1
0
mirror of https://github.com/samba-team/samba.git synced 2024-12-23 17:34:34 +03:00
samba-mirror/source3/rpc_server/srvsvc/srv_srvsvc_nt.c
Volker Lendecke 8cfc6ea923 Revert "rpc_server:srvsvc - retrieve share ACL via root context"
This reverts commit 80c0b41689.

With the previous patch it is no longer required. We open
share_info.tdb as root when starting up rpcd_classic and keep it open.

Commit 80c0b41689 only fixed the
problem in one place, but we had it in a lot more places...

Bug: https://bugzilla.samba.org/show_bug.cgi?id=15265
Signed-off-by: Volker Lendecke <vl@samba.org>
Reviewed-by: Stefan Metzmacher <metze@samba.org>

Autobuild-User(master): Stefan Metzmacher <metze@samba.org>
Autobuild-Date(master): Wed Dec 20 11:20:51 UTC 2023 on atb-devel-224
2023-12-20 11:20:51 +00:00

3203 lines
85 KiB
C

/*
* Unix SMB/CIFS implementation.
* RPC Pipe client / server routines
* Copyright (C) Andrew Tridgell 1992-1997,
* Copyright (C) Jeremy Allison 2001.
* Copyright (C) Nigel Williams 2001.
* Copyright (C) Gerald (Jerry) Carter 2006.
* Copyright (C) Guenther Deschner 2008.
*
* This program is free software; you can redistribute it and/or modify
* it under the terms of the GNU General Public License as published by
* the Free Software Foundation; either version 3 of the License, or
* (at your option) any later version.
*
* This program is distributed in the hope that it will be useful,
* but WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
* GNU General Public License for more details.
*
* You should have received a copy of the GNU General Public License
* along with this program; if not, see <http://www.gnu.org/licenses/>.
*/
/* This is the implementation of the srvsvc pipe. */
#include "includes.h"
#include "system/passwd.h"
#include "lib/util/server_id.h"
#include "ntdomain.h"
#include "librpc/rpc/dcesrv_core.h"
#include "librpc/gen_ndr/ndr_srvsvc.h"
#include "librpc/gen_ndr/ndr_srvsvc_scompat.h"
#include "../libcli/security/security.h"
#include "../librpc/gen_ndr/ndr_security.h"
#include "../librpc/gen_ndr/open_files.h"
#include "dbwrap/dbwrap.h"
#include "session.h"
#include "../lib/util/util_pw.h"
#include "locking/share_mode_lock.h"
#include "smbd/smbd.h"
#include "smbd/globals.h"
#include "auth.h"
#include "messages.h"
#include "serverid.h"
#include "lib/global_contexts.h"
#include "source3/lib/substitute.h"
#include "lib/tsocket/tsocket.h"
#include "librpc/rpc/dcesrv_core.h"
extern const struct generic_mapping file_generic_mapping;
#undef DBGC_CLASS
#define DBGC_CLASS DBGC_RPC_SRV
#define MAX_SERVER_DISK_ENTRIES 15
/* Use for enumerating connections, pipes, & files */
struct file_enum_count {
TALLOC_CTX *ctx;
const char *username;
struct srvsvc_NetFileCtr3 *ctr3;
struct file_id *fids;
};
struct sess_file_info {
struct srvsvc_NetSessCtr1 *ctr;
struct sessionid *session_list;
uint32_t resume_handle;
uint32_t num_entries;
};
struct share_file_stat {
struct srvsvc_NetConnInfo1 *netconn_arr;
struct server_id *svrid_arr;
const char *in_sharepath;
uint32_t resp_entries;
uint32_t total_entries;
};
struct share_conn_stat {
TALLOC_CTX *ctx;
const char *sharename;
struct server_id *svrid_arr;
int count;
};
/*******************************************************************
********************************************************************/
static int enum_file_fn(struct file_id id,
const struct share_mode_data *d,
const struct share_mode_entry *e,
void *private_data)
{
struct file_enum_count *fenum =
(struct file_enum_count *)private_data;
struct srvsvc_NetFileCtr3 *ctr3 = fenum->ctr3;
struct srvsvc_NetFileInfo3 *f;
struct file_id *fids = NULL;
char *fullpath = NULL;
uint32_t permissions;
const char *username;
/* If the pid was not found delete the entry from connections.tdb */
if ( !process_exists(e->pid) ) {
return 0;
}
username = uidtoname(e->uid);
if ((fenum->username != NULL)
&& !strequal(username, fenum->username)) {
return 0;
}
f = talloc_realloc(
fenum->ctx,
ctr3->array,
struct srvsvc_NetFileInfo3,
ctr3->count+1);
if ( !f ) {
DBG_ERR("realloc failed for %"PRIu32" items\n", ctr3->count+1);
return 0;
}
ctr3->array = f;
fids = talloc_realloc(
fenum->ctx, fenum->fids, struct file_id, ctr3->count+1);
if (fids == NULL) {
DBG_ERR("realloc failed for %"PRIu32" items\n", ctr3->count+1);
return 0;
}
fids[ctr3->count] = id;
fenum->fids = fids;
if ( strcmp(d->base_name, "." ) == 0 ) {
fullpath = talloc_asprintf(
fenum->ctx,
"C:%s",
d->servicepath);
} else {
fullpath = talloc_asprintf(
fenum->ctx,
"C:%s/%s%s",
d->servicepath,
d->base_name,
(d->stream_name != NULL) ? d->stream_name : "");
}
if (!fullpath) {
return 0;
}
string_replace( fullpath, '/', '\\' );
/* mask out create (what ever that is) */
permissions = e->access_mask & (FILE_READ_DATA|FILE_WRITE_DATA);
/* now fill in the srvsvc_NetFileInfo3 struct */
ctr3->array[ctr3->count] = (struct srvsvc_NetFileInfo3) {
.fid = (((uint32_t)(procid_to_pid(&e->pid))<<16) |
e->share_file_id),
.permissions = permissions,
.path = fullpath,
.user = username,
};
ctr3->count++;
return 0;
}
/*******************************************************************
********************************************************************/
static WERROR net_enum_files(TALLOC_CTX *ctx,
const char *username,
struct srvsvc_NetFileCtr3 **ctr3,
uint32_t resume)
{
struct file_enum_count f_enum_cnt = {
.ctx = ctx, .username = username, .ctr3 = *ctr3,
};
uint32_t i;
share_entry_forall(enum_file_fn, (void *)&f_enum_cnt );
*ctr3 = f_enum_cnt.ctr3;
/* need to count the number of locks on a file */
for (i=0; i<(*ctr3)->count; i++) {
struct files_struct fsp = { .file_id = f_enum_cnt.fids[i], };
struct byte_range_lock *brl = NULL;
brl = brl_get_locks(ctx, &fsp);
if (brl == NULL) {
continue;
}
(*ctr3)->array[i].num_locks = brl_num_locks(brl);
TALLOC_FREE(brl);
}
return WERR_OK;
}
/*******************************************************************
Utility function to get the 'type' of a share from an snum.
********************************************************************/
static enum srvsvc_ShareType get_share_type(int snum)
{
/* work out the share type */
enum srvsvc_ShareType type = STYPE_DISKTREE;
if (lp_printable(snum)) {
type = lp_administrative_share(snum)
? STYPE_PRINTQ_HIDDEN : STYPE_PRINTQ;
}
if (strequal(lp_fstype(snum), "IPC")) {
type = lp_administrative_share(snum)
? STYPE_IPC_HIDDEN : STYPE_IPC;
}
return type;
}
/*******************************************************************
Fill in a share info level 0 structure.
********************************************************************/
static void init_srv_share_info_0(struct pipes_struct *p,
struct srvsvc_NetShareInfo0 *r, int snum)
{
const struct loadparm_substitution *lp_sub =
loadparm_s3_global_substitution();
r->name = lp_servicename(talloc_tos(), lp_sub, snum);
}
/*******************************************************************
Fill in a share info level 1 structure.
********************************************************************/
static void init_srv_share_info_1(struct pipes_struct *p,
struct srvsvc_NetShareInfo1 *r,
int snum)
{
struct dcesrv_call_state *dce_call = p->dce_call;
struct auth_session_info *session_info =
dcesrv_call_session_info(dce_call);
const struct loadparm_substitution *lp_sub =
loadparm_s3_global_substitution();
char *net_name = lp_servicename(talloc_tos(), lp_sub, snum);
char *remark = lp_comment(p->mem_ctx, lp_sub, snum);
if (remark) {
remark = talloc_sub_full(
p->mem_ctx, lp_servicename(talloc_tos(), lp_sub, snum),
get_current_username(), lp_path(talloc_tos(), lp_sub, snum),
session_info->unix_token->uid, get_current_username(),
"", remark);
}
r->name = net_name;
r->type = get_share_type(snum);
r->comment = remark ? remark : "";
}
/*******************************************************************
Fill in a share info level 2 structure.
********************************************************************/
static void init_srv_share_info_2(struct pipes_struct *p,
struct srvsvc_NetShareInfo2 *r,
int snum)
{
struct dcesrv_call_state *dce_call = p->dce_call;
struct auth_session_info *session_info =
dcesrv_call_session_info(dce_call);
const struct loadparm_substitution *lp_sub =
loadparm_s3_global_substitution();
char *remark = NULL;
char *path = NULL;
int max_connections = lp_max_connections(snum);
uint32_t max_uses = UINT32_MAX;
char *net_name = lp_servicename(talloc_tos(), lp_sub, snum);
if (max_connections > 0) {
max_uses = MIN(max_connections, UINT32_MAX);
}
remark = lp_comment(p->mem_ctx, lp_sub, snum);
if (remark) {
remark = talloc_sub_full(
p->mem_ctx, lp_servicename(talloc_tos(), lp_sub, snum),
get_current_username(), lp_path(talloc_tos(), lp_sub, snum),
session_info->unix_token->uid, get_current_username(),
"", remark);
}
path = talloc_asprintf(p->mem_ctx,
"C:%s", lp_path(talloc_tos(), lp_sub, snum));
if (path) {
/*
* Change / to \\ so that win2k will see it as a valid path.
* This was added to enable use of browsing in win2k add
* share dialog.
*/
string_replace(path, '/', '\\');
}
r->name = net_name;
r->type = get_share_type(snum);
r->comment = remark ? remark : "";
r->permissions = 0;
r->max_users = max_uses;
r->current_users = 0; /* computed later */
r->path = path ? path : "";
r->password = "";
}
/*******************************************************************
Map any generic bits to file specific bits.
********************************************************************/
static void map_generic_share_sd_bits(struct security_descriptor *psd)
{
uint32_t i;
struct security_acl *ps_dacl = NULL;
if (!psd)
return;
ps_dacl = psd->dacl;
if (!ps_dacl)
return;
for (i = 0; i < ps_dacl->num_aces; i++) {
struct security_ace *psa = &ps_dacl->aces[i];
uint32_t orig_mask = psa->access_mask;
se_map_generic(&psa->access_mask, &file_generic_mapping);
psa->access_mask |= orig_mask;
}
}
/*******************************************************************
Fill in a share info level 501 structure.
********************************************************************/
static void init_srv_share_info_501(struct pipes_struct *p,
struct srvsvc_NetShareInfo501 *r, int snum)
{
struct dcesrv_call_state *dce_call = p->dce_call;
struct auth_session_info *session_info =
dcesrv_call_session_info(dce_call);
const struct loadparm_substitution *lp_sub =
loadparm_s3_global_substitution();
const char *net_name = lp_servicename(talloc_tos(), lp_sub, snum);
char *remark = lp_comment(p->mem_ctx, lp_sub, snum);
if (remark) {
remark = talloc_sub_full(
p->mem_ctx, lp_servicename(talloc_tos(), lp_sub, snum),
get_current_username(), lp_path(talloc_tos(), lp_sub, snum),
session_info->unix_token->uid, get_current_username(),
"", remark);
}
r->name = net_name;
r->type = get_share_type(snum);
r->comment = remark ? remark : "";
/*
* According to [MS-SRVS] 2.2.4.25, the flags field is the same as in
* level 1005.
*/
r->csc_policy = (lp_csc_policy(snum) << SHARE_1005_CSC_POLICY_SHIFT);
}
/*******************************************************************
Fill in a share info level 502 structure.
