Print this page
NEX-5665 SMB2 oplock leases
Reviewed by: Matt Barden <matt.barden@nexenta.com>
Reviewed by: Evan Layton <evan.layton@nexenta.com>
Reviewed by: Roman Strashkin <roman.strashkin@nexenta.com>
NEX-5665 SMB2 oplock leases
Reviewed by: Matt Barden <matt.barden@nexenta.com>
Reviewed by: Evan Layton <evan.layton@nexenta.com>
Reviewed by: Roman Strashkin <roman.strashkin@nexenta.com>
NEX-1643 dtrace provider for smbsrv
Reviewed by: Evan Layton <evan.layton@nexenta.com>
Reviewed by: Matt Barden <matt.barden@nexenta.com>
NEX-4538 SMB1 create file should support extended_response format (2)
NEX-6116 Failures in smbtorture raw.open
Reviewed by: Evan Layton <evan.layton@nexenta.com>
Reviewed by: Kevin Crowe <kevin.crowe@nexenta.com>
Reviewed by: Matt Barden <matt.barden@nexenta.com>
Include this commit if upstreaming/backporting any of:
NEX-4540 SMB server declines EA support incorrectly
NEX-4239 smbtorture create failures re. allocation size
(illumos) 6398 SMB should support path names longer than 1024
NEX-4538 SMB1 create file should support extended_response format
Reviewed by: Matt Barden <Matt.Barden@nexenta.com>
Reviewed by: Bayard Bell <bayard.bell@nexenta.com>
SMB-11 SMB2 message parse & dispatch
SMB-12 SMB2 Negotiate Protocol
SMB-13 SMB2 Session Setup
SMB-14 SMB2 Logoff
SMB-15 SMB2 Tree Connect
SMB-16 SMB2 Tree Disconnect
SMB-17 SMB2 Create
SMB-18 SMB2 Close
SMB-19 SMB2 Flush
SMB-20 SMB2 Read
SMB-21 SMB2 Write
SMB-22 SMB2 Lock/Unlock
SMB-23 SMB2 Ioctl
SMB-24 SMB2 Cancel
SMB-25 SMB2 Echo
SMB-26 SMB2 Query Dir
SMB-27 SMB2 Change Notify
SMB-28 SMB2 Query Info
SMB-29 SMB2 Set Info
SMB-30 SMB2 Oplocks
SMB-53 SMB2 Create Context options
(SMB2 code review cleanup 1, 2, 3)
SMB-50 User-mode SMB server
 Includes work by these authors:
 Thomas Keiser <thomas.keiser@nexenta.com>
 Albert Lee <trisk@nexenta.com>
SMB-63 taskq_create_proc ... TQ_DYNAMIC puts tasks in p0
re #11974 CIFS Share - Tree connect fails from Windows 7 Clients
re #14152 Race between ipmi_submit_driver_request() and kcs_loop() (sync with illumos fix 3902)
SMB-46 File handle leaks exposed by mtime fixes (rm 7815)
re #7815 SMB server delivers old modification time...


   3  *
   4  * The contents of this file are subject to the terms of the
   5  * Common Development and Distribution License (the "License").
   6  * You may not use this file except in compliance with the License.
   7  *
   8  * You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE
   9  * or http://www.opensolaris.org/os/licensing.
  10  * See the License for the specific language governing permissions
  11  * and limitations under the License.
  12  *
  13  * When distributing Covered Code, include this CDDL HEADER in each
  14  * file and include the License file at usr/src/OPENSOLARIS.LICENSE.
  15  * If applicable, add the following below this CDDL HEADER, with the
  16  * fields enclosed by brackets "[]" replaced with your own identifying
  17  * information: Portions Copyright [yyyy] [name of copyright owner]
  18  *
  19  * CDDL HEADER END
  20  */
  21 /*
  22  * Copyright (c) 2007, 2010, Oracle and/or its affiliates. All rights reserved.
  23  * Copyright 2013 Nexenta Systems, Inc.  All rights reserved.
  24  */
  25 
  26 /*
  27  * This command is used to create or open a file or directory, when EAs
  28  * or an SD must be applied to the file. The functionality is similar
  29  * to SmbNtCreateAndx with the option to supply extended attributes or
  30  * a security descriptor.
  31  *
  32  * Note: we don't decode the extended attributes because we don't
  33  * support them at this time.
  34  */
  35 
  36 #include <smbsrv/smb_kproto.h>
  37 #include <smbsrv/smb_fsops.h>
  38 


