1 /* SPDX-License-Identifier: LGPL-2.1 */ 2 /* 3 * 4 * Copyright (C) International Business Machines Corp., 2002,2008 5 * Author(s): Steve French (sfrench@us.ibm.com) 6 * Jeremy Allison (jra@samba.org) 7 * 8 */ 9 #ifndef _CIFS_GLOB_H 10 #define _CIFS_GLOB_H 11 12 #include <linux/in.h> 13 #include <linux/in6.h> 14 #include <linux/inet.h> 15 #include <linux/slab.h> 16 #include <linux/scatterlist.h> 17 #include <linux/mm.h> 18 #include <linux/mempool.h> 19 #include <linux/workqueue.h> 20 #include <linux/utsname.h> 21 #include <linux/sched/mm.h> 22 #include <linux/netfs.h> 23 #include "cifs_fs_sb.h" 24 #include "cifsacl.h" 25 #include <crypto/internal/hash.h> 26 #include <uapi/linux/cifs/cifs_mount.h> 27 #include "../common/smb2pdu.h" 28 #include "smb2pdu.h" 29 #include <linux/filelock.h> 30 31 #define SMB_PATH_MAX 260 32 #define CIFS_PORT 445 33 #define RFC1001_PORT 139 34 35 /* 36 * The sizes of various internal tables and strings 37 */ 38 #define MAX_UID_INFO 16 39 #define MAX_SES_INFO 2 40 #define MAX_TCON_INFO 4 41 42 #define MAX_TREE_SIZE (2 + CIFS_NI_MAXHOST + 1 + CIFS_MAX_SHARE_LEN + 1) 43 44 #define CIFS_MIN_RCV_POOL 4 45 46 #define MAX_REOPEN_ATT 5 /* these many maximum attempts to reopen a file */ 47 /* 48 * default attribute cache timeout (jiffies) 49 */ 50 #define CIFS_DEF_ACTIMEO (1 * HZ) 51 52 /* 53 * max sleep time before retry to server 54 */ 55 #define CIFS_MAX_SLEEP 2000 56 57 /* 58 * max attribute cache timeout (jiffies) - 2^30 59 */ 60 #define CIFS_MAX_ACTIMEO (1 << 30) 61 62 /* 63 * Max persistent and resilient handle timeout (milliseconds). 64 * Windows durable max was 960000 (16 minutes) 65 */ 66 #define SMB3_MAX_HANDLE_TIMEOUT 960000 67 68 /* 69 * MAX_REQ is the maximum number of requests that WE will send 70 * on one socket concurrently. 71 */ 72 #define CIFS_MAX_REQ 32767 73 74 #define RFC1001_NAME_LEN 15 75 #define RFC1001_NAME_LEN_WITH_NULL (RFC1001_NAME_LEN + 1) 76 77 /* maximum length of ip addr as a string (including ipv6 and sctp) */ 78 #define SERVER_NAME_LENGTH 80 79 #define SERVER_NAME_LEN_WITH_NULL (SERVER_NAME_LENGTH + 1) 80 81 /* echo interval in seconds */ 82 #define SMB_ECHO_INTERVAL_MIN 1 83 #define SMB_ECHO_INTERVAL_MAX 600 84 #define SMB_ECHO_INTERVAL_DEFAULT 60 85 86 /* smb multichannel query server interfaces interval in seconds */ 87 #define SMB_INTERFACE_POLL_INTERVAL 600 88 89 /* maximum number of PDUs in one compound */ 90 #define MAX_COMPOUND 7 91 92 /* 93 * Default number of credits to keep available for SMB3. 94 * This value is chosen somewhat arbitrarily. The Windows client 95 * defaults to 128 credits, the Windows server allows clients up to 96 * 512 credits (or 8K for later versions), and the NetApp server 97 * does not limit clients at all. Choose a high enough default value 98 * such that the client shouldn't limit performance, but allow mount 99 * to override (until you approach 64K, where we limit credits to 65000 100 * to reduce possibility of seeing more server credit overflow bugs. 101 */ 102 #define SMB2_MAX_CREDITS_AVAILABLE 32000 103 104 #include "cifspdu.h" 105 106 #ifndef XATTR_DOS_ATTRIB 107 #define XATTR_DOS_ATTRIB "user.DOSATTRIB" 108 #endif 109 110 #define CIFS_MAX_WORKSTATION_LEN (__NEW_UTS_LEN + 1) /* reasonable max for client */ 111 112 #define CIFS_DFS_ROOT_SES(ses) ((ses)->dfs_root_ses ?: (ses)) 113 114 /* 115 * CIFS vfs client Status information (based on what we know.) 116 */ 117 118 /* associated with each connection */ 119 enum statusEnum { 120 CifsNew = 0, 121 CifsGood, 122 CifsExiting, 123 CifsNeedReconnect, 124 CifsNeedNegotiate, 125 CifsInNegotiate, 126 }; 127 128 /* associated with each smb session */ 129 enum ses_status_enum { 130 SES_NEW = 0, 131 SES_GOOD, 132 SES_EXITING, 133 SES_NEED_RECON, 134 SES_IN_SETUP 135 }; 136 137 /* associated with each tree connection to the server */ 138 enum tid_status_enum { 139 TID_NEW = 0, 140 TID_GOOD, 141 TID_EXITING, 142 TID_NEED_RECON, 143 TID_NEED_TCON, 144 TID_IN_TCON, 145 TID_NEED_FILES_INVALIDATE, /* currently unused */ 146 TID_IN_FILES_INVALIDATE 147 }; 148 149 enum securityEnum { 150 Unspecified = 0, /* not specified */ 151 NTLMv2, /* Legacy NTLM auth with NTLMv2 hash */ 152 RawNTLMSSP, /* NTLMSSP without SPNEGO, NTLMv2 hash */ 153 Kerberos, /* Kerberos via SPNEGO */ 154 IAKerb, /* Kerberos proxy */ 155 }; 156 157 enum upcall_target_enum { 158 UPTARGET_UNSPECIFIED, /* not specified, defaults to app */ 159 UPTARGET_MOUNT, /* upcall to the mount namespace */ 160 UPTARGET_APP, /* upcall to the application namespace which did the mount */ 161 }; 162 163 enum cifs_reparse_type { 164 CIFS_REPARSE_TYPE_NONE, 165 CIFS_REPARSE_TYPE_NFS, 166 CIFS_REPARSE_TYPE_WSL, 167 CIFS_REPARSE_TYPE_DEFAULT = CIFS_REPARSE_TYPE_NFS, 168 }; 169 170 static inline const char *cifs_reparse_type_str(enum cifs_reparse_type type) 171 { 172 switch (type) { 173 case CIFS_REPARSE_TYPE_NONE: 174 return "none"; 175 case CIFS_REPARSE_TYPE_NFS: 176 return "nfs"; 177 case CIFS_REPARSE_TYPE_WSL: 178 return "wsl"; 179 default: 180 return "unknown"; 181 } 182 } 183 184 enum cifs_symlink_type { 185 CIFS_SYMLINK_TYPE_DEFAULT, 186 CIFS_SYMLINK_TYPE_NONE, 187 CIFS_SYMLINK_TYPE_NATIVE, 188 CIFS_SYMLINK_TYPE_UNIX, 189 CIFS_SYMLINK_TYPE_MFSYMLINKS, 190 CIFS_SYMLINK_TYPE_SFU, 191 CIFS_SYMLINK_TYPE_NFS, 192 CIFS_SYMLINK_TYPE_WSL, 193 }; 194 195 static inline const char *cifs_symlink_type_str(enum cifs_symlink_type type) 196 { 197 switch (type) { 198 case CIFS_SYMLINK_TYPE_NONE: 199 return "none"; 200 case CIFS_SYMLINK_TYPE_NATIVE: 201 return "native"; 202 case CIFS_SYMLINK_TYPE_UNIX: 203 return "unix"; 204 case CIFS_SYMLINK_TYPE_MFSYMLINKS: 205 return "mfsymlinks"; 206 case CIFS_SYMLINK_TYPE_SFU: 207 return "sfu"; 208 case CIFS_SYMLINK_TYPE_NFS: 209 return "nfs"; 210 case CIFS_SYMLINK_TYPE_WSL: 211 return "wsl"; 212 default: 213 return "unknown"; 214 } 215 } 216 217 struct session_key { 218 unsigned int len; 219 char *response; 220 }; 221 222 /* crypto hashing related structure/fields, not specific to a sec mech */ 223 struct cifs_secmech { 224 struct shash_desc *md5; /* md5 hash function, for CIFS/SMB1 signatures */ 225 struct shash_desc *hmacsha256; /* hmac-sha256 hash function, for SMB2 signatures */ 226 struct shash_desc *sha512; /* sha512 hash function, for SMB3.1.1 preauth hash */ 227 struct shash_desc *aes_cmac; /* block-cipher based MAC function, for SMB3 signatures */ 228 229 struct crypto_aead *enc; /* smb3 encryption AEAD TFM (AES-CCM and AES-GCM) */ 230 struct crypto_aead *dec; /* smb3 decryption AEAD TFM (AES-CCM and AES-GCM) */ 231 }; 232 233 /* per smb session structure/fields */ 234 struct ntlmssp_auth { 235 bool sesskey_per_smbsess; /* whether session key is per smb session */ 236 __u32 client_flags; /* sent by client in type 1 ntlmsssp exchange */ 237 __u32 server_flags; /* sent by server in type 2 ntlmssp exchange */ 238 unsigned char ciphertext[CIFS_CPHTXT_SIZE]; /* sent to server */ 239 char cryptkey[CIFS_CRYPTO_KEY_SIZE]; /* used by ntlmssp */ 240 }; 241 242 struct cifs_cred { 243 int uid; 244 int gid; 245 int mode; 246 int cecount; 247 struct smb_sid osid; 248 struct smb_sid gsid; 249 struct cifs_ntace *ntaces; 250 struct smb_ace *aces; 251 }; 252 253 struct cifs_open_info_data { 254 bool adjust_tz; 255 bool reparse_point; 256 bool contains_posix_file_info; 257 struct { 258 /* ioctl response buffer */ 259 struct { 260 int buftype; 261 struct kvec iov; 262 } io; 263 __u32 tag; 264 struct reparse_data_buffer *buf; 265 } reparse; 266 struct { 267 __u8 eas[SMB2_WSL_MAX_QUERY_EA_RESP_SIZE]; 268 unsigned int eas_len; 269 } wsl; 270 char *symlink_target; 271 struct smb_sid posix_owner; 272 struct smb_sid posix_group; 273 union { 274 struct smb2_file_all_info fi; 275 struct smb311_posix_qinfo posix_fi; 276 }; 277 }; 278 279 /* 280 ***************************************************************** 281 * Except the CIFS PDUs themselves all the 282 * globally interesting structs should go here 283 ***************************************************************** 284 */ 285 286 /* 287 * A smb_rqst represents a complete request to be issued to a server. It's 288 * formed by a kvec array, followed by an array of pages. Page data is assumed 289 * to start at the beginning of the first page. 290 */ 291 struct smb_rqst { 292 struct kvec *rq_iov; /* array of kvecs */ 293 unsigned int rq_nvec; /* number of kvecs in array */ 294 struct iov_iter rq_iter; /* Data iterator */ 295 struct folio_queue *rq_buffer; /* Buffer for encryption */ 296 }; 297 298 struct mid_q_entry; 299 struct TCP_Server_Info; 300 struct cifsFileInfo; 301 struct cifs_ses; 302 struct cifs_tcon; 303 struct dfs_info3_param; 304 struct cifs_fattr; 305 struct smb3_fs_context; 306 struct cifs_fid; 307 struct cifs_io_subrequest; 308 struct cifs_io_parms; 309 struct cifs_search_info; 310 struct cifsInodeInfo; 311 struct cifs_open_parms; 312 struct cifs_credits; 313 314 struct smb_version_operations { 315 int (*send_cancel)(struct TCP_Server_Info *, struct smb_rqst *, 316 struct mid_q_entry *); 317 bool (*compare_fids)(struct cifsFileInfo *, struct cifsFileInfo *); 318 /* setup request: allocate mid, sign message */ 319 struct mid_q_entry *(*setup_request)(struct cifs_ses *, 320 struct TCP_Server_Info *, 321 struct smb_rqst *); 322 /* setup async request: allocate mid, sign message */ 323 struct mid_q_entry *(*setup_async_request)(struct TCP_Server_Info *, 324 struct smb_rqst *); 325 /* check response: verify signature, map error */ 326 int (*check_receive)(struct mid_q_entry *, struct TCP_Server_Info *, 327 bool); 328 void (*add_credits)(struct TCP_Server_Info *server, 329 struct cifs_credits *credits, 330 const int optype); 331 void (*set_credits)(struct TCP_Server_Info *, const int); 332 int * (*get_credits_field)(struct TCP_Server_Info *, const int); 333 unsigned int (*get_credits)(struct mid_q_entry *); 334 __u64 (*get_next_mid)(struct TCP_Server_Info *); 335 void (*revert_current_mid)(struct TCP_Server_Info *server, 336 const unsigned int val); 337 /* data offset from read response message */ 338 unsigned int (*read_data_offset)(char *); 339 /* 340 * Data length from read response message 341 * When in_remaining is true, the returned data length is in 342 * message field DataRemaining for out-of-band data read (e.g through 343 * Memory Registration RDMA write in SMBD). 344 * Otherwise, the returned data length is in message field DataLength. 