1 /*
2  * CDDL HEADER START
3  *
4  * The contents of this file are subject to the terms of the
5  * Common Development and Distribution License (the "License").
6  * You may not use this file except in compliance with the License.
7  *
8  * You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE
9  * or http://www.opensolaris.org/os/licensing.
10  * See the License for the specific language governing permissions
11  * and limitations under the License.
12  *
13  * When distributing Covered Code, include this CDDL HEADER in each
14  * file and include the License file at usr/src/OPENSOLARIS.LICENSE.
15  * If applicable, add the following below this CDDL HEADER, with the
16  * fields enclosed by brackets "[]" replaced with your own identifying
17  * information: Portions Copyright [yyyy] [name of copyright owner]
18  *
19  * CDDL HEADER END
20  */
21 
22 /*
23  * Copyright (c) 2007, 2010, Oracle and/or its affiliates. All rights reserved.
24  * Copyright 2014 Nexenta Systems, Inc.  All rights reserved.
25  */
26 
27 /*
28  * This module provides the common open functionality to the various
29  * open and create SMB interface functions.
30  */
31 
32 #include <sys/types.h>
33 #include <sys/cmn_err.h>
34 #include <sys/fcntl.h>
35 #include <sys/nbmlock.h>
36 #include <smbsrv/string.h>
37 #include <smbsrv/smb_kproto.h>
38 #include <smbsrv/smb_fsops.h>
39 #include <smbsrv/smbinfo.h>
40 
41 static volatile uint32_t smb_fids = 0;
42 #define	SMB_UNIQ_FID()	atomic_inc_32_nv(&smb_fids)
43 
44 static uint32_t smb_open_subr(smb_request_t *);
45 extern uint32_t smb_is_executable(char *);
46 static void smb_delete_new_object(smb_request_t *);
47 static int smb_set_open_attributes(smb_request_t *, smb_ofile_t *);
48 static void smb_open_oplock_break(smb_request_t *, smb_node_t *);
49 static boolean_t smb_open_attr_only(smb_arg_open_t *);
50 static boolean_t smb_open_overwrite(smb_arg_open_t *);
51 
52 /*
53  * smb_access_generic_to_file
54  *
55  * Search MSDN for IoCreateFile to see following mapping.
56  *
57  * GENERIC_READ		STANDARD_RIGHTS_READ, FILE_READ_DATA,
58  *			FILE_READ_ATTRIBUTES and FILE_READ_EA
59  *
60  * GENERIC_WRITE	STANDARD_RIGHTS_WRITE, FILE_WRITE_DATA,
61  *               FILE_WRITE_ATTRIBUTES, FILE_WRITE_EA, and FILE_APPEND_DATA
62  *
63  * GENERIC_EXECUTE	STANDARD_RIGHTS_EXECUTE, SYNCHRONIZE, and FILE_EXECUTE.
64  *
65  * Careful, we have to emulate some Windows behavior here.
66  * When requested access == zero, you get READ_CONTROL.
67  * MacOS 10.7 depends on this.
68  */
69 uint32_t
70 smb_access_generic_to_file(uint32_t desired_access)
71 {
72 	uint32_t access = READ_CONTROL;
73 
74 	if (desired_access & GENERIC_ALL)
75 		return (FILE_ALL_ACCESS & ~SYNCHRONIZE);
76 
77 	if (desired_access & GENERIC_EXECUTE) {
78 		desired_access &= ~GENERIC_EXECUTE;
79 		access |= (STANDARD_RIGHTS_EXECUTE |
80 		    SYNCHRONIZE | FILE_EXECUTE);
81 	}
82 
83 	if (desired_access & GENERIC_WRITE) {
84 		desired_access &= ~GENERIC_WRITE;
85 		access |= (FILE_GENERIC_WRITE & ~SYNCHRONIZE);
86 	}
87 
88 	if (desired_access & GENERIC_READ) {
89 		desired_access &= ~GENERIC_READ;
90 		access |= FILE_GENERIC_READ;
91 	}
92 
93 	return (access | desired_access);
94 }
95 
96 /*
97  * smb_omode_to_amask
98  *
99  * This function converts open modes used by Open and Open AndX
100  * commands to desired access bits used by NT Create AndX command.
101  */
102 uint32_t
103 smb_omode_to_amask(uint32_t desired_access)
104 {
105 	switch (desired_access & SMB_DA_ACCESS_MASK) {
106 	case SMB_DA_ACCESS_READ:
107 		return (FILE_GENERIC_READ);
108 
109 	case SMB_DA_ACCESS_WRITE:
110 		return (FILE_GENERIC_WRITE);
111 
112 	case SMB_DA_ACCESS_READ_WRITE:
113 		return (FILE_GENERIC_READ | FILE_GENERIC_WRITE);
114 
115 	case SMB_DA_ACCESS_EXECUTE:
116 		return (FILE_GENERIC_EXECUTE);
117 
118 	default:
119 		return (FILE_GENERIC_ALL);
120 	}
121 }
122 
123 /*
124  * smb_denymode_to_sharemode
125  *
126  * This function converts deny modes used by Open and Open AndX
127  * commands to share access bits used by NT Create AndX command.
