1 /*
2  * Copyright (c) 2000-2001, Boris Popov
3  * All rights reserved.
4  *
5  * Redistribution and use in source and binary forms, with or without
6  * modification, are permitted provided that the following conditions
7  * are met:
8  * 1. Redistributions of source code must retain the above copyright
9  *    notice, this list of conditions and the following disclaimer.
10  * 2. Redistributions in binary form must reproduce the above copyright
11  *    notice, this list of conditions and the following disclaimer in the
12  *    documentation and/or other materials provided with the distribution.
13  * 3. All advertising materials mentioning features or use of this software
14  *    must display the following acknowledgement:
15  *    This product includes software developed by Boris Popov.
16  * 4. Neither the name of the author nor the names of any co-contributors
17  *    may be used to endorse or promote products derived from this software
18  *    without specific prior written permission.
19  *
20  * THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND
21  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
22  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
23  * ARE DISCLAIMED.  IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
24  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
25  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
26  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
27  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
28  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
29  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
30  * SUCH DAMAGE.
31  *
32  * $Id: smbfs_vfsops.c,v 1.73.64.1 2005/05/27 02:35:28 lindak Exp $
33  */
34 
35 /*
36  * Copyright (c) 2008, 2010, Oracle and/or its affiliates. All rights reserved.
37  */
38 
39 #include <sys/systm.h>
40 #include <sys/cred.h>
41 #include <sys/time.h>
42 #include <sys/vfs.h>
43 #include <sys/vnode.h>
44 #include <fs/fs_subr.h>
45 #include <sys/sysmacros.h>
46 #include <sys/kmem.h>
47 #include <sys/mkdev.h>
48 #include <sys/mount.h>
49 #include <sys/statvfs.h>
50 #include <sys/errno.h>
51 #include <sys/debug.h>
52 #include <sys/cmn_err.h>
53 #include <sys/modctl.h>
54 #include <sys/policy.h>
55 #include <sys/atomic.h>
56 #include <sys/zone.h>
57 #include <sys/vfs_opreg.h>
58 #include <sys/mntent.h>
59 #include <sys/priv.h>
60 #include <sys/tsol/label.h>
61 #include <sys/tsol/tndb.h>
62 #include <inet/ip.h>
63 
64 #include <netsmb/smb_osdep.h>
65 #include <netsmb/smb.h>
66 #include <netsmb/smb_conn.h>
67 #include <netsmb/smb_subr.h>
68 #include <netsmb/smb_dev.h>
69 
70 #include <smbfs/smbfs.h>
71 #include <smbfs/smbfs_node.h>
72 #include <smbfs/smbfs_subr.h>
73 
74 /*
75  * Local functions definitions.
76  */
77 int		smbfsinit(int fstyp, char *name);
78 void		smbfsfini();
79 static int	smbfs_mount_label_policy(vfs_t *, void *, int, cred_t *);
80 
81 /*
82  * SMBFS Mount options table for MS_OPTIONSTR
83  * Note: These are not all the options.
84  * Some options come in via MS_DATA.
85  * Others are generic (see vfs.c)
86  */
87 static char *intr_cancel[] = { MNTOPT_NOINTR, NULL };
88 static char *nointr_cancel[] = { MNTOPT_INTR, NULL };
89 static char *acl_cancel[] = { MNTOPT_NOACL, NULL };
90 static char *noacl_cancel[] = { MNTOPT_ACL, NULL };
91 static char *xattr_cancel[] = { MNTOPT_NOXATTR, NULL };
92 static char *noxattr_cancel[] = { MNTOPT_XATTR, NULL };
93 
94 static mntopt_t mntopts[] = {
95 /*
96  *	option name		cancel option	default arg	flags
97  *		ufs arg flag
98  */
99 	{ MNTOPT_INTR,		intr_cancel,	NULL,	MO_DEFAULT, 0 },
100 	{ MNTOPT_NOINTR,	nointr_cancel,	NULL,	0,	0 },
101 	{ MNTOPT_ACL,		acl_cancel,	NULL,	MO_DEFAULT, 0 },
102 	{ MNTOPT_NOACL,		noacl_cancel,	NULL,	0,	0 },
103 	{ MNTOPT_XATTR,		xattr_cancel,	NULL,	MO_DEFAULT, 0 },
104 	{ MNTOPT_NOXATTR,	noxattr_cancel, NULL,	0,	0 }
105 };
106 
107 static mntopts_t smbfs_mntopts = {
108 	sizeof (mntopts) / sizeof (mntopt_t),
109 	mntopts
110 };
111 
112 static const char fs_type_name[FSTYPSZ] = "smbfs";
113 
114 static vfsdef_t vfw = {
115 	VFSDEF_VERSION,
116 	(char *)fs_type_name,
117 	smbfsinit,		/* init routine */
118 	VSW_HASPROTO|VSW_NOTZONESAFE|VSW_ZMOUNT,	/* flags */
119 	&smbfs_mntopts			/* mount options table prototype */
120 };
121 
122 static struct modlfs modlfs = {
123 	&mod_fsops,
124 	"SMBFS filesystem",
125 	&vfw
126 };
127 
128 static struct modlinkage modlinkage = {
129 	MODREV_1, (void *)&modlfs, NULL
130 };
131 
132 /*
133  * Mutex to protect the following variables:
134  *	  smbfs_major
135  *	  smbfs_minor
136  */
137 extern	kmutex_t	smbfs_minor_lock;
138 extern	int		smbfs_major;
139 extern	int		smbfs_minor;
140 
141 /*
142  * Prevent unloads while we have mounts
143  */
144 uint32_t	smbfs_mountcount;
145 
146 /*
147  * smbfs vfs operations.
