parsing a path is steps through the components
939                 one at a time - if a component fails it expects
940                 ERRbadpath, not ERRbadfile.
941         */
942         status = map_checkpath_error(req->flags2, status);
943         if (NT_STATUS_EQUAL(status, NT_STATUS_OBJECT_NAME_NOT_FOUND)) {
944                 /*
945                  * Windows returns different error codes if
946                  * the parent directory is valid but not the
947                  * last component - it returns NT_STATUS_OBJECT_NAME_NOT_FOUND
948                  * for that case and NT_STATUS_OBJECT_PATH_NOT_FOUND
949                  * if the path is invalid.
950                  */
951                 reply_botherror(req, NT_STATUS_OBJECT_NAME_NOT_FOUND,
952                                 ERRDOS, ERRbadpath);
953                 return;
954         }
955
956         reply_nterror(req, status);
957 }
958
959 /****************************************************************************
960  Reply to a getatr.
961 ****************************************************************************/
962
963 void reply_getatr(struct smb_request *req)
964 {
965         connection_struct *conn = req->conn;
966         char *fname = NULL;
967         SMB_STRUCT_STAT sbuf;
968         int mode=0;
969         SMB_OFF_T size=0;
970         time_t mtime=0;
971         const char *p;
972         NTSTATUS status;
973         TALLOC_CTX *ctx = talloc_tos();
974
975         START_PROFILE(SMBgetatr);
976
977         p = (const char *)req->buf + 1;
978         p += srvstr_get_path_req(ctx, req, &fname, p, STR_TERMINATE, &status);
979         if (!NT_STATUS_IS_OK(status)) {
980                 reply_nterror(req, status);
981                 END_PROFILE(SMBgetatr);
982                 return;
983         }
984
985         status = resolve_dfspath(ctx, conn,
986                                 req->flags2 & FLAGS2_DFS_PATHNAMES,
987                                 fname,
988                                 &fname);
989         if (!NT_STATUS_IS_OK(status)) {
990                 if (NT_STATUS_EQUAL(status,NT_STATUS_PATH_NOT_COVERED)) {
991                         reply_botherror(req, NT_STATUS_PATH_NOT_COVERED,
992                                         ERRSRV, ERRbadpath);
993                         END_PROFILE(SMBgetatr);
994                         return;
995                 }
996                 reply_nterror(req, status);
997                 END_PROFILE(SMBgetatr);
998                 return;
999         }
1000
1001         /* dos smetimes asks for a stat of "" - it returns a "hidden directory"
1002                 under WfWg - weird! */
1003         if (*fname == '\0') {
1004                 mode = aHIDDEN | aDIR;
1005                 if (!CAN_WRITE(conn)) {
1006                         mode |= aRONLY;
1007                 }
1008                 size = 0;
1009                 mtime = 0;
1010         } else {
1011                 status = unix_convert(ctx, conn, fname, False, &fname, NULL,&sbuf);
1012                 if (!NT_STATUS_IS_OK(status)) {
1013                         reply_nterror(req, status);
1014                         END_PROFILE(SMBgetatr);
1015                         return;
1016                 }
1017                 status = check_name(conn, fname);
1018                 if (!NT_STATUS_IS_OK(status)) {
1019                         DEBUG(3,("reply_getatr: check_name of %s failed (%s)\n",fname,nt_errstr(status)));
1020                         reply_nterror(req, status);
1021                         END_PROFILE(SMBgetatr);
1022                         return;
1023                 }
1024                 if (!VALID_STAT(sbuf) && (SMB_VFS_STAT(conn,fname,&sbuf) != 0)) {
1025                         DEBUG(3,("reply_getatr: stat of %s failed (%s)\n",fname,strerror(errno)));
1026                         reply_unixerror(req, ERRDOS,ERRbadfile);
1027                         END_PROFILE(SMBgetatr);
1028                         return;
1029                 }
1030
1031                 mode = dos_mode(conn,fname,&sbuf);
1032                 size = sbuf.st_size;
1033                 mtime = sbuf.st_mtime;
1034                 if (mode & aDIR) {
1035                         size = 0;
1036                 }
1037         }
1038
1039         reply_outbuf(req, 10, 0);
1040
1041         SSVAL(req->outbuf,smb_vwv0,mode);
1042         if(lp_dos_filetime_resolution(SNUM(conn)) ) {
1043                 srv_put_dos_date3((char *)req->outbuf,smb_vwv1,mtime & ~1);
1044         } else {
1045                 srv_put_dos_date3((char *)req->outbuf,smb_vwv1,mtime);
1046         }
1047         SIVAL(req->outbuf,smb_vwv3,(uint32)size);
1048
1049         if (Protocol >= PROTOCOL_NT1) {
1050                 SSVAL(req->outbuf, smb_flg2,
1051                       SVAL(req->outbuf, smb_flg2) | FLAGS2_IS_LONG_NAME);
1052         }
1053
1054         DEBUG(3,("reply_getatr: name=%s mode=%d size=%u\n", fname, mode, (unsigned int)size ) );
1055
1056         END_PROFILE(SMBgetatr);
1057         return;
1058 }
1059
1060 /****************************************************************************
1061  Reply to a setatr.
1062 ****************************************************************************/
1063
1064 void reply_setatr(struct smb_request *req)
1065 {
1066         struct timespec ts[2];
1067         connection_struct *conn = req->conn;
1068         char *fname = NULL;
1069         int mode;
1070         time_t mtime;
1071         SMB_STRUCT_STAT sbuf;
1072         const char *p;
1073         NTSTATUS status;
1074         TALLOC_CTX *ctx = talloc_tos();
1075
1076         START_PROFILE(SMBsetatr);
1077
1078         ZERO_STRUCT(ts);
1079
1080         if (req->wct < 2) {
1081                 reply_nterror(req, NT_STATUS_INVALID_PARAMETER);
1082                 return;
1083         }
1084
1085         p = (const char *)req->buf + 1;
1086         p += srvstr_get_path_req(ctx, req, &fname, p, STR_TERMINATE, &status);
1087         if (!NT_STATUS_IS_OK(status)) {
1088                 reply_nterror(req, status);
1089                 END_PROFILE(SMBsetatr);
1090                 return;
1091         }
1092
1093         status = resolve_dfspath(ctx, conn,
1094                                 req->flags2 & FLAGS2_DFS_PATHNAMES,
1095                                 fname,
1096                                 &fname);
1097         if (!NT_STATUS_IS_OK(status)) {
1098                 if (NT_STATUS_EQUAL(status,NT_STATUS_PATH_NOT_COVERED)) {
1099                         reply_botherror(req, NT_STATUS_PATH_NOT_COVERED,
1100                                         ERRSRV, ERRbadpath);
1101                         END_PROFILE(SMBsetatr);
1102                         return;
1103                 }
1104                 reply_nterror(req, status);
1105                 END_PROFILE(SMBsetatr);
1106                 return;
1107         }
1108
1109         status = unix_convert(ctx, conn, fname, False, &fname, NULL, &sbuf);
1110         if (!NT_STATUS_IS_OK(status)) {
1111                 reply_nterror(req, status);
1112                 END_PROFILE(SMBsetatr);
1113                 return;
1114         }
1115
1116         status = check_name(conn, fname);
1117         if (!NT_STATUS_IS_OK(status)) {
1118                 reply_nterror(req, status);
1119                 END_PROFILE(SMBsetatr);
1120                 return;
1121         }
1122
1123         if (fname[0] == '.' && fname[1] == '\0') {
1124                 /*
1125                  * Not sure here is the right place to catch this
1126                  * condition. Might be moved to somewhere else later -- vl
1127                  */
1128                 reply_nterror(req, NT_STATUS_ACCESS_DENIED);
1129                 END_PROFILE(SMBsetatr);
1130                 return;
1131         }
1132
1133         mode = SVAL(req->vwv+0, 0);
1134         mtime = srv_make_unix_date3(req->vwv+1);
1135
1136         ts[1] = convert_time_t_to_timespec(mtime);
1137         status = smb_set_file_time(conn, NULL, fname,
1138                                    &sbuf, ts, true);
1139         if (!NT_STATUS_IS_OK(status)) {
1140                 reply_unixerror(req, ERRDOS, ERRnoaccess);
1141                 END_PROFILE(SMBsetatr);
1142                 return;
1143         }
1144
1145         if (mode != FILE_ATTRIBUTE_NORMAL) {
1146                 if (VALID_STAT_OF_DIR(sbuf))
1147                         mode |= aDIR;
1148                 else
1149                         mode &= ~aDIR;
1150
1151                 if (file_set_dosmode(conn,fname,mode,&sbuf,NULL,false) != 0) {
1152                         reply_unixerror(req, ERRDOS, ERRnoaccess);
1153                         END_PROFILE(SMBsetatr);
1154                         return;
1155                 }
1156         }
1157
1158         reply_outbuf(req, 0, 0);
1159
1160         DEBUG( 3, ( "setatr name=%s mode=%d\n", fname, mode ) );
1161
1162         END_PROFILE(SMBsetatr);
1163         return;
1164 }
1165
1166 /****************************************************************************
1167  Reply to a dskattr.
1168 ****************************************************************************/
1169
1170 void reply_dskattr(struct smb_request *req)
1171 {
1172         connection_struct *conn = req->conn;
1173         uint64_t dfree,dsize,bsize;
1174         START_PROFILE(SMBdskattr);
1175
1176         if (get_dfree_info(conn,".",True,&bsize,&dfree,&dsize) == (uint64_t)-1) {
1177                 reply_unixerror(req, ERRHRD, ERRgeneral);
1178                 END_PROFILE(SMBdskattr);
1179                 return;
1180         }
1181
1182         reply_outbuf(req, 5, 0);
1183
1184         if (Protocol <= PROTOCOL_LANMAN2) {
1185                 double total_space, free_space;
1186                 /* we need to scale this to a number that DOS6 can handle. We
1187                    use floating point so we can handle large drives on systems
1188                    that don't have 64 bit integers 
1189
1190                    we end up displaying a maximum of 2G to DOS systems
1191                 */
1192                 total_space = dsize * (double)bsize;
1193                 free_space = dfree * (double)bsize;
1194
1195                 dsize = (uint64_t)((total_space+63*512) / (64*512));
1196                 dfree = (uint64_t)((free_space+63*512) / (64*512));
1197
1198                 if (dsize > 0xFFFF) dsize = 0xFFFF;
1199                 if (dfree > 0xFFFF) dfree = 0xFFFF;
1200
1201                 SSVAL(req->outbuf,smb_vwv0,dsize);
1202                 SSVAL(req->outbuf,smb_vwv1,64); /* this must be 64 for dos systems */
1203                 SSVAL(req->outbuf,smb_vwv2,512); /* and this must be 512 */
1204                 SSVAL(req->outbuf,smb_vwv3,dfree);
1205         } else {
1206                 SSVAL(req->outbuf,smb_vwv0,dsize);
1207                 SSVAL(req->outbuf,smb_vwv1,bsize/512);
1208                 SSVAL(req->outbuf,smb_vwv2,512);
1209                 SSVAL(req->outbuf,smb_vwv3,dfree);
1210         }
1211
1212         DEBUG(3,("dskattr dfree=%d\n", (unsigned int)dfree));
1213
1214         END_PROFILE(SMBdskattr);
1215         return;
1216 }
1217
1218 /****************************************************************************
1219  Reply to a search.
1220  Can be called from SMBsearch, SMBffirst or SMBfunique.
1221 ****************************************************************************/
1222
1223 void reply_search(struct smb_request *req)
1224 {
1225         connection_struct *conn = req->conn;
1226         const char *mask = NULL;
1227         char *directory = NULL;
1228         char *fname = NULL;
1229         SMB_OFF_T size;
1230         uint32 mode;
1231         time_t date;
1232         uint32 dirtype;
1233         unsigned int numentries = 0;
1234         unsigned int maxentries = 0;
1235         bool finished = False;
1236         const char *p;
1237         int status_len;
1238         char *path = NULL;
1239         char status[21];
1240         int dptr_num= -1;
1241         bool check_descend = False;
1242         bool expect_close = False;
1243         NTSTATUS nt_status;
1244         bool mask_contains_wcard = False;
1245         bool allow_long_path_components = (req->flags2 & FLAGS2_LONG_PATH_COMPONENTS) ? True : False;
1246         TALLOC_CTX *ctx = talloc_tos();
1247         bool ask_sharemode = lp_parm_bool(SNUM(conn), "smbd", "search ask sharemode", true);
1248
1249         START_PROFILE(SMBsearch);
1250
1251         if (req->wct < 2) {
1252                 reply_nterror(req, NT_STATUS_INVALID_PARAMETER);
1253                 END_PROFILE(SMBsearch);
1254                 return;
1255         }
1256
1257         if (lp_posix_pathnames()) {
1258                 reply_unknown_new(req, req->cmd);
1259                 END_PROFILE(SMBsearch);
1260                 return;
1261         }
1262
1263         /* If we were called as SMBffirst then we must expect close. */
1264         if(req->cmd == SMBffirst) {
1265                 expect_close = True;
1266         }
1267
1268         reply_outbuf(req, 1, 3);
1269         maxentries = SVAL(req->vwv+0, 0);
1270         dirtype = SVAL(req->vwv+1, 0);
1271         p = (const char *)req->buf + 1;
1272         p += srvstr_get_path_req_wcard(ctx, req, &path, p, STR_TERMINATE,
1273                                        &nt_status, &mask_contains_wcard);
1274         if (!NT_STATUS_IS_OK(nt_status)) {
1275                 reply_nterror(req, nt_status);
1276                 END_PROFILE(SMBsearch);
1277                 return;
1278         }
1279
1280         nt_status = resolve_dfspath_wcard(ctx, conn,
1281                                           req->flags2 & FLAGS2_DFS_PATHNAMES,
1282                                           path,
1283                                           &path,
1284                                           &mask_contains_wcard);
1285         if (!NT_STATUS_IS_OK(nt_status)) {
1286                 if (NT_STATUS_EQUAL(nt_status,NT_STATUS_PATH_NOT_COVERED)) {
1287                         reply_botherror(req, NT_STATUS_PATH_NOT_COVERED,
1288                                         ERRSRV, ERRbadpath);
1289                         END_PROFILE(SMBsearch);
1290                         return;
1291                 }
1292                 reply_nterror(req, nt_status);
1293                 END_PROFILE(SMBsearch);
1294                 return;
1295         }
1296
1297         p++;
1298         status_len = SVAL(p, 0);
1299         p += 2;
1300
1301         /* dirtype &= ~aDIR; */
1302
1303         if (status_len == 0) {
1304                 SMB_STRUCT_STAT sbuf;
1305
1306                 nt_status = unix_convert(ctx, conn, path, True,
1307                                 &directory, NULL, &sbuf);
1308                 if (!NT_STATUS_IS_OK(nt_status)) {
1309                         reply_nterror(req, nt_status);
1310                         END_PROFILE(SMBsearch);
1311                         return;
1312                 }
1313
1314                 nt_status = check_name(conn, directory);
1315                 if (!NT_STATUS_IS_OK(nt_status)) {
1316                         reply_nterror(req, nt_status);
1317                         END_PROFILE(SMBsearch);
1318                         return;
1319                 }
1320
1321                 p = strrchr_m(directory,'/');
1322                 if ((p != NULL) && (*directory != '/')) {
1323                         mask = p + 1;
1324                         directory = talloc_strndup(ctx, directory,
1325                                                    PTR_DIFF(p, directory));
1326                 } else {
1327                         mask = directory;
1328                         directory = talloc_strdup(ctx,".");
1329                 }
1330
1331                 if (!directory) {
1332                         reply_nterror(req, NT_STATUS_NO_MEMORY);
1333                         END_PROFILE(SMBsearch);
1334                         return;
1335                 }
1336
1337                 memset((char *)status,'\0',21);
1338                 SCVAL(status,0,(dirtype & 0x1F));
1339
1340                 nt_status = dptr_create(conn,
1341                                         directory,
1342                                         True,
1343                                         expect_close,
1344                                         req->smbpid,
1345                                         mask,
1346                                         mask_contains_wcard,
1347                                         dirtype,
1348                                         &conn->dirptr);
1349                 if (!NT_STATUS_IS_OK(nt_status)) {
1350                         reply_nterror(req, nt_status);
1351                         END_PROFILE(SMBsearch);
1352                         return;
1353                 }
1354                 dptr_num = dptr_dnum(conn->dirptr);
1355         } else {
1356                 int status_dirtype;
1357
1358                 memcpy(status,p,21);
1359                 status_dirtype = CVAL(status,0) & 0x1F;
1360                 if (status_dirtype != (dirtype & 0x1F)) {
1361                         dirtype = status_dirtype;
1362                 }
1363
1364                 conn->dirptr = dptr_fetch(status+12,&dptr_num);
1365                 if (!conn->dirptr) {
1366                         goto SearchEmpty;
1367                 }
1368                 string_set(&conn->dirpath,dptr_path(dptr_num));
1369                 mask = dptr_wcard(dptr_num);
1370                 if (!mask) {
1371                         goto SearchEmpty;
1372                 }
1373                 /*
1374                  * For a 'continue' search we have no string. So
1375                  * check from the initial saved string.
1376                  */
1377                 mask_contains_wcard = ms_has_wild(mask);
1378                 dirtype = dptr_attr(dptr_num);
1379         }
1380
1381         DEBUG(4,("dptr_num is %d\n",dptr_num));
1382
1383         if ((dirtype&0x1F) == aVOLID) {
1384                 char buf[DIR_STRUCT_SIZE];
1385                 memcpy(buf,status,21);
1386                 if (!make_dir_struct(ctx,buf,"???????????",volume_label(SNUM(conn)),
1387                                 0,aVOLID,0,!allow_long_path_components)) {
1388                         reply_nterror(req, NT_STATUS_NO_MEMORY);
1389                         END_PROFILE(SMBsearch);
1390                         return;
1391                 }
1392                 dptr_fill(buf+12,dptr_num);
1393                 if (dptr_zero(buf+12) && (status_len==0)) {
1394                         numentries = 1;
1395                 } else {
1396                         numentries = 0;
1397                 }
1398                 if (message_push_blob(&req->outbuf,
1399                                       data_blob_const(buf, sizeof(buf)))
1400                     == -1) {
1401                         reply_nterror(req, NT_STATUS_NO_MEMORY);
1402                         END_PROFILE(SMBsearch);
1403                         return;
1404                 }
1405         } else {
1406                 unsigned int i;
1407                 maxentries = MIN(
1408                         maxentries,
1409                         ((BUFFER_SIZE -
1410                           ((uint8 *)smb_buf(req->outbuf) + 3 - req->outbuf))
1411                          /DIR_STRUCT_SIZE));
1412
1413                 DEBUG(8,("dirpath=<%s> dontdescend=<%s>\n",
1414                         conn->dirpath,lp_dontdescend(SNUM(conn))));
1415                 if (in_list(conn->dirpath, lp_dontdescend(SNUM(conn)),True)) {
1416                         check_descend = True;
1417                 }
1418
1419                 for (i=numentries;(i<maxentries) && !finished;i++) {
1420                         finished = !get_dir_entry(ctx,
1421                                                   conn,
1422                                                   mask,
1423                                                   dirtype,
1424                                                   &fname,
1425                                                   &size,
1426                                                   &mode,
1427                                                   &date,
1428                                                   check_descend,
1429                                                   ask_sharemode);
1430                         if (!finished) {
1431                                 char buf[DIR_STRUCT_SIZE];
1432                                 memcpy(buf,status,21);
1433                                 if (!make_dir_struct(ctx,
1434                                                 buf,
1435                                                 mask,
1436                                                 fname,
1437                                                 size,
1438                                                 mode,
1439                                                 date,
1440                                                 !allow_long_path_components)) {
1441                                         reply_nterror(req, NT_STATUS_NO_MEMORY);
1442                                         END_PROFILE(SMBsearch);
1443                                         return;
1444                                 }
1445                                 if (!dptr_fill(buf+12,dptr_num)) {
1446                                         break;
1447                                 }
1448                                 if (message_push_blob(&req->outbuf,
1449                                                       data_blob_const(buf, sizeof(buf)))
1450                                     == -1) {
1451                                         reply_nterror(req, NT_STATUS_NO_MEMORY);
1452                                         END_PROFILE(SMBsearch);
1453                                         return;
1454                                 }
1455                                 numentries++;
1456                         }
1457                 }
1458         }
1459
1460   SearchEmpty:
1461
1462         /* If we were called as SMBffirst with smb_search_id == NULL
1463                 and no entries were found then return error and close dirptr 
1464                 (X/Open spec) */
1465
1466         if (numentries == 0) {
1467                 dptr_close(&dptr_num);
1468         } else if(expect_close && status_len == 0) {
1469                 /* Close the dptr - we know it's gone */
1470                 dptr_close(&dptr_num);
1471         }
1472
1473         /* If we were called as SMBfunique, then we can close the dirptr now ! */
1474         if(dptr_num >= 0 && req->cmd == SMBfunique) {
1475                 dptr_close(&dptr_num);
1476         }
1477
1478         if ((numentries == 0) && !mask_contains_wcard) {
1479                 reply_botherror(req, STATUS_NO_MORE_FILES, ERRDOS, ERRnofiles);
1480                 END_PROFILE(SMBsearch);
1481                 return;
1482         }
1483
1484         SSVAL(req->outbuf,smb_vwv0,numentries);
1485         SSVAL(req->outbuf,smb_vwv1,3 + numentries * DIR_STRUCT_SIZE);
1486         SCVAL(smb_buf(req->outbuf),0,5);
1487         SSVAL(smb_buf(req->outbuf),1,numentries*DIR_STRUCT_SIZE);
1488
1489         /* The replies here are never long name. */
1490         SSVAL(req->outbuf, smb_flg2,
1491               SVAL(req->outbuf, smb_flg2) & (~FLAGS2_IS_LONG_NAME));
1492         if (!allow_long_path_components) {
1493                 SSVAL(req->outbuf, smb_flg2,
1494                       SVAL(req->outbuf, smb_flg2)
1495                       & (~FLAGS2_LONG_PATH_COMPONENTS));
1496         }
1497
1498         /* This SMB *always* returns ASCII names. Remove the unicode bit in flags2. */
1499         SSVAL(req->outbuf, smb_flg2,
1500               (SVAL(req->outbuf, smb_flg2) & (~FLAGS2_UNICODE_STRINGS)));
1501
1502         if (!directory) {
1503                 directory = dptr_path(dptr_num);
1504         }
1505
1506         DEBUG(4,("%s mask=%s path=%s dtype=%d nument=%u of %u\n",
1507                 smb_fn_name(req->cmd),
1508                 mask,
1509                 directory ? directory : "./",
1510                 dirtype,
1511                 numentries,
1512                 maxentries ));
1513
1514         END_PROFILE(SMBsearch);
1515         return;
1516 }
1517
1518 /****************************************************************************
1519  Reply to a fclose (stop directory search).
1520 ****************************************************************************/
1521
1522 void reply_fclose(struct smb_request *req)
1523 {
1524         int status_len;
1525         char status[21];
1526         int dptr_num= -2;
1527         const char *p;
1528         char *path = NULL;
1529         NTSTATUS err;
1530         bool path_contains_wcard = False;
1531         TALLOC_CTX *ctx = talloc_tos();
1532
1533         START_PROFILE(SMBfclose);
1534
1535         if (lp_posix_pathnames()) {
1536                 reply_unknown_new(req, req->cmd);
1537                 END_PROFILE(SMBfclose);
1538                 return;
1539         }
1540
1541         p = (const char *)req->buf + 1;
1542         p += srvstr_get_path_req_wcard(ctx, req, &path, p, STR_TERMINATE,
1543                                        &err, &path_contains_wcard);
1544         if (!NT_STATUS_IS_OK(err)) {
1545                 reply_nterror(req, err);
1546                 END_PROFILE(SMBfclose);
1547                 return;
1548         }
1549         p++;
1550         status_len = SVAL(p,0);
1551         p += 2;
1552
1553         if (status_len == 0) {
1554                 reply_doserror(req, ERRSRV, ERRsrverror);
1555                 END_PROFILE(SMBfclose);
1556                 return;
1557         }
1558
1559         memcpy(status,p,21);
1560
1561         if(dptr_fetch(status+12,&dptr_num)) {
1562                 /*  Close the dptr - we know it's gone */
1563                 dptr_close(&dptr_num);
1564         }
1565
1566         reply_outbuf(req, 1, 0);
1567         SSVAL(req->outbuf,smb_vwv0,0);
1568
1569         DEBUG(3,("search close\n"));
1570
1571         END_PROFILE(SMBfclose);
1572         return;
1573 }
1574
1575 /****************************************************************************
1576  Reply to an open.
1577 ****************************************************************************/
1578
1579 void reply_open(struct smb_request *req)
1580 {
1581         connection_struct *conn = req->conn;
1582         char *fname = NULL;
1583         uint32 fattr=0;
1584         SMB_OFF_T size = 0;
1585         time_t mtime=0;
1586         int info;
1587         SMB_STRUCT_STAT sbuf;
1588         files_struct *fsp;
1589         int oplock_request;
1590         int deny_mode;
1591         uint32 dos_attr;
1592         uint32 access_mask;
1593         uint32 share_mode;
1594         uint32 create_disposition;
1595         uint32 create_options = 0;
1596         NTSTATUS status;
1597         TALLOC_CTX *ctx = talloc_tos();
1598
1599         START_PROFILE(SMBopen);
1600
1601         if (req->wct < 2) {
1602                 reply_nterror(req, NT_STATUS_INVALID_PARAMETER);
1603                 END_PROFILE(SMBopen);
1604                 return;
1605         }
1606
1607         oplock_request = CORE_OPLOCK_REQUEST(req->inbuf);
1608         deny_mode = SVAL(req->vwv+0, 0);
1609         dos_attr = SVAL(req->vwv+1, 0);
1610
1611         srvstr_get_path_req(ctx, req, &fname, (const char *)req->buf+1,
1612                             STR_TERMINATE, &status);
1613         if (!NT_STATUS_IS_OK(status)) {
1614                 reply_nterror(req, status);
1615                 END_PROFILE(SMBopen);
1616                 return;
1617         }
1618
1619         if (!map_open_params_to_ntcreate(
1620                     fname, deny_mode, OPENX_FILE_EXISTS_OPEN, &access_mask,
1621                     &share_mode, &create_disposition, &create_options)) {
1622                 reply_nterror(req, NT_STATUS_DOS(ERRDOS, ERRbadaccess));
1623                 END_PROFILE(SMBopen);
1624                 return;
1625         }
1626
1627         status = SMB_VFS_CREATE_FILE(
1628                 conn,                                   /* conn */
1629                 req,                                    /* req */
1630                 0,                                      /* root_dir_fid */
1631                 fname,                                  /* fname */
1632                 CFF_DOS_PATH,                           /* create_file_flags */
1633                 access_mask,                            /* access_mask */
1634                 share_mode,                             /* share_access */
1635                 create_disposition,                     /* create_disposition*/
1636                 create_options,                         /* create_options */
1637                 dos_attr,                               /* file_attributes */
1638                 oplock_request,                         /* oplock_request */
1639                 0,                                      /* allocation_size */
1640                 NULL,                                   /* sd */
1641                 NULL,                                   /* ea_list */
1642                 &fsp,                                   /* result */
1643                 &info,                                  /* pinfo */
1644                 &sbuf);                                 /* psbuf */
1645
1646         if (!NT_STATUS_IS_OK(status)) {
1647                 if (open_was_deferred(req->mid)) {
1648                         /* We have re-scheduled this call. */
1649                         END_PROFILE(SMBopen);
1650                         return;
1651                 }
1652                 reply_openerror(req, status);
1653                 END_PROFILE(SMBopen);
1654                 return;
1655         }
1656
1657         size = sbuf.st_size;
1658         fattr = dos_mode(conn,fsp->fsp_name,&sbuf);
1659         mtime = sbuf.st_mtime;
1660
1661         if (fattr & aDIR) {
1662                 DEBUG(3,("attempt to open a directory %s\n",fsp->fsp_name));
1663                 close_file(req, fsp, ERROR_CLOSE);
1664                 reply_doserror(req, ERRDOS,ERRnoaccess);
1665                 END_PROFILE(SMBopen);
1666                 return;
1667         }
1668
1669         reply_outbuf(req, 7, 0);
1670         SSVAL(req->outbuf,smb_vwv0,fsp->fnum);
1671         SSVAL(req->outbuf,smb_vwv1,fattr);
1672         if(lp_dos_filetime_resolution(SNUM(conn)) ) {
1673                 srv_put_dos_date3((char *)req->outbuf,smb_vwv2,mtime & ~1);
1674         } else {
1675                 srv_put_dos_date3((char *)req->outbuf,smb_vwv2,mtime);
1676         }
1677         SIVAL(req->outbuf,smb_vwv4,(uint32)size);
1678         SSVAL(req->outbuf,smb_vwv6,deny_mode);
1679
1680         if (oplock_request && lp_fake_oplocks(SNUM(conn))) {
1681                 SCVAL(req->outbuf,smb_flg,
1682                       CVAL(req->outbuf,smb_flg)|CORE_OPLOCK_GRANTED);
1683         }
1684
1685         if(EXCLUSIVE_OPLOCK_TYPE(fsp->oplock_type)) {
1686                 SCVAL(req->outbuf,smb_flg,
1687                       CVAL(req->outbuf,smb_flg)|CORE_OPLOCK_GRANTED);
1688         }
1689         END_PROFILE(SMBopen);
1690         return;
1691 }
1692
1693 /****************************************************************************
