xref: /illumos-gate/usr/src/uts/common/fs/smbsrv/smb_ofile.c (revision e0731422366620894c16c1ee6515551c5f00733d)
1 /*
2  * CDDL HEADER START
3  *
4  * The contents of this file are subject to the terms of the
5  * Common Development and Distribution License (the "License").
6  * You may not use this file except in compliance with the License.
7  *
8  * You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE
9  * or http://www.opensolaris.org/os/licensing.
10  * See the License for the specific language governing permissions
11  * and limitations under the License.
12  *
13  * When distributing Covered Code, include this CDDL HEADER in each
14  * file and include the License file at usr/src/OPENSOLARIS.LICENSE.
15  * If applicable, add the following below this CDDL HEADER, with the
16  * fields enclosed by brackets "[]" replaced with your own identifying
17  * information: Portions Copyright [yyyy] [name of copyright owner]
18  *
19  * CDDL HEADER END
20  */
21 /*
22  * Copyright (c) 2007, 2010, Oracle and/or its affiliates. All rights reserved.
23  */
24 
25 /*
26  * General Structures Layout
27  * -------------------------
28  *
29  * This is a simplified diagram showing the relationship between most of the
30  * main structures.
31  *
32  * +-------------------+
33  * |     SMB_INFO      |
34  * +-------------------+
35  *          |
36  *          |
37  *          v
38  * +-------------------+       +-------------------+      +-------------------+
39  * |     SESSION       |<----->|     SESSION       |......|      SESSION      |
40  * +-------------------+       +-------------------+      +-------------------+
41  *          |
42  *          |
43  *          v
44  * +-------------------+       +-------------------+      +-------------------+
45  * |       USER        |<----->|       USER        |......|       USER        |
46  * +-------------------+       +-------------------+      +-------------------+
47  *          |
48  *          |
49  *          v
50  * +-------------------+       +-------------------+      +-------------------+
51  * |       TREE        |<----->|       TREE        |......|       TREE        |
52  * +-------------------+       +-------------------+      +-------------------+
53  *      |         |
54  *      |         |
55  *      |         v
56  *      |     +-------+       +-------+      +-------+
57  *      |     | OFILE |<----->| OFILE |......| OFILE |
58  *      |     +-------+       +-------+      +-------+
59  *      |
60  *      |
61  *      v
62  *  +-------+       +------+      +------+
63  *  | ODIR  |<----->| ODIR |......| ODIR |
64  *  +-------+       +------+      +------+
65  *
66  *
67  * Ofile State Machine
68  * ------------------
69  *
70  *    +-------------------------+	 T0
71  *    |  SMB_OFILE_STATE_OPEN   |<----------- Creation/Allocation
72  *    +-------------------------+
73  *		    |
74  *		    | T1
75  *		    |
76  *		    v
77  *    +-------------------------+
78  *    | SMB_OFILE_STATE_CLOSING |
79  *    +-------------------------+
80  *		    |
81  *		    | T2
82  *		    |
83  *		    v
84  *    +-------------------------+    T3
85  *    | SMB_OFILE_STATE_CLOSED  |----------> Deletion/Free
86  *    +-------------------------+
87  *
88  * SMB_OFILE_STATE_OPEN
89  *
90  *    While in this state:
91  *      - The ofile is queued in the list of ofiles of its tree.
92  *      - References will be given out if the ofile is looked up.
93  *
94  * SMB_OFILE_STATE_CLOSING
95  *
96  *    While in this state:
97  *      - The ofile is queued in the list of ofiles of its tree.
98  *      - References will not be given out if the ofile is looked up.
99  *      - The file is closed and the locks held are being released.
100  *      - The resources associated with the ofile remain.
101  *
102  * SMB_OFILE_STATE_CLOSED
103  *
104  *    While in this state:
105  *      - The ofile is queued in the list of ofiles of its tree.
106  *      - References will not be given out if the ofile is looked up.
107  *      - The resources associated with the ofile remain.
108  *
109  * Transition T0
110  *
111  *    This transition occurs in smb_ofile_open(). A new ofile is created and
112  *    added to the list of ofiles of a tree.
113  *
114  * Transition T1
115  *
116  *    This transition occurs in smb_ofile_close().
117  *
118  * Transition T2
119  *
120  *    This transition occurs in smb_ofile_release(). The resources associated
121  *    with the ofile are freed as well as the ofile structure. For the
122  *    transition to occur, the ofile must be in the SMB_OFILE_STATE_CLOSED
123  *    state and the reference count be zero.
124  *
125  * Comments
126  * --------
127  *
128  *    The state machine of the ofile structures is controlled by 3 elements:
129  *      - The list of ofiles of the tree it belongs to.
130  *      - The mutex embedded in the structure itself.
131  *      - The reference count.
132  *
133  *    There's a mutex embedded in the ofile structure used to protect its fields
134  *    and there's a lock embedded in the list of ofiles of a tree. To
135  *    increment or to decrement the reference count the mutex must be entered.
136  *    To insert the ofile into the list of ofiles of the tree and to remove
137  *    the ofile from it, the lock must be entered in RW_WRITER mode.
138  *
139  *    Rules of access to a ofile structure:
140  *
141  *    1) In order to avoid deadlocks, when both (mutex and lock of the ofile
142  *       list) have to be entered, the lock must be entered first.
143  *
144  *    2) All actions applied to an ofile require a reference count.
145  *
146  *    3) There are 2 ways of getting a reference count. One is when the ofile
147  *       is opened. The other one when the ofile is looked up. This translates
148  *       into 2 functions: smb_ofile_open() and smb_ofile_lookup_by_fid().
149  *
150  *    It should be noted that the reference count of an ofile registers the
151  *    number of references to the ofile in other structures (such as an smb
152  *    request). The reference count is not incremented in these 2 instances:
153  *
154  *    1) The ofile is open. An ofile is anchored by his state. If there's
155  *       no activity involving an ofile currently open, the reference count
156  *       of that ofile is zero.
157  *
158  *    2) The ofile is queued in the list of ofiles of its tree. The fact of
159  *       being queued in that list is NOT registered by incrementing the
160  *       reference count.