148  */
149 static int	smbfs_mount(vfs_t *, vnode_t *, struct mounta *, cred_t *);
150 static int	smbfs_unmount(vfs_t *, int, cred_t *);
151 static int	smbfs_root(vfs_t *, vnode_t **);
152 static int	smbfs_statvfs(vfs_t *, statvfs64_t *);
153 static int	smbfs_sync(vfs_t *, short, cred_t *);
154 static void	smbfs_freevfs(vfs_t *);
155 
156 /*
157  * Module loading
158  */
159 
160 /*
161  * This routine is invoked automatically when the kernel module
162  * containing this routine is loaded.  This allows module specific
163  * initialization to be done when the module is loaded.
164  */
165 int
166 _init(void)
167 {
168 	int		error;
169 
170 	/*
171 	 * Check compiled-in version of "nsmb"
172 	 * that we're linked with.  (paranoid)
173 	 */
174 	if (nsmb_version != NSMB_VERSION) {
175 		cmn_err(CE_WARN, "_init: nsmb version mismatch");
176 		return (ENOTTY);
177 	}
178 
179 	smbfs_mountcount = 0;
180 
181 	/*
182 	 * NFS calls these two in _clntinit
183 	 * Easier to follow this way.
184 	 */
185 	if ((error = smbfs_subrinit()) != 0) {
186 		cmn_err(CE_WARN, "_init: smbfs_subrinit failed");
187 		return (error);
188 	}
189 
190 	if ((error = smbfs_vfsinit()) != 0) {
191 		cmn_err(CE_WARN, "_init: smbfs_vfsinit failed");
192 		smbfs_subrfini();
193 		return (error);
194 	}
195 
196 	if ((error = smbfs_clntinit()) != 0) {
197 		cmn_err(CE_WARN, "_init: smbfs_clntinit failed");
198 		smbfs_vfsfini();
199 		smbfs_subrfini();
200 		return (error);
201 	}
202 
203 	error = mod_install((struct modlinkage *)&modlinkage);
204 	return (error);
205 }
206 
207 /*
208  * Free kernel module resources that were allocated in _init
209  * and remove the linkage information into the kernel
210  */
211 int
212 _fini(void)
213 {
214 	int	error;
215 
216 	/*
217 	 * If a forcedly unmounted instance is still hanging around,
218 	 * we cannot allow the module to be unloaded because that would
219 	 * cause panics once the VFS framework decides it's time to call
220 	 * into VFS_FREEVFS().
221 	 */
222 	if (smbfs_mountcount)
223 		return (EBUSY);
224 
225 	error = mod_remove(&modlinkage);
226 	if (error)
227 		return (error);
228 
229 	/*
230 	 * Free the allocated smbnodes, etc.
