Print this page
NEX-4856 SMB2 kstats don't correctly count compound requests
Reviewed by: Gordon Ross <gordon.ross@nexenta.com>
Reviewed by: Evan Layton <evan.layton@nexenta.com>
NEX-19944 SMB2 server should require signed Validate Negotiate requests
Reviewed by: Gordon Ross <gordon.ross@nexenta.com>
Reviewed by: Evan Layton <evan.layton@nexenta.com>
NEX-17589 Get "too high" smbd error when copy big file to cifs share (redo)
Reviewed by: Matt Barden <matt.barden@nexenta.com>
Reviewed by: Evan Layton <evan.layton@nexenta.com>
NEX-16943 network outages with thread stuck in smb2_scoreboard_cancel
Reviewed by: Matt Barden <matt.barden@nexenta.com>
Reviewed by: Evan Layton <evan.layton@nexenta.com>
NEX-9808 SMB3 persistent handles
Reviewed by: Matt Barden <matt.barden@nexenta.com>
Reviewed by: Evan Layton <evan.layton@nexenta.com>
NEX-15578 SMB2 durable handle redesign
Reviewed by: Matt Barden <matt.barden@nexenta.com>
Reviewed by: Evan Layton <evan.layton@nexenta.com>
NEX-5665 SMB2 oplock leases
Reviewed by: Matt Barden <matt.barden@nexenta.com>
Reviewed by: Evan Layton <evan.layton@nexenta.com>
Reviewed by: Roman Strashkin <roman.strashkin@nexenta.com>
NEX-15069 smtorture smb2.create.blob is failed
Reviewed by: Matt Barden <matt.barden@nexenta.com>
Reviewed by: Evan Layton <evan.layton@nexenta.com>
NEX-15555 SMB2 async redesign
NEX-15061 smtorture smb2.lock.cancel.cancel is failed
Reviewed by: Matt Barden <matt.barden@nexenta.com>
Reviewed by: Evan Layton <evan.layton@nexenta.com>
Reviewed by: Roman Strashkin <roman.strashkin@nexenta.com>
Also follow-up change to:
NEX-1643 dtrace provider for smbsrv (remove "done2" probes,
which don't make sense with the new async design)
NEX-9808 SMB3 persistent handles
Reviewed by: Matt Barden <matt.barden@nexenta.com>
Reviewed by: Evan Layton <evan.layton@nexenta.com>
NEX-15578 SMB2 durable handle redesign
Reviewed by: Matt Barden <matt.barden@nexenta.com>
Reviewed by: Evan Layton <evan.layton@nexenta.com>
NEX-5665 SMB2 oplock leases
Reviewed by: Matt Barden <matt.barden@nexenta.com>
Reviewed by: Evan Layton <evan.layton@nexenta.com>
Reviewed by: Roman Strashkin <roman.strashkin@nexenta.com>
NEX-15069 smtorture smb2.create.blob is failed
Reviewed by: Matt Barden <matt.barden@nexenta.com>
Reviewed by: Evan Layton <evan.layton@nexenta.com>
NEX-15555 SMB2 async redesign
NEX-15061 smtorture smb2.lock.cancel.cancel is failed
Reviewed by: Matt Barden <matt.barden@nexenta.com>
Reviewed by: Evan Layton <evan.layton@nexenta.com>
Reviewed by: Roman Strashkin <roman.strashkin@nexenta.com>
Also follow-up change to:
NEX-1643 dtrace provider for smbsrv (remove "done2" probes,
which don't make sense with the new async design)
NEX-1643 dtrace provider for smbsrv
Reviewed by: Evan Layton <evan.layton@nexenta.com>
Reviewed by: Matt Barden <matt.barden@nexenta.com>
NEX-9864 Some SMB cancel races remain after NEX-5845 (smb3 nit)
NEX-9864 Some SMB cancel races remain after NEX-5845
Revert (part of) "NEX-5845 rework SMB immediate cancel"
reverts (part of) commit 7a5da69f6d42b17ebcc95ca3d02925d07a01343e.
Reviewed by: Matt Barden <matt.barden@nexenta.com>
Reviewed by: Evan Layton <evan.layton@nexenta.com>
NEX-5273 SMB 3 Encryption
Reviewed by: Gordon Ross <gordon.ross@nexenta.com>
Reviewed by: Evan Layton <evan.layton@nexenta.com>
Reviewed by: Roman Strashkin <roman.strashkin@nexenta.com>
NEX-5844 want SMB2 ioctl FSCTL_SRV_COPYCHUNK
NEX-6124 smb_fsop_read/write should allow file != sr->fid_ofile
NEX-6125 smbtorture invalid response with smb2.ioctl
Reviewed by: Evan Layton <evan.layton@nexenta.com>
Reviewed by: Matt Barden <matt.barden@nexenta.com>
NEX-5845 rework SMB immediate cancel
Reviewed by: Matt Barden <matt.barden@nexenta.com>
Reviewed by: Kevin Crowe <kevin.crowe@nexenta.com>
NEX-5586 SMB2 ofiles need real Persistent IDs
NEX-5313 SMB2 oplock break notification should use TID=0
Reviewed by: Gordon Ross <gwr@nexenta.com>
NEX-5560 smb2 should use 64-bit server-global uids
Reviewed by: Gordon Ross <gwr@nexenta.com>
NEX-3906 Prefer that SMB change notify not tie up a worker thread
NEX-5278 SMB notify should buffer per file handle
Reviewed by: Kevin Crowe <kevin.crowe@nexenta.com>
Reviewed by: Matt Barden <Matt.Barden@nexenta.com>
NEX-5152 immediate SMB cancel may fail
Reviewed by: Kevin Crowe <kevin.crowe@nexenta.com>
Reviewed by: Matt Barden <Matt.Barden@nexenta.com>
NEX-5175 want SMB statistics separately for reads, writes, other
Reviewed by: Gordon Ross <gwr@nexenta.com>
Reviewed by: Matt Barden <Matt.Barden@nexenta.com>
NEX-5198 smb2 kernel kstats incorrect for received data
Reviewed by: Kevin Crowe <kevin.crowe@nexenta.com>
NEX-5133 Deleting directory over CIFS SMB2 fails after visiting in explorer
Reviewed by: Kevin Crowe <kevin.crowe@nexenta.com>
Reviewed by: Matt Barden <Matt.Barden@nexenta.com>
NEX-4313 want iops, bandwidth, and latency kstats for smb
Portions contributed by: Gordon Ross <gwr@nexenta.com>
Reviewed by: Matt Barden <Matt.Barden@nexenta.com>
Reviewed by: Gordon Ross <gordon.ross@nexenta.com>
NEX-4598 SMB2 credit shortage with Mac client
Reviewed by: Bayard Bell <bayard.bell@nexenta.com>
Reviewed by: Kevin Crowe <kevin.crowe@nexenta.com>
Reviewed by: Matt Barden <Matt.Barden@nexenta.com>
NEX-4391 improve smb cancel support
Reviewed by: Matt Barden <Matt.Barden@nexenta.com>
NEX-4147 Cancelled SMB2 requests sometimes have no response (missed things)
NEX-4147 Cancelled SMB2 requests sometimes have no response
NEX-4157 Improve SMB2 compound request handler
Reviewed by: Matt Barden <Matt.Barden@nexenta.com>
NEX-1999 SMB2 panic - missing tree connection
NEX-3377 Want reply header set earlier
Reviewed by: Dan Fields <dan.fields@nexenta.com>
Reviewed by: Kevin Crowe <kevin.crowe@nexenta.com>
Reviewed by: Matt Barden <Matt.Barden@nexenta.com>
NEX-3310 smbstat misreports change notify
Reviewed by: Alek Pinchuk <alek.pinchuk@nexenta.com>
Reviewed by: Dan Fields <dan.fields@nexenta.com>
NEX-3080 SMB1 signing problem with Kerberos auth.
Reviewed by: Bayard Bell <bayard.bell@nexenta.com>
Reviewed by: Dan Fields <dan.fields@nexenta.com>
Reviewed by: Kevin Crowe <kevin.crowe@nexenta.com>
Reviewed by: Matt Barden <Matt.Barden@nexenta.com>
NEX-2869 SMB2 signing fails for multi-user clients like Citrix RDS
NEX-2975 SMB2 Cancel may fail
Reviewed by: Kevin Crowe <kevin.crowe@nexenta.com>
Reviewed by: Tony Nguyen <tony.nguyen@nexenta.com>
NEX-2781 SMB2 credit handling needs work
NEX-2353 Codenomicon: SMB2 TC # 448950 - PANIC in SMB2.Compounded-commands...
NEX-2344 Codenomicon: SMB2 TC: 458439 Panic in SMB2.Compounded-commands
SMB-55 SMB2 signing
SMB-122 smbd core dumps in smbd_dc_update / smb_log
SMB-117 Win7 fails to open security properties
SMB-110 panic mapping a share from Nexentastor to the windows 2012 R2 client
SMB-109 Codenomicon: SMB TC: 409480 - Panic with SMB2_FIND request
SMB-79 Codenomicon: SMB2 TC: 4978 - Panic in smb_latency_add_sample
SMB-11 SMB2 message parse & dispatch
SMB-12 SMB2 Negotiate Protocol
SMB-13 SMB2 Session Setup
SMB-14 SMB2 Logoff
SMB-15 SMB2 Tree Connect
SMB-16 SMB2 Tree Disconnect
SMB-17 SMB2 Create
SMB-18 SMB2 Close
SMB-19 SMB2 Flush
SMB-20 SMB2 Read
SMB-21 SMB2 Write
SMB-22 SMB2 Lock/Unlock
SMB-23 SMB2 Ioctl
SMB-24 SMB2 Cancel
SMB-25 SMB2 Echo
SMB-26 SMB2 Query Dir
SMB-27 SMB2 Change Notify
SMB-28 SMB2 Query Info
SMB-29 SMB2 Set Info
SMB-30 SMB2 Oplocks
SMB-53 SMB2 Create Context options
(SMB2 code review cleanup 1, 2, 3)
@@ -8,67 +8,24 @@
* source. A copy of the CDDL is also available via the Internet at
* http://www.illumos.org/license/CDDL.
