1
0
mirror of https://github.com/samba-team/samba.git synced 2024-12-23 17:34:34 +03:00
samba-mirror/source3/smbd/smb1_utils.c
Volker Lendecke 3ab6a9a9bf smbd: Inline dup_file_fsp() into fcb_or_dos_open()
Only used once, an not really complex

Signed-off-by: Volker Lendecke <vl@samba.org>
Reviewed-by: Ralph Boehme <slow@samba.org>
2024-11-12 18:07:33 +00:00

288 lines
7.5 KiB
C

/*
* Unix SMB/CIFS implementation.
* Util functions valid in the SMB1 server
*
* Copyright (C) Volker Lendecke 2019
* Copyright by the authors of the functions moved here eventually
*
* This program is free software; you can redistribute it and/or modify
* it under the terms of the GNU General Public License as published by
* the Free Software Foundation; either version 3 of the License, or
* (at your option) any later version.
*
* This program is distributed in the hope that it will be useful,
* but WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
* GNU General Public License for more details.
*
* You should have received a copy of the GNU General Public License
* along with this program. If not, see <http://www.gnu.org/licenses/>.
*/
#include "includes.h"
#include "smbd/smbd.h"
#include "smbd/globals.h"
#include "libcli/security/security.h"
#include "lib/util/sys_rw_data.h"
#include "smbd/fd_handle.h"
/****************************************************************************
Special FCB or DOS processing in the case of a sharing violation.
Try and find a duplicated file handle.
****************************************************************************/
struct files_struct *fcb_or_dos_open(
struct smb_request *req,
const struct smb_filename *smb_fname,
uint32_t access_mask,
uint32_t create_options,
uint32_t private_flags)
{
struct connection_struct *conn = req->conn;
struct file_id id = vfs_file_id_from_sbuf(conn, &smb_fname->st);
struct files_struct *fsp = NULL, *new_fsp = NULL;
size_t new_refcount;
NTSTATUS status;
if ((private_flags &
(NTCREATEX_FLAG_DENY_DOS|
NTCREATEX_FLAG_DENY_FCB))
== 0) {
return NULL;
}
for(fsp = file_find_di_first(conn->sconn, id, true);
fsp != NULL;
fsp = file_find_di_next(fsp, true)) {
DBG_DEBUG("Checking file %s, fd = %d, vuid = %"PRIu64", "
"file_pid = %"PRIu16", "
"private_options = 0x%"PRIx32", "
"access_mask = 0x%"PRIx32"\n",
fsp_str_dbg(fsp),
fsp_get_pathref_fd(fsp),
fsp->vuid,
fsp->file_pid,
fh_get_private_options(fsp->fh),
fsp->access_mask);
if (fsp_get_pathref_fd(fsp) != -1 &&
fsp->vuid == req->vuid &&
fsp->file_pid == req->smbpid &&
(fh_get_private_options(fsp->fh) &
(NTCREATEX_FLAG_DENY_DOS |
NTCREATEX_FLAG_DENY_FCB)) &&
(fsp->access_mask & FILE_WRITE_DATA) &&
strequal(fsp->fsp_name->base_name, smb_fname->base_name) &&
strequal(fsp->fsp_name->stream_name,
smb_fname->stream_name)) {
DBG_DEBUG("file match\n");
break;
}
}
if (fsp == NULL) {
return NULL;
}
/* quite an insane set of semantics ... */
if (is_executable(smb_fname->base_name) &&
(fh_get_private_options(fsp->fh) & NTCREATEX_FLAG_DENY_DOS)) {
DBG_DEBUG("file fail due to is_executable.\n");
return NULL;
}
status = file_new(req, conn, &new_fsp);
if (!NT_STATUS_IS_OK(status)) {
DBG_DEBUG("file_new failed: %s\n", nt_errstr(status));
return NULL;
}
/*
* Share the fsp->fh between old and new
*/
TALLOC_FREE(new_fsp->fh);
new_fsp->fh = fsp->fh;
new_refcount = fh_get_refcount(new_fsp->fh) + 1;
fh_set_refcount(new_fsp->fh, new_refcount);
new_fsp->file_id = fsp->file_id;
new_fsp->initial_allocation_size = fsp->initial_allocation_size;
new_fsp->file_pid = fsp->file_pid;
new_fsp->vuid = fsp->vuid;
new_fsp->open_time = fsp->open_time;
new_fsp->access_mask = access_mask;
new_fsp->oplock_type = fsp->oplock_type;
new_fsp->fsp_flags = fsp->fsp_flags;
new_fsp->fsp_flags.can_read = ((access_mask & FILE_READ_DATA) != 0);