128  */
129 uint32_t
130 smb_denymode_to_sharemode(uint32_t desired_access, char *fname)
131 {
132 	switch (desired_access & SMB_DA_SHARE_MASK) {
133 	case SMB_DA_SHARE_COMPATIBILITY:
134 		if (smb_is_executable(fname))
135 			return (FILE_SHARE_READ | FILE_SHARE_WRITE);
136 
137 		return (FILE_SHARE_ALL);
138 
139 	case SMB_DA_SHARE_EXCLUSIVE:
140 		return (FILE_SHARE_NONE);
141 
142 	case SMB_DA_SHARE_DENY_WRITE:
143 		return (FILE_SHARE_READ);
144 
145 	case SMB_DA_SHARE_DENY_READ:
146 		return (FILE_SHARE_WRITE);
147 
148 	case SMB_DA_SHARE_DENY_NONE:
149 	default:
150 		return (FILE_SHARE_READ | FILE_SHARE_WRITE);
151 	}
152 }
153 
154 /*
155  * smb_ofun_to_crdisposition
156  *
157  * This function converts open function values used by Open and Open AndX
158  * commands to create disposition values used by NT Create AndX command.
159  */
160 uint32_t
161 smb_ofun_to_crdisposition(uint16_t  ofun)
162 {
163 	static int ofun_cr_map[3][2] =
164 	{
165 		{ -1,			FILE_CREATE },
166 		{ FILE_OPEN,		FILE_OPEN_IF },
167 		{ FILE_OVERWRITE,	FILE_OVERWRITE_IF }
168 	};
169 
170 	int row = ofun & SMB_OFUN_OPEN_MASK;
171 	int col = (ofun & SMB_OFUN_CREATE_MASK) >> 4;
172 
173 	if (row == 3)
174 		return (FILE_MAXIMUM_DISPOSITION + 1);
175 
176 	return (ofun_cr_map[row][col]);
177 }
178 
179 /*
180  * Retry opens to avoid spurious sharing violations, due to timing
181  * issues between closes and opens.  The client that already has the
182  * file open may be in the process of closing it.
183  */
184 uint32_t
185 smb_common_open(smb_request_t *sr)
186 {
187 	smb_arg_open_t	*parg;
188 	uint32_t	status = NT_STATUS_SUCCESS;
189 	int		count;
190 
191 	parg = kmem_alloc(sizeof (*parg), KM_SLEEP);
192 	bcopy(&sr->arg.open, parg, sizeof (*parg));
193 
194 	for (count = 0; count <= 4; count++) {
195 		if (count != 0)
196 			delay(MSEC_TO_TICK(400));
197 
198 		status = smb_open_subr(sr);
199 		if (status != NT_STATUS_SHARING_VIOLATION)
200 			break;
201 
202 		bcopy(parg, &sr->arg.open, sizeof (*parg));
203 	}
204 
205 	if (status == NT_STATUS_SHARING_VIOLATION) {
206 		smbsr_error(sr, NT_STATUS_SHARING_VIOLATION,
207 		    ERRDOS, ERROR_SHARING_VIOLATION);
208 	}
209 
210 	if (status == NT_STATUS_NO_SUCH_FILE) {
211 		smbsr_error(sr, NT_STATUS_OBJECT_NAME_NOT_FOUND,
212 		    ERRDOS, ERROR_FILE_NOT_FOUND);
213 	}
214 
215 	kmem_free(parg, sizeof (*parg));
216 	return (status);
217 }
218 
219 /*
220  * smb_open_subr
221  *
222  * Notes on write-through behaviour. It looks like pre-LM0.12 versions
223  * of the protocol specify the write-through mode when a file is opened,
224  * (SmbOpen, SmbOpenAndX) so the write calls (SmbWrite, SmbWriteAndClose,
225  * SmbWriteAndUnlock) don't need to contain a write-through flag.
226  *
227  * With LM0.12, the open calls (SmbCreateAndX, SmbNtTransactCreate)
228  * don't indicate which write-through mode to use. Instead the write
229  * calls (SmbWriteAndX, SmbWriteRaw) specify the mode on a per call
230  * basis.
231  *
232  * We don't care which open call was used to get us here, we just need
233  * to ensure that the write-through mode flag is copied from the open
234  * parameters to the node. We test the omode write-through flag in all
235  * write functions.
236  *
237  * This function will return NT status codes but it also raises errors,
238  * in which case it won't return to the caller. Be careful how you
239  * handle things in here.
240  *
241  * The following rules apply when processing a file open request:
242  *
243  * - Oplocks must be broken prior to share checking as the break may
244  *   cause other clients to close the file, which would affect sharing
245  *   checks.
246  *
247  * - Share checks must take place prior to access checks for correct
248  * Windows semantics and to prevent unnecessary NFS delegation recalls.
249  *
250  * - Oplocks must be acquired after open to ensure the correct
251  * synchronization with NFS delegation and FEM installation.
252  *
253  * DOS readonly bit rules
254  *
255  * 1. The creator of a readonly file can write to/modify the size of the file
256  * using the original create fid, even though the file will appear as readonly
257  * to all other fids and via a CIFS getattr call.
258  * The readonly bit therefore cannot be set in the filesystem until the file
259  * is closed (smb_ofile_close). It is accounted for via ofile and node flags.
260  *
261  * 2. A setinfo operation (using either an open fid or a path) to set/unset
262  * readonly will be successful regardless of whether a creator of a readonly
263  * file has an open fid (and has the special privilege mentioned in #1,
264  * above).  I.e., the creator of a readonly fid holding that fid will no longer
265  * have a special privilege.
266  *
267  * 3. The DOS readonly bit affects only data and some metadata.
268  * The following metadata can be changed regardless of the readonly bit:
269  * 	- security descriptors
270  *	- DOS attributes
271  *	- timestamps
272  *
273  * In the current implementation, the file size cannot be changed (except for
274  * the exceptions in #1 and #2, above).
275  *
276  *
277  * DOS attribute rules
278  *
279  * These rules are specific to creating / opening files and directories.
280  * How the attribute value (specifically ZERO or FILE_ATTRIBUTE_NORMAL)
281  * should be interpreted may differ in other requests.
