xref: /illumos-gate/usr/src/uts/common/fs/smbsrv/smb_ofile.c (revision f5488aa822e08905cde61d596e965030a1dfffcd)
1 /*
2  * CDDL HEADER START
3  *
4  * The contents of this file are subject to the terms of the
5  * Common Development and Distribution License (the "License").
6  * You may not use this file except in compliance with the License.
7  *
8  * You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE
9  * or http://www.opensolaris.org/os/licensing.
10  * See the License for the specific language governing permissions
11  * and limitations under the License.
12  *
13  * When distributing Covered Code, include this CDDL HEADER in each
14  * file and include the License file at usr/src/OPENSOLARIS.LICENSE.
15  * If applicable, add the following below this CDDL HEADER, with the
16  * fields enclosed by brackets "[]" replaced with your own identifying
17  * information: Portions Copyright [yyyy] [name of copyright owner]
18  *
19  * CDDL HEADER END
20  */
21 /*
22  * Copyright 2008 Sun Microsystems, Inc.  All rights reserved.
23  * Use is subject to license terms.
24  */
25 
26 #pragma ident	"%Z%%M%	%I%	%E% SMI"
27 
28 /*
29  * General Structures Layout
30  * -------------------------
31  *
32  * This is a simplified diagram showing the relationship between most of the
33  * main structures.
34  *
35  * +-------------------+
36  * |     SMB_INFO      |
37  * +-------------------+
38  *          |
39  *          |
40  *          v
41  * +-------------------+       +-------------------+      +-------------------+
42  * |     SESSION       |<----->|     SESSION       |......|      SESSION      |
43  * +-------------------+       +-------------------+      +-------------------+
44  *          |
45  *          |
46  *          v
47  * +-------------------+       +-------------------+      +-------------------+
48  * |       USER        |<----->|       USER        |......|       USER        |
49  * +-------------------+       +-------------------+      +-------------------+
50  *          |
51  *          |
52  *          v
53  * +-------------------+       +-------------------+      +-------------------+
54  * |       TREE        |<----->|       TREE        |......|       TREE        |
55  * +-------------------+       +-------------------+      +-------------------+
56  *      |         |
57  *      |         |
58  *      |         v
59  *      |     +-------+       +-------+      +-------+
60  *      |     | OFILE |<----->| OFILE |......| OFILE |
61  *      |     +-------+       +-------+      +-------+
62  *      |
63  *      |
64  *      v
65  *  +-------+       +------+      +------+
66  *  | ODIR  |<----->| ODIR |......| ODIR |
67  *  +-------+       +------+      +------+
68  *
69  *
70  * Ofile State Machine
71  * ------------------
72  *
73  *    +-------------------------+	 T0
74  *    |  SMB_OFILE_STATE_OPEN   |<----------- Creation/Allocation
75  *    +-------------------------+
76  *		    |
77  *		    | T1
78  *		    |
79  *		    v
80  *    +-------------------------+
81  *    | SMB_OFILE_STATE_CLOSING |
82  *    +-------------------------+
83  *		    |
84  *		    | T2
85  *		    |
86  *		    v
87  *    +-------------------------+    T3
88  *    | SMB_OFILE_STATE_CLOSED  |----------> Deletion/Free
89  *    +-------------------------+
90  *
91  * SMB_OFILE_STATE_OPEN
92  *
93  *    While in this state:
94  *      - The ofile is queued in the list of ofiles of its tree.
95  *      - References will be given out if the ofile is looked up.
96  *
97  * SMB_OFILE_STATE_CLOSING
98  *
99  *    While in this state:
100  *      - The ofile is queued in the list of ofiles of its tree.
101  *      - References will not be given out if the ofile is looked up.
102  *      - The file is closed and the locks held are being released.
103  *      - The resources associated with the ofile remain.
104  *
105  * SMB_OFILE_STATE_CLOSED
106  *
107  *    While in this state:
108  *      - The ofile is queued in the list of ofiles of its tree.
109  *      - References will not be given out if the ofile is looked up.
110  *      - The resources associated with the ofile remain.
111  *
112  * Transition T0
113  *
114  *    This transition occurs in smb_ofile_open(). A new ofile is created and
115  *    added to the list of ofiles of a tree.
116  *
117  * Transition T1
118  *
119  *    This transition occurs in smb_ofile_close().
