1 /* SPDX-License-Identifier: LGPL-2.1 */
2 /*
3 *
4 * Copyright (C) International Business Machines Corp., 2002,2008
5 * Author(s): Steve French (sfrench@us.ibm.com)
6 * Jeremy Allison (jra@samba.org)
7 *
8 */
9 #ifndef _CIFS_GLOB_H
10 #define _CIFS_GLOB_H
11
12 #include <linux/in.h>
13 #include <linux/in6.h>
14 #include <linux/inet.h>
15 #include <linux/slab.h>
16 #include <linux/scatterlist.h>
17 #include <linux/mm.h>
18 #include <linux/mempool.h>
19 #include <linux/workqueue.h>
20 #include <linux/utsname.h>
21 #include <linux/sched/mm.h>
22 #include <linux/netfs.h>
23 #include "cifs_fs_sb.h"
24 #include "cifsacl.h"
25 #include <crypto/internal/hash.h>
26 #include <uapi/linux/cifs/cifs_mount.h>
27 #include "../smbfs_common/smb2pdu.h"
28 #include "smb2pdu.h"
29 #include <linux/filelock.h>
30
31 #define SMB_PATH_MAX 260
32 #define CIFS_PORT 445
33 #define RFC1001_PORT 139
34
35 /*
36 * The sizes of various internal tables and strings
37 */
38 #define MAX_UID_INFO 16
39 #define MAX_SES_INFO 2
40 #define MAX_TCON_INFO 4
41
42 #define MAX_TREE_SIZE (2 + CIFS_NI_MAXHOST + 1 + CIFS_MAX_SHARE_LEN + 1)
43
44 #define CIFS_MIN_RCV_POOL 4
45
46 #define MAX_REOPEN_ATT 5 /* these many maximum attempts to reopen a file */
47 /*
48 * default attribute cache timeout (jiffies)
49 */
50 #define CIFS_DEF_ACTIMEO (1 * HZ)
51
52 /*
53 * max attribute cache timeout (jiffies) - 2^30
54 */
55 #define CIFS_MAX_ACTIMEO (1 << 30)
56
57 /*
58 * Max persistent and resilient handle timeout (milliseconds).
59 * Windows durable max was 960000 (16 minutes)
60 */
61 #define SMB3_MAX_HANDLE_TIMEOUT 960000
62
63 /*
64 * MAX_REQ is the maximum number of requests that WE will send
65 * on one socket concurrently.
66 */
67 #define CIFS_MAX_REQ 32767
68
69 #define RFC1001_NAME_LEN 15
70 #define RFC1001_NAME_LEN_WITH_NULL (RFC1001_NAME_LEN + 1)
71
72 /* maximum length of ip addr as a string (including ipv6 and sctp) */
73 #define SERVER_NAME_LENGTH 80
74 #define SERVER_NAME_LEN_WITH_NULL (SERVER_NAME_LENGTH + 1)
75
76 /* echo interval in seconds */
77 #define SMB_ECHO_INTERVAL_MIN 1
78 #define SMB_ECHO_INTERVAL_MAX 600
79 #define SMB_ECHO_INTERVAL_DEFAULT 60
80
81 /* smb multichannel query server interfaces interval in seconds */
82 #define SMB_INTERFACE_POLL_INTERVAL 600
83
84 /* maximum number of PDUs in one compound */
85 #define MAX_COMPOUND 5
86
87 /*
88 * Default number of credits to keep available for SMB3.
89 * This value is chosen somewhat arbitrarily. The Windows client
90 * defaults to 128 credits, the Windows server allows clients up to
91 * 512 credits (or 8K for later versions), and the NetApp server
92 * does not limit clients at all. Choose a high enough default value
93 * such that the client shouldn't limit performance, but allow mount
94 * to override (until you approach 64K, where we limit credits to 65000
95 * to reduce possibility of seeing more server credit overflow bugs.
96 */
97 #define SMB2_MAX_CREDITS_AVAILABLE 32000
98
99 #include "cifspdu.h"
100
101 #ifndef XATTR_DOS_ATTRIB
102 #define XATTR_DOS_ATTRIB "user.DOSATTRIB"
103 #endif
104
105 #define CIFS_MAX_WORKSTATION_LEN (__NEW_UTS_LEN + 1) /* reasonable max for client */
106
107 #define CIFS_DFS_ROOT_SES(ses) ((ses)->dfs_root_ses ?: (ses))
108
109 /*
110 * CIFS vfs client Status information (based on what we know.)
111 */
112
113 /* associated with each connection */
114 enum statusEnum {
115 CifsNew = 0,
116 CifsGood,
117 CifsExiting,
118 CifsNeedReconnect,
119 CifsNeedNegotiate,
120 CifsInNegotiate,
121 };
122
123 /* associated with each smb session */
124 enum ses_status_enum {
125 SES_NEW = 0,
126 SES_GOOD,
127 SES_EXITING,
128 SES_NEED_RECON,
129 SES_IN_SETUP
130 };
131
132 /* associated with each tree connection to the server */
133 enum tid_status_enum {
134 TID_NEW = 0,
135 TID_GOOD,
136 TID_EXITING,
137 TID_NEED_RECON,
138 TID_NEED_TCON,
139 TID_IN_TCON,
140 TID_NEED_FILES_INVALIDATE, /* currently unused */
141 TID_IN_FILES_INVALIDATE
142 };
143
144 enum securityEnum {
145 Unspecified = 0, /* not specified */
146 NTLMv2, /* Legacy NTLM auth with NTLMv2 hash */
147 RawNTLMSSP, /* NTLMSSP without SPNEGO, NTLMv2 hash */
148 Kerberos, /* Kerberos via SPNEGO */
149 };
150
151 struct session_key {
152 unsigned int len;
153 char *response;
154 };
155
156 /* crypto hashing related structure/fields, not specific to a sec mech */
157 struct cifs_secmech {
158 struct shash_desc *hmacmd5; /* hmacmd5 hash function, for NTLMv2/CR1 hashes */
159 struct shash_desc *md5; /* md5 hash function, for CIFS/SMB1 signatures */
160 struct shash_desc *hmacsha256; /* hmac-sha256 hash function, for SMB2 signatures */
161 struct shash_desc *sha512; /* sha512 hash function, for SMB3.1.1 preauth hash */
162 struct shash_desc *aes_cmac; /* block-cipher based MAC function, for SMB3 signatures */
163
164 struct crypto_aead *enc; /* smb3 encryption AEAD TFM (AES-CCM and AES-GCM) */
165 struct crypto_aead *dec; /* smb3 decryption AEAD TFM (AES-CCM and AES-GCM) */
166 };
167
168 /* per smb session structure/fields */
169 struct ntlmssp_auth {
170 bool sesskey_per_smbsess; /* whether session key is per smb session */
171 __u32 client_flags; /* sent by client in type 1 ntlmsssp exchange */
172 __u32 server_flags; /* sent by server in type 2 ntlmssp exchange */
173 unsigned char ciphertext[CIFS_CPHTXT_SIZE]; /* sent to server */
174 char cryptkey[CIFS_CRYPTO_KEY_SIZE]; /* used by ntlmssp */
175 };
176
177 struct cifs_cred {
178 int uid;
179 int gid;
180 int mode;
181 int cecount;
182 struct cifs_sid osid;
183 struct cifs_sid gsid;
184 struct cifs_ntace *ntaces;
185 struct cifs_ace *aces;
186 };
187
188 struct cifs_open_info_data {
189 char *symlink_target;
190 union {
191 struct smb2_file_all_info fi;
192 struct smb311_posix_qinfo posix_fi;
193 };
194 };
195
cifs_free_open_info(struct cifs_open_info_data * data)196 static inline void cifs_free_open_info(struct cifs_open_info_data *data)
197 {
198 kfree(data->symlink_target);
199 }
200
201 /*
202 *****************************************************************
203 * Except the CIFS PDUs themselves all the
204 * globally interesting structs should go here
205 *****************************************************************
206 */
207
208 /*
209 * A smb_rqst represents a complete request to be issued to a server. It's
210 * formed by a kvec array, followed by an array of pages. Page data is assumed
211 * to start at the beginning of the first page.
212 */
213 struct smb_rqst {
214 struct kvec *rq_iov; /* array of kvecs */
215 unsigned int rq_nvec; /* number of kvecs in array */
216 size_t rq_iter_size; /* Amount of data in ->rq_iter */
217 struct iov_iter rq_iter; /* Data iterator */
218 struct xarray rq_buffer; /* Page buffer for encryption */
219 };
220
221 struct mid_q_entry;
222 struct TCP_Server_Info;
223 struct cifsFileInfo;
224 struct cifs_ses;
225 struct cifs_tcon;
226 struct dfs_info3_param;
227 struct cifs_fattr;
228 struct smb3_fs_context;
229 struct cifs_fid;
230 struct cifs_readdata;
231 struct cifs_writedata;
232 struct cifs_io_parms;
233 struct cifs_search_info;
234 struct cifsInodeInfo;
235 struct cifs_open_parms;
236 struct cifs_credits;
237
238 struct smb_version_operations {
239 int (*send_cancel)(struct TCP_Server_Info *, struct smb_rqst *,
240 struct mid_q_entry *);
241 bool (*compare_fids)(struct cifsFileInfo *, struct cifsFileInfo *);
242 /* setup request: allocate mid, sign message */
243 struct mid_q_entry *(*setup_request)(struct cifs_ses *,
244 struct TCP_Server_Info *,
245 struct smb_rqst *);
246 /* setup async request: allocate mid, sign message */
247 struct mid_q_entry *(*setup_async_request)(struct TCP_Server_Info *,
248 struct smb_rqst *);
249 /* check response: verify signature, map error */
250 int (*check_receive)(struct mid_q_entry *, struct TCP_Server_Info *,
251 bool);
252 void (*add_credits)(struct TCP_Server_Info *server,
253 const struct cifs_credits *credits,
254 const int optype);
255 void (*set_credits)(struct TCP_Server_Info *, const int);
256 int * (*get_credits_field)(struct TCP_Server_Info *, const int);
257 unsigned int (*get_credits)(struct mid_q_entry *);
258 __u64 (*get_next_mid)(struct TCP_Server_Info *);
259 void (*revert_current_mid)(struct TCP_Server_Info *server,
260 const unsigned int val);
261 /* data offset from read response message */
262 unsigned int (*read_data_offset)(char *);
263 /*
264 * Data length from read response message
265 * When in_remaining is true, the returned data length is in
266 * message field DataRemaining for out-of-band data read (e.g through
267 * Memory Registration RDMA write in SMBD).
268 * Otherwise, the returned data length is in message field DataLength.