345 */ 346 unsigned int (*read_data_length)(char *, bool in_remaining); 347 /* map smb to linux error */ 348 int (*map_error)(char *, bool); 349 /* find mid corresponding to the response message */ 350 struct mid_q_entry * (*find_mid)(struct TCP_Server_Info *, char *); 351 void (*dump_detail)(void *buf, struct TCP_Server_Info *ptcp_info); 352 void (*clear_stats)(struct cifs_tcon *); 353 void (*print_stats)(struct seq_file *m, struct cifs_tcon *); 354 void (*dump_share_caps)(struct seq_file *, struct cifs_tcon *); 355 /* verify the message */ 356 int (*check_message)(char *, unsigned int, struct TCP_Server_Info *); 357 bool (*is_oplock_break)(char *, struct TCP_Server_Info *); 358 int (*handle_cancelled_mid)(struct mid_q_entry *, struct TCP_Server_Info *); 359 void (*downgrade_oplock)(struct TCP_Server_Info *server, 360 struct cifsInodeInfo *cinode, __u32 oplock, 361 __u16 epoch, bool *purge_cache); 362 /* process transaction2 response */ 363 bool (*check_trans2)(struct mid_q_entry *, struct TCP_Server_Info *, 364 char *, int); 365 /* check if we need to negotiate */ 366 bool (*need_neg)(struct TCP_Server_Info *); 367 /* negotiate to the server */ 368 int (*negotiate)(const unsigned int xid, 369 struct cifs_ses *ses, 370 struct TCP_Server_Info *server); 371 /* set negotiated write size */ 372 unsigned int (*negotiate_wsize)(struct cifs_tcon *tcon, struct smb3_fs_context *ctx); 373 /* set negotiated read size */ 374 unsigned int (*negotiate_rsize)(struct cifs_tcon *tcon, struct smb3_fs_context *ctx); 375 /* setup smb sessionn */ 376 int (*sess_setup)(const unsigned int, struct cifs_ses *, 377 struct TCP_Server_Info *server, 378 const struct nls_table *); 379 /* close smb session */ 380 int (*logoff)(const unsigned int, struct cifs_ses *); 381 /* connect to a server share */ 382 int (*tree_connect)(const unsigned int, struct cifs_ses *, const char *, 383 struct cifs_tcon *, const struct nls_table *); 384 /* close tree connection */ 385 int (*tree_disconnect)(const unsigned int, struct cifs_tcon *); 386 /* get DFS referrals */ 387 int (*get_dfs_refer)(const unsigned int, struct cifs_ses *, 388 const char *, struct dfs_info3_param **, 389 unsigned int *, const struct nls_table *, int); 390 /* informational QFS call */ 391 void (*qfs_tcon)(const unsigned int, struct cifs_tcon *, 392 struct cifs_sb_info *); 393 /* query for server interfaces */ 394 int (*query_server_interfaces)(const unsigned int, struct cifs_tcon *, 395 bool); 396 /* check if a path is accessible or not */ 397 int (*is_path_accessible)(const unsigned int, struct cifs_tcon *, 398 struct cifs_sb_info *, const char *); 399 /* query path data from the server */ 400 int (*query_path_info)(const unsigned int xid, 401 struct cifs_tcon *tcon, 402 struct cifs_sb_info *cifs_sb, 403 const char *full_path, 404 struct cifs_open_info_data *data); 405 /* query file data from the server */ 406 int (*query_file_info)(const unsigned int xid, struct cifs_tcon *tcon, 407 struct cifsFileInfo *cfile, struct cifs_open_info_data *data); 408 /* query reparse point to determine which type of special file */ 409 int (*query_reparse_point)(const unsigned int xid, 410 struct cifs_tcon *tcon, 411 struct cifs_sb_info *cifs_sb, 412 const char *full_path, 413 u32 *tag, struct kvec *rsp, 414 int *rsp_buftype); 415 /* get server index number */ 416 int (*get_srv_inum)(const unsigned int xid, struct cifs_tcon *tcon, 417 struct cifs_sb_info *cifs_sb, const char *full_path, u64 *uniqueid, 418 struct cifs_open_info_data *data); 419 /* set size by path */ 420 int (*set_path_size)(const unsigned int, struct cifs_tcon *, 421 const char *, __u64, struct cifs_sb_info *, bool, 422 struct dentry *); 423 /* set size by file handle */ 424 int (*set_file_size)(const unsigned int, struct cifs_tcon *, 425 struct cifsFileInfo *, __u64, bool); 426 /* set attributes */ 427 int (*set_file_info)(struct inode *, const char *, FILE_BASIC_INFO *, 428 const unsigned int); 429 int (*set_compression)(const unsigned int, struct cifs_tcon *, 430 struct cifsFileInfo *); 431 /* check if we can send an echo or nor */ 432 bool (*can_echo)(struct TCP_Server_Info *); 433 /* send echo request */ 434 int (*echo)(struct TCP_Server_Info *); 435 /* create directory */ 436 int (*posix_mkdir)(const unsigned int xid, struct inode *inode, 437 umode_t mode, struct cifs_tcon *tcon, 438 const char *full_path, 439 struct cifs_sb_info *cifs_sb); 440 int (*mkdir)(const unsigned int xid, struct inode *inode, umode_t mode, 441 struct cifs_tcon *tcon, const char *name, 442 struct cifs_sb_info *sb); 443 /* set info on created directory */ 444 void (*mkdir_setinfo)(struct inode *, const char *, 445 struct cifs_sb_info *, struct cifs_tcon *, 446 const unsigned int); 447 /* remove directory */ 448 int (*rmdir)(const unsigned int, struct cifs_tcon *, const char *, 449 struct cifs_sb_info *); 450 /* unlink file */ 451 int (*unlink)(const unsigned int, struct cifs_tcon *, const char *, 452 struct cifs_sb_info *, struct dentry *); 453 /* open, rename and delete file */ 454 int (*rename_pending_delete)(const char *, struct dentry *, 455 const unsigned int); 456 /* send rename request */ 457 int (*rename)(const unsigned int xid, 458 struct cifs_tcon *tcon, 459 struct dentry *source_dentry, 460 const char *from_name, const char *to_name, 461 struct cifs_sb_info *cifs_sb); 462 /* send create hardlink request */ 463 int (*create_hardlink)(const unsigned int xid, 464 struct cifs_tcon *tcon, 465 struct dentry *source_dentry, 466 const char *from_name, const char *to_name, 467 struct cifs_sb_info *cifs_sb); 468 /* query symlink target */ 469 int (*query_symlink)(const unsigned int xid, 470 struct cifs_tcon *tcon, 471 struct cifs_sb_info *cifs_sb, 472 const char *full_path, 473 char **target_path); 474 /* open a file for non-posix mounts */ 475 int (*open)(const unsigned int xid, struct cifs_open_parms *oparms, __u32 *oplock, 476 void *buf); 477 /* set fid protocol-specific info */ 478 void (*set_fid)(struct cifsFileInfo *, struct cifs_fid *, __u32); 479 /* close a file */ 480 int (*close)(const unsigned int, struct cifs_tcon *, 481 struct cifs_fid *); 482 /* close a file, returning file attributes and timestamps */ 483 int (*close_getattr)(const unsigned int xid, struct cifs_tcon *tcon, 484 struct cifsFileInfo *pfile_info); 485 /* send a flush request to the server */ 486 int (*flush)(const unsigned int, struct cifs_tcon *, struct cifs_fid *); 487 /* async read from the server */ 488 int (*async_readv)(struct cifs_io_subrequest *); 489 /* async write to the server */ 490 void (*async_writev)(struct cifs_io_subrequest *); 491 /* sync read from the server */ 492 int (*sync_read)(const unsigned int, struct cifs_fid *, 493 struct cifs_io_parms *, unsigned int *, char **, 494 int *); 495 /* sync write to the server */ 496 int (*sync_write)(const unsigned int, struct cifs_fid *, 497 struct cifs_io_parms *, unsigned int *, struct kvec *, 498 unsigned long); 499 /* open dir, start readdir */ 500 int (*query_dir_first)(const unsigned int, struct cifs_tcon *, 501 const char *, struct cifs_sb_info *, 502 struct cifs_fid *, __u16, 503 struct cifs_search_info *); 504 /* continue readdir */ 505 int (*query_dir_next)(const unsigned int, struct cifs_tcon *, 506 struct cifs_fid *, 507 __u16, struct cifs_search_info *srch_inf); 508 /* close dir */ 509 int (*close_dir)(const unsigned int, struct cifs_tcon *, 510 struct cifs_fid *); 511 /* calculate a size of SMB message */ 512 unsigned int (*calc_smb_size)(void *buf); 513 /* check for STATUS_PENDING and process the response if yes */ 514 bool (*is_status_pending)(char *buf, struct TCP_Server_Info *server); 515 /* check for STATUS_NETWORK_SESSION_EXPIRED */ 516 bool (*is_session_expired)(char *); 517 /* send oplock break response */ 518 int (*oplock_response)(struct cifs_tcon *tcon, __u64 persistent_fid, __u64 volatile_fid, 519 __u16 net_fid, struct cifsInodeInfo *cifs_inode); 520 /* query remote filesystem */ 521 int (*queryfs)(const unsigned int, struct cifs_tcon *, 522 const char *, struct cifs_sb_info *, struct kstatfs *); 523 /* send mandatory brlock to the server */ 524 int (*mand_lock)(const unsigned int, struct cifsFileInfo *, __u64, 525 __u64, __u32, int, int, bool); 526 /* unlock range of mandatory locks */ 527 int (*mand_unlock_range)(struct cifsFileInfo *, struct file_lock *, 528 const unsigned int); 529 /* push brlocks from the cache to the server */ 530 int (*push_mand_locks)(struct cifsFileInfo *); 531 /* get lease key of the inode */ 532 void (*get_lease_key)(struct inode *, struct cifs_fid *); 533 /* set lease key of the inode */ 534 void (*set_lease_key)(struct inode *, struct cifs_fid *); 535 /* generate new lease key */ 536 void (*new_lease_key)(struct cifs_fid *); 537 int (*generate_signingkey)(struct cifs_ses *ses, 538 struct TCP_Server_Info *server); 539 int (*calc_signature)(struct smb_rqst *, struct TCP_Server_Info *, 540 bool allocate_crypto); 541 int (*set_integrity)(const unsigned int, struct cifs_tcon *tcon, 542 struct cifsFileInfo *src_file); 543 int (*enum_snapshots)(const unsigned int xid, struct cifs_tcon *tcon, 544 struct cifsFileInfo *src_file, void __user *); 545 int (*notify)(const unsigned int xid, struct file *pfile, 546 void __user *pbuf, bool return_changes); 547 int (*query_mf_symlink)(unsigned int, struct cifs_tcon *, 548 struct cifs_sb_info *, const unsigned char *, 549 char *, unsigned int *); 550 int (*create_mf_symlink)(unsigned int, struct cifs_tcon *, 551 struct cifs_sb_info *, const unsigned char *, 552 char *, unsigned int *); 553 /* if we can do cache read operations */ 554 bool (*is_read_op)(__u32); 555 /* set oplock level for the inode */ 556 void (*set_oplock_level)(struct cifsInodeInfo *cinode, __u32 oplock, __u16 epoch, 557 bool *purge_cache); 558 /* create lease context buffer for CREATE request */ 559 char * (*create_lease_buf)(u8 *lease_key, u8 oplock); 560 /* parse lease context buffer and return oplock/epoch info */ 561 __u8 (*parse_lease_buf)(void *buf, __u16 *epoch, char *lkey); 562 ssize_t (*copychunk_range)(const unsigned int, 563 struct cifsFileInfo *src_file, 564 struct cifsFileInfo *target_file, 565 u64 src_off, u64 len, u64 dest_off); 566 int (*duplicate_extents)(const unsigned int, struct cifsFileInfo *src, 567 struct cifsFileInfo *target_file, u64 src_off, u64 len, 568 u64 dest_off); 569 int (*validate_negotiate)(const unsigned int, struct cifs_tcon *); 570 ssize_t (*query_all_EAs)(const unsigned int, struct cifs_tcon *, 571 const unsigned char *, const unsigned char *, char *, 572 size_t, struct cifs_sb_info *); 573 int (*set_EA)(const unsigned int, struct cifs_tcon *, const char *, 574 const char *, const void *, const __u16, 575 const struct nls_table *, struct cifs_sb_info *); 576 struct smb_ntsd * (*get_acl)(struct cifs_sb_info *cifssb, struct inode *ino, 577 const char *patch, u32 *plen, u32 info); 578 struct smb_ntsd * (*get_acl_by_fid)(struct cifs_sb_info *cifssmb, 579 const struct cifs_fid *pfid, u32 *plen, u32 info); 580 int (*set_acl)(struct smb_ntsd *pntsd, __u32 len, struct inode *ino, const char *path, 581 int flag); 582 /* writepages retry size */ 583 unsigned int (*wp_retry_size)(struct inode *); 584 /* get mtu credits */ 585 int (*wait_mtu_credits)(struct TCP_Server_Info *, size_t, 586 size_t *, struct cifs_credits *); 587 /* adjust previously taken mtu credits to request size */ 588 int (*adjust_credits)(struct TCP_Server_Info *server, 589 struct