1694  Reply to an open and X.
1695 ****************************************************************************/
1696
1697 void reply_open_and_X(struct smb_request *req)
1698 {
1699         connection_struct *conn = req->conn;
1700         char *fname = NULL;
1701         uint16 open_flags;
1702         int deny_mode;
1703         uint32 smb_attr;
1704         /* Breakout the oplock request bits so we can set the
1705                 reply bits separately. */
1706         int ex_oplock_request;
1707         int core_oplock_request;
1708         int oplock_request;
1709 #if 0
1710         int smb_sattr = SVAL(req->vwv+4, 0);
1711         uint32 smb_time = make_unix_date3(req->vwv+6);
1712 #endif
1713         int smb_ofun;
1714         uint32 fattr=0;
1715         int mtime=0;
1716         SMB_STRUCT_STAT sbuf;
1717         int smb_action = 0;
1718         files_struct *fsp;
1719         NTSTATUS status;
1720         uint64_t allocation_size;
1721         ssize_t retval = -1;
1722         uint32 access_mask;
1723         uint32 share_mode;
1724         uint32 create_disposition;
1725         uint32 create_options = 0;
1726         TALLOC_CTX *ctx = talloc_tos();
1727
1728         START_PROFILE(SMBopenX);
1729
1730         if (req->wct < 15) {
1731                 reply_nterror(req, NT_STATUS_INVALID_PARAMETER);
1732                 END_PROFILE(SMBopenX);
1733                 return;
1734         }
1735
1736         open_flags = SVAL(req->vwv+2, 0);
1737         deny_mode = SVAL(req->vwv+3, 0);
1738         smb_attr = SVAL(req->vwv+5, 0);
1739         ex_oplock_request = EXTENDED_OPLOCK_REQUEST(req->inbuf);
1740         core_oplock_request = CORE_OPLOCK_REQUEST(req->inbuf);
1741         oplock_request = ex_oplock_request | core_oplock_request;
1742         smb_ofun = SVAL(req->vwv+8, 0);
1743         allocation_size = (uint64_t)IVAL(req->vwv+9, 0);
1744
1745         /* If it's an IPC, pass off the pipe handler. */
1746         if (IS_IPC(conn)) {
1747                 if (lp_nt_pipe_support()) {
1748                         reply_open_pipe_and_X(conn, req);
1749                 } else {
1750                         reply_doserror(req, ERRSRV, ERRaccess);
1751                 }
1752                 END_PROFILE(SMBopenX);
1753                 return;
1754         }
1755
1756         /* XXXX we need to handle passed times, sattr and flags */
1757         srvstr_get_path_req(ctx, req, &fname, (const char *)req->buf,
1758                         STR_TERMINATE, &status);
1759         if (!NT_STATUS_IS_OK(status)) {
1760                 reply_nterror(req, status);
1761                 END_PROFILE(SMBopenX);
1762                 return;
1763         }
1764
1765         if (!map_open_params_to_ntcreate(
1766                     fname, deny_mode, smb_ofun, &access_mask,
1767                     &share_mode, &create_disposition, &create_options)) {
1768                 reply_nterror(req, NT_STATUS_DOS(ERRDOS, ERRbadaccess));
1769                 END_PROFILE(SMBopenX);
1770                 return;
1771         }
1772
1773         status = SMB_VFS_CREATE_FILE(
1774                 conn,                                   /* conn */
1775                 req,                                    /* req */
1776                 0,                                      /* root_dir_fid */
1777                 fname,                                  /* fname */
1778                 CFF_DOS_PATH,                           /* create_file_flags */
1779                 access_mask,                            /* access_mask */
1780                 share_mode,                             /* share_access */
1781                 create_disposition,                     /* create_disposition*/
1782                 create_options,                         /* create_options */
1783                 smb_attr,                               /* file_attributes */
1784                 oplock_request,                         /* oplock_request */
1785                 0,                                      /* allocation_size */
1786                 NULL,                                   /* sd */
1787                 NULL,                                   /* ea_list */
1788                 &fsp,                                   /* result */
1789                 &smb_action,                            /* pinfo */
1790                 &sbuf);                                 /* psbuf */
1791
1792         if (!NT_STATUS_IS_OK(status)) {
1793                 END_PROFILE(SMBopenX);
1794                 if (open_was_deferred(req->mid)) {
1795                         /* We have re-scheduled this call. */
1796                         return;
1797                 }
1798                 reply_openerror(req, status);
1799                 return;
1800         }
1801
1802         /* Setting the "size" field in vwv9 and vwv10 causes the file to be set to this size,
1803            if the file is truncated or created. */
1804         if (((smb_action == FILE_WAS_CREATED) || (smb_action == FILE_WAS_OVERWRITTEN)) && allocation_size) {
1805                 fsp->initial_allocation_size = smb_roundup(fsp->conn, allocation_size);
1806                 if (vfs_allocate_file_space(fsp, fsp->initial_allocation_size) == -1) {
1807                         close_file(req, fsp, ERROR_CLOSE);
1808                         reply_nterror(req, NT_STATUS_DISK_FULL);
1809                         END_PROFILE(SMBopenX);
1810                         return;
1811                 }
1812                 retval = vfs_set_filelen(fsp, (SMB_OFF_T)allocation_size);
1813                 if (retval < 0) {
1814                         close_file(req, fsp, ERROR_CLOSE);
1815                         reply_nterror(req, NT_STATUS_DISK_FULL);
1816                         END_PROFILE(SMBopenX);
1817                         return;
1818                 }
1819                 sbuf.st_size = get_allocation_size(conn,fsp,&sbuf);
1820         }
1821
1822         fattr = dos_mode(conn,fsp->fsp_name,&sbuf);
1823         mtime = sbuf.st_mtime;
1824         if (fattr & aDIR) {
1825                 close_file(req, fsp, ERROR_CLOSE);
1826                 reply_doserror(req, ERRDOS, ERRnoaccess);
1827                 END_PROFILE(SMBopenX);
1828                 return;
1829         }
1830
1831         /* If the caller set the extended oplock request bit
1832                 and we granted one (by whatever means) - set the
1833                 correct bit for extended oplock reply.
1834         */
1835
1836         if (ex_oplock_request && lp_fake_oplocks(SNUM(conn))) {
1837                 smb_action |= EXTENDED_OPLOCK_GRANTED;
1838         }
1839
1840         if(ex_oplock_request && EXCLUSIVE_OPLOCK_TYPE(fsp->oplock_type)) {
1841                 smb_action |= EXTENDED_OPLOCK_GRANTED;
1842         }
1843
1844         /* If the caller set the core oplock request bit
1845                 and we granted one (by whatever means) - set the
1846                 correct bit for core oplock reply.
1847         */
1848
1849         if (open_flags & EXTENDED_RESPONSE_REQUIRED) {
1850                 reply_outbuf(req, 19, 0);
1851         } else {
1852                 reply_outbuf(req, 15, 0);
1853         }
1854
1855         if (core_oplock_request && lp_fake_oplocks(SNUM(conn))) {
1856                 SCVAL(req->outbuf, smb_flg,
1857                       CVAL(req->outbuf,smb_flg)|CORE_OPLOCK_GRANTED);
1858         }
1859
1860         if(core_oplock_request && EXCLUSIVE_OPLOCK_TYPE(fsp->oplock_type)) {
1861                 SCVAL(req->outbuf, smb_flg,
1862                       CVAL(req->outbuf,smb_flg)|CORE_OPLOCK_GRANTED);
1863         }
1864
1865         SSVAL(req->outbuf,smb_vwv2,fsp->fnum);
1866         SSVAL(req->outbuf,smb_vwv3,fattr);
1867         if(lp_dos_filetime_resolution(SNUM(conn)) ) {
1868                 srv_put_dos_date3((char *)req->outbuf,smb_vwv4,mtime & ~1);
1869         } else {
1870                 srv_put_dos_date3((char *)req->outbuf,smb_vwv4,mtime);
1871         }
1872         SIVAL(req->outbuf,smb_vwv6,(uint32)sbuf.st_size);
1873         SSVAL(req->outbuf,smb_vwv8,GET_OPENX_MODE(deny_mode));
1874         SSVAL(req->outbuf,smb_vwv11,smb_action);
1875
1876         if (open_flags & EXTENDED_RESPONSE_REQUIRED) {
1877                 SIVAL(req->outbuf, smb_vwv15, STD_RIGHT_ALL_ACCESS);
1878         }
1879
1880         END_PROFILE(SMBopenX);
1881         chain_reply(req);
1882         return;
1883 }
1884
1885 /****************************************************************************
1886  Reply to a SMBulogoffX.
1887 ****************************************************************************/
1888
1889 void reply_ulogoffX(struct smb_request *req)
1890 {
1891         user_struct *vuser;
1892
1893         START_PROFILE(SMBulogoffX);
1894
1895         vuser = get_valid_user_struct(req->vuid);
1896
1897         if(vuser == NULL) {
1898                 DEBUG(3,("ulogoff, vuser id %d does not map to user.\n",
1899                          req->vuid));
1900         }
1901
1902         /* in user level security we are supposed to close any files
1903                 open by this user */
1904         if ((vuser != NULL) && (lp_security() != SEC_SHARE)) {
1905                 file_close_user(req->vuid);
1906         }
1907
1908         invalidate_vuid(req->vuid);
1909
1910         reply_outbuf(req, 2, 0);
1911
1912         DEBUG( 3, ( "ulogoffX vuid=%d\n", req->vuid ) );
1913
1914         END_PROFILE(SMBulogoffX);
1915         chain_reply(req);
1916 }
1917
1918 /****************************************************************************
1919  Reply to a mknew or a create.
1920 ****************************************************************************/
1921
1922 void reply_mknew(struct smb_request *req)
1923 {
1924         connection_struct *conn = req->conn;
1925         char *fname = NULL;
1926         uint32 fattr = 0;
1927         struct timespec ts[2];
1928         files_struct *fsp;
1929         int oplock_request = 0;
1930         SMB_STRUCT_STAT sbuf;
1931         NTSTATUS status;
1932         uint32 access_mask = FILE_GENERIC_READ | FILE_GENERIC_WRITE;
1933         uint32 share_mode = FILE_SHARE_READ|FILE_SHARE_WRITE;
1934         uint32 create_disposition;
1935         uint32 create_options = 0;
1936         TALLOC_CTX *ctx = talloc_tos();
1937
1938         START_PROFILE(SMBcreate);
1939
1940         if (req->wct < 3) {
1941                 reply_nterror(req, NT_STATUS_INVALID_PARAMETER);
1942                 END_PROFILE(SMBcreate);
1943                 return;
1944         }
1945
1946         fattr = SVAL(req->vwv+0, 0);
1947         oplock_request = CORE_OPLOCK_REQUEST(req->inbuf);
1948
1949         ts[1] = convert_time_t_to_timespec(srv_make_unix_date3(req->vwv+1));
1950                         /* mtime. */
1951
1952         srvstr_get_path_req(ctx, req, &fname, (const char *)req->buf + 1,
1953                             STR_TERMINATE, &status);
1954         if (!NT_STATUS_IS_OK(status)) {
1955                 reply_nterror(req, status);
1956                 END_PROFILE(SMBcreate);
1957                 return;
1958         }
1959
1960         if (fattr & aVOLID) {
1961                 DEBUG(0,("Attempt to create file (%s) with volid set - "
1962                         "please report this\n", fname));
1963         }
1964
1965         if(req->cmd == SMBmknew) {
1966                 /* We should fail if file exists. */
1967                 create_disposition = FILE_CREATE;
1968         } else {
1969                 /* Create if file doesn't exist, truncate if it does. */
1970                 create_disposition = FILE_OVERWRITE_IF;
1971         }
1972
1973         status = SMB_VFS_CREATE_FILE(
1974                 conn,                                   /* conn */
1975                 req,                                    /* req */
1976                 0,                                      /* root_dir_fid */
1977                 fname,                                  /* fname */
1978                 CFF_DOS_PATH,                           /* create_file_flags */
1979                 access_mask,                            /* access_mask */
1980                 share_mode,                             /* share_access */
1981                 create_disposition,                     /* create_disposition*/
1982                 create_options,                         /* create_options */
1983                 fattr,                                  /* file_attributes */
1984                 oplock_request,                         /* oplock_request */
1985                 0,                                      /* allocation_size */
1986                 NULL,                                   /* sd */
1987                 NULL,                                   /* ea_list */
1988                 &fsp,                                   /* result */
1989                 NULL,                                   /* pinfo */
1990                 &sbuf);                                 /* psbuf */
1991
1992         if (!NT_STATUS_IS_OK(status)) {
1993                 END_PROFILE(SMBcreate);
1994                 if (open_was_deferred(req->mid)) {
1995                         /* We have re-scheduled this call. */
1996                         return;
1997                 }
1998                 reply_openerror(req, status);
1999                 return;
2000         }
2001
2002         ts[0] = get_atimespec(&sbuf); /* atime. */
2003         status = smb_set_file_time(conn, fsp, fsp->fsp_name, &sbuf, ts, true);
2004         if (!NT_STATUS_IS_OK(status)) {
2005                 END_PROFILE(SMBcreate);
2006                 reply_openerror(req, status);
2007                 return;
2008         }
2009
2010         reply_outbuf(req, 1, 0);
2011         SSVAL(req->outbuf,smb_vwv0,fsp->fnum);
2012
2013         if (oplock_request && lp_fake_oplocks(SNUM(conn))) {
2014                 SCVAL(req->outbuf,smb_flg,
2015                                 CVAL(req->outbuf,smb_flg)|CORE_OPLOCK_GRANTED);
2016         }
2017
2018         if(EXCLUSIVE_OPLOCK_TYPE(fsp->oplock_type)) {
2019                 SCVAL(req->outbuf,smb_flg,
2020                                 CVAL(req->outbuf,smb_flg)|CORE_OPLOCK_GRANTED);
2021         }
2022
2023         DEBUG( 2, ( "reply_mknew: file %s\n", fsp->fsp_name ) );
2024         DEBUG( 3, ( "reply_mknew %s fd=%d dmode=0x%x\n",
2025                     fsp->fsp_name, fsp->fh->fd, (unsigned int)fattr ) );
2026
2027         END_PROFILE(SMBcreate);
2028         return;
2029 }
2030
2031 /****************************************************************************
2032  Reply to a create temporary file.
2033 ****************************************************************************/
2034
2035 void reply_ctemp(struct smb_request *req)
2036 {
2037         connection_struct *conn = req->conn;
2038         char *fname = NULL;
2039         uint32 fattr;
2040         files_struct *fsp;
2041         int oplock_request;
2042         int tmpfd;
2043         SMB_STRUCT_STAT sbuf;
2044         char *s;
2045         NTSTATUS status;
2046         TALLOC_CTX *ctx = talloc_tos();
2047
2048         START_PROFILE(SMBctemp);
2049
2050         if (req->wct < 3) {
2051                 reply_nterror(req, NT_STATUS_INVALID_PARAMETER);
2052                 END_PROFILE(SMBctemp);
2053                 return;
2054         }
2055
2056         fattr = SVAL(req->vwv+0, 0);
2057         oplock_request = CORE_OPLOCK_REQUEST(req->inbuf);
2058
2059         srvstr_get_path_req(ctx, req, &fname, (const char *)req->buf+1,
2060                             STR_TERMINATE, &status);
2061         if (!NT_STATUS_IS_OK(status)) {
2062                 reply_nterror(req, status);
2063                 END_PROFILE(SMBctemp);
2064                 return;
2065         }
2066         if (*fname) {
2067                 fname = talloc_asprintf(ctx,
2068                                 "%s/TMXXXXXX",
2069                                 fname);
2070         } else {
2071                 fname = talloc_strdup(ctx, "TMXXXXXX");
2072         }
2073
2074         if (!fname) {
2075                 reply_nterror(req, NT_STATUS_NO_MEMORY);
2076                 END_PROFILE(SMBctemp);
2077                 return;
2078         }
2079
2080         status = resolve_dfspath(ctx, conn,
2081                                 req->flags2 & FLAGS2_DFS_PATHNAMES,
2082                                 fname,
2083                                 &fname);
2084         if (!NT_STATUS_IS_OK(status)) {
2085                 if (NT_STATUS_EQUAL(status,NT_STATUS_PATH_NOT_COVERED)) {
2086                         reply_botherror(req, NT_STATUS_PATH_NOT_COVERED,
2087                                         ERRSRV, ERRbadpath);
2088                         END_PROFILE(SMBctemp);
2089                         return;
2090                 }
2091                 reply_nterror(req, status);
2092                 END_PROFILE(SMBctemp);
2093                 return;
2094         }
2095
2096         status = unix_convert(ctx, conn, fname, False, &fname, NULL, &sbuf);
2097         if (!NT_STATUS_IS_OK(status)) {
2098                 reply_nterror(req, status);
2099                 END_PROFILE(SMBctemp);
2100                 return;
2101         }
2102
2103         status = check_name(conn, fname);
2104         if (!NT_STATUS_IS_OK(status)) {
2105                 reply_nterror(req, status);
2106                 END_PROFILE(SMBctemp);
2107                 return;
2108         }
2109
2110         tmpfd = smb_mkstemp(fname);
2111         if (tmpfd == -1) {
2112                 reply_unixerror(req, ERRDOS, ERRnoaccess);
2113                 END_PROFILE(SMBctemp);
2114                 return;
2115         }
2116
2117         SMB_VFS_STAT(conn,fname,&sbuf);
2118
2119         /* We should fail if file does not exist. */
2120         status = SMB_VFS_CREATE_FILE(
2121                 conn,                                   /* conn */
2122                 req,                                    /* req */
2123                 0,                                      /* root_dir_fid */
2124                 fname,                                  /* fname */
2125                 0,                                      /* create_file_flags */
2126                 FILE_GENERIC_READ | FILE_GENERIC_WRITE, /* access_mask */
2127                 FILE_SHARE_READ | FILE_SHARE_WRITE,     /* share_access */
2128                 FILE_OPEN,                              /* create_disposition*/
2129                 0,                                      /* create_options */
2130                 fattr,                                  /* file_attributes */
2131                 oplock_request,                         /* oplock_request */
2132                 0,                                      /* allocation_size */
2133                 NULL,                                   /* sd */
2134                 NULL,                                   /* ea_list */
2135                 &fsp,                                   /* result */
2136                 NULL,                                   /* pinfo */
2137                 &sbuf);                                 /* psbuf */
2138
2139         /* close fd from smb_mkstemp() */
2140         close(tmpfd);
2141
2142         if (!NT_STATUS_IS_OK(status)) {
2143                 if (open_was_deferred(req->mid)) {
2144                         /* We have re-scheduled this call. */
2145                         END_PROFILE(SMBctemp);
2146                         return;
2147                 }
2148                 reply_openerror(req, status);
2149                 END_PROFILE(SMBctemp);
2150                 return;
2151         }
2152
2153         reply_outbuf(req, 1, 0);
2154         SSVAL(req->outbuf,smb_vwv0,fsp->fnum);
2155
2156         /* the returned filename is relative to the directory */
2157         s = strrchr_m(fsp->fsp_name, '/');
2158         if (!s) {
2159                 s = fsp->fsp_name;
2160         } else {
2161                 s++;
2162         }
2163
2164 #if 0
2165         /* Tested vs W2K3 - this doesn't seem to be here - null terminated filename is the only
2166            thing in the byte section. JRA */
2167         SSVALS(p, 0, -1); /* what is this? not in spec */
2168 #endif
2169         if (message_push_string(&req->outbuf, s, STR_ASCII|STR_TERMINATE)
2170             == -1) {
2171                 reply_nterror(req, NT_STATUS_NO_MEMORY);
2172                 END_PROFILE(SMBctemp);
2173                 return;
2174         }
2175
2176         if (oplock_request && lp_fake_oplocks(SNUM(conn))) {
2177                 SCVAL(req->outbuf, smb_flg,
2178                       CVAL(req->outbuf,smb_flg)|CORE_OPLOCK_GRANTED);
2179         }
2180
2181         if (EXCLUSIVE_OPLOCK_TYPE(fsp->oplock_type)) {
2182                 SCVAL(req->outbuf, smb_flg,
2183                       CVAL(req->outbuf,smb_flg)|CORE_OPLOCK_GRANTED);
2184         }
2185
2186         DEBUG( 2, ( "reply_ctemp: created temp file %s\n", fsp->fsp_name ) );
2187         DEBUG( 3, ( "reply_ctemp %s fd=%d umode=0%o\n", fsp->fsp_name,
2188                     fsp->fh->fd, (unsigned int)sbuf.st_mode ) );
2189
2190         END_PROFILE(SMBctemp);
2191         return;
2192 }
2193
2194 /*******************************************************************
2195  Check if a user is allowed to rename a file.
2196 ********************************************************************/
2197
2198 static NTSTATUS can_rename(connection_struct *conn, files_struct *fsp,
2199                            uint16 dirtype, SMB_STRUCT_STAT *pst)
2200 {
2201         uint32 fmode;
2202
2203         if (!CAN_WRITE(conn)) {
2204                 return NT_STATUS_MEDIA_WRITE_PROTECTED;
2205         }
2206
2207         fmode = dos_mode(conn, fsp->fsp_name, pst);
2208         if ((fmode & ~dirtype) & (aHIDDEN | aSYSTEM)) {
2209                 return NT_STATUS_NO_SUCH_FILE;
2210         }
2211
2212         if (S_ISDIR(pst->st_mode)) {
2213                 return NT_STATUS_OK;
2214         }
2215
2216         if (fsp->access_mask & (DELETE_ACCESS|FILE_WRITE_ATTRIBUTES)) {
2217                 return NT_STATUS_OK;
2218         }
2219
2220         return NT_STATUS_ACCESS_DENIED;
2221 }
2222
2223 /*******************************************************************
2224  * unlink a file with all relevant access checks
2225  *******************************************************************/
2226
2227 static NTSTATUS do_unlink(connection_struct *conn,
2228                         struct smb_request *req,
2229                         const char *fname,
2230                         uint32 dirtype)
2231 {
2232         SMB_STRUCT_STAT sbuf;
2233         uint32 fattr;
2234         files_struct *fsp;
2235         uint32 dirtype_orig = dirtype;
2236         NTSTATUS status;
2237
2238         DEBUG(10,("do_unlink: %s, dirtype = %d\n", fname, dirtype ));
2239
2240         if (!CAN_WRITE(conn)) {
2241                 return NT_STATUS_MEDIA_WRITE_PROTECTED;
2242         }
2243
2244         if (SMB_VFS_LSTAT(conn,fname,&sbuf) != 0) {
2245                 return map_nt_error_from_unix(errno);
2246         }
2247
2248         fattr = dos_mode(conn,fname,&sbuf);
2249
2250         if (dirtype & FILE_ATTRIBUTE_NORMAL) {
2251                 dirtype = aDIR|aARCH|aRONLY;
2252         }
2253
2254         dirtype &= (aDIR|aARCH|aRONLY|aHIDDEN|aSYSTEM);
2255         if (!dirtype) {
2256                 return NT_STATUS_NO_SUCH_FILE;
2257         }
2258
2259         if (!dir_check_ftype(conn, fattr, dirtype)) {
2260                 if (fattr & aDIR) {
2261                         return NT_STATUS_FILE_IS_A_DIRECTORY;
2262                 }
2263                 return NT_STATUS_NO_SUCH_FILE;
2264         }
2265
2266         if (dirtype_orig & 0x8000) {
2267                 /* These will never be set for POSIX. */
2268                 return NT_STATUS_NO_SUCH_FILE;
2269         }
2270
2271 #if 0
2272         if ((fattr & dirtype) & FILE_ATTRIBUTE_DIRECTORY) {
2273                 return NT_STATUS_FILE_IS_A_DIRECTORY;
2274         }
2275
2276         if ((fattr & ~dirtype) & (FILE_ATTRIBUTE_HIDDEN|FILE_ATTRIBUTE_SYSTEM)) {
2277                 return NT_STATUS_NO_SUCH_FILE;
2278         }
2279
2280         if (dirtype & 0xFF00) {
2281                 /* These will never be set for POSIX. */
2282                 return NT_STATUS_NO_SUCH_FILE;
2283         }
2284
2285         dirtype &= 0xFF;
2286         if (!dirtype) {
2287                 return NT_STATUS_NO_SUCH_FILE;
2288         }
2289
2290         /* Can't delete a directory. */
2291         if (fattr & aDIR) {
2292                 return NT_STATUS_FILE_IS_A_DIRECTORY;
2293         }
2294 #endif
2295
2296 #if 0 /* JRATEST */
2297         else if (dirtype & aDIR) /* Asked for a directory and it isn't. */
2298                 return NT_STATUS_OBJECT_NAME_INVALID;
2299 #endif /* JRATEST */
2300
2301         /* Fix for bug #3035 from SATOH Fumiyasu <fumiyas@miraclelinux.com>
2302
2303           On a Windows share, a file with read-only dosmode can be opened with
2304           DELETE_ACCESS. But on a Samba share (delete readonly = no), it
2305           fails with NT_STATUS_CANNOT_DELETE error.
2306
2307           This semantic causes a problem that a user can not
2308           rename a file with read-only dosmode on a Samba share
2309           from a Windows command prompt (i.e. cmd.exe, but can rename
2310           from Windows Explorer).
2311         */
2312
2313         if (!lp_delete_readonly(SNUM(conn))) {
2314                 if (fattr & aRONLY) {
2315                         return NT_STATUS_CANNOT_DELETE;
2316                 }
2317         }
2318
2319         /* On open checks the open itself will check the share mode, so
2320            don't do it here as we'll get it wrong. */
2321
2322         status = SMB_VFS_CREATE_FILE
2323                 (conn,                  /* conn */
2324                  req,                   /* req */
2325                  0,                     /* root_dir_fid */
2326                  fname,                 /* fname */
2327                  0,                     /* create_file_flags */
2328                  DELETE_ACCESS,         /* access_mask */
2329                  FILE_SHARE_NONE,       /* share_access */
2330                  FILE_OPEN,             /* create_disposition*/
2331                  FILE_NON_DIRECTORY_FILE, /* create_options */
2332                  FILE_ATTRIBUTE_NORMAL, /* file_attributes */
2333                  0,                     /* oplock_request */
2334                  0,                     /* allocation_size */
2335                  NULL,                  /* sd */
2336                  NULL,                  /* ea_list */
2337                  &fsp,                  /* result */
2338                  NULL,                  /* pinfo */
2339                  &sbuf);                /* psbuf */
2340
2341         if (!NT_STATUS_IS_OK(status)) {
2342                 DEBUG(10, ("SMB_VFS_CREATEFILE failed: %s\n",
2343                            nt_errstr(status)));
2344                 return status;
2345         }
2346
2347         /* The set is across all open files on this dev/inode pair. */
2348         if (!set_delete_on_close(fsp, True, &conn->server_info->utok)) {
2349                 close_file(req, fsp, NORMAL_CLOSE);
2350                 return NT_STATUS_ACCESS_DENIED;
2351         }
2352
2353         return close_file(req, fsp, NORMAL_CLOSE);
2354 }
2355
2356 /****************************************************************************
2357  The guts of the unlink command, split out so it may be called by the NT SMB
2358  code.
2359 ****************************************************************************/
2360
2361 NTSTATUS unlink_internals(connection_struct *conn, struct smb_request *req,
2362                           uint32 dirtype, const char *name_in, bool has_wild)
2363 {
2364         const char *directory = NULL;
2365         char *mask = NULL;
2366         char *name = NULL;
2367         char *p = NULL;
2368         int count=0;
2369         NTSTATUS status = NT_STATUS_OK;
2370         SMB_STRUCT_STAT sbuf;
2371         TALLOC_CTX *ctx = talloc_tos();
2372
2373         status = unix_convert(ctx, conn, name_in, has_wild, &name, NULL, &sbuf);
2374         if (!NT_STATUS_IS_OK(status)) {
2375                 return status;
2376         }
2377
2378         p = strrchr_m(name,'/');
2379         if (!p) {
2380                 directory = talloc_strdup(ctx, ".");
2381                 if (!directory) {
2382                         return NT_STATUS_NO_MEMORY;
2383                 }
2384                 mask = name;
2385         } else {
2386                 *p = 0;
2387                 directory = name;
2388                 mask = p+1;
2389         }
2390
2391         /*
2392          * We should only check the mangled cache
2393          * here if unix_convert failed. This means
2394          * that the path in 'mask' doesn't exist
2395          * on the file system and so we need to look
2396          * for a possible mangle. This patch from
2397          * Tine Smukavec <valentin.smukavec@hermes.si>.