161  */
162 #include <smbsrv/smb_kproto.h>
163 #include <smbsrv/smb_fsops.h>
164 
165 static boolean_t smb_ofile_is_open_locked(smb_ofile_t *);
166 static smb_ofile_t *smb_ofile_close_and_next(smb_ofile_t *);
167 static void smb_ofile_set_close_attrs(smb_ofile_t *, uint32_t);
168 static int smb_ofile_netinfo_encode(smb_ofile_t *, uint8_t *, size_t,
169     uint32_t *);
170 static int smb_ofile_netinfo_init(smb_ofile_t *, smb_netfileinfo_t *);
171 static void smb_ofile_netinfo_fini(smb_netfileinfo_t *);
172 
173 /*
174  * smb_ofile_open
175  */
176 smb_ofile_t *
177 smb_ofile_open(
178     smb_tree_t		*tree,
179     smb_node_t		*node,
180     uint16_t		pid,
181     struct open_param	*op,
182     uint16_t		ftype,
183     uint32_t		uniqid,
184     smb_error_t		*err)
185 {
186 	smb_ofile_t	*of;
187 	uint16_t	fid;
188 	smb_attr_t	attr;
189 
190 	if (smb_idpool_alloc(&tree->t_fid_pool, &fid)) {
191 		err->status = NT_STATUS_TOO_MANY_OPENED_FILES;
192 		err->errcls = ERRDOS;
193 		err->errcode = ERROR_TOO_MANY_OPEN_FILES;
194 		return (NULL);
195 	}
196 
197 	of = kmem_cache_alloc(tree->t_server->si_cache_ofile, KM_SLEEP);
198 	bzero(of, sizeof (smb_ofile_t));
199 	of->f_magic = SMB_OFILE_MAGIC;
200 	of->f_refcnt = 1;
201 	of->f_fid = fid;
202 	of->f_uniqid = uniqid;
203 	of->f_opened_by_pid = pid;
204 	of->f_granted_access = op->desired_access;
205 	of->f_share_access = op->share_access;
206 	of->f_create_options = op->create_options;
207 	of->f_cr = (op->create_options & FILE_OPEN_FOR_BACKUP_INTENT) ?
208 	    smb_user_getprivcred(tree->t_user) : tree->t_user->u_cred;
209 	crhold(of->f_cr);
210 	of->f_ftype = ftype;
211 	of->f_server = tree->t_server;
212 	of->f_session = tree->t_user->u_session;
213 	of->f_user = tree->t_user;
214 	of->f_tree = tree;
215 	of->f_node = node;
216 	of->f_explicit_times = 0;
217 	mutex_init(&of->f_mutex, NULL, MUTEX_DEFAULT, NULL);
218 	of->f_state = SMB_OFILE_STATE_OPEN;
219 
220 	if (ftype == SMB_FTYPE_MESG_PIPE) {
221 		of->f_pipe = smb_opipe_alloc(tree->t_server);
222 		smb_server_inc_pipes(of->f_server);
223 	} else {
224 		ASSERT(ftype == SMB_FTYPE_DISK); /* Regular file, not a pipe */
225 		ASSERT(node);
226 
227 		if (of->f_granted_access == FILE_EXECUTE)
228 			of->f_flags |= SMB_OFLAGS_EXECONLY;
229 
230 		bzero(&attr, sizeof (smb_attr_t));
231 		attr.sa_mask |= SMB_AT_UID;
232 		if (smb_fsop_getattr(NULL, kcred, node, &attr) != 0) {
233 			of->f_magic = 0;
234 			mutex_destroy(&of->f_mutex);
235 			crfree(of->f_cr);
236 			smb_idpool_free(&tree->t_fid_pool, of->f_fid);
237 			kmem_cache_free(tree->t_server->si_cache_ofile, of);
238 			err->status = NT_STATUS_INTERNAL_ERROR;
239 			err->errcls = ERRDOS;
240 			err->errcode = ERROR_INTERNAL_ERROR;
241 			return (NULL);
242 		}
243 		if (crgetuid(of->f_cr) == attr.sa_vattr.va_uid) {
244 			/*
245 			 * Add this bit for the file's owner even if it's not
246 			 * specified in the request (Windows behavior).
247 			 */
248 			of->f_granted_access |= FILE_READ_ATTRIBUTES;
249 		}
250 
251 		if (smb_node_is_file(node)) {
252 			of->f_mode =
253 			    smb_fsop_amask_to_omode(of->f_granted_access);
254 			if (smb_fsop_open(node, of->f_mode, of->f_cr) != 0) {
255 				of->f_magic = 0;
256 				mutex_destroy(&of->f_mutex);
257 				crfree(of->f_cr);
258 				smb_idpool_free(&tree->t_fid_pool, of->f_fid);
259 				kmem_cache_free(tree->t_server->si_cache_ofile,
260 				    of);
261 				err->status = NT_STATUS_ACCESS_DENIED;
262 				err->errcls = ERRDOS;
263 				err->errcode = ERROR_ACCESS_DENIED;
264 				return (NULL);
265 			}
266 		}
267 
268 		if (tree->t_flags & SMB_TREE_READONLY)
269 			of->f_flags |= SMB_OFLAGS_READONLY;
270 
271 		if (op->created_readonly)
272 			node->readonly_creator = of;
273 
274 		smb_node_inc_open_ofiles(node);
275 		smb_node_add_ofile(node, of);
276 		smb_node_ref(node);
277 		smb_server_inc_files(of->f_server);
278 	}
279 	smb_llist_enter(&tree->t_ofile_list, RW_WRITER);
280 	smb_llist_insert_tail(&tree->t_ofile_list, of);
281 	smb_llist_exit(&tree->t_ofile_list);
282 	atomic_inc_32(&tree->t_open_files);
283 	atomic_inc_32(&of->f_session->s_file_cnt);
284 	return (of);
285 }
286 
287 /*
288  * smb_ofile_close
289  */
290 void
291 smb_ofile_close(smb_ofile_t *of, uint32_t last_wtime)
292 {
293 	ASSERT(of);
294 	ASSERT(of->f_magic == SMB_OFILE_MAGIC);
295 	uint32_t flags = 0;
296 
297 	mutex_enter(&of->f_mutex);
298 	ASSERT(of->f_refcnt);
299 	switch (of->f_state) {
300 	case SMB_OFILE_STATE_OPEN: {
301 
302 		of->f_state = SMB_OFILE_STATE_CLOSING;
303 		mutex_exit(&of->f_mutex);
304 
305 		if (of->f_ftype == SMB_FTYPE_MESG_PIPE) {
306 			smb_opipe_close(of);
307 			smb_server_dec_pipes(of->f_server);
308 		} else {
309 			smb_ofile_set_close_attrs(of, last_wtime);
310 
311 			if (of->f_flags & SMB_OFLAGS_SET_DELETE_ON_CLOSE) {
312 				if (smb_tree_has_feature(of->f_tree,
313 				    SMB_TREE_CATIA)) {
314 					flags |= SMB_CATIA;
315 				}
316 				(void) smb_node_set_delete_on_close(of->f_node,
317 				    of->f_cr, flags);
318 			}
319 			smb_fsop_unshrlock(of->f_cr, of->f_node, of->f_uniqid);
320 			smb_node_destroy_lock_by_ofile(of->f_node, of);
321 
322 			if (smb_node_is_file(of->f_node))
323 				(void) smb_fsop_close(of->f_node, of->f_mode,
324 				    of->f_cr);
325 
326 			/*
327 			 * Cancel any notify change requests related
328 			 * to this open instance.
