1 /* 2 * CDDL HEADER START 3 * 4 * The contents of this file are subject to the terms of the 5 * Common Development and Distribution License (the "License"). 6 * You may not use this file except in compliance with the License. 7 * 8 * You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE 9 * or http://www.opensolaris.org/os/licensing. 10 * See the License for the specific language governing permissions 11 * and limitations under the License. 12 * 13 * When distributing Covered Code, include this CDDL HEADER in each 14 * file and include the License file at usr/src/OPENSOLARIS.LICENSE. 15 * If applicable, add the following below this CDDL HEADER, with the 16 * fields enclosed by brackets "[]" replaced with your own identifying 17 * information: Portions Copyright [yyyy] [name of copyright owner] 18 * 19 * CDDL HEADER END 20 */ 21 /* 22 * Copyright (c) 2007, 2010, Oracle and/or its affiliates. All rights reserved. 23 */ 24 25 /* 26 * This command is used to create or open a file or directory. 27 */ 28 29 30 #include <smbsrv/smb_kproto.h> 31 #include <smbsrv/smb_fsops.h> 32 #include <smbsrv/smb_vops.h> 33 34 /* 35 * smb_com_nt_create_andx 36 * 37 * This command is used to create or open a file or directory. 38 * 39 * Client Request Description 40 * ================================= ================================== 41 * 42 * UCHAR WordCount; Count of parameter words = 24 43 * UCHAR AndXCommand; Secondary command; 0xFF = None 44 * UCHAR AndXReserved; Reserved (must be 0) 45 * USHORT AndXOffset; Offset to next command WordCount 46 * UCHAR Reserved; Reserved (must be 0) 47 * USHORT NameLength; Length of Name[] in bytes 48 * ULONG Flags; Create bit set: 49 * 0x02 - Request an oplock 50 * 0x04 - Request a batch oplock 51 * 0x08 - Target of open must be 52 * directory 53 * ULONG RootDirectoryFid; If non-zero, open is relative to 54 * this directory 55 * ACCESS_MASK DesiredAccess; access desired 56 * LARGE_INTEGER AllocationSize; Initial allocation size 57 * ULONG ExtFileAttributes; File attributes 58 * ULONG ShareAccess; Type of share access 59 * ULONG CreateDisposition; Action to take if file exists or 60 * not 61 * ULONG CreateOptions; Options to use if creating a file 62 * ULONG ImpersonationLevel; Security QOS information 63 * UCHAR SecurityFlags; Security tracking mode flags: 64 * 0x1 - SECURITY_CONTEXT_TRACKING 65 * 0x2 - SECURITY_EFFECTIVE_ONLY 66 * USHORT ByteCount; Length of byte parameters 67 * STRING Name[]; File to open or create 68 * 69 * The DesiredAccess parameter is specified in section 3.7 on Access Mask 70 * Encoding. 71 * 72 * If no value is specified, it still allows an application to query 73 * attributes without actually accessing the file. 74 * 75 * The ExtFIleAttributes parameter specifies the file attributes and flags 76 * for the file. The parameter's value is the sum of allowed attributes and 77 * flags defined in section 3.11 on Extended File Attribute Encoding 78 * 79 * The ShareAccess field Specifies how this file can be shared. This 80 * parameter must be some combination of the following values: 81 * 82 * Name Value Meaning 83 * 0 Prevents the file from being shared. 84 * FILE_SHARE_READ 0x00000001 Other open operations can be performed on 85 * the file for read access. 86 * FILE_SHARE_WRITE 0x00000002 Other open operations can be performed on 87 * the file for write access. 88 * FILE_SHARE_DELETE 0x00000004 Other open operations can be performed on 89 * the file for delete access. 90 * 91 * The CreateDisposition parameter can contain one of the following values: 92 * 93 * CREATE_NEW Creates a new file. The function fails if the 94 * specified file already exists. 