2398          */
2399
2400         if (!VALID_STAT(sbuf) && mangle_is_mangled(mask,conn->params)) {
2401                 char *new_mask = NULL;
2402                 mangle_lookup_name_from_8_3(ctx,
2403                                 mask,
2404                                 &new_mask,
2405                                 conn->params );
2406                 if (new_mask) {
2407                         mask = new_mask;
2408                 }
2409         }
2410
2411         if (!has_wild) {
2412                 directory = talloc_asprintf(ctx,
2413                                 "%s/%s",
2414                                 directory,
2415                                 mask);
2416                 if (!directory) {
2417                         return NT_STATUS_NO_MEMORY;
2418                 }
2419                 if (dirtype == 0) {
2420                         dirtype = FILE_ATTRIBUTE_NORMAL;
2421                 }
2422
2423                 status = check_name(conn, directory);
2424                 if (!NT_STATUS_IS_OK(status)) {
2425                         return status;
2426                 }
2427
2428                 status = do_unlink(conn, req, directory, dirtype);
2429                 if (!NT_STATUS_IS_OK(status)) {
2430                         return status;
2431                 }
2432
2433                 count++;
2434         } else {
2435                 struct smb_Dir *dir_hnd = NULL;
2436                 long offset = 0;
2437                 const char *dname;
2438
2439                 if ((dirtype & SAMBA_ATTRIBUTES_MASK) == aDIR) {
2440                         return NT_STATUS_OBJECT_NAME_INVALID;
2441                 }
2442
2443                 if (strequal(mask,"????????.???")) {
2444                         mask[0] = '*';
2445                         mask[1] = '\0';
2446                 }
2447
2448                 status = check_name(conn, directory);
2449                 if (!NT_STATUS_IS_OK(status)) {
2450                         return status;
2451                 }
2452
2453                 dir_hnd = OpenDir(talloc_tos(), conn, directory, mask,
2454                                   dirtype);
2455                 if (dir_hnd == NULL) {
2456                         return map_nt_error_from_unix(errno);
2457                 }
2458
2459                 /* XXXX the CIFS spec says that if bit0 of the flags2 field is set then
2460                    the pattern matches against the long name, otherwise the short name 
2461                    We don't implement this yet XXXX
2462                 */
2463
2464                 status = NT_STATUS_NO_SUCH_FILE;
2465
2466                 while ((dname = ReadDirName(dir_hnd, &offset))) {
2467                         SMB_STRUCT_STAT st;
2468                         char *fname = NULL;
2469
2470                         if (!is_visible_file(conn, directory, dname, &st, True)) {
2471                                 continue;
2472                         }
2473
2474                         /* Quick check for "." and ".." */
2475                         if (ISDOT(dname) || ISDOTDOT(dname)) {
2476                                 continue;
2477                         }
2478
2479                         if(!mask_match(dname, mask, conn->case_sensitive)) {
2480                                 continue;
2481                         }
2482
2483                         fname = talloc_asprintf(ctx, "%s/%s",
2484                                         directory,
2485                                         dname);
2486                         if (!fname) {
2487                                 return NT_STATUS_NO_MEMORY;
2488                         }
2489
2490                         status = check_name(conn, fname);
2491                         if (!NT_STATUS_IS_OK(status)) {
2492                                 TALLOC_FREE(dir_hnd);
2493                                 return status;
2494                         }
2495
2496                         status = do_unlink(conn, req, fname, dirtype);
2497                         if (!NT_STATUS_IS_OK(status)) {
2498                                 TALLOC_FREE(fname);
2499                                 continue;
2500                         }
2501
2502                         count++;
2503                         DEBUG(3,("unlink_internals: successful unlink [%s]\n",
2504                                  fname));
2505
2506                         TALLOC_FREE(fname);
2507                 }
2508                 TALLOC_FREE(dir_hnd);
2509         }
2510
2511         if (count == 0 && NT_STATUS_IS_OK(status) && errno != 0) {
2512                 status = map_nt_error_from_unix(errno);
2513         }
2514
2515         return status;
2516 }
2517
2518 /****************************************************************************
2519  Reply to a unlink
2520 ****************************************************************************/
2521
2522 void reply_unlink(struct smb_request *req)
2523 {
2524         connection_struct *conn = req->conn;
2525         char *name = NULL;
2526         uint32 dirtype;
2527         NTSTATUS status;
2528         bool path_contains_wcard = False;
2529         TALLOC_CTX *ctx = talloc_tos();
2530
2531         START_PROFILE(SMBunlink);
2532
2533         if (req->wct < 1) {
2534                 reply_nterror(req, NT_STATUS_INVALID_PARAMETER);
2535                 END_PROFILE(SMBunlink);
2536                 return;
2537         }
2538
2539         dirtype = SVAL(req->vwv+0, 0);
2540
2541         srvstr_get_path_req_wcard(ctx, req, &name, (const char *)req->buf + 1,
2542                                   STR_TERMINATE, &status,
2543                                   &path_contains_wcard);
2544         if (!NT_STATUS_IS_OK(status)) {
2545                 reply_nterror(req, status);
2546                 END_PROFILE(SMBunlink);
2547                 return;
2548         }
2549
2550         status = resolve_dfspath_wcard(ctx, conn,
2551                                        req->flags2 & FLAGS2_DFS_PATHNAMES,
2552                                        name,
2553                                        &name,
2554                                        &path_contains_wcard);
2555         if (!NT_STATUS_IS_OK(status)) {
2556                 if (NT_STATUS_EQUAL(status,NT_STATUS_PATH_NOT_COVERED)) {
2557                         reply_botherror(req, NT_STATUS_PATH_NOT_COVERED,
2558                                         ERRSRV, ERRbadpath);
2559                         END_PROFILE(SMBunlink);
2560                         return;
2561                 }
2562                 reply_nterror(req, status);
2563                 END_PROFILE(SMBunlink);
2564                 return;
2565         }
2566
2567         DEBUG(3,("reply_unlink : %s\n",name));
2568
2569         status = unlink_internals(conn, req, dirtype, name,
2570                                   path_contains_wcard);
2571         if (!NT_STATUS_IS_OK(status)) {
2572                 if (open_was_deferred(req->mid)) {
2573                         /* We have re-scheduled this call. */
2574                         END_PROFILE(SMBunlink);
2575                         return;
2576                 }
2577                 reply_nterror(req, status);
2578                 END_PROFILE(SMBunlink);
2579                 return;
2580         }
2581
2582         reply_outbuf(req, 0, 0);
2583         END_PROFILE(SMBunlink);
2584
2585         return;
2586 }
2587
2588 /****************************************************************************
2589  Fail for readbraw.
2590 ****************************************************************************/
2591
2592 static void fail_readraw(void)
2593 {
2594         const char *errstr = talloc_asprintf(talloc_tos(),
2595                         "FAIL ! reply_readbraw: socket write fail (%s)",
2596                         strerror(errno));
2597         if (!errstr) {
2598                 errstr = "";
2599         }
2600         exit_server_cleanly(errstr);
2601 }
2602
2603 /****************************************************************************
2604  Fake (read/write) sendfile. Returns -1 on read or write fail.
2605 ****************************************************************************/
2606
2607 static ssize_t fake_sendfile(files_struct *fsp, SMB_OFF_T startpos,
2608                              size_t nread)
2609 {
2610         size_t bufsize;
2611         size_t tosend = nread;
2612         char *buf;
2613
2614         if (nread == 0) {
2615                 return 0;
2616         }
2617
2618         bufsize = MIN(nread, 65536);
2619
2620         if (!(buf = SMB_MALLOC_ARRAY(char, bufsize))) {
2621                 return -1;
2622         }
2623
2624         while (tosend > 0) {
2625                 ssize_t ret;
2626                 size_t cur_read;
2627
2628                 if (tosend > bufsize) {
2629                         cur_read = bufsize;
2630                 } else {
2631                         cur_read = tosend;
2632                 }
2633                 ret = read_file(fsp,buf,startpos,cur_read);
2634                 if (ret == -1) {
2635                         SAFE_FREE(buf);
2636                         return -1;
2637                 }
2638
2639                 /* If we had a short read, fill with zeros. */
2640                 if (ret < cur_read) {
2641                         memset(buf, '\0', cur_read - ret);
2642                 }
2643
2644                 if (write_data(smbd_server_fd(),buf,cur_read) != cur_read) {
2645                         SAFE_FREE(buf);
2646                         return -1;
2647                 }
2648                 tosend -= cur_read;
2649                 startpos += cur_read;
2650         }
2651
2652         SAFE_FREE(buf);
2653         return (ssize_t)nread;
2654 }
2655
2656 /****************************************************************************
2657  Deal with the case of sendfile reading less bytes from the file than
2658  requested. Fill with zeros (all we can do).
2659 ****************************************************************************/
2660
2661 static void sendfile_short_send(files_struct *fsp,
2662                                 ssize_t nread,
2663                                 size_t headersize,
2664                                 size_t smb_maxcnt)
2665 {
2666         if (nread < headersize) {
2667                 DEBUG(0,("sendfile_short_send: sendfile failed to send "
2668                         "header for file %s (%s). Terminating\n",
2669                         fsp->fsp_name, strerror(errno) ));
2670                 exit_server_cleanly("sendfile_short_send failed");
2671         }
2672
2673         nread -= headersize;
2674
2675         if (nread < smb_maxcnt) {
2676                 char *buf = SMB_CALLOC_ARRAY(char, 1024);
2677                 if (!buf) {
2678                         exit_server_cleanly("sendfile_short_send: "
2679                                 "malloc failed");
2680                 }
2681
2682                 DEBUG(0,("sendfile_short_send: filling truncated file %s "
2683                         "with zeros !\n", fsp->fsp_name));
2684
2685                 while (nread < smb_maxcnt) {
2686                         /*
2687                          * We asked for the real file size and told sendfile
2688                          * to not go beyond the end of the file. But it can
2689                          * happen that in between our fstat call and the
2690                          * sendfile call the file was truncated. This is very
2691                          * bad because we have already announced the larger
2692                          * number of bytes to the client.
2693                          *
2694                          * The best we can do now is to send 0-bytes, just as
2695                          * a read from a hole in a sparse file would do.
2696                          *
2697                          * This should happen rarely enough that I don't care
2698                          * about efficiency here :-)
2699                          */
2700                         size_t to_write;
2701
2702                         to_write = MIN(sizeof(buf), smb_maxcnt - nread);
2703                         if (write_data(smbd_server_fd(), buf, to_write) != to_write) {
2704                                 exit_server_cleanly("sendfile_short_send: "
2705                                         "write_data failed");
2706                         }
2707                         nread += to_write;
2708                 }
2709                 SAFE_FREE(buf);
2710         }
2711 }
2712
2713 /****************************************************************************
2714  Return a readbraw error (4 bytes of zero).
2715 ****************************************************************************/
2716
2717 static void reply_readbraw_error(void)
2718 {
2719         char header[4];
2720         SIVAL(header,0,0);
2721         if (write_data(smbd_server_fd(),header,4) != 4) {
2722                 fail_readraw();
2723         }
2724 }
2725
2726 /****************************************************************************
2727  Use sendfile in readbraw.
2728 ****************************************************************************/
2729
2730 void send_file_readbraw(connection_struct *conn,
2731                         files_struct *fsp,
2732                         SMB_OFF_T startpos,
2733                         size_t nread,
2734                         ssize_t mincount)
2735 {
2736         char *outbuf = NULL;
2737         ssize_t ret=0;
2738
2739 #if defined(WITH_SENDFILE)
2740         /*
2741          * We can only use sendfile on a non-chained packet 
2742          * but we can use on a non-oplocked file. tridge proved this
2743          * on a train in Germany :-). JRA.
2744          * reply_readbraw has already checked the length.
2745          */
2746
2747         if ( (chain_size == 0) && (nread > 0) && (fsp->base_fsp == NULL) &&
2748             (fsp->wcp == NULL) && lp_use_sendfile(SNUM(conn)) ) {
2749                 ssize_t sendfile_read = -1;
2750                 char header[4];
2751                 DATA_BLOB header_blob;
2752
2753                 _smb_setlen(header,nread);
2754                 header_blob = data_blob_const(header, 4);
2755
2756                 if ((sendfile_read = SMB_VFS_SENDFILE(smbd_server_fd(), fsp,
2757                                 &header_blob, startpos, nread)) == -1) {
2758                         /* Returning ENOSYS means no data at all was sent.
2759                          * Do this as a normal read. */
2760                         if (errno == ENOSYS) {
2761                                 goto normal_readbraw;
2762                         }
2763
2764                         /*
2765                          * Special hack for broken Linux with no working sendfile. If we
2766                          * return EINTR we sent the header but not the rest of the data.
2767                          * Fake this up by doing read/write calls.
2768                          */
2769                         if (errno == EINTR) {
2770                                 /* Ensure we don't do this again. */
2771                                 set_use_sendfile(SNUM(conn), False);
2772                                 DEBUG(0,("send_file_readbraw: sendfile not available. Faking..\n"));
2773
2774                                 if (fake_sendfile(fsp, startpos, nread) == -1) {
2775                                         DEBUG(0,("send_file_readbraw: fake_sendfile failed for file %s (%s).\n",
2776                                                 fsp->fsp_name, strerror(errno) ));
2777                                         exit_server_cleanly("send_file_readbraw fake_sendfile failed");
2778                                 }
2779                                 return;
2780                         }
2781
2782                         DEBUG(0,("send_file_readbraw: sendfile failed for file %s (%s). Terminating\n",
2783                                 fsp->fsp_name, strerror(errno) ));
2784                         exit_server_cleanly("send_file_readbraw sendfile failed");
2785                 }
2786
2787                 /* Deal with possible short send. */
2788                 sendfile_short_send(fsp, sendfile_read, 4, nread);
2789                 return;
2790         }
2791 #endif
2792
2793 normal_readbraw:
2794
2795         outbuf = TALLOC_ARRAY(NULL, char, nread+4);
2796         if (!outbuf) {
2797                 DEBUG(0,("send_file_readbraw: TALLOC_ARRAY failed for size %u.\n",
2798                         (unsigned)(nread+4)));
2799                 reply_readbraw_error();
2800                 return;
2801         }
2802
2803         if (nread > 0) {
2804                 ret = read_file(fsp,outbuf+4,startpos,nread);
2805 #if 0 /* mincount appears to be ignored in a W2K server. JRA. */
2806                 if (ret < mincount)
2807                         ret = 0;
2808 #else
2809                 if (ret < nread)
2810                         ret = 0;
2811 #endif
2812         }
2813
2814         _smb_setlen(outbuf,ret);
2815         if (write_data(smbd_server_fd(),outbuf,4+ret) != 4+ret)
2816                 fail_readraw();
2817
2818         TALLOC_FREE(outbuf);
2819 }
2820
2821 /****************************************************************************
2822  Reply to a readbraw (core+ protocol).
2823 ****************************************************************************/
2824
2825 void reply_readbraw(struct smb_request *req)
2826 {
2827         connection_struct *conn = req->conn;
2828         ssize_t maxcount,mincount;
2829         size_t nread = 0;
2830         SMB_OFF_T startpos;
2831         files_struct *fsp;
2832         SMB_STRUCT_STAT st;
2833         SMB_OFF_T size = 0;
2834
2835         START_PROFILE(SMBreadbraw);
2836
2837         if (srv_is_signing_active() || is_encrypted_packet(req->inbuf)) {
2838                 exit_server_cleanly("reply_readbraw: SMB signing/sealing is active - "
2839                         "raw reads/writes are disallowed.");
2840         }
2841
2842         if (req->wct < 8) {
2843                 reply_readbraw_error();
2844                 END_PROFILE(SMBreadbraw);
2845                 return;
2846         }
2847
2848         /*
2849          * Special check if an oplock break has been issued
2850          * and the readraw request croses on the wire, we must
2851          * return a zero length response here.
2852          */
2853
2854         fsp = file_fsp(req, SVAL(req->vwv+0, 0));
2855
2856         /*
2857          * We have to do a check_fsp by hand here, as
2858          * we must always return 4 zero bytes on error,
2859          * not a NTSTATUS.
2860          */
2861
2862         if (!fsp || !conn || conn != fsp->conn ||
2863                         req->vuid != fsp->vuid ||
2864                         fsp->is_directory || fsp->fh->fd == -1) {
2865                 /*
2866                  * fsp could be NULL here so use the value from the packet. JRA.
2867                  */
2868                 DEBUG(3,("reply_readbraw: fnum %d not valid "
2869                         "- cache prime?\n",
2870                         (int)SVAL(req->vwv+0, 0)));
2871                 reply_readbraw_error();
2872                 END_PROFILE(SMBreadbraw);
2873                 return;
2874         }
2875
2876         /* Do a "by hand" version of CHECK_READ. */
2877         if (!(fsp->can_read ||
2878                         ((req->flags2 & FLAGS2_READ_PERMIT_EXECUTE) &&
2879                                 (fsp->access_mask & FILE_EXECUTE)))) {
2880                 DEBUG(3,("reply_readbraw: fnum %d not readable.\n",
2881                                 (int)SVAL(req->vwv+0, 0)));
2882                 reply_readbraw_error();
2883                 END_PROFILE(SMBreadbraw);
2884                 return;
2885         }
2886
2887         flush_write_cache(fsp, READRAW_FLUSH);
2888
2889         startpos = IVAL_TO_SMB_OFF_T(req->vwv+1, 0);
2890         if(req->wct == 10) {
2891                 /*
2892                  * This is a large offset (64 bit) read.
2893                  */
2894 #ifdef LARGE_SMB_OFF_T
2895
2896                 startpos |= (((SMB_OFF_T)IVAL(req->vwv+8, 0)) << 32);
2897
2898 #else /* !LARGE_SMB_OFF_T */
2899
2900                 /*
2901                  * Ensure we haven't been sent a >32 bit offset.
2902                  */
2903
2904                 if(IVAL(req->vwv+8, 0) != 0) {
2905                         DEBUG(0,("reply_readbraw: large offset "
2906                                 "(%x << 32) used and we don't support "
2907                                 "64 bit offsets.\n",
2908                         (unsigned int)IVAL(req->vwv+8, 0) ));
2909                         reply_readbraw_error();
2910                         END_PROFILE(SMBreadbraw);
2911                         return;
2912                 }
2913
2914 #endif /* LARGE_SMB_OFF_T */
2915
2916                 if(startpos < 0) {
2917                         DEBUG(0,("reply_readbraw: negative 64 bit "
2918                                 "readraw offset (%.0f) !\n",
2919                                 (double)startpos ));
2920                         reply_readbraw_error();
2921                         END_PROFILE(SMBreadbraw);
2922                         return;
2923                 }      
2924         }
2925
2926         maxcount = (SVAL(req->vwv+3, 0) & 0xFFFF);
2927         mincount = (SVAL(req->vwv+4, 0) & 0xFFFF);
2928
2929         /* ensure we don't overrun the packet size */
2930         maxcount = MIN(65535,maxcount);
2931
2932         if (is_locked(fsp,(uint32)req->smbpid,
2933                         (uint64_t)maxcount,
2934                         (uint64_t)startpos,
2935                         READ_LOCK)) {
2936                 reply_readbraw_error();
2937                 END_PROFILE(SMBreadbraw);
2938                 return;
2939         }
2940
2941         if (SMB_VFS_FSTAT(fsp, &st) == 0) {
2942                 size = st.st_size;
2943         }
2944
2945         if (startpos >= size) {
2946                 nread = 0;
2947         } else {
2948                 nread = MIN(maxcount,(size - startpos));
2949         }
2950
2951 #if 0 /* mincount appears to be ignored in a W2K server. JRA. */
2952         if (nread < mincount)
2953                 nread = 0;
2954 #endif
2955
2956         DEBUG( 3, ( "reply_readbraw: fnum=%d start=%.0f max=%lu "
2957                 "min=%lu nread=%lu\n",
2958                 fsp->fnum, (double)startpos,
2959                 (unsigned long)maxcount,
2960                 (unsigned long)mincount,
2961                 (unsigned long)nread ) );
2962
2963         send_file_readbraw(conn, fsp, startpos, nread, mincount);
2964
2965         DEBUG(5,("reply_readbraw finished\n"));
2966         END_PROFILE(SMBreadbraw);
2967 }
2968
2969 #undef DBGC_CLASS
2970 #define DBGC_CLASS DBGC_LOCKING
2971
2972 /****************************************************************************
2973  Reply to a lockread (core+ protocol).
2974 ****************************************************************************/
2975
2976 void reply_lockread(struct smb_request *req)
2977 {
2978         connection_struct *conn = req->conn;
2979         ssize_t nread = -1;
2980         char *data;
2981         SMB_OFF_T startpos;
2982         size_t numtoread;
2983         NTSTATUS status;
2984         files_struct *fsp;
2985         struct byte_range_lock *br_lck = NULL;
2986         char *p = NULL;
2987
2988         START_PROFILE(SMBlockread);
2989
2990         if (req->wct < 5) {
2991                 reply_nterror(req, NT_STATUS_INVALID_PARAMETER);
2992                 END_PROFILE(SMBlockread);
2993                 return;
2994         }
2995
2996         fsp = file_fsp(req, SVAL(req->vwv+0, 0));
2997
2998         if (!check_fsp(conn, req, fsp)) {
2999                 END_PROFILE(SMBlockread);
3000                 return;
3001         }
3002
3003         if (!CHECK_READ(fsp,req)) {
3004                 reply_doserror(req, ERRDOS, ERRbadaccess);
3005                 END_PROFILE(SMBlockread);
3006                 return;
3007         }
3008
3009         release_level_2_oplocks_on_change(fsp);
3010
3011         numtoread = SVAL(req->vwv+1, 0);
3012         startpos = IVAL_TO_SMB_OFF_T(req->vwv+2, 0);
3013
3014         numtoread = MIN(BUFFER_SIZE - (smb_size + 3*2 + 3), numtoread);
3015
3016         reply_outbuf(req, 5, numtoread + 3);
3017
3018         data = smb_buf(req->outbuf) + 3;
3019
3020         /*
3021          * NB. Discovered by Menny Hamburger at Mainsoft. This is a core+
3022          * protocol request that predates the read/write lock concept. 
3023          * Thus instead of asking for a read lock here we need to ask
3024          * for a write lock. JRA.
3025          * Note that the requested lock size is unaffected by max_recv.
3026          */
3027
3028         br_lck = do_lock(smbd_messaging_context(),
3029                         fsp,
3030                         req->smbpid,
3031                         (uint64_t)numtoread,
3032                         (uint64_t)startpos,
3033                         WRITE_LOCK,
3034                         WINDOWS_LOCK,
3035                         False, /* Non-blocking lock. */
3036                         &status,
3037                         NULL);
3038         TALLOC_FREE(br_lck);
3039
3040         if (NT_STATUS_V(status)) {
3041                 reply_nterror(req, status);
3042                 END_PROFILE(SMBlockread);
3043                 return;
3044         }
3045
3046         /*
3047          * However the requested READ size IS affected by max_recv. Insanity.... JRA.
3048          */
3049
3050         if (numtoread > max_recv) {
3051                 DEBUG(0,("reply_lockread: requested read size (%u) is greater than maximum allowed (%u). \
3052 Returning short read of maximum allowed for compatibility with Windows 2000.\n",
3053                         (unsigned int)numtoread, (unsigned int)max_recv ));
3054                 numtoread = MIN(numtoread,max_recv);
3055         }
3056         nread = read_file(fsp,data,startpos,numtoread);
3057
3058         if (nread < 0) {
3059                 reply_unixerror(req, ERRDOS, ERRnoaccess);
3060                 END_PROFILE(SMBlockread);
3061                 return;
3062         }
3063
3064         srv_set_message((char *)req->outbuf, 5, nread+3, False);
3065
3066         SSVAL(req->outbuf,smb_vwv0,nread);
3067         SSVAL(req->outbuf,smb_vwv5,nread+3);
3068         p = smb_buf(req->outbuf);
3069         SCVAL(p,0,0); /* pad byte. */
3070         SSVAL(p,1,nread);
3071
3072         DEBUG(3,("lockread fnum=%d num=%d nread=%d\n",
3073                  fsp->fnum, (int)numtoread, (int)nread));
3074
3075         END_PROFILE(SMBlockread);
3076         return;
3077 }
3078
3079 #undef DBGC_CLASS
3080 #define DBGC_CLASS DBGC_ALL
3081
3082 /****************************************************************************
3083  Reply to a read.
3084 ****************************************************************************/
3085
3086 void reply_read(struct smb_request *req)
3087 {
3088         connection_struct *conn = req->conn;
3089         size_t numtoread;
3090         ssize_t nread = 0;
3091         char *data;
3092         SMB_OFF_T startpos;
3093         int outsize = 0;
3094         files_struct *fsp;
3095
3096         START_PROFILE(SMBread);
3097
3098         if (req->wct < 3) {
3099                 reply_nterror(req, NT_STATUS_INVALID_PARAMETER);
3100                 END_PROFILE(SMBread);
3101                 return;
3102         }
3103
3104         fsp = file_fsp(req, SVAL(req->vwv+0, 0));
3105
3106         if (!check_fsp(conn, req, fsp)) {
3107                 END_PROFILE(SMBread);
3108                 return;
3109         }
3110
3111         if (!CHECK_READ(fsp,req)) {
3112                 reply_doserror(req, ERRDOS, ERRbadaccess);
3113                 END_PROFILE(SMBread);
3114                 return;
3115         }
3116
3117         numtoread = SVAL(req->vwv+1, 0);
3118         startpos = IVAL_TO_SMB_OFF_T(req->vwv+2, 0);
3119
3120         numtoread = MIN(BUFFER_SIZE-outsize,numtoread);
3121
3122         /*
3123          * The requested read size cannot be greater than max_recv. JRA.
3124          */
3125         if (numtoread > max_recv) {
3126                 DEBUG(0,("reply_read: requested read size (%u) is greater than maximum allowed (%u). \
3127 Returning short read of maximum allowed for compatibility with Windows 2000.\n",
3128                         (unsigned int)numtoread, (unsigned int)max_recv ));
3129                 numtoread = MIN(numtoread,max_recv);
3130         }
3131
3132         reply_outbuf(req, 5, numtoread+3);
3133
3134         data = smb_buf(req->outbuf) + 3;
3135
3136         if (is_locked(fsp, (uint32)req->smbpid, (uint64_t)numtoread,
3137                       (uint64_t)startpos, READ_LOCK)) {
3138                 reply_doserror(req, ERRDOS,ERRlock);
3139                 END_PROFILE(SMBread);
3140                 return;
3141         }
3142
3143         if (numtoread > 0)
3144                 nread = read_file(fsp,data,startpos,numtoread);
3145
3146         if (nread < 0) {
3147                 reply_unixerror(req, ERRDOS,ERRnoaccess);
3148                 END_PROFILE(SMBread);
3149                 return;
3150         }
3151
3152         srv_set_message((char *)req->outbuf, 5, nread+3, False);
3153
3154         SSVAL(req->outbuf,smb_vwv0,nread);
3155         SSVAL(req->outbuf,smb_vwv5,nread+3);
3156         SCVAL(smb_buf(req->outbuf),0,1);
3157         SSVAL(smb_buf(req->outbuf),1,nread);
3158
3159         DEBUG( 3, ( "read fnum=%d num=%d nread=%d\n",
3160                 fsp->fnum, (int)numtoread, (int)nread ) );
3161
3162         END_PROFILE(SMBread);
3163         return;
3164 }
3165
3166 /****************************************************************************
3167  Setup readX header.
3168 ****************************************************************************/
3169
3170 static int setup_readX_header(char *outbuf, size_t smb_maxcnt)
3171 {
3172         int outsize;
3173         char *data;
3174
3175         outsize = srv_set_message(outbuf,12,smb_maxcnt,False);
3176         data = smb_buf(outbuf);
3177
3178         memset(outbuf+smb_vwv0,'\0',24); /* valgrind init. */
3179
3180         SCVAL(outbuf,smb_vwv0,0xFF);
3181         SSVAL(outbuf,smb_vwv2,0xFFFF); /* Remaining - must be -1. */
3182         SSVAL(outbuf,smb_vwv5,smb_maxcnt);
3183         SSVAL(outbuf,smb_vwv6,smb_offset(data,outbuf));
3184         SSVAL(outbuf,smb_vwv7,(smb_maxcnt >> 16));
3185         SSVAL(smb_buf(outbuf),-2,smb_maxcnt);
3186         /* Reset the outgoing length, set_message truncates at 0x1FFFF. */
3187         _smb_setlen_large(outbuf,(smb_size + 12*2 + smb_maxcnt - 4));
3188         return outsize;
3189 }
3190
3191 /****************************************************************************
3192  Reply to a read and X - possibly using sendfile.
3193 ****************************************************************************/
3194
3195 static void send_file_readX(connection_struct *conn, struct smb_request *req,
3196                             files_struct *fsp, SMB_OFF_T startpos,
3197                             size_t smb_maxcnt)
3198 {
3199         SMB_STRUCT_STAT sbuf;
3200         ssize_t nread = -1;
3201
3202         if(SMB_VFS_FSTAT(fsp, &sbuf) == -1) {
3203                 reply_unixerror(req, ERRDOS, ERRnoaccess);
3204                 return;
3205         }
3206
3207         if (startpos > sbuf.st_size) {
3208                 smb_maxcnt = 0;
3209         } else if (smb_maxcnt > (sbuf.st_size - startpos)) {
3210                 smb_maxcnt = (sbuf.st_size - startpos);
3211         }
3212
3213         if (smb_maxcnt == 0) {
3214                 goto normal_read;
3215         }
3216
3217 #if defined(WITH_SENDFILE)
3218         /*
3219          * We can only use sendfile on a non-chained packet
3220          * but we can use on a non-oplocked file. tridge proved this
3221          * on a train in Germany :-). JRA.
3222          */
3223
3224         if ((chain_size == 0) && (CVAL(req->vwv+0, 0) == 0xFF) &&
3225             !is_encrypted_packet(req->inbuf) && (fsp->base_fsp == NULL) &&
3226             lp_use_sendfile(SNUM(conn)) && (fsp->wcp == NULL) ) {
3227                 uint8 headerbuf[smb_size + 12 * 2];
3228                 DATA_BLOB header;
3229
3230                 /*
3231                  * Set up the packet header before send. We
3232                  * assume here the sendfile will work (get the
3233                  * correct amount of data).
3234                  */
3235
3236                 header = data_blob_const(headerbuf, sizeof(headerbuf));
3237
3238                 construct_reply_common_req(req, (char *)headerbuf);
3239                 setup_readX_header((char *)headerbuf, smb_maxcnt);
3240
3241                 if ((nread = SMB_VFS_SENDFILE(smbd_server_fd(), fsp, &header, startpos, smb_maxcnt)) == -1) {
3242                         /* Returning ENOSYS means no data at all was sent.
3243                            Do this as a normal read. */
3244                         if (errno == ENOSYS) {
3245                                 goto normal_read;
3246                         }
3247
3248                         /*
3249                          * Special hack for broken Linux with no working sendfile. If we
3250                          * return EINTR we sent the header but not the rest of the data.
3251                          * Fake this up by doing read/write calls.
