xref: /titanic_44/usr/src/uts/common/fs/smbsrv/smb_session.c (revision 2d6b5ea734bb47d251c82670646fde46af15fd69)
1 /*
2  * CDDL HEADER START
3  *
4  * The contents of this file are subject to the terms of the
5  * Common Development and Distribution License (the "License").
6  * You may not use this file except in compliance with the License.
7  *
8  * You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE
9  * or http://www.opensolaris.org/os/licensing.
10  * See the License for the specific language governing permissions
11  * and limitations under the License.
12  *
13  * When distributing Covered Code, include this CDDL HEADER in each
14  * file and include the License file at usr/src/OPENSOLARIS.LICENSE.
15  * If applicable, add the following below this CDDL HEADER, with the
16  * fields enclosed by brackets "[]" replaced with your own identifying
17  * information: Portions Copyright [yyyy] [name of copyright owner]
18  *
19  * CDDL HEADER END
20  */
21 /*
22  * Copyright 2009 Sun Microsystems, Inc.  All rights reserved.
23  * Use is subject to license terms.
24  */
25 
26 #include <sys/atomic.h>
27 #include <sys/strsubr.h>
28 #include <sys/synch.h>
29 #include <sys/types.h>
30 #include <sys/socketvar.h>
31 #include <sys/sdt.h>
32 #include <smbsrv/netbios.h>
33 #include <smbsrv/smb_incl.h>
34 #include <smbsrv/smb_i18n.h>
35 #include <inet/tcp.h>
36 
37 static volatile uint64_t smb_kids;
38 
39 uint32_t smb_keep_alive = SSN_KEEP_ALIVE_TIMEOUT;
40 
41 static int smb_session_message(smb_session_t *);
42 static int smb_session_xprt_puthdr(smb_session_t *, smb_xprt_t *,
43     uint8_t *, size_t);
44 static smb_user_t *smb_session_lookup_user(smb_session_t *, char *, char *);
45 static void smb_request_init_command_mbuf(smb_request_t *sr);
46 void dump_smb_inaddr(smb_inaddr_t *ipaddr);
47 
48 void
49 smb_session_timers(smb_session_list_t *se)
50 {
51 	smb_session_t	*session;
52 
53 	rw_enter(&se->se_lock, RW_READER);
54 	session = list_head(&se->se_act.lst);
55 	while (session) {
56 		/*
57 		 * Walk through the table and decrement each keep_alive
58 		 * timer that has not timed out yet. (keepalive > 0)
59 		 */
60 		ASSERT(session->s_magic == SMB_SESSION_MAGIC);
61 		if (session->keep_alive &&
62 		    (session->keep_alive != (uint32_t)-1))
63 			session->keep_alive--;
64 		session = list_next(&se->se_act.lst, session);
65 	}
66 	rw_exit(&se->se_lock);
67 }
68 
69 void
70 smb_session_correct_keep_alive_values(
71     smb_session_list_t	*se,
72     uint32_t		new_keep_alive)
73 {
74 	smb_session_t		*sn;
75 
76 	if (new_keep_alive == smb_keep_alive)
77 		return;
78 	/*
79 	 * keep alive == 0 means do not drop connection if it's idle
80 	 */
81 	smb_keep_alive = (new_keep_alive) ? new_keep_alive : -1;
82 
83 	/*
84 	 * Walk through the table and set each session to the new keep_alive
85 	 * value if they have not already timed out.  Block clock interrupts.
86 	 */
87 	rw_enter(&se->se_lock, RW_READER);
88 	sn = list_head(&se->se_rdy.lst);
89 	while (sn) {
90 		ASSERT(sn->s_magic == SMB_SESSION_MAGIC);
91 		sn->keep_alive = new_keep_alive;
92 		sn = list_next(&se->se_rdy.lst, sn);
93 	}
94 	sn = list_head(&se->se_act.lst);
95 	while (sn) {
96 		ASSERT(sn->s_magic == SMB_SESSION_MAGIC);
97 		if (sn->keep_alive)
98 			sn->keep_alive = new_keep_alive;
99 		sn = list_next(&se->se_act.lst, sn);
100 	}
101 	rw_exit(&se->se_lock);
102 }
103 
104 /*
105  * smb_reconnection_check
106  *
107  * This function is called when a client indicates its current connection
108  * should be the only one it has with the server, as indicated by VC=0 in
109  * a SessionSetupX request. We go through the session list and destroy any
110  * stale connections for that client.
111  *
112  * Clients don't associate IP addresses and servers. So a client may make
113  * independent connections (i.e. with VC=0) to a server with multiple
114  * IP addresses. So, when checking for a reconnection, we need to include
115  * the local IP address, to which the client is connecting, when checking
116  * for stale sessions.
117  *
118  * Also check the server's NetBIOS name to support simultaneous access by
119  * multiple clients behind a NAT server.  This will only work for SMB over
120  * NetBIOS on TCP port 139, it will not work SMB over TCP port 445 because
121  * there is no NetBIOS name.  See also Knowledge Base article Q301673.
122  */
123 void
124 smb_session_reconnection_check(smb_session_list_t *se, smb_session_t *sess)
125 {
126 	smb_session_t	*sn;
127 
128 	rw_enter(&se->se_lock, RW_READER);
129 	sn = list_head(&se->se_act.lst);
130 	while (sn) {
131 		ASSERT(sn->s_magic == SMB_SESSION_MAGIC);
132 		if ((sn != sess) &&
133 		    smb_inet_equal(&sn->ipaddr, &sess->ipaddr,
134 		    SMB_INET_NOMASK) &&
135 		    smb_inet_equal(&sn->local_ipaddr, &sess->local_ipaddr,
136 		    SMB_INET_NOMASK) &&
137 		    (strcasecmp(sn->workstation, sess->workstation) == 0) &&
138 		    (sn->opentime <= sess->opentime) &&
139 		    (sn->s_kid < sess->s_kid)) {
140 			tsignal(sn->s_thread, SIGINT);
141 		}
142 		sn = list_next(&se->se_act.lst, sn);
143 	}
144 	rw_exit(&se->se_lock);
145 }
146 
147 /*
148  * Send a session message - supports SMB-over-NBT and SMB-over-TCP.