269 */
270 unsigned int (*read_data_length)(char *, bool in_remaining);
271 /* map smb to linux error */
272 int (*map_error)(char *, bool);
273 /* find mid corresponding to the response message */
274 struct mid_q_entry * (*find_mid)(struct TCP_Server_Info *, char *);
275 void (*dump_detail)(void *buf, struct TCP_Server_Info *ptcp_info);
276 void (*clear_stats)(struct cifs_tcon *);
277 void (*print_stats)(struct seq_file *m, struct cifs_tcon *);
278 void (*dump_share_caps)(struct seq_file *, struct cifs_tcon *);
279 /* verify the message */
280 int (*check_message)(char *, unsigned int, struct TCP_Server_Info *);
281 bool (*is_oplock_break)(char *, struct TCP_Server_Info *);
282 int (*handle_cancelled_mid)(struct mid_q_entry *, struct TCP_Server_Info *);
283 void (*downgrade_oplock)(struct TCP_Server_Info *server,
284 struct cifsInodeInfo *cinode, __u32 oplock,
285 unsigned int epoch, bool *purge_cache);
286 /* process transaction2 response */
287 bool (*check_trans2)(struct mid_q_entry *, struct TCP_Server_Info *,
288 char *, int);
289 /* check if we need to negotiate */
290 bool (*need_neg)(struct TCP_Server_Info *);
291 /* negotiate to the server */
292 int (*negotiate)(const unsigned int xid,
293 struct cifs_ses *ses,
294 struct TCP_Server_Info *server);
295 /* set negotiated write size */
296 unsigned int (*negotiate_wsize)(struct cifs_tcon *tcon, struct smb3_fs_context *ctx);
297 /* set negotiated read size */
298 unsigned int (*negotiate_rsize)(struct cifs_tcon *tcon, struct smb3_fs_context *ctx);
299 /* setup smb sessionn */
300 int (*sess_setup)(const unsigned int, struct cifs_ses *,
301 struct TCP_Server_Info *server,
302 const struct nls_table *);
303 /* close smb session */
304 int (*logoff)(const unsigned int, struct cifs_ses *);
305 /* connect to a server share */
306 int (*tree_connect)(const unsigned int, struct cifs_ses *, const char *,
307 struct cifs_tcon *, const struct nls_table *);
308 /* close tree connecion */
309 int (*tree_disconnect)(const unsigned int, struct cifs_tcon *);
310 /* get DFS referrals */
311 int (*get_dfs_refer)(const unsigned int, struct cifs_ses *,
312 const char *, struct dfs_info3_param **,
313 unsigned int *, const struct nls_table *, int);
314 /* informational QFS call */
315 void (*qfs_tcon)(const unsigned int, struct cifs_tcon *,
316 struct cifs_sb_info *);
317 /* check if a path is accessible or not */
318 int (*is_path_accessible)(const unsigned int, struct cifs_tcon *,
319 struct cifs_sb_info *, const char *);
320 /* query path data from the server */
321 int (*query_path_info)(const unsigned int xid, struct cifs_tcon *tcon,
322 struct cifs_sb_info *cifs_sb, const char *full_path,
323 struct cifs_open_info_data *data, bool *adjust_tz, bool *reparse);
324 /* query file data from the server */
325 int (*query_file_info)(const unsigned int xid, struct cifs_tcon *tcon,
326 struct cifsFileInfo *cfile, struct cifs_open_info_data *data);
327 /* query reparse tag from srv to determine which type of special file */
328 int (*query_reparse_tag)(const unsigned int xid, struct cifs_tcon *tcon,
329 struct cifs_sb_info *cifs_sb, const char *path,
330 __u32 *reparse_tag);
331 /* get server index number */
332 int (*get_srv_inum)(const unsigned int xid, struct cifs_tcon *tcon,
333 struct cifs_sb_info *cifs_sb, const char *full_path, u64 *uniqueid,
334 struct cifs_open_info_data *data);
335 /* set size by path */
336 int (*set_path_size)(const unsigned int, struct cifs_tcon *,
337 const char *, __u64, struct cifs_sb_info *, bool);
338 /* set size by file handle */
339 int (*set_file_size)(const unsigned int, struct cifs_tcon *,
340 struct cifsFileInfo *, __u64, bool);
341 /* set attributes */
342 int (*set_file_info)(struct inode *, const char *, FILE_BASIC_INFO *,
343 const unsigned int);
344 int (*set_compression)(const unsigned int, struct cifs_tcon *,
345 struct cifsFileInfo *);
346 /* check if we can send an echo or nor */
347 bool (*can_echo)(struct TCP_Server_Info *);
348 /* send echo request */
349 int (*echo)(struct TCP_Server_Info *);
350 /* create directory */
351 int (*posix_mkdir)(const unsigned int xid, struct inode *inode,
352 umode_t mode, struct cifs_tcon *tcon,
353 const char *full_path,
354 struct cifs_sb_info *cifs_sb);
355 int (*mkdir)(const unsigned int xid, struct inode *inode, umode_t mode,
356 struct cifs_tcon *tcon, const char *name,
357 struct cifs_sb_info *sb);
358 /* set info on created directory */
359 void (*mkdir_setinfo)(struct inode *, const char *,
360 struct cifs_sb_info *, struct cifs_tcon *,
361 const unsigned int);
362 /* remove directory */
363 int (*rmdir)(const unsigned int, struct cifs_tcon *, const char *,
364 struct cifs_sb_info *);
365 /* unlink file */
366 int (*unlink)(const unsigned int, struct cifs_tcon *, const char *,
367 struct cifs_sb_info *);
368 /* open, rename and delete file */
369 int (*rename_pending_delete)(const char *, struct dentry *,
370 const unsigned int);
371 /* send rename request */
372 int (*rename)(const unsigned int, struct cifs_tcon *, const char *,
373 const char *, struct cifs_sb_info *);
374 /* send create hardlink request */
375 int (*create_hardlink)(const unsigned int, struct cifs_tcon *,
376 const char *, const char *,
377 struct cifs_sb_info *);
378 /* query symlink target */
379 int (*query_symlink)(const unsigned int, struct cifs_tcon *,
380 struct cifs_sb_info *, const char *,
381 char **, bool);
382 /* open a file for non-posix mounts */
383 int (*open)(const unsigned int xid, struct cifs_open_parms *oparms, __u32 *oplock,
384 void *buf);
385 /* set fid protocol-specific info */
386 void (*set_fid)(struct cifsFileInfo *, struct cifs_fid *, __u32);
387 /* close a file */
388 void (*close)(const unsigned int, struct cifs_tcon *,
389 struct cifs_fid *);
390 /* close a file, returning file attributes and timestamps */
391 void (*close_getattr)(const unsigned int xid, struct cifs_tcon *tcon,
392 struct cifsFileInfo *pfile_info);
393 /* send a flush request to the server */
394 int (*flush)(const unsigned int, struct cifs_tcon *, struct cifs_fid *);
395 /* async read from the server */
396 int (*async_readv)(struct cifs_readdata *);
397 /* async write to the server */
398 int (*async_writev)(struct cifs_writedata *,
399 void (*release)(struct kref *));
400 /* sync read from the server */
401 int (*sync_read)(const unsigned int, struct cifs_fid *,
402 struct cifs_io_parms *, unsigned int *, char **,
403 int *);
404 /* sync write to the server */
405 int (*sync_write)(const unsigned int, struct cifs_fid *,
406 struct cifs_io_parms *, unsigned int *, struct kvec *,
407 unsigned long);
408 /* open dir, start readdir */
409 int (*query_dir_first)(const unsigned int, struct cifs_tcon *,
410 const char *, struct cifs_sb_info *,
411 struct cifs_fid *, __u16,
412 struct cifs_search_info *);
413 /* continue readdir */
414 int (*query_dir_next)(const unsigned int, struct cifs_tcon *,
415 struct cifs_fid *,
416 __u16, struct cifs_search_info *srch_inf);
417 /* close dir */
418 int (*close_dir)(const unsigned int, struct cifs_tcon *,
419 struct cifs_fid *);
420 /* calculate a size of SMB message */
421 unsigned int (*calc_smb_size)(void *buf);
422 /* check for STATUS_PENDING and process the response if yes */
423 bool (*is_status_pending)(char *buf, struct TCP_Server_Info *server);
424 /* check for STATUS_NETWORK_SESSION_EXPIRED */
425 bool (*is_session_expired)(char *);
426 /* send oplock break response */
427 int (*oplock_response)(struct cifs_tcon *, struct cifs_fid *,
428 struct cifsInodeInfo *);
429 /* query remote filesystem */
430 int (*queryfs)(const unsigned int, struct cifs_tcon *,
431 struct cifs_sb_info *, struct kstatfs *);
432 /* send mandatory brlock to the server */
433 int (*mand_lock)(const unsigned int, struct cifsFileInfo *, __u64,
434 __u64, __u32, int, int, bool);
435 /* unlock range of mandatory locks */
436 int (*mand_unlock_range)(struct cifsFileInfo *, struct file_lock *,
437 const unsigned int);
438 /* push brlocks from the cache to the server */
439 int (*push_mand_locks)(struct cifsFileInfo *);
440 /* get lease key of the inode */
441 void (*get_lease_key)(struct inode *, struct cifs_fid *);
442 /* set lease key of the inode */
443 void (*set_lease_key)(struct inode *, struct cifs_fid *);
444 /* generate new lease key */
445 void (*new_lease_key)(struct cifs_fid *);
446 int (*generate_signingkey)(struct cifs_ses *ses,
447 struct TCP_Server_Info *server);
448 int (*calc_signature)(struct smb_rqst *, struct TCP_Server_Info *,
449 bool allocate_crypto);
450 int (*set_integrity)(const unsigned int, struct cifs_tcon *tcon,
451 struct cifsFileInfo *src_file);
452 int (*enum_snapshots)(const unsigned int xid, struct cifs_tcon *tcon,
453 struct cifsFileInfo *src_file, void __user *);
454 int (*notify)(const unsigned int xid, struct file *pfile,
455 void __user *pbuf, bool return_changes);
456 int (*query_mf_symlink)(unsigned int, struct cifs_tcon *,
457 struct cifs_sb_info *, const unsigned char *,
458 char *, unsigned int *);
459 int (*create_mf_symlink)(unsigned int, struct cifs_tcon *,
460 struct cifs_sb_info *, const unsigned char *,
461 char *, unsigned int *);
462 /* if we can do cache read operations */
463 bool (*is_read_op)(__u32);
464 /* set oplock level for the inode */
465 void (*set_oplock_level)(struct cifsInodeInfo *, __u32, unsigned int,
466 bool *);
467 /* create lease context buffer for CREATE request */
468 char * (*create_lease_buf)(u8 *lease_key, u8 oplock);
469 /* parse lease context buffer and return oplock/epoch info */
470 __u8 (*parse_lease_buf)(void *buf, unsigned int *epoch, char *lkey);
471 ssize_t (*copychunk_range)(const unsigned int,
472 struct cifsFileInfo *src_file,
473 struct cifsFileInfo *target_file,
474 u64 src_off, u64 len, u64 dest_off);
475 int (*duplicate_extents)(const unsigned int, struct cifsFileInfo *src,
476 struct cifsFileInfo *target_file, u64 src_off, u64 len,
477 u64 dest_off);
478 int (*validate_negotiate)(const unsigned int, struct cifs_tcon *);
479 ssize_t (*query_all_EAs)(const unsigned int, struct cifs_tcon *,
480 const unsigned char *, const unsigned char *, char *,
481 size_t, struct cifs_sb_info *);
482 int (*set_EA)(const unsigned int, struct cifs_tcon *, const char *,
483 const char *, const void *, const __u16,
484 const struct nls_table *, struct cifs_sb_info *);
485 struct cifs_ntsd * (*get_acl)(struct cifs_sb_info *, struct inode *,
486 const char *, u32 *, u32);
487 struct cifs_ntsd * (*get_acl_by_fid)(struct cifs_sb_info *,
488 const struct cifs_fid *, u32 *, u32);
489 int (*set_acl)(struct cifs_ntsd *, __u32, struct inode *, const char *,
490 int);
491 /* writepages retry size */
492 unsigned int (*wp_retry_size)(struct inode *);
493 /* get mtu credits */
494 int (*wait_mtu_credits)(struct TCP_Server_Info *, unsigned int,
495 unsigned int *, struct cifs_credits *);
496 /* adjust previously taken mtu credits to request size */
497 int (*adjust_credits)(struct TCP_Server_Info *server,
498 struct cifs_credits *credits,
499 const unsigned int payload_size);
500 /* check if we need to issue closedir */
501 bool (*dir_needs_close)(struct cifsFileInfo *);
502 long (*fallocate)(struct file *, struct cifs_tcon *, int, loff_t,
503 loff_t);
504 /* init transform request - used for encryption for now */
505 int (*init_transform_rq)(struct TCP_Server_Info *, int num_rqst,
506 struct smb_rqst *, struct smb_rqst *);
507 int (*is_transform_hdr)(void *buf);
508 int (*receive_transform)(struct TCP_Server_Info *,
509 struct mid_q_entry **, char **, int *);
510 enum securityEnum (*select_sectype)(struct TCP_Server_Info *,
511 enum securityEnum);
512 int (*next_header)(char *);
513 /* ioctl passthrough for query_info */
514 int (*ioctl_query_info)(const unsigned int xid,
515 struct cifs_tcon *tcon,
516 struct cifs_sb_info *cifs_sb,
517 __le16 *path, int is_dir,
518 unsigned long p);
519 /* make unix special files (block, char, fifo, socket) */
520 int (*make_node)(unsigned int xid,
521 struct inode *inode,
522 struct dentry *dentry,
523 struct cifs_tcon *tcon,
524 const char *full_path,
525 umode_t mode,
526 dev_t device_number);
527 /* version specific fiemap implementation */
528 int (*fiemap)(struct cifs_tcon *tcon, struct cifsFileInfo *,
529 struct fiemap_extent_info *, u64, u64);
