xref: /titanic_44/usr/src/uts/common/fs/smbsrv/smb_user.c (revision a398035bff356df3a17376cda89486682fb1f23b)
1 /*
2  * CDDL HEADER START
3  *
4  * The contents of this file are subject to the terms of the
5  * Common Development and Distribution License (the "License").
6  * You may not use this file except in compliance with the License.
7  *
8  * You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE
9  * or http://www.opensolaris.org/os/licensing.
10  * See the License for the specific language governing permissions
11  * and limitations under the License.
12  *
13  * When distributing Covered Code, include this CDDL HEADER in each
14  * file and include the License file at usr/src/OPENSOLARIS.LICENSE.
15  * If applicable, add the following below this CDDL HEADER, with the
16  * fields enclosed by brackets "[]" replaced with your own identifying
17  * information: Portions Copyright [yyyy] [name of copyright owner]
18  *
19  * CDDL HEADER END
20  */
21 /*
22  * Copyright 2009 Sun Microsystems, Inc.  All rights reserved.
23  * Use is subject to license terms.
24  */
25 
26 /*
27  * General Structures Layout
28  * -------------------------
29  *
30  * This is a simplified diagram showing the relationship between most of the
31  * main structures.
32  *
33  * +-------------------+
34  * |     SMB_INFO      |
35  * +-------------------+
36  *          |
37  *          |
38  *          v
39  * +-------------------+       +-------------------+      +-------------------+
40  * |     SESSION       |<----->|     SESSION       |......|      SESSION      |
41  * +-------------------+       +-------------------+      +-------------------+
42  *          |
43  *          |
44  *          v
45  * +-------------------+       +-------------------+      +-------------------+
46  * |       USER        |<----->|       USER        |......|       USER        |
47  * +-------------------+       +-------------------+      +-------------------+
48  *          |
49  *          |
50  *          v
51  * +-------------------+       +-------------------+      +-------------------+
52  * |       TREE        |<----->|       TREE        |......|       TREE        |
53  * +-------------------+       +-------------------+      +-------------------+
54  *      |         |
55  *      |         |
56  *      |         v
57  *      |     +-------+       +-------+      +-------+
58  *      |     | OFILE |<----->| OFILE |......| OFILE |
59  *      |     +-------+       +-------+      +-------+
60  *      |
61  *      |
62  *      v
63  *  +-------+       +------+      +------+
64  *  | ODIR  |<----->| ODIR |......| ODIR |
65  *  +-------+       +------+      +------+
66  *
67  *
68  * User State Machine
69  * ------------------
70  *
71  *    +-----------------------------+	 T0
72  *    |  SMB_USER_STATE_LOGGED_IN   |<----------- Creation/Allocation
73  *    +-----------------------------+
74  *		    |
75  *		    | T1
76  *		    |
77  *		    v
78  *    +-----------------------------+
79  *    |  SMB_USER_STATE_LOGGING_OFF |
80  *    +-----------------------------+
81  *		    |
82  *		    | T2
83  *		    |
84  *		    v
85  *    +-----------------------------+    T3
86  *    |  SMB_USER_STATE_LOGGED_OFF  |----------> Deletion/Free
87  *    +-----------------------------+
88  *
89  * SMB_USER_STATE_LOGGED_IN
90  *
91  *    While in this state:
92  *      - The user is queued in the list of users of his session.
93  *      - References will be given out if the user is looked up.
94  *      - The user can access files and pipes.
95  *
96  * SMB_USER_STATE_LOGGING_OFF
97  *
98  *    While in this state:
99  *      - The user is queued in the list of users of his session.
100  *      - References will not be given out if the user is looked up.
101  *      - The trees the user connected are being disconnected.
102  *      - The resources associated with the user remain.
103  *
104  * SMB_USER_STATE_LOGGING_OFF
105  *
106  *    While in this state:
107  *      - The user is queued in the list of users of his session.
108  *      - References will not be given out if the user is looked up.
109  *      - The user has no more trees connected.
110  *      - The resources associated with the user remain.
111  *
112  * Transition T0
113  *
114  *    This transition occurs in smb_user_login(). A new user is created and
115  *    added to the list of users of a session.