cifs_io_subrequest *subreq, 590 unsigned int /*enum smb3_rw_credits_trace*/ trace); 591 /* check if we need to issue closedir */ 592 bool (*dir_needs_close)(struct cifsFileInfo *); 593 long (*fallocate)(struct file *, struct cifs_tcon *, int, loff_t, 594 loff_t); 595 /* init transform (compress/encrypt) request */ 596 int (*init_transform_rq)(struct TCP_Server_Info *, int num_rqst, 597 struct smb_rqst *, struct smb_rqst *); 598 int (*is_transform_hdr)(void *buf); 599 int (*receive_transform)(struct TCP_Server_Info *, 600 struct mid_q_entry **, char **, int *); 601 enum securityEnum (*select_sectype)(struct TCP_Server_Info *, 602 enum securityEnum); 603 int (*next_header)(struct TCP_Server_Info *server, char *buf, 604 unsigned int *noff); 605 /* ioctl passthrough for query_info */ 606 int (*ioctl_query_info)(const unsigned int xid, 607 struct cifs_tcon *tcon, 608 struct cifs_sb_info *cifs_sb, 609 __le16 *path, int is_dir, 610 unsigned long p); 611 /* make unix special files (block, char, fifo, socket) */ 612 int (*make_node)(unsigned int xid, 613 struct inode *inode, 614 struct dentry *dentry, 615 struct cifs_tcon *tcon, 616 const char *full_path, 617 umode_t mode, 618 dev_t device_number); 619 /* version specific fiemap implementation */ 620 int (*fiemap)(struct cifs_tcon *tcon, struct cifsFileInfo *, 621 struct fiemap_extent_info *, u64, u64); 622 /* version specific llseek implementation */ 623 loff_t (*llseek)(struct file *, struct cifs_tcon *, loff_t, int); 624 /* Check for STATUS_IO_TIMEOUT */ 625 bool (*is_status_io_timeout)(char *buf); 626 /* Check for STATUS_NETWORK_NAME_DELETED */ 627 bool (*is_network_name_deleted)(char *buf, struct TCP_Server_Info *srv); 628 int (*parse_reparse_point)(struct cifs_sb_info *cifs_sb, 629 const char *full_path, 630 struct kvec *rsp_iov, 631 struct cifs_open_info_data *data); 632 int (*create_reparse_symlink)(const unsigned int xid, 633 struct inode *inode, 634 struct dentry *dentry, 635 struct cifs_tcon *tcon, 636 const char *full_path, 637 const char *symname); 638 }; 639 640 struct smb_version_values { 641 char *version_string; 642 __u16 protocol_id; 643 __u32 req_capabilities; 644 __u32 large_lock_type; 645 __u32 exclusive_lock_type; 646 __u32 shared_lock_type; 647 __u32 unlock_lock_type; 648 size_t header_preamble_size; 649 size_t header_size; 650 size_t max_header_size; 651 size_t read_rsp_size; 652 __le16 lock_cmd; 653 unsigned int cap_unix; 654 unsigned int cap_nt_find; 655 unsigned int cap_large_files; 656 unsigned int cap_unicode; 657 __u16 signing_enabled; 658 __u16 signing_required; 659 size_t create_lease_size; 660 }; 661 662 #define HEADER_SIZE(server) (server->vals->header_size) 663 #define MAX_HEADER_SIZE(server) (server->vals->max_header_size) 664 #define HEADER_PREAMBLE_SIZE(server) (server->vals->header_preamble_size) 665 #define MID_HEADER_SIZE(server) (HEADER_SIZE(server) - 1 - HEADER_PREAMBLE_SIZE(server)) 666 667 /** 668 * CIFS superblock mount flags (mnt_cifs_flags) to consider when 669 * trying to reuse existing superblock for a new mount 670 */ 671 #define CIFS_MOUNT_MASK (CIFS_MOUNT_NO_PERM | CIFS_MOUNT_SET_UID | \ 672 CIFS_MOUNT_SERVER_INUM | CIFS_MOUNT_DIRECT_IO | \ 673 CIFS_MOUNT_NO_XATTR | CIFS_MOUNT_MAP_SPECIAL_CHR | \ 674 CIFS_MOUNT_MAP_SFM_CHR | \ 675 CIFS_MOUNT_UNX_EMUL | CIFS_MOUNT_NO_BRL | \ 676 CIFS_MOUNT_CIFS_ACL | CIFS_MOUNT_OVERR_UID | \ 677 CIFS_MOUNT_OVERR_GID | CIFS_MOUNT_DYNPERM | \ 678 CIFS_MOUNT_NOPOSIXBRL | CIFS_MOUNT_NOSSYNC | \ 679 CIFS_MOUNT_FSCACHE | CIFS_MOUNT_MF_SYMLINKS | \ 680 CIFS_MOUNT_MULTIUSER | CIFS_MOUNT_STRICT_IO | \ 681 CIFS_MOUNT_CIFS_BACKUPUID | CIFS_MOUNT_CIFS_BACKUPGID | \ 682 CIFS_MOUNT_UID_FROM_ACL | CIFS_MOUNT_NO_HANDLE_CACHE | \ 683 CIFS_MOUNT_NO_DFS | CIFS_MOUNT_MODE_FROM_SID | \ 684 CIFS_MOUNT_RO_CACHE | CIFS_MOUNT_RW_CACHE) 685 686 /** 687 * Generic VFS superblock mount flags (s_flags) to consider when 688 * trying to reuse existing superblock for a new mount 689 */ 690 #define CIFS_MS_MASK (SB_RDONLY | SB_MANDLOCK | SB_NOEXEC | SB_NOSUID | \ 691 SB_NODEV | SB_SYNCHRONOUS) 692 693 struct cifs_mnt_data { 694 struct cifs_sb_info *cifs_sb; 695 struct smb3_fs_context *ctx; 696 int flags; 697 }; 698 699 static inline unsigned int 700 get_rfc1002_length(void *buf) 701 { 702 return be32_to_cpu(*((__be32 *)buf)) & 0xffffff; 703 } 704 705 static inline void 706 inc_rfc1001_len(void *buf, int count) 707 { 708 be32_add_cpu((__be32 *)buf, count); 709 } 710 711 struct TCP_Server_Info { 712 struct list_head tcp_ses_list; 713 struct list_head smb_ses_list; 714 spinlock_t srv_lock; /* protect anything here that is not protected */ 715 __u64 conn_id; /* connection identifier (useful for debugging) */ 716 int srv_count; /* reference counter */ 717 int rfc1001_sessinit; /* whether to estasblish netbios session */ 718 bool with_rfc1001; /* if netbios session is used */ 719 /* 15 character server name + 0x20 16th byte indicating type = srv */ 720 char server_RFC1001_name[RFC1001_NAME_LEN_WITH_NULL]; 721 struct smb_version_operations *ops; 722 struct smb_version_values *vals; 723 /* updates to tcpStatus protected by cifs_tcp_ses_lock */ 724 enum statusEnum tcpStatus; /* what we think the status is */ 725 char *hostname; /* hostname portion of UNC string */ 726 struct socket *ssocket; 727 struct sockaddr_storage dstaddr; 728 struct sockaddr_storage srcaddr; /* locally bind to this IP */ 729 #ifdef CONFIG_NET_NS 730 struct net *net; 731 #endif 732 wait_queue_head_t response_q; 733 wait_queue_head_t request_q; /* if more than maxmpx to srvr must block*/ 734 spinlock_t mid_lock; /* protect mid queue and it's entries */ 735 struct list_head pending_mid_q; 736 bool noblocksnd; /* use blocking sendmsg */ 737 bool noautotune; /* do not autotune send buf sizes */ 738 bool nosharesock; 739 bool tcp_nodelay; 740 bool terminate; 741 unsigned int credits; /* send no more requests at once */ 742 unsigned int max_credits; /* can override large 32000 default at mnt */ 743 unsigned int in_flight; /* number of requests on the wire to server */ 744 unsigned int max_in_flight; /* max number of requests that were on wire */ 745 spinlock_t req_lock; /* protect the two values above */ 746 struct mutex _srv_mutex; 747 unsigned int nofs_flag; 748 struct task_struct *tsk; 749 char server_GUID[16]; 750 __u16 sec_mode; 751 bool sign; /* is signing enabled on this connection? */ 752 bool ignore_signature:1; /* skip validation of signatures in SMB2/3 rsp */ 753 bool session_estab; /* mark when very first sess is established */ 754 int echo_credits; /* echo reserved slots */ 755 int oplock_credits; /* oplock break reserved slots */ 756 bool echoes:1; /* enable echoes */ 757 __u8 client_guid[SMB2_CLIENT_GUID_SIZE]; /* Client GUID */ 758 u16 dialect; /* dialect index that server chose */ 759 bool oplocks:1; /* enable oplocks */ 760 unsigned int maxReq; /* Clients should submit no more */ 761 /* than maxReq distinct unanswered SMBs to the server when using */ 762 /* multiplexed reads or writes (for SMB1/CIFS only, not SMB2/SMB3) */ 763 unsigned int maxBuf; /* maxBuf specifies the maximum */ 764 /* message size the server can send or receive for non-raw SMBs */ 765 /* maxBuf is returned by SMB NegotiateProtocol so maxBuf is only 0 */ 766 /* when socket is setup (and during reconnect) before NegProt sent */ 767 unsigned int max_rw; /* maxRw specifies the maximum */ 768 /* message size the server can send or receive for */ 769 /* SMB_COM_WRITE_RAW or SMB_COM_READ_RAW. */ 770 unsigned int capabilities; /* selective disabling of caps by smb sess */ 771 int timeAdj; /* Adjust for difference in server time zone in sec */ 772 __u64 CurrentMid; /* multiplex id - rotating counter, protected by GlobalMid_Lock */ 773 char cryptkey[CIFS_CRYPTO_KEY_SIZE]; /* used by ntlm, ntlmv2 etc */ 774 /* 16th byte of RFC1001 workstation name is always null */ 775 char workstation_RFC1001_name[RFC1001_NAME_LEN_WITH_NULL]; 776 __u32 sequence_number; /* for signing, protected by srv_mutex */ 777 __u32 reconnect_instance; /* incremented on each reconnect */ 778 struct session_key session_key; 779 unsigned long lstrp; /* when we got last response from this server */ 780 struct cifs_secmech secmech; /* crypto sec mech functs, descriptors */ 781 #define CIFS_NEGFLAVOR_UNENCAP 1 /* wct == 17, but no ext_sec */ 782 #define CIFS_NEGFLAVOR_EXTENDED 2 /* wct == 17, ext_sec bit set */ 783 char negflavor; /* NEGOTIATE response flavor */ 784 /* extended security flavors that server supports */ 785 bool sec_ntlmssp; /* supports NTLMSSP */ 786 bool sec_kerberosu2u; /* supports U2U Kerberos */ 787 bool sec_kerberos; /* supports plain Kerberos */ 788 bool sec_mskerberos; /* supports legacy MS Kerberos */ 789 bool sec_iakerb; /* supports pass-through auth for Kerberos (krb5 proxy) */ 790 bool large_buf; /* is current buffer large? */ 791 /* use SMBD connection instead of socket */ 792 bool rdma; 793 /* point to the SMBD connection if RDMA is used instead of socket */ 794 struct smbd_connection *smbd_conn; 795 struct delayed_work echo; /* echo ping workqueue job */ 796 char *smallbuf; /* pointer to current "small" buffer */ 797 char *bigbuf; /* pointer to current "big" buffer */ 798 /* Total size of this PDU. Only valid from cifs_demultiplex_thread */ 799 unsigned int pdu_size; 800 unsigned int total_read; /* total amount of data read in this pass */ 801 atomic_t in_send; /* requests trying to send */ 802 atomic_t num_waiters; /* blocked waiting to get in sendrecv */ 803 #ifdef CONFIG_CIFS_STATS2 804 atomic_t num_cmds[NUMBER_OF_SMB2_COMMANDS]; /* total requests by cmd */ 805 atomic_t smb2slowcmd[NUMBER_OF_SMB2_COMMANDS]; /* count resps > 1 sec */ 806 __u64 time_per_cmd[NUMBER_OF_SMB2_COMMANDS]; /* total time per cmd */ 807 __u32 slowest_cmd[NUMBER_OF_SMB2_COMMANDS]; 808 __u32 fastest_cmd[NUMBER_OF_SMB2_COMMANDS]; 809 #endif /* STATS2 */ 810 unsigned int max_read; 811 unsigned int max_write; 812 unsigned int min_offload; 813 unsigned int retrans; 814 struct { 815 bool requested; /* "compress" mount option set*/ 816 bool enabled; /* actually negotiated with server */ 817 __le16 alg; /* preferred alg negotiated with server */ 818 } compression; 819 __u16 signing_algorithm; 820 __le16 cipher_type; 821 /* save initial negprot hash */ 822 __u8 preauth_sha_hash[SMB2_PREAUTH_HASH_SIZE]; 823 bool signing_negotiated; /* true if valid signing context rcvd from server */ 824 bool posix_ext_supported; 825 struct delayed_work reconnect; /* reconnect workqueue job */ 826 struct mutex reconnect_mutex; /* prevent simultaneous reconnects */ 827 unsigned long echo_interval; 828 829 /* 830 * Number of targets available for reconnect. The more targets 831 * the more tasks have to wait to let the demultiplex thread 832 * reconnect. 833 */ 834 int nr_targets; 835 bool noblockcnt; /* use non-blocking connect() */ 836 837 /* 838 * If this is a session channel, 839 * primary_server holds the ref-counted 840 * pointer to primary channel connection for the session. 