smbd: Fix CID 1343333 Uninitialized variables
[samba.git] / source3 / smbd / smb2_query_directory.c
1 /*
2    Unix SMB/CIFS implementation.
3    Core SMB2 server
4
5    Copyright (C) Stefan Metzmacher 2009
6
7    This program is free software; you can redistribute it and/or modify
8    it under the terms of the GNU General Public License as published by
9    the Free Software Foundation; either version 3 of the License, or
10    (at your option) any later version.
11
12    This program is distributed in the hope that it will be useful,
13    but WITHOUT ANY WARRANTY; without even the implied warranty of
14    MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
15    GNU General Public License for more details.
16
17    You should have received a copy of the GNU General Public License
18    along with this program.  If not, see <http://www.gnu.org/licenses/>.
19 */
20
21 #include "includes.h"
22 #include "smbd/smbd.h"
23 #include "smbd/globals.h"
24 #include "../libcli/smb/smb_common.h"
25 #include "trans2.h"
26 #include "../lib/util/tevent_ntstatus.h"
27
28 static struct tevent_req *smbd_smb2_query_directory_send(TALLOC_CTX *mem_ctx,
29                                               struct tevent_context *ev,
30                                               struct smbd_smb2_request *smb2req,
31                                               struct files_struct *in_fsp,
32                                               uint8_t in_file_info_class,
33                                               uint8_t in_flags,
34                                               uint32_t in_file_index,
35                                               uint32_t in_output_buffer_length,
36                                               const char *in_file_name);
37 static NTSTATUS smbd_smb2_query_directory_recv(struct tevent_req *req,
38                                     TALLOC_CTX *mem_ctx,
39                                     DATA_BLOB *out_output_buffer);
40
41 static void smbd_smb2_request_find_done(struct tevent_req *subreq);
42 NTSTATUS smbd_smb2_request_process_query_directory(struct smbd_smb2_request *req)
43 {
44         NTSTATUS status;
45         const uint8_t *inbody;
46         uint8_t in_file_info_class;
47         uint8_t in_flags;
48         uint32_t in_file_index;
49         uint64_t in_file_id_persistent;
50         uint64_t in_file_id_volatile;
51         struct files_struct *in_fsp;
52         uint16_t in_file_name_offset;
53         uint16_t in_file_name_length;
54         DATA_BLOB in_file_name_buffer;
55         char *in_file_name_string;
56         size_t in_file_name_string_size;
57         uint32_t in_output_buffer_length;
58         struct tevent_req *subreq;
59         bool ok;
60
61         status = smbd_smb2_request_verify_sizes(req, 0x21);
62         if (!NT_STATUS_IS_OK(status)) {
63                 return smbd_smb2_request_error(req, status);
64         }
65         inbody = SMBD_SMB2_IN_BODY_PTR(req);
66
67         in_file_info_class              = CVAL(inbody, 0x02);
68         in_flags                        = CVAL(inbody, 0x03);
69         in_file_index                   = IVAL(inbody, 0x04);
70         in_file_id_persistent           = BVAL(inbody, 0x08);
71         in_file_id_volatile             = BVAL(inbody, 0x10);
72         in_file_name_offset             = SVAL(inbody, 0x18);
73         in_file_name_length             = SVAL(inbody, 0x1A);
74         in_output_buffer_length         = IVAL(inbody, 0x1C);
75
76         if (in_file_name_offset == 0 && in_file_name_length == 0) {
77                 /* This is ok */
78         } else if (in_file_name_offset !=
79                    (SMB2_HDR_BODY + SMBD_SMB2_IN_BODY_LEN(req))) {
80                 return smbd_smb2_request_error(req, NT_STATUS_INVALID_PARAMETER);
81         }
82
83         if (in_file_name_length > SMBD_SMB2_IN_DYN_LEN(req)) {
84                 return smbd_smb2_request_error(req, NT_STATUS_INVALID_PARAMETER);
85         }
86
87         /* The output header is 8 bytes. */
