/* * Copyright (c) 2000-2001 Boris Popov * All rights reserved. * * Redistribution and use in source and binary forms, with or without * modification, are permitted provided that the following conditions * are met: * 1. Redistributions of source code must retain the above copyright * notice, this list of conditions and the following disclaimer. * 2. Redistributions in binary form must reproduce the above copyright * notice, this list of conditions and the following disclaimer in the * documentation and/or other materials provided with the distribution. * 3. All advertising materials mentioning features or use of this software * must display the following acknowledgement: * This product includes software developed by Boris Popov. * 4. Neither the name of the author nor the names of any co-contributors * may be used to endorse or promote products derived from this software * without specific prior written permission. * * THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF * SUCH DAMAGE. * * $Id: smbfs_vnops.c,v 1.128.36.1 2005/05/27 02:35:28 lindak Exp $ */ /* * Copyright (c) 2008, 2010, Oracle and/or its affiliates. All rights reserved. */ #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include /* * We assign directory offsets like the NFS client, where the * offset increments by _one_ after each directory entry. * Further, the entries "." and ".." are always at offsets * zero and one (respectively) and the "real" entries from * the server appear at offsets starting with two. This * macro is used to initialize the n_dirofs field after * setting n_dirseq with a _findopen call. */ #define FIRST_DIROFS 2 /* * These characters are illegal in NTFS file names. * ref: http://support.microsoft.com/kb/147438 * * Careful! The check in the XATTR case skips the * first character to allow colon in XATTR names. */ static const char illegal_chars[] = { ':', /* colon - keep this first! */ '\\', /* back slash */ '/', /* slash */ '*', /* asterisk */ '?', /* question mark */ '"', /* double quote */ '<', /* less than sign */ '>', /* greater than sign */ '|', /* vertical bar */ 0 }; /* * Turning this on causes nodes to be created in the cache * during directory listings, normally avoiding a second * OtW attribute fetch just after a readdir. */ int smbfs_fastlookup = 1; /* local static function defines */ static int smbfslookup_cache(vnode_t *, char *, int, vnode_t **, cred_t *); static int smbfslookup(vnode_t *dvp, char *nm, vnode_t **vpp, cred_t *cr, int cache_ok, caller_context_t *); static int smbfsrename(vnode_t *odvp, char *onm, vnode_t *ndvp, char *nnm, cred_t *cr, caller_context_t *); static int smbfssetattr(vnode_t *, struct vattr *, int, cred_t *); static int smbfs_accessx(void *, int, cred_t *); static int smbfs_readvdir(vnode_t *vp, uio_t *uio, cred_t *cr, int *eofp, caller_context_t *); static void smbfs_rele_fid(smbnode_t *, struct smb_cred *); static uint32_t xvattr_to_dosattr(smbnode_t *, struct vattr *); /* * These are the vnode ops routines which implement the vnode interface to * the networked file system. These routines just take their parameters, * make them look networkish by putting the right info into interface structs, * and then calling the appropriate remote routine(s) to do the work. * * Note on directory name lookup cacheing: If we detect a stale fhandle, * we purge the directory cache relative to that vnode. This way, the * user won't get burned by the cache repeatedly. See for * more details on smbnode locking. */ static int smbfs_open(vnode_t **, int, cred_t *, caller_context_t *); static int smbfs_close(vnode_t *, int, int, offset_t, cred_t *, caller_context_t *); static int smbfs_read(vnode_t *, struct uio *, int, cred_t *, caller_context_t *); static int smbfs_write(vnode_t *, struct uio *, int, cred_t *, caller_context_t *); static int smbfs_ioctl(vnode_t *, int, intptr_t, int, cred_t *, int *, caller_context_t *); static int smbfs_getattr(vnode_t *, struct vattr *, int, cred_t *, caller_context_t *); static int smbfs_setattr(vnode_t *, struct vattr *, int, cred_t *, caller_context_t *); static int smbfs_access(vnode_t *, int, int, cred_t *, caller_context_t *); static int smbfs_fsync(vnode_t *, int, cred_t *, caller_context_t *); static void smbfs_inactive(vnode_t *, cred_t *, caller_context_t *); static int smbfs_lookup(vnode_t *, char *, vnode_t **, struct pathname *, int, vnode_t *, cred_t *, caller_context_t *, int *, pathname_t *); static int smbfs_create(vnode_t *, char *, struct vattr *, enum vcexcl, int, vnode_t **, cred_t *, int, caller_context_t *, vsecattr_t *); static int smbfs_remove(vnode_t *, char *, cred_t *, caller_context_t *, int); static int smbfs_rename(vnode_t *, char *, vnode_t *, char *, cred_t *, caller_context_t *, int); static int smbfs_mkdir(vnode_t *, char *, struct vattr *, vnode_t **, cred_t *, caller_context_t *, int, vsecattr_t *); static int smbfs_rmdir(vnode_t *, char *, vnode_t *, cred_t *, caller_context_t *, int); static int smbfs_readdir(vnode_t *, struct uio *, cred_t *, int *, caller_context_t *, int); static int smbfs_rwlock(vnode_t *, int, caller_context_t *); static void smbfs_rwunlock(vnode_t *, int, caller_context_t *); static int smbfs_seek(vnode_t *, offset_t, offset_t *, caller_context_t *); static int smbfs_frlock(vnode_t *, int, struct flock64 *, int, offset_t, struct flk_callback *, cred_t *, caller_context_t *); static int smbfs_space(vnode_t *, int, struct flock64 *, int, offset_t, cred_t *, caller_context_t *); static int smbfs_pathconf(vnode_t *, int, ulong_t *, cred_t *, caller_context_t *); static int smbfs_setsecattr(vnode_t *, vsecattr_t *, int, cred_t *, caller_context_t *); static int smbfs_getsecattr(vnode_t *, vsecattr_t *, int, cred_t *, caller_context_t *); static int smbfs_shrlock(vnode_t *, int, struct shrlock *, int, cred_t *, caller_context_t *); /* Dummy function to use until correct function is ported in */ int noop_vnodeop() { return (0); } struct vnodeops *smbfs_vnodeops = NULL; /* * Most unimplemented ops will return ENOSYS because of fs_nosys(). * The only ops where that won't work are ACCESS (due to open(2) * failures) and ... (anything else left?) */ const fs_operation_def_t smbfs_vnodeops_template[] = { { VOPNAME_OPEN, { .vop_open = smbfs_open } }, { VOPNAME_CLOSE, { .vop_close = smbfs_close } }, { VOPNAME_READ, { .vop_read = smbfs_read } }, { VOPNAME_WRITE, { .vop_write = smbfs_write } }, { VOPNAME_IOCTL, { .vop_ioctl = smbfs_ioctl } }, { VOPNAME_GETATTR, { .vop_getattr = smbfs_getattr } }, { VOPNAME_SETATTR, { .vop_setattr = smbfs_setattr } }, { VOPNAME_ACCESS, { .vop_access = smbfs_access } }, { VOPNAME_LOOKUP, { .vop_lookup = smbfs_lookup } }, { VOPNAME_CREATE, { .vop_create = smbfs_create } }, { VOPNAME_REMOVE, { .vop_remove = smbfs_remove } }, { VOPNAME_LINK, { .error = fs_nosys } }, /* smbfs_link, */ { VOPNAME_RENAME, { .vop_rename = smbfs_rename } }, { VOPNAME_MKDIR, { .vop_mkdir = smbfs_mkdir } }, { VOPNAME_RMDIR, { .vop_rmdir = smbfs_rmdir } }, { VOPNAME_READDIR, { .vop_readdir = smbfs_readdir } }, { VOPNAME_SYMLINK, { .error = fs_nosys } }, /* smbfs_symlink, */ { VOPNAME_READLINK, { .error = fs_nosys } }, /* smbfs_readlink, */ { VOPNAME_FSYNC, { .vop_fsync = smbfs_fsync } }, { VOPNAME_INACTIVE, { .vop_inactive = smbfs_inactive } }, { VOPNAME_FID, { .error = fs_nosys } }, /* smbfs_fid, */ { VOPNAME_RWLOCK, { .vop_rwlock = smbfs_rwlock } }, { VOPNAME_RWUNLOCK, { .vop_rwunlock = smbfs_rwunlock } }, { VOPNAME_SEEK, { .vop_seek = smbfs_seek } }, { VOPNAME_FRLOCK, { .vop_frlock = smbfs_frlock } }, { VOPNAME_SPACE, { .vop_space = smbfs_space } }, { VOPNAME_REALVP, { .error = fs_nosys } }, /* smbfs_realvp, */ { VOPNAME_GETPAGE, { .error = fs_nosys } }, /* smbfs_getpage, */ { VOPNAME_PUTPAGE, { .error = fs_nosys } }, /* smbfs_putpage, */ { VOPNAME_MAP, { .error = fs_nosys } }, /* smbfs_map, */ { VOPNAME_ADDMAP, { .error = fs_nosys } }, /* smbfs_addmap, */ { VOPNAME_DELMAP, { .error = fs_nosys } }, /* smbfs_delmap, */ { VOPNAME_DUMP, { .error = fs_nosys } }, /* smbfs_dump, */ { VOPNAME_PATHCONF, { .vop_pathconf = smbfs_pathconf } }, { VOPNAME_PAGEIO, { .error = fs_nosys } }, /* smbfs_pageio, */ { VOPNAME_SETSECATTR, { .vop_setsecattr = smbfs_setsecattr } }, { VOPNAME_GETSECATTR, { .vop_getsecattr = smbfs_getsecattr } }, { VOPNAME_SHRLOCK, { .vop_shrlock = smbfs_shrlock } }, { NULL, NULL } }; /* * XXX * When new and relevant functionality is enabled, we should be * calling vfs_set_feature() to inform callers that pieces of * functionality are available, per PSARC 2007/227. */ /* ARGSUSED */ static int smbfs_open(vnode_t **vpp, int flag, cred_t *cr, caller_context_t *ct) { smbnode_t *np; vnode_t *vp; smbfattr_t fa; u_int32_t rights, rightsrcvd; u_int16_t fid, oldfid; int oldgenid; struct smb_cred scred; smbmntinfo_t *smi; smb_share_t *ssp; cred_t *oldcr; int tmperror; int error = 0; vp = *vpp; np = VTOSMB(vp); smi = VTOSMI(vp); ssp = smi->smi_share; if (curproc->p_zone != smi->smi_zone_ref.zref_zone) return (EIO); if (smi->smi_flags & SMI_DEAD || vp->v_vfsp->vfs_flag & VFS_UNMOUNTED) return (EIO); if (vp->v_type != VREG && vp->v_type != VDIR) { /* XXX VLNK? */ SMBVDEBUG("open eacces vtype=%d\n", vp->v_type); return (EACCES); } /* * Get exclusive access to n_fid and related stuff. * No returns after this until out. */ if (smbfs_rw_enter_sig(&np->r_lkserlock, RW_WRITER, SMBINTR(vp))) return (EINTR); smb_credinit(&scred, cr); /* * Keep track of the vnode type at first open. * It may change later, and we need close to do * cleanup for the type we opened. Also deny * open of new types until old type is closed. * XXX: Per-open instance nodes whould help. */ if (np->n_ovtype == VNON) { ASSERT(np->n_dirrefs == 0); ASSERT(np->n_fidrefs == 0); } else if (np->n_ovtype != vp->v_type) { SMBVDEBUG("open n_ovtype=%d v_type=%d\n", np->n_ovtype, vp->v_type); error = EACCES; goto out; } /* * Directory open. See smbfs_readvdir() */ if (vp->v_type == VDIR) { if (np->n_dirseq == NULL) { /* first open */ error = smbfs_smb_findopen(np, "*", 1, SMB_FA_SYSTEM | SMB_FA_HIDDEN | SMB_FA_DIR, &scred, &np->n_dirseq); if (error != 0) goto out; } np->n_dirofs = FIRST_DIROFS; np->n_dirrefs++; goto have_fid; } /* * If caller specified O_TRUNC/FTRUNC, then be sure to set * FWRITE (to drive successful setattr(size=0) after open) */ if (flag & FTRUNC) flag |= FWRITE; /* * If we already have it open, and the FID is still valid, * check whether the rights are sufficient for FID reuse. */ if (np->n_fidrefs > 0 && np->n_vcgenid == ssp->ss_vcgenid) { int upgrade = 0; if ((flag & FWRITE) && !(np->n_rights & SA_RIGHT_FILE_WRITE_DATA)) upgrade = 1; if ((flag & FREAD) && !(np->n_rights & SA_RIGHT_FILE_READ_DATA)) upgrade = 1; if (!upgrade) { /* * the existing open is good enough */ np->n_fidrefs++; goto have_fid; } } rights = np->n_fidrefs ? np->n_rights : 0; /* * we always ask for READ_CONTROL so we can always get the * owner/group IDs to satisfy a stat. Ditto attributes. */ rights |= (STD_RIGHT_READ_CONTROL_ACCESS | SA_RIGHT_FILE_READ_ATTRIBUTES); if ((flag & FREAD)) rights |= SA_RIGHT_FILE_READ_DATA; if ((flag & FWRITE)) rights |= SA_RIGHT_FILE_WRITE_DATA | SA_RIGHT_FILE_APPEND_DATA | SA_RIGHT_FILE_WRITE_ATTRIBUTES; bzero(&fa, sizeof (fa)); error = smbfs_smb_open(np, NULL, 0, 0, /* name nmlen xattr */ rights, &scred, &fid, &rightsrcvd, &fa); if (error) goto out; smbfs_attrcache_fa(vp, &fa); /* * We have a new FID and access rights. */ oldfid = np->n_fid; oldgenid = np->n_vcgenid; np->n_fid = fid; np->n_vcgenid = ssp->ss_vcgenid; np->n_rights = rightsrcvd; np->n_fidrefs++; if (np->n_fidrefs > 1 && oldgenid == ssp->ss_vcgenid) { /* * We already had it open (presumably because * it was open with insufficient rights.) * Close old wire-open. */ tmperror = smbfs_smb_close(ssp, oldfid, NULL, &scred); if (tmperror) SMBVDEBUG("error %d closing %s\n", tmperror, np->n_rpath); } /* * This thread did the open. * Save our credentials too. */ mutex_enter(&np->r_statelock); oldcr = np->r_cred; np->r_cred = cr; crhold(cr); if (oldcr) crfree(oldcr); mutex_exit(&np->r_statelock); have_fid: /* * Keep track of the vnode type at first open. * (see comments above) */ if (np->n_ovtype == VNON) np->n_ovtype = vp->v_type; out: smb_credrele(&scred); smbfs_rw_exit(&np->r_lkserlock); return (error); } /*ARGSUSED*/ static int smbfs_close(vnode_t *vp, int flag, int count, offset_t offset, cred_t *cr, caller_context_t *ct) { smbnode_t *np; smbmntinfo_t *smi; struct smb_cred scred; np = VTOSMB(vp); smi = VTOSMI(vp); /* * Don't "bail out" for VFS_UNMOUNTED here, * as we want to do cleanup, etc. */ /* * zone_enter(2) prevents processes from changing zones with SMBFS files * open; if we happen to get here from the wrong zone we can't do * anything over the wire. */ if (smi->smi_zone_ref.zref_zone != curproc->p_zone) { /* * We could attempt to clean up locks, except we're sure * that the current process didn't acquire any locks on * the file: any attempt to lock a file belong to another zone * will fail, and one can't lock an SMBFS file and then change * zones, as that fails too. * * Returning an error here is the sane thing to do. A * subsequent call to VN_RELE() which translates to a * smbfs_inactive() will clean up state: if the zone of the * vnode's origin is still alive and kicking, an async worker * thread will handle the request (from the correct zone), and * everything (minus the final smbfs_getattr_otw() call) should * be OK. If the zone is going away smbfs_async_inactive() will * throw away cached pages inline. */ return (EIO); } /* * If we are using local locking for this filesystem, then * release all of the SYSV style record locks. Otherwise, * we are doing network locking and we need to release all * of the network locks. All of the locks held by this * process on this file are released no matter what the * incoming reference count is. */ if (smi->smi_flags & SMI_LLOCK) { pid_t pid = ddi_get_pid(); cleanlocks(vp, pid, 0); cleanshares(vp, pid); } /* * This (passed in) count is the ref. count from the * user's file_t before the closef call (fio.c). * We only care when the reference goes away. */ if (count > 1) return (0); /* * Decrement the reference count for the FID * and possibly do the OtW close. * * Exclusive lock for modifying n_fid stuff. * Don't want this one ever interruptible. */ (void) smbfs_rw_enter_sig(&np->r_lkserlock, RW_WRITER, 0); smb_credinit(&scred, cr); smbfs_rele_fid(np, &scred); smb_credrele(&scred); smbfs_rw_exit(&np->r_lkserlock); return (0); } /* * Helper for smbfs_close. Decrement the reference count * for an SMB-level file or directory ID, and when the last * reference for the fid goes away, do the OtW close. * Also called in smbfs_inactive (defensive cleanup). */ static void smbfs_rele_fid(smbnode_t *np, struct smb_cred *scred) { smb_share_t *ssp; cred_t *oldcr; struct smbfs_fctx *fctx; int error; uint16_t ofid; ssp = np->n_mount->smi_share; error = 0; /* Make sure we serialize for n_dirseq use. */ ASSERT(smbfs_rw_lock_held(&np->r_lkserlock, RW_WRITER)); /* * Note that vp->v_type may change if a remote node * is deleted and recreated as a different type, and * our getattr may change v_type accordingly. * Now use n_ovtype to keep track of the v_type * we had during open (see comments above). */ switch (np->n_ovtype) { case VDIR: ASSERT(np->n_dirrefs > 0); if (--np->n_dirrefs) return; if ((fctx = np->n_dirseq) != NULL) { np->n_dirseq = NULL; np->n_dirofs = 0; error = smbfs_smb_findclose(fctx, scred); } break; case VREG: ASSERT(np->n_fidrefs > 0); if (--np->n_fidrefs) return; if ((ofid = np->n_fid) != SMB_FID_UNUSED) { np->n_fid = SMB_FID_UNUSED; /* After reconnect, n_fid is invalid */ if (np->n_vcgenid == ssp->ss_vcgenid) { error = smbfs_smb_close( ssp, ofid, NULL, scred); } } break; default: SMBVDEBUG("bad n_ovtype %d\n", np->n_ovtype); break; } if (error) { SMBVDEBUG("error %d closing %s\n", error, np->n_rpath); } /* Allow next open to use any v_type. */ np->n_ovtype = VNON; /* * Other "last close" stuff. */ mutex_enter(&np->r_statelock); if (np->n_flag & NATTRCHANGED) smbfs_attrcache_rm_locked(np); oldcr = np->r_cred; np->r_cred = NULL; mutex_exit(&np->r_statelock); if (oldcr != NULL) crfree(oldcr); } /* ARGSUSED */ static int smbfs_read(vnode_t *vp, struct uio *uiop, int ioflag, cred_t *cr, caller_context_t *ct) { struct smb_cred scred; struct vattr va; smbnode_t *np; smbmntinfo_t *smi; smb_share_t *ssp; offset_t endoff; ssize_t past_eof; int error; np = VTOSMB(vp); smi = VTOSMI(vp); ssp = smi->smi_share; if (curproc->p_zone != smi->smi_zone_ref.zref_zone) return (EIO); if (smi->smi_flags & SMI_DEAD || vp->v_vfsp->vfs_flag & VFS_UNMOUNTED) return (EIO); ASSERT(smbfs_rw_lock_held(&np->r_rwlock, RW_READER)); if (vp->v_type != VREG) return (EISDIR); if (uiop->uio_resid == 0) return (0); /* * Like NFS3, just check for 63-bit overflow. * Our SMB layer takes care to return EFBIG * when it has to fallback to a 32-bit call. */ endoff = uiop->uio_loffset + uiop->uio_resid; if (uiop->uio_loffset < 0 || endoff < 0) return (EINVAL); /* get vnode attributes from server */ va.va_mask = AT_SIZE | AT_MTIME; if (error = smbfsgetattr(vp, &va, cr)) return (error); /* Update mtime with mtime from server here? */ /* if offset is beyond EOF, read nothing */ if (uiop->uio_loffset >= va.va_size) return (0); /* * Limit the read to the remaining file size. * Do this by temporarily reducing uio_resid * by the amount the lies beyoned the EOF. */ if (endoff > va.va_size) { past_eof = (ssize_t)(endoff - va.va_size); uiop->uio_resid -= past_eof; } else past_eof = 0; /* Shared lock for n_fid use in smb_rwuio */ if (smbfs_rw_enter_sig(&np->r_lkserlock, RW_READER, SMBINTR(vp))) return (EINTR); smb_credinit(&scred, cr); /* After reconnect, n_fid is invalid */ if (np->n_vcgenid != ssp->ss_vcgenid) error = ESTALE; else error = smb_rwuio(ssp, np->n_fid, UIO_READ, uiop, &scred, smb_timo_read); smb_credrele(&scred); smbfs_rw_exit(&np->r_lkserlock); /* undo adjustment of resid */ uiop->uio_resid += past_eof; return (error); } /* ARGSUSED */ static int smbfs_write(vnode_t *vp, struct uio *uiop, int ioflag, cred_t *cr, caller_context_t *ct) { struct smb_cred scred; struct vattr va; smbnode_t *np; smbmntinfo_t *smi; smb_share_t *ssp; offset_t endoff, limit; ssize_t past_limit; int error, timo; np = VTOSMB(vp); smi = VTOSMI(vp); ssp = smi->smi_share; if (curproc->p_zone != smi->smi_zone_ref.zref_zone) return (EIO); if (smi->smi_flags & SMI_DEAD || vp->v_vfsp->vfs_flag & VFS_UNMOUNTED) return (EIO); ASSERT(smbfs_rw_lock_held(&np->r_rwlock, RW_WRITER)); if (vp->v_type != VREG) return (EISDIR); if (uiop->uio_resid == 0) return (0); /* * Handle ioflag bits: (FAPPEND|FSYNC|FDSYNC) */ if (ioflag & (FAPPEND | FSYNC)) { if (np->n_flag & NMODIFIED) { smbfs_attrcache_remove(np); /* XXX: smbfs_vinvalbuf? */ } } if (ioflag & FAPPEND) { /* * File size can be changed by another client */ va.va_mask = AT_SIZE; if (error = smbfsgetattr(vp, &va, cr)) return (error); uiop->uio_loffset = va.va_size; } /* * Like NFS3, just check for 63-bit overflow. */ endoff = uiop->uio_loffset + uiop->uio_resid; if (uiop->uio_loffset < 0 || endoff < 0) return (EINVAL); /* * Check to make sure that the process will not exceed * its limit on file size. It is okay to write up to * the limit, but not beyond. Thus, the write which * reaches the limit will be short and the next write * will return an error. * * So if we're starting at or beyond the limit, EFBIG. * Otherwise, temporarily reduce resid to the amount * the falls after the limit. */ limit = uiop->uio_llimit; if (limit == RLIM64_INFINITY || limit > MAXOFFSET_T) limit = MAXOFFSET_T; if (uiop->uio_loffset >= limit) return (EFBIG); if (endoff > limit) { past_limit = (ssize_t)(endoff - limit); uiop->uio_resid -= past_limit; } else past_limit = 0; /* Timeout: longer for append. */ timo = smb_timo_write; if (endoff > np->r_size) timo = smb_timo_append; /* Shared lock for n_fid use in smb_rwuio */ if (smbfs_rw_enter_sig(&np->r_lkserlock, RW_READER, SMBINTR(vp))) return (EINTR); smb_credinit(&scred, cr); /* After reconnect, n_fid is invalid */ if (np->n_vcgenid != ssp->ss_vcgenid) error = ESTALE; else error = smb_rwuio(ssp, np->n_fid, UIO_WRITE, uiop, &scred, timo); if (error == 0) { mutex_enter(&np->r_statelock); np->n_flag |= (NFLUSHWIRE | NATTRCHANGED); if (uiop->uio_loffset > (offset_t)np->r_size) np->r_size = (len_t)uiop->uio_loffset; mutex_exit(&np->r_statelock); if (ioflag & (FSYNC|FDSYNC)) { /* Don't error the I/O if this fails. */ (void) smbfs_smb_flush(np, &scred); } } smb_credrele(&scred); smbfs_rw_exit(&np->r_lkserlock); /* undo adjustment of resid */ uiop->uio_resid += past_limit; return (error); } /* ARGSUSED */ static int smbfs_ioctl(vnode_t *vp, int cmd, intptr_t arg, int flag, cred_t *cr, int *rvalp, caller_context_t *ct) { int error; smbmntinfo_t *smi; smi = VTOSMI(vp); if (curproc->p_zone != smi->smi_zone_ref.zref_zone) return (EIO); if (smi->smi_flags & SMI_DEAD || vp->v_vfsp->vfs_flag & VFS_UNMOUNTED) return (EIO); switch (cmd) { /* First three from ZFS. XXX - need these? */ case _FIOFFS: error = smbfs_fsync(vp, 0, cr, ct); break; /* * The following two ioctls are used by bfu. * Silently ignore to avoid bfu errors. */ case _FIOGDIO: case _FIOSDIO: error = 0; break; #ifdef NOT_YET /* XXX - from the NFS code. */ case _FIODIRECTIO: error = smbfs_directio(vp, (int)arg, cr); #endif /* * Allow get/set with "raw" security descriptor (SD) data. * Useful for testing, diagnosing idmap problems, etc. */ case SMBFSIO_GETSD: error = smbfs_acl_iocget(vp, arg, flag, cr); break; case SMBFSIO_SETSD: error = smbfs_acl_iocset(vp, arg, flag, cr); break; default: error = ENOTTY; break; } return (error); } /* * Return either cached or remote attributes. If get remote attr * use them to check and invalidate caches, then cache the new attributes. */ /* ARGSUSED */ static int smbfs_getattr(vnode_t *vp, struct vattr *vap, int flags, cred_t *cr, caller_context_t *ct) { smbnode_t *np; smbmntinfo_t *smi; smi = VTOSMI(vp); if (curproc->p_zone != smi->smi_zone_ref.zref_zone) return (EIO); if (smi->smi_flags & SMI_DEAD || vp->v_vfsp->vfs_flag & VFS_UNMOUNTED) return (EIO); /* * If it has been specified that the return value will * just be used as a hint, and we are only being asked * for size, fsid or rdevid, then return the client's * notion of these values without checking to make sure * that the attribute cache is up to date. * The whole point is to avoid an over the wire GETATTR * call. */ np = VTOSMB(vp); if (flags & ATTR_HINT) { if (vap->va_mask == (vap->va_mask & (AT_SIZE | AT_FSID | AT_RDEV))) { mutex_enter(&np->r_statelock); if (vap->va_mask | AT_SIZE) vap->va_size = np->r_size; if (vap->va_mask | AT_FSID) vap->va_fsid = vp->v_vfsp->vfs_dev; if (vap->va_mask | AT_RDEV) vap->va_rdev = vp->v_rdev; mutex_exit(&np->r_statelock); return (0); } } return (smbfsgetattr(vp, vap, cr)); } /* smbfsgetattr() in smbfs_client.c */ /*ARGSUSED4*/ static int smbfs_setattr(vnode_t *vp, struct vattr *vap, int flags, cred_t *cr, caller_context_t *ct) { vfs_t *vfsp; smbmntinfo_t *smi; int error; uint_t mask; struct vattr oldva; vfsp = vp->v_vfsp; smi = VFTOSMI(vfsp); if (curproc->p_zone != smi->smi_zone_ref.zref_zone) return (EIO); if (smi->smi_flags & SMI_DEAD || vfsp->vfs_flag & VFS_UNMOUNTED) return (EIO); mask = vap->va_mask; if (mask & AT_NOSET) return (EINVAL); if (vfsp->vfs_flag & VFS_RDONLY) return (EROFS); /* * This is a _local_ access check so that only the owner of * this mount can set attributes. With ACLs enabled, the * file owner can be different from the mount owner, and we * need to check the _mount_ owner here. See _access_rwx */ bzero(&oldva, sizeof (oldva)); oldva.va_mask = AT_TYPE | AT_MODE; error = smbfsgetattr(vp, &oldva, cr); if (error) return (error); oldva.va_mask |= AT_UID | AT_GID; oldva.va_uid = smi->smi_uid; oldva.va_gid = smi->smi_gid; error = secpolicy_vnode_setattr(cr, vp, vap, &oldva, flags, smbfs_accessx, vp); if (error) return (error); if (mask & (AT_UID | AT_GID)) { if (smi->smi_flags & SMI_ACL) error = smbfs_acl_setids(vp, vap, cr); else error = ENOSYS; if (error != 0) { SMBVDEBUG("error %d seting UID/GID on %s", error, VTOSMB(vp)->n_rpath); /* * It might be more correct to return the * error here, but that causes complaints * when root extracts a cpio archive, etc. * So ignore this error, and go ahead with * the rest of the setattr work. */ } } return (smbfssetattr(vp, vap, flags, cr)); } /* * Mostly from Darwin smbfs_setattr() * but then modified a lot. */ /* ARGSUSED */ static int smbfssetattr(vnode_t *vp, struct vattr *vap, int flags, cred_t *cr) { int error = 0; smbnode_t *np = VTOSMB(vp); uint_t mask = vap->va_mask; struct timespec *mtime, *atime; struct smb_cred scred; int cerror, modified = 0; unsigned short fid; int have_fid = 0; uint32_t rights = 0; uint32_t dosattr = 0; ASSERT(curproc->p_zone == VTOSMI(vp)->smi_zone_ref.zref_zone); /* * There are no settable attributes on the XATTR dir, * so just silently ignore these. On XATTR files, * you can set the size but nothing else. */ if (vp->v_flag & V_XATTRDIR) return (0); if (np->n_flag & N_XATTR) { if (mask & AT_TIMES) SMBVDEBUG("ignore set time on xattr\n"); mask &= AT_SIZE; } /* * If our caller is trying to set multiple attributes, they * can make no assumption about what order they are done in. * Here we try to do them in order of decreasing likelihood * of failure, just to minimize the chance we'll wind up * with a partially complete request. */ /* Shared lock for (possible) n_fid use. */ if (smbfs_rw_enter_sig(&np->r_lkserlock, RW_READER, SMBINTR(vp))) return (EINTR); smb_credinit(&scred, cr); /* * If the caller has provided extensible attributes, * map those into DOS attributes supported by SMB. * Note: zero means "no change". */ if (mask & AT_XVATTR) dosattr = xvattr_to_dosattr(np, vap); /* * Will we need an open handle for this setattr? * If so, what rights will we need? */ if (dosattr || (mask & (AT_ATIME | AT_MTIME))) { rights |= SA_RIGHT_FILE_WRITE_ATTRIBUTES; } if (mask & AT_SIZE) { rights |= SA_RIGHT_FILE_WRITE_DATA | SA_RIGHT_FILE_APPEND_DATA; } /* * Only SIZE really requires a handle, but it's * simpler and more reliable to set via a handle. * Some servers like NT4 won't set times by path. * Also, we're usually setting everything anyway. */ if (rights != 0) { error = smbfs_smb_tmpopen(np, rights, &scred, &fid); if (error) { SMBVDEBUG("error %d opening %s\n", error, np->n_rpath); goto out; } have_fid = 1; } /* * If the server supports the UNIX extensions, right here is where * we'd support changes to uid, gid, mode, and possibly va_flags. * For now we claim to have made any such changes. */ if (mask & AT_SIZE) { /* * If the new file size is less than what the client sees as * the file size, then just change the size and invalidate * the pages. * I am commenting this code at present because the function * smbfs_putapage() is not yet implemented. */ /* * Set the file size to vap->va_size. */ ASSERT(have_fid); error = smbfs_smb_setfsize(np, fid, vap->va_size, &scred); if (error) { SMBVDEBUG("setsize error %d file %s\n", error, np->n_rpath); } else { /* * Darwin had code here to zero-extend. * Tests indicate the server will