smbd/smb2_ioctl: instruct VFS to ignore locks for dup extents
[gd/samba-autobuild/.git] / source3 / smbd / smb2_ioctl_filesys.c
index bc2925beb955a4c70efe11c9a2cce6c2e793db23..fbff97cc8300aecc9f10787ccc4bcfcb91c26c3f 100644 (file)
@@ -3,6 +3,7 @@
    Core SMB2 server
 
    Copyright (C) Stefan Metzmacher 2009
+   Copyright (C) David Disseldorp 2013-2015
 
    This program is free software; you can redistribute it and/or modify
    it under the terms of the GNU General Public License as published by
 #include "smbd/smbd.h"
 #include "smbd/globals.h"
 #include "../libcli/smb/smb_common.h"
+#include "../libcli/security/security.h"
 #include "../lib/util/tevent_ntstatus.h"
 #include "rpc_server/srv_pipe_hnd.h"
 #include "include/ntioctl.h"
+#include "../librpc/ndr/libndr.h"
+#include "librpc/gen_ndr/ndr_ioctl.h"
 #include "smb2_ioctl_private.h"
 
+/*
+ * XXX this may reduce dup_extents->byte_count so that it's less than the
+ * target file size.
+ */
+static NTSTATUS fsctl_dup_extents_check_lengths(struct files_struct *src_fsp,
+                                               struct files_struct *dst_fsp,
+                               struct fsctl_dup_extents_to_file *dup_extents)
+{
+       NTSTATUS status;
+
+       if ((dup_extents->source_off + dup_extents->byte_count
+                                               < dup_extents->source_off)
+        || (dup_extents->target_off + dup_extents->byte_count
+                                               < dup_extents->target_off)) {
+               return NT_STATUS_INVALID_PARAMETER;     /* wrap */
+       }
+
+       status = vfs_stat_fsp(src_fsp);
+       if (!NT_STATUS_IS_OK(status)) {
+               return status;
+       }
+
+       /*
+        * XXX vfs_btrfs and vfs_default have size checks in the copychunk
+        * handler, as this needs to be rechecked after the src has potentially
+        * been extended by a previous chunk in the compound copychunk req.
+        */
+       if (src_fsp->fsp_name->st.st_ex_size
+                       < dup_extents->source_off + dup_extents->byte_count) {
+               DEBUG(2, ("dup_extents req exceeds src size\n"));
+               return NT_STATUS_NOT_SUPPORTED;
+       }
+
+       status = vfs_stat_fsp(dst_fsp);
+       if (!NT_STATUS_IS_OK(status)) {
+               return status;
+       }
+
+       if (dst_fsp->fsp_name->st.st_ex_size
+                       < dup_extents->target_off + dup_extents->byte_count) {
+
+               if (dst_fsp->fsp_name->st.st_ex_size - dup_extents->target_off
+                                       > dst_fsp->fsp_name->st.st_ex_size) {
+                       return NT_STATUS_INVALID_PARAMETER;     /* wrap */
+               }
+
+               /*
+                * this server behaviour is pretty hairy, but we need to match
+                * Windows, so...
+                */
+               DEBUG(2, ("dup_extents req exceeds target size, capping\n"));
+               dup_extents->byte_count = dst_fsp->fsp_name->st.st_ex_size
+                                               - dup_extents->target_off;
+       }
+
+       return NT_STATUS_OK;
+}
+
+static NTSTATUS fsctl_dup_extents_check_overlap(struct files_struct *src_fsp,
+                                               struct files_struct *dst_fsp,
+                               struct fsctl_dup_extents_to_file *dup_extents)
+{
+       uint64_t src_off_last;
+       uint64_t tgt_off_last;
+
+       if (!file_id_equal(&src_fsp->file_id, &dst_fsp->file_id)) {
+               /* src and dest refer to different files */
+               return NT_STATUS_OK;
+       }
+
+       if (dup_extents->byte_count == 0) {
+               /* no range to overlap */
+               return NT_STATUS_OK;
+       }
+
+       /*
+        * [MS-FSCC] 2.3.8 FSCTL_DUPLICATE_EXTENTS_TO_FILE Reply
+        * STATUS_NOT_SUPPORTED:
+        * The source and target destination ranges overlap on the same file.
