2021-06-18 13:31:49 +08:00
|
|
|
// SPDX-License-Identifier: LGPL-2.1
|
2011-12-27 20:12:43 +08:00
|
|
|
/*
|
|
|
|
*
|
2013-06-24 07:43:37 +08:00
|
|
|
* Copyright (C) International Business Machines Corp., 2009, 2013
|
2011-12-27 20:12:43 +08:00
|
|
|
* Etersoft, 2012
|
|
|
|
* Author(s): Steve French (sfrench@us.ibm.com)
|
|
|
|
* Pavel Shilovsky (pshilovsky@samba.org) 2012
|
|
|
|
*
|
|
|
|
* Contains the routines for constructing the SMB2 PDUs themselves
|
|
|
|
*
|
|
|
|
*/
|
|
|
|
|
|
|
|
/* SMB2 PDU handling routines here - except for leftovers (eg session setup) */
|
|
|
|
/* Note that there are handle based routines which must be */
|
|
|
|
/* treated slightly differently for reconnection purposes since we never */
|
|
|
|
/* want to reuse a stale file handle and only the caller knows the file info */
|
|
|
|
|
|
|
|
#include <linux/fs.h>
|
|
|
|
#include <linux/kernel.h>
|
|
|
|
#include <linux/vfs.h>
|
2012-09-19 07:20:29 +08:00
|
|
|
#include <linux/task_io_accounting_ops.h>
|
2011-12-27 20:12:43 +08:00
|
|
|
#include <linux/uaccess.h>
|
2017-03-29 05:45:06 +08:00
|
|
|
#include <linux/uuid.h>
|
2012-09-19 07:20:29 +08:00
|
|
|
#include <linux/pagemap.h>
|
2011-12-27 20:12:43 +08:00
|
|
|
#include <linux/xattr.h>
|
|
|
|
#include "cifsglob.h"
|
|
|
|
#include "cifsacl.h"
|
|
|
|
#include "cifsproto.h"
|
|
|
|
#include "smb2proto.h"
|
|
|
|
#include "cifs_unicode.h"
|
|
|
|
#include "cifs_debug.h"
|
|
|
|
#include "ntlmssp.h"
|
|
|
|
#include "smb2status.h"
|
2012-09-19 07:20:29 +08:00
|
|
|
#include "smb2glob.h"
|
2012-09-19 07:20:33 +08:00
|
|
|
#include "cifspdu.h"
|
2015-09-24 13:52:37 +08:00
|
|
|
#include "cifs_spnego.h"
|
2017-11-23 08:38:45 +08:00
|
|
|
#include "smbdirect.h"
|
2018-05-18 10:16:55 +08:00
|
|
|
#include "trace.h"
|
2018-11-15 03:20:31 +08:00
|
|
|
#ifdef CONFIG_CIFS_DFS_UPCALL
|
|
|
|
#include "dfs_cache.h"
|
|
|
|
#endif
|
2011-12-27 20:12:43 +08:00
|
|
|
|
|
|
|
/*
|
|
|
|
* The following table defines the expected "StructureSize" of SMB2 requests
|
|
|
|
* in order by SMB2 command. This is similar to "wct" in SMB/CIFS requests.
|
|
|
|
*
|
|
|
|
* Note that commands are defined in smb2pdu.h in le16 but the array below is
|
|
|
|
* indexed by command in host byte order.
|
|
|
|
*/
|
|
|
|
static const int smb2_req_struct_sizes[NUMBER_OF_SMB2_COMMANDS] = {
|
|
|
|
/* SMB2_NEGOTIATE */ 36,
|
|
|
|
/* SMB2_SESSION_SETUP */ 25,
|
|
|
|
/* SMB2_LOGOFF */ 4,
|
|
|
|
/* SMB2_TREE_CONNECT */ 9,
|
|
|
|
/* SMB2_TREE_DISCONNECT */ 4,
|
|
|
|
/* SMB2_CREATE */ 57,
|
|
|
|
/* SMB2_CLOSE */ 24,
|
|
|
|
/* SMB2_FLUSH */ 24,
|
|
|
|
/* SMB2_READ */ 49,
|
|
|
|
/* SMB2_WRITE */ 49,
|
|
|
|
/* SMB2_LOCK */ 48,
|
|
|
|
/* SMB2_IOCTL */ 57,
|
|
|
|
/* SMB2_CANCEL */ 4,
|
|
|
|
/* SMB2_ECHO */ 4,
|
|
|
|
/* SMB2_QUERY_DIRECTORY */ 33,
|
|
|
|
/* SMB2_CHANGE_NOTIFY */ 32,
|
|
|
|
/* SMB2_QUERY_INFO */ 41,
|
|
|
|
/* SMB2_SET_INFO */ 33,
|
|
|
|
/* SMB2_OPLOCK_BREAK */ 24 /* BB this is 36 for LEASE_BREAK variant */
|
|
|
|
};
|
|
|
|
|
2018-08-08 13:07:49 +08:00
|
|
|
int smb3_encryption_required(const struct cifs_tcon *tcon)
|
2016-11-01 04:49:30 +08:00
|
|
|
{
|
2020-06-01 03:36:56 +08:00
|
|
|
if (!tcon || !tcon->ses)
|
2016-11-18 05:59:23 +08:00
|
|
|
return 0;
|
2016-11-01 04:49:30 +08:00
|
|
|
if ((tcon->ses->session_flags & SMB2_SESSION_FLAG_ENCRYPT_DATA) ||
|
|
|
|
(tcon->share_flags & SHI1005_FLAGS_ENCRYPT_DATA))
|
|
|
|
return 1;
|
2016-11-18 05:59:23 +08:00
|
|
|
if (tcon->seal &&
|
|
|
|
(tcon->ses->server->capabilities & SMB2_GLOBAL_CAP_ENCRYPTION))
|
|
|
|
return 1;
|
2016-11-01 04:49:30 +08:00
|
|
|
return 0;
|
|
|
|
}
|
2011-12-27 20:12:43 +08:00
|
|
|
|
|
|
|
static void
|
2021-11-05 07:39:01 +08:00
|
|
|
smb2_hdr_assemble(struct smb2_hdr *shdr, __le16 smb2_cmd,
|
2020-06-01 01:38:22 +08:00
|
|
|
const struct cifs_tcon *tcon,
|
|
|
|
struct TCP_Server_Info *server)
|
2011-12-27 20:12:43 +08:00
|
|
|
{
|
2016-10-25 06:33:04 +08:00
|
|
|
shdr->ProtocolId = SMB2_PROTO_NUMBER;
|
|
|
|
shdr->StructureSize = cpu_to_le16(64);
|
|
|
|
shdr->Command = smb2_cmd;
|
2020-06-01 01:38:22 +08:00
|
|
|
if (server) {
|
2016-09-20 20:37:13 +08:00
|
|
|
spin_lock(&server->req_lock);
|
2019-03-06 11:04:56 +08:00
|
|
|
/* Request up to 10 credits but don't go over the limit. */
|
2016-09-23 13:44:16 +08:00
|
|
|
if (server->credits >= server->max_credits)
|
2016-10-25 06:33:04 +08:00
|
|
|
shdr->CreditRequest = cpu_to_le16(0);
|
2016-09-20 20:37:13 +08:00
|
|
|
else
|
2016-10-25 06:33:04 +08:00
|
|
|
shdr->CreditRequest = cpu_to_le16(
|
2016-09-23 13:44:16 +08:00
|
|
|
min_t(int, server->max_credits -
|
2019-03-06 11:04:56 +08:00
|
|
|
server->credits, 10));
|
2016-09-20 20:37:13 +08:00
|
|
|
spin_unlock(&server->req_lock);
|
|
|
|
} else {
|
2016-10-25 06:33:04 +08:00
|
|
|
shdr->CreditRequest = cpu_to_le16(2);
|
2016-09-20 20:37:13 +08:00
|
|
|
}
|
2021-11-05 07:39:01 +08:00
|
|
|
shdr->Id.SyncId.ProcessId = cpu_to_le32((__u16)current->tgid);
|
2011-12-27 20:12:43 +08:00
|
|
|
|
|
|
|
if (!tcon)
|
|
|
|
goto out;
|
|
|
|
|
2013-06-24 07:43:37 +08:00
|
|
|
/* GLOBAL_CAP_LARGE_MTU will only be set if dialect > SMB2.02 */
|
|
|
|
/* See sections 2.2.4 and 3.2.4.1.5 of MS-SMB2 */
|
2020-06-01 01:38:22 +08:00
|
|
|
if (server && (server->capabilities & SMB2_GLOBAL_CAP_LARGE_MTU))
|
2016-10-25 06:33:04 +08:00
|
|
|
shdr->CreditCharge = cpu_to_le16(1);
|
2013-06-24 07:43:37 +08:00
|
|
|
/* else CreditCharge MBZ */
|
|
|
|
|
2021-11-05 07:39:01 +08:00
|
|
|
shdr->Id.SyncId.TreeId = cpu_to_le32(tcon->tid);
|
2011-12-27 20:12:43 +08:00
|
|
|
/* Uid is not converted */
|
|
|
|
if (tcon->ses)
|
2021-11-05 07:39:01 +08:00
|
|
|
shdr->SessionId = cpu_to_le64(tcon->ses->Suid);
|
2013-06-27 08:14:55 +08:00
|
|
|
|
|
|
|
/*
|
|
|
|
* If we would set SMB2_FLAGS_DFS_OPERATIONS on open we also would have
|
|
|
|
* to pass the path on the Open SMB prefixed by \\server\share.
|
|
|
|
* Not sure when we would need to do the augmented path (if ever) and
|
|
|
|
* setting this flag breaks the SMB2 open operation since it is
|
|
|
|
* illegal to send an empty path name (without \\server\share prefix)
|
|
|
|
* when the DFS flag is set in the SMB open header. We could
|
|
|
|
* consider setting the flag on all operations other than open
|
|
|
|
* but it is safer to net set it for now.
|
|
|
|
*/
|
|
|
|
/* if (tcon->share_flags & SHI1005_FLAGS_DFS)
|
2016-10-25 06:33:04 +08:00
|
|
|
shdr->Flags |= SMB2_FLAGS_DFS_OPERATIONS; */
|
2013-06-27 08:14:55 +08:00
|
|
|
|
2020-06-01 01:38:22 +08:00
|
|
|
if (server && server->sign && !smb3_encryption_required(tcon))
|
2016-10-25 06:33:04 +08:00
|
|
|
shdr->Flags |= SMB2_FLAGS_SIGNED;
|
2011-12-27 20:12:43 +08:00
|
|
|
out:
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int
|
2020-06-01 01:38:22 +08:00
|
|
|
smb2_reconnect(__le16 smb2_command, struct cifs_tcon *tcon,
|
|
|
|
struct TCP_Server_Info *server)
|
2011-12-27 20:12:43 +08:00
|
|
|
{
|
2021-11-23 08:31:03 +08:00
|
|
|
int rc = 0;
|
2011-12-27 20:23:34 +08:00
|
|
|
struct nls_table *nls_codepage;
|
|
|
|
struct cifs_ses *ses;
|
2018-11-15 03:20:31 +08:00
|
|
|
int retries;
|
2011-12-27 20:23:34 +08:00
|
|
|
|
|
|
|
/*
|
|
|
|
* SMB2s NegProt, SessSetup, Logoff do not have tcon yet so
|
|
|
|
* check for tcp and smb session status done differently
|
|
|
|
* for those three - in the calling routine.
|
|
|
|
*/
|
|
|
|
if (tcon == NULL)
|
cifs: Fix infinite loop when using hard mount option
For every request we send, whether it is SMB1 or SMB2+, we attempt to
reconnect tcon (cifs_reconnect_tcon or smb2_reconnect) before carrying
out the request.
So, while server->tcpStatus != CifsNeedReconnect, we wait for the
reconnection to succeed on wait_event_interruptible_timeout(). If it
returns, that means that either the condition was evaluated to true, or
timeout elapsed, or it was interrupted by a signal.
Since we're not handling the case where the process woke up due to a
received signal (-ERESTARTSYS), the next call to
wait_event_interruptible_timeout() will _always_ fail and we end up
looping forever inside either cifs_reconnect_tcon() or smb2_reconnect().
Here's an example of how to trigger that:
$ mount.cifs //foo/share /mnt/test -o
username=foo,password=foo,vers=1.0,hard
(break connection to server before executing bellow cmd)
$ stat -f /mnt/test & sleep 140
[1] 2511
$ ps -aux -q 2511
USER PID %CPU %MEM VSZ RSS TTY STAT START TIME COMMAND
root 2511 0.0 0.0 12892 1008 pts/0 S 12:24 0:00 stat -f
/mnt/test
$ kill -9 2511
(wait for a while; process is stuck in the kernel)
$ ps -aux -q 2511
USER PID %CPU %MEM VSZ RSS TTY STAT START TIME COMMAND
root 2511 83.2 0.0 12892 1008 pts/0 R 12:24 30:01 stat -f
/mnt/test
By using 'hard' mount point means that cifs.ko will keep retrying
indefinitely, however we must allow the process to be killed otherwise
it would hang the system.
Signed-off-by: Paulo Alcantara <palcantara@suse.de>
Cc: stable@vger.kernel.org
Reviewed-by: Aurelien Aptel <aaptel@suse.com>
Signed-off-by: Steve French <stfrench@microsoft.com>
2018-07-06 00:46:34 +08:00
|
|
|
return 0;
|
2011-12-27 20:23:34 +08:00
|
|
|
|
2021-11-04 00:53:29 +08:00
|
|
|
/*
|
|
|
|
* Need to also skip SMB2_IOCTL because it is used for checking nested dfs links in
|
|
|
|
* cifs_tree_connect().
|
|
|
|
*/
|
|
|
|
if (smb2_command == SMB2_TREE_CONNECT || smb2_command == SMB2_IOCTL)
|
cifs: Fix infinite loop when using hard mount option
For every request we send, whether it is SMB1 or SMB2+, we attempt to
reconnect tcon (cifs_reconnect_tcon or smb2_reconnect) before carrying
out the request.
So, while server->tcpStatus != CifsNeedReconnect, we wait for the
reconnection to succeed on wait_event_interruptible_timeout(). If it
returns, that means that either the condition was evaluated to true, or
timeout elapsed, or it was interrupted by a signal.
Since we're not handling the case where the process woke up due to a
received signal (-ERESTARTSYS), the next call to
wait_event_interruptible_timeout() will _always_ fail and we end up
looping forever inside either cifs_reconnect_tcon() or smb2_reconnect().
Here's an example of how to trigger that:
$ mount.cifs //foo/share /mnt/test -o
username=foo,password=foo,vers=1.0,hard
(break connection to server before executing bellow cmd)
$ stat -f /mnt/test & sleep 140
[1] 2511
$ ps -aux -q 2511
USER PID %CPU %MEM VSZ RSS TTY STAT START TIME COMMAND
root 2511 0.0 0.0 12892 1008 pts/0 S 12:24 0:00 stat -f
/mnt/test
$ kill -9 2511
(wait for a while; process is stuck in the kernel)
$ ps -aux -q 2511
USER PID %CPU %MEM VSZ RSS TTY STAT START TIME COMMAND
root 2511 83.2 0.0 12892 1008 pts/0 R 12:24 30:01 stat -f
/mnt/test
By using 'hard' mount point means that cifs.ko will keep retrying
indefinitely, however we must allow the process to be killed otherwise
it would hang the system.
Signed-off-by: Paulo Alcantara <palcantara@suse.de>
Cc: stable@vger.kernel.org
Reviewed-by: Aurelien Aptel <aaptel@suse.com>
Signed-off-by: Steve French <stfrench@microsoft.com>
2018-07-06 00:46:34 +08:00
|
|
|
return 0;
|
2011-12-27 20:23:34 +08:00
|
|
|
|
2021-07-20 01:05:53 +08:00
|
|
|
spin_lock(&cifs_tcp_ses_lock);
|
smb3: cleanup and clarify status of tree connections
Currently the way the tid (tree connection) status is tracked
is confusing. The same enum is used for structs cifs_tcon
and cifs_ses and TCP_Server_info, but each of these three has
different states that they transition among. The current
code also unnecessarily uses camelCase.
Convert from use of statusEnum to a new tid_status_enum for
tree connections. The valid states for a tid are:
TID_NEW = 0,
TID_GOOD,
TID_EXITING,
TID_NEED_RECON,
TID_NEED_TCON,
TID_IN_TCON,
TID_NEED_FILES_INVALIDATE, /* unused, considering removing in future */
TID_IN_FILES_INVALIDATE
It also removes CifsNeedTcon, CifsInTcon, CifsNeedFilesInvalidate and
CifsInFilesInvalidate from the statusEnum used for session and
TCP_Server_Info since they are not relevant for those.
A follow on patch will fix the places where we use the
tcon->need_reconnect flag to be more consistent with the tid->status.
Also fixes a bug that was:
Reported-by: kernel test robot <lkp@intel.com>
Reviewed-by: Shyam Prasad N <sprasad@microsoft.com>
Reviewed-by: Ronnie Sahlberg <lsahlber@redhat.com>
Signed-off-by: Steve French <stfrench@microsoft.com>
2022-03-28 05:07:30 +08:00
|
|
|
if (tcon->status == TID_EXITING) {
|
2011-12-27 20:23:34 +08:00
|
|
|
/*
|
|
|
|
* only tree disconnect, open, and write,
|
|
|
|
* (and ulogoff which does not have tcon)
|
|
|
|
* are allowed as we start force umount.
|
|
|
|
*/
|
|
|
|
if ((smb2_command != SMB2_WRITE) &&
|
|
|
|
(smb2_command != SMB2_CREATE) &&
|
|
|
|
(smb2_command != SMB2_TREE_DISCONNECT)) {
|
2021-07-20 01:05:53 +08:00
|
|
|
spin_unlock(&cifs_tcp_ses_lock);
|
2013-05-05 11:12:25 +08:00
|
|
|
cifs_dbg(FYI, "can not send cmd %d while umounting\n",
|
|
|
|
smb2_command);
|
2011-12-27 20:23:34 +08:00
|
|
|
return -ENODEV;
|
|
|
|
}
|
|
|
|
}
|
2021-07-20 01:05:53 +08:00
|
|
|
spin_unlock(&cifs_tcp_ses_lock);
|
2011-12-27 20:23:34 +08:00
|
|
|
if ((!tcon->ses) || (tcon->ses->status == CifsExiting) ||
|
2020-06-01 01:38:22 +08:00
|
|
|
(!tcon->ses->server) || !server)
|
2011-12-27 20:23:34 +08:00
|
|
|
return -EIO;
|
|
|
|
|
|
|
|
ses = tcon->ses;
|
2018-11-15 03:20:31 +08:00
|
|
|
retries = server->nr_targets;
|
|
|
|
|
2011-12-27 20:23:34 +08:00
|
|
|
/*
|
2018-11-15 03:20:31 +08:00
|
|
|
* Give demultiplex thread up to 10 seconds to each target available for
|
|
|
|
* reconnect -- should be greater than cifs socket timeout which is 7
|
|
|
|
* seconds.
|
2011-12-27 20:23:34 +08:00
|
|
|
*/
|
|
|
|
while (server->tcpStatus == CifsNeedReconnect) {
|
|
|
|
/*
|
|
|
|
* Return to caller for TREE_DISCONNECT and LOGOFF and CLOSE
|
|
|
|
* here since they are implicitly done when session drops.
|
|
|
|
*/
|
|
|
|
switch (smb2_command) {
|
|
|
|
/*
|
|
|
|
* BB Should we keep oplock break and add flush to exceptions?
|
|
|
|
*/
|
|
|
|
case SMB2_TREE_DISCONNECT:
|
|
|
|
case SMB2_CANCEL:
|
|
|
|
case SMB2_CLOSE:
|
|
|
|
case SMB2_OPLOCK_BREAK:
|
|
|
|
return -EAGAIN;
|
|
|
|
}
|
|
|
|
|
cifs: Fix infinite loop when using hard mount option
For every request we send, whether it is SMB1 or SMB2+, we attempt to
reconnect tcon (cifs_reconnect_tcon or smb2_reconnect) before carrying
out the request.
So, while server->tcpStatus != CifsNeedReconnect, we wait for the
reconnection to succeed on wait_event_interruptible_timeout(). If it
returns, that means that either the condition was evaluated to true, or
timeout elapsed, or it was interrupted by a signal.
Since we're not handling the case where the process woke up due to a
received signal (-ERESTARTSYS), the next call to
wait_event_interruptible_timeout() will _always_ fail and we end up
looping forever inside either cifs_reconnect_tcon() or smb2_reconnect().
Here's an example of how to trigger that:
$ mount.cifs //foo/share /mnt/test -o
username=foo,password=foo,vers=1.0,hard
(break connection to server before executing bellow cmd)
$ stat -f /mnt/test & sleep 140
[1] 2511
$ ps -aux -q 2511
USER PID %CPU %MEM VSZ RSS TTY STAT START TIME COMMAND
root 2511 0.0 0.0 12892 1008 pts/0 S 12:24 0:00 stat -f
/mnt/test
$ kill -9 2511
(wait for a while; process is stuck in the kernel)
$ ps -aux -q 2511
USER PID %CPU %MEM VSZ RSS TTY STAT START TIME COMMAND
root 2511 83.2 0.0 12892 1008 pts/0 R 12:24 30:01 stat -f
/mnt/test
By using 'hard' mount point means that cifs.ko will keep retrying
indefinitely, however we must allow the process to be killed otherwise
it would hang the system.
Signed-off-by: Paulo Alcantara <palcantara@suse.de>
Cc: stable@vger.kernel.org
Reviewed-by: Aurelien Aptel <aaptel@suse.com>
Signed-off-by: Steve French <stfrench@microsoft.com>
2018-07-06 00:46:34 +08:00
|
|
|
rc = wait_event_interruptible_timeout(server->response_q,
|
|
|
|
(server->tcpStatus != CifsNeedReconnect),
|
|
|
|
10 * HZ);
|
|
|
|
if (rc < 0) {
|
2020-04-15 13:42:53 +08:00
|
|
|
cifs_dbg(FYI, "%s: aborting reconnect due to a received signal by the process\n",
|
|
|
|
__func__);
|
cifs: Fix infinite loop when using hard mount option
For every request we send, whether it is SMB1 or SMB2+, we attempt to
reconnect tcon (cifs_reconnect_tcon or smb2_reconnect) before carrying
out the request.
So, while server->tcpStatus != CifsNeedReconnect, we wait for the
reconnection to succeed on wait_event_interruptible_timeout(). If it
returns, that means that either the condition was evaluated to true, or
timeout elapsed, or it was interrupted by a signal.
Since we're not handling the case where the process woke up due to a
received signal (-ERESTARTSYS), the next call to
wait_event_interruptible_timeout() will _always_ fail and we end up
looping forever inside either cifs_reconnect_tcon() or smb2_reconnect().
Here's an example of how to trigger that:
$ mount.cifs //foo/share /mnt/test -o
username=foo,password=foo,vers=1.0,hard
(break connection to server before executing bellow cmd)
$ stat -f /mnt/test & sleep 140
[1] 2511
$ ps -aux -q 2511
USER PID %CPU %MEM VSZ RSS TTY STAT START TIME COMMAND
root 2511 0.0 0.0 12892 1008 pts/0 S 12:24 0:00 stat -f
/mnt/test
$ kill -9 2511
(wait for a while; process is stuck in the kernel)
$ ps -aux -q 2511
USER PID %CPU %MEM VSZ RSS TTY STAT START TIME COMMAND
root 2511 83.2 0.0 12892 1008 pts/0 R 12:24 30:01 stat -f
/mnt/test
By using 'hard' mount point means that cifs.ko will keep retrying
indefinitely, however we must allow the process to be killed otherwise
it would hang the system.
Signed-off-by: Paulo Alcantara <palcantara@suse.de>
Cc: stable@vger.kernel.org
Reviewed-by: Aurelien Aptel <aaptel@suse.com>
Signed-off-by: Steve French <stfrench@microsoft.com>
2018-07-06 00:46:34 +08:00
|
|
|
return -ERESTARTSYS;
|
|
|
|
}
|
2011-12-27 20:23:34 +08:00
|
|
|
|
|
|
|
/* are we still trying to reconnect? */
|
2021-07-20 01:05:53 +08:00
|
|
|
spin_lock(&cifs_tcp_ses_lock);
|
|
|
|
if (server->tcpStatus != CifsNeedReconnect) {
|
|
|
|
spin_unlock(&cifs_tcp_ses_lock);
|
2011-12-27 20:23:34 +08:00
|
|
|
break;
|
2021-07-20 01:05:53 +08:00
|
|
|
}
|
|
|
|
spin_unlock(&cifs_tcp_ses_lock);
|
2011-12-27 20:23:34 +08:00
|
|
|
|
2020-01-31 03:52:51 +08:00
|
|
|
if (retries && --retries)
|
2018-11-15 03:20:31 +08:00
|
|
|
continue;
|
|
|
|
|
2011-12-27 20:23:34 +08:00
|
|
|
/*
|
|
|
|
* on "soft" mounts we wait once. Hard mounts keep
|
|
|
|
* retrying until process is killed or server comes
|
|
|
|
* back on-line
|
|
|
|
*/
|
|
|
|
if (!tcon->retry) {
|
2013-05-05 11:12:25 +08:00
|
|
|
cifs_dbg(FYI, "gave up waiting on reconnect in smb_init\n");
|
2011-12-27 20:23:34 +08:00
|
|
|
return -EHOSTDOWN;
|
|
|
|
}
|
2018-11-15 03:20:31 +08:00
|
|
|
retries = server->nr_targets;
|
2011-12-27 20:23:34 +08:00
|
|
|
}
|
|
|
|
|
2021-07-19 20:46:53 +08:00
|
|
|
spin_lock(&ses->chan_lock);
|
|
|
|
if (!cifs_chan_needs_reconnect(ses, server) && !tcon->need_reconnect) {
|
|
|
|
spin_unlock(&ses->chan_lock);
|
cifs: Fix infinite loop when using hard mount option
For every request we send, whether it is SMB1 or SMB2+, we attempt to
reconnect tcon (cifs_reconnect_tcon or smb2_reconnect) before carrying
out the request.
So, while server->tcpStatus != CifsNeedReconnect, we wait for the
reconnection to succeed on wait_event_interruptible_timeout(). If it
returns, that means that either the condition was evaluated to true, or
timeout elapsed, or it was interrupted by a signal.
Since we're not handling the case where the process woke up due to a
received signal (-ERESTARTSYS), the next call to
wait_event_interruptible_timeout() will _always_ fail and we end up
looping forever inside either cifs_reconnect_tcon() or smb2_reconnect().
Here's an example of how to trigger that:
$ mount.cifs //foo/share /mnt/test -o
username=foo,password=foo,vers=1.0,hard
(break connection to server before executing bellow cmd)
$ stat -f /mnt/test & sleep 140
[1] 2511
$ ps -aux -q 2511
USER PID %CPU %MEM VSZ RSS TTY STAT START TIME COMMAND
root 2511 0.0 0.0 12892 1008 pts/0 S 12:24 0:00 stat -f
/mnt/test
$ kill -9 2511
(wait for a while; process is stuck in the kernel)
$ ps -aux -q 2511
USER PID %CPU %MEM VSZ RSS TTY STAT START TIME COMMAND
root 2511 83.2 0.0 12892 1008 pts/0 R 12:24 30:01 stat -f
/mnt/test
By using 'hard' mount point means that cifs.ko will keep retrying
indefinitely, however we must allow the process to be killed otherwise
it would hang the system.
Signed-off-by: Paulo Alcantara <palcantara@suse.de>
Cc: stable@vger.kernel.org
Reviewed-by: Aurelien Aptel <aaptel@suse.com>
Signed-off-by: Steve French <stfrench@microsoft.com>
2018-07-06 00:46:34 +08:00
|
|
|
return 0;
|
2021-07-19 20:46:53 +08:00
|
|
|
}
|
2021-11-19 22:16:57 +08:00
|
|
|
spin_unlock(&ses->chan_lock);
|
2021-07-19 20:46:53 +08:00
|
|
|
cifs_dbg(FYI, "sess reconnect mask: 0x%lx, tcon reconnect: %d",
|
|
|
|
tcon->ses->chans_need_reconnect,
|
|
|
|
tcon->need_reconnect);
|
2011-12-27 20:23:34 +08:00
|
|
|
|
|
|
|
nls_codepage = load_nls_default();
|
|
|
|
|
2017-07-11 18:44:39 +08:00
|
|
|
/*
|
|
|
|
* Recheck after acquire mutex. If another thread is negotiating
|
|
|
|
* and the server never sends an answer the socket will be closed
|
|
|
|
* and tcpStatus set to reconnect.
|
|
|
|
*/
|
2021-07-20 01:05:53 +08:00
|
|
|
spin_lock(&cifs_tcp_ses_lock);
|
2017-07-11 18:44:39 +08:00
|
|
|
if (server->tcpStatus == CifsNeedReconnect) {
|
2021-07-20 01:05:53 +08:00
|
|
|
spin_unlock(&cifs_tcp_ses_lock);
|
2017-07-11 18:44:39 +08:00
|
|
|
rc = -EHOSTDOWN;
|
|
|
|
goto out;
|
|
|
|
}
|
2021-07-20 01:05:53 +08:00
|
|
|
spin_unlock(&cifs_tcp_ses_lock);
|
2017-07-11 18:44:39 +08:00
|
|
|
|
2021-07-19 20:46:53 +08:00
|
|
|
/*
|
|
|
|
* need to prevent multiple threads trying to simultaneously
|
|
|
|
* reconnect the same SMB session
|
|
|
|
*/
|
|
|
|
spin_lock(&ses->chan_lock);
|
|
|
|
if (!cifs_chan_needs_reconnect(ses, server)) {
|
|
|
|
spin_unlock(&ses->chan_lock);
|
|
|
|
|
2021-07-19 21:54:16 +08:00
|
|
|
/* this means that we only need to tree connect */
|
2021-07-19 20:46:53 +08:00
|
|
|
if (tcon->need_reconnect)
|
|
|
|
goto skip_sess_setup;
|
|
|
|
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
spin_unlock(&ses->chan_lock);
|
|
|
|
|
2021-07-20 01:37:52 +08:00
|
|
|
mutex_lock(&ses->session_mutex);
|
2021-07-19 21:54:16 +08:00
|
|
|
rc = cifs_negotiate_protocol(0, ses, server);
|
2021-07-19 20:46:53 +08:00
|
|
|
if (!rc) {
|
2021-07-19 21:54:16 +08:00
|
|
|
rc = cifs_setup_session(0, ses, server, nls_codepage);
|
2020-02-05 09:08:01 +08:00
|
|
|
if ((rc == -EACCES) && !tcon->retry) {
|
2021-07-19 21:54:16 +08:00
|
|
|
mutex_unlock(&ses->session_mutex);
|
2021-07-20 01:37:52 +08:00
|
|
|
rc = -EHOSTDOWN;
|
2020-02-05 09:08:01 +08:00
|
|
|
goto failed;
|
|
|
|
}
|
2021-10-30 12:51:35 +08:00
|
|
|
} else {
|
2021-07-20 01:37:52 +08:00
|
|
|
mutex_unlock(&ses->session_mutex);
|
2011-12-27 20:23:34 +08:00
|
|
|
goto out;
|
|
|
|
}
|
2021-10-30 12:51:35 +08:00
|
|
|
mutex_unlock(&ses->session_mutex);
|
2011-12-27 20:23:34 +08:00
|
|
|
|
2021-07-19 20:46:53 +08:00
|
|
|
skip_sess_setup:
|
2021-10-30 12:51:35 +08:00
|
|
|
mutex_lock(&ses->session_mutex);
|
|
|
|
if (!tcon->need_reconnect) {
|
|
|
|
mutex_unlock(&ses->session_mutex);
|
|
|
|
goto out;
|
|
|
|
}
|
2011-12-27 20:23:34 +08:00
|
|
|
cifs_mark_open_files_invalid(tcon);
|
2016-11-30 03:31:23 +08:00
|
|
|
if (tcon->use_persistent)
|
|
|
|
tcon->need_reopen_files = true;
|
2016-09-23 08:23:56 +08:00
|
|
|
|
2020-07-21 20:36:38 +08:00
|
|
|
rc = cifs_tree_connect(0, tcon, nls_codepage);
|
2021-07-20 01:37:52 +08:00
|
|
|
mutex_unlock(&ses->session_mutex);
|
2016-09-23 08:23:56 +08:00
|
|
|
|
2013-05-05 11:12:25 +08:00
|
|
|
cifs_dbg(FYI, "reconnect tcon rc = %d\n", rc);
|
2018-04-05 03:08:52 +08:00
|
|
|
if (rc) {
|
|
|
|
/* If sess reconnected but tcon didn't, something strange ... */
|
2020-04-15 13:42:53 +08:00
|
|
|
pr_warn_once("reconnect tcon failed rc = %d\n", rc);
|
2011-12-27 20:23:34 +08:00
|
|
|
goto out;
|
2018-04-05 03:08:52 +08:00
|
|
|
}
|
2016-11-30 03:31:23 +08:00
|
|
|
|
|
|
|
if (smb2_command != SMB2_INTERNAL_CMD)
|
2020-02-24 21:14:59 +08:00
|
|
|
mod_delayed_work(cifsiod_wq, &server->reconnect, 0);
|
2016-11-30 03:31:23 +08:00
|
|
|
|
2011-12-27 20:23:34 +08:00
|
|
|
atomic_inc(&tconInfoReconnectCount);
|
|
|
|
out:
|
|
|
|
/*
|
|
|
|
* Check if handle based operation so we know whether we can continue
|
|
|
|
* or not without returning to caller to reset file handle.
|
|
|
|
*/
|
|
|
|
/*
|
|
|
|
* BB Is flush done by server on drop of tcp session? Should we special
|
|
|
|
* case it and skip above?
|
|
|
|
*/
|
|
|
|
switch (smb2_command) {
|
|
|
|
case SMB2_FLUSH:
|
|
|
|
case SMB2_READ:
|
|
|
|
case SMB2_WRITE:
|
|
|
|
case SMB2_LOCK:
|
|
|
|
case SMB2_IOCTL:
|
|
|
|
case SMB2_QUERY_DIRECTORY:
|
|
|
|
case SMB2_CHANGE_NOTIFY:
|
|
|
|
case SMB2_QUERY_INFO:
|
|
|
|
case SMB2_SET_INFO:
|
2016-11-30 03:30:58 +08:00
|
|
|
rc = -EAGAIN;
|
2011-12-27 20:23:34 +08:00
|
|
|
}
|
2020-02-05 09:08:01 +08:00
|
|
|
failed:
|
2011-12-27 20:23:34 +08:00
|
|
|
unload_nls(nls_codepage);
|
2011-12-27 20:12:43 +08:00
|
|
|
return rc;
|
|
|
|
}
|
|
|
|
|
2016-10-25 07:59:57 +08:00
|
|
|
static void
|
2020-06-01 01:38:22 +08:00
|
|
|
fill_small_buf(__le16 smb2_command, struct cifs_tcon *tcon,
|
|
|
|
struct TCP_Server_Info *server,
|
|
|
|
void *buf,
|
2016-10-25 07:59:57 +08:00
|
|
|
unsigned int *total_len)
|
|
|
|
{
|
2021-11-05 07:39:01 +08:00
|
|
|
struct smb2_pdu *spdu = (struct smb2_pdu *)buf;
|
2016-10-25 07:59:57 +08:00
|
|
|
/* lookup word count ie StructureSize from table */
|
|
|
|
__u16 parmsize = smb2_req_struct_sizes[le16_to_cpu(smb2_command)];
|
|
|
|
|
|
|
|
/*
|
|
|
|
* smaller than SMALL_BUFFER_SIZE but bigger than fixed area of
|
|
|
|
* largest operations (Create)
|
|
|
|
*/
|
|
|
|
memset(buf, 0, 256);
|
|
|
|
|
2021-11-05 07:39:01 +08:00
|
|
|
smb2_hdr_assemble(&spdu->hdr, smb2_command, tcon, server);
|
2016-10-25 07:59:57 +08:00
|
|
|
spdu->StructureSize2 = cpu_to_le16(parmsize);
|
|
|
|
|
2021-11-05 07:39:01 +08:00
|
|
|
*total_len = parmsize + sizeof(struct smb2_hdr);
|
2016-10-25 07:59:57 +08:00
|
|
|
}
|
|
|
|
|
2011-12-27 20:12:43 +08:00
|
|
|
/*
|
|
|
|
* Allocate and return pointer to an SMB request hdr, and set basic
|
|
|
|
* SMB information in the SMB header. If the return code is zero, this
|
2017-11-21 08:04:42 +08:00
|
|
|
* function must have filled in request_buf pointer.
|
2011-12-27 20:12:43 +08:00
|
|
|
*/
|
2019-11-22 23:30:53 +08:00
|
|
|
static int __smb2_plain_req_init(__le16 smb2_command, struct cifs_tcon *tcon,
|
2020-06-01 01:38:22 +08:00
|
|
|
struct TCP_Server_Info *server,
|
|
|
|
void **request_buf, unsigned int *total_len)
|
2011-12-27 20:12:43 +08:00
|
|
|
{
|
|
|
|
/* BB eventually switch this to SMB2 specific small buf size */
|
2018-07-05 17:46:42 +08:00
|
|
|
if (smb2_command == SMB2_SET_INFO)
|
|
|
|
*request_buf = cifs_buf_get();
|
|
|
|
else
|
|
|
|
*request_buf = cifs_small_buf_get();
|
2011-12-27 20:12:43 +08:00
|
|
|
if (*request_buf == NULL) {
|
|
|
|
/* BB should we add a retry in here if not a writepage? */
|
|
|
|
return -ENOMEM;
|
|
|
|
}
|
|
|
|
|
2020-06-01 01:38:22 +08:00
|
|
|
fill_small_buf(smb2_command, tcon, server,
|
2021-11-05 07:39:01 +08:00
|
|
|
(struct smb2_hdr *)(*request_buf),
|
2017-11-21 08:04:42 +08:00
|
|
|
total_len);
|
2011-12-27 20:12:43 +08:00
|
|
|
|
|
|
|
if (tcon != NULL) {
|
|
|
|
uint16_t com_code = le16_to_cpu(smb2_command);
|
|
|
|
cifs_stats_inc(&tcon->stats.smb2_stats.smb2_com_sent[com_code]);
|
|
|
|
cifs_stats_inc(&tcon->num_smbs_sent);
|
|
|
|
}
|
|
|
|
|
2019-11-22 23:30:53 +08:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int smb2_plain_req_init(__le16 smb2_command, struct cifs_tcon *tcon,
|
2020-06-01 01:38:22 +08:00
|
|
|
struct TCP_Server_Info *server,
|
2019-11-22 23:30:53 +08:00
|
|
|
void **request_buf, unsigned int *total_len)
|
|
|
|
{
|
|
|
|
int rc;
|
|
|
|
|
2020-06-01 01:38:22 +08:00
|
|
|
rc = smb2_reconnect(smb2_command, tcon, server);
|
2019-11-22 23:30:53 +08:00
|
|
|
if (rc)
|
|
|
|
return rc;
|
|
|
|
|
2020-06-01 01:38:22 +08:00
|
|
|
return __smb2_plain_req_init(smb2_command, tcon, server, request_buf,
|
2019-11-22 23:30:53 +08:00
|
|
|
total_len);
|
|
|
|
}
|
|
|
|
|
|
|
|
static int smb2_ioctl_req_init(u32 opcode, struct cifs_tcon *tcon,
|
2020-06-01 01:38:22 +08:00
|
|
|
struct TCP_Server_Info *server,
|
2019-11-22 23:30:53 +08:00
|
|
|
void **request_buf, unsigned int *total_len)
|
|
|
|
{
|
|
|
|
/* Skip reconnect only for FSCTL_VALIDATE_NEGOTIATE_INFO IOCTLs */
|
|
|
|
if (opcode == FSCTL_VALIDATE_NEGOTIATE_INFO) {
|
2020-06-01 01:38:22 +08:00
|
|
|
return __smb2_plain_req_init(SMB2_IOCTL, tcon, server,
|
|
|
|
request_buf, total_len);
|
2019-11-22 23:30:53 +08:00
|
|
|
}
|
2020-06-01 01:38:22 +08:00
|
|
|
return smb2_plain_req_init(SMB2_IOCTL, tcon, server,
|
|
|
|
request_buf, total_len);
|
2011-12-27 20:12:43 +08:00
|
|
|
}
|
|
|
|
|
2019-04-19 00:03:58 +08:00
|
|
|
/* For explanation of negotiate contexts see MS-SMB2 section 2.2.3.1 */
|
2015-06-18 17:49:47 +08:00
|
|
|
|
|
|
|
static void
|
|
|
|
build_preauth_ctxt(struct smb2_preauth_neg_context *pneg_ctxt)
|
|
|
|
{
|
|
|
|
pneg_ctxt->ContextType = SMB2_PREAUTH_INTEGRITY_CAPABILITIES;
|
|
|
|
pneg_ctxt->DataLength = cpu_to_le16(38);
|
|
|
|
pneg_ctxt->HashAlgorithmCount = cpu_to_le16(1);
|
2021-09-08 10:10:13 +08:00
|
|
|
pneg_ctxt->SaltLength = cpu_to_le16(SMB311_SALT_SIZE);
|
|
|
|
get_random_bytes(pneg_ctxt->Salt, SMB311_SALT_SIZE);
|
2015-06-18 17:49:47 +08:00
|
|
|
pneg_ctxt->HashAlgorithms = SMB2_PREAUTH_INTEGRITY_SHA512;
|
|
|
|
}
|
|
|
|
|
2019-04-27 11:36:08 +08:00
|
|
|
static void
|
|
|
|
build_compression_ctxt(struct smb2_compression_capabilities_context *pneg_ctxt)
|
|
|
|
{
|
|
|
|
pneg_ctxt->ContextType = SMB2_COMPRESSION_CAPABILITIES;
|
|
|
|
pneg_ctxt->DataLength =
|
|
|
|
cpu_to_le16(sizeof(struct smb2_compression_capabilities_context)
|
|
|
|
- sizeof(struct smb2_neg_context));
|
|
|
|
pneg_ctxt->CompressionAlgorithmCount = cpu_to_le16(3);
|
|
|
|
pneg_ctxt->CompressionAlgorithms[0] = SMB3_COMPRESS_LZ77;
|
|
|
|
pneg_ctxt->CompressionAlgorithms[1] = SMB3_COMPRESS_LZ77_HUFF;
|
|
|
|
pneg_ctxt->CompressionAlgorithms[2] = SMB3_COMPRESS_LZNT1;
|
|
|
|
}
|
|
|
|
|
2021-07-06 04:05:39 +08:00
|
|
|
static unsigned int
|
|
|
|
build_signing_ctxt(struct smb2_signing_capabilities *pneg_ctxt)
|
|
|
|
{
|
|
|
|
unsigned int ctxt_len = sizeof(struct smb2_signing_capabilities);
|
|
|
|
unsigned short num_algs = 1; /* number of signing algorithms sent */
|
|
|
|
|
|
|
|
pneg_ctxt->ContextType = SMB2_SIGNING_CAPABILITIES;
|
|
|
|
/*
|
|
|
|
* Context Data length must be rounded to multiple of 8 for some servers
|
|
|
|
*/
|
|
|
|
pneg_ctxt->DataLength = cpu_to_le16(DIV_ROUND_UP(
|
|
|
|
sizeof(struct smb2_signing_capabilities) -
|
|
|
|
sizeof(struct smb2_neg_context) +
|
|
|
|
(num_algs * 2 /* sizeof u16 */), 8) * 8);
|
|
|
|
pneg_ctxt->SigningAlgorithmCount = cpu_to_le16(num_algs);
|
|
|
|
pneg_ctxt->SigningAlgorithms[0] = cpu_to_le16(SIGNING_ALG_AES_CMAC);
|
|
|
|
|
|
|
|
ctxt_len += 2 /* sizeof le16 */ * num_algs;
|
|
|
|
ctxt_len = DIV_ROUND_UP(ctxt_len, 8) * 8;
|
|
|
|
return ctxt_len;
|
|
|
|
/* TBD add SIGNING_ALG_AES_GMAC and/or SIGNING_ALG_HMAC_SHA256 */
|
|
|
|
}
|
|
|
|
|
2015-06-18 17:49:47 +08:00
|
|
|
static void
|
|
|
|
build_encrypt_ctxt(struct smb2_encryption_neg_context *pneg_ctxt)
|
|
|
|
{
|
|
|
|
pneg_ctxt->ContextType = SMB2_ENCRYPTION_CAPABILITIES;
|
2020-09-12 05:19:28 +08:00
|
|
|
if (require_gcm_256) {
|
|
|
|
pneg_ctxt->DataLength = cpu_to_le16(4); /* Cipher Count + 1 cipher */
|
|
|
|
pneg_ctxt->CipherCount = cpu_to_le16(1);
|
|
|
|
pneg_ctxt->Ciphers[0] = SMB2_ENCRYPTION_AES256_GCM;
|
2020-10-15 09:24:09 +08:00
|
|
|
} else if (enable_gcm_256) {
|
|
|
|
pneg_ctxt->DataLength = cpu_to_le16(8); /* Cipher Count + 3 ciphers */
|
|
|
|
pneg_ctxt->CipherCount = cpu_to_le16(3);
|
|
|
|
pneg_ctxt->Ciphers[0] = SMB2_ENCRYPTION_AES128_GCM;
|
|
|
|
pneg_ctxt->Ciphers[1] = SMB2_ENCRYPTION_AES256_GCM;
|
|
|
|
pneg_ctxt->Ciphers[2] = SMB2_ENCRYPTION_AES128_CCM;
|
2020-09-12 05:19:28 +08:00
|
|
|
} else {
|
|
|
|
pneg_ctxt->DataLength = cpu_to_le16(6); /* Cipher Count + 2 ciphers */
|
|
|
|
pneg_ctxt->CipherCount = cpu_to_le16(2);
|
|
|
|
pneg_ctxt->Ciphers[0] = SMB2_ENCRYPTION_AES128_GCM;
|
|
|
|
pneg_ctxt->Ciphers[1] = SMB2_ENCRYPTION_AES128_CCM;
|
|
|
|
}
|
2015-06-18 17:49:47 +08:00
|
|
|
}
|
|
|
|
|
2019-06-25 17:39:51 +08:00
|
|
|
static unsigned int
|
|
|
|
build_netname_ctxt(struct smb2_netname_neg_context *pneg_ctxt, char *hostname)
|
|
|
|
{
|
|
|
|
struct nls_table *cp = load_nls_default();
|
|
|
|
|
|
|
|
pneg_ctxt->ContextType = SMB2_NETNAME_NEGOTIATE_CONTEXT_ID;
|
|
|
|
|
|
|
|
/* copy up to max of first 100 bytes of server name to NetName field */
|
2019-08-06 06:07:26 +08:00
|
|
|
pneg_ctxt->DataLength = cpu_to_le16(2 * cifs_strtoUTF16(pneg_ctxt->NetName, hostname, 100, cp));
|
2019-06-25 17:39:51 +08:00
|
|
|
/* context size is DataLength + minimal smb2_neg_context */
|
|
|
|
return DIV_ROUND_UP(le16_to_cpu(pneg_ctxt->DataLength) +
|
|
|
|
sizeof(struct smb2_neg_context), 8) * 8;
|
|
|
|
}
|
|
|
|
|
2018-05-20 09:45:27 +08:00
|
|
|
static void
|
|
|
|
build_posix_ctxt(struct smb2_posix_neg_context *pneg_ctxt)
|
|
|
|
{
|
|
|
|
pneg_ctxt->ContextType = SMB2_POSIX_EXTENSIONS_AVAILABLE;
|
|
|
|
pneg_ctxt->DataLength = cpu_to_le16(POSIX_CTXT_DATA_LEN);
|
2019-02-25 07:56:33 +08:00
|
|
|
/* SMB2_CREATE_TAG_POSIX is "0x93AD25509CB411E7B42383DE968BCD7C" */
|
|
|
|
pneg_ctxt->Name[0] = 0x93;
|
|
|
|
pneg_ctxt->Name[1] = 0xAD;
|
|
|
|
pneg_ctxt->Name[2] = 0x25;
|
|
|
|
pneg_ctxt->Name[3] = 0x50;
|
|
|
|
pneg_ctxt->Name[4] = 0x9C;
|
|
|
|
pneg_ctxt->Name[5] = 0xB4;
|
|
|
|
pneg_ctxt->Name[6] = 0x11;
|
|
|
|
pneg_ctxt->Name[7] = 0xE7;
|
|
|
|
pneg_ctxt->Name[8] = 0xB4;
|
|
|
|
pneg_ctxt->Name[9] = 0x23;
|
|
|
|
pneg_ctxt->Name[10] = 0x83;
|
|
|
|
pneg_ctxt->Name[11] = 0xDE;
|
|
|
|
pneg_ctxt->Name[12] = 0x96;
|
|
|
|
pneg_ctxt->Name[13] = 0x8B;
|
|
|
|
pneg_ctxt->Name[14] = 0xCD;
|
|
|
|
pneg_ctxt->Name[15] = 0x7C;
|
2018-05-20 09:45:27 +08:00
|
|
|
}
|
|
|
|
|
2015-06-18 17:49:47 +08:00
|
|
|
static void
|
2017-11-20 08:24:30 +08:00
|
|
|
assemble_neg_contexts(struct smb2_negotiate_req *req,
|
2019-06-25 09:39:04 +08:00
|
|
|
struct TCP_Server_Info *server, unsigned int *total_len)
|
2015-06-18 17:49:47 +08:00
|
|
|
{
|
2019-12-03 02:59:42 +08:00
|
|
|
char *pneg_ctxt;
|
2021-07-06 04:05:39 +08:00
|
|
|
unsigned int ctxt_len, neg_context_count;
|
2015-06-18 17:49:47 +08:00
|
|
|
|
2019-01-03 16:37:21 +08:00
|
|
|
if (*total_len > 200) {
|
|
|
|
/* In case length corrupted don't want to overrun smb buffer */
|
2019-08-28 15:15:35 +08:00
|
|
|
cifs_server_dbg(VFS, "Bad frame length assembling neg contexts\n");
|
2019-01-03 16:37:21 +08:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* round up total_len of fixed part of SMB3 negotiate request to 8
|
|
|
|
* byte boundary before adding negotiate contexts
|
|
|
|
*/
|
|
|
|
*total_len = roundup(*total_len, 8);
|
|
|
|
|
|
|
|
pneg_ctxt = (*total_len) + (char *)req;
|
|
|
|
req->NegotiateContextOffset = cpu_to_le32(*total_len);
|
|
|
|
|
2015-06-18 17:49:47 +08:00
|
|
|
build_preauth_ctxt((struct smb2_preauth_neg_context *)pneg_ctxt);
|
2018-05-20 09:45:27 +08:00
|
|
|
ctxt_len = DIV_ROUND_UP(sizeof(struct smb2_preauth_neg_context), 8) * 8;
|
|
|
|
*total_len += ctxt_len;
|
|
|
|
pneg_ctxt += ctxt_len;
|
2017-11-20 08:24:30 +08:00
|
|
|
|
2015-06-18 17:49:47 +08:00
|
|
|
build_encrypt_ctxt((struct smb2_encryption_neg_context *)pneg_ctxt);
|
2018-05-20 09:45:27 +08:00
|
|
|
ctxt_len = DIV_ROUND_UP(sizeof(struct smb2_encryption_neg_context), 8) * 8;
|
|
|
|
*total_len += ctxt_len;
|
|
|
|
pneg_ctxt += ctxt_len;
|
|
|
|
|
2021-07-06 04:05:39 +08:00
|
|
|
ctxt_len = build_netname_ctxt((struct smb2_netname_neg_context *)pneg_ctxt,
|
|
|
|
server->hostname);
|
|
|
|
*total_len += ctxt_len;
|
|
|
|
pneg_ctxt += ctxt_len;
|
|
|
|
|
|
|
|
build_posix_ctxt((struct smb2_posix_neg_context *)pneg_ctxt);
|
|
|
|
*total_len += sizeof(struct smb2_posix_neg_context);
|
|
|
|
pneg_ctxt += sizeof(struct smb2_posix_neg_context);
|
|
|
|
|
|
|
|
neg_context_count = 4;
|
|
|
|
|
2019-06-25 09:39:04 +08:00
|
|
|
if (server->compress_algorithm) {
|
|
|
|
build_compression_ctxt((struct smb2_compression_capabilities_context *)
|
2019-04-27 11:36:08 +08:00
|
|
|
pneg_ctxt);
|
2019-06-25 09:39:04 +08:00
|
|
|
ctxt_len = DIV_ROUND_UP(
|
|
|
|
sizeof(struct smb2_compression_capabilities_context),
|
|
|
|
8) * 8;
|
|
|
|
*total_len += ctxt_len;
|
|
|
|
pneg_ctxt += ctxt_len;
|
2021-07-06 04:05:39 +08:00
|
|
|
neg_context_count++;
|
|
|
|
}
|
2019-06-25 17:39:51 +08:00
|
|
|
|
2021-07-06 04:05:39 +08:00
|
|
|
if (enable_negotiate_signing) {
|
|
|
|
ctxt_len = build_signing_ctxt((struct smb2_signing_capabilities *)
|
|
|
|
pneg_ctxt);
|
|
|
|
*total_len += ctxt_len;
|
|
|
|
pneg_ctxt += ctxt_len;
|
|
|
|
neg_context_count++;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* check for and add transport_capabilities and signing capabilities */
|
|
|
|
req->NegotiateContextCount = cpu_to_le16(neg_context_count);
|
2019-06-25 17:39:51 +08:00
|
|
|
|
2015-06-18 17:49:47 +08:00
|
|
|
}
|
2018-04-09 23:47:14 +08:00
|
|
|
|
|
|
|
static void decode_preauth_context(struct smb2_preauth_neg_context *ctxt)
|
|
|
|
{
|
|
|
|
unsigned int len = le16_to_cpu(ctxt->DataLength);
|
|
|
|
|
|
|
|
/* If invalid preauth context warn but use what we requested, SHA-512 */
|
|
|
|
if (len < MIN_PREAUTH_CTXT_DATA_LEN) {
|
2020-04-15 13:42:53 +08:00
|
|
|
pr_warn_once("server sent bad preauth context\n");
|
2018-04-09 23:47:14 +08:00
|
|
|
return;
|
2020-12-10 12:19:00 +08:00
|
|
|
} else if (len < MIN_PREAUTH_CTXT_DATA_LEN + le16_to_cpu(ctxt->SaltLength)) {
|
|
|
|
pr_warn_once("server sent invalid SaltLength\n");
|
|
|
|
return;
|
2018-04-09 23:47:14 +08:00
|
|
|
}
|
|
|
|
if (le16_to_cpu(ctxt->HashAlgorithmCount) != 1)
|
2020-04-15 13:42:53 +08:00
|
|
|
pr_warn_once("Invalid SMB3 hash algorithm count\n");
|
2018-04-09 23:47:14 +08:00
|
|
|
if (ctxt->HashAlgorithms != SMB2_PREAUTH_INTEGRITY_SHA512)
|
2020-04-15 13:42:53 +08:00
|
|
|
pr_warn_once("unknown SMB3 hash algorithm\n");
|
2018-04-09 23:47:14 +08:00
|
|
|
}
|
|
|
|
|
2019-04-27 11:36:08 +08:00
|
|
|
static void decode_compress_ctx(struct TCP_Server_Info *server,
|
|
|
|
struct smb2_compression_capabilities_context *ctxt)
|
|
|
|
{
|
|
|
|
unsigned int len = le16_to_cpu(ctxt->DataLength);
|
|
|
|
|
|
|
|
/* sizeof compress context is a one element compression capbility struct */
|
|
|
|
if (len < 10) {
|
2020-04-15 13:42:53 +08:00
|
|
|
pr_warn_once("server sent bad compression cntxt\n");
|
2019-04-27 11:36:08 +08:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
if (le16_to_cpu(ctxt->CompressionAlgorithmCount) != 1) {
|
2020-04-15 13:42:53 +08:00
|
|
|
pr_warn_once("Invalid SMB3 compress algorithm count\n");
|
2019-04-27 11:36:08 +08:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
if (le16_to_cpu(ctxt->CompressionAlgorithms[0]) > 3) {
|
2020-04-15 13:42:53 +08:00
|
|
|
pr_warn_once("unknown compression algorithm\n");
|
2019-04-27 11:36:08 +08:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
server->compress_algorithm = ctxt->CompressionAlgorithms[0];
|
|
|
|
}
|
|
|
|
|
2018-04-09 23:47:14 +08:00
|
|
|
static int decode_encrypt_ctx(struct TCP_Server_Info *server,
|
|
|
|
struct smb2_encryption_neg_context *ctxt)
|
|
|
|
{
|
|
|
|
unsigned int len = le16_to_cpu(ctxt->DataLength);
|
|
|
|
|
|
|
|
cifs_dbg(FYI, "decode SMB3.11 encryption neg context of len %d\n", len);
|
|
|
|
if (len < MIN_ENCRYPT_CTXT_DATA_LEN) {
|
2020-04-15 13:42:53 +08:00
|
|
|
pr_warn_once("server sent bad crypto ctxt len\n");
|
2018-04-09 23:47:14 +08:00
|
|
|
return -EINVAL;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (le16_to_cpu(ctxt->CipherCount) != 1) {
|
2020-04-15 13:42:53 +08:00
|
|
|
pr_warn_once("Invalid SMB3.11 cipher count\n");
|
2018-04-09 23:47:14 +08:00
|
|
|
return -EINVAL;
|
|
|
|
}
|
|
|
|
cifs_dbg(FYI, "SMB311 cipher type:%d\n", le16_to_cpu(ctxt->Ciphers[0]));
|
2020-10-15 13:14:47 +08:00
|
|
|
if (require_gcm_256) {
|
|
|
|
if (ctxt->Ciphers[0] != SMB2_ENCRYPTION_AES256_GCM) {
|
|
|
|
cifs_dbg(VFS, "Server does not support requested encryption type (AES256 GCM)\n");
|
|
|
|
return -EOPNOTSUPP;
|
|
|
|
}
|
|
|
|
} else if (ctxt->Ciphers[0] == 0) {
|
2020-10-17 16:54:27 +08:00
|
|
|
/*
|
|
|
|
* e.g. if server only supported AES256_CCM (very unlikely)
|
|
|
|
* or server supported no encryption types or had all disabled.
