1 /*
2  * CDDL HEADER START
3  *
4  * The contents of this file are subject to the terms of the
5  * Common Development and Distribution License (the "License").
6  * You may not use this file except in compliance with the License.
7  *
8  * You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE
9  * or http://www.opensolaris.org/os/licensing.
10  * See the License for the specific language governing permissions
11  * and limitations under the License.
12  *
13  * When distributing Covered Code, include this CDDL HEADER in each
14  * file and include the License file at usr/src/OPENSOLARIS.LICENSE.
15  * If applicable, add the following below this CDDL HEADER, with the
16  * fields enclosed by brackets "[]" replaced with your own identifying
17  * information: Portions Copyright [yyyy] [name of copyright owner]
18  *
19  * CDDL HEADER END
20  */
21 /*
22  * Copyright (c) 2007, 2010, Oracle and/or its affiliates. All rights reserved.
23  * Copyright 2022 Tintri by DDN, Inc. All rights reserved.
24  * Copyright 2022-2023 RackTop Systems, Inc.
25  */
26 
27 /*
28  * General Structures Layout
29  * -------------------------
30  *
31  * This is a simplified diagram showing the relationship between most of the
32  * main structures.
33  *
34  * +-------------------+
35  * |     SMB_INFO      |
36  * +-------------------+
37  *          |
38  *          |
39  *          v
40  * +-------------------+       +-------------------+      +-------------------+
41  * |     SESSION       |<----->|     SESSION       |......|      SESSION      |
42  * +-------------------+       +-------------------+      +-------------------+
43  *   |          |
44  *   |          |
45  *   |          v
46  *   |  +-------------------+     +-------------------+   +-------------------+
47  *   |  |       USER        |<--->|       USER        |...|       USER        |
48  *   |  +-------------------+     +-------------------+   +-------------------+
49  *   |
50  *   |
51  *   v
52  * +-------------------+       +-------------------+      +-------------------+
53  * |       TREE        |<----->|       TREE        |......|       TREE        |
54  * +-------------------+       +-------------------+      +-------------------+
55  *      |         |
56  *      |         |
57  *      |         v
58  *      |     +-------+       +-------+      +-------+
59  *      |     | OFILE |<----->| OFILE |......| OFILE |
60  *      |     +-------+       +-------+      +-------+
61  *      |
62  *      |
63  *      v
64  *  +-------+       +------+      +------+
65  *  | ODIR  |<----->| ODIR |......| ODIR |
66  *  +-------+       +------+      +------+
67  *
68  *
69  * Odir State Machine
70  * ------------------
71  *
72  *    +-------------------------+
73  *    |  SMB_ODIR_STATE_OPEN    |<----------- open / creation
74  *    +-------------------------+
75  *	    |            ^
76  *	    | (first)    | (last)
77  *	    | lookup     | release
78  *	    v            |
79  *    +-------------------------+
80  *    | SMB_ODIR_STATE_IN_USE   |----
81  *    +-------------------------+   | lookup / release / read
82  *	    |                ^-------
83  *	    | close
84  *	    |
85  *	    v
86  *    +-------------------------+
87  *    | SMB_ODIR_STATE_CLOSING  |----
88  *    +-------------------------+   | close / release / read
89  *	    |                ^-------
90  *	    | (last) release
91  *	    |
92  *	    v
93  *    +-------------------------+
94  *    | SMB_ODIR_STATE_CLOSED   |----------> deletion
95  *    +-------------------------+
96  *
97  *
98  * SMB_ODIR_STATE_OPEN
99  * - the odir exists in the list of odirs of its tree
100  * - lookup is valid in this state. It will place a hold on the odir
101  *   by incrementing the reference count and the odir will transition
102  *   to SMB_ODIR_STATE_IN_USE
103  * - read/close/release not valid in this state
104  *
105  * SMB_ODIR_STATE_IN_USE
106  * - the odir exists in the list of odirs of its tree.
107  * - lookup is valid in this state. It will place a hold on the odir
108  *   by incrementing the reference count.
109  * - if the last hold is released the odir will transition
110  *   back to SMB_ODIR_STATE_OPEN
111  * - if a close is received the odir will transition to
112  *   SMB_ODIR_STATE_CLOSING.
113  *
114  * SMB_ODIR_STATE_CLOSING
115  * - the odir exists in the list of odirs of its tree.
116  * - lookup will fail in this state.
117  * - when the last hold is released the odir will transition
118  *   to SMB_ODIR_STATE_CLOSED.
119  *
120  * SMB_ODIR_STATE_CLOSED
121  * - the odir exists in the list of odirs of its tree.
122  * - there are no users of the odir (refcnt == 0)
123  * - the odir is being removed from the tree's list and deleted.
124  * - lookup will fail in this state.
125  * - read/close/release not valid in this state
126  *
127  * Comments
128  * --------
129  *    The state machine of the odir structures is controlled by 3 elements:
130  *      - The list of odirs of the tree it belongs to.
131  *      - The mutex embedded in the structure itself.
132  *      - The reference count.
133  *
134  *    There's a mutex embedded in the odir structure used to protect its fields
135  *    and there's a lock embedded in the list of odirs of a tree. To
136  *    increment or to decrement the reference count the mutex must be entered.
137  *    To insert the odir into the list of odirs of the tree and to remove
138  *    the odir from it, the lock must be entered in RW_WRITER mode.
139  *
140  *    In order to avoid deadlocks, when both (mutex and lock of the odir
141  *    list) have to be entered, the lock must be entered first.
142  *
143  *
144  * Odir Interface
145  * ---------------
146  * smb_odir_open(char *pathname)
147  *	Create an odir representing the directory specified in pathname and
148  *	add it into the tree's list of odirs.
149  *	Returns NT status.
150  *
151  * smb_odir_openfh(smb_ofile_t *of)
152  *	Create an odir representing the directory specified by the
153  *	existing open handle (from a prior open of the directory).
154  *	Returns NT status.
155  *
156  * smb_odir_openat(smb_node_t *unode)
157  *	Create an odir representing the extended attribute directory
158  *	associated with the file (or directory) represented by unode
159  *	and add it into the tree's list of odirs.
160  *	Returns NT status.
161  *
162  * smb_odir_t *odir = smb_tree_lookup_odir(..., odid)
163  *	Find the odir corresponding to the specified odid in the tree's
164  *	list of odirs. Place a hold on the odir.
165  *
166  * smb_odir_read(..., smb_odirent_t *odirent)
167  *	Find the next directory entry in the odir and return it in odirent.
168  *
169  * smb_odir_read_fileinfo(..., smb_fileinfo_t *)
170  *	Find the next directory entry in the odir. Return the details of
171  *	the directory entry in smb_fileinfo_t. (See odir internals below)
172  *
173  * smb_odir_read_streaminfo(..., smb_streaminfo_t *)
174  *	Find the next named stream entry in the odir. Return the details of
175  *	the named stream in smb_streaminfo_t.
176  *
177  * smb_odir_close(smb_odir_t *odir)
178  *  Close the odir.
179  *  The caller of close must have a hold on the odir being closed.
180  *  The hold should be released after closing.
181  *
182  * smb_odir_release(smb_odir_t *odir)
183  *	Release the hold on the odir, obtained by lookup.
184  *
185  *
186  * Odir Internals
187  * --------------
188  * The odir object represent an open directory search. Each read operation
189  * provides the caller with a structure containing information  pertaining
190  * to the next directory entry that matches the search criteria, namely
191  * the filename or match pattern and, in the case of smb_odir_read_fileinfo(),
192  * the search attributes.
193  *
194  * The odir maintains a buffer (d_buf) of directory entries read from
195  * the filesystem via a vop_readdir. The buffer is populated when a read
196  * request (smb_odir_next_odirent) finds that the buffer is empty or that
197  * the end of the buffer has been reached, and also when a new client request
198  * (find next) begins.
199  *
200  * The data in d_buf (that which is returned from the file system) can
201  * be in one of two formats. If the file system supports extended directory
202  * entries we request that the data be returned as edirent_t structures. If
203  * it does not the data will be returned as dirent64_t structures. For
204  * convenience, when the next directory entry is read from d_buf by
205  * smb_odir_next_odirent it is translated into an smb_odirent_t.
