138c8a9a5SSteve French // SPDX-License-Identifier: GPL-2.0-or-later 238c8a9a5SSteve French /* 338c8a9a5SSteve French * Copyright (C) 2016 Namjae Jeon <linkinjeon@kernel.org> 438c8a9a5SSteve French * Copyright (C) 2018 Samsung Electronics Co., Ltd. 538c8a9a5SSteve French */ 638c8a9a5SSteve French 738c8a9a5SSteve French #include <linux/inetdevice.h> 838c8a9a5SSteve French #include <net/addrconf.h> 938c8a9a5SSteve French #include <linux/syscalls.h> 1038c8a9a5SSteve French #include <linux/namei.h> 1138c8a9a5SSteve French #include <linux/statfs.h> 1238c8a9a5SSteve French #include <linux/ethtool.h> 1338c8a9a5SSteve French #include <linux/falloc.h> 1438c8a9a5SSteve French #include <linux/mount.h> 1538c8a9a5SSteve French #include <linux/filelock.h> 1638c8a9a5SSteve French 1738c8a9a5SSteve French #include "glob.h" 1838c8a9a5SSteve French #include "smbfsctl.h" 1938c8a9a5SSteve French #include "oplock.h" 2038c8a9a5SSteve French #include "smbacl.h" 2138c8a9a5SSteve French 2238c8a9a5SSteve French #include "auth.h" 2338c8a9a5SSteve French #include "asn1.h" 2438c8a9a5SSteve French #include "connection.h" 2538c8a9a5SSteve French #include "transport_ipc.h" 2638c8a9a5SSteve French #include "transport_rdma.h" 2738c8a9a5SSteve French #include "vfs.h" 2838c8a9a5SSteve French #include "vfs_cache.h" 2938c8a9a5SSteve French #include "misc.h" 3038c8a9a5SSteve French 3138c8a9a5SSteve French #include "server.h" 3238c8a9a5SSteve French #include "smb_common.h" 3338c8a9a5SSteve French #include "smbstatus.h" 3438c8a9a5SSteve French #include "ksmbd_work.h" 3538c8a9a5SSteve French #include "mgmt/user_config.h" 3638c8a9a5SSteve French #include "mgmt/share_config.h" 3738c8a9a5SSteve French #include "mgmt/tree_connect.h" 3838c8a9a5SSteve French #include "mgmt/user_session.h" 3938c8a9a5SSteve French #include "mgmt/ksmbd_ida.h" 4038c8a9a5SSteve French #include "ndr.h" 4138c8a9a5SSteve French 4238c8a9a5SSteve French static void __wbuf(struct ksmbd_work *work, void **req, void **rsp) 4338c8a9a5SSteve French { 4438c8a9a5SSteve French if (work->next_smb2_rcv_hdr_off) { 4538c8a9a5SSteve French *req = ksmbd_req_buf_next(work); 4638c8a9a5SSteve French *rsp = ksmbd_resp_buf_next(work); 4738c8a9a5SSteve French } else { 4838c8a9a5SSteve French *req = smb2_get_msg(work->request_buf); 4938c8a9a5SSteve French *rsp = smb2_get_msg(work->response_buf); 5038c8a9a5SSteve French } 5138c8a9a5SSteve French } 5238c8a9a5SSteve French 5338c8a9a5SSteve French #define WORK_BUFFERS(w, rq, rs) __wbuf((w), (void **)&(rq), (void **)&(rs)) 5438c8a9a5SSteve French 5538c8a9a5SSteve French /** 5638c8a9a5SSteve French * check_session_id() - check for valid session id in smb header 5738c8a9a5SSteve French * @conn: connection instance 5838c8a9a5SSteve French * @id: session id from smb header 5938c8a9a5SSteve French * 6038c8a9a5SSteve French * Return: 1 if valid session id, otherwise 0 6138c8a9a5SSteve French */ 6238c8a9a5SSteve French static inline bool check_session_id(struct ksmbd_conn *conn, u64 id) 6338c8a9a5SSteve French { 6438c8a9a5SSteve French struct ksmbd_session *sess; 6538c8a9a5SSteve French 6638c8a9a5SSteve French if (id == 0 || id == -1) 6738c8a9a5SSteve French return false; 6838c8a9a5SSteve French 6938c8a9a5SSteve French sess = ksmbd_session_lookup_all(conn, id); 7038c8a9a5SSteve French if (sess) 7138c8a9a5SSteve French return true; 7238c8a9a5SSteve French pr_err("Invalid user session id: %llu\n", id); 7338c8a9a5SSteve French return false; 7438c8a9a5SSteve French } 7538c8a9a5SSteve French 7638c8a9a5SSteve French struct channel *lookup_chann_list(struct ksmbd_session *sess, struct ksmbd_conn *conn) 7738c8a9a5SSteve French { 7838c8a9a5SSteve French return xa_load(&sess->ksmbd_chann_list, (long)conn); 7938c8a9a5SSteve French } 8038c8a9a5SSteve French 8138c8a9a5SSteve French /** 8238c8a9a5SSteve French * smb2_get_ksmbd_tcon() - get tree connection information using a tree id. 8338c8a9a5SSteve French * @work: smb work 8438c8a9a5SSteve French * 8538c8a9a5SSteve French * Return: 0 if there is a tree connection matched or these are 8638c8a9a5SSteve French * skipable commands, otherwise error 8738c8a9a5SSteve French */ 8838c8a9a5SSteve French int smb2_get_ksmbd_tcon(struct ksmbd_work *work) 8938c8a9a5SSteve French { 9038c8a9a5SSteve French struct smb2_hdr *req_hdr = smb2_get_msg(work->request_buf); 9138c8a9a5SSteve French unsigned int cmd = le16_to_cpu(req_hdr->Command); 9238c8a9a5SSteve French int tree_id; 9338c8a9a5SSteve French 9438c8a9a5SSteve French work->tcon = NULL; 9538c8a9a5SSteve French if (cmd == SMB2_TREE_CONNECT_HE || 9638c8a9a5SSteve French cmd == SMB2_CANCEL_HE || 9738c8a9a5SSteve French cmd == SMB2_LOGOFF_HE) { 9838c8a9a5SSteve French ksmbd_debug(SMB, "skip to check tree connect request\n"); 9938c8a9a5SSteve French return 0; 10038c8a9a5SSteve French } 10138c8a9a5SSteve French 10238c8a9a5SSteve French if (xa_empty(&work->sess->tree_conns)) { 10338c8a9a5SSteve French ksmbd_debug(SMB, "NO tree connected\n"); 10438c8a9a5SSteve French return -ENOENT; 10538c8a9a5SSteve French } 10638c8a9a5SSteve French 10738c8a9a5SSteve French tree_id = le32_to_cpu(req_hdr->Id.SyncId.TreeId); 10838c8a9a5SSteve French work->tcon = ksmbd_tree_conn_lookup(work->sess, tree_id); 10938c8a9a5SSteve French if (!work->tcon) { 11038c8a9a5SSteve French pr_err("Invalid tid %d\n", tree_id); 11138c8a9a5SSteve French return -EINVAL; 11238c8a9a5SSteve French } 11338c8a9a5SSteve French 11438c8a9a5SSteve French return 1; 11538c8a9a5SSteve French } 11638c8a9a5SSteve French 11738c8a9a5SSteve French /** 11838c8a9a5SSteve French * smb2_set_err_rsp() - set error response code on smb response 11938c8a9a5SSteve French * @work: smb work containing response buffer 12038c8a9a5SSteve French */ 12138c8a9a5SSteve French void smb2_set_err_rsp(struct ksmbd_work *work) 12238c8a9a5SSteve French { 12338c8a9a5SSteve French struct smb2_err_rsp *err_rsp; 12438c8a9a5SSteve French 12538c8a9a5SSteve French if (work->next_smb2_rcv_hdr_off) 12638c8a9a5SSteve French err_rsp = ksmbd_resp_buf_next(work); 12738c8a9a5SSteve French else 12838c8a9a5SSteve French err_rsp = smb2_get_msg(work->response_buf); 12938c8a9a5SSteve French 13038c8a9a5SSteve French if (err_rsp->hdr.Status != STATUS_STOPPED_ON_SYMLINK) { 13138c8a9a5SSteve French err_rsp->StructureSize = SMB2_ERROR_STRUCTURE_SIZE2_LE; 13238c8a9a5SSteve French err_rsp->ErrorContextCount = 0; 13338c8a9a5SSteve French err_rsp->Reserved = 0; 13438c8a9a5SSteve French err_rsp->ByteCount = 0; 13538c8a9a5SSteve French err_rsp->ErrorData[0] = 0; 13638c8a9a5SSteve French inc_rfc1001_len(work->response_buf, SMB2_ERROR_STRUCTURE_SIZE2); 13738c8a9a5SSteve French } 13838c8a9a5SSteve French } 13938c8a9a5SSteve French 14038c8a9a5SSteve French /** 14138c8a9a5SSteve French * is_smb2_neg_cmd() - is it smb2 negotiation command 14238c8a9a5SSteve French * @work: smb work containing smb header 14338c8a9a5SSteve French * 14438c8a9a5SSteve French * Return: true if smb2 negotiation command, otherwise false 14538c8a9a5SSteve French */ 14638c8a9a5SSteve French bool is_smb2_neg_cmd(struct ksmbd_work *work) 14738c8a9a5SSteve French { 14838c8a9a5SSteve French struct smb2_hdr *hdr = smb2_get_msg(work->request_buf); 14938c8a9a5SSteve French 15038c8a9a5SSteve French /* is it SMB2 header ? */ 15138c8a9a5SSteve French if (hdr->ProtocolId != SMB2_PROTO_NUMBER) 15238c8a9a5SSteve French return false; 15338c8a9a5SSteve French 15438c8a9a5SSteve French /* make sure it is request not response message */ 15538c8a9a5SSteve French if (hdr->Flags & SMB2_FLAGS_SERVER_TO_REDIR) 15638c8a9a5SSteve French return false; 15738c8a9a5SSteve French 15838c8a9a5SSteve French if (hdr->Command != SMB2_NEGOTIATE) 15938c8a9a5SSteve French return false; 16038c8a9a5SSteve French 16138c8a9a5SSteve French return true; 16238c8a9a5SSteve French } 16338c8a9a5SSteve French 16438c8a9a5SSteve French /** 16538c8a9a5SSteve French * is_smb2_rsp() - is it smb2 response 16638c8a9a5SSteve French * @work: smb work containing smb response buffer 16738c8a9a5SSteve French * 16838c8a9a5SSteve French * Return: true if smb2 response, otherwise false 16938c8a9a5SSteve French */ 17038c8a9a5SSteve French bool is_smb2_rsp(struct ksmbd_work *work) 17138c8a9a5SSteve French { 17238c8a9a5SSteve French struct smb2_hdr *hdr = smb2_get_msg(work->response_buf); 17338c8a9a5SSteve French 17438c8a9a5SSteve French /* is it SMB2 header ? */ 17538c8a9a5SSteve French if (hdr->ProtocolId != SMB2_PROTO_NUMBER) 17638c8a9a5SSteve French return false; 17738c8a9a5SSteve French 17838c8a9a5SSteve French /* make sure it is response not request message */ 17938c8a9a5SSteve French if (!(hdr->Flags & SMB2_FLAGS_SERVER_TO_REDIR)) 18038c8a9a5SSteve French return false; 18138c8a9a5SSteve French 18238c8a9a5SSteve French return true; 18338c8a9a5SSteve French } 18438c8a9a5SSteve French 18538c8a9a5SSteve French /** 18638c8a9a5SSteve French * get_smb2_cmd_val() - get smb command code from smb header 18738c8a9a5SSteve French * @work: smb work containing smb request buffer 18838c8a9a5SSteve French * 18938c8a9a5SSteve French * Return: smb2 request command value 19038c8a9a5SSteve French */ 19138c8a9a5SSteve French u16 get_smb2_cmd_val(struct ksmbd_work *work) 19238c8a9a5SSteve French { 19338c8a9a5SSteve French struct smb2_hdr *rcv_hdr; 19438c8a9a5SSteve French 19538c8a9a5SSteve French if (work->next_smb2_rcv_hdr_off) 19638c8a9a5SSteve French rcv_hdr = ksmbd_req_buf_next(work); 19738c8a9a5SSteve French else 19838c8a9a5SSteve French rcv_hdr = smb2_get_msg(work->request_buf); 19938c8a9a5SSteve French return le16_to_cpu(rcv_hdr->Command); 20038c8a9a5SSteve French } 20138c8a9a5SSteve French 20238c8a9a5SSteve French /** 20338c8a9a5SSteve French * set_smb2_rsp_status() - set error response code on smb2 header 20438c8a9a5SSteve French * @work: smb work containing response buffer 20538c8a9a5SSteve French * @err: error response code 20638c8a9a5SSteve French */ 20738c8a9a5SSteve French void set_smb2_rsp_status(struct ksmbd_work *work, __le32 err) 20838c8a9a5SSteve French { 20938c8a9a5SSteve French struct smb2_hdr *rsp_hdr; 21038c8a9a5SSteve French 21138c8a9a5SSteve French if (work->next_smb2_rcv_hdr_off) 21238c8a9a5SSteve French rsp_hdr = ksmbd_resp_buf_next(work); 21338c8a9a5SSteve French else 21438c8a9a5SSteve French rsp_hdr = smb2_get_msg(work->response_buf); 21538c8a9a5SSteve French rsp_hdr->Status = err; 21638c8a9a5SSteve French smb2_set_err_rsp(work); 21738c8a9a5SSteve French } 21838c8a9a5SSteve French 21938c8a9a5SSteve French /** 22038c8a9a5SSteve French * init_smb2_neg_rsp() - initialize smb2 response for negotiate command 22138c8a9a5SSteve French * @work: smb work containing smb request buffer 22238c8a9a5SSteve French * 22338c8a9a5SSteve French * smb2 negotiate response is sent in reply of smb1 negotiate command for 22438c8a9a5SSteve French * dialect auto-negotiation. 22538c8a9a5SSteve French */ 22638c8a9a5SSteve French int init_smb2_neg_rsp(struct ksmbd_work *work) 22738c8a9a5SSteve French { 22838c8a9a5SSteve French struct smb2_hdr *rsp_hdr; 22938c8a9a5SSteve French struct smb2_negotiate_rsp *rsp; 23038c8a9a5SSteve French struct ksmbd_conn *conn = work->conn; 23138c8a9a5SSteve French 23238c8a9a5SSteve French *(__be32 *)work->response_buf = 23338c8a9a5SSteve French cpu_to_be32(conn->vals->header_size); 23438c8a9a5SSteve French 23538c8a9a5SSteve French rsp_hdr = smb2_get_msg(work->response_buf); 23638c8a9a5SSteve French memset(rsp_hdr, 0, sizeof(struct smb2_hdr) + 2); 23738c8a9a5SSteve French rsp_hdr->ProtocolId = SMB2_PROTO_NUMBER; 23838c8a9a5SSteve French rsp_hdr->StructureSize = SMB2_HEADER_STRUCTURE_SIZE; 23938c8a9a5SSteve French rsp_hdr->CreditRequest = cpu_to_le16(2); 24038c8a9a5SSteve French rsp_hdr->Command = SMB2_NEGOTIATE; 24138c8a9a5SSteve French rsp_hdr->Flags = (SMB2_FLAGS_SERVER_TO_REDIR); 24238c8a9a5SSteve French rsp_hdr->NextCommand = 0; 24338c8a9a5SSteve French rsp_hdr->MessageId = 0; 24438c8a9a5SSteve French rsp_hdr->Id.SyncId.ProcessId = 0; 24538c8a9a5SSteve French rsp_hdr->Id.SyncId.TreeId = 0; 24638c8a9a5SSteve French rsp_hdr->SessionId = 0; 24738c8a9a5SSteve French memset(rsp_hdr->Signature, 0, 16); 24838c8a9a5SSteve French 24938c8a9a5SSteve French rsp = smb2_get_msg(work->response_buf); 25038c8a9a5SSteve French 25138c8a9a5SSteve French WARN_ON(ksmbd_conn_good(conn)); 25238c8a9a5SSteve French 25338c8a9a5SSteve French rsp->StructureSize = cpu_to_le16(65); 25438c8a9a5SSteve French ksmbd_debug(SMB, "conn->dialect 0x%x\n", conn->dialect); 25538c8a9a5SSteve French rsp->DialectRevision = cpu_to_le16(conn->dialect); 25638c8a9a5SSteve French /* Not setting conn guid rsp->ServerGUID, as it 25738c8a9a5SSteve French * not used by client for identifying connection 25838c8a9a5SSteve French */ 25938c8a9a5SSteve French rsp->Capabilities = cpu_to_le32(conn->vals->capabilities); 26038c8a9a5SSteve French /* Default Max Message Size till SMB2.0, 64K*/ 26138c8a9a5SSteve French rsp->MaxTransactSize = cpu_to_le32(conn->vals->max_trans_size); 26238c8a9a5SSteve French rsp->MaxReadSize = cpu_to_le32(conn->vals->max_read_size); 26338c8a9a5SSteve French rsp->MaxWriteSize = cpu_to_le32(conn->vals->max_write_size); 26438c8a9a5SSteve French 26538c8a9a5SSteve French rsp->SystemTime = cpu_to_le64(ksmbd_systime()); 26638c8a9a5SSteve French rsp->ServerStartTime = 0; 26738c8a9a5SSteve French 26838c8a9a5SSteve French rsp->SecurityBufferOffset = cpu_to_le16(128); 26938c8a9a5SSteve French rsp->SecurityBufferLength = cpu_to_le16(AUTH_GSS_LENGTH); 27038c8a9a5SSteve French ksmbd_copy_gss_neg_header((char *)(&rsp->hdr) + 27138c8a9a5SSteve French le16_to_cpu(rsp->SecurityBufferOffset)); 27238c8a9a5SSteve French inc_rfc1001_len(work->response_buf, 27338c8a9a5SSteve French sizeof(struct smb2_negotiate_rsp) - 27438c8a9a5SSteve French sizeof(struct smb2_hdr) + AUTH_GSS_LENGTH); 27538c8a9a5SSteve French rsp->SecurityMode = SMB2_NEGOTIATE_SIGNING_ENABLED_LE; 27638c8a9a5SSteve French if (server_conf.signing == KSMBD_CONFIG_OPT_MANDATORY) 27738c8a9a5SSteve French rsp->SecurityMode |= SMB2_NEGOTIATE_SIGNING_REQUIRED_LE; 27838c8a9a5SSteve French conn->use_spnego = true; 27938c8a9a5SSteve French 28038c8a9a5SSteve French ksmbd_conn_set_need_negotiate(conn); 28138c8a9a5SSteve French return 0; 28238c8a9a5SSteve French } 28338c8a9a5SSteve French 28438c8a9a5SSteve French /** 28538c8a9a5SSteve French * smb2_set_rsp_credits() - set number of credits in response buffer 28638c8a9a5SSteve French * @work: smb work containing smb response buffer 28738c8a9a5SSteve French */ 28838c8a9a5SSteve French int smb2_set_rsp_credits(struct ksmbd_work *work) 28938c8a9a5SSteve French { 29038c8a9a5SSteve French struct smb2_hdr *req_hdr = ksmbd_req_buf_next(work); 29138c8a9a5SSteve French struct smb2_hdr *hdr = ksmbd_resp_buf_next(work); 29238c8a9a5SSteve French struct ksmbd_conn *conn = work->conn; 29338c8a9a5SSteve French unsigned short credits_requested, aux_max; 29438c8a9a5SSteve French unsigned short credit_charge, credits_granted = 0; 29538c8a9a5SSteve French 29638c8a9a5SSteve French if (work->send_no_response) 29738c8a9a5SSteve French return 0; 29838c8a9a5SSteve French 29938c8a9a5SSteve French hdr->CreditCharge = req_hdr->CreditCharge; 30038c8a9a5SSteve French 30138c8a9a5SSteve French if (conn->total_credits > conn->vals->max_credits) { 30238c8a9a5SSteve French hdr->CreditRequest = 0; 30338c8a9a5SSteve French pr_err("Total credits overflow: %d\n", conn->total_credits); 30438c8a9a5SSteve French return -EINVAL; 30538c8a9a5SSteve French } 30638c8a9a5SSteve French 30738c8a9a5SSteve French credit_charge = max_t(unsigned short, 30838c8a9a5SSteve French le16_to_cpu(req_hdr->CreditCharge), 1); 30938c8a9a5SSteve French if (credit_charge > conn->total_credits) { 31038c8a9a5SSteve French ksmbd_debug(SMB, "Insufficient credits granted, given: %u, granted: %u\n", 31138c8a9a5SSteve French credit_charge, conn->total_credits); 31238c8a9a5SSteve French return -EINVAL; 31338c8a9a5SSteve French } 31438c8a9a5SSteve French 31538c8a9a5SSteve French conn->total_credits -= credit_charge; 31638c8a9a5SSteve French conn->outstanding_credits -= credit_charge; 31738c8a9a5SSteve French credits_requested = max_t(unsigned short, 31838c8a9a5SSteve French le16_to_cpu(req_hdr->CreditRequest), 1); 31938c8a9a5SSteve French 32038c8a9a5SSteve French /* according to smb2.credits smbtorture, Windows server 32138c8a9a5SSteve French * 2016 or later grant up to 8192 credits at once. 32238c8a9a5SSteve French * 32338c8a9a5SSteve French * TODO: Need to adjuct CreditRequest value according to 32438c8a9a5SSteve French * current cpu load 32538c8a9a5SSteve French */ 32638c8a9a5SSteve French if (hdr->Command == SMB2_NEGOTIATE) 32738c8a9a5SSteve French aux_max = 1; 32838c8a9a5SSteve French else 32984c5aa47SNamjae Jeon aux_max = conn->vals->max_credits - conn->total_credits; 33038c8a9a5SSteve French credits_granted = min_t(unsigned short, credits_requested, aux_max); 33138c8a9a5SSteve French 33238c8a9a5SSteve French conn->total_credits += credits_granted; 33338c8a9a5SSteve French work->credits_granted += credits_granted; 33438c8a9a5SSteve French 33538c8a9a5SSteve French if (!req_hdr->NextCommand) { 33638c8a9a5SSteve French /* Update CreditRequest in last request */ 33738c8a9a5SSteve French hdr->CreditRequest = cpu_to_le16(work->credits_granted); 33838c8a9a5SSteve French } 33938c8a9a5SSteve French ksmbd_debug(SMB, 34038c8a9a5SSteve French "credits: requested[%d] granted[%d] total_granted[%d]\n", 34138c8a9a5SSteve French credits_requested, credits_granted, 34238c8a9a5SSteve French conn->total_credits); 34338c8a9a5SSteve French return 0; 34438c8a9a5SSteve French } 34538c8a9a5SSteve French 34638c8a9a5SSteve French /** 34738c8a9a5SSteve French * init_chained_smb2_rsp() - initialize smb2 chained response 34838c8a9a5SSteve French * @work: smb work containing smb response buffer 34938c8a9a5SSteve French */ 35038c8a9a5SSteve French static void init_chained_smb2_rsp(struct ksmbd_work *work) 35138c8a9a5SSteve French { 35238c8a9a5SSteve French struct smb2_hdr *req = ksmbd_req_buf_next(work); 35338c8a9a5SSteve French struct smb2_hdr *rsp = ksmbd_resp_buf_next(work); 35438c8a9a5SSteve French struct smb2_hdr *rsp_hdr; 35538c8a9a5SSteve French struct smb2_hdr *rcv_hdr; 35638c8a9a5SSteve French int next_hdr_offset = 0; 35738c8a9a5SSteve French int len, new_len; 35838c8a9a5SSteve French 35938c8a9a5SSteve French /* Len of this response = updated RFC len - offset of previous cmd 36038c8a9a5SSteve French * in the compound rsp 36138c8a9a5SSteve French */ 36238c8a9a5SSteve French 36338c8a9a5SSteve French /* Storing the current local FID which may be needed by subsequent 36438c8a9a5SSteve French * command in the compound request 36538c8a9a5SSteve French */ 36638c8a9a5SSteve French if (req->Command == SMB2_CREATE && rsp->Status == STATUS_SUCCESS) { 36738c8a9a5SSteve French work->compound_fid = ((struct smb2_create_rsp *)rsp)->VolatileFileId; 36838c8a9a5SSteve French work->compound_pfid = ((struct smb2_create_rsp *)rsp)->PersistentFileId; 36938c8a9a5SSteve French work->compound_sid = le64_to_cpu(rsp->SessionId); 37038c8a9a5SSteve French } 37138c8a9a5SSteve French 37238c8a9a5SSteve French len = get_rfc1002_len(work->response_buf) - work->next_smb2_rsp_hdr_off; 37338c8a9a5SSteve French next_hdr_offset = le32_to_cpu(req->NextCommand); 37438c8a9a5SSteve French 37538c8a9a5SSteve French new_len = ALIGN(len, 8); 37638c8a9a5SSteve French inc_rfc1001_len(work->response_buf, 37738c8a9a5SSteve French sizeof(struct smb2_hdr) + new_len - len); 37838c8a9a5SSteve French rsp->NextCommand = cpu_to_le32(new_len); 37938c8a9a5SSteve French 38038c8a9a5SSteve French work->next_smb2_rcv_hdr_off += next_hdr_offset; 38138c8a9a5SSteve French work->next_smb2_rsp_hdr_off += new_len; 38238c8a9a5SSteve French ksmbd_debug(SMB, 38338c8a9a5SSteve French "Compound req new_len = %d rcv off = %d rsp off = %d\n", 38438c8a9a5SSteve French new_len, work->next_smb2_rcv_hdr_off, 38538c8a9a5SSteve French work->next_smb2_rsp_hdr_off); 38638c8a9a5SSteve French 38738c8a9a5SSteve French rsp_hdr = ksmbd_resp_buf_next(work); 38838c8a9a5SSteve French rcv_hdr = ksmbd_req_buf_next(work); 38938c8a9a5SSteve French 39038c8a9a5SSteve French if (!(rcv_hdr->Flags & SMB2_FLAGS_RELATED_OPERATIONS)) { 39138c8a9a5SSteve French ksmbd_debug(SMB, "related flag should be set\n"); 39238c8a9a5SSteve French work->compound_fid = KSMBD_NO_FID; 39338c8a9a5SSteve French work->compound_pfid = KSMBD_NO_FID; 39438c8a9a5SSteve French } 39538c8a9a5SSteve French memset((char *)rsp_hdr, 0, sizeof(struct smb2_hdr) + 2); 39638c8a9a5SSteve French rsp_hdr->ProtocolId = SMB2_PROTO_NUMBER; 39738c8a9a5SSteve French rsp_hdr->StructureSize = SMB2_HEADER_STRUCTURE_SIZE; 39838c8a9a5SSteve French rsp_hdr->Command = rcv_hdr->Command; 39938c8a9a5SSteve French 40038c8a9a5SSteve French /* 40138c8a9a5SSteve French * Message is response. We don't grant oplock yet. 40238c8a9a5SSteve French */ 40338c8a9a5SSteve French rsp_hdr->Flags = (SMB2_FLAGS_SERVER_TO_REDIR | 40438c8a9a5SSteve French SMB2_FLAGS_RELATED_OPERATIONS); 40538c8a9a5SSteve French rsp_hdr->NextCommand = 0; 40638c8a9a5SSteve French rsp_hdr->MessageId = rcv_hdr->MessageId; 40738c8a9a5SSteve French rsp_hdr->Id.SyncId.ProcessId = rcv_hdr->Id.SyncId.ProcessId; 40838c8a9a5SSteve French rsp_hdr->Id.SyncId.TreeId = rcv_hdr->Id.SyncId.TreeId; 40938c8a9a5SSteve French rsp_hdr->SessionId = rcv_hdr->SessionId; 41038c8a9a5SSteve French memcpy(rsp_hdr->Signature, rcv_hdr->Signature, 16); 41138c8a9a5SSteve French } 41238c8a9a5SSteve French 41338c8a9a5SSteve French /** 41438c8a9a5SSteve French * is_chained_smb2_message() - check for chained command 41538c8a9a5SSteve French * @work: smb work containing smb request buffer 41638c8a9a5SSteve French * 41738c8a9a5SSteve French * Return: true if chained request, otherwise false 41838c8a9a5SSteve French */ 41938c8a9a5SSteve French bool is_chained_smb2_message(struct ksmbd_work *work) 42038c8a9a5SSteve French { 42138c8a9a5SSteve French struct smb2_hdr *hdr = smb2_get_msg(work->request_buf); 42238c8a9a5SSteve French unsigned int len, next_cmd; 42338c8a9a5SSteve French 42438c8a9a5SSteve French if (hdr->ProtocolId != SMB2_PROTO_NUMBER) 42538c8a9a5SSteve French return false; 42638c8a9a5SSteve French 42738c8a9a5SSteve French hdr = ksmbd_req_buf_next(work); 42838c8a9a5SSteve French next_cmd = le32_to_cpu(hdr->NextCommand); 42938c8a9a5SSteve French if (next_cmd > 0) { 43038c8a9a5SSteve French if ((u64)work->next_smb2_rcv_hdr_off + next_cmd + 43138c8a9a5SSteve French __SMB2_HEADER_STRUCTURE_SIZE > 43238c8a9a5SSteve French get_rfc1002_len(work->request_buf)) { 43338c8a9a5SSteve French pr_err("next command(%u) offset exceeds smb msg size\n", 43438c8a9a5SSteve French next_cmd); 43538c8a9a5SSteve French return false; 43638c8a9a5SSteve French } 43738c8a9a5SSteve French 43838c8a9a5SSteve French if ((u64)get_rfc1002_len(work->response_buf) + MAX_CIFS_SMALL_BUFFER_SIZE > 43938c8a9a5SSteve French work->response_sz) { 44038c8a9a5SSteve French pr_err("next response offset exceeds response buffer size\n"); 44138c8a9a5SSteve French return false; 44238c8a9a5SSteve French } 44338c8a9a5SSteve French 44438c8a9a5SSteve French ksmbd_debug(SMB, "got SMB2 chained command\n"); 44538c8a9a5SSteve French init_chained_smb2_rsp(work); 44638c8a9a5SSteve French return true; 44738c8a9a5SSteve French } else if (work->next_smb2_rcv_hdr_off) { 44838c8a9a5SSteve French /* 44938c8a9a5SSteve French * This is last request in chained command, 45038c8a9a5SSteve French * align response to 8 byte 45138c8a9a5SSteve French */ 45238c8a9a5SSteve French len = ALIGN(get_rfc1002_len(work->response_buf), 8); 45338c8a9a5SSteve French len = len - get_rfc1002_len(work->response_buf); 45438c8a9a5SSteve French if (len) { 45538c8a9a5SSteve French ksmbd_debug(SMB, "padding len %u\n", len); 45638c8a9a5SSteve French inc_rfc1001_len(work->response_buf, len); 45738c8a9a5SSteve French if (work->aux_payload_sz) 45838c8a9a5SSteve French work->aux_payload_sz += len; 45938c8a9a5SSteve French } 46038c8a9a5SSteve French } 46138c8a9a5SSteve French return false; 46238c8a9a5SSteve French } 46338c8a9a5SSteve French 46438c8a9a5SSteve French /** 46538c8a9a5SSteve French * init_smb2_rsp_hdr() - initialize smb2 response 46638c8a9a5SSteve French * @work: smb work containing smb request buffer 46738c8a9a5SSteve French * 46838c8a9a5SSteve French * Return: 0 46938c8a9a5SSteve French */ 47038c8a9a5SSteve French int init_smb2_rsp_hdr(struct ksmbd_work *work) 47138c8a9a5SSteve French { 47238c8a9a5SSteve French struct smb2_hdr *rsp_hdr = smb2_get_msg(work->response_buf); 47338c8a9a5SSteve French struct smb2_hdr *rcv_hdr = smb2_get_msg(work->request_buf); 47438c8a9a5SSteve French struct ksmbd_conn *conn = work->conn; 47538c8a9a5SSteve French 47638c8a9a5SSteve French memset(rsp_hdr, 0, sizeof(struct smb2_hdr) + 2); 47738c8a9a5SSteve French *(__be32 *)work->response_buf = 47838c8a9a5SSteve French cpu_to_be32(conn->vals->header_size); 47938c8a9a5SSteve French rsp_hdr->ProtocolId = rcv_hdr->ProtocolId; 48038c8a9a5SSteve French rsp_hdr->StructureSize = SMB2_HEADER_STRUCTURE_SIZE; 48138c8a9a5SSteve French rsp_hdr->Command = rcv_hdr->Command; 48238c8a9a5SSteve French 48338c8a9a5SSteve French /* 48438c8a9a5SSteve French * Message is response. We don't grant oplock yet. 48538c8a9a5SSteve French */ 48638c8a9a5SSteve French rsp_hdr->Flags = (SMB2_FLAGS_SERVER_TO_REDIR); 48738c8a9a5SSteve French rsp_hdr->NextCommand = 0; 48838c8a9a5SSteve French rsp_hdr->MessageId = rcv_hdr->MessageId; 48938c8a9a5SSteve French rsp_hdr->Id.SyncId.ProcessId = rcv_hdr->Id.SyncId.ProcessId; 49038c8a9a5SSteve French rsp_hdr->Id.SyncId.TreeId = rcv_hdr->Id.SyncId.TreeId; 49138c8a9a5SSteve French rsp_hdr->SessionId = rcv_hdr->SessionId; 49238c8a9a5SSteve French memcpy(rsp_hdr->Signature, rcv_hdr->Signature, 16); 49338c8a9a5SSteve French 49438c8a9a5SSteve French return 0; 49538c8a9a5SSteve French } 49638c8a9a5SSteve French 49738c8a9a5SSteve French /** 49838c8a9a5SSteve French * smb2_allocate_rsp_buf() - allocate smb2 response buffer 49938c8a9a5SSteve French * @work: smb work containing smb request buffer 50038c8a9a5SSteve French * 50138c8a9a5SSteve French * Return: 0 on success, otherwise -ENOMEM 50238c8a9a5SSteve French */ 50338c8a9a5SSteve French int smb2_allocate_rsp_buf(struct ksmbd_work *work) 50438c8a9a5SSteve French { 50538c8a9a5SSteve French struct smb2_hdr *hdr = smb2_get_msg(work->request_buf); 50638c8a9a5SSteve French size_t small_sz = MAX_CIFS_SMALL_BUFFER_SIZE; 50738c8a9a5SSteve French size_t large_sz = small_sz + work->conn->vals->max_trans_size; 50838c8a9a5SSteve French size_t sz = small_sz; 50938c8a9a5SSteve French int cmd = le16_to_cpu(hdr->Command); 51038c8a9a5SSteve French 51138c8a9a5SSteve French if (cmd == SMB2_IOCTL_HE || cmd == SMB2_QUERY_DIRECTORY_HE) 51238c8a9a5SSteve French sz = large_sz; 51338c8a9a5SSteve French 51438c8a9a5SSteve French if (cmd == SMB2_QUERY_INFO_HE) { 51538c8a9a5SSteve French struct smb2_query_info_req *req; 51638c8a9a5SSteve French 51738c8a9a5SSteve French req = smb2_get_msg(work->request_buf); 51838c8a9a5SSteve French if ((req->InfoType == SMB2_O_INFO_FILE && 51938c8a9a5SSteve French (req->FileInfoClass == FILE_FULL_EA_INFORMATION || 52038c8a9a5SSteve French req->FileInfoClass == FILE_ALL_INFORMATION)) || 52138c8a9a5SSteve French req->InfoType == SMB2_O_INFO_SECURITY) 52238c8a9a5SSteve French sz = large_sz; 52338c8a9a5SSteve French } 52438c8a9a5SSteve French 52538c8a9a5SSteve French /* allocate large response buf for chained commands */ 52638c8a9a5SSteve French if (le32_to_cpu(hdr->NextCommand) > 0) 52738c8a9a5SSteve French sz = large_sz; 52838c8a9a5SSteve French 52938c8a9a5SSteve French work->response_buf = kvmalloc(sz, GFP_KERNEL | __GFP_ZERO); 53038c8a9a5SSteve French if (!work->response_buf) 53138c8a9a5SSteve French return -ENOMEM; 53238c8a9a5SSteve French 53338c8a9a5SSteve French work->response_sz = sz; 53438c8a9a5SSteve French return 0; 53538c8a9a5SSteve French } 53638c8a9a5SSteve French 53738c8a9a5SSteve French /** 53838c8a9a5SSteve French * smb2_check_user_session() - check for valid session for a user 53938c8a9a5SSteve French * @work: smb work containing smb request buffer 54038c8a9a5SSteve French * 54138c8a9a5SSteve French * Return: 0 on success, otherwise error 54238c8a9a5SSteve French */ 54338c8a9a5SSteve French int smb2_check_user_session(struct ksmbd_work *work) 54438c8a9a5SSteve French { 54538c8a9a5SSteve French struct smb2_hdr *req_hdr = smb2_get_msg(work->request_buf); 54638c8a9a5SSteve French struct ksmbd_conn *conn = work->conn; 54738c8a9a5SSteve French unsigned int cmd = conn->ops->get_cmd_val(work); 54838c8a9a5SSteve French unsigned long long sess_id; 54938c8a9a5SSteve French 55038c8a9a5SSteve French work->sess = NULL; 55138c8a9a5SSteve French /* 55238c8a9a5SSteve French * SMB2_ECHO, SMB2_NEGOTIATE, SMB2_SESSION_SETUP command do not 55338c8a9a5SSteve French * require a session id, so no need to validate user session's for 55438c8a9a5SSteve French * these commands. 55538c8a9a5SSteve French */ 55638c8a9a5SSteve French if (cmd == SMB2_ECHO_HE || cmd == SMB2_NEGOTIATE_HE || 55738c8a9a5SSteve French cmd == SMB2_SESSION_SETUP_HE) 55838c8a9a5SSteve French return 0; 55938c8a9a5SSteve French 56038c8a9a5SSteve French if (!ksmbd_conn_good(conn)) 56138c8a9a5SSteve French return -EINVAL; 56238c8a9a5SSteve French 56338c8a9a5SSteve French sess_id = le64_to_cpu(req_hdr->SessionId); 56438c8a9a5SSteve French /* Check for validity of user session */ 56538c8a9a5SSteve French work->sess = ksmbd_session_lookup_all(conn, sess_id); 56638c8a9a5SSteve French if (work->sess) 56738c8a9a5SSteve French return 1; 56838c8a9a5SSteve French ksmbd_debug(SMB, "Invalid user session, Uid %llu\n", sess_id); 56938c8a9a5SSteve French return -EINVAL; 57038c8a9a5SSteve French } 57138c8a9a5SSteve French 57238c8a9a5SSteve French static void destroy_previous_session(struct ksmbd_conn *conn, 57338c8a9a5SSteve French struct ksmbd_user *user, u64 id) 57438c8a9a5SSteve French { 57538c8a9a5SSteve French struct ksmbd_session *prev_sess = ksmbd_session_lookup_slowpath(id); 57638c8a9a5SSteve French struct ksmbd_user *prev_user; 57738c8a9a5SSteve French struct channel *chann; 57838c8a9a5SSteve French long index; 57938c8a9a5SSteve French 58038c8a9a5SSteve French if (!prev_sess) 58138c8a9a5SSteve French return; 58238c8a9a5SSteve French 58338c8a9a5SSteve French prev_user = prev_sess->user; 58438c8a9a5SSteve French 58538c8a9a5SSteve French if (!prev_user || 58638c8a9a5SSteve French strcmp(user->name, prev_user->name) || 58738c8a9a5SSteve French user->passkey_sz != prev_user->passkey_sz || 58838c8a9a5SSteve French memcmp(user->passkey, prev_user->passkey, user->passkey_sz)) 58938c8a9a5SSteve French return; 59038c8a9a5SSteve French 59138c8a9a5SSteve French prev_sess->state = SMB2_SESSION_EXPIRED; 59238c8a9a5SSteve French xa_for_each(&prev_sess->ksmbd_chann_list, index, chann) 59338c8a9a5SSteve French ksmbd_conn_set_exiting(chann->conn); 59438c8a9a5SSteve French } 59538c8a9a5SSteve French 59638c8a9a5SSteve French /** 59738c8a9a5SSteve French * smb2_get_name() - get filename string from on the wire smb format 59838c8a9a5SSteve French * @src: source buffer 59938c8a9a5SSteve French * @maxlen: maxlen of source string 60038c8a9a5SSteve French * @local_nls: nls_table pointer 60138c8a9a5SSteve French * 60238c8a9a5SSteve French * Return: matching converted filename on success, otherwise error ptr 60338c8a9a5SSteve French */ 60438c8a9a5SSteve French static char * 60538c8a9a5SSteve French smb2_get_name(const char *src, const int maxlen, struct nls_table *local_nls) 60638c8a9a5SSteve French { 60738c8a9a5SSteve French char *name; 60838c8a9a5SSteve French 60938c8a9a5SSteve French name = smb_strndup_from_utf16(src, maxlen, 1, local_nls); 61038c8a9a5SSteve French if (IS_ERR(name)) { 61138c8a9a5SSteve French pr_err("failed to get name %ld\n", PTR_ERR(name)); 61238c8a9a5SSteve French return name; 61338c8a9a5SSteve French } 61438c8a9a5SSteve French 61538c8a9a5SSteve French ksmbd_conv_path_to_unix(name); 61638c8a9a5SSteve French ksmbd_strip_last_slash(name); 61738c8a9a5SSteve French return name; 61838c8a9a5SSteve French } 61938c8a9a5SSteve French 62038c8a9a5SSteve French int setup_async_work(struct ksmbd_work *work, void (*fn)(void **), void **arg) 62138c8a9a5SSteve French { 62238c8a9a5SSteve French struct smb2_hdr *rsp_hdr; 62338c8a9a5SSteve French struct ksmbd_conn *conn = work->conn; 62438c8a9a5SSteve French int id; 62538c8a9a5SSteve French 62638c8a9a5SSteve French rsp_hdr = smb2_get_msg(work->response_buf); 62738c8a9a5SSteve French rsp_hdr->Flags |= SMB2_FLAGS_ASYNC_COMMAND; 62838c8a9a5SSteve French 62938c8a9a5SSteve French id = ksmbd_acquire_async_msg_id(&conn->async_ida); 63038c8a9a5SSteve French if (id < 0) { 63138c8a9a5SSteve French pr_err("Failed to alloc async message id\n"); 63238c8a9a5SSteve French return id; 63338c8a9a5SSteve French } 63438c8a9a5SSteve French work->asynchronous = true; 63538c8a9a5SSteve French work->async_id = id; 63638c8a9a5SSteve French rsp_hdr->Id.AsyncId = cpu_to_le64(id); 63738c8a9a5SSteve French 63838c8a9a5SSteve French ksmbd_debug(SMB, 63938c8a9a5SSteve French "Send interim Response to inform async request id : %d\n", 64038c8a9a5SSteve French work->async_id); 64138c8a9a5SSteve French 64238c8a9a5SSteve French work->cancel_fn = fn; 64338c8a9a5SSteve French work->cancel_argv = arg; 64438c8a9a5SSteve French 64538c8a9a5SSteve French if (list_empty(&work->async_request_entry)) { 64638c8a9a5SSteve French spin_lock(&conn->request_lock); 64738c8a9a5SSteve French list_add_tail(&work->async_request_entry, &conn->async_requests); 64838c8a9a5SSteve French spin_unlock(&conn->request_lock); 64938c8a9a5SSteve French } 65038c8a9a5SSteve French 65138c8a9a5SSteve French return 0; 65238c8a9a5SSteve French } 65338c8a9a5SSteve French 65438c8a9a5SSteve French void release_async_work(struct ksmbd_work *work) 65538c8a9a5SSteve French { 65638c8a9a5SSteve French struct ksmbd_conn *conn = work->conn; 65738c8a9a5SSteve French 65838c8a9a5SSteve French spin_lock(&conn->request_lock); 65938c8a9a5SSteve French list_del_init(&work->async_request_entry); 66038c8a9a5SSteve French spin_unlock(&conn->request_lock); 66138c8a9a5SSteve French 66238c8a9a5SSteve French work->asynchronous = 0; 66338c8a9a5SSteve French work->cancel_fn = NULL; 66438c8a9a5SSteve French kfree(work->cancel_argv); 66538c8a9a5SSteve French work->cancel_argv = NULL; 66638c8a9a5SSteve French if (work->async_id) { 66738c8a9a5SSteve French ksmbd_release_id(&conn->async_ida, work->async_id); 66838c8a9a5SSteve French work->async_id = 0; 66938c8a9a5SSteve French } 67038c8a9a5SSteve French } 67138c8a9a5SSteve French 67238c8a9a5SSteve French void smb2_send_interim_resp(struct ksmbd_work *work, __le32 status) 67338c8a9a5SSteve French { 67438c8a9a5SSteve French struct smb2_hdr *rsp_hdr; 67538c8a9a5SSteve French 67638c8a9a5SSteve French rsp_hdr = smb2_get_msg(work->response_buf); 67738c8a9a5SSteve French smb2_set_err_rsp(work); 67838c8a9a5SSteve French rsp_hdr->Status = status; 67938c8a9a5SSteve French 68038c8a9a5SSteve French work->multiRsp = 1; 68138c8a9a5SSteve French ksmbd_conn_write(work); 68238c8a9a5SSteve French rsp_hdr->Status = 0; 68338c8a9a5SSteve French work->multiRsp = 0; 68438c8a9a5SSteve French } 68538c8a9a5SSteve French 68638c8a9a5SSteve French static __le32 smb2_get_reparse_tag_special_file(umode_t mode) 68738c8a9a5SSteve French { 68838c8a9a5SSteve French if (S_ISDIR(mode) || S_ISREG(mode)) 68938c8a9a5SSteve French return 0; 69038c8a9a5SSteve French 69138c8a9a5SSteve French if (S_ISLNK(mode)) 69238c8a9a5SSteve French return IO_REPARSE_TAG_LX_SYMLINK_LE; 69338c8a9a5SSteve French else if (S_ISFIFO(mode)) 69438c8a9a5SSteve French return IO_REPARSE_TAG_LX_FIFO_LE; 69538c8a9a5SSteve French else if (S_ISSOCK(mode)) 69638c8a9a5SSteve French return IO_REPARSE_TAG_AF_UNIX_LE; 69738c8a9a5SSteve French else if (S_ISCHR(mode)) 69838c8a9a5SSteve French return IO_REPARSE_TAG_LX_CHR_LE; 69938c8a9a5SSteve French else if (S_ISBLK(mode)) 70038c8a9a5SSteve French return IO_REPARSE_TAG_LX_BLK_LE; 70138c8a9a5SSteve French 70238c8a9a5SSteve French return 0; 70338c8a9a5SSteve French } 70438c8a9a5SSteve French 70538c8a9a5SSteve French /** 70638c8a9a5SSteve French * smb2_get_dos_mode() - get file mode in dos format from unix mode 70738c8a9a5SSteve French * @stat: kstat containing file mode 70838c8a9a5SSteve French * @attribute: attribute flags 70938c8a9a5SSteve French * 71038c8a9a5SSteve French * Return: converted dos mode 71138c8a9a5SSteve French */ 71238c8a9a5SSteve French static int smb2_get_dos_mode(struct kstat *stat, int attribute) 71338c8a9a5SSteve French { 71438c8a9a5SSteve French int attr = 0; 71538c8a9a5SSteve French 71638c8a9a5SSteve French if (S_ISDIR(stat->mode)) { 71738c8a9a5SSteve French attr = FILE_ATTRIBUTE_DIRECTORY | 71838c8a9a5SSteve French (attribute & (FILE_ATTRIBUTE_HIDDEN | FILE_ATTRIBUTE_SYSTEM)); 71938c8a9a5SSteve French } else { 72038c8a9a5SSteve French attr = (attribute & 0x00005137) | FILE_ATTRIBUTE_ARCHIVE; 72138c8a9a5SSteve French attr &= ~(FILE_ATTRIBUTE_DIRECTORY); 72238c8a9a5SSteve French if (S_ISREG(stat->mode) && (server_conf.share_fake_fscaps & 72338c8a9a5SSteve French FILE_SUPPORTS_SPARSE_FILES)) 72438c8a9a5SSteve French attr |= FILE_ATTRIBUTE_SPARSE_FILE; 72538c8a9a5SSteve French 72638c8a9a5SSteve French if (smb2_get_reparse_tag_special_file(stat->mode)) 72738c8a9a5SSteve French attr |= FILE_ATTRIBUTE_REPARSE_POINT; 72838c8a9a5SSteve French } 72938c8a9a5SSteve French 73038c8a9a5SSteve French return attr; 73138c8a9a5SSteve French } 73238c8a9a5SSteve French 73338c8a9a5SSteve French static void build_preauth_ctxt(struct smb2_preauth_neg_context *pneg_ctxt, 73438c8a9a5SSteve French __le16 hash_id) 73538c8a9a5SSteve French { 73638c8a9a5SSteve French pneg_ctxt->ContextType = SMB2_PREAUTH_INTEGRITY_CAPABILITIES; 73738c8a9a5SSteve French pneg_ctxt->DataLength = cpu_to_le16(38); 73838c8a9a5SSteve French pneg_ctxt->HashAlgorithmCount = cpu_to_le16(1); 73938c8a9a5SSteve French pneg_ctxt->Reserved = cpu_to_le32(0); 74038c8a9a5SSteve French pneg_ctxt->SaltLength = cpu_to_le16(SMB311_SALT_SIZE); 74138c8a9a5SSteve French get_random_bytes(pneg_ctxt->Salt, SMB311_SALT_SIZE); 74238c8a9a5SSteve French pneg_ctxt->HashAlgorithms = hash_id; 74338c8a9a5SSteve French } 74438c8a9a5SSteve French 74538c8a9a5SSteve French static void build_encrypt_ctxt(struct smb2_encryption_neg_context *pneg_ctxt, 74638c8a9a5SSteve French __le16 cipher_type) 74738c8a9a5SSteve French { 74838c8a9a5SSteve French pneg_ctxt->ContextType = SMB2_ENCRYPTION_CAPABILITIES; 74938c8a9a5SSteve French pneg_ctxt->DataLength = cpu_to_le16(4); 75038c8a9a5SSteve French pneg_ctxt->Reserved = cpu_to_le32(0); 75138c8a9a5SSteve French pneg_ctxt->CipherCount = cpu_to_le16(1); 75238c8a9a5SSteve French pneg_ctxt->Ciphers[0] = cipher_type; 75338c8a9a5SSteve French } 75438c8a9a5SSteve French 75538c8a9a5SSteve French static void build_sign_cap_ctxt(struct smb2_signing_capabilities *pneg_ctxt, 75638c8a9a5SSteve French __le16 sign_algo) 75738c8a9a5SSteve French { 75838c8a9a5SSteve French pneg_ctxt->ContextType = SMB2_SIGNING_CAPABILITIES; 75938c8a9a5SSteve French pneg_ctxt->DataLength = 76038c8a9a5SSteve French cpu_to_le16((sizeof(struct smb2_signing_capabilities) + 2) 76138c8a9a5SSteve French - sizeof(struct smb2_neg_context)); 76238c8a9a5SSteve French pneg_ctxt->Reserved = cpu_to_le32(0); 76338c8a9a5SSteve French pneg_ctxt->SigningAlgorithmCount = cpu_to_le16(1); 76438c8a9a5SSteve French pneg_ctxt->SigningAlgorithms[0] = sign_algo; 76538c8a9a5SSteve French } 76638c8a9a5SSteve French 76738c8a9a5SSteve French static void build_posix_ctxt(struct smb2_posix_neg_context *pneg_ctxt) 76838c8a9a5SSteve French { 76938c8a9a5SSteve French pneg_ctxt->ContextType = SMB2_POSIX_EXTENSIONS_AVAILABLE; 77038c8a9a5SSteve French pneg_ctxt->DataLength = cpu_to_le16(POSIX_CTXT_DATA_LEN); 77138c8a9a5SSteve French /* SMB2_CREATE_TAG_POSIX is "0x93AD25509CB411E7B42383DE968BCD7C" */ 77238c8a9a5SSteve French pneg_ctxt->Name[0] = 0x93; 77338c8a9a5SSteve French pneg_ctxt->Name[1] = 0xAD; 77438c8a9a5SSteve French pneg_ctxt->Name[2] = 0x25; 77538c8a9a5SSteve French pneg_ctxt->Name[3] = 0x50; 77638c8a9a5SSteve French pneg_ctxt->Name[4] = 0x9C; 77738c8a9a5SSteve French pneg_ctxt->Name[5] = 0xB4; 77838c8a9a5SSteve French pneg_ctxt->Name[6] = 0x11; 77938c8a9a5SSteve French pneg_ctxt->Name[7] = 0xE7; 78038c8a9a5SSteve French pneg_ctxt->Name[8] = 0xB4; 78138c8a9a5SSteve French pneg_ctxt->Name[9] = 0x23; 78238c8a9a5SSteve French pneg_ctxt->Name[10] = 0x83; 78338c8a9a5SSteve French pneg_ctxt->Name[11] = 0xDE; 78438c8a9a5SSteve French pneg_ctxt->Name[12] = 0x96; 78538c8a9a5SSteve French pneg_ctxt->Name[13] = 0x8B; 78638c8a9a5SSteve French pneg_ctxt->Name[14] = 0xCD; 78738c8a9a5SSteve French pneg_ctxt->Name[15] = 0x7C; 78838c8a9a5SSteve French } 78938c8a9a5SSteve French 79038c8a9a5SSteve French static void assemble_neg_contexts(struct ksmbd_conn *conn, 79138c8a9a5SSteve French struct smb2_negotiate_rsp *rsp, 79238c8a9a5SSteve French void *smb2_buf_len) 79338c8a9a5SSteve French { 79438c8a9a5SSteve French char * const pneg_ctxt = (char *)rsp + 79538c8a9a5SSteve French le32_to_cpu(rsp->NegotiateContextOffset); 79638c8a9a5SSteve French int neg_ctxt_cnt = 1; 79738c8a9a5SSteve French int ctxt_size; 79838c8a9a5SSteve French 79938c8a9a5SSteve French ksmbd_debug(SMB, 80038c8a9a5SSteve French "assemble SMB2_PREAUTH_INTEGRITY_CAPABILITIES context\n"); 80138c8a9a5SSteve French build_preauth_ctxt((struct smb2_preauth_neg_context *)pneg_ctxt, 80238c8a9a5SSteve French conn->preauth_info->Preauth_HashId); 80338c8a9a5SSteve French inc_rfc1001_len(smb2_buf_len, AUTH_GSS_PADDING); 80438c8a9a5SSteve French ctxt_size = sizeof(struct smb2_preauth_neg_context); 80538c8a9a5SSteve French 80638c8a9a5SSteve French if (conn->cipher_type) { 80738c8a9a5SSteve French /* Round to 8 byte boundary */ 80838c8a9a5SSteve French ctxt_size = round_up(ctxt_size, 8); 80938c8a9a5SSteve French ksmbd_debug(SMB, 81038c8a9a5SSteve French "assemble SMB2_ENCRYPTION_CAPABILITIES context\n"); 81138c8a9a5SSteve French build_encrypt_ctxt((struct smb2_encryption_neg_context *) 81238c8a9a5SSteve French (pneg_ctxt + ctxt_size), 81338c8a9a5SSteve French conn->cipher_type); 81438c8a9a5SSteve French neg_ctxt_cnt++; 81538c8a9a5SSteve French ctxt_size += sizeof(struct smb2_encryption_neg_context) + 2; 81638c8a9a5SSteve French } 81738c8a9a5SSteve French 81838c8a9a5SSteve French /* compression context not yet supported */ 81938c8a9a5SSteve French WARN_ON(conn->compress_algorithm != SMB3_COMPRESS_NONE); 82038c8a9a5SSteve French 82138c8a9a5SSteve French if (conn->posix_ext_supported) { 82238c8a9a5SSteve French ctxt_size = round_up(ctxt_size, 8); 82338c8a9a5SSteve French ksmbd_debug(SMB, 82438c8a9a5SSteve French "assemble SMB2_POSIX_EXTENSIONS_AVAILABLE context\n"); 82538c8a9a5SSteve French build_posix_ctxt((struct smb2_posix_neg_context *) 82638c8a9a5SSteve French (pneg_ctxt + ctxt_size)); 82738c8a9a5SSteve French neg_ctxt_cnt++; 82838c8a9a5SSteve French ctxt_size += sizeof(struct smb2_posix_neg_context); 82938c8a9a5SSteve French } 83038c8a9a5SSteve French 83138c8a9a5SSteve French if (conn->signing_negotiated) { 83238c8a9a5SSteve French ctxt_size = round_up(ctxt_size, 8); 83338c8a9a5SSteve French ksmbd_debug(SMB, 83438c8a9a5SSteve French "assemble SMB2_SIGNING_CAPABILITIES context\n"); 83538c8a9a5SSteve French build_sign_cap_ctxt((struct smb2_signing_capabilities *) 83638c8a9a5SSteve French (pneg_ctxt + ctxt_size), 83738c8a9a5SSteve French conn->signing_algorithm); 83838c8a9a5SSteve French neg_ctxt_cnt++; 83938c8a9a5SSteve French ctxt_size += sizeof(struct smb2_signing_capabilities) + 2; 84038c8a9a5SSteve French } 84138c8a9a5SSteve French 84238c8a9a5SSteve French rsp->NegotiateContextCount = cpu_to_le16(neg_ctxt_cnt); 84338c8a9a5SSteve French inc_rfc1001_len(smb2_buf_len, ctxt_size); 84438c8a9a5SSteve French } 84538c8a9a5SSteve French 84638c8a9a5SSteve French static __le32 decode_preauth_ctxt(struct ksmbd_conn *conn, 84738c8a9a5SSteve French struct smb2_preauth_neg_context *pneg_ctxt, 848*0512a5f8SKuan-Ting Chen int ctxt_len) 84938c8a9a5SSteve French { 85038c8a9a5SSteve French /* 85138c8a9a5SSteve French * sizeof(smb2_preauth_neg_context) assumes SMB311_SALT_SIZE Salt, 85238c8a9a5SSteve French * which may not be present. Only check for used HashAlgorithms[1]. 85338c8a9a5SSteve French */ 854*0512a5f8SKuan-Ting Chen if (ctxt_len < 855*0512a5f8SKuan-Ting Chen sizeof(struct smb2_neg_context) + MIN_PREAUTH_CTXT_DATA_LEN) 85638c8a9a5SSteve French return STATUS_INVALID_PARAMETER; 85738c8a9a5SSteve French 85838c8a9a5SSteve French if (pneg_ctxt->HashAlgorithms != SMB2_PREAUTH_INTEGRITY_SHA512) 85938c8a9a5SSteve French return STATUS_NO_PREAUTH_INTEGRITY_HASH_OVERLAP; 86038c8a9a5SSteve French 86138c8a9a5SSteve French conn->preauth_info->Preauth_HashId = SMB2_PREAUTH_INTEGRITY_SHA512; 86238c8a9a5SSteve French return STATUS_SUCCESS; 86338c8a9a5SSteve French } 86438c8a9a5SSteve French 86538c8a9a5SSteve French static void decode_encrypt_ctxt(struct ksmbd_conn *conn, 86638c8a9a5SSteve French struct smb2_encryption_neg_context *pneg_ctxt, 867*0512a5f8SKuan-Ting Chen int ctxt_len) 86838c8a9a5SSteve French { 869*0512a5f8SKuan-Ting Chen int cph_cnt; 870*0512a5f8SKuan-Ting Chen int i, cphs_size; 871*0512a5f8SKuan-Ting Chen 872*0512a5f8SKuan-Ting Chen if (sizeof(struct smb2_encryption_neg_context) > ctxt_len) { 873*0512a5f8SKuan-Ting Chen pr_err("Invalid SMB2_ENCRYPTION_CAPABILITIES context size\n"); 874*0512a5f8SKuan-Ting Chen return; 875*0512a5f8SKuan-Ting Chen } 87638c8a9a5SSteve French 87738c8a9a5SSteve French conn->cipher_type = 0; 87838c8a9a5SSteve French 879*0512a5f8SKuan-Ting Chen cph_cnt = le16_to_cpu(pneg_ctxt->CipherCount); 880*0512a5f8SKuan-Ting Chen cphs_size = cph_cnt * sizeof(__le16); 881*0512a5f8SKuan-Ting Chen 88238c8a9a5SSteve French if (sizeof(struct smb2_encryption_neg_context) + cphs_size > 883*0512a5f8SKuan-Ting Chen ctxt_len) { 88438c8a9a5SSteve French pr_err("Invalid cipher count(%d)\n", cph_cnt); 88538c8a9a5SSteve French return; 88638c8a9a5SSteve French } 88738c8a9a5SSteve French 88838c8a9a5SSteve French if (server_conf.flags & KSMBD_GLOBAL_FLAG_SMB2_ENCRYPTION_OFF) 88938c8a9a5SSteve French return; 89038c8a9a5SSteve French 89138c8a9a5SSteve French for (i = 0; i < cph_cnt; i++) { 89238c8a9a5SSteve French if (pneg_ctxt->Ciphers[i] == SMB2_ENCRYPTION_AES128_GCM || 89338c8a9a5SSteve French pneg_ctxt->Ciphers[i] == SMB2_ENCRYPTION_AES128_CCM || 89438c8a9a5SSteve French pneg_ctxt->Ciphers[i] == SMB2_ENCRYPTION_AES256_CCM || 89538c8a9a5SSteve French pneg_ctxt->Ciphers[i] == SMB2_ENCRYPTION_AES256_GCM) { 89638c8a9a5SSteve French ksmbd_debug(SMB, "Cipher ID = 0x%x\n", 89738c8a9a5SSteve French pneg_ctxt->Ciphers[i]); 89838c8a9a5SSteve French conn->cipher_type = pneg_ctxt->Ciphers[i]; 89938c8a9a5SSteve French break; 90038c8a9a5SSteve French } 90138c8a9a5SSteve French } 90238c8a9a5SSteve French } 90338c8a9a5SSteve French 90438c8a9a5SSteve French /** 90538c8a9a5SSteve French * smb3_encryption_negotiated() - checks if server and client agreed on enabling encryption 90638c8a9a5SSteve French * @conn: smb connection 90738c8a9a5SSteve French * 90838c8a9a5SSteve French * Return: true if connection should be encrypted, else false 90938c8a9a5SSteve French */ 91038c8a9a5SSteve French bool smb3_encryption_negotiated(struct ksmbd_conn *conn) 91138c8a9a5SSteve French { 91238c8a9a5SSteve French if (!conn->ops->generate_encryptionkey) 91338c8a9a5SSteve French return false; 91438c8a9a5SSteve French 91538c8a9a5SSteve French /* 91638c8a9a5SSteve French * SMB 3.0 and 3.0.2 dialects use the SMB2_GLOBAL_CAP_ENCRYPTION flag. 91738c8a9a5SSteve French * SMB 3.1.1 uses the cipher_type field. 