149  *
150  * The mbuf chain is copied into a contiguous buffer so that the whole
151  * message is submitted to smb_sosend as a single request.  This should
152  * help Ethereal/Wireshark delineate the packets correctly even though
153  * TCP_NODELAY has been set on the socket.
154  *
155  * If an mbuf chain is provided, it will be freed and set to NULL here.
156  */
157 int
158 smb_session_send(smb_session_t *session, uint8_t type, mbuf_chain_t *mbc)
159 {
160 	smb_txreq_t	*txr;
161 	smb_xprt_t	hdr;
162 	int		rc;
163 
164 	switch (session->s_state) {
165 	case SMB_SESSION_STATE_DISCONNECTED:
166 	case SMB_SESSION_STATE_TERMINATED:
167 		if ((mbc != NULL) && (mbc->chain != NULL)) {
168 			m_freem(mbc->chain);
169 			mbc->chain = NULL;
170 			mbc->flags = 0;
171 		}
172 		return (ENOTCONN);
173 	default:
174 		break;
175 	}
176 
177 	txr = smb_net_txr_alloc();
178 
179 	if ((mbc != NULL) && (mbc->chain != NULL)) {
180 		rc = mbc_moveout(mbc, (caddr_t)&txr->tr_buf[NETBIOS_HDR_SZ],
181 		    sizeof (txr->tr_buf) - NETBIOS_HDR_SZ, &txr->tr_len);
182 		if (rc != 0) {
183 			smb_net_txr_free(txr);
184 			return (rc);
185 		}
186 	}
187 
188 	hdr.xh_type = type;
189 	hdr.xh_length = (uint32_t)txr->tr_len;
190 
191 	rc = smb_session_xprt_puthdr(session, &hdr, txr->tr_buf,
192 	    NETBIOS_HDR_SZ);
193 
194 	if (rc != 0) {
195 		smb_net_txr_free(txr);
196 		return (rc);
197 	}
198 	txr->tr_len += NETBIOS_HDR_SZ;
199 	return (smb_net_txr_send(session->sock, &session->s_txlst, txr));
200 }
201 
202 /*
203  * Read, process and respond to a NetBIOS session request.
204  *
205  * A NetBIOS session must be established for SMB-over-NetBIOS.  Validate
206  * the calling and called name format and save the client NetBIOS name,
207  * which is used when a NetBIOS session is established to check for and
208  * cleanup leftover state from a previous session.
209  *
210  * Session requests are not valid for SMB-over-TCP, which is unfortunate
211  * because without the client name leftover state cannot be cleaned up
212  * if the client is behind a NAT server.
213  */
214 static int
215 smb_session_request(struct smb_session *session)
216 {
217 	int			rc;
218 	char			*calling_name;
219 	char			*called_name;
220 	char 			client_name[NETBIOS_NAME_SZ];
221 	struct mbuf_chain 	mbc;
222 	char 			*names = NULL;
223 	mts_wchar_t		*wbuf = NULL;
224 	smb_xprt_t		hdr;
225 	char *p;
226 	unsigned int cpid = oem_get_smb_cpid();
227 	int rc1, rc2;
228 
229 	session->keep_alive = smb_keep_alive;
230 
231 	if ((rc = smb_session_xprt_gethdr(session, &hdr)) != 0)
232 		return (rc);
233 
234 	DTRACE_PROBE2(receive__session__req__xprthdr, struct session *, session,
235 	    smb_xprt_t *, &hdr);
236 
237 	if ((hdr.xh_type != SESSION_REQUEST) ||
238 	    (hdr.xh_length != NETBIOS_SESSION_REQUEST_DATA_LENGTH)) {
239 		DTRACE_PROBE1(receive__session__req__failed,
240 		    struct session *, session);
241 		return (EINVAL);
242 	}
243 
244 	names = kmem_alloc(hdr.xh_length, KM_SLEEP);
245 
246 	if ((rc = smb_sorecv(session->sock, names, hdr.xh_length)) != 0) {
247 		kmem_free(names, hdr.xh_length);
248 		DTRACE_PROBE1(receive__session__req__failed,
249 		    struct session *, session);
250 		return (rc);
251 	}
252 
253 	DTRACE_PROBE3(receive__session__req__data, struct session *, session,
254 	    char *, names, uint32_t, hdr.xh_length);
255 
256 	called_name = &names[0];
257 	calling_name = &names[NETBIOS_ENCODED_NAME_SZ + 2];
258 
259 	rc1 = netbios_name_isvalid(called_name, 0);
260 	rc2 = netbios_name_isvalid(calling_name, client_name);
261 
262 	if (rc1 == 0 || rc2 == 0) {
263 
264 		DTRACE_PROBE3(receive__invalid__session__req,
265 		    struct session *, session, char *, names,
266 		    uint32_t, hdr.xh_length);
267 
268 		kmem_free(names, hdr.xh_length);
269 		MBC_INIT(&mbc, MAX_DATAGRAM_LENGTH);
270 		(void) smb_mbc_encodef(&mbc, "b",
271 		    DATAGRAM_INVALID_SOURCE_NAME_FORMAT);
272 		(void) smb_session_send(session, NEGATIVE_SESSION_RESPONSE,
273 		    &mbc);
274 		return (EINVAL);
275 	}
276 
277 	DTRACE_PROBE3(receive__session__req__calling__decoded,
278 	    struct session *, session,
279 	    char *, calling_name, char *, client_name);
280 
281 	/*
282 	 * The client NetBIOS name is in oem codepage format.