120  *
121  * Transition T2
122  *
123  *    This transition occurs in smb_ofile_release(). The resources associated
124  *    with the ofile are freed as well as the ofile structure. For the
125  *    transition to occur, the ofile must be in the SMB_OFILE_STATE_CLOSED
126  *    state and the reference count be zero.
127  *
128  * Comments
129  * --------
130  *
131  *    The state machine of the ofile structures is controlled by 3 elements:
132  *      - The list of ofiles of the tree it belongs to.
133  *      - The mutex embedded in the structure itself.
134  *      - The reference count.
135  *
136  *    There's a mutex embedded in the ofile structure used to protect its fields
137  *    and there's a lock embedded in the list of ofiles of a tree. To
138  *    increment or to decrement the reference count the mutex must be entered.
139  *    To insert the ofile into the list of ofiles of the tree and to remove
140  *    the ofile from it, the lock must be entered in RW_WRITER mode.
141  *
142  *    Rules of access to a ofile structure:
143  *
144  *    1) In order to avoid deadlocks, when both (mutex and lock of the ofile
145  *       list) have to be entered, the lock must be entered first.
146  *
147  *    2) All actions applied to an ofile require a reference count.
148  *
149  *    3) There are 2 ways of getting a reference count. One is when the ofile
150  *       is opened. The other one when the ofile is looked up. This translates
151  *       into 2 functions: smb_ofile_open() and smb_ofile_lookup_by_fid().
152  *
153  *    It should be noted that the reference count of an ofile registers the
154  *    number of references to the ofile in other structures (such as an smb
155  *    request). The reference count is not incremented in these 2 instances:
156  *
157  *    1) The ofile is open. An ofile is anchored by his state. If there's
158  *       no activity involving an ofile currently open, the reference count
159  *       of that ofile is zero.
160  *
161  *    2) The ofile is queued in the list of ofiles of its tree. The fact of
162  *       being queued in that list is NOT registered by incrementing the
163  *       reference count.
164  */
165 #include <smbsrv/smb_incl.h>
166 #include <smbsrv/smb_kproto.h>
167 #include <smbsrv/smb_fsops.h>
168 
169 /* Static functions defined further down this file. */
170 static void		smb_ofile_delete(smb_ofile_t *of);
171 static smb_ofile_t	*smb_ofile_close_and_next(smb_ofile_t *of);
172 
173 /*
174  * smb_ofile_open
175  *
176  *
177  */
178 smb_ofile_t *
179 smb_ofile_open(
180     smb_tree_t		*tree,
181     smb_node_t		*node,
182     uint16_t		pid,
183     uint32_t		access_granted,
184     uint32_t		create_options,
185     uint32_t		share_access,
186     uint16_t		ftype,
187     char		*pipe_name,
188     uint32_t		rpc_fid,
189     uint32_t		uniqid,
190     smb_error_t		*err)
191 {
192 	smb_ofile_t	*of;
193 	uint16_t	fid;
194 
195 	if (smb_idpool_alloc(&tree->t_fid_pool, &fid)) {
196 		err->status = NT_STATUS_TOO_MANY_OPENED_FILES;
197 		err->errcls = ERRDOS;
198 		err->errcode = ERROR_TOO_MANY_OPEN_FILES;
199 		return (NULL);
200 	}
201 
202 	of = kmem_cache_alloc(tree->t_server->si_cache_ofile, KM_SLEEP);
203 	bzero(of, sizeof (smb_ofile_t));
204 	of->f_magic = SMB_OFILE_MAGIC;
205 	of->f_refcnt = 1;
206 	of->f_fid = fid;
207 	of->f_uniqid = uniqid;
208 	of->f_opened_by_pid = pid;
209 	of->f_granted_access = access_granted;
210 	of->f_share_access = share_access;
211 	of->f_create_options = create_options;
212 	of->f_cr = tree->t_user->u_cred;
213 	crhold(of->f_cr);
214 	of->f_ftype = ftype;
215 	of->f_server = tree->t_server;
216 	of->f_session = tree->t_user->u_session;
217 	of->f_user = tree->t_user;
218 	of->f_tree = tree;
219 	of->f_node = node;
220 	mutex_init(&of->f_mutex, NULL, MUTEX_DEFAULT, NULL);
221 	of->f_state = SMB_OFILE_STATE_OPEN;
222 
223 	if (ftype == SMB_FTYPE_MESG_PIPE) {
224 		of->f_pipe_info = kmem_alloc(sizeof (mlsvc_pipe_t), KM_SLEEP);
225 		bzero(of->f_pipe_info, sizeof (mlsvc_pipe_t));
226 		of->f_pipe_info->pipe_name = pipe_name;
227 		of->f_pipe_info->fid = rpc_fid;
228 		mutex_init(&of->f_pipe_info->mutex, NULL, MUTEX_DEFAULT, NULL);
229 		cv_init(&of->f_pipe_info->cv, NULL, CV_DEFAULT, NULL);
230 	} else {
231 		ASSERT(ftype == SMB_FTYPE_DISK); /* Regular file, not a pipe */
232 		ASSERT(node);
233 		if (crgetuid(of->f_cr) == node->attr.sa_vattr.va_uid) {
234 			/*
235 			 * Add this bit for the file's owner even if it's not
236 			 * specified in the request (Windows behavior).