116  *
117  * Transition T1
118  *
119  *    This transition occurs in smb_user_logoff().
120  *
121  * Transition T2
122  *
123  *    This transition occurs in smb_user_release(). The resources associated
124  *    with the user are deleted as well as the user. For the transition to
125  *    occur, the user must be in the SMB_USER_STATE_LOGGED_OFF state and the
126  *    reference count be zero.
127  *
128  * Comments
129  * --------
130  *
131  *    The state machine of the user structures is controlled by 3 elements:
132  *      - The list of users of the session he belongs to.
133  *      - The mutex embedded in the structure itself.
134  *      - The reference count.
135  *
136  *    There's a mutex embedded in the user structure used to protect its fields
137  *    and there's a lock embedded in the list of users of a session. To
138  *    increment or to decrement the reference count the mutex must be entered.
139  *    To insert the user into the list of users of the session and to remove
140  *    the user from it, the lock must be entered in RW_WRITER mode.
141  *
142  *    Rules of access to a user structure:
143  *
144  *    1) In order to avoid deadlocks, when both (mutex and lock of the session
145  *       list) have to be entered, the lock must be entered first.
146  *
147  *    2) All actions applied to a user require a reference count.
148  *
149  *    3) There are 2 ways of getting a reference count. One is when the user
150  *       logs in. The other when the user is looked up. This translates into
151  *       3 functions: smb_user_login(), smb_user_lookup_by_uid() and
152  *       smb_user_lookup_by_credentials.
153  *
154  *    It should be noted that the reference count of a user registers the
155  *    number of references to the user in other structures (such as an smb
156  *    request). The reference count is not incremented in these 2 instances:
157  *
158  *    1) The user is logged in. An user is anchored by his state. If there's
159  *       no activity involving a user currently logged in, the reference
160  *       count of that user is zero.
161  *
162  *    2) The user is queued in the list of users of the session. The fact of
163  *       being queued in that list is NOT registered by incrementing the
164  *       reference count.
165  */
166 #include <smbsrv/smb_incl.h>
167 #include <smbsrv/smb_door_svc.h>
168 
169 
170 #define	ADMINISTRATORS_SID	"S-1-5-32-544"
171 
172 static smb_sid_t *smb_admins_sid = NULL;
173 
174 static void smb_user_delete(smb_user_t *user);
175 static smb_tree_t *smb_user_get_tree(smb_llist_t *, smb_tree_t *);
176 
177 int
178 smb_user_init(void)
179 {
180 	if (smb_admins_sid != NULL)
181 		return (0);
182 
183 	if ((smb_admins_sid = smb_sid_fromstr(ADMINISTRATORS_SID)) == NULL)
184 		return (-1);
185 
186 	return (0);
187 }
188 
189 void
190 smb_user_fini(void)
191 {
192 	if (smb_admins_sid != NULL) {
193 		smb_sid_free(smb_admins_sid);
194 		smb_admins_sid = NULL;
195 	}
196 }
197 
198 /*
199  * smb_user_login
200  *
201  *
202  */
203 smb_user_t *
204 smb_user_login(
205     smb_session_t	*session,
206     cred_t		*cr,
207     char		*domain_name,
208     char		*account_name,
209     uint32_t		flags,
210     uint32_t		privileges,
