1 /*
2 * This module implements VFS calls specific to FreeBSD
3 *
4 * Copyright (C) Timur I. Bakeyev, 2018
5 *
6 * This program is free software; you can redistribute it and/or modify
7 * it under the terms of the GNU General Public License as published by
8 * the Free Software Foundation; either version 3 of the License, or
9 * (at your option) any later version.
10 *
11 * This program is distributed in the hope that it will be useful,
12 * but WITHOUT ANY WARRANTY; without even the implied warranty of
13 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
14 * GNU General Public License for more details.
15 *
16 * You should have received a copy of the GNU General Public License
17 * along with this program; if not, see <http://www.gnu.org/licenses/>.
18 */
19
20 #include "includes.h"
21
22 #include "lib/util/tevent_unix.h"
23 #include "lib/util/tevent_ntstatus.h"
24 #include "system/filesys.h"
25
26 #include <sys/sysctl.h>
27
28 static int vfs_freebsd_debug_level = DBGC_VFS;
29
30 #undef DBGC_CLASS
31 #define DBGC_CLASS vfs_freebsd_debug_level
32
33 #ifndef EXTATTR_MAXNAMELEN
34 #define EXTATTR_MAXNAMELEN UINT8_MAX
35 #endif
36
37 #define EXTATTR_NAMESPACE(NS) EXTATTR_NAMESPACE_ ## NS, \
38 EXTATTR_NAMESPACE_ ## NS ## _STRING ".", \
39 .data.len = (sizeof(EXTATTR_NAMESPACE_ ## NS ## _STRING ".") - 1)
40
41 #define EXTATTR_EMPTY 0x00
42 #define EXTATTR_USER 0x01
43 #define EXTATTR_SYSTEM 0x02
44 #define EXTATTR_SECURITY 0x03
45 #define EXTATTR_TRUSTED 0x04
46
47 enum extattr_mode {
48 FREEBSD_EXTATTR_SECURE,
49 FREEBSD_EXTATTR_COMPAT,
50 FREEBSD_EXTATTR_LEGACY
51 };
52
53 typedef struct {
54 int namespace;
55 char name[EXTATTR_MAXNAMELEN+1];
56 union {
57 uint16_t len;
58 uint16_t flags;
59 } data;
60 } extattr_attr;
61
62 typedef struct {
63 enum {
64 EXTATTR_FILE, EXTATTR_LINK, EXTATTR_FDES
65 } method;
66 union {
67 const char *path;
68 int filedes;
69 } param;
70 } extattr_arg;
71
72 static const struct enum_list extattr_mode_param[] = {
73 { FREEBSD_EXTATTR_SECURE, "secure" }, /* */
74 { FREEBSD_EXTATTR_COMPAT, "compat" }, /* */
75 { FREEBSD_EXTATTR_LEGACY, "legacy" }, /* */
76 { -1, NULL }
77 };
78
79
80 /* */
81 struct freebsd_handle_data {
82 enum extattr_mode extattr_mode;
83 };
84
85
86 /* XXX: This order doesn't match namespace ids order! */
87 static extattr_attr extattr[] = {
88 { EXTATTR_NAMESPACE(EMPTY) },
89 { EXTATTR_NAMESPACE(SYSTEM) },
90 { EXTATTR_NAMESPACE(USER) },
91 };
92
93
freebsd_in_jail(void)94 static bool freebsd_in_jail(void) {
95 int val = 0;
96 size_t val_len = sizeof(val);
97
98 if((sysctlbyname("security.jail.jailed", &val, &val_len, NULL, 0) != -1) && val == 1) {
99 return true;
100 }
101 return false;
102 }
103
freebsd_map_attrname(const char * name)104 static uint16_t freebsd_map_attrname(const char *name)
105 {
106 if(name == NULL || name[0] == '\0') {
107 return EXTATTR_EMPTY;
108 }
109
110 switch(name[0]) {
111 case 'u':
112 if(strncmp(name, "user.", 5) == 0)
113 return EXTATTR_USER;
114 break;
115 case 't':
116 if(strncmp(name, "trusted.", 8) == 0)
117 return EXTATTR_TRUSTED;
118 break;
119 case 's':
120 /* name[1] could be any character, including '\0' */
121 switch(name[1]) {
122 case 'e':
123 if(strncmp(name, "security.", 9) == 0)