*/
/*
- * Copyright 2015 Nexenta Systems, Inc. All rights reserved.
+ * Copyright 2019 Nexenta Systems, Inc. All rights reserved.
*/
#include <smbsrv/smb2_kproto.h>
#include <smbsrv/smb_kstat.h>
#include <smbsrv/smb2.h>
-/*
- * Saved state for a command that "goes async". When a compound request
- * contains a command that may block indefinitely, the compound reply is
- * composed with an "interim response" for that command, and information
- * needed to actually dispatch that command is saved on a list of "async"
- * commands for this compound request. After the compound reply is sent,
- * the list of async commands is processed, and those may block as long
- * as they need to without affecting the initial compound request.
- *
- * Now interestingly, this "async" mechanism is not used with the full
- * range of asynchrony that one might imagine. The design of async
- * request processing can be drastically simplified if we can assume
- * that there's no need to run more than one async command at a time.
- * With that simplifying assumption, we can continue using the current
- * "one worker thread per request message" model, which has very simple
- * locking rules etc. The same worker thread that handles the initial
- * compound request can handle the list of async requests.
- *
- * As it turns out, SMB2 clients do not try to use more than one "async"
- * command in a compound. If they were to do so, the [MS-SMB2] spec.
- * allows us to decline additional async requests with an error.
- *
- * smb_async_req_t is the struct used to save an "async" request on
- * the list of requests that had an interim reply in the initial
- * compound reply. This includes everything needed to restart
- * processing at the async command.
- */
+#define SMB2_ASYNCID(sr) (sr->smb2_messageid ^ (1ULL << 62))
-typedef struct smb2_async_req {
-
- smb_sdrc_t (*ar_func)(smb_request_t *);
-
- int ar_cmd_hdr; /* smb2_cmd_hdr offset */
- int ar_cmd_len; /* length from hdr */
-
- /*
- * SMB2 header fields.
- */
- uint16_t ar_cmd_code;
- uint16_t ar_uid;
- uint16_t ar_tid;
- uint32_t ar_pid;
- uint32_t ar_hdr_flags;
- uint64_t ar_messageid;
-} smb2_async_req_t;
-
-void smb2sr_do_async(smb_request_t *);
smb_sdrc_t smb2_invalid_cmd(smb_request_t *);
static void smb2_tq_work(void *);
+static void smb2sr_run_postwork(smb_request_t *);
+static int smb3_decrypt_msg(smb_request_t *);
static const smb_disp_entry_t const
smb2_disp_table[SMB2__NCMDS] = {
/* text-name, pre, func, post, cmd-code, dialect, flags */
@@ -111,19 +68,13 @@
smb2_lock, NULL, 0, 0 },
{ "smb2_ioctl", NULL,
smb2_ioctl, NULL, 0, 0 },
- /*
- * Note: Cancel gets the "invalid command" handler because
- * that's always handled directly in the reader. We should
- * never get to the function using this table, but note:
- * We CAN get here if a nasty client adds cancel to some
- * compound message, which is a protocol violation.
- */
{ "smb2_cancel", NULL,
- smb2_invalid_cmd, NULL, 0, 0 },
+ smb2_cancel, NULL, 0, 0,
+ SDDF_SUPPRESS_UID | SDDF_SUPPRESS_TID },
{ "smb2_echo", NULL,
smb2_echo, NULL, 0, 0,
SDDF_SUPPRESS_UID | SDDF_SUPPRESS_TID },
@@ -173,47 +124,110 @@
* will drop the session.
*/
int
smb2sr_newrq(smb_request_t *sr)
{
+ struct mbuf_chain *mbc = &sr->command;
uint32_t magic;
- uint16_t command;
- int rc;
+ int rc, skip;
- magic = LE_IN32(sr->sr_request_buf);
- if (magic != SMB2_PROTOCOL_MAGIC) {
- smb_request_free(sr);
- /* will drop the connection */
- return (EPROTO);
+ if (smb_mbc_peek(mbc, 0, "l", &magic) != 0)
+ goto drop;
+
+ /* 0xFD S M B */
+ if (magic == SMB3_ENCRYPTED_MAGIC) {
+ if (smb3_decrypt_msg(sr) != 0)
+ goto drop;
+ /*
+ * Should now be looking at an un-encrypted
+ * SMB2 message header.
+ */
+ if (smb_mbc_peek(mbc, 0, "l", &magic) != 0)
+ goto drop;
}
+ if (magic != SMB2_PROTOCOL_MAGIC)
+ goto drop;
+
/*
- * Execute Cancel requests immediately, (here in the
- * reader thread) so they won't wait for any other
- * commands we might already have in the task queue.
- * Cancel also skips signature verification and
- * does not consume a sequence number.
- * [MS-SMB2] 3.2.4.24 Cancellation...
+ * Walk the SMB2 commands in this compound message and
+ * keep track of the range of message IDs it uses.
*/
- command = LE_IN16((uint8_t *)sr->sr_request_buf + 12);
- if (command == SMB2_CANCEL) {
- rc = smb2sr_newrq_cancel(sr);
+ for (;;) {
+ if (smb2_decode_header(sr) != 0)
+ goto drop;
+
+ /*
+ * Cancel requests are special: They refer to
+ * an earlier message ID (or an async. ID),
+ * never a new ID, and are never compounded.
+ * This is intentionally not "goto drop"
+ * because rc may be zero (success).
+ */
+ if (sr->smb2_cmd_code == SMB2_CANCEL) {
+ rc = smb2_newrq_cancel(sr);
smb_request_free(sr);
return (rc);
}
/*
+ * Keep track of the total credits in this compound
+ * and the first (real) message ID (not: 0, -1)
+ * While we're looking, verify that all (real) IDs
+ * are (first <= ID < (first + msg_credits))
+ */
+ if (sr->smb2_credit_charge == 0)
+ sr->smb2_credit_charge = 1;
+ sr->smb2_total_credits += sr->smb2_credit_charge;
+
+ if (sr->smb2_messageid != 0 &&
+ sr->smb2_messageid != UINT64_MAX) {
+
+ if (sr->smb2_first_msgid == 0)
+ sr->smb2_first_msgid = sr->smb2_messageid;
+
+ if (sr->smb2_messageid < sr->smb2_first_msgid ||
+ sr->smb2_messageid >= (sr->smb2_first_msgid +
+ sr->smb2_total_credits)) {
+ long long id = (long long) sr->smb2_messageid;
+ cmn_err(CE_WARN, "clnt %s msg ID 0x%llx "
+ "out of sequence in compound",
+ sr->session->ip_addr_str, id);
+ }
+ }
+
+ /* Normal loop exit on next == zero */
+ if (sr->smb2_next_command == 0)
+ break;
+
+ /* Abundance of caution... */
+ if (sr->smb2_next_command < SMB2_HDR_SIZE)
+ goto drop;
+
+ /* Advance to the next header. */
+ skip = sr->smb2_next_command - SMB2_HDR_SIZE;
+ if (MBC_ROOM_FOR(mbc, skip) == 0)
+ goto drop;
+ mbc->chain_offset += skip;
+ }
+ /* Rewind back to the top. */
+ mbc->chain_offset = 0;
+
+ /*
* Submit the request to the task queue, which calls
* smb2_tq_work when the workload permits.
*/
sr->sr_time_submitted = gethrtime();
sr->sr_state = SMB_REQ_STATE_SUBMITTED;
smb_srqueue_waitq_enter(sr->session->s_srqueue);
(void) taskq_dispatch(sr->sr_server->sv_worker_pool,
smb2_tq_work, sr, TQ_SLEEP);
-
return (0);
+
+drop:
+ smb_request_free(sr);
+ return (-1);
}
static void
smb2_tq_work(void *arg)
{
@@ -227,20 +241,216 @@
smb_srqueue_waitq_to_runq(srq);
sr->sr_worker = curthread;
sr->sr_time_active = gethrtime();
/*
- * In contrast with SMB1, SMB2 must _always_ dispatch to
- * the handler function, because cancelled requests need
- * an error reply (NT_STATUS_CANCELLED).
+ * Always dispatch to the work function, because cancelled
+ * requests need an error reply (NT_STATUS_CANCELLED).
*/
+ mutex_enter(&sr->sr_mutex);
+ if (sr->sr_state == SMB_REQ_STATE_SUBMITTED)
+ sr->sr_state = SMB_REQ_STATE_ACTIVE;
+ mutex_exit(&sr->sr_mutex);
+
smb2sr_work(sr);
smb_srqueue_runq_exit(srq);
}
+static int
+smb3_decrypt_msg(smb_request_t *sr)
+{
+ int save_offset;
+
+ if (sr->session->dialect < SMB_VERS_3_0) {
+ cmn_err(CE_WARN, "encrypted message in SMB 2.x");
+ return (-1);
+ }
+
+ sr->encrypted = B_TRUE;
+ save_offset = sr->command.chain_offset;
+ if (smb3_decode_tform_header(sr) != 0) {
+ cmn_err(CE_WARN, "bad transform header");
+ return (-1);
+ }
+ sr->command.chain_offset = save_offset;
+
+ sr->tform_ssn = smb_session_lookup_ssnid(sr->session,
+ sr->smb3_tform_ssnid);
+ if (sr->tform_ssn == NULL) {
+ cmn_err(CE_WARN, "transform header: session not found");
+ return (-1);
+ }
+
+ if (smb3_decrypt_sr(sr) != 0) {
+ cmn_err(CE_WARN, "smb3 decryption failed");
+ return (-1);
+ }
+
+ return (0);
+}
+
/*
+ * SMB2 credits determine how many simultaneous commands the
+ * client may issue, and bounds the range of message IDs those
+ * commands may use. With multi-credit support, commands may
+ * use ranges of message IDs, where the credits used by each
+ * command are proportional to their data transfer size.