237 			 */
238 			of->f_granted_access |= FILE_READ_ATTRIBUTES;
239 		}
240 
241 		if (node->vp->v_type == VREG) {
242 			of->f_mode =
243 			    smb_fsop_amask_to_omode(of->f_granted_access);
244 			if (smb_fsop_open(of->f_node, of->f_mode, of->f_cr)
245 			    != 0) {
246 				of->f_magic = 0;
247 				mutex_destroy(&of->f_mutex);
248 				crfree(of->f_cr);
249 				smb_idpool_free(&tree->t_fid_pool,
250 				    of->f_fid);
251 				kmem_cache_free(tree->t_server->si_cache_ofile,
252 				    of);
253 				err->status = NT_STATUS_ACCESS_DENIED;
254 				err->errcls = ERRDOS;
255 				err->errcode = ERROR_ACCESS_DENIED;
256 				return (NULL);
257 			}
258 		}
259 
260 		smb_llist_enter(&node->n_ofile_list, RW_WRITER);
261 		smb_llist_insert_tail(&node->n_ofile_list, of);
262 		smb_llist_exit(&node->n_ofile_list);
263 	}
264 	smb_llist_enter(&tree->t_ofile_list, RW_WRITER);
265 	smb_llist_insert_tail(&tree->t_ofile_list, of);
266 	smb_llist_exit(&tree->t_ofile_list);
267 	atomic_inc_32(&tree->t_server->sv_open_files);
268 	atomic_inc_32(&of->f_session->s_file_cnt);
269 
270 	return (of);
271 }
272 
273 /*
274  * smb_ofile_close
275  *
276  *
277  */
278 int
279 smb_ofile_close(
280     smb_ofile_t		*of,
281     uint32_t		last_wtime)
282 {
283 	int	rc = 0;
284 
285 	ASSERT(of);
286 	ASSERT(of->f_magic == SMB_OFILE_MAGIC);
287 
288 	mutex_enter(&of->f_mutex);
289 	ASSERT(of->f_refcnt);
290 	switch (of->f_state) {
291 	case SMB_OFILE_STATE_OPEN: {
292 
293 		of->f_state = SMB_OFILE_STATE_CLOSING;
294 		mutex_exit(&of->f_mutex);
295 
296 		if (of->f_ftype == SMB_FTYPE_MESG_PIPE) {
297 			smb_rpc_close(of);
298 		} else {
299 			if (of->f_node->flags & NODE_CREATED_READONLY) {
300 				smb_node_set_dosattr(of->f_node,
301 				    of->f_node->attr.sa_dosattr |
302 				    SMB_FA_READONLY);
303 				of->f_node->flags &= ~NODE_CREATED_READONLY;
304 			}
305 
306 			smb_ofile_close_timestamp_update(of, last_wtime);
307 			rc = smb_sync_fsattr(NULL, of->f_cr, of->f_node);
308 			smb_commit_delete_on_close(of);
309 			smb_oplock_release(of->f_node, B_FALSE);
310 
311 			/*
312 			 * Share reservations cannot be removed until the
313 			 * readonly bit has been set (if needed), above.
314 			 * See comments in smb_open_subr().
