blob: 3e20831119a9ef7eef979fac99d32ae4fc21e896 [file] [log] [blame]
Linus Torvalds1da177e2005-04-16 15:20:36 -07001/*
2 * fs/cifs/connect.c
3 *
Steve Frenchd185cda2009-04-30 17:45:10 +00004 * Copyright (C) International Business Machines Corp., 2002,2009
Linus Torvalds1da177e2005-04-16 15:20:36 -07005 * Author(s): Steve French (sfrench@us.ibm.com)
6 *
7 * This library is free software; you can redistribute it and/or modify
8 * it under the terms of the GNU Lesser General Public License as published
9 * by the Free Software Foundation; either version 2.1 of the License, or
10 * (at your option) any later version.
11 *
12 * This library is distributed in the hope that it will be useful,
13 * but WITHOUT ANY WARRANTY; without even the implied warranty of
14 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See
15 * the GNU Lesser General Public License for more details.
16 *
17 * You should have received a copy of the GNU Lesser General Public License
18 * along with this library; if not, write to the Free Software
Steve Frenchfb8c4b12007-07-10 01:16:18 +000019 * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
Linus Torvalds1da177e2005-04-16 15:20:36 -070020 */
21#include <linux/fs.h>
22#include <linux/net.h>
23#include <linux/string.h>
24#include <linux/list.h>
25#include <linux/wait.h>
Tejun Heo5a0e3ad2010-03-24 17:04:11 +090026#include <linux/slab.h>
Linus Torvalds1da177e2005-04-16 15:20:36 -070027#include <linux/pagemap.h>
28#include <linux/ctype.h>
29#include <linux/utsname.h>
30#include <linux/mempool.h>
Steve Frenchb8643e12005-04-28 22:41:07 -070031#include <linux/delay.h>
Steve Frenchf1914012005-08-18 09:37:34 -070032#include <linux/completion.h>
Igor Mammedovaaf737a2007-04-03 19:16:43 +000033#include <linux/kthread.h>
Steve French0ae0efa2005-10-10 10:57:19 -070034#include <linux/pagevec.h>
Nigel Cunningham7dfb7102006-12-06 20:34:23 -080035#include <linux/freezer.h>
Igor Mammedov5c2503a2009-04-21 19:31:05 +040036#include <linux/namei.h>
Linus Torvalds1da177e2005-04-16 15:20:36 -070037#include <asm/uaccess.h>
38#include <asm/processor.h>
Jeff Layton50b64e32009-06-02 06:55:20 -040039#include <linux/inet.h>
Steve French0e2beda2009-01-30 21:24:41 +000040#include <net/ipv6.h>
Linus Torvalds1da177e2005-04-16 15:20:36 -070041#include "cifspdu.h"
42#include "cifsglob.h"
43#include "cifsproto.h"
44#include "cifs_unicode.h"
45#include "cifs_debug.h"
46#include "cifs_fs_sb.h"
47#include "ntlmssp.h"
48#include "nterr.h"
49#include "rfc1002pdu.h"
Suresh Jayaraman488f1d2d2010-07-05 18:12:15 +053050#include "fscache.h"
Linus Torvalds1da177e2005-04-16 15:20:36 -070051
52#define CIFS_PORT 445
53#define RFC1001_PORT 139
54
Jeff Laytonc74093b2011-01-11 07:24:23 -050055/* SMB echo "timeout" -- FIXME: tunable? */
56#define SMB_ECHO_INTERVAL (60 * HZ)
57
Linus Torvalds1da177e2005-04-16 15:20:36 -070058extern mempool_t *cifs_req_poolp;
59
60struct smb_vol {
61 char *username;
62 char *password;
63 char *domainname;
64 char *UNC;
65 char *UNCip;
Linus Torvalds1da177e2005-04-16 15:20:36 -070066 char *iocharset; /* local code page for mapping to and from Unicode */
Jeff Layton1397f2e2011-01-07 11:30:28 -050067 char source_rfc1001_name[RFC1001_NAME_LEN_WITH_NULL]; /* clnt nb name */
68 char target_rfc1001_name[RFC1001_NAME_LEN_WITH_NULL]; /* srvr nb name */
Jeff Layton3e4b3e12010-07-19 18:00:17 -040069 uid_t cred_uid;
Linus Torvalds1da177e2005-04-16 15:20:36 -070070 uid_t linux_uid;
71 gid_t linux_gid;
72 mode_t file_mode;
73 mode_t dir_mode;
Steve French189acaa2006-06-23 02:33:48 +000074 unsigned secFlg;
Steve French4b18f2a2008-04-29 00:06:05 +000075 bool retry:1;
76 bool intr:1;
77 bool setuids:1;
78 bool override_uid:1;
79 bool override_gid:1;
Jeff Laytond0a9c072008-05-12 22:23:49 +000080 bool dynperm:1;
Steve French4b18f2a2008-04-29 00:06:05 +000081 bool noperm:1;
82 bool no_psx_acl:1; /* set if posix acl support should be disabled */
83 bool cifs_acl:1;
84 bool no_xattr:1; /* set if xattr (EA) support should be disabled*/
85 bool server_ino:1; /* use inode numbers from server ie UniqueId */
86 bool direct_io:1;
Pavel Shilovskyd39454f2011-01-24 14:16:35 -050087 bool strict_io:1; /* strict cache behavior */
Steve French95b1cb92008-05-15 16:44:38 +000088 bool remap:1; /* set to remap seven reserved chars in filenames */
89 bool posix_paths:1; /* unset to not ask for posix pathnames. */
Steve French4b18f2a2008-04-29 00:06:05 +000090 bool no_linux_ext:1;
91 bool sfu_emul:1;
Steve French95b1cb92008-05-15 16:44:38 +000092 bool nullauth:1; /* attempt to authenticate with null user */
93 bool nocase:1; /* request case insensitive filenames */
94 bool nobrl:1; /* disable sending byte range locks to srv */
Steve French13a6e422008-12-02 17:24:33 +000095 bool mand_lock:1; /* send mandatory not posix byte range lock reqs */
Steve French95b1cb92008-05-15 16:44:38 +000096 bool seal:1; /* request transport encryption on share */
Steve French84210e92008-10-23 04:42:37 +000097 bool nodfs:1; /* Do not request DFS, even if available */
98 bool local_lease:1; /* check leases only on local system, not remote */
Steve Frenchedf1ae42008-10-29 00:47:57 +000099 bool noblocksnd:1;
100 bool noautotune:1;
Steve Frenchbe652442009-02-23 15:21:59 +0000101 bool nostrictsync:1; /* do not force expensive SMBflush on every sync */
Suresh Jayaramanfa1df752010-07-05 18:13:36 +0530102 bool fsc:1; /* enable fscache */
Stefan Metzmacher736a33202010-07-30 14:56:00 +0200103 bool mfsymlinks:1; /* use Minshall+French Symlinks */
Jeff Layton0eb8a132010-10-06 19:51:12 -0400104 bool multiuser:1;
Steve French1cb06d02011-02-24 18:07:19 +0000105 bool use_smb2:1; /* force smb2 use on mount instead of cifs */
Linus Torvalds1da177e2005-04-16 15:20:36 -0700106 unsigned int rsize;
107 unsigned int wsize;
Steve French6a5fa2362010-01-01 01:28:43 +0000108 bool sockopt_tcp_nodelay:1;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700109 unsigned short int port;
Suresh Jayaraman6d20e842010-12-01 14:42:28 +0530110 unsigned long actimeo; /* attribute cache timeout (jiffies) */
Steve Frenchfb8c4b12007-07-10 01:16:18 +0000111 char *prepath;
Ben Greear3eb9a882010-09-01 17:06:02 -0700112 struct sockaddr_storage srcaddr; /* allow binding to a local IP */
Jeff Laytona5fc4ce2010-04-24 07:57:42 -0400113 struct nls_table *local_nls;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700114};
115
Jeff Layton2de970f2010-10-06 19:51:12 -0400116/* FIXME: should these be tunable? */
Jeff Layton9d002df2010-10-06 19:51:11 -0400117#define TLINK_ERROR_EXPIRE (1 * HZ)
Jeff Layton2de970f2010-10-06 19:51:12 -0400118#define TLINK_IDLE_EXPIRE (600 * HZ)
Jeff Layton9d002df2010-10-06 19:51:11 -0400119
Pavel Shilovskya9f1b852010-12-13 19:08:35 +0300120static int ip_connect(struct TCP_Server_Info *server);
121static int generic_ip_connect(struct TCP_Server_Info *server);
Jeff Laytonb647c352010-10-28 11:16:44 -0400122static void tlink_rb_insert(struct rb_root *root, struct tcon_link *new_tlink);
Jeff Layton2de970f2010-10-06 19:51:12 -0400123static void cifs_prune_tlinks(struct work_struct *work);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700124
Jeff Laytond5c56052008-12-01 18:42:33 -0500125/*
126 * cifs tcp session reconnection
127 *
128 * mark tcp session as reconnecting so temporarily locked
129 * mark all smb sessions as reconnecting for tcp session
130 * reconnect tcp session
131 * wake up waiters on reconnection? - (not needed currently)
132 */
Steve French2cd646a2006-09-28 19:43:08 +0000133static int
Linus Torvalds1da177e2005-04-16 15:20:36 -0700134cifs_reconnect(struct TCP_Server_Info *server)
135{
136 int rc = 0;
Jeff Laytonf1987b42008-11-15 11:12:47 -0500137 struct list_head *tmp, *tmp2;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700138 struct cifsSesInfo *ses;
139 struct cifsTconInfo *tcon;
Steve Frenchfb8c4b12007-07-10 01:16:18 +0000140 struct mid_q_entry *mid_entry;
Steve French50c2f752007-07-13 00:33:32 +0000141
Linus Torvalds1da177e2005-04-16 15:20:36 -0700142 spin_lock(&GlobalMid_Lock);
Jeff Layton469ee612008-10-16 18:46:39 +0000143 if (server->tcpStatus == CifsExiting) {
Steve Frenchfb8c4b12007-07-10 01:16:18 +0000144 /* the demux thread will exit normally
Linus Torvalds1da177e2005-04-16 15:20:36 -0700145 next time through the loop */
146 spin_unlock(&GlobalMid_Lock);
147 return rc;
148 } else
149 server->tcpStatus = CifsNeedReconnect;
150 spin_unlock(&GlobalMid_Lock);
