xref: /titanic_41/usr/src/uts/common/fs/smbsrv/smb_odir.c (revision 09bbc1382f9244fdbb4dfab9126fa50826c93228)
1 /*
2  * CDDL HEADER START
3  *
4  * The contents of this file are subject to the terms of the
5  * Common Development and Distribution License (the "License").
6  * You may not use this file except in compliance with the License.
7  *
8  * You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE
9  * or http://www.opensolaris.org/os/licensing.
10  * See the License for the specific language governing permissions
11  * and limitations under the License.
12  *
13  * When distributing Covered Code, include this CDDL HEADER in each
14  * file and include the License file at usr/src/OPENSOLARIS.LICENSE.
15  * If applicable, add the following below this CDDL HEADER, with the
16  * fields enclosed by brackets "[]" replaced with your own identifying
17  * information: Portions Copyright [yyyy] [name of copyright owner]
18  *
19  * CDDL HEADER END
20  */
21 /*
22  * Copyright (c) 2007, 2010, Oracle and/or its affiliates. All rights reserved.
23  * Copyright 2013 Nexenta Systems, Inc.  All rights reserved.
24  */
25 
26 /*
27  * General Structures Layout
28  * -------------------------
29  *
30  * This is a simplified diagram showing the relationship between most of the
31  * main structures.
32  *
33  * +-------------------+
34  * |     SMB_INFO      |
35  * +-------------------+
36  *          |
37  *          |
38  *          v
39  * +-------------------+       +-------------------+      +-------------------+
40  * |     SESSION       |<----->|     SESSION       |......|      SESSION      |
41  * +-------------------+       +-------------------+      +-------------------+
42  *   |          |
43  *   |          |
44  *   |          v
45  *   |  +-------------------+     +-------------------+   +-------------------+
46  *   |  |       USER        |<--->|       USER        |...|       USER        |
47  *   |  +-------------------+     +-------------------+   +-------------------+
48  *   |
49  *   |
50  *   v
51  * +-------------------+       +-------------------+      +-------------------+
52  * |       TREE        |<----->|       TREE        |......|       TREE        |
53  * +-------------------+       +-------------------+      +-------------------+
54  *      |         |
55  *      |         |
56  *      |         v
57  *      |     +-------+       +-------+      +-------+
58  *      |     | OFILE |<----->| OFILE |......| OFILE |
59  *      |     +-------+       +-------+      +-------+
60  *      |
61  *      |
62  *      v
63  *  +-------+       +------+      +------+
64  *  | ODIR  |<----->| ODIR |......| ODIR |
65  *  +-------+       +------+      +------+
66  *
67  *
68  * Odir State Machine
69  * ------------------
70  *
71  *    +-------------------------+
72  *    |  SMB_ODIR_STATE_OPEN    |<----------- open / creation
73  *    +-------------------------+
74  *	    |            ^
75  *	    | (first)    | (last)
76  *	    | lookup     | release
77  *	    v            |
78  *    +-------------------------+
79  *    | SMB_ODIR_STATE_IN_USE   |----
80  *    +-------------------------+   | lookup / release / read
81  *	    |                ^-------
82  *	    | close
83  *	    |
84  *	    v
85  *    +-------------------------+
86  *    | SMB_ODIR_STATE_CLOSING  |----
87  *    +-------------------------+   | close / release / read
88  *	    |                ^-------
89  *	    | (last) release
90  *	    |
91  *	    v
92  *    +-------------------------+
93  *    | SMB_ODIR_STATE_CLOSED   |----------> deletion
94  *    +-------------------------+
95  *
96  *
97  * SMB_ODIR_STATE_OPEN
98  * - the odir exists in the list of odirs of its tree
99  * - lookup is valid in this state. It will place a hold on the odir
100  *   by incrementing the reference count and the odir will transition
101  *   to SMB_ODIR_STATE_IN_USE
102  * - read/close/release not valid in this state
103  *
104  * SMB_ODIR_STATE_IN_USE
105  * - the odir exists in the list of odirs of its tree.
106  * - lookup is valid in this state. It will place a hold on the odir
107  *   by incrementing the reference count.
108  * - if the last hold is released the odir will transition
109  *   back to SMB_ODIR_STATE_OPEN
110  * - if a close is received the odir will transition to
111  *   SMB_ODIR_STATE_CLOSING.
112  *
113  * SMB_ODIR_STATE_CLOSING
114  * - the odir exists in the list of odirs of its tree.
115  * - lookup will fail in this state.
116  * - when the last hold is released the odir will transition
117  *   to SMB_ODIR_STATE_CLOSED.
118  *
119  * SMB_ODIR_STATE_CLOSED
120  * - the odir exists in the list of odirs of its tree.
121  * - there are no users of the odir (refcnt == 0)
122  * - the odir is being removed from the tree's list and deleted.
123  * - lookup will fail in this state.
124  * - read/close/release not valid in this state
125  *
126  * Comments
127  * --------
128  *    The state machine of the odir structures is controlled by 3 elements:
129  *      - The list of odirs of the tree it belongs to.
130  *      - The mutex embedded in the structure itself.
131  *      - The reference count.
132  *
133  *    There's a mutex embedded in the odir structure used to protect its fields
134  *    and there's a lock embedded in the list of odirs of a tree. To
135  *    increment or to decrement the reference count the mutex must be entered.
136  *    To insert the odir into the list of odirs of the tree and to remove
137  *    the odir from it, the lock must be entered in RW_WRITER mode.
138  *
139  *    In order to avoid deadlocks, when both (mutex and lock of the odir
140  *    list) have to be entered, the lock must be entered first.
141  *
142  *
143  * Odir Interface
144  * ---------------
145  * odid = smb_odir_open(pathname)
146  *	Create an odir representing the directory specified in pathname and
147  *	add it into the tree's list of odirs.
148  *	Return an identifier (odid) uniquely identifying the created odir.
149  *
150  * smb_odir_openat(smb_node_t *unode)
151  *	Create an odir representing the extended attribute directory
152  *	associated with the file (or directory) represented by unode
153  *	and add it into the tree's list of odirs.
154  *	Return an identifier (odid) uniquely identifying the created odir.
155  *
156  * smb_odir_t *odir = smb_tree_lookup_odir(..., odid)
157  *	Find the odir corresponding to the specified odid in the tree's
158  *	list of odirs. Place a hold on the odir.
159  *
160  * smb_odir_read(..., smb_odirent_t *odirent)
161  *	Find the next directory entry in the odir and return it in odirent.
162  *
163  * smb_odir_read_fileinfo(..., smb_fileinfo_t *)
164  *	Find the next directory entry in the odir. Return the details of
165  *	the directory entry in smb_fileinfo_t. (See odir internals below)
166  *
167  * smb_odir_read_streaminfo(..., smb_streaminfo_t *)
168  *	Find the next named stream entry in the odir. Return the details of
169  *	the named stream in smb_streaminfo_t.
170  *
171  * smb_odir_close(smb_odir_t *odir)
172  *  Close the odir.
