1 /*
2  * This module implements VFS calls specific to FreeBSD
3  *
4  * Copyright (C) Timur I. Bakeyev, 2018
5  *
6  * This program is free software; you can redistribute it and/or modify
7  * it under the terms of the GNU General Public License as published by
8  * the Free Software Foundation; either version 3 of the License, or
9  * (at your option) any later version.
10  *
11  * This program is distributed in the hope that it will be useful,
12  * but WITHOUT ANY WARRANTY; without even the implied warranty of
13  * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
14  * GNU General Public License for more details.
15  *
16  * You should have received a copy of the GNU General Public License
17  * along with this program; if not, see <http://www.gnu.org/licenses/>.
18  */
19 
20 #include "includes.h"
21 
22 #include "lib/util/tevent_unix.h"
23 #include "lib/util/tevent_ntstatus.h"
24 #include "system/filesys.h"
25 
26 #include <sys/sysctl.h>
27 
28 static int vfs_freebsd_debug_level = DBGC_VFS;
29 
30 #undef DBGC_CLASS
31 #define DBGC_CLASS vfs_freebsd_debug_level
32 
33 #ifndef EXTATTR_MAXNAMELEN
34 #define EXTATTR_MAXNAMELEN		UINT8_MAX
35 #endif
36 
37 #define EXTATTR_NAMESPACE(NS)		EXTATTR_NAMESPACE_ ## NS, \
38 					EXTATTR_NAMESPACE_ ## NS ## _STRING ".", \
39 					.data.len = (sizeof(EXTATTR_NAMESPACE_ ## NS ## _STRING ".") - 1)
40 
41 #define EXTATTR_EMPTY			0x00
42 #define EXTATTR_USER			0x01
43 #define EXTATTR_SYSTEM			0x02
44 #define EXTATTR_SECURITY		0x03
45 #define EXTATTR_TRUSTED			0x04
46 
47 enum extattr_mode {
48 	FREEBSD_EXTATTR_SECURE,
49 	FREEBSD_EXTATTR_COMPAT,
50 	FREEBSD_EXTATTR_LEGACY
51 };
52 
53 typedef struct {
54 	int namespace;
55 	char name[EXTATTR_MAXNAMELEN+1];
56 	union {
57 		uint16_t len;
58 		uint16_t flags;
59 	} data;
60 } extattr_attr;
61 
62 typedef struct {
63 	enum {
64 		EXTATTR_FILE, EXTATTR_LINK, EXTATTR_FDES
65 	} method;
66 	union {
67 		const char *path;
68 		int filedes;
69 	} param;
70 } extattr_arg;
71 
72 static const struct enum_list extattr_mode_param[] = {
73 	{ FREEBSD_EXTATTR_SECURE, "secure" },		/*  */
74 	{ FREEBSD_EXTATTR_COMPAT, "compat" },		/*  */
75 	{ FREEBSD_EXTATTR_LEGACY, "legacy" },		/*  */
76 	{ -1, NULL }
77 };
78 
79 
80 /* */
81 struct freebsd_handle_data {
82 	enum extattr_mode extattr_mode;
83 };
84 
85 
86 /* XXX: This order doesn't match namespace ids order! */
87 static extattr_attr extattr[] = {
88 	{ EXTATTR_NAMESPACE(EMPTY) },
89 	{ EXTATTR_NAMESPACE(SYSTEM) },
90 	{ EXTATTR_NAMESPACE(USER) },
91 };
92 
93 
freebsd_in_jail(void)94 static bool freebsd_in_jail(void) {
95 	int val = 0;
96 	size_t val_len = sizeof(val);
97 
98 	if((sysctlbyname("security.jail.jailed", &val, &val_len, NULL, 0) != -1) && val == 1) {
99 		return true;
100 	}
101 	return false;
102 }
103 
freebsd_map_attrname(const char * name)104 static uint16_t freebsd_map_attrname(const char *name)
105 {
106 	if(name == NULL || name[0] == '\0') {
107 		return EXTATTR_EMPTY;
108 	}
109 
110 	switch(name[0]) {
111 		case 'u':
112 			if(strncmp(name, "user.", 5) == 0)
113 				return EXTATTR_USER;
114 			break;
115 		case 't':
116 			if(strncmp(name, "trusted.", 8) == 0)
117 				return EXTATTR_TRUSTED;
118 			break;
119 		case 's':
120 			/* name[1] could be any character, including '\0' */
121 			switch(name[1]) {
122 				case 'e':
123 					if(strncmp(name, "security.", 9) == 0)
124 						return EXTATTR_SECURITY;
