/* * CDDL HEADER START * * The contents of this file are subject to the terms of the * Common Development and Distribution License (the "License"). * You may not use this file except in compliance with the License. * * You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE * or http://www.opensolaris.org/os/licensing. * See the License for the specific language governing permissions * and limitations under the License. * * When distributing Covered Code, include this CDDL HEADER in each * file and include the License file at usr/src/OPENSOLARIS.LICENSE. * If applicable, add the following below this CDDL HEADER, with the * fields enclosed by brackets "[]" replaced with your own identifying * information: Portions Copyright [yyyy] [name of copyright owner] * * CDDL HEADER END */ /* * Copyright (c) 2007, 2010, Oracle and/or its affiliates. All rights reserved. * Copyright 2020 Tintri by DDN, Inc. All rights reserved. * Copyright 2022 RackTop Systems, Inc. */ /* * This module provides the common open functionality to the various * open and create SMB interface functions. */ #include #include #include #include #include #include #include #include int smb_session_ofile_max = 32768; extern uint32_t smb_is_executable(char *); static void smb_delete_new_object(smb_request_t *); static int smb_set_open_attributes(smb_request_t *, smb_ofile_t *); /* * smb_access_generic_to_file * * Search MSDN for IoCreateFile to see following mapping. * * GENERIC_READ STANDARD_RIGHTS_READ, FILE_READ_DATA, * FILE_READ_ATTRIBUTES and FILE_READ_EA * * GENERIC_WRITE STANDARD_RIGHTS_WRITE, FILE_WRITE_DATA, * FILE_WRITE_ATTRIBUTES, FILE_WRITE_EA, and FILE_APPEND_DATA * * GENERIC_EXECUTE STANDARD_RIGHTS_EXECUTE, SYNCHRONIZE, and FILE_EXECUTE. */ static uint32_t smb_access_generic_to_file(uint32_t desired_access) { uint32_t access = 0; if (desired_access & GENERIC_ALL) return (FILE_ALL_ACCESS & ~SYNCHRONIZE); if (desired_access & GENERIC_EXECUTE) { desired_access &= ~GENERIC_EXECUTE; access |= (STANDARD_RIGHTS_EXECUTE | SYNCHRONIZE | FILE_EXECUTE); } if (desired_access & GENERIC_WRITE) { desired_access &= ~GENERIC_WRITE; access |= (FILE_GENERIC_WRITE & ~SYNCHRONIZE); } if (desired_access & GENERIC_READ) { desired_access &= ~GENERIC_READ; access |= FILE_GENERIC_READ; } return (access | desired_access); } /* * smb_omode_to_amask * * This function converts open modes used by Open and Open AndX * commands to desired access bits used by NT Create AndX command. */ uint32_t smb_omode_to_amask(uint32_t desired_access) { switch (desired_access & SMB_DA_ACCESS_MASK) { case SMB_DA_ACCESS_READ: return (FILE_GENERIC_READ); case SMB_DA_ACCESS_WRITE: return (FILE_GENERIC_WRITE); case SMB_DA_ACCESS_READ_WRITE: return (FILE_GENERIC_READ | FILE_GENERIC_WRITE); case SMB_DA_ACCESS_EXECUTE: return (FILE_GENERIC_READ | FILE_GENERIC_EXECUTE); default: return (FILE_GENERIC_ALL); } } /* * smb_denymode_to_sharemode * * This function converts deny modes used by Open and Open AndX * commands to share access bits used by NT Create AndX command. */ uint32_t smb_denymode_to_sharemode(uint32_t desired_access, char *fname) { switch (desired_access & SMB_DA_SHARE_MASK) { case SMB_DA_SHARE_COMPATIBILITY: if (smb_is_executable(fname)) return (FILE_SHARE_READ | FILE_SHARE_WRITE); return (FILE_SHARE_ALL); case SMB_DA_SHARE_EXCLUSIVE: return (FILE_SHARE_NONE); case SMB_DA_SHARE_DENY_WRITE: return (FILE_SHARE_READ); case SMB_DA_SHARE_DENY_READ: return (FILE_SHARE_WRITE); case SMB_DA_SHARE_DENY_NONE: default: return (FILE_SHARE_READ | FILE_SHARE_WRITE); } } /* * smb_ofun_to_crdisposition * * This function converts open function values used by Open and Open AndX * commands to create disposition values used by NT Create AndX command. */ uint32_t smb_ofun_to_crdisposition(uint16_t ofun) { static int ofun_cr_map[3][2] = { { -1, FILE_CREATE }, { FILE_OPEN, FILE_OPEN_IF }, { FILE_OVERWRITE, FILE_OVERWRITE_IF } }; int row = ofun & SMB_OFUN_OPEN_MASK; int col = (ofun & SMB_OFUN_CREATE_MASK) >> 4; if (row == 3) return (FILE_MAXIMUM_DISPOSITION + 1); return (ofun_cr_map[row][col]); } /* * smb_common_open * * Notes on write-through behaviour. It looks like pre-LM0.12 versions * of the protocol specify the write-through mode when a file is opened, * (SmbOpen, SmbOpenAndX) so the write calls (SmbWrite, SmbWriteAndClose, * SmbWriteAndUnlock) don't need to contain a write-through flag. * * With LM0.12, the open calls (SmbCreateAndX, SmbNtTransactCreate) * don't indicate which write-through mode to use. Instead the write * calls (SmbWriteAndX, SmbWriteRaw) specify the mode on a per call * basis. * * We don't care which open call was used to get us here, we just need * to ensure that the write-through mode flag is copied from the open * parameters to the node. We test the omode write-through flag in all * write functions. * * This function returns NT status codes. * * The following rules apply when processing a file open request: * * - Oplocks must be broken prior to share checking as the break may * cause other clients to close the file, which would affect sharing * checks. * * - Share checks must take place prior to access checks for correct * Windows semantics and to prevent unnecessary NFS delegation recalls. * * - Oplocks must be acquired after open to ensure the correct * synchronization with NFS delegation and FEM installation. * * DOS readonly bit rules * * 1. The creator of a readonly file can write to/modify the size of the file * using the original create fid, even though the file will appear as readonly * to all other fids and via a CIFS getattr call. * * 2. A setinfo operation (using either an open fid or a path) to set/unset * readonly will be successful regardless of whether a creator of a readonly * file has an open fid. * * 3. The DOS readonly bit affects only data and some metadata. * The following metadata can be changed regardless of the readonly bit: * - security descriptors * - DOS attributes * - timestamps * * In the current implementation, the file size cannot be changed (except for * the exceptions in #1 and #2, above). * * * DOS attribute rules * * These rules are specific to creating / opening files and directories. * How the attribute value (specifically ZERO or FILE_ATTRIBUTE_NORMAL) * should be interpreted may differ in other requests. * * - An attribute value equal to ZERO or FILE_ATTRIBUTE_NORMAL means that the * file's attributes should be cleared. * - If FILE_ATTRIBUTE_NORMAL is specified with any other attributes, * FILE_ATTRIBUTE_NORMAL is ignored. * * 1. Creating a new file * - The request attributes + FILE_ATTRIBUTE_ARCHIVE are applied to the file. * * 2. Creating a new directory * - The request attributes + FILE_ATTRIBUTE_DIRECTORY are applied to the file. * - FILE_ATTRIBUTE_ARCHIVE does not get set. * * 3. Overwriting an existing file * - the request attributes are used as search attributes. If the existing * file does not meet the search criteria access is denied. * - otherwise, applies attributes + FILE_ATTRIBUTE_ARCHIVE. * * 4. Opening an existing file or directory * The request attributes are ignored. */ uint32_t smb_common_open(smb_request_t *sr) { smb_server_t *sv = sr->sr_server; smb_tree_t *tree = sr->tid_tree; smb_node_t *fnode = NULL; smb_node_t *dnode = NULL; smb_node_t *cur_node = NULL; smb_node_t *tmp_node = NULL; smb_arg_open_t *op = &sr->sr_open; smb_pathname_t *pn = &op->fqi.fq_path; smb_ofile_t *of = NULL; smb_attr_t new_attr; hrtime_t shrlock_t0; int max_requested = 0; uint32_t max_allowed; uint32_t status = NT_STATUS_SUCCESS; int is_dir; int rc; boolean_t is_stream = B_FALSE; int lookup_flags = SMB_FOLLOW_LINKS; uint32_t uniq_fid = 0; uint16_t tree_fid = 0; boolean_t created = B_FALSE; boolean_t last_comp_found = B_FALSE; boolean_t stream_found = B_FALSE; boolean_t opening_incr = B_FALSE; boolean_t dnode_held = B_FALSE; boolean_t dnode_wlock = B_FALSE; boolean_t fnode_held = B_FALSE; boolean_t fnode_wlock = B_FALSE; boolean_t fnode_shrlk = B_FALSE; boolean_t did_open = B_FALSE; boolean_t did_break_handle = B_FALSE; boolean_t did_cleanup_orphans = B_FALSE; char *sname = NULL; /* Get out now if we've been cancelled. */ mutex_enter(&sr->sr_mutex); if (sr->sr_state != SMB_REQ_STATE_ACTIVE) { mutex_exit(&sr->sr_mutex); return (NT_STATUS_CANCELLED); } mutex_exit(&sr->sr_mutex); is_dir = (op->create_options & FILE_DIRECTORY_FILE) ? 