#include <smbsrv/smb2_kproto.h>
#include <smbsrv/smb_kstat.h>
#include <smbsrv/smb2.h>
#define SMB2_ASYNCID(sr) (sr->smb2_messageid ^ (1ULL << 62))
smb_sdrc_t smb2_invalid_cmd(smb_request_t *);
static void smb2_tq_work(void *);
static void smb2sr_run_postwork(smb_request_t *);
static int smb3_decrypt_msg(smb_request_t *);
static const smb_disp_entry_t
smb2_disp_table[SMB2__NCMDS] = {
{ "smb2_negotiate", NULL,
smb2_negotiate, NULL, 0, 0,
SDDF_SUPPRESS_TID | SDDF_SUPPRESS_UID },
{ "smb2_session_setup", NULL,
smb2_session_setup, NULL, 0, 0,
SDDF_SUPPRESS_TID | SDDF_SUPPRESS_UID },
{ "smb2_logoff", NULL,
smb2_logoff, NULL, 0, 0,
SDDF_SUPPRESS_TID },
{ "smb2_tree_connect", NULL,
smb2_tree_connect, NULL, 0, 0,
SDDF_SUPPRESS_TID },
{ "smb2_tree_disconn", NULL,
smb2_tree_disconn, NULL, 0, 0 },
{ "smb2_create", NULL,
smb2_create, NULL, 0, 0 },
{ "smb2_close", NULL,
smb2_close, NULL, 0, 0 },
{ "smb2_flush", NULL,
smb2_flush, NULL, 0, 0 },
{ "smb2_read", NULL,
smb2_read, NULL, 0, 0 },
{ "smb2_write", NULL,
smb2_write, NULL, 0, 0 },
{ "smb2_lock", NULL,
smb2_lock, NULL, 0, 0 },
{ "smb2_ioctl", NULL,
smb2_ioctl, NULL, 0, 0 },
{ "smb2_cancel", NULL,
smb2_cancel, NULL, 0, 0,
SDDF_SUPPRESS_UID | SDDF_SUPPRESS_TID },
{ "smb2_echo", NULL,
smb2_echo, NULL, 0, 0,
SDDF_SUPPRESS_UID | SDDF_SUPPRESS_TID },
{ "smb2_query_dir", NULL,
smb2_query_dir, NULL, 0, 0 },
{ "smb2_change_notify", NULL,
smb2_change_notify, NULL, 0, 0 },
{ "smb2_query_info", NULL,
smb2_query_info, NULL, 0, 0 },
{ "smb2_set_info", NULL,
smb2_set_info, NULL, 0, 0 },
{ "smb2_oplock_break_ack", NULL,
smb2_oplock_break_ack, NULL, 0, 0 },
{ "smb2_invalid_cmd", NULL,
smb2_invalid_cmd, NULL, 0, 0,
SDDF_SUPPRESS_UID | SDDF_SUPPRESS_TID },
};
smb_sdrc_t
smb2_invalid_cmd(smb_request_t *sr)
{
#ifdef DEBUG
cmn_err(CE_NOTE, "clnt %s bad SMB2 cmd code",
sr->session->ip_addr_str);
#endif
sr->smb2_status = NT_STATUS_INVALID_PARAMETER;
return (SDRC_DROP_VC);
}
int
smb2sr_newrq(smb_request_t *sr)
{
struct mbuf_chain *mbc = &sr->command;
taskqid_t tqid;
uint32_t magic;
int rc, skip;
if (smb_mbc_peek(mbc, 0, "l", &magic) != 0)
goto drop;
if (magic == SMB3_ENCRYPTED_MAGIC) {
if (smb3_decrypt_msg(sr) != 0)
goto drop;
if (smb_mbc_peek(mbc, 0, "l", &magic) != 0)
goto drop;
}
if (magic != SMB2_PROTOCOL_MAGIC)
goto drop;
for (;;) {
if (smb2_decode_header(sr) != 0)
goto drop;
if (sr->smb2_cmd_code == SMB2_CANCEL) {
rc = smb2_newrq_cancel(sr);
smb_request_free(sr);
return (rc);
}
if (sr->smb2_credit_charge == 0)
sr->smb2_credit_charge = 1;
sr->smb2_total_credits += sr->smb2_credit_charge;
if (sr->smb2_messageid != 0 &&
sr->smb2_messageid != UINT64_MAX) {
if (sr->smb2_first_msgid == 0)
sr->smb2_first_msgid = sr->smb2_messageid;
if (sr->smb2_messageid < sr->smb2_first_msgid ||
sr->smb2_messageid >= (sr->smb2_first_msgid +
