1da6c28aaSamw /* 2da6c28aaSamw * CDDL HEADER START 3da6c28aaSamw * 4da6c28aaSamw * The contents of this file are subject to the terms of the 5da6c28aaSamw * Common Development and Distribution License (the "License"). 6da6c28aaSamw * You may not use this file except in compliance with the License. 7da6c28aaSamw * 8da6c28aaSamw * You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE 9da6c28aaSamw * or http://www.opensolaris.org/os/licensing. 10da6c28aaSamw * See the License for the specific language governing permissions 11da6c28aaSamw * and limitations under the License. 12da6c28aaSamw * 13da6c28aaSamw * When distributing Covered Code, include this CDDL HEADER in each 14da6c28aaSamw * file and include the License file at usr/src/OPENSOLARIS.LICENSE. 15da6c28aaSamw * If applicable, add the following below this CDDL HEADER, with the 16da6c28aaSamw * fields enclosed by brackets "[]" replaced with your own identifying 17da6c28aaSamw * information: Portions Copyright [yyyy] [name of copyright owner] 18da6c28aaSamw * 19da6c28aaSamw * CDDL HEADER END 20da6c28aaSamw */ 21da6c28aaSamw /* 22dc20a302Sas * Copyright 2008 Sun Microsystems, Inc. All rights reserved. 23da6c28aaSamw * Use is subject to license terms. 24da6c28aaSamw */ 25da6c28aaSamw 26da6c28aaSamw /* 27da6c28aaSamw * Structures and type definitions for the SMB module. 28da6c28aaSamw */ 29da6c28aaSamw 30faa1795aSjb #ifndef _SMBSRV_SMB_KTYPES_H 31faa1795aSjb #define _SMBSRV_SMB_KTYPES_H 32da6c28aaSamw 33da6c28aaSamw #ifdef __cplusplus 34da6c28aaSamw extern "C" { 35da6c28aaSamw #endif 36da6c28aaSamw 37faa1795aSjb #include <sys/note.h> 38da6c28aaSamw #include <sys/systm.h> 39da6c28aaSamw #include <sys/param.h> 40da6c28aaSamw #include <sys/types.h> 41da6c28aaSamw #include <sys/synch.h> 42da6c28aaSamw #include <sys/taskq.h> 433db3f65cSamw #include <sys/socket.h> 44da6c28aaSamw #include <sys/acl.h> 45da6c28aaSamw #include <sys/sdt.h> 46c8ec8eeaSjose borrego #include <sys/stat.h> 47da6c28aaSamw #include <sys/vnode.h> 48da6c28aaSamw #include <sys/cred.h> 49faa1795aSjb #include <sys/fem.h> 50faa1795aSjb #include <sys/door.h> 51da6c28aaSamw #include <smbsrv/smb.h> 52da6c28aaSamw #include <smbsrv/smbinfo.h> 53da6c28aaSamw #include <smbsrv/mbuf.h> 546537f381Sas #include <smbsrv/smb_sid.h> 553db3f65cSamw #include <smbsrv/smb_xdr.h> 5621b7895dSjb #include <smbsrv/netbios.h> 57da6c28aaSamw #include <smbsrv/smb_vops.h> 58da6c28aaSamw #include <smbsrv/mlsvc.h> 59da6c28aaSamw 60faa1795aSjb struct smb_request; 61faa1795aSjb struct smb_server; 626537f381Sas struct smb_sd; 63da6c28aaSamw 64da6c28aaSamw int smb_noop(void *, size_t, int); 65da6c28aaSamw 66da6c28aaSamw #define SMB_AUDIT_STACK_DEPTH 16 67da6c28aaSamw #define SMB_AUDIT_BUF_MAX_REC 16 68da6c28aaSamw #define SMB_AUDIT_NODE 0x00000001 69da6c28aaSamw 70c8ec8eeaSjose borrego /* 71c8ec8eeaSjose borrego * Maximum number of records returned in SMBsearch, SMBfind 72c8ec8eeaSjose borrego * and SMBfindunique response. Value set to 10 for compatibility 73c8ec8eeaSjose borrego * with Windows. 74c8ec8eeaSjose borrego */ 75c8ec8eeaSjose borrego #define SMB_MAX_SEARCH 10 76c8ec8eeaSjose borrego 77*2c1b14e5Sjose borrego #define SMB_SEARCH_HIDDEN(sattr) ((sattr) & FILE_ATTRIBUTE_HIDDEN) 78*2c1b14e5Sjose borrego #define SMB_SEARCH_SYSTEM(sattr) ((sattr) & FILE_ATTRIBUTE_SYSTEM) 79*2c1b14e5Sjose borrego #define SMB_SEARCH_DIRECTORY(sattr) ((sattr) & FILE_ATTRIBUTE_DIRECTORY) 80*2c1b14e5Sjose borrego 81*2c1b14e5Sjose borrego 82da6c28aaSamw extern uint32_t smb_audit_flags; 83da6c28aaSamw 84da6c28aaSamw typedef struct { 85da6c28aaSamw uint32_t anr_refcnt; 86da6c28aaSamw int anr_depth; 87da6c28aaSamw pc_t anr_stack[SMB_AUDIT_STACK_DEPTH]; 88da6c28aaSamw } smb_audit_record_node_t; 89da6c28aaSamw 90da6c28aaSamw typedef struct { 91da6c28aaSamw int anb_index; 92da6c28aaSamw int anb_max_index; 93da6c28aaSamw smb_audit_record_node_t anb_records[SMB_AUDIT_BUF_MAX_REC]; 94da6c28aaSamw } smb_audit_buf_node_t; 95da6c28aaSamw 96da6c28aaSamw #define SMB_WORKER_PRIORITY 99 97da6c28aaSamw /* 98da6c28aaSamw * Thread State Machine 99da6c28aaSamw * -------------------- 100da6c28aaSamw * 101da6c28aaSamw * T5 T0 102da6c28aaSamw * smb_thread_destroy() <-------+ +------- smb_thread_init() 103da6c28aaSamw * | | 104da6c28aaSamw * | v 105da6c28aaSamw * +-----------------------------+ 106da6c28aaSamw * | SMB_THREAD_STATE_EXITED |<---+ 107da6c28aaSamw * +-----------------------------+ | 108da6c28aaSamw * | T1 | 109da6c28aaSamw * v | 110da6c28aaSamw * +-----------------------------+ | 111da6c28aaSamw * | SMB_THREAD_STATE_STARTING | | 112da6c28aaSamw * +-----------------------------+ | 113da6c28aaSamw * | T2 | T4 114da6c28aaSamw * v | 115da6c28aaSamw * +-----------------------------+ | 116da6c28aaSamw * | SMB_THREAD_STATE_RUNNING | | 117da6c28aaSamw * +-----------------------------+ | 118da6c28aaSamw * | T3 | 119da6c28aaSamw * v | 120da6c28aaSamw * +-----------------------------+ | 121da6c28aaSamw * | SMB_THREAD_STATE_EXITING |----+ 122da6c28aaSamw * +-----------------------------+ 123da6c28aaSamw * 124da6c28aaSamw * Transition T0 125da6c28aaSamw * 126da6c28aaSamw * This transition is executed in smb_thread_init(). 127da6c28aaSamw * 128da6c28aaSamw * Transition T1 129da6c28aaSamw * 130da6c28aaSamw * This transition is executed in smb_thread_start(). 131da6c28aaSamw * 132da6c28aaSamw * Transition T2 133da6c28aaSamw * 134da6c28aaSamw * This transition is executed by the thread itself when it starts running. 135da6c28aaSamw * 136da6c28aaSamw * Transition T3 137da6c28aaSamw * 138da6c28aaSamw * This transition is executed by the thread itself in 139da6c28aaSamw * smb_thread_entry_point() just before calling thread_exit(). 140da6c28aaSamw * 141da6c28aaSamw * 142da6c28aaSamw * Transition T4 143da6c28aaSamw * 144da6c28aaSamw * This transition is executed in smb_thread_stop(). 145da6c28aaSamw * 146da6c28aaSamw * Transition T5 147da6c28aaSamw * 148da6c28aaSamw * This transition is executed in smb_thread_destroy(). 149da6c28aaSamw * 150da6c28aaSamw * Comments 151da6c28aaSamw * -------- 152da6c28aaSamw * 153da6c28aaSamw * The field smb_thread_aw_t contains a function pointer that knows how to 154da6c28aaSamw * awake the thread. It is a temporary solution to work around the fact that 155da6c28aaSamw * kernel threads (not part of a userspace process) cannot be signaled. 156da6c28aaSamw */ 157da6c28aaSamw typedef enum smb_thread_state { 158da6c28aaSamw SMB_THREAD_STATE_STARTING = 0, 159da6c28aaSamw SMB_THREAD_STATE_RUNNING, 160da6c28aaSamw SMB_THREAD_STATE_EXITING, 161da6c28aaSamw SMB_THREAD_STATE_EXITED 162da6c28aaSamw } smb_thread_state_t; 163da6c28aaSamw 164da6c28aaSamw struct _smb_thread; 165da6c28aaSamw 166da6c28aaSamw typedef void (*smb_thread_ep_t)(struct _smb_thread *, void *ep_arg); 167da6c28aaSamw typedef void (*smb_thread_aw_t)(struct _smb_thread *, void *aw_arg); 168da6c28aaSamw 169da6c28aaSamw #define SMB_THREAD_MAGIC 0x534D4254 /* SMBT */ 170da6c28aaSamw 171da6c28aaSamw typedef struct _smb_thread { 172da6c28aaSamw uint32_t sth_magic; 173da6c28aaSamw char sth_name[16]; 174da6c28aaSamw smb_thread_state_t sth_state; 175da6c28aaSamw kthread_t *sth_th; 176da6c28aaSamw kt_did_t sth_did; 177da6c28aaSamw smb_thread_ep_t sth_ep; 178da6c28aaSamw void *sth_ep_arg; 179da6c28aaSamw smb_thread_aw_t sth_aw; 180da6c28aaSamw void *sth_aw_arg; 181da6c28aaSamw boolean_t sth_kill; 182da6c28aaSamw kmutex_t sth_mtx; 183da6c28aaSamw kcondvar_t sth_cv; 184da6c28aaSamw } smb_thread_t; 185da6c28aaSamw 186da6c28aaSamw /* 187da6c28aaSamw * Pool of IDs 188da6c28aaSamw * ----------- 189da6c28aaSamw * 190da6c28aaSamw * A pool of IDs is a pool of 16 bit numbers. It is implemented as a bitmap. 191da6c28aaSamw * A bit set to '1' indicates that that particular value has been allocated. 192da6c28aaSamw * The allocation process is done shifting a bit through the whole bitmap. 193da6c28aaSamw * The current position of that index bit is kept in the smb_idpool_t 194da6c28aaSamw * structure and represented by a byte index (0 to buffer size minus 1) and 195da6c28aaSamw * a bit index (0 to 7). 196da6c28aaSamw * 197da6c28aaSamw * The pools start with a size of 8 bytes or 64 IDs. Each time the pool runs 198da6c28aaSamw * out of IDs its current size is doubled until it reaches its maximum size 199da6c28aaSamw * (8192 bytes or 65536 IDs). The IDs 0 and 65535 are never given out which 200da6c28aaSamw * means that a pool can have a maximum number of 65534 IDs available. 201da6c28aaSamw */ 202da6c28aaSamw #define SMB_IDPOOL_MAGIC 0x4944504C /* IDPL */ 203da6c28aaSamw #define SMB_IDPOOL_MIN_SIZE 64 /* Number of IDs to begin with */ 204da6c28aaSamw #define SMB_IDPOOL_MAX_SIZE 64 * 1024 205da6c28aaSamw 206da6c28aaSamw typedef struct smb_idpool { 207da6c28aaSamw uint32_t id_magic; 208da6c28aaSamw kmutex_t id_mutex; 209da6c28aaSamw uint8_t *id_pool; 210da6c28aaSamw uint32_t id_size; 211da6c28aaSamw uint8_t id_bit; 212da6c28aaSamw uint8_t id_bit_idx; 213da6c28aaSamw uint32_t id_idx; 214da6c28aaSamw uint32_t id_idx_msk; 215da6c28aaSamw uint32_t id_free_counter; 216da6c28aaSamw uint32_t id_max_free_counter; 217da6c28aaSamw } smb_idpool_t; 218da6c28aaSamw 219da6c28aaSamw /* 22021b7895dSjb * Maximum size of a Transport Data Unit 22121b7895dSjb * 4 --> NBT/TCP Transport Header. 22221b7895dSjb * 32 --> SMB Header 22321b7895dSjb * 1 --> Word Count byte 22421b7895dSjb * 510 --> Maximum Number of bytes of the Word Table (2 * 255) 22521b7895dSjb * 2 --> Byte count of the data 22621b7895dSjb * 65535 --> Maximum size of the data 22721b7895dSjb * ----- 22821b7895dSjb * 66084 229da6c28aaSamw */ 23021b7895dSjb #define SMB_REQ_MAX_SIZE 66080 23121b7895dSjb #define SMB_XPRT_MAX_SIZE (SMB_REQ_MAX_SIZE + NETBIOS_HDR_SZ) 232da6c28aaSamw 23321b7895dSjb #define SMB_TXREQ_MAGIC 0X54524251 /* 'TREQ' */ 2345cdbe942Sjb typedef struct { 23521b7895dSjb uint32_t tr_magic; 23621b7895dSjb list_node_t tr_lnd; 23721b7895dSjb int tr_len; 23821b7895dSjb uint8_t tr_buf[SMB_XPRT_MAX_SIZE]; 23921b7895dSjb } smb_txreq_t; 2405cdbe942Sjb 2415cdbe942Sjb #define SMB_TXLST_MAGIC 0X544C5354 /* 'TLST' */ 2425cdbe942Sjb typedef struct { 2435cdbe942Sjb uint32_t tl_magic; 2445cdbe942Sjb kmutex_t tl_mutex; 2455cdbe942Sjb boolean_t tl_active; 2465cdbe942Sjb list_t tl_list; 2475cdbe942Sjb } smb_txlst_t; 2485cdbe942Sjb 249da6c28aaSamw /* 250faa1795aSjb * Maximum buffer size for NT is 37KB. If all clients are Windows 2000, this 251faa1795aSjb * can be changed to 64KB. 37KB must be used with a mix of NT/Windows 2000 252faa1795aSjb * clients because NT loses directory entries when values greater than 37KB are 253faa1795aSjb * used. 254faa1795aSjb * 255faa1795aSjb * Note: NBT_MAXBUF will be subtracted from the specified max buffer size to 256faa1795aSjb * account for the NBT header. 