841 */ 842 #define SERVER_IS_CHAN(server) (!!(server)->primary_server) 843 struct TCP_Server_Info *primary_server; 844 __u16 channel_sequence_num; /* incremented on primary channel on each chan reconnect */ 845 846 #ifdef CONFIG_CIFS_SWN_UPCALL 847 bool use_swn_dstaddr; 848 struct sockaddr_storage swn_dstaddr; 849 #endif 850 /* 851 * Canonical DFS referral path used in cifs_reconnect() for failover as 852 * well as in DFS cache refresher. 853 * 854 * format: \\HOST\SHARE[\OPTIONAL PATH] 855 */ 856 char *leaf_fullpath; 857 bool dfs_conn:1; 858 char dns_dom[CIFS_MAX_DOMAINNAME_LEN + 1]; 859 }; 860 861 static inline bool is_smb1(struct TCP_Server_Info *server) 862 { 863 return HEADER_PREAMBLE_SIZE(server) != 0; 864 } 865 866 static inline void cifs_server_lock(struct TCP_Server_Info *server) 867 { 868 unsigned int nofs_flag = memalloc_nofs_save(); 869 870 mutex_lock(&server->_srv_mutex); 871 server->nofs_flag = nofs_flag; 872 } 873 874 static inline void cifs_server_unlock(struct TCP_Server_Info *server) 875 { 876 unsigned int nofs_flag = server->nofs_flag; 877 878 mutex_unlock(&server->_srv_mutex); 879 memalloc_nofs_restore(nofs_flag); 880 } 881 882 struct cifs_credits { 883 unsigned int value; 884 unsigned int instance; 885 unsigned int in_flight_check; 886 unsigned int rreq_debug_id; 887 unsigned int rreq_debug_index; 888 }; 889 890 static inline unsigned int 891 in_flight(struct TCP_Server_Info *server) 892 { 893 unsigned int num; 894 895 spin_lock(&server->req_lock); 896 num = server->in_flight; 897 spin_unlock(&server->req_lock); 898 return num; 899 } 900 901 static inline bool 902 has_credits(struct TCP_Server_Info *server, int *credits, int num_credits) 903 { 904 int num; 905 906 spin_lock(&server->req_lock); 907 num = *credits; 908 spin_unlock(&server->req_lock); 909 return num >= num_credits; 910 } 911 912 static inline void 913 add_credits(struct TCP_Server_Info *server, struct cifs_credits *credits, 914 const int optype) 915 { 916 server->ops->add_credits(server, credits, optype); 917 } 918 919 static inline void 920 add_credits_and_wake_if(struct TCP_Server_Info *server, 921 struct cifs_credits *credits, const int optype) 922 { 923 if (credits->value) { 924 server->ops->add_credits(server, credits, optype); 925 wake_up(&server->request_q); 926 credits->value = 0; 927 } 928 } 929 930 static inline void 931 set_credits(struct TCP_Server_Info *server, const int val) 932 { 933 server->ops->set_credits(server, val); 934 } 935 936 static inline int 937 adjust_credits(struct TCP_Server_Info *server, struct cifs_io_subrequest *subreq, 938 unsigned int /* enum smb3_rw_credits_trace */ trace) 939 { 940 return server->ops->adjust_credits ? 941 server->ops->adjust_credits(server, subreq, trace) : 0; 942 } 943 944 static inline __le64 945 get_next_mid64(struct TCP_Server_Info *server) 946 { 947 return cpu_to_le64(server->ops->get_next_mid(server)); 948 } 949 950 static inline __le16 951 get_next_mid(struct TCP_Server_Info *server) 952 { 953 __u16 mid = server->ops->get_next_mid(server); 954 /* 955 * The value in the SMB header should be little endian for easy 956 * on-the-wire decoding. 957 */ 958 return cpu_to_le16(mid); 959 } 960 961 static inline void 962 revert_current_mid(struct TCP_Server_Info *server, const unsigned int val) 963 { 964 if (server->ops->revert_current_mid) 965 server->ops->revert_current_mid(server, val); 966 } 967 968 static inline void 969 revert_current_mid_from_hdr(struct TCP_Server_Info *server, 970 const struct smb2_hdr *shdr) 971 { 972 unsigned int num = le16_to_cpu(shdr->CreditCharge); 973 974 return revert_current_mid(server, num > 0 ? num : 1); 975 } 976 977 static inline __u16 978 get_mid(const struct smb_hdr *smb) 979 { 980 return le16_to_cpu(smb->Mid); 981 } 982 983 static inline bool 984 compare_mid(__u16 mid, const struct smb_hdr *smb) 985 { 986 return mid == le16_to_cpu(smb->Mid); 987 } 988 989 /* 990 * When the server supports very large reads and writes via POSIX extensions, 991 * we can allow up to 2^24-1, minus the size of a READ/WRITE_AND_X header, not 992 * including the RFC1001 length. 993 * 994 * Note that this might make for "interesting" allocation problems during 995 * writeback however as we have to allocate an array of pointers for the 996 * pages. A 16M write means ~32kb page array with PAGE_SIZE == 4096. 997 * 998 * For reads, there is a similar problem as we need to allocate an array 999 * of kvecs to handle the receive, though that should only need to be done 1000 * once. 1001 */ 1002 #define CIFS_MAX_WSIZE ((1<<24) - 1 - sizeof(WRITE_REQ) + 4) 1003 #define CIFS_MAX_RSIZE ((1<<24) - sizeof(READ_RSP) + 4) 1004 1005 /* 1006 * When the server doesn't allow large posix writes, only allow a rsize/wsize 1007 * of 2^17-1 minus the size of the call header. That allows for a read or 1008 * write up to the maximum size described by RFC1002. 1009 */ 1010 #define CIFS_MAX_RFC1002_WSIZE ((1<<17) - 1 - sizeof(WRITE_REQ) + 4) 1011 #define CIFS_MAX_RFC1002_RSIZE ((1<<17) - 1 - sizeof(READ_RSP) + 4) 1012 1013 #define CIFS_DEFAULT_IOSIZE (1024 * 1024) 1014 1015 /* 1016 * Windows only supports a max of 60kb reads and 65535 byte writes. Default to 1017 * those values when posix extensions aren't in force. In actuality here, we 1018 * use 65536 to allow for a write that is a multiple of 4k. Most servers seem 1019 * to be ok with the extra byte even though Windows doesn't send writes that 1020 * are that large. 1021 * 1022 * Citation: 1023 * 1024 * https://blogs.msdn.com/b/openspecification/archive/2009/04/10/smb-maximum-transmit-buffer-size-and-performance-tuning.aspx 1025 */ 1026 #define CIFS_DEFAULT_NON_POSIX_RSIZE (60 * 1024) 1027 #define CIFS_DEFAULT_NON_POSIX_WSIZE (65536) 1028 1029 /* 1030 * Macros to allow the TCP_Server_Info->net field and related code to drop out 1031 * when CONFIG_NET_NS isn't set. 1032 */ 1033 1034 #ifdef CONFIG_NET_NS 1035 1036 static inline struct net *cifs_net_ns(struct TCP_Server_Info *srv) 1037 { 1038 return srv->net; 1039 } 1040 1041 static inline void cifs_set_net_ns(struct TCP_Server_Info *srv, struct net *net) 1042 { 1043 srv->net = net; 1044 } 1045 1046 #else 1047 1048 static inline struct net *cifs_net_ns(struct TCP_Server_Info *srv) 1049 { 1050 return &init_net; 1051 } 1052 1053 static inline void cifs_set_net_ns(struct TCP_Server_Info *srv, struct net *net) 1054 { 1055 } 1056 1057 #endif 1058 1059 struct cifs_server_iface { 1060 struct list_head iface_head; 1061 struct kref refcount; 1062 size_t speed; 1063 size_t weight_fulfilled; 1064 unsigned int num_channels; 1065 unsigned int rdma_capable : 1; 1066 unsigned int rss_capable : 1; 1067 unsigned int is_active : 1; /* unset if non existent */ 1068 struct sockaddr_storage sockaddr; 1069 }; 1070 1071 /* release iface when last ref is dropped */ 1072 static inline void 1073 release_iface(struct kref *ref) 1074 { 1075 struct cifs_server_iface *iface = container_of(ref, 1076 struct cifs_server_iface, 1077 refcount); 1078 kfree(iface); 1079 } 1080 1081 struct cifs_chan { 1082 unsigned int in_reconnect : 1; /* if session setup in progress for this channel */ 1083 struct TCP_Server_Info *server; 1084 struct cifs_server_iface *iface; /* interface in use */ 1085 __u8 signkey[SMB3_SIGN_KEY_SIZE]; 1086 }; 1087 1088 #define CIFS_SES_FLAG_SCALE_CHANNELS (0x1) 1089 1090 /* 1091 * Session structure. One of these for each uid session with a particular host 1092 */ 1093 struct cifs_ses { 1094 struct list_head smb_ses_list; 1095 struct list_head rlist; /* reconnect list */ 1096 struct list_head tcon_list; 1097 struct list_head dlist; /* dfs list */ 1098 struct cifs_tcon *tcon_ipc; 1099 spinlock_t ses_lock; /* protect anything here that is not protected */ 1100 struct mutex session_mutex; 1101 struct TCP_Server_Info *server; /* pointer to server info */ 1102 int ses_count; /* reference counter */ 1103 enum ses_status_enum ses_status; /* updates protected by cifs_tcp_ses_lock */ 1104 unsigned int overrideSecFlg; /* if non-zero override global sec flags */ 1105 char *serverOS; /* name of operating system underlying server */ 1106 char *serverNOS; /* name of network operating system of server */ 1107 char *serverDomain; /* security realm of server */ 1108 __u64 Suid; /* remote smb uid */ 1109 kuid_t linux_uid; /* overriding owner of files on the mount */ 1110 kuid_t cred_uid; /* owner of credentials */ 1111 unsigned int capabilities; 1112 char ip_addr[INET6_ADDRSTRLEN + 1]; /* Max ipv6 (or v4) addr string len */ 1113 char *user_name; /* must not be null except during init of sess 1114 and after mount option parsing we fill it */ 1115 char *domainName; 1116 char *password; 1117 char *password2; /* When key rotation used, new password may be set before it expires */ 1118 char workstation_name[CIFS_MAX_WORKSTATION_LEN]; 1119 struct session_key auth_key; 1120 struct ntlmssp_auth *ntlmssp; /* ciphertext, flags, server challenge */ 1121 enum securityEnum sectype; /* what security flavor was specified? */ 1122 enum upcall_target_enum upcall_target; /* what upcall target was specified? */ 1123 bool sign; /* is signing required? */ 1124 bool domainAuto:1; 1125 bool expired_pwd; /* track if access denied or expired pwd so can know if need to update */ 1126 int unicode; 1127 unsigned int flags; 1128 __u16 session_flags; 1129 __u8 smb3signingkey[SMB3_SIGN_KEY_SIZE]; 1130 __u8 smb3encryptionkey[SMB3_ENC_DEC_KEY_SIZE]; 1131 __u8 smb3decryptionkey[SMB3_ENC_DEC_KEY_SIZE]; 1132 __u8 preauth_sha_hash[SMB2_PREAUTH_HASH_SIZE]; 1133 1134 /* 1135 * Network interfaces available on the server this session is 1136 * connected to. 1137 * 1138 * Other channels can be opened by connecting and binding this 1139 * session to interfaces from this list. 1140 * 1141 * iface_lock should be taken when accessing any of these fields 1142 */ 1143 spinlock_t iface_lock; 1144 /* ========= begin: protected by iface_lock ======== */ 1145 struct list_head iface_list; 1146 size_t iface_count; 1147 unsigned long iface_last_update; /* jiffies */ 1148 /* ========= end: protected by iface_lock ======== */ 1149 1150 spinlock_t chan_lock; 1151 /* ========= begin: protected by chan_lock ======== */ 1152 #define CIFS_MAX_CHANNELS 16 1153 #define CIFS_INVAL_CHAN_INDEX (-1) 1154 #define CIFS_ALL_CHANNELS_SET(ses) \ 1155 ((1UL << (ses)->chan_count) - 1) 1156 #define CIFS_ALL_CHANS_GOOD(ses) \ 1157 (!(ses)->chans_need_reconnect) 1158 #define CIFS_ALL_CHANS_NEED_RECONNECT(ses) \ 1159 ((ses)->chans_need_reconnect == CIFS_ALL_CHANNELS_SET(ses)) 1160 #define CIFS_SET_ALL_CHANS_NEED_RECONNECT(ses) \ 1161 ((ses)->chans_need_reconnect = CIFS_ALL_CHANNELS_SET(ses)) 1162 #define CIFS_CHAN_NEEDS_RECONNECT(ses, index) \ 1163 test_bit((index), &(ses)->chans_need_reconnect) 1164 #define CIFS_CHAN_IN_RECONNECT(ses, index) \ 1165 ((ses)->chans[(index)].in_reconnect) 1166 1167 struct cifs_chan chans[CIFS_MAX_CHANNELS]; 1168 size_t chan_count; 1169 size_t chan_max; 1170 atomic_t chan_seq; /* round robin state */ 1171 1172 /* 1173 * chans_need_reconnect is a bitmap indicating which of the channels 1174 * under this smb session needs to be reconnected. 