2007-09-13 01:48:20 +04:00
/*
2002-01-30 09:08:46 +03:00
Unix SMB / CIFS implementation .
1996-05-04 11:50:46 +04:00
Directory handling routines
1998-01-22 16:27:43 +03:00
Copyright ( C ) Andrew Tridgell 1992 - 1998
2007-09-13 01:48:20 +04:00
Copyright ( C ) Jeremy Allison 2007
1996-05-04 11:50:46 +04:00
This program is free software ; you can redistribute it and / or modify
it under the terms of the GNU General Public License as published by
2007-07-09 23:25:36 +04:00
the Free Software Foundation ; either version 3 of the License , or
1996-05-04 11:50:46 +04:00
( at your option ) any later version .
2007-09-13 01:48:20 +04:00
1996-05-04 11:50:46 +04:00
This program is distributed in the hope that it will be useful ,
but WITHOUT ANY WARRANTY ; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE . See the
GNU General Public License for more details .
2007-09-13 01:48:20 +04:00
1996-05-04 11:50:46 +04:00
You should have received a copy of the GNU General Public License
2007-07-10 04:52:41 +04:00
along with this program . If not , see < http : //www.gnu.org/licenses/>.
1996-05-04 11:50:46 +04:00
*/
# include "includes.h"
2011-02-26 01:20:06 +03:00
# include "system/filesys.h"
2020-10-28 14:09:39 +03:00
# include "locking/share_mode_lock.h"
2011-03-22 18:57:01 +03:00
# include "smbd/smbd.h"
2009-01-08 14:03:45 +03:00
# include "smbd/globals.h"
2010-10-12 08:27:50 +04:00
# include "libcli/security/security.h"
2011-07-07 15:04:31 +04:00
# include "lib/util/bitmap.h"
2014-07-17 14:58:34 +04:00
# include "../lib/util/memcache.h"
2014-09-25 03:30:33 +04:00
# include "../librpc/gen_ndr/open_files.h"
2020-08-07 21:17:34 +03:00
# include "lib/util/string_wrappers.h"
1996-05-04 11:50:46 +04:00
/*
This module implements directory related functions for Samba .
*/
2005-07-22 00:24:21 +04:00
/* "Special" directory offsets. */
# define END_OF_DIRECTORY_OFFSET ((long)-1)
# define START_OF_DIRECTORY_OFFSET ((long)0)
# define DOT_DOT_DIRECTORY_OFFSET ((long)0x80000000)
2014-01-12 02:56:57 +04:00
/* "Special" directory offsets in 32-bit wire format. */
# define WIRE_END_OF_DIRECTORY_OFFSET ((uint32_t)0xFFFFFFFF)
# define WIRE_START_OF_DIRECTORY_OFFSET ((uint32_t)0)
# define WIRE_DOT_DOT_DIRECTORY_OFFSET ((uint32_t)0x80000000)
2005-02-01 03:28:20 +03:00
/* Make directory handle internals available. */
struct name_cache_entry {
char * name ;
long offset ;
} ;
struct smb_Dir {
connection_struct * conn ;
2012-03-28 06:22:03 +04:00
DIR * dir ;
2005-02-01 03:28:20 +03:00
long offset ;
2016-02-27 01:59:51 +03:00
struct smb_filename * dir_smb_fname ;
2007-08-24 01:53:00 +04:00
size_t name_cache_size ;
2005-02-01 03:28:20 +03:00
struct name_cache_entry * name_cache ;
unsigned int name_cache_index ;
2005-06-11 03:13:25 +04:00
unsigned int file_number ;
2021-10-16 02:48:03 +03:00
bool case_sensitive ;
2013-04-11 03:21:39 +04:00
files_struct * fsp ; /* Back pointer to containing fsp, only
set from OpenDir_fsp ( ) . */
2005-02-01 03:28:20 +03:00
} ;
struct dptr_struct {
struct dptr_struct * next , * prev ;
1999-12-13 16:27:58 +03:00
int dnum ;
2015-05-03 07:01:14 +03:00
uint16_t spid ;
2005-02-01 03:28:20 +03:00
struct connection_struct * conn ;
struct smb_Dir * dir_hnd ;
2007-10-19 04:40:25 +04:00
bool expect_close ;
2005-02-01 03:28:20 +03:00
char * wcard ;
2015-05-03 07:01:14 +03:00
uint32_t attr ;
2016-02-27 03:35:17 +03:00
struct smb_filename * smb_dname ;
2007-10-19 04:40:25 +04:00
bool has_wild ; /* Set to true if the wcard entry has MS wildcard characters in it. */
bool did_stat ; /* Optimisation for non-wcard searches. */
2012-02-29 23:42:21 +04:00
bool priv ; /* Directory handle opened with privilege. */
2014-01-12 03:45:48 +04:00
uint32_t counter ;
struct memcache * dptr_cache ;
2005-02-01 03:28:20 +03:00
} ;
1996-05-04 11:50:46 +04:00
2022-02-21 19:12:05 +03:00
static NTSTATUS OpenDir_fsp (
TALLOC_CTX * mem_ctx ,
connection_struct * conn ,
files_struct * fsp ,
const char * mask ,
uint32_t attr ,
struct smb_Dir * * _dir_hnd ) ;
1996-05-04 11:50:46 +04:00
2019-07-17 19:42:45 +03:00
static void DirCacheAdd ( struct smb_Dir * dir_hnd , const char * name , long offset ) ;
2013-04-16 03:54:20 +04:00
2019-07-17 19:40:04 +03:00
static int smb_Dir_destructor ( struct smb_Dir * dir_hnd ) ;
2019-07-17 18:56:49 +03:00
2021-06-04 22:27:38 +03:00
static bool SearchDir ( struct smb_Dir * dir_hnd , const char * name , long * poffset ) ;
1999-12-13 16:27:58 +03:00
# define INVALID_DPTR_KEY (-3)
1996-05-04 11:50:46 +04:00
/****************************************************************************
1999-12-13 16:27:58 +03:00
Initialise the dir bitmap .
1996-05-04 11:50:46 +04:00
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
1999-12-13 16:27:58 +03:00
2009-08-06 14:15:51 +04:00
bool init_dptrs ( struct smbd_server_connection * sconn )
1996-05-04 11:50:46 +04:00
{
2011-03-18 02:16:54 +03:00
if ( sconn - > searches . dptr_bmap ) {
2009-08-06 14:15:51 +04:00
return true ;
}
1999-12-13 16:27:58 +03:00
2011-03-18 02:16:54 +03:00
sconn - > searches . dptr_bmap = bitmap_talloc (
2010-03-28 16:16:55 +04:00
sconn , MAX_DIRECTORY_HANDLES ) ;
2009-08-06 14:15:51 +04:00
2011-03-18 02:16:54 +03:00
if ( sconn - > searches . dptr_bmap = = NULL ) {
2009-08-06 14:15:51 +04:00
return false ;
}
1999-12-13 16:27:58 +03:00
2009-08-06 14:15:51 +04:00
return true ;
1996-05-04 11:50:46 +04:00
}
/****************************************************************************
2005-02-01 03:28:20 +03:00
Get the struct dptr_struct for a dir index .
1996-05-04 11:50:46 +04:00
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
1999-12-13 16:27:58 +03:00
2009-08-06 14:15:51 +04:00
static struct dptr_struct * dptr_get ( struct smbd_server_connection * sconn ,
2019-07-09 01:20:42 +03:00
int key )
1996-05-04 11:50:46 +04:00
{
2005-02-01 03:28:20 +03:00
struct dptr_struct * dptr ;
2003-01-03 21:50:13 +03:00
2018-03-05 14:55:23 +03:00
for ( dptr = sconn - > searches . dirptrs ; dptr ! = NULL ; dptr = dptr - > next ) {
if ( dptr - > dnum ! = key ) {
continue ;
}
DLIST_PROMOTE ( sconn - > searches . dirptrs , dptr ) ;
return dptr ;
2003-01-03 21:50:13 +03:00
}
return ( NULL ) ;
1996-05-04 11:50:46 +04:00
}
1999-12-13 16:27:58 +03:00
/****************************************************************************
Get the dir path for a dir index .
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
2012-02-25 05:12:52 +04:00
const char * dptr_path ( struct smbd_server_connection * sconn , int key )
1996-05-04 11:50:46 +04:00
{
2019-07-09 01:20:42 +03:00
struct dptr_struct * dptr = dptr_get ( sconn , key ) ;
2003-01-03 21:50:13 +03:00
if ( dptr )
2016-02-27 03:35:17 +03:00
return ( dptr - > smb_dname - > base_name ) ;
2003-01-03 21:50:13 +03:00
return ( NULL ) ;
1996-05-04 11:50:46 +04:00
}
/****************************************************************************
2005-02-01 03:28:20 +03:00
Get the dir wcard for a dir index .
1996-05-04 11:50:46 +04:00
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
1999-12-13 16:27:58 +03:00
2012-02-25 05:12:52 +04:00
const char * dptr_wcard ( struct smbd_server_connection * sconn , int key )
1996-05-04 11:50:46 +04:00
{
2019-07-09 01:20:42 +03:00
struct dptr_struct * dptr = dptr_get ( sconn , key ) ;
2003-01-03 21:50:13 +03:00
if ( dptr )
return ( dptr - > wcard ) ;
return ( NULL ) ;
1996-05-04 11:50:46 +04:00
}
/****************************************************************************
2005-02-01 03:28:20 +03:00
Get the dir attrib for a dir index .
1996-05-04 11:50:46 +04:00
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
1999-12-13 16:27:58 +03:00
2015-05-03 07:01:14 +03:00
uint16_t dptr_attr ( struct smbd_server_connection * sconn , int key )
1996-05-04 11:50:46 +04:00
{
2019-07-09 01:20:42 +03:00
struct dptr_struct * dptr = dptr_get ( sconn , key ) ;
2005-02-01 03:28:20 +03:00
if ( dptr )
return ( dptr - > attr ) ;
return ( 0 ) ;
1996-05-04 11:50:46 +04:00
}
/****************************************************************************
1999-12-13 16:27:58 +03:00
Close all dptrs for a cnum .
1996-05-04 11:50:46 +04:00
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
1999-12-13 16:27:58 +03:00
1998-08-14 21:38:29 +04:00
void dptr_closecnum ( connection_struct * conn )
1996-05-04 11:50:46 +04:00
{
2005-02-01 03:28:20 +03:00
struct dptr_struct * dptr , * next ;
2009-08-06 14:15:51 +04:00
struct smbd_server_connection * sconn = conn - > sconn ;
if ( sconn = = NULL ) {
return ;
}
2011-03-18 02:16:54 +03:00
for ( dptr = sconn - > searches . dirptrs ; dptr ; dptr = next ) {
2003-01-03 21:50:13 +03:00
next = dptr - > next ;
2009-08-06 14:15:51 +04:00
if ( dptr - > conn = = conn ) {
2022-02-01 19:47:29 +03:00
/*
* Need to make a copy , " dptr " will be gone
* after close_file_free ( ) returns
*/
struct files_struct * fsp = dptr - > dir_hnd - > fsp ;
close_file_free ( NULL , & fsp , NORMAL_CLOSE ) ;
2009-08-06 14:15:51 +04:00
}
2003-01-03 21:50:13 +03:00
}
1996-05-04 11:50:46 +04:00
}
/****************************************************************************
1999-12-13 16:27:58 +03:00
Create a new dir ptr . If the flag old_handle is true then we must allocate
from the bitmap range 0 - 255 as old SMBsearch directory handles are only
one byte long . If old_handle is false we allocate from the range
256 - MAX_DIRECTORY_HANDLES . We bias the number we return by 1 to ensure
2005-02-01 03:28:20 +03:00
a directory handle is never zero .
2005-08-13 03:45:16 +04:00
wcard must not be zero .