+ *
+ * Every command may request an increase or decrease of
+ * the currently granted credits, based on the difference
+ * between the credit request and the credit charge.
+ * [MS-SMB2] 3.3.1.2 Algorithm for the Granting of Credits
+ *
+ * Most commands have credit_request=1, credit_charge=1,
+ * which keeps the credit grant unchanged.
+ *
+ * All we're really doing here (for now) is reducing the
+ * credit_response if the client requests a credit increase
+ * that would take their credit over the maximum, and
+ * limiting the decrease so they don't run out of credits.
+ *
+ * Later, this could do something dynamic based on load.
+ *
+ * One other non-obvious bit about credits: We keep the
+ * session s_max_credits low until the 1st authentication,
+ * at which point we'll set the normal maximum_credits.
+ * Some clients ask for more credits with session setup,
+ * and we need to handle that requested increase _after_
+ * the command-specific handler returns so it won't be
+ * restricted to the lower (pre-auth) limit.
+ */
+static inline void
+smb2_credit_decrease(smb_request_t *sr)
+{
+ smb_session_t *session = sr->session;
+ uint16_t cur, d;
+
+ mutex_enter(&session->s_credits_mutex);
+ cur = session->s_cur_credits;
+
+ /* Handle credit decrease. */
+ d = sr->smb2_credit_charge - sr->smb2_credit_request;
+ cur -= d;
+ if (cur & 0x8000) {
+ /*
+ * underflow (bad credit charge or request)
+ * leave credits unchanged (response=charge)
+ */
+ cur = session->s_cur_credits;
+ sr->smb2_credit_response = sr->smb2_credit_charge;
+ DTRACE_PROBE1(smb2__credit__neg, smb_request_t *, sr);
+ }
+
+ /*
+ * The server MUST ensure that the number of credits
+ * held by the client is never reduced to zero.
+ * [MS-SMB2] 3.3.1.2
+ */
+ if (cur == 0) {
+ cur = 1;
+ sr->smb2_credit_response += 1;
+ DTRACE_PROBE1(smb2__credit__min, smb_request_t *, sr);
+ }
+
+ DTRACE_PROBE3(smb2__credit__decrease,
+ smb_request_t *, sr, int, (int)cur,
+ int, (int)session->s_cur_credits);
+
+ session->s_cur_credits = cur;
+ mutex_exit(&session->s_credits_mutex);
+}
+
+/*
+ * Second half of SMB2 credit handling (increases)
+ */
+static inline void
+smb2_credit_increase(smb_request_t *sr)
+{
+ smb_session_t *session = sr->session;
+ uint16_t cur, d;
+
+ mutex_enter(&session->s_credits_mutex);
+ cur = session->s_cur_credits;
+
+ /* Handle credit increase. */
+ d = sr->smb2_credit_request - sr->smb2_credit_charge;
+ cur += d;
+
+ /*
+ * If new credits would be above max,
+ * reduce the credit grant.
+ */
+ if (cur > session->s_max_credits) {
+ d = cur - session->s_max_credits;
+ cur = session->s_max_credits;
+ sr->smb2_credit_response -= d;
+ DTRACE_PROBE1(smb2__credit__max, smb_request_t, sr);
+ }
+
+ DTRACE_PROBE3(smb2__credit__increase,
+ smb_request_t *, sr, int, (int)cur,
+ int, (int)session->s_cur_credits);
+
+ session->s_cur_credits = cur;
+ mutex_exit(&session->s_credits_mutex);
+}
+
+/*
+ * Record some statistics: latency, rx bytes, tx bytes
+ * per: server, session & kshare.
+ */
+static inline void
+smb2_record_stats(smb_request_t *sr, smb_disp_stats_t *sds, boolean_t tx_only)
+{
+ hrtime_t dt;
+ int64_t rxb;
+ int64_t txb;
+ smb_disp_stats_t *client_sds;
+ smb_disp_stats_t *share_sds;
+ int cmd_type;
+ smb_session_t *session = sr->session;
+
+ if (sr->smb2_cmd_code == SMB2_READ) {
+ cmd_type = SMBSRV_CLSH_READ;
+ } else if (sr->smb2_cmd_code == SMB2_WRITE) {
+ cmd_type = SMBSRV_CLSH_WRITE;
+ } else {
+ cmd_type = SMBSRV_CLSH_OTHER;
+ }
+
+ dt = gethrtime() - sr->sr_time_start;
+ rxb = (int64_t)(sr->command.chain_offset - sr->smb2_cmd_hdr);
+ txb = (int64_t)(sr->reply.chain_offset - sr->smb2_reply_hdr);
+
+ if (!tx_only) {
+ smb_server_inc_req(sr->sr_server);
+ smb_latency_add_sample(&sds->sdt_lat, dt);
+ atomic_add_64(&sds->sdt_rxb, rxb);
+ }
+ atomic_add_64(&sds->sdt_txb, txb);
+
+ client_sds = &session->s_stats[cmd_type];
+ if (!tx_only) {
+ smb_latency_add_sample(&client_sds->sdt_lat, dt);
+ atomic_add_64(&client_sds->sdt_rxb, rxb);
+ }
+ atomic_add_64(&client_sds->sdt_txb, txb);
+
+ if ((sr->tid_tree != NULL) &&
+ (sr->tid_tree->t_kshare != NULL)) {
+ share_sds =
+ &sr->tid_tree->t_kshare->shr_stats[cmd_type];
+ if (!tx_only) {
+ smb_latency_add_sample(&share_sds->sdt_lat, dt);
+ atomic_add_64(&share_sds->sdt_rxb, rxb);
+ }
+ atomic_add_64(&share_sds->sdt_txb, txb);
+ }
+}
+
+/*
* smb2sr_work
*
* This function processes each SMB command in the current request
* (which may be a compound request) building a reply containing
* SMB reply messages, one-to-one with the SMB commands. Some SMB
@@ -257,11 +467,12 @@
* we need to keep track of the bounds of the current request
* and reply. For the request, this uses an MBC_SHADOW_CHAIN
* that begins at smb2_cmd_hdr. The reply is appended to the
* sr->reply chain starting at smb2_reply_hdr.
*
- * This function must always free the smb request.
+ * This function must always free the smb request, or arrange
+ * for it to be completed and free'd later (if SDRC_SR_KEPT).
*/
void
smb2sr_work(struct smb_request *sr)
{
const smb_disp_entry_t *sdd;
@@ -273,55 +484,43 @@
boolean_t disconnect = B_FALSE;
boolean_t related;
session = sr->session;
+ ASSERT(sr->smb2_async == B_FALSE);
ASSERT(sr->tid_tree == 0);
ASSERT(sr->uid_user == 0);
ASSERT(sr->fid_ofile == 0);
sr->smb_fid = (uint16_t)-1;
sr->smb2_status = 0;
/* temporary until we identify a user */
sr->user_cr = zone_kcred();
- mutex_enter(&sr->sr_mutex);
- switch (sr->sr_state) {
- case SMB_REQ_STATE_SUBMITTED:
- case SMB_REQ_STATE_CLEANED_UP:
- sr->sr_state = SMB_REQ_STATE_ACTIVE;
- break;
- default:
- ASSERT(0);
- /* FALLTHROUGH */
- case SMB_REQ_STATE_CANCELED:
- sr->smb2_status = NT_STATUS_CANCELLED;
- break;
- }
- mutex_exit(&sr->sr_mutex);
-
cmd_start:
/*
- * Decode the request header
+ * Note that we don't check sr_state here and abort the
+ * compound if cancelled (etc.) because some SMB2 command
+ * handlers need to do work even when cancelled.
*
- * Most problems with decoding will result in the error
- * STATUS_INVALID_PARAMETER. If the decoding problem
- * prevents continuing, we'll close the connection.
- * [MS-SMB2] 3.3.5.2.6 Handling Incorrectly Formatted...
- *
* We treat some status codes as if "sticky", meaning
* once they're set after some command handler returns,
* all remaining commands get this status without even
- * calling the command-specific handler. The cancelled
- * status is used above, and insufficient_resources is
- * used when smb2sr_go_async declines to "go async".
- * Otherwise initialize to zero (success).
+ * calling the command-specific handler.
*/
if (sr->smb2_status != NT_STATUS_CANCELLED &&
sr->smb2_status != NT_STATUS_INSUFFICIENT_RESOURCES)
sr->smb2_status = 0;
+ /*
+ * Decode the request header
+ *
+ * Most problems with decoding will result in the error
+ * STATUS_INVALID_PARAMETER. If the decoding problem
+ * prevents continuing, we'll close the connection.
+ * [MS-SMB2] 3.3.5.2.6 Handling Incorrectly Formatted...
