1 // SPDX-License-Identifier: GPL-2.0-or-later 2 /* 3 * Copyright (C) 2016 Namjae Jeon <namjae.jeon@protocolfreedom.org> 4 * Copyright (C) 2018 Samsung Electronics Co., Ltd. 5 */ 6 7 #include <linux/mutex.h> 8 #include <linux/freezer.h> 9 #include <linux/module.h> 10 11 #include "server.h" 12 #include "smb_common.h" 13 #include "mgmt/ksmbd_ida.h" 14 #include "connection.h" 15 #include "transport_tcp.h" 16 #include "transport_rdma.h" 17 18 static DEFINE_MUTEX(init_lock); 19 20 static struct ksmbd_conn_ops default_conn_ops; 21 22 LIST_HEAD(conn_list); 23 DECLARE_RWSEM(conn_list_lock); 24 25 /** 26 * ksmbd_conn_free() - free resources of the connection instance 27 * 28 * @conn: connection instance to be cleaned up 29 * 30 * During the thread termination, the corresponding conn instance 31 * resources(sock/memory) are released and finally the conn object is freed. 32 */ 33 void ksmbd_conn_free(struct ksmbd_conn *conn) 34 { 35 down_write(&conn_list_lock); 36 list_del(&conn->conns_list); 37 up_write(&conn_list_lock); 38 39 xa_destroy(&conn->sessions); 40 kvfree(conn->request_buf); 41 kfree(conn->preauth_info); 42 if (atomic_dec_and_test(&conn->refcnt)) 43 kfree(conn); 44 } 45 46 /** 47 * ksmbd_conn_alloc() - initialize a new connection instance 48 * 49 * Return: ksmbd_conn struct on success, otherwise NULL 50 */ 51 struct ksmbd_conn *ksmbd_conn_alloc(void) 52 { 53 struct ksmbd_conn *conn; 54 55 conn = kzalloc(sizeof(struct ksmbd_conn), KSMBD_DEFAULT_GFP); 56 if (!conn) 57 return NULL; 58 59 conn->need_neg = true; 60 ksmbd_conn_set_new(conn); 61 conn->local_nls = load_nls("utf8"); 62 if (!conn->local_nls) 63 conn->local_nls = load_nls_default(); 64 if (IS_ENABLED(CONFIG_UNICODE)) 65 conn->um = utf8_load(UNICODE_AGE(12, 1, 0)); 66 else 67 conn->um = ERR_PTR(-EOPNOTSUPP); 68 if (IS_ERR(conn->um)) 69 conn->um = NULL; 70 atomic_set(&conn->req_running, 0); 71 atomic_set(&conn->r_count, 0); 72 atomic_set(&conn->refcnt, 1); 73 atomic_set(&conn->mux_smb_requests, 0); 74 conn->total_credits = 1; 75 conn->outstanding_credits = 0; 76 77 init_waitqueue_head(&conn->req_running_q); 78 init_waitqueue_head(&conn->r_count_q); 79 INIT_LIST_HEAD(&conn->conns_list); 80 INIT_LIST_HEAD(&conn->requests); 81 INIT_LIST_HEAD(&conn->async_requests); 82 spin_lock_init(&conn->request_lock); 83 spin_lock_init(&conn->credits_lock); 84 ida_init(&conn->async_ida); 85 xa_init(&conn->sessions); 86 87 spin_lock_init(&conn->llist_lock); 88 INIT_LIST_HEAD(&conn->lock_list); 89 90 init_rwsem(&conn->session_lock); 91 92 down_write(&conn_list_lock); 93 list_add(&conn->conns_list, &conn_list); 94 up_write(&conn_list_lock); 95 return conn; 96 } 97 98 bool ksmbd_conn_lookup_dialect(struct ksmbd_conn *c) 99 { 100 struct ksmbd_conn *t; 101 bool ret = false; 102 103 down_read(&conn_list_lock); 104 list_for_each_entry(t, &conn_list, conns_list) { 105 if (memcmp(t->ClientGUID, c->ClientGUID, SMB2_CLIENT_GUID_SIZE)) 106 continue; 107 108 ret = true; 109 break; 110 } 111 up_read(&conn_list_lock); 112 return ret; 113 } 114 115 void