********************************************************************/
static void init_srv_share_info_502(struct pipes_struct *p,
struct srvsvc_NetShareInfo502 *r, int snum)
{
struct dcesrv_call_state *dce_call = p->dce_call;
struct auth_session_info *session_info =
dcesrv_call_session_info(dce_call);
const struct loadparm_substitution *lp_sub =
loadparm_s3_global_substitution();
const char *net_name = lp_servicename(talloc_tos(), lp_sub, snum);
char *path = NULL;
struct security_descriptor *sd = NULL;
struct sec_desc_buf *sd_buf = NULL;
size_t sd_size = 0;
TALLOC_CTX *ctx = p->mem_ctx;
char *remark = lp_comment(ctx, lp_sub, snum);
if (remark) {
remark = talloc_sub_full(
p->mem_ctx, lp_servicename(talloc_tos(), lp_sub, snum),
get_current_username(), lp_path(talloc_tos(), lp_sub, snum),
session_info->unix_token->uid, get_current_username(),
"", remark);
}
path = talloc_asprintf(ctx, "C:%s", lp_path(talloc_tos(), lp_sub, snum));
if (path) {
/*
* Change / to \\ so that win2k will see it as a valid path. This was added to
* enable use of browsing in win2k add share dialog.
*/
string_replace(path, '/', '\\');
}
sd = get_share_security(ctx, lp_servicename(talloc_tos(), lp_sub, snum), &sd_size);
sd_buf = make_sec_desc_buf(p->mem_ctx, sd_size, sd);
r->name = net_name;
r->type = get_share_type(snum);
r->comment = remark ? remark : "";
r->permissions = 0;
r->max_users = (uint32_t)-1;
r->current_users = 1; /* ??? */
r->path = path ? path : "";
r->password = "";
r->sd_buf = *sd_buf;
}
/***************************************************************************
Fill in a share info level 1004 structure.
***************************************************************************/
static void init_srv_share_info_1004(struct pipes_struct *p,
struct srvsvc_NetShareInfo1004 *r,
int snum)
{
struct dcesrv_call_state *dce_call = p->dce_call;
struct auth_session_info *session_info =
dcesrv_call_session_info(dce_call);
const struct loadparm_substitution *lp_sub =
loadparm_s3_global_substitution();
char *remark = lp_comment(p->mem_ctx, lp_sub, snum);
if (remark) {
remark = talloc_sub_full(
p->mem_ctx, lp_servicename(talloc_tos(), lp_sub, snum),
get_current_username(), lp_path(talloc_tos(), lp_sub, snum),
session_info->unix_token->uid, get_current_username(),
"", remark);
}
r->comment = remark ? remark : "";
}
/***************************************************************************
Fill in a share info level 1005 structure.
***************************************************************************/
static void init_srv_share_info_1005(struct pipes_struct *p,
struct srvsvc_NetShareInfo1005 *r,
int snum)
{
uint32_t dfs_flags = 0;
if (lp_host_msdfs() && lp_msdfs_root(snum)) {
dfs_flags |= SHARE_1005_IN_DFS | SHARE_1005_DFS_ROOT;
}
dfs_flags |= lp_csc_policy(snum) << SHARE_1005_CSC_POLICY_SHIFT;
r->dfs_flags = dfs_flags;
}
/***************************************************************************
Fill in a share info level 1006 structure.
***************************************************************************/
static void init_srv_share_info_1006(struct pipes_struct *p,
struct srvsvc_NetShareInfo1006 *r,
int snum)
{
r->max_users = (uint32_t)-1;
}
/***************************************************************************
Fill in a share info level 1007 structure.
***************************************************************************/
static void init_srv_share_info_1007(struct pipes_struct *p,
struct srvsvc_NetShareInfo1007 *r,
int snum)
{
r->flags = 0;
r->alternate_directory_name = "";
}
/*******************************************************************
Fill in a share info level 1501 structure.
********************************************************************/
static void init_srv_share_info_1501(struct pipes_struct *p,
struct sec_desc_buf **r,
int snum)
{
const struct loadparm_substitution *lp_sub =
loadparm_s3_global_substitution();
struct security_descriptor *sd;
struct sec_desc_buf *sd_buf = NULL;
size_t sd_size;
TALLOC_CTX *ctx = p->mem_ctx;
sd = get_share_security(ctx, lp_servicename(talloc_tos(), lp_sub, snum), &sd_size);
if (sd) {
sd_buf = make_sec_desc_buf(p->mem_ctx, sd_size, sd);
}
*r = sd_buf;
}
/*******************************************************************
True if it ends in '$'.
********************************************************************/
static bool is_hidden_share(int snum)
{
const struct loadparm_substitution *lp_sub =
loadparm_s3_global_substitution();
const char *net_name = lp_servicename(talloc_tos(), lp_sub, snum);
return (net_name[strlen(net_name) - 1] == '$') ? True : False;
}
/*******************************************************************
Verify user is allowed to view share, access based enumeration
********************************************************************/
static bool is_enumeration_allowed(struct pipes_struct *p,
int snum)
{
struct dcesrv_call_state *dce_call = p->dce_call;
struct auth_session_info *session_info =
dcesrv_call_session_info(dce_call);
const struct loadparm_substitution *lp_sub =
loadparm_s3_global_substitution();
if (!lp_access_based_share_enum(snum)) {
return true;
}
if (!user_ok_token(session_info->unix_info->unix_name,
session_info->info->domain_name,
session_info->security_token, snum)) {
return false;
}
return share_access_check(session_info->security_token,
lp_servicename(talloc_tos(), lp_sub, snum),
FILE_READ_DATA, NULL);
}
/****************************************************************************
Count an entry against the respective service.
****************************************************************************/
static int count_for_all_fn(struct smbXsrv_tcon_global0 *tcon, void *udp)
{
union srvsvc_NetShareCtr *ctr = udp;
/* Only called for level2 */
struct srvsvc_NetShareCtr2 *ctr2 = ctr->ctr2;
uint32_t share_entries = ctr2->count;
struct srvsvc_NetShareInfo2 *info2 = ctr2->array;
uint32_t i = 0;
for (i = 0; i < share_entries; i++, info2++) {
if (strequal(tcon->share_name, info2->name)) {
info2->current_users++;
break;
}
}
return 0;
}
/****************************************************************************
Count the entries belonging to all services in the connection db.
****************************************************************************/
static void count_connections_for_all_shares(union srvsvc_NetShareCtr *ctr)
{
NTSTATUS status;
status = smbXsrv_tcon_global_traverse(count_for_all_fn, ctr);
if (!NT_STATUS_IS_OK(status)) {
DEBUG(0,("count_connections_for_all_shares: traverse of "
"smbXsrv_tcon_global.tdb failed - %s\n",
nt_errstr(status)));
}
}
/*******************************************************************
Fill in a share info structure.
********************************************************************/
static WERROR init_srv_share_info_ctr(struct pipes_struct *p,
struct srvsvc_NetShareInfoCtr *info_ctr,
uint32_t *resume_handle_p,
uint32_t *total_entries,
bool all_shares)
{
struct dcesrv_call_state *dce_call = p->dce_call;
struct auth_session_info *session_info =
dcesrv_call_session_info(dce_call);
struct dcesrv_connection *dcesrv_conn = dce_call->conn;
const struct tsocket_address *local_address =
dcesrv_connection_get_local_address(dcesrv_conn);
const struct loadparm_substitution *lp_sub =
loadparm_s3_global_substitution();
uint32_t num_entries = 0;
uint32_t alloc_entries = 0;
int num_services = 0;
int snum;
TALLOC_CTX *ctx = p->mem_ctx;
uint32_t i = 0;
uint32_t valid_share_count = 0;
bool *allowed = 0;
union srvsvc_NetShareCtr ctr;
uint32_t resume_handle = resume_handle_p ? *resume_handle_p : 0;
const char *unix_name = session_info->unix_info->unix_name;
int existing_home = -1;
int added_home = -1;
WERROR ret = WERR_OK;
DEBUG(5,("init_srv_share_info_ctr\n"));
/*
* We need to make sure to reload the services for the connecting user.
* It is possible that we have includes with substitutions.
*
* include = /etc/samba/%U.conf
*
* We also need all printers and usershares.
*
* We need to be root in order to have access to registry shares
* and root only smb.conf files.
*/
become_root();
lp_kill_all_services();
lp_load_with_shares(get_dyn_CONFIGFILE());
delete_and_reload_printers();
load_usershare_shares(NULL, connections_snum_used);
load_registry_shares();
existing_home = lp_servicenumber(unix_name);
if (existing_home == -1) {
added_home = register_homes_share(unix_name);
}
unbecome_root();
num_services = lp_numservices();
allowed = talloc_zero_array(ctx, bool, num_services);
if (allowed == NULL) {
goto nomem;
}
/* Count the number of entries. */
for (snum = 0; snum < num_services; snum++) {
if (lp_browseable(snum) && lp_snum_ok(snum) &&
lp_allow_local_address(snum, local_address) &&
is_enumeration_allowed(p, snum) &&
(all_shares || !is_hidden_share(snum))) {
DEBUG(10, ("counting service %s\n",
lp_servicename(talloc_tos(), lp_sub, snum) ? lp_servicename(talloc_tos(), lp_sub, snum) : "(null)"));
allowed[snum] = true;
num_entries++;
} else {
DEBUG(10, ("NOT counting service %s\n",
lp_servicename(talloc_tos(), lp_sub, snum) ? lp_servicename(talloc_tos(), lp_sub, snum) : "(null)"));
}
}
if (!num_entries || (resume_handle >= num_entries)) {
goto done;
}
/* Calculate alloc entries. */
alloc_entries = num_entries - resume_handle;
switch (info_ctr->level) {
case 0:
ctr.ctr0 = talloc_zero(ctx, struct srvsvc_NetShareCtr0);
if (ctr.ctr0 == NULL) {
goto nomem;
}
ctr.ctr0->count = alloc_entries;
ctr.ctr0->array = talloc_zero_array(ctx, struct srvsvc_NetShareInfo0, alloc_entries);
if (ctr.ctr0->array == NULL) {
goto nomem;
}
for (snum = 0; snum < num_services; snum++) {
if (allowed[snum] &&
(resume_handle <= (i + valid_share_count++)) ) {
init_srv_share_info_0(p, &ctr.ctr0->array[i++], snum);
}
}
break;
case 1:
ctr.ctr1 = talloc_zero(ctx, struct srvsvc_NetShareCtr1);
if (ctr.ctr1 == NULL) {
goto nomem;
}
ctr.ctr1->count = alloc_entries;
ctr.ctr1->array = talloc_zero_array(ctx, struct srvsvc_NetShareInfo1, alloc_entries);
if (ctr.ctr1->array == NULL) {
goto nomem;
}
for (snum = 0; snum < num_services; snum++) {
if (allowed[snum] &&
(resume_handle <= (i + valid_share_count++)) ) {
init_srv_share_info_1(p, &ctr.ctr1->array[i++], snum);
}
}
break;
case 2:
ctr.ctr2 = talloc_zero(ctx, struct srvsvc_NetShareCtr2);
if (ctr.ctr2 == NULL) {
goto nomem;
}
ctr.ctr2->count = alloc_entries;
ctr.ctr2->array = talloc_zero_array(ctx, struct srvsvc_NetShareInfo2, alloc_entries);
if (ctr.ctr2->array == NULL) {
goto nomem;
}
for (snum = 0; snum < num_services; snum++) {
if (allowed[snum] &&
(resume_handle <= (i + valid_share_count++)) ) {
init_srv_share_info_2(p, &ctr.ctr2->array[i++], snum);
}
}
count_connections_for_all_shares(&ctr);
break;
case 501:
ctr.ctr501 = talloc_zero(ctx, struct srvsvc_NetShareCtr501);
if (ctr.ctr501 == NULL) {
goto nomem;
}
ctr.ctr501->count = alloc_entries;