+ */
sr->smb2_cmd_hdr = sr->command.chain_offset;
if ((rc = smb2_decode_header(sr)) != 0) {
cmn_err(CE_WARN, "clnt %s bad SMB2 header",
session->ip_addr_str);
disconnect = B_TRUE;
@@ -337,10 +536,19 @@
session->ip_addr_str);
disconnect = B_TRUE;
goto cleanup;
}
related = (sr->smb2_hdr_flags & SMB2_FLAGS_RELATED_OPERATIONS);
+ sr->smb2_hdr_flags |= SMB2_FLAGS_SERVER_TO_REDIR;
+ if (sr->smb2_hdr_flags & SMB2_FLAGS_ASYNC_COMMAND) {
+ /* Probably an async cancel. */
+ DTRACE_PROBE1(smb2__dispatch__async, smb_request_t *, sr);
+ } else if (sr->smb2_async) {
+ /* Previous command in compound went async. */
+ sr->smb2_hdr_flags |= SMB2_FLAGS_ASYNC_COMMAND;
+ sr->smb2_async_id = SMB2_ASYNCID(sr);
+ }
/*
* In case we bail out with an error before we get to the
* section that computes the credit grant, initialize the
* response header fields so that credits won't change.
@@ -349,15 +557,21 @@
if (sr->smb2_credit_charge == 0)
sr->smb2_credit_charge = 1;
sr->smb2_credit_response = sr->smb2_credit_charge;
/*
- * Reserve space for the reply header, and save the offset.
- * The reply header will be overwritten later. If we have
- * already exhausted the output space, then this client is
- * trying something funny. Log it and kill 'em.
+ * Write a tentative reply header.
+ *
+ * We could just leave this blank, but if we're using the
+ * mdb module feature that extracts packets, it's useful
+ * to have the header mostly correct here.
+ *
+ * If we have already exhausted the output space, then the
+ * client is trying something funny. Log it and kill 'em.
*/
+ sr->smb2_next_reply = 0;
+ ASSERT((sr->reply.chain_offset & 7) == 0);
sr->smb2_reply_hdr = sr->reply.chain_offset;
if ((rc = smb2_encode_header(sr, B_FALSE)) != 0) {
cmn_err(CE_WARN, "clnt %s excessive reply",
session->ip_addr_str);
disconnect = B_TRUE;
@@ -393,10 +607,19 @@
*/
(void) MBC_SHADOW_CHAIN(&sr->smb_data, &sr->command,
sr->smb2_cmd_hdr, msg_len);
/*
+ * We will consume the data for this request from smb_data.
+ * That effectively consumes msg_len bytes from sr->command
+ * but doesn't update its chain_offset, so we need to update
+ * that here to make later received bytes accounting work.
+ */
+ sr->command.chain_offset = sr->smb2_cmd_hdr + msg_len;
+ ASSERT(sr->command.chain_offset <= sr->command.max_bytes);
+
+ /*
* Validate the commmand code, get dispatch table entries.
* [MS-SMB2] 3.3.5.2.6 Handling Incorrectly Formatted...
*
* The last slot in the dispatch table is used to handle
* invalid commands. Same for statistics.
@@ -421,11 +644,10 @@
/*
* Drop user, tree, file; carefully ordered to
* avoid dangling references: file, tree, user
*/
if (sr->fid_ofile != NULL) {
- smb_ofile_request_complete(sr->fid_ofile);
smb_ofile_release(sr->fid_ofile);
sr->fid_ofile = NULL;
}
if (sr->tid_tree != NULL) {
smb_tree_release(sr->tid_tree);
@@ -455,28 +677,82 @@
if (sr->uid_user == NULL) {
smb2sr_put_error(sr,
NT_STATUS_INVALID_PARAMETER);
goto cmd_done;
}
- sr->smb_uid = sr->uid_user->u_uid;
+ sr->smb2_ssnid = sr->uid_user->u_ssnid;
} else {
/*
* Lookup the UID
* [MS-SMB2] 3.3.5.2 Verifying the Session
*/
ASSERT(sr->uid_user == NULL);
- sr->uid_user = smb_session_lookup_uid(session,
- sr->smb_uid);
+ /*
+ * [MS-SMB2] 3.3.5.2.7 Handling Compounded Requests
+ *
+ * If this is an encrypted compound request,
+ * ensure that the ssnid in the request
+ * is the same as the tform ssnid if this
+ * message is not related.
+ *
+ * The reasons this is done seem to apply equally
+ * to uncompounded requests, so we apply it to all.
+ */
+
+ if (sr->encrypted &&
+ sr->smb2_ssnid != sr->smb3_tform_ssnid) {
+ disconnect = B_TRUE;
+ goto cleanup; /* just do this for now */
+ }
+
+ sr->uid_user = smb_session_lookup_ssnid(session,
+ sr->smb2_ssnid);
if (sr->uid_user == NULL) {
smb2sr_put_error(sr,
NT_STATUS_USER_SESSION_DELETED);
goto cmd_done;
}
+
+ /*
+ * [MS-SMB2] 3.3.5.2.9 Verifying the Session
+ *
+ * If we're talking 3.x,
+ * RejectUnencryptedAccess is TRUE,
+ * Session.EncryptData is TRUE,
+ * and the message wasn't encrypted,
+ * return ACCESS_DENIED.
+ *
+ * Note that Session.EncryptData can only be TRUE when
+ * we're talking 3.x.
+ */
+
+ if (sr->uid_user->u_encrypt ==
+ SMB_CONFIG_REQUIRED &&
+ !sr->encrypted) {
+ smb2sr_put_error(sr,
+ NT_STATUS_ACCESS_DENIED);
+ goto cmd_done;
+ }
+
sr->user_cr = smb_user_getcred(sr->uid_user);
}
ASSERT(sr->uid_user != NULL);
+
+ /*
+ * Encrypt if:
+ * - The cmd is not SESSION_SETUP or NEGOTIATE; AND
+ * - Session.EncryptData is TRUE
+ *
+ * Those commands suppress UID, so they can't be the cmd here.
+ */
+ if (sr->uid_user->u_encrypt != SMB_CONFIG_DISABLED &&
+ sr->tform_ssn == NULL) {
+ smb_user_hold_internal(sr->uid_user);
+ sr->tform_ssn = sr->uid_user;
+ sr->smb3_tform_ssnid = sr->smb2_ssnid;
}
+ }
if ((sdd->sdt_flags & SDDF_SUPPRESS_TID) == 0) {
/*
* This command requires a tree connection.
*/
@@ -502,13 +778,54 @@
if (sr->tid_tree == NULL) {
smb2sr_put_error(sr,
NT_STATUS_NETWORK_NAME_DELETED);
goto cmd_done;
}
+
+ /*
+ * [MS-SMB2] 3.3.5.2.11 Verifying the Tree Connect
+ *
+ * If we support 3.x, RejectUnencryptedAccess is TRUE,
+ * if Tcon.EncryptData is TRUE or
+ * global EncryptData is TRUE and
+ * the message wasn't encrypted, or
+ * if Tcon.EncryptData is TRUE or
+ * global EncryptData is TRUE or
+ * the request was encrypted and
+ * the connection doesn't support encryption,
+ * return ACCESS_DENIED.
+ *
+ * If RejectUnencryptedAccess is TRUE, we force
+ * max_protocol to at least 3.0. Additionally,
+ * if the tree requires encryption, we don't care
+ * what we support, we still enforce encryption.
+ */
+ if (sr->tid_tree->t_encrypt == SMB_CONFIG_REQUIRED &&
+ (!sr->encrypted ||
+ (session->srv_cap & SMB2_CAP_ENCRYPTION) == 0)) {
+ smb2sr_put_error(sr,
+ NT_STATUS_ACCESS_DENIED);
+ goto cmd_done;
}
+ }
ASSERT(sr->tid_tree != NULL);
+
+ /*
+ * Encrypt if:
+ * - The cmd is not TREE_CONNECT; AND
+ * - Tree.EncryptData is TRUE
+ *
+ * TREE_CONNECT suppresses TID, so that can't be the cmd here.
+ * NOTE: assumes we can't have a tree without a user
+ */
+ if (sr->tid_tree->t_encrypt != SMB_CONFIG_DISABLED &&
+ sr->tform_ssn == NULL) {
+ smb_user_hold_internal(sr->uid_user);
+ sr->tform_ssn = sr->uid_user;
+ sr->smb3_tform_ssnid = sr->smb2_ssnid;
}
+ }
/*
* SMB2 signature verification, two parts:
* (a) Require SMB2_FLAGS_SIGNED (for most request types)
* (b) If SMB2_FLAGS_SIGNED is set, check the signature.
@@ -525,25 +842,33 @@
/*
* The SDDF_SUPPRESS_UID dispatch is set for requests that
* don't need a UID (user). These also don't require a
* signature check here.
+ *
+ * [MS-SMB2] 3.3.5.2.4 Verifying the Signature
+ *
+ * If the packet was successfully decrypted, the message
+ * signature has already been verified, so we can skip this.
*/
if ((sdd->sdt_flags & SDDF_SUPPRESS_UID) == 0 &&
- sr->uid_user != NULL &&
- (sr->uid_user->u_sign_flags & SMB_SIGNING_CHECK) != 0) {
+ !sr->encrypted && sr->uid_user != NULL &&
+ (sr->uid_user->u_sign_flags & SMB_SIGNING_ENABLED) != 0) {
/*
- * This request type should be signed, and
- * we're configured to require signatures.
+ * If the request is signed, check the signature.
+ * Otherwise, if signing is required, deny access.
*/
- if ((sr->smb2_hdr_flags & SMB2_FLAGS_SIGNED) == 0) {
+ if ((sr->smb2_hdr_flags & SMB2_FLAGS_SIGNED) != 0) {
+ rc = smb2_sign_check_request(sr);
+ if (rc != 0) {
+ DTRACE_PROBE1(smb2__sign__check,
+ smb_request_t *, sr);
smb2sr_put_error(sr, NT_STATUS_ACCESS_DENIED);
goto cmd_done;
}
- rc = smb2_sign_check_request(sr);
- if (rc != 0) {
- DTRACE_PROBE1(smb2__sign__check, smb_request_t, sr);
+ } else if (
+ (sr->uid_user->u_sign_flags & SMB_SIGNING_CHECK) != 0) {
smb2sr_put_error(sr, NT_STATUS_ACCESS_DENIED);
goto cmd_done;
}
}
@@ -555,78 +880,22 @@
* function called next.
