xref: /titanic_52/usr/src/uts/common/fs/smbsrv/smb_ofile.c (revision c0e7977a434048a8bc7386ea0e8befaa77a646cf)
1 /*
2  * CDDL HEADER START
3  *
4  * The contents of this file are subject to the terms of the
5  * Common Development and Distribution License (the "License").
6  * You may not use this file except in compliance with the License.
7  *
8  * You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE
9  * or http://www.opensolaris.org/os/licensing.
10  * See the License for the specific language governing permissions
11  * and limitations under the License.
12  *
13  * When distributing Covered Code, include this CDDL HEADER in each
14  * file and include the License file at usr/src/OPENSOLARIS.LICENSE.
15  * If applicable, add the following below this CDDL HEADER, with the
16  * fields enclosed by brackets "[]" replaced with your own identifying
17  * information: Portions Copyright [yyyy] [name of copyright owner]
18  *
19  * CDDL HEADER END
20  */
21 /*
22  * Copyright (c) 2007, 2010, Oracle and/or its affiliates. All rights reserved.
23  * Copyright 2012 Nexenta Systems, Inc.  All rights reserved.
24  */
25 
26 /*
27  * General Structures Layout
28  * -------------------------
29  *
30  * This is a simplified diagram showing the relationship between most of the
31  * main structures.
32  *
33  * +-------------------+
34  * |     SMB_INFO      |
35  * +-------------------+
36  *          |
37  *          |
38  *          v
39  * +-------------------+       +-------------------+      +-------------------+
40  * |     SESSION       |<----->|     SESSION       |......|      SESSION      |
41  * +-------------------+       +-------------------+      +-------------------+
42  *          |
43  *          |
44  *          v
45  * +-------------------+       +-------------------+      +-------------------+
46  * |       USER        |<----->|       USER        |......|       USER        |
47  * +-------------------+       +-------------------+      +-------------------+
48  *          |
49  *          |
50  *          v
51  * +-------------------+       +-------------------+      +-------------------+
52  * |       TREE        |<----->|       TREE        |......|       TREE        |
53  * +-------------------+       +-------------------+      +-------------------+
54  *      |         |
55  *      |         |
56  *      |         v
57  *      |     +-------+       +-------+      +-------+
58  *      |     | OFILE |<----->| OFILE |......| OFILE |
59  *      |     +-------+       +-------+      +-------+
60  *      |
61  *      |
62  *      v
63  *  +-------+       +------+      +------+
64  *  | ODIR  |<----->| ODIR |......| ODIR |
65  *  +-------+       +------+      +------+
66  *
67  *
68  * Ofile State Machine
69  * ------------------
70  *
71  *    +-------------------------+	 T0
72  *    |  SMB_OFILE_STATE_OPEN   |<----------- Creation/Allocation
73  *    +-------------------------+
74  *		    |
75  *		    | T1
76  *		    |
77  *		    v
78  *    +-------------------------+
79  *    | SMB_OFILE_STATE_CLOSING |
80  *    +-------------------------+
81  *		    |
82  *		    | T2
83  *		    |
84  *		    v
85  *    +-------------------------+    T3
86  *    | SMB_OFILE_STATE_CLOSED  |----------> Deletion/Free
87  *    +-------------------------+
88  *
89  * SMB_OFILE_STATE_OPEN
90  *
91  *    While in this state:
92  *      - The ofile is queued in the list of ofiles of its tree.
93  *      - References will be given out if the ofile is looked up.
94  *
95  * SMB_OFILE_STATE_CLOSING
96  *
97  *    While in this state:
98  *      - The ofile is queued in the list of ofiles of its tree.
99  *      - References will not be given out if the ofile is looked up.
100  *      - The file is closed and the locks held are being released.
101  *      - The resources associated with the ofile remain.
102  *
103  * SMB_OFILE_STATE_CLOSED
104  *
105  *    While in this state:
106  *      - The ofile is queued in the list of ofiles of its tree.
107  *      - References will not be given out if the ofile is looked up.
108  *      - The resources associated with the ofile remain.
109  *
110  * Transition T0
111  *
112  *    This transition occurs in smb_ofile_open(). A new ofile is created and
113  *    added to the list of ofiles of a tree.
114  *
115  * Transition T1
116  *
117  *    This transition occurs in smb_ofile_close().
118  *
119  * Transition T2
120  *
121  *    This transition occurs in smb_ofile_release(). The resources associated
122  *    with the ofile are freed as well as the ofile structure. For the
123  *    transition to occur, the ofile must be in the SMB_OFILE_STATE_CLOSED
124  *    state and the reference count be zero.
125  *
126  * Comments
127  * --------
128  *
129  *    The state machine of the ofile structures is controlled by 3 elements:
130  *      - The list of ofiles of the tree it belongs to.
131  *      - The mutex embedded in the structure itself.
132  *      - The reference count.
133  *
134  *    There's a mutex embedded in the ofile structure used to protect its fields
135  *    and there's a lock embedded in the list of ofiles of a tree. To
136  *    increment or to decrement the reference count the mutex must be entered.
137  *    To insert the ofile into the list of ofiles of the tree and to remove
138  *    the ofile from it, the lock must be entered in RW_WRITER mode.
139  *
140  *    Rules of access to a ofile structure:
141  *
142  *    1) In order to avoid deadlocks, when both (mutex and lock of the ofile
143  *       list) have to be entered, the lock must be entered first.
144  *
145  *    2) All actions applied to an ofile require a reference count.
146  *
147  *    3) There are 2 ways of getting a reference count. One is when the ofile
148  *       is opened. The other one when the ofile is looked up. This translates
149  *       into 2 functions: smb_ofile_open() and smb_ofile_lookup_by_fid().
150  *
151  *    It should be noted that the reference count of an ofile registers the
152  *    number of references to the ofile in other structures (such as an smb
153  *    request). The reference count is not incremented in these 2 instances:
154  *
155  *    1) The ofile is open. An ofile is anchored by his state. If there's
156  *       no activity involving an ofile currently open, the reference count
157  *       of that ofile is zero.
158  *
159  *    2) The ofile is queued in the list of ofiles of its tree. The fact of
160  *       being queued in that list is NOT registered by incrementing the
161  *       reference count.
