1 /* 2 * CDDL HEADER START 3 * 4 * The contents of this file are subject to the terms of the 5 * Common Development and Distribution License (the "License"). 6 * You may not use this file except in compliance with the License. 7 * 8 * You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE 9 * or http://www.opensolaris.org/os/licensing. 10 * See the License for the specific language governing permissions 11 * and limitations under the License. 12 * 13 * When distributing Covered Code, include this CDDL HEADER in each 14 * file and include the License file at usr/src/OPENSOLARIS.LICENSE. 15 * If applicable, add the following below this CDDL HEADER, with the 16 * fields enclosed by brackets "[]" replaced with your own identifying 17 * information: Portions Copyright [yyyy] [name of copyright owner] 18 * 19 * CDDL HEADER END 20 */ 21 /* 22 * Copyright 2009 Sun Microsystems, Inc. All rights reserved. 23 * Use is subject to license terms. 24 */ 25 26 /* 27 * General Structures Layout 28 * ------------------------- 29 * 30 * This is a simplified diagram showing the relationship between most of the 31 * main structures. 32 * 33 * +-------------------+ 34 * | SMB_INFO | 35 * +-------------------+ 36 * | 37 * | 38 * v 39 * +-------------------+ +-------------------+ +-------------------+ 40 * | SESSION |<----->| SESSION |......| SESSION | 41 * +-------------------+ +-------------------+ +-------------------+ 42 * | 43 * | 44 * v 45 * +-------------------+ +-------------------+ +-------------------+ 46 * | USER |<----->| USER |......| USER | 47 * +-------------------+ +-------------------+ +-------------------+ 48 * | 49 * | 50 * v 51 * +-------------------+ +-------------------+ +-------------------+ 52 * | TREE |<----->| TREE |......| TREE | 53 * +-------------------+ +-------------------+ +-------------------+ 54 * | | 55 * | | 56 * | v 57 * | +-------+ +-------+ +-------+ 58 * | | OFILE |<----->| OFILE |......| OFILE | 59 * | +-------+ +-------+ +-------+ 60 * | 61 * | 62 * v 63 * +-------+ +------+ +------+ 64 * | ODIR |<----->| ODIR |......| ODIR | 65 * +-------+ +------+ +------+ 66 * 67 * 68 * Odir State Machine 69 * ------------------ 70 * 71 * +-------------------------+ 72 * | SMB_ODIR_STATE_OPEN |<----------- open / creation 73 * +-------------------------+ 74 * | 75 * | close 76 * | 77 * v 78 * +-------------------------+ 79 * | SMB_ODIR_STATE_CLOSING | 80 * +-------------------------+ 81 * | 82 * | last release 83 * | 84 * v 85 * +-------------------------+ 86 * | SMB_ODIR_STATE_CLOSED |----------> deletion 87 * +-------------------------+ 88 * 89 * 90 * SMB_ODIR_STATE_OPEN 91 * - the odir exists in the list of odirs of its tree. 92 * - references will be given out if the odir is looked up 93 * - if a close is received the odir will transition to 94 * SMB_ODIR_STATE_CLOSING. 95 * 96 * SMB_ODIR_STATE_CLOSING 97 * - the odir exists in the list of odirs of its tree. 98 * - references will NOT be given out if the odir is looked up. 99 * - when the last reference is released (refcnt == 0) the 100 * odir will transition to SMB_ODIR_STATE_CLOSED. 101 * 102 * SMB_ODIR_STATE_CLOSED 103 * - the odir exists in the list of odirs of its tree. 104 * - there are no users of the odir (refcnt == 0) 105 * - references will NOT be given out if the odir is looked up. 106 * - the odir is being removed from the tree's list and deleted. 107 * 108 * Comments 109 * -------- 110 * The state machine of the odir structures is controlled by 3 elements: 111 * - The list of odirs of the tree it belongs to. 112 * - The mutex embedded in the structure itself. 113 * - The reference count. 114 * 115 * There's a mutex embedded in the odir structure used to protect its fields 116 * and there's a lock embedded in the list of odirs of a tree. To 117 * increment or to decrement the reference count the mutex must be entered. 118 * To insert the odir into the list of odirs of the tree and to remove 119 * the odir from it, the lock must be entered in RW_WRITER mode. 120 * 121 * In order to avoid deadlocks, when both (mutex and lock of the odir 122 * list) have to be entered, the lock must be entered first. 123 * 124 * 125 * Odir Interface 126 * --------------- 127 * odid = smb_odir_open(pathname) 128 * Create an odir representing the directory specified in pathname and 129 * add it into the tree's list of odirs. 130 * Return an identifier (odid) uniquely identifying the created odir. 131 * 132 * smb_odir_openat(smb_node_t *unode) 133 * Create an odir representing the extended attribute directory 134 * associated with the file (or directory) represented by unode 135 * and add it into the tree's list of odirs. 