sr->smb2_total_credits)) {
long long id = (long long) sr->smb2_messageid;
cmn_err(CE_WARN, "clnt %s msg ID 0x%llx "
"out of sequence in compound",
sr->session->ip_addr_str, id);
}
}
if (sr->smb2_next_command == 0)
break;
if (sr->smb2_next_command < SMB2_HDR_SIZE)
goto drop;
skip = sr->smb2_next_command - SMB2_HDR_SIZE;
if (MBC_ROOM_FOR(mbc, skip) == 0)
goto drop;
mbc->chain_offset += skip;
}
mbc->chain_offset = 0;
sr->sr_time_submitted = gethrtime();
sr->sr_state = SMB_REQ_STATE_SUBMITTED;
smb_srqueue_waitq_enter(sr->session->s_srqueue);
tqid = taskq_dispatch(sr->sr_server->sv_worker_pool,
smb2_tq_work, sr, TQ_SLEEP);
VERIFY(tqid != TASKQID_INVALID);
return (0);
drop:
smb_request_free(sr);
return (-1);
}
static void
smb2_tq_work(void *arg)
{
smb_request_t *sr;
smb_srqueue_t *srq;
sr = (smb_request_t *)arg;
SMB_REQ_VALID(sr);
srq = sr->session->s_srqueue;
smb_srqueue_waitq_to_runq(srq);
sr->sr_worker = curthread;
sr->sr_time_active = gethrtime();
mutex_enter(&sr->sr_mutex);
if (sr->sr_state == SMB_REQ_STATE_SUBMITTED)
sr->sr_state = SMB_REQ_STATE_ACTIVE;
mutex_exit(&sr->sr_mutex);
smb2sr_work(sr);
smb_srqueue_runq_exit(srq);
}
static int
smb3_decrypt_msg(smb_request_t *sr)
{
struct mbuf_chain clear_mbc = {0};
struct mbuf_chain tmp_mbc;
mbuf_t *m;
int clearsize;
int rc;
if (sr->session->dialect < SMB_VERS_3_0) {
return (-1);
}
if ((sr->session->srv_cap & SMB2_CAP_ENCRYPTION) == 0) {
return (-2);
}
sr->encrypted = B_TRUE;
if (sr->command.max_bytes <
(SMB3_TFORM_HDR_SIZE + SMB2_HDR_SIZE)) {
return (-3);
}
clearsize = sr->command.max_bytes - SMB3_TFORM_HDR_SIZE;
clear_mbc.max_bytes = clearsize;
m = smb_mbuf_alloc_chain(clearsize);
MBC_ATTACH_MBUF(&clear_mbc, m);
rc = smb3_decrypt_sr(sr, &sr->command, &clear_mbc);
if (rc != 0) {
MBC_FLUSH(&clear_mbc);
return (rc);
}
tmp_mbc = sr->command;
sr->command = clear_mbc;
MBC_FLUSH(&tmp_mbc);
return (0);
}
static inline void
smb2_credit_decrease(smb_request_t *sr)
{
smb_session_t *session = sr->session;
uint16_t cur, d;
ASSERT3U(sr->smb2_credit_request, <, sr->smb2_credit_charge);
mutex_enter(&session->s_credits_mutex);
cur = session->s_cur_credits;
ASSERT(cur > 0);
d = sr->smb2_credit_charge - sr->smb2_credit_request;
if (d >= cur) {
d = cur - 1;
cur = 1;
DTRACE_PROBE1(smb2__credit__neg, smb_request_t *, sr);
} else {
cur -= d;
}
ASSERT3U(d, <=, sr->smb2_credit_charge);
sr->smb2_credit_response = sr->smb2_credit_charge - d;
DTRACE_PROBE3(smb2__credit__decrease,
smb_request_t *, sr, int, (int)cur,
int, (int)session->s_cur_credits);
session->s_cur_credits = cur;
mutex_exit(&session->s_credits_mutex);
}
static inline void
smb2_credit_increase(smb_request_t *sr)
{
smb_session_t *session = sr->session;
uint16_t cur, d;
ASSERT3U(sr->smb2_credit_request, >, sr->smb2_credit_charge);