282  *
283  * - An attribute value equal to ZERO or FILE_ATTRIBUTE_NORMAL means that the
284  *   file's attributes should be cleared.
285  * - If FILE_ATTRIBUTE_NORMAL is specified with any other attributes,
286  *   FILE_ATTRIBUTE_NORMAL is ignored.
287  *
288  * 1. Creating a new file
289  * - The request attributes + FILE_ATTRIBUTE_ARCHIVE are applied to the file.
290  *
291  * 2. Creating a new directory
292  * - The request attributes + FILE_ATTRIBUTE_DIRECTORY are applied to the file.
293  * - FILE_ATTRIBUTE_ARCHIVE does not get set.
294  *
295  * 3. Overwriting an existing file
296  * - the request attributes are used as search attributes. If the existing
297  *   file does not meet the search criteria access is denied.
298  * - otherwise, applies attributes + FILE_ATTRIBUTE_ARCHIVE.
299  *
300  * 4. Opening an existing file or directory
301  *    The request attributes are ignored.
302  */
303 static uint32_t
304 smb_open_subr(smb_request_t *sr)
305 {
306 	boolean_t	created = B_FALSE;
307 	boolean_t	last_comp_found = B_FALSE;
308 	smb_node_t	*node = NULL;
309 	smb_node_t	*dnode = NULL;
310 	smb_node_t	*cur_node = NULL;
311 	smb_arg_open_t	*op = &sr->sr_open;
312 	int		rc;
313 	smb_ofile_t	*of;
314 	smb_attr_t	new_attr;
315 	int		max_requested = 0;
316 	uint32_t	max_allowed;
317 	uint32_t	status = NT_STATUS_SUCCESS;
318 	int		is_dir;
319 	smb_error_t	err;
320 	boolean_t	is_stream = B_FALSE;
321 	int		lookup_flags = SMB_FOLLOW_LINKS;
322 	uint32_t	uniq_fid;
323 	smb_pathname_t	*pn = &op->fqi.fq_path;
324 	smb_server_t	*sv = sr->sr_server;
325 
326 	is_dir = (op->create_options & FILE_DIRECTORY_FILE) ? 1 : 0;
327 
328 	/*
329 	 * If the object being created or opened is a directory
330 	 * the Disposition parameter must be one of FILE_CREATE,
331 	 * FILE_OPEN, or FILE_OPEN_IF
332 	 */
333 	if (is_dir) {
334 		if ((op->create_disposition != FILE_CREATE) &&
335 		    (op->create_disposition != FILE_OPEN_IF) &&
336 		    (op->create_disposition != FILE_OPEN)) {
337 			smbsr_error(sr, NT_STATUS_INVALID_PARAMETER,
338 			    ERRDOS, ERROR_INVALID_ACCESS);
339 			return (NT_STATUS_INVALID_PARAMETER);
340 		}
341 	}
342 
343 	if (op->desired_access & MAXIMUM_ALLOWED) {
344 		max_requested = 1;
345 		op->desired_access &= ~MAXIMUM_ALLOWED;
346 	}
347 	op->desired_access = smb_access_generic_to_file(op->desired_access);
348 
349 	if (sr->session->s_file_cnt >= SMB_SESSION_OFILE_MAX) {
350 		ASSERT(sr->uid_user);
351 		cmn_err(CE_NOTE, "smbsrv[%s\\%s]: TOO_MANY_OPENED_FILES",
352 		    sr->uid_user->u_domain, sr->uid_user->u_name);
353 
354 		smbsr_error(sr, NT_STATUS_TOO_MANY_OPENED_FILES,
355 		    ERRDOS, ERROR_TOO_MANY_OPEN_FILES);
356 		return (NT_STATUS_TOO_MANY_OPENED_FILES);
357 	}
358 
359 	/* This must be NULL at this point */
360 	sr->fid_ofile = NULL;
361 
362 	op->devstate = 0;
363 
364 	switch (sr->tid_tree->t_res_type & STYPE_MASK) {
365 	case STYPE_DISKTREE:
366 	case STYPE_PRINTQ:
367 		break;
368 
369 	case STYPE_IPC:
370 
371 		if ((rc = smb_threshold_enter(&sv->sv_opipe_ct)) != 0) {
372 			status = RPC_NT_SERVER_TOO_BUSY;
373 			smbsr_error(sr, status, 0, 0);
374 			return (status);
375 		}
376 
377 		/*
378 		 * No further processing for IPC, we need to either
379 		 * raise an exception or return success here.
380 		 */
381 		uniq_fid = SMB_UNIQ_FID();
382 		status = smb_opipe_open(sr, uniq_fid);
383 		if (status != NT_STATUS_SUCCESS)
384 			smbsr_error(sr, status, 0, 0);
385 
386 		smb_threshold_exit(&sv->sv_opipe_ct);
387 		return (status);
388 
389 	default:
390 		smbsr_error(sr, NT_STATUS_BAD_DEVICE_TYPE,
391 		    ERRDOS, ERROR_BAD_DEV_TYPE);
392 		return (NT_STATUS_BAD_DEVICE_TYPE);
393 	}
394 
395 	smb_pathname_init(sr, pn, pn->pn_path);
396 	if (!smb_pathname_validate(sr, pn))
397 		return (sr->smb_error.status);
398 
399 	if (strlen(pn->pn_path) >= SMB_MAXPATHLEN) {
400 		smbsr_error(sr, 0, ERRSRV, ERRfilespecs);
401 		return (NT_STATUS_NAME_TOO_LONG);
402 	}
403 
404 	if (is_dir) {
405 		if (!smb_validate_dirname(sr, pn))
406 			return (sr->smb_error.status);
407 	} else {
408 		if (!smb_validate_object_name(sr, pn))
409 			return (sr->smb_error.status);
410 	}
411 
412 	cur_node = op->fqi.fq_dnode ?