151 server->maxBuf = 0;
152
Joe Perchesb6b38f72010-04-21 03:50:45 +0000153 cFYI(1, "Reconnecting tcp session");
Linus Torvalds1da177e2005-04-16 15:20:36 -0700154
155 /* before reconnecting the tcp session, mark the smb session (uid)
156 and the tid bad so they are not used until reconnected */
Jeff Layton2b84a36c2011-01-11 07:24:21 -0500157 cFYI(1, "%s: marking sessions and tcons for reconnect", __func__);
Suresh Jayaraman3f9bcca2010-10-18 23:29:37 +0530158 spin_lock(&cifs_tcp_ses_lock);
Jeff Layton14fbf502008-11-14 13:53:46 -0500159 list_for_each(tmp, &server->smb_ses_list) {
160 ses = list_entry(tmp, struct cifsSesInfo, smb_ses_list);
161 ses->need_reconnect = true;
162 ses->ipc_tid = 0;
Jeff Laytonf1987b42008-11-15 11:12:47 -0500163 list_for_each(tmp2, &ses->tcon_list) {
164 tcon = list_entry(tmp2, struct cifsTconInfo, tcon_list);
165 tcon->need_reconnect = true;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700166 }
Linus Torvalds1da177e2005-04-16 15:20:36 -0700167 }
Suresh Jayaraman3f9bcca2010-10-18 23:29:37 +0530168 spin_unlock(&cifs_tcp_ses_lock);
Jeff Layton2b84a36c2011-01-11 07:24:21 -0500169
Linus Torvalds1da177e2005-04-16 15:20:36 -0700170 /* do not want to be sending data on a socket we are freeing */
Jeff Layton2b84a36c2011-01-11 07:24:21 -0500171 cFYI(1, "%s: tearing down socket", __func__);
Jeff Layton72ca5452008-12-01 07:09:36 -0500172 mutex_lock(&server->srv_mutex);
Steve Frenchfb8c4b12007-07-10 01:16:18 +0000173 if (server->ssocket) {
Joe Perchesb6b38f72010-04-21 03:50:45 +0000174 cFYI(1, "State: 0x%x Flags: 0x%lx", server->ssocket->state,
175 server->ssocket->flags);
Trond Myklebust91cf45f2007-11-12 18:10:39 -0800176 kernel_sock_shutdown(server->ssocket, SHUT_WR);
Joe Perchesb6b38f72010-04-21 03:50:45 +0000177 cFYI(1, "Post shutdown state: 0x%x Flags: 0x%lx",
Steve French467a8f82007-06-27 22:41:32 +0000178 server->ssocket->state,
Joe Perchesb6b38f72010-04-21 03:50:45 +0000179 server->ssocket->flags);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700180 sock_release(server->ssocket);
181 server->ssocket = NULL;
182 }
Shirish Pargaonkar5d0d2882010-10-13 18:15:00 -0500183 server->sequence_number = 0;
184 server->session_estab = false;
Shirish Pargaonkar21e73392010-10-21 06:42:55 -0500185 kfree(server->session_key.response);
186 server->session_key.response = NULL;
187 server->session_key.len = 0;
Steve Frenchfda35942011-01-20 18:06:34 +0000188 server->lstrp = jiffies;
Jeff Layton2b84a36c2011-01-11 07:24:21 -0500189 mutex_unlock(&server->srv_mutex);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700190
Jeff Layton2b84a36c2011-01-11 07:24:21 -0500191 /* mark submitted MIDs for retry and issue callback */
192 cFYI(1, "%s: issuing mid callbacks", __func__);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700193 spin_lock(&GlobalMid_Lock);
Jeff Layton2b84a36c2011-01-11 07:24:21 -0500194 list_for_each_safe(tmp, tmp2, &server->pending_mid_q) {
195 mid_entry = list_entry(tmp, struct mid_q_entry, qhead);
196 if (mid_entry->midState == MID_REQUEST_SUBMITTED)
Steve Frenchad8b15f2008-08-08 21:10:16 +0000197 mid_entry->midState = MID_RETRY_NEEDED;
Jeff Layton2b84a36c2011-01-11 07:24:21 -0500198 list_del_init(&mid_entry->qhead);
199 mid_entry->callback(mid_entry);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700200 }
201 spin_unlock(&GlobalMid_Lock);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700202
Steve Frenchfd88ce92011-04-12 01:01:14 +0000203 while (server->tcpStatus == CifsNeedReconnect) {
Steve French6c3d8902006-07-31 22:46:20 +0000204 try_to_freeze();
Pavel Shilovskya9f1b852010-12-13 19:08:35 +0300205
206 /* we should try only the port we connected to before */
207 rc = generic_ip_connect(server);
Steve Frenchfb8c4b12007-07-10 01:16:18 +0000208 if (rc) {
Joe Perchesb6b38f72010-04-21 03:50:45 +0000209 cFYI(1, "reconnect error %d", rc);
Steve French0cb766a2005-04-28 22:41:11 -0700210 msleep(3000);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700211 } else {
212 atomic_inc(&tcpSesReconnectCount);
213 spin_lock(&GlobalMid_Lock);
Jeff Layton469ee612008-10-16 18:46:39 +0000214 if (server->tcpStatus != CifsExiting)
Steve Frenchfd88ce92011-04-12 01:01:14 +0000215 server->tcpStatus = CifsNeedNegotiate;
Steve Frenchfb8c4b12007-07-10 01:16:18 +0000216 spin_unlock(&GlobalMid_Lock);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700217 }
218 }
Jeff Layton2b84a36c2011-01-11 07:24:21 -0500219
Linus Torvalds1da177e2005-04-16 15:20:36 -0700220 return rc;
221}
222
Steve Frenchfb8c4b12007-07-10 01:16:18 +0000223/*
Steve Frenche4eb2952005-04-28 22:41:09 -0700224 return codes:
225 0 not a transact2, or all data present
226 >0 transact2 with that much data missing
227 -EINVAL = invalid transact2
228
229 */
Steve Frenchfb8c4b12007-07-10 01:16:18 +0000230static int check2ndT2(struct smb_hdr *pSMB, unsigned int maxBufSize)
Steve Frenche4eb2952005-04-28 22:41:09 -0700231{
Steve Frenchfb8c4b12007-07-10 01:16:18 +0000232 struct smb_t2_rsp *pSMBt;
Steve Frenche4eb2952005-04-28 22:41:09 -0700233 int remaining;
Jeff Layton26ec2542011-01-20 13:36:51 -0500234 __u16 total_data_size, data_in_this_rsp;
Steve Frenche4eb2952005-04-28 22:41:09 -0700235
Steve Frenchfb8c4b12007-07-10 01:16:18 +0000236 if (pSMB->Command != SMB_COM_TRANSACTION2)
Steve Frenche4eb2952005-04-28 22:41:09 -0700237 return 0;
238
Steve Frenchfb8c4b12007-07-10 01:16:18 +0000239 /* check for plausible wct, bcc and t2 data and parm sizes */
240 /* check for parm and data offset going beyond end of smb */
241 if (pSMB->WordCount != 10) { /* coalesce_t2 depends on this */
Joe Perchesb6b38f72010-04-21 03:50:45 +0000242 cFYI(1, "invalid transact2 word count");
Steve Frenche4eb2952005-04-28 22:41:09 -0700243 return -EINVAL;
244 }
245
246 pSMBt = (struct smb_t2_rsp *)pSMB;
247
Jeff Layton26ec2542011-01-20 13:36:51 -0500248 total_data_size = get_unaligned_le16(&pSMBt->t2_rsp.TotalDataCount);
249 data_in_this_rsp = get_unaligned_le16(&pSMBt->t2_rsp.DataCount);
Steve Frenche4eb2952005-04-28 22:41:09 -0700250
Jeff Laytonc0c7b902011-03-31 17:32:54 -0400251 if (total_data_size == data_in_this_rsp)
Steve Frenche4eb2952005-04-28 22:41:09 -0700252 return 0;
Jeff Laytonc0c7b902011-03-31 17:32:54 -0400253 else if (total_data_size < data_in_this_rsp) {
Joe Perchesb6b38f72010-04-21 03:50:45 +0000254 cFYI(1, "total data %d smaller than data in frame %d",
255 total_data_size, data_in_this_rsp);
Steve Frenche4eb2952005-04-28 22:41:09 -0700256 return -EINVAL;
Steve Frenche4eb2952005-04-28 22:41:09 -0700257 }
Jeff Laytonc0c7b902011-03-31 17:32:54 -0400258
259 remaining = total_data_size - data_in_this_rsp;
260
261 cFYI(1, "missing %d bytes from transact2, check next response",
262 remaining);
263 if (total_data_size > maxBufSize) {
264 cERROR(1, "TotalDataSize %d is over maximum buffer %d",
265 total_data_size, maxBufSize);
266 return -EINVAL;
267 }
268 return remaining;
Steve Frenche4eb2952005-04-28 22:41:09 -0700269}
270
Steve Frenchfb8c4b12007-07-10 01:16:18 +0000271static int coalesce_t2(struct smb_hdr *psecond, struct smb_hdr *pTargetSMB)
Steve Frenche4eb2952005-04-28 22:41:09 -0700272{
273 struct smb_t2_rsp *pSMB2 = (struct smb_t2_rsp *)psecond;
274 struct smb_t2_rsp *pSMBt = (struct smb_t2_rsp *)pTargetSMB;
Steve Frenchfb8c4b12007-07-10 01:16:18 +0000275 char *data_area_of_target;
276 char *data_area_of_buf2;
Jeff Layton26ec2542011-01-20 13:36:51 -0500277 int remaining;
Jeff Layton2a2047bc2011-04-27 13:29:49 -0400278 unsigned int byte_count, total_in_buf;
279 __u16 total_data_size, total_in_buf2;
Steve Frenche4eb2952005-04-28 22:41:09 -0700280
Jeff Layton26ec2542011-01-20 13:36:51 -0500281 total_data_size = get_unaligned_le16(&pSMBt->t2_rsp.TotalDataCount);
Steve Frenche4eb2952005-04-28 22:41:09 -0700282
Jeff Layton26ec2542011-01-20 13:36:51 -0500283 if (total_data_size !=
284 get_unaligned_le16(&pSMB2->t2_rsp.TotalDataCount))
Joe Perchesb6b38f72010-04-21 03:50:45 +0000285 cFYI(1, "total data size of primary and secondary t2 differ");
Steve Frenche4eb2952005-04-28 22:41:09 -0700286
Jeff Layton26ec2542011-01-20 13:36:51 -0500287 total_in_buf = get_unaligned_le16(&pSMBt->t2_rsp.DataCount);
Steve Frenche4eb2952005-04-28 22:41:09 -0700288
289 remaining = total_data_size - total_in_buf;
Steve French50c2f752007-07-13 00:33:32 +0000290
Steve Frenchfb8c4b12007-07-10 01:16:18 +0000291 if (remaining < 0)
Jeff Layton2a2047bc2011-04-27 13:29:49 -0400292 return -EPROTO;