  39 /*
  40  * smb_nt_transact_create
  41  *
  42  * This command is used to create or open a file or directory, when EAs
  43  * or an SD must be applied to the file. The request parameter block
  44  * encoding, data block encoding and output parameter block encoding are
  45  * described in CIFS section 4.2.2.
  46  *
  47  * The format of the command is SmbNtTransact but it is basically the same
  48  * as SmbNtCreateAndx with the option to supply extended attributes or a
  49  * security descriptor. For information not defined in CIFS section 4.2.2
  50  * see section 4.2.1 (NT_CREATE_ANDX).
  51  */
  52 smb_sdrc_t
  53 smb_pre_nt_transact_create(smb_request_t *sr, smb_xa_t *xa)
  54 {
  55         struct open_param *op = &sr->arg.open;
  56         uint8_t SecurityFlags;
  57         uint32_t EaLength;
  58         uint32_t ImpersonationLevel;


  66 
  67         rc = smb_mbc_decodef(&xa->req_param_mb, "%lllqllllllllb",
  68             sr,
  69             &op->nt_flags,
  70             &op->rootdirfid,
  71             &op->desired_access,
  72             &op->dsize,
  73             &op->dattr,
  74             &op->share_access,
  75             &op->create_disposition,
  76             &op->create_options,
  77             &sd_len,
  78             &EaLength,
  79             &NameLength,
  80             &ImpersonationLevel,
  81             &SecurityFlags);
  82 
  83         if (rc == 0) {
  84                 if (NameLength == 0) {
  85                         op->fqi.fq_path.pn_path = "\\";
  86                 } else if (NameLength >= MAXPATHLEN) {
  87                         smbsr_error(sr, NT_STATUS_OBJECT_PATH_NOT_FOUND,
  88                             ERRDOS, ERROR_PATH_NOT_FOUND);
  89                         rc = -1;
  90                 } else {
  91                         rc = smb_mbc_decodef(&xa->req_param_mb, "%#u",
  92                             sr, NameLength, &op->fqi.fq_path.pn_path);
  93                 }
  94         }
  95 
  96         op->op_oplock_level = SMB_OPLOCK_NONE;
  97         if (op->nt_flags & NT_CREATE_FLAG_REQUEST_OPLOCK) {
  98                 if (op->nt_flags & NT_CREATE_FLAG_REQUEST_OPBATCH)
  99                         op->op_oplock_level = SMB_OPLOCK_BATCH;
 100                 else
 101                         op->op_oplock_level = SMB_OPLOCK_EXCLUSIVE;
 102         }
 103 
 104         if (sd_len) {
 105                 status = smb_decode_sd(&xa->req_data_mb, &sd);
 106                 if (status != NT_STATUS_SUCCESS) {
 107                         smbsr_error(sr, status, 0, 0);
 108                         return (SDRC_ERROR);
 109                 }
 110                 op->sd = kmem_alloc(sizeof (smb_sd_t), KM_SLEEP);
 111                 *op->sd = sd;
 112         } else {
 113                 op->sd = NULL;
 114         }
 115 
 116         DTRACE_SMB_2(op__NtTransactCreate__start, smb_request_t *, sr,
 117             struct open_param *, op);
 118 
 119         return ((rc == 0) ? SDRC_SUCCESS : SDRC_ERROR);
 120 }
 121 
 122 void
 123 smb_post_nt_transact_create(smb_request_t *sr, smb_xa_t *xa)
 124 {
 125         smb_sd_t *sd = sr->arg.open.sd;

 126 
 127         DTRACE_SMB_2(op__NtTransactCreate__done, smb_request_t *, sr,
 128             smb_xa_t *, xa);
 129 
 130         if (sd) {
 131                 smb_sd_term(sd);
 132                 kmem_free(sd, sizeof (smb_sd_t));
 133         }
 134 
 135         if (sr->arg.open.dir != NULL)
 136                 smb_ofile_release(sr->arg.open.dir);


 137 }
 138 



 139 smb_sdrc_t
 140 smb_nt_transact_create(smb_request_t *sr, smb_xa_t *xa)
 141 {
 142         struct open_param *op = &sr->arg.open;
 143         uint8_t                 DirFlag;
 144         smb_attr_t              attr;
 145         smb_ofile_t             *of;
 146         uint32_t                status;
 147         int                     rc;


