1 /*
2  * CDDL HEADER START
3  *
4  * The contents of this file are subject to the terms of the
5  * Common Development and Distribution License (the "License").
6  * You may not use this file except in compliance with the License.
7  *
8  * You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE
9  * or http://www.opensolaris.org/os/licensing.
10  * See the License for the specific language governing permissions
11  * and limitations under the License.
12  *
13  * When distributing Covered Code, include this CDDL HEADER in each
14  * file and include the License file at usr/src/OPENSOLARIS.LICENSE.
15  * If applicable, add the following below this CDDL HEADER, with the
16  * fields enclosed by brackets "[]" replaced with your own identifying
17  * information: Portions Copyright [yyyy] [name of copyright owner]
18  *
19  * CDDL HEADER END
20  */
21 /*
22  * Copyright (c) 2007, 2010, Oracle and/or its affiliates. All rights reserved.
23  * Copyright 2013 Nexenta Systems, Inc.  All rights reserved.
24  */
25 
26 /*
27  * General Structures Layout
28  * -------------------------
29  *
30  * This is a simplified diagram showing the relationship between most of the
31  * main structures.
32  *
33  * +-------------------+
34  * |     SMB_INFO      |
35  * +-------------------+
36  *          |
37  *          |
38  *          v
39  * +-------------------+       +-------------------+      +-------------------+
40  * |     SESSION       |<----->|     SESSION       |......|      SESSION      |
41  * +-------------------+       +-------------------+      +-------------------+
42  *          |
43  *          |
44  *          v
45  * +-------------------+       +-------------------+      +-------------------+
46  * |       USER        |<----->|       USER        |......|       USER        |
47  * +-------------------+       +-------------------+      +-------------------+
48  *          |
49  *          |
50  *          v
51  * +-------------------+       +-------------------+      +-------------------+
52  * |       TREE        |<----->|       TREE        |......|       TREE        |
53  * +-------------------+       +-------------------+      +-------------------+
54  *      |         |
55  *      |         |
56  *      |         v
57  *      |     +-------+       +-------+      +-------+
58  *      |     | OFILE |<----->| OFILE |......| OFILE |
59  *      |     +-------+       +-------+      +-------+
60  *      |
61  *      |
62  *      v
63  *  +-------+       +------+      +------+
64  *  | ODIR  |<----->| ODIR |......| ODIR |
65  *  +-------+       +------+      +------+
66  *
67  *
68  * Ofile State Machine
69  * ------------------
70  *
71  *    +-------------------------+	 T0
72  *    |  SMB_OFILE_STATE_OPEN   |<----------- Creation/Allocation
73  *    +-------------------------+
74  *		    |
75  *		    | T1
76  *		    |
77  *		    v
78  *    +-------------------------+
79  *    | SMB_OFILE_STATE_CLOSING |
80  *    +-------------------------+
81  *		    |
82  *		    | T2
83  *		    |
84  *		    v
85  *    +-------------------------+    T3
86  *    | SMB_OFILE_STATE_CLOSED  |----------> Deletion/Free
87  *    +-------------------------+
88  *
89  * SMB_OFILE_STATE_OPEN
90  *
91  *    While in this state:
92  *      - The ofile is queued in the list of ofiles of its tree.
93  *      - References will be given out if the ofile is looked up.
94  *
95  * SMB_OFILE_STATE_CLOSING
96  *
97  *    While in this state:
98  *      - The ofile is queued in the list of ofiles of its tree.
99  *      - References will not be given out if the ofile is looked up.
100  *      - The file is closed and the locks held are being released.
101  *      - The resources associated with the ofile remain.
102  *
103  * SMB_OFILE_STATE_CLOSED
104  *
105  *    While in this state:
106  *      - The ofile is queued in the list of ofiles of its tree.
107  *      - References will not be given out if the ofile is looked up.
108  *      - The resources associated with the ofile remain.
109  *
110  * Transition T0
111  *
112  *    This transition occurs in smb_ofile_open(). A new ofile is created and
113  *    added to the list of ofiles of a tree.
114  *
115  * Transition T1
116  *
117  *    This transition occurs in smb_ofile_close().
118  *
119  * Transition T2
120  *
121  *    This transition occurs in smb_ofile_release(). The resources associated
122  *    with the ofile are freed as well as the ofile structure. For the
123  *    transition to occur, the ofile must be in the SMB_OFILE_STATE_CLOSED
124  *    state and the reference count be zero.
125  *
126  * Comments
127  * --------
128  *
129  *    The state machine of the ofile structures is controlled by 3 elements:
130  *      - The list of ofiles of the tree it belongs to.
131  *      - The mutex embedded in the structure itself.
132  *      - The reference count.
133  *
134  *    There's a mutex embedded in the ofile structure used to protect its fields
135  *    and there's a lock embedded in the list of ofiles of a tree. To
136  *    increment or to decrement the reference count the mutex must be entered.
137  *    To insert the ofile into the list of ofiles of the tree and to remove
138  *    the ofile from it, the lock must be entered in RW_WRITER mode.
139  *
140  *    Rules of access to a ofile structure:
141  *
142  *    1) In order to avoid deadlocks, when both (mutex and lock of the ofile
143  *       list) have to be entered, the lock must be entered first.
144  *
145  *    2) All actions applied to an ofile require a reference count.
146  *
147  *    3) There are 2 ways of getting a reference count. One is when the ofile
148  *       is opened. The other one when the ofile is looked up. This translates
149  *       into 2 functions: smb_ofile_open() and smb_ofile_lookup_by_fid().
150  *
151  *    It should be noted that the reference count of an ofile registers the
152  *    number of references to the ofile in other structures (such as an smb
153  *    request). The reference count is not incremented in these 2 instances:
154  *
155  *    1) The ofile is open. An ofile is anchored by his state. If there's
156  *       no activity involving an ofile currently open, the reference count
157  *       of that ofile is zero.
158  *
159  *    2) The ofile is queued in the list of ofiles of its tree. The fact of
160  *       being queued in that list is NOT registered by incrementing the
161  *       reference count.