mutex_enter(&session->s_credits_mutex);
cur = session->s_cur_credits;
d = sr->smb2_credit_request - sr->smb2_credit_charge;
if (d > (session->s_max_credits - cur)) {
d = session->s_max_credits - cur;
cur = session->s_max_credits;
DTRACE_PROBE1(smb2__credit__max, smb_request_t *, sr);
} else {
cur += d;
}
sr->smb2_credit_response = sr->smb2_credit_charge + d;
DTRACE_PROBE3(smb2__credit__increase,
smb_request_t *, sr, int, (int)cur,
int, (int)session->s_cur_credits);
session->s_cur_credits = cur;
mutex_exit(&session->s_credits_mutex);
}
inline void
smb2_record_stats(smb_request_t *sr, smb_disp_stats_t *sds, boolean_t need_lat)
{
int64_t rxb;
int64_t txb;
rxb = (int64_t)(sr->command.chain_offset - sr->smb2_cmd_hdr);
txb = (int64_t)(sr->reply.chain_offset - sr->smb2_reply_hdr);
txb += sr->smb2_async_txb;
sr->smb2_async_txb = 0;
smb_server_inc_req(sr->sr_server);
atomic_add_64(&sds->sdt_rxb, rxb);
atomic_add_64(&sds->sdt_txb, txb);
if (need_lat) {
hrtime_t dt;
dt = gethrtime() - sr->sr_time_start;
smb_latency_add_sample(&sds->sdt_lat, dt);
}
}
void
smb2sr_work(struct smb_request *sr)
{
const smb_disp_entry_t *sdd;
smb_disp_stats_t *sds;
smb_session_t *session;
uint32_t msg_len;
uint16_t cmd_idx;
int rc = 0;
boolean_t disconnect = B_FALSE;
boolean_t related;
session = sr->session;
ASSERT(sr->smb2_async_mode == B_FALSE);
ASSERT(sr->tid_tree == 0);
ASSERT(sr->uid_user == 0);
ASSERT(sr->fid_ofile == 0);
sr->smb_fid = (uint16_t)-1;
sr->smb2_status = 0;
sr->user_cr = zone_kcred();
cmd_start:
if (sr->smb2_status != NT_STATUS_CANCELLED &&
sr->smb2_status != NT_STATUS_INSUFFICIENT_RESOURCES)
sr->smb2_status = 0;
sr->smb2_async_mode = B_FALSE;
sr->smb2_cmd_hdr = sr->command.chain_offset;
if ((rc = smb2_decode_header(sr)) != 0) {
cmn_err(CE_WARN, "clnt %s bad SMB2 header",
session->ip_addr_str);
disconnect = B_TRUE;
goto cleanup;
}
if ((sr->smb2_hdr_flags & SMB2_FLAGS_SERVER_TO_REDIR) != 0) {
cmn_err(CE_WARN, "clnt %s bad SMB2 flags",
session->ip_addr_str);
disconnect = B_TRUE;
goto cleanup;
}
related = (sr->smb2_hdr_flags & SMB2_FLAGS_RELATED_OPERATIONS);
sr->smb2_hdr_flags |= SMB2_FLAGS_SERVER_TO_REDIR;
if (sr->smb2_hdr_flags & SMB2_FLAGS_ASYNC_COMMAND) {
DTRACE_PROBE1(smb2__dispatch__async, smb_request_t *, sr);
}
if (sr->smb2_credit_charge == 0)
sr->smb2_credit_charge = 1;
sr->smb2_credit_response = sr->smb2_credit_charge;
sr->smb2_next_reply = 0;
ASSERT((sr->reply.chain_offset & 7) == 0);
sr->smb2_reply_hdr = sr->reply.chain_offset;
if ((rc = smb2_encode_header(sr, B_FALSE)) != 0) {
cmn_err(CE_WARN, "clnt %s excessive reply",
session->ip_addr_str);
disconnect = B_TRUE;
goto cleanup;
}
if (sr->smb2_next_command != 0) {
msg_len = sr->smb2_next_command;
if ((msg_len & 7) != 0 || (msg_len < SMB2_HDR_SIZE) ||
((sr->smb2_cmd_hdr + msg_len) > sr->command.max_bytes)) {