Steve Frenche4eb2952005-04-28 22:41:09 -0700293
Steve Frenchfb8c4b12007-07-10 01:16:18 +0000294 if (remaining == 0) /* nothing to do, ignore */
Steve Frenche4eb2952005-04-28 22:41:09 -0700295 return 0;
Steve French50c2f752007-07-13 00:33:32 +0000296
Jeff Layton26ec2542011-01-20 13:36:51 -0500297 total_in_buf2 = get_unaligned_le16(&pSMB2->t2_rsp.DataCount);
Steve Frenchfb8c4b12007-07-10 01:16:18 +0000298 if (remaining < total_in_buf2) {
Joe Perchesb6b38f72010-04-21 03:50:45 +0000299 cFYI(1, "transact2 2nd response contains too much data");
Steve Frenche4eb2952005-04-28 22:41:09 -0700300 }
301
302 /* find end of first SMB data area */
Steve Frenchfb8c4b12007-07-10 01:16:18 +0000303 data_area_of_target = (char *)&pSMBt->hdr.Protocol +
Jeff Layton26ec2542011-01-20 13:36:51 -0500304 get_unaligned_le16(&pSMBt->t2_rsp.DataOffset);
Steve Frenche4eb2952005-04-28 22:41:09 -0700305 /* validate target area */
306
Jeff Layton26ec2542011-01-20 13:36:51 -0500307 data_area_of_buf2 = (char *)&pSMB2->hdr.Protocol +
308 get_unaligned_le16(&pSMB2->t2_rsp.DataOffset);
Steve Frenche4eb2952005-04-28 22:41:09 -0700309
310 data_area_of_target += total_in_buf;
311
312 /* copy second buffer into end of first buffer */
Steve Frenche4eb2952005-04-28 22:41:09 -0700313 total_in_buf += total_in_buf2;
Jeff Layton2a2047bc2011-04-27 13:29:49 -0400314 /* is the result too big for the field? */
315 if (total_in_buf > USHRT_MAX)
316 return -EPROTO;
Jeff Layton26ec2542011-01-20 13:36:51 -0500317 put_unaligned_le16(total_in_buf, &pSMBt->t2_rsp.DataCount);
Jeff Layton2a2047bc2011-04-27 13:29:49 -0400318
319 /* fix up the BCC */
Jeff Layton820a8032011-05-04 08:05:26 -0400320 byte_count = get_bcc(pTargetSMB);
Steve Frenche4eb2952005-04-28 22:41:09 -0700321 byte_count += total_in_buf2;
Jeff Layton2a2047bc2011-04-27 13:29:49 -0400322 /* is the result too big for the field? */
323 if (byte_count > USHRT_MAX)
324 return -EPROTO;
Jeff Layton820a8032011-05-04 08:05:26 -0400325 put_bcc(byte_count, pTargetSMB);
Steve Frenche4eb2952005-04-28 22:41:09 -0700326
Steve Frenchbe8e3b02011-04-29 05:40:20 +0000327 byte_count = be32_to_cpu(pTargetSMB->smb_buf_length);
Steve Frenche4eb2952005-04-28 22:41:09 -0700328 byte_count += total_in_buf2;
Jeff Layton2a2047bc2011-04-27 13:29:49 -0400329 /* don't allow buffer to overflow */
330 if (byte_count > CIFSMaxBufSize)
331 return -ENOBUFS;
Steve Frenchbe8e3b02011-04-29 05:40:20 +0000332 pTargetSMB->smb_buf_length = cpu_to_be32(byte_count);
Steve Frenche4eb2952005-04-28 22:41:09 -0700333
Jeff Layton2a2047bc2011-04-27 13:29:49 -0400334 memcpy(data_area_of_target, data_area_of_buf2, total_in_buf2);
335
Steve Frenchfb8c4b12007-07-10 01:16:18 +0000336 if (remaining == total_in_buf2) {
Joe Perchesb6b38f72010-04-21 03:50:45 +0000337 cFYI(1, "found the last secondary response");
Steve Frenche4eb2952005-04-28 22:41:09 -0700338 return 0; /* we are done */
339 } else /* more responses to go */
340 return 1;
Steve Frenche4eb2952005-04-28 22:41:09 -0700341}
342
Jeff Laytonc74093b2011-01-11 07:24:23 -0500343static void
344cifs_echo_request(struct work_struct *work)
345{
346 int rc;
347 struct TCP_Server_Info *server = container_of(work,
348 struct TCP_Server_Info, echo.work);
349
Jeff Layton247ec9b2011-02-04 17:09:50 -0500350 /*
Jeff Layton195291e2011-02-09 12:01:42 -0500351 * We cannot send an echo until the NEGOTIATE_PROTOCOL request is
352 * done, which is indicated by maxBuf != 0. Also, no need to ping if
353 * we got a response recently
Jeff Layton247ec9b2011-02-04 17:09:50 -0500354 */
Jeff Layton195291e2011-02-09 12:01:42 -0500355 if (server->maxBuf == 0 ||
Jeff Layton247ec9b2011-02-04 17:09:50 -0500356 time_before(jiffies, server->lstrp + SMB_ECHO_INTERVAL - HZ))
Jeff Laytonc74093b2011-01-11 07:24:23 -0500357 goto requeue_echo;
358
359 rc = CIFSSMBEcho(server);
360 if (rc)
361 cFYI(1, "Unable to send echo request to server: %s",
362 server->hostname);
363
364requeue_echo:
365 queue_delayed_work(system_nrt_wq, &server->echo, SMB_ECHO_INTERVAL);
366}
367
Linus Torvalds1da177e2005-04-16 15:20:36 -0700368static int
369cifs_demultiplex_thread(struct TCP_Server_Info *server)
370{
371 int length;
372 unsigned int pdu_length, total_read;
373 struct smb_hdr *smb_buffer = NULL;
Steve Frenchb8643e12005-04-28 22:41:07 -0700374 struct smb_hdr *bigbuf = NULL;
375 struct smb_hdr *smallbuf = NULL;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700376 struct msghdr smb_msg;
377 struct kvec iov;
378 struct socket *csocket = server->ssocket;
Jeff Layton2b84a36c2011-01-11 07:24:21 -0500379 struct list_head *tmp, *tmp2;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700380 struct task_struct *task_to_wake = NULL;
381 struct mid_q_entry *mid_entry;
Steve French70ca7342005-09-22 16:32:06 -0700382 char temp;
Steve French4b18f2a2008-04-29 00:06:05 +0000383 bool isLargeBuf = false;
384 bool isMultiRsp;
Steve Frenche4eb2952005-04-28 22:41:09 -0700385 int reconnect;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700386
Linus Torvalds1da177e2005-04-16 15:20:36 -0700387 current->flags |= PF_MEMALLOC;
Joe Perchesb6b38f72010-04-21 03:50:45 +0000388 cFYI(1, "Demultiplex PID: %d", task_pid_nr(current));
Jeff Layton93d0ec82008-08-02 08:00:48 -0400389
390 length = atomic_inc_return(&tcpSesAllocCount);
391 if (length > 1)
Steve French26f57362007-08-30 22:09:15 +0000392 mempool_resize(cifs_req_poolp, length + cifs_min_rcv,
393 GFP_KERNEL);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700394
Rafael J. Wysocki83144182007-07-17 04:03:35 -0700395 set_freezable();
Jeff Layton469ee612008-10-16 18:46:39 +0000396 while (server->tcpStatus != CifsExiting) {
Steve Frenchede13272005-08-30 20:10:14 -0700397 if (try_to_freeze())
398 continue;
Steve Frenchb8643e12005-04-28 22:41:07 -0700399 if (bigbuf == NULL) {
400 bigbuf = cifs_buf_get();
Pavel Machek0fd1ffe2006-06-13 21:31:39 +0000401 if (!bigbuf) {
Joe Perchesb6b38f72010-04-21 03:50:45 +0000402 cERROR(1, "No memory for large SMB response");
Steve Frenchb8643e12005-04-28 22:41:07 -0700403 msleep(3000);
404 /* retry will check if exiting */
405 continue;
406 }
Pavel Machek0fd1ffe2006-06-13 21:31:39 +0000407 } else if (isLargeBuf) {
408 /* we are reusing a dirty large buf, clear its start */
Steve French26f57362007-08-30 22:09:15 +0000409 memset(bigbuf, 0, sizeof(struct smb_hdr));
Linus Torvalds1da177e2005-04-16 15:20:36 -0700410 }
Steve Frenchb8643e12005-04-28 22:41:07 -0700411
412 if (smallbuf == NULL) {
413 smallbuf = cifs_small_buf_get();
Pavel Machek0fd1ffe2006-06-13 21:31:39 +0000414 if (!smallbuf) {
Joe Perchesb6b38f72010-04-21 03:50:45 +0000415 cERROR(1, "No memory for SMB response");
Steve Frenchb8643e12005-04-28 22:41:07 -0700416 msleep(1000);
417 /* retry will check if exiting */
418 continue;
419 }
420 /* beginning of smb buffer is cleared in our buf_get */
421 } else /* if existing small buf clear beginning */
Steve French26f57362007-08-30 22:09:15 +0000422 memset(smallbuf, 0, sizeof(struct smb_hdr));
Steve Frenchb8643e12005-04-28 22:41:07 -0700423
Steve French4b18f2a2008-04-29 00:06:05 +0000424 isLargeBuf = false;
425 isMultiRsp = false;
Steve Frenchb8643e12005-04-28 22:41:07 -0700426 smb_buffer = smallbuf;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700427 iov.iov_base = smb_buffer;
428 iov.iov_len = 4;
429 smb_msg.msg_control = NULL;
430 smb_msg.msg_controllen = 0;
Steve Frenchf01d5e12007-08-30 21:13:31 +0000431 pdu_length = 4; /* enough to get RFC1001 header */
Steve Frenchfda35942011-01-20 18:06:34 +0000432
Steve Frenchf01d5e12007-08-30 21:13:31 +0000433incomplete_rcv:
Steve Frenchfd88ce92011-04-12 01:01:14 +0000434 if (echo_retries > 0 && server->tcpStatus == CifsGood &&
Steve Frenchfda35942011-01-20 18:06:34 +0000435 time_after(jiffies, server->lstrp +
436 (echo_retries * SMB_ECHO_INTERVAL))) {
437 cERROR(1, "Server %s has not responded in %d seconds. "
438 "Reconnecting...", server->hostname,
439 (echo_retries * SMB_ECHO_INTERVAL / HZ));
440 cifs_reconnect(server);
441 csocket = server->ssocket;
442 wake_up(&server->response_q);
443 continue;
444 }
445
Linus Torvalds1da177e2005-04-16 15:20:36 -0700446 length =
447 kernel_recvmsg(csocket, &smb_msg,
Steve Frenchf01d5e12007-08-30 21:13:31 +0000448 &iov, 1, pdu_length, 0 /* BB other flags? */);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700449
Jeff Layton469ee612008-10-16 18:46:39 +0000450 if (server->tcpStatus == CifsExiting) {