257da6c28aaSamw */ 258faa1795aSjb #define NBT_MAXBUF 8 259faa1795aSjb #define SMB_NT_MAXBUF (37 * 1024) 260da6c28aaSamw 261da6c28aaSamw #define OUTBUFSIZE (65 * 1024) 262da6c28aaSamw #define SMBHEADERSIZE 32 263da6c28aaSamw #define SMBND_HASH_MASK (0xFF) 264da6c28aaSamw #define MAX_IOVEC 512 265da6c28aaSamw #define MAX_READREF (8 * 1024) 266da6c28aaSamw 267da6c28aaSamw #define SMB_WORKER_MIN 4 268da6c28aaSamw #define SMB_WORKER_DEFAULT 64 269da6c28aaSamw #define SMB_WORKER_MAX 1024 270da6c28aaSamw 271da6c28aaSamw /* 272da6c28aaSamw * Fix align a pointer or offset appropriately so that fields will not 273da6c28aaSamw * cross word boundaries. 274da6c28aaSamw */ 275da6c28aaSamw #define PTRALIGN(x) \ 276da6c28aaSamw (((uintptr_t)(x) + (uintptr_t)(_POINTER_ALIGNMENT) - 1l) & \ 277da6c28aaSamw ~((uintptr_t)(_POINTER_ALIGNMENT) - 1l)) 278da6c28aaSamw 279da6c28aaSamw /* 280da6c28aaSamw * native os types are defined in win32/smbinfo.h 281da6c28aaSamw */ 282da6c28aaSamw 283da6c28aaSamw /* 284da6c28aaSamw * All 4 different time / date formats that will bee seen in SMB 285da6c28aaSamw */ 286da6c28aaSamw typedef struct { 287da6c28aaSamw uint16_t Day : 5; 288da6c28aaSamw uint16_t Month : 4; 289da6c28aaSamw uint16_t Year : 7; 290da6c28aaSamw } SMB_DATE; 291da6c28aaSamw 292da6c28aaSamw typedef struct { 293da6c28aaSamw uint16_t TwoSeconds : 5; 294da6c28aaSamw uint16_t Minutes : 6; 295da6c28aaSamw uint16_t Hours : 5; 296da6c28aaSamw } SMB_TIME; 297da6c28aaSamw 298da6c28aaSamw 299da6c28aaSamw typedef uint32_t UTIME; /* seconds since Jan 1 1970 */ 300da6c28aaSamw 301da6c28aaSamw typedef struct smb_malloc_list { 302da6c28aaSamw struct smb_malloc_list *forw; 303da6c28aaSamw struct smb_malloc_list *back; 304da6c28aaSamw } smb_malloc_list; 305da6c28aaSamw 306da6c28aaSamw typedef struct smb_llist { 307da6c28aaSamw krwlock_t ll_lock; 308da6c28aaSamw list_t ll_list; 309da6c28aaSamw uint32_t ll_count; 310da6c28aaSamw uint64_t ll_wrop; 311da6c28aaSamw } smb_llist_t; 312da6c28aaSamw 313da6c28aaSamw typedef struct smb_slist { 314da6c28aaSamw kmutex_t sl_mutex; 315da6c28aaSamw kcondvar_t sl_cv; 316da6c28aaSamw list_t sl_list; 317da6c28aaSamw uint32_t sl_count; 318da6c28aaSamw boolean_t sl_waiting; 319da6c28aaSamw } smb_slist_t; 320da6c28aaSamw 321faa1795aSjb typedef struct smb_session_list { 322faa1795aSjb krwlock_t se_lock; 323faa1795aSjb uint64_t se_wrop; 324faa1795aSjb struct { 325faa1795aSjb list_t lst; 326faa1795aSjb uint32_t count; 327faa1795aSjb } se_rdy; 328faa1795aSjb struct { 329faa1795aSjb list_t lst; 330faa1795aSjb uint32_t count; 331faa1795aSjb } se_act; 332faa1795aSjb } smb_session_list_t; 333faa1795aSjb 334da6c28aaSamw typedef struct { 335da6c28aaSamw kcondvar_t rwx_cv; 336da6c28aaSamw kmutex_t rwx_mutex; 337da6c28aaSamw krwlock_t rwx_lock; 338da6c28aaSamw boolean_t rwx_waiting; 339da6c28aaSamw } smb_rwx_t; 340da6c28aaSamw 341da6c28aaSamw /* NOTIFY CHANGE */ 342da6c28aaSamw 343da6c28aaSamw typedef struct smb_notify_change_req { 344da6c28aaSamw list_node_t nc_lnd; 345da6c28aaSamw struct smb_node *nc_node; 346da6c28aaSamw uint32_t nc_reply_type; 347da6c28aaSamw uint32_t nc_flags; 348da6c28aaSamw } smb_notify_change_req_t; 349da6c28aaSamw 350da6c28aaSamw /* 351da6c28aaSamw * SMB operates over a NetBIOS-over-TCP transport (NBT) or directly 352da6c28aaSamw * over TCP, which is also known as direct hosted NetBIOS-less SMB 353da6c28aaSamw * or SMB-over-TCP. 354da6c28aaSamw * 355da6c28aaSamw * NBT messages have a 4-byte header that defines the message type 356da6c28aaSamw * (8-bits), a 7-bit flags field and a 17-bit length. 357da6c28aaSamw * 358da6c28aaSamw * +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ 359da6c28aaSamw * | TYPE | FLAGS |E| LENGTH | 360da6c28aaSamw * +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ 361da6c28aaSamw * 362da6c28aaSamw * 8-bit type Defined in RFC 1002 363da6c28aaSamw * 7-bit flags Bits 0-6 reserved (must be 0) 364da6c28aaSamw * Bit 7: Length extension bit (E) 365da6c28aaSamw * 17-bit length Includes bit 7 of the flags byte 366da6c28aaSamw * 367da6c28aaSamw * 368da6c28aaSamw * SMB-over-TCP is defined to use a modified version of the NBT header 369da6c28aaSamw * containing an 8-bit message type and 24-bit message length. 370da6c28aaSamw * 371da6c28aaSamw * +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ 372da6c28aaSamw * | TYPE | LENGTH | 373da6c28aaSamw * +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ 374da6c28aaSamw * 375da6c28aaSamw * 8-bit type Must be 0 376da6c28aaSamw * 24-bit length 377da6c28aaSamw * 378da6c28aaSamw * The following structure is used to represent a generic, in-memory 379da6c28aaSamw * SMB transport header; it is not intended to map directly to either 380da6c28aaSamw * of the over-the-wire formats. 381da6c28aaSamw */ 382da6c28aaSamw typedef struct { 383da6c28aaSamw uint8_t xh_type; 384da6c28aaSamw uint32_t xh_length; 385da6c28aaSamw } smb_xprt_t; 386da6c28aaSamw 387faa1795aSjb int MBC_LENGTH(struct mbuf_chain *); 3883ad684d6Sjb int MBC_MAXBYTES(struct mbuf_chain *); 389faa1795aSjb void MBC_SETUP(struct mbuf_chain *, uint32_t); 390faa1795aSjb void MBC_INIT(struct mbuf_chain *, uint32_t); 391faa1795aSjb void MBC_FLUSH(struct mbuf_chain *); 392faa1795aSjb void MBC_ATTACH_MBUF(struct mbuf_chain *, struct mbuf *); 393faa1795aSjb void MBC_APPEND_MBUF(struct mbuf_chain *, struct mbuf *); 394da6c28aaSamw void MBC_ATTACH_BUF(struct mbuf_chain *MBC, unsigned char *BUF, int LEN); 395da6c28aaSamw int MBC_SHADOW_CHAIN(struct mbuf_chain *SUBMBC, struct mbuf_chain *MBC, 396da6c28aaSamw int OFF, int LEN); 397da6c28aaSamw 398da6c28aaSamw #define MBC_ROOM_FOR(b, n) (((b)->chain_offset + (n)) <= (b)->max_bytes) 399da6c28aaSamw 400da6c28aaSamw typedef struct smb_oplock { 401da6c28aaSamw struct smb_ofile *op_ofile; 402da6c28aaSamw uint32_t op_flags; 4038c10a865Sas uint32_t op_ipaddr; 4048c10a865Sas uint64_t op_kid; 405da6c28aaSamw } smb_oplock_t; 406da6c28aaSamw 407da6c28aaSamw #define OPLOCK_FLAG_BREAKING 1 408da6c28aaSamw 409da6c28aaSamw #define OPLOCK_RELEASE_LOCK_RELEASED 0 410da6c28aaSamw #define OPLOCK_RELEASE_FILE_CLOSED 1 411da6c28aaSamw 412da6c28aaSamw #define DOS_ATTR_VALID 0x80000000 413da6c28aaSamw 414da6c28aaSamw #define SMB_VFS_MAGIC 0x534D4256 /* 'SMBV' */ 415da6c28aaSamw 416da6c28aaSamw typedef struct smb_vfs { 417da6c28aaSamw uint32_t sv_magic; 418da6c28aaSamw list_node_t sv_lnd; 419da6c28aaSamw uint32_t sv_refcnt; 420da6c28aaSamw vfs_t *sv_vfsp; 421da6c28aaSamw vnode_t *sv_rootvp; 422da6c28aaSamw } smb_vfs_t; 423da6c28aaSamw 424*2c1b14e5Sjose borrego typedef struct smb_unexport { 425*2c1b14e5Sjose borrego list_node_t ux_lnd; 426*2c1b14e5Sjose borrego char ux_sharename[MAXNAMELEN]; 427*2c1b14e5Sjose borrego } smb_unexport_t; 428*2c1b14e5Sjose borrego 429da6c28aaSamw #define SMB_NODE_MAGIC 0x4E4F4445 /* 'NODE' */ 430da6c28aaSamw 431da6c28aaSamw typedef enum { 432da6c28aaSamw SMB_NODE_STATE_AVAILABLE = 0, 433da6c28aaSamw SMB_NODE_STATE_DESTROYING 434da6c28aaSamw } smb_node_state_t; 435da6c28aaSamw 436da6c28aaSamw typedef struct smb_node { 437da6c28aaSamw uint32_t n_magic; 438da6c28aaSamw smb_rwx_t n_lock; 439dc20a302Sas krwlock_t n_share_lock; 440da6c28aaSamw list_node_t n_lnd; 441da6c28aaSamw smb_node_state_t n_state; 442da6c28aaSamw uint32_t n_refcnt; 443da6c28aaSamw uint32_t n_hashkey; 444faa1795aSjb struct smb_request *n_sr; 445faa1795aSjb kmem_cache_t *n_cache; 446da6c28aaSamw smb_llist_t *n_hash_bucket; 447da6c28aaSamw uint64_t n_orig_session_id; 448da6c28aaSamw uint32_t n_orig_uid; 449da6c28aaSamw smb_llist_t n_ofile_list; 450da6c28aaSamw smb_llist_t n_lock_list; 451c8ec8eeaSjose borrego struct smb_ofile *readonly_creator; 452da6c28aaSamw volatile int flags; /* FILE_NOTIFY_CHANGE_* */ 453da6c28aaSamw volatile int waiting_event; /* # of clients requesting FCN */ 454da6c28aaSamw smb_attr_t attr; 455da6c28aaSamw unsigned int what; 45655bf511dSas u_offset_t n_size; 457da6c28aaSamw smb_oplock_t n_oplock; 458da6c28aaSamw struct smb_node *dir_snode; /* Directory of node */ 459da6c28aaSamw struct smb_node *unnamed_stream_node; /* set in stream nodes */ 460da6c28aaSamw /* Credentials for delayed delete */ 461da6c28aaSamw cred_t *delete_on_close_cred; 462da6c28aaSamw char od_name[MAXNAMELEN]; 463da6c28aaSamw vnode_t *vp; 464da6c28aaSamw smb_audit_buf_node_t *n_audit_buf; 465da6c28aaSamw } smb_node_t; 466da6c28aaSamw 467da6c28aaSamw #define NODE_FLAGS_NOTIFY_CHANGE 0x10000fff 468da6c28aaSamw #define NODE_OPLOCKS_IN_FORCE 0x0000f000 469da6c28aaSamw #define NODE_OPLOCK_NONE 0x00000000 470da6c28aaSamw #define NODE_EXCLUSIVE_OPLOCK 0x00001000 471da6c28aaSamw #define NODE_BATCH_OPLOCK 0x00002000 472da6c28aaSamw #define NODE_LEVEL_II_OPLOCK 0x00003000 473da6c28aaSamw #define NODE_CAP_LEVEL_II 0x00010000 474da6c28aaSamw #define NODE_PROTOCOL_LOCK 0x00020000 475da6c28aaSamw #define NODE_FLAGS_WRITE_THROUGH 0x00100000 476da6c28aaSamw #define NODE_FLAGS_SYNCATIME 0x00200000 477da6c28aaSamw #define NODE_FLAGS_LOCKED 0x00400000 478da6c28aaSamw #define NODE_FLAGS_ATTR_VALID 0x00800000 479cbfb650aScp #define NODE_XATTR_DIR 0x01000000 480da6c28aaSamw #define NODE_FLAGS_CREATED 0x04000000 481da6c28aaSamw #define NODE_FLAGS_CHANGED 0x08000000 482da6c28aaSamw #define NODE_FLAGS_WATCH_TREE 0x10000000 483da6c28aaSamw #define NODE_FLAGS_SET_SIZE 0x20000000 484da6c28aaSamw #define NODE_FLAGS_DELETE_ON_CLOSE 0x40000000 485da6c28aaSamw #define NODE_FLAGS_EXECUTABLE 0x80000000 486da6c28aaSamw 487da6c28aaSamw #define OPLOCK_TYPE(n) ((n)->flags & NODE_OPLOCKS_IN_FORCE) 488da6c28aaSamw #define OPLOCKS_IN_FORCE(n) (OPLOCK_TYPE(n) != NODE_OPLOCK_NONE) 489da6c28aaSamw #define EXCLUSIVE_OPLOCK_IN_FORCE(n) \ 490da6c28aaSamw (OPLOCK_TYPE(n) == NODE_EXCLUSIVE_OPLOCK) 491da6c28aaSamw #define BATCH_OPLOCK_IN_FORCE(n) (OPLOCK_TYPE(n) == NODE_BATCH_OPLOCK) 492da6c28aaSamw #define LEVEL_II_OPLOCK_IN_FORCE(n) (OPLOCK_TYPE(n) == NODE_LEVEL_II_OPLOCK) 493da6c28aaSamw 494c8ec8eeaSjose borrego #define SMB_NODE_VFS(node) ((node)->vp->v_vfsp) 495c8ec8eeaSjose borrego #define SMB_NODE_FSID(node) ((node)->vp->v_vfsp->vfs_fsid) 496c8ec8eeaSjose borrego 497da6c28aaSamw /* 498da6c28aaSamw * Based on section 2.6.1.2 (Connection Management) of the June 13, 499da6c28aaSamw * 1996 CIFS spec, a server may terminate the transport connection 500da6c28aaSamw * due to inactivity. The client software is expected to be able to 501da6c28aaSamw * automatically reconnect to the server if this happens. Like much 502da6c28aaSamw * of the useful background information, this section appears to 503da6c28aaSamw * have been dropped from later revisions of the document. 