*/
sr->smb_data.chain_offset = sr->smb2_cmd_hdr + SMB2_HDR_SIZE;
/*
- * SMB2 credits determine how many simultaneous commands the
- * client may issue, and bounds the range of message IDs those
- * commands may use. With multi-credit support, commands may
- * use ranges of message IDs, where the credits used by each
- * command are proportional to their data transfer size.
+ * Credit adjustments (decrease)
*
- * Every command may request an increase or decrease of
- * the currently granted credits, based on the difference
- * between the credit request and the credit charge.
- * [MS-SMB2] 3.3.1.2 Algorithm for the Granting of Credits
- *
- * Most commands have credit_request=1, credit_charge=1,
- * which keeps the credit grant unchanged.
- *
- * All we're really doing here (for now) is reducing the
- * credit_response if the client requests a credit increase
- * that would take their credit over the maximum, and
- * limiting the decrease so they don't run out of credits.
- *
- * Later, this could do something dynamic based on load.
- *
- * One other non-obvious bit about credits: We keep the
- * session s_max_credits low until the 1st authentication,
- * at which point we'll set the normal maximum_credits.
- * Some clients ask for more credits with session setup,
- * and we need to handle that requested increase _after_
- * the command-specific handler returns so it won't be
- * restricted to the lower (pre-auth) limit.
+ * If we've gone async, credit adjustments were done
+ * when we sent the interim reply.
*/
+ if (!sr->smb2_async) {
sr->smb2_credit_response = sr->smb2_credit_request;
if (sr->smb2_credit_request < sr->smb2_credit_charge) {
- uint16_t cur, d;
-
- mutex_enter(&session->s_credits_mutex);
- cur = session->s_cur_credits;
-
- /* Handle credit decrease. */
- d = sr->smb2_credit_charge - sr->smb2_credit_request;
- cur -= d;
- if (cur & 0x8000) {
- /*
- * underflow (bad credit charge or request)
- * leave credits unchanged (response=charge)
- */
- cur = session->s_cur_credits;
- sr->smb2_credit_response = sr->smb2_credit_charge;
- DTRACE_PROBE1(smb2__credit__neg, smb_request_t, sr);
+ smb2_credit_decrease(sr);
}
-
- /*
- * The server MUST ensure that the number of credits
- * held by the client is never reduced to zero.
- * [MS-SMB2] 3.3.1.2
- */
- if (cur == 0) {
- cur = 1;
- sr->smb2_credit_response += 1;
- DTRACE_PROBE1(smb2__credit__min, smb_request_t, sr);
}
- DTRACE_PROBE3(smb2__credit__decrease,
- smb_request_t, sr, int, (int)cur,
- int, (int)session->s_cur_credits);
-
- session->s_cur_credits = cur;
- mutex_exit(&session->s_credits_mutex);
- }
-
/*
* The real work: call the SMB2 command handler
* (except for "sticky" smb2_status - see above)
*/
sr->sr_time_start = gethrtime();
@@ -633,66 +902,34 @@
rc = SDRC_SUCCESS;
if (sr->smb2_status == 0) {
/* NB: not using pre_op */
rc = (*sdd->sdt_function)(sr);
/* NB: not using post_op */
+ } else {
+ smb2sr_put_error(sr, sr->smb2_status);
}
- MBC_FLUSH(&sr->raw_data);
-
/*
- * Second half of SMB2 credit handling (increases)
+ * When the sdt_function returns SDRC_SR_KEPT, it means
+ * this SR may have been passed to another thread so we
+ * MUST NOT touch it anymore.
*/
- if (sr->smb2_credit_request > sr->smb2_credit_charge) {
- uint16_t cur, d;
+ if (rc == SDRC_SR_KEPT)
+ return;
- mutex_enter(&session->s_credits_mutex);
- cur = session->s_cur_credits;
+ MBC_FLUSH(&sr->raw_data);
- /* Handle credit increase. */
- d = sr->smb2_credit_request - sr->smb2_credit_charge;
- cur += d;
-
/*
- * If new credits would be above max,
- * reduce the credit grant.
+ * Credit adjustments (increase)
*/
- if (cur > session->s_max_credits) {
- d = cur - session->s_max_credits;
- cur = session->s_max_credits;
- sr->smb2_credit_response -= d;
- DTRACE_PROBE1(smb2__credit__max, smb_request_t, sr);
+ if (!sr->smb2_async) {
+ if (sr->smb2_credit_request > sr->smb2_credit_charge) {
+ smb2_credit_increase(sr);
}
-
- DTRACE_PROBE3(smb2__credit__increase,
- smb_request_t, sr, int, (int)cur,
- int, (int)session->s_cur_credits);
-
- session->s_cur_credits = cur;
- mutex_exit(&session->s_credits_mutex);
}
cmd_done:
- /*
- * Pad the reply to align(8) if necessary.
- */
- if (sr->reply.chain_offset & 7) {
- int padsz = 8 - (sr->reply.chain_offset & 7);
- (void) smb_mbc_encodef(&sr->reply, "#.", padsz);
- }
- ASSERT((sr->reply.chain_offset & 7) == 0);
-
- /*
- * Record some statistics: latency, rx bytes, tx bytes.
- */
- smb_latency_add_sample(&sds->sdt_lat,
- gethrtime() - sr->sr_time_start);
- atomic_add_64(&sds->sdt_rxb,
- (int64_t)(sr->command.chain_offset - sr->smb2_cmd_hdr));
- atomic_add_64(&sds->sdt_txb,
- (int64_t)(sr->reply.chain_offset - sr->smb2_reply_hdr));
-
switch (rc) {
case SDRC_SUCCESS:
break;
default:
/*
@@ -704,294 +941,461 @@
*/
#ifdef DEBUG
cmn_err(CE_NOTE, "handler for %u returned 0x%x",
sr->smb2_cmd_code, rc);
#endif
- /* FALLTHROUGH */
+ sr->smb2_status = NT_STATUS_INTERNAL_ERROR;
+ break;
case SDRC_ERROR:
+ /*
+ * Many command handlers return SDRC_ERROR for any
+ * problems decoding the request, and don't bother
+ * setting smb2_status. For those cases, the best
+ * status return would be "invalid parameter".
+ */
if (sr->smb2_status == 0)
- sr->smb2_status = NT_STATUS_INTERNAL_ERROR;
+ sr->smb2_status = NT_STATUS_INVALID_PARAMETER;
break;
case SDRC_DROP_VC:
disconnect = B_TRUE;
goto cleanup;
+
+ case SDRC_NO_REPLY:
+ /* will free sr */
+ goto cleanup;
}
/*
+ * Pad the reply to align(8) if there will be another.
+ * (We don't compound async replies.)
+ */
+ if (!sr->smb2_async && sr->smb2_next_command != 0)
+ (void) smb_mbc_put_align(&sr->reply, 8);
+
+ /*
+ * Record some statistics. Uses:
+ * rxb = command.chain_offset - smb2_cmd_hdr;
+ * txb = reply.chain_offset - smb2_reply_hdr;
+ * which at this point represent the current cmd/reply.
+ *
+ * Note: If async, this does txb only, and
+ * skips the smb_latency_add_sample() calls.
+ */
+ smb2_record_stats(sr, sds, sr->smb2_async);
+
+ /*
* If there's a next command, figure out where it starts,
- * and fill in the next command offset for the reply.
- * Note: We sanity checked smb2_next_command above
- * (the offset to the next command). Similarly set
- * smb2_next_reply as the offset to the next reply.
+ * and fill in the next header offset for the reply.
+ * Note: We sanity checked smb2_next_command above.
*/
if (sr->smb2_next_command != 0) {
sr->command.chain_offset =
sr->smb2_cmd_hdr + sr->smb2_next_command;
sr->smb2_next_reply =
sr->reply.chain_offset - sr->smb2_reply_hdr;
} else {
- sr->smb2_next_reply = 0;
+ ASSERT(sr->smb2_next_reply == 0);
}
/*
- * Overwrite the SMB2 header for the response of
- * this command (possibly part of a compound).
- * encode_header adds: SMB2_FLAGS_SERVER_TO_REDIR
+ * Overwrite the (now final) SMB2 header for this response.
*/
(void) smb2_encode_header(sr, B_TRUE);
- if (sr->smb2_hdr_flags & SMB2_FLAGS_SIGNED)
+ /* Don't sign if we're going to encrypt */
+ if (sr->tform_ssn == NULL &&
+ (sr->smb2_hdr_flags & SMB2_FLAGS_SIGNED) != 0)
smb2_sign_reply(sr);
- if (sr->smb2_next_command != 0)
- goto cmd_start;
-
/*
- * We've done all the commands in this compound.
- * Send it out.
+ * Non-async runs the whole compound before send.
+ * When we've gone async, send each individually.
*/
+ if (!sr->smb2_async && sr->smb2_next_command != 0)
+ goto cmd_start;
smb2_send_reply(sr);
+ if (sr->smb2_async && sr->smb2_next_command != 0) {
+ MBC_FLUSH(&sr->reply); /* New reply buffer. */
+ ASSERT(sr->reply.max_bytes == sr->session->reply_max_bytes);
+ goto cmd_start;
+ }
+cleanup:
+ if (disconnect)
+ smb_session_disconnect(session);
+
/*
- * If any of the requests "went async", process those now.
- * The async. function "keeps" this sr, changing its state
- * to completed and calling smb_request_free().
+ * If we have a durable handle, and this operation
+ * updated the nvlist, write it out.