206  *
207  * smb_odir_read_fileinfo
208  * The processing required to obtain the information to populate the caller's
209  * smb_fileinfo_t differs depending upon whether the directory search is for a
210  * single specified filename or for multiple files matching a search pattern.
211  * Thus smb_odir_read_fileinfo uses two static functions:
212  * smb_odir_single_fileinfo - obtains the smb_fileinfo_t info for the single
213  * filename as specified in smb_odir_open request.
214  * smb_odir_wildcard_fileinfo - obtains the smb_fileinfo_t info for the filename
215  * returned from the smb_odir_next_odirent. This is called in a loop until
216  * an entry matching the search criteria is found or no more entries exist.
217  *
218  * If a directory entry is a VLNK, the name returned in the smb_fileinfo_t
219  * is the name of the directory entry but the attributes are the attribites
220  * of the file that is the target of the link. If the link target cannot
221  * be found the attributes returned are the attributes of the link itself.
222  *
223  * smb_odir_read_streaminfo
224  * In order for an odir to provide information about stream files it
225  * must be opened with smb_odir_openat(). smb_odir_read_streaminfo() can
226  * then be used to obtain the name and size of named stream files.
227  *
228  * Resuming a Search
229  * -----------------
230  * A directory search often consists of multiple client requests: an initial
231  * find_first request followed by zero or more find_next requests and a
232  * find_close request.
233  * The find_first request will open and lookup the odir, read its desired
234  * number of entries from the odir, then release the odir and return.
235  * A find_next request will lookup the odir and read its desired number of
236  * entries from the odir, then release the odir and return.
237  * At the end of the search the find_close request will close the odir.
238  *
239  * In order to be able to resume a directory search (find_next) the odir
240  * provides the capability for the caller to save one or more resume points
241  * (cookies) at the end of a request, and to specify which resume point
242  * (cookie) to restart from at the beginning of the next search.
243  *	smb_odir_save_cookie(..., cookie)
244  *	smb_odir_resume_at(smb_odir_resume_t *resume)
245  * A search can be resumed at a specified resume point (cookie), the resume
246  * point (cookie) stored at a specified index in the d_cookies array, or
247  * a specified filename. The latter (specified filename) is not yet supported.
248  *
249  * See smb_search, smb_find, smb_find_unique, and smb_trans2_find for details
250  */
251 
252 #include <smbsrv/smb_kproto.h>
253 #include <smbsrv/smb_fsops.h>
254 #include <smbsrv/smb_share.h>
255 #include <sys/extdirent.h>
256 
257 /* static functions */
258 static smb_odir_t *smb_odir_create(smb_request_t *, smb_node_t *,
259     const char *, uint16_t, uint16_t, cred_t *);
260 static int smb_odir_single_fileinfo(smb_request_t *, smb_odir_t *,
261     smb_fileinfo_t *);
262 static int smb_odir_wildcard_fileinfo(smb_request_t *, smb_odir_t *,
263     smb_odirent_t *, smb_fileinfo_t *);
264 static int smb_odir_next_odirent(smb_odir_t *, smb_odirent_t *);
265 static boolean_t smb_odir_lookup_link(smb_request_t *, smb_odir_t *,
266     char *, smb_node_t **);
267 static boolean_t smb_odir_match_name(smb_odir_t *, smb_odirent_t *);
268 static void smb_odir_delete(void *);
269 
270 
271 /*
272  * smb_odir_openpath
273  *
274  * Create an odir representing the directory specified in pathname.
275  *
276  * Returns:
277  *    NT Status
278  */
279 uint32_t
smb_odir_openpath(smb_request_t * sr,char * path,uint16_t sattr,uint32_t flags,smb_odir_t ** odp)280 smb_odir_openpath(smb_request_t *sr, char *path, uint16_t sattr,
281     uint32_t flags, smb_odir_t **odp)
282 {
283 	int		rc;
284 	smb_tree_t	*tree;
285 	smb_node_t	*dnode;
286 	char		pattern[MAXNAMELEN];
287 	uint16_t	odid;
288 	cred_t		*cr;
289 
290 	ASSERT(sr);
291 	ASSERT(sr->sr_magic == SMB_REQ_MAGIC);
292 	ASSERT(sr->tid_tree);
293 	ASSERT(sr->tid_tree->t_magic == SMB_TREE_MAGIC);
294 	*odp = NULL;
295 
296 	tree = sr->tid_tree;
297 
298 	if (sr->session->dialect < NT_LM_0_12)
299 		smb_convert_wildcards(path);
300 
301 	rc = smb_pathname_reduce(sr, sr->user_cr, path,
302 	    tree->t_snode, tree->t_snode, &dnode, pattern);
303 	if (rc != 0)
304 		return (smb_errno2status(rc));
305 
306 	if (!smb_node_is_dir(dnode)) {
307 		smb_node_release(dnode);
308 		return (NT_STATUS_OBJECT_PATH_NOT_FOUND);
309 	}
310 
311 	if (smb_fsop_access(sr, sr->user_cr, dnode, FILE_LIST_DIRECTORY) != 0) {
312 		smb_node_release(dnode);
313 		return (NT_STATUS_ACCESS_DENIED);
314 	}
315 
316 	if (smb_idpool_alloc(&tree->t_odid_pool, &odid)) {
317 		smb_node_release(dnode);
318 		return (NT_STATUS_TOO_MANY_OPENED_FILES);
319 	}
320 
321 	if (flags & SMB_ODIR_OPENF_BACKUP_INTENT)
322 		cr = smb_user_getprivcred(sr->uid_user);
323 	else
324 		cr = sr->uid_user->u_cred;
325 
326 	*odp = smb_odir_create(sr, dnode, pattern, sattr, odid, cr);
327 	smb_node_release(dnode);
328 
329 	return (0);
330 }
331 
332 /*
333  * smb_odir_openfh
334  *
335  * Create an odir representing the directory already opened on "of".
336  *
337  * Returns:
338  *    NT status
339  */
340 uint32_t
smb_odir_openfh(smb_request_t * sr,const char * pattern,uint16_t sattr,smb_odir_t ** odp)341 smb_odir_openfh(smb_request_t *sr, const char *pattern, uint16_t sattr,
342     smb_odir_t **odp)
343 {
344 	smb_ofile_t	*of = sr->fid_ofile;
345 
346 	*odp = NULL;
347 
348 	if (of->f_node == NULL || !smb_node_is_dir(of->f_node))
349 		return (NT_STATUS_INVALID_PARAMETER);
350 
351 	if ((of->f_granted_access & FILE_LIST_DIRECTORY) == 0)
352 		return (NT_STATUS_ACCESS_DENIED);
353 
354 	*odp = smb_odir_create(sr, of->f_node, pattern, sattr, 0, of->f_cr);
355 
356 	return (0);
357 }
358 
359 /*
360  * smb_odir_openat
361  *
362  * Create an odir representing the extended attribute directory
363  * associated with the file (or directory) represented by unode.