504da6c28aaSamw * 505da6c28aaSamw * Each session has an activity timestamp that's updated whenever a 506da6c28aaSamw * request is dispatched. If the session is idle, i.e. receives no 507da6c28aaSamw * requests, for SMB_SESSION_INACTIVITY_TIMEOUT minutes it will be 508da6c28aaSamw * closed. 509da6c28aaSamw * 510da6c28aaSamw * Each session has an I/O semaphore to serialize communication with 511da6c28aaSamw * the client. For example, after receiving a raw-read request, the 512da6c28aaSamw * server is not allowed to send an oplock break to the client until 513da6c28aaSamw * after it has sent the raw-read data. 514da6c28aaSamw */ 515da6c28aaSamw #define SMB_SESSION_INACTIVITY_TIMEOUT (15 * 60) 516da6c28aaSamw 517da6c28aaSamw #define SMB_SESSION_OFILE_MAX (16 * 1024) 518da6c28aaSamw 519da6c28aaSamw /* 520da6c28aaSamw * When a connection is set up we need to remember both the client 521da6c28aaSamw * (peer) IP address and the local IP address used to establish the 522da6c28aaSamw * connection. When a client connects with a vc number of zero, we 523da6c28aaSamw * are supposed to abort any existing connections with that client 524da6c28aaSamw * (see notes in smb_negotiate.c and smb_session_setup_andx.c). For 525da6c28aaSamw * servers with multiple network interfaces or IP aliases, however, 526da6c28aaSamw * each interface has to be managed independently since the client 527da6c28aaSamw * is not aware of the server configuration. We have to allow the 528da6c28aaSamw * client to establish a connection on each interface with a vc 529da6c28aaSamw * number of zero without aborting the other connections. 530da6c28aaSamw * 531da6c28aaSamw * ipaddr: the client (peer) IP address for the session. 532da6c28aaSamw * local_ipaddr: the local IP address used to connect to the server. 533da6c28aaSamw */ 534da6c28aaSamw 535da6c28aaSamw #define SMB_MAC_KEYSZ 512 536da6c28aaSamw 537da6c28aaSamw struct smb_sign { 538da6c28aaSamw unsigned int seqnum; 539da6c28aaSamw unsigned int mackey_len; 540da6c28aaSamw unsigned int flags; 541da6c28aaSamw unsigned char mackey[SMB_MAC_KEYSZ]; 542da6c28aaSamw }; 543da6c28aaSamw 544da6c28aaSamw #define SMB_SIGNING_ENABLED 1 545da6c28aaSamw #define SMB_SIGNING_CHECK 2 546da6c28aaSamw 547da6c28aaSamw /* 548da6c28aaSamw * Session State Machine 549da6c28aaSamw * --------------------- 550da6c28aaSamw * 551da6c28aaSamw * +-----------------------------+ +------------------------------+ 552da6c28aaSamw * | SMB_SESSION_STATE_CONNECTED | | SMB_SESSION_STATE_TERMINATED | 553da6c28aaSamw * +-----------------------------+ +------------------------------+ 554da6c28aaSamw * T0| ^ 555da6c28aaSamw * +--------------------+ |T13 556da6c28aaSamw * v |T14 | 557da6c28aaSamw * +-------------------------------+ | +--------------------------------+ 558da6c28aaSamw * | SMB_SESSION_STATE_ESTABLISHED |---+--->| SMB_SESSION_STATE_DISCONNECTED | 559da6c28aaSamw * +-------------------------------+ +--------------------------------+ 560da6c28aaSamw * T1| ^ ^ ^ ^ 561da6c28aaSamw * +----------+ |T9 | | | 562da6c28aaSamw * v | | | | 563da6c28aaSamw * +------------------------------+ | | | 564da6c28aaSamw * | SMB_SESSION_STATE_NEGOTIATED | | | | 565da6c28aaSamw * +------------------------------+ | | | 566da6c28aaSamw * ^| ^| | ^ | | | 567da6c28aaSamw * +----------------+| || | | | | | 568da6c28aaSamw * |+----------------+ || T7| |T8 | | | 569da6c28aaSamw * || || | | | | | 570da6c28aaSamw * || +----------------+| | | | | | 571da6c28aaSamw * || |+----------------+ | | | | | 572da6c28aaSamw * || || v | | | | 573da6c28aaSamw * || || +-----------------------------------+ T10| | | 574da6c28aaSamw * || || | SMB_SESSION_STATE_OPLOCK_BREAKING |----+ | | 575da6c28aaSamw * || || +-----------------------------------+ | | 576da6c28aaSamw * || ||T5 | | 577da6c28aaSamw * || |+-->+-----------------------------------+ T11| | 578da6c28aaSamw * || |T6 | SMB_SESSION_STATE_READ_RAW_ACTIVE |------+ | 579da6c28aaSamw * || +----+-----------------------------------+ | 580da6c28aaSamw * ||T3 | 581da6c28aaSamw * |+------->+------------------------------------+ T12| 582da6c28aaSamw * |T4 | SMB_SESSION_STATE_WRITE_RAW_ACTIVE |-------+ 583da6c28aaSamw * +---------+------------------------------------+ 584da6c28aaSamw * 585da6c28aaSamw * Transition T0 586da6c28aaSamw * 587da6c28aaSamw * 588da6c28aaSamw * 589da6c28aaSamw * Transition T1 590da6c28aaSamw * 591da6c28aaSamw * 592da6c28aaSamw * 593da6c28aaSamw * Transition T2 594da6c28aaSamw * 595da6c28aaSamw * 596da6c28aaSamw * 597da6c28aaSamw * Transition T3 598da6c28aaSamw * 599da6c28aaSamw * 600da6c28aaSamw * 601da6c28aaSamw * Transition T4 602da6c28aaSamw * 603da6c28aaSamw * 604da6c28aaSamw * 605da6c28aaSamw * Transition T5 606da6c28aaSamw * 607da6c28aaSamw * 608da6c28aaSamw * 609da6c28aaSamw * Transition T6 610da6c28aaSamw * 611da6c28aaSamw * 612da6c28aaSamw * 613da6c28aaSamw * Transition T7 614da6c28aaSamw * 615da6c28aaSamw * 616da6c28aaSamw * 617da6c28aaSamw * Transition T8 618da6c28aaSamw * 619da6c28aaSamw * 620da6c28aaSamw * 621da6c28aaSamw * Transition T9 622da6c28aaSamw * 623da6c28aaSamw * 624da6c28aaSamw * 625da6c28aaSamw * Transition T10 626da6c28aaSamw * 627da6c28aaSamw * 628da6c28aaSamw * 629da6c28aaSamw * Transition T11 630da6c28aaSamw * 631da6c28aaSamw * 632da6c28aaSamw * 633da6c28aaSamw * Transition T12 634da6c28aaSamw * 635da6c28aaSamw * 636da6c28aaSamw * 637da6c28aaSamw * Transition T13 638da6c28aaSamw * 639da6c28aaSamw * 640da6c28aaSamw * 641da6c28aaSamw * Transition T14 642da6c28aaSamw * 643da6c28aaSamw * 644da6c28aaSamw * 645da6c28aaSamw */ 646da6c28aaSamw #define SMB_SESSION_MAGIC 0x53455353 /* 'SESS' */ 647da6c28aaSamw 648da6c28aaSamw typedef enum { 649faa1795aSjb SMB_SESSION_STATE_INITIALIZED = 0, 650faa1795aSjb SMB_SESSION_STATE_DISCONNECTED, 651da6c28aaSamw SMB_SESSION_STATE_CONNECTED, 652da6c28aaSamw SMB_SESSION_STATE_ESTABLISHED, 653da6c28aaSamw SMB_SESSION_STATE_NEGOTIATED, 654da6c28aaSamw SMB_SESSION_STATE_OPLOCK_BREAKING, 655da6c28aaSamw SMB_SESSION_STATE_WRITE_RAW_ACTIVE, 6566537f381Sas SMB_SESSION_STATE_TERMINATED, 6576537f381Sas SMB_SESSION_STATE_SENTINEL 658da6c28aaSamw } smb_session_state_t; 659da6c28aaSamw 660faa1795aSjb typedef struct smb_session { 661da6c28aaSamw uint32_t s_magic; 662da6c28aaSamw smb_rwx_t s_lock; 663da6c28aaSamw list_node_t s_lnd; 664da6c28aaSamw uint64_t s_kid; 665da6c28aaSamw smb_session_state_t s_state; 666da6c28aaSamw uint32_t s_flags; 667da6c28aaSamw int s_write_raw_status; 668faa1795aSjb kthread_t *s_thread; 669faa1795aSjb kt_did_t s_ktdid; 670faa1795aSjb smb_kmod_cfg_t s_cfg; 671faa1795aSjb kmem_cache_t *s_cache; 672faa1795aSjb kmem_cache_t *s_cache_request; 673faa1795aSjb struct smb_server *s_server; 674c8ec8eeaSjose borrego int32_t s_gmtoff; 675da6c28aaSamw uint32_t keep_alive; 676da6c28aaSamw uint64_t opentime; 677da6c28aaSamw uint16_t vcnumber; 678da6c28aaSamw uint16_t s_local_port; 679da6c28aaSamw uint32_t ipaddr; 680da6c28aaSamw uint32_t local_ipaddr; 681da6c28aaSamw char workstation[SMB_PI_MAX_HOST]; 682da6c28aaSamw int dialect; 683da6c28aaSamw int native_os; 684da6c28aaSamw uint32_t capabilities; 685da6c28aaSamw struct smb_sign signing; 686da6c28aaSamw 687da6c28aaSamw struct sonode *sock; 688da6c28aaSamw 689da6c28aaSamw smb_slist_t s_req_list; 690da6c28aaSamw smb_llist_t s_xa_list; 691da6c28aaSamw smb_llist_t s_user_list; 692da6c28aaSamw smb_idpool_t s_uid_pool; 6935cdbe942Sjb smb_txlst_t s_txlst; 694da6c28aaSamw 695da6c28aaSamw volatile uint32_t s_tree_cnt; 696da6c28aaSamw volatile uint32_t s_file_cnt; 697da6c28aaSamw volatile uint32_t s_dir_cnt; 698da6c28aaSamw 699da6c28aaSamw uint16_t secmode; 700da6c28aaSamw uint32_t sesskey; 701da6c28aaSamw uint32_t challenge_len; 702da6c28aaSamw unsigned char challenge_key[8]; 703da6c28aaSamw unsigned char MAC_key[44]; 704da6c28aaSamw int64_t activity_timestamp; 705da6c28aaSamw /* 706da6c28aaSamw * Maximum negotiated buffer size between SMB client and server 707da6c28aaSamw * in SMB_SESSION_SETUP_ANDX 708da6c28aaSamw */ 709da6c28aaSamw uint16_t smb_msg_size; 710da6c28aaSamw uchar_t *outpipe_data; 711da6c28aaSamw int outpipe_datalen; 712da6c28aaSamw int outpipe_cookie; 713faa1795aSjb } smb_session_t; 714da6c28aaSamw 715da6c28aaSamw #define SMB_USER_MAGIC 0x55534552 /* 'USER' */ 716da6c28aaSamw 717da6c28aaSamw #define SMB_USER_FLAG_GUEST SMB_ATF_GUEST 718da6c28aaSamw #define SMB_USER_FLAG_IPC SMB_ATF_ANON 719da6c28aaSamw #define SMB_USER_FLAG_ADMIN SMB_ATF_ADMIN 720da6c28aaSamw #define SMB_USER_FLAG_POWER_USER SMB_ATF_POWERUSER 721da6c28aaSamw #define SMB_USER_FLAG_BACKUP_OPERATOR SMB_ATF_BACKUPOP 722da6c28aaSamw 723da6c28aaSamw #define SMB_USER_PRIV_TAKE_OWNERSHIP 0x00000001 724da6c28aaSamw #define SMB_USER_PRIV_BACKUP 