summaryrefslogtreecommitdiff
path: root/source3/smbd/files.c
diff options
context:
space:
mode:
Diffstat (limited to 'source3/smbd/files.c')
-rw-r--r--source3/smbd/files.c389
1 files changed, 192 insertions, 197 deletions
diff --git a/source3/smbd/files.c b/source3/smbd/files.c
index 58c24a8e34..ef229a4098 100644
--- a/source3/smbd/files.c
+++ b/source3/smbd/files.c
@@ -22,36 +22,57 @@
#include "smbd/globals.h"
#include "libcli/security/security.h"
#include "util_tdb.h"
-
-#define VALID_FNUM(fnum) (((fnum) >= 0) && ((fnum) < real_max_open_files))
+#include <ccan/hash/hash.h>
+#include "lib/util/bitmap.h"
#define FILE_HANDLE_OFFSET 0x1000
-/****************************************************************************
- Return a unique number identifying this fsp over the life of this pid,
- and try to make it as globally unique as possible.
- See bug #8995 for the details.
-****************************************************************************/
-
-static unsigned long get_gen_count(struct smbd_server_connection *sconn)
+/**
+ * create new fsp to be used for file_new or a durable handle reconnect
+ */
+NTSTATUS fsp_new(struct connection_struct *conn, TALLOC_CTX *mem_ctx,
+ files_struct **result)
{
+ NTSTATUS status = NT_STATUS_NO_MEMORY;
+ files_struct *fsp = NULL;
+ struct smbd_server_connection *sconn = conn->sconn;
+
+ fsp = talloc_zero(mem_ctx, struct files_struct);
+ if (fsp == NULL) {
+ goto fail;
+ }
+
/*
- * While fsp->fh->gen_id is 'unsigned long' currently
- * (which might by 8 bytes),
- * there's some oplock code which truncates it to
- * uint32_t(using IVAL()).
+ * This can't be a child of fsp because the file_handle can be ref'd
+ * when doing a dos/fcb open, which will then share the file_handle
+ * across multiple fsps.
*/
- if (sconn->file_gen_counter == 0) {
- sconn->file_gen_counter = generate_random();
+ fsp->fh = talloc_zero(mem_ctx, struct fd_handle);
+ if (fsp->fh == NULL) {
+ goto fail;
}
- sconn->file_gen_counter += 1;
- if (sconn->file_gen_counter >= UINT32_MAX) {
- sconn->file_gen_counter = 0;
- }
- if (sconn->file_gen_counter == 0) {
- sconn->file_gen_counter += 1;
+
+ fsp->fh->ref_count = 1;
+ fsp->fh->fd = -1;
+
+ fsp->fnum = FNUM_FIELD_INVALID;
+ fsp->conn = conn;
+
+ DLIST_ADD(sconn->files, fsp);
+ sconn->num_files += 1;
+
+ conn->num_files_open++;
+
+ *result = fsp;
+ return NT_STATUS_OK;
+
+fail:
+ if (fsp != NULL) {
+ TALLOC_FREE(fsp->fh);
}
- return sconn->file_gen_counter;
+ TALLOC_FREE(fsp);
+
+ return status;
}
/****************************************************************************
@@ -62,65 +83,32 @@ NTSTATUS file_new(struct smb_request *req, connection_struct *conn,
files_struct **result)
{
struct smbd_server_connection *sconn = conn->sconn;
- int i;
files_struct *fsp;
NTSTATUS status;
- /* we want to give out file handles differently on each new
- connection because of a common bug in MS clients where they try to
- reuse a file descriptor from an earlier smb connection. This code
- increases the chance that the errant client will get an error rather
- than causing corruption */
- if (sconn->first_file == 0) {
- sconn->first_file = (sys_getpid() ^ (int)time(NULL));
- sconn->first_file %= sconn->real_max_open_files;
- }
-
- /* TODO: Port the id-tree implementation from Samba4 */
-
- i = bitmap_find(sconn->file_bmap, sconn->first_file);
- if (i == -1) {
- DEBUG(0,("ERROR! Out of file structures\n"));
- /* TODO: We have to unconditionally return a DOS error here,
- * W2k3 even returns ERRDOS/ERRnofids for ntcreate&x with
- * NTSTATUS negotiated */
- return NT_STATUS_TOO_MANY_OPENED_FILES;
- }
-
- /*
- * Make a child of the connection_struct as an fsp can't exist
- * independent of a connection.