364  *
365  * Returns:
366  *    NT status
367  */
368 uint32_t
smb_odir_openat(smb_request_t * sr,smb_node_t * unode,smb_odir_t ** odp,boolean_t restricted)369 smb_odir_openat(smb_request_t *sr, smb_node_t *unode, smb_odir_t **odp,
370     boolean_t restricted)
371 {
372 	char		pattern[SMB_STREAM_PREFIX_LEN + 2];
373 	vnode_t		*xattr_dvp;
374 	cred_t		*cr;
375 	smb_node_t	*xattr_dnode;
376 	int		rc;
377 
378 	ASSERT(sr);
379 	ASSERT(sr->sr_magic == SMB_REQ_MAGIC);
380 	ASSERT(unode);
381 	ASSERT(unode->n_magic == SMB_NODE_MAGIC);
382 	*odp = NULL;
383 
384 	if (SMB_TREE_CONTAINS_NODE(sr, unode) == 0 ||
385 	    SMB_TREE_HAS_ACCESS(sr, ACE_LIST_DIRECTORY) == 0)
386 		return (NT_STATUS_ACCESS_DENIED);
387 
388 	cr = zone_kcred();
389 
390 	/* find the xattrdir vnode */
391 	rc = smb_vop_lookup_xattrdir(unode->vp, &xattr_dvp, LOOKUP_XATTR, cr);
392 	if (rc != 0)
393 		return (smb_errno2status(rc));
394 
395 	/* lookup the xattrdir's smb_node */
396 	xattr_dnode = smb_node_lookup(sr, NULL, cr, xattr_dvp, XATTR_DIR,
397 	    unode, NULL);
398 	VN_RELE(xattr_dvp);
399 	if (xattr_dnode == NULL)
400 		return (NT_STATUS_NO_MEMORY);
401 
402 	(void) snprintf(pattern, sizeof (pattern), "%s*", SMB_STREAM_PREFIX);
403 	*odp = smb_odir_create(sr, xattr_dnode, pattern,
404 	    SMB_SEARCH_ATTRIBUTES, 0, cr);
405 
406 	/* Causes restricted stream names to be hidden from the caller */
407 	if (restricted)
408 		(*odp)->d_flags |= SMB_ODIR_FLAG_RESTRICTED;
409 
410 	smb_node_release(xattr_dnode);
411 	return (0);
412 }
413 
414 /*
415  * smb_odir_hold
416  *
417  * A hold will only be granted if the odir is open or in_use.
418  */
419 boolean_t
smb_odir_hold(smb_odir_t * od)420 smb_odir_hold(smb_odir_t *od)
421 {
422 	ASSERT(od);
423 	ASSERT(od->d_magic == SMB_ODIR_MAGIC);
424 
425 	mutex_enter(&od->d_mutex);
426 
427 	switch (od->d_state) {
428 	case SMB_ODIR_STATE_OPEN:
429 		od->d_refcnt++;
430 		od->d_state = SMB_ODIR_STATE_IN_USE;
431 		break;
432 	case SMB_ODIR_STATE_IN_USE:
433 		od->d_refcnt++;
434 		break;
435 	case SMB_ODIR_STATE_CLOSING:
436 	case SMB_ODIR_STATE_CLOSED:
437 	default:
438 		mutex_exit(&od->d_mutex);
439 		return (B_FALSE);
440 	}
441 
442 	mutex_exit(&od->d_mutex);
443 	return (B_TRUE);
444 }
445 
446 /*
447  * If the odir is in SMB_ODIR_STATE_CLOSING and this release results in
448  * a refcnt of 0, change the state to SMB_ODIR_STATE_CLOSED and post the
449  * object for deletion.  Object deletion is deferred to avoid modifying
450  * a list while an iteration may be in progress.
451  */
452 void
smb_odir_release(smb_odir_t * od)453 smb_odir_release(smb_odir_t *od)
454 {
455 	smb_tree_t *tree = od->d_tree;
456 
457 	SMB_ODIR_VALID(od);
458 
459 	mutex_enter(&od->d_mutex);
460 	ASSERT(od->d_refcnt > 0);
461 
462 	switch (od->d_state) {
463 	case SMB_ODIR_STATE_OPEN:
464 		break;
465 	case SMB_ODIR_STATE_IN_USE:
466 		od->d_refcnt--;
467 		if (od->d_refcnt == 0)
468 			od->d_state = SMB_ODIR_STATE_OPEN;
469 		break;
470 	case SMB_ODIR_STATE_CLOSING:
471 		od->d_refcnt--;
472 		if (od->d_refcnt == 0) {
473 			od->d_state = SMB_ODIR_STATE_CLOSED;
474 			smb_llist_post(&tree->t_odir_list, od,
475 			    smb_odir_delete);
476 		}
477 		break;
478 	case SMB_ODIR_STATE_CLOSED:
479 	default:
480 		break;
481 	}
482 
483 	mutex_exit(&od->d_mutex);
484 }
485 
486 /*
487  * smb_odir_close
488  */
489 void
smb_odir_close(smb_odir_t * od)490 smb_odir_close(smb_odir_t *od)
491 {
492 	ASSERT(od);
493 	ASSERT(od->d_magic == SMB_ODIR_MAGIC);
494 
495 	mutex_enter(&od->d_mutex);
496 	ASSERT(od->d_refcnt > 0);
497 	switch (od->d_state) {
498 	case SMB_ODIR_STATE_OPEN:
499 		break;
500 	case SMB_ODIR_STATE_IN_USE:
501 		od->d_state = SMB_ODIR_STATE_CLOSING;
502 		break;
503 	case SMB_ODIR_STATE_CLOSING:
504 	case SMB_ODIR_STATE_CLOSED:
505 	default:
506 		break;
507 	}
508 	mutex_exit(&od->d_mutex);
509 }
510 
511 /*
512  * smb_odir_read
513  *
514  * Find the next directory entry matching the search pattern.
515  * No search attribute matching is performed.
516  *
517  * Returns:
518  *  0 - success.
519  *      - If a matching entry was found eof will be B_FALSE and
520  *        odirent will be populated.
521  * ENOENT
522  *      - If we've scanned to the end, eof will be B_TRUE.
523  * errno - other errors
524  */
525 int
smb_odir_read(smb_request_t * sr,smb_odir_t * od,smb_odirent_t * odirent,boolean_t * eof)526 smb_odir_read(smb_request_t *sr, smb_odir_t *od,
527     smb_odirent_t *odirent, boolean_t *eof)
528 {
529 	int		rc;
530 
531 	ASSERT(sr);
532 	ASSERT(sr->sr_magic == SMB_REQ_MAGIC);
533 	ASSERT(od);
534 	ASSERT(od->d_magic == SMB_ODIR_MAGIC);
535 	ASSERT(odirent);
536 
537 	mutex_enter(&od->d_mutex);
538 	ASSERT(od->d_refcnt > 0);
539 
540 	switch (od->d_state) {
541 	case SMB_ODIR_STATE_IN_USE:
542 	case SMB_ODIR_STATE_CLOSING:
543 		break;
544 	case SMB_ODIR_STATE_OPEN:
545 	case SMB_ODIR_STATE_CLOSED:
546 	default:
547 		mutex_exit(&od->d_mutex);
548 		return (EBADF);
549 	}
550 
551 	for (;;) {
552 		if ((rc = smb_odir_next_odirent(od, odirent)) != 0)
553 			break;
554 		if (smb_odir_match_name(od, odirent))
555 			break;
556 	}
557 
558 	mutex_exit(&od->d_mutex);
559 
560 	switch (rc) {
561 	case 0:
562 		*eof = B_FALSE;
563 		return (0);
564 	case ENOENT:
565 		*eof = B_TRUE;
566 		/* FALLTHROUGH */
567 	default:
568 		return (rc);
569 	}
570 }
571 
572 /*
573  * smb_odir_read_fileinfo
574  *
575  * Find the next directory entry matching the search pattern
576  * and attributes: od->d_pattern and od->d_sattr.
577  *
578  * If the search pattern specifies a single filename call
579  * smb_odir_single_fileinfo to get the file attributes and
580  * populate the caller's smb_fileinfo_t.
581  *
582  * If the search pattern contains wildcards call smb_odir_next_odirent
583  * to get the next directory entry then. Repeat until a matching
584  * filename is found. Call smb_odir_wildcard_fileinfo to get the
585  * file attributes and populate the caller's smb_fileinfo_t.
586  * This is repeated until a file matching the search criteria is found.
587  *
588  * Returns:
589  *  0 - success.
590  *      - If a matching entry was found eof will be B_FALSE and
591  *        fileinfo will be populated.
592  * ENOENT
593  *      - If at end of dir, eof will be B_TRUE.