91838c8a9a5SSteve French */ 91938c8a9a5SSteve French return (conn->vals->capabilities & SMB2_GLOBAL_CAP_ENCRYPTION) || 92038c8a9a5SSteve French conn->cipher_type; 92138c8a9a5SSteve French } 92238c8a9a5SSteve French 92338c8a9a5SSteve French static void decode_compress_ctxt(struct ksmbd_conn *conn, 92438c8a9a5SSteve French struct smb2_compression_capabilities_context *pneg_ctxt) 92538c8a9a5SSteve French { 92638c8a9a5SSteve French conn->compress_algorithm = SMB3_COMPRESS_NONE; 92738c8a9a5SSteve French } 92838c8a9a5SSteve French 92938c8a9a5SSteve French static void decode_sign_cap_ctxt(struct ksmbd_conn *conn, 93038c8a9a5SSteve French struct smb2_signing_capabilities *pneg_ctxt, 931*0512a5f8SKuan-Ting Chen int ctxt_len) 93238c8a9a5SSteve French { 933*0512a5f8SKuan-Ting Chen int sign_algo_cnt; 934*0512a5f8SKuan-Ting Chen int i, sign_alos_size; 935*0512a5f8SKuan-Ting Chen 936*0512a5f8SKuan-Ting Chen if (sizeof(struct smb2_signing_capabilities) > ctxt_len) { 937*0512a5f8SKuan-Ting Chen pr_err("Invalid SMB2_SIGNING_CAPABILITIES context length\n"); 938*0512a5f8SKuan-Ting Chen return; 939*0512a5f8SKuan-Ting Chen } 94038c8a9a5SSteve French 94138c8a9a5SSteve French conn->signing_negotiated = false; 942*0512a5f8SKuan-Ting Chen sign_algo_cnt = le16_to_cpu(pneg_ctxt->SigningAlgorithmCount); 943*0512a5f8SKuan-Ting Chen sign_alos_size = sign_algo_cnt * sizeof(__le16); 94438c8a9a5SSteve French 94538c8a9a5SSteve French if (sizeof(struct smb2_signing_capabilities) + sign_alos_size > 946*0512a5f8SKuan-Ting Chen ctxt_len) { 94738c8a9a5SSteve French pr_err("Invalid signing algorithm count(%d)\n", sign_algo_cnt); 94838c8a9a5SSteve French return; 94938c8a9a5SSteve French } 95038c8a9a5SSteve French 95138c8a9a5SSteve French for (i = 0; i < sign_algo_cnt; i++) { 95238c8a9a5SSteve French if (pneg_ctxt->SigningAlgorithms[i] == SIGNING_ALG_HMAC_SHA256_LE || 95338c8a9a5SSteve French pneg_ctxt->SigningAlgorithms[i] == SIGNING_ALG_AES_CMAC_LE) { 95438c8a9a5SSteve French ksmbd_debug(SMB, "Signing Algorithm ID = 0x%x\n", 95538c8a9a5SSteve French pneg_ctxt->SigningAlgorithms[i]); 95638c8a9a5SSteve French conn->signing_negotiated = true; 95738c8a9a5SSteve French conn->signing_algorithm = 95838c8a9a5SSteve French pneg_ctxt->SigningAlgorithms[i]; 95938c8a9a5SSteve French break; 96038c8a9a5SSteve French } 96138c8a9a5SSteve French } 96238c8a9a5SSteve French } 96338c8a9a5SSteve French 96438c8a9a5SSteve French static __le32 deassemble_neg_contexts(struct ksmbd_conn *conn, 96538c8a9a5SSteve French struct smb2_negotiate_req *req, 96638c8a9a5SSteve French int len_of_smb) 96738c8a9a5SSteve French { 96838c8a9a5SSteve French /* +4 is to account for the RFC1001 len field */ 96938c8a9a5SSteve French struct smb2_neg_context *pctx = (struct smb2_neg_context *)req; 97038c8a9a5SSteve French int i = 0, len_of_ctxts; 97138c8a9a5SSteve French int offset = le32_to_cpu(req->NegotiateContextOffset); 97238c8a9a5SSteve French int neg_ctxt_cnt = le16_to_cpu(req->NegotiateContextCount); 97338c8a9a5SSteve French __le32 status = STATUS_INVALID_PARAMETER; 97438c8a9a5SSteve French 97538c8a9a5SSteve French ksmbd_debug(SMB, "decoding %d negotiate contexts\n", neg_ctxt_cnt); 97638c8a9a5SSteve French if (len_of_smb <= offset) { 97738c8a9a5SSteve French ksmbd_debug(SMB, "Invalid response: negotiate context offset\n"); 97838c8a9a5SSteve French return status; 97938c8a9a5SSteve French } 98038c8a9a5SSteve French 98138c8a9a5SSteve French len_of_ctxts = len_of_smb - offset; 98238c8a9a5SSteve French 98338c8a9a5SSteve French while (i++ < neg_ctxt_cnt) { 984*0512a5f8SKuan-Ting Chen int clen, ctxt_len; 98538c8a9a5SSteve French 98638c8a9a5SSteve French if (len_of_ctxts < sizeof(struct smb2_neg_context)) 98738c8a9a5SSteve French break; 98838c8a9a5SSteve French 98938c8a9a5SSteve French pctx = (struct smb2_neg_context *)((char *)pctx + offset); 99038c8a9a5SSteve French clen = le16_to_cpu(pctx->DataLength); 991*0512a5f8SKuan-Ting Chen ctxt_len = clen + sizeof(struct smb2_neg_context); 992*0512a5f8SKuan-Ting Chen 993*0512a5f8SKuan-Ting Chen if (ctxt_len > len_of_ctxts) 99438c8a9a5SSteve French break; 99538c8a9a5SSteve French 99638c8a9a5SSteve French if (pctx->ContextType == SMB2_PREAUTH_INTEGRITY_CAPABILITIES) { 99738c8a9a5SSteve French ksmbd_debug(SMB, 99838c8a9a5SSteve French "deassemble SMB2_PREAUTH_INTEGRITY_CAPABILITIES context\n"); 99938c8a9a5SSteve French if (conn->preauth_info->Preauth_HashId) 100038c8a9a5SSteve French break; 100138c8a9a5SSteve French 100238c8a9a5SSteve French status = decode_preauth_ctxt(conn, 100338c8a9a5SSteve French (struct smb2_preauth_neg_context *)pctx, 1004*0512a5f8SKuan-Ting Chen ctxt_len); 100538c8a9a5SSteve French if (status != STATUS_SUCCESS) 100638c8a9a5SSteve French break; 100738c8a9a5SSteve French } else if (pctx->ContextType == SMB2_ENCRYPTION_CAPABILITIES) { 100838c8a9a5SSteve French ksmbd_debug(SMB, 100938c8a9a5SSteve French "deassemble SMB2_ENCRYPTION_CAPABILITIES context\n"); 101038c8a9a5SSteve French if (conn->cipher_type) 101138c8a9a5SSteve French break; 101238c8a9a5SSteve French 101338c8a9a5SSteve French decode_encrypt_ctxt(conn, 101438c8a9a5SSteve French (struct smb2_encryption_neg_context *)pctx, 1015*0512a5f8SKuan-Ting Chen ctxt_len); 101638c8a9a5SSteve French } else if (pctx->ContextType == SMB2_COMPRESSION_CAPABILITIES) { 101738c8a9a5SSteve French ksmbd_debug(SMB, 101838c8a9a5SSteve French "deassemble SMB2_COMPRESSION_CAPABILITIES context\n"); 101938c8a9a5SSteve French if (conn->compress_algorithm) 102038c8a9a5SSteve French break; 102138c8a9a5SSteve French 102238c8a9a5SSteve French decode_compress_ctxt(conn, 102338c8a9a5SSteve French (struct smb2_compression_capabilities_context *)pctx); 102438c8a9a5SSteve French } else if (pctx->ContextType == SMB2_NETNAME_NEGOTIATE_CONTEXT_ID) { 102538c8a9a5SSteve French ksmbd_debug(SMB, 102638c8a9a5SSteve French "deassemble SMB2_NETNAME_NEGOTIATE_CONTEXT_ID context\n"); 102738c8a9a5SSteve French } else if (pctx->ContextType == SMB2_POSIX_EXTENSIONS_AVAILABLE) { 102838c8a9a5SSteve French ksmbd_debug(SMB, 102938c8a9a5SSteve French "deassemble SMB2_POSIX_EXTENSIONS_AVAILABLE context\n"); 103038c8a9a5SSteve French conn->posix_ext_supported = true; 103138c8a9a5SSteve French } else if (pctx->ContextType == SMB2_SIGNING_CAPABILITIES) { 103238c8a9a5SSteve French ksmbd_debug(SMB, 103338c8a9a5SSteve French "deassemble SMB2_SIGNING_CAPABILITIES context\n"); 1034*0512a5f8SKuan-Ting Chen 103538c8a9a5SSteve French decode_sign_cap_ctxt(conn, 103638c8a9a5SSteve French (struct smb2_signing_capabilities *)pctx, 1037*0512a5f8SKuan-Ting Chen ctxt_len); 103838c8a9a5SSteve French } 103938c8a9a5SSteve French 104038c8a9a5SSteve French /* offsets must be 8 byte aligned */ 104138c8a9a5SSteve French clen = (clen + 7) & ~0x7; 104238c8a9a5SSteve French offset = clen + sizeof(struct smb2_neg_context); 104338c8a9a5SSteve French len_of_ctxts -= clen + sizeof(struct smb2_neg_context); 104438c8a9a5SSteve French } 104538c8a9a5SSteve French return status; 104638c8a9a5SSteve French } 104738c8a9a5SSteve French 104838c8a9a5SSteve French /** 104938c8a9a5SSteve French * smb2_handle_negotiate() - handler for smb2 negotiate command 105038c8a9a5SSteve French * @work: smb work containing smb request buffer 105138c8a9a5SSteve French * 105238c8a9a5SSteve French * Return: 0 105338c8a9a5SSteve French */ 105438c8a9a5SSteve French int smb2_handle_negotiate(struct ksmbd_work *work) 105538c8a9a5SSteve French { 105638c8a9a5SSteve French struct ksmbd_conn *conn = work->conn; 105738c8a9a5SSteve French struct smb2_negotiate_req *req = smb2_get_msg(work->request_buf); 105838c8a9a5SSteve French struct smb2_negotiate_rsp *rsp = smb2_get_msg(work->response_buf); 105938c8a9a5SSteve French int rc = 0; 106038c8a9a5SSteve French unsigned int smb2_buf_len, smb2_neg_size; 106138c8a9a5SSteve French __le32 status; 106238c8a9a5SSteve French 106338c8a9a5SSteve French ksmbd_debug(SMB, "Received negotiate request\n"); 106438c8a9a5SSteve French conn->need_neg = false; 106538c8a9a5SSteve French if (ksmbd_conn_good(conn)) { 106638c8a9a5SSteve French pr_err("conn->tcp_status is already in CifsGood State\n"); 106738c8a9a5SSteve French work->send_no_response = 1; 106838c8a9a5SSteve French return rc; 106938c8a9a5SSteve French } 107038c8a9a5SSteve French 1071d738950fSKuan-Ting Chen smb2_buf_len = get_rfc1002_len(work->request_buf); 1072d738950fSKuan-Ting Chen smb2_neg_size = offsetof(struct smb2_negotiate_req, Dialects); 1073d738950fSKuan-Ting Chen if (smb2_neg_size > smb2_buf_len) { 107438c8a9a5SSteve French rsp->hdr.Status = STATUS_INVALID_PARAMETER; 107538c8a9a5SSteve French rc = -EINVAL; 107638c8a9a5SSteve French goto err_out; 107738c8a9a5SSteve French } 107838c8a9a5SSteve French 1079d738950fSKuan-Ting Chen if (req->DialectCount == 0) { 1080d738950fSKuan-Ting Chen pr_err("malformed packet\n"); 108138c8a9a5SSteve French rsp->hdr.Status = STATUS_INVALID_PARAMETER; 108238c8a9a5SSteve French rc = -EINVAL; 108338c8a9a5SSteve French goto err_out; 108438c8a9a5SSteve French } 108538c8a9a5SSteve French 108638c8a9a5SSteve French if (conn->dialect == SMB311_PROT_ID) { 108738c8a9a5SSteve French unsigned int nego_ctxt_off = le32_to_cpu(req->NegotiateContextOffset); 108838c8a9a5SSteve French 108938c8a9a5SSteve French if (smb2_buf_len < nego_ctxt_off) { 109038c8a9a5SSteve French rsp->hdr.Status = STATUS_INVALID_PARAMETER; 109138c8a9a5SSteve French rc = -EINVAL; 109238c8a9a5SSteve French goto err_out; 109338c8a9a5SSteve French } 109438c8a9a5SSteve French 109538c8a9a5SSteve French if (smb2_neg_size > nego_ctxt_off) { 109638c8a9a5SSteve French rsp->hdr.Status = STATUS_INVALID_PARAMETER; 109738c8a9a5SSteve French rc = -EINVAL; 109838c8a9a5SSteve French goto err_out; 109938c8a9a5SSteve French } 110038c8a9a5SSteve French 110138c8a9a5SSteve French if (smb2_neg_size + le16_to_cpu(req->DialectCount) * sizeof(__le16) > 110238c8a9a5SSteve French nego_ctxt_off) { 110338c8a9a5SSteve French rsp->hdr.Status = STATUS_INVALID_PARAMETER; 110438c8a9a5SSteve French rc = -EINVAL; 110538c8a9a5SSteve French goto err_out; 110638c8a9a5SSteve French } 110738c8a9a5SSteve French } else { 110838c8a9a5SSteve French if (smb2_neg_size + le16_to_cpu(req->DialectCount) * sizeof(__le16) > 110938c8a9a5SSteve French smb2_buf_len) { 111038c8a9a5SSteve French rsp->hdr.Status = STATUS_INVALID_PARAMETER; 111138c8a9a5SSteve French rc = -EINVAL; 111238c8a9a5SSteve French goto err_out; 111338c8a9a5SSteve French } 111438c8a9a5SSteve French } 111538c8a9a5SSteve French 111638c8a9a5SSteve French conn->cli_cap = le32_to_cpu(req->Capabilities); 111738c8a9a5SSteve French switch (conn->dialect) { 111838c8a9a5SSteve French case SMB311_PROT_ID: 111938c8a9a5SSteve French conn->preauth_info = 112038c8a9a5SSteve French kzalloc(sizeof(struct preauth_integrity_info), 112138c8a9a5SSteve French GFP_KERNEL); 112238c8a9a5SSteve French if (!conn->preauth_info) { 112338c8a9a5SSteve French rc = -ENOMEM; 112438c8a9a5SSteve French rsp->hdr.Status = STATUS_INVALID_PARAMETER; 112538c8a9a5SSteve French goto err_out; 112638c8a9a5SSteve French } 112738c8a9a5SSteve French 112838c8a9a5SSteve French status = deassemble_neg_contexts(conn, req, 112938c8a9a5SSteve French get_rfc1002_len(work->request_buf)); 113038c8a9a5SSteve French if (status != STATUS_SUCCESS) { 113138c8a9a5SSteve French pr_err("deassemble_neg_contexts error(0x%x)\n", 113238c8a9a5SSteve French status); 113338c8a9a5SSteve French rsp->hdr.Status = status; 113438c8a9a5SSteve French rc = -EINVAL; 113538c8a9a5SSteve French kfree(conn->preauth_info); 113638c8a9a5SSteve French conn->preauth_info = NULL; 113738c8a9a5SSteve French goto err_out; 113838c8a9a5SSteve French } 113938c8a9a5SSteve French 114038c8a9a5SSteve French rc = init_smb3_11_server(conn); 114138c8a9a5SSteve French if (rc < 0) { 114238c8a9a5SSteve French rsp->hdr.Status = STATUS_INVALID_PARAMETER; 114338c8a9a5SSteve French kfree(conn->preauth_info); 114438c8a9a5SSteve French conn->preauth_info = NULL; 114538c8a9a5SSteve French goto err_out; 114638c8a9a5SSteve French } 114738c8a9a5SSteve French 114838c8a9a5SSteve French ksmbd_gen_preauth_integrity_hash(conn, 114938c8a9a5SSteve French work->request_buf, 115038c8a9a5SSteve French conn->preauth_info->Preauth_HashValue); 115138c8a9a5SSteve French rsp->NegotiateContextOffset = 115238c8a9a5SSteve French cpu_to_le32(OFFSET_OF_NEG_CONTEXT); 115338c8a9a5SSteve French assemble_neg_contexts(conn, rsp, work->response_buf); 115438c8a9a5SSteve French break; 115538c8a9a5SSteve French case SMB302_PROT_ID: 115638c8a9a5SSteve French init_smb3_02_server(conn); 115738c8a9a5SSteve French break; 115838c8a9a5SSteve French case SMB30_PROT_ID: 115938c8a9a5SSteve French init_smb3_0_server(conn); 116038c8a9a5SSteve French break; 116138c8a9a5SSteve French case SMB21_PROT_ID: 116238c8a9a5SSteve French init_smb2_1_server(conn); 116338c8a9a5SSteve French break; 116438c8a9a5SSteve French case SMB2X_PROT_ID: 116538c8a9a5SSteve French case BAD_PROT_ID: 116638c8a9a5SSteve French default: 116738c8a9a5SSteve French ksmbd_debug(SMB, "Server dialect :0x%x not supported\n", 116838c8a9a5SSteve French conn->dialect); 116938c8a9a5SSteve French rsp->hdr.Status = STATUS_NOT_SUPPORTED; 117038c8a9a5SSteve French rc = -EINVAL; 117138c8a9a5SSteve French goto err_out; 117238c8a9a5SSteve French } 117338c8a9a5SSteve French rsp->Capabilities = cpu_to_le32(conn->vals->capabilities); 117438c8a9a5SSteve French 117538c8a9a5SSteve French /* For stats */ 117638c8a9a5SSteve French conn->connection_type = conn->dialect; 117738c8a9a5SSteve French 117838c8a9a5SSteve French rsp->MaxTransactSize = cpu_to_le32(conn->vals->max_trans_size); 117938c8a9a5SSteve French rsp->MaxReadSize = cpu_to_le32(conn->vals->max_read_size); 118038c8a9a5SSteve French rsp->MaxWriteSize = cpu_to_le32(conn->vals->max_write_size); 118138c8a9a5SSteve French 118238c8a9a5SSteve French memcpy(conn->ClientGUID, req->ClientGUID, 118338c8a9a5SSteve French SMB2_CLIENT_GUID_SIZE); 118438c8a9a5SSteve French conn->cli_sec_mode = le16_to_cpu(req->SecurityMode); 118538c8a9a5SSteve French 118638c8a9a5SSteve French rsp->StructureSize = cpu_to_le16(65); 118738c8a9a5SSteve French rsp->DialectRevision = cpu_to_le16(conn->dialect); 118838c8a9a5SSteve French /* Not setting conn guid rsp->ServerGUID, as it 118938c8a9a5SSteve French * not used by client for identifying server 119038c8a9a5SSteve French */ 119138c8a9a5SSteve French memset(rsp->ServerGUID, 0, SMB2_CLIENT_GUID_SIZE); 119238c8a9a5SSteve French 119338c8a9a5SSteve French rsp->SystemTime = cpu_to_le64(ksmbd_systime()); 119438c8a9a5SSteve French rsp->ServerStartTime = 0; 119538c8a9a5SSteve French ksmbd_debug(SMB, "negotiate context offset %d, count %d\n", 119638c8a9a5SSteve French le32_to_cpu(rsp->NegotiateContextOffset), 119738c8a9a5SSteve French le16_to_cpu(rsp->NegotiateContextCount)); 119838c8a9a5SSteve French 119938c8a9a5SSteve French rsp->SecurityBufferOffset = cpu_to_le16(128); 120038c8a9a5SSteve French rsp->SecurityBufferLength = cpu_to_le16(AUTH_GSS_LENGTH); 120138c8a9a5SSteve French ksmbd_copy_gss_neg_header((char *)(&rsp->hdr) + 120238c8a9a5SSteve French le16_to_cpu(rsp->SecurityBufferOffset)); 120338c8a9a5SSteve French inc_rfc1001_len(work->response_buf, sizeof(struct smb2_negotiate_rsp) - 120438c8a9a5SSteve French sizeof(struct smb2_hdr) + AUTH_GSS_LENGTH); 120538c8a9a5SSteve French rsp->SecurityMode = SMB2_NEGOTIATE_SIGNING_ENABLED_LE; 120638c8a9a5SSteve French conn->use_spnego = true; 120738c8a9a5SSteve French 120838c8a9a5SSteve French if ((server_conf.signing == KSMBD_CONFIG_OPT_AUTO || 120938c8a9a5SSteve French server_conf.signing == KSMBD_CONFIG_OPT_DISABLED) && 121038c8a9a5SSteve French req->SecurityMode & SMB2_NEGOTIATE_SIGNING_REQUIRED_LE) 121138c8a9a5SSteve French conn->sign = true; 121238c8a9a5SSteve French else if (server_conf.signing == KSMBD_CONFIG_OPT_MANDATORY) { 121338c8a9a5SSteve French server_conf.enforced_signing = true; 121438c8a9a5SSteve French rsp->SecurityMode |= SMB2_NEGOTIATE_SIGNING_REQUIRED_LE; 121538c8a9a5SSteve French conn->sign = true; 121638c8a9a5SSteve French } 121738c8a9a5SSteve French 121838c8a9a5SSteve French conn->srv_sec_mode = le16_to_cpu(rsp->SecurityMode); 121938c8a9a5SSteve French ksmbd_conn_set_need_negotiate(conn); 122038c8a9a5SSteve French 122138c8a9a5SSteve French err_out: 122238c8a9a5SSteve French if (rc < 0) 122338c8a9a5SSteve French smb2_set_err_rsp(work); 122438c8a9a5SSteve French 122538c8a9a5SSteve French return rc; 122638c8a9a5SSteve French } 122738c8a9a5SSteve French 122838c8a9a5SSteve French static int alloc_preauth_hash(struct ksmbd_session *sess, 122938c8a9a5SSteve French struct ksmbd_conn *conn) 123038c8a9a5SSteve French { 123138c8a9a5SSteve French if (sess->Preauth_HashValue) 123238c8a9a5SSteve French return 0; 123338c8a9a5SSteve French 123438c8a9a5SSteve French sess->Preauth_HashValue = kmemdup(conn->preauth_info->Preauth_HashValue, 123538c8a9a5SSteve French PREAUTH_HASHVALUE_SIZE, GFP_KERNEL); 123638c8a9a5SSteve French if (!sess->Preauth_HashValue) 123738c8a9a5SSteve French return -ENOMEM; 123838c8a9a5SSteve French 123938c8a9a5SSteve French return 0; 124038c8a9a5SSteve French } 124138c8a9a5SSteve French 124238c8a9a5SSteve French static int generate_preauth_hash(struct ksmbd_work *work) 124338c8a9a5SSteve French { 124438c8a9a5SSteve French struct ksmbd_conn *conn = work->conn; 124538c8a9a5SSteve French struct ksmbd_session *sess = work->sess; 124638c8a9a5SSteve French u8 *preauth_hash; 124738c8a9a5SSteve French 124838c8a9a5SSteve French if (conn->dialect != SMB311_PROT_ID) 124938c8a9a5SSteve French return 0; 125038c8a9a5SSteve French 125138c8a9a5SSteve French if (conn->binding) { 125238c8a9a5SSteve French struct preauth_session *preauth_sess; 125338c8a9a5SSteve French 125438c8a9a5SSteve French preauth_sess = ksmbd_preauth_session_lookup(conn, sess->id); 125538c8a9a5SSteve French if (!preauth_sess) { 125638c8a9a5SSteve French preauth_sess = ksmbd_preauth_session_alloc(conn, sess->id); 125738c8a9a5SSteve French if (!preauth_sess) 125838c8a9a5SSteve French return -ENOMEM; 125938c8a9a5SSteve French } 126038c8a9a5SSteve French 126138c8a9a5SSteve French preauth_hash = preauth_sess->Preauth_HashValue; 126238c8a9a5SSteve French } else { 126338c8a9a5SSteve French if (!sess->Preauth_HashValue) 126438c8a9a5SSteve French if (alloc_preauth_hash(sess, conn)) 126538c8a9a5SSteve French return -ENOMEM; 126638c8a9a5SSteve French preauth_hash = sess->Preauth_HashValue; 126738c8a9a5SSteve French } 126838c8a9a5SSteve French 126938c8a9a5SSteve French ksmbd_gen_preauth_integrity_hash(conn, work->request_buf, preauth_hash); 127038c8a9a5SSteve French return 0; 127138c8a9a5SSteve French } 127238c8a9a5SSteve French 127338c8a9a5SSteve French static int decode_negotiation_token(struct ksmbd_conn *conn, 127438c8a9a5SSteve French struct negotiate_message *negblob, 127538c8a9a5SSteve French size_t sz) 127638c8a9a5SSteve French { 127738c8a9a5SSteve French if (!conn->use_spnego) 127838c8a9a5SSteve French return -EINVAL; 127938c8a9a5SSteve French 128038c8a9a5SSteve French if (ksmbd_decode_negTokenInit((char *)negblob, sz, conn)) { 128138c8a9a5SSteve French if (ksmbd_decode_negTokenTarg((char *)negblob, sz, conn)) { 128238c8a9a5SSteve French conn->auth_mechs |= KSMBD_AUTH_NTLMSSP; 128338c8a9a5SSteve French conn->preferred_auth_mech = KSMBD_AUTH_NTLMSSP; 128438c8a9a5SSteve French conn->use_spnego = false; 128538c8a9a5SSteve French } 128638c8a9a5SSteve French } 128738c8a9a5SSteve French return 0; 128838c8a9a5SSteve French } 128938c8a9a5SSteve French 129038c8a9a5SSteve French static int ntlm_negotiate(struct ksmbd_work *work, 129138c8a9a5SSteve French struct negotiate_message *negblob, 129238c8a9a5SSteve French size_t negblob_len) 129338c8a9a5SSteve French { 129438c8a9a5SSteve French struct smb2_sess_setup_rsp *rsp = smb2_get_msg(work->response_buf); 129538c8a9a5SSteve French struct challenge_message *chgblob; 129638c8a9a5SSteve French unsigned char *spnego_blob = NULL; 129738c8a9a5SSteve French u16 spnego_blob_len; 129838c8a9a5SSteve French char *neg_blob; 129938c8a9a5SSteve French int sz, rc; 130038c8a9a5SSteve French 130138c8a9a5SSteve French ksmbd_debug(SMB, "negotiate phase\n"); 130238c8a9a5SSteve French rc = ksmbd_decode_ntlmssp_neg_blob(negblob, negblob_len, work->conn); 130338c8a9a5SSteve French if (rc) 130438c8a9a5SSteve French return rc; 130538c8a9a5SSteve French 130638c8a9a5SSteve French sz = le16_to_cpu(rsp->SecurityBufferOffset); 130738c8a9a5SSteve French chgblob = 130838c8a9a5SSteve French (struct challenge_message *)((char *)&rsp->hdr.ProtocolId + sz); 130938c8a9a5SSteve French memset(chgblob, 0, sizeof(struct challenge_message)); 131038c8a9a5SSteve French 131138c8a9a5SSteve French if (!work->conn->use_spnego) { 131238c8a9a5SSteve French sz = ksmbd_build_ntlmssp_challenge_blob(chgblob, work->conn); 131338c8a9a5SSteve French if (sz < 0) 131438c8a9a5SSteve French return -ENOMEM; 131538c8a9a5SSteve French 131638c8a9a5SSteve French rsp->SecurityBufferLength = cpu_to_le16(sz); 131738c8a9a5SSteve French return 0; 131838c8a9a5SSteve French } 131938c8a9a5SSteve French 132038c8a9a5SSteve French sz = sizeof(struct challenge_message); 132138c8a9a5SSteve French sz += (strlen(ksmbd_netbios_name()) * 2 + 1 + 4) * 6; 132238c8a9a5SSteve French 132338c8a9a5SSteve French neg_blob = kzalloc(sz, GFP_KERNEL); 132438c8a9a5SSteve French if (!neg_blob) 132538c8a9a5SSteve French return -ENOMEM; 132638c8a9a5SSteve French 132738c8a9a5SSteve French chgblob = (struct challenge_message *)neg_blob; 132838c8a9a5SSteve French sz = ksmbd_build_ntlmssp_challenge_blob(chgblob, work->conn); 132938c8a9a5SSteve French if (sz < 0) { 133038c8a9a5SSteve French rc = -ENOMEM; 133138c8a9a5SSteve French goto out; 133238c8a9a5SSteve French } 133338c8a9a5SSteve French 133438c8a9a5SSteve French rc = build_spnego_ntlmssp_neg_blob(&spnego_blob, &spnego_blob_len, 133538c8a9a5SSteve French neg_blob, sz); 133638c8a9a5SSteve French if (rc) { 133738c8a9a5SSteve French rc = -ENOMEM; 133838c8a9a5SSteve French goto out; 133938c8a9a5SSteve French } 134038c8a9a5SSteve French 134138c8a9a5SSteve French sz = le16_to_cpu(rsp->SecurityBufferOffset); 134238c8a9a5SSteve French memcpy((char *)&rsp->hdr.ProtocolId + sz, spnego_blob, spnego_blob_len); 134338c8a9a5SSteve French rsp->SecurityBufferLength = cpu_to_le16(spnego_blob_len); 134438c8a9a5SSteve French 134538c8a9a5SSteve French out: 134638c8a9a5SSteve French kfree(spnego_blob); 134738c8a9a5SSteve French kfree(neg_blob); 134838c8a9a5SSteve French return rc; 134938c8a9a5SSteve French } 135038c8a9a5SSteve French 135138c8a9a5SSteve French static struct authenticate_message *user_authblob(struct ksmbd_conn *conn, 135238c8a9a5SSteve French struct smb2_sess_setup_req *req) 135338c8a9a5SSteve French { 135438c8a9a5SSteve French int sz; 135538c8a9a5SSteve French 135638c8a9a5SSteve French if (conn->use_spnego && conn->mechToken) 135738c8a9a5SSteve French return (struct authenticate_message *)conn->mechToken; 135838c8a9a5SSteve French 135938c8a9a5SSteve French sz = le16_to_cpu(req->SecurityBufferOffset); 136038c8a9a5SSteve French return (struct authenticate_message *)((char *)&req->hdr.ProtocolId 136138c8a9a5SSteve French + sz); 136238c8a9a5SSteve French } 136338c8a9a5SSteve French 136438c8a9a5SSteve French static struct ksmbd_user *session_user(struct ksmbd_conn *conn, 136538c8a9a5SSteve French struct smb2_sess_setup_req *req) 136638c8a9a5SSteve French { 136738c8a9a5SSteve French struct authenticate_message *authblob; 136838c8a9a5SSteve French struct ksmbd_user *user; 136938c8a9a5SSteve French char *name; 137038c8a9a5SSteve French unsigned int name_off, name_len, secbuf_len; 137138c8a9a5SSteve French 137238c8a9a5SSteve French secbuf_len = le16_to_cpu(req->SecurityBufferLength); 137338c8a9a5SSteve French if (secbuf_len < sizeof(struct authenticate_message)) { 137438c8a9a5SSteve French ksmbd_debug(SMB, "blob len %d too small\n", secbuf_len); 137538c8a9a5SSteve French return NULL; 137638c8a9a5SSteve French } 137738c8a9a5SSteve French authblob = user_authblob(conn, req); 137838c8a9a5SSteve French name_off = le32_to_cpu(authblob->UserName.BufferOffset); 137938c8a9a5SSteve French name_len = le16_to_cpu(authblob->UserName.Length); 138038c8a9a5SSteve French 138138c8a9a5SSteve French if (secbuf_len < (u64)name_off + name_len) 138238c8a9a5SSteve French return NULL; 138338c8a9a5SSteve French 138438c8a9a5SSteve French name = smb_strndup_from_utf16((const char *)authblob + name_off, 138538c8a9a5SSteve French name_len, 138638c8a9a5SSteve French true, 138738c8a9a5SSteve French conn->local_nls); 138838c8a9a5SSteve French if (IS_ERR(name)) { 138938c8a9a5SSteve French pr_err("cannot allocate memory\n"); 139038c8a9a5SSteve French return NULL; 139138c8a9a5SSteve French } 139238c8a9a5SSteve French 139338c8a9a5SSteve French ksmbd_debug(SMB, "session setup request for user %s\n", name); 139438c8a9a5SSteve French user = ksmbd_login_user(name); 139538c8a9a5SSteve French kfree(name); 139638c8a9a5SSteve French return user; 139738c8a9a5SSteve French } 139838c8a9a5SSteve French 139938c8a9a5SSteve French static int ntlm_authenticate(struct ksmbd_work *work) 140038c8a9a5SSteve French { 140138c8a9a5SSteve French struct smb2_sess_setup_req *req = smb2_get_msg(work->request_buf); 140238c8a9a5SSteve French struct smb2_sess_setup_rsp *rsp = smb2_get_msg(work->response_buf); 140338c8a9a5SSteve French struct ksmbd_conn *conn = work->conn; 140438c8a9a5SSteve French struct ksmbd_session *sess = work->sess; 140538c8a9a5SSteve French struct channel *chann = NULL; 140638c8a9a5SSteve French struct ksmbd_user *user; 140738c8a9a5SSteve French u64 prev_id; 140838c8a9a5SSteve French int sz, rc; 140938c8a9a5SSteve French 141038c8a9a5SSteve French ksmbd_debug(SMB, "authenticate phase\n"); 141138c8a9a5SSteve French if (conn->use_spnego) { 141238c8a9a5SSteve French unsigned char *spnego_blob; 141338c8a9a5SSteve French u16 spnego_blob_len; 141438c8a9a5SSteve French 141538c8a9a5SSteve French rc = build_spnego_ntlmssp_auth_blob(&spnego_blob, 141638c8a9a5SSteve French &spnego_blob_len, 141738c8a9a5SSteve French 0); 141838c8a9a5SSteve French if (rc) 141938c8a9a5SSteve French return -ENOMEM; 142038c8a9a5SSteve French 142138c8a9a5SSteve French sz = le16_to_cpu(rsp->SecurityBufferOffset); 142238c8a9a5SSteve French memcpy((char *)&rsp->hdr.ProtocolId + sz, spnego_blob, spnego_blob_len); 142338c8a9a5SSteve French rsp->SecurityBufferLength = cpu_to_le16(spnego_blob_len); 142438c8a9a5SSteve French kfree(spnego_blob); 142538c8a9a5SSteve French inc_rfc1001_len(work->response_buf, spnego_blob_len - 1); 142638c8a9a5SSteve French } 142738c8a9a5SSteve French 142838c8a9a5SSteve French user = session_user(conn, req); 142938c8a9a5SSteve French if (!user) { 143038c8a9a5SSteve French ksmbd_debug(SMB, "Unknown user name or an error\n"); 143138c8a9a5SSteve French return -EPERM; 143238c8a9a5SSteve French } 143338c8a9a5SSteve French 143438c8a9a5SSteve French /* Check for previous session */ 143538c8a9a5SSteve French prev_id = le64_to_cpu(req->PreviousSessionId); 143638c8a9a5SSteve French if (prev_id && prev_id != sess->id) 143738c8a9a5SSteve French destroy_previous_session(conn, user, prev_id); 143838c8a9a5SSteve French 143938c8a9a5SSteve French if (sess->state == SMB2_SESSION_VALID) { 144038c8a9a5SSteve French /* 144138c8a9a5SSteve French * Reuse session if anonymous try to connect 144238c8a9a5SSteve French * on reauthetication. 144338c8a9a5SSteve French */ 144438c8a9a5SSteve French if (conn->binding == false && ksmbd_anonymous_user(user)) { 144538c8a9a5SSteve French ksmbd_free_user(user); 144638c8a9a5SSteve French return 0; 144738c8a9a5SSteve French } 144838c8a9a5SSteve French 144938c8a9a5SSteve French if (!ksmbd_compare_user(sess->user, user)) { 145038c8a9a5SSteve French ksmbd_free_user(user); 145138c8a9a5SSteve French return -EPERM; 145238c8a9a5SSteve French } 145338c8a9a5SSteve French ksmbd_free_user(user); 145438c8a9a5SSteve French } else { 145538c8a9a5SSteve French sess->user = user; 145638c8a9a5SSteve French } 145738c8a9a5SSteve French 145838c8a9a5SSteve French if (conn->binding == false && user_guest(sess->user)) { 145938c8a9a5SSteve French rsp->SessionFlags = SMB2_SESSION_FLAG_IS_GUEST_LE; 146038c8a9a5SSteve French } else { 146138c8a9a5SSteve French struct authenticate_message *authblob; 146238c8a9a5SSteve French 146338c8a9a5SSteve French authblob = user_authblob(conn, req); 146438c8a9a5SSteve French sz = le16_to_cpu(req->SecurityBufferLength); 146538c8a9a5SSteve French rc = ksmbd_decode_ntlmssp_auth_blob(authblob, sz, conn, sess); 146638c8a9a5SSteve French if (rc) { 146738c8a9a5SSteve French set_user_flag(sess->user, KSMBD_USER_FLAG_BAD_PASSWORD); 146838c8a9a5SSteve French ksmbd_debug(SMB, "authentication failed\n"); 146938c8a9a5SSteve French return -EPERM; 147038c8a9a5SSteve French } 147138c8a9a5SSteve French } 147238c8a9a5SSteve French 147338c8a9a5SSteve French /* 147438c8a9a5SSteve French * If session state is SMB2_SESSION_VALID, We can assume 147538c8a9a5SSteve French * that it is reauthentication. And the user/password 147638c8a9a5SSteve French * has been verified, so return it here. 147738c8a9a5SSteve French */ 147838c8a9a5SSteve French if (sess->state == SMB2_SESSION_VALID) { 147938c8a9a5SSteve French if (conn->binding) 148038c8a9a5SSteve French goto binding_session; 148138c8a9a5SSteve French return 0; 148238c8a9a5SSteve French } 148338c8a9a5SSteve French 148438c8a9a5SSteve French if ((rsp->SessionFlags != SMB2_SESSION_FLAG_IS_GUEST_LE && 148538c8a9a5SSteve French (conn->sign || server_conf.enforced_signing)) || 148638c8a9a5SSteve French (req->SecurityMode & SMB2_NEGOTIATE_SIGNING_REQUIRED)) 148738c8a9a5SSteve French sess->sign = true; 148838c8a9a5SSteve French 148938c8a9a5SSteve French if (smb3_encryption_negotiated(conn) && 149038c8a9a5SSteve French !(req->Flags & SMB2_SESSION_REQ_FLAG_BINDING)) { 149138c8a9a5SSteve French rc = conn->ops->generate_encryptionkey(conn, sess); 149238c8a9a5SSteve French if (rc) { 149338c8a9a5SSteve French ksmbd_debug(SMB, 149438c8a9a5SSteve French "SMB3 encryption key generation failed\n"); 149538c8a9a5SSteve French return -EINVAL; 149638c8a9a5SSteve French } 149738c8a9a5SSteve French sess->enc = true; 149838c8a9a5SSteve French if (server_conf.flags & KSMBD_GLOBAL_FLAG_SMB2_ENCRYPTION) 149938c8a9a5SSteve French rsp->SessionFlags = SMB2_SESSION_FLAG_ENCRYPT_DATA_LE; 150038c8a9a5SSteve French /* 150138c8a9a5SSteve French * signing is disable if encryption is enable 150238c8a9a5SSteve French * on this session 150338c8a9a5SSteve French */ 150438c8a9a5SSteve French sess->sign = false; 150538c8a9a5SSteve French } 150638c8a9a5SSteve French 150738c8a9a5SSteve French binding_session: 150838c8a9a5SSteve French if (conn->dialect >= SMB30_PROT_ID) { 150938c8a9a5SSteve French chann = lookup_chann_list(sess, conn); 151038c8a9a5SSteve French if (!chann) { 151138c8a9a5SSteve French chann = kmalloc(sizeof(struct channel), GFP_KERNEL); 151238c8a9a5SSteve French if (!chann) 151338c8a9a5SSteve French return -ENOMEM; 151438c8a9a5SSteve French 151538c8a9a5SSteve French chann->conn = conn; 151638c8a9a5SSteve French xa_store(&sess->ksmbd_chann_list, (long)conn, chann, GFP_KERNEL); 151738c8a9a5SSteve French } 151838c8a9a5SSteve French } 151938c8a9a5SSteve French 152038c8a9a5SSteve French if (conn->ops->generate_signingkey) { 152138c8a9a5SSteve French rc = conn->ops->generate_signingkey(sess, conn); 152238c8a9a5SSteve French if (rc) { 152338c8a9a5SSteve French ksmbd_debug(SMB, "SMB3 signing key generation failed\n"); 152438c8a9a5SSteve French return -EINVAL; 152538c8a9a5SSteve French } 152638c8a9a5SSteve French } 152738c8a9a5SSteve French 152838c8a9a5SSteve French if (!ksmbd_conn_lookup_dialect(conn)) { 152938c8a9a5SSteve French pr_err("fail to verify the dialect\n"); 153038c8a9a5SSteve French return -ENOENT; 153138c8a9a5SSteve French } 153238c8a9a5SSteve French return 0; 153338c8a9a5SSteve French } 153438c8a9a5SSteve French 153538c8a9a5SSteve French #ifdef CONFIG_SMB_SERVER_KERBEROS5 153638c8a9a5SSteve French static int krb5_authenticate(struct ksmbd_work *work) 153738c8a9a5SSteve French { 153838c8a9a5SSteve French struct smb2_sess_setup_req *req = smb2_get_msg(work->request_buf); 153938c8a9a5SSteve French struct smb2_sess_setup_rsp *rsp = smb2_get_msg(work->response_buf); 154038c8a9a5SSteve French struct ksmbd_conn *conn = work->conn; 154138c8a9a5SSteve French struct ksmbd_session *sess = work->sess; 154238c8a9a5SSteve French char *in_blob, *out_blob; 154338c8a9a5SSteve French struct channel *chann = NULL; 154438c8a9a5SSteve French u64 prev_sess_id; 154538c8a9a5SSteve French int in_len, out_len; 154638c8a9a5SSteve French int retval; 154738c8a9a5SSteve French 154838c8a9a5SSteve French in_blob = (char *)&req->hdr.ProtocolId + 154938c8a9a5SSteve French le16_to_cpu(req->SecurityBufferOffset); 155038c8a9a5SSteve French in_len = le16_to_cpu(req->SecurityBufferLength); 155138c8a9a5SSteve French out_blob = (char *)&rsp->hdr.ProtocolId + 155238c8a9a5SSteve French le16_to_cpu(rsp->SecurityBufferOffset); 155338c8a9a5SSteve French out_len = work->response_sz - 155438c8a9a5SSteve French (le16_to_cpu(rsp->SecurityBufferOffset) + 4); 155538c8a9a5SSteve French 155638c8a9a5SSteve French /* Check previous session */ 155738c8a9a5SSteve French prev_sess_id = le64_to_cpu(req->PreviousSessionId); 155838c8a9a5SSteve French if (prev_sess_id && prev_sess_id != sess->id) 155938c8a9a5SSteve French destroy_previous_session(conn, sess->user, prev_sess_id); 156038c8a9a5SSteve French 156138c8a9a5SSteve French if (sess->state == SMB2_SESSION_VALID) 156238c8a9a5SSteve French ksmbd_free_user(sess->user); 156338c8a9a5SSteve French 156438c8a9a5SSteve French retval = ksmbd_krb5_authenticate(sess, in_blob, in_len, 156538c8a9a5SSteve French out_blob, &out_len); 156638c8a9a5SSteve French if (retval) { 156738c8a9a5SSteve French ksmbd_debug(SMB, "krb5 authentication failed\n"); 156838c8a9a5SSteve French return -EINVAL; 156938c8a9a5SSteve French } 157038c8a9a5SSteve French rsp->SecurityBufferLength = cpu_to_le16(out_len); 157138c8a9a5SSteve French inc_rfc1001_len(work->response_buf, out_len - 1); 157238c8a9a5SSteve French 157338c8a9a5SSteve French if ((conn->sign || server_conf.enforced_signing) || 157438c8a9a5SSteve French (req->SecurityMode & SMB2_NEGOTIATE_SIGNING_REQUIRED)) 157538c8a9a5SSteve French sess->sign = true; 157638c8a9a5SSteve French 157738c8a9a5SSteve French if (smb3_encryption_negotiated(conn)) { 157838c8a9a5SSteve French retval = conn->ops->generate_encryptionkey(conn, sess); 157938c8a9a5SSteve French if (retval) { 158038c8a9a5SSteve French ksmbd_debug(SMB, 158138c8a9a5SSteve French "SMB3 encryption key generation failed\n"); 158238c8a9a5SSteve French return -EINVAL; 158338c8a9a5SSteve French } 158438c8a9a5SSteve French sess->enc = true; 158538c8a9a5SSteve French if (server_conf.flags & KSMBD_GLOBAL_FLAG_SMB2_ENCRYPTION) 158638c8a9a5SSteve French rsp->SessionFlags = SMB2_SESSION_FLAG_ENCRYPT_DATA_LE; 158738c8a9a5SSteve French sess->sign = false; 158838c8a9a5SSteve French } 158938c8a9a5SSteve French 159038c8a9a5SSteve French if (conn->dialect >= SMB30_PROT_ID) { 159138c8a9a5SSteve French chann = lookup_chann_list(sess, conn); 159238c8a9a5SSteve French if (!chann) { 159338c8a9a5SSteve French chann = kmalloc(sizeof(struct channel), GFP_KERNEL); 159438c8a9a5SSteve French if (!chann) 159538c8a9a5SSteve French return -ENOMEM; 159638c8a9a5SSteve French 159738c8a9a5SSteve French chann->conn = conn; 159838c8a9a5SSteve French xa_store(&sess->ksmbd_chann_list, (long)conn, chann, GFP_KERNEL); 159938c8a9a5SSteve French } 160038c8a9a5SSteve French } 160138c8a9a5SSteve French 160238c8a9a5SSteve French if (conn->ops->generate_signingkey) { 160338c8a9a5SSteve French retval = conn->ops->generate_signingkey(sess, conn); 160438c8a9a5SSteve French if (retval) { 160538c8a9a5SSteve French ksmbd_debug(SMB, "SMB3 signing key generation failed\n"); 160638c8a9a5SSteve French return -EINVAL; 160738c8a9a5SSteve French } 160838c8a9a5SSteve French } 160938c8a9a5SSteve French 161038c8a9a5SSteve French if (!ksmbd_conn_lookup_dialect(conn)) { 161138c8a9a5SSteve French pr_err("fail to verify the dialect\n"); 161238c8a9a5SSteve French return -ENOENT; 161338c8a9a5SSteve French } 161438c8a9a5SSteve French return 0; 161538c8a9a5SSteve French } 161638c8a9a5SSteve French #else 161738c8a9a5SSteve French static int krb5_authenticate(struct ksmbd_work *work) 161838c8a9a5SSteve French { 161938c8a9a5SSteve French return -EOPNOTSUPP; 162038c8a9a5SSteve French } 162138c8a9a5SSteve French #endif 162238c8a9a5SSteve French 162338c8a9a5SSteve French int smb2_sess_setup(struct ksmbd_work *work) 162438c8a9a5SSteve French { 162538c8a9a5SSteve French struct ksmbd_conn *conn = work->conn; 162638c8a9a5SSteve French struct smb2_sess_setup_req *req = smb2_get_msg(work->request_buf); 162738c8a9a5SSteve French struct smb2_sess_setup_rsp *rsp = smb2_get_msg(work->response_buf); 162838c8a9a5SSteve French struct ksmbd_session *sess; 162938c8a9a5SSteve French struct negotiate_message *negblob; 163038c8a9a5SSteve French unsigned int negblob_len, negblob_off; 163138c8a9a5SSteve French int rc = 0; 163238c8a9a5SSteve French 163338c8a9a5SSteve French ksmbd_debug(SMB, "Received request for session setup\n"); 163438c8a9a5SSteve French 163538c8a9a5SSteve French rsp->StructureSize = cpu_to_le16(9); 163638c8a9a5SSteve French rsp->SessionFlags = 0; 163738c8a9a5SSteve French rsp->SecurityBufferOffset = cpu_to_le16(72); 163838c8a9a5SSteve French rsp->SecurityBufferLength = 0; 163938c8a9a5SSteve French inc_rfc1001_len(work->response_buf, 9); 164038c8a9a5SSteve French 164138c8a9a5SSteve French ksmbd_conn_lock(conn); 164238c8a9a5SSteve French if (!req->hdr.SessionId) { 164338c8a9a5SSteve French sess = ksmbd_smb2_session_create(); 164438c8a9a5SSteve French if (!sess) { 164538c8a9a5SSteve French rc = -ENOMEM; 164638c8a9a5SSteve French goto out_err; 164738c8a9a5SSteve French } 164838c8a9a5SSteve French rsp->hdr.SessionId = cpu_to_le64(sess->id); 164938c8a9a5SSteve French rc = ksmbd_session_register(conn, sess); 165038c8a9a5SSteve French if (rc) 165138c8a9a5SSteve French goto out_err; 165238c8a9a5SSteve French } else if (conn->dialect >= SMB30_PROT_ID && 165338c8a9a5SSteve French (server_conf.flags & KSMBD_GLOBAL_FLAG_SMB3_MULTICHANNEL) && 165438c8a9a5SSteve French req->Flags & SMB2_SESSION_REQ_FLAG_BINDING) { 165538c8a9a5SSteve French u64 sess_id = le64_to_cpu(req->hdr.SessionId); 165638c8a9a5SSteve French 165738c8a9a5SSteve French sess = ksmbd_session_lookup_slowpath(sess_id); 165838c8a9a5SSteve French if (!sess) { 165938c8a9a5SSteve French rc = -ENOENT; 166038c8a9a5SSteve French goto out_err; 166138c8a9a5SSteve French } 166238c8a9a5SSteve French 166338c8a9a5SSteve French if (conn->dialect != sess->dialect) { 166438c8a9a5SSteve French rc = -EINVAL; 166538c8a9a5SSteve French goto out_err; 166638c8a9a5SSteve French } 166738c8a9a5SSteve French 166838c8a9a5SSteve French if (!(req->hdr.Flags & SMB2_FLAGS_SIGNED)) { 166938c8a9a5SSteve French rc = -EINVAL; 167038c8a9a5SSteve French goto out_err; 167138c8a9a5SSteve French } 167238c8a9a5SSteve French 167338c8a9a5SSteve French if (strncmp(conn->ClientGUID, sess->ClientGUID, 167438c8a9a5SSteve French SMB2_CLIENT_GUID_SIZE)) { 167538c8a9a5SSteve French rc = -ENOENT; 167638c8a9a5SSteve French goto out_err; 167738c8a9a5SSteve French } 167838c8a9a5SSteve French 167938c8a9a5SSteve French if (sess->state == SMB2_SESSION_IN_PROGRESS) { 168038c8a9a5SSteve French rc = -EACCES; 168138c8a9a5SSteve French goto out_err; 168238c8a9a5SSteve French } 168338c8a9a5SSteve French 168438c8a9a5SSteve French if (sess->state == SMB2_SESSION_EXPIRED) { 168538c8a9a5SSteve French rc = -EFAULT; 168638c8a9a5SSteve French goto out_err; 168738c8a9a5SSteve French } 168838c8a9a5SSteve French 168938c8a9a5SSteve French if (ksmbd_conn_need_reconnect(conn)) { 169038c8a9a5SSteve French rc = -EFAULT; 169138c8a9a5SSteve French sess = NULL; 169238c8a9a5SSteve French goto out_err; 169338c8a9a5SSteve French } 169438c8a9a5SSteve French 169538c8a9a5SSteve French if (ksmbd_session_lookup(conn, sess_id)) { 169638c8a9a5SSteve French rc = -EACCES; 169738c8a9a5SSteve French goto out_err; 169838c8a9a5SSteve French } 169938c8a9a5SSteve French 170038c8a9a5SSteve French if (user_guest(sess->user)) { 170138c8a9a5SSteve French rc = -EOPNOTSUPP; 170238c8a9a5SSteve French goto out_err; 170338c8a9a5SSteve French } 170438c8a9a5SSteve French 170538c8a9a5SSteve French conn->binding = true; 170638c8a9a5SSteve French } else if ((conn->dialect < SMB30_PROT_ID || 170738c8a9a5SSteve French server_conf.flags & KSMBD_GLOBAL_FLAG_SMB3_MULTICHANNEL) && 170838c8a9a5SSteve French (req->Flags & SMB2_SESSION_REQ_FLAG_BINDING)) { 170938c8a9a5SSteve French sess = NULL; 171038c8a9a5SSteve French rc = -EACCES; 171138c8a9a5SSteve French goto out_err; 171238c8a9a5SSteve French } else { 171338c8a9a5SSteve French sess = ksmbd_session_lookup(conn, 171438c8a9a5SSteve French le64_to_cpu(req->hdr.SessionId)); 171538c8a9a5SSteve French if (!sess) { 171638c8a9a5SSteve French rc = -ENOENT; 171738c8a9a5SSteve French goto out_err; 171838c8a9a5SSteve French } 171938c8a9a5SSteve French 172038c8a9a5SSteve French if (sess->state == SMB2_SESSION_EXPIRED) { 172138c8a9a5SSteve French rc = -EFAULT; 172238c8a9a5SSteve French goto out_err; 172338c8a9a5SSteve French } 172438c8a9a5SSteve French 172538c8a9a5SSteve French if (ksmbd_conn_need_reconnect(conn)) { 172638c8a9a5SSteve French rc = -EFAULT; 172738c8a9a5SSteve French sess = NULL; 172838c8a9a5SSteve French goto out_err; 172938c8a9a5SSteve French } 173038c8a9a5SSteve French } 173138c8a9a5SSteve French work->sess = sess; 173238c8a9a5SSteve French 173338c8a9a5SSteve French negblob_off = le16_to_cpu(req->SecurityBufferOffset); 173438c8a9a5SSteve French negblob_len = le16_to_cpu(req->SecurityBufferLength); 173538c8a9a5SSteve French if (negblob_off < offsetof(struct smb2_sess_setup_req, Buffer) || 173638c8a9a5SSteve French negblob_len < offsetof(struct negotiate_message, NegotiateFlags)) { 173738c8a9a5SSteve French rc = -EINVAL; 173838c8a9a5SSteve French goto out_err; 173938c8a9a5SSteve French } 174038c8a9a5SSteve French 174138c8a9a5SSteve French negblob = (struct negotiate_message *)((char *)&req->hdr.ProtocolId + 174238c8a9a5SSteve French negblob_off); 174338c8a9a5SSteve French 174438c8a9a5SSteve French if (decode_negotiation_token(conn, negblob, negblob_len) == 0) { 174538c8a9a5SSteve French if (conn->mechToken) 174638c8a9a5SSteve French negblob = (struct negotiate_message *)conn->mechToken; 174738c8a9a5SSteve French } 174838c8a9a5SSteve French 174938c8a9a5SSteve French if (server_conf.auth_mechs & conn->auth_mechs) { 175038c8a9a5SSteve French rc = generate_preauth_hash(work); 175138c8a9a5SSteve French if (rc) 175238c8a9a5SSteve French goto out_err; 175338c8a9a5SSteve French 175438c8a9a5SSteve French if (conn->preferred_auth_mech & 175538c8a9a5SSteve French (KSMBD_AUTH_KRB5 | KSMBD_AUTH_MSKRB5)) { 175638c8a9a5SSteve French rc = krb5_authenticate(work); 175738c8a9a5SSteve French if (rc) { 175838c8a9a5SSteve French rc = -EINVAL; 175938c8a9a5SSteve French goto out_err; 176038c8a9a5SSteve French } 176138c8a9a5SSteve French 176238c8a9a5SSteve French if (!ksmbd_conn_need_reconnect(conn)) { 176338c8a9a5SSteve French ksmbd_conn_set_good(conn); 176438c8a9a5SSteve French sess->state = SMB2_SESSION_VALID; 176538c8a9a5SSteve French } 176638c8a9a5SSteve French kfree(sess->Preauth_HashValue); 176738c8a9a5SSteve French sess->Preauth_HashValue = NULL; 176838c8a9a5SSteve French } else if (conn->preferred_auth_mech == KSMBD_AUTH_NTLMSSP) { 176938c8a9a5SSteve French if (negblob->MessageType == NtLmNegotiate) { 177038c8a9a5SSteve French rc = ntlm_negotiate(work, negblob, negblob_len); 177138c8a9a5SSteve French if (rc) 177238c8a9a5SSteve French goto out_err; 177338c8a9a5SSteve French rsp->hdr.Status = 177438c8a9a5SSteve French STATUS_MORE_PROCESSING_REQUIRED; 177538c8a9a5SSteve French /* 177638c8a9a5SSteve French * Note: here total size -1 is done as an 177738c8a9a5SSteve French * adjustment for 0 size blob 177838c8a9a5SSteve French */ 177938c8a9a5SSteve French inc_rfc1001_len(work->response_buf, 178038c8a9a5SSteve French le16_to_cpu(rsp->SecurityBufferLength) - 1); 178138c8a9a5SSteve French 178238c8a9a5SSteve French } else if (negblob->MessageType == NtLmAuthenticate) { 178338c8a9a5SSteve French rc = ntlm_authenticate(work); 178438c8a9a5SSteve French if (rc) 178538c8a9a5SSteve French goto out_err; 178638c8a9a5SSteve French 178738c8a9a5SSteve French if (!ksmbd_conn_need_reconnect(conn)) { 178838c8a9a5SSteve French ksmbd_conn_set_good(conn); 178938c8a9a5SSteve French sess->state = SMB2_SESSION_VALID; 179038c8a9a5SSteve French } 179138c8a9a5SSteve French if (conn->binding) { 179238c8a9a5SSteve French struct preauth_session *preauth_sess; 179338c8a9a5SSteve French 179438c8a9a5SSteve French preauth_sess = 179538c8a9a5SSteve French ksmbd_preauth_session_lookup(conn, sess->id); 179638c8a9a5SSteve French if (preauth_sess) { 179738c8a9a5SSteve French list_del(&preauth_sess->preauth_entry); 179838c8a9a5SSteve French kfree(preauth_sess); 179938c8a9a5SSteve French } 180038c8a9a5SSteve French } 180138c8a9a5SSteve French kfree(sess->Preauth_HashValue); 180238c8a9a5SSteve French sess->Preauth_HashValue = NULL; 180338c8a9a5SSteve French } else { 180438c8a9a5SSteve French pr_info_ratelimited("Unknown NTLMSSP message type : 0x%x\n", 180538c8a9a5SSteve French le32_to_cpu(negblob->MessageType)); 180638c8a9a5SSteve French rc = -EINVAL; 180738c8a9a5SSteve French } 180838c8a9a5SSteve French } else { 180938c8a9a5SSteve French /* TODO: need one more negotiation */ 181038c8a9a5SSteve French pr_err("Not support the preferred authentication\n"); 181138c8a9a5SSteve French rc = -EINVAL; 181238c8a9a5SSteve French } 181338c8a9a5SSteve French } else { 181438c8a9a5SSteve French pr_err("Not support authentication\n"); 181538c8a9a5SSteve French rc = -EINVAL; 181638c8a9a5SSteve French } 181738c8a9a5SSteve French 181838c8a9a5SSteve French out_err: 181938c8a9a5SSteve French if (rc == -EINVAL) 182038c8a9a5SSteve French rsp->hdr.Status = STATUS_INVALID_PARAMETER; 182138c8a9a5SSteve French else if (rc == -ENOENT) 182238c8a9a5SSteve French rsp->hdr.Status = STATUS_USER_SESSION_DELETED; 182338c8a9a5SSteve French else if (rc == -EACCES) 182438c8a9a5SSteve French rsp->hdr.Status = STATUS_REQUEST_NOT_ACCEPTED; 182538c8a9a5SSteve French else if (rc == -EFAULT) 182638c8a9a5SSteve French rsp->hdr.Status = STATUS_NETWORK_SESSION_EXPIRED; 182738c8a9a5SSteve French else if (rc == -ENOMEM) 182838c8a9a5SSteve French rsp->hdr.Status = STATUS_INSUFFICIENT_RESOURCES; 182938c8a9a5SSteve French else if (rc == -EOPNOTSUPP) 183038c8a9a5SSteve French rsp->hdr.Status = STATUS_NOT_SUPPORTED; 183138c8a9a5SSteve French else if (rc) 183238c8a9a5SSteve French rsp->hdr.Status = STATUS_LOGON_FAILURE; 183338c8a9a5SSteve French 183438c8a9a5SSteve French if (conn->use_spnego && conn->mechToken) { 183538c8a9a5SSteve French kfree(conn->mechToken); 183638c8a9a5SSteve French conn->mechToken = NULL; 183738c8a9a5SSteve French } 183838c8a9a5SSteve French 183938c8a9a5SSteve French if (rc < 0) { 184038c8a9a5SSteve French /* 184138c8a9a5SSteve French * SecurityBufferOffset should be set to zero 184238c8a9a5SSteve French * in session setup error response. 184338c8a9a5SSteve French */ 184438c8a9a5SSteve French rsp->SecurityBufferOffset = 0; 184538c8a9a5SSteve French 184638c8a9a5SSteve French if (sess) { 184738c8a9a5SSteve French bool try_delay = false; 184838c8a9a5SSteve French 184938c8a9a5SSteve French /* 185038c8a9a5SSteve French * To avoid dictionary attacks (repeated session setups rapidly sent) to 185138c8a9a5SSteve French * connect to server, ksmbd make a delay of a 5 seconds on session setup 185238c8a9a5SSteve French * failure to make it harder to send enough random connection requests 185338c8a9a5SSteve French * to break into a server. 185438c8a9a5SSteve French */ 185538c8a9a5SSteve French if (sess->user && sess->user->flags & KSMBD_USER_FLAG_DELAY_SESSION) 185638c8a9a5SSteve French try_delay = true; 185738c8a9a5SSteve French 185838c8a9a5SSteve French sess->last_active = jiffies; 185938c8a9a5SSteve French sess->state = SMB2_SESSION_EXPIRED; 186038c8a9a5SSteve French if (try_delay) { 186138c8a9a5SSteve French ksmbd_conn_set_need_reconnect(conn); 186238c8a9a5SSteve French ssleep(5); 186338c8a9a5SSteve French ksmbd_conn_set_need_negotiate(conn); 186438c8a9a5SSteve French } 186538c8a9a5SSteve French } 186638c8a9a5SSteve French } 186738c8a9a5SSteve French 186838c8a9a5SSteve French ksmbd_conn_unlock(conn); 186938c8a9a5SSteve French return rc; 187038c8a9a5SSteve French } 187138c8a9a5SSteve French 187238c8a9a5SSteve French /** 187338c8a9a5SSteve French * smb2_tree_connect() - handler for smb2 tree connect command 187438c8a9a5SSteve French * @work: smb work containing smb request buffer 187538c8a9a5SSteve French * 187638c8a9a5SSteve French * Return: 0 on success, otherwise error 187738c8a9a5SSteve French */ 187838c8a9a5SSteve French int smb2_tree_connect(struct ksmbd_work *work) 187938c8a9a5SSteve French { 188038c8a9a5SSteve French struct ksmbd_conn *conn = work->conn; 188138c8a9a5SSteve French struct smb2_tree_connect_req *req = smb2_get_msg(work->request_buf); 188238c8a9a5SSteve French struct smb2_tree_connect_rsp *rsp = smb2_get_msg(work->response_buf); 188338c8a9a5SSteve French struct ksmbd_session *sess = work->sess; 188438c8a9a5SSteve French char *treename = NULL, *name = NULL; 188538c8a9a5SSteve French struct ksmbd_tree_conn_status status; 188638c8a9a5SSteve French struct ksmbd_share_config *share; 188738c8a9a5SSteve French int rc = -EINVAL; 188838c8a9a5SSteve French 188938c8a9a5SSteve French treename = smb_strndup_from_utf16(req->Buffer, 189038c8a9a5SSteve French le16_to_cpu(req->PathLength), true, 189138c8a9a5SSteve French conn->local_nls); 189238c8a9a5SSteve French if (IS_ERR(treename)) { 189338c8a9a5SSteve French pr_err("treename is NULL\n"); 189438c8a9a5SSteve French status.ret = KSMBD_TREE_CONN_STATUS_ERROR; 189538c8a9a5SSteve French goto out_err1; 189638c8a9a5SSteve French } 189738c8a9a5SSteve French 189838c8a9a5SSteve French name = ksmbd_extract_sharename(conn->um, treename); 189938c8a9a5SSteve French if (IS_ERR(name)) { 190038c8a9a5SSteve French status.ret = KSMBD_TREE_CONN_STATUS_ERROR; 190138c8a9a5SSteve French goto out_err1; 190238c8a9a5SSteve French } 190338c8a9a5SSteve French 190438c8a9a5SSteve French ksmbd_debug(SMB, "tree connect request for tree %s treename %s\n", 190538c8a9a5SSteve French name, treename); 190638c8a9a5SSteve French 190738c8a9a5SSteve French status = ksmbd_tree_conn_connect(conn, sess, name); 190838c8a9a5SSteve French if (status.ret == KSMBD_TREE_CONN_STATUS_OK) 190938c8a9a5SSteve French rsp->hdr.Id.SyncId.TreeId = cpu_to_le32(status.tree_conn->id); 191038c8a9a5SSteve French else 191138c8a9a5SSteve French goto out_err1; 191238c8a9a5SSteve French 191338c8a9a5SSteve French share = status.tree_conn->share_conf; 191438c8a9a5SSteve French if (test_share_config_flag(share, KSMBD_SHARE_FLAG_PIPE)) { 191538c8a9a5SSteve French ksmbd_debug(SMB, "IPC share path request\n"); 191638c8a9a5SSteve French rsp->ShareType = SMB2_SHARE_TYPE_PIPE; 191738c8a9a5SSteve French rsp->MaximalAccess = FILE_READ_DATA_LE | FILE_READ_EA_LE | 191838c8a9a5SSteve French FILE_EXECUTE_LE | FILE_READ_ATTRIBUTES_LE | 191938c8a9a5SSteve French FILE_DELETE_LE | FILE_READ_CONTROL_LE | 192038c8a9a5SSteve French FILE_WRITE_DAC_LE | FILE_WRITE_OWNER_LE | 192138c8a9a5SSteve French FILE_SYNCHRONIZE_LE; 192238c8a9a5SSteve French } else { 192338c8a9a5SSteve French rsp->ShareType = SMB2_SHARE_TYPE_DISK; 192438c8a9a5SSteve French rsp->MaximalAccess = FILE_READ_DATA_LE | FILE_READ_EA_LE | 192538c8a9a5SSteve French FILE_EXECUTE_LE | FILE_READ_ATTRIBUTES_LE; 192638c8a9a5SSteve French if (test_tree_conn_flag(status.tree_conn, 192738c8a9a5SSteve French KSMBD_TREE_CONN_FLAG_WRITABLE)) { 192838c8a9a5SSteve French rsp->MaximalAccess |= FILE_WRITE_DATA_LE | 192938c8a9a5SSteve French FILE_APPEND_DATA_LE | FILE_WRITE_EA_LE | 193038c8a9a5SSteve French FILE_DELETE_LE | FILE_WRITE_ATTRIBUTES_LE | 193138c8a9a5SSteve French FILE_DELETE_CHILD_LE | FILE_READ_CONTROL_LE | 193238c8a9a5SSteve French FILE_WRITE_DAC_LE | FILE_WRITE_OWNER_LE | 193338c8a9a5SSteve French FILE_SYNCHRONIZE_LE; 193438c8a9a5SSteve French } 193538c8a9a5SSteve French } 193638c8a9a5SSteve French 193738c8a9a5SSteve French status.tree_conn->maximal_access = le32_to_cpu(rsp->MaximalAccess); 193838c8a9a5SSteve French if (conn->posix_ext_supported) 193938c8a9a5SSteve French status.tree_conn->posix_extensions = true; 194038c8a9a5SSteve French 194138c8a9a5SSteve French rsp->StructureSize = cpu_to_le16(16); 194238c8a9a5SSteve French inc_rfc1001_len(work->response_buf, 16); 194338c8a9a5SSteve French out_err1: 194438c8a9a5SSteve French rsp->Capabilities = 0; 194538c8a9a5SSteve French rsp->Reserved = 0; 194638c8a9a5SSteve French /* default manual caching */ 194738c8a9a5SSteve French rsp->ShareFlags = SMB2_SHAREFLAG_MANUAL_CACHING; 194838c8a9a5SSteve French 194938c8a9a5SSteve French if (!IS_ERR(treename)) 195038c8a9a5SSteve French kfree(treename); 195138c8a9a5SSteve French if (!IS_ERR(name)) 195238c8a9a5SSteve French kfree(name); 195338c8a9a5SSteve French 195438c8a9a5SSteve French switch (status.ret) { 195538c8a9a5SSteve French case KSMBD_TREE_CONN_STATUS_OK: 195638c8a9a5SSteve French rsp->hdr.Status = STATUS_SUCCESS; 195738c8a9a5SSteve French rc = 0; 195838c8a9a5SSteve French break; 195938c8a9a5SSteve French case -ESTALE: 196038c8a9a5SSteve French case -ENOENT: 196138c8a9a5SSteve French case KSMBD_TREE_CONN_STATUS_NO_SHARE: 196238c8a9a5SSteve French rsp->hdr.Status = STATUS_BAD_NETWORK_NAME; 196338c8a9a5SSteve French break; 196438c8a9a5SSteve French case -ENOMEM: 196538c8a9a5SSteve French case KSMBD_TREE_CONN_STATUS_NOMEM: 196638c8a9a5SSteve French rsp->hdr.Status = STATUS_NO_MEMORY; 196738c8a9a5SSteve French break; 196838c8a9a5SSteve French case KSMBD_TREE_CONN_STATUS_ERROR: 196938c8a9a5SSteve French case KSMBD_TREE_CONN_STATUS_TOO_MANY_CONNS: 197038c8a9a5SSteve French case KSMBD_TREE_CONN_STATUS_TOO_MANY_SESSIONS: 197138c8a9a5SSteve French rsp->hdr.Status = STATUS_ACCESS_DENIED; 197238c8a9a5SSteve French break; 197338c8a9a5SSteve French case -EINVAL: 197438c8a9a5SSteve French rsp->hdr.Status = STATUS_INVALID_PARAMETER; 197538c8a9a5SSteve French break; 197638c8a9a5SSteve French default: 197738c8a9a5SSteve French rsp->hdr.Status = STATUS_ACCESS_DENIED; 197838c8a9a5SSteve French } 197938c8a9a5SSteve French 198038c8a9a5SSteve French if (status.ret != KSMBD_TREE_CONN_STATUS_OK) 198138c8a9a5SSteve French smb2_set_err_rsp(work); 198238c8a9a5SSteve French 198338c8a9a5SSteve French return rc; 198438c8a9a5SSteve French } 198538c8a9a5SSteve French 198638c8a9a5SSteve French /** 198738c8a9a5SSteve French * smb2_create_open_flags() - convert smb open flags to unix open flags 198838c8a9a5SSteve French * @file_present: is file already present 198938c8a9a5SSteve French * @access: file access flags 199038c8a9a5SSteve French * @disposition: file disposition flags 199138c8a9a5SSteve French * @may_flags: set with MAY_ flags 199238c8a9a5SSteve French * 199338c8a9a5SSteve French * Return: file open flags 199438c8a9a5SSteve French */ 199538c8a9a5SSteve French static int smb2_create_open_flags(bool file_present, __le32 access, 199638c8a9a5SSteve French __le32 disposition, 199738c8a9a5SSteve French int *may_flags) 199838c8a9a5SSteve French { 199938c8a9a5SSteve French int oflags = O_NONBLOCK | O_LARGEFILE; 200038c8a9a5SSteve French 200138c8a9a5SSteve French if (access & FILE_READ_DESIRED_ACCESS_LE && 200238c8a9a5SSteve French access & FILE_WRITE_DESIRE_ACCESS_LE) { 200338c8a9a5SSteve French oflags |= O_RDWR; 200438c8a9a5SSteve French *may_flags = MAY_OPEN | MAY_READ | MAY_WRITE; 200538c8a9a5SSteve French } else if (access & FILE_WRITE_DESIRE_ACCESS_LE) { 200638c8a9a5SSteve French oflags |= O_WRONLY; 200738c8a9a5SSteve French *may_flags = MAY_OPEN | MAY_WRITE; 200838c8a9a5SSteve French } else { 200938c8a9a5SSteve French oflags |= O_RDONLY; 201038c8a9a5SSteve French *may_flags = MAY_OPEN | MAY_READ; 201138c8a9a5SSteve French } 201238c8a9a5SSteve French 201338c8a9a5SSteve French if (access == FILE_READ_ATTRIBUTES_LE) 201438c8a9a5SSteve French oflags |= O_PATH; 201538c8a9a5SSteve French 201638c8a9a5SSteve French if (file_present) { 201738c8a9a5SSteve French switch (disposition & FILE_CREATE_MASK_LE) { 201838c8a9a5SSteve French case FILE_OPEN_LE: 201938c8a9a5SSteve French case FILE_CREATE_LE: 202038c8a9a5SSteve French break; 202138c8a9a5SSteve French case FILE_SUPERSEDE_LE: 202238c8a9a5SSteve French case FILE_OVERWRITE_LE: 202338c8a9a5SSteve French case FILE_OVERWRITE_IF_LE: 202438c8a9a5SSteve French oflags |= O_TRUNC; 202538c8a9a5SSteve French break; 202638c8a9a5SSteve French default: 202738c8a9a5SSteve French break; 202838c8a9a5SSteve French } 202938c8a9a5SSteve French } else { 203038c8a9a5SSteve French switch (disposition & FILE_CREATE_MASK_LE) { 203138c8a9a5SSteve French case FILE_SUPERSEDE_LE: 203238c8a9a5SSteve French case FILE_CREATE_LE: 203338c8a9a5SSteve French case FILE_OPEN_IF_LE: 203438c8a9a5SSteve French case FILE_OVERWRITE_IF_LE: 203538c8a9a5SSteve French oflags |= O_CREAT; 203638c8a9a5SSteve French break; 203738c8a9a5SSteve French case FILE_OPEN_LE: 203838c8a9a5SSteve French case FILE_OVERWRITE_LE: 203938c8a9a5SSteve French oflags &= ~O_CREAT; 204038c8a9a5SSteve French break; 204138c8a9a5SSteve French default: 204238c8a9a5SSteve French break; 204338c8a9a5SSteve French } 204438c8a9a5SSteve French } 204538c8a9a5SSteve French 204638c8a9a5SSteve French return oflags; 204738c8a9a5SSteve French } 204838c8a9a5SSteve French 204938c8a9a5SSteve French /** 205038c8a9a5SSteve French * smb2_tree_disconnect() - handler for smb tree connect request 205138c8a9a5SSteve French * @work: smb work containing request buffer 205238c8a9a5SSteve French * 205338c8a9a5SSteve French * Return: 0 205438c8a9a5SSteve French */ 205538c8a9a5SSteve French int smb2_tree_disconnect(struct ksmbd_work *work) 205638c8a9a5SSteve French { 205738c8a9a5SSteve French struct smb2_tree_disconnect_rsp *rsp = smb2_get_msg(work->response_buf); 205838c8a9a5SSteve French struct ksmbd_session *sess = work->sess; 205938c8a9a5SSteve French struct ksmbd_tree_connect *tcon = work->tcon; 206038c8a9a5SSteve French 206138c8a9a5SSteve French rsp->StructureSize = cpu_to_le16(4); 206238c8a9a5SSteve French inc_rfc1001_len(work->response_buf, 4); 206338c8a9a5SSteve French 206438c8a9a5SSteve French ksmbd_debug(SMB, "request\n"); 206538c8a9a5SSteve French 206638c8a9a5SSteve French if (!tcon || test_and_set_bit(TREE_CONN_EXPIRE, &tcon->status)) { 206738c8a9a5SSteve French struct smb2_tree_disconnect_req *req = 206838c8a9a5SSteve French smb2_get_msg(work->request_buf); 206938c8a9a5SSteve French 207038c8a9a5SSteve French ksmbd_debug(SMB, "Invalid tid %d\n", req->hdr.Id.SyncId.TreeId); 207138c8a9a5SSteve French 207238c8a9a5SSteve French rsp->hdr.Status = STATUS_NETWORK_NAME_DELETED; 207338c8a9a5SSteve French smb2_set_err_rsp(work); 207438c8a9a5SSteve French return 0; 207538c8a9a5SSteve French } 207638c8a9a5SSteve French 207738c8a9a5SSteve French ksmbd_close_tree_conn_fds(work); 207838c8a9a5SSteve French ksmbd_tree_conn_disconnect(sess, tcon); 207938c8a9a5SSteve French work->tcon = NULL; 208038c8a9a5SSteve French return 0; 208138c8a9a5SSteve French } 208238c8a9a5SSteve French 208338c8a9a5SSteve French /** 208438c8a9a5SSteve French * smb2_session_logoff() - handler for session log off request 208538c8a9a5SSteve French * @work: smb work containing request buffer 208638c8a9a5SSteve French * 208738c8a9a5SSteve French * Return: 0 208838c8a9a5SSteve French */ 208938c8a9a5SSteve French int smb2_session_logoff(struct ksmbd_work *work) 209038c8a9a5SSteve French { 209138c8a9a5SSteve French struct ksmbd_conn *conn = work->conn; 209238c8a9a5SSteve French struct smb2_logoff_rsp *rsp = smb2_get_msg(work->response_buf); 209338c8a9a5SSteve French struct ksmbd_session *sess; 209438c8a9a5SSteve French struct smb2_logoff_req *req = smb2_get_msg(work->request_buf); 209538c8a9a5SSteve French u64 sess_id = le64_to_cpu(req->hdr.SessionId); 209638c8a9a5SSteve French 209738c8a9a5SSteve French rsp->StructureSize = cpu_to_le16(4); 209838c8a9a5SSteve French inc_rfc1001_len(work->response_buf, 4); 209938c8a9a5SSteve French 210038c8a9a5SSteve French ksmbd_debug(SMB, "request\n"); 210138c8a9a5SSteve French 210238c8a9a5SSteve French ksmbd_all_conn_set_status(sess_id, KSMBD_SESS_NEED_RECONNECT); 210338c8a9a5SSteve French ksmbd_close_session_fds(work); 210438c8a9a5SSteve French ksmbd_conn_wait_idle(conn, sess_id); 210538c8a9a5SSteve French 210638c8a9a5SSteve French /* 210738c8a9a5SSteve French * Re-lookup session to validate if session is deleted 210838c8a9a5SSteve French * while waiting request complete 210938c8a9a5SSteve French */ 211038c8a9a5SSteve French sess = ksmbd_session_lookup_all(conn, sess_id); 211138c8a9a5SSteve French if (ksmbd_tree_conn_session_logoff(sess)) { 211238c8a9a5SSteve French ksmbd_debug(SMB, "Invalid tid %d\n", req->hdr.Id.SyncId.TreeId); 211338c8a9a5SSteve French rsp->hdr.Status = STATUS_NETWORK_NAME_DELETED; 211438c8a9a5SSteve French smb2_set_err_rsp(work); 211538c8a9a5SSteve French return 0; 211638c8a9a5SSteve French } 211738c8a9a5SSteve French 211838c8a9a5SSteve French ksmbd_destroy_file_table(&sess->file_table); 211938c8a9a5SSteve French sess->state = SMB2_SESSION_EXPIRED; 212038c8a9a5SSteve French 212138c8a9a5SSteve French ksmbd_free_user(sess->user); 212238c8a9a5SSteve French sess->user = NULL; 212338c8a9a5SSteve French ksmbd_all_conn_set_status(sess_id, KSMBD_SESS_NEED_NEGOTIATE); 212438c8a9a5SSteve French return 0; 212538c8a9a5SSteve French } 212638c8a9a5SSteve French 212738c8a9a5SSteve French /** 212838c8a9a5SSteve French * create_smb2_pipe() - create IPC pipe 212938c8a9a5SSteve French * @work: smb work containing request buffer 213038c8a9a5SSteve French * 213138c8a9a5SSteve French * Return: 0 on success, otherwise error 213238c8a9a5SSteve French */ 213338c8a9a5SSteve French static noinline int create_smb2_pipe(struct ksmbd_work *work) 213438c8a9a5SSteve French { 213538c8a9a5SSteve French struct smb2_create_rsp *rsp = smb2_get_msg(work->response_buf); 213638c8a9a5SSteve French struct smb2_create_req *req = smb2_get_msg(work->request_buf); 213738c8a9a5SSteve French int id; 213838c8a9a5SSteve French int err; 213938c8a9a5SSteve French char *name; 214038c8a9a5SSteve French 214138c8a9a5SSteve French name = smb_strndup_from_utf16(req->Buffer, le16_to_cpu(req->NameLength), 214238c8a9a5SSteve French 1, work->conn->local_nls); 214338c8a9a5SSteve French if (IS_ERR(name)) { 214438c8a9a5SSteve French rsp->hdr.Status = STATUS_NO_MEMORY; 214538c8a9a5SSteve French err = PTR_ERR(name); 214638c8a9a5SSteve French goto out; 214738c8a9a5SSteve French } 214838c8a9a5SSteve French 214938c8a9a5SSteve French id = ksmbd_session_rpc_open(work->sess, name); 215038c8a9a5SSteve French if (id < 0) { 215138c8a9a5SSteve French pr_err("Unable to open RPC pipe: %d\n", id); 215238c8a9a5SSteve French err = id; 215338c8a9a5SSteve French goto out; 215438c8a9a5SSteve French } 215538c8a9a5SSteve French 215638c8a9a5SSteve French rsp->hdr.Status = STATUS_SUCCESS; 215738c8a9a5SSteve French rsp->StructureSize = cpu_to_le16(89); 215838c8a9a5SSteve French rsp->OplockLevel = SMB2_OPLOCK_LEVEL_NONE; 215938c8a9a5SSteve French rsp->Flags = 0; 216038c8a9a5SSteve French rsp->CreateAction = cpu_to_le32(FILE_OPENED); 216138c8a9a5SSteve French 216238c8a9a5SSteve French rsp->CreationTime = cpu_to_le64(0); 216338c8a9a5SSteve French rsp->LastAccessTime = cpu_to_le64(0); 216438c8a9a5SSteve French rsp->ChangeTime = cpu_to_le64(0); 216538c8a9a5SSteve French rsp->AllocationSize = cpu_to_le64(0); 216638c8a9a5SSteve French rsp->EndofFile = cpu_to_le64(0); 216738c8a9a5SSteve French rsp->FileAttributes = FILE_ATTRIBUTE_NORMAL_LE; 216838c8a9a5SSteve French rsp->Reserved2 = 0; 216938c8a9a5SSteve French rsp->VolatileFileId = id; 217038c8a9a5SSteve French rsp->PersistentFileId = 0; 217138c8a9a5SSteve French rsp->CreateContextsOffset = 0; 217238c8a9a5SSteve French rsp->CreateContextsLength = 0; 217338c8a9a5SSteve French 217438c8a9a5SSteve French inc_rfc1001_len(work->response_buf, 88); /* StructureSize - 1*/ 217538c8a9a5SSteve French kfree(name); 217638c8a9a5SSteve French return 0; 217738c8a9a5SSteve French 217838c8a9a5SSteve French out: 217938c8a9a5SSteve French switch (err) { 218038c8a9a5SSteve French case -EINVAL: 218138c8a9a5SSteve French rsp->hdr.Status = STATUS_INVALID_PARAMETER; 218238c8a9a5SSteve French break; 218338c8a9a5SSteve French case -ENOSPC: 218438c8a9a5SSteve French case -ENOMEM: 218538c8a9a5SSteve French rsp->hdr.Status = STATUS_NO_MEMORY; 218638c8a9a5SSteve French break; 218738c8a9a5SSteve French } 218838c8a9a5SSteve French 218938c8a9a5SSteve French if (!IS_ERR(name)) 219038c8a9a5SSteve French kfree(name); 219138c8a9a5SSteve French 219238c8a9a5SSteve French smb2_set_err_rsp(work); 219338c8a9a5SSteve French return err; 219438c8a9a5SSteve French } 219538c8a9a5SSteve French 219638c8a9a5SSteve French /** 219738c8a9a5SSteve French * smb2_set_ea() - handler for setting extended attributes using set 219838c8a9a5SSteve French * info command 219938c8a9a5SSteve French * @eabuf: set info command buffer 220038c8a9a5SSteve French * @buf_len: set info command buffer length 220138c8a9a5SSteve French * @path: dentry path for get ea 220238c8a9a5SSteve French * 220338c8a9a5SSteve French * Return: 0 on success, otherwise error 220438c8a9a5SSteve French */ 220538c8a9a5SSteve French static int smb2_set_ea(struct smb2_ea_info *eabuf, unsigned int buf_len, 220638c8a9a5SSteve French const struct path *path) 220738c8a9a5SSteve French { 220838c8a9a5SSteve French struct mnt_idmap *idmap = mnt_idmap(path->mnt); 220938c8a9a5SSteve French char *attr_name = NULL, *value; 221038c8a9a5SSteve French int rc = 0; 221138c8a9a5SSteve French unsigned int next = 0; 221238c8a9a5SSteve French 221338c8a9a5SSteve French if (buf_len < sizeof(struct smb2_ea_info) + eabuf->EaNameLength + 221438c8a9a5SSteve French le16_to_cpu(eabuf->EaValueLength)) 221538c8a9a5SSteve French return -EINVAL; 221638c8a9a5SSteve French 221738c8a9a5SSteve French attr_name = kmalloc(XATTR_NAME_MAX + 1, GFP_KERNEL); 221838c8a9a5SSteve French if (!attr_name) 221938c8a9a5SSteve French return -ENOMEM; 222038c8a9a5SSteve French 222138c8a9a5SSteve French do { 222238c8a9a5SSteve French if (!eabuf->EaNameLength) 222338c8a9a5SSteve French goto next; 222438c8a9a5SSteve French 222538c8a9a5SSteve French ksmbd_debug(SMB, 222638c8a9a5SSteve French "name : <%s>, name_len : %u, value_len : %u, next : %u\n", 222738c8a9a5SSteve French eabuf->name, eabuf->EaNameLength, 222838c8a9a5SSteve French le16_to_cpu(eabuf->EaValueLength), 222938c8a9a5SSteve French le32_to_cpu(eabuf->NextEntryOffset)); 223038c8a9a5SSteve French 223138c8a9a5SSteve French if (eabuf->EaNameLength > 223238c8a9a5SSteve French (XATTR_NAME_MAX - XATTR_USER_PREFIX_LEN)) { 223338c8a9a5SSteve French rc = -EINVAL; 223438c8a9a5SSteve French break; 223538c8a9a5SSteve French } 223638c8a9a5SSteve French 223738c8a9a5SSteve French memcpy(attr_name, XATTR_USER_PREFIX, XATTR_USER_PREFIX_LEN); 223838c8a9a5SSteve French memcpy(&attr_name[XATTR_USER_PREFIX_LEN], eabuf->name, 223938c8a9a5SSteve French eabuf->EaNameLength); 224038c8a9a5SSteve French attr_name[XATTR_USER_PREFIX_LEN + eabuf->EaNameLength] = '\0'; 224138c8a9a5SSteve French value = (char *)&eabuf->name + eabuf->EaNameLength + 1; 224238c8a9a5SSteve French 224338c8a9a5SSteve French if (!eabuf->EaValueLength) { 224438c8a9a5SSteve French rc = ksmbd_vfs_casexattr_len(idmap, 224538c8a9a5SSteve French path->dentry, 224638c8a9a5SSteve French attr_name, 224738c8a9a5SSteve French XATTR_USER_PREFIX_LEN + 224838c8a9a5SSteve French eabuf->EaNameLength); 224938c8a9a5SSteve French 225038c8a9a5SSteve French /* delete the EA only when it exits */ 225138c8a9a5SSteve French if (rc > 0) { 225238c8a9a5SSteve French rc = ksmbd_vfs_remove_xattr(idmap, 225338c8a9a5SSteve French path->dentry, 225438c8a9a5SSteve French attr_name); 225538c8a9a5SSteve French 225638c8a9a5SSteve French if (rc < 0) { 225738c8a9a5SSteve French ksmbd_debug(SMB, 225838c8a9a5SSteve French "remove xattr failed(%d)\n", 225938c8a9a5SSteve French rc); 226038c8a9a5SSteve French break; 226138c8a9a5SSteve French } 226238c8a9a5SSteve French } 226338c8a9a5SSteve French 226438c8a9a5SSteve French /* if the EA doesn't exist, just do nothing. */ 226538c8a9a5SSteve French rc = 0; 226638c8a9a5SSteve French } else { 226738c8a9a5SSteve French rc = ksmbd_vfs_setxattr(idmap, 226838c8a9a5SSteve French path->dentry, attr_name, value, 226938c8a9a5SSteve French le16_to_cpu(eabuf->EaValueLength), 0); 227038c8a9a5SSteve French if (rc < 0) { 227138c8a9a5SSteve French ksmbd_debug(SMB, 227238c8a9a5SSteve French "ksmbd_vfs_setxattr is failed(%d)\n", 227338c8a9a5SSteve French rc); 227438c8a9a5SSteve French break; 227538c8a9a5SSteve French } 227638c8a9a5SSteve French } 227738c8a9a5SSteve French 227838c8a9a5SSteve French next: 227938c8a9a5SSteve French next = le32_to_cpu(eabuf->NextEntryOffset); 228038c8a9a5SSteve French if (next == 0 || buf_len < next) 228138c8a9a5SSteve French break; 228238c8a9a5SSteve French buf_len -= next; 228338c8a9a5SSteve French eabuf = (struct smb2_ea_info *)((char *)eabuf + next); 228438c8a9a5SSteve French if (next < (u32)eabuf->EaNameLength + le16_to_cpu(eabuf->EaValueLength)) 228538c8a9a5SSteve French break; 228638c8a9a5SSteve French 228738c8a9a5SSteve French } while (next != 0); 228838c8a9a5SSteve French 228938c8a9a5SSteve French kfree(attr_name); 229038c8a9a5SSteve French return rc; 229138c8a9a5SSteve French } 229238c8a9a5SSteve French 229338c8a9a5SSteve French static noinline int smb2_set_stream_name_xattr(const struct path *path, 229438c8a9a5SSteve French struct ksmbd_file *fp, 229538c8a9a5SSteve French char *stream_name, int s_type) 229638c8a9a5SSteve French { 229738c8a9a5SSteve French struct mnt_idmap *idmap = mnt_idmap(path->mnt); 229838c8a9a5SSteve French size_t xattr_stream_size; 229938c8a9a5SSteve French char *xattr_stream_name; 230038c8a9a5SSteve French int rc; 230138c8a9a5SSteve French 230238c8a9a5SSteve French rc = ksmbd_vfs_xattr_stream_name(stream_name, 230338c8a9a5SSteve French &xattr_stream_name, 230438c8a9a5SSteve French &xattr_stream_size, 230538c8a9a5SSteve French s_type); 230638c8a9a5SSteve French if (rc) 230738c8a9a5SSteve French return rc; 230838c8a9a5SSteve French 230938c8a9a5SSteve French fp->stream.name = xattr_stream_name; 231038c8a9a5SSteve French fp->stream.size = xattr_stream_size; 231138c8a9a5SSteve French 231238c8a9a5SSteve French /* Check if there is stream prefix in xattr space */ 231338c8a9a5SSteve French rc = ksmbd_vfs_casexattr_len(idmap, 231438c8a9a5SSteve French path->dentry, 231538c8a9a5SSteve French xattr_stream_name, 231638c8a9a5SSteve French xattr_stream_size); 231738c8a9a5SSteve French if (rc >= 0) 231838c8a9a5SSteve French return 0; 231938c8a9a5SSteve French 232038c8a9a5SSteve French if (fp->cdoption == FILE_OPEN_LE) { 232138c8a9a5SSteve French ksmbd_debug(SMB, "XATTR stream name lookup failed: %d\n", rc); 232238c8a9a5SSteve French return -EBADF; 232338c8a9a5SSteve French } 232438c8a9a5SSteve French 232538c8a9a5SSteve French rc = ksmbd_vfs_setxattr(idmap, path->dentry, 232638c8a9a5SSteve French xattr_stream_name, NULL, 0, 0); 232738c8a9a5SSteve French if (rc < 0) 232838c8a9a5SSteve French pr_err("Failed to store XATTR stream name :%d\n", rc); 232938c8a9a5SSteve French return 0; 233038c8a9a5SSteve French } 233138c8a9a5SSteve French 233238c8a9a5SSteve French static int smb2_remove_smb_xattrs(const struct path *path) 233338c8a9a5SSteve French { 233438c8a9a5SSteve French struct mnt_idmap *idmap = mnt_idmap(path->mnt); 233538c8a9a5SSteve French char *name, *xattr_list = NULL; 233638c8a9a5SSteve French ssize_t xattr_list_len; 233738c8a9a5SSteve French int err = 0; 233838c8a9a5SSteve French 233938c8a9a5SSteve French xattr_list_len = ksmbd_vfs_listxattr(path->dentry, &xattr_list); 234038c8a9a5SSteve French if (xattr_list_len < 0) { 234138c8a9a5SSteve French goto out; 234238c8a9a5SSteve French } else if (!xattr_list_len) { 234338c8a9a5SSteve French ksmbd_debug(SMB, "empty xattr in the file\n"); 234438c8a9a5SSteve French goto out; 234538c8a9a5SSteve French } 234638c8a9a5SSteve French 234738c8a9a5SSteve French for (name = xattr_list; name - xattr_list < xattr_list_len; 234838c8a9a5SSteve French name += strlen(name) + 1) { 234938c8a9a5SSteve French ksmbd_debug(SMB, "%s, len %zd\n", name, strlen(name)); 235038c8a9a5SSteve French 235138c8a9a5SSteve French if (!strncmp(name, XATTR_USER_PREFIX, XATTR_USER_PREFIX_LEN) && 235238c8a9a5SSteve French !strncmp(&name[XATTR_USER_PREFIX_LEN], STREAM_PREFIX, 235338c8a9a5SSteve French STREAM_PREFIX_LEN)) { 235438c8a9a5SSteve French err = ksmbd_vfs_remove_xattr(idmap, path->dentry, 235538c8a9a5SSteve French name); 235638c8a9a5SSteve French if (err) 235738c8a9a5SSteve French ksmbd_debug(SMB, "remove xattr failed : %s\n", 235838c8a9a5SSteve French name); 235938c8a9a5SSteve French } 236038c8a9a5SSteve French } 236138c8a9a5SSteve French out: 236238c8a9a5SSteve French kvfree(xattr_list); 236338c8a9a5SSteve French return err; 236438c8a9a5SSteve French } 236538c8a9a5SSteve French 236638c8a9a5SSteve French static int smb2_create_truncate(const struct path *path) 236738c8a9a5SSteve French { 236838c8a9a5SSteve French int rc = vfs_truncate(path, 0); 236938c8a9a5SSteve French 237038c8a9a5SSteve French if (rc) { 237138c8a9a5SSteve French pr_err("vfs_truncate failed, rc %d\n", rc); 237238c8a9a5SSteve French return rc; 237338c8a9a5SSteve French } 237438c8a9a5SSteve French 237538c8a9a5SSteve French rc = smb2_remove_smb_xattrs(path); 237638c8a9a5SSteve French if (rc == -EOPNOTSUPP) 237738c8a9a5SSteve French rc = 0; 237838c8a9a5SSteve French if (rc) 237938c8a9a5SSteve French ksmbd_debug(SMB, 238038c8a9a5SSteve French "ksmbd_truncate_stream_name_xattr failed, rc %d\n", 238138c8a9a5SSteve French rc); 238238c8a9a5SSteve French return rc; 238338c8a9a5SSteve French } 238438c8a9a5SSteve French 238538c8a9a5SSteve French static void smb2_new_xattrs(struct ksmbd_tree_connect *tcon, const struct path *path, 238638c8a9a5SSteve French struct ksmbd_file *fp) 238738c8a9a5SSteve French { 238838c8a9a5SSteve French struct xattr_dos_attrib da = {0}; 238938c8a9a5SSteve French int rc; 239038c8a9a5SSteve French 239138c8a9a5SSteve French if (!test_share_config_flag(tcon->share_conf, 239238c8a9a5SSteve French KSMBD_SHARE_FLAG_STORE_DOS_ATTRS)) 239338c8a9a5SSteve French return; 239438c8a9a5SSteve French 239538c8a9a5SSteve French da.version = 4; 239638c8a9a5SSteve French da.attr = le32_to_cpu(fp->f_ci->m_fattr); 239738c8a9a5SSteve French da.itime = da.create_time = fp->create_time; 239838c8a9a5SSteve French da.flags = XATTR_DOSINFO_ATTRIB | XATTR_DOSINFO_CREATE_TIME | 239938c8a9a5SSteve French XATTR_DOSINFO_ITIME; 240038c8a9a5SSteve French 240138c8a9a5SSteve French rc = ksmbd_vfs_set_dos_attrib_xattr(mnt_idmap(path->mnt), 240238c8a9a5SSteve French path->dentry, &da); 240338c8a9a5SSteve French if (rc) 240438c8a9a5SSteve French ksmbd_debug(SMB, "failed to store file attribute into xattr\n"); 240538c8a9a5SSteve French } 240638c8a9a5SSteve French 240738c8a9a5SSteve French static void smb2_update_xattrs(struct ksmbd_tree_connect *tcon, 240838c8a9a5SSteve French const struct path *path, struct ksmbd_file *fp) 240938c8a9a5SSteve French { 241038c8a9a5SSteve French struct xattr_dos_attrib da; 241138c8a9a5SSteve French int rc; 241238c8a9a5SSteve French 241338c8a9a5SSteve French fp->f_ci->m_fattr &= ~(FILE_ATTRIBUTE_HIDDEN_LE | FILE_ATTRIBUTE_SYSTEM_LE); 241438c8a9a5SSteve French 241538c8a9a5SSteve French /* get FileAttributes from XATTR_NAME_DOS_ATTRIBUTE */ 241638c8a9a5SSteve French if (!test_share_config_flag(tcon->share_conf, 241738c8a9a5SSteve French KSMBD_SHARE_FLAG_STORE_DOS_ATTRS)) 241838c8a9a5SSteve French return; 241938c8a9a5SSteve French 242038c8a9a5SSteve French rc = ksmbd_vfs_get_dos_attrib_xattr(mnt_idmap(path->mnt), 242138c8a9a5SSteve French path->dentry, &da); 242238c8a9a5SSteve French if (rc > 0) { 242338c8a9a5SSteve French fp->f_ci->m_fattr = cpu_to_le32(da.attr); 242438c8a9a5SSteve French fp->create_time = da.create_time; 242538c8a9a5SSteve French fp->itime = da.itime; 242638c8a9a5SSteve French } 242738c8a9a5SSteve French } 242838c8a9a5SSteve French 242938c8a9a5SSteve French static int smb2_creat(struct ksmbd_work *work, struct path *path, char *name, 243038c8a9a5SSteve French int open_flags, umode_t posix_mode, bool is_dir) 243138c8a9a5SSteve French { 243238c8a9a5SSteve French struct ksmbd_tree_connect *tcon = work->tcon; 243338c8a9a5SSteve French struct ksmbd_share_config *share = tcon->share_conf; 243438c8a9a5SSteve French umode_t mode; 243538c8a9a5SSteve French int rc; 243638c8a9a5SSteve French 243738c8a9a5SSteve French if (!(open_flags & O_CREAT)) 243838c8a9a5SSteve French return -EBADF; 243938c8a9a5SSteve French 244038c8a9a5SSteve French ksmbd_debug(SMB, "file does not exist, so creating\n"); 244138c8a9a5SSteve French if (is_dir == true) { 244238c8a9a5SSteve French ksmbd_debug(SMB, "creating directory\n"); 244338c8a9a5SSteve French 244438c8a9a5SSteve French mode = share_config_directory_mode(share, posix_mode); 244538c8a9a5SSteve French rc = ksmbd_vfs_mkdir(work, name, mode); 244638c8a9a5SSteve French if (rc) 244738c8a9a5SSteve French return rc; 244838c8a9a5SSteve French } else { 244938c8a9a5SSteve French ksmbd_debug(SMB, "creating regular file\n"); 245038c8a9a5SSteve French 245138c8a9a5SSteve French mode = share_config_create_mode(share, posix_mode); 245238c8a9a5SSteve French rc = ksmbd_vfs_create(work, name, mode); 245338c8a9a5SSteve French if (rc) 245438c8a9a5SSteve French return rc; 245538c8a9a5SSteve French } 245638c8a9a5SSteve French 245738c8a9a5SSteve French rc = ksmbd_vfs_kern_path_locked(work, name, 0, path, 0); 245838c8a9a5SSteve French if (rc) { 245938c8a9a5SSteve French pr_err("cannot get linux path (%s), err = %d\n", 246038c8a9a5SSteve French name, rc); 246138c8a9a5SSteve French return rc; 246238c8a9a5SSteve French } 246338c8a9a5SSteve French return 0; 246438c8a9a5SSteve French } 246538c8a9a5SSteve French 246638c8a9a5SSteve French static int smb2_create_sd_buffer(struct ksmbd_work *work, 246738c8a9a5SSteve French struct smb2_create_req *req, 246838c8a9a5SSteve French const struct path *path) 246938c8a9a5SSteve French { 247038c8a9a5SSteve French struct create_context *context; 247138c8a9a5SSteve French struct create_sd_buf_req *sd_buf; 247238c8a9a5SSteve French 247338c8a9a5SSteve French if (!req->CreateContextsOffset) 247438c8a9a5SSteve French return -ENOENT; 247538c8a9a5SSteve French 247638c8a9a5SSteve French /* Parse SD BUFFER create contexts */ 247738c8a9a5SSteve French context = smb2_find_context_vals(req, SMB2_CREATE_SD_BUFFER, 4); 247838c8a9a5SSteve French if (!context) 247938c8a9a5SSteve French return -ENOENT; 248038c8a9a5SSteve French else if (IS_ERR(context)) 248138c8a9a5SSteve French return PTR_ERR(context); 248238c8a9a5SSteve French 248338c8a9a5SSteve French ksmbd_debug(SMB, 248438c8a9a5SSteve French "Set ACLs using SMB2_CREATE_SD_BUFFER context\n"); 248538c8a9a5SSteve French sd_buf = (struct create_sd_buf_req *)context; 248638c8a9a5SSteve French if (le16_to_cpu(context->DataOffset) + 248738c8a9a5SSteve French le32_to_cpu(context->DataLength) < 248838c8a9a5SSteve French sizeof(struct create_sd_buf_req)) 248938c8a9a5SSteve French return -EINVAL; 249038c8a9a5SSteve French return set_info_sec(work->conn, work->tcon, path, &sd_buf->ntsd, 249138c8a9a5SSteve French le32_to_cpu(sd_buf->ccontext.DataLength), true); 249238c8a9a5SSteve French } 249338c8a9a5SSteve French 249438c8a9a5SSteve French static void ksmbd_acls_fattr(struct smb_fattr *fattr, 249538c8a9a5SSteve French struct mnt_idmap *idmap, 249638c8a9a5SSteve French struct inode *inode) 249738c8a9a5SSteve French { 249838c8a9a5SSteve French vfsuid_t vfsuid = i_uid_into_vfsuid(idmap, inode); 249938c8a9a5SSteve French vfsgid_t vfsgid = i_gid_into_vfsgid(idmap, inode); 250038c8a9a5SSteve French 250138c8a9a5SSteve French fattr->cf_uid = vfsuid_into_kuid(vfsuid); 250238c8a9a5SSteve French fattr->cf_gid = vfsgid_into_kgid(vfsgid); 250338c8a9a5SSteve French fattr->cf_mode = inode->i_mode; 250438c8a9a5SSteve French fattr->cf_acls = NULL; 250538c8a9a5SSteve French fattr->cf_dacls = NULL; 250638c8a9a5SSteve French 250738c8a9a5SSteve French if (IS_ENABLED(CONFIG_FS_POSIX_ACL)) { 250838c8a9a5SSteve French fattr->cf_acls = get_inode_acl(inode, ACL_TYPE_ACCESS); 250938c8a9a5SSteve French if (S_ISDIR(inode->i_mode)) 251038c8a9a5SSteve French fattr->cf_dacls = get_inode_acl(inode, ACL_TYPE_DEFAULT); 251138c8a9a5SSteve French } 251238c8a9a5SSteve French } 251338c8a9a5SSteve French 251438c8a9a5SSteve French /** 251538c8a9a5SSteve French * smb2_open() - handler for smb file open request 251638c8a9a5SSteve French * @work: smb work containing request buffer 251738c8a9a5SSteve French * 251838c8a9a5SSteve French * Return: 0 on success, otherwise error 251938c8a9a5SSteve French */ 252038c8a9a5SSteve French int smb2_open(struct ksmbd_work *work) 252138c8a9a5SSteve French { 252238c8a9a5SSteve French struct ksmbd_conn *conn = work->conn; 252338c8a9a5SSteve French struct ksmbd_session *sess = work->sess; 252438c8a9a5SSteve French struct ksmbd_tree_connect *tcon = work->tcon; 252538c8a9a5SSteve French struct smb2_create_req *req; 252638c8a9a5SSteve French struct smb2_create_rsp *rsp; 252738c8a9a5SSteve French struct path path; 252838c8a9a5SSteve French struct ksmbd_share_config *share = tcon->share_conf; 252938c8a9a5SSteve French struct ksmbd_file *fp = NULL; 253038c8a9a5SSteve French struct file *filp = NULL; 253138c8a9a5SSteve French struct mnt_idmap *idmap = NULL; 253238c8a9a5SSteve French struct kstat stat; 253338c8a9a5SSteve French struct create_context *context; 253438c8a9a5SSteve French struct lease_ctx_info *lc = NULL; 253538c8a9a5SSteve French struct create_ea_buf_req *ea_buf = NULL; 253638c8a9a5SSteve French struct oplock_info *opinfo; 253738c8a9a5SSteve French __le32 *next_ptr = NULL; 253838c8a9a5SSteve French int req_op_level = 0, open_flags = 0, may_flags = 0, file_info = 0; 253938c8a9a5SSteve French int rc = 0; 254038c8a9a5SSteve French int contxt_cnt = 0, query_disk_id = 0; 254138c8a9a5SSteve French int maximal_access_ctxt = 0, posix_ctxt = 0; 254238c8a9a5SSteve French int s_type = 0; 254338c8a9a5SSteve French int next_off = 0; 254438c8a9a5SSteve French char *name = NULL; 254538c8a9a5SSteve French char *stream_name = NULL; 254638c8a9a5SSteve French bool file_present = false, created = false, already_permitted = false; 254738c8a9a5SSteve French int share_ret, need_truncate = 0; 254838c8a9a5SSteve French u64 time; 254938c8a9a5SSteve French umode_t posix_mode = 0; 255038c8a9a5SSteve French __le32 daccess, maximal_access = 0; 255138c8a9a5SSteve French 255238c8a9a5SSteve French WORK_BUFFERS(work, req, rsp); 255338c8a9a5SSteve French 255438c8a9a5SSteve French if (req->hdr.NextCommand && !work->next_smb2_rcv_hdr_off && 255538c8a9a5SSteve French (req->hdr.Flags & SMB2_FLAGS_RELATED_OPERATIONS)) { 255638c8a9a5SSteve French ksmbd_debug(SMB, "invalid flag in chained command\n"); 255738c8a9a5SSteve French rsp->hdr.Status = STATUS_INVALID_PARAMETER; 255838c8a9a5SSteve French smb2_set_err_rsp(work); 255938c8a9a5SSteve French return -EINVAL; 256038c8a9a5SSteve French } 256138c8a9a5SSteve French 256238c8a9a5SSteve French if (test_share_config_flag(share, KSMBD_SHARE_FLAG_PIPE)) { 256338c8a9a5SSteve French ksmbd_debug(SMB, "IPC pipe create request\n"); 256438c8a9a5SSteve French return create_smb2_pipe(work); 256538c8a9a5SSteve French } 256638c8a9a5SSteve French 256738c8a9a5SSteve French if (req->NameLength) { 256838c8a9a5SSteve French if ((req->CreateOptions & FILE_DIRECTORY_FILE_LE) && 256938c8a9a5SSteve French *(char *)req->Buffer == '\\') { 257038c8a9a5SSteve French pr_err("not allow directory name included leading slash\n"); 257138c8a9a5SSteve French rc = -EINVAL; 257238c8a9a5SSteve French goto err_out1; 257338c8a9a5SSteve French } 257438c8a9a5SSteve French 257538c8a9a5SSteve French name = smb2_get_name(req->Buffer, 257638c8a9a5SSteve French le16_to_cpu(req->NameLength), 257738c8a9a5SSteve French work->conn->local_nls); 257838c8a9a5SSteve French if (IS_ERR(name)) { 257938c8a9a5SSteve French rc = PTR_ERR(name); 258038c8a9a5SSteve French if (rc != -ENOMEM) 258138c8a9a5SSteve French rc = -ENOENT; 258238c8a9a5SSteve French name = NULL; 258338c8a9a5SSteve French goto err_out1; 258438c8a9a5SSteve French } 258538c8a9a5SSteve French 258638c8a9a5SSteve French ksmbd_debug(SMB, "converted name = %s\n", name); 258738c8a9a5SSteve French if (strchr(name, ':')) { 258838c8a9a5SSteve French if (!test_share_config_flag(work->tcon->share_conf, 258938c8a9a5SSteve French KSMBD_SHARE_FLAG_STREAMS)) { 259038c8a9a5SSteve French rc = -EBADF; 259138c8a9a5SSteve French goto err_out1; 259238c8a9a5SSteve French } 259338c8a9a5SSteve French rc = parse_stream_name(name, &stream_name, &s_type); 259438c8a9a5SSteve French if (rc < 0) 259538c8a9a5SSteve French goto err_out1; 259638c8a9a5SSteve French } 259738c8a9a5SSteve French 259838c8a9a5SSteve French rc = ksmbd_validate_filename(name); 259938c8a9a5SSteve French if (rc < 0) 260038c8a9a5SSteve French goto err_out1; 260138c8a9a5SSteve French 260238c8a9a5SSteve French if (ksmbd_share_veto_filename(share, name)) { 260338c8a9a5SSteve French rc = -ENOENT; 260438c8a9a5SSteve French ksmbd_debug(SMB, "Reject open(), vetoed file: %s\n", 260538c8a9a5SSteve French name); 260638c8a9a5SSteve French goto err_out1; 260738c8a9a5SSteve French } 260838c8a9a5SSteve French } else { 260938c8a9a5SSteve French name = kstrdup("", GFP_KERNEL); 261038c8a9a5SSteve French if (!name) { 261138c8a9a5SSteve French rc = -ENOMEM; 261238c8a9a5SSteve French goto err_out1; 261338c8a9a5SSteve French } 261438c8a9a5SSteve French } 261538c8a9a5SSteve French 261638c8a9a5SSteve French req_op_level = req->RequestedOplockLevel; 261738c8a9a5SSteve French if (req_op_level == SMB2_OPLOCK_LEVEL_LEASE) 261838c8a9a5SSteve French lc = parse_lease_state(req); 261938c8a9a5SSteve French 262038c8a9a5SSteve French if (le32_to_cpu(req->ImpersonationLevel) > le32_to_cpu(IL_DELEGATE)) { 262138c8a9a5SSteve French pr_err("Invalid impersonationlevel : 0x%x\n", 262238c8a9a5SSteve French le32_to_cpu(req->ImpersonationLevel)); 262338c8a9a5SSteve French rc = -EIO; 262438c8a9a5SSteve French rsp->hdr.Status = STATUS_BAD_IMPERSONATION_LEVEL; 262538c8a9a5SSteve French goto err_out1; 262638c8a9a5SSteve French } 262738c8a9a5SSteve French 262838c8a9a5SSteve French if (req->CreateOptions && !(req->CreateOptions & CREATE_OPTIONS_MASK_LE)) { 262938c8a9a5SSteve French pr_err("Invalid create options : 0x%x\n", 263038c8a9a5SSteve French le32_to_cpu(req->CreateOptions)); 263138c8a9a5SSteve French rc = -EINVAL; 263238c8a9a5SSteve French goto err_out1; 263338c8a9a5SSteve French } else { 263438c8a9a5SSteve French if (req->CreateOptions & FILE_SEQUENTIAL_ONLY_LE && 263538c8a9a5SSteve French req->CreateOptions & FILE_RANDOM_ACCESS_LE) 263638c8a9a5SSteve French req->CreateOptions = ~(FILE_SEQUENTIAL_ONLY_LE); 263738c8a9a5SSteve French 263838c8a9a5SSteve French if (req->CreateOptions & 263938c8a9a5SSteve French (FILE_OPEN_BY_FILE_ID_LE | CREATE_TREE_CONNECTION | 264038c8a9a5SSteve French FILE_RESERVE_OPFILTER_LE)) { 264138c8a9a5SSteve French rc = -EOPNOTSUPP; 264238c8a9a5SSteve French goto err_out1; 264338c8a9a5SSteve French } 264438c8a9a5SSteve French 264538c8a9a5SSteve French if (req->CreateOptions & FILE_DIRECTORY_FILE_LE) { 264638c8a9a5SSteve French if (req->CreateOptions & FILE_NON_DIRECTORY_FILE_LE) { 264738c8a9a5SSteve French rc = -EINVAL; 264838c8a9a5SSteve French goto err_out1; 264938c8a9a5SSteve French } else if (req->CreateOptions & FILE_NO_COMPRESSION_LE) { 265038c8a9a5SSteve French req->CreateOptions = ~(FILE_NO_COMPRESSION_LE); 265138c8a9a5SSteve French } 265238c8a9a5SSteve French } 265338c8a9a5SSteve French } 265438c8a9a5SSteve French 265538c8a9a5SSteve French if (le32_to_cpu(req->CreateDisposition) > 265638c8a9a5SSteve French le32_to_cpu(FILE_OVERWRITE_IF_LE)) { 265738c8a9a5SSteve French pr_err("Invalid create disposition : 0x%x\n", 265838c8a9a5SSteve French le32_to_cpu(req->CreateDisposition)); 265938c8a9a5SSteve French rc = -EINVAL; 266038c8a9a5SSteve French goto err_out1; 266138c8a9a5SSteve French } 266238c8a9a5SSteve French 266338c8a9a5SSteve French if (!(req->DesiredAccess & DESIRED_ACCESS_MASK)) { 266438c8a9a5SSteve French pr_err("Invalid desired access : 0x%x\n", 266538c8a9a5SSteve French le32_to_cpu(req->DesiredAccess)); 266638c8a9a5SSteve French rc = -EACCES; 266738c8a9a5SSteve French goto err_out1; 266838c8a9a5SSteve French } 266938c8a9a5SSteve French 267038c8a9a5SSteve French if (req->FileAttributes && !(req->FileAttributes & FILE_ATTRIBUTE_MASK_LE)) { 267138c8a9a5SSteve French pr_err("Invalid file attribute : 0x%x\n", 267238c8a9a5SSteve French le32_to_cpu(req->FileAttributes)); 267338c8a9a5SSteve French rc = -EINVAL; 267438c8a9a5SSteve French goto err_out1; 267538c8a9a5SSteve French } 267638c8a9a5SSteve French 267738c8a9a5SSteve French if (req->CreateContextsOffset) { 267838c8a9a5SSteve French /* Parse non-durable handle create contexts */ 267938c8a9a5SSteve French context = smb2_find_context_vals(req, SMB2_CREATE_EA_BUFFER, 4); 268038c8a9a5SSteve French if (IS_ERR(context)) { 268138c8a9a5SSteve French rc = PTR_ERR(context); 268238c8a9a5SSteve French goto err_out1; 268338c8a9a5SSteve French } else if (context) { 268438c8a9a5SSteve French ea_buf = (struct create_ea_buf_req *)context; 268538c8a9a5SSteve French if (le16_to_cpu(context->DataOffset) + 268638c8a9a5SSteve French le32_to_cpu(context->DataLength) < 268738c8a9a5SSteve French sizeof(struct create_ea_buf_req)) { 268838c8a9a5SSteve French rc = -EINVAL; 268938c8a9a5SSteve French goto err_out1; 269038c8a9a5SSteve French } 269138c8a9a5SSteve French if (req->CreateOptions & FILE_NO_EA_KNOWLEDGE_LE) { 269238c8a9a5SSteve French rsp->hdr.Status = STATUS_ACCESS_DENIED; 269338c8a9a5SSteve French rc = -EACCES; 269438c8a9a5SSteve French goto err_out1; 269538c8a9a5SSteve French } 269638c8a9a5SSteve French } 269738c8a9a5SSteve French 269838c8a9a5SSteve French context = smb2_find_context_vals(req, 269938c8a9a5SSteve French SMB2_CREATE_QUERY_MAXIMAL_ACCESS_REQUEST, 4); 270038c8a9a5SSteve French if (IS_ERR(context)) { 270138c8a9a5SSteve French rc = PTR_ERR(context); 270238c8a9a5SSteve French goto err_out1; 270338c8a9a5SSteve French } else if (context) { 270438c8a9a5SSteve French ksmbd_debug(SMB, 270538c8a9a5SSteve French "get query maximal access context\n"); 270638c8a9a5SSteve French maximal_access_ctxt = 1; 270738c8a9a5SSteve French } 270838c8a9a5SSteve French 270938c8a9a5SSteve French context = smb2_find_context_vals(req, 271038c8a9a5SSteve French SMB2_CREATE_TIMEWARP_REQUEST, 4); 271138c8a9a5SSteve French if (IS_ERR(context)) { 271238c8a9a5SSteve French rc = PTR_ERR(context); 271338c8a9a5SSteve French goto err_out1; 271438c8a9a5SSteve French } else if (context) { 271538c8a9a5SSteve French ksmbd_debug(SMB, "get timewarp context\n"); 271638c8a9a5SSteve French rc = -EBADF; 271738c8a9a5SSteve French goto err_out1; 271838c8a9a5SSteve French } 271938c8a9a5SSteve French 272038c8a9a5SSteve French if (tcon->posix_extensions) { 272138c8a9a5SSteve French context = smb2_find_context_vals(req, 272238c8a9a5SSteve French SMB2_CREATE_TAG_POSIX, 16); 272338c8a9a5SSteve French if (IS_ERR(context)) { 272438c8a9a5SSteve French rc = PTR_ERR(context); 272538c8a9a5SSteve French goto err_out1; 272638c8a9a5SSteve French } else if (context) { 272738c8a9a5SSteve French struct create_posix *posix = 272838c8a9a5SSteve French (struct create_posix *)context; 272938c8a9a5SSteve French if (le16_to_cpu(context->DataOffset) + 273038c8a9a5SSteve French le32_to_cpu(context->DataLength) < 273138c8a9a5SSteve French sizeof(struct create_posix) - 4) { 273238c8a9a5SSteve French rc = -EINVAL; 273338c8a9a5SSteve French goto err_out1; 273438c8a9a5SSteve French } 273538c8a9a5SSteve French ksmbd_debug(SMB, "get posix context\n"); 273638c8a9a5SSteve French 273738c8a9a5SSteve French posix_mode = le32_to_cpu(posix->Mode); 273838c8a9a5SSteve French posix_ctxt = 1; 273938c8a9a5SSteve French } 274038c8a9a5SSteve French } 274138c8a9a5SSteve French } 274238c8a9a5SSteve French 274338c8a9a5SSteve French if (ksmbd_override_fsids(work)) { 274438c8a9a5SSteve French rc = -ENOMEM; 274538c8a9a5SSteve French goto err_out1; 274638c8a9a5SSteve French } 274738c8a9a5SSteve French 274838c8a9a5SSteve French rc = ksmbd_vfs_kern_path_locked(work, name, LOOKUP_NO_SYMLINKS, &path, 1); 274938c8a9a5SSteve French if (!rc) { 275038c8a9a5SSteve French file_present = true; 275138c8a9a5SSteve French 275238c8a9a5SSteve French if (req->CreateOptions & FILE_DELETE_ON_CLOSE_LE) { 275338c8a9a5SSteve French /* 275438c8a9a5SSteve French * If file exists with under flags, return access 275538c8a9a5SSteve French * denied error. 275638c8a9a5SSteve French */ 275738c8a9a5SSteve French if (req->CreateDisposition == FILE_OVERWRITE_IF_LE || 275838c8a9a5SSteve French req->CreateDisposition == FILE_OPEN_IF_LE) { 275938c8a9a5SSteve French rc = -EACCES; 276038c8a9a5SSteve French goto err_out; 276138c8a9a5SSteve French } 276238c8a9a5SSteve French 276338c8a9a5SSteve French if (!test_tree_conn_flag(tcon, KSMBD_TREE_CONN_FLAG_WRITABLE)) { 276438c8a9a5SSteve French ksmbd_debug(SMB, 276538c8a9a5SSteve French "User does not have write permission\n"); 276638c8a9a5SSteve French rc = -EACCES; 276738c8a9a5SSteve French goto err_out; 276838c8a9a5SSteve French } 276938c8a9a5SSteve French } else if (d_is_symlink(path.dentry)) { 277038c8a9a5SSteve French rc = -EACCES; 277138c8a9a5SSteve French goto err_out; 277238c8a9a5SSteve French } 277338c8a9a5SSteve French 277438c8a9a5SSteve French file_present = true; 277538c8a9a5SSteve French idmap = mnt_idmap(path.mnt); 277638c8a9a5SSteve French } else { 277738c8a9a5SSteve French if (rc != -ENOENT) 277838c8a9a5SSteve French goto err_out; 277938c8a9a5SSteve French ksmbd_debug(SMB, "can not get linux path for %s, rc = %d\n", 278038c8a9a5SSteve French name, rc); 278138c8a9a5SSteve French rc = 0; 278238c8a9a5SSteve French } 278338c8a9a5SSteve French 278438c8a9a5SSteve French if (stream_name) { 278538c8a9a5SSteve French if (req->CreateOptions & FILE_DIRECTORY_FILE_LE) { 278638c8a9a5SSteve French if (s_type == DATA_STREAM) { 278738c8a9a5SSteve French rc = -EIO; 278838c8a9a5SSteve French rsp->hdr.Status = STATUS_NOT_A_DIRECTORY; 278938c8a9a5SSteve French } 279038c8a9a5SSteve French } else { 279138c8a9a5SSteve French if (file_present && S_ISDIR(d_inode(path.dentry)->i_mode) && 279238c8a9a5SSteve French s_type == DATA_STREAM) { 279338c8a9a5SSteve French rc = -EIO; 279438c8a9a5SSteve French rsp->hdr.Status = STATUS_FILE_IS_A_DIRECTORY; 279538c8a9a5SSteve French } 279638c8a9a5SSteve French } 279738c8a9a5SSteve French 279838c8a9a5SSteve French if (req->CreateOptions & FILE_DIRECTORY_FILE_LE && 279938c8a9a5SSteve French req->FileAttributes & FILE_ATTRIBUTE_NORMAL_LE) { 280038c8a9a5SSteve French rsp->hdr.Status = STATUS_NOT_A_DIRECTORY; 280138c8a9a5SSteve French rc = -EIO; 280238c8a9a5SSteve French } 280338c8a9a5SSteve French 280438c8a9a5SSteve French if (rc < 0) 280538c8a9a5SSteve French goto err_out; 280638c8a9a5SSteve French } 280738c8a9a5SSteve French 280838c8a9a5SSteve French if (file_present && req->CreateOptions & FILE_NON_DIRECTORY_FILE_LE && 280938c8a9a5SSteve French S_ISDIR(d_inode(path.dentry)->i_mode) && 281038c8a9a5SSteve French !(req->CreateOptions & FILE_DELETE_ON_CLOSE_LE)) { 281138c8a9a5SSteve French ksmbd_debug(SMB, "open() argument is a directory: %s, %x\n", 281238c8a9a5SSteve French name, req->CreateOptions); 281338c8a9a5SSteve French rsp->hdr.Status = STATUS_FILE_IS_A_DIRECTORY; 281438c8a9a5SSteve French rc = -EIO; 281538c8a9a5SSteve French goto err_out; 281638c8a9a5SSteve French } 281738c8a9a5SSteve French 281838c8a9a5SSteve French if (file_present && (req->CreateOptions & FILE_DIRECTORY_FILE_LE) && 281938c8a9a5SSteve French !(req->CreateDisposition == FILE_CREATE_LE) && 282038c8a9a5SSteve French !S_ISDIR(d_inode(path.dentry)->i_mode)) { 282138c8a9a5SSteve French rsp->hdr.Status = STATUS_NOT_A_DIRECTORY; 282238c8a9a5SSteve French rc = -EIO; 282338c8a9a5SSteve French goto err_out; 282438c8a9a5SSteve French } 282538c8a9a5SSteve French 282638c8a9a5SSteve French if (!stream_name && file_present && 282738c8a9a5SSteve French req->CreateDisposition == FILE_CREATE_LE) { 282838c8a9a5SSteve French rc = -EEXIST; 282938c8a9a5SSteve French goto err_out; 283038c8a9a5SSteve French } 283138c8a9a5SSteve French 283238c8a9a5SSteve French daccess = smb_map_generic_desired_access(req->DesiredAccess); 283338c8a9a5SSteve French 283438c8a9a5SSteve French if (file_present && !(req->CreateOptions & FILE_DELETE_ON_CLOSE_LE)) { 283538c8a9a5SSteve French rc = smb_check_perm_dacl(conn, &path, &daccess, 283638c8a9a5SSteve French sess->user->uid); 283738c8a9a5SSteve French if (rc) 283838c8a9a5SSteve French goto err_out; 283938c8a9a5SSteve French } 284038c8a9a5SSteve French 284138c8a9a5SSteve French if (daccess & FILE_MAXIMAL_ACCESS_LE) { 284238c8a9a5SSteve French if (!file_present) { 284338c8a9a5SSteve French daccess = cpu_to_le32(GENERIC_ALL_FLAGS); 284438c8a9a5SSteve French } else { 284538c8a9a5SSteve French rc = ksmbd_vfs_query_maximal_access(idmap, 284638c8a9a5SSteve French path.dentry, 284738c8a9a5SSteve French &daccess); 284838c8a9a5SSteve French if (rc) 284938c8a9a5SSteve French goto err_out; 285038c8a9a5SSteve French already_permitted = true; 285138c8a9a5SSteve French } 285238c8a9a5SSteve French maximal_access = daccess; 285338c8a9a5SSteve French } 285438c8a9a5SSteve French 285538c8a9a5SSteve French open_flags = smb2_create_open_flags(file_present, daccess, 285638c8a9a5SSteve French req->CreateDisposition, 285738c8a9a5SSteve French &may_flags); 285838c8a9a5SSteve French 285938c8a9a5SSteve French if (!test_tree_conn_flag(tcon, KSMBD_TREE_CONN_FLAG_WRITABLE)) { 286038c8a9a5SSteve French if (open_flags & O_CREAT) { 286138c8a9a5SSteve French ksmbd_debug(SMB, 286238c8a9a5SSteve French "User does not have write permission\n"); 286338c8a9a5SSteve French rc = -EACCES; 286438c8a9a5SSteve French goto err_out; 286538c8a9a5SSteve French } 286638c8a9a5SSteve French } 286738c8a9a5SSteve French 286838c8a9a5SSteve French /*create file if not present */ 286938c8a9a5SSteve French if (!file_present) { 287038c8a9a5SSteve French rc = smb2_creat(work, &path, name, open_flags, posix_mode, 287138c8a9a5SSteve French req->CreateOptions & FILE_DIRECTORY_FILE_LE); 287238c8a9a5SSteve French if (rc) { 287338c8a9a5SSteve French if (rc == -ENOENT) { 287438c8a9a5SSteve French rc = -EIO; 287538c8a9a5SSteve French rsp->hdr.Status = STATUS_OBJECT_PATH_NOT_FOUND; 287638c8a9a5SSteve French } 287738c8a9a5SSteve French goto err_out; 287838c8a9a5SSteve French } 287938c8a9a5SSteve French 288038c8a9a5SSteve French created = true; 288138c8a9a5SSteve French idmap = mnt_idmap(path.mnt); 288238c8a9a5SSteve French if (ea_buf) { 288338c8a9a5SSteve French if (le32_to_cpu(ea_buf->ccontext.DataLength) < 288438c8a9a5SSteve French sizeof(struct smb2_ea_info)) { 288538c8a9a5SSteve French rc = -EINVAL; 288638c8a9a5SSteve French goto err_out; 288738c8a9a5SSteve French } 288838c8a9a5SSteve French 288938c8a9a5SSteve French rc = smb2_set_ea(&ea_buf->ea, 289038c8a9a5SSteve French le32_to_cpu(ea_buf->ccontext.DataLength), 289138c8a9a5SSteve French &path); 289238c8a9a5SSteve French if (rc == -EOPNOTSUPP) 289338c8a9a5SSteve French rc = 0; 289438c8a9a5SSteve French else if (rc) 289538c8a9a5SSteve French goto err_out; 289638c8a9a5SSteve French } 289738c8a9a5SSteve French } else if (!already_permitted) { 289838c8a9a5SSteve French /* FILE_READ_ATTRIBUTE is allowed without inode_permission, 289938c8a9a5SSteve French * because execute(search) permission on a parent directory, 290038c8a9a5SSteve French * is already granted. 290138c8a9a5SSteve French */ 290238c8a9a5SSteve French if (daccess & ~(FILE_READ_ATTRIBUTES_LE | FILE_READ_CONTROL_LE)) { 290338c8a9a5SSteve French rc = inode_permission(idmap, 290438c8a9a5SSteve French d_inode(path.dentry), 290538c8a9a5SSteve French may_flags); 290638c8a9a5SSteve French if (rc) 290738c8a9a5SSteve French goto err_out; 290838c8a9a5SSteve French 290938c8a9a5SSteve French if ((daccess & FILE_DELETE_LE) || 291038c8a9a5SSteve French (req->CreateOptions & FILE_DELETE_ON_CLOSE_LE)) { 291138c8a9a5SSteve French rc = inode_permission(idmap, 291238c8a9a5SSteve French d_inode(path.dentry->d_parent), 291338c8a9a5SSteve French MAY_EXEC | MAY_WRITE); 291438c8a9a5SSteve French if (rc) 291538c8a9a5SSteve French goto err_out; 291638c8a9a5SSteve French } 291738c8a9a5SSteve French } 291838c8a9a5SSteve French } 291938c8a9a5SSteve French 292038c8a9a5SSteve French rc = ksmbd_query_inode_status(d_inode(path.dentry->d_parent)); 292138c8a9a5SSteve French if (rc == KSMBD_INODE_STATUS_PENDING_DELETE) { 292238c8a9a5SSteve French rc = -EBUSY; 292338c8a9a5SSteve French goto err_out; 292438c8a9a5SSteve French } 292538c8a9a5SSteve French 292638c8a9a5SSteve French rc = 0; 292738c8a9a5SSteve French filp = dentry_open(&path, open_flags, current_cred()); 292838c8a9a5SSteve French if (IS_ERR(filp)) { 292938c8a9a5SSteve French rc = PTR_ERR(filp); 293038c8a9a5SSteve French pr_err("dentry open for dir failed, rc %d\n", rc); 293138c8a9a5SSteve French goto err_out; 293238c8a9a5SSteve French } 293338c8a9a5SSteve French 293438c8a9a5SSteve French if (file_present) { 293538c8a9a5SSteve French if (!(open_flags & O_TRUNC)) 293638c8a9a5SSteve French file_info = FILE_OPENED; 293738c8a9a5SSteve French else 293838c8a9a5SSteve French file_info = FILE_OVERWRITTEN; 293938c8a9a5SSteve French 294038c8a9a5SSteve French if ((req->CreateDisposition & FILE_CREATE_MASK_LE) == 294138c8a9a5SSteve French FILE_SUPERSEDE_LE) 294238c8a9a5SSteve French file_info = FILE_SUPERSEDED; 294338c8a9a5SSteve French } else if (open_flags & O_CREAT) { 294438c8a9a5SSteve French file_info = FILE_CREATED; 294538c8a9a5SSteve French } 294638c8a9a5SSteve French 294738c8a9a5SSteve French ksmbd_vfs_set_fadvise(filp, req->CreateOptions); 294838c8a9a5SSteve French 294938c8a9a5SSteve French /* Obtain Volatile-ID */ 295038c8a9a5SSteve French fp = ksmbd_open_fd(work, filp); 295138c8a9a5SSteve French if (IS_ERR(fp)) { 295238c8a9a5SSteve French fput(filp); 295338c8a9a5SSteve French rc = PTR_ERR(fp); 295438c8a9a5SSteve French fp = NULL; 295538c8a9a5SSteve French goto err_out; 295638c8a9a5SSteve French } 295738c8a9a5SSteve French 295838c8a9a5SSteve French /* Get Persistent-ID */ 295938c8a9a5SSteve French ksmbd_open_durable_fd(fp); 296038c8a9a5SSteve French if (!has_file_id(fp->persistent_id)) { 296138c8a9a5SSteve French rc = -ENOMEM; 296238c8a9a5SSteve French goto err_out; 296338c8a9a5SSteve French } 296438c8a9a5SSteve French 296538c8a9a5SSteve French fp->cdoption = req->CreateDisposition; 296638c8a9a5SSteve French fp->daccess = daccess; 296738c8a9a5SSteve French fp->saccess = req->ShareAccess; 296838c8a9a5SSteve French fp->coption = req->CreateOptions; 296938c8a9a5SSteve French 297038c8a9a5SSteve French /* Set default windows and posix acls if creating new file */ 297138c8a9a5SSteve French if (created) { 297238c8a9a5SSteve French int posix_acl_rc; 297338c8a9a5SSteve French struct inode *inode = d_inode(path.dentry); 297438c8a9a5SSteve French 297538c8a9a5SSteve French posix_acl_rc = ksmbd_vfs_inherit_posix_acl(idmap, 297638c8a9a5SSteve French path.dentry, 297738c8a9a5SSteve French d_inode(path.dentry->d_parent)); 297838c8a9a5SSteve French if (posix_acl_rc) 297938c8a9a5SSteve French ksmbd_debug(SMB, "inherit posix acl failed : %d\n", posix_acl_rc); 298038c8a9a5SSteve French 298138c8a9a5SSteve French if (test_share_config_flag(work->tcon->share_conf, 298238c8a9a5SSteve French KSMBD_SHARE_FLAG_ACL_XATTR)) { 298338c8a9a5SSteve French rc = smb_inherit_dacl(conn, &path, sess->user->uid, 298438c8a9a5SSteve French sess->user->gid); 298538c8a9a5SSteve French } 298638c8a9a5SSteve French 298738c8a9a5SSteve French if (rc) { 298838c8a9a5SSteve French rc = smb2_create_sd_buffer(work, req, &path); 298938c8a9a5SSteve French if (rc) { 299038c8a9a5SSteve French if (posix_acl_rc) 299138c8a9a5SSteve French ksmbd_vfs_set_init_posix_acl(idmap, 299238c8a9a5SSteve French path.dentry); 299338c8a9a5SSteve French 299438c8a9a5SSteve French if (test_share_config_flag(work->tcon->share_conf, 299538c8a9a5SSteve French KSMBD_SHARE_FLAG_ACL_XATTR)) { 299638c8a9a5SSteve French struct smb_fattr fattr; 299738c8a9a5SSteve French struct smb_ntsd *pntsd; 299838c8a9a5SSteve French int pntsd_size, ace_num = 0; 299938c8a9a5SSteve French 300038c8a9a5SSteve French ksmbd_acls_fattr(&fattr, idmap, inode); 300138c8a9a5SSteve French if (fattr.cf_acls) 300238c8a9a5SSteve French ace_num = fattr.cf_acls->a_count; 300338c8a9a5SSteve French if (fattr.cf_dacls) 300438c8a9a5SSteve French ace_num += fattr.cf_dacls->a_count; 300538c8a9a5SSteve French 300638c8a9a5SSteve French pntsd = kmalloc(sizeof(struct smb_ntsd) + 300738c8a9a5SSteve French sizeof(struct smb_sid) * 3 + 300838c8a9a5SSteve French sizeof(struct smb_acl) + 300938c8a9a5SSteve French sizeof(struct smb_ace) * ace_num * 2, 301038c8a9a5SSteve French GFP_KERNEL); 301138c8a9a5SSteve French if (!pntsd) { 301238c8a9a5SSteve French posix_acl_release(fattr.cf_acls); 301338c8a9a5SSteve French posix_acl_release(fattr.cf_dacls); 301438c8a9a5SSteve French goto err_out; 301538c8a9a5SSteve French } 301638c8a9a5SSteve French 301738c8a9a5SSteve French rc = build_sec_desc(idmap, 301838c8a9a5SSteve French pntsd, NULL, 0, 301938c8a9a5SSteve French OWNER_SECINFO | 302038c8a9a5SSteve French GROUP_SECINFO | 302138c8a9a5SSteve French DACL_SECINFO, 302238c8a9a5SSteve French &pntsd_size, &fattr); 302338c8a9a5SSteve French posix_acl_release(fattr.cf_acls); 302438c8a9a5SSteve French posix_acl_release(fattr.cf_dacls); 302538c8a9a5SSteve French if (rc) { 302638c8a9a5SSteve French kfree(pntsd); 302738c8a9a5SSteve French goto err_out; 302838c8a9a5SSteve French } 302938c8a9a5SSteve French 303038c8a9a5SSteve French rc = ksmbd_vfs_set_sd_xattr(conn, 303138c8a9a5SSteve French idmap, 303238c8a9a5SSteve French path.dentry, 303338c8a9a5SSteve French pntsd, 303438c8a9a5SSteve French pntsd_size); 303538c8a9a5SSteve French kfree(pntsd); 303638c8a9a5SSteve French if (rc) 303738c8a9a5SSteve French pr_err("failed to store ntacl in xattr : %d\n", 303838c8a9a5SSteve French rc); 303938c8a9a5SSteve French } 304038c8a9a5SSteve French } 304138c8a9a5SSteve French } 304238c8a9a5SSteve French rc = 0; 304338c8a9a5SSteve French } 304438c8a9a5SSteve French 304538c8a9a5SSteve French if (stream_name) { 304638c8a9a5SSteve French rc = smb2_set_stream_name_xattr(&path, 304738c8a9a5SSteve French fp, 304838c8a9a5SSteve French stream_name, 304938c8a9a5SSteve French s_type); 305038c8a9a5SSteve French if (rc) 305138c8a9a5SSteve French goto err_out; 305238c8a9a5SSteve French file_info = FILE_CREATED; 305338c8a9a5SSteve French } 305438c8a9a5SSteve French 305538c8a9a5SSteve French fp->attrib_only = !(req->DesiredAccess & ~(FILE_READ_ATTRIBUTES_LE | 305638c8a9a5SSteve French FILE_WRITE_ATTRIBUTES_LE | FILE_SYNCHRONIZE_LE)); 305738c8a9a5SSteve French if (!S_ISDIR(file_inode(filp)->i_mode) && open_flags & O_TRUNC && 305838c8a9a5SSteve French !fp->attrib_only && !stream_name) { 305938c8a9a5SSteve French smb_break_all_oplock(work, fp); 306038c8a9a5SSteve French need_truncate = 1; 306138c8a9a5SSteve French } 306238c8a9a5SSteve French 306338c8a9a5SSteve French /* fp should be searchable through ksmbd_inode.m_fp_list 306438c8a9a5SSteve French * after daccess, saccess, attrib_only, and stream are 306538c8a9a5SSteve French * initialized. 306638c8a9a5SSteve French */ 306738c8a9a5SSteve French write_lock(&fp->f_ci->m_lock); 306838c8a9a5SSteve French list_add(&fp->node, &fp->f_ci->m_fp_list); 306938c8a9a5SSteve French write_unlock(&fp->f_ci->m_lock); 307038c8a9a5SSteve French 307138c8a9a5SSteve French /* Check delete pending among previous fp before oplock break */ 307238c8a9a5SSteve French if (ksmbd_inode_pending_delete(fp)) { 307338c8a9a5SSteve French rc = -EBUSY; 307438c8a9a5SSteve French goto err_out; 307538c8a9a5SSteve French } 307638c8a9a5SSteve French 307738c8a9a5SSteve French share_ret = ksmbd_smb_check_shared_mode(fp->filp, fp); 307838c8a9a5SSteve French if (!test_share_config_flag(work->tcon->share_conf, KSMBD_SHARE_FLAG_OPLOCKS) || 307938c8a9a5SSteve French (req_op_level == SMB2_OPLOCK_LEVEL_LEASE && 308038c8a9a5SSteve French !(conn->vals->capabilities & SMB2_GLOBAL_CAP_LEASING))) { 308138c8a9a5SSteve French if (share_ret < 0 && !S_ISDIR(file_inode(fp->filp)->i_mode)) { 308238c8a9a5SSteve French rc = share_ret; 308338c8a9a5SSteve French goto err_out; 308438c8a9a5SSteve French } 308538c8a9a5SSteve French } else { 308638c8a9a5SSteve French if (req_op_level == SMB2_OPLOCK_LEVEL_LEASE) { 308738c8a9a5SSteve French req_op_level = smb2_map_lease_to_oplock(lc->req_state); 308838c8a9a5SSteve French ksmbd_debug(SMB, 308938c8a9a5SSteve French "lease req for(%s) req oplock state 0x%x, lease state 0x%x\n", 309038c8a9a5SSteve French name, req_op_level, lc->req_state); 309138c8a9a5SSteve French rc = find_same_lease_key(sess, fp->f_ci, lc); 309238c8a9a5SSteve French if (rc) 309338c8a9a5SSteve French goto err_out; 309438c8a9a5SSteve French } else if (open_flags == O_RDONLY && 309538c8a9a5SSteve French (req_op_level == SMB2_OPLOCK_LEVEL_BATCH || 309638c8a9a5SSteve French req_op_level == SMB2_OPLOCK_LEVEL_EXCLUSIVE)) 309738c8a9a5SSteve French req_op_level = SMB2_OPLOCK_LEVEL_II; 309838c8a9a5SSteve French 309938c8a9a5SSteve French rc = smb_grant_oplock(work, req_op_level, 310038c8a9a5SSteve French fp->persistent_id, fp, 310138c8a9a5SSteve French le32_to_cpu(req->hdr.Id.SyncId.TreeId), 310238c8a9a5SSteve French lc, share_ret); 310338c8a9a5SSteve French if (rc < 0) 310438c8a9a5SSteve French goto err_out; 310538c8a9a5SSteve French } 310638c8a9a5SSteve French 310738c8a9a5SSteve French if (req->CreateOptions & FILE_DELETE_ON_CLOSE_LE) 310838c8a9a5SSteve French ksmbd_fd_set_delete_on_close(fp, file_info); 310938c8a9a5SSteve French 311038c8a9a5SSteve French if (need_truncate) { 311138c8a9a5SSteve French rc = smb2_create_truncate(&path); 311238c8a9a5SSteve French if (rc) 311338c8a9a5SSteve French goto err_out; 311438c8a9a5SSteve French } 311538c8a9a5SSteve French 311638c8a9a5SSteve French if (req->CreateContextsOffset) { 311738c8a9a5SSteve French struct create_alloc_size_req *az_req; 311838c8a9a5SSteve French 311938c8a9a5SSteve French az_req = (struct create_alloc_size_req *)smb2_find_context_vals(req, 312038c8a9a5SSteve French SMB2_CREATE_ALLOCATION_SIZE, 4); 312138c8a9a5SSteve French if (IS_ERR(az_req)) { 312238c8a9a5SSteve French rc = PTR_ERR(az_req); 312338c8a9a5SSteve French goto err_out; 312438c8a9a5SSteve French } else if (az_req) { 312538c8a9a5SSteve French loff_t alloc_size; 312638c8a9a5SSteve French int err; 312738c8a9a5SSteve French 312838c8a9a5SSteve French if (le16_to_cpu(az_req->ccontext.DataOffset) + 312938c8a9a5SSteve French le32_to_cpu(az_req->ccontext.DataLength) < 313038c8a9a5SSteve French sizeof(struct create_alloc_size_req)) { 313138c8a9a5SSteve French rc = -EINVAL; 313238c8a9a5SSteve French goto err_out; 313338c8a9a5SSteve French } 313438c8a9a5SSteve French alloc_size = le64_to_cpu(az_req->AllocationSize); 313538c8a9a5SSteve French ksmbd_debug(SMB, 313638c8a9a5SSteve French "request smb2 create allocate size : %llu\n", 313738c8a9a5SSteve French alloc_size); 313838c8a9a5SSteve French smb_break_all_levII_oplock(work, fp, 1); 313938c8a9a5SSteve French err = vfs_fallocate(fp->filp, FALLOC_FL_KEEP_SIZE, 0, 314038c8a9a5SSteve French alloc_size); 314138c8a9a5SSteve French if (err < 0) 314238c8a9a5SSteve French ksmbd_debug(SMB, 314338c8a9a5SSteve French "vfs_fallocate is failed : %d\n", 314438c8a9a5SSteve French err); 314538c8a9a5SSteve French } 314638c8a9a5SSteve French 314738c8a9a5SSteve French context = smb2_find_context_vals(req, SMB2_CREATE_QUERY_ON_DISK_ID, 4); 314838c8a9a5SSteve French if (IS_ERR(context)) { 314938c8a9a5SSteve French rc = PTR_ERR(context); 315038c8a9a5SSteve French goto err_out; 315138c8a9a5SSteve French } else if (context) { 315238c8a9a5SSteve French ksmbd_debug(SMB, "get query on disk id context\n"); 315338c8a9a5SSteve French query_disk_id = 1; 315438c8a9a5SSteve French } 315538c8a9a5SSteve French } 315638c8a9a5SSteve French 315738c8a9a5SSteve French rc = ksmbd_vfs_getattr(&path, &stat); 315838c8a9a5SSteve French if (rc) 315938c8a9a5SSteve French goto err_out; 316038c8a9a5SSteve French 316138c8a9a5SSteve French if (stat.result_mask & STATX_BTIME) 316238c8a9a5SSteve French fp->create_time = ksmbd_UnixTimeToNT(stat.btime); 316338c8a9a5SSteve French else 316438c8a9a5SSteve French fp->create_time = ksmbd_UnixTimeToNT(stat.ctime); 316538c8a9a5SSteve French if (req->FileAttributes || fp->f_ci->m_fattr == 0) 316638c8a9a5SSteve French fp->f_ci->m_fattr = 316738c8a9a5SSteve French cpu_to_le32(smb2_get_dos_mode(&stat, le32_to_cpu(req->FileAttributes))); 316838c8a9a5SSteve French 316938c8a9a5SSteve French if (!created) 317038c8a9a5SSteve French smb2_update_xattrs(tcon, &path, fp); 317138c8a9a5SSteve French else 317238c8a9a5SSteve French smb2_new_xattrs(tcon, &path, fp); 317338c8a9a5SSteve French 317438c8a9a5SSteve French memcpy(fp->client_guid, conn->ClientGUID, SMB2_CLIENT_GUID_SIZE); 317538c8a9a5SSteve French 317638c8a9a5SSteve French rsp->StructureSize = cpu_to_le16(89); 317738c8a9a5SSteve French rcu_read_lock(); 317838c8a9a5SSteve French opinfo = rcu_dereference(fp->f_opinfo); 317938c8a9a5SSteve French rsp->OplockLevel = opinfo != NULL ? opinfo->level : 0; 318038c8a9a5SSteve French rcu_read_unlock(); 318138c8a9a5SSteve French rsp->Flags = 0; 318238c8a9a5SSteve French rsp->CreateAction = cpu_to_le32(file_info); 318338c8a9a5SSteve French rsp->CreationTime = cpu_to_le64(fp->create_time); 318438c8a9a5SSteve French time = ksmbd_UnixTimeToNT(stat.atime); 318538c8a9a5SSteve French rsp->LastAccessTime = cpu_to_le64(time); 318638c8a9a5SSteve French time = ksmbd_UnixTimeToNT(stat.mtime); 318738c8a9a5SSteve French rsp->LastWriteTime = cpu_to_le64(time); 318838c8a9a5SSteve French time = ksmbd_UnixTimeToNT(stat.ctime); 318938c8a9a5SSteve French rsp->ChangeTime = cpu_to_le64(time); 319038c8a9a5SSteve French rsp->AllocationSize = S_ISDIR(stat.mode) ? 0 : 319138c8a9a5SSteve French cpu_to_le64(stat.blocks << 9); 319238c8a9a5SSteve French rsp->EndofFile = S_ISDIR(stat.mode) ? 