diff options
Diffstat (limited to 'net/samba422/files/patch-source3_modules_vfs__freebsd.c')
| -rw-r--r-- | net/samba422/files/patch-source3_modules_vfs__freebsd.c | 702 | 
1 files changed, 702 insertions, 0 deletions
| diff --git a/net/samba422/files/patch-source3_modules_vfs__freebsd.c b/net/samba422/files/patch-source3_modules_vfs__freebsd.c new file mode 100644 index 000000000000..9d3e41041117 --- /dev/null +++ b/net/samba422/files/patch-source3_modules_vfs__freebsd.c @@ -0,0 +1,702 @@ +--- source3/modules/vfs_freebsd.c.orig	2025-07-11 10:55:17 UTC ++++ source3/modules/vfs_freebsd.c +@@ -0,0 +1,699 @@ ++/* ++ * This module implements VFS calls specific to FreeBSD ++ * ++ * Copyright (C) Timur I. Bakeyev, 2018 ++ * ++ * This program is free software; you can redistribute it and/or modify ++ * it under the terms of the GNU General Public License as published by ++ * the Free Software Foundation; either version 3 of the License, or ++ * (at your option) any later version. ++ * ++ * This program is distributed in the hope that it will be useful, ++ * but WITHOUT ANY WARRANTY; without even the implied warranty of ++ * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the ++ * GNU General Public License for more details. ++ * ++ * You should have received a copy of the GNU General Public License ++ * along with this program; if not, see <http://www.gnu.org/licenses/>. ++ */ ++ ++#include "includes.h" ++ ++#include "lib/util/tevent_unix.h" ++#include "lib/util/tevent_ntstatus.h" ++#include "system/filesys.h" ++#include "smbd/smbd.h" ++ ++#include <sys/sysctl.h> ++ ++static int vfs_freebsd_debug_level = DBGC_VFS; ++ ++#undef DBGC_CLASS ++#define DBGC_CLASS vfs_freebsd_debug_level ++ ++#ifndef EXTATTR_MAXNAMELEN ++#define EXTATTR_MAXNAMELEN		UINT8_MAX ++#endif ++ ++#define EXTATTR_NAMESPACE(NS)		EXTATTR_NAMESPACE_ ## NS, \ ++					EXTATTR_NAMESPACE_ ## NS ## _STRING ".", \ ++					.data.len = (sizeof(EXTATTR_NAMESPACE_ ## NS ## _STRING ".") - 1) ++ ++#define EXTATTR_EMPTY			0x00 ++#define EXTATTR_USER			0x01 ++#define EXTATTR_SYSTEM			0x02 ++#define EXTATTR_SECURITY		0x03 ++#define EXTATTR_TRUSTED			0x04 ++ ++enum extattr_mode { ++	FREEBSD_EXTATTR_SECURE, ++	FREEBSD_EXTATTR_COMPAT, ++	FREEBSD_EXTATTR_LEGACY ++}; ++ ++struct freebsd_handle_data { ++	enum extattr_mode extattr_mode; ++}; ++ ++typedef struct { ++	int namespace; ++	char name[EXTATTR_MAXNAMELEN+1]; ++	union { ++		uint16_t len; ++		uint16_t flags; ++	} data; ++} extattr_attr; ++ ++static const struct enum_list extattr_mode_param[] = { ++	{ FREEBSD_EXTATTR_SECURE, "secure" },		/*  */ ++	{ FREEBSD_EXTATTR_COMPAT, "compat" },		/*  */ ++	{ FREEBSD_EXTATTR_LEGACY, "legacy" },		/*  */ ++	{ -1, NULL } ++}; ++ ++/* XXX: This order doesn't match namespace ids order! */ ++static extattr_attr extattr[] = { ++	{ EXTATTR_NAMESPACE(EMPTY) }, ++	{ EXTATTR_NAMESPACE(SYSTEM) }, ++	{ EXTATTR_NAMESPACE(USER) }, ++}; ++ ++ ++static bool freebsd_in_jail(void) { ++	int val = 0; ++	size_t val_len = sizeof(val); ++ ++	if((sysctlbyname("security.jail.jailed", &val, &val_len, NULL, 0) != -1) && val == 1) { ++		return true; ++	} ++	return false; ++} ++ ++ ++static uint16_t freebsd_map_attrname(const char *name) ++{ ++	if(name == NULL || name[0] == '\0') { ++		return EXTATTR_EMPTY; ++	} ++ ++	switch(name[0]) { ++		case 'u': ++			if(strncmp(name, "user.", 5) == 0) ++				return EXTATTR_USER; ++			break; ++		case 't': ++			if(strncmp(name, "trusted.", 8) == 0) ++				return EXTATTR_TRUSTED; ++			break; ++		case 's': ++			/* name[1] could be any character, including '\0' */ ++			switch(name[1]) { ++				case 'e': ++					if(strncmp(name, "security.", 9) == 0) ++						return EXTATTR_SECURITY; ++					break; ++				case 'y': ++					if(strncmp(name, "system.", 7) == 0) ++						return EXTATTR_SYSTEM; ++					break; ++			} ++			break; ++	} ++	return EXTATTR_USER; ++} ++ ++ ++/* security, system, trusted or user */ ++static extattr_attr* freebsd_map_xattr(enum extattr_mode extattr_mode, const char *name, extattr_attr *attr) ++{ ++	int attrnamespace = EXTATTR_NAMESPACE_EMPTY; ++	const char *p, *attrname = name; ++ ++	if(name == NULL || name[0] == '\0') { ++		return NULL; ++	} ++ ++	if(attr == NULL) { ++		return NULL; ++	} ++ ++	uint16_t flags = freebsd_map_attrname(name); ++ ++	switch(flags) { ++		case EXTATTR_SECURITY: ++		case EXTATTR_TRUSTED: ++		case EXTATTR_SYSTEM: ++			attrnamespace = (extattr_mode == FREEBSD_EXTATTR_SECURE) ? ++					EXTATTR_NAMESPACE_SYSTEM : ++					EXTATTR_NAMESPACE_USER; ++			break; ++		case EXTATTR_USER: ++			attrnamespace = EXTATTR_NAMESPACE_USER; ++			break; ++		default: ++			/* Default to "user" namespace if nothing else was specified */ ++			attrnamespace = EXTATTR_NAMESPACE_USER; ++			flags = EXTATTR_USER; ++			break; ++	} ++ ++	if (extattr_mode == FREEBSD_EXTATTR_LEGACY) { ++		switch(flags) { ++			case EXTATTR_SECURITY: ++				attrname = name + 9; ++				break; ++			case EXTATTR_TRUSTED: ++				attrname = name + 8; ++				break; ++			case EXTATTR_SYSTEM: ++				attrname = name + 7; ++				break; ++			case EXTATTR_USER: ++				attrname = name + 5; ++				break; ++			default: ++				attrname = ((p=strchr(name, '.')) != NULL) ? p + 1 : name; ++				break; ++		} ++	} ++ ++	attr->namespace = attrnamespace; ++	attr->data.flags = flags; ++	strlcpy(attr->name, attrname, EXTATTR_MAXNAMELEN + 1); ++ ++	return attr; ++} ++ ++ ++static ssize_t extattr_size(struct files_struct *fsp, extattr_attr *attr) ++{ ++	ssize_t result; ++ ++	SMB_ASSERT(!fsp_is_alternate_stream(fsp)); ++ ++	int fd = fsp_get_pathref_fd(fsp); ++ ++	if (fsp->fsp_flags.is_pathref) { ++		const char *path = fsp->fsp_name->base_name; ++		if (fsp->fsp_flags.have_proc_fds) { ++			char buf[PATH_MAX]; ++			path = sys_proc_fd_path(fd, &buf); ++			if (path == NULL) { ++				return -1; ++			} ++		} ++		/* ++		 * This is no longer a handle based call. ++		 */ ++		return extattr_get_file(path, attr->namespace, attr->name, NULL, 0); ++	} ++	else { ++		return extattr_get_fd(fd, attr->namespace, attr->name, NULL, 0); ++	} ++} ++ ++/* ++ * The list of names is returned as an unordered array of NULL-terminated ++ * character strings (attribute names are separated by NULL characters), ++ * like this: ++ *      user.name1\0system.name1\0user.name2\0 ++ * ++ * Filesystems like ext2, ext3 and XFS which