124 return EXTATTR_SECURITY;
125 break;
126 case 'y':
127 if(strncmp(name, "system.", 7) == 0)
128 return EXTATTR_SYSTEM;
129 break;
130 }
131 break;
132 }
133 return EXTATTR_USER;
134 }
135
136 /* security, system, trusted or user */
freebsd_map_xattr(enum extattr_mode extattr_mode,const char * name,extattr_attr * attr)137 static extattr_attr* freebsd_map_xattr(enum extattr_mode extattr_mode, const char *name, extattr_attr *attr)
138 {
139 int attrnamespace = EXTATTR_NAMESPACE_EMPTY;
140 const char *p, *attrname = name;
141
142 if(name == NULL || name[0] == '\0') {
143 return NULL;
144 }
145
146 if(attr == NULL) {
147 return NULL;
148 }
149
150 uint16_t flags = freebsd_map_attrname(name);
151
152 switch(flags) {
153 case EXTATTR_SECURITY:
154 case EXTATTR_TRUSTED:
155 case EXTATTR_SYSTEM:
156 attrnamespace = (extattr_mode == FREEBSD_EXTATTR_SECURE) ?
157 EXTATTR_NAMESPACE_SYSTEM :
158 EXTATTR_NAMESPACE_USER;
159 break;
160 case EXTATTR_USER:
161 attrnamespace = EXTATTR_NAMESPACE_USER;
162 break;
163 default:
164 /* Default to "user" namespace if nothing else was specified */
165 attrnamespace = EXTATTR_NAMESPACE_USER;
166 flags = EXTATTR_USER;
167 break;
168 }
169
170 if (extattr_mode == FREEBSD_EXTATTR_LEGACY) {
171 switch(flags) {
172 case EXTATTR_SECURITY:
173 attrname = name + 9;
174 break;
175 case EXTATTR_TRUSTED:
176 attrname = name + 8;
177 break;
178 case EXTATTR_SYSTEM:
179 attrname = name + 7;
180 break;
181 case EXTATTR_USER:
182 attrname = name + 5;
183 break;
184 default:
185 attrname = ((p=strchr(name, '.')) != NULL) ? p + 1 : name;
186 break;
187 }
188 }
189
190 attr->namespace = attrnamespace;
191 attr->data.flags = flags;
192 strlcpy(attr->name, attrname, EXTATTR_MAXNAMELEN + 1);
193
194 return attr;
195 }
196
extattr_size(extattr_arg arg,extattr_attr * attr)197 static ssize_t extattr_size(extattr_arg arg, extattr_attr *attr)
198 {
199 ssize_t result;
200
201 switch(arg.method) {
202 #if defined(HAVE_XATTR_EXTATTR)
203 case EXTATTR_FILE:
204 result = extattr_get_file(arg.param.path, attr->namespace, attr->name, NULL, 0);
205 break;
206 case EXTATTR_LINK:
207 result = extattr_get_link(arg.param.path, attr->namespace, attr->name, NULL, 0);
208 break;
209 case EXTATTR_FDES:
210 result = extattr_get_fd(arg.param.filedes, attr->namespace, attr->name, NULL, 0);
211 break;
212 #endif
213 default:
214 errno = ENOSYS;
215 return -1;
216 }
217
218 if(result < 0) {
219 errno = EINVAL;
220 return -1;
221 }
222
223 return result;
224 }
225
226
227 /*
228 * The list of names is returned as an unordered array of NULL-terminated
229 * character strings (attribute names are separated by NULL characters),
230 * like this:
231 * user.name1\0system.name1\0user.name2\0
232 *
233 * Filesystems like ext2, ext3 and XFS which implement POSIX ACLs using
234 * extended attributes, might return a list like this:
235 * system.posix_acl_access\0system.posix_acl_default\0
236 */
237 /*
238 * The extattr_list_file() returns a list of attributes present in the
239 * requested namespace. Each list entry consists of a single byte containing
240 * the length of the attribute name, followed by the attribute name. The
241 * attribute name is not terminated by ASCII 0 (nul).