88         if (in_output_buffer_length <= 8) {
89                 return smbd_smb2_request_error(req, NT_STATUS_INVALID_PARAMETER);
90         }
91
92         DEBUG(10,("smbd_smb2_request_find_done: in_output_buffer_length = %u\n",
93                 (unsigned int)in_output_buffer_length ));
94
95         /* Take into account the output header. */
96         in_output_buffer_length -= 8;
97
98         in_file_name_buffer.data = SMBD_SMB2_IN_DYN_PTR(req);
99         in_file_name_buffer.length = in_file_name_length;
100
101         ok = convert_string_talloc(req, CH_UTF16, CH_UNIX,
102                                    in_file_name_buffer.data,
103                                    in_file_name_buffer.length,
104                                    &in_file_name_string,
105                                    &in_file_name_string_size);
106         if (!ok) {
107                 return smbd_smb2_request_error(req, NT_STATUS_ILLEGAL_CHARACTER);
108         }
109
110         if (in_file_name_buffer.length == 0) {
111                 in_file_name_string_size = 0;
112         }
113
114         if (strlen(in_file_name_string) != in_file_name_string_size) {
115                 return smbd_smb2_request_error(req, NT_STATUS_OBJECT_NAME_INVALID);
116         }
117
118         in_fsp = file_fsp_smb2(req, in_file_id_persistent, in_file_id_volatile);
119         if (in_fsp == NULL) {
120                 return smbd_smb2_request_error(req, NT_STATUS_FILE_CLOSED);
121         }
122
123         subreq = smbd_smb2_query_directory_send(req, req->sconn->ev_ctx,
124                                      req, in_fsp,
125                                      in_file_info_class,
126                                      in_flags,
127                                      in_file_index,
128                                      in_output_buffer_length,
129                                      in_file_name_string);
130         if (subreq == NULL) {
131                 return smbd_smb2_request_error(req, NT_STATUS_NO_MEMORY);
132         }
133         tevent_req_set_callback(subreq, smbd_smb2_request_find_done, req);
134
135         return smbd_smb2_request_pending_queue(req, subreq, 500);
136 }
137
138 static void smbd_smb2_request_find_done(struct tevent_req *subreq)
139 {
140         struct smbd_smb2_request *req = tevent_req_callback_data(subreq,
141                                         struct smbd_smb2_request);
142         DATA_BLOB outbody;
143         DATA_BLOB outdyn;
144         uint16_t out_output_buffer_offset;
145         DATA_BLOB out_output_buffer = data_blob_null;
146         NTSTATUS status;
147         NTSTATUS error; /* transport error */
148
149         status = smbd_smb2_query_directory_recv(subreq,
150                                      req,
151                                      &out_output_buffer);
152         TALLOC_FREE(subreq);
153         if (!NT_STATUS_IS_OK(status)) {
154                 error = smbd_smb2_request_error(req, status);
155                 if (!NT_STATUS_IS_OK(error)) {
156                         smbd_server_connection_terminate(req->xconn,
157                                                          nt_errstr(error));
158                         return;
159                 }
160                 return;
161         }
162
163         out_output_buffer_offset = SMB2_HDR_BODY + 0x08;
164
165         outbody = smbd_smb2_generate_outbody(req, 0x08);
166         if (outbody.data == NULL) {
167                 error = smbd_smb2_request_error(req, NT_STATUS_NO_MEMORY);
168                 if (!NT_STATUS_IS_OK(error)) {
169                         smbd_server_connection_terminate(req->xconn,
170                                                          nt_errstr(error));
171                         return;
172                 }
173                 return;
174         }
175
176         SSVAL(outbody.data, 0x00, 0x08 + 1);    /* struct size */
177         SSVAL(outbody.data, 0x02,
178               out_output_buffer_offset);        /* output buffer offset */