1996-05-04 11:50:46 +04:00
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
1999-12-13 16:27:58 +03:00
2012-03-01 04:05:50 +04:00
NTSTATUS dptr_create ( connection_struct * conn ,
struct smb_request * req ,
files_struct * fsp ,
2016-02-27 03:35:17 +03:00
bool old_handle ,
bool expect_close ,
uint16_t spid ,
const char * wcard ,
uint32_t attr ,
struct dptr_struct * * dptr_ret )
1996-05-04 11:50:46 +04:00
{
2009-08-06 14:15:51 +04:00
struct smbd_server_connection * sconn = conn - > sconn ;
2005-02-01 03:28:20 +03:00
struct dptr_struct * dptr = NULL ;
2022-02-21 19:09:36 +03:00
struct smb_Dir * dir_hnd = NULL ;
2022-02-21 19:12:05 +03:00
NTSTATUS status ;
2005-02-01 03:28:20 +03:00
2019-08-04 10:13:34 +03:00
DBG_INFO ( " dir=%s \n " , fsp_str_dbg ( fsp ) ) ;
1996-05-04 11:50:46 +04:00
2009-08-06 14:15:51 +04:00
if ( sconn = = NULL ) {
DEBUG ( 0 , ( " dptr_create: called with fake connection_struct \n " ) ) ;
return NT_STATUS_INTERNAL_ERROR ;
}
2005-08-13 03:45:16 +04:00
if ( ! wcard ) {
2007-01-17 05:09:37 +03:00
return NT_STATUS_INVALID_PARAMETER ;
2005-08-13 03:45:16 +04:00
}
2019-07-17 21:21:12 +03:00
if ( ! ( fsp - > access_mask & SEC_DIR_LIST ) ) {
DBG_INFO ( " dptr_create: directory %s "
" not open for LIST access \n " ,
2019-08-04 10:13:34 +03:00
fsp_str_dbg ( fsp ) ) ;
2019-07-17 21:21:12 +03:00
return NT_STATUS_ACCESS_DENIED ;
2007-01-17 05:09:37 +03:00
}
2022-02-21 19:12:05 +03:00
status = OpenDir_fsp ( NULL , conn , fsp , wcard , attr , & dir_hnd ) ;
if ( ! NT_STATUS_IS_OK ( status ) ) {
return status ;
2005-02-01 03:28:20 +03:00
}
2015-02-23 14:04:58 +03:00
dptr = talloc_zero ( NULL , struct dptr_struct ) ;
2003-01-03 21:50:13 +03:00
if ( ! dptr ) {
2012-02-25 05:16:08 +04:00
DEBUG ( 0 , ( " talloc fail in dptr_create. \n " ) ) ;
2008-01-12 19:08:04 +03:00
TALLOC_FREE ( dir_hnd ) ;
2007-01-17 05:09:37 +03:00
return NT_STATUS_NO_MEMORY ;
2003-01-03 21:50:13 +03:00
}
1999-12-13 16:27:58 +03:00
2019-08-04 10:13:34 +03:00
dptr - > smb_dname = cp_smb_filename ( dptr , fsp - > fsp_name ) ;
if ( dptr - > smb_dname = = NULL ) {
2012-02-25 05:16:08 +04:00
TALLOC_FREE ( dptr ) ;
2011-11-09 18:59:22 +04:00
TALLOC_FREE ( dir_hnd ) ;
return NT_STATUS_NO_MEMORY ;
}
dptr - > conn = conn ;
dptr - > dir_hnd = dir_hnd ;
dptr - > spid = spid ;
dptr - > expect_close = expect_close ;
2012-02-25 05:16:08 +04:00
dptr - > wcard = talloc_strdup ( dptr , wcard ) ;
2011-11-09 18:59:22 +04:00
if ( ! dptr - > wcard ) {
2012-02-25 05:16:08 +04:00
TALLOC_FREE ( dptr ) ;
2011-11-09 18:59:22 +04:00
TALLOC_FREE ( dir_hnd ) ;
return NT_STATUS_NO_MEMORY ;
}
2015-12-23 01:46:36 +03:00
if ( ( req ! = NULL & & req - > posix_pathnames ) | |
( wcard [ 0 ] = = ' . ' & & wcard [ 1 ] = = 0 ) ) {
2011-11-09 18:59:22 +04:00
dptr - > has_wild = True ;
} else {
2020-09-29 21:58:54 +03:00
dptr - > has_wild = ms_has_wild ( dptr - > wcard ) ;
2011-11-09 18:59:22 +04:00
}
dptr - > attr = attr ;
2011-11-09 19:04:09 +04:00
if ( sconn - > using_smb2 ) {
goto done ;
}
2003-01-03 21:50:13 +03:00
if ( old_handle ) {
1999-12-13 16:27:58 +03:00
2003-01-03 21:50:13 +03:00
/*
* This is an old - style SMBsearch request . Ensure the
* value we return will fit in the range 1 - 255.
*/
1999-12-13 16:27:58 +03:00
2011-03-18 02:16:54 +03:00
dptr - > dnum = bitmap_find ( sconn - > searches . dptr_bmap , 0 ) ;
1999-12-13 16:27:58 +03:00
2003-01-03 21:50:13 +03:00
if ( dptr - > dnum = = - 1 | | dptr - > dnum > 254 ) {
2019-07-09 01:23:57 +03:00
DBG_ERR ( " returned %d: Error - all old "
" dirptrs in use ? \n " ,
dptr - > dnum ) ;
TALLOC_FREE ( dptr ) ;
TALLOC_FREE ( dir_hnd ) ;
return NT_STATUS_TOO_MANY_OPENED_FILES ;
2003-01-03 21:50:13 +03:00
}
} else {
1999-12-13 16:27:58 +03:00
2003-01-03 21:50:13 +03:00
/*
* This is a new - style trans2 request . Allocate from
* a range that will return 256 - MAX_DIRECTORY_HANDLES .
*/
1999-12-13 16:27:58 +03:00
2011-03-18 02:16:54 +03:00
dptr - > dnum = bitmap_find ( sconn - > searches . dptr_bmap , 255 ) ;
1999-12-13 16:27:58 +03:00
2003-01-03 21:50:13 +03:00
if ( dptr - > dnum = = - 1 | | dptr - > dnum < 255 ) {
2019-07-09 01:26:59 +03:00
DBG_ERR ( " returned %d: Error - all new "
" dirptrs in use ? \n " ,
dptr - > dnum ) ;
TALLOC_FREE ( dptr ) ;
TALLOC_FREE ( dir_hnd ) ;
return NT_STATUS_TOO_MANY_OPENED_FILES ;
2003-01-03 21:50:13 +03:00
}
}
1996-05-04 11:50:46 +04:00
2011-03-18 02:16:54 +03:00
bitmap_set ( sconn - > searches . dptr_bmap , dptr - > dnum ) ;
1996-05-04 11:50:46 +04:00
2003-01-03 21:50:13 +03:00
dptr - > dnum + = 1 ; /* Always bias the dnum by one - no zero dnums allowed. */
1996-05-04 11:50:46 +04:00
2011-03-18 02:16:54 +03:00
DLIST_ADD ( sconn - > searches . dirptrs , dptr ) ;
1996-05-04 11:50:46 +04:00
2011-11-09 19:04:09 +04:00
done :
2019-08-04 10:13:34 +03:00
DBG_INFO ( " creating new dirptr [%d] for path [%s], expect_close = %d \n " ,
dptr - > dnum , fsp_str_dbg ( fsp ) , expect_close ) ;
1996-05-04 11:50:46 +04:00
2007-01-18 09:19:24 +03:00
* dptr_ret = dptr ;
2005-02-01 03:28:20 +03:00
2007-01-17 05:09:37 +03:00
return NT_STATUS_OK ;
1996-05-04 11:50:46 +04:00
}
2005-02-01 03:28:20 +03:00
/****************************************************************************
Wrapper functions to access the lower level directory handles .
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
2011-02-09 02:05:00 +03:00
void dptr_CloseDir ( files_struct * fsp )
2005-02-01 03:28:20 +03:00
{
2019-08-14 09:37:00 +03:00
struct smbd_server_connection * sconn = NULL ;
2019-08-04 10:21:55 +03:00
2019-08-04 10:15:47 +03:00
if ( fsp - > dptr = = NULL ) {
return ;
2011-02-09 02:05:00 +03:00
}
2019-08-14 09:37:00 +03:00
sconn = fsp - > dptr - > conn - > sconn ;
2019-08-04 10:15:47 +03:00
/*
* The destructor for the struct smb_Dir ( fsp - > dptr - > dir_hnd )
* now handles all resource deallocation .
*/
2019-08-04 10:21:55 +03:00
DBG_INFO ( " closing dptr key %d \n " , fsp - > dptr - > dnum ) ;
if ( sconn ! = NULL & & ! sconn - > using_smb2 ) {
DLIST_REMOVE ( sconn - > searches . dirptrs , fsp - > dptr ) ;
/*
* Free the dnum in the bitmap . Remember the dnum value is
* always biased by one with respect to the bitmap .
*/
if ( ! bitmap_query ( sconn - > searches . dptr_bmap ,
fsp - > dptr - > dnum - 1 ) )
{
DBG_ERR ( " closing dnum = %d and bitmap not set ! \n " ,
fsp - > dptr - > dnum ) ;
}
bitmap_clear ( sconn - > searches . dptr_bmap , fsp - > dptr - > dnum - 1 ) ;
}
TALLOC_FREE ( fsp - > dptr - > dir_hnd ) ;
TALLOC_FREE ( fsp - > dptr ) ;
2005-02-01 03:28:20 +03:00
}
void dptr_SeekDir ( struct dptr_struct * dptr , long offset )
{
SeekDir ( dptr - > dir_hnd , offset ) ;
}
long dptr_TellDir ( struct dptr_struct * dptr )
{
return TellDir ( dptr - > dir_hnd ) ;
}
2007-10-19 04:40:25 +04:00
bool dptr_has_wild ( struct dptr_struct * dptr )
2006-09-15 13:06:36 +04:00
{
return dptr - > has_wild ;
}
2007-01-18 09:19:24 +03:00
int dptr_dnum ( struct dptr_struct * dptr )
{
return dptr - > dnum ;
}
2012-02-29 23:42:21 +04:00
bool dptr_get_priv ( struct dptr_struct * dptr )
{
return dptr - > priv ;
}
void dptr_set_priv ( struct dptr_struct * dptr )
{
dptr - > priv = true ;
}
2021-11-08 22:21:03 +03:00
bool dptr_case_sensitive ( struct dptr_struct * dptr )
{
return dptr - > dir_hnd - > case_sensitive ;
}
2005-02-01 21:33:50 +03:00
/****************************************************************************
Return the next visible file name , skipping veto ' d and invisible files .
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
2014-07-03 11:57:02 +04:00
static char * dptr_ReadDirName ( TALLOC_CTX * ctx ,
struct dptr_struct * dptr ,
long * poffset ,
SMB_STRUCT_STAT * pst )
2005-02-01 21:33:50 +03:00
{
2009-11-15 12:46:23 +03:00
struct smb_filename smb_fname_base ;
2009-01-23 07:18:56 +03:00
char * name = NULL ;
2009-11-16 11:49:23 +03:00
const char * name_temp = NULL ;
char * talloced = NULL ;
2009-01-23 07:18:56 +03:00
char * pathreal = NULL ;
2009-05-02 04:28:38 +04:00
char * found_name = NULL ;
2022-03-07 20:00:20 +03:00
NTSTATUS status ;
2009-05-02 04:28:38 +04:00
2005-06-03 09:35:04 +04:00
SET_STAT_INVALID ( * pst ) ;
2005-03-03 05:04:36 +03:00
2009-01-23 07:18:56 +03:00
if ( dptr - > has_wild | | dptr - > did_stat ) {
2021-06-04 23:41:50 +03:00
name_temp = ReadDirName ( dptr - > dir_hnd , poffset , pst ,
2009-11-16 11:49:23 +03:00
& talloced ) ;
if ( name_temp = = NULL ) {
return NULL ;
}
if ( talloced ! = NULL ) {
return talloc_move ( ctx , & talloced ) ;
}
return talloc_strdup ( ctx , name_temp ) ;
2005-02-01 21:33:50 +03:00
}
2009-01-23 07:18:56 +03:00
/* If poffset is -1 then we know we returned this name before and we
* have no wildcards . We ' re at the end of the directory . */
2005-07-22 00:24:21 +04:00
if ( * poffset = = END_OF_DIRECTORY_OFFSET ) {
2005-03-03 05:04:36 +03:00
return NULL ;
}
2009-01-23 07:18:56 +03:00
/* We know the stored wcard contains no wildcard characters.