ksmbd_conn_enqueue_request(struct ksmbd_work *work) 116 { 117 struct ksmbd_conn *conn = work->conn; 118 struct list_head *requests_queue = NULL; 119 120 if (conn->ops->get_cmd_val(work) != SMB2_CANCEL_HE) 121 requests_queue = &conn->requests; 122 123 atomic_inc(&conn->req_running); 124 if (requests_queue) { 125 spin_lock(&conn->request_lock); 126 list_add_tail(&work->request_entry, requests_queue); 127 spin_unlock(&conn->request_lock); 128 } 129 } 130 131 void ksmbd_conn_try_dequeue_request(struct ksmbd_work *work) 132 { 133 struct ksmbd_conn *conn = work->conn; 134 135 atomic_dec(&conn->req_running); 136 137 if (list_empty(&work->request_entry) && 138 list_empty(&work->async_request_entry)) 139 return; 140 141 spin_lock(&conn->request_lock); 142 list_del_init(&work->request_entry); 143 spin_unlock(&conn->request_lock); 144 if (work->asynchronous) 145 release_async_work(work); 146 147 wake_up_all(&conn->req_running_q); 148 } 149 150 void ksmbd_conn_lock(struct ksmbd_conn *conn) 151 { 152 mutex_lock(&conn->srv_mutex); 153 } 154 155 void ksmbd_conn_unlock(struct ksmbd_conn *conn) 156 { 157 mutex_unlock(&conn->srv_mutex); 158 } 159 160 void ksmbd_all_conn_set_status(u64 sess_id, u32 status) 161 { 162 struct ksmbd_conn *conn; 163 164 down_read(&conn_list_lock); 165 list_for_each_entry(conn, &conn_list, conns_list) { 166 if (conn->binding || xa_load(&conn->sessions, sess_id)) 167 WRITE_ONCE(conn->status, status); 168 } 169 up_read(&conn_list_lock); 170 } 171 172 void ksmbd_conn_wait_idle(struct ksmbd_conn *conn) 173 { 174 wait_event(conn->req_running_q, atomic_read(&conn->req_running) < 2); 175 } 176 177 int ksmbd_conn_wait_idle_sess_id(struct ksmbd_conn *curr_conn, u64 sess_id) 178 { 179 struct ksmbd_conn *conn; 180 int rc, retry_count = 0, max_timeout = 120; 181 int rcount = 1; 182 183 retry_idle: 184 if (retry_count >= max_timeout) 185 return -EIO; 186 187 down_read(&conn_list_lock); 188 list_for_each_entry(conn, &conn_list, conns_list) { 189 if (conn->binding || xa_load(&conn->sessions, sess_id)) { 190 if (conn == curr_conn) 191 rcount = 2; 192 if (atomic_read(&conn->req_running) >= rcount) { 193 rc = wait_event_timeout(conn->req_running_q, 194 atomic_read(&conn->req_running) < rcount, 195 HZ); 196 if (!rc) { 197 up_read(&conn_list_lock); 198 retry_count++; 199 goto retry_idle; 200 } 201 } 202 } 203 } 204 up_read(&conn_list_lock); 205 206 return 0; 207 } 208 209 int ksmbd_conn_write(struct ksmbd_work *work) 210 { 211 struct ksmbd_conn *conn = work->conn; 212 int sent; 213 214 if (!work->response_buf) { 215 pr_err("NULL response header\n"); 216 return -EINVAL; 217 } 218 219 if (work->send_no_response) 220 return 0; 221 222 if (!work->iov_idx) 223 return -EINVAL; 224 225 ksmbd_conn_lock(conn); 226 sent = conn->transport->ops->writev(conn->transport, work->iov, 227 work->iov_cnt, 228 get_rfc1002_len(work->iov[0].iov_base) + 4, 229 work->need_invalidate_rkey, 230 work->remote_key); 231 ksmbd_conn_unlock(conn); 232 233 if (sent < 0) { 234 pr_err("Failed to send message: %d\n", sent); 235 return