0x00000002 725da6c28aaSamw #define SMB_USER_PRIV_RESTORE 0x00000004 726da6c28aaSamw #define SMB_USER_PRIV_SECURITY 0x00000008 727da6c28aaSamw 728da6c28aaSamw 729da6c28aaSamw typedef enum { 730da6c28aaSamw SMB_USER_STATE_LOGGED_IN = 0, 731da6c28aaSamw SMB_USER_STATE_LOGGING_OFF, 7326537f381Sas SMB_USER_STATE_LOGGED_OFF, 7336537f381Sas SMB_USER_STATE_SENTINEL 734da6c28aaSamw } smb_user_state_t; 735da6c28aaSamw 736da6c28aaSamw typedef struct smb_user { 737da6c28aaSamw uint32_t u_magic; 738da6c28aaSamw list_node_t u_lnd; 739da6c28aaSamw kmutex_t u_mutex; 740da6c28aaSamw smb_user_state_t u_state; 741da6c28aaSamw 742faa1795aSjb struct smb_server *u_server; 743da6c28aaSamw smb_session_t *u_session; 744da6c28aaSamw uint16_t u_name_len; 745da6c28aaSamw char *u_name; 746da6c28aaSamw uint16_t u_domain_len; 747da6c28aaSamw char *u_domain; 748da6c28aaSamw time_t u_logon_time; 749da6c28aaSamw cred_t *u_cred; 750da6c28aaSamw 751da6c28aaSamw smb_llist_t u_tree_list; 752da6c28aaSamw smb_idpool_t u_tid_pool; 753da6c28aaSamw 754da6c28aaSamw uint32_t u_refcnt; 755da6c28aaSamw uint32_t u_flags; 756da6c28aaSamw uint32_t u_privileges; 757da6c28aaSamw uint16_t u_uid; 758da6c28aaSamw uint32_t u_audit_sid; 759da6c28aaSamw } smb_user_t; 760da6c28aaSamw 761c8ec8eeaSjose borrego #define SMB_TREE_MAGIC 0x54524545 /* 'TREE' */ 762c8ec8eeaSjose borrego 763c8ec8eeaSjose borrego #define SMB_TYPENAMELEN _ST_FSTYPSZ 764c8ec8eeaSjose borrego #define SMB_VOLNAMELEN 32 765c8ec8eeaSjose borrego 766c8ec8eeaSjose borrego #define SMB_TREE_READONLY 0x00000001 767c8ec8eeaSjose borrego #define SMB_TREE_SUPPORTS_ACLS 0x00000002 768c8ec8eeaSjose borrego #define SMB_TREE_STREAMS 0x00000004 769c8ec8eeaSjose borrego #define SMB_TREE_CASEINSENSITIVE 0x00000008 770c8ec8eeaSjose borrego #define SMB_TREE_NO_CASESENSITIVE 0x00000010 771c8ec8eeaSjose borrego #define SMB_TREE_NO_EXPORT 0x00000020 772c8ec8eeaSjose borrego #define SMB_TREE_NO_OPLOCKS 0x00000040 773c8ec8eeaSjose borrego #define SMB_TREE_NO_ATIME 0x00000080 774c8ec8eeaSjose borrego #define SMB_TREE_XVATTR 0x00000100 775c8ec8eeaSjose borrego #define SMB_TREE_DIRENTFLAGS 0x00000200 776c8ec8eeaSjose borrego #define SMB_TREE_ACLONCREATE 0x00000400 777c8ec8eeaSjose borrego #define SMB_TREE_ACEMASKONACCESS 0x00000800 778c8ec8eeaSjose borrego #define SMB_TREE_NFS_MOUNTED 0x00001000 779*2c1b14e5Sjose borrego 780*2c1b14e5Sjose borrego /* 781*2c1b14e5Sjose borrego * Currently, the VFSFT_XVATTR feature is defined for file systems 782*2c1b14e5Sjose borrego * which understand the xvattr_t interface as well as for file systems 783*2c1b14e5Sjose borrego * which do not, but which understand the system attribute "view" interface. 784*2c1b14e5Sjose borrego * Since we need to be able to differentiate between these two for UFS, 785*2c1b14e5Sjose borrego * for now we use SMB_TREE_UFS so that we do the right thing. 786*2c1b14e5Sjose borrego */ 787*2c1b14e5Sjose borrego 788c8ec8eeaSjose borrego #define SMB_TREE_UFS 0x00002000 789da6c28aaSamw 790da6c28aaSamw typedef enum { 791da6c28aaSamw SMB_TREE_STATE_CONNECTED = 0, 792da6c28aaSamw SMB_TREE_STATE_DISCONNECTING, 7936537f381Sas SMB_TREE_STATE_DISCONNECTED, 7946537f381Sas SMB_TREE_STATE_SENTINEL 795da6c28aaSamw } smb_tree_state_t; 796da6c28aaSamw 797da6c28aaSamw typedef struct smb_tree { 798da6c28aaSamw uint32_t t_magic; 799da6c28aaSamw kmutex_t t_mutex; 800da6c28aaSamw list_node_t t_lnd; 801da6c28aaSamw smb_tree_state_t t_state; 802da6c28aaSamw 803faa1795aSjb struct smb_server *t_server; 804da6c28aaSamw smb_session_t *t_session; 805da6c28aaSamw smb_user_t *t_user; 806da6c28aaSamw smb_node_t *t_snode; 807da6c28aaSamw 808da6c28aaSamw smb_llist_t t_ofile_list; 809da6c28aaSamw smb_idpool_t t_fid_pool; 810da6c28aaSamw 811da6c28aaSamw smb_llist_t t_odir_list; 812da6c28aaSamw smb_idpool_t t_sid_pool; 813da6c28aaSamw 814da6c28aaSamw uint32_t t_refcnt; 815da6c28aaSamw uint32_t t_flags; 816da6c28aaSamw int32_t t_res_type; 817da6c28aaSamw uint16_t t_tid; 818da6c28aaSamw uint16_t t_umask; 819da6c28aaSamw char t_sharename[MAXNAMELEN]; 820da6c28aaSamw char t_resource[MAXPATHLEN]; 821c8ec8eeaSjose borrego char t_typename[SMB_TYPENAMELEN]; 822c8ec8eeaSjose borrego char t_volume[SMB_VOLNAMELEN]; 823da6c28aaSamw acl_type_t t_acltype; 824da6c28aaSamw } smb_tree_t; 825da6c28aaSamw 826c8ec8eeaSjose borrego #define SMB_TREE_VFS(tree) ((tree)->t_snode->vp->v_vfsp) 827c8ec8eeaSjose borrego #define SMB_TREE_FSID(tree) ((tree)->t_snode->vp->v_vfsp->vfs_fsid) 828c8ec8eeaSjose borrego 829c8ec8eeaSjose borrego #define SMB_TREE_IS_READONLY(sr) \ 830c8ec8eeaSjose borrego (((sr) && (sr)->tid_tree) ? \ 831c8ec8eeaSjose borrego smb_tree_has_feature((sr)->tid_tree, SMB_TREE_READONLY) : 0) 832c8ec8eeaSjose borrego 833c8ec8eeaSjose borrego #define SMB_TREE_IS_CASEINSENSITIVE(sr) \ 834c8ec8eeaSjose borrego (((sr) && (sr)->tid_tree) ? \ 835c8ec8eeaSjose borrego smb_tree_has_feature((sr)->tid_tree, SMB_TREE_CASEINSENSITIVE) : 0) 836da6c28aaSamw 837da6c28aaSamw /* 838c8ec8eeaSjose borrego * SMB_TREE_CONTAINS_NODE is used to check that a node is in the same 839c8ec8eeaSjose borrego * file system as the tree. 840da6c28aaSamw */ 841c8ec8eeaSjose borrego #define SMB_TREE_CONTAINS_NODE(sr, node) \ 842c8ec8eeaSjose borrego (((sr) && (sr)->tid_tree) ? \ 843c8ec8eeaSjose borrego (SMB_TREE_VFS((sr)->tid_tree) == SMB_NODE_VFS(node)) : 1) 844da6c28aaSamw 845da6c28aaSamw /* 846c8ec8eeaSjose borrego * SMB_NODE_IS_READONLY(node) 847c8ec8eeaSjose borrego * 848c8ec8eeaSjose borrego * This macro indicates whether the DOS readonly bit is set in the node's 849c8ec8eeaSjose borrego * attribute cache. The cache reflects what is on-disk. 850da6c28aaSamw */ 851da6c28aaSamw 852c8ec8eeaSjose borrego #define SMB_NODE_IS_READONLY(node) \ 853c8ec8eeaSjose borrego ((node) && (node)->attr.sa_dosattr & FILE_ATTRIBUTE_READONLY) 854da6c28aaSamw 855da6c28aaSamw /* 856c8ec8eeaSjose borrego * SMB_OFILE_IS_READONLY reflects whether an ofile is readonly or not. 857c8ec8eeaSjose borrego * The macro takes into account 858c8ec8eeaSjose borrego * - the tree readonly state 859c8ec8eeaSjose borrego * - the node readonly state 860c8ec8eeaSjose borrego * - whether the specified ofile is the readonly creator 861c8ec8eeaSjose borrego * The readonly creator has write permission until the ofile is closed. 862da6c28aaSamw */ 863da6c28aaSamw 864c8ec8eeaSjose borrego #define SMB_OFILE_IS_READONLY(of) \ 865c8ec8eeaSjose borrego (((of)->f_flags & SMB_OFLAGS_READONLY) || \ 866c8ec8eeaSjose borrego SMB_NODE_IS_READONLY((of)->f_node) || \ 867c8ec8eeaSjose borrego (((of)->f_node->readonly_creator) && \ 868c8ec8eeaSjose borrego ((of)->f_node->readonly_creator != (of)))) 869da6c28aaSamw 870c8ec8eeaSjose borrego /* 871c8ec8eeaSjose borrego * SMB_PATHFILE_IS_READONLY indicates whether or not a file is 872c8ec8eeaSjose borrego * readonly when the caller has a path rather than an ofile. Unlike 873c8ec8eeaSjose borrego * SMB_OFILE_IS_READONLY, the caller cannot be the readonly creator, 874c8ec8eeaSjose borrego * since that requires an ofile. 875c8ec8eeaSjose borrego */ 876da6c28aaSamw 877c8ec8eeaSjose borrego #define SMB_PATHFILE_IS_READONLY(sr, node) \ 878c8ec8eeaSjose borrego (SMB_TREE_IS_READONLY((sr)) || \ 879c8ec8eeaSjose borrego SMB_NODE_IS_READONLY((node)) || \ 880c8ec8eeaSjose borrego ((node)->readonly_creator)) 881da6c28aaSamw 882da6c28aaSamw #define PIPE_STATE_AUTH_VERIFY 0x00000001 883da6c28aaSamw 8843db3f65cSamw /* 8853db3f65cSamw * Data structure for SMB_FTYPE_MESG_PIPE ofiles, which is used 8863db3f65cSamw * at the interface between SMB and NDR RPC. 8873db3f65cSamw */ 8883db3f65cSamw typedef struct smb_opipe { 8893db3f65cSamw kmutex_t p_mutex; 8903db3f65cSamw kcondvar_t p_cv; 8913db3f65cSamw char *p_name; 8923db3f65cSamw uint32_t p_busy; 8933db3f65cSamw smb_opipe_hdr_t p_hdr; 8943db3f65cSamw smb_opipe_context_t p_context; 8953db3f65cSamw uint8_t *p_doorbuf; 8963db3f65cSamw uint8_t *p_data; 8973db3f65cSamw } smb_opipe_t; 8983db3f65cSamw 899da6c28aaSamw /* 900da6c28aaSamw * The of_ftype of an open file should contain the SMB_FTYPE value 901da6c28aaSamw * (cifs.h) returned when the file/pipe was opened. The following 902da6c28aaSamw * assumptions are currently made: 903da6c28aaSamw * 904da6c28aaSamw * File Type Node PipeInfo 905da6c28aaSamw * --------- -------- -------- 906da6c28aaSamw * SMB_FTYPE_DISK Valid Null 907da6c28aaSamw * SMB_FTYPE_BYTE_PIPE Undefined Undefined 908da6c28aaSamw * SMB_FTYPE_MESG_PIPE Null Valid 909da6c28aaSamw * SMB_FTYPE_PRINTER Undefined Undefined 910da6c28aaSamw * SMB_FTYPE_UNKNOWN Undefined Undefined 911da6c28aaSamw */ 912da6c28aaSamw 913da6c28aaSamw /* 914da6c28aaSamw * Some flags for ofile structure 915da6c28aaSamw * 916da6c28aaSamw * SMB_OFLAGS_SET_DELETE_ON_CLOSE 917da6c28aaSamw * Set this flag when the corresponding open operation whose 918da6c28aaSamw * DELETE_ON_CLOSE bit of the CreateOptions is set. If any 919da6c28aaSamw * open file instance has this bit set, the NODE_FLAGS_DELETE_ON_CLOSE 920da6c28aaSamw * will be set for the file node upon close. 