125 					break;
126 				case 'y':
127 					if(strncmp(name, "system.", 7) == 0)
128 						return EXTATTR_SYSTEM;
129 					break;
130 			}
131 			break;
132 	}
133 	return EXTATTR_USER;
134 }
135 
136 /* security, system, trusted or user */
freebsd_map_xattr(enum extattr_mode extattr_mode,const char * name,extattr_attr * attr)137 static extattr_attr* freebsd_map_xattr(enum extattr_mode extattr_mode, const char *name, extattr_attr *attr)
138 {
139 	int attrnamespace = EXTATTR_NAMESPACE_EMPTY;
140 	const char *p, *attrname = name;
141 
142 	if(name == NULL || name[0] == '\0') {
143 		return NULL;
144 	}
145 
146 	if(attr == NULL) {
147 		return NULL;
148 	}
149 
150 	uint16_t flags = freebsd_map_attrname(name);
151 
152 	switch(flags) {
153 		case EXTATTR_SECURITY:
154 		case EXTATTR_TRUSTED:
155 		case EXTATTR_SYSTEM:
156 			attrnamespace = (extattr_mode == FREEBSD_EXTATTR_SECURE) ?
157 					EXTATTR_NAMESPACE_SYSTEM :
158 					EXTATTR_NAMESPACE_USER;
159 			break;
160 		case EXTATTR_USER:
161 			attrnamespace = EXTATTR_NAMESPACE_USER;
162 			break;
163 		default:
164 			/* Default to "user" namespace if nothing else was specified */
165 			attrnamespace = EXTATTR_NAMESPACE_USER;
166 			flags = EXTATTR_USER;
167 			break;
168 	}
169 
170 	if (extattr_mode == FREEBSD_EXTATTR_LEGACY) {
171 		switch(flags) {
172 			case EXTATTR_SECURITY:
173 				attrname = name + 9;
174 				break;
175 			case EXTATTR_TRUSTED:
176 				attrname = name + 8;
177 				break;
178 			case EXTATTR_SYSTEM:
179 				attrname = name + 7;
180 				break;
181 			case EXTATTR_USER:
182 				attrname = name + 5;
183 				break;
184 			default:
185 				attrname = ((p=strchr(name, '.')) != NULL) ? p + 1 : name;
186 				break;
187 		}
188 	}
189 
190 	attr->namespace = attrnamespace;
191 	attr->data.flags = flags;
192 	strlcpy(attr->name, attrname, EXTATTR_MAXNAMELEN + 1);
193 
194 	return attr;
195 }
196 
extattr_size(extattr_arg arg,extattr_attr * attr)197 static ssize_t extattr_size(extattr_arg arg, extattr_attr *attr)
198 {
199 	ssize_t result;
200 
201 	switch(arg.method) {
202 #if defined(HAVE_XATTR_EXTATTR)
203 		case EXTATTR_FILE:
204 			result = extattr_get_file(arg.param.path, attr->namespace, attr->name, NULL, 0);
205 			break;
206 		case EXTATTR_LINK:
207 			result = extattr_get_link(arg.param.path, attr->namespace, attr->name, NULL, 0);
208 			break;
209 		case EXTATTR_FDES:
210 			result = extattr_get_fd(arg.param.filedes, attr->namespace, attr->name, NULL, 0);
211 			break;
212 #endif
213 		default:
214 			errno = ENOSYS;
215 			return -1;
216 	}
217 
218 	if(result < 0) {
219 		errno = EINVAL;
220 		return -1;
221 	}
222 
223 	return result;
224 }
225 
226 
227 /*
228  * The list of names is returned as an unordered array of NULL-terminated
229  * character strings (attribute names are separated by NULL characters),
230  * like this:
231  *      user.name1\0system.name1\0user.name2\0
232  *
233  * Filesystems like ext2, ext3 and XFS which implement POSIX ACLs using
234  * extended attributes, might return a list like this:
235  *      system.posix_acl_access\0system.posix_acl_default\0
236  */
237 /*
238  * The extattr_list_file() returns a list of attributes present in the
239  * requested namespace. Each list entry consists of a single byte containing
240  * the length of the attribute name, followed by the attribute name. The
241  * attribute name is not terminated by ASCII 0 (nul).