162  */
163 #include <smbsrv/smb_kproto.h>
164 #include <smbsrv/smb_fsops.h>
165 
166 static boolean_t smb_ofile_is_open_locked(smb_ofile_t *);
167 static smb_ofile_t *smb_ofile_close_and_next(smb_ofile_t *);
168 static int smb_ofile_netinfo_encode(smb_ofile_t *, uint8_t *, size_t,
169     uint32_t *);
170 static int smb_ofile_netinfo_init(smb_ofile_t *, smb_netfileinfo_t *);
171 static void smb_ofile_netinfo_fini(smb_netfileinfo_t *);
172 
173 /*
174  * smb_ofile_open
175  */
176 smb_ofile_t *
177 smb_ofile_open(
178     smb_tree_t		*tree,
179     smb_node_t		*node,
180     uint16_t		pid,
181     struct open_param	*op,
182     uint16_t		ftype,
183     uint32_t		uniqid,
184     smb_error_t		*err)
185 {
186 	smb_ofile_t	*of;
187 	uint16_t	fid;
188 	smb_attr_t	attr;
189 	int		rc;
190 
191 	if (smb_idpool_alloc(&tree->t_fid_pool, &fid)) {
192 		err->status = NT_STATUS_TOO_MANY_OPENED_FILES;
193 		err->errcls = ERRDOS;
194 		err->errcode = ERROR_TOO_MANY_OPEN_FILES;
195 		return (NULL);
196 	}
197 
198 	of = kmem_cache_alloc(tree->t_server->si_cache_ofile, KM_SLEEP);
199 	bzero(of, sizeof (smb_ofile_t));
200 	of->f_magic = SMB_OFILE_MAGIC;
201 	of->f_refcnt = 1;
202 	of->f_fid = fid;
203 	of->f_uniqid = uniqid;
204 	of->f_opened_by_pid = pid;
205 	of->f_granted_access = op->desired_access;
206 	of->f_share_access = op->share_access;
207 	of->f_create_options = op->create_options;
208 	of->f_cr = (op->create_options & FILE_OPEN_FOR_BACKUP_INTENT) ?
209 	    smb_user_getprivcred(tree->t_user) : tree->t_user->u_cred;
210 	crhold(of->f_cr);
211 	of->f_ftype = ftype;
212 	of->f_server = tree->t_server;
213 	of->f_session = tree->t_user->u_session;
214 	of->f_user = tree->t_user;
215 	of->f_tree = tree;
216 	of->f_node = node;
217 
218 	mutex_init(&of->f_mutex, NULL, MUTEX_DEFAULT, NULL);
219 	of->f_state = SMB_OFILE_STATE_OPEN;
220 
221 	if (ftype == SMB_FTYPE_MESG_PIPE) {
222 		of->f_pipe = smb_opipe_alloc(tree->t_server);
223 		smb_server_inc_pipes(of->f_server);
224 	} else {
225 		ASSERT(ftype == SMB_FTYPE_DISK); /* Regular file, not a pipe */
226 		ASSERT(node);
227 
228 		if (of->f_granted_access == FILE_EXECUTE)
229 			of->f_flags |= SMB_OFLAGS_EXECONLY;
230 
231 		bzero(&attr, sizeof (smb_attr_t));
232 		attr.sa_mask = SMB_AT_UID | SMB_AT_DOSATTR;
233 		rc = smb_node_getattr(NULL, node, of->f_cr, NULL, &attr);
234 		if (rc != 0) {
235 			of->f_magic = 0;
236 			mutex_destroy(&of->f_mutex);
237 			crfree(of->f_cr);
238 			smb_idpool_free(&tree->t_fid_pool, of->f_fid);
239 			kmem_cache_free(tree->t_server->si_cache_ofile, of);
240 			err->status = NT_STATUS_INTERNAL_ERROR;
241 			err->errcls = ERRDOS;
242 			err->errcode = ERROR_INTERNAL_ERROR;
243 			return (NULL);
244 		}
245 		if (crgetuid(of->f_cr) == attr.sa_vattr.va_uid) {
246 			/*
247 			 * Add this bit for the file's owner even if it's not
248 			 * specified in the request (Windows behavior).
249 			 */
250 			of->f_granted_access |= FILE_READ_ATTRIBUTES;
251 		}
252 
253 		if (smb_node_is_file(node)) {
254 			of->f_mode =
255 			    smb_fsop_amask_to_omode(of->f_granted_access);
256 			if (smb_fsop_open(node, of->f_mode, of->f_cr) != 0) {
257 				of->f_magic = 0;
258 				mutex_destroy(&of->f_mutex);
259 				crfree(of->f_cr);
260 				smb_idpool_free(&tree->t_fid_pool, of->f_fid);
261 				kmem_cache_free(tree->t_server->si_cache_ofile,
262 				    of);
263 				err->status = NT_STATUS_ACCESS_DENIED;
264 				err->errcls = ERRDOS;
265 				err->errcode = ERROR_ACCESS_DENIED;
266 				return (NULL);
267 			}
268 		}
269 
270 		if (tree->t_flags & SMB_TREE_READONLY)
271 			of->f_flags |= SMB_OFLAGS_READONLY;
272 
273 		/*
274 		 * Note that if we created_readonly, that
275 		 * will _not_ yet show in attr.sa_dosattr
276 		 * so creating a readonly file gives the
277 		 * caller a writable handle as it should.