1175 * If not multichannel session, only one bit will be used. 1176 * 1177 * We will ask for sess and tcon reconnection only if all the 1178 * channels are marked for needing reconnection. This will 1179 * enable the sessions on top to continue to live till any 1180 * of the channels below are active. 1181 */ 1182 unsigned long chans_need_reconnect; 1183 /* ========= end: protected by chan_lock ======== */ 1184 struct cifs_ses *dfs_root_ses; 1185 struct nls_table *local_nls; 1186 char *dns_dom; /* FQDN of the domain */ 1187 }; 1188 1189 static inline bool 1190 cap_unix(struct cifs_ses *ses) 1191 { 1192 return ses->server->vals->cap_unix & ses->capabilities; 1193 } 1194 1195 /* 1196 * common struct for holding inode info when searching for or updating an 1197 * inode with new info 1198 */ 1199 1200 #define CIFS_FATTR_JUNCTION 0x1 1201 #define CIFS_FATTR_DELETE_PENDING 0x2 1202 #define CIFS_FATTR_NEED_REVAL 0x4 1203 #define CIFS_FATTR_INO_COLLISION 0x8 1204 #define CIFS_FATTR_UNKNOWN_NLINK 0x10 1205 #define CIFS_FATTR_FAKE_ROOT_INO 0x20 1206 1207 struct cifs_fattr { 1208 u32 cf_flags; 1209 u32 cf_cifsattrs; 1210 u64 cf_uniqueid; 1211 u64 cf_eof; 1212 u64 cf_bytes; 1213 u64 cf_createtime; 1214 kuid_t cf_uid; 1215 kgid_t cf_gid; 1216 umode_t cf_mode; 1217 dev_t cf_rdev; 1218 unsigned int cf_nlink; 1219 unsigned int cf_dtype; 1220 struct timespec64 cf_atime; 1221 struct timespec64 cf_mtime; 1222 struct timespec64 cf_ctime; 1223 u32 cf_cifstag; 1224 char *cf_symlink_target; 1225 }; 1226 1227 /* 1228 * there is one of these for each connection to a resource on a particular 1229 * session 1230 */ 1231 struct cifs_tcon { 1232 struct list_head tcon_list; 1233 int debug_id; /* Debugging for tracing */ 1234 int tc_count; 1235 struct list_head rlist; /* reconnect list */ 1236 spinlock_t tc_lock; /* protect anything here that is not protected */ 1237 atomic_t num_local_opens; /* num of all opens including disconnected */ 1238 atomic_t num_remote_opens; /* num of all network opens on server */ 1239 struct list_head openFileList; 1240 spinlock_t open_file_lock; /* protects list above */ 1241 struct cifs_ses *ses; /* pointer to session associated with */ 1242 char tree_name[MAX_TREE_SIZE + 1]; /* UNC name of resource in ASCII */ 1243 char *nativeFileSystem; 1244 char *password; /* for share-level security */ 1245 __u32 tid; /* The 4 byte tree id */ 1246 __u16 Flags; /* optional support bits */ 1247 enum tid_status_enum status; 1248 atomic_t num_smbs_sent; 1249 union { 1250 struct { 1251 atomic_t num_writes; 1252 atomic_t num_reads; 1253 atomic_t num_flushes; 1254 atomic_t num_oplock_brks; 1255 atomic_t num_opens; 1256 atomic_t num_closes; 1257 atomic_t num_deletes; 1258 atomic_t num_mkdirs; 1259 atomic_t num_posixopens; 1260 atomic_t num_posixmkdirs; 1261 atomic_t num_rmdirs; 1262 atomic_t num_renames; 1263 atomic_t num_t2renames; 1264 atomic_t num_ffirst; 1265 atomic_t num_fnext; 1266 atomic_t num_fclose; 1267 atomic_t num_hardlinks; 1268 atomic_t num_symlinks; 1269 atomic_t num_locks; 1270 atomic_t num_acl_get; 1271 atomic_t num_acl_set; 1272 } cifs_stats; 1273 struct { 1274 atomic_t smb2_com_sent[NUMBER_OF_SMB2_COMMANDS]; 1275 atomic_t smb2_com_failed[NUMBER_OF_SMB2_COMMANDS]; 1276 } smb2_stats; 1277 } stats; 1278 __u64 bytes_read; 1279 __u64 bytes_written; 1280 spinlock_t stat_lock; /* protects the two fields above */ 1281 time64_t stats_from_time; 1282 FILE_SYSTEM_DEVICE_INFO fsDevInfo; 1283 FILE_SYSTEM_ATTRIBUTE_INFO fsAttrInfo; /* ok if fs name truncated */ 1284 FILE_SYSTEM_UNIX_INFO fsUnixInfo; 1285 bool ipc:1; /* set if connection to IPC$ share (always also pipe) */ 1286 bool pipe:1; /* set if connection to pipe share */ 1287 bool print:1; /* set if connection to printer share */ 1288 bool retry:1; 1289 bool nocase:1; 1290 bool nohandlecache:1; /* if strange server resource prob can turn off */ 1291 bool nodelete:1; 1292 bool seal:1; /* transport encryption for this mounted share */ 1293 bool unix_ext:1; /* if false disable Linux extensions to CIFS protocol 1294 for this mount even if server would support */ 1295 bool posix_extensions; /* if true SMB3.11 posix extensions enabled */ 1296 bool local_lease:1; /* check leases (only) on local system not remote */ 1297 bool broken_posix_open; /* e.g. Samba server versions < 3.3.2, 3.2.9 */ 1298 bool broken_sparse_sup; /* if server or share does not support sparse */ 1299 bool need_reconnect:1; /* connection reset, tid now invalid */ 1300 bool need_reopen_files:1; /* need to reopen tcon file handles */ 1301 bool use_resilient:1; /* use resilient instead of durable handles */ 1302 bool use_persistent:1; /* use persistent instead of durable handles */ 1303 bool no_lease:1; /* Do not request leases on files or directories */ 1304 bool use_witness:1; /* use witness protocol */ 1305 __le32 capabilities; 1306 __u32 share_flags; 1307 __u32 maximal_access; 1308 __u32 vol_serial_number; 1309 __le64 vol_create_time; 1310 __u64 snapshot_time; /* for timewarp tokens - timestamp of snapshot */ 1311 __u32 handle_timeout; /* persistent and durable handle timeout in ms */ 1312 __u32 ss_flags; /* sector size flags */ 1313 __u32 perf_sector_size; /* best sector size for perf */ 1314 __u32 max_chunks; 1315 __u32 max_bytes_chunk; 1316 __u32 max_bytes_copy; 1317 __u32 max_cached_dirs; 1318 #ifdef CONFIG_CIFS_FSCACHE 1319 u64 resource_id; /* server resource id */ 1320 bool fscache_acquired; /* T if we've tried acquiring a cookie */ 1321 struct fscache_volume *fscache; /* cookie for share */ 1322 struct mutex fscache_lock; /* Prevent regetting a cookie */ 1323 #endif 1324 struct list_head pending_opens; /* list of incomplete opens */ 1325 struct cached_fids *cfids; 1326 struct list_head cifs_sb_list; 1327 spinlock_t sb_list_lock; 1328 #ifdef CONFIG_CIFS_DFS_UPCALL 1329 struct delayed_work dfs_cache_work; 1330 struct list_head dfs_ses_list; 1331 #endif 1332 struct delayed_work query_interfaces; /* query interfaces workqueue job */ 1333 char *origin_fullpath; /* canonical copy of smb3_fs_context::source */ 1334 }; 1335 1336 /* 1337 * This is a refcounted and timestamped container for a tcon pointer. The 1338 * container holds a tcon reference. It is considered safe to free one of 1339 * these when the tl_count goes to 0. The tl_time is the time of the last 1340 * "get" on the container. 1341 */ 1342 struct tcon_link { 1343 struct rb_node tl_rbnode; 1344 kuid_t tl_uid; 1345 unsigned long tl_flags; 1346 #define TCON_LINK_MASTER 0 1347 #define TCON_LINK_PENDING 1 1348 #define TCON_LINK_IN_TREE 2 1349 unsigned long tl_time; 1350 atomic_t tl_count; 1351 struct cifs_tcon *tl_tcon; 1352 }; 1353 1354 extern struct tcon_link *cifs_sb_tlink(struct cifs_sb_info *cifs_sb); 1355 extern void smb3_free_compound_rqst(int num_rqst, struct smb_rqst *rqst); 1356 1357 static inline struct cifs_tcon * 1358 tlink_tcon(struct tcon_link *tlink) 1359 { 1360 return tlink->tl_tcon; 1361 } 1362 1363 static inline struct tcon_link * 1364 cifs_sb_master_tlink(struct cifs_sb_info *cifs_sb) 1365 { 1366 return cifs_sb->master_tlink; 1367 } 1368 1369 extern void cifs_put_tlink(struct tcon_link *tlink); 1370 1371 static inline struct tcon_link * 1372 cifs_get_tlink(struct tcon_link *tlink) 1373 { 1374 if (tlink && !IS_ERR(tlink)) 1375 atomic_inc(&tlink->tl_count); 1376 return tlink; 1377 } 1378 1379 /* This function is always expected to succeed */ 1380 extern struct cifs_tcon *cifs_sb_master_tcon(struct cifs_sb_info *cifs_sb); 1381 1382 #define CIFS_OPLOCK_NO_CHANGE 0xfe 1383 1384 struct cifs_pending_open { 1385 struct list_head olist; 1386 struct tcon_link *tlink; 1387 __u8 lease_key[16]; 1388 __u32 oplock; 1389 }; 1390 1391 struct cifs_deferred_close { 1392 struct list_head dlist; 1393 struct tcon_link *tlink; 1394 __u16 netfid; 1395 __u64 persistent_fid; 1396 __u64 volatile_fid; 1397 }; 1398 1399 /* 1400 * This info hangs off the cifsFileInfo structure, pointed to by llist. 1401 * This is used to track byte stream locks on the file 1402 */ 1403 struct cifsLockInfo { 1404 struct list_head llist; /* pointer to next cifsLockInfo */ 1405 struct list_head blist; /* pointer to locks blocked on this */ 1406 wait_queue_head_t block_q; 1407 __u64 offset; 1408 __u64 length; 1409 __u32 pid; 1410 __u16 type; 1411 __u16 flags; 1412 }; 1413 1414 /* 1415 * One of these for each open instance of a file 1416 */ 1417 struct cifs_search_info { 1418 loff_t index_of_last_entry; 1419 __u16 entries_in_buffer; 1420 __u16 info_level; 1421 __u32 resume_key; 1422 char *ntwrk_buf_start; 1423 char *srch_entries_start; 1424 char *last_entry; 1425 const char *presume_name; 1426 unsigned int resume_name_len; 1427 bool endOfSearch:1; 1428 bool emptyDir:1; 1429 bool unicode:1; 1430 bool smallBuf:1; /* so we know which buf_release function to call */ 1431 }; 1432 1433 #define ACL_NO_MODE ((umode_t)(-1)) 1434 struct cifs_open_parms { 1435 struct cifs_tcon *tcon; 1436 struct cifs_sb_info *cifs_sb; 1437 int disposition; 1438 int desired_access; 1439 int create_options; 1440 const char *path; 1441 struct cifs_fid *fid; 1442 umode_t mode; 1443 bool reconnect:1; 1444 bool replay:1; /* indicates that this open is for a replay */ 1445 struct kvec *ea_cctx; 1446 }; 1447 1448 struct cifs_fid { 1449 __u16 netfid; 1450 __u64 persistent_fid; /* persist file id for smb2 */ 1451 __u64 volatile_fid; /* volatile file id for smb2 */ 1452 __u8 lease_key[SMB2_LEASE_KEY_SIZE]; /* lease key for smb2 */ 1453 __u8 create_guid[16]; 1454 __u32 access; 1455 struct cifs_pending_open *pending_open; 1456 __u16 epoch; 1457 #ifdef CONFIG_CIFS_DEBUG2 1458 __u64 mid; 1459 #endif /* CIFS_DEBUG2 */ 1460 bool purge_cache; 1461 }; 1462 1463 struct cifs_fid_locks { 1464 struct list_head llist; 1465 struct cifsFileInfo *cfile; /* fid that owns locks */ 1466 struct list_head locks; /* locks held by fid above */ 1467 }; 1468 1469 struct cifsFileInfo { 1470 /* following two lists are protected by tcon->open_file_lock */ 1471 struct list_head tlist; /* pointer to next fid owned by tcon */ 1472 struct list_head flist; /* next fid (file instance) for this inode */ 1473 /* lock list below protected by cifsi->lock_sem */ 1474 struct cifs_fid_locks *llist; /* brlocks held by this fid */ 1475 kuid_t uid; /* allows finding which FileInfo structure */ 1476 __u32 pid; /* process id who opened file */ 1477 struct cifs_fid fid; /* file id from remote */ 1478 struct list_head rlist; /* reconnect list */ 1479 /* BB add lock scope info here if needed */ 1480 /* lock scope id (0 if none) */ 1481 struct dentry *dentry; 1482 struct tcon_link *tlink; 1483 unsigned int f_flags; 1484 bool invalidHandle:1; /* file closed via session abend */ 1485 bool swapfile:1; 1486 bool oplock_break_cancelled:1; 1487 bool