136 * Return an identifier (odid) uniquely identifying the created odir. 137 * 138 * smb_odir_t *odir = smb_tree_lookup_odir(odid) 139 * Find the odir corresponding to the specified odid in the tree's 140 * list of odirs. 141 * 142 * smb_odir_read(..., smb_odirent_t *odirent) 143 * Find the next directory entry in the odir and return it in odirent. 144 * 145 * smb_odir_read_fileinfo(..., smb_fileinfo_t *) 146 * Find the next directory entry in the odir. Return the details of 147 * the directory entry in smb_fileinfo_t. (See odir internals below) 148 * 149 * smb_odir_read_stream_info(..., smb_streaminfo_t *) 150 * Find the next named stream entry in the odir. Return the details of 151 * the named stream in smb_streaminfo_t. 152 * 153 * smb_odir_release(smb_odir_t *odir) 154 * Release the hold on the odir, obtained by lookup. 155 * 156 * smb_odir_close(smb_odir_t *odir) 157 * Close the odir and remove it from the tree's list of odirs. 158 * 159 * 160 * Odir Internals 161 * -------------- 162 * The odir object represent an open directory search. Each read operation 163 * provides the caller with a structure containing information pertaining 164 * to the next directory entry that matches the search criteria, namely 165 * the filename or match pattern and, in the case of smb_odir_read_fileinfo(), 166 * the search attributes. 167 * 168 * The odir maintains a buffer (d_buf) of directory entries read from 169 * the filesystem via a vop_readdir. The buffer is populated when a read 170 * request (smb_odir_next_odirent) finds that the buffer is empty or that 171 * the end of the buffer has been reached, and also when a new client request 172 * (find next) begins. 173 * 174 * The data in d_buf (that which is returned from the file system) can 175 * be in one of two formats. If the file system supports extended directory 176 * entries we request that the data be returned as edirent_t structures. If 177 * it does not the data will be returned as dirent64_t structures. For 178 * convenience, when the next directory entry is read from d_buf by 179 * smb_odir_next_odirent it is translated into an smb_odirent_t. 180 * 181 * smb_odir_read_fileinfo 182 * The processing required to obtain the information to populate the caller's 183 * smb_fileinfo_t differs depending upon whether the directory search is for a 184 * single specified filename or for multiple files matching a search pattern. 185 * Thus smb_odir_read_fileinfo uses two static functions: 186 * smb_odir_single_fileinfo - obtains the smb_fileinfo_t info for the single 187 * filename as specified in smb_odir_open request. 188 * smb_odir_wildcard_fileinfo - obtains the smb_fileinfo_t info for the filename 189 * returned from the smb_odir_next_odirent. This is called in a loop until 190 * an entry matching the search criteria is found or no more entries exist. 191 * 192 * If a directory entry is a VLNK, the name returned in the smb_fileinfo_t 193 * is the name of the directory entry but the attributes are the attribites 194 * of the file that is the target of the link. If the link target cannot 195 * be found the attributes returned are the attributes of the link itself. 196 * 197 * smb_odir_read_stream_info 198 * In order for an odir to provide information about stream files it 199 * must be opened with smb_odir_openat(). smb_odir_read_streaminfo() can 200 * then be used to obtain the name and size of named stream files. 201 * 202 * Resuming a Search 203 * ----------------- 204 * A directory search often consists of multiple client requests: an initial 205 * find_first request followed by zero or more find_next requests and a 206 * find_close request. 207 * The find_first request will open and lookup the odir, read its desired 208 * number of entries from the odir, then release the odir and return. 209 * A find_next request will lookup the odir and read its desired number of 210 * entries from the odir, then release the odir and return. 211 * At the end of the search the find_close request will close the odir. 212 * 213 * In order to be able to resume a directory search (find_next) the odir 214 * provides the capability for the caller to save one or more resume points 215 * (cookies) at the end of a request, and to specify which resume point 216 * (cookie) to restart from at the beginning of the next search. 217 * smb_odir_save_cookie(..., cookie) 218 * smb_odir_resume_at(smb_odir_resume_t *resume) 219 * A search can be resumed at a specified resume point (cookie), the resume 220 * point (cookie) stored at a specified index in the d_cookies array, or 221 * a specified filename. The latter (specified filename) is not yet supported. 