413 	    op->fqi.fq_dnode : sr->tid_tree->t_snode;
414 
415 	/*
416 	 * if no path or filename are specified the stream should be
417 	 * created on cur_node
418 	 */
419 	if (!is_dir && !pn->pn_pname && !pn->pn_fname && pn->pn_sname) {
420 		/*
421 		 * Can't currently handle a stream on the tree root.
422 		 * If a stream is being opened return "not found", otherwise
423 		 * return "access denied".
424 		 */
425 		if (cur_node == sr->tid_tree->t_snode) {
426 			if (op->create_disposition == FILE_OPEN) {
427 				smbsr_error(sr, NT_STATUS_OBJECT_NAME_NOT_FOUND,
428 				    ERRDOS, ERROR_FILE_NOT_FOUND);
429 				return (NT_STATUS_OBJECT_NAME_NOT_FOUND);
430 			}
431 			smbsr_error(sr, NT_STATUS_ACCESS_DENIED, ERRDOS,
432 			    ERROR_ACCESS_DENIED);
433 			return (NT_STATUS_ACCESS_DENIED);
434 		}
435 
436 		(void) snprintf(op->fqi.fq_last_comp,
437 		    sizeof (op->fqi.fq_last_comp),
438 		    "%s%s", cur_node->od_name, pn->pn_sname);
439 
440 		op->fqi.fq_dnode = cur_node->n_dnode;
441 		smb_node_ref(op->fqi.fq_dnode);
442 	} else {
443 		rc = smb_pathname_reduce(sr, sr->user_cr, pn->pn_path,
444 		    sr->tid_tree->t_snode, cur_node, &op->fqi.fq_dnode,
445 		    op->fqi.fq_last_comp);
446 		if (rc != 0) {
447 			smbsr_errno(sr, rc);
448 			return (sr->smb_error.status);
449 		}
450 	}
451 
452 	/*
453 	 * If the access mask has only DELETE set (ignore
454 	 * FILE_READ_ATTRIBUTES), then assume that this
455 	 * is a request to delete the link (if a link)
456 	 * and do not follow links.  Otherwise, follow
457 	 * the link to the target.
458 	 */
459 	if ((op->desired_access & ~FILE_READ_ATTRIBUTES) == DELETE)
460 		lookup_flags &= ~SMB_FOLLOW_LINKS;
461 
462 	rc = smb_fsop_lookup_name(sr, zone_kcred(), lookup_flags,
463 	    sr->tid_tree->t_snode, op->fqi.fq_dnode, op->fqi.fq_last_comp,
464 	    &op->fqi.fq_fnode);
465 
466 	if (rc == 0) {
467 		last_comp_found = B_TRUE;
468 		/*
469 		 * Need the DOS attributes below, where we
470 		 * check the search attributes (sattr).
471 		 */
472 		op->fqi.fq_fattr.sa_mask = SMB_AT_DOSATTR;
473 		rc = smb_node_getattr(sr, op->fqi.fq_fnode, zone_kcred(),
474 		    NULL, &op->fqi.fq_fattr);
475 		if (rc != 0) {
476 			smb_node_release(op->fqi.fq_fnode);
477 			smb_node_release(op->fqi.fq_dnode);
478 			smbsr_error(sr, NT_STATUS_INTERNAL_ERROR,
479 			    ERRDOS, ERROR_INTERNAL_ERROR);
480 			return (sr->smb_error.status);
481 		}
482 	} else if (rc == ENOENT) {
483 		last_comp_found = B_FALSE;
484 		op->fqi.fq_fnode = NULL;
485 		rc = 0;
486 	} else {
487 		smb_node_release(op->fqi.fq_dnode);
488 		smbsr_errno(sr, rc);
489 		return (sr->smb_error.status);
490 	}
491 
492 
493 	/*
494 	 * The uniq_fid is a CIFS-server-wide unique identifier for an ofile
495 	 * which is used to uniquely identify open instances for the
496 	 * VFS share reservation and POSIX locks.
497 	 */
498 
499 	uniq_fid = SMB_UNIQ_FID();
500 
501 	if (last_comp_found) {
502 
503 		node = op->fqi.fq_fnode;
504 		dnode = op->fqi.fq_dnode;
505 
506 		if (!smb_node_is_file(node) && !smb_node_is_dir(node) &&
507 		    !smb_node_is_symlink(node)) {
508 			smb_node_release(node);
509 			smb_node_release(dnode);
510 			smbsr_error(sr, NT_STATUS_ACCESS_DENIED, ERRDOS,
511 			    ERRnoaccess);
512 			return (NT_STATUS_ACCESS_DENIED);
513 		}
514 
515 		/*
516 		 * Reject this request if either:
517 		 * - the target IS a directory and the client requires that
518 		 *   it must NOT be (required by Lotus Notes)
519 		 * - the target is NOT a directory and client requires that
520 		 *   it MUST be.
521 		 */
522 		if (smb_node_is_dir(node)) {
523 			if (op->create_options & FILE_NON_DIRECTORY_FILE) {
524 				smb_node_release(node);
525 				smb_node_release(dnode);
526 				smbsr_error(sr, NT_STATUS_FILE_IS_A_DIRECTORY,
527 				    ERRDOS, ERROR_ACCESS_DENIED);
528 				return (NT_STATUS_FILE_IS_A_DIRECTORY);
529 			}
530 		} else {
531 			if ((op->create_options & FILE_DIRECTORY_FILE) ||
532 			    (op->nt_flags & NT_CREATE_FLAG_OPEN_TARGET_DIR)) {
533 				smb_node_release(node);
534 				smb_node_release(dnode);
535 				smbsr_error(sr, NT_STATUS_NOT_A_DIRECTORY,
536 				    ERRDOS, ERROR_DIRECTORY);
537 				return (NT_STATUS_NOT_A_DIRECTORY);
538 			}
539 		}
540 
541 		/*
542 		 * No more open should be accepted when "Delete on close"
543 		 * flag is set.