1 : 0; /* * If the object being created or opened is a directory * the Disposition parameter must be one of FILE_CREATE, * FILE_OPEN, or FILE_OPEN_IF */ if (is_dir) { if ((op->create_disposition != FILE_CREATE) && (op->create_disposition != FILE_OPEN_IF) && (op->create_disposition != FILE_OPEN)) { return (NT_STATUS_INVALID_PARAMETER); } } if (op->desired_access & MAXIMUM_ALLOWED) { max_requested = 1; op->desired_access &= ~MAXIMUM_ALLOWED; } op->desired_access = smb_access_generic_to_file(op->desired_access); if (sr->session->s_file_cnt >= smb_session_ofile_max) { ASSERT(sr->uid_user); cmn_err(CE_NOTE, "smbsrv[%s\\%s]: TOO_MANY_OPENED_FILES", sr->uid_user->u_domain, sr->uid_user->u_name); return (NT_STATUS_TOO_MANY_OPENED_FILES); } if (smb_idpool_alloc(&tree->t_fid_pool, &tree_fid)) return (NT_STATUS_TOO_MANY_OPENED_FILES); /* This must be NULL at this point */ sr->fid_ofile = NULL; op->devstate = 0; switch (sr->tid_tree->t_res_type & STYPE_MASK) { case STYPE_DISKTREE: case STYPE_PRINTQ: break; case STYPE_IPC: /* * Security descriptors for pipes are not implemented, * so just setup a reasonable access mask. */ op->desired_access = (READ_CONTROL | SYNCHRONIZE | FILE_READ_DATA | FILE_READ_ATTRIBUTES | FILE_WRITE_DATA | FILE_APPEND_DATA); /* * Limit the number of open pipe instances. */ if ((rc = smb_threshold_enter(&sv->sv_opipe_ct)) != 0) { status = RPC_NT_SERVER_TOO_BUSY; goto errout; } /* * Most of IPC open is handled in smb_opipe_open() */ op->create_options = 0; of = smb_ofile_alloc(sr, op, NULL, SMB_FTYPE_MESG_PIPE, tree_fid); tree_fid = 0; // given to the ofile status = smb_opipe_open(sr, of); smb_threshold_exit(&sv->sv_opipe_ct); if (status != NT_STATUS_SUCCESS) goto errout; return (NT_STATUS_SUCCESS); default: status = NT_STATUS_BAD_DEVICE_TYPE; goto errout; } smb_pathname_init(sr, pn, pn->pn_path); if (!smb_pathname_validate(sr, pn)) { status = sr->smb_error.status; goto errout; } if (strlen(pn->pn_path) >= SMB_MAXPATHLEN) { status = NT_STATUS_OBJECT_PATH_INVALID; goto errout; } if (is_dir) { if (!smb_validate_dirname(sr, pn)) { status = sr->smb_error.status; goto errout; } } else { if (!smb_validate_object_name(sr, pn)) { status = sr->smb_error.status; goto errout; } } cur_node = op->fqi.fq_dnode ? op->fqi.fq_dnode : sr->tid_tree->t_snode; rc = smb_pathname_reduce(sr, sr->user_cr, pn->pn_path, sr->tid_tree->t_snode, cur_node, &op->fqi.fq_dnode, op->fqi.fq_last_comp); if (rc != 0) { status = smb_errno2status(rc); goto errout; } dnode = op->fqi.fq_dnode; dnode_held = B_TRUE; /* * Lock the parent dir node in case another create * request to the same parent directory comes in. * Drop this once either lookup succeeds, or we've * created the object in this directory. */ smb_node_wrlock(dnode); dnode_wlock = B_TRUE; /* * If the access mask has only DELETE set (ignore * FILE_READ_ATTRIBUTES), then assume that this * is a request to delete the link (if a link) * and do not follow links. Otherwise, follow * the link to the target. */ if ((op->desired_access & ~FILE_READ_ATTRIBUTES) == DELETE) lookup_flags &= ~SMB_FOLLOW_LINKS; /* * Lookup *just* the file portion of the name. * Returns stream name in sname, which this allocates */ rc = smb_fsop_lookup_file(sr, zone_kcred(), lookup_flags, sr->tid_tree->t_snode, op->fqi.fq_dnode, op->fqi.fq_last_comp, &sname, &op->fqi.fq_fnode); if (rc == 0) { last_comp_found = B_TRUE; fnode = op->fqi.fq_fnode; fnode_held = B_TRUE; /* * Need the DOS attributes below, where we * check the search attributes (sattr). * Also UID, for owner check below. */ op->fqi.fq_fattr.sa_mask = SMB_AT_DOSATTR | SMB_AT_UID; rc = smb_node_getattr(sr, op->fqi.fq_fnode, zone_kcred(), NULL, &op->fqi.fq_fattr); if (rc != 0) { status = NT_STATUS_INTERNAL_ERROR; goto errout; } } else if (rc == ENOENT) { last_comp_found = B_FALSE; op->fqi.fq_fnode = NULL; rc = 0; } else { status = smb_errno2status(rc); goto errout; } if (last_comp_found) { fnode = op->fqi.fq_fnode; dnode = op->fqi.fq_dnode; if (!smb_node_is_file(fnode) && !smb_node_is_dir(fnode) && !smb_node_is_symlink(fnode)) { status = NT_STATUS_ACCESS_DENIED; goto errout; } /* * Reject this request if either: * - the target IS a directory and the client requires that * it must NOT be (required by Lotus Notes) * - the target is NOT a directory and client requires that * it MUST be. * Streams are never directories. */ if (smb_node_is_dir(fnode) && sname == NULL) { if (op->create_options & FILE_NON_DIRECTORY_FILE) { status = NT_STATUS_FILE_IS_A_DIRECTORY; goto errout; } } else { if ((op->create_options & FILE_DIRECTORY_FILE) || (op->nt_flags & NT_CREATE_FLAG_OPEN_TARGET_DIR)) { status = NT_STATUS_NOT_A_DIRECTORY; goto errout; } } /* If we're given a stream name, look it up now */ if (sname != NULL) { tmp_node = fnode; rc = smb_fsop_lookup_stream(sr, zone_kcred(), lookup_flags, sr->tid_tree->t_snode, fnode, sname, &fnode); } else { rc = 0; } if (rc == 0) { /* Stream Exists (including unnamed stream) */ stream_found = B_TRUE; smb_node_unlock(dnode); dnode_wlock = B_FALSE; if (tmp_node != NULL) smb_node_release(tmp_node); /* * No more open should be accepted when * "Delete on close" flag is set. */ if (fnode->flags & NODE_FLAGS_DELETE_ON_CLOSE) { status = NT_STATUS_DELETE_PENDING; goto errout; } /* * Specified file already exists * so the operation should fail. */ if (op->create_disposition == FILE_CREATE) { status = NT_STATUS_OBJECT_NAME_COLLISION; goto errout; } if ((op->create_disposition == FILE_SUPERSEDE) || (op->create_disposition == FILE_OVERWRITE_IF) || (op->create_disposition == FILE_OVERWRITE)) { if (sname == NULL) { if (!smb_sattr_check( op->fqi.fq_fattr.sa_dosattr, op->dattr)) { status = NT_STATUS_ACCESS_DENIED; goto errout; } op->desired_access |= FILE_WRITE_ATTRIBUTES; } if (smb_node_is_dir(fnode)) { status = NT_STATUS_ACCESS_DENIED; goto errout; } } /* MS-FSA 2.1.5.1.2 */ if (op->create_disposition == FILE_SUPERSEDE) op->desired_access |= DELETE; if ((op->create_disposition == FILE_OVERWRITE_IF) || (op->create_disposition == FILE_OVERWRITE)) op->desired_access |= FILE_WRITE_DATA; } else if (rc == ENOENT) { /* File Exists, but Stream doesn't */ if (op->create_disposition == FILE_OPEN || op->create_disposition == FILE_OVERWRITE) { status = NT_STATUS_OBJECT_NAME_NOT_FOUND; goto errout; } op->desired_access |= FILE_WRITE_DATA; } else { /* Error looking up stream */ status = smb_errno2status(rc); fnode = tmp_node; goto errout; } /* * Windows seems to check read-only access before file * sharing check. * * Check to see if the file is currently readonly (regardless * of whether this open will make it readonly). * Readonly is ignored on directories. */ if (SMB_PATHFILE_IS_READONLY(sr, fnode) && !smb_node_is_dir(fnode)) { if (op->desired_access & (FILE_WRITE_DATA | FILE_APPEND_DATA)) { status = NT_STATUS_ACCESS_DENIED; goto errout; } if (op->create_options & FILE_DELETE_ON_CLOSE) { status = NT_STATUS_CANNOT_DELETE; goto errout; } } /* Dataset roots can't be deleted, so don't set DOC */ if ((op->create_options & FILE_DELETE_ON_CLOSE) != 0 && (fnode->flags & NODE_FLAGS_VFSROOT) != 0) { status = NT_STATUS_CANNOT_DELETE; goto errout; } status = smb_fsop_access(sr, sr->user_cr, fnode, op->desired_access); if (status != NT_STATUS_SUCCESS) goto errout; if (max_requested) { smb_fsop_eaccess(sr, sr->user_cr, fnode, &max_allowed); op->desired_access |= max_allowed; } /* * File owner should always get read control + read attr. */ if (crgetuid(sr->user_cr) == op->fqi.fq_fattr.sa_vattr.va_uid) op->desired_access |= (READ_CONTROL | FILE_READ_ATTRIBUTES); /* * According to MS "dochelp" mail in Mar 2015, any handle * on which read or write access is granted implicitly * gets "read attributes", even if it was not requested. */ if ((op->desired_access & FILE_DATA_ALL) != 0) op->desired_access |= FILE_READ_ATTRIBUTES; /* If the stream didn't exist, create it now */ if (!stream_found) { smb_node_t *tmp_node = fnode; bzero(&new_attr, sizeof (new_attr)); new_attr.sa_vattr.va_type = VREG; new_attr.sa_vattr.va_mode = S_IRUSR; new_attr.sa_mask |= SMB_AT_TYPE | SMB_AT_MODE; rc = smb_fsop_create_stream(sr, sr->user_cr, dnode, fnode, sname, lookup_flags, &new_attr, &fnode); smb_node_release(tmp_node); if (rc != 0) { status = smb_errno2status(rc); fnode_held = B_FALSE; goto errout; } op->action_taken = SMB_OACT_CREATED; created = B_TRUE; smb_node_unlock(dnode); dnode_wlock = B_FALSE; } /* * Oplock break is done prior to sharing checks as the break * may cause other clients to close the file which would * affect the sharing checks, and may delete the file due to * DELETE_ON_CLOSE. This may block, so set the file opening * count before oplock stuff. * * Need the "proposed" ofile (and its TargetOplockKey) for * correct oplock break semantics. */ of = smb_ofile_alloc(sr, op, fnode, SMB_FTYPE_DISK, tree_fid); tree_fid = 0; // given to the ofile uniq_fid = of->f_uniqid; smb_node_inc_opening_count(fnode); opening_incr = B_TRUE; if (!stream_found) { /* * Stake our Share Access claim. */ smb_node_wrlock(fnode); fnode_wlock = B_TRUE; status = smb_fsop_shrlock(sr->user_cr, fnode, uniq_fid, op->desired_access, op->share_access); if (status != 0) goto errout; fnode_shrlk = B_TRUE; smb_node_unlock(fnode); fnode_wlock = B_FALSE; goto stream_created; } /* * XXX Supposed to do share access checks next. * [MS-FSA] describes that as part of access check: * 2.1.5.1.2.1 Alg... Check Access to an Existing File * * If CreateDisposition is FILE_OPEN or FILE_OPEN_IF: * If Open.Stream.Oplock is not empty and * Open.Stream.Oplock.State contains BATCH_OPLOCK, * the object store MUST check for an oplock * break according to the algorithm in section 2.1.4.12, * with input values as follows: * Open equal to this operation's Open * Oplock equal to Open.Stream.Oplock * Operation equal to "OPEN" * OpParams containing two members: * DesiredAccess, CreateDisposition * * It's not clear how Windows would ask the FS layer if * the file has a BATCH oplock. We'll use a call to the * common oplock code, which calls smb_oplock_break_OPEN * only if the oplock state contains BATCH_OPLOCK. * See: smb_oplock_break_BATCH() * * Also note: There's a nearly identical section in the * spec. at the start of the "else" part of the above * "if (disposition is overwrite, overwrite_if)" so this * section (oplock break, the share mode check, and the * next oplock_break_HANDLE) are all factored out to be * in all cases above that if/else from the spec. */ status = smb_oplock_break_BATCH(fnode, of, op->desired_access, op->create_disposition); if (status == NT_STATUS_OPLOCK_BREAK_IN_PROGRESS) { if (sr->session->dialect >= SMB_VERS_2_BASE) (void) smb2sr_go_async(sr); status = smb_oplock_wait_break(sr, fnode, 0); } if (status != NT_STATUS_SUCCESS) goto errout; /* * Check for sharing violations, and if any, * do oplock break of handle caching. * * Need node_wrlock during shrlock checks, * and not locked during oplock breaks etc. */ shrlock_t0 = gethrtime(); shrlock_again: smb_node_wrlock(fnode); fnode_wlock = B_TRUE; status = smb_fsop_shrlock(sr->user_cr, fnode, uniq_fid, op->desired_access, op->share_access); smb_node_unlock(fnode); fnode_wlock = B_FALSE; /* * [MS-FSA] "OPEN_BREAK_H" * If the (proposed) new open would violate sharing rules, * indicate an oplock break with OPEN_BREAK_H (to break * handle level caching rights) then try again. */ if (status == NT_STATUS_SHARING_VIOLATION && did_break_handle == B_FALSE) { did_break_handle = B_TRUE; status = smb_oplock_break_HANDLE(fnode, of); if (status == NT_STATUS_OPLOCK_BREAK_IN_PROGRESS) { if (sr->session->dialect >= SMB_VERS_2_BASE) (void) smb2sr_go_async(sr); status = smb_oplock_wait_break(sr, fnode, 0); } else { /* * Even when the oplock layer does NOT * give us the special status indicating * we should wait, it may have scheduled * taskq jobs that may close handles. * Give those a chance to run before we * check again for sharing violations. */ delay(MSEC_TO_TICK(10)); } if (status != NT_STATUS_SUCCESS) goto errout; goto shrlock_again; } /* * If we still have orphaned durable handles on this file, * let's assume the client has lost interest