329 			 */
330 			if (of->f_node->flags & NODE_FLAGS_NOTIFY_CHANGE)
331 				smb_process_file_notify_change_queue(of);
332 			smb_server_dec_files(of->f_server);
333 		}
334 		atomic_dec_32(&of->f_tree->t_open_files);
335 
336 		mutex_enter(&of->f_mutex);
337 		ASSERT(of->f_refcnt);
338 		ASSERT(of->f_state == SMB_OFILE_STATE_CLOSING);
339 		of->f_state = SMB_OFILE_STATE_CLOSED;
340 		if (of->f_node != NULL) {
341 			smb_node_dec_open_ofiles(of->f_node);
342 			smb_oplock_release(of->f_node, of);
343 		}
344 		break;
345 	}
346 	case SMB_OFILE_STATE_CLOSED:
347 	case SMB_OFILE_STATE_CLOSING:
348 		break;
349 
350 	default:
351 		ASSERT(0);
352 		break;
353 	}
354 	mutex_exit(&of->f_mutex);
355 }
356 
357 /*
358  * smb_ofile_close_all
359  *
360  *
361  */
362 void
363 smb_ofile_close_all(
364     smb_tree_t		*tree)
365 {
366 	smb_ofile_t	*of;
367 
368 	ASSERT(tree);
369 	ASSERT(tree->t_magic == SMB_TREE_MAGIC);
370 
371 	smb_llist_enter(&tree->t_ofile_list, RW_READER);
372 	of = smb_llist_head(&tree->t_ofile_list);
373 	while (of) {
374 		ASSERT(of->f_magic == SMB_OFILE_MAGIC);
375 		ASSERT(of->f_tree == tree);
376 		of = smb_ofile_close_and_next(of);
377 	}
378 	smb_llist_exit(&tree->t_ofile_list);
379 }
380 
381 /*
382  * smb_ofiles_close_by_pid
383  *
384  *
385  */
386 void
387 smb_ofile_close_all_by_pid(
388     smb_tree_t		*tree,
389     uint16_t		pid)
390 {
391 	smb_ofile_t	*of;
392 
393 	ASSERT(tree);
394 	ASSERT(tree->t_magic == SMB_TREE_MAGIC);
395 
396 	smb_llist_enter(&tree->t_ofile_list, RW_READER);
397 	of = smb_llist_head(&tree->t_ofile_list);
398 	while (of) {
399 		ASSERT(of->f_magic == SMB_OFILE_MAGIC);
400 		ASSERT(of->f_tree == tree);
401 		if (of->f_opened_by_pid == pid) {
402 			of = smb_ofile_close_and_next(of);
403 		} else {
404 			of = smb_llist_next(&tree->t_ofile_list, of);
405 		}
406 	}
407 	smb_llist_exit(&tree->t_ofile_list);
408 }
409 
410 /*
411  * If the enumeration request is for ofile data, handle it here.
412  * Otherwise, return.
413  *
414  * This function should be called with a hold on the ofile.
415  */
416 int
417 smb_ofile_enum(smb_ofile_t *of, smb_svcenum_t *svcenum)
418 {
419 	uint8_t *pb;
420 	uint_t nbytes;
421 	int rc;
422 
423 	ASSERT(of);
424 	ASSERT(of->f_magic == SMB_OFILE_MAGIC);
425 	ASSERT(of->f_refcnt);
426 
427 	if (svcenum->se_type != SMB_SVCENUM_TYPE_FILE)
428 		return (0);
429 
430 	if (svcenum->se_nskip > 0) {
431 		svcenum->se_nskip--;
432 		return (0);
433 	}
434 
435 	if (svcenum->se_nitems >= svcenum->se_nlimit) {
436 		svcenum->se_nitems = svcenum->se_nlimit;
437 		return (0);
438 	}
439 
440 	pb = &svcenum->se_buf[svcenum->se_bused];
441 
442 	rc = smb_ofile_netinfo_encode(of, pb, svcenum->se_bavail,
443 	    &nbytes);
444 	if (rc == 0) {
445 		svcenum->se_bavail -= nbytes;
446 		svcenum->se_bused += nbytes;
447 		svcenum->se_nitems++;
448 	}
449 
450 	return (rc);
451 }
452 
453 /*
454  * Take a reference on an open file.
455  */
456 boolean_t
457 smb_ofile_hold(smb_ofile_t *of)
458 {
459 	ASSERT(of);
460 	ASSERT(of->f_magic == SMB_OFILE_MAGIC);
461 
462 	mutex_enter(&of->f_mutex);
463 
464 	if (smb_ofile_is_open_locked(of)) {
465 		of->f_refcnt++;
466 		mutex_exit(&of->f_mutex);
467 		return (B_TRUE);
468 	}
469 
470 	mutex_exit(&of->f_mutex);
471 	return (B_FALSE);
472 }
473 
474 /*
475  * Release a reference on a file.  If the reference count falls to
476  * zero and the file has been closed, post the object for deletion.