sent; 236 } 237 238 return 0; 239 } 240 241 int ksmbd_conn_rdma_read(struct ksmbd_conn *conn, 242 void *buf, unsigned int buflen, 243 struct smb2_buffer_desc_v1 *desc, 244 unsigned int desc_len) 245 { 246 int ret = -EINVAL; 247 248 if (conn->transport->ops->rdma_read) 249 ret = conn->transport->ops->rdma_read(conn->transport, 250 buf, buflen, 251 desc, desc_len); 252 return ret; 253 } 254 255 int ksmbd_conn_rdma_write(struct ksmbd_conn *conn, 256 void *buf, unsigned int buflen, 257 struct smb2_buffer_desc_v1 *desc, 258 unsigned int desc_len) 259 { 260 int ret = -EINVAL; 261 262 if (conn->transport->ops->rdma_write) 263 ret = conn->transport->ops->rdma_write(conn->transport, 264 buf, buflen, 265 desc, desc_len); 266 return ret; 267 } 268 269 bool ksmbd_conn_alive(struct ksmbd_conn *conn) 270 { 271 if (!ksmbd_server_running()) 272 return false; 273 274 if (ksmbd_conn_exiting(conn)) 275 return false; 276 277 if (kthread_should_stop()) 278 return false; 279 280 if (atomic_read(&conn->stats.open_files_count) > 0) 281 return true; 282 283 /* 284 * Stop current session if the time that get last request from client 285 * is bigger than deadtime user configured and opening file count is 286 * zero. 287 */ 288 if (server_conf.deadtime > 0 && 289 time_after(jiffies, conn->last_active + server_conf.deadtime)) { 290 ksmbd_debug(CONN, "No response from client in %lu minutes\n", 291 server_conf.deadtime / SMB_ECHO_INTERVAL); 292 return false; 293 } 294 return true; 295 } 296 297 #define SMB1_MIN_SUPPORTED_HEADER_SIZE (sizeof(struct smb_hdr)) 298 #define SMB2_MIN_SUPPORTED_HEADER_SIZE (sizeof(struct smb2_hdr) + 4) 299 300 /** 301 * ksmbd_conn_handler_loop() - session thread to listen on new smb requests 302 * @p: connection instance 303 * 304 * One thread each per connection 305 * 306 * Return: 0 on success 307 */ 308 int ksmbd_conn_handler_loop(void *p) 309 { 310 struct ksmbd_conn *conn = (struct ksmbd_conn *)p; 311 struct ksmbd_transport *t = conn->transport; 312 unsigned int pdu_size, max_allowed_pdu_size; 313 char hdr_buf[4] = {0,}; 314 int size; 315 316 mutex_init(&conn->srv_mutex); 317 __module_get(THIS_MODULE); 318 319 if (t->ops->prepare && t->ops->prepare(t)) 320 goto out; 321 322 conn->last_active = jiffies; 323 set_freezable(); 324 while (ksmbd_conn_alive(conn)) { 325 if (try_to_freeze()) 326 continue; 327 328 kvfree(conn->request_buf); 329 conn->request_buf = NULL; 330 331 size = t->ops->read(t, hdr_buf, sizeof(hdr_buf), -1); 332 if (size != sizeof(hdr_buf)) 333 break; 334 335 pdu_size = get_rfc1002_len(hdr_buf); 336 ksmbd_debug(CONN, "RFC1002 header %u bytes\n", pdu_size); 337 338 if (ksmbd_conn_good(conn)) 339 max_allowed_pdu_size = 340 SMB3_MAX_MSGSIZE + conn->vals->max_write_size; 341 else 342 max_allowed_pdu_size = SMB3_MAX_MSGSIZE; 343 344 if (pdu_size > max_allowed_pdu_size) { 345 pr_err_ratelimited("PDU length(%u) exceeded maximum allowed pdu size(%u) on connection(%d)\n", 346 pdu_size, max_allowed_pdu_size, 347 READ_ONCE(conn->status)); 348 break; 349 } 350 351 /* 352 * Check maximum pdu size(0x00FFFFFF). 