+        */
+
+       src_off_last = dup_extents->source_off + dup_extents->byte_count - 1;
+       if ((dup_extents->target_off >= dup_extents->source_off)
+                               && (dup_extents->target_off <= src_off_last)) {
+               /*
+                * src: |-----------|
+                * tgt:       |-----------|
+                */
+               return NT_STATUS_NOT_SUPPORTED;
+       }
+
+
+       tgt_off_last = dup_extents->target_off + dup_extents->byte_count - 1;
+       if ((tgt_off_last >= dup_extents->source_off)
+                                       && (tgt_off_last <= src_off_last)) {
+               /*
+                * src:       |-----------|
+                * tgt: |-----------|
+                */
+               return NT_STATUS_NOT_SUPPORTED;
+       }
+
+       return NT_STATUS_OK;
+}
+
+static NTSTATUS fsctl_dup_extents_check_sparse(struct files_struct *src_fsp,
+                                              struct files_struct *dst_fsp)
+{
+       /*
+        * 2.3.8 FSCTL_DUPLICATE_EXTENTS_TO_FILE Reply...
+        * STATUS_NOT_SUPPORTED: Target file is sparse, while source
+        *                       is a non-sparse file.
+        *
+        * WS2016 has the following behaviour (MS are in the process of fixing
+        * the spec):
+        * STATUS_NOT_SUPPORTED is returned if the source is sparse, while the
+        * target is non-sparse. However, if target is sparse while the source
+        * is non-sparse, then FSCTL_DUPLICATE_EXTENTS_TO_FILE completes
+        * successfully.
+        */
+       if ((src_fsp->is_sparse) && (!dst_fsp->is_sparse)) {
+               return NT_STATUS_NOT_SUPPORTED;
+       }
+
+       return NT_STATUS_OK;
+}
+
+struct fsctl_dup_extents_state {
+       struct tevent_context *ev;
+       struct connection_struct *conn;
+       struct fsctl_dup_extents_to_file dup_extents;
+};
+
+static void fsctl_dup_extents_vfs_done(struct tevent_req *subreq);
+
+static struct tevent_req *fsctl_dup_extents_send(TALLOC_CTX *mem_ctx,
+                                                struct tevent_context *ev,
+                                                struct files_struct *dst_fsp,
+                                                DATA_BLOB *in_input,
+                                                struct smbd_smb2_request *smb2req)
+{
+       struct tevent_req *req = NULL;
+       struct tevent_req *subreq = NULL;
+       struct fsctl_dup_extents_state *state = NULL;
+       uint64_t src_fid_persistent = 0;
+       uint64_t src_fid_volatile = 0;
+       struct files_struct *src_fsp = NULL;
+       int ndr_ret;
+       NTSTATUS status;
+
+       req = tevent_req_create(mem_ctx, &state,
+                               struct fsctl_dup_extents_state);
+       if (req == NULL) {
+               return NULL;
+       }
+       *state = (struct fsctl_dup_extents_state) {
+               .conn = dst_fsp->conn,
+               .ev = ev,
+       };
+
+       if (dst_fsp == NULL) {
+               tevent_req_nterror(req, NT_STATUS_INVALID_PARAMETER);
+               return tevent_req_post(req, ev);
+       }
+
+       if ((dst_fsp->conn->fs_capabilities
+                               & FILE_SUPPORTS_BLOCK_REFCOUNTING) == 0) {
+               DBG_INFO("FS does not advertise block refcounting support\n");
+               tevent_req_nterror(req, NT_STATUS_INVALID_DEVICE_REQUEST);
+               return tevent_req_post(req, ev);
+       }
+
+       ndr_ret = ndr_pull_struct_blob(in_input, state, &state->dup_extents,
+                      (ndr_pull_flags_fn_t)ndr_pull_fsctl_dup_extents_to_file);
+       if (ndr_ret != NDR_ERR_SUCCESS) {
+               DBG_ERR("failed to unmarshall dup extents to file req\n");
+               tevent_req_nterror(req, NT_STATUS_INVALID_PARAMETER);
+               return tevent_req_post(req, ev);
+       }
+
+       src_fid_persistent = BVAL(state->dup_extents.source_fid, 0);
+       src_fid_volatile = BVAL(state->dup_extents.source_fid, 8);
+       src_fsp = file_fsp_get(smb2req, src_fid_persistent, src_fid_volatile);
+       if ((src_fsp == NULL)
+                     || (src_fsp->file_id.devid != dst_fsp->file_id.devid)) {
+               /*
+                * [MS-FSCC] 2.3.8 FSCTL_DUPLICATE_EXTENTS_TO_FILE Reply
+                * STATUS_INVALID_PARAMETER:
+                * The FileHandle parameter is either invalid or does not
+                * represent a handle to an opened file on the same volume.
