selftest/Samba4: create add ${TRUST_DOMSID}-513 to a local group
[Samba.git] / source3 / smbd / smb2_ioctl_filesys.c
blob79c50219643c497cc003a4efc1572ce28cfd1ab6
1 /*
2 Unix SMB/CIFS implementation.
3 Core SMB2 server
5 Copyright (C) Stefan Metzmacher 2009
6 Copyright (C) David Disseldorp 2013-2015
8 This program is free software; you can redistribute it and/or modify
9 it under the terms of the GNU General Public License as published by
10 the Free Software Foundation; either version 3 of the License, or
11 (at your option) any later version.
13 This program is distributed in the hope that it will be useful,
14 but WITHOUT ANY WARRANTY; without even the implied warranty of
15 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
16 GNU General Public License for more details.
18 You should have received a copy of the GNU General Public License
19 along with this program. If not, see <http://www.gnu.org/licenses/>.
22 #include "includes.h"
23 #include "smbd/smbd.h"
24 #include "smbd/globals.h"
25 #include "../libcli/smb/smb_common.h"
26 #include "../libcli/security/security.h"
27 #include "../lib/util/tevent_ntstatus.h"
28 #include "rpc_server/srv_pipe_hnd.h"
29 #include "include/ntioctl.h"
30 #include "../librpc/ndr/libndr.h"
31 #include "librpc/gen_ndr/ndr_ioctl.h"
32 #include "smb2_ioctl_private.h"
35 * XXX this may reduce dup_extents->byte_count so that it's less than the
36 * target file size.
38 static NTSTATUS fsctl_dup_extents_check_lengths(struct files_struct *src_fsp,
39 struct files_struct *dst_fsp,
40 struct fsctl_dup_extents_to_file *dup_extents)
42 NTSTATUS status;
44 if ((dup_extents->source_off + dup_extents->byte_count
45 < dup_extents->source_off)
46 || (dup_extents->target_off + dup_extents->byte_count
47 < dup_extents->target_off)) {
48 return NT_STATUS_INVALID_PARAMETER; /* wrap */
51 status = vfs_stat_fsp(src_fsp);
52 if (!NT_STATUS_IS_OK(status)) {
53 return status;
57 * XXX vfs_btrfs and vfs_default have size checks in the copychunk
58 * handler, as this needs to be rechecked after the src has potentially
59 * been extended by a previous chunk in the compound copychunk req.
61 if (src_fsp->fsp_name->st.st_ex_size
62 < dup_extents->source_off + dup_extents->byte_count) {
63 DEBUG(2, ("dup_extents req exceeds src size\n"));
64 return NT_STATUS_NOT_SUPPORTED;
67 status = vfs_stat_fsp(dst_fsp);
68 if (!NT_STATUS_IS_OK(status)) {
69 return status;
72 if (dst_fsp->fsp_name->st.st_ex_size
73 < dup_extents->target_off + dup_extents->byte_count) {
75 if (dst_fsp->fsp_name->st.st_ex_size - dup_extents->target_off
76 > dst_fsp->fsp_name->st.st_ex_size) {
77 return NT_STATUS_INVALID_PARAMETER; /* wrap */
81 * this server behaviour is pretty hairy, but we need to match
82 * Windows, so...
84 DEBUG(2, ("dup_extents req exceeds target size, capping\n"));
85 dup_extents->byte_count = dst_fsp->fsp_name->st.st_ex_size
86 - dup_extents->target_off;
89 return NT_STATUS_OK;
92 static NTSTATUS fsctl_dup_extents_check_overlap(struct files_struct *src_fsp,
93 struct files_struct *dst_fsp,
94 struct fsctl_dup_extents_to_file *dup_extents)
96 uint64_t src_off_last;
97 uint64_t tgt_off_last;
99 if (!file_id_equal(&src_fsp->file_id, &dst_fsp->file_id)) {
100 /* src and dest refer to different files */
101 return NT_STATUS_OK;
104 if (dup_extents->byte_count == 0) {
105 /* no range to overlap */
106 return NT_STATUS_OK;
110 * [MS-FSCC] 2.3.8 FSCTL_DUPLICATE_EXTENTS_TO_FILE Reply
111 * STATUS_NOT_SUPPORTED:
112 * The source and target destination ranges overlap on the same file.