cmn_err(CE_WARN, "clnt %s bad SMB2 next cmd",
session->ip_addr_str);
disconnect = B_TRUE;
goto cleanup;
}
} else {
msg_len = sr->command.max_bytes - sr->smb2_cmd_hdr;
}
(void) MBC_SHADOW_CHAIN(&sr->smb_data, &sr->command,
sr->smb2_cmd_hdr, msg_len);
sr->command.chain_offset = sr->smb2_cmd_hdr + msg_len;
ASSERT(sr->command.chain_offset <= sr->command.max_bytes);
if (sr->smb2_cmd_code < SMB2_INVALID_CMD)
cmd_idx = sr->smb2_cmd_code;
else
cmd_idx = SMB2_INVALID_CMD;
sdd = &smb2_disp_table[cmd_idx];
sds = &session->s_server->sv_disp_stats2[cmd_idx];
if (!related) {
if (sr->fid_ofile != NULL) {
smb_ofile_release(sr->fid_ofile);
sr->fid_ofile = NULL;
}
if (sr->tid_tree != NULL) {
smb_tree_release(sr->tid_tree);
sr->tid_tree = NULL;
}
if (sr->uid_user != NULL) {
smb_user_release(sr->uid_user);
sr->uid_user = NULL;
sr->user_cr = zone_kcred();
}
}
if ((sdd->sdt_flags & SDDF_SUPPRESS_UID) == 0) {
if (related) {
if (sr->uid_user == NULL) {
smb2sr_put_error(sr,
NT_STATUS_INVALID_PARAMETER);
goto cmd_done;
}
sr->smb2_ssnid = sr->uid_user->u_ssnid;
} else {
ASSERT(sr->uid_user == NULL);
if (sr->encrypted &&
sr->smb2_ssnid != sr->th_ssnid) {
disconnect = B_TRUE;
goto cleanup;
}
sr->uid_user = smb_session_lookup_ssnid(session,
sr->smb2_ssnid);
if (sr->uid_user == NULL) {
smb2sr_put_error(sr,
NT_STATUS_USER_SESSION_DELETED);
goto cmd_done;
}
if (sr->uid_user->u_encrypt == SMB_CONFIG_REQUIRED &&
!sr->encrypted) {
smb2sr_put_error(sr,
NT_STATUS_ACCESS_DENIED);
goto cmd_done;
}
sr->user_cr = smb_user_getcred(sr->uid_user);
}
ASSERT(sr->uid_user != NULL);
if (sr->uid_user->u_encrypt != SMB_CONFIG_DISABLED &&
sr->th_sid_user == NULL) {
smb_user_hold_internal(sr->uid_user);
sr->th_sid_user = sr->uid_user;
sr->th_ssnid = sr->smb2_ssnid;
}
}
if ((sdd->sdt_flags & SDDF_SUPPRESS_TID) == 0) {
if (related) {
if (sr->tid_tree == NULL) {
smb2sr_put_error(sr,
NT_STATUS_INVALID_PARAMETER);
goto cmd_done;
}
sr->smb_tid = sr->tid_tree->t_tid;
} else {
ASSERT(sr->tid_tree == NULL);
sr->tid_tree = smb_session_lookup_tree(session,
sr->smb_tid);
if (sr->tid_tree == NULL) {
smb2sr_put_error(sr,
NT_STATUS_NETWORK_NAME_DELETED);
goto cmd_done;
}
if (sr->tid_tree->t_encrypt == SMB_CONFIG_REQUIRED &&
!sr->encrypted) {
smb2sr_put_error(sr,
NT_STATUS_ACCESS_DENIED);
goto cmd_done;
}
}
ASSERT(sr->tid_tree != NULL);
if (sr->tid_tree->t_encrypt != SMB_CONFIG_DISABLED &&
sr->th_sid_user == NULL) {
smb_user_hold_internal(sr->uid_user);
sr->th_sid_user = sr->uid_user;
sr->th_ssnid = sr->smb2_ssnid;
}
}
if (sr->uid_user == NULL)
sr->smb2_hdr_flags &= ~SMB2_FLAGS_SIGNED;
if ((sdd->sdt_flags & SDDF_SUPPRESS_UID) == 0 &&
!sr->encrypted && sr->uid_user != NULL &&
(sr->uid_user->u_sign_flags & SMB_SIGNING_ENABLED) != 0) {
if ((sr->smb2_hdr_flags & SMB2_FLAGS_SIGNED) != 0) {