ctr.ctr501->array = talloc_zero_array(ctx, struct srvsvc_NetShareInfo501, alloc_entries);
if (ctr.ctr501->array == NULL) {
goto nomem;
}
for (snum = 0; snum < num_services; snum++) {
if (allowed[snum] &&
(resume_handle <= (i + valid_share_count++)) ) {
init_srv_share_info_501(p, &ctr.ctr501->array[i++], snum);
}
}
break;
case 502:
ctr.ctr502 = talloc_zero(ctx, struct srvsvc_NetShareCtr502);
if (ctr.ctr502 == NULL) {
goto nomem;
}
ctr.ctr502->count = alloc_entries;
ctr.ctr502->array = talloc_zero_array(ctx, struct srvsvc_NetShareInfo502, alloc_entries);
if (ctr.ctr502->array == NULL) {
goto nomem;
}
for (snum = 0; snum < num_services; snum++) {
if (allowed[snum] &&
(resume_handle <= (i + valid_share_count++)) ) {
init_srv_share_info_502(p, &ctr.ctr502->array[i++], snum);
}
}
break;
case 1004:
ctr.ctr1004 = talloc_zero(ctx, struct srvsvc_NetShareCtr1004);
if (ctr.ctr1004 == NULL) {
goto nomem;
}
ctr.ctr1004->count = alloc_entries;
ctr.ctr1004->array = talloc_zero_array(ctx, struct srvsvc_NetShareInfo1004, alloc_entries);
if (ctr.ctr1004->array == NULL) {
goto nomem;
}
for (snum = 0; snum < num_services; snum++) {
if (allowed[snum] &&
(resume_handle <= (i + valid_share_count++)) ) {
init_srv_share_info_1004(p, &ctr.ctr1004->array[i++], snum);
}
}
break;
case 1005:
ctr.ctr1005 = talloc_zero(ctx, struct srvsvc_NetShareCtr1005);
if (ctr.ctr1005 == NULL) {
goto nomem;
}
ctr.ctr1005->count = alloc_entries;
ctr.ctr1005->array = talloc_zero_array(ctx, struct srvsvc_NetShareInfo1005, alloc_entries);
if (ctr.ctr1005->array == NULL) {
goto nomem;
}
for (snum = 0; snum < num_services; snum++) {
if (allowed[snum] &&
(resume_handle <= (i + valid_share_count++)) ) {
init_srv_share_info_1005(p, &ctr.ctr1005->array[i++], snum);
}
}
break;
case 1006:
ctr.ctr1006 = talloc_zero(ctx, struct srvsvc_NetShareCtr1006);
if (ctr.ctr1006 == NULL) {
goto nomem;
}
ctr.ctr1006->count = alloc_entries;
ctr.ctr1006->array = talloc_zero_array(ctx, struct srvsvc_NetShareInfo1006, alloc_entries);
if (ctr.ctr1006->array == NULL) {
goto nomem;
}
for (snum = 0; snum < num_services; snum++) {
if (allowed[snum] &&
(resume_handle <= (i + valid_share_count++)) ) {
init_srv_share_info_1006(p, &ctr.ctr1006->array[i++], snum);
}
}
break;
case 1007:
ctr.ctr1007 = talloc_zero(ctx, struct srvsvc_NetShareCtr1007);
if (ctr.ctr1007 == NULL) {
goto nomem;
}
ctr.ctr1007->count = alloc_entries;
ctr.ctr1007->array = talloc_zero_array(ctx, struct srvsvc_NetShareInfo1007, alloc_entries);
if (ctr.ctr1007->array == NULL) {
goto nomem;
}
for (snum = 0; snum < num_services; snum++) {
if (allowed[snum] &&
(resume_handle <= (i + valid_share_count++)) ) {
init_srv_share_info_1007(p, &ctr.ctr1007->array[i++], snum);
}
}
break;
case 1501:
ctr.ctr1501 = talloc_zero(ctx, struct srvsvc_NetShareCtr1501);
if (ctr.ctr1501 == NULL) {
goto nomem;
}
ctr.ctr1501->count = alloc_entries;
ctr.ctr1501->array = talloc_zero_array(ctx, struct sec_desc_buf, alloc_entries);
if (ctr.ctr1501->array == NULL) {
goto nomem;
}
for (snum = 0; snum < num_services; snum++) {
if (allowed[snum] &&
(resume_handle <= (i + valid_share_count++)) ) {
struct sec_desc_buf *sd_buf = NULL;
init_srv_share_info_1501(p, &sd_buf, snum);
ctr.ctr1501->array[i++] = *sd_buf;
}
}
break;
default:
DEBUG(5,("init_srv_share_info_ctr: unsupported switch value %d\n",
info_ctr->level));
ret = WERR_INVALID_LEVEL;
goto done;
}
*total_entries = alloc_entries;
if (resume_handle_p) {
if (all_shares) {
*resume_handle_p = (num_entries == 0) ? *resume_handle_p : 0;
} else {
*resume_handle_p = num_entries;
}
}
info_ctr->ctr = ctr;
ret = WERR_OK;
goto done;
nomem:
ret = WERR_NOT_ENOUGH_MEMORY;
done:
if (added_home != -1) {
lp_killservice(added_home);
}
return ret;
}
/*******************************************************************
fill in a sess info level 0 structure.
********************************************************************/
static WERROR init_srv_sess_info_0(struct pipes_struct *p,
struct srvsvc_NetSessCtr0 *ctr0,
uint32_t *resume_handle_p,
uint32_t *total_entries)
{
struct sessionid *session_list;
uint32_t num_entries = 0;
uint32_t resume_handle = resume_handle_p ? *resume_handle_p : 0;
*total_entries = list_sessions(p->mem_ctx, &session_list);
DEBUG(5,("init_srv_sess_info_0\n"));
if (ctr0 == NULL) {
if (resume_handle_p) {
*resume_handle_p = 0;
}
return WERR_OK;
}
for (; resume_handle < *total_entries; resume_handle++) {
ctr0->array = talloc_realloc(p->mem_ctx,
ctr0->array,
struct srvsvc_NetSessInfo0,
num_entries+1);
W_ERROR_HAVE_NO_MEMORY(ctr0->array);
ctr0->array[num_entries].client =
session_list[resume_handle].remote_machine;
num_entries++;
}
ctr0->count = num_entries;
if (resume_handle_p) {
if (*resume_handle_p >= *total_entries) {
*resume_handle_p = 0;
} else {
*resume_handle_p = resume_handle;
}
}
return WERR_OK;
}
/***********************************************************************
* find out the session on which this file is open and bump up its count
**********************************************************************/
static int count_sess_files_fn(struct file_id fid,
const struct share_mode_data *d,
const struct share_mode_entry *e,
void *data)
{
struct sess_file_info *info = data;
uint32_t rh = info->resume_handle;
uint32_t i;
for (i=0; i < info->num_entries; i++) {
/* rh+info->num_entries is safe, as we've
ensured that:
*total_entries > resume_handle &&
info->num_entries = *total_entries - resume_handle;
inside init_srv_sess_info_1() below.
*/
struct sessionid *sess = &info->session_list[rh + i];
if ((e->uid == sess->uid) &&
server_id_equal(&e->pid, &sess->pid)) {
info->ctr->array[i].num_open++;
return 0;
}
}
return 0;
}
/*******************************************************************
* count the num of open files on all sessions
*******************************************************************/
static void net_count_files_for_all_sess(struct srvsvc_NetSessCtr1 *ctr1,
struct sessionid *session_list,
uint32_t resume_handle,
uint32_t num_entries)
{
struct sess_file_info s_file_info;
s_file_info.ctr = ctr1;
s_file_info.session_list = session_list;
s_file_info.resume_handle = resume_handle;
s_file_info.num_entries = num_entries;
share_entry_forall(count_sess_files_fn, &s_file_info);
}
/*******************************************************************
fill in a sess info level 1 structure.
********************************************************************/
static WERROR init_srv_sess_info_1(struct pipes_struct *p,
struct srvsvc_NetSessCtr1 *ctr1,
uint32_t *resume_handle_p,
uint32_t *total_entries)
{
struct sessionid *session_list;
uint32_t num_entries = 0;
time_t now = time(NULL);
uint32_t resume_handle = resume_handle_p ? *resume_handle_p : 0;
ZERO_STRUCTP(ctr1);
if (ctr1 == NULL) {
if (resume_handle_p) {
*resume_handle_p = 0;
}
return WERR_OK;
}
*total_entries = list_sessions(p->mem_ctx, &session_list);
if (resume_handle >= *total_entries) {
if (resume_handle_p) {
*resume_handle_p = 0;
}
return WERR_OK;
}
/* We know num_entries must be positive, due to
the check resume_handle >= *total_entries above. */
num_entries = *total_entries - resume_handle;
ctr1->array = talloc_zero_array(p->mem_ctx,
struct srvsvc_NetSessInfo1,
num_entries);
W_ERROR_HAVE_NO_MEMORY(ctr1->array);
for (num_entries = 0; resume_handle < *total_entries; num_entries++, resume_handle++) {
uint32_t connect_time;
bool guest;
connect_time = (uint32_t)(now - session_list[resume_handle].connect_start);
guest = strequal( session_list[resume_handle].username, lp_guest_account() );
ctr1->array[num_entries].client = session_list[resume_handle].remote_machine;
ctr1->array[num_entries].user = session_list[resume_handle].username;
ctr1->array[num_entries].num_open = 0;/* computed later */
ctr1->array[num_entries].time = connect_time;
ctr1->array[num_entries].idle_time = 0;
ctr1->array[num_entries].user_flags = guest;
}
ctr1->count = num_entries;
/* count open files on all sessions in single tdb traversal */
net_count_files_for_all_sess(ctr1, session_list,
resume_handle_p ? *resume_handle_p : 0,
num_entries);
if (resume_handle_p) {
if (*resume_handle_p >= *total_entries) {
*resume_handle_p = 0;
} else {
*resume_handle_p = resume_handle;
}
}
return WERR_OK;
}
/*******************************************************************
find the share connection on which this open exists.
********************************************************************/
static int share_file_fn(struct file_id fid,
const struct share_mode_data *d,
const struct share_mode_entry *e,
void *data)
{
struct share_file_stat *sfs = data;
uint32_t i;
uint32_t offset = sfs->total_entries - sfs->resp_entries;
if (strequal(d->servicepath, sfs->in_sharepath)) {
for (i=0; i < sfs->resp_entries; i++) {
if (server_id_equal(
&e->pid, &sfs->svrid_arr[offset + i])) {
sfs->netconn_arr[i].num_open ++;
return 0;
}
}
}
return 0;
}
/*******************************************************************
count number of open files on given share connections.
********************************************************************/
static void count_share_opens(struct srvsvc_NetConnInfo1 *arr,
struct server_id *svrid_arr, char *sharepath,
uint32_t resp_entries, uint32_t total_entries)
{
struct share_file_stat sfs;
sfs.netconn_arr = arr;
sfs.svrid_arr = svrid_arr;
sfs.in_sharepath = sharepath;
sfs.resp_entries = resp_entries;
sfs.total_entries = total_entries;
share_entry_forall(share_file_fn, &sfs);
}
/****************************************************************************
process an entry from the connection db.
****************************************************************************/
static int share_conn_fn(struct smbXsrv_tcon_global0 *tcon,
void *data)
{
struct share_conn_stat *scs = data;
if (!process_exists(tcon->server_id)) {
return 0;
}
if (strequal(tcon->share_name, scs->sharename)) {
scs->svrid_arr = talloc_realloc(scs->ctx, scs->svrid_arr,
struct server_id,
scs->count + 1);
if (!scs->svrid_arr) {
return 0;
}
scs->svrid_arr[scs->count] = tcon->server_id;
scs->count++;
}
return 0;
}
/****************************************************************************
Count the connections to a share. Build an array of serverid's owning these
connections.
****************************************************************************/
static uint32_t count_share_conns(TALLOC_CTX *ctx, const char *sharename,
struct server_id **arr)
{
struct share_conn_stat scs;
NTSTATUS status;
scs.ctx = ctx;
scs.sharename = sharename;
scs.svrid_arr = NULL;
scs.count = 0;
status = smbXsrv_tcon_global_traverse(share_conn_fn, &scs);
if (!NT_STATUS_IS_OK(status)) {
DEBUG(0,("count_share_conns: traverse of "
"smbXsrv_tcon_global.tdb failed - %s\n",
nt_errstr(status)));
return 0;
}
*arr = scs.svrid_arr;
return scs.count;
}
/*******************************************************************
fill in a conn info level 0 structure.
