1 /*
2 * CDDL HEADER START
3 *
4 * The contents of this file are subject to the terms of the
5 * Common Development and Distribution License (the "License").
6 * You may not use this file except in compliance with the License.
7 *
8 * You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE
9 * or http://www.opensolaris.org/os/licensing.
10 * See the License for the specific language governing permissions
11 * and limitations under the License.
12 *
13 * When distributing Covered Code, include this CDDL HEADER in each
14 * file and include the License file at usr/src/OPENSOLARIS.LICENSE.
15 * If applicable, add the following below this CDDL HEADER, with the
16 * fields enclosed by brackets "[]" replaced with your own identifying
17 * information: Portions Copyright [yyyy] [name of copyright owner]
18 *
19 * CDDL HEADER END
20 */
21 /*
22 * Copyright (c) 2007, 2010, Oracle and/or its affiliates. All rights reserved.
23 * Copyright 2022 Tintri by DDN, Inc. All rights reserved.
24 * Copyright 2022-2023 RackTop Systems, Inc.
25 */
26
27 /*
28 * General Structures Layout
29 * -------------------------
30 *
31 * This is a simplified diagram showing the relationship between most of the
32 * main structures.
33 *
34 * +-------------------+
35 * | SMB_INFO |
36 * +-------------------+
37 * |
38 * |
39 * v
40 * +-------------------+ +-------------------+ +-------------------+
41 * | SESSION |<----->| SESSION |......| SESSION |
42 * +-------------------+ +-------------------+ +-------------------+
43 * | |
44 * | |
45 * | v
46 * | +-------------------+ +-------------------+ +-------------------+
47 * | | USER |<--->| USER |...| USER |
48 * | +-------------------+ +-------------------+ +-------------------+
49 * |
50 * |
51 * v
52 * +-------------------+ +-------------------+ +-------------------+
53 * | TREE |<----->| TREE |......| TREE |
54 * +-------------------+ +-------------------+ +-------------------+
55 * | |
56 * | |
57 * | v
58 * | +-------+ +-------+ +-------+
59 * | | OFILE |<----->| OFILE |......| OFILE |
60 * | +-------+ +-------+ +-------+
61 * |
62 * |
63 * v
64 * +-------+ +------+ +------+
65 * | ODIR |<----->| ODIR |......| ODIR |
66 * +-------+ +------+ +------+
67 *
68 *
69 * Odir State Machine
70 * ------------------
71 *
72 * +-------------------------+
73 * | SMB_ODIR_STATE_OPEN |<----------- open / creation
74 * +-------------------------+
75 * | ^
76 * | (first) | (last)
77 * | lookup | release
78 * v |
79 * +-------------------------+
80 * | SMB_ODIR_STATE_IN_USE |----
81 * +-------------------------+ | lookup / release / read
82 * | ^-------
83 * | close
84 * |
85 * v
86 * +-------------------------+
87 * | SMB_ODIR_STATE_CLOSING |----
88 * +-------------------------+ | close / release / read
89 * | ^-------
90 * | (last) release
91 * |
92 * v
93 * +-------------------------+
94 * | SMB_ODIR_STATE_CLOSED |----------> deletion
95 * +-------------------------+
96 *
97 *
98 * SMB_ODIR_STATE_OPEN
99 * - the odir exists in the list of odirs of its tree
100 * - lookup is valid in this state. It will place a hold on the odir
101 * by incrementing the reference count and the odir will transition
102 * to SMB_ODIR_STATE_IN_USE
103 * - read/close/release not valid in this state
104 *
105 * SMB_ODIR_STATE_IN_USE
106 * - the odir exists in the list of odirs of its tree.
107 * - lookup is valid in this state. It will place a hold on the odir
108 * by incrementing the reference count.
109 * - if the last hold is released the odir will transition
110 * back to SMB_ODIR_STATE_OPEN
111 * - if a close is received the odir will transition to
112 * SMB_ODIR_STATE_CLOSING.
113 *
114 * SMB_ODIR_STATE_CLOSING
115 * - the odir exists in the list of odirs of its tree.
116 * - lookup will fail in this state.
117 * - when the last hold is released the odir will transition
118 * to SMB_ODIR_STATE_CLOSED.
119 *
120 * SMB_ODIR_STATE_CLOSED
121 * - the odir exists in the list of odirs of its tree.
122 * - there are no users of the odir (refcnt == 0)
123 * - the odir is being removed from the tree's list and deleted.
124 * - lookup will fail in this state.
125 * - read/close/release not valid in this state
126 *
127 * Comments
128 * --------
129 * The state machine of the odir structures is controlled by 3 elements:
130 * - The list of odirs of the tree it belongs to.
131 * - The mutex embedded in the structure itself.
132 * - The reference count.
133 *
134 * There's a mutex embedded in the odir structure used to protect its fields
135 * and there's a lock embedded in the list of odirs of a tree. To
136 * increment or to decrement the reference count the mutex must be entered.
137 * To insert the odir into the list of odirs of the tree and to remove
138 * the odir from it, the lock must be entered in RW_WRITER mode.
139 *
140 * In order to avoid deadlocks, when both (mutex and lock of the odir
141 * list) have to be entered, the lock must be entered first.
142 *
143 *
144 * Odir Interface
145 * ---------------
146 * smb_odir_open(char *pathname)
147 * Create an odir representing the directory specified in pathname and
148 * add it into the tree's list of odirs.
149 * Returns NT status.
150 *
151 * smb_odir_openfh(smb_ofile_t *of)
152 * Create an odir representing the directory specified by the
153 * existing open handle (from a prior open of the directory).
154 * Returns NT status.
155 *
156 * smb_odir_openat(smb_node_t *unode)
157 * Create an odir representing the extended attribute directory
158 * associated with the file (or directory) represented by unode
159 * and add it into the tree's list of odirs.
160 * Returns NT status.
161 *
162 * smb_odir_t *odir = smb_tree_lookup_odir(..., odid)
163 * Find the odir corresponding to the specified odid in the tree's
164 * list of odirs. Place a hold on the odir.
165 *
166 * smb_odir_read(..., smb_odirent_t *odirent)
167 * Find the next directory entry in the odir and return it in odirent.
168 *
169 * smb_odir_read_fileinfo(..., smb_fileinfo_t *)
170 * Find the next directory entry in the odir. Return the details of
171 * the directory entry in smb_fileinfo_t. (See odir internals below)
172 *
173 * smb_odir_read_streaminfo(..., smb_streaminfo_t *)
174 * Find the next named stream entry in the odir. Return the details of
175 * the named stream in smb_streaminfo_t.
176 *
177 * smb_odir_close(smb_odir_t *odir)
178 * Close the odir.
179 * The caller of close must have a hold on the odir being closed.
180 * The hold should be released after closing.
181 *
182 * smb_odir_release(smb_odir_t *odir)
183 * Release the hold on the odir, obtained by lookup.
184 *
185 *
186 * Odir Internals
187 * --------------
188 * The odir object represent an open directory search. Each read operation
189 * provides the caller with a structure containing information pertaining
190 * to the next directory entry that matches the search criteria, namely
191 * the filename or match pattern and, in the case of smb_odir_read_fileinfo(),
192 * the search attributes.
193 *
194 * The odir maintains a buffer (d_buf) of directory entries read from
195 * the filesystem via a vop_readdir. The buffer is populated when a read
196 * request (smb_odir_next_odirent) finds that the buffer is empty or that
197 * the end of the buffer has been reached, and also when a new client request
198 * (find next) begins.
199 *
200 * The data in d_buf (that which is returned from the file system) can
201 * be in one of two formats. If the file system supports extended directory
202 * entries we request that the data be returned as edirent_t structures. If
203 * it does not the data will be returned as dirent64_t structures. For
204 * convenience, when the next directory entry is read from d_buf by
205 * smb_odir_next_odirent it is translated into an smb_odirent_t.