162  */
163 #include <smbsrv/smb_kproto.h>
164 #include <smbsrv/smb_fsops.h>
165 
166 static boolean_t smb_ofile_is_open_locked(smb_ofile_t *);
167 static smb_ofile_t *smb_ofile_close_and_next(smb_ofile_t *);
168 static void smb_ofile_set_close_attrs(smb_ofile_t *, uint32_t);
169 static int smb_ofile_netinfo_encode(smb_ofile_t *, uint8_t *, size_t,
170     uint32_t *);
171 static int smb_ofile_netinfo_init(smb_ofile_t *, smb_netfileinfo_t *);
172 static void smb_ofile_netinfo_fini(smb_netfileinfo_t *);
173 
174 /*
175  * smb_ofile_open
176  */
177 smb_ofile_t *
178 smb_ofile_open(
179     smb_tree_t		*tree,
180     smb_node_t		*node,
181     uint16_t		pid,
182     struct open_param	*op,
183     uint16_t		ftype,
184     uint32_t		uniqid,
185     smb_error_t		*err)
186 {
187 	smb_ofile_t	*of;
188 	uint16_t	fid;
189 	smb_attr_t	attr;
190 
191 	if (smb_idpool_alloc(&tree->t_fid_pool, &fid)) {
192 		err->status = NT_STATUS_TOO_MANY_OPENED_FILES;
193 		err->errcls = ERRDOS;
194 		err->errcode = ERROR_TOO_MANY_OPEN_FILES;
195 		return (NULL);
196 	}
197 
198 	of = kmem_cache_alloc(tree->t_server->si_cache_ofile, KM_SLEEP);
199 	bzero(of, sizeof (smb_ofile_t));
200 	of->f_magic = SMB_OFILE_MAGIC;
201 	of->f_refcnt = 1;
202 	of->f_fid = fid;
203 	of->f_uniqid = uniqid;
204 	of->f_opened_by_pid = pid;
205 	of->f_granted_access = op->desired_access;
206 	of->f_share_access = op->share_access;
207 	of->f_create_options = op->create_options;
208 	of->f_cr = (op->create_options & FILE_OPEN_FOR_BACKUP_INTENT) ?
209 	    smb_user_getprivcred(tree->t_user) : tree->t_user->u_cred;
210 	crhold(of->f_cr);
211 	of->f_ftype = ftype;
212 	of->f_server = tree->t_server;
213 	of->f_session = tree->t_user->u_session;
214 	of->f_user = tree->t_user;
215 	of->f_tree = tree;
216 	of->f_node = node;
217 	of->f_explicit_times = 0;
218 	mutex_init(&of->f_mutex, NULL, MUTEX_DEFAULT, NULL);
219 	of->f_state = SMB_OFILE_STATE_OPEN;
220 
221 	if (ftype == SMB_FTYPE_MESG_PIPE) {
222 		of->f_pipe = smb_opipe_alloc(tree->t_server);
223 		smb_server_inc_pipes(of->f_server);
224 	} else {
225 		ASSERT(ftype == SMB_FTYPE_DISK); /* Regular file, not a pipe */
226 		ASSERT(node);
227 
228 		if (of->f_granted_access == FILE_EXECUTE)
229 			of->f_flags |= SMB_OFLAGS_EXECONLY;
230 
231 		bzero(&attr, sizeof (smb_attr_t));
232 		attr.sa_mask |= SMB_AT_UID;
233 		if (smb_fsop_getattr(NULL, kcred, node, &attr) != 0) {
234 			of->f_magic = 0;
235 			mutex_destroy(&of->f_mutex);
236 			crfree(of->f_cr);
237 			smb_idpool_free(&tree->t_fid_pool, of->f_fid);
238 			kmem_cache_free(tree->t_server->si_cache_ofile, of);
239 			err->status = NT_STATUS_INTERNAL_ERROR;
240 			err->errcls = ERRDOS;
241 			err->errcode = ERROR_INTERNAL_ERROR;
242 			return (NULL);
243 		}
244 		if (crgetuid(of->f_cr) == attr.sa_vattr.va_uid) {
245 			/*
246 			 * Add this bit for the file's owner even if it's not
247 			 * specified in the request (Windows behavior).
248 			 */
249 			of->f_granted_access |= FILE_READ_ATTRIBUTES;
250 		}
251 
252 		if (smb_node_is_file(node)) {
253 			of->f_mode =
254 			    smb_fsop_amask_to_omode(of->f_granted_access);
255 			if (smb_fsop_open(node, of->f_mode, of->f_cr) != 0) {
256 				of->f_magic = 0;
257 				mutex_destroy(&of->f_mutex);
258 				crfree(of->f_cr);
259 				smb_idpool_free(&tree->t_fid_pool, of->f_fid);
260 				kmem_cache_free(tree->t_server->si_cache_ofile,
261 				    of);
262 				err->status = NT_STATUS_ACCESS_DENIED;
263 				err->errcls = ERRDOS;
264 				err->errcode = ERROR_ACCESS_DENIED;
265 				return (NULL);
266 			}
267 		}
268 
269 		if (tree->t_flags & SMB_TREE_READONLY)
270 			of->f_flags |= SMB_OFLAGS_READONLY;
271 
272 		if (op->created_readonly)
273 			node->readonly_creator = of;
274 
275 		smb_node_inc_open_ofiles(node);
276 		smb_node_add_ofile(node, of);
277 		smb_node_ref(node);
278 		smb_server_inc_files(of->f_server);
279 	}
280 	smb_llist_enter(&tree->t_ofile_list, RW_WRITER);
281 	smb_llist_insert_tail(&tree->t_ofile_list, of);
282 	smb_llist_exit(&tree->t_ofile_list);
283 	atomic_inc_32(&tree->t_open_files);
284 	atomic_inc_32(&of->f_session->s_file_cnt);
285 	return (of);
286 }
287 
288 /*
289  * smb_ofile_close
290  */
291 void
292 smb_ofile_close(smb_ofile_t *of, uint32_t last_wtime)
293 {
294 	ASSERT(of);
295 	ASSERT(of->f_magic == SMB_OFILE_MAGIC);
296 	uint32_t flags = 0;
297 
298 	mutex_enter(&of->f_mutex);
299 	ASSERT(of->f_refcnt);
300 	switch (of->f_state) {
301 	case SMB_OFILE_STATE_OPEN: {
302 
303 		of->f_state = SMB_OFILE_STATE_CLOSING;
304 		mutex_exit(&of->f_mutex);
305 
306 		if (of->f_ftype == SMB_FTYPE_MESG_PIPE) {
307 			smb_opipe_close(of);
308 			smb_server_dec_pipes(of->f_server);
309 		} else {
310 			smb_ofile_set_close_attrs(of, last_wtime);
311 
312 			if (of->f_flags & SMB_OFLAGS_SET_DELETE_ON_CLOSE) {
313 				if (smb_tree_has_feature(of->f_tree,
314 				    SMB_TREE_CATIA)) {
315 					flags |= SMB_CATIA;
316 				}
317 				(void) smb_node_set_delete_on_close(of->f_node,
318 				    of->f_cr, flags);
319 			}
320 			smb_fsop_unshrlock(of->f_cr, of->f_node, of->f_uniqid);
321 			smb_node_destroy_lock_by_ofile(of->f_node, of);
322 
323 			if (smb_node_is_file(of->f_node))
324 				(void) smb_fsop_close(of->f_node, of->f_mode,
325 				    of->f_cr);
326 
327 			/*
328 			 * Cancel any notify change requests that
329 			 * may be using this open instance.
