#include "includes.h"
#include "system/filesys.h"
+#include <tevent.h>
#include "smbd/smbd.h"
#include "smbd/globals.h"
#include "dbwrap/dbwrap.h"
#include "dbwrap/dbwrap_rbt.h"
#include "dbwrap/dbwrap_open.h"
+#include "dbwrap/dbwrap_watch.h"
#include "session.h"
#include "auth.h"
#include "gensec.h"
#include "lib/util/util_tdb.h"
#include "librpc/gen_ndr/ndr_smbXsrv.h"
#include "serverid.h"
+#include "lib/util/tevent_ntstatus.h"
struct smbXsrv_session_table {
struct {
return NT_STATUS_OK;
}
+struct smb2srv_session_close_previous_state {
+ struct tevent_context *ev;
+ struct smbXsrv_session *current_session;
+ struct dom_sid *current_sid;
+ struct db_record *db_rec;
+};
+
+static void smb2srv_session_close_previous_check(struct tevent_req *req);
+static void smb2srv_session_close_previous_modified(struct tevent_req *subreq);
+
+struct tevent_req *smb2srv_session_close_previous_send(TALLOC_CTX *mem_ctx,
+ struct tevent_context *ev,
+ struct smbXsrv_session *current_session,
+ uint64_t previous_session_id)
+{
+ struct tevent_req *req;
+ struct smb2srv_session_close_previous_state *state;
+ uint32_t global_id = previous_session_id & UINT32_MAX;
+ uint64_t global_zeros = previous_session_id & 0xFFFFFFFF00000000LLU;
+ struct smbXsrv_connection *conn = current_session->connection;
+ struct smbXsrv_session_table *table = conn->session_table;
+ struct security_token *current_token = NULL;
+ uint8_t key_buf[sizeof(uint32_t)];
+ TDB_DATA key;
+
+ req = tevent_req_create(mem_ctx, &state,
+ struct smb2srv_session_close_previous_state);
+ if (req == NULL) {
+ return NULL;
+ }
+ state->ev = ev;
+ state->current_session = current_session;
+
+ if (global_zeros != 0) {
+ tevent_req_done(req);
+ return tevent_req_post(req, ev);
+ }
+
+ if (current_session->global->auth_session_info == NULL) {
+ tevent_req_done(req);
+ return tevent_req_post(req, ev);
+ }
+ current_token = current_session->global->auth_session_info->security_token;
+
+ if (current_token->num_sids > PRIMARY_USER_SID_INDEX) {
+ state->current_sid = ¤t_token->sids[PRIMARY_USER_SID_INDEX];
+ }
+
+ if (state->current_sid == NULL) {
+ tevent_req_done(req);
+ return tevent_req_post(req, ev);
+ }
+
+ if (!security_token_has_nt_authenticated_users(current_token)) {
+ /* TODO */
+ tevent_req_done(req);
+ return tevent_req_post(req, ev);
+ }
+
+ RSIVAL(key_buf, 0, global_id);
+ key = make_tdb_data(key_buf, sizeof(key_buf));
+
+ state->db_rec = dbwrap_fetch_locked(table->global.db_ctx,
+ state, key);
+ if (state->db_rec == NULL) {
+ tevent_req_nterror(req, NT_STATUS_UNSUCCESSFUL);
+ return tevent_req_post(req, ev);
+ }
+
+ smb2srv_session_close_previous_check(req);
+ if (!tevent_req_is_in_progress(req)) {
+ return tevent_req_post(req, ev);
+ }
+
+ return req;
+}
+
+static void smb2srv_session_close_previous_check(struct tevent_req *req)
+{
+ struct smb2srv_session_close_previous_state *state =
+ tevent_req_data(req,
+ struct smb2srv_session_close_previous_state);
+ struct smbXsrv_connection *conn = state->current_session->connection;
+ TDB_DATA val;