 148 












 149         if ((op->create_options & FILE_DELETE_ON_CLOSE) &&
 150             !(op->desired_access & DELETE)) {
 151                 smbsr_error(sr, NT_STATUS_INVALID_PARAMETER,
 152                     ERRDOS, ERRbadaccess);
 153                 return (SDRC_ERROR);
 154         }
 155 
 156         if (op->create_disposition > FILE_MAXIMUM_DISPOSITION) {
 157                 smbsr_error(sr, NT_STATUS_INVALID_PARAMETER,
 158                     ERRDOS, ERRbadaccess);
 159                 return (SDRC_ERROR);
 160         }
 161 
 162         if (op->dattr & FILE_FLAG_WRITE_THROUGH)
 163                 op->create_options |= FILE_WRITE_THROUGH;
 164 
 165         if (op->dattr & FILE_FLAG_DELETE_ON_CLOSE)
 166                 op->create_options |= FILE_DELETE_ON_CLOSE;
 167 
 168         if (op->dattr & FILE_FLAG_BACKUP_SEMANTICS)
 169                 op->create_options |= FILE_OPEN_FOR_BACKUP_INTENT;
 170 
 171         if (op->create_options & FILE_OPEN_FOR_BACKUP_INTENT)
 172                 sr->user_cr = smb_user_getprivcred(sr->uid_user);
 173 
 174         if (op->rootdirfid == 0) {
 175                 op->fqi.fq_dnode = sr->tid_tree->t_snode;
 176         } else {
 177                 op->dir = smb_ofile_lookup_by_fid(sr, (uint16_t)op->rootdirfid);
 178                 if (op->dir == NULL) {
 179                         smbsr_error(sr, NT_STATUS_INVALID_HANDLE,
 180                             ERRDOS, ERRbadfid);
 181                         return (SDRC_ERROR);
 182                 }
 183                 op->fqi.fq_dnode = op->dir->f_node;
 184         }
 185 
 186         op->op_oplock_levelII = B_TRUE;
 187 
 188         status = smb_common_open(sr);
 189         if (status != NT_STATUS_SUCCESS) {
 190                 smbsr_status(sr, status, 0, 0);
 191                 return (SDRC_ERROR);
 192         }




 193 
 194         /*
 195          * NB: after the above smb_common_open() success,
 196          * we have a handle allocated (sr->fid_ofile).
 197          * If we don't return success, we must close it.
 198          */
 199         of = sr->fid_ofile;
 200 
 201         switch (sr->tid_tree->t_res_type & STYPE_MASK) {
 202         case STYPE_DISKTREE:
 203         case STYPE_PRINTQ:
 204                 if (op->create_options & FILE_DELETE_ON_CLOSE)
 205                         smb_ofile_set_delete_on_close(of);
 206 
 207                 DirFlag = smb_node_is_dir(of->f_node) ? 1 : 0;
 208                 bzero(&attr, sizeof (attr));
 209                 attr.sa_mask = SMB_AT_ALL;
 210                 rc = smb_node_getattr(sr, of->f_node, of->f_cr, of, &attr);
 211                 if (rc != 0) {
 212                         smbsr_errno(sr, rc);
 213                         goto errout;
 214                 }
 215 
 216                 rc = smb_mbc_encodef(&xa->rep_param_mb, "b.wllTTTTlqqwwb",
 217                     op->op_oplock_level,
 218                     sr->smb_fid,
 219                     op->action_taken,
 220                     0,  /* EaErrorOffset */
 221                     &attr.sa_crtime,
 222                     &attr.sa_vattr.va_atime,
 223                     &attr.sa_vattr.va_mtime,
 224                     &attr.sa_vattr.va_ctime,
 225                     op->dattr & FILE_ATTRIBUTE_MASK,
 226                     attr.sa_allocsz,
 227                     attr.sa_vattr.va_size,
 228                     op->ftype,
 229                     op->devstate,
 230                     DirFlag);
 231                 break;
 232 
 233         case STYPE_IPC:
 234                 bzero(&attr, sizeof (smb_attr_t));
 235                 rc = smb_mbc_encodef(&xa->rep_param_mb, "b.wllTTTTlqqwwb",
 236                     0,
 237                     sr->smb_fid,
 238                     op->action_taken,
 239                     0,  /* EaErrorOffset */
 240                     &attr.sa_crtime,
 241                     &attr.sa_vattr.va_atime,
 242                     &attr.sa_vattr.va_mtime,
 243                     &attr.sa_vattr.va_ctime,
 244                     op->dattr,
 245                     0x1000LL,
 246                     0LL,
 247                     op->ftype,
 248                     op->devstate,
 249                     0);
 250                 break;
 251 
 252         default:
 253                 smbsr_error(sr, NT_STATUS_INVALID_DEVICE_REQUEST,
 254                     ERRDOS, ERROR_INVALID_FUNCTION);
 255                 goto errout;
 256         }



















