278 		 */
279 		if (attr.sa_dosattr & FILE_ATTRIBUTE_READONLY)
280 			of->f_flags |= SMB_OFLAGS_READONLY;
281 
282 		smb_node_inc_open_ofiles(node);
283 		smb_node_add_ofile(node, of);
284 		smb_node_ref(node);
285 		smb_server_inc_files(of->f_server);
286 	}
287 	smb_llist_enter(&tree->t_ofile_list, RW_WRITER);
288 	smb_llist_insert_tail(&tree->t_ofile_list, of);
289 	smb_llist_exit(&tree->t_ofile_list);
290 	atomic_inc_32(&tree->t_open_files);
291 	atomic_inc_32(&of->f_session->s_file_cnt);
292 	return (of);
293 }
294 
295 /*
296  * smb_ofile_close
297  */
298 void
299 smb_ofile_close(smb_ofile_t *of, int32_t mtime_sec)
300 {
301 	timestruc_t now;
302 	uint32_t flags = 0;
303 
304 	SMB_OFILE_VALID(of);
305 
306 	mutex_enter(&of->f_mutex);
307 	ASSERT(of->f_refcnt);
308 	switch (of->f_state) {
309 	case SMB_OFILE_STATE_OPEN: {
310 
311 		of->f_state = SMB_OFILE_STATE_CLOSING;
312 		mutex_exit(&of->f_mutex);
313 
314 		if (of->f_ftype == SMB_FTYPE_MESG_PIPE) {
315 			smb_opipe_close(of);
316 			smb_server_dec_pipes(of->f_server);
317 		} else {
318 			smb_attr_t *pa = &of->f_pending_attr;
319 
320 			/*
321 			 * In here we make changes to of->f_pending_attr
322 			 * while not holding of->f_mutex.  This is OK
323 			 * because we've changed f_state to CLOSING,
324 			 * so no more threads will take this path.
325 			 */
326 			if (mtime_sec != 0) {
327 				pa->sa_vattr.va_mtime.tv_sec = mtime_sec;
328 				pa->sa_mask |= SMB_AT_MTIME;
329 			}
330 
331 			/*
332 			 * If we have ever modified data via this handle
333 			 * (write or truncate) and if the mtime was not
334 			 * set via this handle, update the mtime again
335 			 * during the close.  Windows expects this.
336 			 * [ MS-FSA 2.1.5.4 "Update Timestamps" ]
337 			 */
338 			if (of->f_written &&
339 			    (pa->sa_mask & SMB_AT_MTIME) == 0) {
340 				pa->sa_mask |= SMB_AT_MTIME;
341 				gethrestime(&now);
342 				pa->sa_vattr.va_mtime = now;
343 			}
344 
345 			if (of->f_flags & SMB_OFLAGS_SET_DELETE_ON_CLOSE) {
346 				if (smb_tree_has_feature(of->f_tree,
347 				    SMB_TREE_CATIA)) {
348 					flags |= SMB_CATIA;
349 				}
350 				(void) smb_node_set_delete_on_close(of->f_node,
351 				    of->f_cr, flags);
352 			}
353 			smb_fsop_unshrlock(of->f_cr, of->f_node, of->f_uniqid);
354 			smb_node_destroy_lock_by_ofile(of->f_node, of);
355 
356 			if (smb_node_is_file(of->f_node)) {
357 				(void) smb_fsop_close(of->f_node, of->f_mode,
358 				    of->f_cr);
359 				smb_oplock_release(of->f_node, of);
360 			}
361 			if (smb_node_dec_open_ofiles(of->f_node) == 0) {
362 				/*
363 				 * Last close. The f_pending_attr has
364 				 * only times (atime,ctime,mtime) so
365 				 * we can borrow it to commit the
366 				 * n_pending_dosattr from the node.
367 				 */
368 				pa->sa_dosattr =
369 				    of->f_node->n_pending_dosattr;
370 				if (pa->sa_dosattr != 0)
371 					pa->sa_mask |= SMB_AT_DOSATTR;
372 				/* Let's leave this zero when not in use. */
373 				of->f_node->n_allocsz = 0;
374 			}
375 			if (pa->sa_mask != 0) {
376 				/*
377 				 * Commit any pending attributes from
378 				 * the ofile we're closing.  Note that
379 				 * we pass NULL as the ofile to setattr
380 				 * so it will write to the file system
381 				 * and not keep anything on the ofile.
382 				 * This clears n_pending_dosattr if
383 				 * there are no opens, otherwise the
384 				 * dosattr will be pending again.
385 				 */
386 				(void) smb_node_setattr(NULL, of->f_node,
387 				    of->f_cr, NULL, pa);
388 			}
389 
390 			/*
391 			 * Cancel any notify change requests that
392 			 * may be using this open instance.
393 			 */
394 			if (of->f_node->n_fcn.fcn_count)
395 				smb_notify_file_closed(of);
396 
397 			smb_server_dec_files(of->f_server);
398 		}
399 		atomic_dec_32(&of->f_tree->t_open_files);
400 
401 		mutex_enter(&of->f_mutex);
402 		ASSERT(of->f_refcnt);
403 		ASSERT(of->f_state == SMB_OFILE_STATE_CLOSING);
404 		of->f_state = SMB_OFILE_STATE_CLOSED;
405 		break;
406 	}
407 	case SMB_OFILE_STATE_CLOSED:
408 	case SMB_OFILE_STATE_CLOSING:
409 		break;
410 
411 	default:
412 		ASSERT(0);
413 		break;
414 	}
415 	mutex_exit(&of->f_mutex);
416 }
417 
418 /*
419  * smb_ofile_close_all
420  *
421  *
422  */
423 void
424 smb_ofile_close_all(
425     smb_tree_t		*tree)
426 {
427 	smb_ofile_t	*of;
428 
429 	ASSERT(tree);
430 	ASSERT(tree->t_magic == SMB_TREE_MAGIC);
431 
432 	smb_llist_enter(&tree->t_ofile_list, RW_READER);
433 	of = smb_llist_head(&tree->t_ofile_list);
434 	while (of) {
435 		ASSERT(of->f_magic == SMB_OFILE_MAGIC);
436 		ASSERT(of->f_tree == tree);
437 		of = smb_ofile_close_and_next(of);
438 	}
439 	smb_llist_exit(&tree->t_ofile_list);
440 }
441 
442 /*
443  * smb_ofiles_close_by_pid
444  *
445  *
446  */
447 void
448 smb_ofile_close_all_by_pid(
449     smb_tree_t		*tree,
450     uint16_t		pid)
451 {
452 	smb_ofile_t	*of;
453 
454 	ASSERT(tree);
455 	ASSERT(tree->t_magic == SMB_TREE_MAGIC);
456 
457 	smb_llist_enter(&tree->t_ofile_list, RW_READER);
458 	of = smb_llist_head(&tree->t_ofile_list);
459 	while (of) {
460 		ASSERT(of->f_magic == SMB_OFILE_MAGIC);
461 		ASSERT(of->f_tree == tree);
462 		if (of->f_opened_by_pid == pid) {
463 			of = smb_ofile_close_and_next(of);
464 		} else {
465 			of = smb_llist_next(&tree->t_ofile_list, of);
466 		}
467 	}
468 	smb_llist_exit(&tree->t_ofile_list);
469 }
470 
471 /*
472  * If the enumeration request is for ofile data, handle it here.