530 /* version specific llseek implementation */
531 loff_t (*llseek)(struct file *, struct cifs_tcon *, loff_t, int);
532 /* Check for STATUS_IO_TIMEOUT */
533 bool (*is_status_io_timeout)(char *buf);
534 /* Check for STATUS_NETWORK_NAME_DELETED */
535 void (*is_network_name_deleted)(char *buf, struct TCP_Server_Info *srv);
536 };
537
538 struct smb_version_values {
539 char *version_string;
540 __u16 protocol_id;
541 __u32 req_capabilities;
542 __u32 large_lock_type;
543 __u32 exclusive_lock_type;
544 __u32 shared_lock_type;
545 __u32 unlock_lock_type;
546 size_t header_preamble_size;
547 size_t header_size;
548 size_t max_header_size;
549 size_t read_rsp_size;
550 __le16 lock_cmd;
551 unsigned int cap_unix;
552 unsigned int cap_nt_find;
553 unsigned int cap_large_files;
554 __u16 signing_enabled;
555 __u16 signing_required;
556 size_t create_lease_size;
557 };
558
559 #define HEADER_SIZE(server) (server->vals->header_size)
560 #define MAX_HEADER_SIZE(server) (server->vals->max_header_size)
561 #define HEADER_PREAMBLE_SIZE(server) (server->vals->header_preamble_size)
562 #define MID_HEADER_SIZE(server) (HEADER_SIZE(server) - 1 - HEADER_PREAMBLE_SIZE(server))
563
564 /**
565 * CIFS superblock mount flags (mnt_cifs_flags) to consider when
566 * trying to reuse existing superblock for a new mount
567 */
568 #define CIFS_MOUNT_MASK (CIFS_MOUNT_NO_PERM | CIFS_MOUNT_SET_UID | \
569 CIFS_MOUNT_SERVER_INUM | CIFS_MOUNT_DIRECT_IO | \
570 CIFS_MOUNT_NO_XATTR | CIFS_MOUNT_MAP_SPECIAL_CHR | \
571 CIFS_MOUNT_MAP_SFM_CHR | \
572 CIFS_MOUNT_UNX_EMUL | CIFS_MOUNT_NO_BRL | \
573 CIFS_MOUNT_CIFS_ACL | CIFS_MOUNT_OVERR_UID | \
574 CIFS_MOUNT_OVERR_GID | CIFS_MOUNT_DYNPERM | \
575 CIFS_MOUNT_NOPOSIXBRL | CIFS_MOUNT_NOSSYNC | \
576 CIFS_MOUNT_FSCACHE | CIFS_MOUNT_MF_SYMLINKS | \
577 CIFS_MOUNT_MULTIUSER | CIFS_MOUNT_STRICT_IO | \
578 CIFS_MOUNT_CIFS_BACKUPUID | CIFS_MOUNT_CIFS_BACKUPGID | \
579 CIFS_MOUNT_UID_FROM_ACL | CIFS_MOUNT_NO_HANDLE_CACHE | \
580 CIFS_MOUNT_NO_DFS | CIFS_MOUNT_MODE_FROM_SID | \
581 CIFS_MOUNT_RO_CACHE | CIFS_MOUNT_RW_CACHE)
582
583 /**
584 * Generic VFS superblock mount flags (s_flags) to consider when
585 * trying to reuse existing superblock for a new mount
586 */
587 #define CIFS_MS_MASK (SB_RDONLY | SB_MANDLOCK | SB_NOEXEC | SB_NOSUID | \
588 SB_NODEV | SB_SYNCHRONOUS)
589
590 struct cifs_mnt_data {
591 struct cifs_sb_info *cifs_sb;
592 struct smb3_fs_context *ctx;
593 int flags;
594 };
595
596 static inline unsigned int
get_rfc1002_length(void * buf)597 get_rfc1002_length(void *buf)
598 {
599 return be32_to_cpu(*((__be32 *)buf)) & 0xffffff;
600 }
601
602 static inline void
inc_rfc1001_len(void * buf,int count)603 inc_rfc1001_len(void *buf, int count)
604 {
605 be32_add_cpu((__be32 *)buf, count);
606 }
607
608 struct TCP_Server_Info {
609 struct list_head tcp_ses_list;
610 struct list_head smb_ses_list;
611 spinlock_t srv_lock; /* protect anything here that is not protected */
612 __u64 conn_id; /* connection identifier (useful for debugging) */
613 int srv_count; /* reference counter */
614 /* 15 character server name + 0x20 16th byte indicating type = srv */
615 char server_RFC1001_name[RFC1001_NAME_LEN_WITH_NULL];
616 struct smb_version_operations *ops;
617 struct smb_version_values *vals;
618 /* updates to tcpStatus protected by cifs_tcp_ses_lock */
619 enum statusEnum tcpStatus; /* what we think the status is */
620 char *hostname; /* hostname portion of UNC string */
621 struct socket *ssocket;
622 struct sockaddr_storage dstaddr;
623 struct sockaddr_storage srcaddr; /* locally bind to this IP */
624 #ifdef CONFIG_NET_NS
625 struct net *net;
626 #endif
627 wait_queue_head_t response_q;
628 wait_queue_head_t request_q; /* if more than maxmpx to srvr must block*/
629 spinlock_t mid_lock; /* protect mid queue and it's entries */
630 struct list_head pending_mid_q;
631 bool noblocksnd; /* use blocking sendmsg */
632 bool noautotune; /* do not autotune send buf sizes */
633 bool nosharesock;
634 bool tcp_nodelay;
635 unsigned int credits; /* send no more requests at once */
636 unsigned int max_credits; /* can override large 32000 default at mnt */
637 unsigned int in_flight; /* number of requests on the wire to server */
638 unsigned int max_in_flight; /* max number of requests that were on wire */
639 spinlock_t req_lock; /* protect the two values above */
640 struct mutex _srv_mutex;
641 unsigned int nofs_flag;
642 struct task_struct *tsk;
643 char server_GUID[16];
644 __u16 sec_mode;
645 bool sign; /* is signing enabled on this connection? */
646 bool ignore_signature:1; /* skip validation of signatures in SMB2/3 rsp */
647 bool session_estab; /* mark when very first sess is established */
648 int echo_credits; /* echo reserved slots */
649 int oplock_credits; /* oplock break reserved slots */
650 bool echoes:1; /* enable echoes */
651 __u8 client_guid[SMB2_CLIENT_GUID_SIZE]; /* Client GUID */
652 u16 dialect; /* dialect index that server chose */
653 bool oplocks:1; /* enable oplocks */
654 unsigned int maxReq; /* Clients should submit no more */
655 /* than maxReq distinct unanswered SMBs to the server when using */
656 /* multiplexed reads or writes (for SMB1/CIFS only, not SMB2/SMB3) */
657 unsigned int maxBuf; /* maxBuf specifies the maximum */
658 /* message size the server can send or receive for non-raw SMBs */
659 /* maxBuf is returned by SMB NegotiateProtocol so maxBuf is only 0 */
660 /* when socket is setup (and during reconnect) before NegProt sent */
661 unsigned int max_rw; /* maxRw specifies the maximum */
662 /* message size the server can send or receive for */
663 /* SMB_COM_WRITE_RAW or SMB_COM_READ_RAW. */
664 unsigned int capabilities; /* selective disabling of caps by smb sess */
665 int timeAdj; /* Adjust for difference in server time zone in sec */
666 __u64 CurrentMid; /* multiplex id - rotating counter, protected by GlobalMid_Lock */
667 char cryptkey[CIFS_CRYPTO_KEY_SIZE]; /* used by ntlm, ntlmv2 etc */
668 /* 16th byte of RFC1001 workstation name is always null */
669 char workstation_RFC1001_name[RFC1001_NAME_LEN_WITH_NULL];
670 __u32 sequence_number; /* for signing, protected by srv_mutex */
671 __u32 reconnect_instance; /* incremented on each reconnect */
672 struct session_key session_key;
673 unsigned long lstrp; /* when we got last response from this server */
674 struct cifs_secmech secmech; /* crypto sec mech functs, descriptors */
675 #define CIFS_NEGFLAVOR_UNENCAP 1 /* wct == 17, but no ext_sec */
676 #define CIFS_NEGFLAVOR_EXTENDED 2 /* wct == 17, ext_sec bit set */
677 char negflavor; /* NEGOTIATE response flavor */
678 /* extended security flavors that server supports */
679 bool sec_ntlmssp; /* supports NTLMSSP */
680 bool sec_kerberosu2u; /* supports U2U Kerberos */
681 bool sec_kerberos; /* supports plain Kerberos */
682 bool sec_mskerberos; /* supports legacy MS Kerberos */
683 bool large_buf; /* is current buffer large? */
684 /* use SMBD connection instead of socket */
685 bool rdma;
686 /* point to the SMBD connection if RDMA is used instead of socket */
687 struct smbd_connection *smbd_conn;
688 struct delayed_work echo; /* echo ping workqueue job */
689 char *smallbuf; /* pointer to current "small" buffer */
690 char *bigbuf; /* pointer to current "big" buffer */
691 /* Total size of this PDU. Only valid from cifs_demultiplex_thread */
692 unsigned int pdu_size;
693 unsigned int total_read; /* total amount of data read in this pass */
694 atomic_t in_send; /* requests trying to send */
695 atomic_t num_waiters; /* blocked waiting to get in sendrecv */
696 #ifdef CONFIG_CIFS_STATS2
697 atomic_t num_cmds[NUMBER_OF_SMB2_COMMANDS]; /* total requests by cmd */
698 atomic_t smb2slowcmd[NUMBER_OF_SMB2_COMMANDS]; /* count resps > 1 sec */
699 __u64 time_per_cmd[NUMBER_OF_SMB2_COMMANDS]; /* total time per cmd */
700 __u32 slowest_cmd[NUMBER_OF_SMB2_COMMANDS];
701 __u32 fastest_cmd[NUMBER_OF_SMB2_COMMANDS];
702 #endif /* STATS2 */
703 unsigned int max_read;
704 unsigned int max_write;
705 unsigned int min_offload;
706 __le16 compress_algorithm;
707 __u16 signing_algorithm;
708 __le16 cipher_type;
709 /* save initital negprot hash */
710 __u8 preauth_sha_hash[SMB2_PREAUTH_HASH_SIZE];
711 bool signing_negotiated; /* true if valid signing context rcvd from server */
712 bool posix_ext_supported;
713 struct delayed_work reconnect; /* reconnect workqueue job */
714 struct mutex reconnect_mutex; /* prevent simultaneous reconnects */
715 unsigned long echo_interval;
716
717 /*
718 * Number of targets available for reconnect. The more targets
719 * the more tasks have to wait to let the demultiplex thread
720 * reconnect.
721 */
722 int nr_targets;
723 bool noblockcnt; /* use non-blocking connect() */
724
725 /*
726 * If this is a session channel,
727 * primary_server holds the ref-counted
728 * pointer to primary channel connection for the session.
729 */
730 #define CIFS_SERVER_IS_CHAN(server) (!!(server)->primary_server)
731 struct TCP_Server_Info *primary_server;
732
733 #ifdef CONFIG_CIFS_SWN_UPCALL
734 bool use_swn_dstaddr;
735 struct sockaddr_storage swn_dstaddr;
736 #endif
737 struct mutex refpath_lock; /* protects leaf_fullpath */
738 /*
739 * Canonical DFS full paths that were used to chase referrals in mount and reconnect.
740 *
741 * origin_fullpath: first or original referral path
742 * leaf_fullpath: last referral path (might be changed due to nested links in reconnect)
743 *
744 * current_fullpath: pointer to either origin_fullpath or leaf_fullpath
745 * NOTE: cannot be accessed outside cifs_reconnect() and smb2_reconnect()
746 *
747 * format: \\HOST\SHARE\[OPTIONAL PATH]
748 */
749 char *origin_fullpath, *leaf_fullpath, *current_fullpath;
750 };
751
is_smb1(struct TCP_Server_Info * server)752 static inline bool is_smb1(struct TCP_Server_Info *server)
753 {
754 return HEADER_PREAMBLE_SIZE(server) != 0;
755 }
756
cifs_server_lock(struct TCP_Server_Info * server)757 static inline void cifs_server_lock(struct TCP_Server_Info *server)
758 {
759 unsigned int nofs_flag = memalloc_nofs_save();
760
761 mutex_lock(&server->_srv_mutex);
762 server->nofs_flag = nofs_flag;
763 }
764
cifs_server_unlock(struct TCP_Server_Info * server)765 static inline void cifs_server_unlock(struct TCP_Server_Info *server)
766 {
767 unsigned int nofs_flag = server->nofs_flag;
768
769 mutex_unlock(&server->_srv_mutex);
770 memalloc_nofs_restore(nofs_flag);
771 }
772
773 struct cifs_credits {
774 unsigned int value;
775 unsigned int instance;
776 };
777
778 static inline unsigned int
in_flight(struct TCP_Server_Info * server)779 in_flight(struct TCP_Server_Info *server)
780 {
781 unsigned int num;
782
783 spin_lock(&server->req_lock);
784 num = server->in_flight;
785 spin_unlock(&server->req_lock);
786 return num;
787 }
788
789 static inline bool
has_credits(struct TCP_Server_Info * server,int * credits,int num_credits)790 has_credits(struct TCP_Server_Info *server, int *credits, int num_credits)
791 {
792 int num;
793
794 spin_lock(&server->req_lock);
795 num = *credits;
796 spin_unlock(&server->req_lock);
797 return num >= num_credits;
798 }
799
800 static inline void
add_credits(struct TCP_Server_Info * server,const struct cifs_credits * credits,const int optype)801 add_credits(struct TCP_Server_Info *server, const struct cifs_credits *credits,
802 const int optype)
803 {
804 server->ops->add_credits(server, credits, optype);
805 }
806
807 static inline void
add_credits_and_wake_if(struct TCP_Server_Info * server,const struct cifs_credits * credits,const int optype)808 add_credits_and_wake_if(struct TCP_Server_Info *server,
809 const struct cifs_credits *credits, const int optype)
810 {
811 if (credits->value) {
812 server->ops->add_credits(server, credits, optype);
813 wake_up(&server->request_q);
814 }
815 }
816
817 static inline void
set_credits(struct TCP_Server_Info * server,const int val)818 set_credits(struct TCP_Server_Info *server, const int val)
819 {
820 server->ops->set_credits(server, val);
821 }
822
823 static inline int
adjust_credits(struct TCP_Server_Info * server,struct cifs_credits * credits,const unsigned int payload_size)824 adjust_credits(struct TCP_Server_Info *server, struct cifs_credits *credits,
825 const unsigned int payload_size)
826 {
827 return server->ops->adjust_credits ?