477  * Object deletion is deferred to avoid modifying a list while an
478  * iteration may be in progress.
479  */
480 void
481 smb_ofile_release(smb_ofile_t *of)
482 {
483 	SMB_OFILE_VALID(of);
484 
485 	mutex_enter(&of->f_mutex);
486 	ASSERT(of->f_refcnt);
487 	of->f_refcnt--;
488 	switch (of->f_state) {
489 	case SMB_OFILE_STATE_OPEN:
490 	case SMB_OFILE_STATE_CLOSING:
491 		break;
492 
493 	case SMB_OFILE_STATE_CLOSED:
494 		if (of->f_refcnt == 0)
495 			smb_tree_post_ofile(of->f_tree, of);
496 		break;
497 
498 	default:
499 		ASSERT(0);
500 		break;
501 	}
502 	mutex_exit(&of->f_mutex);
503 }
504 
505 /*
506  * smb_ofile_request_complete
507  *
508  * During oplock acquisition, all other oplock requests on the node
509  * are blocked until the acquire request completes and the response
510  * is on the wire.
511  * Call smb_oplock_broadcast to notify the node that the request
512  * has completed.
513  *
514  * THIS MECHANISM RELIES ON THE FACT THAT THE OFILE IS NOT REMOVED
515  * FROM THE SR UNTIL REQUEST COMPLETION (when the sr is destroyed)
516  */
517 void
518 smb_ofile_request_complete(smb_ofile_t *of)
519 {
520 	SMB_OFILE_VALID(of);
521 
522 	switch (of->f_ftype) {
523 	case SMB_FTYPE_DISK:
524 		ASSERT(of->f_node);
525 		smb_oplock_broadcast(of->f_node);
526 		break;
527 	case SMB_FTYPE_MESG_PIPE:
528 		break;
529 	default:
530 		break;
531 	}
532 }
533 
534 /*
535  * smb_ofile_lookup_by_fid
536  *
537  * Find the open file whose fid matches the one specified in the request.
538  * If we can't find the fid or the shares (trees) don't match, we have a
539  * bad fid.
540  */
541 smb_ofile_t *
542 smb_ofile_lookup_by_fid(
543     smb_tree_t		*tree,
544     uint16_t		fid)
545 {
546 	smb_llist_t	*of_list;
547 	smb_ofile_t	*of;
548 
549 	ASSERT(tree->t_magic == SMB_TREE_MAGIC);
550 
551 	of_list = &tree->t_ofile_list;
552 
553 	smb_llist_enter(of_list, RW_READER);
554 	of = smb_llist_head(of_list);
555 	while (of) {
556 		ASSERT(of->f_magic == SMB_OFILE_MAGIC);
557 		ASSERT(of->f_tree == tree);
558 		if (of->f_fid == fid) {
559 			mutex_enter(&of->f_mutex);
560 			if (of->f_state != SMB_OFILE_STATE_OPEN) {
561 				mutex_exit(&of->f_mutex);
562 				smb_llist_exit(of_list);
563 				return (NULL);
564 			}
565 			of->f_refcnt++;
566 			mutex_exit(&of->f_mutex);
567 			break;
568 		}
569 		of = smb_llist_next(of_list, of);
570 	}
571 	smb_llist_exit(of_list);
572 	return (of);
573 }
574 
575 /*
576  * smb_ofile_lookup_by_uniqid
577  *
578  * Find the open file whose uniqid matches the one specified in the request.
579  */
580 smb_ofile_t *
581 smb_ofile_lookup_by_uniqid(smb_tree_t *tree, uint32_t uniqid)
582 {
583 	smb_llist_t	*of_list;
584 	smb_ofile_t	*of;
585 
586 	ASSERT(tree->t_magic == SMB_TREE_MAGIC);
587 
588 	of_list = &tree->t_ofile_list;
589 	smb_llist_enter(of_list, RW_READER);
590 	of = smb_llist_head(of_list);
591 
592 	while (of) {
593 		ASSERT(of->f_magic == SMB_OFILE_MAGIC);
594 		ASSERT(of->f_tree == tree);
595 
596 		if (of->f_uniqid == uniqid) {
597 			if (smb_ofile_hold(of)) {
598 				smb_llist_exit(of_list);
599 				return (of);
600 			}
601 		}
602 
603 		of = smb_llist_next(of_list, of);
604 	}
605 
606 	smb_llist_exit(of_list);
607 	return (NULL);
608 }
609 
610 /*
611  * Disallow NetFileClose on certain ofiles to avoid side-effects.
612  * Closing a tree root is not allowed: use NetSessionDel or NetShareDel.
613  * Closing SRVSVC connections is not allowed because this NetFileClose
614  * request may depend on this ofile.