115 src_off_last = dup_extents->source_off + dup_extents->byte_count - 1;
116 if ((dup_extents->target_off >= dup_extents->source_off)
117 && (dup_extents->target_off <= src_off_last)) {
119 * src: |-----------|
120 * tgt: |-----------|
122 return NT_STATUS_NOT_SUPPORTED;
126 tgt_off_last = dup_extents->target_off + dup_extents->byte_count - 1;
127 if ((tgt_off_last >= dup_extents->source_off)
128 && (tgt_off_last <= src_off_last)) {
130 * src: |-----------|
131 * tgt: |-----------|
133 return NT_STATUS_NOT_SUPPORTED;
136 return NT_STATUS_OK;
139 static NTSTATUS fsctl_dup_extents_check_sparse(struct files_struct *src_fsp,
140 struct files_struct *dst_fsp)
143 * 2.3.8 FSCTL_DUPLICATE_EXTENTS_TO_FILE Reply...
144 * STATUS_NOT_SUPPORTED: Target file is sparse, while source
145 * is a non-sparse file.
147 * WS2016 has the following behaviour (MS are in the process of fixing
148 * the spec):
149 * STATUS_NOT_SUPPORTED is returned if the source is sparse, while the
150 * target is non-sparse. However, if target is sparse while the source
151 * is non-sparse, then FSCTL_DUPLICATE_EXTENTS_TO_FILE completes
152 * successfully.
154 if ((src_fsp->is_sparse) && (!dst_fsp->is_sparse)) {
155 return NT_STATUS_NOT_SUPPORTED;
158 return NT_STATUS_OK;
161 struct fsctl_dup_extents_state {
162 struct tevent_context *ev;
163 struct connection_struct *conn;
164 struct files_struct *dst_fsp;
165 struct fsctl_dup_extents_to_file dup_extents;
168 static void fsctl_dup_extents_offload_read_done(struct tevent_req *subreq);
169 static void fsctl_dup_extents_vfs_done(struct tevent_req *subreq);
171 static struct tevent_req *fsctl_dup_extents_send(TALLOC_CTX *mem_ctx,
172 struct tevent_context *ev,
173 struct files_struct *dst_fsp,
174 DATA_BLOB *in_input,
175 struct smbd_smb2_request *smb2req)
177 struct tevent_req *req = NULL;
178 struct tevent_req *subreq = NULL;
179 struct fsctl_dup_extents_state *state = NULL;
180 uint64_t src_fid_persistent = 0;
181 uint64_t src_fid_volatile = 0;
182 struct files_struct *src_fsp = NULL;
183 int ndr_ret;
184 NTSTATUS status;
186 req = tevent_req_create(mem_ctx, &state,
187 struct fsctl_dup_extents_state);
188 if (req == NULL) {
189 return NULL;
192 if (dst_fsp == NULL) {
193 tevent_req_nterror(req, NT_STATUS_INVALID_PARAMETER);
194 return tevent_req_post(req, ev);
197 *state = (struct fsctl_dup_extents_state) {
198 .conn = dst_fsp->conn,
199 .ev = ev,
200 .dst_fsp = dst_fsp,
203 if ((dst_fsp->conn->fs_capabilities
204 & FILE_SUPPORTS_BLOCK_REFCOUNTING) == 0) {
205 DBG_INFO("FS does not advertise block refcounting support\n");
206 tevent_req_nterror(req, NT_STATUS_INVALID_DEVICE_REQUEST);
207 return tevent_req_post(req, ev);
210 ndr_ret = ndr_pull_struct_blob(in_input, state, &state->dup_extents,
211 (ndr_pull_flags_fn_t)ndr_pull_fsctl_dup_extents_to_file);
212 if (ndr_ret != NDR_ERR_SUCCESS) {
213 DBG_ERR("failed to unmarshall dup extents to file req\n");
214 tevent_req_nterror(req, NT_STATUS_INVALID_PARAMETER);
215 return tevent_req_post(req, ev);
218 src_fid_persistent = BVAL(state->dup_extents.source_fid, 0);
219 src_fid_volatile = BVAL(state->dup_extents.source_fid, 8);
220 src_fsp = file_fsp_get(smb2req, src_fid_persistent, src_fid_volatile);
221 if ((src_fsp == NULL)
222 || (src_fsp->file_id.devid != dst_fsp->file_id.devid)) {
224 * [MS-FSCC] 2.3.8 FSCTL_DUPLICATE_EXTENTS_TO_FILE Reply
225 * STATUS_INVALID_PARAMETER:
226 * The FileHandle parameter is either invalid or does not
227 * represent a handle to an opened file on the same volume.