544 		 */
545 		if (node->flags & NODE_FLAGS_DELETE_ON_CLOSE) {
546 			smb_node_release(node);
547 			smb_node_release(dnode);
548 			smbsr_error(sr, NT_STATUS_DELETE_PENDING,
549 			    ERRDOS, ERROR_ACCESS_DENIED);
550 			return (NT_STATUS_DELETE_PENDING);
551 		}
552 
553 		/*
554 		 * Specified file already exists so the operation should fail.
555 		 */
556 		if (op->create_disposition == FILE_CREATE) {
557 			smb_node_release(node);
558 			smb_node_release(dnode);
559 			smbsr_error(sr, NT_STATUS_OBJECT_NAME_COLLISION,
560 			    ERRDOS, ERROR_FILE_EXISTS);
561 			return (NT_STATUS_OBJECT_NAME_COLLISION);
562 		}
563 
564 		/*
565 		 * Windows seems to check read-only access before file
566 		 * sharing check.
567 		 *
568 		 * Check to see if the file is currently readonly (irrespective
569 		 * of whether this open will make it readonly).
570 		 */
571 		if (SMB_PATHFILE_IS_READONLY(sr, node)) {
572 			/* Files data only */
573 			if (!smb_node_is_dir(node)) {
574 				if (op->desired_access & (FILE_WRITE_DATA |
575 				    FILE_APPEND_DATA)) {
576 					smb_node_release(node);
577 					smb_node_release(dnode);
578 					smbsr_error(sr, NT_STATUS_ACCESS_DENIED,
579 					    ERRDOS, ERRnoaccess);
580 					return (NT_STATUS_ACCESS_DENIED);
581 				}
582 			}
583 		}
584 
585 		if ((op->create_disposition == FILE_SUPERSEDE) ||
586 		    (op->create_disposition == FILE_OVERWRITE_IF) ||
587 		    (op->create_disposition == FILE_OVERWRITE)) {
588 
589 			if (!smb_sattr_check(op->fqi.fq_fattr.sa_dosattr,
590 			    op->dattr)) {
591 				smb_node_release(node);
592 				smb_node_release(dnode);
593 				smbsr_error(sr, NT_STATUS_ACCESS_DENIED,
594 				    ERRDOS, ERRnoaccess);
595 				return (NT_STATUS_ACCESS_DENIED);
596 			}
597 
598 			if (smb_node_is_dir(node)) {
599 				smb_node_release(node);
600 				smb_node_release(dnode);
601 				return (NT_STATUS_ACCESS_DENIED);
602 			}
603 		}
604 
605 		/* MS-FSA 2.1.5.1.2 */
606 		if (op->create_disposition == FILE_SUPERSEDE)
607 			op->desired_access |= DELETE;
608 		if ((op->create_disposition == FILE_OVERWRITE_IF) ||
609 		    (op->create_disposition == FILE_OVERWRITE))
610 			op->desired_access |= FILE_WRITE_DATA;
611 
612 		status = smb_fsop_access(sr, sr->user_cr, node,
613 		    op->desired_access);
614 		if (status != NT_STATUS_SUCCESS) {
615 			smb_node_release(node);
616 			smb_node_release(dnode);
617 
618 			if (status == NT_STATUS_PRIVILEGE_NOT_HELD) {
619 				smbsr_error(sr, status,
620 				    ERRDOS, ERROR_PRIVILEGE_NOT_HELD);
621 				return (status);
622 			} else {
623 				smbsr_error(sr, NT_STATUS_ACCESS_DENIED,
624 				    ERRDOS, ERROR_ACCESS_DENIED);
625 				return (NT_STATUS_ACCESS_DENIED);
626 			}
627 		}
628 
629 		if (max_requested) {
630 			smb_fsop_eaccess(sr, sr->user_cr, node, &max_allowed);
631 			op->desired_access |= max_allowed;
632 		}
633 
634 		/*
635 		 * Oplock break is done prior to sharing checks as the break
636 		 * may cause other clients to close the file which would
637 		 * affect the sharing checks. This may block, so set the
638 		 * file opening count before oplock stuff.
639 		 */
640 		smb_node_inc_opening_count(node);
641 		smb_open_oplock_break(sr, node);
642 
643 		smb_node_wrlock(node);
644 
645 		/*
646 		 * Check for sharing violations
647 		 */
648 		status = smb_fsop_shrlock(sr->user_cr, node, uniq_fid,
649 		    op->desired_access, op->share_access);
650 		if (status == NT_STATUS_SHARING_VIOLATION) {
651 			smb_node_unlock(node);
652 			smb_node_dec_opening_count(node);
653 			smb_node_release(node);
654 			smb_node_release(dnode);
655 			return (status);
656 		}
657 
658 		/*
659 		 * Go ahead with modifications as necessary.