242 */
243
freebsd_extattr_list(extattr_arg arg,enum extattr_mode extattr_mode,char * list,size_t size)244 static ssize_t freebsd_extattr_list(extattr_arg arg, enum extattr_mode extattr_mode, char *list, size_t size)
245 {
246 ssize_t list_size, total_size = 0;
247 char *p, *q, *list_end;
248 int len;
249 /*
250 Ignore all but user namespace when we are not root or in jail
251 See: https://bugzilla.samba.org/show_bug.cgi?id=10247
252 */
253 bool as_root = (geteuid() == 0);
254
255 int ns = (extattr_mode == FREEBSD_EXTATTR_SECURE && as_root) ? 1 : 2;
256
257 /* Iterate through extattr(2) namespaces */
258 for(; ns < ARRAY_SIZE(extattr); ns++) {
259 switch(arg.method) {
260 #if defined(HAVE_XATTR_EXTATTR)
261 case EXTATTR_FILE:
262 list_size = extattr_list_file(arg.param.path, extattr[ns].namespace, list, size);
263 break;
264 case EXTATTR_LINK:
265 list_size = extattr_list_link(arg.param.path, extattr[ns].namespace, list, size);
266 break;
267 case EXTATTR_FDES:
268 list_size = extattr_list_fd(arg.param.filedes, extattr[ns].namespace, list, size);
269 break;
270 #endif
271 default:
272 errno = ENOSYS;
273 return -1;
274 }
275 /* Some error happend. Errno should be set by the previous call */
276 if(list_size < 0)
277 return -1;
278 /* No attributes in this namespace */
279 if(list_size == 0)
280 continue;
281 /*
282 Call with an empty buffer may be used to calculate
283 necessary buffer size.
284 */
285 if(list == NULL) {
286 /*
287 XXX: Unfortunately, we can't say, how many attributes were
288 returned, so here is the potential problem with the emulation.
289 */
290 if(extattr_mode == FREEBSD_EXTATTR_LEGACY) {
291 /*
292 Take the worse case of one char attribute names -
293 two bytes per name plus one more for sanity.
294 */
295 total_size += list_size + (list_size/2 + 1)*extattr[ns].data.len;
296 }
297 else {
298 total_size += list_size;
299 }
300 continue;
301 }
302
303 if(extattr_mode == FREEBSD_EXTATTR_LEGACY) {
304 /* Count necessary offset to fit namespace prefixes */
305 int extra_len = 0;
306 uint16_t flags;
307 list_end = list + list_size;
308 for(list_size = 0, p = q = list; p < list_end; p += len) {
309 len = p[0] + 1;
310 (void)strlcpy(q, p + 1, len);
311 flags = freebsd_map_attrname(q);
312 /* Skip secure attributes for non-root user */
313 if(extattr_mode != FREEBSD_EXTATTR_SECURE && !as_root && flags > EXTATTR_USER) {
314 continue;
315 }
316 if(flags <= EXTATTR_USER) {
317 /* Don't count trailing '\0' */
318 extra_len += extattr[ns].data.len;
319 }
320 list_size += len;
321 q += len;
322 }
323 total_size += list_size + extra_len;
324 /* Buffer is too small to fit the results */
325 if(total_size > size) {
326 errno = ERANGE;
327 return -1;
328 }
329 /* Shift results backwards, so we can prepend prefixes */
330 list_end = list + extra_len;
331 p = (char*)memmove(list_end, list, list_size);
332 /*
333 We enter the loop with `p` pointing to the shifted list and
334 `extra_len` having the total margin between `list` and `p`
335 */
336 for(list_end += list_size; p < list_end; p += len) {
337 len = strlen(p) + 1;
338 flags = freebsd_map_attrname(p);
339 if(flags <= EXTATTR_USER) {
340 /* Add namespace prefix */
341 (void)strncpy(list, extattr[ns].name, extattr[ns].data.len);
342 list += extattr[ns].data.len;
343 }
344 /* Append attribute name */
345 (void)strlcpy(list, p, len);
346 list += len;
347 }
348 }
349 else {
350 /* Convert UCSD strings into nul-terminated strings */