|
|
|
|
* Since GLOBAL_CAP_ENCRYPTION will be not set, in the case
|
|
|
|
* in which mount requested encryption ("seal") checks later
|
|
|
|
* on during tree connection will return proper rc, but if
|
|
|
|
* seal not requested by client, since server is allowed to
|
|
|
|
* return 0 to indicate no supported cipher, we can't fail here
|
|
|
|
*/
|
|
|
|
server->cipher_type = 0;
|
|
|
|
server->capabilities &= ~SMB2_GLOBAL_CAP_ENCRYPTION;
|
|
|
|
pr_warn_once("Server does not support requested encryption types\n");
|
|
|
|
return 0;
|
2020-10-15 13:14:47 +08:00
|
|
|
} else if ((ctxt->Ciphers[0] != SMB2_ENCRYPTION_AES128_CCM) &&
|
|
|
|
(ctxt->Ciphers[0] != SMB2_ENCRYPTION_AES128_GCM) &&
|
|
|
|
(ctxt->Ciphers[0] != SMB2_ENCRYPTION_AES256_GCM)) {
|
|
|
|
/* server returned a cipher we didn't ask for */
|
2020-04-15 13:42:53 +08:00
|
|
|
pr_warn_once("Invalid SMB3.11 cipher returned\n");
|
2018-04-09 23:47:14 +08:00
|
|
|
return -EINVAL;
|
|
|
|
}
|
|
|
|
server->cipher_type = ctxt->Ciphers[0];
|
2018-04-23 04:14:58 +08:00
|
|
|
server->capabilities |= SMB2_GLOBAL_CAP_ENCRYPTION;
|
2018-04-09 23:47:14 +08:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2021-07-06 04:05:39 +08:00
|
|
|
static void decode_signing_ctx(struct TCP_Server_Info *server,
|
|
|
|
struct smb2_signing_capabilities *pctxt)
|
|
|
|
{
|
|
|
|
unsigned int len = le16_to_cpu(pctxt->DataLength);
|
|
|
|
|
|
|
|
if ((len < 4) || (len > 16)) {
|
|
|
|
pr_warn_once("server sent bad signing negcontext\n");
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
if (le16_to_cpu(pctxt->SigningAlgorithmCount) != 1) {
|
|
|
|
pr_warn_once("Invalid signing algorithm count\n");
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
if (le16_to_cpu(pctxt->SigningAlgorithms[0]) > 2) {
|
|
|
|
pr_warn_once("unknown signing algorithm\n");
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
server->signing_negotiated = true;
|
|
|
|
server->signing_algorithm = le16_to_cpu(pctxt->SigningAlgorithms[0]);
|
|
|
|
cifs_dbg(FYI, "signing algorithm %d chosen\n",
|
|
|
|
server->signing_algorithm);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2018-04-09 23:47:14 +08:00
|
|
|
static int smb311_decode_neg_context(struct smb2_negotiate_rsp *rsp,
|
2018-06-01 08:53:02 +08:00
|
|
|
struct TCP_Server_Info *server,
|
|
|
|
unsigned int len_of_smb)
|
2018-04-09 23:47:14 +08:00
|
|
|
{
|
|
|
|
struct smb2_neg_context *pctx;
|
|
|
|
unsigned int offset = le32_to_cpu(rsp->NegotiateContextOffset);
|
|
|
|
unsigned int ctxt_cnt = le16_to_cpu(rsp->NegotiateContextCount);
|
|
|
|
unsigned int len_of_ctxts, i;
|
|
|
|
int rc = 0;
|
|
|
|
|
|
|
|
cifs_dbg(FYI, "decoding %d negotiate contexts\n", ctxt_cnt);
|
|
|
|
if (len_of_smb <= offset) {
|
2019-08-28 15:15:35 +08:00
|
|
|
cifs_server_dbg(VFS, "Invalid response: negotiate context offset\n");
|
2018-04-09 23:47:14 +08:00
|
|
|
return -EINVAL;
|
|
|
|
}
|
|
|
|
|
|
|
|
len_of_ctxts = len_of_smb - offset;
|
|
|
|
|
|
|
|
for (i = 0; i < ctxt_cnt; i++) {
|
|
|
|
int clen;
|
|
|
|
/* check that offset is not beyond end of SMB */
|
|
|
|
if (len_of_ctxts == 0)
|
|
|
|
break;
|
|
|
|
|
|
|
|
if (len_of_ctxts < sizeof(struct smb2_neg_context))
|
|
|
|
break;
|
|
|
|
|
2018-06-01 08:53:07 +08:00
|
|
|
pctx = (struct smb2_neg_context *)(offset + (char *)rsp);
|
2018-04-09 23:47:14 +08:00
|
|
|
clen = le16_to_cpu(pctx->DataLength);
|
|
|
|
if (clen > len_of_ctxts)
|
|
|
|
break;
|
|
|
|
|
|
|
|
if (pctx->ContextType == SMB2_PREAUTH_INTEGRITY_CAPABILITIES)
|
|
|
|
decode_preauth_context(
|
|
|
|
(struct smb2_preauth_neg_context *)pctx);
|
|
|
|
else if (pctx->ContextType == SMB2_ENCRYPTION_CAPABILITIES)
|
|
|
|
rc = decode_encrypt_ctx(server,
|
|
|
|
(struct smb2_encryption_neg_context *)pctx);
|
2019-04-27 11:36:08 +08:00
|
|
|
else if (pctx->ContextType == SMB2_COMPRESSION_CAPABILITIES)
|
|
|
|
decode_compress_ctx(server,
|
|
|
|
(struct smb2_compression_capabilities_context *)pctx);
|
2018-05-20 09:45:27 +08:00
|
|
|
else if (pctx->ContextType == SMB2_POSIX_EXTENSIONS_AVAILABLE)
|
|
|
|
server->posix_ext_supported = true;
|
2021-07-06 04:05:39 +08:00
|
|
|
else if (pctx->ContextType == SMB2_SIGNING_CAPABILITIES)
|
|
|
|
decode_signing_ctx(server,
|
|
|
|
(struct smb2_signing_capabilities *)pctx);
|
2018-04-09 23:47:14 +08:00
|
|
|
else
|
2019-08-28 15:15:35 +08:00
|
|
|
cifs_server_dbg(VFS, "unknown negcontext of type %d ignored\n",
|
2018-04-09 23:47:14 +08:00
|
|
|
le16_to_cpu(pctx->ContextType));
|
|
|
|
|
|
|
|
if (rc)
|
|
|
|
break;
|
|
|
|
/* offsets must be 8 byte aligned */
|
|
|
|
clen = (clen + 7) & ~0x7;
|
|
|
|
offset += clen + sizeof(struct smb2_neg_context);
|
|
|
|
len_of_ctxts -= clen;
|
|
|
|
}
|
|
|
|
return rc;
|
|
|
|
}
|
|
|
|
|
2018-06-01 08:16:54 +08:00
|
|
|
static struct create_posix *
|
|
|
|
create_posix_buf(umode_t mode)
|
|
|
|
{
|
|
|
|
struct create_posix *buf;
|
|
|
|
|
|
|
|
buf = kzalloc(sizeof(struct create_posix),
|
|
|
|
GFP_KERNEL);
|
|
|
|
if (!buf)
|
|
|
|
return NULL;
|
|
|
|
|
|
|
|
buf->ccontext.DataOffset =
|
|
|
|
cpu_to_le16(offsetof(struct create_posix, Mode));
|
|
|
|
buf->ccontext.DataLength = cpu_to_le32(4);
|
|
|
|
buf->ccontext.NameOffset =
|
|
|
|
cpu_to_le16(offsetof(struct create_posix, Name));
|
|
|
|
buf->ccontext.NameLength = cpu_to_le16(16);
|
|
|
|
|
|
|
|
/* SMB2_CREATE_TAG_POSIX is "0x93AD25509CB411E7B42383DE968BCD7C" */
|
|
|
|
buf->Name[0] = 0x93;
|
|
|
|
buf->Name[1] = 0xAD;
|
|
|
|
buf->Name[2] = 0x25;
|
|
|
|
buf->Name[3] = 0x50;
|
|
|
|
buf->Name[4] = 0x9C;
|
|
|
|
buf->Name[5] = 0xB4;
|
|
|
|
buf->Name[6] = 0x11;
|
|
|
|
buf->Name[7] = 0xE7;
|
|
|
|
buf->Name[8] = 0xB4;
|
|
|
|
buf->Name[9] = 0x23;
|
|
|
|
buf->Name[10] = 0x83;
|
|
|
|
buf->Name[11] = 0xDE;
|
|
|
|
buf->Name[12] = 0x96;
|
|
|
|
buf->Name[13] = 0x8B;
|
|
|
|
buf->Name[14] = 0xCD;
|
|
|
|
buf->Name[15] = 0x7C;
|
|
|
|
buf->Mode = cpu_to_le32(mode);
|
2020-04-15 13:42:53 +08:00
|
|
|
cifs_dbg(FYI, "mode on posix create 0%o\n", mode);
|
2018-06-01 08:16:54 +08:00
|
|
|
return buf;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int
|
|
|
|
add_posix_context(struct kvec *iov, unsigned int *num_iovec, umode_t mode)
|
|
|
|
{
|
|
|
|
struct smb2_create_req *req = iov[0].iov_base;
|
|
|
|
unsigned int num = *num_iovec;
|
|
|
|
|
|
|
|
iov[num].iov_base = create_posix_buf(mode);
|
2019-10-05 23:53:58 +08:00
|
|
|
if (mode == ACL_NO_MODE)
|
2020-04-15 13:42:53 +08:00
|
|
|
cifs_dbg(FYI, "Invalid mode\n");
|
2018-06-01 08:16:54 +08:00
|
|
|
if (iov[num].iov_base == NULL)
|
|
|
|
return -ENOMEM;
|
|
|
|
iov[num].iov_len = sizeof(struct create_posix);
|
|
|
|
if (!req->CreateContextsOffset)
|
|
|
|
req->CreateContextsOffset = cpu_to_le32(
|
|
|
|
sizeof(struct smb2_create_req) +
|
|
|
|
iov[num - 1].iov_len);
|
|
|
|
le32_add_cpu(&req->CreateContextsLength, sizeof(struct create_posix));
|
|
|
|
*num_iovec = num + 1;
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2015-06-18 17:49:47 +08:00
|
|
|
|
2011-12-27 20:12:43 +08:00
|
|
|
/*
|
|
|
|
*
|
|
|
|
* SMB2 Worker functions follow:
|
|
|
|
*
|
|
|
|
* The general structure of the worker functions is:
|
|
|
|
* 1) Call smb2_init (assembles SMB2 header)
|
|
|
|
* 2) Initialize SMB2 command specific fields in fixed length area of SMB
|
|
|
|
* 3) Call smb_sendrcv2 (sends request on socket and waits for response)
|
|
|
|
* 4) Decode SMB2 command specific fields in the fixed length area
|
|
|
|
* 5) Decode variable length data area (if any for this SMB2 command type)
|
|
|
|
* 6) Call free smb buffer
|
|
|
|
* 7) return
|
|
|
|
*
|
|
|
|
*/
|
|
|
|
|
|
|
|
int
|
2021-07-19 21:54:16 +08:00
|
|
|
SMB2_negotiate(const unsigned int xid,
|
|
|
|
struct cifs_ses *ses,
|
|
|
|
struct TCP_Server_Info *server)
|
2011-12-27 20:12:43 +08:00
|
|
|
{
|
2018-06-12 06:00:59 +08:00
|
|
|
struct smb_rqst rqst;
|
2011-12-27 20:12:43 +08:00
|
|
|
struct smb2_negotiate_req *req;
|
|
|
|
struct smb2_negotiate_rsp *rsp;
|
|
|
|
struct kvec iov[1];
|
2016-10-26 02:38:47 +08:00
|
|
|
struct kvec rsp_iov;
|
2011-12-27 20:12:43 +08:00
|
|
|
int rc = 0;
|
|
|
|
int resp_buftype;
|
|
|
|
int blob_offset, blob_length;
|
|
|
|
char *security_blob;
|
|
|
|
int flags = CIFS_NEG_OP;
|
2017-11-20 08:24:30 +08:00
|
|
|
unsigned int total_len;
|
2011-12-27 20:12:43 +08:00
|
|
|
|
2013-05-05 11:12:25 +08:00
|
|
|
cifs_dbg(FYI, "Negotiate protocol\n");
|
2011-12-27 20:12:43 +08:00
|
|
|
|
2013-05-24 19:41:01 +08:00
|
|
|
if (!server) {
|
|
|
|
WARN(1, "%s: server is NULL!\n", __func__);
|
|
|
|
return -EIO;
|
2011-12-27 20:12:43 +08:00
|
|
|
}
|
|
|
|
|
2020-06-01 01:38:22 +08:00
|
|
|
rc = smb2_plain_req_init(SMB2_NEGOTIATE, NULL, server,
|
|
|
|
(void **) &req, &total_len);
|
2011-12-27 20:12:43 +08:00
|
|
|
if (rc)
|
|
|
|
return rc;
|
|
|
|
|
2021-11-05 07:39:01 +08:00
|
|
|
req->hdr.SessionId = 0;
|
2018-06-29 08:30:23 +08:00
|
|
|
|
2018-02-17 02:19:29 +08:00
|
|
|
memset(server->preauth_sha_hash, 0, SMB2_PREAUTH_HASH_SIZE);
|
|
|
|
memset(ses->preauth_sha_hash, 0, SMB2_PREAUTH_HASH_SIZE);
|
2011-12-27 20:12:43 +08:00
|
|
|
|
2019-09-20 12:22:14 +08:00
|
|
|
if (strcmp(server->vals->version_string,
|
2017-09-17 23:41:35 +08:00
|
|
|
SMB3ANY_VERSION_STRING) == 0) {
|
|
|
|
req->Dialects[0] = cpu_to_le16(SMB30_PROT_ID);
|
|
|
|
req->Dialects[1] = cpu_to_le16(SMB302_PROT_ID);
|
2021-02-02 14:03:58 +08:00
|
|
|
req->Dialects[2] = cpu_to_le16(SMB311_PROT_ID);
|
|
|
|
req->DialectCount = cpu_to_le16(3);
|
|
|
|
total_len += 6;
|
2019-08-28 15:15:35 +08:00
|
|
|
} else if (strcmp(server->vals->version_string,
|
2017-09-17 23:41:35 +08:00
|
|
|
SMBDEFAULT_VERSION_STRING) == 0) {
|
|
|
|
req->Dialects[0] = cpu_to_le16(SMB21_PROT_ID);
|
|
|
|
req->Dialects[1] = cpu_to_le16(SMB30_PROT_ID);
|
|
|
|
req->Dialects[2] = cpu_to_le16(SMB302_PROT_ID);
|
2019-01-03 16:37:21 +08:00
|
|
|
req->Dialects[3] = cpu_to_le16(SMB311_PROT_ID);
|
|
|
|
req->DialectCount = cpu_to_le16(4);
|
|
|
|
total_len += 8;
|
2017-09-17 23:41:35 +08:00
|
|
|
} else {
|
|
|
|
/* otherwise send specific dialect */
|
2019-09-20 12:22:14 +08:00
|
|
|
req->Dialects[0] = cpu_to_le16(server->vals->protocol_id);
|
2017-09-17 23:41:35 +08:00
|
|
|
req->DialectCount = cpu_to_le16(1);
|
2017-11-20 08:24:30 +08:00
|
|
|
total_len += 2;
|
2017-09-17 23:41:35 +08:00
|
|
|
}
|
2011-12-27 20:12:43 +08:00
|
|
|
|
|
|
|
/* only one of SMB2 signing flags may be set in SMB2 request */
|
2013-05-26 19:01:00 +08:00
|
|
|
if (ses->sign)
|
2013-06-13 08:59:03 +08:00
|
|
|
req->SecurityMode = cpu_to_le16(SMB2_NEGOTIATE_SIGNING_REQUIRED);
|
2013-05-26 19:01:00 +08:00
|
|
|
else if (global_secflags & CIFSSEC_MAY_SIGN)
|
2013-06-13 08:59:03 +08:00
|
|
|
req->SecurityMode = cpu_to_le16(SMB2_NEGOTIATE_SIGNING_ENABLED);
|
2013-05-26 19:01:00 +08:00
|
|
|
else
|
|
|
|
req->SecurityMode = 0;
|
2011-12-27 20:12:43 +08:00
|
|
|
|
2019-08-28 15:15:35 +08:00
|
|
|
req->Capabilities = cpu_to_le32(server->vals->req_capabilities);
|
2021-05-08 07:24:11 +08:00
|
|
|
if (ses->chan_max > 1)
|
|
|
|
req->Capabilities |= cpu_to_le32(SMB2_GLOBAL_CAP_MULTI_CHANNEL);
|
2011-12-27 20:12:43 +08:00
|
|
|
|
2014-05-14 04:37:45 +08:00
|
|
|
/* ClientGUID must be zero for SMB2.02 dialect */
|
2019-08-28 15:15:35 +08:00
|
|
|
if (server->vals->protocol_id == SMB20_PROT_ID)
|
2014-05-14 04:37:45 +08:00
|
|
|
memset(req->ClientGUID, 0, SMB2_CLIENT_GUID_SIZE);
|
2015-06-18 17:49:47 +08:00
|
|
|
else {
|
2014-05-14 04:37:45 +08:00
|
|
|
memcpy(req->ClientGUID, server->client_guid,
|
|
|
|
SMB2_CLIENT_GUID_SIZE);
|
2019-08-28 15:15:35 +08:00
|
|
|
if ((server->vals->protocol_id == SMB311_PROT_ID) ||
|
2021-02-02 14:03:58 +08:00
|
|
|
(strcmp(server->vals->version_string,
|
|
|
|
SMB3ANY_VERSION_STRING) == 0) ||
|
2019-08-28 15:15:35 +08:00
|
|
|
(strcmp(server->vals->version_string,
|
2019-01-03 16:37:21 +08:00
|
|
|
SMBDEFAULT_VERSION_STRING) == 0))
|
2019-06-25 09:39:04 +08:00
|
|
|
assemble_neg_contexts(req, server, &total_len);
|
2015-06-18 17:49:47 +08:00
|
|
|
}
|
2011-12-27 20:12:43 +08:00
|
|
|
iov[0].iov_base = (char *)req;
|
2017-11-20 08:24:30 +08:00
|
|
|
iov[0].iov_len = total_len;
|
2011-12-27 20:12:43 +08:00
|
|
|
|
2018-06-12 06:00:59 +08:00
|
|
|
memset(&rqst, 0, sizeof(struct smb_rqst));
|
|
|
|
rqst.rq_iov = iov;
|
|
|
|
rqst.rq_nvec = 1;
|
|
|
|
|
2020-06-01 01:38:22 +08:00
|
|
|
rc = cifs_send_recv(xid, ses, server,
|
|
|
|
&rqst, &resp_buftype, flags, &rsp_iov);
|
2016-10-26 02:38:47 +08:00
|
|
|
cifs_small_buf_release(req);
|
|
|
|
rsp = (struct smb2_negotiate_rsp *)rsp_iov.iov_base;
|
2011-12-27 20:12:43 +08:00
|
|
|
/*
|
|
|
|
* No tcon so can't do
|
|
|
|
* cifs_stats_inc(&tcon->stats.smb2_stats.smb2_com_fail[SMB2...]);
|
|
|
|
*/
|
2017-09-01 10:34:24 +08:00
|
|
|
if (rc == -EOPNOTSUPP) {
|
2020-04-15 13:42:53 +08:00
|
|
|
cifs_server_dbg(VFS, "Dialect not supported by server. Consider specifying vers=1.0 or vers=2.0 on mount for accessing older servers\n");
|
2017-09-01 10:34:24 +08:00
|
|
|
goto neg_exit;
|
|
|
|
} else if (rc != 0)
|
2011-12-27 20:12:43 +08:00
|
|
|
goto neg_exit;
|
|
|
|
|
2019-08-28 15:15:35 +08:00
|
|
|
if (strcmp(server->vals->version_string,
|
2017-09-17 23:41:35 +08:00
|
|
|
SMB3ANY_VERSION_STRING) == 0) {
|
|
|
|
if (rsp->DialectRevision == cpu_to_le16(SMB20_PROT_ID)) {
|
2019-08-28 15:15:35 +08:00
|
|
|
cifs_server_dbg(VFS,
|
2017-09-17 23:41:35 +08:00
|
|
|
"SMB2 dialect returned but not requested\n");
|
|
|
|
return -EIO;
|
|
|
|
} else if (rsp->DialectRevision == cpu_to_le16(SMB21_PROT_ID)) {
|
2019-08-28 15:15:35 +08:00
|
|
|
cifs_server_dbg(VFS,
|
2017-09-17 23:41:35 +08:00
|
|
|
"SMB2.1 dialect returned but not requested\n");
|
|
|
|
return -EIO;
|
2021-02-02 14:03:58 +08:00
|
|
|
} else if (rsp->DialectRevision == cpu_to_le16(SMB311_PROT_ID)) {
|
|
|
|
/* ops set to 3.0 by default for default so update */
|
|
|
|
server->ops = &smb311_operations;
|
|
|
|
server->vals = &smb311_values;
|
2017-09-17 23:41:35 +08:00
|
|
|
}
|
2019-08-28 15:15:35 +08:00
|
|
|
} else if (strcmp(server->vals->version_string,
|
2017-09-17 23:41:35 +08:00
|
|
|
SMBDEFAULT_VERSION_STRING) == 0) {
|
|
|
|
if (rsp->DialectRevision == cpu_to_le16(SMB20_PROT_ID)) {
|
2019-08-28 15:15:35 +08:00
|
|
|
cifs_server_dbg(VFS,
|
2017-09-17 23:41:35 +08:00
|
|
|
"SMB2 dialect returned but not requested\n");
|
|
|
|
return -EIO;
|
|
|
|
} else if (rsp->DialectRevision == cpu_to_le16(SMB21_PROT_ID)) {
|
|
|
|
/* ops set to 3.0 by default for default so update */
|
2019-08-28 15:15:35 +08:00
|
|
|
server->ops = &smb21_operations;
|
|
|
|
server->vals = &smb21_values;
|
cifs: Fix lease buffer length error
There is a KASAN slab-out-of-bounds:
BUG: KASAN: slab-out-of-bounds in _copy_from_iter_full+0x783/0xaa0
Read of size 80 at addr ffff88810c35e180 by task mount.cifs/539
CPU: 1 PID: 539 Comm: mount.cifs Not tainted 4.19 #10
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS
rel-1.12.0-0-ga698c8995f-prebuilt.qemu.org 04/01/2014
Call Trace:
dump_stack+0xdd/0x12a
print_address_description+0xa7/0x540
kasan_report+0x1ff/0x550
check_memory_region+0x2f1/0x310
memcpy+0x2f/0x80
_copy_from_iter_full+0x783/0xaa0
tcp_sendmsg_locked+0x1840/0x4140
tcp_sendmsg+0x37/0x60
inet_sendmsg+0x18c/0x490
sock_sendmsg+0xae/0x130
smb_send_kvec+0x29c/0x520
__smb_send_rqst+0x3ef/0xc60
smb_send_rqst+0x25a/0x2e0
compound_send_recv+0x9e8/0x2af0
cifs_send_recv+0x24/0x30
SMB2_open+0x35e/0x1620
open_shroot+0x27b/0x490
smb2_open_op_close+0x4e1/0x590
smb2_query_path_info+0x2ac/0x650
cifs_get_inode_info+0x1058/0x28f0
cifs_root_iget+0x3bb/0xf80
cifs_smb3_do_mount+0xe00/0x14c0
cifs_do_mount+0x15/0x20
mount_fs+0x5e/0x290
vfs_kern_mount+0x88/0x460
do_mount+0x398/0x31e0
ksys_mount+0xc6/0x150
__x64_sys_mount+0xea/0x190
do_syscall_64+0x122/0x590
entry_SYSCALL_64_after_hwframe+0x44/0xa9
It can be reproduced by the following step:
1. samba configured with: server max protocol = SMB2_10
2. mount -o vers=default
When parse the mount version parameter, the 'ops' and 'vals'
was setted to smb30, if negotiate result is smb21, just
update the 'ops' to smb21, but the 'vals' is still smb30.
When add lease context, the iov_base is allocated with smb21
ops, but the iov_len is initiallited with the smb30. Because
the iov_len is longer than iov_base, when send the message,
copy array out of bounds.
we need to keep the 'ops' and 'vals' consistent.
Fixes: 9764c02fcbad ("SMB3: Add support for multidialect negotiate (SMB2.1 and later)")
Fixes: d5c7076b772a ("smb3: add smb3.1.1 to default dialect list")
Signed-off-by: ZhangXiaoxu <zhangxiaoxu5@huawei.com>
Signed-off-by: Steve French <stfrench@microsoft.com>
CC: Stable <stable@vger.kernel.org>
Reviewed-by: Pavel Shilovsky <pshilov@microsoft.com>
2019-04-06 15:30:38 +08:00
|
|
|
} else if (rsp->DialectRevision == cpu_to_le16(SMB311_PROT_ID)) {
|
2019-08-28 15:15:35 +08:00
|
|
|
server->ops = &smb311_operations;
|
|
|
|
server->vals = &smb311_values;
|
cifs: Fix lease buffer length error
There is a KASAN slab-out-of-bounds:
BUG: KASAN: slab-out-of-bounds in _copy_from_iter_full+0x783/0xaa0
Read of size 80 at addr ffff88810c35e180 by task mount.cifs/539
CPU: 1 PID: 539 Comm: mount.cifs Not tainted 4.19 #10
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS
rel-1.12.0-0-ga698c8995f-prebuilt.qemu.org 04/01/2014
Call Trace:
dump_stack+0xdd/0x12a
print_address_description+0xa7/0x540
kasan_report+0x1ff/0x550
check_memory_region+0x2f1/0x310
memcpy+0x2f/0x80
_copy_from_iter_full+0x783/0xaa0
tcp_sendmsg_locked+0x1840/0x4140
tcp_sendmsg+0x37/0x60
inet_sendmsg+0x18c/0x490
sock_sendmsg+0xae/0x130
smb_send_kvec+0x29c/0x520
__smb_send_rqst+0x3ef/0xc60
smb_send_rqst+0x25a/0x2e0
compound_send_recv+0x9e8/0x2af0
cifs_send_recv+0x24/0x30
SMB2_open+0x35e/0x1620
open_shroot+0x27b/0x490
smb2_open_op_close+0x4e1/0x590
smb2_query_path_info+0x2ac/0x650
cifs_get_inode_info+0x1058/0x28f0
cifs_root_iget+0x3bb/0xf80
cifs_smb3_do_mount+0xe00/0x14c0
cifs_do_mount+0x15/0x20
mount_fs+0x5e/0x290
vfs_kern_mount+0x88/0x460
do_mount+0x398/0x31e0
ksys_mount+0xc6/0x150
__x64_sys_mount+0xea/0x190
do_syscall_64+0x122/0x590
entry_SYSCALL_64_after_hwframe+0x44/0xa9
It can be reproduced by the following step:
1. samba configured with: server max protocol = SMB2_10
2. mount -o vers=default
When parse the mount version parameter, the 'ops' and 'vals'
was setted to smb30, if negotiate result is smb21, just
update the 'ops' to smb21, but the 'vals' is still smb30.
When add lease context, the iov_base is allocated with smb21
ops, but the iov_len is initiallited with the smb30. Because
the iov_len is longer than iov_base, when send the message,
copy array out of bounds.
we need to keep the 'ops' and 'vals' consistent.
Fixes: 9764c02fcbad ("SMB3: Add support for multidialect negotiate (SMB2.1 and later)")
Fixes: d5c7076b772a ("smb3: add smb3.1.1 to default dialect list")
Signed-off-by: ZhangXiaoxu <zhangxiaoxu5@huawei.com>
Signed-off-by: Steve French <stfrench@microsoft.com>
CC: Stable <stable@vger.kernel.org>
Reviewed-by: Pavel Shilovsky <pshilov@microsoft.com>
2019-04-06 15:30:38 +08:00
|
|
|
}
|
2017-09-20 00:43:47 +08:00
|
|
|
} else if (le16_to_cpu(rsp->DialectRevision) !=
|
2019-08-28 15:15:35 +08:00
|
|
|
server->vals->protocol_id) {
|
2017-09-17 23:41:35 +08:00
|
|
|
/* if requested single dialect ensure returned dialect matched */
|
2020-04-15 13:42:53 +08:00
|
|
|
cifs_server_dbg(VFS, "Invalid 0x%x dialect returned: not requested\n",
|
|
|
|
le16_to_cpu(rsp->DialectRevision));
|
2017-09-17 23:41:35 +08:00
|
|
|
return -EIO;
|
|
|
|
}
|
|
|
|
|
2013-05-05 11:12:25 +08:00
|
|
|
cifs_dbg(FYI, "mode 0x%x\n", rsp->SecurityMode);
|
2011-12-27 20:12:43 +08:00
|
|
|
|
2012-10-02 01:26:22 +08:00
|
|
|
if (rsp->DialectRevision == cpu_to_le16(SMB20_PROT_ID))
|
2013-05-05 11:12:25 +08:00
|
|
|
cifs_dbg(FYI, "negotiated smb2.0 dialect\n");
|
2012-10-02 01:26:22 +08:00
|
|
|
else if (rsp->DialectRevision == cpu_to_le16(SMB21_PROT_ID))
|
2013-05-05 11:12:25 +08:00
|
|
|
cifs_dbg(FYI, "negotiated smb2.1 dialect\n");
|
2012-10-02 01:26:22 +08:00
|
|
|
else if (rsp->DialectRevision == cpu_to_le16(SMB30_PROT_ID))
|
2013-05-05 11:12:25 +08:00
|
|
|
cifs_dbg(FYI, "negotiated smb3.0 dialect\n");
|
2013-06-13 11:48:41 +08:00
|
|
|
else if (rsp->DialectRevision == cpu_to_le16(SMB302_PROT_ID))
|
|
|
|
cifs_dbg(FYI, "negotiated smb3.02 dialect\n");
|
2014-12-18 12:52:58 +08:00
|
|
|
else if (rsp->DialectRevision == cpu_to_le16(SMB311_PROT_ID))
|
|
|
|
cifs_dbg(FYI, "negotiated smb3.1.1 dialect\n");
|
2011-12-27 20:12:43 +08:00
|
|
|
else {
|
2020-04-15 13:42:53 +08:00
|
|
|
cifs_server_dbg(VFS, "Invalid dialect returned by server 0x%x\n",
|
|
|
|
le16_to_cpu(rsp->DialectRevision));
|
2011-12-27 20:12:43 +08:00
|
|
|
rc = -EIO;
|
|
|
|
goto neg_exit;
|
|
|
|
}
|
|
|
|
server->dialect = le16_to_cpu(rsp->DialectRevision);
|
|
|
|
|
2018-02-17 02:19:29 +08:00
|
|
|
/*
|
|
|
|
* Keep a copy of the hash after negprot. This hash will be
|
|
|
|
* the starting hash value for all sessions made from this
|
|
|
|
* server.
|
|
|
|
*/
|
|
|
|
memcpy(server->preauth_sha_hash, ses->preauth_sha_hash,
|
|
|
|
SMB2_PREAUTH_HASH_SIZE);
|
2018-06-29 08:30:23 +08:00
|
|
|
|
2013-05-26 19:00:59 +08:00
|
|
|
/* SMB2 only has an extended negflavor */
|
|
|
|
server->negflavor = CIFS_NEGFLAVOR_EXTENDED;
|
2014-02-14 17:31:02 +08:00
|
|
|
/* set it to the maximum buffer size value we can send with 1 credit */
|
|
|
|
server->maxBuf = min_t(unsigned int, le32_to_cpu(rsp->MaxTransactSize),
|
|
|
|
SMB2_MAX_BUFFER_SIZE);
|
2011-12-27 20:12:43 +08:00
|
|
|
server->max_read = le32_to_cpu(rsp->MaxReadSize);
|
|
|
|
server->max_write = le32_to_cpu(rsp->MaxWriteSize);
|
|
|
|
server->sec_mode = le16_to_cpu(rsp->SecurityMode);
|
2018-04-02 09:15:55 +08:00
|
|
|
if ((server->sec_mode & SMB2_SEC_MODE_FLAGS_ALL) != server->sec_mode)
|
|
|
|
cifs_dbg(FYI, "Server returned unexpected security mode 0x%x\n",
|
|
|
|
server->sec_mode);
|
2011-12-27 20:12:43 +08:00
|
|
|
server->capabilities = le32_to_cpu(rsp->Capabilities);
|
2012-07-13 17:58:14 +08:00
|
|
|
/* Internal types */
|
|
|
|
server->capabilities |= SMB2_NT_FIND | SMB2_LARGE_FILES;
|
2011-12-27 20:12:43 +08:00
|
|
|
|
2021-05-21 23:19:27 +08:00
|
|
|
/*
|
|
|
|
* SMB3.0 supports only 1 cipher and doesn't have a encryption neg context
|
|
|
|
* Set the cipher type manually.
|
|
|
|
*/
|
|
|
|
if (server->dialect == SMB30_PROT_ID && (server->capabilities & SMB2_GLOBAL_CAP_ENCRYPTION))
|
|
|
|
server->cipher_type = SMB2_ENCRYPTION_AES128_CCM;
|
|
|
|
|
2011-12-27 20:12:43 +08:00
|
|
|
security_blob = smb2_get_data_area_len(&blob_offset, &blob_length,
|
2021-11-05 07:39:01 +08:00
|
|
|
(struct smb2_hdr *)rsp);
|
2013-06-26 04:33:41 +08:00
|
|
|
/*
|
|
|
|
* See MS-SMB2 section 2.2.4: if no blob, client picks default which
|
|
|
|
* for us will be
|
|
|
|
* ses->sectype = RawNTLMSSP;
|
|
|
|
* but for time being this is our only auth choice so doesn't matter.
|
|
|
|
* We just found a server which sets blob length to zero expecting raw.
|
|
|
|
*/
|
2017-04-13 04:32:07 +08:00
|
|
|
if (blob_length == 0) {
|
2013-06-26 04:33:41 +08:00
|
|
|
cifs_dbg(FYI, "missing security blob on negprot\n");
|
2017-04-13 04:32:07 +08:00
|
|
|
server->sec_ntlmssp = true;
|
|
|
|
}
|
2012-09-19 07:20:30 +08:00
|
|
|
|
2013-05-26 19:01:00 +08:00
|
|
|
rc = cifs_enable_signing(server, ses->sign);
|
2013-05-26 19:00:58 +08:00
|
|
|
if (rc)
|
|
|
|
goto neg_exit;
|
2015-09-24 13:52:37 +08:00
|
|
|
if (blob_length) {
|
2014-10-21 01:48:23 +08:00
|
|
|
rc = decode_negTokenInit(security_blob, blob_length, server);
|
2015-09-24 13:52:37 +08:00
|
|
|
if (rc == 1)
|
|
|
|
rc = 0;
|
|
|
|
else if (rc == 0)
|
|
|
|
rc = -EIO;
|
2011-12-27 20:12:43 +08:00
|
|
|
}
|
2018-04-09 23:47:14 +08:00
|
|
|
|
|
|
|
if (rsp->DialectRevision == cpu_to_le16(SMB311_PROT_ID)) {
|
|
|
|
if (rsp->NegotiateContextCount)
|
2018-06-01 08:53:02 +08:00
|
|
|
rc = smb311_decode_neg_context(rsp, server,
|
|
|
|
rsp_iov.iov_len);
|
2018-04-09 23:47:14 +08:00
|
|
|
else
|
2019-08-28 15:15:35 +08:00
|
|
|
cifs_server_dbg(VFS, "Missing expected negotiate contexts\n");
|
2018-04-09 23:47:14 +08:00
|
|
|
}
|
2011-12-27 20:12:43 +08:00
|
|
|
neg_exit:
|
|
|
|
free_rsp_buf(resp_buftype, rsp);
|
|
|
|
return rc;
|
|
|
|
}
|
2011-12-27 20:22:00 +08:00
|
|
|
|
2013-11-20 13:44:46 +08:00
|
|
|
int smb3_validate_negotiate(const unsigned int xid, struct cifs_tcon *tcon)
|
|
|
|
{
|
2018-04-26 02:30:04 +08:00
|
|
|
int rc;
|
|
|
|
struct validate_negotiate_info_req *pneg_inbuf;
|
2017-10-20 20:49:37 +08:00
|
|
|
struct validate_negotiate_info_rsp *pneg_rsp = NULL;
|
2013-11-20 13:44:46 +08:00
|
|
|
u32 rsplen;
|
2017-09-17 23:41:35 +08:00
|
|
|
u32 inbuflen; /* max of 4 dialects */
|
2019-08-28 15:15:35 +08:00
|
|
|
struct TCP_Server_Info *server = tcon->ses->server;
|
2013-11-20 13:44:46 +08:00
|
|
|
|
|
|
|
cifs_dbg(FYI, "validate negotiate\n");
|
|
|
|
|
2018-02-17 02:19:29 +08:00
|
|
|
/* In SMB3.11 preauth integrity supersedes validate negotiate */
|
2019-08-28 15:15:35 +08:00
|
|
|
if (server->dialect == SMB311_PROT_ID)
|
2018-02-17 02:19:29 +08:00
|
|
|
return 0;
|
|
|
|
|
2013-11-20 13:44:46 +08:00
|
|
|
/*
|
|
|
|
* validation ioctl must be signed, so no point sending this if we
|
2017-09-21 08:57:18 +08:00
|
|
|
* can not sign it (ie are not known user). Even if signing is not
|
|
|
|
* required (enabled but not negotiated), in those cases we selectively
|
2013-11-20 13:44:46 +08:00
|
|
|
* sign just this, the first and only signed request on a connection.
|
2017-09-21 08:57:18 +08:00
|
|
|
* Having validation of negotiate info helps reduce attack vectors.
|
2013-11-20 13:44:46 +08:00
|
|
|
*/
|
2017-09-21 08:57:18 +08:00
|
|
|
if (tcon->ses->session_flags & SMB2_SESSION_FLAG_IS_GUEST)
|
2013-11-20 13:44:46 +08:00
|
|
|
return 0; /* validation requires signing */
|
|
|
|
|
2017-09-21 08:57:18 +08:00
|
|
|
if (tcon->ses->user_name == NULL) {
|
|
|
|
cifs_dbg(FYI, "Can't validate negotiate: null user mount\n");
|
|
|
|
return 0; /* validation requires signing */
|
|
|
|
}
|
|
|
|
|
|
|
|
if (tcon->ses->session_flags & SMB2_SESSION_FLAG_IS_NULL)
|
2019-09-04 10:32:41 +08:00
|
|
|
cifs_tcon_dbg(VFS, "Unexpected null user (anonymous) auth flag sent by server\n");
|
2017-09-21 08:57:18 +08:00
|
|
|
|
2018-04-26 02:30:04 +08:00
|
|
|
pneg_inbuf = kmalloc(sizeof(*pneg_inbuf), GFP_NOFS);
|
|
|
|
if (!pneg_inbuf)
|
|
|
|
return -ENOMEM;
|
|
|
|
|
|
|
|
pneg_inbuf->Capabilities =
|
2019-08-28 15:15:35 +08:00
|
|
|
cpu_to_le32(server->vals->req_capabilities);
|
2021-05-08 07:24:11 +08:00
|
|
|
if (tcon->ses->chan_max > 1)
|
|
|
|
pneg_inbuf->Capabilities |= cpu_to_le32(SMB2_GLOBAL_CAP_MULTI_CHANNEL);
|
|
|
|
|
2019-08-28 15:15:35 +08:00
|
|
|
memcpy(pneg_inbuf->Guid, server->client_guid,
|
2014-05-13 07:48:12 +08:00
|
|
|
SMB2_CLIENT_GUID_SIZE);
|
2013-11-20 13:44:46 +08:00
|
|
|
|
|
|
|
if (tcon->ses->sign)
|
2018-04-26 02:30:04 +08:00
|
|
|
pneg_inbuf->SecurityMode =
|
2013-11-20 13:44:46 +08:00
|
|
|
cpu_to_le16(SMB2_NEGOTIATE_SIGNING_REQUIRED);
|
|
|
|
else if (global_secflags & CIFSSEC_MAY_SIGN)
|
2018-04-26 02:30:04 +08:00
|
|
|
pneg_inbuf->SecurityMode =
|
2013-11-20 13:44:46 +08:00
|
|
|
cpu_to_le16(SMB2_NEGOTIATE_SIGNING_ENABLED);
|
|
|
|
else
|
2018-04-26 02:30:04 +08:00
|
|
|
pneg_inbuf->SecurityMode = 0;
|
2013-11-20 13:44:46 +08:00
|
|
|
|
2017-09-17 23:41:35 +08:00
|
|
|
|
2019-08-28 15:15:35 +08:00
|
|
|
if (strcmp(server->vals->version_string,
|
2017-09-17 23:41:35 +08:00
|
|
|
SMB3ANY_VERSION_STRING) == 0) {
|
2018-04-26 02:30:04 +08:00
|
|
|
pneg_inbuf->Dialects[0] = cpu_to_le16(SMB30_PROT_ID);
|
|
|
|
pneg_inbuf->Dialects[1] = cpu_to_le16(SMB302_PROT_ID);
|
2021-02-02 14:03:58 +08:00
|
|
|
pneg_inbuf->Dialects[2] = cpu_to_le16(SMB311_PROT_ID);
|
|
|
|
pneg_inbuf->DialectCount = cpu_to_le16(3);
|
|
|
|
/* SMB 2.1 not included so subtract one dialect from len */
|
2018-04-26 02:30:04 +08:00
|
|
|
inbuflen = sizeof(*pneg_inbuf) -
|
2021-02-02 14:03:58 +08:00
|
|
|
(sizeof(pneg_inbuf->Dialects[0]));
|
2019-08-28 15:15:35 +08:00
|
|
|
} else if (strcmp(server->vals->version_string,
|
2017-09-17 23:41:35 +08:00
|
|
|
SMBDEFAULT_VERSION_STRING) == 0) {
|
2018-04-26 02:30:04 +08:00
|
|
|
pneg_inbuf->Dialects[0] = cpu_to_le16(SMB21_PROT_ID);
|
|
|
|
pneg_inbuf->Dialects[1] = cpu_to_le16(SMB30_PROT_ID);
|
|
|
|
pneg_inbuf->Dialects[2] = cpu_to_le16(SMB302_PROT_ID);
|
2019-01-03 16:37:21 +08:00
|
|
|
pneg_inbuf->Dialects[3] = cpu_to_le16(SMB311_PROT_ID);
|
|
|
|
pneg_inbuf->DialectCount = cpu_to_le16(4);
|
2021-02-02 14:03:58 +08:00
|
|
|
/* structure is big enough for 4 dialects */
|
2018-04-26 02:30:04 +08:00
|
|
|
inbuflen = sizeof(*pneg_inbuf);
|
2017-09-17 23:41:35 +08:00
|
|
|
} else {
|
|
|
|
/* otherwise specific dialect was requested */
|
2018-04-26 02:30:04 +08:00
|
|
|
pneg_inbuf->Dialects[0] =
|
2019-08-28 15:15:35 +08:00
|
|
|
cpu_to_le16(server->vals->protocol_id);
|
2018-04-26 02:30:04 +08:00
|
|
|
pneg_inbuf->DialectCount = cpu_to_le16(1);
|
2017-09-17 23:41:35 +08:00
|
|
|
/* structure is big enough for 3 dialects, sending only 1 */
|
2018-04-26 02:30:04 +08:00
|
|
|
inbuflen = sizeof(*pneg_inbuf) -
|
|
|
|
sizeof(pneg_inbuf->Dialects[0]) * 2;
|
2017-09-17 23:41:35 +08:00
|
|
|
}
|
2013-11-20 13:44:46 +08:00
|
|
|
|
|
|
|
rc = SMB2_ioctl(xid, tcon, NO_FILE_ID, NO_FILE_ID,
|
|
|
|
FSCTL_VALIDATE_NEGOTIATE_INFO, true /* is_fsctl */,
|
2019-03-29 11:32:49 +08:00
|
|
|
(char *)pneg_inbuf, inbuflen, CIFSMaxBufSize,
|
|
|
|
(char **)&pneg_rsp, &rsplen);
|
2019-01-22 08:46:45 +08:00
|
|
|
if (rc == -EOPNOTSUPP) {
|
|
|
|
/*
|
|
|
|
* Old Windows versions or Netapp SMB server can return
|
|
|
|
* not supported error. Client should accept it.