if (smb2_sign_check_request(sr) != 0) {
smb2sr_put_error(sr, NT_STATUS_ACCESS_DENIED);
DTRACE_PROBE1(smb2__sign__check,
smb_request_t *, sr);
goto cmd_done;
}
} else if (
(sr->uid_user->u_sign_flags & SMB_SIGNING_CHECK) != 0) {
smb2sr_put_error(sr, NT_STATUS_ACCESS_DENIED);
goto cmd_done;
}
}
sr->smb_data.chain_offset = sr->smb2_cmd_hdr + SMB2_HDR_SIZE;
if (sr->smb2_credit_request < sr->smb2_credit_charge)
smb2_credit_decrease(sr);
sr->sr_time_start = gethrtime();
rc = SDRC_SUCCESS;
if (sr->smb2_status == 0) {
rc = (*sdd->sdt_function)(sr);
} else {
smb2sr_put_error(sr, sr->smb2_status);
}
if (rc == SDRC_SR_KEPT)
return;
MBC_FLUSH(&sr->raw_data);
if (!sr->smb2_async_mode) {
if (sr->smb2_credit_request > sr->smb2_credit_charge) {
smb2_credit_increase(sr);
}
}
cmd_done:
switch (rc) {
case SDRC_SUCCESS:
break;
default:
#ifdef DEBUG
cmn_err(CE_NOTE, "handler for %u returned 0x%x",
sr->smb2_cmd_code, rc);
#endif
smb2sr_put_error(sr, NT_STATUS_INTERNAL_ERROR);
break;
case SDRC_ERROR:
if (sr->smb2_status == 0)
sr->smb2_status = NT_STATUS_INVALID_PARAMETER;
smb2sr_put_error(sr, sr->smb2_status);
break;
case SDRC_DROP_VC:
disconnect = B_TRUE;
goto cleanup;
case SDRC_NO_REPLY:
goto cleanup;
}
if (sr->smb2_next_command != 0)
(void) smb_mbc_put_align(&sr->reply, 8);
smb2_record_stats(sr, sds, B_TRUE);
if (sr->smb2_next_command != 0) {
sr->command.chain_offset =
sr->smb2_cmd_hdr + sr->smb2_next_command;
sr->smb2_next_reply =
sr->reply.chain_offset - sr->smb2_reply_hdr;
} else {
ASSERT(sr->smb2_next_reply == 0);
}
(void) smb2_encode_header(sr, B_TRUE);
if (session->dialect >= SMB_VERS_3_11 &&
sr->smb2_cmd_code == SMB2_SESSION_SETUP &&
sr->smb2_status == NT_STATUS_MORE_PROCESSING_REQUIRED) {
if (smb31_preauth_sha512_calc(sr, &sr->reply,
sr->uid_user->u_preauth_hashval,
sr->uid_user->u_preauth_hashval) != 0)
cmn_err(CE_WARN, "(3) Preauth hash calculation "
"failed");
}
if (sr->th_sid_user == NULL &&
(sr->smb2_hdr_flags & SMB2_FLAGS_SIGNED) != 0)
smb2_sign_reply(sr);
if (sr->smb2_next_command != 0)
goto cmd_start;
if (sr->dh_nvl_dirty) {
sr->dh_nvl_dirty = B_FALSE;
smb2_dh_update_nvfile(sr);
}
smb2_send_reply(sr);
cleanup:
if (disconnect)
smb_session_disconnect(session);
if (sr->sr_postwork != NULL)
smb2sr_run_postwork(sr);
mutex_enter(&sr->sr_mutex);
sr->sr_state = SMB_REQ_STATE_COMPLETED;
mutex_exit(&sr->sr_mutex);
smb_request_free(sr);
}
static uint32_t
smb2sr_send_interim(smb_request_t *sr)
{
uint32_t saved_hdr_flags;
boolean_t disconnect = B_FALSE;
sr->smb2_async_id = SMB2_ASYNCID(sr);
sr->smb2_status = NT_STATUS_PENDING;
sr->smb2_hdr_flags |= SMB2_FLAGS_ASYNC_COMMAND;
saved_hdr_flags = sr->smb2_hdr_flags;
sr->smb2_next_reply = 0;
if ((smb2_encode_header(sr, B_FALSE)) != 0) {
cmn_err(CE_WARN, "clnt %s excessive reply",