353 */ 354 if (pdu_size > MAX_STREAM_PROT_LEN) 355 break; 356 357 if (pdu_size < SMB1_MIN_SUPPORTED_HEADER_SIZE) 358 break; 359 360 /* 4 for rfc1002 length field */ 361 /* 1 for implied bcc[0] */ 362 size = pdu_size + 4 + 1; 363 conn->request_buf = kvmalloc(size, KSMBD_DEFAULT_GFP); 364 if (!conn->request_buf) 365 break; 366 367 memcpy(conn->request_buf, hdr_buf, sizeof(hdr_buf)); 368 369 /* 370 * We already read 4 bytes to find out PDU size, now 371 * read in PDU 372 */ 373 size = t->ops->read(t, conn->request_buf + 4, pdu_size, 2); 374 if (size < 0) { 375 pr_err("sock_read failed: %d\n", size); 376 break; 377 } 378 379 if (size != pdu_size) { 380 pr_err("PDU error. Read: %d, Expected: %d\n", 381 size, pdu_size); 382 continue; 383 } 384 385 if (!ksmbd_smb_request(conn)) 386 break; 387 388 if (((struct smb2_hdr *)smb2_get_msg(conn->request_buf))->ProtocolId == 389 SMB2_PROTO_NUMBER) { 390 if (pdu_size < SMB2_MIN_SUPPORTED_HEADER_SIZE) 391 break; 392 } 393 394 if (!default_conn_ops.process_fn) { 395 pr_err("No connection request callback\n"); 396 break; 397 } 398 399 if (default_conn_ops.process_fn(conn)) { 400 pr_err("Cannot handle request\n"); 401 break; 402 } 403 } 404 405 out: 406 ksmbd_conn_set_releasing(conn); 407 /* Wait till all reference dropped to the Server object*/ 408 ksmbd_debug(CONN, "Wait for all pending requests(%d)\n", atomic_read(&conn->r_count)); 409 wait_event(conn->r_count_q, atomic_read(&conn->r_count) == 0); 410 411 if (IS_ENABLED(CONFIG_UNICODE)) 412 utf8_unload(conn->um); 413 unload_nls(conn->local_nls); 414 if (default_conn_ops.terminate_fn) 415 default_conn_ops.terminate_fn(conn); 416 t->ops->disconnect(t); 417 module_put(THIS_MODULE); 418 return 0; 419 } 420 421 void ksmbd_conn_init_server_callbacks(struct ksmbd_conn_ops *ops) 422 { 423 default_conn_ops.process_fn = ops->process_fn; 424 default_conn_ops.terminate_fn = ops->terminate_fn; 425 } 426 427 int ksmbd_conn_transport_init(void) 428 { 429 int ret; 430 431 mutex_lock(&init_lock); 432 ret = ksmbd_tcp_init(); 433 if (ret) { 434 pr_err("Failed to init TCP subsystem: %d\n", ret); 435 goto out; 436 } 437 438 ret = ksmbd_rdma_init(); 439 if (ret) { 440 pr_err("Failed to init RDMA subsystem: %d\n", ret); 441 goto out; 442 } 443 out: 444 mutex_unlock(&init_lock); 445 return ret; 446 } 447 448 static void stop_sessions(void) 449 { 450 struct ksmbd_conn *conn; 451 struct ksmbd_transport *t; 452 453 again: 454 down_read(&conn_list_lock); 455 list_for_each_entry(conn, &conn_list, conns_list) { 456 t = conn->transport; 457 ksmbd_conn_set_exiting(conn); 458 if (t->ops->shutdown) { 459 up_read(&conn_list_lock); 460 t->ops->shutdown(t); 461 down_read(&conn_list_lock); 462 } 463 } 464 up_read(&conn_list_lock); 465 466 if (!list_empty(&conn_list)) { 467 msleep(100); 468 goto again; 469 } 470 } 471 472 void ksmbd_conn_transport_destroy(void) 473 { 474 mutex_lock(&init_lock); 475 ksmbd_tcp_destroy(); 476 ksmbd_rdma_destroy(); 477 stop_sessions(); 478 mutex_unlock(&init_lock); 479 } 480