229 * Windows Server responds with NT_STATUS_INVALID_HANDLE instead
230 * of STATUS_INVALID_PARAMETER here, despite the above spec.
232 DBG_ERR("invalid src_fsp for dup_extents\n");
233 tevent_req_nterror(req, NT_STATUS_INVALID_HANDLE);
234 return tevent_req_post(req, ev);
237 status = fsctl_dup_extents_check_lengths(src_fsp, dst_fsp,
238 &state->dup_extents);
239 if (!NT_STATUS_IS_OK(status)) {
240 tevent_req_nterror(req, status);
241 return tevent_req_post(req, ev);
244 if (state->dup_extents.byte_count == 0) {
245 DBG_ERR("skipping zero length dup extents\n");
246 tevent_req_done(req);
247 return tevent_req_post(req, ev);
250 status = fsctl_dup_extents_check_overlap(src_fsp, dst_fsp,
251 &state->dup_extents);
252 if (!NT_STATUS_IS_OK(status)) {
253 tevent_req_nterror(req, status);
254 return tevent_req_post(req, ev);
257 status = fsctl_dup_extents_check_sparse(src_fsp, dst_fsp);
258 if (!NT_STATUS_IS_OK(status)) {
259 tevent_req_nterror(req, status);
260 return tevent_req_post(req, ev);
263 subreq = SMB_VFS_OFFLOAD_READ_SEND(state, ev, src_fsp,
264 FSCTL_DUP_EXTENTS_TO_FILE,
265 0, 0, 0);
266 if (tevent_req_nomem(subreq, req)) {
267 return tevent_req_post(req, ev);
269 tevent_req_set_callback(subreq, fsctl_dup_extents_offload_read_done,
270 req);
271 return req;
274 static void fsctl_dup_extents_offload_read_done(struct tevent_req *subreq)
276 struct tevent_req *req = tevent_req_callback_data(
277 subreq, struct tevent_req);
278 struct fsctl_dup_extents_state *state = tevent_req_data(
279 req, struct fsctl_dup_extents_state);
280 DATA_BLOB token;
281 NTSTATUS status;
283 status = SMB_VFS_OFFLOAD_READ_RECV(subreq, state->dst_fsp->conn,
284 state, &token);
285 if (tevent_req_nterror(req, status)) {
286 return;
289 /* tell the VFS to ignore locks across the clone, matching ReFS */
290 subreq = SMB_VFS_OFFLOAD_WRITE_SEND(state->dst_fsp->conn,
291 state,
292 state->ev,
293 FSCTL_DUP_EXTENTS_TO_FILE,
294 &token,
295 state->dup_extents.source_off,
296 state->dst_fsp,
297 state->dup_extents.target_off,
298 state->dup_extents.byte_count);
299 if (tevent_req_nomem(subreq, req)) {
300 return;
302 tevent_req_set_callback(subreq, fsctl_dup_extents_vfs_done, req);
303 return;
306 static void fsctl_dup_extents_vfs_done(struct tevent_req *subreq)
308 struct tevent_req *req = tevent_req_callback_data(
309 subreq, struct tevent_req);
310 struct fsctl_dup_extents_state *state = tevent_req_data(
311 req, struct fsctl_dup_extents_state);
312 off_t nb_chunk;
313 NTSTATUS status;
315 status = SMB_VFS_OFFLOAD_WRITE_RECV(state->conn, subreq, &nb_chunk);
316 TALLOC_FREE(subreq);
317 if (tevent_req_nterror(req, status)) {
318 return;
321 if (nb_chunk != state->dup_extents.byte_count) {