660 		 */
661 		switch (op->create_disposition) {
662 		case FILE_SUPERSEDE:
663 		case FILE_OVERWRITE_IF:
664 		case FILE_OVERWRITE:
665 			op->dattr |= FILE_ATTRIBUTE_ARCHIVE;
666 			/* Don't apply readonly bit until smb_ofile_close */
667 			if (op->dattr & FILE_ATTRIBUTE_READONLY) {
668 				op->created_readonly = B_TRUE;
669 				op->dattr &= ~FILE_ATTRIBUTE_READONLY;
670 			}
671 
672 			bzero(&new_attr, sizeof (new_attr));
673 			new_attr.sa_dosattr = op->dattr;
674 			new_attr.sa_vattr.va_size = op->dsize;
675 			new_attr.sa_mask = SMB_AT_DOSATTR | SMB_AT_SIZE;
676 			rc = smb_fsop_setattr(sr, sr->user_cr, node, &new_attr);
677 			if (rc != 0) {
678 				smb_fsop_unshrlock(sr->user_cr, node, uniq_fid);
679 				smb_node_unlock(node);
680 				smb_node_dec_opening_count(node);
681 				smb_node_release(node);
682 				smb_node_release(dnode);
683 				smbsr_errno(sr, rc);
684 				return (sr->smb_error.status);
685 			}
686 
687 			/*
688 			 * If file is being replaced, remove existing streams
689 			 */
690 			if (SMB_IS_STREAM(node) == 0) {
691 				rc = smb_fsop_remove_streams(sr, sr->user_cr,
692 				    node);
693 				if (rc != 0) {
694 					smb_fsop_unshrlock(sr->user_cr, node,
695 					    uniq_fid);
696 					smb_node_unlock(node);
697 					smb_node_dec_opening_count(node);
698 					smb_node_release(node);
699 					smb_node_release(dnode);
700 					return (sr->smb_error.status);
701 				}
702 			}
703 
704 			op->action_taken = SMB_OACT_TRUNCATED;
705 			break;
706 
707 		default:
708 			/*
709 			 * FILE_OPEN or FILE_OPEN_IF.
710 			 */
711 			op->action_taken = SMB_OACT_OPENED;
712 			break;
713 		}
714 	} else {
715 		/* Last component was not found. */
716 		dnode = op->fqi.fq_dnode;
717 
718 		if (is_dir == 0)
719 			is_stream = smb_is_stream_name(pn->pn_path);
720 
721 		if ((op->create_disposition == FILE_OPEN) ||
722 		    (op->create_disposition == FILE_OVERWRITE)) {
723 			smb_node_release(dnode);
724 			smbsr_error(sr, NT_STATUS_OBJECT_NAME_NOT_FOUND,
725 			    ERRDOS, ERROR_FILE_NOT_FOUND);
726 			return (NT_STATUS_OBJECT_NAME_NOT_FOUND);
727 		}
728 
729 		if (pn->pn_fname && smb_is_invalid_filename(pn->pn_fname)) {
730 			smb_node_release(dnode);
731 			smbsr_error(sr, NT_STATUS_OBJECT_NAME_INVALID,
732 			    ERRDOS, ERROR_INVALID_NAME);
733 			return (NT_STATUS_OBJECT_NAME_INVALID);
734 		}
735 
736 		/*
737 		 * lock the parent dir node in case another create
738 		 * request to the same parent directory comes in.
739 		 */
740 		smb_node_wrlock(dnode);
741 
742 		/* Don't apply readonly bit until smb_ofile_close */
743 		if (op->dattr & FILE_ATTRIBUTE_READONLY) {
744 			op->dattr &= ~FILE_ATTRIBUTE_READONLY;
745 			op->created_readonly = B_TRUE;
746 		}
747 
748 		bzero(&new_attr, sizeof (new_attr));
749 		if ((op->crtime.tv_sec != 0) &&
750 		    (op->crtime.tv_sec != UINT_MAX)) {
751 
752 			new_attr.sa_mask |= SMB_AT_CRTIME;
753 			new_attr.sa_crtime = op->crtime;
754 		}
755 
756 		if (is_dir == 0) {
757 			op->dattr |= FILE_ATTRIBUTE_ARCHIVE;
758 			new_attr.sa_dosattr = op->dattr;
759 			new_attr.sa_vattr.va_type = VREG;
760 			new_attr.sa_vattr.va_mode = is_stream ? S_IRUSR :
761 			    S_IRUSR | S_IRGRP | S_IROTH |
762 			    S_IWUSR | S_IWGRP | S_IWOTH;
763 			new_attr.sa_mask |=
764 			    SMB_AT_DOSATTR | SMB_AT_TYPE | SMB_AT_MODE;
765 
766 			if (op->dsize) {
767 				new_attr.sa_vattr.va_size = op->dsize;
768 				new_attr.sa_mask |= SMB_AT_SIZE;
769 			}
770 
771 			rc = smb_fsop_create(sr, sr->user_cr, dnode,
772 			    op->fqi.fq_last_comp, &new_attr, &op->fqi.fq_fnode);
773 
774 			if (rc != 0) {
775 				smb_node_unlock(dnode);
776 				smb_node_release(dnode);
777 				smbsr_errno(sr, rc);
778 				return (sr->smb_error.status);
779 			}
780 
781 			node = op->fqi.fq_fnode;
782 			smb_node_inc_opening_count(node);
783 			smb_node_wrlock(node);
784 
785 			status = smb_fsop_shrlock(sr->user_cr, node, uniq_fid,
786 			    op->desired_access, op->share_access);
787 
788 			if (status == NT_STATUS_SHARING_VIOLATION) {
789 				smb_node_unlock(node);
790 				smb_node_dec_opening_count(node);
791 				smb_delete_new_object(sr);
792 				smb_node_release(node);
793 				smb_node_unlock(dnode);
794 				smb_node_release(dnode);
795 				return (status);
796 			}
797 		} else {
798 			op->dattr |= FILE_ATTRIBUTE_DIRECTORY;
799 			new_attr.sa_dosattr = op->dattr;
800 			new_attr.sa_vattr.va_type = VDIR;
801 			new_attr.sa_vattr.va_mode = 0777;
802 			new_attr.sa_mask |=
803 			    SMB_AT_DOSATTR | SMB_AT_TYPE | SMB_AT_MODE;
804 
805 			rc = smb_fsop_mkdir(sr, sr->user_cr, dnode,
806 			    op->fqi.fq_last_comp, &new_attr, &op->fqi.fq_fnode);
807 			if (rc != 0) {
808 				smb_node_unlock(dnode);
809 				smb_node_release(dnode);
810 				smbsr_errno(sr, rc);
811 				return (sr->smb_error.status);
812 			}
813 
814 			node = op->fqi.fq_fnode;
815 			smb_node_inc_opening_count(node);
816 			smb_node_wrlock(node);
817 		}
818 
819 		created = B_TRUE;
820 		op->action_taken = SMB_OACT_CREATED;
821 
822 		if (max_requested) {
823 			smb_fsop_eaccess(sr, sr->user_cr, node, &max_allowed);
824 			op->desired_access |= max_allowed;
825 		}
826 	}
827 
828 	status = NT_STATUS_SUCCESS;
829 
830 	of = smb_ofile_open(sr, node, op, SMB_FTYPE_DISK, uniq_fid,
831 	    &err);
832 	if (of == NULL) {
833 		smbsr_error(sr, err.status, err.errcls, err.errcode);
834 		status = err.status;
835 	}
836 
837 	/*
838 	 * We might have blocked in smb_ofile_open long enough so a
839 	 * tree disconnect might have happened.  In that case, we've
840 	 * just added an ofile to a tree that's disconnecting, and
841 	 * need to undo that to avoid interfering with tear-down of
842 	 * the tree connection.