|
|
|
|
*/
|
2019-09-04 10:32:41 +08:00
|
|
|
cifs_tcon_dbg(VFS, "Server does not support validate negotiate\n");
|
2019-05-17 16:12:33 +08:00
|
|
|
rc = 0;
|
|
|
|
goto out_free_inbuf;
|
2019-01-22 08:46:45 +08:00
|
|
|
} else if (rc != 0) {
|
2020-04-15 13:42:53 +08:00
|
|
|
cifs_tcon_dbg(VFS, "validate protocol negotiate failed: %d\n",
|
|
|
|
rc);
|
2018-04-26 02:30:04 +08:00
|
|
|
rc = -EIO;
|
|
|
|
goto out_free_inbuf;
|
2013-11-20 13:44:46 +08:00
|
|
|
}
|
|
|
|
|
2018-04-26 02:30:04 +08:00
|
|
|
rc = -EIO;
|
|
|
|
if (rsplen != sizeof(*pneg_rsp)) {
|
2020-04-15 13:42:53 +08:00
|
|
|
cifs_tcon_dbg(VFS, "Invalid protocol negotiate response size: %d\n",
|
|
|
|
rsplen);
|
2017-05-04 10:12:20 +08:00
|
|
|
|
|
|
|
/* relax check since Mac returns max bufsize allowed on ioctl */
|
2018-04-26 02:30:04 +08:00
|
|
|
if (rsplen > CIFSMaxBufSize || rsplen < sizeof(*pneg_rsp))
|
|
|
|
goto out_free_rsp;
|
2013-11-20 13:44:46 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
/* check validate negotiate info response matches what we got earlier */
|
2019-08-28 15:15:35 +08:00
|
|
|
if (pneg_rsp->Dialect != cpu_to_le16(server->dialect))
|
2013-11-20 13:44:46 +08:00
|
|
|
goto vneg_out;
|
|
|
|
|
2019-08-28 15:15:35 +08:00
|
|
|
if (pneg_rsp->SecurityMode != cpu_to_le16(server->sec_mode))
|
2013-11-20 13:44:46 +08:00
|
|
|
goto vneg_out;
|
|
|
|
|
|
|
|
/* do not validate server guid because not saved at negprot time yet */
|
|
|
|
|
|
|
|
if ((le32_to_cpu(pneg_rsp->Capabilities) | SMB2_NT_FIND |
|
2019-08-28 15:15:35 +08:00
|
|
|
SMB2_LARGE_FILES) != server->capabilities)
|
2013-11-20 13:44:46 +08:00
|
|
|
goto vneg_out;
|
|
|
|
|
|
|
|
/* validate negotiate successful */
|
2018-04-26 02:30:04 +08:00
|
|
|
rc = 0;
|
2013-11-20 13:44:46 +08:00
|
|
|
cifs_dbg(FYI, "validate negotiate info successful\n");
|
2018-04-26 02:30:04 +08:00
|
|
|
goto out_free_rsp;
|
2013-11-20 13:44:46 +08:00
|
|
|
|
|
|
|
vneg_out:
|
2019-09-04 10:32:41 +08:00
|
|
|
cifs_tcon_dbg(VFS, "protocol revalidation - security settings mismatch\n");
|
2018-04-26 02:30:04 +08:00
|
|
|
out_free_rsp:
|
2017-10-20 20:49:37 +08:00
|
|
|
kfree(pneg_rsp);
|
2018-04-26 02:30:04 +08:00
|
|
|
out_free_inbuf:
|
|
|
|
kfree(pneg_inbuf);
|
|
|
|
return rc;
|
2013-11-20 13:44:46 +08:00
|
|
|
}
|
|
|
|
|
2017-01-18 18:05:57 +08:00
|
|
|
enum securityEnum
|
|
|
|
smb2_select_sectype(struct TCP_Server_Info *server, enum securityEnum requested)
|
|
|
|
{
|
|
|
|
switch (requested) {
|
|
|
|
case Kerberos:
|
|
|
|
case RawNTLMSSP:
|
|
|
|
return requested;
|
|
|
|
case NTLMv2:
|
|
|
|
return RawNTLMSSP;
|
|
|
|
case Unspecified:
|
|
|
|
if (server->sec_ntlmssp &&
|
|
|
|
(global_secflags & CIFSSEC_MAY_NTLMSSP))
|
|
|
|
return RawNTLMSSP;
|
|
|
|
if ((server->sec_kerberos || server->sec_mskerberos) &&
|
|
|
|
(global_secflags & CIFSSEC_MAY_KRB5))
|
|
|
|
return Kerberos;
|
2020-08-24 06:36:59 +08:00
|
|
|
fallthrough;
|
2017-01-18 18:05:57 +08:00
|
|
|
default:
|
|
|
|
return Unspecified;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2016-10-08 02:11:21 +08:00
|
|
|
struct SMB2_sess_data {
|
|
|
|
unsigned int xid;
|
|
|
|
struct cifs_ses *ses;
|
2021-07-19 21:54:16 +08:00
|
|
|
struct TCP_Server_Info *server;
|
2016-10-08 02:11:21 +08:00
|
|
|
struct nls_table *nls_cp;
|
|
|
|
void (*func)(struct SMB2_sess_data *);
|
|
|
|
int result;
|
|
|
|
u64 previous_session;
|
|
|
|
|
|
|
|
/* we will send the SMB in three pieces:
|
|
|
|
* a fixed length beginning part, an optional
|
|
|
|
* SPNEGO blob (which can be zero length), and a
|
|
|
|
* last part which will include the strings
|
|
|
|
* and rest of bcc area. This allows us to avoid
|
|
|
|
* a large buffer 17K allocation
|
|
|
|
*/
|
|
|
|
int buf0_type;
|
|
|
|
struct kvec iov[2];
|
|
|
|
};
|
|
|
|
|
|
|
|
static int
|
|
|
|
SMB2_sess_alloc_buffer(struct SMB2_sess_data *sess_data)
|
|
|
|
{
|
|
|
|
int rc;
|
|
|
|
struct cifs_ses *ses = sess_data->ses;
|
2021-07-19 21:54:16 +08:00
|
|
|
struct TCP_Server_Info *server = sess_data->server;
|
2016-10-08 02:11:21 +08:00
|
|
|
struct smb2_sess_setup_req *req;
|
2017-11-20 08:24:36 +08:00
|
|
|
unsigned int total_len;
|
2021-07-19 21:54:16 +08:00
|
|
|
bool is_binding = false;
|
2016-10-08 02:11:21 +08:00
|
|
|
|
2020-06-01 01:38:22 +08:00
|
|
|
rc = smb2_plain_req_init(SMB2_SESSION_SETUP, NULL, server,
|
|
|
|
(void **) &req,
|
|
|
|
&total_len);
|
2016-10-08 02:11:21 +08:00
|
|
|
if (rc)
|
|
|
|
return rc;
|
|
|
|
|
2021-07-19 21:54:16 +08:00
|
|
|
spin_lock(&ses->chan_lock);
|
|
|
|
is_binding = !CIFS_ALL_CHANS_NEED_RECONNECT(ses);
|
|
|
|
spin_unlock(&ses->chan_lock);
|
|
|
|
|
|
|
|
if (is_binding) {
|
|
|
|
req->hdr.SessionId = cpu_to_le64(ses->Suid);
|
2021-11-05 07:39:01 +08:00
|
|
|
req->hdr.Flags |= SMB2_FLAGS_SIGNED;
|
2019-09-20 12:31:10 +08:00
|
|
|
req->PreviousSessionId = 0;
|
|
|
|
req->Flags = SMB2_SESSION_REQ_FLAG_BINDING;
|
2021-07-19 21:54:16 +08:00
|
|
|
cifs_dbg(FYI, "Binding to sess id: %llx\n", ses->Suid);
|
2019-09-20 12:31:10 +08:00
|
|
|
} else {
|
|
|
|
/* First session, not a reauthenticate */
|
2021-11-05 07:39:01 +08:00
|
|
|
req->hdr.SessionId = 0;
|
2019-09-20 12:31:10 +08:00
|
|
|
/*
|
|
|
|
* if reconnect, we need to send previous sess id
|
|
|
|
* otherwise it is 0
|
|
|
|
*/
|
2021-09-08 10:10:14 +08:00
|
|
|
req->PreviousSessionId = cpu_to_le64(sess_data->previous_session);
|
2019-09-20 12:31:10 +08:00
|
|
|
req->Flags = 0; /* MBZ */
|
2021-07-19 21:54:16 +08:00
|
|
|
cifs_dbg(FYI, "Fresh session. Previous: %llx\n",
|
|
|
|
sess_data->previous_session);
|
2019-09-20 12:31:10 +08:00
|
|
|
}
|
2018-06-14 06:05:58 +08:00
|
|
|
|
|
|
|
/* enough to enable echos and oplocks and one max size write */
|
2021-11-05 07:39:01 +08:00
|
|
|
req->hdr.CreditRequest = cpu_to_le16(130);
|
2016-10-08 02:11:21 +08:00
|
|
|
|
|
|
|
/* only one of SMB2 signing flags may be set in SMB2 request */
|
|
|
|
if (server->sign)
|
|
|
|
req->SecurityMode = SMB2_NEGOTIATE_SIGNING_REQUIRED;
|
|
|
|
else if (global_secflags & CIFSSEC_MAY_SIGN) /* one flag unlike MUST_ */
|
|
|
|
req->SecurityMode = SMB2_NEGOTIATE_SIGNING_ENABLED;
|
|
|
|
else
|
|
|
|
req->SecurityMode = 0;
|
|
|
|
|
2019-07-26 07:13:10 +08:00
|
|
|
#ifdef CONFIG_CIFS_DFS_UPCALL
|
|
|
|
req->Capabilities = cpu_to_le32(SMB2_GLOBAL_CAP_DFS);
|
|
|
|
#else
|
2016-10-08 02:11:21 +08:00
|
|
|
req->Capabilities = 0;
|
2019-07-26 07:13:10 +08:00
|
|
|
#endif /* DFS_UPCALL */
|
|
|
|
|
2016-10-08 02:11:21 +08:00
|
|
|
req->Channel = 0; /* MBZ */
|
|
|
|
|
|
|
|
sess_data->iov[0].iov_base = (char *)req;
|
2017-11-20 08:24:36 +08:00
|
|
|
/* 1 for pad */
|
|
|
|
sess_data->iov[0].iov_len = total_len - 1;
|
2016-10-08 02:11:21 +08:00
|
|
|
/*
|
|
|
|
* This variable will be used to clear the buffer
|
|
|
|
* allocated above in case of any error in the calling function.
|
|
|
|
*/
|
|
|
|
sess_data->buf0_type = CIFS_SMALL_BUFFER;
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
static void
|
|
|
|
SMB2_sess_free_buffer(struct SMB2_sess_data *sess_data)
|
|
|
|
{
|
|
|
|
free_rsp_buf(sess_data->buf0_type, sess_data->iov[0].iov_base);
|
|
|
|
sess_data->buf0_type = CIFS_NO_BUFFER;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int
|
|
|
|
SMB2_sess_sendreceive(struct SMB2_sess_data *sess_data)
|
|
|
|
{
|
|
|
|
int rc;
|
2018-06-12 06:00:59 +08:00
|
|
|
struct smb_rqst rqst;
|
2016-10-08 02:11:21 +08:00
|
|
|
struct smb2_sess_setup_req *req = sess_data->iov[0].iov_base;
|
2016-10-26 02:38:47 +08:00
|
|
|
struct kvec rsp_iov = { NULL, 0 };
|
2016-10-08 02:11:21 +08:00
|
|
|
|
|
|
|
/* Testing shows that buffer offset must be at location of Buffer[0] */
|
|
|
|
req->SecurityBufferOffset =
|
2017-11-20 08:24:36 +08:00
|
|
|
cpu_to_le16(sizeof(struct smb2_sess_setup_req) - 1 /* pad */);
|
2016-10-08 02:11:21 +08:00
|
|
|
req->SecurityBufferLength = cpu_to_le16(sess_data->iov[1].iov_len);
|
|
|
|
|
2018-06-12 06:00:59 +08:00
|
|
|
memset(&rqst, 0, sizeof(struct smb_rqst));
|
|
|
|
rqst.rq_iov = sess_data->iov;
|
|
|
|
rqst.rq_nvec = 2;
|
2016-10-08 02:11:21 +08:00
|
|
|
|
2018-06-12 06:00:59 +08:00
|
|
|
/* BB add code to build os and lm fields */
|
|
|
|
rc = cifs_send_recv(sess_data->xid, sess_data->ses,
|
2021-07-19 21:54:16 +08:00
|
|
|
sess_data->server,
|
2018-06-12 06:00:59 +08:00
|
|
|
&rqst,
|
2017-11-20 08:24:36 +08:00
|
|
|
&sess_data->buf0_type,
|
2021-02-04 14:49:52 +08:00
|
|
|
CIFS_LOG_ERROR | CIFS_SESS_OP, &rsp_iov);
|
2016-10-26 02:38:47 +08:00
|
|
|
cifs_small_buf_release(sess_data->iov[0].iov_base);
|
|
|
|
memcpy(&sess_data->iov[0], &rsp_iov, sizeof(struct kvec));
|
2016-10-08 02:11:21 +08:00
|
|
|
|
|
|
|
return rc;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int
|
|
|
|
SMB2_sess_establish_session(struct SMB2_sess_data *sess_data)
|
|
|
|
{
|
|
|
|
int rc = 0;
|
|
|
|
struct cifs_ses *ses = sess_data->ses;
|
2021-07-19 21:54:16 +08:00
|
|
|
struct TCP_Server_Info *server = sess_data->server;
|
2016-10-08 02:11:21 +08:00
|
|
|
|
2019-09-20 12:22:14 +08:00
|
|
|
mutex_lock(&server->srv_mutex);
|
|
|
|
if (server->ops->generate_signingkey) {
|
2021-07-19 21:54:16 +08:00
|
|
|
rc = server->ops->generate_signingkey(ses, server);
|
2016-10-08 02:11:21 +08:00
|
|
|
if (rc) {
|
|
|
|
cifs_dbg(FYI,
|
|
|
|
"SMB3 session key generation failed\n");
|
2019-09-20 12:22:14 +08:00
|
|
|
mutex_unlock(&server->srv_mutex);
|
2016-11-08 10:20:50 +08:00
|
|
|
return rc;
|
2016-10-08 02:11:21 +08:00
|
|
|
}
|
|
|
|
}
|
2019-09-20 12:22:14 +08:00
|
|
|
if (!server->session_estab) {
|
|
|
|
server->sequence_number = 0x2;
|
|
|
|
server->session_estab = true;
|
2016-10-08 02:11:21 +08:00
|
|
|
}
|
2019-09-20 12:22:14 +08:00
|
|
|
mutex_unlock(&server->srv_mutex);
|
2016-10-08 02:11:21 +08:00
|
|
|
|
|
|
|
cifs_dbg(FYI, "SMB2/3 session established successfully\n");
|
|
|
|
return rc;
|
|
|
|
}
|
|
|
|
|
|
|
|
#ifdef CONFIG_CIFS_UPCALL
|
|
|
|
static void
|
|
|
|
SMB2_auth_kerberos(struct SMB2_sess_data *sess_data)
|
|
|
|
{
|
|
|
|
int rc;
|
|
|
|
struct cifs_ses *ses = sess_data->ses;
|
2021-07-19 21:54:16 +08:00
|
|
|
struct TCP_Server_Info *server = sess_data->server;
|
2016-10-08 02:11:21 +08:00
|
|
|
struct cifs_spnego_msg *msg;
|
|
|
|
struct key *spnego_key = NULL;
|
|
|
|
struct smb2_sess_setup_rsp *rsp = NULL;
|
2021-07-19 21:54:16 +08:00
|
|
|
bool is_binding = false;
|
2016-10-08 02:11:21 +08:00
|
|
|
|
|
|
|
rc = SMB2_sess_alloc_buffer(sess_data);
|
|
|
|
if (rc)
|
|
|
|
goto out;
|
|
|
|
|
2021-07-19 21:54:16 +08:00
|
|
|
spnego_key = cifs_get_spnego_key(ses, server);
|
2016-10-08 02:11:21 +08:00
|
|
|
if (IS_ERR(spnego_key)) {
|
|
|
|
rc = PTR_ERR(spnego_key);
|
2020-07-16 13:34:21 +08:00
|
|
|
if (rc == -ENOKEY)
|
|
|
|
cifs_dbg(VFS, "Verify user has a krb5 ticket and keyutils is installed\n");
|
2016-10-08 02:11:21 +08:00
|
|
|
spnego_key = NULL;
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
|
|
|
|
msg = spnego_key->payload.data[0];
|
|
|
|
/*
|
|
|
|
* check version field to make sure that cifs.upcall is
|
|
|
|
* sending us a response in an expected form
|
|
|
|
*/
|
|
|
|
if (msg->version != CIFS_SPNEGO_UPCALL_VERSION) {
|
2020-04-15 13:42:53 +08:00
|
|
|
cifs_dbg(VFS, "bad cifs.upcall version. Expected %d got %d\n",
|
|
|
|
CIFS_SPNEGO_UPCALL_VERSION, msg->version);
|
2016-10-08 02:11:21 +08:00
|
|
|
rc = -EKEYREJECTED;
|
|
|
|
goto out_put_spnego_key;
|
|
|
|
}
|
|
|
|
|
2021-07-19 21:54:16 +08:00
|
|
|
spin_lock(&ses->chan_lock);
|
|
|
|
is_binding = !CIFS_ALL_CHANS_NEED_RECONNECT(ses);
|
|
|
|
spin_unlock(&ses->chan_lock);
|
|
|
|
|
2019-09-20 12:31:10 +08:00
|
|
|
/* keep session key if binding */
|
2021-07-19 21:54:16 +08:00
|
|
|
if (!is_binding) {
|
2019-09-20 12:31:10 +08:00
|
|
|
ses->auth_key.response = kmemdup(msg->data, msg->sesskey_len,
|
|
|
|
GFP_KERNEL);
|
|
|
|
if (!ses->auth_key.response) {
|
2020-04-15 13:42:53 +08:00
|
|
|
cifs_dbg(VFS, "Kerberos can't allocate (%u bytes) memory\n",
|
2019-09-20 12:31:10 +08:00
|
|
|
msg->sesskey_len);
|
|
|
|
rc = -ENOMEM;
|
|
|
|
goto out_put_spnego_key;
|
|
|
|
}
|
|
|
|
ses->auth_key.len = msg->sesskey_len;
|
2016-10-08 02:11:21 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
sess_data->iov[1].iov_base = msg->data + msg->sesskey_len;
|
|
|
|
sess_data->iov[1].iov_len = msg->secblob_len;
|
|
|
|
|
|
|
|
rc = SMB2_sess_sendreceive(sess_data);
|
|
|
|
if (rc)
|
|
|
|
goto out_put_spnego_key;
|
|
|
|
|
|
|
|
rsp = (struct smb2_sess_setup_rsp *)sess_data->iov[0].iov_base;
|
2019-09-20 12:31:10 +08:00
|
|
|
/* keep session id and flags if binding */
|
2021-07-19 21:54:16 +08:00
|
|
|
if (!is_binding) {
|
2021-11-05 07:39:01 +08:00
|
|
|
ses->Suid = le64_to_cpu(rsp->hdr.SessionId);
|
2019-09-20 12:31:10 +08:00
|
|
|
ses->session_flags = le16_to_cpu(rsp->SessionFlags);
|
|
|
|
}
|
2016-10-08 02:11:21 +08:00
|
|
|
|
|
|
|
rc = SMB2_sess_establish_session(sess_data);
|
|
|
|
out_put_spnego_key:
|
|
|
|
key_invalidate(spnego_key);
|
|
|
|
key_put(spnego_key);
|
|
|
|
out:
|
|
|
|
sess_data->result = rc;
|
|
|
|
sess_data->func = NULL;
|
|
|
|
SMB2_sess_free_buffer(sess_data);
|
|
|
|
}
|
|
|
|
#else
|
|
|
|
static void
|
|
|
|
SMB2_auth_kerberos(struct SMB2_sess_data *sess_data)
|
|
|
|
{
|
|
|
|
cifs_dbg(VFS, "Kerberos negotiated but upcall support disabled!\n");
|
|
|
|
sess_data->result = -EOPNOTSUPP;
|
|
|
|
sess_data->func = NULL;
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
|
2016-10-08 02:11:22 +08:00
|
|
|
static void
|
|
|
|
SMB2_sess_auth_rawntlmssp_authenticate(struct SMB2_sess_data *sess_data);
|
|
|
|
|
|
|
|
static void
|
|
|
|
SMB2_sess_auth_rawntlmssp_negotiate(struct SMB2_sess_data *sess_data)
|
2011-12-27 20:22:00 +08:00
|
|
|
{
|
2016-10-08 02:11:22 +08:00
|
|
|
int rc;
|
|
|
|
struct cifs_ses *ses = sess_data->ses;
|
2021-07-19 21:54:16 +08:00
|
|
|
struct TCP_Server_Info *server = sess_data->server;
|
2011-12-27 20:22:00 +08:00
|
|
|
struct smb2_sess_setup_rsp *rsp = NULL;
|
2021-11-06 03:03:57 +08:00
|
|
|
unsigned char *ntlmssp_blob = NULL;
|
2011-12-27 20:22:00 +08:00
|
|
|
bool use_spnego = false; /* else use raw ntlmssp */
|
2016-10-08 02:11:22 +08:00
|
|
|
u16 blob_length = 0;
|
2021-07-19 21:54:16 +08:00
|
|
|
bool is_binding = false;
|
2013-08-29 21:35:09 +08:00
|
|
|
|
2011-12-27 20:22:00 +08:00
|
|
|
/*
|
|
|
|
* If memory allocation is successful, caller of this function
|
|
|
|
* frees it.
|
|
|
|
*/
|
|
|
|
ses->ntlmssp = kmalloc(sizeof(struct ntlmssp_auth), GFP_KERNEL);
|
2016-10-08 02:11:22 +08:00
|
|
|
if (!ses->ntlmssp) {
|
|
|
|
rc = -ENOMEM;
|
|
|
|
goto out_err;
|
|
|
|
}
|
2013-08-29 21:35:10 +08:00
|
|
|
ses->ntlmssp->sesskey_per_smbsess = true;
|
2011-12-27 20:22:00 +08:00
|
|
|
|
2016-10-08 02:11:22 +08:00
|
|
|
rc = SMB2_sess_alloc_buffer(sess_data);
|
2011-12-27 20:22:00 +08:00
|
|
|
if (rc)
|
2016-10-08 02:11:22 +08:00
|
|
|
goto out_err;
|
2011-12-27 20:22:00 +08:00
|
|
|
|
2022-01-20 12:00:29 +08:00
|
|
|
rc = build_ntlmssp_smb3_negotiate_blob(&ntlmssp_blob,
|
2021-07-19 21:54:16 +08:00
|
|
|
&blob_length, ses, server,
|
2021-11-06 03:03:57 +08:00
|
|
|
sess_data->nls_cp);
|
|
|
|
if (rc)
|
|
|
|
goto out_err;
|
2016-09-21 11:56:13 +08:00
|
|
|
|
2016-10-08 02:11:22 +08:00
|
|
|
if (use_spnego) {
|
|
|
|
/* BB eventually need to add this */
|
|
|
|
cifs_dbg(VFS, "spnego not supported for SMB2 yet\n");
|
|
|
|
rc = -EOPNOTSUPP;
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
sess_data->iov[1].iov_base = ntlmssp_blob;
|
|
|
|
sess_data->iov[1].iov_len = blob_length;
|
2016-09-21 11:56:13 +08:00
|
|
|
|
2016-10-08 02:11:22 +08:00
|
|
|
rc = SMB2_sess_sendreceive(sess_data);
|
|
|
|
rsp = (struct smb2_sess_setup_rsp *)sess_data->iov[0].iov_base;
|
2011-12-27 20:22:00 +08:00
|
|
|
|
2016-10-08 02:11:22 +08:00
|
|
|
/* If true, rc here is expected and not an error */
|
|
|
|
if (sess_data->buf0_type != CIFS_NO_BUFFER &&
|
2021-11-05 07:39:01 +08:00
|
|
|
rsp->hdr.Status == STATUS_MORE_PROCESSING_REQUIRED)
|
2016-10-08 02:11:22 +08:00
|
|
|
rc = 0;
|
2013-05-26 19:01:00 +08:00
|
|
|
|
2016-10-08 02:11:22 +08:00
|
|
|
if (rc)
|
|
|
|
goto out;
|
2011-12-27 20:22:00 +08:00
|
|
|
|
2018-06-01 08:53:07 +08:00
|
|
|
if (offsetof(struct smb2_sess_setup_rsp, Buffer) !=
|
2016-10-08 02:11:22 +08:00
|
|
|
le16_to_cpu(rsp->SecurityBufferOffset)) {
|
|
|
|
cifs_dbg(VFS, "Invalid security buffer offset %d\n",
|
|
|
|
le16_to_cpu(rsp->SecurityBufferOffset));
|
2011-12-27 20:22:00 +08:00
|
|
|
rc = -EIO;
|
2016-10-08 02:11:22 +08:00
|
|
|
goto out;
|
2011-12-27 20:22:00 +08:00
|
|
|
}
|
2016-10-08 02:11:22 +08:00
|
|
|
rc = decode_ntlmssp_challenge(rsp->Buffer,
|
|
|
|
le16_to_cpu(rsp->SecurityBufferLength), ses);
|
|
|
|
if (rc)
|
|
|
|
goto out;
|
2011-12-27 20:22:00 +08:00
|
|
|
|
2016-10-08 02:11:22 +08:00
|
|
|
cifs_dbg(FYI, "rawntlmssp session setup challenge phase\n");
|
2011-12-27 20:22:00 +08:00
|
|
|
|
2021-07-19 21:54:16 +08:00
|
|
|
spin_lock(&ses->chan_lock);
|
|
|
|
is_binding = !CIFS_ALL_CHANS_NEED_RECONNECT(ses);
|
|
|
|
spin_unlock(&ses->chan_lock);
|
|
|
|
|
2019-09-20 12:31:10 +08:00
|
|
|
/* keep existing ses id and flags if binding */
|
2021-07-19 21:54:16 +08:00
|
|
|
if (!is_binding) {
|
2021-11-05 07:39:01 +08:00
|
|
|
ses->Suid = le64_to_cpu(rsp->hdr.SessionId);
|
2019-09-20 12:31:10 +08:00
|
|
|
ses->session_flags = le16_to_cpu(rsp->SessionFlags);
|
|
|
|
}
|
2016-10-08 02:11:22 +08:00
|
|
|
|
|
|
|
out:
|
|
|
|
kfree(ntlmssp_blob);
|
|
|
|
SMB2_sess_free_buffer(sess_data);
|
|
|
|
if (!rc) {
|
|
|
|
sess_data->result = 0;
|
|
|
|
sess_data->func = SMB2_sess_auth_rawntlmssp_authenticate;
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
out_err:
|
|
|
|
kfree(ses->ntlmssp);
|
|
|
|
ses->ntlmssp = NULL;
|
|
|
|
sess_data->result = rc;
|
|
|
|
sess_data->func = NULL;
|
|
|
|
}
|
2011-12-27 20:22:00 +08:00
|
|
|
|
2016-10-08 02:11:22 +08:00
|
|
|
static void
|
|
|
|
SMB2_sess_auth_rawntlmssp_authenticate(struct SMB2_sess_data *sess_data)
|
|
|
|
{
|
|
|
|
int rc;
|
|
|
|
struct cifs_ses *ses = sess_data->ses;
|
2021-07-19 21:54:16 +08:00
|
|
|
struct TCP_Server_Info *server = sess_data->server;
|
2016-10-08 02:11:22 +08:00
|
|
|
struct smb2_sess_setup_req *req;
|
|
|
|
struct smb2_sess_setup_rsp *rsp = NULL;
|
|
|
|
unsigned char *ntlmssp_blob = NULL;
|
|
|
|
bool use_spnego = false; /* else use raw ntlmssp */
|
|
|
|
u16 blob_length = 0;
|
2021-07-19 21:54:16 +08:00
|
|
|
bool is_binding = false;
|
2011-12-27 20:22:00 +08:00
|
|
|
|
2016-10-08 02:11:22 +08:00
|
|
|
rc = SMB2_sess_alloc_buffer(sess_data);
|
|
|
|
if (rc)
|
|
|
|
goto out;
|
2011-12-27 20:22:00 +08:00
|
|
|
|
2016-10-08 02:11:22 +08:00
|
|
|
req = (struct smb2_sess_setup_req *) sess_data->iov[0].iov_base;
|
2021-11-05 07:39:01 +08:00
|
|
|
req->hdr.SessionId = cpu_to_le64(ses->Suid);
|
2016-10-08 02:11:22 +08:00
|
|
|
|
2021-07-19 21:54:16 +08:00
|
|
|
rc = build_ntlmssp_auth_blob(&ntlmssp_blob, &blob_length,
|
|
|
|
ses, server,
|
|
|
|
sess_data->nls_cp);
|
2016-10-08 02:11:22 +08:00
|
|
|
if (rc) {
|
|
|
|
cifs_dbg(FYI, "build_ntlmssp_auth_blob failed %d\n", rc);
|
|
|
|
goto out;
|
2011-12-27 20:22:00 +08:00
|
|
|
}
|
|
|
|
|
2016-10-08 02:11:22 +08:00
|
|
|
if (use_spnego) {
|
|
|
|
/* BB eventually need to add this */
|
|
|
|
cifs_dbg(VFS, "spnego not supported for SMB2 yet\n");
|
|
|
|
rc = -EOPNOTSUPP;
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
sess_data->iov[1].iov_base = ntlmssp_blob;
|
|
|
|
sess_data->iov[1].iov_len = blob_length;
|
2011-12-27 20:22:00 +08:00
|
|
|
|
2016-10-08 02:11:22 +08:00
|
|
|
rc = SMB2_sess_sendreceive(sess_data);
|
|
|
|
if (rc)
|
|
|
|
goto out;
|
|
|
|
|
|
|
|
rsp = (struct smb2_sess_setup_rsp *)sess_data->iov[0].iov_base;
|
|
|
|
|
2021-07-19 21:54:16 +08:00
|
|
|
spin_lock(&ses->chan_lock);
|
|
|
|
is_binding = !CIFS_ALL_CHANS_NEED_RECONNECT(ses);
|
|
|
|
spin_unlock(&ses->chan_lock);
|
|
|
|
|
2019-09-20 12:31:10 +08:00
|
|
|
/* keep existing ses id and flags if binding */
|
2021-07-19 21:54:16 +08:00
|
|
|
if (!is_binding) {
|
2021-11-05 07:39:01 +08:00
|
|
|
ses->Suid = le64_to_cpu(rsp->hdr.SessionId);
|
2019-09-20 12:31:10 +08:00
|
|
|
ses->session_flags = le16_to_cpu(rsp->SessionFlags);
|
|
|
|
}
|
2011-12-27 20:22:00 +08:00
|
|
|
|
2016-10-08 02:11:22 +08:00
|
|
|
rc = SMB2_sess_establish_session(sess_data);
|
2020-04-12 14:09:26 +08:00
|
|
|
#ifdef CONFIG_CIFS_DEBUG_DUMP_KEYS
|
|
|
|
if (ses->server->dialect < SMB30_PROT_ID) {
|
|
|
|
cifs_dbg(VFS, "%s: dumping generated SMB2 session keys\n", __func__);
|
|
|
|
/*
|
|
|
|
* The session id is opaque in terms of endianness, so we can't
|
|
|
|
* print it as a long long. we dump it as we got it on the wire
|
|
|
|
*/
|
|
|
|
cifs_dbg(VFS, "Session Id %*ph\n", (int)sizeof(ses->Suid),
|
|
|
|
&ses->Suid);
|
|
|
|
cifs_dbg(VFS, "Session Key %*ph\n",
|
|
|
|
SMB2_NTLMV2_SESSKEY_SIZE, ses->auth_key.response);
|
|
|
|
cifs_dbg(VFS, "Signing Key %*ph\n",
|
|
|
|
SMB3_SIGN_KEY_SIZE, ses->auth_key.response);
|
|
|
|
}
|
|
|
|
#endif
|
2016-10-08 02:11:22 +08:00
|
|
|
out:
|
|
|
|
kfree(ntlmssp_blob);
|
|
|
|
SMB2_sess_free_buffer(sess_data);
|
|
|
|
kfree(ses->ntlmssp);
|
|
|
|
ses->ntlmssp = NULL;
|
|
|
|
sess_data->result = rc;
|
|
|
|
sess_data->func = NULL;
|
|
|
|
}
|
2013-08-29 21:35:09 +08:00
|
|
|
|
2016-10-08 02:11:22 +08:00
|
|
|
static int
|
2021-07-19 21:54:16 +08:00
|
|
|
SMB2_select_sec(struct SMB2_sess_data *sess_data)
|
2016-10-08 02:11:22 +08:00
|
|
|
{
|
2017-01-18 18:05:57 +08:00
|
|
|
int type;
|
2021-07-19 21:54:16 +08:00
|
|
|
struct cifs_ses *ses = sess_data->ses;
|
|
|
|
struct TCP_Server_Info *server = sess_data->server;
|
2017-01-18 18:05:57 +08:00
|
|
|
|
2021-07-19 21:54:16 +08:00
|
|
|
type = smb2_select_sectype(server, ses->sectype);
|
2017-01-18 18:05:57 +08:00
|
|
|
cifs_dbg(FYI, "sess setup type %d\n", type);
|
|
|
|
if (type == Unspecified) {
|
2020-04-15 13:42:53 +08:00
|
|
|
cifs_dbg(VFS, "Unable to select appropriate authentication method!\n");
|
2017-01-18 18:05:57 +08:00
|
|
|
return -EINVAL;
|
|
|
|
}
|
2013-08-29 21:35:09 +08:00
|
|
|
|
2017-01-18 18:05:57 +08:00
|
|
|
switch (type) {
|
2016-10-08 02:11:22 +08:00
|
|
|
case Kerberos:
|
|
|
|
sess_data->func = SMB2_auth_kerberos;
|
|
|
|
break;
|
|
|
|
case RawNTLMSSP:
|
|
|
|
sess_data->func = SMB2_sess_auth_rawntlmssp_negotiate;
|
|
|
|
break;
|
|
|
|
default:
|
2017-01-18 18:05:57 +08:00
|
|
|
cifs_dbg(VFS, "secType %d not supported!\n", type);
|
2016-10-08 02:11:22 +08:00
|
|
|
return -EOPNOTSUPP;
|
2013-08-29 21:35:09 +08:00
|
|
|
}
|
|
|
|
|
2016-10-08 02:11:22 +08:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
int
|
|
|
|
SMB2_sess_setup(const unsigned int xid, struct cifs_ses *ses,
|
2021-07-19 21:54:16 +08:00
|
|
|
struct TCP_Server_Info *server,
|
2016-10-08 02:11:22 +08:00
|
|
|
const struct nls_table *nls_cp)
|
|
|
|
{
|
|
|
|
int rc = 0;
|
|
|
|
struct SMB2_sess_data *sess_data;
|
|
|
|
|
|
|
|
cifs_dbg(FYI, "Session Setup\n");
|
|
|
|
|
|
|
|
if (!server) {
|
|
|
|
WARN(1, "%s: server is NULL!\n", __func__);
|
|
|
|
return -EIO;
|
2013-08-29 21:35:09 +08:00
|
|
|
}
|
|
|
|
|
2016-10-08 02:11:22 +08:00
|
|
|
sess_data = kzalloc(sizeof(struct SMB2_sess_data), GFP_KERNEL);
|
|
|
|
if (!sess_data)
|
|
|
|
return -ENOMEM;
|
|
|
|
|
|
|
|
sess_data->xid = xid;
|
|
|
|
sess_data->ses = ses;
|
2021-07-19 21:54:16 +08:00
|
|
|
sess_data->server = server;
|
2016-10-08 02:11:22 +08:00
|
|
|
sess_data->buf0_type = CIFS_NO_BUFFER;
|
|
|
|
sess_data->nls_cp = (struct nls_table *) nls_cp;
|
2018-06-01 04:19:25 +08:00
|
|
|
sess_data->previous_session = ses->Suid;
|
2016-10-08 02:11:22 +08:00
|
|
|
|
2021-07-19 21:54:16 +08:00
|
|
|
rc = SMB2_select_sec(sess_data);
|
|
|
|
if (rc)
|
|
|
|
goto out;
|
|
|
|
|
2018-02-17 02:19:29 +08:00
|
|
|
/*
|
|
|
|
* Initialize the session hash with the server one.
|
|
|
|
*/
|
2019-09-20 12:22:14 +08:00
|
|
|
memcpy(ses->preauth_sha_hash, server->preauth_sha_hash,
|
2018-02-17 02:19:29 +08:00
|
|
|
SMB2_PREAUTH_HASH_SIZE);
|
|
|
|
|
2016-10-08 02:11:22 +08:00
|
|
|
while (sess_data->func)
|
|
|
|
sess_data->func(sess_data);
|
|
|
|
|
2017-09-20 07:40:03 +08:00
|
|
|
if ((ses->session_flags & SMB2_SESSION_FLAG_IS_GUEST) && (ses->sign))
|
2019-08-28 15:15:35 +08:00
|
|
|
cifs_server_dbg(VFS, "signing requested but authenticated as guest\n");
|
2016-10-08 02:11:21 +08:00
|
|
|
rc = sess_data->result;
|
2016-10-08 02:11:22 +08:00
|
|
|
out:
|
2016-10-08 02:11:21 +08:00
|
|
|
kfree(sess_data);
|
2011-12-27 20:22:00 +08:00
|
|
|
return rc;
|
|
|
|
}
|
|
|
|
|
|
|
|
int
|
|
|
|
SMB2_logoff(const unsigned int xid, struct cifs_ses *ses)
|
|
|
|
{
|
2018-06-12 06:00:59 +08:00
|
|
|
struct smb_rqst rqst;
|
2011-12-27 20:22:00 +08:00
|
|
|
struct smb2_logoff_req *req; /* response is also trivial struct */
|
|
|
|
int rc = 0;
|
|
|
|
struct TCP_Server_Info *server;
|
2016-11-01 04:49:30 +08:00
|
|
|
int flags = 0;
|
2017-11-09 09:14:17 +08:00
|
|
|
unsigned int total_len;
|
|
|
|
struct kvec iov[1];
|
|
|
|
struct kvec rsp_iov;
|
|
|
|
int resp_buf_type;
|
2011-12-27 20:22:00 +08:00
|
|
|
|
2013-05-05 11:12:25 +08:00
|
|
|
cifs_dbg(FYI, "disconnect session %p\n", ses);
|
2011-12-27 20:22:00 +08:00
|
|
|
|
|
|
|
if (ses && (ses->server))
|
|
|
|
server = ses->server;
|
|
|
|
else
|
|
|
|
return -EIO;
|
|
|
|
|
2013-10-03 18:44:45 +08:00
|
|
|
/* no need to send SMB logoff if uid already closed due to reconnect */
|
2021-07-19 20:46:53 +08:00
|
|
|
spin_lock(&ses->chan_lock);
|
|
|
|
if (CIFS_ALL_CHANS_NEED_RECONNECT(ses)) {
|
|
|
|
spin_unlock(&ses->chan_lock);
|
2013-10-03 18:44:45 +08:00
|
|
|
goto smb2_session_already_dead;
|
2021-07-19 20:46:53 +08:00
|
|
|
}
|
|
|
|
spin_unlock(&ses->chan_lock);
|
2013-10-03 18:44:45 +08:00
|
|
|
|
2020-06-01 01:38:22 +08:00
|
|
|
rc = smb2_plain_req_init(SMB2_LOGOFF, NULL, ses->server,
|
|
|
|
(void **) &req, &total_len);
|
2011-12-27 20:22:00 +08:00
|
|
|
if (rc)
|
|
|
|
return rc;
|
|
|
|
|
|
|
|
/* since no tcon, smb2_init can not do this, so do here */
|
2021-11-05 07:39:01 +08:00
|
|
|
req->hdr.SessionId = cpu_to_le64(ses->Suid);
|
2016-11-01 04:49:30 +08:00
|
|
|
|
|
|
|
if (ses->session_flags & SMB2_SESSION_FLAG_ENCRYPT_DATA)
|
|
|
|
flags |= CIFS_TRANSFORM_REQ;
|
|
|
|
else if (server->sign)
|
2021-11-05 07:39:01 +08:00
|
|
|
req->hdr.Flags |= SMB2_FLAGS_SIGNED;
|
2017-11-09 09:14:17 +08:00
|
|
|
|
2019-05-06 08:00:02 +08:00
|
|
|
flags |= CIFS_NO_RSP_BUF;
|
2017-11-09 09:14:17 +08:00
|
|
|
|
|
|
|
iov[0].iov_base = (char *)req;
|
|
|
|
iov[0].iov_len = total_len;
|
2011-12-27 20:22:00 +08:00
|
|
|
|
2018-06-12 06:00:59 +08:00
|
|
|
memset(&rqst, 0, sizeof(struct smb_rqst));
|
|
|
|
rqst.rq_iov = iov;
|
|
|
|
rqst.rq_nvec = 1;
|
|
|
|
|
2020-06-01 01:38:22 +08:00
|
|
|
rc = cifs_send_recv(xid, ses, ses->server,
|
|
|
|
&rqst, &resp_buf_type, flags, &rsp_iov);
|
2016-10-26 02:38:47 +08:00
|
|
|
cifs_small_buf_release(req);
|
2011-12-27 20:22:00 +08:00
|
|
|
/*
|
|
|
|
* No tcon so can't do
|
|
|
|
* cifs_stats_inc(&tcon->stats.smb2_stats.smb2_com_fail[SMB2...]);
|
|
|
|
*/
|
2013-10-03 18:44:45 +08:00
|
|
|
|
|
|
|
smb2_session_already_dead:
|
2011-12-27 20:22:00 +08:00
|
|
|
return rc;
|
|
|
|
}
|
2011-12-27 20:04:00 +08:00
|
|
|
|
|
|
|
static inline void cifs_stats_fail_inc(struct cifs_tcon *tcon, uint16_t code)
|
|
|
|
{
|
2012-05-28 19:19:39 +08:00
|
|
|
cifs_stats_inc(&tcon->stats.smb2_stats.smb2_com_failed[code]);
|
2011-12-27 20:04:00 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
#define MAX_SHARENAME_LENGTH (255 /* server */ + 80 /* share */ + 1 /* NULL */)
|
|
|
|
|
2013-11-16 01:26:24 +08:00
|
|
|
/* These are similar values to what Windows uses */
|
|
|
|
static inline void init_copy_chunk_defaults(struct cifs_tcon *tcon)
|
|
|
|
{
|
|
|
|
tcon->max_chunks = 256;
|
|
|
|
tcon->max_bytes_chunk = 1048576;
|
|
|
|
tcon->max_bytes_copy = 16777216;
|
|
|
|
}
|
|
|
|
|
2011-12-27 20:04:00 +08:00
|
|
|
int
|
|
|
|
SMB2_tcon(const unsigned int xid, struct cifs_ses *ses, const char *tree,
|
|
|
|
struct cifs_tcon *tcon, const struct nls_table *cp)
|
|
|
|
{
|
2018-06-12 06:00:59 +08:00
|
|
|
struct smb_rqst rqst;
|
2011-12-27 20:04:00 +08:00
|
|
|
struct smb2_tree_connect_req *req;
|
|
|
|
struct smb2_tree_connect_rsp *rsp = NULL;
|
|
|
|
struct kvec iov[2];
|
2017-10-11 19:23:36 +08:00
|
|
|
struct kvec rsp_iov = { NULL, 0 };
|
2011-12-27 20:04:00 +08:00
|
|
|
int rc = 0;
|
|
|
|
int resp_buftype;
|
|
|
|
int unc_path_len;
|
|
|
|
__le16 *unc_path = NULL;
|
2016-11-01 04:49:30 +08:00
|
|
|
int flags = 0;
|
2017-11-09 09:14:23 +08:00
|
|
|
unsigned int total_len;
|
2020-06-01 01:38:22 +08:00
|
|
|
struct TCP_Server_Info *server;
|
|
|
|
|
|
|
|
/* always use master channel */
|
|
|
|
server = ses->server;
|
2011-12-27 20:04:00 +08:00
|
|
|
|
2013-05-05 11:12:25 +08:00
|
|
|
cifs_dbg(FYI, "TCON\n");
|
2011-12-27 20:04:00 +08:00
|
|
|
|
2019-08-28 15:15:35 +08:00
|
|
|
if (!server || !tree)
|
2011-12-27 20:04:00 +08:00
|
|
|
return -EIO;
|
|
|
|
|
|
|
|
unc_path = kmalloc(MAX_SHARENAME_LENGTH * 2, GFP_KERNEL);
|
|
|
|
if (unc_path == NULL)
|
|
|
|
return -ENOMEM;
|
|
|
|
|
|
|
|
unc_path_len = cifs_strtoUTF16(unc_path, tree, strlen(tree), cp) + 1;
|
|
|
|
unc_path_len *= 2;
|
|
|
|
if (unc_path_len < 2) {
|
|
|
|
kfree(unc_path);
|
|
|
|
return -EINVAL;
|
|
|
|
}
|
|
|
|
|
2017-02-20 19:25:58 +08:00
|
|
|
/* SMB2 TREE_CONNECT request must be called with TreeId == 0 */
|
2018-01-24 20:46:10 +08:00
|
|
|
tcon->tid = 0;
|
2018-10-20 06:14:32 +08:00
|
|
|
atomic_set(&tcon->num_remote_opens, 0);
|
2020-06-01 01:38:22 +08:00
|
|
|
rc = smb2_plain_req_init(SMB2_TREE_CONNECT, tcon, server,
|
|
|
|
(void **) &req, &total_len);
|
2011-12-27 20:04:00 +08:00
|
|
|
if (rc) {
|
|
|
|
kfree(unc_path);
|
|
|
|
return rc;
|
|
|
|
}
|
|
|
|
|
2018-05-10 06:43:08 +08:00
|
|
|
if (smb3_encryption_required(tcon))
|
2016-11-18 05:59:23 +08:00
|
|
|
flags |= CIFS_TRANSFORM_REQ;
|
2011-12-27 20:04:00 +08:00
|
|
|
|
|
|
|
iov[0].iov_base = (char *)req;
|
2017-11-09 09:14:23 +08:00
|
|
|
/* 1 for pad */
|
|
|
|
iov[0].iov_len = total_len - 1;
|
2011-12-27 20:04:00 +08:00
|
|
|
|
|
|
|
/* Testing shows that buffer offset must be at location of Buffer[0] */
|
|
|
|
req->PathOffset = cpu_to_le16(sizeof(struct smb2_tree_connect_req)
|
2017-11-09 09:14:23 +08:00
|
|
|
- 1 /* pad */);
|
2011-12-27 20:04:00 +08:00
|
|
|
req->PathLength = cpu_to_le16(unc_path_len - 2);
|
|
|
|
iov[1].iov_base = unc_path;
|
|
|
|
iov[1].iov_len = unc_path_len;
|
|
|
|
|
2019-03-21 12:59:02 +08:00
|
|
|
/*
|
|
|
|
* 3.11 tcon req must be signed if not encrypted. See MS-SMB2 3.2.4.1.1
|
|
|
|
* unless it is guest or anonymous user. See MS-SMB2 3.2.5.3.1
|
2019-03-23 11:31:17 +08:00
|
|
|
* (Samba servers don't always set the flag so also check if null user)
|
2019-03-21 12:59:02 +08:00
|
|
|
*/
|
2019-08-28 15:15:35 +08:00
|
|
|
if ((server->dialect == SMB311_PROT_ID) &&
|
2019-03-21 12:59:02 +08:00
|
|
|
!smb3_encryption_required(tcon) &&
|
2019-03-23 11:31:17 +08:00
|
|
|
!(ses->session_flags &
|
|
|
|
(SMB2_SESSION_FLAG_IS_GUEST|SMB2_SESSION_FLAG_IS_NULL)) &&
|
|
|
|
((ses->user_name != NULL) || (ses->sectype == Kerberos)))
|
2021-11-05 07:39:01 +08:00
|
|
|
req->hdr.Flags |= SMB2_FLAGS_SIGNED;
|
2018-03-13 15:29:36 +08:00
|
|
|
|
2018-06-12 06:00:59 +08:00
|
|
|
memset(&rqst, 0, sizeof(struct smb_rqst));
|
|
|
|
rqst.rq_iov = iov;
|
|
|
|
rqst.rq_nvec = 2;
|
|
|
|
|
2019-02-14 15:19:02 +08:00
|
|
|
/* Need 64 for max size write so ask for more in case not there yet */
|
2021-11-05 07:39:01 +08:00
|
|
|
req->hdr.CreditRequest = cpu_to_le16(64);
|
2019-02-14 15:19:02 +08:00
|
|
|
|
2020-06-01 01:38:22 +08:00
|
|
|
rc = cifs_send_recv(xid, ses, server,
|
|
|
|
&rqst, &resp_buftype, flags, &rsp_iov);
|
2016-10-26 02:38:47 +08:00
|
|
|
cifs_small_buf_release(req);
|
|
|
|
rsp = (struct smb2_tree_connect_rsp *)rsp_iov.iov_base;
|
2018-10-28 13:47:11 +08:00
|
|
|
trace_smb3_tcon(xid, tcon->tid, ses->Suid, tree, rc);
|
2021-11-12 06:18:14 +08:00
|
|
|
if ((rc != 0) || (rsp == NULL)) {
|
2021-06-20 01:01:37 +08:00
|
|
|
cifs_stats_fail_inc(tcon, SMB2_TREE_CONNECT_HE);
|
|
|
|
tcon->need_reconnect = true;
|
2011-12-27 20:04:00 +08:00
|
|
|
goto tcon_error_exit;
|
|
|
|
}
|
|
|
|
|
2017-05-12 23:59:32 +08:00
|
|
|
switch (rsp->ShareType) {
|
|
|
|
case SMB2_SHARE_TYPE_DISK:
|
2013-05-05 11:12:25 +08:00
|
|
|
cifs_dbg(FYI, "connection to disk share\n");
|
2017-05-12 23:59:32 +08:00
|
|
|
break;
|
|
|
|
case SMB2_SHARE_TYPE_PIPE:
|
2018-01-24 20:46:10 +08:00
|
|
|
tcon->pipe = true;
|
2013-05-05 11:12:25 +08:00
|
|
|
cifs_dbg(FYI, "connection to pipe share\n");
|
2017-05-12 23:59:32 +08:00
|
|
|
break;
|
|
|
|
case SMB2_SHARE_TYPE_PRINT:
|
2018-01-24 20:46:10 +08:00
|
|
|
tcon->print = true;
|
2013-05-05 11:12:25 +08:00
|
|
|
cifs_dbg(FYI, "connection to printer\n");
|
2017-05-12 23:59:32 +08:00
|
|
|
break;
|
|
|
|
default:
|
2019-08-28 15:15:35 +08:00
|
|
|
cifs_server_dbg(VFS, "unknown share type %d\n", rsp->ShareType);
|
2011-12-27 20:04:00 +08:00
|
|
|
rc = -EOPNOTSUPP;
|
|
|
|
goto tcon_error_exit;
|
|
|
|
}
|
|
|
|
|
|
|
|
tcon->share_flags = le32_to_cpu(rsp->ShareFlags);
|
2013-06-20 03:15:30 +08:00
|
|
|
tcon->capabilities = rsp->Capabilities; /* we keep caps little endian */
|
2011-12-27 20:04:00 +08:00
|
|
|
tcon->maximal_access = le32_to_cpu(rsp->MaximalAccess);
|
2021-11-05 07:39:01 +08:00
|
|
|
tcon->tid = le32_to_cpu(rsp->hdr.Id.SyncId.TreeId);
|
2013-06-24 14:57:47 +08:00
|
|
|
strlcpy(tcon->treeName, tree, sizeof(tcon->treeName));
|
2011-12-27 20:04:00 +08:00
|
|
|
|
|
|
|
if ((rsp->Capabilities & SMB2_SHARE_CAP_DFS) &&
|
|
|
|
((tcon->share_flags & SHI1005_FLAGS_DFS) == 0))
|
2019-09-04 10:32:41 +08:00
|
|
|
cifs_tcon_dbg(VFS, "DFS capability contradicts DFS flag\n");
|
2016-11-18 05:59:23 +08:00
|
|
|
|
|
|
|
if (tcon->seal &&
|
2019-08-28 15:15:35 +08:00
|
|
|
!(server->capabilities & SMB2_GLOBAL_CAP_ENCRYPTION))
|
2019-09-04 10:32:41 +08:00
|
|
|
cifs_tcon_dbg(VFS, "Encryption is requested but not supported\n");
|
2016-11-18 05:59:23 +08:00
|
|
|
|
2013-11-16 01:26:24 +08:00
|
|
|
init_copy_chunk_defaults(tcon);
|
2019-08-28 15:15:35 +08:00
|
|
|
if (server->ops->validate_negotiate)
|
|
|
|
rc = server->ops->validate_negotiate(xid, tcon);
|
2011-12-27 20:04:00 +08:00
|
|
|
tcon_exit:
|
2018-10-28 13:47:11 +08:00
|
|
|
|
2011-12-27 20:04:00 +08:00
|
|
|
free_rsp_buf(resp_buftype, rsp);
|
|
|
|
kfree(unc_path);
|
|
|
|
return rc;
|
|
|
|
|
|
|
|
tcon_error_exit:
|
2021-11-05 07:39:01 +08:00
|
|
|
if (rsp && rsp->hdr.Status == STATUS_BAD_NETWORK_NAME)
|
2019-09-04 10:32:41 +08:00
|
|
|
cifs_tcon_dbg(VFS, "BAD_NETWORK_NAME: %s\n", tree);
|
2011-12-27 20:04:00 +08:00
|
|
|
goto tcon_exit;
|
|
|
|
}
|
|
|
|
|
|
|
|
int
|
|
|
|
SMB2_tdis(const unsigned int xid, struct cifs_tcon *tcon)
|
|
|
|
{
|
2018-06-12 06:00:59 +08:00
|
|
|
struct smb_rqst rqst;
|
2011-12-27 20:04:00 +08:00
|
|
|
struct smb2_tree_disconnect_req *req; /* response is trivial */
|
|
|
|
int rc = 0;
|
|
|
|
struct cifs_ses *ses = tcon->ses;
|
2016-11-01 04:49:30 +08:00
|
|
|
int flags = 0;
|
2017-11-09 09:14:18 +08:00
|
|
|
unsigned int total_len;
|
|
|
|
struct kvec iov[1];
|
|
|
|
struct kvec rsp_iov;
|
|
|
|
int resp_buf_type;
|
2011-12-27 20:04:00 +08:00
|
|
|
|
2013-05-05 11:12:25 +08:00
|
|
|
cifs_dbg(FYI, "Tree Disconnect\n");
|
2011-12-27 20:04:00 +08:00
|
|
|
|
2017-07-09 18:45:04 +08:00
|
|
|
if (!ses || !(ses->server))
|
2011-12-27 20:04:00 +08:00
|
|
|
return -EIO;
|
|
|
|
|
2021-07-19 20:46:53 +08:00
|
|
|
spin_lock(&ses->chan_lock);
|
|
|
|
if ((tcon->need_reconnect) ||
|
|
|
|
(CIFS_ALL_CHANS_NEED_RECONNECT(tcon->ses))) {
|
|
|
|
spin_unlock(&ses->chan_lock);
|
2011-12-27 20:04:00 +08:00
|
|
|
return 0;
|
2021-07-19 20:46:53 +08:00
|
|
|
}
|
|
|
|
spin_unlock(&ses->chan_lock);
|
2011-12-27 20:04:00 +08:00
|
|
|
|
2021-03-09 07:07:29 +08:00
|
|
|
close_cached_dir_lease(&tcon->crfid);
|
2019-11-07 15:00:38 +08:00
|
|
|
|
2020-06-01 01:38:22 +08:00
|
|
|
rc = smb2_plain_req_init(SMB2_TREE_DISCONNECT, tcon, ses->server,
|
|
|
|
(void **) &req,
|
|
|
|
&total_len);
|
2011-12-27 20:04:00 +08:00
|
|
|
if (rc)
|
|
|
|
return rc;
|
|
|
|
|
2018-05-10 06:43:08 +08:00
|
|
|
if (smb3_encryption_required(tcon))
|
2016-11-01 04:49:30 +08:00
|
|
|
flags |= CIFS_TRANSFORM_REQ;
|
|
|
|
|
2019-05-06 08:00:02 +08:00
|
|
|
flags |= CIFS_NO_RSP_BUF;
|
2017-11-09 09:14:18 +08:00
|
|
|
|
|
|
|
iov[0].iov_base = (char *)req;
|
|
|
|
iov[0].iov_len = total_len;
|
|
|
|
|
2018-06-12 06:00:59 +08:00
|
|
|
memset(&rqst, 0, sizeof(struct smb_rqst));
|
|
|
|
rqst.rq_iov = iov;
|
|
|
|
rqst.rq_nvec = 1;
|
|
|
|
|
2020-06-01 01:38:22 +08:00
|
|
|
rc = cifs_send_recv(xid, ses, ses->server,
|
|
|
|
&rqst, &resp_buf_type, flags, &rsp_iov);
|
2016-10-26 02:38:47 +08:00
|
|
|
cifs_small_buf_release(req);
|
2011-12-27 20:04:00 +08:00
|
|
|
if (rc)