*/
- if (sr->sr_async_req != NULL) {
- smb2sr_do_async(sr);
- return;
+ if (sr->dh_nvl_dirty) {
+ sr->dh_nvl_dirty = B_FALSE;
+ smb2_dh_update_nvfile(sr);
}
-cleanup:
- if (disconnect) {
- smb_rwx_rwenter(&session->s_lock, RW_WRITER);
- switch (session->s_state) {
- case SMB_SESSION_STATE_DISCONNECTED:
- case SMB_SESSION_STATE_TERMINATED:
- break;
- default:
- smb_soshutdown(session->sock);
- session->s_state = SMB_SESSION_STATE_DISCONNECTED;
- break;
- }
- smb_rwx_rwexit(&session->s_lock);
- }
+ /*
+ * Do "postwork" for oplock (and maybe other things)
+ */
+ if (sr->sr_postwork != NULL)
+ smb2sr_run_postwork(sr);
mutex_enter(&sr->sr_mutex);
sr->sr_state = SMB_REQ_STATE_COMPLETED;
mutex_exit(&sr->sr_mutex);
smb_request_free(sr);
}
/*
- * Dispatch an async request using saved information.
- * See smb2sr_save_async and [MS-SMB2] 3.3.4.2
+ * Build interim responses for the current and all following
+ * requests in this compound, then send the compound response,
+ * leaving the SR state so that smb2sr_work() can continue its
+ * processing of this compound in "async mode".
*
- * This is sort of a "lite" version of smb2sr_work. Initialize the
- * command and reply areas as they were when the command-speicific
- * handler started (in case it needs to decode anything again).
- * Call the async function, which builds the command-specific part
- * of the response. Finally, send the response and free the sr.
+ * If we agree to "go async", this should return STATUS_SUCCESS.
+ * Otherwise return STATUS_INSUFFICIENT_RESOURCES for this and
+ * all requests following this request. (See the comments re.
+ * "sticky" smb2_status values in smb2sr_work).
+ *
+ * Note: the Async ID we assign here is arbitrary, and need only
+ * be unique among pending async responses on this connection, so
+ * this just uses a modified messageID, which is already unique.
+ *
+ * Credits: All credit changes should happen via the interim
+ * responses, so we have to manage credits here. After this
+ * returns to smb2sr_work, the final replies for all these
+ * commands will have smb2_credit_response = smb2_credit_charge
+ * (meaning no further changes to the clients' credits).
*/
-void
-smb2sr_do_async(smb_request_t *sr)
+uint32_t
+smb2sr_go_async(smb_request_t *sr)
{
- const smb_disp_entry_t *sdd;
+ smb_session_t *session;
smb_disp_stats_t *sds;
- smb2_async_req_t *ar;
- int rc = 0;
+ uint16_t cmd_idx;
+ int32_t saved_com_offset;
+ uint32_t saved_cmd_hdr;
+ uint16_t saved_cred_resp;
+ uint32_t saved_hdr_flags;
+ uint32_t saved_reply_hdr;
+ uint32_t msg_len;
+ boolean_t disconnect = B_FALSE;
+ if (sr->smb2_async) {
+ /* already went async in some previous cmd. */
+ return (NT_STATUS_SUCCESS);
+ }
+ sr->smb2_async = B_TRUE;
+
+ /* The "server" session always runs async. */
+ session = sr->session;
+ if (session->sock == NULL)
+ return (NT_STATUS_SUCCESS);
+
+ sds = NULL;
+ saved_com_offset = sr->command.chain_offset;
+ saved_cmd_hdr = sr->smb2_cmd_hdr;
+ saved_cred_resp = sr->smb2_credit_response;
+ saved_hdr_flags = sr->smb2_hdr_flags;
+ saved_reply_hdr = sr->smb2_reply_hdr;
+
/*
- * Restore what smb2_decode_header found.
- * (In lieu of decoding it again.)
+ * The command-specific handler should not yet have put any
+ * data in the reply except for the (place holder) header.
*/
- ar = sr->sr_async_req;
- sr->smb2_cmd_hdr = ar->ar_cmd_hdr;
- sr->smb2_cmd_code = ar->ar_cmd_code;
- sr->smb2_hdr_flags = ar->ar_hdr_flags;
- sr->smb2_async_id = (uintptr_t)ar;
- sr->smb2_messageid = ar->ar_messageid;
- sr->smb_pid = ar->ar_pid;
- sr->smb_tid = ar->ar_tid;
- sr->smb_uid = ar->ar_uid;
- sr->smb2_status = 0;
+ if (sr->reply.chain_offset != sr->smb2_reply_hdr + SMB2_HDR_SIZE) {
+ ASSERT3U(sr->reply.chain_offset, ==,
+ sr->smb2_reply_hdr + SMB2_HDR_SIZE);
+ return (NT_STATUS_INTERNAL_ERROR);
+ }
/*
- * Async requests don't grant credits, because any credits
- * should have gone out with the interim reply.
- * An async reply goes alone (no next reply).
+ * Rewind to the start of the current header in both the
+ * command and reply bufers, so the loop below can just
+ * decode/encode just in every pass. This means the
+ * current command header is decoded again, but that
+ * avoids having to special-case the first loop pass.
*/
- sr->smb2_credit_response = 0;
- sr->smb2_next_reply = 0;
+ sr->command.chain_offset = sr->smb2_cmd_hdr;
+ sr->reply.chain_offset = sr->smb2_reply_hdr;
/*
- * Setup input mbuf_chain
+ * This command processing loop is a simplified version of
+ * smb2sr_work() that just puts an "interim response" for
+ * every command in the compound (NT_STATUS_PENDING).
*/
- ASSERT(ar->ar_cmd_len >= SMB2_HDR_SIZE);
- (void) MBC_SHADOW_CHAIN(&sr->smb_data, &sr->command,
- sr->smb2_cmd_hdr + SMB2_HDR_SIZE,
- ar->ar_cmd_len - SMB2_HDR_SIZE);
+cmd_start:
+ sr->smb2_status = NT_STATUS_PENDING;
/*
- * Setup output mbuf_chain
+ * Decode the request header
*/
- MBC_FLUSH(&sr->reply);
- sr->smb2_reply_hdr = sr->reply.chain_offset;
- (void) smb2_encode_header(sr, B_FALSE);
+ sr->smb2_cmd_hdr = sr->command.chain_offset;
+ if ((smb2_decode_header(sr)) != 0) {
+ cmn_err(CE_WARN, "clnt %s bad SMB2 header",
+ session->ip_addr_str);
+ disconnect = B_TRUE;
+ goto cleanup;
+ }
+ sr->smb2_hdr_flags |= (SMB2_FLAGS_SERVER_TO_REDIR |
+ SMB2_FLAGS_ASYNC_COMMAND);
+ sr->smb2_async_id = SMB2_ASYNCID(sr);
- VERIFY3U(sr->smb2_cmd_code, <, SMB2_INVALID_CMD);
- sdd = &smb2_disp_table[sr->smb2_cmd_code];
- sds = sr->session->s_server->sv_disp_stats2;
- sds = &sds[sr->smb2_cmd_code];
+ /*
+ * In case we bail out...
+ */
+ if (sr->smb2_credit_charge == 0)
+ sr->smb2_credit_charge = 1;
+ sr->smb2_credit_response = sr->smb2_credit_charge;
/*
- * Keep the UID, TID, ofile we have.
+ * Write a tentative reply header.
*/
- if ((sdd->sdt_flags & SDDF_SUPPRESS_UID) == 0 &&
- sr->uid_user == NULL) {
- smb2sr_put_error(sr, NT_STATUS_USER_SESSION_DELETED);
- goto cmd_done;
+ sr->smb2_next_reply = 0;
+ ASSERT((sr->reply.chain_offset & 7) == 0);
+ sr->smb2_reply_hdr = sr->reply.chain_offset;
+ if ((smb2_encode_header(sr, B_FALSE)) != 0) {
+ cmn_err(CE_WARN, "clnt %s excessive reply",
+ session->ip_addr_str);
+ disconnect = B_TRUE;
+ goto cleanup;
}
- if ((sdd->sdt_flags & SDDF_SUPPRESS_TID) == 0 &&
- sr->tid_tree == NULL) {
- smb2sr_put_error(sr, NT_STATUS_NETWORK_NAME_DELETED);
- goto cmd_done;
+
+ /*
+ * Figure out the length of data...
+ */
+ if (sr->smb2_next_command != 0) {
+ /* [MS-SMB2] says this is 8-byte aligned */
+ msg_len = sr->smb2_next_command;
+ if ((msg_len & 7) != 0 || (msg_len < SMB2_HDR_SIZE) ||
+ ((sr->smb2_cmd_hdr + msg_len) > sr->command.max_bytes)) {
+ cmn_err(CE_WARN, "clnt %s bad SMB2 next cmd",
+ session->ip_addr_str);
+ disconnect = B_TRUE;
+ goto cleanup;
}
+ } else {
+ msg_len = sr->command.max_bytes - sr->smb2_cmd_hdr;
+ }
/*
- * Signature already verified
- * Credits handled...
+ * We just skip any data, so no shadow chain etc.
+ */
+ sr->command.chain_offset = sr->smb2_cmd_hdr + msg_len;
+ ASSERT(sr->command.chain_offset <= sr->command.max_bytes);
+
+ /*
+ * Validate the commmand code...
+ */
+ if (sr->smb2_cmd_code < SMB2_INVALID_CMD)
+ cmd_idx = sr->smb2_cmd_code;
+ else
+ cmd_idx = SMB2_INVALID_CMD;
+ sds = &session->s_server->sv_disp_stats2[cmd_idx];
+
+ /*
+ * Don't change (user, tree, file) because we want them
+ * exactly as they were when we entered. That also means
+ * we may not have the right user in sr->uid_user for
+ * signature checks, so leave that until smb2sr_work
+ * runs these commands "for real". Therefore, here
+ * we behave as if: (sr->uid_user == NULL)
+ */
+ sr->smb2_hdr_flags &= ~SMB2_FLAGS_SIGNED;
+
+ /*
+ * Credit adjustments (decrease)
*
- * Just call the async handler function.