********************************************************************/
static WERROR init_srv_conn_info_0(struct srvsvc_NetConnCtr0 *ctr0,
uint32_t *resume_handle_p,
uint32_t *total_entries)
{
uint32_t num_entries = 0;
uint32_t resume_handle = resume_handle_p ? *resume_handle_p : 0;
DEBUG(5,("init_srv_conn_info_0\n"));
if (ctr0 == NULL) {
if (resume_handle_p) {
*resume_handle_p = 0;
}
return WERR_OK;
}
*total_entries = 1;
ZERO_STRUCTP(ctr0);
for (; resume_handle < *total_entries; resume_handle++) {
ctr0->array = talloc_realloc(talloc_tos(),
ctr0->array,
struct srvsvc_NetConnInfo0,
num_entries+1);
if (!ctr0->array) {
return WERR_NOT_ENOUGH_MEMORY;
}
ctr0->array[num_entries].conn_id = *total_entries;
/* move on to creating next connection */
num_entries++;
}
ctr0->count = num_entries;
*total_entries = num_entries;
if (resume_handle_p) {
if (*resume_handle_p >= *total_entries) {
*resume_handle_p = 0;
} else {
*resume_handle_p = resume_handle;
}
}
return WERR_OK;
}
/*******************************************************************
fill in a conn info level 1 structure.
********************************************************************/
static WERROR init_srv_conn_info_1(const char *name,
struct srvsvc_NetConnCtr1 *ctr1,
uint32_t *resume_handle_p,
uint32_t *total_entries)
{
const struct loadparm_substitution *lp_sub =
loadparm_s3_global_substitution();
uint32_t num_entries = 0;
int snum = 0;
uint32_t resume_handle = resume_handle_p ? *resume_handle_p : 0;
char *share_name = NULL;
struct server_id *svrid_arr = NULL;
DEBUG(5,("init_srv_conn_info_1\n"));
if (ctr1 == NULL) {
if (resume_handle_p) {
*resume_handle_p = 0;
}
return WERR_OK;
}
/* check if this is a server name or a share name */
if (name && (strlen(name) > 2) && (name[0] == '\\') &&
(name[1] == '\\')) {
/* 'name' is a server name - this part is unimplemented */
*total_entries = 1;
} else {
/* 'name' is a share name */
snum = find_service(talloc_tos(), name, &share_name);
if (!share_name) {
return WERR_NOT_ENOUGH_MEMORY;
}
if (snum < 0) {
return WERR_INVALID_NAME;
}
/*
* count the num of connections to this share. Also,
* build a list of serverid's that own these
* connections. The serverid list is used later to
* identify the share connection on which an open exists.
*/
*total_entries = count_share_conns(talloc_tos(),
share_name,
&svrid_arr);
}
if (resume_handle >= *total_entries) {
if (resume_handle_p) {
*resume_handle_p = 0;
}
return WERR_OK;
}
/*
* We know num_entries must be positive, due to
* the check resume_handle >= *total_entries above.
*/
num_entries = *total_entries - resume_handle;
ZERO_STRUCTP(ctr1);
ctr1->array = talloc_zero_array(talloc_tos(),
struct srvsvc_NetConnInfo1,
num_entries);
W_ERROR_HAVE_NO_MEMORY(ctr1->array);
for (num_entries = 0; resume_handle < *total_entries;
num_entries++, resume_handle++) {
ctr1->array[num_entries].conn_id = *total_entries;
ctr1->array[num_entries].conn_type = 0x3;
/*
* if these are connections to a share, we are going to
* compute the opens on them later. If it's for the server,
* it's unimplemented.
*/
if (!share_name) {
ctr1->array[num_entries].num_open = 1;
}
ctr1->array[num_entries].num_users = 1;
ctr1->array[num_entries].conn_time = 3;
ctr1->array[num_entries].user = "dummy_user";
ctr1->array[num_entries].share = "IPC$";
}
/* now compute open files on the share connections */
if (share_name) {
/*
* the locking tdb, which has the open files information,
* does not store share name or share (service) number, but
* just the share path. So, we can compute open files only
* on the share path. If more than one shares are defined
* on a share path, open files on all of them are included
* in the count.
*
* To have the correct behavior in case multiple shares
* are defined on the same path, changes to tdb records
* would be required. That would be lot more effort, so
* this seems a good stopgap fix.
*/
count_share_opens(ctr1->array, svrid_arr,
lp_path(talloc_tos(), lp_sub, snum),
num_entries, *total_entries);
}
ctr1->count = num_entries;
*total_entries = num_entries;
if (resume_handle_p) {
*resume_handle_p = resume_handle;
}
return WERR_OK;
}
/*******************************************************************
_srvsvc_NetFileEnum
*******************************************************************/
WERROR _srvsvc_NetFileEnum(struct pipes_struct *p,
struct srvsvc_NetFileEnum *r)
{
struct dcesrv_call_state *dce_call = p->dce_call;
struct auth_session_info *session_info =
dcesrv_call_session_info(dce_call);
TALLOC_CTX *ctx = NULL;
struct srvsvc_NetFileCtr3 *ctr3;
uint32_t resume_hnd = 0;
WERROR werr;
switch (r->in.info_ctr->level) {
case 3:
break;
default:
return WERR_INVALID_LEVEL;
}
if (!nt_token_check_sid(&global_sid_Builtin_Administrators,
session_info->security_token)) {
DEBUG(1, ("Enumerating files only allowed for "
"administrators\n"));
return WERR_ACCESS_DENIED;
}
ctx = talloc_tos();
ctr3 = r->in.info_ctr->ctr.ctr3;
if (!ctr3) {
werr = WERR_INVALID_PARAMETER;
goto done;
}
/* TODO -- Windows enumerates
(b) active pipes
(c) open directories and files */
werr = net_enum_files(ctx, r->in.user, &ctr3, resume_hnd);
if (!W_ERROR_IS_OK(werr)) {
goto done;
}
*r->out.totalentries = ctr3->count;
r->out.info_ctr->ctr.ctr3->array = ctr3->array;
r->out.info_ctr->ctr.ctr3->count = ctr3->count;
werr = WERR_OK;
done:
return werr;
}
/*******************************************************************
_srvsvc_NetSrvGetInfo
********************************************************************/
WERROR _srvsvc_NetSrvGetInfo(struct pipes_struct *p,
struct srvsvc_NetSrvGetInfo *r)
{
const struct loadparm_substitution *lp_sub =
loadparm_s3_global_substitution();
WERROR status = WERR_OK;
DEBUG(5,("_srvsvc_NetSrvGetInfo: %d\n", __LINE__));
if (!pipe_access_check(p)) {
DEBUG(3, ("access denied to _srvsvc_NetSrvGetInfo\n"));
return WERR_ACCESS_DENIED;
}
switch (r->in.level) {
/* Technically level 102 should only be available to
Administrators but there isn't anything super-secret
here, as most of it is made up. */
case 102: {
struct srvsvc_NetSrvInfo102 *info102;
info102 = talloc(p->mem_ctx, struct srvsvc_NetSrvInfo102);
if (!info102) {
return WERR_NOT_ENOUGH_MEMORY;
}
info102->platform_id = PLATFORM_ID_NT;
info102->server_name = lp_netbios_name();
info102->version_major = SAMBA_MAJOR_NBT_ANNOUNCE_VERSION;
info102->version_minor = SAMBA_MINOR_NBT_ANNOUNCE_VERSION;
info102->server_type = lp_default_server_announce();
info102->comment =
string_truncate(lp_server_string(info102, lp_sub),
MAX_SERVER_STRING_LENGTH);
info102->users = 0xffffffff;
info102->disc = 0xf;
info102->hidden = 0;
info102->announce = 240;
info102->anndelta = 3000;
info102->licenses = 100000;
info102->userpath = "C:\\";
r->out.info->info102 = info102;
break;
}
case 101: {
struct srvsvc_NetSrvInfo101 *info101;
info101 = talloc(p->mem_ctx, struct srvsvc_NetSrvInfo101);
if (!info101) {
return WERR_NOT_ENOUGH_MEMORY;
}
info101->platform_id = PLATFORM_ID_NT;
info101->server_name = lp_netbios_name();
info101->version_major = SAMBA_MAJOR_NBT_ANNOUNCE_VERSION;
info101->version_minor = SAMBA_MINOR_NBT_ANNOUNCE_VERSION;
info101->server_type = lp_default_server_announce();
info101->comment =
string_truncate(lp_server_string(info101, lp_sub),
MAX_SERVER_STRING_LENGTH);
r->out.info->info101 = info101;
break;
}
case 100: {
struct srvsvc_NetSrvInfo100 *info100;
info100 = talloc(p->mem_ctx, struct srvsvc_NetSrvInfo100);
if (!info100) {
return WERR_NOT_ENOUGH_MEMORY;
}
info100->platform_id = PLATFORM_ID_NT;
info100->server_name = lp_netbios_name();
r->out.info->info100 = info100;
break;
}
default:
status = WERR_INVALID_LEVEL;
break;
}
DEBUG(5,("_srvsvc_NetSrvGetInfo: %d\n", __LINE__));
return status;
}
/*******************************************************************
_srvsvc_NetSrvSetInfo
********************************************************************/
WERROR _srvsvc_NetSrvSetInfo(struct pipes_struct *p,
struct srvsvc_NetSrvSetInfo *r)
{
WERROR status = WERR_OK;
DEBUG(5,("_srvsvc_NetSrvSetInfo: %d\n", __LINE__));
/* Set up the net server set info structure. */
DEBUG(5,("_srvsvc_NetSrvSetInfo: %d\n", __LINE__));
return status;
}
/*******************************************************************
_srvsvc_NetConnEnum
********************************************************************/
WERROR _srvsvc_NetConnEnum(struct pipes_struct *p,
struct srvsvc_NetConnEnum *r)
{
struct dcesrv_call_state *dce_call = p->dce_call;
struct auth_session_info *session_info =
dcesrv_call_session_info(dce_call);
WERROR werr;
DEBUG(5,("_srvsvc_NetConnEnum: %d\n", __LINE__));
if (!nt_token_check_sid(&global_sid_Builtin_Administrators,
session_info->security_token)) {
DEBUG(1, ("Enumerating connections only allowed for "
"administrators\n"));
return WERR_ACCESS_DENIED;
}
switch (r->in.info_ctr->level) {
case 0:
werr = init_srv_conn_info_0(r->in.info_ctr->ctr.ctr0,
r->in.resume_handle,
r->out.totalentries);
break;
case 1:
werr = init_srv_conn_info_1(r->in.path,
r->in.info_ctr->ctr.ctr1,
r->in.resume_handle,
r->out.totalentries);
break;
default:
return WERR_INVALID_LEVEL;
}
DEBUG(5,("_srvsvc_NetConnEnum: %d\n", __LINE__));
return werr;
}
/*******************************************************************
_srvsvc_NetSessEnum
********************************************************************/
WERROR _srvsvc_NetSessEnum(struct pipes_struct *p,
struct srvsvc_NetSessEnum *r)
{
struct dcesrv_call_state *dce_call = p->dce_call;
struct auth_session_info *session_info =
dcesrv_call_session_info(dce_call);
WERROR werr;
DEBUG(5,("_srvsvc_NetSessEnum: %d\n", __LINE__));
if (!nt_token_check_sid(&global_sid_Builtin_Administrators,
session_info->security_token)) {
DEBUG(1, ("Enumerating sessions only allowed for "
"administrators\n"));
return WERR_ACCESS_DENIED;
}
switch (r->in.info_ctr->level) {
case 0:
werr = init_srv_sess_info_0(p,
r->in.info_ctr->ctr.ctr0,
r->in.resume_handle,
r->out.totalentries);
break;
case 1:
werr = init_srv_sess_info_1(p,
r->in.info_ctr->ctr.ctr1,
r->in.resume_handle,
r->out.totalentries);
break;
default:
return WERR_INVALID_LEVEL;
}
DEBUG(5,("_srvsvc_NetSessEnum: %d\n", __LINE__));
return werr;
}
/*******************************************************************
_srvsvc_NetSessDel
********************************************************************/
WERROR _srvsvc_NetSessDel(struct pipes_struct *p,
struct srvsvc_NetSessDel *r)
{
struct dcesrv_call_state *dce_call = p->dce_call;
struct auth_session_info *session_info =
dcesrv_call_session_info(dce_call);
struct sessionid *session_list;
int num_sessions, snum;
const char *username;
const char *machine;
bool not_root = False;
WERROR werr;
DEBUG(5,("_srvsvc_NetSessDel: %d\n", __LINE__));
werr = WERR_ACCESS_DENIED;
/* fail out now if you are not root or not a domain admin */
if ((session_info->unix_token->uid != sec_initial_uid()) &&
( ! nt_token_check_domain_rid(session_info->security_token,
DOMAIN_RID_ADMINS))) {
goto done;
}
username = r->in.user;
machine = r->in.client;
/* strip leading backslashes if any */
if (machine && machine[0] == '\\' && machine[1] == '\\') {
machine += 2;
}
num_sessions = find_sessions(p->mem_ctx, username, machine,