* See if we can match with a stat call . If we can ' t , then set
* did_stat to true to ensure we only do this once and keep
* searching . */
dptr - > did_stat = true ;
if ( VALID_STAT ( * pst ) ) {
2009-05-12 02:39:05 +04:00
name = talloc_strdup ( ctx , dptr - > wcard ) ;
2009-01-23 07:18:56 +03:00
goto ret ;
}
2005-02-01 21:33:50 +03:00
2009-01-23 07:18:56 +03:00
pathreal = talloc_asprintf ( ctx ,
" %s/%s " ,
2016-02-27 03:35:17 +03:00
dptr - > smb_dname - > base_name ,
2009-01-23 07:18:56 +03:00
dptr - > wcard ) ;
if ( ! pathreal )
return NULL ;
2005-02-01 21:33:50 +03:00
2009-06-23 02:26:56 +04:00
/* Create an smb_filename with stream_name == NULL. */
2020-05-01 17:55:58 +03:00
smb_fname_base = ( struct smb_filename ) {
. base_name = pathreal ,
2020-10-14 16:48:07 +03:00
. flags = dptr - > dir_hnd - > fsp - > fsp_name - > flags ,
2020-05-01 18:05:48 +03:00
. twrp = dptr - > smb_dname - > twrp ,
2020-05-01 17:55:58 +03:00
} ;
2009-06-23 02:26:56 +04:00
2020-10-14 16:48:07 +03:00
if ( vfs_stat ( dptr - > conn , & smb_fname_base ) = = 0 ) {
2009-11-15 12:46:23 +03:00
* pst = smb_fname_base . st ;
2009-05-12 02:39:05 +04:00
name = talloc_strdup ( ctx , dptr - > wcard ) ;
2009-01-23 07:18:56 +03:00
goto clean ;
} else {
/* If we get any other error than ENOENT or ENOTDIR
then the file exists we just can ' t stat it . */
if ( errno ! = ENOENT & & errno ! = ENOTDIR ) {
2009-05-12 02:39:05 +04:00
name = talloc_strdup ( ctx , dptr - > wcard ) ;
2009-01-23 07:18:56 +03:00
goto clean ;
2006-09-15 13:06:36 +04:00
}
2009-01-23 07:18:56 +03:00
}
2006-09-15 13:06:36 +04:00
2022-01-08 18:36:51 +03:00
/* Stat failed. We know this is authoritative if we are
2009-01-23 07:18:56 +03:00
* providing case sensitive semantics or the underlying
* filesystem is case sensitive .
*/
2021-10-16 02:52:10 +03:00
if ( dptr - > dir_hnd - > case_sensitive | |
2009-01-23 07:18:56 +03:00
! ( dptr - > conn - > fs_capabilities & FILE_CASE_SENSITIVE_SEARCH ) )
{
goto clean ;
}
2007-09-13 01:48:20 +04:00
2009-05-02 04:28:38 +04:00
/*
* Try case - insensitive stat if the fs has the ability . This avoids
* scanning the whole directory .
*/
2022-03-15 14:45:48 +03:00
status = SMB_VFS_GET_REAL_FILENAME_AT ( dptr - > conn ,
dptr - > dir_hnd - > fsp ,
dptr - > wcard ,
ctx ,
& found_name ) ;
2022-03-07 20:00:20 +03:00
if ( NT_STATUS_IS_OK ( status ) ) {
2009-05-02 04:28:38 +04:00
name = found_name ;
goto clean ;
2022-03-13 17:58:03 +03:00
}
if ( NT_STATUS_EQUAL ( status , NT_STATUS_OBJECT_NAME_NOT_FOUND ) ) {
2009-05-02 04:28:38 +04:00
/* The case-insensitive lookup was authoritative. */
goto clean ;
}
2009-01-23 07:18:56 +03:00
TALLOC_FREE ( pathreal ) ;
2006-09-15 13:06:36 +04:00
2021-06-04 23:41:50 +03:00
name_temp = ReadDirName ( dptr - > dir_hnd , poffset , pst , & talloced ) ;
2009-11-16 11:49:23 +03:00
if ( name_temp = = NULL ) {
return NULL ;
}
if ( talloced ! = NULL ) {
return talloc_move ( ctx , & talloced ) ;
}
return talloc_strdup ( ctx , name_temp ) ;
2009-01-23 07:18:56 +03:00
clean :
TALLOC_FREE ( pathreal ) ;
ret :
/* We need to set the underlying dir_hnd offset to -1
* also as this function is usually called with the
* output from TellDir . */
dptr - > dir_hnd - > offset = * poffset = END_OF_DIRECTORY_OFFSET ;
return name ;
2005-02-01 21:33:50 +03:00
}
/****************************************************************************
2021-06-04 22:32:34 +03:00
Search for a file by name .
2005-02-01 21:33:50 +03:00
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
2007-10-19 04:40:25 +04:00
bool dptr_SearchDir ( struct dptr_struct * dptr , const char * name , long * poffset , SMB_STRUCT_STAT * pst )
2005-02-01 21:33:50 +03:00
{
2005-06-03 09:35:04 +04:00
SET_STAT_INVALID ( * pst ) ;
2005-03-21 21:10:21 +03:00
2005-07-22 00:24:21 +04:00
if ( ! dptr - > has_wild & & ( dptr - > dir_hnd - > offset = = END_OF_DIRECTORY_OFFSET ) ) {
2005-03-21 21:10:21 +03:00
/* This is a singleton directory and we're already at the end. */
2005-07-22 00:24:21 +04:00
* poffset = END_OF_DIRECTORY_OFFSET ;
2005-03-21 21:10:21 +03:00
return False ;
}
2006-06-27 03:36:03 +04:00
return SearchDir ( dptr - > dir_hnd , name , poffset ) ;
2005-02-01 03:28:20 +03:00
}
2014-01-12 02:48:00 +04:00
/****************************************************************************
Map a native directory offset to a 32 - bit cookie .
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
static uint32_t map_dir_offset_to_wire ( struct dptr_struct * dptr , long offset )
{
2014-01-12 03:45:48 +04:00
DATA_BLOB key ;
DATA_BLOB val ;
2014-01-12 02:59:00 +04:00
if ( offset = = END_OF_DIRECTORY_OFFSET ) {
return WIRE_END_OF_DIRECTORY_OFFSET ;
2022-03-10 17:50:42 +03:00
}
if ( offset = = START_OF_DIRECTORY_OFFSET ) {
2014-01-12 02:59:00 +04:00
return WIRE_START_OF_DIRECTORY_OFFSET ;
2022-03-10 17:50:42 +03:00
}
if ( offset = = DOT_DOT_DIRECTORY_OFFSET ) {
2014-01-12 02:59:00 +04:00
return WIRE_DOT_DOT_DIRECTORY_OFFSET ;
}
2014-01-12 03:45:48 +04:00
if ( sizeof ( long ) = = 4 ) {
/* 32-bit machine. We can cheat... */
return ( uint32_t ) offset ;
}
if ( dptr - > dptr_cache = = NULL ) {
/* Lazy initialize cache. */
dptr - > dptr_cache = memcache_init ( dptr , 0 ) ;
if ( dptr - > dptr_cache = = NULL ) {
return WIRE_END_OF_DIRECTORY_OFFSET ;
}
} else {
/* Have we seen this offset before ? */
key . data = ( void * ) & offset ;
key . length = sizeof ( offset ) ;
if ( memcache_lookup ( dptr - > dptr_cache ,
SMB1_SEARCH_OFFSET_MAP ,
key ,
& val ) ) {
uint32_t wire_offset ;
SMB_ASSERT ( val . length = = sizeof ( wire_offset ) ) ;
memcpy ( & wire_offset , val . data , sizeof ( wire_offset ) ) ;
DEBUG ( 10 , ( " found wire %u <-> offset %ld \n " ,
( unsigned int ) wire_offset ,
( long ) offset ) ) ;
return wire_offset ;
}
}
/* Allocate a new wire cookie. */
do {
dptr - > counter + + ;
} while ( dptr - > counter = = WIRE_START_OF_DIRECTORY_OFFSET | |
dptr - > counter = = WIRE_END_OF_DIRECTORY_OFFSET | |
dptr - > counter = = WIRE_DOT_DOT_DIRECTORY_OFFSET ) ;
/* Store it in the cache. */
key . data = ( void * ) & offset ;
key . length = sizeof ( offset ) ;
val . data = ( void * ) & dptr - > counter ;
val . length = sizeof ( dptr - > counter ) ; /* MUST BE uint32_t ! */
memcache_add ( dptr - > dptr_cache ,
SMB1_SEARCH_OFFSET_MAP ,
key ,
val ) ;
/* And the reverse mapping for lookup from
map_wire_to_dir_offset ( ) . */
memcache_add ( dptr - > dptr_cache ,
SMB1_SEARCH_OFFSET_MAP ,
val ,
key ) ;
DEBUG ( 10 , ( " stored wire %u <-> offset %ld \n " ,
( unsigned int ) dptr - > counter ,
( long ) offset ) ) ;
return dptr - > counter ;
2014-01-12 02:48:00 +04:00
}
1996-05-04 11:50:46 +04:00
/****************************************************************************
1999-12-13 16:27:58 +03:00
Fill the 5 byte server reserved dptr field .
1996-05-04 11:50:46 +04:00
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
1999-12-13 16:27:58 +03:00
2009-08-06 14:15:51 +04:00
bool dptr_fill ( struct smbd_server_connection * sconn ,
char * buf1 , unsigned int key )
1996-05-04 11:50:46 +04:00
{
2003-01-03 21:50:13 +03:00
unsigned char * buf = ( unsigned char * ) buf1 ;
2019-07-09 01:20:42 +03:00
struct dptr_struct * dptr = dptr_get ( sconn , key ) ;
2014-01-12 02:36:17 +04:00
uint32_t wire_offset ;
2005-02-01 03:28:20 +03:00
if ( ! dptr ) {
2003-01-03 21:50:13 +03:00
DEBUG ( 1 , ( " filling null dirptr %d \n " , key ) ) ;
return ( False ) ;
}
2014-01-12 02:48:00 +04:00
wire_offset = map_dir_offset_to_wire ( dptr , TellDir ( dptr - > dir_hnd ) ) ;
2003-01-03 21:50:13 +03:00
DEBUG ( 6 , ( " fill on key %u dirptr 0x%lx now at %d \n " , key ,
2014-01-12 02:36:17 +04:00
( long ) dptr - > dir_hnd , ( int ) wire_offset ) ) ;
2003-01-03 21:50:13 +03:00
buf [ 0 ] = key ;
2014-01-12 02:36:17 +04:00
SIVAL ( buf , 1 , wire_offset ) ;
2003-01-03 21:50:13 +03:00
return ( True ) ;
1996-05-04 11:50:46 +04:00
}
2014-01-12 03:04:38 +04:00
/****************************************************************************
Map a 32 - bit wire cookie to a native directory offset .
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
static long map_wire_to_dir_offset ( struct dptr_struct * dptr , uint32_t wire_offset )
{
2014-01-12 03:45:48 +04:00
DATA_BLOB key ;
DATA_BLOB val ;
2014-01-12 03:04:38 +04:00
if ( wire_offset = = WIRE_END_OF_DIRECTORY_OFFSET ) {
return END_OF_DIRECTORY_OFFSET ;
} else if ( wire_offset = = WIRE_START_OF_DIRECTORY_OFFSET ) {
return START_OF_DIRECTORY_OFFSET ;
} else if ( wire_offset = = WIRE_DOT_DOT_DIRECTORY_OFFSET ) {
return DOT_DOT_DIRECTORY_OFFSET ;
}
2014-01-12 03:45:48 +04:00
if ( sizeof ( long ) = = 4 ) {
/* 32-bit machine. We can cheat... */
return ( long ) wire_offset ;
}
if ( dptr - > dptr_cache = = NULL ) {
/* Logic error, cache should be initialized. */
return END_OF_DIRECTORY_OFFSET ;
}
key . data = ( void * ) & wire_offset ;
key . length = sizeof ( wire_offset ) ;
if ( memcache_lookup ( dptr - > dptr_cache ,
SMB1_SEARCH_OFFSET_MAP ,
key ,
& val ) ) {
/* Found mapping. */
long offset ;
SMB_ASSERT ( val . length = = sizeof ( offset ) ) ;
memcpy ( & offset , val . data , sizeof ( offset ) ) ;
DEBUG ( 10 , ( " lookup wire %u <-> offset %ld \n " ,
( unsigned int ) wire_offset ,
( long ) offset ) ) ;
return offset ;
}
return END_OF_DIRECTORY_OFFSET ;
2014-01-12 03:04:38 +04:00
}
1996-05-04 11:50:46 +04:00
/****************************************************************************
2019-07-17 23:16:37 +03:00
Return the associated fsp and seek the dir_hnd on it it given the 5 byte
server field .
1996-05-04 11:50:46 +04:00
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
1999-12-13 16:27:58 +03:00
2019-07-17 23:16:37 +03:00
files_struct * dptr_fetch_fsp ( struct smbd_server_connection * sconn ,
2009-08-06 14:15:51 +04:00
char * buf , int * num )
1996-05-04 11:50:46 +04:00
{
2003-01-03 21:50:13 +03:00
unsigned int key = * ( unsigned char * ) buf ;
2019-07-09 01:20:42 +03:00
struct dptr_struct * dptr = dptr_get ( sconn , key ) ;
2014-01-12 02:36:17 +04:00
uint32_t wire_offset ;
2005-05-01 13:30:18 +04:00
long seekoff ;
2003-01-03 21:50:13 +03:00
2019-07-17 23:16:37 +03:00
if ( dptr = = NULL ) {
2003-01-03 21:50:13 +03:00
DEBUG ( 3 , ( " fetched null dirptr %d \n " , key ) ) ;
return ( NULL ) ;
}
* num = key ;
2014-01-12 02:36:17 +04:00
wire_offset = IVAL ( buf , 1 ) ;
2014-01-12 03:04:38 +04:00
seekoff = map_wire_to_dir_offset ( dptr , wire_offset ) ;
2005-05-01 13:30:18 +04:00
SeekDir ( dptr - > dir_hnd , seekoff ) ;
2003-01-03 21:50:13 +03:00
DEBUG ( 3 , ( " fetching dirptr %d for path %s at offset %d \n " ,
2016-02-27 03:35:17 +03:00
key , dptr - > smb_dname - > base_name , ( int ) seekoff ) ) ;
2019-07-17 23:05:43 +03:00
return dptr - > dir_hnd - > fsp ;
}
2021-01-22 14:46:04 +03:00
struct files_struct * dir_hnd_fetch_fsp ( struct smb_Dir * dir_hnd )
{
return dir_hnd - > fsp ;
}
2019-07-17 23:20:08 +03:00
/****************************************************************************
Fetch the fsp associated with the dptr_num .