322 tevent_req_nterror(req, NT_STATUS_IO_DEVICE_ERROR);
323 return;
326 tevent_req_done(req);
329 static NTSTATUS fsctl_dup_extents_recv(struct tevent_req *req)
331 return tevent_req_simple_recv_ntstatus(req);
334 static NTSTATUS fsctl_get_cmprn(TALLOC_CTX *mem_ctx,
335 struct tevent_context *ev,
336 struct files_struct *fsp,
337 size_t in_max_output,
338 DATA_BLOB *out_output)
340 struct compression_state cmpr_state;
341 enum ndr_err_code ndr_ret;
342 DATA_BLOB output;
343 NTSTATUS status;
345 if (fsp == NULL) {
346 return NT_STATUS_FILE_CLOSED;
349 /* Windows doesn't check for SEC_FILE_READ_ATTRIBUTE permission here */
351 ZERO_STRUCT(cmpr_state);
352 if (fsp->conn->fs_capabilities & FILE_FILE_COMPRESSION) {
353 status = SMB_VFS_GET_COMPRESSION(fsp->conn,
354 mem_ctx,
355 fsp,
356 NULL,
357 &cmpr_state.format);
358 if (!NT_STATUS_IS_OK(status)) {
359 return status;
361 } else {
363 * bso#12144: The underlying filesystem doesn't support
364 * compression, so we should respond with "not-compressed"
365 * (like WS2016 ReFS) instead of STATUS_NOT_SUPPORTED or
366 * NT_STATUS_INVALID_DEVICE_REQUEST.
368 cmpr_state.format = COMPRESSION_FORMAT_NONE;
371 ndr_ret = ndr_push_struct_blob(&output, mem_ctx,
372 &cmpr_state,
373 (ndr_push_flags_fn_t)ndr_push_compression_state);
374 if (ndr_ret != NDR_ERR_SUCCESS) {
375 return NT_STATUS_INTERNAL_ERROR;
378 if (in_max_output < output.length) {
379 DEBUG(1, ("max output %u too small for compression state %ld\n",
380 (unsigned int)in_max_output, (long int)output.length));
381 return NT_STATUS_INVALID_USER_BUFFER;
383 *out_output = output;
385 return NT_STATUS_OK;
388 static NTSTATUS fsctl_set_cmprn(TALLOC_CTX *mem_ctx,
389 struct tevent_context *ev,
390 struct files_struct *fsp,
391 DATA_BLOB *in_input)
393 struct compression_state cmpr_state;
394 enum ndr_err_code ndr_ret;
395 NTSTATUS status;
397 if (fsp == NULL) {
398 return NT_STATUS_FILE_CLOSED;
401 /* WRITE_DATA permission is required, WRITE_ATTRIBUTES is not */
402 status = check_access_fsp(fsp, FILE_WRITE_DATA);
403 if (!NT_STATUS_IS_OK(status)) {
404 return status;
407 ndr_ret = ndr_pull_struct_blob(in_input, mem_ctx, &cmpr_state,
408 (ndr_pull_flags_fn_t)ndr_pull_compression_state);
409 if (ndr_ret != NDR_ERR_SUCCESS) {
410 DEBUG(0, ("failed to unmarshall set compression req\n"));
411 return NT_STATUS_INVALID_PARAMETER;
414 status = NT_STATUS_NOT_SUPPORTED;
415 if (fsp->conn->fs_capabilities & FILE_FILE_COMPRESSION) {
416 status = SMB_VFS_SET_COMPRESSION(fsp->conn,
417 mem_ctx,
418 fsp,
419 cmpr_state.format);
420 } else if (cmpr_state.format == COMPRESSION_FORMAT_NONE) {
422 * bso#12144: The underlying filesystem doesn't support
423 * compression. We should still accept set(FORMAT_NONE) requests
424 * (like WS2016 ReFS).