594  * errno - other error
595  */
596 int
smb_odir_read_fileinfo(smb_request_t * sr,smb_odir_t * od,smb_fileinfo_t * fileinfo,uint16_t * eof)597 smb_odir_read_fileinfo(smb_request_t *sr, smb_odir_t *od,
598     smb_fileinfo_t *fileinfo, uint16_t *eof)
599 {
600 	int		rc, errnum;
601 	smb_odirent_t	*odirent;
602 
603 	ASSERT(sr);
604 	ASSERT(sr->sr_magic == SMB_REQ_MAGIC);
605 	ASSERT(od);
606 	ASSERT(od->d_magic == SMB_ODIR_MAGIC);
607 	ASSERT(fileinfo);
608 
609 	mutex_enter(&od->d_mutex);
610 	ASSERT(od->d_refcnt > 0);
611 
612 	switch (od->d_state) {
613 	case SMB_ODIR_STATE_IN_USE:
614 	case SMB_ODIR_STATE_CLOSING:
615 		break;
616 	case SMB_ODIR_STATE_OPEN:
617 	case SMB_ODIR_STATE_CLOSED:
618 	default:
619 		mutex_exit(&od->d_mutex);
620 		return (SET_ERROR(EBADF));
621 	}
622 
623 	if ((od->d_flags & SMB_ODIR_FLAG_WILDCARDS) == 0) {
624 		if (od->d_eof)
625 			rc = SET_ERROR(ENOENT);
626 		else
627 			rc = smb_odir_single_fileinfo(sr, od, fileinfo);
628 		od->d_eof = B_TRUE;
629 	} else {
630 		odirent = kmem_alloc(sizeof (smb_odirent_t), KM_SLEEP);
631 		for (;;) {
632 			mutex_enter(&sr->sr_mutex);
633 			if (sr->sr_state != SMB_REQ_STATE_ACTIVE) {
634 				mutex_exit(&sr->sr_mutex);
635 				rc = SET_ERROR(EINTR);
636 				break;
637 			}
638 			mutex_exit(&sr->sr_mutex);
639 			bzero(fileinfo, sizeof (smb_fileinfo_t));
640 			if ((rc = smb_odir_next_odirent(od, odirent)) != 0)
641 				break;
642 
643 			/* skip non utf8 filename */
644 			if (u8_validate(odirent->od_name,
645 			    strlen(odirent->od_name), NULL,
646 			    U8_VALIDATE_ENTIRE, &errnum) < 0)
647 				continue;
648 
649 			if (!smb_odir_match_name(od, odirent))
650 				continue;
651 
652 			rc = smb_odir_wildcard_fileinfo(sr, od, odirent,
653 			    fileinfo);
654 			if (rc == 0)
655 				break;
656 		}
657 		kmem_free(odirent, sizeof (smb_odirent_t));
658 	}
659 	mutex_exit(&od->d_mutex);
660 
661 	switch (rc) {
662 	case 0:
663 		*eof = 0;
664 		return (0);
665 	case ENOENT:
666 		*eof = 1;	/* per. FindFirst, FindNext spec. */
667 		/* FALLTHROUGH */
668 	default:
669 		return (rc);
670 	}
671 }
672 
673 /*
674  * smb_odir_read_streaminfo
675  *
676  * Find the next directory entry whose name begins with SMB_STREAM_PREFIX,
677  * and thus represents an NTFS named stream.
678  * No search attribute matching is performed.
679  * No case conflict name mangling is required for NTFS named stream names.
680  *
681  * Returns:
682  *  0 - success.
683  *      - If a matching entry was found eof will be B_FALSE and
684  *        sinfo will be populated.
685  *      - If there are no matching entries eof will be B_TRUE.
686  * errno - error
687  */
688 int
smb_odir_read_streaminfo(smb_request_t * sr,smb_odir_t * od,smb_streaminfo_t * sinfo,boolean_t * eof)689 smb_odir_read_streaminfo(smb_request_t *sr, smb_odir_t *od,
690     smb_streaminfo_t *sinfo, boolean_t *eof)
691 {
692 	int		rc;
693 	cred_t		*kcr;
694 	smb_odirent_t	*odirent;
695 	smb_node_t	*fnode;
696 	smb_attr_t	attr;
697 
698 	ASSERT(sr);
699 	ASSERT(sr->sr_magic == SMB_REQ_MAGIC);
700 	ASSERT(od);
701 	ASSERT(od->d_magic == SMB_ODIR_MAGIC);
702 	ASSERT(sinfo);
703 
704 	kcr = zone_kcred();
705 
706 	mutex_enter(&od->d_mutex);
707 	ASSERT(od->d_refcnt > 0);
708 
709 	switch (od->d_state) {
710 	case SMB_ODIR_STATE_IN_USE:
711 	case SMB_ODIR_STATE_CLOSING:
712 		break;
713 	case SMB_ODIR_STATE_OPEN:
714 	case SMB_ODIR_STATE_CLOSED:
715 	default:
716 		mutex_exit(&od->d_mutex);
717 		return (EBADF);
718 	}
719 
720 	/* Check that odir represents an xattr directory */
721 	if (!(od->d_flags & SMB_ODIR_FLAG_XATTR)) {
722 		*eof = B_TRUE;
723 		mutex_exit(&od->d_mutex);
724 		return (0);
725 	}
726 
727 	odirent = kmem_alloc(sizeof (smb_odirent_t), KM_SLEEP);
728 	bzero(&attr, sizeof (attr));
729 
730 	for (;;) {
731 		bzero(sinfo, sizeof (smb_streaminfo_t));
732 		if ((rc = smb_odir_next_odirent(od, odirent)) != 0)
733 			break;
734 
735 		if (strncmp(odirent->od_name, SMB_STREAM_PREFIX,
736 		    SMB_STREAM_PREFIX_LEN)) {
737 			continue;
738 		}
739 
740 		/*
741 		 * Hide streams that would be restricted if the caller
742 		 * is also restricted.
743 		 */
744 		if ((od->d_flags & SMB_ODIR_FLAG_RESTRICTED) != 0 &&
745 		    smb_strname_restricted(odirent->od_name))
746 			continue;
747 
748 		rc = smb_fsop_lookup(sr, od->d_cred, 0, od->d_tree->t_snode,
749 		    od->d_dnode, odirent->od_name, &fnode);
750 		if (rc == 0) {
751 			/*
752 			 * We just need the file sizes, and don't want
753 			 * EACCES failures here, so use kcred and pass
754 			 * NULL as the sr to skip sr->fid-ofile checks.
755 			 */
756 			attr.sa_mask = SMB_AT_SIZE | SMB_AT_ALLOCSZ;
757 			rc = smb_node_getattr(NULL, fnode, kcr, NULL, &attr);
758 			smb_node_release(fnode);
759 		}
760 
761 		if (rc == 0) {
762 			(void) strlcpy(sinfo->si_name,
763 			    odirent->od_name + SMB_STREAM_PREFIX_LEN,
764 			    sizeof (sinfo->si_name));
765 			sinfo->si_size = attr.sa_vattr.va_size;
766 			sinfo->si_alloc_size = attr.sa_allocsz;
767 			break;
768 		}
769 	}
770 	mutex_exit(&od->d_mutex);
771 
772 	kmem_free(odirent, sizeof (smb_odirent_t));
773 
774 	switch (rc) {
775 	case 0:
776 		*eof = B_FALSE;
777 		return (0);
778 	case ENOENT:
779 		*eof = B_TRUE;
780 		return (0);
781 	default:
782 		return (rc);
783 	}
784 }
785 
786 /*
787  * smb_odir_save_cookie
788  *
789  * Callers can save up to SMB_MAX_SEARCH cookies in the odir
790  * to be used as resume points for a 'find next' request.
791  */
792 void
smb_odir_save_cookie(smb_odir_t * od,int idx,uint32_t cookie)793 smb_odir_save_cookie(smb_odir_t *od, int idx, uint32_t cookie)
794 {
795 	ASSERT(od);
796 	ASSERT(od->d_magic == SMB_ODIR_MAGIC);
797 	ASSERT(idx >= 0 && idx < SMB_MAX_SEARCH);
798 
799 	mutex_enter(&od->d_mutex);
800 	od->d_cookies[idx] = cookie;
801 	mutex_exit(&od->d_mutex);
802 }
803 
804 /*
805  * smb_odir_save_fname
806  *
807  * Save a filename / offset pair, which are basically a
808  * one entry cache.  See smb_com_trans2_find_next2.