330 			 */
331 			if (of->f_node->n_fcn.fcn_count)
332 				smb_notify_file_closed(of);
333 			smb_server_dec_files(of->f_server);
334 		}
335 		atomic_dec_32(&of->f_tree->t_open_files);
336 
337 		mutex_enter(&of->f_mutex);
338 		ASSERT(of->f_refcnt);
339 		ASSERT(of->f_state == SMB_OFILE_STATE_CLOSING);
340 		of->f_state = SMB_OFILE_STATE_CLOSED;
341 		if (of->f_node != NULL) {
342 			smb_node_dec_open_ofiles(of->f_node);
343 			smb_oplock_release(of->f_node, of);
344 		}
345 		break;
346 	}
347 	case SMB_OFILE_STATE_CLOSED:
348 	case SMB_OFILE_STATE_CLOSING:
349 		break;
350 
351 	default:
352 		ASSERT(0);
353 		break;
354 	}
355 	mutex_exit(&of->f_mutex);
356 }
357 
358 /*
359  * smb_ofile_close_all
360  *
361  *
362  */
363 void
364 smb_ofile_close_all(
365     smb_tree_t		*tree)
366 {
367 	smb_ofile_t	*of;
368 
369 	ASSERT(tree);
370 	ASSERT(tree->t_magic == SMB_TREE_MAGIC);
371 
372 	smb_llist_enter(&tree->t_ofile_list, RW_READER);
373 	of = smb_llist_head(&tree->t_ofile_list);
374 	while (of) {
375 		ASSERT(of->f_magic == SMB_OFILE_MAGIC);
376 		ASSERT(of->f_tree == tree);
377 		of = smb_ofile_close_and_next(of);
378 	}
379 	smb_llist_exit(&tree->t_ofile_list);
380 }
381 
382 /*
383  * smb_ofiles_close_by_pid
384  *
385  *
386  */
387 void
388 smb_ofile_close_all_by_pid(
389     smb_tree_t		*tree,
390     uint16_t		pid)
391 {
392 	smb_ofile_t	*of;
393 
394 	ASSERT(tree);
395 	ASSERT(tree->t_magic == SMB_TREE_MAGIC);
396 
397 	smb_llist_enter(&tree->t_ofile_list, RW_READER);
398 	of = smb_llist_head(&tree->t_ofile_list);
399 	while (of) {
400 		ASSERT(of->f_magic == SMB_OFILE_MAGIC);
401 		ASSERT(of->f_tree == tree);
402 		if (of->f_opened_by_pid == pid) {
403 			of = smb_ofile_close_and_next(of);
404 		} else {
405 			of = smb_llist_next(&tree->t_ofile_list, of);
406 		}
407 	}
408 	smb_llist_exit(&tree->t_ofile_list);
409 }
410 
411 /*
412  * If the enumeration request is for ofile data, handle it here.
413  * Otherwise, return.
414  *
415  * This function should be called with a hold on the ofile.
416  */
417 int
418 smb_ofile_enum(smb_ofile_t *of, smb_svcenum_t *svcenum)
419 {
420 	uint8_t *pb;
421 	uint_t nbytes;
422 	int rc;
423 
424 	ASSERT(of);
425 	ASSERT(of->f_magic == SMB_OFILE_MAGIC);
426 	ASSERT(of->f_refcnt);
427 
428 	if (svcenum->se_type != SMB_SVCENUM_TYPE_FILE)
429 		return (0);
430 
431 	if (svcenum->se_nskip > 0) {
432 		svcenum->se_nskip--;
433 		return (0);
434 	}
435 
436 	if (svcenum->se_nitems >= svcenum->se_nlimit) {
437 		svcenum->se_nitems = svcenum->se_nlimit;
438 		return (0);
439 	}
440 
441 	pb = &svcenum->se_buf[svcenum->se_bused];
442 
443 	rc = smb_ofile_netinfo_encode(of, pb, svcenum->se_bavail,
444 	    &nbytes);
445 	if (rc == 0) {
446 		svcenum->se_bavail -= nbytes;
447 		svcenum->se_bused += nbytes;
448 		svcenum->se_nitems++;
449 	}
450 
451 	return (rc);
452 }
453 
454 /*
455  * Take a reference on an open file.
456  */
457 boolean_t
458 smb_ofile_hold(smb_ofile_t *of)
459 {
460 	ASSERT(of);
461 	ASSERT(of->f_magic == SMB_OFILE_MAGIC);
462 
463 	mutex_enter(&of->f_mutex);
464 
465 	if (smb_ofile_is_open_locked(of)) {
466 		of->f_refcnt++;
467 		mutex_exit(&of->f_mutex);
468 		return (B_TRUE);
469 	}
470 
471 	mutex_exit(&of->f_mutex);
472 	return (B_FALSE);
473 }
474 
475 /*
476  * Release a reference on a file.  If the reference count falls to
477  * zero and the file has been closed, post the object for deletion.