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
files_struct * dptr_fetch_lanman2_fsp ( struct smbd_server_connection * sconn ,
int dptr_num )
{
2019-07-17 23:28:53 +03:00
struct dptr_struct * dptr = dptr_get ( sconn , dptr_num ) ;
2019-07-17 23:20:08 +03:00
if ( dptr = = NULL ) {
return NULL ;
}
2019-07-17 23:28:53 +03:00
DBG_NOTICE ( " fetching dirptr %d for path %s \n " ,
dptr_num ,
dptr - > smb_dname - > base_name ) ;
2019-07-17 23:20:08 +03:00
return dptr - > dir_hnd - > fsp ;
}
2007-10-19 04:40:25 +04:00
static bool mangle_mask_match ( connection_struct * conn ,
2007-09-12 03:57:59 +04:00
const char * filename ,
const char * mask )
2002-07-15 14:35:28 +04:00
{
2007-09-08 00:57:01 +04:00
char mname [ 13 ] ;
if ( ! name_to_8_3 ( filename , mname , False , conn - > params ) ) {
return False ;
}
return mask_match_search ( mname , mask , False ) ;
2002-07-15 14:35:28 +04:00
}
2009-08-06 22:53:13 +04:00
bool smbd_dirptr_get_entry ( TALLOC_CTX * ctx ,
struct dptr_struct * dirptr ,
const char * mask ,
uint32_t dirtype ,
bool dont_descend ,
bool ask_sharemode ,
2020-11-12 12:00:57 +03:00
bool get_dosmode_in ,
2009-08-06 22:53:13 +04:00
bool ( * match_fn ) ( TALLOC_CTX * ctx ,
void * private_data ,
const char * dname ,
const char * mask ,
char * * _fname ) ,
bool ( * mode_fn ) ( TALLOC_CTX * ctx ,
void * private_data ,
2021-07-13 02:40:08 +03:00
struct files_struct * dirfsp ,
struct smb_filename * atname ,
2009-08-06 22:53:13 +04:00
struct smb_filename * smb_fname ,
2018-03-15 18:48:38 +03:00
bool get_dosmode ,
2009-08-06 22:53:13 +04:00
uint32_t * _mode ) ,
void * private_data ,
char * * _fname ,
struct smb_filename * * _smb_fname ,
uint32_t * _mode ,
long * _prev_offset )
{
connection_struct * conn = dirptr - > conn ;
2013-03-22 01:00:06 +04:00
size_t slashlen ;
size_t pathlen ;
2016-02-27 03:35:17 +03:00
const char * dpath = dirptr - > smb_dname - > base_name ;
bool dirptr_path_is_dot = ISDOT ( dpath ) ;
2020-11-12 12:00:57 +03:00
NTSTATUS status ;
2021-02-01 14:09:39 +03:00
int ret ;
2009-08-06 22:53:13 +04:00
* _smb_fname = NULL ;
* _mode = 0 ;
2016-02-27 03:35:17 +03:00
pathlen = strlen ( dpath ) ;
slashlen = ( dpath [ pathlen - 1 ] ! = ' / ' ) ? 1 : 0 ;
2009-08-06 22:53:13 +04:00
while ( true ) {
long cur_offset ;
long prev_offset ;
2014-07-03 12:00:13 +04:00
SMB_STRUCT_STAT sbuf = { 0 } ;
2009-08-06 22:53:13 +04:00
char * dname = NULL ;
bool isdots ;
char * fname = NULL ;
char * pathreal = NULL ;
2020-11-12 12:00:57 +03:00
struct smb_filename * atname = NULL ;
struct smb_filename * smb_fname = NULL ;
2009-08-06 22:53:13 +04:00
uint32_t mode = 0 ;
2020-11-12 12:00:57 +03:00
bool check_dfs_symlink = false ;
bool get_dosmode = get_dosmode_in ;
2009-08-06 22:53:13 +04:00
bool ok ;
cur_offset = dptr_TellDir ( dirptr ) ;
prev_offset = cur_offset ;
dname = dptr_ReadDirName ( ctx , dirptr , & cur_offset , & sbuf ) ;
2022-03-24 20:31:59 +03:00
DBG_DEBUG ( " dir [%s] dirptr [0x%lx] offset [%ld] => dname [%s] \n " ,
smb_fname_str_dbg ( dirptr - > smb_dname ) , ( long ) dirptr ,
cur_offset , dname ? dname : " (finished) " ) ;
2009-08-06 22:53:13 +04:00
if ( dname = = NULL ) {
return false ;
}
isdots = ( ISDOT ( dname ) | | ISDOTDOT ( dname ) ) ;
if ( dont_descend & & ! isdots ) {
TALLOC_FREE ( dname ) ;
continue ;
}
2021-06-04 21:20:08 +03:00
if ( IS_VETO_PATH ( conn , dname ) ) {
TALLOC_FREE ( dname ) ;
continue ;
}
2009-08-06 22:53:13 +04:00
/*
* fname may get mangled , dname is never mangled .
* Whenever we ' re accessing the filesystem we use
* pathreal which is composed from dname .
*/
ok = match_fn ( ctx , private_data , dname , mask , & fname ) ;
if ( ! ok ) {
TALLOC_FREE ( dname ) ;
continue ;
}
2013-03-22 01:00:06 +04:00
/*
* This used to be
* pathreal = talloc_asprintf ( ctx , " %s%s%s " , dirptr - > path ,
* needslash ? " / " : " " , dname ) ;
* but this was measurably slower than doing the memcpy .
*/
pathreal = talloc_array (
ctx , char ,
pathlen + slashlen + talloc_get_size ( dname ) ) ;
2009-08-06 22:53:13 +04:00
if ( ! pathreal ) {
TALLOC_FREE ( dname ) ;
TALLOC_FREE ( fname ) ;
return false ;
}
2021-02-01 14:04:49 +03:00
/*
* We don ' t want to pass . / xxx to modules below us so don ' t
* add the path if it is just . by itself .
*/
if ( dirptr_path_is_dot ) {
memcpy ( pathreal , dname , talloc_get_size ( dname ) ) ;
} else {
memcpy ( pathreal , dpath , pathlen ) ;
pathreal [ pathlen ] = ' / ' ;
memcpy ( pathreal + slashlen + pathlen , dname ,
talloc_get_size ( dname ) ) ;
}
/* Create smb_fname with NULL stream_name. */
smb_fname = synthetic_smb_fname ( talloc_tos ( ) ,
pathreal ,
NULL ,
& sbuf ,
dirptr - > smb_dname - > twrp ,
dirptr - > smb_dname - > flags ) ;
TALLOC_FREE ( pathreal ) ;
if ( smb_fname = = NULL ) {
TALLOC_FREE ( dname ) ;
TALLOC_FREE ( fname ) ;
return false ;
}
2021-02-01 14:09:39 +03:00
if ( ! VALID_STAT ( smb_fname - > st ) ) {
/*
* If stat ( ) fails with ENOENT it might be a
* msdfs - symlink in Windows context , this is checked
* below , for now we just want to fill stat info as good
* as we can .
*/
ret = vfs_stat ( conn , smb_fname ) ;
if ( ret ! = 0 & & errno ! = ENOENT ) {
TALLOC_FREE ( smb_fname ) ;
TALLOC_FREE ( dname ) ;
TALLOC_FREE ( fname ) ;
continue ;
}
}
2020-11-12 12:00:57 +03:00
/* Create smb_fname with NULL stream_name. */
atname = synthetic_smb_fname ( talloc_tos ( ) ,
dname ,
NULL ,
2021-02-01 14:09:39 +03:00
& smb_fname - > st ,
2020-11-12 12:00:57 +03:00
dirptr - > smb_dname - > twrp ,
dirptr - > smb_dname - > flags ) ;
if ( atname = = NULL ) {
TALLOC_FREE ( dname ) ;
TALLOC_FREE ( fname ) ;
2021-02-01 14:04:49 +03:00
TALLOC_FREE ( smb_fname ) ;
2020-11-12 12:00:57 +03:00
return false ;
}
/*
* openat_pathref_fsp ( ) will return
* NT_STATUS_OBJECT_NAME_NOT_FOUND in non - POSIX context when
* hitting a dangling symlink . It may be a DFS symlink , this is
* checked below by the mode_fn ( ) call , so we have to allow this
* here .
*
* NT_STATUS_STOPPED_ON_SYMLINK is returned in POSIX context
* when hitting a symlink and ensures we always return directory
* entries that are symlinks in POSIX context .
*/
status = openat_pathref_fsp ( dirptr - > dir_hnd - > fsp , atname ) ;
if ( ! NT_STATUS_IS_OK ( status ) & &
2021-02-02 13:18:54 +03:00
! NT_STATUS_EQUAL ( status , NT_STATUS_OBJECT_NAME_NOT_FOUND ) )
2020-11-12 12:00:57 +03:00
{
TALLOC_FREE ( atname ) ;
TALLOC_FREE ( dname ) ;
TALLOC_FREE ( fname ) ;
2021-02-01 14:04:49 +03:00
TALLOC_FREE ( smb_fname ) ;
2020-11-12 12:00:57 +03:00
continue ;
2022-03-10 17:56:07 +03:00
}
if ( NT_STATUS_EQUAL ( status , NT_STATUS_OBJECT_NAME_NOT_FOUND ) ) {
2020-11-12 12:00:57 +03:00
if ( ! ( atname - > flags & SMB_FILENAME_POSIX_PATH ) ) {
2021-02-02 13:18:54 +03:00
check_dfs_symlink = true ;
2020-11-12 12:00:57 +03:00
}
/*
2021-02-02 13:18:54 +03:00
* Check if it ' s a symlink . We only want to return this
* if it ' s a DFS symlink or in POSIX mode . Disable
* getting dosmode in the mode_fn ( ) and prime the mode
* as FILE_ATTRIBUTE_NORMAL .
2020-11-12 12:00:57 +03:00
*/
mode = FILE_ATTRIBUTE_NORMAL ;
get_dosmode = false ;
}
status = move_smb_fname_fsp_link ( smb_fname , atname ) ;
if ( ! NT_STATUS_IS_OK ( status ) ) {
DBG_WARNING ( " Failed to move pathref for [%s]: %s \n " ,
smb_fname_str_dbg ( smb_fname ) ,
nt_errstr ( status ) ) ;
2021-07-13 02:32:23 +03:00
TALLOC_FREE ( atname ) ;
2020-11-12 12:00:57 +03:00
TALLOC_FREE ( smb_fname ) ;
TALLOC_FREE ( dname ) ;
TALLOC_FREE ( fname ) ;
continue ;
}
2021-06-04 23:32:40 +03:00
if ( ! is_visible_fsp ( smb_fname - > fsp ) ) {
2021-07-13 02:32:23 +03:00
TALLOC_FREE ( atname ) ;
2021-06-04 20:10:55 +03:00
TALLOC_FREE ( smb_fname ) ;
TALLOC_FREE ( dname ) ;
TALLOC_FREE ( fname ) ;
continue ;
}
2021-07-15 05:11:05 +03:00
/*
* Don ' t leak metadata about the containing
* directory of the share .
*/
if ( dirptr_path_is_dot & & ISDOTDOT ( dname ) ) {
/*
* Making a copy here , then freeing
* the original will close the smb_fname - > fsp .