- */
- fsp = talloc_zero(conn, struct files_struct);
- if (!fsp) {
- return NT_STATUS_NO_MEMORY;
- }
-
- /*
- * This can't be a child of fsp because the file_handle can be ref'd
- * when doing a dos/fcb open, which will then share the file_handle
- * across multiple fsps.
- */
- fsp->fh = talloc_zero(conn, struct fd_handle);
- if (!fsp->fh) {
- TALLOC_FREE(fsp);
- return NT_STATUS_NO_MEMORY;
+ status = fsp_new(conn, conn, &fsp);
+ if (!NT_STATUS_IS_OK(status)) {
+ return status;
}
- fsp->fh->ref_count = 1;
- fsp->fh->fd = -1;
-
- fsp->conn = conn;
- fsp->fh->gen_id = get_gen_count(sconn);
GetTimeOfDay(&fsp->open_time);
- sconn->first_file = (i+1) % (sconn->real_max_open_files);
+ if (sconn->conn) {
+ struct smbXsrv_open *op = NULL;
+ NTTIME now = timeval_to_nttime(&fsp->open_time);
- bitmap_set(sconn->file_bmap, i);
- sconn->files_used += 1;
-
- fsp->fnum = i + FILE_HANDLE_OFFSET;
- SMB_ASSERT(fsp->fnum < 65536);
+ status = smbXsrv_open_create(sconn->conn,
+ conn->session_info,
+ now, &op);
+ if (!NT_STATUS_IS_OK(status)) {
+ file_free(NULL, fsp);
+ return status;
+ }
+ fsp->op = op;
+ op->compat = fsp;
+ fsp->fnum = op->local_id;
+ fsp->fh->gen_id = smbXsrv_open_hash(op);
+ }
/*
* Create an smb_filename with "" for the base_name. There are very
@@ -130,16 +118,15 @@ NTSTATUS file_new(struct smb_request *req, connection_struct *conn,
status = create_synthetic_smb_fname(fsp, "", NULL, NULL,
&fsp->fsp_name);
if (!NT_STATUS_IS_OK(status)) {
- TALLOC_FREE(fsp);
- TALLOC_FREE(fsp->fh);
+ file_free(NULL, fsp);
+ return status;
}
- DLIST_ADD(sconn->files, fsp);
-
- DEBUG(5,("allocated file structure %d, fnum = %d (%d used)\n",
- i, fsp->fnum, sconn->files_used));
+ DEBUG(5,("allocated file structure %s (%u used)\n",
+ fsp_fnum_dbg(fsp), (unsigned int)sconn->num_files));
if (req != NULL) {
+ fsp->mid = req->mid;
req->chain_fsp = fsp;
}
@@ -150,8 +137,6 @@ NTSTATUS file_new(struct smb_request *req, connection_struct *conn,
ZERO_STRUCT(sconn->fsp_fi_cache);
- conn->num_files_open++;
-
*result = fsp;
return NT_STATUS_OK;
}
@@ -166,9 +151,16 @@ void file_close_conn(connection_struct *conn)
for (fsp=conn->sconn->files; fsp; fsp=next) {
next = fsp->next;
- if (fsp->conn == conn) {
- close_file(NULL, fsp, SHUTDOWN_CLOSE);
+ if (fsp->conn != conn) {
+ continue;
+ }
+ if (fsp->op != NULL && fsp->op->global->durable) {
+ /*
+ * A tree disconnect closes a durable handle
+ */
+ fsp->op->global->durable = false;
}
+ close_file(NULL, fsp, SHUTDOWN_CLOSE);
}
}
@@ -177,7 +169,7 @@ void file_close_conn(connection_struct *conn)
****************************************************************************/
void file_close_pid(struct smbd_server_connection *sconn, uint16 smbpid,
- int vuid)
+ uint64_t vuid)
{
files_struct *fsp, *next;
@@ -193,38 +185,54 @@ void file_close_pid(struct smbd_server_connection *sconn, uint16 smbpid,
Initialise file structures.