231 	 */
232 	smbfs_clntfini();
233 
234 	/* NFS calls these two in _clntfini */
235 	smbfs_vfsfini();
236 	smbfs_subrfini();
237 
238 	/*
239 	 * Free the ops vectors
240 	 */
241 	smbfsfini();
242 	return (0);
243 }
244 
245 /*
246  * Return information about the module
247  */
248 int
249 _info(struct modinfo *modinfop)
250 {
251 	return (mod_info((struct modlinkage *)&modlinkage, modinfop));
252 }
253 
254 /*
255  * Initialize the vfs structure
256  */
257 
258 int smbfsfstyp;
259 vfsops_t *smbfs_vfsops = NULL;
260 
261 static const fs_operation_def_t smbfs_vfsops_template[] = {
262 	{ VFSNAME_MOUNT, { .vfs_mount = smbfs_mount } },
263 	{ VFSNAME_UNMOUNT, { .vfs_unmount = smbfs_unmount } },
264 	{ VFSNAME_ROOT,	{ .vfs_root = smbfs_root } },
265 	{ VFSNAME_STATVFS, { .vfs_statvfs = smbfs_statvfs } },
266 	{ VFSNAME_SYNC,	{ .vfs_sync = smbfs_sync } },
267 	{ VFSNAME_VGET,	{ .error = fs_nosys } },
268 	{ VFSNAME_MOUNTROOT, { .error = fs_nosys } },
269 	{ VFSNAME_FREEVFS, { .vfs_freevfs = smbfs_freevfs } },
270 	{ NULL, NULL }
271 };
272 
273 int
274 smbfsinit(int fstyp, char *name)
275 {
276 	int		error;
277 
278 	error = vfs_setfsops(fstyp, smbfs_vfsops_template, &smbfs_vfsops);
279 	if (error != 0) {
280 		zcmn_err(GLOBAL_ZONEID, CE_WARN,
281 		    "smbfsinit: bad vfs ops template");
282 		return (error);
283 	}
284 
285 	error = vn_make_ops(name, smbfs_vnodeops_template, &smbfs_vnodeops);
286 	if (error != 0) {
287 		(void) vfs_freevfsops_by_type(fstyp);
288 		zcmn_err(GLOBAL_ZONEID, CE_WARN,
289 		    "smbfsinit: bad vnode ops template");
290 		return (error);
291 	}
292 
293 	smbfsfstyp = fstyp;
294 
295 	return (0);
296 }
297 
298 void
299 smbfsfini()
300 {
301 	if (smbfs_vfsops) {
302 		(void) vfs_freevfsops_by_type(smbfsfstyp);
303 		smbfs_vfsops = NULL;
304 	}
305 	if (smbfs_vnodeops) {
306 		vn_freevnodeops(smbfs_vnodeops);
307 		smbfs_vnodeops = NULL;
308 	}
309 }
310 
311 void
312 smbfs_free_smi(smbmntinfo_t *smi)
313 {
314 	if (smi == NULL)
315 		return;
316 
317 	if (smi->smi_zone != NULL)
318 		zone_rele(smi->smi_zone);
319 
320 	if (smi->smi_share != NULL)
321 		smb_share_rele(smi->smi_share);
322 
323 	avl_destroy(&smi->smi_hash_avl);
324 	rw_destroy(&smi->smi_hash_lk);
325 	cv_destroy(&smi->smi_statvfs_cv);
326 	mutex_destroy(&smi->smi_lock);
327 
328 	kmem_free(smi, sizeof (smbmntinfo_t));
329 }
330 
331 /*
332  * smbfs mount vfsop
333  * Set up mount info record and attach it to vfs struct.
334  */
335 static int
336 smbfs_mount(vfs_t *vfsp, vnode_t *mvp, struct mounta *uap, cred_t *cr)
337 {
338 	char		*data = uap->dataptr;
339 	int		error;
340 	smbnode_t 	*rtnp = NULL;	/* root of this fs */
341 	smbmntinfo_t 	*smi = NULL;
342 	dev_t 		smbfs_dev;
343 	int 		version;
344 	int 		devfd;
345 	zone_t		*zone = curproc->p_zone;
346 	zone_t		*mntzone = NULL;
347 	smb_share_t 	*ssp = NULL;
348 	smb_cred_t 	scred;
349 	int		flags, sec;
350 
351 	STRUCT_DECL(smbfs_args, args);		/* smbfs mount arguments */
352 
353 	if ((error = secpolicy_fs_mount(cr, mvp, vfsp)) != 0)
354 		return (error);
355 
356 	if (mvp->v_type != VDIR)
357 		return (ENOTDIR);
358 
359 	/*
360 	 * get arguments
361 	 *
362 	 * uap->datalen might be different from sizeof (args)
363 	 * in a compatible situation.
364 	 */
365 	STRUCT_INIT(args, get_udatamodel());
366 	bzero(STRUCT_BUF(args), SIZEOF_STRUCT(smbfs_args, DATAMODEL_NATIVE));
367 	if (copyin(data, STRUCT_BUF(args), MIN(uap->datalen,
368 	    SIZEOF_STRUCT(smbfs_args, DATAMODEL_NATIVE))))
369 		return (EFAULT);
370 
371 	/*
372 	 * Check mount program version
373 	 */
374 	version = STRUCT_FGET(args, version);
375 	if (version != SMBFS_VERSION) {
376 		cmn_err(CE_WARN, "mount version mismatch:"
377 		    " kernel=%d, mount=%d\n",
378 		    SMBFS_VERSION, version);
379 		return (EINVAL);
380 	}
381 
382 	/*
383 	 * Deal with re-mount requests.
