1
0
mirror of https://github.com/samba-team/samba.git synced 2024-12-25 23:21:54 +03:00
samba-mirror/source3/smbd/smb2_ioctl_filesys.c
Volker Lendecke c2d5fdb629 smbd: Use check_access_fsp where appropriate
Signed-off-by: Volker Lendecke <vl@samba.org>
Reviewed-by: Jeremy Allison <jra@samba.org>
2015-11-17 19:53:24 +01:00

516 lines
14 KiB
C

/*
Unix SMB/CIFS implementation.
Core SMB2 server
Copyright (C) Stefan Metzmacher 2009
Copyright (C) David Disseldorp 2013-2015
This program is free software; you can redistribute it and/or modify
it under the terms of the GNU General Public License as published by
the Free Software Foundation; either version 3 of the License, or
(at your option) any later version.
This program is distributed in the hope that it will be useful,
but WITHOUT ANY WARRANTY; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
GNU General Public License for more details.
You should have received a copy of the GNU General Public License
along with this program. If not, see <http://www.gnu.org/licenses/>.
*/
#include "includes.h"
#include "smbd/smbd.h"
#include "smbd/globals.h"
#include "../libcli/smb/smb_common.h"
#include "../libcli/security/security.h"
#include "../lib/util/tevent_ntstatus.h"
#include "rpc_server/srv_pipe_hnd.h"
#include "include/ntioctl.h"
#include "../librpc/ndr/libndr.h"
#include "librpc/gen_ndr/ndr_ioctl.h"
#include "smb2_ioctl_private.h"
static NTSTATUS fsctl_get_cmprn(TALLOC_CTX *mem_ctx,
struct tevent_context *ev,
struct files_struct *fsp,
size_t in_max_output,
DATA_BLOB *out_output)
{
struct compression_state cmpr_state;
enum ndr_err_code ndr_ret;
DATA_BLOB output;
NTSTATUS status;
if (fsp == NULL) {
return NT_STATUS_FILE_CLOSED;
}
/* Windows doesn't check for SEC_FILE_READ_ATTRIBUTE permission here */
if ((fsp->conn->fs_capabilities & FILE_FILE_COMPRESSION) == 0) {
DEBUG(4, ("FS does not advertise compression support\n"));
return NT_STATUS_NOT_SUPPORTED;
}
ZERO_STRUCT(cmpr_state);
status = SMB_VFS_GET_COMPRESSION(fsp->conn,
mem_ctx,
fsp,
NULL,
&cmpr_state.format);
if (!NT_STATUS_IS_OK(status)) {
return status;
}
ndr_ret = ndr_push_struct_blob(&output, mem_ctx,
&cmpr_state,
(ndr_push_flags_fn_t)ndr_push_compression_state);
if (ndr_ret != NDR_ERR_SUCCESS) {
return NT_STATUS_INTERNAL_ERROR;
}
if (in_max_output < output.length) {
DEBUG(1, ("max output %u too small for compression state %ld\n",
(unsigned int)in_max_output, (long int)output.length));
return NT_STATUS_INVALID_USER_BUFFER;
}
*out_output = output;
return NT_STATUS_OK;
}
static NTSTATUS fsctl_set_cmprn(TALLOC_CTX *mem_ctx,
struct tevent_context *ev,
struct files_struct *fsp,
DATA_BLOB *in_input)
{
struct compression_state cmpr_state;
enum ndr_err_code ndr_ret;
NTSTATUS status;
if (fsp == NULL) {
return NT_STATUS_FILE_CLOSED;
}
/* WRITE_DATA permission is required, WRITE_ATTRIBUTES is not */
status = check_access_fsp(fsp, FILE_WRITE_DATA);
if (!NT_STATUS_IS_OK(status)) {
return status;
}