 257         return (SDRC_SUCCESS);
 258 
 259 errout:
 260         smb_ofile_close(of, 0);
 261         return (SDRC_ERROR);
 262 }


   3  *
   4  * The contents of this file are subject to the terms of the
   5  * Common Development and Distribution License (the "License").
   6  * You may not use this file except in compliance with the License.
   7  *
   8  * You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE
   9  * or http://www.opensolaris.org/os/licensing.
  10  * See the License for the specific language governing permissions
  11  * and limitations under the License.
  12  *
  13  * When distributing Covered Code, include this CDDL HEADER in each
  14  * file and include the License file at usr/src/OPENSOLARIS.LICENSE.
  15  * If applicable, add the following below this CDDL HEADER, with the
  16  * fields enclosed by brackets "[]" replaced with your own identifying
  17  * information: Portions Copyright [yyyy] [name of copyright owner]
  18  *
  19  * CDDL HEADER END
  20  */
  21 /*
  22  * Copyright (c) 2007, 2010, Oracle and/or its affiliates. All rights reserved.
  23  * Copyright 2017 Nexenta Systems, Inc.  All rights reserved.
  24  */
  25 
  26 /*
  27  * This command is used to create or open a file or directory, when EAs
  28  * or an SD must be applied to the file. The functionality is similar
  29  * to SmbNtCreateAndx with the option to supply extended attributes or
  30  * a security descriptor.
  31  *
  32  * Note: we don't decode the extended attributes because we don't
  33  * support them at this time.
  34  */
  35 
  36 #include <smbsrv/smb_kproto.h>
  37 #include <smbsrv/smb_fsops.h>
  38 
  39 extern int smb_nt_create_enable_extended_response;
  40 
  41 /*
  42  * smb_nt_transact_create
  43  *
  44  * This command is used to create or open a file or directory, when EAs
  45  * or an SD must be applied to the file. The request parameter block
  46  * encoding, data block encoding and output parameter block encoding are
  47  * described in CIFS section 4.2.2.
  48  *
  49  * The format of the command is SmbNtTransact but it is basically the same
  50  * as SmbNtCreateAndx with the option to supply extended attributes or a
  51  * security descriptor. For information not defined in CIFS section 4.2.2
  52  * see section 4.2.1 (NT_CREATE_ANDX).
  53  */
  54 smb_sdrc_t
  55 smb_pre_nt_transact_create(smb_request_t *sr, smb_xa_t *xa)
  56 {
  57         struct open_param *op = &sr->arg.open;
  58         uint8_t SecurityFlags;
  59         uint32_t EaLength;
  60         uint32_t ImpersonationLevel;


  68 
  69         rc = smb_mbc_decodef(&xa->req_param_mb, "%lllqllllllllb",
  70             sr,
  71             &op->nt_flags,
  72             &op->rootdirfid,
  73             &op->desired_access,
  74             &op->dsize,
  75             &op->dattr,
  76             &op->share_access,
  77             &op->create_disposition,
  78             &op->create_options,
  79             &sd_len,
  80             &EaLength,
  81             &NameLength,
  82             &ImpersonationLevel,
  83             &SecurityFlags);
  84 
  85         if (rc == 0) {
  86                 if (NameLength == 0) {
  87                         op->fqi.fq_path.pn_path = "\\";
  88                 } else if (NameLength >= SMB_MAXPATHLEN) {
  89                         smbsr_error(sr, NT_STATUS_OBJECT_NAME_INVALID,
  90                             ERRDOS, ERROR_INVALID_NAME);
  91                         rc = -1;
  92                 } else {
  93                         rc = smb_mbc_decodef(&xa->req_param_mb, "%#u",
  94                             sr, NameLength, &op->fqi.fq_path.pn_path);
  95                 }
  96         }
  97 
  98         op->op_oplock_level = SMB_OPLOCK_NONE;
  99         if (op->nt_flags & NT_CREATE_FLAG_REQUEST_OPLOCK) {
 100                 if (op->nt_flags & NT_CREATE_FLAG_REQUEST_OPBATCH)
 101                         op->op_oplock_level = SMB_OPLOCK_BATCH;
 102                 else
 103                         op->op_oplock_level = SMB_OPLOCK_EXCLUSIVE;
 104         }
 105 
 106         if (sd_len) {
 107                 status = smb_decode_sd(&xa->req_data_mb, &sd);
 108                 if (status != NT_STATUS_SUCCESS) {
 109                         smbsr_error(sr, status, 0, 0);
 110                         return (SDRC_ERROR);
 111                 }
 112                 op->sd = kmem_alloc(sizeof (smb_sd_t), KM_SLEEP);
 113                 *op->sd = sd;
 114         } else {
 115                 op->sd = NULL;
 116         }
 117 
 118         DTRACE_SMB_START(op__NtTransactCreate, smb_request_t *, sr);