384 	 */
385 	if (uap->flags & MS_REMOUNT) {
386 		cmn_err(CE_WARN, "MS_REMOUNT not implemented");
387 		return (ENOTSUP);
388 	}
389 
390 	/*
391 	 * Check for busy
392 	 */
393 	mutex_enter(&mvp->v_lock);
394 	if (!(uap->flags & MS_OVERLAY) &&
395 	    (mvp->v_count != 1 || (mvp->v_flag & VROOT))) {
396 		mutex_exit(&mvp->v_lock);
397 		return (EBUSY);
398 	}
399 	mutex_exit(&mvp->v_lock);
400 
401 	/*
402 	 * Get the "share" from the netsmb driver (ssp).
403 	 * It is returned with a "ref" (hold) for us.
404 	 * Release this hold: at errout below, or in
405 	 * smbfs_freevfs().
406 	 */
407 	devfd = STRUCT_FGET(args, devfd);
408 	error = smb_dev2share(devfd, &ssp);
409 	if (error) {
410 		cmn_err(CE_WARN, "invalid device handle %d (%d)\n",
411 		    devfd, error);
412 		return (error);
413 	}
414 
415 	/*
416 	 * Use "goto errout" from here on.
417 	 * See: ssp, smi, rtnp, mntzone
418 	 */
419 
420 	/*
421 	 * Determine the zone we're being mounted into.
422 	 */
423 	zone_hold(mntzone = zone);		/* start with this assumption */
424 	if (getzoneid() == GLOBAL_ZONEID) {
425 		zone_rele(mntzone);
426 		mntzone = zone_find_by_path(refstr_value(vfsp->vfs_mntpt));
427 		ASSERT(mntzone != NULL);
428 		if (mntzone != zone) {
429 			error = EBUSY;
430 			goto errout;
431 		}
432 	}
433 
434 	/*
435 	 * Stop the mount from going any further if the zone is going away.
436 	 */
437 	if (zone_status_get(mntzone) >= ZONE_IS_SHUTTING_DOWN) {
438 		error = EBUSY;
439 		goto errout;
440 	}
441 
442 	/*
443 	 * On a Trusted Extensions client, we may have to force read-only
444 	 * for read-down mounts.
445 	 */
446 	if (is_system_labeled()) {
447 		void *addr;
448 		int ipvers = 0;
449 		struct smb_vc *vcp;
450 
451 		vcp = SSTOVC(ssp);
452 		addr = smb_vc_getipaddr(vcp, &ipvers);
453 		error = smbfs_mount_label_policy(vfsp, addr, ipvers, cr);
454 
455 		if (error > 0)
456 			goto errout;
457 
458 		if (error == -1) {
459 			/* change mount to read-only to prevent write-down */
460 			vfs_setmntopt(vfsp, MNTOPT_RO, NULL, 0);
461 		}
462 	}
463 
464 	/* Prevent unload. */
465 	atomic_inc_32(&smbfs_mountcount);
466 
467 	/*
468 	 * Create a mount record and link it to the vfs struct.
469 	 * No more possiblities for errors from here on.
470 	 * Tear-down of this stuff is in smbfs_free_smi()
471 	 *
472 	 * Compare with NFS: nfsrootvp()
473 	 */
474 	smi = kmem_zalloc(sizeof (*smi), KM_SLEEP);
475 
476 	mutex_init(&smi->smi_lock, NULL, MUTEX_DEFAULT, NULL);
477 	cv_init(&smi->smi_statvfs_cv, NULL, CV_DEFAULT, NULL);
478 
479 	rw_init(&smi->smi_hash_lk, NULL, RW_DEFAULT, NULL);
480 	smbfs_init_hash_avl(&smi->smi_hash_avl);
481 
482 	smi->smi_share = ssp;
483 	ssp = NULL;
484 	smi->smi_zone = mntzone;
485 	mntzone = NULL;
486 
487 	/*
488 	 * Initialize option defaults
489 	 */
490 	smi->smi_flags	= SMI_LLOCK;
491 	smi->smi_acregmin = SEC2HR(SMBFS_ACREGMIN);
492 	smi->smi_acregmax = SEC2HR(SMBFS_ACREGMAX);
493 	smi->smi_acdirmin = SEC2HR(SMBFS_ACDIRMIN);
494 	smi->smi_acdirmax = SEC2HR(SMBFS_ACDIRMAX);
495 
496 	/*
497 	 * All "generic" mount options have already been
498 	 * handled in vfs.c:domount() - see mntopts stuff.
499 	 * Query generic options using vfs_optionisset().
500 	 */
501 	if (vfs_optionisset(vfsp, MNTOPT_INTR, NULL))
502 		smi->smi_flags |= SMI_INT;
503 	if (vfs_optionisset(vfsp, MNTOPT_ACL, NULL))
504 		smi->smi_flags |= SMI_ACL;
505 
506 	/*
507 	 * Get the mount options that come in as smbfs_args,
508 	 * starting with args.flags (SMBFS_MF_xxx)
509 	 */
510 	flags = STRUCT_FGET(args, flags);
511 	smi->smi_uid 	= STRUCT_FGET(args, uid);
512 	smi->smi_gid 	= STRUCT_FGET(args, gid);
513 	smi->smi_fmode	= STRUCT_FGET(args, file_mode) & 0777;
514 	smi->smi_dmode	= STRUCT_FGET(args, dir_mode) & 0777;
515 
516 	/*
517 	 * Hande the SMBFS_MF_xxx flags.