3252                          */
3253
3254                         if (errno == EINTR) {
3255                                 /* Ensure we don't do this again. */
3256                                 set_use_sendfile(SNUM(conn), False);
3257                                 DEBUG(0,("send_file_readX: sendfile not available. Faking..\n"));
3258                                 nread = fake_sendfile(fsp, startpos,
3259                                                       smb_maxcnt);
3260                                 if (nread == -1) {
3261                                         DEBUG(0,("send_file_readX: fake_sendfile failed for file %s (%s).\n",
3262                                                 fsp->fsp_name, strerror(errno) ));
3263                                         exit_server_cleanly("send_file_readX: fake_sendfile failed");
3264                                 }
3265                                 DEBUG( 3, ( "send_file_readX: fake_sendfile fnum=%d max=%d nread=%d\n",
3266                                         fsp->fnum, (int)smb_maxcnt, (int)nread ) );
3267                                 /* No outbuf here means successful sendfile. */
3268                                 TALLOC_FREE(req->outbuf);
3269                                 return;
3270                         }
3271
3272                         DEBUG(0,("send_file_readX: sendfile failed for file %s (%s). Terminating\n",
3273                                 fsp->fsp_name, strerror(errno) ));
3274                         exit_server_cleanly("send_file_readX sendfile failed");
3275                 }
3276
3277                 DEBUG( 3, ( "send_file_readX: sendfile fnum=%d max=%d nread=%d\n",
3278                         fsp->fnum, (int)smb_maxcnt, (int)nread ) );
3279
3280                 /* Deal with possible short send. */
3281                 sendfile_short_send(fsp, nread, sizeof(headerbuf), smb_maxcnt);
3282
3283                 /* No outbuf here means successful sendfile. */
3284                 TALLOC_FREE(req->outbuf);
3285                 return;
3286         }
3287 #endif
3288
3289 normal_read:
3290
3291         if ((smb_maxcnt & 0xFF0000) > 0x10000) {
3292                 uint8 headerbuf[smb_size + 2*12];
3293
3294                 construct_reply_common_req(req, (char *)headerbuf);
3295                 setup_readX_header((char *)headerbuf, smb_maxcnt);
3296
3297                 /* Send out the header. */
3298                 if (write_data(smbd_server_fd(), (char *)headerbuf,
3299                                sizeof(headerbuf)) != sizeof(headerbuf)) {
3300                         DEBUG(0,("send_file_readX: write_data failed for file %s (%s). Terminating\n",
3301                                 fsp->fsp_name, strerror(errno) ));
3302                         exit_server_cleanly("send_file_readX sendfile failed");
3303                 }
3304                 nread = fake_sendfile(fsp, startpos, smb_maxcnt);
3305                 if (nread == -1) {
3306                         DEBUG(0,("send_file_readX: fake_sendfile failed for file %s (%s).\n",
3307                                 fsp->fsp_name, strerror(errno) ));
3308                         exit_server_cleanly("send_file_readX: fake_sendfile failed");
3309                 }
3310                 TALLOC_FREE(req->outbuf);
3311                 return;
3312         }
3313
3314         reply_outbuf(req, 12, smb_maxcnt);
3315
3316         nread = read_file(fsp, smb_buf(req->outbuf), startpos, smb_maxcnt);
3317         if (nread < 0) {
3318                 reply_unixerror(req, ERRDOS, ERRnoaccess);
3319                 return;
3320         }
3321
3322         setup_readX_header((char *)req->outbuf, nread);
3323
3324         DEBUG( 3, ( "send_file_readX fnum=%d max=%d nread=%d\n",
3325                     fsp->fnum, (int)smb_maxcnt, (int)nread ) );
3326
3327         chain_reply(req);
3328 }
3329
3330 /****************************************************************************
3331  Reply to a read and X.
3332 ****************************************************************************/
3333
3334 void reply_read_and_X(struct smb_request *req)
3335 {
3336         connection_struct *conn = req->conn;
3337         files_struct *fsp;
3338         SMB_OFF_T startpos;
3339         size_t smb_maxcnt;
3340         bool big_readX = False;
3341 #if 0
3342         size_t smb_mincnt = SVAL(req->vwv+6, 0);
3343 #endif
3344
3345         START_PROFILE(SMBreadX);
3346
3347         if ((req->wct != 10) && (req->wct != 12)) {
3348                 reply_nterror(req, NT_STATUS_INVALID_PARAMETER);
3349                 return;
3350         }
3351
3352         fsp = file_fsp(req, SVAL(req->vwv+2, 0));
3353         startpos = IVAL_TO_SMB_OFF_T(req->vwv+3, 0);
3354         smb_maxcnt = SVAL(req->vwv+5, 0);
3355
3356         /* If it's an IPC, pass off the pipe handler. */
3357         if (IS_IPC(conn)) {
3358                 reply_pipe_read_and_X(req);
3359                 END_PROFILE(SMBreadX);
3360                 return;
3361         }
3362
3363         if (!check_fsp(conn, req, fsp)) {
3364                 END_PROFILE(SMBreadX);
3365                 return;
3366         }
3367
3368         if (!CHECK_READ(fsp,req)) {
3369                 reply_doserror(req, ERRDOS,ERRbadaccess);
3370                 END_PROFILE(SMBreadX);
3371                 return;
3372         }
3373
3374         if (global_client_caps & CAP_LARGE_READX) {
3375                 size_t upper_size = SVAL(req->vwv+7, 0);
3376                 smb_maxcnt |= (upper_size<<16);
3377                 if (upper_size > 1) {
3378                         /* Can't do this on a chained packet. */
3379                         if ((CVAL(req->vwv+0, 0) != 0xFF)) {
3380                                 reply_nterror(req, NT_STATUS_NOT_SUPPORTED);
3381                                 END_PROFILE(SMBreadX);
3382                                 return;
3383                         }
3384                         /* We currently don't do this on signed or sealed data. */
3385                         if (srv_is_signing_active() || is_encrypted_packet(req->inbuf)) {
3386                                 reply_nterror(req, NT_STATUS_NOT_SUPPORTED);
3387                                 END_PROFILE(SMBreadX);
3388                                 return;
3389                         }
3390                         /* Is there room in the reply for this data ? */
3391                         if (smb_maxcnt > (0xFFFFFF - (smb_size -4 + 12*2)))  {
3392                                 reply_nterror(req,
3393                                               NT_STATUS_INVALID_PARAMETER);
3394                                 END_PROFILE(SMBreadX);
3395                                 return;
3396                         }
3397                         big_readX = True;
3398                 }
3399         }
3400
3401         if (req->wct == 12) {
3402 #ifdef LARGE_SMB_OFF_T
3403                 /*
3404                  * This is a large offset (64 bit) read.
3405                  */
3406                 startpos |= (((SMB_OFF_T)IVAL(req->vwv+10, 0)) << 32);
3407
3408 #else /* !LARGE_SMB_OFF_T */
3409
3410                 /*
3411                  * Ensure we haven't been sent a >32 bit offset.
3412                  */
3413
3414                 if(IVAL(req->vwv+10, 0) != 0) {
3415                         DEBUG(0,("reply_read_and_X - large offset (%x << 32) "
3416                                  "used and we don't support 64 bit offsets.\n",
3417                                  (unsigned int)IVAL(req->vwv+10, 0) ));
3418                         END_PROFILE(SMBreadX);
3419                         reply_doserror(req, ERRDOS, ERRbadaccess);
3420                         return;
3421                 }
3422
3423 #endif /* LARGE_SMB_OFF_T */
3424
3425         }
3426
3427         if (is_locked(fsp, (uint32)req->smbpid, (uint64_t)smb_maxcnt,
3428                       (uint64_t)startpos, READ_LOCK)) {
3429                 END_PROFILE(SMBreadX);
3430                 reply_doserror(req, ERRDOS, ERRlock);
3431                 return;
3432         }
3433
3434         if (!big_readX &&
3435             schedule_aio_read_and_X(conn, req, fsp, startpos, smb_maxcnt)) {
3436                 END_PROFILE(SMBreadX);
3437                 return;
3438         }
3439
3440         send_file_readX(conn, req, fsp, startpos, smb_maxcnt);
3441
3442         END_PROFILE(SMBreadX);
3443         return;
3444 }
3445
3446 /****************************************************************************
3447  Error replies to writebraw must have smb_wct == 1. Fix this up.
3448 ****************************************************************************/
3449
3450 void error_to_writebrawerr(struct smb_request *req)
3451 {
3452         uint8 *old_outbuf = req->outbuf;
3453
3454         reply_outbuf(req, 1, 0);
3455
3456         memcpy(req->outbuf, old_outbuf, smb_size);
3457         TALLOC_FREE(old_outbuf);
3458 }
3459
3460 /****************************************************************************
3461  Reply to a writebraw (core+ or LANMAN1.0 protocol).
3462 ****************************************************************************/
3463
3464 void reply_writebraw(struct smb_request *req)
3465 {
3466         connection_struct *conn = req->conn;
3467         char *buf = NULL;
3468         ssize_t nwritten=0;
3469         ssize_t total_written=0;
3470         size_t numtowrite=0;
3471         size_t tcount;
3472         SMB_OFF_T startpos;
3473         char *data=NULL;
3474         bool write_through;
3475         files_struct *fsp;
3476         NTSTATUS status;
3477
3478         START_PROFILE(SMBwritebraw);
3479
3480         /*
3481          * If we ever reply with an error, it must have the SMB command
3482          * type of SMBwritec, not SMBwriteBraw, as this tells the client
3483          * we're finished.
3484          */
3485         SCVAL(req->inbuf,smb_com,SMBwritec);
3486
3487         if (srv_is_signing_active()) {
3488                 END_PROFILE(SMBwritebraw);
3489                 exit_server_cleanly("reply_writebraw: SMB signing is active - "
3490                                 "raw reads/writes are disallowed.");
3491         }
3492
3493         if (req->wct < 12) {
3494                 reply_nterror(req, NT_STATUS_INVALID_PARAMETER);
3495                 error_to_writebrawerr(req);
3496                 END_PROFILE(SMBwritebraw);
3497                 return;
3498         }
3499
3500         fsp = file_fsp(req, SVAL(req->vwv+0, 0));
3501         if (!check_fsp(conn, req, fsp)) {
3502                 error_to_writebrawerr(req);
3503                 END_PROFILE(SMBwritebraw);
3504                 return;
3505         }
3506
3507         if (!CHECK_WRITE(fsp)) {
3508                 reply_doserror(req, ERRDOS, ERRbadaccess);
3509                 error_to_writebrawerr(req);
3510                 END_PROFILE(SMBwritebraw);
3511                 return;
3512         }
3513
3514         tcount = IVAL(req->vwv+1, 0);
3515         startpos = IVAL_TO_SMB_OFF_T(req->vwv+3, 0);
3516         write_through = BITSETW(req->vwv+7,0);
3517
3518         /* We have to deal with slightly different formats depending
3519                 on whether we are using the core+ or lanman1.0 protocol */
3520
3521         if(Protocol <= PROTOCOL_COREPLUS) {
3522                 numtowrite = SVAL(smb_buf(req->inbuf),-2);
3523                 data = smb_buf(req->inbuf);
3524         } else {
3525                 numtowrite = SVAL(req->vwv+10, 0);
3526                 data = smb_base(req->inbuf) + SVAL(req->vwv+11, 0);
3527         }
3528
3529         /* Ensure we don't write bytes past the end of this packet. */
3530         if (data + numtowrite > smb_base(req->inbuf) + smb_len(req->inbuf)) {
3531                 reply_nterror(req, NT_STATUS_INVALID_PARAMETER);
3532                 error_to_writebrawerr(req);
3533                 END_PROFILE(SMBwritebraw);
3534                 return;
3535         }
3536
3537         if (is_locked(fsp,(uint32)req->smbpid,(uint64_t)tcount,
3538                                 (uint64_t)startpos, WRITE_LOCK)) {
3539                 reply_doserror(req, ERRDOS, ERRlock);
3540                 error_to_writebrawerr(req);
3541                 END_PROFILE(SMBwritebraw);
3542                 return;
3543         }
3544
3545         if (numtowrite>0) {
3546                 nwritten = write_file(req,fsp,data,startpos,numtowrite);
3547         }
3548
3549         DEBUG(3,("reply_writebraw: initial write fnum=%d start=%.0f num=%d "
3550                         "wrote=%d sync=%d\n",
3551                 fsp->fnum, (double)startpos, (int)numtowrite,
3552                 (int)nwritten, (int)write_through));
3553
3554         if (nwritten < (ssize_t)numtowrite)  {
3555                 reply_unixerror(req, ERRHRD, ERRdiskfull);
3556                 error_to_writebrawerr(req);
3557                 END_PROFILE(SMBwritebraw);
3558                 return;
3559         }
3560
3561         total_written = nwritten;
3562
3563         /* Allocate a buffer of 64k + length. */
3564         buf = TALLOC_ARRAY(NULL, char, 65540);
3565         if (!buf) {
3566                 reply_doserror(req, ERRDOS, ERRnomem);
3567                 error_to_writebrawerr(req);
3568                 END_PROFILE(SMBwritebraw);
3569                 return;
3570         }
3571
3572         /* Return a SMBwritebraw message to the redirector to tell
3573          * it to send more bytes */
3574
3575         memcpy(buf, req->inbuf, smb_size);
3576         srv_set_message(buf,Protocol>PROTOCOL_COREPLUS?1:0,0,True);
3577         SCVAL(buf,smb_com,SMBwritebraw);
3578         SSVALS(buf,smb_vwv0,0xFFFF);
3579         show_msg(buf);
3580         if (!srv_send_smb(smbd_server_fd(),
3581                         buf,
3582                         IS_CONN_ENCRYPTED(conn))) {
3583                 exit_server_cleanly("reply_writebraw: srv_send_smb "
3584                         "failed.");
3585         }
3586
3587         /* Now read the raw data into the buffer and write it */
3588         status = read_smb_length(smbd_server_fd(), buf, SMB_SECONDARY_WAIT,
3589                                  &numtowrite);
3590         if (!NT_STATUS_IS_OK(status)) {
3591                 exit_server_cleanly("secondary writebraw failed");
3592         }
3593
3594         /* Set up outbuf to return the correct size */
3595         reply_outbuf(req, 1, 0);
3596
3597         if (numtowrite != 0) {
3598
3599                 if (numtowrite > 0xFFFF) {
3600                         DEBUG(0,("reply_writebraw: Oversize secondary write "
3601                                 "raw requested (%u). Terminating\n",
3602                                 (unsigned int)numtowrite ));
3603                         exit_server_cleanly("secondary writebraw failed");
3604                 }
3605
3606                 if (tcount > nwritten+numtowrite) {
3607                         DEBUG(3,("reply_writebraw: Client overestimated the "
3608                                 "write %d %d %d\n",
3609                                 (int)tcount,(int)nwritten,(int)numtowrite));
3610                 }
3611
3612                 status = read_data(smbd_server_fd(), buf+4, numtowrite);
3613
3614                 if (!NT_STATUS_IS_OK(status)) {
3615                         DEBUG(0,("reply_writebraw: Oversize secondary write "
3616                                  "raw read failed (%s). Terminating\n",
3617                                  nt_errstr(status)));
3618                         exit_server_cleanly("secondary writebraw failed");
3619                 }
3620
3621                 nwritten = write_file(req,fsp,buf+4,startpos+nwritten,numtowrite);
3622                 if (nwritten == -1) {
3623                         TALLOC_FREE(buf);
3624                         reply_unixerror(req, ERRHRD, ERRdiskfull);
3625                         error_to_writebrawerr(req);
3626                         END_PROFILE(SMBwritebraw);
3627                         return;
3628                 }
3629
3630                 if (nwritten < (ssize_t)numtowrite) {
3631                         SCVAL(req->outbuf,smb_rcls,ERRHRD);
3632                         SSVAL(req->outbuf,smb_err,ERRdiskfull);
3633                 }
3634
3635                 if (nwritten > 0) {
3636                         total_written += nwritten;
3637                 }
3638         }
3639
3640         TALLOC_FREE(buf);
3641         SSVAL(req->outbuf,smb_vwv0,total_written);
3642
3643         status = sync_file(conn, fsp, write_through);
3644         if (!NT_STATUS_IS_OK(status)) {
3645                 DEBUG(5,("reply_writebraw: sync_file for %s returned %s\n",
3646                         fsp->fsp_name, nt_errstr(status) ));
3647                 reply_nterror(req, status);
3648                 error_to_writebrawerr(req);
3649                 END_PROFILE(SMBwritebraw);
3650                 return;
3651         }
3652
3653         DEBUG(3,("reply_writebraw: secondart write fnum=%d start=%.0f num=%d "
3654                 "wrote=%d\n",
3655                 fsp->fnum, (double)startpos, (int)numtowrite,
3656                 (int)total_written));
3657
3658         /* We won't return a status if write through is not selected - this
3659          * follows what WfWg does */
3660         END_PROFILE(SMBwritebraw);
3661
3662         if (!write_through && total_written==tcount) {
3663
3664 #if RABBIT_PELLET_FIX
3665                 /*
3666                  * Fix for "rabbit pellet" mode, trigger an early TCP ack by
3667                  * sending a SMBkeepalive. Thanks to DaveCB at Sun for this.
3668                  * JRA.
3669                  */
3670                 if (!send_keepalive(smbd_server_fd())) {
3671                         exit_server_cleanly("reply_writebraw: send of "
3672                                 "keepalive failed");
3673                 }
3674 #endif
3675                 TALLOC_FREE(req->outbuf);
3676         }
3677         return;
3678 }
3679
3680 #undef DBGC_CLASS
3681 #define DBGC_CLASS DBGC_LOCKING
3682
3683 /****************************************************************************
3684  Reply to a writeunlock (core+).
3685 ****************************************************************************/
3686
3687 void reply_writeunlock(struct smb_request *req)
3688 {
3689         connection_struct *conn = req->conn;
3690         ssize_t nwritten = -1;
3691         size_t numtowrite;
3692         SMB_OFF_T startpos;
3693         const char *data;
3694         NTSTATUS status = NT_STATUS_OK;
3695         files_struct *fsp;
3696
3697         START_PROFILE(SMBwriteunlock);
3698
3699         if (req->wct < 5) {
3700                 reply_nterror(req, NT_STATUS_INVALID_PARAMETER);
3701                 END_PROFILE(SMBwriteunlock);
3702                 return;
3703         }
3704
3705         fsp = file_fsp(req, SVAL(req->vwv+0, 0));
3706
3707         if (!check_fsp(conn, req, fsp)) {
3708                 END_PROFILE(SMBwriteunlock);
3709                 return;
3710         }
3711
3712         if (!CHECK_WRITE(fsp)) {
3713                 reply_doserror(req, ERRDOS,ERRbadaccess);
3714                 END_PROFILE(SMBwriteunlock);
3715                 return;
3716         }
3717
3718         numtowrite = SVAL(req->vwv+1, 0);
3719         startpos = IVAL_TO_SMB_OFF_T(req->vwv+2, 0);
3720         data = (const char *)req->buf + 3;
3721
3722         if (numtowrite
3723             && is_locked(fsp, (uint32)req->smbpid, (uint64_t)numtowrite,
3724                          (uint64_t)startpos, WRITE_LOCK)) {
3725                 reply_doserror(req, ERRDOS, ERRlock);
3726                 END_PROFILE(SMBwriteunlock);
3727                 return;
3728         }
3729
3730         /* The special X/Open SMB protocol handling of
3731            zero length writes is *NOT* done for
3732            this call */
3733         if(numtowrite == 0) {
3734                 nwritten = 0;
3735         } else {
3736                 nwritten = write_file(req,fsp,data,startpos,numtowrite);
3737         }
3738
3739         status = sync_file(conn, fsp, False /* write through */);
3740         if (!NT_STATUS_IS_OK(status)) {
3741                 DEBUG(5,("reply_writeunlock: sync_file for %s returned %s\n",
3742                         fsp->fsp_name, nt_errstr(status) ));
3743                 reply_nterror(req, status);
3744                 END_PROFILE(SMBwriteunlock);
3745                 return;
3746         }
3747
3748         if(((nwritten < numtowrite) && (numtowrite != 0))||(nwritten < 0)) {
3749                 reply_unixerror(req, ERRHRD, ERRdiskfull);
3750                 END_PROFILE(SMBwriteunlock);
3751                 return;
3752         }
3753
3754         if (numtowrite) {
3755                 status = do_unlock(smbd_messaging_context(),
3756                                 fsp,
3757                                 req->smbpid,
3758                                 (uint64_t)numtowrite, 
3759                                 (uint64_t)startpos,
3760                                 WINDOWS_LOCK);
3761
3762                 if (NT_STATUS_V(status)) {
3763                         reply_nterror(req, status);
3764                         END_PROFILE(SMBwriteunlock);
3765                         return;
3766                 }
3767         }
3768
3769         reply_outbuf(req, 1, 0);
3770
3771         SSVAL(req->outbuf,smb_vwv0,nwritten);
3772
3773         DEBUG(3,("writeunlock fnum=%d num=%d wrote=%d\n",
3774                  fsp->fnum, (int)numtowrite, (int)nwritten));
3775
3776         END_PROFILE(SMBwriteunlock);
3777         return;
3778 }
3779
3780 #undef DBGC_CLASS
3781 #define DBGC_CLASS DBGC_ALL
3782
3783 /****************************************************************************
3784  Reply to a write.
3785 ****************************************************************************/
3786
3787 void reply_write(struct smb_request *req)
3788 {
3789         connection_struct *conn = req->conn;
3790         size_t numtowrite;
3791         ssize_t nwritten = -1;
3792         SMB_OFF_T startpos;
3793         const char *data;
3794         files_struct *fsp;
3795         NTSTATUS status;
3796
3797         START_PROFILE(SMBwrite);
3798
3799         if (req->wct < 5) {
3800                 END_PROFILE(SMBwrite);
3801                 reply_nterror(req, NT_STATUS_INVALID_PARAMETER);
3802                 return;
3803         }
3804
3805         /* If it's an IPC, pass off the pipe handler. */
3806         if (IS_IPC(conn)) {
3807                 reply_pipe_write(req);
3808                 END_PROFILE(SMBwrite);
3809                 return;
3810         }
3811
3812         fsp = file_fsp(req, SVAL(req->vwv+0, 0));
3813
3814         if (!check_fsp(conn, req, fsp)) {
3815                 END_PROFILE(SMBwrite);
3816                 return;
3817         }
3818
3819         if (!CHECK_WRITE(fsp)) {
3820                 reply_doserror(req, ERRDOS, ERRbadaccess);
3821                 END_PROFILE(SMBwrite);
3822                 return;
3823         }
3824
3825         numtowrite = SVAL(req->vwv+1, 0);
3826         startpos = IVAL_TO_SMB_OFF_T(req->vwv+2, 0);
3827         data = (const char *)req->buf + 3;
3828
3829         if (is_locked(fsp, (uint32)req->smbpid, (uint64_t)numtowrite,
3830                       (uint64_t)startpos, WRITE_LOCK)) {
3831                 reply_doserror(req, ERRDOS, ERRlock);
3832                 END_PROFILE(SMBwrite);
3833                 return;
3834         }
3835
3836         /*
3837          * X/Open SMB protocol says that if smb_vwv1 is
3838          * zero then the file size should be extended or
3839          * truncated to the size given in smb_vwv[2-3].
3840          */
3841
3842         if(numtowrite == 0) {
3843                 /*
3844                  * This is actually an allocate call, and set EOF. JRA.
3845                  */
3846                 nwritten = vfs_allocate_file_space(fsp, (SMB_OFF_T)startpos);
3847                 if (nwritten < 0) {
3848                         reply_nterror(req, NT_STATUS_DISK_FULL);
3849                         END_PROFILE(SMBwrite);
3850                         return;
3851                 }
3852                 nwritten = vfs_set_filelen(fsp, (SMB_OFF_T)startpos);
3853                 if (nwritten < 0) {
3854                         reply_nterror(req, NT_STATUS_DISK_FULL);
3855                         END_PROFILE(SMBwrite);
3856                         return;
3857                 }
3858                 trigger_write_time_update_immediate(fsp);
3859         } else {
3860                 nwritten = write_file(req,fsp,data,startpos,numtowrite);
3861         }
3862
3863         status = sync_file(conn, fsp, False);
3864         if (!NT_STATUS_IS_OK(status)) {
3865                 DEBUG(5,("reply_write: sync_file for %s returned %s\n",
3866                         fsp->fsp_name, nt_errstr(status) ));
3867                 reply_nterror(req, status);
3868                 END_PROFILE(SMBwrite);
3869                 return;
3870         }
3871
3872         if(((nwritten == 0) && (numtowrite != 0))||(nwritten < 0)) {
3873                 reply_unixerror(req, ERRHRD, ERRdiskfull);
3874                 END_PROFILE(SMBwrite);
3875                 return;
3876         }
3877
3878         reply_outbuf(req, 1, 0);
3879
3880         SSVAL(req->outbuf,smb_vwv0,nwritten);
3881
3882         if (nwritten < (ssize_t)numtowrite) {
3883                 SCVAL(req->outbuf,smb_rcls,ERRHRD);
3884                 SSVAL(req->outbuf,smb_err,ERRdiskfull);
3885         }
3886
3887         DEBUG(3,("write fnum=%d num=%d wrote=%d\n", fsp->fnum, (int)numtowrite, (int)nwritten));
3888
3889         END_PROFILE(SMBwrite);
3890         return;
3891 }
3892
3893 /****************************************************************************
3894  Ensure a buffer is a valid writeX for recvfile purposes.
3895 ****************************************************************************/
3896
3897 #define STANDARD_WRITE_AND_X_HEADER_SIZE (smb_size - 4 + /* basic header */ \
3898                                                 (2*14) + /* word count (including bcc) */ \
3899                                                 1 /* pad byte */)
3900
3901 bool is_valid_writeX_buffer(const uint8_t *inbuf)
3902 {
3903         size_t numtowrite;
3904         connection_struct *conn = NULL;
3905         unsigned int doff = 0;
3906         size_t len = smb_len_large(inbuf);
3907
3908         if (is_encrypted_packet(inbuf)) {
3909                 /* Can't do this on encrypted
3910                  * connections. */
3911                 return false;
3912         }
3913
3914         if (CVAL(inbuf,smb_com) != SMBwriteX) {
3915                 return false;
3916         }
3917
3918         if (CVAL(inbuf,smb_vwv0) != 0xFF ||
3919                         CVAL(inbuf,smb_wct) != 14) {
3920                 DEBUG(10,("is_valid_writeX_buffer: chained or "
3921                         "invalid word length.\n"));
3922                 return false;
3923         }
3924
3925         conn = conn_find(SVAL(inbuf, smb_tid));
3926         if (conn == NULL) {
3927                 DEBUG(10,("is_valid_writeX_buffer: bad tid\n"));
3928                 return false;
3929         }
3930         if (IS_IPC(conn)) {
3931                 DEBUG(10,("is_valid_writeX_buffer: IPC$ tid\n"));
3932                 return false;
3933         }
3934         if (IS_PRINT(conn)) {
3935                 DEBUG(10,("is_valid_writeX_buffer: printing tid\n"));
3936                 return false;
3937         }
3938         doff = SVAL(inbuf,smb_vwv11);
3939
3940         numtowrite = SVAL(inbuf,smb_vwv10);
3941
3942         if (len > doff && len - doff > 0xFFFF) {
3943                 numtowrite |= (((size_t)SVAL(inbuf,smb_vwv9))<<16);
3944         }
3945
3946         if (numtowrite == 0) {
3947                 DEBUG(10,("is_valid_writeX_buffer: zero write\n"));
3948                 return false;
3949         }
3950
3951         /* Ensure the sizes match up. */
3952         if (doff < STANDARD_WRITE_AND_X_HEADER_SIZE) {
3953                 /* no pad byte...old smbclient :-( */
3954                 DEBUG(10,("is_valid_writeX_buffer: small doff %u (min %u)\n",
3955                         (unsigned int)doff,
3956                         (unsigned int)STANDARD_WRITE_AND_X_HEADER_SIZE));
3957                 return false;
3958         }
3959
3960         if (len - doff != numtowrite) {
3961                 DEBUG(10,("is_valid_writeX_buffer: doff mismatch "
3962                         "len = %u, doff = %u, numtowrite = %u\n",
3963                         (unsigned int)len,
3964                         (unsigned int)doff,
3965                         (unsigned int)numtowrite ));
3966                 return false;
3967         }
3968
3969         DEBUG(10,("is_valid_writeX_buffer: true "
3970                 "len = %u, doff = %u, numtowrite = %u\n",
3971                 (unsigned int)len,
3972                 (unsigned int)doff,
3973                 (unsigned int)numtowrite ));
3974
3975         return true;
3976 }
3977
3978 /****************************************************************************
3979  Reply to a write and X.
3980 ****************************************************************************/
3981
3982 void reply_write_and_X(struct smb_request *req)
3983 {
3984         connection_struct *conn = req->conn;
3985         files_struct *fsp;
3986         SMB_OFF_T startpos;
3987         size_t numtowrite;
3988         bool write_through;
3989         ssize_t nwritten;
3990         unsigned int smb_doff;
3991         unsigned int smblen;
3992         char *data;
3993         NTSTATUS status;
3994
3995         START_PROFILE(SMBwriteX);
3996
3997         if ((req->wct != 12) && (req->wct != 14)) {
3998                 reply_nterror(req, NT_STATUS_INVALID_PARAMETER);
3999                 END_PROFILE(SMBwriteX);
4000                 return;
4001         }
4002
4003         numtowrite = SVAL(req->vwv+10, 0);
4004         smb_doff = SVAL(req->vwv+11, 0);
4005         smblen = smb_len(req->inbuf);
4006
4007         if (req->unread_bytes > 0xFFFF ||
4008                         (smblen > smb_doff &&
4009                                 smblen - smb_doff > 0xFFFF)) {
4010                 numtowrite |= (((size_t)SVAL(req->vwv+9, 0))<<16);
4011         }
4012
4013         if (req->unread_bytes) {
4014                 /* Can't do a recvfile write on IPC$ */
4015                 if (IS_IPC(conn)) {
4016                         reply_nterror(req, NT_STATUS_INVALID_PARAMETER);
4017                         END_PROFILE(SMBwriteX);
4018                         return;
4019                 }
4020                 if (numtowrite != req->unread_bytes) {
4021                         reply_doserror(req, ERRDOS, ERRbadmem);
4022                         END_PROFILE(SMBwriteX);
4023                         return;
4024                 }
4025         } else {
4026                 if (smb_doff > smblen || smb_doff + numtowrite < numtowrite ||
4027                                 smb_doff + numtowrite > smblen) {
4028                         reply_doserror(req, ERRDOS, ERRbadmem);
4029                         END_PROFILE(SMBwriteX);
4030                         return;
4031                 }
4032         }
4033
4034         /* If it's an IPC, pass off the pipe handler. */
4035         if (IS_IPC(conn)) {
4036                 if (req->unread_bytes) {
4037                         reply_doserror(req, ERRDOS, ERRbadmem);
4038                         END_PROFILE(SMBwriteX);
4039                         return;
4040                 }
4041                 reply_pipe_write_and_X(req);
4042                 END_PROFILE(SMBwriteX);
4043                 return;
4044         }
4045
4046         fsp = file_fsp(req, SVAL(req->vwv+2, 0));
4047         startpos = IVAL_TO_SMB_OFF_T(req->vwv+3, 0);
4048         write_through = BITSETW(req->vwv+7,0);
4049
4050         if (!check_fsp(conn, req, fsp)) {
4051                 END_PROFILE(SMBwriteX);
4052                 return;
4053         }
4054
4055         if (!CHECK_WRITE(fsp)) {
4056                 reply_doserror(req, ERRDOS, ERRbadaccess);
4057                 END_PROFILE(SMBwriteX);
4058                 return;
4059         }
4060
4061         data = smb_base(req->inbuf) + smb_doff;
4062
4063         if(req->wct == 14) {
4064 #ifdef LARGE_SMB_OFF_T
4065                 /*
4066                  * This is a large offset (64 bit) write.