173  *  The caller of close must have a hold on the odir being closed.
174  *  The hold should be released after closing.
175  *
176  * smb_odir_release(smb_odir_t *odir)
177  *	Release the hold on the odir, obtained by lookup.
178  *
179  *
180  * Odir Internals
181  * --------------
182  * The odir object represent an open directory search. Each read operation
183  * provides the caller with a structure containing information  pertaining
184  * to the next directory entry that matches the search criteria, namely
185  * the filename or match pattern and, in the case of smb_odir_read_fileinfo(),
186  * the search attributes.
187  *
188  * The odir maintains a buffer (d_buf) of directory entries read from
189  * the filesystem via a vop_readdir. The buffer is populated when a read
190  * request (smb_odir_next_odirent) finds that the buffer is empty or that
191  * the end of the buffer has been reached, and also when a new client request
192  * (find next) begins.
193  *
194  * The data in d_buf (that which is returned from the file system) can
195  * be in one of two formats. If the file system supports extended directory
196  * entries we request that the data be returned as edirent_t structures. If
197  * it does not the data will be returned as dirent64_t structures. For
198  * convenience, when the next directory entry is read from d_buf by
199  * smb_odir_next_odirent it is translated into an smb_odirent_t.
200  *
201  * smb_odir_read_fileinfo
202  * The processing required to obtain the information to populate the caller's
203  * smb_fileinfo_t differs depending upon whether the directory search is for a
204  * single specified filename or for multiple files matching a search pattern.
205  * Thus smb_odir_read_fileinfo uses two static functions:
206  * smb_odir_single_fileinfo - obtains the smb_fileinfo_t info for the single
207  * filename as specified in smb_odir_open request.
208  * smb_odir_wildcard_fileinfo - obtains the smb_fileinfo_t info for the filename
209  * returned from the smb_odir_next_odirent. This is called in a loop until
210  * an entry matching the search criteria is found or no more entries exist.
211  *
212  * If a directory entry is a VLNK, the name returned in the smb_fileinfo_t
213  * is the name of the directory entry but the attributes are the attribites
214  * of the file that is the target of the link. If the link target cannot
215  * be found the attributes returned are the attributes of the link itself.
216  *
217  * smb_odir_read_streaminfo
218  * In order for an odir to provide information about stream files it
219  * must be opened with smb_odir_openat(). smb_odir_read_streaminfo() can
220  * then be used to obtain the name and size of named stream files.
221  *
222  * Resuming a Search
223  * -----------------
224  * A directory search often consists of multiple client requests: an initial
225  * find_first request followed by zero or more find_next requests and a
226  * find_close request.
227  * The find_first request will open and lookup the odir, read its desired
228  * number of entries from the odir, then release the odir and return.
229  * A find_next request will lookup the odir and read its desired number of
230  * entries from the odir, then release the odir and return.
231  * At the end of the search the find_close request will close the odir.
232  *
233  * In order to be able to resume a directory search (find_next) the odir
234  * provides the capability for the caller to save one or more resume points
235  * (cookies) at the end of a request, and to specify which resume point
236  * (cookie) to restart from at the beginning of the next search.
237  *	smb_odir_save_cookie(..., cookie)
238  *	smb_odir_resume_at(smb_odir_resume_t *resume)
239  * A search can be resumed at a specified resume point (cookie), the resume
240  * point (cookie) stored at a specified index in the d_cookies array, or
241  * a specified filename. The latter (specified filename) is not yet supported.
242  *
243  * See smb_search, smb_find, smb_find_unique, and smb_trans2_find for details
244  */
245 
246 #include <smbsrv/smb_kproto.h>
247 #include <smbsrv/smb_fsops.h>
248 #include <smbsrv/smb_share.h>
249 #include <sys/extdirent.h>
250 
251 /* static functions */
252 static uint16_t smb_odir_create(smb_request_t *, smb_node_t *,
253     char *, uint16_t, cred_t *);
254 static int smb_odir_single_fileinfo(smb_request_t *, smb_odir_t *,
255     smb_fileinfo_t *);
256 static int smb_odir_wildcard_fileinfo(smb_request_t *, smb_odir_t *,
257     smb_odirent_t *, smb_fileinfo_t *);
258 static int smb_odir_next_odirent(smb_odir_t *, smb_odirent_t *);
259 static boolean_t smb_odir_lookup_link(smb_request_t *, smb_odir_t *,
260     char *, smb_node_t **);
261 static boolean_t smb_odir_match_name(smb_odir_t *, smb_odirent_t *);
262 
263 
264 /*
265  * smb_odir_open
266  *
267  * Create an odir representing the directory specified in pathname.
268  *
269  * Returns:
270  * odid - Unique identifier of newly created odir.
271  *    0 - error, error details set in sr.
272  */
273 uint16_t
274 smb_odir_open(smb_request_t *sr, char *path, uint16_t sattr, uint32_t flags)
275 {
276 	int		rc;
277 	smb_tree_t	*tree;
278 	smb_node_t	*dnode;
279 	char		pattern[MAXNAMELEN];
280 	uint16_t 	odid;
281 	cred_t		*cr;
282 
283 	ASSERT(sr);
284 	ASSERT(sr->sr_magic == SMB_REQ_MAGIC);
285 	ASSERT(sr->tid_tree);
286 	ASSERT(sr->tid_tree->t_magic == SMB_TREE_MAGIC);
287 
288 	tree = sr->tid_tree;
289 
290 	if (sr->session->dialect < NT_LM_0_12)
291 		smb_convert_wildcards(path);
292 
293 	rc = smb_pathname_reduce(sr, sr->user_cr, path,
294 	    tree->t_snode, tree->t_snode, &dnode, pattern);
295 	if (rc != 0) {
296 		smbsr_errno(sr, rc);
297 		return (0);
298 	}
299 
300 	if (!smb_node_is_dir(dnode)) {
301 		smbsr_error(sr, NT_STATUS_OBJECT_PATH_NOT_FOUND,
302 		    ERRDOS, ERROR_PATH_NOT_FOUND);
303 		smb_node_release(dnode);
304 		return (0);
305 	}
306 
307 	if (smb_fsop_access(sr, sr->user_cr, dnode, FILE_LIST_DIRECTORY) != 0) {
308 		smbsr_error(sr, NT_STATUS_ACCESS_DENIED,
309 		    ERRDOS, ERROR_ACCESS_DENIED);
310 		smb_node_release(dnode);
311 		return (0);
312 	}
313 
314 	if (flags & SMB_ODIR_OPENF_BACKUP_INTENT)
315 		cr = smb_user_getprivcred(sr->uid_user);
316 	else
317 		cr = sr->uid_user->u_cred;
318 
319 	odid = smb_odir_create(sr, dnode, pattern, sattr, cr);
320 	smb_node_release(dnode);
321 	return (odid);
322 }
323 
324 /*
325  * smb_odir_openat
326  *
327  * Create an odir representing the extended attribute directory
328  * associated with the file (or directory) represented by unode.
329  *
330  * Returns:
331  * odid - Unique identifier of newly created odir.