Linus Torvalds1da177e2005-04-16 15:20:36 -0700451 break;
452 } else if (server->tcpStatus == CifsNeedReconnect) {
Joe Perchesb6b38f72010-04-21 03:50:45 +0000453 cFYI(1, "Reconnect after server stopped responding");
Linus Torvalds1da177e2005-04-16 15:20:36 -0700454 cifs_reconnect(server);
Joe Perchesb6b38f72010-04-21 03:50:45 +0000455 cFYI(1, "call to reconnect done");
Linus Torvalds1da177e2005-04-16 15:20:36 -0700456 csocket = server->ssocket;
457 continue;
Jeff Layton522bbe62010-09-03 12:00:49 -0400458 } else if (length == -ERESTARTSYS ||
459 length == -EAGAIN ||
460 length == -EINTR) {
Steve Frenchb8643e12005-04-28 22:41:07 -0700461 msleep(1); /* minimum sleep to prevent looping
Linus Torvalds1da177e2005-04-16 15:20:36 -0700462 allowing socket to clear and app threads to set
463 tcpStatus CifsNeedReconnect if server hung */
Steve Frenchc527c8a2008-11-03 20:46:21 +0000464 if (pdu_length < 4) {
465 iov.iov_base = (4 - pdu_length) +
466 (char *)smb_buffer;
467 iov.iov_len = pdu_length;
468 smb_msg.msg_control = NULL;
469 smb_msg.msg_controllen = 0;
Steve Frenchc18c7322007-10-17 18:01:11 +0000470 goto incomplete_rcv;
Steve Frenchc527c8a2008-11-03 20:46:21 +0000471 } else
Steve Frenchc18c7322007-10-17 18:01:11 +0000472 continue;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700473 } else if (length <= 0) {
Joe Perchesb6b38f72010-04-21 03:50:45 +0000474 cFYI(1, "Reconnect after unexpected peek error %d",
475 length);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700476 cifs_reconnect(server);
477 csocket = server->ssocket;
478 wake_up(&server->response_q);
479 continue;
Petr Tesarik2a974682007-11-20 02:24:08 +0000480 } else if (length < pdu_length) {
Joe Perchesb6b38f72010-04-21 03:50:45 +0000481 cFYI(1, "requested %d bytes but only got %d bytes",
482 pdu_length, length);
Steve Frenchf01d5e12007-08-30 21:13:31 +0000483 pdu_length -= length;
Steve Frenchf01d5e12007-08-30 21:13:31 +0000484 msleep(1);
485 goto incomplete_rcv;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700486 }
Steve French67010fb2005-04-28 22:41:09 -0700487
Steve French70ca7342005-09-22 16:32:06 -0700488 /* The right amount was read from socket - 4 bytes */
489 /* so we can now interpret the length field */
Steve French46810cb2005-04-28 22:41:09 -0700490
Steve French70ca7342005-09-22 16:32:06 -0700491 /* the first byte big endian of the length field,
492 is actually not part of the length but the type
493 with the most common, zero, as regular data */
494 temp = *((char *) smb_buffer);
495
Steve Frenchfb8c4b12007-07-10 01:16:18 +0000496 /* Note that FC 1001 length is big endian on the wire,
Steve French70ca7342005-09-22 16:32:06 -0700497 but we convert it here so it is always manipulated
498 as host byte order */
Steve Frenchbe8e3b02011-04-29 05:40:20 +0000499 pdu_length = be32_to_cpu(smb_buffer->smb_buf_length);
Steve French46810cb2005-04-28 22:41:09 -0700500
Joe Perchesb6b38f72010-04-21 03:50:45 +0000501 cFYI(1, "rfc1002 length 0x%x", pdu_length+4);
Steve French70ca7342005-09-22 16:32:06 -0700502
503 if (temp == (char) RFC1002_SESSION_KEEP_ALIVE) {
Steve Frenchfb8c4b12007-07-10 01:16:18 +0000504 continue;
Steve French70ca7342005-09-22 16:32:06 -0700505 } else if (temp == (char)RFC1002_POSITIVE_SESSION_RESPONSE) {
Joe Perchesb6b38f72010-04-21 03:50:45 +0000506 cFYI(1, "Good RFC 1002 session rsp");
Steve Frenche4eb2952005-04-28 22:41:09 -0700507 continue;
Steve French70ca7342005-09-22 16:32:06 -0700508 } else if (temp == (char)RFC1002_NEGATIVE_SESSION_RESPONSE) {
Steve Frenchfb8c4b12007-07-10 01:16:18 +0000509 /* we get this from Windows 98 instead of
Steve French46810cb2005-04-28 22:41:09 -0700510 an error on SMB negprot response */
Joe Perchesb6b38f72010-04-21 03:50:45 +0000511 cFYI(1, "Negative RFC1002 Session Response Error 0x%x)",
512 pdu_length);
Jeff Layton7332f2a2010-09-03 12:00:49 -0400513 /* give server a second to clean up */
514 msleep(1000);
515 /* always try 445 first on reconnect since we get NACK
516 * on some if we ever connected to port 139 (the NACK
517 * is since we do not begin with RFC1001 session
518 * initialize frame)
519 */
Jeff Layton32670392010-09-03 12:00:50 -0400520 cifs_set_port((struct sockaddr *)
Pavel Shilovskya9f1b852010-12-13 19:08:35 +0300521 &server->dstaddr, CIFS_PORT);
Jeff Layton7332f2a2010-09-03 12:00:49 -0400522 cifs_reconnect(server);
523 csocket = server->ssocket;
524 wake_up(&server->response_q);
525 continue;
Steve French70ca7342005-09-22 16:32:06 -0700526 } else if (temp != (char) 0) {
Joe Perchesb6b38f72010-04-21 03:50:45 +0000527 cERROR(1, "Unknown RFC 1002 frame");
Steve French70ca7342005-09-22 16:32:06 -0700528 cifs_dump_mem(" Received Data: ", (char *)smb_buffer,
529 length);
Steve French46810cb2005-04-28 22:41:09 -0700530 cifs_reconnect(server);
531 csocket = server->ssocket;
532 continue;
Steve Frenche4eb2952005-04-28 22:41:09 -0700533 }
534
535 /* else we have an SMB response */
Steve Frenchfb8c4b12007-07-10 01:16:18 +0000536 if ((pdu_length > CIFSMaxBufSize + MAX_CIFS_HDR_SIZE - 4) ||
Steve French26f57362007-08-30 22:09:15 +0000537 (pdu_length < sizeof(struct smb_hdr) - 1 - 4)) {
Joe Perchesb6b38f72010-04-21 03:50:45 +0000538 cERROR(1, "Invalid size SMB length %d pdu_length %d",
539 length, pdu_length+4);
Steve Frenche4eb2952005-04-28 22:41:09 -0700540 cifs_reconnect(server);
541 csocket = server->ssocket;
542 wake_up(&server->response_q);
543 continue;
Steve Frenchfb8c4b12007-07-10 01:16:18 +0000544 }
Steve Frenche4eb2952005-04-28 22:41:09 -0700545
546 /* else length ok */
547 reconnect = 0;
548
Steve Frenchfb8c4b12007-07-10 01:16:18 +0000549 if (pdu_length > MAX_CIFS_SMALL_BUFFER_SIZE - 4) {
Steve French4b18f2a2008-04-29 00:06:05 +0000550 isLargeBuf = true;
Steve Frenche4eb2952005-04-28 22:41:09 -0700551 memcpy(bigbuf, smallbuf, 4);
552 smb_buffer = bigbuf;
553 }
554 length = 0;
555 iov.iov_base = 4 + (char *)smb_buffer;
556 iov.iov_len = pdu_length;
Steve Frenchfb8c4b12007-07-10 01:16:18 +0000557 for (total_read = 0; total_read < pdu_length;
Steve Frenche4eb2952005-04-28 22:41:09 -0700558 total_read += length) {
559 length = kernel_recvmsg(csocket, &smb_msg, &iov, 1,
560 pdu_length - total_read, 0);
Jeff Layton522bbe62010-09-03 12:00:49 -0400561 if (server->tcpStatus == CifsExiting) {
Steve Frenche4eb2952005-04-28 22:41:09 -0700562 /* then will exit */
563 reconnect = 2;
564 break;
565 } else if (server->tcpStatus == CifsNeedReconnect) {
Steve French46810cb2005-04-28 22:41:09 -0700566 cifs_reconnect(server);
567 csocket = server->ssocket;
Steve Frenchfb8c4b12007-07-10 01:16:18 +0000568 /* Reconnect wakes up rspns q */
Steve Frenche4eb2952005-04-28 22:41:09 -0700569 /* Now we will reread sock */
570 reconnect = 1;
571 break;
Jeff Layton522bbe62010-09-03 12:00:49 -0400572 } else if (length == -ERESTARTSYS ||
573 length == -EAGAIN ||
574 length == -EINTR) {
Steve Frenche4eb2952005-04-28 22:41:09 -0700575 msleep(1); /* minimum sleep to prevent looping,
Steve Frenchfb8c4b12007-07-10 01:16:18 +0000576 allowing socket to clear and app
Steve Frenche4eb2952005-04-28 22:41:09 -0700577 threads to set tcpStatus
578 CifsNeedReconnect if server hung*/
Steve Frenchc18c7322007-10-17 18:01:11 +0000579 length = 0;
Steve French46810cb2005-04-28 22:41:09 -0700580 continue;
Steve Frenche4eb2952005-04-28 22:41:09 -0700581 } else if (length <= 0) {
Joe Perchesb6b38f72010-04-21 03:50:45 +0000582 cERROR(1, "Received no data, expecting %d",
583 pdu_length - total_read);
Steve Frenche4eb2952005-04-28 22:41:09 -0700584 cifs_reconnect(server);
585 csocket = server->ssocket;
586 reconnect = 1;
587 break;
Steve French46810cb2005-04-28 22:41:09 -0700588 }
589 }
Steve Frenchfb8c4b12007-07-10 01:16:18 +0000590 if (reconnect == 2)
Steve Frenche4eb2952005-04-28 22:41:09 -0700591 break;
Steve Frenchfb8c4b12007-07-10 01:16:18 +0000592 else if (reconnect == 1)
Steve Frenche4eb2952005-04-28 22:41:09 -0700593 continue;
594
Jeff Layton9587fcf2011-02-01 08:40:43 -0500595 total_read += 4; /* account for rfc1002 hdr */
Steve French50c2f752007-07-13 00:33:32 +0000596
Jeff Layton9587fcf2011-02-01 08:40:43 -0500597 dump_smb(smb_buffer, total_read);
Jeff Layton71823ba2011-02-10 08:03:50 -0500598
599 /*
600 * We know that we received enough to get to the MID as we
601 * checked the pdu_length earlier. Now check to see
602 * if the rest of the header is OK. We borrow the length
603 * var for the rest of the loop to avoid a new stack var.