in those and * close them so they don't cause sharing violations. * See longer comment at smb2_dh_close_my_orphans(). */ if (status == NT_STATUS_SHARING_VIOLATION && sr->session->dialect >= SMB_VERS_2_BASE && did_cleanup_orphans == B_FALSE) { did_cleanup_orphans = B_TRUE; smb2_dh_close_my_orphans(sr, of); goto shrlock_again; } /* * SMB1 expects a 1 sec. delay before returning a * sharing violation error. If breaking oplocks * above took less than a sec, wait some more. * See: smbtorture base.defer_open */ if (status == NT_STATUS_SHARING_VIOLATION && sr->session->dialect < SMB_VERS_2_BASE) { hrtime_t t1 = shrlock_t0 + NANOSEC; hrtime_t now = gethrtime(); if (now < t1) { delay(NSEC_TO_TICK_ROUNDUP(t1 - now)); } } if (status != NT_STATUS_SUCCESS) goto errout; fnode_shrlk = B_TRUE; /* * The [MS-FSA] spec. describes this oplock break as * part of the sharing access checks. See: * 2.1.5.1.2.2 Algorithm to Check Sharing Access... * At the end of the share mode tests described there, * if it has not returned "sharing violation", it * specifies a call to the alg. in sec. 2.1.4.12, * that boils down to: smb_oplock_break_OPEN() */ status = smb_oplock_break_OPEN(fnode, of, op->desired_access, op->create_disposition); if (status == NT_STATUS_OPLOCK_BREAK_IN_PROGRESS) { if (sr->session->dialect >= SMB_VERS_2_BASE) (void) smb2sr_go_async(sr); status = smb_oplock_wait_break(sr, fnode, 0); } if (status != NT_STATUS_SUCCESS) goto errout; if ((fnode->flags & NODE_FLAGS_DELETE_COMMITTED) != 0) { /* * Breaking the oplock caused the file to be deleted, * so let's bail and pretend the file wasn't found. * Have to duplicate much of the logic found a the * "errout" label here. * * This code path is exercised by smbtorture * smb2.durable-open.delete_on_close1 */ DTRACE_PROBE1(node_deleted, smb_node_t *, fnode); tree_fid = of->f_fid; of->f_fid = 0; smb_ofile_free(of); of = NULL; last_comp_found = B_FALSE; /* * Get all the holds and locks into the state * they would have if lookup had failed. */ fnode_shrlk = B_FALSE; smb_fsop_unshrlock(sr->user_cr, fnode, uniq_fid); opening_incr = B_FALSE; smb_node_dec_opening_count(fnode); fnode_held = B_FALSE; smb_node_release(fnode); dnode_wlock = B_TRUE; smb_node_wrlock(dnode); goto create; } /* * Go ahead with modifications as necessary. */ switch (op->create_disposition) { case FILE_SUPERSEDE: case FILE_OVERWRITE_IF: case FILE_OVERWRITE: bzero(&new_attr, sizeof (new_attr)); if (sname == NULL) { op->dattr |= FILE_ATTRIBUTE_ARCHIVE; /* * Don't apply readonly until * smb_set_open_attributes */ if (op->dattr & FILE_ATTRIBUTE_READONLY) { op->dattr &= ~FILE_ATTRIBUTE_READONLY; op->created_readonly = B_TRUE; } new_attr.sa_dosattr = op->dattr; } else { new_attr.sa_dosattr = FILE_ATTRIBUTE_ARCHIVE; } /* * Truncate the file data here. * We set alloc_size = op->dsize later, * after we have an ofile. See: * smb_set_open_attributes */ new_attr.sa_vattr.va_size = 0; new_attr.sa_mask = SMB_AT_DOSATTR | SMB_AT_SIZE; rc = smb_fsop_setattr(sr, sr->user_cr, fnode, &new_attr); if (rc != 0) { status = smb_errno2status(rc); goto errout; } /* * If file is being replaced, remove existing streams */ if (SMB_IS_STREAM(fnode) == 0) { status = smb_fsop_remove_streams(sr, sr->user_cr, fnode); if (status != 0) goto errout; } op->action_taken = SMB_OACT_TRUNCATED; break; default: /* * FILE_OPEN or FILE_OPEN_IF. */ /* * Ignore any user-specified alloc_size for * existing files, to avoid truncation in * smb_set_open_attributes */ op->dsize = 0L; op->action_taken = SMB_OACT_OPENED; break; } } else { create: /* Last component was not found. */ dnode = op->fqi.fq_dnode; if (is_dir == 0) is_stream = smb_is_stream_name(pn->pn_path); if ((op->create_disposition == FILE_OPEN) || (op->create_disposition == FILE_OVERWRITE)) { status = NT_STATUS_OBJECT_NAME_NOT_FOUND; goto errout; } if (is_dir != 0 && (op->dattr & FILE_ATTRIBUTE_TEMPORARY) != 0) { status = NT_STATUS_INVALID_PARAMETER; goto errout; } if ((op->dattr & FILE_ATTRIBUTE_READONLY) != 0 && (op->create_options & FILE_DELETE_ON_CLOSE) != 0) { status = NT_STATUS_CANNOT_DELETE; goto