status_file_deleted:1; /* file has been deleted */ 1488 bool offload:1; /* offload final part of _put to a wq */ 1489 __u16 oplock_epoch; /* epoch from the lease break */ 1490 __u32 oplock_level; /* oplock/lease level from the lease break */ 1491 int count; 1492 spinlock_t file_info_lock; /* protects four flag/count fields above */ 1493 struct mutex fh_mutex; /* prevents reopen race after dead ses*/ 1494 struct cifs_search_info srch_inf; 1495 struct work_struct oplock_break; /* work for oplock breaks */ 1496 struct work_struct put; /* work for the final part of _put */ 1497 struct work_struct serverclose; /* work for serverclose */ 1498 struct delayed_work deferred; 1499 bool deferred_close_scheduled; /* Flag to indicate close is scheduled */ 1500 char *symlink_target; 1501 }; 1502 1503 struct cifs_io_parms { 1504 __u16 netfid; 1505 __u64 persistent_fid; /* persist file id for smb2 */ 1506 __u64 volatile_fid; /* volatile file id for smb2 */ 1507 __u32 pid; 1508 __u64 offset; 1509 unsigned int length; 1510 struct cifs_tcon *tcon; 1511 struct TCP_Server_Info *server; 1512 }; 1513 1514 struct cifs_io_request { 1515 struct netfs_io_request rreq; 1516 struct cifsFileInfo *cfile; 1517 pid_t pid; 1518 }; 1519 1520 /* asynchronous read support */ 1521 struct cifs_io_subrequest { 1522 union { 1523 struct netfs_io_subrequest subreq; 1524 struct netfs_io_request *rreq; 1525 struct cifs_io_request *req; 1526 }; 1527 ssize_t got_bytes; 1528 unsigned int xid; 1529 int result; 1530 bool have_xid; 1531 bool replay; 1532 struct kvec iov[2]; 1533 struct TCP_Server_Info *server; 1534 #ifdef CONFIG_CIFS_SMB_DIRECT 1535 struct smbd_mr *mr; 1536 #endif 1537 struct cifs_credits credits; 1538 }; 1539 1540 /* 1541 * Take a reference on the file private data. Must be called with 1542 * cfile->file_info_lock held. 1543 */ 1544 static inline void 1545 cifsFileInfo_get_locked(struct cifsFileInfo *cifs_file) 1546 { 1547 ++cifs_file->count; 1548 } 1549 1550 struct cifsFileInfo *cifsFileInfo_get(struct cifsFileInfo *cifs_file); 1551 void _cifsFileInfo_put(struct cifsFileInfo *cifs_file, bool wait_oplock_hdlr, 1552 bool offload); 1553 void cifsFileInfo_put(struct cifsFileInfo *cifs_file); 1554 1555 #define CIFS_CACHE_READ_FLG 1 1556 #define CIFS_CACHE_HANDLE_FLG 2 1557 #define CIFS_CACHE_RH_FLG (CIFS_CACHE_READ_FLG | CIFS_CACHE_HANDLE_FLG) 1558 #define CIFS_CACHE_WRITE_FLG 4 1559 #define CIFS_CACHE_RW_FLG (CIFS_CACHE_READ_FLG | CIFS_CACHE_WRITE_FLG) 1560 #define CIFS_CACHE_RHW_FLG (CIFS_CACHE_RW_FLG | CIFS_CACHE_HANDLE_FLG) 1561 1562 #define CIFS_CACHE_READ(cinode) ((cinode->oplock & CIFS_CACHE_READ_FLG) || (CIFS_SB(cinode->netfs.inode.i_sb)->mnt_cifs_flags & CIFS_MOUNT_RO_CACHE)) 1563 #define CIFS_CACHE_HANDLE(cinode) (cinode->oplock & CIFS_CACHE_HANDLE_FLG) 1564 #define CIFS_CACHE_WRITE(cinode) ((cinode->oplock & CIFS_CACHE_WRITE_FLG) || (CIFS_SB(cinode->netfs.inode.i_sb)->mnt_cifs_flags & CIFS_MOUNT_RW_CACHE)) 1565 1566 /* 1567 * One of these for each file inode 1568 */ 1569 1570 struct cifsInodeInfo { 1571 struct netfs_inode netfs; /* Netfslib context and vfs inode */ 1572 bool can_cache_brlcks; 1573 struct list_head llist; /* locks helb by this inode */ 1574 /* 1575 * NOTE: Some code paths call down_read(lock_sem) twice, so 1576 * we must always use cifs_down_write() instead of down_write() 1577 * for this semaphore to avoid deadlocks. 1578 */ 1579 struct rw_semaphore lock_sem; /* protect the fields above */ 1580 /* BB add in lists for dirty pages i.e. write caching info for oplock */ 1581 struct list_head openFileList; 1582 spinlock_t open_file_lock; /* protects openFileList */ 1583 __u32 cifsAttrs; /* e.g. DOS archive bit, sparse, compressed, system */ 1584 unsigned int oplock; /* oplock/lease level we have */ 1585 __u16 epoch; /* used to track lease state changes */ 1586 #define CIFS_INODE_PENDING_OPLOCK_BREAK (0) /* oplock break in progress */ 1587 #define CIFS_INODE_PENDING_WRITERS (1) /* Writes in progress */ 1588 #define CIFS_INODE_FLAG_UNUSED (2) /* Unused flag */ 1589 #define CIFS_INO_DELETE_PENDING (3) /* delete pending on server */ 1590 #define CIFS_INO_INVALID_MAPPING (4) /* pagecache is invalid */ 1591 #define CIFS_INO_LOCK (5) /* lock bit for synchronization */ 1592 #define CIFS_INO_CLOSE_ON_LOCK (7) /* Not to defer the close when lock is set */ 1593 unsigned long flags; 1594 spinlock_t writers_lock; 1595 unsigned int writers; /* Number of writers on this inode */ 1596 unsigned long time; /* jiffies of last update of inode */ 1597 u64 uniqueid; /* server inode number */ 1598 u64 createtime; /* creation time on server */ 1599 __u8 lease_key[SMB2_LEASE_KEY_SIZE]; /* lease key for this inode */ 1600 struct list_head deferred_closes; /* list of deferred closes */ 1601 spinlock_t deferred_lock; /* protection on deferred list */ 1602 bool lease_granted; /* Flag to indicate whether lease or oplock is granted. */ 1603 char *symlink_target; 1604 __u32 reparse_tag; 1605 }; 1606 1607 static inline struct cifsInodeInfo * 1608 CIFS_I(struct inode *inode) 1609 { 1610 return container_of(inode, struct cifsInodeInfo, netfs.inode); 1611 } 1612 1613 static inline struct cifs_sb_info * 1614 CIFS_SB(struct super_block *sb) 1615 { 1616 return sb->s_fs_info; 1617 } 1618 1619 static inline struct cifs_sb_info * 1620 CIFS_FILE_SB(struct file *file) 1621 { 1622 return CIFS_SB(file_inode(file)->i_sb); 1623 } 1624 1625 static inline char CIFS_DIR_SEP(const struct cifs_sb_info *cifs_sb) 1626 { 1627 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_POSIX_PATHS) 1628 return '/'; 1629 else 1630 return '\\'; 1631 } 1632 1633 static inline void 1634 convert_delimiter(char *path, char delim) 1635 { 1636 char old_delim, *pos; 1637 1638 if (delim == '/') 1639 old_delim = '\\'; 1640 else 1641 old_delim = '/'; 1642 1643 pos = path; 1644 while ((pos = strchr(pos, old_delim))) 1645 *pos = delim; 1646 } 1647 1648 #define cifs_stats_inc atomic_inc 1649 1650 static inline void cifs_stats_bytes_written(struct cifs_tcon *tcon, 1651 unsigned int bytes) 1652 { 1653 if (bytes) { 1654 spin_lock(&tcon->stat_lock); 1655 tcon->bytes_written += bytes; 1656 spin_unlock(&tcon->stat_lock); 1657 } 1658 } 1659 1660 static inline void cifs_stats_bytes_read(struct cifs_tcon *tcon, 1661 unsigned int bytes) 1662 { 1663 spin_lock(&tcon->stat_lock); 1664 tcon->bytes_read += bytes; 1665 spin_unlock(&tcon->stat_lock); 1666 } 1667 1668 1669 /* 1670 * This is the prototype for the mid receive function. This function is for 1671 * receiving the rest of the SMB frame, starting with the WordCount (which is 1672 * just after the MID in struct smb_hdr). Note: 1673 * 1674 * - This will be called by cifsd, with no locks held. 1675 * - The mid will still be on the pending_mid_q. 1676 * - mid->resp_buf will point to the current buffer. 1677 * 1678 * Returns zero on a successful receive, or an error. The receive state in 1679 * the TCP_Server_Info will also be updated. 1680 */ 1681 typedef int (mid_receive_t)(struct TCP_Server_Info *server, 1682 struct mid_q_entry *mid); 1683 1684 /* 1685 * This is the prototype for the mid callback function. This is called once the 1686 * mid has been received off of the socket. When creating one, take special 1687 * care to avoid deadlocks. Things to bear in mind: 1688 * 1689 * - it will be called by cifsd, with no locks held 1690 * - the mid will be removed from any lists 1691 */ 1692 typedef void (mid_callback_t)(struct mid_q_entry *mid); 1693 1694 /* 1695 * This is the protopyte for mid handle function. This is called once the mid 1696 * has been recognized after decryption of the message. 1697 */ 1698 typedef int (mid_handle_t)(struct TCP_Server_Info *server, 1699 struct mid_q_entry *mid); 1700 1701 /* one of these for every pending CIFS request to the server */ 1702 struct mid_q_entry { 1703 struct list_head qhead; /* mids waiting on reply from this server */ 1704 struct kref refcount; 1705 struct TCP_Server_Info *server; /* server corresponding to this mid */ 1706 __u64 mid; /* multiplex id */ 1707 __u16 credits; /* number of credits consumed by this mid */ 1708 __u16 credits_received; /* number of credits from the response */ 1709 __u32 pid; /* process id */ 1710 __u32 sequence_number; /* for CIFS signing */ 1711 unsigned long when_alloc; /* when mid was created */ 1712 #ifdef CONFIG_CIFS_STATS2 1713 unsigned long when_sent; /* time when smb send finished */ 1714 unsigned long when_received; /* when demux complete (taken off wire) */ 1715 #endif 1716 mid_receive_t *receive; /* call receive callback */ 1717 mid_callback_t *callback; /* call completion callback */ 1718 mid_handle_t *handle; /* call handle mid callback */ 1719 void *callback_data; /* general purpose pointer for callback */ 1720 struct task_struct *creator; 1721 void *resp_buf; /* pointer to received SMB header */ 1722 unsigned int resp_buf_size; 1723 int mid_state; /* wish this were enum but can not pass to wait_event */ 1724 int mid_rc; /* rc for MID_RC */ 1725 unsigned int mid_flags; 1726 __le16 command; /* smb command code */ 1727 unsigned int optype; /* operation type */ 1728 bool large_buf:1; /* if valid response, is pointer to large buf */ 1729 bool multiRsp:1; /* multiple trans2 responses for one request */ 1730 bool multiEnd:1; /* both received */ 1731 bool decrypted:1; /* decrypted entry */ 1732 }; 1733 1734 struct close_cancelled_open { 1735 struct cifs_fid fid; 1736 struct cifs_tcon *tcon; 1737 struct work_struct work; 1738 __u64 mid; 1739 __u16 cmd; 1740 }; 1741 1742 /* Make code in transport.c a little cleaner by moving 1743 update of optional stats into function below */ 1744 static inline void cifs_in_send_inc(struct TCP_Server_Info *server) 1745 { 1746 atomic_inc(&server->in_send); 1747 } 1748 1749 static inline void cifs_in_send_dec(struct TCP_Server_Info *server) 1750 { 1751 atomic_dec(&server->in_send); 1752 } 1753 1754 static inline void cifs_num_waiters_inc(struct TCP_Server_Info *server) 1755 { 1756 atomic_inc(&server->num_waiters); 1757 } 1758 1759 static inline void cifs_num_waiters_dec(struct TCP_Server_Info *server) 1760 { 1761 atomic_dec(&server->num_waiters); 1762 } 1763 1764 #ifdef CONFIG_CIFS_STATS2 1765 static inline void cifs_save_when_sent(struct mid_q_entry *mid) 1766 { 1767 mid->when_sent = jiffies; 1768 } 1769 #else 1770 static inline void cifs_save_when_sent(struct mid_q_entry *mid) 1771 { 1772 } 1773 #endif 1774 1775 /* for pending dnotify requests */ 1776 struct dir_notify_req { 1777 struct list_head lhead; 1778 __le16 Pid; 1779 __le16 PidHigh; 1780 __u16 Mid; 1781 __u16 Tid; 1782 __u16 Uid; 1783 __u16 netfid; 1784 __u32 filter; /* CompletionFilter (for multishot) */ 1785 int multishot; 1786 struct file *pfile; 1787 }; 1788 1789 struct dfs_info3_param { 1790 int flags; /* DFSREF_REFERRAL_SERVER, DFSREF_STORAGE_SERVER*/ 1791 int path_consumed; 1792 int server_type; 1793 int ref_flag; 1794 char *path_name; 1795 char *node_name; 1796 int ttl; 1797 }; 