315 			 */
316 			smb_fsop_unshrlock(of->f_cr, of->f_node, of->f_uniqid);
317 			smb_node_destroy_lock_by_ofile(of->f_node, of);
318 
319 			if (of->f_node->vp->v_type == VREG)
320 				(void) smb_fsop_close(of->f_node, of->f_mode,
321 				    of->f_cr);
322 
323 			/*
324 			 * Cancel any notify change requests related
325 			 * to this open instance.
326 			 */
327 			if (of->f_node->flags & NODE_FLAGS_NOTIFY_CHANGE)
328 				smb_process_file_notify_change_queue(of);
329 		}
330 		atomic_dec_32(&of->f_tree->t_server->sv_open_files);
331 
332 		mutex_enter(&of->f_mutex);
333 		ASSERT(of->f_refcnt);
334 		ASSERT(of->f_state == SMB_OFILE_STATE_CLOSING);
335 		of->f_state = SMB_OFILE_STATE_CLOSED;
336 		mutex_exit(&of->f_mutex);
337 		return (rc);
338 	}
339 	case SMB_OFILE_STATE_CLOSED:
340 	case SMB_OFILE_STATE_CLOSING:
341 		break;
342 
343 	default:
344 		ASSERT(0);
345 		break;
346 	}
347 	mutex_exit(&of->f_mutex);
348 	return (rc);
349 }
350 
351 /*
352  * smb_ofile_close_all
353  *
354  *
355  */
356 void
357 smb_ofile_close_all(
358     smb_tree_t		*tree)
359 {
360 	smb_ofile_t	*of;
361 
362 	ASSERT(tree);
363 	ASSERT(tree->t_magic == SMB_TREE_MAGIC);
364 
365 	smb_llist_enter(&tree->t_ofile_list, RW_READER);
366 	of = smb_llist_head(&tree->t_ofile_list);
367 	while (of) {
368 		ASSERT(of->f_magic == SMB_OFILE_MAGIC);
369 		ASSERT(of->f_tree == tree);
370 		of = smb_ofile_close_and_next(of);
371 	}
372 	smb_llist_exit(&tree->t_ofile_list);
373 }
374 
375 /*
376  * smb_ofiles_close_by_pid
377  *
378  *
379  */
380 void
381 smb_ofile_close_all_by_pid(
382     smb_tree_t		*tree,
383     uint16_t		pid)
384 {
385 	smb_ofile_t	*of;
386 
387 	ASSERT(tree);
388 	ASSERT(tree->t_magic == SMB_TREE_MAGIC);
389 
390 	smb_llist_enter(&tree->t_ofile_list, RW_READER);
391 	of = smb_llist_head(&tree->t_ofile_list);
392 	while (of) {
393 		ASSERT(of->f_magic == SMB_OFILE_MAGIC);
394 		ASSERT(of->f_tree == tree);
395 		if (of->f_opened_by_pid == pid) {
396 			of = smb_ofile_close_and_next(of);
397 		} else {
398 			of = smb_llist_next(&tree->t_ofile_list, of);
399 		}
400 	}
401 	smb_llist_exit(&tree->t_ofile_list);
402 }
403 
404 /*
405  * smb_ofile_release
406  *
407  */
408 void
409 smb_ofile_release(
410     smb_ofile_t		*of)
411 {
412 	ASSERT(of);
413 	ASSERT(of->f_magic == SMB_OFILE_MAGIC);
414 
415 	mutex_enter(&of->f_mutex);
416 	ASSERT(of->f_refcnt);
417 	of->f_refcnt--;
418 	switch (of->f_state) {
419 	case SMB_OFILE_STATE_OPEN:
420 	case SMB_OFILE_STATE_CLOSING:
421 		break;
422 
423 	case SMB_OFILE_STATE_CLOSED:
424 		if (of->f_refcnt == 0) {
425 			mutex_exit(&of->f_mutex);
426 			smb_ofile_delete(of);
427 			return;
428 		}
429 		break;
430 
431 	default:
432 		ASSERT(0);
433 		break;
434 	}
435 	mutex_exit(&of->f_mutex);
436 }
437 
438 /*
439  * smb_ofile_lookup_by_fid
440  *
441  * Find the open file whose fid matches the one specified in the request.
442  * If we can't find the fid or the shares (trees) don't match, we have a
443  * bad fid.