206 *
207 * smb_odir_read_fileinfo
208 * The processing required to obtain the information to populate the caller's
209 * smb_fileinfo_t differs depending upon whether the directory search is for a
210 * single specified filename or for multiple files matching a search pattern.
211 * Thus smb_odir_read_fileinfo uses two static functions:
212 * smb_odir_single_fileinfo - obtains the smb_fileinfo_t info for the single
213 * filename as specified in smb_odir_open request.
214 * smb_odir_wildcard_fileinfo - obtains the smb_fileinfo_t info for the filename
215 * returned from the smb_odir_next_odirent. This is called in a loop until
216 * an entry matching the search criteria is found or no more entries exist.
217 *
218 * If a directory entry is a VLNK, the name returned in the smb_fileinfo_t
219 * is the name of the directory entry but the attributes are the attribites
220 * of the file that is the target of the link. If the link target cannot
221 * be found the attributes returned are the attributes of the link itself.
222 *
223 * smb_odir_read_streaminfo
224 * In order for an odir to provide information about stream files it
225 * must be opened with smb_odir_openat(). smb_odir_read_streaminfo() can
226 * then be used to obtain the name and size of named stream files.
227 *
228 * Resuming a Search
229 * -----------------
230 * A directory search often consists of multiple client requests: an initial
231 * find_first request followed by zero or more find_next requests and a
232 * find_close request.
233 * The find_first request will open and lookup the odir, read its desired
234 * number of entries from the odir, then release the odir and return.
235 * A find_next request will lookup the odir and read its desired number of
236 * entries from the odir, then release the odir and return.
237 * At the end of the search the find_close request will close the odir.
238 *
239 * In order to be able to resume a directory search (find_next) the odir
240 * provides the capability for the caller to save one or more resume points
241 * (cookies) at the end of a request, and to specify which resume point
242 * (cookie) to restart from at the beginning of the next search.
243 * smb_odir_save_cookie(..., cookie)
244 * smb_odir_resume_at(smb_odir_resume_t *resume)
245 * A search can be resumed at a specified resume point (cookie), the resume
246 * point (cookie) stored at a specified index in the d_cookies array, or
247 * a specified filename. The latter (specified filename) is not yet supported.
248 *
249 * See smb_search, smb_find, smb_find_unique, and smb_trans2_find for details
250 */
251
252 #include <smbsrv/smb_kproto.h>
253 #include <smbsrv/smb_fsops.h>
254 #include <smbsrv/smb_share.h>
255 #include <sys/extdirent.h>
256
257 /* static functions */
258 static smb_odir_t *smb_odir_create(smb_request_t *, smb_node_t *,
259 const char *, uint16_t, uint16_t, cred_t *);
260 static int smb_odir_single_fileinfo(smb_request_t *, smb_odir_t *,
261 smb_fileinfo_t *);
262 static int smb_odir_wildcard_fileinfo(smb_request_t *, smb_odir_t *,
263 smb_odirent_t *, smb_fileinfo_t *);
264 static int smb_odir_next_odirent(smb_odir_t *, smb_odirent_t *);
265 static boolean_t smb_odir_lookup_link(smb_request_t *, smb_odir_t *,
266 char *, smb_node_t **);
267 static boolean_t smb_odir_match_name(smb_odir_t *, smb_odirent_t *);
268 static void smb_odir_delete(void *);
269
270
271 /*
272 * smb_odir_openpath
273 *
274 * Create an odir representing the directory specified in pathname.
275 *
276 * Returns:
277 * NT Status
278 */
279 uint32_t
smb_odir_openpath(smb_request_t * sr,char * path,uint16_t sattr,uint32_t flags,smb_odir_t ** odp)280 smb_odir_openpath(smb_request_t *sr, char *path, uint16_t sattr,
281 uint32_t flags, smb_odir_t **odp)
282 {
283 int rc;
284 smb_tree_t *tree;
285 smb_node_t *dnode;
286 char pattern[MAXNAMELEN];
287 uint16_t odid;
288 cred_t *cr;
289
290 ASSERT(sr);
291 ASSERT(sr->sr_magic == SMB_REQ_MAGIC);
292 ASSERT(sr->tid_tree);
293 ASSERT(sr->tid_tree->t_magic == SMB_TREE_MAGIC);
294 *odp = NULL;
295
296 tree = sr->tid_tree;
297
298 if (sr->session->dialect < NT_LM_0_12)
299 smb_convert_wildcards(path);
300
301 rc = smb_pathname_reduce(sr, sr->user_cr, path,
302 tree->t_snode, tree->t_snode, &dnode, pattern);
303 if (rc != 0)
304 return (smb_errno2status(rc));
305
306 if (!smb_node_is_dir(dnode)) {
307 smb_node_release(dnode);
308 return (NT_STATUS_OBJECT_PATH_NOT_FOUND);
309 }
310
311 if (smb_fsop_access(sr, sr->user_cr, dnode, FILE_LIST_DIRECTORY) != 0) {
312 smb_node_release(dnode);
313 return (NT_STATUS_ACCESS_DENIED);
314 }
315
316 if (smb_idpool_alloc(&tree->t_odid_pool, &odid)) {
317 smb_node_release(dnode);
318 return (NT_STATUS_TOO_MANY_OPENED_FILES);
319 }
320
321 if (flags & SMB_ODIR_OPENF_BACKUP_INTENT)
322 cr = smb_user_getprivcred(sr->uid_user);
323 else
324 cr = sr->uid_user->u_cred;
325
326 *odp = smb_odir_create(sr, dnode, pattern, sattr, odid, cr);
327 smb_node_release(dnode);
328
329 return (0);
330 }
331
332 /*
333 * smb_odir_openfh
334 *
335 * Create an odir representing the directory already opened on "of".
336 *
337 * Returns:
338 * NT status
339 */
340 uint32_t
smb_odir_openfh(smb_request_t * sr,const char * pattern,uint16_t sattr,smb_odir_t ** odp)341 smb_odir_openfh(smb_request_t *sr, const char *pattern, uint16_t sattr,
342 smb_odir_t **odp)
343 {
344 smb_ofile_t *of = sr->fid_ofile;
345
346 *odp = NULL;
347
348 if (of->f_node == NULL || !smb_node_is_dir(of->f_node))
349 return (NT_STATUS_INVALID_PARAMETER);
350
351 if ((of->f_granted_access & FILE_LIST_DIRECTORY) == 0)
352 return (NT_STATUS_ACCESS_DENIED);
353
354 *odp = smb_odir_create(sr, of->f_node, pattern, sattr, 0, of->f_cr);
355
356 return (0);
357 }
358
359 /*
360 * smb_odir_openat
361 *
362 * Create an odir representing the extended attribute directory
363 * associated with the file (or directory) represented by unode.