new_fsp->fsp_flags.can_write = CAN_WRITE(fsp->conn) &&
((access_mask & (FILE_WRITE_DATA |
FILE_APPEND_DATA)) !=
0);
if (fsp->fsp_name->twrp != 0) {
new_fsp->fsp_flags.can_write = false;
}
status = fsp_set_smb_fname(new_fsp, fsp->fsp_name);
if (!NT_STATUS_IS_OK(status)) {
DBG_DEBUG("fsp_set_smb_fname failed: %s\n", nt_errstr(status));
file_free(req, new_fsp);
return NULL;
}
return new_fsp;
}
/****************************************************************************
Send a keepalive packet (rfc1002).
****************************************************************************/
bool send_keepalive(int client)
{
unsigned char buf[4];
buf[0] = NBSSkeepalive;
buf[1] = buf[2] = buf[3] = 0;
return(write_data(client,(char *)buf,4) == 4);
}
/*******************************************************************
Add a string to the end of a smb_buf, adjusting bcc and smb_len.
Return the bytes added
********************************************************************/
ssize_t message_push_string(uint8_t **outbuf, const char *str, int flags)
{
size_t buf_size = smb_len(*outbuf) + 4;
size_t grow_size;
size_t result = 0;
uint8_t *tmp;
NTSTATUS status;
/*
* We need to over-allocate, now knowing what srvstr_push will
* actually use. This is very generous by incorporating potential
* padding, the terminating 0 and at most 4 chars per UTF-16 code
* point.
*/
grow_size = (strlen(str) + 2) * 4;
if (!(tmp = talloc_realloc(NULL, *outbuf, uint8_t,
buf_size + grow_size))) {
DEBUG(0, ("talloc failed\n"));
return -1;
}
status = srvstr_push((char *)tmp, SVAL(tmp, smb_flg2),
tmp + buf_size, str, grow_size, flags, &result);
if (!NT_STATUS_IS_OK(status)) {
DEBUG(0, ("srvstr_push failed\n"));
return -1;
}
/*
* Ensure we clear out the extra data we have
* grown the buffer by, but not written to.
*/
if (buf_size + result < buf_size) {
return -1;
}
if (grow_size < result) {
return -1;
}
memset(tmp + buf_size + result, '\0', grow_size - result);
set_message_bcc((char *)tmp, smb_buflen(tmp) + result);
*outbuf = tmp;
return result;
}
/*
* Deal with the SMB1 semantics of sending a pathname with a
* wildcard as the terminal component for a SMB1search or
* trans2 findfirst.
*/
NTSTATUS filename_convert_smb1_search_path(TALLOC_CTX *ctx,
connection_struct *conn,
char *name_in,
uint32_t ucf_flags,
struct files_struct **_dirfsp,
struct smb_filename **_smb_fname_out,
char **_mask_out)
{
NTSTATUS status;
char *p = NULL;
char *mask = NULL;
struct smb_filename *smb_fname = NULL;
NTTIME twrp = 0;
*_smb_fname_out = NULL;
*_dirfsp = NULL;
*_mask_out = NULL;
DBG_DEBUG("name_in: %s\n", name_in);
if (ucf_flags & UCF_GMT_PATHNAME) {
extract_snapshot_token(name_in, &twrp);
ucf_flags &= ~UCF_GMT_PATHNAME;
}
/* Get the original lcomp. */
mask = get_original_lcomp(ctx, conn, name_in, ucf_flags);
if (mask == NULL) {
return NT_STATUS_NO_MEMORY;
}
if (mask[0] == '\0') {
/* Windows and OS/2 systems treat search on the root as * */
TALLOC_FREE(mask);
mask = talloc_strdup(ctx, "*");
if (mask == NULL) {
return NT_STATUS_NO_MEMORY;
}
}
DBG_DEBUG("mask = %s\n", mask);
/*
* Remove the terminal component so
* filename_convert_dirfsp never sees the mask.
*/
p = strrchr_m(name_in, '/');
if (p == NULL) {
/* filename_convert_dirfsp handles a '\0' name. */
name_in[0] = '\0';
} else {
*p = '\0';
}
DBG_DEBUG("For filename_convert_dirfsp: name_in = %s\n", name_in);
/* Convert the parent directory path. */
status = filename_convert_dirfsp(ctx,
conn,
name_in,
ucf_flags,
twrp,
_dirfsp,
&smb_fname);
if (!NT_STATUS_IS_OK(status)) {
DBG_DEBUG("filename_convert error for %s: %s\n",
name_in,
nt_errstr(status));
}
*_smb_fname_out = talloc_move(ctx, &smb_fname);
*_mask_out = talloc_move(ctx, &mask);
return status;
}