&session_list);
for (snum = 0; snum < num_sessions; snum++) {
NTSTATUS ntstat;
if (session_info->unix_token->uid != sec_initial_uid()) {
not_root = True;
become_root();
}
ntstat = messaging_send(p->msg_ctx,
session_list[snum].pid,
MSG_SHUTDOWN, &data_blob_null);
if (NT_STATUS_IS_OK(ntstat))
werr = WERR_OK;
if (not_root)
unbecome_root();
}
DEBUG(5,("_srvsvc_NetSessDel: %d\n", __LINE__));
done:
return werr;
}
/*******************************************************************
_srvsvc_NetShareEnumAll
********************************************************************/
WERROR _srvsvc_NetShareEnumAll(struct pipes_struct *p,
struct srvsvc_NetShareEnumAll *r)
{
WERROR werr;
DEBUG(5,("_srvsvc_NetShareEnumAll: %d\n", __LINE__));
if (!pipe_access_check(p)) {
DEBUG(3, ("access denied to _srvsvc_NetShareEnumAll\n"));
return WERR_ACCESS_DENIED;
}
/* Create the list of shares for the response. */
werr = init_srv_share_info_ctr(p,
r->in.info_ctr,
r->in.resume_handle,
r->out.totalentries,
true);
DEBUG(5,("_srvsvc_NetShareEnumAll: %d\n", __LINE__));
return werr;
}
/*******************************************************************
_srvsvc_NetShareEnum
********************************************************************/
WERROR _srvsvc_NetShareEnum(struct pipes_struct *p,
struct srvsvc_NetShareEnum *r)
{
WERROR werr;
DEBUG(5,("_srvsvc_NetShareEnum: %d\n", __LINE__));
if (!pipe_access_check(p)) {
DEBUG(3, ("access denied to _srvsvc_NetShareEnum\n"));
return WERR_ACCESS_DENIED;
}
/* Create the list of shares for the response. */
werr = init_srv_share_info_ctr(p,
r->in.info_ctr,
r->in.resume_handle,
r->out.totalentries,
false);
DEBUG(5,("_srvsvc_NetShareEnum: %d\n", __LINE__));
return werr;
}
/*******************************************************************
_srvsvc_NetShareGetInfo
********************************************************************/
WERROR _srvsvc_NetShareGetInfo(struct pipes_struct *p,
struct srvsvc_NetShareGetInfo *r)
{
WERROR status = WERR_OK;
char *share_name = NULL;
int snum;
union srvsvc_NetShareInfo *info = r->out.info;
DEBUG(5,("_srvsvc_NetShareGetInfo: %d\n", __LINE__));
if (!r->in.share_name) {
return WERR_INVALID_NAME;
}
snum = find_service(talloc_tos(), r->in.share_name, &share_name);
if (!share_name) {
return WERR_NOT_ENOUGH_MEMORY;
}
if (snum < 0) {
return WERR_INVALID_NAME;
}
switch (r->in.level) {
case 0:
info->info0 = talloc(p->mem_ctx, struct srvsvc_NetShareInfo0);
W_ERROR_HAVE_NO_MEMORY(info->info0);
init_srv_share_info_0(p, info->info0, snum);
break;
case 1:
info->info1 = talloc(p->mem_ctx, struct srvsvc_NetShareInfo1);
W_ERROR_HAVE_NO_MEMORY(info->info1);
init_srv_share_info_1(p, info->info1, snum);
break;
case 2:
info->info2 = talloc(p->mem_ctx, struct srvsvc_NetShareInfo2);
W_ERROR_HAVE_NO_MEMORY(info->info2);
init_srv_share_info_2(p, info->info2, snum);
info->info2->current_users =
count_current_connections(info->info2->name, false);
break;
case 501:
info->info501 = talloc(p->mem_ctx, struct srvsvc_NetShareInfo501);
W_ERROR_HAVE_NO_MEMORY(info->info501);
init_srv_share_info_501(p, info->info501, snum);
break;
case 502:
info->info502 = talloc(p->mem_ctx, struct srvsvc_NetShareInfo502);
W_ERROR_HAVE_NO_MEMORY(info->info502);
init_srv_share_info_502(p, info->info502, snum);
break;
case 1004:
info->info1004 = talloc(p->mem_ctx, struct srvsvc_NetShareInfo1004);
W_ERROR_HAVE_NO_MEMORY(info->info1004);
init_srv_share_info_1004(p, info->info1004, snum);
break;
case 1005:
info->info1005 = talloc(p->mem_ctx, struct srvsvc_NetShareInfo1005);
W_ERROR_HAVE_NO_MEMORY(info->info1005);
init_srv_share_info_1005(p, info->info1005, snum);
break;
case 1006:
info->info1006 = talloc(p->mem_ctx, struct srvsvc_NetShareInfo1006);
W_ERROR_HAVE_NO_MEMORY(info->info1006);
init_srv_share_info_1006(p, info->info1006, snum);
break;
case 1007:
info->info1007 = talloc(p->mem_ctx, struct srvsvc_NetShareInfo1007);
W_ERROR_HAVE_NO_MEMORY(info->info1007);
init_srv_share_info_1007(p, info->info1007, snum);
break;
case 1501:
init_srv_share_info_1501(p, &info->info1501, snum);
break;
default:
DEBUG(5,("_srvsvc_NetShareGetInfo: unsupported switch value %d\n",
r->in.level));
status = WERR_INVALID_LEVEL;
break;
}
DEBUG(5,("_srvsvc_NetShareGetInfo: %d\n", __LINE__));
return status;
}
/*******************************************************************
_srvsvc_NetShareSetInfo. Modify share details.
********************************************************************/
WERROR _srvsvc_NetShareSetInfo(struct pipes_struct *p,
struct srvsvc_NetShareSetInfo *r)
{
struct dcesrv_call_state *dce_call = p->dce_call;
struct auth_session_info *session_info =
dcesrv_call_session_info(dce_call);
const struct loadparm_substitution *lp_sub =
loadparm_s3_global_substitution();
char *command = NULL;
char *share_name = NULL;
char *comment = NULL;
const char *pathname = NULL;
int type;
int snum;
int ret;
char *path = NULL;
struct security_descriptor *psd = NULL;
bool is_disk_op = False;
const char *csc_policy = NULL;
bool csc_policy_changed = false;
const char *csc_policies[] = {"manual", "documents", "programs",
"disable"};
uint32_t client_csc_policy;
int max_connections = 0;
TALLOC_CTX *ctx = p->mem_ctx;
union srvsvc_NetShareInfo *info = r->in.info;
DEBUG(5,("_srvsvc_NetShareSetInfo: %d\n", __LINE__));
if (!r->in.share_name) {
return WERR_INVALID_NAME;
}
if (r->out.parm_error) {
*r->out.parm_error = 0;
}
if ( strequal(r->in.share_name,"IPC$")
|| ( lp_enable_asu_support() && strequal(r->in.share_name,"ADMIN$") )
|| strequal(r->in.share_name,"global") )
{
DEBUG(5,("_srvsvc_NetShareSetInfo: share %s cannot be "
"modified by a remote user.\n",
r->in.share_name ));
return WERR_ACCESS_DENIED;
}
snum = find_service(talloc_tos(), r->in.share_name, &share_name);
if (!share_name) {
return WERR_NOT_ENOUGH_MEMORY;
}
/* Does this share exist ? */
if (snum < 0)
return WERR_NERR_NETNAMENOTFOUND;
/* No change to printer shares. */
if (lp_printable(snum))
return WERR_ACCESS_DENIED;
is_disk_op = security_token_has_privilege(
session_info->security_token, SEC_PRIV_DISK_OPERATOR);
/* fail out now if you are not root and not a disk op */
if (session_info->unix_token->uid != sec_initial_uid() && !is_disk_op) {
DEBUG(2,("_srvsvc_NetShareSetInfo: uid %u doesn't have the "
"SeDiskOperatorPrivilege privilege needed to modify "
"share %s\n",
(unsigned int)session_info->unix_token->uid,
share_name ));
return WERR_ACCESS_DENIED;
}
max_connections = lp_max_connections(snum);
csc_policy = csc_policies[lp_csc_policy(snum)];
switch (r->in.level) {
case 1:
pathname = lp_path(ctx, lp_sub, snum);
comment = talloc_strdup(ctx, info->info1->comment);
type = info->info1->type;
psd = NULL;
break;
case 2:
comment = talloc_strdup(ctx, info->info2->comment);
pathname = info->info2->path;
type = info->info2->type;
max_connections = (info->info2->max_users == (uint32_t)-1) ?
0 : info->info2->max_users;
psd = NULL;
break;
#if 0
/* not supported on set but here for completeness */
case 501:
comment = talloc_strdup(ctx, info->info501->comment);
type = info->info501->type;
psd = NULL;
break;
#endif
case 502:
comment = talloc_strdup(ctx, info->info502->comment);
pathname = info->info502->path;
type = info->info502->type;
psd = info->info502->sd_buf.sd;
map_generic_share_sd_bits(psd);
break;
case 1004:
pathname = lp_path(ctx, lp_sub, snum);
comment = talloc_strdup(ctx, info->info1004->comment);
type = STYPE_DISKTREE;
break;
case 1005:
/* XP re-sets the csc policy even if it wasn't changed by the
user, so we must compare it to see if it's what is set in
smb.conf, so that we can continue other ops like setting
ACLs on a share */
client_csc_policy = (info->info1005->dfs_flags &
SHARE_1005_CSC_POLICY_MASK) >>
SHARE_1005_CSC_POLICY_SHIFT;
if (client_csc_policy == (uint32_t)lp_csc_policy(snum)) {
return WERR_OK;
}
csc_policy = csc_policies[client_csc_policy];
csc_policy_changed = true;
pathname = lp_path(ctx, lp_sub, snum);
comment = lp_comment(ctx, lp_sub, snum);
type = STYPE_DISKTREE;
break;
case 1006:
case 1007:
return WERR_ACCESS_DENIED;
case 1501:
pathname = lp_path(ctx, lp_sub, snum);
comment = lp_comment(ctx, lp_sub, snum);
psd = info->info1501->sd;
map_generic_share_sd_bits(psd);
type = STYPE_DISKTREE;
break;
default:
DEBUG(5,("_srvsvc_NetShareSetInfo: unsupported switch value %d\n",
r->in.level));
return WERR_INVALID_LEVEL;
}
/* We can only modify disk shares. */
if (type != STYPE_DISKTREE) {
DEBUG(5,("_srvsvc_NetShareSetInfo: share %s is not a "
"disk share\n",
share_name ));
return WERR_ACCESS_DENIED;
}
if (comment == NULL) {
return WERR_NOT_ENOUGH_MEMORY;
}
/* Check if the pathname is valid. */
if (!(path = valid_share_pathname(p->mem_ctx, pathname ))) {
DEBUG(5,("_srvsvc_NetShareSetInfo: invalid pathname %s\n",
pathname ));
return WERR_BAD_PATHNAME;
}
/* Ensure share name, pathname and comment don't contain '"' characters. */
string_replace(share_name, '"', ' ');
string_replace(path, '"', ' ');
string_replace(comment, '"', ' ');
DEBUG(10,("_srvsvc_NetShareSetInfo: change share command = %s\n",
lp_change_share_command(talloc_tos(), lp_sub) ? lp_change_share_command(talloc_tos(), lp_sub) : "NULL" ));
/* Only call modify function if something changed. */
if (strcmp(path, lp_path(talloc_tos(), lp_sub, snum))
|| strcmp(comment, lp_comment(talloc_tos(), lp_sub, snum))
|| (lp_max_connections(snum) != max_connections)
|| csc_policy_changed) {
if (!lp_change_share_command(talloc_tos(), lp_sub) || !*lp_change_share_command(talloc_tos(), lp_sub)) {
DEBUG(10,("_srvsvc_NetShareSetInfo: No change share command\n"));
return WERR_ACCESS_DENIED;
}
command = talloc_asprintf(p->mem_ctx,
"%s \"%s\" \"%s\" \"%s\" \"%s\" %d \"%s\"",
lp_change_share_command(talloc_tos(), lp_sub),
get_dyn_CONFIGFILE(),
share_name,
path,
comment,
max_connections,
csc_policy);
if (!command) {
return WERR_NOT_ENOUGH_MEMORY;
}
DEBUG(10,("_srvsvc_NetShareSetInfo: Running [%s]\n", command ));
/********* BEGIN SeDiskOperatorPrivilege BLOCK *********/
if (is_disk_op)
become_root();
ret = smbrun(command, NULL, NULL);
if (ret == 0) {
reload_services(NULL, NULL, false);
/* Tell everyone we updated smb.conf. */
messaging_send_all(p->msg_ctx, MSG_SMB_CONF_UPDATED,
NULL, 0);
}
if ( is_disk_op )
unbecome_root();
/********* END SeDiskOperatorPrivilege BLOCK *********/
DEBUG(3,("_srvsvc_NetShareSetInfo: Running [%s] returned (%d)\n",
command, ret ));
TALLOC_FREE(command);
if ( ret != 0 )
return WERR_ACCESS_DENIED;
} else {
DEBUG(10,("_srvsvc_NetShareSetInfo: No change to share name (%s)\n",
share_name ));
}
/* Replace SD if changed. */
if (psd) {
struct security_descriptor *old_sd;
size_t sd_size;
NTSTATUS status;
old_sd = get_share_security(p->mem_ctx, lp_servicename(talloc_tos(), lp_sub, snum), &sd_size);
if (old_sd && !security_descriptor_equal(old_sd, psd)) {
status = set_share_security(share_name, psd);
if (!NT_STATUS_IS_OK(status)) {
DEBUG(0,("_srvsvc_NetShareSetInfo: Failed to change security info in share %s.\n",
share_name ));
}
}
}
DEBUG(5,("_srvsvc_NetShareSetInfo: %d\n", __LINE__));
return WERR_OK;
}
/*******************************************************************
_srvsvc_NetShareAdd.