364 *
365 * Returns:
366 * NT status
367 */
368 uint32_t
smb_odir_openat(smb_request_t * sr,smb_node_t * unode,smb_odir_t ** odp,boolean_t restricted)369 smb_odir_openat(smb_request_t *sr, smb_node_t *unode, smb_odir_t **odp,
370 boolean_t restricted)
371 {
372 char pattern[SMB_STREAM_PREFIX_LEN + 2];
373 vnode_t *xattr_dvp;
374 cred_t *cr;
375 smb_node_t *xattr_dnode;
376 int rc;
377
378 ASSERT(sr);
379 ASSERT(sr->sr_magic == SMB_REQ_MAGIC);
380 ASSERT(unode);
381 ASSERT(unode->n_magic == SMB_NODE_MAGIC);
382 *odp = NULL;
383
384 if (SMB_TREE_CONTAINS_NODE(sr, unode) == 0 ||
385 SMB_TREE_HAS_ACCESS(sr, ACE_LIST_DIRECTORY) == 0)
386 return (NT_STATUS_ACCESS_DENIED);
387
388 cr = zone_kcred();
389
390 /* find the xattrdir vnode */
391 rc = smb_vop_lookup_xattrdir(unode->vp, &xattr_dvp, LOOKUP_XATTR, cr);
392 if (rc != 0)
393 return (smb_errno2status(rc));
394
395 /* lookup the xattrdir's smb_node */
396 xattr_dnode = smb_node_lookup(sr, NULL, cr, xattr_dvp, XATTR_DIR,
397 unode, NULL);
398 VN_RELE(xattr_dvp);
399 if (xattr_dnode == NULL)
400 return (NT_STATUS_NO_MEMORY);
401
402 (void) snprintf(pattern, sizeof (pattern), "%s*", SMB_STREAM_PREFIX);
403 *odp = smb_odir_create(sr, xattr_dnode, pattern,
404 SMB_SEARCH_ATTRIBUTES, 0, cr);
405
406 /* Causes restricted stream names to be hidden from the caller */
407 if (restricted)
408 (*odp)->d_flags |= SMB_ODIR_FLAG_RESTRICTED;
409
410 smb_node_release(xattr_dnode);
411 return (0);
412 }
413
414 /*
415 * smb_odir_hold
416 *
417 * A hold will only be granted if the odir is open or in_use.
418 */
419 boolean_t
smb_odir_hold(smb_odir_t * od)420 smb_odir_hold(smb_odir_t *od)
421 {
422 ASSERT(od);
423 ASSERT(od->d_magic == SMB_ODIR_MAGIC);
424
425 mutex_enter(&od->d_mutex);
426
427 switch (od->d_state) {
428 case SMB_ODIR_STATE_OPEN:
429 od->d_refcnt++;
430 od->d_state = SMB_ODIR_STATE_IN_USE;
431 break;
432 case SMB_ODIR_STATE_IN_USE:
433 od->d_refcnt++;
434 break;
435 case SMB_ODIR_STATE_CLOSING:
436 case SMB_ODIR_STATE_CLOSED:
437 default:
438 mutex_exit(&od->d_mutex);
439 return (B_FALSE);
440 }
441
442 mutex_exit(&od->d_mutex);
443 return (B_TRUE);
444 }
445
446 /*
447 * If the odir is in SMB_ODIR_STATE_CLOSING and this release results in
448 * a refcnt of 0, change the state to SMB_ODIR_STATE_CLOSED and post the
449 * object for deletion. Object deletion is deferred to avoid modifying
450 * a list while an iteration may be in progress.
451 */
452 void
smb_odir_release(smb_odir_t * od)453 smb_odir_release(smb_odir_t *od)
454 {
455 smb_tree_t *tree = od->d_tree;
456
457 SMB_ODIR_VALID(od);
458
459 mutex_enter(&od->d_mutex);
460 ASSERT(od->d_refcnt > 0);
461
462 switch (od->d_state) {
463 case SMB_ODIR_STATE_OPEN:
464 break;
465 case SMB_ODIR_STATE_IN_USE:
466 od->d_refcnt--;
467 if (od->d_refcnt == 0)
468 od->d_state = SMB_ODIR_STATE_OPEN;
469 break;
470 case SMB_ODIR_STATE_CLOSING:
471 od->d_refcnt--;
472 if (od->d_refcnt == 0) {
473 od->d_state = SMB_ODIR_STATE_CLOSED;
474 smb_llist_post(&tree->t_odir_list, od,
475 smb_odir_delete);
476 }
477 break;
478 case SMB_ODIR_STATE_CLOSED:
479 default:
480 break;
481 }
482
483 mutex_exit(&od->d_mutex);
484 }
485
486 /*
487 * smb_odir_close
488 */
489 void
smb_odir_close(smb_odir_t * od)490 smb_odir_close(smb_odir_t *od)
491 {
492 ASSERT(od);
493 ASSERT(od->d_magic == SMB_ODIR_MAGIC);
494
495 mutex_enter(&od->d_mutex);
496 ASSERT(od->d_refcnt > 0);
497 switch (od->d_state) {
498 case SMB_ODIR_STATE_OPEN:
499 break;
500 case SMB_ODIR_STATE_IN_USE:
501 od->d_state = SMB_ODIR_STATE_CLOSING;
502 break;
503 case SMB_ODIR_STATE_CLOSING:
504 case SMB_ODIR_STATE_CLOSED:
505 default:
506 break;
507 }
508 mutex_exit(&od->d_mutex);
509 }
510
511 /*
512 * smb_odir_read
513 *
514 * Find the next directory entry matching the search pattern.
515 * No search attribute matching is performed.
516 *
517 * Returns:
518 * 0 - success.
519 * - If a matching entry was found eof will be B_FALSE and
520 * odirent will be populated.
521 * ENOENT
522 * - If we've scanned to the end, eof will be B_TRUE.
523 * errno - other errors
524 */
525 int
smb_odir_read(smb_request_t * sr,smb_odir_t * od,smb_odirent_t * odirent,boolean_t * eof)526 smb_odir_read(smb_request_t *sr, smb_odir_t *od,
527 smb_odirent_t *odirent, boolean_t *eof)
528 {
529 int rc;
530
531 ASSERT(sr);
532 ASSERT(sr->sr_magic == SMB_REQ_MAGIC);
533 ASSERT(od);
534 ASSERT(od->d_magic == SMB_ODIR_MAGIC);
535 ASSERT(odirent);
536
537 mutex_enter(&od->d_mutex);
538 ASSERT(od->d_refcnt > 0);
539
540 switch (od->d_state) {
541 case SMB_ODIR_STATE_IN_USE:
542 case SMB_ODIR_STATE_CLOSING:
543 break;
544 case SMB_ODIR_STATE_OPEN:
545 case SMB_ODIR_STATE_CLOSED:
546 default:
547 mutex_exit(&od->d_mutex);
548 return (EBADF);
549 }
550
551 for (;;) {
552 if ((rc = smb_odir_next_odirent(od, odirent)) != 0)
553 break;
554 if (smb_odir_match_name(od, odirent))
555 break;
556 }
557
558 mutex_exit(&od->d_mutex);
559
560 switch (rc) {
561 case 0:
562 *eof = B_FALSE;
563 return (0);
564 case ENOENT:
565 *eof = B_TRUE;
566 /* FALLTHROUGH */
567 default:
568 return (rc);
569 }
570 }
571
572 /*
573 * smb_odir_read_fileinfo
574 *
575 * Find the next directory entry matching the search pattern
576 * and attributes: od->d_pattern and od->d_sattr.
577 *
578 * If the search pattern specifies a single filename call
579 * smb_odir_single_fileinfo to get the file attributes and
580 * populate the caller's smb_fileinfo_t.
581 *
582 * If the search pattern contains wildcards call smb_odir_next_odirent
583 * to get the next directory entry then. Repeat until a matching
584 * filename is found. Call smb_odir_wildcard_fileinfo to get the
585 * file attributes and populate the caller's smb_fileinfo_t.
586 * This is repeated until a file matching the search criteria is found.
587 *
588 * Returns:
589 * 0 - success.
590 * - If a matching entry was found eof will be B_FALSE and
591 * fileinfo will be populated.
592 * ENOENT
593 * - If at end of dir, eof will be B_TRUE.