828 server->ops->adjust_credits(server, credits, payload_size) : 0;
829 }
830
831 static inline __le64
get_next_mid64(struct TCP_Server_Info * server)832 get_next_mid64(struct TCP_Server_Info *server)
833 {
834 return cpu_to_le64(server->ops->get_next_mid(server));
835 }
836
837 static inline __le16
get_next_mid(struct TCP_Server_Info * server)838 get_next_mid(struct TCP_Server_Info *server)
839 {
840 __u16 mid = server->ops->get_next_mid(server);
841 /*
842 * The value in the SMB header should be little endian for easy
843 * on-the-wire decoding.
844 */
845 return cpu_to_le16(mid);
846 }
847
848 static inline void
revert_current_mid(struct TCP_Server_Info * server,const unsigned int val)849 revert_current_mid(struct TCP_Server_Info *server, const unsigned int val)
850 {
851 if (server->ops->revert_current_mid)
852 server->ops->revert_current_mid(server, val);
853 }
854
855 static inline void
revert_current_mid_from_hdr(struct TCP_Server_Info * server,const struct smb2_hdr * shdr)856 revert_current_mid_from_hdr(struct TCP_Server_Info *server,
857 const struct smb2_hdr *shdr)
858 {
859 unsigned int num = le16_to_cpu(shdr->CreditCharge);
860
861 return revert_current_mid(server, num > 0 ? num : 1);
862 }
863
864 static inline __u16
get_mid(const struct smb_hdr * smb)865 get_mid(const struct smb_hdr *smb)
866 {
867 return le16_to_cpu(smb->Mid);
868 }
869
870 static inline bool
compare_mid(__u16 mid,const struct smb_hdr * smb)871 compare_mid(__u16 mid, const struct smb_hdr *smb)
872 {
873 return mid == le16_to_cpu(smb->Mid);
874 }
875
876 /*
877 * When the server supports very large reads and writes via POSIX extensions,
878 * we can allow up to 2^24-1, minus the size of a READ/WRITE_AND_X header, not
879 * including the RFC1001 length.
880 *
881 * Note that this might make for "interesting" allocation problems during
882 * writeback however as we have to allocate an array of pointers for the
883 * pages. A 16M write means ~32kb page array with PAGE_SIZE == 4096.
884 *
885 * For reads, there is a similar problem as we need to allocate an array
886 * of kvecs to handle the receive, though that should only need to be done
887 * once.
888 */
889 #define CIFS_MAX_WSIZE ((1<<24) - 1 - sizeof(WRITE_REQ) + 4)
890 #define CIFS_MAX_RSIZE ((1<<24) - sizeof(READ_RSP) + 4)
891
892 /*
893 * When the server doesn't allow large posix writes, only allow a rsize/wsize
894 * of 2^17-1 minus the size of the call header. That allows for a read or
895 * write up to the maximum size described by RFC1002.
896 */
897 #define CIFS_MAX_RFC1002_WSIZE ((1<<17) - 1 - sizeof(WRITE_REQ) + 4)
898 #define CIFS_MAX_RFC1002_RSIZE ((1<<17) - 1 - sizeof(READ_RSP) + 4)
899
900 #define CIFS_DEFAULT_IOSIZE (1024 * 1024)
901
902 /*
903 * Windows only supports a max of 60kb reads and 65535 byte writes. Default to
904 * those values when posix extensions aren't in force. In actuality here, we
905 * use 65536 to allow for a write that is a multiple of 4k. Most servers seem
906 * to be ok with the extra byte even though Windows doesn't send writes that
907 * are that large.
908 *
909 * Citation:
910 *
911 * https://blogs.msdn.com/b/openspecification/archive/2009/04/10/smb-maximum-transmit-buffer-size-and-performance-tuning.aspx
912 */
913 #define CIFS_DEFAULT_NON_POSIX_RSIZE (60 * 1024)
914 #define CIFS_DEFAULT_NON_POSIX_WSIZE (65536)
915
916 /*
917 * Macros to allow the TCP_Server_Info->net field and related code to drop out
918 * when CONFIG_NET_NS isn't set.
919 */
920
921 #ifdef CONFIG_NET_NS
922
cifs_net_ns(struct TCP_Server_Info * srv)923 static inline struct net *cifs_net_ns(struct TCP_Server_Info *srv)
924 {
925 return srv->net;
926 }
927
cifs_set_net_ns(struct TCP_Server_Info * srv,struct net * net)928 static inline void cifs_set_net_ns(struct TCP_Server_Info *srv, struct net *net)
929 {
930 srv->net = net;
931 }
932
933 #else
934
cifs_net_ns(struct TCP_Server_Info * srv)935 static inline struct net *cifs_net_ns(struct TCP_Server_Info *srv)
936 {
937 return &init_net;
938 }
939
cifs_set_net_ns(struct TCP_Server_Info * srv,struct net * net)940 static inline void cifs_set_net_ns(struct TCP_Server_Info *srv, struct net *net)
941 {
942 }
943
944 #endif
945
946 struct cifs_server_iface {
947 struct list_head iface_head;
948 struct kref refcount;
949 size_t speed;
950 unsigned int rdma_capable : 1;
951 unsigned int rss_capable : 1;
952 unsigned int is_active : 1; /* unset if non existent */
953 struct sockaddr_storage sockaddr;
954 };
955
956 /* release iface when last ref is dropped */
957 static inline void
release_iface(struct kref * ref)958 release_iface(struct kref *ref)
959 {
960 struct cifs_server_iface *iface = container_of(ref,
961 struct cifs_server_iface,
962 refcount);
963 list_del_init(&iface->iface_head);
964 kfree(iface);
965 }
966
967 /*
968 * compare two interfaces a and b
969 * return 0 if everything matches.
970 * return 1 if a has higher link speed, or rdma capable, or rss capable
971 * return -1 otherwise.
972 */
973 static inline int
iface_cmp(struct cifs_server_iface * a,struct cifs_server_iface * b)974 iface_cmp(struct cifs_server_iface *a, struct cifs_server_iface *b)
975 {
976 int cmp_ret = 0;
977
978 WARN_ON(!a || !b);
979 if (a->speed == b->speed) {
980 if (a->rdma_capable == b->rdma_capable) {
981 if (a->rss_capable == b->rss_capable) {
982 cmp_ret = memcmp(&a->sockaddr, &b->sockaddr,
983 sizeof(a->sockaddr));
984 if (!cmp_ret)
985 return 0;
986 else if (cmp_ret > 0)
987 return 1;
988 else
989 return -1;
990 } else if (a->rss_capable > b->rss_capable)
991 return 1;
992 else
993 return -1;
994 } else if (a->rdma_capable > b->rdma_capable)
995 return 1;
996 else
997 return -1;
998 } else if (a->speed > b->speed)
999 return 1;
1000 else
1001 return -1;
1002 }
1003
1004 struct cifs_chan {
1005 unsigned int in_reconnect : 1; /* if session setup in progress for this channel */
1006 struct TCP_Server_Info *server;
1007 struct cifs_server_iface *iface; /* interface in use */
1008 __u8 signkey[SMB3_SIGN_KEY_SIZE];
1009 };
1010
1011 /*
1012 * Session structure. One of these for each uid session with a particular host
1013 */
1014 struct cifs_ses {
1015 struct list_head smb_ses_list;
1016 struct list_head rlist; /* reconnect list */
1017 struct list_head tcon_list;
1018 struct cifs_tcon *tcon_ipc;
1019 spinlock_t ses_lock; /* protect anything here that is not protected */
1020 struct mutex session_mutex;
1021 struct TCP_Server_Info *server; /* pointer to server info */
1022 int ses_count; /* reference counter */
1023 enum ses_status_enum ses_status; /* updates protected by cifs_tcp_ses_lock */
1024 unsigned int overrideSecFlg; /* if non-zero override global sec flags */
1025 char *serverOS; /* name of operating system underlying server */
1026 char *serverNOS; /* name of network operating system of server */
1027 char *serverDomain; /* security realm of server */
1028 __u64 Suid; /* remote smb uid */
1029 kuid_t linux_uid; /* overriding owner of files on the mount */
1030 kuid_t cred_uid; /* owner of credentials */
1031 unsigned int capabilities;
1032 char ip_addr[INET6_ADDRSTRLEN + 1]; /* Max ipv6 (or v4) addr string len */
1033 char *user_name; /* must not be null except during init of sess
1034 and after mount option parsing we fill it */
1035 char *domainName;
1036 char *password;
1037 char workstation_name[CIFS_MAX_WORKSTATION_LEN];
1038 struct session_key auth_key;
1039 struct ntlmssp_auth *ntlmssp; /* ciphertext, flags, server challenge */
1040 enum securityEnum sectype; /* what security flavor was specified? */
1041 bool sign; /* is signing required? */
1042 bool domainAuto:1;
1043 __u16 session_flags;
1044 __u8 smb3signingkey[SMB3_SIGN_KEY_SIZE];
1045 __u8 smb3encryptionkey[SMB3_ENC_DEC_KEY_SIZE];
1046 __u8 smb3decryptionkey[SMB3_ENC_DEC_KEY_SIZE];
1047 __u8 preauth_sha_hash[SMB2_PREAUTH_HASH_SIZE];
1048
1049 /*
1050 * Network interfaces available on the server this session is
1051 * connected to.
1052 *
1053 * Other channels can be opened by connecting and binding this
1054 * session to interfaces from this list.
1055 *
1056 * iface_lock should be taken when accessing any of these fields
1057 */
1058 spinlock_t iface_lock;
1059 /* ========= begin: protected by iface_lock ======== */
1060 struct list_head iface_list;
1061 size_t iface_count;
1062 unsigned long iface_last_update; /* jiffies */
1063 /* ========= end: protected by iface_lock ======== */
1064
1065 spinlock_t chan_lock;
1066 /* ========= begin: protected by chan_lock ======== */
1067 #define CIFS_MAX_CHANNELS 16
1068 #define CIFS_ALL_CHANNELS_SET(ses) \
1069 ((1UL << (ses)->chan_count) - 1)
1070 #define CIFS_ALL_CHANS_GOOD(ses) \
1071 (!(ses)->chans_need_reconnect)
1072 #define CIFS_ALL_CHANS_NEED_RECONNECT(ses) \
1073 ((ses)->chans_need_reconnect == CIFS_ALL_CHANNELS_SET(ses))
1074 #define CIFS_SET_ALL_CHANS_NEED_RECONNECT(ses) \
1075 ((ses)->chans_need_reconnect = CIFS_ALL_CHANNELS_SET(ses))
1076 #define CIFS_CHAN_NEEDS_RECONNECT(ses, index) \
1077 test_bit((index), &(ses)->chans_need_reconnect)
1078 #define CIFS_CHAN_IN_RECONNECT(ses, index) \
1079 ((ses)->chans[(index)].in_reconnect)
1080
1081 struct cifs_chan chans[CIFS_MAX_CHANNELS];
1082 size_t chan_count;
1083 size_t chan_max;
1084 atomic_t chan_seq; /* round robin state */
1085
1086 /*
1087 * chans_need_reconnect is a bitmap indicating which of the channels
1088 * under this smb session needs to be reconnected.
1089 * If not multichannel session, only one bit will be used.
1090 *
1091 * We will ask for sess and tcon reconnection only if all the
1092 * channels are marked for needing reconnection. This will
1093 * enable the sessions on top to continue to live till any
1094 * of the channels below are active.
