2 Unix SMB/CIFS implementation.
4 Copyright (C) Andrew Tridgell 1992-2000
5 Copyright (C) Jeremy Allison 1992-2006
6 Copyright (C) Volker Lendecke 2005
8 This program is free software; you can redistribute it and/or modify
9 it under the terms of the GNU General Public License as published by
10 the Free Software Foundation; either version 3 of the License, or
11 (at your option) any later version.
13 This program is distributed in the hope that it will be useful,
14 but WITHOUT ANY WARRANTY; without even the implied warranty of
15 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
16 GNU General Public License for more details.
18 You should have received a copy of the GNU General Public License
19 along with this program. If not, see <http://www.gnu.org/licenses/>.
23 12 aug 96: Erik.Devriendt@te6.siemens.be
24 added support for shared memory implementation of share mode locking
26 May 1997. Jeremy Allison (jallison@whistle.com). Modified share mode
27 locking to deal with multiple share modes per open file.
29 September 1997. Jeremy Allison (jallison@whistle.com). Added oplock
32 rewritten completely to use new tdb code. Tridge, Dec '99
34 Added POSIX locking support. Jeremy Allison (jeremy@valinux.com), Apr. 2000.
35 Added Unix Extensions POSIX locking support. Jeremy Allison Mar 2006.
39 #include "system/filesys.h"
40 #include "lib/util/server_id.h"
41 #include "locking/proto.h"
42 #include "smbd/globals.h"
43 #include "dbwrap/dbwrap.h"
44 #include "dbwrap/dbwrap_open.h"
45 #include "../libcli/security/security.h"
49 #include "../librpc/gen_ndr/ndr_open_files.h"
50 #include "librpc/gen_ndr/ndr_file_id.h"
51 #include "locking/leases_db.h"
54 #define DBGC_CLASS DBGC_LOCKING
56 #define NO_LOCKING_COUNT (-1)
58 /****************************************************************************
60 ****************************************************************************/
62 const char *lock_type_name(enum brl_type lock_type)
69 case PENDING_READ_LOCK:
70 return "PENDING_READ";
71 case PENDING_WRITE_LOCK:
72 return "PENDING_WRITE";
78 const char *lock_flav_name(enum brl_flavour lock_flav)
80 return (lock_flav == WINDOWS_LOCK) ? "WINDOWS_LOCK" : "POSIX_LOCK";
83 /****************************************************************************
84 Utility function called to see if a file region is locked.
85 Called in the read/write codepath.
86 ****************************************************************************/
88 void init_strict_lock_struct(files_struct *fsp,
92 enum brl_type lock_type,
93 struct lock_struct *plock)
95 SMB_ASSERT(lock_type == READ_LOCK || lock_type == WRITE_LOCK);
97 plock->context.smblctx = smblctx;
98 plock->context.tid = fsp->conn->cnum;
99 plock->context.pid = messaging_server_id(fsp->conn->sconn->msg_ctx);
100 plock->start = start;
102 plock->fnum = fsp->fnum;
103 plock->lock_type = lock_type;
104 plock->lock_flav = lp_posix_cifsu_locktype(fsp);
107 bool strict_lock_check_default(files_struct *fsp, struct lock_struct *plock)
109 struct byte_range_lock *br_lck;
110 int strict_locking = lp_strict_locking(fsp->conn->params);
113 if (plock->size == 0) {
117 if (!lp_locking(fsp->conn->params) || !strict_locking) {
121 if (strict_locking == Auto) {
122 uint32_t lease_type = fsp_lease_type(fsp);
124 if ((lease_type & SMB2_LEASE_READ) &&
125 (plock->lock_type == READ_LOCK))
127 DBG_DEBUG("optimisation - read lease on file %s\n",
132 if ((lease_type & SMB2_LEASE_WRITE) &&
133 (plock->lock_type == WRITE_LOCK))
135 DBG_DEBUG("optimisation - write lease on file %s\n",
141 br_lck = brl_get_locks_readonly(fsp);
145 ret = brl_locktest(br_lck, plock);
149 * We got a lock conflict. Retry with rw locks to enable
150 * autocleanup. This is the slow path anyway.