594 * errno - other error
595 */
596 int
smb_odir_read_fileinfo(smb_request_t * sr,smb_odir_t * od,smb_fileinfo_t * fileinfo,uint16_t * eof)597 smb_odir_read_fileinfo(smb_request_t *sr, smb_odir_t *od,
598 smb_fileinfo_t *fileinfo, uint16_t *eof)
599 {
600 int rc, errnum;
601 smb_odirent_t *odirent;
602
603 ASSERT(sr);
604 ASSERT(sr->sr_magic == SMB_REQ_MAGIC);
605 ASSERT(od);
606 ASSERT(od->d_magic == SMB_ODIR_MAGIC);
607 ASSERT(fileinfo);
608
609 mutex_enter(&od->d_mutex);
610 ASSERT(od->d_refcnt > 0);
611
612 switch (od->d_state) {
613 case SMB_ODIR_STATE_IN_USE:
614 case SMB_ODIR_STATE_CLOSING:
615 break;
616 case SMB_ODIR_STATE_OPEN:
617 case SMB_ODIR_STATE_CLOSED:
618 default:
619 mutex_exit(&od->d_mutex);
620 return (SET_ERROR(EBADF));
621 }
622
623 if ((od->d_flags & SMB_ODIR_FLAG_WILDCARDS) == 0) {
624 if (od->d_eof)
625 rc = SET_ERROR(ENOENT);
626 else
627 rc = smb_odir_single_fileinfo(sr, od, fileinfo);
628 od->d_eof = B_TRUE;
629 } else {
630 odirent = kmem_alloc(sizeof (smb_odirent_t), KM_SLEEP);
631 for (;;) {
632 mutex_enter(&sr->sr_mutex);
633 if (sr->sr_state != SMB_REQ_STATE_ACTIVE) {
634 mutex_exit(&sr->sr_mutex);
635 rc = SET_ERROR(EINTR);
636 break;
637 }
638 mutex_exit(&sr->sr_mutex);
639 bzero(fileinfo, sizeof (smb_fileinfo_t));
640 if ((rc = smb_odir_next_odirent(od, odirent)) != 0)
641 break;
642
643 /* skip non utf8 filename */
644 if (u8_validate(odirent->od_name,
645 strlen(odirent->od_name), NULL,
646 U8_VALIDATE_ENTIRE, &errnum) < 0)
647 continue;
648
649 if (!smb_odir_match_name(od, odirent))
650 continue;
651
652 rc = smb_odir_wildcard_fileinfo(sr, od, odirent,
653 fileinfo);
654 if (rc == 0)
655 break;
656 }
657 kmem_free(odirent, sizeof (smb_odirent_t));
658 }
659 mutex_exit(&od->d_mutex);
660
661 switch (rc) {
662 case 0:
663 *eof = 0;
664 return (0);
665 case ENOENT:
666 *eof = 1; /* per. FindFirst, FindNext spec. */
667 /* FALLTHROUGH */
668 default:
669 return (rc);
670 }
671 }
672
673 /*
674 * smb_odir_read_streaminfo
675 *
676 * Find the next directory entry whose name begins with SMB_STREAM_PREFIX,
677 * and thus represents an NTFS named stream.
678 * No search attribute matching is performed.
679 * No case conflict name mangling is required for NTFS named stream names.
680 *
681 * Returns:
682 * 0 - success.
683 * - If a matching entry was found eof will be B_FALSE and
684 * sinfo will be populated.
685 * - If there are no matching entries eof will be B_TRUE.
686 * errno - error
687 */
688 int
smb_odir_read_streaminfo(smb_request_t * sr,smb_odir_t * od,smb_streaminfo_t * sinfo,boolean_t * eof)689 smb_odir_read_streaminfo(smb_request_t *sr, smb_odir_t *od,
690 smb_streaminfo_t *sinfo, boolean_t *eof)
691 {
692 int rc;
693 cred_t *kcr;
694 smb_odirent_t *odirent;
695 smb_node_t *fnode;
696 smb_attr_t attr;
697
698 ASSERT(sr);
699 ASSERT(sr->sr_magic == SMB_REQ_MAGIC);
700 ASSERT(od);
701 ASSERT(od->d_magic == SMB_ODIR_MAGIC);
702 ASSERT(sinfo);
703
704 kcr = zone_kcred();
705
706 mutex_enter(&od->d_mutex);
707 ASSERT(od->d_refcnt > 0);
708
709 switch (od->d_state) {
710 case SMB_ODIR_STATE_IN_USE:
711 case SMB_ODIR_STATE_CLOSING:
712 break;
713 case SMB_ODIR_STATE_OPEN:
714 case SMB_ODIR_STATE_CLOSED:
715 default:
716 mutex_exit(&od->d_mutex);
717 return (EBADF);
718 }
719
720 /* Check that odir represents an xattr directory */
721 if (!(od->d_flags & SMB_ODIR_FLAG_XATTR)) {
722 *eof = B_TRUE;
723 mutex_exit(&od->d_mutex);
724 return (0);
725 }
726
727 odirent = kmem_alloc(sizeof (smb_odirent_t), KM_SLEEP);
728 bzero(&attr, sizeof (attr));
729
730 for (;;) {
731 bzero(sinfo, sizeof (smb_streaminfo_t));
732 if ((rc = smb_odir_next_odirent(od, odirent)) != 0)
733 break;
734
735 if (strncmp(odirent->od_name, SMB_STREAM_PREFIX,
736 SMB_STREAM_PREFIX_LEN)) {
737 continue;
738 }
739
740 /*
741 * Hide streams that would be restricted if the caller
742 * is also restricted.
743 */
744 if ((od->d_flags & SMB_ODIR_FLAG_RESTRICTED) != 0 &&
745 smb_strname_restricted(odirent->od_name))
746 continue;
747
748 rc = smb_fsop_lookup(sr, od->d_cred, 0, od->d_tree->t_snode,
749 od->d_dnode, odirent->od_name, &fnode);
750 if (rc == 0) {
751 /*
752 * We just need the file sizes, and don't want
753 * EACCES failures here, so use kcred and pass
754 * NULL as the sr to skip sr->fid-ofile checks.
755 */
756 attr.sa_mask = SMB_AT_SIZE | SMB_AT_ALLOCSZ;
757 rc = smb_node_getattr(NULL, fnode, kcr, NULL, &attr);
758 smb_node_release(fnode);
759 }
760
761 if (rc == 0) {
762 (void) strlcpy(sinfo->si_name,
763 odirent->od_name + SMB_STREAM_PREFIX_LEN,
764 sizeof (sinfo->si_name));
765 sinfo->si_size = attr.sa_vattr.va_size;
766 sinfo->si_alloc_size = attr.sa_allocsz;
767 break;
768 }
769 }
770 mutex_exit(&od->d_mutex);
771
772 kmem_free(odirent, sizeof (smb_odirent_t));
773
774 switch (rc) {
775 case 0:
776 *eof = B_FALSE;
777 return (0);
778 case ENOENT:
779 *eof = B_TRUE;
780 return (0);
781 default:
782 return (rc);
783 }
784 }
785
786 /*
787 * smb_odir_save_cookie
788 *
789 * Callers can save up to SMB_MAX_SEARCH cookies in the odir
790 * to be used as resume points for a 'find next' request.
791 */
792 void
smb_odir_save_cookie(smb_odir_t * od,int idx,uint32_t cookie)793 smb_odir_save_cookie(smb_odir_t *od, int idx, uint32_t cookie)
794 {
795 ASSERT(od);
796 ASSERT(od->d_magic == SMB_ODIR_MAGIC);
797 ASSERT(idx >= 0 && idx < SMB_MAX_SEARCH);
798
799 mutex_enter(&od->d_mutex);
800 od->d_cookies[idx] = cookie;
801 mutex_exit(&od->d_mutex);
802 }
803
804 /*
805 * smb_odir_save_fname
806 *
807 * Save a filename / offset pair, which are basically a
808 * one entry cache. See smb_com_trans2_find_next2.