604 *
605 * 48 bytes is enough to display the header and a little bit
606 * into the payload for debugging purposes.
607 */
608 length = checkSMB(smb_buffer, smb_buffer->Mid, total_read);
609 if (length != 0)
Jeff Layton9587fcf2011-02-01 08:40:43 -0500610 cifs_dump_mem("Bad SMB: ", smb_buffer,
Jeff Layton71823ba2011-02-10 08:03:50 -0500611 min_t(unsigned int, total_read, 48));
Steve Frenche4eb2952005-04-28 22:41:09 -0700612
Jeff Layton2b84a36c2011-01-11 07:24:21 -0500613 mid_entry = NULL;
Steve Frenchfda35942011-01-20 18:06:34 +0000614 server->lstrp = jiffies;
615
Steve Frenche4eb2952005-04-28 22:41:09 -0700616 spin_lock(&GlobalMid_Lock);
Jeff Layton2b84a36c2011-01-11 07:24:21 -0500617 list_for_each_safe(tmp, tmp2, &server->pending_mid_q) {
Steve Frenche4eb2952005-04-28 22:41:09 -0700618 mid_entry = list_entry(tmp, struct mid_q_entry, qhead);
619
Jeff Layton146f9f62011-04-29 06:52:43 -0400620 if (mid_entry->mid != smb_buffer->Mid ||
621 mid_entry->midState != MID_REQUEST_SUBMITTED ||
622 mid_entry->command != smb_buffer->Command) {
623 mid_entry = NULL;
624 continue;
625 }
626
627 if (length == 0 &&
628 check2ndT2(smb_buffer, server->maxBuf) > 0) {
629 /* We have a multipart transact2 resp */
630 isMultiRsp = true;
631 if (mid_entry->resp_buf) {
632 /* merge response - fix up 1st*/
Jeff Layton16541ba2011-04-29 06:52:44 -0400633 length = coalesce_t2(smb_buffer,
634 mid_entry->resp_buf);
635 if (length > 0) {
636 length = 0;
Jeff Layton146f9f62011-04-29 06:52:43 -0400637 mid_entry->multiRsp = true;
638 break;
Steve Frenche4eb2952005-04-28 22:41:09 -0700639 } else {
Jeff Layton16541ba2011-04-29 06:52:44 -0400640 /* all parts received or
641 * packet is malformed
642 */
Jeff Layton146f9f62011-04-29 06:52:43 -0400643 mid_entry->multiEnd = true;
644 goto multi_t2_fnd;
Steve Frenche4eb2952005-04-28 22:41:09 -0700645 }
Jeff Layton146f9f62011-04-29 06:52:43 -0400646 } else {
647 if (!isLargeBuf) {
648 /*
649 * FIXME: switch to already
650 * allocated largebuf?
651 */
652 cERROR(1, "1st trans2 resp "
653 "needs bigbuf");
654 } else {
655 /* Have first buffer */
656 mid_entry->resp_buf =
657 smb_buffer;
658 mid_entry->largeBuf = true;
659 bigbuf = NULL;
660 }
Steve French50c2f752007-07-13 00:33:32 +0000661 }
Steve Frenche4eb2952005-04-28 22:41:09 -0700662 break;
663 }
Jeff Layton146f9f62011-04-29 06:52:43 -0400664 mid_entry->resp_buf = smb_buffer;
665 mid_entry->largeBuf = isLargeBuf;
666multi_t2_fnd:
667 if (length == 0)
668 mid_entry->midState = MID_RESPONSE_RECEIVED;
669 else
670 mid_entry->midState = MID_RESPONSE_MALFORMED;
671#ifdef CONFIG_CIFS_STATS2
672 mid_entry->when_received = jiffies;
673#endif
674 list_del_init(&mid_entry->qhead);
675 mid_entry->callback(mid_entry);
676 break;
Steve Frenche4eb2952005-04-28 22:41:09 -0700677 }
678 spin_unlock(&GlobalMid_Lock);
Jeff Layton2b84a36c2011-01-11 07:24:21 -0500679
680 if (mid_entry != NULL) {
Steve Frenchcd634992005-04-28 22:41:10 -0700681 /* Was previous buf put in mpx struct for multi-rsp? */
Steve Frenchfb8c4b12007-07-10 01:16:18 +0000682 if (!isMultiRsp) {
Steve Frenchcd634992005-04-28 22:41:10 -0700683 /* smb buffer will be freed by user thread */
Steve French26f57362007-08-30 22:09:15 +0000684 if (isLargeBuf)
Steve Frenchcd634992005-04-28 22:41:10 -0700685 bigbuf = NULL;
Steve French26f57362007-08-30 22:09:15 +0000686 else
Steve Frenchcd634992005-04-28 22:41:10 -0700687 smallbuf = NULL;
688 }
Jeff Layton71823ba2011-02-10 08:03:50 -0500689 } else if (length != 0) {
690 /* response sanity checks failed */
691 continue;
Steve French4b18f2a2008-04-29 00:06:05 +0000692 } else if (!is_valid_oplock_break(smb_buffer, server) &&
693 !isMultiRsp) {
Joe Perchesb6b38f72010-04-21 03:50:45 +0000694 cERROR(1, "No task to wake, unknown frame received! "
Jeff Layton80975312011-01-11 07:24:02 -0500695 "NumMids %d", atomic_read(&midCount));
Steve French50c2f752007-07-13 00:33:32 +0000696 cifs_dump_mem("Received Data is: ", (char *)smb_buffer,
Steve French70ca7342005-09-22 16:32:06 -0700697 sizeof(struct smb_hdr));
Steve French39798772006-05-31 22:40:51 +0000698#ifdef CONFIG_CIFS_DEBUG2
699 cifs_dump_detail(smb_buffer);
700 cifs_dump_mids(server);
701#endif /* CIFS_DEBUG2 */
Steve French50c2f752007-07-13 00:33:32 +0000702
Steve Frenche4eb2952005-04-28 22:41:09 -0700703 }
704 } /* end while !EXITING */
705
Jeff Laytone7ddee92008-11-14 13:44:38 -0500706 /* take it off the list, if it's not already */
Suresh Jayaraman3f9bcca2010-10-18 23:29:37 +0530707 spin_lock(&cifs_tcp_ses_lock);
Jeff Laytone7ddee92008-11-14 13:44:38 -0500708 list_del_init(&server->tcp_ses_list);
Suresh Jayaraman3f9bcca2010-10-18 23:29:37 +0530709 spin_unlock(&cifs_tcp_ses_lock);
Jeff Laytone7ddee92008-11-14 13:44:38 -0500710
Linus Torvalds1da177e2005-04-16 15:20:36 -0700711 spin_lock(&GlobalMid_Lock);
712 server->tcpStatus = CifsExiting;
Steve Frenche691b9d2008-05-11 15:53:33 +0000713 spin_unlock(&GlobalMid_Lock);
Steve Frenchdbdbb872008-06-10 21:21:56 +0000714 wake_up_all(&server->response_q);
Steve Frenche691b9d2008-05-11 15:53:33 +0000715
Steve French31ca3bc2005-04-28 22:41:11 -0700716 /* check if we have blocked requests that need to free */
717 /* Note that cifs_max_pending is normally 50, but
718 can be set at module install time to as little as two */
Steve Frenche691b9d2008-05-11 15:53:33 +0000719 spin_lock(&GlobalMid_Lock);
Steve Frenchfb8c4b12007-07-10 01:16:18 +0000720 if (atomic_read(&server->inFlight) >= cifs_max_pending)
Steve French31ca3bc2005-04-28 22:41:11 -0700721 atomic_set(&server->inFlight, cifs_max_pending - 1);
722 /* We do not want to set the max_pending too low or we
723 could end up with the counter going negative */
Linus Torvalds1da177e2005-04-16 15:20:36 -0700724 spin_unlock(&GlobalMid_Lock);
Steve French50c2f752007-07-13 00:33:32 +0000725 /* Although there should not be any requests blocked on
Linus Torvalds1da177e2005-04-16 15:20:36 -0700726 this queue it can not hurt to be paranoid and try to wake up requests
Steve French09d1db52005-04-28 22:41:08 -0700727 that may haven been blocked when more than 50 at time were on the wire
Linus Torvalds1da177e2005-04-16 15:20:36 -0700728 to the same server - they now will see the session is in exit state
729 and get out of SendReceive. */
730 wake_up_all(&server->request_q);
731 /* give those requests time to exit */
Steve Frenchb8643e12005-04-28 22:41:07 -0700732 msleep(125);
Steve French50c2f752007-07-13 00:33:32 +0000733
Steve Frenchfb8c4b12007-07-10 01:16:18 +0000734 if (server->ssocket) {
Linus Torvalds1da177e2005-04-16 15:20:36 -0700735 sock_release(csocket);
736 server->ssocket = NULL;
737 }
Justin P. Mattockfd62cb72011-02-24 22:15:02 -0800738 /* buffer usually freed in free_mid - need to free it here on exit */
Mariusz Kozlowskia8a11d32007-10-03 16:41:24 +0000739 cifs_buf_release(bigbuf);
740 if (smallbuf) /* no sense logging a debug message if NULL */
Steve Frenchb8643e12005-04-28 22:41:07 -0700741 cifs_small_buf_release(smallbuf);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700742
Jeff Layton9d783152011-01-11 07:24:01 -0500743 if (!list_empty(&server->pending_mid_q)) {
Linus Torvalds1da177e2005-04-16 15:20:36 -0700744 spin_lock(&GlobalMid_Lock);
Jeff Layton2b84a36c2011-01-11 07:24:21 -0500745 list_for_each_safe(tmp, tmp2, &server->pending_mid_q) {
Jeff Layton9d783152011-01-11 07:24:01 -0500746 mid_entry = list_entry(tmp, struct mid_q_entry, qhead);
Jeff Layton2b84a36c2011-01-11 07:24:21 -0500747 cFYI(1, "Clearing Mid 0x%x - issuing callback",
748 mid_entry->mid);
749 list_del_init(&mid_entry->qhead);
750 mid_entry->callback(mid_entry);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700751 }
752 spin_unlock(&GlobalMid_Lock);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700753 /* 1/8th of sec is more than enough time for them to exit */