|
|
|
|
cifs_stats_fail_inc(tcon, SMB2_TREE_DISCONNECT_HE);
|
|
|
|
|
|
|
|
return rc;
|
|
|
|
}
|
2011-12-27 02:58:46 +08:00
|
|
|
|
2012-09-19 21:22:44 +08:00
|
|
|
|
2013-07-04 22:41:09 +08:00
|
|
|
static struct create_durable *
|
|
|
|
create_durable_buf(void)
|
|
|
|
{
|
|
|
|
struct create_durable *buf;
|
|
|
|
|
|
|
|
buf = kzalloc(sizeof(struct create_durable), GFP_KERNEL);
|
|
|
|
if (!buf)
|
|
|
|
return NULL;
|
|
|
|
|
|
|
|
buf->ccontext.DataOffset = cpu_to_le16(offsetof
|
2013-07-09 22:40:58 +08:00
|
|
|
(struct create_durable, Data));
|
2013-07-04 22:41:09 +08:00
|
|
|
buf->ccontext.DataLength = cpu_to_le32(16);
|
|
|
|
buf->ccontext.NameOffset = cpu_to_le16(offsetof
|
|
|
|
(struct create_durable, Name));
|
|
|
|
buf->ccontext.NameLength = cpu_to_le16(4);
|
2014-05-14 20:29:40 +08:00
|
|
|
/* SMB2_CREATE_DURABLE_HANDLE_REQUEST is "DHnQ" */
|
2013-07-04 22:41:09 +08:00
|
|
|
buf->Name[0] = 'D';
|
|
|
|
buf->Name[1] = 'H';
|
|
|
|
buf->Name[2] = 'n';
|
|
|
|
buf->Name[3] = 'Q';
|
|
|
|
return buf;
|
|
|
|
}
|
|
|
|
|
2013-07-09 22:40:58 +08:00
|
|
|
static struct create_durable *
|
|
|
|
create_reconnect_durable_buf(struct cifs_fid *fid)
|
|
|
|
{
|
|
|
|
struct create_durable *buf;
|
|
|
|
|
|
|
|
buf = kzalloc(sizeof(struct create_durable), GFP_KERNEL);
|
|
|
|
if (!buf)
|
|
|
|
return NULL;
|
|
|
|
|
|
|
|
buf->ccontext.DataOffset = cpu_to_le16(offsetof
|
|
|
|
(struct create_durable, Data));
|
|
|
|
buf->ccontext.DataLength = cpu_to_le32(16);
|
|
|
|
buf->ccontext.NameOffset = cpu_to_le16(offsetof
|
|
|
|
(struct create_durable, Name));
|
|
|
|
buf->ccontext.NameLength = cpu_to_le16(4);
|
|
|
|
buf->Data.Fid.PersistentFileId = fid->persistent_fid;
|
|
|
|
buf->Data.Fid.VolatileFileId = fid->volatile_fid;
|
2014-05-14 20:29:40 +08:00
|
|
|
/* SMB2_CREATE_DURABLE_HANDLE_RECONNECT is "DHnC" */
|
2013-07-09 22:40:58 +08:00
|
|
|
buf->Name[0] = 'D';
|
|
|
|
buf->Name[1] = 'H';
|
|
|
|
buf->Name[2] = 'n';
|
|
|
|
buf->Name[3] = 'C';
|
|
|
|
return buf;
|
|
|
|
}
|
|
|
|
|
2019-07-19 06:22:18 +08:00
|
|
|
static void
|
|
|
|
parse_query_id_ctxt(struct create_context *cc, struct smb2_file_all_info *buf)
|
|
|
|
{
|
|
|
|
struct create_on_disk_id *pdisk_id = (struct create_on_disk_id *)cc;
|
|
|
|
|
|
|
|
cifs_dbg(FYI, "parse query id context 0x%llx 0x%llx\n",
|
|
|
|
pdisk_id->DiskFileId, pdisk_id->VolumeId);
|
|
|
|
buf->IndexNumber = pdisk_id->DiskFileId;
|
|
|
|
}
|
|
|
|
|
2020-02-07 07:31:56 +08:00
|
|
|
static void
|
2020-03-03 00:53:22 +08:00
|
|
|
parse_posix_ctxt(struct create_context *cc, struct smb2_file_all_info *info,
|
|
|
|
struct create_posix_rsp *posix)
|
2020-02-07 07:31:56 +08:00
|
|
|
{
|
2020-03-03 00:53:22 +08:00
|
|
|
int sid_len;
|
|
|
|
u8 *beg = (u8 *)cc + le16_to_cpu(cc->DataOffset);
|
|
|
|
u8 *end = beg + le32_to_cpu(cc->DataLength);
|
|
|
|
u8 *sid;
|
2020-02-07 07:31:56 +08:00
|
|
|
|
2020-03-03 00:53:22 +08:00
|
|
|
memset(posix, 0, sizeof(*posix));
|
|
|
|
|
|
|
|
posix->nlink = le32_to_cpu(*(__le32 *)(beg + 0));
|
|
|
|
posix->reparse_tag = le32_to_cpu(*(__le32 *)(beg + 4));
|
|
|
|
posix->mode = le32_to_cpu(*(__le32 *)(beg + 8));
|
|
|
|
|
|
|
|
sid = beg + 12;
|
|
|
|
sid_len = posix_info_sid_size(sid, end);
|
|
|
|
if (sid_len < 0) {
|
|
|
|
cifs_dbg(VFS, "bad owner sid in posix create response\n");
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
memcpy(&posix->owner, sid, sid_len);
|
|
|
|
|
|
|
|
sid = sid + sid_len;
|
|
|
|
sid_len = posix_info_sid_size(sid, end);
|
|
|
|
if (sid_len < 0) {
|
|
|
|
cifs_dbg(VFS, "bad group sid in posix create response\n");
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
memcpy(&posix->group, sid, sid_len);
|
2020-02-08 22:50:56 +08:00
|
|
|
|
2020-03-03 00:53:22 +08:00
|
|
|
cifs_dbg(FYI, "nlink=%d mode=%o reparse_tag=%x\n",
|
|
|
|
posix->nlink, posix->mode, posix->reparse_tag);
|
2020-02-07 07:31:56 +08:00
|
|
|
}
|
|
|
|
|
2019-07-19 06:22:18 +08:00
|
|
|
void
|
|
|
|
smb2_parse_contexts(struct TCP_Server_Info *server,
|
2020-03-03 00:53:22 +08:00
|
|
|
struct smb2_create_rsp *rsp,
|
|
|
|
unsigned int *epoch, char *lease_key, __u8 *oplock,
|
|
|
|
struct smb2_file_all_info *buf,
|
|
|
|
struct create_posix_rsp *posix)
|
2012-09-19 21:22:44 +08:00
|
|
|
{
|
|
|
|
char *data_offset;
|
2013-09-06 00:16:45 +08:00
|
|
|
struct create_context *cc;
|
2016-02-10 07:52:08 +08:00
|
|
|
unsigned int next;
|
|
|
|
unsigned int remaining;
|
2013-07-09 23:44:56 +08:00
|
|
|
char *name;
|
2020-10-20 22:19:36 +08:00
|
|
|
static const char smb3_create_tag_posix[] = {
|
|
|
|
0x93, 0xAD, 0x25, 0x50, 0x9C,
|
|
|
|
0xB4, 0x11, 0xE7, 0xB4, 0x23, 0x83,
|
|
|
|
0xDE, 0x96, 0x8B, 0xCD, 0x7C
|
|
|
|
};
|
2012-09-19 21:22:44 +08:00
|
|
|
|
2019-07-19 06:22:18 +08:00
|
|
|
*oplock = 0;
|
2018-06-01 08:53:07 +08:00
|
|
|
data_offset = (char *)rsp + le32_to_cpu(rsp->CreateContextsOffset);
|
2016-02-10 07:52:08 +08:00
|
|
|
remaining = le32_to_cpu(rsp->CreateContextsLength);
|
2013-09-06 00:16:45 +08:00
|
|
|
cc = (struct create_context *)data_offset;
|
2019-07-19 06:22:18 +08:00
|
|
|
|
|
|
|
/* Initialize inode number to 0 in case no valid data in qfid context */
|
|
|
|
if (buf)
|
|
|
|
buf->IndexNumber = 0;
|
|
|
|
|
2016-02-10 07:52:08 +08:00
|
|
|
while (remaining >= sizeof(struct create_context)) {
|
2013-09-06 00:16:45 +08:00
|
|
|
name = le16_to_cpu(cc->NameOffset) + (char *)cc;
|
2016-02-10 07:52:08 +08:00
|
|
|
if (le16_to_cpu(cc->NameLength) == 4 &&
|
2019-07-19 06:22:18 +08:00
|
|
|
strncmp(name, SMB2_CREATE_REQUEST_LEASE, 4) == 0)
|
|
|
|
*oplock = server->ops->parse_lease_buf(cc, epoch,
|
|
|
|
lease_key);
|
|
|
|
else if (buf && (le16_to_cpu(cc->NameLength) == 4) &&
|
|
|
|
strncmp(name, SMB2_CREATE_QUERY_ON_DISK_ID, 4) == 0)
|
|
|
|
parse_query_id_ctxt(cc, buf);
|
2020-02-07 07:31:56 +08:00
|
|
|
else if ((le16_to_cpu(cc->NameLength) == 16)) {
|
2020-03-03 00:53:22 +08:00
|
|
|
if (posix &&
|
|
|
|
memcmp(name, smb3_create_tag_posix, 16) == 0)
|
|
|
|
parse_posix_ctxt(cc, buf, posix);
|
2020-02-07 07:31:56 +08:00
|
|
|
}
|
|
|
|
/* else {
|
|
|
|
cifs_dbg(FYI, "Context not matched with len %d\n",
|
|
|
|
le16_to_cpu(cc->NameLength));
|
|
|
|
cifs_dump_mem("Cctxt name: ", name, 4);
|
|
|
|
} */
|
2016-02-10 07:52:08 +08:00
|
|
|
|
|
|
|
next = le32_to_cpu(cc->Next);
|
|
|
|
if (!next)
|
|
|
|
break;
|
|
|
|
remaining -= next;
|
|
|
|
cc = (struct create_context *)((char *)cc + next);
|
|
|
|
}
|
2012-09-19 21:22:44 +08:00
|
|
|
|
2019-07-19 06:22:18 +08:00
|
|
|
if (rsp->OplockLevel != SMB2_OPLOCK_LEVEL_LEASE)
|
|
|
|
*oplock = rsp->OplockLevel;
|
|
|
|
|
|
|
|
return;
|
2012-09-19 21:22:44 +08:00
|
|
|
}
|
|
|
|
|
2013-07-04 23:10:00 +08:00
|
|
|
static int
|
2013-09-04 17:07:41 +08:00
|
|
|
add_lease_context(struct TCP_Server_Info *server, struct kvec *iov,
|
2018-07-05 21:10:02 +08:00
|
|
|
unsigned int *num_iovec, u8 *lease_key, __u8 *oplock)
|
2013-07-04 23:10:00 +08:00
|
|
|
{
|
|
|
|
struct smb2_create_req *req = iov[0].iov_base;
|
|
|
|
unsigned int num = *num_iovec;
|
|
|
|
|
2018-07-05 21:10:02 +08:00
|
|
|
iov[num].iov_base = server->ops->create_lease_buf(lease_key, *oplock);
|
2013-07-04 23:10:00 +08:00
|
|
|
if (iov[num].iov_base == NULL)
|
|
|
|
return -ENOMEM;
|
2013-09-04 17:07:41 +08:00
|
|
|
iov[num].iov_len = server->vals->create_lease_size;
|
2013-07-04 23:10:00 +08:00
|
|
|
req->RequestedOplockLevel = SMB2_OPLOCK_LEVEL_LEASE;
|
|
|
|
if (!req->CreateContextsOffset)
|
|
|
|
req->CreateContextsOffset = cpu_to_le32(
|
2017-11-20 08:24:38 +08:00
|
|
|
sizeof(struct smb2_create_req) +
|
2013-07-04 23:10:00 +08:00
|
|
|
iov[num - 1].iov_len);
|
2013-09-04 17:07:41 +08:00
|
|
|
le32_add_cpu(&req->CreateContextsLength,
|
|
|
|
server->vals->create_lease_size);
|
2013-07-04 23:10:00 +08:00
|
|
|
*num_iovec = num + 1;
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2015-11-03 23:26:27 +08:00
|
|
|
static struct create_durable_v2 *
|
2019-03-30 05:31:07 +08:00
|
|
|
create_durable_v2_buf(struct cifs_open_parms *oparms)
|
2015-11-03 23:26:27 +08:00
|
|
|
{
|
2019-03-30 05:31:07 +08:00
|
|
|
struct cifs_fid *pfid = oparms->fid;
|
2015-11-03 23:26:27 +08:00
|
|
|
struct create_durable_v2 *buf;
|
|
|
|
|
|
|
|
buf = kzalloc(sizeof(struct create_durable_v2), GFP_KERNEL);
|
|
|
|
if (!buf)
|
|
|
|
return NULL;
|
|
|
|
|
|
|
|
buf->ccontext.DataOffset = cpu_to_le16(offsetof
|
|
|
|
(struct create_durable_v2, dcontext));
|
|
|
|
buf->ccontext.DataLength = cpu_to_le32(sizeof(struct durable_context_v2));
|
|
|
|
buf->ccontext.NameOffset = cpu_to_le16(offsetof
|
|
|
|
(struct create_durable_v2, Name));
|
|
|
|
buf->ccontext.NameLength = cpu_to_le16(4);
|
|
|
|
|
2019-03-30 05:31:07 +08:00
|
|
|
/*
|
|
|
|
* NB: Handle timeout defaults to 0, which allows server to choose
|
|
|
|
* (most servers default to 120 seconds) and most clients default to 0.
|
|
|
|
* This can be overridden at mount ("handletimeout=") if the user wants
|
|
|
|
* a different persistent (or resilient) handle timeout for all opens
|
|
|
|
* opens on a particular SMB3 mount.
|
|
|
|
*/
|
|
|
|
buf->dcontext.Timeout = cpu_to_le32(oparms->tcon->handle_timeout);
|
2015-11-03 23:26:27 +08:00
|
|
|
buf->dcontext.Flags = cpu_to_le32(SMB2_DHANDLE_FLAG_PERSISTENT);
|
2016-09-22 13:39:34 +08:00
|
|
|
generate_random_uuid(buf->dcontext.CreateGuid);
|
2015-11-03 23:26:27 +08:00
|
|
|
memcpy(pfid->create_guid, buf->dcontext.CreateGuid, 16);
|
|
|
|
|
|
|
|
/* SMB2_CREATE_DURABLE_HANDLE_REQUEST is "DH2Q" */
|
|
|
|
buf->Name[0] = 'D';
|
|
|
|
buf->Name[1] = 'H';
|
|
|
|
buf->Name[2] = '2';
|
|
|
|
buf->Name[3] = 'Q';
|
|
|
|
return buf;
|
|
|
|
}
|
|
|
|
|
|
|
|
static struct create_durable_handle_reconnect_v2 *
|
|
|
|
create_reconnect_durable_v2_buf(struct cifs_fid *fid)
|
|
|
|
{
|
|
|
|
struct create_durable_handle_reconnect_v2 *buf;
|
|
|
|
|
|
|
|
buf = kzalloc(sizeof(struct create_durable_handle_reconnect_v2),
|
|
|
|
GFP_KERNEL);
|
|
|
|
if (!buf)
|
|
|
|
return NULL;
|
|
|
|
|
|
|
|
buf->ccontext.DataOffset =
|
|
|
|
cpu_to_le16(offsetof(struct create_durable_handle_reconnect_v2,
|
|
|
|
dcontext));
|
|
|
|
buf->ccontext.DataLength =
|
|
|
|
cpu_to_le32(sizeof(struct durable_reconnect_context_v2));
|
|
|
|
buf->ccontext.NameOffset =
|
|
|
|
cpu_to_le16(offsetof(struct create_durable_handle_reconnect_v2,
|
|
|
|
Name));
|
|
|
|
buf->ccontext.NameLength = cpu_to_le16(4);
|
|
|
|
|
|
|
|
buf->dcontext.Fid.PersistentFileId = fid->persistent_fid;
|
|
|
|
buf->dcontext.Fid.VolatileFileId = fid->volatile_fid;
|
|
|
|
buf->dcontext.Flags = cpu_to_le32(SMB2_DHANDLE_FLAG_PERSISTENT);
|
|
|
|
memcpy(buf->dcontext.CreateGuid, fid->create_guid, 16);
|
|
|
|
|
|
|
|
/* SMB2_CREATE_DURABLE_HANDLE_RECONNECT_V2 is "DH2C" */
|
|
|
|
buf->Name[0] = 'D';
|
|
|
|
buf->Name[1] = 'H';
|
|
|
|
buf->Name[2] = '2';
|
|
|
|
buf->Name[3] = 'C';
|
|
|
|
return buf;
|
|
|
|
}
|
|
|
|
|
2013-07-04 22:41:09 +08:00
|
|
|
static int
|
2015-11-03 23:26:27 +08:00
|
|
|
add_durable_v2_context(struct kvec *iov, unsigned int *num_iovec,
|
|
|
|
struct cifs_open_parms *oparms)
|
|
|
|
{
|
|
|
|
struct smb2_create_req *req = iov[0].iov_base;
|
|
|
|
unsigned int num = *num_iovec;
|
|
|
|
|
2019-03-30 05:31:07 +08:00
|
|
|
iov[num].iov_base = create_durable_v2_buf(oparms);
|
2015-11-03 23:26:27 +08:00
|
|
|
if (iov[num].iov_base == NULL)
|
|
|
|
return -ENOMEM;
|
|
|
|
iov[num].iov_len = sizeof(struct create_durable_v2);
|
|
|
|
if (!req->CreateContextsOffset)
|
|
|
|
req->CreateContextsOffset =
|
2017-11-20 08:24:38 +08:00
|
|
|
cpu_to_le32(sizeof(struct smb2_create_req) +
|
2015-11-03 23:26:27 +08:00
|
|
|
iov[1].iov_len);
|
|
|
|
le32_add_cpu(&req->CreateContextsLength, sizeof(struct create_durable_v2));
|
|
|
|
*num_iovec = num + 1;
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int
|
|
|
|
add_durable_reconnect_v2_context(struct kvec *iov, unsigned int *num_iovec,
|
2013-07-09 22:40:58 +08:00
|
|
|
struct cifs_open_parms *oparms)
|
2013-07-04 22:41:09 +08:00
|
|
|
{
|
|
|
|
struct smb2_create_req *req = iov[0].iov_base;
|
|
|
|
unsigned int num = *num_iovec;
|
|
|
|
|
2015-11-03 23:26:27 +08:00
|
|
|
/* indicate that we don't need to relock the file */
|
|
|
|
oparms->reconnect = false;
|
|
|
|
|
|
|
|
iov[num].iov_base = create_reconnect_durable_v2_buf(oparms->fid);
|
|
|
|
if (iov[num].iov_base == NULL)
|
|
|
|
return -ENOMEM;
|
|
|
|
iov[num].iov_len = sizeof(struct create_durable_handle_reconnect_v2);
|
|
|
|
if (!req->CreateContextsOffset)
|
|
|
|
req->CreateContextsOffset =
|
2017-11-20 08:24:38 +08:00
|
|
|
cpu_to_le32(sizeof(struct smb2_create_req) +
|
2015-11-03 23:26:27 +08:00
|
|
|
iov[1].iov_len);
|
|
|
|
le32_add_cpu(&req->CreateContextsLength,
|
|
|
|
sizeof(struct create_durable_handle_reconnect_v2));
|
|
|
|
*num_iovec = num + 1;
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int
|
|
|
|
add_durable_context(struct kvec *iov, unsigned int *num_iovec,
|
|
|
|
struct cifs_open_parms *oparms, bool use_persistent)
|
|
|
|
{
|
|
|
|
struct smb2_create_req *req = iov[0].iov_base;
|
|
|
|
unsigned int num = *num_iovec;
|
|
|
|
|
|
|
|
if (use_persistent) {
|
|
|
|
if (oparms->reconnect)
|
|
|
|
return add_durable_reconnect_v2_context(iov, num_iovec,
|
|
|
|
oparms);
|
|
|
|
else
|
|
|
|
return add_durable_v2_context(iov, num_iovec, oparms);
|
|
|
|
}
|
|
|
|
|
2013-07-09 22:40:58 +08:00
|
|
|
if (oparms->reconnect) {
|
|
|
|
iov[num].iov_base = create_reconnect_durable_buf(oparms->fid);
|
|
|
|
/* indicate that we don't need to relock the file */
|
|
|
|
oparms->reconnect = false;
|
|
|
|
} else
|
|
|
|
iov[num].iov_base = create_durable_buf();
|
2013-07-04 22:41:09 +08:00
|
|
|
if (iov[num].iov_base == NULL)
|
|
|
|
return -ENOMEM;
|
|
|
|
iov[num].iov_len = sizeof(struct create_durable);
|
|
|
|
if (!req->CreateContextsOffset)
|
|
|
|
req->CreateContextsOffset =
|
2017-11-20 08:24:38 +08:00
|
|
|
cpu_to_le32(sizeof(struct smb2_create_req) +
|
2013-07-04 22:41:09 +08:00
|
|
|
iov[1].iov_len);
|
2013-08-26 14:34:46 +08:00
|
|
|
le32_add_cpu(&req->CreateContextsLength, sizeof(struct create_durable));
|
2013-07-04 22:41:09 +08:00
|
|
|
*num_iovec = num + 1;
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
smb3: allow previous versions to be mounted with snapshot= mount parm
mounting with the "snapshots=" mount parm allows a read-only
view of a previous version of a file system (see MS-SMB2
and "timewarp" tokens, section 2.2.13.2.6) based on the timestamp
passed in on the snapshots mount parm.
Add processing to optionally send this create context.
Example output:
/mnt1 is mounted with "snapshots=..." and will see an earlier
version of the directory, with three fewer files than /mnt2
the current version of the directory.
root@Ubuntu-17-Virtual-Machine:~/cifs-2.6# cat /proc/mounts | grep cifs
//172.22.149.186/public /mnt1 cifs
ro,relatime,vers=default,cache=strict,username=smfrench,uid=0,noforceuid,gid=0,noforcegid,addr=172.22.149.186,file_mode=0755,dir_mode=0755,soft,nounix,mapposix,rsize=1048576,wsize=1048576,echo_interval=60,snapshot=131748608570000000,actimeo=1
//172.22.149.186/public /mnt2 cifs
rw,relatime,vers=default,cache=strict,username=smfrench,uid=0,noforceuid,gid=0,noforcegid,addr=172.22.149.186,file_mode=0755,dir_mode=0755,soft,nounix,mapposix,rsize=1048576,wsize=1048576,echo_interval=60,actimeo=1
root@Ubuntu-17-Virtual-Machine:~/cifs-2.6# ls /mnt1
EmptyDir newerdir
root@Ubuntu-17-Virtual-Machine:~/cifs-2.6# ls /mnt1/newerdir
root@Ubuntu-17-Virtual-Machine:~/cifs-2.6# ls /mnt2
EmptyDir file newerdir newestdir timestamp-trace.cap
root@Ubuntu-17-Virtual-Machine:~/cifs-2.6# ls /mnt2/newerdir
new-file-not-in-snapshot
Snapshots are extremely useful for comparing previous versions of files or directories,
and recovering from data corruptions or mistakes.
Signed-off-by: Steve French <stfrench@microsoft.com>
Reviewed-by: Ronnie Sahlberg <lsahlber@redhat.com>
2018-08-10 15:25:06 +08:00
|
|
|
/* See MS-SMB2 2.2.13.2.7 */
|
|
|
|
static struct crt_twarp_ctxt *
|
|
|
|
create_twarp_buf(__u64 timewarp)
|
|
|
|
{
|
|
|
|
struct crt_twarp_ctxt *buf;
|
|
|
|
|
|
|
|
buf = kzalloc(sizeof(struct crt_twarp_ctxt), GFP_KERNEL);
|
|
|
|
if (!buf)
|
|
|
|
return NULL;
|
|
|
|
|
|
|
|
buf->ccontext.DataOffset = cpu_to_le16(offsetof
|
|
|
|
(struct crt_twarp_ctxt, Timestamp));
|
|
|
|
buf->ccontext.DataLength = cpu_to_le32(8);
|
|
|
|
buf->ccontext.NameOffset = cpu_to_le16(offsetof
|
|
|
|
(struct crt_twarp_ctxt, Name));
|
|
|
|
buf->ccontext.NameLength = cpu_to_le16(4);
|
|
|
|
/* SMB2_CREATE_TIMEWARP_TOKEN is "TWrp" */
|
|
|
|
buf->Name[0] = 'T';
|
|
|
|
buf->Name[1] = 'W';
|
|
|
|
buf->Name[2] = 'r';
|
|
|
|
buf->Name[3] = 'p';
|
|
|
|
buf->Timestamp = cpu_to_le64(timewarp);
|
|
|
|
return buf;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* See MS-SMB2 2.2.13.2.7 */
|
|
|
|
static int
|
|
|
|
add_twarp_context(struct kvec *iov, unsigned int *num_iovec, __u64 timewarp)
|
|
|
|
{
|
|
|
|
struct smb2_create_req *req = iov[0].iov_base;
|
|
|
|
unsigned int num = *num_iovec;
|
|
|
|
|
|
|
|
iov[num].iov_base = create_twarp_buf(timewarp);
|
|
|
|
if (iov[num].iov_base == NULL)
|
|
|
|
return -ENOMEM;
|
|
|
|
iov[num].iov_len = sizeof(struct crt_twarp_ctxt);
|
|
|
|
if (!req->CreateContextsOffset)
|
|
|
|
req->CreateContextsOffset = cpu_to_le32(
|
|
|
|
sizeof(struct smb2_create_req) +
|
|
|
|
iov[num - 1].iov_len);
|
|
|
|
le32_add_cpu(&req->CreateContextsLength, sizeof(struct crt_twarp_ctxt));
|
|
|
|
*num_iovec = num + 1;
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2020-06-12 22:25:21 +08:00
|
|
|
/* See See http://technet.microsoft.com/en-us/library/hh509017(v=ws.10).aspx */
|
|
|
|
static void setup_owner_group_sids(char *buf)
|
|
|
|
{
|
|
|
|
struct owner_group_sids *sids = (struct owner_group_sids *)buf;
|
|
|
|
|
|
|
|
/* Populate the user ownership fields S-1-5-88-1 */
|
|
|
|
sids->owner.Revision = 1;
|
|
|
|
sids->owner.NumAuth = 3;
|
|
|
|
sids->owner.Authority[5] = 5;
|
|
|
|
sids->owner.SubAuthorities[0] = cpu_to_le32(88);
|
|
|
|
sids->owner.SubAuthorities[1] = cpu_to_le32(1);
|
|
|
|
sids->owner.SubAuthorities[2] = cpu_to_le32(current_fsuid().val);
|
|
|
|
|
|
|
|
/* Populate the group ownership fields S-1-5-88-2 */
|
|
|
|
sids->group.Revision = 1;
|
|
|
|
sids->group.NumAuth = 3;
|
|
|
|
sids->group.Authority[5] = 5;
|
|
|
|
sids->group.SubAuthorities[0] = cpu_to_le32(88);
|
|
|
|
sids->group.SubAuthorities[1] = cpu_to_le32(2);
|
|
|
|
sids->group.SubAuthorities[2] = cpu_to_le32(current_fsgid().val);
|
2020-06-13 03:49:47 +08:00
|
|
|
|
|
|
|
cifs_dbg(FYI, "owner S-1-5-88-1-%d, group S-1-5-88-2-%d\n", current_fsuid().val, current_fsgid().val);
|
2020-06-12 22:25:21 +08:00
|
|
|
}
|
|
|
|
|
2019-12-06 16:02:38 +08:00
|
|
|
/* See MS-SMB2 2.2.13.2.2 and MS-DTYP 2.4.6 */
|
|
|
|
static struct crt_sd_ctxt *
|
2020-06-12 22:25:21 +08:00
|
|
|
create_sd_buf(umode_t mode, bool set_owner, unsigned int *len)
|
2019-12-06 16:02:38 +08:00
|
|
|
{
|
|
|
|
struct crt_sd_ctxt *buf;
|
2020-11-30 09:29:20 +08:00
|
|
|
__u8 *ptr, *aclptr;
|
|
|
|
unsigned int acelen, acl_size, ace_count;
|
2020-06-12 22:25:21 +08:00
|
|
|
unsigned int owner_offset = 0;
|
|
|
|
unsigned int group_offset = 0;
|
2020-11-30 09:29:20 +08:00
|
|
|
struct smb3_acl acl;
|
2020-06-12 22:25:21 +08:00
|
|
|
|
2020-11-30 09:29:20 +08:00
|
|
|
*len = roundup(sizeof(struct crt_sd_ctxt) + (sizeof(struct cifs_ace) * 4), 8);
|
2020-06-12 22:25:21 +08:00
|
|
|
|
|
|
|
if (set_owner) {
|
|
|
|
/* sizeof(struct owner_group_sids) is already multiple of 8 so no need to round */
|
|
|
|
*len += sizeof(struct owner_group_sids);
|
|
|
|
}
|
2019-12-06 16:02:38 +08:00
|
|
|
|
|
|
|
buf = kzalloc(*len, GFP_KERNEL);
|
|
|
|
if (buf == NULL)
|
|
|
|
return buf;
|
|
|
|
|
2020-11-30 09:29:20 +08:00
|
|
|
ptr = (__u8 *)&buf[1];
|
2020-06-12 22:25:21 +08:00
|
|
|
if (set_owner) {
|
2020-11-30 09:29:20 +08:00
|
|
|
/* offset fields are from beginning of security descriptor not of create context */
|
|
|
|
owner_offset = ptr - (__u8 *)&buf->sd;
|
2020-06-12 22:25:21 +08:00
|
|
|
buf->sd.OffsetOwner = cpu_to_le32(owner_offset);
|
2020-11-30 09:29:20 +08:00
|
|
|
group_offset = owner_offset + offsetof(struct owner_group_sids, group);
|
2020-06-12 22:25:21 +08:00
|
|
|
buf->sd.OffsetGroup = cpu_to_le32(group_offset);
|
2020-11-30 09:29:20 +08:00
|
|
|
|
|
|
|
setup_owner_group_sids(ptr);
|
|
|
|
ptr += sizeof(struct owner_group_sids);
|
2020-06-12 22:25:21 +08:00
|
|
|
} else {
|
|
|
|
buf->sd.OffsetOwner = 0;
|
|
|
|
buf->sd.OffsetGroup = 0;
|
|
|
|
}
|
|
|
|
|
2020-11-30 09:29:20 +08:00
|
|
|
buf->ccontext.DataOffset = cpu_to_le16(offsetof(struct crt_sd_ctxt, sd));
|
2020-06-12 22:25:21 +08:00
|
|
|
buf->ccontext.NameOffset = cpu_to_le16(offsetof(struct crt_sd_ctxt, Name));
|
2019-12-06 16:02:38 +08:00
|
|
|
buf->ccontext.NameLength = cpu_to_le16(4);
|
|
|
|
/* SMB2_CREATE_SD_BUFFER_TOKEN is "SecD" */
|
|
|
|
buf->Name[0] = 'S';
|
|
|
|
buf->Name[1] = 'e';
|
|
|
|
buf->Name[2] = 'c';
|
|
|
|
buf->Name[3] = 'D';
|
|
|
|
buf->sd.Revision = 1; /* Must be one see MS-DTYP 2.4.6 */
|
2020-11-30 09:29:20 +08:00
|
|
|
|
2019-12-06 16:02:38 +08:00
|
|
|
/*
|
|
|
|
* ACL is "self relative" ie ACL is stored in contiguous block of memory
|
|
|
|
* and "DP" ie the DACL is present
|
|
|
|
*/
|
|
|
|
buf->sd.Control = cpu_to_le16(ACL_CONTROL_SR | ACL_CONTROL_DP);
|
|
|
|
|
|
|
|
/* offset owner, group and Sbz1 and SACL are all zero */
|
2020-11-30 09:29:20 +08:00
|
|
|
buf->sd.OffsetDacl = cpu_to_le32(ptr - (__u8 *)&buf->sd);
|
|
|
|
/* Ship the ACL for now. we will copy it into buf later. */
|
|
|
|
aclptr = ptr;
|
2021-09-24 05:00:31 +08:00
|
|
|
ptr += sizeof(struct smb3_acl);
|
2019-12-06 16:02:38 +08:00
|
|
|
|
|
|
|
/* create one ACE to hold the mode embedded in reserved special SID */
|
2020-11-30 09:29:20 +08:00
|
|
|
acelen = setup_special_mode_ACE((struct cifs_ace *)ptr, (__u64)mode);
|
|
|
|
ptr += acelen;
|
|
|
|
acl_size = acelen + sizeof(struct smb3_acl);
|
|
|
|
ace_count = 1;
|
2020-06-12 22:25:21 +08:00
|
|
|
|
|
|
|
if (set_owner) {
|
|
|
|
/* we do not need to reallocate buffer to add the two more ACEs. plenty of space */
|
2020-11-30 09:29:20 +08:00
|
|
|
acelen = setup_special_user_owner_ACE((struct cifs_ace *)ptr);
|
|
|
|
ptr += acelen;
|
|
|
|
acl_size += acelen;
|
|
|
|
ace_count += 1;
|
|
|
|
}
|
2020-06-12 22:25:21 +08:00
|
|
|
|
2020-01-17 09:55:33 +08:00
|
|
|
/* and one more ACE to allow access for authenticated users */
|
2020-11-30 09:29:20 +08:00
|
|
|
acelen = setup_authusers_ACE((struct cifs_ace *)ptr);
|
|
|
|
ptr += acelen;
|
|
|
|
acl_size += acelen;
|
|
|
|
ace_count += 1;
|
|
|
|
|
|
|
|
acl.AclRevision = ACL_REVISION; /* See 2.4.4.1 of MS-DTYP */
|
|
|
|
acl.AclSize = cpu_to_le16(acl_size);
|
|
|
|
acl.AceCount = cpu_to_le16(ace_count);
|
2021-09-24 05:00:31 +08:00
|
|
|
memcpy(aclptr, &acl, sizeof(struct smb3_acl));
|
2020-11-30 09:29:20 +08:00
|
|
|
|
|
|
|
buf->ccontext.DataLength = cpu_to_le32(ptr - (__u8 *)&buf->sd);
|
2021-08-05 02:37:22 +08:00
|
|
|
*len = roundup(ptr - (__u8 *)buf, 8);
|
2020-06-12 22:25:21 +08:00
|
|
|
|
2019-12-06 16:02:38 +08:00
|
|
|
return buf;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int
|
2020-06-12 22:25:21 +08:00
|
|
|
add_sd_context(struct kvec *iov, unsigned int *num_iovec, umode_t mode, bool set_owner)
|
2019-12-06 16:02:38 +08:00
|
|
|
{
|
|
|
|
struct smb2_create_req *req = iov[0].iov_base;
|
|
|
|
unsigned int num = *num_iovec;
|
|
|
|
unsigned int len = 0;
|
|
|
|
|
2020-06-12 22:25:21 +08:00
|
|
|
iov[num].iov_base = create_sd_buf(mode, set_owner, &len);
|
2019-12-06 16:02:38 +08:00
|
|
|
if (iov[num].iov_base == NULL)
|
|
|
|
return -ENOMEM;
|
|
|
|
iov[num].iov_len = len;
|
|
|
|
if (!req->CreateContextsOffset)
|
|
|
|
req->CreateContextsOffset = cpu_to_le32(
|
|
|
|
sizeof(struct smb2_create_req) +
|
|
|
|
iov[num - 1].iov_len);
|
|
|
|
le32_add_cpu(&req->CreateContextsLength, len);
|
|
|
|
*num_iovec = num + 1;
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2019-07-07 03:41:38 +08:00
|
|
|
static struct crt_query_id_ctxt *
|
|
|
|
create_query_id_buf(void)
|
|
|
|
{
|
|
|
|
struct crt_query_id_ctxt *buf;
|
|
|
|
|
|
|
|
buf = kzalloc(sizeof(struct crt_query_id_ctxt), GFP_KERNEL);
|
|
|
|
if (!buf)
|
|
|
|
return NULL;
|
|
|
|
|
|
|
|
buf->ccontext.DataOffset = cpu_to_le16(0);
|
|
|
|
buf->ccontext.DataLength = cpu_to_le32(0);
|
|
|
|
buf->ccontext.NameOffset = cpu_to_le16(offsetof
|
|
|
|
(struct crt_query_id_ctxt, Name));
|
|
|
|
buf->ccontext.NameLength = cpu_to_le16(4);
|
|
|
|
/* SMB2_CREATE_QUERY_ON_DISK_ID is "QFid" */
|
|
|
|
buf->Name[0] = 'Q';
|
|
|
|
buf->Name[1] = 'F';
|
|
|
|
buf->Name[2] = 'i';
|
|
|
|
buf->Name[3] = 'd';
|
|
|
|
return buf;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* See MS-SMB2 2.2.13.2.9 */
|
|
|
|
static int
|
|
|
|
add_query_id_context(struct kvec *iov, unsigned int *num_iovec)
|
|
|
|
{
|
|
|
|
struct smb2_create_req *req = iov[0].iov_base;
|
|
|
|
unsigned int num = *num_iovec;
|
|
|
|
|
|
|
|
iov[num].iov_base = create_query_id_buf();
|
|
|
|
if (iov[num].iov_base == NULL)
|
|
|
|
return -ENOMEM;
|
|
|
|
iov[num].iov_len = sizeof(struct crt_query_id_ctxt);
|
|
|
|
if (!req->CreateContextsOffset)
|
|
|
|
req->CreateContextsOffset = cpu_to_le32(
|
|
|
|
sizeof(struct smb2_create_req) +
|
|
|
|
iov[num - 1].iov_len);
|
|
|
|
le32_add_cpu(&req->CreateContextsLength, sizeof(struct crt_query_id_ctxt));
|
|
|
|
*num_iovec = num + 1;
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2017-02-22 21:47:17 +08:00
|
|
|
static int
|
|
|
|
alloc_path_with_tree_prefix(__le16 **out_path, int *out_size, int *out_len,
|
|
|
|
const char *treename, const __le16 *path)
|
|
|
|
{
|
|
|
|
int treename_len, path_len;
|
|
|
|
struct nls_table *cp;
|
|
|
|
const __le16 sep[] = {cpu_to_le16('\\'), cpu_to_le16(0x0000)};
|
|
|
|
|
|
|
|
/*
|
|
|
|
* skip leading "\\"
|
|
|
|
*/
|
|
|
|
treename_len = strlen(treename);
|
|
|
|
if (treename_len < 2 || !(treename[0] == '\\' && treename[1] == '\\'))
|
|
|
|
return -EINVAL;
|
|
|
|
|
|
|
|
treename += 2;
|
|
|
|
treename_len -= 2;
|
|
|
|
|
|
|
|
path_len = UniStrnlen((wchar_t *)path, PATH_MAX);
|
|
|
|
|
|
|
|
/*
|
|
|
|
* make room for one path separator between the treename and
|
|
|
|
* path
|
|
|
|
*/
|
|
|
|
*out_len = treename_len + 1 + path_len;
|
|
|
|
|
|
|
|
/*
|
|
|
|
* final path needs to be null-terminated UTF16 with a
|
|
|
|
* size aligned to 8
|
|
|
|
*/
|
|
|
|
|
|
|
|
*out_size = roundup((*out_len+1)*2, 8);
|
|
|
|
*out_path = kzalloc(*out_size, GFP_KERNEL);
|
|
|
|
if (!*out_path)
|
|
|
|
return -ENOMEM;
|
|
|
|
|
|
|
|
cp = load_nls_default();
|
|
|
|
cifs_strtoUTF16(*out_path, treename, treename_len, cp);
|
2022-01-15 03:53:00 +08:00
|
|
|
|
|
|
|
/* Do not append the separator if the path is empty */
|
|
|
|
if (path[0] != cpu_to_le16(0x0000)) {
|
|
|
|
UniStrcat(*out_path, sep);
|
|
|
|
UniStrcat(*out_path, path);
|
|
|
|
}
|
|
|
|
|
2017-02-22 21:47:17 +08:00
|
|
|
unload_nls(cp);
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2018-06-15 10:56:32 +08:00
|
|
|
int smb311_posix_mkdir(const unsigned int xid, struct inode *inode,
|
|
|
|
umode_t mode, struct cifs_tcon *tcon,
|
|
|
|
const char *full_path,
|
|
|
|
struct cifs_sb_info *cifs_sb)
|
|
|
|
{
|
|
|
|
struct smb_rqst rqst;
|
|
|
|
struct smb2_create_req *req;
|
2018-06-20 06:18:48 +08:00
|
|
|
struct smb2_create_rsp *rsp = NULL;
|
2018-06-15 10:56:32 +08:00
|
|
|
struct cifs_ses *ses = tcon->ses;
|
|
|
|
struct kvec iov[3]; /* make sure at least one for each open context */
|
|
|
|
struct kvec rsp_iov = {NULL, 0};
|
|
|
|
int resp_buftype;
|
|
|
|
int uni_path_len;
|
|
|
|
__le16 *copy_path = NULL;
|
|
|
|
int copy_size;
|
|
|
|
int rc = 0;
|
|
|
|
unsigned int n_iov = 2;
|
|
|
|
__u32 file_attributes = 0;
|
|
|
|
char *pc_buf = NULL;
|
|
|
|
int flags = 0;
|
|
|
|
unsigned int total_len;
|
2018-06-20 06:18:48 +08:00
|
|
|
__le16 *utf16_path = NULL;
|
2020-06-01 01:38:22 +08:00
|
|
|
struct TCP_Server_Info *server = cifs_pick_channel(ses);
|
2018-06-15 10:56:32 +08:00
|
|
|
|
|
|
|
cifs_dbg(FYI, "mkdir\n");
|
|
|
|
|
2018-06-20 06:18:48 +08:00
|
|
|
/* resource #1: path allocation */
|
|
|
|
utf16_path = cifs_convert_path_to_utf16(full_path, cifs_sb);
|
|
|
|
if (!utf16_path)
|
|
|
|
return -ENOMEM;
|
|
|
|
|
2020-06-01 01:38:22 +08:00
|
|
|
if (!ses || !server) {
|
2018-06-20 06:18:48 +08:00
|
|
|
rc = -EIO;
|
|
|
|
goto err_free_path;
|
|
|
|
}
|
2018-06-15 10:56:32 +08:00
|
|
|
|
2018-06-20 06:18:48 +08:00
|
|
|
/* resource #2: request */
|
2020-06-01 01:38:22 +08:00
|
|
|
rc = smb2_plain_req_init(SMB2_CREATE, tcon, server,
|
|
|
|
(void **) &req, &total_len);
|
2018-06-15 10:56:32 +08:00
|
|
|
if (rc)
|
2018-06-20 06:18:48 +08:00
|
|
|
goto err_free_path;
|
|
|
|
|
2018-06-15 10:56:32 +08:00
|
|
|
|
|
|
|
if (smb3_encryption_required(tcon))
|
|
|
|
flags |= CIFS_TRANSFORM_REQ;
|
|
|
|
|
|
|
|
req->ImpersonationLevel = IL_IMPERSONATION;
|
|
|
|
req->DesiredAccess = cpu_to_le32(FILE_WRITE_ATTRIBUTES);
|
|
|
|
/* File attributes ignored on open (used in create though) */
|
|
|
|
req->FileAttributes = cpu_to_le32(file_attributes);
|
|
|
|
req->ShareAccess = FILE_SHARE_ALL_LE;
|
|
|
|
req->CreateDisposition = cpu_to_le32(FILE_CREATE);
|
|
|
|
req->CreateOptions = cpu_to_le32(CREATE_NOT_FILE);
|
|
|
|
|
|
|
|
iov[0].iov_base = (char *)req;
|
|
|
|
/* -1 since last byte is buf[0] which is sent below (path) */
|
|
|
|
iov[0].iov_len = total_len - 1;
|
|
|
|
|
|
|
|
req->NameOffset = cpu_to_le16(sizeof(struct smb2_create_req));
|
|
|
|
|
|
|
|
/* [MS-SMB2] 2.2.13 NameOffset:
|
|
|
|
* If SMB2_FLAGS_DFS_OPERATIONS is set in the Flags field of
|
|
|
|
* the SMB2 header, the file name includes a prefix that will
|
|
|
|
* be processed during DFS name normalization as specified in
|
|
|
|
* section 3.3.5.9. Otherwise, the file name is relative to
|
|
|
|
* the share that is identified by the TreeId in the SMB2
|
|
|
|
* header.
|
|
|
|
*/
|
|
|
|
if (tcon->share_flags & SHI1005_FLAGS_DFS) {
|
|
|
|
int name_len;
|
|
|
|
|
2021-11-05 07:39:01 +08:00
|
|
|
req->hdr.Flags |= SMB2_FLAGS_DFS_OPERATIONS;
|
2018-06-15 10:56:32 +08:00
|
|
|
rc = alloc_path_with_tree_prefix(©_path, ©_size,
|
|
|
|
&name_len,
|
2018-06-20 06:18:48 +08:00
|
|
|
tcon->treeName, utf16_path);
|
|
|
|
if (rc)
|
|
|
|
goto err_free_req;
|
|
|
|
|
2018-06-15 10:56:32 +08:00
|
|
|
req->NameLength = cpu_to_le16(name_len * 2);
|
|
|
|
uni_path_len = copy_size;
|
2018-06-20 06:18:48 +08:00
|
|
|
/* free before overwriting resource */
|
|
|
|
kfree(utf16_path);
|
|
|
|
utf16_path = copy_path;
|
2018-06-15 10:56:32 +08:00
|
|
|
} else {
|
2018-06-20 06:18:48 +08:00
|
|
|
uni_path_len = (2 * UniStrnlen((wchar_t *)utf16_path, PATH_MAX)) + 2;
|
2018-06-15 10:56:32 +08:00
|
|
|
/* MUST set path len (NameLength) to 0 opening root of share */
|
|
|
|
req->NameLength = cpu_to_le16(uni_path_len - 2);
|
|
|
|
if (uni_path_len % 8 != 0) {
|
|
|
|
copy_size = roundup(uni_path_len, 8);
|
|
|
|
copy_path = kzalloc(copy_size, GFP_KERNEL);
|
|
|
|
if (!copy_path) {
|
2018-06-20 06:18:48 +08:00
|
|
|
rc = -ENOMEM;
|
|
|
|
goto err_free_req;
|
2018-06-15 10:56:32 +08:00
|
|
|
}
|
2018-06-20 06:18:48 +08:00
|
|
|
memcpy((char *)copy_path, (const char *)utf16_path,
|
2018-06-15 10:56:32 +08:00
|
|
|
uni_path_len);
|
|
|
|
uni_path_len = copy_size;
|
2018-06-20 06:18:48 +08:00
|
|
|
/* free before overwriting resource */
|
|
|
|
kfree(utf16_path);
|
|
|
|
utf16_path = copy_path;
|
2018-06-15 10:56:32 +08:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
iov[1].iov_len = uni_path_len;
|
2018-06-20 06:18:48 +08:00
|
|
|
iov[1].iov_base = utf16_path;
|
2018-06-15 10:56:32 +08:00
|
|
|
req->RequestedOplockLevel = SMB2_OPLOCK_LEVEL_NONE;
|
|
|
|
|
|
|
|
if (tcon->posix_extensions) {
|
2018-06-20 06:18:48 +08:00
|
|
|
/* resource #3: posix buf */
|
2018-06-15 10:56:32 +08:00
|
|
|
rc = add_posix_context(iov, &n_iov, mode);
|
2018-06-20 06:18:48 +08:00
|
|
|
if (rc)
|
|
|
|
goto err_free_req;
|
2018-06-15 10:56:32 +08:00
|
|
|
pc_buf = iov[n_iov-1].iov_base;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
memset(&rqst, 0, sizeof(struct smb_rqst));
|
|
|
|
rqst.rq_iov = iov;
|
|
|
|
rqst.rq_nvec = n_iov;
|
|
|
|
|
2019-09-22 13:55:46 +08:00
|
|
|
/* no need to inc num_remote_opens because we close it just below */
|
2019-02-27 09:08:12 +08:00
|
|
|
trace_smb3_posix_mkdir_enter(xid, tcon->tid, ses->Suid, CREATE_NOT_FILE,
|
|
|
|
FILE_WRITE_ATTRIBUTES);
|
2018-06-20 06:18:48 +08:00
|
|
|
/* resource #4: response buffer */
|
2020-06-01 01:38:22 +08:00
|
|
|
rc = cifs_send_recv(xid, ses, server,
|
|
|
|
&rqst, &resp_buftype, flags, &rsp_iov);
|
2018-06-20 06:18:48 +08:00
|
|
|
if (rc) {
|
2018-06-15 10:56:32 +08:00
|
|
|
cifs_stats_fail_inc(tcon, SMB2_CREATE_HE);
|
|
|
|
trace_smb3_posix_mkdir_err(xid, tcon->tid, ses->Suid,
|
2018-06-20 06:18:48 +08:00
|
|
|
CREATE_NOT_FILE,
|
|
|
|
FILE_WRITE_ATTRIBUTES, rc);
|
|
|
|
goto err_free_rsp_buf;
|
|
|
|
}
|
|
|
|
|
2021-11-12 05:35:34 +08:00
|
|
|
/*
|
|
|
|
* Although unlikely to be possible for rsp to be null and rc not set,
|
|
|
|
* adding check below is slightly safer long term (and quiets Coverity
|
|
|
|
* warning)
|
|
|
|
*/
|
2018-06-20 06:18:48 +08:00
|
|
|
rsp = (struct smb2_create_rsp *)rsp_iov.iov_base;
|
2021-11-12 05:35:34 +08:00
|
|
|
if (rsp == NULL) {
|
|
|
|
rc = -EIO;
|
|
|
|
kfree(pc_buf);
|
|
|
|
goto err_free_req;
|
|
|
|
}
|
|
|
|
|
2022-03-22 00:08:25 +08:00
|
|
|
trace_smb3_posix_mkdir_done(xid, rsp->PersistentFileId, tcon->tid, ses->Suid,
|
|
|
|
CREATE_NOT_FILE, FILE_WRITE_ATTRIBUTES);
|
2018-06-15 10:56:32 +08:00
|
|
|
|
2022-03-22 00:08:25 +08:00
|
|
|
SMB2_close(xid, tcon, rsp->PersistentFileId, rsp->VolatileFileId);
|
2018-06-15 10:56:32 +08:00
|
|
|
|
|
|
|
/* Eventually save off posix specific response info and timestaps */
|
|
|
|
|
2018-06-20 06:18:48 +08:00
|
|
|
err_free_rsp_buf:
|
2018-06-15 10:56:32 +08:00
|
|
|
free_rsp_buf(resp_buftype, rsp);
|
2018-06-20 06:18:48 +08:00
|
|
|
kfree(pc_buf);
|
|
|
|
err_free_req:
|
|
|
|
cifs_small_buf_release(req);
|
|
|
|
err_free_path:
|
|
|
|
kfree(utf16_path);
|
2018-06-15 10:56:32 +08:00
|
|
|
return rc;
|
|
|
|
}
|
|
|
|
|
2011-12-27 02:58:46 +08:00
|
|
|
int
|
2020-06-01 01:38:22 +08:00
|
|
|
SMB2_open_init(struct cifs_tcon *tcon, struct TCP_Server_Info *server,
|
|
|
|
struct smb_rqst *rqst, __u8 *oplock,
|
2018-08-08 13:07:46 +08:00
|
|
|
struct cifs_open_parms *oparms, __le16 *path)
|
2011-12-27 02:58:46 +08:00
|
|
|
{
|
|
|
|
struct smb2_create_req *req;
|
2016-10-26 02:38:47 +08:00
|
|
|
unsigned int n_iov = 2;
|
2013-07-05 16:21:26 +08:00
|
|
|
__u32 file_attributes = 0;
|
2018-08-08 13:07:46 +08:00
|
|
|
int copy_size;
|
|
|
|
int uni_path_len;
|
2017-11-20 08:24:38 +08:00
|
|
|
unsigned int total_len;
|
2018-08-08 13:07:46 +08:00
|
|
|
struct kvec *iov = rqst->rq_iov;
|
|
|
|
__le16 *copy_path;
|
|
|
|
int rc;
|
2011-12-27 02:58:46 +08:00
|
|
|
|
2020-06-01 01:38:22 +08:00
|
|
|
rc = smb2_plain_req_init(SMB2_CREATE, tcon, server,
|
|
|
|
(void **) &req, &total_len);
|
2011-12-27 02:58:46 +08:00
|
|
|
if (rc)
|
|
|
|
return rc;
|
|
|
|
|
2018-08-08 13:07:46 +08:00
|
|
|
iov[0].iov_base = (char *)req;
|
|
|
|
/* -1 since last byte is buf[0] which is sent below (path) */
|
|
|
|
iov[0].iov_len = total_len - 1;
|
2016-11-01 04:49:30 +08:00
|
|
|
|
2013-07-09 22:20:30 +08:00
|
|
|
if (oparms->create_options & CREATE_OPTION_READONLY)
|
2013-07-05 16:21:26 +08:00
|
|
|
file_attributes |= ATTR_READONLY;
|
2014-09-22 18:13:55 +08:00
|
|
|
if (oparms->create_options & CREATE_OPTION_SPECIAL)
|
|
|
|
file_attributes |= ATTR_SYSTEM;
|
2013-07-05 16:21:26 +08:00
|
|
|
|
2011-12-27 02:58:46 +08:00
|
|
|
req->ImpersonationLevel = IL_IMPERSONATION;
|
2013-07-09 22:20:30 +08:00
|
|
|
req->DesiredAccess = cpu_to_le32(oparms->desired_access);
|
2011-12-27 02:58:46 +08:00
|
|
|
/* File attributes ignored on open (used in create though) */
|
|
|
|
req->FileAttributes = cpu_to_le32(file_attributes);
|
|
|
|
req->ShareAccess = FILE_SHARE_ALL_LE;
|
2019-09-25 13:32:13 +08:00
|
|
|
|
2013-07-09 22:20:30 +08:00
|
|
|
req->CreateDisposition = cpu_to_le32(oparms->disposition);
|
|
|
|
req->CreateOptions = cpu_to_le32(oparms->create_options & CREATE_OPTIONS_MASK);
|
2017-11-20 08:24:38 +08:00
|
|
|
req->NameOffset = cpu_to_le16(sizeof(struct smb2_create_req));
|
2017-02-22 21:47:17 +08:00
|
|
|
|
|
|
|
/* [MS-SMB2] 2.2.13 NameOffset:
|
|
|
|
* If SMB2_FLAGS_DFS_OPERATIONS is set in the Flags field of
|
|
|
|
* the SMB2 header, the file name includes a prefix that will
|
|
|
|
* be processed during DFS name normalization as specified in
|
|
|
|
* section 3.3.5.9. Otherwise, the file name is relative to
|
|
|
|
* the share that is identified by the TreeId in the SMB2
|
|
|
|
* header.