615  */
616 boolean_t
617 smb_ofile_disallow_fclose(smb_ofile_t *of)
618 {
619 	ASSERT(of);
620 	ASSERT(of->f_magic == SMB_OFILE_MAGIC);
621 	ASSERT(of->f_refcnt);
622 
623 	switch (of->f_ftype) {
624 	case SMB_FTYPE_DISK:
625 		ASSERT(of->f_tree);
626 		return (of->f_node == of->f_tree->t_snode);
627 
628 	case SMB_FTYPE_MESG_PIPE:
629 		ASSERT(of->f_pipe);
630 		if (smb_strcasecmp(of->f_pipe->p_name, "SRVSVC", 0) == 0)
631 			return (B_TRUE);
632 		break;
633 	default:
634 		break;
635 	}
636 
637 	return (B_FALSE);
638 }
639 
640 /*
641  * smb_ofile_set_flags
642  *
643  * Return value:
644  *
645  *	Current flags value
646  *
647  */
648 void
649 smb_ofile_set_flags(
650     smb_ofile_t		*of,
651     uint32_t		flags)
652 {
653 	ASSERT(of);
654 	ASSERT(of->f_magic == SMB_OFILE_MAGIC);
655 	ASSERT(of->f_refcnt);
656 
657 	mutex_enter(&of->f_mutex);
658 	of->f_flags |= flags;
659 	mutex_exit(&of->f_mutex);
660 }
661 
662 /*
663  * smb_ofile_seek
664  *
665  * Return value:
666  *
667  *	0		Success
668  *	EINVAL		Unknown mode
669  *	EOVERFLOW	offset too big
670  *
671  */
672 int
673 smb_ofile_seek(
674     smb_ofile_t		*of,
675     ushort_t		mode,
676     int32_t		off,
677     uint32_t		*retoff)
678 {
679 	u_offset_t	newoff = 0;
680 	int		rc = 0;
681 	smb_attr_t	attr;
682 
683 	ASSERT(of);
684 	ASSERT(of->f_magic == SMB_OFILE_MAGIC);
685 	ASSERT(of->f_refcnt);
686 
687 	mutex_enter(&of->f_mutex);
688 	switch (mode) {
689 	case SMB_SEEK_SET:
690 		if (off < 0)
691 			newoff = 0;
692 		else
693 			newoff = (u_offset_t)off;
694 		break;
695 
696 	case SMB_SEEK_CUR:
697 		if (off < 0 && (-off) > of->f_seek_pos)
698 			newoff = 0;
699 		else
700 			newoff = of->f_seek_pos + (u_offset_t)off;
701 		break;
702 
703 	case SMB_SEEK_END:
704 		bzero(&attr, sizeof (smb_attr_t));
705 		attr.sa_mask |= SMB_AT_SIZE;
706 		rc = smb_fsop_getattr(NULL, kcred, of->f_node, &attr);
707 		if (rc != 0) {
708 			mutex_exit(&of->f_mutex);
709 			return (rc);
710 		}
711 		if (off < 0 && (-off) > attr.sa_vattr.va_size)
712 			newoff = 0;
713 		else
714 			newoff = attr.sa_vattr.va_size + (u_offset_t)off;
715 		break;
716 
717 	default:
718 		mutex_exit(&of->f_mutex);
719 		return (EINVAL);
720 	}
721 
722 	/*
723 	 * See comments at the beginning of smb_seek.c.
724 	 * If the offset is greater than UINT_MAX, we will return an error.
725 	 */
726 
727 	if (newoff > UINT_MAX) {
728 		rc = EOVERFLOW;
729 	} else {
730 		of->f_seek_pos = newoff;
731 		*retoff = (uint32_t)newoff;
732 	}
733 	mutex_exit(&of->f_mutex);
734 	return (rc);
735 }
736 
737 /*
738  * smb_ofile_is_open
739  */
740 boolean_t
741 smb_ofile_is_open(smb_ofile_t *of)
742 {
743 	boolean_t	rc;
744 
745 	SMB_OFILE_VALID(of);
746 
747 	mutex_enter(&of->f_mutex);
748 	rc = smb_ofile_is_open_locked(of);
749 	mutex_exit(&of->f_mutex);
750 	return (rc);
751 }
752 
753 /*
754  * smb_ofile_pending_write_time
755  *
756  * Flag write times as pending - to be set on close, setattr
757  * or delayed write timer.
758  */
759 void
760 smb_ofile_set_write_time_pending(smb_ofile_t *of)
761 {
762 	SMB_OFILE_VALID(of);
763 	mutex_enter(&of->f_mutex);
764 	of->f_flags |= SMB_OFLAGS_TIMESTAMPS_PENDING;
765 	mutex_exit(&of->f_mutex);
766 }
767 
768 /*
769  * smb_ofile_write_time_pending
770  *
771  * Get and reset the write times pending flag.
772  */
773 boolean_t
774 smb_ofile_write_time_pending(smb_ofile_t *of)
775 {
776 	boolean_t rc = B_FALSE;
777 
778 	SMB_OFILE_VALID(of);
779 	mutex_enter(&of->f_mutex);
780 	if (of->f_flags & SMB_OFLAGS_TIMESTAMPS_PENDING) {
781 		rc = B_TRUE;
782 		of->f_flags &= ~SMB_OFLAGS_TIMESTAMPS_PENDING;
783 	}
784 	mutex_exit(&of->f_mutex);
785 
786 	return (rc);
787 }
788 
789 /*
790  * smb_ofile_set_explicit_time_flag
791  *
792  * Note the timestamps specified in "what", as having been
793  * explicity set for the ofile.
794  */
795 void
796 smb_ofile_set_explicit_times(smb_ofile_t *of, uint32_t what)
797 {
798 	SMB_OFILE_VALID(of);
799 	mutex_enter(&of->f_mutex);
800 	of->f_explicit_times |= (what & SMB_AT_TIMES);
801 	mutex_exit(&of->f_mutex);
802 }
803 
804 uint32_t
805 smb_ofile_explicit_times(smb_ofile_t *of)
806 {
807 	uint32_t rc;
808 
809 	SMB_OFILE_VALID(of);
810 	mutex_enter(&of->f_mutex);
811 	rc = of->f_explicit_times;
812 	mutex_exit(&of->f_mutex);
813 
814 	return (rc);
815 }
816 
817 /* *************************** Static Functions ***************************** */
818 
819 /*
820  * Determine whether or not an ofile is open.
821  * This function must be called with the mutex held.
822  */
823 static boolean_t
824 smb_ofile_is_open_locked(smb_ofile_t *of)
825 {
826 	switch (of->f_state) {
827 	case SMB_OFILE_STATE_OPEN:
828 		return (B_TRUE);
829 
830 	case SMB_OFILE_STATE_CLOSING:
831 	case SMB_OFILE_STATE_CLOSED:
832 		return (B_FALSE);
833 
834 	default:
835 		ASSERT(0);
836 		return (B_FALSE);
837 	}
838 }
839 
840 /*
841  * smb_ofile_set_close_attrs
842  *
843  * Updates timestamps, size and readonly bit.
844  * The last_wtime is specified in the request received
845  * from the client. If it is neither 0 nor -1, this time
846  * should be used as the file's mtime. It must first be
847  * converted from the server's localtime (as received in
848  * the client's request) to GMT.
849  *
850  * Call smb_node_setattr even if no attributes are being
851  * explicitly set, to set any pending attributes.