179         SIVAL(outbody.data, 0x04,
180               out_output_buffer.length);        /* output buffer length */
181
182         DEBUG(10,("smbd_smb2_request_find_done: out_output_buffer.length = %u\n",
183                 (unsigned int)out_output_buffer.length ));
184
185         outdyn = out_output_buffer;
186
187         error = smbd_smb2_request_done(req, outbody, &outdyn);
188         if (!NT_STATUS_IS_OK(error)) {
189                 smbd_server_connection_terminate(req->xconn,
190                                                  nt_errstr(error));
191                 return;
192         }
193 }
194
195 struct smbd_smb2_query_directory_state {
196         struct smbd_smb2_request *smb2req;
197         DATA_BLOB out_output_buffer;
198 };
199
200 static struct tevent_req *smbd_smb2_query_directory_send(TALLOC_CTX *mem_ctx,
201                                               struct tevent_context *ev,
202                                               struct smbd_smb2_request *smb2req,
203                                               struct files_struct *fsp,
204                                               uint8_t in_file_info_class,
205                                               uint8_t in_flags,
206                                               uint32_t in_file_index,
207                                               uint32_t in_output_buffer_length,
208                                               const char *in_file_name)
209 {
210         struct smbXsrv_connection *xconn = smb2req->xconn;
211         struct tevent_req *req;
212         struct smbd_smb2_query_directory_state *state;
213         struct smb_request *smbreq;
214         connection_struct *conn = smb2req->tcon->compat;
215         NTSTATUS status;
216         NTSTATUS empty_status;
217         uint32_t info_level;
218         uint32_t max_count;
219         char *pdata;
220         char *base_data;
221         char *end_data;
222         int last_entry_off = 0;
223         int off = 0;
224         uint32_t num = 0;
225         uint32_t dirtype = FILE_ATTRIBUTE_HIDDEN | FILE_ATTRIBUTE_SYSTEM | FILE_ATTRIBUTE_DIRECTORY;
226         bool dont_descend = false;
227         bool ask_sharemode = true;
228         bool wcard_has_wild = false;
229         struct tm tm;
230         char *p;
231
232         req = tevent_req_create(mem_ctx, &state,
233                                 struct smbd_smb2_query_directory_state);
234         if (req == NULL) {
235                 return NULL;
236         }
237         state->smb2req = smb2req;
238         state->out_output_buffer = data_blob_null;
239
240         DEBUG(10,("smbd_smb2_query_directory_send: %s - %s\n",
241                   fsp_str_dbg(fsp), fsp_fnum_dbg(fsp)));
242
243         smbreq = smbd_smb2_fake_smb_request(smb2req);
244         if (tevent_req_nomem(smbreq, req)) {
245                 return tevent_req_post(req, ev);
246         }
247
248         if (!fsp->is_directory) {
249                 tevent_req_nterror(req, NT_STATUS_NOT_SUPPORTED);
250                 return tevent_req_post(req, ev);
251         }
252
253         if (strcmp(in_file_name, "") == 0) {
254                 tevent_req_nterror(req, NT_STATUS_OBJECT_NAME_INVALID);
255                 return tevent_req_post(req, ev);
256         }
257         if (strchr_m(in_file_name, '\\') != NULL) {
258                 tevent_req_nterror(req, NT_STATUS_OBJECT_NAME_INVALID);
259                 return tevent_req_post(req, ev);
260         }
261         if (strchr_m(in_file_name, '/') != NULL) {
262                 tevent_req_nterror(req, NT_STATUS_OBJECT_NAME_INVALID);
263                 return tevent_req_post(req, ev);
264         }
265
266         p = strptime(in_file_name, GMT_FORMAT, &tm);
267         if ((p != NULL) && (*p =='\0')) {
268                 /*
269                  * Bogus find that asks for a shadow copy timestamp as a
270                  * directory. The correct response is that it does not exist as
271                  * a directory.