+ * NOTE: interim responses are not signed.
+ * Any attacker can modify the credit grant
+ * in the response. Because of this property,
+ * it is no worse to assume the credit charge and grant
+ * are sane without verifying the signature,
+ * and that saves us a whole lot of work.
+ * If the credits WERE modified, we'll find out
+ * when we verify the signature later,
+ * which nullifies any changes caused here.
+ *
+ * Skip this on the first command, because the
+ * credit decrease was done by the caller.
*/
- rc = ar->ar_func(sr);
- if (rc != 0 && sr->smb2_status == 0)
- sr->smb2_status = NT_STATUS_INTERNAL_ERROR;
+ if (sr->smb2_cmd_hdr != saved_cmd_hdr) {
+ sr->smb2_credit_response = sr->smb2_credit_request;
+ if (sr->smb2_credit_request < sr->smb2_credit_charge) {
+ smb2_credit_decrease(sr);
+ }
+ }
-cmd_done:
/*
- * Pad the reply to align(8) if necessary.
+ * The real work: ... (would be here)
*/
- if (sr->reply.chain_offset & 7) {
- int padsz = 8 - (sr->reply.chain_offset & 7);
- (void) smb_mbc_encodef(&sr->reply, "#.", padsz);
+ smb2sr_put_error(sr, sr->smb2_status);
+
+ /*
+ * Credit adjustments (increase)
+ */
+ if (sr->smb2_credit_request > sr->smb2_credit_charge) {
+ smb2_credit_increase(sr);
}
- ASSERT((sr->reply.chain_offset & 7) == 0);
+ /* cmd_done: label */
+
/*
- * Record some statistics: (just tx bytes here)
+ * Pad the reply to align(8) if there will be another.
+ * This (interim) reply uses compounding.
*/
- atomic_add_64(&sds->sdt_txb,
- (int64_t)(sr->reply.chain_offset - sr->smb2_reply_hdr));
+ if (sr->smb2_next_command != 0)
+ (void) smb_mbc_put_align(&sr->reply, 8);
/*
- * Overwrite the SMB2 header for the response of
- * this command (possibly part of a compound).
- * The call adds: SMB2_FLAGS_SERVER_TO_REDIR
+ * Record some statistics. Uses:
+ * rxb = command.chain_offset - smb2_cmd_hdr;
+ * txb = reply.chain_offset - smb2_reply_hdr;
+ * which at this point represent the current cmd/reply.
+ *
+ * Note: We're doing smb_latency_add_sample() for all
+ * remaining commands NOW, which means we won't include
+ * the async part of their work in latency statistics.
+ * That's intentional, as the async part of a command
+ * would otherwise skew our latency statistics.
*/
- (void) smb2_encode_header(sr, B_TRUE);
+ smb2_record_stats(sr, sds, B_FALSE);
- if (sr->smb2_hdr_flags & SMB2_FLAGS_SIGNED)
- smb2_sign_reply(sr);
+ /*
+ * If there's a next command, figure out where it starts,
+ * and fill in the next header offset for the reply.
+ * Note: We sanity checked smb2_next_command above.
+ */
+ if (sr->smb2_next_command != 0) {
+ sr->command.chain_offset =
+ sr->smb2_cmd_hdr + sr->smb2_next_command;
+ sr->smb2_next_reply =
+ sr->reply.chain_offset - sr->smb2_reply_hdr;
+ } else {
+ ASSERT(sr->smb2_next_reply == 0);
+ }
+ /*
+ * Overwrite the (now final) SMB2 header for this response.
+ */
+ (void) smb2_encode_header(sr, B_TRUE);
+
+ /*
+ * Process whole compound before sending.
+ */
+ if (sr->smb2_next_command != 0)
+ goto cmd_start;
smb2_send_reply(sr);
+ ASSERT(!disconnect);
+
+cleanup:
/*
- * Done. Unlink and free.
+ * Restore caller's command processing state.
*/
- sr->sr_async_req = NULL;
- kmem_free(ar, sizeof (*ar));
+ sr->smb2_cmd_hdr = saved_cmd_hdr;
+ sr->command.chain_offset = saved_cmd_hdr;
+ (void) smb2_decode_header(sr);
+ sr->command.chain_offset = saved_com_offset;
- mutex_enter(&sr->sr_mutex);
- sr->sr_state = SMB_REQ_STATE_COMPLETED;
- mutex_exit(&sr->sr_mutex);
+ sr->smb2_credit_response = saved_cred_resp;
+ sr->smb2_hdr_flags = saved_hdr_flags;
+ sr->smb2_status = NT_STATUS_SUCCESS;
- smb_request_free(sr);
-}
+ /*
+ * In here, the "disconnect" flag just means we had an
+ * error decoding or encoding something. Rather than
+ * actually disconnect here, let's assume whatever
+ * problem we encountered will be seen by the caller
+ * as they continue processing the compound, and just
+ * restore everything and return an error.
+ */
+ if (disconnect) {
+ sr->smb2_async = B_FALSE;
+ sr->smb2_reply_hdr = saved_reply_hdr;
+ sr->reply.chain_offset = sr->smb2_reply_hdr;
+ (void) smb2_encode_header(sr, B_FALSE);
+ return (NT_STATUS_INVALID_PARAMETER);
+ }
-/*
- * In preparation for sending an "interim response", save
- * all the state we'll need to run an async command later,
- * and assign an "async id" for this (now async) command.
- * See [MS-SMB2] 3.3.4.2
- *
- * If more than one request in a compound request tries to
- * "go async", we can "say no". See [MS-SMB2] 3.3.4.2
- * If an operation would require asynchronous processing
- * but resources are constrained, the server MAY choose to
- * fail that operation with STATUS_INSUFFICIENT_RESOURCES.
- *
- * For simplicity, we further restrict the cases where we're
- * willing to "go async", and only allow the last command in a
- * compound to "go async". It happens that this is the only
- * case where we're actually asked to go async anyway. This
- * simplification also means there can be at most one command
- * in a compound that "goes async" (the last one).
- *
- * If we agree to "go async", this should return STATUS_PENDING.
- * Otherwise return STATUS_INSUFFICIENT_RESOURCES for this and
- * all requests following this request. (See the comments re.
- * "sticky" smb2_status values in smb2sr_work).
- *
- * Note: the Async ID we assign here is arbitrary, and need only
- * be unique among pending async responses on this connection, so
- * this just uses an object address as the Async ID.
- *
- * Also, the assigned worker is the ONLY thread using this
- * async request object (sr_async_req) so no locking.
+ /*
+ * The compound reply buffer we sent is now gone.
+ * Setup a new reply buffer for the caller.
*/
-uint32_t
-smb2sr_go_async(smb_request_t *sr,
- smb_sdrc_t (*async_func)(smb_request_t *))
+ sr->smb2_hdr_flags |= SMB2_FLAGS_ASYNC_COMMAND;
+ sr->smb2_async_id = SMB2_ASYNCID(sr);
+ sr->smb2_next_reply = 0;
+ MBC_FLUSH(&sr->reply);
+ ASSERT(sr->reply.max_bytes == sr->session->reply_max_bytes);
+ ASSERT(sr->reply.chain_offset == 0);
+ sr->smb2_reply_hdr = 0;
+ (void) smb2_encode_header(sr, B_FALSE);
+
+ return (NT_STATUS_SUCCESS);
+}
+
+int
+smb3_decode_tform_header(smb_request_t *sr)
{
- smb2_async_req_t *ar;
+ uint16_t flags;
+ int rc;
+ uint32_t protocolid;
- if (sr->smb2_next_command != 0)
- return (NT_STATUS_INSUFFICIENT_RESOURCES);
+ rc = smb_mbc_decodef(
+ &sr->command, "l16c16cl..wq",
+ &protocolid, /* l */
+ sr->smb2_sig, /* 16c */
+ sr->nonce, /* 16c */
+ &sr->msgsize, /* l */
+ /* reserved .. */
+ &flags, /* w */
+ &sr->smb3_tform_ssnid); /* q */
+ if (rc)
+ return (rc);
- ASSERT(sr->sr_async_req == NULL);
- ar = kmem_zalloc(sizeof (*ar), KM_SLEEP);
+ ASSERT3U(protocolid, ==, SMB3_ENCRYPTED_MAGIC);
+ if (flags != 1) {
+#ifdef DEBUG
+ cmn_err(CE_NOTE, "flags field not 1: %x", flags);
+#endif
+ return (-1);
+ }
+
/*
- * Place an interim response in the compound reply.
- *
- * Turn on the "async" flag for both the (synchronous)
- * interim response and the (later) async response,
- * by storing that in flags before coping into ar.
- *
- * The "related" flag should always be off for the
- * async part because we're no longer operating on a
- * sequence of commands when we execute that.
+ * MsgSize is the amount of data the client tell us to decrypt.
+ * Make sure this value is not too big and not too small.