242 */
243 
freebsd_extattr_list(extattr_arg arg,enum extattr_mode extattr_mode,char * list,size_t size)244 static ssize_t freebsd_extattr_list(extattr_arg arg, enum extattr_mode extattr_mode, char *list, size_t size)
245 {
246 	ssize_t list_size, total_size = 0;
247 	char *p, *q, *list_end;
248 	int len;
249 	/*
250 	 Ignore all but user namespace when we are not root or in jail
251 	 See: https://bugzilla.samba.org/show_bug.cgi?id=10247
252 	*/
253 	bool as_root = (geteuid() == 0);
254 
255 	int ns = (extattr_mode == FREEBSD_EXTATTR_SECURE && as_root) ? 1 : 2;
256 
257 	/* Iterate through extattr(2) namespaces */
258 	for(; ns < ARRAY_SIZE(extattr); ns++) {
259 		switch(arg.method) {
260 #if defined(HAVE_XATTR_EXTATTR)
261 			case EXTATTR_FILE:
262 				list_size = extattr_list_file(arg.param.path, extattr[ns].namespace, list, size);
263 				break;
264 			case EXTATTR_LINK:
265 				list_size = extattr_list_link(arg.param.path, extattr[ns].namespace, list, size);
266 				break;
267 			case EXTATTR_FDES:
268 				list_size = extattr_list_fd(arg.param.filedes, extattr[ns].namespace, list, size);
269 				break;
270 #endif
271 			default:
272 				errno = ENOSYS;
273 				return -1;
274 		}
275 		/* Some error happend. Errno should be set by the previous call */
276 		if(list_size < 0)
277 			return -1;
278 		/* No attributes in this namespace */
279 		if(list_size == 0)
280 			continue;
281 		/*
282 		 Call with an empty buffer may be used to calculate
283 		 necessary buffer size.
284 		*/
285 		if(list == NULL) {
286 			/*
287 			 XXX: Unfortunately, we can't say, how many attributes were
288 			 returned, so here is the potential problem with the emulation.
289 			*/
290 			if(extattr_mode == FREEBSD_EXTATTR_LEGACY) {
291 				/*
292 				 Take the worse case of one char attribute names -
293 				 two bytes per name plus one more for sanity.
294 				*/
295 				total_size += list_size + (list_size/2 + 1)*extattr[ns].data.len;
296 			}
297 			else {
298 				total_size += list_size;
299 			}
300 			continue;
301 		}
302 
303 		if(extattr_mode == FREEBSD_EXTATTR_LEGACY) {
304 			/* Count necessary offset to fit namespace prefixes */
305 			int extra_len = 0;
306 			uint16_t flags;
307 			list_end = list + list_size;
308 			for(list_size = 0, p = q = list; p < list_end; p += len) {
309 				len = p[0] + 1;
310 				(void)strlcpy(q, p + 1, len);
311 				flags = freebsd_map_attrname(q);
312 				/* Skip secure attributes for non-root user */
313 				if(extattr_mode != FREEBSD_EXTATTR_SECURE && !as_root && flags > EXTATTR_USER) {
314 					continue;
315 				}
316 				if(flags <= EXTATTR_USER) {
317 					/* Don't count trailing '\0' */
318 					extra_len += extattr[ns].data.len;
319 				}
320 				list_size += len;
321 				q += len;
322 			}
323 			total_size += list_size + extra_len;
324 			/* Buffer is too small to fit the results */
325 			if(total_size > size) {
326 				errno = ERANGE;
327 				return -1;
328 			}
329 			/* Shift results backwards, so we can prepend prefixes */
330 			list_end = list + extra_len;
331 			p = (char*)memmove(list_end, list, list_size);
332 			/*
333 			 We enter the loop with `p` pointing to the shifted list and
334 			 `extra_len` having the total margin between `list` and `p`
335 			*/
336 			for(list_end += list_size; p < list_end; p += len) {
337 				len = strlen(p) + 1;
338 				flags = freebsd_map_attrname(p);
339 				if(flags <= EXTATTR_USER) {
340 					/* Add namespace prefix */
341 					(void)strncpy(list, extattr[ns].name, extattr[ns].data.len);
342 					list += extattr[ns].data.len;
343 				}
344 				/* Append attribute name */
345 				(void)strlcpy(list, p, len);
346 				list += len;
347 			}
348 		}
349 		else {
