1
0
mirror of https://github.com/samba-team/samba.git synced 2024-12-23 17:34:34 +03:00
samba-mirror/source3/modules/vfs_fake_acls.c
Joseph Sutton c30aa741ee s3:modules: Initialize mask_permset (CID 1435850)
If this code had ever run, sys_acl_clear_perms() would have attempted to
write to some random address in memory. ‘mask_permset’ must be a valid
non‐NULL pointer.

Commit 9b79d5f2a2 seems to have been a
previous attempt to fix this issue.

Signed-off-by: Joseph Sutton <josephsutton@catalyst.net.nz>
Reviewed-by: Andrew Bartlett <abartlet@samba.org>
2023-10-13 02:18:31 +00:00

705 lines
16 KiB
C

/*
* Fake ACLs VFS module. Implements passthrough operation of all VFS
* calls to disk functions, except for file ownership and ACLs, which
* are stored in xattrs.
*
* Copyright (C) Tim Potter, 1999-2000
* Copyright (C) Alexander Bokovoy, 2002
* Copyright (C) Andrew Bartlett, 2002,2012
*
* This program is free software; you can redistribute it and/or modify
* it under the terms of the GNU General Public License as published by
* the Free Software Foundation; either version 3 of the License, or
* (at your option) any later version.
*
* This program is distributed in the hope that it will be useful,
* but WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
* GNU General Public License for more details.
*
* You should have received a copy of the GNU General Public License
* along with this program; if not, see <http://www.gnu.org/licenses/>.
*/
#include "includes.h"
#include "smbd/smbd.h"
#include "system/filesys.h"
#include "auth.h"
#include "librpc/gen_ndr/ndr_smb_acl.h"
#undef DBGC_CLASS
#define DBGC_CLASS DBGC_VFS
#define FAKE_UID "system.fake_uid"
#define FAKE_GID "system.fake_gid"
#define FAKE_ACL_ACCESS_XATTR "system.fake_access_acl"
#define FAKE_ACL_DEFAULT_XATTR "system.fake_default_acl"
struct in_pathref_data {
bool calling_pathref_fsp;
};
static int fake_acls_fuid(vfs_handle_struct *handle,
files_struct *fsp,
uid_t *uid)
{
ssize_t size;
uint8_t uid_buf[4];
size = SMB_VFS_NEXT_FGETXATTR(handle, fsp, FAKE_UID, uid_buf, sizeof(uid_buf));
if (size == -1 && errno == ENOATTR) {
return 0;
}
if (size != 4) {
return -1;
}
*uid = IVAL(uid_buf, 0);
return 0;
}
static int fake_acls_fgid(vfs_handle_struct *handle,
files_struct *fsp,
uid_t *gid)
{
ssize_t size;
uint8_t gid_buf[4];
size = SMB_VFS_NEXT_FGETXATTR(handle, fsp, FAKE_GID, gid_buf, sizeof(gid_buf));
if (size == -1 && errno == ENOATTR) {
return 0;
}
if (size != 4) {
return -1;
}
*gid = IVAL(gid_buf, 0);
return 0;
}
static int fake_acls_stat(vfs_handle_struct *handle,
struct smb_filename *smb_fname)
{
int ret = -1;
struct in_pathref_data *prd = NULL;
struct smb_filename *smb_fname_cp = NULL;
struct files_struct *fsp = NULL;
SMB_VFS_HANDLE_GET_DATA(handle,
prd,
struct in_pathref_data,
return -1);
ret = SMB_VFS_NEXT_STAT(handle, smb_fname);
if (ret != 0) {
return ret;
}
if (smb_fname->fsp != NULL) {
fsp = metadata_fsp(smb_fname->fsp);
} else {
NTSTATUS status;
/*
* Ensure openat_pathref_fsp()
* can't recurse into fake_acls_stat().
* openat_pathref_fsp() doesn't care
* about the uid/gid values, it only
* wants a valid/invalid stat answer
* and we know smb_fname exists as
* the SMB_VFS_NEXT_STAT() returned
* zero above.
*/
if (prd->calling_pathref_fsp) {
return 0;
}
/*
* openat_pathref_fsp() expects a talloc'ed
* smb_filename. stat can be passed a struct
* from the stack. Make a talloc'ed copy
* so openat_pathref_fsp() can add its
* destructor.