errout; } if ((op->desired_access & ACCESS_SYSTEM_SECURITY) != 0 && !smb_user_has_security_priv(sr->uid_user, sr->user_cr)) { status = NT_STATUS_ACCESS_DENIED; goto errout; } if (pn->pn_fname && smb_is_invalid_filename(pn->pn_fname)) { status = NT_STATUS_OBJECT_NAME_INVALID; goto errout; } /* * Don't create in directories marked "Delete on close". */ if (dnode->flags & NODE_FLAGS_DELETE_ON_CLOSE) { status = NT_STATUS_DELETE_PENDING; goto errout; } /* * Create always sets the DOS attributes, type, and mode * in the if/else below (different for file vs directory). * Don't set the readonly bit until smb_set_open_attributes * or that would prevent this open. Note that op->dattr * needs to be what smb_set_open_attributes will use, * except for the readonly bit. */ bzero(&new_attr, sizeof (new_attr)); new_attr.sa_mask = SMB_AT_DOSATTR | SMB_AT_TYPE | SMB_AT_MODE; if (op->dattr & FILE_ATTRIBUTE_READONLY) { op->dattr &= ~FILE_ATTRIBUTE_READONLY; op->created_readonly = B_TRUE; } /* * SMB create can specify the create time. */ if ((op->crtime.tv_sec != 0) && (op->crtime.tv_sec != UINT_MAX)) { new_attr.sa_mask |= SMB_AT_CRTIME; new_attr.sa_crtime = op->crtime; } if (is_dir == 0) { op->dattr |= FILE_ATTRIBUTE_ARCHIVE; new_attr.sa_dosattr = op->dattr; new_attr.sa_vattr.va_type = VREG; if (is_stream) new_attr.sa_vattr.va_mode = S_IRUSR | S_IWUSR; else new_attr.sa_vattr.va_mode = S_IRUSR | S_IRGRP | S_IROTH | S_IWUSR | S_IWGRP | S_IWOTH; /* * We set alloc_size = op->dsize later, * (in smb_set_open_attributes) after we * have an ofile on which to save that. * * Legacy Open&X sets size to alloc_size * when creating a new file. */ if (sr->smb_com == SMB_COM_OPEN_ANDX) { new_attr.sa_vattr.va_size = op->dsize; new_attr.sa_mask |= SMB_AT_SIZE; } rc = smb_fsop_create(sr, sr->user_cr, dnode, op->fqi.fq_last_comp, &new_attr, &op->fqi.fq_fnode); } else { op->dattr |= FILE_ATTRIBUTE_DIRECTORY; new_attr.sa_dosattr = op->dattr; new_attr.sa_vattr.va_type = VDIR; new_attr.sa_vattr.va_mode = 0777; rc = smb_fsop_mkdir(sr, sr->user_cr, dnode, op->fqi.fq_last_comp, &new_attr, &op->fqi.fq_fnode); } if (rc != 0) { status = smb_errno2status(rc); goto errout; } /* Create done. */ smb_node_unlock(dnode); dnode_wlock = B_FALSE; created = B_TRUE; op->action_taken = SMB_OACT_CREATED; /* Note: hold from create */ fnode = op->fqi.fq_fnode; fnode_held = B_TRUE; if (max_requested) { smb_fsop_eaccess(sr, sr->user_cr, fnode, &max_allowed); op->desired_access |= max_allowed; } /* * We created this object (we own it) so grant * read_control + read_attributes on this handle, * even if that was not requested. This avoids * unexpected access failures later. */ op->desired_access |= (READ_CONTROL | FILE_READ_ATTRIBUTES); /* Allocate the ofile and fill in most of it. */ of = smb_ofile_alloc(sr, op, fnode, SMB_FTYPE_DISK, tree_fid); tree_fid = 0; // given to the ofile uniq_fid = of->f_uniqid; smb_node_inc_opening_count(fnode); opening_incr = B_TRUE; /* * Share access checks... */ smb_node_wrlock(fnode); fnode_wlock = B_TRUE; status = smb_fsop_shrlock(sr->user_cr, fnode, uniq_fid, op->desired_access, op->share_access); if (status != 0) goto errout; fnode_shrlk = B_TRUE; /* * MS-FSA 2.1.5.1.1 * If the Oplock member of the DirectoryStream in * Link.ParentFile.StreamList (ParentOplock) is * not empty ... oplock break on the parent... * (dnode is the parent directory) * * This compares of->ParentOplockKey with each * oplock of->TargetOplockKey and breaks... * so it's OK that we're passing an OF that's * NOT a member of dnode->n_ofile_list * * The break never blocks, so ignore the return. */ (void) smb_oplock_break_PARENT(dnode, of); } stream_created: /* * We might have blocked in smb_oplock_break_OPEN long enough * so a tree disconnect might have happened. In that case, * we would be adding an ofile to a tree that's disconnecting, * which would interfere with tear-down. If so, error out. */ if (!smb_tree_is_connected(sr->tid_tree)) { status = NT_STATUS_INVALID_PARAMETER; goto errout; } /* * Moved this up from smb_ofile_open() */ if ((rc = smb_fsop_open(fnode, of->f_mode, of->f_cr)) != 0) { status = smb_errno2status(rc); goto errout; } /* * Complete this open (add to ofile lists) */ smb_ofile_open(sr, op, of); did_open = B_TRUE; /* * This MUST be done after ofile creation, so that explicitly * set timestamps can be remembered on the ofile, and setting * the readonly flag won't affect access via this open. */ if ((rc = smb_set_open_attributes(sr, of)) != 0) { status = smb_errno2status(rc); goto errout; } /* * We've already done access checks above, * and want this call to succeed even when * !