809 */
810 void
smb_odir_save_fname(smb_odir_t * od,uint32_t cookie,const char * fname)811 smb_odir_save_fname(smb_odir_t *od, uint32_t cookie, const char *fname)
812 {
813 ASSERT(od);
814 ASSERT(od->d_magic == SMB_ODIR_MAGIC);
815
816 mutex_enter(&od->d_mutex);
817
818 od->d_last_cookie = cookie;
819 bzero(od->d_last_name, MAXNAMELEN);
820 if (fname != NULL)
821 (void) strlcpy(od->d_last_name, fname, MAXNAMELEN);
822
823 mutex_exit(&od->d_mutex);
824 }
825
826 /*
827 * smb_odir_resume_at
828 *
829 * If SMB_ODIR_FLAG_WILDCARDS is not set, and we're rewinding,
830 * assume we're no longer at EOF.
831 *
832 * Wildcard searching can be resumed from:
833 * - the cookie saved at a specified index (SMBsearch, SMBfind).
834 * - a specified cookie (SMB_trans2_find)
835 * - a specified filename (SMB_trans2_find) - NOT SUPPORTED.
836 * Defaults to continuing from where the last search ended.
837 *
838 * Continuation from where the last search ended (SMB_trans2_find)
839 * is implemented by saving the last cookie at a specific index (0)
840 * smb_odir_resume_at indicates a new request, so reset od->d_bufptr
841 * and d_eof to force a vop_readdir.
842 */
843 void
smb_odir_resume_at(smb_odir_t * od,smb_odir_resume_t * resume)844 smb_odir_resume_at(smb_odir_t *od, smb_odir_resume_t *resume)
845 {
846 uint64_t save_offset;
847
848 ASSERT(od);
849 ASSERT(od->d_magic == SMB_ODIR_MAGIC);
850 ASSERT(resume);
851
852 if ((od->d_flags & SMB_ODIR_FLAG_WILDCARDS) == 0) {
853 if (resume->or_type == SMB_ODIR_RESUME_COOKIE)
854 od->d_eof = B_FALSE;
855 return;
856 }
857 mutex_enter(&od->d_mutex);
858
859 save_offset = od->d_offset;
860 switch (resume->or_type) {
861
862 default:
863 case SMB_ODIR_RESUME_CONT:
864 /* Continue where we left off. */
865 break;
866
867 case SMB_ODIR_RESUME_IDX:
868 /*
869 * This is used only by the (ancient) SMB_SEARCH.
870 * Modern clients use trans2 FindFirst, FindNext.
871 */
872 ASSERT(resume->or_idx >= 0);
873 ASSERT(resume->or_idx < SMB_MAX_SEARCH);
874
875 if ((resume->or_idx < 0) ||
876 (resume->or_idx >= SMB_MAX_SEARCH)) {
877 resume->or_idx = 0;
878 }
879 od->d_offset = od->d_cookies[resume->or_idx];
880 break;
881
882 case SMB_ODIR_RESUME_COOKIE:
883 od->d_offset = resume->or_cookie;
884 break;
885
886 case SMB_ODIR_RESUME_FNAME:
887 /*
888 * If the name matches the last one saved,
889 * use the offset that was saved with it in
890 * the odir. Otherwise use the cookie value
891 * in the resume data from the client.
892 */
893 if (strcmp(resume->or_fname, od->d_last_name) &&
894 od->d_last_cookie != 0) {
895 od->d_offset = od->d_last_cookie;
896 } else if (resume->or_cookie != 0) {
897 od->d_offset = resume->or_cookie;
898 } /* else continue where we left off */
899 break;
900 }
901
902 if (od->d_offset != save_offset) {
903 /* Force a vop_readdir to refresh d_buf */
904 od->d_bufptr = NULL;
905 od->d_eof = B_FALSE;
906 }
907
908 mutex_exit(&od->d_mutex);
909 }
910
911
912 /* *** static functions *** */
913
914 /*
915 * smb_odir_create
916 * Allocate and populate an odir obect and add it to the tree's list.
917 */
918 static smb_odir_t *
smb_odir_create(smb_request_t * sr,smb_node_t * dnode,const char * pattern,uint16_t sattr,uint16_t odid,cred_t * cr)919 smb_odir_create(smb_request_t *sr, smb_node_t *dnode,
920 const char *pattern, uint16_t sattr, uint16_t odid, cred_t *cr)
921 {
922 smb_odir_t *od;
923 smb_tree_t *tree;
924
925 ASSERT(sr);
926 ASSERT(sr->sr_magic == SMB_REQ_MAGIC);
927 ASSERT(sr->tid_tree);
928 ASSERT(sr->tid_tree->t_magic == SMB_TREE_MAGIC);
929 ASSERT(dnode);
930 ASSERT(dnode->n_magic == SMB_NODE_MAGIC);
931
932 tree = sr->tid_tree;
933
934 od = kmem_cache_alloc(smb_cache_odir, KM_SLEEP);
935 bzero(od, sizeof (smb_odir_t));
936
937 mutex_init(&od->d_mutex, NULL, MUTEX_DEFAULT, NULL);
938
939 /*
940 * Return this to the caller as if they had done
941 * smb_tree_lookup_odir() to obtain the odir.
942 */
943 od->d_refcnt = 1;
944 od->d_state = SMB_ODIR_STATE_IN_USE;
945 od->d_magic = SMB_ODIR_MAGIC;
946 od->d_opened_by_pid = sr->smb_pid;
947 od->d_session = tree->t_session;
948 od->d_cred = cr;
949 /*
950 * grab a ref for od->d_user
951 * released in smb_odir_delete()
952 */
953 smb_user_hold_internal(sr->uid_user);
954 od->d_user = sr->uid_user;
955 od->d_tree = tree;
956 od->d_dnode = dnode;
957 smb_node_ref(dnode);
958 od->d_odid = odid;
959 od->d_sattr = sattr;
960 (void) strlcpy(od->d_pattern, pattern, sizeof (od->d_pattern));
961 od->d_flags = 0;
962 if (smb_contains_wildcards(od->d_pattern))
963 od->d_flags |= SMB_ODIR_FLAG_WILDCARDS;
964 if (vfs_has_feature(dnode->vp->v_vfsp, VFSFT_DIRENTFLAGS))
965 od->d_flags |= SMB_ODIR_FLAG_EDIRENT;
966 if (smb_tree_has_feature(tree, SMB_TREE_CASEINSENSITIVE))
967 od->d_flags |= SMB_ODIR_FLAG_IGNORE_CASE;
968 if (smb_tree_has_feature(tree, SMB_TREE_SHORTNAMES))
969 od->d_flags |= SMB_ODIR_FLAG_SHORTNAMES;
970 if (smb_tree_has_feature(tree, SMB_TREE_ACEMASKONACCESS))
971 od->d_flags |= SMB_ODIR_FLAG_ACEACCESS;
972 if (SMB_TREE_SUPPORTS_CATIA(sr))
973 od->d_flags |= SMB_ODIR_FLAG_CATIA;
974 if (SMB_TREE_SUPPORTS_ABE(sr))
975 od->d_flags |= SMB_ODIR_FLAG_ABE;
976 if (dnode->flags & NODE_XATTR_DIR)
977 od->d_flags |= SMB_ODIR_FLAG_XATTR;
978 od->d_eof = B_FALSE;
979
980 smb_llist_enter(&tree->t_odir_list, RW_WRITER);
981 smb_llist_insert_tail(&tree->t_odir_list, od);
982 smb_llist_exit(&tree->t_odir_list);
983
984 atomic_inc_32(&tree->t_session->s_dir_cnt);
985 return (od);
986 }
987
988 /*
989 * Set a new pattern, attributes, and rewind.