*/
struct smb_filename * tmp_smb_fname =
cp_smb_filename ( ctx , smb_fname ) ;
if ( tmp_smb_fname = = NULL ) {
TALLOC_FREE ( atname ) ;
TALLOC_FREE ( smb_fname ) ;
TALLOC_FREE ( dname ) ;
TALLOC_FREE ( fname ) ;
return false ;
}
TALLOC_FREE ( smb_fname ) ;
smb_fname = tmp_smb_fname ;
mode = FILE_ATTRIBUTE_DIRECTORY ;
get_dosmode = false ;
2022-10-18 16:37:47 +03:00
/* Ensure posix fileid and sids are hidden
*/
smb_fname - > st . st_ex_ino = 0 ;
smb_fname - > st . st_ex_dev = 0 ;
smb_fname - > st . st_ex_uid = - 1 ;
smb_fname - > st . st_ex_gid = - 1 ;
2021-07-15 05:11:05 +03:00
}
2021-07-13 02:40:08 +03:00
ok = mode_fn ( ctx ,
private_data ,
dirptr - > dir_hnd - > fsp ,
atname ,
smb_fname ,
get_dosmode ,
& mode ) ;
2009-08-06 22:53:13 +04:00
if ( ! ok ) {
2021-07-13 02:32:23 +03:00
TALLOC_FREE ( atname ) ;
2020-11-12 12:00:57 +03:00
TALLOC_FREE ( smb_fname ) ;
TALLOC_FREE ( dname ) ;
TALLOC_FREE ( fname ) ;
continue ;
}
2021-07-13 02:32:23 +03:00
TALLOC_FREE ( atname ) ;
2020-11-12 12:00:57 +03:00
/*
* The only valid cases where we return the directory entry if
* it ' s a symlink are :
*
* 1. POSIX context , always return it , or
*
* 2. a DFS symlink where the mode_fn ( ) call above has verified
* this and set mode to FILE_ATTRIBUTE_REPARSE_POINT .
*/
if ( check_dfs_symlink & &
! ( mode & FILE_ATTRIBUTE_REPARSE_POINT ) )
{
TALLOC_FREE ( smb_fname ) ;
2009-08-06 22:53:13 +04:00
TALLOC_FREE ( dname ) ;
TALLOC_FREE ( fname ) ;
continue ;
}
2013-11-13 03:17:26 +04:00
if ( ! dir_check_ftype ( mode , dirtype ) ) {
2009-08-06 22:53:13 +04:00
DEBUG ( 5 , ( " [%s] attribs 0x%x didn't match 0x%x \n " ,
fname , ( unsigned int ) mode , ( unsigned int ) dirtype ) ) ;
2020-11-12 12:00:57 +03:00
TALLOC_FREE ( smb_fname ) ;
2009-08-06 22:53:13 +04:00
TALLOC_FREE ( dname ) ;
TALLOC_FREE ( fname ) ;
continue ;
}
2020-11-12 12:00:57 +03:00
if ( ask_sharemode & & ! S_ISDIR ( smb_fname - > st . st_ex_mode ) ) {
2009-08-06 22:53:13 +04:00
struct timespec write_time_ts ;
struct file_id fileid ;
fileid = vfs_file_id_from_sbuf ( conn ,
2020-11-12 12:00:57 +03:00
& smb_fname - > st ) ;
2011-01-26 00:57:38 +03:00
get_file_infos ( fileid , 0 , NULL , & write_time_ts ) ;
2019-12-02 18:30:50 +03:00
if ( ! is_omit_timespec ( & write_time_ts ) ) {
2020-11-12 12:00:57 +03:00
update_stat_ex_mtime ( & smb_fname - > st ,
2009-08-06 22:53:13 +04:00
write_time_ts ) ;
}
}
DEBUG ( 3 , ( " smbd_dirptr_get_entry mask=[%s] found %s "
" fname=%s (%s) \n " ,
2020-11-12 12:00:57 +03:00
mask , smb_fname_str_dbg ( smb_fname ) ,
2009-08-06 22:53:13 +04:00
dname , fname ) ) ;
2018-03-29 21:06:47 +03:00
if ( ! conn - > sconn - > using_smb2 ) {
/*
* The dircache is only needed for SMB1 because SMB1
* uses a name for the resume wheras SMB2 always
* continues from the next position ( unless it ' s told to
* restart or close - and - reopen the listing ) .
*/
DirCacheAdd ( dirptr - > dir_hnd , dname , cur_offset ) ;
}
2009-08-06 22:53:13 +04:00
TALLOC_FREE ( dname ) ;
2020-11-12 12:00:57 +03:00
* _smb_fname = talloc_move ( ctx , & smb_fname ) ;
2013-04-11 18:22:38 +04:00
if ( * _smb_fname = = NULL ) {
2009-11-15 12:46:23 +03:00
return false ;
}
2009-08-06 22:53:13 +04:00
* _fname = fname ;
* _mode = mode ;
* _prev_offset = prev_offset ;
return true ;
}
return false ;
}
1996-05-04 11:50:46 +04:00
/****************************************************************************
1999-12-13 16:27:58 +03:00
Get an 8.3 directory entry .
1996-05-04 11:50:46 +04:00
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
1999-12-13 16:27:58 +03:00
2009-08-07 10:54:06 +04:00
static bool smbd_dirptr_8_3_match_fn ( TALLOC_CTX * ctx ,
void * private_data ,
const char * dname ,
const char * mask ,
char * * _fname )
1996-05-04 11:50:46 +04:00
{
2009-08-07 10:54:06 +04:00
connection_struct * conn = ( connection_struct * ) private_data ;
if ( ( strcmp ( mask , " *.* " ) = = 0 ) | |
mask_match_search ( dname , mask , false ) | |
mangle_mask_match ( conn , dname , mask ) ) {
char mname [ 13 ] ;
const char * fname ;
2014-08-27 03:39:56 +04:00
/*
* Ensure we can push the original name as UCS2 . If
* not , then just don ' t return this name .
*/
NTSTATUS status ;
size_t ret_len = 0 ;
size_t len = ( strlen ( dname ) + 2 ) * 4 ; /* Allow enough space. */
uint8_t * tmp = talloc_array ( talloc_tos ( ) ,
2015-05-03 07:01:14 +03:00
uint8_t ,
2014-08-27 03:39:56 +04:00
len ) ;
status = srvstr_push ( NULL ,
FLAGS2_UNICODE_STRINGS ,
tmp ,
dname ,
len ,
STR_TERMINATE ,
& ret_len ) ;
TALLOC_FREE ( tmp ) ;
if ( ! NT_STATUS_IS_OK ( status ) ) {
return false ;
}
2009-08-07 10:54:06 +04:00
if ( ! mangle_is_8_3 ( dname , false , conn - > params ) ) {
bool ok = name_to_8_3 ( dname , mname , false ,
conn - > params ) ;
if ( ! ok ) {
2009-07-08 23:24:03 +04:00
return false ;
}
2009-08-07 10:54:06 +04:00
fname = mname ;
} else {
fname = dname ;
}
2009-07-08 23:24:03 +04:00
2009-08-07 10:54:06 +04:00
* _fname = talloc_strdup ( ctx , fname ) ;
if ( * _fname = = NULL ) {
return false ;
}
1996-05-04 11:50:46 +04:00
2009-08-07 10:54:06 +04:00
return true ;
}
2008-04-07 11:21:19 +04:00
2009-08-07 10:54:06 +04:00
return false ;
}
2008-03-12 17:39:38 +03:00
2009-08-07 10:54:06 +04:00
static bool smbd_dirptr_8_3_mode_fn ( TALLOC_CTX * ctx ,
void * private_data ,
2021-07-13 02:40:08 +03:00
struct files_struct * dirfsp ,
struct smb_filename * atname ,
2009-08-07 10:54:06 +04:00
struct smb_filename * smb_fname ,
2018-03-15 18:48:38 +03:00
bool get_dosmode ,
2009-08-07 10:54:06 +04:00
uint32_t * _mode )
{
connection_struct * conn = ( connection_struct * ) private_data ;
if ( ! VALID_STAT ( smb_fname - > st ) ) {
if ( ( SMB_VFS_STAT ( conn , smb_fname ) ) ! = 0 ) {
DEBUG ( 5 , ( " smbd_dirptr_8_3_mode_fn: "
" Couldn't stat [%s]. Error "
" = %s \n " ,
smb_fname_str_dbg ( smb_fname ) ,
strerror ( errno ) ) ) ;
return false ;
}
}
1996-05-04 11:50:46 +04:00
2020-11-25 15:21:25 +03:00
if ( get_dosmode ) {
2020-11-25 18:35:11 +03:00
* _mode = fdos_mode ( smb_fname - > fsp ) ;
smb_fname - > st = smb_fname - > fsp - > fsp_name - > st ;
2020-11-25 15:21:25 +03:00
}
2009-08-07 10:54:06 +04:00
return true ;
}
2006-04-08 09:00:04 +04:00
2009-08-07 10:54:06 +04:00
bool get_dir_entry ( TALLOC_CTX * ctx ,
2009-08-07 11:31:45 +04:00
struct dptr_struct * dirptr ,
2009-08-07 10:54:06 +04:00
const char * mask ,
uint32_t dirtype ,
char * * _fname ,
2012-04-05 08:53:08 +04:00
off_t * _size ,
2009-08-07 10:54:06 +04:00
uint32_t * _mode ,
struct timespec * _date ,
bool check_descend ,
bool ask_sharemode )
{
2009-08-07 11:31:45 +04:00
connection_struct * conn = dirptr - > conn ;
2009-08-07 10:54:06 +04:00
char * fname = NULL ;
struct smb_filename * smb_fname = NULL ;
uint32_t mode = 0 ;
long prev_offset ;
bool ok ;
2007-09-13 01:48:20 +04:00
2009-08-07 10:54:06 +04:00
ok = smbd_dirptr_get_entry ( ctx ,
2009-08-07 11:31:45 +04:00
dirptr ,
2009-08-07 10:54:06 +04:00
mask ,
dirtype ,
check_descend ,
ask_sharemode ,
2018-03-15 18:08:11 +03:00
true ,
2009-08-07 10:54:06 +04:00
smbd_dirptr_8_3_match_fn ,
smbd_dirptr_8_3_mode_fn ,
conn ,
& fname ,
& smb_fname ,
& mode ,
& prev_offset ) ;
if ( ! ok ) {
return false ;
2003-01-03 21:50:13 +03:00
}
1996-05-04 11:50:46 +04:00
2009-08-07 10:54:06 +04:00
* _fname = talloc_move ( ctx , & fname ) ;
* _size = smb_fname - > st . st_ex_size ;
* _mode = mode ;
* _date = smb_fname - > st . st_ex_mtime ;
TALLOC_FREE ( smb_fname ) ;
return true ;
2003-01-03 21:50:13 +03:00
}
1996-05-04 11:50:46 +04:00
2021-06-02 21:31:45 +03:00
/*******************************************************************
Check to see if a user can read an fsp . This is only approximate ,
it is used as part of the " hide unreadable " option . Don ' t
use it for anything security sensitive .
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
static bool user_can_read_fsp ( struct files_struct * fsp )
{
NTSTATUS status ;
uint32_t rejected_share_access = 0 ;
uint32_t rejected_mask = 0 ;
struct security_descriptor * sd = NULL ;
uint32_t access_mask = FILE_READ_DATA |
FILE_READ_EA |
FILE_READ_ATTRIBUTES |
SEC_STD_READ_CONTROL ;
/*
* Never hide files from the root user .
* We use ( uid_t ) 0 here not sec_initial_uid ( )
* as make test uses a single user context .
*/
if ( get_current_uid ( fsp - > conn ) = = ( uid_t ) 0 ) {
return true ;
}
/*
* We can ' t directly use smbd_check_access_rights_fsp ( )
* here , as this implicitly grants FILE_READ_ATTRIBUTES
* which the Windows access - based - enumeration code
* explicitly checks for on the file security descriptor .
* See bug :
*
* https : //bugzilla.samba.org/show_bug.cgi?id=10252
*
* and the smb2 . acl2 . ACCESSBASED test for details .
*/
rejected_share_access = access_mask & ~ ( fsp - > conn - > share_access ) ;
if ( rejected_share_access ) {
DBG_DEBUG ( " rejected share access 0x%x "
" on %s (0x%x) \n " ,
( unsigned int ) access_mask ,
fsp_str_dbg ( fsp ) ,
( unsigned int ) rejected_share_access ) ;
return false ;
}
2022-07-29 15:49:56 +03:00
status = SMB_VFS_FGET_NT_ACL ( metadata_fsp ( fsp ) ,
2021-06-02 21:31:45 +03:00
( SECINFO_OWNER |
SECINFO_GROUP |
SECINFO_DACL ) ,
talloc_tos ( ) ,
& sd ) ;
if ( ! NT_STATUS_IS_OK ( status ) ) {
DBG_DEBUG ( " Could not get acl "
" on %s: %s \n " ,
fsp_str_dbg ( fsp ) ,
nt_errstr ( status ) ) ;
return false ;
}
status = se_file_access_check ( sd ,
get_current_nttok ( fsp - > conn ) ,
false ,
access_mask ,
& rejected_mask ) ;
TALLOC_FREE ( sd ) ;
if ( NT_STATUS_EQUAL ( status , NT_STATUS_ACCESS_DENIED ) ) {
DBG_DEBUG ( " rejected bits 0x%x read access for %s \n " ,
( unsigned int ) rejected_mask ,
fsp_str_dbg ( fsp ) ) ;
return false ;
}
return true ;
}
2021-06-03 03:36:16 +03:00
/*******************************************************************
Check to see if a user can write to an fsp .
