/* * Store Windows ACLs in xattrs. * * Copyright (C) Volker Lendecke, 2008 * Copyright (C) Jeremy Allison, 2008 * * This program is free software; you can redistribute it and/or modify * it under the terms of the GNU General Public License as published by * the Free Software Foundation; either version 3 of the License, or * (at your option) any later version. * * This program is distributed in the hope that it will be useful, * but WITHOUT ANY WARRANTY; without even the implied warranty of * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the * GNU General Public License for more details. * * You should have received a copy of the GNU General Public License * along with this program; if not, see . */ #include "includes.h" #include "smbd/smbd.h" #include "system/filesys.h" #include "librpc/gen_ndr/xattr.h" #include "auth.h" #include "vfs_acl_common.h" #include "lib/util/tevent_ntstatus.h" #include "lib/util/tevent_unix.h" /* Pull in the common functions. */ #define ACL_MODULE_NAME "acl_xattr" #undef DBGC_CLASS #define DBGC_CLASS DBGC_VFS /******************************************************************* Pull a security descriptor into a DATA_BLOB from a xattr. *******************************************************************/ static ssize_t getxattr_do(vfs_handle_struct *handle, files_struct *fsp, const char *xattr_name, uint8_t *val, size_t size) { ssize_t sizeret; int saved_errno = 0; become_root(); sizeret = SMB_VFS_FGETXATTR(fsp, xattr_name, val, size); if (sizeret == -1) { saved_errno = errno; } unbecome_root(); if (saved_errno != 0) { errno = saved_errno; } return sizeret; } static NTSTATUS fget_acl_blob(TALLOC_CTX *ctx, vfs_handle_struct *handle, files_struct *fsp, DATA_BLOB *pblob) { size_t size = 4096; uint8_t *val = NULL; uint8_t *tmp; ssize_t sizeret; ZERO_STRUCTP(pblob); again: tmp = talloc_realloc(ctx, val, uint8_t, size); if (tmp == NULL) { TALLOC_FREE(val); return NT_STATUS_NO_MEMORY; } val = tmp; sizeret = getxattr_do(handle, fsp, XATTR_NTACL_NAME, val, size); if (sizeret >= 0) { pblob->data = val; pblob->length = sizeret; return NT_STATUS_OK; } if (errno != ERANGE) { goto err; } /* Too small, try again. */ sizeret = getxattr_do(handle, fsp, XATTR_NTACL_NAME, NULL, 0); if (sizeret < 0) { goto err; } if (size < sizeret) { size = sizeret; } if (size > 65536) { /* Max ACL size is 65536 bytes. */ errno = ERANGE; goto err; } goto again; err: /* Real error - exit here. */ TALLOC_FREE(val); return map_nt_error_from_unix(errno); } /******************************************************************* Store a DATA_BLOB into an xattr given an fsp pointer. *******************************************************************/ static NTSTATUS store_acl_blob_fsp(vfs_handle_struct *handle, files_struct *fsp, DATA_BLOB *pblob) { int ret; int saved_errno = 0; DEBUG(10,("store_acl_blob_fsp: storing blob length %u on file %s\n", (unsigned int)pblob->length, fsp_str_dbg(fsp))); become_root(); ret = SMB_VFS_FSETXATTR(fsp, XATTR_NTACL_NAME, pblob->data, pblob->length, 0); if (ret) { saved_errno = errno; } unbecome_root(); if (ret) { DEBUG(5, ("store_acl_blob_fsp: setting attr failed for file %s" "with error %s\n", fsp_str_dbg(fsp), strerror(saved_errno) )); errno = saved_errno; return map_nt_error_from_unix(saved_errno); } return NT_STATUS_OK; } /********************************************************************* Remove a Windows ACL - we're setting the underlying POSIX ACL. *********************************************************************/ static int sys_acl_set_fd_xattr(vfs_handle_struct *handle, files_struct *fsp, SMB_ACL_TYPE_T type, SMB_ACL_T theacl) { struct acl_common_fsp_ext *ext = (struct acl_common_fsp_ext *) VFS_FETCH_FSP_EXTENSION(handle, fsp); int ret; ret = SMB_VFS_NEXT_SYS_ACL_SET_FD(handle, fsp, type, theacl); if (ret == -1) { return -1; } if (ext != NULL && ext->setting_nt_acl) { return 0; } become_root(); SMB_VFS_FREMOVEXATTR(fsp, XATTR_NTACL_NAME); unbecome_root(); return 0; } static int connect_acl_xattr(struct vfs_handle_struct *handle, const char *service, const char *user) { const char *security_acl_xattr_name = NULL; int ret = SMB_VFS_NEXT_CONNECT(handle, service, user); bool ok; struct acl_common_config *config = NULL; if (ret < 0) { return ret; } ok = init_acl_common_config(handle, ACL_MODULE_NAME); if (!ok) { DBG_ERR("init_acl_common_config failed\n"); return -1; } /* Ensure we have the parameters correct if we're * using this module. */ DEBUG(2,("connect_acl_xattr: setting 'inherit acls = true' " "'dos filemode = true' and " "'force unknown acl user = true' for service %s\n", service )); lp_do_parameter(SNUM(handle->conn), "inherit acls", "true"); lp_do_parameter(SNUM(handle->conn), "dos filemode", "true"); lp_do_parameter(SNUM(handle->conn), "force unknown acl user", "true"); SMB_VFS_HANDLE_GET_DATA(handle, config, struct acl_common_config, return -1); if (config->ignore_system_acls) { mode_t create_mask = lp_create_mask(SNUM(handle->conn)); if ((create_mask & 0666) != 0666) { char create_mask_str[16]; create_mask |= 0666; snprintf(create_mask_str, sizeof(create_mask_str), "0%o", create_mask); DBG_NOTICE("setting 'create mask = %s'\n", create_mask_str); lp_do_parameter(SNUM(handle->conn), "create mask", create_mask_str); } DBG_NOTICE("setting 'directory mask = 0777', " "'store dos attributes = yes' and all " "'map ...' options to 'no'\n"); lp_do_parameter(SNUM(handle->conn), "directory mask", "0777"); lp_do_parameter(SNUM(handle->conn), "map archive", "no"); lp_do_parameter(SNUM(handle->conn), "map hidden", "no"); lp_do_parameter(SNUM(handle->conn), "map readonly", "no"); lp_do_parameter(SNUM(handle->conn), "map system", "no"); lp_do_parameter(SNUM(handle->conn), "store dos attributes", "yes"); } security_acl_xattr_name = lp_parm_const_string(SNUM(handle->conn), "acl_xattr", "security_acl_name", NULL); if (security_acl_xattr_name != NULL) { config->security_acl_xattr_name = talloc_strdup(config, security_acl_xattr_name); if (config->security_acl_xattr_name == NULL) { return -1; } } return 0; } static int acl_xattr_unlinkat(vfs_handle_struct *handle, struct files_struct *dirfsp, const struct smb_filename *smb_fname, int flags) { int ret; if (flags & AT_REMOVEDIR) { ret = rmdir_acl_common(handle, dirfsp, smb_fname); } else { ret = unlink_acl_common(handle, dirfsp, smb_fname, flags); } return ret; } static NTSTATUS acl_xattr_fget_nt_acl(vfs_handle_struct *handle, files_struct *fsp, uint32_t security_info, TALLOC_CTX *mem_ctx, struct security_descriptor **ppdesc) { NTSTATUS status; status = fget_nt_acl_common(fget_acl_blob, handle, fsp, security_info, mem_ctx, ppdesc); return status; } static NTSTATUS acl_xattr_fset_nt_acl(vfs_handle_struct *handle, files_struct *fsp, uint32_t security_info_sent, const struct security_descriptor *psd) { NTSTATUS status; status = fset_nt_acl_common(fget_acl_blob, store_acl_blob_fsp, ACL_MODULE_NAME, handle, fsp, security_info_sent, psd); return status; } struct acl_xattr_getxattrat_state { struct vfs_aio_state aio_state; ssize_t xattr_size; uint8_t *xattr_value; }; static void acl_xattr_getxattrat_done(struct tevent_req *subreq); static struct tevent_req *acl_xattr_getxattrat_send( TALLOC_CTX *mem_ctx, struct tevent_context *ev, struct vfs_handle_struct *handle, files_struct *dirfsp, const struct smb_filename *smb_fname, const char *xattr_name, size_t alloc_hint) { struct tevent_req *req = NULL; struct tevent_req *subreq = NULL; struct acl_xattr_getxattrat_state *state = NULL; struct acl_common_config *config = NULL; SMB_VFS_HANDLE_GET_DATA(handle, config, struct acl_common_config, return NULL); req = tevent_req_create(mem_ctx, &state, struct acl_xattr_getxattrat_state); if (req == NULL) { return NULL; } if (strequal(xattr_name, config->security_acl_xattr_name)) { tevent_req_nterror(req, NT_STATUS_ACCESS_DENIED); return tevent_req_post(req, ev); } if (config->security_acl_xattr_name != NULL && strequal(xattr_name, XATTR_NTACL_NAME)) { xattr_name = config->security_acl_xattr_name; } subreq = SMB_VFS_NEXT_GETXATTRAT_SEND(state, ev, handle, dirfsp, smb_fname, xattr_name, alloc_hint); if (tevent_req_nomem(subreq, req)) { return tevent_req_post(req, ev); } tevent_req_set_callback(subreq, acl_xattr_getxattrat_done, req); return req; } static void acl_xattr_getxattrat_done(struct