0 : cpu_to_le64(stat.size); 319338c8a9a5SSteve French rsp->FileAttributes = fp->f_ci->m_fattr; 319438c8a9a5SSteve French 319538c8a9a5SSteve French rsp->Reserved2 = 0; 319638c8a9a5SSteve French 319738c8a9a5SSteve French rsp->PersistentFileId = fp->persistent_id; 319838c8a9a5SSteve French rsp->VolatileFileId = fp->volatile_id; 319938c8a9a5SSteve French 320038c8a9a5SSteve French rsp->CreateContextsOffset = 0; 320138c8a9a5SSteve French rsp->CreateContextsLength = 0; 320238c8a9a5SSteve French inc_rfc1001_len(work->response_buf, 88); /* StructureSize - 1*/ 320338c8a9a5SSteve French 320438c8a9a5SSteve French /* If lease is request send lease context response */ 320538c8a9a5SSteve French if (opinfo && opinfo->is_lease) { 320638c8a9a5SSteve French struct create_context *lease_ccontext; 320738c8a9a5SSteve French 320838c8a9a5SSteve French ksmbd_debug(SMB, "lease granted on(%s) lease state 0x%x\n", 320938c8a9a5SSteve French name, opinfo->o_lease->state); 321038c8a9a5SSteve French rsp->OplockLevel = SMB2_OPLOCK_LEVEL_LEASE; 321138c8a9a5SSteve French 321238c8a9a5SSteve French lease_ccontext = (struct create_context *)rsp->Buffer; 321338c8a9a5SSteve French contxt_cnt++; 321438c8a9a5SSteve French create_lease_buf(rsp->Buffer, opinfo->o_lease); 321538c8a9a5SSteve French le32_add_cpu(&rsp->CreateContextsLength, 321638c8a9a5SSteve French conn->vals->create_lease_size); 321738c8a9a5SSteve French inc_rfc1001_len(work->response_buf, 321838c8a9a5SSteve French conn->vals->create_lease_size); 321938c8a9a5SSteve French next_ptr = &lease_ccontext->Next; 322038c8a9a5SSteve French next_off = conn->vals->create_lease_size; 322138c8a9a5SSteve French } 322238c8a9a5SSteve French 322338c8a9a5SSteve French if (maximal_access_ctxt) { 322438c8a9a5SSteve French struct create_context *mxac_ccontext; 322538c8a9a5SSteve French 322638c8a9a5SSteve French if (maximal_access == 0) 322738c8a9a5SSteve French ksmbd_vfs_query_maximal_access(idmap, 322838c8a9a5SSteve French path.dentry, 322938c8a9a5SSteve French &maximal_access); 323038c8a9a5SSteve French mxac_ccontext = (struct create_context *)(rsp->Buffer + 323138c8a9a5SSteve French le32_to_cpu(rsp->CreateContextsLength)); 323238c8a9a5SSteve French contxt_cnt++; 323338c8a9a5SSteve French create_mxac_rsp_buf(rsp->Buffer + 323438c8a9a5SSteve French le32_to_cpu(rsp->CreateContextsLength), 323538c8a9a5SSteve French le32_to_cpu(maximal_access)); 323638c8a9a5SSteve French le32_add_cpu(&rsp->CreateContextsLength, 323738c8a9a5SSteve French conn->vals->create_mxac_size); 323838c8a9a5SSteve French inc_rfc1001_len(work->response_buf, 323938c8a9a5SSteve French conn->vals->create_mxac_size); 324038c8a9a5SSteve French if (next_ptr) 324138c8a9a5SSteve French *next_ptr = cpu_to_le32(next_off); 324238c8a9a5SSteve French next_ptr = &mxac_ccontext->Next; 324338c8a9a5SSteve French next_off = conn->vals->create_mxac_size; 324438c8a9a5SSteve French } 324538c8a9a5SSteve French 324638c8a9a5SSteve French if (query_disk_id) { 324738c8a9a5SSteve French struct create_context *disk_id_ccontext; 324838c8a9a5SSteve French 324938c8a9a5SSteve French disk_id_ccontext = (struct create_context *)(rsp->Buffer + 325038c8a9a5SSteve French le32_to_cpu(rsp->CreateContextsLength)); 325138c8a9a5SSteve French contxt_cnt++; 325238c8a9a5SSteve French create_disk_id_rsp_buf(rsp->Buffer + 325338c8a9a5SSteve French le32_to_cpu(rsp->CreateContextsLength), 325438c8a9a5SSteve French stat.ino, tcon->id); 325538c8a9a5SSteve French le32_add_cpu(&rsp->CreateContextsLength, 325638c8a9a5SSteve French conn->vals->create_disk_id_size); 325738c8a9a5SSteve French inc_rfc1001_len(work->response_buf, 325838c8a9a5SSteve French conn->vals->create_disk_id_size); 325938c8a9a5SSteve French if (next_ptr) 326038c8a9a5SSteve French *next_ptr = cpu_to_le32(next_off); 326138c8a9a5SSteve French next_ptr = &disk_id_ccontext->Next; 326238c8a9a5SSteve French next_off = conn->vals->create_disk_id_size; 326338c8a9a5SSteve French } 326438c8a9a5SSteve French 326538c8a9a5SSteve French if (posix_ctxt) { 326638c8a9a5SSteve French contxt_cnt++; 326738c8a9a5SSteve French create_posix_rsp_buf(rsp->Buffer + 326838c8a9a5SSteve French le32_to_cpu(rsp->CreateContextsLength), 326938c8a9a5SSteve French fp); 327038c8a9a5SSteve French le32_add_cpu(&rsp->CreateContextsLength, 327138c8a9a5SSteve French conn->vals->create_posix_size); 327238c8a9a5SSteve French inc_rfc1001_len(work->response_buf, 327338c8a9a5SSteve French conn->vals->create_posix_size); 327438c8a9a5SSteve French if (next_ptr) 327538c8a9a5SSteve French *next_ptr = cpu_to_le32(next_off); 327638c8a9a5SSteve French } 327738c8a9a5SSteve French 327838c8a9a5SSteve French if (contxt_cnt > 0) { 327938c8a9a5SSteve French rsp->CreateContextsOffset = 328038c8a9a5SSteve French cpu_to_le32(offsetof(struct smb2_create_rsp, Buffer)); 328138c8a9a5SSteve French } 328238c8a9a5SSteve French 328338c8a9a5SSteve French err_out: 328438c8a9a5SSteve French if (file_present || created) { 328538c8a9a5SSteve French inode_unlock(d_inode(path.dentry->d_parent)); 328638c8a9a5SSteve French dput(path.dentry); 328738c8a9a5SSteve French } 328838c8a9a5SSteve French ksmbd_revert_fsids(work); 328938c8a9a5SSteve French err_out1: 329038c8a9a5SSteve French 329138c8a9a5SSteve French if (rc) { 329238c8a9a5SSteve French if (rc == -EINVAL) 329338c8a9a5SSteve French rsp->hdr.Status = STATUS_INVALID_PARAMETER; 329438c8a9a5SSteve French else if (rc == -EOPNOTSUPP) 329538c8a9a5SSteve French rsp->hdr.Status = STATUS_NOT_SUPPORTED; 329638c8a9a5SSteve French else if (rc == -EACCES || rc == -ESTALE || rc == -EXDEV) 329738c8a9a5SSteve French rsp->hdr.Status = STATUS_ACCESS_DENIED; 329838c8a9a5SSteve French else if (rc == -ENOENT) 329938c8a9a5SSteve French rsp->hdr.Status = STATUS_OBJECT_NAME_INVALID; 330038c8a9a5SSteve French else if (rc == -EPERM) 330138c8a9a5SSteve French rsp->hdr.Status = STATUS_SHARING_VIOLATION; 330238c8a9a5SSteve French else if (rc == -EBUSY) 330338c8a9a5SSteve French rsp->hdr.Status = STATUS_DELETE_PENDING; 330438c8a9a5SSteve French else if (rc == -EBADF) 330538c8a9a5SSteve French rsp->hdr.Status = STATUS_OBJECT_NAME_NOT_FOUND; 330638c8a9a5SSteve French else if (rc == -ENOEXEC) 330738c8a9a5SSteve French rsp->hdr.Status = STATUS_DUPLICATE_OBJECTID; 330838c8a9a5SSteve French else if (rc == -ENXIO) 330938c8a9a5SSteve French rsp->hdr.Status = STATUS_NO_SUCH_DEVICE; 331038c8a9a5SSteve French else if (rc == -EEXIST) 331138c8a9a5SSteve French rsp->hdr.Status = STATUS_OBJECT_NAME_COLLISION; 331238c8a9a5SSteve French else if (rc == -EMFILE) 331338c8a9a5SSteve French rsp->hdr.Status = STATUS_INSUFFICIENT_RESOURCES; 331438c8a9a5SSteve French if (!rsp->hdr.Status) 331538c8a9a5SSteve French rsp->hdr.Status = STATUS_UNEXPECTED_IO_ERROR; 331638c8a9a5SSteve French 331738c8a9a5SSteve French if (fp) 331838c8a9a5SSteve French ksmbd_fd_put(work, fp); 331938c8a9a5SSteve French smb2_set_err_rsp(work); 332038c8a9a5SSteve French ksmbd_debug(SMB, "Error response: %x\n", rsp->hdr.Status); 332138c8a9a5SSteve French } 332238c8a9a5SSteve French 332338c8a9a5SSteve French kfree(name); 332438c8a9a5SSteve French kfree(lc); 332538c8a9a5SSteve French 332638c8a9a5SSteve French return 0; 332738c8a9a5SSteve French } 332838c8a9a5SSteve French 332938c8a9a5SSteve French static int readdir_info_level_struct_sz(int info_level) 333038c8a9a5SSteve French { 333138c8a9a5SSteve French switch (info_level) { 333238c8a9a5SSteve French case FILE_FULL_DIRECTORY_INFORMATION: 333338c8a9a5SSteve French return sizeof(struct file_full_directory_info); 333438c8a9a5SSteve French case FILE_BOTH_DIRECTORY_INFORMATION: 333538c8a9a5SSteve French return sizeof(struct file_both_directory_info); 333638c8a9a5SSteve French case FILE_DIRECTORY_INFORMATION: 333738c8a9a5SSteve French return sizeof(struct file_directory_info); 333838c8a9a5SSteve French case FILE_NAMES_INFORMATION: 333938c8a9a5SSteve French return sizeof(struct file_names_info); 334038c8a9a5SSteve French case FILEID_FULL_DIRECTORY_INFORMATION: 334138c8a9a5SSteve French return sizeof(struct file_id_full_dir_info); 334238c8a9a5SSteve French case FILEID_BOTH_DIRECTORY_INFORMATION: 334338c8a9a5SSteve French return sizeof(struct file_id_both_directory_info); 334438c8a9a5SSteve French case SMB_FIND_FILE_POSIX_INFO: 334538c8a9a5SSteve French return sizeof(struct smb2_posix_info); 334638c8a9a5SSteve French default: 334738c8a9a5SSteve French return -EOPNOTSUPP; 334838c8a9a5SSteve French } 334938c8a9a5SSteve French } 335038c8a9a5SSteve French 335138c8a9a5SSteve French static int dentry_name(struct ksmbd_dir_info *d_info, int info_level) 335238c8a9a5SSteve French { 335338c8a9a5SSteve French switch (info_level) { 335438c8a9a5SSteve French case FILE_FULL_DIRECTORY_INFORMATION: 335538c8a9a5SSteve French { 335638c8a9a5SSteve French struct file_full_directory_info *ffdinfo; 335738c8a9a5SSteve French 335838c8a9a5SSteve French ffdinfo = (struct file_full_directory_info *)d_info->rptr; 335938c8a9a5SSteve French d_info->rptr += le32_to_cpu(ffdinfo->NextEntryOffset); 336038c8a9a5SSteve French d_info->name = ffdinfo->FileName; 336138c8a9a5SSteve French d_info->name_len = le32_to_cpu(ffdinfo->FileNameLength); 336238c8a9a5SSteve French return 0; 336338c8a9a5SSteve French } 336438c8a9a5SSteve French case FILE_BOTH_DIRECTORY_INFORMATION: 336538c8a9a5SSteve French { 336638c8a9a5SSteve French struct file_both_directory_info *fbdinfo; 336738c8a9a5SSteve French 336838c8a9a5SSteve French fbdinfo = (struct file_both_directory_info *)d_info->rptr; 336938c8a9a5SSteve French d_info->rptr += le32_to_cpu(fbdinfo->NextEntryOffset); 337038c8a9a5SSteve French d_info->name = fbdinfo->FileName; 337138c8a9a5SSteve French d_info->name_len = le32_to_cpu(fbdinfo->FileNameLength); 337238c8a9a5SSteve French return 0; 337338c8a9a5SSteve French } 337438c8a9a5SSteve French case FILE_DIRECTORY_INFORMATION: 337538c8a9a5SSteve French { 337638c8a9a5SSteve French struct file_directory_info *fdinfo; 337738c8a9a5SSteve French 337838c8a9a5SSteve French fdinfo = (struct file_directory_info *)d_info->rptr; 337938c8a9a5SSteve French d_info->rptr += le32_to_cpu(fdinfo->NextEntryOffset); 338038c8a9a5SSteve French d_info->name = fdinfo->FileName; 338138c8a9a5SSteve French d_info->name_len = le32_to_cpu(fdinfo->FileNameLength); 338238c8a9a5SSteve French return 0; 338338c8a9a5SSteve French } 338438c8a9a5SSteve French case FILE_NAMES_INFORMATION: 338538c8a9a5SSteve French { 338638c8a9a5SSteve French struct file_names_info *fninfo; 338738c8a9a5SSteve French 338838c8a9a5SSteve French fninfo = (struct file_names_info *)d_info->rptr; 338938c8a9a5SSteve French d_info->rptr += le32_to_cpu(fninfo->NextEntryOffset); 339038c8a9a5SSteve French d_info->name = fninfo->FileName; 339138c8a9a5SSteve French d_info->name_len = le32_to_cpu(fninfo->FileNameLength); 339238c8a9a5SSteve French return 0; 339338c8a9a5SSteve French } 339438c8a9a5SSteve French case FILEID_FULL_DIRECTORY_INFORMATION: 339538c8a9a5SSteve French { 339638c8a9a5SSteve French struct file_id_full_dir_info *dinfo; 339738c8a9a5SSteve French 339838c8a9a5SSteve French dinfo = (struct file_id_full_dir_info *)d_info->rptr; 339938c8a9a5SSteve French d_info->rptr += le32_to_cpu(dinfo->NextEntryOffset); 340038c8a9a5SSteve French d_info->name = dinfo->FileName; 340138c8a9a5SSteve French d_info->name_len = le32_to_cpu(dinfo->FileNameLength); 340238c8a9a5SSteve French return 0; 340338c8a9a5SSteve French } 340438c8a9a5SSteve French case FILEID_BOTH_DIRECTORY_INFORMATION: 340538c8a9a5SSteve French { 340638c8a9a5SSteve French struct file_id_both_directory_info *fibdinfo; 340738c8a9a5SSteve French 340838c8a9a5SSteve French fibdinfo = (struct file_id_both_directory_info *)d_info->rptr; 340938c8a9a5SSteve French d_info->rptr += le32_to_cpu(fibdinfo->NextEntryOffset); 341038c8a9a5SSteve French d_info->name = fibdinfo->FileName; 341138c8a9a5SSteve French d_info->name_len = le32_to_cpu(fibdinfo->FileNameLength); 341238c8a9a5SSteve French return 0; 341338c8a9a5SSteve French } 341438c8a9a5SSteve French case SMB_FIND_FILE_POSIX_INFO: 341538c8a9a5SSteve French { 341638c8a9a5SSteve French struct smb2_posix_info *posix_info; 341738c8a9a5SSteve French 341838c8a9a5SSteve French posix_info = (struct smb2_posix_info *)d_info->rptr; 341938c8a9a5SSteve French d_info->rptr += le32_to_cpu(posix_info->NextEntryOffset); 342038c8a9a5SSteve French d_info->name = posix_info->name; 342138c8a9a5SSteve French d_info->name_len = le32_to_cpu(posix_info->name_len); 342238c8a9a5SSteve French return 0; 342338c8a9a5SSteve French } 342438c8a9a5SSteve French default: 342538c8a9a5SSteve French return -EINVAL; 342638c8a9a5SSteve French } 342738c8a9a5SSteve French } 342838c8a9a5SSteve French 342938c8a9a5SSteve French /** 343038c8a9a5SSteve French * smb2_populate_readdir_entry() - encode directory entry in smb2 response 343138c8a9a5SSteve French * buffer 343238c8a9a5SSteve French * @conn: connection instance 343338c8a9a5SSteve French * @info_level: smb information level 343438c8a9a5SSteve French * @d_info: structure included variables for query dir 343538c8a9a5SSteve French * @ksmbd_kstat: ksmbd wrapper of dirent stat information 343638c8a9a5SSteve French * 343738c8a9a5SSteve French * if directory has many entries, find first can't read it fully. 343838c8a9a5SSteve French * find next might be called multiple times to read remaining dir entries 343938c8a9a5SSteve French * 344038c8a9a5SSteve French * Return: 0 on success, otherwise error 344138c8a9a5SSteve French */ 344238c8a9a5SSteve French static int smb2_populate_readdir_entry(struct ksmbd_conn *conn, int info_level, 344338c8a9a5SSteve French struct ksmbd_dir_info *d_info, 344438c8a9a5SSteve French struct ksmbd_kstat *ksmbd_kstat) 344538c8a9a5SSteve French { 344638c8a9a5SSteve French int next_entry_offset = 0; 344738c8a9a5SSteve French char *conv_name; 344838c8a9a5SSteve French int conv_len; 344938c8a9a5SSteve French void *kstat; 345038c8a9a5SSteve French int struct_sz, rc = 0; 345138c8a9a5SSteve French 345238c8a9a5SSteve French conv_name = ksmbd_convert_dir_info_name(d_info, 345338c8a9a5SSteve French conn->local_nls, 345438c8a9a5SSteve French &conv_len); 345538c8a9a5SSteve French if (!conv_name) 345638c8a9a5SSteve French return -ENOMEM; 345738c8a9a5SSteve French 345838c8a9a5SSteve French /* Somehow the name has only terminating NULL bytes */ 345938c8a9a5SSteve French if (conv_len < 0) { 346038c8a9a5SSteve French rc = -EINVAL; 346138c8a9a5SSteve French goto free_conv_name; 346238c8a9a5SSteve French } 346338c8a9a5SSteve French 346438c8a9a5SSteve French struct_sz = readdir_info_level_struct_sz(info_level) + conv_len; 346538c8a9a5SSteve French next_entry_offset = ALIGN(struct_sz, KSMBD_DIR_INFO_ALIGNMENT); 346638c8a9a5SSteve French d_info->last_entry_off_align = next_entry_offset - struct_sz; 346738c8a9a5SSteve French 346838c8a9a5SSteve French if (next_entry_offset > d_info->out_buf_len) { 346938c8a9a5SSteve French d_info->out_buf_len = 0; 347038c8a9a5SSteve French rc = -ENOSPC; 347138c8a9a5SSteve French goto free_conv_name; 347238c8a9a5SSteve French } 347338c8a9a5SSteve French 347438c8a9a5SSteve French kstat = d_info->wptr; 347538c8a9a5SSteve French if (info_level != FILE_NAMES_INFORMATION) 347638c8a9a5SSteve French kstat = ksmbd_vfs_init_kstat(&d_info->wptr, ksmbd_kstat); 347738c8a9a5SSteve French 347838c8a9a5SSteve French switch (info_level) { 347938c8a9a5SSteve French case FILE_FULL_DIRECTORY_INFORMATION: 348038c8a9a5SSteve French { 348138c8a9a5SSteve French struct file_full_directory_info *ffdinfo; 348238c8a9a5SSteve French 348338c8a9a5SSteve French ffdinfo = (struct file_full_directory_info *)kstat; 348438c8a9a5SSteve French ffdinfo->FileNameLength = cpu_to_le32(conv_len); 348538c8a9a5SSteve French ffdinfo->EaSize = 348638c8a9a5SSteve French smb2_get_reparse_tag_special_file(ksmbd_kstat->kstat->mode); 348738c8a9a5SSteve French if (ffdinfo->EaSize) 348838c8a9a5SSteve French ffdinfo->ExtFileAttributes = FILE_ATTRIBUTE_REPARSE_POINT_LE; 348938c8a9a5SSteve French if (d_info->hide_dot_file && d_info->name[0] == '.') 349038c8a9a5SSteve French ffdinfo->ExtFileAttributes |= FILE_ATTRIBUTE_HIDDEN_LE; 349138c8a9a5SSteve French memcpy(ffdinfo->FileName, conv_name, conv_len); 349238c8a9a5SSteve French ffdinfo->NextEntryOffset = cpu_to_le32(next_entry_offset); 349338c8a9a5SSteve French break; 349438c8a9a5SSteve French } 349538c8a9a5SSteve French case FILE_BOTH_DIRECTORY_INFORMATION: 349638c8a9a5SSteve French { 349738c8a9a5SSteve French struct file_both_directory_info *fbdinfo; 349838c8a9a5SSteve French 349938c8a9a5SSteve French fbdinfo = (struct file_both_directory_info *)kstat; 350038c8a9a5SSteve French fbdinfo->FileNameLength = cpu_to_le32(conv_len); 350138c8a9a5SSteve French fbdinfo->EaSize = 350238c8a9a5SSteve French smb2_get_reparse_tag_special_file(ksmbd_kstat->kstat->mode); 350338c8a9a5SSteve French if (fbdinfo->EaSize) 350438c8a9a5SSteve French fbdinfo->ExtFileAttributes = FILE_ATTRIBUTE_REPARSE_POINT_LE; 350538c8a9a5SSteve French fbdinfo->ShortNameLength = 0; 350638c8a9a5SSteve French fbdinfo->Reserved = 0; 350738c8a9a5SSteve French if (d_info->hide_dot_file && d_info->name[0] == '.') 350838c8a9a5SSteve French fbdinfo->ExtFileAttributes |= FILE_ATTRIBUTE_HIDDEN_LE; 350938c8a9a5SSteve French memcpy(fbdinfo->FileName, conv_name, conv_len); 351038c8a9a5SSteve French fbdinfo->NextEntryOffset = cpu_to_le32(next_entry_offset); 351138c8a9a5SSteve French break; 351238c8a9a5SSteve French } 351338c8a9a5SSteve French case FILE_DIRECTORY_INFORMATION: 351438c8a9a5SSteve French { 351538c8a9a5SSteve French struct file_directory_info *fdinfo; 351638c8a9a5SSteve French 351738c8a9a5SSteve French fdinfo = (struct file_directory_info *)kstat; 351838c8a9a5SSteve French fdinfo->FileNameLength = cpu_to_le32(conv_len); 351938c8a9a5SSteve French if (d_info->hide_dot_file && d_info->name[0] == '.') 352038c8a9a5SSteve French fdinfo->ExtFileAttributes |= FILE_ATTRIBUTE_HIDDEN_LE; 352138c8a9a5SSteve French memcpy(fdinfo->FileName, conv_name, conv_len); 352238c8a9a5SSteve French fdinfo->NextEntryOffset = cpu_to_le32(next_entry_offset); 352338c8a9a5SSteve French break; 352438c8a9a5SSteve French } 352538c8a9a5SSteve French case FILE_NAMES_INFORMATION: 352638c8a9a5SSteve French { 352738c8a9a5SSteve French struct file_names_info *fninfo; 352838c8a9a5SSteve French 352938c8a9a5SSteve French fninfo = (struct file_names_info *)kstat; 353038c8a9a5SSteve French fninfo->FileNameLength = cpu_to_le32(conv_len); 353138c8a9a5SSteve French memcpy(fninfo->FileName, conv_name, conv_len); 353238c8a9a5SSteve French fninfo->NextEntryOffset = cpu_to_le32(next_entry_offset); 353338c8a9a5SSteve French break; 353438c8a9a5SSteve French } 353538c8a9a5SSteve French case FILEID_FULL_DIRECTORY_INFORMATION: 353638c8a9a5SSteve French { 353738c8a9a5SSteve French struct file_id_full_dir_info *dinfo; 353838c8a9a5SSteve French 353938c8a9a5SSteve French dinfo = (struct file_id_full_dir_info *)kstat; 354038c8a9a5SSteve French dinfo->FileNameLength = cpu_to_le32(conv_len); 354138c8a9a5SSteve French dinfo->EaSize = 354238c8a9a5SSteve French smb2_get_reparse_tag_special_file(ksmbd_kstat->kstat->mode); 354338c8a9a5SSteve French if (dinfo->EaSize) 354438c8a9a5SSteve French dinfo->ExtFileAttributes = FILE_ATTRIBUTE_REPARSE_POINT_LE; 354538c8a9a5SSteve French dinfo->Reserved = 0; 354638c8a9a5SSteve French dinfo->UniqueId = cpu_to_le64(ksmbd_kstat->kstat->ino); 354738c8a9a5SSteve French if (d_info->hide_dot_file && d_info->name[0] == '.') 354838c8a9a5SSteve French dinfo->ExtFileAttributes |= FILE_ATTRIBUTE_HIDDEN_LE; 354938c8a9a5SSteve French memcpy(dinfo->FileName, conv_name, conv_len); 355038c8a9a5SSteve French dinfo->NextEntryOffset = cpu_to_le32(next_entry_offset); 355138c8a9a5SSteve French break; 355238c8a9a5SSteve French } 355338c8a9a5SSteve French case FILEID_BOTH_DIRECTORY_INFORMATION: 355438c8a9a5SSteve French { 355538c8a9a5SSteve French struct file_id_both_directory_info *fibdinfo; 355638c8a9a5SSteve French 355738c8a9a5SSteve French fibdinfo = (struct file_id_both_directory_info *)kstat; 355838c8a9a5SSteve French fibdinfo->FileNameLength = cpu_to_le32(conv_len); 355938c8a9a5SSteve French fibdinfo->EaSize = 356038c8a9a5SSteve French smb2_get_reparse_tag_special_file(ksmbd_kstat->kstat->mode); 356138c8a9a5SSteve French if (fibdinfo->EaSize) 356238c8a9a5SSteve French fibdinfo->ExtFileAttributes = FILE_ATTRIBUTE_REPARSE_POINT_LE; 356338c8a9a5SSteve French fibdinfo->UniqueId = cpu_to_le64(ksmbd_kstat->kstat->ino); 356438c8a9a5SSteve French fibdinfo->ShortNameLength = 0; 356538c8a9a5SSteve French fibdinfo->Reserved = 0; 356638c8a9a5SSteve French fibdinfo->Reserved2 = cpu_to_le16(0); 356738c8a9a5SSteve French if (d_info->hide_dot_file && d_info->name[0] == '.') 356838c8a9a5SSteve French fibdinfo->ExtFileAttributes |= FILE_ATTRIBUTE_HIDDEN_LE; 356938c8a9a5SSteve French memcpy(fibdinfo->FileName, conv_name, conv_len); 357038c8a9a5SSteve French fibdinfo->NextEntryOffset = cpu_to_le32(next_entry_offset); 357138c8a9a5SSteve French break; 357238c8a9a5SSteve French } 357338c8a9a5SSteve French case SMB_FIND_FILE_POSIX_INFO: 357438c8a9a5SSteve French { 357538c8a9a5SSteve French struct smb2_posix_info *posix_info; 357638c8a9a5SSteve French u64 time; 357738c8a9a5SSteve French 357838c8a9a5SSteve French posix_info = (struct smb2_posix_info *)kstat; 357938c8a9a5SSteve French posix_info->Ignored = 0; 358038c8a9a5SSteve French posix_info->CreationTime = cpu_to_le64(ksmbd_kstat->create_time); 358138c8a9a5SSteve French time = ksmbd_UnixTimeToNT(ksmbd_kstat->kstat->ctime); 358238c8a9a5SSteve French posix_info->ChangeTime = cpu_to_le64(time); 358338c8a9a5SSteve French time = ksmbd_UnixTimeToNT(ksmbd_kstat->kstat->atime); 358438c8a9a5SSteve French posix_info->LastAccessTime = cpu_to_le64(time); 358538c8a9a5SSteve French time = ksmbd_UnixTimeToNT(ksmbd_kstat->kstat->mtime); 358638c8a9a5SSteve French posix_info->LastWriteTime = cpu_to_le64(time); 358738c8a9a5SSteve French posix_info->EndOfFile = cpu_to_le64(ksmbd_kstat->kstat->size); 358838c8a9a5SSteve French posix_info->AllocationSize = cpu_to_le64(ksmbd_kstat->kstat->blocks << 9); 358938c8a9a5SSteve French posix_info->DeviceId = cpu_to_le32(ksmbd_kstat->kstat->rdev); 359038c8a9a5SSteve French posix_info->HardLinks = cpu_to_le32(ksmbd_kstat->kstat->nlink); 359138c8a9a5SSteve French posix_info->Mode = cpu_to_le32(ksmbd_kstat->kstat->mode & 0777); 359238c8a9a5SSteve French posix_info->Inode = cpu_to_le64(ksmbd_kstat->kstat->ino); 359338c8a9a5SSteve French posix_info->DosAttributes = 359438c8a9a5SSteve French S_ISDIR(ksmbd_kstat->kstat->mode) ? 359538c8a9a5SSteve French FILE_ATTRIBUTE_DIRECTORY_LE : FILE_ATTRIBUTE_ARCHIVE_LE; 359638c8a9a5SSteve French if (d_info->hide_dot_file && d_info->name[0] == '.') 359738c8a9a5SSteve French posix_info->DosAttributes |= FILE_ATTRIBUTE_HIDDEN_LE; 359838c8a9a5SSteve French /* 359938c8a9a5SSteve French * SidBuffer(32) contain two sids(Domain sid(16), UNIX group sid(16)). 360038c8a9a5SSteve French * UNIX sid(16) = revision(1) + num_subauth(1) + authority(6) + 360138c8a9a5SSteve French * sub_auth(4 * 1(num_subauth)) + RID(4). 360238c8a9a5SSteve French */ 360338c8a9a5SSteve French id_to_sid(from_kuid_munged(&init_user_ns, ksmbd_kstat->kstat->uid), 360438c8a9a5SSteve French SIDUNIX_USER, (struct smb_sid *)&posix_info->SidBuffer[0]); 360538c8a9a5SSteve French id_to_sid(from_kgid_munged(&init_user_ns, ksmbd_kstat->kstat->gid), 360638c8a9a5SSteve French SIDUNIX_GROUP, (struct smb_sid *)&posix_info->SidBuffer[16]); 360738c8a9a5SSteve French memcpy(posix_info->name, conv_name, conv_len); 360838c8a9a5SSteve French posix_info->name_len = cpu_to_le32(conv_len); 360938c8a9a5SSteve French posix_info->NextEntryOffset = cpu_to_le32(next_entry_offset); 361038c8a9a5SSteve French break; 361138c8a9a5SSteve French } 361238c8a9a5SSteve French 361338c8a9a5SSteve French } /* switch (info_level) */ 361438c8a9a5SSteve French 361538c8a9a5SSteve French d_info->last_entry_offset = d_info->data_count; 361638c8a9a5SSteve French d_info->data_count += next_entry_offset; 361738c8a9a5SSteve French d_info->out_buf_len -= next_entry_offset; 361838c8a9a5SSteve French d_info->wptr += next_entry_offset; 361938c8a9a5SSteve French 362038c8a9a5SSteve French ksmbd_debug(SMB, 362138c8a9a5SSteve French "info_level : %d, buf_len :%d, next_offset : %d, data_count : %d\n", 362238c8a9a5SSteve French info_level, d_info->out_buf_len, 362338c8a9a5SSteve French next_entry_offset, d_info->data_count); 362438c8a9a5SSteve French 362538c8a9a5SSteve French free_conv_name: 362638c8a9a5SSteve French kfree(conv_name); 362738c8a9a5SSteve French return rc; 362838c8a9a5SSteve French } 362938c8a9a5SSteve French 363038c8a9a5SSteve French struct smb2_query_dir_private { 363138c8a9a5SSteve French struct ksmbd_work *work; 363238c8a9a5SSteve French char *search_pattern; 363338c8a9a5SSteve French struct ksmbd_file *dir_fp; 363438c8a9a5SSteve French 363538c8a9a5SSteve French struct ksmbd_dir_info *d_info; 363638c8a9a5SSteve French int info_level; 363738c8a9a5SSteve French }; 363838c8a9a5SSteve French 363938c8a9a5SSteve French static void lock_dir(struct ksmbd_file *dir_fp) 364038c8a9a5SSteve French { 364138c8a9a5SSteve French struct dentry *dir = dir_fp->filp->f_path.dentry; 364238c8a9a5SSteve French 364338c8a9a5SSteve French inode_lock_nested(d_inode(dir), I_MUTEX_PARENT); 364438c8a9a5SSteve French } 364538c8a9a5SSteve French 364638c8a9a5SSteve French static void unlock_dir(struct ksmbd_file *dir_fp) 364738c8a9a5SSteve French { 364838c8a9a5SSteve French struct dentry *dir = dir_fp->filp->f_path.dentry; 364938c8a9a5SSteve French 365038c8a9a5SSteve French inode_unlock(d_inode(dir)); 365138c8a9a5SSteve French } 365238c8a9a5SSteve French 365338c8a9a5SSteve French static int process_query_dir_entries(struct smb2_query_dir_private *priv) 365438c8a9a5SSteve French { 365538c8a9a5SSteve French struct mnt_idmap *idmap = file_mnt_idmap(priv->dir_fp->filp); 365638c8a9a5SSteve French struct kstat kstat; 365738c8a9a5SSteve French struct ksmbd_kstat ksmbd_kstat; 365838c8a9a5SSteve French int rc; 365938c8a9a5SSteve French int i; 366038c8a9a5SSteve French 366138c8a9a5SSteve French for (i = 0; i < priv->d_info->num_entry; i++) { 366238c8a9a5SSteve French struct dentry *dent; 366338c8a9a5SSteve French 366438c8a9a5SSteve French if (dentry_name(priv->d_info, priv->info_level)) 366538c8a9a5SSteve French return -EINVAL; 366638c8a9a5SSteve French 366738c8a9a5SSteve French lock_dir(priv->dir_fp); 366838c8a9a5SSteve French dent = lookup_one(idmap, priv->d_info->name, 366938c8a9a5SSteve French priv->dir_fp->filp->f_path.dentry, 367038c8a9a5SSteve French priv->d_info->name_len); 367138c8a9a5SSteve French unlock_dir(priv->dir_fp); 367238c8a9a5SSteve French 367338c8a9a5SSteve French if (IS_ERR(dent)) { 367438c8a9a5SSteve French ksmbd_debug(SMB, "Cannot lookup `%s' [%ld]\n", 367538c8a9a5SSteve French priv->d_info->name, 367638c8a9a5SSteve French PTR_ERR(dent)); 367738c8a9a5SSteve French continue; 367838c8a9a5SSteve French } 367938c8a9a5SSteve French if (unlikely(d_is_negative(dent))) { 368038c8a9a5SSteve French dput(dent); 368138c8a9a5SSteve French ksmbd_debug(SMB, "Negative dentry `%s'\n", 368238c8a9a5SSteve French priv->d_info->name); 368338c8a9a5SSteve French continue; 368438c8a9a5SSteve French } 368538c8a9a5SSteve French 368638c8a9a5SSteve French ksmbd_kstat.kstat = &kstat; 368738c8a9a5SSteve French if (priv->info_level != FILE_NAMES_INFORMATION) 368838c8a9a5SSteve French ksmbd_vfs_fill_dentry_attrs(priv->work, 368938c8a9a5SSteve French idmap, 369038c8a9a5SSteve French dent, 369138c8a9a5SSteve French &ksmbd_kstat); 369238c8a9a5SSteve French 369338c8a9a5SSteve French rc = smb2_populate_readdir_entry(priv->work->conn, 369438c8a9a5SSteve French priv->info_level, 369538c8a9a5SSteve French priv->d_info, 369638c8a9a5SSteve French &ksmbd_kstat); 369738c8a9a5SSteve French dput(dent); 369838c8a9a5SSteve French if (rc) 369938c8a9a5SSteve French return rc; 370038c8a9a5SSteve French } 370138c8a9a5SSteve French return 0; 370238c8a9a5SSteve French } 370338c8a9a5SSteve French 370438c8a9a5SSteve French static int reserve_populate_dentry(struct ksmbd_dir_info *d_info, 370538c8a9a5SSteve French int info_level) 370638c8a9a5SSteve French { 370738c8a9a5SSteve French int struct_sz; 370838c8a9a5SSteve French int conv_len; 370938c8a9a5SSteve French int next_entry_offset; 371038c8a9a5SSteve French 371138c8a9a5SSteve French struct_sz = readdir_info_level_struct_sz(info_level); 371238c8a9a5SSteve French if (struct_sz == -EOPNOTSUPP) 371338c8a9a5SSteve French return -EOPNOTSUPP; 371438c8a9a5SSteve French 371538c8a9a5SSteve French conv_len = (d_info->name_len + 1) * 2; 371638c8a9a5SSteve French next_entry_offset = ALIGN(struct_sz + conv_len, 371738c8a9a5SSteve French KSMBD_DIR_INFO_ALIGNMENT); 371838c8a9a5SSteve French 371938c8a9a5SSteve French if (next_entry_offset > d_info->out_buf_len) { 372038c8a9a5SSteve French d_info->out_buf_len = 0; 372138c8a9a5SSteve French return -ENOSPC; 372238c8a9a5SSteve French } 372338c8a9a5SSteve French 372438c8a9a5SSteve French switch (info_level) { 372538c8a9a5SSteve French case FILE_FULL_DIRECTORY_INFORMATION: 372638c8a9a5SSteve French { 372738c8a9a5SSteve French struct file_full_directory_info *ffdinfo; 372838c8a9a5SSteve French 372938c8a9a5SSteve French ffdinfo = (struct file_full_directory_info *)d_info->wptr; 373038c8a9a5SSteve French memcpy(ffdinfo->FileName, d_info->name, d_info->name_len); 373138c8a9a5SSteve French ffdinfo->FileName[d_info->name_len] = 0x00; 373238c8a9a5SSteve French ffdinfo->FileNameLength = cpu_to_le32(d_info->name_len); 373338c8a9a5SSteve French ffdinfo->NextEntryOffset = cpu_to_le32(next_entry_offset); 373438c8a9a5SSteve French break; 373538c8a9a5SSteve French } 373638c8a9a5SSteve French case FILE_BOTH_DIRECTORY_INFORMATION: 373738c8a9a5SSteve French { 373838c8a9a5SSteve French struct file_both_directory_info *fbdinfo; 373938c8a9a5SSteve French 374038c8a9a5SSteve French fbdinfo = (struct file_both_directory_info *)d_info->wptr; 374138c8a9a5SSteve French memcpy(fbdinfo->FileName, d_info->name, d_info->name_len); 374238c8a9a5SSteve French fbdinfo->FileName[d_info->name_len] = 0x00; 374338c8a9a5SSteve French fbdinfo->FileNameLength = cpu_to_le32(d_info->name_len); 374438c8a9a5SSteve French fbdinfo->NextEntryOffset = cpu_to_le32(next_entry_offset); 374538c8a9a5SSteve French break; 374638c8a9a5SSteve French } 374738c8a9a5SSteve French case FILE_DIRECTORY_INFORMATION: 374838c8a9a5SSteve French { 374938c8a9a5SSteve French struct file_directory_info *fdinfo; 375038c8a9a5SSteve French 375138c8a9a5SSteve French fdinfo = (struct file_directory_info *)d_info->wptr; 375238c8a9a5SSteve French memcpy(fdinfo->FileName, d_info->name, d_info->name_len); 375338c8a9a5SSteve French fdinfo->FileName[d_info->name_len] = 0x00; 375438c8a9a5SSteve French fdinfo->FileNameLength = cpu_to_le32(d_info->name_len); 375538c8a9a5SSteve French fdinfo->NextEntryOffset = cpu_to_le32(next_entry_offset); 375638c8a9a5SSteve French break; 375738c8a9a5SSteve French } 375838c8a9a5SSteve French case FILE_NAMES_INFORMATION: 375938c8a9a5SSteve French { 376038c8a9a5SSteve French struct file_names_info *fninfo; 376138c8a9a5SSteve French 376238c8a9a5SSteve French fninfo = (struct file_names_info *)d_info->wptr; 376338c8a9a5SSteve French memcpy(fninfo->FileName, d_info->name, d_info->name_len); 376438c8a9a5SSteve French fninfo->FileName[d_info->name_len] = 0x00; 376538c8a9a5SSteve French fninfo->FileNameLength = cpu_to_le32(d_info->name_len); 376638c8a9a5SSteve French fninfo->NextEntryOffset = cpu_to_le32(next_entry_offset); 376738c8a9a5SSteve French break; 376838c8a9a5SSteve French } 376938c8a9a5SSteve French case FILEID_FULL_DIRECTORY_INFORMATION: 377038c8a9a5SSteve French { 377138c8a9a5SSteve French struct file_id_full_dir_info *dinfo; 377238c8a9a5SSteve French 377338c8a9a5SSteve French dinfo = (struct file_id_full_dir_info *)d_info->wptr; 377438c8a9a5SSteve French memcpy(dinfo->FileName, d_info->name, d_info->name_len); 377538c8a9a5SSteve French dinfo->FileName[d_info->name_len] = 0x00; 377638c8a9a5SSteve French dinfo->FileNameLength = cpu_to_le32(d_info->name_len); 377738c8a9a5SSteve French dinfo->NextEntryOffset = cpu_to_le32(next_entry_offset); 377838c8a9a5SSteve French break; 377938c8a9a5SSteve French } 378038c8a9a5SSteve French case FILEID_BOTH_DIRECTORY_INFORMATION: 378138c8a9a5SSteve French { 378238c8a9a5SSteve French struct file_id_both_directory_info *fibdinfo; 378338c8a9a5SSteve French 378438c8a9a5SSteve French fibdinfo = (struct file_id_both_directory_info *)d_info->wptr; 378538c8a9a5SSteve French memcpy(fibdinfo->FileName, d_info->name, d_info->name_len); 378638c8a9a5SSteve French fibdinfo->FileName[d_info->name_len] = 0x00; 378738c8a9a5SSteve French fibdinfo->FileNameLength = cpu_to_le32(d_info->name_len); 378838c8a9a5SSteve French fibdinfo->NextEntryOffset = cpu_to_le32(next_entry_offset); 378938c8a9a5SSteve French break; 379038c8a9a5SSteve French } 379138c8a9a5SSteve French case SMB_FIND_FILE_POSIX_INFO: 379238c8a9a5SSteve French { 379338c8a9a5SSteve French struct smb2_posix_info *posix_info; 379438c8a9a5SSteve French 379538c8a9a5SSteve French posix_info = (struct smb2_posix_info *)d_info->wptr; 379638c8a9a5SSteve French memcpy(posix_info->name, d_info->name, d_info->name_len); 379738c8a9a5SSteve French posix_info->name[d_info->name_len] = 0x00; 379838c8a9a5SSteve French posix_info->name_len = cpu_to_le32(d_info->name_len); 379938c8a9a5SSteve French posix_info->NextEntryOffset = 380038c8a9a5SSteve French cpu_to_le32(next_entry_offset); 380138c8a9a5SSteve French break; 380238c8a9a5SSteve French } 380338c8a9a5SSteve French } /* switch (info_level) */ 380438c8a9a5SSteve French 380538c8a9a5SSteve French d_info->num_entry++; 380638c8a9a5SSteve French d_info->out_buf_len -= next_entry_offset; 380738c8a9a5SSteve French d_info->wptr += next_entry_offset; 380838c8a9a5SSteve French return 0; 380938c8a9a5SSteve French } 381038c8a9a5SSteve French 381138c8a9a5SSteve French static bool __query_dir(struct dir_context *ctx, const char *name, int namlen, 381238c8a9a5SSteve French loff_t offset, u64 ino, unsigned int d_type) 381338c8a9a5SSteve French { 381438c8a9a5SSteve French struct ksmbd_readdir_data *buf; 381538c8a9a5SSteve French struct smb2_query_dir_private *priv; 381638c8a9a5SSteve French struct ksmbd_dir_info *d_info; 381738c8a9a5SSteve French int rc; 381838c8a9a5SSteve French 381938c8a9a5SSteve French buf = container_of(ctx, struct ksmbd_readdir_data, ctx); 382038c8a9a5SSteve French priv = buf->private; 382138c8a9a5SSteve French d_info = priv->d_info; 382238c8a9a5SSteve French 382338c8a9a5SSteve French /* dot and dotdot entries are already reserved */ 382438c8a9a5SSteve French if (!strcmp(".", name) || !strcmp("..", name)) 382538c8a9a5SSteve French return true; 382638c8a9a5SSteve French if (ksmbd_share_veto_filename(priv->work->tcon->share_conf, name)) 382738c8a9a5SSteve French return true; 382838c8a9a5SSteve French if (!match_pattern(name, namlen, priv->search_pattern)) 382938c8a9a5SSteve French return true; 383038c8a9a5SSteve French 383138c8a9a5SSteve French d_info->name = name; 383238c8a9a5SSteve French d_info->name_len = namlen; 383338c8a9a5SSteve French rc = reserve_populate_dentry(d_info, priv->info_level); 383438c8a9a5SSteve French if (rc) 383538c8a9a5SSteve French return false; 383638c8a9a5SSteve French if (d_info->flags & SMB2_RETURN_SINGLE_ENTRY) 383738c8a9a5SSteve French d_info->out_buf_len = 0; 383838c8a9a5SSteve French return true; 383938c8a9a5SSteve French } 384038c8a9a5SSteve French 384138c8a9a5SSteve French static int verify_info_level(int info_level) 384238c8a9a5SSteve French { 384338c8a9a5SSteve French switch (info_level) { 384438c8a9a5SSteve French case FILE_FULL_DIRECTORY_INFORMATION: 384538c8a9a5SSteve French case FILE_BOTH_DIRECTORY_INFORMATION: 384638c8a9a5SSteve French case FILE_DIRECTORY_INFORMATION: 384738c8a9a5SSteve French case FILE_NAMES_INFORMATION: 384838c8a9a5SSteve French case FILEID_FULL_DIRECTORY_INFORMATION: 384938c8a9a5SSteve French case FILEID_BOTH_DIRECTORY_INFORMATION: 385038c8a9a5SSteve French case SMB_FIND_FILE_POSIX_INFO: 385138c8a9a5SSteve French break; 385238c8a9a5SSteve French default: 385338c8a9a5SSteve French return -EOPNOTSUPP; 385438c8a9a5SSteve French } 385538c8a9a5SSteve French 385638c8a9a5SSteve French return 0; 385738c8a9a5SSteve French } 385838c8a9a5SSteve French 385938c8a9a5SSteve French static int smb2_resp_buf_len(struct ksmbd_work *work, unsigned short hdr2_len) 386038c8a9a5SSteve French { 386138c8a9a5SSteve French int free_len; 386238c8a9a5SSteve French 386338c8a9a5SSteve French free_len = (int)(work->response_sz - 386438c8a9a5SSteve French (get_rfc1002_len(work->response_buf) + 4)) - hdr2_len; 386538c8a9a5SSteve French return free_len; 386638c8a9a5SSteve French } 386738c8a9a5SSteve French 386838c8a9a5SSteve French static int smb2_calc_max_out_buf_len(struct ksmbd_work *work, 386938c8a9a5SSteve French unsigned short hdr2_len, 387038c8a9a5SSteve French unsigned int out_buf_len) 387138c8a9a5SSteve French { 387238c8a9a5SSteve French int free_len; 387338c8a9a5SSteve French 387438c8a9a5SSteve French if (out_buf_len > work->conn->vals->max_trans_size) 387538c8a9a5SSteve French return -EINVAL; 387638c8a9a5SSteve French 387738c8a9a5SSteve French free_len = smb2_resp_buf_len(work, hdr2_len); 387838c8a9a5SSteve French if (free_len < 0) 387938c8a9a5SSteve French return -EINVAL; 388038c8a9a5SSteve French 388138c8a9a5SSteve French return min_t(int, out_buf_len, free_len); 388238c8a9a5SSteve French } 388338c8a9a5SSteve French 388438c8a9a5SSteve French int smb2_query_dir(struct ksmbd_work *work) 388538c8a9a5SSteve French { 388638c8a9a5SSteve French struct ksmbd_conn *conn = work->conn; 388738c8a9a5SSteve French struct smb2_query_directory_req *req; 388838c8a9a5SSteve French struct smb2_query_directory_rsp *rsp; 388938c8a9a5SSteve French struct ksmbd_share_config *share = work->tcon->share_conf; 389038c8a9a5SSteve French struct ksmbd_file *dir_fp = NULL; 389138c8a9a5SSteve French struct ksmbd_dir_info d_info; 389238c8a9a5SSteve French int rc = 0; 389338c8a9a5SSteve French char *srch_ptr = NULL; 389438c8a9a5SSteve French unsigned char srch_flag; 389538c8a9a5SSteve French int buffer_sz; 389638c8a9a5SSteve French struct smb2_query_dir_private query_dir_private = {NULL, }; 389738c8a9a5SSteve French 389838c8a9a5SSteve French WORK_BUFFERS(work, req, rsp); 389938c8a9a5SSteve French 390038c8a9a5SSteve French if (ksmbd_override_fsids(work)) { 390138c8a9a5SSteve French rsp->hdr.Status = STATUS_NO_MEMORY; 390238c8a9a5SSteve French smb2_set_err_rsp(work); 390338c8a9a5SSteve French return -ENOMEM; 390438c8a9a5SSteve French } 390538c8a9a5SSteve French 390638c8a9a5SSteve French rc = verify_info_level(req->FileInformationClass); 390738c8a9a5SSteve French if (rc) { 390838c8a9a5SSteve French rc = -EFAULT; 390938c8a9a5SSteve French goto err_out2; 391038c8a9a5SSteve French } 391138c8a9a5SSteve French 391238c8a9a5SSteve French dir_fp = ksmbd_lookup_fd_slow(work, req->VolatileFileId, req->PersistentFileId); 391338c8a9a5SSteve French if (!dir_fp) { 391438c8a9a5SSteve French rc = -EBADF; 391538c8a9a5SSteve French goto err_out2; 391638c8a9a5SSteve French } 391738c8a9a5SSteve French 391838c8a9a5SSteve French if (!(dir_fp->daccess & FILE_LIST_DIRECTORY_LE) || 391938c8a9a5SSteve French inode_permission(file_mnt_idmap(dir_fp->filp), 392038c8a9a5SSteve French file_inode(dir_fp->filp), 392138c8a9a5SSteve French MAY_READ | MAY_EXEC)) { 392238c8a9a5SSteve French pr_err("no right to enumerate directory (%pD)\n", dir_fp->filp); 392338c8a9a5SSteve French rc = -EACCES; 392438c8a9a5SSteve French goto err_out2; 392538c8a9a5SSteve French } 392638c8a9a5SSteve French 392738c8a9a5SSteve French if (!S_ISDIR(file_inode(dir_fp->filp)->i_mode)) { 392838c8a9a5SSteve French pr_err("can't do query dir for a file\n"); 392938c8a9a5SSteve French rc = -EINVAL; 393038c8a9a5SSteve French goto err_out2; 393138c8a9a5SSteve French } 393238c8a9a5SSteve French 393338c8a9a5SSteve French srch_flag = req->Flags; 393438c8a9a5SSteve French srch_ptr = smb_strndup_from_utf16(req->Buffer, 393538c8a9a5SSteve French le16_to_cpu(req->FileNameLength), 1, 393638c8a9a5SSteve French conn->local_nls); 393738c8a9a5SSteve French if (IS_ERR(srch_ptr)) { 393838c8a9a5SSteve French ksmbd_debug(SMB, "Search Pattern not found\n"); 393938c8a9a5SSteve French rc = -EINVAL; 394038c8a9a5SSteve French goto err_out2; 394138c8a9a5SSteve French } else { 394238c8a9a5SSteve French ksmbd_debug(SMB, "Search pattern is %s\n", srch_ptr); 394338c8a9a5SSteve French } 394438c8a9a5SSteve French 394538c8a9a5SSteve French if (srch_flag & SMB2_REOPEN || srch_flag & SMB2_RESTART_SCANS) { 394638c8a9a5SSteve French ksmbd_debug(SMB, "Restart directory scan\n"); 394738c8a9a5SSteve French generic_file_llseek(dir_fp->filp, 0, SEEK_SET); 394838c8a9a5SSteve French } 394938c8a9a5SSteve French 395038c8a9a5SSteve French memset(&d_info, 0, sizeof(struct ksmbd_dir_info)); 395138c8a9a5SSteve French d_info.wptr = (char *)rsp->Buffer; 395238c8a9a5SSteve French d_info.rptr = (char *)rsp->Buffer; 395338c8a9a5SSteve French d_info.out_buf_len = 395438c8a9a5SSteve French smb2_calc_max_out_buf_len(work, 8, 395538c8a9a5SSteve French le32_to_cpu(req->OutputBufferLength)); 395638c8a9a5SSteve French if (d_info.out_buf_len < 0) { 395738c8a9a5SSteve French rc = -EINVAL; 395838c8a9a5SSteve French goto err_out; 395938c8a9a5SSteve French } 396038c8a9a5SSteve French d_info.flags = srch_flag; 396138c8a9a5SSteve French 396238c8a9a5SSteve French /* 396338c8a9a5SSteve French * reserve dot and dotdot entries in head of buffer 396438c8a9a5SSteve French * in first response 396538c8a9a5SSteve French */ 396638c8a9a5SSteve French rc = ksmbd_populate_dot_dotdot_entries(work, req->FileInformationClass, 396738c8a9a5SSteve French dir_fp, &d_info, srch_ptr, 396838c8a9a5SSteve French smb2_populate_readdir_entry); 396938c8a9a5SSteve French if (rc == -ENOSPC) 397038c8a9a5SSteve French rc = 0; 397138c8a9a5SSteve French else if (rc) 397238c8a9a5SSteve French goto err_out; 397338c8a9a5SSteve French 397438c8a9a5SSteve French if (test_share_config_flag(share, KSMBD_SHARE_FLAG_HIDE_DOT_FILES)) 397538c8a9a5SSteve French d_info.hide_dot_file = true; 397638c8a9a5SSteve French 397738c8a9a5SSteve French buffer_sz = d_info.out_buf_len; 397838c8a9a5SSteve French d_info.rptr = d_info.wptr; 397938c8a9a5SSteve French query_dir_private.work = work; 398038c8a9a5SSteve French query_dir_private.search_pattern = srch_ptr; 398138c8a9a5SSteve French query_dir_private.dir_fp = dir_fp; 398238c8a9a5SSteve French query_dir_private.d_info = &d_info; 398338c8a9a5SSteve French query_dir_private.info_level = req->FileInformationClass; 398438c8a9a5SSteve French dir_fp->readdir_data.private = &query_dir_private; 398538c8a9a5SSteve French set_ctx_actor(&dir_fp->readdir_data.ctx, __query_dir); 398638c8a9a5SSteve French 398738c8a9a5SSteve French rc = iterate_dir(dir_fp->filp, &dir_fp->readdir_data.ctx); 398838c8a9a5SSteve French /* 398938c8a9a5SSteve French * req->OutputBufferLength is too small to contain even one entry. 399038c8a9a5SSteve French * In this case, it immediately returns OutputBufferLength 0 to client. 399138c8a9a5SSteve French */ 399238c8a9a5SSteve French if (!d_info.out_buf_len && !d_info.num_entry) 399338c8a9a5SSteve French goto no_buf_len; 399438c8a9a5SSteve French if (rc > 0 || rc == -ENOSPC) 399538c8a9a5SSteve French rc = 0; 399638c8a9a5SSteve French else if (rc) 399738c8a9a5SSteve French goto err_out; 399838c8a9a5SSteve French 399938c8a9a5SSteve French d_info.wptr = d_info.rptr; 400038c8a9a5SSteve French d_info.out_buf_len = buffer_sz; 400138c8a9a5SSteve French rc = process_query_dir_entries(&query_dir_private); 400238c8a9a5SSteve French if (rc) 400338c8a9a5SSteve French goto err_out; 400438c8a9a5SSteve French 400538c8a9a5SSteve French if (!d_info.data_count && d_info.out_buf_len >= 0) { 400638c8a9a5SSteve French if (srch_flag & SMB2_RETURN_SINGLE_ENTRY && !is_asterisk(srch_ptr)) { 400738c8a9a5SSteve French rsp->hdr.Status = STATUS_NO_SUCH_FILE; 400838c8a9a5SSteve French } else { 400938c8a9a5SSteve French dir_fp->dot_dotdot[0] = dir_fp->dot_dotdot[1] = 0; 401038c8a9a5SSteve French rsp->hdr.Status = STATUS_NO_MORE_FILES; 401138c8a9a5SSteve French } 401238c8a9a5SSteve French rsp->StructureSize = cpu_to_le16(9); 401338c8a9a5SSteve French rsp->OutputBufferOffset = cpu_to_le16(0); 401438c8a9a5SSteve French rsp->OutputBufferLength = cpu_to_le32(0); 401538c8a9a5SSteve French rsp->Buffer[0] = 0; 401638c8a9a5SSteve French inc_rfc1001_len(work->response_buf, 9); 401738c8a9a5SSteve French } else { 401838c8a9a5SSteve French no_buf_len: 401938c8a9a5SSteve French ((struct file_directory_info *) 402038c8a9a5SSteve French ((char *)rsp->Buffer + d_info.last_entry_offset)) 402138c8a9a5SSteve French ->NextEntryOffset = 0; 402238c8a9a5SSteve French if (d_info.data_count >= d_info.last_entry_off_align) 402338c8a9a5SSteve French d_info.data_count -= d_info.last_entry_off_align; 402438c8a9a5SSteve French 402538c8a9a5SSteve French rsp->StructureSize = cpu_to_le16(9); 402638c8a9a5SSteve French rsp->OutputBufferOffset = cpu_to_le16(72); 402738c8a9a5SSteve French rsp->OutputBufferLength = cpu_to_le32(d_info.data_count); 402838c8a9a5SSteve French inc_rfc1001_len(work->response_buf, 8 + d_info.data_count); 402938c8a9a5SSteve French } 403038c8a9a5SSteve French 403138c8a9a5SSteve French kfree(srch_ptr); 403238c8a9a5SSteve French ksmbd_fd_put(work, dir_fp); 403338c8a9a5SSteve French ksmbd_revert_fsids(work); 403438c8a9a5SSteve French return 0; 403538c8a9a5SSteve French 403638c8a9a5SSteve French err_out: 403738c8a9a5SSteve French pr_err("error while processing smb2 query dir rc = %d\n", rc); 403838c8a9a5SSteve French kfree(srch_ptr); 403938c8a9a5SSteve French 404038c8a9a5SSteve French err_out2: 404138c8a9a5SSteve French if (rc == -EINVAL) 404238c8a9a5SSteve French rsp->hdr.Status = STATUS_INVALID_PARAMETER; 404338c8a9a5SSteve French else if (rc == -EACCES) 404438c8a9a5SSteve French rsp->hdr.Status = STATUS_ACCESS_DENIED; 404538c8a9a5SSteve French else if (rc == -ENOENT) 404638c8a9a5SSteve French rsp->hdr.Status = STATUS_NO_SUCH_FILE; 404738c8a9a5SSteve French else if (rc == -EBADF) 404838c8a9a5SSteve French rsp->hdr.Status = STATUS_FILE_CLOSED; 404938c8a9a5SSteve French else if (rc == -ENOMEM) 405038c8a9a5SSteve French rsp->hdr.Status = STATUS_NO_MEMORY; 405138c8a9a5SSteve French else if (rc == -EFAULT) 405238c8a9a5SSteve French rsp->hdr.Status = STATUS_INVALID_INFO_CLASS; 405338c8a9a5SSteve French else if (rc == -EIO) 405438c8a9a5SSteve French rsp->hdr.Status = STATUS_FILE_CORRUPT_ERROR; 405538c8a9a5SSteve French if (!rsp->hdr.Status) 405638c8a9a5SSteve French rsp->hdr.Status = STATUS_UNEXPECTED_IO_ERROR; 405738c8a9a5SSteve French 405838c8a9a5SSteve French smb2_set_err_rsp(work); 405938c8a9a5SSteve French ksmbd_fd_put(work, dir_fp); 406038c8a9a5SSteve French ksmbd_revert_fsids(work); 406138c8a9a5SSteve French return 0; 406238c8a9a5SSteve French } 406338c8a9a5SSteve French 406438c8a9a5SSteve French /** 406538c8a9a5SSteve French * buffer_check_err() - helper function to check buffer errors 406638c8a9a5SSteve French * @reqOutputBufferLength: max buffer length expected in command response 406738c8a9a5SSteve French * @rsp: query info response buffer contains output buffer length 406838c8a9a5SSteve French * @rsp_org: base response buffer pointer in case of chained response 406938c8a9a5SSteve French * @infoclass_size: query info class response buffer size 407038c8a9a5SSteve French * 407138c8a9a5SSteve French * Return: 0 on success, otherwise error 407238c8a9a5SSteve French */ 407338c8a9a5SSteve French static int buffer_check_err(int reqOutputBufferLength, 407438c8a9a5SSteve French struct smb2_query_info_rsp *rsp, 407538c8a9a5SSteve French void *rsp_org, int infoclass_size) 407638c8a9a5SSteve French { 407738c8a9a5SSteve French if (reqOutputBufferLength < le32_to_cpu(rsp->OutputBufferLength)) { 407838c8a9a5SSteve French if (reqOutputBufferLength < infoclass_size) { 407938c8a9a5SSteve French pr_err("Invalid Buffer Size Requested\n"); 408038c8a9a5SSteve French rsp->hdr.Status = STATUS_INFO_LENGTH_MISMATCH; 408138c8a9a5SSteve French *(__be32 *)rsp_org = cpu_to_be32(sizeof(struct smb2_hdr)); 408238c8a9a5SSteve French return -EINVAL; 408338c8a9a5SSteve French } 408438c8a9a5SSteve French 408538c8a9a5SSteve French ksmbd_debug(SMB, "Buffer Overflow\n"); 408638c8a9a5SSteve French rsp->hdr.Status = STATUS_BUFFER_OVERFLOW; 408738c8a9a5SSteve French *(__be32 *)rsp_org = cpu_to_be32(sizeof(struct smb2_hdr) + 408838c8a9a5SSteve French reqOutputBufferLength); 408938c8a9a5SSteve French rsp->OutputBufferLength = cpu_to_le32(reqOutputBufferLength); 409038c8a9a5SSteve French } 409138c8a9a5SSteve French return 0; 409238c8a9a5SSteve French } 409338c8a9a5SSteve French 409438c8a9a5SSteve French static void get_standard_info_pipe(struct smb2_query_info_rsp *rsp, 409538c8a9a5SSteve French void *rsp_org) 409638c8a9a5SSteve French { 409738c8a9a5SSteve French struct smb2_file_standard_info *sinfo; 409838c8a9a5SSteve French 409938c8a9a5SSteve French sinfo = (struct smb2_file_standard_info *)rsp->Buffer; 410038c8a9a5SSteve French 410138c8a9a5SSteve French sinfo->AllocationSize = cpu_to_le64(4096); 410238c8a9a5SSteve French sinfo->EndOfFile = cpu_to_le64(0); 410338c8a9a5SSteve French sinfo->NumberOfLinks = cpu_to_le32(1); 410438c8a9a5SSteve French sinfo->DeletePending = 1; 410538c8a9a5SSteve French sinfo->Directory = 0; 410638c8a9a5SSteve French rsp->OutputBufferLength = 410738c8a9a5SSteve French cpu_to_le32(sizeof(struct smb2_file_standard_info)); 410838c8a9a5SSteve French inc_rfc1001_len(rsp_org, sizeof(struct smb2_file_standard_info)); 410938c8a9a5SSteve French } 411038c8a9a5SSteve French 411138c8a9a5SSteve French static void get_internal_info_pipe(struct smb2_query_info_rsp *rsp, u64 num, 411238c8a9a5SSteve French void *rsp_org) 411338c8a9a5SSteve French { 411438c8a9a5SSteve French struct smb2_file_internal_info *file_info; 411538c8a9a5SSteve French 411638c8a9a5SSteve French file_info = (struct smb2_file_internal_info *)rsp->Buffer; 411738c8a9a5SSteve French 411838c8a9a5SSteve French /* any unique number */ 411938c8a9a5SSteve French file_info->IndexNumber = cpu_to_le64(num | (1ULL << 63)); 412038c8a9a5SSteve French rsp->OutputBufferLength = 412138c8a9a5SSteve French cpu_to_le32(sizeof(struct smb2_file_internal_info)); 412238c8a9a5SSteve French inc_rfc1001_len(rsp_org, sizeof(struct smb2_file_internal_info)); 412338c8a9a5SSteve French } 412438c8a9a5SSteve French 412538c8a9a5SSteve French static int smb2_get_info_file_pipe(struct ksmbd_session *sess, 412638c8a9a5SSteve French struct smb2_query_info_req *req, 412738c8a9a5SSteve French struct smb2_query_info_rsp *rsp, 412838c8a9a5SSteve French void *rsp_org) 412938c8a9a5SSteve French { 413038c8a9a5SSteve French u64 id; 413138c8a9a5SSteve French int rc; 413238c8a9a5SSteve French 413338c8a9a5SSteve French /* 413438c8a9a5SSteve French * Windows can sometime send query file info request on 413538c8a9a5SSteve French * pipe without opening it, checking error condition here 413638c8a9a5SSteve French */ 413738c8a9a5SSteve French id = req->VolatileFileId; 413838c8a9a5SSteve French if (!ksmbd_session_rpc_method(sess, id)) 413938c8a9a5SSteve French return -ENOENT; 414038c8a9a5SSteve French 414138c8a9a5SSteve French ksmbd_debug(SMB, "FileInfoClass %u, FileId 0x%llx\n", 414238c8a9a5SSteve French req->FileInfoClass, req->VolatileFileId); 414338c8a9a5SSteve French 414438c8a9a5SSteve French switch (req->FileInfoClass) { 414538c8a9a5SSteve French case FILE_STANDARD_INFORMATION: 414638c8a9a5SSteve French get_standard_info_pipe(rsp, rsp_org); 414738c8a9a5SSteve French rc = buffer_check_err(le32_to_cpu(req->OutputBufferLength), 414838c8a9a5SSteve French rsp, rsp_org, 414938c8a9a5SSteve French FILE_STANDARD_INFORMATION_SIZE); 415038c8a9a5SSteve French break; 415138c8a9a5SSteve French case FILE_INTERNAL_INFORMATION: 415238c8a9a5SSteve French get_internal_info_pipe(rsp, id, rsp_org); 415338c8a9a5SSteve French rc = buffer_check_err(le32_to_cpu(req->OutputBufferLength), 415438c8a9a5SSteve French rsp, rsp_org, 415538c8a9a5SSteve French FILE_INTERNAL_INFORMATION_SIZE); 415638c8a9a5SSteve French break; 415738c8a9a5SSteve French default: 415838c8a9a5SSteve French ksmbd_debug(SMB, "smb2_info_file_pipe for %u not supported\n", 415938c8a9a5SSteve French req->FileInfoClass); 416038c8a9a5SSteve French rc = -EOPNOTSUPP; 416138c8a9a5SSteve French } 416238c8a9a5SSteve French return rc; 416338c8a9a5SSteve French } 416438c8a9a5SSteve French 416538c8a9a5SSteve French /** 416638c8a9a5SSteve French * smb2_get_ea() - handler for smb2 get extended attribute command 416738c8a9a5SSteve French * @work: smb work containing query info command buffer 416838c8a9a5SSteve French * @fp: ksmbd_file pointer 416938c8a9a5SSteve French * @req: get extended attribute request 417038c8a9a5SSteve French * @rsp: response buffer pointer 417138c8a9a5SSteve French * @rsp_org: base response buffer pointer in case of chained response 417238c8a9a5SSteve French * 417338c8a9a5SSteve French * Return: 0 on success, otherwise error 417438c8a9a5SSteve French */ 417538c8a9a5SSteve French static int smb2_get_ea(struct ksmbd_work *work, struct ksmbd_file *fp, 417638c8a9a5SSteve French struct smb2_query_info_req *req, 417738c8a9a5SSteve French struct smb2_query_info_rsp *rsp, void *rsp_org) 417838c8a9a5SSteve French { 417938c8a9a5SSteve French struct smb2_ea_info *eainfo, *prev_eainfo; 418038c8a9a5SSteve French char *name, *ptr, *xattr_list = NULL, *buf; 418138c8a9a5SSteve French int rc, name_len, value_len, xattr_list_len, idx; 418238c8a9a5SSteve French ssize_t buf_free_len, alignment_bytes, next_offset, rsp_data_cnt = 0; 418338c8a9a5SSteve French struct smb2_ea_info_req *ea_req = NULL; 418438c8a9a5SSteve French const struct path *path; 418538c8a9a5SSteve French struct mnt_idmap *idmap = file_mnt_idmap(fp->filp); 418638c8a9a5SSteve French 418738c8a9a5SSteve French if (!(fp->daccess & FILE_READ_EA_LE)) { 418838c8a9a5SSteve French pr_err("Not permitted to read ext attr : 0x%x\n", 418938c8a9a5SSteve French fp->daccess); 419038c8a9a5SSteve French return -EACCES; 419138c8a9a5SSteve French } 419238c8a9a5SSteve French 419338c8a9a5SSteve French path = &fp->filp->f_path; 419438c8a9a5SSteve French /* single EA entry is requested with given user.* name */ 419538c8a9a5SSteve French if (req->InputBufferLength) { 419638c8a9a5SSteve French if (le32_to_cpu(req->InputBufferLength) < 419738c8a9a5SSteve French sizeof(struct smb2_ea_info_req)) 419838c8a9a5SSteve French return -EINVAL; 419938c8a9a5SSteve French 420038c8a9a5SSteve French ea_req = (struct smb2_ea_info_req *)req->Buffer; 420138c8a9a5SSteve French } else { 420238c8a9a5SSteve French /* need to send all EAs, if no specific EA is requested*/ 420338c8a9a5SSteve French if (le32_to_cpu(req->Flags) & SL_RETURN_SINGLE_ENTRY) 420438c8a9a5SSteve French ksmbd_debug(SMB, 420538c8a9a5SSteve French "All EAs are requested but need to send single EA entry in rsp flags 0x%x\n", 420638c8a9a5SSteve French le32_to_cpu(req->Flags)); 420738c8a9a5SSteve French } 420838c8a9a5SSteve French 420938c8a9a5SSteve French buf_free_len = 421038c8a9a5SSteve French smb2_calc_max_out_buf_len(work, 8, 421138c8a9a5SSteve French le32_to_cpu(req->OutputBufferLength)); 421238c8a9a5SSteve French if (buf_free_len < 0) 421338c8a9a5SSteve French return -EINVAL; 421438c8a9a5SSteve French 421538c8a9a5SSteve French rc = ksmbd_vfs_listxattr(path->dentry, &xattr_list); 421638c8a9a5SSteve French if (rc < 0) { 421738c8a9a5SSteve French rsp->hdr.Status = STATUS_INVALID_HANDLE; 421838c8a9a5SSteve French goto out; 421938c8a9a5SSteve French } else if (!rc) { /* there is no EA in the file */ 422038c8a9a5SSteve French ksmbd_debug(SMB, "no ea data in the file\n"); 422138c8a9a5SSteve French goto done; 422238c8a9a5SSteve French } 422338c8a9a5SSteve French xattr_list_len = rc; 422438c8a9a5SSteve French 422538c8a9a5SSteve French ptr = (char *)rsp->Buffer; 422638c8a9a5SSteve French eainfo = (struct smb2_ea_info *)ptr; 422738c8a9a5SSteve French prev_eainfo = eainfo; 422838c8a9a5SSteve French idx = 0; 422938c8a9a5SSteve French 423038c8a9a5SSteve French while (idx < xattr_list_len) { 423138c8a9a5SSteve French name = xattr_list + idx; 423238c8a9a5SSteve French name_len = strlen(name); 423338c8a9a5SSteve French 423438c8a9a5SSteve French ksmbd_debug(SMB, "%s, len %d\n", name, name_len); 423538c8a9a5SSteve French idx += name_len + 1; 423638c8a9a5SSteve French 423738c8a9a5SSteve French /* 423838c8a9a5SSteve French * CIFS does not support EA other than user.* namespace, 423938c8a9a5SSteve French * still keep the framework generic, to list other attrs 424038c8a9a5SSteve French * in future. 424138c8a9a5SSteve French */ 424238c8a9a5SSteve French if (strncmp(name, XATTR_USER_PREFIX, XATTR_USER_PREFIX_LEN)) 424338c8a9a5SSteve French continue; 424438c8a9a5SSteve French 424538c8a9a5SSteve French if (!strncmp(&name[XATTR_USER_PREFIX_LEN], STREAM_PREFIX, 424638c8a9a5SSteve French STREAM_PREFIX_LEN)) 424738c8a9a5SSteve French continue; 424838c8a9a5SSteve French 424938c8a9a5SSteve French if (req->InputBufferLength && 425038c8a9a5SSteve French strncmp(&name[XATTR_USER_PREFIX_LEN], ea_req->name, 425138c8a9a5SSteve French ea_req->EaNameLength)) 425238c8a9a5SSteve French continue; 425338c8a9a5SSteve French 425438c8a9a5SSteve French if (!strncmp(&name[XATTR_USER_PREFIX_LEN], 425538c8a9a5SSteve French DOS_ATTRIBUTE_PREFIX, DOS_ATTRIBUTE_PREFIX_LEN)) 425638c8a9a5SSteve French continue; 425738c8a9a5SSteve French 425838c8a9a5SSteve French if (!strncmp(name, XATTR_USER_PREFIX, XATTR_USER_PREFIX_LEN)) 425938c8a9a5SSteve French name_len -= XATTR_USER_PREFIX_LEN; 426038c8a9a5SSteve French 426138c8a9a5SSteve French ptr = (char *)(&eainfo->name + name_len + 1); 426238c8a9a5SSteve French buf_free_len -= (offsetof(struct smb2_ea_info, name) + 426338c8a9a5SSteve French name_len + 1); 426438c8a9a5SSteve French /* bailout if xattr can't fit in buf_free_len */ 426538c8a9a5SSteve French value_len = ksmbd_vfs_getxattr(idmap, path->dentry, 426638c8a9a5SSteve French name, &buf); 426738c8a9a5SSteve French if (value_len <= 0) { 426838c8a9a5SSteve French rc = -ENOENT; 426938c8a9a5SSteve French rsp->hdr.Status = STATUS_INVALID_HANDLE; 427038c8a9a5SSteve French goto out; 427138c8a9a5SSteve French } 427238c8a9a5SSteve French 427338c8a9a5SSteve French buf_free_len -= value_len; 427438c8a9a5SSteve French if (buf_free_len < 0) { 427538c8a9a5SSteve French kfree(buf); 427638c8a9a5SSteve French break; 427738c8a9a5SSteve French } 427838c8a9a5SSteve French 427938c8a9a5SSteve French memcpy(ptr, buf, value_len); 428038c8a9a5SSteve French kfree(buf); 428138c8a9a5SSteve French 428238c8a9a5SSteve French ptr += value_len; 428338c8a9a5SSteve French eainfo->Flags = 0; 428438c8a9a5SSteve French eainfo->EaNameLength = name_len; 428538c8a9a5SSteve French 428638c8a9a5SSteve French if (!strncmp(name, XATTR_USER_PREFIX, XATTR_USER_PREFIX_LEN)) 428738c8a9a5SSteve French memcpy(eainfo->name, &name[XATTR_USER_PREFIX_LEN], 428838c8a9a5SSteve French name_len); 428938c8a9a5SSteve French else 429038c8a9a5SSteve French memcpy(eainfo->name, name, name_len); 429138c8a9a5SSteve French 429238c8a9a5SSteve French eainfo->name[name_len] = '\0'; 429338c8a9a5SSteve French eainfo->EaValueLength = cpu_to_le16(value_len); 429438c8a9a5SSteve French next_offset = offsetof(struct smb2_ea_info, name) + 429538c8a9a5SSteve French name_len + 1 + value_len; 429638c8a9a5SSteve French 429738c8a9a5SSteve French /* align next xattr entry at 4 byte bundary */ 429838c8a9a5SSteve French alignment_bytes = ((next_offset + 3) & ~3) - next_offset; 429938c8a9a5SSteve French if (alignment_bytes) { 430038c8a9a5SSteve French memset(ptr, '\0', alignment_bytes); 430138c8a9a5SSteve French ptr += alignment_bytes; 430238c8a9a5SSteve French next_offset += alignment_bytes; 430338c8a9a5SSteve French buf_free_len -= alignment_bytes; 430438c8a9a5SSteve French } 430538c8a9a5SSteve French eainfo->NextEntryOffset = cpu_to_le32(next_offset); 430638c8a9a5SSteve French prev_eainfo = eainfo; 430738c8a9a5SSteve French eainfo = (struct smb2_ea_info *)ptr; 430838c8a9a5SSteve French rsp_data_cnt += next_offset; 430938c8a9a5SSteve French 431038c8a9a5SSteve French if (req->InputBufferLength) { 431138c8a9a5SSteve French ksmbd_debug(SMB, "single entry requested\n"); 431238c8a9a5SSteve French break; 431338c8a9a5SSteve French } 431438c8a9a5SSteve French } 431538c8a9a5SSteve French 431638c8a9a5SSteve French /* no more ea entries */ 431738c8a9a5SSteve French prev_eainfo->NextEntryOffset = 0; 431838c8a9a5SSteve French done: 431938c8a9a5SSteve French rc = 0; 432038c8a9a5SSteve French if (rsp_data_cnt == 0) 432138c8a9a5SSteve French rsp->hdr.Status = STATUS_NO_EAS_ON_FILE; 432238c8a9a5SSteve French rsp->OutputBufferLength = cpu_to_le32(rsp_data_cnt); 432338c8a9a5SSteve French inc_rfc1001_len(rsp_org, rsp_data_cnt); 432438c8a9a5SSteve French out: 432538c8a9a5SSteve French kvfree(xattr_list); 432638c8a9a5SSteve French return rc; 432738c8a9a5SSteve French } 432838c8a9a5SSteve French 432938c8a9a5SSteve French static void get_file_access_info(struct smb2_query_info_rsp *rsp, 433038c8a9a5SSteve French struct ksmbd_file *fp, void *rsp_org) 433138c8a9a5SSteve French { 433238c8a9a5SSteve French struct smb2_file_access_info *file_info; 433338c8a9a5SSteve French 433438c8a9a5SSteve French file_info = (struct smb2_file_access_info *)rsp->Buffer; 433538c8a9a5SSteve French file_info->AccessFlags = fp->daccess; 433638c8a9a5SSteve French rsp->OutputBufferLength = 433738c8a9a5SSteve French cpu_to_le32(sizeof(struct smb2_file_access_info)); 433838c8a9a5SSteve French inc_rfc1001_len(rsp_org, sizeof(struct smb2_file_access_info)); 433938c8a9a5SSteve French } 434038c8a9a5SSteve French 434138c8a9a5SSteve French static int get_file_basic_info(struct smb2_query_info_rsp *rsp, 434238c8a9a5SSteve French struct ksmbd_file *fp, void *rsp_org) 434338c8a9a5SSteve French { 434438c8a9a5SSteve French struct smb2_file_basic_info *basic_info; 434538c8a9a5SSteve French struct kstat stat; 434638c8a9a5SSteve French u64 time; 434738c8a9a5SSteve French 434838c8a9a5SSteve French if (!