Always return true for directories .
This is only approximate ,
it is used as part of the " hide unwriteable " option . Don ' t
use it for anything security sensitive .
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
static bool user_can_write_fsp ( struct files_struct * fsp )
{
/*
* Never hide files from the root user .
* We use ( uid_t ) 0 here not sec_initial_uid ( )
* as make test uses a single user context .
*/
if ( get_current_uid ( fsp - > conn ) = = ( uid_t ) 0 ) {
return true ;
}
if ( fsp - > fsp_flags . is_directory ) {
return true ;
}
return can_write_to_fsp ( fsp ) ;
}
2002-09-25 19:19:00 +04:00
/*******************************************************************
Is a file a " special " type ?
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
2009-06-26 05:19:09 +04:00
static bool file_is_special ( connection_struct * conn ,
const struct smb_filename * smb_fname )
2002-09-25 19:19:00 +04:00
{
/*
2010-03-15 22:24:06 +03:00
* Never hide files from the root user .
* We use ( uid_t ) 0 here not sec_initial_uid ( )
* as make test uses a single user context .
2002-09-25 19:19:00 +04:00
*/
2010-03-15 22:24:06 +03:00
if ( get_current_uid ( conn ) = = ( uid_t ) 0 ) {
2003-12-23 10:33:42 +03:00
return False ;
2010-03-15 22:24:06 +03:00
}
2002-09-25 19:19:00 +04:00
2009-06-26 05:19:09 +04:00
SMB_ASSERT ( VALID_STAT ( smb_fname - > st ) ) ;
2002-09-25 19:19:00 +04:00
2009-06-26 05:19:09 +04:00
if ( S_ISREG ( smb_fname - > st . st_ex_mode ) | |
S_ISDIR ( smb_fname - > st . st_ex_mode ) | |
S_ISLNK ( smb_fname - > st . st_ex_mode ) )
2002-09-25 19:19:00 +04:00
return False ;
return True ;
}
2021-06-03 03:30:26 +03:00
/*******************************************************************
Should the file be seen by the client ?
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
2021-06-04 23:32:40 +03:00
bool is_visible_fsp ( struct files_struct * fsp )
2021-06-03 03:30:26 +03:00
{
bool hide_unreadable = false ;
bool hide_unwriteable = false ;
bool hide_special = false ;
int hide_new_files_timeout = 0 ;
const char * last_component = NULL ;
/*
* If the file does not exist , there ' s no point checking
* the configuration options . We succeed , on the basis that the
* checks * might * have passed if the file was present .
*/
if ( fsp = = NULL ) {
return true ;
}
hide_unreadable = lp_hide_unreadable ( SNUM ( fsp - > conn ) ) ;
hide_unwriteable = lp_hide_unwriteable_files ( SNUM ( fsp - > conn ) ) ;
hide_special = lp_hide_special_files ( SNUM ( fsp - > conn ) ) ;
hide_new_files_timeout = lp_hide_new_files_timeout ( SNUM ( fsp - > conn ) ) ;
2021-11-03 16:40:01 +03:00
if ( ! hide_unreadable & &
! hide_unwriteable & &
! hide_special & &
( hide_new_files_timeout = = 0 ) )
{
return true ;
}
2022-02-11 11:45:30 +03:00
fsp = metadata_fsp ( fsp ) ;
2021-06-03 03:30:26 +03:00
/* Get the last component of the base name. */
last_component = strrchr_m ( fsp - > fsp_name - > base_name , ' / ' ) ;
if ( ! last_component ) {
last_component = fsp - > fsp_name - > base_name ;
} else {
last_component + + ; /* Go past '/' */
}
if ( ISDOT ( last_component ) | | ISDOTDOT ( last_component ) ) {
return true ; /* . and .. are always visible. */
}
2021-06-04 20:09:34 +03:00
if ( fsp_get_pathref_fd ( fsp ) = = - 1 ) {
/*
* Symlink in POSIX mode or MS - DFS .
* We ' ve checked veto files so the
* only thing we can check is the
* hide_new_files_timeout .
*/
2022-11-07 17:08:51 +03:00
if ( ( hide_new_files_timeout ! = 0 ) & &
! S_ISDIR ( fsp - > fsp_name - > st . st_ex_mode ) ) {
2021-06-04 20:09:34 +03:00
double age = timespec_elapsed (
& fsp - > fsp_name - > st . st_ex_mtime ) ;
if ( age < ( double ) hide_new_files_timeout ) {
return false ;
}
}
return true ;
}
2022-12-07 12:49:47 +03:00
/* Honour _hide unreadable_ option */
if ( hide_unreadable & & ! user_can_read_fsp ( fsp ) ) {
DBG_DEBUG ( " file %s is unreadable. \n " , fsp_str_dbg ( fsp ) ) ;
return false ;
}
2021-06-03 03:30:26 +03:00
2022-12-07 12:49:47 +03:00
/* Honour _hide unwriteable_ option */
if ( hide_unwriteable & & ! user_can_write_fsp ( fsp ) ) {
DBG_DEBUG ( " file %s is unwritable. \n " , fsp_str_dbg ( fsp ) ) ;
return false ;
}
2021-06-03 03:30:26 +03:00
2022-12-07 12:49:47 +03:00
/* Honour _hide_special_ option */
if ( hide_special & & file_is_special ( fsp - > conn , fsp - > fsp_name ) ) {
DBG_DEBUG ( " file %s is special. \n " , fsp_str_dbg ( fsp ) ) ;
return false ;
}
if ( ( hide_new_files_timeout ! = 0 ) & &
! S_ISDIR ( fsp - > fsp_name - > st . st_ex_mode ) ) {
double age = timespec_elapsed ( & fsp - > fsp_name - > st . st_ex_mtime ) ;
if ( age < ( double ) hide_new_files_timeout ) {
return false ;
2021-06-03 03:30:26 +03:00
}
}
return true ;
}
2019-07-17 19:40:04 +03:00
static int smb_Dir_destructor ( struct smb_Dir * dir_hnd )
2008-01-12 19:08:04 +03:00
{
2019-07-18 01:25:11 +03:00
files_struct * fsp = dir_hnd - > fsp ;
SMB_VFS_CLOSEDIR ( dir_hnd - > conn , dir_hnd - > dir ) ;
2020-09-26 22:46:51 +03:00
fsp_set_fd ( fsp , - 1 ) ;
2020-03-18 20:25:33 +03:00
if ( fsp - > dptr ! = NULL ) {
SMB_ASSERT ( fsp - > dptr - > dir_hnd = = dir_hnd ) ;
fsp - > dptr - > dir_hnd = NULL ;
}
2019-07-18 01:25:11 +03:00
dir_hnd - > fsp = NULL ;
2008-01-12 19:08:04 +03:00
return 0 ;
}
1996-05-04 11:50:46 +04:00
/*******************************************************************
1999-12-13 16:27:58 +03:00
Open a directory .
1996-05-04 11:50:46 +04:00
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
1999-12-13 16:27:58 +03:00
2020-03-18 18:01:17 +03:00
static int smb_Dir_OpenDir_destructor ( struct smb_Dir * dir_hnd )
1996-05-04 11:50:46 +04:00
{
2020-03-18 18:01:17 +03:00
files_struct * fsp = dir_hnd - > fsp ;
2011-02-10 03:31:06 +03:00
2020-03-18 18:01:17 +03:00
smb_Dir_destructor ( dir_hnd ) ;
file_free ( NULL , fsp ) ;
return 0 ;
2011-02-10 03:31:06 +03:00
}
2022-03-01 01:34:48 +03:00
NTSTATUS OpenDir ( TALLOC_CTX * mem_ctx ,
connection_struct * conn ,
const struct smb_filename * smb_dname ,
const char * mask ,
uint32_t attr ,
struct smb_Dir * * _dir_hnd )
2016-12-20 03:35:00 +03:00
{
2020-03-18 18:01:17 +03:00
struct files_struct * fsp = NULL ;
2016-12-20 03:35:00 +03:00
struct smb_Dir * dir_hnd = NULL ;
NTSTATUS status ;
2020-05-15 16:14:26 +03:00
status = open_internal_dirfsp ( conn ,
smb_dname ,
O_RDONLY ,
& fsp ) ;
2016-12-20 03:35:00 +03:00
if ( ! NT_STATUS_IS_OK ( status ) ) {
2022-02-21 19:17:24 +03:00
return status ;
2016-12-20 03:35:00 +03:00
}
2022-02-21 19:12:05 +03:00
status = OpenDir_fsp ( mem_ctx , conn , fsp , mask , attr , & dir_hnd ) ;
if ( ! NT_STATUS_IS_OK ( status ) ) {
2022-02-21 19:17:24 +03:00
return status ;
2016-12-20 03:35:00 +03:00
}
/*
2022-03-13 17:22:50 +03:00
* This overwrites the destructor set by OpenDir_fsp ( ) but
* smb_Dir_OpenDir_destructor ( ) calls the OpenDir_fsp ( )
* destructor .
2016-12-20 03:35:00 +03:00
*/
2019-07-17 19:31:46 +03:00
talloc_set_destructor ( dir_hnd , smb_Dir_OpenDir_destructor ) ;
2022-02-21 19:17:24 +03:00
* _dir_hnd = dir_hnd ;
return NT_STATUS_OK ;
2016-12-19 22:55:56 +03:00
}
2022-03-13 17:42:31 +03:00
NTSTATUS OpenDir_from_pathref ( TALLOC_CTX * mem_ctx ,
struct files_struct * dirfsp ,
const char * mask ,
uint32_t attr ,
struct smb_Dir * * _dir_hnd )
{
struct files_struct * fsp = NULL ;
struct smb_Dir * dir_hnd = NULL ;
NTSTATUS status ;
status = openat_internal_dir_from_pathref ( dirfsp , O_RDONLY , & fsp ) ;
if ( ! NT_STATUS_IS_OK ( status ) ) {
return status ;
}
status = OpenDir_fsp ( mem_ctx , fsp - > conn , fsp , mask , attr , & dir_hnd ) ;
if ( ! NT_STATUS_IS_OK ( status ) ) {
return status ;
}
/*
* This overwrites the destructor set by OpenDir_fsp ( ) but
* smb_Dir_OpenDir_destructor ( ) calls the OpenDir_fsp ( )
* destructor .
*/
talloc_set_destructor ( dir_hnd , smb_Dir_OpenDir_destructor ) ;
* _dir_hnd = dir_hnd ;
return NT_STATUS_OK ;
}
2011-02-10 03:31:06 +03:00
/*******************************************************************
Open a directory from an fsp .
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
2022-02-21 19:12:05 +03:00
static NTSTATUS OpenDir_fsp (
TALLOC_CTX * mem_ctx ,
connection_struct * conn ,
files_struct * fsp ,
const char * mask ,
uint32_t attr ,
struct smb_Dir * * _dir_hnd )
2011-02-10 03:31:06 +03:00
{
2019-07-17 19:47:31 +03:00
struct smb_Dir * dir_hnd = talloc_zero ( mem_ctx , struct smb_Dir ) ;
2022-02-21 19:12:05 +03:00
NTSTATUS status ;
2011-02-10 03:31:06 +03:00
2019-07-17 19:47:31 +03:00
if ( ! dir_hnd ) {
2022-02-21 19:12:05 +03:00
return NT_STATUS_NO_MEMORY ;
2016-12-19 23:13:20 +03:00
}
2020-04-02 19:21:11 +03:00
if ( ! fsp - > fsp_flags . is_directory ) {
2022-02-21 19:12:05 +03:00
status = NT_STATUS_INVALID_HANDLE ;
2016-12-19 23:13:20 +03:00
goto fail ;
}
2020-09-26 22:46:51 +03:00
if ( fsp_get_io_fd ( fsp ) = = - 1 ) {
2022-02-21 19:12:05 +03:00
status = NT_STATUS_INVALID_HANDLE ;
2016-12-19 23:13:20 +03:00
goto fail ;
2011-02-10 03:31:06 +03:00
}
2019-07-17 19:47:31 +03:00
dir_hnd - > conn = conn ;
2018-03-29 21:06:47 +03:00
if ( ! conn - > sconn - > using_smb2 ) {
/*
* The dircache is only needed for SMB1 because SMB1 uses a name
* for the resume wheras SMB2 always continues from the next
* position ( unless it ' s told to restart or close - and - reopen the
* listing ) .