809  */
810 void
smb_odir_save_fname(smb_odir_t * od,uint32_t cookie,const char * fname)811 smb_odir_save_fname(smb_odir_t *od, uint32_t cookie, const char *fname)
812 {
813 	ASSERT(od);
814 	ASSERT(od->d_magic == SMB_ODIR_MAGIC);
815 
816 	mutex_enter(&od->d_mutex);
817 
818 	od->d_last_cookie = cookie;
819 	bzero(od->d_last_name, MAXNAMELEN);
820 	if (fname != NULL)
821 		(void) strlcpy(od->d_last_name, fname, MAXNAMELEN);
822 
823 	mutex_exit(&od->d_mutex);
824 }
825 
826 /*
827  * smb_odir_resume_at
828  *
829  * If SMB_ODIR_FLAG_WILDCARDS is not set, and we're rewinding,
830  * assume we're no longer at EOF.
831  *
832  * Wildcard searching can be resumed from:
833  * - the cookie saved at a specified index (SMBsearch, SMBfind).
834  * - a specified cookie (SMB_trans2_find)
835  * - a specified filename (SMB_trans2_find) - NOT SUPPORTED.
836  *   Defaults to continuing from where the last search ended.
837  *
838  * Continuation from where the last search ended (SMB_trans2_find)
839  * is implemented by saving the last cookie at a specific index (0)
840  * smb_odir_resume_at indicates a new request, so reset od->d_bufptr
841  * and d_eof to force a vop_readdir.
842  */
843 void
smb_odir_resume_at(smb_odir_t * od,smb_odir_resume_t * resume)844 smb_odir_resume_at(smb_odir_t *od, smb_odir_resume_t *resume)
845 {
846 	uint64_t save_offset;
847 
848 	ASSERT(od);
849 	ASSERT(od->d_magic == SMB_ODIR_MAGIC);
850 	ASSERT(resume);
851 
852 	if ((od->d_flags & SMB_ODIR_FLAG_WILDCARDS) == 0) {
853 		if (resume->or_type == SMB_ODIR_RESUME_COOKIE)
854 			od->d_eof = B_FALSE;
855 		return;
856 	}
857 	mutex_enter(&od->d_mutex);
858 
859 	save_offset = od->d_offset;
860 	switch (resume->or_type) {
861 
862 	default:
863 	case SMB_ODIR_RESUME_CONT:
864 		/* Continue where we left off. */
865 		break;
866 
867 	case SMB_ODIR_RESUME_IDX:
868 		/*
869 		 * This is used only by the (ancient) SMB_SEARCH.
870 		 * Modern clients use trans2 FindFirst, FindNext.
871 		 */
872 		ASSERT(resume->or_idx >= 0);
873 		ASSERT(resume->or_idx < SMB_MAX_SEARCH);
874 
875 		if ((resume->or_idx < 0) ||
876 		    (resume->or_idx >= SMB_MAX_SEARCH)) {
877 			resume->or_idx = 0;
878 		}
879 		od->d_offset = od->d_cookies[resume->or_idx];
880 		break;
881 
882 	case SMB_ODIR_RESUME_COOKIE:
883 		od->d_offset = resume->or_cookie;
884 		break;
885 
886 	case SMB_ODIR_RESUME_FNAME:
887 		/*
888 		 * If the name matches the last one saved,
889 		 * use the offset that was saved with it in
890 		 * the odir.  Otherwise use the cookie value
891 		 * in the resume data from the client.
892 		 */
893 		if (strcmp(resume->or_fname, od->d_last_name) &&
894 		    od->d_last_cookie != 0) {
895 			od->d_offset = od->d_last_cookie;
896 		} else if (resume->or_cookie != 0) {
897 			od->d_offset = resume->or_cookie;
898 		} /* else continue where we left off */
899 		break;
900 	}
901 
902 	if (od->d_offset != save_offset) {
903 		/* Force a vop_readdir to refresh d_buf */
904 		od->d_bufptr = NULL;
905 		od->d_eof = B_FALSE;
906 	}
907 
908 	mutex_exit(&od->d_mutex);
909 }
910 
911 
912 /* *** static functions *** */
913 
914 /*
915  * smb_odir_create
916  * Allocate and populate an odir obect and add it to the tree's list.
917  */
918 static smb_odir_t *
smb_odir_create(smb_request_t * sr,smb_node_t * dnode,const char * pattern,uint16_t sattr,uint16_t odid,cred_t * cr)919 smb_odir_create(smb_request_t *sr, smb_node_t *dnode,
920     const char *pattern, uint16_t sattr, uint16_t odid, cred_t *cr)
921 {
922 	smb_odir_t	*od;
923 	smb_tree_t	*tree;
924 
925 	ASSERT(sr);
926 	ASSERT(sr->sr_magic == SMB_REQ_MAGIC);
927 	ASSERT(sr->tid_tree);
928 	ASSERT(sr->tid_tree->t_magic == SMB_TREE_MAGIC);
929 	ASSERT(dnode);
930 	ASSERT(dnode->n_magic == SMB_NODE_MAGIC);
931 
932 	tree = sr->tid_tree;
933 
934 	od = kmem_cache_alloc(smb_cache_odir, KM_SLEEP);
935 	bzero(od, sizeof (smb_odir_t));
936 
937 	mutex_init(&od->d_mutex, NULL, MUTEX_DEFAULT, NULL);
938 
939 	/*
940 	 * Return this to the caller as if they had done
941 	 * smb_tree_lookup_odir() to obtain the odir.
942 	 */
943 	od->d_refcnt = 1;
944 	od->d_state = SMB_ODIR_STATE_IN_USE;
945 	od->d_magic = SMB_ODIR_MAGIC;
946 	od->d_opened_by_pid = sr->smb_pid;
947 	od->d_session = tree->t_session;
948 	od->d_cred = cr;
949 	/*
950 	 * grab a ref for od->d_user
951 	 * released in  smb_odir_delete()
952 	 */
953 	smb_user_hold_internal(sr->uid_user);
954 	od->d_user = sr->uid_user;
955 	od->d_tree = tree;
956 	od->d_dnode = dnode;
957 	smb_node_ref(dnode);
958 	od->d_odid = odid;
959 	od->d_sattr = sattr;
960 	(void) strlcpy(od->d_pattern, pattern, sizeof (od->d_pattern));
961 	od->d_flags = 0;
962 	if (smb_contains_wildcards(od->d_pattern))
963 		od->d_flags |= SMB_ODIR_FLAG_WILDCARDS;
964 	if (vfs_has_feature(dnode->vp->v_vfsp, VFSFT_DIRENTFLAGS))
965 		od->d_flags |= SMB_ODIR_FLAG_EDIRENT;
966 	if (smb_tree_has_feature(tree, SMB_TREE_CASEINSENSITIVE))
967 		od->d_flags |= SMB_ODIR_FLAG_IGNORE_CASE;
968 	if (smb_tree_has_feature(tree, SMB_TREE_SHORTNAMES))
969 		od->d_flags |= SMB_ODIR_FLAG_SHORTNAMES;
970 	if (smb_tree_has_feature(tree, SMB_TREE_ACEMASKONACCESS))
971 		od->d_flags |= SMB_ODIR_FLAG_ACEACCESS;
972 	if (SMB_TREE_SUPPORTS_CATIA(sr))
973 		od->d_flags |= SMB_ODIR_FLAG_CATIA;
974 	if (SMB_TREE_SUPPORTS_ABE(sr))
975 		od->d_flags |= SMB_ODIR_FLAG_ABE;
976 	if (dnode->flags & NODE_XATTR_DIR)
977 		od->d_flags |= SMB_ODIR_FLAG_XATTR;
978 	od->d_eof = B_FALSE;
979 
980 	smb_llist_enter(&tree->t_odir_list, RW_WRITER);
981 	smb_llist_insert_tail(&tree->t_odir_list, od);
982 	smb_llist_exit(&tree->t_odir_list);
983 
984 	atomic_inc_32(&tree->t_session->s_dir_cnt);
985 	return (od);
986 }
987 
988 /*
989  * Set a new pattern, attributes, and rewind.