473  * Otherwise, return.
474  *
475  * This function should be called with a hold on the ofile.
476  */
477 int
478 smb_ofile_enum(smb_ofile_t *of, smb_svcenum_t *svcenum)
479 {
480 	uint8_t *pb;
481 	uint_t nbytes;
482 	int rc;
483 
484 	ASSERT(of);
485 	ASSERT(of->f_magic == SMB_OFILE_MAGIC);
486 	ASSERT(of->f_refcnt);
487 
488 	if (svcenum->se_type != SMB_SVCENUM_TYPE_FILE)
489 		return (0);
490 
491 	if (svcenum->se_nskip > 0) {
492 		svcenum->se_nskip--;
493 		return (0);
494 	}
495 
496 	if (svcenum->se_nitems >= svcenum->se_nlimit) {
497 		svcenum->se_nitems = svcenum->se_nlimit;
498 		return (0);
499 	}
500 
501 	pb = &svcenum->se_buf[svcenum->se_bused];
502 
503 	rc = smb_ofile_netinfo_encode(of, pb, svcenum->se_bavail,
504 	    &nbytes);
505 	if (rc == 0) {
506 		svcenum->se_bavail -= nbytes;
507 		svcenum->se_bused += nbytes;
508 		svcenum->se_nitems++;
509 	}
510 
511 	return (rc);
512 }
513 
514 /*
515  * Take a reference on an open file.
516  */
517 boolean_t
518 smb_ofile_hold(smb_ofile_t *of)
519 {
520 	ASSERT(of);
521 	ASSERT(of->f_magic == SMB_OFILE_MAGIC);
522 
523 	mutex_enter(&of->f_mutex);
524 
525 	if (smb_ofile_is_open_locked(of)) {
526 		of->f_refcnt++;
527 		mutex_exit(&of->f_mutex);
528 		return (B_TRUE);
529 	}
530 
531 	mutex_exit(&of->f_mutex);
532 	return (B_FALSE);
533 }
534 
535 /*
536  * Release a reference on a file.  If the reference count falls to
537  * zero and the file has been closed, post the object for deletion.
538  * Object deletion is deferred to avoid modifying a list while an
539  * iteration may be in progress.
540  */
541 void
542 smb_ofile_release(smb_ofile_t *of)
543 {
544 	SMB_OFILE_VALID(of);
545 
546 	mutex_enter(&of->f_mutex);
547 	ASSERT(of->f_refcnt);
548 	of->f_refcnt--;
549 	switch (of->f_state) {
550 	case SMB_OFILE_STATE_OPEN:
551 	case SMB_OFILE_STATE_CLOSING:
552 		break;
553 
554 	case SMB_OFILE_STATE_CLOSED:
555 		if (of->f_refcnt == 0)
556 			smb_tree_post_ofile(of->f_tree, of);
557 		break;
558 
559 	default:
560 		ASSERT(0);
561 		break;
562 	}
563 	mutex_exit(&of->f_mutex);
564 }
565 
566 /*
567  * smb_ofile_request_complete
568  *
569  * During oplock acquisition, all other oplock requests on the node
570  * are blocked until the acquire request completes and the response
571  * is on the wire.
572  * Call smb_oplock_broadcast to notify the node that the request
573  * has completed.
574  *
575  * THIS MECHANISM RELIES ON THE FACT THAT THE OFILE IS NOT REMOVED
576  * FROM THE SR UNTIL REQUEST COMPLETION (when the sr is destroyed)
577  */
578 void
579 smb_ofile_request_complete(smb_ofile_t *of)
580 {
581 	SMB_OFILE_VALID(of);
582 
583 	switch (of->f_ftype) {
584 	case SMB_FTYPE_DISK:
585 		ASSERT(of->f_node);
586 		smb_oplock_broadcast(of->f_node);
587 		break;
588 	case SMB_FTYPE_MESG_PIPE:
589 		break;
590 	default:
591 		break;
592 	}
593 }
594 
595 /*
596  * smb_ofile_lookup_by_fid
597  *
598  * Find the open file whose fid matches the one specified in the request.
599  * If we can't find the fid or the shares (trees) don't match, we have a
600  * bad fid.
601  */
602 smb_ofile_t *
603 smb_ofile_lookup_by_fid(
604     smb_tree_t		*tree,
605     uint16_t		fid)
606 {
607 	smb_llist_t	*of_list;
608 	smb_ofile_t	*of;
609 
610 	ASSERT(tree->t_magic == SMB_TREE_MAGIC);
611 
612 	of_list = &tree->t_ofile_list;
613 
614 	smb_llist_enter(of_list, RW_READER);
615 	of = smb_llist_head(of_list);
616 	while (of) {
617 		ASSERT(of->f_magic == SMB_OFILE_MAGIC);
618 		ASSERT(of->f_tree == tree);
619 		if (of->f_fid == fid) {
620 			mutex_enter(&of->f_mutex);
621 			if (of->f_state != SMB_OFILE_STATE_OPEN) {
622 				mutex_exit(&of->f_mutex);
623 				smb_llist_exit(of_list);
624 				return (NULL);
625 			}
626 			of->f_refcnt++;
627 			mutex_exit(&of->f_mutex);
628 			break;
629 		}
630 		of = smb_llist_next(of_list, of);
631 	}
632 	smb_llist_exit(of_list);
633 	return (of);
634 }
635 
636 /*
637  * smb_ofile_lookup_by_uniqid
638  *
639  * Find the open file whose uniqid matches the one specified in the request.