(fp->daccess & FILE_READ_ATTRIBUTES_LE)) { 434938c8a9a5SSteve French pr_err("no right to read the attributes : 0x%x\n", 435038c8a9a5SSteve French fp->daccess); 435138c8a9a5SSteve French return -EACCES; 435238c8a9a5SSteve French } 435338c8a9a5SSteve French 435438c8a9a5SSteve French basic_info = (struct smb2_file_basic_info *)rsp->Buffer; 435538c8a9a5SSteve French generic_fillattr(file_mnt_idmap(fp->filp), file_inode(fp->filp), 435638c8a9a5SSteve French &stat); 435738c8a9a5SSteve French basic_info->CreationTime = cpu_to_le64(fp->create_time); 435838c8a9a5SSteve French time = ksmbd_UnixTimeToNT(stat.atime); 435938c8a9a5SSteve French basic_info->LastAccessTime = cpu_to_le64(time); 436038c8a9a5SSteve French time = ksmbd_UnixTimeToNT(stat.mtime); 436138c8a9a5SSteve French basic_info->LastWriteTime = cpu_to_le64(time); 436238c8a9a5SSteve French time = ksmbd_UnixTimeToNT(stat.ctime); 436338c8a9a5SSteve French basic_info->ChangeTime = cpu_to_le64(time); 436438c8a9a5SSteve French basic_info->Attributes = fp->f_ci->m_fattr; 436538c8a9a5SSteve French basic_info->Pad1 = 0; 436638c8a9a5SSteve French rsp->OutputBufferLength = 436738c8a9a5SSteve French cpu_to_le32(sizeof(struct smb2_file_basic_info)); 436838c8a9a5SSteve French inc_rfc1001_len(rsp_org, sizeof(struct smb2_file_basic_info)); 436938c8a9a5SSteve French return 0; 437038c8a9a5SSteve French } 437138c8a9a5SSteve French 437238c8a9a5SSteve French static unsigned long long get_allocation_size(struct inode *inode, 437338c8a9a5SSteve French struct kstat *stat) 437438c8a9a5SSteve French { 437538c8a9a5SSteve French unsigned long long alloc_size = 0; 437638c8a9a5SSteve French 437738c8a9a5SSteve French if (!S_ISDIR(stat->mode)) { 437838c8a9a5SSteve French if ((inode->i_blocks << 9) <= stat->size) 437938c8a9a5SSteve French alloc_size = stat->size; 438038c8a9a5SSteve French else 438138c8a9a5SSteve French alloc_size = inode->i_blocks << 9; 438238c8a9a5SSteve French } 438338c8a9a5SSteve French 438438c8a9a5SSteve French return alloc_size; 438538c8a9a5SSteve French } 438638c8a9a5SSteve French 438738c8a9a5SSteve French static void get_file_standard_info(struct smb2_query_info_rsp *rsp, 438838c8a9a5SSteve French struct ksmbd_file *fp, void *rsp_org) 438938c8a9a5SSteve French { 439038c8a9a5SSteve French struct smb2_file_standard_info *sinfo; 439138c8a9a5SSteve French unsigned int delete_pending; 439238c8a9a5SSteve French struct inode *inode; 439338c8a9a5SSteve French struct kstat stat; 439438c8a9a5SSteve French 439538c8a9a5SSteve French inode = file_inode(fp->filp); 439638c8a9a5SSteve French generic_fillattr(file_mnt_idmap(fp->filp), inode, &stat); 439738c8a9a5SSteve French 439838c8a9a5SSteve French sinfo = (struct smb2_file_standard_info *)rsp->Buffer; 439938c8a9a5SSteve French delete_pending = ksmbd_inode_pending_delete(fp); 440038c8a9a5SSteve French 440138c8a9a5SSteve French sinfo->AllocationSize = cpu_to_le64(get_allocation_size(inode, &stat)); 440238c8a9a5SSteve French sinfo->EndOfFile = S_ISDIR(stat.mode) ? 0 : cpu_to_le64(stat.size); 440338c8a9a5SSteve French sinfo->NumberOfLinks = cpu_to_le32(get_nlink(&stat) - delete_pending); 440438c8a9a5SSteve French sinfo->DeletePending = delete_pending; 440538c8a9a5SSteve French sinfo->Directory = S_ISDIR(stat.mode) ? 1 : 0; 440638c8a9a5SSteve French rsp->OutputBufferLength = 440738c8a9a5SSteve French cpu_to_le32(sizeof(struct smb2_file_standard_info)); 440838c8a9a5SSteve French inc_rfc1001_len(rsp_org, 440938c8a9a5SSteve French sizeof(struct smb2_file_standard_info)); 441038c8a9a5SSteve French } 441138c8a9a5SSteve French 441238c8a9a5SSteve French static void get_file_alignment_info(struct smb2_query_info_rsp *rsp, 441338c8a9a5SSteve French void *rsp_org) 441438c8a9a5SSteve French { 441538c8a9a5SSteve French struct smb2_file_alignment_info *file_info; 441638c8a9a5SSteve French 441738c8a9a5SSteve French file_info = (struct smb2_file_alignment_info *)rsp->Buffer; 441838c8a9a5SSteve French file_info->AlignmentRequirement = 0; 441938c8a9a5SSteve French rsp->OutputBufferLength = 442038c8a9a5SSteve French cpu_to_le32(sizeof(struct smb2_file_alignment_info)); 442138c8a9a5SSteve French inc_rfc1001_len(rsp_org, 442238c8a9a5SSteve French sizeof(struct smb2_file_alignment_info)); 442338c8a9a5SSteve French } 442438c8a9a5SSteve French 442538c8a9a5SSteve French static int get_file_all_info(struct ksmbd_work *work, 442638c8a9a5SSteve French struct smb2_query_info_rsp *rsp, 442738c8a9a5SSteve French struct ksmbd_file *fp, 442838c8a9a5SSteve French void *rsp_org) 442938c8a9a5SSteve French { 443038c8a9a5SSteve French struct ksmbd_conn *conn = work->conn; 443138c8a9a5SSteve French struct smb2_file_all_info *file_info; 443238c8a9a5SSteve French unsigned int delete_pending; 443338c8a9a5SSteve French struct inode *inode; 443438c8a9a5SSteve French struct kstat stat; 443538c8a9a5SSteve French int conv_len; 443638c8a9a5SSteve French char *filename; 443738c8a9a5SSteve French u64 time; 443838c8a9a5SSteve French 443938c8a9a5SSteve French if (!(fp->daccess & FILE_READ_ATTRIBUTES_LE)) { 444038c8a9a5SSteve French ksmbd_debug(SMB, "no right to read the attributes : 0x%x\n", 444138c8a9a5SSteve French fp->daccess); 444238c8a9a5SSteve French return -EACCES; 444338c8a9a5SSteve French } 444438c8a9a5SSteve French 444538c8a9a5SSteve French filename = convert_to_nt_pathname(work->tcon->share_conf, &fp->filp->f_path); 444638c8a9a5SSteve French if (IS_ERR(filename)) 444738c8a9a5SSteve French return PTR_ERR(filename); 444838c8a9a5SSteve French 444938c8a9a5SSteve French inode = file_inode(fp->filp); 445038c8a9a5SSteve French generic_fillattr(file_mnt_idmap(fp->filp), inode, &stat); 445138c8a9a5SSteve French 445238c8a9a5SSteve French ksmbd_debug(SMB, "filename = %s\n", filename); 445338c8a9a5SSteve French delete_pending = ksmbd_inode_pending_delete(fp); 445438c8a9a5SSteve French file_info = (struct smb2_file_all_info *)rsp->Buffer; 445538c8a9a5SSteve French 445638c8a9a5SSteve French file_info->CreationTime = cpu_to_le64(fp->create_time); 445738c8a9a5SSteve French time = ksmbd_UnixTimeToNT(stat.atime); 445838c8a9a5SSteve French file_info->LastAccessTime = cpu_to_le64(time); 445938c8a9a5SSteve French time = ksmbd_UnixTimeToNT(stat.mtime); 446038c8a9a5SSteve French file_info->LastWriteTime = cpu_to_le64(time); 446138c8a9a5SSteve French time = ksmbd_UnixTimeToNT(stat.ctime); 446238c8a9a5SSteve French file_info->ChangeTime = cpu_to_le64(time); 446338c8a9a5SSteve French file_info->Attributes = fp->f_ci->m_fattr; 446438c8a9a5SSteve French file_info->Pad1 = 0; 446538c8a9a5SSteve French file_info->AllocationSize = 446638c8a9a5SSteve French cpu_to_le64(get_allocation_size(inode, &stat)); 446738c8a9a5SSteve French file_info->EndOfFile = S_ISDIR(stat.mode) ? 0 : cpu_to_le64(stat.size); 446838c8a9a5SSteve French file_info->NumberOfLinks = 446938c8a9a5SSteve French cpu_to_le32(get_nlink(&stat) - delete_pending); 447038c8a9a5SSteve French file_info->DeletePending = delete_pending; 447138c8a9a5SSteve French file_info->Directory = S_ISDIR(stat.mode) ? 1 : 0; 447238c8a9a5SSteve French file_info->Pad2 = 0; 447338c8a9a5SSteve French file_info->IndexNumber = cpu_to_le64(stat.ino); 447438c8a9a5SSteve French file_info->EASize = 0; 447538c8a9a5SSteve French file_info->AccessFlags = fp->daccess; 447638c8a9a5SSteve French file_info->CurrentByteOffset = cpu_to_le64(fp->filp->f_pos); 447738c8a9a5SSteve French file_info->Mode = fp->coption; 447838c8a9a5SSteve French file_info->AlignmentRequirement = 0; 447938c8a9a5SSteve French conv_len = smbConvertToUTF16((__le16 *)file_info->FileName, filename, 448038c8a9a5SSteve French PATH_MAX, conn->local_nls, 0); 448138c8a9a5SSteve French conv_len *= 2; 448238c8a9a5SSteve French file_info->FileNameLength = cpu_to_le32(conv_len); 448338c8a9a5SSteve French rsp->OutputBufferLength = 448438c8a9a5SSteve French cpu_to_le32(sizeof(struct smb2_file_all_info) + conv_len - 1); 448538c8a9a5SSteve French kfree(filename); 448638c8a9a5SSteve French inc_rfc1001_len(rsp_org, le32_to_cpu(rsp->OutputBufferLength)); 448738c8a9a5SSteve French return 0; 448838c8a9a5SSteve French } 448938c8a9a5SSteve French 449038c8a9a5SSteve French static void get_file_alternate_info(struct ksmbd_work *work, 449138c8a9a5SSteve French struct smb2_query_info_rsp *rsp, 449238c8a9a5SSteve French struct ksmbd_file *fp, 449338c8a9a5SSteve French void *rsp_org) 449438c8a9a5SSteve French { 449538c8a9a5SSteve French struct ksmbd_conn *conn = work->conn; 449638c8a9a5SSteve French struct smb2_file_alt_name_info *file_info; 449738c8a9a5SSteve French struct dentry *dentry = fp->filp->f_path.dentry; 449838c8a9a5SSteve French int conv_len; 449938c8a9a5SSteve French 450038c8a9a5SSteve French spin_lock(&dentry->d_lock); 450138c8a9a5SSteve French file_info = (struct smb2_file_alt_name_info *)rsp->Buffer; 450238c8a9a5SSteve French conv_len = ksmbd_extract_shortname(conn, 450338c8a9a5SSteve French dentry->d_name.name, 450438c8a9a5SSteve French file_info->FileName); 450538c8a9a5SSteve French spin_unlock(&dentry->d_lock); 450638c8a9a5SSteve French file_info->FileNameLength = cpu_to_le32(conv_len); 450738c8a9a5SSteve French rsp->OutputBufferLength = 450838c8a9a5SSteve French cpu_to_le32(sizeof(struct smb2_file_alt_name_info) + conv_len); 450938c8a9a5SSteve French inc_rfc1001_len(rsp_org, le32_to_cpu(rsp->OutputBufferLength)); 451038c8a9a5SSteve French } 451138c8a9a5SSteve French 451238c8a9a5SSteve French static void get_file_stream_info(struct ksmbd_work *work, 451338c8a9a5SSteve French struct smb2_query_info_rsp *rsp, 451438c8a9a5SSteve French struct ksmbd_file *fp, 451538c8a9a5SSteve French void *rsp_org) 451638c8a9a5SSteve French { 451738c8a9a5SSteve French struct ksmbd_conn *conn = work->conn; 451838c8a9a5SSteve French struct smb2_file_stream_info *file_info; 451938c8a9a5SSteve French char *stream_name, *xattr_list = NULL, *stream_buf; 452038c8a9a5SSteve French struct kstat stat; 452138c8a9a5SSteve French const struct path *path = &fp->filp->f_path; 452238c8a9a5SSteve French ssize_t xattr_list_len; 452338c8a9a5SSteve French int nbytes = 0, streamlen, stream_name_len, next, idx = 0; 452438c8a9a5SSteve French int buf_free_len; 452538c8a9a5SSteve French struct smb2_query_info_req *req = ksmbd_req_buf_next(work); 452638c8a9a5SSteve French 452738c8a9a5SSteve French generic_fillattr(file_mnt_idmap(fp->filp), file_inode(fp->filp), 452838c8a9a5SSteve French &stat); 452938c8a9a5SSteve French file_info = (struct smb2_file_stream_info *)rsp->Buffer; 453038c8a9a5SSteve French 453138c8a9a5SSteve French buf_free_len = 453238c8a9a5SSteve French smb2_calc_max_out_buf_len(work, 8, 453338c8a9a5SSteve French le32_to_cpu(req->OutputBufferLength)); 453438c8a9a5SSteve French if (buf_free_len < 0) 453538c8a9a5SSteve French goto out; 453638c8a9a5SSteve French 453738c8a9a5SSteve French xattr_list_len = ksmbd_vfs_listxattr(path->dentry, &xattr_list); 453838c8a9a5SSteve French if (xattr_list_len < 0) { 453938c8a9a5SSteve French goto out; 454038c8a9a5SSteve French } else if (!xattr_list_len) { 454138c8a9a5SSteve French ksmbd_debug(SMB, "empty xattr in the file\n"); 454238c8a9a5SSteve French goto out; 454338c8a9a5SSteve French } 454438c8a9a5SSteve French 454538c8a9a5SSteve French while (idx < xattr_list_len) { 454638c8a9a5SSteve French stream_name = xattr_list + idx; 454738c8a9a5SSteve French streamlen = strlen(stream_name); 454838c8a9a5SSteve French idx += streamlen + 1; 454938c8a9a5SSteve French 455038c8a9a5SSteve French ksmbd_debug(SMB, "%s, len %d\n", stream_name, streamlen); 455138c8a9a5SSteve French 455238c8a9a5SSteve French if (strncmp(&stream_name[XATTR_USER_PREFIX_LEN], 455338c8a9a5SSteve French STREAM_PREFIX, STREAM_PREFIX_LEN)) 455438c8a9a5SSteve French continue; 455538c8a9a5SSteve French 455638c8a9a5SSteve French stream_name_len = streamlen - (XATTR_USER_PREFIX_LEN + 455738c8a9a5SSteve French STREAM_PREFIX_LEN); 455838c8a9a5SSteve French streamlen = stream_name_len; 455938c8a9a5SSteve French 456038c8a9a5SSteve French /* plus : size */ 456138c8a9a5SSteve French streamlen += 1; 456238c8a9a5SSteve French stream_buf = kmalloc(streamlen + 1, GFP_KERNEL); 456338c8a9a5SSteve French if (!stream_buf) 456438c8a9a5SSteve French break; 456538c8a9a5SSteve French 456638c8a9a5SSteve French streamlen = snprintf(stream_buf, streamlen + 1, 456738c8a9a5SSteve French ":%s", &stream_name[XATTR_NAME_STREAM_LEN]); 456838c8a9a5SSteve French 456938c8a9a5SSteve French next = sizeof(struct smb2_file_stream_info) + streamlen * 2; 457038c8a9a5SSteve French if (next > buf_free_len) { 457138c8a9a5SSteve French kfree(stream_buf); 457238c8a9a5SSteve French break; 457338c8a9a5SSteve French } 457438c8a9a5SSteve French 457538c8a9a5SSteve French file_info = (struct smb2_file_stream_info *)&rsp->Buffer[nbytes]; 457638c8a9a5SSteve French streamlen = smbConvertToUTF16((__le16 *)file_info->StreamName, 457738c8a9a5SSteve French stream_buf, streamlen, 457838c8a9a5SSteve French conn->local_nls, 0); 457938c8a9a5SSteve French streamlen *= 2; 458038c8a9a5SSteve French kfree(stream_buf); 458138c8a9a5SSteve French file_info->StreamNameLength = cpu_to_le32(streamlen); 458238c8a9a5SSteve French file_info->StreamSize = cpu_to_le64(stream_name_len); 458338c8a9a5SSteve French file_info->StreamAllocationSize = cpu_to_le64(stream_name_len); 458438c8a9a5SSteve French 458538c8a9a5SSteve French nbytes += next; 458638c8a9a5SSteve French buf_free_len -= next; 458738c8a9a5SSteve French file_info->NextEntryOffset = cpu_to_le32(next); 458838c8a9a5SSteve French } 458938c8a9a5SSteve French 459038c8a9a5SSteve French out: 459138c8a9a5SSteve French if (!S_ISDIR(stat.mode) && 459238c8a9a5SSteve French buf_free_len >= sizeof(struct smb2_file_stream_info) + 7 * 2) { 459338c8a9a5SSteve French file_info = (struct smb2_file_stream_info *) 459438c8a9a5SSteve French &rsp->Buffer[nbytes]; 459538c8a9a5SSteve French streamlen = smbConvertToUTF16((__le16 *)file_info->StreamName, 459638c8a9a5SSteve French "::$DATA", 7, conn->local_nls, 0); 459738c8a9a5SSteve French streamlen *= 2; 459838c8a9a5SSteve French file_info->StreamNameLength = cpu_to_le32(streamlen); 459938c8a9a5SSteve French file_info->StreamSize = cpu_to_le64(stat.size); 460038c8a9a5SSteve French file_info->StreamAllocationSize = cpu_to_le64(stat.blocks << 9); 460138c8a9a5SSteve French nbytes += sizeof(struct smb2_file_stream_info) + streamlen; 460238c8a9a5SSteve French } 460338c8a9a5SSteve French 460438c8a9a5SSteve French /* last entry offset should be 0 */ 460538c8a9a5SSteve French file_info->NextEntryOffset = 0; 460638c8a9a5SSteve French kvfree(xattr_list); 460738c8a9a5SSteve French 460838c8a9a5SSteve French rsp->OutputBufferLength = cpu_to_le32(nbytes); 460938c8a9a5SSteve French inc_rfc1001_len(rsp_org, nbytes); 461038c8a9a5SSteve French } 461138c8a9a5SSteve French 461238c8a9a5SSteve French static void get_file_internal_info(struct smb2_query_info_rsp *rsp, 461338c8a9a5SSteve French struct ksmbd_file *fp, void *rsp_org) 461438c8a9a5SSteve French { 461538c8a9a5SSteve French struct smb2_file_internal_info *file_info; 461638c8a9a5SSteve French struct kstat stat; 461738c8a9a5SSteve French 461838c8a9a5SSteve French generic_fillattr(file_mnt_idmap(fp->filp), file_inode(fp->filp), 461938c8a9a5SSteve French &stat); 462038c8a9a5SSteve French file_info = (struct smb2_file_internal_info *)rsp->Buffer; 462138c8a9a5SSteve French file_info->IndexNumber = cpu_to_le64(stat.ino); 462238c8a9a5SSteve French rsp->OutputBufferLength = 462338c8a9a5SSteve French cpu_to_le32(sizeof(struct smb2_file_internal_info)); 462438c8a9a5SSteve French inc_rfc1001_len(rsp_org, sizeof(struct smb2_file_internal_info)); 462538c8a9a5SSteve French } 462638c8a9a5SSteve French 462738c8a9a5SSteve French static int get_file_network_open_info(struct smb2_query_info_rsp *rsp, 462838c8a9a5SSteve French struct ksmbd_file *fp, void *rsp_org) 462938c8a9a5SSteve French { 463038c8a9a5SSteve French struct smb2_file_ntwrk_info *file_info; 463138c8a9a5SSteve French struct inode *inode; 463238c8a9a5SSteve French struct kstat stat; 463338c8a9a5SSteve French u64 time; 463438c8a9a5SSteve French 463538c8a9a5SSteve French if (!(fp->daccess & FILE_READ_ATTRIBUTES_LE)) { 463638c8a9a5SSteve French pr_err("no right to read the attributes : 0x%x\n", 463738c8a9a5SSteve French fp->daccess); 463838c8a9a5SSteve French return -EACCES; 463938c8a9a5SSteve French } 464038c8a9a5SSteve French 464138c8a9a5SSteve French file_info = (struct smb2_file_ntwrk_info *)rsp->Buffer; 464238c8a9a5SSteve French 464338c8a9a5SSteve French inode = file_inode(fp->filp); 464438c8a9a5SSteve French generic_fillattr(file_mnt_idmap(fp->filp), inode, &stat); 464538c8a9a5SSteve French 464638c8a9a5SSteve French file_info->CreationTime = cpu_to_le64(fp->create_time); 464738c8a9a5SSteve French time = ksmbd_UnixTimeToNT(stat.atime); 464838c8a9a5SSteve French file_info->LastAccessTime = cpu_to_le64(time); 464938c8a9a5SSteve French time = ksmbd_UnixTimeToNT(stat.mtime); 465038c8a9a5SSteve French file_info->LastWriteTime = cpu_to_le64(time); 465138c8a9a5SSteve French time = ksmbd_UnixTimeToNT(stat.ctime); 465238c8a9a5SSteve French file_info->ChangeTime = cpu_to_le64(time); 465338c8a9a5SSteve French file_info->Attributes = fp->f_ci->m_fattr; 465438c8a9a5SSteve French file_info->AllocationSize = 465538c8a9a5SSteve French cpu_to_le64(get_allocation_size(inode, &stat)); 465638c8a9a5SSteve French file_info->EndOfFile = S_ISDIR(stat.mode) ? 0 : cpu_to_le64(stat.size); 465738c8a9a5SSteve French file_info->Reserved = cpu_to_le32(0); 465838c8a9a5SSteve French rsp->OutputBufferLength = 465938c8a9a5SSteve French cpu_to_le32(sizeof(struct smb2_file_ntwrk_info)); 466038c8a9a5SSteve French inc_rfc1001_len(rsp_org, sizeof(struct smb2_file_ntwrk_info)); 466138c8a9a5SSteve French return 0; 466238c8a9a5SSteve French } 466338c8a9a5SSteve French 466438c8a9a5SSteve French static void get_file_ea_info(struct smb2_query_info_rsp *rsp, void *rsp_org) 466538c8a9a5SSteve French { 466638c8a9a5SSteve French struct smb2_file_ea_info *file_info; 466738c8a9a5SSteve French 466838c8a9a5SSteve French file_info = (struct smb2_file_ea_info *)rsp->Buffer; 466938c8a9a5SSteve French file_info->EASize = 0; 467038c8a9a5SSteve French rsp->OutputBufferLength = 467138c8a9a5SSteve French cpu_to_le32(sizeof(struct smb2_file_ea_info)); 467238c8a9a5SSteve French inc_rfc1001_len(rsp_org, sizeof(struct smb2_file_ea_info)); 467338c8a9a5SSteve French } 467438c8a9a5SSteve French 467538c8a9a5SSteve French static void get_file_position_info(struct smb2_query_info_rsp *rsp, 467638c8a9a5SSteve French struct ksmbd_file *fp, void *rsp_org) 467738c8a9a5SSteve French { 467838c8a9a5SSteve French struct smb2_file_pos_info *file_info; 467938c8a9a5SSteve French 468038c8a9a5SSteve French file_info = (struct smb2_file_pos_info *)rsp->Buffer; 468138c8a9a5SSteve French file_info->CurrentByteOffset = cpu_to_le64(fp->filp->f_pos); 468238c8a9a5SSteve French rsp->OutputBufferLength = 468338c8a9a5SSteve French cpu_to_le32(sizeof(struct smb2_file_pos_info)); 468438c8a9a5SSteve French inc_rfc1001_len(rsp_org, sizeof(struct smb2_file_pos_info)); 468538c8a9a5SSteve French } 468638c8a9a5SSteve French 468738c8a9a5SSteve French static void get_file_mode_info(struct smb2_query_info_rsp *rsp, 468838c8a9a5SSteve French struct ksmbd_file *fp, void *rsp_org) 468938c8a9a5SSteve French { 469038c8a9a5SSteve French struct smb2_file_mode_info *file_info; 469138c8a9a5SSteve French 469238c8a9a5SSteve French file_info = (struct smb2_file_mode_info *)rsp->Buffer; 469338c8a9a5SSteve French file_info->Mode = fp->coption & FILE_MODE_INFO_MASK; 469438c8a9a5SSteve French rsp->OutputBufferLength = 469538c8a9a5SSteve French cpu_to_le32(sizeof(struct smb2_file_mode_info)); 469638c8a9a5SSteve French inc_rfc1001_len(rsp_org, sizeof(struct smb2_file_mode_info)); 469738c8a9a5SSteve French } 469838c8a9a5SSteve French 469938c8a9a5SSteve French static void get_file_compression_info(struct smb2_query_info_rsp *rsp, 470038c8a9a5SSteve French struct ksmbd_file *fp, void *rsp_org) 470138c8a9a5SSteve French { 470238c8a9a5SSteve French struct smb2_file_comp_info *file_info; 470338c8a9a5SSteve French struct kstat stat; 470438c8a9a5SSteve French 470538c8a9a5SSteve French generic_fillattr(file_mnt_idmap(fp->filp), file_inode(fp->filp), 470638c8a9a5SSteve French &stat); 470738c8a9a5SSteve French 470838c8a9a5SSteve French file_info = (struct smb2_file_comp_info *)rsp->Buffer; 470938c8a9a5SSteve French file_info->CompressedFileSize = cpu_to_le64(stat.blocks << 9); 471038c8a9a5SSteve French file_info->CompressionFormat = COMPRESSION_FORMAT_NONE; 471138c8a9a5SSteve French file_info->CompressionUnitShift = 0; 471238c8a9a5SSteve French file_info->ChunkShift = 0; 471338c8a9a5SSteve French file_info->ClusterShift = 0; 471438c8a9a5SSteve French memset(&file_info->Reserved[0], 0, 3); 471538c8a9a5SSteve French 471638c8a9a5SSteve French rsp->OutputBufferLength = 471738c8a9a5SSteve French cpu_to_le32(sizeof(struct smb2_file_comp_info)); 471838c8a9a5SSteve French inc_rfc1001_len(rsp_org, sizeof(struct smb2_file_comp_info)); 471938c8a9a5SSteve French } 472038c8a9a5SSteve French 472138c8a9a5SSteve French static int get_file_attribute_tag_info(struct smb2_query_info_rsp *rsp, 472238c8a9a5SSteve French struct ksmbd_file *fp, void *rsp_org) 472338c8a9a5SSteve French { 472438c8a9a5SSteve French struct smb2_file_attr_tag_info *file_info; 472538c8a9a5SSteve French 472638c8a9a5SSteve French if (!(fp->daccess & FILE_READ_ATTRIBUTES_LE)) { 472738c8a9a5SSteve French pr_err("no right to read the attributes : 0x%x\n", 472838c8a9a5SSteve French fp->daccess); 472938c8a9a5SSteve French return -EACCES; 473038c8a9a5SSteve French } 473138c8a9a5SSteve French 473238c8a9a5SSteve French file_info = (struct smb2_file_attr_tag_info *)rsp->Buffer; 473338c8a9a5SSteve French file_info->FileAttributes = fp->f_ci->m_fattr; 473438c8a9a5SSteve French file_info->ReparseTag = 0; 473538c8a9a5SSteve French rsp->OutputBufferLength = 473638c8a9a5SSteve French cpu_to_le32(sizeof(struct smb2_file_attr_tag_info)); 473738c8a9a5SSteve French inc_rfc1001_len(rsp_org, sizeof(struct smb2_file_attr_tag_info)); 473838c8a9a5SSteve French return 0; 473938c8a9a5SSteve French } 474038c8a9a5SSteve French 474138c8a9a5SSteve French static int find_file_posix_info(struct smb2_query_info_rsp *rsp, 474238c8a9a5SSteve French struct ksmbd_file *fp, void *rsp_org) 474338c8a9a5SSteve French { 474438c8a9a5SSteve French struct smb311_posix_qinfo *file_info; 474538c8a9a5SSteve French struct inode *inode = file_inode(fp->filp); 474638c8a9a5SSteve French struct mnt_idmap *idmap = file_mnt_idmap(fp->filp); 474738c8a9a5SSteve French vfsuid_t vfsuid = i_uid_into_vfsuid(idmap, inode); 474838c8a9a5SSteve French vfsgid_t vfsgid = i_gid_into_vfsgid(idmap, inode); 474938c8a9a5SSteve French u64 time; 475038c8a9a5SSteve French int out_buf_len = sizeof(struct smb311_posix_qinfo) + 32; 475138c8a9a5SSteve French 475238c8a9a5SSteve French file_info = (struct smb311_posix_qinfo *)rsp->Buffer; 475338c8a9a5SSteve French file_info->CreationTime = cpu_to_le64(fp->create_time); 475438c8a9a5SSteve French time = ksmbd_UnixTimeToNT(inode->i_atime); 475538c8a9a5SSteve French file_info->LastAccessTime = cpu_to_le64(time); 475638c8a9a5SSteve French time = ksmbd_UnixTimeToNT(inode->i_mtime); 475738c8a9a5SSteve French file_info->LastWriteTime = cpu_to_le64(time); 475838c8a9a5SSteve French time = ksmbd_UnixTimeToNT(inode->i_ctime); 475938c8a9a5SSteve French file_info->ChangeTime = cpu_to_le64(time); 476038c8a9a5SSteve French file_info->DosAttributes = fp->f_ci->m_fattr; 476138c8a9a5SSteve French file_info->Inode = cpu_to_le64(inode->i_ino); 476238c8a9a5SSteve French file_info->EndOfFile = cpu_to_le64(inode->i_size); 476338c8a9a5SSteve French file_info->AllocationSize = cpu_to_le64(inode->i_blocks << 9); 476438c8a9a5SSteve French file_info->HardLinks = cpu_to_le32(inode->i_nlink); 476538c8a9a5SSteve French file_info->Mode = cpu_to_le32(inode->i_mode & 0777); 476638c8a9a5SSteve French file_info->DeviceId = cpu_to_le32(inode->i_rdev); 476738c8a9a5SSteve French 476838c8a9a5SSteve French /* 476938c8a9a5SSteve French * Sids(32) contain two sids(Domain sid(16), UNIX group sid(16)). 477038c8a9a5SSteve French * UNIX sid(16) = revision(1) + num_subauth(1) + authority(6) + 477138c8a9a5SSteve French * sub_auth(4 * 1(num_subauth)) + RID(4). 477238c8a9a5SSteve French */ 477338c8a9a5SSteve French id_to_sid(from_kuid_munged(&init_user_ns, vfsuid_into_kuid(vfsuid)), 477438c8a9a5SSteve French SIDUNIX_USER, (struct smb_sid *)&file_info->Sids[0]); 477538c8a9a5SSteve French id_to_sid(from_kgid_munged(&init_user_ns, vfsgid_into_kgid(vfsgid)), 477638c8a9a5SSteve French SIDUNIX_GROUP, (struct smb_sid *)&file_info->Sids[16]); 477738c8a9a5SSteve French 477838c8a9a5SSteve French rsp->OutputBufferLength = cpu_to_le32(out_buf_len); 477938c8a9a5SSteve French inc_rfc1001_len(rsp_org, out_buf_len); 478038c8a9a5SSteve French return out_buf_len; 478138c8a9a5SSteve French } 478238c8a9a5SSteve French 478338c8a9a5SSteve French static int smb2_get_info_file(struct ksmbd_work *work, 478438c8a9a5SSteve French struct smb2_query_info_req *req, 478538c8a9a5SSteve French struct smb2_query_info_rsp *rsp) 478638c8a9a5SSteve French { 478738c8a9a5SSteve French struct ksmbd_file *fp; 478838c8a9a5SSteve French int fileinfoclass = 0; 478938c8a9a5SSteve French int rc = 0; 479038c8a9a5SSteve French int file_infoclass_size; 479138c8a9a5SSteve French unsigned int id = KSMBD_NO_FID, pid = KSMBD_NO_FID; 479238c8a9a5SSteve French 479338c8a9a5SSteve French if (test_share_config_flag(work->tcon->share_conf, 479438c8a9a5SSteve French KSMBD_SHARE_FLAG_PIPE)) { 479538c8a9a5SSteve French /* smb2 info file called for pipe */ 479638c8a9a5SSteve French return smb2_get_info_file_pipe(work->sess, req, rsp, 479738c8a9a5SSteve French work->response_buf); 479838c8a9a5SSteve French } 479938c8a9a5SSteve French 480038c8a9a5SSteve French if (work->next_smb2_rcv_hdr_off) { 480138c8a9a5SSteve French if (!has_file_id(req->VolatileFileId)) { 480238c8a9a5SSteve French ksmbd_debug(SMB, "Compound request set FID = %llu\n", 480338c8a9a5SSteve French work->compound_fid); 480438c8a9a5SSteve French id = work->compound_fid; 480538c8a9a5SSteve French pid = work->compound_pfid; 480638c8a9a5SSteve French } 480738c8a9a5SSteve French } 480838c8a9a5SSteve French 480938c8a9a5SSteve French if (!has_file_id(id)) { 481038c8a9a5SSteve French id = req->VolatileFileId; 481138c8a9a5SSteve French pid = req->PersistentFileId; 481238c8a9a5SSteve French } 481338c8a9a5SSteve French 481438c8a9a5SSteve French fp = ksmbd_lookup_fd_slow(work, id, pid); 481538c8a9a5SSteve French if (!fp) 481638c8a9a5SSteve French return -ENOENT; 481738c8a9a5SSteve French 481838c8a9a5SSteve French fileinfoclass = req->FileInfoClass; 481938c8a9a5SSteve French 482038c8a9a5SSteve French switch (fileinfoclass) { 482138c8a9a5SSteve French case FILE_ACCESS_INFORMATION: 482238c8a9a5SSteve French get_file_access_info(rsp, fp, work->response_buf); 482338c8a9a5SSteve French file_infoclass_size = FILE_ACCESS_INFORMATION_SIZE; 482438c8a9a5SSteve French break; 482538c8a9a5SSteve French 482638c8a9a5SSteve French case FILE_BASIC_INFORMATION: 482738c8a9a5SSteve French rc = get_file_basic_info(rsp, fp, work->response_buf); 482838c8a9a5SSteve French file_infoclass_size = FILE_BASIC_INFORMATION_SIZE; 482938c8a9a5SSteve French break; 483038c8a9a5SSteve French 483138c8a9a5SSteve French case FILE_STANDARD_INFORMATION: 483238c8a9a5SSteve French get_file_standard_info(rsp, fp, work->response_buf); 483338c8a9a5SSteve French file_infoclass_size = FILE_STANDARD_INFORMATION_SIZE; 483438c8a9a5SSteve French break; 483538c8a9a5SSteve French 483638c8a9a5SSteve French case FILE_ALIGNMENT_INFORMATION: 483738c8a9a5SSteve French get_file_alignment_info(rsp, work->response_buf); 483838c8a9a5SSteve French file_infoclass_size = FILE_ALIGNMENT_INFORMATION_SIZE; 483938c8a9a5SSteve French break; 484038c8a9a5SSteve French 484138c8a9a5SSteve French case FILE_ALL_INFORMATION: 484238c8a9a5SSteve French rc = get_file_all_info(work, rsp, fp, work->response_buf); 484338c8a9a5SSteve French file_infoclass_size = FILE_ALL_INFORMATION_SIZE; 484438c8a9a5SSteve French break; 484538c8a9a5SSteve French 484638c8a9a5SSteve French case FILE_ALTERNATE_NAME_INFORMATION: 484738c8a9a5SSteve French get_file_alternate_info(work, rsp, fp, work->response_buf); 484838c8a9a5SSteve French file_infoclass_size = FILE_ALTERNATE_NAME_INFORMATION_SIZE; 484938c8a9a5SSteve French break; 485038c8a9a5SSteve French 485138c8a9a5SSteve French case FILE_STREAM_INFORMATION: 485238c8a9a5SSteve French get_file_stream_info(work, rsp, fp, work->response_buf); 485338c8a9a5SSteve French file_infoclass_size = FILE_STREAM_INFORMATION_SIZE; 485438c8a9a5SSteve French break; 485538c8a9a5SSteve French 485638c8a9a5SSteve French case FILE_INTERNAL_INFORMATION: 485738c8a9a5SSteve French get_file_internal_info(rsp, fp, work->response_buf); 485838c8a9a5SSteve French file_infoclass_size = FILE_INTERNAL_INFORMATION_SIZE; 485938c8a9a5SSteve French break; 486038c8a9a5SSteve French 486138c8a9a5SSteve French case FILE_NETWORK_OPEN_INFORMATION: 486238c8a9a5SSteve French rc = get_file_network_open_info(rsp, fp, work->response_buf); 486338c8a9a5SSteve French file_infoclass_size = FILE_NETWORK_OPEN_INFORMATION_SIZE; 486438c8a9a5SSteve French break; 486538c8a9a5SSteve French 486638c8a9a5SSteve French case FILE_EA_INFORMATION: 486738c8a9a5SSteve French get_file_ea_info(rsp, work->response_buf); 486838c8a9a5SSteve French file_infoclass_size = FILE_EA_INFORMATION_SIZE; 486938c8a9a5SSteve French break; 487038c8a9a5SSteve French 487138c8a9a5SSteve French case FILE_FULL_EA_INFORMATION: 487238c8a9a5SSteve French rc = smb2_get_ea(work, fp, req, rsp, work->response_buf); 487338c8a9a5SSteve French file_infoclass_size = FILE_FULL_EA_INFORMATION_SIZE; 487438c8a9a5SSteve French break; 487538c8a9a5SSteve French 487638c8a9a5SSteve French case FILE_POSITION_INFORMATION: 487738c8a9a5SSteve French get_file_position_info(rsp, fp, work->response_buf); 487838c8a9a5SSteve French file_infoclass_size = FILE_POSITION_INFORMATION_SIZE; 487938c8a9a5SSteve French break; 488038c8a9a5SSteve French 488138c8a9a5SSteve French case FILE_MODE_INFORMATION: 488238c8a9a5SSteve French get_file_mode_info(rsp, fp, work->response_buf); 488338c8a9a5SSteve French file_infoclass_size = FILE_MODE_INFORMATION_SIZE; 488438c8a9a5SSteve French break; 488538c8a9a5SSteve French 488638c8a9a5SSteve French case FILE_COMPRESSION_INFORMATION: 488738c8a9a5SSteve French get_file_compression_info(rsp, fp, work->response_buf); 488838c8a9a5SSteve French file_infoclass_size = FILE_COMPRESSION_INFORMATION_SIZE; 488938c8a9a5SSteve French break; 489038c8a9a5SSteve French 489138c8a9a5SSteve French case FILE_ATTRIBUTE_TAG_INFORMATION: 489238c8a9a5SSteve French rc = get_file_attribute_tag_info(rsp, fp, work->response_buf); 489338c8a9a5SSteve French file_infoclass_size = FILE_ATTRIBUTE_TAG_INFORMATION_SIZE; 489438c8a9a5SSteve French break; 489538c8a9a5SSteve French case SMB_FIND_FILE_POSIX_INFO: 489638c8a9a5SSteve French if (!work->tcon->posix_extensions) { 489738c8a9a5SSteve French pr_err("client doesn't negotiate with SMB3.1.1 POSIX Extensions\n"); 489838c8a9a5SSteve French rc = -EOPNOTSUPP; 489938c8a9a5SSteve French } else { 490038c8a9a5SSteve French file_infoclass_size = find_file_posix_info(rsp, fp, 490138c8a9a5SSteve French work->response_buf); 490238c8a9a5SSteve French } 490338c8a9a5SSteve French break; 490438c8a9a5SSteve French default: 490538c8a9a5SSteve French ksmbd_debug(SMB, "fileinfoclass %d not supported yet\n", 490638c8a9a5SSteve French fileinfoclass); 490738c8a9a5SSteve French rc = -EOPNOTSUPP; 490838c8a9a5SSteve French } 490938c8a9a5SSteve French if (!rc) 491038c8a9a5SSteve French rc = buffer_check_err(le32_to_cpu(req->OutputBufferLength), 491138c8a9a5SSteve French rsp, work->response_buf, 491238c8a9a5SSteve French file_infoclass_size); 491338c8a9a5SSteve French ksmbd_fd_put(work, fp); 491438c8a9a5SSteve French return rc; 491538c8a9a5SSteve French } 491638c8a9a5SSteve French 491738c8a9a5SSteve French static int smb2_get_info_filesystem(struct ksmbd_work *work, 491838c8a9a5SSteve French struct smb2_query_info_req *req, 491938c8a9a5SSteve French struct smb2_query_info_rsp *rsp) 492038c8a9a5SSteve French { 492138c8a9a5SSteve French struct ksmbd_session *sess = work->sess; 492238c8a9a5SSteve French struct ksmbd_conn *conn = work->conn; 492338c8a9a5SSteve French struct ksmbd_share_config *share = work->tcon->share_conf; 492438c8a9a5SSteve French int fsinfoclass = 0; 492538c8a9a5SSteve French struct kstatfs stfs; 492638c8a9a5SSteve French struct path path; 492738c8a9a5SSteve French int rc = 0, len; 492838c8a9a5SSteve French int fs_infoclass_size = 0; 492938c8a9a5SSteve French 493038c8a9a5SSteve French if (!share->path) 493138c8a9a5SSteve French return -EIO; 493238c8a9a5SSteve French 493338c8a9a5SSteve French rc = kern_path(share->path, LOOKUP_NO_SYMLINKS, &path); 493438c8a9a5SSteve French if (rc) { 493538c8a9a5SSteve French pr_err("cannot create vfs path\n"); 493638c8a9a5SSteve French return -EIO; 493738c8a9a5SSteve French } 493838c8a9a5SSteve French 493938c8a9a5SSteve French rc = vfs_statfs(&path, &stfs); 494038c8a9a5SSteve French if (rc) { 494138c8a9a5SSteve French pr_err("cannot do stat of path %s\n", share->path); 494238c8a9a5SSteve French path_put(&path); 494338c8a9a5SSteve French return -EIO; 494438c8a9a5SSteve French } 494538c8a9a5SSteve French 494638c8a9a5SSteve French fsinfoclass = req->FileInfoClass; 494738c8a9a5SSteve French 494838c8a9a5SSteve French switch (fsinfoclass) { 494938c8a9a5SSteve French case FS_DEVICE_INFORMATION: 495038c8a9a5SSteve French { 495138c8a9a5SSteve French struct filesystem_device_info *info; 495238c8a9a5SSteve French 495338c8a9a5SSteve French info = (struct filesystem_device_info *)rsp->Buffer; 495438c8a9a5SSteve French 495538c8a9a5SSteve French info->DeviceType = cpu_to_le32(stfs.f_type); 495638c8a9a5SSteve French info->DeviceCharacteristics = cpu_to_le32(0x00000020); 495738c8a9a5SSteve French rsp->OutputBufferLength = cpu_to_le32(8); 495838c8a9a5SSteve French inc_rfc1001_len(work->response_buf, 8); 495938c8a9a5SSteve French fs_infoclass_size = FS_DEVICE_INFORMATION_SIZE; 496038c8a9a5SSteve French break; 496138c8a9a5SSteve French } 496238c8a9a5SSteve French case FS_ATTRIBUTE_INFORMATION: 496338c8a9a5SSteve French { 496438c8a9a5SSteve French struct filesystem_attribute_info *info; 496538c8a9a5SSteve French size_t sz; 496638c8a9a5SSteve French 496738c8a9a5SSteve French info = (struct filesystem_attribute_info *)rsp->Buffer; 496838c8a9a5SSteve French info->Attributes = cpu_to_le32(FILE_SUPPORTS_OBJECT_IDS | 496938c8a9a5SSteve French FILE_PERSISTENT_ACLS | 497038c8a9a5SSteve French FILE_UNICODE_ON_DISK | 497138c8a9a5SSteve French FILE_CASE_PRESERVED_NAMES | 497238c8a9a5SSteve French FILE_CASE_SENSITIVE_SEARCH | 497338c8a9a5SSteve French FILE_SUPPORTS_BLOCK_REFCOUNTING); 497438c8a9a5SSteve French 497538c8a9a5SSteve French info->Attributes |= cpu_to_le32(server_conf.share_fake_fscaps); 497638c8a9a5SSteve French 497738c8a9a5SSteve French if (test_share_config_flag(work->tcon->share_conf, 497838c8a9a5SSteve French KSMBD_SHARE_FLAG_STREAMS)) 497938c8a9a5SSteve French info->Attributes |= cpu_to_le32(FILE_NAMED_STREAMS); 498038c8a9a5SSteve French 498138c8a9a5SSteve French info->MaxPathNameComponentLength = cpu_to_le32(stfs.f_namelen); 498238c8a9a5SSteve French len = smbConvertToUTF16((__le16 *)info->FileSystemName, 498338c8a9a5SSteve French "NTFS", PATH_MAX, conn->local_nls, 0); 498438c8a9a5SSteve French len = len * 2; 498538c8a9a5SSteve French info->FileSystemNameLen = cpu_to_le32(len); 498638c8a9a5SSteve French sz = sizeof(struct filesystem_attribute_info) - 2 + len; 498738c8a9a5SSteve French rsp->OutputBufferLength = cpu_to_le32(sz); 498838c8a9a5SSteve French inc_rfc1001_len(work->response_buf, sz); 498938c8a9a5SSteve French fs_infoclass_size = FS_ATTRIBUTE_INFORMATION_SIZE; 499038c8a9a5SSteve French break; 499138c8a9a5SSteve French } 499238c8a9a5SSteve French case FS_VOLUME_INFORMATION: 499338c8a9a5SSteve French { 499438c8a9a5SSteve French struct filesystem_vol_info *info; 499538c8a9a5SSteve French size_t sz; 499638c8a9a5SSteve French unsigned int serial_crc = 0; 499738c8a9a5SSteve French 499838c8a9a5SSteve French info = (struct filesystem_vol_info *)(rsp->Buffer); 499938c8a9a5SSteve French info->VolumeCreationTime = 0; 500038c8a9a5SSteve French serial_crc = crc32_le(serial_crc, share->name, 500138c8a9a5SSteve French strlen(share->name)); 500238c8a9a5SSteve French serial_crc = crc32_le(serial_crc, share->path, 500338c8a9a5SSteve French strlen(share->path)); 500438c8a9a5SSteve French serial_crc = crc32_le(serial_crc, ksmbd_netbios_name(), 500538c8a9a5SSteve French strlen(ksmbd_netbios_name())); 500638c8a9a5SSteve French /* Taking dummy value of serial number*/ 500738c8a9a5SSteve French info->SerialNumber = cpu_to_le32(serial_crc); 500838c8a9a5SSteve French len = smbConvertToUTF16((__le16 *)info->VolumeLabel, 500938c8a9a5SSteve French share->name, PATH_MAX, 501038c8a9a5SSteve French conn->local_nls, 0); 501138c8a9a5SSteve French len = len * 2; 501238c8a9a5SSteve French info->VolumeLabelSize = cpu_to_le32(len); 501338c8a9a5SSteve French info->Reserved = 0; 501438c8a9a5SSteve French sz = sizeof(struct filesystem_vol_info) - 2 + len; 501538c8a9a5SSteve French rsp->OutputBufferLength = cpu_to_le32(sz); 501638c8a9a5SSteve French inc_rfc1001_len(work->response_buf, sz); 501738c8a9a5SSteve French fs_infoclass_size = FS_VOLUME_INFORMATION_SIZE; 501838c8a9a5SSteve French break; 501938c8a9a5SSteve French } 502038c8a9a5SSteve French case FS_SIZE_INFORMATION: 502138c8a9a5SSteve French { 502238c8a9a5SSteve French struct filesystem_info *info; 502338c8a9a5SSteve French 502438c8a9a5SSteve French info = (struct filesystem_info *)(rsp->Buffer); 502538c8a9a5SSteve French info->TotalAllocationUnits = cpu_to_le64(stfs.f_blocks); 502638c8a9a5SSteve French info->FreeAllocationUnits = cpu_to_le64(stfs.f_bfree); 502738c8a9a5SSteve French info->SectorsPerAllocationUnit = cpu_to_le32(1); 502838c8a9a5SSteve French info->BytesPerSector = cpu_to_le32(stfs.f_bsize); 502938c8a9a5SSteve French rsp->OutputBufferLength = cpu_to_le32(24); 503038c8a9a5SSteve French inc_rfc1001_len(work->response_buf, 24); 503138c8a9a5SSteve French fs_infoclass_size = FS_SIZE_INFORMATION_SIZE; 503238c8a9a5SSteve French break; 503338c8a9a5SSteve French } 503438c8a9a5SSteve French case FS_FULL_SIZE_INFORMATION: 503538c8a9a5SSteve French { 503638c8a9a5SSteve French struct smb2_fs_full_size_info *info; 503738c8a9a5SSteve French 503838c8a9a5SSteve French info = (struct smb2_fs_full_size_info *)(rsp->Buffer); 503938c8a9a5SSteve French info->TotalAllocationUnits = cpu_to_le64(stfs.f_blocks); 504038c8a9a5SSteve French info->CallerAvailableAllocationUnits = 504138c8a9a5SSteve French cpu_to_le64(stfs.f_bavail); 504238c8a9a5SSteve French info->ActualAvailableAllocationUnits = 504338c8a9a5SSteve French cpu_to_le64(stfs.f_bfree); 504438c8a9a5SSteve French info->SectorsPerAllocationUnit = cpu_to_le32(1); 504538c8a9a5SSteve French info->BytesPerSector = cpu_to_le32(stfs.f_bsize); 504638c8a9a5SSteve French rsp->OutputBufferLength = cpu_to_le32(32); 504738c8a9a5SSteve French inc_rfc1001_len(work->response_buf, 32); 504838c8a9a5SSteve French fs_infoclass_size = FS_FULL_SIZE_INFORMATION_SIZE; 504938c8a9a5SSteve French break; 505038c8a9a5SSteve French } 505138c8a9a5SSteve French case FS_OBJECT_ID_INFORMATION: 505238c8a9a5SSteve French { 505338c8a9a5SSteve French struct object_id_info *info; 505438c8a9a5SSteve French 505538c8a9a5SSteve French info = (struct object_id_info *)(rsp->Buffer); 505638c8a9a5SSteve French 505738c8a9a5SSteve French if (!user_guest(sess->user)) 505838c8a9a5SSteve French memcpy(info->objid, user_passkey(sess->user), 16); 505938c8a9a5SSteve French else 506038c8a9a5SSteve French memset(info->objid, 0, 16); 506138c8a9a5SSteve French 506238c8a9a5SSteve French info->extended_info.magic = cpu_to_le32(EXTENDED_INFO_MAGIC); 506338c8a9a5SSteve French info->extended_info.version = cpu_to_le32(1); 506438c8a9a5SSteve French info->extended_info.release = cpu_to_le32(1); 506538c8a9a5SSteve French info->extended_info.rel_date = 0; 506638c8a9a5SSteve French memcpy(info->extended_info.version_string, "1.1.0", strlen("1.1.0")); 506738c8a9a5SSteve French rsp->OutputBufferLength = cpu_to_le32(64); 506838c8a9a5SSteve French inc_rfc1001_len(work->response_buf, 64); 506938c8a9a5SSteve French fs_infoclass_size = FS_OBJECT_ID_INFORMATION_SIZE; 507038c8a9a5SSteve French break; 507138c8a9a5SSteve French } 507238c8a9a5SSteve French case FS_SECTOR_SIZE_INFORMATION: 507338c8a9a5SSteve French { 507438c8a9a5SSteve French struct smb3_fs_ss_info *info; 507538c8a9a5SSteve French unsigned int sector_size = 507638c8a9a5SSteve French min_t(unsigned int, path.mnt->mnt_sb->s_blocksize, 4096); 507738c8a9a5SSteve French 507838c8a9a5SSteve French info = (struct smb3_fs_ss_info *)(rsp->Buffer); 507938c8a9a5SSteve French 508038c8a9a5SSteve French info->LogicalBytesPerSector = cpu_to_le32(sector_size); 508138c8a9a5SSteve French info->PhysicalBytesPerSectorForAtomicity = 508238c8a9a5SSteve French cpu_to_le32(sector_size); 508338c8a9a5SSteve French info->PhysicalBytesPerSectorForPerf = cpu_to_le32(sector_size); 508438c8a9a5SSteve French info->FSEffPhysicalBytesPerSectorForAtomicity = 508538c8a9a5SSteve French cpu_to_le32(sector_size); 508638c8a9a5SSteve French info->Flags = cpu_to_le32(SSINFO_FLAGS_ALIGNED_DEVICE | 508738c8a9a5SSteve French SSINFO_FLAGS_PARTITION_ALIGNED_ON_DEVICE); 508838c8a9a5SSteve French info->ByteOffsetForSectorAlignment = 0; 508938c8a9a5SSteve French info->ByteOffsetForPartitionAlignment = 0; 509038c8a9a5SSteve French rsp->OutputBufferLength = cpu_to_le32(28); 509138c8a9a5SSteve French inc_rfc1001_len(work->response_buf, 28); 509238c8a9a5SSteve French fs_infoclass_size = FS_SECTOR_SIZE_INFORMATION_SIZE; 509338c8a9a5SSteve French break; 509438c8a9a5SSteve French } 509538c8a9a5SSteve French case FS_CONTROL_INFORMATION: 509638c8a9a5SSteve French { 509738c8a9a5SSteve French /* 509838c8a9a5SSteve French * TODO : The current implementation is based on 509938c8a9a5SSteve French * test result with win7(NTFS) server. It's need to 510038c8a9a5SSteve French * modify this to get valid Quota values 510138c8a9a5SSteve French * from Linux kernel 510238c8a9a5SSteve French */ 510338c8a9a5SSteve French struct smb2_fs_control_info *info; 510438c8a9a5SSteve French 510538c8a9a5SSteve French info = (struct smb2_fs_control_info *)(rsp->Buffer); 510638c8a9a5SSteve French info->FreeSpaceStartFiltering = 0; 510738c8a9a5SSteve French info->FreeSpaceThreshold = 0; 510838c8a9a5SSteve French info->FreeSpaceStopFiltering = 0; 510938c8a9a5SSteve French info->DefaultQuotaThreshold = cpu_to_le64(SMB2_NO_FID); 511038c8a9a5SSteve French info->DefaultQuotaLimit = cpu_to_le64(SMB2_NO_FID); 511138c8a9a5SSteve French info->Padding = 0; 511238c8a9a5SSteve French rsp->OutputBufferLength = cpu_to_le32(48); 511338c8a9a5SSteve French inc_rfc1001_len(work->response_buf, 48); 511438c8a9a5SSteve French fs_infoclass_size = FS_CONTROL_INFORMATION_SIZE; 511538c8a9a5SSteve French break; 511638c8a9a5SSteve French } 511738c8a9a5SSteve French case FS_POSIX_INFORMATION: 511838c8a9a5SSteve French { 511938c8a9a5SSteve French struct filesystem_posix_info *info; 512038c8a9a5SSteve French 512138c8a9a5SSteve French if (!work->tcon->posix_extensions) { 512238c8a9a5SSteve French pr_err("client doesn't negotiate with SMB3.1.1 POSIX Extensions\n"); 512338c8a9a5SSteve French rc = -EOPNOTSUPP; 512438c8a9a5SSteve French } else { 512538c8a9a5SSteve French info = (struct filesystem_posix_info *)(rsp->Buffer); 512638c8a9a5SSteve French info->OptimalTransferSize = cpu_to_le32(stfs.f_bsize); 512738c8a9a5SSteve French info->BlockSize = cpu_to_le32(stfs.f_bsize); 512838c8a9a5SSteve French info->TotalBlocks = cpu_to_le64(stfs.f_blocks); 512938c8a9a5SSteve French info->BlocksAvail = cpu_to_le64(stfs.f_bfree); 513038c8a9a5SSteve French info->UserBlocksAvail = cpu_to_le64(stfs.f_bavail); 513138c8a9a5SSteve French info->TotalFileNodes = cpu_to_le64(stfs.f_files); 513238c8a9a5SSteve French info->FreeFileNodes = cpu_to_le64(stfs.f_ffree); 513338c8a9a5SSteve French rsp->OutputBufferLength = cpu_to_le32(56); 513438c8a9a5SSteve French inc_rfc1001_len(work->response_buf, 56); 513538c8a9a5SSteve French fs_infoclass_size = FS_POSIX_INFORMATION_SIZE; 513638c8a9a5SSteve French } 513738c8a9a5SSteve French break; 513838c8a9a5SSteve French } 513938c8a9a5SSteve French default: 514038c8a9a5SSteve French path_put(&path); 514138c8a9a5SSteve French return -EOPNOTSUPP; 514238c8a9a5SSteve French } 514338c8a9a5SSteve French rc = buffer_check_err(le32_to_cpu(req->OutputBufferLength), 514438c8a9a5SSteve French rsp, work->response_buf, 514538c8a9a5SSteve French fs_infoclass_size); 514638c8a9a5SSteve French path_put(&path); 514738c8a9a5SSteve French return rc; 514838c8a9a5SSteve French } 514938c8a9a5SSteve French 515038c8a9a5SSteve French static int smb2_get_info_sec(struct ksmbd_work *work, 515138c8a9a5SSteve French struct smb2_query_info_req *req, 515238c8a9a5SSteve French struct smb2_query_info_rsp *rsp) 515338c8a9a5SSteve French { 515438c8a9a5SSteve French struct ksmbd_file *fp; 515538c8a9a5SSteve French struct mnt_idmap *idmap; 515638c8a9a5SSteve French struct smb_ntsd *pntsd = (struct smb_ntsd *)rsp->Buffer, *ppntsd = NULL; 515738c8a9a5SSteve French struct smb_fattr fattr = {{0}}; 515838c8a9a5SSteve French struct inode *inode; 515938c8a9a5SSteve French __u32 secdesclen = 0; 516038c8a9a5SSteve French unsigned int id = KSMBD_NO_FID, pid = KSMBD_NO_FID; 516138c8a9a5SSteve French int addition_info = le32_to_cpu(req->AdditionalInformation); 516238c8a9a5SSteve French int rc = 0, ppntsd_size = 0; 516338c8a9a5SSteve French 516438c8a9a5SSteve French if (addition_info & ~(OWNER_SECINFO | GROUP_SECINFO | DACL_SECINFO | 516538c8a9a5SSteve French PROTECTED_DACL_SECINFO | 516638c8a9a5SSteve French UNPROTECTED_DACL_SECINFO)) { 516738c8a9a5SSteve French ksmbd_debug(SMB, "Unsupported addition info: 0x%x)\n", 516838c8a9a5SSteve French addition_info); 516938c8a9a5SSteve French 517038c8a9a5SSteve French pntsd->revision = cpu_to_le16(1); 517138c8a9a5SSteve French pntsd->type = cpu_to_le16(SELF_RELATIVE | DACL_PROTECTED); 517238c8a9a5SSteve French pntsd->osidoffset = 0; 517338c8a9a5SSteve French pntsd->gsidoffset = 0; 517438c8a9a5SSteve French pntsd->sacloffset = 0; 517538c8a9a5SSteve French pntsd->dacloffset = 0; 517638c8a9a5SSteve French 517738c8a9a5SSteve French secdesclen = sizeof(struct smb_ntsd); 517838c8a9a5SSteve French rsp->OutputBufferLength = cpu_to_le32(secdesclen); 517938c8a9a5SSteve French inc_rfc1001_len(work->response_buf, secdesclen); 518038c8a9a5SSteve French 518138c8a9a5SSteve French return 0; 518238c8a9a5SSteve French } 518338c8a9a5SSteve French 518438c8a9a5SSteve French if (work->next_smb2_rcv_hdr_off) { 518538c8a9a5SSteve French if (!has_file_id(req->VolatileFileId)) { 518638c8a9a5SSteve French ksmbd_debug(SMB, "Compound request set FID = %llu\n", 518738c8a9a5SSteve French work->compound_fid); 518838c8a9a5SSteve French id = work->compound_fid; 518938c8a9a5SSteve French pid = work->compound_pfid; 519038c8a9a5SSteve French } 519138c8a9a5SSteve French } 519238c8a9a5SSteve French 519338c8a9a5SSteve French if (!has_file_id(id)) { 519438c8a9a5SSteve French id = req->VolatileFileId; 519538c8a9a5SSteve French pid = req->PersistentFileId; 519638c8a9a5SSteve French } 519738c8a9a5SSteve French 519838c8a9a5SSteve French fp = ksmbd_lookup_fd_slow(work, id, pid); 519938c8a9a5SSteve French if (!fp) 520038c8a9a5SSteve French return -ENOENT; 520138c8a9a5SSteve French 520238c8a9a5SSteve French idmap = file_mnt_idmap(fp->filp); 520338c8a9a5SSteve French inode = file_inode(fp->filp); 520438c8a9a5SSteve French ksmbd_acls_fattr(&fattr, idmap, inode); 520538c8a9a5SSteve French 520638c8a9a5SSteve French if (test_share_config_flag(work->tcon->share_conf, 520738c8a9a5SSteve French KSMBD_SHARE_FLAG_ACL_XATTR)) 520838c8a9a5SSteve French ppntsd_size = ksmbd_vfs_get_sd_xattr(work->conn, idmap, 520938c8a9a5SSteve French fp->filp->f_path.dentry, 521038c8a9a5SSteve French &ppntsd); 521138c8a9a5SSteve French 521238c8a9a5SSteve French /* Check if sd buffer size exceeds response buffer size */ 521338c8a9a5SSteve French if (smb2_resp_buf_len(work, 8) > ppntsd_size) 521438c8a9a5SSteve French rc = build_sec_desc(idmap, pntsd, ppntsd, ppntsd_size, 521538c8a9a5SSteve French addition_info, &secdesclen, &fattr); 521638c8a9a5SSteve French posix_acl_release(fattr.cf_acls); 521738c8a9a5SSteve French posix_acl_release(fattr.cf_dacls); 521838c8a9a5SSteve French kfree(ppntsd); 521938c8a9a5SSteve French ksmbd_fd_put(work, fp); 522038c8a9a5SSteve French if (rc) 522138c8a9a5SSteve French return rc; 522238c8a9a5SSteve French 522338c8a9a5SSteve French rsp->OutputBufferLength = cpu_to_le32(secdesclen); 522438c8a9a5SSteve French inc_rfc1001_len(work->response_buf, secdesclen); 522538c8a9a5SSteve French return 0; 522638c8a9a5SSteve French } 522738c8a9a5SSteve French 522838c8a9a5SSteve French /** 522938c8a9a5SSteve French * smb2_query_info() - handler for smb2 query info command 523038c8a9a5SSteve French * @work: smb work containing query info request buffer 523138c8a9a5SSteve French * 523238c8a9a5SSteve French * Return: 0 on success, otherwise error 523338c8a9a5SSteve French */ 523438c8a9a5SSteve French int smb2_query_info(struct ksmbd_work *work) 523538c8a9a5SSteve French { 523638c8a9a5SSteve French struct smb2_query_info_req *req; 523738c8a9a5SSteve French struct smb2_query_info_rsp *rsp; 523838c8a9a5SSteve French int rc = 0; 523938c8a9a5SSteve French 524038c8a9a5SSteve French WORK_BUFFERS(work, req, rsp); 524138c8a9a5SSteve French 524238c8a9a5SSteve French ksmbd_debug(SMB, "GOT query info request\n"); 524338c8a9a5SSteve French 524438c8a9a5SSteve French switch (req->InfoType) { 524538c8a9a5SSteve French case SMB2_O_INFO_FILE: 524638c8a9a5SSteve French ksmbd_debug(SMB, "GOT SMB2_O_INFO_FILE\n"); 524738c8a9a5SSteve French rc = smb2_get_info_file(work, req, rsp); 524838c8a9a5SSteve French break; 524938c8a9a5SSteve French case SMB2_O_INFO_FILESYSTEM: 525038c8a9a5SSteve French ksmbd_debug(SMB, "GOT SMB2_O_INFO_FILESYSTEM\n"); 525138c8a9a5SSteve French rc = smb2_get_info_filesystem(work, req, rsp); 525238c8a9a5SSteve French break; 525338c8a9a5SSteve French case SMB2_O_INFO_SECURITY: 525438c8a9a5SSteve French ksmbd_debug(SMB, "GOT SMB2_O_INFO_SECURITY\n"); 525538c8a9a5SSteve French rc = smb2_get_info_sec(work, req, rsp); 525638c8a9a5SSteve French break; 525738c8a9a5SSteve French default: 525838c8a9a5SSteve French ksmbd_debug(SMB, "InfoType %d not supported yet\n", 525938c8a9a5SSteve French req->InfoType); 526038c8a9a5SSteve French rc = -EOPNOTSUPP; 526138c8a9a5SSteve French } 526238c8a9a5SSteve French 526338c8a9a5SSteve French if (rc < 0) { 526438c8a9a5SSteve French if (rc == -EACCES) 526538c8a9a5SSteve French rsp->hdr.Status = STATUS_ACCESS_DENIED; 526638c8a9a5SSteve French else if (rc == -ENOENT) 526738c8a9a5SSteve French rsp->hdr.Status = STATUS_FILE_CLOSED; 526838c8a9a5SSteve French else if (rc == -EIO) 526938c8a9a5SSteve French rsp->hdr.Status = STATUS_UNEXPECTED_IO_ERROR; 527038c8a9a5SSteve French else if (rc == -EOPNOTSUPP || rsp->hdr.Status == 0) 527138c8a9a5SSteve French rsp->hdr.Status = STATUS_INVALID_INFO_CLASS; 527238c8a9a5SSteve French smb2_set_err_rsp(work); 527338c8a9a5SSteve French 527438c8a9a5SSteve French ksmbd_debug(SMB, "error while processing smb2 query rc = %d\n", 527538c8a9a5SSteve French rc); 527638c8a9a5SSteve French return rc; 527738c8a9a5SSteve French } 527838c8a9a5SSteve French rsp->StructureSize = cpu_to_le16(9); 527938c8a9a5SSteve French rsp->OutputBufferOffset = cpu_to_le16(72); 528038c8a9a5SSteve French inc_rfc1001_len(work->response_buf, 8); 528138c8a9a5SSteve French return 0; 528238c8a9a5SSteve French } 528338c8a9a5SSteve French 528438c8a9a5SSteve French /** 528538c8a9a5SSteve French * smb2_close_pipe() - handler for closing IPC pipe 528638c8a9a5SSteve French * @work: smb work containing close request buffer 528738c8a9a5SSteve French * 528838c8a9a5SSteve French * Return: 0 528938c8a9a5SSteve French */ 529038c8a9a5SSteve French static noinline int smb2_close_pipe(struct ksmbd_work *work) 529138c8a9a5SSteve French { 529238c8a9a5SSteve French u64 id; 529338c8a9a5SSteve French struct smb2_close_req *req = smb2_get_msg(work->request_buf); 529438c8a9a5SSteve French struct smb2_close_rsp *rsp = smb2_get_msg(work->response_buf); 529538c8a9a5SSteve French 529638c8a9a5SSteve French id = req->VolatileFileId; 529738c8a9a5SSteve French ksmbd_session_rpc_close(work->sess, id); 529838c8a9a5SSteve French 529938c8a9a5SSteve French rsp->StructureSize = cpu_to_le16(60); 530038c8a9a5SSteve French rsp->Flags = 0; 530138c8a9a5SSteve French rsp->Reserved = 0; 530238c8a9a5SSteve French rsp->CreationTime = 0; 530338c8a9a5SSteve French rsp->LastAccessTime = 0; 530438c8a9a5SSteve French rsp->LastWriteTime = 0; 530538c8a9a5SSteve French rsp->ChangeTime = 0; 530638c8a9a5SSteve French rsp->AllocationSize = 0; 530738c8a9a5SSteve French rsp->EndOfFile = 0; 530838c8a9a5SSteve French rsp->Attributes = 0; 530938c8a9a5SSteve French inc_rfc1001_len(work->response_buf, 60); 531038c8a9a5SSteve French return 0; 531138c8a9a5SSteve French } 531238c8a9a5SSteve French 531338c8a9a5SSteve French /** 531438c8a9a5SSteve French * smb2_close() - handler for smb2 close file command 531538c8a9a5SSteve French * @work: smb work containing close request buffer 531638c8a9a5SSteve French * 531738c8a9a5SSteve French * Return: 0 531838c8a9a5SSteve French */ 531938c8a9a5SSteve French int smb2_close(struct ksmbd_work *work) 532038c8a9a5SSteve French { 532138c8a9a5SSteve French u64 volatile_id = KSMBD_NO_FID; 532238c8a9a5SSteve French u64 sess_id; 532338c8a9a5SSteve French struct smb2_close_req *req; 532438c8a9a5SSteve French struct smb2_close_rsp *rsp; 532538c8a9a5SSteve French struct ksmbd_conn *conn = work->conn; 532638c8a9a5SSteve French struct ksmbd_file *fp; 532738c8a9a5SSteve French struct inode *inode; 532838c8a9a5SSteve French u64 time; 532938c8a9a5SSteve French int err = 0; 533038c8a9a5SSteve French 533138c8a9a5SSteve French WORK_BUFFERS(work, req, rsp); 533238c8a9a5SSteve French 533338c8a9a5SSteve French if (test_share_config_flag(work->tcon->share_conf, 533438c8a9a5SSteve French KSMBD_SHARE_FLAG_PIPE)) { 533538c8a9a5SSteve French ksmbd_debug(SMB, "IPC pipe close request\n"); 533638c8a9a5SSteve French return smb2_close_pipe(work); 533738c8a9a5SSteve French } 533838c8a9a5SSteve French 533938c8a9a5SSteve French sess_id = le64_to_cpu(req->hdr.SessionId); 534038c8a9a5SSteve French if (req->hdr.Flags & SMB2_FLAGS_RELATED_OPERATIONS) 534138c8a9a5SSteve French sess_id = work->compound_sid; 534238c8a9a5SSteve French 534338c8a9a5SSteve French work->compound_sid = 0; 534438c8a9a5SSteve French if (check_session_id(conn, sess_id)) { 534538c8a9a5SSteve French work->compound_sid = sess_id; 534638c8a9a5SSteve French } else { 534738c8a9a5SSteve French rsp->hdr.Status = STATUS_USER_SESSION_DELETED; 534838c8a9a5SSteve French if (req->hdr.Flags & SMB2_FLAGS_RELATED_OPERATIONS) 534938c8a9a5SSteve French rsp->hdr.Status = STATUS_INVALID_PARAMETER; 535038c8a9a5SSteve French err = -EBADF; 535138c8a9a5SSteve French goto out; 535238c8a9a5SSteve French } 535338c8a9a5SSteve French 535438c8a9a5SSteve French if (work->next_smb2_rcv_hdr_off && 535538c8a9a5SSteve French !has_file_id(req->VolatileFileId)) { 535638c8a9a5SSteve French if (!has_file_id(work->compound_fid)) { 535738c8a9a5SSteve French /* file already closed, return FILE_CLOSED */ 535838c8a9a5SSteve French ksmbd_debug(SMB, "file already closed\n"); 535938c8a9a5SSteve French rsp->hdr.Status = STATUS_FILE_CLOSED; 536038c8a9a5SSteve French err = -EBADF; 536138c8a9a5SSteve French goto out; 536238c8a9a5SSteve French } else { 536338c8a9a5SSteve French ksmbd_debug(SMB, 536438c8a9a5SSteve French "Compound request set FID = %llu:%llu\n", 536538c8a9a5SSteve French work->compound_fid, 536638c8a9a5SSteve French work->compound_pfid); 536738c8a9a5SSteve French volatile_id = work->compound_fid; 536838c8a9a5SSteve French 536938c8a9a5SSteve French /* file closed, stored id is not valid anymore */ 537038c8a9a5SSteve French work->compound_fid = KSMBD_NO_FID; 537138c8a9a5SSteve French work->compound_pfid = KSMBD_NO_FID; 537238c8a9a5SSteve French } 537338c8a9a5SSteve French } else { 537438c8a9a5SSteve French volatile_id = req->VolatileFileId; 537538c8a9a5SSteve French } 537638c8a9a5SSteve French ksmbd_debug(SMB, "volatile_id = %llu\n", volatile_id); 537738c8a9a5SSteve French 537838c8a9a5SSteve French rsp->StructureSize = cpu_to_le16(60); 537938c8a9a5SSteve French rsp->Reserved = 0; 538038c8a9a5SSteve French 538138c8a9a5SSteve French if (req->Flags == SMB2_CLOSE_FLAG_POSTQUERY_ATTRIB) { 538238c8a9a5SSteve French fp = ksmbd_lookup_fd_fast(work, volatile_id); 538338c8a9a5SSteve French if (!fp) { 538438c8a9a5SSteve French err = -ENOENT; 538538c8a9a5SSteve French goto out; 538638c8a9a5SSteve French } 538738c8a9a5SSteve French 538838c8a9a5SSteve French inode = file_inode(fp->filp); 538938c8a9a5SSteve French rsp->Flags = SMB2_CLOSE_FLAG_POSTQUERY_ATTRIB; 539038c8a9a5SSteve French rsp->AllocationSize = S_ISDIR(inode->i_mode) ? 