4067                  */
4068                 startpos |= (((SMB_OFF_T)IVAL(req->vwv+12, 0)) << 32);
4069
4070 #else /* !LARGE_SMB_OFF_T */
4071
4072                 /*
4073                  * Ensure we haven't been sent a >32 bit offset.
4074                  */
4075
4076                 if(IVAL(req->vwv+12, 0) != 0) {
4077                         DEBUG(0,("reply_write_and_X - large offset (%x << 32) "
4078                                  "used and we don't support 64 bit offsets.\n",
4079                                  (unsigned int)IVAL(req->vwv+12, 0) ));
4080                         reply_doserror(req, ERRDOS, ERRbadaccess);
4081                         END_PROFILE(SMBwriteX);
4082                         return;
4083                 }
4084
4085 #endif /* LARGE_SMB_OFF_T */
4086         }
4087
4088         if (is_locked(fsp,(uint32)req->smbpid,
4089                       (uint64_t)numtowrite,
4090                       (uint64_t)startpos, WRITE_LOCK)) {
4091                 reply_doserror(req, ERRDOS, ERRlock);
4092                 END_PROFILE(SMBwriteX);
4093                 return;
4094         }
4095
4096         /* X/Open SMB protocol says that, unlike SMBwrite
4097         if the length is zero then NO truncation is
4098         done, just a write of zero. To truncate a file,
4099         use SMBwrite. */
4100
4101         if(numtowrite == 0) {
4102                 nwritten = 0;
4103         } else {
4104
4105                 if ((req->unread_bytes == 0) &&
4106                     schedule_aio_write_and_X(conn, req, fsp, data, startpos,
4107                                              numtowrite)) {
4108                         END_PROFILE(SMBwriteX);
4109                         return;
4110                 }
4111
4112                 nwritten = write_file(req,fsp,data,startpos,numtowrite);
4113         }
4114
4115         if(((nwritten == 0) && (numtowrite != 0))||(nwritten < 0)) {
4116                 reply_unixerror(req, ERRHRD, ERRdiskfull);
4117                 END_PROFILE(SMBwriteX);
4118                 return;
4119         }
4120
4121         reply_outbuf(req, 6, 0);
4122         SSVAL(req->outbuf,smb_vwv2,nwritten);
4123         SSVAL(req->outbuf,smb_vwv4,nwritten>>16);
4124
4125         if (nwritten < (ssize_t)numtowrite) {
4126                 SCVAL(req->outbuf,smb_rcls,ERRHRD);
4127                 SSVAL(req->outbuf,smb_err,ERRdiskfull);
4128         }
4129
4130         DEBUG(3,("writeX fnum=%d num=%d wrote=%d\n",
4131                 fsp->fnum, (int)numtowrite, (int)nwritten));
4132
4133         status = sync_file(conn, fsp, write_through);
4134         if (!NT_STATUS_IS_OK(status)) {
4135                 DEBUG(5,("reply_write_and_X: sync_file for %s returned %s\n",
4136                         fsp->fsp_name, nt_errstr(status) ));
4137                 reply_nterror(req, status);
4138                 END_PROFILE(SMBwriteX);
4139                 return;
4140         }
4141
4142         END_PROFILE(SMBwriteX);
4143         chain_reply(req);
4144         return;
4145 }
4146
4147 /****************************************************************************
4148  Reply to a lseek.
4149 ****************************************************************************/
4150
4151 void reply_lseek(struct smb_request *req)
4152 {
4153         connection_struct *conn = req->conn;
4154         SMB_OFF_T startpos;
4155         SMB_OFF_T res= -1;
4156         int mode,umode;
4157         files_struct *fsp;
4158
4159         START_PROFILE(SMBlseek);
4160
4161         if (req->wct < 4) {
4162                 reply_nterror(req, NT_STATUS_INVALID_PARAMETER);
4163                 END_PROFILE(SMBlseek);
4164                 return;
4165         }
4166
4167         fsp = file_fsp(req, SVAL(req->vwv+0, 0));
4168
4169         if (!check_fsp(conn, req, fsp)) {
4170                 return;
4171         }
4172
4173         flush_write_cache(fsp, SEEK_FLUSH);
4174
4175         mode = SVAL(req->vwv+1, 0) & 3;
4176         /* NB. This doesn't use IVAL_TO_SMB_OFF_T as startpos can be signed in this case. */
4177         startpos = (SMB_OFF_T)IVALS(req->vwv+2, 0);
4178
4179         switch (mode) {
4180                 case 0:
4181                         umode = SEEK_SET;
4182                         res = startpos;
4183                         break;
4184                 case 1:
4185                         umode = SEEK_CUR;
4186                         res = fsp->fh->pos + startpos;
4187                         break;
4188                 case 2:
4189                         umode = SEEK_END;
4190                         break;
4191                 default:
4192                         umode = SEEK_SET;
4193                         res = startpos;
4194                         break;
4195         }
4196
4197         if (umode == SEEK_END) {
4198                 if((res = SMB_VFS_LSEEK(fsp,startpos,umode)) == -1) {
4199                         if(errno == EINVAL) {
4200                                 SMB_OFF_T current_pos = startpos;
4201                                 SMB_STRUCT_STAT sbuf;
4202
4203                                 if(SMB_VFS_FSTAT(fsp, &sbuf) == -1) {
4204                                         reply_unixerror(req, ERRDOS,
4205                                                         ERRnoaccess);
4206                                         END_PROFILE(SMBlseek);
4207                                         return;
4208                                 }
4209
4210                                 current_pos += sbuf.st_size;
4211                                 if(current_pos < 0)
4212                                         res = SMB_VFS_LSEEK(fsp,0,SEEK_SET);
4213                         }
4214                 }
4215
4216                 if(res == -1) {
4217                         reply_unixerror(req, ERRDOS, ERRnoaccess);
4218                         END_PROFILE(SMBlseek);
4219                         return;
4220                 }
4221         }
4222
4223         fsp->fh->pos = res;
4224
4225         reply_outbuf(req, 2, 0);
4226         SIVAL(req->outbuf,smb_vwv0,res);
4227
4228         DEBUG(3,("lseek fnum=%d ofs=%.0f newpos = %.0f mode=%d\n",
4229                 fsp->fnum, (double)startpos, (double)res, mode));
4230
4231         END_PROFILE(SMBlseek);
4232         return;
4233 }
4234
4235 /****************************************************************************
4236  Reply to a flush.
4237 ****************************************************************************/
4238
4239 void reply_flush(struct smb_request *req)
4240 {
4241         connection_struct *conn = req->conn;
4242         uint16 fnum;
4243         files_struct *fsp;
4244
4245         START_PROFILE(SMBflush);
4246
4247         if (req->wct < 1) {
4248                 reply_nterror(req, NT_STATUS_INVALID_PARAMETER);
4249                 return;
4250         }
4251
4252         fnum = SVAL(req->vwv+0, 0);
4253         fsp = file_fsp(req, fnum);
4254
4255         if ((fnum != 0xFFFF) && !check_fsp(conn, req, fsp)) {
4256                 return;
4257         }
4258
4259         if (!fsp) {
4260                 file_sync_all(conn);
4261         } else {
4262                 NTSTATUS status = sync_file(conn, fsp, True);
4263                 if (!NT_STATUS_IS_OK(status)) {
4264                         DEBUG(5,("reply_flush: sync_file for %s returned %s\n",
4265                                 fsp->fsp_name, nt_errstr(status) ));
4266                         reply_nterror(req, status);
4267                         END_PROFILE(SMBflush);
4268                         return;
4269                 }
4270         }
4271
4272         reply_outbuf(req, 0, 0);
4273
4274         DEBUG(3,("flush\n"));
4275         END_PROFILE(SMBflush);
4276         return;
4277 }
4278
4279 /****************************************************************************
4280  Reply to a exit.
4281  conn POINTER CAN BE NULL HERE !
4282 ****************************************************************************/
4283
4284 void reply_exit(struct smb_request *req)
4285 {
4286         START_PROFILE(SMBexit);
4287
4288         file_close_pid(req->smbpid, req->vuid);
4289
4290         reply_outbuf(req, 0, 0);
4291
4292         DEBUG(3,("exit\n"));
4293
4294         END_PROFILE(SMBexit);
4295         return;
4296 }
4297
4298 /****************************************************************************
4299  Reply to a close - has to deal with closing a directory opened by NT SMB's.
4300 ****************************************************************************/
4301
4302 void reply_close(struct smb_request *req)
4303 {
4304         connection_struct *conn = req->conn;
4305         NTSTATUS status = NT_STATUS_OK;
4306         files_struct *fsp = NULL;
4307         START_PROFILE(SMBclose);
4308
4309         if (req->wct < 3) {
4310                 reply_nterror(req, NT_STATUS_INVALID_PARAMETER);
4311                 END_PROFILE(SMBclose);
4312                 return;
4313         }
4314
4315         fsp = file_fsp(req, SVAL(req->vwv+0, 0));
4316
4317         /*
4318          * We can only use check_fsp if we know it's not a directory.
4319          */
4320
4321         if(!fsp || (fsp->conn != conn) || (fsp->vuid != req->vuid)) {
4322                 reply_doserror(req, ERRDOS, ERRbadfid);
4323                 END_PROFILE(SMBclose);
4324                 return;
4325         }
4326
4327         if(fsp->is_directory) {
4328                 /*
4329                  * Special case - close NT SMB directory handle.
4330                  */
4331                 DEBUG(3,("close directory fnum=%d\n", fsp->fnum));
4332                 status = close_file(req, fsp, NORMAL_CLOSE);
4333         } else {
4334                 time_t t;
4335                 /*
4336                  * Close ordinary file.
4337                  */
4338
4339                 DEBUG(3,("close fd=%d fnum=%d (numopen=%d)\n",
4340                          fsp->fh->fd, fsp->fnum,
4341                          conn->num_files_open));
4342
4343                 /*
4344                  * Take care of any time sent in the close.
4345                  */
4346
4347                 t = srv_make_unix_date3(req->vwv+1);
4348                 set_close_write_time(fsp, convert_time_t_to_timespec(t));
4349
4350                 /*
4351                  * close_file() returns the unix errno if an error
4352                  * was detected on close - normally this is due to
4353                  * a disk full error. If not then it was probably an I/O error.
4354                  */
4355
4356                 status = close_file(req, fsp, NORMAL_CLOSE);
4357         }  
4358
4359         if (!NT_STATUS_IS_OK(status)) {
4360                 reply_nterror(req, status);
4361                 END_PROFILE(SMBclose);
4362                 return;
4363         }
4364
4365         reply_outbuf(req, 0, 0);
4366         END_PROFILE(SMBclose);
4367         return;
4368 }
4369
4370 /****************************************************************************
4371  Reply to a writeclose (Core+ protocol).
4372 ****************************************************************************/
4373
4374 void reply_writeclose(struct smb_request *req)
4375 {
4376         connection_struct *conn = req->conn;
4377         size_t numtowrite;
4378         ssize_t nwritten = -1;
4379         NTSTATUS close_status = NT_STATUS_OK;
4380         SMB_OFF_T startpos;
4381         const char *data;
4382         struct timespec mtime;
4383         files_struct *fsp;
4384
4385         START_PROFILE(SMBwriteclose);
4386
4387         if (req->wct < 6) {
4388                 reply_nterror(req, NT_STATUS_INVALID_PARAMETER);
4389                 END_PROFILE(SMBwriteclose);
4390                 return;
4391         }
4392
4393         fsp = file_fsp(req, SVAL(req->vwv+0, 0));
4394
4395         if (!check_fsp(conn, req, fsp)) {
4396                 END_PROFILE(SMBwriteclose);
4397                 return;
4398         }
4399         if (!CHECK_WRITE(fsp)) {
4400                 reply_doserror(req, ERRDOS,ERRbadaccess);
4401                 END_PROFILE(SMBwriteclose);
4402                 return;
4403         }
4404
4405         numtowrite = SVAL(req->vwv+1, 0);
4406         startpos = IVAL_TO_SMB_OFF_T(req->vwv+2, 0);
4407         mtime = convert_time_t_to_timespec(srv_make_unix_date3(req->vwv+4));
4408         data = (const char *)req->buf + 1;
4409
4410         if (numtowrite
4411             && is_locked(fsp, (uint32)req->smbpid, (uint64_t)numtowrite,
4412                          (uint64_t)startpos, WRITE_LOCK)) {
4413                 reply_doserror(req, ERRDOS,ERRlock);
4414                 END_PROFILE(SMBwriteclose);
4415                 return;
4416         }
4417
4418         nwritten = write_file(req,fsp,data,startpos,numtowrite);
4419
4420         set_close_write_time(fsp, mtime);
4421
4422         /*
4423          * More insanity. W2K only closes the file if writelen > 0.
4424          * JRA.
4425          */
4426
4427         if (numtowrite) {
4428                 DEBUG(3,("reply_writeclose: zero length write doesn't close file %s\n",
4429                         fsp->fsp_name ));
4430                 close_status = close_file(req, fsp, NORMAL_CLOSE);
4431         }
4432
4433         DEBUG(3,("writeclose fnum=%d num=%d wrote=%d (numopen=%d)\n",
4434                  fsp->fnum, (int)numtowrite, (int)nwritten,
4435                  conn->num_files_open));
4436
4437         if(((nwritten == 0) && (numtowrite != 0))||(nwritten < 0)) {
4438                 reply_doserror(req, ERRHRD, ERRdiskfull);
4439                 END_PROFILE(SMBwriteclose);
4440                 return;
4441         }
4442
4443         if(!NT_STATUS_IS_OK(close_status)) {
4444                 reply_nterror(req, close_status);
4445                 END_PROFILE(SMBwriteclose);
4446                 return;
4447         }
4448
4449         reply_outbuf(req, 1, 0);
4450
4451         SSVAL(req->outbuf,smb_vwv0,nwritten);
4452         END_PROFILE(SMBwriteclose);
4453         return;
4454 }
4455
4456 #undef DBGC_CLASS
4457 #define DBGC_CLASS DBGC_LOCKING
4458
4459 /****************************************************************************
4460  Reply to a lock.
4461 ****************************************************************************/
4462
4463 void reply_lock(struct smb_request *req)
4464 {
4465         connection_struct *conn = req->conn;
4466         uint64_t count,offset;
4467         NTSTATUS status;
4468         files_struct *fsp;
4469         struct byte_range_lock *br_lck = NULL;
4470
4471         START_PROFILE(SMBlock);
4472
4473         if (req->wct < 5) {
4474                 reply_nterror(req, NT_STATUS_INVALID_PARAMETER);
4475                 END_PROFILE(SMBlock);
4476                 return;
4477         }
4478
4479         fsp = file_fsp(req, SVAL(req->vwv+0, 0));
4480
4481         if (!check_fsp(conn, req, fsp)) {
4482                 END_PROFILE(SMBlock);
4483                 return;
4484         }
4485
4486         release_level_2_oplocks_on_change(fsp);
4487
4488         count = (uint64_t)IVAL(req->vwv+1, 0);
4489         offset = (uint64_t)IVAL(req->vwv+3, 0);
4490
4491         DEBUG(3,("lock fd=%d fnum=%d offset=%.0f count=%.0f\n",
4492                  fsp->fh->fd, fsp->fnum, (double)offset, (double)count));
4493
4494         br_lck = do_lock(smbd_messaging_context(),
4495                         fsp,
4496                         req->smbpid,
4497                         count,
4498                         offset,
4499                         WRITE_LOCK,
4500                         WINDOWS_LOCK,
4501                         False, /* Non-blocking lock. */
4502                         &status,
4503                         NULL);
4504
4505         TALLOC_FREE(br_lck);
4506
4507         if (NT_STATUS_V(status)) {
4508                 reply_nterror(req, status);
4509                 END_PROFILE(SMBlock);
4510                 return;
4511         }
4512
4513         reply_outbuf(req, 0, 0);
4514
4515         END_PROFILE(SMBlock);
4516         return;
4517 }
4518
4519 /****************************************************************************
4520  Reply to a unlock.
4521 ****************************************************************************/
4522
4523 void reply_unlock(struct smb_request *req)
4524 {
4525         connection_struct *conn = req->conn;
4526         uint64_t count,offset;
4527         NTSTATUS status;
4528         files_struct *fsp;
4529
4530         START_PROFILE(SMBunlock);
4531
4532         if (req->wct < 5) {
4533                 reply_nterror(req, NT_STATUS_INVALID_PARAMETER);
4534                 END_PROFILE(SMBunlock);
4535                 return;
4536         }
4537
4538         fsp = file_fsp(req, SVAL(req->vwv+0, 0));
4539
4540         if (!check_fsp(conn, req, fsp)) {
4541                 END_PROFILE(SMBunlock);
4542                 return;
4543         }
4544
4545         count = (uint64_t)IVAL(req->vwv+1, 0);
4546         offset = (uint64_t)IVAL(req->vwv+3, 0);
4547
4548         status = do_unlock(smbd_messaging_context(),
4549                         fsp,
4550                         req->smbpid,
4551                         count,
4552                         offset,
4553                         WINDOWS_LOCK);
4554
4555         if (NT_STATUS_V(status)) {
4556                 reply_nterror(req, status);
4557                 END_PROFILE(SMBunlock);
4558                 return;
4559         }
4560
4561         DEBUG( 3, ( "unlock fd=%d fnum=%d offset=%.0f count=%.0f\n",
4562                     fsp->fh->fd, fsp->fnum, (double)offset, (double)count ) );
4563
4564         reply_outbuf(req, 0, 0);
4565
4566         END_PROFILE(SMBunlock);
4567         return;
4568 }
4569
4570 #undef DBGC_CLASS
4571 #define DBGC_CLASS DBGC_ALL
4572
4573 /****************************************************************************
4574  Reply to a tdis.
4575  conn POINTER CAN BE NULL HERE !
4576 ****************************************************************************/
4577
4578 void reply_tdis(struct smb_request *req)
4579 {
4580         connection_struct *conn = req->conn;
4581         START_PROFILE(SMBtdis);
4582
4583         if (!conn) {
4584                 DEBUG(4,("Invalid connection in tdis\n"));
4585                 reply_doserror(req, ERRSRV, ERRinvnid);
4586                 END_PROFILE(SMBtdis);
4587                 return;
4588         }
4589
4590         conn->used = False;
4591
4592         close_cnum(conn,req->vuid);
4593         req->conn = NULL;
4594
4595         reply_outbuf(req, 0, 0);
4596         END_PROFILE(SMBtdis);
4597         return;
4598 }
4599
4600 /****************************************************************************
4601  Reply to a echo.
4602  conn POINTER CAN BE NULL HERE !
4603 ****************************************************************************/
4604
4605 void reply_echo(struct smb_request *req)
4606 {
4607         connection_struct *conn = req->conn;
4608         int smb_reverb;
4609         int seq_num;
4610
4611         START_PROFILE(SMBecho);
4612
4613         if (req->wct < 1) {
4614                 reply_nterror(req, NT_STATUS_INVALID_PARAMETER);
4615                 END_PROFILE(SMBecho);
4616                 return;
4617         }
4618
4619         smb_reverb = SVAL(req->vwv+0, 0);
4620
4621         reply_outbuf(req, 1, req->buflen);
4622
4623         /* copy any incoming data back out */
4624         if (req->buflen > 0) {
4625                 memcpy(smb_buf(req->outbuf), req->buf, req->buflen);
4626         }
4627
4628         if (smb_reverb > 100) {
4629                 DEBUG(0,("large reverb (%d)?? Setting to 100\n",smb_reverb));
4630                 smb_reverb = 100;
4631         }
4632
4633         for (seq_num =1 ; seq_num <= smb_reverb ; seq_num++) {
4634                 SSVAL(req->outbuf,smb_vwv0,seq_num);
4635
4636                 show_msg((char *)req->outbuf);
4637                 if (!srv_send_smb(smbd_server_fd(),
4638                                 (char *)req->outbuf,
4639                                 IS_CONN_ENCRYPTED(conn)||req->encrypted))
4640                         exit_server_cleanly("reply_echo: srv_send_smb failed.");
4641         }
4642
4643         DEBUG(3,("echo %d times\n", smb_reverb));
4644
4645         TALLOC_FREE(req->outbuf);
4646
4647         END_PROFILE(SMBecho);
4648         return;
4649 }
4650
4651 /****************************************************************************
4652  Reply to a printopen.
4653 ****************************************************************************/
4654
4655 void reply_printopen(struct smb_request *req)
4656 {
4657         connection_struct *conn = req->conn;
4658         files_struct *fsp;
4659         SMB_STRUCT_STAT sbuf;
4660         NTSTATUS status;
4661
4662         START_PROFILE(SMBsplopen);
4663
4664         if (req->wct < 2) {
4665                 reply_nterror(req, NT_STATUS_INVALID_PARAMETER);
4666                 END_PROFILE(SMBsplopen);
4667                 return;
4668         }
4669
4670         if (!CAN_PRINT(conn)) {
4671                 reply_doserror(req, ERRDOS, ERRnoaccess);
4672                 END_PROFILE(SMBsplopen);
4673                 return;
4674         }
4675
4676         status = file_new(req, conn, &fsp);
4677         if(!NT_STATUS_IS_OK(status)) {
4678                 reply_nterror(req, status);
4679                 END_PROFILE(SMBsplopen);
4680                 return;
4681         }
4682
4683         /* Open for exclusive use, write only. */
4684         status = print_fsp_open(req, conn, NULL, req->vuid, fsp, &sbuf);
4685
4686         if (!NT_STATUS_IS_OK(status)) {
4687                 reply_nterror(req, status);
4688                 END_PROFILE(SMBsplopen);
4689                 return;
4690         }
4691
4692         reply_outbuf(req, 1, 0);
4693         SSVAL(req->outbuf,smb_vwv0,fsp->fnum);
4694
4695         DEBUG(3,("openprint fd=%d fnum=%d\n",
4696                  fsp->fh->fd, fsp->fnum));
4697
4698         END_PROFILE(SMBsplopen);
4699         return;
4700 }
4701
4702 /****************************************************************************
4703  Reply to a printclose.
4704 ****************************************************************************/
4705
4706 void reply_printclose(struct smb_request *req)
4707 {
4708         connection_struct *conn = req->conn;
4709         files_struct *fsp;
4710         NTSTATUS status;
4711
4712         START_PROFILE(SMBsplclose);
4713
4714         if (req->wct < 1) {
4715                 reply_nterror(req, NT_STATUS_INVALID_PARAMETER);
4716                 END_PROFILE(SMBsplclose);
4717                 return;
4718         }
4719
4720         fsp = file_fsp(req, SVAL(req->vwv+0, 0));
4721
4722         if (!check_fsp(conn, req, fsp)) {
4723                 END_PROFILE(SMBsplclose);
4724                 return;
4725         }
4726
4727         if (!CAN_PRINT(conn)) {
4728                 reply_nterror(req, NT_STATUS_DOS(ERRSRV, ERRerror));
4729                 END_PROFILE(SMBsplclose);
4730                 return;
4731         }
4732
4733         DEBUG(3,("printclose fd=%d fnum=%d\n",
4734                  fsp->fh->fd,fsp->fnum));
4735
4736         status = close_file(req, fsp, NORMAL_CLOSE);
4737
4738         if(!NT_STATUS_IS_OK(status)) {
4739                 reply_nterror(req, status);
4740                 END_PROFILE(SMBsplclose);
4741                 return;
4742         }
4743
4744         reply_outbuf(req, 0, 0);
4745
4746         END_PROFILE(SMBsplclose);
4747         return;
4748 }
4749
4750 /****************************************************************************
4751  Reply to a printqueue.
4752 ****************************************************************************/
4753
4754 void reply_printqueue(struct smb_request *req)
4755 {
4756         connection_struct *conn = req->conn;
4757         int max_count;
4758         int start_index;
4759
4760         START_PROFILE(SMBsplretq);
4761
4762         if (req->wct < 2) {
4763                 reply_nterror(req, NT_STATUS_INVALID_PARAMETER);
4764                 END_PROFILE(SMBsplretq);
4765                 return;
4766         }
4767
4768         max_count = SVAL(req->vwv+0, 0);
4769         start_index = SVAL(req->vwv+1, 0);
4770
4771         /* we used to allow the client to get the cnum wrong, but that
4772            is really quite gross and only worked when there was only
4773            one printer - I think we should now only accept it if they
4774            get it right (tridge) */
4775         if (!CAN_PRINT(conn)) {
4776                 reply_doserror(req, ERRDOS, ERRnoaccess);
4777                 END_PROFILE(SMBsplretq);
4778                 return;
4779         }
4780
4781         reply_outbuf(req, 2, 3);
4782         SSVAL(req->outbuf,smb_vwv0,0);
4783         SSVAL(req->outbuf,smb_vwv1,0);
4784         SCVAL(smb_buf(req->outbuf),0,1);
4785         SSVAL(smb_buf(req->outbuf),1,0);
4786
4787         DEBUG(3,("printqueue start_index=%d max_count=%d\n",
4788                  start_index, max_count));
4789
4790         {
4791                 print_queue_struct *queue = NULL;
4792                 print_status_struct status;
4793                 int count = print_queue_status(SNUM(conn), &queue, &status);
4794                 int num_to_get = ABS(max_count);
4795                 int first = (max_count>0?start_index:start_index+max_count+1);
4796                 int i;
4797
4798                 if (first >= count)
4799                         num_to_get = 0;
4800                 else
4801                         num_to_get = MIN(num_to_get,count-first);
4802
4803
4804                 for (i=first;i<first+num_to_get;i++) {
4805                         char blob[28];
4806                         char *p = blob;
4807
4808                         srv_put_dos_date2(p,0,queue[i].time);
4809                         SCVAL(p,4,(queue[i].status==LPQ_PRINTING?2:3));
4810                         SSVAL(p,5, queue[i].job);
4811                         SIVAL(p,7,queue[i].size);
4812                         SCVAL(p,11,0);
4813                         srvstr_push(blob, req->flags2, p+12,
4814                                     queue[i].fs_user, 16, STR_ASCII);
4815
4816                         if (message_push_blob(
4817                                     &req->outbuf,
4818                                     data_blob_const(
4819                                             blob, sizeof(blob))) == -1) {
4820                                 reply_nterror(req, NT_STATUS_NO_MEMORY);
4821                                 END_PROFILE(SMBsplretq);
4822                                 return;
4823                         }
4824                 }
4825
4826                 if (count > 0) {
4827                         SSVAL(req->outbuf,smb_vwv0,count);
4828                         SSVAL(req->outbuf,smb_vwv1,
4829                               (max_count>0?first+count:first-1));
4830                         SCVAL(smb_buf(req->outbuf),0,1);
4831                         SSVAL(smb_buf(req->outbuf),1,28*count);
4832                 }
4833
4834                 SAFE_FREE(queue);
4835
4836                 DEBUG(3,("%d entries returned in queue\n",count));
4837         }
4838
4839         END_PROFILE(SMBsplretq);
4840         return;
4841 }
4842
4843 /****************************************************************************
4844  Reply to a printwrite.
4845 ****************************************************************************/
4846
4847 void reply_printwrite(struct smb_request *req)
4848 {
4849         connection_struct *conn = req->conn;
4850         int numtowrite;
4851         const char *data;
4852         files_struct *fsp;
4853
4854         START_PROFILE(SMBsplwr);
4855
4856         if (req->wct < 1) {
4857                 reply_nterror(req, NT_STATUS_INVALID_PARAMETER);
4858                 END_PROFILE(SMBsplwr);
4859                 return;
4860         }
4861
4862         fsp = file_fsp(req, SVAL(req->vwv+0, 0));
4863
4864         if (!check_fsp(conn, req, fsp)) {
4865                 END_PROFILE(SMBsplwr);
4866                 return;
4867         }
4868
4869         if (!CAN_PRINT(conn)) {
4870                 reply_doserror(req, ERRDOS, ERRnoaccess);
4871                 END_PROFILE(SMBsplwr);
4872                 return;
4873         }
4874
4875         if (!CHECK_WRITE(fsp)) {
4876                 reply_doserror(req, ERRDOS, ERRbadaccess);
4877                 END_PROFILE(SMBsplwr);
4878                 return;
4879         }
4880
4881         numtowrite = SVAL(req->buf, 1);
4882
4883         if (req->buflen < numtowrite + 3) {
4884                 reply_nterror(req, NT_STATUS_INVALID_PARAMETER);
4885                 END_PROFILE(SMBsplwr);
4886                 return;
4887         }
4888
4889         data = (const char *)req->buf + 3;
4890
4891         if (write_file(req,fsp,data,-1,numtowrite) != numtowrite) {
4892                 reply_unixerror(req, ERRHRD, ERRdiskfull);
4893                 END_PROFILE(SMBsplwr);
4894                 return;
4895         }
4896
4897         DEBUG( 3, ( "printwrite fnum=%d num=%d\n", fsp->fnum, numtowrite ) );
4898
4899         END_PROFILE(SMBsplwr);
4900         return;
4901 }
4902
4903 /****************************************************************************
4904  Reply to a mkdir.
4905 ****************************************************************************/
4906
4907 void reply_mkdir(struct smb_request *req)
4908 {
4909         connection_struct *conn = req->conn;
4910         char *directory = NULL;
4911         NTSTATUS status;
4912         SMB_STRUCT_STAT sbuf;
4913         TALLOC_CTX *ctx = talloc_tos();
4914
4915         START_PROFILE(SMBmkdir);
4916
4917         srvstr_get_path_req(ctx, req, &directory, (const char *)req->buf + 1,
4918                             STR_TERMINATE, &status);
4919         if (!NT_STATUS_IS_OK(status)) {
4920                 reply_nterror(req, status);
4921                 END_PROFILE(SMBmkdir);
4922                 return;
4923         }
4924
4925         status = resolve_dfspath(ctx, conn,
4926                                  req->flags2 & FLAGS2_DFS_PATHNAMES,
4927                                  directory,
4928                                  &directory);
4929         if (!NT_STATUS_IS_OK(status)) {
4930                 if (NT_STATUS_EQUAL(status,NT_STATUS_PATH_NOT_COVERED)) {
4931                         reply_botherror(req, NT_STATUS_PATH_NOT_COVERED,
4932                                         ERRSRV, ERRbadpath);
4933                         END_PROFILE(SMBmkdir);
4934                         return;
4935                 }
4936                 reply_nterror(req, status);
4937                 END_PROFILE(SMBmkdir);
4938                 return;
4939         }
4940
4941         status = unix_convert(ctx, conn, directory, False, &directory, NULL, &sbuf);
4942         if (!NT_STATUS_IS_OK(status)) {
4943                 reply_nterror(req, status);
4944                 END_PROFILE(SMBmkdir);
4945                 return;
4946         }
4947
4948         status = check_name(conn, directory);
4949         if (!NT_STATUS_IS_OK(status)) {
4950                 reply_nterror(req, status);
4951                 END_PROFILE(SMBmkdir);
4952                 return;
4953         }
4954
4955         status = create_directory(conn, req, directory);
4956
4957         DEBUG(5, ("create_directory returned %s\n", nt_errstr(status)));
4958
4959         if (!NT_STATUS_IS_OK(status)) {
4960
4961                 if (!use_nt_status()
4962                     && NT_STATUS_EQUAL(status,
4963                                        NT_STATUS_OBJECT_NAME_COLLISION)) {
4964                         /*
4965                          * Yes, in the DOS error code case we get a
4966                          * ERRDOS:ERRnoaccess here. See BASE-SAMBA3ERROR
4967                          * samba4 torture test.