283 	 * We need to convert it to unicode and store it in
284 	 * multi-byte format.  We also need to strip off any
285 	 * spaces added as part of the NetBIOS name encoding.
286 	 */
287 	wbuf = kmem_alloc((SMB_PI_MAX_HOST * sizeof (mts_wchar_t)), KM_SLEEP);
288 	(void) oemstounicodes(wbuf, client_name, SMB_PI_MAX_HOST, cpid);
289 	(void) mts_wcstombs(session->workstation, wbuf, SMB_PI_MAX_HOST);
290 	kmem_free(wbuf, (SMB_PI_MAX_HOST * sizeof (mts_wchar_t)));
291 
292 	if ((p = strchr(session->workstation, ' ')) != 0)
293 		*p = '\0';
294 
295 	kmem_free(names, hdr.xh_length);
296 	return (smb_session_send(session, POSITIVE_SESSION_RESPONSE, NULL));
297 }
298 
299 /*
300  * Read 4-byte header from the session socket and build an in-memory
301  * session transport header.  See smb_xprt_t definition for header
302  * format information.
303  *
304  * Direct hosted NetBIOS-less SMB (SMB-over-TCP) uses port 445.  The
305  * first byte of the four-byte header must be 0 and the next three
306  * bytes contain the length of the remaining data.
307  */
308 int
309 smb_session_xprt_gethdr(smb_session_t *session, smb_xprt_t *ret_hdr)
310 {
311 	int		rc;
312 	unsigned char	buf[NETBIOS_HDR_SZ];
313 
314 	if ((rc = smb_sorecv(session->sock, buf, NETBIOS_HDR_SZ)) != 0)
315 		return (rc);
316 
317 	switch (session->s_local_port) {
318 	case SSN_SRVC_TCP_PORT:
319 		ret_hdr->xh_type = buf[0];
320 		ret_hdr->xh_length = (((uint32_t)buf[1] & 1) << 16) |
321 		    ((uint32_t)buf[2] << 8) |
322 		    ((uint32_t)buf[3]);
323 		break;
324 
325 	case SMB_SRVC_TCP_PORT:
326 		ret_hdr->xh_type = buf[0];
327 
328 		if (ret_hdr->xh_type != 0) {
329 			cmn_err(CE_WARN, "invalid type (%u)", ret_hdr->xh_type);
330 			dump_smb_inaddr(&session->ipaddr);
331 			return (EPROTO);
332 		}
333 
334 		ret_hdr->xh_length = ((uint32_t)buf[1] << 16) |
335 		    ((uint32_t)buf[2] << 8) |
336 		    ((uint32_t)buf[3]);
337 		break;
338 
339 	default:
340 		cmn_err(CE_WARN, "invalid port %u", session->s_local_port);
341 		dump_smb_inaddr(&session->ipaddr);
342 		return (EPROTO);
343 	}
344 
345 	return (0);
346 }
347 
348 /*
349  * Encode a transport session packet header into a 4-byte buffer.
350  * See smb_xprt_t definition for header format information.
351  */
352 static int
353 smb_session_xprt_puthdr(smb_session_t *session, smb_xprt_t *hdr,
354     uint8_t *buf, size_t buflen)
355 {
356 	if (session == NULL || hdr == NULL ||
357 	    buf == NULL || buflen < NETBIOS_HDR_SZ) {
358 		return (-1);
359 	}
360 
361 	switch (session->s_local_port) {
362 	case SSN_SRVC_TCP_PORT:
363 		buf[0] = hdr->xh_type;
364 		buf[1] = ((hdr->xh_length >> 16) & 1);
365 		buf[2] = (hdr->xh_length >> 8) & 0xff;
366 		buf[3] = hdr->xh_length & 0xff;
367 		break;
368 
369 	case SMB_SRVC_TCP_PORT:
370 		buf[0] = hdr->xh_type;
371 		buf[1] = (hdr->xh_length >> 16) & 0xff;
372 		buf[2] = (hdr->xh_length >> 8) & 0xff;
373 		buf[3] = hdr->xh_length & 0xff;
374 		break;
375 
376 	default:
377 		cmn_err(CE_WARN, "invalid port %u", session->s_local_port);
378 		dump_smb_inaddr(&session->ipaddr);
379 		return (-1);
380 	}
381 
382 	return (0);
383 }
384 
385 static void
386 smb_request_init_command_mbuf(smb_request_t *sr)
387 {
388 	MGET(sr->command.chain, 0, MT_DATA);
389 
390 	/*
391 	 * Setup mbuf, mimic MCLGET but use the complete packet buffer.
392 	 */
393 	sr->command.chain->m_ext.ext_buf = sr->sr_request_buf;
394 	sr->command.chain->m_data = sr->command.chain->m_ext.ext_buf;
395 	sr->command.chain->m_len = sr->sr_req_length;
396 	sr->command.chain->m_flags |= M_EXT;
397 	sr->command.chain->m_ext.ext_size = sr->sr_req_length;
398 	sr->command.chain->m_ext.ext_ref = &mclrefnoop;
399 
400 	/*
401 	 * Initialize the rest of the mbuf_chain fields
402 	 */
403 	sr->command.flags = 0;
404 	sr->command.shadow_of = 0;
405 	sr->command.max_bytes = sr->sr_req_length;
406 	sr->command.chain_offset = 0;
407 }
408 
409 /*
410  * smb_request_cancel
411  *
412  * Handle a cancel for a request properly depending on the current request
413  * state.