990 */
991 void
smb_odir_reopen(smb_odir_t * od,const char * pattern,uint16_t sattr)992 smb_odir_reopen(smb_odir_t *od, const char *pattern, uint16_t sattr)
993 {
994
995 SMB_ODIR_VALID(od);
996
997 mutex_enter(&od->d_mutex);
998 od->d_sattr = sattr;
999 (void) strlcpy(od->d_pattern, pattern, sizeof (od->d_pattern));
1000 if (smb_contains_wildcards(od->d_pattern))
1001 od->d_flags |= SMB_ODIR_FLAG_WILDCARDS;
1002 else
1003 od->d_flags &= ~SMB_ODIR_FLAG_WILDCARDS;
1004
1005 /* Internal smb_odir_resume_at */
1006 od->d_offset = 0;
1007 od->d_bufptr = NULL;
1008 od->d_eof = B_FALSE;
1009
1010 mutex_exit(&od->d_mutex);
1011 }
1012
1013 /*
1014 * Delete an odir.
1015 *
1016 * Remove the odir from the tree list before freeing resources
1017 * associated with the odir.
1018 */
1019 static void
smb_odir_delete(void * arg)1020 smb_odir_delete(void *arg)
1021 {
1022 smb_tree_t *tree;
1023 smb_odir_t *od = (smb_odir_t *)arg;
1024
1025 SMB_ODIR_VALID(od);
1026 ASSERT(od->d_refcnt == 0);
1027 ASSERT(od->d_state == SMB_ODIR_STATE_CLOSED);
1028
1029 tree = od->d_tree;
1030 smb_llist_enter(&tree->t_odir_list, RW_WRITER);
1031 smb_llist_remove(&tree->t_odir_list, od);
1032 if (od->d_odid != 0)
1033 smb_idpool_free(&tree->t_odid_pool, od->d_odid);
1034 atomic_dec_32(&tree->t_session->s_dir_cnt);
1035 smb_llist_exit(&tree->t_odir_list);
1036
1037 /*
1038 * This odir is no longer on t_odir_list, however...
1039 *
1040 * This is called via smb_llist_post, which means it may run
1041 * BEFORE smb_odir_release drops d_mutex (if another thread
1042 * flushes the delete queue before we do). Synchronize.
1043 */
1044 mutex_enter(&od->d_mutex);
1045 mutex_exit(&od->d_mutex);
1046
1047 od->d_magic = 0;
1048 smb_node_release(od->d_dnode);
1049 smb_user_release(od->d_user);
1050 mutex_destroy(&od->d_mutex);
1051 kmem_cache_free(smb_cache_odir, od);
1052 }
1053
1054 boolean_t smb_use_fs_abe = B_FALSE;
1055
1056 /*
1057 * smb_odir_next_odirent
1058 *
1059 * Find the next directory entry in d_buf. If d_bufptr is NULL (buffer
1060 * is empty or we've reached the end of it), read the next set of
1061 * entries from the file system (vop_readdir).
1062 *
1063 * File systems which support VFSFT_EDIRENT_FLAGS will return the
1064 * directory entries as a buffer of edirent_t structure. Others will
1065 * return a buffer of dirent64_t structures. For simplicity translate
1066 * the data into an smb_odirent_t structure.
1067 * The ed_name/d_name in d_buf is NULL terminated by the file system.
1068 *
1069 * Some file systems can have directories larger than SMB_MAXDIRSIZE.
1070 * If the odirent offset >= SMB_MAXDIRSIZE return ENOENT and set d_eof
1071 * to true to stop subsequent calls to smb_vop_readdir.
1072 *
1073 * Returns:
1074 * 0 - success. odirent is populated with the next directory entry
1075 * ENOENT - no more directory entries
1076 * errno - error
1077 */
1078 static int
smb_odir_next_odirent(smb_odir_t * od,smb_odirent_t * odirent)1079 smb_odir_next_odirent(smb_odir_t *od, smb_odirent_t *odirent)
1080 {
1081 int rc;
1082 int reclen;
1083 int eof;
1084 dirent64_t *dp;
1085 edirent_t *edp;
1086 char *np;
1087 uint32_t rddir_flags = 0;
1088
1089 ASSERT(MUTEX_HELD(&od->d_mutex));
1090
1091 bzero(odirent, sizeof (smb_odirent_t));
1092
1093 /*
1094 * VOP_READDIR() won't return until either the buffer has filled or the
1095 * end of the directory is reached. As a result, when we pass this flag,
1096 * calls on very large directories can take an unacceptably long time to
1097 * complete when the user doesn't have access to most entries. Until we
1098 * can cap the amount of time spent in this call, callers will manually
1099 * apply ABE to returned entries, instead of passing this flag.
1100 */
1101 if (smb_use_fs_abe && (od->d_flags & SMB_ODIR_FLAG_ABE) != 0)
1102 rddir_flags |= SMB_ABE;
1103 if (od->d_flags & SMB_ODIR_FLAG_EDIRENT)
1104 rddir_flags |= SMB_EDIRENT;
1105
1106 if (od->d_bufptr != NULL) {
1107 if (od->d_flags & SMB_ODIR_FLAG_EDIRENT)
1108 reclen = od->d_edp->ed_reclen;
1109 else
1110 reclen = od->d_dp->d_reclen;
1111
1112 if (reclen == 0) {
1113 od->d_bufptr = NULL;
1114 } else {
1115 od->d_bufptr += reclen;
1116 if (od->d_bufptr >= od->d_buf + od->d_bufsize)
1117 od->d_bufptr = NULL;
1118 }
1119 }
1120
1121 if (od->d_bufptr == NULL) {
1122 if (od->d_eof)
1123 return (ENOENT);
1124
1125 od->d_bufsize = sizeof (od->d_buf);
1126
1127 rc = smb_vop_readdir(od->d_dnode->vp, od->d_offset,
1128 od->d_buf, &od->d_bufsize, &eof, rddir_flags, od->d_cred);
1129
1130 if ((rc == 0) && (od->d_bufsize == 0))
1131 rc = ENOENT;
1132
1133 if (rc != 0) {
1134 od->d_bufptr = NULL;
1135 od->d_bufsize = 0;
1136 return (rc);
1137 }
1138
1139 od->d_eof = (eof != 0);
1140 od->d_bufptr = od->d_buf;
1141 }
1142
1143 if (od->d_flags & SMB_ODIR_FLAG_EDIRENT)
1144 od->d_offset = od->d_edp->ed_off;
1145 else
1146 od->d_offset = od->d_dp->d_off;
1147
1148 if (od->d_offset >= SMB_MAXDIRSIZE) {
1149 od->d_bufptr = NULL;
1150 od->d_bufsize = 0;
1151 od->d_eof = B_TRUE;
1152 return (ENOENT);
1153 }
1154
1155 if (od->d_flags & SMB_ODIR_FLAG_EDIRENT) {
1156 edp = od->d_edp;
1157 odirent->od_ino = edp->ed_ino;
1158 odirent->od_eflags = edp->ed_eflags;
1159 np = edp->ed_name;
1160 } else {
1161 dp = od->d_dp;
1162 odirent->od_ino = dp->d_ino;
1163 odirent->od_eflags = 0;
1164 np = dp->d_name;
1165 }
1166
1167 if ((od->d_flags & SMB_ODIR_FLAG_CATIA) &&
1168 ((od->d_flags & SMB_ODIR_FLAG_XATTR) == 0)) {
1169 smb_vop_catia_v4tov5(np, odirent->od_name,
1170 sizeof (odirent->od_name));
1171 } else {
1172 (void) strlcpy(odirent->od_name, np,
1173 sizeof (odirent->od_name));
1174 }
1175
1176 return (0);
1177 }
1178
1179 /*
1180 * smb_odir_single_fileinfo
1181 *
1182 * Lookup the file identified by od->d_pattern.