1798 1799 struct file_list { 1800 struct list_head list; 1801 struct cifsFileInfo *cfile; 1802 }; 1803 1804 struct cifs_mount_ctx { 1805 struct cifs_sb_info *cifs_sb; 1806 struct smb3_fs_context *fs_ctx; 1807 unsigned int xid; 1808 struct TCP_Server_Info *server; 1809 struct cifs_ses *ses; 1810 struct cifs_tcon *tcon; 1811 }; 1812 1813 static inline void __free_dfs_info_param(struct dfs_info3_param *param) 1814 { 1815 kfree(param->path_name); 1816 kfree(param->node_name); 1817 } 1818 1819 static inline void free_dfs_info_param(struct dfs_info3_param *param) 1820 { 1821 if (param) 1822 __free_dfs_info_param(param); 1823 } 1824 1825 static inline void zfree_dfs_info_param(struct dfs_info3_param *param) 1826 { 1827 if (param) { 1828 __free_dfs_info_param(param); 1829 memset(param, 0, sizeof(*param)); 1830 } 1831 } 1832 1833 static inline void free_dfs_info_array(struct dfs_info3_param *param, 1834 int number_of_items) 1835 { 1836 int i; 1837 1838 if ((number_of_items == 0) || (param == NULL)) 1839 return; 1840 for (i = 0; i < number_of_items; i++) { 1841 kfree(param[i].path_name); 1842 kfree(param[i].node_name); 1843 } 1844 kfree(param); 1845 } 1846 1847 static inline bool is_interrupt_error(int error) 1848 { 1849 switch (error) { 1850 case -EINTR: 1851 case -ERESTARTSYS: 1852 case -ERESTARTNOHAND: 1853 case -ERESTARTNOINTR: 1854 return true; 1855 } 1856 return false; 1857 } 1858 1859 static inline bool is_retryable_error(int error) 1860 { 1861 if (is_interrupt_error(error) || error == -EAGAIN) 1862 return true; 1863 return false; 1864 } 1865 1866 static inline bool is_replayable_error(int error) 1867 { 1868 if (error == -EAGAIN || error == -ECONNABORTED) 1869 return true; 1870 return false; 1871 } 1872 1873 1874 /* cifs_get_writable_file() flags */ 1875 #define FIND_WR_ANY 0 1876 #define FIND_WR_FSUID_ONLY 1 1877 #define FIND_WR_WITH_DELETE 2 1878 1879 #define MID_FREE 0 1880 #define MID_REQUEST_ALLOCATED 1 1881 #define MID_REQUEST_SUBMITTED 2 1882 #define MID_RESPONSE_RECEIVED 4 1883 #define MID_RETRY_NEEDED 8 /* session closed while this request out */ 1884 #define MID_RESPONSE_MALFORMED 0x10 1885 #define MID_SHUTDOWN 0x20 1886 #define MID_RESPONSE_READY 0x40 /* ready for other process handle the rsp */ 1887 #define MID_RC 0x80 /* mid_rc contains custom rc */ 1888 1889 /* Flags */ 1890 #define MID_WAIT_CANCELLED 1 /* Cancelled while waiting for response */ 1891 #define MID_DELETED 2 /* Mid has been dequeued/deleted */ 1892 1893 /* Types of response buffer returned from SendReceive2 */ 1894 #define CIFS_NO_BUFFER 0 /* Response buffer not returned */ 1895 #define CIFS_SMALL_BUFFER 1 1896 #define CIFS_LARGE_BUFFER 2 1897 #define CIFS_IOVEC 4 /* array of response buffers */ 1898 1899 /* Type of Request to SendReceive2 */ 1900 #define CIFS_BLOCKING_OP 1 /* operation can block */ 1901 #define CIFS_NON_BLOCKING 2 /* do not block waiting for credits */ 1902 #define CIFS_TIMEOUT_MASK 0x003 /* only one of above set in req */ 1903 #define CIFS_LOG_ERROR 0x010 /* log NT STATUS if non-zero */ 1904 #define CIFS_LARGE_BUF_OP 0x020 /* large request buffer */ 1905 #define CIFS_NO_RSP_BUF 0x040 /* no response buffer required */ 1906 1907 /* Type of request operation */ 1908 #define CIFS_ECHO_OP 0x080 /* echo request */ 1909 #define CIFS_OBREAK_OP 0x0100 /* oplock break request */ 1910 #define CIFS_NEG_OP 0x0200 /* negotiate request */ 1911 #define CIFS_CP_CREATE_CLOSE_OP 0x0400 /* compound create+close request */ 1912 /* Lower bitmask values are reserved by others below. */ 1913 #define CIFS_SESS_OP 0x2000 /* session setup request */ 1914 #define CIFS_OP_MASK 0x2780 /* mask request type */ 1915 1916 #define CIFS_HAS_CREDITS 0x0400 /* already has credits */ 1917 #define CIFS_TRANSFORM_REQ 0x0800 /* transform request before sending */ 1918 #define CIFS_NO_SRV_RSP 0x1000 /* there is no server response */ 1919 #define CIFS_COMPRESS_REQ 0x4000 /* compress request before sending */ 1920 1921 /* Security Flags: indicate type of session setup needed */ 1922 #define CIFSSEC_MAY_SIGN 0x00001 1923 #define CIFSSEC_MAY_NTLMV2 0x00004 1924 #define CIFSSEC_MAY_KRB5 0x00008 1925 #define CIFSSEC_MAY_SEAL 0x00040 1926 #define CIFSSEC_MAY_NTLMSSP 0x00080 /* raw ntlmssp with ntlmv2 */ 1927 1928 #define CIFSSEC_MUST_SIGN 0x01001 1929 /* note that only one of the following can be set so the 1930 result of setting MUST flags more than once will be to 1931 require use of the stronger protocol */ 1932 #define CIFSSEC_MUST_NTLMV2 0x04004 1933 #define CIFSSEC_MUST_KRB5 0x08008 1934 #ifdef CONFIG_CIFS_UPCALL 1935 #define CIFSSEC_MASK 0xCF0CF /* flags supported if no weak allowed */ 1936 #else 1937 #define CIFSSEC_MASK 0xC70C7 /* flags supported if no weak allowed */ 1938 #endif /* UPCALL */ 1939 #define CIFSSEC_MUST_SEAL 0x40040 1940 #define CIFSSEC_MUST_NTLMSSP 0x80080 /* raw ntlmssp with ntlmv2 */ 1941 1942 #define CIFSSEC_DEF (CIFSSEC_MAY_SIGN | CIFSSEC_MAY_NTLMV2 | CIFSSEC_MAY_NTLMSSP | CIFSSEC_MAY_SEAL) 1943 #define CIFSSEC_MAX (CIFSSEC_MAY_SIGN | CIFSSEC_MUST_KRB5 | CIFSSEC_MAY_SEAL) 1944 #define CIFSSEC_AUTH_MASK (CIFSSEC_MAY_NTLMV2 | CIFSSEC_MAY_KRB5 | CIFSSEC_MAY_NTLMSSP) 1945 /* 1946 ***************************************************************** 1947 * All constants go here 1948 ***************************************************************** 1949 */ 1950 1951 #define UID_HASH (16) 1952 1953 /* 1954 * Note that ONE module should define _DECLARE_GLOBALS_HERE to cause the 1955 * following to be declared. 1956 */ 1957 1958 /**************************************************************************** 1959 * Here are all the locks (spinlock, mutex, semaphore) in cifs.ko, arranged according 1960 * to the locking order. i.e. if two locks are to be held together, the lock that 1961 * appears higher in this list needs to be taken before the other. 1962 * 1963 * If you hold a lock that is lower in this list, and you need to take a higher lock 1964 * (or if you think that one of the functions that you're calling may need to), first 1965 * drop the lock you hold, pick up the higher lock, then the lower one. This will 1966 * ensure that locks are picked up only in one direction in the below table 1967 * (top to bottom). 1968 * 1969 * Also, if you expect a function to be called with a lock held, explicitly document 1970 * this in the comments on top of your function definition. 1971 * 1972 * And also, try to keep the critical sections (lock hold time) to be as minimal as 1973 * possible. Blocking / calling other functions with a lock held always increase 1974 * the risk of a possible deadlock. 1975 * 1976 * Following this rule will avoid unnecessary deadlocks, which can get really hard to 1977 * debug. Also, any new lock that you introduce, please add to this list in the correct 1978 * order. 1979 * 1980 * Please populate this list whenever you introduce new locks in your changes. Or in 1981 * case I've missed some existing locks. Please ensure that it's added in the list 1982 * based on the locking order expected. 1983 * 1984 * ===================================================================================== 1985 * Lock Protects Initialization fn 1986 * ===================================================================================== 1987 * vol_list_lock 1988 * vol_info->ctx_lock vol_info->ctx 1989 * cifs_sb_info->tlink_tree_lock cifs_sb_info->tlink_tree cifs_setup_cifs_sb 1990 * TCP_Server_Info-> TCP_Server_Info cifs_get_tcp_session 1991 * reconnect_mutex 1992 * TCP_Server_Info->srv_mutex TCP_Server_Info cifs_get_tcp_session 1993 * cifs_ses->session_mutex cifs_ses sesInfoAlloc 1994 * cifs_tcon 1995 * cifs_tcon->open_file_lock cifs_tcon->openFileList tconInfoAlloc 1996 * cifs_tcon->pending_opens 1997 * cifs_tcon->stat_lock cifs_tcon->bytes_read tconInfoAlloc 1998 * cifs_tcon->bytes_written 1999 * cifs_tcp_ses_lock cifs_tcp_ses_list sesInfoAlloc 2000 * GlobalMid_Lock GlobalMaxActiveXid init_cifs 2001 * GlobalCurrentXid 2002 * GlobalTotalActiveXid 2003 * TCP_Server_Info->srv_lock (anything in struct not protected by another lock and can change) 2004 * TCP_Server_Info->mid_lock TCP_Server_Info->pending_mid_q cifs_get_tcp_session 2005 * ->CurrentMid 2006 * (any changes in mid_q_entry fields) 2007 * TCP_Server_Info->req_lock TCP_Server_Info->in_flight cifs_get_tcp_session 2008 * ->credits 2009 * ->echo_credits 2010 * ->oplock_credits 2011 * ->reconnect_instance 2012 * cifs_ses->ses_lock (anything that is not protected by another lock and can change) 2013 * cifs_ses->iface_lock cifs_ses->iface_list sesInfoAlloc 2014 * ->iface_count 2015 * ->iface_last_update 2016 * cifs_ses->chan_lock cifs_ses->chans 2017 * ->chans_need_reconnect 2018 * ->chans_in_reconnect 2019 * cifs_tcon->tc_lock (anything that is not protected by another lock and can change) 2020 * inode->i_rwsem, taken by fs/netfs/locking.c e.g. should be taken before cifsInodeInfo locks 2021 * cifsInodeInfo->open_file_lock cifsInodeInfo->openFileList cifs_alloc_inode 2022 * cifsInodeInfo->writers_lock cifsInodeInfo->writers cifsInodeInfo_alloc 2023 * cifsInodeInfo->lock_sem cifsInodeInfo->llist cifs_init_once 2024 * ->can_cache_brlcks 2025 * cifsInodeInfo->deferred_lock cifsInodeInfo->deferred_closes cifsInodeInfo_alloc 2026 * cached_fids->cfid_list_lock cifs_tcon->cfids->entries init_cached_dirs 2027 * cifsFileInfo->fh_mutex cifsFileInfo cifs_new_fileinfo 2028 * cifsFileInfo->file_info_lock cifsFileInfo->count cifs_new_fileinfo 2029 * ->invalidHandle initiate_cifs_search 2030 * ->oplock_break_cancelled 2031 ****************************************************************************/ 2032 2033 #ifdef DECLARE_GLOBALS_HERE 2034 #define GLOBAL_EXTERN 2035 #else 2036 #define GLOBAL_EXTERN extern 2037 #endif 2038 2039 /* 2040 * the list of TCP_Server_Info structures, ie each of the sockets 2041 * connecting our client to a distinct server (ip address), is 2042 * chained together by cifs_tcp_ses_list. The list of all our SMB 2043 * sessions (and from that the tree connections) can be found 2044 * by iterating over cifs_tcp_ses_list 2045 */ 2046 extern struct list_head cifs_tcp_ses_list; 2047 2048 /* 2049 * This lock protects the cifs_tcp_ses_list, the list of smb sessions per 2050 * tcp session, and the list of tcon's per smb session. It also protects 2051 * the reference counters for the server, smb session, and tcon. 2052 * generally the locks should be taken in order tcp_ses_lock before 2053 * tcon->open_file_lock and that before file->file_info_lock since the 2054 * structure order is cifs_socket-->cifs_ses-->cifs_tcon-->cifs_file 2055 */ 2056 extern spinlock_t cifs_tcp_ses_lock; 2057 2058 /* 2059 * Global transaction id (XID) information 2060 */ 2061 extern unsigned int GlobalCurrentXid; /* protected by GlobalMid_Lock */ 2062 extern unsigned int GlobalTotalActiveXid; /* prot by GlobalMid_Lock */ 2063 extern unsigned int GlobalMaxActiveXid; /* prot by GlobalMid_Lock */ 2064 extern spinlock_t