211     uint32_t		audit_sid)
212 {
213 	smb_user_t	*user;
214 
215 	ASSERT(session);
216 	ASSERT(session->s_magic == SMB_SESSION_MAGIC);
217 	ASSERT(cr);
218 	ASSERT(account_name);
219 	ASSERT(domain_name);
220 
221 	user = kmem_cache_alloc(session->s_server->si_cache_user, KM_SLEEP);
222 	bzero(user, sizeof (smb_user_t));
223 	user->u_refcnt = 1;
224 	user->u_session = session;
225 	user->u_server = session->s_server;
226 	user->u_logon_time = gethrestime_sec();
227 	user->u_flags = flags;
228 	user->u_privileges = privileges;
229 	user->u_name_len = strlen(account_name) + 1;
230 	user->u_domain_len = strlen(domain_name) + 1;
231 	user->u_name = smb_kstrdup(account_name, user->u_name_len);
232 	user->u_domain = smb_kstrdup(domain_name, user->u_domain_len);
233 	user->u_cred = cr;
234 	user->u_privcred = smb_cred_create_privs(cr, privileges);
235 	user->u_audit_sid = audit_sid;
236 
237 	if (!smb_idpool_alloc(&session->s_uid_pool, &user->u_uid)) {
238 		if (!smb_idpool_constructor(&user->u_tid_pool)) {
239 			smb_llist_constructor(&user->u_tree_list,
240 			    sizeof (smb_tree_t), offsetof(smb_tree_t, t_lnd));
241 			mutex_init(&user->u_mutex, NULL, MUTEX_DEFAULT, NULL);
242 			crhold(user->u_cred);
243 			if (user->u_privcred)
244 				crhold(user->u_privcred);
245 			user->u_state = SMB_USER_STATE_LOGGED_IN;
246 			user->u_magic = SMB_USER_MAGIC;
247 			smb_llist_enter(&session->s_user_list, RW_WRITER);
248 			smb_llist_insert_tail(&session->s_user_list, user);
249 			smb_llist_exit(&session->s_user_list);
250 			atomic_inc_32(&session->s_server->sv_open_users);
251 			return (user);
252 		}
253 		smb_idpool_free(&session->s_uid_pool, user->u_uid);
254 	}
255 	kmem_free(user->u_name, (size_t)user->u_name_len);
256 	kmem_free(user->u_domain, (size_t)user->u_domain_len);
257 	kmem_cache_free(session->s_server->si_cache_user, user);
258 	return (NULL);
259 }
260 
261 /*
262  * Create a new user based on an existing user, used to support
263  * additional SessionSetupX requests for a user on a session.
264  *
265  * Assumes the caller has a reference on the original user from
266  * a user_lookup_by_x call.
267  */
268 smb_user_t *
269 smb_user_dup(
270     smb_user_t		*orig_user)
271 {
272 	smb_user_t	*user;
273 
274 	ASSERT(orig_user->u_magic == SMB_USER_MAGIC);
275 	ASSERT(orig_user->u_refcnt);
276 
277 	user = smb_user_login(orig_user->u_session, orig_user->u_cred,
278 	    orig_user->u_domain, orig_user->u_name, orig_user->u_flags,
279 	    orig_user->u_privileges, orig_user->u_audit_sid);
280 
281 	if (user)
282 		smb_user_nonauth_logon(orig_user->u_audit_sid);
283 
284 	return (user);
285 }
286 
287 /*
288  * smb_user_logoff
289  *
290  *
291  */
292 void
293 smb_user_logoff(
294     smb_user_t		*user)
295 {
296 	ASSERT(user->u_magic == SMB_USER_MAGIC);
297 
298 	mutex_enter(&user->u_mutex);
299 	ASSERT(user->u_refcnt);
300 	switch (user->u_state) {
301 	case SMB_USER_STATE_LOGGED_IN: {
302 		/*
303 		 * The user is moved into a state indicating that the log off
304 		 * process has started.
305 		 */
306 		user->u_state = SMB_USER_STATE_LOGGING_OFF;
307 		mutex_exit(&user->u_mutex);
308 		atomic_dec_32(&user->u_server->sv_open_users);
309 		/*
310 		 * All the trees hanging off of this user are disconnected.