Call 'add_share_command "sharename" "pathname"
"comment" "max connections = "
********************************************************************/
WERROR _srvsvc_NetShareAdd(struct pipes_struct *p,
struct srvsvc_NetShareAdd *r)
{
struct dcesrv_call_state *dce_call = p->dce_call;
struct auth_session_info *session_info =
dcesrv_call_session_info(dce_call);
char *command = NULL;
char *share_name_in = NULL;
char *share_name = NULL;
char *comment = NULL;
char *pathname = NULL;
int type;
int snum;
int ret;
char *path;
struct security_descriptor *psd = NULL;
bool is_disk_op;
int max_connections = 0;
SMB_STRUCT_STAT st;
TALLOC_CTX *ctx = p->mem_ctx;
const struct loadparm_substitution *lp_sub =
loadparm_s3_global_substitution();
DEBUG(5,("_srvsvc_NetShareAdd: %d\n", __LINE__));
if (r->out.parm_error) {
*r->out.parm_error = 0;
}
is_disk_op = security_token_has_privilege(
session_info->security_token, SEC_PRIV_DISK_OPERATOR);
if (session_info->unix_token->uid != sec_initial_uid() && !is_disk_op) {
return WERR_ACCESS_DENIED;
}
if (!lp_add_share_command(talloc_tos(), lp_sub) || !*lp_add_share_command(talloc_tos(), lp_sub)) {
DBG_WARNING("_srvsvc_NetShareAdd: No \"add share command\" parameter set in smb.conf.\n");
return WERR_ACCESS_DENIED;
}
switch (r->in.level) {
case 0:
/* No path. Not enough info in a level 0 to do anything. */
return WERR_ACCESS_DENIED;
case 1:
/* Not enough info in a level 1 to do anything. */
return WERR_ACCESS_DENIED;
case 2:
share_name_in = talloc_strdup(ctx, r->in.info->info2->name);
comment = talloc_strdup(ctx, r->in.info->info2->comment);
pathname = talloc_strdup(ctx, r->in.info->info2->path);
max_connections = (r->in.info->info2->max_users == (uint32_t)-1) ?
0 : r->in.info->info2->max_users;
type = r->in.info->info2->type;
break;
case 501:
/* No path. Not enough info in a level 501 to do anything. */
return WERR_ACCESS_DENIED;
case 502:
share_name_in = talloc_strdup(ctx, r->in.info->info502->name);
comment = talloc_strdup(ctx, r->in.info->info502->comment);
pathname = talloc_strdup(ctx, r->in.info->info502->path);
max_connections = (r->in.info->info502->max_users == (uint32_t)-1) ?
0 : r->in.info->info502->max_users;
type = r->in.info->info502->type;
psd = r->in.info->info502->sd_buf.sd;
map_generic_share_sd_bits(psd);
break;
/* none of the following contain share names. NetShareAdd does not have a separate parameter for the share name */
case 1004:
case 1005:
case 1006:
case 1007:
return WERR_ACCESS_DENIED;
case 1501:
/* DFS only level. */
return WERR_ACCESS_DENIED;
default:
DEBUG(5,("_srvsvc_NetShareAdd: unsupported switch value %d\n",
r->in.level));
return WERR_INVALID_LEVEL;
}
/* check for invalid share names */
if (!share_name_in || !validate_net_name(share_name_in,
INVALID_SHARENAME_CHARS,
strlen(share_name_in))) {
DEBUG(5,("_srvsvc_NetShareAdd: Bad sharename \"%s\"\n",
share_name_in ? share_name_in : ""));
return WERR_INVALID_NAME;
}
if (strequal(share_name_in,"IPC$") || strequal(share_name_in,"global")
|| (lp_enable_asu_support() &&
strequal(share_name_in,"ADMIN$"))) {
return WERR_ACCESS_DENIED;
}
snum = find_service(ctx, share_name_in, &share_name);
if (!share_name) {
return WERR_NOT_ENOUGH_MEMORY;
}
/* Share already exists. */
if (snum >= 0) {
return WERR_FILE_EXISTS;
}
/* We can only add disk shares. */
if (type != STYPE_DISKTREE) {
return WERR_ACCESS_DENIED;
}
/* Check if the pathname is valid. */
if (!(path = valid_share_pathname(p->mem_ctx, pathname))) {
return WERR_BAD_PATHNAME;
}
ret = sys_lstat(path, &st, false);
if (ret == -1 && (errno != EACCES)) {
/*
* If path has any other than permission
* problem, return WERR_FILE_NOT_FOUND (as Windows
* does.
*/
return WERR_FILE_NOT_FOUND;
}
/* Ensure share name, pathname and comment don't contain '"' characters. */
string_replace(share_name_in, '"', ' ');
string_replace(share_name, '"', ' ');
string_replace(path, '"', ' ');
if (comment) {
string_replace(comment, '"', ' ');
}
command = talloc_asprintf(ctx,
"%s \"%s\" \"%s\" \"%s\" \"%s\" %d",
lp_add_share_command(talloc_tos(), lp_sub),
get_dyn_CONFIGFILE(),
share_name_in,
path,
comment ? comment : "",
max_connections);
if (!command) {
return WERR_NOT_ENOUGH_MEMORY;
}
DEBUG(10,("_srvsvc_NetShareAdd: Running [%s]\n", command ));
/********* BEGIN SeDiskOperatorPrivilege BLOCK *********/
if ( is_disk_op )
become_root();
/* FIXME: use libnetconf here - gd */
ret = smbrun(command, NULL, NULL);
if (ret == 0) {
/* Tell everyone we updated smb.conf. */
messaging_send_all(p->msg_ctx, MSG_SMB_CONF_UPDATED, NULL, 0);
}
if ( is_disk_op )
unbecome_root();
/********* END SeDiskOperatorPrivilege BLOCK *********/
DEBUG(3,("_srvsvc_NetShareAdd: Running [%s] returned (%d)\n",
command, ret ));
TALLOC_FREE(command);
if ( ret != 0 )
return WERR_ACCESS_DENIED;
if (psd) {
NTSTATUS status;
/* Note we use share_name here, not share_name_in as
we need a canonicalized name for setting security. */
status = set_share_security(share_name, psd);
if (!NT_STATUS_IS_OK(status)) {
DEBUG(0,("_srvsvc_NetShareAdd: Failed to add security info to share %s.\n",
share_name ));
}
}
/*
* We don't call reload_services() here, the message will
* cause this to be done before the next packet is read
* from the client. JRA.
*/
DEBUG(5,("_srvsvc_NetShareAdd: %d\n", __LINE__));
return WERR_OK;
}
/*******************************************************************
_srvsvc_NetShareDel
Call "delete share command" with the share name as
a parameter.
********************************************************************/
WERROR _srvsvc_NetShareDel(struct pipes_struct *p,
struct srvsvc_NetShareDel *r)
{
struct dcesrv_call_state *dce_call = p->dce_call;
struct auth_session_info *session_info =
dcesrv_call_session_info(dce_call);
char *command = NULL;
char *share_name = NULL;
int ret;
int snum;
bool is_disk_op;
TALLOC_CTX *ctx = p->mem_ctx;
const struct loadparm_substitution *lp_sub =
loadparm_s3_global_substitution();
DEBUG(5,("_srvsvc_NetShareDel: %d\n", __LINE__));
if (!r->in.share_name) {
return WERR_NERR_NETNAMENOTFOUND;
}
if ( strequal(r->in.share_name,"IPC$")
|| ( lp_enable_asu_support() && strequal(r->in.share_name,"ADMIN$") )
|| strequal(r->in.share_name,"global") )
{
return WERR_ACCESS_DENIED;
}
snum = find_service(talloc_tos(), r->in.share_name, &share_name);
if (!share_name) {
return WERR_NOT_ENOUGH_MEMORY;
}
if (snum < 0) {
return WERR_BAD_NET_NAME;
}
/* No change to printer shares. */
if (lp_printable(snum))
return WERR_ACCESS_DENIED;
is_disk_op = security_token_has_privilege(
session_info->security_token, SEC_PRIV_DISK_OPERATOR);
if (session_info->unix_token->uid != sec_initial_uid() && !is_disk_op) {
return WERR_ACCESS_DENIED;
}
if (!lp_delete_share_command(talloc_tos(), lp_sub) || !*lp_delete_share_command(talloc_tos(), lp_sub)) {
DBG_WARNING("_srvsvc_NetShareDel: No \"delete share command\" parameter set in smb.conf.\n");
return WERR_ACCESS_DENIED;
}
command = talloc_asprintf(ctx,
"%s \"%s\" \"%s\"",
lp_delete_share_command(talloc_tos(), lp_sub),
get_dyn_CONFIGFILE(),
share_name);
if (!command) {
return WERR_NOT_ENOUGH_MEMORY;
}
DEBUG(10,("_srvsvc_NetShareDel: Running [%s]\n", command ));
/********* BEGIN SeDiskOperatorPrivilege BLOCK *********/
if ( is_disk_op )
become_root();
ret = smbrun(command, NULL, NULL);
if (ret == 0) {
/* Tell everyone we updated smb.conf. */
messaging_send_all(p->msg_ctx, MSG_SMB_CONF_UPDATED, NULL, 0);
}
if ( is_disk_op )
unbecome_root();
/********* END SeDiskOperatorPrivilege BLOCK *********/
DEBUG(3,("_srvsvc_NetShareDel: Running [%s] returned (%d)\n", command, ret ));
if ( ret != 0 )
return WERR_ACCESS_DENIED;
/* Delete the SD in the database. */
delete_share_security(share_name);
lp_killservice(snum);
return WERR_OK;
}
/*******************************************************************
_srvsvc_NetShareDelSticky
********************************************************************/
WERROR _srvsvc_NetShareDelSticky(struct pipes_struct *p,
struct srvsvc_NetShareDelSticky *r)
{
struct srvsvc_NetShareDel q;
DEBUG(5,("_srvsvc_NetShareDelSticky: %d\n", __LINE__));
q.in.server_unc = r->in.server_unc;
q.in.share_name = r->in.share_name;
q.in.reserved = r->in.reserved;
return _srvsvc_NetShareDel(p, &q);
}
/*******************************************************************
_srvsvc_NetRemoteTOD
********************************************************************/
WERROR _srvsvc_NetRemoteTOD(struct pipes_struct *p,
struct srvsvc_NetRemoteTOD *r)
{
struct srvsvc_NetRemoteTODInfo *tod;
struct tm *t;
time_t unixdate = time(NULL);
/* We do this call first as if we do it *after* the gmtime call
it overwrites the pointed-to values. JRA */
uint32_t zone = get_time_zone(unixdate)/60;
DEBUG(5,("_srvsvc_NetRemoteTOD: %d\n", __LINE__));
if ( !(tod = talloc_zero(p->mem_ctx, struct srvsvc_NetRemoteTODInfo)) )
return WERR_NOT_ENOUGH_MEMORY;
*r->out.info = tod;
DEBUG(5,("_srvsvc_NetRemoteTOD: %d\n", __LINE__));
t = gmtime(&unixdate);
/* set up the */
tod->elapsed = unixdate;
tod->msecs = 0;
tod->hours = t->tm_hour;
tod->mins = t->tm_min;
tod->secs = t->tm_sec;
tod->hunds = 0;
tod->timezone = zone;
tod->tinterval = 10000;
tod->day = t->tm_mday;
tod->month = t->tm_mon + 1;
tod->year = 1900+t->tm_year;
tod->weekday = t->tm_wday;
DEBUG(5,("_srvsvc_NetRemoteTOD: %d\n", __LINE__));
return WERR_OK;
}
/***********************************************************************************
_srvsvc_NetGetFileSecurity
Win9x NT tools get security descriptor.