implement POSIX ACLs using ++ * extended attributes, might return a list like this: ++ *      system.posix_acl_access\0system.posix_acl_default\0 ++ */ ++/* ++ * The extattr_list_file() returns a list of attributes present in the ++ * requested namespace. Each list entry consists of a single byte containing ++ * the length of the attribute name, followed by the attribute name. The ++ * attribute name is not terminated by ASCII 0 (nul). ++*/ ++static ssize_t freebsd_extattr_list(struct files_struct *fsp, enum extattr_mode extattr_mode, char *list, size_t size) ++{ ++	ssize_t list_size, total_size = 0; ++	char *p, *q, *list_end; ++	int len; ++	/* ++	 Ignore all but user namespace when we are not root or in jail ++	 See: https://bugzilla.samba.org/show_bug.cgi?id=10247 ++	*/ ++	bool as_root = (geteuid() == 0); ++ ++	int ns = (extattr_mode == FREEBSD_EXTATTR_SECURE && as_root) ? 1 : 2; ++ ++	int fd = fsp_get_pathref_fd(fsp); ++ ++	/* Iterate through extattr(2) namespaces */ ++	for(; ns < ARRAY_SIZE(extattr); ns++) { ++		list_size = -1; ++ ++		if (fsp->fsp_flags.is_pathref) { ++			const char *path = fsp->fsp_name->base_name; ++			if (fsp->fsp_flags.have_proc_fds) { ++				char buf[PATH_MAX]; ++				path = sys_proc_fd_path(fd, &buf); ++				if (path == NULL) { ++					return -1; ++				} ++			} ++			/* ++			 * This is no longer a handle based call. ++			 */ ++			list_size = extattr_list_file(path, extattr[ns].namespace, list, size); ++		} ++		else { ++			list_size = extattr_list_fd(fd, extattr[ns].namespace, list, size); ++		} ++		/* Some error happend. Errno should be set by the previous call */ ++		if(list_size < 0) ++			return -1; ++		/* No attributes in this namespace */ ++		if(list_size == 0) ++			continue; ++		/* ++		 Call with an empty buffer may be used to calculate ++		 necessary buffer size. ++		*/ ++		if(list == NULL) { ++			/* ++			 XXX: Unfortunately, we can't say, how many attributes were ++			 returned, so here is the potential problem with the emulation. ++			*/ ++			if(extattr_mode == FREEBSD_EXTATTR_LEGACY) { ++				/* ++				 Take the worse case of one char attribute names - ++				 two bytes per name plus one more for sanity. ++				*/ ++				total_size += list_size + (list_size/2 + 1)*extattr[ns].data.len; ++			} ++			else { ++				total_size += list_size; ++			} ++			continue; ++		} ++ ++		if(extattr_mode == FREEBSD_EXTATTR_LEGACY) { ++			/* Count necessary offset to fit namespace prefixes */ ++			int extra_len = 0; ++			uint16_t flags; ++			list_end = list + list_size; ++			for(list_size = 0, p = q = list; p < list_end; p += len) { ++				len = p[0] + 1; ++				(void)strlcpy(q, p + 1, len); ++				flags = freebsd_map_attrname(q); ++				/* Skip secure attributes for non-root user */ ++				if(extattr_mode != FREEBSD_EXTATTR_SECURE && !as_root && flags > EXTATTR_USER) { ++					continue; ++				} ++				if(flags <= EXTATTR_USER) { ++					/* Don't count trailing '\0' */ ++					extra_len += extattr[ns].data.len; ++				} ++				list_size += len; ++				q += len; ++			} ++			total_size += list_size + extra_len; ++			/* Buffer is too small to fit the results */ ++			if(total_size > size) { ++				errno = ERANGE; ++				return -1; ++			} ++			/* Shift results backwards, so we can prepend prefixes */ ++			list_end = list + extra_len; ++			p = (char*)memmove(list_end, list, list_size); ++			/* ++			 We enter the loop with `p` pointing to the shifted list and ++			 `extra_len` having the total margin between `list` and `p` ++			*/ ++			for(list_end += list_size; p < list_end; p += len) { ++				len = strlen(p) + 1; ++				flags = freebsd_map_attrname(p); ++				if(flags <= EXTATTR_USER) { ++					/* Add namespace prefix */ ++					(void)strncpy(list, extattr[ns].name, extattr[ns].data.len); ++					list += extattr[ns].data.len; ++				} ++				/* Append attribute name */ ++				(void)strlcpy(list, p, len); ++				list += len; ++			} ++		} ++		else { ++			/* Convert UCSD strings into nul-terminated strings */ ++			for(list_end = list + list_size; list < list_end; list += len) { ++				len = list[0] + 1; ++				(void)strlcpy(list, list + 1, len); ++			} ++			total_size += list_size; ++		} ++	} ++	return total_size; ++} ++ ++/* ++static ssize_t freebsd_fgetxattr_size(struct vfs_handle_struct *handle, ++				     struct files_struct *fsp, ++				     const char *name) ++{ ++	struct freebsd_handle_data *data; ++	extattr_attr attr; ++ ++	SMB_ASSERT(!fsp_is_alternate_stream(fsp)); ++ ++	SMB_VFS_HANDLE_GET_DATA(handle, data, ++				struct freebsd_handle_data, ++				return -1); ++ ++	if(!freebsd_map_xattr(data->extattr_mode, name, &attr)) { ++		errno = EINVAL; ++		return -1; ++	} ++ ++	if(data->extattr_mode != FREEBSD_EXTATTR_SECURE && geteuid() != 0 && attr.data.flags > EXTATTR_USER) { ++		errno = ENOATTR; ++		return -1; ++	} ++ ++	return extattr_size(fsp, &attr); ++} ++*/ ++ ++/* VFS entries */ ++static ssize_t freebsd_fgetxattr(struct vfs_handle_struct *handle, ++				 struct files_struct *fsp, ++				 const char *name, ++				 void *value, ++				 size_t size) ++{ ++#if defined(HAVE_XATTR_EXTATTR) ++	struct freebsd_handle_data *data; ++	extattr_attr attr; ++	ssize_t res; ++	int fd; ++ ++	SMB_ASSERT(!fsp_is_alternate_stream(fsp)); ++ ++	SMB_VFS_HANDLE_GET_DATA(handle, data, ++				struct freebsd_handle_data, ++				return -1); ++ ++	if(!freebsd_map_xattr(data->extattr_mode, name, &attr)) { ++		errno = EINVAL; ++		return -1; ++	} ++ ++	/* Filter out 'secure' entries */ ++	if(data->extattr_mode != FREEBSD_EXTATTR_SECURE && geteuid() != 0 && attr.data.flags > EXTATTR_USER) { ++		errno = ENOATTR; ++		return -1; ++	} ++ ++	/* ++	 * The BSD implementation has a nasty habit of silently truncating ++	 * the returned value to the size of the buffer, so we have to check ++	 * that the buffer is large enough to fit the returned value. ++	 */ ++	if((res=extattr_size(fsp, &attr)) < 0) { ++		return -1; ++	} ++ ++	if (size == 0) { ++		return res; ++	} ++	else if (res > size) { ++		errno = ERANGE; ++		return -1; ++	} ++ ++	fd = fsp_get_pathref_fd(fsp); ++ ++	if (fsp->fsp_flags.is_pathref) { ++		const char *path = fsp->fsp_name->base_name; ++		if (fsp->fsp_flags.have_proc_fds) { ++			char buf[PATH_MAX]; ++			path = sys_proc_fd_path(fd, &buf); ++			if (path == NULL) { ++				return -1; ++			} ++		} ++		/* ++		 * This is no longer a