350 			/* Convert UCSD strings into nul-terminated strings */
351 			for(list_end = list + list_size; list < list_end; list += len) {
352 				len = list[0] + 1;
353 				(void)strlcpy(list, list + 1, len);
354 			}
355 			total_size += list_size;
356 		}
357 	}
358 	return total_size;
359 }
360 
361 /*
362 static ssize_t freebsd_getxattr_size(vfs_handle_struct *handle,
363 				const struct smb_filename *smb_fname,
364 				const char *name)
365 {
366 	struct freebsd_handle_data *data;
367 	extattr_arg arg = { EXTATTR_FILE, smb_fname->base_name };
368 	extattr_attr attr;
369 
370 
371 	SMB_VFS_HANDLE_GET_DATA(handle, data,
372 				struct freebsd_handle_data,
373 				return -1);
374 
375 	if(!freebsd_map_xattr(data->extattr_mode, name, &attr)) {
376 		errno = EINVAL;
377 		return -1;
378 	}
379 
380 	if(data->extattr_mode != FREEBSD_EXTATTR_SECURE && geteuid() != 0 && attr.data.flags > EXTATTR_USER) {
381 		errno = ENOATTR;
382 		return -1;
383 	}
384 
385 	return extattr_size(arg, &attr);
386 }
387 */
388 
389 /* VFS entries */
freebsd_getxattr(vfs_handle_struct * handle,const struct smb_filename * smb_fname,const char * name,void * value,size_t size)390 static ssize_t freebsd_getxattr(vfs_handle_struct *handle,
391 				const struct smb_filename *smb_fname,
392 				const char *name,
393 				void *value,
394 				size_t size)
395 {
396 #if defined(HAVE_XATTR_EXTATTR)
397 	struct freebsd_handle_data *data;
398 	extattr_arg arg = { EXTATTR_FILE, .param.path = smb_fname->base_name };
399 	extattr_attr attr;
400 	ssize_t res;
401 
402 	SMB_VFS_HANDLE_GET_DATA(handle, data,
403 				struct freebsd_handle_data,
404 				return -1);
405 
406 	if(!freebsd_map_xattr(data->extattr_mode, name, &attr)) {
407 		errno = EINVAL;
408 		return -1;
409 	}
410 
411 	/* Filter out 'secure' entries */
412 	if(data->extattr_mode != FREEBSD_EXTATTR_SECURE && geteuid() != 0 && attr.data.flags > EXTATTR_USER) {
413 		errno = ENOATTR;
414 		return -1;
415 	}
416 
417 	/*
418 	 * The BSD implementation has a nasty habit of silently truncating
419 	 * the returned value to the size of the buffer, so we have to check
420 	 * that the buffer is large enough to fit the returned value.
421 	 */
422 	if((res=extattr_size(arg, &attr)) < 0) {
423 		return -1;
424 	}
425 
426 	if (size == 0) {
427 		return res;
428 	}
429 	else if (res > size) {
430 		errno = ERANGE;
431 		return -1;
432 	}
433 
434 	if((res=extattr_get_file(smb_fname->base_name, attr.namespace, attr.name, value, size)) >= 0) {
435 		return res;
436 	}
437 	return -1;
438 #else
439 	errno = ENOSYS;
440 	return -1;
441 #endif
442 }
443 
444 
freebsd_fgetxattr(vfs_handle_struct * handle,struct files_struct * fsp,const char * name,void * value,size_t size)445 static ssize_t freebsd_fgetxattr(vfs_handle_struct *handle,
446 			      struct files_struct *fsp, const char *name,
447 			      void *value, size_t size)
448 {
449 #if defined(HAVE_XATTR_EXTATTR)
450 	struct freebsd_handle_data *data;
451 	extattr_arg arg = { EXTATTR_FDES, .param.filedes = fsp->fh->fd };
452 	extattr_attr attr;
453 	ssize_t res;
454 
455 	SMB_VFS_HANDLE_GET_DATA(handle, data,
456 				struct freebsd_handle_data,
457 				return -1);
458 
459 	if(!freebsd_map_xattr(data->extattr_mode, name, &attr)) {
460 		errno = EINVAL;
461 		return -1;
462 	}
463 
464 	/* Filter out 'secure' entries */
465 	if(data->extattr_mode != FREEBSD_EXTATTR_SECURE && geteuid() != 0 && attr.data.flags > EXTATTR_USER) {
466 		errno = ENOATTR;
467 		return -1;
468 	}
469 
470 	/*
471 	 * The BSD implementation has a nasty habit of silently truncating
472 	 * the returned value to the size of the buffer, so we have to check
473 	 * that the buffer is large enough to fit the returned value.