444  */
445 smb_ofile_t *
446 smb_ofile_lookup_by_fid(
447     smb_tree_t		*tree,
448     uint16_t		fid)
449 {
450 	smb_llist_t	*of_list;
451 	smb_ofile_t	*of;
452 
453 	ASSERT(tree->t_magic == SMB_TREE_MAGIC);
454 
455 	of_list = &tree->t_ofile_list;
456 
457 	smb_llist_enter(of_list, RW_READER);
458 	of = smb_llist_head(of_list);
459 	while (of) {
460 		ASSERT(of->f_magic == SMB_OFILE_MAGIC);
461 		ASSERT(of->f_tree == tree);
462 		if (of->f_fid == fid) {
463 			mutex_enter(&of->f_mutex);
464 			if (of->f_state != SMB_OFILE_STATE_OPEN) {
465 				mutex_exit(&of->f_mutex);
466 				smb_llist_exit(of_list);
467 				return (NULL);
468 			}
469 			of->f_refcnt++;
470 			mutex_exit(&of->f_mutex);
471 			break;
472 		}
473 		of = smb_llist_next(of_list, of);
474 	}
475 	smb_llist_exit(of_list);
476 	return (of);
477 }
478 
479 /*
480  * smb_ofile_set_flags
481  *
482  * Return value:
483  *
484  *	Current flags value
485  *
486  */
487 void
488 smb_ofile_set_flags(
489     smb_ofile_t		*of,
490     uint32_t		flags)
491 {
492 	ASSERT(of);
493 	ASSERT(of->f_magic == SMB_OFILE_MAGIC);
494 	ASSERT(of->f_refcnt);
495 
496 	mutex_enter(&of->f_mutex);
497 	of->f_flags |= flags;
498 	mutex_exit(&of->f_mutex);
499 }
500 /*
501  * smb_ofile_seek
502  *
503  * Return value:
504  *
505  *	0		Success
506  *	EINVAL		Unknown mode
507  *	EOVERFLOW	offset too big
508  *
509  */
510 int
511 smb_ofile_seek(
512     smb_ofile_t		*of,
513     ushort_t		mode,
514     int32_t		off,
515     uint32_t		*retoff)
516 {
517 	u_offset_t	newoff = 0;
518 	int		rc = 0;
519 
520 	ASSERT(of);
521 	ASSERT(of->f_magic == SMB_OFILE_MAGIC);
522 	ASSERT(of->f_refcnt);
523 
524 	mutex_enter(&of->f_mutex);
525 	switch (mode) {
526 	case SMB_SEEK_SET:
527 		if (off < 0)
528 			newoff = 0;
529 		else
530 			newoff = (u_offset_t)off;
531 		break;
532 
533 	case SMB_SEEK_CUR:
534 		if (off < 0 && (-off) > of->f_seek_pos)
535 			newoff = 0;
536 		else
537 			newoff = of->f_seek_pos + (u_offset_t)off;
538 		break;
539 
540 	case SMB_SEEK_END:
541 		if (off < 0 && (-off) > of->f_node->attr.sa_vattr.va_size)
542 			newoff = 0;
543 		else
544 			newoff = of->f_node->attr.sa_vattr.va_size +
545 			    (u_offset_t)off;
546 		break;
547 
548 	default:
549 		mutex_exit(&of->f_mutex);
550 		return (EINVAL);
551 	}
552 
553 	/*
554 	 * See comments at the beginning of smb_seek.c.
555 	 * If the offset is greater than UINT_MAX, we will return an error.
556 	 */
557 
558 	if (newoff > UINT_MAX) {
559 		rc = EOVERFLOW;
560 	} else {
561 		of->f_seek_pos = newoff;
562 		*retoff = (uint32_t)newoff;
563 	}
564 	mutex_exit(&of->f_mutex);
565 	return (rc);
566 }
567 
568 /*
569  * smb_ofile_close_timestamp_update
570  *
571  *
572  */
573 void
574 smb_ofile_close_timestamp_update(
575     smb_ofile_t		*of,
576     uint32_t		last_wtime)
577 {
578 	smb_node_t	*node;
579 	timestruc_t	mtime, atime;
580 	unsigned int	what = 0;
581 
582 	mtime.tv_sec = last_wtime;
583 	mtime.tv_nsec = 0;
584 
585 	if (mtime.tv_sec != 0 && mtime.tv_sec != 0xFFFFFFFF) {
586 		mtime.tv_sec -= of->f_server->si_gmtoff;
587 		what |= SMB_AT_MTIME;
588 	}
589 
590 	/*
591 	 * NODE_FLAGS_SYNCATIME is set whenever something is
592 	 * written to a file. Compliant volumes don't update
593 	 * atime upon write, so don't update the atime if the
594 	 * volume is compliant.