272                  */
273                 tevent_req_nterror(req, NT_STATUS_NO_SUCH_FILE);
274                 return tevent_req_post(req, ev);
275         }
276
277         if (in_output_buffer_length > xconn->smb2.server.max_trans) {
278                 DEBUG(2,("smbd_smb2_query_directory_send: "
279                          "client ignored max trans:%s: 0x%08X: 0x%08X\n",
280                          __location__, in_output_buffer_length,
281                          xconn->smb2.server.max_trans));
282                 tevent_req_nterror(req, NT_STATUS_INVALID_PARAMETER);
283                 return tevent_req_post(req, ev);
284         }
285
286         status = smbd_smb2_request_verify_creditcharge(smb2req,
287                                         in_output_buffer_length);
288
289         if (!NT_STATUS_IS_OK(status)) {
290                 tevent_req_nterror(req, NT_STATUS_INVALID_PARAMETER);
291                 return tevent_req_post(req, ev);
292         }
293
294         switch (in_file_info_class) {
295         case SMB2_FIND_DIRECTORY_INFO:
296                 info_level = SMB_FIND_FILE_DIRECTORY_INFO;
297                 break;
298
299         case SMB2_FIND_FULL_DIRECTORY_INFO:
300                 info_level = SMB_FIND_FILE_FULL_DIRECTORY_INFO;
301                 break;
302
303         case SMB2_FIND_BOTH_DIRECTORY_INFO:
304                 info_level = SMB_FIND_FILE_BOTH_DIRECTORY_INFO;
305                 break;
306
307         case SMB2_FIND_NAME_INFO:
308                 info_level = SMB_FIND_FILE_NAMES_INFO;
309                 break;
310
311         case SMB2_FIND_ID_BOTH_DIRECTORY_INFO:
312                 info_level = SMB_FIND_ID_BOTH_DIRECTORY_INFO;
313                 break;
314
315         case SMB2_FIND_ID_FULL_DIRECTORY_INFO:
316                 info_level = SMB_FIND_ID_FULL_DIRECTORY_INFO;
317                 break;
318
319         default:
320                 tevent_req_nterror(req, NT_STATUS_INVALID_INFO_CLASS);
321                 return tevent_req_post(req, ev);
322         }
323
324         if (in_flags & SMB2_CONTINUE_FLAG_REOPEN) {
325                 dptr_CloseDir(fsp);
326         }
327
328         if (!lp_posix_pathnames()) {
329                 wcard_has_wild = ms_has_wild(in_file_name);
330         }
331
332         /* Ensure we've canonicalized any search path if not a wildcard. */
333         if (!wcard_has_wild) {
334                 struct smb_filename *smb_fname = NULL;
335                 const char *fullpath;
336                 char tmpbuf[PATH_MAX];
337                 char *to_free = NULL;
338
339                 if (ISDOT(fsp->fsp_name->base_name)) {
340                         fullpath = in_file_name;
341                 } else {
342                         size_t len;
343                         char *tmp;
344
345                         len = full_path_tos(
346                                 fsp->fsp_name->base_name, in_file_name,
347                                 tmpbuf, sizeof(tmpbuf), &tmp, &to_free);
348                         if (len == -1) {
349                                 tevent_req_oom(req);
350                                 return tevent_req_post(req, ev);
351                         }
352                         fullpath = tmp;
353                 }
354                 status = filename_convert(state,
355                                 conn,
356                                 false, /* Not a DFS path. */
357                                 fullpath,
358                                 UCF_SAVE_LCOMP | UCF_ALWAYS_ALLOW_WCARD_LCOMP,
359                                 &wcard_has_wild,
360                                 &smb_fname);
361
362                 TALLOC_FREE(to_free);
363
364                 if (tevent_req_nterror(req, status)) {
365                         return tevent_req_post(req, ev);
366                 }
367
368                 in_file_name = smb_fname->original_lcomp;
369         }
370
371         if (fsp->dptr == NULL) {
372                 status = dptr_create(conn,
373                                      NULL, /* req */
374                                      fsp,
375                                      fsp->fsp_name->base_name,
376                                      false, /* old_handle */
377                                      false, /* expect_close */
378                                      0, /* spid */
379                                      in_file_name, /* wcard */
380                                      wcard_has_wild,
381                                      dirtype,
382                                      &fsp->dptr);
383                 if (!NT_STATUS_IS_OK(status)) {
384                         tevent_req_nterror(req, status);
385                         return tevent_req_post(req, ev);
386                 }
387
388                 empty_status = NT_STATUS_NO_SUCH_FILE;
389         } else {
390                 empty_status = STATUS_NO_MORE_FILES;
391         }
392
393         if (in_flags & SMB2_CONTINUE_FLAG_RESTART) {
394                 dptr_SeekDir(fsp->dptr, 0);
395         }
396
397         if (in_flags & SMB2_CONTINUE_FLAG_SINGLE) {
398                 max_count = 1;
399         } else {
400                 max_count = UINT16_MAX;
401         }
402
403 #define DIR_ENTRY_SAFETY_MARGIN 4096
404
405         state->out_output_buffer = data_blob_talloc(state, NULL,
406                         in_output_buffer_length + DIR_ENTRY_SAFETY_MARGIN);
407         if (tevent_req_nomem(state->out_output_buffer.data, req)) {
408                 return tevent_req_post(req, ev);
409         }
410
411         state->out_output_buffer.length = 0;
412         pdata = (char *)state->out_output_buffer.data;
413         base_data = pdata;
414         /*
415          * end_data must include the safety margin as it's what is
416          * used to determine if pushed strings have been truncated.