if ((fsp->conn->fs_capabilities & FILE_FILE_COMPRESSION) == 0) {
DEBUG(4, ("FS does not advertise compression support\n"));
return NT_STATUS_NOT_SUPPORTED;
}
ndr_ret = ndr_pull_struct_blob(in_input, mem_ctx, &cmpr_state,
(ndr_pull_flags_fn_t)ndr_pull_compression_state);
if (ndr_ret != NDR_ERR_SUCCESS) {
DEBUG(0, ("failed to unmarshall set compression req\n"));
return NT_STATUS_INVALID_PARAMETER;
}
status = SMB_VFS_SET_COMPRESSION(fsp->conn,
mem_ctx,
fsp,
cmpr_state.format);
if (!NT_STATUS_IS_OK(status)) {
return status;
}
return NT_STATUS_OK;
}
static NTSTATUS fsctl_zero_data(TALLOC_CTX *mem_ctx,
struct tevent_context *ev,
struct files_struct *fsp,
DATA_BLOB *in_input)
{
struct file_zero_data_info zdata_info;
enum ndr_err_code ndr_ret;
struct lock_struct lck;
int mode;
uint64_t len;
int ret;
NTSTATUS status;
if (fsp == NULL) {
return NT_STATUS_FILE_CLOSED;
}
/* WRITE_DATA permission is required */
status = check_access_fsp(fsp, FILE_WRITE_DATA);
if (!NT_STATUS_IS_OK(status)) {
return status;
}
/* allow regardless of whether FS supports sparse or not */
ndr_ret = ndr_pull_struct_blob(in_input, mem_ctx, &zdata_info,
(ndr_pull_flags_fn_t)ndr_pull_file_zero_data_info);
if (ndr_ret != NDR_ERR_SUCCESS) {
DEBUG(0, ("failed to unmarshall zero data request\n"));
return NT_STATUS_INVALID_PARAMETER;
}
if (zdata_info.beyond_final_zero < zdata_info.file_off) {
DEBUG(0, ("invalid zero data params: off %lu, bfz, %lu\n",
(unsigned long)zdata_info.file_off,
(unsigned long)zdata_info.beyond_final_zero));
return NT_STATUS_INVALID_PARAMETER;
}
/* convert strange "beyond final zero" param into length */
len = zdata_info.beyond_final_zero - zdata_info.file_off;
if (len == 0) {
DEBUG(2, ("zero data called with zero length range\n"));
return NT_STATUS_OK;
}
init_strict_lock_struct(fsp,
fsp->op->global->open_persistent_id,
zdata_info.file_off,
len,
WRITE_LOCK,
&lck);
if (!SMB_VFS_STRICT_LOCK(fsp->conn, fsp, &lck)) {
DEBUG(2, ("failed to lock range for zero-data\n"));
return NT_STATUS_FILE_LOCK_CONFLICT;
}
/*
* MS-FSCC <58> Section 2.3.65
* This FSCTL sets the range of bytes to zero (0) without extending the
* file size.
*
* The VFS_FALLOCATE_FL_KEEP_SIZE flag is used to satisfy this
* constraint.
*/
mode = VFS_FALLOCATE_FL_PUNCH_HOLE | VFS_FALLOCATE_FL_KEEP_SIZE;
ret = SMB_VFS_FALLOCATE(fsp, mode, zdata_info.file_off, len);
if (ret == -1) {
status = map_nt_error_from_unix_common(errno);
DEBUG(2, ("zero-data fallocate(0x%x) failed: %s\n", mode,
strerror(errno)));
SMB_VFS_STRICT_UNLOCK(fsp->conn, fsp, &lck);
return status;
}
if (!fsp->is_sparse && lp_strict_allocate(SNUM(fsp->conn))) {
/*
* File marked non-sparse and "strict allocate" is enabled -
* allocate the range that we just punched out.
* In future FALLOC_FL_ZERO_RANGE could be used exclusively for
* this, but it's currently only supported on XFS and ext4.
*
* The newly allocated range still won't be found by SEEK_DATA
* for QAR, but stat.st_blocks will reflect it.