|
|
|
|
*/
|
|
|
|
if (tcon->share_flags & SHI1005_FLAGS_DFS) {
|
|
|
|
int name_len;
|
|
|
|
|
2021-11-05 07:39:01 +08:00
|
|
|
req->hdr.Flags |= SMB2_FLAGS_DFS_OPERATIONS;
|
2017-02-22 21:47:17 +08:00
|
|
|
rc = alloc_path_with_tree_prefix(©_path, ©_size,
|
|
|
|
&name_len,
|
|
|
|
tcon->treeName, path);
|
2018-08-08 13:07:46 +08:00
|
|
|
if (rc)
|
2017-02-22 21:47:17 +08:00
|
|
|
return rc;
|
|
|
|
req->NameLength = cpu_to_le16(name_len * 2);
|
2013-07-04 23:41:24 +08:00
|
|
|
uni_path_len = copy_size;
|
|
|
|
path = copy_path;
|
2017-02-22 21:47:17 +08:00
|
|
|
} else {
|
|
|
|
uni_path_len = (2 * UniStrnlen((wchar_t *)path, PATH_MAX)) + 2;
|
|
|
|
/* MUST set path len (NameLength) to 0 opening root of share */
|
|
|
|
req->NameLength = cpu_to_le16(uni_path_len - 2);
|
2018-08-08 13:07:46 +08:00
|
|
|
copy_size = uni_path_len;
|
|
|
|
if (copy_size % 8 != 0)
|
|
|
|
copy_size = roundup(copy_size, 8);
|
|
|
|
copy_path = kzalloc(copy_size, GFP_KERNEL);
|
|
|
|
if (!copy_path)
|
|
|
|
return -ENOMEM;
|
|
|
|
memcpy((char *)copy_path, (const char *)path,
|
|
|
|
uni_path_len);
|
|
|
|
uni_path_len = copy_size;
|
|
|
|
path = copy_path;
|
2011-12-27 02:58:46 +08:00
|
|
|
}
|
|
|
|
|
2013-07-04 23:41:24 +08:00
|
|
|
iov[1].iov_len = uni_path_len;
|
|
|
|
iov[1].iov_base = path;
|
|
|
|
|
2019-09-12 10:46:20 +08:00
|
|
|
if ((!server->oplocks) || (tcon->no_lease))
|
2012-09-19 21:22:44 +08:00
|
|
|
*oplock = SMB2_OPLOCK_LEVEL_NONE;
|
|
|
|
|
2013-09-04 17:07:41 +08:00
|
|
|
if (!(server->capabilities & SMB2_GLOBAL_CAP_LEASING) ||
|
2012-09-19 21:22:44 +08:00
|
|
|
*oplock == SMB2_OPLOCK_LEVEL_NONE)
|
|
|
|
req->RequestedOplockLevel = *oplock;
|
2018-09-01 04:12:10 +08:00
|
|
|
else if (!(server->capabilities & SMB2_GLOBAL_CAP_DIRECTORY_LEASING) &&
|
|
|
|
(oparms->create_options & CREATE_NOT_FILE))
|
|
|
|
req->RequestedOplockLevel = *oplock; /* no srv lease support */
|
2012-09-19 21:22:44 +08:00
|
|
|
else {
|
2018-07-05 21:10:02 +08:00
|
|
|
rc = add_lease_context(server, iov, &n_iov,
|
|
|
|
oparms->fid->lease_key, oplock);
|
2018-08-08 13:07:46 +08:00
|
|
|
if (rc)
|
2013-07-04 23:10:00 +08:00
|
|
|
return rc;
|
2012-09-19 21:22:44 +08:00
|
|
|
}
|
|
|
|
|
2013-07-04 22:41:09 +08:00
|
|
|
if (*oplock == SMB2_OPLOCK_LEVEL_BATCH) {
|
|
|
|
/* need to set Next field of lease context if we request it */
|
2013-09-04 17:07:41 +08:00
|
|
|
if (server->capabilities & SMB2_GLOBAL_CAP_LEASING) {
|
2013-07-04 22:41:09 +08:00
|
|
|
struct create_context *ccontext =
|
2016-10-26 02:38:47 +08:00
|
|
|
(struct create_context *)iov[n_iov-1].iov_base;
|
2013-07-11 01:50:57 +08:00
|
|
|
ccontext->Next =
|
2013-09-04 17:07:41 +08:00
|
|
|
cpu_to_le32(server->vals->create_lease_size);
|
2013-07-04 22:41:09 +08:00
|
|
|
}
|
2015-11-03 23:26:27 +08:00
|
|
|
|
2016-10-26 02:38:47 +08:00
|
|
|
rc = add_durable_context(iov, &n_iov, oparms,
|
2015-11-03 23:26:27 +08:00
|
|
|
tcon->use_persistent);
|
2018-08-08 13:07:46 +08:00
|
|
|
if (rc)
|
2013-07-04 22:41:09 +08:00
|
|
|
return rc;
|
|
|
|
}
|
|
|
|
|
2018-06-01 08:16:54 +08:00
|
|
|
if (tcon->posix_extensions) {
|
|
|
|
if (n_iov > 2) {
|
|
|
|
struct create_context *ccontext =
|
|
|
|
(struct create_context *)iov[n_iov-1].iov_base;
|
|
|
|
ccontext->Next =
|
|
|
|
cpu_to_le32(iov[n_iov-1].iov_len);
|
|
|
|
}
|
|
|
|
|
|
|
|
rc = add_posix_context(iov, &n_iov, oparms->mode);
|
2018-08-08 13:07:46 +08:00
|
|
|
if (rc)
|
2018-06-01 08:16:54 +08:00
|
|
|
return rc;
|
|
|
|
}
|
|
|
|
|
smb3: allow previous versions to be mounted with snapshot= mount parm
mounting with the "snapshots=" mount parm allows a read-only
view of a previous version of a file system (see MS-SMB2
and "timewarp" tokens, section 2.2.13.2.6) based on the timestamp
passed in on the snapshots mount parm.
Add processing to optionally send this create context.
Example output:
/mnt1 is mounted with "snapshots=..." and will see an earlier
version of the directory, with three fewer files than /mnt2
the current version of the directory.
root@Ubuntu-17-Virtual-Machine:~/cifs-2.6# cat /proc/mounts | grep cifs
//172.22.149.186/public /mnt1 cifs
ro,relatime,vers=default,cache=strict,username=smfrench,uid=0,noforceuid,gid=0,noforcegid,addr=172.22.149.186,file_mode=0755,dir_mode=0755,soft,nounix,mapposix,rsize=1048576,wsize=1048576,echo_interval=60,snapshot=131748608570000000,actimeo=1
//172.22.149.186/public /mnt2 cifs
rw,relatime,vers=default,cache=strict,username=smfrench,uid=0,noforceuid,gid=0,noforcegid,addr=172.22.149.186,file_mode=0755,dir_mode=0755,soft,nounix,mapposix,rsize=1048576,wsize=1048576,echo_interval=60,actimeo=1
root@Ubuntu-17-Virtual-Machine:~/cifs-2.6# ls /mnt1
EmptyDir newerdir
root@Ubuntu-17-Virtual-Machine:~/cifs-2.6# ls /mnt1/newerdir
root@Ubuntu-17-Virtual-Machine:~/cifs-2.6# ls /mnt2
EmptyDir file newerdir newestdir timestamp-trace.cap
root@Ubuntu-17-Virtual-Machine:~/cifs-2.6# ls /mnt2/newerdir
new-file-not-in-snapshot
Snapshots are extremely useful for comparing previous versions of files or directories,
and recovering from data corruptions or mistakes.
Signed-off-by: Steve French <stfrench@microsoft.com>
Reviewed-by: Ronnie Sahlberg <lsahlber@redhat.com>
2018-08-10 15:25:06 +08:00
|
|
|
if (tcon->snapshot_time) {
|
|
|
|
cifs_dbg(FYI, "adding snapshot context\n");
|
|
|
|
if (n_iov > 2) {
|
|
|
|
struct create_context *ccontext =
|
|
|
|
(struct create_context *)iov[n_iov-1].iov_base;
|
|
|
|
ccontext->Next =
|
|
|
|
cpu_to_le32(iov[n_iov-1].iov_len);
|
|
|
|
}
|
|
|
|
|
|
|
|
rc = add_twarp_context(iov, &n_iov, tcon->snapshot_time);
|
|
|
|
if (rc)
|
|
|
|
return rc;
|
|
|
|
}
|
|
|
|
|
2020-06-12 22:25:21 +08:00
|
|
|
if ((oparms->disposition != FILE_OPEN) && (oparms->cifs_sb)) {
|
|
|
|
bool set_mode;
|
|
|
|
bool set_owner;
|
|
|
|
|
|
|
|
if ((oparms->cifs_sb->mnt_cifs_flags & CIFS_MOUNT_MODE_FROM_SID) &&
|
|
|
|
(oparms->mode != ACL_NO_MODE))
|
|
|
|
set_mode = true;
|
|
|
|
else {
|
|
|
|
set_mode = false;
|
|
|
|
oparms->mode = ACL_NO_MODE;
|
2019-09-25 13:32:13 +08:00
|
|
|
}
|
|
|
|
|
2020-06-12 22:25:21 +08:00
|
|
|
if (oparms->cifs_sb->mnt_cifs_flags & CIFS_MOUNT_UID_FROM_ACL)
|
|
|
|
set_owner = true;
|
|
|
|
else
|
|
|
|
set_owner = false;
|
|
|
|
|
|
|
|
if (set_owner | set_mode) {
|
|
|
|
if (n_iov > 2) {
|
|
|
|
struct create_context *ccontext =
|
|
|
|
(struct create_context *)iov[n_iov-1].iov_base;
|
|
|
|
ccontext->Next = cpu_to_le32(iov[n_iov-1].iov_len);
|
|
|
|
}
|
|
|
|
|
|
|
|
cifs_dbg(FYI, "add sd with mode 0x%x\n", oparms->mode);
|
|
|
|
rc = add_sd_context(iov, &n_iov, oparms->mode, set_owner);
|
|
|
|
if (rc)
|
|
|
|
return rc;
|
|
|
|
}
|
2019-09-25 13:32:13 +08:00
|
|
|
}
|
|
|
|
|
2019-07-07 03:41:38 +08:00
|
|
|
if (n_iov > 2) {
|
|
|
|
struct create_context *ccontext =
|
|
|
|
(struct create_context *)iov[n_iov-1].iov_base;
|
|
|
|
ccontext->Next = cpu_to_le32(iov[n_iov-1].iov_len);
|
|
|
|
}
|
|
|
|
add_query_id_context(iov, &n_iov);
|
smb3: allow previous versions to be mounted with snapshot= mount parm
mounting with the "snapshots=" mount parm allows a read-only
view of a previous version of a file system (see MS-SMB2
and "timewarp" tokens, section 2.2.13.2.6) based on the timestamp
passed in on the snapshots mount parm.
Add processing to optionally send this create context.
Example output:
/mnt1 is mounted with "snapshots=..." and will see an earlier
version of the directory, with three fewer files than /mnt2
the current version of the directory.
root@Ubuntu-17-Virtual-Machine:~/cifs-2.6# cat /proc/mounts | grep cifs
//172.22.149.186/public /mnt1 cifs
ro,relatime,vers=default,cache=strict,username=smfrench,uid=0,noforceuid,gid=0,noforcegid,addr=172.22.149.186,file_mode=0755,dir_mode=0755,soft,nounix,mapposix,rsize=1048576,wsize=1048576,echo_interval=60,snapshot=131748608570000000,actimeo=1
//172.22.149.186/public /mnt2 cifs
rw,relatime,vers=default,cache=strict,username=smfrench,uid=0,noforceuid,gid=0,noforcegid,addr=172.22.149.186,file_mode=0755,dir_mode=0755,soft,nounix,mapposix,rsize=1048576,wsize=1048576,echo_interval=60,actimeo=1
root@Ubuntu-17-Virtual-Machine:~/cifs-2.6# ls /mnt1
EmptyDir newerdir
root@Ubuntu-17-Virtual-Machine:~/cifs-2.6# ls /mnt1/newerdir
root@Ubuntu-17-Virtual-Machine:~/cifs-2.6# ls /mnt2
EmptyDir file newerdir newestdir timestamp-trace.cap
root@Ubuntu-17-Virtual-Machine:~/cifs-2.6# ls /mnt2/newerdir
new-file-not-in-snapshot
Snapshots are extremely useful for comparing previous versions of files or directories,
and recovering from data corruptions or mistakes.
Signed-off-by: Steve French <stfrench@microsoft.com>
Reviewed-by: Ronnie Sahlberg <lsahlber@redhat.com>
2018-08-10 15:25:06 +08:00
|
|
|
|
2018-08-08 13:07:46 +08:00
|
|
|
rqst->rq_nvec = n_iov;
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* rq_iov[0] is the request and is released by cifs_small_buf_release().
|
|
|
|
* All other vectors are freed by kfree().
|
|
|
|
*/
|
|
|
|
void
|
|
|
|
SMB2_open_free(struct smb_rqst *rqst)
|
|
|
|
{
|
|
|
|
int i;
|
|
|
|
|
2018-10-24 09:50:33 +08:00
|
|
|
if (rqst && rqst->rq_iov) {
|
|
|
|
cifs_small_buf_release(rqst->rq_iov[0].iov_base);
|
|
|
|
for (i = 1; i < rqst->rq_nvec; i++)
|
|
|
|
if (rqst->rq_iov[i].iov_base != smb2_padding)
|
|
|
|
kfree(rqst->rq_iov[i].iov_base);
|
|
|
|
}
|
2018-08-08 13:07:46 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
int
|
|
|
|
SMB2_open(const unsigned int xid, struct cifs_open_parms *oparms, __le16 *path,
|
|
|
|
__u8 *oplock, struct smb2_file_all_info *buf,
|
2020-03-03 00:53:22 +08:00
|
|
|
struct create_posix_rsp *posix,
|
2018-08-08 13:07:46 +08:00
|
|
|
struct kvec *err_iov, int *buftype)
|
|
|
|
{
|
|
|
|
struct smb_rqst rqst;
|
|
|
|
struct smb2_create_rsp *rsp = NULL;
|
|
|
|
struct cifs_tcon *tcon = oparms->tcon;
|
|
|
|
struct cifs_ses *ses = tcon->ses;
|
2020-06-01 01:38:22 +08:00
|
|
|
struct TCP_Server_Info *server = cifs_pick_channel(ses);
|
2018-08-21 09:49:21 +08:00
|
|
|
struct kvec iov[SMB2_CREATE_IOV_SIZE];
|
2018-08-08 13:07:46 +08:00
|
|
|
struct kvec rsp_iov = {NULL, 0};
|
2018-10-04 03:51:21 +08:00
|
|
|
int resp_buftype = CIFS_NO_BUFFER;
|
2018-08-08 13:07:46 +08:00
|
|
|
int rc = 0;
|
|
|
|
int flags = 0;
|
|
|
|
|
|
|
|
cifs_dbg(FYI, "create/open\n");
|
2020-06-01 01:38:22 +08:00
|
|
|
if (!ses || !server)
|
2018-08-08 13:07:46 +08:00
|
|
|
return -EIO;
|
|
|
|
|
|
|
|
if (smb3_encryption_required(tcon))
|
|
|
|
flags |= CIFS_TRANSFORM_REQ;
|
|
|
|
|
2018-06-12 06:00:59 +08:00
|
|
|
memset(&rqst, 0, sizeof(struct smb_rqst));
|
2018-08-08 13:07:46 +08:00
|
|
|
memset(&iov, 0, sizeof(iov));
|
2018-06-12 06:00:59 +08:00
|
|
|
rqst.rq_iov = iov;
|
2018-08-21 09:49:21 +08:00
|
|
|
rqst.rq_nvec = SMB2_CREATE_IOV_SIZE;
|
2018-08-08 13:07:46 +08:00
|
|
|
|
2020-06-01 01:38:22 +08:00
|
|
|
rc = SMB2_open_init(tcon, server,
|
|
|
|
&rqst, oplock, oparms, path);
|
2018-08-08 13:07:46 +08:00
|
|
|
if (rc)
|
|
|
|
goto creat_exit;
|
2018-06-12 06:00:59 +08:00
|
|
|
|
2019-02-27 09:08:12 +08:00
|
|
|
trace_smb3_open_enter(xid, tcon->tid, tcon->ses->Suid,
|
|
|
|
oparms->create_options, oparms->desired_access);
|
|
|
|
|
2020-06-01 01:38:22 +08:00
|
|
|
rc = cifs_send_recv(xid, ses, server,
|
|
|
|
&rqst, &resp_buftype, flags,
|
2017-11-20 08:24:38 +08:00
|
|
|
&rsp_iov);
|
2016-10-26 02:38:47 +08:00
|
|
|
rsp = (struct smb2_create_rsp *)rsp_iov.iov_base;
|
2011-12-27 02:58:46 +08:00
|
|
|
|
|
|
|
if (rc != 0) {
|
|
|
|
cifs_stats_fail_inc(tcon, SMB2_CREATE_HE);
|
2018-04-13 07:03:19 +08:00
|
|
|
if (err_iov && rsp) {
|
|
|
|
*err_iov = rsp_iov;
|
2018-06-08 11:21:18 +08:00
|
|
|
*buftype = resp_buftype;
|
2018-04-13 07:03:19 +08:00
|
|
|
resp_buftype = CIFS_NO_BUFFER;
|
|
|
|
rsp = NULL;
|
|
|
|
}
|
2018-05-31 10:42:34 +08:00
|
|
|
trace_smb3_open_err(xid, tcon->tid, ses->Suid,
|
|
|
|
oparms->create_options, oparms->desired_access, rc);
|
2019-09-11 13:07:36 +08:00
|
|
|
if (rc == -EREMCHG) {
|
2020-04-15 13:42:53 +08:00
|
|
|
pr_warn_once("server share %s deleted\n",
|
|
|
|
tcon->treeName);
|
2019-09-11 13:07:36 +08:00
|
|
|
tcon->need_reconnect = true;
|
|
|
|
}
|
2011-12-27 02:58:46 +08:00
|
|
|
goto creat_exit;
|
2021-11-12 06:10:00 +08:00
|
|
|
} else if (rsp == NULL) /* unlikely to happen, but safer to check */
|
|
|
|
goto creat_exit;
|
|
|
|
else
|
2022-03-22 00:08:25 +08:00
|
|
|
trace_smb3_open_done(xid, rsp->PersistentFileId, tcon->tid, ses->Suid,
|
|
|
|
oparms->create_options, oparms->desired_access);
|
2011-12-27 02:58:46 +08:00
|
|
|
|
2018-10-20 06:14:32 +08:00
|
|
|
atomic_inc(&tcon->num_remote_opens);
|
2022-03-22 00:08:25 +08:00
|
|
|
oparms->fid->persistent_fid = rsp->PersistentFileId;
|
|
|
|
oparms->fid->volatile_fid = rsp->VolatileFileId;
|
cifs: fix rename() by ensuring source handle opened with DELETE bit
To rename a file in SMB2 we open it with the DELETE access and do a
special SetInfo on it. If the handle is missing the DELETE bit the
server will fail the SetInfo with STATUS_ACCESS_DENIED.
We currently try to reuse any existing opened handle we have with
cifs_get_writable_path(). That function looks for handles with WRITE
access but doesn't check for DELETE, making rename() fail if it finds
a handle to reuse. Simple reproducer below.
To select handles with the DELETE bit, this patch adds a flag argument
to cifs_get_writable_path() and find_writable_file() and the existing
'bool fsuid_only' argument is converted to a flag.
The cifsFileInfo struct only stores the UNIX open mode but not the
original SMB access flags. Since the DELETE bit is not mapped in that
mode, this patch stores the access mask in cifs_fid on file open,
which is accessible from cifsFileInfo.
Simple reproducer:
#include <stdio.h>
#include <stdlib.h>
#include <sys/types.h>
#include <sys/stat.h>
#include <fcntl.h>
#include <unistd.h>
#define E(s) perror(s), exit(1)
int main(int argc, char *argv[])
{
int fd, ret;
if (argc != 3) {
fprintf(stderr, "Usage: %s A B\n"
"create&open A in write mode, "
"rename A to B, close A\n", argv[0]);
return 0;
}
fd = openat(AT_FDCWD, argv[1], O_WRONLY|O_CREAT|O_SYNC, 0666);
if (fd == -1) E("openat()");
ret = rename(argv[1], argv[2]);
if (ret) E("rename()");
ret = close(fd);
if (ret) E("close()");
return ret;
}
$ gcc -o bugrename bugrename.c
$ ./bugrename /mnt/a /mnt/b
rename(): Permission denied
Fixes: 8de9e86c67ba ("cifs: create a helper to find a writeable handle by path name")
CC: Stable <stable@vger.kernel.org>
Signed-off-by: Aurelien Aptel <aaptel@suse.com>
Signed-off-by: Steve French <stfrench@microsoft.com>
Reviewed-by: Pavel Shilovsky <pshilov@microsoft.com>
Reviewed-by: Paulo Alcantara (SUSE) <pc@cjr.nz>
2020-02-21 18:19:06 +08:00
|
|
|
oparms->fid->access = oparms->desired_access;
|
2018-10-31 08:50:31 +08:00
|
|
|
#ifdef CONFIG_CIFS_DEBUG2
|
2021-11-05 07:39:01 +08:00
|
|
|
oparms->fid->mid = le64_to_cpu(rsp->hdr.MessageId);
|
2018-10-31 08:50:31 +08:00
|
|
|
#endif /* CIFS_DEBUG2 */
|
2012-09-19 07:20:26 +08:00
|
|
|
|
|
|
|
if (buf) {
|
2021-06-22 05:44:46 +08:00
|
|
|
buf->CreationTime = rsp->CreationTime;
|
|
|
|
buf->LastAccessTime = rsp->LastAccessTime;
|
|
|
|
buf->LastWriteTime = rsp->LastWriteTime;
|
|
|
|
buf->ChangeTime = rsp->ChangeTime;
|
2012-09-19 07:20:26 +08:00
|
|
|
buf->AllocationSize = rsp->AllocationSize;
|
|
|
|
buf->EndOfFile = rsp->EndofFile;
|
|
|
|
buf->Attributes = rsp->FileAttributes;
|
|
|
|
buf->NumberOfLinks = cpu_to_le32(1);
|
|
|
|
buf->DeletePending = 0;
|
|
|
|
}
|
2012-09-19 07:20:33 +08:00
|
|
|
|
2019-07-19 06:22:18 +08:00
|
|
|
|
|
|
|
smb2_parse_contexts(server, rsp, &oparms->fid->epoch,
|
2020-03-03 00:53:22 +08:00
|
|
|
oparms->fid->lease_key, oplock, buf, posix);
|
2011-12-27 02:58:46 +08:00
|
|
|
creat_exit:
|
2018-08-08 13:07:46 +08:00
|
|
|
SMB2_open_free(&rqst);
|
2011-12-27 02:58:46 +08:00
|
|
|
free_rsp_buf(resp_buftype, rsp);
|
|
|
|
return rc;
|
|
|
|
}
|
|
|
|
|
2013-06-25 13:20:49 +08:00
|
|
|
int
|
2020-06-01 01:38:22 +08:00
|
|
|
SMB2_ioctl_init(struct cifs_tcon *tcon, struct TCP_Server_Info *server,
|
|
|
|
struct smb_rqst *rqst,
|
2019-03-13 12:37:48 +08:00
|
|
|
u64 persistent_fid, u64 volatile_fid, u32 opcode,
|
2019-03-29 11:32:49 +08:00
|
|
|
bool is_fsctl, char *in_data, u32 indatalen,
|
|
|
|
__u32 max_response_size)
|
2013-06-25 13:20:49 +08:00
|
|
|
{
|
|
|
|
struct smb2_ioctl_req *req;
|
2019-03-13 12:37:48 +08:00
|
|
|
struct kvec *iov = rqst->rq_iov;
|
2017-11-09 09:14:20 +08:00
|
|
|
unsigned int total_len;
|
2019-03-13 12:37:48 +08:00
|
|
|
int rc;
|
2019-05-16 05:09:05 +08:00
|
|
|
char *in_data_buf;
|
2013-06-25 13:20:49 +08:00
|
|
|
|
2020-06-01 01:38:22 +08:00
|
|
|
rc = smb2_ioctl_req_init(opcode, tcon, server,
|
|
|
|
(void **) &req, &total_len);
|
2013-06-25 13:20:49 +08:00
|
|
|
if (rc)
|
|
|
|
return rc;
|
|
|
|
|
2019-05-16 05:09:05 +08:00
|
|
|
if (indatalen) {
|
|
|
|
/*
|
|
|
|
* indatalen is usually small at a couple of bytes max, so
|
|
|
|
* just allocate through generic pool
|
|
|
|
*/
|
2019-06-01 11:31:10 +08:00
|
|
|
in_data_buf = kmemdup(in_data, indatalen, GFP_NOFS);
|
2019-05-16 05:09:05 +08:00
|
|
|
if (!in_data_buf) {
|
|
|
|
cifs_small_buf_release(req);
|
|
|
|
return -ENOMEM;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2013-06-25 13:20:49 +08:00
|
|
|
req->CtlCode = cpu_to_le32(opcode);
|
|
|
|
req->PersistentFileId = persistent_fid;
|
|
|
|
req->VolatileFileId = volatile_fid;
|
|
|
|
|
2019-03-13 12:37:48 +08:00
|
|
|
iov[0].iov_base = (char *)req;
|
|
|
|
/*
|
|
|
|
* If no input data, the size of ioctl struct in
|
|
|
|
* protocol spec still includes a 1 byte data buffer,
|
|
|
|
* but if input data passed to ioctl, we do not
|
|
|
|
* want to double count this, so we do not send
|
|
|
|
* the dummy one byte of data in iovec[0] if sending
|
|
|
|
* input data (in iovec[1]).
|
|
|
|
*/
|
2013-06-25 13:20:49 +08:00
|
|
|
if (indatalen) {
|
|
|
|
req->InputCount = cpu_to_le32(indatalen);
|
|
|
|
/* do not set InputOffset if no input data */
|
|
|
|
req->InputOffset =
|
2017-11-09 09:14:20 +08:00
|
|
|
cpu_to_le32(offsetof(struct smb2_ioctl_req, Buffer));
|
2019-03-13 12:37:48 +08:00
|
|
|
rqst->rq_nvec = 2;
|
|
|
|
iov[0].iov_len = total_len - 1;
|
2019-05-16 05:09:05 +08:00
|
|
|
iov[1].iov_base = in_data_buf;
|
2013-06-25 13:20:49 +08:00
|
|
|
iov[1].iov_len = indatalen;
|
2019-03-13 12:37:48 +08:00
|
|
|
} else {
|
|
|
|
rqst->rq_nvec = 1;
|
|
|
|
iov[0].iov_len = total_len;
|
|
|
|
}
|
2013-06-25 13:20:49 +08:00
|
|
|
|
|
|
|
req->OutputOffset = 0;
|
|
|
|
req->OutputCount = 0; /* MBZ */
|
|
|
|
|
|
|
|
/*
|
2019-03-29 11:32:49 +08:00
|
|
|
* In most cases max_response_size is set to 16K (CIFSMaxBufSize)
|
|
|
|
* We Could increase default MaxOutputResponse, but that could require
|
|
|
|
* more credits. Windows typically sets this smaller, but for some
|
2013-06-25 13:20:49 +08:00
|
|
|
* ioctls it may be useful to allow server to send more. No point
|
|
|
|
* limiting what the server can send as long as fits in one credit
|
2019-03-29 11:32:49 +08:00
|
|
|
* We can not handle more than CIFS_MAX_BUF_SIZE yet but may want
|
|
|
|
* to increase this limit up in the future.
|
|
|
|
* Note that for snapshot queries that servers like Azure expect that
|
|
|
|
* the first query be minimal size (and just used to get the number/size
|
|
|
|
* of previous versions) so response size must be specified as EXACTLY
|
|
|
|
* sizeof(struct snapshot_array) which is 16 when rounded up to multiple
|
|
|
|
* of eight bytes. Currently that is the only case where we set max
|
|
|
|
* response size smaller.
|
2013-06-25 13:20:49 +08:00
|
|
|
*/
|
2019-03-29 11:32:49 +08:00
|
|
|
req->MaxOutputResponse = cpu_to_le32(max_response_size);
|
2021-11-05 07:39:01 +08:00
|
|
|
req->hdr.CreditCharge =
|
2020-06-11 10:21:19 +08:00
|
|
|
cpu_to_le16(DIV_ROUND_UP(max(indatalen, max_response_size),
|
|
|
|
SMB2_MAX_BUFFER_SIZE));
|
2013-06-25 13:20:49 +08:00
|
|
|
if (is_fsctl)
|
|
|
|
req->Flags = cpu_to_le32(SMB2_0_IOCTL_IS_FSCTL);
|
|
|
|
else
|
|
|
|
req->Flags = 0;
|
|
|
|
|
2017-10-26 04:58:31 +08:00
|
|
|
/* validate negotiate request must be signed - see MS-SMB2 3.2.5.5 */
|
|
|
|
if (opcode == FSCTL_VALIDATE_NEGOTIATE_INFO)
|
2021-11-05 07:39:01 +08:00
|
|
|
req->hdr.Flags |= SMB2_FLAGS_SIGNED;
|
2013-06-25 13:20:49 +08:00
|
|
|
|
2019-03-13 12:37:48 +08:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
void
|
|
|
|
SMB2_ioctl_free(struct smb_rqst *rqst)
|
|
|
|
{
|
2019-05-23 12:12:43 +08:00
|
|
|
int i;
|
2019-05-16 05:09:05 +08:00
|
|
|
if (rqst && rqst->rq_iov) {
|
2019-03-13 12:37:48 +08:00
|
|
|
cifs_small_buf_release(rqst->rq_iov[0].iov_base); /* request */
|
2019-05-23 12:12:43 +08:00
|
|
|
for (i = 1; i < rqst->rq_nvec; i++)
|
|
|
|
if (rqst->rq_iov[i].iov_base != smb2_padding)
|
|
|
|
kfree(rqst->rq_iov[i].iov_base);
|
2019-05-16 05:09:05 +08:00
|
|
|
}
|
2019-03-13 12:37:48 +08:00
|
|
|
}
|
|
|
|
|
2019-03-29 11:32:49 +08:00
|
|
|
|
2019-03-13 12:37:48 +08:00
|
|
|
/*
|
|
|
|
* SMB2 IOCTL is used for both IOCTLs and FSCTLs
|
|
|
|
*/
|
|
|
|
int
|
|
|
|
SMB2_ioctl(const unsigned int xid, struct cifs_tcon *tcon, u64 persistent_fid,
|
|
|
|
u64 volatile_fid, u32 opcode, bool is_fsctl,
|
2019-03-29 11:32:49 +08:00
|
|
|
char *in_data, u32 indatalen, u32 max_out_data_len,
|
2019-03-13 12:37:48 +08:00
|
|
|
char **out_data, u32 *plen /* returned data len */)
|
|
|
|
{
|
|
|
|
struct smb_rqst rqst;
|
|
|
|
struct smb2_ioctl_rsp *rsp = NULL;
|
|
|
|
struct cifs_ses *ses;
|
2020-06-01 01:38:22 +08:00
|
|
|
struct TCP_Server_Info *server;
|
2019-03-13 12:37:49 +08:00
|
|
|
struct kvec iov[SMB2_IOCTL_IOV_SIZE];
|
2019-03-13 12:37:48 +08:00
|
|
|
struct kvec rsp_iov = {NULL, 0};
|
|
|
|
int resp_buftype = CIFS_NO_BUFFER;
|
|
|
|
int rc = 0;
|
|
|
|
int flags = 0;
|
|
|
|
|
|
|
|
cifs_dbg(FYI, "SMB2 IOCTL\n");
|
|
|
|
|
|
|
|
if (out_data != NULL)
|
|
|
|
*out_data = NULL;
|
|
|
|
|
|
|
|
/* zero out returned data len, in case of error */
|
|
|
|
if (plen)
|
|
|
|
*plen = 0;
|
|
|
|
|
2020-06-01 01:38:22 +08:00
|
|
|
if (!tcon)
|
2019-03-13 12:37:48 +08:00
|
|
|
return -EIO;
|
|
|
|
|
2020-06-01 01:38:22 +08:00
|
|
|
ses = tcon->ses;
|
2019-09-02 23:10:59 +08:00
|
|
|
if (!ses)
|
|
|
|
return -EIO;
|
2020-06-01 01:38:22 +08:00
|
|
|
|
|
|
|
server = cifs_pick_channel(ses);
|
2019-09-02 23:10:59 +08:00
|
|
|
if (!server)
|
2019-03-13 12:37:48 +08:00
|
|
|
return -EIO;
|
|
|
|
|
|
|
|
if (smb3_encryption_required(tcon))
|
|
|
|
flags |= CIFS_TRANSFORM_REQ;
|
|
|
|
|
2018-06-12 06:00:59 +08:00
|
|
|
memset(&rqst, 0, sizeof(struct smb_rqst));
|
2019-03-13 12:37:48 +08:00
|
|
|
memset(&iov, 0, sizeof(iov));
|
2018-06-12 06:00:59 +08:00
|
|
|
rqst.rq_iov = iov;
|
2019-03-13 12:37:49 +08:00
|
|
|
rqst.rq_nvec = SMB2_IOCTL_IOV_SIZE;
|
2019-03-13 12:37:48 +08:00
|
|
|
|
2020-06-01 01:38:22 +08:00
|
|
|
rc = SMB2_ioctl_init(tcon, server,
|
|
|
|
&rqst, persistent_fid, volatile_fid, opcode,
|
2019-03-29 11:32:49 +08:00
|
|
|
is_fsctl, in_data, indatalen, max_out_data_len);
|
2019-03-13 12:37:48 +08:00
|
|
|
if (rc)
|
|
|
|
goto ioctl_exit;
|
2018-06-12 06:00:59 +08:00
|
|
|
|
2020-06-01 01:38:22 +08:00
|
|
|
rc = cifs_send_recv(xid, ses, server,
|
|
|
|
&rqst, &resp_buftype, flags,
|
2017-11-09 09:14:20 +08:00
|
|
|
&rsp_iov);
|
2016-10-26 02:38:47 +08:00
|
|
|
rsp = (struct smb2_ioctl_rsp *)rsp_iov.iov_base;
|
2013-06-25 13:20:49 +08:00
|
|
|
|
2018-05-18 10:16:55 +08:00
|
|
|
if (rc != 0)
|
|
|
|
trace_smb3_fsctl_err(xid, persistent_fid, tcon->tid,
|
|
|
|
ses->Suid, 0, opcode, rc);
|
|
|
|
|
2019-04-25 14:45:29 +08:00
|
|
|
if ((rc != 0) && (rc != -EINVAL) && (rc != -E2BIG)) {
|
2015-03-27 08:47:02 +08:00
|
|
|
cifs_stats_fail_inc(tcon, SMB2_IOCTL_HE);
|
2013-06-25 13:20:49 +08:00
|
|
|
goto ioctl_exit;
|
2013-11-17 08:05:28 +08:00
|
|
|
} else if (rc == -EINVAL) {
|
|
|
|
if ((opcode != FSCTL_SRV_COPYCHUNK_WRITE) &&
|
|
|
|
(opcode != FSCTL_SRV_COPYCHUNK)) {
|
2015-03-27 08:47:02 +08:00
|
|
|
cifs_stats_fail_inc(tcon, SMB2_IOCTL_HE);
|
2013-11-17 08:05:28 +08:00
|
|
|
goto ioctl_exit;
|
|
|
|
}
|
2019-04-25 14:45:29 +08:00
|
|
|
} else if (rc == -E2BIG) {
|
|
|
|
if (opcode != FSCTL_QUERY_ALLOCATED_RANGES) {
|
|
|
|
cifs_stats_fail_inc(tcon, SMB2_IOCTL_HE);
|
|
|
|
goto ioctl_exit;
|
|
|
|
}
|
2013-06-25 13:20:49 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
/* check if caller wants to look at return data or just return rc */
|
|
|
|
if ((plen == NULL) || (out_data == NULL))
|
|
|
|
goto ioctl_exit;
|
|
|
|
|
2021-11-12 04:39:23 +08:00
|
|
|
/*
|
|
|
|
* Although unlikely to be possible for rsp to be null and rc not set,
|
|
|
|
* adding check below is slightly safer long term (and quiets Coverity
|
|
|
|
* warning)
|
|
|
|
*/
|
|
|
|
if (rsp == NULL) {
|
|
|
|
rc = -EIO;
|
|
|
|
goto ioctl_exit;
|
|
|
|
}
|
|
|
|
|
2013-06-25 13:20:49 +08:00
|
|
|
*plen = le32_to_cpu(rsp->OutputCount);
|
|
|
|
|
|
|
|
/* We check for obvious errors in the output buffer length and offset */
|
|
|
|
if (*plen == 0)
|
|
|
|
goto ioctl_exit; /* server returned no data */
|
2018-09-10 19:12:07 +08:00
|
|
|
else if (*plen > rsp_iov.iov_len || *plen > 0xFF00) {
|
2019-09-04 10:32:41 +08:00
|
|
|
cifs_tcon_dbg(VFS, "srv returned invalid ioctl length: %d\n", *plen);
|
2013-06-25 13:20:49 +08:00
|
|
|
*plen = 0;
|
|
|
|
rc = -EIO;
|
|
|
|
goto ioctl_exit;
|
|
|
|
}
|
|
|
|
|
2018-09-10 19:12:07 +08:00
|
|
|
if (rsp_iov.iov_len - *plen < le32_to_cpu(rsp->OutputOffset)) {
|
2019-09-04 10:32:41 +08:00
|
|
|
cifs_tcon_dbg(VFS, "Malformed ioctl resp: len %d offset %d\n", *plen,
|
2013-06-25 13:20:49 +08:00
|
|
|
le32_to_cpu(rsp->OutputOffset));
|
|
|
|
*plen = 0;
|
|
|
|
rc = -EIO;
|
|
|
|
goto ioctl_exit;
|
|
|
|
}
|
|
|
|
|
2018-09-10 09:33:06 +08:00
|
|
|
*out_data = kmemdup((char *)rsp + le32_to_cpu(rsp->OutputOffset),
|
|
|
|
*plen, GFP_KERNEL);
|
2013-06-25 13:20:49 +08:00
|
|
|
if (*out_data == NULL) {
|
|
|
|
rc = -ENOMEM;
|
|
|
|
goto ioctl_exit;
|
|
|
|
}
|
|
|
|
|
|
|
|
ioctl_exit:
|
2019-03-13 12:37:48 +08:00
|
|
|
SMB2_ioctl_free(&rqst);
|
2013-06-25 13:20:49 +08:00
|
|
|
free_rsp_buf(resp_buftype, rsp);
|
|
|
|
return rc;
|
|
|
|
}
|
|
|
|
|
2013-10-15 04:31:32 +08:00
|
|
|
/*
|
|
|
|
* Individual callers to ioctl worker function follow
|
|
|
|
*/
|
|
|
|
|
|
|
|
int
|
|
|
|
SMB2_set_compression(const unsigned int xid, struct cifs_tcon *tcon,
|
|
|
|
u64 persistent_fid, u64 volatile_fid)
|
|
|
|
{
|
|
|
|
int rc;
|
|
|
|
struct compress_ioctl fsctl_input;
|
|
|
|
char *ret_data = NULL;
|
|
|
|
|
|
|
|
fsctl_input.CompressionState =
|
2014-12-11 07:41:15 +08:00
|
|
|
cpu_to_le16(COMPRESSION_FORMAT_DEFAULT);
|
2013-10-15 04:31:32 +08:00
|
|
|
|
|
|
|
rc = SMB2_ioctl(xid, tcon, persistent_fid, volatile_fid,
|
|
|
|
FSCTL_SET_COMPRESSION, true /* is_fsctl */,
|
|
|
|
(char *)&fsctl_input /* data input */,
|
2019-03-29 11:32:49 +08:00
|
|
|
2 /* in data len */, CIFSMaxBufSize /* max out data */,
|
|
|
|
&ret_data /* out data */, NULL);
|
2013-10-15 04:31:32 +08:00
|
|
|
|
|
|
|
cifs_dbg(FYI, "set compression rc %d\n", rc);
|
|
|
|
|
|
|
|
return rc;
|
|
|
|
}
|
|
|
|
|
2018-08-01 07:26:16 +08:00
|
|
|
int
|
2020-06-01 01:38:22 +08:00
|
|
|
SMB2_close_init(struct cifs_tcon *tcon, struct TCP_Server_Info *server,
|
|
|
|
struct smb_rqst *rqst,
|
2019-12-03 11:46:54 +08:00
|
|
|
u64 persistent_fid, u64 volatile_fid, bool query_attrs)
|
2018-08-01 07:26:16 +08:00
|
|
|
{
|
|
|
|
struct smb2_close_req *req;
|
|
|
|
struct kvec *iov = rqst->rq_iov;
|
|
|
|
unsigned int total_len;
|
|
|
|
int rc;
|
|
|
|
|
2020-06-01 01:38:22 +08:00
|
|
|
rc = smb2_plain_req_init(SMB2_CLOSE, tcon, server,
|
|
|
|
(void **) &req, &total_len);
|
2018-08-01 07:26:16 +08:00
|
|
|
if (rc)
|
|
|
|
return rc;
|
|
|
|
|
2022-03-22 00:08:25 +08:00
|
|
|
req->PersistentFileId = persistent_fid;
|
|
|
|
req->VolatileFileId = volatile_fid;
|
2019-12-03 11:46:54 +08:00
|
|
|
if (query_attrs)
|
|
|
|
req->Flags = SMB2_CLOSE_FLAG_POSTQUERY_ATTRIB;
|
|
|
|
else
|
|
|
|
req->Flags = 0;
|
2018-08-01 07:26:16 +08:00
|
|
|
iov[0].iov_base = (char *)req;
|
|
|
|
iov[0].iov_len = total_len;
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
void
|
|
|
|
SMB2_close_free(struct smb_rqst *rqst)
|
|
|
|
{
|
2018-10-24 09:50:33 +08:00
|
|
|
if (rqst && rqst->rq_iov)
|
|
|
|
cifs_small_buf_release(rqst->rq_iov[0].iov_base); /* request */
|
2018-08-01 07:26:16 +08:00
|
|
|
}
|
|
|
|
|
2011-12-27 02:58:46 +08:00
|
|
|
int
|
2019-12-03 11:46:54 +08:00
|
|
|
__SMB2_close(const unsigned int xid, struct cifs_tcon *tcon,
|
|
|
|
u64 persistent_fid, u64 volatile_fid,
|
|
|
|
struct smb2_file_network_open_info *pbuf)
|
2011-12-27 02:58:46 +08:00
|
|
|
{
|
2018-06-12 06:00:59 +08:00
|
|
|
struct smb_rqst rqst;
|
2018-08-01 07:26:16 +08:00
|
|
|
struct smb2_close_rsp *rsp = NULL;
|
2011-12-27 02:58:46 +08:00
|
|
|
struct cifs_ses *ses = tcon->ses;
|
2020-06-01 01:38:22 +08:00
|
|
|
struct TCP_Server_Info *server = cifs_pick_channel(ses);
|
2011-12-27 02:58:46 +08:00
|
|
|
struct kvec iov[1];
|
2016-10-26 02:38:47 +08:00
|
|
|
struct kvec rsp_iov;
|
2018-10-04 03:51:21 +08:00
|
|
|
int resp_buftype = CIFS_NO_BUFFER;
|
2011-12-27 02:58:46 +08:00
|
|
|
int rc = 0;
|
2019-12-03 07:55:41 +08:00
|
|
|
int flags = 0;
|
2019-12-03 11:46:54 +08:00
|
|
|
bool query_attrs = false;
|
2011-12-27 02:58:46 +08:00
|
|
|
|
2013-05-05 11:12:25 +08:00
|
|
|
cifs_dbg(FYI, "Close\n");
|
2011-12-27 02:58:46 +08:00
|
|
|
|
2020-06-01 01:38:22 +08:00
|
|
|
if (!ses || !server)
|
2011-12-27 02:58:46 +08:00
|
|
|
return -EIO;
|
|
|
|
|
2018-05-10 06:43:08 +08:00
|
|
|
if (smb3_encryption_required(tcon))
|
2016-11-01 04:49:30 +08:00
|
|
|
flags |= CIFS_TRANSFORM_REQ;
|
|
|
|
|
2018-06-12 06:00:59 +08:00
|
|
|
memset(&rqst, 0, sizeof(struct smb_rqst));
|
2018-08-01 07:26:16 +08:00
|
|
|
memset(&iov, 0, sizeof(iov));
|
2018-06-12 06:00:59 +08:00
|
|
|
rqst.rq_iov = iov;
|
|
|
|
rqst.rq_nvec = 1;
|
|
|
|
|
2019-12-03 11:46:54 +08:00
|
|
|
/* check if need to ask server to return timestamps in close response */
|
|
|
|
if (pbuf)
|
|
|
|
query_attrs = true;
|
|
|
|
|
2019-09-04 07:35:42 +08:00
|
|
|
trace_smb3_close_enter(xid, persistent_fid, tcon->tid, ses->Suid);
|
2020-06-01 01:38:22 +08:00
|
|
|
rc = SMB2_close_init(tcon, server,
|
|
|
|
&rqst, persistent_fid, volatile_fid,
|
2019-12-03 11:46:54 +08:00
|
|
|
query_attrs);
|
2018-08-01 07:26:16 +08:00
|
|
|
if (rc)
|
|
|
|
goto close_exit;
|
|
|
|
|
2020-06-01 01:38:22 +08:00
|
|
|
rc = cifs_send_recv(xid, ses, server,
|
|
|
|
&rqst, &resp_buftype, flags, &rsp_iov);
|
2016-10-26 02:38:47 +08:00
|
|
|
rsp = (struct smb2_close_rsp *)rsp_iov.iov_base;
|
2011-12-27 02:58:46 +08:00
|
|
|
|
|
|
|
if (rc != 0) {
|
2014-08-20 18:39:59 +08:00
|
|
|
cifs_stats_fail_inc(tcon, SMB2_CLOSE_HE);
|
2018-05-18 10:16:55 +08:00
|
|
|
trace_smb3_close_err(xid, persistent_fid, tcon->tid, ses->Suid,
|
|
|
|
rc);
|
2011-12-27 02:58:46 +08:00
|
|
|
goto close_exit;
|
2019-12-03 11:46:54 +08:00
|
|
|
} else {
|
2019-09-04 07:35:42 +08:00
|
|
|
trace_smb3_close_done(xid, persistent_fid, tcon->tid,
|
|
|
|
ses->Suid);
|
2019-12-03 11:46:54 +08:00
|
|
|
/*
|
|
|
|
* Note that have to subtract 4 since struct network_open_info
|
|
|
|
* has a final 4 byte pad that close response does not have
|
|
|
|
*/
|
|
|
|
if (pbuf)
|
|
|
|
memcpy(pbuf, (char *)&rsp->CreationTime, sizeof(*pbuf) - 4);
|
|
|
|
}
|
2011-12-27 02:58:46 +08:00
|
|
|
|
2018-10-20 06:14:32 +08:00
|
|
|
atomic_dec(&tcon->num_remote_opens);
|
2011-12-27 02:58:46 +08:00
|
|
|
close_exit:
|
2018-08-01 07:26:16 +08:00
|
|
|
SMB2_close_free(&rqst);
|
2011-12-27 02:58:46 +08:00
|
|
|
free_rsp_buf(resp_buftype, rsp);
|
2019-11-22 03:35:12 +08:00
|
|
|
|
|
|
|
/* retry close in a worker thread if this one is interrupted */
|
2021-01-14 01:16:16 +08:00
|
|
|
if (is_interrupt_error(rc)) {
|
2019-12-03 07:55:41 +08:00
|
|
|
int tmp_rc;
|
|
|
|
|
2019-11-22 03:35:12 +08:00
|
|
|
tmp_rc = smb2_handle_cancelled_close(tcon, persistent_fid,
|
|
|
|
volatile_fid);
|
|
|
|
if (tmp_rc)
|
|
|
|
cifs_dbg(VFS, "handle cancelled close fid 0x%llx returned error %d\n",
|
|
|
|
persistent_fid, tmp_rc);
|
|
|
|
}
|
|
|
|
return rc;
|
2018-04-26 22:50:49 +08:00
|
|
|
}
|
|
|
|
|
2019-12-03 11:46:54 +08:00
|
|
|
int
|
|
|
|
SMB2_close(const unsigned int xid, struct cifs_tcon *tcon,
|
|
|
|
u64 persistent_fid, u64 volatile_fid)
|
|
|
|
{
|
|
|
|
return __SMB2_close(xid, tcon, persistent_fid, volatile_fid, NULL);
|
|
|
|
}
|
|
|
|
|
2018-08-08 13:07:49 +08:00
|
|
|
int
|
|
|
|
smb2_validate_iov(unsigned int offset, unsigned int buffer_length,
|
|
|
|
struct kvec *iov, unsigned int min_buf_size)
|
2011-12-29 21:06:33 +08:00
|
|
|
{
|
2018-04-09 16:06:30 +08:00
|
|
|
unsigned int smb_len = iov->iov_len;
|
2018-06-01 08:53:07 +08:00
|
|
|
char *end_of_smb = smb_len + (char *)iov->iov_base;
|
|
|
|
char *begin_of_buf = offset + (char *)iov->iov_base;
|
2011-12-29 21:06:33 +08:00
|
|
|
char *end_of_buf = begin_of_buf + buffer_length;
|
|
|
|
|
|
|
|
|
|
|
|
if (buffer_length < min_buf_size) {
|
2013-05-05 11:12:25 +08:00
|
|
|
cifs_dbg(VFS, "buffer length %d smaller than minimum size %d\n",
|
|
|
|
buffer_length, min_buf_size);
|
2011-12-29 21:06:33 +08:00
|
|
|
return -EINVAL;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* check if beyond RFC1001 maximum length */
|
|
|
|
if ((smb_len > 0x7FFFFF) || (buffer_length > 0x7FFFFF)) {
|
2013-05-05 11:12:25 +08:00
|
|
|
cifs_dbg(VFS, "buffer length %d or smb length %d too large\n",
|
|
|
|
buffer_length, smb_len);
|
2011-12-29 21:06:33 +08:00
|
|
|
return -EINVAL;
|
|
|
|
}
|
|
|
|
|
|
|
|
if ((begin_of_buf > end_of_smb) || (end_of_buf > end_of_smb)) {
|
2020-04-15 13:42:53 +08:00
|
|
|
cifs_dbg(VFS, "Invalid server response, bad offset to data\n");
|
2011-12-29 21:06:33 +08:00
|
|
|
return -EINVAL;
|
|
|
|
}
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* If SMB buffer fields are valid, copy into temporary buffer to hold result.