414  */
415 void
416 smb_request_cancel(smb_request_t *sr)
417 {
418 	mutex_enter(&sr->sr_mutex);
419 	switch (sr->sr_state) {
420 
421 	case SMB_REQ_STATE_SUBMITTED:
422 	case SMB_REQ_STATE_ACTIVE:
423 	case SMB_REQ_STATE_CLEANED_UP:
424 		sr->sr_state = SMB_REQ_STATE_CANCELED;
425 		break;
426 
427 	case SMB_REQ_STATE_WAITING_LOCK:
428 		/*
429 		 * This request is waiting on a lock.  Wakeup everything
430 		 * waiting on the lock so that the relevant thread regains
431 		 * control and notices that is has been canceled.  The
432 		 * other lock request threads waiting on this lock will go
433 		 * back to sleep when they discover they are still blocked.
434 		 */
435 		sr->sr_state = SMB_REQ_STATE_CANCELED;
436 
437 		ASSERT(sr->sr_awaiting != NULL);
438 		mutex_enter(&sr->sr_awaiting->l_mutex);
439 		cv_broadcast(&sr->sr_awaiting->l_cv);
440 		mutex_exit(&sr->sr_awaiting->l_mutex);
441 
442 		break;
443 
444 	case SMB_REQ_STATE_WAITING_EVENT:
445 	case SMB_REQ_STATE_EVENT_OCCURRED:
446 		/*
447 		 * Cancellations for these states are handled by the
448 		 * notify-change code
449 		 */
450 		break;
451 
452 	case SMB_REQ_STATE_COMPLETED:
453 	case SMB_REQ_STATE_CANCELED:
454 		/*
455 		 * No action required for these states since the request
456 		 * is completing.
457 		 */
458 		break;
459 	/*
460 	 * Cases included:
461 	 *	SMB_REQ_STATE_FREE:
462 	 *	SMB_REQ_STATE_INITIALIZING:
463 	 */
464 	default:
465 		ASSERT(0);
466 		break;
467 	}
468 	mutex_exit(&sr->sr_mutex);
469 }
470 
471 /*
472  * This is the entry point for processing SMB messages over NetBIOS or
473  * SMB-over-TCP.
474  *
475  * NetBIOS connections require a session request to establish a session
476  * on which to send session messages.
477  *
478  * Session requests are not valid on SMB-over-TCP.  We don't need to do
479  * anything here as session requests will be treated as an error when
480  * handling session messages.
481  */
482 int
483 smb_session_daemon(smb_session_list_t *se)
484 {
485 	int		rc = 0;
486 	smb_session_t	*session;
487 
488 	session = smb_session_list_activate_head(se);
489 	if (session == NULL)
490 		return (EINVAL);
491 
492 	if (session->s_local_port == SSN_SRVC_TCP_PORT) {
493 		rc = smb_session_request(session);
494 		if (rc) {
495 			smb_rwx_rwenter(&session->s_lock, RW_WRITER);
496 			session->s_state = SMB_SESSION_STATE_DISCONNECTED;
497 			smb_rwx_rwexit(&session->s_lock);
498 			smb_session_list_terminate(se, session);
499 			return (rc);
500 		}
501 	}
502 
503 	smb_rwx_rwenter(&session->s_lock, RW_WRITER);
504 	session->s_state = SMB_SESSION_STATE_ESTABLISHED;
505 	smb_rwx_rwexit(&session->s_lock);
506 
507 	rc = smb_session_message(session);
508 
509 	smb_rwx_rwenter(&session->s_lock, RW_WRITER);
510 	session->s_state = SMB_SESSION_STATE_DISCONNECTED;
511 	smb_rwx_rwexit(&session->s_lock);
512 
513 	smb_soshutdown(session->sock);
514 
515 	DTRACE_PROBE2(session__drop, struct session *, session, int, rc);
516 
517 	smb_session_cancel(session);
518 
519 	/*
520 	 * At this point everything related to the session should have been
521 	 * cleaned up and we expect that nothing will attempt to use the
522 	 * socket.
523 	 */
524 	smb_session_list_terminate(se, session);
525 
526 	return (rc);
527 }
528 
529 /*
530  * Read and process SMB requests.
531  *
532  * Returns:
533  *	0	Success
534  *	1	Unable to read transport header
535  *	2	Invalid transport header type
536  *	3	Invalid SMB length (too small)
537  *	4	Unable to read SMB header
538  *	5	Invalid SMB header (bad magic number)
539  *	6	Unable to read SMB data
540  *	2x	Write raw failed
541  */
542 static int
543 smb_session_message(smb_session_t *session)
544 {
545 	smb_request_t	*sr = NULL;
546 	smb_xprt_t	hdr;
547 	uint8_t		*req_buf;
548 	uint32_t	resid;
549 	int		rc;
550 
551 	for (;;) {
552 
553 		rc = smb_session_xprt_gethdr(session, &hdr);
554 		if (rc)
555 			return (rc);
556 
557 		DTRACE_PROBE2(session__receive__xprthdr, session_t *, session,
558 		    smb_xprt_t *, &hdr);
559 
560 		if (hdr.xh_type != SESSION_MESSAGE) {
561 			/*
562 			 * Anything other than SESSION_MESSAGE or
563 			 * SESSION_KEEP_ALIVE is an error.  A SESSION_REQUEST
564 			 * may indicate a new session request but we need to
565 			 * close this session and we can treat it as an error
566 			 * here.