222 * 223 * See smb_search, smb_find, smb_find_unique, and smb_trans2_find for details 224 */ 225 226 #include <smbsrv/smb_incl.h> 227 #include <smbsrv/smb_kproto.h> 228 #include <smbsrv/smb_fsops.h> 229 #include <sys/extdirent.h> 230 231 /* static functions */ 232 static smb_odir_t *smb_odir_create(smb_request_t *, smb_node_t *, 233 char *, uint16_t, cred_t *); 234 static void smb_odir_delete(smb_odir_t *); 235 static int smb_odir_single_fileinfo(smb_request_t *, smb_odir_t *, 236 smb_fileinfo_t *); 237 static int smb_odir_wildcard_fileinfo(smb_request_t *, smb_odir_t *, 238 smb_odirent_t *, smb_fileinfo_t *); 239 static int smb_odir_next_odirent(smb_odir_t *, smb_odirent_t *); 240 static boolean_t smb_odir_lookup_link(smb_request_t *, smb_odir_t *, char *, 241 smb_node_t **, smb_attr_t *); 242 243 244 /* 245 * smb_odir_open 246 * 247 * Create an odir representing the directory specified in pathname. 248 * 249 * Returns: 250 * odid - Unique identifier of newly created odir. 251 * 0 - error, error details set in sr. 252 */ 253 uint16_t 254 smb_odir_open(smb_request_t *sr, char *path, uint16_t sattr, uint32_t flags) 255 { 256 int rc; 257 smb_tree_t *tree; 258 smb_node_t *dnode; 259 char pattern[MAXNAMELEN]; 260 smb_odir_t *od; 261 cred_t *cr; 262 263 ASSERT(sr); 264 ASSERT(sr->sr_magic == SMB_REQ_MAGIC); 265 ASSERT(sr->tid_tree); 266 ASSERT(sr->tid_tree->t_magic == SMB_TREE_MAGIC); 267 268 tree = sr->tid_tree; 269 270 rc = smb_pathname_reduce(sr, sr->user_cr, path, 271 tree->t_snode, tree->t_snode, &dnode, pattern); 272 if (rc != 0) { 273 smbsr_errno(sr, rc); 274 return (0); 275 } 276 277 if (dnode->vp->v_type != VDIR) { 278 smbsr_error(sr, NT_STATUS_OBJECT_PATH_NOT_FOUND, 279 ERRDOS, ERROR_PATH_NOT_FOUND); 280 smb_node_release(dnode); 281 return (0); 282 } 283 284 if (smb_fsop_access(sr, sr->user_cr, dnode, FILE_LIST_DIRECTORY) != 0) { 285 smbsr_error(sr, NT_STATUS_ACCESS_DENIED, 286 ERRDOS, ERROR_ACCESS_DENIED); 287 smb_node_release(dnode); 288 return (0); 289 } 290 291 if (flags & SMB_ODIR_OPENF_BACKUP_INTENT) 292 cr = smb_user_getprivcred(tree->t_user); 293 else 294 cr = tree->t_user->u_cred; 295 296 od = smb_odir_create(sr, dnode, pattern, sattr, cr); 297 smb_node_release(dnode); 298 return (od ? od->d_odid : 0); 299 } 300 301 /* 302 * smb_odir_openat 303 * 304 * Create an odir representing the extended attribute directory 305 * associated with the file (or directory) represented by unode. 306 * 307 * Returns: 308 * odid - Unique identifier of newly created odir. 309 * 0 - error, error details set in sr. 310 */ 311 uint16_t 312 smb_odir_openat(smb_request_t *sr, smb_node_t *unode) 313 { 314 int rc; 315 vnode_t *xattr_dvp; 316 smb_odir_t *od; 317 cred_t *cr; 318 char pattern[SMB_STREAM_PREFIX_LEN + 2]; 319 320 smb_node_t *xattr_dnode; 321 smb_attr_t tmp_attr; 322 323 ASSERT(sr); 324 ASSERT(sr->sr_magic == SMB_REQ_MAGIC); 325 ASSERT(unode); 326 ASSERT(unode->n_magic == SMB_NODE_MAGIC); 327 328 if (SMB_TREE_CONTAINS_NODE(sr, unode) == 0 || 329 SMB_TREE_HAS_ACCESS(sr, ACE_LIST_DIRECTORY) == 0) { 330 smbsr_error(sr, NT_STATUS_ACCESS_DENIED, 331 ERRDOS, ERROR_ACCESS_DENIED); 332 return (0); 333 } 334 cr = kcred; 335 336 /* find the xattrdir vnode */ 337 rc = smb_vop_lookup_xattrdir(unode->vp, &xattr_dvp, LOOKUP_XATTR, cr); 338 if (rc != 0) { 339 smbsr_errno(sr, rc); 340 return (0); 341 } 342 343 /* lookup the xattrdir's smb_node */ 344 xattr_dnode = smb_node_lookup(sr, NULL, cr, xattr_dvp, XATTR_DIR, 345 unode, NULL, &tmp_attr); 346 VN_RELE(xattr_dvp); 347 if (xattr_dnode == NULL) { 348 smbsr_error(sr, NT_STATUS_NO_MEMORY, 349 ERRDOS, ERROR_NOT_ENOUGH_MEMORY); 350 return (0); 351 } 352 353 (void) snprintf(pattern, sizeof (pattern), "%s*", SMB_STREAM_PREFIX); 354 od = smb_odir_create(sr, xattr_dnode, pattern, SMB_SEARCH_ATTRIBUTES, 355 cr); 356 smb_node_release(xattr_dnode); 357 if (od == NULL) 358 return (0); 359 360 od->d_flags |= SMB_ODIR_FLAG_XATTR; 361 return (od->d_odid); 362 } 363 364 /* 365 * smb_odir_hold 366 */ 367 boolean_t 368 smb_odir_hold(smb_odir_t *od) 369 { 370 ASSERT(od); 371 ASSERT(od->d_magic == SMB_ODIR_MAGIC); 372 373 mutex_enter(&od->d_mutex); 374 if (od->d_state != SMB_ODIR_STATE_OPEN) { 375 mutex_exit(&od->d_mutex); 376 return (B_FALSE); 377 } 378 379 od->d_refcnt++; 380 mutex_exit(&od->d_mutex); 381 return (B_TRUE); 382 } 383 384 /* 385 * smb_odir_release 386 * 387 * If the odir is in SMB_ODIR_STATE_CLOSING and this release 388 * results in a refcnt of 0, the odir may be removed from 389 * the