4968                          */
4969                         status = NT_STATUS_DOS(ERRDOS, ERRnoaccess);
4970                 }
4971
4972                 reply_nterror(req, status);
4973                 END_PROFILE(SMBmkdir);
4974                 return;
4975         }
4976
4977         reply_outbuf(req, 0, 0);
4978
4979         DEBUG( 3, ( "mkdir %s\n", directory ) );
4980
4981         END_PROFILE(SMBmkdir);
4982         return;
4983 }
4984
4985 /****************************************************************************
4986  Static function used by reply_rmdir to delete an entire directory
4987  tree recursively. Return True on ok, False on fail.
4988 ****************************************************************************/
4989
4990 static bool recursive_rmdir(TALLOC_CTX *ctx,
4991                         connection_struct *conn,
4992                         char *directory)
4993 {
4994         const char *dname = NULL;
4995         bool ret = True;
4996         long offset = 0;
4997         struct smb_Dir *dir_hnd = OpenDir(talloc_tos(), conn, directory,
4998                                           NULL, 0);
4999
5000         if(dir_hnd == NULL)
5001                 return False;
5002
5003         while((dname = ReadDirName(dir_hnd, &offset))) {
5004                 char *fullname = NULL;
5005                 SMB_STRUCT_STAT st;
5006
5007                 if (ISDOT(dname) || ISDOTDOT(dname)) {
5008                         continue;
5009                 }
5010
5011                 if (!is_visible_file(conn, directory, dname, &st, False)) {
5012                         continue;
5013                 }
5014
5015                 /* Construct the full name. */
5016                 fullname = talloc_asprintf(ctx,
5017                                 "%s/%s",
5018                                 directory,
5019                                 dname);
5020                 if (!fullname) {
5021                         errno = ENOMEM;
5022                         ret = False;
5023                         break;
5024                 }
5025
5026                 if(SMB_VFS_LSTAT(conn,fullname, &st) != 0) {
5027                         ret = False;
5028                         break;
5029                 }
5030
5031                 if(st.st_mode & S_IFDIR) {
5032                         if(!recursive_rmdir(ctx, conn, fullname)) {
5033                                 ret = False;
5034                                 break;
5035                         }
5036                         if(SMB_VFS_RMDIR(conn,fullname) != 0) {
5037                                 ret = False;
5038                                 break;
5039                         }
5040                 } else if(SMB_VFS_UNLINK(conn,fullname) != 0) {
5041                         ret = False;
5042                         break;
5043                 }
5044                 TALLOC_FREE(fullname);
5045         }
5046         TALLOC_FREE(dir_hnd);
5047         return ret;
5048 }
5049
5050 /****************************************************************************
5051  The internals of the rmdir code - called elsewhere.
5052 ****************************************************************************/
5053
5054 NTSTATUS rmdir_internals(TALLOC_CTX *ctx,
5055                         connection_struct *conn,
5056                         const char *directory)
5057 {
5058         int ret;
5059         SMB_STRUCT_STAT st;
5060
5061         /* Might be a symlink. */
5062         if(SMB_VFS_LSTAT(conn, directory, &st) != 0) {
5063                 return map_nt_error_from_unix(errno);
5064         }
5065
5066         if (S_ISLNK(st.st_mode)) {
5067                 /* Is what it points to a directory ? */
5068                 if(SMB_VFS_STAT(conn, directory, &st) != 0) {
5069                         return map_nt_error_from_unix(errno);
5070                 }
5071                 if (!(S_ISDIR(st.st_mode))) {
5072                         return NT_STATUS_NOT_A_DIRECTORY;
5073                 }
5074                 ret = SMB_VFS_UNLINK(conn,directory);
5075         } else {
5076                 ret = SMB_VFS_RMDIR(conn,directory);
5077         }
5078         if (ret == 0) {
5079                 notify_fname(conn, NOTIFY_ACTION_REMOVED,
5080                              FILE_NOTIFY_CHANGE_DIR_NAME,
5081                              directory);
5082                 return NT_STATUS_OK;
5083         }
5084
5085         if(((errno == ENOTEMPTY)||(errno == EEXIST)) && lp_veto_files(SNUM(conn))) {
5086                 /*
5087                  * Check to see if the only thing in this directory are
5088                  * vetoed files/directories. If so then delete them and
5089                  * retry. If we fail to delete any of them (and we *don't*
5090                  * do a recursive delete) then fail the rmdir.
5091                  */
5092                 const char *dname;
5093                 long dirpos = 0;
5094                 struct smb_Dir *dir_hnd = OpenDir(talloc_tos(), conn,
5095                                                   directory, NULL, 0);
5096
5097                 if(dir_hnd == NULL) {
5098                         errno = ENOTEMPTY;
5099                         goto err;
5100                 }
5101
5102                 while ((dname = ReadDirName(dir_hnd,&dirpos))) {
5103                         if((strcmp(dname, ".") == 0) || (strcmp(dname, "..")==0))
5104                                 continue;
5105                         if (!is_visible_file(conn, directory, dname, &st, False))
5106                                 continue;
5107                         if(!IS_VETO_PATH(conn, dname)) {
5108                                 TALLOC_FREE(dir_hnd);
5109                                 errno = ENOTEMPTY;
5110                                 goto err;
5111                         }
5112                 }
5113
5114                 /* We only have veto files/directories.
5115                  * Are we allowed to delete them ? */
5116
5117                 if(!lp_recursive_veto_delete(SNUM(conn))) {
5118                         TALLOC_FREE(dir_hnd);
5119                         errno = ENOTEMPTY;
5120                         goto err;
5121                 }
5122
5123                 /* Do a recursive delete. */
5124                 RewindDir(dir_hnd,&dirpos);
5125                 while ((dname = ReadDirName(dir_hnd,&dirpos))) {
5126                         char *fullname = NULL;
5127
5128                         if (ISDOT(dname) || ISDOTDOT(dname)) {
5129                                 continue;
5130                         }
5131                         if (!is_visible_file(conn, directory, dname, &st, False)) {
5132                                 continue;
5133                         }
5134
5135                         fullname = talloc_asprintf(ctx,
5136                                         "%s/%s",
5137                                         directory,
5138                                         dname);
5139
5140                         if(!fullname) {
5141                                 errno = ENOMEM;
5142                                 break;
5143                         }
5144
5145                         if(SMB_VFS_LSTAT(conn,fullname, &st) != 0) {
5146                                 break;
5147                         }
5148                         if(st.st_mode & S_IFDIR) {
5149                                 if(!recursive_rmdir(ctx, conn, fullname)) {
5150                                         break;
5151                                 }
5152                                 if(SMB_VFS_RMDIR(conn,fullname) != 0) {
5153                                         break;
5154                                 }
5155                         } else if(SMB_VFS_UNLINK(conn,fullname) != 0) {
5156                                 break;
5157                         }
5158                         TALLOC_FREE(fullname);
5159                 }
5160                 TALLOC_FREE(dir_hnd);
5161                 /* Retry the rmdir */
5162                 ret = SMB_VFS_RMDIR(conn,directory);
5163         }
5164
5165   err:
5166
5167         if (ret != 0) {
5168                 DEBUG(3,("rmdir_internals: couldn't remove directory %s : "
5169                          "%s\n", directory,strerror(errno)));
5170                 return map_nt_error_from_unix(errno);
5171         }
5172
5173         notify_fname(conn, NOTIFY_ACTION_REMOVED,
5174                      FILE_NOTIFY_CHANGE_DIR_NAME,
5175                      directory);
5176
5177         return NT_STATUS_OK;
5178 }
5179
5180 /****************************************************************************
5181  Reply to a rmdir.
5182 ****************************************************************************/
5183
5184 void reply_rmdir(struct smb_request *req)
5185 {
5186         connection_struct *conn = req->conn;
5187         char *directory = NULL;
5188         SMB_STRUCT_STAT sbuf;
5189         NTSTATUS status;
5190         TALLOC_CTX *ctx = talloc_tos();
5191
5192         START_PROFILE(SMBrmdir);
5193
5194         srvstr_get_path_req(ctx, req, &directory, (const char *)req->buf + 1,
5195                             STR_TERMINATE, &status);
5196         if (!NT_STATUS_IS_OK(status)) {
5197                 reply_nterror(req, status);
5198                 END_PROFILE(SMBrmdir);
5199                 return;
5200         }
5201
5202         status = resolve_dfspath(ctx, conn,
5203                                  req->flags2 & FLAGS2_DFS_PATHNAMES,
5204                                  directory,
5205                                  &directory);
5206         if (!NT_STATUS_IS_OK(status)) {
5207                 if (NT_STATUS_EQUAL(status,NT_STATUS_PATH_NOT_COVERED)) {
5208                         reply_botherror(req, NT_STATUS_PATH_NOT_COVERED,
5209                                         ERRSRV, ERRbadpath);
5210                         END_PROFILE(SMBrmdir);
5211                         return;
5212                 }
5213                 reply_nterror(req, status);
5214                 END_PROFILE(SMBrmdir);
5215                 return;
5216         }
5217
5218         status = unix_convert(ctx, conn, directory, False, &directory,
5219                         NULL, &sbuf);
5220         if (!NT_STATUS_IS_OK(status)) {
5221                 reply_nterror(req, status);
5222                 END_PROFILE(SMBrmdir);
5223                 return;
5224         }
5225
5226         status = check_name(conn, directory);
5227         if (!NT_STATUS_IS_OK(status)) {
5228                 reply_nterror(req, status);
5229                 END_PROFILE(SMBrmdir);
5230                 return;
5231         }
5232
5233         dptr_closepath(directory, req->smbpid);
5234         status = rmdir_internals(ctx, conn, directory);
5235         if (!NT_STATUS_IS_OK(status)) {
5236                 reply_nterror(req, status);
5237                 END_PROFILE(SMBrmdir);
5238                 return;
5239         }
5240
5241         reply_outbuf(req, 0, 0);
5242
5243         DEBUG( 3, ( "rmdir %s\n", directory ) );
5244
5245         END_PROFILE(SMBrmdir);
5246         return;
5247 }
5248
5249 /*******************************************************************
5250  Resolve wildcards in a filename rename.
5251 ********************************************************************/
5252
5253 static bool resolve_wildcards(TALLOC_CTX *ctx,
5254                                 const char *name1,
5255                                 const char *name2,
5256                                 char **pp_newname)
5257 {
5258         char *name2_copy = NULL;
5259         char *root1 = NULL;
5260         char *root2 = NULL;
5261         char *ext1 = NULL;
5262         char *ext2 = NULL;
5263         char *p,*p2, *pname1, *pname2;
5264
5265         name2_copy = talloc_strdup(ctx, name2);
5266         if (!name2_copy) {
5267                 return False;
5268         }
5269
5270         pname1 = strrchr_m(name1,'/');
5271         pname2 = strrchr_m(name2_copy,'/');
5272
5273         if (!pname1 || !pname2) {
5274                 return False;
5275         }
5276
5277         /* Truncate the copy of name2 at the last '/' */
5278         *pname2 = '\0';
5279
5280         /* Now go past the '/' */
5281         pname1++;
5282         pname2++;
5283
5284         root1 = talloc_strdup(ctx, pname1);
5285         root2 = talloc_strdup(ctx, pname2);
5286
5287         if (!root1 || !root2) {
5288                 return False;
5289         }
5290
5291         p = strrchr_m(root1,'.');
5292         if (p) {
5293                 *p = 0;
5294                 ext1 = talloc_strdup(ctx, p+1);
5295         } else {
5296                 ext1 = talloc_strdup(ctx, "");
5297         }
5298         p = strrchr_m(root2,'.');
5299         if (p) {
5300                 *p = 0;
5301                 ext2 = talloc_strdup(ctx, p+1);
5302         } else {
5303                 ext2 = talloc_strdup(ctx, "");
5304         }
5305
5306         if (!ext1 || !ext2) {
5307                 return False;
5308         }
5309
5310         p = root1;
5311         p2 = root2;
5312         while (*p2) {
5313                 if (*p2 == '?') {
5314                         /* Hmmm. Should this be mb-aware ? */
5315                         *p2 = *p;
5316                         p2++;
5317                 } else if (*p2 == '*') {
5318                         *p2 = '\0';
5319                         root2 = talloc_asprintf(ctx, "%s%s",
5320                                                 root2,
5321                                                 p);
5322                         if (!root2) {
5323                                 return False;
5324                         }
5325                         break;
5326                 } else {
5327                         p2++;
5328                 }
5329                 if (*p) {
5330                         p++;
5331                 }
5332         }
5333
5334         p = ext1;
5335         p2 = ext2;
5336         while (*p2) {
5337                 if (*p2 == '?') {
5338                         /* Hmmm. Should this be mb-aware ? */
5339                         *p2 = *p;
5340                         p2++;
5341                 } else if (*p2 == '*') {
5342                         *p2 = '\0';
5343                         ext2 = talloc_asprintf(ctx, "%s%s",
5344                                                 ext2,
5345                                                 p);
5346                         if (!ext2) {
5347                                 return False;
5348                         }
5349                         break;
5350                 } else {
5351                         p2++;
5352                 }
5353                 if (*p) {
5354                         p++;
5355                 }
5356         }
5357
5358         if (*ext2) {
5359                 *pp_newname = talloc_asprintf(ctx, "%s/%s.%s",
5360                                 name2_copy,
5361                                 root2,
5362                                 ext2);
5363         } else {
5364                 *pp_newname = talloc_asprintf(ctx, "%s/%s",
5365                                 name2_copy,
5366                                 root2);
5367         }
5368
5369         if (!*pp_newname) {
5370                 return False;
5371         }
5372
5373         return True;
5374 }
5375
5376 /****************************************************************************
5377  Ensure open files have their names updated. Updated to notify other smbd's
5378  asynchronously.
5379 ****************************************************************************/
5380
5381 static void rename_open_files(connection_struct *conn,
5382                               struct share_mode_lock *lck,
5383                               const char *newname)
5384 {
5385         files_struct *fsp;
5386         bool did_rename = False;
5387
5388         for(fsp = file_find_di_first(lck->id); fsp;
5389             fsp = file_find_di_next(fsp)) {
5390                 /* fsp_name is a relative path under the fsp. To change this for other
5391                    sharepaths we need to manipulate relative paths. */
5392                 /* TODO - create the absolute path and manipulate the newname
5393                    relative to the sharepath. */
5394                 if (!strequal(fsp->conn->connectpath, conn->connectpath)) {
5395                         continue;
5396                 }
5397                 DEBUG(10,("rename_open_files: renaming file fnum %d (file_id %s) from %s -> %s\n",
5398                           fsp->fnum, file_id_string_tos(&fsp->file_id),
5399                         fsp->fsp_name, newname ));
5400                 string_set(&fsp->fsp_name, newname);
5401                 did_rename = True;
5402         }
5403
5404         if (!did_rename) {
5405                 DEBUG(10,("rename_open_files: no open files on file_id %s for %s\n",
5406                           file_id_string_tos(&lck->id), newname ));
5407         }
5408
5409         /* Send messages to all smbd's (not ourself) that the name has changed. */
5410         rename_share_filename(smbd_messaging_context(), lck, conn->connectpath,
5411                               newname);
5412 }
5413
5414 /****************************************************************************
5415  We need to check if the source path is a parent directory of the destination
5416  (ie. a rename of /foo/bar/baz -> /foo/bar/baz/bibble/bobble. If so we must
5417  refuse the rename with a sharing violation. Under UNIX the above call can
5418  *succeed* if /foo/bar/baz is a symlink to another area in the share. We
5419  probably need to check that the client is a Windows one before disallowing
5420  this as a UNIX client (one with UNIX extensions) can know the source is a
5421  symlink and make this decision intelligently. Found by an excellent bug
5422  report from <AndyLiebman@aol.com>.
5423 ****************************************************************************/
5424
5425 static bool rename_path_prefix_equal(const char *src, const char *dest)
5426 {
5427         const char *psrc = src;
5428         const char *pdst = dest;
5429         size_t slen;
5430
5431         if (psrc[0] == '.' && psrc[1] == '/') {
5432                 psrc += 2;
5433         }
5434         if (pdst[0] == '.' && pdst[1] == '/') {
5435                 pdst += 2;
5436         }
5437         if ((slen = strlen(psrc)) > strlen(pdst)) {
5438                 return False;
5439         }
5440         return ((memcmp(psrc, pdst, slen) == 0) && pdst[slen] == '/');
5441 }
5442
5443 /*
5444  * Do the notify calls from a rename
5445  */
5446
5447 static void notify_rename(connection_struct *conn, bool is_dir,
5448                           const char *oldpath, const char *newpath)
5449 {
5450         char *olddir, *newdir;
5451         const char *oldname, *newname;
5452         uint32 mask;
5453
5454         mask = is_dir ? FILE_NOTIFY_CHANGE_DIR_NAME
5455                 : FILE_NOTIFY_CHANGE_FILE_NAME;
5456
5457         if (!parent_dirname(talloc_tos(), oldpath, &olddir, &oldname)
5458             || !parent_dirname(talloc_tos(), newpath, &newdir, &newname)) {
5459                 TALLOC_FREE(olddir);
5460                 return;
5461         }
5462
5463         if (strcmp(olddir, newdir) == 0) {
5464                 notify_fname(conn, NOTIFY_ACTION_OLD_NAME, mask, oldpath);
5465                 notify_fname(conn, NOTIFY_ACTION_NEW_NAME, mask, newpath);
5466         }
5467         else {
5468                 notify_fname(conn, NOTIFY_ACTION_REMOVED, mask, oldpath);
5469                 notify_fname(conn, NOTIFY_ACTION_ADDED, mask, newpath);
5470         }
5471         TALLOC_FREE(olddir);
5472         TALLOC_FREE(newdir);
5473
5474         /* this is a strange one. w2k3 gives an additional event for
5475            CHANGE_ATTRIBUTES and CHANGE_CREATION on the new file when renaming
5476            files, but not directories */
5477         if (!is_dir) {
5478                 notify_fname(conn, NOTIFY_ACTION_MODIFIED,
5479                              FILE_NOTIFY_CHANGE_ATTRIBUTES
5480                              |FILE_NOTIFY_CHANGE_CREATION,
5481                              newpath);
5482         }
5483 }
5484
5485 /****************************************************************************
5486  Rename an open file - given an fsp.
5487 ****************************************************************************/
5488
5489 NTSTATUS rename_internals_fsp(connection_struct *conn,
5490                         files_struct *fsp,
5491                         char *newname,
5492                         const char *newname_last_component,
5493                         uint32 attrs,
5494                         bool replace_if_exists)
5495 {
5496         TALLOC_CTX *ctx = talloc_tos();
5497         SMB_STRUCT_STAT sbuf, sbuf1;
5498         NTSTATUS status = NT_STATUS_OK;
5499         struct share_mode_lock *lck = NULL;
5500         bool dst_exists, old_is_stream, new_is_stream;
5501
5502         ZERO_STRUCT(sbuf);
5503
5504         status = check_name(conn, newname);
5505         if (!NT_STATUS_IS_OK(status)) {
5506                 return status;
5507         }
5508
5509         /* Ensure newname contains a '/' */
5510         if(strrchr_m(newname,'/') == 0) {
5511                 newname = talloc_asprintf(ctx,
5512                                         "./%s",
5513                                         newname);
5514                 if (!newname) {
5515                         return NT_STATUS_NO_MEMORY;
5516                 }
5517         }
5518
5519         /*
5520          * Check for special case with case preserving and not
5521          * case sensitive. If the old last component differs from the original
5522          * last component only by case, then we should allow
5523          * the rename (user is trying to change the case of the
5524          * filename).
5525          */
5526
5527         if((conn->case_sensitive == False) && (conn->case_preserve == True) &&
5528                         strequal(newname, fsp->fsp_name)) {
5529                 char *p;
5530                 char *newname_modified_last_component = NULL;
5531
5532                 /*
5533                  * Get the last component of the modified name.
5534                  * Note that we guarantee that newname contains a '/'
5535                  * character above.
5536                  */
5537                 p = strrchr_m(newname,'/');
5538                 newname_modified_last_component = talloc_strdup(ctx,
5539                                                 p+1);
5540                 if (!newname_modified_last_component) {
5541                         return NT_STATUS_NO_MEMORY;
5542                 }
5543
5544                 if(strcsequal(newname_modified_last_component,
5545                               newname_last_component) == False) {
5546                         /*
5547                          * Replace the modified last component with
5548                          * the original.
5549                          */
5550                         *p = '\0'; /* Truncate at the '/' */
5551                         newname = talloc_asprintf(ctx,
5552                                         "%s/%s",
5553                                         newname,
5554                                         newname_last_component);
5555                 }
5556         }
5557
5558         /*
5559          * If the src and dest names are identical - including case,
5560          * don't do the rename, just return success.
5561          */
5562
5563         if (strcsequal(fsp->fsp_name, newname)) {
5564                 DEBUG(3,("rename_internals_fsp: identical names in rename %s - returning success\n",
5565                         newname));
5566                 return NT_STATUS_OK;
5567         }
5568
5569         old_is_stream = is_ntfs_stream_name(fsp->fsp_name);
5570         new_is_stream = is_ntfs_stream_name(newname);
5571
5572         /* Return the correct error code if both names aren't streams. */
5573         if (!old_is_stream && new_is_stream) {
5574                 return NT_STATUS_OBJECT_NAME_INVALID;
5575         }
5576
5577         if (old_is_stream && !new_is_stream) {
5578                 return NT_STATUS_INVALID_PARAMETER;
5579         }
5580
5581         /*
5582          * Have vfs_object_exist also fill sbuf1
5583          */
5584         dst_exists = vfs_object_exist(conn, newname, &sbuf1);
5585
5586         if(!replace_if_exists && dst_exists) {
5587                 DEBUG(3,("rename_internals_fsp: dest exists doing rename %s -> %s\n",
5588                         fsp->fsp_name,newname));
5589                 return NT_STATUS_OBJECT_NAME_COLLISION;
5590         }
5591
5592         if (dst_exists) {
5593                 struct file_id fileid = vfs_file_id_from_sbuf(conn, &sbuf1);
5594                 files_struct *dst_fsp = file_find_di_first(fileid);
5595                 /* The file can be open when renaming a stream */
5596                 if (dst_fsp && !new_is_stream) {
5597                         DEBUG(3, ("rename_internals_fsp: Target file open\n"));
5598                         return NT_STATUS_ACCESS_DENIED;
5599                 }
5600         }
5601
5602         /* Ensure we have a valid stat struct for the source. */
5603         if (fsp->fh->fd != -1) {
5604                 if (SMB_VFS_FSTAT(fsp, &sbuf) == -1) {
5605                         return map_nt_error_from_unix(errno);
5606                 }
5607         } else {
5608                 if (SMB_VFS_STAT(conn,fsp->fsp_name,&sbuf) == -1) {
5609                         return map_nt_error_from_unix(errno);
5610                 }
5611         }
5612
5613         status = can_rename(conn, fsp, attrs, &sbuf);
5614
5615         if (!NT_STATUS_IS_OK(status)) {
5616                 DEBUG(3,("rename_internals_fsp: Error %s rename %s -> %s\n",
5617                         nt_errstr(status), fsp->fsp_name,newname));
5618                 if (NT_STATUS_EQUAL(status,NT_STATUS_SHARING_VIOLATION))
5619                         status = NT_STATUS_ACCESS_DENIED;
5620                 return status;
5621         }
5622
5623         if (rename_path_prefix_equal(fsp->fsp_name, newname)) {
5624                 return NT_STATUS_ACCESS_DENIED;
5625         }
5626
5627         lck = get_share_mode_lock(talloc_tos(), fsp->file_id, NULL, NULL,
5628                                   NULL);
5629
5630         /*
5631          * We have the file open ourselves, so not being able to get the
5632          * corresponding share mode lock is a fatal error.
5633          */
5634
5635         SMB_ASSERT(lck != NULL);
5636
5637         if(SMB_VFS_RENAME(conn,fsp->fsp_name, newname) == 0) {
5638                 uint32 create_options = fsp->fh->private_options;
5639
5640                 DEBUG(3,("rename_internals_fsp: succeeded doing rename on %s -> %s\n",
5641                         fsp->fsp_name,newname));
5642
5643                 notify_rename(conn, fsp->is_directory, fsp->fsp_name, newname);
5644
5645                 rename_open_files(conn, lck, newname);
5646
5647                 /*
5648                  * A rename acts as a new file create w.r.t. allowing an initial delete
5649                  * on close, probably because in Windows there is a new handle to the
5650                  * new file. If initial delete on close was requested but not
5651                  * originally set, we need to set it here. This is probably not 100% correct,
5652                  * but will work for the CIFSFS client which in non-posix mode
5653                  * depends on these semantics. JRA.
5654                  */
5655
5656                 if (create_options & FILE_DELETE_ON_CLOSE) {
5657                         status = can_set_delete_on_close(fsp, True, 0);
5658
5659                         if (NT_STATUS_IS_OK(status)) {
5660                                 /* Note that here we set the *inital* delete on close flag,
5661                                  * not the regular one. The magic gets handled in close. */
5662                                 fsp->initial_delete_on_close = True;
5663                         }
5664                 }
5665                 TALLOC_FREE(lck);
5666                 return NT_STATUS_OK;
5667         }
5668
5669         TALLOC_FREE(lck);
5670
5671         if (errno == ENOTDIR || errno == EISDIR) {
5672                 status = NT_STATUS_OBJECT_NAME_COLLISION;
5673         } else {
5674                 status = map_nt_error_from_unix(errno);
5675         }
5676
5677         DEBUG(3,("rename_internals_fsp: Error %s rename %s -> %s\n",
5678                 nt_errstr(status), fsp->fsp_name,newname));
5679
5680         return status;
5681 }
5682
5683 /****************************************************************************
5684  The guts of the rename command, split out so it may be called by the NT SMB
5685  code.