474 	 */
475 	if((res=extattr_size(arg, &attr)) < 0) {
476 		return -1;
477 	}
478 
479 	if (size == 0) {
480 		return res;
481 	}
482 	else if (res > size) {
483 		errno = ERANGE;
484 		return -1;
485 	}
486 
487 	if((res=extattr_get_fd(fsp->fh->fd, attr.namespace, attr.name, value, size)) >= 0) {
488 		return res;
489 	}
490 	return -1;
491 #else
492 	errno = ENOSYS;
493 	return -1;
494 #endif
495 }
496 
497 
freebsd_listxattr(vfs_handle_struct * handle,const struct smb_filename * smb_fname,char * list,size_t size)498 static ssize_t freebsd_listxattr(vfs_handle_struct *handle,
499 				const struct smb_filename *smb_fname,
500 				char *list,
501 				size_t size)
502 {
503 #if defined(HAVE_XATTR_EXTATTR)
504 	struct freebsd_handle_data *data;
505 
506 	SMB_VFS_HANDLE_GET_DATA(handle, data,
507 				struct freebsd_handle_data,
508 				return -1);
509 
510 	extattr_arg arg = { EXTATTR_FILE, .param.path = smb_fname->base_name };
511 
512 	return freebsd_extattr_list(arg, data->extattr_mode, list, size);
513 #else
514 	errno = ENOSYS;
515 	return -1;
516 #endif
517 }
518 
519 
freebsd_flistxattr(vfs_handle_struct * handle,struct files_struct * fsp,char * list,size_t size)520 static ssize_t freebsd_flistxattr(vfs_handle_struct *handle,
521 			       struct files_struct *fsp, char *list,
522 			       size_t size)
523 {
524 #if defined(HAVE_XATTR_EXTATTR)
525 	struct freebsd_handle_data *data;
526 	extattr_arg arg = { EXTATTR_FDES, .param.filedes = fsp->fh->fd };
527 
528 	SMB_VFS_HANDLE_GET_DATA(handle, data,
529 				struct freebsd_handle_data,
530 				return -1);
531 
532 	return freebsd_extattr_list(arg, data->extattr_mode, list, size);
533 #else
534 	errno = ENOSYS;
535 	return -1;
536 #endif
537 }
538 
freebsd_removexattr(vfs_handle_struct * handle,const struct smb_filename * smb_fname,const char * name)539 static int freebsd_removexattr(vfs_handle_struct *handle,
540 			const struct smb_filename *smb_fname,
541 			const char *name)
542 {
543 #if defined(HAVE_XATTR_EXTATTR)
544 	struct freebsd_handle_data *data;
545 	extattr_attr attr;
546 
547 	SMB_VFS_HANDLE_GET_DATA(handle, data,
548 				struct freebsd_handle_data,
549 				return -1);
550 
551 
552 	/* Filter out 'secure' entries */
553 	if(data->extattr_mode != FREEBSD_EXTATTR_SECURE && geteuid() != 0 && attr.data.flags > EXTATTR_USER) {
554 		errno = ENOATTR;
555 		return -1;
556 	}
557 
558 	return extattr_delete_file(smb_fname->base_name, attr.namespace, attr.name);
559 #else
560 	errno = ENOSYS;
561 	return -1;
562 #endif
563 }
564 
565 
freebsd_fremovexattr(vfs_handle_struct * handle,struct files_struct * fsp,const char * name)566 static int freebsd_fremovexattr(vfs_handle_struct *handle,
567 			     struct files_struct *fsp, const char *name)
568 {
569 #if defined(HAVE_XATTR_EXTATTR)
570 	struct freebsd_handle_data *data;
571 	extattr_attr attr;
572 
573 	SMB_VFS_HANDLE_GET_DATA(handle, data,
574 				struct freebsd_handle_data,
575 				return -1);
576 
577 	if(!freebsd_map_xattr(data->extattr_mode, name, &attr)) {
578 		errno = EINVAL;
579 		return -1;
580 	}
581 
582 	/* Filter out 'secure' entries */