|
|
|
|
* Caller must free buffer.
|
|
|
|
*/
|
2018-09-03 11:33:41 +08:00
|
|
|
int
|
|
|
|
smb2_validate_and_copy_iov(unsigned int offset, unsigned int buffer_length,
|
|
|
|
struct kvec *iov, unsigned int minbufsize,
|
|
|
|
char *data)
|
2011-12-29 21:06:33 +08:00
|
|
|
{
|
2018-06-01 08:53:07 +08:00
|
|
|
char *begin_of_buf = offset + (char *)iov->iov_base;
|
2011-12-29 21:06:33 +08:00
|
|
|
int rc;
|
|
|
|
|
|
|
|
if (!data)
|
|
|
|
return -EINVAL;
|
|
|
|
|
2018-08-08 13:07:49 +08:00
|
|
|
rc = smb2_validate_iov(offset, buffer_length, iov, minbufsize);
|
2011-12-29 21:06:33 +08:00
|
|
|
if (rc)
|
|
|
|
return rc;
|
|
|
|
|
|
|
|
memcpy(data, begin_of_buf, buffer_length);
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2018-08-01 07:26:17 +08:00
|
|
|
int
|
2020-06-01 01:38:22 +08:00
|
|
|
SMB2_query_info_init(struct cifs_tcon *tcon, struct TCP_Server_Info *server,
|
|
|
|
struct smb_rqst *rqst,
|
2018-08-01 07:26:17 +08:00
|
|
|
u64 persistent_fid, u64 volatile_fid,
|
|
|
|
u8 info_class, u8 info_type, u32 additional_info,
|
2018-10-08 08:19:58 +08:00
|
|
|
size_t output_len, size_t input_len, void *input)
|
2011-12-29 21:06:33 +08:00
|
|
|
{
|
|
|
|
struct smb2_query_info_req *req;
|
2018-08-01 07:26:17 +08:00
|
|
|
struct kvec *iov = rqst->rq_iov;
|
2017-11-20 08:24:46 +08:00
|
|
|
unsigned int total_len;
|
2018-08-01 07:26:17 +08:00
|
|
|
int rc;
|
2011-12-29 21:06:33 +08:00
|
|
|
|
2020-06-01 01:38:22 +08:00
|
|
|
rc = smb2_plain_req_init(SMB2_QUERY_INFO, tcon, server,
|
|
|
|
(void **) &req, &total_len);
|
2011-12-29 21:06:33 +08:00
|
|
|
if (rc)
|
|
|
|
return rc;
|
|
|
|
|
2017-06-23 11:51:31 +08:00
|
|
|
req->InfoType = info_type;
|
2012-09-19 07:20:26 +08:00
|
|
|
req->FileInfoClass = info_class;
|
2011-12-29 21:06:33 +08:00
|
|
|
req->PersistentFileId = persistent_fid;
|
|
|
|
req->VolatileFileId = volatile_fid;
|
2017-06-23 11:51:31 +08:00
|
|
|
req->AdditionalInformation = cpu_to_le32(additional_info);
|
2017-10-17 20:47:17 +08:00
|
|
|
|
2012-09-19 07:20:26 +08:00
|
|
|
req->OutputBufferLength = cpu_to_le32(output_len);
|
2018-10-08 08:19:58 +08:00
|
|
|
if (input_len) {
|
|
|
|
req->InputBufferLength = cpu_to_le32(input_len);
|
|
|
|
/* total_len for smb query request never close to le16 max */
|
|
|
|
req->InputBufferOffset = cpu_to_le16(total_len - 1);
|
|
|
|
memcpy(req->Buffer, input, input_len);
|
|
|
|
}
|
2011-12-29 21:06:33 +08:00
|
|
|
|
|
|
|
iov[0].iov_base = (char *)req;
|
2017-11-20 08:24:46 +08:00
|
|
|
/* 1 for Buffer */
|
2018-10-08 08:19:58 +08:00
|
|
|
iov[0].iov_len = total_len - 1 + input_len;
|
2018-08-01 07:26:17 +08:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
void
|
|
|
|
SMB2_query_info_free(struct smb_rqst *rqst)
|
|
|
|
{
|
2018-10-24 09:50:33 +08:00
|
|
|
if (rqst && rqst->rq_iov)
|
|
|
|
cifs_small_buf_release(rqst->rq_iov[0].iov_base); /* request */
|
2018-08-01 07:26:17 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
static int
|
|
|
|
query_info(const unsigned int xid, struct cifs_tcon *tcon,
|
|
|
|
u64 persistent_fid, u64 volatile_fid, u8 info_class, u8 info_type,
|
|
|
|
u32 additional_info, size_t output_len, size_t min_len, void **data,
|
|
|
|
u32 *dlen)
|
|
|
|
{
|
|
|
|
struct smb_rqst rqst;
|
|
|
|
struct smb2_query_info_rsp *rsp = NULL;
|
|
|
|
struct kvec iov[1];
|
|
|
|
struct kvec rsp_iov;
|
|
|
|
int rc = 0;
|
2018-10-04 03:51:21 +08:00
|
|
|
int resp_buftype = CIFS_NO_BUFFER;
|
2018-08-01 07:26:17 +08:00
|
|
|
struct cifs_ses *ses = tcon->ses;
|
2019-09-02 23:10:59 +08:00
|
|
|
struct TCP_Server_Info *server;
|
2018-08-01 07:26:17 +08:00
|
|
|
int flags = 0;
|
2019-01-17 00:28:59 +08:00
|
|
|
bool allocated = false;
|
2018-08-01 07:26:17 +08:00
|
|
|
|
|
|
|
cifs_dbg(FYI, "Query Info\n");
|
|
|
|
|
2019-09-02 23:10:59 +08:00
|
|
|
if (!ses)
|
|
|
|
return -EIO;
|
2020-06-01 01:38:22 +08:00
|
|
|
server = cifs_pick_channel(ses);
|
2019-09-02 23:10:59 +08:00
|
|
|
if (!server)
|
2018-08-01 07:26:17 +08:00
|
|
|
return -EIO;
|
|
|
|
|
|
|
|
if (smb3_encryption_required(tcon))
|
|
|
|
flags |= CIFS_TRANSFORM_REQ;
|
2011-12-29 21:06:33 +08:00
|
|
|
|
2018-06-12 06:00:59 +08:00
|
|
|
memset(&rqst, 0, sizeof(struct smb_rqst));
|
2018-08-01 07:26:17 +08:00
|
|
|
memset(&iov, 0, sizeof(iov));
|
2018-06-12 06:00:59 +08:00
|
|
|
rqst.rq_iov = iov;
|
|
|
|
rqst.rq_nvec = 1;
|
|
|
|
|
2020-06-01 01:38:22 +08:00
|
|
|
rc = SMB2_query_info_init(tcon, server,
|
|
|
|
&rqst, persistent_fid, volatile_fid,
|
2018-08-01 07:26:17 +08:00
|
|
|
info_class, info_type, additional_info,
|
2018-10-08 08:19:58 +08:00
|
|
|
output_len, 0, NULL);
|
2018-08-01 07:26:17 +08:00
|
|
|
if (rc)
|
|
|
|
goto qinf_exit;
|
|
|
|
|
2019-02-27 11:58:30 +08:00
|
|
|
trace_smb3_query_info_enter(xid, persistent_fid, tcon->tid,
|
|
|
|
ses->Suid, info_class, (__u32)info_type);
|
|
|
|
|
2020-06-01 01:38:22 +08:00
|
|
|
rc = cifs_send_recv(xid, ses, server,
|
|
|
|
&rqst, &resp_buftype, flags, &rsp_iov);
|
2016-10-26 02:38:47 +08:00
|
|
|
rsp = (struct smb2_query_info_rsp *)rsp_iov.iov_base;
|
2012-09-19 20:03:26 +08:00
|
|
|
|
2011-12-29 21:06:33 +08:00
|
|
|
if (rc) {
|
|
|
|
cifs_stats_fail_inc(tcon, SMB2_QUERY_INFO_HE);
|
2018-05-18 10:16:55 +08:00
|
|
|
trace_smb3_query_info_err(xid, persistent_fid, tcon->tid,
|
|
|
|
ses->Suid, info_class, (__u32)info_type, rc);
|
2011-12-29 21:06:33 +08:00
|
|
|
goto qinf_exit;
|
|
|
|
}
|
|
|
|
|
2019-02-27 11:58:30 +08:00
|
|
|
trace_smb3_query_info_done(xid, persistent_fid, tcon->tid,
|
|
|
|
ses->Suid, info_class, (__u32)info_type);
|
|
|
|
|
2017-06-23 11:51:31 +08:00
|
|
|
if (dlen) {
|
|
|
|
*dlen = le32_to_cpu(rsp->OutputBufferLength);
|
|
|
|
if (!*data) {
|
|
|
|
*data = kmalloc(*dlen, GFP_KERNEL);
|
|
|
|
if (!*data) {
|
2019-09-04 10:32:41 +08:00
|
|
|
cifs_tcon_dbg(VFS,
|
2017-06-23 11:51:31 +08:00
|
|
|
"Error %d allocating memory for acl\n",
|
|
|
|
rc);
|
|
|
|
*dlen = 0;
|
2019-01-17 00:28:59 +08:00
|
|
|
rc = -ENOMEM;
|
2017-06-23 11:51:31 +08:00
|
|
|
goto qinf_exit;
|
|
|
|
}
|
2019-01-17 00:28:59 +08:00
|
|
|
allocated = true;
|
2017-06-23 11:51:31 +08:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2018-09-03 11:33:41 +08:00
|
|
|
rc = smb2_validate_and_copy_iov(le16_to_cpu(rsp->OutputBufferOffset),
|
|
|
|
le32_to_cpu(rsp->OutputBufferLength),
|
|
|
|
&rsp_iov, min_len, *data);
|
2019-01-17 00:28:59 +08:00
|
|
|
if (rc && allocated) {
|
|
|
|
kfree(*data);
|
|
|
|
*data = NULL;
|
|
|
|
*dlen = 0;
|
|
|
|
}
|
2011-12-29 21:06:33 +08:00
|
|
|
|
|
|
|
qinf_exit:
|
2018-08-01 07:26:17 +08:00
|
|
|
SMB2_query_info_free(&rqst);
|
2011-12-29 21:06:33 +08:00
|
|
|
free_rsp_buf(resp_buftype, rsp);
|
|
|
|
return rc;
|
|
|
|
}
|
2012-07-12 22:30:44 +08:00
|
|
|
|
2017-06-23 11:51:31 +08:00
|
|
|
int SMB2_query_info(const unsigned int xid, struct cifs_tcon *tcon,
|
|
|
|
u64 persistent_fid, u64 volatile_fid, struct smb2_file_all_info *data)
|
|
|
|
{
|
|
|
|
return query_info(xid, tcon, persistent_fid, volatile_fid,
|
|
|
|
FILE_ALL_INFORMATION, SMB2_O_INFO_FILE, 0,
|
|
|
|
sizeof(struct smb2_file_all_info) + PATH_MAX * 2,
|
|
|
|
sizeof(struct smb2_file_all_info), (void **)&data,
|
|
|
|
NULL);
|
|
|
|
}
|
|
|
|
|
2021-06-20 05:19:09 +08:00
|
|
|
#if 0
|
|
|
|
/* currently unused, as now we are doing compounding instead (see smb311_posix_query_path_info) */
|
2020-06-12 09:23:38 +08:00
|
|
|
int
|
|
|
|
SMB311_posix_query_info(const unsigned int xid, struct cifs_tcon *tcon,
|
|
|
|
u64 persistent_fid, u64 volatile_fid, struct smb311_posix_qinfo *data, u32 *plen)
|
|
|
|
{
|
|
|
|
size_t output_len = sizeof(struct smb311_posix_qinfo *) +
|
|
|
|
(sizeof(struct cifs_sid) * 2) + (PATH_MAX * 2);
|
|
|
|
*plen = 0;
|
|
|
|
|
|
|
|
return query_info(xid, tcon, persistent_fid, volatile_fid,
|
|
|
|
SMB_FIND_FILE_POSIX_INFO, SMB2_O_INFO_FILE, 0,
|
|
|
|
output_len, sizeof(struct smb311_posix_qinfo), (void **)&data, plen);
|
2021-06-20 05:19:09 +08:00
|
|
|
/* Note caller must free "data" (passed in above). It may be allocated in query_info call */
|
2020-06-12 09:23:38 +08:00
|
|
|
}
|
2021-06-20 05:19:09 +08:00
|
|
|
#endif
|
2020-06-12 09:23:38 +08:00
|
|
|
|
2012-09-19 07:20:26 +08:00
|
|
|
int
|
2017-06-23 11:51:31 +08:00
|
|
|
SMB2_query_acl(const unsigned int xid, struct cifs_tcon *tcon,
|
2020-12-19 01:30:12 +08:00
|
|
|
u64 persistent_fid, u64 volatile_fid,
|
2020-12-18 04:58:08 +08:00
|
|
|
void **data, u32 *plen, u32 extra_info)
|
2012-09-19 07:20:26 +08:00
|
|
|
{
|
2020-12-18 04:58:08 +08:00
|
|
|
__u32 additional_info = OWNER_SECINFO | GROUP_SECINFO | DACL_SECINFO |
|
|
|
|
extra_info;
|
2017-06-23 11:51:31 +08:00
|
|
|
*plen = 0;
|
|
|
|
|
2012-09-19 07:20:26 +08:00
|
|
|
return query_info(xid, tcon, persistent_fid, volatile_fid,
|
2017-06-23 11:51:31 +08:00
|
|
|
0, SMB2_O_INFO_SECURITY, additional_info,
|
2018-06-04 19:46:22 +08:00
|
|
|
SMB2_MAX_BUFFER_SIZE, MIN_SEC_DESC_LEN, data, plen);
|
2012-09-19 07:20:26 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
int
|
|
|
|
SMB2_get_srv_num(const unsigned int xid, struct cifs_tcon *tcon,
|
|
|
|
u64 persistent_fid, u64 volatile_fid, __le64 *uniqueid)
|
|
|
|
{
|
|
|
|
return query_info(xid, tcon, persistent_fid, volatile_fid,
|
2017-06-23 11:51:31 +08:00
|
|
|
FILE_INTERNAL_INFORMATION, SMB2_O_INFO_FILE, 0,
|
|
|
|
sizeof(struct smb2_file_internal_info),
|
2012-09-19 07:20:26 +08:00
|
|
|
sizeof(struct smb2_file_internal_info),
|
2017-06-23 11:51:31 +08:00
|
|
|
(void **)&uniqueid, NULL);
|
2012-09-19 07:20:26 +08:00
|
|
|
}
|
|
|
|
|
2019-09-16 11:38:52 +08:00
|
|
|
/*
|
|
|
|
* CHANGE_NOTIFY Request is sent to get notifications on changes to a directory
|
|
|
|
* See MS-SMB2 2.2.35 and 2.2.36
|
|
|
|
*/
|
|
|
|
|
2019-09-23 15:06:18 +08:00
|
|
|
static int
|
2019-09-16 11:38:52 +08:00
|
|
|
SMB2_notify_init(const unsigned int xid, struct smb_rqst *rqst,
|
2020-06-01 01:38:22 +08:00
|
|
|
struct cifs_tcon *tcon, struct TCP_Server_Info *server,
|
|
|
|
u64 persistent_fid, u64 volatile_fid,
|
|
|
|
u32 completion_filter, bool watch_tree)
|
2019-09-16 11:38:52 +08:00
|
|
|
{
|
|
|
|
struct smb2_change_notify_req *req;
|
|
|
|
struct kvec *iov = rqst->rq_iov;
|
|
|
|
unsigned int total_len;
|
|
|
|
int rc;
|
|
|
|
|
2020-06-01 01:38:22 +08:00
|
|
|
rc = smb2_plain_req_init(SMB2_CHANGE_NOTIFY, tcon, server,
|
|
|
|
(void **) &req, &total_len);
|
2019-09-16 11:38:52 +08:00
|
|
|
if (rc)
|
|
|
|
return rc;
|
|
|
|
|
2022-03-22 00:08:25 +08:00
|
|
|
req->PersistentFileId = persistent_fid;
|
|
|
|
req->VolatileFileId = volatile_fid;
|
2020-02-06 20:00:14 +08:00
|
|
|
/* See note 354 of MS-SMB2, 64K max */
|
2019-10-02 10:25:46 +08:00
|
|
|
req->OutputBufferLength =
|
|
|
|
cpu_to_le32(SMB2_MAX_BUFFER_SIZE - MAX_SMB2_HDR_SIZE);
|
2019-09-16 11:38:52 +08:00
|
|
|
req->CompletionFilter = cpu_to_le32(completion_filter);
|
|
|
|
if (watch_tree)
|
|
|
|
req->Flags = cpu_to_le16(SMB2_WATCH_TREE);
|
|
|
|
else
|
|
|
|
req->Flags = 0;
|
|
|
|
|
|
|
|
iov[0].iov_base = (char *)req;
|
|
|
|
iov[0].iov_len = total_len;
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
int
|
|
|
|
SMB2_change_notify(const unsigned int xid, struct cifs_tcon *tcon,
|
|
|
|
u64 persistent_fid, u64 volatile_fid, bool watch_tree,
|
|
|
|
u32 completion_filter)
|
|
|
|
{
|
|
|
|
struct cifs_ses *ses = tcon->ses;
|
2020-06-01 01:38:22 +08:00
|
|
|
struct TCP_Server_Info *server = cifs_pick_channel(ses);
|
2019-09-16 11:38:52 +08:00
|
|
|
struct smb_rqst rqst;
|
|
|
|
struct kvec iov[1];
|
|
|
|
struct kvec rsp_iov = {NULL, 0};
|
|
|
|
int resp_buftype = CIFS_NO_BUFFER;
|
|
|
|
int flags = 0;
|
|
|
|
int rc = 0;
|
|
|
|
|
|
|
|
cifs_dbg(FYI, "change notify\n");
|
2020-06-01 01:38:22 +08:00
|
|
|
if (!ses || !server)
|
2019-09-16 11:38:52 +08:00
|
|
|
return -EIO;
|
|
|
|
|
|
|
|
if (smb3_encryption_required(tcon))
|
|
|
|
flags |= CIFS_TRANSFORM_REQ;
|
|
|
|
|
|
|
|
memset(&rqst, 0, sizeof(struct smb_rqst));
|
|
|
|
memset(&iov, 0, sizeof(iov));
|
|
|
|
rqst.rq_iov = iov;
|
|
|
|
rqst.rq_nvec = 1;
|
|
|
|
|
2020-06-01 01:38:22 +08:00
|
|
|
rc = SMB2_notify_init(xid, &rqst, tcon, server,
|
|
|
|
persistent_fid, volatile_fid,
|
2019-09-16 11:38:52 +08:00
|
|
|
completion_filter, watch_tree);
|
|
|
|
if (rc)
|
|
|
|
goto cnotify_exit;
|
|
|
|
|
|
|
|
trace_smb3_notify_enter(xid, persistent_fid, tcon->tid, ses->Suid,
|
|
|
|
(u8)watch_tree, completion_filter);
|
2020-06-01 01:38:22 +08:00
|
|
|
rc = cifs_send_recv(xid, ses, server,
|
|
|
|
&rqst, &resp_buftype, flags, &rsp_iov);
|
2019-09-16 11:38:52 +08:00
|
|
|
|
|
|
|
if (rc != 0) {
|
|
|
|
cifs_stats_fail_inc(tcon, SMB2_CHANGE_NOTIFY_HE);
|
|
|
|
trace_smb3_notify_err(xid, persistent_fid, tcon->tid, ses->Suid,
|
|
|
|
(u8)watch_tree, completion_filter, rc);
|
|
|
|
} else
|
|
|
|
trace_smb3_notify_done(xid, persistent_fid, tcon->tid,
|
|
|
|
ses->Suid, (u8)watch_tree, completion_filter);
|
|
|
|
|
|
|
|
cnotify_exit:
|
|
|
|
if (rqst.rq_iov)
|
|
|
|
cifs_small_buf_release(rqst.rq_iov[0].iov_base); /* request */
|
|
|
|
free_rsp_buf(resp_buftype, rsp_iov.iov_base);
|
|
|
|
return rc;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
|
2012-07-12 22:30:44 +08:00
|
|
|
/*
|
|
|
|
* This is a no-op for now. We're not really interested in the reply, but
|
|
|
|
* rather in the fact that the server sent one and that server->lstrp
|
|
|
|
* gets updated.
|
|
|
|
*
|
|
|
|
* FIXME: maybe we should consider checking that the reply matches request?
|
|
|
|
*/
|
|
|
|
static void
|
|
|
|
smb2_echo_callback(struct mid_q_entry *mid)
|
|
|
|
{
|
|
|
|
struct TCP_Server_Info *server = mid->callback_data;
|
2016-10-25 06:33:04 +08:00
|
|
|
struct smb2_echo_rsp *rsp = (struct smb2_echo_rsp *)mid->resp_buf;
|
2019-01-17 03:22:29 +08:00
|
|
|
struct cifs_credits credits = { .value = 0, .instance = 0 };
|
2012-07-12 22:30:44 +08:00
|
|
|
|
2019-01-16 07:08:48 +08:00
|
|
|
if (mid->mid_state == MID_RESPONSE_RECEIVED
|
2019-01-17 03:22:29 +08:00
|
|
|
|| mid->mid_state == MID_RESPONSE_MALFORMED) {
|
2021-11-05 07:39:01 +08:00
|
|
|
credits.value = le16_to_cpu(rsp->hdr.CreditRequest);
|
2019-01-17 03:22:29 +08:00
|
|
|
credits.instance = server->reconnect_instance;
|
|
|
|
}
|
2012-07-12 22:30:44 +08:00
|
|
|
|
|
|
|
DeleteMidQEntry(mid);
|
2019-01-17 03:22:29 +08:00
|
|
|
add_credits(server, &credits, CIFS_ECHO_OP);
|
2012-07-12 22:30:44 +08:00
|
|
|
}
|
|
|
|
|
2016-11-05 02:50:31 +08:00
|
|
|
void smb2_reconnect_server(struct work_struct *work)
|
|
|
|
{
|
|
|
|
struct TCP_Server_Info *server = container_of(work,
|
|
|
|
struct TCP_Server_Info, reconnect.work);
|
2021-10-30 12:51:35 +08:00
|
|
|
struct TCP_Server_Info *pserver;
|
|
|
|
struct cifs_ses *ses, *ses2;
|
2016-11-05 02:50:31 +08:00
|
|
|
struct cifs_tcon *tcon, *tcon2;
|
2021-10-30 12:51:35 +08:00
|
|
|
struct list_head tmp_list, tmp_ses_list;
|
|
|
|
bool tcon_exist = false, ses_exist = false;
|
2022-01-05 05:24:37 +08:00
|
|
|
bool tcon_selected = false;
|
2017-04-07 19:29:36 +08:00
|
|
|
int rc;
|
2021-10-30 12:51:35 +08:00
|
|
|
bool resched = false;
|
2017-04-07 19:29:36 +08:00
|
|
|
|
2021-10-30 12:51:35 +08:00
|
|
|
/* If server is a channel, select the primary channel */
|
|
|
|
pserver = CIFS_SERVER_IS_CHAN(server) ? server->primary_server : server;
|
2016-11-05 02:50:31 +08:00
|
|
|
|
|
|
|
/* Prevent simultaneous reconnects that can corrupt tcon->rlist list */
|
2021-10-30 12:51:35 +08:00
|
|
|
mutex_lock(&pserver->reconnect_mutex);
|
2016-11-05 02:50:31 +08:00
|
|
|
|
|
|
|
INIT_LIST_HEAD(&tmp_list);
|
2021-10-30 12:51:35 +08:00
|
|
|
INIT_LIST_HEAD(&tmp_ses_list);
|
|
|
|
cifs_dbg(FYI, "Reconnecting tcons and channels\n");
|
2016-11-05 02:50:31 +08:00
|
|
|
|
|
|
|
spin_lock(&cifs_tcp_ses_lock);
|
2021-10-30 12:51:35 +08:00
|
|
|
list_for_each_entry(ses, &pserver->smb_ses_list, smb_ses_list) {
|
|
|
|
|
2022-01-05 05:24:37 +08:00
|
|
|
tcon_selected = false;
|
2021-10-30 12:51:35 +08:00
|
|
|
|
2016-11-05 02:50:31 +08:00
|
|
|
list_for_each_entry(tcon, &ses->tcon_list, tcon_list) {
|
2016-11-30 03:31:23 +08:00
|
|
|
if (tcon->need_reconnect || tcon->need_reopen_files) {
|
2016-11-05 02:50:31 +08:00
|
|
|
tcon->tc_count++;
|
|
|
|
list_add_tail(&tcon->rlist, &tmp_list);
|
2021-10-30 12:51:35 +08:00
|
|
|
tcon_selected = tcon_exist = true;
|
2016-11-05 02:50:31 +08:00
|
|
|
}
|
|
|
|
}
|
2019-06-05 08:15:34 +08:00
|
|
|
/*
|
|
|
|
* IPC has the same lifetime as its session and uses its
|
|
|
|
* refcount.
|
|
|
|
*/
|
2018-01-24 20:46:10 +08:00
|
|
|
if (ses->tcon_ipc && ses->tcon_ipc->need_reconnect) {
|
|
|
|
list_add_tail(&ses->tcon_ipc->rlist, &tmp_list);
|
2021-10-30 12:51:35 +08:00
|
|
|
tcon_selected = tcon_exist = true;
|
|
|
|
ses->ses_count++;
|
|
|
|
}
|
|
|
|
/*
|
|
|
|
* handle the case where channel needs to reconnect
|
|
|
|
* binding session, but tcon is healthy (some other channel
|
|
|
|
* is active)
|
|
|
|
*/
|
2021-11-19 22:16:57 +08:00
|
|
|
spin_lock(&ses->chan_lock);
|
2021-10-30 12:51:35 +08:00
|
|
|
if (!tcon_selected && cifs_chan_needs_reconnect(ses, server)) {
|
|
|
|
list_add_tail(&ses->rlist, &tmp_ses_list);
|
2022-01-05 05:24:37 +08:00
|
|
|
ses_exist = true;
|
2019-06-05 08:15:34 +08:00
|
|
|
ses->ses_count++;
|
2018-01-24 20:46:10 +08:00
|
|
|
}
|
2021-11-19 22:16:57 +08:00
|
|
|
spin_unlock(&ses->chan_lock);
|
2016-11-05 02:50:31 +08:00
|
|
|
}
|
|
|
|
/*
|
|
|
|
* Get the reference to server struct to be sure that the last call of
|
|
|
|
* cifs_put_tcon() in the loop below won't release the server pointer.
|
|
|
|
*/
|
2021-10-30 12:51:35 +08:00
|
|
|
if (tcon_exist || ses_exist)
|
2016-11-05 02:50:31 +08:00
|
|
|
server->srv_count++;
|
|
|
|
|
|
|
|
spin_unlock(&cifs_tcp_ses_lock);
|
|
|
|
|
|
|
|
list_for_each_entry_safe(tcon, tcon2, &tmp_list, rlist) {
|
2020-06-01 01:38:22 +08:00
|
|
|
rc = smb2_reconnect(SMB2_INTERNAL_CMD, tcon, server);
|
2017-04-07 19:29:36 +08:00
|
|
|
if (!rc)
|
2016-11-30 03:31:23 +08:00
|
|
|
cifs_reopen_persistent_handles(tcon);
|
2017-04-07 19:29:36 +08:00
|
|
|
else
|
|
|
|
resched = true;
|
2016-11-05 02:50:31 +08:00
|
|
|
list_del_init(&tcon->rlist);
|
2019-06-05 08:15:34 +08:00
|
|
|
if (tcon->ipc)
|
|
|
|
cifs_put_smb_ses(tcon->ses);
|
|
|
|
else
|
|
|
|
cifs_put_tcon(tcon);
|
2016-11-05 02:50:31 +08:00
|
|
|
}
|
|
|
|
|
2021-10-30 12:51:35 +08:00
|
|
|
if (!ses_exist)
|
|
|
|
goto done;
|
|
|
|
|
|
|
|
/* allocate a dummy tcon struct used for reconnect */
|
|
|
|
tcon = kzalloc(sizeof(struct cifs_tcon), GFP_KERNEL);
|
|
|
|
if (!tcon) {
|
|
|
|
resched = true;
|
2022-03-20 21:50:15 +08:00
|
|
|
list_for_each_entry_safe(ses, ses2, &tmp_ses_list, rlist) {
|
|
|
|
list_del_init(&ses->rlist);
|
|
|
|
cifs_put_smb_ses(ses);
|
|
|
|
}
|
2021-10-30 12:51:35 +08:00
|
|
|
goto done;
|
|
|
|
}
|
|
|
|
|
smb3: cleanup and clarify status of tree connections
Currently the way the tid (tree connection) status is tracked
is confusing. The same enum is used for structs cifs_tcon
and cifs_ses and TCP_Server_info, but each of these three has
different states that they transition among. The current
code also unnecessarily uses camelCase.
Convert from use of statusEnum to a new tid_status_enum for
tree connections. The valid states for a tid are:
TID_NEW = 0,
TID_GOOD,
TID_EXITING,
TID_NEED_RECON,
TID_NEED_TCON,
TID_IN_TCON,
TID_NEED_FILES_INVALIDATE, /* unused, considering removing in future */
TID_IN_FILES_INVALIDATE
It also removes CifsNeedTcon, CifsInTcon, CifsNeedFilesInvalidate and
CifsInFilesInvalidate from the statusEnum used for session and
TCP_Server_Info since they are not relevant for those.
A follow on patch will fix the places where we use the
tcon->need_reconnect flag to be more consistent with the tid->status.
Also fixes a bug that was:
Reported-by: kernel test robot <lkp@intel.com>
Reviewed-by: Shyam Prasad N <sprasad@microsoft.com>
Reviewed-by: Ronnie Sahlberg <lsahlber@redhat.com>
Signed-off-by: Steve French <stfrench@microsoft.com>
2022-03-28 05:07:30 +08:00
|
|
|
tcon->status = TID_GOOD;
|
2021-10-30 12:51:35 +08:00
|
|
|
tcon->retry = false;
|
|
|
|
tcon->need_reconnect = false;
|
|
|
|
|
|
|
|
/* now reconnect sessions for necessary channels */
|
|
|
|
list_for_each_entry_safe(ses, ses2, &tmp_ses_list, rlist) {
|
|
|
|
tcon->ses = ses;
|
|
|
|
rc = smb2_reconnect(SMB2_INTERNAL_CMD, tcon, server);
|
|
|
|
if (rc)
|
|
|
|
resched = true;
|
|
|
|
list_del_init(&ses->rlist);
|
|
|
|
cifs_put_smb_ses(ses);
|
|
|
|
}
|
|
|
|
kfree(tcon);
|
|
|
|
|
|
|
|
done:
|
|
|
|
cifs_dbg(FYI, "Reconnecting tcons and channels finished\n");
|
2017-04-07 19:29:36 +08:00
|
|
|
if (resched)
|
|
|
|
queue_delayed_work(cifsiod_wq, &server->reconnect, 2 * HZ);
|
2021-10-30 12:51:35 +08:00
|
|
|
mutex_unlock(&pserver->reconnect_mutex);
|
2016-11-05 02:50:31 +08:00
|
|
|
|
|
|
|
/* now we can safely release srv struct */
|
2021-10-30 12:51:35 +08:00
|
|
|
if (tcon_exist || ses_exist)
|
2016-11-05 02:50:31 +08:00
|
|
|
cifs_put_tcp_session(server, 1);
|
|
|
|
}
|
|
|
|
|
2012-07-12 22:30:44 +08:00
|
|
|
int
|
|
|
|
SMB2_echo(struct TCP_Server_Info *server)
|
|
|
|
{
|
|
|
|
struct smb2_echo_req *req;
|
|
|
|
int rc = 0;
|
2018-06-12 06:00:58 +08:00
|
|
|
struct kvec iov[1];
|
2016-11-24 07:14:57 +08:00
|
|
|
struct smb_rqst rqst = { .rq_iov = iov,
|
2018-06-12 06:00:58 +08:00
|
|
|
.rq_nvec = 1 };
|
2017-11-09 09:14:21 +08:00
|
|
|
unsigned int total_len;
|
2012-07-12 22:30:44 +08:00
|
|
|
|
2021-10-25 13:44:10 +08:00
|
|
|
cifs_dbg(FYI, "In echo request for conn_id %lld\n", server->conn_id);
|
2012-07-12 22:30:44 +08:00
|
|
|
|
2021-07-20 01:05:53 +08:00
|
|
|
spin_lock(&cifs_tcp_ses_lock);
|
2016-06-23 09:12:05 +08:00
|
|
|
if (server->tcpStatus == CifsNeedNegotiate) {
|
2021-07-20 01:05:53 +08:00
|
|
|
spin_unlock(&cifs_tcp_ses_lock);
|
2016-11-05 02:50:31 +08:00
|
|
|
/* No need to send echo on newly established connections */
|
2020-02-24 21:14:59 +08:00
|
|
|
mod_delayed_work(cifsiod_wq, &server->reconnect, 0);
|
2016-11-05 02:50:31 +08:00
|
|
|
return rc;
|
2016-06-23 09:12:05 +08:00
|
|
|
}
|
2021-07-20 01:05:53 +08:00
|
|
|
spin_unlock(&cifs_tcp_ses_lock);
|
2016-06-23 09:12:05 +08:00
|
|
|
|
2020-06-01 01:38:22 +08:00
|
|
|
rc = smb2_plain_req_init(SMB2_ECHO, NULL, server,
|
|
|
|
(void **)&req, &total_len);
|
2012-07-12 22:30:44 +08:00
|
|
|
if (rc)
|
|
|
|
return rc;
|
|
|
|
|
2021-11-05 07:39:01 +08:00
|
|
|
req->hdr.CreditRequest = cpu_to_le16(1);
|
2012-07-12 22:30:44 +08:00
|
|
|
|
2018-06-12 06:00:58 +08:00
|
|
|
iov[0].iov_len = total_len;
|
|
|
|
iov[0].iov_base = (char *)req;
|
2012-07-12 22:30:44 +08:00
|
|
|
|
2016-11-17 06:06:17 +08:00
|
|
|
rc = cifs_call_async(server, &rqst, NULL, smb2_echo_callback, NULL,
|
2019-01-16 07:52:29 +08:00
|
|
|
server, CIFS_ECHO_OP, NULL);
|
2012-07-12 22:30:44 +08:00
|
|
|
if (rc)
|
2013-05-05 11:12:25 +08:00
|
|
|
cifs_dbg(FYI, "Echo request failed: %d\n", rc);
|
2012-07-12 22:30:44 +08:00
|
|
|
|
|
|
|
cifs_small_buf_release(req);
|
|
|
|
return rc;
|
|
|
|
}
|
2012-09-19 07:20:28 +08:00
|
|
|
|
2019-07-16 13:07:08 +08:00
|
|
|
void
|
|
|
|
SMB2_flush_free(struct smb_rqst *rqst)
|
|
|
|
{
|
|
|
|
if (rqst && rqst->rq_iov)
|
|
|
|
cifs_small_buf_release(rqst->rq_iov[0].iov_base); /* request */
|
|
|
|
}
|
|
|
|
|
2012-09-19 07:20:28 +08:00
|
|
|
int
|
2019-07-16 13:07:08 +08:00
|
|
|
SMB2_flush_init(const unsigned int xid, struct smb_rqst *rqst,
|
2020-06-01 01:38:22 +08:00
|
|
|
struct cifs_tcon *tcon, struct TCP_Server_Info *server,
|
|
|
|
u64 persistent_fid, u64 volatile_fid)
|
2012-09-19 07:20:28 +08:00
|
|
|
{
|
|
|
|
struct smb2_flush_req *req;
|
2019-07-16 13:07:08 +08:00
|
|
|
struct kvec *iov = rqst->rq_iov;
|
2017-11-20 08:24:39 +08:00
|
|
|
unsigned int total_len;
|
2019-07-16 13:07:08 +08:00
|
|
|
int rc;
|
2012-09-19 07:20:28 +08:00
|
|
|
|
2020-06-01 01:38:22 +08:00
|
|
|
rc = smb2_plain_req_init(SMB2_FLUSH, tcon, server,
|
|
|
|
(void **) &req, &total_len);
|
2012-09-19 07:20:28 +08:00
|
|
|
if (rc)
|
|
|
|
return rc;
|
|
|
|
|
2022-03-22 00:08:25 +08:00
|
|
|
req->PersistentFileId = persistent_fid;
|
|
|
|
req->VolatileFileId = volatile_fid;
|
2012-09-19 07:20:28 +08:00
|
|
|
|
|
|
|
iov[0].iov_base = (char *)req;
|
2017-11-20 08:24:39 +08:00
|
|
|
iov[0].iov_len = total_len;
|
2012-09-19 07:20:28 +08:00
|
|
|
|
2019-07-16 13:07:08 +08:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
int
|
|
|
|
SMB2_flush(const unsigned int xid, struct cifs_tcon *tcon, u64 persistent_fid,
|
|
|
|
u64 volatile_fid)
|
|
|
|
{
|
|
|
|
struct cifs_ses *ses = tcon->ses;
|
|
|
|
struct smb_rqst rqst;
|
|
|
|
struct kvec iov[1];
|
|
|
|
struct kvec rsp_iov = {NULL, 0};
|
2020-06-01 01:38:22 +08:00
|
|
|
struct TCP_Server_Info *server = cifs_pick_channel(ses);
|
2019-07-16 13:07:08 +08:00
|
|
|
int resp_buftype = CIFS_NO_BUFFER;
|
|
|
|
int flags = 0;
|
|
|
|
int rc = 0;
|
|
|
|
|
|
|
|
cifs_dbg(FYI, "flush\n");
|
|
|
|
if (!ses || !(ses->server))
|
|
|
|
return -EIO;
|
|
|
|
|
|
|
|
if (smb3_encryption_required(tcon))
|
|
|
|
flags |= CIFS_TRANSFORM_REQ;
|
|
|
|
|
2018-06-12 06:00:59 +08:00
|
|
|
memset(&rqst, 0, sizeof(struct smb_rqst));
|
2019-07-16 13:07:08 +08:00
|
|
|
memset(&iov, 0, sizeof(iov));
|
2018-06-12 06:00:59 +08:00
|
|
|
rqst.rq_iov = iov;
|
|
|
|
rqst.rq_nvec = 1;
|
|
|
|
|
2020-06-01 01:38:22 +08:00
|
|
|
rc = SMB2_flush_init(xid, &rqst, tcon, server,
|
|
|
|
persistent_fid, volatile_fid);
|
2019-07-16 13:07:08 +08:00
|
|
|
if (rc)
|
|
|
|
goto flush_exit;
|
|
|
|
|
2019-09-04 07:35:42 +08:00
|
|
|
trace_smb3_flush_enter(xid, persistent_fid, tcon->tid, ses->Suid);
|
2020-06-01 01:38:22 +08:00
|
|
|
rc = cifs_send_recv(xid, ses, server,
|
|
|
|
&rqst, &resp_buftype, flags, &rsp_iov);
|
2012-09-19 07:20:28 +08:00
|
|
|
|
2018-05-18 10:16:55 +08:00
|
|
|
if (rc != 0) {
|
2012-09-19 07:20:28 +08:00
|
|
|
cifs_stats_fail_inc(tcon, SMB2_FLUSH_HE);
|
2018-05-18 10:16:55 +08:00
|
|
|
trace_smb3_flush_err(xid, persistent_fid, tcon->tid, ses->Suid,
|
|
|
|
rc);
|
2019-09-04 07:35:42 +08:00
|
|
|
} else
|
|
|
|
trace_smb3_flush_done(xid, persistent_fid, tcon->tid,
|
|
|
|
ses->Suid);
|
2012-09-19 07:20:28 +08:00
|
|
|
|
2019-07-16 13:07:08 +08:00
|
|
|
flush_exit:
|
|
|
|
SMB2_flush_free(&rqst);
|
2016-10-26 02:38:47 +08:00
|
|
|
free_rsp_buf(resp_buftype, rsp_iov.iov_base);
|
2012-09-19 07:20:28 +08:00
|
|
|
return rc;
|
|
|
|
}
|
2012-09-19 07:20:29 +08:00
|
|
|
|
|
|
|
/*
|
|
|
|
* To form a chain of read requests, any read requests after the first should
|
|
|
|
* have the end_of_chain boolean set to true.
|
|
|
|
*/
|
|
|
|
static int
|
2016-11-24 07:14:57 +08:00
|
|
|
smb2_new_read_req(void **buf, unsigned int *total_len,
|
2017-11-07 16:54:53 +08:00
|
|
|
struct cifs_io_parms *io_parms, struct cifs_readdata *rdata,
|
|
|
|
unsigned int remaining_bytes, int request_type)
|
2012-09-19 07:20:29 +08:00
|
|
|
{
|
|
|
|
int rc = -EACCES;
|
2021-09-08 10:10:14 +08:00
|
|
|
struct smb2_read_req *req = NULL;
|
2021-11-05 07:39:01 +08:00
|
|
|
struct smb2_hdr *shdr;
|
2020-06-01 01:38:22 +08:00
|
|
|
struct TCP_Server_Info *server = io_parms->server;
|
2012-09-19 07:20:29 +08:00
|
|
|
|
2020-06-01 01:38:22 +08:00
|
|
|
rc = smb2_plain_req_init(SMB2_READ, io_parms->tcon, server,
|
|
|
|
(void **) &req, total_len);
|
2012-09-19 07:20:29 +08:00
|
|
|
if (rc)
|
|
|
|
return rc;
|
2017-11-07 16:54:53 +08:00
|
|
|
|
|
|
|
if (server == NULL)
|
2012-09-19 07:20:29 +08:00
|
|
|
return -ECONNABORTED;
|
|
|
|
|
2021-11-05 07:39:01 +08:00
|
|
|
shdr = &req->hdr;
|
|
|
|
shdr->Id.SyncId.ProcessId = cpu_to_le32(io_parms->pid);
|
2012-09-19 07:20:29 +08:00
|
|
|
|
2022-03-22 00:08:25 +08:00
|
|
|
req->PersistentFileId = io_parms->persistent_fid;
|
|
|
|
req->VolatileFileId = io_parms->volatile_fid;
|
2012-09-19 07:20:29 +08:00
|
|
|
req->ReadChannelInfoOffset = 0; /* reserved */
|
|
|
|
req->ReadChannelInfoLength = 0; /* reserved */
|
|
|
|
req->Channel = 0; /* reserved */
|
|
|
|
req->MinimumCount = 0;
|
|
|
|
req->Length = cpu_to_le32(io_parms->length);
|
|
|
|
req->Offset = cpu_to_le64(io_parms->offset);
|
2019-02-25 14:52:43 +08:00
|
|
|
|
|
|
|
trace_smb3_read_enter(0 /* xid */,
|
|
|
|
io_parms->persistent_fid,
|
|
|
|
io_parms->tcon->tid, io_parms->tcon->ses->Suid,
|
|
|
|
io_parms->offset, io_parms->length);
|
2017-11-23 08:38:47 +08:00
|
|
|
#ifdef CONFIG_CIFS_SMB_DIRECT
|
|
|
|
/*
|
|
|
|
* If we want to do a RDMA write, fill in and append
|
|
|
|
* smbd_buffer_descriptor_v1 to the end of read request
|
|
|
|
*/
|
2018-04-18 03:17:08 +08:00
|
|
|
if (server->rdma && rdata && !server->sign &&
|
2017-11-23 08:38:47 +08:00
|
|
|
rdata->bytes >= server->smbd_conn->rdma_readwrite_threshold) {
|
|
|
|
|
|
|
|
struct smbd_buffer_descriptor_v1 *v1;
|
2020-06-01 01:38:22 +08:00
|
|
|
bool need_invalidate = server->dialect == SMB30_PROT_ID;
|
2017-11-23 08:38:47 +08:00
|
|
|
|
|
|
|
rdata->mr = smbd_register_mr(
|
|
|
|
server->smbd_conn, rdata->pages,
|
2018-05-31 03:48:02 +08:00
|
|
|
rdata->nr_pages, rdata->page_offset,
|
|
|
|
rdata->tailsz, true, need_invalidate);
|
2017-11-23 08:38:47 +08:00
|
|
|
if (!rdata->mr)
|
2019-04-06 05:36:34 +08:00
|
|
|
return -EAGAIN;
|
2017-11-23 08:38:47 +08:00
|
|
|
|
|
|
|
req->Channel = SMB2_CHANNEL_RDMA_V1_INVALIDATE;
|
|
|
|
if (need_invalidate)
|
|
|
|
req->Channel = SMB2_CHANNEL_RDMA_V1;
|
|
|
|
req->ReadChannelInfoOffset =
|
2021-09-08 10:10:14 +08:00
|
|
|
cpu_to_le16(offsetof(struct smb2_read_req, Buffer));
|
2017-11-23 08:38:47 +08:00
|
|
|
req->ReadChannelInfoLength =
|
2018-01-25 13:07:41 +08:00
|
|
|
cpu_to_le16(sizeof(struct smbd_buffer_descriptor_v1));
|
2017-11-23 08:38:47 +08:00
|
|
|
v1 = (struct smbd_buffer_descriptor_v1 *) &req->Buffer[0];
|
2018-01-25 13:07:41 +08:00
|
|
|
v1->offset = cpu_to_le64(rdata->mr->mr->iova);
|
|
|
|
v1->token = cpu_to_le32(rdata->mr->mr->rkey);
|
|
|
|
v1->length = cpu_to_le32(rdata->mr->mr->length);
|
2017-11-23 08:38:47 +08:00
|
|
|
|
|
|
|
*total_len += sizeof(*v1) - 1;
|
|
|
|
}
|
|
|
|
#endif
|
2012-09-19 07:20:29 +08:00
|
|
|
if (request_type & CHAINED_REQUEST) {
|
|
|
|
if (!(request_type & END_OF_CHAIN)) {
|
2016-11-24 07:31:54 +08:00
|
|
|
/* next 8-byte aligned request */
|
|
|
|
*total_len = DIV_ROUND_UP(*total_len, 8) * 8;
|
|
|
|
shdr->NextCommand = cpu_to_le32(*total_len);
|
2012-09-19 07:20:29 +08:00
|
|
|
} else /* END_OF_CHAIN */
|
2016-10-25 06:33:04 +08:00
|
|
|
shdr->NextCommand = 0;
|
2012-09-19 07:20:29 +08:00
|
|
|
if (request_type & RELATED_REQUEST) {
|
2016-10-25 06:33:04 +08:00
|
|
|
shdr->Flags |= SMB2_FLAGS_RELATED_OPERATIONS;
|
2012-09-19 07:20:29 +08:00
|
|
|
/*
|
|
|
|
* Related requests use info from previous read request
|
|
|
|
* in chain.