tree's list of odirs and deleted. The odir's state is 390 * set to SMB_ODIR_STATE_CLOSED prior to exiting the mutex and 391 * deleting it. This ensure that nobody else can ontain a reference 392 * to it while we are deleting it. 393 */ 394 void 395 smb_odir_release(smb_odir_t *od) 396 { 397 ASSERT(od); 398 ASSERT(od->d_magic == SMB_ODIR_MAGIC); 399 400 mutex_enter(&od->d_mutex); 401 ASSERT(od->d_refcnt); 402 403 switch (od->d_state) { 404 case SMB_ODIR_STATE_OPEN: 405 od->d_refcnt--; 406 break; 407 case SMB_ODIR_STATE_CLOSING: 408 od->d_refcnt--; 409 if (od->d_refcnt == 0) { 410 od->d_state = SMB_ODIR_STATE_CLOSED; 411 mutex_exit(&od->d_mutex); 412 smb_odir_delete(od); 413 return; 414 } 415 break; 416 case SMB_ODIR_STATE_CLOSED: 417 break; 418 default: 419 ASSERT(0); 420 break; 421 } 422 423 mutex_exit(&od->d_mutex); 424 } 425 426 /* 427 * smb_odir_close 428 */ 429 void 430 smb_odir_close(smb_odir_t *od) 431 { 432 ASSERT(od); 433 ASSERT(od->d_refcnt); 434 435 mutex_enter(&od->d_mutex); 436 if (od->d_state != SMB_ODIR_STATE_OPEN) { 437 mutex_exit(&od->d_mutex); 438 return; 439 } 440 od->d_state = SMB_ODIR_STATE_CLOSING; 441 mutex_exit(&od->d_mutex); 442 443 smb_odir_release(od); 444 } 445 446 /* 447 * smb_odir_read 448 * 449 * Find the next directory entry matching the search pattern. 450 * No search attribute matching is performed. 451 * 452 * Returns: 453 * 0 - success. 454 * - If a matching entry was found eof will be B_FALSE and 455 * odirent will be populated. 456 * - If there are no matching entries eof will be B_TRUE. 457 * -1 - error, error details set in sr. 458 */ 459 int 460 smb_odir_read(smb_request_t *sr, smb_odir_t *od, 461 smb_odirent_t *odirent, boolean_t *eof) 462 { 463 int rc; 464 boolean_t ignore_case; 465 466 ASSERT(sr); 467 ASSERT(sr->sr_magic == SMB_REQ_MAGIC); 468 ASSERT(od); 469 ASSERT(od->d_magic == SMB_ODIR_MAGIC); 470 ASSERT(odirent); 471 472 mutex_enter(&od->d_mutex); 473 474 ASSERT(od->d_state == SMB_ODIR_STATE_OPEN); 475 if (od->d_state != SMB_ODIR_STATE_OPEN) { 476 mutex_exit(&od->d_mutex); 477 return (-1); 478 } 479 480 ignore_case = (od->d_flags & SMB_ODIR_FLAG_IGNORE_CASE); 481 482 for (;;) { 483 if ((rc = smb_odir_next_odirent(od, odirent)) != 0) 484 break; 485 if (smb_match_name(odirent->od_ino, odirent->od_name, 486 od->d_pattern, ignore_case)) 487 break; 488 } 489 490 mutex_exit(&od->d_mutex); 491 492 switch (rc) { 493 case 0: 494 *eof = B_FALSE; 495 return (0); 496 case ENOENT: 497 *eof = B_TRUE; 498 return (0); 499 default: 500 smbsr_errno(sr, rc); 501 return (-1); 502 } 503 } 504 505 /* 506 * smb_odir_read_fileinfo 507 * 508 * Find the next directory entry matching the search pattern 509 * and attributes: od->d_pattern and od->d_sattr. 510 * 511 * If the search pattern specifies a single filename call 512 * smb_odir_single_fileinfo to get the file attributes and 513 * populate the caller's smb_fileinfo_t. 514 * 515 * If the search pattern contains wildcards call smb_odir_next_odirent 516 * to get the next directory entry then. Repeat until a matching 517 * filename is found. Call smb_odir_wildcard_fileinfo to get the 518 * file attributes and populate the caller's smb_fileinfo_t. 519 * This is repeated until a file matching the search criteria is found. 520 * 521 * Returns: 522 * 0 - success. 523 * - If a matching entry was found eof will be B_FALSE and 524 * fileinfo will be populated. 525 * - If there are no matching entries eof will be B_TRUE. 526 * -1 - error, error details set in sr. 527 */ 528 int 529 smb_odir_read_fileinfo(smb_request_t *sr, smb_odir_t *od, 530 smb_fileinfo_t *fileinfo, boolean_t *eof) 531 { 532 int rc; 533 smb_odirent_t *odirent; 534 boolean_t ignore_case; 535 536 ASSERT(sr); 537 ASSERT(sr->sr_magic == SMB_REQ_MAGIC); 538 ASSERT(od); 539 ASSERT(od->d_magic == SMB_ODIR_MAGIC); 540 ASSERT(fileinfo); 541 542 mutex_enter(&od->d_mutex); 543 544 ASSERT(od->d_state == SMB_ODIR_STATE_OPEN); 545 if (od->d_state != SMB_ODIR_STATE_OPEN) { 546 mutex_exit(&od->d_mutex); 547 return (-1); 548 } 549 550 ignore_case = (od->d_flags & SMB_ODIR_FLAG_IGNORE_CASE); 551 552 if (!