Steve Frenchb8643e12005-04-28 22:41:07 -0700754 msleep(125);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700755 }
756
Steve Frenchf1914012005-08-18 09:37:34 -0700757 if (!list_empty(&server->pending_mid_q)) {
Steve French50c2f752007-07-13 00:33:32 +0000758 /* mpx threads have not exited yet give them
Linus Torvalds1da177e2005-04-16 15:20:36 -0700759 at least the smb send timeout time for long ops */
Steve French31ca3bc2005-04-28 22:41:11 -0700760 /* due to delays on oplock break requests, we need
761 to wait at least 45 seconds before giving up
762 on a request getting a response and going ahead
763 and killing cifsd */
Joe Perchesb6b38f72010-04-21 03:50:45 +0000764 cFYI(1, "Wait for exit from demultiplex thread");
Steve French31ca3bc2005-04-28 22:41:11 -0700765 msleep(46000);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700766 /* if threads still have not exited they are probably never
767 coming home not much else we can do but free the memory */
768 }
Linus Torvalds1da177e2005-04-16 15:20:36 -0700769
Jeff Laytonc359cf32007-11-16 22:22:06 +0000770 kfree(server->hostname);
Jeff Laytonb1c8d2b2008-10-22 13:57:07 -0400771 task_to_wake = xchg(&server->tsk, NULL);
Steve French31ca3bc2005-04-28 22:41:11 -0700772 kfree(server);
Jeff Layton93d0ec82008-08-02 08:00:48 -0400773
774 length = atomic_dec_return(&tcpSesAllocCount);
Steve French26f57362007-08-30 22:09:15 +0000775 if (length > 0)
776 mempool_resize(cifs_req_poolp, length + cifs_min_rcv,
777 GFP_KERNEL);
Steve French50c2f752007-07-13 00:33:32 +0000778
Jeff Laytonb1c8d2b2008-10-22 13:57:07 -0400779 /* if server->tsk was NULL then wait for a signal before exiting */
780 if (!task_to_wake) {
781 set_current_state(TASK_INTERRUPTIBLE);
782 while (!signal_pending(current)) {
783 schedule();
784 set_current_state(TASK_INTERRUPTIBLE);
785 }
786 set_current_state(TASK_RUNNING);
787 }
788
Jeff Layton0468a2c2008-12-01 07:09:35 -0500789 module_put_and_exit(0);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700790}
791
Jeff Laytonc359cf32007-11-16 22:22:06 +0000792/* extract the host portion of the UNC string */
793static char *
794extract_hostname(const char *unc)
795{
796 const char *src;
797 char *dst, *delim;
798 unsigned int len;
799
800 /* skip double chars at beginning of string */
801 /* BB: check validity of these bytes? */
802 src = unc + 2;
803
804 /* delimiter between hostname and sharename is always '\\' now */
805 delim = strchr(src, '\\');
806 if (!delim)
807 return ERR_PTR(-EINVAL);
808
809 len = delim - src;
810 dst = kmalloc((len + 1), GFP_KERNEL);
811 if (dst == NULL)
812 return ERR_PTR(-ENOMEM);
813
814 memcpy(dst, src, len);
815 dst[len] = '\0';
816
817 return dst;
818}
819
Linus Torvalds1da177e2005-04-16 15:20:36 -0700820static int
Sean Finneyb9468452011-04-11 13:19:32 +0000821cifs_parse_mount_options(const char *mountdata, const char *devname,
Steve French50c2f752007-07-13 00:33:32 +0000822 struct smb_vol *vol)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700823{
Pavel Shilovsky4906e502011-04-14 22:00:56 +0400824 char *value, *data, *end;
Sean Finneyb9468452011-04-11 13:19:32 +0000825 char *mountdata_copy, *options;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700826 unsigned int temp_len, i, j;
827 char separator[2];
Jeff Layton9b9d6b242009-07-31 06:56:09 -0400828 short int override_uid = -1;
829 short int override_gid = -1;
830 bool uid_specified = false;
831 bool gid_specified = false;
Jeff Layton88463992010-11-22 15:31:03 -0500832 char *nodename = utsname()->nodename;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700833
834 separator[0] = ',';
Steve French50c2f752007-07-13 00:33:32 +0000835 separator[1] = 0;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700836
Jeff Layton88463992010-11-22 15:31:03 -0500837 /*
838 * does not have to be perfect mapping since field is
839 * informational, only used for servers that do not support
840 * port 445 and it can be overridden at mount time
841 */
Jeff Layton1397f2e2011-01-07 11:30:28 -0500842 memset(vol->source_rfc1001_name, 0x20, RFC1001_NAME_LEN);
843 for (i = 0; i < strnlen(nodename, RFC1001_NAME_LEN); i++)
Jeff Layton88463992010-11-22 15:31:03 -0500844 vol->source_rfc1001_name[i] = toupper(nodename[i]);
845
Jeff Layton1397f2e2011-01-07 11:30:28 -0500846 vol->source_rfc1001_name[RFC1001_NAME_LEN] = 0;
Steve Frencha10faeb22005-08-22 21:38:31 -0700847 /* null target name indicates to use *SMBSERVR default called name
848 if we end up sending RFC1001 session initialize */
849 vol->target_rfc1001_name[0] = 0;
Jeff Layton3e4b3e12010-07-19 18:00:17 -0400850 vol->cred_uid = current_uid();
851 vol->linux_uid = current_uid();
David Howellsa001e5b2008-11-14 10:38:47 +1100852 vol->linux_gid = current_gid();
Jeff Laytonf55ed1a2009-05-26 16:28:11 -0400853
854 /* default to only allowing write access to owner of the mount */
855 vol->dir_mode = vol->file_mode = S_IRUGO | S_IXUGO | S_IWUSR;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700856
857 /* vol->retry default is 0 (i.e. "soft" limited retry not hard retry) */
Jeremy Allisonac670552005-06-22 17:26:35 -0700858 /* default is always to request posix paths. */
859 vol->posix_paths = 1;
Jeff Laytona0c92172009-05-27 15:40:47 -0400860 /* default to using server inode numbers where available */
861 vol->server_ino = 1;
Jeremy Allisonac670552005-06-22 17:26:35 -0700862
Suresh Jayaraman6d20e842010-12-01 14:42:28 +0530863 vol->actimeo = CIFS_DEF_ACTIMEO;
864
Sean Finneyb9468452011-04-11 13:19:32 +0000865 if (!mountdata)
866 goto cifs_parse_mount_err;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700867
Sean Finneyb9468452011-04-11 13:19:32 +0000868 mountdata_copy = kstrndup(mountdata, PAGE_SIZE, GFP_KERNEL);
869 if (!mountdata_copy)
870 goto cifs_parse_mount_err;
871
872 options = mountdata_copy;
Pavel Shilovsky4906e502011-04-14 22:00:56 +0400873 end = options + strlen(options);
Steve French50c2f752007-07-13 00:33:32 +0000874 if (strncmp(options, "sep=", 4) == 0) {
Steve Frenchfb8c4b12007-07-10 01:16:18 +0000875 if (options[4] != 0) {
Linus Torvalds1da177e2005-04-16 15:20:36 -0700876 separator[0] = options[4];
877 options += 5;
878 } else {
Joe Perchesb6b38f72010-04-21 03:50:45 +0000879 cFYI(1, "Null separator not allowed");
Linus Torvalds1da177e2005-04-16 15:20:36 -0700880 }
881 }
Steve French50c2f752007-07-13 00:33:32 +0000882
Linus Torvalds1da177e2005-04-16 15:20:36 -0700883 while ((data = strsep(&options, separator)) != NULL) {
884 if (!*data)
885 continue;
886 if ((value = strchr(data, '=')) != NULL)
887 *value++ = '\0';
888
Steve French50c2f752007-07-13 00:33:32 +0000889 /* Have to parse this before we parse for "user" */
890 if (strnicmp(data, "user_xattr", 10) == 0) {
Linus Torvalds1da177e2005-04-16 15:20:36 -0700891 vol->no_xattr = 0;
Steve French50c2f752007-07-13 00:33:32 +0000892 } else if (strnicmp(data, "nouser_xattr", 12) == 0) {
Linus Torvalds1da177e2005-04-16 15:20:36 -0700893 vol->no_xattr = 1;
894 } else if (strnicmp(data, "user", 4) == 0) {
Steve French4b952a92006-10-30 21:46:13 +0000895 if (!value) {
Linus Torvalds1da177e2005-04-16 15:20:36 -0700896 printk(KERN_WARNING
897 "CIFS: invalid or missing username\n");
Sean Finneyb9468452011-04-11 13:19:32 +0000898 goto cifs_parse_mount_err;
Steve Frenchfb8c4b12007-07-10 01:16:18 +0000899 } else if (!*value) {
Steve French4b952a92006-10-30 21:46:13 +0000900 /* null user, ie anonymous, authentication */
901 vol->nullauth = 1;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700902 }
Steve French8727c8a2011-02-25 01:11:56 -0600903 if (strnlen(value, MAX_USERNAME_SIZE) <
904 MAX_USERNAME_SIZE) {
Sean Finneyb9468452011-04-11 13:19:32 +0000905 vol->username = kstrdup(value, GFP_KERNEL);
906 if (!vol->username) {