921da6c28aaSamw */ 922da6c28aaSamw 923c8ec8eeaSjose borrego #define SMB_OFLAGS_READONLY 0x0001 924da6c28aaSamw #define SMB_OFLAGS_SET_DELETE_ON_CLOSE 0x0004 925da6c28aaSamw #define SMB_OFLAGS_LLF_POS_VALID 0x0008 926da6c28aaSamw 927da6c28aaSamw #define SMB_OFILE_MAGIC 0x4F464C45 /* 'OFLE' */ 928da6c28aaSamw 929da6c28aaSamw typedef enum { 930da6c28aaSamw SMB_OFILE_STATE_OPEN = 0, 931da6c28aaSamw SMB_OFILE_STATE_CLOSING, 9326537f381Sas SMB_OFILE_STATE_CLOSED, 9336537f381Sas SMB_OFILE_STATE_SENTINEL 934da6c28aaSamw } smb_ofile_state_t; 935da6c28aaSamw 936da6c28aaSamw typedef struct smb_ofile { 937da6c28aaSamw uint32_t f_magic; 938da6c28aaSamw kmutex_t f_mutex; 939da6c28aaSamw list_node_t f_lnd; 940da6c28aaSamw list_node_t f_nnd; 941da6c28aaSamw smb_ofile_state_t f_state; 942da6c28aaSamw 943faa1795aSjb struct smb_server *f_server; 944da6c28aaSamw smb_session_t *f_session; 945da6c28aaSamw smb_user_t *f_user; 946da6c28aaSamw smb_tree_t *f_tree; 947da6c28aaSamw smb_node_t *f_node; 9483db3f65cSamw smb_opipe_t *f_pipe; 949da6c28aaSamw 950dc20a302Sas uint32_t f_uniqid; 951da6c28aaSamw uint32_t f_refcnt; 952da6c28aaSamw uint64_t f_seek_pos; 953da6c28aaSamw uint32_t f_flags; 954da6c28aaSamw uint32_t f_granted_access; 955da6c28aaSamw uint32_t f_share_access; 956da6c28aaSamw uint32_t f_create_options; 957da6c28aaSamw uint16_t f_fid; 958da6c28aaSamw uint16_t f_opened_by_pid; 959da6c28aaSamw uint16_t f_ftype; 960da6c28aaSamw uint64_t f_llf_pos; 9618c10a865Sas int f_mode; 962da6c28aaSamw cred_t *f_cr; 9636537f381Sas pid_t f_pid; 964da6c28aaSamw } smb_ofile_t; 965da6c28aaSamw 966da6c28aaSamw /* odir flags bits */ 967da6c28aaSamw #define SMB_DIR_FLAG_OPEN 0x0001 968da6c28aaSamw #define SMB_DIR_FLAG_CLOSE 0x0002 969da6c28aaSamw #define SMB_DIR_CLOSED(dir) ((dir)->d_flags & SMB_DIR_FLAG_CLOSE) 970da6c28aaSamw 971da6c28aaSamw #define SMB_ODIR_MAGIC 0x4F444952 /* 'ODIR' */ 972da6c28aaSamw 973da6c28aaSamw typedef enum { 974da6c28aaSamw SMB_ODIR_STATE_OPEN = 0, 975da6c28aaSamw SMB_ODIR_STATE_CLOSING, 9766537f381Sas SMB_ODIR_STATE_CLOSED, 9776537f381Sas SMB_ODIR_STATE_SENTINEL 978da6c28aaSamw } smb_odir_state_t; 979da6c28aaSamw 980da6c28aaSamw typedef struct smb_odir { 981da6c28aaSamw uint32_t d_magic; 982da6c28aaSamw kmutex_t d_mutex; 983da6c28aaSamw list_node_t d_lnd; 984da6c28aaSamw smb_odir_state_t d_state; 985da6c28aaSamw 986da6c28aaSamw smb_session_t *d_session; 987da6c28aaSamw smb_user_t *d_user; 988da6c28aaSamw smb_tree_t *d_tree; 989da6c28aaSamw 990da6c28aaSamw uint32_t d_refcnt; 991da6c28aaSamw uint32_t d_cookie; 992c8ec8eeaSjose borrego uint32_t d_cookies[SMB_MAX_SEARCH]; 993da6c28aaSamw uint16_t d_sid; 994da6c28aaSamw uint16_t d_opened_by_pid; 995da6c28aaSamw uint16_t d_sattr; 996da6c28aaSamw char d_pattern[MAXNAMELEN]; 997da6c28aaSamw struct smb_node *d_dir_snode; 998da6c28aaSamw unsigned int d_wildcards; 999da6c28aaSamw } smb_odir_t; 1000da6c28aaSamw 1001da6c28aaSamw typedef struct smb_odir_context { 1002c8ec8eeaSjose borrego uint32_t dc_cookie; 1003c8ec8eeaSjose borrego uint16_t dc_dattr; 1004c8ec8eeaSjose borrego char dc_name[MAXNAMELEN]; /* Real 'Xxxx.yyy.xx' */ 1005c8ec8eeaSjose borrego char dc_name83[SMB_SHORTNAMELEN]; /* w/ dot 'XXXX .XX ' */ 1006c8ec8eeaSjose borrego char dc_shortname[SMB_SHORTNAMELEN]; /* w/ dot 'XXXX.XX' */ 1007c8ec8eeaSjose borrego smb_attr_t dc_attr; 1008da6c28aaSamw } smb_odir_context_t; 1009da6c28aaSamw 1010da6c28aaSamw #define SMB_LOCK_MAGIC 0x4C4F434B /* 'LOCK' */ 1011da6c28aaSamw 1012da6c28aaSamw typedef struct smb_lock { 1013da6c28aaSamw uint32_t l_magic; 1014da6c28aaSamw kmutex_t l_mutex; 1015da6c28aaSamw list_node_t l_lnd; 1016da6c28aaSamw kcondvar_t l_cv; 1017da6c28aaSamw 1018da6c28aaSamw list_node_t l_conflict_lnd; 1019da6c28aaSamw smb_slist_t l_conflict_list; 1020da6c28aaSamw 1021da6c28aaSamw smb_session_t *l_session; 1022da6c28aaSamw smb_ofile_t *l_file; 1023faa1795aSjb struct smb_request *l_sr; 1024da6c28aaSamw 1025da6c28aaSamw uint32_t l_flags; 1026da6c28aaSamw uint64_t l_session_kid; 1027da6c28aaSamw struct smb_lock *l_blocked_by; /* Debug info only */ 1028da6c28aaSamw 1029da6c28aaSamw uint16_t l_pid; 1030da6c28aaSamw uint16_t l_uid; 1031da6c28aaSamw uint32_t l_type; 1032da6c28aaSamw uint64_t l_start; 1033da6c28aaSamw uint64_t l_length; 1034da6c28aaSamw clock_t l_end_time; 1035da6c28aaSamw } smb_lock_t; 1036da6c28aaSamw 1037da6c28aaSamw #define SMB_LOCK_FLAG_INDEFINITE 0x0004 1038da6c28aaSamw #define SMB_LOCK_INDEFINITE_WAIT(lock) \ 1039da6c28aaSamw ((lock)->l_flags & SMB_LOCK_FLAG_INDEFINITE) 1040da6c28aaSamw 1041da6c28aaSamw #define SMB_LOCK_TYPE_READWRITE 101 1042da6c28aaSamw #define SMB_LOCK_TYPE_READONLY 102 1043da6c28aaSamw 1044faa1795aSjb typedef struct vardata_block { 1045faa1795aSjb uint8_t tag; 1046faa1795aSjb uint16_t len; 1047faa1795aSjb struct uio uio; 1048faa1795aSjb struct iovec iovec[MAX_IOVEC]; 1049faa1795aSjb } smb_vdb_t; 1050faa1795aSjb 1051faa1795aSjb #define SMB_RW_MAGIC 0x52445257 /* 'RDRW' */ 1052faa1795aSjb 1053faa1795aSjb typedef struct smb_rw_param { 1054faa1795aSjb uint32_t rw_magic; 1055faa1795aSjb smb_vdb_t rw_vdb; 1056faa1795aSjb uint64_t rw_offset; 1057faa1795aSjb uint32_t rw_last_write; 1058faa1795aSjb uint16_t rw_mode; 1059faa1795aSjb uint16_t rw_count; 1060faa1795aSjb uint16_t rw_mincnt; 1061faa1795aSjb uint16_t rw_dsoff; /* SMB data offset */ 1062faa1795aSjb uint8_t rw_andx; /* SMB secondary andx command */ 1063faa1795aSjb } smb_rw_param_t; 1064da6c28aaSamw 1065da6c28aaSamw struct smb_fqi { /* fs_query_info */ 1066da6c28aaSamw char *path; 1067da6c28aaSamw uint16_t srch_attr; 1068da6c28aaSamw struct smb_node *dir_snode; 1069da6c28aaSamw smb_attr_t dir_attr; 1070da6c28aaSamw char last_comp[MAXNAMELEN]; 1071da6c28aaSamw int last_comp_was_found; 1072da6c28aaSamw char last_comp_od[MAXNAMELEN]; 1073da6c28aaSamw struct smb_node *last_snode; 1074da6c28aaSamw smb_attr_t last_attr; 1075da6c28aaSamw }; 1076da6c28aaSamw 1077da6c28aaSamw #define SMB_NULL_FQI_NODES(fqi) \ 1078da6c28aaSamw (fqi).last_snode = NULL; \ 1079da6c28aaSamw (fqi).dir_snode = NULL; 1080da6c28aaSamw 1081da6c28aaSamw #define FQM_DIR_MUST_EXIST 1 1082da6c28aaSamw #define FQM_PATH_MUST_EXIST 2 1083da6c28aaSamw #define FQM_PATH_MUST_NOT_EXIST 3 1084da6c28aaSamw 1085da6c28aaSamw #define MYF_OPLOCK_MASK 0x000000F0 1086da6c28aaSamw #define MYF_OPLOCK_NONE 0x00000000 1087da6c28aaSamw #define MYF_EXCLUSIVE_OPLOCK 0x00000010 1088da6c28aaSamw #define MYF_BATCH_OPLOCK 0x00000020 1089da6c28aaSamw #define MYF_LEVEL_II_OPLOCK 0x00000030 1090da6c28aaSamw #define MYF_MUST_BE_DIRECTORY 0x00000100 1091da6c28aaSamw 1092da6c28aaSamw #define MYF_OPLOCK_TYPE(o) ((o) & MYF_OPLOCK_MASK) 1093da6c28aaSamw #define MYF_OPLOCKS_REQUEST(o) (MYF_OPLOCK_TYPE(o) != MYF_OPLOCK_NONE) 1094da6c28aaSamw #define MYF_IS_EXCLUSIVE_OPLOCK(o) (MYF_OPLOCK_TYPE(o) == MYF_EXCLUSIVE_OPLOCK) 1095da6c28aaSamw #define MYF_IS_BATCH_OPLOCK(o) (MYF_OPLOCK_TYPE(o) == MYF_BATCH_OPLOCK) 1096da6c28aaSamw #define MYF_IS_LEVEL_II_OPLOCK(o) (MYF_OPLOCK_TYPE(o) == MYF_LEVEL_II_OPLOCK) 1097da6c28aaSamw 1098da6c28aaSamw #define OPLOCK_MIN_TIMEOUT (5 * 1000) 1099da6c28aaSamw #define OPLOCK_STD_TIMEOUT (15 * 1000) 1100faa1795aSjb #define OPLOCK_RETRIES 2 1101da6c28aaSamw 11027b59d02dSjb typedef struct { 11037b59d02dSjb uint32_t severity; 11047b59d02dSjb uint32_t status; 11057b59d02dSjb uint16_t errcls; 11067b59d02dSjb uint16_t errcode; 11077b59d02dSjb } smb_error_t; 1108da6c28aaSamw 1109da6c28aaSamw /* 1110da6c28aaSamw * SMB Request State Machine 1111da6c28aaSamw * ------------------------- 1112da6c28aaSamw * 1113da6c28aaSamw * T4 +------+ T0 1114da6c28aaSamw * +--------------------------->| FREE |---------------------------+ 1115da6c28aaSamw * | +------+ | 1116da6c28aaSamw * +-----------+ | 1117da6c28aaSamw * | COMPLETED | | 1118da6c28aaSamw * +-----------+ 1119da6c28aaSamw * ^ | 1120da6c28aaSamw * | T15 +----------+ v 1121da6c28aaSamw * +------------+ T6 | | +--------------+ 1122da6c28aaSamw * | CLEANED_UP |<-----------------| CANCELED | | INITIALIZING | 1123da6c28aaSamw * +------------+ | | +--------------+ 1124da6c28aaSamw * | ^ +----------+ | 1125da6c28aaSamw * | | ^ ^ ^ ^ | 1126da6c28aaSamw * | | +-------------+ | | | | 1127da6c28aaSamw * | | T3 | | | | T13 | T1 1128da6c28aaSamw * | +-------------------------+ | | +----------------------+ | 1129da6c28aaSamw * +----------------------------+ | | | | | 1130da6c28aaSamw * T16 | | | | +-----------+ | | 1131da6c28aaSamw * | \/ | | T5 | | v 1132da6c28aaSamw * +-----------------+ | T12 +--------+ | T2 +-----------+ 1133da6c28aaSamw * | EVENT_OCCURRED |------------->| ACTIVE |<--------------------| SUBMITTED | 1134da6c28aaSamw * +-----------------+ | +--------+ | +-----------+ 1135da6c28aaSamw * ^ | | ^ | | 1136da6c28aaSamw * | | T8 | | | T7 | 1137da6c28aaSamw * | T10 T9 | +----------+ | +-------+ | T11 1138da6c28aaSamw * | | | +-------+ | | 1139da6c28aaSamw * | | | T14 | | | 1140da6c28aaSamw * | | v | v | 1141da6c28aaSamw * +----------------------+ +--------------+ 1142da6c28aaSamw * | WAITING_EVENT | | WAITING_LOCK | 1143da6c28aaSamw * +----------------------+ +--------------+ 1144da6c28aaSamw * 1145da6c28aaSamw * 1146da6c28aaSamw * 1147da6c28aaSamw * 1148da6c28aaSamw * 1149da6c28aaSamw * Transition T0 1150da6c28aaSamw * 1151da6c28aaSamw * This transition occurs when the request is allocated and is still under the 1152da6c28aaSamw * control of the session thread. 1153da6c28aaSamw * 1154da6c28aaSamw * Transition T1 1155da6c28aaSamw * 1156da6c28aaSamw * This transition occurs when the session thread dispatches a task to treat the 1157da6c28aaSamw * request. 1158da6c28aaSamw * 1159da6c28aaSamw * Transition T2 1160da6c28aaSamw * 1161da6c28aaSamw * 1162da6c28aaSamw * 1163da6c28aaSamw * Transition T3 1164da6c28aaSamw * 1165da6c28aaSamw * A request completes and smbsr_cleanup is called to release resources 1166da6c28aaSamw * associated with the request (but not the smb_request_t itself). This 1167da6c28aaSamw * includes references on smb_ofile_t, smb_node_t, and other structures. 1168da6c28aaSamw * CLEANED_UP state exists to detect if we attempt to cleanup a request 1169da6c28aaSamw * multiple times and to allow us to detect that we are accessing a 1170da6c28aaSamw * request that has already been cleaned up. 1171da6c28aaSamw * 1172da6c28aaSamw * Transition T4 1173da6c28aaSamw * 1174da6c28aaSamw * 1175da6c28aaSamw * 1176da6c28aaSamw * Transition T5 1177da6c28aaSamw * 1178da6c28aaSamw * 1179da6c28aaSamw * 1180da6c28aaSamw * Transition T6 1181da6c28aaSamw * 1182da6c28aaSamw * 1183da6c28aaSamw * 1184da6c28aaSamw * Transition T7 1185da6c28aaSamw * 1186da6c28aaSamw * 1187da6c28aaSamw * 1188da6c28aaSamw * Transition T8 1189da6c28aaSamw * 1190da6c28aaSamw * 1191da6c28aaSamw * 1192da6c28aaSamw * Transition T9 1193da6c28aaSamw * 1194da6c28aaSamw * 1195da6c28aaSamw * 1196da6c28aaSamw * Transition T10 1197da6c28aaSamw * 1198da6c28aaSamw * 1199da6c28aaSamw * 1200da6c28aaSamw * Transition T11 1201da6c28aaSamw * 1202da6c28aaSamw * 1203da6c28aaSamw * 1204da6c28aaSamw * Transition T12 1205da6c28aaSamw * 1206da6c28aaSamw * 1207da6c28aaSamw * 1208da6c28aaSamw * Transition T13 1209da6c28aaSamw * 1210da6c28aaSamw * 1211da6c28aaSamw * 1212da6c28aaSamw * Transition T14 1213da6c28aaSamw * 1214da6c28aaSamw * 1215da6c28aaSamw * 1216da6c28aaSamw * Transition T15 1217da6c28aaSamw * 1218da6c28aaSamw * Request processing is completed (control returns from smb_dispatch) 1219da6c28aaSamw * 1220da6c28aaSamw * Transition T16 1221da6c28aaSamw * 1222da6c28aaSamw * Multipart (andx) request was cleaned up with smbsr_cleanup but more "andx" 1223da6c28aaSamw * sections remain to be processed. 