(od->d_flags & SMB_ODIR_FLAG_WILDCARDS)) { 553 if (od->d_eof) 554 rc = ENOENT; 555 else 556 rc = smb_odir_single_fileinfo(sr, od, fileinfo); 557 od->d_eof = B_TRUE; 558 } else { 559 odirent = kmem_alloc(sizeof (smb_odirent_t), KM_SLEEP); 560 for (;;) { 561 bzero(fileinfo, sizeof (smb_fileinfo_t)); 562 if ((rc = smb_odir_next_odirent(od, odirent)) != 0) 563 break; 564 565 if (!smb_match_name(odirent->od_ino, odirent->od_name, 566 od->d_pattern, ignore_case)) 567 continue; 568 569 rc = smb_odir_wildcard_fileinfo(sr, od, odirent, 570 fileinfo); 571 if (rc == 0) 572 break; 573 } 574 kmem_free(odirent, sizeof (smb_odirent_t)); 575 } 576 mutex_exit(&od->d_mutex); 577 578 switch (rc) { 579 case 0: 580 *eof = B_FALSE; 581 return (0); 582 case ENOENT: 583 *eof = B_TRUE; 584 return (0); 585 default: 586 smbsr_errno(sr, rc); 587 return (-1); 588 } 589 } 590 591 592 /* 593 * smb_odir_read_streaminfo 594 * 595 * Find the next directory entry whose name begins with SMB_STREAM_PREFIX, 596 * and thus represents an NTFS named stream. 597 * No search attribute matching is performed. 598 * No case conflict name mangling is required for NTFS named stream names. 599 * 600 * Returns: 601 * 0 - success. 602 * - If a matching entry was found eof will be B_FALSE and 603 * sinfo will be populated. 604 * - If there are no matching entries eof will be B_TRUE. 605 * -1 - error, error details set in sr. 606 */ 607 int 608 smb_odir_read_streaminfo(smb_request_t *sr, smb_odir_t *od, 609 smb_streaminfo_t *sinfo, boolean_t *eof) 610 { 611 int rc; 612 smb_odirent_t *odirent; 613 vnode_t *vp; 614 smb_attr_t attr; 615 int tmpflg; 616 617 ASSERT(sr); 618 ASSERT(sr->sr_magic == SMB_REQ_MAGIC); 619 ASSERT(od); 620 ASSERT(od->d_magic == SMB_ODIR_MAGIC); 621 ASSERT(sinfo); 622 623 mutex_enter(&od->d_mutex); 624 625 ASSERT(od->d_state == SMB_ODIR_STATE_OPEN); 626 if (od->d_state != SMB_ODIR_STATE_OPEN) { 627 mutex_exit(&od->d_mutex); 628 return (-1); 629 } 630 631 /* Check that odir represents an xattr directory */ 632 if (!(od->d_flags & SMB_ODIR_FLAG_XATTR)) { 633 *eof = B_TRUE; 634 mutex_exit(&od->d_mutex); 635 return (0); 636 } 637 638 odirent = kmem_alloc(sizeof (smb_odirent_t), KM_SLEEP); 639 640 for (;;) { 641 bzero(sinfo, sizeof (smb_streaminfo_t)); 642 if ((rc = smb_odir_next_odirent(od, odirent)) != 0) 643 break; 644 645 if (strncmp(odirent->od_name, SMB_STREAM_PREFIX, 646 SMB_STREAM_PREFIX_LEN)) { 647 continue; 648 } 649 650 /* 651 * since we only care about the size attribute we don't need to 652 * pass the vp of the unnamed stream file to smb_vop_getattr 653 */ 654 rc = smb_vop_lookup(od->d_dnode->vp, odirent->od_name, &vp, 655 NULL, 0, &tmpflg, od->d_tree->t_snode->vp, od->d_cred); 656 if (rc == 0) { 657 rc = smb_vop_getattr(vp, NULL, &attr, 0, od->d_cred); 658 VN_RELE(vp); 659 } 660 661 if (rc == 0) { 662 (void) strlcpy(sinfo->si_name, 663 odirent->od_name + SMB_STREAM_PREFIX_LEN, 664 sizeof (sinfo->si_name)); 665 sinfo->si_size = attr.sa_vattr.va_size; 666 break; 667 } 668 } 669 mutex_exit(&od->d_mutex); 670 671 kmem_free(odirent, sizeof (smb_odirent_t)); 672 673 switch (rc) { 674 case 0: 675 *eof = B_FALSE; 676 return (0); 677 case ENOENT: 678 *eof = B_TRUE; 679 return (0); 680 default: 681 smbsr_errno(sr, rc); 682 return (-1); 683 } 684 } 685 686 /* 687 * smb_odir_save_cookie 688 * 689 * Callers can save up to SMB_MAX_SEARCH cookies in the odir 690 * to be used as resume points for a 'find next' request. 691 */ 692 void 693 smb_odir_save_cookie(smb_odir_t *od, int idx, uint32_t cookie) 694 { 695 ASSERT(od); 696 ASSERT(od->d_magic == SMB_ODIR_MAGIC); 697 ASSERT(idx >= 0 && idx < SMB_MAX_SEARCH); 698 699 mutex_enter(&od->d_mutex); 700 od->d_cookies[idx] = cookie; 701 mutex_exit(&od->d_mutex); 702 } 703 704 /* 705 * smb_odir_resume_at 706 * 707 * If SMB_ODIR_FLAG_WILDCARDS is not set the search is for a single 708 * file and should not be resumed. 709 * 710 * Wildcard searching can be resumed from: 711 * - the cookie saved at a specified index (SMBsearch, SMBfind). 712 * - a specified cookie (SMB_trans2_find) 713 * - a specified filename (SMB_trans2_find) - NOT SUPPORTED. 714 * Defaults to continuing from where the last search ended. 715 * 716 * Continuation from where the last search ended (SMB_trans2_find) 717 * is implemented by saving the last cookie at a specific index (0) 718 * smb_odir_resume_at indicates a new request, so reset od->d_bufptr 719 * and d_eof to force a vop_readdir. 