583 	if(data->extattr_mode != FREEBSD_EXTATTR_SECURE && geteuid() != 0 && attr.data.flags > EXTATTR_USER) {
584 		errno = ENOATTR;
585 		return -1;
586 	}
587 
588 	return extattr_delete_fd(fsp->fh->fd, attr.namespace, attr.name);
589 #else
590 	errno = ENOSYS;
591 	return -1;
592 #endif
593 }
594 
595 
freebsd_setxattr(vfs_handle_struct * handle,const struct smb_filename * smb_fname,const char * name,const void * value,size_t size,int flags)596 static int freebsd_setxattr(vfs_handle_struct *handle,
597 			const struct smb_filename *smb_fname,
598 			const char *name,
599 			const void *value,
600 			size_t size,
601 			int flags)
602 {
603 #if defined(HAVE_XATTR_EXTATTR)
604 	struct freebsd_handle_data *data;
605 	extattr_attr attr;
606 	ssize_t res;
607 
608 	SMB_VFS_HANDLE_GET_DATA(handle, data,
609 				struct freebsd_handle_data,
610 				return -1);
611 
612 	if(!freebsd_map_xattr(data->extattr_mode, name, &attr)) {
613 		errno = EINVAL;
614 		return -1;
615 	}
616 
617 	/* Filter out 'secure' entries */
618 	if(data->extattr_mode != FREEBSD_EXTATTR_SECURE && geteuid() != 0 && attr.data.flags > EXTATTR_USER) {
619 		errno = ENOATTR;
620 		return -1;
621 	}
622 
623 	if (flags) {
624 		extattr_arg arg = { EXTATTR_FILE, .param.path = smb_fname->base_name };
625 		/* Check attribute existence */
626 		res = extattr_size(arg, &attr);
627 		if (res < 0) {
628 			/* REPLACE attribute, that doesn't exist */
629 			if ((flags & XATTR_REPLACE) && errno == ENOATTR) {
630 				errno = ENOATTR;
631 				return -1;
632 			}
633 			/* Ignore other errors */
634 		}
635 		else {
636 			/* CREATE attribute, that already exists */
637 			if (flags & XATTR_CREATE) {
638 				errno = EEXIST;
639 				return -1;
640 			}
641 		}
642 	}
643 	res = extattr_set_file(smb_fname->base_name, attr.namespace, attr.name, value, size);
644 
645 	return (res >= 0) ? 0 : -1;
646 #else
647 	errno = ENOSYS;
648 	return -1;
649 #endif
650 }
651 
652 
freebsd_fsetxattr(vfs_handle_struct * handle,struct files_struct * fsp,const char * name,const void * value,size_t size,int flags)653 static int freebsd_fsetxattr(vfs_handle_struct *handle, struct files_struct *fsp,
654 			  const char *name, const void *value, size_t size,
655 			  int flags)
656 {
657 #if defined(HAVE_XATTR_EXTATTR)
658 	struct freebsd_handle_data *data;
659 	extattr_attr attr;
660 	ssize_t res;
661 
662 	SMB_VFS_HANDLE_GET_DATA(handle, data,
663 				struct freebsd_handle_data,
664 				return -1);
665 
666 	if(!freebsd_map_xattr(data->extattr_mode, name, &attr)) {
667 		errno = EINVAL;
668 		return -1;
669 	}
670 
671 	/* Filter out 'secure' entries */
672 	if(data->extattr_mode != FREEBSD_EXTATTR_SECURE && geteuid() != 0 && attr.data.flags > EXTATTR_USER) {
673 		errno = ENOATTR;
674 		return -1;
675 	}
676 
677 	if (flags) {
678 		extattr_arg arg = { EXTATTR_FDES, .param.filedes = fsp->fh->fd };
679 		/* Check attribute existence */
680 		res = extattr_size(arg, &attr);
681 		if (res < 0) {
682 			/* REPLACE attribute, that doesn't exist */
683 			if ((flags & XATTR_REPLACE) && errno == ENOATTR) {
684 				errno = ENOATTR;
685 				return -1;
686 			}
687 			/* Ignore other errors */
688 		}
689 		else {