1183 *
1184 * If the looked up file is a link, we attempt to lookup the link target
1185 * to use its attributes in place of those of the files's.
1186 * If we fail to lookup the target of the link we use the original
1187 * file's attributes.
1188 * Check if the attributes match the search attributes.
1189 *
1190 * Returns: 0 - success
1191 * ENOENT - no match
1192 * errno - error
1193 */
1194 static int
smb_odir_single_fileinfo(smb_request_t * sr,smb_odir_t * od,smb_fileinfo_t * fileinfo)1195 smb_odir_single_fileinfo(smb_request_t *sr, smb_odir_t *od,
1196 smb_fileinfo_t *fileinfo)
1197 {
1198 int rc;
1199 smb_node_t *fnode, *tgt_node;
1200 smb_attr_t attr;
1201 ino64_t fid;
1202 char *name;
1203 boolean_t case_conflict = B_FALSE;
1204 int lookup_flags, flags = 0;
1205 vnode_t *vp;
1206
1207 ASSERT(sr);
1208 ASSERT(sr->sr_magic == SMB_REQ_MAGIC);
1209 ASSERT(od);
1210 ASSERT(od->d_magic == SMB_ODIR_MAGIC);
1211
1212 ASSERT(MUTEX_HELD(&od->d_mutex));
1213 bzero(fileinfo, sizeof (smb_fileinfo_t));
1214
1215 rc = smb_fsop_lookup(sr, od->d_cred, 0, od->d_tree->t_snode,
1216 od->d_dnode, od->d_pattern, &fnode);
1217 if (rc != 0)
1218 return (rc);
1219
1220 /*
1221 * If case sensitive, do a case insensitive smb_vop_lookup to
1222 * check for case conflict
1223 */
1224 if (od->d_flags & SMB_ODIR_FLAG_IGNORE_CASE) {
1225 lookup_flags = SMB_IGNORE_CASE;
1226 if (od->d_flags & SMB_ODIR_FLAG_CATIA)
1227 lookup_flags |= SMB_CATIA;
1228
1229 rc = smb_vop_lookup(od->d_dnode->vp, fnode->od_name, &vp,
1230 NULL, lookup_flags, &flags, od->d_tree->t_snode->vp,
1231 NULL, od->d_cred);
1232 if (rc != 0)
1233 return (rc);
1234 VN_RELE(vp);
1235
1236 if (flags & ED_CASE_CONFLICT)
1237 case_conflict = B_TRUE;
1238 }
1239
1240 bzero(&attr, sizeof (attr));
1241 attr.sa_mask = SMB_AT_ALL;
1242 rc = smb_node_getattr(NULL, fnode, zone_kcred(), NULL, &attr);
1243 if (rc != 0) {
1244 smb_node_release(fnode);
1245 return (rc);
1246 }
1247
1248
1249 /* follow link to get target node & attr */
1250 if (smb_node_is_symlink(fnode) &&
1251 smb_odir_lookup_link(sr, od, fnode->od_name, &tgt_node)) {
1252 smb_node_release(fnode);
1253 fnode = tgt_node;
1254 attr.sa_mask = SMB_AT_ALL;
1255 rc = smb_node_getattr(NULL, fnode, zone_kcred(), NULL, &attr);
1256 if (rc != 0) {
1257 smb_node_release(fnode);
1258 return (rc);
1259 }
1260 }
1261
1262 /* check search attributes */
1263 if (!smb_sattr_check(attr.sa_dosattr, od->d_sattr)) {
1264 smb_node_release(fnode);
1265 return (ENOENT);
1266 }
1267
1268 name = fnode->od_name;
1269 if (od->d_flags & SMB_ODIR_FLAG_SHORTNAMES) {
1270 fid = attr.sa_vattr.va_nodeid;
1271 if (case_conflict || smb_needs_mangled(name)) {
1272 smb_mangle(name, fid, fileinfo->fi_shortname,
1273 SMB_SHORTNAMELEN);
1274 }
1275 if (case_conflict)
1276 name = fileinfo->fi_shortname;
1277 }
1278
1279 (void) strlcpy(fileinfo->fi_name, name, sizeof (fileinfo->fi_name));
1280
1281 fileinfo->fi_dosattr = attr.sa_dosattr;
1282 fileinfo->fi_nodeid = attr.sa_vattr.va_nodeid;
1283 fileinfo->fi_size = attr.sa_vattr.va_size;
1284 fileinfo->fi_alloc_size = attr.sa_allocsz;
1285 fileinfo->fi_atime = attr.sa_vattr.va_atime;
1286 fileinfo->fi_mtime = attr.sa_vattr.va_mtime;
1287 fileinfo->fi_ctime = attr.sa_vattr.va_ctime;
1288 if (attr.sa_crtime.tv_sec)
1289 fileinfo->fi_crtime = attr.sa_crtime;
1290 else
1291 fileinfo->fi_crtime = attr.sa_vattr.va_mtime;
1292
1293 smb_node_release(fnode);
1294 return (0);
1295 }
1296
1297 /*
1298 * smb_odir_wildcard_fileinfo
1299 *
1300 * odirent contains a directory entry, obtained from a vop_readdir.
1301 * If a case conflict is identified the filename is mangled and the
1302 * shortname is used as 'name', in place of odirent->od_name.
1303 *
1304 * If the looked up file is a link, we attempt to lookup the link target
1305 * to use its attributes in place of those of the files's.
1306 * If we fail to lookup the target of the link we use the original
1307 * file's attributes.
1308 * Check if the attributes match the search attributes.
1309 *
1310 * Although some file systems can have directories larger than
1311 * SMB_MAXDIRSIZE smb_odir_next_odirent ensures that no offset larger
1312 * than SMB_MAXDIRSIZE is returned. It is therefore safe to use the
1313 * offset as the cookie (uint32_t).
1314 *
1315 * Returns: 0 - success (return this entry)
1316 * any errno - no match, proceed to next entry
1317 */
1318 static int
smb_odir_wildcard_fileinfo(smb_request_t * sr,smb_odir_t * od,smb_odirent_t * odirent,smb_fileinfo_t * fileinfo)1319 smb_odir_wildcard_fileinfo(smb_request_t *sr, smb_odir_t *od,
1320 smb_odirent_t *odirent, smb_fileinfo_t *fileinfo)
1321 {
1322 smb_attr_t attr;
1323 char *name;
1324 vnode_t *fvp = NULL;
1325 int de_flags;
1326 int rc;
1327 boolean_t case_conflict;
1328
1329 ASSERT(sr);
1330 ASSERT(sr->sr_magic == SMB_REQ_MAGIC);
1331 ASSERT(od);
1332 ASSERT(od->d_magic == SMB_ODIR_MAGIC);
1333
1334 ASSERT(MUTEX_HELD(&od->d_mutex));
1335 bzero(fileinfo, sizeof (smb_fileinfo_t));
1336
1337 bzero(&attr, sizeof (attr));
1338 attr.sa_mask = SMB_AT_ALL;
1339
1340 /*
1341 * Lookup the vnode and get attributes. We have the real
1342 * (on disk) name here from readdir, so CS lookup.
1343 * NB the getattr is done with kcred.