478  * Object deletion is deferred to avoid modifying a list while an
479  * iteration may be in progress.
480  */
481 void
482 smb_ofile_release(smb_ofile_t *of)
483 {
484 	SMB_OFILE_VALID(of);
485 
486 	mutex_enter(&of->f_mutex);
487 	ASSERT(of->f_refcnt);
488 	of->f_refcnt--;
489 	switch (of->f_state) {
490 	case SMB_OFILE_STATE_OPEN:
491 	case SMB_OFILE_STATE_CLOSING:
492 		break;
493 
494 	case SMB_OFILE_STATE_CLOSED:
495 		if (of->f_refcnt == 0)
496 			smb_tree_post_ofile(of->f_tree, of);
497 		break;
498 
499 	default:
500 		ASSERT(0);
501 		break;
502 	}
503 	mutex_exit(&of->f_mutex);
504 }
505 
506 /*
507  * smb_ofile_request_complete
508  *
509  * During oplock acquisition, all other oplock requests on the node
510  * are blocked until the acquire request completes and the response
511  * is on the wire.
512  * Call smb_oplock_broadcast to notify the node that the request
513  * has completed.
514  *
515  * THIS MECHANISM RELIES ON THE FACT THAT THE OFILE IS NOT REMOVED
516  * FROM THE SR UNTIL REQUEST COMPLETION (when the sr is destroyed)
517  */
518 void
519 smb_ofile_request_complete(smb_ofile_t *of)
520 {
521 	SMB_OFILE_VALID(of);
522 
523 	switch (of->f_ftype) {
524 	case SMB_FTYPE_DISK:
525 		ASSERT(of->f_node);
526 		smb_oplock_broadcast(of->f_node);
527 		break;
528 	case SMB_FTYPE_MESG_PIPE:
529 		break;
530 	default:
531 		break;
532 	}
533 }
534 
535 /*
536  * smb_ofile_lookup_by_fid
537  *
538  * Find the open file whose fid matches the one specified in the request.
539  * If we can't find the fid or the shares (trees) don't match, we have a
540  * bad fid.
541  */
542 smb_ofile_t *
543 smb_ofile_lookup_by_fid(
544     smb_tree_t		*tree,
545     uint16_t		fid)
546 {
547 	smb_llist_t	*of_list;
548 	smb_ofile_t	*of;
549 
550 	ASSERT(tree->t_magic == SMB_TREE_MAGIC);
551 
552 	of_list = &tree->t_ofile_list;
553 
554 	smb_llist_enter(of_list, RW_READER);
555 	of = smb_llist_head(of_list);
556 	while (of) {
557 		ASSERT(of->f_magic == SMB_OFILE_MAGIC);
558 		ASSERT(of->f_tree == tree);
559 		if (of->f_fid == fid) {
560 			mutex_enter(&of->f_mutex);
561 			if (of->f_state != SMB_OFILE_STATE_OPEN) {
562 				mutex_exit(&of->f_mutex);
563 				smb_llist_exit(of_list);
564 				return (NULL);
565 			}
566 			of->f_refcnt++;
567 			mutex_exit(&of->f_mutex);
568 			break;
569 		}
570 		of = smb_llist_next(of_list, of);
571 	}
572 	smb_llist_exit(of_list);
573 	return (of);
574 }
575 
576 /*
577  * smb_ofile_lookup_by_uniqid
578  *
579  * Find the open file whose uniqid matches the one specified in the request.
580  */
581 smb_ofile_t *
582 smb_ofile_lookup_by_uniqid(smb_tree_t *tree, uint32_t uniqid)
583 {
584 	smb_llist_t	*of_list;
585 	smb_ofile_t	*of;
586 
587 	ASSERT(tree->t_magic == SMB_TREE_MAGIC);
588 
589 	of_list = &tree->t_ofile_list;
590 	smb_llist_enter(of_list, RW_READER);
591 	of = smb_llist_head(of_list);
592 
593 	while (of) {
594 		ASSERT(of->f_magic == SMB_OFILE_MAGIC);
595 		ASSERT(of->f_tree == tree);
596 
597 		if (of->f_uniqid == uniqid) {
598 			if (smb_ofile_hold(of)) {
599 				smb_llist_exit(of_list);
600 				return (of);
601 			}
602 		}
603 
604 		of = smb_llist_next(of_list, of);
605 	}
606 
607 	smb_llist_exit(of_list);
608 	return (NULL);
609 }
610 
611 /*
612  * Disallow NetFileClose on certain ofiles to avoid side-effects.
613  * Closing a tree root is not allowed: use NetSessionDel or NetShareDel.
614  * Closing SRVSVC connections is not allowed because this NetFileClose
615  * request may depend on this ofile.