311 		 */
312 		smb_user_disconnect_trees(user);
313 		smb_user_auth_logoff(user->u_audit_sid);
314 		mutex_enter(&user->u_mutex);
315 		user->u_state = SMB_USER_STATE_LOGGED_OFF;
316 		break;
317 	}
318 	case SMB_USER_STATE_LOGGED_OFF:
319 	case SMB_USER_STATE_LOGGING_OFF:
320 		break;
321 
322 	default:
323 		ASSERT(0);
324 		break;
325 	}
326 	mutex_exit(&user->u_mutex);
327 }
328 
329 /*
330  * smb_user_logoff_all
331  *
332  *
333  */
334 void
335 smb_user_logoff_all(
336     smb_session_t	*session)
337 {
338 	smb_user_t	*user;
339 
340 	ASSERT(session);
341 	ASSERT(session->s_magic == SMB_SESSION_MAGIC);
342 
343 	smb_llist_enter(&session->s_user_list, RW_READER);
344 	user = smb_llist_head(&session->s_user_list);
345 	while (user) {
346 		ASSERT(user->u_magic == SMB_USER_MAGIC);
347 		ASSERT(user->u_session == session);
348 		mutex_enter(&user->u_mutex);
349 		switch (user->u_state) {
350 		case SMB_USER_STATE_LOGGED_IN:
351 			/* The user is still logged in. */
352 			user->u_refcnt++;
353 			mutex_exit(&user->u_mutex);
354 			smb_llist_exit(&session->s_user_list);
355 			smb_user_logoff(user);
356 			smb_user_release(user);
357 			smb_llist_enter(&session->s_user_list, RW_READER);
358 			user = smb_llist_head(&session->s_user_list);
359 			break;
360 		case SMB_USER_STATE_LOGGING_OFF:
361 		case SMB_USER_STATE_LOGGED_OFF:
362 			/*
363 			 * The user is logged off or logging off.
364 			 */
365 			mutex_exit(&user->u_mutex);
366 			user = smb_llist_next(&session->s_user_list, user);
367 			break;
368 		default:
369 			ASSERT(0);
370 			mutex_exit(&user->u_mutex);
371 			user = smb_llist_next(&session->s_user_list, user);
372 			break;
373 		}
374 	}
375 	smb_llist_exit(&session->s_user_list);
376 }
377 
378 /*
379  * smb_user_release
380  *
381  *
382  */
383 void
384 smb_user_release(
385     smb_user_t		*user)
386 {
387 	ASSERT(user->u_magic == SMB_USER_MAGIC);
388 
389 	mutex_enter(&user->u_mutex);
390 	ASSERT(user->u_refcnt);
391 	user->u_refcnt--;
392 	switch (user->u_state) {
393 	case SMB_USER_STATE_LOGGED_OFF:
394 		if (user->u_refcnt == 0) {
395 			mutex_exit(&user->u_mutex);
396 			smb_user_delete(user);
397 			return;
398 		}
399 		break;
400 
401 	case SMB_USER_STATE_LOGGED_IN:
402 	case SMB_USER_STATE_LOGGING_OFF:
403 		break;
404 
405 	default:
406 		ASSERT(0);
407 		break;
408 	}
409 	mutex_exit(&user->u_mutex);
410 }
411 
412 /*
413  * smb_user_lookup_by_uid
414  *
415  * Find the appropriate user for this request. The request credentials
416  * set here may be overridden by the tree credentials. In domain mode,
417  * the user and tree credentials should be the same. In share mode, the
418  * tree credentials (defined in the share definition) should override
419  * the user credentials.
420  */
421 smb_user_t *
422 smb_user_lookup_by_uid(
423     smb_session_t	*session,
424     uint16_t		uid)
425 {
426 	smb_user_t	*user;
427 
428 	ASSERT(session);
429 	ASSERT(session->s_magic == SMB_SESSION_MAGIC);
430 
431 	smb_llist_enter(&session->s_user_list, RW_READER);
432 	user = smb_llist_head(&session->s_user_list);
433 	while (user) {
434 		ASSERT(user->u_magic == SMB_USER_MAGIC);
435 		ASSERT(user->u_session == session);
436 		if (user->u_uid == uid) {
437 			mutex_enter(&user->u_mutex);
438 			switch (user->u_state) {
439 
440 			case SMB_USER_STATE_LOGGED_IN:
441 				/* The user exists and is still logged in. */
442 				user->u_refcnt++;
443 				mutex_exit(&user->u_mutex);
444 				smb_llist_exit(&session->s_user_list);
445 				return (user);
446 
447 			case SMB_USER_STATE_LOGGING_OFF:
448 			case SMB_USER_STATE_LOGGED_OFF:
449 				/*
450 				 * The user exists but has logged off or is in
451 				 * the process of logging off.