zero-fill, * so looks like we don't need to do this. * Good thing, as this could take forever. * * XXX: Reportedly, writing one byte of zero * at the end offset avoids problems here. */ mutex_enter(&np->r_statelock); np->r_size = vap->va_size; mutex_exit(&np->r_statelock); modified = 1; } } /* * XXX: When Solaris has create_time, set that too. * Note: create_time is different from ctime. */ mtime = ((mask & AT_MTIME) ? &vap->va_mtime : 0); atime = ((mask & AT_ATIME) ? &vap->va_atime : 0); if (dosattr || mtime || atime) { /* * Always use the handle-based set attr call now. */ ASSERT(have_fid); error = smbfs_smb_setfattr(np, fid, dosattr, mtime, atime, &scred); if (error) { SMBVDEBUG("set times error %d file %s\n", error, np->n_rpath); } else { modified = 1; } } out: if (modified) { /* * Invalidate attribute cache in case the server * doesn't set exactly the attributes we asked. */ smbfs_attrcache_remove(np); } if (have_fid) { cerror = smbfs_smb_tmpclose(np, fid, &scred); if (cerror) SMBVDEBUG("error %d closing %s\n", cerror, np->n_rpath); } smb_credrele(&scred); smbfs_rw_exit(&np->r_lkserlock); return (error); } /* * Helper function for extensible system attributes (PSARC 2007/315) * Compute the DOS attribute word to pass to _setfattr (see above). * This returns zero IFF no change is being made to attributes. * Otherwise return the new attributes or SMB_EFA_NORMAL. */ static uint32_t xvattr_to_dosattr(smbnode_t *np, struct vattr *vap) { xvattr_t *xvap = (xvattr_t *)vap; xoptattr_t *xoap = NULL; uint32_t attr = np->r_attr.fa_attr; boolean_t anyset = B_FALSE; if ((xoap = xva_getxoptattr(xvap)) == NULL) return (0); if (XVA_ISSET_REQ(xvap, XAT_ARCHIVE)) { if (xoap->xoa_archive) attr |= SMB_FA_ARCHIVE; else attr &= ~SMB_FA_ARCHIVE; XVA_SET_RTN(xvap, XAT_ARCHIVE); anyset = B_TRUE; } if (XVA_ISSET_REQ(xvap, XAT_SYSTEM)) { if (xoap->xoa_system) attr |= SMB_FA_SYSTEM; else attr &= ~SMB_FA_SYSTEM; XVA_SET_RTN(xvap, XAT_SYSTEM); anyset = B_TRUE; } if (XVA_ISSET_REQ(xvap, XAT_READONLY)) { if (xoap->xoa_readonly) attr |= SMB_FA_RDONLY; else attr &= ~SMB_FA_RDONLY; XVA_SET_RTN(xvap, XAT_READONLY); anyset = B_TRUE; } if (XVA_ISSET_REQ(xvap, XAT_HIDDEN)) { if (xoap->xoa_hidden) attr |= SMB_FA_HIDDEN; else attr &= ~SMB_FA_HIDDEN; XVA_SET_RTN(xvap, XAT_HIDDEN); anyset = B_TRUE; } if (anyset == B_FALSE) return (0); /* no change */ if (attr == 0) attr = SMB_EFA_NORMAL; return (attr); } /* * smbfs_access_rwx() * Common function for smbfs_access, etc. * * The security model implemented by the FS is unusual * due to the current "single user mounts" restriction: * All access under a given mount point uses the CIFS * credentials established by the owner of the mount. * * Most access checking is handled by the CIFS server, * but we need sufficient Unix access checks here to * prevent other local Unix users from having access * to objects under this mount that the uid/gid/mode * settings in the mount would not allow. * * With this model, there is a case where we need the * ability to do an access check before we have the * vnode for an object. This function takes advantage * of the fact that the uid/gid/mode is per mount, and * avoids the need for a vnode. * * We still (sort of) need a vnode when we call * secpolicy_vnode_access, but that only uses * the vtype field, so we can use a pair of fake * vnodes that have only v_type filled in. * * XXX: Later, add a new secpolicy_vtype_access() * that takes the vtype instead of a vnode, and * get rid of the tmpl_vxxx fake vnodes below. */ static int smbfs_access_rwx(vfs_t *vfsp, int vtype, int mode, cred_t *cr) { /* See the secpolicy call below. */ static const vnode_t tmpl_vdir = { .v_type = VDIR }; static const vnode_t tmpl_vreg = { .v_type = VREG }; vattr_t va; vnode_t *tvp; struct smbmntinfo *smi = VFTOSMI(vfsp); int shift = 0; /* * Build our (fabricated) vnode attributes. * XXX: Could make these templates in the * per-mount struct and use them here. */ bzero(&va, sizeof (va)); va.va_mask = AT_TYPE | AT_MODE | AT_UID | AT_GID; va.va_type = vtype; va.va_mode = (vtype == VDIR) ? smi->smi_dmode : smi->smi_fmode; va.va_uid = smi->smi_uid; va.va_gid = smi->smi_gid; /* * Disallow write attempts on read-only file systems, * unless the file is a device or fifo node. Note: * Inline vn_is_readonly and IS_DEVVP here because * we may not have a vnode ptr. Original expr. was: * (mode & VWRITE) && vn_is_readonly(vp) && !IS_DEVVP(vp)) */ if ((mode & VWRITE) && (vfsp->vfs_flag & VFS_RDONLY) && !(vtype == VCHR || vtype == VBLK || vtype == VFIFO)) return (EROFS); /* * Disallow attempts to access mandatory lock files. * Similarly, expand MANDLOCK here. * XXX: not sure we need this. */ if ((mode & (VWRITE | VREAD | VEXEC)) && va.va_type == VREG && MANDMODE(va.va_mode)) return (EACCES); /* * Access check is based on only * one of owner, group, public. * If not owner, then check group. * If not a member of the group, * then check public access. */ if (crgetuid(cr) != va.va_uid) { shift += 3; if (!groupmember(va.va_gid, cr)) shift += 3; } /* * We need a vnode for secpolicy_vnode_access, * but the only thing it looks at is v_type, * so pass one of the templates above. */ tvp = (va.va_type == VDIR) ? (vnode_t *)&tmpl_vdir : (vnode_t *)&tmpl_vreg; return (secpolicy_vnode_access2(cr, tvp, va.va_uid, va.va_mode << shift, mode)); } /* * See smbfs_setattr */ static int smbfs_accessx(void *arg, int mode, cred_t *cr) { vnode_t *vp = arg; /* * Note: The caller has checked the current zone, * the SMI_DEAD and VFS_UNMOUNTED flags, etc. */ return (smbfs_access_rwx(vp->v_vfsp, vp->v_type, mode, cr)); } /* * XXX * This op should support PSARC 2007/403, Modified Access Checks for CIFS */ /* ARGSUSED */ static int smbfs_access(vnode_t *vp, int mode, int flags, cred_t *cr, caller_context_t *ct) { vfs_t *vfsp; smbmntinfo_t *smi; vfsp = vp->v_vfsp; smi = VFTOSMI(vfsp); if (curproc->p_zone != smi->smi_zone_ref.zref_zone) return (EIO); if (smi->smi_flags & SMI_DEAD || vfsp->vfs_flag & VFS_UNMOUNTED) return (EIO); return (smbfs_access_rwx(vfsp, vp->v_type, mode, cr)); } /* * Flush local dirty pages to stable storage on the server. * * If FNODSYNC is specified, then there is nothing to do because * metadata changes are not cached on the client before being * sent to the server. */ /* ARGSUSED */ static int smbfs_fsync(vnode_t *vp, int syncflag, cred_t *cr, caller_context_t *ct) { int error = 0; smbmntinfo_t *smi; smbnode_t *np; struct smb_cred scred; np = VTOSMB(vp); smi = VTOSMI(vp); if (curproc->p_zone != smi->smi_zone_ref.zref_zone) return (EIO); if (smi->smi_flags & SMI_DEAD || vp->v_vfsp->vfs_flag & VFS_UNMOUNTED) return (EIO); if ((syncflag & FNODSYNC) || IS_SWAPVP(vp)) return (0); if ((syncflag & (FSYNC|FDSYNC)) == 0) return (0); /* Shared lock for n_fid use in _flush */ if (smbfs_rw_enter_sig(&np->r_lkserlock, RW_READER, SMBINTR(vp))) return (EINTR); smb_credinit(&scred, cr); error = smbfs_smb_flush(np, &scred); smb_credrele(&scred); smbfs_rw_exit(&np->r_lkserlock); return (error); } /* * Last reference to vnode went away. */ /* ARGSUSED */ static void smbfs_inactive(vnode_t *vp, cred_t *cr, caller_context_t *ct) { smbnode_t *np; struct smb_cred scred; /* * Don't "bail out" for VFS_UNMOUNTED here, * as we want to do cleanup, etc. * See also pcfs_inactive */ np = VTOSMB(vp); /* * If this is coming from the wrong zone, we let someone in the right * zone take care of it asynchronously. We can get here due to * VN_RELE() being called from pageout() or fsflush(). This call may * potentially turn into an expensive no-op if, for instance, v_count * gets incremented in the meantime, but it's still correct. */ /* * Defend against the possibility that higher-level callers * might not correctly balance open and close calls. If we * get here with open references remaining, it means there * was a missing VOP_CLOSE somewhere. If that happens, do * the close here so we don't "leak" FIDs on the server. * * Exclusive lock for modifying n_fid stuff. * Don't want this one ever interruptible. */ (void) smbfs_rw_enter_sig(&np->r_lkserlock, RW_WRITER, 0); smb_credinit(&scred, cr); switch (np->n_ovtype) { case VNON: /* not open (OK) */ break; case VDIR: if (np->n_dirrefs == 0) break; SMBVDEBUG("open dir: refs %d path %s\n", np->n_dirrefs, np->n_rpath); /* Force last close. */ np->n_dirrefs = 1; smbfs_rele_fid(np, &scred); break; case VREG: if (np->n_fidrefs == 0) break; SMBVDEBUG("open file: refs %d id 0x%x path %s\n", np->n_fidrefs, np->n_fid, np->n_rpath); /* Force last close. */ np->n_fidrefs = 1; smbfs_rele_fid(np, &scred); break; default: SMBVDEBUG("bad n_ovtype %d\n", np->n_ovtype); np->n_ovtype = VNON; break; } smb_credrele(&scred); smbfs_rw_exit(&np->r_lkserlock); smbfs_addfree(np); } /* * Remote file system operations having to do with directory manipulation. */ /* ARGSUSED */ static int smbfs_lookup(vnode_t *dvp, char *nm, vnode_t **vpp, struct pathname *pnp, int flags, vnode_t *rdir, cred_t *cr, caller_context_t *ct, int *direntflags, pathname_t *realpnp) { vfs_t *vfs; smbmntinfo_t *smi; smbnode_t *dnp; int error; vfs = dvp->v_vfsp; smi = VFTOSMI(vfs); if (curproc->p_zone != smi->smi_zone_ref.zref_zone) return (EPERM); if (smi->smi_flags & SMI_DEAD || vfs->vfs_flag & VFS_UNMOUNTED) return (EIO); dnp = VTOSMB(dvp); /* * Are we looking up extended attributes? If so, "dvp" is * the file or directory for which we want attributes, and * we need a lookup of the (faked up) attribute directory * before we lookup the rest of the path. */ if (flags & LOOKUP_XATTR) { /* * Require the xattr mount option. */ if ((vfs->vfs_flag & VFS_XATTR) == 0) return (EINVAL); error = smbfs_get_xattrdir(dvp, vpp, cr, flags); return (error); } if (smbfs_rw_enter_sig(&dnp->r_rwlock, RW_READER, SMBINTR(dvp))) return (EINTR); error = smbfslookup(dvp, nm, vpp, cr, 1, ct); smbfs_rw_exit(&dnp->r_rwlock); return (error); } /* ARGSUSED */ static int smbfslookup(vnode_t *dvp, char *nm, vnode_t **vpp, cred_t *cr, int cache_ok, caller_context_t *ct) { int error; int supplen; /* supported length */ vnode_t *vp; smbnode_t *np; smbnode_t *dnp; smbmntinfo_t *smi; /* struct smb_vc *vcp; */ const char *ill; const char *name = (const char *)nm; int nmlen = strlen(nm); int rplen; struct smb_cred scred; struct smbfattr fa; smi = VTOSMI(dvp); dnp = VTOSMB(dvp); ASSERT(curproc->p_zone == smi->smi_zone_ref.zref_zone); #ifdef NOT_YET vcp = SSTOVC(smi->smi_share); /* XXX: Should compute this once and store it in smbmntinfo_t */ supplen = (SMB_DIALECT(vcp) >= SMB_DIALECT_LANMAN2_0) ? 255 : 12; #else supplen = 255; #endif /* * RWlock must be held, either reader or writer. * XXX: Can we check without looking directly * inside the struct smbfs_rwlock_t? */ ASSERT(dnp->r_rwlock.count != 0); /* * If lookup is for "", just return dvp. * No need to perform any access checks. */ if (nmlen == 0) { VN_HOLD(dvp); *vpp = dvp; return (0); } /* * Can't do lookups in non-directories. */ if (dvp->v_type != VDIR) return (ENOTDIR); /* * Need search permission in the directory. */ error = smbfs_access(dvp, VEXEC, 0, cr, ct); if (error) return (error); /* * If lookup is for ".", just return dvp. * Access check was done above. */ if (nmlen == 1 && name[0] == '.') { VN_HOLD(dvp); *vpp = dvp; return (0); } /* * Now some sanity checks on the name. * First check the length. */ if (nmlen > supplen) return (ENAMETOOLONG); /* * Avoid surprises with characters that are * illegal in Windows file names. * Todo: CATIA mappings XXX */ ill = illegal_chars; if (dnp->n_flag & N_XATTR) ill++; /* allow colon */ if (strpbrk(nm, ill)) return (EINVAL); /* * Special handling for lookup of ".." * * We keep full pathnames (as seen on the server) * so we can just trim off the last component to * get the full pathname of the parent. Note: * We don't actually copy and modify, but just * compute the trimmed length and pass that with * the current dir path (not null terminated). * * We don't go over-the-wire to get attributes * for ".." because we know it's a directory, * and we can just leave the rest "stale" * until someone does a getattr. */ if (nmlen == 2 && name[0] == '.' && name[1] == '.') { if (dvp->v_flag & VROOT) { /* * Already at the root. This can happen * with directory listings at the root, * which lookup "." and ".." to get the * inode numbers. Let ".." be the same * as "." in the FS root. */ VN_HOLD(dvp); *vpp = dvp; return (0); } /* * Special case for XATTR directory */ if (dvp->v_flag & V_XATTRDIR) { error = smbfs_xa_parent(dvp, vpp); return (error); } /* * Find the parent path length. */ rplen = dnp->n_rplen; ASSERT(rplen > 0); while (--rplen >= 0) { if (dnp->n_rpath[rplen] == '\\') break; } if (rplen <= 0) { /* Found our way to the root. */ vp = SMBTOV(smi->smi_root); VN_HOLD(vp); *vpp = vp; return (0); } np = smbfs_node_findcreate(smi, dnp->n_rpath, rplen, NULL, 0, 0, &smbfs_fattr0); /* force create */ ASSERT(np != NULL); vp = SMBTOV(np); vp->v_type = VDIR; /* Success! */ *vpp = vp; return (0); } /* * Normal lookup of a name under this directory. * Note we handled "", ".", ".." above. */ if (cache_ok) { /* * The caller indicated that it's OK to use a * cached result for this lookup, so try to * reclaim a node from the smbfs node cache. */ error = smbfslookup_cache(dvp, nm, nmlen, &vp, cr); if (error) return (error); if (vp != NULL) { /* hold taken in lookup_cache */ *vpp = vp; return (0); } } /* * OK, go over-the-wire to get the attributes, * then create the node. */ smb_credinit(&scred, cr); /* Note: this can allocate a new "name" */ error = smbfs_smb_lookup(dnp, &name, &nmlen, &fa, &scred); smb_credrele(&scred); if (error == ENOTDIR) { /* * Lookup failed because this directory was * removed or renamed by another client. * Remove any cached attributes under it. */ smbfs_attrcache_remove(dnp); smbfs_attrcache_prune(dnp); } if (error) goto out; error = smbfs_nget(dvp, name, nmlen, &fa, &vp); if (error) goto out; /* Success! */ *vpp = vp; out: /* smbfs_smb_lookup may have allocated name. */ if (name != nm) smbfs_name_free(name, nmlen); return (error); } /* * smbfslookup_cache * * Try to reclaim a node from the smbfs node cache. * Some statistics for DEBUG. * * This mechanism lets us avoid many of the five (or more) * OtW lookup calls per file seen with "ls -l" if we search * the smbfs node cache for recently inactive(ated) nodes. */ #ifdef DEBUG int smbfs_lookup_cache_calls = 0; int smbfs_lookup_cache_error = 0; int smbfs_lookup_cache_miss = 0; int smbfs_lookup_cache_stale = 0; int smbfs_lookup_cache_hits = 0; #endif /* DEBUG */ /* ARGSUSED */ static int smbfslookup_cache(vnode_t *dvp, char *nm, int nmlen, vnode_t **vpp, cred_t *cr) { struct vattr va; smbnode_t *dnp; smbnode_t *np; vnode_t *vp; int error; char sep; dnp = VTOSMB(dvp); *vpp = NULL; #ifdef DEBUG smbfs_lookup_cache_calls++; #endif /* * First make sure we can get attributes for the * directory. Cached attributes are OK here. * If we removed or renamed the directory, this * will return ENOENT. If someone else removed * this directory or file, we'll find out when we * try to open or get attributes. */ va.va_mask = AT_TYPE | AT_MODE; error = smbfsgetattr(dvp, &va, cr); if (error) { #ifdef DEBUG smbfs_lookup_cache_error++; #endif return (error); } /* * Passing NULL smbfattr here so we will * just look, not create. */ sep = SMBFS_DNP_SEP(dnp); np = smbfs_node_findcreate(dnp->n_mount, dnp->n_rpath, dnp->n_rplen, nm, nmlen, sep, NULL); if (np == NULL) { #ifdef DEBUG smbfs_lookup_cache_miss++; #endif return (0); } /* * Found it. Attributes still valid? */ vp = SMBTOV(np); if (np->r_attrtime <= gethrtime()) { /* stale */ #ifdef DEBUG smbfs_lookup_cache_stale++; #endif VN_RELE(vp); return (0); } /* * Success! * Caller gets hold from smbfs_node_findcreate */ #ifdef DEBUG smbfs_lookup_cache_hits++; #endif *vpp = vp; return (0); } /* * XXX * vsecattr_t is new to build 77, and we need to eventually support * it in order to create an ACL when an object is created. * * This op should support the new FIGNORECASE flag for case-insensitive * lookups, per PSARC 2007/244. */ /* ARGSUSED */ static int smbfs_create(vnode_t *dvp, char *nm, struct vattr *va, enum vcexcl exclusive, int mode, vnode_t **vpp, cred_t *cr, int lfaware, caller_context_t *ct, vsecattr_t *vsecp) { int error; int cerror; vfs_t *vfsp; vnode_t *vp; #ifdef NOT_YET smbnode_t *np; #endif smbnode_t *dnp; smbmntinfo_t *smi; struct vattr vattr; struct smbfattr fattr; struct smb_cred scred; const char *name = (const char *)nm; int nmlen = strlen(nm); uint32_t disp; uint16_t fid; int xattr; vfsp = dvp->v_vfsp; smi = VFTOSMI(vfsp); dnp = VTOSMB(dvp); vp = NULL; if (curproc->p_zone != smi->smi_zone_ref.zref_zone) return (EPERM); if (smi->smi_flags & SMI_DEAD || vfsp->vfs_flag & VFS_UNMOUNTED) return (EIO); /* * Note: this may break mknod(2) calls to create a directory, * but that's obscure use. Some other filesystems do this. * XXX: Later, redirect VDIR type here to _mkdir. */ if (va->va_type != VREG) return (EINVAL); /* * If the pathname is "", just use dvp, no checks. * Do this outside of the rwlock (like zfs). */ if (nmlen == 0) { VN_HOLD(dvp); *vpp = dvp; return (0); } /* Don't allow "." or ".." through here. */ if ((nmlen == 1 && name[0] == '.') || (nmlen == 2 && name[0] == '.' && name[1] == '.')) return (EISDIR); /* * We make a copy of the attributes because the caller does not * expect us to change what va points to. */ vattr = *va; if (smbfs_rw_enter_sig(&dnp->r_rwlock, RW_WRITER, SMBINTR(dvp))) return (EINTR); smb_credinit(&scred, cr); /* * XXX: Do we need r_lkserlock too? * No use of any shared fid or fctx... */ /* * NFS needs to go over the wire, just to be sure whether the * file exists or not. Using a cached result is dangerous in * this case when making a decision regarding existence. * * The SMB protocol does NOT really need to go OTW here * thanks to the expressive NTCREATE disposition values. * Unfortunately, to do Unix access checks correctly, * we need to know if the object already exists. * When the object does not exist, we need VWRITE on * the directory. Note: smbfslookup() checks VEXEC. */ error = smbfslookup(dvp, nm, &vp, cr, 0, ct); if (error == 0) { /* * The file already exists. Error? * NB: have a hold from smbfslookup */ if (exclusive == EXCL) { error = EEXIST; VN_RELE(vp); goto out; } /* * Verify requested access. */ error = smbfs_access(vp, mode, 0, cr, ct); if (error) { VN_RELE(vp); goto out; } /* * Truncate (if requested). */ if ((vattr.va_mask & AT_SIZE) && vattr.va_size == 0) { vattr.va_mask = AT_SIZE; error = smbfssetattr(vp, &vattr, 0, cr); if (error) { VN_RELE(vp); goto out; } } /* Success! */ #ifdef NOT_YET vnevent_create(vp, ct); #endif *vpp = vp; goto out; } /* * The file did not exist. Need VWRITE in the directory. */ error = smbfs_access(dvp, VWRITE, 0, cr, ct); if (error) goto out; /* * Now things get tricky. We also need to check the * requested open mode against the file we may create. * See comments at smbfs_access_rwx */ error = smbfs_access_rwx(vfsp, VREG, mode, cr); if (error) goto out; /* * Now the code derived from Darwin, * but with greater use of NT_CREATE * disposition options. Much changed. * * Create (or open) a new child node. * Note we handled "." and ".." above. */ if (exclusive == EXCL) disp = NTCREATEX_DISP_CREATE; else { /* Truncate regular files if requested. */ if ((va->va_type == VREG) && (va->va_mask & AT_SIZE) && (va->va_size == 0)) disp = NTCREATEX_DISP_OVERWRITE_IF; else disp = NTCREATEX_DISP_OPEN_IF; } xattr = (dnp->n_flag & N_XATTR) ? 