(desired_access & FILE_READ_ATTRIBUTES), * so pass kcred here. */ op->fqi.fq_fattr.sa_mask = SMB_AT_ALL; (void) smb_node_getattr(sr, fnode, zone_kcred(), of, &op->fqi.fq_fattr); /* * Propagate the write-through mode from the open params * to the node: see the notes in the function header. * XXX: write_through should be a flag on the ofile. */ if (sr->sr_cfg->skc_sync_enable || (op->create_options & FILE_WRITE_THROUGH)) fnode->flags |= NODE_FLAGS_WRITE_THROUGH; /* * Set up the fileid and dosattr in open_param for response */ op->fileid = op->fqi.fq_fattr.sa_vattr.va_nodeid; op->dattr = op->fqi.fq_fattr.sa_dosattr; /* * Set up the file type in open_param for the response */ op->ftype = SMB_FTYPE_DISK; sr->smb_fid = of->f_fid; sr->fid_ofile = of; if (smb_node_is_file(fnode)) { op->dsize = op->fqi.fq_fattr.sa_vattr.va_size; } else { /* directory or symlink */ op->dsize = 0; } /* * Note: oplock_acquire happens in callers, because * how that happens is protocol-specific. */ if (sname != NULL) kmem_free(sname, MAXNAMELEN); if (fnode_wlock) smb_node_unlock(fnode); if (opening_incr) smb_node_dec_opening_count(fnode); if (fnode_held) smb_node_release(fnode); if (dnode_wlock) smb_node_unlock(dnode); if (dnode_held) smb_node_release(dnode); return (NT_STATUS_SUCCESS); errout: if (did_open) { smb_ofile_close(of, 0); /* rele via sr->fid_ofile */ } else if (of != NULL) { /* No other refs possible */ smb_ofile_free(of); } if (fnode_shrlk) smb_fsop_unshrlock(sr->user_cr, fnode, uniq_fid); if (created) { /* Try to roll-back create. */ smb_delete_new_object(sr); } if (sname != NULL) kmem_free(sname, MAXNAMELEN); if (fnode_wlock) smb_node_unlock(fnode); if (opening_incr) smb_node_dec_opening_count(fnode); if (fnode_held) smb_node_release(fnode); if (dnode_wlock) smb_node_unlock(dnode); if (dnode_held) smb_node_release(dnode); if (tree_fid != 0) smb_idpool_free(&tree->t_fid_pool, tree_fid); return (status); } /* * smb_set_open_attributes * * Last write time: * - If the last_write time specified in the open params is not 0 or -1, * use it as file's mtime. This will be considered an explicitly set * timestamps, not reset by subsequent writes. * * DOS attributes * - If we created_readonly, we now store the real DOS attributes * (including the readonly bit) so subsequent opens will see it. * * Returns: errno */ static int smb_set_open_attributes(smb_request_t *sr, smb_ofile_t *of) { smb_attr_t attr; smb_arg_open_t *op = &sr->sr_open; smb_node_t *node = of->f_node; int rc = 0; bzero(&attr, sizeof (smb_attr_t)); if (op->created_readonly) { attr.sa_dosattr = op->dattr | FILE_ATTRIBUTE_READONLY; attr.sa_mask |= SMB_AT_DOSATTR; } if (op->dsize != 0) { attr.sa_allocsz = op->dsize; attr.sa_mask |= SMB_AT_ALLOCSZ; } if ((op->mtime.tv_sec != 0) && (op->mtime.tv_sec != UINT_MAX)) { attr.sa_vattr.va_mtime = op->mtime; attr.sa_mask |= SMB_AT_MTIME; } if (attr.sa_mask != 0) rc = smb_node_setattr(sr, node, of->f_cr, of, &attr); return (rc); } /* * This function is used to delete a newly created object (file or * directory) if an error occurs after creation of the object. */ static void smb_delete_new_object(smb_request_t *sr) { smb_arg_open_t *op = &sr->sr_open; smb_fqi_t *fqi = &(op->fqi); uint32_t flags = 0; if (SMB_TREE_IS_CASEINSENSITIVE(sr)) flags |= SMB_IGNORE_CASE; if (SMB_TREE_SUPPORTS_CATIA(sr)) flags |= SMB_CATIA; if (op->create_options & FILE_DIRECTORY_FILE) (void) smb_fsop_rmdir(sr, sr->user_cr, fqi->fq_dnode, fqi->fq_last_comp, flags); else (void) smb_fsop_remove(sr, sr->user_cr, fqi->fq_dnode, fqi->fq_last_comp, flags); }