****************************************************************************/
-bool file_init(struct smbd_server_connection *sconn)
+static int files_max_open_fds;
+
+bool file_init_global(void)
{
- int request_max_open_files = lp_max_open_files();
+ int request_max = lp_max_open_files();
int real_lim;
+ int real_max;
+
+ if (files_max_open_fds != 0) {
+ return true;
+ }
/*
* Set the max_open files to be the requested
* max plus a fudgefactor to allow for the extra
* fd's we need such as log files etc...
*/
- real_lim = set_maxfiles(request_max_open_files + MAX_OPEN_FUDGEFACTOR);
+ real_lim = set_maxfiles(request_max + MAX_OPEN_FUDGEFACTOR);
- sconn->real_max_open_files = real_lim - MAX_OPEN_FUDGEFACTOR;
+ real_max = real_lim - MAX_OPEN_FUDGEFACTOR;
- if (sconn->real_max_open_files + FILE_HANDLE_OFFSET + MAX_OPEN_PIPES
- > 65536)
- sconn->real_max_open_files =
- 65536 - FILE_HANDLE_OFFSET - MAX_OPEN_PIPES;
+ if (real_max + FILE_HANDLE_OFFSET + MAX_OPEN_PIPES > 65536) {
+ real_max = 65536 - FILE_HANDLE_OFFSET - MAX_OPEN_PIPES;
+ }
- if(sconn->real_max_open_files != request_max_open_files) {
- DEBUG(1, ("file_init: Information only: requested %d "
+ if (real_max != request_max) {
+ DEBUG(1, ("file_init_global: Information only: requested %d "
"open files, %d are available.\n",
- request_max_open_files, sconn->real_max_open_files));
+ request_max, real_max));
}
- SMB_ASSERT(sconn->real_max_open_files > 100);
+ SMB_ASSERT(real_max > 100);
- sconn->file_bmap = bitmap_talloc(sconn, sconn->real_max_open_files);
+ files_max_open_fds = real_max;
+ return true;
+}
+
+bool file_init(struct smbd_server_connection *sconn)
+{
+ bool ok;
- if (!sconn->file_bmap) {
+ ok = file_init_global();
+ if (!ok) {
return false;
}
+
+ sconn->real_max_open_files = files_max_open_fds;
+
return true;
}
@@ -232,7 +240,7 @@ bool file_init(struct smbd_server_connection *sconn)
Close files open by a specified vuid.
****************************************************************************/
-void file_close_user(struct smbd_server_connection *sconn, int vuid)
+void file_close_user(struct smbd_server_connection *sconn, uint64_t vuid)
{
files_struct *fsp, *next;
@@ -446,11 +454,13 @@ void file_sync_all(connection_struct *conn)
Free up a fsp.
****************************************************************************/
-void file_free(struct smb_request *req, files_struct *fsp)
+void fsp_free(files_struct *fsp)
{
struct smbd_server_connection *sconn = fsp->conn->sconn;
DLIST_REMOVE(sconn->files, fsp);
+ SMB_ASSERT(sconn->num_files > 0);
+ sconn->num_files--;
TALLOC_FREE(fsp->fake_file_handle);
@@ -460,28 +470,35 @@ void file_free(struct smb_request *req, files_struct *fsp)
fsp->fh->ref_count--;
}
+ fsp->conn->num_files_open--;
+
+ /* this is paranoia, just in case someone tries to reuse the
+ information */
+ ZERO_STRUCTP(fsp);
+
+ /* fsp->fsp_name is a talloc child and is free'd automatically. */
+ TALLOC_FREE(fsp);
+}
+
+void file_free(struct smb_request *req, files_struct *fsp)
+{
+ struct smbd_server_connection *sconn = fsp->conn->sconn;
+ uint64_t fnum = fsp->fnum;
+
if (fsp->notify) {
- if (fsp->is_directory) {
- notify_remove_onelevel(fsp->conn->notify_ctx,
- &fsp->file_id, fsp);
- }
- notify_remove(fsp->conn->notify_ctx, fsp);
+ struct notify_context *notify_ctx =
+ fsp->conn->sconn->notify_ctx;
+ notify_remove(notify_ctx, fsp);
TALLOC_FREE(fsp->notify);
}
/* Ensure this event will never fire. */
- TALLOC_FREE(fsp->oplock_timeout);
-
- /* Ensure this event will never fire. */
TALLOC_FREE(fsp->update_write_time_event);
- bitmap_clear(sconn->file_bmap, fsp->fnum - FILE_HANDLE_OFFSET);
- sconn->files_used--;
-
- DEBUG(5,("freed files structure %d (%d used)\n",
- fsp->fnum, sconn->files_used));
-
- fsp->conn->num_files_open--;
+ if (fsp->op != NULL) {
+ fsp->op->compat = NULL;
+ }
+ TALLOC_FREE(fsp->op);
if ((req != NULL) && (fsp == req->chain_fsp)) {
req->chain_fsp = NULL;
@@ -501,37 +518,12 @@ void file_free(struct smb_request *req, files_struct *fsp)
}
/* Drop all remaining extensions. */
- while (fsp->vfs_extension) {
- vfs_remove_fsp_extension(fsp->vfs_extension->owner, fsp);
- }
+ vfs_remove_all_fsp_extensions(fsp);
- /* this is paranoia, just in case someone tries to reuse the
- information */
- ZERO_STRUCTP(fsp);
-
- /* fsp->fsp_name is a talloc child and is free'd automatically. */
- TALLOC_FREE(fsp);
-}
-
-/****************************************************************************
- Get an fsp from a 16 bit fnum.