0 : 539138c8a9a5SSteve French cpu_to_le64(inode->i_blocks << 9); 539238c8a9a5SSteve French rsp->EndOfFile = cpu_to_le64(inode->i_size); 539338c8a9a5SSteve French rsp->Attributes = fp->f_ci->m_fattr; 539438c8a9a5SSteve French rsp->CreationTime = cpu_to_le64(fp->create_time); 539538c8a9a5SSteve French time = ksmbd_UnixTimeToNT(inode->i_atime); 539638c8a9a5SSteve French rsp->LastAccessTime = cpu_to_le64(time); 539738c8a9a5SSteve French time = ksmbd_UnixTimeToNT(inode->i_mtime); 539838c8a9a5SSteve French rsp->LastWriteTime = cpu_to_le64(time); 539938c8a9a5SSteve French time = ksmbd_UnixTimeToNT(inode->i_ctime); 540038c8a9a5SSteve French rsp->ChangeTime = cpu_to_le64(time); 540138c8a9a5SSteve French ksmbd_fd_put(work, fp); 540238c8a9a5SSteve French } else { 540338c8a9a5SSteve French rsp->Flags = 0; 540438c8a9a5SSteve French rsp->AllocationSize = 0; 540538c8a9a5SSteve French rsp->EndOfFile = 0; 540638c8a9a5SSteve French rsp->Attributes = 0; 540738c8a9a5SSteve French rsp->CreationTime = 0; 540838c8a9a5SSteve French rsp->LastAccessTime = 0; 540938c8a9a5SSteve French rsp->LastWriteTime = 0; 541038c8a9a5SSteve French rsp->ChangeTime = 0; 541138c8a9a5SSteve French } 541238c8a9a5SSteve French 541338c8a9a5SSteve French err = ksmbd_close_fd(work, volatile_id); 541438c8a9a5SSteve French out: 541538c8a9a5SSteve French if (err) { 541638c8a9a5SSteve French if (rsp->hdr.Status == 0) 541738c8a9a5SSteve French rsp->hdr.Status = STATUS_FILE_CLOSED; 541838c8a9a5SSteve French smb2_set_err_rsp(work); 541938c8a9a5SSteve French } else { 542038c8a9a5SSteve French inc_rfc1001_len(work->response_buf, 60); 542138c8a9a5SSteve French } 542238c8a9a5SSteve French 542338c8a9a5SSteve French return 0; 542438c8a9a5SSteve French } 542538c8a9a5SSteve French 542638c8a9a5SSteve French /** 542738c8a9a5SSteve French * smb2_echo() - handler for smb2 echo(ping) command 542838c8a9a5SSteve French * @work: smb work containing echo request buffer 542938c8a9a5SSteve French * 543038c8a9a5SSteve French * Return: 0 543138c8a9a5SSteve French */ 543238c8a9a5SSteve French int smb2_echo(struct ksmbd_work *work) 543338c8a9a5SSteve French { 543438c8a9a5SSteve French struct smb2_echo_rsp *rsp = smb2_get_msg(work->response_buf); 543538c8a9a5SSteve French 543638c8a9a5SSteve French rsp->StructureSize = cpu_to_le16(4); 543738c8a9a5SSteve French rsp->Reserved = 0; 543838c8a9a5SSteve French inc_rfc1001_len(work->response_buf, 4); 543938c8a9a5SSteve French return 0; 544038c8a9a5SSteve French } 544138c8a9a5SSteve French 544238c8a9a5SSteve French static int smb2_rename(struct ksmbd_work *work, 544338c8a9a5SSteve French struct ksmbd_file *fp, 544438c8a9a5SSteve French struct smb2_file_rename_info *file_info, 544538c8a9a5SSteve French struct nls_table *local_nls) 544638c8a9a5SSteve French { 544738c8a9a5SSteve French struct ksmbd_share_config *share = fp->tcon->share_conf; 544838c8a9a5SSteve French char *new_name = NULL; 544938c8a9a5SSteve French int rc, flags = 0; 545038c8a9a5SSteve French 545138c8a9a5SSteve French ksmbd_debug(SMB, "setting FILE_RENAME_INFO\n"); 545238c8a9a5SSteve French new_name = smb2_get_name(file_info->FileName, 545338c8a9a5SSteve French le32_to_cpu(file_info->FileNameLength), 545438c8a9a5SSteve French local_nls); 545538c8a9a5SSteve French if (IS_ERR(new_name)) 545638c8a9a5SSteve French return PTR_ERR(new_name); 545738c8a9a5SSteve French 545838c8a9a5SSteve French if (strchr(new_name, ':')) { 545938c8a9a5SSteve French int s_type; 546038c8a9a5SSteve French char *xattr_stream_name, *stream_name = NULL; 546138c8a9a5SSteve French size_t xattr_stream_size; 546238c8a9a5SSteve French int len; 546338c8a9a5SSteve French 546438c8a9a5SSteve French rc = parse_stream_name(new_name, &stream_name, &s_type); 546538c8a9a5SSteve French if (rc < 0) 546638c8a9a5SSteve French goto out; 546738c8a9a5SSteve French 546838c8a9a5SSteve French len = strlen(new_name); 546938c8a9a5SSteve French if (len > 0 && new_name[len - 1] != '/') { 547038c8a9a5SSteve French pr_err("not allow base filename in rename\n"); 547138c8a9a5SSteve French rc = -ESHARE; 547238c8a9a5SSteve French goto out; 547338c8a9a5SSteve French } 547438c8a9a5SSteve French 547538c8a9a5SSteve French rc = ksmbd_vfs_xattr_stream_name(stream_name, 547638c8a9a5SSteve French &xattr_stream_name, 547738c8a9a5SSteve French &xattr_stream_size, 547838c8a9a5SSteve French s_type); 547938c8a9a5SSteve French if (rc) 548038c8a9a5SSteve French goto out; 548138c8a9a5SSteve French 548238c8a9a5SSteve French rc = ksmbd_vfs_setxattr(file_mnt_idmap(fp->filp), 548338c8a9a5SSteve French fp->filp->f_path.dentry, 548438c8a9a5SSteve French xattr_stream_name, 548538c8a9a5SSteve French NULL, 0, 0); 548638c8a9a5SSteve French if (rc < 0) { 548738c8a9a5SSteve French pr_err("failed to store stream name in xattr: %d\n", 548838c8a9a5SSteve French rc); 548938c8a9a5SSteve French rc = -EINVAL; 549038c8a9a5SSteve French goto out; 549138c8a9a5SSteve French } 549238c8a9a5SSteve French 549338c8a9a5SSteve French goto out; 549438c8a9a5SSteve French } 549538c8a9a5SSteve French 549638c8a9a5SSteve French ksmbd_debug(SMB, "new name %s\n", new_name); 549738c8a9a5SSteve French if (ksmbd_share_veto_filename(share, new_name)) { 549838c8a9a5SSteve French rc = -ENOENT; 549938c8a9a5SSteve French ksmbd_debug(SMB, "Can't rename vetoed file: %s\n", new_name); 550038c8a9a5SSteve French goto out; 550138c8a9a5SSteve French } 550238c8a9a5SSteve French 550338c8a9a5SSteve French if (!file_info->ReplaceIfExists) 550438c8a9a5SSteve French flags = RENAME_NOREPLACE; 550538c8a9a5SSteve French 550638c8a9a5SSteve French rc = ksmbd_vfs_rename(work, &fp->filp->f_path, new_name, flags); 550738c8a9a5SSteve French out: 550838c8a9a5SSteve French kfree(new_name); 550938c8a9a5SSteve French return rc; 551038c8a9a5SSteve French } 551138c8a9a5SSteve French 551238c8a9a5SSteve French static int smb2_create_link(struct ksmbd_work *work, 551338c8a9a5SSteve French struct ksmbd_share_config *share, 551438c8a9a5SSteve French struct smb2_file_link_info *file_info, 551538c8a9a5SSteve French unsigned int buf_len, struct file *filp, 551638c8a9a5SSteve French struct nls_table *local_nls) 551738c8a9a5SSteve French { 551838c8a9a5SSteve French char *link_name = NULL, *target_name = NULL, *pathname = NULL; 551938c8a9a5SSteve French struct path path; 5520df14afeeSNamjae Jeon bool file_present = false; 552138c8a9a5SSteve French int rc; 552238c8a9a5SSteve French 552338c8a9a5SSteve French if (buf_len < (u64)sizeof(struct smb2_file_link_info) + 552438c8a9a5SSteve French le32_to_cpu(file_info->FileNameLength)) 552538c8a9a5SSteve French return -EINVAL; 552638c8a9a5SSteve French 552738c8a9a5SSteve French ksmbd_debug(SMB, "setting FILE_LINK_INFORMATION\n"); 552838c8a9a5SSteve French pathname = kmalloc(PATH_MAX, GFP_KERNEL); 552938c8a9a5SSteve French if (!pathname) 553038c8a9a5SSteve French return -ENOMEM; 553138c8a9a5SSteve French 553238c8a9a5SSteve French link_name = smb2_get_name(file_info->FileName, 553338c8a9a5SSteve French le32_to_cpu(file_info->FileNameLength), 553438c8a9a5SSteve French local_nls); 553538c8a9a5SSteve French if (IS_ERR(link_name) || S_ISDIR(file_inode(filp)->i_mode)) { 553638c8a9a5SSteve French rc = -EINVAL; 553738c8a9a5SSteve French goto out; 553838c8a9a5SSteve French } 553938c8a9a5SSteve French 554038c8a9a5SSteve French ksmbd_debug(SMB, "link name is %s\n", link_name); 554138c8a9a5SSteve French target_name = file_path(filp, pathname, PATH_MAX); 554238c8a9a5SSteve French if (IS_ERR(target_name)) { 554338c8a9a5SSteve French rc = -EINVAL; 554438c8a9a5SSteve French goto out; 554538c8a9a5SSteve French } 554638c8a9a5SSteve French 554738c8a9a5SSteve French ksmbd_debug(SMB, "target name is %s\n", target_name); 554838c8a9a5SSteve French rc = ksmbd_vfs_kern_path_locked(work, link_name, LOOKUP_NO_SYMLINKS, 554938c8a9a5SSteve French &path, 0); 555038c8a9a5SSteve French if (rc) { 555138c8a9a5SSteve French if (rc != -ENOENT) 555238c8a9a5SSteve French goto out; 5553df14afeeSNamjae Jeon } else 5554df14afeeSNamjae Jeon file_present = true; 555538c8a9a5SSteve French 555638c8a9a5SSteve French if (file_info->ReplaceIfExists) { 555738c8a9a5SSteve French if (file_present) { 555838c8a9a5SSteve French rc = ksmbd_vfs_remove_file(work, &path); 555938c8a9a5SSteve French if (rc) { 556038c8a9a5SSteve French rc = -EINVAL; 556138c8a9a5SSteve French ksmbd_debug(SMB, "cannot delete %s\n", 556238c8a9a5SSteve French link_name); 556338c8a9a5SSteve French goto out; 556438c8a9a5SSteve French } 556538c8a9a5SSteve French } 556638c8a9a5SSteve French } else { 556738c8a9a5SSteve French if (file_present) { 556838c8a9a5SSteve French rc = -EEXIST; 556938c8a9a5SSteve French ksmbd_debug(SMB, "link already exists\n"); 557038c8a9a5SSteve French goto out; 557138c8a9a5SSteve French } 557238c8a9a5SSteve French } 557338c8a9a5SSteve French 557438c8a9a5SSteve French rc = ksmbd_vfs_link(work, target_name, link_name); 557538c8a9a5SSteve French if (rc) 557638c8a9a5SSteve French rc = -EINVAL; 557738c8a9a5SSteve French out: 557838c8a9a5SSteve French if (file_present) { 557938c8a9a5SSteve French inode_unlock(d_inode(path.dentry->d_parent)); 558038c8a9a5SSteve French path_put(&path); 558138c8a9a5SSteve French } 558238c8a9a5SSteve French if (!IS_ERR(link_name)) 558338c8a9a5SSteve French kfree(link_name); 558438c8a9a5SSteve French kfree(pathname); 558538c8a9a5SSteve French return rc; 558638c8a9a5SSteve French } 558738c8a9a5SSteve French 558838c8a9a5SSteve French static int set_file_basic_info(struct ksmbd_file *fp, 558938c8a9a5SSteve French struct smb2_file_basic_info *file_info, 559038c8a9a5SSteve French struct ksmbd_share_config *share) 559138c8a9a5SSteve French { 559238c8a9a5SSteve French struct iattr attrs; 559338c8a9a5SSteve French struct file *filp; 559438c8a9a5SSteve French struct inode *inode; 559538c8a9a5SSteve French struct mnt_idmap *idmap; 559638c8a9a5SSteve French int rc = 0; 559738c8a9a5SSteve French 559838c8a9a5SSteve French if (!(fp->daccess & FILE_WRITE_ATTRIBUTES_LE)) 559938c8a9a5SSteve French return -EACCES; 560038c8a9a5SSteve French 560138c8a9a5SSteve French attrs.ia_valid = 0; 560238c8a9a5SSteve French filp = fp->filp; 560338c8a9a5SSteve French inode = file_inode(filp); 560438c8a9a5SSteve French idmap = file_mnt_idmap(filp); 560538c8a9a5SSteve French 560638c8a9a5SSteve French if (file_info->CreationTime) 560738c8a9a5SSteve French fp->create_time = le64_to_cpu(file_info->CreationTime); 560838c8a9a5SSteve French 560938c8a9a5SSteve French if (file_info->LastAccessTime) { 561038c8a9a5SSteve French attrs.ia_atime = ksmbd_NTtimeToUnix(file_info->LastAccessTime); 561138c8a9a5SSteve French attrs.ia_valid |= (ATTR_ATIME | ATTR_ATIME_SET); 561238c8a9a5SSteve French } 561338c8a9a5SSteve French 561438c8a9a5SSteve French attrs.ia_valid |= ATTR_CTIME; 561538c8a9a5SSteve French if (file_info->ChangeTime) 561638c8a9a5SSteve French attrs.ia_ctime = ksmbd_NTtimeToUnix(file_info->ChangeTime); 561738c8a9a5SSteve French else 561838c8a9a5SSteve French attrs.ia_ctime = inode->i_ctime; 561938c8a9a5SSteve French 562038c8a9a5SSteve French if (file_info->LastWriteTime) { 562138c8a9a5SSteve French attrs.ia_mtime = ksmbd_NTtimeToUnix(file_info->LastWriteTime); 562238c8a9a5SSteve French attrs.ia_valid |= (ATTR_MTIME | ATTR_MTIME_SET); 562338c8a9a5SSteve French } 562438c8a9a5SSteve French 562538c8a9a5SSteve French if (file_info->Attributes) { 562638c8a9a5SSteve French if (!S_ISDIR(inode->i_mode) && 562738c8a9a5SSteve French file_info->Attributes & FILE_ATTRIBUTE_DIRECTORY_LE) { 562838c8a9a5SSteve French pr_err("can't change a file to a directory\n"); 562938c8a9a5SSteve French return -EINVAL; 563038c8a9a5SSteve French } 563138c8a9a5SSteve French 563238c8a9a5SSteve French if (!(S_ISDIR(inode->i_mode) && file_info->Attributes == FILE_ATTRIBUTE_NORMAL_LE)) 563338c8a9a5SSteve French fp->f_ci->m_fattr = file_info->Attributes | 563438c8a9a5SSteve French (fp->f_ci->m_fattr & FILE_ATTRIBUTE_DIRECTORY_LE); 563538c8a9a5SSteve French } 563638c8a9a5SSteve French 563738c8a9a5SSteve French if (test_share_config_flag(share, KSMBD_SHARE_FLAG_STORE_DOS_ATTRS) && 563838c8a9a5SSteve French (file_info->CreationTime || file_info->Attributes)) { 563938c8a9a5SSteve French struct xattr_dos_attrib da = {0}; 564038c8a9a5SSteve French 564138c8a9a5SSteve French da.version = 4; 564238c8a9a5SSteve French da.itime = fp->itime; 564338c8a9a5SSteve French da.create_time = fp->create_time; 564438c8a9a5SSteve French da.attr = le32_to_cpu(fp->f_ci->m_fattr); 564538c8a9a5SSteve French da.flags = XATTR_DOSINFO_ATTRIB | XATTR_DOSINFO_CREATE_TIME | 564638c8a9a5SSteve French XATTR_DOSINFO_ITIME; 564738c8a9a5SSteve French 564838c8a9a5SSteve French rc = ksmbd_vfs_set_dos_attrib_xattr(idmap, 564938c8a9a5SSteve French filp->f_path.dentry, &da); 565038c8a9a5SSteve French if (rc) 565138c8a9a5SSteve French ksmbd_debug(SMB, 565238c8a9a5SSteve French "failed to restore file attribute in EA\n"); 565338c8a9a5SSteve French rc = 0; 565438c8a9a5SSteve French } 565538c8a9a5SSteve French 565638c8a9a5SSteve French if (attrs.ia_valid) { 565738c8a9a5SSteve French struct dentry *dentry = filp->f_path.dentry; 565838c8a9a5SSteve French struct inode *inode = d_inode(dentry); 565938c8a9a5SSteve French 566038c8a9a5SSteve French if (IS_IMMUTABLE(inode) || IS_APPEND(inode)) 566138c8a9a5SSteve French return -EACCES; 566238c8a9a5SSteve French 566338c8a9a5SSteve French inode_lock(inode); 566438c8a9a5SSteve French inode->i_ctime = attrs.ia_ctime; 566538c8a9a5SSteve French attrs.ia_valid &= ~ATTR_CTIME; 566638c8a9a5SSteve French rc = notify_change(idmap, dentry, &attrs, NULL); 566738c8a9a5SSteve French inode_unlock(inode); 566838c8a9a5SSteve French } 566938c8a9a5SSteve French return rc; 567038c8a9a5SSteve French } 567138c8a9a5SSteve French 567238c8a9a5SSteve French static int set_file_allocation_info(struct ksmbd_work *work, 567338c8a9a5SSteve French struct ksmbd_file *fp, 567438c8a9a5SSteve French struct smb2_file_alloc_info *file_alloc_info) 567538c8a9a5SSteve French { 567638c8a9a5SSteve French /* 567738c8a9a5SSteve French * TODO : It's working fine only when store dos attributes 567838c8a9a5SSteve French * is not yes. need to implement a logic which works 567938c8a9a5SSteve French * properly with any smb.conf option 568038c8a9a5SSteve French */ 568138c8a9a5SSteve French 568238c8a9a5SSteve French loff_t alloc_blks; 568338c8a9a5SSteve French struct inode *inode; 568438c8a9a5SSteve French int rc; 568538c8a9a5SSteve French 568638c8a9a5SSteve French if (!(fp->daccess & FILE_WRITE_DATA_LE)) 568738c8a9a5SSteve French return -EACCES; 568838c8a9a5SSteve French 568938c8a9a5SSteve French alloc_blks = (le64_to_cpu(file_alloc_info->AllocationSize) + 511) >> 9; 569038c8a9a5SSteve French inode = file_inode(fp->filp); 569138c8a9a5SSteve French 569238c8a9a5SSteve French if (alloc_blks > inode->i_blocks) { 569338c8a9a5SSteve French smb_break_all_levII_oplock(work, fp, 1); 569438c8a9a5SSteve French rc = vfs_fallocate(fp->filp, FALLOC_FL_KEEP_SIZE, 0, 569538c8a9a5SSteve French alloc_blks * 512); 569638c8a9a5SSteve French if (rc && rc != -EOPNOTSUPP) { 569738c8a9a5SSteve French pr_err("vfs_fallocate is failed : %d\n", rc); 569838c8a9a5SSteve French return rc; 569938c8a9a5SSteve French } 570038c8a9a5SSteve French } else if (alloc_blks < inode->i_blocks) { 570138c8a9a5SSteve French loff_t size; 570238c8a9a5SSteve French 570338c8a9a5SSteve French /* 570438c8a9a5SSteve French * Allocation size could be smaller than original one 570538c8a9a5SSteve French * which means allocated blocks in file should be 570638c8a9a5SSteve French * deallocated. use truncate to cut out it, but inode 570738c8a9a5SSteve French * size is also updated with truncate offset. 570838c8a9a5SSteve French * inode size is retained by backup inode size. 570938c8a9a5SSteve French */ 571038c8a9a5SSteve French size = i_size_read(inode); 571138c8a9a5SSteve French rc = ksmbd_vfs_truncate(work, fp, alloc_blks * 512); 571238c8a9a5SSteve French if (rc) { 571338c8a9a5SSteve French pr_err("truncate failed!, err %d\n", rc); 571438c8a9a5SSteve French return rc; 571538c8a9a5SSteve French } 571638c8a9a5SSteve French if (size < alloc_blks * 512) 571738c8a9a5SSteve French i_size_write(inode, size); 571838c8a9a5SSteve French } 571938c8a9a5SSteve French return 0; 572038c8a9a5SSteve French } 572138c8a9a5SSteve French 572238c8a9a5SSteve French static int set_end_of_file_info(struct ksmbd_work *work, struct ksmbd_file *fp, 572338c8a9a5SSteve French struct smb2_file_eof_info *file_eof_info) 572438c8a9a5SSteve French { 572538c8a9a5SSteve French loff_t newsize; 572638c8a9a5SSteve French struct inode *inode; 572738c8a9a5SSteve French int rc; 572838c8a9a5SSteve French 572938c8a9a5SSteve French if (!(fp->daccess & FILE_WRITE_DATA_LE)) 573038c8a9a5SSteve French return -EACCES; 573138c8a9a5SSteve French 573238c8a9a5SSteve French newsize = le64_to_cpu(file_eof_info->EndOfFile); 573338c8a9a5SSteve French inode = file_inode(fp->filp); 573438c8a9a5SSteve French 573538c8a9a5SSteve French /* 573638c8a9a5SSteve French * If FILE_END_OF_FILE_INFORMATION of set_info_file is called 573738c8a9a5SSteve French * on FAT32 shared device, truncate execution time is too long 573838c8a9a5SSteve French * and network error could cause from windows client. because 573938c8a9a5SSteve French * truncate of some filesystem like FAT32 fill zero data in 574038c8a9a5SSteve French * truncated range. 574138c8a9a5SSteve French */ 574238c8a9a5SSteve French if (inode->i_sb->s_magic != MSDOS_SUPER_MAGIC) { 574338c8a9a5SSteve French ksmbd_debug(SMB, "truncated to newsize %lld\n", newsize); 574438c8a9a5SSteve French rc = ksmbd_vfs_truncate(work, fp, newsize); 574538c8a9a5SSteve French if (rc) { 574638c8a9a5SSteve French ksmbd_debug(SMB, "truncate failed!, err %d\n", rc); 574738c8a9a5SSteve French if (rc != -EAGAIN) 574838c8a9a5SSteve French rc = -EBADF; 574938c8a9a5SSteve French return rc; 575038c8a9a5SSteve French } 575138c8a9a5SSteve French } 575238c8a9a5SSteve French return 0; 575338c8a9a5SSteve French } 575438c8a9a5SSteve French 575538c8a9a5SSteve French static int set_rename_info(struct ksmbd_work *work, struct ksmbd_file *fp, 575638c8a9a5SSteve French struct smb2_file_rename_info *rename_info, 575738c8a9a5SSteve French unsigned int buf_len) 575838c8a9a5SSteve French { 575938c8a9a5SSteve French if (!(fp->daccess & FILE_DELETE_LE)) { 576038c8a9a5SSteve French pr_err("no right to delete : 0x%x\n", fp->daccess); 576138c8a9a5SSteve French return -EACCES; 576238c8a9a5SSteve French } 576338c8a9a5SSteve French 576438c8a9a5SSteve French if (buf_len < (u64)sizeof(struct smb2_file_rename_info) + 576538c8a9a5SSteve French le32_to_cpu(rename_info->FileNameLength)) 576638c8a9a5SSteve French return -EINVAL; 576738c8a9a5SSteve French 576838c8a9a5SSteve French if (!le32_to_cpu(rename_info->FileNameLength)) 576938c8a9a5SSteve French return -EINVAL; 577038c8a9a5SSteve French 577138c8a9a5SSteve French return smb2_rename(work, fp, rename_info, work->conn->local_nls); 577238c8a9a5SSteve French } 577338c8a9a5SSteve French 577438c8a9a5SSteve French static int set_file_disposition_info(struct ksmbd_file *fp, 577538c8a9a5SSteve French struct smb2_file_disposition_info *file_info) 577638c8a9a5SSteve French { 577738c8a9a5SSteve French struct inode *inode; 577838c8a9a5SSteve French 577938c8a9a5SSteve French if (!(fp->daccess & FILE_DELETE_LE)) { 578038c8a9a5SSteve French pr_err("no right to delete : 0x%x\n", fp->daccess); 578138c8a9a5SSteve French return -EACCES; 578238c8a9a5SSteve French } 578338c8a9a5SSteve French 578438c8a9a5SSteve French inode = file_inode(fp->filp); 578538c8a9a5SSteve French if (file_info->DeletePending) { 578638c8a9a5SSteve French if (S_ISDIR(inode->i_mode) && 578738c8a9a5SSteve French ksmbd_vfs_empty_dir(fp) == -ENOTEMPTY) 578838c8a9a5SSteve French return -EBUSY; 578938c8a9a5SSteve French ksmbd_set_inode_pending_delete(fp); 579038c8a9a5SSteve French } else { 579138c8a9a5SSteve French ksmbd_clear_inode_pending_delete(fp); 579238c8a9a5SSteve French } 579338c8a9a5SSteve French return 0; 579438c8a9a5SSteve French } 579538c8a9a5SSteve French 579638c8a9a5SSteve French static int set_file_position_info(struct ksmbd_file *fp, 579738c8a9a5SSteve French struct smb2_file_pos_info *file_info) 579838c8a9a5SSteve French { 579938c8a9a5SSteve French loff_t current_byte_offset; 580038c8a9a5SSteve French unsigned long sector_size; 580138c8a9a5SSteve French struct inode *inode; 580238c8a9a5SSteve French 580338c8a9a5SSteve French inode = file_inode(fp->filp); 580438c8a9a5SSteve French current_byte_offset = le64_to_cpu(file_info->CurrentByteOffset); 580538c8a9a5SSteve French sector_size = inode->i_sb->s_blocksize; 580638c8a9a5SSteve French 580738c8a9a5SSteve French if (current_byte_offset < 0 || 580838c8a9a5SSteve French (fp->coption == FILE_NO_INTERMEDIATE_BUFFERING_LE && 580938c8a9a5SSteve French current_byte_offset & (sector_size - 1))) { 581038c8a9a5SSteve French pr_err("CurrentByteOffset is not valid : %llu\n", 581138c8a9a5SSteve French current_byte_offset); 581238c8a9a5SSteve French return -EINVAL; 581338c8a9a5SSteve French } 581438c8a9a5SSteve French 581538c8a9a5SSteve French fp->filp->f_pos = current_byte_offset; 581638c8a9a5SSteve French return 0; 581738c8a9a5SSteve French } 581838c8a9a5SSteve French 581938c8a9a5SSteve French static int set_file_mode_info(struct ksmbd_file *fp, 582038c8a9a5SSteve French struct smb2_file_mode_info *file_info) 582138c8a9a5SSteve French { 582238c8a9a5SSteve French __le32 mode; 582338c8a9a5SSteve French 582438c8a9a5SSteve French mode = file_info->Mode; 582538c8a9a5SSteve French 582638c8a9a5SSteve French if ((mode & ~FILE_MODE_INFO_MASK)) { 582738c8a9a5SSteve French pr_err("Mode is not valid : 0x%x\n", le32_to_cpu(mode)); 582838c8a9a5SSteve French return -EINVAL; 582938c8a9a5SSteve French } 583038c8a9a5SSteve French 583138c8a9a5SSteve French /* 583238c8a9a5SSteve French * TODO : need to implement consideration for 583338c8a9a5SSteve French * FILE_SYNCHRONOUS_IO_ALERT and FILE_SYNCHRONOUS_IO_NONALERT 583438c8a9a5SSteve French */ 583538c8a9a5SSteve French ksmbd_vfs_set_fadvise(fp->filp, mode); 583638c8a9a5SSteve French fp->coption = mode; 583738c8a9a5SSteve French return 0; 583838c8a9a5SSteve French } 583938c8a9a5SSteve French 584038c8a9a5SSteve French /** 584138c8a9a5SSteve French * smb2_set_info_file() - handler for smb2 set info command 584238c8a9a5SSteve French * @work: smb work containing set info command buffer 584338c8a9a5SSteve French * @fp: ksmbd_file pointer 584438c8a9a5SSteve French * @req: request buffer pointer 584538c8a9a5SSteve French * @share: ksmbd_share_config pointer 584638c8a9a5SSteve French * 584738c8a9a5SSteve French * Return: 0 on success, otherwise error 584838c8a9a5SSteve French * TODO: need to implement an error handling for STATUS_INFO_LENGTH_MISMATCH 584938c8a9a5SSteve French */ 585038c8a9a5SSteve French static int smb2_set_info_file(struct ksmbd_work *work, struct ksmbd_file *fp, 585138c8a9a5SSteve French struct smb2_set_info_req *req, 585238c8a9a5SSteve French struct ksmbd_share_config *share) 585338c8a9a5SSteve French { 585438c8a9a5SSteve French unsigned int buf_len = le32_to_cpu(req->BufferLength); 585538c8a9a5SSteve French 585638c8a9a5SSteve French switch (req->FileInfoClass) { 585738c8a9a5SSteve French case FILE_BASIC_INFORMATION: 585838c8a9a5SSteve French { 585938c8a9a5SSteve French if (buf_len < sizeof(struct smb2_file_basic_info)) 586038c8a9a5SSteve French return -EINVAL; 586138c8a9a5SSteve French 586238c8a9a5SSteve French return set_file_basic_info(fp, (struct smb2_file_basic_info *)req->Buffer, share); 586338c8a9a5SSteve French } 586438c8a9a5SSteve French case FILE_ALLOCATION_INFORMATION: 586538c8a9a5SSteve French { 586638c8a9a5SSteve French if (buf_len < sizeof(struct smb2_file_alloc_info)) 586738c8a9a5SSteve French return -EINVAL; 586838c8a9a5SSteve French 586938c8a9a5SSteve French return set_file_allocation_info(work, fp, 587038c8a9a5SSteve French (struct smb2_file_alloc_info *)req->Buffer); 587138c8a9a5SSteve French } 587238c8a9a5SSteve French case FILE_END_OF_FILE_INFORMATION: 587338c8a9a5SSteve French { 587438c8a9a5SSteve French if (buf_len < sizeof(struct smb2_file_eof_info)) 587538c8a9a5SSteve French return -EINVAL; 587638c8a9a5SSteve French 587738c8a9a5SSteve French return set_end_of_file_info(work, fp, 587838c8a9a5SSteve French (struct smb2_file_eof_info *)req->Buffer); 587938c8a9a5SSteve French } 588038c8a9a5SSteve French case FILE_RENAME_INFORMATION: 588138c8a9a5SSteve French { 588238c8a9a5SSteve French if (!test_tree_conn_flag(work->tcon, KSMBD_TREE_CONN_FLAG_WRITABLE)) { 588338c8a9a5SSteve French ksmbd_debug(SMB, 588438c8a9a5SSteve French "User does not have write permission\n"); 588538c8a9a5SSteve French return -EACCES; 588638c8a9a5SSteve French } 588738c8a9a5SSteve French 588838c8a9a5SSteve French if (buf_len < sizeof(struct smb2_file_rename_info)) 588938c8a9a5SSteve French return -EINVAL; 589038c8a9a5SSteve French 589138c8a9a5SSteve French return set_rename_info(work, fp, 589238c8a9a5SSteve French (struct smb2_file_rename_info *)req->Buffer, 589338c8a9a5SSteve French buf_len); 589438c8a9a5SSteve French } 589538c8a9a5SSteve French case FILE_LINK_INFORMATION: 589638c8a9a5SSteve French { 589738c8a9a5SSteve French if (buf_len < sizeof(struct smb2_file_link_info)) 589838c8a9a5SSteve French return -EINVAL; 589938c8a9a5SSteve French 590038c8a9a5SSteve French return smb2_create_link(work, work->tcon->share_conf, 590138c8a9a5SSteve French (struct smb2_file_link_info *)req->Buffer, 590238c8a9a5SSteve French buf_len, fp->filp, 590338c8a9a5SSteve French work->conn->local_nls); 590438c8a9a5SSteve French } 590538c8a9a5SSteve French case FILE_DISPOSITION_INFORMATION: 590638c8a9a5SSteve French { 590738c8a9a5SSteve French if (!test_tree_conn_flag(work->tcon, KSMBD_TREE_CONN_FLAG_WRITABLE)) { 590838c8a9a5SSteve French ksmbd_debug(SMB, 590938c8a9a5SSteve French "User does not have write permission\n"); 591038c8a9a5SSteve French return -EACCES; 591138c8a9a5SSteve French } 591238c8a9a5SSteve French 591338c8a9a5SSteve French if (buf_len < sizeof(struct smb2_file_disposition_info)) 591438c8a9a5SSteve French return -EINVAL; 591538c8a9a5SSteve French 591638c8a9a5SSteve French return set_file_disposition_info(fp, 591738c8a9a5SSteve French (struct smb2_file_disposition_info *)req->Buffer); 591838c8a9a5SSteve French } 591938c8a9a5SSteve French case FILE_FULL_EA_INFORMATION: 592038c8a9a5SSteve French { 592138c8a9a5SSteve French if (!(fp->daccess & FILE_WRITE_EA_LE)) { 592238c8a9a5SSteve French pr_err("Not permitted to write ext attr: 0x%x\n", 592338c8a9a5SSteve French fp->daccess); 592438c8a9a5SSteve French return -EACCES; 592538c8a9a5SSteve French } 592638c8a9a5SSteve French 592738c8a9a5SSteve French if (buf_len < sizeof(struct smb2_ea_info)) 592838c8a9a5SSteve French return -EINVAL; 592938c8a9a5SSteve French 593038c8a9a5SSteve French return smb2_set_ea((struct smb2_ea_info *)req->Buffer, 593138c8a9a5SSteve French buf_len, &fp->filp->f_path); 593238c8a9a5SSteve French } 593338c8a9a5SSteve French case FILE_POSITION_INFORMATION: 593438c8a9a5SSteve French { 593538c8a9a5SSteve French if (buf_len < sizeof(struct smb2_file_pos_info)) 593638c8a9a5SSteve French return -EINVAL; 593738c8a9a5SSteve French 593838c8a9a5SSteve French return set_file_position_info(fp, (struct smb2_file_pos_info *)req->Buffer); 593938c8a9a5SSteve French } 594038c8a9a5SSteve French case FILE_MODE_INFORMATION: 594138c8a9a5SSteve French { 594238c8a9a5SSteve French if (buf_len < sizeof(struct smb2_file_mode_info)) 594338c8a9a5SSteve French return -EINVAL; 594438c8a9a5SSteve French 594538c8a9a5SSteve French return set_file_mode_info(fp, (struct smb2_file_mode_info *)req->Buffer); 594638c8a9a5SSteve French } 594738c8a9a5SSteve French } 594838c8a9a5SSteve French 594938c8a9a5SSteve French pr_err("Unimplemented Fileinfoclass :%d\n", req->FileInfoClass); 595038c8a9a5SSteve French return -EOPNOTSUPP; 595138c8a9a5SSteve French } 595238c8a9a5SSteve French 595338c8a9a5SSteve French static int smb2_set_info_sec(struct ksmbd_file *fp, int addition_info, 595438c8a9a5SSteve French char *buffer, int buf_len) 595538c8a9a5SSteve French { 595638c8a9a5SSteve French struct smb_ntsd *pntsd = (struct smb_ntsd *)buffer; 595738c8a9a5SSteve French 595838c8a9a5SSteve French fp->saccess |= FILE_SHARE_DELETE_LE; 595938c8a9a5SSteve French 596038c8a9a5SSteve French return set_info_sec(fp->conn, fp->tcon, &fp->filp->f_path, pntsd, 596138c8a9a5SSteve French buf_len, false); 596238c8a9a5SSteve French } 596338c8a9a5SSteve French 596438c8a9a5SSteve French /** 596538c8a9a5SSteve French * smb2_set_info() - handler for smb2 set info command handler 596638c8a9a5SSteve French * @work: smb work containing set info request buffer 596738c8a9a5SSteve French * 596838c8a9a5SSteve French * Return: 0 on success, otherwise error 596938c8a9a5SSteve French */ 597038c8a9a5SSteve French int smb2_set_info(struct ksmbd_work *work) 597138c8a9a5SSteve French { 597238c8a9a5SSteve French struct smb2_set_info_req *req; 597338c8a9a5SSteve French struct smb2_set_info_rsp *rsp; 597438c8a9a5SSteve French struct ksmbd_file *fp; 597538c8a9a5SSteve French int rc = 0; 597638c8a9a5SSteve French unsigned int id = KSMBD_NO_FID, pid = KSMBD_NO_FID; 597738c8a9a5SSteve French 597838c8a9a5SSteve French ksmbd_debug(SMB, "Received set info request\n"); 597938c8a9a5SSteve French 598038c8a9a5SSteve French if (work->next_smb2_rcv_hdr_off) { 598138c8a9a5SSteve French req = ksmbd_req_buf_next(work); 598238c8a9a5SSteve French rsp = ksmbd_resp_buf_next(work); 598338c8a9a5SSteve French if (!has_file_id(req->VolatileFileId)) { 598438c8a9a5SSteve French ksmbd_debug(SMB, "Compound request set FID = %llu\n", 598538c8a9a5SSteve French work->compound_fid); 598638c8a9a5SSteve French id = work->compound_fid; 598738c8a9a5SSteve French pid = work->compound_pfid; 598838c8a9a5SSteve French } 598938c8a9a5SSteve French } else { 599038c8a9a5SSteve French req = smb2_get_msg(work->request_buf); 599138c8a9a5SSteve French rsp = smb2_get_msg(work->response_buf); 599238c8a9a5SSteve French } 599338c8a9a5SSteve French 599438c8a9a5SSteve French if (!has_file_id(id)) { 599538c8a9a5SSteve French id = req->VolatileFileId; 599638c8a9a5SSteve French pid = req->PersistentFileId; 599738c8a9a5SSteve French } 599838c8a9a5SSteve French 599938c8a9a5SSteve French fp = ksmbd_lookup_fd_slow(work, id, pid); 600038c8a9a5SSteve French if (!fp) { 600138c8a9a5SSteve French ksmbd_debug(SMB, "Invalid id for close: %u\n", id); 600238c8a9a5SSteve French rc = -ENOENT; 600338c8a9a5SSteve French goto err_out; 600438c8a9a5SSteve French } 600538c8a9a5SSteve French 600638c8a9a5SSteve French switch (req->InfoType) { 600738c8a9a5SSteve French case SMB2_O_INFO_FILE: 600838c8a9a5SSteve French ksmbd_debug(SMB, "GOT SMB2_O_INFO_FILE\n"); 600938c8a9a5SSteve French rc = smb2_set_info_file(work, fp, req, work->tcon->share_conf); 601038c8a9a5SSteve French break; 601138c8a9a5SSteve French case SMB2_O_INFO_SECURITY: 601238c8a9a5SSteve French ksmbd_debug(SMB, "GOT SMB2_O_INFO_SECURITY\n"); 601338c8a9a5SSteve French if (ksmbd_override_fsids(work)) { 601438c8a9a5SSteve French rc = -ENOMEM; 601538c8a9a5SSteve French goto err_out; 601638c8a9a5SSteve French } 601738c8a9a5SSteve French rc = smb2_set_info_sec(fp, 601838c8a9a5SSteve French le32_to_cpu(req->AdditionalInformation), 601938c8a9a5SSteve French req->Buffer, 602038c8a9a5SSteve French le32_to_cpu(req->BufferLength)); 602138c8a9a5SSteve French ksmbd_revert_fsids(work); 602238c8a9a5SSteve French break; 602338c8a9a5SSteve French default: 602438c8a9a5SSteve French rc = -EOPNOTSUPP; 602538c8a9a5SSteve French } 602638c8a9a5SSteve French 602738c8a9a5SSteve French if (rc < 0) 602838c8a9a5SSteve French goto err_out; 602938c8a9a5SSteve French 603038c8a9a5SSteve French rsp->StructureSize = cpu_to_le16(2); 603138c8a9a5SSteve French inc_rfc1001_len(work->response_buf, 2); 603238c8a9a5SSteve French ksmbd_fd_put(work, fp); 603338c8a9a5SSteve French return 0; 603438c8a9a5SSteve French 603538c8a9a5SSteve French err_out: 603638c8a9a5SSteve French if (rc == -EACCES || rc == -EPERM || rc == -EXDEV) 603738c8a9a5SSteve French rsp->hdr.Status = STATUS_ACCESS_DENIED; 603838c8a9a5SSteve French else if (rc == -EINVAL) 603938c8a9a5SSteve French rsp->hdr.Status = STATUS_INVALID_PARAMETER; 604038c8a9a5SSteve French else if (rc == -ESHARE) 604138c8a9a5SSteve French rsp->hdr.Status = STATUS_SHARING_VIOLATION; 604238c8a9a5SSteve French else if (rc == -ENOENT) 604338c8a9a5SSteve French rsp->hdr.Status = STATUS_OBJECT_NAME_INVALID; 604438c8a9a5SSteve French else if (rc == -EBUSY || rc == -ENOTEMPTY) 604538c8a9a5SSteve French rsp->hdr.Status = STATUS_DIRECTORY_NOT_EMPTY; 604638c8a9a5SSteve French else if (rc == -EAGAIN) 604738c8a9a5SSteve French rsp->hdr.Status = STATUS_FILE_LOCK_CONFLICT; 604838c8a9a5SSteve French else if (rc == -EBADF || rc == -ESTALE) 604938c8a9a5SSteve French rsp->hdr.Status = STATUS_INVALID_HANDLE; 605038c8a9a5SSteve French else if (rc == -EEXIST) 605138c8a9a5SSteve French rsp->hdr.Status = STATUS_OBJECT_NAME_COLLISION; 605238c8a9a5SSteve French else if (rsp->hdr.Status == 0 || rc == -EOPNOTSUPP) 605338c8a9a5SSteve French rsp->hdr.Status = STATUS_INVALID_INFO_CLASS; 605438c8a9a5SSteve French smb2_set_err_rsp(work); 605538c8a9a5SSteve French ksmbd_fd_put(work, fp); 605638c8a9a5SSteve French ksmbd_debug(SMB, "error while processing smb2 query rc = %d\n", rc); 605738c8a9a5SSteve French return rc; 605838c8a9a5SSteve French } 605938c8a9a5SSteve French 606038c8a9a5SSteve French /** 606138c8a9a5SSteve French * smb2_read_pipe() - handler for smb2 read from IPC pipe 606238c8a9a5SSteve French * @work: smb work containing read IPC pipe command buffer 606338c8a9a5SSteve French * 606438c8a9a5SSteve French * Return: 0 on success, otherwise error 606538c8a9a5SSteve French */ 606638c8a9a5SSteve French static noinline int smb2_read_pipe(struct ksmbd_work *work) 606738c8a9a5SSteve French { 606838c8a9a5SSteve French int nbytes = 0, err; 606938c8a9a5SSteve French u64 id; 607038c8a9a5SSteve French struct ksmbd_rpc_command *rpc_resp; 607138c8a9a5SSteve French struct smb2_read_req *req = smb2_get_msg(work->request_buf); 607238c8a9a5SSteve French struct smb2_read_rsp *rsp = smb2_get_msg(work->response_buf); 607338c8a9a5SSteve French 607438c8a9a5SSteve French id = req->VolatileFileId; 607538c8a9a5SSteve French 607638c8a9a5SSteve French inc_rfc1001_len(work->response_buf, 16); 607738c8a9a5SSteve French rpc_resp = ksmbd_rpc_read(work->sess, id); 607838c8a9a5SSteve French if (rpc_resp) { 607938c8a9a5SSteve French if (rpc_resp->flags != KSMBD_RPC_OK) { 608038c8a9a5SSteve French err = -EINVAL; 608138c8a9a5SSteve French goto out; 608238c8a9a5SSteve French } 608338c8a9a5SSteve French 608438c8a9a5SSteve French work->aux_payload_buf = 608538c8a9a5SSteve French kvmalloc(rpc_resp->payload_sz, GFP_KERNEL | __GFP_ZERO); 608638c8a9a5SSteve French if (!work->aux_payload_buf) { 608738c8a9a5SSteve French err = -ENOMEM; 608838c8a9a5SSteve French goto out; 608938c8a9a5SSteve French } 609038c8a9a5SSteve French 609138c8a9a5SSteve French memcpy(work->aux_payload_buf, rpc_resp->payload, 609238c8a9a5SSteve French rpc_resp->payload_sz); 609338c8a9a5SSteve French 609438c8a9a5SSteve French nbytes = rpc_resp->payload_sz; 609538c8a9a5SSteve French work->resp_hdr_sz = get_rfc1002_len(work->response_buf) + 4; 609638c8a9a5SSteve French work->aux_payload_sz = nbytes; 609738c8a9a5SSteve French kvfree(rpc_resp); 609838c8a9a5SSteve French } 609938c8a9a5SSteve French 610038c8a9a5SSteve French rsp->StructureSize = cpu_to_le16(17); 610138c8a9a5SSteve French rsp->DataOffset = 80; 610238c8a9a5SSteve French rsp->Reserved = 0; 610338c8a9a5SSteve French rsp->DataLength = cpu_to_le32(nbytes); 610438c8a9a5SSteve French rsp->DataRemaining = 0; 610538c8a9a5SSteve French rsp->Flags = 0; 610638c8a9a5SSteve French inc_rfc1001_len(work->response_buf, nbytes); 610738c8a9a5SSteve French return 0; 610838c8a9a5SSteve French 610938c8a9a5SSteve French out: 611038c8a9a5SSteve French rsp->hdr.Status = STATUS_UNEXPECTED_IO_ERROR; 611138c8a9a5SSteve French smb2_set_err_rsp(work); 611238c8a9a5SSteve French kvfree(rpc_resp); 611338c8a9a5SSteve French return err; 611438c8a9a5SSteve French } 611538c8a9a5SSteve French 611638c8a9a5SSteve French static int smb2_set_remote_key_for_rdma(struct ksmbd_work *work, 611738c8a9a5SSteve French struct smb2_buffer_desc_v1 *desc, 611838c8a9a5SSteve French __le32 Channel, 611938c8a9a5SSteve French __le16 ChannelInfoLength) 612038c8a9a5SSteve French { 612138c8a9a5SSteve French unsigned int i, ch_count; 612238c8a9a5SSteve French 612338c8a9a5SSteve French if (work->conn->dialect == SMB30_PROT_ID && 612438c8a9a5SSteve French Channel != SMB2_CHANNEL_RDMA_V1) 612538c8a9a5SSteve French return -EINVAL; 612638c8a9a5SSteve French 612738c8a9a5SSteve French ch_count = le16_to_cpu(ChannelInfoLength) / sizeof(*desc); 612838c8a9a5SSteve French if (ksmbd_debug_types & KSMBD_DEBUG_RDMA) { 612938c8a9a5SSteve French for (i = 0; i < ch_count; i++) { 613038c8a9a5SSteve French pr_info("RDMA r/w request %#x: token %#x, length %#x\n", 613138c8a9a5SSteve French i, 613238c8a9a5SSteve French le32_to_cpu(desc[i].token), 613338c8a9a5SSteve French le32_to_cpu(desc[i].length)); 613438c8a9a5SSteve French } 613538c8a9a5SSteve French } 613638c8a9a5SSteve French if (!ch_count) 613738c8a9a5SSteve French return -EINVAL; 613838c8a9a5SSteve French 613938c8a9a5SSteve French work->need_invalidate_rkey = 614038c8a9a5SSteve French (Channel == SMB2_CHANNEL_RDMA_V1_INVALIDATE); 614138c8a9a5SSteve French if (Channel == SMB2_CHANNEL_RDMA_V1_INVALIDATE) 614238c8a9a5SSteve French work->remote_key = le32_to_cpu(desc->token); 614338c8a9a5SSteve French return 0; 614438c8a9a5SSteve French } 614538c8a9a5SSteve French 614638c8a9a5SSteve French static ssize_t smb2_read_rdma_channel(struct ksmbd_work *work, 614738c8a9a5SSteve French struct smb2_read_req *req, void *data_buf, 614838c8a9a5SSteve French size_t length) 614938c8a9a5SSteve French { 615038c8a9a5SSteve French int err; 615138c8a9a5SSteve French 615238c8a9a5SSteve French err = ksmbd_conn_rdma_write(work->conn, data_buf, length, 615338c8a9a5SSteve French (struct smb2_buffer_desc_v1 *) 615438c8a9a5SSteve French ((char *)req + le16_to_cpu(req->ReadChannelInfoOffset)), 615538c8a9a5SSteve French le16_to_cpu(req->ReadChannelInfoLength)); 615638c8a9a5SSteve French if (err) 615738c8a9a5SSteve French return err; 615838c8a9a5SSteve French 615938c8a9a5SSteve French return length; 616038c8a9a5SSteve French } 616138c8a9a5SSteve French 616238c8a9a5SSteve French /** 616338c8a9a5SSteve French * smb2_read() - handler for smb2 read from file 616438c8a9a5SSteve French * @work: smb work containing read command buffer 616538c8a9a5SSteve French * 616638c8a9a5SSteve French * Return: 0 on success, otherwise error 616738c8a9a5SSteve French */ 616838c8a9a5SSteve French int smb2_read(struct ksmbd_work *work) 616938c8a9a5SSteve French { 617038c8a9a5SSteve French struct ksmbd_conn *conn = work->conn; 617138c8a9a5SSteve French struct smb2_read_req *req; 617238c8a9a5SSteve French struct smb2_read_rsp *rsp; 617338c8a9a5SSteve French struct ksmbd_file *fp = NULL; 617438c8a9a5SSteve French loff_t offset; 617538c8a9a5SSteve French size_t length, mincount; 617638c8a9a5SSteve French ssize_t nbytes = 0, remain_bytes = 0; 617738c8a9a5SSteve French int err = 0; 617838c8a9a5SSteve French bool is_rdma_channel = false; 617938c8a9a5SSteve French unsigned int max_read_size = conn->vals->max_read_size; 618038c8a9a5SSteve French 618138c8a9a5SSteve French WORK_BUFFERS(work, req, rsp); 618238c8a9a5SSteve French 618338c8a9a5SSteve French if (test_share_config_flag(work->tcon->share_conf, 618438c8a9a5SSteve French KSMBD_SHARE_FLAG_PIPE)) { 618538c8a9a5SSteve French ksmbd_debug(SMB, "IPC pipe read request\n"); 618638c8a9a5SSteve French return smb2_read_pipe(work); 618738c8a9a5SSteve French } 618838c8a9a5SSteve French 618938c8a9a5SSteve French if (req->Channel == SMB2_CHANNEL_RDMA_V1_INVALIDATE || 619038c8a9a5SSteve French req->Channel == SMB2_CHANNEL_RDMA_V1) { 619138c8a9a5SSteve French is_rdma_channel = true; 619238c8a9a5SSteve French max_read_size = get_smbd_max_read_write_size(); 619338c8a9a5SSteve French } 619438c8a9a5SSteve French 619538c8a9a5SSteve French if (is_rdma_channel == true) { 619638c8a9a5SSteve French unsigned int ch_offset = le16_to_cpu(req->ReadChannelInfoOffset); 619738c8a9a5SSteve French 619838c8a9a5SSteve French if (ch_offset < offsetof(struct smb2_read_req, Buffer)) { 619938c8a9a5SSteve French err = -EINVAL; 620038c8a9a5SSteve French goto out; 620138c8a9a5SSteve French } 620238c8a9a5SSteve French err = smb2_set_remote_key_for_rdma(work, 620338c8a9a5SSteve French (struct smb2_buffer_desc_v1 *) 620438c8a9a5SSteve French ((char *)req + ch_offset), 620538c8a9a5SSteve French req->Channel, 620638c8a9a5SSteve French req->ReadChannelInfoLength); 620738c8a9a5SSteve French if (err) 620838c8a9a5SSteve French goto out; 620938c8a9a5SSteve French } 621038c8a9a5SSteve French 621138c8a9a5SSteve French fp = ksmbd_lookup_fd_slow(work, req->VolatileFileId, req->PersistentFileId); 621238c8a9a5SSteve French if (!fp) { 621338c8a9a5SSteve French err = -ENOENT; 621438c8a9a5SSteve French goto out; 621538c8a9a5SSteve French } 621638c8a9a5SSteve French 621738c8a9a5SSteve French if (!(fp->daccess & (FILE_READ_DATA_LE | FILE_READ_ATTRIBUTES_LE))) { 621838c8a9a5SSteve French pr_err("Not permitted to read : 0x%x\n", fp->daccess); 621938c8a9a5SSteve French err = -EACCES; 622038c8a9a5SSteve French goto out; 622138c8a9a5SSteve French } 622238c8a9a5SSteve French 622338c8a9a5SSteve French offset = le64_to_cpu(req->Offset); 622438c8a9a5SSteve French length = le32_to_cpu(req->Length); 622538c8a9a5SSteve French mincount = le32_to_cpu(req->MinimumCount); 622638c8a9a5SSteve French 622738c8a9a5SSteve French if (length > max_read_size) { 622838c8a9a5SSteve French ksmbd_debug(SMB, "limiting read size to max size(%u)\n", 622938c8a9a5SSteve French max_read_size); 623038c8a9a5SSteve French err = -EINVAL; 623138c8a9a5SSteve French goto out; 623238c8a9a5SSteve French } 623338c8a9a5SSteve French 623438c8a9a5SSteve French ksmbd_debug(SMB, "filename %pD, offset %lld, len %zu\n", 623538c8a9a5SSteve French fp->filp, offset, length); 623638c8a9a5SSteve French 623738c8a9a5SSteve French work->aux_payload_buf = kvmalloc(length, GFP_KERNEL | __GFP_ZERO); 623838c8a9a5SSteve French if (!work->aux_payload_buf) { 623938c8a9a5SSteve French err = -ENOMEM; 624038c8a9a5SSteve French goto out; 624138c8a9a5SSteve French } 624238c8a9a5SSteve French 624338c8a9a5SSteve French nbytes = ksmbd_vfs_read(work, fp, length, &offset); 624438c8a9a5SSteve French if (nbytes < 0) { 624538c8a9a5SSteve French err = nbytes; 624638c8a9a5SSteve French goto out; 624738c8a9a5SSteve French } 624838c8a9a5SSteve French 624938c8a9a5SSteve French if ((nbytes == 0 && length != 0) || nbytes < mincount) { 625038c8a9a5SSteve French kvfree(work->aux_payload_buf); 625138c8a9a5SSteve French work->aux_payload_buf = NULL; 625238c8a9a5SSteve French rsp->hdr.Status = STATUS_END_OF_FILE; 625338c8a9a5SSteve French smb2_set_err_rsp(work); 625438c8a9a5SSteve French ksmbd_fd_put(work, fp); 625538c8a9a5SSteve French return 0; 625638c8a9a5SSteve French } 625738c8a9a5SSteve French 625838c8a9a5SSteve French ksmbd_debug(SMB, "nbytes %zu, offset %lld mincount %zu\n", 625938c8a9a5SSteve French nbytes, offset, mincount); 626038c8a9a5SSteve French 626138c8a9a5SSteve French if (is_rdma_channel == true) { 626238c8a9a5SSteve French /* write data to the client using rdma channel */ 626338c8a9a5SSteve French remain_bytes = smb2_read_rdma_channel(work, req, 626438c8a9a5SSteve French work->aux_payload_buf, 626538c8a9a5SSteve French nbytes); 626638c8a9a5SSteve French kvfree(work->aux_payload_buf); 626738c8a9a5SSteve French work->aux_payload_buf = NULL; 626838c8a9a5SSteve French 626938c8a9a5SSteve French nbytes = 0; 627038c8a9a5SSteve French if (remain_bytes < 0) { 627138c8a9a5SSteve French err = (int)remain_bytes; 627238c8a9a5SSteve French goto out; 627338c8a9a5SSteve French } 627438c8a9a5SSteve French } 627538c8a9a5SSteve French 627638c8a9a5SSteve French rsp->StructureSize = cpu_to_le16(17); 627738c8a9a5SSteve French rsp->DataOffset = 80; 627838c8a9a5SSteve French rsp->Reserved = 0; 627938c8a9a5SSteve French rsp->DataLength = cpu_to_le32(nbytes); 628038c8a9a5SSteve French rsp->DataRemaining = cpu_to_le32(remain_bytes); 628138c8a9a5SSteve French rsp->Flags = 0; 628238c8a9a5SSteve French inc_rfc1001_len(work->response_buf, 16); 628338c8a9a5SSteve French work->resp_hdr_sz = get_rfc1002_len(work->response_buf) + 4; 628438c8a9a5SSteve French work->aux_payload_sz = nbytes; 628538c8a9a5SSteve French inc_rfc1001_len(work->response_buf, nbytes); 628638c8a9a5SSteve French ksmbd_fd_put(work, fp); 628738c8a9a5SSteve French return 0; 628838c8a9a5SSteve French 628938c8a9a5SSteve French out: 629038c8a9a5SSteve French if (err) { 629138c8a9a5SSteve French if (err == -EISDIR) 629238c8a9a5SSteve French rsp->hdr.Status = STATUS_INVALID_DEVICE_REQUEST; 629338c8a9a5SSteve French else if (err == -EAGAIN) 629438c8a9a5SSteve French rsp->hdr.Status = STATUS_FILE_LOCK_CONFLICT; 629538c8a9a5SSteve French else if (err == -ENOENT) 629638c8a9a5SSteve French rsp->hdr.Status = STATUS_FILE_CLOSED; 629738c8a9a5SSteve French else if (err == -EACCES) 629838c8a9a5SSteve French rsp->hdr.Status = STATUS_ACCESS_DENIED; 629938c8a9a5SSteve French else if (err == -ESHARE) 630038c8a9a5SSteve French rsp->hdr.Status = STATUS_SHARING_VIOLATION; 630138c8a9a5SSteve French else if (err == -EINVAL) 630238c8a9a5SSteve French rsp->hdr.Status = STATUS_INVALID_PARAMETER; 630338c8a9a5SSteve French else 630438c8a9a5SSteve French rsp->hdr.Status = STATUS_INVALID_HANDLE; 630538c8a9a5SSteve French 630638c8a9a5SSteve French smb2_set_err_rsp(work); 630738c8a9a5SSteve French } 630838c8a9a5SSteve French ksmbd_fd_put(work, fp); 630938c8a9a5SSteve French return err; 631038c8a9a5SSteve French } 631138c8a9a5SSteve French 631238c8a9a5SSteve French /** 631338c8a9a5SSteve French * smb2_write_pipe() - handler for smb2 write on IPC pipe 631438c8a9a5SSteve French * @work: smb work containing write IPC pipe command buffer 631538c8a9a5SSteve French * 631638c8a9a5SSteve French * Return: 0 on success, otherwise error 631738c8a9a5SSteve French */ 631838c8a9a5SSteve French static noinline int smb2_write_pipe(struct ksmbd_work *work) 631938c8a9a5SSteve French { 632038c8a9a5SSteve French struct smb2_write_req *req = smb2_get_msg(work->request_buf); 632138c8a9a5SSteve French struct smb2_write_rsp *rsp = smb2_get_msg(work->response_buf); 632238c8a9a5SSteve French struct ksmbd_rpc_command *rpc_resp; 632338c8a9a5SSteve French u64 id = 0; 632438c8a9a5SSteve French int err = 0, ret = 0; 632538c8a9a5SSteve French char *data_buf; 632638c8a9a5SSteve French size_t length; 632738c8a9a5SSteve French 632838c8a9a5SSteve French length = le32_to_cpu(req->Length); 632938c8a9a5SSteve French id = req->VolatileFileId; 633038c8a9a5SSteve French 633138c8a9a5SSteve French if ((u64)le16_to_cpu(req->DataOffset) + length > 633238c8a9a5SSteve French get_rfc1002_len(work->request_buf)) { 633338c8a9a5SSteve French pr_err("invalid write data offset %u, smb_len %u\n", 633438c8a9a5SSteve French le16_to_cpu(req->DataOffset), 633538c8a9a5SSteve French get_rfc1002_len(work->request_buf)); 633638c8a9a5SSteve French err = -EINVAL; 633738c8a9a5SSteve French goto out; 633838c8a9a5SSteve French } 633938c8a9a5SSteve French 634038c8a9a5SSteve French data_buf = (char *)(((char *)&req->hdr.ProtocolId) + 634138c8a9a5SSteve French le16_to_cpu(req->DataOffset)); 634238c8a9a5SSteve French 634338c8a9a5SSteve French rpc_resp = ksmbd_rpc_write(work->sess, id, data_buf, length); 634438c8a9a5SSteve French if (rpc_resp) { 634538c8a9a5SSteve French if (rpc_resp->flags == KSMBD_RPC_ENOTIMPLEMENTED) { 634638c8a9a5SSteve French rsp->hdr.Status = STATUS_NOT_SUPPORTED; 634738c8a9a5SSteve French kvfree(rpc_resp); 634838c8a9a5SSteve French smb2_set_err_rsp(work); 634938c8a9a5SSteve French return -EOPNOTSUPP; 635038c8a9a5SSteve French } 635138c8a9a5SSteve French if (rpc_resp->flags != KSMBD_RPC_OK) { 635238c8a9a5SSteve French rsp->hdr.Status = STATUS_INVALID_HANDLE; 635338c8a9a5SSteve French smb2_set_err_rsp(work); 635438c8a9a5SSteve French kvfree(rpc_resp); 635538c8a9a5SSteve French return ret; 635638c8a9a5SSteve French } 635738c8a9a5SSteve French kvfree(rpc_resp); 635838c8a9a5SSteve French } 635938c8a9a5SSteve French 636038c8a9a5SSteve French rsp->StructureSize = cpu_to_le16(17); 636138c8a9a5SSteve French rsp->DataOffset = 0; 636238c8a9a5SSteve French rsp->Reserved = 0; 636338c8a9a5SSteve French rsp->DataLength = cpu_to_le32(length); 636438c8a9a5SSteve French rsp->DataRemaining = 0; 636538c8a9a5SSteve French rsp->Reserved2 = 0; 636638c8a9a5SSteve French inc_rfc1001_len(work->response_buf, 16); 636738c8a9a5SSteve French return 0; 636838c8a9a5SSteve French out: 636938c8a9a5SSteve French if (err) { 637038c8a9a5SSteve French rsp->hdr.Status = STATUS_INVALID_HANDLE; 637138c8a9a5SSteve French smb2_set_err_rsp(work); 637238c8a9a5SSteve French } 637338c8a9a5SSteve French 637438c8a9a5SSteve French return err; 637538c8a9a5SSteve French } 637638c8a9a5SSteve French 637738c8a9a5SSteve French static ssize_t smb2_write_rdma_channel(struct ksmbd_work *work, 637838c8a9a5SSteve French struct smb2_write_req *req, 637938c8a9a5SSteve French struct ksmbd_file *fp, 638038c8a9a5SSteve French loff_t offset, size_t length, bool sync) 638138c8a9a5SSteve French { 638238c8a9a5SSteve French char *data_buf; 638338c8a9a5SSteve French int ret; 638438c8a9a5SSteve French ssize_t nbytes; 638538c8a9a5SSteve French 638638c8a9a5SSteve French data_buf = kvmalloc(length, GFP_KERNEL | __GFP_ZERO); 638738c8a9a5SSteve French if (!data_buf) 638838c8a9a5SSteve French return -ENOMEM; 638938c8a9a5SSteve French 639038c8a9a5SSteve French ret = ksmbd_conn_rdma_read(work->conn, data_buf, length, 639138c8a9a5SSteve French (struct smb2_buffer_desc_v1 *) 639238c8a9a5SSteve French ((char *)req + le16_to_cpu(req->WriteChannelInfoOffset)), 639338c8a9a5SSteve French le16_to_cpu(req->WriteChannelInfoLength)); 639438c8a9a5SSteve French if (ret < 0) { 639538c8a9a5SSteve French kvfree(data_buf); 639638c8a9a5SSteve French return ret; 639738c8a9a5SSteve French } 639838c8a9a5SSteve French 639938c8a9a5SSteve French ret = ksmbd_vfs_write(work, fp, data_buf, length, &offset, sync, &nbytes); 640038c8a9a5SSteve French kvfree(data_buf); 640138c8a9a5SSteve French if (ret < 0) 640238c8a9a5SSteve French return ret; 640338c8a9a5SSteve French 640438c8a9a5SSteve French return nbytes; 640538c8a9a5SSteve French } 640638c8a9a5SSteve French 640738c8a9a5SSteve French /** 640838c8a9a5SSteve French * smb2_write() - handler for smb2 write from file 640938c8a9a5SSteve French * @work: smb work containing write command buffer 641038c8a9a5SSteve French * 641138c8a9a5SSteve French * Return: 0 on success, otherwise error 641238c8a9a5SSteve French */ 641338c8a9a5SSteve French int smb2_write(struct ksmbd_work *work) 641438c8a9a5SSteve French { 641538c8a9a5SSteve French struct smb2_write_req *req; 641638c8a9a5SSteve French struct smb2_write_rsp *rsp; 641738c8a9a5SSteve French struct ksmbd_file *fp = NULL; 641838c8a9a5SSteve French loff_t offset; 641938c8a9a5SSteve French size_t length; 642038c8a9a5SSteve French ssize_t nbytes; 642138c8a9a5SSteve French char *data_buf; 642238c8a9a5SSteve French bool writethrough = false, is_rdma_channel = false; 642338c8a9a5SSteve French int err = 0; 642438c8a9a5SSteve French unsigned int max_write_size = work->conn->vals->max_write_size; 642538c8a9a5SSteve French 642638c8a9a5SSteve French WORK_BUFFERS(work, req, rsp); 642738c8a9a5SSteve French 642838c8a9a5SSteve French if (test_share_config_flag(work->tcon->share_conf, KSMBD_SHARE_FLAG_PIPE)) { 642938c8a9a5SSteve French ksmbd_debug(SMB, "IPC pipe write request\n"); 643038c8a9a5SSteve French return smb2_write_pipe(work); 643138c8a9a5SSteve French } 643238c8a9a5SSteve French 643338c8a9a5SSteve French offset = le64_to_cpu(req->Offset); 643438c8a9a5SSteve French length = le32_to_cpu(req->Length); 643538c8a9a5SSteve French 643638c8a9a5SSteve French if (req->Channel == SMB2_CHANNEL_RDMA_V1 || 643738c8a9a5SSteve French req->Channel == SMB2_CHANNEL_RDMA_V1_INVALIDATE) { 643838c8a9a5SSteve French is_rdma_channel = true; 643938c8a9a5SSteve French max_write_size = get_smbd_max_read_write_size(); 644038c8a9a5SSteve French length = le32_to_cpu(req->RemainingBytes); 644138c8a9a5SSteve French } 644238c8a9a5SSteve French 644338c8a9a5SSteve French if (is_rdma_channel == true) { 644438c8a9a5SSteve French unsigned int ch_offset = le16_to_cpu(req->WriteChannelInfoOffset); 644538c8a9a5SSteve French 644638c8a9a5SSteve French if (req->Length != 0 || req->DataOffset != 0 || 644738c8a9a5SSteve French ch_offset < offsetof(struct smb2_write_req, Buffer)) { 644838c8a9a5SSteve French err = -EINVAL; 644938c8a9a5SSteve French goto out; 645038c8a9a5SSteve French } 645138c8a9a5SSteve French err = smb2_set_remote_key_for_rdma(work, 645238c8a9a5SSteve French (struct smb2_buffer_desc_v1 *) 645338c8a9a5SSteve French ((char *)req + ch_offset), 645438c8a9a5SSteve French req->Channel, 645538c8a9a5SSteve French req->WriteChannelInfoLength); 645638c8a9a5SSteve French if (err) 645738c8a9a5SSteve French goto out; 645838c8a9a5SSteve French } 645938c8a9a5SSteve French 646038c8a9a5SSteve French if (!test_tree_conn_flag(work->tcon, KSMBD_TREE_CONN_FLAG_WRITABLE)) { 646138c8a9a5SSteve French ksmbd_debug(SMB, "User does not have write permission\n"); 646238c8a9a5SSteve French err = -EACCES; 646338c8a9a5SSteve French goto out; 646438c8a9a5SSteve French } 646538c8a9a5SSteve French 646638c8a9a5SSteve French fp = ksmbd_lookup_fd_slow(work, req->VolatileFileId, req->PersistentFileId); 646738c8a9a5SSteve French if (!fp) { 646838c8a9a5SSteve French err = -ENOENT; 646938c8a9a5SSteve French goto out; 647038c8a9a5SSteve French } 647138c8a9a5SSteve French 647238c8a9a5SSteve French if (!