452 				 */
453 				mutex_exit(&user->u_mutex);
454 				smb_llist_exit(&session->s_user_list);
455 				return (NULL);
456 
457 			default:
458 				ASSERT(0);
459 				mutex_exit(&user->u_mutex);
460 				smb_llist_exit(&session->s_user_list);
461 				return (NULL);
462 			}
463 		}
464 		user = smb_llist_next(&session->s_user_list, user);
465 	}
466 	smb_llist_exit(&session->s_user_list);
467 	return (NULL);
468 }
469 
470 /*
471  * smb_user_lookup_by_state
472  *
473  * This function returns the first user in the logged in state. If the user
474  * provided is NULL the search starts from the beginning of the list passed
475  * in. It a user is provided the search starts just after that user.
476  */
477 smb_user_t *
478 smb_user_lookup_by_state(
479     smb_session_t	*session,
480     smb_user_t		*user)
481 {
482 	smb_llist_t	*lst;
483 	smb_user_t	*next;
484 
485 	ASSERT(session);
486 	ASSERT(session->s_magic == SMB_SESSION_MAGIC);
487 
488 	lst = &session->s_user_list;
489 
490 	smb_llist_enter(lst, RW_READER);
491 	if (user) {
492 		ASSERT(user);
493 		ASSERT(user->u_magic == SMB_USER_MAGIC);
494 		ASSERT(user->u_refcnt);
495 		next = smb_llist_next(lst, user);
496 	} else {
497 		next = smb_llist_head(lst);
498 	}
499 	while (next) {
500 		ASSERT(next->u_magic == SMB_USER_MAGIC);
501 		ASSERT(next->u_session == session);
502 		mutex_enter(&next->u_mutex);
503 		if (next->u_state == SMB_USER_STATE_LOGGED_IN) {
504 			next->u_refcnt++;
505 			mutex_exit(&next->u_mutex);
506 			break;
507 		} else {
508 			ASSERT((next->u_state == SMB_USER_STATE_LOGGING_OFF) ||
509 			    (next->u_state == SMB_USER_STATE_LOGGED_OFF));
510 			mutex_exit(&next->u_mutex);
511 			next = smb_llist_next(lst, next);
512 		}
513 	}
514 	smb_llist_exit(lst);
515 
516 	return (next);
517 }
518 
519 /*
520  * Find a tree by tree-id.
521  */
522 smb_tree_t *
523 smb_user_lookup_tree(
524     smb_user_t		*user,
525     uint16_t		tid)
526 
527 {
528 	smb_tree_t	*tree;
529 
530 	ASSERT(user);
531 	ASSERT(user->u_magic == SMB_USER_MAGIC);
532 
533 	smb_llist_enter(&user->u_tree_list, RW_READER);
534 	tree = smb_llist_head(&user->u_tree_list);
535 
536 	while (tree) {
537 		ASSERT(tree->t_magic == SMB_TREE_MAGIC);
538 		ASSERT(tree->t_user == user);
539 
540 		if (tree->t_tid == tid) {
541 			if (smb_tree_hold(tree)) {
542 				smb_llist_exit(&user->u_tree_list);
543 				return (tree);
544 			} else {
545 				smb_llist_exit(&user->u_tree_list);
546 				return (NULL);
547 			}
548 		}
549 
550 		tree = smb_llist_next(&user->u_tree_list, tree);
551 	}
552 
553 	smb_llist_exit(&user->u_tree_list);
554 	return (NULL);
555 }
556 
557 /*
558  * Find the first connected tree that matches the specified sharename.
559  * If the specified tree is NULL the search starts from the beginning of
560  * the user's tree list.  If a tree is provided the search starts just
561  * after that tree.