***********************************************************************************/
WERROR _srvsvc_NetGetFileSecurity(struct pipes_struct *p,
struct srvsvc_NetGetFileSecurity *r)
{
struct dcesrv_call_state *dce_call = p->dce_call;
struct auth_session_info *session_info =
dcesrv_call_session_info(dce_call);
TALLOC_CTX *frame = talloc_stackframe();
const struct loadparm_substitution *lp_sub =
loadparm_s3_global_substitution();
struct smb_filename *smb_fname = NULL;
size_t sd_size;
char *servicename = NULL;
SMB_STRUCT_STAT st;
NTSTATUS nt_status;
WERROR werr;
struct conn_struct_tos *c = NULL;
connection_struct *conn = NULL;
struct sec_desc_buf *sd_buf = NULL;
struct files_struct *dirfsp = NULL;
files_struct *fsp = NULL;
int snum;
uint32_t ucf_flags = 0;
NTTIME twrp = 0;
ZERO_STRUCT(st);
if (!r->in.share) {
werr = WERR_NERR_NETNAMENOTFOUND;
goto error_exit;
}
snum = find_service(frame, r->in.share, &servicename);
if (!servicename) {
werr = WERR_NOT_ENOUGH_MEMORY;
goto error_exit;
}
if (snum == -1) {
DEBUG(10, ("Could not find service %s\n", servicename));
werr = WERR_NERR_NETNAMENOTFOUND;
goto error_exit;
}
nt_status = create_conn_struct_tos_cwd(global_messaging_context(),
snum,
lp_path(frame, lp_sub, snum),
session_info,
&c);
if (!NT_STATUS_IS_OK(nt_status)) {
DEBUG(10, ("create_conn_struct failed: %s\n",
nt_errstr(nt_status)));
werr = ntstatus_to_werror(nt_status);
goto error_exit;
}
conn = c->conn;
nt_status = filename_convert_dirfsp(frame,
conn,
r->in.file,
ucf_flags,
twrp,
&dirfsp,
&smb_fname);
if (!NT_STATUS_IS_OK(nt_status)) {
werr = ntstatus_to_werror(nt_status);
goto error_exit;
}
nt_status = SMB_VFS_CREATE_FILE(
conn, /* conn */
NULL, /* req */
dirfsp, /* dirfsp */
smb_fname, /* fname */
FILE_READ_ATTRIBUTES, /* access_mask */
FILE_SHARE_READ|FILE_SHARE_WRITE, /* share_access */
FILE_OPEN, /* create_disposition*/
0, /* create_options */
0, /* file_attributes */
INTERNAL_OPEN_ONLY, /* oplock_request */
NULL, /* lease */
0, /* allocation_size */
0, /* private_flags */
NULL, /* sd */
NULL, /* ea_list */
&fsp, /* result */
NULL, /* pinfo */
NULL, NULL); /* create context */
if (!NT_STATUS_IS_OK(nt_status)) {
DEBUG(3,("_srvsvc_NetGetFileSecurity: can't open %s\n",
smb_fname_str_dbg(smb_fname)));
werr = ntstatus_to_werror(nt_status);
goto error_exit;
}
sd_buf = talloc_zero(p->mem_ctx, struct sec_desc_buf);
if (!sd_buf) {
werr = WERR_NOT_ENOUGH_MEMORY;
goto error_exit;
}
nt_status = SMB_VFS_FGET_NT_ACL(metadata_fsp(fsp),
(SECINFO_OWNER
|SECINFO_GROUP
|SECINFO_DACL), sd_buf, &sd_buf->sd);
if (!NT_STATUS_IS_OK(nt_status)) {
DEBUG(3,("_srvsvc_NetGetFileSecurity: Unable to get NT ACL "
"for file %s\n", smb_fname_str_dbg(smb_fname)));
werr = ntstatus_to_werror(nt_status);
TALLOC_FREE(sd_buf);
goto error_exit;
}
if (sd_buf->sd->dacl) {
sd_buf->sd->dacl->revision = NT4_ACL_REVISION;
}
sd_size = ndr_size_security_descriptor(sd_buf->sd, 0);
sd_buf->sd_size = sd_size;
*r->out.sd_buf = sd_buf;
werr = WERR_OK;
error_exit:
if (fsp) {
close_file_free(NULL, &fsp, NORMAL_CLOSE);
}
TALLOC_FREE(frame);
return werr;
}
/***********************************************************************************
_srvsvc_NetSetFileSecurity
Win9x NT tools set security descriptor.
***********************************************************************************/
WERROR _srvsvc_NetSetFileSecurity(struct pipes_struct *p,
struct srvsvc_NetSetFileSecurity *r)
{
struct dcesrv_call_state *dce_call = p->dce_call;
struct auth_session_info *session_info =
dcesrv_call_session_info(dce_call);
TALLOC_CTX *frame = talloc_stackframe();
const struct loadparm_substitution *lp_sub =
loadparm_s3_global_substitution();
struct smb_filename *smb_fname = NULL;
char *servicename = NULL;
struct files_struct *dirfsp = NULL;
files_struct *fsp = NULL;
SMB_STRUCT_STAT st;
NTSTATUS nt_status;
WERROR werr;
struct conn_struct_tos *c = NULL;
connection_struct *conn = NULL;
int snum;
struct security_descriptor *psd = NULL;
uint32_t security_info_sent = 0;
uint32_t ucf_flags = 0;
NTTIME twrp = 0;
ZERO_STRUCT(st);
if (!r->in.share) {
werr = WERR_NERR_NETNAMENOTFOUND;
goto error_exit;
}
snum = find_service(frame, r->in.share, &servicename);
if (!servicename) {
werr = WERR_NOT_ENOUGH_MEMORY;
goto error_exit;
}
if (snum == -1) {
DEBUG(10, ("Could not find service %s\n", servicename));
werr = WERR_NERR_NETNAMENOTFOUND;
goto error_exit;
}
nt_status = create_conn_struct_tos_cwd(global_messaging_context(),
snum,
lp_path(frame, lp_sub, snum),
session_info,
&c);
if (!NT_STATUS_IS_OK(nt_status)) {
DEBUG(10, ("create_conn_struct failed: %s\n",
nt_errstr(nt_status)));
werr = ntstatus_to_werror(nt_status);
goto error_exit;
}
conn = c->conn;
nt_status = filename_convert_dirfsp(frame,
conn,
r->in.file,
ucf_flags,
twrp,
&dirfsp,
&smb_fname);
if (!NT_STATUS_IS_OK(nt_status)) {
werr = ntstatus_to_werror(nt_status);
goto error_exit;
}
nt_status = SMB_VFS_CREATE_FILE(
conn, /* conn */
NULL, /* req */
dirfsp, /* dirfsp */
smb_fname, /* fname */
FILE_WRITE_ATTRIBUTES, /* access_mask */
FILE_SHARE_READ|FILE_SHARE_WRITE, /* share_access */
FILE_OPEN, /* create_disposition*/
0, /* create_options */
0, /* file_attributes */
INTERNAL_OPEN_ONLY, /* oplock_request */
NULL, /* lease */
0, /* allocation_size */
0, /* private_flags */
NULL, /* sd */
NULL, /* ea_list */
&fsp, /* result */
NULL, /* pinfo */
NULL, NULL); /* create context */
if (!NT_STATUS_IS_OK(nt_status)) {
DEBUG(3,("_srvsvc_NetSetFileSecurity: can't open %s\n",
smb_fname_str_dbg(smb_fname)));
werr = ntstatus_to_werror(nt_status);
goto error_exit;
}
psd = r->in.sd_buf->sd;
security_info_sent = r->in.securityinformation;
nt_status = set_sd(fsp, psd, security_info_sent);
if (!NT_STATUS_IS_OK(nt_status) ) {
DEBUG(3,("_srvsvc_NetSetFileSecurity: Unable to set NT ACL "
"on file %s\n", r->in.share));
werr = WERR_ACCESS_DENIED;
goto error_exit;
}
werr = WERR_OK;
error_exit:
if (fsp) {
close_file_free(NULL, &fsp, NORMAL_CLOSE);
}
TALLOC_FREE(frame);
return werr;
}
/***********************************************************************************
It may be that we want to limit users to creating shares on certain areas of the UNIX file area.
We could define areas by mapping Windows style disks to points on the UNIX directory hierarchy.
These disks would the disks listed by this function.
Users could then create shares relative to these disks. Watch out for moving these disks around.
"Nigel Williams" <nigel@veritas.com>.
***********************************************************************************/
static const char *server_disks[] = {"C:"};
static uint32_t get_server_disk_count(void)
{
return sizeof(server_disks)/sizeof(server_disks[0]);
}
static uint32_t init_server_disk_enum(uint32_t *resume)
{
uint32_t server_disk_count = get_server_disk_count();
/*resume can be an offset into the list for now*/
if(*resume & 0x80000000)
*resume = 0;
if(*resume > server_disk_count)
*resume = server_disk_count;
return server_disk_count - *resume;
}
static const char *next_server_disk_enum(uint32_t *resume)
{
const char *disk;
if(init_server_disk_enum(resume) == 0)
return NULL;
disk = server_disks[*resume];
(*resume)++;
DEBUG(10, ("next_server_disk_enum: reporting disk %s. resume handle %d.\n", disk, *resume));
return disk;
}
/********************************************************************
_srvsvc_NetDiskEnum
********************************************************************/
WERROR _srvsvc_NetDiskEnum(struct pipes_struct *p,
struct srvsvc_NetDiskEnum *r)
{
uint32_t i;
const char *disk_name;
TALLOC_CTX *ctx = p->mem_ctx;
WERROR werr;
uint32_t resume = r->in.resume_handle ? *r->in.resume_handle : 0;
werr = WERR_OK;
*r->out.totalentries = init_server_disk_enum(&resume);
r->out.info->disks = talloc_zero_array(ctx, struct srvsvc_NetDiskInfo0,
MAX_SERVER_DISK_ENTRIES);
W_ERROR_HAVE_NO_MEMORY(r->out.info->disks);
/*allow one struct srvsvc_NetDiskInfo0 for null terminator*/
r->out.info->count = 0;
for(i = 0; i < MAX_SERVER_DISK_ENTRIES -1 && (disk_name = next_server_disk_enum(&resume)); i++) {
r->out.info->count++;
/*copy disk name into a unicode string*/
r->out.info->disks[i].disk = talloc_strdup(ctx, disk_name);
W_ERROR_HAVE_NO_MEMORY(r->out.info->disks[i].disk);
}
/* add a terminating null string. Is this there if there is more data to come? */
r->out.info->count++;
r->out.info->disks[i].disk = talloc_strdup(ctx, "");
W_ERROR_HAVE_NO_MEMORY(r->out.info->disks[i].disk);
if (r->out.resume_handle) {
*r->out.resume_handle = resume;
}
return werr;
}
/********************************************************************
_srvsvc_NetNameValidate
********************************************************************/
WERROR _srvsvc_NetNameValidate(struct pipes_struct *p,
struct srvsvc_NetNameValidate *r)
{
switch (r->in.name_type) {
case 0x9:
if (!validate_net_name(r->in.name, INVALID_SHARENAME_CHARS,
strlen_m(r->in.name)))
{
DEBUG(5,("_srvsvc_NetNameValidate: Bad sharename \"%s\"\n",
r->in.name));
return WERR_INVALID_NAME;
}
break;
default:
return WERR_INVALID_LEVEL;
}
return WERR_OK;
}
/*******************************************************************
********************************************************************/
struct enum_file_close_state {
struct srvsvc_NetFileClose *r;
struct messaging_context *msg_ctx;
};
static int enum_file_close_fn(struct file_id id,
const struct share_mode_data *d,
const struct share_mode_entry *e,
void *private_data)
{
char msg[MSG_SMB_SHARE_MODE_ENTRY_SIZE];
struct enum_file_close_state *state =
(struct enum_file_close_state *)private_data;
uint32_t fid = (((uint32_t)(procid_to_pid(&e->pid))<<16) | e->share_file_id);
if (fid != state->r->in.fid) {
return 0; /* Not this file. */
}
if (!process_exists(e->pid) ) {
return 0;
}
/* Ok - send the close message. */
DBG_DEBUG("request to close file %s, %s\n", d->servicepath,
share_mode_str(talloc_tos(), 0, &id, e));
share_mode_entry_to_message(msg, &id, e);
state->r->out.result = ntstatus_to_werror(
messaging_send_buf(state->msg_ctx,
e->pid, MSG_SMB_CLOSE_FILE,
(uint8_t *)msg, sizeof(msg)));
return 0;
}
/********************************************************************
Close a file given a 32-bit file id.