*/
- sr->smb2_hdr_flags |= SMB2_FLAGS_ASYNC_COMMAND;
- sr->smb2_async_id = (uintptr_t)ar;
+ if (sr->msgsize < SMB2_HDR_SIZE ||
+ sr->msgsize > sr->session->cmd_max_bytes ||
+ sr->msgsize > sr->command.max_bytes - SMB3_TFORM_HDR_SIZE)
+ return (-1);
- ar->ar_func = async_func;
- ar->ar_cmd_hdr = sr->smb2_cmd_hdr;
- ar->ar_cmd_len = sr->smb_data.max_bytes - sr->smb2_cmd_hdr;
+ return (rc);
+}
- ar->ar_cmd_code = sr->smb2_cmd_code;
- ar->ar_hdr_flags = sr->smb2_hdr_flags &
- ~SMB2_FLAGS_RELATED_OPERATIONS;
- ar->ar_messageid = sr->smb2_messageid;
- ar->ar_pid = sr->smb_pid;
- ar->ar_tid = sr->smb_tid;
- ar->ar_uid = sr->smb_uid;
+int
+smb3_encode_tform_header(smb_request_t *sr, struct mbuf_chain *mbc)
+{
+ int rc;
- sr->sr_async_req = ar;
+ /* Signature and Nonce are added in smb3_encrypt_sr */
+ rc = smb_mbc_encodef(
+ mbc, "l32.lwwq",
+ SMB3_ENCRYPTED_MAGIC, /* l */
+ /* signature(16), nonce(16) 32. */
+ sr->msgsize, /* l */
+ 0, /* reserved w */
+ 1, /* flags w */
+ sr->smb3_tform_ssnid); /* q */
- /* Interim responses are NOT signed. */
- sr->smb2_hdr_flags &= ~SMB2_FLAGS_SIGNED;
-
- return (NT_STATUS_PENDING);
+ return (rc);
}
int
smb2_decode_header(smb_request_t *sr)
{
- uint64_t ssnid;
uint32_t pid, tid;
uint16_t hdr_len;
int rc;
rc = smb_mbc_decodef(
@@ -1005,24 +1409,25 @@
&sr->smb2_hdr_flags, /* l */
&sr->smb2_next_command, /* l */
&sr->smb2_messageid, /* q */
&pid, /* l */
&tid, /* l */
- &ssnid, /* q */
+ &sr->smb2_ssnid, /* q */
sr->smb2_sig); /* 16c */
if (rc)
return (rc);
if (hdr_len != SMB2_HDR_SIZE)
return (-1);
- sr->smb_uid = (uint16_t)ssnid; /* XXX wide UIDs */
-
if (sr->smb2_hdr_flags & SMB2_FLAGS_ASYNC_COMMAND) {
sr->smb2_async_id = pid |
((uint64_t)tid) << 32;
+ sr->smb_pid = 0;
+ sr->smb_tid = 0;
} else {
+ sr->smb2_async_id = 0;
sr->smb_pid = pid;
sr->smb_tid = (uint16_t)tid; /* XXX wide TIDs */
}
return (rc);
@@ -1029,22 +1434,19 @@
}
int
smb2_encode_header(smb_request_t *sr, boolean_t overwrite)
{
- uint64_t ssnid = sr->smb_uid;
uint64_t pid_tid_aid; /* pid+tid, or async id */
- uint32_t reply_hdr_flags;
int rc;
if (sr->smb2_hdr_flags & SMB2_FLAGS_ASYNC_COMMAND) {
pid_tid_aid = sr->smb2_async_id;
} else {
pid_tid_aid = sr->smb_pid |
((uint64_t)sr->smb_tid) << 32;
}
- reply_hdr_flags = sr->smb2_hdr_flags | SMB2_FLAGS_SERVER_TO_REDIR;
if (overwrite) {
rc = smb_mbc_poke(&sr->reply,
sr->smb2_reply_hdr,
"Nwwlwwllqqq16c",
@@ -1051,41 +1453,94 @@
SMB2_HDR_SIZE, /* w */
sr->smb2_credit_charge, /* w */
sr->smb2_status, /* l */
sr->smb2_cmd_code, /* w */
sr->smb2_credit_response, /* w */
- reply_hdr_flags, /* l */
+ sr->smb2_hdr_flags, /* l */
sr->smb2_next_reply, /* l */
sr->smb2_messageid, /* q */
pid_tid_aid, /* q */
- ssnid, /* q */
+ sr->smb2_ssnid, /* q */
sr->smb2_sig); /* 16c */
} else {
rc = smb_mbc_encodef(&sr->reply,
"Nwwlwwllqqq16c",
SMB2_HDR_SIZE, /* w */
sr->smb2_credit_charge, /* w */
sr->smb2_status, /* l */
sr->smb2_cmd_code, /* w */
sr->smb2_credit_response, /* w */
- reply_hdr_flags, /* l */
+ sr->smb2_hdr_flags, /* l */
sr->smb2_next_reply, /* l */
sr->smb2_messageid, /* q */
pid_tid_aid, /* q */
- ssnid, /* q */
+ sr->smb2_ssnid, /* q */
sr->smb2_sig); /* 16c */
}
return (rc);
}
void
smb2_send_reply(smb_request_t *sr)
{
+ struct mbuf_chain enc_reply;
+ smb_session_t *session = sr->session;
+ void *tmpbuf;
+ size_t buflen;
+ struct mbuf_chain tmp;
+ /*
+ * [MS-SMB2] 3.3.4.1.4 Encrypting the Message
+ *
+ * When the connection supports encryption and the dialect
+ * is 3.x, encrypt if:
+ * - The request was encrypted OR
+ * - The cmd is not SESSION_SETUP or NEGOTIATE AND
+ * -- Session.EncryptData is TRUE OR
+ * -- The cmd is not TREE_CONNECT AND
+ * --- Tree.EncryptData is TRUE
+ *
+ * This boils down to sr->tform_ssn != NULL, and the rest
+ * is enforced when tform_ssn is set.
+ */
+
+ if ((session->capabilities & SMB2_CAP_ENCRYPTION) == 0 ||
+ sr->tform_ssn == NULL) {
if (smb_session_send(sr->session, 0, &sr->reply) == 0)
sr->reply.chain = 0;
+ return;
+ }
+
+ sr->msgsize = sr->reply.chain_offset;
+ (void) MBC_SHADOW_CHAIN(&tmp, &sr->reply,
+ 0, sr->msgsize);
+
+ buflen = SMB3_TFORM_HDR_SIZE + sr->msgsize;
+
+ /* taken from smb_request_init_command_mbuf */
+ tmpbuf = kmem_alloc(buflen, KM_SLEEP);
+ MBC_ATTACH_BUF(&enc_reply, tmpbuf, buflen);
+ enc_reply.flags = 0;
+ enc_reply.shadow_of = NULL;
+
+ if (smb3_encode_tform_header(sr, &enc_reply) != 0) {
+ cmn_err(CE_WARN, "couldn't encode transform header");
+ goto errout;
+ }
+ if (smb3_encrypt_sr(sr, &tmp, &enc_reply) != 0) {
+ cmn_err(CE_WARN, "smb3 encryption failed");
+ goto errout;
+ }
+
+ if (smb_session_send(sr->session, 0, &enc_reply) == 0)
+ enc_reply.chain = 0;
+ return;
+
+errout:
+ kmem_free(tmpbuf, buflen);
+ smb_session_disconnect(sr->session);
}
/*
* This wrapper function exists to help catch calls to smbsr_status()
* (which is SMB1-specific) in common code. See smbsr_status().
@@ -1189,11 +1644,12 @@
*/
if (sr->fid_ofile == NULL) {
sr->smb_fid = (uint16_t)fid->temporal;
sr->fid_ofile = smb_ofile_lookup_by_fid(sr, sr->smb_fid);
}
- if (sr->fid_ofile == NULL)
+ if (sr->fid_ofile == NULL ||
+ sr->fid_ofile->f_persistid != fid->persistent)
return (NT_STATUS_FILE_CLOSED);
return (0);
}
@@ -1265,5 +1721,69 @@
sds[i].sdt_lat.ly_d_sum = 0;
mutex_exit(&sds[i].sdt_lat.ly_mutex);
}
}
}
+
+/*
+ * Append new_sr to the postwork queue. sr->smb2_cmd_code encodes
+ * the action that should be run by this sr.
+ *
+ * This queue is rarely used (and normally empty) so we're OK
+ * using a simple "walk to tail and insert" here.
+ */
+void
+smb2sr_append_postwork(smb_request_t *top_sr, smb_request_t *new_sr)
+{
+ smb_request_t *last_sr;
+
+ ASSERT(top_sr->session->dialect >= SMB_VERS_2_BASE);
+
+ last_sr = top_sr;
+ while (last_sr->sr_postwork != NULL)
+ last_sr = last_sr->sr_postwork;
+
+ last_sr->sr_postwork = new_sr;
+}
+
+/*
+ * Run any "post work" that was appended to the main SR while it
+ * was running. This is called after the request has been sent
+ * for the main SR, and used in cases i.e. the oplock code, where
+ * we need to send something to the client only _after_ the main
+ * sr request has gone out.
+ */
+static void
+smb2sr_run_postwork(smb_request_t *top_sr)
+{
+ smb_request_t *post_sr; /* the one we're running */
+ smb_request_t *next_sr;
+
+ while ((post_sr = top_sr->sr_postwork) != NULL) {
+ next_sr = post_sr->sr_postwork;
+ top_sr->sr_postwork = next_sr;
+ post_sr->sr_postwork = NULL;
+
+ post_sr->sr_worker = top_sr->sr_worker;
+ post_sr->sr_state = SMB_REQ_STATE_ACTIVE;
+
+ switch (post_sr->smb2_cmd_code) {
+ case SMB2_OPLOCK_BREAK:
+ smb_oplock_send_brk(post_sr);
+ break;
+ default:
+ ASSERT(0);
+ }
+
+ /*
+ * If we have a durable handle, and this operation
+ * updated the nvlist, write it out.
+ */
+ if (post_sr->dh_nvl_dirty) {
+ post_sr->dh_nvl_dirty = B_FALSE;
+ smb2_dh_update_nvfile(post_sr);
+ }
+
+ post_sr->sr_state = SMB_REQ_STATE_COMPLETED;
+ smb_request_free(post_sr);
+ }
+}