567 			 */
568 			if (hdr.xh_type == SESSION_KEEP_ALIVE) {
569 				session->keep_alive = smb_keep_alive;
570 				continue;
571 			}
572 			return (EPROTO);
573 		}
574 
575 		if (hdr.xh_length < SMB_HEADER_LEN)
576 			return (EPROTO);
577 
578 		session->keep_alive = smb_keep_alive;
579 
580 		/*
581 		 * Allocate a request context, read the SMB header and validate
582 		 * it. The sr includes a buffer large enough to hold the SMB
583 		 * request payload.  If the header looks valid, read any
584 		 * remaining data.
585 		 */
586 		sr = smb_request_alloc(session, hdr.xh_length);
587 
588 		req_buf = (uint8_t *)sr->sr_request_buf;
589 		resid = hdr.xh_length;
590 
591 		rc = smb_sorecv(session->sock, req_buf, SMB_HEADER_LEN);
592 		if (rc) {
593 			smb_request_free(sr);
594 			return (rc);
595 		}
596 
597 		if (SMB_PROTOCOL_MAGIC_INVALID(sr)) {
598 			smb_request_free(sr);
599 			return (EPROTO);
600 		}
601 
602 		if (resid > SMB_HEADER_LEN) {
603 			req_buf += SMB_HEADER_LEN;
604 			resid -= SMB_HEADER_LEN;
605 
606 			rc = smb_sorecv(session->sock, req_buf, resid);
607 			if (rc) {
608 				smb_request_free(sr);
609 				return (rc);
610 			}
611 		}
612 
613 		/*
614 		 * Initialize command MBC to represent the received data.
615 		 */
616 		smb_request_init_command_mbuf(sr);
617 
618 		DTRACE_PROBE1(session__receive__smb, smb_request_t *, sr);
619 
620 		/*
621 		 * If this is a raw write, hand off the request.  The handler
622 		 * will retrieve the remaining raw data and process the request.
623 		 */
624 		if (SMB_IS_WRITERAW(sr)) {
625 			rc = smb_handle_write_raw(session, sr);
626 			/* XXX smb_request_free(sr); ??? */
627 			return (rc);
628 		}
629 
630 		sr->sr_state = SMB_REQ_STATE_SUBMITTED;
631 		(void) taskq_dispatch(session->s_server->sv_thread_pool,
632 		    smb_session_worker, sr, TQ_SLEEP);
633 	}
634 }
635 
636 /*
637  * Port will be SSN_SRVC_TCP_PORT or SMB_SRVC_TCP_PORT.
638  */
639 smb_session_t *
640 smb_session_create(ksocket_t new_so, uint16_t port, smb_server_t *sv,
641     int family)
642 {
643 	struct sockaddr_in	sin;
644 	socklen_t		slen;
645 	struct sockaddr_in6	sin6;
646 	smb_session_t		*session;
647 
648 	session = kmem_cache_alloc(sv->si_cache_session, KM_SLEEP);
649 	bzero(session, sizeof (smb_session_t));
650 
651 	if (smb_idpool_constructor(&session->s_uid_pool)) {
652 		kmem_cache_free(sv->si_cache_session, session);
653 		return (NULL);
654 	}
655 
656 	session->s_kid = SMB_NEW_KID();
657 	session->s_state = SMB_SESSION_STATE_INITIALIZED;
658 	session->native_os = NATIVE_OS_UNKNOWN;
659 	session->opentime = lbolt64;
660 	session->keep_alive = smb_keep_alive;
661 	session->activity_timestamp = lbolt64;
662 
663 	smb_slist_constructor(&session->s_req_list, sizeof (smb_request_t),
664 	    offsetof(smb_request_t, sr_session_lnd));
665 
666 	smb_llist_constructor(&session->s_user_list, sizeof (smb_user_t),
667 	    offsetof(smb_user_t, u_lnd));
668 
669 	smb_llist_constructor(&session->s_xa_list, sizeof (smb_xa_t),
670 	    offsetof(smb_xa_t, xa_lnd));
671 
672 	smb_net_txl_constructor(&session->s_txlst);
673 
674 	smb_rwx_init(&session->s_lock);
675 
676 	if (new_so) {
677 		if (family == AF_INET) {
678 			slen = sizeof (sin);
679 			(void) ksocket_getsockname(new_so,
680 			    (struct sockaddr *)&sin, &slen, CRED());
681 			bcopy(&sin, &session->local_ipaddr.a_ip, slen);
682 			(void) ksocket_getpeername(new_so,
683 			    (struct sockaddr *)&sin, &slen, CRED());
684 			bcopy(&sin6, &session->ipaddr.a_ip, slen);
685 		} else {
686 			slen = sizeof (sin6);
687 			(void) ksocket_getsockname(new_so,
688 			    (struct sockaddr *)&sin6, &slen, CRED());
689 			bcopy(&sin, &session->local_ipaddr.a_ip, slen);
690 			(void) ksocket_getpeername(new_so,
691 			    (struct sockaddr *)&sin6, &slen, CRED());
692 			bcopy(&sin6, &session->ipaddr.a_ip, slen);
693 		}
694 		session->ipaddr.a_family = family;
695 		session->local_ipaddr.a_family = family;
696 		session->s_local_port = port;
697 		session->sock = new_so;
698 	}
699 
700 	session->s_server = sv;
701 	smb_server_get_cfg(sv, &session->s_cfg);
702 	session->s_cache_request = sv->si_cache_request;
703 	session->s_cache = sv->si_cache_session;
704 	session->s_magic = SMB_SESSION_MAGIC;
705 	return (session);
706 }
707 
708 void
709 smb_session_delete(smb_session_t *session)
710 {
711 	ASSERT(session->s_magic == SMB_SESSION_MAGIC);
712 
713 	session->s_magic = (uint32_t)~SMB_SESSION_MAGIC;
714 
715 	smb_rwx_destroy(&session->s_lock);
716 	smb_net_txl_destructor(&session->s_txlst);
717 	smb_slist_destructor(&session->s_req_list);
718 	smb_llist_destructor(&session->s_user_list);
719 	smb_llist_destructor(&session->s_xa_list);
720 
721 	ASSERT(session->s_tree_cnt == 0);
722 	ASSERT(session->s_file_cnt == 0);
723 	ASSERT(session->s_dir_cnt == 0);
724 
725 	smb_idpool_destructor(&session->s_uid_pool);
726 	kmem_cache_free(session->s_cache, session);
727 }
728 
729 void
730 smb_session_cancel(smb_session_t *session)
731 {
732 	smb_xa_t	*xa, *nextxa;
733 
734 	/* All the request currently being treated must be canceled. */
735 	smb_session_cancel_requests(session, NULL, NULL);
736 
737 	/*
738 	 * We wait for the completion of all the requests associated with
739 	 * this session.