1095 */
1096 unsigned long chans_need_reconnect;
1097 /* ========= end: protected by chan_lock ======== */
1098 struct cifs_ses *dfs_root_ses;
1099 };
1100
1101 static inline bool
cap_unix(struct cifs_ses * ses)1102 cap_unix(struct cifs_ses *ses)
1103 {
1104 return ses->server->vals->cap_unix & ses->capabilities;
1105 }
1106
1107 /*
1108 * common struct for holding inode info when searching for or updating an
1109 * inode with new info
1110 */
1111
1112 #define CIFS_FATTR_DFS_REFERRAL 0x1
1113 #define CIFS_FATTR_DELETE_PENDING 0x2
1114 #define CIFS_FATTR_NEED_REVAL 0x4
1115 #define CIFS_FATTR_INO_COLLISION 0x8
1116 #define CIFS_FATTR_UNKNOWN_NLINK 0x10
1117 #define CIFS_FATTR_FAKE_ROOT_INO 0x20
1118
1119 struct cifs_fattr {
1120 u32 cf_flags;
1121 u32 cf_cifsattrs;
1122 u64 cf_uniqueid;
1123 u64 cf_eof;
1124 u64 cf_bytes;
1125 u64 cf_createtime;
1126 kuid_t cf_uid;
1127 kgid_t cf_gid;
1128 umode_t cf_mode;
1129 dev_t cf_rdev;
1130 unsigned int cf_nlink;
1131 unsigned int cf_dtype;
1132 struct timespec64 cf_atime;
1133 struct timespec64 cf_mtime;
1134 struct timespec64 cf_ctime;
1135 u32 cf_cifstag;
1136 char *cf_symlink_target;
1137 };
1138
1139 /*
1140 * there is one of these for each connection to a resource on a particular
1141 * session
1142 */
1143 struct cifs_tcon {
1144 struct list_head tcon_list;
1145 int tc_count;
1146 struct list_head rlist; /* reconnect list */
1147 spinlock_t tc_lock; /* protect anything here that is not protected */
1148 atomic_t num_local_opens; /* num of all opens including disconnected */
1149 atomic_t num_remote_opens; /* num of all network opens on server */
1150 struct list_head openFileList;
1151 spinlock_t open_file_lock; /* protects list above */
1152 struct cifs_ses *ses; /* pointer to session associated with */
1153 char tree_name[MAX_TREE_SIZE + 1]; /* UNC name of resource in ASCII */
1154 char *nativeFileSystem;
1155 char *password; /* for share-level security */
1156 __u32 tid; /* The 4 byte tree id */
1157 __u16 Flags; /* optional support bits */
1158 enum tid_status_enum status;
1159 atomic_t num_smbs_sent;
1160 union {
1161 struct {
1162 atomic_t num_writes;
1163 atomic_t num_reads;
1164 atomic_t num_flushes;
1165 atomic_t num_oplock_brks;
1166 atomic_t num_opens;
1167 atomic_t num_closes;
1168 atomic_t num_deletes;
1169 atomic_t num_mkdirs;
1170 atomic_t num_posixopens;
1171 atomic_t num_posixmkdirs;
1172 atomic_t num_rmdirs;
1173 atomic_t num_renames;
1174 atomic_t num_t2renames;
1175 atomic_t num_ffirst;
1176 atomic_t num_fnext;
1177 atomic_t num_fclose;
1178 atomic_t num_hardlinks;
1179 atomic_t num_symlinks;
1180 atomic_t num_locks;
1181 atomic_t num_acl_get;
1182 atomic_t num_acl_set;
1183 } cifs_stats;
1184 struct {
1185 atomic_t smb2_com_sent[NUMBER_OF_SMB2_COMMANDS];
1186 atomic_t smb2_com_failed[NUMBER_OF_SMB2_COMMANDS];
1187 } smb2_stats;
1188 } stats;
1189 __u64 bytes_read;
1190 __u64 bytes_written;
1191 spinlock_t stat_lock; /* protects the two fields above */
1192 FILE_SYSTEM_DEVICE_INFO fsDevInfo;
1193 FILE_SYSTEM_ATTRIBUTE_INFO fsAttrInfo; /* ok if fs name truncated */
1194 FILE_SYSTEM_UNIX_INFO fsUnixInfo;
1195 bool ipc:1; /* set if connection to IPC$ share (always also pipe) */
1196 bool pipe:1; /* set if connection to pipe share */
1197 bool print:1; /* set if connection to printer share */
1198 bool retry:1;
1199 bool nocase:1;
1200 bool nohandlecache:1; /* if strange server resource prob can turn off */
1201 bool nodelete:1;
1202 bool seal:1; /* transport encryption for this mounted share */
1203 bool unix_ext:1; /* if false disable Linux extensions to CIFS protocol
1204 for this mount even if server would support */
1205 bool posix_extensions; /* if true SMB3.11 posix extensions enabled */
1206 bool local_lease:1; /* check leases (only) on local system not remote */
1207 bool broken_posix_open; /* e.g. Samba server versions < 3.3.2, 3.2.9 */
1208 bool broken_sparse_sup; /* if server or share does not support sparse */
1209 bool need_reconnect:1; /* connection reset, tid now invalid */
1210 bool need_reopen_files:1; /* need to reopen tcon file handles */
1211 bool use_resilient:1; /* use resilient instead of durable handles */
1212 bool use_persistent:1; /* use persistent instead of durable handles */
1213 bool no_lease:1; /* Do not request leases on files or directories */
1214 bool use_witness:1; /* use witness protocol */
1215 __le32 capabilities;
1216 __u32 share_flags;
1217 __u32 maximal_access;
1218 __u32 vol_serial_number;
1219 __le64 vol_create_time;
1220 __u64 snapshot_time; /* for timewarp tokens - timestamp of snapshot */
1221 __u32 handle_timeout; /* persistent and durable handle timeout in ms */
1222 __u32 ss_flags; /* sector size flags */
1223 __u32 perf_sector_size; /* best sector size for perf */
1224 __u32 max_chunks;
1225 __u32 max_bytes_chunk;
1226 __u32 max_bytes_copy;
1227 #ifdef CONFIG_CIFS_FSCACHE
1228 u64 resource_id; /* server resource id */
1229 struct fscache_volume *fscache; /* cookie for share */
1230 #endif
1231 struct list_head pending_opens; /* list of incomplete opens */
1232 struct cached_fids *cfids;
1233 /* BB add field for back pointer to sb struct(s)? */
1234 #ifdef CONFIG_CIFS_DFS_UPCALL
1235 struct list_head ulist; /* cache update list */
1236 #endif
1237 struct delayed_work query_interfaces; /* query interfaces workqueue job */
1238 };
1239
1240 /*
1241 * This is a refcounted and timestamped container for a tcon pointer. The
1242 * container holds a tcon reference. It is considered safe to free one of
1243 * these when the tl_count goes to 0. The tl_time is the time of the last
1244 * "get" on the container.
1245 */
1246 struct tcon_link {
1247 struct rb_node tl_rbnode;
1248 kuid_t tl_uid;
1249 unsigned long tl_flags;
1250 #define TCON_LINK_MASTER 0
1251 #define TCON_LINK_PENDING 1
1252 #define TCON_LINK_IN_TREE 2
1253 unsigned long tl_time;
1254 atomic_t tl_count;
1255 struct cifs_tcon *tl_tcon;
1256 };
1257
1258 extern struct tcon_link *cifs_sb_tlink(struct cifs_sb_info *cifs_sb);
1259 extern void smb3_free_compound_rqst(int num_rqst, struct smb_rqst *rqst);
1260
1261 static inline struct cifs_tcon *
tlink_tcon(struct tcon_link * tlink)1262 tlink_tcon(struct tcon_link *tlink)
1263 {
1264 return tlink->tl_tcon;
1265 }
1266
1267 static inline struct tcon_link *
cifs_sb_master_tlink(struct cifs_sb_info * cifs_sb)1268 cifs_sb_master_tlink(struct cifs_sb_info *cifs_sb)
1269 {
1270 return cifs_sb->master_tlink;
1271 }
1272
1273 extern void cifs_put_tlink(struct tcon_link *tlink);
1274
1275 static inline struct tcon_link *
cifs_get_tlink(struct tcon_link * tlink)1276 cifs_get_tlink(struct tcon_link *tlink)
1277 {
1278 if (tlink && !IS_ERR(tlink))
1279 atomic_inc(&tlink->tl_count);
1280 return tlink;
1281 }
1282
1283 /* This function is always expected to succeed */
1284 extern struct cifs_tcon *cifs_sb_master_tcon(struct cifs_sb_info *cifs_sb);
1285
1286 #define CIFS_OPLOCK_NO_CHANGE 0xfe
1287
1288 struct cifs_pending_open {
1289 struct list_head olist;
1290 struct tcon_link *tlink;
1291 __u8 lease_key[16];
1292 __u32 oplock;
1293 };
1294
1295 struct cifs_deferred_close {
1296 struct list_head dlist;
1297 struct tcon_link *tlink;
1298 __u16 netfid;
1299 __u64 persistent_fid;
1300 __u64 volatile_fid;
1301 };
1302
1303 /*
1304 * This info hangs off the cifsFileInfo structure, pointed to by llist.
1305 * This is used to track byte stream locks on the file
1306 */
1307 struct cifsLockInfo {
1308 struct list_head llist; /* pointer to next cifsLockInfo */
1309 struct list_head blist; /* pointer to locks blocked on this */
1310 wait_queue_head_t block_q;
1311 __u64 offset;
1312 __u64 length;
1313 __u32 pid;
1314 __u16 type;
1315 __u16 flags;
1316 };
1317
1318 /*
1319 * One of these for each open instance of a file
1320 */
1321 struct cifs_search_info {
1322 loff_t index_of_last_entry;
1323 __u16 entries_in_buffer;
1324 __u16 info_level;
1325 __u32 resume_key;
1326 char *ntwrk_buf_start;
1327 char *srch_entries_start;
1328 char *last_entry;
1329 const char *presume_name;
1330 unsigned int resume_name_len;
1331 bool endOfSearch:1;
1332 bool emptyDir:1;
1333 bool unicode:1;
1334 bool smallBuf:1; /* so we know which buf_release function to call */
1335 };
1336
1337 #define ACL_NO_MODE ((umode_t)(-1))
1338 struct cifs_open_parms {
1339 struct cifs_tcon *tcon;
1340 struct cifs_sb_info *cifs_sb;
1341 int disposition;
1342 int desired_access;
1343 int create_options;
1344 const char *path;
1345 struct cifs_fid *fid;
1346 umode_t mode;
1347 bool reconnect:1;
1348 };
1349
1350 struct cifs_fid {
1351 __u16 netfid;
1352 __u64 persistent_fid; /* persist file id for smb2 */
1353 __u64 volatile_fid; /* volatile file id for smb2 */
1354 __u8 lease_key[SMB2_LEASE_KEY_SIZE]; /* lease key for smb2 */
1355 __u8 create_guid[16];
1356 __u32 access;
1357 struct cifs_pending_open *pending_open;
1358 unsigned int epoch;
1359 #ifdef CONFIG_CIFS_DEBUG2
1360 __u64 mid;
1361 #endif /* CIFS_DEBUG2 */
1362 bool purge_cache;
1363 };
1364
1365 struct cifs_fid_locks {
1366 struct list_head llist;
1367 struct cifsFileInfo *cfile; /* fid that owns locks */
1368 struct list_head locks; /* locks held by fid above */
1369 };
1370
1371 struct cifsFileInfo {
1372 /* following two lists are protected by tcon->open_file_lock */
1373 struct list_head tlist; /* pointer to next fid owned by tcon */
1374 struct list_head flist; /* next fid (file instance) for this inode */
1375 /* lock list below protected by cifsi->lock_sem */
1376 struct cifs_fid_locks *llist; /* brlocks held by this fid */
1377 kuid_t uid; /* allows finding which FileInfo structure */
1378 __u32 pid; /* process id who opened file */
1379 struct cifs_fid fid; /* file id from remote */
1380 struct list_head rlist; /* reconnect list */
1381 /* BB add lock scope info here if needed */
1382 /* lock scope id (0 if none) */
1383 struct dentry *dentry;
1384 struct tcon_link *tlink;
1385 unsigned int f_flags;
1386 bool invalidHandle:1; /* file closed via session abend */
1387 bool swapfile:1;
1388 bool oplock_break_cancelled:1;
1389 unsigned int oplock_epoch; /* epoch from the lease break */
1390 __u32 oplock_level; /* oplock/lease level from the lease break */
1391 int count;
1392 spinlock_t file_info_lock; /* protects four flag/count fields above */
1393 struct mutex fh_mutex; /* prevents reopen race after dead ses*/
1394 struct cifs_search_info srch_inf;
1395 struct work_struct oplock_break; /* work for oplock breaks */
1396 struct work_struct put; /* work for the final part of _put */
1397 struct delayed_work deferred;
1398 bool deferred_close_scheduled; /* Flag to indicate close is scheduled */
1399 char *symlink_target;
1400 };
1401
1402 struct cifs_io_parms {
1403 __u16 netfid;
1404 __u64 persistent_fid; /* persist file id for smb2 */
1405 __u64 volatile_fid; /* volatile file id for smb2 */
1406 __u32 pid;
1407 __u64 offset;
1408 unsigned int length;
1409 struct cifs_tcon *tcon;
1410 struct TCP_Server_Info *server;
1411 };
1412
1413 struct cifs_aio_ctx {
1414 struct kref refcount;
1415 struct list_head list;
1416 struct mutex aio_mutex;
1417 struct completion done;
1418 struct iov_iter iter;
1419 struct kiocb *iocb;
1420 struct cifsFileInfo *cfile;
1421 struct bio_vec *bv;
1422 loff_t pos;
1423 unsigned int nr_pinned_pages;
1424 ssize_t rc;
1425 unsigned int len;
1426 unsigned int total_len;
1427 unsigned int bv_need_unpin; /* If ->bv[] needs unpinning */
1428 bool should_dirty;
1429 /*
1430 * Indicates if this aio_ctx is for direct_io,
1431 * If yes, iter is a copy of the user passed iov_iter
1432 */
1433 bool direct_io;
1434 };
1435
1436 /* asynchronous read support */
1437 struct cifs_readdata {
1438 struct kref refcount;
1439 struct list_head list;
1440 struct completion done;
1441 struct cifsFileInfo *cfile;
1442 struct address_space *mapping;
1443 struct cifs_aio_ctx *ctx;
1444 __u64 offset;
1445 ssize_t got_bytes;
1446 unsigned int bytes;
1447 pid_t pid;
1448 int result;
1449 struct work_struct work;
1450 struct iov_iter iter;
1451 struct kvec iov[2];
1452 struct TCP_Server_Info *server;
1453 #ifdef CONFIG_CIFS_SMB_DIRECT
1454 struct smbd_mr *mr;
1455 #endif
1456 struct cifs_credits credits;
1457 };
1458
1459 /* asynchronous write support */
1460 struct cifs_writedata {
1461 struct kref refcount;
1462 struct list_head list;
1463 struct completion done;
1464 enum writeback_sync_modes sync_mode;
1465 struct work_struct work;
1466 struct cifsFileInfo *cfile;
1467 struct cifs_aio_ctx *ctx;
1468 struct iov_iter iter;
1469 struct bio_vec *bv;
1470 __u64 offset;
1471 pid_t pid;
1472 unsigned int bytes;
1473 int result;
1474 struct TCP_Server_Info *server;
1475 #ifdef CONFIG_CIFS_SMB_DIRECT
1476 struct smbd_mr *mr;
1477 #endif
1478 struct cifs_credits credits;
1479 };
1480
1481 /*
1482 * Take a reference on the file private data. Must be called with
1483 * cfile->file_info_lock held.