332  *    0 - error, error details set in sr.
333  */
334 uint16_t
335 smb_odir_openat(smb_request_t *sr, smb_node_t *unode)
336 {
337 	int		rc;
338 	vnode_t		*xattr_dvp;
339 	uint16_t	odid;
340 	cred_t		*cr;
341 	char		pattern[SMB_STREAM_PREFIX_LEN + 2];
342 
343 	smb_node_t	*xattr_dnode;
344 
345 	ASSERT(sr);
346 	ASSERT(sr->sr_magic == SMB_REQ_MAGIC);
347 	ASSERT(unode);
348 	ASSERT(unode->n_magic == SMB_NODE_MAGIC);
349 
350 	if (SMB_TREE_CONTAINS_NODE(sr, unode) == 0 ||
351 	    SMB_TREE_HAS_ACCESS(sr, ACE_LIST_DIRECTORY) == 0) {
352 		smbsr_error(sr, NT_STATUS_ACCESS_DENIED,
353 		    ERRDOS, ERROR_ACCESS_DENIED);
354 		return (0);
355 	}
356 	cr = zone_kcred();
357 
358 	/* find the xattrdir vnode */
359 	rc = smb_vop_lookup_xattrdir(unode->vp, &xattr_dvp, LOOKUP_XATTR, cr);
360 	if (rc != 0) {
361 		smbsr_errno(sr, rc);
362 		return (0);
363 	}
364 
365 	/* lookup the xattrdir's smb_node */
366 	xattr_dnode = smb_node_lookup(sr, NULL, cr, xattr_dvp, XATTR_DIR,
367 	    unode, NULL);
368 	VN_RELE(xattr_dvp);
369 	if (xattr_dnode == NULL) {
370 		smbsr_error(sr, NT_STATUS_NO_MEMORY,
371 		    ERRDOS, ERROR_NOT_ENOUGH_MEMORY);
372 		return (0);
373 	}
374 
375 	(void) snprintf(pattern, sizeof (pattern), "%s*", SMB_STREAM_PREFIX);
376 	odid = smb_odir_create(sr, xattr_dnode, pattern, SMB_SEARCH_ATTRIBUTES,
377 	    cr);
378 	smb_node_release(xattr_dnode);
379 	return (odid);
380 }
381 
382 /*
383  * smb_odir_hold
384  *
385  * A hold will only be granted if the odir is open or in_use.
386  */
387 boolean_t
388 smb_odir_hold(smb_odir_t *od)
389 {
390 	ASSERT(od);
391 	ASSERT(od->d_magic == SMB_ODIR_MAGIC);
392 
393 	mutex_enter(&od->d_mutex);
394 
395 	switch (od->d_state) {
396 	case SMB_ODIR_STATE_OPEN:
397 		od->d_refcnt++;
398 		od->d_state = SMB_ODIR_STATE_IN_USE;
399 		break;
400 	case SMB_ODIR_STATE_IN_USE:
401 		od->d_refcnt++;
402 		break;
403 	case SMB_ODIR_STATE_CLOSING:
404 	case SMB_ODIR_STATE_CLOSED:
405 	default:
406 		mutex_exit(&od->d_mutex);
407 		return (B_FALSE);
408 	}
409 
410 	mutex_exit(&od->d_mutex);
411 	return (B_TRUE);
412 }
413 
414 /*
415  * If the odir is in SMB_ODIR_STATE_CLOSING and this release results in
416  * a refcnt of 0, change the state to SMB_ODIR_STATE_CLOSED and post the
417  * object for deletion.  Object deletion is deferred to avoid modifying
418  * a list while an iteration may be in progress.
419  */
420 void
421 smb_odir_release(smb_odir_t *od)
422 {
423 	SMB_ODIR_VALID(od);
424 
425 	mutex_enter(&od->d_mutex);
426 	ASSERT(od->d_refcnt > 0);
427 
428 	switch (od->d_state) {
429 	case SMB_ODIR_STATE_OPEN:
430 		break;
431 	case SMB_ODIR_STATE_IN_USE:
432 		od->d_refcnt--;
433 		if (od->d_refcnt == 0)
434 			od->d_state = SMB_ODIR_STATE_OPEN;
435 		break;
436 	case SMB_ODIR_STATE_CLOSING:
437 		od->d_refcnt--;
438 		if (od->d_refcnt == 0) {
439 			od->d_state = SMB_ODIR_STATE_CLOSED;
440 			smb_tree_post_odir(od->d_tree, od);
441 		}
442 		break;
443 	case SMB_ODIR_STATE_CLOSED:
444 	default:
445 		break;
446 	}
447 
448 	mutex_exit(&od->d_mutex);
449 }
450 
451 /*
452  * smb_odir_close
453  */
454 void
455 smb_odir_close(smb_odir_t *od)
456 {
457 	ASSERT(od);
458 	ASSERT(od->d_magic == SMB_ODIR_MAGIC);
459 
460 	mutex_enter(&od->d_mutex);
461 	ASSERT(od->d_refcnt > 0);
462 	switch (od->d_state) {
463 	case SMB_ODIR_STATE_OPEN:
464 		break;
465 	case SMB_ODIR_STATE_IN_USE:
466 		od->d_state = SMB_ODIR_STATE_CLOSING;
467 		break;
468 	case SMB_ODIR_STATE_CLOSING:
469 	case SMB_ODIR_STATE_CLOSED:
470 	default:
471 		break;
472 	}
473 	mutex_exit(&od->d_mutex);
474 }
475 
476 /*
477  * smb_odir_read
478  *
479  * Find the next directory entry matching the search pattern.
480  * No search attribute matching is performed.
481  *
482  * Returns:
483  *  0 - success.
484  *      - If a matching entry was found eof will be B_FALSE and
485  *        odirent will be populated.
486  *      - If there are no matching entries eof will be B_TRUE.
487  * -1 - error, error details set in sr.
488  */
489 int
490 smb_odir_read(smb_request_t *sr, smb_odir_t *od,
491     smb_odirent_t *odirent, boolean_t *eof)
492 {
493 	int		rc;
494 
495 	ASSERT(sr);
496 	ASSERT(sr->sr_magic == SMB_REQ_MAGIC);
497 	ASSERT(od);
498 	ASSERT(od->d_magic == SMB_ODIR_MAGIC);
499 	ASSERT(odirent);
500 
501 	mutex_enter(&od->d_mutex);
502 	ASSERT(od->d_refcnt > 0);
503 
504 	switch (od->d_state) {
505 	case SMB_ODIR_STATE_IN_USE:
506 	case SMB_ODIR_STATE_CLOSING:
507 		break;
508 	case SMB_ODIR_STATE_OPEN:
509 	case SMB_ODIR_STATE_CLOSED:
510 	default:
511 		mutex_exit(&od->d_mutex);
512 		return (-1);
513 	}
514 
515 	for (;;) {
516 		if ((rc = smb_odir_next_odirent(od, odirent)) != 0)
517 			break;
518 		if (smb_odir_match_name(od, odirent))
519 			break;
520 	}
521 
522 	mutex_exit(&od->d_mutex);
523 
524 	switch (rc) {
525 	case 0:
526 		*eof = B_FALSE;
527 		return (0);
528 	case ENOENT:
529 		*eof = B_TRUE;
530 		return (0);
531 	default:
532 		smbsr_errno(sr, rc);
533 		return (-1);
534 	}
535 }
536 
537 /*
538  * smb_odir_read_fileinfo
539  *
540  * Find the next directory entry matching the search pattern
541  * and attributes: od->d_pattern and od->d_sattr.
