diff options
author | Stefan Metzmacher <metze@samba.org> | 2009-07-02 11:56:23 +0200 |
---|---|---|
committer | Stefan Metzmacher <metze@samba.org> | 2009-07-02 22:25:49 +0200 |
commit | 74860465ac3148ccb019a9824948cb278a31fa1a (patch) | |
tree | 2e585ed1dafc104b123ef0758d9ded22557f02f3 | |
parent | d37709d38b1260c2fbfbf1bea7cd90dc543d4e6c (diff) | |
download | samba-74860465ac3148ccb019a9824948cb278a31fa1a.tar.gz samba-74860465ac3148ccb019a9824948cb278a31fa1a.tar.bz2 samba-74860465ac3148ccb019a9824948cb278a31fa1a.zip |
s3:smbd: add marshalling layer for SMB2 Break support (SMB 2.002 only)
metze
-rw-r--r-- | source3/Makefile.in | 1 | ||||
-rw-r--r-- | source3/smbd/globals.h | 1 | ||||
-rw-r--r-- | source3/smbd/smb2_break.c | 214 | ||||
-rw-r--r-- | source3/smbd/smb2_server.c | 2 |
4 files changed, 217 insertions, 1 deletions
diff --git a/source3/Makefile.in b/source3/Makefile.in index c25c20ef41..8ee73c0848 100644 --- a/source3/Makefile.in +++ b/source3/Makefile.in @@ -777,6 +777,7 @@ SMBD_OBJ_SRV = smbd/files.o smbd/chgpasswd.o smbd/connection.o \ smbd/smb2_notify.o \ smbd/smb2_getinfo.o \ smbd/smb2_setinfo.o \ + smbd/smb2_break.o \ $(MANGLE_OBJ) @VFS_STATIC@ SMBD_OBJ_BASE = $(PARAM_WITHOUT_REG_OBJ) $(SMBD_OBJ_SRV) $(LIBSMB_OBJ) \ diff --git a/source3/smbd/globals.h b/source3/smbd/globals.h index 4adae01d47..788b6c3df5 100644 --- a/source3/smbd/globals.h +++ b/source3/smbd/globals.h @@ -220,6 +220,7 @@ NTSTATUS smbd_smb2_request_process_keepalive(struct smbd_smb2_request *req); NTSTATUS smbd_smb2_request_process_notify(struct smbd_smb2_request *req); NTSTATUS smbd_smb2_request_process_getinfo(struct smbd_smb2_request *req); NTSTATUS smbd_smb2_request_process_setinfo(struct smbd_smb2_request *req); +NTSTATUS smbd_smb2_request_process_break(struct smbd_smb2_request *req); struct smbd_smb2_request { struct smbd_smb2_request *prev, *next; diff --git a/source3/smbd/smb2_break.c b/source3/smbd/smb2_break.c new file mode 100644 index 0000000000..25952fdf0d --- /dev/null +++ b/source3/smbd/smb2_break.c @@ -0,0 +1,214 @@ +/* + Unix SMB/CIFS implementation. + Core SMB2 server + + Copyright (C) Stefan Metzmacher 2009 + + This program is free software; you can redistribute it and/or modify + it under the terms of the GNU General Public License as published by + the Free Software Foundation; either version 3 of the License, or + (at your option) any later version. + + This program is distributed in the hope that it will be useful, + but WITHOUT ANY WARRANTY; without even the implied warranty of + MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the + GNU General Public License for more details. + + You should have received a copy of the GNU General Public License + along with this program. If not, see <http://www.gnu.org/licenses/>. +*/ + +#include "includes.h" +#include "smbd/globals.h" +#include "../source4/libcli/smb2/smb2_constants.h" + +static struct tevent_req *smbd_smb2_oplock_break_send(TALLOC_CTX *mem_ctx, + struct tevent_context *ev, + struct smbd_smb2_request *smb2req, + uint8_t in_oplock_level, + uint64_t in_file_id_volatile); +static NTSTATUS smbd_smb2_oplock_break_recv(struct tevent_req *req, + uint8_t *out_oplock_level); + +static void smbd_smb2_request_oplock_break_done(struct tevent_req *subreq); +NTSTATUS smbd_smb2_request_process_break(struct smbd_smb2_request *req) +{ + const uint8_t *inhdr; + const uint8_t *inbody; + int i = req->current_idx; + size_t expected_body_size = 0x18; + size_t body_size; + uint8_t in_oplock_level; + uint64_t in_file_id_persistent; + uint64_t in_file_id_volatile; + struct tevent_req *subreq; + + inhdr = (const uint8_t *)req->in.vector[i+0].iov_base; + if (req->in.vector[i+1].iov_len != (expected_body_size & 0xFFFFFFFE)) { + return smbd_smb2_request_error(req, NT_STATUS_INVALID_PARAMETER); + } + + inbody = (const uint8_t *)req->in.vector[i+1].iov_base; + + body_size = SVAL(inbody, 0x00); + if (body_size != expected_body_size) { + return smbd_smb2_request_error(req, NT_STATUS_INVALID_PARAMETER); + } + + in_oplock_level = CVAL(inbody, 0x02); + /* 0x03 1 bytes reserved */ + /* 0x04 4 bytes reserved */ + in_file_id_persistent = BVAL(inbody, 0x08); + in_file_id_volatile = BVAL(inbody, 0x10); + + if (req->compat_chain_fsp) { + /* skip check */ + } else if (in_file_id_persistent != 0) { + return smbd_smb2_request_error(req, NT_STATUS_FILE_CLOSED); + } + + subreq = smbd_smb2_oplock_break_send(req, + req->conn->smb2.event_ctx, + req, + in_oplock_level, + in_file_id_volatile); + if (subreq == NULL) { + return smbd_smb2_request_error(req, NT_STATUS_NO_MEMORY); + } + tevent_req_set_callback(subreq, smbd_smb2_request_oplock_break_done, req); + + if (tevent_req_is_in_progress(subreq)) { + return smbd_smb2_request_pending_queue(req); + } + + return NT_STATUS_OK; +} + +static void smbd_smb2_request_oplock_break_done(struct tevent_req *subreq) +{ + struct smbd_smb2_request *req = tevent_req_callback_data(subreq, + struct smbd_smb2_request); + const uint8_t *inbody; + int i = req->current_idx; + uint64_t in_file_id_persistent; + uint64_t in_file_id_volatile; + uint8_t out_oplock_level; + DATA_BLOB outbody; + NTSTATUS status; + NTSTATUS error; /* transport error */ + + status = smbd_smb2_oplock_break_recv(subreq, &out_oplock_level); + TALLOC_FREE(subreq); + if (!NT_STATUS_IS_OK(status)) { + error = smbd_smb2_request_error(req, status); + if (!NT_STATUS_IS_OK(error)) { + smbd_server_connection_terminate(req->conn, + nt_errstr(error)); + return; + } + return; + } + + inbody = (const uint8_t *)req->in.vector[i+1].iov_base; + + in_file_id_persistent = BVAL(inbody, 0x08); + in_file_id_volatile = BVAL(inbody, 0x10); + + outbody = data_blob_talloc(req->out.vector, NULL, 0x18); + if (outbody.data == NULL) { + error = smbd_smb2_request_error(req, NT_STATUS_NO_MEMORY); + if (!NT_STATUS_IS_OK(error)) { + smbd_server_connection_terminate(req->conn, + nt_errstr(error)); + return; + } + return; + } + + SSVAL(outbody.data, 0x00, 0x18); /* struct size */ + SCVAL(outbody.data, 0x02, + out_oplock_level); /* oplock level */ + SCVAL(outbody.data, 0x03, 0); /* reserved */ + SIVAL(outbody.data, 0x04, 0); /* reserved */ + SBVAL(outbody.data, 0x08, + in_file_id_persistent); /* file id (persistent) */ + SBVAL(outbody.data, 0x10, + in_file_id_volatile); /* file id (volatile) */ + + error = smbd_smb2_request_done(req, outbody, NULL); + if (!NT_STATUS_IS_OK(error)) { + smbd_server_connection_terminate(req->conn, + nt_errstr(error)); + return; + } +} + +struct smbd_smb2_oplock_break_state { + struct smbd_smb2_request *smb2req; + uint8_t out_oplock_level; +}; + +static struct tevent_req *smbd_smb2_oplock_break_send(TALLOC_CTX *mem_ctx, + struct tevent_context *ev, + struct smbd_smb2_request *smb2req, + uint8_t in_oplock_level, + uint64_t in_file_id_volatile) +{ + struct tevent_req *req; + struct smbd_smb2_oplock_break_state *state; + struct smb_request *smbreq; + connection_struct *conn = smb2req->tcon->compat_conn; + files_struct *fsp; + + req = tevent_req_create(mem_ctx, &state, + struct smbd_smb2_oplock_break_state); + if (req == NULL) { + return NULL; + } + state->smb2req = smb2req; + state->out_oplock_level = SMB2_OPLOCK_LEVEL_NONE; + + DEBUG(10,("smbd_smb2_oplock_break_send: file_id[0x%016llX]\n", + (unsigned long long)in_file_id_volatile)); + + smbreq = smbd_smb2_fake_smb_request(smb2req); + if (tevent_req_nomem(smbreq, req)) { + return tevent_req_post(req, ev); + } + + fsp = file_fsp(smbreq, (uint16_t)in_file_id_volatile); + if (fsp == NULL) { + tevent_req_nterror(req, NT_STATUS_FILE_CLOSED); + return tevent_req_post(req, ev); + } + if (conn != fsp->conn) { + tevent_req_nterror(req, NT_STATUS_FILE_CLOSED); + return tevent_req_post(req, ev); + } + if (smb2req->session->vuid != fsp->vuid) { + tevent_req_nterror(req, NT_STATUS_FILE_CLOSED); + return tevent_req_post(req, ev); + } + + tevent_req_nterror(req, NT_STATUS_NOT_IMPLEMENTED); + return tevent_req_post(req, ev); +} + +static NTSTATUS smbd_smb2_oplock_break_recv(struct tevent_req *req, + uint8_t *out_oplock_level) +{ + NTSTATUS status; + struct smbd_smb2_oplock_break_state *state = + tevent_req_data(req, + struct smbd_smb2_oplock_break_state); + + if (tevent_req_is_nterror(req, &status)) { + tevent_req_received(req); + return status; + } + + *out_oplock_level = state->out_oplock_level; + + tevent_req_received(req); + return NT_STATUS_OK; +} diff --git a/source3/smbd/smb2_server.c b/source3/smbd/smb2_server.c index c1fc3fa701..066b6f19db 100644 --- a/source3/smbd/smb2_server.c +++ b/source3/smbd/smb2_server.c @@ -782,7 +782,7 @@ static NTSTATUS smbd_smb2_request_dispatch(struct smbd_smb2_request *req) if (!NT_STATUS_IS_OK(status)) { return smbd_smb2_request_error(req, status); } - return smbd_smb2_request_error(req, NT_STATUS_NOT_IMPLEMENTED); + return smbd_smb2_request_process_break(req); } return smbd_smb2_request_error(req, NT_STATUS_INVALID_PARAMETER); |