1484 */
1485 static inline void
cifsFileInfo_get_locked(struct cifsFileInfo * cifs_file)1486 cifsFileInfo_get_locked(struct cifsFileInfo *cifs_file)
1487 {
1488 ++cifs_file->count;
1489 }
1490
1491 struct cifsFileInfo *cifsFileInfo_get(struct cifsFileInfo *cifs_file);
1492 void _cifsFileInfo_put(struct cifsFileInfo *cifs_file, bool wait_oplock_hdlr,
1493 bool offload);
1494 void cifsFileInfo_put(struct cifsFileInfo *cifs_file);
1495
1496 #define CIFS_CACHE_READ_FLG 1
1497 #define CIFS_CACHE_HANDLE_FLG 2
1498 #define CIFS_CACHE_RH_FLG (CIFS_CACHE_READ_FLG | CIFS_CACHE_HANDLE_FLG)
1499 #define CIFS_CACHE_WRITE_FLG 4
1500 #define CIFS_CACHE_RW_FLG (CIFS_CACHE_READ_FLG | CIFS_CACHE_WRITE_FLG)
1501 #define CIFS_CACHE_RHW_FLG (CIFS_CACHE_RW_FLG | CIFS_CACHE_HANDLE_FLG)
1502
1503 #define CIFS_CACHE_READ(cinode) ((cinode->oplock & CIFS_CACHE_READ_FLG) || (CIFS_SB(cinode->netfs.inode.i_sb)->mnt_cifs_flags & CIFS_MOUNT_RO_CACHE))
1504 #define CIFS_CACHE_HANDLE(cinode) (cinode->oplock & CIFS_CACHE_HANDLE_FLG)
1505 #define CIFS_CACHE_WRITE(cinode) ((cinode->oplock & CIFS_CACHE_WRITE_FLG) || (CIFS_SB(cinode->netfs.inode.i_sb)->mnt_cifs_flags & CIFS_MOUNT_RW_CACHE))
1506
1507 /*
1508 * One of these for each file inode
1509 */
1510
1511 struct cifsInodeInfo {
1512 struct netfs_inode netfs; /* Netfslib context and vfs inode */
1513 bool can_cache_brlcks;
1514 struct list_head llist; /* locks helb by this inode */
1515 /*
1516 * NOTE: Some code paths call down_read(lock_sem) twice, so
1517 * we must always use cifs_down_write() instead of down_write()
1518 * for this semaphore to avoid deadlocks.
1519 */
1520 struct rw_semaphore lock_sem; /* protect the fields above */
1521 /* BB add in lists for dirty pages i.e. write caching info for oplock */
1522 struct list_head openFileList;
1523 spinlock_t open_file_lock; /* protects openFileList */
1524 __u32 cifsAttrs; /* e.g. DOS archive bit, sparse, compressed, system */
1525 unsigned int oplock; /* oplock/lease level we have */
1526 unsigned int epoch; /* used to track lease state changes */
1527 #define CIFS_INODE_PENDING_OPLOCK_BREAK (0) /* oplock break in progress */
1528 #define CIFS_INODE_PENDING_WRITERS (1) /* Writes in progress */
1529 #define CIFS_INODE_FLAG_UNUSED (2) /* Unused flag */
1530 #define CIFS_INO_DELETE_PENDING (3) /* delete pending on server */
1531 #define CIFS_INO_INVALID_MAPPING (4) /* pagecache is invalid */
1532 #define CIFS_INO_LOCK (5) /* lock bit for synchronization */
1533 #define CIFS_INO_MODIFIED_ATTR (6) /* Indicate change in mtime/ctime */
1534 #define CIFS_INO_CLOSE_ON_LOCK (7) /* Not to defer the close when lock is set */
1535 unsigned long flags;
1536 spinlock_t writers_lock;
1537 unsigned int writers; /* Number of writers on this inode */
1538 unsigned long time; /* jiffies of last update of inode */
1539 u64 server_eof; /* current file size on server -- protected by i_lock */
1540 u64 uniqueid; /* server inode number */
1541 u64 createtime; /* creation time on server */
1542 __u8 lease_key[SMB2_LEASE_KEY_SIZE]; /* lease key for this inode */
1543 struct list_head deferred_closes; /* list of deferred closes */
1544 spinlock_t deferred_lock; /* protection on deferred list */
1545 bool lease_granted; /* Flag to indicate whether lease or oplock is granted. */
1546 char *symlink_target;
1547 };
1548
1549 static inline struct cifsInodeInfo *
CIFS_I(struct inode * inode)1550 CIFS_I(struct inode *inode)
1551 {
1552 return container_of(inode, struct cifsInodeInfo, netfs.inode);
1553 }
1554
1555 static inline struct cifs_sb_info *
CIFS_SB(struct super_block * sb)1556 CIFS_SB(struct super_block *sb)
1557 {
1558 return sb->s_fs_info;
1559 }
1560
1561 static inline struct cifs_sb_info *
CIFS_FILE_SB(struct file * file)1562 CIFS_FILE_SB(struct file *file)
1563 {
1564 return CIFS_SB(file_inode(file)->i_sb);
1565 }
1566
CIFS_DIR_SEP(const struct cifs_sb_info * cifs_sb)1567 static inline char CIFS_DIR_SEP(const struct cifs_sb_info *cifs_sb)
1568 {
1569 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_POSIX_PATHS)
1570 return '/';
1571 else
1572 return '\\';
1573 }
1574
1575 static inline void
convert_delimiter(char * path,char delim)1576 convert_delimiter(char *path, char delim)
1577 {
1578 char old_delim, *pos;
1579
1580 if (delim == '/')
1581 old_delim = '\\';
1582 else
1583 old_delim = '/';
1584
1585 pos = path;
1586 while ((pos = strchr(pos, old_delim)))
1587 *pos = delim;
1588 }
1589
1590 #define cifs_stats_inc atomic_inc
1591
cifs_stats_bytes_written(struct cifs_tcon * tcon,unsigned int bytes)1592 static inline void cifs_stats_bytes_written(struct cifs_tcon *tcon,
1593 unsigned int bytes)
1594 {
1595 if (bytes) {
1596 spin_lock(&tcon->stat_lock);
1597 tcon->bytes_written += bytes;
1598 spin_unlock(&tcon->stat_lock);
1599 }
1600 }
1601
cifs_stats_bytes_read(struct cifs_tcon * tcon,unsigned int bytes)1602 static inline void cifs_stats_bytes_read(struct cifs_tcon *tcon,
1603 unsigned int bytes)
1604 {
1605 spin_lock(&tcon->stat_lock);
1606 tcon->bytes_read += bytes;
1607 spin_unlock(&tcon->stat_lock);
1608 }
1609
1610
1611 /*
1612 * This is the prototype for the mid receive function. This function is for
1613 * receiving the rest of the SMB frame, starting with the WordCount (which is
1614 * just after the MID in struct smb_hdr). Note:
1615 *
1616 * - This will be called by cifsd, with no locks held.
1617 * - The mid will still be on the pending_mid_q.
1618 * - mid->resp_buf will point to the current buffer.
1619 *
1620 * Returns zero on a successful receive, or an error. The receive state in
1621 * the TCP_Server_Info will also be updated.
1622 */
1623 typedef int (mid_receive_t)(struct TCP_Server_Info *server,
1624 struct mid_q_entry *mid);
1625
1626 /*
1627 * This is the prototype for the mid callback function. This is called once the
1628 * mid has been received off of the socket. When creating one, take special
1629 * care to avoid deadlocks. Things to bear in mind:
1630 *
1631 * - it will be called by cifsd, with no locks held
1632 * - the mid will be removed from any lists
1633 */
1634 typedef void (mid_callback_t)(struct mid_q_entry *mid);
1635
1636 /*
1637 * This is the protopyte for mid handle function. This is called once the mid
1638 * has been recognized after decryption of the message.