690 			/* CREATE attribute, that already exists */
691 			if (flags & XATTR_CREATE) {
692 				errno = EEXIST;
693 				return -1;
694 			}
695 		}
696 	}
697 
698 	res = extattr_set_fd(fsp->fh->fd, attr.namespace, attr.name, value, size);
699 
700 	return (res >= 0) ? 0 : -1;
701 #else
702 	errno = ENOSYS;
703 	return -1;
704 #endif
705 }
706 
freebsd_connect(vfs_handle_struct * handle,const char * service,const char * user)707 static int freebsd_connect(vfs_handle_struct *handle, const char *service,
708 			const char *user)
709 {
710 	struct freebsd_handle_data *data;
711 	int enumval, saved_errno;
712 
713 	int ret = SMB_VFS_NEXT_CONNECT(handle, service, user);
714 
715 	if (ret < 0) {
716 		return ret;
717 	}
718 
719 	data = talloc_zero(handle->conn, struct freebsd_handle_data);
720 	if (!data) {
721 		saved_errno = errno;
722 		SMB_VFS_NEXT_DISCONNECT(handle);
723 		DEBUG(0, ("talloc_zero() failed\n"));
724 		errno = saved_errno;
725 		return -1;
726 	}
727 
728 	enumval = lp_parm_enum(SNUM(handle->conn), "freebsd",
729 			       "extattr mode", extattr_mode_param, FREEBSD_EXTATTR_LEGACY);
730 	if (enumval == -1) {
731 		saved_errno = errno;
732 		SMB_VFS_NEXT_DISCONNECT(handle);
733 		DBG_DEBUG("value for freebsd: 'extattr mode' is unknown\n");
734 		errno = saved_errno;
735 		return -1;
736 	}
737 
738 	if(freebsd_in_jail()) {
739 		enumval = FREEBSD_EXTATTR_COMPAT;
740 		DBG_WARNING("running in jail, enforcing 'compat' mode\n");
741 	}
742 
743 	data->extattr_mode = (enum extattr_mode)enumval;
744 
745 	SMB_VFS_HANDLE_SET_DATA(handle, data, NULL,
746 				struct freebsd_handle_data,
747 				return -1);
748 
749 	DBG_DEBUG("connect to service[%s] with '%s' extattr mode\n",
750 		  service, extattr_mode_param[data->extattr_mode].name);
751 
752 	return 0;
753 }
754 
freebsd_disconnect(vfs_handle_struct * handle)755 static void freebsd_disconnect(vfs_handle_struct *handle)
756 {
757 	SMB_VFS_NEXT_DISCONNECT(handle);
758 }
759 
760 /* VFS operations structure */
761 
762 struct vfs_fn_pointers freebsd_fns = {
763 	/* Disk operations */
764 
765 	.connect_fn = freebsd_connect,
766 	.disconnect_fn = freebsd_disconnect,
767 
768 	/* EA operations. */
769 	.getxattr_fn = freebsd_getxattr,
770 	.fgetxattr_fn = freebsd_fgetxattr,
771 	.listxattr_fn = freebsd_listxattr,
772 	.flistxattr_fn = freebsd_flistxattr,
773 	.removexattr_fn = freebsd_removexattr,
774 	.fremovexattr_fn = freebsd_fremovexattr,
775 	.setxattr_fn = freebsd_setxattr,
776 	.fsetxattr_fn = freebsd_fsetxattr,
777 };
778 
779 static_decl_vfs;
vfs_freebsd_init(TALLOC_CTX * ctx)780 NTSTATUS vfs_freebsd_init(TALLOC_CTX *ctx)
781 {
782 	NTSTATUS ret;
783 
784 	ret = smb_register_vfs(SMB_VFS_INTERFACE_VERSION, "freebsd",
785 				&freebsd_fns);
786 
787 	if (!NT_STATUS_IS_OK(ret)) {
788 		return ret;
789 	}
790 
791 	vfs_freebsd_debug_level = debug_add_class("freebsd");
792 	if (vfs_freebsd_debug_level == -1) {
793 		vfs_freebsd_debug_level = DBGC_VFS;
794 		DEBUG(0, ("vfs_freebsd: Couldn't register custom debugging class!\n"));
795 	} else {
796 		DEBUG(10, ("vfs_freebsd: Debug class number of 'fileid': %d\n", vfs_freebsd_debug_level));
797 	}
798 
799 	return ret;
800 }
801