351 for(list_end = list + list_size; list < list_end; list += len) {
352 len = list[0] + 1;
353 (void)strlcpy(list, list + 1, len);
354 }
355 total_size += list_size;
356 }
357 }
358 return total_size;
359 }
360
361 /*
362 static ssize_t freebsd_getxattr_size(vfs_handle_struct *handle,
363 const struct smb_filename *smb_fname,
364 const char *name)
365 {
366 struct freebsd_handle_data *data;
367 extattr_arg arg = { EXTATTR_FILE, smb_fname->base_name };
368 extattr_attr attr;
369
370
371 SMB_VFS_HANDLE_GET_DATA(handle, data,
372 struct freebsd_handle_data,
373 return -1);
374
375 if(!freebsd_map_xattr(data->extattr_mode, name, &attr)) {
376 errno = EINVAL;
377 return -1;
378 }
379
380 if(data->extattr_mode != FREEBSD_EXTATTR_SECURE && geteuid() != 0 && attr.data.flags > EXTATTR_USER) {
381 errno = ENOATTR;
382 return -1;
383 }
384
385 return extattr_size(arg, &attr);
386 }
387 */
388
389 /* VFS entries */
freebsd_getxattr(vfs_handle_struct * handle,const struct smb_filename * smb_fname,const char * name,void * value,size_t size)390 static ssize_t freebsd_getxattr(vfs_handle_struct *handle,
391 const struct smb_filename *smb_fname,
392 const char *name,
393 void *value,
394 size_t size)
395 {
396 #if defined(HAVE_XATTR_EXTATTR)
397 struct freebsd_handle_data *data;
398 extattr_arg arg = { EXTATTR_FILE, .param.path = smb_fname->base_name };
399 extattr_attr attr;
400 ssize_t res;
401
402 SMB_VFS_HANDLE_GET_DATA(handle, data,
403 struct freebsd_handle_data,
404 return -1);
405
406 if(!freebsd_map_xattr(data->extattr_mode, name, &attr)) {
407 errno = EINVAL;
408 return -1;
409 }
410
411 /* Filter out 'secure' entries */
412 if(data->extattr_mode != FREEBSD_EXTATTR_SECURE && geteuid() != 0 && attr.data.flags > EXTATTR_USER) {
413 errno = ENOATTR;
414 return -1;
415 }
416
417 /*
418 * The BSD implementation has a nasty habit of silently truncating
419 * the returned value to the size of the buffer, so we have to check
420 * that the buffer is large enough to fit the returned value.
421 */
422 if((res=extattr_size(arg, &attr)) < 0) {
423 return -1;
424 }
425
426 if (size == 0) {
427 return res;
428 }
429 else if (res > size) {
430 errno = ERANGE;
431 return -1;
432 }
433
434 if((res=extattr_get_file(smb_fname->base_name, attr.namespace, attr.name, value, size)) >= 0) {
435 return res;
436 }
437 return -1;
438 #else
439 errno = ENOSYS;
440 return -1;
441 #endif
442 }
443
444
freebsd_fgetxattr(vfs_handle_struct * handle,struct files_struct * fsp,const char * name,void * value,size_t size)445 static ssize_t freebsd_fgetxattr(vfs_handle_struct *handle,
446 struct files_struct *fsp, const char *name,
447 void *value, size_t size)
448 {
449 #if defined(HAVE_XATTR_EXTATTR)
450 struct freebsd_handle_data *data;
451 extattr_arg arg = { EXTATTR_FDES, .param.filedes = fsp->fh->fd };
452 extattr_attr attr;
453 ssize_t res;
454
455 SMB_VFS_HANDLE_GET_DATA(handle, data,
456 struct freebsd_handle_data,
457 return -1);
458
459 if(!freebsd_map_xattr(data->extattr_mode, name, &attr)) {
460 errno = EINVAL;
461 return -1;
462 }
463
464 /* Filter out 'secure' entries */
465 if(data->extattr_mode != FREEBSD_EXTATTR_SECURE && geteuid() != 0 && attr.data.flags > EXTATTR_USER) {
466 errno = ENOATTR;
467 return -1;
468 }
469
470 /*
471 * The BSD implementation has a nasty habit of silently truncating
472 * the returned value to the size of the buffer, so we have to check
473 * that the buffer is large enough to fit the returned value.