595 	 */
596 	node = of->f_node;
597 	if (node->flags & NODE_FLAGS_SYNCATIME) {
598 		node->flags &= ~NODE_FLAGS_SYNCATIME;
599 		what |= SMB_AT_ATIME;
600 		(void) microtime(&atime);
601 	}
602 
603 	smb_node_set_time(node, 0, &mtime, &atime, 0, what);
604 }
605 
606 /*
607  * smb_ofile_is_open
608  *
609  */
610 boolean_t
611 smb_ofile_is_open(
612     smb_ofile_t		*of)
613 {
614 	boolean_t	rc = B_FALSE;
615 
616 	ASSERT(of);
617 	ASSERT(of->f_magic == SMB_OFILE_MAGIC);
618 
619 	mutex_enter(&of->f_mutex);
620 	if (of->f_state == SMB_OFILE_STATE_OPEN) {
621 		rc = B_TRUE;
622 	}
623 	mutex_exit(&of->f_mutex);
624 	return (rc);
625 }
626 
627 /* *************************** Static Functions ***************************** */
628 
629 /*
630  * smb_ofile_close_and_next
631  *
632  * This function closes the file passed in (if appropriate) and returns the
633  * next open file in the list of open files of the tree of the open file passed
634  * in. It requires that the list of open files of the tree be entered in
635  * RW_READER mode before being called.
636  */
637 static smb_ofile_t *
638 smb_ofile_close_and_next(
639     smb_ofile_t		*of)
640 {
641 	smb_ofile_t	*next_of;
642 	smb_tree_t	*tree;
643 
644 	ASSERT(of);
645 	ASSERT(of->f_magic == SMB_OFILE_MAGIC);
646 
647 	mutex_enter(&of->f_mutex);
648 	switch (of->f_state) {
649 	case SMB_OFILE_STATE_OPEN:
650 		/* The file is still open. */
651 		of->f_refcnt++;
652 		ASSERT(of->f_refcnt);
653 		tree = of->f_tree;
654 		mutex_exit(&of->f_mutex);
655 		smb_llist_exit(&of->f_tree->t_ofile_list);
656 		(void) smb_ofile_close(of, 0);
657 		smb_ofile_release(of);
658 		smb_llist_enter(&tree->t_ofile_list, RW_READER);
659 		next_of = smb_llist_head(&tree->t_ofile_list);
660 		break;
661 	case SMB_OFILE_STATE_CLOSING:
662 	case SMB_OFILE_STATE_CLOSED:
663 		/*
664 		 * The ofile exists but is closed or
665 		 * in the process being closed.
666 		 */
667 		mutex_exit(&of->f_mutex);
668 		next_of = smb_llist_next(&of->f_tree->t_ofile_list, of);
669 		break;
670 	default:
671 		ASSERT(0);
672 		mutex_exit(&of->f_mutex);
673 		next_of = smb_llist_next(&of->f_tree->t_ofile_list, of);
674 		break;
675 	}
676 	return (next_of);
677 }
678 
679 /*
680  * smb_ofile_delete
681  *
682  *
683  */
684 static void
685 smb_ofile_delete(
686     smb_ofile_t		*of)
687 {
688 	ASSERT(of);
689 	ASSERT(of->f_magic == SMB_OFILE_MAGIC);
690 	ASSERT(of->f_refcnt == 0);
691 	ASSERT(of->f_state == SMB_OFILE_STATE_CLOSED);
692 
693 	/*
694 	 * Let's remove the ofile from the list of ofiles of the tree. This has
695 	 * to be done before any resources associated with the ofile are
696 	 * released.