|
|
|
|
*/
|
2021-11-05 07:39:01 +08:00
|
|
|
shdr->SessionId = cpu_to_le64(0xFFFFFFFFFFFFFFFF);
|
|
|
|
shdr->Id.SyncId.TreeId = cpu_to_le32(0xFFFFFFFF);
|
2022-03-22 00:08:25 +08:00
|
|
|
req->PersistentFileId = (u64)-1;
|
|
|
|
req->VolatileFileId = (u64)-1;
|
2012-09-19 07:20:29 +08:00
|
|
|
}
|
|
|
|
}
|
|
|
|
if (remaining_bytes > io_parms->length)
|
|
|
|
req->RemainingBytes = cpu_to_le32(remaining_bytes);
|
|
|
|
else
|
|
|
|
req->RemainingBytes = 0;
|
|
|
|
|
2016-11-24 07:14:57 +08:00
|
|
|
*buf = req;
|
2012-09-19 07:20:29 +08:00
|
|
|
return rc;
|
|
|
|
}
|
|
|
|
|
|
|
|
static void
|
|
|
|
smb2_readv_callback(struct mid_q_entry *mid)
|
|
|
|
{
|
|
|
|
struct cifs_readdata *rdata = mid->callback_data;
|
|
|
|
struct cifs_tcon *tcon = tlink_tcon(rdata->cfile->tlink);
|
2020-06-01 01:38:22 +08:00
|
|
|
struct TCP_Server_Info *server = rdata->server;
|
2021-11-05 07:39:01 +08:00
|
|
|
struct smb2_hdr *shdr =
|
|
|
|
(struct smb2_hdr *)rdata->iov[0].iov_base;
|
2019-01-17 03:22:29 +08:00
|
|
|
struct cifs_credits credits = { .value = 0, .instance = 0 };
|
2019-09-05 12:07:52 +08:00
|
|
|
struct smb_rqst rqst = { .rq_iov = &rdata->iov[1],
|
|
|
|
.rq_nvec = 1,
|
2012-09-19 21:22:32 +08:00
|
|
|
.rq_pages = rdata->pages,
|
2018-05-31 03:47:55 +08:00
|
|
|
.rq_offset = rdata->page_offset,
|
2012-09-19 21:22:32 +08:00
|
|
|
.rq_npages = rdata->nr_pages,
|
|
|
|
.rq_pagesz = rdata->pagesz,
|
|
|
|
.rq_tailsz = rdata->tailsz };
|
2012-09-19 07:20:29 +08:00
|
|
|
|
2020-06-01 01:38:22 +08:00
|
|
|
WARN_ONCE(rdata->server != mid->server,
|
|
|
|
"rdata server %p != mid server %p",
|
|
|
|
rdata->server, mid->server);
|
|
|
|
|
2013-05-05 11:12:25 +08:00
|
|
|
cifs_dbg(FYI, "%s: mid=%llu state=%d result=%d bytes=%u\n",
|
|
|
|
__func__, mid->mid, mid->mid_state, rdata->result,
|
|
|
|
rdata->bytes);
|
2012-09-19 07:20:29 +08:00
|
|
|
|
|
|
|
switch (mid->mid_state) {
|
|
|
|
case MID_RESPONSE_RECEIVED:
|
2019-01-17 03:22:29 +08:00
|
|
|
credits.value = le16_to_cpu(shdr->CreditRequest);
|
|
|
|
credits.instance = server->reconnect_instance;
|
2012-09-19 07:20:29 +08:00
|
|
|
/* result already set, check signature */
|
2016-11-18 07:24:46 +08:00
|
|
|
if (server->sign && !mid->decrypted) {
|
2012-09-19 07:20:30 +08:00
|
|
|
int rc;
|
|
|
|
|
2012-09-19 07:20:34 +08:00
|
|
|
rc = smb2_verify_signature(&rqst, server);
|
2012-09-19 07:20:30 +08:00
|
|
|
if (rc)
|
2019-09-04 10:32:41 +08:00
|
|
|
cifs_tcon_dbg(VFS, "SMB signature verification returned error = %d\n",
|
2013-05-05 11:12:25 +08:00
|
|
|
rc);
|
2012-09-19 07:20:30 +08:00
|
|
|
}
|
2012-09-19 07:20:29 +08:00
|
|
|
/* FIXME: should this be counted toward the initiating task? */
|
2014-07-10 14:03:29 +08:00
|
|
|
task_io_account_read(rdata->got_bytes);
|
|
|
|
cifs_stats_bytes_read(tcon, rdata->got_bytes);
|
2012-09-19 07:20:29 +08:00
|
|
|
break;
|
|
|
|
case MID_REQUEST_SUBMITTED:
|
|
|
|
case MID_RETRY_NEEDED:
|
|
|
|
rdata->result = -EAGAIN;
|
2014-07-10 15:31:48 +08:00
|
|
|
if (server->sign && rdata->got_bytes)
|
|
|
|
/* reset bytes number since we can not check a sign */
|
|
|
|
rdata->got_bytes = 0;
|
|
|
|
/* FIXME: should this be counted toward the initiating task? */
|
|
|
|
task_io_account_read(rdata->got_bytes);
|
|
|
|
cifs_stats_bytes_read(tcon, rdata->got_bytes);
|
2012-09-19 07:20:29 +08:00
|
|
|
break;
|
2019-01-16 07:08:48 +08:00
|
|
|
case MID_RESPONSE_MALFORMED:
|
2019-01-17 03:22:29 +08:00
|
|
|
credits.value = le16_to_cpu(shdr->CreditRequest);
|
|
|
|
credits.instance = server->reconnect_instance;
|
2020-08-08 16:36:37 +08:00
|
|
|
fallthrough;
|
2012-09-19 07:20:29 +08:00
|
|
|
default:
|
2019-01-19 07:46:14 +08:00
|
|
|
rdata->result = -EIO;
|
2012-09-19 07:20:29 +08:00
|
|
|
}
|
2017-11-23 08:38:47 +08:00
|
|
|
#ifdef CONFIG_CIFS_SMB_DIRECT
|
|
|
|
/*
|
|
|
|
* If this rdata has a memmory registered, the MR can be freed
|
|
|
|
* MR needs to be freed as soon as I/O finishes to prevent deadlock
|
|
|
|
* because they have limited number and are used for future I/Os
|
|
|
|
*/
|
|
|
|
if (rdata->mr) {
|
|
|
|
smbd_deregister_mr(rdata->mr);
|
|
|
|
rdata->mr = NULL;
|
|
|
|
}
|
|
|
|
#endif
|
2019-01-19 07:54:34 +08:00
|
|
|
if (rdata->result && rdata->result != -ENODATA) {
|
2012-09-19 07:20:29 +08:00
|
|
|
cifs_stats_fail_inc(tcon, SMB2_READ_HE);
|
2019-01-26 03:38:53 +08:00
|
|
|
trace_smb3_read_err(0 /* xid */,
|
|
|
|
rdata->cfile->fid.persistent_fid,
|
|
|
|
tcon->tid, tcon->ses->Suid, rdata->offset,
|
|
|
|
rdata->bytes, rdata->result);
|
|
|
|
} else
|
|
|
|
trace_smb3_read_done(0 /* xid */,
|
|
|
|
rdata->cfile->fid.persistent_fid,
|
|
|
|
tcon->tid, tcon->ses->Suid,
|
|
|
|
rdata->offset, rdata->got_bytes);
|
2012-09-19 07:20:29 +08:00
|
|
|
|
|
|
|
queue_work(cifsiod_wq, &rdata->work);
|
|
|
|
DeleteMidQEntry(mid);
|
2019-01-17 03:22:29 +08:00
|
|
|
add_credits(server, &credits, 0);
|
2012-09-19 07:20:29 +08:00
|
|
|
}
|
|
|
|
|
2016-11-24 07:14:57 +08:00
|
|
|
/* smb2_async_readv - send an async read, and set up mid to handle result */
|
2012-09-19 07:20:29 +08:00
|
|
|
int
|
|
|
|
smb2_async_readv(struct cifs_readdata *rdata)
|
|
|
|
{
|
2014-06-25 15:28:57 +08:00
|
|
|
int rc, flags = 0;
|
2016-10-25 06:33:04 +08:00
|
|
|
char *buf;
|
2021-11-05 07:39:01 +08:00
|
|
|
struct smb2_hdr *shdr;
|
2012-09-19 07:20:29 +08:00
|
|
|
struct cifs_io_parms io_parms;
|
2016-11-24 07:14:57 +08:00
|
|
|
struct smb_rqst rqst = { .rq_iov = rdata->iov,
|
2018-06-12 06:00:58 +08:00
|
|
|
.rq_nvec = 1 };
|
2014-06-25 15:28:57 +08:00
|
|
|
struct TCP_Server_Info *server;
|
2020-06-01 01:38:22 +08:00
|
|
|
struct cifs_tcon *tcon = tlink_tcon(rdata->cfile->tlink);
|
2016-11-24 07:14:57 +08:00
|
|
|
unsigned int total_len;
|
2012-09-19 07:20:29 +08:00
|
|
|
|
2013-05-05 11:12:25 +08:00
|
|
|
cifs_dbg(FYI, "%s: offset=%llu bytes=%u\n",
|
|
|
|
__func__, rdata->offset, rdata->bytes);
|
2012-09-19 07:20:29 +08:00
|
|
|
|
2020-06-01 01:38:22 +08:00
|
|
|
if (!rdata->server)
|
|
|
|
rdata->server = cifs_pick_channel(tcon->ses);
|
|
|
|
|
2012-09-19 07:20:29 +08:00
|
|
|
io_parms.tcon = tlink_tcon(rdata->cfile->tlink);
|
2020-06-01 01:38:22 +08:00
|
|
|
io_parms.server = server = rdata->server;
|
2012-09-19 07:20:29 +08:00
|
|
|
io_parms.offset = rdata->offset;
|
|
|
|
io_parms.length = rdata->bytes;
|
|
|
|
io_parms.persistent_fid = rdata->cfile->fid.persistent_fid;
|
|
|
|
io_parms.volatile_fid = rdata->cfile->fid.volatile_fid;
|
|
|
|
io_parms.pid = rdata->pid;
|
2014-06-25 15:28:57 +08:00
|
|
|
|
2017-11-07 16:54:53 +08:00
|
|
|
rc = smb2_new_read_req(
|
|
|
|
(void **) &buf, &total_len, &io_parms, rdata, 0, 0);
|
2019-01-26 03:10:00 +08:00
|
|
|
if (rc)
|
2012-09-19 07:20:29 +08:00
|
|
|
return rc;
|
|
|
|
|
2018-05-10 06:43:08 +08:00
|
|
|
if (smb3_encryption_required(io_parms.tcon))
|
2016-11-01 04:49:30 +08:00
|
|
|
flags |= CIFS_TRANSFORM_REQ;
|
|
|
|
|
2018-06-12 06:00:58 +08:00
|
|
|
rdata->iov[0].iov_base = buf;
|
|
|
|
rdata->iov[0].iov_len = total_len;
|
2016-11-24 07:31:54 +08:00
|
|
|
|
2021-11-05 07:39:01 +08:00
|
|
|
shdr = (struct smb2_hdr *)buf;
|
2012-09-19 07:20:29 +08:00
|
|
|
|
2019-01-17 03:12:41 +08:00
|
|
|
if (rdata->credits.value > 0) {
|
2016-10-25 06:33:04 +08:00
|
|
|
shdr->CreditCharge = cpu_to_le16(DIV_ROUND_UP(rdata->bytes,
|
2014-06-25 15:28:57 +08:00
|
|
|
SMB2_MAX_BUFFER_SIZE));
|
2021-03-05 01:51:48 +08:00
|
|
|
shdr->CreditRequest = cpu_to_le16(le16_to_cpu(shdr->CreditCharge) + 8);
|
2019-01-24 10:15:52 +08:00
|
|
|
|
|
|
|
rc = adjust_credits(server, &rdata->credits, rdata->bytes);
|
|
|
|
if (rc)
|
2019-01-17 03:12:41 +08:00
|
|
|
goto async_readv_out;
|
2019-01-24 10:15:52 +08:00
|
|
|
|
2016-11-01 04:49:30 +08:00
|
|
|
flags |= CIFS_HAS_CREDITS;
|
2014-06-25 15:28:57 +08:00
|
|
|
}
|
|
|
|
|
2012-09-19 07:20:29 +08:00
|
|
|
kref_get(&rdata->refcount);
|
2020-06-01 01:38:22 +08:00
|
|
|
rc = cifs_call_async(server, &rqst,
|
2012-09-19 07:20:29 +08:00
|
|
|
cifs_readv_receive, smb2_readv_callback,
|
2019-01-16 07:52:29 +08:00
|
|
|
smb3_handle_read_data, rdata, flags,
|
|
|
|
&rdata->credits);
|
2012-09-19 20:03:26 +08:00
|
|
|
if (rc) {
|
2012-09-19 07:20:29 +08:00
|
|
|
kref_put(&rdata->refcount, cifs_readdata_release);
|
2012-09-19 20:03:26 +08:00
|
|
|
cifs_stats_fail_inc(io_parms.tcon, SMB2_READ_HE);
|
2019-01-26 03:38:53 +08:00
|
|
|
trace_smb3_read_err(0 /* xid */, io_parms.persistent_fid,
|
|
|
|
io_parms.tcon->tid,
|
|
|
|
io_parms.tcon->ses->Suid,
|
|
|
|
io_parms.offset, io_parms.length, rc);
|
|
|
|
}
|
2012-09-19 07:20:29 +08:00
|
|
|
|
2019-01-17 03:12:41 +08:00
|
|
|
async_readv_out:
|
2012-09-19 07:20:29 +08:00
|
|
|
cifs_small_buf_release(buf);
|
|
|
|
return rc;
|
|
|
|
}
|
2012-09-19 07:20:29 +08:00
|
|
|
|
2012-09-19 07:20:30 +08:00
|
|
|
int
|
|
|
|
SMB2_read(const unsigned int xid, struct cifs_io_parms *io_parms,
|
|
|
|
unsigned int *nbytes, char **buf, int *buf_type)
|
|
|
|
{
|
2018-06-12 06:00:59 +08:00
|
|
|
struct smb_rqst rqst;
|
2019-07-31 17:05:26 +08:00
|
|
|
int resp_buftype, rc;
|
2021-09-08 10:10:14 +08:00
|
|
|
struct smb2_read_req *req = NULL;
|
2012-09-19 07:20:30 +08:00
|
|
|
struct smb2_read_rsp *rsp = NULL;
|
2017-11-20 08:24:41 +08:00
|
|
|
struct kvec iov[1];
|
2016-10-26 02:38:47 +08:00
|
|
|
struct kvec rsp_iov;
|
2016-11-24 07:14:57 +08:00
|
|
|
unsigned int total_len;
|
2016-11-01 04:49:30 +08:00
|
|
|
int flags = CIFS_LOG_ERROR;
|
|
|
|
struct cifs_ses *ses = io_parms->tcon->ses;
|
2012-09-19 07:20:30 +08:00
|
|
|
|
2020-06-01 01:38:22 +08:00
|
|
|
if (!io_parms->server)
|
|
|
|
io_parms->server = cifs_pick_channel(io_parms->tcon->ses);
|
|
|
|
|
2012-09-19 07:20:30 +08:00
|
|
|
*nbytes = 0;
|
2017-11-07 16:54:53 +08:00
|
|
|
rc = smb2_new_read_req((void **)&req, &total_len, io_parms, NULL, 0, 0);
|
2012-09-19 07:20:30 +08:00
|
|
|
if (rc)
|
|
|
|
return rc;
|
|
|
|
|
2018-05-10 06:43:08 +08:00
|
|
|
if (smb3_encryption_required(io_parms->tcon))
|
2016-11-01 04:49:30 +08:00
|
|
|
flags |= CIFS_TRANSFORM_REQ;
|
|
|
|
|
2017-11-20 08:24:41 +08:00
|
|
|
iov[0].iov_base = (char *)req;
|
|
|
|
iov[0].iov_len = total_len;
|
2016-11-24 07:31:54 +08:00
|
|
|
|
2018-06-12 06:00:59 +08:00
|
|
|
memset(&rqst, 0, sizeof(struct smb_rqst));
|
|
|
|
rqst.rq_iov = iov;
|
|
|
|
rqst.rq_nvec = 1;
|
|
|
|
|
2020-06-01 01:38:22 +08:00
|
|
|
rc = cifs_send_recv(xid, ses, io_parms->server,
|
|
|
|
&rqst, &resp_buftype, flags, &rsp_iov);
|
2016-10-26 02:38:47 +08:00
|
|
|
rsp = (struct smb2_read_rsp *)rsp_iov.iov_base;
|
2012-09-19 07:20:30 +08:00
|
|
|
|
2017-11-21 06:36:33 +08:00
|
|
|
if (rc) {
|
|
|
|
if (rc != -ENODATA) {
|
|
|
|
cifs_stats_fail_inc(io_parms->tcon, SMB2_READ_HE);
|
|
|
|
cifs_dbg(VFS, "Send error in read = %d\n", rc);
|
2021-09-08 10:10:14 +08:00
|
|
|
trace_smb3_read_err(xid,
|
2022-03-22 00:08:25 +08:00
|
|
|
req->PersistentFileId,
|
2019-01-26 03:38:53 +08:00
|
|
|
io_parms->tcon->tid, ses->Suid,
|
|
|
|
io_parms->offset, io_parms->length,
|
|
|
|
rc);
|
2019-02-26 05:02:58 +08:00
|
|
|
} else
|
2022-03-22 00:08:25 +08:00
|
|
|
trace_smb3_read_done(xid, req->PersistentFileId, io_parms->tcon->tid,
|
|
|
|
ses->Suid, io_parms->offset, 0);
|
2016-10-26 02:38:47 +08:00
|
|
|
free_rsp_buf(resp_buftype, rsp_iov.iov_base);
|
2019-04-23 14:39:45 +08:00
|
|
|
cifs_small_buf_release(req);
|
2017-11-21 06:36:33 +08:00
|
|
|
return rc == -ENODATA ? 0 : rc;
|
2018-05-18 10:16:55 +08:00
|
|
|
} else
|
2021-09-08 10:10:14 +08:00
|
|
|
trace_smb3_read_done(xid,
|
2022-03-22 00:08:25 +08:00
|
|
|
req->PersistentFileId,
|
2018-05-18 10:16:55 +08:00
|
|
|
io_parms->tcon->tid, ses->Suid,
|
|
|
|
io_parms->offset, io_parms->length);
|
2012-09-19 07:20:30 +08:00
|
|
|
|
2019-04-06 15:47:39 +08:00
|
|
|
cifs_small_buf_release(req);
|
|
|
|
|
2017-11-21 06:36:33 +08:00
|
|
|
*nbytes = le32_to_cpu(rsp->DataLength);
|
|
|
|
if ((*nbytes > CIFS_MAX_MSGSIZE) ||
|
|
|
|
(*nbytes > io_parms->length)) {
|
|
|
|
cifs_dbg(FYI, "bad length %d for count %d\n",
|
|
|
|
*nbytes, io_parms->length);
|
|
|
|
rc = -EIO;
|
|
|
|
*nbytes = 0;
|
2012-09-19 07:20:30 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
if (*buf) {
|
2018-06-01 08:53:02 +08:00
|
|
|
memcpy(*buf, (char *)rsp + rsp->DataOffset, *nbytes);
|
2016-10-26 02:38:47 +08:00
|
|
|
free_rsp_buf(resp_buftype, rsp_iov.iov_base);
|
2012-09-19 07:20:30 +08:00
|
|
|
} else if (resp_buftype != CIFS_NO_BUFFER) {
|
2016-10-26 02:38:47 +08:00
|
|
|
*buf = rsp_iov.iov_base;
|
2012-09-19 07:20:30 +08:00
|
|
|
if (resp_buftype == CIFS_SMALL_BUFFER)
|
|
|
|
*buf_type = CIFS_SMALL_BUFFER;
|
|
|
|
else if (resp_buftype == CIFS_LARGE_BUFFER)
|
|
|
|
*buf_type = CIFS_LARGE_BUFFER;
|
|
|
|
}
|
|
|
|
return rc;
|
|
|
|
}
|
|
|
|
|
2012-09-19 07:20:29 +08:00
|
|
|
/*
|
|
|
|
* Check the mid_state and signature on received buffer (if any), and queue the
|
|
|
|
* workqueue completion task.
|
|
|
|
*/
|
|
|
|
static void
|
|
|
|
smb2_writev_callback(struct mid_q_entry *mid)
|
|
|
|
{
|
|
|
|
struct cifs_writedata *wdata = mid->callback_data;
|
|
|
|
struct cifs_tcon *tcon = tlink_tcon(wdata->cfile->tlink);
|
2020-06-01 01:38:22 +08:00
|
|
|
struct TCP_Server_Info *server = wdata->server;
|
2012-09-19 07:20:29 +08:00
|
|
|
unsigned int written;
|
|
|
|
struct smb2_write_rsp *rsp = (struct smb2_write_rsp *)mid->resp_buf;
|
2019-01-17 03:22:29 +08:00
|
|
|
struct cifs_credits credits = { .value = 0, .instance = 0 };
|
2012-09-19 07:20:29 +08:00
|
|
|
|
2020-06-01 01:38:22 +08:00
|
|
|
WARN_ONCE(wdata->server != mid->server,
|
|
|
|
"wdata server %p != mid server %p",
|
|
|
|
wdata->server, mid->server);
|
|
|
|
|
2012-09-19 07:20:29 +08:00
|
|
|
switch (mid->mid_state) {
|
|
|
|
case MID_RESPONSE_RECEIVED:
|
2021-11-05 07:39:01 +08:00
|
|
|
credits.value = le16_to_cpu(rsp->hdr.CreditRequest);
|
2019-01-17 03:22:29 +08:00
|
|
|
credits.instance = server->reconnect_instance;
|
|
|
|
wdata->result = smb2_check_receive(mid, server, 0);
|
2012-09-19 07:20:29 +08:00
|
|
|
if (wdata->result != 0)
|
|
|
|
break;
|
|
|
|
|
|
|
|
written = le32_to_cpu(rsp->DataLength);
|
|
|
|
/*
|
|
|
|
* Mask off high 16 bits when bytes written as returned
|
|
|
|
* by the server is greater than bytes requested by the
|
|
|
|
* client. OS/2 servers are known to set incorrect
|
|
|
|
* CountHigh values.
|
|
|
|
*/
|
|
|
|
if (written > wdata->bytes)
|
|
|
|
written &= 0xFFFF;
|
|
|
|
|
|
|
|
if (written < wdata->bytes)
|
|
|
|
wdata->result = -ENOSPC;
|
|
|
|
else
|
|
|
|
wdata->bytes = written;
|
|
|
|
break;
|
|
|
|
case MID_REQUEST_SUBMITTED:
|
|
|
|
case MID_RETRY_NEEDED:
|
|
|
|
wdata->result = -EAGAIN;
|
|
|
|
break;
|
2019-01-16 07:08:48 +08:00
|
|
|
case MID_RESPONSE_MALFORMED:
|
2021-11-05 07:39:01 +08:00
|
|
|
credits.value = le16_to_cpu(rsp->hdr.CreditRequest);
|
2019-01-17 03:22:29 +08:00
|
|
|
credits.instance = server->reconnect_instance;
|
2020-08-08 16:36:37 +08:00
|
|
|
fallthrough;
|
2012-09-19 07:20:29 +08:00
|
|
|
default:
|
|
|
|
wdata->result = -EIO;
|
|
|
|
break;
|
|
|
|
}
|
2017-11-23 08:38:45 +08:00
|
|
|
#ifdef CONFIG_CIFS_SMB_DIRECT
|
|
|
|
/*
|
|
|
|
* If this wdata has a memory registered, the MR can be freed
|
|
|
|
* The number of MRs available is limited, it's important to recover
|
|
|
|
* used MR as soon as I/O is finished. Hold MR longer in the later
|
|
|
|
* I/O process can possibly result in I/O deadlock due to lack of MR
|
|
|
|
* to send request on I/O retry
|
|
|
|
*/
|
|
|
|
if (wdata->mr) {
|
|
|
|
smbd_deregister_mr(wdata->mr);
|
|
|
|
wdata->mr = NULL;
|
|
|
|
}
|
|
|
|
#endif
|
2019-01-26 03:38:53 +08:00
|
|
|
if (wdata->result) {
|
2012-09-19 07:20:29 +08:00
|
|
|
cifs_stats_fail_inc(tcon, SMB2_WRITE_HE);
|
2019-01-26 03:38:53 +08:00
|
|
|
trace_smb3_write_err(0 /* no xid */,
|
|
|
|
wdata->cfile->fid.persistent_fid,
|
|
|
|
tcon->tid, tcon->ses->Suid, wdata->offset,
|
|
|
|
wdata->bytes, wdata->result);
|
2020-02-06 06:52:11 +08:00
|
|
|
if (wdata->result == -ENOSPC)
|
2020-04-15 13:42:53 +08:00
|
|
|
pr_warn_once("Out of space writing to %s\n",
|
|
|
|
tcon->treeName);
|
2019-01-26 03:38:53 +08:00
|
|
|
} else
|
|
|
|
trace_smb3_write_done(0 /* no xid */,
|
|
|
|
wdata->cfile->fid.persistent_fid,
|
|
|
|
tcon->tid, tcon->ses->Suid,
|
|
|
|
wdata->offset, wdata->bytes);
|
2012-09-19 07:20:29 +08:00
|
|
|
|
|
|
|
queue_work(cifsiod_wq, &wdata->work);
|
|
|
|
DeleteMidQEntry(mid);
|
2019-01-17 03:22:29 +08:00
|
|
|
add_credits(server, &credits, 0);
|
2012-09-19 07:20:29 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
/* smb2_async_writev - send an async write, and set up mid to handle result */
|
|
|
|
int
|
2014-02-08 10:45:12 +08:00
|
|
|
smb2_async_writev(struct cifs_writedata *wdata,
|
|
|
|
void (*release)(struct kref *kref))
|
2012-09-19 07:20:29 +08:00
|
|
|
{
|
2014-06-05 23:03:27 +08:00
|
|
|
int rc = -EACCES, flags = 0;
|
2012-09-19 07:20:29 +08:00
|
|
|
struct smb2_write_req *req = NULL;
|
2021-11-05 07:39:01 +08:00
|
|
|
struct smb2_hdr *shdr;
|
2012-09-19 07:20:29 +08:00
|
|
|
struct cifs_tcon *tcon = tlink_tcon(wdata->cfile->tlink);
|
2020-06-01 01:38:22 +08:00
|
|
|
struct TCP_Server_Info *server = wdata->server;
|
2018-06-12 06:00:58 +08:00
|
|
|
struct kvec iov[1];
|
2016-11-24 07:14:57 +08:00
|
|
|
struct smb_rqst rqst = { };
|
2017-11-20 08:24:41 +08:00
|
|
|
unsigned int total_len;
|
2012-09-19 07:20:29 +08:00
|
|
|
|
2020-06-01 01:38:22 +08:00
|
|
|
if (!wdata->server)
|
|
|
|
server = wdata->server = cifs_pick_channel(tcon->ses);
|
|
|
|
|
|
|
|
rc = smb2_plain_req_init(SMB2_WRITE, tcon, server,
|
|
|
|
(void **) &req, &total_len);
|
2019-01-26 03:10:00 +08:00
|
|
|
if (rc)
|
|
|
|
return rc;
|
2012-09-19 07:20:29 +08:00
|
|
|
|
2018-05-10 06:43:08 +08:00
|
|
|
if (smb3_encryption_required(tcon))
|
2016-11-01 04:49:30 +08:00
|
|
|
flags |= CIFS_TRANSFORM_REQ;
|
|
|
|
|
2021-11-05 07:39:01 +08:00
|
|
|
shdr = (struct smb2_hdr *)req;
|
|
|
|
shdr->Id.SyncId.ProcessId = cpu_to_le32(wdata->cfile->pid);
|
2012-09-19 07:20:29 +08:00
|
|
|
|
2022-03-22 00:08:25 +08:00
|
|
|
req->PersistentFileId = wdata->cfile->fid.persistent_fid;
|
|
|
|
req->VolatileFileId = wdata->cfile->fid.volatile_fid;
|
2012-09-19 07:20:29 +08:00
|
|
|
req->WriteChannelInfoOffset = 0;
|
|
|
|
req->WriteChannelInfoLength = 0;
|
|
|
|
req->Channel = 0;
|
|
|
|
req->Offset = cpu_to_le64(wdata->offset);
|
|
|
|
req->DataOffset = cpu_to_le16(
|
2017-11-20 08:24:41 +08:00
|
|
|
offsetof(struct smb2_write_req, Buffer));
|
2012-09-19 07:20:29 +08:00
|
|
|
req->RemainingBytes = 0;
|
2019-02-25 14:52:43 +08:00
|
|
|
|
|
|
|
trace_smb3_write_enter(0 /* xid */, wdata->cfile->fid.persistent_fid,
|
|
|
|
tcon->tid, tcon->ses->Suid, wdata->offset, wdata->bytes);
|
2017-11-23 08:38:45 +08:00
|
|
|
#ifdef CONFIG_CIFS_SMB_DIRECT
|
|
|
|
/*
|
|
|
|
* If we want to do a server RDMA read, fill in and append
|
|
|
|
* smbd_buffer_descriptor_v1 to the end of write request
|
|
|
|
*/
|
2018-04-18 03:17:08 +08:00
|
|
|
if (server->rdma && !server->sign && wdata->bytes >=
|
2017-11-23 08:38:45 +08:00
|
|
|
server->smbd_conn->rdma_readwrite_threshold) {
|
|
|
|
|
|
|
|
struct smbd_buffer_descriptor_v1 *v1;
|
|
|
|
bool need_invalidate = server->dialect == SMB30_PROT_ID;
|
|
|
|
|
|
|
|
wdata->mr = smbd_register_mr(
|
|
|
|
server->smbd_conn, wdata->pages,
|
2018-05-31 03:48:02 +08:00
|
|
|
wdata->nr_pages, wdata->page_offset,
|
|
|
|
wdata->tailsz, false, need_invalidate);
|
2017-11-23 08:38:45 +08:00
|
|
|
if (!wdata->mr) {
|
2019-04-06 05:36:34 +08:00
|
|
|
rc = -EAGAIN;
|
2017-11-23 08:38:45 +08:00
|
|
|
goto async_writev_out;
|
|
|
|
}
|
|
|
|
req->Length = 0;
|
|
|
|
req->DataOffset = 0;
|
2018-05-31 03:48:02 +08:00
|
|
|
if (wdata->nr_pages > 1)
|
|
|
|
req->RemainingBytes =
|
|
|
|
cpu_to_le32(
|
|
|
|
(wdata->nr_pages - 1) * wdata->pagesz -
|
|
|
|
wdata->page_offset + wdata->tailsz
|
|
|
|
);
|
|
|
|
else
|
|
|
|
req->RemainingBytes = cpu_to_le32(wdata->tailsz);
|
2017-11-23 08:38:45 +08:00
|
|
|
req->Channel = SMB2_CHANNEL_RDMA_V1_INVALIDATE;
|
|
|
|
if (need_invalidate)
|
|
|
|
req->Channel = SMB2_CHANNEL_RDMA_V1;
|
|
|
|
req->WriteChannelInfoOffset =
|
2018-01-25 13:07:41 +08:00
|
|
|
cpu_to_le16(offsetof(struct smb2_write_req, Buffer));
|
2017-11-23 08:38:45 +08:00
|
|
|
req->WriteChannelInfoLength =
|
2018-01-25 13:07:41 +08:00
|
|
|
cpu_to_le16(sizeof(struct smbd_buffer_descriptor_v1));
|
2017-11-23 08:38:45 +08:00
|
|
|
v1 = (struct smbd_buffer_descriptor_v1 *) &req->Buffer[0];
|
2018-01-25 13:07:41 +08:00
|
|
|
v1->offset = cpu_to_le64(wdata->mr->mr->iova);
|
|
|
|
v1->token = cpu_to_le32(wdata->mr->mr->rkey);
|
|
|
|
v1->length = cpu_to_le32(wdata->mr->mr->length);
|
2017-11-23 08:38:45 +08:00
|
|
|
}
|
|
|
|
#endif
|
2018-06-12 06:00:58 +08:00
|
|
|
iov[0].iov_len = total_len - 1;
|
|
|
|
iov[0].iov_base = (char *)req;
|
2012-09-19 07:20:29 +08:00
|
|
|
|
2016-11-24 07:14:57 +08:00
|
|
|
rqst.rq_iov = iov;
|
2018-06-12 06:00:58 +08:00
|
|
|
rqst.rq_nvec = 1;
|
2012-09-19 07:20:35 +08:00
|
|
|
rqst.rq_pages = wdata->pages;
|
2018-05-31 03:47:53 +08:00
|
|
|
rqst.rq_offset = wdata->page_offset;
|
2012-09-19 07:20:35 +08:00
|
|
|
rqst.rq_npages = wdata->nr_pages;
|
|
|
|
rqst.rq_pagesz = wdata->pagesz;
|
|
|
|
rqst.rq_tailsz = wdata->tailsz;
|
2017-11-23 08:38:45 +08:00
|
|
|
#ifdef CONFIG_CIFS_SMB_DIRECT
|
|
|
|
if (wdata->mr) {
|
2018-06-12 06:00:58 +08:00
|
|
|
iov[0].iov_len += sizeof(struct smbd_buffer_descriptor_v1);
|
2017-11-23 08:38:45 +08:00
|
|
|
rqst.rq_npages = 0;
|
|
|
|
}
|
|
|
|
#endif
|
2013-05-05 11:12:25 +08:00
|
|
|
cifs_dbg(FYI, "async write at %llu %u bytes\n",
|
|
|
|
wdata->offset, wdata->bytes);
|
2012-09-19 07:20:29 +08:00
|
|
|
|
2017-11-23 08:38:45 +08:00
|
|
|
#ifdef CONFIG_CIFS_SMB_DIRECT
|
|
|
|
/* For RDMA read, I/O size is in RemainingBytes not in Length */
|
|
|
|
if (!wdata->mr)
|
|
|
|
req->Length = cpu_to_le32(wdata->bytes);
|
|
|
|
#else
|
2012-09-19 07:20:29 +08:00
|
|
|
req->Length = cpu_to_le32(wdata->bytes);
|
2017-11-23 08:38:45 +08:00
|
|
|
#endif
|
2012-09-19 07:20:29 +08:00
|
|
|
|
2019-01-17 03:12:41 +08:00
|
|
|
if (wdata->credits.value > 0) {
|
2016-10-25 06:33:04 +08:00
|
|
|
shdr->CreditCharge = cpu_to_le16(DIV_ROUND_UP(wdata->bytes,
|
2014-06-05 23:03:27 +08:00
|
|
|
SMB2_MAX_BUFFER_SIZE));
|
2021-03-05 01:51:48 +08:00
|
|
|
shdr->CreditRequest = cpu_to_le16(le16_to_cpu(shdr->CreditCharge) + 8);
|
2019-01-24 10:15:52 +08:00
|
|
|
|
|
|
|
rc = adjust_credits(server, &wdata->credits, wdata->bytes);
|
|
|
|
if (rc)
|
2019-01-17 03:12:41 +08:00
|
|
|
goto async_writev_out;
|
2019-01-24 10:15:52 +08:00
|
|
|
|
2016-11-01 04:49:30 +08:00
|
|
|
flags |= CIFS_HAS_CREDITS;
|
2014-06-05 23:03:27 +08:00
|
|
|
}
|
|
|
|
|
2012-09-19 07:20:29 +08:00
|
|
|
kref_get(&wdata->refcount);
|
2016-11-17 06:06:17 +08:00
|
|
|
rc = cifs_call_async(server, &rqst, NULL, smb2_writev_callback, NULL,
|
2019-01-16 07:52:29 +08:00
|
|
|
wdata, flags, &wdata->credits);
|
2012-09-19 07:20:29 +08:00
|
|
|
|
2012-09-19 20:03:26 +08:00
|
|
|
if (rc) {
|
2021-09-08 10:10:14 +08:00
|
|
|
trace_smb3_write_err(0 /* no xid */,
|
2022-03-22 00:08:25 +08:00
|
|
|
req->PersistentFileId,
|
2018-05-18 10:16:55 +08:00
|
|
|
tcon->tid, tcon->ses->Suid, wdata->offset,
|
|
|
|
wdata->bytes, rc);
|
2014-02-08 10:45:12 +08:00
|
|
|
kref_put(&wdata->refcount, release);
|
2012-09-19 20:03:26 +08:00
|
|
|
cifs_stats_fail_inc(tcon, SMB2_WRITE_HE);
|
2019-01-26 03:38:53 +08:00
|
|
|
}
|
2012-09-19 07:20:29 +08:00
|
|
|
|
|
|
|
async_writev_out:
|
|
|
|
cifs_small_buf_release(req);
|
|
|
|
return rc;
|
|
|
|
}
|
2012-09-19 07:20:30 +08:00
|
|
|
|
|
|
|
/*
|
|
|
|
* SMB2_write function gets iov pointer to kvec array with n_vec as a length.
|
|
|
|
* The length field from io_parms must be at least 1 and indicates a number of
|
|
|
|
* elements with data to write that begins with position 1 in iov array. All
|
|
|
|
* data length is specified by count.
|
|
|
|
*/
|
|
|
|
int
|
|
|
|
SMB2_write(const unsigned int xid, struct cifs_io_parms *io_parms,
|
|
|
|
unsigned int *nbytes, struct kvec *iov, int n_vec)
|
|
|
|
{
|
2018-06-12 06:00:59 +08:00
|
|
|
struct smb_rqst rqst;
|
2012-09-19 07:20:30 +08:00
|
|
|
int rc = 0;
|
|
|
|
struct smb2_write_req *req = NULL;
|
|
|
|
struct smb2_write_rsp *rsp = NULL;
|
|
|
|
int resp_buftype;
|
2016-10-26 02:38:47 +08:00
|
|
|
struct kvec rsp_iov;
|
2016-11-01 04:49:30 +08:00
|
|
|
int flags = 0;
|
2017-11-20 08:24:41 +08:00
|
|
|
unsigned int total_len;
|
2020-06-01 01:38:22 +08:00
|
|
|
struct TCP_Server_Info *server;
|
2016-10-26 02:38:47 +08:00
|
|
|
|
2012-09-19 07:20:30 +08:00
|
|
|
*nbytes = 0;
|
|
|
|
|
|
|
|
if (n_vec < 1)
|
|
|
|
return rc;
|
|
|
|
|
2020-06-01 01:38:22 +08:00
|
|
|
if (!io_parms->server)
|
|
|
|
io_parms->server = cifs_pick_channel(io_parms->tcon->ses);
|
|
|
|
server = io_parms->server;
|
|
|
|
if (server == NULL)
|
|
|
|
return -ECONNABORTED;
|
|
|
|
|
|
|
|
rc = smb2_plain_req_init(SMB2_WRITE, io_parms->tcon, server,
|
|
|
|
(void **) &req, &total_len);
|
2012-09-19 07:20:30 +08:00
|
|
|
if (rc)
|
|
|
|
return rc;
|
|
|
|
|
2018-05-10 06:43:08 +08:00
|
|
|
if (smb3_encryption_required(io_parms->tcon))
|
2016-11-01 04:49:30 +08:00
|
|
|
flags |= CIFS_TRANSFORM_REQ;
|
|
|
|
|
2021-11-05 07:39:01 +08:00
|
|
|
req->hdr.Id.SyncId.ProcessId = cpu_to_le32(io_parms->pid);
|
2012-09-19 07:20:30 +08:00
|
|
|
|
2022-03-22 00:08:25 +08:00
|
|
|
req->PersistentFileId = io_parms->persistent_fid;
|
|
|
|
req->VolatileFileId = io_parms->volatile_fid;
|
2012-09-19 07:20:30 +08:00
|
|
|
req->WriteChannelInfoOffset = 0;
|
|
|
|
req->WriteChannelInfoLength = 0;
|
|
|
|
req->Channel = 0;
|
|
|
|
req->Length = cpu_to_le32(io_parms->length);
|
|
|
|
req->Offset = cpu_to_le64(io_parms->offset);
|
|
|
|
req->DataOffset = cpu_to_le16(
|
2017-11-20 08:24:41 +08:00
|
|
|
offsetof(struct smb2_write_req, Buffer));
|
2012-09-19 07:20:30 +08:00
|
|
|
req->RemainingBytes = 0;
|
|
|
|
|
2019-02-25 14:52:43 +08:00
|
|
|
trace_smb3_write_enter(xid, io_parms->persistent_fid,
|
|
|
|
io_parms->tcon->tid, io_parms->tcon->ses->Suid,
|
|
|
|
io_parms->offset, io_parms->length);
|
|
|
|
|
2012-09-19 07:20:30 +08:00
|
|
|
iov[0].iov_base = (char *)req;
|
2017-11-20 08:24:41 +08:00
|
|
|
/* 1 for Buffer */
|
|
|
|
iov[0].iov_len = total_len - 1;
|
2012-09-19 07:20:30 +08:00
|
|
|
|
2018-06-12 06:00:59 +08:00
|
|
|
memset(&rqst, 0, sizeof(struct smb_rqst));
|
|
|
|
rqst.rq_iov = iov;
|
|
|
|
rqst.rq_nvec = n_vec + 1;
|
|
|
|
|
2020-06-01 01:38:22 +08:00
|
|
|
rc = cifs_send_recv(xid, io_parms->tcon->ses, server,
|
|
|
|
&rqst,
|
2017-11-20 08:24:41 +08:00
|
|
|
&resp_buftype, flags, &rsp_iov);
|
2016-10-26 02:38:47 +08:00
|
|
|
rsp = (struct smb2_write_rsp *)rsp_iov.iov_base;
|
2012-09-19 07:20:30 +08:00
|
|
|
|
|
|
|
if (rc) {
|
2021-09-08 10:10:14 +08:00
|
|
|
trace_smb3_write_err(xid,
|
2022-03-22 00:08:25 +08:00
|
|
|
req->PersistentFileId,
|
2018-05-18 10:16:55 +08:00
|
|
|
io_parms->tcon->tid,
|
|
|
|
io_parms->tcon->ses->Suid,
|
|
|
|
io_parms->offset, io_parms->length, rc);
|
2012-09-19 07:20:30 +08:00
|
|
|
cifs_stats_fail_inc(io_parms->tcon, SMB2_WRITE_HE);
|
2013-05-05 11:12:25 +08:00
|
|
|
cifs_dbg(VFS, "Send error in write = %d\n", rc);
|
2018-05-18 10:16:55 +08:00
|
|
|
} else {
|
2012-09-19 07:20:30 +08:00
|
|
|
*nbytes = le32_to_cpu(rsp->DataLength);
|
2021-09-08 10:10:14 +08:00
|
|
|
trace_smb3_write_done(xid,
|
2022-03-22 00:08:25 +08:00
|
|
|
req->PersistentFileId,
|
2021-09-08 10:10:14 +08:00
|
|
|
io_parms->tcon->tid,
|
|
|
|
io_parms->tcon->ses->Suid,
|
|
|
|
io_parms->offset, *nbytes);
|
2018-05-18 10:16:55 +08:00
|
|
|
}
|
2012-09-19 20:03:26 +08:00
|
|
|
|
2019-04-06 15:47:38 +08:00
|
|
|
cifs_small_buf_release(req);
|
2012-09-19 20:03:26 +08:00
|
|
|
free_rsp_buf(resp_buftype, rsp);
|
2012-09-19 07:20:30 +08:00
|
|
|
return rc;
|
|
|
|
}
|
2012-09-19 07:20:31 +08:00
|
|
|
|
2020-03-03 00:53:22 +08:00
|
|
|
int posix_info_sid_size(const void *beg, const void *end)
|
2020-02-08 22:50:57 +08:00
|
|
|
{
|
|
|
|
size_t subauth;
|
|
|
|
int total;
|
|
|
|
|
|
|
|
if (beg + 1 > end)
|
|
|
|
return -1;
|
|
|
|
|
|
|
|
subauth = *(u8 *)(beg+1);
|
|
|
|
if (subauth < 1 || subauth > 15)
|
|
|
|
return -1;
|
|
|
|
|
|
|
|
total = 1 + 1 + 6 + 4*subauth;
|
|
|
|
if (beg + total > end)
|
|
|
|
return -1;
|
|
|
|
|
|
|
|
return total;
|
|
|
|
}
|
|
|
|
|
|
|
|
int posix_info_parse(const void *beg, const void *end,
|
|
|
|
struct smb2_posix_info_parsed *out)
|
|
|
|
|
|
|
|
{
|
|
|
|
int total_len = 0;
|
2021-06-18 08:58:30 +08:00
|
|
|
int owner_len, group_len;
|
2020-02-08 22:50:57 +08:00
|
|
|
int name_len;
|
|
|
|
const void *owner_sid;
|
|
|
|
const void *group_sid;
|
|
|
|
const void *name;
|
|
|
|
|
|
|
|
/* if no end bound given, assume payload to be correct */
|
|
|
|
if (!end) {
|
|
|
|
const struct smb2_posix_info *p = beg;
|
|
|
|
|
|
|
|
end = beg + le32_to_cpu(p->NextEntryOffset);
|
|
|
|
/* last element will have a 0 offset, pick a sensible bound */
|
|
|
|
if (end == beg)
|
|
|
|
end += 0xFFFF;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* check base buf */
|
|
|
|
if (beg + sizeof(struct smb2_posix_info) > end)
|
|
|
|
return -1;
|
|
|
|
total_len = sizeof(struct smb2_posix_info);
|
|
|
|
|
|
|
|
/* check owner sid */
|
|
|
|
owner_sid = beg + total_len;
|
2021-06-18 08:58:30 +08:00
|
|
|
owner_len = posix_info_sid_size(owner_sid, end);
|
|
|
|
if (owner_len < 0)
|
2020-02-08 22:50:57 +08:00
|
|
|
return -1;
|
2021-06-18 08:58:30 +08:00
|
|
|
total_len += owner_len;
|
2020-02-08 22:50:57 +08:00
|
|
|
|
|
|
|
/* check group sid */
|
|
|
|
group_sid = beg + total_len;
|
2021-06-18 08:58:30 +08:00
|
|
|
group_len = posix_info_sid_size(group_sid, end);
|
|
|
|
if (group_len < 0)
|
2020-02-08 22:50:57 +08:00
|
|
|
return -1;
|
2021-06-18 08:58:30 +08:00
|
|
|
total_len += group_len;
|
2020-02-08 22:50:57 +08:00
|
|
|
|
|
|
|
/* check name len */
|
|
|
|
if (beg + total_len + 4 > end)
|
|
|
|
return -1;
|
|
|
|
name_len = le32_to_cpu(*(__le32 *)(beg + total_len));
|
|
|
|
if (name_len < 1 || name_len > 0xFFFF)
|
|
|
|
return -1;
|
|
|
|
total_len += 4;
|
|
|
|
|
|
|
|
/* check name */
|
|
|
|
name = beg + total_len;
|
|
|
|
if (name + name_len > end)
|
|
|
|
return -1;
|
|
|
|
total_len += name_len;
|
|
|
|
|
|
|
|
if (out) {
|
|
|
|
out->base = beg;
|
|
|
|
out->size = total_len;
|
|
|
|
out->name_len = name_len;
|
|
|
|
out->name = name;
|
2021-06-18 08:58:30 +08:00
|
|
|
memcpy(&out->owner, owner_sid, owner_len);
|
|
|
|
memcpy(&out->group, group_sid, group_len);
|
2020-02-08 22:50:57 +08:00
|
|
|
}
|
|
|
|
return total_len;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int posix_info_extra_size(const void *beg, const void *end)
|
|
|
|
{
|
|
|
|
int len = posix_info_parse(beg, end, NULL);
|
|
|
|
|
|
|
|
if (len < 0)
|
|
|
|
return -1;
|
|
|
|
return len - sizeof(struct smb2_posix_info);
|
|
|
|
}
|
|
|
|
|
2012-09-19 07:20:33 +08:00
|
|
|
static unsigned int
|
2020-02-08 22:50:58 +08:00
|
|
|
num_entries(int infotype, char *bufstart, char *end_of_buf, char **lastentry,
|
|
|
|
size_t size)
|
2012-09-19 07:20:33 +08:00
|
|
|
{
|
|
|
|
int len;
|
|
|
|
unsigned int entrycount = 0;
|
|
|
|
unsigned int next_offset = 0;
|
2018-09-06 17:48:22 +08:00
|
|
|
char *entryptr;
|
|
|
|
FILE_DIRECTORY_INFO *dir_info;
|
2012-09-19 07:20:33 +08:00
|
|
|
|
|
|
|
if (bufstart == NULL)
|
|
|
|
return 0;
|
|
|
|
|
2018-09-06 17:48:22 +08:00
|
|
|
entryptr = bufstart;
|
2012-09-19 07:20:33 +08:00
|
|
|
|
|
|
|
while (1) {
|
2018-09-06 17:48:22 +08:00
|
|
|
if (entryptr + next_offset < entryptr ||
|
|
|
|
entryptr + next_offset > end_of_buf ||
|
|
|
|
entryptr + next_offset + size > end_of_buf) {
|
2013-05-05 11:12:25 +08:00
|
|
|
cifs_dbg(VFS, "malformed search entry would overflow\n");
|
2012-09-19 07:20:33 +08:00
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
2018-09-06 17:48:22 +08:00
|
|
|
entryptr = entryptr + next_offset;
|
|
|
|
dir_info = (FILE_DIRECTORY_INFO *)entryptr;
|
|
|
|
|
2020-02-08 22:50:58 +08:00
|
|
|
if (infotype == SMB_FIND_FILE_POSIX_INFO)
|
|
|
|
len = posix_info_extra_size(entryptr, end_of_buf);
|
|
|
|
else
|
|
|
|
len = le32_to_cpu(dir_info->FileNameLength);
|
|
|
|
|
|
|
|
if (len < 0 ||
|
|
|
|
entryptr + len < entryptr ||
|
2018-09-06 17:48:22 +08:00
|
|
|
entryptr + len > end_of_buf ||
|
|
|
|
entryptr + len + size > end_of_buf) {
|
2013-05-05 11:12:25 +08:00
|
|
|
cifs_dbg(VFS, "directory entry name would overflow frame end of buf %p\n",
|
|
|
|
end_of_buf);
|
2012-09-19 07:20:33 +08:00
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
2018-09-06 17:48:22 +08:00
|
|
|
*lastentry = entryptr;
|
2012-09-19 07:20:33 +08:00
|
|
|
entrycount++;
|
|
|
|
|
2018-09-06 17:48:22 +08:00
|
|
|
next_offset = le32_to_cpu(dir_info->NextEntryOffset);
|
2012-09-19 07:20:33 +08:00
|
|
|
if (!next_offset)
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
|
|
|
return entrycount;
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Readdir/FindFirst
|
|
|
|
*/
|
2020-01-08 11:08:04 +08:00
|
|
|
int SMB2_query_directory_init(const unsigned int xid,
|
2020-06-01 01:38:22 +08:00
|
|
|
struct cifs_tcon *tcon,
|
|
|
|
struct TCP_Server_Info *server,
|
|
|
|
struct smb_rqst *rqst,
|
2020-01-08 11:08:04 +08:00
|
|
|
u64 persistent_fid, u64 volatile_fid,
|
|
|
|
int index, int info_level)
|
2012-09-19 07:20:33 +08:00
|
|
|
{
|
|
|
|
struct smb2_query_directory_req *req;
|
|
|
|
unsigned char *bufptr;
|
|
|
|
__le16 asteriks = cpu_to_le16('*');
|
2020-01-08 11:08:04 +08:00
|
|
|
unsigned int output_size = CIFSMaxBufSize -
|
|
|
|
MAX_SMB2_CREATE_RESPONSE_SIZE -
|
|
|
|
MAX_SMB2_CLOSE_RESPONSE_SIZE;
|
2017-11-20 08:24:45 +08:00
|
|
|
unsigned int total_len;
|
2020-01-08 11:08:04 +08:00
|
|
|
struct kvec *iov = rqst->rq_iov;
|
|
|
|
int len, rc;
|
2012-09-19 07:20:33 +08:00
|
|
|
|
2020-06-01 01:38:22 +08:00
|
|
|
rc = smb2_plain_req_init(SMB2_QUERY_DIRECTORY, tcon, server,
|
|
|
|
(void **) &req, &total_len);
|
2012-09-19 07:20:33 +08:00
|
|
|
if (rc)
|
|
|
|
return rc;
|
|
|
|
|
2020-01-08 11:08:04 +08:00
|
|
|
switch (info_level) {
|
2012-09-19 07:20:33 +08:00
|
|
|
case SMB_FIND_FILE_DIRECTORY_INFO:
|
|
|
|
req->FileInformationClass = FILE_DIRECTORY_INFORMATION;
|
|
|
|
break;
|
|
|
|
case SMB_FIND_FILE_ID_FULL_DIR_INFO:
|
|
|
|
req->FileInformationClass = FILEID_FULL_DIRECTORY_INFORMATION;
|
|
|
|
break;
|
2020-02-08 22:50:58 +08:00
|
|
|
case SMB_FIND_FILE_POSIX_INFO:
|
|
|
|
req->FileInformationClass = SMB_FIND_FILE_POSIX_INFO;
|
|
|
|
break;
|
2012-09-19 07:20:33 +08:00
|
|
|
default:
|
2019-09-04 10:32:41 +08:00
|
|
|
cifs_tcon_dbg(VFS, "info level %u isn't supported\n",
|
2020-01-08 11:08:04 +08:00
|
|
|
info_level);
|
|
|
|
return -EINVAL;
|
2012-09-19 07:20:33 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
req->FileIndex = cpu_to_le32(index);
|
|
|
|
req->PersistentFileId = persistent_fid;
|
|
|
|
req->VolatileFileId = volatile_fid;
|
|
|
|
|
|
|
|
len = 0x2;
|
|
|
|
bufptr = req->Buffer;
|
|
|
|
memcpy(bufptr, &asteriks, len);
|
|
|
|
|
|
|
|
req->FileNameOffset =
|
2017-11-20 08:24:45 +08:00
|
|
|
cpu_to_le16(sizeof(struct smb2_query_directory_req) - 1);
|
2012-09-19 07:20:33 +08:00
|
|
|
req->FileNameLength = cpu_to_le16(len);
|
|
|
|
/*
|
|
|
|
* BB could be 30 bytes or so longer if we used SMB2 specific
|
|
|
|
* buffer lengths, but this is safe and close enough.