*/
smb_fname_cp = cp_smb_filename(talloc_tos(),
smb_fname);
if (smb_fname_cp == NULL) {
errno = ENOMEM;
return -1;
}
/* Recursion guard. */
prd->calling_pathref_fsp = true;
status = openat_pathref_fsp(handle->conn->cwd_fsp,
smb_fname_cp);
/* End recursion guard. */
prd->calling_pathref_fsp = false;
if (!NT_STATUS_IS_OK(status)) {
/*
* Ignore errors here. We know
* the path exists (the SMB_VFS_NEXT_STAT()
* above succeeded. So being unable to
* open a pathref fsp can be due to a
* range of errors (startup path beginning
* with '/' for example, path = ".." when
* enumerating a directory. Just treat this
* the same way as the path not having the
* FAKE_UID or FAKE_GID EA's present. For the
* test purposes of this module (fake NT ACLs
* from windows clients) this is close enough.
* Just report for debugging purposes.
*/
DBG_DEBUG("Unable to get pathref fsp on %s. "
"Error %s\n",
smb_fname_str_dbg(smb_fname_cp),
nt_errstr(status));
TALLOC_FREE(smb_fname_cp);
return 0;
}
fsp = smb_fname_cp->fsp;
}
ret = fake_acls_fuid(handle,
fsp,
&smb_fname->st.st_ex_uid);
if (ret != 0) {
TALLOC_FREE(smb_fname_cp);
return ret;
}
ret = fake_acls_fgid(handle,
fsp,
&smb_fname->st.st_ex_gid);
if (ret != 0) {
TALLOC_FREE(smb_fname_cp);
return ret;
}
TALLOC_FREE(smb_fname_cp);
return ret;
}
static int fake_acls_lstat(vfs_handle_struct *handle,
struct smb_filename *smb_fname)
{
int ret = -1;
struct in_pathref_data *prd = NULL;
SMB_VFS_HANDLE_GET_DATA(handle,
prd,
struct in_pathref_data,
return -1);
ret = SMB_VFS_NEXT_LSTAT(handle, smb_fname);
if (ret == 0) {
struct smb_filename *smb_fname_base = NULL;
SMB_STRUCT_STAT sbuf = { 0 };
NTSTATUS status;
/*
* Ensure synthetic_pathref()
* can't recurse into fake_acls_lstat().
* synthetic_pathref() doesn't care
* about the uid/gid values, it only
* wants a valid/invalid stat answer
* and we know smb_fname exists as
* the SMB_VFS_NEXT_LSTAT() returned
* zero above.
*/
if (prd->calling_pathref_fsp) {
return 0;
}
/* Recursion guard. */
prd->calling_pathref_fsp = true;
status = synthetic_pathref(talloc_tos(),
handle->conn->cwd_fsp,
smb_fname->base_name,
NULL,
&sbuf,
smb_fname->twrp,
0, /* we want stat, not lstat. */
&smb_fname_base);
/* End recursion guard. */
prd->calling_pathref_fsp = false;
if (NT_STATUS_IS_OK(status)) {
/*
* This isn't quite right (calling fgetxattr not
* lgetxattr), but for the test purposes of this
* module (fake NT ACLs from windows clients), it is
* close enough. We removed the l*xattr functions
* because linux doesn't support using them, but we
* could fake them in xattr_tdb if we really wanted
* to. We ignore errors because the link might not
* point anywhere */
fake_acls_fuid(handle,
smb_fname_base->fsp,
&smb_fname->st.st_ex_uid);
fake_acls_fgid(handle,
smb_fname_base->fsp,
&smb_fname->st.st_ex_gid);
}
TALLOC_FREE(smb_fname_base);
}
return ret;
}
static int fake_acls_fstat(vfs_handle_struct *handle, files_struct *fsp, SMB_STRUCT_STAT *sbuf)
{
int ret = -1;
ret = SMB_VFS_NEXT_FSTAT(handle, fsp, sbuf);
if (ret == 0) {
ret = fake_acls_fuid(handle, fsp, &sbuf->st_ex_uid);
if (ret != 0) {
return ret;
}
ret = fake_acls_fgid(handle, fsp, &sbuf->st_ex_gid);
if (ret != 0) {
return ret;
}
}
return ret;
}
static SMB_ACL_T fake_acls_blob2acl(DATA_BLOB *blob, TALLOC_CTX *mem_ctx)
{
enum ndr_err_code ndr_err;