697 	 */
698 	smb_llist_enter(&of->f_tree->t_ofile_list, RW_WRITER);
699 	smb_llist_remove(&of->f_tree->t_ofile_list, of);
700 	smb_llist_exit(&of->f_tree->t_ofile_list);
701 	atomic_dec_32(&of->f_session->s_file_cnt);
702 
703 	if (of->f_ftype == SMB_FTYPE_MESG_PIPE) {
704 		kmem_free(of->f_pipe_info, sizeof (mlsvc_pipe_t));
705 		of->f_pipe_info = NULL;
706 	} else {
707 		ASSERT(of->f_ftype == SMB_FTYPE_DISK);
708 		ASSERT(of->f_node != NULL);
709 		smb_llist_enter(&of->f_node->n_ofile_list, RW_WRITER);
710 		smb_llist_remove(&of->f_node->n_ofile_list, of);
711 		smb_llist_exit(&of->f_node->n_ofile_list);
712 		smb_node_release(of->f_node);
713 	}
714 
715 	of->f_magic = (uint32_t)~SMB_OFILE_MAGIC;
716 	mutex_destroy(&of->f_mutex);
717 	crfree(of->f_cr);
718 	smb_idpool_free(&of->f_tree->t_fid_pool, of->f_fid);
719 	kmem_cache_free(of->f_tree->t_server->si_cache_ofile, of);
720 }
721 
722 /*
723  * smb_ofile_access
724  *
725  * This function will check to see if the access requested is granted.
726  * Returns NT status codes.
727  */
728 uint32_t
729 smb_ofile_access(smb_ofile_t *of, cred_t *cr, uint32_t access)
730 {
731 
732 	if ((of == NULL) || (cr == kcred))
733 		return (NT_STATUS_SUCCESS);
734 
735 	/*
736 	 * If the request is for something
737 	 * I don't grant it is an error
738 	 */
739 	if (~(of->f_granted_access) & access) {
740 		if (!(of->f_granted_access & ACCESS_SYSTEM_SECURITY) &&
741 		    (access & ACCESS_SYSTEM_SECURITY)) {
742 			return (NT_STATUS_PRIVILEGE_NOT_HELD);
743 		}
744 		return (NT_STATUS_ACCESS_DENIED);
745 	}
746 
747 	return (NT_STATUS_SUCCESS);
748 }
749 
750 
751 /*
752  * smb_ofile_open_check
753  *
754  * check file sharing rules for current open request
755  * against existing open instances of the same file
756  *
757  * Returns NT_STATUS_SHARING_VIOLATION if there is any
758  * sharing conflict, otherwise returns NT_STATUS_SUCCESS.
759  */
760 uint32_t
761 smb_ofile_open_check(
762     smb_ofile_t *of,
763     cred_t *cr,
764     uint32_t desired_access,
765     uint32_t share_access)
766 {
767 	smb_node_t *node;
768 
769 	ASSERT(of->f_magic == SMB_OFILE_MAGIC);
770 
771 	node = of->f_node;
772 
773 	mutex_enter(&of->f_mutex);
774 
775 	if (of->f_state != SMB_OFILE_STATE_OPEN) {
776 		mutex_exit(&of->f_mutex);
777 		return (NT_STATUS_INVALID_HANDLE);
778 	}
779 
780 	/*
781 	 * It appears that share modes are not relevant to
782 	 * directories, but this check will remain as it is not
783 	 * clear whether it was originally put here for a reason.
784 	 */
785 	if (node->attr.sa_vattr.va_type == VDIR) {
786 		if (SMB_DENY_RW(of->f_share_access) &&
787 		    (node->n_orig_uid != crgetuid(cr))) {
788 			mutex_exit(&of->f_mutex);
789 			return (NT_STATUS_SHARING_VIOLATION);
790 		}
791 
792 		mutex_exit(&of->f_mutex);
793 		return (NT_STATUS_SUCCESS);
794 	}
795 
796 	/* if it's just meta data */
797 	if ((of->f_granted_access & FILE_DATA_ALL) == 0) {
798 		mutex_exit(&of->f_mutex);
799 		return (NT_STATUS_SUCCESS);
800 	}
801 
802 	/*
803 	 * Check requested share access against the
804 	 * open granted (desired) access
805 	 */
806 	if (SMB_DENY_DELETE(share_access) && (of->f_granted_access & DELETE)) {
807 		mutex_exit(&of->f_mutex);
808 		return (NT_STATUS_SHARING_VIOLATION);
809 	}
810 
811 	if (SMB_DENY_READ(share_access) &&