990  */
991 void
smb_odir_reopen(smb_odir_t * od,const char * pattern,uint16_t sattr)992 smb_odir_reopen(smb_odir_t *od, const char *pattern, uint16_t sattr)
993 {
994 
995 	SMB_ODIR_VALID(od);
996 
997 	mutex_enter(&od->d_mutex);
998 	od->d_sattr = sattr;
999 	(void) strlcpy(od->d_pattern, pattern, sizeof (od->d_pattern));
1000 	if (smb_contains_wildcards(od->d_pattern))
1001 		od->d_flags |= SMB_ODIR_FLAG_WILDCARDS;
1002 	else
1003 		od->d_flags &= ~SMB_ODIR_FLAG_WILDCARDS;
1004 
1005 	/* Internal smb_odir_resume_at */
1006 	od->d_offset = 0;
1007 	od->d_bufptr = NULL;
1008 	od->d_eof = B_FALSE;
1009 
1010 	mutex_exit(&od->d_mutex);
1011 }
1012 
1013 /*
1014  * Delete an odir.
1015  *
1016  * Remove the odir from the tree list before freeing resources
1017  * associated with the odir.
1018  */
1019 static void
smb_odir_delete(void * arg)1020 smb_odir_delete(void *arg)
1021 {
1022 	smb_tree_t	*tree;
1023 	smb_odir_t	*od = (smb_odir_t *)arg;
1024 
1025 	SMB_ODIR_VALID(od);
1026 	ASSERT(od->d_refcnt == 0);
1027 	ASSERT(od->d_state == SMB_ODIR_STATE_CLOSED);
1028 
1029 	tree = od->d_tree;
1030 	smb_llist_enter(&tree->t_odir_list, RW_WRITER);
1031 	smb_llist_remove(&tree->t_odir_list, od);
1032 	if (od->d_odid != 0)
1033 		smb_idpool_free(&tree->t_odid_pool, od->d_odid);
1034 	atomic_dec_32(&tree->t_session->s_dir_cnt);
1035 	smb_llist_exit(&tree->t_odir_list);
1036 
1037 	/*
1038 	 * This odir is no longer on t_odir_list, however...
1039 	 *
1040 	 * This is called via smb_llist_post, which means it may run
1041 	 * BEFORE smb_odir_release drops d_mutex (if another thread
1042 	 * flushes the delete queue before we do).  Synchronize.
1043 	 */
1044 	mutex_enter(&od->d_mutex);
1045 	mutex_exit(&od->d_mutex);
1046 
1047 	od->d_magic = 0;
1048 	smb_node_release(od->d_dnode);
1049 	smb_user_release(od->d_user);
1050 	mutex_destroy(&od->d_mutex);
1051 	kmem_cache_free(smb_cache_odir, od);
1052 }
1053 
1054 boolean_t smb_use_fs_abe = B_FALSE;
1055 
1056 /*
1057  * smb_odir_next_odirent
1058  *
1059  * Find the next directory entry in d_buf. If d_bufptr is NULL (buffer
1060  * is empty or we've reached the end of it), read the next set of
1061  * entries from the file system (vop_readdir).
1062  *
1063  * File systems which support VFSFT_EDIRENT_FLAGS will return the
1064  * directory entries as a buffer of edirent_t structure. Others will
1065  * return a buffer of dirent64_t structures.  For simplicity translate
1066  * the data into an smb_odirent_t structure.
1067  * The ed_name/d_name in d_buf is NULL terminated by the file system.
1068  *
1069  * Some file systems can have directories larger than SMB_MAXDIRSIZE.
1070  * If the odirent offset >= SMB_MAXDIRSIZE return ENOENT and set d_eof
1071  * to true to stop subsequent calls to smb_vop_readdir.
1072  *
1073  * Returns:
1074  *      0 - success. odirent is populated with the next directory entry
1075  * ENOENT - no more directory entries
1076  *  errno - error
1077  */
1078 static int
smb_odir_next_odirent(smb_odir_t * od,smb_odirent_t * odirent)1079 smb_odir_next_odirent(smb_odir_t *od, smb_odirent_t *odirent)
1080 {
1081 	int		rc;
1082 	int		reclen;
1083 	int		eof;
1084 	dirent64_t	*dp;
1085 	edirent_t	*edp;
1086 	char		*np;
1087 	uint32_t	rddir_flags = 0;
1088 
1089 	ASSERT(MUTEX_HELD(&od->d_mutex));
1090 
1091 	bzero(odirent, sizeof (smb_odirent_t));
1092 
1093 	/*
1094 	 * VOP_READDIR() won't return until either the buffer has filled or the
1095 	 * end of the directory is reached. As a result, when we pass this flag,
1096 	 * calls on very large directories can take an unacceptably long time to
1097 	 * complete when the user doesn't have access to most entries. Until we
1098 	 * can cap the amount of time spent in this call, callers will manually
1099 	 * apply ABE to returned entries, instead of passing this flag.
1100 	 */
1101 	if (smb_use_fs_abe && (od->d_flags & SMB_ODIR_FLAG_ABE) != 0)
1102 		rddir_flags |= SMB_ABE;
1103 	if (od->d_flags & SMB_ODIR_FLAG_EDIRENT)
1104 		rddir_flags |= SMB_EDIRENT;
1105 
1106 	if (od->d_bufptr != NULL) {
1107 		if (od->d_flags & SMB_ODIR_FLAG_EDIRENT)
1108 			reclen = od->d_edp->ed_reclen;
1109 		else
1110 			reclen = od->d_dp->d_reclen;
1111 
1112 		if (reclen == 0) {
1113 			od->d_bufptr = NULL;
1114 		} else {
1115 			od->d_bufptr += reclen;
1116 			if (od->d_bufptr >= od->d_buf + od->d_bufsize)
1117 				od->d_bufptr = NULL;
1118 		}
1119 	}
1120 
1121 	if (od->d_bufptr == NULL) {
1122 		if (od->d_eof)
1123 			return (ENOENT);
1124 
1125 		od->d_bufsize = sizeof (od->d_buf);
1126 
1127 		rc = smb_vop_readdir(od->d_dnode->vp, od->d_offset,
1128 		    od->d_buf, &od->d_bufsize, &eof, rddir_flags, od->d_cred);
1129 
1130 		if ((rc == 0) && (od->d_bufsize == 0))
1131 			rc = ENOENT;
1132 
1133 		if (rc != 0) {
1134 			od->d_bufptr = NULL;
1135 			od->d_bufsize = 0;
1136 			return (rc);
1137 		}
1138 
1139 		od->d_eof = (eof != 0);
1140 		od->d_bufptr = od->d_buf;
1141 	}
1142 
1143 	if (od->d_flags & SMB_ODIR_FLAG_EDIRENT)
1144 		od->d_offset = od->d_edp->ed_off;
1145 	else
1146 		od->d_offset = od->d_dp->d_off;
1147 
1148 	if (od->d_offset >= SMB_MAXDIRSIZE) {
1149 		od->d_bufptr = NULL;
1150 		od->d_bufsize = 0;
1151 		od->d_eof = B_TRUE;
1152 		return (ENOENT);
1153 	}
1154 
1155 	if (od->d_flags & SMB_ODIR_FLAG_EDIRENT) {
1156 		edp = od->d_edp;
1157 		odirent->od_ino = edp->ed_ino;
1158 		odirent->od_eflags = edp->ed_eflags;
1159 		np = edp->ed_name;
1160 	} else {
1161 		dp = od->d_dp;
1162 		odirent->od_ino = dp->d_ino;
1163 		odirent->od_eflags = 0;
1164 		np =  dp->d_name;
1165 	}
1166 
1167 	if ((od->d_flags & SMB_ODIR_FLAG_CATIA) &&
1168 	    ((od->d_flags & SMB_ODIR_FLAG_XATTR) == 0)) {
1169 		smb_vop_catia_v4tov5(np, odirent->od_name,
1170 		    sizeof (odirent->od_name));
1171 	} else {
1172 		(void) strlcpy(odirent->od_name, np,
1173 		    sizeof (odirent->od_name));
1174 	}
1175 
1176 	return (0);
1177 }
1178 
1179 /*
1180  * smb_odir_single_fileinfo
1181  *
1182  * Lookup the file identified by od->d_pattern.