+                *
+                * Windows Server responds with NT_STATUS_INVALID_HANDLE instead
+                * of STATUS_INVALID_PARAMETER here, despite the above spec.
+                */
+               DBG_ERR("invalid src_fsp for dup_extents\n");
+               tevent_req_nterror(req, NT_STATUS_INVALID_HANDLE);
+               return tevent_req_post(req, ev);
+       }
+
+       status = fsctl_dup_extents_check_lengths(src_fsp, dst_fsp,
+                                                &state->dup_extents);
+       if (!NT_STATUS_IS_OK(status)) {
+               tevent_req_nterror(req, status);
+               return tevent_req_post(req, ev);
+       }
+
+       if (state->dup_extents.byte_count == 0) {
+               DBG_ERR("skipping zero length dup extents\n");
+               tevent_req_done(req);
+               return tevent_req_post(req, ev);
+       }
+
+       status = fsctl_dup_extents_check_overlap(src_fsp, dst_fsp,
+                                                &state->dup_extents);
+       if (!NT_STATUS_IS_OK(status)) {
+               tevent_req_nterror(req, status);
+               return tevent_req_post(req, ev);
+       }
+
+       status = fsctl_dup_extents_check_sparse(src_fsp, dst_fsp);
+       if (!NT_STATUS_IS_OK(status)) {
+               tevent_req_nterror(req, status);
+               return tevent_req_post(req, ev);
+       }
+
+       /* tell the VFS to ignore locks across the clone, matching ReFS */
+       subreq = SMB_VFS_COPY_CHUNK_SEND(dst_fsp->conn, state, ev,
+                                        src_fsp, state->dup_extents.source_off,
+                                        dst_fsp, state->dup_extents.target_off,
+                                        state->dup_extents.byte_count,
+                                        VFS_COPY_CHUNK_FL_MUST_CLONE
+                                        | VFS_COPY_CHUNK_FL_IGNORE_LOCKS);
+       if (tevent_req_nomem(subreq, req)) {
+               return tevent_req_post(req, ev);
+       }
+
+       tevent_req_set_callback(subreq, fsctl_dup_extents_vfs_done, req);
+
+       return subreq;
+}
+
+static void fsctl_dup_extents_vfs_done(struct tevent_req *subreq)
+{
+       struct tevent_req *req = tevent_req_callback_data(
+               subreq, struct tevent_req);
+       struct fsctl_dup_extents_state *state = tevent_req_data(
+               req, struct fsctl_dup_extents_state);
+       off_t nb_chunk;
+       NTSTATUS status;
+
+       status = SMB_VFS_COPY_CHUNK_RECV(state->conn, subreq, &nb_chunk);
+       TALLOC_FREE(subreq);
+       if (tevent_req_nterror(req, status)) {
+               return;
+       }
+
+       if (nb_chunk != state->dup_extents.byte_count) {
+               tevent_req_nterror(req, NT_STATUS_IO_DEVICE_ERROR);
+               return;
+       }
+
+       tevent_req_done(req);
+}
+
+static NTSTATUS fsctl_dup_extents_recv(struct tevent_req *req)
+{
+       return tevent_req_simple_recv_ntstatus(req);
+}
+
+static NTSTATUS fsctl_get_cmprn(TALLOC_CTX *mem_ctx,
+                               struct tevent_context *ev,
+                               struct files_struct *fsp,
+                               size_t in_max_output,
+                               DATA_BLOB *out_output)
+{
+       struct compression_state cmpr_state;
+       enum ndr_err_code ndr_ret;