542  *
543  * If the search pattern specifies a single filename call
544  * smb_odir_single_fileinfo to get the file attributes and
545  * populate the caller's smb_fileinfo_t.
546  *
547  * If the search pattern contains wildcards call smb_odir_next_odirent
548  * to get the next directory entry then. Repeat until a matching
549  * filename is found. Call smb_odir_wildcard_fileinfo to get the
550  * file attributes and populate the caller's smb_fileinfo_t.
551  * This is repeated until a file matching the search criteria is found.
552  *
553  * Returns:
554  *  0 - success.
555  *      - If a matching entry was found eof will be B_FALSE and
556  *        fileinfo will be populated.
557  *      - If there are no matching entries eof will be B_TRUE.
558  * -1 - error, error details set in sr.
559  */
560 int
561 smb_odir_read_fileinfo(smb_request_t *sr, smb_odir_t *od,
562     smb_fileinfo_t *fileinfo, uint16_t *eof)
563 {
564 	int		rc, errnum;
565 	smb_odirent_t	*odirent;
566 
567 	ASSERT(sr);
568 	ASSERT(sr->sr_magic == SMB_REQ_MAGIC);
569 	ASSERT(od);
570 	ASSERT(od->d_magic == SMB_ODIR_MAGIC);
571 	ASSERT(fileinfo);
572 
573 	mutex_enter(&od->d_mutex);
574 	ASSERT(od->d_refcnt > 0);
575 
576 	switch (od->d_state) {
577 	case SMB_ODIR_STATE_IN_USE:
578 	case SMB_ODIR_STATE_CLOSING:
579 		break;
580 	case SMB_ODIR_STATE_OPEN:
581 	case SMB_ODIR_STATE_CLOSED:
582 	default:
583 		mutex_exit(&od->d_mutex);
584 		return (-1);
585 	}
586 
587 	if ((od->d_flags & SMB_ODIR_FLAG_WILDCARDS) == 0) {
588 		if (od->d_eof)
589 			rc = ENOENT;
590 		else
591 			rc = smb_odir_single_fileinfo(sr, od, fileinfo);
592 		od->d_eof = B_TRUE;
593 	} else {
594 		odirent = kmem_alloc(sizeof (smb_odirent_t), KM_SLEEP);
595 		for (;;) {
596 			bzero(fileinfo, sizeof (smb_fileinfo_t));
597 			if ((rc = smb_odir_next_odirent(od, odirent)) != 0)
598 				break;
599 
600 			/* skip non utf8 filename */
601 			if (u8_validate(odirent->od_name,
602 			    strlen(odirent->od_name), NULL,
603 			    U8_VALIDATE_ENTIRE, &errnum) < 0)
604 				continue;
605 
606 			if (!smb_odir_match_name(od, odirent))
607 				continue;
608 
609 			rc = smb_odir_wildcard_fileinfo(sr, od, odirent,
610 			    fileinfo);
611 			if (rc == 0)
612 				break;
613 		}
614 		kmem_free(odirent, sizeof (smb_odirent_t));
615 	}
616 	mutex_exit(&od->d_mutex);
617 
618 	switch (rc) {
619 	case 0:
620 		*eof = 0;
621 		return (0);
622 	case ENOENT:
623 		*eof = 1;	/* per. FindFirst, FindNext spec. */
624 		return (0);
625 	default:
626 		smbsr_errno(sr, rc);
627 		return (-1);
628 	}
629 }
630 
631 /*
632  * smb_odir_read_streaminfo
633  *
634  * Find the next directory entry whose name begins with SMB_STREAM_PREFIX,
635  * and thus represents an NTFS named stream.
636  * No search attribute matching is performed.
637  * No case conflict name mangling is required for NTFS named stream names.
638  *
639  * Returns:
640  *  0 - success.
641  *      - If a matching entry was found eof will be B_FALSE and
642  *        sinfo will be populated.
643  *      - If there are no matching entries eof will be B_TRUE.
644  * -1 - error, error details set in sr.
645  */
646 int
647 smb_odir_read_streaminfo(smb_request_t *sr, smb_odir_t *od,
648     smb_streaminfo_t *sinfo, boolean_t *eof)
649 {
650 	int		rc;
651 	smb_odirent_t	*odirent;
652 	smb_node_t	*fnode;
653 	smb_attr_t	attr;
654 
655 	ASSERT(sr);
656 	ASSERT(sr->sr_magic == SMB_REQ_MAGIC);
657 	ASSERT(od);
658 	ASSERT(od->d_magic == SMB_ODIR_MAGIC);
659 	ASSERT(sinfo);
660 
661 	mutex_enter(&od->d_mutex);
662 	ASSERT(od->d_refcnt > 0);
663 
664 	switch (od->d_state) {
665 	case SMB_ODIR_STATE_IN_USE:
666 	case SMB_ODIR_STATE_CLOSING:
667 		break;
668 	case SMB_ODIR_STATE_OPEN:
669 	case SMB_ODIR_STATE_CLOSED:
670 	default:
671 		mutex_exit(&od->d_mutex);
672 		return (-1);
673 	}
674 
675 	/* Check that odir represents an xattr directory */
676 	if (!(od->d_flags & SMB_ODIR_FLAG_XATTR)) {
677 		*eof = B_TRUE;
678 		mutex_exit(&od->d_mutex);
679 		return (0);
680 	}
681 
682 	odirent = kmem_alloc(sizeof (smb_odirent_t), KM_SLEEP);
683 	bzero(&attr, sizeof (attr));
684 
685 	for (;;) {
686 		bzero(sinfo, sizeof (smb_streaminfo_t));
687 		if ((rc = smb_odir_next_odirent(od, odirent)) != 0)
688 			break;
689 
690 		if (strncmp(odirent->od_name, SMB_STREAM_PREFIX,
691 		    SMB_STREAM_PREFIX_LEN)) {
692 			continue;
693 		}
694 
695 		rc = smb_fsop_lookup(sr, od->d_cred, 0, od->d_tree->t_snode,
696 		    od->d_dnode, odirent->od_name, &fnode);
697 		if (rc == 0) {
698 			attr.sa_mask = SMB_AT_SIZE | SMB_AT_ALLOCSZ;
699 			rc = smb_node_getattr(sr, fnode, od->d_cred,
700 			    NULL, &attr);
701 			smb_node_release(fnode);
702 		}
703 
704 		if (rc == 0) {
705 			(void) strlcpy(sinfo->si_name,
706 			    odirent->od_name + SMB_STREAM_PREFIX_LEN,
707 			    sizeof (sinfo->si_name));
708 			sinfo->si_size = attr.sa_vattr.va_size;
709 			sinfo->si_alloc_size = attr.sa_allocsz;
710 			break;
711 		}
712 	}
713 	mutex_exit(&od->d_mutex);
714 
715 	kmem_free(odirent, sizeof (smb_odirent_t));
716 
717 	switch (rc) {
718 	case 0:
719 		*eof = B_FALSE;
720 		return (0);
721 	case ENOENT:
722 		*eof = B_TRUE;
723 		return (0);
724 	default:
725 		smbsr_errno(sr, rc);
726 		return (-1);
727 	}
728 }
729 
730 /*
731  * smb_odir_save_cookie
732  *
733  * Callers can save up to SMB_MAX_SEARCH cookies in the odir
734  * to be used as resume points for a 'find next' request.