720 */ 721 void 722 smb_odir_resume_at(smb_odir_t *od, smb_odir_resume_t *resume) 723 { 724 ASSERT(od); 725 ASSERT(od->d_magic == SMB_ODIR_MAGIC); 726 ASSERT(resume); 727 728 mutex_enter(&od->d_mutex); 729 730 if ((od->d_flags & SMB_ODIR_FLAG_WILDCARDS) == 0) { 731 od->d_eof = B_TRUE; 732 mutex_exit(&od->d_mutex); 733 return; 734 } 735 736 switch (resume->or_type) { 737 case SMB_ODIR_RESUME_IDX: 738 ASSERT(resume->or_idx >= 0); 739 ASSERT(resume->or_idx < SMB_MAX_SEARCH); 740 741 if ((resume->or_idx < 0) || 742 (resume->or_idx >= SMB_MAX_SEARCH)) { 743 resume->or_idx = 0; 744 } 745 od->d_offset = od->d_cookies[resume->or_idx]; 746 break; 747 case SMB_ODIR_RESUME_COOKIE: 748 od->d_offset = resume->or_cookie; 749 break; 750 case SMB_ODIR_RESUME_FNAME: 751 default: 752 od->d_offset = od->d_cookies[0]; 753 break; 754 } 755 756 /* Force a vop_readdir to refresh d_buf */ 757 od->d_bufptr = NULL; 758 od->d_eof = B_FALSE; 759 760 mutex_exit(&od->d_mutex); 761 } 762 763 764 /* *** static functions *** */ 765 766 /* 767 * smb_odir_create 768 * Allocate and populate an odir obect and add it to the tree's list. 769 */ 770 static smb_odir_t * 771 smb_odir_create(smb_request_t *sr, smb_node_t *dnode, 772 char *pattern, uint16_t sattr, cred_t *cr) 773 { 774 smb_odir_t *od; 775 smb_tree_t *tree; 776 uint16_t odid; 777 778 ASSERT(sr); 779 ASSERT(sr->sr_magic == SMB_REQ_MAGIC); 780 ASSERT(sr->tid_tree); 781 ASSERT(sr->tid_tree->t_magic == SMB_TREE_MAGIC); 782 ASSERT(dnode); 783 ASSERT(dnode->n_magic == SMB_NODE_MAGIC); 784 785 tree = sr->tid_tree; 786 787 if (smb_idpool_alloc(&tree->t_odid_pool, &odid)) { 788 smbsr_error(sr, NT_STATUS_TOO_MANY_OPENED_FILES, 789 ERRDOS, ERROR_TOO_MANY_OPEN_FILES); 790 return (NULL); 791 } 792 793 od = kmem_cache_alloc(tree->t_server->si_cache_odir, KM_SLEEP); 794 bzero(od, sizeof (smb_odir_t)); 795 796 mutex_init(&od->d_mutex, NULL, MUTEX_DEFAULT, NULL); 797 od->d_refcnt = 1; 798 od->d_state = SMB_ODIR_STATE_OPEN; 799 od->d_magic = SMB_ODIR_MAGIC; 800 od->d_opened_by_pid = sr->smb_pid; 801 od->d_session = tree->t_session; 802 od->d_cred = cr; 803 od->d_tree = tree; 804 od->d_dnode = dnode; 805 smb_node_ref(dnode); 806 od->d_odid = odid; 807 od->d_sattr = sattr; 808 (void) strlcpy(od->d_pattern, pattern, sizeof (od->d_pattern)); 809 od->d_flags = 0; 810 if (smb_convert_wildcards(od->d_pattern) != 0) 811 od->d_flags |= SMB_ODIR_FLAG_WILDCARDS; 812 if (vfs_has_feature(dnode->vp->v_vfsp, VFSFT_DIRENTFLAGS)) 813 od->d_flags |= SMB_ODIR_FLAG_EDIRENT; 814 if (smb_tree_has_feature(tree, SMB_TREE_CASEINSENSITIVE)) 815 od->d_flags |= SMB_ODIR_FLAG_IGNORE_CASE; 816 if (SMB_TREE_SUPPORTS_CATIA(sr)) 817 od->d_flags |= SMB_ODIR_FLAG_CATIA; 818 od->d_eof = B_FALSE; 819 820 smb_llist_enter(&tree->t_odir_list, RW_WRITER); 821 smb_llist_insert_tail(&tree->t_odir_list, od); 822 smb_llist_exit(&tree->t_odir_list); 823 824 atomic_inc_32(&tree->t_session->s_dir_cnt); 825 return (od); 826 } 827 828 /* 829 * smb_odir_delete 830 * 831 * Removal of the odir from the tree's list of odirs must be 832 * done before any resources associated with the odir are 833 * released. 834 */ 835 static void 836 smb_odir_delete(smb_odir_t *od) 837 { 838 ASSERT(od); 839 ASSERT(od->d_magic == SMB_ODIR_MAGIC); 840 ASSERT(od->d_state == SMB_ODIR_STATE_CLOSED); 841 ASSERT(od->d_refcnt == 0); 842 843 smb_llist_enter(&od->d_tree->t_odir_list, RW_WRITER); 844 smb_llist_remove(&od->d_tree->t_odir_list, od); 845 smb_llist_exit(&od->d_tree->t_odir_list); 846 847 od->d_magic = 0; 848 atomic_dec_32(&od->d_tree->t_session->s_dir_cnt); 849 smb_node_release(od->d_dnode); 850 smb_idpool_free(&od->d_tree->t_odid_pool, od->d_odid); 851 mutex_destroy(&od->d_mutex); 852 kmem_cache_free(od->d_tree->t_server->si_cache_odir, od); 853 } 854 855 /* 856 * smb_odir_next_odirent 857 * 858 * Find the next directory entry in d_buf. If d_bufptr is NULL (buffer 859 * is empty or we've reached the end of it), read the next set of 860 * entries from the file system (vop_readdir). 861 * 862 * File systems which support VFSFT_EDIRENT_FLAGS will return the 863 * directory entries as a buffer of edirent_t structure. Others will 864 * return a buffer of dirent64_t structures. For simplicity translate 865 * the data into an smb_odirent_t structure. 866 * The ed_name/d_name in d_buf is NULL terminated by the file system. 867 * 868 * Some file systems can have directories larger than SMB_MAXDIRSIZE. 869 * If the odirent offset >= SMB_MAXDIRSIZE return ENOENT and set d_eof 870 * to true to stop subsequent calls to smb_vop_readdir. 871 * 872 * Returns: 873 * 0 - success. odirent is populated with the next directory entry 874 * ENOENT - no more directory entries 875 * errno - error 876 */ 877 static int 878 smb_odir_next_odirent(smb_odir_t *od, smb_odirent_t *odirent) 879 { 880 int rc; 881 int reclen; 882 int eof; 883 dirent64_t *dp; 884 edirent_t *edp; 885 char *np; 886 887 ASSERT(MUTEX_HELD(&od->d_mutex)); 888 889 if (od->d_bufptr != NULL) { 890 if (od->d_flags & SMB_ODIR_FLAG_EDIRENT) 891 reclen = od->d_edp->ed_reclen; 892 else 893 reclen = od->d_dp->d_reclen; 894 895 if (reclen == 0) { 896 od->d_bufptr = NULL; 897 } else { 898 od->d_bufptr += reclen; 899 if (od->d_bufptr >= od->d_buf + od->d_bufsize) 900 od->d_bufptr = NULL; 901 } 902 } 903 904 