sr->session->ip_addr_str);
disconnect = B_TRUE;
goto cleanup;
}
sr->smb2_hdr_flags &= ~SMB2_FLAGS_SIGNED;
smb2sr_put_error(sr, sr->smb2_status);
if (sr->smb2_credit_request > sr->smb2_credit_charge) {
smb2_credit_increase(sr);
}
DTRACE_PROBE1(go__async, smb_request_t *, sr);
(void) smb2_encode_header(sr, B_TRUE);
sr->smb2_async_txb =
(int64_t)(sr->reply.chain_offset - sr->smb2_reply_hdr);
smb2_send_reply(sr);
sr->smb2_credit_response = 0;
cleanup:
sr->smb2_status = NT_STATUS_SUCCESS;
sr->smb2_hdr_flags = saved_hdr_flags;
if (disconnect) {
sr->smb2_async_mode = B_FALSE;
sr->smb2_hdr_flags &= SMB2_FLAGS_ASYNC_COMMAND;
return (NT_STATUS_INVALID_PARAMETER);
}
return (NT_STATUS_SUCCESS);
}
uint32_t
smb2sr_go_async(smb_request_t *sr)
{
struct mbuf_chain saved_reply;
uint32_t saved_reply_hdr = sr->smb2_reply_hdr;
uint32_t saved_next_reply = sr->smb2_next_reply;
uint32_t status;
if (sr->smb2_async_mode) {
return (NT_STATUS_SUCCESS);
}
sr->smb2_async_mode = B_TRUE;
if (sr->session->sock == NULL)
return (NT_STATUS_SUCCESS);
saved_reply = sr->reply;
MBC_INIT(&sr->reply, sr->reply.max_bytes);
sr->smb2_reply_hdr = 0;
status = smb2sr_send_interim(sr);
MBC_FLUSH(&sr->reply);
sr->reply = saved_reply;
sr->smb2_next_reply = saved_next_reply;
sr->smb2_reply_hdr = saved_reply_hdr;
return (status);
}
uint32_t
smb2sr_go_async_indefinite(smb_request_t *sr)
{
uint32_t saved_reply_hdr = sr->smb2_reply_hdr;
uint32_t status;
if (sr->smb2_async_mode) {
return (NT_STATUS_SUCCESS);
}
sr->smb2_async_mode = B_TRUE;
if (sr->session->sock == NULL)
return (NT_STATUS_SUCCESS);
sr->reply.chain_offset = saved_reply_hdr;
status = smb2sr_send_interim(sr);
if (status != NT_STATUS_SUCCESS)
return (status);
MBC_FLUSH(&sr->reply);
ASSERT(sr->reply.max_bytes == sr->session->reply_max_bytes);
ASSERT(sr->reply.chain_offset == 0);
sr->smb2_reply_hdr = 0;
(void) smb2_encode_header(sr, B_FALSE);
return (NT_STATUS_SUCCESS);
}
int
smb2_decode_header(smb_request_t *sr)
{
uint32_t pid, tid;
uint16_t hdr_len;
int rc;
rc = smb_mbc_decodef(
&sr->command, "Nwww..wwllqllq16c",
&hdr_len,
&sr->smb2_credit_charge,
&sr->smb2_chan_seq,
&sr->smb2_cmd_code,
&sr->smb2_credit_request,
&sr->smb2_hdr_flags,
&sr->smb2_next_command,
&sr->smb2_messageid,
&pid,
&tid,
&sr->smb2_ssnid,
sr->smb2_sig);
if (rc)
return (rc);
if (hdr_len != SMB2_HDR_SIZE)
return (-1);
if (sr->smb2_hdr_flags & SMB2_FLAGS_ASYNC_COMMAND) {
sr->smb2_async_id = pid |
((uint64_t)tid) << 32;
sr->smb_pid = 0;
sr->smb_tid = 0;
} else {
sr->smb2_async_id = 0;
sr->smb_pid = pid;
sr->smb_tid = (uint16_t)tid;
}
return (rc);
}
int
smb2_encode_header(smb_request_t *sr, boolean_t overwrite)
{
uint64_t pid_tid_aid;
int rc;
if (sr->smb2_hdr_flags & SMB2_FLAGS_ASYNC_COMMAND) {
pid_tid_aid = sr->smb2_async_id;
} else {
pid_tid_aid = sr->smb_pid |