+       DATA_BLOB output;
+       NTSTATUS status;
+
+       if (fsp == NULL) {
+               return NT_STATUS_FILE_CLOSED;
+       }
+
+       /* Windows doesn't check for SEC_FILE_READ_ATTRIBUTE permission here */
+
+       ZERO_STRUCT(cmpr_state);
+       if (fsp->conn->fs_capabilities & FILE_FILE_COMPRESSION) {
+               status = SMB_VFS_GET_COMPRESSION(fsp->conn,
+                                                mem_ctx,
+                                                fsp,
+                                                NULL,
+                                                &cmpr_state.format);
+               if (!NT_STATUS_IS_OK(status)) {
+                       return status;
+               }
+       } else {
+               /*
+                * bso#12144: The underlying filesystem doesn't support
+                * compression, so we should respond with "not-compressed"
+                * (like WS2016 ReFS) instead of STATUS_NOT_SUPPORTED or
+                * NT_STATUS_INVALID_DEVICE_REQUEST.
+                */
+               cmpr_state.format = COMPRESSION_FORMAT_NONE;
+       }
+
+       ndr_ret = ndr_push_struct_blob(&output, mem_ctx,
+                                      &cmpr_state,
+                       (ndr_push_flags_fn_t)ndr_push_compression_state);
+       if (ndr_ret != NDR_ERR_SUCCESS) {
+               return NT_STATUS_INTERNAL_ERROR;
+       }
+
+       if (in_max_output < output.length) {
+               DEBUG(1, ("max output %u too small for compression state %ld\n",
+                     (unsigned int)in_max_output, (long int)output.length));
+               return NT_STATUS_INVALID_USER_BUFFER;
+       }
+       *out_output = output;
+
+       return NT_STATUS_OK;
+}
+
+static NTSTATUS fsctl_set_cmprn(TALLOC_CTX *mem_ctx,
+                               struct tevent_context *ev,
+                               struct files_struct *fsp,
+                               DATA_BLOB *in_input)
+{
+       struct compression_state cmpr_state;
+       enum ndr_err_code ndr_ret;
+       NTSTATUS status;
+
+       if (fsp == NULL) {
+               return NT_STATUS_FILE_CLOSED;
+       }
+
+       /* WRITE_DATA permission is required, WRITE_ATTRIBUTES is not */
+       status = check_access_fsp(fsp, FILE_WRITE_DATA);
+       if (!NT_STATUS_IS_OK(status)) {
+               return status;
+       }
+
+       ndr_ret = ndr_pull_struct_blob(in_input, mem_ctx, &cmpr_state,
+                       (ndr_pull_flags_fn_t)ndr_pull_compression_state);
+       if (ndr_ret != NDR_ERR_SUCCESS) {
+               DEBUG(0, ("failed to unmarshall set compression req\n"));
+               return NT_STATUS_INVALID_PARAMETER;
+       }
+
+       status = NT_STATUS_NOT_SUPPORTED;
+       if (fsp->conn->fs_capabilities & FILE_FILE_COMPRESSION) {
+               status = SMB_VFS_SET_COMPRESSION(fsp->conn,
+                                                mem_ctx,
+                                                fsp,
+                                                cmpr_state.format);
+       } else if (cmpr_state.format == COMPRESSION_FORMAT_NONE) {
+               /*
+                * bso#12144: The underlying filesystem doesn't support
+                * compression. We should still accept set(FORMAT_NONE) requests
+                * (like WS2016 ReFS).