562  */
563 smb_tree_t *
564 smb_user_lookup_share(
565     smb_user_t		*user,
566     const char		*sharename,
567     smb_tree_t		*tree)
568 {
569 	ASSERT(user);
570 	ASSERT(user->u_magic == SMB_USER_MAGIC);
571 	ASSERT(sharename);
572 
573 	smb_llist_enter(&user->u_tree_list, RW_READER);
574 
575 	if (tree) {
576 		ASSERT(tree->t_magic == SMB_TREE_MAGIC);
577 		ASSERT(tree->t_user == user);
578 		tree = smb_llist_next(&user->u_tree_list, tree);
579 	} else {
580 		tree = smb_llist_head(&user->u_tree_list);
581 	}
582 
583 	while (tree) {
584 		ASSERT(tree->t_magic == SMB_TREE_MAGIC);
585 		ASSERT(tree->t_user == user);
586 		if (utf8_strcasecmp(tree->t_sharename, sharename) == 0) {
587 			if (smb_tree_hold(tree)) {
588 				smb_llist_exit(&user->u_tree_list);
589 				return (tree);
590 			}
591 		}
592 		tree = smb_llist_next(&user->u_tree_list, tree);
593 	}
594 
595 	smb_llist_exit(&user->u_tree_list);
596 	return (NULL);
597 }
598 
599 /*
600  * Find the first connected tree that matches the specified volume name.
601  * If the specified tree is NULL the search starts from the beginning of
602  * the user's tree list.  If a tree is provided the search starts just
603  * after that tree.
604  */
605 smb_tree_t *
606 smb_user_lookup_volume(
607     smb_user_t		*user,
608     const char		*name,
609     smb_tree_t		*tree)
610 {
611 	ASSERT(user);
612 	ASSERT(user->u_magic == SMB_USER_MAGIC);
613 	ASSERT(name);
614 
615 	smb_llist_enter(&user->u_tree_list, RW_READER);
616 
617 	if (tree) {
618 		ASSERT(tree->t_magic == SMB_TREE_MAGIC);
619 		ASSERT(tree->t_user == user);
620 		tree = smb_llist_next(&user->u_tree_list, tree);
621 	} else {
622 		tree = smb_llist_head(&user->u_tree_list);
623 	}
624 
625 	while (tree) {
626 		ASSERT(tree->t_magic == SMB_TREE_MAGIC);
627 		ASSERT(tree->t_user == user);
628 
629 		if (utf8_strcasecmp(tree->t_volume, name) == 0) {
630 			if (smb_tree_hold(tree)) {
631 				smb_llist_exit(&user->u_tree_list);
632 				return (tree);
633 			}
634 		}
635 
636 		tree = smb_llist_next(&user->u_tree_list, tree);
637 	}
638 
639 	smb_llist_exit(&user->u_tree_list);
640 	return (NULL);
641 }
642 
643 /*
644  * Disconnect all trees that match the specified client process-id.
645  */
646 void
647 smb_user_close_pid(
648     smb_user_t		*user,
649     uint16_t		pid)
650 {
651 	smb_tree_t	*tree;
652 
653 	ASSERT(user);
654 	ASSERT(user->u_magic == SMB_USER_MAGIC);
655 
656 	tree = smb_user_get_tree(&user->u_tree_list, NULL);
657 	while (tree) {
658 		smb_tree_t *next;
659 		ASSERT(tree->t_user == user);
660 		smb_tree_close_pid(tree, pid);
661 		next = smb_user_get_tree(&user->u_tree_list, tree);
662 		smb_tree_release(tree);
663 		tree = next;
664 	}
665 }
666 
667 /*
668  * Disconnect all trees that this user has connected.
669  */
670 void
671 smb_user_disconnect_trees(
672     smb_user_t		*user)
673 {
674 	smb_tree_t	*tree;
675 
676 	ASSERT(user);
677 	ASSERT(user->u_magic == SMB_USER_MAGIC);
678 
679 	tree = smb_user_get_tree(&user->u_tree_list, NULL);
680 	while (tree) {
681 		ASSERT(tree->t_user == user);
682 		smb_tree_disconnect(tree, B_TRUE);
683 		smb_tree_release(tree);
684 		tree = smb_user_get_tree(&user->u_tree_list, NULL);
685 	}
686 }
687 
688 /*
689  * Disconnect all trees that match the specified share name.