tevent_req *subreq) { struct tevent_req *req = tevent_req_callback_data( subreq, struct tevent_req); struct acl_xattr_getxattrat_state *state = tevent_req_data( req, struct acl_xattr_getxattrat_state); state->xattr_size = SMB_VFS_NEXT_GETXATTRAT_RECV(subreq, &state->aio_state, state, &state->xattr_value); TALLOC_FREE(subreq); if (state->xattr_size == -1) { tevent_req_error(req, state->aio_state.error); return; } tevent_req_done(req); } static ssize_t acl_xattr_getxattrat_recv(struct tevent_req *req, struct vfs_aio_state *aio_state, TALLOC_CTX *mem_ctx, uint8_t **xattr_value) { struct acl_xattr_getxattrat_state *state = tevent_req_data( req, struct acl_xattr_getxattrat_state); ssize_t xattr_size; if (tevent_req_is_unix_error(req, &aio_state->error)) { tevent_req_received(req); return -1; } *aio_state = state->aio_state; xattr_size = state->xattr_size; if (xattr_value != NULL) { *xattr_value = talloc_move(mem_ctx, &state->xattr_value); } tevent_req_received(req); return xattr_size; } static ssize_t acl_xattr_fgetxattr(struct vfs_handle_struct *handle, struct files_struct *fsp, const char *name, void *value, size_t size) { struct acl_common_config *config = NULL; SMB_VFS_HANDLE_GET_DATA(handle, config, struct acl_common_config, return -1); if (strequal(name, config->security_acl_xattr_name)) { errno = EACCES; return -1; } if (config->security_acl_xattr_name != NULL && strequal(name, XATTR_NTACL_NAME)) { name = config->security_acl_xattr_name; } return SMB_VFS_NEXT_FGETXATTR(handle, fsp, name, value, size); } static ssize_t acl_xattr_flistxattr(struct vfs_handle_struct *handle, struct files_struct *fsp, char *listbuf, size_t bufsize) { struct acl_common_config *config = NULL; ssize_t size; char *p = NULL; size_t nlen, consumed; SMB_VFS_HANDLE_GET_DATA(handle, config, struct acl_common_config, return -1); size = SMB_VFS_NEXT_FLISTXATTR(handle, fsp, listbuf, bufsize); if (size < 0) { return -1; } p = listbuf; while (p - listbuf < size) { nlen = strlen(p) + 1; if (strequal(p, config->security_acl_xattr_name)) { break; } p += nlen; } if (p - listbuf >= size) { /* No match */ return size; } /* * The consumed helper variable just makes the math * a bit more digestible. */ consumed = p - listbuf; if (consumed + nlen < size) { /* If not the last name move, else just skip */ memmove(p, p + nlen, size - consumed - nlen); } size -= nlen; return size; } static int acl_xattr_fremovexattr(struct vfs_handle_struct *handle, struct files_struct *fsp, const char *name) { struct acl_common_config *config = NULL; SMB_VFS_HANDLE_GET_DATA(handle, config, struct acl_common_config, return -1); if (strequal(name, config->security_acl_xattr_name)) { errno = EACCES; return -1; } if (config->security_acl_xattr_name != NULL && strequal(name, XATTR_NTACL_NAME)) { name = config->security_acl_xattr_name; } return SMB_VFS_NEXT_FREMOVEXATTR(handle, fsp, name); } static int acl_xattr_fsetxattr(struct vfs_handle_struct *handle, struct files_struct *fsp, const char *name, const void *value, size_t size, int flags) { struct acl_common_config *config = NULL; SMB_VFS_HANDLE_GET_DATA(handle, config, struct acl_common_config, return -1); if (strequal(name, config->security_acl_xattr_name)) { errno = EACCES; return -1; } if (config->security_acl_xattr_name != NULL && strequal(name, XATTR_NTACL_NAME)) { name = config->security_acl_xattr_name; } return SMB_VFS_NEXT_FSETXATTR(handle, fsp, name, value, size, flags); } static struct vfs_fn_pointers vfs_acl_xattr_fns = { .connect_fn = connect_acl_xattr, .unlinkat_fn = acl_xattr_unlinkat, .fchmod_fn = fchmod_acl_module_common, .fget_nt_acl_fn = acl_xattr_fget_nt_acl, .fset_nt_acl_fn = acl_xattr_fset_nt_acl, .sys_acl_set_fd_fn = sys_acl_set_fd_xattr, .getxattrat_send_fn = acl_xattr_getxattrat_send, .getxattrat_recv_fn = acl_xattr_getxattrat_recv, .fgetxattr_fn = acl_xattr_fgetxattr, .flistxattr_fn = acl_xattr_flistxattr, .fremovexattr_fn = acl_xattr_fremovexattr, .fsetxattr_fn = acl_xattr_fsetxattr, }; static_decl_vfs; NTSTATUS vfs_acl_xattr_init(TALLOC_CTX *ctx) { return smb_register_vfs(SMB_VFS_INTERFACE_VERSION, "acl_xattr", &vfs_acl_xattr_fns); }