518 	 */
519 	if (flags & SMBFS_MF_NOAC)
520 		smi->smi_flags |= SMI_NOAC;
521 	if (flags & SMBFS_MF_ACREGMIN) {
522 		sec = STRUCT_FGET(args, acregmin);
523 		if (sec < 0 || sec > SMBFS_ACMINMAX)
524 			sec = SMBFS_ACMINMAX;
525 		smi->smi_acregmin = SEC2HR(sec);
526 	}
527 	if (flags & SMBFS_MF_ACREGMAX) {
528 		sec = STRUCT_FGET(args, acregmax);
529 		if (sec < 0 || sec > SMBFS_ACMAXMAX)
530 			sec = SMBFS_ACMAXMAX;
531 		smi->smi_acregmax = SEC2HR(sec);
532 	}
533 	if (flags & SMBFS_MF_ACDIRMIN) {
534 		sec = STRUCT_FGET(args, acdirmin);
535 		if (sec < 0 || sec > SMBFS_ACMINMAX)
536 			sec = SMBFS_ACMINMAX;
537 		smi->smi_acdirmin = SEC2HR(sec);
538 	}
539 	if (flags & SMBFS_MF_ACDIRMAX) {
540 		sec = STRUCT_FGET(args, acdirmax);
541 		if (sec < 0 || sec > SMBFS_ACMAXMAX)
542 			sec = SMBFS_ACMAXMAX;
543 		smi->smi_acdirmax = SEC2HR(sec);
544 	}
545 
546 	/*
547 	 * Get attributes of the remote file system,
548 	 * i.e. ACL support, named streams, etc.
549 	 */
550 	smb_credinit(&scred, cr);
551 	error = smbfs_smb_qfsattr(smi->smi_share, &smi->smi_fsa, &scred);
552 	smb_credrele(&scred);
553 	if (error) {
554 		SMBVDEBUG("smbfs_smb_qfsattr error %d\n", error);
555 	}
556 
557 	/*
558 	 * We enable XATTR by default (via smbfs_mntopts)
559 	 * but if the share does not support named streams,
560 	 * force the NOXATTR option (also clears XATTR).
561 	 * Caller will set or clear VFS_XATTR after this.
562 	 */
563 	if ((smi->smi_fsattr & FILE_NAMED_STREAMS) == 0)
564 		vfs_setmntopt(vfsp, MNTOPT_NOXATTR, NULL, 0);
565 
566 	/*
567 	 * Ditto ACLs (disable if not supported on this share)
568 	 */
569 	if ((smi->smi_fsattr & FILE_PERSISTENT_ACLS) == 0) {
570 		vfs_setmntopt(vfsp, MNTOPT_NOACL, NULL, 0);
571 		smi->smi_flags &= ~SMI_ACL;
572 	}
573 
574 	/*
575 	 * Assign a unique device id to the mount
576 	 */
577 	mutex_enter(&smbfs_minor_lock);
578 	do {
579 		smbfs_minor = (smbfs_minor + 1) & MAXMIN32;
580 		smbfs_dev = makedevice(smbfs_major, smbfs_minor);
581 	} while (vfs_devismounted(smbfs_dev));
582 	mutex_exit(&smbfs_minor_lock);
583 
584 	vfsp->vfs_dev	= smbfs_dev;
585 	vfs_make_fsid(&vfsp->vfs_fsid, smbfs_dev, smbfsfstyp);
586 	vfsp->vfs_data	= (caddr_t)smi;
587 	vfsp->vfs_fstype = smbfsfstyp;
588 	vfsp->vfs_bsize = MAXBSIZE;
589 	vfsp->vfs_bcount = 0;
590 
591 	smi->smi_vfsp	= vfsp;
592 	smbfs_zonelist_add(smi);	/* undo in smbfs_freevfs */
593 
594 	/*
595 	 * Create the root vnode, which we need in unmount
596 	 * for the call to smbfs_check_table(), etc.
597 	 * Release this hold in smbfs_unmount.