1344 */
1345 rc = smb_vop_lookup(od->d_dnode->vp, odirent->od_name, &fvp,
1346 NULL, SMB_CASE_SENSITIVE, &de_flags,
1347 od->d_tree->t_snode->vp, &attr, od->d_cred);
1348
1349 if (rc != 0)
1350 return (rc);
1351
1352 /*
1353 * follow link to get target node & attr
1354 */
1355 if (attr.sa_vattr.va_type == VLNK &&
1356 (attr.sa_dosattr & FILE_ATTRIBUTE_REPARSE_POINT) == 0) {
1357 /*
1358 * Follow the symlink (lookup again w/ follow)
1359 * Like smb_odir_lookup_link
1360 *
1361 * Could avoid creating an smb_node_t here,
1362 * but symlinks are not so common.
1363 */
1364 smb_node_t *tnode = NULL;
1365 vnode_t *tvp = NULL;
1366
1367 if (smb_odir_lookup_link(sr, od, odirent->od_name, &tnode)) {
1368
1369 attr.sa_mask = SMB_AT_ALL;
1370 rc = smb_fsop_getattr(NULL, zone_kcred(), tnode, &attr);
1371 if (rc != 0) {
1372 smb_node_release(tnode);
1373 VN_RELE(fvp);
1374 return (rc);
1375 }
1376
1377 /* Use the link target as fvp */
1378 tvp = tnode->vp;
1379 VN_HOLD(tvp);
1380 smb_node_release(tnode);
1381
1382 VN_RELE(fvp);
1383 fvp = tvp;
1384 }
1385 }
1386
1387 /*
1388 * skip system files
1389 * Like smb_node_is_system(fnode)
1390 */
1391 if (smb_node_is_vfsroot(od->d_dnode) &&
1392 (strcasecmp(odirent->od_name, ".$EXTEND") == 0)) {
1393 VN_RELE(fvp);
1394 return (ENOENT);
1395 }
1396
1397 /*
1398 * check search attributes
1399 */
1400 if (!smb_sattr_check(attr.sa_dosattr, od->d_sattr)) {
1401 VN_RELE(fvp);
1402 return (ENOENT);
1403 }
1404
1405 /*
1406 * Access Based Enumeration (ABE) checks
1407 * Skip this entry if the user can't read it.
1408 */
1409 if ((od->d_flags & SMB_ODIR_FLAG_ABE) != 0) {
1410 int atype;
1411 int aflags;
1412
1413 if ((od->d_flags & SMB_ODIR_FLAG_ACEACCESS) != 0) {
1414 atype = V_ACE_MASK;
1415 aflags = ACE_READ_DATA;
1416 } else {
1417 atype = 0;
1418 aflags = S_IRUSR;
1419 }
1420 rc = smb_vop_access(fvp, aflags, atype,
1421 od->d_dnode->vp, od->d_cred);
1422 if (rc != 0) {
1423 /* skip this entry */
1424 VN_RELE(fvp);
1425 return (rc);
1426 }
1427 }
1428
1429 /*
1430 * Deal with names that have conflicts (other names
1431 * that match this one if compared case-insensitive)
1432 */
1433 name = odirent->od_name;
1434 if (od->d_flags & SMB_ODIR_FLAG_SHORTNAMES) {
1435 case_conflict = ((od->d_flags & SMB_ODIR_FLAG_IGNORE_CASE) &&
1436 (odirent->od_eflags & ED_CASE_CONFLICT));
1437 if (case_conflict || smb_needs_mangled(name)) {
1438 smb_mangle(name, odirent->od_ino,
1439 fileinfo->fi_shortname, SMB_SHORTNAMELEN);
1440 }
1441 if (case_conflict)
1442 name = fileinfo->fi_shortname;
1443 }
1444
1445 (void) strlcpy(fileinfo->fi_name, name, sizeof (fileinfo->fi_name));
1446
1447 fileinfo->fi_cookie = (uint32_t)od->d_offset;
1448 fileinfo->fi_dosattr = attr.sa_dosattr;
1449 fileinfo->fi_nodeid = attr.sa_vattr.va_nodeid;
1450 fileinfo->fi_size = attr.sa_vattr.va_size;
1451 fileinfo->fi_alloc_size = attr.sa_allocsz;
1452 fileinfo->fi_atime = attr.sa_vattr.va_atime;
1453 fileinfo->fi_mtime = attr.sa_vattr.va_mtime;
1454 fileinfo->fi_ctime = attr.sa_vattr.va_ctime;
1455 if (attr.sa_crtime.tv_sec)
1456 fileinfo->fi_crtime = attr.sa_crtime;
1457 else
1458 fileinfo->fi_crtime = attr.sa_vattr.va_mtime;
1459
1460
1461 VN_RELE(fvp);
1462
1463 return (0);
1464 }
1465
1466 /*
1467 * smb_odir_lookup_link
1468 *
1469 * If the file is a symlink we lookup the object to which the
1470 * symlink refers so that we can return its attributes.
1471 * This can cause a problem if a symlink in a sub-directory
1472 * points to a parent directory (some UNIX GUI's create a symlink
1473 * in $HOME/.desktop that points to the user's home directory).
1474 * Some Windows applications (e.g. virus scanning) loop/hang
1475 * trying to follow this recursive path and there is little
1476 * we can do because the path is constructed on the client.
1477 * smb_dirsymlink_enable allows an end-user to disable
1478 * symlinks to directories. Symlinks to other object types
1479 * should be unaffected.
1480 *
1481 * Returns: B_TRUE - followed link. tgt_node and tgt_attr set
1482 * B_FALSE - link not followed
1483 */
1484 static boolean_t
smb_odir_lookup_link(smb_request_t * sr,smb_odir_t * od,char * fname,smb_node_t ** tgt_node)1485 smb_odir_lookup_link(smb_request_t *sr, smb_odir_t *od,
1486 char *fname, smb_node_t **tgt_node)
1487 {
1488 int rc;
1489 uint32_t flags = SMB_FOLLOW_LINKS | SMB_CASE_SENSITIVE;
1490
1491 rc = smb_fsop_lookup(sr, od->d_cred, flags,
1492 od->d_tree->t_snode, od->d_dnode, fname, tgt_node);
1493 if (rc != 0) {
1494 *tgt_node = NULL;
1495 return (B_FALSE);
1496 }
1497
1498 if (smb_node_is_dir(*tgt_node) && (!smb_dirsymlink_enable)) {
1499 smb_node_release(*tgt_node);
1500 *tgt_node = NULL;
1501 return (B_FALSE);
1502 }
1503
1504 return (B_TRUE);
1505 }
1506
1507 /*
1508 * smb_odir_match_name
1509 *
1510 * Check if the directory entry name matches the search pattern:
1511 * - Don't match reserved dos filenames.
1512 * - Check if odirent->od_name matches od->d_pattern.
1513 * - If shortnames are supported, generate the shortname from
1514 * odirent->od_name and check if it matches od->d_pattern.
1515 */
1516 static boolean_t
smb_odir_match_name(smb_odir_t * od,smb_odirent_t * odirent)1517 smb_odir_match_name(smb_odir_t *od, smb_odirent_t *odirent)
1518 {
1519 char *name = odirent->od_name;
1520 char shortname[SMB_SHORTNAMELEN];
1521 ino64_t ino = odirent->od_ino;
1522 boolean_t ci = (od->d_flags & SMB_ODIR_FLAG_IGNORE_CASE) != 0;
1523
1524 if (smb_is_reserved_dos_name(name))
1525 return (B_FALSE);
1526
1527 if (smb_match(od->d_pattern, name, ci))
1528 return (B_TRUE);
1529
1530 if (od->d_flags & SMB_ODIR_FLAG_SHORTNAMES) {
1531 smb_mangle(name, ino, shortname, SMB_SHORTNAMELEN);
1532 if (smb_match(od->d_pattern, shortname, ci))
1533 return (B_TRUE);
1534 }
1535
1536 return (B_FALSE);
1537 }
1538