1183  *
1184  * If the looked up file is a link, we attempt to lookup the link target
1185  * to use its attributes in place of those of the files's.
1186  * If we fail to lookup the target of the link we use the original
1187  * file's attributes.
1188  * Check if the attributes match the search attributes.
1189  *
1190  * Returns: 0 - success
1191  *     ENOENT - no match
1192  *      errno - error
1193  */
1194 static int
smb_odir_single_fileinfo(smb_request_t * sr,smb_odir_t * od,smb_fileinfo_t * fileinfo)1195 smb_odir_single_fileinfo(smb_request_t *sr, smb_odir_t *od,
1196     smb_fileinfo_t *fileinfo)
1197 {
1198 	int		rc;
1199 	smb_node_t	*fnode, *tgt_node;
1200 	smb_attr_t	attr;
1201 	ino64_t		fid;
1202 	char		*name;
1203 	boolean_t	case_conflict = B_FALSE;
1204 	int		lookup_flags, flags = 0;
1205 	vnode_t		*vp;
1206 
1207 	ASSERT(sr);
1208 	ASSERT(sr->sr_magic == SMB_REQ_MAGIC);
1209 	ASSERT(od);
1210 	ASSERT(od->d_magic == SMB_ODIR_MAGIC);
1211 
1212 	ASSERT(MUTEX_HELD(&od->d_mutex));
1213 	bzero(fileinfo, sizeof (smb_fileinfo_t));
1214 
1215 	rc = smb_fsop_lookup(sr, od->d_cred, 0, od->d_tree->t_snode,
1216 	    od->d_dnode, od->d_pattern, &fnode);
1217 	if (rc != 0)
1218 		return (rc);
1219 
1220 	/*
1221 	 * If case sensitive, do a case insensitive smb_vop_lookup to
1222 	 * check for case conflict
1223 	 */
1224 	if (od->d_flags & SMB_ODIR_FLAG_IGNORE_CASE) {
1225 		lookup_flags = SMB_IGNORE_CASE;
1226 		if (od->d_flags & SMB_ODIR_FLAG_CATIA)
1227 			lookup_flags |= SMB_CATIA;
1228 
1229 		rc = smb_vop_lookup(od->d_dnode->vp, fnode->od_name, &vp,
1230 		    NULL, lookup_flags, &flags, od->d_tree->t_snode->vp,
1231 		    NULL, od->d_cred);
1232 		if (rc != 0)
1233 			return (rc);
1234 		VN_RELE(vp);
1235 
1236 		if (flags & ED_CASE_CONFLICT)
1237 			case_conflict = B_TRUE;
1238 	}
1239 
1240 	bzero(&attr, sizeof (attr));
1241 	attr.sa_mask = SMB_AT_ALL;
1242 	rc = smb_node_getattr(NULL, fnode, zone_kcred(), NULL, &attr);
1243 	if (rc != 0) {
1244 		smb_node_release(fnode);
1245 		return (rc);
1246 	}
1247 
1248 
1249 	/* follow link to get target node & attr */
1250 	if (smb_node_is_symlink(fnode) &&
1251 	    smb_odir_lookup_link(sr, od, fnode->od_name, &tgt_node)) {
1252 		smb_node_release(fnode);
1253 		fnode = tgt_node;
1254 		attr.sa_mask = SMB_AT_ALL;
1255 		rc = smb_node_getattr(NULL, fnode, zone_kcred(), NULL, &attr);
1256 		if (rc != 0) {
1257 			smb_node_release(fnode);
1258 			return (rc);
1259 		}
1260 	}
1261 
1262 	/* check search attributes */
1263 	if (!smb_sattr_check(attr.sa_dosattr, od->d_sattr)) {
1264 		smb_node_release(fnode);
1265 		return (ENOENT);
1266 	}
1267 
1268 	name = fnode->od_name;
1269 	if (od->d_flags & SMB_ODIR_FLAG_SHORTNAMES) {
1270 		fid = attr.sa_vattr.va_nodeid;
1271 		if (case_conflict || smb_needs_mangled(name)) {
1272 			smb_mangle(name, fid, fileinfo->fi_shortname,
1273 			    SMB_SHORTNAMELEN);
1274 		}
1275 		if (case_conflict)
1276 			name = fileinfo->fi_shortname;
1277 	}
1278 
1279 	(void) strlcpy(fileinfo->fi_name, name, sizeof (fileinfo->fi_name));
1280 
1281 	fileinfo->fi_dosattr = attr.sa_dosattr;
1282 	fileinfo->fi_nodeid = attr.sa_vattr.va_nodeid;
1283 	fileinfo->fi_size = attr.sa_vattr.va_size;
1284 	fileinfo->fi_alloc_size = attr.sa_allocsz;
1285 	fileinfo->fi_atime = attr.sa_vattr.va_atime;
1286 	fileinfo->fi_mtime = attr.sa_vattr.va_mtime;
1287 	fileinfo->fi_ctime = attr.sa_vattr.va_ctime;
1288 	if (attr.sa_crtime.tv_sec)
1289 		fileinfo->fi_crtime = attr.sa_crtime;
1290 	else
1291 		fileinfo->fi_crtime = attr.sa_vattr.va_mtime;
1292 
1293 	smb_node_release(fnode);
1294 	return (0);
1295 }
1296 
1297 /*
1298  * smb_odir_wildcard_fileinfo
1299  *
1300  * odirent contains a directory entry, obtained from a vop_readdir.
1301  * If a case conflict is identified the filename is mangled and the
1302  * shortname is used as 'name', in place of odirent->od_name.
1303  *
1304  * If the looked up file is a link, we attempt to lookup the link target
1305  * to use its attributes in place of those of the files's.
1306  * If we fail to lookup the target of the link we use the original
1307  * file's attributes.
1308  * Check if the attributes match the search attributes.
1309  *
1310  * Although some file systems can have directories larger than
1311  * SMB_MAXDIRSIZE smb_odir_next_odirent ensures that no offset larger
1312  * than SMB_MAXDIRSIZE is returned.  It is therefore safe to use the
1313  * offset as the cookie (uint32_t).
1314  *
1315  * Returns: 0 - success (return this entry)
1316  *  any errno - no match, proceed to next entry
1317  */
1318 static int
smb_odir_wildcard_fileinfo(smb_request_t * sr,smb_odir_t * od,smb_odirent_t * odirent,smb_fileinfo_t * fileinfo)1319 smb_odir_wildcard_fileinfo(smb_request_t *sr, smb_odir_t *od,
1320     smb_odirent_t *odirent, smb_fileinfo_t *fileinfo)
1321 {
1322 	smb_attr_t	attr;
1323 	char		*name;
1324 	vnode_t		*fvp = NULL;
1325 	int		de_flags;
1326 	int		rc;
1327 	boolean_t	case_conflict;
1328 
1329 	ASSERT(sr);
1330 	ASSERT(sr->sr_magic == SMB_REQ_MAGIC);
1331 	ASSERT(od);
1332 	ASSERT(od->d_magic == SMB_ODIR_MAGIC);
1333 
1334 	ASSERT(MUTEX_HELD(&od->d_mutex));
1335 	bzero(fileinfo, sizeof (smb_fileinfo_t));
1336 
1337 	bzero(&attr, sizeof (attr));
1338 	attr.sa_mask = SMB_AT_ALL;
1339 
1340 	/*
1341 	 * Lookup the vnode and get attributes.  We have the real
1342 	 * (on disk) name here from readdir, so CS lookup.
1343 	 * NB the getattr is done with kcred.