1639 */
1640 typedef int (mid_handle_t)(struct TCP_Server_Info *server,
1641 struct mid_q_entry *mid);
1642
1643 /* one of these for every pending CIFS request to the server */
1644 struct mid_q_entry {
1645 struct list_head qhead; /* mids waiting on reply from this server */
1646 struct kref refcount;
1647 struct TCP_Server_Info *server; /* server corresponding to this mid */
1648 __u64 mid; /* multiplex id */
1649 __u16 credits; /* number of credits consumed by this mid */
1650 __u16 credits_received; /* number of credits from the response */
1651 __u32 pid; /* process id */
1652 __u32 sequence_number; /* for CIFS signing */
1653 unsigned long when_alloc; /* when mid was created */
1654 #ifdef CONFIG_CIFS_STATS2
1655 unsigned long when_sent; /* time when smb send finished */
1656 unsigned long when_received; /* when demux complete (taken off wire) */
1657 #endif
1658 mid_receive_t *receive; /* call receive callback */
1659 mid_callback_t *callback; /* call completion callback */
1660 mid_handle_t *handle; /* call handle mid callback */
1661 void *callback_data; /* general purpose pointer for callback */
1662 struct task_struct *creator;
1663 void *resp_buf; /* pointer to received SMB header */
1664 unsigned int resp_buf_size;
1665 int mid_state; /* wish this were enum but can not pass to wait_event */
1666 unsigned int mid_flags;
1667 __le16 command; /* smb command code */
1668 unsigned int optype; /* operation type */
1669 bool large_buf:1; /* if valid response, is pointer to large buf */
1670 bool multiRsp:1; /* multiple trans2 responses for one request */
1671 bool multiEnd:1; /* both received */
1672 bool decrypted:1; /* decrypted entry */
1673 };
1674
1675 struct close_cancelled_open {
1676 struct cifs_fid fid;
1677 struct cifs_tcon *tcon;
1678 struct work_struct work;
1679 __u64 mid;
1680 __u16 cmd;
1681 };
1682
1683 /* Make code in transport.c a little cleaner by moving
1684 update of optional stats into function below */
cifs_in_send_inc(struct TCP_Server_Info * server)1685 static inline void cifs_in_send_inc(struct TCP_Server_Info *server)
1686 {
1687 atomic_inc(&server->in_send);
1688 }
1689
cifs_in_send_dec(struct TCP_Server_Info * server)1690 static inline void cifs_in_send_dec(struct TCP_Server_Info *server)
1691 {
1692 atomic_dec(&server->in_send);
1693 }
1694
cifs_num_waiters_inc(struct TCP_Server_Info * server)1695 static inline void cifs_num_waiters_inc(struct TCP_Server_Info *server)
1696 {
1697 atomic_inc(&server->num_waiters);
1698 }
1699
cifs_num_waiters_dec(struct TCP_Server_Info * server)1700 static inline void cifs_num_waiters_dec(struct TCP_Server_Info *server)
1701 {
1702 atomic_dec(&server->num_waiters);
1703 }
1704
1705 #ifdef CONFIG_CIFS_STATS2
cifs_save_when_sent(struct mid_q_entry * mid)1706 static inline void cifs_save_when_sent(struct mid_q_entry *mid)
1707 {
1708 mid->when_sent = jiffies;
1709 }
1710 #else
cifs_save_when_sent(struct mid_q_entry * mid)1711 static inline void cifs_save_when_sent(struct mid_q_entry *mid)
1712 {
1713 }
1714 #endif
1715
1716 /* for pending dnotify requests */
1717 struct dir_notify_req {
1718 struct list_head lhead;
1719 __le16 Pid;
1720 __le16 PidHigh;
1721 __u16 Mid;
1722 __u16 Tid;
1723 __u16 Uid;
1724 __u16 netfid;
1725 __u32 filter; /* CompletionFilter (for multishot) */
1726 int multishot;
1727 struct file *pfile;
1728 };
1729
1730 struct dfs_info3_param {
1731 int flags; /* DFSREF_REFERRAL_SERVER, DFSREF_STORAGE_SERVER*/
1732 int path_consumed;
1733 int server_type;
1734 int ref_flag;
1735 char *path_name;
1736 char *node_name;
1737 int ttl;
1738 };
1739
1740 struct file_list {
1741 struct list_head list;
1742 struct cifsFileInfo *cfile;
1743 };
1744
1745 struct cifs_mount_ctx {
1746 struct cifs_sb_info *cifs_sb;
1747 struct smb3_fs_context *fs_ctx;
1748 unsigned int xid;
1749 struct TCP_Server_Info *server;
1750 struct cifs_ses *ses;
1751 struct cifs_tcon *tcon;
1752 struct cifs_ses *root_ses;
1753 uuid_t mount_id;
1754 char *origin_fullpath, *leaf_fullpath;
1755 };
1756
free_dfs_info_param(struct dfs_info3_param * param)1757 static inline void free_dfs_info_param(struct dfs_info3_param *param)
1758 {
1759 if (param) {
1760 kfree(param->path_name);
1761 kfree(param->node_name);
1762 }
1763 }
1764
free_dfs_info_array(struct dfs_info3_param * param,int number_of_items)1765 static inline void free_dfs_info_array(struct dfs_info3_param *param,
1766 int number_of_items)
1767 {
1768 int i;
1769
1770 if ((number_of_items == 0) || (param == NULL))
1771 return;
1772 for (i = 0; i < number_of_items; i++) {
1773 kfree(param[i].path_name);
1774 kfree(param[i].node_name);
1775 }
1776 kfree(param);
1777 }
1778
is_interrupt_error(int error)1779 static inline bool is_interrupt_error(int error)
1780 {
1781 switch (error) {
1782 case -EINTR:
1783 case -ERESTARTSYS:
1784 case -ERESTARTNOHAND:
1785 case -ERESTARTNOINTR:
1786 return true;
1787 }
1788 return false;
1789 }
1790
is_retryable_error(int error)1791 static inline bool is_retryable_error(int error)
1792 {
1793 if (is_interrupt_error(error) || error == -EAGAIN)
1794 return true;
1795 return false;
1796 }
1797
1798
1799 /* cifs_get_writable_file() flags */
1800 #define FIND_WR_ANY 0
1801 #define FIND_WR_FSUID_ONLY 1
1802 #define FIND_WR_WITH_DELETE 2
1803
1804 #define MID_FREE 0
1805 #define MID_REQUEST_ALLOCATED 1
1806 #define MID_REQUEST_SUBMITTED 2
1807 #define MID_RESPONSE_RECEIVED 4
1808 #define MID_RETRY_NEEDED 8 /* session closed while this request out */
1809 #define MID_RESPONSE_MALFORMED 0x10
1810 #define MID_SHUTDOWN 0x20
1811
1812 /* Flags */
1813 #define MID_WAIT_CANCELLED 1 /* Cancelled while waiting for response */
1814 #define MID_DELETED 2 /* Mid has been dequeued/deleted */
1815
1816 /* Types of response buffer returned from SendReceive2 */
1817 #define CIFS_NO_BUFFER 0 /* Response buffer not returned */
1818 #define CIFS_SMALL_BUFFER 1
1819 #define CIFS_LARGE_BUFFER 2
1820 #define CIFS_IOVEC 4 /* array of response buffers */
1821
1822 /* Type of Request to SendReceive2 */
1823 #define CIFS_BLOCKING_OP 1 /* operation can block */
1824 #define CIFS_NON_BLOCKING 2 /* do not block waiting for credits */
1825 #define CIFS_TIMEOUT_MASK 0x003 /* only one of above set in req */
1826 #define CIFS_LOG_ERROR 0x010 /* log NT STATUS if non-zero */
1827 #define CIFS_LARGE_BUF_OP 0x020 /* large request buffer */
1828 #define CIFS_NO_RSP_BUF 0x040 /* no response buffer required */
1829
1830 /* Type of request operation */
1831 #define CIFS_ECHO_OP 0x080 /* echo request */
1832 #define CIFS_OBREAK_OP 0x0100 /* oplock break request */
1833 #define CIFS_NEG_OP 0x0200 /* negotiate request */
1834 #define CIFS_CP_CREATE_CLOSE_OP 0x0400 /* compound create+close request */
1835 /* Lower bitmask values are reserved by others below. */
1836 #define CIFS_SESS_OP 0x2000 /* session setup request */
1837 #define CIFS_OP_MASK 0x2780 /* mask request type */
1838
1839 #define CIFS_HAS_CREDITS 0x0400 /* already has credits */
1840 #define CIFS_TRANSFORM_REQ 0x0800 /* transform request before sending */
1841 #define CIFS_NO_SRV_RSP 0x1000 /* there is no server response */
1842
1843 /* Security Flags: indicate type of session setup needed */
1844 #define CIFSSEC_MAY_SIGN 0x00001
1845 #define CIFSSEC_MAY_NTLMV2 0x00004
1846 #define CIFSSEC_MAY_KRB5 0x00008
1847 #define CIFSSEC_MAY_SEAL 0x00040 /* not supported yet */
1848 #define CIFSSEC_MAY_NTLMSSP 0x00080 /* raw ntlmssp with ntlmv2 */
1849
1850 #define CIFSSEC_MUST_SIGN 0x01001
1851 /* note that only one of the following can be set so the
1852 result of setting MUST flags more than once will be to
1853 require use of the stronger protocol */
1854 #define CIFSSEC_MUST_NTLMV2 0x04004
1855 #define CIFSSEC_MUST_KRB5 0x08008
1856 #ifdef CONFIG_CIFS_UPCALL
1857 #define CIFSSEC_MASK 0x8F08F /* flags supported if no weak allowed */
1858 #else
1859 #define CIFSSEC_MASK 0x87087 /* flags supported if no weak allowed */
1860 #endif /* UPCALL */
1861 #define CIFSSEC_MUST_SEAL 0x40040 /* not supported yet */
1862 #define CIFSSEC_MUST_NTLMSSP 0x80080 /* raw ntlmssp with ntlmv2 */
1863
1864 #define CIFSSEC_DEF (CIFSSEC_MAY_SIGN | CIFSSEC_MAY_NTLMV2 | CIFSSEC_MAY_NTLMSSP)
1865 #define CIFSSEC_MAX (CIFSSEC_MUST_NTLMV2)
1866 #define CIFSSEC_AUTH_MASK (CIFSSEC_MAY_NTLMV2 | CIFSSEC_MAY_KRB5 | CIFSSEC_MAY_NTLMSSP)
1867 /*
1868 *****************************************************************
1869 * All constants go here
1870 *****************************************************************
1871 */
1872
1873 #define UID_HASH (16)
1874
1875 /*
1876 * Note that ONE module should define _DECLARE_GLOBALS_HERE to cause the
1877 * following to be declared.
1878 */
1879
1880 /****************************************************************************
1881 * Here are all the locks (spinlock, mutex, semaphore) in cifs.ko, arranged according
1882 * to the locking order. i.e. if two locks are to be held together, the lock that
1883 * appears higher in this list needs to be taken before the other.
1884 *
1885 * If you hold a lock that is lower in this list, and you need to take a higher lock
1886 * (or if you think that one of the functions that you're calling may need to), first
1887 * drop the lock you hold, pick up the higher lock, then the lower one. This will
1888 * ensure that locks are picked up only in one direction in the below table
1889 * (top to bottom).
1890 *
1891 * Also, if you expect a function to be called with a lock held, explicitly document
1892 * this in the comments on top of your function definition.
1893 *
1894 * And also, try to keep the critical sections (lock hold time) to be as minimal as
1895 * possible. Blocking / calling other functions with a lock held always increase
1896 * the risk of a possible deadlock.
1897 *
1898 * Following this rule will avoid unnecessary deadlocks, which can get really hard to
1899 * debug. Also, any new lock that you introduce, please add to this list in the correct
1900 * order.
1901 *
1902 * Please populate this list whenever you introduce new locks in your changes. Or in
1903 * case I've missed some existing locks. Please ensure that it's added in the list
1904 * based on the locking order expected.
1905 *
1906 * =====================================================================================
1907 * Lock Protects Initialization fn
1908 * =====================================================================================
1909 * vol_list_lock
1910 * vol_info->ctx_lock vol_info->ctx
1911 * cifs_sb_info->tlink_tree_lock cifs_sb_info->tlink_tree cifs_setup_cifs_sb
1912 * TCP_Server_Info-> TCP_Server_Info cifs_get_tcp_session
1913 * reconnect_mutex
1914 * TCP_Server_Info->srv_mutex TCP_Server_Info cifs_get_tcp_session
1915 * cifs_ses->session_mutex cifs_ses sesInfoAlloc
1916 * cifs_tcon
1917 * cifs_tcon->open_file_lock cifs_tcon->openFileList tconInfoAlloc
1918 * cifs_tcon->pending_opens
1919 * cifs_tcon->stat_lock cifs_tcon->bytes_read tconInfoAlloc
1920 * cifs_tcon->bytes_written
1921 * cifs_tcp_ses_lock cifs_tcp_ses_list sesInfoAlloc
1922 * GlobalMid_Lock GlobalMaxActiveXid init_cifs
1923 * GlobalCurrentXid
1924 * GlobalTotalActiveXid
1925 * TCP_Server_Info->srv_lock (anything in struct not protected by another lock and can change)
1926 * TCP_Server_Info->mid_lock TCP_Server_Info->pending_mid_q cifs_get_tcp_session
1927 * ->CurrentMid
1928 * (any changes in mid_q_entry fields)
1929 * TCP_Server_Info->req_lock TCP_Server_Info->in_flight cifs_get_tcp_session
1930 * ->credits
1931 * ->echo_credits
1932 * ->oplock_credits
1933 * ->reconnect_instance
1934 * cifs_ses->ses_lock (anything that is not protected by another lock and can change)
1935 * cifs_ses->iface_lock cifs_ses->iface_list sesInfoAlloc
1936 * ->iface_count
1937 * ->iface_last_update
1938 * cifs_ses->chan_lock cifs_ses->chans
1939 * ->chans_need_reconnect
1940 * ->chans_in_reconnect
1941 * cifs_tcon->tc_lock (anything that is not protected by another lock and can change)
1942 * cifsInodeInfo->open_file_lock cifsInodeInfo->openFileList cifs_alloc_inode
1943 * cifsInodeInfo->writers_lock cifsInodeInfo->writers cifsInodeInfo_alloc
1944 * cifsInodeInfo->lock_sem cifsInodeInfo->llist cifs_init_once
1945 * ->can_cache_brlcks
1946 * cifsInodeInfo->deferred_lock cifsInodeInfo->deferred_closes cifsInodeInfo_alloc
1947 * cached_fid->fid_mutex cifs_tcon->crfid tconInfoAlloc
1948 * cifsFileInfo->fh_mutex cifsFileInfo cifs_new_fileinfo
1949 * cifsFileInfo->file_info_lock cifsFileInfo->count cifs_new_fileinfo
1950 * ->invalidHandle initiate_cifs_search
1951 * ->oplock_break_cancelled
1952 * cifs_aio_ctx->aio_mutex cifs_aio_ctx cifs_aio_ctx_alloc
1953 ****************************************************************************/
1954
1955 #ifdef DECLARE_GLOBALS_HERE
1956 #define GLOBAL_EXTERN
1957 #else
1958 #define GLOBAL_EXTERN extern
1959 #endif
1960
1961 /*
1962 * the list of TCP_Server_Info structures, ie each of the sockets
1963 * connecting our client to a distinct server (ip address), is
1964 * chained together by cifs_tcp_ses_list. The list of all our SMB
1965 * sessions (and from that the tree connections) can be found
1966 * by iterating over cifs_tcp_ses_list
1967 */
1968 extern struct list_head cifs_tcp_ses_list;
1969
1970 /*
1971 * This lock protects the cifs_tcp_ses_list, the list of smb sessions per
1972 * tcp session, and the list of tcon's per smb session. It also protects
1973 * the reference counters for the server, smb session, and tcon.