-****************************************************************************/
+ fsp_free(fsp);
-static struct files_struct *file_fnum(struct smbd_server_connection *sconn,
- uint16 fnum)
-{
- files_struct *fsp;
- int count=0;
-
- for (fsp=sconn->files; fsp; fsp=fsp->next, count++) {
- if (fsp->fnum == fnum) {
- if (count > 10) {
- DLIST_PROMOTE(sconn->files, fsp);
- }
- return fsp;
- }
- }
- return NULL;
+ DEBUG(5,("freed files structure %llu (%u used)\n",
+ (unsigned long long)fnum, (unsigned int)sconn->num_files));
}
/****************************************************************************
@@ -540,6 +532,9 @@ static struct files_struct *file_fnum(struct smbd_server_connection *sconn,
files_struct *file_fsp(struct smb_request *req, uint16 fid)
{
+ struct smbXsrv_open *op;
+ NTSTATUS status;
+ NTTIME now = 0;
files_struct *fsp;
if (req == NULL) {
@@ -556,78 +551,88 @@ files_struct *file_fsp(struct smb_request *req, uint16 fid)
}
if (req->chain_fsp != NULL) {
+ if (req->chain_fsp->deferred_close) {
+ return NULL;
+ }
return req->chain_fsp;
}
- fsp = file_fnum(req->sconn, fid);
- if (fsp != NULL) {
- req->chain_fsp = fsp;
+ if (req->sconn->conn == NULL) {
+ return NULL;
}
- return fsp;
-}
-uint64_t fsp_persistent_id(const struct files_struct *fsp)
-{
- uint64_t persistent_id;
+ now = timeval_to_nttime(&req->request_time);
- /*
- * This calculates a number that is most likely
- * globally unique. In future we will have a database
- * to make it completely unique.
- *
- * 32-bit random gen_id
- * 16-bit truncated open_time
- * 16-bit fnum (valatile_id)
- */
- persistent_id = fsp->fh->gen_id & UINT32_MAX;
- persistent_id <<= 16;
- persistent_id &= 0x0000FFFFFFFF0000LLU;
- persistent_id |= fsp->open_time.tv_usec & UINT16_MAX;
- persistent_id <<= 16;
- persistent_id &= 0xFFFFFFFFFFFF0000LLU;
- persistent_id |= fsp->fnum & UINT16_MAX;
-
- return persistent_id;
+ status = smb1srv_open_lookup(req->sconn->conn,
+ fid, now, &op);
+ if (!NT_STATUS_IS_OK(status)) {
+ return NULL;
+ }
+
+ fsp = op->compat;
+ if (fsp == NULL) {
+ return NULL;
+ }
+
+ if (fsp->deferred_close) {
+ return NULL;
+ }
+
+ req->chain_fsp = fsp;
+ return fsp;
}
struct files_struct *file_fsp_smb2(struct smbd_smb2_request *smb2req,
uint64_t persistent_id,
uint64_t volatile_id)
{
+ struct smbXsrv_open *op;
+ NTSTATUS status;
+ NTTIME now = 0;
struct files_struct *fsp;
- uint64_t fsp_persistent;
if (smb2req->compat_chain_fsp != NULL) {
+ if (smb2req->compat_chain_fsp->deferred_close) {
+ return NULL;
+ }
return smb2req->compat_chain_fsp;
}
- if (volatile_id > UINT16_MAX) {
+ now = timeval_to_nttime(&smb2req->request_time);
+
+ status = smb2srv_open_lookup(smb2req->sconn->conn,
+ persistent_id, volatile_id,
+ now, &op);
+ if (!NT_STATUS_IS_OK(status)) {
return NULL;
}