426 status = NT_STATUS_OK;
429 return status;
432 static NTSTATUS fsctl_zero_data(TALLOC_CTX *mem_ctx,
433 struct tevent_context *ev,
434 struct files_struct *fsp,
435 DATA_BLOB *in_input)
437 struct file_zero_data_info zdata_info;
438 enum ndr_err_code ndr_ret;
439 struct lock_struct lck;
440 int mode;
441 uint64_t len;
442 int ret;
443 NTSTATUS status;
445 if (fsp == NULL) {
446 return NT_STATUS_FILE_CLOSED;
449 /* WRITE_DATA permission is required */
450 status = check_access_fsp(fsp, FILE_WRITE_DATA);
451 if (!NT_STATUS_IS_OK(status)) {
452 return status;
455 /* allow regardless of whether FS supports sparse or not */
457 ndr_ret = ndr_pull_struct_blob(in_input, mem_ctx, &zdata_info,
458 (ndr_pull_flags_fn_t)ndr_pull_file_zero_data_info);
459 if (ndr_ret != NDR_ERR_SUCCESS) {
460 DEBUG(0, ("failed to unmarshall zero data request\n"));
461 return NT_STATUS_INVALID_PARAMETER;
464 if (zdata_info.beyond_final_zero < zdata_info.file_off) {
465 DEBUG(0, ("invalid zero data params: off %lu, bfz, %lu\n",
466 (unsigned long)zdata_info.file_off,
467 (unsigned long)zdata_info.beyond_final_zero));
468 return NT_STATUS_INVALID_PARAMETER;
471 /* convert strange "beyond final zero" param into length */
472 len = zdata_info.beyond_final_zero - zdata_info.file_off;
474 if (len == 0) {
475 DEBUG(2, ("zero data called with zero length range\n"));
476 return NT_STATUS_OK;
479 init_strict_lock_struct(fsp,
480 fsp->op->global->open_persistent_id,
481 zdata_info.file_off,
482 len,
483 WRITE_LOCK,
484 &lck);
486 if (!SMB_VFS_STRICT_LOCK_CHECK(fsp->conn, fsp, &lck)) {
487 DEBUG(2, ("failed to lock range for zero-data\n"));
488 return NT_STATUS_FILE_LOCK_CONFLICT;
492 * MS-FSCC <58> Section 2.3.67
493 * This FSCTL sets the range of bytes to zero (0) without extending the
494 * file size.
496 * The VFS_FALLOCATE_FL_KEEP_SIZE flag is used to satisfy this
497 * constraint.
500 mode = VFS_FALLOCATE_FL_PUNCH_HOLE | VFS_FALLOCATE_FL_KEEP_SIZE;
501 ret = SMB_VFS_FALLOCATE(fsp, mode, zdata_info.file_off, len);
502 if (ret == -1) {
503 status = map_nt_error_from_unix_common(errno);
504 DEBUG(2, ("zero-data fallocate(0x%x) failed: %s\n", mode,
505 strerror(errno)));
506 return status;
509 if (!fsp->is_sparse && lp_strict_allocate(SNUM(fsp->conn))) {
511 * File marked non-sparse and "strict allocate" is enabled -
512 * allocate the range that we just punched out.
513 * In future FALLOC_FL_ZERO_RANGE could be used exclusively for
514 * this, but it's currently only supported on XFS and ext4.
516 * The newly allocated range still won't be found by SEEK_DATA
517 * for QAR, but stat.st_blocks will reflect it.