5686 ****************************************************************************/
5687
5688 NTSTATUS rename_internals(TALLOC_CTX *ctx,
5689                         connection_struct *conn,
5690                         struct smb_request *req,
5691                         const char *name_in,
5692                         const char *newname_in,
5693                         uint32 attrs,
5694                         bool replace_if_exists,
5695                         bool src_has_wild,
5696                         bool dest_has_wild,
5697                         uint32_t access_mask)
5698 {
5699         char *directory = NULL;
5700         char *mask = NULL;
5701         char *last_component_src = NULL;
5702         char *last_component_dest = NULL;
5703         char *name = NULL;
5704         char *newname = NULL;
5705         char *p;
5706         int count=0;
5707         NTSTATUS status = NT_STATUS_OK;
5708         SMB_STRUCT_STAT sbuf1, sbuf2;
5709         struct smb_Dir *dir_hnd = NULL;
5710         const char *dname;
5711         long offset = 0;
5712         int create_options = 0;
5713
5714         ZERO_STRUCT(sbuf1);
5715         ZERO_STRUCT(sbuf2);
5716
5717         status = unix_convert(ctx, conn, name_in, src_has_wild, &name,
5718                         &last_component_src, &sbuf1);
5719         if (!NT_STATUS_IS_OK(status)) {
5720                 return status;
5721         }
5722
5723         status = unix_convert(ctx, conn, newname_in, dest_has_wild, &newname,
5724                         &last_component_dest, &sbuf2);
5725         if (!NT_STATUS_IS_OK(status)) {
5726                 return status;
5727         }
5728
5729         /*
5730          * Split the old name into directory and last component
5731          * strings. Note that unix_convert may have stripped off a
5732          * leading ./ from both name and newname if the rename is
5733          * at the root of the share. We need to make sure either both
5734          * name and newname contain a / character or neither of them do
5735          * as this is checked in resolve_wildcards().
5736          */
5737
5738         p = strrchr_m(name,'/');
5739         if (!p) {
5740                 directory = talloc_strdup(ctx, ".");
5741                 if (!directory) {
5742                         return NT_STATUS_NO_MEMORY;
5743                 }
5744                 mask = name;
5745         } else {
5746                 *p = 0;
5747                 directory = talloc_strdup(ctx, name);
5748                 if (!directory) {
5749                         return NT_STATUS_NO_MEMORY;
5750                 }
5751                 mask = p+1;
5752                 *p = '/'; /* Replace needed for exceptional test below. */
5753         }
5754
5755         /*
5756          * We should only check the mangled cache
5757          * here if unix_convert failed. This means
5758          * that the path in 'mask' doesn't exist
5759          * on the file system and so we need to look
5760          * for a possible mangle. This patch from
5761          * Tine Smukavec <valentin.smukavec@hermes.si>.
5762          */
5763
5764         if (!VALID_STAT(sbuf1) && mangle_is_mangled(mask, conn->params)) {
5765                 char *new_mask = NULL;
5766                 mangle_lookup_name_from_8_3(ctx,
5767                                         mask,
5768                                         &new_mask,
5769                                         conn->params );
5770                 if (new_mask) {
5771                         mask = new_mask;
5772                 }
5773         }
5774
5775         if (!src_has_wild) {
5776                 files_struct *fsp;
5777
5778                 /*
5779                  * No wildcards - just process the one file.
5780                  */
5781                 bool is_short_name = mangle_is_8_3(name, True, conn->params);
5782
5783                 /* Add a terminating '/' to the directory name. */
5784                 directory = talloc_asprintf_append(directory,
5785                                 "/%s",
5786                                 mask);
5787                 if (!directory) {
5788                         return NT_STATUS_NO_MEMORY;
5789                 }
5790
5791                 /* Ensure newname contains a '/' also */
5792                 if(strrchr_m(newname,'/') == 0) {
5793                         newname = talloc_asprintf(ctx,
5794                                                 "./%s",
5795                                                 newname);
5796                         if (!newname) {
5797                                 return NT_STATUS_NO_MEMORY;
5798                         }
5799                 }
5800
5801                 DEBUG(3, ("rename_internals: case_sensitive = %d, "
5802                           "case_preserve = %d, short case preserve = %d, "
5803                           "directory = %s, newname = %s, "
5804                           "last_component_dest = %s, is_8_3 = %d\n",
5805                           conn->case_sensitive, conn->case_preserve,
5806                           conn->short_case_preserve, directory,
5807                           newname, last_component_dest, is_short_name));
5808
5809                 /* The dest name still may have wildcards. */
5810                 if (dest_has_wild) {
5811                         char *mod_newname = NULL;
5812                         if (!resolve_wildcards(ctx,
5813                                         directory,newname,&mod_newname)) {
5814                                 DEBUG(6, ("rename_internals: resolve_wildcards "
5815                                         "%s %s failed\n",
5816                                         directory,
5817                                         newname));
5818                                 return NT_STATUS_NO_MEMORY;
5819                         }
5820                         newname = mod_newname;
5821                 }
5822
5823                 ZERO_STRUCT(sbuf1);
5824                 SMB_VFS_STAT(conn, directory, &sbuf1);
5825
5826                 if (S_ISDIR(sbuf1.st_mode)) {
5827                         create_options |= FILE_DIRECTORY_FILE;
5828                 }
5829
5830                 status = SMB_VFS_CREATE_FILE(
5831                         conn,                           /* conn */
5832                         req,                            /* req */
5833                         0,                              /* root_dir_fid */
5834                         directory,                      /* fname */
5835                         0,                              /* create_file_flags */
5836                         access_mask,                    /* access_mask */
5837                         (FILE_SHARE_READ |              /* share_access */
5838                             FILE_SHARE_WRITE),
5839                         FILE_OPEN,                      /* create_disposition*/
5840                         create_options,                 /* create_options */
5841                         0,                              /* file_attributes */
5842                         0,                              /* oplock_request */
5843                         0,                              /* allocation_size */
5844                         NULL,                           /* sd */
5845                         NULL,                           /* ea_list */
5846                         &fsp,                           /* result */
5847                         NULL,                           /* pinfo */
5848                         &sbuf1);                        /* psbuf */
5849
5850                 if (!NT_STATUS_IS_OK(status)) {
5851                         DEBUG(3, ("Could not open rename source %s: %s\n",
5852                                   directory, nt_errstr(status)));
5853                         return status;
5854                 }
5855
5856                 status = rename_internals_fsp(conn, fsp, newname,
5857                                               last_component_dest,
5858                                               attrs, replace_if_exists);
5859
5860                 close_file(req, fsp, NORMAL_CLOSE);
5861
5862                 DEBUG(3, ("rename_internals: Error %s rename %s -> %s\n",
5863                           nt_errstr(status), directory,newname));
5864
5865                 return status;
5866         }
5867
5868         /*
5869          * Wildcards - process each file that matches.
5870          */
5871         if (strequal(mask,"????????.???")) {
5872                 mask[0] = '*';
5873                 mask[1] = '\0';
5874         }
5875
5876         status = check_name(conn, directory);
5877         if (!NT_STATUS_IS_OK(status)) {
5878                 return status;
5879         }
5880
5881         dir_hnd = OpenDir(talloc_tos(), conn, directory, mask, attrs);
5882         if (dir_hnd == NULL) {
5883                 return map_nt_error_from_unix(errno);
5884         }
5885
5886         status = NT_STATUS_NO_SUCH_FILE;
5887         /*
5888          * Was status = NT_STATUS_OBJECT_NAME_NOT_FOUND;
5889          * - gentest fix. JRA
5890          */
5891
5892         while ((dname = ReadDirName(dir_hnd, &offset))) {
5893                 files_struct *fsp = NULL;
5894                 char *fname = NULL;
5895                 char *destname = NULL;
5896                 bool sysdir_entry = False;
5897
5898                 /* Quick check for "." and ".." */
5899                 if (ISDOT(dname) || ISDOTDOT(dname)) {
5900                         if (attrs & aDIR) {
5901                                 sysdir_entry = True;
5902                         } else {
5903                                 continue;
5904                         }
5905                 }
5906
5907                 if (!is_visible_file(conn, directory, dname, &sbuf1, False)) {
5908                         continue;
5909                 }
5910
5911                 if(!mask_match(dname, mask, conn->case_sensitive)) {
5912                         continue;
5913                 }
5914
5915                 if (sysdir_entry) {
5916                         status = NT_STATUS_OBJECT_NAME_INVALID;
5917                         break;
5918                 }
5919
5920                 fname = talloc_asprintf(ctx,
5921                                 "%s/%s",
5922                                 directory,
5923                                 dname);
5924                 if (!fname) {
5925                         return NT_STATUS_NO_MEMORY;
5926                 }
5927
5928                 if (!resolve_wildcards(ctx,
5929                                 fname,newname,&destname)) {
5930                         DEBUG(6, ("resolve_wildcards %s %s failed\n",
5931                                   fname, destname));
5932                         TALLOC_FREE(fname);
5933                         continue;
5934                 }
5935                 if (!destname) {
5936                         return NT_STATUS_NO_MEMORY;
5937                 }
5938
5939                 ZERO_STRUCT(sbuf1);
5940                 SMB_VFS_STAT(conn, fname, &sbuf1);
5941
5942                 create_options = 0;
5943
5944                 if (S_ISDIR(sbuf1.st_mode)) {
5945                         create_options |= FILE_DIRECTORY_FILE;
5946                 }
5947
5948                 status = SMB_VFS_CREATE_FILE(
5949                         conn,                           /* conn */
5950                         req,                            /* req */
5951                         0,                              /* root_dir_fid */
5952                         fname,                          /* fname */
5953                         0,                              /* create_file_flags */
5954                         access_mask,                    /* access_mask */
5955                         (FILE_SHARE_READ |              /* share_access */
5956                             FILE_SHARE_WRITE),
5957                         FILE_OPEN,                      /* create_disposition*/
5958                         create_options,                 /* create_options */
5959                         0,                              /* file_attributes */
5960                         0,                              /* oplock_request */
5961                         0,                              /* allocation_size */
5962                         NULL,                           /* sd */
5963                         NULL,                           /* ea_list */
5964                         &fsp,                           /* result */
5965                         NULL,                           /* pinfo */
5966                         &sbuf1);                        /* psbuf */
5967
5968                 if (!NT_STATUS_IS_OK(status)) {
5969                         DEBUG(3,("rename_internals: SMB_VFS_CREATE_FILE "
5970                                  "returned %s rename %s -> %s\n",
5971                                  nt_errstr(status), directory, newname));
5972                         break;
5973                 }
5974
5975                 status = rename_internals_fsp(conn, fsp, destname, dname,
5976                                               attrs, replace_if_exists);
5977
5978                 close_file(req, fsp, NORMAL_CLOSE);
5979
5980                 if (!NT_STATUS_IS_OK(status)) {
5981                         DEBUG(3, ("rename_internals_fsp returned %s for "
5982                                   "rename %s -> %s\n", nt_errstr(status),
5983                                   directory, newname));
5984                         break;
5985                 }
5986
5987                 count++;
5988
5989                 DEBUG(3,("rename_internals: doing rename on %s -> "
5990                          "%s\n",fname,destname));
5991
5992                 TALLOC_FREE(fname);
5993                 TALLOC_FREE(destname);
5994         }
5995         TALLOC_FREE(dir_hnd);
5996
5997         if (count == 0 && NT_STATUS_IS_OK(status) && errno != 0) {
5998                 status = map_nt_error_from_unix(errno);
5999         }
6000
6001         return status;
6002 }
6003
6004 /****************************************************************************
6005  Reply to a mv.
6006 ****************************************************************************/
6007
6008 void reply_mv(struct smb_request *req)
6009 {
6010         connection_struct *conn = req->conn;
6011         char *name = NULL;
6012         char *newname = NULL;
6013         const char *p;
6014         uint32 attrs;
6015         NTSTATUS status;
6016         bool src_has_wcard = False;
6017         bool dest_has_wcard = False;
6018         TALLOC_CTX *ctx = talloc_tos();
6019
6020         START_PROFILE(SMBmv);
6021
6022         if (req->wct < 1) {
6023                 reply_nterror(req, NT_STATUS_INVALID_PARAMETER);
6024                 END_PROFILE(SMBmv);
6025                 return;
6026         }
6027
6028         attrs = SVAL(req->vwv+0, 0);
6029
6030         p = (const char *)req->buf + 1;
6031         p += srvstr_get_path_req_wcard(ctx, req, &name, p, STR_TERMINATE,
6032                                        &status, &src_has_wcard);
6033         if (!NT_STATUS_IS_OK(status)) {
6034                 reply_nterror(req, status);
6035                 END_PROFILE(SMBmv);
6036                 return;
6037         }
6038         p++;
6039         p += srvstr_get_path_req_wcard(ctx, req, &newname, p, STR_TERMINATE,
6040                                        &status, &dest_has_wcard);
6041         if (!NT_STATUS_IS_OK(status)) {
6042                 reply_nterror(req, status);
6043                 END_PROFILE(SMBmv);
6044                 return;
6045         }
6046
6047         status = resolve_dfspath_wcard(ctx, conn,
6048                                        req->flags2 & FLAGS2_DFS_PATHNAMES,
6049                                        name,
6050                                        &name,
6051                                        &src_has_wcard);
6052         if (!NT_STATUS_IS_OK(status)) {
6053                 if (NT_STATUS_EQUAL(status,NT_STATUS_PATH_NOT_COVERED)) {
6054                         reply_botherror(req, NT_STATUS_PATH_NOT_COVERED,
6055                                         ERRSRV, ERRbadpath);
6056                         END_PROFILE(SMBmv);
6057                         return;
6058                 }
6059                 reply_nterror(req, status);
6060                 END_PROFILE(SMBmv);
6061                 return;
6062         }
6063
6064         status = resolve_dfspath_wcard(ctx, conn,
6065                                        req->flags2 & FLAGS2_DFS_PATHNAMES,
6066                                        newname,
6067                                        &newname,
6068                                        &dest_has_wcard);
6069         if (!NT_STATUS_IS_OK(status)) {
6070                 if (NT_STATUS_EQUAL(status,NT_STATUS_PATH_NOT_COVERED)) {
6071                         reply_botherror(req, NT_STATUS_PATH_NOT_COVERED,
6072                                         ERRSRV, ERRbadpath);
6073                         END_PROFILE(SMBmv);
6074                         return;
6075                 }
6076                 reply_nterror(req, status);
6077                 END_PROFILE(SMBmv);
6078                 return;
6079         }
6080
6081         DEBUG(3,("reply_mv : %s -> %s\n",name,newname));
6082
6083         status = rename_internals(ctx, conn, req, name, newname, attrs, False,
6084                                   src_has_wcard, dest_has_wcard, DELETE_ACCESS);
6085         if (!NT_STATUS_IS_OK(status)) {
6086                 if (open_was_deferred(req->mid)) {
6087                         /* We have re-scheduled this call. */
6088                         END_PROFILE(SMBmv);
6089                         return;
6090                 }
6091                 reply_nterror(req, status);
6092                 END_PROFILE(SMBmv);
6093                 return;
6094         }
6095
6096         reply_outbuf(req, 0, 0);
6097
6098         END_PROFILE(SMBmv);
6099         return;
6100 }
6101
6102 /*******************************************************************
6103  Copy a file as part of a reply_copy.
6104 ******************************************************************/
6105
6106 /*
6107  * TODO: check error codes on all callers
6108  */
6109
6110 NTSTATUS copy_file(TALLOC_CTX *ctx,
6111                         connection_struct *conn,
6112                         const char *src,
6113                         const char *dest1,
6114                         int ofun,
6115                         int count,
6116                         bool target_is_directory)
6117 {
6118         SMB_STRUCT_STAT src_sbuf, sbuf2;
6119         SMB_OFF_T ret=-1;
6120         files_struct *fsp1,*fsp2;
6121         char *dest = NULL;
6122         uint32 dosattrs;
6123         uint32 new_create_disposition;
6124         NTSTATUS status;
6125
6126         dest = talloc_strdup(ctx, dest1);
6127         if (!dest) {
6128                 return NT_STATUS_NO_MEMORY;
6129         }
6130         if (target_is_directory) {
6131                 const char *p = strrchr_m(src,'/');
6132                 if (p) {
6133                         p++;
6134                 } else {
6135                         p = src;
6136                 }
6137                 dest = talloc_asprintf_append(dest,
6138                                 "/%s",
6139                                 p);
6140                 if (!dest) {
6141                         return NT_STATUS_NO_MEMORY;
6142                 }
6143         }
6144
6145         if (!vfs_file_exist(conn,src,&src_sbuf)) {
6146                 TALLOC_FREE(dest);
6147                 return NT_STATUS_OBJECT_NAME_NOT_FOUND;
6148         }
6149
6150         if (!target_is_directory && count) {
6151                 new_create_disposition = FILE_OPEN;
6152         } else {
6153                 if (!map_open_params_to_ntcreate(dest1,0,ofun,
6154                                 NULL, NULL, &new_create_disposition, NULL)) {
6155                         TALLOC_FREE(dest);
6156                         return NT_STATUS_INVALID_PARAMETER;
6157                 }
6158         }
6159
6160         status = SMB_VFS_CREATE_FILE(
6161                 conn,                                   /* conn */
6162                 NULL,                                   /* req */
6163                 0,                                      /* root_dir_fid */
6164                 src,                                    /* fname */
6165                 0,                                      /* create_file_flags */
6166                 FILE_GENERIC_READ,                      /* access_mask */
6167                 FILE_SHARE_READ | FILE_SHARE_WRITE,     /* share_access */
6168                 FILE_OPEN,                              /* create_disposition*/
6169                 0,                                      /* create_options */
6170                 FILE_ATTRIBUTE_NORMAL,                  /* file_attributes */
6171                 INTERNAL_OPEN_ONLY,                     /* oplock_request */
6172                 0,                                      /* allocation_size */
6173                 NULL,                                   /* sd */
6174                 NULL,                                   /* ea_list */
6175                 &fsp1,                                  /* result */
6176                 NULL,                                   /* pinfo */
6177                 &src_sbuf);                             /* psbuf */
6178
6179         if (!NT_STATUS_IS_OK(status)) {
6180                 TALLOC_FREE(dest);
6181                 return status;
6182         }
6183
6184         dosattrs = dos_mode(conn, src, &src_sbuf);
6185         if (SMB_VFS_STAT(conn,dest,&sbuf2) == -1) {
6186                 ZERO_STRUCTP(&sbuf2);
6187         }
6188
6189         status = SMB_VFS_CREATE_FILE(
6190                 conn,                                   /* conn */
6191                 NULL,                                   /* req */
6192                 0,                                      /* root_dir_fid */
6193                 dest,                                   /* fname */
6194                 0,                                      /* create_file_flags */
6195                 FILE_GENERIC_WRITE,                     /* access_mask */
6196                 FILE_SHARE_READ | FILE_SHARE_WRITE,     /* share_access */
6197                 new_create_disposition,                 /* create_disposition*/
6198                 0,                                      /* create_options */
6199                 dosattrs,                               /* file_attributes */
6200                 INTERNAL_OPEN_ONLY,                     /* oplock_request */
6201                 0,                                      /* allocation_size */
6202                 NULL,                                   /* sd */
6203                 NULL,                                   /* ea_list */
6204                 &fsp2,                                  /* result */
6205                 NULL,                                   /* pinfo */
6206                 &sbuf2);                                /* psbuf */
6207
6208         TALLOC_FREE(dest);
6209
6210         if (!NT_STATUS_IS_OK(status)) {
6211                 close_file(NULL, fsp1, ERROR_CLOSE);
6212                 return status;
6213         }
6214
6215         if ((ofun&3) == 1) {
6216                 if(SMB_VFS_LSEEK(fsp2,0,SEEK_END) == -1) {
6217                         DEBUG(0,("copy_file: error - vfs lseek returned error %s\n", strerror(errno) ));
6218                         /*
6219                          * Stop the copy from occurring.
6220                          */
6221                         ret = -1;
6222                         src_sbuf.st_size = 0;
6223                 }
6224         }
6225
6226         if (src_sbuf.st_size) {
6227                 ret = vfs_transfer_file(fsp1, fsp2, src_sbuf.st_size);
6228         }
6229
6230         close_file(NULL, fsp1, NORMAL_CLOSE);
6231
6232         /* Ensure the modtime is set correctly on the destination file. */
6233         set_close_write_time(fsp2, get_mtimespec(&src_sbuf));
6234
6235         /*
6236          * As we are opening fsp1 read-only we only expect
6237          * an error on close on fsp2 if we are out of space.
6238          * Thus we don't look at the error return from the
6239          * close of fsp1.
6240          */
6241         status = close_file(NULL, fsp2, NORMAL_CLOSE);
6242
6243         if (!NT_STATUS_IS_OK(status)) {
6244                 return status;
6245         }
6246
6247         if (ret != (SMB_OFF_T)src_sbuf.st_size) {
6248                 return NT_STATUS_DISK_FULL;
6249         }
6250
6251         return NT_STATUS_OK;
6252 }
6253
6254 /****************************************************************************
6255  Reply to a file copy.
6256 ****************************************************************************/
6257
6258 void reply_copy(struct smb_request *req)
6259 {
6260         connection_struct *conn = req->conn;
6261         char *name = NULL;
6262         char *newname = NULL;
6263         char *directory = NULL;
6264         const char *mask = NULL;
6265         const char mask_star[] = "*";
6266         const char *p;
6267         int count=0;
6268         int error = ERRnoaccess;
6269         int err = 0;
6270         int tid2;
6271         int ofun;
6272         int flags;
6273         bool target_is_directory=False;
6274         bool source_has_wild = False;
6275         bool dest_has_wild = False;
6276         SMB_STRUCT_STAT sbuf1, sbuf2;
6277         NTSTATUS status;
6278         TALLOC_CTX *ctx = talloc_tos();
6279
6280         START_PROFILE(SMBcopy);
6281
6282         if (req->wct < 3) {
6283                 reply_nterror(req, NT_STATUS_INVALID_PARAMETER);
6284                 END_PROFILE(SMBcopy);
6285                 return;
6286         }
6287
6288         tid2 = SVAL(req->vwv+0, 0);
6289         ofun = SVAL(req->vwv+1, 0);
6290         flags = SVAL(req->vwv+2, 0);
6291
6292         p = (const char *)req->buf;
6293         p += srvstr_get_path_req_wcard(ctx, req, &name, p, STR_TERMINATE,
6294                                        &status, &source_has_wild);
6295         if (!NT_STATUS_IS_OK(status)) {
6296                 reply_nterror(req, status);
6297                 END_PROFILE(SMBcopy);
6298                 return;
6299         }
6300         p += srvstr_get_path_req_wcard(ctx, req, &newname, p, STR_TERMINATE,
6301                                        &status, &dest_has_wild);
6302         if (!NT_STATUS_IS_OK(status)) {
6303                 reply_nterror(req, status);
6304                 END_PROFILE(SMBcopy);
6305                 return;
6306         }
6307
6308         DEBUG(3,("reply_copy : %s -> %s\n",name,newname));
6309
6310         if (tid2 != conn->cnum) {
6311                 /* can't currently handle inter share copies XXXX */
6312                 DEBUG(3,("Rejecting inter-share copy\n"));
6313                 reply_doserror(req, ERRSRV, ERRinvdevice);
6314                 END_PROFILE(SMBcopy);
6315                 return;
6316         }
6317
6318         status = resolve_dfspath_wcard(ctx, conn,
6319                                        req->flags2 & FLAGS2_DFS_PATHNAMES,
6320                                        name,
6321                                        &name,
6322                                        &source_has_wild);
6323         if (!NT_STATUS_IS_OK(status)) {
6324                 if (NT_STATUS_EQUAL(status,NT_STATUS_PATH_NOT_COVERED)) {
6325                         reply_botherror(req, NT_STATUS_PATH_NOT_COVERED,
6326                                         ERRSRV, ERRbadpath);
6327                         END_PROFILE(SMBcopy);
6328                         return;
6329                 }
6330                 reply_nterror(req, status);
6331                 END_PROFILE(SMBcopy);
6332                 return;
6333         }
6334
6335         status = resolve_dfspath_wcard(ctx, conn,
6336                                        req->flags2 & FLAGS2_DFS_PATHNAMES,
6337                                        newname,
6338                                        &newname,
6339                                        &dest_has_wild);
6340         if (!NT_STATUS_IS_OK(status)) {
6341                 if (NT_STATUS_EQUAL(status,NT_STATUS_PATH_NOT_COVERED)) {
6342                         reply_botherror(req, NT_STATUS_PATH_NOT_COVERED,
6343                                         ERRSRV, ERRbadpath);
6344                         END_PROFILE(SMBcopy);
6345                         return;
6346                 }
6347                 reply_nterror(req, status);
6348                 END_PROFILE(SMBcopy);
6349                 return;
6350         }
6351
6352         status = unix_convert(ctx, conn, name, source_has_wild,
6353                         &name, NULL, &sbuf1);
6354         if (!NT_STATUS_IS_OK(status)) {
6355                 reply_nterror(req, status);
6356                 END_PROFILE(SMBcopy);
6357                 return;
6358         }
6359
6360         status = unix_convert(ctx, conn, newname, dest_has_wild,
6361                         &newname, NULL, &sbuf2);
6362         if (!NT_STATUS_IS_OK(status)) {
6363                 reply_nterror(req, status);
6364                 END_PROFILE(SMBcopy);
6365                 return;
6366         }
6367
6368         target_is_directory = VALID_STAT_OF_DIR(sbuf2);
6369
6370         if ((flags&1) && target_is_directory) {
6371                 reply_doserror(req, ERRDOS, ERRbadfile);
6372                 END_PROFILE(SMBcopy);
6373                 return;
6374         }
6375
6376         if ((flags&2) && !target_is_directory) {
6377                 reply_doserror(req, ERRDOS, ERRbadpath);
6378                 END_PROFILE(SMBcopy);
6379                 return;
6380         }
6381
6382         if ((flags&(1<<5)) && VALID_STAT_OF_DIR(sbuf1)) {
6383                 /* wants a tree copy! XXXX */
6384                 DEBUG(3,("Rejecting tree copy\n"));
6385                 reply_doserror(req, ERRSRV, ERRerror);
6386                 END_PROFILE(SMBcopy);
6387                 return;
6388         }
6389
6390         p = strrchr_m(name,'/');
6391         if (p != NULL) {
6392                 directory = talloc_strndup(ctx, name, PTR_DIFF(p, name));
6393                 mask = p+1;
6394         } else {
6395                 directory = talloc_strdup(ctx, "./");
6396                 mask = name;
6397         }
6398
6399         if (!directory) {
6400                 reply_nterror(req, NT_STATUS_NO_MEMORY);
6401                 END_PROFILE(SMBcopy);
6402                 return;
6403         }
6404
6405         /*
6406          * We should only check the mangled cache
6407          * here if unix_convert failed. This means
6408          * that the path in 'mask' doesn't exist
6409          * on the file system and so we need to look
6410          * for a possible mangle. This patch from
6411          * Tine Smukavec <valentin.smukavec@hermes.si>.