((uint64_t)sr->smb_tid) << 32;
}
if (overwrite) {
rc = smb_mbc_poke(&sr->reply,
sr->smb2_reply_hdr,
"Nwwlwwllqqq16c",
SMB2_HDR_SIZE,
sr->smb2_credit_charge,
sr->smb2_status,
sr->smb2_cmd_code,
sr->smb2_credit_response,
sr->smb2_hdr_flags,
sr->smb2_next_reply,
sr->smb2_messageid,
pid_tid_aid,
sr->smb2_ssnid,
sr->smb2_sig);
} else {
rc = smb_mbc_encodef(&sr->reply,
"Nwwlwwllqqq16c",
SMB2_HDR_SIZE,
sr->smb2_credit_charge,
sr->smb2_status,
sr->smb2_cmd_code,
sr->smb2_credit_response,
sr->smb2_hdr_flags,
sr->smb2_next_reply,
sr->smb2_messageid,
pid_tid_aid,
sr->smb2_ssnid,
sr->smb2_sig);
}
return (rc);
}
void
smb2_send_reply(smb_request_t *sr)
{
struct mbuf_chain enc_reply;
smb_session_t *session = sr->session;
mbuf_t *m;
if ((session->capabilities & SMB2_CAP_ENCRYPTION) == 0 ||
sr->th_sid_user == NULL) {
(void) smb_session_send(sr->session, 0, &sr->reply);
return;
}
MBC_INIT(&enc_reply, SMB3_TFORM_HDR_SIZE);
m = enc_reply.chain;
m->m_len = SMB3_TFORM_HDR_SIZE;
sr->th_msglen = sr->reply.chain_offset;
m->m_next = smb_mbuf_alloc_chain(sr->th_msglen);
enc_reply.max_bytes += sr->th_msglen;
if (smb3_encrypt_sr(sr, &sr->reply, &enc_reply) != 0) {
cmn_err(CE_WARN, "smb3 encryption failed");
smb_session_disconnect(sr->session);
} else {
(void) smb_session_send(sr->session, 0, &enc_reply);
}
MBC_FLUSH(&enc_reply);
}
void
smbsr_status_smb2(smb_request_t *sr, DWORD status)
{
const char *name;
if (sr->smb2_cmd_code < SMB2__NCMDS)
name = smb2_disp_table[sr->smb2_cmd_code].sdt_name;
else
name = "<unknown>";
#ifdef DEBUG
cmn_err(CE_NOTE, "smbsr_status called for %s", name);
#endif
smb2sr_put_error_data(sr, status, NULL);
}
void
smb2sr_put_errno(struct smb_request *sr, int errnum)
{
uint32_t status = smb_errno2status(errnum);
smb2sr_put_error_data(sr, status, NULL);
}
void
smb2sr_put_error(smb_request_t *sr, uint32_t status)
{
smb2sr_put_error_data(sr, status, NULL);
}
void
smb2sr_put_error_data(smb_request_t *sr, uint32_t status, mbuf_chain_t *mbc)
{
DWORD len;
sr->smb2_status = status;
sr->reply.chain_offset = sr->smb2_reply_hdr + SMB2_HDR_SIZE;
if (mbc != NULL && (len = MBC_LENGTH(mbc)) != 0) {
(void) smb_mbc_encodef(
&sr->reply,
"wwlC",
9,
0,
len,
mbc);
} else {
(void) smb_mbc_encodef(
&sr->reply,
"wwl.",
9,
0,
0);
}
}
void
smb2sr_put_error_ctx(smb_request_t *sr, uint32_t status, uint32_t errid,
mbuf_chain_t *mbc)
{
DWORD len;
sr->smb2_status = status;
sr->reply.chain_offset = sr->smb2_reply_hdr + SMB2_HDR_SIZE;
if (mbc != NULL && (len = MBC_LENGTH(mbc)) != 0) {
(void) smb_mbc_encodef(
&sr->reply,
"wbblllC",
9,
1,
0,
8+len,
len,
errid,
mbc);
} else {
(void) smb_mbc_encodef(
&sr->reply,
"wbblll",
9,
1,
0,
8,
0,
errid);
}
}
void
smb2sr_put_error_ctx0(smb_request_t *sr, uint32_t status, mbuf_chain_t *mbc)
{