417          */
418         end_data = pdata + in_output_buffer_length + DIR_ENTRY_SAFETY_MARGIN - 1;
419         last_entry_off = 0;
420         off = 0;
421         num = 0;
422
423         DEBUG(8,("smbd_smb2_query_directory_send: dirpath=<%s> dontdescend=<%s>, "
424                 "in_output_buffer_length = %u\n",
425                 fsp->fsp_name->base_name, lp_dont_descend(talloc_tos(), SNUM(conn)),
426                 (unsigned int)in_output_buffer_length ));
427         if (in_list(fsp->fsp_name->base_name,lp_dont_descend(talloc_tos(), SNUM(conn)),
428                         conn->case_sensitive)) {
429                 dont_descend = true;
430         }
431
432         ask_sharemode = lp_parm_bool(SNUM(conn),
433                                      "smbd", "search ask sharemode",
434                                      true);
435
436         while (true) {
437                 bool got_exact_match = false;
438                 int space_remaining = in_output_buffer_length - off;
439
440                 SMB_ASSERT(space_remaining >= 0);
441
442                 status = smbd_dirptr_lanman2_entry(state,
443                                                conn,
444                                                fsp->dptr,
445                                                smbreq->flags2,
446                                                in_file_name,
447                                                dirtype,
448                                                info_level,
449                                                false, /* requires_resume_key */
450                                                dont_descend,
451                                                ask_sharemode,
452                                                8, /* align to 8 bytes */
453                                                false, /* no padding */
454                                                &pdata,
455                                                base_data,
456                                                end_data,
457                                                space_remaining,
458                                                &got_exact_match,
459                                                &last_entry_off,
460                                                NULL);
461
462                 off = (int)PTR_DIFF(pdata, base_data);
463
464                 if (!NT_STATUS_IS_OK(status)) {
465                         if (NT_STATUS_EQUAL(status, NT_STATUS_ILLEGAL_CHARACTER)) {
466                                 /*
467                                  * Bad character conversion on name. Ignore this
468                                  * entry.
469                                  */
470                                 continue;
471                         } else if (num > 0) {
472                                 SIVAL(state->out_output_buffer.data, last_entry_off, 0);
473                                 tevent_req_done(req);
474                                 return tevent_req_post(req, ev);
475                         } else if (NT_STATUS_EQUAL(status, STATUS_MORE_ENTRIES)) {
476                                 tevent_req_nterror(req, NT_STATUS_INFO_LENGTH_MISMATCH);
477                                 return tevent_req_post(req, ev);
478                         } else {
479                                 tevent_req_nterror(req, empty_status);
480                                 return tevent_req_post(req, ev);
481                         }
482                 }
483
484                 num++;
485                 state->out_output_buffer.length = off;
486
487                 if (num < max_count) {
488                         continue;
489                 }
490
491                 SIVAL(state->out_output_buffer.data, last_entry_off, 0);
492                 tevent_req_done(req);
493                 return tevent_req_post(req, ev);
494         }
495
496         tevent_req_nterror(req, NT_STATUS_INTERNAL_ERROR);
497         return tevent_req_post(req, ev);
498 }
499
500 static NTSTATUS smbd_smb2_query_directory_recv(struct tevent_req *req,
501                                     TALLOC_CTX *mem_ctx,
502                                     DATA_BLOB *out_output_buffer)
503 {
504         NTSTATUS status;
505         struct smbd_smb2_query_directory_state *state = tevent_req_data(req,
506                                              struct smbd_smb2_query_directory_state);
507
508         if (tevent_req_is_nterror(req, &status)) {
509                 tevent_req_received(req);
510                 return status;
511         }
512
513         *out_output_buffer = state->out_output_buffer;
514         talloc_steal(mem_ctx, out_output_buffer->data);
515
516         tevent_req_received(req);
517         return NT_STATUS_OK;
518 }