95 * CREATE_ALWAYS Creates a new file. The function overwrites the file 96 * if it exists. 97 * OPEN_EXISTING Opens the file. The function fails if the file does 98 * not exist. 99 * OPEN_ALWAYS Opens the file, if it exists. If the file does not 100 * exist, act like CREATE_NEW. 101 * TRUNCATE_EXISTING Opens the file. Once opened, the file is truncated so 102 * that its size is zero bytes. The calling process must 103 * open the file with at least GENERIC_WRITE access. The 104 * function fails if the file does not exist. 105 * 106 * The ImpersonationLevel parameter can contain one or more of the 107 * following values: 108 * 109 * SECURITY_ANONYMOUS Specifies to impersonate the client at the 110 * Anonymous impersonation level. 111 * SECURITY_IDENTIFICATION Specifies to impersonate the client at the 112 * Identification impersonation level. 113 * SECURITY_IMPERSONATION Specifies to impersonate the client at the 114 * Impersonation impersonation level. 115 * SECURITY_DELEGATION Specifies to impersonate the client at the 116 * Delegation impersonation level. 117 * 118 * The SecurityFlags parameter can have either of the following two flags 119 * set: 120 * 121 * SECURITY_CONTEXT_TRACKING Specifies that the security tracking mode is 122 * dynamic. If this flag is not specified, 123 * Security Tracking Mode is static. 124 * SECURITY_EFFECTIVE_ONLY Specifies that only the enabled aspects of 125 * the client's security context are available 126 * to the server. If you do not specify this 127 * flag, all aspects of the client's security 128 * context are available. This flag allows the 129 * client to limit the groups and privileges 130 * that a server can use while impersonating the 131 * client. 132 * 133 * The response is as follows: 134 * 135 * Server Response Description 136 * ================================= ================================== 137 * 138 * UCHAR WordCount; Count of parameter words = 26 139 * UCHAR AndXCommand; Secondary 0xFF = None 140 * command; 141 * UCHAR AndXReserved; MBZ 142 * USHORT AndXOffset; Offset to next command WordCount 143 * UCHAR OplockLevel; The oplock level granted 144 * 0 - No oplock granted 145 * 1 - Exclusive oplock granted 146 * 2 - Batch oplock granted 147 * 3 - Level II oplock granted 148 * USHORT Fid; The file ID 149 * ULONG CreateAction; The action taken 150 * TIME CreationTime; The time the file was created 151 * TIME LastAccessTime; The time the file was accessed 152 * TIME LastWriteTime; The time the file was last written 153 * TIME ChangeTime; The time the file was last changed 154 * ULONG ExtFileAttributes; The file attributes 155 * LARGE_INTEGER AllocationSize; The number of bytes allocated 156 * LARGE_INTEGER EndOfFile; The end of file offset 157 * USHORT FileType; 158 * USHORT DeviceState; state of IPC device (e.g. pipe) 159 * BOOLEAN Directory; TRUE if this is a directory 160 * USHORT ByteCount; = 0 161 * 162 * The following SMBs may follow SMB_COM_NT_CREATE_ANDX: 163 * 164 * SMB_COM_READ SMB_COM_READ_ANDX 165 * SMB_COM_IOCTL 166 */ 167 smb_sdrc_t 168 smb_pre_nt_create_andx(smb_request_t *sr) 169 { 170 struct open_param *op = &sr->arg.open; 171 uint8_t SecurityFlags; 172 uint32_t ImpersonationLevel; 173 uint16_t NameLength; 174 int rc; 175 176 bzero(op, sizeof (sr->arg.open)); 177 178 rc = smbsr_decode_vwv(sr, "5.wlllqlllllb", 179 &NameLength, 180 &op->nt_flags, 181 &op->rootdirfid, 182 &op->desired_access, 183 &op->dsize, 184 &op->dattr, 185 &op->share_access, 186 &op->create_disposition, 187 &op->create_options, 188 &ImpersonationLevel, 189 &SecurityFlags); 190 191 if (rc == 0) { 192 if (NameLength == 0) { 193 op->fqi.fq_path.pn_path = "\\"; 194 } else if (NameLength >= MAXPATHLEN) { 195 smbsr_error(sr, NT_STATUS_OBJECT_PATH_NOT_FOUND, 