1974 * generally the locks should be taken in order tcp_ses_lock before
1975 * tcon->open_file_lock and that before file->file_info_lock since the
1976 * structure order is cifs_socket-->cifs_ses-->cifs_tcon-->cifs_file
1977 */
1978 extern spinlock_t cifs_tcp_ses_lock;
1979
1980 /*
1981 * Global transaction id (XID) information
1982 */
1983 extern unsigned int GlobalCurrentXid; /* protected by GlobalMid_Sem */
1984 extern unsigned int GlobalTotalActiveXid; /* prot by GlobalMid_Sem */
1985 extern unsigned int GlobalMaxActiveXid; /* prot by GlobalMid_Sem */
1986 extern spinlock_t GlobalMid_Lock; /* protects above & list operations on midQ entries */
1987
1988 /*
1989 * Global counters, updated atomically
1990 */
1991 extern atomic_t sesInfoAllocCount;
1992 extern atomic_t tconInfoAllocCount;
1993 extern atomic_t tcpSesNextId;
1994 extern atomic_t tcpSesAllocCount;
1995 extern atomic_t tcpSesReconnectCount;
1996 extern atomic_t tconInfoReconnectCount;
1997
1998 /* Various Debug counters */
1999 extern atomic_t buf_alloc_count; /* current number allocated */
2000 extern atomic_t small_buf_alloc_count;
2001 #ifdef CONFIG_CIFS_STATS2
2002 extern atomic_t total_buf_alloc_count; /* total allocated over all time */
2003 extern atomic_t total_small_buf_alloc_count;
2004 extern unsigned int slow_rsp_threshold; /* number of secs before logging */
2005 #endif
2006
2007 /* Misc globals */
2008 extern bool enable_oplocks; /* enable or disable oplocks */
2009 extern bool lookupCacheEnabled;
2010 extern unsigned int global_secflags; /* if on, session setup sent
2011 with more secure ntlmssp2 challenge/resp */
2012 extern unsigned int sign_CIFS_PDUs; /* enable smb packet signing */
2013 extern bool enable_gcm_256; /* allow optional negotiate of strongest signing (aes-gcm-256) */
2014 extern bool require_gcm_256; /* require use of strongest signing (aes-gcm-256) */
2015 extern bool enable_negotiate_signing; /* request use of faster (GMAC) signing if available */
2016 extern bool linuxExtEnabled;/*enable Linux/Unix CIFS extensions*/
2017 extern unsigned int CIFSMaxBufSize; /* max size not including hdr */
2018 extern unsigned int cifs_min_rcv; /* min size of big ntwrk buf pool */
2019 extern unsigned int cifs_min_small; /* min size of small buf pool */
2020 extern unsigned int cifs_max_pending; /* MAX requests at once to server*/
2021 extern bool disable_legacy_dialects; /* forbid vers=1.0 and vers=2.0 mounts */
2022 extern atomic_t mid_count;
2023
2024 void cifs_oplock_break(struct work_struct *work);
2025 void cifs_queue_oplock_break(struct cifsFileInfo *cfile);
2026 void smb2_deferred_work_close(struct work_struct *work);
2027
2028 extern const struct slow_work_ops cifs_oplock_break_ops;
2029 extern struct workqueue_struct *cifsiod_wq;
2030 extern struct workqueue_struct *decrypt_wq;
2031 extern struct workqueue_struct *fileinfo_put_wq;
2032 extern struct workqueue_struct *cifsoplockd_wq;
2033 extern struct workqueue_struct *deferredclose_wq;
2034 extern __u32 cifs_lock_secret;
2035
2036 extern mempool_t *cifs_mid_poolp;
2037
2038 /* Operations for different SMB versions */
2039 #define SMB1_VERSION_STRING "1.0"
2040 #define SMB20_VERSION_STRING "2.0"
2041 #ifdef CONFIG_CIFS_ALLOW_INSECURE_LEGACY
2042 extern struct smb_version_operations smb1_operations;
2043 extern struct smb_version_values smb1_values;
2044 extern struct smb_version_operations smb20_operations;
2045 extern struct smb_version_values smb20_values;
2046 #endif /* CIFS_ALLOW_INSECURE_LEGACY */
2047 #define SMB21_VERSION_STRING "2.1"
2048 extern struct smb_version_operations smb21_operations;
2049 extern struct smb_version_values smb21_values;
2050 #define SMBDEFAULT_VERSION_STRING "default"
2051 extern struct smb_version_values smbdefault_values;
2052 #define SMB3ANY_VERSION_STRING "3"
2053 extern struct smb_version_values smb3any_values;
2054 #define SMB30_VERSION_STRING "3.0"
2055 extern struct smb_version_operations smb30_operations;
2056 extern struct smb_version_values smb30_values;
2057 #define SMB302_VERSION_STRING "3.02"
2058 #define ALT_SMB302_VERSION_STRING "3.0.2"
2059 /*extern struct smb_version_operations smb302_operations;*/ /* not needed yet */
2060 extern struct smb_version_values smb302_values;
2061 #define SMB311_VERSION_STRING "3.1.1"
2062 #define ALT_SMB311_VERSION_STRING "3.11"
2063 extern struct smb_version_operations smb311_operations;
2064 extern struct smb_version_values smb311_values;
2065
get_security_type_str(enum securityEnum sectype)2066 static inline char *get_security_type_str(enum securityEnum sectype)
2067 {
2068 switch (sectype) {
2069 case RawNTLMSSP:
2070 return "RawNTLMSSP";
2071 case Kerberos:
2072 return "Kerberos";
2073 case NTLMv2:
2074 return "NTLMv2";
2075 default:
2076 return "Unknown";
2077 }
2078 }
2079
is_smb1_server(struct TCP_Server_Info * server)2080 static inline bool is_smb1_server(struct TCP_Server_Info *server)
2081 {
2082 return strcmp(server->vals->version_string, SMB1_VERSION_STRING) == 0;
2083 }
2084
is_tcon_dfs(struct cifs_tcon * tcon)2085 static inline bool is_tcon_dfs(struct cifs_tcon *tcon)
2086 {
2087 /*
2088 * For SMB1, see MS-CIFS 2.4.55 SMB_COM_TREE_CONNECT_ANDX (0x75) and MS-CIFS 3.3.4.4 DFS
2089 * Subsystem Notifies That a Share Is a DFS Share.
2090 *
2091 * For SMB2+, see MS-SMB2 2.2.10 SMB2 TREE_CONNECT Response and MS-SMB2 3.3.4.14 Server
2092 * Application Updates a Share.
2093 */
2094 if (!tcon || !tcon->ses || !tcon->ses->server)
2095 return false;
2096 return is_smb1_server(tcon->ses->server) ? tcon->Flags & SMB_SHARE_IS_IN_DFS :
2097 tcon->share_flags & (SHI1005_FLAGS_DFS | SHI1005_FLAGS_DFS_ROOT);
2098 }
2099
cifs_is_referral_server(struct cifs_tcon * tcon,const struct dfs_info3_param * ref)2100 static inline bool cifs_is_referral_server(struct cifs_tcon *tcon,
2101 const struct dfs_info3_param *ref)
2102 {
2103 /*
2104 * Check if all targets are capable of handling DFS referrals as per
2105 * MS-DFSC 2.2.4 RESP_GET_DFS_REFERRAL.
2106 */
2107 return is_tcon_dfs(tcon) || (ref && (ref->flags & DFSREF_REFERRAL_SERVER));
2108 }
2109
cifs_flock_len(const struct file_lock * fl)2110 static inline u64 cifs_flock_len(const struct file_lock *fl)
2111 {
2112 return (u64)fl->fl_end - fl->fl_start + 1;
2113 }
2114
ntlmssp_workstation_name_size(const struct cifs_ses * ses)2115 static inline size_t ntlmssp_workstation_name_size(const struct cifs_ses *ses)
2116 {
2117 if (WARN_ON_ONCE(!ses || !ses->server))
2118 return 0;
2119 /*
2120 * Make workstation name no more than 15 chars when using insecure dialects as some legacy
2121 * servers do require it during NTLMSSP.
2122 */
2123 if (ses->server->dialect <= SMB20_PROT_ID)
2124 return min_t(size_t, sizeof(ses->workstation_name), RFC1001_NAME_LEN_WITH_NULL);
2125 return sizeof(ses->workstation_name);
2126 }
2127
move_cifs_info_to_smb2(struct smb2_file_all_info * dst,const FILE_ALL_INFO * src)2128 static inline void move_cifs_info_to_smb2(struct smb2_file_all_info *dst, const FILE_ALL_INFO *src)
2129 {
2130 memcpy(dst, src, (size_t)((u8 *)&src->AccessFlags - (u8 *)src));
2131 dst->AccessFlags = src->AccessFlags;
2132 dst->CurrentByteOffset = src->CurrentByteOffset;
2133 dst->Mode = src->Mode;
2134 dst->AlignmentRequirement = src->AlignmentRequirement;
2135 dst->FileNameLength = src->FileNameLength;
2136 }
2137
cifs_get_num_sgs(const struct smb_rqst * rqst,int num_rqst,const u8 * sig)2138 static inline int cifs_get_num_sgs(const struct smb_rqst *rqst,
2139 int num_rqst,
2140 const u8 *sig)
2141 {
2142 unsigned int len, skip;
2143 unsigned int nents = 0;
2144 unsigned long addr;
2145 int i, j;
2146
2147 /*
2148 * The first rqst has a transform header where the first 20 bytes are
2149 * not part of the encrypted blob.
2150 */
2151 skip = 20;
2152
2153 /* Assumes the first rqst has a transform header as the first iov.
2154 * I.e.
2155 * rqst[0].rq_iov[0] is transform header
2156 * rqst[0].rq_iov[1+] data to be encrypted/decrypted
2157 * rqst[1+].rq_iov[0+] data to be encrypted/decrypted
2158 */
2159 for (i = 0; i < num_rqst; i++) {
2160 /* We really don't want a mixture of pinned and unpinned pages
2161 * in the sglist. It's hard to keep track of which is what.
2162 * Instead, we convert to a BVEC-type iterator higher up.
2163 */
2164 if (WARN_ON_ONCE(user_backed_iter(&rqst[i].rq_iter)))
2165 return -EIO;
2166
2167 /* We also don't want to have any extra refs or pins to clean
2168 * up in the sglist.
2169 */
2170 if (WARN_ON_ONCE(iov_iter_extract_will_pin(&rqst[i].rq_iter)))
2171 return -EIO;
2172
2173 for (j = 0; j < rqst[i].rq_nvec; j++) {
2174 struct kvec *iov = &rqst[i].rq_iov[j];
2175
2176 addr = (unsigned long)iov->iov_base + skip;
2177 if (unlikely(is_vmalloc_addr((void *)addr))) {
2178 len = iov->iov_len - skip;
2179 nents += DIV_ROUND_UP(offset_in_page(addr) + len,
2180 PAGE_SIZE);
2181 } else {
2182 nents++;
2183 }
2184 skip = 0;
2185 }
2186 nents += iov_iter_npages(&rqst[i].rq_iter, INT_MAX);
2187 }
2188 nents += DIV_ROUND_UP(offset_in_page(sig) + SMB2_SIGNATURE_SIZE, PAGE_SIZE);
2189 return nents;
2190 }
2191
2192 /* We can not use the normal sg_set_buf() as we will sometimes pass a
2193 * stack object as buf.
2194 */
cifs_sg_set_buf(struct sg_table * sgtable,const void * buf,unsigned int buflen)2195 static inline void cifs_sg_set_buf(struct sg_table *sgtable,
2196 const void *buf,
2197 unsigned int buflen)
2198 {
2199 unsigned long addr = (unsigned long)buf;
2200 unsigned int off = offset_in_page(addr);
2201
2202 addr &= PAGE_MASK;
2203 if (unlikely(is_vmalloc_addr((void *)addr))) {
2204 do {
2205 unsigned int len = min_t(unsigned int, buflen, PAGE_SIZE - off);
2206
2207 sg_set_page(&sgtable->sgl[sgtable->nents++],
2208 vmalloc_to_page((void *)addr), len, off);
2209
2210 off = 0;
2211 addr += PAGE_SIZE;
2212 buflen -= len;
2213 } while (buflen);
2214 } else {
2215 sg_set_page(&sgtable->sgl[sgtable->nents++],
2216 virt_to_page(addr), buflen, off);
2217 }
2218 }
2219
2220 #endif /* _CIFS_GLOB_H */
2221