907 printk(KERN_WARNING "CIFS: no memory "
908 "for username\n");
909 goto cifs_parse_mount_err;
910 }
Linus Torvalds1da177e2005-04-16 15:20:36 -0700911 } else {
912 printk(KERN_WARNING "CIFS: username too long\n");
Sean Finneyb9468452011-04-11 13:19:32 +0000913 goto cifs_parse_mount_err;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700914 }
915 } else if (strnicmp(data, "pass", 4) == 0) {
916 if (!value) {
917 vol->password = NULL;
918 continue;
Steve Frenchfb8c4b12007-07-10 01:16:18 +0000919 } else if (value[0] == 0) {
Linus Torvalds1da177e2005-04-16 15:20:36 -0700920 /* check if string begins with double comma
921 since that would mean the password really
922 does start with a comma, and would not
923 indicate an empty string */
Steve Frenchfb8c4b12007-07-10 01:16:18 +0000924 if (value[1] != separator[0]) {
Linus Torvalds1da177e2005-04-16 15:20:36 -0700925 vol->password = NULL;
926 continue;
927 }
928 }
929 temp_len = strlen(value);
930 /* removed password length check, NTLM passwords
931 can be arbitrarily long */
932
Steve French50c2f752007-07-13 00:33:32 +0000933 /* if comma in password, the string will be
Linus Torvalds1da177e2005-04-16 15:20:36 -0700934 prematurely null terminated. Commas in password are
935 specified across the cifs mount interface by a double
936 comma ie ,, and a comma used as in other cases ie ','
937 as a parameter delimiter/separator is single and due
938 to the strsep above is temporarily zeroed. */
939
940 /* NB: password legally can have multiple commas and
941 the only illegal character in a password is null */
942
Steve French50c2f752007-07-13 00:33:32 +0000943 if ((value[temp_len] == 0) &&
Pavel Shilovsky4906e502011-04-14 22:00:56 +0400944 (value + temp_len < end) &&
Steve French09d1db52005-04-28 22:41:08 -0700945 (value[temp_len+1] == separator[0])) {
Linus Torvalds1da177e2005-04-16 15:20:36 -0700946 /* reinsert comma */
947 value[temp_len] = separator[0];
Steve French50c2f752007-07-13 00:33:32 +0000948 temp_len += 2; /* move after second comma */
949 while (value[temp_len] != 0) {
Linus Torvalds1da177e2005-04-16 15:20:36 -0700950 if (value[temp_len] == separator[0]) {
Steve French50c2f752007-07-13 00:33:32 +0000951 if (value[temp_len+1] ==
Steve French09d1db52005-04-28 22:41:08 -0700952 separator[0]) {
953 /* skip second comma */
954 temp_len++;
Steve French50c2f752007-07-13 00:33:32 +0000955 } else {
Linus Torvalds1da177e2005-04-16 15:20:36 -0700956 /* single comma indicating start
957 of next parm */
958 break;
959 }
960 }
961 temp_len++;
962 }
Steve Frenchfb8c4b12007-07-10 01:16:18 +0000963 if (value[temp_len] == 0) {
Linus Torvalds1da177e2005-04-16 15:20:36 -0700964 options = NULL;
965 } else {
966 value[temp_len] = 0;
967 /* point option to start of next parm */
968 options = value + temp_len + 1;
969 }
Steve French50c2f752007-07-13 00:33:32 +0000970 /* go from value to value + temp_len condensing
Linus Torvalds1da177e2005-04-16 15:20:36 -0700971 double commas to singles. Note that this ends up
972 allocating a few bytes too many, which is ok */
Pekka Enberge915fc42005-09-06 15:18:35 -0700973 vol->password = kzalloc(temp_len, GFP_KERNEL);
Steve Frenchfb8c4b12007-07-10 01:16:18 +0000974 if (vol->password == NULL) {
Steve French50c2f752007-07-13 00:33:32 +0000975 printk(KERN_WARNING "CIFS: no memory "
976 "for password\n");
Sean Finneyb9468452011-04-11 13:19:32 +0000977 goto cifs_parse_mount_err;
Steve French433dc242005-04-28 22:41:08 -0700978 }
Steve French50c2f752007-07-13 00:33:32 +0000979 for (i = 0, j = 0; i < temp_len; i++, j++) {
Linus Torvalds1da177e2005-04-16 15:20:36 -0700980 vol->password[j] = value[i];
Steve Frenchfb8c4b12007-07-10 01:16:18 +0000981 if (value[i] == separator[0]
Steve French09d1db52005-04-28 22:41:08 -0700982 && value[i+1] == separator[0]) {
Linus Torvalds1da177e2005-04-16 15:20:36 -0700983 /* skip second comma */
984 i++;
985 }
986 }
987 vol->password[j] = 0;
988 } else {
Pekka Enberge915fc42005-09-06 15:18:35 -0700989 vol->password = kzalloc(temp_len+1, GFP_KERNEL);
Steve Frenchfb8c4b12007-07-10 01:16:18 +0000990 if (vol->password == NULL) {
Steve French50c2f752007-07-13 00:33:32 +0000991 printk(KERN_WARNING "CIFS: no memory "
992 "for password\n");
Sean Finneyb9468452011-04-11 13:19:32 +0000993 goto cifs_parse_mount_err;
Steve French433dc242005-04-28 22:41:08 -0700994 }
Linus Torvalds1da177e2005-04-16 15:20:36 -0700995 strcpy(vol->password, value);
996 }
Jeff Layton58f7f682009-06-10 09:57:55 -0400997 } else if (!strnicmp(data, "ip", 2) ||
998 !strnicmp(data, "addr", 4)) {
Linus Torvalds1da177e2005-04-16 15:20:36 -0700999 if (!value || !*value) {
1000 vol->UNCip = NULL;
Jeff Layton50b64e32009-06-02 06:55:20 -04001001 } else if (strnlen(value, INET6_ADDRSTRLEN) <
1002 INET6_ADDRSTRLEN) {
Sean Finneyb9468452011-04-11 13:19:32 +00001003 vol->UNCip = kstrdup(value, GFP_KERNEL);
1004 if (!vol->UNCip) {
1005 printk(KERN_WARNING "CIFS: no memory "
1006 "for UNC IP\n");
1007 goto cifs_parse_mount_err;
1008 }
Linus Torvalds1da177e2005-04-16 15:20:36 -07001009 } else {
Steve French50c2f752007-07-13 00:33:32 +00001010 printk(KERN_WARNING "CIFS: ip address "
1011 "too long\n");
Sean Finneyb9468452011-04-11 13:19:32 +00001012 goto cifs_parse_mount_err;
Linus Torvalds1da177e2005-04-16 15:20:36 -07001013 }
Steve French50c2f752007-07-13 00:33:32 +00001014 } else if (strnicmp(data, "sec", 3) == 0) {
1015 if (!value || !*value) {
Joe Perchesb6b38f72010-04-21 03:50:45 +00001016 cERROR(1, "no security value specified");
Steve French50c2f752007-07-13 00:33:32 +00001017 continue;
1018 } else if (strnicmp(value, "krb5i", 5) == 0) {
1019 vol->secFlg |= CIFSSEC_MAY_KRB5 |
Steve French189acaa2006-06-23 02:33:48 +00001020 CIFSSEC_MUST_SIGN;
Steve Frenchbf820672005-12-01 22:32:42 -08001021 } else if (strnicmp(value, "krb5p", 5) == 0) {
Steve French50c2f752007-07-13 00:33:32 +00001022 /* vol->secFlg |= CIFSSEC_MUST_SEAL |
1023 CIFSSEC_MAY_KRB5; */
Joe Perchesb6b38f72010-04-21 03:50:45 +00001024 cERROR(1, "Krb5 cifs privacy not supported");
Sean Finneyb9468452011-04-11 13:19:32 +00001025 goto cifs_parse_mount_err;
Steve Frenchbf820672005-12-01 22:32:42 -08001026 } else if (strnicmp(value, "krb5", 4) == 0) {
Steve French750d1152006-06-27 06:28:30 +00001027 vol->secFlg |= CIFSSEC_MAY_KRB5;
Steve Frenchac683922009-05-06 04:16:04 +00001028 } else if (strnicmp(value, "ntlmsspi", 8) == 0) {
1029 vol->secFlg |= CIFSSEC_MAY_NTLMSSP |
1030 CIFSSEC_MUST_SIGN;
1031 } else if (strnicmp(value, "ntlmssp", 7) == 0) {
1032 vol->secFlg |= CIFSSEC_MAY_NTLMSSP;
Steve Frenchbf820672005-12-01 22:32:42 -08001033 } else if (strnicmp(value, "ntlmv2i", 7) == 0) {
Steve French750d1152006-06-27 06:28:30 +00001034 vol->secFlg |= CIFSSEC_MAY_NTLMV2 |
Steve French189acaa2006-06-23 02:33:48 +00001035 CIFSSEC_MUST_SIGN;
Steve Frenchbf820672005-12-01 22:32:42 -08001036 } else if (strnicmp(value, "ntlmv2", 6) == 0) {
Steve French750d1152006-06-27 06:28:30 +00001037 vol->secFlg |= CIFSSEC_MAY_NTLMV2;
Steve Frenchbf820672005-12-01 22:32:42 -08001038 } else if (strnicmp(value, "ntlmi", 5) == 0) {
Steve French750d1152006-06-27 06:28:30 +00001039 vol->secFlg |= CIFSSEC_MAY_NTLM |
Steve French189acaa2006-06-23 02:33:48 +00001040 CIFSSEC_MUST_SIGN;
Steve Frenchbf820672005-12-01 22:32:42 -08001041 } else if (strnicmp(value, "ntlm", 4) == 0) {
1042 /* ntlm is default so can be turned off too */
Steve French750d1152006-06-27 06:28:30 +00001043 vol->secFlg |= CIFSSEC_MAY_NTLM;
Steve Frenchbf820672005-12-01 22:32:42 -08001044 } else if (strnicmp(value, "nontlm", 6) == 0) {
Steve French189acaa2006-06-23 02:33:48 +00001045 /* BB is there a better way to do this? */
Steve French750d1152006-06-27 06:28:30 +00001046 vol->secFlg |= CIFSSEC_MAY_NTLMV2;
Steve French189acaa2006-06-23 02:33:48 +00001047#ifdef CONFIG_CIFS_WEAK_PW_HASH