196 ERRDOS, ERROR_PATH_NOT_FOUND); 197 rc = -1; 198 } else { 199 rc = smbsr_decode_data(sr, "%#u", sr, NameLength, 200 &op->fqi.fq_path.pn_path); 201 } 202 } 203 204 op->op_oplock_level = SMB_OPLOCK_NONE; 205 if (op->nt_flags & NT_CREATE_FLAG_REQUEST_OPLOCK) { 206 if (op->nt_flags & NT_CREATE_FLAG_REQUEST_OPBATCH) 207 op->op_oplock_level = SMB_OPLOCK_BATCH; 208 else 209 op->op_oplock_level = SMB_OPLOCK_EXCLUSIVE; 210 } 211 212 DTRACE_SMB_2(op__NtCreateX__start, smb_request_t *, sr, 213 struct open_param *, op); 214 215 return ((rc == 0) ? SDRC_SUCCESS : SDRC_ERROR); 216 } 217 218 void 219 smb_post_nt_create_andx(smb_request_t *sr) 220 { 221 DTRACE_SMB_1(op__NtCreateX__done, smb_request_t *, sr); 222 223 if (sr->arg.open.dir != NULL) { 224 smb_ofile_release(sr->arg.open.dir); 225 sr->arg.open.dir = NULL; 226 } 227 } 228 229 smb_sdrc_t 230 smb_com_nt_create_andx(struct smb_request *sr) 231 { 232 struct open_param *op = &sr->arg.open; 233 unsigned char DirFlag; 234 smb_attr_t attr; 235 smb_node_t *node; 236 int rc; 237 238 if ((op->create_options & FILE_DELETE_ON_CLOSE) && 239 !(op->desired_access & DELETE)) { 240 smbsr_error(sr, NT_STATUS_INVALID_PARAMETER, 241 ERRDOS, ERRbadaccess); 242 return (SDRC_ERROR); 243 } 244 245 if (op->create_disposition > FILE_MAXIMUM_DISPOSITION) { 246 smbsr_error(sr, NT_STATUS_INVALID_PARAMETER, 247 ERRDOS, ERRbadaccess); 248 return (SDRC_ERROR); 249 } 250 251 if (op->dattr & FILE_FLAG_WRITE_THROUGH) 252 op->create_options |= FILE_WRITE_THROUGH; 253 254 if (op->dattr & FILE_FLAG_DELETE_ON_CLOSE) 255 op->create_options |= FILE_DELETE_ON_CLOSE; 256 257 if (op->dattr & FILE_FLAG_BACKUP_SEMANTICS) 258 op->create_options |= FILE_OPEN_FOR_BACKUP_INTENT; 259 260 if (op->create_options & FILE_OPEN_FOR_BACKUP_INTENT) 261 sr->user_cr = smb_user_getprivcred(sr->uid_user); 262 263 if (op->rootdirfid == 0) { 264 op->fqi.fq_dnode = sr->tid_tree->t_snode; 265 } else { 266 op->dir = smb_ofile_lookup_by_fid(sr->tid_tree, 267 (uint16_t)op->rootdirfid); 268 if (op->dir == NULL) { 269 smbsr_error(sr, NT_STATUS_INVALID_HANDLE, 270 ERRDOS, ERRbadfid); 271 return (SDRC_ERROR); 272 } 273 op->fqi.fq_dnode = op->dir->f_node; 274 } 275 276 op->op_oplock_levelII = B_TRUE; 277 278 if (smb_common_open(sr) != NT_STATUS_SUCCESS) 279 return (SDRC_ERROR); 280 281 switch (sr->tid_tree->t_res_type & STYPE_MASK) { 282 case STYPE_DISKTREE: 283 case STYPE_PRINTQ: 284 if (op->create_options & FILE_DELETE_ON_CLOSE) 285 smb_ofile_set_delete_on_close(sr->fid_ofile); 286 287 node = sr->fid_ofile->f_node; 288 DirFlag = smb_node_is_dir(node) ? 1 : 0; 289 if (smb_node_getattr(sr, node, &attr) != 0) { 290 smbsr_error(sr, NT_STATUS_INTERNAL_ERROR, 291 ERRDOS, ERROR_INTERNAL_ERROR); 292 return (SDRC_ERROR); 293 } 294 295 rc = smbsr_encode_result(sr, 34, 0, "bb.wbwlTTTTlqqwwbw", 296 34, 297 sr->andx_com, 298 0x67, 299 op->op_oplock_level, 300 sr->smb_fid, 301 op->action_taken, 302 &attr.sa_crtime, 303 &attr.sa_vattr.va_atime, 304 &attr.sa_vattr.va_mtime, 305 &attr.sa_vattr.va_ctime, 306 op->dattr & FILE_ATTRIBUTE_MASK, 307 attr.sa_allocsz, 308 attr.sa_vattr.va_size, 309 op->ftype, 310 op->devstate, 311 DirFlag, 312 0); 313 break; 314 315 case STYPE_IPC: 316 rc = smbsr_encode_result(sr, 34, 0, "bb.wbwlqqqqlqqwwbw", 317 34, 318 sr->andx_com, 319 0x67, 320 0, 321 sr->smb_fid, 322 op->action_taken, 323 0LL, 324 0LL, 325 0LL, 326 0LL, 327 FILE_ATTRIBUTE_NORMAL, 328 0x1000LL, 329 0LL, 330 op->ftype, 331 op->devstate, 332 0, 333 0); 334 break; 335 336 default: 337 smbsr_error(sr, NT_STATUS_INVALID_DEVICE_REQUEST, 338 ERRDOS, ERROR_INVALID_FUNCTION); 339 return (SDRC_ERROR); 340 } 341 342 return ((rc == 0) ? SDRC_SUCCESS : SDRC_ERROR); 343 } 344