(fp->daccess & (FILE_WRITE_DATA_LE | FILE_READ_ATTRIBUTES_LE))) { 647338c8a9a5SSteve French pr_err("Not permitted to write : 0x%x\n", fp->daccess); 647438c8a9a5SSteve French err = -EACCES; 647538c8a9a5SSteve French goto out; 647638c8a9a5SSteve French } 647738c8a9a5SSteve French 647838c8a9a5SSteve French if (length > max_write_size) { 647938c8a9a5SSteve French ksmbd_debug(SMB, "limiting write size to max size(%u)\n", 648038c8a9a5SSteve French max_write_size); 648138c8a9a5SSteve French err = -EINVAL; 648238c8a9a5SSteve French goto out; 648338c8a9a5SSteve French } 648438c8a9a5SSteve French 648538c8a9a5SSteve French ksmbd_debug(SMB, "flags %u\n", le32_to_cpu(req->Flags)); 648638c8a9a5SSteve French if (le32_to_cpu(req->Flags) & SMB2_WRITEFLAG_WRITE_THROUGH) 648738c8a9a5SSteve French writethrough = true; 648838c8a9a5SSteve French 648938c8a9a5SSteve French if (is_rdma_channel == false) { 649038c8a9a5SSteve French if (le16_to_cpu(req->DataOffset) < 649138c8a9a5SSteve French offsetof(struct smb2_write_req, Buffer)) { 649238c8a9a5SSteve French err = -EINVAL; 649338c8a9a5SSteve French goto out; 649438c8a9a5SSteve French } 649538c8a9a5SSteve French 649638c8a9a5SSteve French data_buf = (char *)(((char *)&req->hdr.ProtocolId) + 649738c8a9a5SSteve French le16_to_cpu(req->DataOffset)); 649838c8a9a5SSteve French 649938c8a9a5SSteve French ksmbd_debug(SMB, "filename %pD, offset %lld, len %zu\n", 650038c8a9a5SSteve French fp->filp, offset, length); 650138c8a9a5SSteve French err = ksmbd_vfs_write(work, fp, data_buf, length, &offset, 650238c8a9a5SSteve French writethrough, &nbytes); 650338c8a9a5SSteve French if (err < 0) 650438c8a9a5SSteve French goto out; 650538c8a9a5SSteve French } else { 650638c8a9a5SSteve French /* read data from the client using rdma channel, and 650738c8a9a5SSteve French * write the data. 650838c8a9a5SSteve French */ 650938c8a9a5SSteve French nbytes = smb2_write_rdma_channel(work, req, fp, offset, length, 651038c8a9a5SSteve French writethrough); 651138c8a9a5SSteve French if (nbytes < 0) { 651238c8a9a5SSteve French err = (int)nbytes; 651338c8a9a5SSteve French goto out; 651438c8a9a5SSteve French } 651538c8a9a5SSteve French } 651638c8a9a5SSteve French 651738c8a9a5SSteve French rsp->StructureSize = cpu_to_le16(17); 651838c8a9a5SSteve French rsp->DataOffset = 0; 651938c8a9a5SSteve French rsp->Reserved = 0; 652038c8a9a5SSteve French rsp->DataLength = cpu_to_le32(nbytes); 652138c8a9a5SSteve French rsp->DataRemaining = 0; 652238c8a9a5SSteve French rsp->Reserved2 = 0; 652338c8a9a5SSteve French inc_rfc1001_len(work->response_buf, 16); 652438c8a9a5SSteve French ksmbd_fd_put(work, fp); 652538c8a9a5SSteve French return 0; 652638c8a9a5SSteve French 652738c8a9a5SSteve French out: 652838c8a9a5SSteve French if (err == -EAGAIN) 652938c8a9a5SSteve French rsp->hdr.Status = STATUS_FILE_LOCK_CONFLICT; 653038c8a9a5SSteve French else if (err == -ENOSPC || err == -EFBIG) 653138c8a9a5SSteve French rsp->hdr.Status = STATUS_DISK_FULL; 653238c8a9a5SSteve French else if (err == -ENOENT) 653338c8a9a5SSteve French rsp->hdr.Status = STATUS_FILE_CLOSED; 653438c8a9a5SSteve French else if (err == -EACCES) 653538c8a9a5SSteve French rsp->hdr.Status = STATUS_ACCESS_DENIED; 653638c8a9a5SSteve French else if (err == -ESHARE) 653738c8a9a5SSteve French rsp->hdr.Status = STATUS_SHARING_VIOLATION; 653838c8a9a5SSteve French else if (err == -EINVAL) 653938c8a9a5SSteve French rsp->hdr.Status = STATUS_INVALID_PARAMETER; 654038c8a9a5SSteve French else 654138c8a9a5SSteve French rsp->hdr.Status = STATUS_INVALID_HANDLE; 654238c8a9a5SSteve French 654338c8a9a5SSteve French smb2_set_err_rsp(work); 654438c8a9a5SSteve French ksmbd_fd_put(work, fp); 654538c8a9a5SSteve French return err; 654638c8a9a5SSteve French } 654738c8a9a5SSteve French 654838c8a9a5SSteve French /** 654938c8a9a5SSteve French * smb2_flush() - handler for smb2 flush file - fsync 655038c8a9a5SSteve French * @work: smb work containing flush command buffer 655138c8a9a5SSteve French * 655238c8a9a5SSteve French * Return: 0 on success, otherwise error 655338c8a9a5SSteve French */ 655438c8a9a5SSteve French int smb2_flush(struct ksmbd_work *work) 655538c8a9a5SSteve French { 655638c8a9a5SSteve French struct smb2_flush_req *req; 655738c8a9a5SSteve French struct smb2_flush_rsp *rsp; 655838c8a9a5SSteve French int err; 655938c8a9a5SSteve French 656038c8a9a5SSteve French WORK_BUFFERS(work, req, rsp); 656138c8a9a5SSteve French 656238c8a9a5SSteve French ksmbd_debug(SMB, "SMB2_FLUSH called for fid %llu\n", req->VolatileFileId); 656338c8a9a5SSteve French 656438c8a9a5SSteve French err = ksmbd_vfs_fsync(work, req->VolatileFileId, req->PersistentFileId); 656538c8a9a5SSteve French if (err) 656638c8a9a5SSteve French goto out; 656738c8a9a5SSteve French 656838c8a9a5SSteve French rsp->StructureSize = cpu_to_le16(4); 656938c8a9a5SSteve French rsp->Reserved = 0; 657038c8a9a5SSteve French inc_rfc1001_len(work->response_buf, 4); 657138c8a9a5SSteve French return 0; 657238c8a9a5SSteve French 657338c8a9a5SSteve French out: 657438c8a9a5SSteve French if (err) { 657538c8a9a5SSteve French rsp->hdr.Status = STATUS_INVALID_HANDLE; 657638c8a9a5SSteve French smb2_set_err_rsp(work); 657738c8a9a5SSteve French } 657838c8a9a5SSteve French 657938c8a9a5SSteve French return err; 658038c8a9a5SSteve French } 658138c8a9a5SSteve French 658238c8a9a5SSteve French /** 658338c8a9a5SSteve French * smb2_cancel() - handler for smb2 cancel command 658438c8a9a5SSteve French * @work: smb work containing cancel command buffer 658538c8a9a5SSteve French * 658638c8a9a5SSteve French * Return: 0 on success, otherwise error 658738c8a9a5SSteve French */ 658838c8a9a5SSteve French int smb2_cancel(struct ksmbd_work *work) 658938c8a9a5SSteve French { 659038c8a9a5SSteve French struct ksmbd_conn *conn = work->conn; 659138c8a9a5SSteve French struct smb2_hdr *hdr = smb2_get_msg(work->request_buf); 659238c8a9a5SSteve French struct smb2_hdr *chdr; 659338c8a9a5SSteve French struct ksmbd_work *iter; 659438c8a9a5SSteve French struct list_head *command_list; 659538c8a9a5SSteve French 659638c8a9a5SSteve French ksmbd_debug(SMB, "smb2 cancel called on mid %llu, async flags 0x%x\n", 659738c8a9a5SSteve French hdr->MessageId, hdr->Flags); 659838c8a9a5SSteve French 659938c8a9a5SSteve French if (hdr->Flags & SMB2_FLAGS_ASYNC_COMMAND) { 660038c8a9a5SSteve French command_list = &conn->async_requests; 660138c8a9a5SSteve French 660238c8a9a5SSteve French spin_lock(&conn->request_lock); 660338c8a9a5SSteve French list_for_each_entry(iter, command_list, 660438c8a9a5SSteve French async_request_entry) { 660538c8a9a5SSteve French chdr = smb2_get_msg(iter->request_buf); 660638c8a9a5SSteve French 660738c8a9a5SSteve French if (iter->async_id != 660838c8a9a5SSteve French le64_to_cpu(hdr->Id.AsyncId)) 660938c8a9a5SSteve French continue; 661038c8a9a5SSteve French 661138c8a9a5SSteve French ksmbd_debug(SMB, 661238c8a9a5SSteve French "smb2 with AsyncId %llu cancelled command = 0x%x\n", 661338c8a9a5SSteve French le64_to_cpu(hdr->Id.AsyncId), 661438c8a9a5SSteve French le16_to_cpu(chdr->Command)); 661538c8a9a5SSteve French iter->state = KSMBD_WORK_CANCELLED; 661638c8a9a5SSteve French if (iter->cancel_fn) 661738c8a9a5SSteve French iter->cancel_fn(iter->cancel_argv); 661838c8a9a5SSteve French break; 661938c8a9a5SSteve French } 662038c8a9a5SSteve French spin_unlock(&conn->request_lock); 662138c8a9a5SSteve French } else { 662238c8a9a5SSteve French command_list = &conn->requests; 662338c8a9a5SSteve French 662438c8a9a5SSteve French spin_lock(&conn->request_lock); 662538c8a9a5SSteve French list_for_each_entry(iter, command_list, request_entry) { 662638c8a9a5SSteve French chdr = smb2_get_msg(iter->request_buf); 662738c8a9a5SSteve French 662838c8a9a5SSteve French if (chdr->MessageId != hdr->MessageId || 662938c8a9a5SSteve French iter == work) 663038c8a9a5SSteve French continue; 663138c8a9a5SSteve French 663238c8a9a5SSteve French ksmbd_debug(SMB, 663338c8a9a5SSteve French "smb2 with mid %llu cancelled command = 0x%x\n", 663438c8a9a5SSteve French le64_to_cpu(hdr->MessageId), 663538c8a9a5SSteve French le16_to_cpu(chdr->Command)); 663638c8a9a5SSteve French iter->state = KSMBD_WORK_CANCELLED; 663738c8a9a5SSteve French break; 663838c8a9a5SSteve French } 663938c8a9a5SSteve French spin_unlock(&conn->request_lock); 664038c8a9a5SSteve French } 664138c8a9a5SSteve French 664238c8a9a5SSteve French /* For SMB2_CANCEL command itself send no response*/ 664338c8a9a5SSteve French work->send_no_response = 1; 664438c8a9a5SSteve French return 0; 664538c8a9a5SSteve French } 664638c8a9a5SSteve French 664738c8a9a5SSteve French struct file_lock *smb_flock_init(struct file *f) 664838c8a9a5SSteve French { 664938c8a9a5SSteve French struct file_lock *fl; 665038c8a9a5SSteve French 665138c8a9a5SSteve French fl = locks_alloc_lock(); 665238c8a9a5SSteve French if (!fl) 665338c8a9a5SSteve French goto out; 665438c8a9a5SSteve French 665538c8a9a5SSteve French locks_init_lock(fl); 665638c8a9a5SSteve French 665738c8a9a5SSteve French fl->fl_owner = f; 665838c8a9a5SSteve French fl->fl_pid = current->tgid; 665938c8a9a5SSteve French fl->fl_file = f; 666038c8a9a5SSteve French fl->fl_flags = FL_POSIX; 666138c8a9a5SSteve French fl->fl_ops = NULL; 666238c8a9a5SSteve French fl->fl_lmops = NULL; 666338c8a9a5SSteve French 666438c8a9a5SSteve French out: 666538c8a9a5SSteve French return fl; 666638c8a9a5SSteve French } 666738c8a9a5SSteve French 666838c8a9a5SSteve French static int smb2_set_flock_flags(struct file_lock *flock, int flags) 666938c8a9a5SSteve French { 667038c8a9a5SSteve French int cmd = -EINVAL; 667138c8a9a5SSteve French 667238c8a9a5SSteve French /* Checking for wrong flag combination during lock request*/ 667338c8a9a5SSteve French switch (flags) { 667438c8a9a5SSteve French case SMB2_LOCKFLAG_SHARED: 667538c8a9a5SSteve French ksmbd_debug(SMB, "received shared request\n"); 667638c8a9a5SSteve French cmd = F_SETLKW; 667738c8a9a5SSteve French flock->fl_type = F_RDLCK; 667838c8a9a5SSteve French flock->fl_flags |= FL_SLEEP; 667938c8a9a5SSteve French break; 668038c8a9a5SSteve French case SMB2_LOCKFLAG_EXCLUSIVE: 668138c8a9a5SSteve French ksmbd_debug(SMB, "received exclusive request\n"); 668238c8a9a5SSteve French cmd = F_SETLKW; 668338c8a9a5SSteve French flock->fl_type = F_WRLCK; 668438c8a9a5SSteve French flock->fl_flags |= FL_SLEEP; 668538c8a9a5SSteve French break; 668638c8a9a5SSteve French case SMB2_LOCKFLAG_SHARED | SMB2_LOCKFLAG_FAIL_IMMEDIATELY: 668738c8a9a5SSteve French ksmbd_debug(SMB, 668838c8a9a5SSteve French "received shared & fail immediately request\n"); 668938c8a9a5SSteve French cmd = F_SETLK; 669038c8a9a5SSteve French flock->fl_type = F_RDLCK; 669138c8a9a5SSteve French break; 669238c8a9a5SSteve French case SMB2_LOCKFLAG_EXCLUSIVE | SMB2_LOCKFLAG_FAIL_IMMEDIATELY: 669338c8a9a5SSteve French ksmbd_debug(SMB, 669438c8a9a5SSteve French "received exclusive & fail immediately request\n"); 669538c8a9a5SSteve French cmd = F_SETLK; 669638c8a9a5SSteve French flock->fl_type = F_WRLCK; 669738c8a9a5SSteve French break; 669838c8a9a5SSteve French case SMB2_LOCKFLAG_UNLOCK: 669938c8a9a5SSteve French ksmbd_debug(SMB, "received unlock request\n"); 670038c8a9a5SSteve French flock->fl_type = F_UNLCK; 670138c8a9a5SSteve French cmd = F_SETLK; 670238c8a9a5SSteve French break; 670338c8a9a5SSteve French } 670438c8a9a5SSteve French 670538c8a9a5SSteve French return cmd; 670638c8a9a5SSteve French } 670738c8a9a5SSteve French 670838c8a9a5SSteve French static struct ksmbd_lock *smb2_lock_init(struct file_lock *flock, 670938c8a9a5SSteve French unsigned int cmd, int flags, 671038c8a9a5SSteve French struct list_head *lock_list) 671138c8a9a5SSteve French { 671238c8a9a5SSteve French struct ksmbd_lock *lock; 671338c8a9a5SSteve French 671438c8a9a5SSteve French lock = kzalloc(sizeof(struct ksmbd_lock), GFP_KERNEL); 671538c8a9a5SSteve French if (!lock) 671638c8a9a5SSteve French return NULL; 671738c8a9a5SSteve French 671838c8a9a5SSteve French lock->cmd = cmd; 671938c8a9a5SSteve French lock->fl = flock; 672038c8a9a5SSteve French lock->start = flock->fl_start; 672138c8a9a5SSteve French lock->end = flock->fl_end; 672238c8a9a5SSteve French lock->flags = flags; 672338c8a9a5SSteve French if (lock->start == lock->end) 672438c8a9a5SSteve French lock->zero_len = 1; 672538c8a9a5SSteve French INIT_LIST_HEAD(&lock->clist); 672638c8a9a5SSteve French INIT_LIST_HEAD(&lock->flist); 672738c8a9a5SSteve French INIT_LIST_HEAD(&lock->llist); 672838c8a9a5SSteve French list_add_tail(&lock->llist, lock_list); 672938c8a9a5SSteve French 673038c8a9a5SSteve French return lock; 673138c8a9a5SSteve French } 673238c8a9a5SSteve French 673338c8a9a5SSteve French static void smb2_remove_blocked_lock(void **argv) 673438c8a9a5SSteve French { 673538c8a9a5SSteve French struct file_lock *flock = (struct file_lock *)argv[0]; 673638c8a9a5SSteve French 673738c8a9a5SSteve French ksmbd_vfs_posix_lock_unblock(flock); 673838c8a9a5SSteve French wake_up(&flock->fl_wait); 673938c8a9a5SSteve French } 674038c8a9a5SSteve French 674138c8a9a5SSteve French static inline bool lock_defer_pending(struct file_lock *fl) 674238c8a9a5SSteve French { 674338c8a9a5SSteve French /* check pending lock waiters */ 674438c8a9a5SSteve French return waitqueue_active(&fl->fl_wait); 674538c8a9a5SSteve French } 674638c8a9a5SSteve French 674738c8a9a5SSteve French /** 674838c8a9a5SSteve French * smb2_lock() - handler for smb2 file lock command 674938c8a9a5SSteve French * @work: smb work containing lock command buffer 675038c8a9a5SSteve French * 675138c8a9a5SSteve French * Return: 0 on success, otherwise error 675238c8a9a5SSteve French */ 675338c8a9a5SSteve French int smb2_lock(struct ksmbd_work *work) 675438c8a9a5SSteve French { 675538c8a9a5SSteve French struct smb2_lock_req *req = smb2_get_msg(work->request_buf); 675638c8a9a5SSteve French struct smb2_lock_rsp *rsp = smb2_get_msg(work->response_buf); 675738c8a9a5SSteve French struct smb2_lock_element *lock_ele; 675838c8a9a5SSteve French struct ksmbd_file *fp = NULL; 675938c8a9a5SSteve French struct file_lock *flock = NULL; 676038c8a9a5SSteve French struct file *filp = NULL; 676138c8a9a5SSteve French int lock_count; 676238c8a9a5SSteve French int flags = 0; 676338c8a9a5SSteve French int cmd = 0; 676438c8a9a5SSteve French int err = -EIO, i, rc = 0; 676538c8a9a5SSteve French u64 lock_start, lock_length; 676638c8a9a5SSteve French struct ksmbd_lock *smb_lock = NULL, *cmp_lock, *tmp, *tmp2; 676738c8a9a5SSteve French struct ksmbd_conn *conn; 676838c8a9a5SSteve French int nolock = 0; 676938c8a9a5SSteve French LIST_HEAD(lock_list); 677038c8a9a5SSteve French LIST_HEAD(rollback_list); 677138c8a9a5SSteve French int prior_lock = 0; 677238c8a9a5SSteve French 677338c8a9a5SSteve French ksmbd_debug(SMB, "Received lock request\n"); 677438c8a9a5SSteve French fp = ksmbd_lookup_fd_slow(work, req->VolatileFileId, req->PersistentFileId); 677538c8a9a5SSteve French if (!fp) { 677638c8a9a5SSteve French ksmbd_debug(SMB, "Invalid file id for lock : %llu\n", req->VolatileFileId); 677738c8a9a5SSteve French err = -ENOENT; 677838c8a9a5SSteve French goto out2; 677938c8a9a5SSteve French } 678038c8a9a5SSteve French 678138c8a9a5SSteve French filp = fp->filp; 678238c8a9a5SSteve French lock_count = le16_to_cpu(req->LockCount); 678338c8a9a5SSteve French lock_ele = req->locks; 678438c8a9a5SSteve French 678538c8a9a5SSteve French ksmbd_debug(SMB, "lock count is %d\n", lock_count); 678638c8a9a5SSteve French if (!lock_count) { 678738c8a9a5SSteve French err = -EINVAL; 678838c8a9a5SSteve French goto out2; 678938c8a9a5SSteve French } 679038c8a9a5SSteve French 679138c8a9a5SSteve French for (i = 0; i < lock_count; i++) { 679238c8a9a5SSteve French flags = le32_to_cpu(lock_ele[i].Flags); 679338c8a9a5SSteve French 679438c8a9a5SSteve French flock = smb_flock_init(filp); 679538c8a9a5SSteve French if (!flock) 679638c8a9a5SSteve French goto out; 679738c8a9a5SSteve French 679838c8a9a5SSteve French cmd = smb2_set_flock_flags(flock, flags); 679938c8a9a5SSteve French 680038c8a9a5SSteve French lock_start = le64_to_cpu(lock_ele[i].Offset); 680138c8a9a5SSteve French lock_length = le64_to_cpu(lock_ele[i].Length); 680238c8a9a5SSteve French if (lock_start > U64_MAX - lock_length) { 680338c8a9a5SSteve French pr_err("Invalid lock range requested\n"); 680438c8a9a5SSteve French rsp->hdr.Status = STATUS_INVALID_LOCK_RANGE; 680538c8a9a5SSteve French locks_free_lock(flock); 680638c8a9a5SSteve French goto out; 680738c8a9a5SSteve French } 680838c8a9a5SSteve French 680938c8a9a5SSteve French if (lock_start > OFFSET_MAX) 681038c8a9a5SSteve French flock->fl_start = OFFSET_MAX; 681138c8a9a5SSteve French else 681238c8a9a5SSteve French flock->fl_start = lock_start; 681338c8a9a5SSteve French 681438c8a9a5SSteve French lock_length = le64_to_cpu(lock_ele[i].Length); 681538c8a9a5SSteve French if (lock_length > OFFSET_MAX - flock->fl_start) 681638c8a9a5SSteve French lock_length = OFFSET_MAX - flock->fl_start; 681738c8a9a5SSteve French 681838c8a9a5SSteve French flock->fl_end = flock->fl_start + lock_length; 681938c8a9a5SSteve French 682038c8a9a5SSteve French if (flock->fl_end < flock->fl_start) { 682138c8a9a5SSteve French ksmbd_debug(SMB, 682238c8a9a5SSteve French "the end offset(%llx) is smaller than the start offset(%llx)\n", 682338c8a9a5SSteve French flock->fl_end, flock->fl_start); 682438c8a9a5SSteve French rsp->hdr.Status = STATUS_INVALID_LOCK_RANGE; 682538c8a9a5SSteve French locks_free_lock(flock); 682638c8a9a5SSteve French goto out; 682738c8a9a5SSteve French } 682838c8a9a5SSteve French 682938c8a9a5SSteve French /* Check conflict locks in one request */ 683038c8a9a5SSteve French list_for_each_entry(cmp_lock, &lock_list, llist) { 683138c8a9a5SSteve French if (cmp_lock->fl->fl_start <= flock->fl_start && 683238c8a9a5SSteve French cmp_lock->fl->fl_end >= flock->fl_end) { 683338c8a9a5SSteve French if (cmp_lock->fl->fl_type != F_UNLCK && 683438c8a9a5SSteve French flock->fl_type != F_UNLCK) { 683538c8a9a5SSteve French pr_err("conflict two locks in one request\n"); 683638c8a9a5SSteve French err = -EINVAL; 683738c8a9a5SSteve French locks_free_lock(flock); 683838c8a9a5SSteve French goto out; 683938c8a9a5SSteve French } 684038c8a9a5SSteve French } 684138c8a9a5SSteve French } 684238c8a9a5SSteve French 684338c8a9a5SSteve French smb_lock = smb2_lock_init(flock, cmd, flags, &lock_list); 684438c8a9a5SSteve French if (!smb_lock) { 684538c8a9a5SSteve French err = -EINVAL; 684638c8a9a5SSteve French locks_free_lock(flock); 684738c8a9a5SSteve French goto out; 684838c8a9a5SSteve French } 684938c8a9a5SSteve French } 685038c8a9a5SSteve French 685138c8a9a5SSteve French list_for_each_entry_safe(smb_lock, tmp, &lock_list, llist) { 685238c8a9a5SSteve French if (smb_lock->cmd < 0) { 685338c8a9a5SSteve French err = -EINVAL; 685438c8a9a5SSteve French goto out; 685538c8a9a5SSteve French } 685638c8a9a5SSteve French 685738c8a9a5SSteve French if (!(smb_lock->flags & SMB2_LOCKFLAG_MASK)) { 685838c8a9a5SSteve French err = -EINVAL; 685938c8a9a5SSteve French goto out; 686038c8a9a5SSteve French } 686138c8a9a5SSteve French 686238c8a9a5SSteve French if ((prior_lock & (SMB2_LOCKFLAG_EXCLUSIVE | SMB2_LOCKFLAG_SHARED) && 686338c8a9a5SSteve French smb_lock->flags & SMB2_LOCKFLAG_UNLOCK) || 686438c8a9a5SSteve French (prior_lock == SMB2_LOCKFLAG_UNLOCK && 686538c8a9a5SSteve French !(smb_lock->flags & SMB2_LOCKFLAG_UNLOCK))) { 686638c8a9a5SSteve French err = -EINVAL; 686738c8a9a5SSteve French goto out; 686838c8a9a5SSteve French } 686938c8a9a5SSteve French 687038c8a9a5SSteve French prior_lock = smb_lock->flags; 687138c8a9a5SSteve French 687238c8a9a5SSteve French if (!(smb_lock->flags & SMB2_LOCKFLAG_UNLOCK) && 687338c8a9a5SSteve French !(smb_lock->flags & SMB2_LOCKFLAG_FAIL_IMMEDIATELY)) 687438c8a9a5SSteve French goto no_check_cl; 687538c8a9a5SSteve French 687638c8a9a5SSteve French nolock = 1; 687738c8a9a5SSteve French /* check locks in connection list */ 687838c8a9a5SSteve French down_read(&conn_list_lock); 687938c8a9a5SSteve French list_for_each_entry(conn, &conn_list, conns_list) { 688038c8a9a5SSteve French spin_lock(&conn->llist_lock); 688138c8a9a5SSteve French list_for_each_entry_safe(cmp_lock, tmp2, &conn->lock_list, clist) { 688238c8a9a5SSteve French if (file_inode(cmp_lock->fl->fl_file) != 688338c8a9a5SSteve French file_inode(smb_lock->fl->fl_file)) 688438c8a9a5SSteve French continue; 688538c8a9a5SSteve French 688638c8a9a5SSteve French if (smb_lock->fl->fl_type == F_UNLCK) { 688738c8a9a5SSteve French if (cmp_lock->fl->fl_file == smb_lock->fl->fl_file && 688838c8a9a5SSteve French cmp_lock->start == smb_lock->start && 688938c8a9a5SSteve French cmp_lock->end == smb_lock->end && 689038c8a9a5SSteve French !lock_defer_pending(cmp_lock->fl)) { 689138c8a9a5SSteve French nolock = 0; 689238c8a9a5SSteve French list_del(&cmp_lock->flist); 689338c8a9a5SSteve French list_del(&cmp_lock->clist); 689438c8a9a5SSteve French spin_unlock(&conn->llist_lock); 689538c8a9a5SSteve French up_read(&conn_list_lock); 689638c8a9a5SSteve French 689738c8a9a5SSteve French locks_free_lock(cmp_lock->fl); 689838c8a9a5SSteve French kfree(cmp_lock); 689938c8a9a5SSteve French goto out_check_cl; 690038c8a9a5SSteve French } 690138c8a9a5SSteve French continue; 690238c8a9a5SSteve French } 690338c8a9a5SSteve French 690438c8a9a5SSteve French if (cmp_lock->fl->fl_file == smb_lock->fl->fl_file) { 690538c8a9a5SSteve French if (smb_lock->flags & SMB2_LOCKFLAG_SHARED) 690638c8a9a5SSteve French continue; 690738c8a9a5SSteve French } else { 690838c8a9a5SSteve French if (cmp_lock->flags & SMB2_LOCKFLAG_SHARED) 690938c8a9a5SSteve French continue; 691038c8a9a5SSteve French } 691138c8a9a5SSteve French 691238c8a9a5SSteve French /* check zero byte lock range */ 691338c8a9a5SSteve French if (cmp_lock->zero_len && !smb_lock->zero_len && 691438c8a9a5SSteve French cmp_lock->start > smb_lock->start && 691538c8a9a5SSteve French cmp_lock->start < smb_lock->end) { 691638c8a9a5SSteve French spin_unlock(&conn->llist_lock); 691738c8a9a5SSteve French up_read(&conn_list_lock); 691838c8a9a5SSteve French pr_err("previous lock conflict with zero byte lock range\n"); 691938c8a9a5SSteve French goto out; 692038c8a9a5SSteve French } 692138c8a9a5SSteve French 692238c8a9a5SSteve French if (smb_lock->zero_len && !cmp_lock->zero_len && 692338c8a9a5SSteve French smb_lock->start > cmp_lock->start && 692438c8a9a5SSteve French smb_lock->start < cmp_lock->end) { 692538c8a9a5SSteve French spin_unlock(&conn->llist_lock); 692638c8a9a5SSteve French up_read(&conn_list_lock); 692738c8a9a5SSteve French pr_err("current lock conflict with zero byte lock range\n"); 692838c8a9a5SSteve French goto out; 692938c8a9a5SSteve French } 693038c8a9a5SSteve French 693138c8a9a5SSteve French if (((cmp_lock->start <= smb_lock->start && 693238c8a9a5SSteve French cmp_lock->end > smb_lock->start) || 693338c8a9a5SSteve French (cmp_lock->start < smb_lock->end && 693438c8a9a5SSteve French cmp_lock->end >= smb_lock->end)) && 693538c8a9a5SSteve French !cmp_lock->zero_len && !smb_lock->zero_len) { 693638c8a9a5SSteve French spin_unlock(&conn->llist_lock); 693738c8a9a5SSteve French up_read(&conn_list_lock); 693838c8a9a5SSteve French pr_err("Not allow lock operation on exclusive lock range\n"); 693938c8a9a5SSteve French goto out; 694038c8a9a5SSteve French } 694138c8a9a5SSteve French } 694238c8a9a5SSteve French spin_unlock(&conn->llist_lock); 694338c8a9a5SSteve French } 694438c8a9a5SSteve French up_read(&conn_list_lock); 694538c8a9a5SSteve French out_check_cl: 694638c8a9a5SSteve French if (smb_lock->fl->fl_type == F_UNLCK && nolock) { 694738c8a9a5SSteve French pr_err("Try to unlock nolocked range\n"); 694838c8a9a5SSteve French rsp->hdr.Status = STATUS_RANGE_NOT_LOCKED; 694938c8a9a5SSteve French goto out; 695038c8a9a5SSteve French } 695138c8a9a5SSteve French 695238c8a9a5SSteve French no_check_cl: 695338c8a9a5SSteve French if (smb_lock->zero_len) { 695438c8a9a5SSteve French err = 0; 695538c8a9a5SSteve French goto skip; 695638c8a9a5SSteve French } 695738c8a9a5SSteve French 695838c8a9a5SSteve French flock = smb_lock->fl; 695938c8a9a5SSteve French list_del(&smb_lock->llist); 696038c8a9a5SSteve French retry: 696138c8a9a5SSteve French rc = vfs_lock_file(filp, smb_lock->cmd, flock, NULL); 696238c8a9a5SSteve French skip: 696338c8a9a5SSteve French if (flags & SMB2_LOCKFLAG_UNLOCK) { 696438c8a9a5SSteve French if (!rc) { 696538c8a9a5SSteve French ksmbd_debug(SMB, "File unlocked\n"); 696638c8a9a5SSteve French } else if (rc == -ENOENT) { 696738c8a9a5SSteve French rsp->hdr.Status = STATUS_NOT_LOCKED; 696838c8a9a5SSteve French goto out; 696938c8a9a5SSteve French } 697038c8a9a5SSteve French locks_free_lock(flock); 697138c8a9a5SSteve French kfree(smb_lock); 697238c8a9a5SSteve French } else { 697338c8a9a5SSteve French if (rc == FILE_LOCK_DEFERRED) { 697438c8a9a5SSteve French void **argv; 697538c8a9a5SSteve French 697638c8a9a5SSteve French ksmbd_debug(SMB, 697738c8a9a5SSteve French "would have to wait for getting lock\n"); 697838c8a9a5SSteve French spin_lock(&work->conn->llist_lock); 697938c8a9a5SSteve French list_add_tail(&smb_lock->clist, 698038c8a9a5SSteve French &work->conn->lock_list); 698138c8a9a5SSteve French spin_unlock(&work->conn->llist_lock); 698238c8a9a5SSteve French list_add(&smb_lock->llist, &rollback_list); 698338c8a9a5SSteve French 698438c8a9a5SSteve French argv = kmalloc(sizeof(void *), GFP_KERNEL); 698538c8a9a5SSteve French if (!argv) { 698638c8a9a5SSteve French err = -ENOMEM; 698738c8a9a5SSteve French goto out; 698838c8a9a5SSteve French } 698938c8a9a5SSteve French argv[0] = flock; 699038c8a9a5SSteve French 699138c8a9a5SSteve French rc = setup_async_work(work, 699238c8a9a5SSteve French smb2_remove_blocked_lock, 699338c8a9a5SSteve French argv); 699438c8a9a5SSteve French if (rc) { 699538c8a9a5SSteve French err = -ENOMEM; 699638c8a9a5SSteve French goto out; 699738c8a9a5SSteve French } 699838c8a9a5SSteve French spin_lock(&fp->f_lock); 699938c8a9a5SSteve French list_add(&work->fp_entry, &fp->blocked_works); 700038c8a9a5SSteve French spin_unlock(&fp->f_lock); 700138c8a9a5SSteve French 700238c8a9a5SSteve French smb2_send_interim_resp(work, STATUS_PENDING); 700338c8a9a5SSteve French 700438c8a9a5SSteve French ksmbd_vfs_posix_lock_wait(flock); 700538c8a9a5SSteve French 700638c8a9a5SSteve French spin_lock(&fp->f_lock); 700738c8a9a5SSteve French list_del(&work->fp_entry); 700838c8a9a5SSteve French spin_unlock(&fp->f_lock); 700938c8a9a5SSteve French 701038c8a9a5SSteve French if (work->state != KSMBD_WORK_ACTIVE) { 701138c8a9a5SSteve French list_del(&smb_lock->llist); 701238c8a9a5SSteve French spin_lock(&work->conn->llist_lock); 701338c8a9a5SSteve French list_del(&smb_lock->clist); 701438c8a9a5SSteve French spin_unlock(&work->conn->llist_lock); 701538c8a9a5SSteve French locks_free_lock(flock); 701638c8a9a5SSteve French 701738c8a9a5SSteve French if (work->state == KSMBD_WORK_CANCELLED) { 701838c8a9a5SSteve French rsp->hdr.Status = 701938c8a9a5SSteve French STATUS_CANCELLED; 702038c8a9a5SSteve French kfree(smb_lock); 702138c8a9a5SSteve French smb2_send_interim_resp(work, 702238c8a9a5SSteve French STATUS_CANCELLED); 702338c8a9a5SSteve French work->send_no_response = 1; 702438c8a9a5SSteve French goto out; 702538c8a9a5SSteve French } 702638c8a9a5SSteve French 702738c8a9a5SSteve French init_smb2_rsp_hdr(work); 702838c8a9a5SSteve French smb2_set_err_rsp(work); 702938c8a9a5SSteve French rsp->hdr.Status = 703038c8a9a5SSteve French STATUS_RANGE_NOT_LOCKED; 703138c8a9a5SSteve French kfree(smb_lock); 703238c8a9a5SSteve French goto out2; 703338c8a9a5SSteve French } 703438c8a9a5SSteve French 703538c8a9a5SSteve French list_del(&smb_lock->llist); 703638c8a9a5SSteve French spin_lock(&work->conn->llist_lock); 703738c8a9a5SSteve French list_del(&smb_lock->clist); 703838c8a9a5SSteve French spin_unlock(&work->conn->llist_lock); 703938c8a9a5SSteve French release_async_work(work); 704038c8a9a5SSteve French goto retry; 704138c8a9a5SSteve French } else if (!rc) { 704238c8a9a5SSteve French spin_lock(&work->conn->llist_lock); 704338c8a9a5SSteve French list_add_tail(&smb_lock->clist, 704438c8a9a5SSteve French &work->conn->lock_list); 704538c8a9a5SSteve French list_add_tail(&smb_lock->flist, 704638c8a9a5SSteve French &fp->lock_list); 704738c8a9a5SSteve French spin_unlock(&work->conn->llist_lock); 704838c8a9a5SSteve French list_add(&smb_lock->llist, &rollback_list); 704938c8a9a5SSteve French ksmbd_debug(SMB, "successful in taking lock\n"); 705038c8a9a5SSteve French } else { 705138c8a9a5SSteve French goto out; 705238c8a9a5SSteve French } 705338c8a9a5SSteve French } 705438c8a9a5SSteve French } 705538c8a9a5SSteve French 705638c8a9a5SSteve French if (atomic_read(&fp->f_ci->op_count) > 1) 705738c8a9a5SSteve French smb_break_all_oplock(work, fp); 705838c8a9a5SSteve French 705938c8a9a5SSteve French rsp->StructureSize = cpu_to_le16(4); 706038c8a9a5SSteve French ksmbd_debug(SMB, "successful in taking lock\n"); 706138c8a9a5SSteve French rsp->hdr.Status = STATUS_SUCCESS; 706238c8a9a5SSteve French rsp->Reserved = 0; 706338c8a9a5SSteve French inc_rfc1001_len(work->response_buf, 4); 706438c8a9a5SSteve French ksmbd_fd_put(work, fp); 706538c8a9a5SSteve French return 0; 706638c8a9a5SSteve French 706738c8a9a5SSteve French out: 706838c8a9a5SSteve French list_for_each_entry_safe(smb_lock, tmp, &lock_list, llist) { 706938c8a9a5SSteve French locks_free_lock(smb_lock->fl); 707038c8a9a5SSteve French list_del(&smb_lock->llist); 707138c8a9a5SSteve French kfree(smb_lock); 707238c8a9a5SSteve French } 707338c8a9a5SSteve French 707438c8a9a5SSteve French list_for_each_entry_safe(smb_lock, tmp, &rollback_list, llist) { 707538c8a9a5SSteve French struct file_lock *rlock = NULL; 707638c8a9a5SSteve French 707738c8a9a5SSteve French rlock = smb_flock_init(filp); 707838c8a9a5SSteve French rlock->fl_type = F_UNLCK; 707938c8a9a5SSteve French rlock->fl_start = smb_lock->start; 708038c8a9a5SSteve French rlock->fl_end = smb_lock->end; 708138c8a9a5SSteve French 708238c8a9a5SSteve French rc = vfs_lock_file(filp, F_SETLK, rlock, NULL); 708338c8a9a5SSteve French if (rc) 708438c8a9a5SSteve French pr_err("rollback unlock fail : %d\n", rc); 708538c8a9a5SSteve French 708638c8a9a5SSteve French list_del(&smb_lock->llist); 708738c8a9a5SSteve French spin_lock(&work->conn->llist_lock); 708838c8a9a5SSteve French if (!list_empty(&smb_lock->flist)) 708938c8a9a5SSteve French list_del(&smb_lock->flist); 709038c8a9a5SSteve French list_del(&smb_lock->clist); 709138c8a9a5SSteve French spin_unlock(&work->conn->llist_lock); 709238c8a9a5SSteve French 709338c8a9a5SSteve French locks_free_lock(smb_lock->fl); 709438c8a9a5SSteve French locks_free_lock(rlock); 709538c8a9a5SSteve French kfree(smb_lock); 709638c8a9a5SSteve French } 709738c8a9a5SSteve French out2: 709838c8a9a5SSteve French ksmbd_debug(SMB, "failed in taking lock(flags : %x), err : %d\n", flags, err); 709938c8a9a5SSteve French 710038c8a9a5SSteve French if (!rsp->hdr.Status) { 710138c8a9a5SSteve French if (err == -EINVAL) 710238c8a9a5SSteve French rsp->hdr.Status = STATUS_INVALID_PARAMETER; 710338c8a9a5SSteve French else if (err == -ENOMEM) 710438c8a9a5SSteve French rsp->hdr.Status = STATUS_INSUFFICIENT_RESOURCES; 710538c8a9a5SSteve French else if (err == -ENOENT) 710638c8a9a5SSteve French rsp->hdr.Status = STATUS_FILE_CLOSED; 710738c8a9a5SSteve French else 710838c8a9a5SSteve French rsp->hdr.Status = STATUS_LOCK_NOT_GRANTED; 710938c8a9a5SSteve French } 711038c8a9a5SSteve French 711138c8a9a5SSteve French smb2_set_err_rsp(work); 711238c8a9a5SSteve French ksmbd_fd_put(work, fp); 711338c8a9a5SSteve French return err; 711438c8a9a5SSteve French } 711538c8a9a5SSteve French 711638c8a9a5SSteve French static int fsctl_copychunk(struct ksmbd_work *work, 711738c8a9a5SSteve French struct copychunk_ioctl_req *ci_req, 711838c8a9a5SSteve French unsigned int cnt_code, 711938c8a9a5SSteve French unsigned int input_count, 712038c8a9a5SSteve French unsigned long long volatile_id, 712138c8a9a5SSteve French unsigned long long persistent_id, 712238c8a9a5SSteve French struct smb2_ioctl_rsp *rsp) 712338c8a9a5SSteve French { 712438c8a9a5SSteve French struct copychunk_ioctl_rsp *ci_rsp; 712538c8a9a5SSteve French struct ksmbd_file *src_fp = NULL, *dst_fp = NULL; 712638c8a9a5SSteve French struct srv_copychunk *chunks; 712738c8a9a5SSteve French unsigned int i, chunk_count, chunk_count_written = 0; 712838c8a9a5SSteve French unsigned int chunk_size_written = 0; 712938c8a9a5SSteve French loff_t total_size_written = 0; 713038c8a9a5SSteve French int ret = 0; 713138c8a9a5SSteve French 713238c8a9a5SSteve French ci_rsp = (struct copychunk_ioctl_rsp *)&rsp->Buffer[0]; 713338c8a9a5SSteve French 713438c8a9a5SSteve French rsp->VolatileFileId = volatile_id; 713538c8a9a5SSteve French rsp->PersistentFileId = persistent_id; 713638c8a9a5SSteve French ci_rsp->ChunksWritten = 713738c8a9a5SSteve French cpu_to_le32(ksmbd_server_side_copy_max_chunk_count()); 713838c8a9a5SSteve French ci_rsp->ChunkBytesWritten = 713938c8a9a5SSteve French cpu_to_le32(ksmbd_server_side_copy_max_chunk_size()); 714038c8a9a5SSteve French ci_rsp->TotalBytesWritten = 714138c8a9a5SSteve French cpu_to_le32(ksmbd_server_side_copy_max_total_size()); 714238c8a9a5SSteve French 714338c8a9a5SSteve French chunks = (struct srv_copychunk *)&ci_req->Chunks[0]; 714438c8a9a5SSteve French chunk_count = le32_to_cpu(ci_req->ChunkCount); 714538c8a9a5SSteve French if (chunk_count == 0) 714638c8a9a5SSteve French goto out; 714738c8a9a5SSteve French total_size_written = 0; 714838c8a9a5SSteve French 714938c8a9a5SSteve French /* verify the SRV_COPYCHUNK_COPY packet */ 715038c8a9a5SSteve French if (chunk_count > ksmbd_server_side_copy_max_chunk_count() || 715138c8a9a5SSteve French input_count < offsetof(struct copychunk_ioctl_req, Chunks) + 715238c8a9a5SSteve French chunk_count * sizeof(struct srv_copychunk)) { 715338c8a9a5SSteve French rsp->hdr.Status = STATUS_INVALID_PARAMETER; 715438c8a9a5SSteve French return -EINVAL; 715538c8a9a5SSteve French } 715638c8a9a5SSteve French 715738c8a9a5SSteve French for (i = 0; i < chunk_count; i++) { 715838c8a9a5SSteve French if (le32_to_cpu(chunks[i].Length) == 0 || 715938c8a9a5SSteve French le32_to_cpu(chunks[i].Length) > ksmbd_server_side_copy_max_chunk_size()) 716038c8a9a5SSteve French break; 716138c8a9a5SSteve French total_size_written += le32_to_cpu(chunks[i].Length); 716238c8a9a5SSteve French } 716338c8a9a5SSteve French 716438c8a9a5SSteve French if (i < chunk_count || 716538c8a9a5SSteve French total_size_written > ksmbd_server_side_copy_max_total_size()) { 716638c8a9a5SSteve French rsp->hdr.Status = STATUS_INVALID_PARAMETER; 716738c8a9a5SSteve French return -EINVAL; 716838c8a9a5SSteve French } 716938c8a9a5SSteve French 717038c8a9a5SSteve French src_fp = ksmbd_lookup_foreign_fd(work, 717138c8a9a5SSteve French le64_to_cpu(ci_req->ResumeKey[0])); 717238c8a9a5SSteve French dst_fp = ksmbd_lookup_fd_slow(work, volatile_id, persistent_id); 717338c8a9a5SSteve French ret = -EINVAL; 717438c8a9a5SSteve French if (!src_fp || 717538c8a9a5SSteve French src_fp->persistent_id != le64_to_cpu(ci_req->ResumeKey[1])) { 717638c8a9a5SSteve French rsp->hdr.Status = STATUS_OBJECT_NAME_NOT_FOUND; 717738c8a9a5SSteve French goto out; 717838c8a9a5SSteve French } 717938c8a9a5SSteve French 718038c8a9a5SSteve French if (!dst_fp) { 718138c8a9a5SSteve French rsp->hdr.Status = STATUS_FILE_CLOSED; 718238c8a9a5SSteve French goto out; 718338c8a9a5SSteve French } 718438c8a9a5SSteve French 718538c8a9a5SSteve French /* 718638c8a9a5SSteve French * FILE_READ_DATA should only be included in 718738c8a9a5SSteve French * the FSCTL_COPYCHUNK case 718838c8a9a5SSteve French */ 718938c8a9a5SSteve French if (cnt_code == FSCTL_COPYCHUNK && 719038c8a9a5SSteve French !(dst_fp->daccess & (FILE_READ_DATA_LE | FILE_GENERIC_READ_LE))) { 719138c8a9a5SSteve French rsp->hdr.Status = STATUS_ACCESS_DENIED; 719238c8a9a5SSteve French goto out; 719338c8a9a5SSteve French } 719438c8a9a5SSteve French 719538c8a9a5SSteve French ret = ksmbd_vfs_copy_file_ranges(work, src_fp, dst_fp, 719638c8a9a5SSteve French chunks, chunk_count, 719738c8a9a5SSteve French &chunk_count_written, 719838c8a9a5SSteve French &chunk_size_written, 719938c8a9a5SSteve French &total_size_written); 720038c8a9a5SSteve French if (ret < 0) { 720138c8a9a5SSteve French if (ret == -EACCES) 720238c8a9a5SSteve French rsp->hdr.Status = STATUS_ACCESS_DENIED; 720338c8a9a5SSteve French if (ret == -EAGAIN) 720438c8a9a5SSteve French rsp->hdr.Status = STATUS_FILE_LOCK_CONFLICT; 720538c8a9a5SSteve French else if (ret == -EBADF) 720638c8a9a5SSteve French rsp->hdr.Status = STATUS_INVALID_HANDLE; 720738c8a9a5SSteve French else if (ret == -EFBIG || ret == -ENOSPC) 720838c8a9a5SSteve French rsp->hdr.Status = STATUS_DISK_FULL; 720938c8a9a5SSteve French else if (ret == -EINVAL) 721038c8a9a5SSteve French rsp->hdr.Status = STATUS_INVALID_PARAMETER; 721138c8a9a5SSteve French else if (ret == -EISDIR) 721238c8a9a5SSteve French rsp->hdr.Status = STATUS_FILE_IS_A_DIRECTORY; 721338c8a9a5SSteve French else if (ret == -E2BIG) 721438c8a9a5SSteve French rsp->hdr.Status = STATUS_INVALID_VIEW_SIZE; 721538c8a9a5SSteve French else 721638c8a9a5SSteve French rsp->hdr.Status = STATUS_UNEXPECTED_IO_ERROR; 721738c8a9a5SSteve French } 721838c8a9a5SSteve French 721938c8a9a5SSteve French ci_rsp->ChunksWritten = cpu_to_le32(chunk_count_written); 722038c8a9a5SSteve French ci_rsp->ChunkBytesWritten = cpu_to_le32(chunk_size_written); 722138c8a9a5SSteve French ci_rsp->TotalBytesWritten = cpu_to_le32(total_size_written); 722238c8a9a5SSteve French out: 722338c8a9a5SSteve French ksmbd_fd_put(work, src_fp); 722438c8a9a5SSteve French ksmbd_fd_put(work, dst_fp); 722538c8a9a5SSteve French return ret; 722638c8a9a5SSteve French } 722738c8a9a5SSteve French 722838c8a9a5SSteve French static __be32 idev_ipv4_address(struct in_device *idev) 722938c8a9a5SSteve French { 723038c8a9a5SSteve French __be32 addr = 0; 723138c8a9a5SSteve French 723238c8a9a5SSteve French struct in_ifaddr *ifa; 723338c8a9a5SSteve French 723438c8a9a5SSteve French rcu_read_lock(); 723538c8a9a5SSteve French in_dev_for_each_ifa_rcu(ifa, idev) { 723638c8a9a5SSteve French if (ifa->ifa_flags & IFA_F_SECONDARY) 723738c8a9a5SSteve French continue; 723838c8a9a5SSteve French 723938c8a9a5SSteve French addr = ifa->ifa_address; 724038c8a9a5SSteve French break; 724138c8a9a5SSteve French } 724238c8a9a5SSteve French rcu_read_unlock(); 724338c8a9a5SSteve French return addr; 724438c8a9a5SSteve French } 724538c8a9a5SSteve French 724638c8a9a5SSteve French static int fsctl_query_iface_info_ioctl(struct ksmbd_conn *conn, 724738c8a9a5SSteve French struct smb2_ioctl_rsp *rsp, 724838c8a9a5SSteve French unsigned int out_buf_len) 724938c8a9a5SSteve French { 725038c8a9a5SSteve French struct network_interface_info_ioctl_rsp *nii_rsp = NULL; 725138c8a9a5SSteve French int nbytes = 0; 725238c8a9a5SSteve French struct net_device *netdev; 725338c8a9a5SSteve French struct sockaddr_storage_rsp *sockaddr_storage; 725438c8a9a5SSteve French unsigned int flags; 725538c8a9a5SSteve French unsigned long long speed; 725638c8a9a5SSteve French 725738c8a9a5SSteve French rtnl_lock(); 725838c8a9a5SSteve French for_each_netdev(&init_net, netdev) { 725938c8a9a5SSteve French bool ipv4_set = false; 726038c8a9a5SSteve French 726138c8a9a5SSteve French if (netdev->type == ARPHRD_LOOPBACK) 726238c8a9a5SSteve French continue; 726338c8a9a5SSteve French 726438c8a9a5SSteve French flags = dev_get_flags(netdev); 726538c8a9a5SSteve French if (!(flags & IFF_RUNNING)) 726638c8a9a5SSteve French continue; 726738c8a9a5SSteve French ipv6_retry: 726838c8a9a5SSteve French if (out_buf_len < 726938c8a9a5SSteve French nbytes + sizeof(struct network_interface_info_ioctl_rsp)) { 727038c8a9a5SSteve French rtnl_unlock(); 727138c8a9a5SSteve French return -ENOSPC; 727238c8a9a5SSteve French } 727338c8a9a5SSteve French 727438c8a9a5SSteve French nii_rsp = (struct network_interface_info_ioctl_rsp *) 727538c8a9a5SSteve French &rsp->Buffer[nbytes]; 727638c8a9a5SSteve French nii_rsp->IfIndex = cpu_to_le32(netdev->ifindex); 727738c8a9a5SSteve French 727838c8a9a5SSteve French nii_rsp->Capability = 0; 727938c8a9a5SSteve French if (netdev->real_num_tx_queues > 1) 728038c8a9a5SSteve French nii_rsp->Capability |= cpu_to_le32(RSS_CAPABLE); 728138c8a9a5SSteve French if (ksmbd_rdma_capable_netdev(netdev)) 728238c8a9a5SSteve French nii_rsp->Capability |= cpu_to_le32(RDMA_CAPABLE); 728338c8a9a5SSteve French 728438c8a9a5SSteve French nii_rsp->Next = cpu_to_le32(152); 728538c8a9a5SSteve French nii_rsp->Reserved = 0; 728638c8a9a5SSteve French 728738c8a9a5SSteve French if (netdev->ethtool_ops->get_link_ksettings) { 728838c8a9a5SSteve French struct ethtool_link_ksettings cmd; 728938c8a9a5SSteve French 729038c8a9a5SSteve French netdev->ethtool_ops->get_link_ksettings(netdev, &cmd); 729138c8a9a5SSteve French speed = cmd.base.speed; 729238c8a9a5SSteve French } else { 729338c8a9a5SSteve French ksmbd_debug(SMB, "%s %s\n", netdev->name, 729438c8a9a5SSteve French "speed is unknown, defaulting to 1Gb/sec"); 729538c8a9a5SSteve French speed = SPEED_1000; 729638c8a9a5SSteve French } 729738c8a9a5SSteve French 729838c8a9a5SSteve French speed *= 1000000; 729938c8a9a5SSteve French nii_rsp->LinkSpeed = cpu_to_le64(speed); 730038c8a9a5SSteve French 730138c8a9a5SSteve French sockaddr_storage = (struct sockaddr_storage_rsp *) 730238c8a9a5SSteve French nii_rsp->SockAddr_Storage; 730338c8a9a5SSteve French memset(sockaddr_storage, 0, 128); 730438c8a9a5SSteve French 730538c8a9a5SSteve French if (!ipv4_set) { 730638c8a9a5SSteve French struct in_device *idev; 730738c8a9a5SSteve French 730838c8a9a5SSteve French sockaddr_storage->Family = cpu_to_le16(INTERNETWORK); 730938c8a9a5SSteve French sockaddr_storage->addr4.Port = 0; 731038c8a9a5SSteve French 731138c8a9a5SSteve French idev = __in_dev_get_rtnl(netdev); 731238c8a9a5SSteve French if (!idev) 731338c8a9a5SSteve French continue; 731438c8a9a5SSteve French sockaddr_storage->addr4.IPv4address = 731538c8a9a5SSteve French idev_ipv4_address(idev); 731638c8a9a5SSteve French nbytes += sizeof(struct network_interface_info_ioctl_rsp); 731738c8a9a5SSteve French ipv4_set = true; 731838c8a9a5SSteve French goto ipv6_retry; 731938c8a9a5SSteve French } else { 732038c8a9a5SSteve French struct inet6_dev *idev6; 732138c8a9a5SSteve French struct inet6_ifaddr *ifa; 732238c8a9a5SSteve French __u8 *ipv6_addr = sockaddr_storage->addr6.IPv6address; 732338c8a9a5SSteve French 732438c8a9a5SSteve French sockaddr_storage->Family = cpu_to_le16(INTERNETWORKV6); 732538c8a9a5SSteve French sockaddr_storage->addr6.Port = 0; 732638c8a9a5SSteve French sockaddr_storage->addr6.FlowInfo = 0; 732738c8a9a5SSteve French 732838c8a9a5SSteve French idev6 = __in6_dev_get(netdev); 732938c8a9a5SSteve French if (!idev6) 733038c8a9a5SSteve French continue; 733138c8a9a5SSteve French 733238c8a9a5SSteve French list_for_each_entry(ifa, &idev6->addr_list, if_list) { 733338c8a9a5SSteve French if (ifa->flags & (IFA_F_TENTATIVE | 733438c8a9a5SSteve French IFA_F_DEPRECATED)) 733538c8a9a5SSteve French continue; 733638c8a9a5SSteve French memcpy(ipv6_addr, ifa->addr.s6_addr, 16); 733738c8a9a5SSteve French break; 733838c8a9a5SSteve French } 733938c8a9a5SSteve French sockaddr_storage->addr6.ScopeId = 0; 734038c8a9a5SSteve French nbytes += sizeof(struct network_interface_info_ioctl_rsp); 734138c8a9a5SSteve French } 734238c8a9a5SSteve French } 734338c8a9a5SSteve French rtnl_unlock(); 734438c8a9a5SSteve French 734538c8a9a5SSteve French /* zero if this is last one */ 734638c8a9a5SSteve French if (nii_rsp) 734738c8a9a5SSteve French nii_rsp->Next = 0; 734838c8a9a5SSteve French 734938c8a9a5SSteve French rsp->PersistentFileId = SMB2_NO_FID; 735038c8a9a5SSteve French rsp->VolatileFileId = SMB2_NO_FID; 735138c8a9a5SSteve French return nbytes; 735238c8a9a5SSteve French } 735338c8a9a5SSteve French 735438c8a9a5SSteve French static int fsctl_validate_negotiate_info(struct ksmbd_conn *conn, 735538c8a9a5SSteve French struct validate_negotiate_info_req *neg_req, 735638c8a9a5SSteve French struct validate_negotiate_info_rsp *neg_rsp, 735738c8a9a5SSteve French unsigned int in_buf_len) 735838c8a9a5SSteve French { 735938c8a9a5SSteve French int ret = 0; 736038c8a9a5SSteve French int dialect; 736138c8a9a5SSteve French 736238c8a9a5SSteve French if (in_buf_len < offsetof(struct validate_negotiate_info_req, Dialects) + 736338c8a9a5SSteve French le16_to_cpu(neg_req->DialectCount) * sizeof(__le16)) 736438c8a9a5SSteve French return -EINVAL; 736538c8a9a5SSteve French 736638c8a9a5SSteve French dialect = ksmbd_lookup_dialect_by_id(neg_req->Dialects, 736738c8a9a5SSteve French neg_req->DialectCount); 736838c8a9a5SSteve French if (dialect == BAD_PROT_ID || dialect != conn->dialect) { 736938c8a9a5SSteve French ret = -EINVAL; 737038c8a9a5SSteve French goto err_out; 737138c8a9a5SSteve French } 737238c8a9a5SSteve French 737338c8a9a5SSteve French if (strncmp(neg_req->Guid, conn->ClientGUID, SMB2_CLIENT_GUID_SIZE)) { 737438c8a9a5SSteve French ret = -EINVAL; 737538c8a9a5SSteve French goto err_out; 737638c8a9a5SSteve French } 737738c8a9a5SSteve French 737838c8a9a5SSteve French if (le16_to_cpu(neg_req->SecurityMode) != conn->cli_sec_mode) { 737938c8a9a5SSteve French ret = -EINVAL; 738038c8a9a5SSteve French goto err_out; 738138c8a9a5SSteve French } 738238c8a9a5SSteve French 738338c8a9a5SSteve French if (le32_to_cpu(neg_req->Capabilities) != conn->cli_cap) { 738438c8a9a5SSteve French ret = -EINVAL; 738538c8a9a5SSteve French goto err_out; 738638c8a9a5SSteve French } 738738c8a9a5SSteve French 738838c8a9a5SSteve French neg_rsp->Capabilities = cpu_to_le32(conn->vals->capabilities); 738938c8a9a5SSteve French memset(neg_rsp->Guid, 0, SMB2_CLIENT_GUID_SIZE); 739038c8a9a5SSteve French neg_rsp->SecurityMode = cpu_to_le16(conn->srv_sec_mode); 739138c8a9a5SSteve French neg_rsp->Dialect = cpu_to_le16(conn->dialect); 739238c8a9a5SSteve French err_out: 739338c8a9a5SSteve French return ret; 739438c8a9a5SSteve French } 739538c8a9a5SSteve French 739638c8a9a5SSteve French static int fsctl_query_allocated_ranges(struct ksmbd_work *work, u64 id, 739738c8a9a5SSteve French struct file_allocated_range_buffer *qar_req, 739838c8a9a5SSteve French struct file_allocated_range_buffer *qar_rsp, 739938c8a9a5SSteve French unsigned int in_count, unsigned int *out_count) 740038c8a9a5SSteve French { 740138c8a9a5SSteve French struct ksmbd_file *fp; 740238c8a9a5SSteve French loff_t start, length; 740338c8a9a5SSteve French int ret = 0; 740438c8a9a5SSteve French 740538c8a9a5SSteve French *out_count = 0; 740638c8a9a5SSteve French if (in_count == 0) 740738c8a9a5SSteve French return -EINVAL; 740838c8a9a5SSteve French 740938c8a9a5SSteve French start = le64_to_cpu(qar_req->file_offset); 741038c8a9a5SSteve French length = le64_to_cpu(qar_req->length); 741138c8a9a5SSteve French 741238c8a9a5SSteve French if (start < 0 || length < 0) 741338c8a9a5SSteve French return -EINVAL; 741438c8a9a5SSteve French 741538c8a9a5SSteve French fp = ksmbd_lookup_fd_fast(work, id); 741638c8a9a5SSteve French if (!fp) 741738c8a9a5SSteve French return -ENOENT; 741838c8a9a5SSteve French 741938c8a9a5SSteve French ret = ksmbd_vfs_fqar_lseek(fp, start, length, 742038c8a9a5SSteve French qar_rsp, in_count, out_count); 742138c8a9a5SSteve French if (ret && ret != -E2BIG) 742238c8a9a5SSteve French *out_count = 0; 742338c8a9a5SSteve French 742438c8a9a5SSteve French ksmbd_fd_put(work, fp); 742538c8a9a5SSteve French return ret; 742638c8a9a5SSteve French } 742738c8a9a5SSteve French 742838c8a9a5SSteve French static int fsctl_pipe_transceive(struct ksmbd_work *work, u64 id, 742938c8a9a5SSteve French unsigned int out_buf_len, 743038c8a9a5SSteve French struct smb2_ioctl_req *req, 743138c8a9a5SSteve French struct smb2_ioctl_rsp *rsp) 743238c8a9a5SSteve French { 743338c8a9a5SSteve French struct ksmbd_rpc_command *rpc_resp; 743438c8a9a5SSteve French char *data_buf = (char *)&req->Buffer[0]; 743538c8a9a5SSteve French int nbytes = 0; 743638c8a9a5SSteve French 743738c8a9a5SSteve French rpc_resp = ksmbd_rpc_ioctl(work->sess, id, data_buf, 743838c8a9a5SSteve French le32_to_cpu(req->InputCount)); 743938c8a9a5SSteve French if (rpc_resp) { 744038c8a9a5SSteve French if (rpc_resp->flags == KSMBD_RPC_SOME_NOT_MAPPED) { 744138c8a9a5SSteve French /* 744238c8a9a5SSteve French * set STATUS_SOME_NOT_MAPPED response 744338c8a9a5SSteve French * for unknown domain sid. 744438c8a9a5SSteve French */ 744538c8a9a5SSteve French rsp->hdr.Status = STATUS_SOME_NOT_MAPPED; 744638c8a9a5SSteve French } else if (rpc_resp->flags == KSMBD_RPC_ENOTIMPLEMENTED) { 744738c8a9a5SSteve French rsp->hdr.Status = STATUS_NOT_SUPPORTED; 744838c8a9a5SSteve French goto out; 744938c8a9a5SSteve French } else if (rpc_resp->flags != KSMBD_RPC_OK) { 745038c8a9a5SSteve French rsp->hdr.Status = STATUS_INVALID_PARAMETER; 745138c8a9a5SSteve French goto out; 745238c8a9a5SSteve French } 745338c8a9a5SSteve French 745438c8a9a5SSteve French nbytes = rpc_resp->payload_sz; 745538c8a9a5SSteve French if (rpc_resp->payload_sz > out_buf_len) { 745638c8a9a5SSteve French rsp->hdr.Status = STATUS_BUFFER_OVERFLOW; 745738c8a9a5SSteve French nbytes = out_buf_len; 745838c8a9a5SSteve French } 745938c8a9a5SSteve French 746038c8a9a5SSteve French if (!rpc_resp->payload_sz) { 746138c8a9a5SSteve French rsp->hdr.Status = 746238c8a9a5SSteve French STATUS_UNEXPECTED_IO_ERROR; 746338c8a9a5SSteve French goto out; 746438c8a9a5SSteve French } 746538c8a9a5SSteve French 746638c8a9a5SSteve French memcpy((char *)rsp->Buffer, rpc_resp->payload, nbytes); 746738c8a9a5SSteve French } 746838c8a9a5SSteve French out: 746938c8a9a5SSteve French kvfree(rpc_resp); 747038c8a9a5SSteve French return nbytes; 747138c8a9a5SSteve French } 747238c8a9a5SSteve French 747338c8a9a5SSteve French static inline int fsctl_set_sparse(struct ksmbd_work *work, u64 id, 747438c8a9a5SSteve French struct file_sparse *sparse) 747538c8a9a5SSteve French { 747638c8a9a5SSteve French struct ksmbd_file *fp; 747738c8a9a5SSteve French struct mnt_idmap *idmap; 747838c8a9a5SSteve French int ret = 0; 747938c8a9a5SSteve French __le32 old_fattr; 748038c8a9a5SSteve French 748138c8a9a5SSteve French fp = ksmbd_lookup_fd_fast(work, id); 748238c8a9a5SSteve French if (!fp) 748338c8a9a5SSteve French return -ENOENT; 748438c8a9a5SSteve French idmap = file_mnt_idmap(fp->filp); 748538c8a9a5SSteve French 748638c8a9a5SSteve French old_fattr = fp->f_ci->m_fattr; 748738c8a9a5SSteve French if (sparse->SetSparse) 748838c8a9a5SSteve French fp->f_ci->m_fattr |= FILE_ATTRIBUTE_SPARSE_FILE_LE; 748938c8a9a5SSteve French else 749038c8a9a5SSteve French fp->f_ci->m_fattr &= ~FILE_ATTRIBUTE_SPARSE_FILE_LE; 749138c8a9a5SSteve French 749238c8a9a5SSteve French if (fp->f_ci->m_fattr != old_fattr && 749338c8a9a5SSteve French test_share_config_flag(work->tcon->share_conf, 749438c8a9a5SSteve French KSMBD_SHARE_FLAG_STORE_DOS_ATTRS)) { 749538c8a9a5SSteve French struct xattr_dos_attrib da; 749638c8a9a5SSteve French 749738c8a9a5SSteve French ret = ksmbd_vfs_get_dos_attrib_xattr(idmap, 749838c8a9a5SSteve French fp->filp->f_path.dentry, &da); 749938c8a9a5SSteve French if (ret <= 0) 750038c8a9a5SSteve French goto out; 750138c8a9a5SSteve French 750238c8a9a5SSteve French da.attr = le32_to_cpu(fp->f_ci->m_fattr); 750338c8a9a5SSteve French ret = ksmbd_vfs_set_dos_attrib_xattr(idmap, 750438c8a9a5SSteve French fp->filp->f_path.dentry, &da); 750538c8a9a5SSteve French if (ret) 750638c8a9a5SSteve French fp->f_ci->m_fattr = old_fattr; 750738c8a9a5SSteve French } 750838c8a9a5SSteve French 750938c8a9a5SSteve French out: 751038c8a9a5SSteve French ksmbd_fd_put(work, fp); 751138c8a9a5SSteve French return ret; 751238c8a9a5SSteve French } 751338c8a9a5SSteve French 751438c8a9a5SSteve French static int fsctl_request_resume_key(struct ksmbd_work *work, 751538c8a9a5SSteve French struct smb2_ioctl_req *req, 751638c8a9a5SSteve French struct resume_key_ioctl_rsp *key_rsp) 751738c8a9a5SSteve French { 751838c8a9a5SSteve French struct ksmbd_file *fp; 751938c8a9a5SSteve French 752038c8a9a5SSteve French fp = ksmbd_lookup_fd_slow(work, req->VolatileFileId, req->PersistentFileId); 752138c8a9a5SSteve French if (!fp) 752238c8a9a5SSteve French return -ENOENT; 752338c8a9a5SSteve French 752438c8a9a5SSteve French memset(key_rsp, 0, sizeof(*key_rsp)); 752538c8a9a5SSteve French key_rsp->ResumeKey[0] = req->VolatileFileId; 752638c8a9a5SSteve French key_rsp->ResumeKey[1] = req->PersistentFileId; 752738c8a9a5SSteve French ksmbd_fd_put(work, fp); 752838c8a9a5SSteve French 752938c8a9a5SSteve French return 0; 753038c8a9a5SSteve French } 753138c8a9a5SSteve French 753238c8a9a5SSteve French /** 753338c8a9a5SSteve French * smb2_ioctl() - handler for smb2 ioctl command 