152 br_lck = brl_get_locks(talloc_tos(), fsp);
153 if (br_lck == NULL) {
156 ret = brl_locktest(br_lck, plock);
160 DEBUG(10, ("strict_lock_default: flavour = %s brl start=%ju "
161 "len=%ju %s for fnum %ju file %s\n",
162 lock_flav_name(plock->lock_flav),
163 (uintmax_t)plock->start, (uintmax_t)plock->size,
164 ret ? "unlocked" : "locked",
165 (uintmax_t)plock->fnum, fsp_str_dbg(fsp)));
170 /****************************************************************************
171 Find out if a lock could be granted - return who is blocking us if we can't.
172 ****************************************************************************/
174 NTSTATUS query_lock(files_struct *fsp,
178 enum brl_type *plock_type,
179 enum brl_flavour lock_flav)
181 struct byte_range_lock *br_lck = NULL;
183 if (!fsp->can_lock) {
184 return fsp->is_directory ? NT_STATUS_INVALID_DEVICE_REQUEST : NT_STATUS_INVALID_HANDLE;
187 if (!lp_locking(fsp->conn->params)) {
191 br_lck = brl_get_locks_readonly(fsp);
193 return NT_STATUS_NO_MEMORY;
196 return brl_lockquery(br_lck,
198 messaging_server_id(fsp->conn->sconn->msg_ctx),
205 static void increment_current_lock_count(files_struct *fsp,
206 enum brl_flavour lock_flav)
208 if (lock_flav == WINDOWS_LOCK &&
209 fsp->current_lock_count != NO_LOCKING_COUNT) {
210 /* blocking ie. pending, locks also count here,
211 * as this is an efficiency counter to avoid checking
212 * the lock db. on close. JRA. */
214 fsp->current_lock_count++;
216 /* Notice that this has had a POSIX lock request.
217 * We can't count locks after this so forget them.
219 fsp->current_lock_count = NO_LOCKING_COUNT;
223 static void decrement_current_lock_count(files_struct *fsp,
224 enum brl_flavour lock_flav)
226 if (lock_flav == WINDOWS_LOCK &&
227 fsp->current_lock_count != NO_LOCKING_COUNT) {
228 SMB_ASSERT(fsp->current_lock_count > 0);
229 fsp->current_lock_count--;
233 /****************************************************************************
234 Utility function called by locking requests.
235 ****************************************************************************/
237 struct byte_range_lock *do_lock(struct messaging_context *msg_ctx,
242 enum brl_type lock_type,
243 enum brl_flavour lock_flav,
248 struct byte_range_lock *br_lck = NULL;
250 /* silently return ok on print files as we don't do locking there */
251 if (fsp->print_file) {
252 *perr = NT_STATUS_OK;
256 if (!fsp->can_lock) {
257 *perr = fsp->is_directory ? NT_STATUS_INVALID_DEVICE_REQUEST : NT_STATUS_INVALID_HANDLE;
261 if (!lp_locking(fsp->conn->params)) {
262 *perr = NT_STATUS_OK;
266 /* NOTE! 0 byte long ranges ARE allowed and should be stored */
268 DEBUG(10,("do_lock: lock flavour %s lock type %s start=%ju len=%ju "
269 "blocking_lock=%s requested for %s file %s\n",
270 lock_flav_name(lock_flav), lock_type_name(lock_type),
271 (uintmax_t)offset, (uintmax_t)count, blocking_lock ? "true" :
272 "false", fsp_fnum_dbg(fsp), fsp_str_dbg(fsp)));
274 br_lck = brl_get_locks(talloc_tos(), fsp);
276 *perr = NT_STATUS_NO_MEMORY;
280 *perr = brl_lock(msg_ctx,
283 messaging_server_id(fsp->conn->sconn->msg_ctx),
291 DEBUG(10, ("do_lock: returning status=%s\n", nt_errstr(*perr)));
293 increment_current_lock_count(fsp, lock_flav);
297 /****************************************************************************