1 : 0; error = smbfs_smb_create(dnp, name, nmlen, xattr, disp, &scred, &fid); if (error) goto out; /* * XXX: Missing some code here to deal with * the case where we opened an existing file, * it's size is larger than 32-bits, and we're * setting the size from a process that's not * aware of large file offsets. i.e. * from the NFS3 code: */ #if NOT_YET /* XXX */ if ((vattr.va_mask & AT_SIZE) && vp->v_type == VREG) { np = VTOSMB(vp); /* * Check here for large file handled * by LF-unaware process (as * ufs_create() does) */ if (!(lfaware & FOFFMAX)) { mutex_enter(&np->r_statelock); if (np->r_size > MAXOFF32_T) error = EOVERFLOW; mutex_exit(&np->r_statelock); } if (!error) { vattr.va_mask = AT_SIZE; error = smbfssetattr(vp, &vattr, 0, cr); } } #endif /* XXX */ /* * Should use the fid to get/set the size * while we have it opened here. See above. */ cerror = smbfs_smb_close(smi->smi_share, fid, NULL, &scred); if (cerror) SMBVDEBUG("error %d closing %s\\%s\n", cerror, dnp->n_rpath, name); /* * In the open case, the name may differ a little * from what we passed to create (case, etc.) * so call lookup to get the (opened) name. * * XXX: Could avoid this extra lookup if the * "createact" result from NT_CREATE says we * created the object. */ error = smbfs_smb_lookup(dnp, &name, &nmlen, &fattr, &scred); if (error) goto out; /* update attr and directory cache */ smbfs_attr_touchdir(dnp); error = smbfs_nget(dvp, name, nmlen, &fattr, &vp); if (error) goto out; /* XXX invalidate pages if we truncated? */ /* Success! */ *vpp = vp; error = 0; out: smb_credrele(&scred); smbfs_rw_exit(&dnp->r_rwlock); if (name != nm) smbfs_name_free(name, nmlen); return (error); } /* * XXX * This op should support the new FIGNORECASE flag for case-insensitive * lookups, per PSARC 2007/244. */ /* ARGSUSED */ static int smbfs_remove(vnode_t *dvp, char *nm, cred_t *cr, caller_context_t *ct, int flags) { int error; vnode_t *vp; smbnode_t *np; smbnode_t *dnp; struct smb_cred scred; /* enum smbfsstat status; */ smbmntinfo_t *smi; smi = VTOSMI(dvp); if (curproc->p_zone != smi->smi_zone_ref.zref_zone) return (EPERM); if (smi->smi_flags & SMI_DEAD || dvp->v_vfsp->vfs_flag & VFS_UNMOUNTED) return (EIO); dnp = VTOSMB(dvp); if (smbfs_rw_enter_sig(&dnp->r_rwlock, RW_WRITER, SMBINTR(dvp))) return (EINTR); smb_credinit(&scred, cr); /* * Verify access to the dirctory. */ error = smbfs_access(dvp, VWRITE|VEXEC, 0, cr, ct); if (error) goto out; /* * NOTE: the darwin code gets the "vp" passed in so it looks * like the "vp" has probably been "lookup"ed by the VFS layer. * It looks like we will need to lookup the vp to check the * caches and check if the object being deleted is a directory. */ error = smbfslookup(dvp, nm, &vp, cr, 0, ct); if (error) goto out; /* Never allow link/unlink directories on CIFS. */ if (vp->v_type == VDIR) { VN_RELE(vp); error = EPERM; goto out; } /* * Now we have the real reference count on the vnode * Do we have the file open? */ np = VTOSMB(vp); mutex_enter(&np->r_statelock); if ((vp->v_count > 1) && (np->n_fidrefs > 0)) { /* * NFS does a rename on remove here. * Probably not applicable for SMB. * Like Darwin, just return EBUSY. * * XXX: Todo - Use Trans2rename, and * if that fails, ask the server to * set the delete-on-close flag. */ mutex_exit(&np->r_statelock); error = EBUSY; } else { smbfs_attrcache_rm_locked(np); mutex_exit(&np->r_statelock); error = smbfs_smb_delete(np, &scred, NULL, 0, 0); /* * If the file should no longer exist, discard * any cached attributes under this node. */ switch (error) { case 0: case ENOENT: case ENOTDIR: smbfs_attrcache_prune(np); break; } } VN_RELE(vp); out: smb_credrele(&scred); smbfs_rw_exit(&dnp->r_rwlock); return (error); } /* * XXX * This op should support the new FIGNORECASE flag for case-insensitive * lookups, per PSARC 2007/244. */ /* ARGSUSED */ static int smbfs_rename(vnode_t *odvp, char *onm, vnode_t *ndvp, char *nnm, cred_t *cr, caller_context_t *ct, int flags) { /* vnode_t *realvp; */ if (curproc->p_zone != VTOSMI(odvp)->smi_zone_ref.zref_zone || curproc->p_zone != VTOSMI(ndvp)->smi_zone_ref.zref_zone) return (EPERM); if (VTOSMI(odvp)->smi_flags & SMI_DEAD || VTOSMI(ndvp)->smi_flags & SMI_DEAD || odvp->v_vfsp->vfs_flag & VFS_UNMOUNTED || ndvp->v_vfsp->vfs_flag & VFS_UNMOUNTED) return (EIO); return (smbfsrename(odvp, onm, ndvp, nnm, cr, ct)); } /* * smbfsrename does the real work of renaming in SMBFS */ /* ARGSUSED */ static int smbfsrename(vnode_t *odvp, char *onm, vnode_t *ndvp, char *nnm, cred_t *cr, caller_context_t *ct) { int error; int nvp_locked = 0; vnode_t *nvp = NULL; vnode_t *ovp = NULL; smbnode_t *onp; smbnode_t *nnp; smbnode_t *odnp; smbnode_t *ndnp; struct smb_cred scred; /* enum smbfsstat status; */ ASSERT(curproc->p_zone == VTOSMI(odvp)->smi_zone_ref.zref_zone); if (strcmp(onm, ".") == 0 || strcmp(onm, "..") == 0 || strcmp(nnm, ".") == 0 || strcmp(nnm, "..") == 0) return (EINVAL); /* * Check that everything is on the same filesystem. * vn_rename checks the fsid's, but in case we don't * fill those in correctly, check here too. */ if (odvp->v_vfsp != ndvp->v_vfsp) return (EXDEV); odnp = VTOSMB(odvp); ndnp = VTOSMB(ndvp); /* * Avoid deadlock here on old vs new directory nodes * by always taking the locks in order of address. * The order is arbitrary, but must be consistent. */ if (odnp < ndnp) { if (smbfs_rw_enter_sig(&odnp->r_rwlock, RW_WRITER, SMBINTR(odvp))) return (EINTR); if (smbfs_rw_enter_sig(&ndnp->r_rwlock, RW_WRITER, SMBINTR(ndvp))) { smbfs_rw_exit(&odnp->r_rwlock); return (EINTR); } } else { if (smbfs_rw_enter_sig(&ndnp->r_rwlock, RW_WRITER, SMBINTR(ndvp))) return (EINTR); if (smbfs_rw_enter_sig(&odnp->r_rwlock, RW_WRITER, SMBINTR(odvp))) { smbfs_rw_exit(&ndnp->r_rwlock); return (EINTR); } } smb_credinit(&scred, cr); /* * No returns after this point (goto out) */ /* * Need write access on source and target. * Server takes care of most checks. */ error = smbfs_access(odvp, VWRITE|VEXEC, 0, cr, ct); if (error) goto out; if (odvp != ndvp) { error = smbfs_access(ndvp, VWRITE, 0, cr, ct); if (error) goto out; } /* * Lookup the source name. Must already exist. */ error = smbfslookup(odvp, onm, &ovp, cr, 0, ct); if (error) goto out; /* * Lookup the target file. If it exists, it needs to be * checked to see whether it is a mount point and whether * it is active (open). */ error = smbfslookup(ndvp, nnm, &nvp, cr, 0, ct); if (!error) { /* * Target (nvp) already exists. Check that it * has the same type as the source. The server * will check this also, (and more reliably) but * this lets us return the correct error codes. */ if (ovp->v_type == VDIR) { if (nvp->v_type != VDIR) { error = ENOTDIR; goto out; } } else { if (nvp->v_type == VDIR) { error = EISDIR; goto out; } } /* * POSIX dictates that when the source and target * entries refer to the same file object, rename * must do nothing and exit without error. */ if (ovp == nvp) { error = 0; goto out; } /* * Also must ensure the target is not a mount point, * and keep mount/umount away until we're done. */ if (vn_vfsrlock(nvp)) { error = EBUSY; goto out; } nvp_locked = 1; if (vn_mountedvfs(nvp) != NULL) { error = EBUSY; goto out; } /* * CIFS gives a SHARING_VIOLATION error when * trying to rename onto an exising object, * so try to remove the target first. * (Only for files, not directories.) */ if (nvp->v_type == VDIR) { error = EEXIST; goto out; } /* * Nodes that are "not active" here have v_count=2 * because vn_renameat (our caller) did a lookup on * both the source and target before this call. * Otherwise this similar to smbfs_remove. */ nnp = VTOSMB(nvp); mutex_enter(&nnp->r_statelock); if ((nvp->v_count > 2) && (nnp->n_fidrefs > 0)) { /* * The target file exists, is