852  */
853 static void
854 smb_ofile_set_close_attrs(smb_ofile_t *of, uint32_t last_wtime)
855 {
856 	smb_node_t *node = of->f_node;
857 	smb_attr_t attr;
858 
859 	bzero(&attr, sizeof (smb_attr_t));
860 
861 	/* For files created readonly, propagate readonly bit */
862 	if (node->readonly_creator == of) {
863 		attr.sa_mask |= SMB_AT_DOSATTR;
864 		if (smb_fsop_getattr(NULL, kcred, node, &attr) &&
865 		    (attr.sa_dosattr & FILE_ATTRIBUTE_READONLY)) {
866 			attr.sa_mask = 0;
867 		} else {
868 			attr.sa_dosattr |= FILE_ATTRIBUTE_READONLY;
869 		}
870 
871 		node->readonly_creator = NULL;
872 	}
873 
874 	/* apply last_wtime if specified */
875 	if (last_wtime != 0 && last_wtime != 0xFFFFFFFF) {
876 		attr.sa_vattr.va_mtime.tv_sec =
877 		    last_wtime + of->f_server->si_gmtoff;
878 		attr.sa_mask |= SMB_AT_MTIME;
879 	}
880 
881 	(void) smb_node_setattr(NULL, node, of->f_cr, of, &attr);
882 }
883 
884 /*
885  * This function closes the file passed in (if appropriate) and returns the
886  * next open file in the list of open files of the tree of the open file passed
887  * in. It requires that the list of open files of the tree be entered in
888  * RW_READER mode before being called.
889  */
890 static smb_ofile_t *
891 smb_ofile_close_and_next(smb_ofile_t *of)
892 {
893 	smb_ofile_t	*next_of;
894 	smb_tree_t	*tree;
895 
896 	ASSERT(of);
897 	ASSERT(of->f_magic == SMB_OFILE_MAGIC);
898 
899 	mutex_enter(&of->f_mutex);
900 	switch (of->f_state) {
901 	case SMB_OFILE_STATE_OPEN:
902 		/* The file is still open. */
903 		of->f_refcnt++;
904 		ASSERT(of->f_refcnt);
905 		tree = of->f_tree;
906 		mutex_exit(&of->f_mutex);
907 		smb_llist_exit(&of->f_tree->t_ofile_list);
908 		smb_ofile_close(of, 0);
909 		smb_ofile_release(of);
910 		smb_llist_enter(&tree->t_ofile_list, RW_READER);
911 		next_of = smb_llist_head(&tree->t_ofile_list);
912 		break;
913 	case SMB_OFILE_STATE_CLOSING:
914 	case SMB_OFILE_STATE_CLOSED:
915 		/*
916 		 * The ofile exists but is closed or
917 		 * in the process being closed.
918 		 */
919 		mutex_exit(&of->f_mutex);
920 		next_of = smb_llist_next(&of->f_tree->t_ofile_list, of);
921 		break;
922 	default:
923 		ASSERT(0);
924 		mutex_exit(&of->f_mutex);
925 		next_of = smb_llist_next(&of->f_tree->t_ofile_list, of);
926 		break;
927 	}
928 	return (next_of);
929 }
930 
931 /*
932  * Delete an ofile.
933  *
934  * Remove the ofile from the tree list before freeing resources
935  * associated with the ofile.
936  */
937 void
938 smb_ofile_delete(void *arg)
939 {
940 	smb_tree_t	*tree;
941 	smb_ofile_t	*of = (smb_ofile_t *)arg;
942 
943 	SMB_OFILE_VALID(of);
944 	ASSERT(of->f_refcnt == 0);
945 	ASSERT(of->f_state == SMB_OFILE_STATE_CLOSED);
946 	ASSERT(!SMB_OFILE_OPLOCK_GRANTED(of));
947 
948 	tree = of->f_tree;
949 	smb_llist_enter(&tree->t_ofile_list, RW_WRITER);
950 	smb_llist_remove(&tree->t_ofile_list, of);
951 	smb_idpool_free(&tree->t_fid_pool, of->f_fid);
952 	atomic_dec_32(&tree->t_session->s_file_cnt);
953 	smb_llist_exit(&tree->t_ofile_list);
954 
955 	mutex_enter(&of->f_mutex);
956 	mutex_exit(&of->f_mutex);
957 
958 	if (of->f_ftype == SMB_FTYPE_MESG_PIPE) {
959 		smb_opipe_dealloc(of->f_pipe);
960 		of->f_pipe = NULL;
961 	} else {
962 		ASSERT(of->f_ftype == SMB_FTYPE_DISK);
963 		ASSERT(of->f_node != NULL);
964 		smb_node_rem_ofile(of->f_node, of);
965 		smb_node_release(of->f_node);
966 	}
967 
968 	of->f_magic = (uint32_t)~SMB_OFILE_MAGIC;
969 	mutex_destroy(&of->f_mutex);
970 	crfree(of->f_cr);
971 	kmem_cache_free(of->f_tree->t_server->si_cache_ofile, of);
972 }
973 
974 /*
975  * smb_ofile_access
976  *
977  * This function will check to see if the access requested is granted.
978  * Returns NT status codes.
979  */
980 uint32_t
981 smb_ofile_access(smb_ofile_t *of, cred_t *cr, uint32_t access)
982 {
983 
984 	if ((of == NULL) || (cr == kcred))
985 		return (NT_STATUS_SUCCESS);
986 
987 	/*
988 	 * If the request is for something
989 	 * I don't grant it is an error
990 	 */
991 	if (~(of->f_granted_access) & access) {
992 		if (!(of->f_granted_access & ACCESS_SYSTEM_SECURITY) &&
993 		    (access & ACCESS_SYSTEM_SECURITY)) {
994 			return (NT_STATUS_PRIVILEGE_NOT_HELD);
995 		}
996 		return (NT_STATUS_ACCESS_DENIED);
997 	}
998 
999 	return (NT_STATUS_SUCCESS);
1000 }
1001 
1002 /*
1003  * smb_ofile_share_check
1004  *
1005  * Check if ofile was opened with share access NONE (0).
1006  * Returns: B_TRUE  - share access non-zero
1007  *          B_FALSE - share access NONE
1008  */
1009 boolean_t
1010 smb_ofile_share_check(smb_ofile_t *of)
1011 {
1012 	return (!SMB_DENY_ALL(of->f_share_access));
1013 }
1014 
1015 /*
1016  * check file sharing rules for current open request
1017  * against existing open instances of the same file
1018  *
1019  * Returns NT_STATUS_SHARING_VIOLATION if there is any
1020  * sharing conflict, otherwise returns NT_STATUS_SUCCESS.