struct smb_acl_t *acl = talloc(mem_ctx, struct smb_acl_t);
if (!acl) {
errno = ENOMEM;
return NULL;
}
ndr_err = ndr_pull_struct_blob(blob, acl, acl,
(ndr_pull_flags_fn_t)ndr_pull_smb_acl_t);
if (!NDR_ERR_CODE_IS_SUCCESS(ndr_err)) {
DEBUG(0, ("ndr_pull_acl_t failed: %s\n",
ndr_errstr(ndr_err)));
TALLOC_FREE(acl);
return NULL;
}
return acl;
}
static DATA_BLOB fake_acls_acl2blob(TALLOC_CTX *mem_ctx, SMB_ACL_T acl)
{
enum ndr_err_code ndr_err;
DATA_BLOB blob;
ndr_err = ndr_push_struct_blob(&blob, mem_ctx, acl,
(ndr_push_flags_fn_t)ndr_push_smb_acl_t);
if (!NDR_ERR_CODE_IS_SUCCESS(ndr_err)) {
DEBUG(0, ("ndr_push_acl_t failed: %s\n",
ndr_errstr(ndr_err)));
return data_blob_null;
}
return blob;
}
static SMB_ACL_T fake_acls_sys_acl_get_fd(struct vfs_handle_struct *handle,
files_struct *fsp,
SMB_ACL_TYPE_T type,
TALLOC_CTX *mem_ctx)
{
DATA_BLOB blob = data_blob_null;
ssize_t length;
const char *name = NULL;
struct smb_acl_t *acl = NULL;
TALLOC_CTX *frame = talloc_stackframe();
switch (type) {
case SMB_ACL_TYPE_ACCESS:
name = FAKE_ACL_ACCESS_XATTR;
break;
case SMB_ACL_TYPE_DEFAULT:
name = FAKE_ACL_DEFAULT_XATTR;
break;
default:
DBG_ERR("Illegal ACL type %d\n", (int)type);
break;
}
if (name == NULL) {
TALLOC_FREE(frame);
return NULL;
}
do {
blob.length += 1000;
blob.data = talloc_realloc(frame, blob.data, uint8_t, blob.length);
if (!blob.data) {
errno = ENOMEM;
TALLOC_FREE(frame);
return NULL;
}
length = SMB_VFS_NEXT_FGETXATTR(handle, fsp, name, blob.data, blob.length);
blob.length = length;
} while (length == -1 && errno == ERANGE);
if (length == -1 && errno == ENOATTR) {
TALLOC_FREE(frame);
return NULL;
}
if (length != -1) {
acl = fake_acls_blob2acl(&blob, mem_ctx);
}
TALLOC_FREE(frame);
return acl;
}
static int fake_acls_sys_acl_set_fd(vfs_handle_struct *handle,
struct files_struct *fsp,
SMB_ACL_TYPE_T type,
SMB_ACL_T theacl)
{
int ret;
const char *name = NULL;
TALLOC_CTX *frame = talloc_stackframe();
DATA_BLOB blob = fake_acls_acl2blob(frame, theacl);
if (!blob.data) {
DEBUG(0, ("Failed to convert ACL to linear blob for xattr storage\n"));
TALLOC_FREE(frame);
errno = EINVAL;
return -1;
}
switch (type) {
case SMB_ACL_TYPE_ACCESS:
name = FAKE_ACL_ACCESS_XATTR;
break;
case SMB_ACL_TYPE_DEFAULT:
name = FAKE_ACL_DEFAULT_XATTR;
break;
default:
errno = EINVAL;
return -1;
}
ret = SMB_VFS_NEXT_FSETXATTR(handle, fsp, name, blob.data, blob.length, 0);
TALLOC_FREE(frame);
return ret;
}
static int fake_acls_sys_acl_delete_def_fd(vfs_handle_struct *handle,
struct files_struct *fsp)
{
int ret;
const char *name = FAKE_ACL_DEFAULT_XATTR;
if (!fsp->fsp_flags.is_directory) {
errno = EINVAL;
return -1;
}
ret = SMB_VFS_NEXT_FREMOVEXATTR(handle, fsp, name);
if (ret == -1 && errno == ENOATTR) {
ret = 0;
errno = 0;
}
return ret;
}
static int fake_acls_lchown(vfs_handle_struct *handle,
const struct smb_filename *smb_fname,
uid_t uid,
gid_t gid)
{
int ret;
uint8_t id_buf[4];
if (uid != -1) {
uid_t current_uid = get_current_uid(handle->conn);
if (current_uid != 0 && current_uid != uid) {
return EACCES;
}
/* This isn't quite right (calling setxattr not
* lsetxattr), but for the test purposes of this
* module (fake NT ACLs from windows clients), it is
* close enough. We removed the l*xattr functions
* because linux doesn't support using them, but we
* could fake them in xattr_tdb if we really wanted
* to.