+ DATA_BLOB blob;
+ struct smbXsrv_session_globalB global_blob;
+ enum ndr_err_code ndr_err;
+ struct security_token *previous_token = NULL;
+ struct smbXsrv_session_global0 *global = NULL;
+ struct tevent_req *subreq = NULL;
+ NTSTATUS status;
+ bool exists;
+
+ val = dbwrap_record_get_value(state->db_rec);
+ if (val.dsize == 0) {
+ TALLOC_FREE(state->db_rec);
+ tevent_req_done(req);
+ return;
+ }
+
+ blob = data_blob_const(val.dptr, val.dsize);
+
+ ndr_err = ndr_pull_struct_blob_all(&blob, state, &global_blob,
+ (ndr_pull_flags_fn_t)ndr_pull_smbXsrv_session_globalB);
+ if (!NDR_ERR_CODE_IS_SUCCESS(ndr_err)) {
+ //status = ndr_err_code;
+ //TODO status = map
+ TALLOC_FREE(state->db_rec);
+ tevent_req_nterror(req, NT_STATUS_INTERNAL_DB_CORRUPTION);
+ return;
+ }
+
+ DEBUG(0,("smb2srv_session_close_previous_check: current global [0x%08X]\n",
+ state->current_session->global->session_global_id));
+ NDR_PRINT_DEBUG(smbXsrv_session_globalB, &global_blob);
+
+ if (global_blob.version != 0) {
+ //TODO status = map
+ TALLOC_FREE(state->db_rec);
+ tevent_req_nterror(req, NT_STATUS_INTERNAL_DB_CORRUPTION);
+ return;
+ }
+
+ global = global_blob.info.info0;
+
+ if (global->auth_session_info == NULL) {
+ TALLOC_FREE(state->db_rec);
+ tevent_req_done(req);
+ return;
+ }
+
+ exists = serverid_exists(&global->channels[0].server_id);
+ if (!exists) {
+ dbwrap_record_delete(state->db_rec);
+ TALLOC_FREE(state->db_rec);
+ tevent_req_done(req);
+ return;
+ }
+
+ previous_token = global->auth_session_info->security_token;
+
+ if (!security_token_is_sid(previous_token, state->current_sid)) {
+ TALLOC_FREE(state->db_rec);
+ tevent_req_done(req);
+ return;
+ }
+
+ subreq = dbwrap_record_watch_send(state, state->ev,
+ state->db_rec, conn->msg_ctx);
+ if (tevent_req_nomem(subreq, req)) {
+ TALLOC_FREE(state->db_rec);
+ return;
+ }
+ tevent_req_set_callback(subreq,
+ smb2srv_session_close_previous_modified,
+ req);
+
+ status = messaging_send(conn->msg_ctx,
+ global->channels[0].server_id,
+ MSG_SMBXSRV_SESSION_CLOSE, &blob);
+ TALLOC_FREE(state->db_rec);
+ if (tevent_req_nterror(req, status)) {
+ return;
+ }
+
+ TALLOC_FREE(global);
+ return;
+}
+
+static void smb2srv_session_close_previous_modified(struct tevent_req *subreq)
+{
+ struct tevent_req *req =
+ tevent_req_callback_data(subreq,
+ struct tevent_req);
+ struct smb2srv_session_close_previous_state *state =
+ tevent_req_data(req,
+ struct smb2srv_session_close_previous_state);
+ NTSTATUS status;
+
+ status = dbwrap_record_watch_recv(subreq, state, &state->db_rec);
+ TALLOC_FREE(subreq);
+ if (tevent_req_nterror(req, status)) {
+ return;
+ }
+
+ smb2srv_session_close_previous_check(req);
+}
+
+NTSTATUS smb2srv_session_close_previous_recv(struct tevent_req *req)
+{
+ NTSTATUS status;
+
+ if (tevent_req_is_nterror(req, &status)) {
+ tevent_req_received(req);
+ return status;
+ }
+
+ tevent_req_received(req);
+ return NT_STATUS_OK;
+}
+
static int smbXsrv_session_destructor(struct smbXsrv_session *session)
{
struct smbXsrv_session_table *table;