640  */
641 smb_ofile_t *
642 smb_ofile_lookup_by_uniqid(smb_tree_t *tree, uint32_t uniqid)
643 {
644 	smb_llist_t	*of_list;
645 	smb_ofile_t	*of;
646 
647 	ASSERT(tree->t_magic == SMB_TREE_MAGIC);
648 
649 	of_list = &tree->t_ofile_list;
650 	smb_llist_enter(of_list, RW_READER);
651 	of = smb_llist_head(of_list);
652 
653 	while (of) {
654 		ASSERT(of->f_magic == SMB_OFILE_MAGIC);
655 		ASSERT(of->f_tree == tree);
656 
657 		if (of->f_uniqid == uniqid) {
658 			if (smb_ofile_hold(of)) {
659 				smb_llist_exit(of_list);
660 				return (of);
661 			}
662 		}
663 
664 		of = smb_llist_next(of_list, of);
665 	}
666 
667 	smb_llist_exit(of_list);
668 	return (NULL);
669 }
670 
671 /*
672  * Disallow NetFileClose on certain ofiles to avoid side-effects.
673  * Closing a tree root is not allowed: use NetSessionDel or NetShareDel.
674  * Closing SRVSVC connections is not allowed because this NetFileClose
675  * request may depend on this ofile.
676  */
677 boolean_t
678 smb_ofile_disallow_fclose(smb_ofile_t *of)
679 {
680 	ASSERT(of);
681 	ASSERT(of->f_magic == SMB_OFILE_MAGIC);
682 	ASSERT(of->f_refcnt);
683 
684 	switch (of->f_ftype) {
685 	case SMB_FTYPE_DISK:
686 		ASSERT(of->f_tree);
687 		return (of->f_node == of->f_tree->t_snode);
688 
689 	case SMB_FTYPE_MESG_PIPE:
690 		ASSERT(of->f_pipe);
691 		if (smb_strcasecmp(of->f_pipe->p_name, "SRVSVC", 0) == 0)
692 			return (B_TRUE);
693 		break;
694 	default:
695 		break;
696 	}
697 
698 	return (B_FALSE);
699 }
700 
701 /*
702  * smb_ofile_set_flags
703  *
704  * Return value:
705  *
706  *	Current flags value
707  *
708  */
709 void
710 smb_ofile_set_flags(
711     smb_ofile_t		*of,
712     uint32_t		flags)
713 {
714 	ASSERT(of);
715 	ASSERT(of->f_magic == SMB_OFILE_MAGIC);
716 	ASSERT(of->f_refcnt);
717 
718 	mutex_enter(&of->f_mutex);
719 	of->f_flags |= flags;
720 	mutex_exit(&of->f_mutex);
721 }
722 
723 /*
724  * smb_ofile_seek
725  *
726  * Return value:
727  *
728  *	0		Success
729  *	EINVAL		Unknown mode
730  *	EOVERFLOW	offset too big
731  *
732  */
733 int
734 smb_ofile_seek(
735     smb_ofile_t		*of,
736     ushort_t		mode,
737     int32_t		off,
738     uint32_t		*retoff)
739 {
740 	u_offset_t	newoff = 0;
741 	int		rc = 0;
742 	smb_attr_t	attr;
743 
744 	ASSERT(of);
745 	ASSERT(of->f_magic == SMB_OFILE_MAGIC);
746 	ASSERT(of->f_refcnt);
747 
748 	mutex_enter(&of->f_mutex);
749 	switch (mode) {
750 	case SMB_SEEK_SET:
751 		if (off < 0)
752 			newoff = 0;
753 		else
754 			newoff = (u_offset_t)off;
755 		break;
756 
757 	case SMB_SEEK_CUR:
758 		if (off < 0 && (-off) > of->f_seek_pos)
759 			newoff = 0;
760 		else
761 			newoff = of->f_seek_pos + (u_offset_t)off;
762 		break;
763 
764 	case SMB_SEEK_END:
765 		bzero(&attr, sizeof (smb_attr_t));
766 		attr.sa_mask |= SMB_AT_SIZE;
767 		rc = smb_fsop_getattr(NULL, kcred, of->f_node, &attr);
768 		if (rc != 0) {
769 			mutex_exit(&of->f_mutex);
770 			return (rc);
771 		}
772 		if (off < 0 && (-off) > attr.sa_vattr.va_size)
773 			newoff = 0;
774 		else
775 			newoff = attr.sa_vattr.va_size + (u_offset_t)off;
776 		break;
777 
778 	default:
779 		mutex_exit(&of->f_mutex);
780 		return (EINVAL);
781 	}
782 
783 	/*
784 	 * See comments at the beginning of smb_seek.c.
785 	 * If the offset is greater than UINT_MAX, we will return an error.
786 	 */
787 
788 	if (newoff > UINT_MAX) {
789 		rc = EOVERFLOW;
790 	} else {
791 		of->f_seek_pos = newoff;
792 		*retoff = (uint32_t)newoff;
793 	}
794 	mutex_exit(&of->f_mutex);
795 	return (rc);
796 }
797 
798 /*
799  * smb_ofile_is_open
800  */
801 boolean_t
802 smb_ofile_is_open(smb_ofile_t *of)
803 {
804 	boolean_t	rc;
805 
806 	SMB_OFILE_VALID(of);
807 
808 	mutex_enter(&of->f_mutex);
809 	rc = smb_ofile_is_open_locked(of);
810 	mutex_exit(&of->f_mutex);
811 	return (rc);
812 }
813 
814 /* *************************** Static Functions ***************************** */
815 
816 /*
817  * Determine whether or not an ofile is open.
818  * This function must be called with the mutex held.