*/
2019-07-17 19:47:31 +03:00
dir_hnd - > name_cache_size =
lp_directory_name_cache_size ( SNUM ( conn ) ) ;
2018-03-29 21:06:47 +03:00
}
2011-02-10 03:31:06 +03:00
2019-07-17 19:47:31 +03:00
dir_hnd - > dir_smb_fname = cp_smb_filename ( dir_hnd , fsp - > fsp_name ) ;
if ( ! dir_hnd - > dir_smb_fname ) {
2022-02-21 19:12:05 +03:00
status = NT_STATUS_NO_MEMORY ;
2005-01-29 00:01:58 +03:00
goto fail ;
}
2008-01-12 19:08:04 +03:00
2019-07-17 19:47:31 +03:00
dir_hnd - > dir = SMB_VFS_FDOPENDIR ( fsp , mask , attr ) ;
if ( dir_hnd - > dir = = NULL ) {
2022-02-21 19:12:05 +03:00
status = map_nt_error_from_unix ( errno ) ;
2020-03-18 17:59:11 +03:00
goto fail ;
2011-02-10 02:05:58 +03:00
}
2020-03-18 17:59:11 +03:00
dir_hnd - > fsp = fsp ;
2021-11-06 02:43:14 +03:00
if ( fsp - > posix_flags & FSP_POSIX_FLAGS_OPEN ) {
dir_hnd - > case_sensitive = true ;
} else {
dir_hnd - > case_sensitive = conn - > case_sensitive ;
}
2011-02-10 02:05:58 +03:00
2019-07-17 19:47:31 +03:00
talloc_set_destructor ( dir_hnd , smb_Dir_destructor ) ;
2016-12-19 23:32:07 +03:00
2022-02-21 19:12:05 +03:00
* _dir_hnd = dir_hnd ;
return NT_STATUS_OK ;
2002-08-17 19:27:10 +04:00
2005-01-29 00:01:58 +03:00
fail :
2019-07-17 19:47:31 +03:00
TALLOC_FREE ( dir_hnd ) ;
2022-02-21 19:12:05 +03:00
return status ;
1996-05-04 11:50:46 +04:00
}
2011-02-10 03:31:06 +03:00
1996-05-04 11:50:46 +04:00
/*******************************************************************
2009-01-23 07:18:56 +03:00
Read from a directory .
Return directory entry , current offset , and optional stat information .
2005-02-01 21:33:50 +03:00
Don ' t check for veto or invisible files .
1996-05-04 11:50:46 +04:00
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
1999-12-13 16:27:58 +03:00
2019-07-17 19:51:07 +03:00
const char * ReadDirName ( struct smb_Dir * dir_hnd , long * poffset ,
2009-11-16 11:49:23 +03:00
SMB_STRUCT_STAT * sbuf , char * * ptalloced )
1996-05-04 11:50:46 +04:00
{
2009-11-16 11:49:23 +03:00
const char * n ;
char * talloced = NULL ;
2019-07-17 19:51:07 +03:00
connection_struct * conn = dir_hnd - > conn ;
1996-05-04 11:50:46 +04:00
2005-06-11 03:13:25 +04:00
/* Cheat to allow . and .. to be the first entries returned. */
2009-01-23 07:18:56 +03:00
if ( ( ( * poffset = = START_OF_DIRECTORY_OFFSET ) | |
2022-03-12 14:47:03 +03:00
( * poffset = = DOT_DOT_DIRECTORY_OFFSET ) ) & &
( dir_hnd - > file_number < 2 ) )
2009-01-23 07:18:56 +03:00
{
2019-07-17 19:51:07 +03:00
if ( dir_hnd - > file_number = = 0 ) {
2009-11-16 11:49:23 +03:00
n = " . " ;
2019-07-17 19:51:07 +03:00
* poffset = dir_hnd - > offset = START_OF_DIRECTORY_OFFSET ;
2005-06-11 03:13:25 +04:00
} else {
2009-11-16 11:49:23 +03:00
n = " .. " ;
2019-07-17 19:51:07 +03:00
* poffset = dir_hnd - > offset = DOT_DOT_DIRECTORY_OFFSET ;
2005-06-11 03:13:25 +04:00
}
2019-07-17 19:51:07 +03:00
dir_hnd - > file_number + + ;
2009-11-16 11:49:23 +03:00
* ptalloced = NULL ;
2005-06-11 03:13:25 +04:00
return n ;
2015-02-24 16:46:09 +03:00
}
if ( * poffset = = END_OF_DIRECTORY_OFFSET ) {
2019-07-17 19:51:07 +03:00
* poffset = dir_hnd - > offset = END_OF_DIRECTORY_OFFSET ;
2005-08-22 01:12:27 +04:00
return NULL ;
2005-06-11 03:13:25 +04:00
}
2015-02-24 16:46:09 +03:00
/* A real offset, seek to it. */
2019-07-17 19:51:07 +03:00
SeekDir ( dir_hnd , * poffset ) ;
2015-02-24 16:46:09 +03:00
2020-11-22 15:57:27 +03:00
while ( ( n = vfs_readdirname ( conn , dir_hnd - > fsp , dir_hnd - > dir , sbuf , & talloced ) ) ) {
2005-06-11 03:13:25 +04:00
/* Ignore . and .. - we've already returned them. */
2022-03-12 14:47:54 +03:00
if ( ISDOT ( n ) | | ISDOTDOT ( n ) ) {
TALLOC_FREE ( talloced ) ;
continue ;
2005-06-11 03:13:25 +04:00
}
2019-07-17 19:51:07 +03:00
* poffset = dir_hnd - > offset = SMB_VFS_TELLDIR ( conn , dir_hnd - > dir ) ;
2009-11-16 11:49:23 +03:00
* ptalloced = talloced ;
2019-07-17 19:51:07 +03:00
dir_hnd - > file_number + + ;
2006-04-08 09:00:04 +04:00
return n ;
2003-01-03 21:50:13 +03:00
}
2019-07-17 19:51:07 +03:00
* poffset = dir_hnd - > offset = END_OF_DIRECTORY_OFFSET ;
2009-11-16 11:49:23 +03:00
* ptalloced = NULL ;
2005-01-29 00:01:58 +03:00
return NULL ;
}
2005-06-15 22:37:34 +04:00
/*******************************************************************
Rewind to the start .
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
2019-07-17 19:52:41 +03:00
void RewindDir ( struct smb_Dir * dir_hnd , long * poffset )
2005-06-15 22:37:34 +04:00
{
2019-07-17 19:52:41 +03:00
SMB_VFS_REWINDDIR ( dir_hnd - > conn , dir_hnd - > dir ) ;
dir_hnd - > file_number = 0 ;
dir_hnd - > offset = START_OF_DIRECTORY_OFFSET ;
2005-07-22 00:24:21 +04:00
* poffset = START_OF_DIRECTORY_OFFSET ;
2005-06-15 22:37:34 +04:00
}
2005-01-29 00:01:58 +03:00
/*******************************************************************
Seek a dir .
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
1996-05-04 11:50:46 +04:00
2005-02-01 03:28:20 +03:00
void SeekDir ( struct smb_Dir * dirp , long offset )
2005-01-29 00:01:58 +03:00
{
2005-02-01 03:28:20 +03:00
if ( offset ! = dirp - > offset ) {
2005-09-28 00:41:22 +04:00
if ( offset = = START_OF_DIRECTORY_OFFSET ) {
2005-06-15 22:37:34 +04:00
RewindDir ( dirp , & offset ) ;
2007-09-13 01:48:20 +04:00
/*
2005-09-28 00:41:22 +04:00
* Ok we should really set the file number here
* to 1 to enable " .. " to be returned next . Trouble
* is I ' m worried about callers using SeekDir ( dirp , 0 )
* as equivalent to RewindDir ( ) . So leave this alone
* for now .
*/
} else if ( offset = = DOT_DOT_DIRECTORY_OFFSET ) {
RewindDir ( dirp , & offset ) ;
/*
* Set the file number to 2 - we want to get the first
* real file entry ( the one we return after " .. " )
* on the next ReadDir .
*/
dirp - > file_number = 2 ;
2005-08-22 01:12:27 +04:00
} else if ( offset = = END_OF_DIRECTORY_OFFSET ) {
; /* Don't seek in this case. */
2005-06-15 22:37:34 +04:00
} else {
SMB_VFS_SEEKDIR ( dirp - > conn , dirp - > dir , offset ) ;
}
2005-02-01 03:28:20 +03:00
dirp - > offset = offset ;
}
1996-05-04 11:50:46 +04:00
}
/*******************************************************************
1999-12-13 16:27:58 +03:00
Tell a dir position .
1996-05-04 11:50:46 +04:00
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
1999-12-13 16:27:58 +03:00
2019-07-17 19:53:40 +03:00
long TellDir ( struct smb_Dir * dir_hnd )
1996-05-04 11:50:46 +04:00
{
2019-07-17 19:53:40 +03:00
return ( dir_hnd - > offset ) ;
2005-01-29 00:01:58 +03:00
}
1996-05-04 11:50:46 +04:00
2006-04-08 09:00:04 +04:00
/*******************************************************************
Add an entry into the dcache .
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
2019-07-17 19:42:45 +03:00
static void DirCacheAdd ( struct smb_Dir * dir_hnd , const char * name , long offset )
2006-04-08 09:00:04 +04:00
{
struct name_cache_entry * e ;
2019-07-17 19:42:45 +03:00
if ( dir_hnd - > name_cache_size = = 0 ) {
2007-08-24 01:53:00 +04:00
return ;
}
2019-07-17 19:42:45 +03:00
if ( dir_hnd - > name_cache = = NULL ) {
dir_hnd - > name_cache = talloc_zero_array ( dir_hnd ,
struct name_cache_entry ,
dir_hnd - > name_cache_size ) ;
2008-01-08 23:45:21 +03:00
2019-07-17 19:42:45 +03:00
if ( dir_hnd - > name_cache = = NULL ) {
2008-01-08 23:45:21 +03:00
return ;
}
}
2019-07-17 19:42:45 +03:00
dir_hnd - > name_cache_index = ( dir_hnd - > name_cache_index + 1 ) %
dir_hnd - > name_cache_size ;
e = & dir_hnd - > name_cache [ dir_hnd - > name_cache_index ] ;
2008-01-12 19:08:04 +03:00
TALLOC_FREE ( e - > name ) ;
2019-07-17 19:42:45 +03:00
e - > name = talloc_strdup ( dir_hnd , name ) ;
2006-04-08 09:00:04 +04:00
e - > offset = offset ;
}
2005-01-29 00:01:58 +03:00
/*******************************************************************
Find an entry by name . Leave us at the offset after it .
2005-02-01 21:33:50 +03:00
Don ' t check for veto or invisible files .