598 	 */
599 	rtnp = smbfs_node_findcreate(smi, "\\", 1, NULL, 0, 0,
600 	    &smbfs_fattr0);
601 	ASSERT(rtnp != NULL);
602 	rtnp->r_vnode->v_type = VDIR;
603 	rtnp->r_vnode->v_flag |= VROOT;
604 	smi->smi_root = rtnp;
605 
606 	/*
607 	 * NFS does other stuff here too:
608 	 *   async worker threads
609 	 *   init kstats
610 	 *
611 	 * End of code from NFS nfsrootvp()
612 	 */
613 	return (0);
614 
615 errout:
616 	vfsp->vfs_data = NULL;
617 	if (smi != NULL)
618 		smbfs_free_smi(smi);
619 
620 	if (mntzone != NULL)
621 		zone_rele(mntzone);
622 
623 	if (ssp != NULL)
624 		smb_share_rele(ssp);
625 
626 	return (error);
627 }
628 
629 /*
630  * vfs operations
631  */
632 static int
633 smbfs_unmount(vfs_t *vfsp, int flag, cred_t *cr)
634 {
635 	smbmntinfo_t	*smi;
636 	smbnode_t	*rtnp;
637 
638 	smi = VFTOSMI(vfsp);
639 
640 	if (secpolicy_fs_unmount(cr, vfsp) != 0)
641 		return (EPERM);
642 
643 	if ((flag & MS_FORCE) == 0) {
644 		smbfs_rflush(vfsp, cr);
645 
646 		/*
647 		 * If there are any active vnodes on this file system,
648 		 * (other than the root vnode) then the file system is
649 		 * busy and can't be umounted.
650 		 */
651 		if (smbfs_check_table(vfsp, smi->smi_root))
652 			return (EBUSY);
653 
654 		/*
655 		 * We normally hold a ref to the root vnode, so
656 		 * check for references beyond the one we expect:
657 		 *   smbmntinfo_t -> smi_root
658 		 * Note that NFS does not hold the root vnode.
659 		 */
660 		if (smi->smi_root &&
661 		    smi->smi_root->r_vnode->v_count > 1)
662 			return (EBUSY);
663 	}
664 
665 	/*
666 	 * common code for both forced and non-forced
667 	 *
668 	 * Setting VFS_UNMOUNTED prevents new operations.
669 	 * Operations already underway may continue,
670 	 * but not for long.
671 	 */
672 	vfsp->vfs_flag |= VFS_UNMOUNTED;
673 
674 	/*
675 	 * Shutdown any outstanding I/O requests on this share,
676 	 * and force a tree disconnect.  The share object will
677 	 * continue to hang around until smb_share_rele().
678 	 * This should also cause most active nodes to be
679 	 * released as their operations fail with EIO.
680 	 */
681 	smb_share_kill(smi->smi_share);
682 
683 	/*
684 	 * If we hold the root VP (and we normally do)
685 	 * then it's safe to release it now.
686 	 */
687 	if (smi->smi_root) {
688 		rtnp = smi->smi_root;
689 		smi->smi_root = NULL;
690 		VN_RELE(rtnp->r_vnode);	/* release root vnode */
691 	}
692 
693 	/*
694 	 * Remove all nodes from the node hash tables.
695 	 * This (indirectly) calls: smbfs_addfree, smbinactive,
696 	 * which will try to flush dirty pages, etc. so
697 	 * don't destroy the underlying share just yet.
698 	 *
699 	 * Also, with a forced unmount, some nodes may
700 	 * remain active, and those will get cleaned up
701 	 * after their last vn_rele.
702 	 */
703 	smbfs_destroy_table(vfsp);
704 
705 	/*
706 	 * Delete our kstats...
707 	 *
708 	 * Doing it here, rather than waiting until
709 	 * smbfs_freevfs so these are not visible
710 	 * after the unmount.
711 	 */
712 	if (smi->smi_io_kstats) {
713 		kstat_delete(smi->smi_io_kstats);
714 		smi->smi_io_kstats = NULL;
715 	}
716 	if (smi->smi_ro_kstats) {
717 		kstat_delete(smi->smi_ro_kstats);
718 		smi->smi_ro_kstats = NULL;
719 	}
720 
721 	/*
722 	 * The rest happens in smbfs_freevfs()
723 	 */
724 	return (0);
725 }
726 
727 
728 /*
729  * find root of smbfs
730  */
731 static int
732 smbfs_root(vfs_t *vfsp, vnode_t **vpp)
733 {
734 	smbmntinfo_t	*smi;
735 	vnode_t		*vp;
736 
737 	smi = VFTOSMI(vfsp);
738 
739 	if (curproc->p_zone != smi->smi_zone)
740 		return (EPERM);
741 
742 	if (smi->smi_flags & SMI_DEAD || vfsp->vfs_flag & VFS_UNMOUNTED)
743 		return (EIO);
744 
745 	/*
746 	 * The root vp is created in mount and held
747 	 * until unmount, so this is paranoia.