+                */
+               status = NT_STATUS_OK;
+       }
+
+       return status;
+}
+
+static NTSTATUS fsctl_zero_data(TALLOC_CTX *mem_ctx,
+                               struct tevent_context *ev,
+                               struct files_struct *fsp,
+                               DATA_BLOB *in_input)
+{
+       struct file_zero_data_info zdata_info;
+       enum ndr_err_code ndr_ret;
+       struct lock_struct lck;
+       int mode;
+       uint64_t len;
+       int ret;
+       NTSTATUS status;
+
+       if (fsp == NULL) {
+               return NT_STATUS_FILE_CLOSED;
+       }
+
+       /* WRITE_DATA permission is required */
+       status = check_access_fsp(fsp, FILE_WRITE_DATA);
+       if (!NT_STATUS_IS_OK(status)) {
+               return status;
+       }
+
+       /* allow regardless of whether FS supports sparse or not */
+
+       ndr_ret = ndr_pull_struct_blob(in_input, mem_ctx, &zdata_info,
+                       (ndr_pull_flags_fn_t)ndr_pull_file_zero_data_info);
+       if (ndr_ret != NDR_ERR_SUCCESS) {
+               DEBUG(0, ("failed to unmarshall zero data request\n"));
+               return NT_STATUS_INVALID_PARAMETER;
+       }
+
+       if (zdata_info.beyond_final_zero < zdata_info.file_off) {
+               DEBUG(0, ("invalid zero data params: off %lu, bfz, %lu\n",
+                         (unsigned long)zdata_info.file_off,
+                         (unsigned long)zdata_info.beyond_final_zero));
+               return NT_STATUS_INVALID_PARAMETER;
+       }
+
+       /* convert strange "beyond final zero" param into length */
+       len = zdata_info.beyond_final_zero - zdata_info.file_off;
+
+       if (len == 0) {
+               DEBUG(2, ("zero data called with zero length range\n"));
+               return NT_STATUS_OK;
+       }
+
+       init_strict_lock_struct(fsp,
+                               fsp->op->global->open_persistent_id,
+                               zdata_info.file_off,
+                               len,
+                               WRITE_LOCK,
+                               &lck);
+
+       if (!SMB_VFS_STRICT_LOCK(fsp->conn, fsp, &lck)) {
+               DEBUG(2, ("failed to lock range for zero-data\n"));
+               return NT_STATUS_FILE_LOCK_CONFLICT;
+       }
+
+       /*
+        * MS-FSCC <58> Section 2.3.67
+        * This FSCTL sets the range of bytes to zero (0) without extending the
+        * file size.
+        *
+        * The VFS_FALLOCATE_FL_KEEP_SIZE flag is used to satisfy this
+        * constraint.
+        */
+
+       mode = VFS_FALLOCATE_FL_PUNCH_HOLE | VFS_FALLOCATE_FL_KEEP_SIZE;
+       ret = SMB_VFS_FALLOCATE(fsp, mode, zdata_info.file_off, len);
+       if (ret == -1)  {
+               status = map_nt_error_from_unix_common(errno);
+               DEBUG(2, ("zero-data fallocate(0x%x) failed: %s\n", mode,
+                     strerror(errno)));
+               SMB_VFS_STRICT_UNLOCK(fsp->conn, fsp, &lck);
+               return status;
+       }
+
+       if (!fsp->is_sparse && lp_strict_allocate(SNUM(fsp->conn))) {
+               /*
+                * File marked non-sparse and "strict allocate" is enabled -
+                * allocate the range that we just punched out.
+                * In future FALLOC_FL_ZERO_RANGE could be used exclusively for
+                * this, but it's currently only supported on XFS and ext4.
+                *
+                * The newly allocated range still won't be found by SEEK_DATA
+                * for QAR, but stat.st_blocks will reflect it.