735  */
736 void
737 smb_odir_save_cookie(smb_odir_t *od, int idx, uint32_t cookie)
738 {
739 	ASSERT(od);
740 	ASSERT(od->d_magic == SMB_ODIR_MAGIC);
741 	ASSERT(idx >= 0 && idx < SMB_MAX_SEARCH);
742 
743 	mutex_enter(&od->d_mutex);
744 	od->d_cookies[idx] = cookie;
745 	mutex_exit(&od->d_mutex);
746 }
747 
748 /*
749  * smb_odir_save_fname
750  *
751  * Save a filename / offset pair, which are basically a
752  * one entry cache.  See smb_com_trans2_find_next2.
753  */
754 void
755 smb_odir_save_fname(smb_odir_t *od, uint32_t cookie, const char *fname)
756 {
757 	ASSERT(od);
758 	ASSERT(od->d_magic == SMB_ODIR_MAGIC);
759 
760 	mutex_enter(&od->d_mutex);
761 
762 	od->d_last_cookie = cookie;
763 	bzero(od->d_last_name, MAXNAMELEN);
764 	if (fname != NULL)
765 		(void) strlcpy(od->d_last_name, fname, MAXNAMELEN);
766 
767 	mutex_exit(&od->d_mutex);
768 }
769 
770 /*
771  * smb_odir_resume_at
772  *
773  * If SMB_ODIR_FLAG_WILDCARDS is not set the search is for a single
774  * file and should not be resumed.
775  *
776  * Wildcard searching can be resumed from:
777  * - the cookie saved at a specified index (SMBsearch, SMBfind).
778  * - a specified cookie (SMB_trans2_find)
779  * - a specified filename (SMB_trans2_find) - NOT SUPPORTED.
780  *   Defaults to continuing from where the last search ended.
781  *
782  * Continuation from where the last search ended (SMB_trans2_find)
783  * is implemented by saving the last cookie at a specific index (0)
784  * smb_odir_resume_at indicates a new request, so reset od->d_bufptr
785  * and d_eof to force a vop_readdir.
786  */
787 void
788 smb_odir_resume_at(smb_odir_t *od, smb_odir_resume_t *resume)
789 {
790 	ASSERT(od);
791 	ASSERT(od->d_magic == SMB_ODIR_MAGIC);
792 	ASSERT(resume);
793 
794 	mutex_enter(&od->d_mutex);
795 
796 	if ((od->d_flags & SMB_ODIR_FLAG_WILDCARDS) == 0) {
797 		od->d_eof = B_TRUE;
798 		mutex_exit(&od->d_mutex);
799 		return;
800 	}
801 
802 	switch (resume->or_type) {
803 
804 	default:
805 	case SMB_ODIR_RESUME_CONT:
806 		/* Continue where we left off. */
807 		break;
808 
809 	case SMB_ODIR_RESUME_IDX:
810 		/*
811 		 * This is used only by the (ancient) SMB_SEARCH.
812 		 * Modern clients use trans2 FindFirst, FindNext.
813 		 */
814 		ASSERT(resume->or_idx >= 0);
815 		ASSERT(resume->or_idx < SMB_MAX_SEARCH);
816 
817 		if ((resume->or_idx < 0) ||
818 		    (resume->or_idx >= SMB_MAX_SEARCH)) {
819 			resume->or_idx = 0;
820 		}
821 		od->d_offset = od->d_cookies[resume->or_idx];
822 		break;
823 
824 	case SMB_ODIR_RESUME_COOKIE:
825 		od->d_offset = resume->or_cookie;
826 		break;
827 
828 	case SMB_ODIR_RESUME_FNAME:
829 		/*
830 		 * If the name matches the last one saved,
831 		 * use the offset that was saved with it in
832 		 * the odir.  Otherwise use the cookie value
833 		 * in the resume data from the client.
834 		 */
835 		if (strcmp(resume->or_fname, od->d_last_name) &&
836 		    od->d_last_cookie != 0) {
837 			od->d_offset = od->d_last_cookie;
838 		} else if (resume->or_cookie != 0) {
839 			od->d_offset = resume->or_cookie;
840 		} /* else continue where we left off */
841 		break;
842 	}
843 
844 	/* Force a vop_readdir to refresh d_buf */
845 	od->d_bufptr = NULL;
846 	od->d_eof = B_FALSE;
847 
848 	mutex_exit(&od->d_mutex);
849 }
850 
851 
852 /* *** static functions *** */
853 
854 /*
855  * smb_odir_create
856  * Allocate and populate an odir obect and add it to the tree's list.