1021  */
1022 uint32_t
1023 smb_ofile_open_check(smb_ofile_t *of, uint32_t desired_access,
1024     uint32_t share_access)
1025 {
1026 	ASSERT(of->f_magic == SMB_OFILE_MAGIC);
1027 
1028 	mutex_enter(&of->f_mutex);
1029 
1030 	if (of->f_state != SMB_OFILE_STATE_OPEN) {
1031 		mutex_exit(&of->f_mutex);
1032 		return (NT_STATUS_INVALID_HANDLE);
1033 	}
1034 
1035 	/* if it's just meta data */
1036 	if ((of->f_granted_access & FILE_DATA_ALL) == 0) {
1037 		mutex_exit(&of->f_mutex);
1038 		return (NT_STATUS_SUCCESS);
1039 	}
1040 
1041 	/*
1042 	 * Check requested share access against the
1043 	 * open granted (desired) access
1044 	 */
1045 	if (SMB_DENY_DELETE(share_access) && (of->f_granted_access & DELETE)) {
1046 		mutex_exit(&of->f_mutex);
1047 		return (NT_STATUS_SHARING_VIOLATION);
1048 	}
1049 
1050 	if (SMB_DENY_READ(share_access) &&
1051 	    (of->f_granted_access & (FILE_READ_DATA | FILE_EXECUTE))) {
1052 		mutex_exit(&of->f_mutex);
1053 		return (NT_STATUS_SHARING_VIOLATION);
1054 	}
1055 
1056 	if (SMB_DENY_WRITE(share_access) &&
1057 	    (of->f_granted_access & (FILE_WRITE_DATA | FILE_APPEND_DATA))) {
1058 		mutex_exit(&of->f_mutex);
1059 		return (NT_STATUS_SHARING_VIOLATION);
1060 	}
1061 
1062 	/* check requested desired access against the open share access */
1063 	if (SMB_DENY_DELETE(of->f_share_access) && (desired_access & DELETE)) {
1064 		mutex_exit(&of->f_mutex);
1065 		return (NT_STATUS_SHARING_VIOLATION);
1066 	}
1067 
1068 	if (SMB_DENY_READ(of->f_share_access) &&
1069 	    (desired_access & (FILE_READ_DATA | FILE_EXECUTE))) {
1070 		mutex_exit(&of->f_mutex);
1071 		return (NT_STATUS_SHARING_VIOLATION);
1072 	}
1073 
1074 	if (SMB_DENY_WRITE(of->f_share_access) &&
1075 	    (desired_access & (FILE_WRITE_DATA | FILE_APPEND_DATA))) {
1076 		mutex_exit(&of->f_mutex);
1077 		return (NT_STATUS_SHARING_VIOLATION);
1078 	}
1079 
1080 	mutex_exit(&of->f_mutex);
1081 	return (NT_STATUS_SUCCESS);
1082 }
1083 
1084 /*
1085  * smb_ofile_rename_check
1086  *
1087  * An open file can be renamed if
1088  *
1089  *  1. isn't opened for data writing or deleting
1090  *
1091  *  2. Opened with "Deny Delete" share mode
1092  *         But not opened for data reading or executing
1093  *         (opened for accessing meta data)
1094  */
1095 
1096 uint32_t
1097 smb_ofile_rename_check(smb_ofile_t *of)
1098 {
1099 	ASSERT(of->f_magic == SMB_OFILE_MAGIC);
1100 
1101 	mutex_enter(&of->f_mutex);
1102 
1103 	if (of->f_state != SMB_OFILE_STATE_OPEN) {
1104 		mutex_exit(&of->f_mutex);
1105 		return (NT_STATUS_INVALID_HANDLE);
1106 	}
1107 
1108 	if (of->f_granted_access &
1109 	    (FILE_WRITE_DATA | FILE_APPEND_DATA | DELETE)) {
1110 		mutex_exit(&of->f_mutex);
1111 		return (NT_STATUS_SHARING_VIOLATION);
1112 	}
1113 
1114 	if ((of->f_share_access & FILE_SHARE_DELETE) == 0) {
1115 		if (of->f_granted_access &
1116 		    (FILE_READ_DATA | FILE_EXECUTE)) {
1117 			mutex_exit(&of->f_mutex);
1118 			return (NT_STATUS_SHARING_VIOLATION);
1119 		}
1120 	}
1121 
1122 	mutex_exit(&of->f_mutex);
1123 	return (NT_STATUS_SUCCESS);
1124 }
1125 
1126 /*
1127  * smb_ofile_delete_check
1128  *
1129  * An open file can be deleted only if opened for
1130  * accessing meta data. Share modes aren't important
1131  * in this case.
1132  *
1133  * NOTE: there is another mechanism for deleting an
1134  * open file that NT clients usually use.
1135  * That's setting "Delete on close" flag for an open
1136  * file.  In this way the file will be deleted after
1137  * last close. This flag can be set by SmbTrans2SetFileInfo
1138  * with FILE_DISPOSITION_INFO information level.
1139  * For setting this flag, the file should be opened by
1140  * DELETE access in the FID that is passed in the Trans2
1141  * request.
1142  */
1143 
1144 uint32_t
1145 smb_ofile_delete_check(smb_ofile_t *of)
1146 {
1147 	ASSERT(of->f_magic == SMB_OFILE_MAGIC);
1148 
1149 	mutex_enter(&of->f_mutex);
1150 
1151 	if (of->f_state != SMB_OFILE_STATE_OPEN) {
1152 		mutex_exit(&of->f_mutex);
1153 		return (NT_STATUS_INVALID_HANDLE);
1154 	}
1155 
1156 	if (of->f_granted_access &
1157 	    (FILE_READ_DATA | FILE_WRITE_DATA |
1158 	    FILE_APPEND_DATA | FILE_EXECUTE | DELETE)) {
1159 		mutex_exit(&of->f_mutex);
1160 		return (NT_STATUS_SHARING_VIOLATION);
1161 	}
1162 
1163 	mutex_exit(&of->f_mutex);
1164 	return (NT_STATUS_SUCCESS);
1165 }
1166 
1167 cred_t *
1168 smb_ofile_getcred(smb_ofile_t *of)
1169 {
1170 	return (of->f_cr);
1171 }
1172 
1173 /*
1174  * smb_ofile_set_delete_on_close
1175  *
1176  * Set the DeleteOnClose flag on the smb file. When the file is closed,
1177  * the flag will be transferred to the smb node, which will commit the
1178  * delete operation and inhibit subsequent open requests.