 119 
 120         return ((rc == 0) ? SDRC_SUCCESS : SDRC_ERROR);
 121 }
 122 
 123 void
 124 smb_post_nt_transact_create(smb_request_t *sr, smb_xa_t *xa)
 125 {
 126         smb_sd_t *sd = sr->arg.open.sd;
 127         _NOTE(ARGUNUSED(xa))
 128 
 129         DTRACE_SMB_DONE(op__NtTransactCreate, smb_request_t *, sr);

 130 
 131         if (sd) {
 132                 smb_sd_term(sd);
 133                 kmem_free(sd, sizeof (smb_sd_t));
 134         }
 135 
 136         if (sr->arg.open.dir != NULL) {
 137                 smb_ofile_release(sr->arg.open.dir);
 138                 sr->arg.open.dir = NULL;
 139         }
 140 }
 141 
 142 /*
 143  * A lot like smb_com_nt_create_andx
 144  */
 145 smb_sdrc_t
 146 smb_nt_transact_create(smb_request_t *sr, smb_xa_t *xa)
 147 {
 148         struct open_param       *op = &sr->arg.open;
 149         smb_attr_t              *ap = &op->fqi.fq_fattr;

 150         smb_ofile_t             *of;

 151         int                     rc;
 152         uint8_t                 DirFlag;
 153         uint32_t                status;
 154 
 155         if (op->create_options & ~SMB_NTCREATE_VALID_OPTIONS) {
 156                 smbsr_error(sr, NT_STATUS_INVALID_PARAMETER,
 157                     ERRDOS, ERROR_INVALID_PARAMETER);
 158                 return (SDRC_ERROR);
 159         }
 160 
 161         if (op->create_options & FILE_OPEN_BY_FILE_ID) {
 162                 smbsr_error(sr, NT_STATUS_NOT_SUPPORTED,
 163                     ERRDOS, ERROR_NOT_SUPPORTED);
 164                 return (SDRC_ERROR);
 165         }
 166 
 167         if ((op->create_options & FILE_DELETE_ON_CLOSE) &&
 168             !(op->desired_access & DELETE)) {
 169                 smbsr_error(sr, NT_STATUS_INVALID_PARAMETER,
 170                     ERRDOS, ERRbadaccess);
 171                 return (SDRC_ERROR);
 172         }
 173 
 174         if (op->create_disposition > FILE_MAXIMUM_DISPOSITION) {
 175                 smbsr_error(sr, NT_STATUS_INVALID_PARAMETER,
 176                     ERRDOS, ERRbadaccess);
 177                 return (SDRC_ERROR);
 178         }
 179 
 180         if (op->dattr & FILE_FLAG_WRITE_THROUGH)
 181                 op->create_options |= FILE_WRITE_THROUGH;
 182 
 183         if (op->dattr & FILE_FLAG_DELETE_ON_CLOSE)
 184                 op->create_options |= FILE_DELETE_ON_CLOSE;
 185 
 186         if (op->dattr & FILE_FLAG_BACKUP_SEMANTICS)
 187                 op->create_options |= FILE_OPEN_FOR_BACKUP_INTENT;
 188 
 189         if (op->create_options & FILE_OPEN_FOR_BACKUP_INTENT)
 190                 sr->user_cr = smb_user_getprivcred(sr->uid_user);
 191 
 192         if (op->rootdirfid == 0) {
 193                 op->fqi.fq_dnode = sr->tid_tree->t_snode;
 194         } else {
 195                 op->dir = smb_ofile_lookup_by_fid(sr, (uint16_t)op->rootdirfid);
 196                 if (op->dir == NULL) {
 197                         smbsr_error(sr, NT_STATUS_INVALID_HANDLE,
 198                             ERRDOS, ERRbadfid);
 199                         return (SDRC_ERROR);
 200                 }
 201                 op->fqi.fq_dnode = op->dir->f_node;
 202         }
 203 