616  */
617 boolean_t
618 smb_ofile_disallow_fclose(smb_ofile_t *of)
619 {
620 	ASSERT(of);
621 	ASSERT(of->f_magic == SMB_OFILE_MAGIC);
622 	ASSERT(of->f_refcnt);
623 
624 	switch (of->f_ftype) {
625 	case SMB_FTYPE_DISK:
626 		ASSERT(of->f_tree);
627 		return (of->f_node == of->f_tree->t_snode);
628 
629 	case SMB_FTYPE_MESG_PIPE:
630 		ASSERT(of->f_pipe);
631 		if (smb_strcasecmp(of->f_pipe->p_name, "SRVSVC", 0) == 0)
632 			return (B_TRUE);
633 		break;
634 	default:
635 		break;
636 	}
637 
638 	return (B_FALSE);
639 }
640 
641 /*
642  * smb_ofile_set_flags
643  *
644  * Return value:
645  *
646  *	Current flags value
647  *
648  */
649 void
650 smb_ofile_set_flags(
651     smb_ofile_t		*of,
652     uint32_t		flags)
653 {
654 	ASSERT(of);
655 	ASSERT(of->f_magic == SMB_OFILE_MAGIC);
656 	ASSERT(of->f_refcnt);
657 
658 	mutex_enter(&of->f_mutex);
659 	of->f_flags |= flags;
660 	mutex_exit(&of->f_mutex);
661 }
662 
663 /*
664  * smb_ofile_seek
665  *
666  * Return value:
667  *
668  *	0		Success
669  *	EINVAL		Unknown mode
670  *	EOVERFLOW	offset too big
671  *
672  */
673 int
674 smb_ofile_seek(
675     smb_ofile_t		*of,
676     ushort_t		mode,
677     int32_t		off,
678     uint32_t		*retoff)
679 {
680 	u_offset_t	newoff = 0;
681 	int		rc = 0;
682 	smb_attr_t	attr;
683 
684 	ASSERT(of);
685 	ASSERT(of->f_magic == SMB_OFILE_MAGIC);
686 	ASSERT(of->f_refcnt);
687 
688 	mutex_enter(&of->f_mutex);
689 	switch (mode) {
690 	case SMB_SEEK_SET:
691 		if (off < 0)
692 			newoff = 0;
693 		else
694 			newoff = (u_offset_t)off;
695 		break;
696 
697 	case SMB_SEEK_CUR:
698 		if (off < 0 && (-off) > of->f_seek_pos)
699 			newoff = 0;
700 		else
701 			newoff = of->f_seek_pos + (u_offset_t)off;
702 		break;
703 
704 	case SMB_SEEK_END:
705 		bzero(&attr, sizeof (smb_attr_t));
706 		attr.sa_mask |= SMB_AT_SIZE;
707 		rc = smb_fsop_getattr(NULL, kcred, of->f_node, &attr);
708 		if (rc != 0) {
709 			mutex_exit(&of->f_mutex);
710 			return (rc);
711 		}
712 		if (off < 0 && (-off) > attr.sa_vattr.va_size)
713 			newoff = 0;
714 		else
715 			newoff = attr.sa_vattr.va_size + (u_offset_t)off;
716 		break;
717 
718 	default:
719 		mutex_exit(&of->f_mutex);
720 		return (EINVAL);
721 	}
722 
723 	/*
724 	 * See comments at the beginning of smb_seek.c.
725 	 * If the offset is greater than UINT_MAX, we will return an error.
726 	 */
727 
728 	if (newoff > UINT_MAX) {
729 		rc = EOVERFLOW;
730 	} else {
731 		of->f_seek_pos = newoff;
732 		*retoff = (uint32_t)newoff;
733 	}
734 	mutex_exit(&of->f_mutex);
735 	return (rc);
736 }
737 
738 /*
739  * smb_ofile_is_open
740  */
741 boolean_t
742 smb_ofile_is_open(smb_ofile_t *of)
743 {
744 	boolean_t	rc;
745 
746 	SMB_OFILE_VALID(of);
747 
748 	mutex_enter(&of->f_mutex);
749 	rc = smb_ofile_is_open_locked(of);
750 	mutex_exit(&of->f_mutex);
751 	return (rc);
752 }
753 
754 /*
755  * smb_ofile_pending_write_time
756  *
757  * Flag write times as pending - to be set on close, setattr
758  * or delayed write timer.
759  */
760 void
761 smb_ofile_set_write_time_pending(smb_ofile_t *of)
762 {
763 	SMB_OFILE_VALID(of);
764 	mutex_enter(&of->f_mutex);
765 	of->f_flags |= SMB_OFLAGS_TIMESTAMPS_PENDING;
766 	mutex_exit(&of->f_mutex);
767 }
768 
769 /*
770  * smb_ofile_write_time_pending
771  *
772  * Get and reset the write times pending flag.
773  */
774 boolean_t
775 smb_ofile_write_time_pending(smb_ofile_t *of)
776 {
777 	boolean_t rc = B_FALSE;
778 
779 	SMB_OFILE_VALID(of);
780 	mutex_enter(&of->f_mutex);
781 	if (of->f_flags & SMB_OFLAGS_TIMESTAMPS_PENDING) {
782 		rc = B_TRUE;
783 		of->f_flags &= ~SMB_OFLAGS_TIMESTAMPS_PENDING;
784 	}
785 	mutex_exit(&of->f_mutex);
786 
787 	return (rc);
788 }
789 
790 /*
791  * smb_ofile_set_explicit_time_flag
792  *
793  * Note the timestamps specified in "what", as having been
794  * explicity set for the ofile.
795  */
796 void
797 smb_ofile_set_explicit_times(smb_ofile_t *of, uint32_t what)
798 {
799 	SMB_OFILE_VALID(of);
800 	mutex_enter(&of->f_mutex);
801 	of->f_explicit_times |= (what & SMB_AT_TIMES);
802 	mutex_exit(&of->f_mutex);
803 }
804 
805 uint32_t
806 smb_ofile_explicit_times(smb_ofile_t *of)
807 {
808 	uint32_t rc;
809 
810 	SMB_OFILE_VALID(of);
811 	mutex_enter(&of->f_mutex);
812 	rc = of->f_explicit_times;
813 	mutex_exit(&of->f_mutex);
814 
815 	return (rc);
816 }
817 
818 /* *************************** Static Functions ***************************** */
819 
820 /*
821  * Determine whether or not an ofile is open.
822  * This function must be called with the mutex held.
823  */
824 static boolean_t
825 smb_ofile_is_open_locked(smb_ofile_t *of)
826 {
827 	switch (of->f_state) {
828 	case SMB_OFILE_STATE_OPEN:
829 		return (B_TRUE);
830 
831 	case SMB_OFILE_STATE_CLOSING:
832 	case SMB_OFILE_STATE_CLOSED:
833 		return (B_FALSE);
834 
835 	default:
836 		ASSERT(0);
837 		return (B_FALSE);
838 	}
839 }
840 
841 /*
842  * smb_ofile_set_close_attrs
843  *
844  * Updates timestamps, size and readonly bit.
845  * The last_wtime is specified in the request received
846  * from the client. If it is neither 0 nor -1, this time
847  * should be used as the file's mtime. It must first be
848  * converted from the server's localtime (as received in
849  * the client's request) to GMT.
850  *
851  * Call smb_node_setattr even if no attributes are being
852  * explicitly set, to set any pending attributes.