298 Utility function called by unlocking requests.
299 ****************************************************************************/
301 NTSTATUS do_unlock(struct messaging_context *msg_ctx,
306 enum brl_flavour lock_flav)
309 struct byte_range_lock *br_lck = NULL;
311 if (!fsp->can_lock) {
312 return fsp->is_directory ? NT_STATUS_INVALID_DEVICE_REQUEST : NT_STATUS_INVALID_HANDLE;
315 if (!lp_locking(fsp->conn->params)) {
319 DBG_DEBUG("unlock start=%"PRIu64" len=%"PRIu64" requested for %s file "
326 br_lck = brl_get_locks(talloc_tos(), fsp);
328 return NT_STATUS_NO_MEMORY;
331 ok = brl_unlock(msg_ctx,
334 messaging_server_id(fsp->conn->sconn->msg_ctx),
342 DEBUG(10,("do_unlock: returning ERRlock.\n" ));
343 return NT_STATUS_RANGE_NOT_LOCKED;
346 decrement_current_lock_count(fsp, lock_flav);
350 /****************************************************************************
351 Cancel any pending blocked locks.
352 ****************************************************************************/
354 NTSTATUS do_lock_cancel(files_struct *fsp,
358 enum brl_flavour lock_flav)
361 struct byte_range_lock *br_lck = NULL;
363 if (!fsp->can_lock) {
364 return fsp->is_directory ?
365 NT_STATUS_INVALID_DEVICE_REQUEST : NT_STATUS_INVALID_HANDLE;
368 if (!lp_locking(fsp->conn->params)) {
369 return NT_STATUS_DOS(ERRDOS, ERRcancelviolation);
372 DEBUG(10, ("do_lock_cancel: cancel start=%ju len=%ju requested for "
373 "%s file %s\n", (uintmax_t)offset, (uintmax_t)count,
374 fsp_fnum_dbg(fsp), fsp_str_dbg(fsp)));
376 br_lck = brl_get_locks(talloc_tos(), fsp);
378 return NT_STATUS_NO_MEMORY;
381 ok = brl_lock_cancel(br_lck,
383 messaging_server_id(fsp->conn->sconn->msg_ctx),
391 DEBUG(10,("do_lock_cancel: returning ERRcancelviolation.\n" ));
392 return NT_STATUS_DOS(ERRDOS, ERRcancelviolation);
395 decrement_current_lock_count(fsp, lock_flav);
399 /****************************************************************************
400 Remove any locks on this fd. Called from file_close().
401 ****************************************************************************/
403 void locking_close_file(struct messaging_context *msg_ctx,
405 enum file_close_type close_type)
407 struct byte_range_lock *br_lck;
409 if (!lp_locking(fsp->conn->params)) {
413 /* If we have no outstanding locks or pending
414 * locks then we don't need to look in the lock db.
417 if (fsp->current_lock_count == 0) {
421 br_lck = brl_get_locks(talloc_tos(),fsp);
424 cancel_pending_lock_requests_by_fid(fsp, br_lck, close_type);
425 brl_close_fnum(msg_ctx, br_lck);
430 /*******************************************************************
431 Print out a share mode.
432 ********************************************************************/
434 char *share_mode_str(TALLOC_CTX *ctx, int num,
435 const struct file_id *id,
436 const struct share_mode_entry *e)
438 struct server_id_buf tmp;
440 return talloc_asprintf(ctx, "share_mode_entry[%d]: "
441 "pid = %s, share_access = 0x%x, private_options = 0x%x, "
442 "access_mask = 0x%x, mid = 0x%llx, type= 0x%x, gen_id = %llu, "
443 "uid = %u, flags = %u, file_id %s, name_hash = 0x%x",
445 server_id_str_buf(e->pid, &tmp),
446 e->share_access, e->private_options,
447 e->access_mask, (unsigned long long)e->op_mid,
448 e->op_type, (unsigned long long)e->share_file_id,
449 (unsigned int)e->uid, (unsigned int)e->flags,
450 file_id_string_tos(id),
451 (unsigned int)e->name_hash);
454 /*******************************************************************
455 Fetch a share mode where we know one MUST exist. This call reference
456 counts it internally to allow for nested lock fetches.
