xref: /titanic_52/usr/src/uts/common/fs/smbsrv/smb_close.c (revision b6c3f7863936abeae522e48a13887dddeb691a45)
1 /*
2  * CDDL HEADER START
3  *
4  * The contents of this file are subject to the terms of the
5  * Common Development and Distribution License (the "License").
6  * You may not use this file except in compliance with the License.
7  *
8  * You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE
9  * or http://www.opensolaris.org/os/licensing.
10  * See the License for the specific language governing permissions
11  * and limitations under the License.
12  *
13  * When distributing Covered Code, include this CDDL HEADER in each
14  * file and include the License file at usr/src/OPENSOLARIS.LICENSE.
15  * If applicable, add the following below this CDDL HEADER, with the
16  * fields enclosed by brackets "[]" replaced with your own identifying
17  * information: Portions Copyright [yyyy] [name of copyright owner]
18  *
19  * CDDL HEADER END
20  */
21 /*
22  * Copyright 2008 Sun Microsystems, Inc.  All rights reserved.
23  * Use is subject to license terms.
24  */
25 
26 #pragma ident	"%Z%%M%	%I%	%E% SMI"
27 
28 #include <smbsrv/smb_incl.h>
29 
30 
31 /*
32  * Close a file by fid.  All locks or other resources held by the
33  * requesting process on the file should be released by the server.
34  * The requesting process can no longer use the fid for further
35  * file access requests.
36  *
37  * If LastWriteTime is non-zero, it should be used to set the file
38  * timestamp.  Otherwise, file system should set the timestamp.
39  * Failure to set the timestamp, even if requested by the client,
40  * should not result in an error response from the server.
41  */
42 smb_sdrc_t
43 smb_com_close(struct smb_request *sr)
44 {
45 	uint32_t last_wtime;
46 	int rc = 0;
47 
48 	rc = smbsr_decode_vwv(sr, "wl", &sr->smb_fid, &last_wtime);
49 	if (rc != 0)
50 		return (SDRC_ERROR_REPLY);
51 
52 	sr->fid_ofile = smb_ofile_lookup_by_fid(sr->tid_tree, sr->smb_fid);
53 	if (sr->fid_ofile == NULL) {
54 		smbsr_error(sr, NT_STATUS_INVALID_HANDLE, ERRDOS, ERRbadfid);
55 		return (SDRC_ERROR_REPLY);
56 	}
57 
58 	rc = smb_common_close(sr, last_wtime);
59 	if (rc) {
60 		smbsr_errno(sr, rc);
61 		return (SDRC_ERROR_REPLY);
62 	}
63 
64 	rc = smbsr_encode_empty_result(sr);
65 	return ((rc == 0) ? SDRC_NORMAL_REPLY : SDRC_ERROR_REPLY);
66 }
67 
68 /*
69  * Close the file represented by fid and then disconnect the
70  * associated tree.
71  */
72 smb_sdrc_t
73 smb_com_close_and_tree_disconnect(struct smb_request *sr)
74 {
75 	uint32_t last_wtime;
76 	int rc = 0;
77 
78 	rc = smbsr_decode_vwv(sr, "wl", &sr->smb_fid, &last_wtime);
79 	if (rc != 0)
80 		return (SDRC_ERROR_REPLY);
81 
82 	sr->fid_ofile = smb_ofile_lookup_by_fid(sr->tid_tree, sr->smb_fid);
83 	if (sr->fid_ofile == NULL) {
84 		smbsr_error(sr, NT_STATUS_INVALID_HANDLE, ERRDOS, ERRbadfid);
85 		return (SDRC_ERROR_REPLY);
86 	}
87 
88 	rc = smb_common_close(sr, last_wtime);
89 	smbsr_rq_notify(sr, sr->session, sr->tid_tree);
90 	smb_tree_disconnect(sr->tid_tree);
91 
92 	if (rc) {
93 		smbsr_errno(sr, rc);
94 		return (SDRC_ERROR_REPLY);
95 	}
96 
97 	rc = smbsr_encode_empty_result(sr);
98 	return ((rc == 0) ? SDRC_NORMAL_REPLY : SDRC_ERROR_REPLY);
99 }
100 
101 /*
102  * smb_common_close
103  *
104  * Common close function called by SmbClose, SmbWriteAndClose,
105  * and SMBCloseAndTreeDisconnect.
106  */
107 int
108 smb_common_close(struct smb_request *sr, uint32_t last_wtime)
109 {
110 	return (smb_ofile_close(sr->fid_ofile, last_wtime));
111 }
112 
113 /*
114  * smb_commit_delete_on_close()
115  *
116  * Check for the DeleteOnClose flag on the smb file and set it on the
117  * smb node if it is not already set. This will inhibit subsequent
118  * open requests. The delete-on-close credentials should be set to the
119  * user credentials of the current open file instance.
120  *
121  * When DeleteOnClose is set on an smb_node, the common open code will
122  * reject subsequent open requests for the file. Observation of Windows
123  * 2000 indicates that subsequent opens should be allowed (assuming
124  * there would be no sharing violation) until the file is closed using
125  * the fid on which the DeleteOnClose was requested.
126  *
127  * If there are multiple opens with delete-on-close create options,
128  * whichever the first file handle is closed will trigger the node to be
129  * marked as delete-on-close. The credentials of that ofile will be used
130  * as the delete-on-close credentials of the node.
131  */
132 void
133 smb_commit_delete_on_close(struct smb_ofile *ofile)
134 {
135 	struct smb_node *node = ofile->f_node;
136 
137 	if (!(node->flags & NODE_FLAGS_DELETE_ON_CLOSE) &&
138 	    (ofile->f_flags & SMB_OFLAGS_SET_DELETE_ON_CLOSE))	{
139 		node->flags |= NODE_FLAGS_DELETE_ON_CLOSE;
140 		crhold(node->delete_on_close_cred = ofile->f_cr);
141 	}
142 }
143