2019-07-05 10:52:43 +03:00
/*
* Unix SMB / CIFS implementation .
* Util functions valid in the SMB1 server
*
* Copyright ( C ) Volker Lendecke 2019
* Copyright by the authors of the functions moved here eventually
*
* This program is free software ; you can redistribute it and / or modify
* it under the terms of the GNU General Public License as published by
* the Free Software Foundation ; either version 3 of the License , or
* ( at your option ) any later version .
*
* This program is distributed in the hope that it will be useful ,
* but WITHOUT ANY WARRANTY ; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE . See the
* GNU General Public License for more details .
*
* You should have received a copy of the GNU General Public License
* along with this program . If not , see < http : //www.gnu.org/licenses/>.
*/
# include "includes.h"
2022-04-21 13:20:20 +03:00
# include "smbd/smbd.h"
# include "smbd/globals.h"
2019-07-05 10:52:43 +03:00
# include "libcli/security/security.h"
2020-07-17 13:36:22 +03:00
# include "lib/util/sys_rw_data.h"
2020-10-03 18:41:17 +03:00
# include "smbd/fd_handle.h"
2019-07-05 10:52:43 +03:00
/****************************************************************************
Special FCB or DOS processing in the case of a sharing violation .
Try and find a duplicated file handle .
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
struct files_struct * fcb_or_dos_open (
struct smb_request * req ,
const struct smb_filename * smb_fname ,
uint32_t access_mask ,
uint32_t create_options ,
uint32_t private_flags )
{
struct connection_struct * conn = req - > conn ;
struct file_id id = vfs_file_id_from_sbuf ( conn , & smb_fname - > st ) ;
struct files_struct * fsp = NULL , * new_fsp = NULL ;
NTSTATUS status ;
if ( ( private_flags &
2020-10-23 18:41:33 +03:00
( NTCREATEX_FLAG_DENY_DOS |
2020-10-23 18:42:28 +03:00
NTCREATEX_FLAG_DENY_FCB ) )
2019-07-05 10:52:43 +03:00
= = 0 ) {
return NULL ;
}
2020-11-19 13:35:23 +03:00
for ( fsp = file_find_di_first ( conn - > sconn , id , true ) ;
2019-07-05 10:52:43 +03:00
fsp ! = NULL ;
2020-11-19 13:35:23 +03:00
fsp = file_find_di_next ( fsp , true ) ) {
2019-07-05 10:52:43 +03:00
DBG_DEBUG ( " Checking file %s, fd = %d, vuid = % " PRIu64 " , "
" file_pid = % " PRIu16 " , "
" private_options = 0x% " PRIx32 " , "
" access_mask = 0x% " PRIx32 " \n " ,
fsp_str_dbg ( fsp ) ,
2020-10-03 18:41:17 +03:00
fsp_get_pathref_fd ( fsp ) ,
2019-07-05 10:52:43 +03:00
fsp - > vuid ,
fsp - > file_pid ,
2020-10-23 18:47:46 +03:00
fh_get_private_options ( fsp - > fh ) ,
2019-07-05 10:52:43 +03:00
fsp - > access_mask ) ;
2020-10-05 08:51:50 +03:00
if ( fsp_get_pathref_fd ( fsp ) ! = - 1 & &
2019-07-05 10:52:43 +03:00
fsp - > vuid = = req - > vuid & &
fsp - > file_pid = = req - > smbpid & &
2020-10-23 18:47:46 +03:00
( fh_get_private_options ( fsp - > fh ) &
2020-10-23 18:41:33 +03:00
( NTCREATEX_FLAG_DENY_DOS |
2020-10-23 18:42:28 +03:00
NTCREATEX_FLAG_DENY_FCB ) ) & &
2019-07-05 10:52:43 +03:00
( fsp - > access_mask & FILE_WRITE_DATA ) & &
strequal ( fsp - > fsp_name - > base_name , smb_fname - > base_name ) & &
strequal ( fsp - > fsp_name - > stream_name ,
smb_fname - > stream_name ) ) {
DBG_DEBUG ( " file match \n " ) ;
break ;
}
}
if ( fsp = = NULL ) {
return NULL ;
}
/* quite an insane set of semantics ... */
if ( is_executable ( smb_fname - > base_name ) & &
2020-10-23 18:47:46 +03:00
( fh_get_private_options ( fsp - > fh ) & NTCREATEX_FLAG_DENY_DOS ) ) {
2019-07-05 10:52:43 +03:00
DBG_DEBUG ( " file fail due to is_executable. \n " ) ;
return NULL ;
}
status = file_new ( req , conn , & new_fsp ) ;
if ( ! NT_STATUS_IS_OK ( status ) ) {
DBG_DEBUG ( " file_new failed: %s \n " , nt_errstr ( status ) ) ;
return NULL ;
}
2022-04-23 15:01:33 +03:00
status = dup_file_fsp ( fsp , access_mask , new_fsp ) ;
2019-07-05 10:52:43 +03:00
if ( ! NT_STATUS_IS_OK ( status ) ) {
DBG_DEBUG ( " dup_file_fsp failed: %s \n " , nt_errstr ( status ) ) ;
file_free ( req , new_fsp ) ;
return NULL ;
}
return new_fsp ;
}
2020-07-17 13:36:22 +03:00
/****************************************************************************
Send a keepalive packet ( rfc1002 ) .
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
bool send_keepalive ( int client )
{
unsigned char buf [ 4 ] ;
buf [ 0 ] = NBSSkeepalive ;
buf [ 1 ] = buf [ 2 ] = buf [ 3 ] = 0 ;
return ( write_data ( client , ( char * ) buf , 4 ) = = 4 ) ;
}
2022-06-05 17:44:28 +03:00
/*******************************************************************
Add a string to the end of a smb_buf , adjusting bcc and smb_len .
Return the bytes added
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
ssize_t message_push_string ( uint8_t * * outbuf , const char * str , int flags )
{
size_t buf_size = smb_len ( * outbuf ) + 4 ;
size_t grow_size ;
size_t result = 0 ;
uint8_t * tmp ;
NTSTATUS status ;
/*
* We need to over - allocate , now knowing what srvstr_push will
* actually use . This is very generous by incorporating potential
* padding , the terminating 0 and at most 4 chars per UTF - 16 code
* point .
*/
grow_size = ( strlen ( str ) + 2 ) * 4 ;
if ( ! ( tmp = talloc_realloc ( NULL , * outbuf , uint8_t ,
buf_size + grow_size ) ) ) {
DEBUG ( 0 , ( " talloc failed \n " ) ) ;
return - 1 ;
}
status = srvstr_push ( ( char * ) tmp , SVAL ( tmp , smb_flg2 ) ,
tmp + buf_size , str , grow_size , flags , & result ) ;
if ( ! NT_STATUS_IS_OK ( status ) ) {
DEBUG ( 0 , ( " srvstr_push failed \n " ) ) ;
return - 1 ;
}
/*
* Ensure we clear out the extra data we have
* grown the buffer by , but not written to .
*/
if ( buf_size + result < buf_size ) {
return - 1 ;
}
if ( grow_size < result ) {
return - 1 ;
}
memset ( tmp + buf_size + result , ' \0 ' , grow_size - result ) ;
set_message_bcc ( ( char * ) tmp , smb_buflen ( tmp ) + result ) ;
* outbuf = tmp ;
return result ;
}