********************************************************************/
WERROR _srvsvc_NetFileClose(struct pipes_struct *p,
struct srvsvc_NetFileClose *r)
{
struct dcesrv_call_state *dce_call = p->dce_call;
struct auth_session_info *session_info =
dcesrv_call_session_info(dce_call);
struct enum_file_close_state state;
bool is_disk_op;
DEBUG(5,("_srvsvc_NetFileClose: %d\n", __LINE__));
is_disk_op = security_token_has_privilege(
session_info->security_token, SEC_PRIV_DISK_OPERATOR);
if (session_info->unix_token->uid != sec_initial_uid() && !is_disk_op) {
return WERR_ACCESS_DENIED;
}
/* enum_file_close_fn sends the close message to
* the relevant smbd process. */
r->out.result = WERR_FILE_NOT_FOUND;
state.r = r;
state.msg_ctx = p->msg_ctx;
share_entry_forall(enum_file_close_fn, &state);
return r->out.result;
}
/********************************************************************
********************************************************************/
WERROR _srvsvc_NetCharDevEnum(struct pipes_struct *p,
struct srvsvc_NetCharDevEnum *r)
{
p->fault_state = DCERPC_FAULT_OP_RNG_ERROR;
return WERR_NOT_SUPPORTED;
}
WERROR _srvsvc_NetCharDevGetInfo(struct pipes_struct *p,
struct srvsvc_NetCharDevGetInfo *r)
{
p->fault_state = DCERPC_FAULT_OP_RNG_ERROR;
return WERR_NOT_SUPPORTED;
}
WERROR _srvsvc_NetCharDevControl(struct pipes_struct *p,
struct srvsvc_NetCharDevControl *r)
{
p->fault_state = DCERPC_FAULT_OP_RNG_ERROR;
return WERR_NOT_SUPPORTED;
}
WERROR _srvsvc_NetCharDevQEnum(struct pipes_struct *p,
struct srvsvc_NetCharDevQEnum *r)
{
p->fault_state = DCERPC_FAULT_OP_RNG_ERROR;
return WERR_NOT_SUPPORTED;
}
WERROR _srvsvc_NetCharDevQGetInfo(struct pipes_struct *p,
struct srvsvc_NetCharDevQGetInfo *r)
{
p->fault_state = DCERPC_FAULT_OP_RNG_ERROR;
return WERR_NOT_SUPPORTED;
}
WERROR _srvsvc_NetCharDevQSetInfo(struct pipes_struct *p,
struct srvsvc_NetCharDevQSetInfo *r)
{
p->fault_state = DCERPC_FAULT_OP_RNG_ERROR;
return WERR_NOT_SUPPORTED;
}
WERROR _srvsvc_NetCharDevQPurge(struct pipes_struct *p,
struct srvsvc_NetCharDevQPurge *r)
{
p->fault_state = DCERPC_FAULT_OP_RNG_ERROR;
return WERR_NOT_SUPPORTED;
}
WERROR _srvsvc_NetCharDevQPurgeSelf(struct pipes_struct *p,
struct srvsvc_NetCharDevQPurgeSelf *r)
{
p->fault_state = DCERPC_FAULT_OP_RNG_ERROR;
return WERR_NOT_SUPPORTED;
}
WERROR _srvsvc_NetFileGetInfo(struct pipes_struct *p,
struct srvsvc_NetFileGetInfo *r)
{
p->fault_state = DCERPC_FAULT_OP_RNG_ERROR;
return WERR_NOT_SUPPORTED;
}
WERROR _srvsvc_NetShareCheck(struct pipes_struct *p,
struct srvsvc_NetShareCheck *r)
{
p->fault_state = DCERPC_FAULT_OP_RNG_ERROR;
return WERR_NOT_SUPPORTED;
}
WERROR _srvsvc_NetServerStatisticsGet(struct pipes_struct *p,
struct srvsvc_NetServerStatisticsGet *r)
{
p->fault_state = DCERPC_FAULT_OP_RNG_ERROR;
return WERR_NOT_SUPPORTED;
}
WERROR _srvsvc_NetTransportAdd(struct pipes_struct *p,
struct srvsvc_NetTransportAdd *r)
{
p->fault_state = DCERPC_FAULT_OP_RNG_ERROR;
return WERR_NOT_SUPPORTED;
}
WERROR _srvsvc_NetTransportEnum(struct pipes_struct *p,
struct srvsvc_NetTransportEnum *r)
{
p->fault_state = DCERPC_FAULT_OP_RNG_ERROR;
return WERR_NOT_SUPPORTED;
}
WERROR _srvsvc_NetTransportDel(struct pipes_struct *p,
struct srvsvc_NetTransportDel *r)
{
p->fault_state = DCERPC_FAULT_OP_RNG_ERROR;
return WERR_NOT_SUPPORTED;
}
WERROR _srvsvc_NetSetServiceBits(struct pipes_struct *p,
struct srvsvc_NetSetServiceBits *r)
{
p->fault_state = DCERPC_FAULT_OP_RNG_ERROR;
return WERR_NOT_SUPPORTED;
}
WERROR _srvsvc_NetPathType(struct pipes_struct *p,
struct srvsvc_NetPathType *r)
{
p->fault_state = DCERPC_FAULT_OP_RNG_ERROR;
return WERR_NOT_SUPPORTED;
}
WERROR _srvsvc_NetPathCanonicalize(struct pipes_struct *p,
struct srvsvc_NetPathCanonicalize *r)
{
p->fault_state = DCERPC_FAULT_OP_RNG_ERROR;
return WERR_NOT_SUPPORTED;
}
WERROR _srvsvc_NetPathCompare(struct pipes_struct *p,
struct srvsvc_NetPathCompare *r)
{
p->fault_state = DCERPC_FAULT_OP_RNG_ERROR;
return WERR_NOT_SUPPORTED;
}
WERROR _srvsvc_NETRPRNAMECANONICALIZE(struct pipes_struct *p,
struct srvsvc_NETRPRNAMECANONICALIZE *r)
{
p->fault_state = DCERPC_FAULT_OP_RNG_ERROR;
return WERR_NOT_SUPPORTED;
}
WERROR _srvsvc_NetPRNameCompare(struct pipes_struct *p,
struct srvsvc_NetPRNameCompare *r)
{
p->fault_state = DCERPC_FAULT_OP_RNG_ERROR;
return WERR_NOT_SUPPORTED;
}
WERROR _srvsvc_NetShareDelStart(struct pipes_struct *p,
struct srvsvc_NetShareDelStart *r)
{
p->fault_state = DCERPC_FAULT_OP_RNG_ERROR;
return WERR_NOT_SUPPORTED;
}
WERROR _srvsvc_NetShareDelCommit(struct pipes_struct *p,
struct srvsvc_NetShareDelCommit *r)
{
p->fault_state = DCERPC_FAULT_OP_RNG_ERROR;
return WERR_NOT_SUPPORTED;
}
WERROR _srvsvc_NetServerTransportAddEx(struct pipes_struct *p,
struct srvsvc_NetServerTransportAddEx *r)
{
p->fault_state = DCERPC_FAULT_OP_RNG_ERROR;
return WERR_NOT_SUPPORTED;
}
WERROR _srvsvc_NetServerSetServiceBitsEx(struct pipes_struct *p,
struct srvsvc_NetServerSetServiceBitsEx *r)
{
p->fault_state = DCERPC_FAULT_OP_RNG_ERROR;
return WERR_NOT_SUPPORTED;
}
WERROR _srvsvc_NETRDFSGETVERSION(struct pipes_struct *p,
struct srvsvc_NETRDFSGETVERSION *r)
{
p->fault_state = DCERPC_FAULT_OP_RNG_ERROR;
return WERR_NOT_SUPPORTED;
}
WERROR _srvsvc_NETRDFSCREATELOCALPARTITION(struct pipes_struct *p,
struct srvsvc_NETRDFSCREATELOCALPARTITION *r)
{
p->fault_state = DCERPC_FAULT_OP_RNG_ERROR;
return WERR_NOT_SUPPORTED;
}
WERROR _srvsvc_NETRDFSDELETELOCALPARTITION(struct pipes_struct *p,
struct srvsvc_NETRDFSDELETELOCALPARTITION *r)
{
p->fault_state = DCERPC_FAULT_OP_RNG_ERROR;
return WERR_NOT_SUPPORTED;
}
WERROR _srvsvc_NETRDFSSETLOCALVOLUMESTATE(struct pipes_struct *p,
struct srvsvc_NETRDFSSETLOCALVOLUMESTATE *r)
{
p->fault_state = DCERPC_FAULT_OP_RNG_ERROR;
return WERR_NOT_SUPPORTED;
}
WERROR _srvsvc_NETRDFSSETSERVERINFO(struct pipes_struct *p,
struct srvsvc_NETRDFSSETSERVERINFO *r)
{
p->fault_state = DCERPC_FAULT_OP_RNG_ERROR;
return WERR_NOT_SUPPORTED;
}
WERROR _srvsvc_NETRDFSCREATEEXITPOINT(struct pipes_struct *p,
struct srvsvc_NETRDFSCREATEEXITPOINT *r)
{
p->fault_state = DCERPC_FAULT_OP_RNG_ERROR;
return WERR_NOT_SUPPORTED;
}
WERROR _srvsvc_NETRDFSDELETEEXITPOINT(struct pipes_struct *p,
struct srvsvc_NETRDFSDELETEEXITPOINT *r)
{
p->fault_state = DCERPC_FAULT_OP_RNG_ERROR;
return WERR_NOT_SUPPORTED;
}
WERROR _srvsvc_NETRDFSMODIFYPREFIX(struct pipes_struct *p,
struct srvsvc_NETRDFSMODIFYPREFIX *r)
{
p->fault_state = DCERPC_FAULT_OP_RNG_ERROR;
return WERR_NOT_SUPPORTED;
}
WERROR _srvsvc_NETRDFSFIXLOCALVOLUME(struct pipes_struct *p,
struct srvsvc_NETRDFSFIXLOCALVOLUME *r)
{
p->fault_state = DCERPC_FAULT_OP_RNG_ERROR;
return WERR_NOT_SUPPORTED;
}
WERROR _srvsvc_NETRDFSMANAGERREPORTSITEINFO(struct pipes_struct *p,
struct srvsvc_NETRDFSMANAGERREPORTSITEINFO *r)
{
p->fault_state = DCERPC_FAULT_OP_RNG_ERROR;
return WERR_NOT_SUPPORTED;
}
WERROR _srvsvc_NETRSERVERTRANSPORTDELEX(struct pipes_struct *p,
struct srvsvc_NETRSERVERTRANSPORTDELEX *r)
{
p->fault_state = DCERPC_FAULT_OP_RNG_ERROR;
return WERR_NOT_SUPPORTED;
}
/* include the generated boilerplate */
#include "librpc/gen_ndr/ndr_srvsvc_scompat.c"