748 	 */
749 	if (smi->smi_root == NULL)
750 		return (EIO);
751 
752 	/* Just take a reference and return it. */
753 	vp = SMBTOV(smi->smi_root);
754 	VN_HOLD(vp);
755 	*vpp = vp;
756 
757 	return (0);
758 }
759 
760 /*
761  * Get file system statistics.
762  */
763 static int
764 smbfs_statvfs(vfs_t *vfsp, statvfs64_t *sbp)
765 {
766 	int		error;
767 	smbmntinfo_t	*smi = VFTOSMI(vfsp);
768 	smb_share_t	*ssp = smi->smi_share;
769 	statvfs64_t	stvfs;
770 	hrtime_t now;
771 	smb_cred_t	scred;
772 
773 	if (curproc->p_zone != smi->smi_zone)
774 		return (EPERM);
775 
776 	if (smi->smi_flags & SMI_DEAD || vfsp->vfs_flag & VFS_UNMOUNTED)
777 		return (EIO);
778 
779 	mutex_enter(&smi->smi_lock);
780 
781 	/*
782 	 * Use cached result if still valid.
783 	 */
784 recheck:
785 	now = gethrtime();
786 	if (now < smi->smi_statfstime) {
787 		error = 0;
788 		goto cache_hit;
789 	}
790 
791 	/*
792 	 * FS attributes are stale, so someone
793 	 * needs to do an OTW call to get them.
794 	 * Serialize here so only one thread
795 	 * does the OTW call.
796 	 */
797 	if (smi->smi_status & SM_STATUS_STATFS_BUSY) {
798 		smi->smi_status |= SM_STATUS_STATFS_WANT;
799 		if (!cv_wait_sig(&smi->smi_statvfs_cv, &smi->smi_lock)) {
800 			mutex_exit(&smi->smi_lock);
801 			return (EINTR);
802 		}
803 		/* Hope status is valid now. */
804 		goto recheck;
805 	}
806 	smi->smi_status |= SM_STATUS_STATFS_BUSY;
807 	mutex_exit(&smi->smi_lock);
808 
809 	/*
810 	 * Do the OTW call.  Note: lock NOT held.
811 	 */
812 	smb_credinit(&scred, NULL);
813 	bzero(&stvfs, sizeof (stvfs));
814 	error = smbfs_smb_statfs(ssp, &stvfs, &scred);
815 	smb_credrele(&scred);
816 	if (error) {
817 		SMBVDEBUG("statfs error=%d\n", error);
818 	} else {
819 
820 		/*
821 		 * Set a few things the OTW call didn't get.
822 		 */
823 		stvfs.f_frsize = stvfs.f_bsize;
824 		stvfs.f_favail = stvfs.f_ffree;
825 		stvfs.f_fsid = (unsigned long)vfsp->vfs_fsid.val[0];
826 		bcopy(fs_type_name, stvfs.f_basetype, FSTYPSZ);
827 		stvfs.f_flag	= vf_to_stf(vfsp->vfs_flag);
828 		stvfs.f_namemax	= smi->smi_fsa.fsa_maxname;
829 
830 		/*
831 		 * Save the result, update lifetime
832 		 */
833 		now = gethrtime();
834 		smi->smi_statfstime = now +
835 		    (SM_MAX_STATFSTIME * (hrtime_t)NANOSEC);
836 		smi->smi_statvfsbuf = stvfs; /* struct assign! */
837 	}
838 
839 	mutex_enter(&smi->smi_lock);
840 	if (smi->smi_status & SM_STATUS_STATFS_WANT)
841 		cv_broadcast(&smi->smi_statvfs_cv);
842 	smi->smi_status &= ~(SM_STATUS_STATFS_BUSY | SM_STATUS_STATFS_WANT);
843 
844 	/*
845 	 * Copy the statvfs data to caller's buf.
846 	 * Note: struct assignment
847 	 */
848 cache_hit:
849 	if (error == 0)
850 		*sbp = smi->smi_statvfsbuf;
851 	mutex_exit(&smi->smi_lock);
852 	return (error);
853 }
854 
855 static kmutex_t smbfs_syncbusy;
856 
857 /*
858  * Flush dirty smbfs files for file system vfsp.
859  * If vfsp == NULL, all smbfs files are flushed.
860  */
861 /*ARGSUSED*/
862 static int
863 smbfs_sync(vfs_t *vfsp, short flag, cred_t *cr)
864 {
865 	/*
866 	 * Cross-zone calls are OK here, since this translates to a
867 	 * VOP_PUTPAGE(B_ASYNC), which gets picked up by the right zone.