GlobalMid_Lock; /* protects above & list operations on midQ entries */ 2065 2066 /* 2067 * Global counters, updated atomically 2068 */ 2069 extern atomic_t sesInfoAllocCount; 2070 extern atomic_t tconInfoAllocCount; 2071 extern atomic_t tcpSesNextId; 2072 extern atomic_t tcpSesAllocCount; 2073 extern atomic_t tcpSesReconnectCount; 2074 extern atomic_t tconInfoReconnectCount; 2075 2076 /* Various Debug counters */ 2077 extern atomic_t buf_alloc_count; /* current number allocated */ 2078 extern atomic_t small_buf_alloc_count; 2079 #ifdef CONFIG_CIFS_STATS2 2080 extern atomic_t total_buf_alloc_count; /* total allocated over all time */ 2081 extern atomic_t total_small_buf_alloc_count; 2082 extern unsigned int slow_rsp_threshold; /* number of secs before logging */ 2083 #endif 2084 2085 /* Misc globals */ 2086 extern bool enable_oplocks; /* enable or disable oplocks */ 2087 extern bool lookupCacheEnabled; 2088 extern unsigned int global_secflags; /* if on, session setup sent 2089 with more secure ntlmssp2 challenge/resp */ 2090 extern unsigned int sign_CIFS_PDUs; /* enable smb packet signing */ 2091 extern bool enable_gcm_256; /* allow optional negotiate of strongest signing (aes-gcm-256) */ 2092 extern bool require_gcm_256; /* require use of strongest signing (aes-gcm-256) */ 2093 extern bool enable_negotiate_signing; /* request use of faster (GMAC) signing if available */ 2094 extern bool linuxExtEnabled;/*enable Linux/Unix CIFS extensions*/ 2095 extern unsigned int CIFSMaxBufSize; /* max size not including hdr */ 2096 extern unsigned int cifs_min_rcv; /* min size of big ntwrk buf pool */ 2097 extern unsigned int cifs_min_small; /* min size of small buf pool */ 2098 extern unsigned int cifs_max_pending; /* MAX requests at once to server*/ 2099 extern unsigned int dir_cache_timeout; /* max time for directory lease caching of dir */ 2100 extern bool disable_legacy_dialects; /* forbid vers=1.0 and vers=2.0 mounts */ 2101 extern atomic_t mid_count; 2102 2103 void cifs_oplock_break(struct work_struct *work); 2104 void cifs_queue_oplock_break(struct cifsFileInfo *cfile); 2105 void smb2_deferred_work_close(struct work_struct *work); 2106 2107 extern const struct slow_work_ops cifs_oplock_break_ops; 2108 extern struct workqueue_struct *cifsiod_wq; 2109 extern struct workqueue_struct *decrypt_wq; 2110 extern struct workqueue_struct *fileinfo_put_wq; 2111 extern struct workqueue_struct *cifsoplockd_wq; 2112 extern struct workqueue_struct *deferredclose_wq; 2113 extern struct workqueue_struct *serverclose_wq; 2114 extern struct workqueue_struct *cfid_put_wq; 2115 extern __u32 cifs_lock_secret; 2116 2117 extern mempool_t *cifs_sm_req_poolp; 2118 extern mempool_t *cifs_req_poolp; 2119 extern mempool_t *cifs_mid_poolp; 2120 extern mempool_t cifs_io_request_pool; 2121 extern mempool_t cifs_io_subrequest_pool; 2122 2123 /* Operations for different SMB versions */ 2124 #define SMB1_VERSION_STRING "1.0" 2125 #define SMB20_VERSION_STRING "2.0" 2126 #ifdef CONFIG_CIFS_ALLOW_INSECURE_LEGACY 2127 extern struct smb_version_operations smb1_operations; 2128 extern struct smb_version_values smb1_values; 2129 extern struct smb_version_operations smb20_operations; 2130 extern struct smb_version_values smb20_values; 2131 #endif /* CIFS_ALLOW_INSECURE_LEGACY */ 2132 #define SMB21_VERSION_STRING "2.1" 2133 extern struct smb_version_operations smb21_operations; 2134 extern struct smb_version_values smb21_values; 2135 #define SMBDEFAULT_VERSION_STRING "default" 2136 extern struct smb_version_values smbdefault_values; 2137 #define SMB3ANY_VERSION_STRING "3" 2138 extern struct smb_version_values smb3any_values; 2139 #define SMB30_VERSION_STRING "3.0" 2140 extern struct smb_version_operations smb30_operations; 2141 extern struct smb_version_values smb30_values; 2142 #define SMB302_VERSION_STRING "3.02" 2143 #define ALT_SMB302_VERSION_STRING "3.0.2" 2144 /*extern struct smb_version_operations smb302_operations;*/ /* not needed yet */ 2145 extern struct smb_version_values smb302_values; 2146 #define SMB311_VERSION_STRING "3.1.1" 2147 #define ALT_SMB311_VERSION_STRING "3.11" 2148 extern struct smb_version_operations smb311_operations; 2149 extern struct smb_version_values smb311_values; 2150 2151 static inline char *get_security_type_str(enum securityEnum sectype) 2152 { 2153 switch (sectype) { 2154 case RawNTLMSSP: 2155 return "RawNTLMSSP"; 2156 case Kerberos: 2157 return "Kerberos"; 2158 case NTLMv2: 2159 return "NTLMv2"; 2160 case IAKerb: 2161 return "IAKerb"; 2162 default: 2163 return "Unknown"; 2164 } 2165 } 2166 2167 static inline bool is_smb1_server(struct TCP_Server_Info *server) 2168 { 2169 return strcmp(server->vals->version_string, SMB1_VERSION_STRING) == 0; 2170 } 2171 2172 static inline bool is_tcon_dfs(struct cifs_tcon *tcon) 2173 { 2174 /* 2175 * For SMB1, see MS-CIFS 2.4.55 SMB_COM_TREE_CONNECT_ANDX (0x75) and MS-CIFS 3.3.4.4 DFS 2176 * Subsystem Notifies That a Share Is a DFS Share. 2177 * 2178 * For SMB2+, see MS-SMB2 2.2.10 SMB2 TREE_CONNECT Response and MS-SMB2 3.3.4.14 Server 2179 * Application Updates a Share. 2180 */ 2181 if (!tcon || !tcon->ses || !tcon->ses->server) 2182 return false; 2183 return is_smb1_server(tcon->ses->server) ? tcon->Flags & SMB_SHARE_IS_IN_DFS : 2184 tcon->share_flags & (SHI1005_FLAGS_DFS | SHI1005_FLAGS_DFS_ROOT); 2185 } 2186 2187 static inline bool cifs_is_referral_server(struct cifs_tcon *tcon, 2188 const struct dfs_info3_param *ref) 2189 { 2190 /* 2191 * Check if all targets are capable of handling DFS referrals as per 2192 * MS-DFSC 2.2.4 RESP_GET_DFS_REFERRAL. 2193 */ 2194 return is_tcon_dfs(tcon) || (ref && (ref->flags & DFSREF_REFERRAL_SERVER)); 2195 } 2196 2197 static inline u64 cifs_flock_len(const struct file_lock *fl) 2198 { 2199 return (u64)fl->fl_end - fl->fl_start + 1; 2200 } 2201 2202 static inline size_t ntlmssp_workstation_name_size(const struct cifs_ses *ses) 2203 { 2204 if (WARN_ON_ONCE(!ses || !ses->server)) 2205 return 0; 2206 /* 2207 * Make workstation name no more than 15 chars when using insecure dialects as some legacy 2208 * servers do require it during NTLMSSP. 2209 */ 2210 if (ses->server->dialect <= SMB20_PROT_ID) 2211 return min_t(size_t, sizeof(ses->workstation_name), RFC1001_NAME_LEN_WITH_NULL); 2212 return sizeof(ses->workstation_name); 2213 } 2214 2215 static inline void move_cifs_info_to_smb2(struct smb2_file_all_info *dst, const FILE_ALL_INFO *src) 2216 { 2217 memcpy(dst, src, (size_t)((u8 *)&src->EASize - (u8 *)src)); 2218 dst->IndexNumber = 0; 2219 dst->EASize = src->EASize; 2220 dst->AccessFlags = 0; 2221 dst->CurrentByteOffset = 0; 2222 dst->Mode = 0; 2223 dst->AlignmentRequirement = 0; 2224 dst->FileNameLength = src->FileNameLength; 2225 } 2226 2227 static inline int cifs_get_num_sgs(const struct smb_rqst *rqst, 2228 int num_rqst, 2229 const u8 *sig) 2230 { 2231 unsigned int len, skip; 2232 unsigned int nents = 0; 2233 unsigned long addr; 2234 size_t data_size; 2235 int i, j; 2236 2237 /* 2238 * The first rqst has a transform header where the first 20 bytes are 2239 * not part of the encrypted blob. 2240 */ 2241 skip = 20; 2242 2243 /* Assumes the first rqst has a transform header as the first iov. 2244 * I.e. 2245 * rqst[0].rq_iov[0] is transform header 2246 * rqst[0].rq_iov[1+] data to be encrypted/decrypted 2247 * rqst[1+].rq_iov[0+] data to be encrypted/decrypted 2248 */ 2249 for (i = 0; i < num_rqst; i++) { 2250 data_size = iov_iter_count(&rqst[i].rq_iter); 2251 2252 /* We really don't want a mixture of pinned and unpinned pages 2253 * in the sglist. It's hard to keep track of which is what. 2254 * Instead, we convert to a BVEC-type iterator higher up. 2255 */ 2256 if (data_size && 2257 WARN_ON_ONCE(user_backed_iter(&rqst[i].rq_iter))) 2258 return -EIO; 2259 2260 /* We also don't want to have any extra refs or pins to clean 2261 * up in the sglist. 2262 */ 2263 if (data_size && 2264 WARN_ON_ONCE(iov_iter_extract_will_pin(&rqst[i].rq_iter))) 2265 return -EIO; 2266 2267 for (j = 0; j < rqst[i].rq_nvec; j++) { 2268 struct kvec *iov = &rqst[i].rq_iov[j]; 2269 2270 addr = (unsigned long)iov->iov_base + skip; 2271 if (is_vmalloc_or_module_addr((void *)addr)) { 2272 len = iov->iov_len - skip; 2273 nents += DIV_ROUND_UP(offset_in_page(addr) + len, 2274 PAGE_SIZE); 2275 } else { 2276 nents++; 2277 } 2278 skip = 0; 2279 } 2280 if (data_size) 2281 nents += iov_iter_npages(&rqst[i].rq_iter, INT_MAX); 2282 } 2283 nents += DIV_ROUND_UP(offset_in_page(sig) + SMB2_SIGNATURE_SIZE, PAGE_SIZE); 2284 return nents; 2285 } 2286 2287 /* We can not use the normal sg_set_buf() as we will sometimes pass a 2288 * stack object as buf. 2289 */ 2290 static inline void cifs_sg_set_buf(struct sg_table *sgtable, 2291 const void *buf, 2292 unsigned int buflen) 2293 { 2294 unsigned long addr = (unsigned long)buf; 2295 unsigned int off = offset_in_page(addr); 2296 2297 addr &= PAGE_MASK; 2298 if (is_vmalloc_or_module_addr((void *)addr)) { 2299 do { 2300 unsigned int len = min_t(unsigned int, buflen, PAGE_SIZE - off); 2301 2302 sg_set_page(&sgtable->sgl[sgtable->nents++], 2303 vmalloc_to_page((void *)addr), len, off); 2304 2305 off = 0; 2306 addr += PAGE_SIZE; 2307 buflen -= len; 2308 } while (buflen); 2309 } else { 2310 sg_set_page(&sgtable->sgl[sgtable->nents++], 2311 virt_to_page((void *)addr), buflen, off); 2312 } 2313 } 2314 2315 #define CIFS_OPARMS(_cifs_sb, _tcon, _path, _da, _cd, _co, _mode) \ 2316 ((struct cifs_open_parms) { \ 2317 .tcon = _tcon, \ 2318 .path = _path, \ 2319 .desired_access = (_da), \ 2320 .disposition = (_cd), \ 2321 .create_options = cifs_create_options(_cifs_sb, (_co)), \ 2322 .mode = (_mode), \ 2323 .cifs_sb = _cifs_sb, \ 2324 }) 2325 2326 struct smb2_compound_vars { 2327 struct cifs_open_parms oparms; 2328 struct kvec rsp_iov[MAX_COMPOUND]; 2329 struct smb_rqst rqst[MAX_COMPOUND]; 2330 struct kvec open_iov[SMB2_CREATE_IOV_SIZE]; 2331 struct kvec qi_iov; 2332 struct kvec io_iov[SMB2_IOCTL_IOV_SIZE]; 2333 struct kvec si_iov[SMB2_SET_INFO_IOV_SIZE]; 2334 struct kvec close_iov; 2335 struct smb2_file_rename_info_hdr rename_info; 2336 struct smb2_file_link_info_hdr link_info; 2337 struct kvec ea_iov; 2338 }; 2339 2340 static inline bool cifs_ses_exiting(struct cifs_ses *ses) 2341 { 2342 bool ret; 2343 2344 spin_lock(&ses->ses_lock); 2345 ret = ses->ses_status == SES_EXITING; 2346 spin_unlock(&ses->ses_lock); 2347 return ret; 2348 } 2349 2350 static inline bool cifs_netbios_name(const char *name, size_t namelen) 2351 { 2352 bool ret = false; 2353 size_t i; 2354 2355 if (namelen >= 1 && namelen <= RFC1001_NAME_LEN) { 2356 for (i = 0; i < namelen; i++) { 2357 const unsigned char c = name[i]; 2358 2359 if (c == '\\' || c == '/' || c == ':' || c == '*' || 2360 c == '?' || c == '"' || c == '<' || c == '>' || 2361 c == '|' || c == '.') 2362 return false; 2363 if (!ret && isalpha(c)) 2364 ret = true; 2365 } 2366 } 2367 return ret; 2368 } 2369 2370 #endif /* _CIFS_GLOB_H */ 2371