1179  *
1180  * When DeleteOnClose is set on an smb_node, the common open code will
1181  * reject subsequent open requests for the file. Observation of Windows
1182  * 2000 indicates that subsequent opens should be allowed (assuming
1183  * there would be no sharing violation) until the file is closed using
1184  * the fid on which the DeleteOnClose was requested.
1185  */
1186 void
1187 smb_ofile_set_delete_on_close(smb_ofile_t *of)
1188 {
1189 	mutex_enter(&of->f_mutex);
1190 	of->f_flags |= SMB_OFLAGS_SET_DELETE_ON_CLOSE;
1191 	mutex_exit(&of->f_mutex);
1192 }
1193 
1194 /*
1195  * Encode open file information into a buffer; needed in user space to
1196  * support RPC requests.
1197  */
1198 static int
1199 smb_ofile_netinfo_encode(smb_ofile_t *of, uint8_t *buf, size_t buflen,
1200     uint32_t *nbytes)
1201 {
1202 	smb_netfileinfo_t	fi;
1203 	int			rc;
1204 
1205 	rc = smb_ofile_netinfo_init(of, &fi);
1206 	if (rc == 0) {
1207 		rc = smb_netfileinfo_encode(&fi, buf, buflen, nbytes);
1208 		smb_ofile_netinfo_fini(&fi);
1209 	}
1210 
1211 	return (rc);
1212 }
1213 
1214 static int
1215 smb_ofile_netinfo_init(smb_ofile_t *of, smb_netfileinfo_t *fi)
1216 {
1217 	smb_user_t	*user;
1218 	smb_tree_t	*tree;
1219 	smb_node_t	*node;
1220 	char		*path;
1221 	char		*buf;
1222 	int		rc;
1223 
1224 	ASSERT(of);
1225 	user = of->f_user;
1226 	tree = of->f_tree;
1227 	ASSERT(user);
1228 	ASSERT(tree);
1229 
1230 	buf = kmem_zalloc(MAXPATHLEN, KM_SLEEP);
1231 
1232 	switch (of->f_ftype) {
1233 	case SMB_FTYPE_DISK:
1234 		node = of->f_node;
1235 		ASSERT(node);
1236 
1237 		fi->fi_permissions = of->f_granted_access;
1238 		fi->fi_numlocks = smb_lock_get_lock_count(node, of);
1239 
1240 		path = kmem_zalloc(MAXPATHLEN, KM_SLEEP);
1241 
1242 		if (node != tree->t_snode) {
1243 			rc = smb_node_getshrpath(node, tree, path, MAXPATHLEN);
1244 			if (rc != 0)
1245 				(void) strlcpy(path, node->od_name, MAXPATHLEN);
1246 		}
1247 
1248 		(void) snprintf(buf, MAXPATHLEN, "%s:%s", tree->t_sharename,
1249 		    path);
1250 		kmem_free(path, MAXPATHLEN);
1251 		break;
1252 
1253 	case SMB_FTYPE_MESG_PIPE:
1254 		ASSERT(of->f_pipe);
1255 
1256 		fi->fi_permissions = FILE_READ_DATA | FILE_WRITE_DATA |
1257 		    FILE_EXECUTE;
1258 		fi->fi_numlocks = 0;
1259 		(void) snprintf(buf, MAXPATHLEN, "\\PIPE\\%s",
1260 		    of->f_pipe->p_name);
1261 		break;
1262 
1263 	default:
1264 		kmem_free(buf, MAXPATHLEN);
1265 		return (-1);
1266 	}
1267 
1268 	fi->fi_fid = of->f_fid;
1269 	fi->fi_uniqid = of->f_uniqid;
1270 	fi->fi_pathlen = strlen(buf) + 1;
1271 	fi->fi_path = smb_mem_strdup(buf);
1272 	kmem_free(buf, MAXPATHLEN);
1273 
1274 	fi->fi_namelen = user->u_domain_len + user->u_name_len + 2;
1275 	fi->fi_username = kmem_alloc(fi->fi_namelen, KM_SLEEP);
1276 	(void) snprintf(fi->fi_username, fi->fi_namelen, "%s\\%s",
1277 	    user->u_domain, user->u_name);
1278 	return (0);
1279 }
1280 
1281 static void
1282 smb_ofile_netinfo_fini(smb_netfileinfo_t *fi)
1283 {
1284 	if (fi == NULL)
1285 		return;
1286 
1287 	if (fi->fi_path)
1288 		smb_mem_free(fi->fi_path);
1289 	if (fi->fi_username)
1290 		kmem_free(fi->fi_username, fi->fi_namelen);
1291 
1292 	bzero(fi, sizeof (smb_netfileinfo_t));
1293 }
1294 
1295 /*
1296  * A query of user and group quotas may span multiple requests.
1297  * f_quota_resume is used to determine where the query should
1298  * be resumed, in a subsequent request. f_quota_resume contains
1299  * the SID of the last quota entry returned to the client.
1300  */
1301 void
1302 smb_ofile_set_quota_resume(smb_ofile_t *ofile, char *resume)
1303 {
1304 	ASSERT(ofile);
1305 	mutex_enter(&ofile->f_mutex);
1306 	if (resume == NULL)
1307 		bzero(ofile->f_quota_resume, SMB_SID_STRSZ);
1308 	else
1309 		(void) strlcpy(ofile->f_quota_resume, resume, SMB_SID_STRSZ);
1310 	mutex_exit(&ofile->f_mutex);
1311 }
1312 
1313 void
1314 smb_ofile_get_quota_resume(smb_ofile_t *ofile, char *buf, int bufsize)
1315 {
1316 	ASSERT(ofile);
1317 	mutex_enter(&ofile->f_mutex);
1318 	(void) strlcpy(buf, ofile->f_quota_resume, bufsize);
1319 	mutex_exit(&ofile->f_mutex);
1320 }
1321