1344 	 */
1345 	rc = smb_vop_lookup(od->d_dnode->vp, odirent->od_name, &fvp,
1346 	    NULL, SMB_CASE_SENSITIVE, &de_flags,
1347 	    od->d_tree->t_snode->vp, &attr, od->d_cred);
1348 
1349 	if (rc != 0)
1350 		return (rc);
1351 
1352 	/*
1353 	 * follow link to get target node & attr
1354 	 */
1355 	if (attr.sa_vattr.va_type == VLNK &&
1356 	    (attr.sa_dosattr & FILE_ATTRIBUTE_REPARSE_POINT) == 0) {
1357 		/*
1358 		 * Follow the symlink (lookup again w/ follow)
1359 		 * Like smb_odir_lookup_link
1360 		 *
1361 		 * Could avoid creating an smb_node_t here,
1362 		 * but symlinks are not so common.
1363 		 */
1364 		smb_node_t *tnode = NULL;
1365 		vnode_t *tvp = NULL;
1366 
1367 		if (smb_odir_lookup_link(sr, od, odirent->od_name, &tnode)) {
1368 
1369 			attr.sa_mask = SMB_AT_ALL;
1370 			rc = smb_fsop_getattr(NULL, zone_kcred(), tnode, &attr);
1371 			if (rc != 0) {
1372 				smb_node_release(tnode);
1373 				VN_RELE(fvp);
1374 				return (rc);
1375 			}
1376 
1377 			/* Use the link target as fvp */
1378 			tvp = tnode->vp;
1379 			VN_HOLD(tvp);
1380 			smb_node_release(tnode);
1381 
1382 			VN_RELE(fvp);
1383 			fvp = tvp;
1384 		}
1385 	}
1386 
1387 	/*
1388 	 * skip system files
1389 	 * Like smb_node_is_system(fnode)
1390 	 */
1391 	if (smb_node_is_vfsroot(od->d_dnode) &&
1392 	    (strcasecmp(odirent->od_name, ".$EXTEND") == 0)) {
1393 		VN_RELE(fvp);
1394 		return (ENOENT);
1395 	}
1396 
1397 	/*
1398 	 * check search attributes
1399 	 */
1400 	if (!smb_sattr_check(attr.sa_dosattr, od->d_sattr)) {
1401 		VN_RELE(fvp);
1402 		return (ENOENT);
1403 	}
1404 
1405 	/*
1406 	 * Access Based Enumeration (ABE) checks
1407 	 * Skip this entry if the user can't read it.
1408 	 */
1409 	if ((od->d_flags & SMB_ODIR_FLAG_ABE) != 0) {
1410 		int atype;
1411 		int aflags;
1412 
1413 		if ((od->d_flags & SMB_ODIR_FLAG_ACEACCESS) != 0) {
1414 			atype = V_ACE_MASK;
1415 			aflags = ACE_READ_DATA;
1416 		} else {
1417 			atype = 0;
1418 			aflags = S_IRUSR;
1419 		}
1420 		rc = smb_vop_access(fvp, aflags, atype,
1421 		    od->d_dnode->vp, od->d_cred);
1422 		if (rc != 0) {
1423 			/* skip this entry */
1424 			VN_RELE(fvp);
1425 			return (rc);
1426 		}
1427 	}
1428 
1429 	/*
1430 	 * Deal with names that have conflicts (other names
1431 	 * that match this one if compared case-insensitive)
1432 	 */
1433 	name = odirent->od_name;
1434 	if (od->d_flags & SMB_ODIR_FLAG_SHORTNAMES) {
1435 		case_conflict = ((od->d_flags & SMB_ODIR_FLAG_IGNORE_CASE) &&
1436 		    (odirent->od_eflags & ED_CASE_CONFLICT));
1437 		if (case_conflict || smb_needs_mangled(name)) {
1438 			smb_mangle(name, odirent->od_ino,
1439 			    fileinfo->fi_shortname, SMB_SHORTNAMELEN);
1440 		}
1441 		if (case_conflict)
1442 			name = fileinfo->fi_shortname;
1443 	}
1444 
1445 	(void) strlcpy(fileinfo->fi_name, name, sizeof (fileinfo->fi_name));
1446 
1447 	fileinfo->fi_cookie = (uint32_t)od->d_offset;
1448 	fileinfo->fi_dosattr = attr.sa_dosattr;
1449 	fileinfo->fi_nodeid = attr.sa_vattr.va_nodeid;
1450 	fileinfo->fi_size = attr.sa_vattr.va_size;
1451 	fileinfo->fi_alloc_size = attr.sa_allocsz;
1452 	fileinfo->fi_atime = attr.sa_vattr.va_atime;
1453 	fileinfo->fi_mtime = attr.sa_vattr.va_mtime;
1454 	fileinfo->fi_ctime = attr.sa_vattr.va_ctime;
1455 	if (attr.sa_crtime.tv_sec)
1456 		fileinfo->fi_crtime = attr.sa_crtime;
1457 	else
1458 		fileinfo->fi_crtime = attr.sa_vattr.va_mtime;
1459 
1460 
1461 	VN_RELE(fvp);
1462 
1463 	return (0);
1464 }
1465 
1466 /*
1467  * smb_odir_lookup_link
1468  *
1469  * If the file is a symlink we lookup the object to which the
1470  * symlink refers so that we can return its attributes.
1471  * This can cause a problem if a symlink in a sub-directory
1472  * points to a parent directory (some UNIX GUI's create a symlink
1473  * in $HOME/.desktop that points to the user's home directory).
1474  * Some Windows applications (e.g. virus scanning) loop/hang
1475  * trying to follow this recursive path and there is little
1476  * we can do because the path is constructed on the client.
1477  * smb_dirsymlink_enable allows an end-user to disable
1478  * symlinks to directories. Symlinks to other object types
1479  * should be unaffected.
1480  *
1481  * Returns: B_TRUE  - followed link. tgt_node and tgt_attr set
1482  *          B_FALSE - link not followed
1483  */
1484 static boolean_t
smb_odir_lookup_link(smb_request_t * sr,smb_odir_t * od,char * fname,smb_node_t ** tgt_node)1485 smb_odir_lookup_link(smb_request_t *sr, smb_odir_t *od,
1486     char *fname, smb_node_t **tgt_node)
1487 {
1488 	int rc;
1489 	uint32_t flags = SMB_FOLLOW_LINKS | SMB_CASE_SENSITIVE;
1490 
1491 	rc = smb_fsop_lookup(sr, od->d_cred, flags,
1492 	    od->d_tree->t_snode, od->d_dnode, fname, tgt_node);
1493 	if (rc != 0) {
1494 		*tgt_node = NULL;
1495 		return (B_FALSE);
1496 	}
1497 
1498 	if (smb_node_is_dir(*tgt_node) && (!smb_dirsymlink_enable)) {
1499 		smb_node_release(*tgt_node);
1500 		*tgt_node = NULL;
1501 		return (B_FALSE);
1502 	}
1503 
1504 	return (B_TRUE);
1505 }
1506 
1507 /*
1508  * smb_odir_match_name
1509  *
1510  * Check if the directory entry name matches the search pattern:
1511  * - Don't match reserved dos filenames.
1512  * - Check if odirent->od_name matches od->d_pattern.
1513  * - If shortnames are supported, generate the shortname from
1514  *   odirent->od_name and check if it matches od->d_pattern.
1515  */
1516 static boolean_t
smb_odir_match_name(smb_odir_t * od,smb_odirent_t * odirent)1517 smb_odir_match_name(smb_odir_t *od, smb_odirent_t *odirent)
1518 {
1519 	char	*name = odirent->od_name;
1520 	char	shortname[SMB_SHORTNAMELEN];
1521 	ino64_t	ino = odirent->od_ino;
1522 	boolean_t ci = (od->d_flags & SMB_ODIR_FLAG_IGNORE_CASE) != 0;
1523 
1524 	if (smb_is_reserved_dos_name(name))
1525 		return (B_FALSE);
1526 
1527 	if (smb_match(od->d_pattern, name, ci))
1528 		return (B_TRUE);
1529 
1530 	if (od->d_flags & SMB_ODIR_FLAG_SHORTNAMES) {
1531 		smb_mangle(name, ino, shortname, SMB_SHORTNAMELEN);
1532 		if (smb_match(od->d_pattern, shortname, ci))
1533 			return (B_TRUE);
1534 	}
1535 
1536 	return (B_FALSE);
1537 }
1538