519 ret = SMB_VFS_FALLOCATE(fsp, VFS_FALLOCATE_FL_KEEP_SIZE,
520 zdata_info.file_off, len);
521 if (ret == -1) {
522 status = map_nt_error_from_unix_common(errno);
523 DEBUG(0, ("fallocate failed: %s\n", strerror(errno)));
524 return status;
528 return NT_STATUS_OK;
531 static NTSTATUS fsctl_qar_buf_push(TALLOC_CTX *mem_ctx,
532 struct file_alloced_range_buf *qar_buf,
533 DATA_BLOB *qar_array_blob)
535 DATA_BLOB new_slot;
536 enum ndr_err_code ndr_ret;
537 bool ok;
539 ndr_ret = ndr_push_struct_blob(&new_slot, mem_ctx, qar_buf,
540 (ndr_push_flags_fn_t)ndr_push_file_alloced_range_buf);
541 if (ndr_ret != NDR_ERR_SUCCESS) {
542 DEBUG(0, ("failed to marshall QAR buf\n"));
543 return NT_STATUS_INVALID_PARAMETER;
546 /* TODO should be able to avoid copy by pushing into prealloced buf */
547 ok = data_blob_append(mem_ctx, qar_array_blob, new_slot.data,
548 new_slot.length);
549 data_blob_free(&new_slot);
550 if (!ok) {
551 return NT_STATUS_NO_MEMORY;
554 return NT_STATUS_OK;
557 static NTSTATUS fsctl_qar_seek_fill(TALLOC_CTX *mem_ctx,
558 struct files_struct *fsp,
559 off_t curr_off,
560 off_t max_off,
561 DATA_BLOB *qar_array_blob)
563 NTSTATUS status = NT_STATUS_NOT_SUPPORTED;
565 #ifdef HAVE_LSEEK_HOLE_DATA
566 while (curr_off <= max_off) {
567 off_t data_off;
568 off_t hole_off;
569 struct file_alloced_range_buf qar_buf;
571 /* seek next data */
572 data_off = SMB_VFS_LSEEK(fsp, curr_off, SEEK_DATA);
573 if ((data_off == -1) && (errno == ENXIO)) {
574 /* no data from curr_off to EOF */
575 break;
576 } else if (data_off == -1) {
577 status = map_nt_error_from_unix_common(errno);
578 DEBUG(1, ("lseek data failed: %s\n", strerror(errno)));
579 return status;
582 if (data_off > max_off) {
583 /* found something, but passed range of interest */
584 break;
587 hole_off = SMB_VFS_LSEEK(fsp, data_off, SEEK_HOLE);
588 if (hole_off == -1) {
589 status = map_nt_error_from_unix_common(errno);
590 DEBUG(1, ("lseek hole failed: %s\n", strerror(errno)));
591 return status;
594 if (hole_off <= data_off) {
595 DEBUG(1, ("lseek inconsistent: hole %lu at or before "
596 "data %lu\n", (unsigned long)hole_off,
597 (unsigned long)data_off));
598 return NT_STATUS_INTERNAL_ERROR;
601 qar_buf.file_off = data_off;
602 /* + 1 to convert maximum offset to length */
603 qar_buf.len = MIN(hole_off, max_off + 1) - data_off;
605 status = fsctl_qar_buf_push(mem_ctx, &qar_buf, qar_array_blob);
606 if (!NT_STATUS_IS_OK(status)) {
607 return NT_STATUS_NO_MEMORY;
610 curr_off = hole_off;
612 status = NT_STATUS_OK;
613 #endif
615 return status;
618 static NTSTATUS fsctl_qar(TALLOC_CTX *mem_ctx,
619 struct tevent_context *ev,
620 struct files_struct *fsp,
621 DATA_BLOB *in_input,
622 size_t in_max_output,
623 DATA_BLOB *out_output)
625 struct fsctl_query_alloced_ranges_req qar_req;
626 struct fsctl_query_alloced_ranges_rsp qar_rsp;
627 DATA_BLOB qar_array_blob = data_blob_null;
628 uint64_t max_off;
629 enum ndr_err_code ndr_ret;
630 int ret;
631 NTSTATUS status;
632 SMB_STRUCT_STAT sbuf;
634 if (fsp == NULL) {
635 return NT_STATUS_FILE_CLOSED;
638 /* READ_DATA permission is required */
639 status = check_access_fsp(fsp, FILE_READ_DATA);
640 if (!NT_STATUS_IS_OK(status)) {
641 return status;
644 ndr_ret = ndr_pull_struct_blob(in_input, mem_ctx, &qar_req,
645 (ndr_pull_flags_fn_t)ndr_pull_fsctl_query_alloced_ranges_req);
646 if (ndr_ret != NDR_ERR_SUCCESS) {
647 DEBUG(0, ("failed to unmarshall QAR req\n"));
648 return NT_STATUS_INVALID_PARAMETER;
652 * XXX Windows Server 2008 & 2012 servers don't return lock-conflict
653 * for QAR requests over an exclusively locked range!