819  */
820 static boolean_t
821 smb_ofile_is_open_locked(smb_ofile_t *of)
822 {
823 	switch (of->f_state) {
824 	case SMB_OFILE_STATE_OPEN:
825 		return (B_TRUE);
826 
827 	case SMB_OFILE_STATE_CLOSING:
828 	case SMB_OFILE_STATE_CLOSED:
829 		return (B_FALSE);
830 
831 	default:
832 		ASSERT(0);
833 		return (B_FALSE);
834 	}
835 }
836 
837 /*
838  * This function closes the file passed in (if appropriate) and returns the
839  * next open file in the list of open files of the tree of the open file passed
840  * in. It requires that the list of open files of the tree be entered in
841  * RW_READER mode before being called.
842  */
843 static smb_ofile_t *
844 smb_ofile_close_and_next(smb_ofile_t *of)
845 {
846 	smb_ofile_t	*next_of;
847 	smb_tree_t	*tree;
848 
849 	ASSERT(of);
850 	ASSERT(of->f_magic == SMB_OFILE_MAGIC);
851 
852 	mutex_enter(&of->f_mutex);
853 	switch (of->f_state) {
854 	case SMB_OFILE_STATE_OPEN:
855 		/* The file is still open. */
856 		of->f_refcnt++;
857 		ASSERT(of->f_refcnt);
858 		tree = of->f_tree;
859 		mutex_exit(&of->f_mutex);
860 		smb_llist_exit(&of->f_tree->t_ofile_list);
861 		smb_ofile_close(of, 0);
862 		smb_ofile_release(of);
863 		smb_llist_enter(&tree->t_ofile_list, RW_READER);
864 		next_of = smb_llist_head(&tree->t_ofile_list);
865 		break;
866 	case SMB_OFILE_STATE_CLOSING:
867 	case SMB_OFILE_STATE_CLOSED:
868 		/*
869 		 * The ofile exists but is closed or
870 		 * in the process being closed.
871 		 */
872 		mutex_exit(&of->f_mutex);
873 		next_of = smb_llist_next(&of->f_tree->t_ofile_list, of);
874 		break;
875 	default:
876 		ASSERT(0);
877 		mutex_exit(&of->f_mutex);
878 		next_of = smb_llist_next(&of->f_tree->t_ofile_list, of);
879 		break;
880 	}
881 	return (next_of);
882 }
883 
884 /*
885  * Delete an ofile.
886  *
887  * Remove the ofile from the tree list before freeing resources
888  * associated with the ofile.
889  */
890 void
891 smb_ofile_delete(void *arg)
892 {
893 	smb_tree_t	*tree;
894 	smb_ofile_t	*of = (smb_ofile_t *)arg;
895 
896 	SMB_OFILE_VALID(of);
897 	ASSERT(of->f_refcnt == 0);
898 	ASSERT(of->f_state == SMB_OFILE_STATE_CLOSED);
899 	ASSERT(!SMB_OFILE_OPLOCK_GRANTED(of));
900 
901 	tree = of->f_tree;
902 	smb_llist_enter(&tree->t_ofile_list, RW_WRITER);
903 	smb_llist_remove(&tree->t_ofile_list, of);
904 	smb_idpool_free(&tree->t_fid_pool, of->f_fid);
905 	atomic_dec_32(&tree->t_session->s_file_cnt);
906 	smb_llist_exit(&tree->t_ofile_list);
907 
908 	mutex_enter(&of->f_mutex);
909 	mutex_exit(&of->f_mutex);
910 
911 	if (of->f_ftype == SMB_FTYPE_MESG_PIPE) {
912 		smb_opipe_dealloc(of->f_pipe);
913 		of->f_pipe = NULL;
914 	} else {
915 		ASSERT(of->f_ftype == SMB_FTYPE_DISK);
916 		ASSERT(of->f_node != NULL);
917 		smb_node_rem_ofile(of->f_node, of);
918 		smb_node_release(of->f_node);
919 	}
920 
921 	of->f_magic = (uint32_t)~SMB_OFILE_MAGIC;
922 	mutex_destroy(&of->f_mutex);
923 	crfree(of->f_cr);
924 	kmem_cache_free(of->f_tree->t_server->si_cache_ofile, of);
925 }
926 
927 /*
928  * smb_ofile_access
929  *
930  * This function will check to see if the access requested is granted.
931  * Returns NT status codes.
932  */
933 uint32_t
934 smb_ofile_access(smb_ofile_t *of, cred_t *cr, uint32_t access)
935 {
936 
937 	if ((of == NULL) || (cr == kcred))
938 		return (NT_STATUS_SUCCESS);
939 
940 	/*
941 	 * If the request is for something
942 	 * I don't grant it is an error
943 	 */
944 	if (~(of->f_granted_access) & access) {
945 		if (!(of->f_granted_access & ACCESS_SYSTEM_SECURITY) &&
946 		    (access & ACCESS_SYSTEM_SECURITY)) {
947 			return (NT_STATUS_PRIVILEGE_NOT_HELD);
948 		}
949 		return (NT_STATUS_ACCESS_DENIED);
950 	}
951 
952 	return (NT_STATUS_SUCCESS);
953 }
954 
955 /*
956  * smb_ofile_share_check
957  *
958  * Check if ofile was opened with share access NONE (0).
959  * Returns: B_TRUE  - share access non-zero
960  *          B_FALSE - share access NONE
961  */
962 boolean_t
963 smb_ofile_share_check(smb_ofile_t *of)
964 {
965 	return (!SMB_DENY_ALL(of->f_share_access));
966 }
967 
968 /*
969  * check file sharing rules for current open request
970  * against existing open instances of the same file
971  *
972  * Returns NT_STATUS_SHARING_VIOLATION if there is any
973  * sharing conflict, otherwise returns NT_STATUS_SUCCESS.