+                */
+               ret = SMB_VFS_FALLOCATE(fsp, VFS_FALLOCATE_FL_KEEP_SIZE,
+                                       zdata_info.file_off, len);
+               if (ret == -1)  {
+                       status = map_nt_error_from_unix_common(errno);
+                       DEBUG(0, ("fallocate failed: %s\n", strerror(errno)));
+                       SMB_VFS_STRICT_UNLOCK(fsp->conn, fsp, &lck);
+                       return status;
+               }
+       }
+
+       SMB_VFS_STRICT_UNLOCK(fsp->conn, fsp, &lck);
+       return NT_STATUS_OK;
+}
+
+static NTSTATUS fsctl_qar_buf_push(TALLOC_CTX *mem_ctx,
+                                  struct file_alloced_range_buf *qar_buf,
+                                  DATA_BLOB *qar_array_blob)
+{
+       DATA_BLOB new_slot;
+       enum ndr_err_code ndr_ret;
+       bool ok;
+
+       ndr_ret = ndr_push_struct_blob(&new_slot, mem_ctx, qar_buf,
+                       (ndr_push_flags_fn_t)ndr_push_file_alloced_range_buf);
+       if (ndr_ret != NDR_ERR_SUCCESS) {
+               DEBUG(0, ("failed to marshall QAR buf\n"));
+               return NT_STATUS_INVALID_PARAMETER;
+       }
+
+       /* TODO should be able to avoid copy by pushing into prealloced buf */
+       ok = data_blob_append(mem_ctx, qar_array_blob, new_slot.data,
+                             new_slot.length);
+       data_blob_free(&new_slot);
+       if (!ok) {
+               return NT_STATUS_NO_MEMORY;
+       }
+
+       return NT_STATUS_OK;
+}
+
+static NTSTATUS fsctl_qar_seek_fill(TALLOC_CTX *mem_ctx,
+                                   struct files_struct *fsp,
+                                   off_t curr_off,
+                                   off_t max_off,
+                                   DATA_BLOB *qar_array_blob)
+{
+       NTSTATUS status = NT_STATUS_NOT_SUPPORTED;
+
+#ifdef HAVE_LSEEK_HOLE_DATA
+       while (curr_off <= max_off) {
+               off_t data_off;
+               off_t hole_off;
+               struct file_alloced_range_buf qar_buf;
+
+               /* seek next data */
+               data_off = SMB_VFS_LSEEK(fsp, curr_off, SEEK_DATA);
+               if ((data_off == -1) && (errno == ENXIO)) {
+                       /* no data from curr_off to EOF */
+                       break;
+               } else if (data_off == -1) {
+                       status = map_nt_error_from_unix_common(errno);
+                       DEBUG(1, ("lseek data failed: %s\n", strerror(errno)));
+                       return status;
+               }
+
+               if (data_off > max_off) {
+                       /* found something, but passed range of interest */
+                       break;
+               }
+
+               hole_off = SMB_VFS_LSEEK(fsp, data_off, SEEK_HOLE);
+               if (hole_off == -1) {
+                       status = map_nt_error_from_unix_common(errno);
+                       DEBUG(1, ("lseek hole failed: %s\n", strerror(errno)));
+                       return status;
+               }
+
+               if (hole_off <= data_off) {
+                       DEBUG(1, ("lseek inconsistent: hole %lu at or before "
+                                 "data %lu\n", (unsigned long)hole_off,
+                                 (unsigned long)data_off));
+                       return NT_STATUS_INTERNAL_ERROR;
+               }
+
+               qar_buf.file_off = data_off;
+               /* + 1 to convert maximum offset to length */
+               qar_buf.len = MIN(hole_off, max_off + 1) - data_off;
+
+               status = fsctl_qar_buf_push(mem_ctx, &qar_buf, qar_array_blob);
+               if (!NT_STATUS_IS_OK(status)) {
+                       return NT_STATUS_NO_MEMORY;
+               }
+
+               curr_off = hole_off;
+       }
+       status = NT_STATUS_OK;
+#endif
+
+       return status;
+}
+
+static NTSTATUS fsctl_qar(TALLOC_CTX *mem_ctx,
+                         struct tevent_context *ev,
+                         struct files_struct *fsp,