474 */
475 if((res=extattr_size(arg, &attr)) < 0) {
476 return -1;
477 }
478
479 if (size == 0) {
480 return res;
481 }
482 else if (res > size) {
483 errno = ERANGE;
484 return -1;
485 }
486
487 if((res=extattr_get_fd(fsp->fh->fd, attr.namespace, attr.name, value, size)) >= 0) {
488 return res;
489 }
490 return -1;
491 #else
492 errno = ENOSYS;
493 return -1;
494 #endif
495 }
496
497
freebsd_listxattr(vfs_handle_struct * handle,const struct smb_filename * smb_fname,char * list,size_t size)498 static ssize_t freebsd_listxattr(vfs_handle_struct *handle,
499 const struct smb_filename *smb_fname,
500 char *list,
501 size_t size)
502 {
503 #if defined(HAVE_XATTR_EXTATTR)
504 struct freebsd_handle_data *data;
505
506 SMB_VFS_HANDLE_GET_DATA(handle, data,
507 struct freebsd_handle_data,
508 return -1);
509
510 extattr_arg arg = { EXTATTR_FILE, .param.path = smb_fname->base_name };
511
512 return freebsd_extattr_list(arg, data->extattr_mode, list, size);
513 #else
514 errno = ENOSYS;
515 return -1;
516 #endif
517 }
518
519
freebsd_flistxattr(vfs_handle_struct * handle,struct files_struct * fsp,char * list,size_t size)520 static ssize_t freebsd_flistxattr(vfs_handle_struct *handle,
521 struct files_struct *fsp, char *list,
522 size_t size)
523 {
524 #if defined(HAVE_XATTR_EXTATTR)
525 struct freebsd_handle_data *data;
526 extattr_arg arg = { EXTATTR_FDES, .param.filedes = fsp->fh->fd };
527
528 SMB_VFS_HANDLE_GET_DATA(handle, data,
529 struct freebsd_handle_data,
530 return -1);
531
532 return freebsd_extattr_list(arg, data->extattr_mode, list, size);
533 #else
534 errno = ENOSYS;
535 return -1;
536 #endif
537 }
538
freebsd_removexattr(vfs_handle_struct * handle,const struct smb_filename * smb_fname,const char * name)539 static int freebsd_removexattr(vfs_handle_struct *handle,
540 const struct smb_filename *smb_fname,
541 const char *name)
542 {
543 #if defined(HAVE_XATTR_EXTATTR)
544 struct freebsd_handle_data *data;
545 extattr_attr attr;
546
547 SMB_VFS_HANDLE_GET_DATA(handle, data,
548 struct freebsd_handle_data,
549 return -1);
550
551
552 /* Filter out 'secure' entries */
553 if(data->extattr_mode != FREEBSD_EXTATTR_SECURE && geteuid() != 0 && attr.data.flags > EXTATTR_USER) {
554 errno = ENOATTR;
555 return -1;
556 }
557
558 return extattr_delete_file(smb_fname->base_name, attr.namespace, attr.name);
559 #else
560 errno = ENOSYS;
561 return -1;
562 #endif
563 }
564
565
freebsd_fremovexattr(vfs_handle_struct * handle,struct files_struct * fsp,const char * name)566 static int freebsd_fremovexattr(vfs_handle_struct *handle,
567 struct files_struct *fsp, const char *name)
568 {
569 #if defined(HAVE_XATTR_EXTATTR)
570 struct freebsd_handle_data *data;
571 extattr_attr attr;
572
573 SMB_VFS_HANDLE_GET_DATA(handle, data,
574 struct freebsd_handle_data,
575 return -1);
576
577 if(!freebsd_map_xattr(data->extattr_mode, name, &attr)) {
578 errno = EINVAL;
579 return -1;
580 }
581
582 /* Filter out 'secure' entries */