2005-01-29 00:01:58 +03:00
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
2021-06-04 22:27:38 +03:00
static bool SearchDir ( struct smb_Dir * dir_hnd , const char * name , long * poffset )
2005-01-29 00:01:58 +03:00
{
int i ;
2009-11-16 11:49:23 +03:00
const char * entry = NULL ;
char * talloced = NULL ;
2019-07-17 19:55:58 +03:00
connection_struct * conn = dir_hnd - > conn ;
2005-01-29 00:01:58 +03:00
/* Search back in the name cache. */
2019-07-17 19:55:58 +03:00
if ( dir_hnd - > name_cache_size & & dir_hnd - > name_cache ) {
for ( i = dir_hnd - > name_cache_index ; i > = 0 ; i - - ) {
struct name_cache_entry * e = & dir_hnd - > name_cache [ i ] ;
2021-10-16 02:52:10 +03:00
if ( e - > name & & ( dir_hnd - > case_sensitive ? ( strcmp ( e - > name , name ) = = 0 ) : strequal ( e - > name , name ) ) ) {
2007-08-24 01:53:00 +04:00
* poffset = e - > offset ;
2019-07-17 19:55:58 +03:00
SeekDir ( dir_hnd , e - > offset ) ;
2007-08-24 01:53:00 +04:00
return True ;
}
2005-01-29 00:01:58 +03:00
}
2019-07-17 19:55:58 +03:00
for ( i = dir_hnd - > name_cache_size - 1 ;
i > dir_hnd - > name_cache_index ; i - - ) {
struct name_cache_entry * e = & dir_hnd - > name_cache [ i ] ;
2021-10-16 02:52:10 +03:00
if ( e - > name & & ( dir_hnd - > case_sensitive ? ( strcmp ( e - > name , name ) = = 0 ) : strequal ( e - > name , name ) ) ) {
2007-08-24 01:53:00 +04:00
* poffset = e - > offset ;
2019-07-17 19:55:58 +03:00
SeekDir ( dir_hnd , e - > offset ) ;
2007-08-24 01:53:00 +04:00
return True ;
}
2005-01-29 00:01:58 +03:00
}
}
/* Not found in the name cache. Rewind directory and start from scratch. */
2019-07-17 19:55:58 +03:00
SMB_VFS_REWINDDIR ( conn , dir_hnd - > dir ) ;
dir_hnd - > file_number = 0 ;
2005-07-22 00:24:21 +04:00
* poffset = START_OF_DIRECTORY_OFFSET ;
2019-07-17 19:55:58 +03:00
while ( ( entry = ReadDirName ( dir_hnd , poffset , NULL , & talloced ) ) ) {
2021-10-16 02:52:10 +03:00
if ( dir_hnd - > case_sensitive ? ( strcmp ( entry , name ) = = 0 ) : strequal ( entry , name ) ) {
2009-11-16 11:49:23 +03:00
TALLOC_FREE ( talloced ) ;
2005-01-29 00:01:58 +03:00
return True ;
}
2009-11-16 11:49:23 +03:00
TALLOC_FREE ( talloced ) ;
2005-01-29 00:01:58 +03:00
}
return False ;
1996-05-04 11:50:46 +04:00
}
2007-02-09 05:03:39 +03:00
2014-09-25 03:30:33 +04:00
struct files_below_forall_state {
char * dirpath ;
2020-12-01 15:27:11 +03:00
ssize_t dirpath_len ;
2014-09-25 03:30:33 +04:00
int ( * fn ) ( struct file_id fid , const struct share_mode_data * data ,
void * private_data ) ;
void * private_data ;
} ;
static int files_below_forall_fn ( struct file_id fid ,
const struct share_mode_data * data ,
void * private_data )
{
struct files_below_forall_state * state = private_data ;
char tmpbuf [ PATH_MAX ] ;
char * fullpath , * to_free ;
2020-12-01 15:27:11 +03:00
ssize_t len ;
2014-09-25 03:30:33 +04:00
len = full_path_tos ( data - > servicepath , data - > base_name ,
tmpbuf , sizeof ( tmpbuf ) ,
& fullpath , & to_free ) ;
if ( len = = - 1 ) {
return 0 ;
}
if ( state - > dirpath_len > = len ) {
/*
* Filter files above dirpath
*/
2018-03-06 12:35:32 +03:00
goto out ;
2014-09-25 03:30:33 +04:00
}
if ( fullpath [ state - > dirpath_len ] ! = ' / ' ) {
/*
* Filter file that don ' t have a path separator at the end of
* dirpath ' s length
*/
2018-03-06 12:35:32 +03:00
goto out ;
2014-09-25 03:30:33 +04:00
}
2015-11-24 01:00:56 +03:00
if ( memcmp ( state - > dirpath , fullpath , state - > dirpath_len ) ! = 0 ) {
2014-09-25 03:30:33 +04:00
/*
* Not a parent
*/
2018-03-06 12:35:32 +03:00
goto out ;
2014-09-25 03:30:33 +04:00
}
2018-03-06 12:35:32 +03:00
TALLOC_FREE ( to_free ) ;
2015-11-24 01:00:56 +03:00
return state - > fn ( fid , data , state - > private_data ) ;
2018-03-06 12:35:32 +03:00
out :
TALLOC_FREE ( to_free ) ;
return 0 ;
2014-09-25 03:30:33 +04:00
}
static int files_below_forall ( connection_struct * conn ,
const struct smb_filename * dir_name ,
int ( * fn ) ( struct file_id fid ,
const struct share_mode_data * data ,
void * private_data ) ,
void * private_data )
{
2015-11-24 01:00:56 +03:00
struct files_below_forall_state state = {
. fn = fn ,
. private_data = private_data ,
} ;
2014-09-25 03:30:33 +04:00
int ret ;
char tmpbuf [ PATH_MAX ] ;
char * to_free ;
state . dirpath_len = full_path_tos ( conn - > connectpath ,
dir_name - > base_name ,
tmpbuf , sizeof ( tmpbuf ) ,
& state . dirpath , & to_free ) ;
if ( state . dirpath_len = = - 1 ) {
return - 1 ;
}
ret = share_mode_forall ( files_below_forall_fn , & state ) ;
TALLOC_FREE ( to_free ) ;
return ret ;
}
struct have_file_open_below_state {
bool found_one ;
} ;
static int have_file_open_below_fn ( struct file_id fid ,
const struct share_mode_data * data ,
void * private_data )
{
struct have_file_open_below_state * state = private_data ;
state - > found_one = true ;
return 1 ;
}
2015-11-24 19:43:14 +03:00
bool have_file_open_below ( connection_struct * conn ,
2014-09-25 03:30:33 +04:00
const struct smb_filename * name )
{
2015-11-24 01:00:56 +03:00
struct have_file_open_below_state state = {
. found_one = false ,
} ;
2014-09-25 03:30:33 +04:00
int ret ;
if ( ! VALID_STAT ( name - > st ) ) {
return false ;
}
if ( ! S_ISDIR ( name - > st . st_ex_mode ) ) {
return false ;
}
ret = files_below_forall ( conn , name , have_file_open_below_fn , & state ) ;
if ( ret = = - 1 ) {
return false ;
}
return state . found_one ;
}
2007-02-09 05:03:39 +03:00
/*****************************************************************
Is this directory empty ?
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
2012-11-15 02:40:51 +04:00
NTSTATUS can_delete_directory_fsp ( files_struct * fsp )
2007-02-09 05:03:39 +03:00
{
NTSTATUS status = NT_STATUS_OK ;
long dirpos = 0 ;
2009-11-16 11:49:23 +03:00
const char * dname = NULL ;
char * talloced = NULL ;
2012-11-15 02:40:51 +04:00
struct connection_struct * conn = fsp - > conn ;
2022-02-21 19:19:49 +03:00
struct smb_Dir * dir_hnd = NULL ;
2007-02-09 05:03:39 +03:00
2022-03-01 01:34:48 +03:00
status = OpenDir (
2022-02-21 19:19:49 +03:00
talloc_tos ( ) , conn , fsp - > fsp_name , NULL , 0 , & dir_hnd ) ;
if ( ! NT_STATUS_IS_OK ( status ) ) {
return status ;
2007-02-09 05:03:39 +03:00
}
2022-09-06 10:29:18 +03:00
while ( ( dname = ReadDirName ( dir_hnd , & dirpos , NULL , & talloced ) ) ) {
2021-06-04 23:21:29 +03:00
struct smb_filename * smb_dname_full = NULL ;
struct smb_filename * direntry_fname = NULL ;
char * fullname = NULL ;
int ret ;
2020-10-28 17:40:39 +03:00
if ( ISDOT ( dname ) | | ( ISDOTDOT ( dname ) ) ) {
TALLOC_FREE ( talloced ) ;
continue ;
2007-02-09 05:03:39 +03:00
}
2021-06-04 22:47:11 +03:00
if ( IS_VETO_PATH ( conn , dname ) ) {
TALLOC_FREE ( talloced ) ;
continue ;
}
2021-06-04 23:21:29 +03:00
fullname = talloc_asprintf ( talloc_tos ( ) ,
" %s/%s " ,
fsp - > fsp_name - > base_name ,
dname ) ;
if ( fullname = = NULL ) {
status = NT_STATUS_NO_MEMORY ;
break ;
}
smb_dname_full = synthetic_smb_fname ( talloc_tos ( ) ,
fullname ,
NULL ,
NULL ,
fsp - > fsp_name - > twrp ,
fsp - > fsp_name - > flags ) ;
if ( smb_dname_full = = NULL ) {
TALLOC_FREE ( talloced ) ;
TALLOC_FREE ( fullname ) ;
status = NT_STATUS_NO_MEMORY ;
break ;
}
ret = SMB_VFS_LSTAT ( conn , smb_dname_full ) ;
if ( ret ! = 0 ) {
status = map_nt_error_from_unix ( errno ) ;
TALLOC_FREE ( talloced ) ;
TALLOC_FREE ( fullname ) ;
TALLOC_FREE ( smb_dname_full ) ;
break ;
}
if ( S_ISLNK ( smb_dname_full - > st . st_ex_mode ) ) {
2021-10-25 22:36:57 +03:00
/* Could it be an msdfs link ? */
if ( lp_host_msdfs ( ) & &
lp_msdfs_root ( SNUM ( conn ) ) ) {
struct smb_filename * smb_dname ;
smb_dname = synthetic_smb_fname ( talloc_tos ( ) ,
dname ,
NULL ,
& smb_dname_full - > st ,
fsp - > fsp_name - > twrp ,
fsp - > fsp_name - > flags ) ;
if ( smb_dname = = NULL ) {
TALLOC_FREE ( talloced ) ;
TALLOC_FREE ( fullname ) ;
TALLOC_FREE ( smb_dname_full ) ;
status = NT_STATUS_NO_MEMORY ;
break ;
}
if ( is_msdfs_link ( fsp , smb_dname ) ) {
TALLOC_FREE ( talloced ) ;
TALLOC_FREE ( fullname ) ;
TALLOC_FREE ( smb_dname_full ) ;
TALLOC_FREE ( smb_dname ) ;
DBG_DEBUG ( " got msdfs link name %s "
" - can't delete directory %s \n " ,
dname ,
fsp_str_dbg ( fsp ) ) ;
status = NT_STATUS_DIRECTORY_NOT_EMPTY ;
break ;
}
TALLOC_FREE ( smb_dname ) ;
}
/* Not a DFS link - could it be a dangling symlink ? */
ret = SMB_VFS_STAT ( conn , smb_dname_full ) ;
if ( ret = = - 1 & & ( errno = = ENOENT | | errno = = ELOOP ) ) {
/*
* Dangling symlink .
* Allow if " delete veto files = yes "
*/
if ( lp_delete_veto_files ( SNUM ( conn ) ) ) {
TALLOC_FREE ( talloced ) ;
TALLOC_FREE ( fullname ) ;
TALLOC_FREE ( smb_dname_full ) ;
continue ;
}
}
DBG_DEBUG ( " got symlink name %s - "
" can't delete directory %s \n " ,
dname ,
fsp_str_dbg ( fsp ) ) ;
2021-06-04 23:21:29 +03:00
TALLOC_FREE ( talloced ) ;
TALLOC_FREE ( fullname ) ;
TALLOC_FREE ( smb_dname_full ) ;
status = NT_STATUS_DIRECTORY_NOT_EMPTY ;
break ;
}
/* Not a symlink, get a pathref. */
status = synthetic_pathref ( talloc_tos ( ) ,
fsp ,
dname ,
NULL ,
& smb_dname_full - > st ,
fsp - > fsp_name - > twrp ,
fsp - > fsp_name - > flags ,
& direntry_fname ) ;
if ( ! NT_STATUS_IS_OK ( status ) ) {
status = map_nt_error_from_unix ( errno ) ;
2009-11-16 11:49:23 +03:00
TALLOC_FREE ( talloced ) ;
2021-06-04 23:21:29 +03:00
TALLOC_FREE ( fullname ) ;
TALLOC_FREE ( smb_dname_full ) ;
break ;
}
2021-06-04 23:32:40 +03:00
if ( ! is_visible_fsp ( direntry_fname - > fsp ) ) {
2022-03-21 23:50:56 +03:00
/*
* Hidden file .
* Allow if " delete veto files = yes "
*/
if ( lp_delete_veto_files ( SNUM ( conn ) ) ) {
TALLOC_FREE ( talloced ) ;
TALLOC_FREE ( fullname ) ;
TALLOC_FREE ( smb_dname_full ) ;
TALLOC_FREE ( direntry_fname ) ;
continue ;
}
2007-02-09 05:03:39 +03:00
}
2021-06-04 23:21:29 +03:00
TALLOC_FREE ( talloced ) ;
TALLOC_FREE ( fullname ) ;
TALLOC_FREE ( smb_dname_full ) ;
TALLOC_FREE ( direntry_fname ) ;
DBG_DEBUG ( " got name %s - can't delete \n " , dname ) ;
2007-02-09 05:03:39 +03:00
status = NT_STATUS_DIRECTORY_NOT_EMPTY ;
break ;
}
2009-11-16 11:49:23 +03:00
TALLOC_FREE ( talloced ) ;
2008-01-12 19:08:04 +03:00
TALLOC_FREE ( dir_hnd ) ;
2007-02-09 05:03:39 +03:00
2014-09-25 03:30:33 +04:00
if ( ! NT_STATUS_IS_OK ( status ) ) {
return status ;
}
2016-01-16 03:22:26 +03:00
if ( ! ( fsp - > posix_flags & FSP_POSIX_FLAGS_RENAME ) & &
2014-09-25 03:30:33 +04:00
lp_strict_rename ( SNUM ( conn ) ) & &
have_file_open_below ( fsp - > conn , fsp - > fsp_name ) )
{
return NT_STATUS_ACCESS_DENIED ;
}
return NT_STATUS_OK ;
2007-02-09 05:03:39 +03:00
}