|
|
|
|
*/
|
|
|
|
output_size = min_t(unsigned int, output_size, server->maxBuf);
|
|
|
|
output_size = min_t(unsigned int, output_size, 2 << 15);
|
|
|
|
req->OutputBufferLength = cpu_to_le32(output_size);
|
|
|
|
|
|
|
|
iov[0].iov_base = (char *)req;
|
2017-11-20 08:24:45 +08:00
|
|
|
/* 1 for Buffer */
|
|
|
|
iov[0].iov_len = total_len - 1;
|
2012-09-19 07:20:33 +08:00
|
|
|
|
|
|
|
iov[1].iov_base = (char *)(req->Buffer);
|
|
|
|
iov[1].iov_len = len;
|
|
|
|
|
2020-01-08 11:08:04 +08:00
|
|
|
trace_smb3_query_dir_enter(xid, persistent_fid, tcon->tid,
|
|
|
|
tcon->ses->Suid, index, output_size);
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
void SMB2_query_directory_free(struct smb_rqst *rqst)
|
|
|
|
{
|
|
|
|
if (rqst && rqst->rq_iov) {
|
|
|
|
cifs_small_buf_release(rqst->rq_iov[0].iov_base); /* request */
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-01-08 11:08:05 +08:00
|
|
|
int
|
|
|
|
smb2_parse_query_directory(struct cifs_tcon *tcon,
|
|
|
|
struct kvec *rsp_iov,
|
|
|
|
int resp_buftype,
|
|
|
|
struct cifs_search_info *srch_inf)
|
|
|
|
{
|
|
|
|
struct smb2_query_directory_rsp *rsp;
|
|
|
|
size_t info_buf_size;
|
|
|
|
char *end_of_smb;
|
|
|
|
int rc;
|
|
|
|
|
|
|
|
rsp = (struct smb2_query_directory_rsp *)rsp_iov->iov_base;
|
|
|
|
|
|
|
|
switch (srch_inf->info_level) {
|
|
|
|
case SMB_FIND_FILE_DIRECTORY_INFO:
|
|
|
|
info_buf_size = sizeof(FILE_DIRECTORY_INFO) - 1;
|
|
|
|
break;
|
|
|
|
case SMB_FIND_FILE_ID_FULL_DIR_INFO:
|
|
|
|
info_buf_size = sizeof(SEARCH_ID_FULL_DIR_INFO) - 1;
|
|
|
|
break;
|
2020-02-08 22:50:58 +08:00
|
|
|
case SMB_FIND_FILE_POSIX_INFO:
|
|
|
|
/* note that posix payload are variable size */
|
|
|
|
info_buf_size = sizeof(struct smb2_posix_info);
|
|
|
|
break;
|
2020-01-08 11:08:05 +08:00
|
|
|
default:
|
|
|
|
cifs_tcon_dbg(VFS, "info level %u isn't supported\n",
|
|
|
|
srch_inf->info_level);
|
|
|
|
return -EINVAL;
|
|
|
|
}
|
|
|
|
|
|
|
|
rc = smb2_validate_iov(le16_to_cpu(rsp->OutputBufferOffset),
|
|
|
|
le32_to_cpu(rsp->OutputBufferLength), rsp_iov,
|
|
|
|
info_buf_size);
|
2020-02-08 22:50:58 +08:00
|
|
|
if (rc) {
|
|
|
|
cifs_tcon_dbg(VFS, "bad info payload");
|
2020-01-08 11:08:05 +08:00
|
|
|
return rc;
|
2020-02-08 22:50:58 +08:00
|
|
|
}
|
2020-01-08 11:08:05 +08:00
|
|
|
|
|
|
|
srch_inf->unicode = true;
|
|
|
|
|
|
|
|
if (srch_inf->ntwrk_buf_start) {
|
|
|
|
if (srch_inf->smallBuf)
|
|
|
|
cifs_small_buf_release(srch_inf->ntwrk_buf_start);
|
|
|
|
else
|
|
|
|
cifs_buf_release(srch_inf->ntwrk_buf_start);
|
|
|
|
}
|
|
|
|
srch_inf->ntwrk_buf_start = (char *)rsp;
|
|
|
|
srch_inf->srch_entries_start = srch_inf->last_entry =
|
|
|
|
(char *)rsp + le16_to_cpu(rsp->OutputBufferOffset);
|
|
|
|
end_of_smb = rsp_iov->iov_len + (char *)rsp;
|
2020-02-08 22:50:58 +08:00
|
|
|
|
|
|
|
srch_inf->entries_in_buffer = num_entries(
|
|
|
|
srch_inf->info_level,
|
|
|
|
srch_inf->srch_entries_start,
|
|
|
|
end_of_smb,
|
|
|
|
&srch_inf->last_entry,
|
|
|
|
info_buf_size);
|
|
|
|
|
2020-01-08 11:08:05 +08:00
|
|
|
srch_inf->index_of_last_entry += srch_inf->entries_in_buffer;
|
|
|
|
cifs_dbg(FYI, "num entries %d last_index %lld srch start %p srch end %p\n",
|
|
|
|
srch_inf->entries_in_buffer, srch_inf->index_of_last_entry,
|
|
|
|
srch_inf->srch_entries_start, srch_inf->last_entry);
|
|
|
|
if (resp_buftype == CIFS_LARGE_BUFFER)
|
|
|
|
srch_inf->smallBuf = false;
|
|
|
|
else if (resp_buftype == CIFS_SMALL_BUFFER)
|
|
|
|
srch_inf->smallBuf = true;
|
|
|
|
else
|
2020-04-15 13:42:53 +08:00
|
|
|
cifs_tcon_dbg(VFS, "Invalid search buffer type\n");
|
2020-01-08 11:08:05 +08:00
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2020-01-08 11:08:04 +08:00
|
|
|
int
|
|
|
|
SMB2_query_directory(const unsigned int xid, struct cifs_tcon *tcon,
|
|
|
|
u64 persistent_fid, u64 volatile_fid, int index,
|
|
|
|
struct cifs_search_info *srch_inf)
|
|
|
|
{
|
|
|
|
struct smb_rqst rqst;
|
|
|
|
struct kvec iov[SMB2_QUERY_DIRECTORY_IOV_SIZE];
|
|
|
|
struct smb2_query_directory_rsp *rsp = NULL;
|
|
|
|
int resp_buftype = CIFS_NO_BUFFER;
|
|
|
|
struct kvec rsp_iov;
|
|
|
|
int rc = 0;
|
|
|
|
struct cifs_ses *ses = tcon->ses;
|
2020-06-01 01:38:22 +08:00
|
|
|
struct TCP_Server_Info *server = cifs_pick_channel(ses);
|
2020-01-08 11:08:04 +08:00
|
|
|
int flags = 0;
|
|
|
|
|
2020-01-17 10:57:17 +08:00
|
|
|
if (!ses || !(ses->server))
|
2020-01-08 11:08:04 +08:00
|
|
|
return -EIO;
|
|
|
|
|
|
|
|
if (smb3_encryption_required(tcon))
|
|
|
|
flags |= CIFS_TRANSFORM_REQ;
|
|
|
|
|
2018-06-12 06:00:59 +08:00
|
|
|
memset(&rqst, 0, sizeof(struct smb_rqst));
|
2020-01-08 11:08:04 +08:00
|
|
|
memset(&iov, 0, sizeof(iov));
|
2018-06-12 06:00:59 +08:00
|
|
|
rqst.rq_iov = iov;
|
2020-01-08 11:08:04 +08:00
|
|
|
rqst.rq_nvec = SMB2_QUERY_DIRECTORY_IOV_SIZE;
|
2018-06-12 06:00:59 +08:00
|
|
|
|
2020-06-01 01:38:22 +08:00
|
|
|
rc = SMB2_query_directory_init(xid, tcon, server,
|
|
|
|
&rqst, persistent_fid,
|
2020-01-08 11:08:04 +08:00
|
|
|
volatile_fid, index,
|
|
|
|
srch_inf->info_level);
|
|
|
|
if (rc)
|
|
|
|
goto qdir_exit;
|
2019-02-25 14:52:43 +08:00
|
|
|
|
2020-06-01 01:38:22 +08:00
|
|
|
rc = cifs_send_recv(xid, ses, server,
|
|
|
|
&rqst, &resp_buftype, flags, &rsp_iov);
|
2016-10-26 02:38:47 +08:00
|
|
|
rsp = (struct smb2_query_directory_rsp *)rsp_iov.iov_base;
|
2012-09-19 20:03:26 +08:00
|
|
|
|
2012-09-19 07:20:33 +08:00
|
|
|
if (rc) {
|
2016-10-25 06:33:04 +08:00
|
|
|
if (rc == -ENODATA &&
|
2021-11-05 07:39:01 +08:00
|
|
|
rsp->hdr.Status == STATUS_NO_MORE_FILES) {
|
2019-02-26 03:51:11 +08:00
|
|
|
trace_smb3_query_dir_done(xid, persistent_fid,
|
|
|
|
tcon->tid, tcon->ses->Suid, index, 0);
|
2014-08-19 00:49:57 +08:00
|
|
|
srch_inf->endOfSearch = true;
|
|
|
|
rc = 0;
|
2019-02-26 03:51:11 +08:00
|
|
|
} else {
|
|
|
|
trace_smb3_query_dir_err(xid, persistent_fid, tcon->tid,
|
|
|
|
tcon->ses->Suid, index, 0, rc);
|
2019-01-27 04:21:32 +08:00
|
|
|
cifs_stats_fail_inc(tcon, SMB2_QUERY_DIRECTORY_HE);
|
2019-02-26 03:51:11 +08:00
|
|
|
}
|
2012-09-19 07:20:33 +08:00
|
|
|
goto qdir_exit;
|
|
|
|
}
|
|
|
|
|
2020-01-08 11:08:05 +08:00
|
|
|
rc = smb2_parse_query_directory(tcon, &rsp_iov, resp_buftype,
|
|
|
|
srch_inf);
|
2019-02-26 03:51:11 +08:00
|
|
|
if (rc) {
|
|
|
|
trace_smb3_query_dir_err(xid, persistent_fid, tcon->tid,
|
|
|
|
tcon->ses->Suid, index, 0, rc);
|
2012-09-19 07:20:33 +08:00
|
|
|
goto qdir_exit;
|
2019-02-26 03:51:11 +08:00
|
|
|
}
|
2020-01-08 11:08:04 +08:00
|
|
|
resp_buftype = CIFS_NO_BUFFER;
|
|
|
|
|
2019-02-26 03:51:11 +08:00
|
|
|
trace_smb3_query_dir_done(xid, persistent_fid, tcon->tid,
|
|
|
|
tcon->ses->Suid, index, srch_inf->entries_in_buffer);
|
2012-09-19 07:20:33 +08:00
|
|
|
|
|
|
|
qdir_exit:
|
2020-01-08 11:08:04 +08:00
|
|
|
SMB2_query_directory_free(&rqst);
|
2012-09-19 07:20:33 +08:00
|
|
|
free_rsp_buf(resp_buftype, rsp);
|
|
|
|
return rc;
|
|
|
|
}
|
|
|
|
|
2018-09-03 11:33:44 +08:00
|
|
|
int
|
2020-06-01 01:38:22 +08:00
|
|
|
SMB2_set_info_init(struct cifs_tcon *tcon, struct TCP_Server_Info *server,
|
|
|
|
struct smb_rqst *rqst,
|
|
|
|
u64 persistent_fid, u64 volatile_fid, u32 pid,
|
|
|
|
u8 info_class, u8 info_type, u32 additional_info,
|
|
|
|
void **data, unsigned int *size)
|
2012-09-19 07:20:31 +08:00
|
|
|
{
|
|
|
|
struct smb2_set_info_req *req;
|
2018-09-03 11:33:44 +08:00
|
|
|
struct kvec *iov = rqst->rq_iov;
|
|
|
|
unsigned int i, total_len;
|
|
|
|
int rc;
|
2012-09-19 07:20:31 +08:00
|
|
|
|
2020-06-01 01:38:22 +08:00
|
|
|
rc = smb2_plain_req_init(SMB2_SET_INFO, tcon, server,
|
|
|
|
(void **) &req, &total_len);
|
2018-09-03 11:33:44 +08:00
|
|
|
if (rc)
|
2012-09-19 07:20:31 +08:00
|
|
|
return rc;
|
2016-11-01 04:49:30 +08:00
|
|
|
|
2021-11-05 07:39:01 +08:00
|
|
|
req->hdr.Id.SyncId.ProcessId = cpu_to_le32(pid);
|
2017-06-29 11:37:00 +08:00
|
|
|
req->InfoType = info_type;
|
2012-09-19 07:20:31 +08:00
|
|
|
req->FileInfoClass = info_class;
|
|
|
|
req->PersistentFileId = persistent_fid;
|
|
|
|
req->VolatileFileId = volatile_fid;
|
2017-06-29 11:37:00 +08:00
|
|
|
req->AdditionalInformation = cpu_to_le32(additional_info);
|
2012-09-19 07:20:31 +08:00
|
|
|
|
|
|
|
req->BufferOffset =
|
2017-11-20 08:24:44 +08:00
|
|
|
cpu_to_le16(sizeof(struct smb2_set_info_req) - 1);
|
2012-09-19 07:20:31 +08:00
|
|
|
req->BufferLength = cpu_to_le32(*size);
|
|
|
|
|
|
|
|
memcpy(req->Buffer, *data, *size);
|
2017-11-20 08:24:44 +08:00
|
|
|
total_len += *size;
|
2012-09-19 07:20:31 +08:00
|
|
|
|
|
|
|
iov[0].iov_base = (char *)req;
|
2017-11-20 08:24:44 +08:00
|
|
|
/* 1 for Buffer */
|
|
|
|
iov[0].iov_len = total_len - 1;
|
2012-09-19 07:20:31 +08:00
|
|
|
|
2018-09-03 11:33:44 +08:00
|
|
|
for (i = 1; i < rqst->rq_nvec; i++) {
|
2012-09-19 07:20:31 +08:00
|
|
|
le32_add_cpu(&req->BufferLength, size[i]);
|
|
|
|
iov[i].iov_base = (char *)data[i];
|
|
|
|
iov[i].iov_len = size[i];
|
|
|
|
}
|
|
|
|
|
2018-09-03 11:33:44 +08:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
void
|
|
|
|
SMB2_set_info_free(struct smb_rqst *rqst)
|
|
|
|
{
|
2018-10-24 09:50:33 +08:00
|
|
|
if (rqst && rqst->rq_iov)
|
|
|
|
cifs_buf_release(rqst->rq_iov[0].iov_base); /* request */
|
2018-09-03 11:33:44 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
static int
|
|
|
|
send_set_info(const unsigned int xid, struct cifs_tcon *tcon,
|
|
|
|
u64 persistent_fid, u64 volatile_fid, u32 pid, u8 info_class,
|
|
|
|
u8 info_type, u32 additional_info, unsigned int num,
|
|
|
|
void **data, unsigned int *size)
|
|
|
|
{
|
|
|
|
struct smb_rqst rqst;
|
|
|
|
struct smb2_set_info_rsp *rsp = NULL;
|
|
|
|
struct kvec *iov;
|
|
|
|
struct kvec rsp_iov;
|
|
|
|
int rc = 0;
|
|
|
|
int resp_buftype;
|
|
|
|
struct cifs_ses *ses = tcon->ses;
|
2020-06-01 01:38:22 +08:00
|
|
|
struct TCP_Server_Info *server = cifs_pick_channel(ses);
|
2018-09-03 11:33:44 +08:00
|
|
|
int flags = 0;
|
|
|
|
|
2020-06-01 01:38:22 +08:00
|
|
|
if (!ses || !server)
|
2018-09-03 11:33:44 +08:00
|
|
|
return -EIO;
|
|
|
|
|
|
|
|
if (!num)
|
|
|
|
return -EINVAL;
|
|
|
|
|
|
|
|
if (smb3_encryption_required(tcon))
|
|
|
|
flags |= CIFS_TRANSFORM_REQ;
|
|
|
|
|
|
|
|
iov = kmalloc_array(num, sizeof(struct kvec), GFP_KERNEL);
|
|
|
|
if (!iov)
|
|
|
|
return -ENOMEM;
|
|
|
|
|
2018-06-12 06:00:59 +08:00
|
|
|
memset(&rqst, 0, sizeof(struct smb_rqst));
|
|
|
|
rqst.rq_iov = iov;
|
|
|
|
rqst.rq_nvec = num;
|
|
|
|
|
2020-06-01 01:38:22 +08:00
|
|
|
rc = SMB2_set_info_init(tcon, server,
|
|
|
|
&rqst, persistent_fid, volatile_fid, pid,
|
2018-09-03 11:33:44 +08:00
|
|
|
info_class, info_type, additional_info,
|
|
|
|
data, size);
|
|
|
|
if (rc) {
|
|
|
|
kfree(iov);
|
|
|
|
return rc;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2020-06-01 01:38:22 +08:00
|
|
|
rc = cifs_send_recv(xid, ses, server,
|
|
|
|
&rqst, &resp_buftype, flags,
|
2017-11-20 08:24:44 +08:00
|
|
|
&rsp_iov);
|
2018-09-03 11:33:44 +08:00
|
|
|
SMB2_set_info_free(&rqst);
|
2016-10-26 02:38:47 +08:00
|
|
|
rsp = (struct smb2_set_info_rsp *)rsp_iov.iov_base;
|
2012-09-19 07:20:31 +08:00
|
|
|
|
2018-05-18 10:16:55 +08:00
|
|
|
if (rc != 0) {
|
2012-09-19 07:20:31 +08:00
|
|
|
cifs_stats_fail_inc(tcon, SMB2_SET_INFO_HE);
|
2018-05-18 10:16:55 +08:00
|
|
|
trace_smb3_set_info_err(xid, persistent_fid, tcon->tid,
|
|
|
|
ses->Suid, info_class, (__u32)info_type, rc);
|
|
|
|
}
|
2013-11-18 23:56:28 +08:00
|
|
|
|
2012-09-19 07:20:31 +08:00
|
|
|
free_rsp_buf(resp_buftype, rsp);
|
|
|
|
kfree(iov);
|
|
|
|
return rc;
|
|
|
|
}
|
|
|
|
|
2012-09-19 07:20:32 +08:00
|
|
|
int
|
|
|
|
SMB2_set_eof(const unsigned int xid, struct cifs_tcon *tcon, u64 persistent_fid,
|
2018-09-03 11:33:47 +08:00
|
|
|
u64 volatile_fid, u32 pid, __le64 *eof)
|
2012-09-19 07:20:32 +08:00
|
|
|
{
|
|
|
|
struct smb2_file_eof_info info;
|
|
|
|
void *data;
|
|
|
|
unsigned int size;
|
|
|
|
|
|
|
|
info.EndOfFile = *eof;
|
|
|
|
|
|
|
|
data = &info;
|
|
|
|
size = sizeof(struct smb2_file_eof_info);
|
|
|
|
|
2018-09-03 11:33:47 +08:00
|
|
|
return send_set_info(xid, tcon, persistent_fid, volatile_fid,
|
2017-06-29 11:37:00 +08:00
|
|
|
pid, FILE_END_OF_FILE_INFORMATION, SMB2_O_INFO_FILE,
|
|
|
|
0, 1, &data, &size);
|
2012-09-19 07:20:32 +08:00
|
|
|
}
|
2012-09-19 07:20:32 +08:00
|
|
|
|
2017-06-29 11:37:00 +08:00
|
|
|
int
|
|
|
|
SMB2_set_acl(const unsigned int xid, struct cifs_tcon *tcon,
|
|
|
|
u64 persistent_fid, u64 volatile_fid,
|
|
|
|
struct cifs_ntsd *pnntsd, int pacllen, int aclflag)
|
|
|
|
{
|
|
|
|
return send_set_info(xid, tcon, persistent_fid, volatile_fid,
|
|
|
|
current->tgid, 0, SMB2_O_INFO_SECURITY, aclflag,
|
|
|
|
1, (void **)&pnntsd, &pacllen);
|
2012-09-19 07:20:32 +08:00
|
|
|
}
|
2012-09-19 07:20:33 +08:00
|
|
|
|
2017-08-24 09:24:56 +08:00
|
|
|
int
|
|
|
|
SMB2_set_ea(const unsigned int xid, struct cifs_tcon *tcon,
|
|
|
|
u64 persistent_fid, u64 volatile_fid,
|
|
|
|
struct smb2_file_full_ea_info *buf, int len)
|
|
|
|
{
|
|
|
|
return send_set_info(xid, tcon, persistent_fid, volatile_fid,
|
|
|
|
current->tgid, FILE_FULL_EA_INFORMATION, SMB2_O_INFO_FILE,
|
|
|
|
0, 1, (void **)&buf, &len);
|
|
|
|
}
|
|
|
|
|
2012-09-19 07:20:33 +08:00
|
|
|
int
|
|
|
|
SMB2_oplock_break(const unsigned int xid, struct cifs_tcon *tcon,
|
|
|
|
const u64 persistent_fid, const u64 volatile_fid,
|
|
|
|
__u8 oplock_level)
|
|
|
|
{
|
2018-06-12 06:00:59 +08:00
|
|
|
struct smb_rqst rqst;
|
2012-09-19 07:20:33 +08:00
|
|
|
int rc;
|
2018-06-01 08:53:03 +08:00
|
|
|
struct smb2_oplock_break *req = NULL;
|
2017-11-20 08:24:43 +08:00
|
|
|
struct cifs_ses *ses = tcon->ses;
|
2020-06-01 01:38:22 +08:00
|
|
|
struct TCP_Server_Info *server = cifs_pick_channel(ses);
|
2016-11-01 04:49:30 +08:00
|
|
|
int flags = CIFS_OBREAK_OP;
|
2017-11-20 08:24:43 +08:00
|
|
|
unsigned int total_len;
|
|
|
|
struct kvec iov[1];
|
|
|
|
struct kvec rsp_iov;
|
|
|
|
int resp_buf_type;
|
2012-09-19 07:20:33 +08:00
|
|
|
|
2013-05-05 11:12:25 +08:00
|
|
|
cifs_dbg(FYI, "SMB2_oplock_break\n");
|
2020-06-01 01:38:22 +08:00
|
|
|
rc = smb2_plain_req_init(SMB2_OPLOCK_BREAK, tcon, server,
|
|
|
|
(void **) &req, &total_len);
|
2012-09-19 07:20:33 +08:00
|
|
|
if (rc)
|
|
|
|
return rc;
|
|
|
|
|
2018-05-10 06:43:08 +08:00
|
|
|
if (smb3_encryption_required(tcon))
|
2016-11-01 04:49:30 +08:00
|
|
|
flags |= CIFS_TRANSFORM_REQ;
|
|
|
|
|
2012-09-19 07:20:33 +08:00
|
|
|
req->VolatileFid = volatile_fid;
|
|
|
|
req->PersistentFid = persistent_fid;
|
|
|
|
req->OplockLevel = oplock_level;
|
2021-11-05 07:39:01 +08:00
|
|
|
req->hdr.CreditRequest = cpu_to_le16(1);
|
2012-09-19 07:20:33 +08:00
|
|
|
|
2019-05-06 08:00:02 +08:00
|
|
|
flags |= CIFS_NO_RSP_BUF;
|
2017-11-20 08:24:43 +08:00
|
|
|
|
|
|
|
iov[0].iov_base = (char *)req;
|
|
|
|
iov[0].iov_len = total_len;
|
|
|
|
|
2018-06-12 06:00:59 +08:00
|
|
|
memset(&rqst, 0, sizeof(struct smb_rqst));
|
|
|
|
rqst.rq_iov = iov;
|
|
|
|
rqst.rq_nvec = 1;
|
|
|
|
|
2020-06-01 01:38:22 +08:00
|
|
|
rc = cifs_send_recv(xid, ses, server,
|
|
|
|
&rqst, &resp_buf_type, flags, &rsp_iov);
|
2016-10-26 02:38:47 +08:00
|
|
|
cifs_small_buf_release(req);
|
2012-09-19 07:20:33 +08:00
|
|
|
|
|
|
|
if (rc) {
|
|
|
|
cifs_stats_fail_inc(tcon, SMB2_OPLOCK_BREAK_HE);
|
2013-05-05 11:12:25 +08:00
|
|
|
cifs_dbg(FYI, "Send error in Oplock Break = %d\n", rc);
|
2012-09-19 07:20:33 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
return rc;
|
|
|
|
}
|
2012-09-19 07:20:34 +08:00
|
|
|
|
2018-08-08 13:07:49 +08:00
|
|
|
void
|
|
|
|
smb2_copy_fs_info_to_kstatfs(struct smb2_fs_full_size_info *pfs_inf,
|
|
|
|
struct kstatfs *kst)
|
2012-09-19 07:20:34 +08:00
|
|
|
{
|
|
|
|
kst->f_bsize = le32_to_cpu(pfs_inf->BytesPerSector) *
|
|
|
|
le32_to_cpu(pfs_inf->SectorsPerAllocationUnit);
|
|
|
|
kst->f_blocks = le64_to_cpu(pfs_inf->TotalAllocationUnits);
|
2017-08-03 15:39:03 +08:00
|
|
|
kst->f_bfree = kst->f_bavail =
|
|
|
|
le64_to_cpu(pfs_inf->CallerAvailableAllocationUnits);
|
2012-09-19 07:20:34 +08:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2018-06-25 12:28:12 +08:00
|
|
|
static void
|
|
|
|
copy_posix_fs_info_to_kstatfs(FILE_SYSTEM_POSIX_INFO *response_data,
|
|
|
|
struct kstatfs *kst)
|
|
|
|
{
|
|
|
|
kst->f_bsize = le32_to_cpu(response_data->BlockSize);
|
|
|
|
kst->f_blocks = le64_to_cpu(response_data->TotalBlocks);
|
|
|
|
kst->f_bfree = le64_to_cpu(response_data->BlocksAvail);
|
|
|
|
if (response_data->UserBlocksAvail == cpu_to_le64(-1))
|
|
|
|
kst->f_bavail = kst->f_bfree;
|
|
|
|
else
|
|
|
|
kst->f_bavail = le64_to_cpu(response_data->UserBlocksAvail);
|
|
|
|
if (response_data->TotalFileNodes != cpu_to_le64(-1))
|
|
|
|
kst->f_files = le64_to_cpu(response_data->TotalFileNodes);
|
|
|
|
if (response_data->FreeFileNodes != cpu_to_le64(-1))
|
|
|
|
kst->f_ffree = le64_to_cpu(response_data->FreeFileNodes);
|
|
|
|
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2012-09-19 07:20:34 +08:00
|
|
|
static int
|
2020-06-01 01:38:22 +08:00
|
|
|
build_qfs_info_req(struct kvec *iov, struct cifs_tcon *tcon,
|
|
|
|
struct TCP_Server_Info *server,
|
|
|
|
int level, int outbuf_len, u64 persistent_fid,
|
|
|
|
u64 volatile_fid)
|
2012-09-19 07:20:34 +08:00
|
|
|
{
|
|
|
|
int rc;
|
|
|
|
struct smb2_query_info_req *req;
|
2017-11-20 08:24:46 +08:00
|
|
|
unsigned int total_len;
|
2012-09-19 07:20:34 +08:00
|
|
|
|
2013-05-05 11:12:25 +08:00
|
|
|
cifs_dbg(FYI, "Query FSInfo level %d\n", level);
|
2012-09-19 07:20:34 +08:00
|
|
|
|
2020-06-01 01:38:22 +08:00
|
|
|
if ((tcon->ses == NULL) || server == NULL)
|
2012-09-19 07:20:34 +08:00
|
|
|
return -EIO;
|
|
|
|
|
2020-06-01 01:38:22 +08:00
|
|
|
rc = smb2_plain_req_init(SMB2_QUERY_INFO, tcon, server,
|
|
|
|
(void **) &req, &total_len);
|
2012-09-19 07:20:34 +08:00
|
|
|
if (rc)
|
|
|
|
return rc;
|
|
|
|
|
|
|
|
req->InfoType = SMB2_O_INFO_FILESYSTEM;
|
|
|
|
req->FileInfoClass = level;
|
|
|
|
req->PersistentFileId = persistent_fid;
|
|
|
|
req->VolatileFileId = volatile_fid;
|
2017-11-20 08:24:46 +08:00
|
|
|
/* 1 for pad */
|
2012-09-19 07:20:34 +08:00
|
|
|
req->InputBufferOffset =
|
2017-11-20 08:24:46 +08:00
|
|
|
cpu_to_le16(sizeof(struct smb2_query_info_req) - 1);
|
2012-09-19 07:20:34 +08:00
|
|
|
req->OutputBufferLength = cpu_to_le32(
|
2018-06-01 08:53:07 +08:00
|
|
|
outbuf_len + sizeof(struct smb2_query_info_rsp) - 1);
|
2012-09-19 07:20:34 +08:00
|
|
|
|
|
|
|
iov->iov_base = (char *)req;
|
2017-11-20 08:24:46 +08:00
|
|
|
iov->iov_len = total_len;
|
2012-09-19 07:20:34 +08:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2018-06-25 12:28:12 +08:00
|
|
|
int
|
|
|
|
SMB311_posix_qfs_info(const unsigned int xid, struct cifs_tcon *tcon,
|
|
|
|
u64 persistent_fid, u64 volatile_fid, struct kstatfs *fsdata)
|
|
|
|
{
|
|
|
|
struct smb_rqst rqst;
|
|
|
|
struct smb2_query_info_rsp *rsp = NULL;
|
|
|
|
struct kvec iov;
|
|
|
|
struct kvec rsp_iov;
|
|
|
|
int rc = 0;
|
|
|
|
int resp_buftype;
|
|
|
|
struct cifs_ses *ses = tcon->ses;
|
2020-06-01 01:38:22 +08:00
|
|
|
struct TCP_Server_Info *server = cifs_pick_channel(ses);
|
2018-06-25 12:28:12 +08:00
|
|
|
FILE_SYSTEM_POSIX_INFO *info = NULL;
|
|
|
|
int flags = 0;
|
|
|
|
|
2020-06-01 01:38:22 +08:00
|
|
|
rc = build_qfs_info_req(&iov, tcon, server,
|
|
|
|
FS_POSIX_INFORMATION,
|
2018-06-25 12:28:12 +08:00
|
|
|
sizeof(FILE_SYSTEM_POSIX_INFO),
|
|
|
|
persistent_fid, volatile_fid);
|
|
|
|
if (rc)
|
|
|
|
return rc;
|
|
|
|
|
|
|
|
if (smb3_encryption_required(tcon))
|
|
|
|
flags |= CIFS_TRANSFORM_REQ;
|
|
|
|
|
|
|
|
memset(&rqst, 0, sizeof(struct smb_rqst));
|
|
|
|
rqst.rq_iov = &iov;
|
|
|
|
rqst.rq_nvec = 1;
|
|
|
|
|
2020-06-01 01:38:22 +08:00
|
|
|
rc = cifs_send_recv(xid, ses, server,
|
|
|
|
&rqst, &resp_buftype, flags, &rsp_iov);
|
2018-06-25 12:28:12 +08:00
|
|
|
cifs_small_buf_release(iov.iov_base);
|
|
|
|
if (rc) {
|
|
|
|
cifs_stats_fail_inc(tcon, SMB2_QUERY_INFO_HE);
|
|
|
|
goto posix_qfsinf_exit;
|
|
|
|
}
|
|
|
|
rsp = (struct smb2_query_info_rsp *)rsp_iov.iov_base;
|
|
|
|
|
|
|
|
info = (FILE_SYSTEM_POSIX_INFO *)(
|
|
|
|
le16_to_cpu(rsp->OutputBufferOffset) + (char *)rsp);
|
2018-08-08 13:07:49 +08:00
|
|
|
rc = smb2_validate_iov(le16_to_cpu(rsp->OutputBufferOffset),
|
|
|
|
le32_to_cpu(rsp->OutputBufferLength), &rsp_iov,
|
|
|
|
sizeof(FILE_SYSTEM_POSIX_INFO));
|
2018-06-25 12:28:12 +08:00
|
|
|
if (!rc)
|
|
|
|
copy_posix_fs_info_to_kstatfs(info, fsdata);
|
|
|
|
|
|
|
|
posix_qfsinf_exit:
|
|
|
|
free_rsp_buf(resp_buftype, rsp_iov.iov_base);
|
|
|
|
return rc;
|
|
|
|
}
|
|
|
|
|
2012-09-19 07:20:34 +08:00
|
|
|
int
|
|
|
|
SMB2_QFS_info(const unsigned int xid, struct cifs_tcon *tcon,
|
|
|
|
u64 persistent_fid, u64 volatile_fid, struct kstatfs *fsdata)
|
|
|
|
{
|
2018-06-12 06:00:59 +08:00
|
|
|
struct smb_rqst rqst;
|
2012-09-19 07:20:34 +08:00
|
|
|
struct smb2_query_info_rsp *rsp = NULL;
|
|
|
|
struct kvec iov;
|
2016-10-26 02:38:47 +08:00
|
|
|
struct kvec rsp_iov;
|
2012-09-19 07:20:34 +08:00
|
|
|
int rc = 0;
|
|
|
|
int resp_buftype;
|
|
|
|
struct cifs_ses *ses = tcon->ses;
|
2020-06-01 01:38:22 +08:00
|
|
|
struct TCP_Server_Info *server = cifs_pick_channel(ses);
|
2012-09-19 07:20:34 +08:00
|
|
|
struct smb2_fs_full_size_info *info = NULL;
|
2016-11-01 04:49:30 +08:00
|
|
|
int flags = 0;
|
2012-09-19 07:20:34 +08:00
|
|
|
|
2020-06-01 01:38:22 +08:00
|
|
|
rc = build_qfs_info_req(&iov, tcon, server,
|
|
|
|
FS_FULL_SIZE_INFORMATION,
|
2012-09-19 07:20:34 +08:00
|
|
|
sizeof(struct smb2_fs_full_size_info),
|
|
|
|
persistent_fid, volatile_fid);
|
|
|
|
if (rc)
|
|
|
|
return rc;
|
|
|
|
|
2018-05-10 06:43:08 +08:00
|
|
|
if (smb3_encryption_required(tcon))
|
2016-11-01 04:49:30 +08:00
|
|
|
flags |= CIFS_TRANSFORM_REQ;
|
|
|
|
|
2018-06-12 06:00:59 +08:00
|
|
|
memset(&rqst, 0, sizeof(struct smb_rqst));
|
|
|
|
rqst.rq_iov = &iov;
|
|
|
|
rqst.rq_nvec = 1;
|
|
|
|
|
2020-06-01 01:38:22 +08:00
|
|
|
rc = cifs_send_recv(xid, ses, server,
|
|
|
|
&rqst, &resp_buftype, flags, &rsp_iov);
|
2016-10-26 02:38:47 +08:00
|
|
|
cifs_small_buf_release(iov.iov_base);
|
2012-09-19 07:20:34 +08:00
|
|
|
if (rc) {
|
|
|
|
cifs_stats_fail_inc(tcon, SMB2_QUERY_INFO_HE);
|
2013-10-09 15:07:00 +08:00
|
|
|
goto qfsinf_exit;
|
2012-09-19 07:20:34 +08:00
|
|
|
}
|
2016-10-26 02:38:47 +08:00
|
|
|
rsp = (struct smb2_query_info_rsp *)rsp_iov.iov_base;
|
2012-09-19 07:20:34 +08:00
|
|
|
|
2018-06-01 08:53:07 +08:00
|
|
|
info = (struct smb2_fs_full_size_info *)(
|
2018-06-01 08:53:06 +08:00
|
|
|
le16_to_cpu(rsp->OutputBufferOffset) + (char *)rsp);
|
2018-08-08 13:07:49 +08:00
|
|
|
rc = smb2_validate_iov(le16_to_cpu(rsp->OutputBufferOffset),
|
|
|
|
le32_to_cpu(rsp->OutputBufferLength), &rsp_iov,
|
|
|
|
sizeof(struct smb2_fs_full_size_info));
|
2012-09-19 07:20:34 +08:00
|
|
|
if (!rc)
|
2018-08-08 13:07:49 +08:00
|
|
|
smb2_copy_fs_info_to_kstatfs(info, fsdata);
|
2012-09-19 07:20:34 +08:00
|
|
|
|
2013-10-09 15:07:00 +08:00
|
|
|
qfsinf_exit:
|
2016-10-26 02:38:47 +08:00
|
|
|
free_rsp_buf(resp_buftype, rsp_iov.iov_base);
|
2013-10-09 15:07:00 +08:00
|
|
|
return rc;
|
|
|
|
}
|
|
|
|
|
|
|
|
int
|
|
|
|
SMB2_QFS_attr(const unsigned int xid, struct cifs_tcon *tcon,
|
2013-10-10 02:36:35 +08:00
|
|
|
u64 persistent_fid, u64 volatile_fid, int level)
|
2013-10-09 15:07:00 +08:00
|
|
|
{
|
2018-06-12 06:00:59 +08:00
|
|
|
struct smb_rqst rqst;
|
2013-10-09 15:07:00 +08:00
|
|
|
struct smb2_query_info_rsp *rsp = NULL;
|
|
|
|
struct kvec iov;
|
2016-10-26 02:38:47 +08:00
|
|
|
struct kvec rsp_iov;
|
2013-10-09 15:07:00 +08:00
|
|
|
int rc = 0;
|
2013-10-10 02:36:35 +08:00
|
|
|
int resp_buftype, max_len, min_len;
|
2013-10-09 15:07:00 +08:00
|
|
|
struct cifs_ses *ses = tcon->ses;
|
2020-06-01 01:38:22 +08:00
|
|
|
struct TCP_Server_Info *server = cifs_pick_channel(ses);
|
2013-10-09 15:07:00 +08:00
|
|
|
unsigned int rsp_len, offset;
|
2016-11-01 04:49:30 +08:00
|
|
|
int flags = 0;
|
2013-10-09 15:07:00 +08:00
|
|
|
|
2013-10-10 02:36:35 +08:00
|
|
|
if (level == FS_DEVICE_INFORMATION) {
|
|
|
|
max_len = sizeof(FILE_SYSTEM_DEVICE_INFO);
|
|
|
|
min_len = sizeof(FILE_SYSTEM_DEVICE_INFO);
|
|
|
|
} else if (level == FS_ATTRIBUTE_INFORMATION) {
|
|
|
|
max_len = sizeof(FILE_SYSTEM_ATTRIBUTE_INFO);
|
|
|
|
min_len = MIN_FS_ATTR_INFO_SIZE;
|
2013-10-10 09:55:53 +08:00
|
|
|
} else if (level == FS_SECTOR_SIZE_INFORMATION) {
|
|
|
|
max_len = sizeof(struct smb3_fs_ss_info);
|
|
|
|
min_len = sizeof(struct smb3_fs_ss_info);
|
2018-06-25 12:18:52 +08:00
|
|
|
} else if (level == FS_VOLUME_INFORMATION) {
|
|
|
|
max_len = sizeof(struct smb3_fs_vol_info) + MAX_VOL_LABEL_LEN;
|
|
|
|
min_len = sizeof(struct smb3_fs_vol_info);
|
2013-10-10 02:36:35 +08:00
|
|
|
} else {
|
2013-10-10 09:55:53 +08:00
|
|
|
cifs_dbg(FYI, "Invalid qfsinfo level %d\n", level);
|
2013-10-10 02:36:35 +08:00
|
|
|
return -EINVAL;
|
|
|
|
}
|
|
|
|
|
2020-06-01 01:38:22 +08:00
|
|
|
rc = build_qfs_info_req(&iov, tcon, server,
|
|
|
|
level, max_len,
|
2013-10-09 15:07:00 +08:00
|
|
|
persistent_fid, volatile_fid);
|
|
|
|
if (rc)
|
|
|
|
return rc;
|
|
|
|
|
2018-05-10 06:43:08 +08:00
|
|
|
if (smb3_encryption_required(tcon))
|
2016-11-01 04:49:30 +08:00
|
|
|
flags |= CIFS_TRANSFORM_REQ;
|
|
|
|
|
2018-06-12 06:00:59 +08:00
|
|
|
memset(&rqst, 0, sizeof(struct smb_rqst));
|
|
|
|
rqst.rq_iov = &iov;
|
|
|
|
rqst.rq_nvec = 1;
|
|
|
|
|
2020-06-01 01:38:22 +08:00
|
|
|
rc = cifs_send_recv(xid, ses, server,
|
|
|
|
&rqst, &resp_buftype, flags, &rsp_iov);
|
2016-10-26 02:38:47 +08:00
|
|
|
cifs_small_buf_release(iov.iov_base);
|
2013-10-09 15:07:00 +08:00
|
|
|
if (rc) {
|
|
|
|
cifs_stats_fail_inc(tcon, SMB2_QUERY_INFO_HE);
|
|
|
|
goto qfsattr_exit;
|
|
|
|
}
|
2016-10-26 02:38:47 +08:00
|
|
|
rsp = (struct smb2_query_info_rsp *)rsp_iov.iov_base;
|
2013-10-09 15:07:00 +08:00
|
|
|
|
|
|
|
rsp_len = le32_to_cpu(rsp->OutputBufferLength);
|
|
|
|
offset = le16_to_cpu(rsp->OutputBufferOffset);
|
2018-08-08 13:07:49 +08:00
|
|
|
rc = smb2_validate_iov(offset, rsp_len, &rsp_iov, min_len);
|
2013-10-10 02:36:35 +08:00
|
|
|
if (rc)
|
|
|
|
goto qfsattr_exit;
|
|
|
|
|
|
|
|
if (level == FS_ATTRIBUTE_INFORMATION)
|
2018-06-01 08:53:07 +08:00
|
|
|
memcpy(&tcon->fsAttrInfo, offset
|
2018-06-01 08:53:06 +08:00
|
|
|
+ (char *)rsp, min_t(unsigned int,
|
2013-10-10 02:36:35 +08:00
|
|
|
rsp_len, max_len));
|
|
|
|
else if (level == FS_DEVICE_INFORMATION)
|
2018-06-01 08:53:07 +08:00
|
|
|
memcpy(&tcon->fsDevInfo, offset
|
2018-06-01 08:53:06 +08:00
|
|
|
+ (char *)rsp, sizeof(FILE_SYSTEM_DEVICE_INFO));
|
2013-10-10 09:55:53 +08:00
|
|
|
else if (level == FS_SECTOR_SIZE_INFORMATION) {
|
|
|
|
struct smb3_fs_ss_info *ss_info = (struct smb3_fs_ss_info *)
|
2018-06-01 08:53:07 +08:00
|
|
|
(offset + (char *)rsp);
|
2013-10-10 09:55:53 +08:00
|
|
|
tcon->ss_flags = le32_to_cpu(ss_info->Flags);
|
|
|
|
tcon->perf_sector_size =
|
|
|
|
le32_to_cpu(ss_info->PhysicalBytesPerSectorForPerf);
|
2018-06-25 12:18:52 +08:00
|
|
|
} else if (level == FS_VOLUME_INFORMATION) {
|
|
|
|
struct smb3_fs_vol_info *vol_info = (struct smb3_fs_vol_info *)
|
|
|
|
(offset + (char *)rsp);
|
|
|
|
tcon->vol_serial_number = vol_info->VolumeSerialNumber;
|
|
|
|
tcon->vol_create_time = vol_info->VolumeCreationTime;
|
2013-10-10 09:55:53 +08:00
|
|
|
}
|
2013-10-09 15:07:00 +08:00
|
|
|
|
|
|
|
qfsattr_exit:
|
2016-10-26 02:38:47 +08:00
|
|
|
free_rsp_buf(resp_buftype, rsp_iov.iov_base);
|
2012-09-19 07:20:34 +08:00
|
|
|
return rc;
|
|
|
|
}
|
2012-09-19 21:22:43 +08:00
|
|
|
|
|
|
|
int
|
|
|
|
smb2_lockv(const unsigned int xid, struct cifs_tcon *tcon,
|
|
|
|
const __u64 persist_fid, const __u64 volatile_fid, const __u32 pid,
|
|
|
|
const __u32 num_lock, struct smb2_lock_element *buf)
|
|
|
|
{
|
2018-06-12 06:00:59 +08:00
|
|
|
struct smb_rqst rqst;
|
2012-09-19 21:22:43 +08:00
|
|
|
int rc = 0;
|
|
|
|
struct smb2_lock_req *req = NULL;
|
|
|
|
struct kvec iov[2];
|
2016-10-26 02:38:47 +08:00
|
|
|
struct kvec rsp_iov;
|
2012-09-19 21:22:43 +08:00
|
|
|
int resp_buf_type;
|
|
|
|
unsigned int count;
|
2019-05-06 08:00:02 +08:00
|
|
|
int flags = CIFS_NO_RSP_BUF;
|
2017-11-21 07:07:27 +08:00
|
|
|
unsigned int total_len;
|
2020-06-01 01:38:22 +08:00
|
|
|
struct TCP_Server_Info *server = cifs_pick_channel(tcon->ses);
|
2012-09-19 21:22:43 +08:00
|
|
|
|
2013-05-05 11:12:25 +08:00
|
|
|
cifs_dbg(FYI, "smb2_lockv num lock %d\n", num_lock);
|
2012-09-19 21:22:43 +08:00
|
|
|
|
2020-06-01 01:38:22 +08:00
|
|
|
rc = smb2_plain_req_init(SMB2_LOCK, tcon, server,
|
|
|
|
(void **) &req, &total_len);
|
2012-09-19 21:22:43 +08:00
|
|
|
if (rc)
|
|
|
|
return rc;
|
|
|
|
|
2018-05-10 06:43:08 +08:00
|
|
|
if (smb3_encryption_required(tcon))
|
2016-11-01 04:49:30 +08:00
|
|
|
flags |= CIFS_TRANSFORM_REQ;
|
|
|
|
|
2021-11-05 07:39:01 +08:00
|
|
|
req->hdr.Id.SyncId.ProcessId = cpu_to_le32(pid);
|
2012-09-19 21:22:43 +08:00
|
|
|
req->LockCount = cpu_to_le16(num_lock);
|
|
|
|
|
|
|
|
req->PersistentFileId = persist_fid;
|
|
|
|
req->VolatileFileId = volatile_fid;
|
|
|
|
|
|
|
|
count = num_lock * sizeof(struct smb2_lock_element);
|
|
|
|
|
|
|
|
iov[0].iov_base = (char *)req;
|
2017-11-21 07:07:27 +08:00
|
|
|
iov[0].iov_len = total_len - sizeof(struct smb2_lock_element);
|
2012-09-19 21:22:43 +08:00
|
|
|
iov[1].iov_base = (char *)buf;
|
|
|
|
iov[1].iov_len = count;
|
|
|
|
|
|
|
|
cifs_stats_inc(&tcon->stats.cifs_stats.num_locks);
|
2018-06-12 06:00:59 +08:00
|
|
|
|
|
|
|
memset(&rqst, 0, sizeof(struct smb_rqst));
|
|
|
|
rqst.rq_iov = iov;
|
|
|
|
rqst.rq_nvec = 2;
|
|
|
|
|
2020-06-01 01:38:22 +08:00
|
|
|
rc = cifs_send_recv(xid, tcon->ses, server,
|
|
|
|
&rqst, &resp_buf_type, flags,
|
2017-11-21 07:07:27 +08:00
|
|
|
&rsp_iov);
|
2016-10-26 02:38:47 +08:00
|
|
|
cifs_small_buf_release(req);
|
2012-09-19 21:22:43 +08:00
|
|
|
if (rc) {
|
2013-05-05 11:12:25 +08:00
|
|
|
cifs_dbg(FYI, "Send error in smb2_lockv = %d\n", rc);
|
2012-09-19 21:22:43 +08:00
|
|
|
cifs_stats_fail_inc(tcon, SMB2_LOCK_HE);
|
2018-05-18 10:16:55 +08:00
|
|
|
trace_smb3_lock_err(xid, persist_fid, tcon->tid,
|
|
|
|
tcon->ses->Suid, rc);
|
2012-09-19 21:22:43 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
return rc;
|
|
|
|
}
|
|
|
|
|
|
|
|
int
|
|
|
|
SMB2_lock(const unsigned int xid, struct cifs_tcon *tcon,
|
|
|
|
const __u64 persist_fid, const __u64 volatile_fid, const __u32 pid,
|
|
|
|
const __u64 length, const __u64 offset, const __u32 lock_flags,
|
|
|
|
const bool wait)
|
|
|
|
{
|
|
|
|
struct smb2_lock_element lock;
|
|
|
|
|
|
|
|
lock.Offset = cpu_to_le64(offset);
|
|
|
|
lock.Length = cpu_to_le64(length);
|
|
|
|
lock.Flags = cpu_to_le32(lock_flags);
|
|
|
|
if (!wait && lock_flags != SMB2_LOCKFLAG_UNLOCK)
|
|
|
|
lock.Flags |= cpu_to_le32(SMB2_LOCKFLAG_FAIL_IMMEDIATELY);
|
|
|
|
|
|
|
|
return smb2_lockv(xid, tcon, persist_fid, volatile_fid, pid, 1, &lock);
|
|
|
|
}
|
2012-09-19 21:22:45 +08:00
|
|
|
|
|
|
|
int
|
|
|
|
SMB2_lease_break(const unsigned int xid, struct cifs_tcon *tcon,
|
|
|
|
__u8 *lease_key, const __le32 lease_state)
|
|
|
|
{
|
2018-06-12 06:00:59 +08:00
|
|
|
struct smb_rqst rqst;
|
2012-09-19 21:22:45 +08:00
|
|
|
int rc;
|
|
|
|
struct smb2_lease_ack *req = NULL;
|
2017-11-21 08:04:37 +08:00
|
|
|
struct cifs_ses *ses = tcon->ses;
|
2016-11-01 04:49:30 +08:00
|
|
|
int flags = CIFS_OBREAK_OP;
|
2017-11-21 08:04:37 +08:00
|
|
|
unsigned int total_len;
|
|
|
|
struct kvec iov[1];
|
|
|
|
struct kvec rsp_iov;
|
|
|
|
int resp_buf_type;
|
2018-09-29 08:44:23 +08:00
|
|
|
__u64 *please_key_high;
|
|
|
|
__u64 *please_key_low;
|
2020-06-01 01:38:22 +08:00
|
|
|
struct TCP_Server_Info *server = cifs_pick_channel(tcon->ses);
|
2012-09-19 21:22:45 +08:00
|
|
|
|
2013-05-05 11:12:25 +08:00
|
|
|
cifs_dbg(FYI, "SMB2_lease_break\n");
|
2020-06-01 01:38:22 +08:00
|
|
|
rc = smb2_plain_req_init(SMB2_OPLOCK_BREAK, tcon, server,
|
|
|
|
(void **) &req, &total_len);
|
2012-09-19 21:22:45 +08:00
|
|
|
if (rc)
|
|
|
|
return rc;
|
|
|
|
|
2018-05-10 06:43:08 +08:00
|
|
|
if (smb3_encryption_required(tcon))
|
2016-11-01 04:49:30 +08:00
|
|
|
flags |= CIFS_TRANSFORM_REQ;
|
|
|
|
|
2021-11-05 07:39:01 +08:00
|
|
|
req->hdr.CreditRequest = cpu_to_le16(1);
|
2012-09-19 21:22:45 +08:00
|
|
|
req->StructureSize = cpu_to_le16(36);
|
2017-11-21 08:04:37 +08:00
|
|
|
total_len += 12;
|
2012-09-19 21:22:45 +08:00
|
|
|
|
|
|
|
memcpy(req->LeaseKey, lease_key, 16);
|
|
|
|
req->LeaseState = lease_state;
|
|
|
|
|
2019-05-06 08:00:02 +08:00
|
|
|
flags |= CIFS_NO_RSP_BUF;
|
2017-11-21 08:04:37 +08:00
|
|
|
|
|
|
|
iov[0].iov_base = (char *)req;
|
|
|
|
iov[0].iov_len = total_len;
|
|
|
|
|
2018-06-12 06:00:59 +08:00
|
|
|
memset(&rqst, 0, sizeof(struct smb_rqst));
|
|
|
|
rqst.rq_iov = iov;
|
|
|
|
rqst.rq_nvec = 1;
|
|
|
|
|
2020-06-01 01:38:22 +08:00
|
|
|
rc = cifs_send_recv(xid, ses, server,
|
|
|
|
&rqst, &resp_buf_type, flags, &rsp_iov);
|
2016-10-26 02:38:47 +08:00
|
|
|
cifs_small_buf_release(req);
|
2012-09-19 21:22:45 +08:00
|
|
|
|
2019-01-31 20:46:07 +08:00
|
|
|
please_key_low = (__u64 *)lease_key;
|
|
|
|
please_key_high = (__u64 *)(lease_key+8);
|
2012-09-19 21:22:45 +08:00
|
|
|
if (rc) {
|
|
|
|
cifs_stats_fail_inc(tcon, SMB2_OPLOCK_BREAK_HE);
|
2018-09-29 08:44:23 +08:00
|
|
|
trace_smb3_lease_err(le32_to_cpu(lease_state), tcon->tid,
|
|
|
|
ses->Suid, *please_key_low, *please_key_high, rc);
|
2013-05-05 11:12:25 +08:00
|
|
|
cifs_dbg(FYI, "Send error in Lease Break = %d\n", rc);
|
2018-09-29 08:44:23 +08:00
|
|
|
} else
|
|
|
|
trace_smb3_lease_done(le32_to_cpu(lease_state), tcon->tid,
|
|
|
|
ses->Suid, *please_key_low, *please_key_high);
|
2012-09-19 21:22:45 +08:00
|
|
|
|
|
|
|
return rc;
|
|
|
|
}
|