656 ret = SMB_VFS_FSTAT(fsp, &sbuf);
657 if (ret == -1) {
658 status = map_nt_error_from_unix_common(errno);
659 DEBUG(2, ("fstat failed: %s\n", strerror(errno)));
660 return status;
663 if ((qar_req.buf.len == 0)
664 || (sbuf.st_ex_size == 0)
665 || (qar_req.buf.file_off >= sbuf.st_ex_size)) {
666 /* zero length range or after EOF, no ranges to return */
667 return NT_STATUS_OK;
670 /* check for integer overflow */
671 if (qar_req.buf.file_off + qar_req.buf.len < qar_req.buf.file_off) {
672 return NT_STATUS_INVALID_PARAMETER;
676 * Maximum offset is either the last valid offset _before_ EOF, or the
677 * last byte offset within the requested range. -1 converts length to
678 * offset, which is easier to work with for SEEK_DATA/SEEK_HOLE, E.g.:
680 * /off=0 /off=512K /st_ex_size=1M
681 * |-------------------------------------|
682 * | File data |
683 * |-------------------------------------|
684 * QAR end\
685 * |=====================================|
686 * | QAR off=512K, len=1M |
687 * |=================^===================|
688 * max_off=1M - 1
689 * QAR end\
690 * |==================|
691 * |QAR off=0 len=512K|
692 * |==================|
694 * max_off=512K - 1
696 max_off = MIN(sbuf.st_ex_size,
697 qar_req.buf.file_off + qar_req.buf.len) - 1;
699 if (!fsp->is_sparse) {
700 struct file_alloced_range_buf qar_buf;
702 /* file is non-sparse, claim file_off->max_off is allocated */
703 qar_buf.file_off = qar_req.buf.file_off;
704 /* + 1 to convert maximum offset back to length */
705 qar_buf.len = max_off - qar_req.buf.file_off + 1;
707 status = fsctl_qar_buf_push(mem_ctx, &qar_buf, &qar_array_blob);
708 } else {
709 status = fsctl_qar_seek_fill(mem_ctx, fsp, qar_req.buf.file_off,
710 max_off, &qar_array_blob);
712 if (!NT_STATUS_IS_OK(status)) {
713 return status;
716 /* marshall response buffer. */
717 qar_rsp.far_buf_array = qar_array_blob;
719 ndr_ret = ndr_push_struct_blob(out_output, mem_ctx, &qar_rsp,
720 (ndr_push_flags_fn_t)ndr_push_fsctl_query_alloced_ranges_rsp);
721 if (ndr_ret != NDR_ERR_SUCCESS) {
722 DEBUG(0, ("failed to marshall QAR rsp\n"));
723 return NT_STATUS_INVALID_PARAMETER;
726 if (out_output->length > in_max_output) {
727 DEBUG(2, ("QAR output len %lu exceeds max %lu\n",
728 (unsigned long)out_output->length,
729 (unsigned long)in_max_output));
730 data_blob_free(out_output);
731 return NT_STATUS_BUFFER_TOO_SMALL;
734 return NT_STATUS_OK;
737 static void smb2_ioctl_filesys_dup_extents_done(struct tevent_req *subreq);
739 struct tevent_req *smb2_ioctl_filesys(uint32_t ctl_code,
740 struct tevent_context *ev,
741 struct tevent_req *req,
742 struct smbd_smb2_ioctl_state *state)