740 	 */
741 	smb_slist_wait_for_empty(&session->s_req_list);
742 
743 	/*
744 	 * At this point the reference count of the users, trees, files,
745 	 * directories should be zero. It should be possible to destroy them
746 	 * without any problem.
747 	 */
748 	xa = smb_llist_head(&session->s_xa_list);
749 	while (xa) {
750 		nextxa = smb_llist_next(&session->s_xa_list, xa);
751 		smb_xa_close(xa);
752 		xa = nextxa;
753 	}
754 	smb_user_logoff_all(session);
755 }
756 
757 /*
758  * Cancel requests.  If a non-null tree is specified, only requests specific
759  * to that tree will be cancelled.  If a non-null sr is specified, that sr
760  * will be not be cancelled - this would typically be the caller's sr.
761  */
762 void
763 smb_session_cancel_requests(
764     smb_session_t	*session,
765     smb_tree_t		*tree,
766     smb_request_t	*exclude_sr)
767 {
768 	smb_request_t	*sr;
769 
770 	smb_process_session_notify_change_queue(session, tree);
771 
772 	smb_slist_enter(&session->s_req_list);
773 	sr = smb_slist_head(&session->s_req_list);
774 
775 	while (sr) {
776 		ASSERT(sr->sr_magic == SMB_REQ_MAGIC);
777 		if ((sr != exclude_sr) &&
778 		    (tree == NULL || sr->tid_tree == tree))
779 			smb_request_cancel(sr);
780 
781 		sr = smb_slist_next(&session->s_req_list, sr);
782 	}
783 
784 	smb_slist_exit(&session->s_req_list);
785 }
786 
787 void
788 smb_session_worker(
789     void	*arg)
790 {
791 	smb_request_t	*sr;
792 
793 	sr = (smb_request_t *)arg;
794 
795 	ASSERT(sr->sr_magic == SMB_REQ_MAGIC);
796 
797 
798 	mutex_enter(&sr->sr_mutex);
799 	switch (sr->sr_state) {
800 	case SMB_REQ_STATE_SUBMITTED:
801 		mutex_exit(&sr->sr_mutex);
802 		if (smb_dispatch_request(sr)) {
803 			mutex_enter(&sr->sr_mutex);
804 			sr->sr_state = SMB_REQ_STATE_COMPLETED;
805 			mutex_exit(&sr->sr_mutex);
806 			smb_request_free(sr);
807 		}
808 		break;
809 
810 	default:
811 		ASSERT(sr->sr_state == SMB_REQ_STATE_CANCELED);
812 		sr->sr_state = SMB_REQ_STATE_COMPLETED;
813 		mutex_exit(&sr->sr_mutex);
814 		smb_request_free(sr);
815 		break;
816 	}
817 }
818 
819 /*
820  * smb_session_disconnect_share
821  *
822  * Disconnects the specified share. This function should be called after the
823  * share passed in has been made unavailable by the "share manager".
824  */
825 void
826 smb_session_disconnect_share(smb_session_list_t *se, char *sharename)
827 {
828 	smb_session_t	*session;
829 
830 	rw_enter(&se->se_lock, RW_READER);
831 	session = list_head(&se->se_act.lst);
832 	while (session) {
833 		ASSERT(session->s_magic == SMB_SESSION_MAGIC);
834 		smb_rwx_rwenter(&session->s_lock, RW_READER);
835 		switch (session->s_state) {
836 		case SMB_SESSION_STATE_NEGOTIATED:
837 		case SMB_SESSION_STATE_OPLOCK_BREAKING:
838 		case SMB_SESSION_STATE_WRITE_RAW_ACTIVE: {
839 			smb_user_t	*user;
840 			smb_user_t	*next;
841 
842 			user = smb_user_lookup_by_state(session, NULL);
843 			while (user) {
844 				smb_user_disconnect_share(user, sharename);
845 				next = smb_user_lookup_by_state(session, user);
846 				smb_user_release(user);
847 				user = next;
848 			}
849 			break;
850 
851 		}
852 		default:
853 			break;
854 		}
855 		smb_rwx_rwexit(&session->s_lock);
856 		session = list_next(&se->se_act.lst, session);
857 	}
858 	rw_exit(&se->se_lock);
859 }
860 
861 void
862 smb_session_list_constructor(smb_session_list_t *se)
863 {
864 	bzero(se, sizeof (*se));
865 	rw_init(&se->se_lock, NULL, RW_DEFAULT, NULL);
866 	list_create(&se->se_rdy.lst, sizeof (smb_session_t),
867 	    offsetof(smb_session_t, s_lnd));
868 	list_create(&se->se_act.lst, sizeof (smb_session_t),
869 	    offsetof(smb_session_t, s_lnd));
870 }
871 
872 void
873 smb_session_list_destructor(smb_session_list_t *se)
874 {
875 	list_destroy(&se->se_rdy.lst);
876 	list_destroy(&se->se_act.lst);
877 	rw_destroy(&se->se_lock);
878 }
879 
880 void
881 smb_session_list_append(smb_session_list_t *se, smb_session_t *session)
882 {
883 	ASSERT(session->s_magic == SMB_SESSION_MAGIC);
884 	ASSERT(session->s_state == SMB_SESSION_STATE_INITIALIZED);
885 
886 	rw_enter(&se->se_lock, RW_WRITER);
887 	list_insert_tail(&se->se_rdy.lst, session);
888 	se->se_rdy.count++;
889 	se->se_wrop++;
890 	rw_exit(&se->se_lock);
891 }
892 
893 void
894 smb_session_list_delete_tail(smb_session_list_t *se)
895 {
896 	smb_session_t	*session;
897 
898 	rw_enter(&se->se_lock, RW_WRITER);
899 	session = list_tail(&se->se_rdy.lst);
