mirror of
https://github.com/samba-team/samba.git
synced 2024-12-23 17:34:34 +03:00
777597d0c6
Only used in SMB1 code Signed-off-by: Volker Lendecke <vl@samba.org> Reviewed-by: Jeremy Allison <jra@samba.org>
179 lines
4.9 KiB
C
179 lines
4.9 KiB
C
/*
|
|
* Unix SMB/CIFS implementation.
|
|
* Util functions valid in the SMB1 server
|
|
*
|
|
* Copyright (C) Volker Lendecke 2019
|
|
* Copyright by the authors of the functions moved here eventually
|
|
*
|
|
* This program is free software; you can redistribute it and/or modify
|
|
* it under the terms of the GNU General Public License as published by
|
|
* the Free Software Foundation; either version 3 of the License, or
|
|
* (at your option) any later version.
|
|
*
|
|
* This program is distributed in the hope that it will be useful,
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
* GNU General Public License for more details.
|
|
*
|
|
* You should have received a copy of the GNU General Public License
|
|
* along with this program. If not, see <http://www.gnu.org/licenses/>.
|
|
*/
|
|
|
|
#include "includes.h"
|
|
#include "smbd/smbd.h"
|
|
#include "smbd/globals.h"
|
|
#include "libcli/security/security.h"
|
|
#include "lib/util/sys_rw_data.h"
|
|
#include "smbd/fd_handle.h"
|
|
|
|
/****************************************************************************
|
|
Special FCB or DOS processing in the case of a sharing violation.
|
|
Try and find a duplicated file handle.
|
|
****************************************************************************/
|
|
|
|
struct files_struct *fcb_or_dos_open(
|
|
struct smb_request *req,
|
|
const struct smb_filename *smb_fname,
|
|
uint32_t access_mask,
|
|
uint32_t create_options,
|
|
uint32_t private_flags)
|
|
{
|
|
struct connection_struct *conn = req->conn;
|
|
struct file_id id = vfs_file_id_from_sbuf(conn, &smb_fname->st);
|
|
struct files_struct *fsp = NULL, *new_fsp = NULL;
|
|
NTSTATUS status;
|
|
|
|
if ((private_flags &
|
|
(NTCREATEX_FLAG_DENY_DOS|
|
|
NTCREATEX_FLAG_DENY_FCB))
|
|
== 0) {
|
|
return NULL;
|
|
}
|
|
|
|
for(fsp = file_find_di_first(conn->sconn, id, true);
|
|
fsp != NULL;
|
|
fsp = file_find_di_next(fsp, true)) {
|
|
|
|
DBG_DEBUG("Checking file %s, fd = %d, vuid = %"PRIu64", "
|
|
"file_pid = %"PRIu16", "
|
|
"private_options = 0x%"PRIx32", "
|
|
"access_mask = 0x%"PRIx32"\n",
|
|
fsp_str_dbg(fsp),
|
|
fsp_get_pathref_fd(fsp),
|
|
fsp->vuid,
|
|
fsp->file_pid,
|
|
fh_get_private_options(fsp->fh),
|
|
fsp->access_mask);
|
|
|
|
if (fsp_get_pathref_fd(fsp) != -1 &&
|
|
fsp->vuid == req->vuid &&
|
|
fsp->file_pid == req->smbpid &&
|
|
(fh_get_private_options(fsp->fh) &
|
|
(NTCREATEX_FLAG_DENY_DOS |
|
|
NTCREATEX_FLAG_DENY_FCB)) &&
|
|
(fsp->access_mask & FILE_WRITE_DATA) &&
|
|
strequal(fsp->fsp_name->base_name, smb_fname->base_name) &&
|
|
strequal(fsp->fsp_name->stream_name,
|
|
smb_fname->stream_name)) {
|
|
DBG_DEBUG("file match\n");
|
|
break;
|
|
}
|
|
}
|
|
|
|
if (fsp == NULL) {
|
|
return NULL;
|
|
}
|
|
|
|
/* quite an insane set of semantics ... */
|
|
if (is_executable(smb_fname->base_name) &&
|
|
(fh_get_private_options(fsp->fh) & NTCREATEX_FLAG_DENY_DOS)) {
|
|
DBG_DEBUG("file fail due to is_executable.\n");
|
|
return NULL;
|
|
}
|
|
|
|
status = file_new(req, conn, &new_fsp);
|
|
if (!NT_STATUS_IS_OK(status)) {
|
|
DBG_DEBUG("file_new failed: %s\n", nt_errstr(status));
|
|
return NULL;
|
|
}
|
|
|
|
status = dup_file_fsp(fsp, access_mask, new_fsp);
|
|
|
|
if (!NT_STATUS_IS_OK(status)) {
|
|
DBG_DEBUG("dup_file_fsp failed: %s\n", nt_errstr(status));
|
|
file_free(req, new_fsp);
|
|
return NULL;
|
|
}
|
|
|
|
return new_fsp;
|
|
}
|
|
|
|
/****************************************************************************
|
|
Send a keepalive packet (rfc1002).
|
|
****************************************************************************/
|
|
|
|
bool send_keepalive(int client)
|
|
{
|
|
unsigned char buf[4];
|
|
|
|
buf[0] = NBSSkeepalive;
|
|
buf[1] = buf[2] = buf[3] = 0;
|
|
|
|
return(write_data(client,(char *)buf,4) == 4);
|
|
}
|
|
|
|
/*******************************************************************
|
|
Add a string to the end of a smb_buf, adjusting bcc and smb_len.
|
|
Return the bytes added
|
|
********************************************************************/
|
|
|
|
ssize_t message_push_string(uint8_t **outbuf, const char *str, int flags)
|
|
{
|
|
size_t buf_size = smb_len(*outbuf) + 4;
|
|
size_t grow_size;
|
|
size_t result = 0;
|
|
uint8_t *tmp;
|
|
NTSTATUS status;
|
|
|
|
/*
|
|
* We need to over-allocate, now knowing what srvstr_push will
|
|
* actually use. This is very generous by incorporating potential
|
|
* padding, the terminating 0 and at most 4 chars per UTF-16 code
|
|
* point.
|
|
*/
|
|
grow_size = (strlen(str) + 2) * 4;
|
|
|
|
if (!(tmp = talloc_realloc(NULL, *outbuf, uint8_t,
|
|
buf_size + grow_size))) {
|
|
DEBUG(0, ("talloc failed\n"));
|
|
return -1;
|
|
}
|
|
|
|
status = srvstr_push((char *)tmp, SVAL(tmp, smb_flg2),
|
|
tmp + buf_size, str, grow_size, flags, &result);
|
|
|
|
if (!NT_STATUS_IS_OK(status)) {
|
|
DEBUG(0, ("srvstr_push failed\n"));
|
|
return -1;
|
|
}
|
|
|
|
/*
|
|
* Ensure we clear out the extra data we have
|
|
* grown the buffer by, but not written to.
|
|
*/
|
|
if (buf_size + result < buf_size) {
|
|
return -1;
|
|
}
|
|
if (grow_size < result) {
|
|
return -1;
|
|
}
|
|
|
|
memset(tmp + buf_size + result, '\0', grow_size - result);
|
|
|
|
set_message_bcc((char *)tmp, smb_buflen(tmp) + result);
|
|
|
|
*outbuf = tmp;
|
|
|
|
return result;
|
|
}
|