857  */
858 static uint16_t
859 smb_odir_create(smb_request_t *sr, smb_node_t *dnode,
860     char *pattern, uint16_t sattr, cred_t *cr)
861 {
862 	smb_odir_t	*od;
863 	smb_tree_t	*tree;
864 	uint16_t	odid;
865 
866 	ASSERT(sr);
867 	ASSERT(sr->sr_magic == SMB_REQ_MAGIC);
868 	ASSERT(sr->tid_tree);
869 	ASSERT(sr->tid_tree->t_magic == SMB_TREE_MAGIC);
870 	ASSERT(dnode);
871 	ASSERT(dnode->n_magic == SMB_NODE_MAGIC);
872 
873 	tree = sr->tid_tree;
874 
875 	if (smb_idpool_alloc(&tree->t_odid_pool, &odid)) {
876 		smbsr_error(sr, NT_STATUS_TOO_MANY_OPENED_FILES,
877 		    ERRDOS, ERROR_TOO_MANY_OPEN_FILES);
878 		return (0);
879 	}
880 
881 	od = kmem_cache_alloc(smb_cache_odir, KM_SLEEP);
882 	bzero(od, sizeof (smb_odir_t));
883 
884 	mutex_init(&od->d_mutex, NULL, MUTEX_DEFAULT, NULL);
885 	od->d_refcnt = 0;
886 	od->d_state = SMB_ODIR_STATE_OPEN;
887 	od->d_magic = SMB_ODIR_MAGIC;
888 	od->d_opened_by_pid = sr->smb_pid;
889 	od->d_session = tree->t_session;
890 	od->d_cred = cr;
891 	/*
892 	 * grab a ref for od->d_user
893 	 * released in  smb_odir_delete()
894 	 */
895 	smb_user_hold_internal(sr->uid_user);
896 	od->d_user = sr->uid_user;
897 	od->d_tree = tree;
898 	od->d_dnode = dnode;
899 	smb_node_ref(dnode);
900 	od->d_odid = odid;
901 	od->d_sattr = sattr;
902 	(void) strlcpy(od->d_pattern, pattern, sizeof (od->d_pattern));
903 	od->d_flags = 0;
904 	if (smb_contains_wildcards(od->d_pattern))
905 		od->d_flags |= SMB_ODIR_FLAG_WILDCARDS;
906 	if (vfs_has_feature(dnode->vp->v_vfsp, VFSFT_DIRENTFLAGS))
907 		od->d_flags |= SMB_ODIR_FLAG_EDIRENT;
908 	if (smb_tree_has_feature(tree, SMB_TREE_CASEINSENSITIVE))
909 		od->d_flags |= SMB_ODIR_FLAG_IGNORE_CASE;
910 	if (smb_tree_has_feature(tree, SMB_TREE_SHORTNAMES))
911 		od->d_flags |= SMB_ODIR_FLAG_SHORTNAMES;
912 	if (SMB_TREE_SUPPORTS_CATIA(sr))
913 		od->d_flags |= SMB_ODIR_FLAG_CATIA;
914 	if (SMB_TREE_SUPPORTS_ABE(sr))
915 		od->d_flags |= SMB_ODIR_FLAG_ABE;
916 	if (dnode->flags & NODE_XATTR_DIR)
917 		od->d_flags |= SMB_ODIR_FLAG_XATTR;
918 	od->d_eof = B_FALSE;
919 
920 	smb_llist_enter(&tree->t_odir_list, RW_WRITER);
921 	smb_llist_insert_tail(&tree->t_odir_list, od);
922 	smb_llist_exit(&tree->t_odir_list);
923 
924 	atomic_inc_32(&tree->t_session->s_dir_cnt);
925 	return (odid);
926 }
927 
928 /*
929  * Delete an odir.
930  *
931  * Remove the odir from the tree list before freeing resources
932  * associated with the odir.
933  */
934 void
935 smb_odir_delete(void *arg)
936 {
937 	smb_tree_t	*tree;
938 	smb_odir_t	*od = (smb_odir_t *)arg;
939 
940 	SMB_ODIR_VALID(od);
941 	ASSERT(od->d_refcnt == 0);
942 	ASSERT(od->d_state == SMB_ODIR_STATE_CLOSED);
943 
944 	tree = od->d_tree;
945 	smb_llist_enter(&tree->t_odir_list, RW_WRITER);
946 	smb_llist_remove(&tree->t_odir_list, od);
947 	smb_idpool_free(&tree->t_odid_pool, od->d_odid);
948 	atomic_dec_32(&tree->t_session->s_dir_cnt);
949 	smb_llist_exit(&tree->t_odir_list);
950 
951 	mutex_enter(&od->d_mutex);
952 	mutex_exit(&od->d_mutex);
953 
954 	od->d_magic = 0;
955 	smb_node_release(od->d_dnode);
956 	smb_user_release(od->d_user);
957 	mutex_destroy(&od->d_mutex);
958 	kmem_cache_free(smb_cache_odir, od);
959 }
960 
961 /*
962  * smb_odir_next_odirent
963  *
964  * Find the next directory entry in d_buf. If d_bufptr is NULL (buffer
965  * is empty or we've reached the end of it), read the next set of
966  * entries from the file system (vop_readdir).
967  *
968  * File systems which support VFSFT_EDIRENT_FLAGS will return the
969  * directory entries as a buffer of edirent_t structure. Others will
970  * return a buffer of dirent64_t structures.  For simplicity translate
971  * the data into an smb_odirent_t structure.
972  * The ed_name/d_name in d_buf is NULL terminated by the file system.
973  *
974  * Some file systems can have directories larger than SMB_MAXDIRSIZE.
975  * If the odirent offset >= SMB_MAXDIRSIZE return ENOENT and set d_eof
976  * to true to stop subsequent calls to smb_vop_readdir.
977  *
978  * Returns:
979  *      0 - success. odirent is populated with the next directory entry
980  * ENOENT - no more directory entries
981  *  errno - error
982  */
983 static int
984 smb_odir_next_odirent(smb_odir_t *od, smb_odirent_t *odirent)
985 {
986 	int		rc;
987 	int		reclen;
988 	int		eof;
989 	dirent64_t	*dp;
990 	edirent_t	*edp;
991 	char		*np;
992 	uint32_t	abe_flag = 0;
993 
994 	ASSERT(MUTEX_HELD(&od->d_mutex));
995 
996 	bzero(odirent, sizeof (smb_odirent_t));
997 
998 	if (od->d_bufptr != NULL) {
999 		if (od->d_flags & SMB_ODIR_FLAG_EDIRENT)
1000 			reclen = od->d_edp->ed_reclen;
1001 		else
1002 			reclen = od->d_dp->d_reclen;
1003 
1004 		if (reclen == 0) {
1005 			od->d_bufptr = NULL;
1006 		} else {
1007 			od->d_bufptr += reclen;
1008 			if (od->d_bufptr >= od->d_buf + od->d_bufsize)
1009 				od->d_bufptr = NULL;
1010 		}
1011 	}
1012 
1013 	if (od->d_bufptr == NULL) {
1014 		if (od->d_eof)
1015 			return (ENOENT);
1016 
1017 		od->d_bufsize = sizeof (od->d_buf);
1018 
1019 		if (od->d_flags & SMB_ODIR_FLAG_ABE)
1020 			abe_flag = SMB_ABE;
1021 
1022 		rc = smb_vop_readdir(od->d_dnode->vp, od->d_offset,
1023 		    od->d_buf, &od->d_bufsize, &eof, abe_flag, od->d_cred);
1024 
1025 		if ((rc == 0) && (od->d_bufsize == 0))
1026 			rc = ENOENT;
1027 
1028 		if (rc != 0) {
1029 			od->d_bufptr = NULL;
1030 			od->d_bufsize = 0;
1031 			return (rc);
1032 		}
1033 
1034 		od->d_eof = (eof != 0);
1035 		od->d_bufptr = od->d_buf;
1036 	}
1037 
1038 	if (od->d_flags & SMB_ODIR_FLAG_EDIRENT)
1039 		od->d_offset = od->d_edp->ed_off;
1040 	else
1041 		od->d_offset = od->d_dp->d_off;
1042 
1043 	if (od->d_offset >= SMB_MAXDIRSIZE) {
1044 		od->d_bufptr = NULL;
1045 		od->d_bufsize = 0;
1046 		od->d_eof = B_TRUE;
1047 		return (ENOENT);
1048 	}
1049 
1050 	if (od->d_flags & SMB_ODIR_FLAG_EDIRENT) {
1051 		edp = od->d_edp;
1052 		odirent->od_ino = edp->ed_ino;
1053 		odirent->od_eflags = edp->ed_eflags;
1054 		np = edp->ed_name;
1055 	} else {
1056 		dp = od->d_dp;
1057 		odirent->od_ino = dp->d_ino;
1058 		odirent->od_eflags = 0;
1059 		np =  dp->d_name;
1060 	}
1061 
1062 	if ((od->d_flags & SMB_ODIR_FLAG_CATIA) &&
1063 	    ((od->d_flags & SMB_ODIR_FLAG_XATTR) == 0)) {
1064 		smb_vop_catia_v4tov5(np, odirent->od_name,
1065 		    sizeof (odirent->od_name));
1066 	} else {
1067 		(void) strlcpy(odirent->od_name, np,
1068 		    sizeof (odirent->od_name));
1069 	}
1070 
1071 	return (0);
1072 }
1073 
1074 /*
1075  * smb_odir_single_fileinfo
1076  *
1077  * Lookup the file identified by od->d_pattern.