853  */
854 static void
855 smb_ofile_set_close_attrs(smb_ofile_t *of, uint32_t last_wtime)
856 {
857 	smb_node_t *node = of->f_node;
858 	smb_attr_t attr;
859 
860 	bzero(&attr, sizeof (smb_attr_t));
861 
862 	/* For files created readonly, propagate readonly bit */
863 	if (node->readonly_creator == of) {
864 		attr.sa_mask |= SMB_AT_DOSATTR;
865 		if (smb_fsop_getattr(NULL, kcred, node, &attr) &&
866 		    (attr.sa_dosattr & FILE_ATTRIBUTE_READONLY)) {
867 			attr.sa_mask = 0;
868 		} else {
869 			attr.sa_dosattr |= FILE_ATTRIBUTE_READONLY;
870 		}
871 
872 		node->readonly_creator = NULL;
873 	}
874 
875 	/* apply last_wtime if specified */
876 	if (last_wtime != 0 && last_wtime != 0xFFFFFFFF) {
877 		attr.sa_vattr.va_mtime.tv_sec =
878 		    last_wtime + of->f_server->si_gmtoff;
879 		attr.sa_mask |= SMB_AT_MTIME;
880 	}
881 
882 	(void) smb_node_setattr(NULL, node, of->f_cr, of, &attr);
883 }
884 
885 /*
886  * This function closes the file passed in (if appropriate) and returns the
887  * next open file in the list of open files of the tree of the open file passed
888  * in. It requires that the list of open files of the tree be entered in
889  * RW_READER mode before being called.
890  */
891 static smb_ofile_t *
892 smb_ofile_close_and_next(smb_ofile_t *of)
893 {
894 	smb_ofile_t	*next_of;
895 	smb_tree_t	*tree;
896 
897 	ASSERT(of);
898 	ASSERT(of->f_magic == SMB_OFILE_MAGIC);
899 
900 	mutex_enter(&of->f_mutex);
901 	switch (of->f_state) {
902 	case SMB_OFILE_STATE_OPEN:
903 		/* The file is still open. */
904 		of->f_refcnt++;
905 		ASSERT(of->f_refcnt);
906 		tree = of->f_tree;
907 		mutex_exit(&of->f_mutex);
908 		smb_llist_exit(&of->f_tree->t_ofile_list);
909 		smb_ofile_close(of, 0);
910 		smb_ofile_release(of);
911 		smb_llist_enter(&tree->t_ofile_list, RW_READER);
912 		next_of = smb_llist_head(&tree->t_ofile_list);
913 		break;
914 	case SMB_OFILE_STATE_CLOSING:
915 	case SMB_OFILE_STATE_CLOSED:
916 		/*
917 		 * The ofile exists but is closed or
918 		 * in the process being closed.
919 		 */
920 		mutex_exit(&of->f_mutex);
921 		next_of = smb_llist_next(&of->f_tree->t_ofile_list, of);
922 		break;
923 	default:
924 		ASSERT(0);
925 		mutex_exit(&of->f_mutex);
926 		next_of = smb_llist_next(&of->f_tree->t_ofile_list, of);
927 		break;
928 	}
929 	return (next_of);
930 }
931 
932 /*
933  * Delete an ofile.
934  *
935  * Remove the ofile from the tree list before freeing resources
936  * associated with the ofile.
937  */
938 void
939 smb_ofile_delete(void *arg)
940 {
941 	smb_tree_t	*tree;
942 	smb_ofile_t	*of = (smb_ofile_t *)arg;
943 
944 	SMB_OFILE_VALID(of);
945 	ASSERT(of->f_refcnt == 0);
946 	ASSERT(of->f_state == SMB_OFILE_STATE_CLOSED);
947 	ASSERT(!SMB_OFILE_OPLOCK_GRANTED(of));
948 
949 	tree = of->f_tree;
950 	smb_llist_enter(&tree->t_ofile_list, RW_WRITER);
951 	smb_llist_remove(&tree->t_ofile_list, of);
952 	smb_idpool_free(&tree->t_fid_pool, of->f_fid);
953 	atomic_dec_32(&tree->t_session->s_file_cnt);
954 	smb_llist_exit(&tree->t_ofile_list);
955 
956 	mutex_enter(&of->f_mutex);
957 	mutex_exit(&of->f_mutex);
958 
959 	if (of->f_ftype == SMB_FTYPE_MESG_PIPE) {
960 		smb_opipe_dealloc(of->f_pipe);
961 		of->f_pipe = NULL;
962 	} else {
963 		ASSERT(of->f_ftype == SMB_FTYPE_DISK);
964 		ASSERT(of->f_node != NULL);
965 		smb_node_rem_ofile(of->f_node, of);
966 		smb_node_release(of->f_node);
967 	}
968 
969 	of->f_magic = (uint32_t)~SMB_OFILE_MAGIC;
970 	mutex_destroy(&of->f_mutex);
971 	crfree(of->f_cr);
972 	kmem_cache_free(of->f_tree->t_server->si_cache_ofile, of);
973 }
974 
975 /*
976  * smb_ofile_access
977  *
978  * This function will check to see if the access requested is granted.
979  * Returns NT status codes.
980  */
981 uint32_t
982 smb_ofile_access(smb_ofile_t *of, cred_t *cr, uint32_t access)
983 {
984 
985 	if ((of == NULL) || (cr == kcred))
986 		return (NT_STATUS_SUCCESS);
987 
988 	/*
989 	 * If the request is for something
990 	 * I don't grant it is an error
991 	 */
992 	if (~(of->f_granted_access) & access) {
993 		if (!(of->f_granted_access & ACCESS_SYSTEM_SECURITY) &&
994 		    (access & ACCESS_SYSTEM_SECURITY)) {
995 			return (NT_STATUS_PRIVILEGE_NOT_HELD);
996 		}
997 		return (NT_STATUS_ACCESS_DENIED);
998 	}
999 
1000 	return (NT_STATUS_SUCCESS);
1001 }
1002 
1003 /*
1004  * smb_ofile_share_check
1005  *
1006  * Check if ofile was opened with share access NONE (0).
1007  * Returns: B_TRUE  - share access non-zero
1008  *          B_FALSE - share access NONE
1009  */
1010 boolean_t
1011 smb_ofile_share_check(smb_ofile_t *of)
1012 {
1013 	return (!SMB_DENY_ALL(of->f_share_access));
1014 }
1015 
1016 /*
1017  * check file sharing rules for current open request
1018  * against existing open instances of the same file
1019  *
1020  * Returns NT_STATUS_SHARING_VIOLATION if there is any
1021  * sharing conflict, otherwise returns NT_STATUS_SUCCESS.