583 if(data->extattr_mode != FREEBSD_EXTATTR_SECURE && geteuid() != 0 && attr.data.flags > EXTATTR_USER) {
584 errno = ENOATTR;
585 return -1;
586 }
587
588 return extattr_delete_fd(fsp->fh->fd, attr.namespace, attr.name);
589 #else
590 errno = ENOSYS;
591 return -1;
592 #endif
593 }
594
595
freebsd_setxattr(vfs_handle_struct * handle,const struct smb_filename * smb_fname,const char * name,const void * value,size_t size,int flags)596 static int freebsd_setxattr(vfs_handle_struct *handle,
597 const struct smb_filename *smb_fname,
598 const char *name,
599 const void *value,
600 size_t size,
601 int flags)
602 {
603 #if defined(HAVE_XATTR_EXTATTR)
604 struct freebsd_handle_data *data;
605 extattr_attr attr;
606 ssize_t res;
607
608 SMB_VFS_HANDLE_GET_DATA(handle, data,
609 struct freebsd_handle_data,
610 return -1);
611
612 if(!freebsd_map_xattr(data->extattr_mode, name, &attr)) {
613 errno = EINVAL;
614 return -1;
615 }
616
617 /* Filter out 'secure' entries */
618 if(data->extattr_mode != FREEBSD_EXTATTR_SECURE && geteuid() != 0 && attr.data.flags > EXTATTR_USER) {
619 errno = ENOATTR;
620 return -1;
621 }
622
623 if (flags) {
624 extattr_arg arg = { EXTATTR_FILE, .param.path = smb_fname->base_name };
625 /* Check attribute existence */
626 res = extattr_size(arg, &attr);
627 if (res < 0) {
628 /* REPLACE attribute, that doesn't exist */
629 if ((flags & XATTR_REPLACE) && errno == ENOATTR) {
630 errno = ENOATTR;
631 return -1;
632 }
633 /* Ignore other errors */
634 }
635 else {
636 /* CREATE attribute, that already exists */
637 if (flags & XATTR_CREATE) {
638 errno = EEXIST;
639 return -1;
640 }
641 }
642 }
643 res = extattr_set_file(smb_fname->base_name, attr.namespace, attr.name, value, size);
644
645 return (res >= 0) ? 0 : -1;
646 #else
647 errno = ENOSYS;
648 return -1;
649 #endif
650 }
651
652
freebsd_fsetxattr(vfs_handle_struct * handle,struct files_struct * fsp,const char * name,const void * value,size_t size,int flags)653 static int freebsd_fsetxattr(vfs_handle_struct *handle, struct files_struct *fsp,
654 const char *name, const void *value, size_t size,
655 int flags)
656 {
657 #if defined(HAVE_XATTR_EXTATTR)
658 struct freebsd_handle_data *data;
659 extattr_attr attr;
660 ssize_t res;
661
662 SMB_VFS_HANDLE_GET_DATA(handle, data,
663 struct freebsd_handle_data,
664 return -1);
665
666 if(!freebsd_map_xattr(data->extattr_mode, name, &attr)) {
667 errno = EINVAL;
668 return -1;
669 }
670
671 /* Filter out 'secure' entries */
672 if(data->extattr_mode != FREEBSD_EXTATTR_SECURE && geteuid() != 0 && attr.data.flags > EXTATTR_USER) {
673 errno = ENOATTR;
674 return -1;
675 }
676
677 if (flags) {
678 extattr_arg arg = { EXTATTR_FDES, .param.filedes = fsp->fh->fd };
679 /* Check attribute existence */
680 res = extattr_size(arg, &attr);
681 if (res < 0) {
682 /* REPLACE attribute, that doesn't exist */
683 if ((flags & XATTR_REPLACE) && errno == ENOATTR) {
684 errno = ENOATTR;
685 return -1;
686 }
687 /* Ignore other errors */
688 }
689 else {
690 /* CREATE attribute, that already exists */