753438c8a9a5SSteve French * @work: smb work containing ioctl command buffer 753538c8a9a5SSteve French * 753638c8a9a5SSteve French * Return: 0 on success, otherwise error 753738c8a9a5SSteve French */ 753838c8a9a5SSteve French int smb2_ioctl(struct ksmbd_work *work) 753938c8a9a5SSteve French { 754038c8a9a5SSteve French struct smb2_ioctl_req *req; 754138c8a9a5SSteve French struct smb2_ioctl_rsp *rsp; 754238c8a9a5SSteve French unsigned int cnt_code, nbytes = 0, out_buf_len, in_buf_len; 754338c8a9a5SSteve French u64 id = KSMBD_NO_FID; 754438c8a9a5SSteve French struct ksmbd_conn *conn = work->conn; 754538c8a9a5SSteve French int ret = 0; 754638c8a9a5SSteve French 754738c8a9a5SSteve French if (work->next_smb2_rcv_hdr_off) { 754838c8a9a5SSteve French req = ksmbd_req_buf_next(work); 754938c8a9a5SSteve French rsp = ksmbd_resp_buf_next(work); 755038c8a9a5SSteve French if (!has_file_id(req->VolatileFileId)) { 755138c8a9a5SSteve French ksmbd_debug(SMB, "Compound request set FID = %llu\n", 755238c8a9a5SSteve French work->compound_fid); 755338c8a9a5SSteve French id = work->compound_fid; 755438c8a9a5SSteve French } 755538c8a9a5SSteve French } else { 755638c8a9a5SSteve French req = smb2_get_msg(work->request_buf); 755738c8a9a5SSteve French rsp = smb2_get_msg(work->response_buf); 755838c8a9a5SSteve French } 755938c8a9a5SSteve French 756038c8a9a5SSteve French if (!has_file_id(id)) 756138c8a9a5SSteve French id = req->VolatileFileId; 756238c8a9a5SSteve French 756338c8a9a5SSteve French if (req->Flags != cpu_to_le32(SMB2_0_IOCTL_IS_FSCTL)) { 756438c8a9a5SSteve French rsp->hdr.Status = STATUS_NOT_SUPPORTED; 756538c8a9a5SSteve French goto out; 756638c8a9a5SSteve French } 756738c8a9a5SSteve French 756838c8a9a5SSteve French cnt_code = le32_to_cpu(req->CtlCode); 756938c8a9a5SSteve French ret = smb2_calc_max_out_buf_len(work, 48, 757038c8a9a5SSteve French le32_to_cpu(req->MaxOutputResponse)); 757138c8a9a5SSteve French if (ret < 0) { 757238c8a9a5SSteve French rsp->hdr.Status = STATUS_INVALID_PARAMETER; 757338c8a9a5SSteve French goto out; 757438c8a9a5SSteve French } 757538c8a9a5SSteve French out_buf_len = (unsigned int)ret; 757638c8a9a5SSteve French in_buf_len = le32_to_cpu(req->InputCount); 757738c8a9a5SSteve French 757838c8a9a5SSteve French switch (cnt_code) { 757938c8a9a5SSteve French case FSCTL_DFS_GET_REFERRALS: 758038c8a9a5SSteve French case FSCTL_DFS_GET_REFERRALS_EX: 758138c8a9a5SSteve French /* Not support DFS yet */ 758238c8a9a5SSteve French rsp->hdr.Status = STATUS_FS_DRIVER_REQUIRED; 758338c8a9a5SSteve French goto out; 758438c8a9a5SSteve French case FSCTL_CREATE_OR_GET_OBJECT_ID: 758538c8a9a5SSteve French { 758638c8a9a5SSteve French struct file_object_buf_type1_ioctl_rsp *obj_buf; 758738c8a9a5SSteve French 758838c8a9a5SSteve French nbytes = sizeof(struct file_object_buf_type1_ioctl_rsp); 758938c8a9a5SSteve French obj_buf = (struct file_object_buf_type1_ioctl_rsp *) 759038c8a9a5SSteve French &rsp->Buffer[0]; 759138c8a9a5SSteve French 759238c8a9a5SSteve French /* 759338c8a9a5SSteve French * TODO: This is dummy implementation to pass smbtorture 759438c8a9a5SSteve French * Need to check correct response later 759538c8a9a5SSteve French */ 759638c8a9a5SSteve French memset(obj_buf->ObjectId, 0x0, 16); 759738c8a9a5SSteve French memset(obj_buf->BirthVolumeId, 0x0, 16); 759838c8a9a5SSteve French memset(obj_buf->BirthObjectId, 0x0, 16); 759938c8a9a5SSteve French memset(obj_buf->DomainId, 0x0, 16); 760038c8a9a5SSteve French 760138c8a9a5SSteve French break; 760238c8a9a5SSteve French } 760338c8a9a5SSteve French case FSCTL_PIPE_TRANSCEIVE: 760438c8a9a5SSteve French out_buf_len = min_t(u32, KSMBD_IPC_MAX_PAYLOAD, out_buf_len); 760538c8a9a5SSteve French nbytes = fsctl_pipe_transceive(work, id, out_buf_len, req, rsp); 760638c8a9a5SSteve French break; 760738c8a9a5SSteve French case FSCTL_VALIDATE_NEGOTIATE_INFO: 760838c8a9a5SSteve French if (conn->dialect < SMB30_PROT_ID) { 760938c8a9a5SSteve French ret = -EOPNOTSUPP; 761038c8a9a5SSteve French goto out; 761138c8a9a5SSteve French } 761238c8a9a5SSteve French 761338c8a9a5SSteve French if (in_buf_len < offsetof(struct validate_negotiate_info_req, 761438c8a9a5SSteve French Dialects)) { 761538c8a9a5SSteve French ret = -EINVAL; 761638c8a9a5SSteve French goto out; 761738c8a9a5SSteve French } 761838c8a9a5SSteve French 761938c8a9a5SSteve French if (out_buf_len < sizeof(struct validate_negotiate_info_rsp)) { 762038c8a9a5SSteve French ret = -EINVAL; 762138c8a9a5SSteve French goto out; 762238c8a9a5SSteve French } 762338c8a9a5SSteve French 762438c8a9a5SSteve French ret = fsctl_validate_negotiate_info(conn, 762538c8a9a5SSteve French (struct validate_negotiate_info_req *)&req->Buffer[0], 762638c8a9a5SSteve French (struct validate_negotiate_info_rsp *)&rsp->Buffer[0], 762738c8a9a5SSteve French in_buf_len); 762838c8a9a5SSteve French if (ret < 0) 762938c8a9a5SSteve French goto out; 763038c8a9a5SSteve French 763138c8a9a5SSteve French nbytes = sizeof(struct validate_negotiate_info_rsp); 763238c8a9a5SSteve French rsp->PersistentFileId = SMB2_NO_FID; 763338c8a9a5SSteve French rsp->VolatileFileId = SMB2_NO_FID; 763438c8a9a5SSteve French break; 763538c8a9a5SSteve French case FSCTL_QUERY_NETWORK_INTERFACE_INFO: 763638c8a9a5SSteve French ret = fsctl_query_iface_info_ioctl(conn, rsp, out_buf_len); 763738c8a9a5SSteve French if (ret < 0) 763838c8a9a5SSteve French goto out; 763938c8a9a5SSteve French nbytes = ret; 764038c8a9a5SSteve French break; 764138c8a9a5SSteve French case FSCTL_REQUEST_RESUME_KEY: 764238c8a9a5SSteve French if (out_buf_len < sizeof(struct resume_key_ioctl_rsp)) { 764338c8a9a5SSteve French ret = -EINVAL; 764438c8a9a5SSteve French goto out; 764538c8a9a5SSteve French } 764638c8a9a5SSteve French 764738c8a9a5SSteve French ret = fsctl_request_resume_key(work, req, 764838c8a9a5SSteve French (struct resume_key_ioctl_rsp *)&rsp->Buffer[0]); 764938c8a9a5SSteve French if (ret < 0) 765038c8a9a5SSteve French goto out; 765138c8a9a5SSteve French rsp->PersistentFileId = req->PersistentFileId; 765238c8a9a5SSteve French rsp->VolatileFileId = req->VolatileFileId; 765338c8a9a5SSteve French nbytes = sizeof(struct resume_key_ioctl_rsp); 765438c8a9a5SSteve French break; 765538c8a9a5SSteve French case FSCTL_COPYCHUNK: 765638c8a9a5SSteve French case FSCTL_COPYCHUNK_WRITE: 765738c8a9a5SSteve French if (!test_tree_conn_flag(work->tcon, KSMBD_TREE_CONN_FLAG_WRITABLE)) { 765838c8a9a5SSteve French ksmbd_debug(SMB, 765938c8a9a5SSteve French "User does not have write permission\n"); 766038c8a9a5SSteve French ret = -EACCES; 766138c8a9a5SSteve French goto out; 766238c8a9a5SSteve French } 766338c8a9a5SSteve French 766438c8a9a5SSteve French if (in_buf_len < sizeof(struct copychunk_ioctl_req)) { 766538c8a9a5SSteve French ret = -EINVAL; 766638c8a9a5SSteve French goto out; 766738c8a9a5SSteve French } 766838c8a9a5SSteve French 766938c8a9a5SSteve French if (out_buf_len < sizeof(struct copychunk_ioctl_rsp)) { 767038c8a9a5SSteve French ret = -EINVAL; 767138c8a9a5SSteve French goto out; 767238c8a9a5SSteve French } 767338c8a9a5SSteve French 767438c8a9a5SSteve French nbytes = sizeof(struct copychunk_ioctl_rsp); 767538c8a9a5SSteve French rsp->VolatileFileId = req->VolatileFileId; 767638c8a9a5SSteve French rsp->PersistentFileId = req->PersistentFileId; 767738c8a9a5SSteve French fsctl_copychunk(work, 767838c8a9a5SSteve French (struct copychunk_ioctl_req *)&req->Buffer[0], 767938c8a9a5SSteve French le32_to_cpu(req->CtlCode), 768038c8a9a5SSteve French le32_to_cpu(req->InputCount), 768138c8a9a5SSteve French req->VolatileFileId, 768238c8a9a5SSteve French req->PersistentFileId, 768338c8a9a5SSteve French rsp); 768438c8a9a5SSteve French break; 768538c8a9a5SSteve French case FSCTL_SET_SPARSE: 768638c8a9a5SSteve French if (in_buf_len < sizeof(struct file_sparse)) { 768738c8a9a5SSteve French ret = -EINVAL; 768838c8a9a5SSteve French goto out; 768938c8a9a5SSteve French } 769038c8a9a5SSteve French 769138c8a9a5SSteve French ret = fsctl_set_sparse(work, id, 769238c8a9a5SSteve French (struct file_sparse *)&req->Buffer[0]); 769338c8a9a5SSteve French if (ret < 0) 769438c8a9a5SSteve French goto out; 769538c8a9a5SSteve French break; 769638c8a9a5SSteve French case FSCTL_SET_ZERO_DATA: 769738c8a9a5SSteve French { 769838c8a9a5SSteve French struct file_zero_data_information *zero_data; 769938c8a9a5SSteve French struct ksmbd_file *fp; 770038c8a9a5SSteve French loff_t off, len, bfz; 770138c8a9a5SSteve French 770238c8a9a5SSteve French if (!test_tree_conn_flag(work->tcon, KSMBD_TREE_CONN_FLAG_WRITABLE)) { 770338c8a9a5SSteve French ksmbd_debug(SMB, 770438c8a9a5SSteve French "User does not have write permission\n"); 770538c8a9a5SSteve French ret = -EACCES; 770638c8a9a5SSteve French goto out; 770738c8a9a5SSteve French } 770838c8a9a5SSteve French 770938c8a9a5SSteve French if (in_buf_len < sizeof(struct file_zero_data_information)) { 771038c8a9a5SSteve French ret = -EINVAL; 771138c8a9a5SSteve French goto out; 771238c8a9a5SSteve French } 771338c8a9a5SSteve French 771438c8a9a5SSteve French zero_data = 771538c8a9a5SSteve French (struct file_zero_data_information *)&req->Buffer[0]; 771638c8a9a5SSteve French 771738c8a9a5SSteve French off = le64_to_cpu(zero_data->FileOffset); 771838c8a9a5SSteve French bfz = le64_to_cpu(zero_data->BeyondFinalZero); 771938c8a9a5SSteve French if (off < 0 || bfz < 0 || off > bfz) { 772038c8a9a5SSteve French ret = -EINVAL; 772138c8a9a5SSteve French goto out; 772238c8a9a5SSteve French } 772338c8a9a5SSteve French 772438c8a9a5SSteve French len = bfz - off; 772538c8a9a5SSteve French if (len) { 772638c8a9a5SSteve French fp = ksmbd_lookup_fd_fast(work, id); 772738c8a9a5SSteve French if (!fp) { 772838c8a9a5SSteve French ret = -ENOENT; 772938c8a9a5SSteve French goto out; 773038c8a9a5SSteve French } 773138c8a9a5SSteve French 773238c8a9a5SSteve French ret = ksmbd_vfs_zero_data(work, fp, off, len); 773338c8a9a5SSteve French ksmbd_fd_put(work, fp); 773438c8a9a5SSteve French if (ret < 0) 773538c8a9a5SSteve French goto out; 773638c8a9a5SSteve French } 773738c8a9a5SSteve French break; 773838c8a9a5SSteve French } 773938c8a9a5SSteve French case FSCTL_QUERY_ALLOCATED_RANGES: 774038c8a9a5SSteve French if (in_buf_len < sizeof(struct file_allocated_range_buffer)) { 774138c8a9a5SSteve French ret = -EINVAL; 774238c8a9a5SSteve French goto out; 774338c8a9a5SSteve French } 774438c8a9a5SSteve French 774538c8a9a5SSteve French ret = fsctl_query_allocated_ranges(work, id, 774638c8a9a5SSteve French (struct file_allocated_range_buffer *)&req->Buffer[0], 774738c8a9a5SSteve French (struct file_allocated_range_buffer *)&rsp->Buffer[0], 774838c8a9a5SSteve French out_buf_len / 774938c8a9a5SSteve French sizeof(struct file_allocated_range_buffer), &nbytes); 775038c8a9a5SSteve French if (ret == -E2BIG) { 775138c8a9a5SSteve French rsp->hdr.Status = STATUS_BUFFER_OVERFLOW; 775238c8a9a5SSteve French } else if (ret < 0) { 775338c8a9a5SSteve French nbytes = 0; 775438c8a9a5SSteve French goto out; 775538c8a9a5SSteve French } 775638c8a9a5SSteve French 775738c8a9a5SSteve French nbytes *= sizeof(struct file_allocated_range_buffer); 775838c8a9a5SSteve French break; 775938c8a9a5SSteve French case FSCTL_GET_REPARSE_POINT: 776038c8a9a5SSteve French { 776138c8a9a5SSteve French struct reparse_data_buffer *reparse_ptr; 776238c8a9a5SSteve French struct ksmbd_file *fp; 776338c8a9a5SSteve French 776438c8a9a5SSteve French reparse_ptr = (struct reparse_data_buffer *)&rsp->Buffer[0]; 776538c8a9a5SSteve French fp = ksmbd_lookup_fd_fast(work, id); 776638c8a9a5SSteve French if (!fp) { 776738c8a9a5SSteve French pr_err("not found fp!!\n"); 776838c8a9a5SSteve French ret = -ENOENT; 776938c8a9a5SSteve French goto out; 777038c8a9a5SSteve French } 777138c8a9a5SSteve French 777238c8a9a5SSteve French reparse_ptr->ReparseTag = 777338c8a9a5SSteve French smb2_get_reparse_tag_special_file(file_inode(fp->filp)->i_mode); 777438c8a9a5SSteve French reparse_ptr->ReparseDataLength = 0; 777538c8a9a5SSteve French ksmbd_fd_put(work, fp); 777638c8a9a5SSteve French nbytes = sizeof(struct reparse_data_buffer); 777738c8a9a5SSteve French break; 777838c8a9a5SSteve French } 777938c8a9a5SSteve French case FSCTL_DUPLICATE_EXTENTS_TO_FILE: 778038c8a9a5SSteve French { 778138c8a9a5SSteve French struct ksmbd_file *fp_in, *fp_out = NULL; 778238c8a9a5SSteve French struct duplicate_extents_to_file *dup_ext; 778338c8a9a5SSteve French loff_t src_off, dst_off, length, cloned; 778438c8a9a5SSteve French 778538c8a9a5SSteve French if (in_buf_len < sizeof(struct duplicate_extents_to_file)) { 778638c8a9a5SSteve French ret = -EINVAL; 778738c8a9a5SSteve French goto out; 778838c8a9a5SSteve French } 778938c8a9a5SSteve French 779038c8a9a5SSteve French dup_ext = (struct duplicate_extents_to_file *)&req->Buffer[0]; 779138c8a9a5SSteve French 779238c8a9a5SSteve French fp_in = ksmbd_lookup_fd_slow(work, dup_ext->VolatileFileHandle, 779338c8a9a5SSteve French dup_ext->PersistentFileHandle); 779438c8a9a5SSteve French if (!fp_in) { 779538c8a9a5SSteve French pr_err("not found file handle in duplicate extent to file\n"); 779638c8a9a5SSteve French ret = -ENOENT; 779738c8a9a5SSteve French goto out; 779838c8a9a5SSteve French } 779938c8a9a5SSteve French 780038c8a9a5SSteve French fp_out = ksmbd_lookup_fd_fast(work, id); 780138c8a9a5SSteve French if (!fp_out) { 780238c8a9a5SSteve French pr_err("not found fp\n"); 780338c8a9a5SSteve French ret = -ENOENT; 780438c8a9a5SSteve French goto dup_ext_out; 780538c8a9a5SSteve French } 780638c8a9a5SSteve French 780738c8a9a5SSteve French src_off = le64_to_cpu(dup_ext->SourceFileOffset); 780838c8a9a5SSteve French dst_off = le64_to_cpu(dup_ext->TargetFileOffset); 780938c8a9a5SSteve French length = le64_to_cpu(dup_ext->ByteCount); 781038c8a9a5SSteve French /* 781138c8a9a5SSteve French * XXX: It is not clear if FSCTL_DUPLICATE_EXTENTS_TO_FILE 781238c8a9a5SSteve French * should fall back to vfs_copy_file_range(). This could be 781338c8a9a5SSteve French * beneficial when re-exporting nfs/smb mount, but note that 781438c8a9a5SSteve French * this can result in partial copy that returns an error status. 781538c8a9a5SSteve French * If/when FSCTL_DUPLICATE_EXTENTS_TO_FILE_EX is implemented, 781638c8a9a5SSteve French * fall back to vfs_copy_file_range(), should be avoided when 781738c8a9a5SSteve French * the flag DUPLICATE_EXTENTS_DATA_EX_SOURCE_ATOMIC is set. 781838c8a9a5SSteve French */ 781938c8a9a5SSteve French cloned = vfs_clone_file_range(fp_in->filp, src_off, 782038c8a9a5SSteve French fp_out->filp, dst_off, length, 0); 782138c8a9a5SSteve French if (cloned == -EXDEV || cloned == -EOPNOTSUPP) { 782238c8a9a5SSteve French ret = -EOPNOTSUPP; 782338c8a9a5SSteve French goto dup_ext_out; 782438c8a9a5SSteve French } else if (cloned != length) { 782538c8a9a5SSteve French cloned = vfs_copy_file_range(fp_in->filp, src_off, 782638c8a9a5SSteve French fp_out->filp, dst_off, 782738c8a9a5SSteve French length, 0); 782838c8a9a5SSteve French if (cloned != length) { 782938c8a9a5SSteve French if (cloned < 0) 783038c8a9a5SSteve French ret = cloned; 783138c8a9a5SSteve French else 783238c8a9a5SSteve French ret = -EINVAL; 783338c8a9a5SSteve French } 783438c8a9a5SSteve French } 783538c8a9a5SSteve French 783638c8a9a5SSteve French dup_ext_out: 783738c8a9a5SSteve French ksmbd_fd_put(work, fp_in); 783838c8a9a5SSteve French ksmbd_fd_put(work, fp_out); 783938c8a9a5SSteve French if (ret < 0) 784038c8a9a5SSteve French goto out; 784138c8a9a5SSteve French break; 784238c8a9a5SSteve French } 784338c8a9a5SSteve French default: 784438c8a9a5SSteve French ksmbd_debug(SMB, "not implemented yet ioctl command 0x%x\n", 784538c8a9a5SSteve French cnt_code); 784638c8a9a5SSteve French ret = -EOPNOTSUPP; 784738c8a9a5SSteve French goto out; 784838c8a9a5SSteve French } 784938c8a9a5SSteve French 785038c8a9a5SSteve French rsp->CtlCode = cpu_to_le32(cnt_code); 785138c8a9a5SSteve French rsp->InputCount = cpu_to_le32(0); 785238c8a9a5SSteve French rsp->InputOffset = cpu_to_le32(112); 785338c8a9a5SSteve French rsp->OutputOffset = cpu_to_le32(112); 785438c8a9a5SSteve French rsp->OutputCount = cpu_to_le32(nbytes); 785538c8a9a5SSteve French rsp->StructureSize = cpu_to_le16(49); 785638c8a9a5SSteve French rsp->Reserved = cpu_to_le16(0); 785738c8a9a5SSteve French rsp->Flags = cpu_to_le32(0); 785838c8a9a5SSteve French rsp->Reserved2 = cpu_to_le32(0); 785938c8a9a5SSteve French inc_rfc1001_len(work->response_buf, 48 + nbytes); 786038c8a9a5SSteve French 786138c8a9a5SSteve French return 0; 786238c8a9a5SSteve French 786338c8a9a5SSteve French out: 786438c8a9a5SSteve French if (ret == -EACCES) 786538c8a9a5SSteve French rsp->hdr.Status = STATUS_ACCESS_DENIED; 786638c8a9a5SSteve French else if (ret == -ENOENT) 786738c8a9a5SSteve French rsp->hdr.Status = STATUS_OBJECT_NAME_NOT_FOUND; 786838c8a9a5SSteve French else if (ret == -EOPNOTSUPP) 786938c8a9a5SSteve French rsp->hdr.Status = STATUS_NOT_SUPPORTED; 787038c8a9a5SSteve French else if (ret == -ENOSPC) 787138c8a9a5SSteve French rsp->hdr.Status = STATUS_BUFFER_TOO_SMALL; 787238c8a9a5SSteve French else if (ret < 0 || rsp->hdr.Status == 0) 787338c8a9a5SSteve French rsp->hdr.Status = STATUS_INVALID_PARAMETER; 787438c8a9a5SSteve French smb2_set_err_rsp(work); 787538c8a9a5SSteve French return 0; 787638c8a9a5SSteve French } 787738c8a9a5SSteve French 787838c8a9a5SSteve French /** 787938c8a9a5SSteve French * smb20_oplock_break_ack() - handler for smb2.0 oplock break command 788038c8a9a5SSteve French * @work: smb work containing oplock break command buffer 788138c8a9a5SSteve French * 788238c8a9a5SSteve French * Return: 0 788338c8a9a5SSteve French */ 788438c8a9a5SSteve French static void smb20_oplock_break_ack(struct ksmbd_work *work) 788538c8a9a5SSteve French { 788638c8a9a5SSteve French struct smb2_oplock_break *req = smb2_get_msg(work->request_buf); 788738c8a9a5SSteve French struct smb2_oplock_break *rsp = smb2_get_msg(work->response_buf); 788838c8a9a5SSteve French struct ksmbd_file *fp; 788938c8a9a5SSteve French struct oplock_info *opinfo = NULL; 789038c8a9a5SSteve French __le32 err = 0; 789138c8a9a5SSteve French int ret = 0; 789238c8a9a5SSteve French u64 volatile_id, persistent_id; 789338c8a9a5SSteve French char req_oplevel = 0, rsp_oplevel = 0; 789438c8a9a5SSteve French unsigned int oplock_change_type; 789538c8a9a5SSteve French 789638c8a9a5SSteve French volatile_id = req->VolatileFid; 789738c8a9a5SSteve French persistent_id = req->PersistentFid; 789838c8a9a5SSteve French req_oplevel = req->OplockLevel; 789938c8a9a5SSteve French ksmbd_debug(OPLOCK, "v_id %llu, p_id %llu request oplock level %d\n", 790038c8a9a5SSteve French volatile_id, persistent_id, req_oplevel); 790138c8a9a5SSteve French 790238c8a9a5SSteve French fp = ksmbd_lookup_fd_slow(work, volatile_id, persistent_id); 790338c8a9a5SSteve French if (!fp) { 790438c8a9a5SSteve French rsp->hdr.Status = STATUS_FILE_CLOSED; 790538c8a9a5SSteve French smb2_set_err_rsp(work); 790638c8a9a5SSteve French return; 790738c8a9a5SSteve French } 790838c8a9a5SSteve French 790938c8a9a5SSteve French opinfo = opinfo_get(fp); 791038c8a9a5SSteve French if (!opinfo) { 791138c8a9a5SSteve French pr_err("unexpected null oplock_info\n"); 791238c8a9a5SSteve French rsp->hdr.Status = STATUS_INVALID_OPLOCK_PROTOCOL; 791338c8a9a5SSteve French smb2_set_err_rsp(work); 791438c8a9a5SSteve French ksmbd_fd_put(work, fp); 791538c8a9a5SSteve French return; 791638c8a9a5SSteve French } 791738c8a9a5SSteve French 791838c8a9a5SSteve French if (opinfo->level == SMB2_OPLOCK_LEVEL_NONE) { 791938c8a9a5SSteve French rsp->hdr.Status = STATUS_INVALID_OPLOCK_PROTOCOL; 792038c8a9a5SSteve French goto err_out; 792138c8a9a5SSteve French } 792238c8a9a5SSteve French 792338c8a9a5SSteve French if (opinfo->op_state == OPLOCK_STATE_NONE) { 792438c8a9a5SSteve French ksmbd_debug(SMB, "unexpected oplock state 0x%x\n", opinfo->op_state); 792538c8a9a5SSteve French rsp->hdr.Status = STATUS_UNSUCCESSFUL; 792638c8a9a5SSteve French goto err_out; 792738c8a9a5SSteve French } 792838c8a9a5SSteve French 792938c8a9a5SSteve French if ((opinfo->level == SMB2_OPLOCK_LEVEL_EXCLUSIVE || 793038c8a9a5SSteve French opinfo->level == SMB2_OPLOCK_LEVEL_BATCH) && 793138c8a9a5SSteve French (req_oplevel != SMB2_OPLOCK_LEVEL_II && 793238c8a9a5SSteve French req_oplevel != SMB2_OPLOCK_LEVEL_NONE)) { 793338c8a9a5SSteve French err = STATUS_INVALID_OPLOCK_PROTOCOL; 793438c8a9a5SSteve French oplock_change_type = OPLOCK_WRITE_TO_NONE; 793538c8a9a5SSteve French } else if (opinfo->level == SMB2_OPLOCK_LEVEL_II && 793638c8a9a5SSteve French req_oplevel != SMB2_OPLOCK_LEVEL_NONE) { 793738c8a9a5SSteve French err = STATUS_INVALID_OPLOCK_PROTOCOL; 793838c8a9a5SSteve French oplock_change_type = OPLOCK_READ_TO_NONE; 793938c8a9a5SSteve French } else if (req_oplevel == SMB2_OPLOCK_LEVEL_II || 794038c8a9a5SSteve French req_oplevel == SMB2_OPLOCK_LEVEL_NONE) { 794138c8a9a5SSteve French err = STATUS_INVALID_DEVICE_STATE; 794238c8a9a5SSteve French if ((opinfo->level == SMB2_OPLOCK_LEVEL_EXCLUSIVE || 794338c8a9a5SSteve French opinfo->level == SMB2_OPLOCK_LEVEL_BATCH) && 794438c8a9a5SSteve French req_oplevel == SMB2_OPLOCK_LEVEL_II) { 794538c8a9a5SSteve French oplock_change_type = OPLOCK_WRITE_TO_READ; 794638c8a9a5SSteve French } else if ((opinfo->level == SMB2_OPLOCK_LEVEL_EXCLUSIVE || 794738c8a9a5SSteve French opinfo->level == SMB2_OPLOCK_LEVEL_BATCH) && 794838c8a9a5SSteve French req_oplevel == SMB2_OPLOCK_LEVEL_NONE) { 794938c8a9a5SSteve French oplock_change_type = OPLOCK_WRITE_TO_NONE; 795038c8a9a5SSteve French } else if (opinfo->level == SMB2_OPLOCK_LEVEL_II && 795138c8a9a5SSteve French req_oplevel == SMB2_OPLOCK_LEVEL_NONE) { 795238c8a9a5SSteve French oplock_change_type = OPLOCK_READ_TO_NONE; 795338c8a9a5SSteve French } else { 795438c8a9a5SSteve French oplock_change_type = 0; 795538c8a9a5SSteve French } 795638c8a9a5SSteve French } else { 795738c8a9a5SSteve French oplock_change_type = 0; 795838c8a9a5SSteve French } 795938c8a9a5SSteve French 796038c8a9a5SSteve French switch (oplock_change_type) { 796138c8a9a5SSteve French case OPLOCK_WRITE_TO_READ: 796238c8a9a5SSteve French ret = opinfo_write_to_read(opinfo); 796338c8a9a5SSteve French rsp_oplevel = SMB2_OPLOCK_LEVEL_II; 796438c8a9a5SSteve French break; 796538c8a9a5SSteve French case OPLOCK_WRITE_TO_NONE: 796638c8a9a5SSteve French ret = opinfo_write_to_none(opinfo); 796738c8a9a5SSteve French rsp_oplevel = SMB2_OPLOCK_LEVEL_NONE; 796838c8a9a5SSteve French break; 796938c8a9a5SSteve French case OPLOCK_READ_TO_NONE: 797038c8a9a5SSteve French ret = opinfo_read_to_none(opinfo); 797138c8a9a5SSteve French rsp_oplevel = SMB2_OPLOCK_LEVEL_NONE; 797238c8a9a5SSteve French break; 797338c8a9a5SSteve French default: 797438c8a9a5SSteve French pr_err("unknown oplock change 0x%x -> 0x%x\n", 797538c8a9a5SSteve French opinfo->level, rsp_oplevel); 797638c8a9a5SSteve French } 797738c8a9a5SSteve French 797838c8a9a5SSteve French if (ret < 0) { 797938c8a9a5SSteve French rsp->hdr.Status = err; 798038c8a9a5SSteve French goto err_out; 798138c8a9a5SSteve French } 798238c8a9a5SSteve French 798338c8a9a5SSteve French opinfo_put(opinfo); 798438c8a9a5SSteve French ksmbd_fd_put(work, fp); 798538c8a9a5SSteve French opinfo->op_state = OPLOCK_STATE_NONE; 798638c8a9a5SSteve French wake_up_interruptible_all(&opinfo->oplock_q); 798738c8a9a5SSteve French 798838c8a9a5SSteve French rsp->StructureSize = cpu_to_le16(24); 798938c8a9a5SSteve French rsp->OplockLevel = rsp_oplevel; 799038c8a9a5SSteve French rsp->Reserved = 0; 799138c8a9a5SSteve French rsp->Reserved2 = 0; 799238c8a9a5SSteve French rsp->VolatileFid = volatile_id; 799338c8a9a5SSteve French rsp->PersistentFid = persistent_id; 799438c8a9a5SSteve French inc_rfc1001_len(work->response_buf, 24); 799538c8a9a5SSteve French return; 799638c8a9a5SSteve French 799738c8a9a5SSteve French err_out: 799838c8a9a5SSteve French opinfo->op_state = OPLOCK_STATE_NONE; 799938c8a9a5SSteve French wake_up_interruptible_all(&opinfo->oplock_q); 800038c8a9a5SSteve French 800138c8a9a5SSteve French opinfo_put(opinfo); 800238c8a9a5SSteve French ksmbd_fd_put(work, fp); 800338c8a9a5SSteve French smb2_set_err_rsp(work); 800438c8a9a5SSteve French } 800538c8a9a5SSteve French 800638c8a9a5SSteve French static int check_lease_state(struct lease *lease, __le32 req_state) 800738c8a9a5SSteve French { 800838c8a9a5SSteve French if ((lease->new_state == 800938c8a9a5SSteve French (SMB2_LEASE_READ_CACHING_LE | SMB2_LEASE_HANDLE_CACHING_LE)) && 801038c8a9a5SSteve French !(req_state & SMB2_LEASE_WRITE_CACHING_LE)) { 801138c8a9a5SSteve French lease->new_state = req_state; 801238c8a9a5SSteve French return 0; 801338c8a9a5SSteve French } 801438c8a9a5SSteve French 801538c8a9a5SSteve French if (lease->new_state == req_state) 801638c8a9a5SSteve French return 0; 801738c8a9a5SSteve French 801838c8a9a5SSteve French return 1; 801938c8a9a5SSteve French } 802038c8a9a5SSteve French 802138c8a9a5SSteve French /** 802238c8a9a5SSteve French * smb21_lease_break_ack() - handler for smb2.1 lease break command 802338c8a9a5SSteve French * @work: smb work containing lease break command buffer 802438c8a9a5SSteve French * 802538c8a9a5SSteve French * Return: 0 802638c8a9a5SSteve French */ 802738c8a9a5SSteve French static void smb21_lease_break_ack(struct ksmbd_work *work) 802838c8a9a5SSteve French { 802938c8a9a5SSteve French struct ksmbd_conn *conn = work->conn; 803038c8a9a5SSteve French struct smb2_lease_ack *req = smb2_get_msg(work->request_buf); 803138c8a9a5SSteve French struct smb2_lease_ack *rsp = smb2_get_msg(work->response_buf); 803238c8a9a5SSteve French struct oplock_info *opinfo; 803338c8a9a5SSteve French __le32 err = 0; 803438c8a9a5SSteve French int ret = 0; 803538c8a9a5SSteve French unsigned int lease_change_type; 803638c8a9a5SSteve French __le32 lease_state; 803738c8a9a5SSteve French struct lease *lease; 803838c8a9a5SSteve French 803938c8a9a5SSteve French ksmbd_debug(OPLOCK, "smb21 lease break, lease state(0x%x)\n", 804038c8a9a5SSteve French le32_to_cpu(req->LeaseState)); 804138c8a9a5SSteve French opinfo = lookup_lease_in_table(conn, req->LeaseKey); 804238c8a9a5SSteve French if (!opinfo) { 804338c8a9a5SSteve French ksmbd_debug(OPLOCK, "file not opened\n"); 804438c8a9a5SSteve French smb2_set_err_rsp(work); 804538c8a9a5SSteve French rsp->hdr.Status = STATUS_UNSUCCESSFUL; 804638c8a9a5SSteve French return; 804738c8a9a5SSteve French } 804838c8a9a5SSteve French lease = opinfo->o_lease; 804938c8a9a5SSteve French 805038c8a9a5SSteve French if (opinfo->op_state == OPLOCK_STATE_NONE) { 805138c8a9a5SSteve French pr_err("unexpected lease break state 0x%x\n", 805238c8a9a5SSteve French opinfo->op_state); 805338c8a9a5SSteve French rsp->hdr.Status = STATUS_UNSUCCESSFUL; 805438c8a9a5SSteve French goto err_out; 805538c8a9a5SSteve French } 805638c8a9a5SSteve French 805738c8a9a5SSteve French if (check_lease_state(lease, req->LeaseState)) { 805838c8a9a5SSteve French rsp->hdr.Status = STATUS_REQUEST_NOT_ACCEPTED; 805938c8a9a5SSteve French ksmbd_debug(OPLOCK, 806038c8a9a5SSteve French "req lease state: 0x%x, expected state: 0x%x\n", 806138c8a9a5SSteve French req->LeaseState, lease->new_state); 806238c8a9a5SSteve French goto err_out; 806338c8a9a5SSteve French } 806438c8a9a5SSteve French 806538c8a9a5SSteve French if (!atomic_read(&opinfo->breaking_cnt)) { 806638c8a9a5SSteve French rsp->hdr.Status = STATUS_UNSUCCESSFUL; 806738c8a9a5SSteve French goto err_out; 806838c8a9a5SSteve French } 806938c8a9a5SSteve French 807038c8a9a5SSteve French /* check for bad lease state */ 807138c8a9a5SSteve French if (req->LeaseState & 807238c8a9a5SSteve French (~(SMB2_LEASE_READ_CACHING_LE | SMB2_LEASE_HANDLE_CACHING_LE))) { 807338c8a9a5SSteve French err = STATUS_INVALID_OPLOCK_PROTOCOL; 807438c8a9a5SSteve French if (lease->state & SMB2_LEASE_WRITE_CACHING_LE) 807538c8a9a5SSteve French lease_change_type = OPLOCK_WRITE_TO_NONE; 807638c8a9a5SSteve French else 807738c8a9a5SSteve French lease_change_type = OPLOCK_READ_TO_NONE; 807838c8a9a5SSteve French ksmbd_debug(OPLOCK, "handle bad lease state 0x%x -> 0x%x\n", 807938c8a9a5SSteve French le32_to_cpu(lease->state), 808038c8a9a5SSteve French le32_to_cpu(req->LeaseState)); 808138c8a9a5SSteve French } else if (lease->state == SMB2_LEASE_READ_CACHING_LE && 808238c8a9a5SSteve French req->LeaseState != SMB2_LEASE_NONE_LE) { 808338c8a9a5SSteve French err = STATUS_INVALID_OPLOCK_PROTOCOL; 808438c8a9a5SSteve French lease_change_type = OPLOCK_READ_TO_NONE; 808538c8a9a5SSteve French ksmbd_debug(OPLOCK, "handle bad lease state 0x%x -> 0x%x\n", 808638c8a9a5SSteve French le32_to_cpu(lease->state), 808738c8a9a5SSteve French le32_to_cpu(req->LeaseState)); 808838c8a9a5SSteve French } else { 808938c8a9a5SSteve French /* valid lease state changes */ 809038c8a9a5SSteve French err = STATUS_INVALID_DEVICE_STATE; 809138c8a9a5SSteve French if (req->LeaseState == SMB2_LEASE_NONE_LE) { 809238c8a9a5SSteve French if (lease->state & SMB2_LEASE_WRITE_CACHING_LE) 809338c8a9a5SSteve French lease_change_type = OPLOCK_WRITE_TO_NONE; 809438c8a9a5SSteve French else 809538c8a9a5SSteve French lease_change_type = OPLOCK_READ_TO_NONE; 809638c8a9a5SSteve French } else if (req->LeaseState & SMB2_LEASE_READ_CACHING_LE) { 809738c8a9a5SSteve French if (lease->state & SMB2_LEASE_WRITE_CACHING_LE) 809838c8a9a5SSteve French lease_change_type = OPLOCK_WRITE_TO_READ; 809938c8a9a5SSteve French else 810038c8a9a5SSteve French lease_change_type = OPLOCK_READ_HANDLE_TO_READ; 810138c8a9a5SSteve French } else { 810238c8a9a5SSteve French lease_change_type = 0; 810338c8a9a5SSteve French } 810438c8a9a5SSteve French } 810538c8a9a5SSteve French 810638c8a9a5SSteve French switch (lease_change_type) { 810738c8a9a5SSteve French case OPLOCK_WRITE_TO_READ: 810838c8a9a5SSteve French ret = opinfo_write_to_read(opinfo); 810938c8a9a5SSteve French break; 811038c8a9a5SSteve French case OPLOCK_READ_HANDLE_TO_READ: 811138c8a9a5SSteve French ret = opinfo_read_handle_to_read(opinfo); 811238c8a9a5SSteve French break; 811338c8a9a5SSteve French case OPLOCK_WRITE_TO_NONE: 811438c8a9a5SSteve French ret = opinfo_write_to_none(opinfo); 811538c8a9a5SSteve French break; 811638c8a9a5SSteve French case OPLOCK_READ_TO_NONE: 811738c8a9a5SSteve French ret = opinfo_read_to_none(opinfo); 811838c8a9a5SSteve French break; 811938c8a9a5SSteve French default: 812038c8a9a5SSteve French ksmbd_debug(OPLOCK, "unknown lease change 0x%x -> 0x%x\n", 812138c8a9a5SSteve French le32_to_cpu(lease->state), 812238c8a9a5SSteve French le32_to_cpu(req->LeaseState)); 812338c8a9a5SSteve French } 812438c8a9a5SSteve French 812538c8a9a5SSteve French lease_state = lease->state; 812638c8a9a5SSteve French opinfo->op_state = OPLOCK_STATE_NONE; 812738c8a9a5SSteve French wake_up_interruptible_all(&opinfo->oplock_q); 812838c8a9a5SSteve French atomic_dec(&opinfo->breaking_cnt); 812938c8a9a5SSteve French wake_up_interruptible_all(&opinfo->oplock_brk); 813038c8a9a5SSteve French opinfo_put(opinfo); 813138c8a9a5SSteve French 813238c8a9a5SSteve French if (ret < 0) { 813338c8a9a5SSteve French rsp->hdr.Status = err; 813438c8a9a5SSteve French goto err_out; 813538c8a9a5SSteve French } 813638c8a9a5SSteve French 813738c8a9a5SSteve French rsp->StructureSize = cpu_to_le16(36); 813838c8a9a5SSteve French rsp->Reserved = 0; 813938c8a9a5SSteve French rsp->Flags = 0; 814038c8a9a5SSteve French memcpy(rsp->LeaseKey, req->LeaseKey, 16); 814138c8a9a5SSteve French rsp->LeaseState = lease_state; 814238c8a9a5SSteve French rsp->LeaseDuration = 0; 814338c8a9a5SSteve French inc_rfc1001_len(work->response_buf, 36); 814438c8a9a5SSteve French return; 814538c8a9a5SSteve French 814638c8a9a5SSteve French err_out: 814738c8a9a5SSteve French opinfo->op_state = OPLOCK_STATE_NONE; 814838c8a9a5SSteve French wake_up_interruptible_all(&opinfo->oplock_q); 814938c8a9a5SSteve French atomic_dec(&opinfo->breaking_cnt); 815038c8a9a5SSteve French wake_up_interruptible_all(&opinfo->oplock_brk); 815138c8a9a5SSteve French 815238c8a9a5SSteve French opinfo_put(opinfo); 815338c8a9a5SSteve French smb2_set_err_rsp(work); 815438c8a9a5SSteve French } 815538c8a9a5SSteve French 815638c8a9a5SSteve French /** 815738c8a9a5SSteve French * smb2_oplock_break() - dispatcher for smb2.0 and 2.1 oplock/lease break 815838c8a9a5SSteve French * @work: smb work containing oplock/lease break command buffer 815938c8a9a5SSteve French * 816038c8a9a5SSteve French * Return: 0 816138c8a9a5SSteve French */ 816238c8a9a5SSteve French int smb2_oplock_break(struct ksmbd_work *work) 816338c8a9a5SSteve French { 816438c8a9a5SSteve French struct smb2_oplock_break *req = smb2_get_msg(work->request_buf); 816538c8a9a5SSteve French struct smb2_oplock_break *rsp = smb2_get_msg(work->response_buf); 816638c8a9a5SSteve French 816738c8a9a5SSteve French switch (le16_to_cpu(req->StructureSize)) { 816838c8a9a5SSteve French case OP_BREAK_STRUCT_SIZE_20: 816938c8a9a5SSteve French smb20_oplock_break_ack(work); 817038c8a9a5SSteve French break; 817138c8a9a5SSteve French case OP_BREAK_STRUCT_SIZE_21: 817238c8a9a5SSteve French smb21_lease_break_ack(work); 817338c8a9a5SSteve French break; 817438c8a9a5SSteve French default: 817538c8a9a5SSteve French ksmbd_debug(OPLOCK, "invalid break cmd %d\n", 817638c8a9a5SSteve French le16_to_cpu(req->StructureSize)); 817738c8a9a5SSteve French rsp->hdr.Status = STATUS_INVALID_PARAMETER; 817838c8a9a5SSteve French smb2_set_err_rsp(work); 817938c8a9a5SSteve French } 818038c8a9a5SSteve French 818138c8a9a5SSteve French return 0; 818238c8a9a5SSteve French } 818338c8a9a5SSteve French 818438c8a9a5SSteve French /** 818538c8a9a5SSteve French * smb2_notify() - handler for smb2 notify request 818638c8a9a5SSteve French * @work: smb work containing notify command buffer 818738c8a9a5SSteve French * 818838c8a9a5SSteve French * Return: 0 818938c8a9a5SSteve French */ 819038c8a9a5SSteve French int smb2_notify(struct ksmbd_work *work) 819138c8a9a5SSteve French { 819238c8a9a5SSteve French struct smb2_change_notify_req *req; 819338c8a9a5SSteve French struct smb2_change_notify_rsp *rsp; 819438c8a9a5SSteve French 819538c8a9a5SSteve French WORK_BUFFERS(work, req, rsp); 819638c8a9a5SSteve French 819738c8a9a5SSteve French if (work->next_smb2_rcv_hdr_off && req->hdr.NextCommand) { 819838c8a9a5SSteve French rsp->hdr.Status = STATUS_INTERNAL_ERROR; 819938c8a9a5SSteve French smb2_set_err_rsp(work); 820038c8a9a5SSteve French return 0; 820138c8a9a5SSteve French } 820238c8a9a5SSteve French 820338c8a9a5SSteve French smb2_set_err_rsp(work); 820438c8a9a5SSteve French rsp->hdr.Status = STATUS_NOT_IMPLEMENTED; 820538c8a9a5SSteve French return 0; 820638c8a9a5SSteve French } 820738c8a9a5SSteve French 820838c8a9a5SSteve French /** 820938c8a9a5SSteve French * smb2_is_sign_req() - handler for checking packet signing status 821038c8a9a5SSteve French * @work: smb work containing notify command buffer 821138c8a9a5SSteve French * @command: SMB2 command id 821238c8a9a5SSteve French * 821338c8a9a5SSteve French * Return: true if packed is signed, false otherwise 821438c8a9a5SSteve French */ 821538c8a9a5SSteve French bool smb2_is_sign_req(struct ksmbd_work *work, unsigned int command) 821638c8a9a5SSteve French { 821738c8a9a5SSteve French struct smb2_hdr *rcv_hdr2 = smb2_get_msg(work->request_buf); 821838c8a9a5SSteve French 821938c8a9a5SSteve French if ((rcv_hdr2->Flags & SMB2_FLAGS_SIGNED) && 822038c8a9a5SSteve French command != SMB2_NEGOTIATE_HE && 822138c8a9a5SSteve French command != SMB2_SESSION_SETUP_HE && 822238c8a9a5SSteve French command != SMB2_OPLOCK_BREAK_HE) 822338c8a9a5SSteve French return true; 822438c8a9a5SSteve French 822538c8a9a5SSteve French return false; 822638c8a9a5SSteve French } 822738c8a9a5SSteve French 822838c8a9a5SSteve French /** 822938c8a9a5SSteve French * smb2_check_sign_req() - handler for req packet sign processing 823038c8a9a5SSteve French * @work: smb work containing notify command buffer 823138c8a9a5SSteve French * 823238c8a9a5SSteve French * Return: 1 on success, 0 otherwise 823338c8a9a5SSteve French */ 823438c8a9a5SSteve French int smb2_check_sign_req(struct ksmbd_work *work) 823538c8a9a5SSteve French { 823638c8a9a5SSteve French struct smb2_hdr *hdr; 823738c8a9a5SSteve French char signature_req[SMB2_SIGNATURE_SIZE]; 823838c8a9a5SSteve French char signature[SMB2_HMACSHA256_SIZE]; 823938c8a9a5SSteve French struct kvec iov[1]; 824038c8a9a5SSteve French size_t len; 824138c8a9a5SSteve French 824238c8a9a5SSteve French hdr = smb2_get_msg(work->request_buf); 824338c8a9a5SSteve French if (work->next_smb2_rcv_hdr_off) 824438c8a9a5SSteve French hdr = ksmbd_req_buf_next(work); 824538c8a9a5SSteve French 824638c8a9a5SSteve French if (!hdr->NextCommand && !work->next_smb2_rcv_hdr_off) 824738c8a9a5SSteve French len = get_rfc1002_len(work->request_buf); 824838c8a9a5SSteve French else if (hdr->NextCommand) 824938c8a9a5SSteve French len = le32_to_cpu(hdr->NextCommand); 825038c8a9a5SSteve French else 825138c8a9a5SSteve French len = get_rfc1002_len(work->request_buf) - 825238c8a9a5SSteve French work->next_smb2_rcv_hdr_off; 825338c8a9a5SSteve French 825438c8a9a5SSteve French memcpy(signature_req, hdr->Signature, SMB2_SIGNATURE_SIZE); 825538c8a9a5SSteve French memset(hdr->Signature, 0, SMB2_SIGNATURE_SIZE); 825638c8a9a5SSteve French 825738c8a9a5SSteve French iov[0].iov_base = (char *)&hdr->ProtocolId; 825838c8a9a5SSteve French iov[0].iov_len = len; 825938c8a9a5SSteve French 826038c8a9a5SSteve French if (ksmbd_sign_smb2_pdu(work->conn, work->sess->sess_key, iov, 1, 826138c8a9a5SSteve French signature)) 826238c8a9a5SSteve French return 0; 826338c8a9a5SSteve French 826438c8a9a5SSteve French if (memcmp(signature, signature_req, SMB2_SIGNATURE_SIZE)) { 826538c8a9a5SSteve French pr_err("bad smb2 signature\n"); 826638c8a9a5SSteve French return 0; 826738c8a9a5SSteve French } 826838c8a9a5SSteve French 826938c8a9a5SSteve French return 1; 827038c8a9a5SSteve French } 827138c8a9a5SSteve French 827238c8a9a5SSteve French /** 827338c8a9a5SSteve French * smb2_set_sign_rsp() - handler for rsp packet sign processing 827438c8a9a5SSteve French * @work: smb work containing notify command buffer 827538c8a9a5SSteve French * 827638c8a9a5SSteve French */ 827738c8a9a5SSteve French void smb2_set_sign_rsp(struct ksmbd_work *work) 827838c8a9a5SSteve French { 827938c8a9a5SSteve French struct smb2_hdr *hdr; 828038c8a9a5SSteve French struct smb2_hdr *req_hdr; 828138c8a9a5SSteve French char signature[SMB2_HMACSHA256_SIZE]; 828238c8a9a5SSteve French struct kvec iov[2]; 828338c8a9a5SSteve French size_t len; 828438c8a9a5SSteve French int n_vec = 1; 828538c8a9a5SSteve French 828638c8a9a5SSteve French hdr = smb2_get_msg(work->response_buf); 828738c8a9a5SSteve French if (work->next_smb2_rsp_hdr_off) 828838c8a9a5SSteve French hdr = ksmbd_resp_buf_next(work); 828938c8a9a5SSteve French 829038c8a9a5SSteve French req_hdr = ksmbd_req_buf_next(work); 829138c8a9a5SSteve French 829238c8a9a5SSteve French if (!work->next_smb2_rsp_hdr_off) { 829338c8a9a5SSteve French len = get_rfc1002_len(work->response_buf); 829438c8a9a5SSteve French if (req_hdr->NextCommand) 829538c8a9a5SSteve French len = ALIGN(len, 8); 829638c8a9a5SSteve French } else { 829738c8a9a5SSteve French len = get_rfc1002_len(work->response_buf) - 829838c8a9a5SSteve French work->next_smb2_rsp_hdr_off; 829938c8a9a5SSteve French len = ALIGN(len, 8); 830038c8a9a5SSteve French } 830138c8a9a5SSteve French 830238c8a9a5SSteve French if (req_hdr->NextCommand) 830338c8a9a5SSteve French hdr->NextCommand = cpu_to_le32(len); 830438c8a9a5SSteve French 830538c8a9a5SSteve French hdr->Flags |= SMB2_FLAGS_SIGNED; 830638c8a9a5SSteve French memset(hdr->Signature, 0, SMB2_SIGNATURE_SIZE); 830738c8a9a5SSteve French 830838c8a9a5SSteve French iov[0].iov_base = (char *)&hdr->ProtocolId; 830938c8a9a5SSteve French iov[0].iov_len = len; 831038c8a9a5SSteve French 831138c8a9a5SSteve French if (work->aux_payload_sz) { 831238c8a9a5SSteve French iov[0].iov_len -= work->aux_payload_sz; 831338c8a9a5SSteve French 831438c8a9a5SSteve French iov[1].iov_base = work->aux_payload_buf; 831538c8a9a5SSteve French iov[1].iov_len = work->aux_payload_sz; 831638c8a9a5SSteve French n_vec++; 831738c8a9a5SSteve French } 831838c8a9a5SSteve French 831938c8a9a5SSteve French if (!ksmbd_sign_smb2_pdu(work->conn, work->sess->sess_key, iov, n_vec, 832038c8a9a5SSteve French signature)) 832138c8a9a5SSteve French memcpy(hdr->Signature, signature, SMB2_SIGNATURE_SIZE); 832238c8a9a5SSteve French } 832338c8a9a5SSteve French 832438c8a9a5SSteve French /** 832538c8a9a5SSteve French * smb3_check_sign_req() - handler for req packet sign processing 832638c8a9a5SSteve French * @work: smb work containing notify command buffer 832738c8a9a5SSteve French * 832838c8a9a5SSteve French * Return: 1 on success, 0 otherwise 832938c8a9a5SSteve French */ 833038c8a9a5SSteve French int smb3_check_sign_req(struct ksmbd_work *work) 833138c8a9a5SSteve French { 833238c8a9a5SSteve French struct ksmbd_conn *conn = work->conn; 833338c8a9a5SSteve French char *signing_key; 833438c8a9a5SSteve French struct smb2_hdr *hdr; 833538c8a9a5SSteve French struct channel *chann; 833638c8a9a5SSteve French char signature_req[SMB2_SIGNATURE_SIZE]; 833738c8a9a5SSteve French char signature[SMB2_CMACAES_SIZE]; 833838c8a9a5SSteve French struct kvec iov[1]; 833938c8a9a5SSteve French size_t len; 834038c8a9a5SSteve French 834138c8a9a5SSteve French hdr = smb2_get_msg(work->request_buf); 834238c8a9a5SSteve French if (work->next_smb2_rcv_hdr_off) 834338c8a9a5SSteve French hdr = ksmbd_req_buf_next(work); 834438c8a9a5SSteve French 834538c8a9a5SSteve French if (!hdr->NextCommand && !work->next_smb2_rcv_hdr_off) 834638c8a9a5SSteve French len = get_rfc1002_len(work->request_buf); 834738c8a9a5SSteve French else if (hdr->NextCommand) 834838c8a9a5SSteve French len = le32_to_cpu(hdr->NextCommand); 834938c8a9a5SSteve French else 835038c8a9a5SSteve French len = get_rfc1002_len(work->request_buf) - 835138c8a9a5SSteve French work->next_smb2_rcv_hdr_off; 835238c8a9a5SSteve French 835338c8a9a5SSteve French if (le16_to_cpu(hdr->Command) == SMB2_SESSION_SETUP_HE) { 835438c8a9a5SSteve French signing_key = work->sess->smb3signingkey; 835538c8a9a5SSteve French } else { 835638c8a9a5SSteve French chann = lookup_chann_list(work->sess, conn); 835738c8a9a5SSteve French if (!chann) { 835838c8a9a5SSteve French return 0; 835938c8a9a5SSteve French } 836038c8a9a5SSteve French signing_key = chann->smb3signingkey; 836138c8a9a5SSteve French } 836238c8a9a5SSteve French 836338c8a9a5SSteve French if (!signing_key) { 836438c8a9a5SSteve French pr_err("SMB3 signing key is not generated\n"); 836538c8a9a5SSteve French return 0; 836638c8a9a5SSteve French } 836738c8a9a5SSteve French 836838c8a9a5SSteve French memcpy(signature_req, hdr->Signature, SMB2_SIGNATURE_SIZE); 836938c8a9a5SSteve French memset(hdr->Signature, 0, SMB2_SIGNATURE_SIZE); 837038c8a9a5SSteve French iov[0].iov_base = (char *)&hdr->ProtocolId; 837138c8a9a5SSteve French iov[0].iov_len = len; 837238c8a9a5SSteve French 837338c8a9a5SSteve French if (ksmbd_sign_smb3_pdu(conn, signing_key, iov, 1, signature)) 837438c8a9a5SSteve French return 0; 837538c8a9a5SSteve French 837638c8a9a5SSteve French if (memcmp(signature, signature_req, SMB2_SIGNATURE_SIZE)) { 837738c8a9a5SSteve French pr_err("bad smb2 signature\n"); 837838c8a9a5SSteve French return 0; 837938c8a9a5SSteve French } 838038c8a9a5SSteve French 838138c8a9a5SSteve French return 1; 838238c8a9a5SSteve French } 838338c8a9a5SSteve French 838438c8a9a5SSteve French /** 838538c8a9a5SSteve French * smb3_set_sign_rsp() - handler for rsp packet sign processing 838638c8a9a5SSteve French * @work: smb work containing notify command buffer 838738c8a9a5SSteve French * 838838c8a9a5SSteve French */ 838938c8a9a5SSteve French void smb3_set_sign_rsp(struct ksmbd_work *work) 839038c8a9a5SSteve French { 839138c8a9a5SSteve French struct ksmbd_conn *conn = work->conn; 839238c8a9a5SSteve French struct smb2_hdr *req_hdr, *hdr; 839338c8a9a5SSteve French struct channel *chann; 839438c8a9a5SSteve French char signature[SMB2_CMACAES_SIZE]; 839538c8a9a5SSteve French struct kvec iov[2]; 839638c8a9a5SSteve French int n_vec = 1; 839738c8a9a5SSteve French size_t len; 839838c8a9a5SSteve French char *signing_key; 839938c8a9a5SSteve French 840038c8a9a5SSteve French hdr = smb2_get_msg(work->response_buf); 840138c8a9a5SSteve French if (work->next_smb2_rsp_hdr_off) 840238c8a9a5SSteve French hdr = ksmbd_resp_buf_next(work); 840338c8a9a5SSteve French 840438c8a9a5SSteve French req_hdr = ksmbd_req_buf_next(work); 840538c8a9a5SSteve French 840638c8a9a5SSteve French if (!work->next_smb2_rsp_hdr_off) { 840738c8a9a5SSteve French len = get_rfc1002_len(work->response_buf); 840838c8a9a5SSteve French if (req_hdr->NextCommand) 840938c8a9a5SSteve French len = ALIGN(len, 8); 841038c8a9a5SSteve French } else { 841138c8a9a5SSteve French len = get_rfc1002_len(work->response_buf) - 841238c8a9a5SSteve French work->next_smb2_rsp_hdr_off; 841338c8a9a5SSteve French len = ALIGN(len, 8); 841438c8a9a5SSteve French } 841538c8a9a5SSteve French 841638c8a9a5SSteve French if (conn->binding == false && 841738c8a9a5SSteve French le16_to_cpu(hdr->Command) == SMB2_SESSION_SETUP_HE) { 841838c8a9a5SSteve French signing_key = work->sess->smb3signingkey; 841938c8a9a5SSteve French } else { 842038c8a9a5SSteve French chann = lookup_chann_list(work->sess, work->conn); 842138c8a9a5SSteve French if (!chann) { 842238c8a9a5SSteve French return; 842338c8a9a5SSteve French } 842438c8a9a5SSteve French signing_key = chann->smb3signingkey; 842538c8a9a5SSteve French } 842638c8a9a5SSteve French 842738c8a9a5SSteve French if (!signing_key) 842838c8a9a5SSteve French return; 842938c8a9a5SSteve French 843038c8a9a5SSteve French if (req_hdr->NextCommand) 843138c8a9a5SSteve French hdr->NextCommand = cpu_to_le32(len); 843238c8a9a5SSteve French 843338c8a9a5SSteve French hdr->Flags |= SMB2_FLAGS_SIGNED; 843438c8a9a5SSteve French memset(hdr->Signature, 0, SMB2_SIGNATURE_SIZE); 843538c8a9a5SSteve French iov[0].iov_base = (char *)&hdr->ProtocolId; 843638c8a9a5SSteve French iov[0].iov_len = len; 843738c8a9a5SSteve French if (work->aux_payload_sz) { 843838c8a9a5SSteve French iov[0].iov_len -= work->aux_payload_sz; 843938c8a9a5SSteve French iov[1].iov_base = work->aux_payload_buf; 844038c8a9a5SSteve French iov[1].iov_len = work->aux_payload_sz; 844138c8a9a5SSteve French n_vec++; 844238c8a9a5SSteve French } 844338c8a9a5SSteve French 844438c8a9a5SSteve French if (!ksmbd_sign_smb3_pdu(conn, signing_key, iov, n_vec, signature)) 844538c8a9a5SSteve French memcpy(hdr->Signature, signature, SMB2_SIGNATURE_SIZE); 844638c8a9a5SSteve French } 844738c8a9a5SSteve French 844838c8a9a5SSteve French /** 844938c8a9a5SSteve French * smb3_preauth_hash_rsp() - handler for computing preauth hash on response 845038c8a9a5SSteve French * @work: smb work containing response buffer 845138c8a9a5SSteve French * 845238c8a9a5SSteve French */ 845338c8a9a5SSteve French void smb3_preauth_hash_rsp(struct ksmbd_work *work) 845438c8a9a5SSteve French { 845538c8a9a5SSteve French struct ksmbd_conn *conn = work->conn; 845638c8a9a5SSteve French struct ksmbd_session *sess = work->sess; 845738c8a9a5SSteve French struct smb2_hdr *req, *rsp; 845838c8a9a5SSteve French 845938c8a9a5SSteve French if (conn->dialect != SMB311_PROT_ID) 846038c8a9a5SSteve French return; 846138c8a9a5SSteve French 846238c8a9a5SSteve French WORK_BUFFERS(work, req, rsp); 846338c8a9a5SSteve French 846438c8a9a5SSteve French if (le16_to_cpu(req->Command) == SMB2_NEGOTIATE_HE && 846538c8a9a5SSteve French conn->preauth_info) 846638c8a9a5SSteve French ksmbd_gen_preauth_integrity_hash(conn, work->response_buf, 846738c8a9a5SSteve French conn->preauth_info->Preauth_HashValue); 846838c8a9a5SSteve French 846938c8a9a5SSteve French if (le16_to_cpu(rsp->Command) == SMB2_SESSION_SETUP_HE && sess) { 847038c8a9a5SSteve French __u8 *hash_value; 847138c8a9a5SSteve French 847238c8a9a5SSteve French if (conn->binding) { 847338c8a9a5SSteve French struct preauth_session *preauth_sess; 847438c8a9a5SSteve French 847538c8a9a5SSteve French preauth_sess = ksmbd_preauth_session_lookup(conn, sess->id); 847638c8a9a5SSteve French if (!preauth_sess) 847738c8a9a5SSteve French return; 847838c8a9a5SSteve French hash_value = preauth_sess->Preauth_HashValue; 847938c8a9a5SSteve French } else { 848038c8a9a5SSteve French hash_value = sess->Preauth_HashValue; 848138c8a9a5SSteve French if (!hash_value) 848238c8a9a5SSteve French return; 848338c8a9a5SSteve French } 848438c8a9a5SSteve French ksmbd_gen_preauth_integrity_hash(conn, work->response_buf, 848538c8a9a5SSteve French hash_value); 848638c8a9a5SSteve French } 848738c8a9a5SSteve French } 848838c8a9a5SSteve French 848938c8a9a5SSteve French static void fill_transform_hdr(void *tr_buf, char *old_buf, __le16 cipher_type) 849038c8a9a5SSteve French { 849138c8a9a5SSteve French struct smb2_transform_hdr *tr_hdr = tr_buf + 4; 849238c8a9a5SSteve French struct smb2_hdr *hdr = smb2_get_msg(old_buf); 849338c8a9a5SSteve French unsigned int orig_len = get_rfc1002_len(old_buf); 849438c8a9a5SSteve French 849538c8a9a5SSteve French /* tr_buf must be cleared by the caller */ 849638c8a9a5SSteve French tr_hdr->ProtocolId = SMB2_TRANSFORM_PROTO_NUM; 849738c8a9a5SSteve French tr_hdr->OriginalMessageSize = cpu_to_le32(orig_len); 849838c8a9a5SSteve French tr_hdr->Flags = cpu_to_le16(TRANSFORM_FLAG_ENCRYPTED); 849938c8a9a5SSteve French if (cipher_type == SMB2_ENCRYPTION_AES128_GCM || 850038c8a9a5SSteve French cipher_type == SMB2_ENCRYPTION_AES256_GCM) 850138c8a9a5SSteve French get_random_bytes(&tr_hdr->Nonce, SMB3_AES_GCM_NONCE); 850238c8a9a5SSteve French else 850338c8a9a5SSteve French get_random_bytes(&tr_hdr->Nonce, SMB3_AES_CCM_NONCE); 850438c8a9a5SSteve French memcpy(&tr_hdr->SessionId, &hdr->SessionId, 8); 850538c8a9a5SSteve French inc_rfc1001_len(tr_buf, sizeof(struct smb2_transform_hdr)); 850638c8a9a5SSteve French inc_rfc1001_len(tr_buf, orig_len); 850738c8a9a5SSteve French } 850838c8a9a5SSteve French 850938c8a9a5SSteve French int smb3_encrypt_resp(struct ksmbd_work *work) 851038c8a9a5SSteve French { 851138c8a9a5SSteve French char *buf = work->response_buf; 851238c8a9a5SSteve French struct kvec iov[3]; 851338c8a9a5SSteve French int rc = -ENOMEM; 851438c8a9a5SSteve French int buf_size = 0, rq_nvec = 2 + (work->aux_payload_sz ? 1 : 0); 851538c8a9a5SSteve French 851638c8a9a5SSteve French if (ARRAY_SIZE(iov) < rq_nvec) 851738c8a9a5SSteve French return -ENOMEM; 851838c8a9a5SSteve French 851938c8a9a5SSteve French work->tr_buf = kzalloc(sizeof(struct smb2_transform_hdr) + 4, GFP_KERNEL); 852038c8a9a5SSteve French if (!work->tr_buf) 852138c8a9a5SSteve French return rc; 852238c8a9a5SSteve French 852338c8a9a5SSteve French /* fill transform header */ 852438c8a9a5SSteve French fill_transform_hdr(work->tr_buf, buf, work->conn->cipher_type); 852538c8a9a5SSteve French 852638c8a9a5SSteve French iov[0].iov_base = work->tr_buf; 852738c8a9a5SSteve French iov[0].iov_len = sizeof(struct smb2_transform_hdr) + 4; 852838c8a9a5SSteve French buf_size += iov[0].iov_len - 4; 852938c8a9a5SSteve French 853038c8a9a5SSteve French iov[1].iov_base = buf + 4; 853138c8a9a5SSteve French iov[1].iov_len = get_rfc1002_len(buf); 853238c8a9a5SSteve French if (work->aux_payload_sz) { 853338c8a9a5SSteve French iov[1].iov_len = work->resp_hdr_sz - 4; 853438c8a9a5SSteve French 853538c8a9a5SSteve French iov[2].iov_base = work->aux_payload_buf; 853638c8a9a5SSteve French iov[2].iov_len = work->aux_payload_sz; 853738c8a9a5SSteve French buf_size += iov[2].iov_len; 853838c8a9a5SSteve French } 853938c8a9a5SSteve French buf_size += iov[1].iov_len; 854038c8a9a5SSteve French work->resp_hdr_sz = iov[1].iov_len; 854138c8a9a5SSteve French 854238c8a9a5SSteve French rc = ksmbd_crypt_message(work, iov, rq_nvec, 1); 854338c8a9a5SSteve French if (rc) 854438c8a9a5SSteve French return rc; 854538c8a9a5SSteve French 854638c8a9a5SSteve French memmove(buf, iov[1].iov_base, iov[1].iov_len); 854738c8a9a5SSteve French *(__be32 *)work->tr_buf = cpu_to_be32(buf_size); 854838c8a9a5SSteve French 854938c8a9a5SSteve French return rc; 855038c8a9a5SSteve French } 855138c8a9a5SSteve French 855238c8a9a5SSteve French bool smb3_is_transform_hdr(void *buf) 855338c8a9a5SSteve French { 855438c8a9a5SSteve French struct smb2_transform_hdr *trhdr = smb2_get_msg(buf); 855538c8a9a5SSteve French 855638c8a9a5SSteve French return trhdr->ProtocolId == SMB2_TRANSFORM_PROTO_NUM; 855738c8a9a5SSteve French } 855838c8a9a5SSteve French 855938c8a9a5SSteve French int smb3_decrypt_req(struct ksmbd_work *work) 856038c8a9a5SSteve French { 856138c8a9a5SSteve French struct ksmbd_session *sess; 856238c8a9a5SSteve French char *buf = work->request_buf; 856338c8a9a5SSteve French unsigned int pdu_length = get_rfc1002_len(buf); 856438c8a9a5SSteve French struct kvec iov[2]; 856538c8a9a5SSteve French int buf_data_size = pdu_length - sizeof(struct smb2_transform_hdr); 856638c8a9a5SSteve French struct smb2_transform_hdr *tr_hdr = smb2_get_msg(buf); 856738c8a9a5SSteve French int rc = 0; 856838c8a9a5SSteve French 856938c8a9a5SSteve French if (buf_data_size < sizeof(struct smb2_hdr)) { 857038c8a9a5SSteve French pr_err("Transform message is too small (%u)\n", 857138c8a9a5SSteve French pdu_length); 857238c8a9a5SSteve French return -ECONNABORTED; 857338c8a9a5SSteve French } 857438c8a9a5SSteve French 857538c8a9a5SSteve French if (buf_data_size < le32_to_cpu(tr_hdr->OriginalMessageSize)) { 857638c8a9a5SSteve French pr_err("Transform message is broken\n"); 857738c8a9a5SSteve French return -ECONNABORTED; 857838c8a9a5SSteve French } 857938c8a9a5SSteve French 858038c8a9a5SSteve French sess = ksmbd_session_lookup_all(work->conn, le64_to_cpu(tr_hdr->SessionId)); 858138c8a9a5SSteve French if (!sess) { 858238c8a9a5SSteve French pr_err("invalid session id(%llx) in transform header\n", 858338c8a9a5SSteve French le64_to_cpu(tr_hdr->SessionId)); 858438c8a9a5SSteve French return -ECONNABORTED; 858538c8a9a5SSteve French } 858638c8a9a5SSteve French 858738c8a9a5SSteve French iov[0].iov_base = buf; 858838c8a9a5SSteve French iov[0].iov_len = sizeof(struct smb2_transform_hdr) + 4; 858938c8a9a5SSteve French iov[1].iov_base = buf + sizeof(struct smb2_transform_hdr) + 4; 859038c8a9a5SSteve French iov[1].iov_len = buf_data_size; 859138c8a9a5SSteve French rc = ksmbd_crypt_message(work, iov, 2, 0); 859238c8a9a5SSteve French if (rc) 859338c8a9a5SSteve French return rc; 859438c8a9a5SSteve French 859538c8a9a5SSteve French memmove(buf + 4, iov[1].iov_base, buf_data_size); 859638c8a9a5SSteve French *(__be32 *)buf = cpu_to_be32(buf_data_size); 859738c8a9a5SSteve French 859838c8a9a5SSteve French return rc; 859938c8a9a5SSteve French } 860038c8a9a5SSteve French 860138c8a9a5SSteve French bool smb3_11_final_sess_setup_resp(struct ksmbd_work *work) 860238c8a9a5SSteve French { 860338c8a9a5SSteve French struct ksmbd_conn *conn = work->conn; 860438c8a9a5SSteve French struct ksmbd_session *sess = work->sess; 860538c8a9a5SSteve French struct smb2_hdr *rsp = smb2_get_msg(work->response_buf); 860638c8a9a5SSteve French 860738c8a9a5SSteve French if (conn->dialect < SMB30_PROT_ID) 860838c8a9a5SSteve French return false; 860938c8a9a5SSteve French 861038c8a9a5SSteve French if (work->next_smb2_rcv_hdr_off) 861138c8a9a5SSteve French rsp = ksmbd_resp_buf_next(work); 861238c8a9a5SSteve French 861338c8a9a5SSteve French if (le16_to_cpu(rsp->Command) == SMB2_SESSION_SETUP_HE && 861438c8a9a5SSteve French sess->user && !user_guest(sess->user) && 861538c8a9a5SSteve French rsp->Status == STATUS_SUCCESS) 861638c8a9a5SSteve French return true; 861738c8a9a5SSteve French return false; 861838c8a9a5SSteve French } 8619