return (smb2sr_put_error_ctx(sr, status, SMB2_ERROR_ID_DEFAULT, mbc));
}
uint32_t
smb2sr_lookup_fid(smb_request_t *sr, smb2fid_t *fid)
{
boolean_t related = sr->smb2_hdr_flags &
SMB2_FLAGS_RELATED_OPERATIONS;
if (related) {
if (sr->fid_ofile == NULL)
return (NT_STATUS_INVALID_PARAMETER);
sr->smb_fid = sr->fid_ofile->f_fid;
return (0);
}
if (sr->fid_ofile == NULL) {
sr->smb_fid = (uint16_t)fid->temporal;
sr->fid_ofile = smb_ofile_lookup_by_fid(sr, sr->smb_fid);
}
if (sr->fid_ofile == NULL ||
sr->fid_ofile->f_persistid != fid->persistent)
return (NT_STATUS_FILE_CLOSED);
return (0);
}
void
smb2_dispatch_stats_init(smb_server_t *sv)
{
smb_disp_stats_t *sds = sv->sv_disp_stats2;
smb_kstat_req_t *ksr;
int i;
ksr = ((smbsrv_kstats_t *)sv->sv_ksp->ks_data)->ks_reqs2;
for (i = 0; i < SMB2__NCMDS; i++, ksr++) {
smb_latency_init(&sds[i].sdt_lat);
(void) strlcpy(ksr->kr_name, smb2_disp_table[i].sdt_name,
sizeof (ksr->kr_name));
}
}
void
smb2_dispatch_stats_fini(smb_server_t *sv)
{
smb_disp_stats_t *sds = sv->sv_disp_stats2;
int i;
for (i = 0; i < SMB2__NCMDS; i++)
smb_latency_destroy(&sds[i].sdt_lat);
}
void
smb2_dispatch_stats_update(smb_server_t *sv,
smb_kstat_req_t *ksr, int first, int nreq)
{
smb_disp_stats_t *sds = sv->sv_disp_stats2;
int i;
int last;
last = first + nreq - 1;
if ((first < SMB2__NCMDS) && (last < SMB2__NCMDS)) {
for (i = first; i <= last; i++, ksr++) {
ksr->kr_rxb = sds[i].sdt_rxb;
ksr->kr_txb = sds[i].sdt_txb;
mutex_enter(&sds[i].sdt_lat.ly_mutex);
ksr->kr_nreq = sds[i].sdt_lat.ly_a_nreq;
ksr->kr_sum = sds[i].sdt_lat.ly_a_sum;
ksr->kr_a_mean = sds[i].sdt_lat.ly_a_mean;
ksr->kr_a_stddev =
sds[i].sdt_lat.ly_a_stddev;
ksr->kr_d_mean = sds[i].sdt_lat.ly_d_mean;
ksr->kr_d_stddev =
sds[i].sdt_lat.ly_d_stddev;
sds[i].sdt_lat.ly_d_mean = 0;
sds[i].sdt_lat.ly_d_nreq = 0;
sds[i].sdt_lat.ly_d_stddev = 0;
sds[i].sdt_lat.ly_d_sum = 0;
mutex_exit(&sds[i].sdt_lat.ly_mutex);
}
}
}
void
smb2sr_append_postwork(smb_request_t *top_sr, smb_request_t *new_sr)
{
smb_request_t *last_sr;
ASSERT(top_sr->session->dialect >= SMB_VERS_2_BASE);
last_sr = top_sr;
while (last_sr->sr_postwork != NULL)
last_sr = last_sr->sr_postwork;
last_sr->sr_postwork = new_sr;
}
static void
smb2sr_run_postwork(smb_request_t *top_sr)
{
smb_request_t *post_sr;
smb_request_t *next_sr;
while ((post_sr = top_sr->sr_postwork) != NULL) {
next_sr = post_sr->sr_postwork;
top_sr->sr_postwork = next_sr;
post_sr->sr_postwork = NULL;
post_sr->sr_worker = top_sr->sr_worker;
post_sr->sr_state = SMB_REQ_STATE_ACTIVE;
switch (post_sr->smb2_cmd_code) {
case SMB2_OPLOCK_BREAK:
smb_oplock_send_break(post_sr);
break;
default:
ASSERT(0);
}
if (post_sr->dh_nvl_dirty) {
post_sr->dh_nvl_dirty = B_FALSE;
smb2_dh_update_nvfile(post_sr);
}
post_sr->sr_state = SMB_REQ_STATE_COMPLETED;
smb_request_free(post_sr);
}
}