900 	if (session) {
901 		ASSERT(session->s_magic == SMB_SESSION_MAGIC);
902 		ASSERT(session->s_state == SMB_SESSION_STATE_INITIALIZED);
903 		list_remove(&se->se_rdy.lst, session);
904 		ASSERT(se->se_rdy.count);
905 		se->se_rdy.count--;
906 		rw_exit(&se->se_lock);
907 		smb_session_delete(session);
908 		return;
909 	}
910 	rw_exit(&se->se_lock);
911 }
912 
913 smb_session_t *
914 smb_session_list_activate_head(smb_session_list_t *se)
915 {
916 	smb_session_t	*session;
917 
918 	rw_enter(&se->se_lock, RW_WRITER);
919 	session = list_head(&se->se_rdy.lst);
920 	if (session) {
921 		ASSERT(session->s_magic == SMB_SESSION_MAGIC);
922 		smb_rwx_rwenter(&session->s_lock, RW_WRITER);
923 		ASSERT(session->s_state == SMB_SESSION_STATE_INITIALIZED);
924 		session->s_thread = curthread;
925 		session->s_ktdid = session->s_thread->t_did;
926 		smb_rwx_rwexit(&session->s_lock);
927 		list_remove(&se->se_rdy.lst, session);
928 		se->se_rdy.count--;
929 		list_insert_tail(&se->se_act.lst, session);
930 		se->se_act.count++;
931 		se->se_wrop++;
932 	}
933 	rw_exit(&se->se_lock);
934 	return (session);
935 }
936 
937 void
938 smb_session_list_terminate(smb_session_list_t *se, smb_session_t *session)
939 {
940 	ASSERT(session->s_magic == SMB_SESSION_MAGIC);
941 
942 	rw_enter(&se->se_lock, RW_WRITER);
943 
944 	smb_rwx_rwenter(&session->s_lock, RW_WRITER);
945 	ASSERT(session->s_state == SMB_SESSION_STATE_DISCONNECTED);
946 	session->s_state = SMB_SESSION_STATE_TERMINATED;
947 	smb_sodestroy(session->sock);
948 	session->sock = NULL;
949 	smb_rwx_rwexit(&session->s_lock);
950 
951 	list_remove(&se->se_act.lst, session);
952 	se->se_act.count--;
953 	se->se_wrop++;
954 
955 	ASSERT(session->s_thread == curthread);
956 
957 	rw_exit(&se->se_lock);
958 
959 	smb_session_delete(session);
960 }
961 
962 /*
963  * smb_session_list_signal
964  *
965  * This function signals all the session threads. The intent is to terminate
966  * them. The sessions still in the SMB_SESSION_STATE_INITIALIZED are delete
967  * immediately.
968  *
969  * This function must only be called by the threads listening and accepting
970  * connections. They must pass in their respective session list.
971  */
972 void
973 smb_session_list_signal(smb_session_list_t *se)
974 {
975 	smb_session_t	*session;
976 
977 	rw_enter(&se->se_lock, RW_WRITER);
978 	while (session = list_head(&se->se_rdy.lst)) {
979 
980 		ASSERT(session->s_magic == SMB_SESSION_MAGIC);
981 
982 		smb_rwx_rwenter(&session->s_lock, RW_WRITER);
983 		ASSERT(session->s_state == SMB_SESSION_STATE_INITIALIZED);
984 		session->s_state = SMB_SESSION_STATE_TERMINATED;
985 		smb_sodestroy(session->sock);
986 		session->sock = NULL;
987 		smb_rwx_rwexit(&session->s_lock);
988 
989 		list_remove(&se->se_rdy.lst, session);
990 		se->se_rdy.count--;
991 		se->se_wrop++;
992 
993 		rw_exit(&se->se_lock);
994 		smb_session_delete(session);
995 		rw_enter(&se->se_lock, RW_WRITER);
996 	}
997 	rw_downgrade(&se->se_lock);
998 
999 	session = list_head(&se->se_act.lst);
1000 	while (session) {
1001 
1002 		ASSERT(session->s_magic == SMB_SESSION_MAGIC);
1003 		tsignal(session->s_thread, SIGINT);
1004 		session = list_next(&se->se_act.lst, session);
1005 	}
1006 	rw_exit(&se->se_lock);
1007 }
1008 
1009 /*
1010  * smb_session_lookup_user
1011  */
1012 static smb_user_t *
1013 smb_session_lookup_user(smb_session_t *session, char *domain, char *name)
1014 {
1015 	smb_user_t	*user;
1016 	smb_llist_t	*ulist;
1017 
1018 	ulist = &session->s_user_list;
1019 	smb_llist_enter(ulist, RW_READER);
1020 	user = smb_llist_head(ulist);
1021 	while (user) {
1022 		ASSERT(user->u_magic == SMB_USER_MAGIC);
1023 		if (!utf8_strcasecmp(user->u_name, name) &&
1024 		    !utf8_strcasecmp(user->u_domain, domain)) {
1025 			mutex_enter(&user->u_mutex);
1026 			if (user->u_state == SMB_USER_STATE_LOGGED_IN) {
1027 				user->u_refcnt++;
1028 				mutex_exit(&user->u_mutex);
1029 				break;
1030 			}
1031 			mutex_exit(&user->u_mutex);
1032 		}
1033 		user = smb_llist_next(ulist, user);
1034 	}
1035 	smb_llist_exit(ulist);
1036 
1037 	return (user);
1038 }
1039 
1040 /*
1041  * If a user attempts to log in subsequently from the specified session,
1042  * duplicates the existing SMB user instance such that all SMB user
1043  * instances that corresponds to the same user on the given session
1044  * reference the same user's cred.