- fsp = file_fnum(smb2req->sconn, (uint16_t)volatile_id);
+ fsp = op->compat;
if (fsp == NULL) {
return NULL;
}
- fsp_persistent = fsp_persistent_id(fsp);
- if (persistent_id != fsp_persistent) {
+ if (smb2req->tcon == NULL) {
return NULL;
}
- if (smb2req->tcon == NULL) {
+ if (smb2req->tcon->compat != fsp->conn) {
+ return NULL;
+ }
+
+ if (smb2req->session == NULL) {
return NULL;
}
- if (smb2req->tcon->compat_conn != fsp->conn) {
+ if (smb2req->session->compat == NULL) {
return NULL;
}
- if (smb2req->session == NULL) {
+ if (smb2req->session->compat->vuid != fsp->vuid) {
return NULL;
}
- if (smb2req->session->vuid != fsp->vuid) {
+ if (fsp->deferred_close) {
return NULL;
}
@@ -643,6 +648,9 @@ NTSTATUS dup_file_fsp(struct smb_request *req, files_struct *from,
uint32 access_mask, uint32 share_access,
uint32 create_options, files_struct *to)
{
+ /* this can never happen for print files */
+ SMB_ASSERT(from->print_file == NULL);
+
TALLOC_FREE(to->fh);
to->fh = from->fh;
@@ -650,7 +658,6 @@ NTSTATUS dup_file_fsp(struct smb_request *req, files_struct *from,
to->file_id = from->file_id;
to->initial_allocation_size = from->initial_allocation_size;
- to->mode = from->mode;
to->file_pid = from->file_pid;
to->vuid = from->vuid;
to->open_time = from->open_time;
@@ -658,24 +665,14 @@ NTSTATUS dup_file_fsp(struct smb_request *req, files_struct *from,
to->share_access = share_access;
to->oplock_type = from->oplock_type;
to->can_lock = from->can_lock;
- to->can_read = (access_mask & (FILE_READ_DATA)) ? True : False;
- if (!CAN_WRITE(from->conn)) {
- to->can_write = False;
- } else {
- to->can_write = (access_mask & (FILE_WRITE_DATA | FILE_APPEND_DATA)) ? True : False;
- }
+ to->can_read = ((access_mask & FILE_READ_DATA) != 0);
+ to->can_write =
+ CAN_WRITE(from->conn) &&
+ ((access_mask & (FILE_WRITE_DATA | FILE_APPEND_DATA)) != 0);
to->modified = from->modified;
to->is_directory = from->is_directory;
to->aio_write_behind = from->aio_write_behind;
- if (from->print_file) {
- to->print_file = talloc(to, struct print_file_data);
- if (!to->print_file) return NT_STATUS_NO_MEMORY;
- to->print_file->rap_jobid = from->print_file->rap_jobid;
- } else {
- to->print_file = NULL;
- }
-
return fsp_set_smb_fname(to, from->fsp_name);
}
@@ -686,7 +683,6 @@ NTSTATUS dup_file_fsp(struct smb_request *req, files_struct *from,
NTSTATUS file_name_hash(connection_struct *conn,
const char *name, uint32_t *p_name_hash)
{
- TDB_DATA key;
char *fullpath = NULL;
/* Set the hash of the full pathname. */
@@ -697,8 +693,7 @@ NTSTATUS file_name_hash(connection_struct *conn,
if (!fullpath) {
return NT_STATUS_NO_MEMORY;
}
- key = string_term_tdb_data(fullpath);
- *p_name_hash = tdb_jenkins_hash(&key);
+ *p_name_hash = hash(fullpath, talloc_get_size(fullpath), 0);
DEBUG(10,("file_name_hash: %s hash 0x%x\n",
fullpath,