if (od->d_bufptr == NULL) { 905 if (od->d_eof) 906 return (ENOENT); 907 908 od->d_bufsize = sizeof (od->d_buf); 909 910 rc = smb_vop_readdir(od->d_dnode->vp, od->d_offset, 911 od->d_buf, &od->d_bufsize, &eof, od->d_cred); 912 913 if ((rc == 0) && (od->d_bufsize == 0)) 914 rc = ENOENT; 915 916 if (rc != 0) { 917 od->d_bufptr = NULL; 918 od->d_bufsize = 0; 919 return (rc); 920 } 921 922 od->d_eof = (eof != 0); 923 od->d_bufptr = od->d_buf; 924 } 925 926 if (od->d_flags & SMB_ODIR_FLAG_EDIRENT) 927 od->d_offset = od->d_edp->ed_off; 928 else 929 od->d_offset = od->d_dp->d_off; 930 931 if (od->d_offset >= SMB_MAXDIRSIZE) { 932 od->d_bufptr = NULL; 933 od->d_bufsize = 0; 934 od->d_eof = B_TRUE; 935 return (ENOENT); 936 } 937 938 if (od->d_flags & SMB_ODIR_FLAG_EDIRENT) { 939 edp = od->d_edp; 940 odirent->od_ino = edp->ed_ino; 941 odirent->od_eflags = edp->ed_eflags; 942 np = edp->ed_name; 943 } else { 944 dp = od->d_dp; 945 odirent->od_ino = dp->d_ino; 946 odirent->od_eflags = 0; 947 np = dp->d_name; 948 } 949 950 if ((od->d_flags & SMB_ODIR_FLAG_CATIA) && 951 ((od->d_flags & SMB_ODIR_FLAG_XATTR) == 0)) { 952 smb_vop_catia_v4tov5(np, odirent->od_name, 953 sizeof (odirent->od_name)); 954 } else { 955 (void) strlcpy(odirent->od_name, np, 956 sizeof (odirent->od_name)); 957 } 958 959 return (0); 960 } 961 962 /* 963 * smb_odir_single_fileinfo 964 * 965 * Lookup the file identified by od->d_pattern. 966 * 967 * If the looked up file is a link, we attempt to lookup the link target 968 * to use its attributes in place of those of the files's. 969 * If we fail to lookup the target of the link we use the original 970 * file's attributes. 971 * Check if the attributes match the search attributes. 972 * 973 * Returns: 0 - success 974 * ENOENT - no match 975 * errno - error 976 */ 977 static int 978 smb_odir_single_fileinfo(smb_request_t *sr, smb_odir_t *od, 979 smb_fileinfo_t *fileinfo) 980 { 981 int rc; 982 smb_node_t *fnode, *tgt_node; 983 smb_attr_t attr, tgt_attr, *fattr; 984 ino64_t ino; 985 char *name; 986 uint32_t dosattr; 987 boolean_t case_conflict = B_FALSE; 988 int lookup_flags, flags = 0; 989 vnode_t *vp; 990 991 ASSERT(sr); 992 ASSERT(sr->sr_magic == SMB_REQ_MAGIC); 993 ASSERT(od); 994 ASSERT(od->d_magic == SMB_ODIR_MAGIC); 995 996 ASSERT(MUTEX_HELD(&od->d_mutex)); 997 bzero(fileinfo, sizeof (smb_fileinfo_t)); 998 999 rc = smb_fsop_lookup(sr, od->d_cred, 0, od->d_tree->t_snode, 1000 od->d_dnode, od->d_pattern, &fnode, &attr); 1001 if (rc != 0) 1002 return (rc); 1003 1004 /* 1005 * If case sensitive, do a case insensitive smb_vop_lookup to 1006 * check for case conflict 1007 */ 1008 if (od->d_flags & SMB_ODIR_FLAG_IGNORE_CASE) { 1009 lookup_flags = SMB_IGNORE_CASE; 1010 if (od->d_flags & SMB_ODIR_FLAG_CATIA) 1011 lookup_flags |= SMB_CATIA; 1012 1013 rc = smb_vop_lookup(od->d_dnode->vp, fnode->od_name, &vp, 1014 NULL, lookup_flags, &flags, od->d_tree->t_snode->vp, 1015 od->d_cred); 1016 if (rc != 0) 1017 return (rc); 1018 VN_RELE(vp); 1019 1020 if (flags & ED_CASE_CONFLICT) 1021 case_conflict = B_TRUE; 1022 } 1023 1024 ino = attr.sa_vattr.va_nodeid; 1025 (void) smb_mangle_name(ino, fnode->od_name, 1026 fileinfo->fi_shortname, fileinfo->fi_name83, case_conflict); 1027 name = (case_conflict) ? fileinfo->fi_shortname : fnode->od_name; 1028 (void) strlcpy(fileinfo->fi_name, name, sizeof (fileinfo->fi_name)); 1029 1030 /* follow link to get target node & attr */ 1031 if ((fnode->vp->v_type == VLNK) && 1032 (smb_odir_lookup_link(sr, od, fnode->od_name, 1033 &tgt_node, &tgt_attr))) { 1034 smb_node_release(fnode); 1035 fnode = tgt_node; 1036 fattr = &tgt_attr; 1037 } else { 1038 fattr = &attr; 1039 } 1040 1041 /* check search attributes */ 1042 dosattr = smb_node_get_dosattr(fnode); 1043 if (!smb_sattr_check(dosattr, od->d_sattr)) { 1044 smb_node_release(fnode); 1045 return (ENOENT); 1046 } 1047 1048 fileinfo->fi_dosattr = dosattr; 1049 fileinfo->fi_nodeid = fattr->sa_vattr.va_nodeid; 1050 fileinfo->fi_size = smb_node_get_size(fnode, fattr); 1051 fileinfo->fi_alloc_size = fattr->sa_vattr.va_nblocks * DEV_BSIZE; 1052 fileinfo->fi_atime = fattr->sa_vattr.va_atime; 1053 fileinfo->fi_mtime = fattr->sa_vattr.va_mtime; 1054 fileinfo->fi_ctime = fattr->sa_vattr.va_ctime; 1055 if (fattr->sa_crtime.tv_sec) 1056 fileinfo->fi_crtime = fattr->sa_crtime; 1057 else 1058 fileinfo->fi_crtime = fattr->sa_vattr.va_mtime; 1059 1060 smb_node_release(fnode); 1061 return (0); 1062 } 1063 1064 /* 1065 * smb_odir_wildcard_fileinfo 1066 * 1067 * odirent contains a directory entry, obtained from a vop_readdir. 