1224da6c28aaSamw * 1225da6c28aaSamw */ 1226da6c28aaSamw 1227da6c28aaSamw #define SMB_REQ_MAGIC 0x534D4252 /* 'SMBR' */ 1228da6c28aaSamw 1229da6c28aaSamw typedef enum smb_req_state { 1230da6c28aaSamw SMB_REQ_STATE_FREE = 0, 1231da6c28aaSamw SMB_REQ_STATE_INITIALIZING, 1232da6c28aaSamw SMB_REQ_STATE_SUBMITTED, 1233da6c28aaSamw SMB_REQ_STATE_ACTIVE, 1234da6c28aaSamw SMB_REQ_STATE_WAITING_EVENT, 1235da6c28aaSamw SMB_REQ_STATE_EVENT_OCCURRED, 1236da6c28aaSamw SMB_REQ_STATE_WAITING_LOCK, 1237da6c28aaSamw SMB_REQ_STATE_COMPLETED, 1238da6c28aaSamw SMB_REQ_STATE_CANCELED, 12396537f381Sas SMB_REQ_STATE_CLEANED_UP, 12406537f381Sas SMB_REQ_STATE_SENTINEL 1241da6c28aaSamw } smb_req_state_t; 1242da6c28aaSamw 1243faa1795aSjb typedef struct smb_request { 1244da6c28aaSamw uint32_t sr_magic; 1245da6c28aaSamw kmutex_t sr_mutex; 1246da6c28aaSamw list_node_t sr_session_lnd; 1247da6c28aaSamw smb_req_state_t sr_state; 1248da6c28aaSamw boolean_t sr_keep; 1249faa1795aSjb kmem_cache_t *sr_cache; 1250faa1795aSjb struct smb_server *sr_server; 12516537f381Sas pid_t *sr_pid; 1252c8ec8eeaSjose borrego int32_t sr_gmtoff; 1253faa1795aSjb smb_session_t *session; 1254faa1795aSjb smb_kmod_cfg_t *sr_cfg; 1255da6c28aaSamw smb_notify_change_req_t sr_ncr; 1256da6c28aaSamw 1257da6c28aaSamw /* Info from session service header */ 1258da6c28aaSamw uint32_t sr_req_length; /* Excluding NBT header */ 1259da6c28aaSamw 1260da6c28aaSamw /* Request buffer excluding NBT header */ 1261da6c28aaSamw void *sr_request_buf; 1262da6c28aaSamw 1263da6c28aaSamw /* Fields for raw writes */ 1264da6c28aaSamw uint32_t sr_raw_data_length; 1265da6c28aaSamw void *sr_raw_data_buf; 1266da6c28aaSamw 1267da6c28aaSamw smb_lock_t *sr_awaiting; 1268da6c28aaSamw struct mbuf_chain command; 1269da6c28aaSamw struct mbuf_chain reply; 1270da6c28aaSamw struct mbuf_chain raw_data; 1271da6c28aaSamw smb_malloc_list request_storage; 1272da6c28aaSamw struct smb_xa *r_xa; 1273da6c28aaSamw int andx_prev_wct; 1274da6c28aaSamw int cur_reply_offset; 1275da6c28aaSamw int orig_request_hdr; 1276da6c28aaSamw unsigned int reply_seqnum; /* reply sequence number */ 1277da6c28aaSamw unsigned char first_smb_com; /* command code */ 1278da6c28aaSamw unsigned char smb_com; /* command code */ 12797b59d02dSjb 12807b59d02dSjb uint8_t smb_rcls; /* error code class */ 12817b59d02dSjb uint8_t smb_reh; /* rsvd (AH DOS INT-24 ERR) */ 1282da6c28aaSamw uint16_t smb_err; /* error code */ 12837b59d02dSjb smb_error_t smb_error; 12847b59d02dSjb 1285da6c28aaSamw uint8_t smb_flg; /* flags */ 1286da6c28aaSamw uint16_t smb_flg2; /* flags */ 1287da6c28aaSamw uint16_t smb_pid_high; /* high part of pid */ 1288da6c28aaSamw unsigned char smb_sig[8]; /* signiture */ 1289da6c28aaSamw uint16_t smb_tid; /* tree id # */ 1290da6c28aaSamw uint16_t smb_pid; /* caller's process id # */ 1291da6c28aaSamw uint16_t smb_uid; /* user id # */ 1292da6c28aaSamw uint16_t smb_mid; /* mutiplex id # */ 1293da6c28aaSamw unsigned char smb_wct; /* count of parameter words */ 1294da6c28aaSamw uint16_t smb_bcc; /* data byte count */ 1295da6c28aaSamw 1296da6c28aaSamw /* Parameters */ 1297da6c28aaSamw struct mbuf_chain smb_vwv; /* variable width value */ 1298da6c28aaSamw 1299da6c28aaSamw /* Data */ 1300da6c28aaSamw struct mbuf_chain smb_data; 1301da6c28aaSamw 1302da6c28aaSamw uint16_t smb_fid; /* not in hdr, but common */ 1303da6c28aaSamw uint16_t smb_sid; /* not in hdr, but common */ 1304da6c28aaSamw 1305da6c28aaSamw unsigned char andx_com; 1306da6c28aaSamw uint16_t andx_off; 1307da6c28aaSamw 1308da6c28aaSamw struct smb_tree *tid_tree; 1309da6c28aaSamw struct smb_ofile *fid_ofile; 1310da6c28aaSamw struct smb_odir *sid_odir; 1311da6c28aaSamw smb_user_t *uid_user; 1312da6c28aaSamw 1313da6c28aaSamw union { 1314faa1795aSjb struct tcon { 1315da6c28aaSamw char *path; 1316da6c28aaSamw char *service; 1317da6c28aaSamw int pwdlen; 1318da6c28aaSamw char *password; 1319da6c28aaSamw uint16_t flags; 1320da6c28aaSamw } tcon; 1321da6c28aaSamw 1322da6c28aaSamw struct open_param { 1323da6c28aaSamw struct smb_fqi fqi; 1324da6c28aaSamw uint16_t omode; 1325da6c28aaSamw uint16_t oflags; 1326da6c28aaSamw uint16_t ofun; 1327da6c28aaSamw uint32_t my_flags; 1328da6c28aaSamw uint32_t timeo; 1329da6c28aaSamw uint32_t dattr; 13308c10a865Sas timestruc_t crtime; 1331*2c1b14e5Sjose borrego timestruc_t mtime; 1332da6c28aaSamw uint64_t dsize; 1333da6c28aaSamw uint32_t desired_access; 1334da6c28aaSamw uint32_t share_access; 1335da6c28aaSamw uint32_t create_options; 1336da6c28aaSamw uint32_t create_disposition; 1337c8ec8eeaSjose borrego boolean_t created_readonly; 1338da6c28aaSamw uint32_t ftype, devstate; 1339da6c28aaSamw uint32_t action_taken; 1340da6c28aaSamw uint64_t fileid; 1341faa1795aSjb uint32_t rootdirfid; 1342da6c28aaSamw /* This is only set by NTTransactCreate */ 13436537f381Sas struct smb_sd *sd; 1344da6c28aaSamw } open; 1345da6c28aaSamw 1346faa1795aSjb struct dirop { 1347da6c28aaSamw struct smb_fqi fqi; 1348da6c28aaSamw struct smb_fqi dst_fqi; 1349da6c28aaSamw } dirop; 1350da6c28aaSamw 1351faa1795aSjb smb_rw_param_t *rw; 1352faa1795aSjb uint32_t timestamp; 1353da6c28aaSamw } arg; 1354da6c28aaSamw 1355da6c28aaSamw cred_t *user_cr; 1356faa1795aSjb } smb_request_t; 1357da6c28aaSamw 1358da6c28aaSamw #define SMB_READ_PROTOCOL(smb_nh_ptr) \ 1359da6c28aaSamw LE_IN32(((smb_nethdr_t *)(smb_nh_ptr))->sh_protocol) 1360da6c28aaSamw 1361da6c28aaSamw #define SMB_PROTOCOL_MAGIC_INVALID(rd_sr) \ 1362da6c28aaSamw (SMB_READ_PROTOCOL((rd_sr)->sr_request_buf) != SMB_PROTOCOL_MAGIC) 1363da6c28aaSamw 1364da6c28aaSamw #define SMB_READ_COMMAND(smb_nh_ptr) \ 1365da6c28aaSamw (((smb_nethdr_t *)(smb_nh_ptr))->sh_command) 1366da6c28aaSamw 1367da6c28aaSamw #define SMB_IS_WRITERAW(rd_sr) \ 1368da6c28aaSamw (SMB_READ_COMMAND((rd_sr)->sr_request_buf) == SMB_COM_WRITE_RAW) 1369da6c28aaSamw 1370da6c28aaSamw 1371da6c28aaSamw #define SR_FLG_OFFSET 9 1372da6c28aaSamw 1373da6c28aaSamw #define MAX_TRANS_NAME 64 1374da6c28aaSamw 1375da6c28aaSamw #define SMB_XA_FLAG_OPEN 0x0001 1376da6c28aaSamw #define SMB_XA_FLAG_CLOSE 0x0002 1377da6c28aaSamw #define SMB_XA_FLAG_COMPLETE 0x0004 1378da6c28aaSamw #define SMB_XA_CLOSED(xa) (!((xa)->xa_flags & SMB_XA_FLAG_OPEN)) 1379da6c28aaSamw 1380da6c28aaSamw #define SMB_XA_MAGIC 0x534D4258 /* 'SMBX' */ 1381da6c28aaSamw 1382da6c28aaSamw typedef struct smb_xa { 1383da6c28aaSamw uint32_t xa_magic; 1384da6c28aaSamw kmutex_t xa_mutex; 1385da6c28aaSamw list_node_t xa_lnd; 1386da6c28aaSamw 1387da6c28aaSamw uint32_t xa_refcnt; 1388da6c28aaSamw uint32_t xa_flags; 1389da6c28aaSamw 1390da6c28aaSamw struct smb_session *xa_session; 1391da6c28aaSamw 1392da6c28aaSamw unsigned char smb_com; /* which TRANS type */ 1393da6c28aaSamw unsigned char smb_flg; /* flags */ 1394da6c28aaSamw uint16_t smb_flg2; /* flags */ 1395da6c28aaSamw uint16_t smb_tid; /* tree id number */ 1396da6c28aaSamw uint16_t smb_pid; /* caller's process id number */ 1397da6c28aaSamw uint16_t smb_uid; /* user id number */ 1398da6c28aaSamw uint32_t smb_func; /* NT_TRANS function */ 1399da6c28aaSamw 1400da6c28aaSamw uint16_t xa_smb_mid; /* mutiplex id number */ 1401da6c28aaSamw uint16_t xa_smb_fid; /* TRANS2 secondary */ 1402da6c28aaSamw 1403da6c28aaSamw unsigned int reply_seqnum; /* reply sequence number */ 1404da6c28aaSamw 1405da6c28aaSamw uint32_t smb_tpscnt; /* total parameter bytes being sent */ 1406da6c28aaSamw uint32_t smb_tdscnt; /* total data bytes being sent */ 1407da6c28aaSamw uint32_t smb_mprcnt; /* max parameter bytes to return */ 1408da6c28aaSamw uint32_t smb_mdrcnt; /* max data bytes to return */ 1409da6c28aaSamw uint32_t smb_msrcnt; /* max setup words to return */ 1410da6c28aaSamw uint32_t smb_flags; /* additional information: */ 1411da6c28aaSamw /* bit 0 - if set, disconnect TID in smb_tid */ 1412da6c28aaSamw /* bit 1 - if set, transaction is one way */ 1413da6c28aaSamw /* (no final response) */ 1414da6c28aaSamw int32_t smb_timeout; /* number of milliseconds to await completion */ 1415da6c28aaSamw uint32_t smb_suwcnt; /* set up word count */ 1416da6c28aaSamw 1417da6c28aaSamw 1418da6c28aaSamw char *xa_smb_trans_name; 1419da6c28aaSamw 1420da6c28aaSamw int req_disp_param; 1421da6c28aaSamw int req_disp_data; 1422da6c28aaSamw 1423da6c28aaSamw struct mbuf_chain req_setup_mb; 1424da6c28aaSamw struct mbuf_chain req_param_mb; 1425da6c28aaSamw struct mbuf_chain req_data_mb; 1426da6c28aaSamw 1427da6c28aaSamw struct mbuf_chain rep_setup_mb; 1428da6c28aaSamw struct mbuf_chain rep_param_mb; 1429da6c28aaSamw struct mbuf_chain rep_data_mb; 1430da6c28aaSamw } smb_xa_t; 1431da6c28aaSamw 1432da6c28aaSamw 1433da6c28aaSamw #define SDDF_NO_FLAGS 0 1434da6c28aaSamw #define SDDF_SUPPRESS_TID 0x0001 1435da6c28aaSamw #define SDDF_SUPPRESS_UID 0x0002 1436da6c28aaSamw 14377b59d02dSjb /* 14387b59d02dSjb * SMB dispatch return codes. 