457 ********************************************************************/
459 struct share_mode_lock *get_existing_share_mode_lock(TALLOC_CTX *mem_ctx,
460 const struct file_id id)
462 return get_share_mode_lock(mem_ctx, id, NULL, NULL, NULL);
465 static bool rename_lease_fn(struct share_mode_lock *lck,
466 struct share_mode_entry *e,
469 struct share_mode_data *d = lck->data;
472 status = leases_db_rename(&e->client_guid,
479 if (!NT_STATUS_IS_OK(status)) {
480 /* Any error recovery possible here ? */
481 DBG_WARNING("Failed to rename lease key for "
482 "renamed file %s:%s. %s\n",
491 /*******************************************************************
492 Sets the service name and filename for rename.
493 At this point we emit "file renamed" messages to all
494 process id's that have this file open.
495 Based on an initial code idea from SATOH Fumiyasu <fumiya@samba.gr.jp>
496 ********************************************************************/
498 bool rename_share_filename(struct messaging_context *msg_ctx,
499 struct share_mode_lock *lck,
501 const char *servicepath,
502 uint32_t orig_name_hash,
503 uint32_t new_name_hash,
504 const struct smb_filename *smb_fname_dst)
506 struct share_mode_data *d = lck->data;
507 struct file_rename_message msg = {
509 .servicepath = servicepath,
510 .base_name = smb_fname_dst->base_name,
511 .stream_name = smb_fname_dst->stream_name,
514 struct server_id self_pid = messaging_server_id(msg_ctx);
517 DEBUG(10, ("rename_share_filename: servicepath %s newname %s\n",
518 servicepath, smb_fname_dst->base_name));
521 * rename_internal_fsp() and rename_internals() add './' to
522 * head of newname if newname does not contain a '/'.
525 if (strncmp(msg.base_name, "./", 2) == 0) {
529 d->servicepath = talloc_strdup(d, msg.servicepath);
530 d->base_name = talloc_strdup(d, msg.base_name);
531 d->stream_name = talloc_strdup(d, msg.stream_name);
532 if ((d->servicepath == NULL) ||
533 (d->base_name == NULL) ||
534 ((msg.stream_name != NULL) && (d->stream_name == NULL))) {
535 DBG_WARNING("talloc failed\n");
540 /* Send the messages. */
541 for (i=0; i<d->num_share_modes; i++) {
542 struct share_mode_entry *se = &d->share_modes[i];
544 enum ndr_err_code ndr_err;
546 if (!is_valid_share_mode_entry(se)) {
550 /* If this is a hardlink to the inode
551 with a different name, skip this. */
552 if (se->name_hash != orig_name_hash) {
556 se->name_hash = new_name_hash;
558 /* But not to ourselves... */
559 if (serverid_equal(&se->pid, &self_pid)) {
563 if (share_mode_stale_pid(d, i)) {
567 msg.share_file_id = se->share_file_id;
569 ndr_err = ndr_push_struct_blob(
573 (ndr_push_flags_fn_t)ndr_push_file_rename_message);
574 if (!NDR_ERR_CODE_IS_SUCCESS(ndr_err)) {
575 DBG_DEBUG("ndr_push_file_rename_message failed: %s\n",
576 ndr_errstr(ndr_err));
579 if (DEBUGLEVEL >= 10) {
580 struct server_id_buf tmp;
581 DBG_DEBUG("sending rename message to %s\n",
582 server_id_str_buf(se->pid, &tmp));
583 NDR_PRINT_DEBUG(file_rename_message, &msg);
586 messaging_send(msg_ctx, se->pid, MSG_SMB_FILE_RENAME, &blob);
588 TALLOC_FREE(blob.data);
591 ok = share_mode_forall_leases(lck, rename_lease_fn, NULL);
594 * Ignore error here. Not sure what to do..