6412          */
6413
6414         if (!VALID_STAT(sbuf1) && mangle_is_mangled(mask, conn->params)) {
6415                 char *new_mask = NULL;
6416                 mangle_lookup_name_from_8_3(ctx,
6417                                         mask,
6418                                         &new_mask,
6419                                         conn->params );
6420                 if (new_mask) {
6421                         mask = new_mask;
6422                 }
6423         }
6424
6425         if (!source_has_wild) {
6426                 directory = talloc_asprintf_append(directory,
6427                                 "/%s",
6428                                 mask);
6429                 if (dest_has_wild) {
6430                         char *mod_newname = NULL;
6431                         if (!resolve_wildcards(ctx,
6432                                         directory,newname,&mod_newname)) {
6433                                 reply_nterror(req, NT_STATUS_NO_MEMORY);
6434                                 END_PROFILE(SMBcopy);
6435                                 return;
6436                         }
6437                         newname = mod_newname;
6438                 }
6439
6440                 status = check_name(conn, directory);
6441                 if (!NT_STATUS_IS_OK(status)) {
6442                         reply_nterror(req, status);
6443                         END_PROFILE(SMBcopy);
6444                         return;
6445                 }
6446
6447                 status = check_name(conn, newname);
6448                 if (!NT_STATUS_IS_OK(status)) {
6449                         reply_nterror(req, status);
6450                         END_PROFILE(SMBcopy);
6451                         return;
6452                 }
6453
6454                 status = copy_file(ctx,conn,directory,newname,ofun,
6455                                 count,target_is_directory);
6456
6457                 if(!NT_STATUS_IS_OK(status)) {
6458                         reply_nterror(req, status);
6459                         END_PROFILE(SMBcopy);
6460                         return;
6461                 } else {
6462                         count++;
6463                 }
6464         } else {
6465                 struct smb_Dir *dir_hnd = NULL;
6466                 const char *dname = NULL;
6467                 long offset = 0;
6468
6469                 if (strequal(mask,"????????.???")) {
6470                         mask = mask_star;
6471                 }
6472
6473                 status = check_name(conn, directory);
6474                 if (!NT_STATUS_IS_OK(status)) {
6475                         reply_nterror(req, status);
6476                         END_PROFILE(SMBcopy);
6477                         return;
6478                 }
6479
6480                 dir_hnd = OpenDir(talloc_tos(), conn, directory, mask, 0);
6481                 if (dir_hnd == NULL) {
6482                         status = map_nt_error_from_unix(errno);
6483                         reply_nterror(req, status);
6484                         END_PROFILE(SMBcopy);
6485                         return;
6486                 }
6487
6488                 error = ERRbadfile;
6489
6490                 while ((dname = ReadDirName(dir_hnd, &offset))) {
6491                         char *destname = NULL;
6492                         char *fname = NULL;
6493
6494                         if (ISDOT(dname) || ISDOTDOT(dname)) {
6495                                 continue;
6496                         }
6497
6498                         if (!is_visible_file(conn, directory, dname, &sbuf1, False)) {
6499                                 continue;
6500                         }
6501
6502                         if(!mask_match(dname, mask, conn->case_sensitive)) {
6503                                 continue;
6504                         }
6505
6506                         error = ERRnoaccess;
6507                         fname = talloc_asprintf(ctx,
6508                                         "%s/%s",
6509                                         directory,
6510                                         dname);
6511                         if (!fname) {
6512                                 TALLOC_FREE(dir_hnd);
6513                                 reply_nterror(req, NT_STATUS_NO_MEMORY);
6514                                 END_PROFILE(SMBcopy);
6515                                 return;
6516                         }
6517
6518                         if (!resolve_wildcards(ctx,
6519                                         fname,newname,&destname)) {
6520                                 continue;
6521                         }
6522                         if (!destname) {
6523                                 TALLOC_FREE(dir_hnd);
6524                                 reply_nterror(req, NT_STATUS_NO_MEMORY);
6525                                 END_PROFILE(SMBcopy);
6526                                 return;
6527                         }
6528
6529                         status = check_name(conn, fname);
6530                         if (!NT_STATUS_IS_OK(status)) {
6531                                 TALLOC_FREE(dir_hnd);
6532                                 reply_nterror(req, status);
6533                                 END_PROFILE(SMBcopy);
6534                                 return;
6535                         }
6536
6537                         status = check_name(conn, destname);
6538                         if (!NT_STATUS_IS_OK(status)) {
6539                                 TALLOC_FREE(dir_hnd);
6540                                 reply_nterror(req, status);
6541                                 END_PROFILE(SMBcopy);
6542                                 return;
6543                         }
6544
6545                         DEBUG(3,("reply_copy : doing copy on %s -> %s\n",fname, destname));
6546
6547                         status = copy_file(ctx,conn,fname,destname,ofun,
6548                                         count,target_is_directory);
6549                         if (NT_STATUS_IS_OK(status)) {
6550                                 count++;
6551                         }
6552                         TALLOC_FREE(fname);
6553                         TALLOC_FREE(destname);
6554                 }
6555                 TALLOC_FREE(dir_hnd);
6556         }
6557
6558         if (count == 0) {
6559                 if(err) {
6560                         /* Error on close... */
6561                         errno = err;
6562                         reply_unixerror(req, ERRHRD, ERRgeneral);
6563                         END_PROFILE(SMBcopy);
6564                         return;
6565                 }
6566
6567                 reply_doserror(req, ERRDOS, error);
6568                 END_PROFILE(SMBcopy);
6569                 return;
6570         }
6571
6572         reply_outbuf(req, 1, 0);
6573         SSVAL(req->outbuf,smb_vwv0,count);
6574
6575         END_PROFILE(SMBcopy);
6576         return;
6577 }
6578
6579 #undef DBGC_CLASS
6580 #define DBGC_CLASS DBGC_LOCKING
6581
6582 /****************************************************************************
6583  Get a lock pid, dealing with large count requests.
6584 ****************************************************************************/
6585
6586 uint32 get_lock_pid(const uint8_t *data, int data_offset,
6587                     bool large_file_format)
6588 {
6589         if(!large_file_format)
6590                 return (uint32)SVAL(data,SMB_LPID_OFFSET(data_offset));
6591         else
6592                 return (uint32)SVAL(data,SMB_LARGE_LPID_OFFSET(data_offset));
6593 }
6594
6595 /****************************************************************************
6596  Get a lock count, dealing with large count requests.
6597 ****************************************************************************/
6598
6599 uint64_t get_lock_count(const uint8_t *data, int data_offset,
6600                         bool large_file_format)
6601 {
6602         uint64_t count = 0;
6603
6604         if(!large_file_format) {
6605                 count = (uint64_t)IVAL(data,SMB_LKLEN_OFFSET(data_offset));
6606         } else {
6607
6608 #if defined(HAVE_LONGLONG)
6609                 count = (((uint64_t) IVAL(data,SMB_LARGE_LKLEN_OFFSET_HIGH(data_offset))) << 32) |
6610                         ((uint64_t) IVAL(data,SMB_LARGE_LKLEN_OFFSET_LOW(data_offset)));
6611 #else /* HAVE_LONGLONG */
6612
6613                 /*
6614                  * NT4.x seems to be broken in that it sends large file (64 bit)
6615                  * lockingX calls even if the CAP_LARGE_FILES was *not*
6616                  * negotiated. For boxes without large unsigned ints truncate the
6617                  * lock count by dropping the top 32 bits.
6618                  */
6619
6620                 if(IVAL(data,SMB_LARGE_LKLEN_OFFSET_HIGH(data_offset)) != 0) {
6621                         DEBUG(3,("get_lock_count: truncating lock count (high)0x%x (low)0x%x to just low count.\n",
6622                                 (unsigned int)IVAL(data,SMB_LARGE_LKLEN_OFFSET_HIGH(data_offset)),
6623                                 (unsigned int)IVAL(data,SMB_LARGE_LKLEN_OFFSET_LOW(data_offset)) ));
6624                                 SIVAL(data,SMB_LARGE_LKLEN_OFFSET_HIGH(data_offset),0);
6625                 }
6626
6627                 count = (uint64_t)IVAL(data,SMB_LARGE_LKLEN_OFFSET_LOW(data_offset));
6628 #endif /* HAVE_LONGLONG */
6629         }
6630
6631         return count;
6632 }
6633
6634 #if !defined(HAVE_LONGLONG)
6635 /****************************************************************************
6636  Pathetically try and map a 64 bit lock offset into 31 bits. I hate Windows :-).
6637 ****************************************************************************/
6638
6639 static uint32 map_lock_offset(uint32 high, uint32 low)
6640 {
6641         unsigned int i;
6642         uint32 mask = 0;
6643         uint32 highcopy = high;
6644
6645         /*
6646          * Try and find out how many significant bits there are in high.
6647          */
6648
6649         for(i = 0; highcopy; i++)
6650                 highcopy >>= 1;
6651
6652         /*
6653          * We use 31 bits not 32 here as POSIX
6654          * lock offsets may not be negative.
6655          */
6656
6657         mask = (~0) << (31 - i);
6658
6659         if(low & mask)
6660                 return 0; /* Fail. */
6661
6662         high <<= (31 - i);
6663
6664         return (high|low);
6665 }
6666 #endif /* !defined(HAVE_LONGLONG) */
6667
6668 /****************************************************************************
6669  Get a lock offset, dealing with large offset requests.
6670 ****************************************************************************/
6671
6672 uint64_t get_lock_offset(const uint8_t *data, int data_offset,
6673                          bool large_file_format, bool *err)
6674 {
6675         uint64_t offset = 0;
6676
6677         *err = False;
6678
6679         if(!large_file_format) {
6680                 offset = (uint64_t)IVAL(data,SMB_LKOFF_OFFSET(data_offset));
6681         } else {
6682
6683 #if defined(HAVE_LONGLONG)
6684                 offset = (((uint64_t) IVAL(data,SMB_LARGE_LKOFF_OFFSET_HIGH(data_offset))) << 32) |
6685                                 ((uint64_t) IVAL(data,SMB_LARGE_LKOFF_OFFSET_LOW(data_offset)));
6686 #else /* HAVE_LONGLONG */
6687
6688                 /*
6689                  * NT4.x seems to be broken in that it sends large file (64 bit)
6690                  * lockingX calls even if the CAP_LARGE_FILES was *not*
6691                  * negotiated. For boxes without large unsigned ints mangle the
6692                  * lock offset by mapping the top 32 bits onto the lower 32.
6693                  */
6694
6695                 if(IVAL(data,SMB_LARGE_LKOFF_OFFSET_HIGH(data_offset)) != 0) {
6696                         uint32 low = IVAL(data,SMB_LARGE_LKOFF_OFFSET_LOW(data_offset));
6697                         uint32 high = IVAL(data,SMB_LARGE_LKOFF_OFFSET_HIGH(data_offset));
6698                         uint32 new_low = 0;
6699
6700                         if((new_low = map_lock_offset(high, low)) == 0) {
6701                                 *err = True;
6702                                 return (uint64_t)-1;
6703                         }
6704
6705                         DEBUG(3,("get_lock_offset: truncating lock offset (high)0x%x (low)0x%x to offset 0x%x.\n",
6706                                 (unsigned int)high, (unsigned int)low, (unsigned int)new_low ));
6707                         SIVAL(data,SMB_LARGE_LKOFF_OFFSET_HIGH(data_offset),0);
6708                         SIVAL(data,SMB_LARGE_LKOFF_OFFSET_LOW(data_offset),new_low);
6709                 }
6710
6711                 offset = (uint64_t)IVAL(data,SMB_LARGE_LKOFF_OFFSET_LOW(data_offset));
6712 #endif /* HAVE_LONGLONG */
6713         }
6714
6715         return offset;
6716 }
6717
6718 /****************************************************************************
6719  Reply to a lockingX request.
6720 ****************************************************************************/
6721
6722 void reply_lockingX(struct smb_request *req)
6723 {
6724         connection_struct *conn = req->conn;
6725         files_struct *fsp;
6726         unsigned char locktype;
6727         unsigned char oplocklevel;
6728         uint16 num_ulocks;
6729         uint16 num_locks;
6730         uint64_t count = 0, offset = 0;
6731         uint32 lock_pid;
6732         int32 lock_timeout;
6733         int i;
6734         const uint8_t *data;
6735         bool large_file_format;
6736         bool err;
6737         NTSTATUS status = NT_STATUS_UNSUCCESSFUL;
6738
6739         START_PROFILE(SMBlockingX);
6740
6741         if (req->wct < 8) {
6742                 reply_nterror(req, NT_STATUS_INVALID_PARAMETER);
6743                 END_PROFILE(SMBlockingX);
6744                 return;
6745         }
6746
6747         fsp = file_fsp(req, SVAL(req->vwv+2, 0));
6748         locktype = CVAL(req->vwv+3, 0);
6749         oplocklevel = CVAL(req->vwv+3, 1);
6750         num_ulocks = SVAL(req->vwv+6, 0);
6751         num_locks = SVAL(req->vwv+7, 0);
6752         lock_timeout = IVAL(req->vwv+4, 0);
6753         large_file_format = (locktype & LOCKING_ANDX_LARGE_FILES)?True:False;
6754
6755         if (!check_fsp(conn, req, fsp)) {
6756                 END_PROFILE(SMBlockingX);
6757                 return;
6758         }
6759
6760         data = req->buf;
6761
6762         if (locktype & LOCKING_ANDX_CHANGE_LOCKTYPE) {
6763                 /* we don't support these - and CANCEL_LOCK makes w2k
6764                    and XP reboot so I don't really want to be
6765                    compatible! (tridge) */
6766                 reply_nterror(req, NT_STATUS_DOS(ERRDOS, ERRnoatomiclocks));
6767                 END_PROFILE(SMBlockingX);
6768                 return;
6769         }
6770
6771         /* Check if this is an oplock break on a file
6772            we have granted an oplock on.
6773         */
6774         if ((locktype & LOCKING_ANDX_OPLOCK_RELEASE)) {
6775                 /* Client can insist on breaking to none. */
6776                 bool break_to_none = (oplocklevel == 0);
6777                 bool result;
6778
6779                 DEBUG(5,("reply_lockingX: oplock break reply (%u) from client "
6780                          "for fnum = %d\n", (unsigned int)oplocklevel,
6781                          fsp->fnum ));
6782
6783                 /*
6784                  * Make sure we have granted an exclusive or batch oplock on
6785                  * this file.
6786                  */
6787
6788                 if (fsp->oplock_type == 0) {
6789
6790                         /* The Samba4 nbench simulator doesn't understand
6791                            the difference between break to level2 and break
6792                            to none from level2 - it sends oplock break
6793                            replies in both cases. Don't keep logging an error
6794                            message here - just ignore it. JRA. */
6795
6796                         DEBUG(5,("reply_lockingX: Error : oplock break from "
6797                                  "client for fnum = %d (oplock=%d) and no "
6798                                  "oplock granted on this file (%s).\n",
6799                                  fsp->fnum, fsp->oplock_type, fsp->fsp_name));
6800
6801                         /* if this is a pure oplock break request then don't
6802                          * send a reply */
6803                         if (num_locks == 0 && num_ulocks == 0) {
6804                                 END_PROFILE(SMBlockingX);
6805                                 return;
6806                         } else {
6807                                 END_PROFILE(SMBlockingX);
6808                                 reply_doserror(req, ERRDOS, ERRlock);
6809                                 return;
6810                         }
6811                 }
6812
6813                 if ((fsp->sent_oplock_break == BREAK_TO_NONE_SENT) ||
6814                     (break_to_none)) {
6815                         result = remove_oplock(fsp);
6816                 } else {
6817                         result = downgrade_oplock(fsp);
6818                 }
6819
6820                 if (!result) {
6821                         DEBUG(0, ("reply_lockingX: error in removing "
6822                                   "oplock on file %s\n", fsp->fsp_name));
6823                         /* Hmmm. Is this panic justified? */
6824                         smb_panic("internal tdb error");
6825                 }
6826
6827                 reply_to_oplock_break_requests(fsp);
6828
6829                 /* if this is a pure oplock break request then don't send a
6830                  * reply */
6831                 if (num_locks == 0 && num_ulocks == 0) {
6832                         /* Sanity check - ensure a pure oplock break is not a
6833                            chained request. */
6834                         if(CVAL(req->vwv+0, 0) != 0xff)
6835                                 DEBUG(0,("reply_lockingX: Error : pure oplock "
6836                                          "break is a chained %d request !\n",
6837                                          (unsigned int)CVAL(req->vwv+0, 0)));
6838                         END_PROFILE(SMBlockingX);
6839                         return;
6840                 }
6841         }
6842
6843         /*
6844          * We do this check *after* we have checked this is not a oplock break
6845          * response message. JRA.
6846          */
6847
6848         release_level_2_oplocks_on_change(fsp);
6849
6850         if (req->buflen <
6851             (num_ulocks + num_locks) * (large_file_format ? 20 : 10)) {
6852                 reply_nterror(req, NT_STATUS_INVALID_PARAMETER);
6853                 END_PROFILE(SMBlockingX);
6854                 return;
6855         }
6856
6857         /* Data now points at the beginning of the list
6858            of smb_unlkrng structs */
6859         for(i = 0; i < (int)num_ulocks; i++) {
6860                 lock_pid = get_lock_pid( data, i, large_file_format);
6861                 count = get_lock_count( data, i, large_file_format);
6862                 offset = get_lock_offset( data, i, large_file_format, &err);
6863
6864                 /*
6865                  * There is no error code marked "stupid client bug".... :-).
6866                  */
6867                 if(err) {
6868                         END_PROFILE(SMBlockingX);
6869                         reply_doserror(req, ERRDOS, ERRnoaccess);
6870                         return;
6871                 }
6872
6873                 DEBUG(10,("reply_lockingX: unlock start=%.0f, len=%.0f for "
6874                           "pid %u, file %s\n", (double)offset, (double)count,
6875                           (unsigned int)lock_pid, fsp->fsp_name ));
6876
6877                 status = do_unlock(smbd_messaging_context(),
6878                                 fsp,
6879                                 lock_pid,
6880                                 count,
6881                                 offset,
6882                                 WINDOWS_LOCK);
6883
6884                 if (NT_STATUS_V(status)) {
6885                         END_PROFILE(SMBlockingX);
6886                         reply_nterror(req, status);
6887                         return;
6888                 }
6889         }
6890
6891         /* Setup the timeout in seconds. */
6892
6893         if (!lp_blocking_locks(SNUM(conn))) {
6894                 lock_timeout = 0;
6895         }
6896
6897         /* Now do any requested locks */
6898         data += ((large_file_format ? 20 : 10)*num_ulocks);
6899
6900         /* Data now points at the beginning of the list
6901            of smb_lkrng structs */
6902
6903         for(i = 0; i < (int)num_locks; i++) {
6904                 enum brl_type lock_type = ((locktype & LOCKING_ANDX_SHARED_LOCK) ?
6905                                 READ_LOCK:WRITE_LOCK);
6906                 lock_pid = get_lock_pid( data, i, large_file_format);
6907                 count = get_lock_count( data, i, large_file_format);
6908                 offset = get_lock_offset( data, i, large_file_format, &err);
6909
6910                 /*
6911                  * There is no error code marked "stupid client bug".... :-).
6912                  */
6913                 if(err) {
6914                         END_PROFILE(SMBlockingX);
6915                         reply_doserror(req, ERRDOS, ERRnoaccess);
6916                         return;
6917                 }
6918
6919                 DEBUG(10,("reply_lockingX: lock start=%.0f, len=%.0f for pid "
6920                           "%u, file %s timeout = %d\n", (double)offset,
6921                           (double)count, (unsigned int)lock_pid,
6922                           fsp->fsp_name, (int)lock_timeout ));
6923
6924                 if (locktype & LOCKING_ANDX_CANCEL_LOCK) {
6925                         if (lp_blocking_locks(SNUM(conn))) {
6926
6927                                 /* Schedule a message to ourselves to
6928                                    remove the blocking lock record and
6929                                    return the right error. */
6930
6931                                 if (!blocking_lock_cancel(fsp,
6932                                                 lock_pid,
6933                                                 offset,
6934                                                 count,
6935                                                 WINDOWS_LOCK,
6936                                                 locktype,
6937                                                 NT_STATUS_FILE_LOCK_CONFLICT)) {
6938                                         END_PROFILE(SMBlockingX);
6939                                         reply_nterror(
6940                                                 req,
6941                                                 NT_STATUS_DOS(
6942                                                         ERRDOS,
6943                                                         ERRcancelviolation));
6944                                         return;
6945                                 }
6946                         }
6947                         /* Remove a matching pending lock. */
6948                         status = do_lock_cancel(fsp,
6949                                                 lock_pid,
6950                                                 count,
6951                                                 offset,
6952                                                 WINDOWS_LOCK);
6953                 } else {
6954                         bool blocking_lock = lock_timeout ? True : False;
6955                         bool defer_lock = False;
6956                         struct byte_range_lock *br_lck;
6957                         uint32 block_smbpid;
6958
6959                         br_lck = do_lock(smbd_messaging_context(),
6960                                         fsp,
6961                                         lock_pid,
6962                                         count,
6963                                         offset, 
6964                                         lock_type,
6965                                         WINDOWS_LOCK,
6966                                         blocking_lock,
6967                                         &status,
6968                                         &block_smbpid);
6969
6970                         if (br_lck && blocking_lock && ERROR_WAS_LOCK_DENIED(status)) {
6971                                 /* Windows internal resolution for blocking locks seems
6972                                    to be about 200ms... Don't wait for less than that. JRA. */
6973                                 if (lock_timeout != -1 && lock_timeout < lp_lock_spin_time()) {
6974                                         lock_timeout = lp_lock_spin_time();
6975                                 }
6976                                 defer_lock = True;
6977                         }
6978
6979                         /* This heuristic seems to match W2K3 very well. If a
6980                            lock sent with timeout of zero would fail with NT_STATUS_FILE_LOCK_CONFLICT
6981                            it pretends we asked for a timeout of between 150 - 300 milliseconds as
6982                            far as I can tell. Replacement for do_lock_spin(). JRA. */
6983
6984                         if (br_lck && lp_blocking_locks(SNUM(conn)) && !blocking_lock &&
6985                                         NT_STATUS_EQUAL((status), NT_STATUS_FILE_LOCK_CONFLICT)) {
6986                                 defer_lock = True;
6987                                 lock_timeout = lp_lock_spin_time();
6988                         }
6989
6990                         if (br_lck && defer_lock) {
6991                                 /*
6992                                  * A blocking lock was requested. Package up
6993                                  * this smb into a queued request and push it
6994                                  * onto the blocking lock queue.
6995                                  */
6996                                 if(push_blocking_lock_request(br_lck,
6997                                                         req,
6998                                                         fsp,
6999                                                         lock_timeout,
7000                                                         i,
7001                                                         lock_pid,
7002                                                         lock_type,
7003                                                         WINDOWS_LOCK,
7004                                                         offset,
7005                                                         count,
7006                                                         block_smbpid)) {
7007                                         TALLOC_FREE(br_lck);
7008                                         END_PROFILE(SMBlockingX);
7009                                         return;
7010                                 }
7011                         }
7012
7013                         TALLOC_FREE(br_lck);
7014                 }
7015
7016                 if (NT_STATUS_V(status)) {
7017                         END_PROFILE(SMBlockingX);
7018                         reply_nterror(req, status);
7019                         return;
7020                 }
7021         }
7022
7023         /* If any of the above locks failed, then we must unlock
7024            all of the previous locks (X/Open spec). */
7025
7026         if (!(locktype & LOCKING_ANDX_CANCEL_LOCK) &&
7027                         (i != num_locks) &&
7028                         (num_locks != 0)) {
7029                 /*
7030                  * Ensure we don't do a remove on the lock that just failed,
7031                  * as under POSIX rules, if we have a lock already there, we
7032                  * will delete it (and we shouldn't) .....
7033                  */
7034                 for(i--; i >= 0; i--) {
7035                         lock_pid = get_lock_pid( data, i, large_file_format);
7036                         count = get_lock_count( data, i, large_file_format);
7037                         offset = get_lock_offset( data, i, large_file_format,
7038                                                   &err);
7039
7040                         /*
7041                          * There is no error code marked "stupid client
7042                          * bug".... :-).
7043                          */
7044                         if(err) {
7045                                 END_PROFILE(SMBlockingX);
7046                                 reply_doserror(req, ERRDOS, ERRnoaccess);
7047                                 return;
7048                         }
7049
7050                         do_unlock(smbd_messaging_context(),
7051                                 fsp,
7052                                 lock_pid,
7053                                 count,
7054                                 offset,
7055                                 WINDOWS_LOCK);
7056                 }
7057                 END_PROFILE(SMBlockingX);
7058                 reply_nterror(req, status);
7059                 return;
7060         }
7061
7062         reply_outbuf(req, 2, 0);
7063
7064         DEBUG(3, ("lockingX fnum=%d type=%d num_locks=%d num_ulocks=%d\n",
7065                   fsp->fnum, (unsigned int)locktype, num_locks, num_ulocks));
7066
7067         END_PROFILE(SMBlockingX);
7068         chain_reply(req);
7069 }
7070
7071 #undef DBGC_CLASS
7072 #define DBGC_CLASS DBGC_ALL
7073
7074 /****************************************************************************
7075  Reply to a SMBreadbmpx (read block multiplex) request.
7076  Always reply with an error, if someone has a platform really needs this,
7077  please contact vl@samba.org
7078 ****************************************************************************/
7079
7080 void reply_readbmpx(struct smb_request *req)
7081 {
7082         START_PROFILE(SMBreadBmpx);
7083         reply_doserror(req, ERRSRV, ERRuseSTD);
7084         END_PROFILE(SMBreadBmpx);
7085         return;
7086 }
7087
7088 /****************************************************************************
7089  Reply to a SMBreadbs (read block multiplex secondary) request.
7090  Always reply with an error, if someone has a platform really needs this,
7091  please contact vl@samba.org
7092 ****************************************************************************/
7093
7094 void reply_readbs(struct smb_request *req)
7095 {
7096         START_PROFILE(SMBreadBs);
7097         reply_doserror(req, ERRSRV, ERRuseSTD);
7098         END_PROFILE(SMBreadBs);
7099         return;
7100 }
7101
7102 /****************************************************************************
7103  Reply to a SMBsetattrE.
7104 ****************************************************************************/
7105
7106 void reply_setattrE(struct smb_request *req)
7107 {
7108         connection_struct *conn = req->conn;
7109         struct timespec ts[2];
7110         files_struct *fsp;
7111         SMB_STRUCT_STAT sbuf;
7112         NTSTATUS status;
7113
7114         START_PROFILE(SMBsetattrE);
7115
7116         if (req->wct < 7) {
7117                 reply_nterror(req, NT_STATUS_INVALID_PARAMETER);
7118                 END_PROFILE(SMBsetattrE);
7119                 return;
7120         }
7121
7122         fsp = file_fsp(req, SVAL(req->vwv+0, 0));
7123
7124         if(!fsp || (fsp->conn != conn)) {
7125                 reply_doserror(req, ERRDOS, ERRbadfid);
7126                 END_PROFILE(SMBsetattrE);
7127                 return;
7128         }
7129
7130
7131         /*
7132          * Convert the DOS times into unix times. Ignore create
7133          * time as UNIX can't set this.
7134          */
7135
7136         ts[0] = convert_time_t_to_timespec(
7137                 srv_make_unix_date2(req->vwv+3)); /* atime. */
7138         ts[1] = convert_time_t_to_timespec(
7139                 srv_make_unix_date2(req->vwv+5)); /* mtime. */
7140
7141         reply_outbuf(req, 0, 0);
7142
7143         /* 
7144          * Patch from Ray Frush <frush@engr.colostate.edu>
7145          * Sometimes times are sent as zero - ignore them.
7146          */
7147
7148         /* Ensure we have a valid stat struct for the source. */
7149         if (fsp->fh->fd != -1) {
7150                 if (SMB_VFS_FSTAT(fsp, &sbuf) == -1) {
7151                         status = map_nt_error_from_unix(errno);
7152                         reply_nterror(req, status);
7153                         END_PROFILE(SMBsetattrE);
7154                         return;
7155                 }
7156         } else {
7157                 if (SMB_VFS_STAT(conn, fsp->fsp_name, &sbuf) == -1) {
7158                         status = map_nt_error_from_unix(errno);
7159                         reply_nterror(req, status);
7160                         END_PROFILE(SMBsetattrE);
7161                         return;
7162                 }
7163         }
7164
7165         status = smb_set_file_time(conn, fsp, fsp->fsp_name,
7166                                    &sbuf, ts, true);
7167         if (!NT_STATUS_IS_OK(status)) {
7168                 reply_doserror(req, ERRDOS, ERRnoaccess);
7169                 END_PROFILE(SMBsetattrE);
7170                 return;
7171         }
7172
7173         DEBUG( 3, ( "reply_setattrE fnum=%d actime=%u modtime=%u\n",
7174                 fsp->fnum,
7175                 (unsigned int)ts[0].tv_sec,
7176                 (unsigned int)ts[1].tv_sec));
7177
7178         END_PROFILE(SMBsetattrE);
7179         return;
7180 }
7181
7182
7183 /* Back from the dead for OS/2..... JRA. */
7184
7185 /****************************************************************************
7186  Reply to a SMBwritebmpx (write block multiplex primary) request.
7187  Always reply with an error, if someone has a platform really needs this,
7188  please contact vl@samba.org
7189 ****************************************************************************/
7190
7191 void reply_writebmpx(struct smb_request *req)
7192 {
7193         START_PROFILE(SMBwriteBmpx);
7194         reply_doserror(req, ERRSRV, ERRuseSTD);
7195         END_PROFILE(SMBwriteBmpx);
7196         return;
7197 }
7198
7199 /****************************************************************************
7200  Reply to a SMBwritebs (write block multiplex secondary) request.
7201  Always reply with an error, if someone has a platform really needs this,
7202  please contact vl@samba.org
7203 ****************************************************************************/
7204
7205 void reply_writebs(struct smb_request *req)
7206 {
7207         START_PROFILE(SMBwriteBs);
7208         reply_doserror(req, ERRSRV, ERRuseSTD);
7209         END_PROFILE(SMBwriteBs);
7210         return;
7211 }
7212
7213 /****************************************************************************
7214  Reply to a SMBgetattrE.
7215 ****************************************************************************/
7216
7217 void reply_getattrE(struct smb_request *req)
7218 {
7219         connection_struct *conn = req->conn;
7220         SMB_STRUCT_STAT sbuf;
7221         int mode;
7222         files_struct *fsp;
7223         struct timespec create_ts;
7224
7225         START_PROFILE(SMBgetattrE);
7226
7227         if (req->wct < 1) {
7228                 reply_nterror(req, NT_STATUS_INVALID_PARAMETER);
7229                 END_PROFILE(SMBgetattrE);
7230                 return;
7231         }
7232
7233         fsp = file_fsp(req, SVAL(req->vwv+0, 0));
7234
7235         if(!fsp || (fsp->conn != conn)) {
7236                 reply_doserror(req, ERRDOS, ERRbadfid);
7237                 END_PROFILE(SMBgetattrE);
7238                 return;
7239         }
7240
7241         /* Do an fstat on this file */
7242         if(fsp_stat(fsp, &sbuf)) {
7243                 reply_unixerror(req, ERRDOS, ERRnoaccess);
7244                 END_PROFILE(SMBgetattrE);
7245                 return;
7246         }
7247
7248         mode = dos_mode(conn,fsp->fsp_name,&sbuf);
7249
7250         /*
7251          * Convert the times into dos times. Set create
7252          * date to be last modify date as UNIX doesn't save
7253          * this.
7254          */
7255
7256         reply_outbuf(req, 11, 0);
7257
7258         create_ts = get_create_timespec(&sbuf,
7259                                   lp_fake_dir_create_times(SNUM(conn)));
7260         srv_put_dos_date2((char *)req->outbuf, smb_vwv0, create_ts.tv_sec);
7261         srv_put_dos_date2((char *)req->outbuf, smb_vwv2, sbuf.st_atime);
7262         /* Should we check pending modtime here ? JRA */
7263         srv_put_dos_date2((char *)req->outbuf, smb_vwv4, sbuf.st_mtime);
7264
7265         if (mode & aDIR) {
7266                 SIVAL(req->outbuf, smb_vwv6, 0);
7267                 SIVAL(req->outbuf, smb_vwv8, 0);
7268         } else {
7269                 uint32 allocation_size = get_allocation_size(conn,fsp, &sbuf);
7270                 SIVAL(req->outbuf, smb_vwv6, (uint32)sbuf.st_size);
7271                 SIVAL(req->outbuf, smb_vwv8, allocation_size);
7272         }
7273         SSVAL(req->outbuf,smb_vwv10, mode);
7274
7275         DEBUG( 3, ( "reply_getattrE fnum=%d\n", fsp->fnum));
7276
7277         END_PROFILE(SMBgetattrE);
7278         return;
7279 }