974  */
975 uint32_t
976 smb_ofile_open_check(smb_ofile_t *of, uint32_t desired_access,
977     uint32_t share_access)
978 {
979 	ASSERT(of->f_magic == SMB_OFILE_MAGIC);
980 
981 	mutex_enter(&of->f_mutex);
982 
983 	if (of->f_state != SMB_OFILE_STATE_OPEN) {
984 		mutex_exit(&of->f_mutex);
985 		return (NT_STATUS_INVALID_HANDLE);
986 	}
987 
988 	/* if it's just meta data */
989 	if ((of->f_granted_access & FILE_DATA_ALL) == 0) {
990 		mutex_exit(&of->f_mutex);
991 		return (NT_STATUS_SUCCESS);
992 	}
993 
994 	/*
995 	 * Check requested share access against the
996 	 * open granted (desired) access
997 	 */
998 	if (SMB_DENY_DELETE(share_access) && (of->f_granted_access & DELETE)) {
999 		mutex_exit(&of->f_mutex);
1000 		return (NT_STATUS_SHARING_VIOLATION);
1001 	}
1002 
1003 	if (SMB_DENY_READ(share_access) &&
1004 	    (of->f_granted_access & (FILE_READ_DATA | FILE_EXECUTE))) {
1005 		mutex_exit(&of->f_mutex);
1006 		return (NT_STATUS_SHARING_VIOLATION);
1007 	}
1008 
1009 	if (SMB_DENY_WRITE(share_access) &&
1010 	    (of->f_granted_access & (FILE_WRITE_DATA | FILE_APPEND_DATA))) {
1011 		mutex_exit(&of->f_mutex);
1012 		return (NT_STATUS_SHARING_VIOLATION);
1013 	}
1014 
1015 	/* check requested desired access against the open share access */
1016 	if (SMB_DENY_DELETE(of->f_share_access) && (desired_access & DELETE)) {
1017 		mutex_exit(&of->f_mutex);
1018 		return (NT_STATUS_SHARING_VIOLATION);
1019 	}
1020 
1021 	if (SMB_DENY_READ(of->f_share_access) &&
1022 	    (desired_access & (FILE_READ_DATA | FILE_EXECUTE))) {
1023 		mutex_exit(&of->f_mutex);
1024 		return (NT_STATUS_SHARING_VIOLATION);
1025 	}
1026 
1027 	if (SMB_DENY_WRITE(of->f_share_access) &&
1028 	    (desired_access & (FILE_WRITE_DATA | FILE_APPEND_DATA))) {
1029 		mutex_exit(&of->f_mutex);
1030 		return (NT_STATUS_SHARING_VIOLATION);
1031 	}
1032 
1033 	mutex_exit(&of->f_mutex);
1034 	return (NT_STATUS_SUCCESS);
1035 }
1036 
1037 /*
1038  * smb_ofile_rename_check
1039  *
1040  * An open file can be renamed if
1041  *
1042  *  1. isn't opened for data writing or deleting
1043  *
1044  *  2. Opened with "Deny Delete" share mode
1045  *         But not opened for data reading or executing
1046  *         (opened for accessing meta data)
1047  */
1048 
1049 uint32_t
1050 smb_ofile_rename_check(smb_ofile_t *of)
1051 {
1052 	ASSERT(of->f_magic == SMB_OFILE_MAGIC);
1053 
1054 	mutex_enter(&of->f_mutex);
1055 
1056 	if (of->f_state != SMB_OFILE_STATE_OPEN) {
1057 		mutex_exit(&of->f_mutex);
1058 		return (NT_STATUS_INVALID_HANDLE);
1059 	}
1060 
1061 	if (of->f_granted_access &
1062 	    (FILE_WRITE_DATA | FILE_APPEND_DATA | DELETE)) {
1063 		mutex_exit(&of->f_mutex);
1064 		return (NT_STATUS_SHARING_VIOLATION);
1065 	}
1066 
1067 	if ((of->f_share_access & FILE_SHARE_DELETE) == 0) {
1068 		if (of->f_granted_access &
1069 		    (FILE_READ_DATA | FILE_EXECUTE)) {
1070 			mutex_exit(&of->f_mutex);
1071 			return (NT_STATUS_SHARING_VIOLATION);
1072 		}
1073 	}
1074 
1075 	mutex_exit(&of->f_mutex);
1076 	return (NT_STATUS_SUCCESS);
1077 }
1078 
1079 /*
1080  * smb_ofile_delete_check
1081  *
1082  * An open file can be deleted only if opened for
1083  * accessing meta data. Share modes aren't important
1084  * in this case.
1085  *
1086  * NOTE: there is another mechanism for deleting an
1087  * open file that NT clients usually use.
1088  * That's setting "Delete on close" flag for an open
1089  * file.  In this way the file will be deleted after
1090  * last close. This flag can be set by SmbTrans2SetFileInfo
1091  * with FILE_DISPOSITION_INFO information level.
1092  * For setting this flag, the file should be opened by
1093  * DELETE access in the FID that is passed in the Trans2
1094  * request.
1095  */
1096 
1097 uint32_t
1098 smb_ofile_delete_check(smb_ofile_t *of)
1099 {
1100 	ASSERT(of->f_magic == SMB_OFILE_MAGIC);
1101 
1102 	mutex_enter(&of->f_mutex);
1103 
1104 	if (of->f_state != SMB_OFILE_STATE_OPEN) {
1105 		mutex_exit(&of->f_mutex);
1106 		return (NT_STATUS_INVALID_HANDLE);
1107 	}
1108 
1109 	if (of->f_granted_access &
1110 	    (FILE_READ_DATA | FILE_WRITE_DATA |
1111 	    FILE_APPEND_DATA | FILE_EXECUTE | DELETE)) {
1112 		mutex_exit(&of->f_mutex);
1113 		return (NT_STATUS_SHARING_VIOLATION);
1114 	}
1115 
1116 	mutex_exit(&of->f_mutex);
1117 	return (NT_STATUS_SUCCESS);
1118 }
1119 
1120 cred_t *
1121 smb_ofile_getcred(smb_ofile_t *of)
1122 {
1123 	return (of->f_cr);
1124 }
1125 
1126 /*
1127  * smb_ofile_set_delete_on_close
1128  *
1129  * Set the DeleteOnClose flag on the smb file. When the file is closed,
1130  * the flag will be transferred to the smb node, which will commit the
1131  * delete operation and inhibit subsequent open requests.