596 DBG_WARNING("share_mode_forall_leases failed\n");
602 void get_file_infos(struct file_id id,
604 bool *delete_on_close,
605 struct timespec *write_time)
607 struct share_mode_lock *lck;
609 if (delete_on_close) {
610 *delete_on_close = false;
614 ZERO_STRUCTP(write_time);
617 if (!(lck = fetch_share_mode_unlocked(talloc_tos(), id))) {
621 if (delete_on_close) {
622 *delete_on_close = is_delete_on_close_set(lck, name_hash);
626 *write_time = get_share_mode_write_time(lck);
632 bool is_valid_share_mode_entry(const struct share_mode_entry *e)
640 num_props += ((e->op_type == NO_OPLOCK) ? 1 : 0);
641 num_props += (EXCLUSIVE_OPLOCK_TYPE(e->op_type) ? 1 : 0);
642 num_props += (LEVEL_II_OPLOCK_TYPE(e->op_type) ? 1 : 0);
643 num_props += (e->op_type == LEASE_OPLOCK);
645 if ((num_props > 1) && serverid_exists(&e->pid)) {
646 smb_panic("Invalid share mode entry");
648 return (num_props != 0);
652 * See if we need to remove a lease being referred to by a
653 * share mode that is being marked stale or deleted.
656 static void remove_share_mode_lease(struct share_mode_data *d,
657 struct share_mode_entry *e)
662 op_type = e->op_type;
663 e->op_type = NO_OPLOCK;
667 if (op_type != LEASE_OPLOCK) {
672 * This used to reference a lease. If there's no other one referencing
676 for (i=0; i<d->num_share_modes; i++) {
677 struct share_mode_entry *e2 = &d->share_modes[i];
686 if (smb2_lease_equal(&e->client_guid,
693 if (i < d->num_share_modes) {
703 status = leases_db_del(&e->client_guid,
707 DEBUG(10, ("%s: leases_db_del returned %s\n", __func__,
713 * In case d->share_modes[i] conflicts with something or otherwise is
714 * being used, we need to make sure the corresponding process still
717 bool share_mode_stale_pid(struct share_mode_data *d, uint32_t idx)
719 struct server_id_buf tmp;
720 struct share_mode_entry *e;
722 if (idx > d->num_share_modes) {
723 DBG_WARNING("Asking for index %"PRIu32", "
724 "only %"PRIu32" around\n",
729 e = &d->share_modes[idx];
736 if (serverid_exists(&e->pid)) {
737 DBG_DEBUG("PID %s (index %"PRIu32" out of %"PRIu32") "
739 server_id_str_buf(e->pid, &tmp),
744 DBG_DEBUG("PID %s (index %"PRIu32" out of %"PRIu32") "
745 "does not exist anymore\n",
746 server_id_str_buf(e->pid, &tmp),
752 if (d->num_delete_tokens != 0) {
755 for (i=0; i<d->num_share_modes; i++) {
756 bool valid = !d->share_modes[i].stale;
762 if (i == d->num_share_modes) {
764 * No valid (non-stale) share mode found, all
765 * who might have set the delete token are
768 TALLOC_FREE(d->delete_tokens);
769 d->num_delete_tokens = 0;
773 remove_share_mode_lease(d, e);
779 void remove_stale_share_mode_entries(struct share_mode_data *d)
784 while (i < d->num_share_modes) {
785 if (d->share_modes[i].stale) {
786 struct share_mode_entry *m = d->share_modes;
787 m[i] = m[d->num_share_modes-1];
788 d->num_share_modes -= 1;
795 bool set_share_mode(struct share_mode_lock *lck,
796 struct files_struct *fsp,
800 const struct GUID *client_guid,
801 const struct smb2_lease_key *lease_key)
803 struct share_mode_data *d = lck->data;
804 struct share_mode_entry *tmp, *e;
806 tmp = talloc_realloc(d, d->share_modes, struct share_mode_entry,
807 d->num_share_modes+1);
811 d->share_modes = tmp;
812 e = &d->share_modes[d->num_share_modes];
813 d->num_share_modes += 1;
817 e->pid = messaging_server_id(fsp->conn->sconn->msg_ctx);
818 e->share_access = fsp->share_access;
819 e->private_options = fsp->fh->private_options;
820 e->access_mask = fsp->access_mask;
822 e->op_type = op_type;
824 if (op_type == LEASE_OPLOCK) {
825 e->client_guid = *client_guid;
826 e->lease_key = *lease_key;
829 e->time.tv_sec = fsp->open_time.tv_sec;
830 e->time.tv_usec = fsp->open_time.tv_usec;
831 e->share_file_id = fsp->fh->gen_id;
832 e->uid = (uint32_t)uid;
833 e->flags = (fsp->posix_flags & FSP_POSIX_FLAGS_OPEN) ?