843 	 */
844 	if (status == NT_STATUS_SUCCESS &&
845 	    !smb_tree_is_connected(sr->tid_tree)) {
846 		smbsr_error(sr, 0, ERRSRV, ERRinvnid);
847 		status = NT_STATUS_INVALID_PARAMETER;
848 	}
849 
850 	/*
851 	 * This MUST be done after ofile creation, so that explicitly
852 	 * set timestamps can be remembered on the ofile, and the
853 	 * readonly flag will be stored "pending" on the node.
854 	 */
855 	if (status == NT_STATUS_SUCCESS) {
856 		if ((rc = smb_set_open_attributes(sr, of)) != 0) {
857 			smbsr_errno(sr, rc);
858 			status = sr->smb_error.status;
859 		}
860 	}
861 
862 	if (status == NT_STATUS_SUCCESS) {
863 		/*
864 		 * We've already done access checks above,
865 		 * and want this call to succeed even when
866 		 * !(desired_access & FILE_READ_ATTRIBUTES),
867 		 * so pass kcred here.
868 		 */
869 		op->fqi.fq_fattr.sa_mask = SMB_AT_ALL;
870 		rc = smb_node_getattr(sr, node, zone_kcred(), of,
871 		    &op->fqi.fq_fattr);
872 		if (rc != 0) {
873 			smbsr_error(sr, NT_STATUS_INTERNAL_ERROR,
874 			    ERRDOS, ERROR_INTERNAL_ERROR);
875 			status = NT_STATUS_INTERNAL_ERROR;
876 		}
877 	}
878 
879 	/*
880 	 * smb_fsop_unshrlock is a no-op if node is a directory
881 	 * smb_fsop_unshrlock is done in smb_ofile_close
882 	 */
883 	if (status != NT_STATUS_SUCCESS) {
884 		if (of == NULL) {
885 			smb_fsop_unshrlock(sr->user_cr, node, uniq_fid);
886 		} else {
887 			smb_ofile_close(of, 0);
888 			smb_ofile_release(of);
889 		}
890 		if (created)
891 			smb_delete_new_object(sr);
892 		smb_node_unlock(node);
893 		smb_node_dec_opening_count(node);
894 		smb_node_release(node);
895 		if (created)
896 			smb_node_unlock(dnode);
897 		smb_node_release(dnode);
898 		return (status);
899 	}
900 
901 	/*
902 	 * Propagate the write-through mode from the open params
903 	 * to the node: see the notes in the function header.
904 	 */
905 	if (sr->sr_cfg->skc_sync_enable ||
906 	    (op->create_options & FILE_WRITE_THROUGH))
907 		node->flags |= NODE_FLAGS_WRITE_THROUGH;
908 
909 	/*
910 	 * Set up the fileid and dosattr in open_param for response
911 	 */
912 	op->fileid = op->fqi.fq_fattr.sa_vattr.va_nodeid;
913 	op->dattr = op->fqi.fq_fattr.sa_dosattr;
914 
915 	/*
916 	 * Set up the file type in open_param for the response
917 	 */
918 	op->ftype = SMB_FTYPE_DISK;
919 	sr->smb_fid = of->f_fid;
920 	sr->fid_ofile = of;
921 
922 	if (smb_node_is_file(node)) {
923 		smb_oplock_acquire(sr, node, of);
924 		op->dsize = op->fqi.fq_fattr.sa_vattr.va_size;
925 	} else {
926 		/* directory or symlink */
927 		op->op_oplock_level = SMB_OPLOCK_NONE;
928 		op->dsize = 0;
929 	}
930 
931 	smb_node_dec_opening_count(node);
932 
933 	smb_node_unlock(node);
934 	if (created)
935 		smb_node_unlock(dnode);
936 
937 	smb_node_release(node);
938 	smb_node_release(dnode);
939 
940 	return (NT_STATUS_SUCCESS);
941 }
942 
943 /*
944  * smb_open_oplock_break
945  *
946  * If the node has an ofile opened with share access none,
947  * (smb_node_share_check = FALSE) only break BATCH oplock.