1078  *
1079  * If the looked up file is a link, we attempt to lookup the link target
1080  * to use its attributes in place of those of the files's.
1081  * If we fail to lookup the target of the link we use the original
1082  * file's attributes.
1083  * Check if the attributes match the search attributes.
1084  *
1085  * Returns: 0 - success
1086  *     ENOENT - no match
1087  *      errno - error
1088  */
1089 static int
1090 smb_odir_single_fileinfo(smb_request_t *sr, smb_odir_t *od,
1091     smb_fileinfo_t *fileinfo)
1092 {
1093 	int		rc;
1094 	smb_node_t	*fnode, *tgt_node;
1095 	smb_attr_t	attr;
1096 	ino64_t		fid;
1097 	char		*name;
1098 	boolean_t	case_conflict = B_FALSE;
1099 	int		lookup_flags, flags = 0;
1100 	vnode_t		*vp;
1101 
1102 	ASSERT(sr);
1103 	ASSERT(sr->sr_magic == SMB_REQ_MAGIC);
1104 	ASSERT(od);
1105 	ASSERT(od->d_magic == SMB_ODIR_MAGIC);
1106 
1107 	ASSERT(MUTEX_HELD(&od->d_mutex));
1108 	bzero(fileinfo, sizeof (smb_fileinfo_t));
1109 
1110 	rc = smb_fsop_lookup(sr, od->d_cred, 0, od->d_tree->t_snode,
1111 	    od->d_dnode, od->d_pattern, &fnode);
1112 	if (rc != 0)
1113 		return (rc);
1114 
1115 	/*
1116 	 * If case sensitive, do a case insensitive smb_vop_lookup to
1117 	 * check for case conflict
1118 	 */
1119 	if (od->d_flags & SMB_ODIR_FLAG_IGNORE_CASE) {
1120 		lookup_flags = SMB_IGNORE_CASE;
1121 		if (od->d_flags & SMB_ODIR_FLAG_CATIA)
1122 			lookup_flags |= SMB_CATIA;
1123 
1124 		rc = smb_vop_lookup(od->d_dnode->vp, fnode->od_name, &vp,
1125 		    NULL, lookup_flags, &flags, od->d_tree->t_snode->vp,
1126 		    NULL, od->d_cred);
1127 		if (rc != 0)
1128 			return (rc);
1129 		VN_RELE(vp);
1130 
1131 		if (flags & ED_CASE_CONFLICT)
1132 			case_conflict = B_TRUE;
1133 	}
1134 
1135 	bzero(&attr, sizeof (attr));
1136 	attr.sa_mask = SMB_AT_ALL;
1137 	rc = smb_node_getattr(sr, fnode, zone_kcred(), NULL, &attr);
1138 	if (rc != 0) {
1139 		smb_node_release(fnode);
1140 		return (rc);
1141 	}
1142 
1143 
1144 	/* follow link to get target node & attr */
1145 	if (smb_node_is_symlink(fnode) &&
1146 	    smb_odir_lookup_link(sr, od, fnode->od_name, &tgt_node)) {
1147 		smb_node_release(fnode);
1148 		fnode = tgt_node;
1149 		attr.sa_mask = SMB_AT_ALL;
1150 		rc = smb_node_getattr(sr, fnode, zone_kcred(), NULL, &attr);
1151 		if (rc != 0) {
1152 			smb_node_release(fnode);
1153 			return (rc);
1154 		}
1155 	}
1156 
1157 	/* check search attributes */
1158 	if (!smb_sattr_check(attr.sa_dosattr, od->d_sattr)) {
1159 		smb_node_release(fnode);
1160 		return (ENOENT);
1161 	}
1162 
1163 	name = fnode->od_name;
1164 	if (od->d_flags & SMB_ODIR_FLAG_SHORTNAMES) {
1165 		fid = attr.sa_vattr.va_nodeid;
1166 		if (case_conflict || smb_needs_mangled(name)) {
1167 			smb_mangle(name, fid, fileinfo->fi_shortname,
1168 			    SMB_SHORTNAMELEN);
1169 		}
1170 		if (case_conflict)
1171 			name = fileinfo->fi_shortname;
1172 	}
1173 
1174 	(void) strlcpy(fileinfo->fi_name, name, sizeof (fileinfo->fi_name));
1175 
1176 	fileinfo->fi_dosattr = attr.sa_dosattr;
1177 	fileinfo->fi_nodeid = attr.sa_vattr.va_nodeid;
1178 	fileinfo->fi_size = attr.sa_vattr.va_size;
1179 	fileinfo->fi_alloc_size = attr.sa_allocsz;
1180 	fileinfo->fi_atime = attr.sa_vattr.va_atime;
1181 	fileinfo->fi_mtime = attr.sa_vattr.va_mtime;
1182 	fileinfo->fi_ctime = attr.sa_vattr.va_ctime;
1183 	if (attr.sa_crtime.tv_sec)
1184 		fileinfo->fi_crtime = attr.sa_crtime;
1185 	else
1186 		fileinfo->fi_crtime = attr.sa_vattr.va_mtime;
1187 
1188 	smb_node_release(fnode);
1189 	return (0);
1190 }
1191 
1192 /*
1193  * smb_odir_wildcard_fileinfo
1194  *
1195  * odirent contains a directory entry, obtained from a vop_readdir.
1196  * If a case conflict is identified the filename is mangled and the
1197  * shortname is used as 'name', in place of odirent->od_name.
1198  *
1199  * If the looked up file is a link, we attempt to lookup the link target
1200  * to use its attributes in place of those of the files's.
1201  * If we fail to lookup the target of the link we use the original
1202  * file's attributes.
1203  * Check if the attributes match the search attributes.
1204  *
1205  * Although some file systems can have directories larger than
1206  * SMB_MAXDIRSIZE smb_odir_next_odirent ensures that no offset larger
1207  * than SMB_MAXDIRSIZE is returned.  It is therefore safe to use the
1208  * offset as the cookie (uint32_t).