1045  *
1046  * Returns NULL if the given user hasn't yet logged in from this
1047  * specified session.  Otherwise, returns a user instance that corresponds
1048  * to this subsequent login.
1049  */
1050 smb_user_t *
1051 smb_session_dup_user(smb_session_t *session, char *domain, char *account_name)
1052 {
1053 	smb_user_t *orig_user = NULL;
1054 	smb_user_t *user = NULL;
1055 
1056 	orig_user = smb_session_lookup_user(session, domain,
1057 	    account_name);
1058 
1059 	if (orig_user) {
1060 		user = smb_user_dup(orig_user);
1061 		smb_user_release(orig_user);
1062 	}
1063 
1064 	return (user);
1065 }
1066 
1067 /*
1068  * smb_request_alloc
1069  *
1070  * Allocate an smb_request_t structure from the kmem_cache.  Partially
1071  * initialize the found/new request.
1072  *
1073  * Returns pointer to a request
1074  */
1075 smb_request_t *
1076 smb_request_alloc(smb_session_t *session, int req_length)
1077 {
1078 	smb_request_t	*sr;
1079 
1080 	ASSERT(session->s_magic == SMB_SESSION_MAGIC);
1081 
1082 	sr = kmem_cache_alloc(session->s_cache_request, KM_SLEEP);
1083 
1084 	/*
1085 	 * Future:  Use constructor to pre-initialize some fields.  For now
1086 	 * there are so many fields that it is easiest just to zero the
1087 	 * whole thing and start over.
1088 	 */
1089 	bzero(sr, sizeof (smb_request_t));
1090 
1091 	mutex_init(&sr->sr_mutex, NULL, MUTEX_DEFAULT, NULL);
1092 	sr->session = session;
1093 	sr->sr_server = session->s_server;
1094 	sr->sr_gmtoff = session->s_server->si_gmtoff;
1095 	sr->sr_cache = session->s_server->si_cache_request;
1096 	sr->sr_cfg = &session->s_cfg;
1097 	sr->request_storage.forw = &sr->request_storage;
1098 	sr->request_storage.back = &sr->request_storage;
1099 	sr->command.max_bytes = req_length;
1100 	sr->reply.max_bytes = smb_maxbufsize;
1101 	sr->sr_req_length = req_length;
1102 	if (req_length)
1103 		sr->sr_request_buf = kmem_alloc(req_length, KM_SLEEP);
1104 	sr->sr_magic = SMB_REQ_MAGIC;
1105 	sr->sr_state = SMB_REQ_STATE_INITIALIZING;
1106 	smb_slist_insert_tail(&session->s_req_list, sr);
1107 	return (sr);
1108 }
1109 
1110 /*
1111  * smb_request_free
1112  *
1113  * release the memories which have been allocated for a smb request.
1114  */
1115 void
1116 smb_request_free(smb_request_t *sr)
1117 {
1118 	ASSERT(sr->sr_magic == SMB_REQ_MAGIC);
1119 	ASSERT(sr->session);
1120 	ASSERT(sr->fid_ofile == NULL);
1121 	ASSERT(sr->r_xa == NULL);
1122 
1123 	if (sr->tid_tree)
1124 		smb_tree_release(sr->tid_tree);
1125 
1126 	if (sr->uid_user)
1127 		smb_user_release(sr->uid_user);
1128 
1129 	smb_slist_remove(&sr->session->s_req_list, sr);
1130 
1131 	sr->session = NULL;
1132 
1133 	/* Release any temp storage */
1134 	smbsr_free_malloc_list(&sr->request_storage);
1135 
1136 	if (sr->sr_request_buf)
1137 		kmem_free(sr->sr_request_buf, sr->sr_req_length);
1138 	if (sr->command.chain)
1139 		m_freem(sr->command.chain);
1140 	if (sr->reply.chain)
1141 		m_freem(sr->reply.chain);
1142 	if (sr->raw_data.chain)
1143 		m_freem(sr->raw_data.chain);
1144 
1145 	sr->sr_magic = 0;
1146 	mutex_destroy(&sr->sr_mutex);
1147 	kmem_cache_free(sr->sr_cache, sr);
1148 }
1149 
1150 void
1151 dump_smb_inaddr(smb_inaddr_t *ipaddr)
1152 {
1153 char ipstr[INET6_ADDRSTRLEN];
1154 
1155 	if (smb_inet_ntop(ipaddr, ipstr, SMB_IPSTRLEN(ipaddr->a_family)))
1156 		cmn_err(CE_WARN, "error ipstr=%s", ipstr);
1157 	else
1158 		cmn_err(CE_WARN, "error converting ip address");
1159 }
1160