handle based call. ++		 */ ++		return extattr_get_file(path, attr.namespace, attr.name, value, size); ++	} ++	else { ++		return extattr_get_fd(fd, attr.namespace, attr.name, value, size); ++	} ++	return -1; ++#else ++	errno = ENOSYS; ++	return -1; ++#endif ++} ++ ++ ++static ssize_t freebsd_flistxattr(struct vfs_handle_struct *handle, ++				  struct files_struct *fsp, ++				  char *list, ++				  size_t size) ++{ ++#if defined(HAVE_XATTR_EXTATTR) ++	struct freebsd_handle_data *data; ++ ++	SMB_ASSERT(!fsp_is_alternate_stream(fsp)); ++ ++	SMB_VFS_HANDLE_GET_DATA(handle, data, ++				struct freebsd_handle_data, ++				return -1); ++ ++	return freebsd_extattr_list(fsp, data->extattr_mode, list, size); ++#else ++	errno = ENOSYS; ++	return -1; ++#endif ++} ++ ++ ++static int freebsd_fremovexattr(struct vfs_handle_struct *handle, ++				struct files_struct *fsp, ++				const char *name) ++{ ++#if defined(HAVE_XATTR_EXTATTR) ++	struct freebsd_handle_data *data; ++	extattr_attr attr; ++	int fd; ++ ++	SMB_ASSERT(!fsp_is_alternate_stream(fsp)); ++ ++	SMB_VFS_HANDLE_GET_DATA(handle, data, ++				struct freebsd_handle_data, ++				return -1); ++ ++	if(!freebsd_map_xattr(data->extattr_mode, name, &attr)) { ++		errno = EINVAL; ++		return -1; ++	} ++ ++	/* Filter out 'secure' entries */ ++	if(data->extattr_mode != FREEBSD_EXTATTR_SECURE && geteuid() != 0 && attr.data.flags > EXTATTR_USER) { ++		errno = ENOATTR; ++		return -1; ++	} ++ ++	fd = fsp_get_pathref_fd(fsp); ++ ++	if (fsp->fsp_flags.is_pathref) { ++		const char *path = fsp->fsp_name->base_name; ++		if (fsp->fsp_flags.have_proc_fds) { ++			char buf[PATH_MAX]; ++			path = sys_proc_fd_path(fd, &buf); ++			if (path == NULL) { ++				return -1; ++			} ++		} ++		/* ++		 * This is no longer a handle based call. ++		 */ ++		return extattr_delete_file(path, attr.namespace, attr.name); ++	} ++	else { ++		return extattr_delete_fd(fd, attr.namespace, attr.name); ++	} ++	return -1; ++#else ++	errno = ENOSYS; ++	return -1; ++#endif ++} ++ ++ ++static int freebsd_fsetxattr(struct vfs_handle_struct *handle, ++			     struct files_struct *fsp, ++			     const char *name, ++			     const void *value, ++			     size_t size, ++			     int flags) ++{ ++#if defined(HAVE_XATTR_EXTATTR) ++	struct freebsd_handle_data *data; ++	extattr_attr attr; ++	ssize_t res; ++	int fd; ++ ++	SMB_ASSERT(!fsp_is_alternate_stream(fsp)); ++ ++	SMB_VFS_HANDLE_GET_DATA(handle, data, ++				struct freebsd_handle_data, ++				return -1); ++ ++	if(!freebsd_map_xattr(data->extattr_mode, name, &attr)) { ++		errno = EINVAL; ++		return -1; ++	} ++ ++	/* Filter out 'secure' entries */ ++	if(data->extattr_mode != FREEBSD_EXTATTR_SECURE && geteuid() != 0 && attr.data.flags > EXTATTR_USER) { ++		errno = ENOATTR; ++		return -1; ++	} ++ ++	if (flags) { ++		/* Check attribute existence */ ++		res = extattr_size(fsp, &attr); ++		if (res < 0) { ++			/* REPLACE attribute, that doesn't exist */ ++			if ((flags & XATTR_REPLACE) && errno == ENOATTR) { ++				errno = ENOATTR; ++				return -1; ++			} ++			/* Ignore other errors */ ++		} ++		else { ++			/* CREATE attribute, that already exists */ ++			if (flags & XATTR_CREATE) { ++				