834 SHARE_MODE_FLAG_POSIX_OPEN : 0;
835 e->name_hash = fsp->name_hash;
840 struct share_mode_entry *find_share_mode_entry(
841 struct share_mode_lock *lck, files_struct *fsp)
843 struct share_mode_data *d = lck->data;
844 struct server_id pid;
847 pid = messaging_server_id(fsp->conn->sconn->msg_ctx);
849 for (i=0; i<d->num_share_modes; i++) {
850 struct share_mode_entry *e = &d->share_modes[i];
852 if (!is_valid_share_mode_entry(e)) {
855 if (!serverid_equal(&pid, &e->pid)) {
858 if (fsp->fh->gen_id != e->share_file_id) {
866 /*******************************************************************
867 Del the share mode of a file for this process.
868 ********************************************************************/
870 bool del_share_mode(struct share_mode_lock *lck, files_struct *fsp)
872 struct share_mode_entry *e;
874 e = find_share_mode_entry(lck, fsp);
878 remove_share_mode_lease(lck->data, e);
879 *e = lck->data->share_modes[lck->data->num_share_modes-1];
880 lck->data->num_share_modes -= 1;
881 lck->data->modified = True;
885 bool mark_share_mode_disconnected(struct share_mode_lock *lck,
886 struct files_struct *fsp)
888 struct share_mode_entry *e;
890 if (lck->data->num_share_modes != 1) {
894 if (fsp->op == NULL) {
897 if (!fsp->op->global->durable) {
901 e = find_share_mode_entry(lck, fsp);
906 DEBUG(10, ("Marking share mode entry disconnected for durable handle\n"));
908 server_id_set_disconnected(&e->pid);
911 * On reopen the caller needs to check that
912 * the client comes with the correct handle.
914 e->share_file_id = fsp->op->global->open_persistent_id;
916 lck->data->modified = true;
920 /*******************************************************************
921 Remove an oplock mid and mode entry from a share mode.
922 ********************************************************************/
924 bool remove_share_oplock(struct share_mode_lock *lck, files_struct *fsp)
926 struct share_mode_data *d = lck->data;
927 struct share_mode_entry *e;
929 e = find_share_mode_entry(lck, fsp);
934 remove_share_mode_lease(d, e);
939 /*******************************************************************
940 Downgrade a oplock type from exclusive to level II.
941 ********************************************************************/
943 bool downgrade_share_oplock(struct share_mode_lock *lck, files_struct *fsp)
945 struct share_mode_entry *e;
947 e = find_share_mode_entry(lck, fsp);
952 e->op_type = LEVEL_II_OPLOCK;
953 lck->data->modified = True;
957 /****************************************************************************
958 Adds a delete on close token.
959 ****************************************************************************/
961 static bool add_delete_on_close_token(struct share_mode_data *d,
963 const struct security_token *nt_tok,
964 const struct security_unix_token *tok)
966 struct delete_token *tmp, *dtl;
968 tmp = talloc_realloc(d, d->delete_tokens, struct delete_token,
969 d->num_delete_tokens+1);
973 d->delete_tokens = tmp;
974 dtl = &d->delete_tokens[d->num_delete_tokens];
976 dtl->name_hash = name_hash;
977 dtl->delete_nt_token = dup_nt_token(d->delete_tokens, nt_tok);
978 if (dtl->delete_nt_token == NULL) {
981 dtl->delete_token = copy_unix_token(d->delete_tokens, tok);
982 if (dtl->delete_token == NULL) {
985 d->num_delete_tokens += 1;
990 void reset_delete_on_close_lck(files_struct *fsp,
991 struct share_mode_lock *lck)
993 struct share_mode_data *d = lck->data;
996 for (i=0; i<d->num_delete_tokens; i++) {
997 struct delete_token *dt = &d->delete_tokens[i];
999 if (dt->name_hash == fsp->name_hash) {
1002 /* Delete this entry. */
1003 TALLOC_FREE(dt->delete_nt_token);
1004 TALLOC_FREE(dt->delete_token);
1005 *dt = d->delete_tokens[d->num_delete_tokens-1];
1006 d->num_delete_tokens -= 1;
1011 /****************************************************************************
1012 Sets the delete on close flag over all share modes on this file.
1013 Modify the share mode entry for all files open
1014 on this device and inode to tell other smbds we have
1015 changed the delete on close flag. This will be noticed
1016 in the close code, the last closer will delete the file
1018 This makes a copy of any struct security_unix_token into the
1019 lck entry. This function is used when the lock is already granted.