1022  */
1023 uint32_t
1024 smb_ofile_open_check(smb_ofile_t *of, uint32_t desired_access,
1025     uint32_t share_access)
1026 {
1027 	ASSERT(of->f_magic == SMB_OFILE_MAGIC);
1028 
1029 	mutex_enter(&of->f_mutex);
1030 
1031 	if (of->f_state != SMB_OFILE_STATE_OPEN) {
1032 		mutex_exit(&of->f_mutex);
1033 		return (NT_STATUS_INVALID_HANDLE);
1034 	}
1035 
1036 	/* if it's just meta data */
1037 	if ((of->f_granted_access & FILE_DATA_ALL) == 0) {
1038 		mutex_exit(&of->f_mutex);
1039 		return (NT_STATUS_SUCCESS);
1040 	}
1041 
1042 	/*
1043 	 * Check requested share access against the
1044 	 * open granted (desired) access
1045 	 */
1046 	if (SMB_DENY_DELETE(share_access) && (of->f_granted_access & DELETE)) {
1047 		mutex_exit(&of->f_mutex);
1048 		return (NT_STATUS_SHARING_VIOLATION);
1049 	}
1050 
1051 	if (SMB_DENY_READ(share_access) &&
1052 	    (of->f_granted_access & (FILE_READ_DATA | FILE_EXECUTE))) {
1053 		mutex_exit(&of->f_mutex);
1054 		return (NT_STATUS_SHARING_VIOLATION);
1055 	}
1056 
1057 	if (SMB_DENY_WRITE(share_access) &&
1058 	    (of->f_granted_access & (FILE_WRITE_DATA | FILE_APPEND_DATA))) {
1059 		mutex_exit(&of->f_mutex);
1060 		return (NT_STATUS_SHARING_VIOLATION);
1061 	}
1062 
1063 	/* check requested desired access against the open share access */
1064 	if (SMB_DENY_DELETE(of->f_share_access) && (desired_access & DELETE)) {
1065 		mutex_exit(&of->f_mutex);
1066 		return (NT_STATUS_SHARING_VIOLATION);
1067 	}
1068 
1069 	if (SMB_DENY_READ(of->f_share_access) &&
1070 	    (desired_access & (FILE_READ_DATA | FILE_EXECUTE))) {
1071 		mutex_exit(&of->f_mutex);
1072 		return (NT_STATUS_SHARING_VIOLATION);
1073 	}
1074 
1075 	if (SMB_DENY_WRITE(of->f_share_access) &&
1076 	    (desired_access & (FILE_WRITE_DATA | FILE_APPEND_DATA))) {
1077 		mutex_exit(&of->f_mutex);
1078 		return (NT_STATUS_SHARING_VIOLATION);
1079 	}
1080 
1081 	mutex_exit(&of->f_mutex);
1082 	return (NT_STATUS_SUCCESS);
1083 }
1084 
1085 /*
1086  * smb_ofile_rename_check
1087  *
1088  * An open file can be renamed if
1089  *
1090  *  1. isn't opened for data writing or deleting
1091  *
1092  *  2. Opened with "Deny Delete" share mode
1093  *         But not opened for data reading or executing
1094  *         (opened for accessing meta data)
1095  */
1096 
1097 uint32_t
1098 smb_ofile_rename_check(smb_ofile_t *of)
1099 {
1100 	ASSERT(of->f_magic == SMB_OFILE_MAGIC);
1101 
1102 	mutex_enter(&of->f_mutex);
1103 
1104 	if (of->f_state != SMB_OFILE_STATE_OPEN) {
1105 		mutex_exit(&of->f_mutex);
1106 		return (NT_STATUS_INVALID_HANDLE);
1107 	}
1108 
1109 	if (of->f_granted_access &
1110 	    (FILE_WRITE_DATA | FILE_APPEND_DATA | DELETE)) {
1111 		mutex_exit(&of->f_mutex);
1112 		return (NT_STATUS_SHARING_VIOLATION);
1113 	}
1114 
1115 	if ((of->f_share_access & FILE_SHARE_DELETE) == 0) {
1116 		if (of->f_granted_access &
1117 		    (FILE_READ_DATA | FILE_EXECUTE)) {
1118 			mutex_exit(&of->f_mutex);
1119 			return (NT_STATUS_SHARING_VIOLATION);
1120 		}
1121 	}
1122 
1123 	mutex_exit(&of->f_mutex);
1124 	return (NT_STATUS_SUCCESS);
1125 }
1126 
1127 /*
1128  * smb_ofile_delete_check
1129  *
1130  * An open file can be deleted only if opened for
1131  * accessing meta data. Share modes aren't important
1132  * in this case.
1133  *
1134  * NOTE: there is another mechanism for deleting an
1135  * open file that NT clients usually use.
1136  * That's setting "Delete on close" flag for an open
1137  * file.  In this way the file will be deleted after
1138  * last close. This flag can be set by SmbTrans2SetFileInfo
1139  * with FILE_DISPOSITION_INFO information level.
1140  * For setting this flag, the file should be opened by
1141  * DELETE access in the FID that is passed in the Trans2
1142  * request.
1143  */
1144 
1145 uint32_t
1146 smb_ofile_delete_check(smb_ofile_t *of)
1147 {
1148 	ASSERT(of->f_magic == SMB_OFILE_MAGIC);
1149 
1150 	mutex_enter(&of->f_mutex);
1151 
1152 	if (of->f_state != SMB_OFILE_STATE_OPEN) {
1153 		mutex_exit(&of->f_mutex);
1154 		return (NT_STATUS_INVALID_HANDLE);
1155 	}
1156 
1157 	if (of->f_granted_access &
1158 	    (FILE_READ_DATA | FILE_WRITE_DATA |
1159 	    FILE_APPEND_DATA | FILE_EXECUTE | DELETE)) {
1160 		mutex_exit(&of->f_mutex);
1161 		return (NT_STATUS_SHARING_VIOLATION);
1162 	}
1163 
1164 	mutex_exit(&of->f_mutex);
1165 	return (NT_STATUS_SUCCESS);
1166 }
1167 
1168 cred_t *
1169 smb_ofile_getcred(smb_ofile_t *of)
1170 {
1171 	return (of->f_cr);
1172 }
1173 
1174 /*
1175  * smb_ofile_set_delete_on_close
1176  *
1177  * Set the DeleteOnClose flag on the smb file. When the file is closed,
1178  * the flag will be transferred to the smb node, which will commit the
1179  * delete operation and inhibit subsequent open requests.