errno = EEXIST; ++				return -1; ++			} ++		} ++	} ++ ++	fd = fsp_get_pathref_fd(fsp); ++ ++	if (fsp->fsp_flags.is_pathref) { ++		const char *path = fsp->fsp_name->base_name; ++		if (fsp->fsp_flags.have_proc_fds) { ++			char buf[PATH_MAX]; ++			path = sys_proc_fd_path(fd, &buf); ++			if (path == NULL) { ++				return -1; ++			} ++		} ++		/* ++		 * This is no longer a handle based call. ++		 */ ++		res = extattr_set_file(path, attr.namespace, attr.name, value, size); ++	} ++	else { ++		res = extattr_set_fd(fd, attr.namespace, attr.name, value, size); ++	} ++	return (res >= 0) ? 0 : -1; ++#else ++	errno = ENOSYS; ++	return -1; ++#endif ++} ++ ++ ++static int freebsd_connect(struct vfs_handle_struct *handle, ++			   const char *service, ++			   const char *user) ++{ ++	struct freebsd_handle_data *data; ++	int enumval, saved_errno; ++ ++	int ret = SMB_VFS_NEXT_CONNECT(handle, service, user); ++ ++	if (ret < 0) { ++		return ret; ++	} ++ ++	data = talloc_zero(handle->conn, struct freebsd_handle_data); ++	if (!data) { ++		saved_errno = errno; ++		SMB_VFS_NEXT_DISCONNECT(handle); ++		DEBUG(0, ("talloc_zero() failed\n")); ++		errno = saved_errno; ++		return -1; ++	} ++ ++	enumval = lp_parm_enum(SNUM(handle->conn), "freebsd", ++			       "extattr mode", extattr_mode_param, FREEBSD_EXTATTR_LEGACY); ++	if (enumval == -1) { ++		saved_errno = errno; ++		SMB_VFS_NEXT_DISCONNECT(handle); ++		DBG_DEBUG("value for freebsd: 'extattr mode' is unknown\n"); ++		errno = saved_errno; ++		return -1; ++	} ++ ++	if(freebsd_in_jail()) { ++		enumval = FREEBSD_EXTATTR_COMPAT; ++		DBG_WARNING("running in jail, enforcing 'compat' mode\n"); ++	} ++ ++	data->extattr_mode = (enum extattr_mode)enumval; ++ ++	SMB_VFS_HANDLE_SET_DATA(handle, data, NULL, ++				struct freebsd_handle_data, ++				return -1); ++ ++	DBG_DEBUG("connect to service[%s] with '%s' extattr mode\n", ++		  service, extattr_mode_param[data->extattr_mode].name); ++ ++	return 0; ++} ++ ++ ++static void freebsd_disconnect(vfs_handle_struct *handle) ++{ ++	SMB_VFS_NEXT_DISCONNECT(handle); ++} ++ ++/* VFS operations structure */ ++ ++struct vfs_fn_pointers freebsd_fns = { ++	/* Disk operations */ ++	.connect_fn = freebsd_connect, ++	.disconnect_fn = freebsd_disconnect, ++ ++	/* EA operations. */ ++	.getxattrat_send_fn = vfs_not_implemented_getxattrat_send, ++	.getxattrat_recv_fn = vfs_not_implemented_getxattrat_recv, ++	.fgetxattr_fn = freebsd_fgetxattr, ++	.flistxattr_fn = freebsd_flistxattr, ++	.fremovexattr_fn = freebsd_fremovexattr, ++	.fsetxattr_fn = freebsd_fsetxattr, ++}; ++ ++static_decl_vfs; ++NTSTATUS vfs_freebsd_init(TALLOC_CTX *ctx) ++{ ++	NTSTATUS ret; ++ ++	ret = smb_register_vfs(SMB_VFS_INTERFACE_VERSION, "freebsd", ++				&freebsd_fns); ++ ++	if (!NT_STATUS_IS_OK(ret)) { ++		return ret; ++	} ++ ++	vfs_freebsd_debug_level = debug_add_class("freebsd"); ++	if (vfs_freebsd_debug_level == -1) { ++		vfs_freebsd_debug_level = DBGC_VFS; ++		DEBUG(0, ("vfs_freebsd: Couldn't register custom debugging class!\n")); ++	} else { ++		DEBUG(10, ("vfs_freebsd: Debug class number of 'fileid': %d\n", vfs_freebsd_debug_level)); ++	} ++ ++	return ret; ++} | 