1068 * If a case conflict is identified the filename is mangled and the 1069 * shortname is used as 'name', in place of odirent->od_name. This 1070 * name will be used in the smb_fsop_lookup because smb_fsop_lookup 1071 * performs a case insensitive lookup if the tree is case insesitive, 1072 * so the mangled name is required in the case conflict scenario to 1073 * ensure the correct match. 1074 * 1075 * If the looked up file is a link, we attempt to lookup the link target 1076 * to use its attributes in place of those of the files's. 1077 * If we fail to lookup the target of the link we use the original 1078 * file's attributes. 1079 * Check if the attributes match the search attributes. 1080 * 1081 * Although some file systems can have directories larger than 1082 * SMB_MAXDIRSIZE smb_odir_next_odirent ensures that no offset larger 1083 * than SMB_MAXDIRSIZE is returned. It is therefore safe to use the 1084 * offset as the cookie (uint32_t). 1085 * 1086 * Returns: 0 - success 1087 * ENOENT - no match, proceed to next entry 1088 * errno - error 1089 */ 1090 static int 1091 smb_odir_wildcard_fileinfo(smb_request_t *sr, smb_odir_t *od, 1092 smb_odirent_t *odirent, smb_fileinfo_t *fileinfo) 1093 { 1094 int rc; 1095 smb_node_t *fnode, *tgt_node; 1096 smb_attr_t attr, tgt_attr, *fattr; 1097 char *name; 1098 uint32_t dosattr; 1099 boolean_t case_conflict; 1100 1101 ASSERT(sr); 1102 ASSERT(sr->sr_magic == SMB_REQ_MAGIC); 1103 ASSERT(od); 1104 ASSERT(od->d_magic == SMB_ODIR_MAGIC); 1105 1106 ASSERT(MUTEX_HELD(&od->d_mutex)); 1107 bzero(fileinfo, sizeof (smb_fileinfo_t)); 1108 1109 case_conflict = ((od->d_flags & SMB_ODIR_FLAG_IGNORE_CASE) && 1110 (odirent->od_eflags & ED_CASE_CONFLICT)); 1111 (void) smb_mangle_name(odirent->od_ino, odirent->od_name, 1112 fileinfo->fi_shortname, fileinfo->fi_name83, case_conflict); 1113 name = (case_conflict) ? fileinfo->fi_shortname : odirent->od_name; 1114 (void) strlcpy(fileinfo->fi_name, name, sizeof (fileinfo->fi_name)); 1115 1116 rc = smb_fsop_lookup(sr, od->d_cred, 0, od->d_tree->t_snode, 1117 od->d_dnode, name, &fnode, &attr); 1118 if (rc != 0) 1119 return (rc); 1120 1121 /* follow link to get target node & attr */ 1122 if ((fnode->vp->v_type == VLNK) && 1123 (smb_odir_lookup_link(sr, od, name, &tgt_node, &tgt_attr))) { 1124 smb_node_release(fnode); 1125 fnode = tgt_node; 1126 fattr = &tgt_attr; 1127 } else { 1128 fattr = &attr; 1129 } 1130 1131 /* check search attributes */ 1132 dosattr = smb_node_get_dosattr(fnode); 1133 if (!smb_sattr_check(dosattr, od->d_sattr)) { 1134 smb_node_release(fnode); 1135 return (ENOENT); 1136 } 1137 1138 fileinfo->fi_cookie = (uint32_t)od->d_offset; 1139 fileinfo->fi_dosattr = dosattr; 1140 fileinfo->fi_nodeid = fattr->sa_vattr.va_nodeid; 1141 fileinfo->fi_size = smb_node_get_size(fnode, fattr); 1142 fileinfo->fi_alloc_size = fattr->sa_vattr.va_nblocks * DEV_BSIZE; 1143 fileinfo->fi_atime = fattr->sa_vattr.va_atime; 1144 fileinfo->fi_mtime = fattr->sa_vattr.va_mtime; 1145 fileinfo->fi_ctime = fattr->sa_vattr.va_ctime; 1146 if (fattr->sa_crtime.tv_sec) 1147 fileinfo->fi_crtime = fattr->sa_crtime; 1148 else 1149 fileinfo->fi_crtime = fattr->sa_vattr.va_mtime; 1150 1151 smb_node_release(fnode); 1152 return (0); 1153 } 1154 1155 /* 1156 * smb_odir_lookup_link 1157 * 1158 * If the file is a symlink we lookup the object to which the 1159 * symlink refers so that we can return its attributes. 1160 * This can cause a problem if a symlink in a sub-directory 1161 * points to a parent directory (some UNIX GUI's create a symlink 1162 * in $HOME/.desktop that points to the user's home directory). 1163 * Some Windows applications (e.g. virus scanning) loop/hang 1164 * trying to follow this recursive path and there is little 1165 * we can do because the path is constructed on the client. 1166 * smb_dirsymlink_enable allows an end-user to disable 1167 * symlinks to directories. Symlinks to other object types 1168 * should be unaffected. 1169 * 1170 * Returns: B_TRUE - followed link. tgt_node and tgt_attr set 1171 * B_FALSE - link not followed 1172 */ 1173 static boolean_t 1174 smb_odir_lookup_link(smb_request_t *sr, smb_odir_t *od, 1175 char *fname, smb_node_t **tgt_node, smb_attr_t *tgt_attr) 1176 { 1177 int rc; 1178 1179 rc = smb_fsop_lookup(sr, od->d_cred, SMB_FOLLOW_LINKS, 1180 od->d_tree->t_snode, od->d_dnode, fname, tgt_node, tgt_attr); 1181 if (rc != 0) { 1182 *tgt_node = NULL; 1183 return (B_FALSE); 1184 } 1185 1186 if ((tgt_attr->sa_vattr.va_type == VDIR) && (!smb_dirsymlink_enable)) { 1187 smb_node_release(*tgt_node); 1188 *tgt_node = NULL; 1189 return (B_FALSE); 1190 } 1191 1192 return (B_TRUE); 1193 } 1194