14397b59d02dSjb */ 14407b59d02dSjb typedef enum { 1441faa1795aSjb SDRC_SUCCESS = 0, 1442faa1795aSjb SDRC_ERROR, 14437b59d02dSjb SDRC_DROP_VC, 14447b59d02dSjb SDRC_NO_REPLY, 1445faa1795aSjb SDRC_NOT_IMPLEMENTED 14467b59d02dSjb } smb_sdrc_t; 1447da6c28aaSamw 1448da6c28aaSamw #define VAR_BCC ((short)-1) 1449da6c28aaSamw 1450faa1795aSjb #define SMB_SERVER_MAGIC 0x53534552 /* 'SSER' */ 1451da6c28aaSamw 1452faa1795aSjb typedef struct { 1453faa1795aSjb kstat_named_t open_files; 1454faa1795aSjb kstat_named_t open_trees; 1455faa1795aSjb kstat_named_t open_users; 1456faa1795aSjb } smb_server_stats_t; 1457da6c28aaSamw 1458faa1795aSjb typedef struct { 1459faa1795aSjb kthread_t *ld_kth; 1460faa1795aSjb kt_did_t ld_ktdid; 1461faa1795aSjb struct sonode *ld_so; 1462faa1795aSjb struct sockaddr_in ld_sin; 1463faa1795aSjb smb_session_list_t ld_session_list; 1464faa1795aSjb } smb_listener_daemon_t; 1465faa1795aSjb 1466faa1795aSjb typedef enum smb_server_state { 1467faa1795aSjb SMB_SERVER_STATE_CREATED = 0, 1468faa1795aSjb SMB_SERVER_STATE_CONFIGURED, 1469faa1795aSjb SMB_SERVER_STATE_RUNNING, 14706537f381Sas SMB_SERVER_STATE_DELETING, 14716537f381Sas SMB_SERVER_STATE_SENTINEL 1472faa1795aSjb } smb_server_state_t; 1473faa1795aSjb 1474faa1795aSjb typedef struct smb_server { 1475faa1795aSjb uint32_t sv_magic; 1476faa1795aSjb kcondvar_t sv_cv; 1477faa1795aSjb kmutex_t sv_mutex; 1478faa1795aSjb list_node_t sv_lnd; 1479faa1795aSjb smb_server_state_t sv_state; 1480faa1795aSjb uint32_t sv_refcnt; 14816537f381Sas pid_t sv_pid; 1482faa1795aSjb zoneid_t sv_zid; 1483faa1795aSjb smb_listener_daemon_t sv_nbt_daemon; 1484faa1795aSjb smb_listener_daemon_t sv_tcp_daemon; 1485faa1795aSjb krwlock_t sv_cfg_lock; 1486faa1795aSjb smb_kmod_cfg_t sv_cfg; 1487faa1795aSjb smb_session_t *sv_session; 1488da6c28aaSamw 1489faa1795aSjb kstat_t *sv_ksp; 1490faa1795aSjb kmutex_t sv_ksp_mutex; 1491faa1795aSjb char sv_ksp_name[KSTAT_STRLEN]; 1492faa1795aSjb smb_server_stats_t sv_ks_data; 1493da6c28aaSamw 1494faa1795aSjb door_handle_t sv_lmshrd; 1495da6c28aaSamw 1496c8ec8eeaSjose borrego int32_t si_gmtoff; 1497da6c28aaSamw 1498da6c28aaSamw smb_thread_t si_thread_timers; 1499*2c1b14e5Sjose borrego smb_thread_t si_thread_unexport; 1500da6c28aaSamw 1501faa1795aSjb taskq_t *sv_thread_pool; 1502da6c28aaSamw 1503*2c1b14e5Sjose borrego kmem_cache_t *si_cache_unexport; 1504da6c28aaSamw kmem_cache_t *si_cache_vfs; 1505da6c28aaSamw kmem_cache_t *si_cache_request; 1506da6c28aaSamw kmem_cache_t *si_cache_session; 1507da6c28aaSamw kmem_cache_t *si_cache_user; 1508da6c28aaSamw kmem_cache_t *si_cache_tree; 1509da6c28aaSamw kmem_cache_t *si_cache_ofile; 1510da6c28aaSamw kmem_cache_t *si_cache_odir; 1511da6c28aaSamw kmem_cache_t *si_cache_node; 1512da6c28aaSamw 1513faa1795aSjb volatile uint32_t sv_open_trees; 1514faa1795aSjb volatile uint32_t sv_open_files; 1515faa1795aSjb volatile uint32_t sv_open_users; 1516da6c28aaSamw 1517da6c28aaSamw smb_node_t *si_root_smb_node; 1518faa1795aSjb smb_llist_t sv_vfs_list; 1519*2c1b14e5Sjose borrego smb_slist_t sv_unexport_list; 1520faa1795aSjb } smb_server_t; 1521da6c28aaSamw 1522da6c28aaSamw #define SMB_INFO_NETBIOS_SESSION_SVC_RUNNING 0x0001 1523da6c28aaSamw #define SMB_INFO_NETBIOS_SESSION_SVC_FAILED 0x0002 1524da6c28aaSamw #define SMB_INFO_USER_LEVEL_SECURITY 0x40000000 1525da6c28aaSamw #define SMB_INFO_ENCRYPT_PASSWORDS 0x80000000 1526da6c28aaSamw 1527faa1795aSjb #define SMB_NEW_KID() atomic_inc_64_nv(&smb_kids) 1528faa1795aSjb #define SMB_UNIQ_FID() atomic_inc_32_nv(&smb_fids) 1529da6c28aaSamw 1530da6c28aaSamw /* 1531da6c28aaSamw * This is to be used by Trans2SetFileInfo 1532da6c28aaSamw * and Trans2SetPathInfo 1533da6c28aaSamw */ 1534da6c28aaSamw typedef struct smb_trans2_setinfo { 1535da6c28aaSamw uint16_t level; 1536da6c28aaSamw struct smb_xa *ts_xa; 1537da6c28aaSamw struct smb_node *node; 1538da6c28aaSamw char *path; 1539da6c28aaSamw char name[MAXNAMELEN]; 1540da6c28aaSamw } smb_trans2_setinfo_t; 1541da6c28aaSamw 1542da6c28aaSamw #define SMB_IS_STREAM(node) ((node)->unnamed_stream_node) 1543da6c28aaSamw 1544da6c28aaSamw #ifdef DEBUG 1545da6c28aaSamw extern uint_t smb_tsd_key; 1546da6c28aaSamw #endif 1547da6c28aaSamw 1548da6c28aaSamw typedef struct smb_tsd { 1549da6c28aaSamw void (*proc)(); 1550da6c28aaSamw void *arg; 1551da6c28aaSamw char name[100]; 1552da6c28aaSamw } smb_tsd_t; 1553da6c28aaSamw 1554da6c28aaSamw #define SMB_INVALID_AMASK -1 1555da6c28aaSamw #define SMB_INVALID_SHAREMODE -1 1556da6c28aaSamw #define SMB_INVALID_CRDISPOSITION -1 1557da6c28aaSamw 1558da6c28aaSamw typedef struct smb_dispatch_table { 1559faa1795aSjb smb_sdrc_t (*sdt_pre_op)(smb_request_t *); 1560faa1795aSjb smb_sdrc_t (*sdt_function)(smb_request_t *); 1561faa1795aSjb void (*sdt_post_op)(smb_request_t *); 1562da6c28aaSamw char sdt_dialect; 1563da6c28aaSamw unsigned char sdt_flags; 1564da6c28aaSamw krw_t sdt_slock_mode; 1565da6c28aaSamw kstat_named_t sdt_dispatch_stats; /* invocations */ 1566da6c28aaSamw } smb_dispatch_table_t; 1567da6c28aaSamw 156855bf511dSas /* 156955bf511dSas * Discretionary Access Control List (DACL) 157055bf511dSas * 157155bf511dSas * A Discretionary Access Control List (DACL), often abbreviated to 157255bf511dSas * ACL, is a list of access controls which either allow or deny access 157355bf511dSas * for users or groups to a resource. There is a list header followed 157455bf511dSas * by a list of access control entries (ACE). Each ACE specifies the 157555bf511dSas * access allowed or denied to a single user or group (identified by 157655bf511dSas * a SID). 157755bf511dSas * 157855bf511dSas * There is another access control list object called a System Access 157955bf511dSas * Control List (SACL), which is used to control auditing, but no 158055bf511dSas * support is provideed for SACLs at this time. 158155bf511dSas * 158255bf511dSas * ACL header format: 158355bf511dSas * 158455bf511dSas * 3 3 2 2 2 2 2 2 2 2 2 2 1 1 1 1 1 1 1 1 1 1 158555bf511dSas * 1 0 9 8 7 6 5 4 3 2 1 0 9 8 7 6 5 4 3 2 1 0 9 8 7 6 5 4 3 2 1 0 158655bf511dSas * +-------------------------------+---------------+---------------+ 158755bf511dSas * | AclSize | Sbz1 | AclRevision | 158855bf511dSas * +-------------------------------+---------------+---------------+ 158955bf511dSas * | Sbz2 | AceCount | 159055bf511dSas * +-------------------------------+-------------------------------+ 159155bf511dSas * 159255bf511dSas * AclRevision specifies the revision level of the ACL. This value should 159355bf511dSas * be ACL_REVISION, unless the ACL contains an object-specific ACE, in which 159455bf511dSas * case this value must be ACL_REVISION_DS. All ACEs in an ACL must be at the 159555bf511dSas * same revision level. 159655bf511dSas * 159755bf511dSas * ACE header format: 159855bf511dSas * 159955bf511dSas * 3 3 2 2 2 2 2 2 2 2 2 2 1 1 1 1 1 1 1 1 1 1 160055bf511dSas * 1 0 9 8 7 6 5 4 3 2 1 0 9 8 7 6 5 4 3 2 1 0 9 8 7 6 5 4 3 2 1 0 160155bf511dSas * +---------------+-------+-------+---------------+---------------+ 160255bf511dSas * | AceSize | AceFlags | AceType | 160355bf511dSas * +---------------+-------+-------+---------------+---------------+ 160455bf511dSas * 160555bf511dSas * Access mask format: 160655bf511dSas * 160755bf511dSas * 3 3 2 2 2 2 2 2 2 2 2 2 1 1 1 1 1 1 1 1 1 1 160855bf511dSas * 1 0 9 8 7 6 5 4 3 2 1 0 9 8 7 6 5 4 3 2 1 0 9 8 7 6 5 4 3 2 1 0 160955bf511dSas * +---------------+---------------+-------------------------------+ 161055bf511dSas * |G|G|G|G|Res'd|A| StandardRights| SpecificRights | 161155bf511dSas * |R|W|E|A| |S| | | 161255bf511dSas * +-+-------------+---------------+-------------------------------+ 161355bf511dSas * 161455bf511dSas * typedef struct ACCESS_MASK { 161555bf511dSas * WORD SpecificRights; 161655bf511dSas * BYTE StandardRights; 161755bf511dSas * BYTE AccessSystemAcl : 1; 161855bf511dSas * BYTE Reserved : 3; 161955bf511dSas * BYTE GenericAll : 1; 162055bf511dSas * BYTE GenericExecute : 1; 162155bf511dSas * BYTE GenericWrite : 1; 162255bf511dSas * BYTE GenericRead : 1; 162355bf511dSas * } ACCESS_MASK; 162455bf511dSas * 162555bf511dSas */ 162655bf511dSas 162755bf511dSas #define ACL_REVISION1 1 162855bf511dSas #define ACL_REVISION2 2 162955bf511dSas #define MIN_ACL_REVISION2 ACL_REVISION2 163055bf511dSas #define ACL_REVISION3 3 163155bf511dSas #define ACL_REVISION4 4 163255bf511dSas #define MAX_ACL_REVISION ACL_REVISION4 163355bf511dSas 163455bf511dSas /* 163555bf511dSas * Current ACE and ACL revision Levels 163655bf511dSas */ 163755bf511dSas #define ACE_REVISION 1 163855bf511dSas #define ACL_REVISION ACL_REVISION2 163955bf511dSas #define ACL_REVISION_DS ACL_REVISION4 164055bf511dSas 164155bf511dSas 164255bf511dSas #define ACCESS_ALLOWED_ACE_TYPE 0 164355bf511dSas #define ACCESS_DENIED_ACE_TYPE 1 164455bf511dSas #define SYSTEM_AUDIT_ACE_TYPE 2 164555bf511dSas #define SYSTEM_ALARM_ACE_TYPE 3 164655bf511dSas 164755bf511dSas /* 164855bf511dSas * se_flags 164955bf511dSas * ---------- 165055bf511dSas * Specifies a set of ACE type-specific control flags. This member can be a 165155bf511dSas * combination of the following values. 165255bf511dSas * 165355bf511dSas * CONTAINER_INHERIT_ACE: Child objects that are containers, such as 165455bf511dSas * directories, inherit the ACE as an effective ACE. The inherited 165555bf511dSas * ACE is inheritable unless the NO_PROPAGATE_INHERIT_ACE bit flag 165655bf511dSas * is also set. 165755bf511dSas * 165855bf511dSas * INHERIT_ONLY_ACE: Indicates an inherit-only ACE which does not control 165955bf511dSas * access to the object to which it is attached. 166055bf511dSas * If this flag is not set, 166155bf511dSas * the ACE is an effective ACE which controls access to the object 166255bf511dSas * to which it is attached. 166355bf511dSas * Both effective and inherit-only ACEs can be inherited 166455bf511dSas * depending on the state of the other inheritance flags. 166555bf511dSas * 166655bf511dSas * INHERITED_ACE: Windows 2000/XP: Indicates that the ACE was inherited. 166755bf511dSas * The system sets this bit when it propagates an 166855bf511dSas * inherited ACE to a child object. 166955bf511dSas * 167055bf511dSas * NO_PROPAGATE_INHERIT_ACE: If the ACE is inherited by a child object, the 167155bf511dSas * system clears the OBJECT_INHERIT_ACE and CONTAINER_INHERIT_ACE 167255bf511dSas * flags in the inherited ACE. 167355bf511dSas * This prevents the ACE from being inherited by 167455bf511dSas * subsequent generations of objects. 