812 	    (of->f_granted_access & (FILE_READ_DATA | FILE_EXECUTE))) {
813 		mutex_exit(&of->f_mutex);
814 		return (NT_STATUS_SHARING_VIOLATION);
815 	}
816 
817 	if (SMB_DENY_WRITE(share_access) &&
818 	    (of->f_granted_access & (FILE_WRITE_DATA | FILE_APPEND_DATA))) {
819 		mutex_exit(&of->f_mutex);
820 		return (NT_STATUS_SHARING_VIOLATION);
821 	}
822 
823 	/* check requested desired access against the open share access */
824 	if (SMB_DENY_DELETE(of->f_share_access) && (desired_access & DELETE)) {
825 		mutex_exit(&of->f_mutex);
826 		return (NT_STATUS_SHARING_VIOLATION);
827 	}
828 
829 	if (SMB_DENY_READ(of->f_share_access) &&
830 	    (desired_access & (FILE_READ_DATA | FILE_EXECUTE))) {
831 		mutex_exit(&of->f_mutex);
832 		return (NT_STATUS_SHARING_VIOLATION);
833 	}
834 
835 	if (SMB_DENY_WRITE(of->f_share_access) &&
836 	    (desired_access & (FILE_WRITE_DATA | FILE_APPEND_DATA))) {
837 		mutex_exit(&of->f_mutex);
838 		return (NT_STATUS_SHARING_VIOLATION);
839 	}
840 
841 	mutex_exit(&of->f_mutex);
842 	return (NT_STATUS_SUCCESS);
843 }
844 
845 /*
846  * smb_ofile_rename_check
847  *
848  * An open file can be renamed if
849  *
850  *  1. isn't opened for data writing or deleting
851  *
852  *  2. Opened with "Deny Delete" share mode
853  *         But not opened for data reading or executing
854  *         (opened for accessing meta data)
855  */
856 
857 uint32_t
858 smb_ofile_rename_check(smb_ofile_t *of)
859 {
860 	ASSERT(of->f_magic == SMB_OFILE_MAGIC);
861 
862 	mutex_enter(&of->f_mutex);
863 
864 	if (of->f_state != SMB_OFILE_STATE_OPEN) {
865 		mutex_exit(&of->f_mutex);
866 		return (NT_STATUS_INVALID_HANDLE);
867 	}
868 
869 	if (of->f_granted_access &
870 	    (FILE_WRITE_DATA | FILE_APPEND_DATA | DELETE)) {
871 		mutex_exit(&of->f_mutex);
872 		return (NT_STATUS_SHARING_VIOLATION);
873 	}
874 
875 	if ((of->f_share_access & FILE_SHARE_DELETE) == 0) {
876 		if (of->f_granted_access &
877 		    (FILE_READ_DATA | FILE_EXECUTE)) {
878 			mutex_exit(&of->f_mutex);
879 			return (NT_STATUS_SHARING_VIOLATION);
880 		}
881 	}
882 
883 	mutex_exit(&of->f_mutex);
884 	return (NT_STATUS_SUCCESS);
885 }
886 
887 /*
888  * smb_ofile_delete_check
889  *
890  * An open file can be deleted only if opened for
891  * accessing meta data. Share modes aren't important
892  * in this case.
893  *
894  * NOTE: there is another mechanism for deleting an
895  * open file that NT clients usually use.
896  * That's setting "Delete on close" flag for an open
897  * file.  In this way the file will be deleted after
898  * last close. This flag can be set by SmbTrans2SetFileInfo
899  * with FILE_DISPOSITION_INFO information level.
900  * For setting this flag, the file should be opened by
901  * DELETE access in the FID that is passed in the Trans2
902  * request.
903  */
904 
905 uint32_t
906 smb_ofile_delete_check(smb_ofile_t *of)
907 {
908 	ASSERT(of->f_magic == SMB_OFILE_MAGIC);
909 
910 	mutex_enter(&of->f_mutex);
911 
912 	if (of->f_state != SMB_OFILE_STATE_OPEN) {
913 		mutex_exit(&of->f_mutex);
914 		return (NT_STATUS_INVALID_HANDLE);
915 	}
916 
917 	if (of->f_granted_access &
918 	    (FILE_READ_DATA | FILE_WRITE_DATA |
919 	    FILE_APPEND_DATA | FILE_EXECUTE | DELETE)) {
920 		mutex_exit(&of->f_mutex);
921 		return (NT_STATUS_SHARING_VIOLATION);
922 	}
923 
924 	mutex_exit(&of->f_mutex);
925 	return (NT_STATUS_SUCCESS);
926 }
927