+                         DATA_BLOB *in_input,
+                         size_t in_max_output,
+                         DATA_BLOB *out_output)
+{
+       struct fsctl_query_alloced_ranges_req qar_req;
+       struct fsctl_query_alloced_ranges_rsp qar_rsp;
+       DATA_BLOB qar_array_blob = data_blob_null;
+       uint64_t max_off;
+       enum ndr_err_code ndr_ret;
+       int ret;
+       NTSTATUS status;
+       SMB_STRUCT_STAT sbuf;
+
+       if (fsp == NULL) {
+               return NT_STATUS_FILE_CLOSED;
+       }
+
+       /* READ_DATA permission is required */
+       status = check_access_fsp(fsp, FILE_READ_DATA);
+       if (!NT_STATUS_IS_OK(status)) {
+               return status;
+       }
+
+       ndr_ret = ndr_pull_struct_blob(in_input, mem_ctx, &qar_req,
+               (ndr_pull_flags_fn_t)ndr_pull_fsctl_query_alloced_ranges_req);
+       if (ndr_ret != NDR_ERR_SUCCESS) {
+               DEBUG(0, ("failed to unmarshall QAR req\n"));
+               return NT_STATUS_INVALID_PARAMETER;
+       }
+
+       /*
+        * XXX Windows Server 2008 & 2012 servers don't return lock-conflict
+        * for QAR requests over an exclusively locked range!
+        */
+
+       ret = SMB_VFS_FSTAT(fsp, &sbuf);
+       if (ret == -1) {
+               status = map_nt_error_from_unix_common(errno);
+               DEBUG(2, ("fstat failed: %s\n", strerror(errno)));
+               return status;
+       }
+
+       if ((qar_req.buf.len == 0)
+        || (sbuf.st_ex_size == 0)
+        || (qar_req.buf.file_off >= sbuf.st_ex_size)) {
+               /* zero length range or after EOF, no ranges to return */
+               return NT_STATUS_OK;
+       }
+
+       /* check for integer overflow */
+       if (qar_req.buf.file_off + qar_req.buf.len < qar_req.buf.file_off) {
+               return NT_STATUS_INVALID_PARAMETER;
+       }
+
+       /*
+        * Maximum offset is either the last valid offset _before_ EOF, or the
+        * last byte offset within the requested range. -1 converts length to
+        * offset, which is easier to work with for SEEK_DATA/SEEK_HOLE, E.g.:
+        *
+        * /off=0             /off=512K          /st_ex_size=1M
+        * |-------------------------------------|
+        * | File data                           |
+        * |-------------------------------------|
+        *                                                   QAR end\
+        *                    |=====================================|
+        *                    |    QAR off=512K, len=1M             |
+        *                    |=================^===================|
+        *                                   max_off=1M - 1
+        *             QAR end\
+        * |==================|
+        * |QAR off=0 len=512K|
+        * |==================|
+        *                   ^
+        *                max_off=512K - 1
+        */
+       max_off = MIN(sbuf.st_ex_size,
+                     qar_req.buf.file_off + qar_req.buf.len) - 1;
+
+       if (!fsp->is_sparse) {
+               struct file_alloced_range_buf qar_buf;
+
+               /* file is non-sparse, claim file_off->max_off is allocated */
+               qar_buf.file_off = qar_req.buf.file_off;
+               /* + 1 to convert maximum offset back to length */
+               qar_buf.len = max_off - qar_req.buf.file_off + 1;
+
+               status = fsctl_qar_buf_push(mem_ctx, &qar_buf, &qar_array_blob);
+       } else {
+               status = fsctl_qar_seek_fill(mem_ctx, fsp, qar_req.buf.file_off,
+                                            max_off, &qar_array_blob);
+       }
+       if (!NT_STATUS_IS_OK(status)) {
+               return status;
+       }
+
+       /* marshall response buffer. */
+       qar_rsp.far_buf_array = qar_array_blob;
+
+       ndr_ret = ndr_push_struct_blob(out_output, mem_ctx, &qar_rsp,
+               (ndr_push_flags_fn_t)ndr_push_fsctl_query_alloced_ranges_rsp);
+       if (ndr_ret != NDR_ERR_SUCCESS) {