690  */
691 void
692 smb_user_disconnect_share(
693     smb_user_t		*user,
694     const char		*sharename)
695 {
696 	smb_tree_t	*tree;
697 	smb_tree_t	*next;
698 
699 	ASSERT(user);
700 	ASSERT(user->u_magic == SMB_USER_MAGIC);
701 	ASSERT(user->u_refcnt);
702 
703 	tree = smb_user_lookup_share(user, sharename, NULL);
704 	while (tree) {
705 		ASSERT(tree->t_magic == SMB_TREE_MAGIC);
706 		smb_session_cancel_requests(user->u_session, tree, NULL);
707 		smb_tree_disconnect(tree, B_TRUE);
708 		next = smb_user_lookup_share(user, sharename, tree);
709 		smb_tree_release(tree);
710 		tree = next;
711 	}
712 }
713 
714 /*
715  * Determine whether or not the user is an administrator.
716  * Members of the administrators group have administrative rights.
717  */
718 boolean_t
719 smb_user_is_admin(
720     smb_user_t		*user)
721 {
722 	cred_t		*u_cred;
723 
724 	ASSERT(user);
725 	u_cred = user->u_cred;
726 	ASSERT(u_cred);
727 
728 	if (smb_admins_sid == NULL)
729 		return (B_FALSE);
730 
731 	if (smb_cred_is_member(u_cred, smb_admins_sid))
732 		return (B_TRUE);
733 
734 	return (B_FALSE);
735 }
736 
737 /* *************************** Static Functions ***************************** */
738 
739 /*
740  * smb_user_delete
741  */
742 static void
743 smb_user_delete(
744     smb_user_t		*user)
745 {
746 	smb_session_t	*session;
747 
748 	ASSERT(user);
749 	ASSERT(user->u_magic == SMB_USER_MAGIC);
750 	ASSERT(user->u_refcnt == 0);
751 	ASSERT(user->u_state == SMB_USER_STATE_LOGGED_OFF);
752 
753 	session = user->u_session;
754 	/*
755 	 * Let's remove the user from the list of users of the session. This
756 	 * has to be done before any resources associated with the user are
757 	 * deleted.
758 	 */
759 	smb_llist_enter(&session->s_user_list, RW_WRITER);
760 	smb_llist_remove(&session->s_user_list, user);
761 	smb_llist_exit(&session->s_user_list);
762 
763 	user->u_magic = (uint32_t)~SMB_USER_MAGIC;
764 	mutex_destroy(&user->u_mutex);
765 	smb_llist_destructor(&user->u_tree_list);
766 	smb_idpool_destructor(&user->u_tid_pool);
767 	smb_idpool_free(&session->s_uid_pool, user->u_uid);
768 	crfree(user->u_cred);
769 	if (user->u_privcred)
770 		crfree(user->u_privcred);
771 	kmem_free(user->u_name, (size_t)user->u_name_len);
772 	kmem_free(user->u_domain, (size_t)user->u_domain_len);
773 	kmem_cache_free(user->u_server->si_cache_user, user);
774 }
775 
776 /*
777  * Get the next connected tree in the list.  A reference is taken on
778  * the tree, which can be released later with smb_tree_release().
779  *
780  * If the specified tree is NULL the search starts from the beginning of
781  * the tree list.  If a tree is provided the search starts just after
782  * that tree.
783  *
784  * Returns NULL if there are no connected trees in the list.
785  */
786 static smb_tree_t *
787 smb_user_get_tree(
788     smb_llist_t		*tree_list,
789     smb_tree_t		*tree)
790 {
791 	ASSERT(tree_list);
792 
793 	smb_llist_enter(tree_list, RW_READER);
794 
795 	if (tree) {
796 		ASSERT(tree->t_magic == SMB_TREE_MAGIC);
797 		tree = smb_llist_next(tree_list, tree);
798 	} else {
799 		tree = smb_llist_head(tree_list);
800 	}
801 
802 	while (tree) {
803 		if (smb_tree_hold(tree))
804 			break;
805 
806 		tree = smb_llist_next(tree_list, tree);
807 	}
808 
809 	smb_llist_exit(tree_list);
810 	return (tree);
811 }
812 
813 cred_t *
814 smb_user_getcred(smb_user_t *user)
815 {
816 	return (user->u_cred);
817 }
818 
819 cred_t *
820 smb_user_getprivcred(smb_user_t *user)
821 {
822 	return ((user->u_privcred)? user->u_privcred : user->u_cred);
823 }
824