*/
ret = SMB_VFS_FALLOCATE(fsp, VFS_FALLOCATE_FL_KEEP_SIZE,
zdata_info.file_off, len);
if (ret == -1) {
status = map_nt_error_from_unix_common(errno);
DEBUG(0, ("fallocate failed: %s\n", strerror(errno)));
SMB_VFS_STRICT_UNLOCK(fsp->conn, fsp, &lck);
return status;
}
}
SMB_VFS_STRICT_UNLOCK(fsp->conn, fsp, &lck);
return NT_STATUS_OK;
}
static NTSTATUS fsctl_qar_buf_push(TALLOC_CTX *mem_ctx,
struct file_alloced_range_buf *qar_buf,
DATA_BLOB *qar_array_blob)
{
DATA_BLOB new_slot;
enum ndr_err_code ndr_ret;
bool ok;
ndr_ret = ndr_push_struct_blob(&new_slot, mem_ctx, qar_buf,
(ndr_push_flags_fn_t)ndr_push_file_alloced_range_buf);
if (ndr_ret != NDR_ERR_SUCCESS) {
DEBUG(0, ("failed to marshall QAR buf\n"));
return NT_STATUS_INVALID_PARAMETER;
}
/* TODO should be able to avoid copy by pushing into prealloced buf */
ok = data_blob_append(mem_ctx, qar_array_blob, new_slot.data,
new_slot.length);
data_blob_free(&new_slot);
if (!ok) {
return NT_STATUS_NO_MEMORY;
}
return NT_STATUS_OK;
}
static NTSTATUS fsctl_qar_seek_fill(TALLOC_CTX *mem_ctx,
struct files_struct *fsp,
off_t curr_off,
off_t max_off,
DATA_BLOB *qar_array_blob)
{
NTSTATUS status = NT_STATUS_NOT_SUPPORTED;
#ifdef HAVE_LSEEK_HOLE_DATA
while (curr_off <= max_off) {
off_t data_off;
off_t hole_off;
struct file_alloced_range_buf qar_buf;
/* seek next data */
data_off = SMB_VFS_LSEEK(fsp, curr_off, SEEK_DATA);
if ((data_off == -1) && (errno == ENXIO)) {
/* no data from curr_off to EOF */
break;
} else if (data_off == -1) {
status = map_nt_error_from_unix_common(errno);
DEBUG(1, ("lseek data failed: %s\n", strerror(errno)));
return status;
}
if (data_off > max_off) {
/* found something, but passed range of interest */
break;
}
hole_off = SMB_VFS_LSEEK(fsp, data_off, SEEK_HOLE);
if (hole_off == -1) {
status = map_nt_error_from_unix_common(errno);
DEBUG(1, ("lseek hole failed: %s\n", strerror(errno)));
return status;
}
if (hole_off <= data_off) {
DEBUG(1, ("lseek inconsistent: hole %lu at or before "
"data %lu\n", (unsigned long)hole_off,
(unsigned long)data_off));
return NT_STATUS_INTERNAL_ERROR;
}
qar_buf.file_off = data_off;
/* + 1 to convert maximum offset to length */
qar_buf.len = MIN(hole_off, max_off + 1) - data_off;
status = fsctl_qar_buf_push(mem_ctx, &qar_buf, qar_array_blob);
if (!NT_STATUS_IS_OK(status)) {
return NT_STATUS_NO_MEMORY;
}
curr_off = hole_off;
}
status = NT_STATUS_OK;
#endif
return status;
}
static NTSTATUS fsctl_qar(TALLOC_CTX *mem_ctx,
struct tevent_context *ev,
struct files_struct *fsp,
DATA_BLOB *in_input,
size_t in_max_output,
DATA_BLOB *out_output)
{
struct fsctl_query_alloced_ranges_req qar_req;
struct fsctl_query_alloced_ranges_rsp qar_rsp;
DATA_BLOB qar_array_blob = data_blob_null;
uint64_t max_off;
enum ndr_err_code ndr_ret;
int ret;
NTSTATUS status;
SMB_STRUCT_STAT sbuf;
if (fsp == NULL) {
return NT_STATUS_FILE_CLOSED;
}
/* READ_DATA permission is required */
status = check_access_fsp(fsp, FILE_READ_DATA);
if (!NT_STATUS_IS_OK(status)) {
return status;
}
ndr_ret = ndr_pull_struct_blob(in_input, mem_ctx, &qar_req,
(ndr_pull_flags_fn_t)ndr_pull_fsctl_query_alloced_ranges_req);
if (ndr_ret != NDR_ERR_SUCCESS) {
DEBUG(0, ("failed to unmarshall QAR req\n"));
return NT_STATUS_INVALID_PARAMETER;
}
/*
* XXX Windows Server 2008 & 2012 servers don't return lock-conflict
* for QAR requests over an exclusively locked range!