868 	 */
869 	if (!(flag & SYNC_ATTR) && mutex_tryenter(&smbfs_syncbusy) != 0) {
870 		smbfs_rflush(vfsp, cr);
871 		mutex_exit(&smbfs_syncbusy);
872 	}
873 
874 	return (0);
875 }
876 
877 /*
878  * Initialization routine for VFS routines.  Should only be called once
879  */
880 int
881 smbfs_vfsinit(void)
882 {
883 	mutex_init(&smbfs_syncbusy, NULL, MUTEX_DEFAULT, NULL);
884 	return (0);
885 }
886 
887 /*
888  * Shutdown routine for VFS routines.  Should only be called once
889  */
890 void
891 smbfs_vfsfini(void)
892 {
893 	mutex_destroy(&smbfs_syncbusy);
894 }
895 
896 void
897 smbfs_freevfs(vfs_t *vfsp)
898 {
899 	smbmntinfo_t    *smi;
900 
901 	/* free up the resources */
902 	smi = VFTOSMI(vfsp);
903 
904 	/*
905 	 * By this time we should have already deleted the
906 	 * smi kstats in the unmount code.  If they are still around
907 	 * something is wrong
908 	 */
909 	ASSERT(smi->smi_io_kstats == NULL);
910 
911 	smbfs_zonelist_remove(smi);
912 
913 	smbfs_free_smi(smi);
914 
915 	/*
916 	 * Allow _fini() to succeed now, if so desired.
917 	 */
918 	atomic_dec_32(&smbfs_mountcount);
919 }
920 
921 /*
922  * smbfs_mount_label_policy:
923  *	Determine whether the mount is allowed according to MAC check,
924  *	by comparing (where appropriate) label of the remote server
925  *	against the label of the zone being mounted into.
926  *
927  *	Returns:
928  *		 0 :	access allowed
929  *		-1 :	read-only access allowed (i.e., read-down)
930  *		>0 :	error code, such as EACCES
931  *
932  * NB:
933  * NFS supports Cipso labels by parsing the vfs_resource
934  * to see what the Solaris server global zone has shared.
935  * We can't support that for CIFS since resource names
936  * contain share names, not paths.
937  */
938 static int
939 smbfs_mount_label_policy(vfs_t *vfsp, void *ipaddr, int addr_type, cred_t *cr)
940 {
941 	bslabel_t	*server_sl, *mntlabel;
942 	zone_t		*mntzone = NULL;
943 	ts_label_t	*zlabel;
944 	tsol_tpc_t	*tp;
945 	ts_label_t	*tsl = NULL;
946 	int		retv;
947 
948 	/*
949 	 * Get the zone's label.  Each zone on a labeled system has a label.
950 	 */
951 	mntzone = zone_find_by_any_path(refstr_value(vfsp->vfs_mntpt), B_FALSE);
952 	zlabel = mntzone->zone_slabel;
953 	ASSERT(zlabel != NULL);
954 	label_hold(zlabel);
955 
956 	retv = EACCES;				/* assume the worst */
957 
958 	/*
959 	 * Next, get the assigned label of the remote server.
960 	 */
961 	tp = find_tpc(ipaddr, addr_type, B_FALSE);
962 	if (tp == NULL)
963 		goto out;			/* error getting host entry */
964 
965 	if (tp->tpc_tp.tp_doi != zlabel->tsl_doi)
966 		goto rel_tpc;			/* invalid domain */
967 	if ((tp->tpc_tp.host_type != UNLABELED))
968 		goto rel_tpc;			/* invalid hosttype */
969 
970 	server_sl = &tp->tpc_tp.tp_def_label;
971 	mntlabel = label2bslabel(zlabel);
972 
973 	/*
974 	 * Now compare labels to complete the MAC check.  If the labels
975 	 * are equal or if the requestor is in the global zone and has
976 	 * NET_MAC_AWARE, then allow read-write access.   (Except for
977 	 * mounts into the global zone itself; restrict these to
978 	 * read-only.)
979 	 *
980 	 * If the requestor is in some other zone, but his label
981 	 * dominates the server, then allow read-down.
982 	 *
983 	 * Otherwise, access is denied.
984 	 */
985 	if (blequal(mntlabel, server_sl) ||
986 	    (crgetzoneid(cr) == GLOBAL_ZONEID &&
987 	    getpflags(NET_MAC_AWARE, cr) != 0)) {
988 		if ((mntzone == global_zone) ||
989 		    !blequal(mntlabel, server_sl))
990 			retv = -1;		/* read-only */
991 		else
992 			retv = 0;		/* access OK */
993 	} else if (bldominates(mntlabel, server_sl)) {
994 		retv = -1;			/* read-only */
995 	} else {
996 		retv = EACCES;
997 	}
998 
999 	if (tsl != NULL)
1000 		label_rele(tsl);
1001 
1002 rel_tpc:
1003 	/*LINTED*/
1004 	TPC_RELE(tp);
1005 out:
1006 	if (mntzone)
1007 		zone_rele(mntzone);
1008 	label_rele(zlabel);
1009 	return (retv);
1010 }
1011