+               DEBUG(0, ("failed to marshall QAR rsp\n"));
+               return NT_STATUS_INVALID_PARAMETER;
+       }
+
+       if (out_output->length > in_max_output) {
+               DEBUG(2, ("QAR output len %lu exceeds max %lu\n",
+                         (unsigned long)out_output->length,
+                         (unsigned long)in_max_output));
+               data_blob_free(out_output);
+               return NT_STATUS_BUFFER_TOO_SMALL;
+       }
+
+       return NT_STATUS_OK;
+}
+
+static void smb2_ioctl_filesys_dup_extents_done(struct tevent_req *subreq);
+
 struct tevent_req *smb2_ioctl_filesys(uint32_t ctl_code,
                                      struct tevent_context *ev,
                                      struct tevent_req *req,
                                      struct smbd_smb2_ioctl_state *state)
 {
+       NTSTATUS status;
+
        switch (ctl_code) {
-       /* no filesystem device type ioctls are supported yet */
+       case FSCTL_GET_COMPRESSION:
+               status = fsctl_get_cmprn(state, ev, state->fsp,
+                                        state->in_max_output,
+                                        &state->out_output);
+               if (!tevent_req_nterror(req, status)) {
+                       tevent_req_done(req);
+               }
+               return tevent_req_post(req, ev);
+               break;
+       case FSCTL_SET_COMPRESSION:
+               status = fsctl_set_cmprn(state, ev, state->fsp,
+                                        &state->in_input);
+               if (!tevent_req_nterror(req, status)) {
+                       tevent_req_done(req);
+               }
+               return tevent_req_post(req, ev);
+               break;
+       case FSCTL_SET_ZERO_DATA:
+               status = fsctl_zero_data(state, ev, state->fsp,
+                                        &state->in_input);
+               if (!tevent_req_nterror(req, status)) {
+                       tevent_req_done(req);
+               }
+               return tevent_req_post(req, ev);
+               break;
+       case FSCTL_QUERY_ALLOCATED_RANGES:
+               status = fsctl_qar(state, ev, state->fsp,
+                                  &state->in_input,
+                                  state->in_max_output,
+                                  &state->out_output);
+               if (!tevent_req_nterror(req, status)) {
+                       tevent_req_done(req);
+               }
+               return tevent_req_post(req, ev);
+               break;
+       case FSCTL_DUP_EXTENTS_TO_FILE: {
+               struct tevent_req *subreq = NULL;
+
+               subreq = fsctl_dup_extents_send(state, ev,
+                                               state->fsp,
+                                               &state->in_input,
+                                               state->smb2req);
+               if (tevent_req_nomem(subreq, req)) {
+                       return tevent_req_post(req, ev);
+               }
+               tevent_req_set_callback(subreq,
+                                       smb2_ioctl_filesys_dup_extents_done,
+                                       req);
+               return req;
+               break;
+       }
        default: {
-               NTSTATUS status;
                uint8_t *out_data = NULL;
                uint32_t out_data_len = 0;
 
@@ -75,3 +807,16 @@ struct tevent_req *smb2_ioctl_filesys(uint32_t ctl_code,
        tevent_req_nterror(req, NT_STATUS_INTERNAL_ERROR);
        return tevent_req_post(req, ev);
 }
+
+static void smb2_ioctl_filesys_dup_extents_done(struct tevent_req *subreq)
+{
+       struct tevent_req *req = tevent_req_callback_data(subreq,
+                                                         struct tevent_req);
+       NTSTATUS status;
+
+       status = fsctl_dup_extents_recv(subreq);
+       TALLOC_FREE(subreq);
+       if (!tevent_req_nterror(req, status)) {
+               tevent_req_done(req);
+       }
+}