1180  *
1181  * When DeleteOnClose is set on an smb_node, the common open code will
1182  * reject subsequent open requests for the file. Observation of Windows
1183  * 2000 indicates that subsequent opens should be allowed (assuming
1184  * there would be no sharing violation) until the file is closed using
1185  * the fid on which the DeleteOnClose was requested.
1186  */
1187 void
1188 smb_ofile_set_delete_on_close(smb_ofile_t *of)
1189 {
1190 	mutex_enter(&of->f_mutex);
1191 	of->f_flags |= SMB_OFLAGS_SET_DELETE_ON_CLOSE;
1192 	mutex_exit(&of->f_mutex);
1193 }
1194 
1195 /*
1196  * Encode open file information into a buffer; needed in user space to
1197  * support RPC requests.
1198  */
1199 static int
1200 smb_ofile_netinfo_encode(smb_ofile_t *of, uint8_t *buf, size_t buflen,
1201     uint32_t *nbytes)
1202 {
1203 	smb_netfileinfo_t	fi;
1204 	int			rc;
1205 
1206 	rc = smb_ofile_netinfo_init(of, &fi);
1207 	if (rc == 0) {
1208 		rc = smb_netfileinfo_encode(&fi, buf, buflen, nbytes);
1209 		smb_ofile_netinfo_fini(&fi);
1210 	}
1211 
1212 	return (rc);
1213 }
1214 
1215 static int
1216 smb_ofile_netinfo_init(smb_ofile_t *of, smb_netfileinfo_t *fi)
1217 {
1218 	smb_user_t	*user;
1219 	smb_tree_t	*tree;
1220 	smb_node_t	*node;
1221 	char		*path;
1222 	char		*buf;
1223 	int		rc;
1224 
1225 	ASSERT(of);
1226 	user = of->f_user;
1227 	tree = of->f_tree;
1228 	ASSERT(user);
1229 	ASSERT(tree);
1230 
1231 	buf = kmem_zalloc(MAXPATHLEN, KM_SLEEP);
1232 
1233 	switch (of->f_ftype) {
1234 	case SMB_FTYPE_DISK:
1235 		node = of->f_node;
1236 		ASSERT(node);
1237 
1238 		fi->fi_permissions = of->f_granted_access;
1239 		fi->fi_numlocks = smb_lock_get_lock_count(node, of);
1240 
1241 		path = kmem_zalloc(MAXPATHLEN, KM_SLEEP);
1242 
1243 		if (node != tree->t_snode) {
1244 			rc = smb_node_getshrpath(node, tree, path, MAXPATHLEN);
1245 			if (rc != 0)
1246 				(void) strlcpy(path, node->od_name, MAXPATHLEN);
1247 		}
1248 
1249 		(void) snprintf(buf, MAXPATHLEN, "%s:%s", tree->t_sharename,
1250 		    path);
1251 		kmem_free(path, MAXPATHLEN);
1252 		break;
1253 
1254 	case SMB_FTYPE_MESG_PIPE:
1255 		ASSERT(of->f_pipe);
1256 
1257 		fi->fi_permissions = FILE_READ_DATA | FILE_WRITE_DATA |
1258 		    FILE_EXECUTE;
1259 		fi->fi_numlocks = 0;
1260 		(void) snprintf(buf, MAXPATHLEN, "\\PIPE\\%s",
1261 		    of->f_pipe->p_name);
1262 		break;
1263 
1264 	default:
1265 		kmem_free(buf, MAXPATHLEN);
1266 		return (-1);
1267 	}
1268 
1269 	fi->fi_fid = of->f_fid;
1270 	fi->fi_uniqid = of->f_uniqid;
1271 	fi->fi_pathlen = strlen(buf) + 1;
1272 	fi->fi_path = smb_mem_strdup(buf);
1273 	kmem_free(buf, MAXPATHLEN);
1274 
1275 	fi->fi_namelen = user->u_domain_len + user->u_name_len + 2;
1276 	fi->fi_username = kmem_alloc(fi->fi_namelen, KM_SLEEP);
1277 	(void) snprintf(fi->fi_username, fi->fi_namelen, "%s\\%s",
1278 	    user->u_domain, user->u_name);
1279 	return (0);
1280 }
1281 
1282 static void
1283 smb_ofile_netinfo_fini(smb_netfileinfo_t *fi)
1284 {
1285 	if (fi == NULL)
1286 		return;
1287 
1288 	if (fi->fi_path)
1289 		smb_mem_free(fi->fi_path);
1290 	if (fi->fi_username)
1291 		kmem_free(fi->fi_username, fi->fi_namelen);
1292 
1293 	bzero(fi, sizeof (smb_netfileinfo_t));
1294 }
1295 
1296 /*
1297  * A query of user and group quotas may span multiple requests.
1298  * f_quota_resume is used to determine where the query should
1299  * be resumed, in a subsequent request. f_quota_resume contains
1300  * the SID of the last quota entry returned to the client.
1301  */
1302 void
1303 smb_ofile_set_quota_resume(smb_ofile_t *ofile, char *resume)
1304 {
1305 	ASSERT(ofile);
1306 	mutex_enter(&ofile->f_mutex);
1307 	if (resume == NULL)
1308 		bzero(ofile->f_quota_resume, SMB_SID_STRSZ);
1309 	else
1310 		(void) strlcpy(ofile->f_quota_resume, resume, SMB_SID_STRSZ);
1311 	mutex_exit(&ofile->f_mutex);
1312 }
1313 
1314 void
1315 smb_ofile_get_quota_resume(smb_ofile_t *ofile, char *buf, int bufsize)
1316 {
1317 	ASSERT(ofile);
1318 	mutex_enter(&ofile->f_mutex);
1319 	(void) strlcpy(buf, ofile->f_quota_resume, bufsize);
1320 	mutex_exit(&ofile->f_mutex);
1321 }
1322