1020 ****************************************************************************/
1022 void set_delete_on_close_lck(files_struct *fsp,
1023 struct share_mode_lock *lck,
1024 const struct security_token *nt_tok,
1025 const struct security_unix_token *tok)
1027 struct messaging_context *msg_ctx = fsp->conn->sconn->msg_ctx;
1028 struct share_mode_data *d = lck->data;
1031 DATA_BLOB fid_blob = {};
1032 enum ndr_err_code ndr_err;
1034 SMB_ASSERT(nt_tok != NULL);
1035 SMB_ASSERT(tok != NULL);
1037 for (i=0; i<d->num_delete_tokens; i++) {
1038 struct delete_token *dt = &d->delete_tokens[i];
1039 if (dt->name_hash == fsp->name_hash) {
1042 /* Replace this token with the given tok. */
1043 TALLOC_FREE(dt->delete_nt_token);
1044 dt->delete_nt_token = dup_nt_token(dt, nt_tok);
1045 SMB_ASSERT(dt->delete_nt_token != NULL);
1046 TALLOC_FREE(dt->delete_token);
1047 dt->delete_token = copy_unix_token(dt, tok);
1048 SMB_ASSERT(dt->delete_token != NULL);
1054 ret = add_delete_on_close_token(lck->data, fsp->name_hash, nt_tok, tok);
1057 ndr_err = ndr_push_struct_blob(&fid_blob, talloc_tos(), &fsp->file_id,
1058 (ndr_push_flags_fn_t)ndr_push_file_id);
1059 if (!NDR_ERR_CODE_IS_SUCCESS(ndr_err)) {
1060 DEBUG(10, ("ndr_push_file_id failed: %s\n",
1061 ndr_errstr(ndr_err)));
1064 for (i=0; i<d->num_share_modes; i++) {
1065 struct share_mode_entry *e = &d->share_modes[i];
1068 status = messaging_send(
1069 msg_ctx, e->pid, MSG_SMB_NOTIFY_CANCEL_DELETED,
1072 if (!NT_STATUS_IS_OK(status)) {
1073 struct server_id_buf tmp;
1074 DEBUG(10, ("%s: messaging_send to %s returned %s\n",
1075 __func__, server_id_str_buf(e->pid, &tmp),
1076 nt_errstr(status)));
1080 TALLOC_FREE(fid_blob.data);
1083 bool set_delete_on_close(files_struct *fsp, bool delete_on_close,
1084 const struct security_token *nt_tok,
1085 const struct security_unix_token *tok)
1087 struct share_mode_lock *lck;
1089 DEBUG(10,("set_delete_on_close: %s delete on close flag for "
1091 delete_on_close ? "Adding" : "Removing", fsp_fnum_dbg(fsp),
1094 lck = get_existing_share_mode_lock(talloc_tos(), fsp->file_id);
1099 if (delete_on_close) {
1100 set_delete_on_close_lck(fsp, lck, nt_tok, tok);
1102 reset_delete_on_close_lck(fsp, lck);
1105 if (fsp->is_directory) {
1106 SMB_ASSERT(!is_ntfs_stream_smb_fname(fsp->fsp_name));
1107 send_stat_cache_delete_message(fsp->conn->sconn->msg_ctx,
1108 fsp->fsp_name->base_name);
1113 fsp->delete_on_close = delete_on_close;
1118 static struct delete_token *find_delete_on_close_token(
1119 struct share_mode_data *d, uint32_t name_hash)
1123 DEBUG(10, ("find_delete_on_close_token: name_hash = 0x%x\n",
1124 (unsigned int)name_hash));
1126 for (i=0; i<d->num_delete_tokens; i++) {
1127 struct delete_token *dt = &d->delete_tokens[i];
1129 DEBUG(10, ("find__delete_on_close_token: dt->name_hash = 0x%x\n",
1130 (unsigned int)dt->name_hash ));
1131 if (dt->name_hash == name_hash) {
1138 /****************************************************************************
1139 Return the NT token and UNIX token if there's a match. Return true if
1140 found, false if not.