1132  *
1133  * When DeleteOnClose is set on an smb_node, the common open code will
1134  * reject subsequent open requests for the file. Observation of Windows
1135  * 2000 indicates that subsequent opens should be allowed (assuming
1136  * there would be no sharing violation) until the file is closed using
1137  * the fid on which the DeleteOnClose was requested.
1138  */
1139 void
1140 smb_ofile_set_delete_on_close(smb_ofile_t *of)
1141 {
1142 	mutex_enter(&of->f_mutex);
1143 	of->f_flags |= SMB_OFLAGS_SET_DELETE_ON_CLOSE;
1144 	mutex_exit(&of->f_mutex);
1145 }
1146 
1147 /*
1148  * Encode open file information into a buffer; needed in user space to
1149  * support RPC requests.
1150  */
1151 static int
1152 smb_ofile_netinfo_encode(smb_ofile_t *of, uint8_t *buf, size_t buflen,
1153     uint32_t *nbytes)
1154 {
1155 	smb_netfileinfo_t	fi;
1156 	int			rc;
1157 
1158 	rc = smb_ofile_netinfo_init(of, &fi);
1159 	if (rc == 0) {
1160 		rc = smb_netfileinfo_encode(&fi, buf, buflen, nbytes);
1161 		smb_ofile_netinfo_fini(&fi);
1162 	}
1163 
1164 	return (rc);
1165 }
1166 
1167 static int
1168 smb_ofile_netinfo_init(smb_ofile_t *of, smb_netfileinfo_t *fi)
1169 {
1170 	smb_user_t	*user;
1171 	smb_tree_t	*tree;
1172 	smb_node_t	*node;
1173 	char		*path;
1174 	char		*buf;
1175 	int		rc;
1176 
1177 	ASSERT(of);
1178 	user = of->f_user;
1179 	tree = of->f_tree;
1180 	ASSERT(user);
1181 	ASSERT(tree);
1182 
1183 	buf = kmem_zalloc(MAXPATHLEN, KM_SLEEP);
1184 
1185 	switch (of->f_ftype) {
1186 	case SMB_FTYPE_DISK:
1187 		node = of->f_node;
1188 		ASSERT(node);
1189 
1190 		fi->fi_permissions = of->f_granted_access;
1191 		fi->fi_numlocks = smb_lock_get_lock_count(node, of);
1192 
1193 		path = kmem_zalloc(MAXPATHLEN, KM_SLEEP);
1194 
1195 		if (node != tree->t_snode) {
1196 			rc = smb_node_getshrpath(node, tree, path, MAXPATHLEN);
1197 			if (rc != 0)
1198 				(void) strlcpy(path, node->od_name, MAXPATHLEN);
1199 		}
1200 
1201 		(void) snprintf(buf, MAXPATHLEN, "%s:%s", tree->t_sharename,
1202 		    path);
1203 		kmem_free(path, MAXPATHLEN);
1204 		break;
1205 
1206 	case SMB_FTYPE_MESG_PIPE:
1207 		ASSERT(of->f_pipe);
1208 
1209 		fi->fi_permissions = FILE_READ_DATA | FILE_WRITE_DATA |
1210 		    FILE_EXECUTE;
1211 		fi->fi_numlocks = 0;
1212 		(void) snprintf(buf, MAXPATHLEN, "\\PIPE\\%s",
1213 		    of->f_pipe->p_name);
1214 		break;
1215 
1216 	default:
1217 		kmem_free(buf, MAXPATHLEN);
1218 		return (-1);
1219 	}
1220 
1221 	fi->fi_fid = of->f_fid;
1222 	fi->fi_uniqid = of->f_uniqid;
1223 	fi->fi_pathlen = strlen(buf) + 1;
1224 	fi->fi_path = smb_mem_strdup(buf);
1225 	kmem_free(buf, MAXPATHLEN);
1226 
1227 	fi->fi_namelen = user->u_domain_len + user->u_name_len + 2;
1228 	fi->fi_username = kmem_alloc(fi->fi_namelen, KM_SLEEP);
1229 	(void) snprintf(fi->fi_username, fi->fi_namelen, "%s\\%s",
1230 	    user->u_domain, user->u_name);
1231 	return (0);
1232 }
1233 
1234 static void
1235 smb_ofile_netinfo_fini(smb_netfileinfo_t *fi)
1236 {
1237 	if (fi == NULL)
1238 		return;
1239 
1240 	if (fi->fi_path)
1241 		smb_mem_free(fi->fi_path);
1242 	if (fi->fi_username)
1243 		kmem_free(fi->fi_username, fi->fi_namelen);
1244 
1245 	bzero(fi, sizeof (smb_netfileinfo_t));
1246 }
1247 
1248 /*
1249  * A query of user and group quotas may span multiple requests.
1250  * f_quota_resume is used to determine where the query should
1251  * be resumed, in a subsequent request. f_quota_resume contains
1252  * the SID of the last quota entry returned to the client.
1253  */
1254 void
1255 smb_ofile_set_quota_resume(smb_ofile_t *ofile, char *resume)
1256 {
1257 	ASSERT(ofile);
1258 	mutex_enter(&ofile->f_mutex);
1259 	if (resume == NULL)
1260 		bzero(ofile->f_quota_resume, SMB_SID_STRSZ);
1261 	else
1262 		(void) strlcpy(ofile->f_quota_resume, resume, SMB_SID_STRSZ);
1263 	mutex_exit(&ofile->f_mutex);
1264 }
1265 
1266 void
1267 smb_ofile_get_quota_resume(smb_ofile_t *ofile, char *buf, int bufsize)
1268 {
1269 	ASSERT(ofile);
1270 	mutex_enter(&ofile->f_mutex);
1271 	(void) strlcpy(buf, ofile->f_quota_resume, bufsize);
1272 	mutex_exit(&ofile->f_mutex);
1273 }
1274