691 if (flags & XATTR_CREATE) {
692 errno = EEXIST;
693 return -1;
694 }
695 }
696 }
697
698 res = extattr_set_fd(fsp->fh->fd, attr.namespace, attr.name, value, size);
699
700 return (res >= 0) ? 0 : -1;
701 #else
702 errno = ENOSYS;
703 return -1;
704 #endif
705 }
706
freebsd_connect(vfs_handle_struct * handle,const char * service,const char * user)707 static int freebsd_connect(vfs_handle_struct *handle, const char *service,
708 const char *user)
709 {
710 struct freebsd_handle_data *data;
711 int enumval, saved_errno;
712
713 int ret = SMB_VFS_NEXT_CONNECT(handle, service, user);
714
715 if (ret < 0) {
716 return ret;
717 }
718
719 data = talloc_zero(handle->conn, struct freebsd_handle_data);
720 if (!data) {
721 saved_errno = errno;
722 SMB_VFS_NEXT_DISCONNECT(handle);
723 DEBUG(0, ("talloc_zero() failed\n"));
724 errno = saved_errno;
725 return -1;
726 }
727
728 enumval = lp_parm_enum(SNUM(handle->conn), "freebsd",
729 "extattr mode", extattr_mode_param, FREEBSD_EXTATTR_LEGACY);
730 if (enumval == -1) {
731 saved_errno = errno;
732 SMB_VFS_NEXT_DISCONNECT(handle);
733 DBG_DEBUG("value for freebsd: 'extattr mode' is unknown\n");
734 errno = saved_errno;
735 return -1;
736 }
737
738 if(freebsd_in_jail()) {
739 enumval = FREEBSD_EXTATTR_COMPAT;
740 DBG_WARNING("running in jail, enforcing 'compat' mode\n");
741 }
742
743 data->extattr_mode = (enum extattr_mode)enumval;
744
745 SMB_VFS_HANDLE_SET_DATA(handle, data, NULL,
746 struct freebsd_handle_data,
747 return -1);
748
749 DBG_DEBUG("connect to service[%s] with '%s' extattr mode\n",
750 service, extattr_mode_param[data->extattr_mode].name);
751
752 return 0;
753 }
754
freebsd_disconnect(vfs_handle_struct * handle)755 static void freebsd_disconnect(vfs_handle_struct *handle)
756 {
757 SMB_VFS_NEXT_DISCONNECT(handle);
758 }
759
760 /* VFS operations structure */
761
762 struct vfs_fn_pointers freebsd_fns = {
763 /* Disk operations */
764
765 .connect_fn = freebsd_connect,
766 .disconnect_fn = freebsd_disconnect,
767
768 /* EA operations. */
769 .getxattr_fn = freebsd_getxattr,
770 .fgetxattr_fn = freebsd_fgetxattr,
771 .listxattr_fn = freebsd_listxattr,
772 .flistxattr_fn = freebsd_flistxattr,
773 .removexattr_fn = freebsd_removexattr,
774 .fremovexattr_fn = freebsd_fremovexattr,
775 .setxattr_fn = freebsd_setxattr,
776 .fsetxattr_fn = freebsd_fsetxattr,
777 };
778
779 static_decl_vfs;
vfs_freebsd_init(TALLOC_CTX * ctx)780 NTSTATUS vfs_freebsd_init(TALLOC_CTX *ctx)
781 {
782 NTSTATUS ret;
783
784 ret = smb_register_vfs(SMB_VFS_INTERFACE_VERSION, "freebsd",
785 &freebsd_fns);
786
787 if (!NT_STATUS_IS_OK(ret)) {
788 return ret;
789 }
790
791 vfs_freebsd_debug_level = debug_add_class("freebsd");
792 if (vfs_freebsd_debug_level == -1) {
793 vfs_freebsd_debug_level = DBGC_VFS;
794 DEBUG(0, ("vfs_freebsd: Couldn't register custom debugging class!\n"));
795 } else {
796 DEBUG(10, ("vfs_freebsd: Debug class number of 'fileid': %d\n", vfs_freebsd_debug_level));
797 }
798
799 return ret;
800 }
801