1141 ****************************************************************************/
1143 bool get_delete_on_close_token(struct share_mode_lock *lck,
1145 const struct security_token **pp_nt_tok,
1146 const struct security_unix_token **pp_tok)
1148 struct delete_token *dt;
1150 dt = find_delete_on_close_token(lck->data, name_hash);
1154 *pp_nt_tok = dt->delete_nt_token;
1155 *pp_tok = dt->delete_token;
1159 bool is_delete_on_close_set(struct share_mode_lock *lck, uint32_t name_hash)
1161 return find_delete_on_close_token(lck->data, name_hash) != NULL;
1164 bool set_sticky_write_time(struct file_id fileid, struct timespec write_time)
1166 struct share_mode_lock *lck;
1168 DEBUG(5,("set_sticky_write_time: %s id=%s\n",
1169 timestring(talloc_tos(),
1170 convert_timespec_to_time_t(write_time)),
1171 file_id_string_tos(&fileid)));
1173 lck = get_existing_share_mode_lock(talloc_tos(), fileid);
1178 if (timespec_compare(&lck->data->changed_write_time, &write_time) != 0) {
1179 lck->data->modified = True;
1180 lck->data->changed_write_time = write_time;
1187 bool set_write_time(struct file_id fileid, struct timespec write_time)
1189 struct share_mode_lock *lck;
1191 DEBUG(5,("set_write_time: %s id=%s\n",
1192 timestring(talloc_tos(),
1193 convert_timespec_to_time_t(write_time)),
1194 file_id_string_tos(&fileid)));
1196 lck = get_existing_share_mode_lock(talloc_tos(), fileid);
1201 if (timespec_compare(&lck->data->old_write_time, &write_time) != 0) {
1202 lck->data->modified = True;
1203 lck->data->old_write_time = write_time;
1210 struct timespec get_share_mode_write_time(struct share_mode_lock *lck)
1212 struct share_mode_data *d = lck->data;
1214 if (!null_timespec(d->changed_write_time)) {
1215 return d->changed_write_time;
1217 return d->old_write_time;
1220 bool file_has_open_streams(files_struct *fsp)
1222 struct share_mode_lock *lock = NULL;
1223 struct share_mode_data *d = NULL;
1226 lock = get_existing_share_mode_lock(talloc_tos(), fsp->file_id);
1232 for (i = 0; i < d->num_share_modes; i++) {
1233 struct share_mode_entry *e = &d->share_modes[i];
1235 if (share_mode_stale_pid(d, i)) {
1239 if (e->private_options &
1240 NTCREATEX_OPTIONS_PRIVATE_STREAM_BASEOPEN)
1252 * Walk share mode entries, looking at every lease only once
1255 bool share_mode_forall_leases(
1256 struct share_mode_lock *lck,
1257 bool (*fn)(struct share_mode_lock *lck,
1258 struct share_mode_entry *e,
1259 void *private_data),
1262 struct share_mode_data *d = lck->data;
1263 uint32_t *leases = NULL;
1264 uint32_t num_leases = 0;
1267 leases = talloc_array(talloc_tos(), uint32_t, d->num_share_modes);
1268 if (leases == NULL) {
1272 for (i=0; i<d->num_share_modes; i++) {
1273 struct share_mode_entry *e = &d->share_modes[i];
1277 ok = is_valid_share_mode_entry(e);
1282 if (e->op_type != LEASE_OPLOCK) {
1287 * See if we have already seen "e"'s lease. This is
1288 * O(n^2). If we sort "leases", we can get this down
1292 for (j=0; j<num_leases; j++) {
1293 uint32_t idx = leases[j];
1294 struct share_mode_entry *l = &d->share_modes[idx];
1296 if (smb2_lease_equal(&e->client_guid,
1303 if (j < num_leases) {
1305 * Don't look at "e"'s lease, we've already
1311 stop = fn(lck, e, private_data);
1313 TALLOC_FREE(leases);
1317 leases[num_leases] = i;
1321 TALLOC_FREE(leases);