948  * Otherwise:
949  * If overwriting, break to SMB_OPLOCK_NONE, else
950  * If opening for anything other than attribute access,
951  * break oplock to LEVEL_II.
952  */
953 static void
954 smb_open_oplock_break(smb_request_t *sr, smb_node_t *node)
955 {
956 	smb_arg_open_t	*op = &sr->sr_open;
957 	uint32_t	flags = 0;
958 
959 	if (!smb_node_share_check(node))
960 		flags |= SMB_OPLOCK_BREAK_BATCH;
961 
962 	if (smb_open_overwrite(op)) {
963 		flags |= SMB_OPLOCK_BREAK_TO_NONE;
964 		(void) smb_oplock_break(sr, node, flags);
965 	} else if (!smb_open_attr_only(op)) {
966 		flags |= SMB_OPLOCK_BREAK_TO_LEVEL_II;
967 		(void) smb_oplock_break(sr, node, flags);
968 	}
969 }
970 
971 /*
972  * smb_open_attr_only
973  *
974  * Determine if file is being opened for attribute access only.
975  * This is used to determine whether it is necessary to break
976  * existing oplocks on the file.
977  */
978 static boolean_t
979 smb_open_attr_only(smb_arg_open_t *op)
980 {
981 	if (((op->desired_access & ~(FILE_READ_ATTRIBUTES |
982 	    FILE_WRITE_ATTRIBUTES | SYNCHRONIZE | READ_CONTROL)) == 0) &&
983 	    (op->create_disposition != FILE_SUPERSEDE) &&
984 	    (op->create_disposition != FILE_OVERWRITE)) {
985 		return (B_TRUE);
986 	}
987 	return (B_FALSE);
988 }
989 
990 static boolean_t
991 smb_open_overwrite(smb_arg_open_t *op)
992 {
993 	if ((op->create_disposition == FILE_SUPERSEDE) ||
994 	    (op->create_disposition == FILE_OVERWRITE_IF) ||
995 	    (op->create_disposition == FILE_OVERWRITE)) {
996 		return (B_TRUE);
997 	}
998 	return (B_FALSE);
999 }
1000 
1001 /*
1002  * smb_set_open_attributes
1003  *
1004  * Last write time:
1005  * - If the last_write time specified in the open params is not 0 or -1,
1006  *   use it as file's mtime. This will be considered an explicitly set
1007  *   timestamps, not reset by subsequent writes.
1008  *
1009  * DOS attributes
1010  * - If we created_readonly, we now store the real DOS attributes
1011  *   (including the readonly bit) so subsequent opens will see it.
1012  *
1013  * Both are stored "pending" rather than in the file system.
1014  *
1015  * Returns: errno
1016  */
1017 static int
1018 smb_set_open_attributes(smb_request_t *sr, smb_ofile_t *of)
1019 {
1020 	smb_attr_t	attr;
1021 	smb_arg_open_t	*op = &sr->sr_open;
1022 	smb_node_t	*node = of->f_node;
1023 	int		rc = 0;
1024 
1025 	bzero(&attr, sizeof (smb_attr_t));
1026 
1027 	if (op->created_readonly) {
1028 		attr.sa_dosattr = op->dattr | FILE_ATTRIBUTE_READONLY;
1029 		attr.sa_mask |= SMB_AT_DOSATTR;
1030 	}
1031 
1032 	if ((op->mtime.tv_sec != 0) && (op->mtime.tv_sec != UINT_MAX)) {
1033 		attr.sa_vattr.va_mtime = op->mtime;
1034 		attr.sa_mask |= SMB_AT_MTIME;
1035 	}
1036 
1037 	/*
1038 	 * Used to have code here to set mtime, ctime, atime
1039 	 * when the open op->create_disposition is any of:
1040 	 * FILE_SUPERSEDE, FILE_OVERWRITE_IF, FILE_OVERWRITE.
1041 	 * We know that in those cases we will have set the
1042 	 * file size, in which case the file system will
1043 	 * update those times, so we don't have to.
1044 	 *
1045 	 * However, keep track of the fact that we modified
1046 	 * the file via this handle, so we can do the evil,
1047 	 * gratuitious mtime update on close that Windows
1048 	 * clients appear to expect.
1049 	 */
1050 	if (op->action_taken == SMB_OACT_TRUNCATED)
1051 		of->f_written = B_TRUE;
1052 
1053 	if (attr.sa_mask != 0)
1054 		rc = smb_node_setattr(sr, node, of->f_cr, of, &attr);
1055 
1056 	return (rc);
1057 }
1058 
1059 /*
1060  * This function is used to delete a newly created object (file or
1061  * directory) if an error occurs after creation of the object.
1062  */
1063 static void
1064 smb_delete_new_object(smb_request_t *sr)
1065 {
1066 	smb_arg_open_t	*op = &sr->sr_open;
1067 	smb_fqi_t	*fqi = &(op->fqi);
1068 	uint32_t	flags = 0;
1069 
1070 	if (SMB_TREE_IS_CASEINSENSITIVE(sr))
1071 		flags |= SMB_IGNORE_CASE;
1072 	if (SMB_TREE_SUPPORTS_CATIA(sr))
1073 		flags |= SMB_CATIA;
1074 
1075 	if (op->create_options & FILE_DIRECTORY_FILE)
1076 		(void) smb_fsop_rmdir(sr, sr->user_cr, fqi->fq_dnode,
1077 		    fqi->fq_last_comp, flags);
1078 	else
1079 		(void) smb_fsop_remove(sr, sr->user_cr, fqi->fq_dnode,
1080 		    fqi->fq_last_comp, flags);
1081 }
1082