 204         status = smb_common_open(sr);
 205         if (status != NT_STATUS_SUCCESS) {
 206                 smbsr_status(sr, status, 0, 0);
 207                 return (SDRC_ERROR);
 208         }
 209         if (op->op_oplock_level != SMB_OPLOCK_NONE) {
 210                 /* Oplock req. in op->op_oplock_level etc. */
 211                 smb1_oplock_acquire(sr, B_TRUE);
 212         }
 213 
 214         /*
 215          * NB: after the above smb_common_open() success,
 216          * we have a handle allocated (sr->fid_ofile).
 217          * If we don't return success, we must close it.
 218          */
 219         of = sr->fid_ofile;
 220 
 221         switch (sr->tid_tree->t_res_type & STYPE_MASK) {
 222         case STYPE_DISKTREE:
 223         case STYPE_PRINTQ:
 224                 if (op->create_options & FILE_DELETE_ON_CLOSE)
 225                         smb_ofile_set_delete_on_close(sr, of);

 226                 DirFlag = smb_node_is_dir(of->f_node) ? 1 : 0;























 227                 break;
 228 
 229         case STYPE_IPC:
 230                 DirFlag = 0;















 231                 break;
 232 
 233         default:
 234                 smbsr_error(sr, NT_STATUS_INVALID_DEVICE_REQUEST,
 235                     ERRDOS, ERROR_INVALID_FUNCTION);
 236                 goto errout;
 237         }
 238 
 239         if ((op->nt_flags & NT_CREATE_FLAG_EXTENDED_RESPONSE) != 0 &&
 240             smb_nt_create_enable_extended_response != 0) {
 241                 uint32_t MaxAccess = 0;
 242                 if (of->f_node != NULL) {
 243                         smb_fsop_eaccess(sr, of->f_cr, of->f_node, &MaxAccess);
 244                 }
 245                 MaxAccess |= of->f_granted_access;
 246 
 247                 rc = smb_mbc_encodef(
 248                     &xa->rep_param_mb, "bbwllTTTTlqqwwb16.qll",
 249                     op->op_oplock_level,     /* (b) */
 250                     1,          /* ResponseType    (b) */
 251                     sr->smb_fid,             /* (w) */
 252                     op->action_taken,                /* (l) */
 253                     0,          /* EaErrorOffset   (l) */
 254                     &ap->sa_crtime,              /* (T) */
 255                     &ap->sa_vattr.va_atime,      /* (T) */
 256                     &ap->sa_vattr.va_mtime,      /* (T) */
 257                     &ap->sa_vattr.va_ctime,      /* (T) */
 258                     op->dattr & FILE_ATTRIBUTE_MASK, /* (l) */
 259                     ap->sa_allocsz,          /* (q) */
 260                     ap->sa_vattr.va_size,    /* (q) */
 261                     op->ftype,                       /* (w) */
 262                     op->devstate,            /* (w) */
 263                     DirFlag,                    /* (b) */
 264                     /* volume guid                (16.) */
 265                     op->fileid,                      /* (q) */
 266                     MaxAccess,                  /* (l) */
 267                     0);         /* guest access    (l) */
 268         } else {
 269                 rc = smb_mbc_encodef(
 270                     &xa->rep_param_mb, "bbwllTTTTlqqwwb",
 271                     op->op_oplock_level,     /* (b) */
 272                     0,          /* ResponseType    (b) */
 273                     sr->smb_fid,             /* (w) */
 274                     op->action_taken,                /* (l) */
 275                     0,          /* EaErrorOffset   (l) */
 276                     &ap->sa_crtime,              /* (T) */
 277                     &ap->sa_vattr.va_atime,      /* (T) */
 278                     &ap->sa_vattr.va_mtime,      /* (T) */
 279                     &ap->sa_vattr.va_ctime,      /* (T) */
 280                     op->dattr & FILE_ATTRIBUTE_MASK, /* (l) */
 281                     ap->sa_allocsz,          /* (q) */
 282                     ap->sa_vattr.va_size,    /* (q) */
 283                     op->ftype,                       /* (w) */
 284                     op->devstate,            /* (w) */
 285                     DirFlag);                   /* (b) */
 286         }
 287 
 288         if (rc == 0)
 289                 return (SDRC_SUCCESS);
 290 
 291 errout:
 292         smb_ofile_close(of, 0);
 293         return (SDRC_ERROR);
 294 }