1209  *
1210  * Returns: 0 - success
1211  *     ENOENT - no match, proceed to next entry
1212  *      errno - error
1213  */
1214 static int
1215 smb_odir_wildcard_fileinfo(smb_request_t *sr, smb_odir_t *od,
1216     smb_odirent_t *odirent, smb_fileinfo_t *fileinfo)
1217 {
1218 	int		rc;
1219 	smb_node_t	*fnode, *tgt_node;
1220 	smb_attr_t	attr;
1221 	char		*name;
1222 	boolean_t	case_conflict;
1223 
1224 	ASSERT(sr);
1225 	ASSERT(sr->sr_magic == SMB_REQ_MAGIC);
1226 	ASSERT(od);
1227 	ASSERT(od->d_magic == SMB_ODIR_MAGIC);
1228 
1229 	ASSERT(MUTEX_HELD(&od->d_mutex));
1230 	bzero(fileinfo, sizeof (smb_fileinfo_t));
1231 
1232 	rc = smb_fsop_lookup(sr, od->d_cred, SMB_CASE_SENSITIVE,
1233 	    od->d_tree->t_snode, od->d_dnode, odirent->od_name, &fnode);
1234 	if (rc != 0)
1235 		return (rc);
1236 
1237 	/* follow link to get target node & attr */
1238 	if (smb_node_is_symlink(fnode) &&
1239 	    smb_odir_lookup_link(sr, od, odirent->od_name, &tgt_node)) {
1240 		smb_node_release(fnode);
1241 		fnode = tgt_node;
1242 	}
1243 
1244 	/* skip system files */
1245 	if (smb_node_is_system(fnode)) {
1246 		smb_node_release(fnode);
1247 		return (ENOENT);
1248 	}
1249 
1250 	bzero(&attr, sizeof (attr));
1251 	attr.sa_mask = SMB_AT_ALL;
1252 	rc = smb_node_getattr(sr, fnode, zone_kcred(), NULL, &attr);
1253 	if (rc != 0) {
1254 		smb_node_release(fnode);
1255 		return (rc);
1256 	}
1257 
1258 	/* check search attributes */
1259 	if (!smb_sattr_check(attr.sa_dosattr, od->d_sattr)) {
1260 		smb_node_release(fnode);
1261 		return (ENOENT);
1262 	}
1263 
1264 	name = odirent->od_name;
1265 	if (od->d_flags & SMB_ODIR_FLAG_SHORTNAMES) {
1266 		case_conflict = ((od->d_flags & SMB_ODIR_FLAG_IGNORE_CASE) &&
1267 		    (odirent->od_eflags & ED_CASE_CONFLICT));
1268 		if (case_conflict || smb_needs_mangled(name)) {
1269 			smb_mangle(name, odirent->od_ino,
1270 			    fileinfo->fi_shortname, SMB_SHORTNAMELEN);
1271 		}
1272 		if (case_conflict)
1273 			name = fileinfo->fi_shortname;
1274 	}
1275 
1276 	(void) strlcpy(fileinfo->fi_name, name, sizeof (fileinfo->fi_name));
1277 
1278 	fileinfo->fi_cookie = (uint32_t)od->d_offset;
1279 	fileinfo->fi_dosattr = attr.sa_dosattr;
1280 	fileinfo->fi_nodeid = attr.sa_vattr.va_nodeid;
1281 	fileinfo->fi_size = attr.sa_vattr.va_size;
1282 	fileinfo->fi_alloc_size = attr.sa_allocsz;
1283 	fileinfo->fi_atime = attr.sa_vattr.va_atime;
1284 	fileinfo->fi_mtime = attr.sa_vattr.va_mtime;
1285 	fileinfo->fi_ctime = attr.sa_vattr.va_ctime;
1286 	if (attr.sa_crtime.tv_sec)
1287 		fileinfo->fi_crtime = attr.sa_crtime;
1288 	else
1289 		fileinfo->fi_crtime = attr.sa_vattr.va_mtime;
1290 
1291 	smb_node_release(fnode);
1292 	return (0);
1293 }
1294 
1295 /*
1296  * smb_odir_lookup_link
1297  *
1298  * If the file is a symlink we lookup the object to which the
1299  * symlink refers so that we can return its attributes.
1300  * This can cause a problem if a symlink in a sub-directory
1301  * points to a parent directory (some UNIX GUI's create a symlink
1302  * in $HOME/.desktop that points to the user's home directory).
1303  * Some Windows applications (e.g. virus scanning) loop/hang
1304  * trying to follow this recursive path and there is little
1305  * we can do because the path is constructed on the client.
1306  * smb_dirsymlink_enable allows an end-user to disable
1307  * symlinks to directories. Symlinks to other object types
1308  * should be unaffected.
1309  *
1310  * Returns: B_TRUE  - followed link. tgt_node and tgt_attr set
1311  *          B_FALSE - link not followed
1312  */
1313 static boolean_t
1314 smb_odir_lookup_link(smb_request_t *sr, smb_odir_t *od,
1315     char *fname, smb_node_t **tgt_node)
1316 {
1317 	int rc;
1318 	uint32_t flags = SMB_FOLLOW_LINKS | SMB_CASE_SENSITIVE;
1319 
1320 	rc = smb_fsop_lookup(sr, od->d_cred, flags,
1321 	    od->d_tree->t_snode, od->d_dnode, fname, tgt_node);
1322 	if (rc != 0) {
1323 		*tgt_node = NULL;
1324 		return (B_FALSE);
1325 	}
1326 
1327 	if (smb_node_is_dir(*tgt_node) && (!smb_dirsymlink_enable)) {
1328 		smb_node_release(*tgt_node);
1329 		*tgt_node = NULL;
1330 		return (B_FALSE);
1331 	}
1332 
1333 	return (B_TRUE);
1334 }
1335 
1336 /*
1337  * smb_odir_match_name
1338  *
1339  * Check if the directory entry name matches the search pattern:
1340  * - Don't match reserved dos filenames.
1341  * - Check if odirent->od_name matches od->d_pattern.
1342  * - If shortnames are supported, generate the shortname from
1343  *   odirent->od_name and check if it matches od->d_pattern.
1344  */
1345 static boolean_t
1346 smb_odir_match_name(smb_odir_t *od, smb_odirent_t *odirent)
1347 {
1348 	char	*name = odirent->od_name;
1349 	char	shortname[SMB_SHORTNAMELEN];
1350 	ino64_t	ino = odirent->od_ino;
1351 	boolean_t ci = (od->d_flags & SMB_ODIR_FLAG_IGNORE_CASE) != 0;
1352 
1353 	if (smb_is_reserved_dos_name(name))
1354 		return (B_FALSE);
1355 
1356 	if (smb_match(od->d_pattern, name, ci))
1357 		return (B_TRUE);
1358 
1359 	if (od->d_flags & SMB_ODIR_FLAG_SHORTNAMES) {
1360 		smb_mangle(name, ino, shortname, SMB_SHORTNAMELEN);
1361 		if (smb_match(od->d_pattern, shortname, ci))
1362 			return (B_TRUE);
1363 	}
1364 
1365 	return (B_FALSE);
1366 }
1367