744 NTSTATUS status;
746 switch (ctl_code) {
747 case FSCTL_GET_COMPRESSION:
748 status = fsctl_get_cmprn(state, ev, state->fsp,
749 state->in_max_output,
750 &state->out_output);
751 if (!tevent_req_nterror(req, status)) {
752 tevent_req_done(req);
754 return tevent_req_post(req, ev);
755 break;
756 case FSCTL_SET_COMPRESSION:
757 status = fsctl_set_cmprn(state, ev, state->fsp,
758 &state->in_input);
759 if (!tevent_req_nterror(req, status)) {
760 tevent_req_done(req);
762 return tevent_req_post(req, ev);
763 break;
764 case FSCTL_SET_ZERO_DATA:
765 status = fsctl_zero_data(state, ev, state->fsp,
766 &state->in_input);
767 if (!tevent_req_nterror(req, status)) {
768 tevent_req_done(req);
770 return tevent_req_post(req, ev);
771 break;
772 case FSCTL_QUERY_ALLOCATED_RANGES:
773 status = fsctl_qar(state, ev, state->fsp,
774 &state->in_input,
775 state->in_max_output,
776 &state->out_output);
777 if (!tevent_req_nterror(req, status)) {
778 tevent_req_done(req);
780 return tevent_req_post(req, ev);
781 break;
782 case FSCTL_DUP_EXTENTS_TO_FILE: {
783 struct tevent_req *subreq = NULL;
785 subreq = fsctl_dup_extents_send(state, ev,
786 state->fsp,
787 &state->in_input,
788 state->smb2req);
789 if (tevent_req_nomem(subreq, req)) {
790 return tevent_req_post(req, ev);
792 tevent_req_set_callback(subreq,
793 smb2_ioctl_filesys_dup_extents_done,
794 req);
795 return req;
796 break;
798 default: {
799 uint8_t *out_data = NULL;
800 uint32_t out_data_len = 0;
802 if (state->fsp == NULL) {
803 status = NT_STATUS_NOT_SUPPORTED;
804 } else {
805 status = SMB_VFS_FSCTL(state->fsp,
806 state,
807 ctl_code,
808 state->smbreq->flags2,
809 state->in_input.data,
810 state->in_input.length,
811 &out_data,
812 state->in_max_output,
813 &out_data_len);
814 state->out_output = data_blob_const(out_data, out_data_len);
815 if (NT_STATUS_IS_OK(status)) {
816 tevent_req_done(req);
817 return tevent_req_post(req, ev);
821 if (NT_STATUS_EQUAL(status, NT_STATUS_NOT_SUPPORTED)) {
822 if (IS_IPC(state->smbreq->conn)) {
823 status = NT_STATUS_FS_DRIVER_REQUIRED;
824 } else {
825 status = NT_STATUS_INVALID_DEVICE_REQUEST;
829 tevent_req_nterror(req, status);
830 return tevent_req_post(req, ev);
831 break;
835 tevent_req_nterror(req, NT_STATUS_INTERNAL_ERROR);
836 return tevent_req_post(req, ev);
839 static void smb2_ioctl_filesys_dup_extents_done(struct tevent_req *subreq)
841 struct tevent_req *req = tevent_req_callback_data(subreq,
842 struct tevent_req);
843 NTSTATUS status;
845 status = fsctl_dup_extents_recv(subreq);
846 TALLOC_FREE(subreq);
847 if (!tevent_req_nterror(req, status)) {
848 tevent_req_done(req);