*/
SIVAL(id_buf, 0, uid);
ret = SMB_VFS_NEXT_FSETXATTR(handle,
smb_fname->fsp,
FAKE_UID,
id_buf,
sizeof(id_buf),
0);
if (ret != 0) {
return ret;
}
}
if (gid != -1) {
SIVAL(id_buf, 0, gid);
ret = SMB_VFS_NEXT_FSETXATTR(handle,
smb_fname->fsp,
FAKE_GID,
id_buf,
sizeof(id_buf),
0);
if (ret != 0) {
return ret;
}
}
return 0;
}
static int fake_acls_fchown(vfs_handle_struct *handle, files_struct *fsp, uid_t uid, gid_t gid)
{
int ret;
uint8_t id_buf[4];
if (uid != -1) {
uid_t current_uid = get_current_uid(handle->conn);
if (current_uid != 0 && current_uid != uid) {
return EACCES;
}
SIVAL(id_buf, 0, uid);
ret = SMB_VFS_NEXT_FSETXATTR(handle, fsp, FAKE_UID, id_buf, sizeof(id_buf), 0);
if (ret != 0) {
return ret;
}
}
if (gid != -1) {
SIVAL(id_buf, 0, gid);
ret = SMB_VFS_NEXT_FSETXATTR(handle, fsp, FAKE_GID, id_buf, sizeof(id_buf), 0);
if (ret != 0) {
return ret;
}
}
return 0;
}
/*
* Implement the chmod uid/mask/other mode changes on a fake ACL.
*/
static int fake_acl_process_chmod(SMB_ACL_T *pp_the_acl,
uid_t owner,
mode_t mode)
{
bool got_mask = false;
int entry_id = SMB_ACL_FIRST_ENTRY;
mode_t umode = 0;
mode_t mmode = 0;
mode_t omode = 0;
int ret = -1;
SMB_ACL_T the_acl = *pp_the_acl;
/* Split the mode into u/mask/other masks. */
umode = unix_perms_to_acl_perms(mode, S_IRUSR, S_IWUSR, S_IXUSR);
mmode = unix_perms_to_acl_perms(mode, S_IRGRP, S_IWGRP, S_IXGRP);
omode = unix_perms_to_acl_perms(mode, S_IROTH, S_IWOTH, S_IXOTH);
while (1) {
SMB_ACL_ENTRY_T entry;
SMB_ACL_TAG_T tagtype;
SMB_ACL_PERMSET_T permset;
uid_t *puid = NULL;
ret = sys_acl_get_entry(the_acl,
entry_id,
&entry);
if (ret == 0) {
/* End of ACL */
break;
}
if (ret == -1) {
return -1;
}
ret = sys_acl_get_tag_type(entry, &tagtype);
if (ret == -1) {
return -1;
}
ret = sys_acl_get_permset(entry, &permset);
if (ret == -1) {
return -1;
}
switch (tagtype) {
case SMB_ACL_USER_OBJ:
ret = map_acl_perms_to_permset(umode, &permset);
if (ret == -1) {
return -1;
}
break;
case SMB_ACL_USER:
puid = (uid_t *)sys_acl_get_qualifier(entry);
if (puid == NULL) {
return -1;
}
if (owner != *puid) {
break;
}
ret = map_acl_perms_to_permset(umode, &permset);
if (ret == -1) {
return -1;
}
break;
case SMB_ACL_GROUP_OBJ:
case SMB_ACL_GROUP:
/* Ignore all group entries. */
break;
case SMB_ACL_MASK:
ret = map_acl_perms_to_permset(mmode, &permset);
if (ret == -1) {
return -1;
}
got_mask = true;
break;
case SMB_ACL_OTHER:
ret = map_acl_perms_to_permset(omode, &permset);
if (ret == -1) {
return -1;
}
break;
default:
errno = EINVAL;
return -1;
}
ret = sys_acl_set_permset(entry, permset);
if (ret == -1) {
return -1;
}
/* Move to next entry. */
entry_id = SMB_ACL_NEXT_ENTRY;
}
/*
* If we didn't see a mask entry, add one.