*/
ret = SMB_VFS_FSTAT(fsp, &sbuf);
if (ret == -1) {
status = map_nt_error_from_unix_common(errno);
DEBUG(2, ("fstat failed: %s\n", strerror(errno)));
return status;
}
if ((qar_req.buf.len == 0)
|| (sbuf.st_ex_size == 0)
|| (qar_req.buf.file_off >= sbuf.st_ex_size)) {
/* zero length range or after EOF, no ranges to return */
return NT_STATUS_OK;
}
/* check for integer overflow */
if (qar_req.buf.file_off + qar_req.buf.len < qar_req.buf.file_off) {
return NT_STATUS_INVALID_PARAMETER;
}
/*
* Maximum offset is either the last valid offset _before_ EOF, or the
* last byte offset within the requested range. -1 converts length to
* offset, which is easier to work with for SEEK_DATA/SEEK_HOLE, E.g.:
*
* /off=0 /off=512K /st_ex_size=1M
* |-------------------------------------|
* | File data |
* |-------------------------------------|
* QAR end\
* |=====================================|
* | QAR off=512K, len=1M |
* |=================^===================|
* max_off=1M - 1
* QAR end\
* |==================|
* |QAR off=0 len=512K|
* |==================|
* ^
* max_off=512K - 1
*/
max_off = MIN(sbuf.st_ex_size,
qar_req.buf.file_off + qar_req.buf.len) - 1;
if (!fsp->is_sparse) {
struct file_alloced_range_buf qar_buf;
/* file is non-sparse, claim file_off->max_off is allocated */
qar_buf.file_off = qar_req.buf.file_off;
/* + 1 to convert maximum offset back to length */
qar_buf.len = max_off - qar_req.buf.file_off + 1;
status = fsctl_qar_buf_push(mem_ctx, &qar_buf, &qar_array_blob);
} else {
status = fsctl_qar_seek_fill(mem_ctx, fsp, qar_req.buf.file_off,
max_off, &qar_array_blob);
}
if (!NT_STATUS_IS_OK(status)) {
return status;
}
/* marshall response buffer. */
qar_rsp.far_buf_array = qar_array_blob;
ndr_ret = ndr_push_struct_blob(out_output, mem_ctx, &qar_rsp,
(ndr_push_flags_fn_t)ndr_push_fsctl_query_alloced_ranges_rsp);
if (ndr_ret != NDR_ERR_SUCCESS) {
DEBUG(0, ("failed to marshall QAR rsp\n"));
return NT_STATUS_INVALID_PARAMETER;
}
if (out_output->length > in_max_output) {
DEBUG(2, ("QAR output len %lu exceeds max %lu\n",
(unsigned long)out_output->length,
(unsigned long)in_max_output));
data_blob_free(out_output);
return NT_STATUS_BUFFER_TOO_SMALL;
}
return NT_STATUS_OK;
}
struct tevent_req *smb2_ioctl_filesys(uint32_t ctl_code,
struct tevent_context *ev,
struct tevent_req *req,
struct smbd_smb2_ioctl_state *state)
{
NTSTATUS status;
switch (ctl_code) {
case FSCTL_GET_COMPRESSION:
status = fsctl_get_cmprn(state, ev, state->fsp,
state->in_max_output,
&state->out_output);
if (!tevent_req_nterror(req, status)) {
tevent_req_done(req);
}
return tevent_req_post(req, ev);
break;
case FSCTL_SET_COMPRESSION:
status = fsctl_set_cmprn(state, ev, state->fsp,
&state->in_input);
if (!tevent_req_nterror(req, status)) {
tevent_req_done(req);
}
return tevent_req_post(req, ev);
break;
case FSCTL_SET_ZERO_DATA:
status = fsctl_zero_data(state, ev, state->fsp,
&state->in_input);
if (!tevent_req_nterror(req, status)) {
tevent_req_done(req);
}
return tevent_req_post(req, ev);
break;
case FSCTL_QUERY_ALLOCATED_RANGES:
status = fsctl_qar(state, ev, state->fsp,
&state->in_input,
state->in_max_output,
&state->out_output);
if (!tevent_req_nterror(req, status)) {
tevent_req_done(req);
}
return tevent_req_post(req, ev);
break;
default: {
uint8_t *out_data = NULL;
uint32_t out_data_len = 0;
if (state->fsp == NULL) {
status = NT_STATUS_NOT_SUPPORTED;
} else {
status = SMB_VFS_FSCTL(state->fsp,
state,
ctl_code,
state->smbreq->flags2,
state->in_input.data,
state->in_input.length,
&out_data,
state->in_max_output,
&out_data_len);
state->out_output = data_blob_const(out_data, out_data_len);
if (NT_STATUS_IS_OK(status)) {
tevent_req_done(req);
return tevent_req_post(req, ev);
}
}
if (NT_STATUS_EQUAL(status, NT_STATUS_NOT_SUPPORTED)) {
if (IS_IPC(state->smbreq->conn)) {
status = NT_STATUS_FS_DRIVER_REQUIRED;
} else {
status = NT_STATUS_INVALID_DEVICE_REQUEST;
}
}
tevent_req_nterror(req, status);
return tevent_req_post(req, ev);
break;
}
}
tevent_req_nterror(req, NT_STATUS_INTERNAL_ERROR);
return tevent_req_post(req, ev);
}