167555bf511dSas * 167655bf511dSas * OBJECT_INHERIT_ACE: Noncontainer child objects inherit the ACE as an 167755bf511dSas * effective ACE. For child objects that are containers, 167855bf511dSas * the ACE is inherited as an inherit-only ACE unless the 167955bf511dSas * NO_PROPAGATE_INHERIT_ACE bit flag is also set. 168055bf511dSas */ 168155bf511dSas #define OBJECT_INHERIT_ACE 0x01 168255bf511dSas #define CONTAINER_INHERIT_ACE 0x02 168355bf511dSas #define NO_PROPOGATE_INHERIT_ACE 0x04 168455bf511dSas #define INHERIT_ONLY_ACE 0x08 168555bf511dSas #define INHERITED_ACE 0x10 168655bf511dSas #define INHERIT_MASK_ACE 0x1F 168755bf511dSas 168855bf511dSas 168955bf511dSas /* 169055bf511dSas * These flags are only used in system audit or alarm ACEs to 169155bf511dSas * indicate when an audit message should be generated, i.e. 169255bf511dSas * on successful access or on unsuccessful access. 169355bf511dSas */ 169455bf511dSas #define SUCCESSFUL_ACCESS_ACE_FLAG 0x40 169555bf511dSas #define FAILED_ACCESS_ACE_FLAG 0x80 169655bf511dSas 169755bf511dSas /* 169855bf511dSas * se_bsize is the size, in bytes, of ACE as it appears on the wire. 169955bf511dSas * se_sln is used to sort the ACL when it's required. 170055bf511dSas */ 170155bf511dSas typedef struct smb_acehdr { 170255bf511dSas uint8_t se_type; 170355bf511dSas uint8_t se_flags; 170455bf511dSas uint16_t se_bsize; 170555bf511dSas } smb_acehdr_t; 170655bf511dSas 170755bf511dSas typedef struct smb_ace { 170855bf511dSas smb_acehdr_t se_hdr; 170955bf511dSas uint32_t se_mask; 171055bf511dSas list_node_t se_sln; 17116537f381Sas smb_sid_t *se_sid; 171255bf511dSas } smb_ace_t; 171355bf511dSas 171455bf511dSas /* 171555bf511dSas * sl_bsize is the size of ACL in bytes as it appears on the wire. 171655bf511dSas */ 171755bf511dSas typedef struct smb_acl { 171855bf511dSas uint8_t sl_revision; 171955bf511dSas uint16_t sl_bsize; 172055bf511dSas uint16_t sl_acecnt; 172155bf511dSas smb_ace_t *sl_aces; 172255bf511dSas list_t sl_sorted; 172355bf511dSas } smb_acl_t; 172455bf511dSas 172555bf511dSas /* 172655bf511dSas * ACE/ACL header size, in byte, as it appears on the wire 172755bf511dSas */ 172855bf511dSas #define SMB_ACE_HDRSIZE 4 172955bf511dSas #define SMB_ACL_HDRSIZE 8 173055bf511dSas 173155bf511dSas /* 173255bf511dSas * Security Descriptor (SD) 173355bf511dSas * 173455bf511dSas * Security descriptors provide protection for objects, for example 173555bf511dSas * files and directories. It identifies the owner and primary group 173655bf511dSas * (SIDs) and contains an access control list. When a user tries to 173755bf511dSas * access an object his SID is compared to the permissions in the 173855bf511dSas * DACL to determine if access should be allowed or denied. Note that 173955bf511dSas * this is a simplification because there are other factors, such as 174055bf511dSas * default behavior and privileges to be taken into account (see also 174155bf511dSas * access tokens). 174255bf511dSas * 174355bf511dSas * The boolean flags have the following meanings when set: 174455bf511dSas * 174555bf511dSas * SE_OWNER_DEFAULTED indicates that the SID pointed to by the Owner 174655bf511dSas * field was provided by a defaulting mechanism rather than explicitly 174755bf511dSas * provided by the original provider of the security descriptor. This 174855bf511dSas * may affect the treatment of the SID with respect to inheritance of 174955bf511dSas * an owner. 175055bf511dSas * 175155bf511dSas * SE_GROUP_DEFAULTED indicates that the SID in the Group field was 175255bf511dSas * provided by a defaulting mechanism rather than explicitly provided 175355bf511dSas * by the original provider of the security descriptor. This may 175455bf511dSas * affect the treatment of the SID with respect to inheritance of a 175555bf511dSas * primary group. 175655bf511dSas * 175755bf511dSas * SE_DACL_PRESENT indicates that the security descriptor contains a 175855bf511dSas * discretionary ACL. If this flag is set and the Dacl field of the 175955bf511dSas * SECURITY_DESCRIPTOR is null, then a null ACL is explicitly being 176055bf511dSas * specified. 176155bf511dSas * 176255bf511dSas * SE_DACL_DEFAULTED indicates that the ACL pointed to by the Dacl 176355bf511dSas * field was provided by a defaulting mechanism rather than explicitly 176455bf511dSas * provided by the original provider of the security descriptor. This 176555bf511dSas * may affect the treatment of the ACL with respect to inheritance of 176655bf511dSas * an ACL. This flag is ignored if the DaclPresent flag is not set. 176755bf511dSas * 176855bf511dSas * SE_SACL_PRESENT indicates that the security descriptor contains a 176955bf511dSas * system ACL pointed to by the Sacl field. If this flag is set and 177055bf511dSas * the Sacl field of the SECURITY_DESCRIPTOR is null, then an empty 177155bf511dSas * (but present) ACL is being specified. 177255bf511dSas * 177355bf511dSas * SE_SACL_DEFAULTED indicates that the ACL pointed to by the Sacl 177455bf511dSas * field was provided by a defaulting mechanism rather than explicitly 177555bf511dSas * provided by the original provider of the security descriptor. This 177655bf511dSas * may affect the treatment of the ACL with respect to inheritance of 177755bf511dSas * an ACL. This flag is ignored if the SaclPresent flag is not set. 177855bf511dSas * 177955bf511dSas * SE_DACL_PROTECTED Prevents ACEs set on the DACL of the parent container 178055bf511dSas * (and any objects above the parent container in the directory hierarchy) 178155bf511dSas * from being applied to the object's DACL. 178255bf511dSas * 178355bf511dSas * SE_SACL_PROTECTED Prevents ACEs set on the SACL of the parent container 178455bf511dSas * (and any objects above the parent container in the directory hierarchy) 178555bf511dSas * from being applied to the object's SACL. 178655bf511dSas * 178755bf511dSas * Note that the SE_DACL_PRESENT flag needs to be present to set 178855bf511dSas * SE_DACL_PROTECTED and SE_SACL_PRESENT needs to be present to set 178955bf511dSas * SE_SACL_PROTECTED. 179055bf511dSas * 179155bf511dSas * SE_SELF_RELATIVE indicates that the security descriptor is in self- 179255bf511dSas * relative form. In this form, all fields of the security descriptor 179355bf511dSas * are contiguous in memory and all pointer fields are expressed as 179455bf511dSas * offsets from the beginning of the security descriptor. 179555bf511dSas * 179655bf511dSas * 3 3 2 2 2 2 2 2 2 2 2 2 1 1 1 1 1 1 1 1 1 1 179755bf511dSas * 1 0 9 8 7 6 5 4 3 2 1 0 9 8 7 6 5 4 3 2 1 0 9 8 7 6 5 4 3 2 1 0 179855bf511dSas * +---------------------------------------------------------------+ 179955bf511dSas * | Control |Reserved1 (SBZ)| Revision | 180055bf511dSas * +---------------------------------------------------------------+ 180155bf511dSas * | Owner | 180255bf511dSas * +---------------------------------------------------------------+ 180355bf511dSas * | Group | 180455bf511dSas * +---------------------------------------------------------------+ 180555bf511dSas * | Sacl | 180655bf511dSas * +---------------------------------------------------------------+ 180755bf511dSas * | Dacl | 180855bf511dSas * +---------------------------------------------------------------+ 180955bf511dSas * 181055bf511dSas */ 181155bf511dSas 181255bf511dSas #define SMB_OWNER_SECINFO 0x0001 181355bf511dSas #define SMB_GROUP_SECINFO 0x0002 181455bf511dSas #define SMB_DACL_SECINFO 0x0004 181555bf511dSas #define SMB_SACL_SECINFO 0x0008 181655bf511dSas #define SMB_ALL_SECINFO 0x000F 181755bf511dSas #define SMB_ACL_SECINFO (SMB_DACL_SECINFO | SMB_SACL_SECINFO) 181855bf511dSas 181955bf511dSas #define SECURITY_DESCRIPTOR_REVISION 1 182055bf511dSas 182155bf511dSas 182255bf511dSas #define SE_OWNER_DEFAULTED 0x0001 182355bf511dSas #define SE_GROUP_DEFAULTED 0x0002 182455bf511dSas #define SE_DACL_PRESENT 0x0004 182555bf511dSas #define SE_DACL_DEFAULTED 0x0008 182655bf511dSas #define SE_SACL_PRESENT 0x0010 182755bf511dSas #define SE_SACL_DEFAULTED 0x0020 182855bf511dSas #define SE_DACL_AUTO_INHERIT_REQ 0x0100 182955bf511dSas #define SE_SACL_AUTO_INHERIT_REQ 0x0200 183055bf511dSas #define SE_DACL_AUTO_INHERITED 0x0400 183155bf511dSas #define SE_SACL_AUTO_INHERITED 0x0800 183255bf511dSas #define SE_DACL_PROTECTED 0x1000 183355bf511dSas #define SE_SACL_PROTECTED 0x2000 183455bf511dSas #define SE_SELF_RELATIVE 0x8000 183555bf511dSas 183655bf511dSas #define SE_DACL_INHERITANCE_MASK 0x1500 183755bf511dSas #define SE_SACL_INHERITANCE_MASK 0x2A00 183855bf511dSas 183955bf511dSas /* 184055bf511dSas * Security descriptor structures: 184155bf511dSas * 184255bf511dSas * smb_sd_t SD in SMB pointer form 184355bf511dSas * smb_fssd_t SD in filesystem form 184455bf511dSas * 184555bf511dSas * Filesystems (e.g. ZFS/UFS) don't have something equivalent 184655bf511dSas * to SD. The items comprising a SMB SD are kept separately in 184755bf511dSas * filesystem. smb_fssd_t is introduced as a helper to provide 184855bf511dSas * the required abstraction for CIFS code. 184955bf511dSas */ 185055bf511dSas 18516537f381Sas typedef struct smb_sd { 185255bf511dSas uint8_t sd_revision; 185355bf511dSas uint16_t sd_control; 18546537f381Sas smb_sid_t *sd_owner; /* SID file owner */ 18556537f381Sas smb_sid_t *sd_group; /* SID group (for POSIX) */ 185655bf511dSas smb_acl_t *sd_sacl; /* ACL System (audits) */ 185755bf511dSas smb_acl_t *sd_dacl; /* ACL Discretionary (perm) */ 18586537f381Sas } smb_sd_t; 185955bf511dSas 186055bf511dSas /* 186155bf511dSas * SD header size as it appears on the wire 186255bf511dSas */ 186355bf511dSas #define SMB_SD_HDRSIZE 20 186455bf511dSas 186555bf511dSas /* 186655bf511dSas * values for smb_fssd.sd_flags 186755bf511dSas */ 186855bf511dSas #define SMB_FSSD_FLAGS_DIR 0x01 186955bf511dSas 187055bf511dSas typedef struct smb_fssd { 187155bf511dSas uint32_t sd_secinfo; 187255bf511dSas uint32_t sd_flags; 187355bf511dSas uid_t sd_uid; 187455bf511dSas gid_t sd_gid; 187555bf511dSas acl_t *sd_zdacl; 187655bf511dSas acl_t *sd_zsacl; 187755bf511dSas } smb_fssd_t; 187855bf511dSas 1879da6c28aaSamw #ifdef __cplusplus 1880da6c28aaSamw } 1881da6c28aaSamw #endif 1882da6c28aaSamw 1883faa1795aSjb #endif /* _SMBSRV_SMB_KTYPES_H */ 1884