*/
if (!got_mask) {
SMB_ACL_ENTRY_T mask_entry;
uint32_t mask_perm = 0;
SMB_ACL_PERMSET_T mask_permset = &mask_perm;
ret = sys_acl_create_entry(&the_acl, &mask_entry);
if (ret == -1) {
return -1;
}
ret = map_acl_perms_to_permset(mmode, &mask_permset);
if (ret == -1) {
return -1;
}
ret = sys_acl_set_permset(mask_entry, mask_permset);
if (ret == -1) {
return -1;
}
ret = sys_acl_set_tag_type(mask_entry, SMB_ACL_MASK);
if (ret == -1) {
return -1;
}
/* In case we were realloced and moved. */
*pp_the_acl = the_acl;
}
return 0;
}
static int fake_acls_fchmod(vfs_handle_struct *handle,
files_struct *fsp,
mode_t mode)
{
TALLOC_CTX *frame = talloc_stackframe();
int ret = -1;
SMB_ACL_T the_acl = NULL;
/*
* Passthrough first to preserve the
* S_ISUID | S_ISGID | S_ISVTX
* bits.
*/
ret = SMB_VFS_NEXT_FCHMOD(handle,
fsp,
mode);
if (ret == -1) {
TALLOC_FREE(frame);
return -1;
}
the_acl = fake_acls_sys_acl_get_fd(handle,
fsp,
SMB_ACL_TYPE_ACCESS,
talloc_tos());
if (the_acl == NULL) {
TALLOC_FREE(frame);
if (errno == ENOATTR) {
/* No ACL on this file. Just passthrough. */
return 0;
}
return -1;
}
ret = fake_acl_process_chmod(&the_acl,
fsp->fsp_name->st.st_ex_uid,
mode);
if (ret == -1) {
TALLOC_FREE(frame);
return -1;
}
ret = fake_acls_sys_acl_set_fd(handle,
fsp,
SMB_ACL_TYPE_ACCESS,
the_acl);
TALLOC_FREE(frame);
return ret;
}
static int fake_acls_connect(struct vfs_handle_struct *handle,
const char *service,
const char *user)
{
struct in_pathref_data *prd = NULL;
int ret;
ret = SMB_VFS_NEXT_CONNECT(handle, service, user);
if (ret < 0) {
return ret;
}
/*
* Create a struct can tell us if we're recursing
* into openat_pathref_fsp() in this module. This will
* go away once we have SMB_VFS_STATX() and we will
* have a way for a caller to as for specific stat
* fields in a granular way. Then we will know exactly
* what fields the caller wants, so we won't have to
* fill in everything.
*/
prd = talloc_zero(handle->conn, struct in_pathref_data);
if (prd == NULL) {
return -1;
}
SMB_VFS_HANDLE_SET_DATA(handle,
prd,
NULL,
struct in_pathref_data,
return -1);
return 0;
}
static struct vfs_fn_pointers vfs_fake_acls_fns = {
.connect_fn = fake_acls_connect,
.stat_fn = fake_acls_stat,
.lstat_fn = fake_acls_lstat,
.fstat_fn = fake_acls_fstat,
.fchmod_fn = fake_acls_fchmod,
.sys_acl_get_fd_fn = fake_acls_sys_acl_get_fd,
.sys_acl_blob_get_fd_fn = posix_sys_acl_blob_get_fd,
.sys_acl_set_fd_fn = fake_acls_sys_acl_set_fd,
.sys_acl_delete_def_fd_fn = fake_acls_sys_acl_delete_def_fd,
.lchown_fn = fake_acls_lchown,
.fchown_fn = fake_acls_fchown,
};
static_decl_vfs;
NTSTATUS vfs_fake_acls_init(TALLOC_CTX *ctx)
{
return smb_register_vfs(SMB_VFS_INTERFACE_VERSION, "fake_acls",
&vfs_fake_acls_fns);
}