not the same as * the source file, and is active. Other FS * implementations unlink the target here. * For SMB, we don't assume we can remove an * open file. Return an error instead. */ mutex_exit(&nnp->r_statelock); error = EBUSY; goto out; } /* * Target file is not active. Try to remove it. */ smbfs_attrcache_rm_locked(nnp); mutex_exit(&nnp->r_statelock); error = smbfs_smb_delete(nnp, &scred, NULL, 0, 0); /* * Similar to smbfs_remove */ switch (error) { case 0: case ENOENT: case ENOTDIR: smbfs_attrcache_prune(nnp); break; } if (error) goto out; /* * OK, removed the target file. Continue as if * lookup target had failed (nvp == NULL). */ vn_vfsunlock(nvp); nvp_locked = 0; VN_RELE(nvp); nvp = NULL; } /* nvp */ onp = VTOSMB(ovp); smbfs_attrcache_remove(onp); error = smbfs_smb_rename(onp, ndnp, nnm, strlen(nnm), &scred); /* * If the old name should no longer exist, * discard any cached attributes under it. */ if (error == 0) smbfs_attrcache_prune(onp); out: if (nvp) { if (nvp_locked) vn_vfsunlock(nvp); VN_RELE(nvp); } if (ovp) VN_RELE(ovp); smb_credrele(&scred); smbfs_rw_exit(&odnp->r_rwlock); smbfs_rw_exit(&ndnp->r_rwlock); return (error); } /* * XXX * vsecattr_t is new to build 77, and we need to eventually support * it in order to create an ACL when an object is created. * * This op should support the new FIGNORECASE flag for case-insensitive * lookups, per PSARC 2007/244. */ /* ARGSUSED */ static int smbfs_mkdir(vnode_t *dvp, char *nm, struct vattr *va, vnode_t **vpp, cred_t *cr, caller_context_t *ct, int flags, vsecattr_t *vsecp) { vnode_t *vp; struct smbnode *dnp = VTOSMB(dvp); struct smbmntinfo *smi = VTOSMI(dvp); struct smb_cred scred; struct smbfattr fattr; const char *name = (const char *) nm; int nmlen = strlen(name); int error, hiderr; if (curproc->p_zone != smi->smi_zone_ref.zref_zone) return (EPERM); if (smi->smi_flags & SMI_DEAD || dvp->v_vfsp->vfs_flag & VFS_UNMOUNTED) return (EIO); if ((nmlen == 1 && name[0] == '.') || (nmlen == 2 && name[0] == '.' && name[1] == '.')) return (EEXIST); /* Only plain files are allowed in V_XATTRDIR. */ if (dvp->v_flag & V_XATTRDIR) return (EINVAL); if (smbfs_rw_enter_sig(&dnp->r_rwlock, RW_WRITER, SMBINTR(dvp))) return (EINTR); smb_credinit(&scred, cr); /* * XXX: Do we need r_lkserlock too? * No use of any shared fid or fctx... */ /* * Require write access in the containing directory. */ error = smbfs_access(dvp, VWRITE, 0, cr, ct); if (error) goto out; error = smbfs_smb_mkdir(dnp, name, nmlen, &scred); if (error) goto out; error = smbfs_smb_lookup(dnp, &name, &nmlen, &fattr, &scred); if (error) goto out; smbfs_attr_touchdir(dnp); error = smbfs_nget(dvp, name, nmlen, &fattr, &vp); if (error) goto out; if (name[0] == '.') if ((hiderr = smbfs_smb_hideit(VTOSMB(vp), NULL, 0, &scred))) SMBVDEBUG("hide failure %d\n", hiderr); /* Success! */ *vpp = vp; error = 0; out: smb_credrele(&scred); smbfs_rw_exit(&dnp->r_rwlock); if (name != nm) smbfs_name_free(name, nmlen); return (error); } /* * XXX * This op should support the new FIGNORECASE flag for case-insensitive * lookups, per PSARC 2007/244. */ /* ARGSUSED */ static int smbfs_rmdir(vnode_t *dvp, char *nm, vnode_t *cdir, cred_t *cr, caller_context_t *ct, int flags) { vnode_t *vp = NULL; int vp_locked = 0; struct smbmntinfo *smi = VTOSMI(dvp); struct smbnode *dnp = VTOSMB(dvp); struct smbnode *np; struct smb_cred scred; int error; if (curproc->p_zone != smi->smi_zone_ref.zref_zone) return (EPERM); if (smi->smi_flags & SMI_DEAD || dvp->v_vfsp->vfs_flag & VFS_UNMOUNTED) return (EIO); if (smbfs_rw_enter_sig(&dnp->r_rwlock, RW_WRITER, SMBINTR(dvp))) return (EINTR); smb_credinit(&scred, cr); /* * Require w/x access in the containing directory. * Server handles all other access checks. */ error = smbfs_access(dvp, VEXEC|VWRITE, 0, cr, ct); if (error) goto out; /* * First lookup the entry to be removed. */ error = smbfslookup(dvp, nm, &vp, cr, 0, ct); if (error) goto out; np = VTOSMB(vp); /* * Disallow rmdir of "." or current dir, or the FS root. * Also make sure it's a directory, not a mount point, * and lock to keep mount/umount away until we're done. */ if ((vp == dvp) || (vp == cdir) || (vp->v_flag & VROOT)) { error = EINVAL; goto out; } if (vp->v_type != VDIR) { error = ENOTDIR; goto out; } if (vn_vfsrlock(vp)) { error = EBUSY; goto out; } vp_locked = 1; if (vn_mountedvfs(vp) != NULL) { error = EBUSY; goto out; } smbfs_attrcache_remove(np); error = smbfs_smb_rmdir(np, &scred); /* * Similar to smbfs_remove */ switch (error) { case 0: case ENOENT: case ENOTDIR: smbfs_attrcache_prune(np); break; } if (error) goto out; mutex_enter(&np->r_statelock); dnp->n_flag |= NMODIFIED; mutex_exit(&np->r_statelock); smbfs_attr_touchdir(dnp); smbfs_rmhash(np); out: if (vp) { if (vp_locked) vn_vfsunlock(vp); VN_RELE(vp); } smb_credrele(&scred); smbfs_rw_exit(&dnp->r_rwlock); return (error); } /* ARGSUSED */ static int smbfs_readdir(vnode_t *vp, struct uio *uiop, cred_t *cr, int *eofp, caller_context_t *ct, int flags) { struct smbnode *np = VTOSMB(vp); int error = 0; smbmntinfo_t *smi; smi = VTOSMI(vp); if (curproc->p_zone != smi->smi_zone_ref.zref_zone) return (EIO); if (smi->smi_flags & SMI_DEAD || vp->v_vfsp->vfs_flag & VFS_UNMOUNTED) return (EIO); /* * Require read access in the directory. */ error = smbfs_access(vp, VREAD, 0, cr, ct); if (error) return (error); ASSERT(smbfs_rw_lock_held(&np->r_rwlock, RW_READER)); /* * XXX: Todo readdir cache here * Note: NFS code is just below this. * * I am serializing the entire readdir opreation * now since we have not yet implemented readdir * cache. This fix needs to be revisited once * we implement readdir cache. */ if (smbfs_rw_enter_sig(&np->r_lkserlock, RW_WRITER, SMBINTR(vp))) return (EINTR); error = smbfs_readvdir(vp, uiop, cr, eofp, ct); smbfs_rw_exit(&np->r_lkserlock); return (error); } /* ARGSUSED */ static int smbfs_readvdir(vnode_t *vp, uio_t *uio, cred_t *cr, int *eofp, caller_context_t *ct) { /* * Note: "limit" tells the SMB-level FindFirst/FindNext * functions how many directory entries to request in * each OtW call. It needs to be large enough so that * we don't make lots of tiny OtW requests, but there's * no point making it larger than the maximum number of * OtW entries that would fit in a maximum sized trans2 * response (64k / 48). Beyond that, it's just tuning. * WinNT used 512, Win2k used 1366. We use 1000. */ static const int limit = 1000; /* Largest possible dirent size. */ static const size_t dbufsiz = DIRENT64_RECLEN(SMB_MAXFNAMELEN); struct smb_cred scred; vnode_t *newvp; struct smbnode *np = VTOSMB(vp); struct smbfs_fctx *ctx; struct dirent64 *dp; ssize_t save_resid; offset_t save_offset; /* 64 bits */ int offset; /* yes, 32 bits */ int nmlen, error; ushort_t reclen; ASSERT(curproc->p_zone == VTOSMI(vp)->smi_zone_ref.zref_zone); /* Make sure we serialize for n_dirseq use. */ ASSERT(smbfs_rw_lock_held(&np->r_lkserlock, RW_WRITER)); /* * Make sure smbfs_open filled in n_dirseq */ if (np->n_dirseq == NULL) return (EBADF); /* Check for overflow of (32-bit) directory offset. */ if (uio->uio_loffset < 0 || uio->uio_loffset > INT32_MAX || (uio->uio_loffset + uio->uio_resid) > INT32_MAX) return (EINVAL); /* Require space for at least one dirent. */ if (uio->uio_resid < dbufsiz) return (EINVAL); SMBVDEBUG("dirname='%s'\n", np->n_rpath); smb_credinit(&scred, cr); dp = kmem_alloc(dbufsiz, KM_SLEEP); save_resid = uio->uio_resid; save_offset = uio->uio_loffset; offset = uio->uio_offset; SMBVDEBUG("in: offset=%d, resid=%d\n", (int)uio->uio_offset, (int)uio->uio_resid); error = 0; /* * Generate the "." and ".." entries here so we can * (1) make sure they appear (but only once), and * (2) deal with getting their I numbers which the * findnext below does only for normal names. */ while (offset < FIRST_DIROFS) { /* * Tricky bit filling in the first two: * offset 0 is ".", offset 1 is ".." * so strlen of these is offset+1. */ reclen = DIRENT64_RECLEN(offset + 1); if (uio->uio_resid < reclen) goto out; bzero(dp, reclen); dp->d_reclen = reclen; dp->d_name[0] = '.'; dp->d_name[1] = '.'; dp->d_name[offset + 1] = '\0'; /* * Want the real I-numbers for the "." and ".." * entries. For these two names, we know that * smbfslookup can get the nodes efficiently. */ error = smbfslookup(vp, dp->d_name, &newvp, cr, 1, ct); if (error) { dp->d_ino = np->n_ino + offset; /* fiction */ } else { dp->d_ino = VTOSMB(newvp)->n_ino; VN_RELE(newvp); } /* * Note: d_off is the offset that a user-level program * should seek to for reading the NEXT directory entry. * See libc: readdir, telldir, seekdir */ dp->d_off = offset + 1; error = uiomove(dp, reclen, UIO_READ, uio); if (error) goto out; /* * Note: uiomove updates uio->uio_offset, * but we want it to be our "cookie" value, * which just counts dirents ignoring size. */ uio->uio_offset = ++offset; } /* * If there was a backward seek, we have to reopen. */ if (offset < np->n_dirofs) { SMBVDEBUG("Reopening search %d:%d\n", offset, np->n_dirofs); error = smbfs_smb_findopen(np, "*", 1, SMB_FA_SYSTEM | SMB_FA_HIDDEN | SMB_FA_DIR, &scred, &ctx); if (error) { SMBVDEBUG("can not open search, error = %d", error); goto out; } /* free the old one */ (void) smbfs_smb_findclose(np->n_dirseq, &scred); /* save the new one */ np->n_dirseq = ctx; np->n_dirofs = FIRST_DIROFS; } else { ctx = np->n_dirseq; } /* * Skip entries before the requested offset. */ while (np->n_dirofs < offset) { error = smbfs_smb_findnext(ctx, limit, &scred); if (error != 0) goto out; np->n_dirofs++; } /* * While there's room in the caller's buffer: * get a directory entry from SMB, * convert to a dirent, copyout. * We stop when there is no longer room for a * maximum sized dirent because we must decide * before we know anything about the next entry. */ while (uio->uio_resid >= dbufsiz) { error = smbfs_smb_findnext(ctx, limit, &scred); if (error != 0) goto out; np->n_dirofs++; /* Sanity check the name length. */ nmlen = ctx->f_nmlen; if (nmlen > SMB_MAXFNAMELEN) { nmlen = SMB_MAXFNAMELEN; SMBVDEBUG("Truncating name: %s\n", ctx->f_name); } if (smbfs_fastlookup) { /* See comment at smbfs_fastlookup above. */ if (smbfs_nget(vp, ctx->f_name, nmlen, &ctx->f_attr, &newvp) == 0) VN_RELE(newvp); } reclen = DIRENT64_RECLEN(nmlen); bzero(dp, reclen); dp->d_reclen = reclen; bcopy(ctx->f_name, dp->d_name, nmlen); dp->d_name[nmlen] = '\0'; dp->d_ino = ctx->f_inum; dp->d_off = offset + 1; /* See d_off comment above */ error = uiomove(dp, reclen, UIO_READ, uio); if (error) goto out; /* See comment re. uio_offset above. */ uio->uio_offset = ++offset; } out: /* * When we come to the end of a directory, the * SMB-level functions return ENOENT, but the * caller is not expecting an error return. * * Also note that we must delay the call to * smbfs_smb_findclose(np->n_dirseq, ...) * until smbfs_close so that all reads at the * end of the directory will return no data. */ if (error == ENOENT) { error = 0; if (eofp) *eofp = 1; } /* * If we encountered an error (i.e. "access denied") * from the FindFirst call, we will have copied out * the "." and ".." entries leaving offset == 2. * In that case, restore the original offset/resid * so the caller gets no data with the error. */ if (error != 0 && offset == FIRST_DIROFS) { uio->uio_loffset = save_offset; uio->uio_resid = save_resid; } SMBVDEBUG("out: offset=%d, resid=%d\n", (int)uio->uio_offset, (int)uio->uio_resid); kmem_free(dp, dbufsiz); smb_credrele(&scred); return (error); } /* * The pair of functions VOP_RWLOCK, VOP_RWUNLOCK * are optional functions that are called by: * getdents, before/after VOP_READDIR * pread, before/after ... VOP_READ * pwrite, before/after ... VOP_WRITE * (other places) * * Careful here: None of the above check for any * error returns from VOP_RWLOCK / VOP_RWUNLOCK! * In fact, the return value from _rwlock is NOT * an error code, but V_WRITELOCK_TRUE / _FALSE. * * Therefore, it's up to _this_ code to make sure * the lock state remains balanced, which means * we can't "bail out" on interrupts, etc. */ /* ARGSUSED2 */ static int smbfs_rwlock(vnode_t *vp, int write_lock, caller_context_t *ctp) { smbnode_t *np = VTOSMB(vp); if (!write_lock) { (void) smbfs_rw_enter_sig(&np->r_rwlock, RW_READER, FALSE); return (V_WRITELOCK_FALSE); } (void) smbfs_rw_enter_sig(&np->r_rwlock, RW_WRITER, FALSE); return (V_WRITELOCK_TRUE); } /* ARGSUSED */ static void smbfs_rwunlock(vnode_t *vp, int write_lock, caller_context_t *ctp) { smbnode_t *np = VTOSMB(vp); smbfs_rw_exit(&np->r_rwlock); } /* ARGSUSED */ static int smbfs_seek(vnode_t *vp, offset_t ooff, offset_t *noffp, caller_context_t *ct) { smbmntinfo_t *smi; smi = VTOSMI(vp); if (curproc->p_zone != smi->smi_zone_ref.zref_zone) return (EPERM); if (smi->smi_flags & SMI_DEAD || vp->v_vfsp->vfs_flag & VFS_UNMOUNTED) return (EIO); /* * Because we stuff the readdir cookie into the offset field * someone may attempt to do an lseek with the cookie which * we want to succeed. */ if (vp->v_type == VDIR) return (0); /* Like NFS3, just check for 63-bit overflow. */ if (*noffp < 0) return (EINVAL); return (0); } /* * XXX * This op may need to support PSARC 2007/440, nbmand changes for CIFS Service. */ static int smbfs_frlock(vnode_t *vp, int cmd, struct flock64 *bfp, int flag, offset_t offset, struct flk_callback *flk_cbp, cred_t *cr, caller_context_t *ct) { if (curproc->p_zone != VTOSMI(vp)->smi_zone_ref.zref_zone) return (EIO); if (VTOSMI(vp)->smi_flags & SMI_LLOCK) return (fs_frlock(vp, cmd, bfp, flag, offset, flk_cbp, cr, ct)); else return (ENOSYS); } /* * Free storage space associated with the specified vnode. The portion * to be freed is specified by bfp->l_start and bfp->l_len (already * normalized to a "whence" of 0). * * Called by fcntl(fd, F_FREESP, lkp) for libc:ftruncate, etc. */ /* ARGSUSED */ static int smbfs_space(vnode_t *vp, int cmd, struct flock64 *bfp, int flag, offset_t offset, cred_t *cr, caller_context_t *ct) { int error; smbmntinfo_t *smi; smi = VTOSMI(vp); if (curproc->p_zone != smi->smi_zone_ref.zref_zone) return (EIO); if (smi->smi_flags & SMI_DEAD || vp->v_vfsp->vfs_flag & VFS_UNMOUNTED) return (EIO); /* Caller (fcntl) has checked v_type */ ASSERT(vp->v_type == VREG); if (cmd != F_FREESP) return (EINVAL); /* * Like NFS3, no 32-bit offset checks here. * Our SMB layer takes care to return EFBIG * when it has to fallback to a 32-bit call. */ error = convoff(vp, bfp, 0, offset); if (!error) { ASSERT(bfp->l_start >= 0); if (bfp->l_len == 0) { struct vattr va; /* * ftruncate should not change the ctime and * mtime if we truncate the file to its * previous size. */ va.va_mask = AT_SIZE; error = smbfsgetattr(vp, &va, cr); if (error || va.va_size == bfp->l_start) return (error); va.va_mask = AT_SIZE; va.va_size = bfp->l_start; error = smbfssetattr(vp, &va, 0, cr); } else error = EINVAL; } return (error); } /* ARGSUSED */ static int smbfs_pathconf(vnode_t *vp, int cmd, ulong_t *valp, cred_t *cr, caller_context_t *ct) { vfs_t *vfs; smbmntinfo_t *smi; struct smb_share *ssp; vfs = vp->v_vfsp; smi = VFTOSMI(vfs); if (curproc->p_zone != smi->smi_zone_ref.zref_zone) return (EIO); if (smi->smi_flags & SMI_DEAD || vp->v_vfsp->vfs_flag & VFS_UNMOUNTED) return (EIO); switch (cmd) { case _PC_FILESIZEBITS: ssp = smi->smi_share; if (SSTOVC(ssp)->vc_sopt.sv_caps & SMB_CAP_LARGE_FILES) *valp = 64; else *valp = 32; break; case _PC_LINK_MAX: /* We only ever report one link to an object */ *valp = 1; break; case _PC_ACL_ENABLED: /* * Always indicate that ACLs are enabled and * that we support ACE_T format, otherwise * libsec will ask for ACLENT_T format data * which we don't support. */ *valp = _ACL_ACE_ENABLED; break; case _PC_SYMLINK_MAX: /* No symlinks until we do Unix extensions */ *valp = 0; break; case _PC_XATTR_EXISTS: if (vfs->vfs_flag & VFS_XATTR) { *valp = smbfs_xa_exists(vp, cr); break; } return (EINVAL); case _PC_SATTR_ENABLED: case _PC_SATTR_EXISTS: *valp = 1; break; case _PC_TIMESTAMP_RESOLUTION: /* * Windows times are tenths of microseconds * (multiples of 100 nanoseconds). */ *valp = 100L; break; default: return (fs_pathconf(vp, cmd, valp, cr, ct)); } return (0); } /* ARGSUSED */ static int smbfs_getsecattr(vnode_t *vp, vsecattr_t *vsa, int flag, cred_t *cr, caller_context_t *ct) { vfs_t *vfsp; smbmntinfo_t *smi; int error; uint_t mask; vfsp = vp->v_vfsp; smi = VFTOSMI(vfsp); if (curproc->p_zone != smi->smi_zone_ref.zref_zone) return (EIO); if (smi->smi_flags & SMI_DEAD || vfsp->vfs_flag & VFS_UNMOUNTED) return (EIO); /* * Our _pathconf indicates _ACL_ACE_ENABLED, * so we should only see VSA_ACE, etc here. * Note: vn_create asks for VSA_DFACLCNT, * and it expects ENOSYS and empty data. */ mask = vsa->vsa_mask & (VSA_ACE | VSA_ACECNT | VSA_ACE_ACLFLAGS | VSA_ACE_ALLTYPES); if (mask == 0) return (ENOSYS); if (smi->smi_flags & SMI_ACL) error = smbfs_acl_getvsa(vp, vsa, flag, cr); else error = ENOSYS; if (error == ENOSYS) error = fs_fab_acl(vp, vsa, flag, cr, ct); return (error); } /* ARGSUSED */ static int smbfs_setsecattr(vnode_t *vp, vsecattr_t *vsa, int flag, cred_t *cr, caller_context_t *ct) { vfs_t *vfsp; smbmntinfo_t *smi; int error; uint_t mask; vfsp = vp->v_vfsp; smi = VFTOSMI(vfsp); if (curproc->p_zone != smi->smi_zone_ref.zref_zone) return (EIO); if (smi->smi_flags & SMI_DEAD || vfsp->vfs_flag & VFS_UNMOUNTED) return (EIO); /* * Our _pathconf indicates _ACL_ACE_ENABLED, * so we should only see VSA_ACE, etc here. */ mask = vsa->vsa_mask & (VSA_ACE | VSA_ACECNT); if (mask == 0) return (ENOSYS); if (vfsp->vfs_flag & VFS_RDONLY) return (EROFS); /* * Allow only the mount owner to do this. * See comments at smbfs_access_rwx. */ error = secpolicy_vnode_setdac(cr, smi->smi_uid); if (error != 0) return (error); if (smi->smi_flags & SMI_ACL) error = smbfs_acl_setvsa(vp, vsa, flag, cr); else error = ENOSYS; return (error); } /* * XXX * This op should eventually support PSARC 2007/268. */ static int smbfs_shrlock(vnode_t *vp, int cmd, struct shrlock *shr, int flag, cred_t *cr, caller_context_t *ct) { if (curproc->p_zone != VTOSMI(vp)->smi_zone_ref.zref_zone) return (EIO); if (VTOSMI(vp)->smi_flags & SMI_LLOCK) return (fs_shrlock(vp, cmd, shr, flag, cr, ct)); else return (ENOSYS); }