1048 } else if (strnicmp(value, "lanman", 6) == 0) {
Steve French50c2f752007-07-13 00:33:32 +00001049 vol->secFlg |= CIFSSEC_MAY_LANMAN;
Steve French189acaa2006-06-23 02:33:48 +00001050#endif
Steve Frenchbf820672005-12-01 22:32:42 -08001051 } else if (strnicmp(value, "none", 4) == 0) {
Steve French189acaa2006-06-23 02:33:48 +00001052 vol->nullauth = 1;
Steve French50c2f752007-07-13 00:33:32 +00001053 } else {
Joe Perchesb6b38f72010-04-21 03:50:45 +00001054 cERROR(1, "bad security option: %s", value);
Sean Finneyb9468452011-04-11 13:19:32 +00001055 goto cifs_parse_mount_err;
Steve French50c2f752007-07-13 00:33:32 +00001056 }
Steve French1cb06d02011-02-24 18:07:19 +00001057 } else if (strnicmp(data, "vers", 3) == 0) {
1058 if (!value || !*value) {
1059 cERROR(1, "no protocol version specified"
1060 " after vers= mount option");
1061 } else if ((strnicmp(value, "cifs", 4) == 0) ||
1062 (strnicmp(value, "1", 1) == 0)) {
1063 /* this is the default */
1064 continue;
1065 } else if ((strnicmp(value, "smb2", 4) == 0) ||
1066 (strnicmp(value, "2", 1) == 0)) {
1067#ifdef CONFIG_CIFS_SMB2
1068 vol->use_smb2 = true;
1069#else
1070 cERROR(1, "smb2 support not enabled");
1071#endif /* CONFIG_CIFS_SMB2 */
1072 }
Linus Torvalds1da177e2005-04-16 15:20:36 -07001073 } else if ((strnicmp(data, "unc", 3) == 0)
1074 || (strnicmp(data, "target", 6) == 0)
1075 || (strnicmp(data, "path", 4) == 0)) {
1076 if (!value || !*value) {
Steve French50c2f752007-07-13 00:33:32 +00001077 printk(KERN_WARNING "CIFS: invalid path to "
1078 "network resource\n");
Sean Finneyb9468452011-04-11 13:19:32 +00001079 goto cifs_parse_mount_err;
Linus Torvalds1da177e2005-04-16 15:20:36 -07001080 }
1081 if ((temp_len = strnlen(value, 300)) < 300) {
Steve French50c2f752007-07-13 00:33:32 +00001082 vol->UNC = kmalloc(temp_len+1, GFP_KERNEL);
Steve French4523cc32007-04-30 20:13:06 +00001083 if (vol->UNC == NULL)
Sean Finneyb9468452011-04-11 13:19:32 +00001084 goto cifs_parse_mount_err;
Steve French50c2f752007-07-13 00:33:32 +00001085 strcpy(vol->UNC, value);
Linus Torvalds1da177e2005-04-16 15:20:36 -07001086 if (strncmp(vol->UNC, "//", 2) == 0) {
1087 vol->UNC[0] = '\\';
1088 vol->UNC[1] = '\\';
Steve French50c2f752007-07-13 00:33:32 +00001089 } else if (strncmp(vol->UNC, "\\\\", 2) != 0) {
Linus Torvalds1da177e2005-04-16 15:20:36 -07001090 printk(KERN_WARNING
Steve French50c2f752007-07-13 00:33:32 +00001091 "CIFS: UNC Path does not begin "
1092 "with // or \\\\ \n");
Sean Finneyb9468452011-04-11 13:19:32 +00001093 goto cifs_parse_mount_err;
Linus Torvalds1da177e2005-04-16 15:20:36 -07001094 }
1095 } else {
1096 printk(KERN_WARNING "CIFS: UNC name too long\n");
Sean Finneyb9468452011-04-11 13:19:32 +00001097 goto cifs_parse_mount_err;
Linus Torvalds1da177e2005-04-16 15:20:36 -07001098 }
1099 } else if ((strnicmp(data, "domain", 3) == 0)
1100 || (strnicmp(data, "workgroup", 5) == 0)) {
1101 if (!value || !*value) {
1102 printk(KERN_WARNING "CIFS: invalid domain name\n");
Sean Finneyb9468452011-04-11 13:19:32 +00001103 goto cifs_parse_mount_err;
Linus Torvalds1da177e2005-04-16 15:20:36 -07001104 }
1105 /* BB are there cases in which a comma can be valid in
1106 a domain name and need special handling? */
Steve French39798772006-05-31 22:40:51 +00001107 if (strnlen(value, 256) < 256) {
Sean Finneyb9468452011-04-11 13:19:32 +00001108 vol->domainname = kstrdup(value, GFP_KERNEL);
1109 if (!vol->domainname) {
1110 printk(KERN_WARNING "CIFS: no memory "
1111 "for domainname\n");
1112 goto cifs_parse_mount_err;
1113 }
Joe Perchesb6b38f72010-04-21 03:50:45 +00001114 cFYI(1, "Domain name set");
Linus Torvalds1da177e2005-04-16 15:20:36 -07001115 } else {
Steve French50c2f752007-07-13 00:33:32 +00001116 printk(KERN_WARNING "CIFS: domain name too "
1117 "long\n");
Sean Finneyb9468452011-04-11 13:19:32 +00001118 goto cifs_parse_mount_err;
Linus Torvalds1da177e2005-04-16 15:20:36 -07001119 }
Ben Greear3eb9a882010-09-01 17:06:02 -07001120 } else if (strnicmp(data, "srcaddr", 7) == 0) {
1121 vol->srcaddr.ss_family = AF_UNSPEC;
1122
1123 if (!value || !*value) {
1124 printk(KERN_WARNING "CIFS: srcaddr value"
1125 " not specified.\n");
Sean Finneyb9468452011-04-11 13:19:32 +00001126 goto cifs_parse_mount_err;
Ben Greear3eb9a882010-09-01 17:06:02 -07001127 }
1128 i = cifs_convert_address((struct sockaddr *)&vol->srcaddr,
1129 value, strlen(value));
Dan Carpenterb235f372010-10-25 07:02:56 +02001130 if (i == 0) {
Ben Greear3eb9a882010-09-01 17:06:02 -07001131 printk(KERN_WARNING "CIFS: Could not parse"
1132 " srcaddr: %s\n",
1133 value);
Sean Finneyb9468452011-04-11 13:19:32 +00001134 goto cifs_parse_mount_err;
Ben Greear3eb9a882010-09-01 17:06:02 -07001135 }
Steve French50c2f752007-07-13 00:33:32 +00001136 } else if (strnicmp(data, "prefixpath", 10) == 0) {
1137 if (!value || !*value) {
1138 printk(KERN_WARNING
1139 "CIFS: invalid path prefix\n");
Sean Finneyb9468452011-04-11 13:19:32 +00001140 goto cifs_parse_mount_err;
Steve French50c2f752007-07-13 00:33:32 +00001141 }
1142 if ((temp_len = strnlen(value, 1024)) < 1024) {
Steve French4523cc32007-04-30 20:13:06 +00001143 if (value[0] != '/')
Steve French2fe87f02006-09-21 07:02:52 +00001144 temp_len++; /* missing leading slash */
Steve French50c2f752007-07-13 00:33:32 +00001145 vol->prepath = kmalloc(temp_len+1, GFP_KERNEL);
1146 if (vol->prepath == NULL)
Sean Finneyb9468452011-04-11 13:19:32 +00001147 goto cifs_parse_mount_err;
Steve French4523cc32007-04-30 20:13:06 +00001148 if (value[0] != '/') {
Steve French2fe87f02006-09-21 07:02:52 +00001149 vol->prepath[0] = '/';
Steve French50c2f752007-07-13 00:33:32 +00001150 strcpy(vol->prepath+1, value);
Steve French2fe87f02006-09-21 07:02:52 +00001151 } else
Steve French50c2f752007-07-13 00:33:32 +00001152 strcpy(vol->prepath, value);
Joe Perchesb6b38f72010-04-21 03:50:45 +00001153 cFYI(1, "prefix path %s", vol->prepath);
Steve French50c2f752007-07-13 00:33:32 +00001154 } else {
1155 printk(KERN_WARNING "CIFS: prefix too long\n");
Sean Finneyb9468452011-04-11 13:19:32 +00001156 goto cifs_parse_mount_err;
Steve French50c2f752007-07-13 00:33:32 +00001157 }
Linus Torvalds1da177e2005-04-16 15:20:36 -07001158 } else if (strnicmp(data, "iocharset", 9) == 0) {
1159 if (!value || !*value) {
Steve French63135e02007-07-17 17:34:02 +00001160 printk(KERN_WARNING "CIFS: invalid iocharset "
1161 "specified\n");
Sean Finneyb9468452011-04-11 13:19:32 +00001162 goto cifs_parse_mount_err;
Linus Torvalds1da177e2005-04-16 15:20:36 -07001163 }
1164 if (strnlen(value, 65) < 65) {
Sean Finneyb9468452011-04-11 13:19:32 +00001165 if (strnicmp(value, "default", 7)) {
1166 vol->iocharset = kstrdup(value,
1167 GFP_KERNEL);
1168
1169 if (!vol->iocharset) {
1170 printk(KERN_WARNING "CIFS: no "
1171 "memory for"
1172 "charset\n");
1173 goto cifs_parse_mount_err;
1174 }
1175 }
Steve French50c2f752007-07-13 00:33:32 +00001176 /* if iocharset not set then load_nls_default
1177 is used by caller */
Joe Perchesb6b38f72010-04-21 03:50:45 +00001178 cFYI(1, "iocharset set to %s", value);
Linus Torvalds1da177e2005-04-16 15:20:36 -07001179 } else {
Steve French63135e02007-07-17 17:34:02 +00001180 printk(KERN_WARNING "CIFS: iocharset name "
1181 "too long.\n");
Sean Finneyb9468452011-04-11 13:19:32 +00001182 goto cifs_parse_mount_err;
Linus Torvalds1da177e2005-04-16 15:20:36 -07001183 }
Jeff Layton9b9d6b242009-07-31 06:56:09 -04001184 } else if (!strnicmp(data, "uid", 3) && value && *value) {
1185 vol->linux_uid = simple_strtoul(value, &value, 0);
1186 uid_specified = true;
Jeff Laytonbd763312011-01-11 10:33:24 -05001187 } else if (!strnicmp(data, "cruid", 5) && value && *value) {
1188 vol->cred_uid = simple_strtoul(value, &value, 0);
Jeff Layton9b9d6b242009-07-31 06:56:09 -04001189 } else if (!strnicmp(data, "forceuid", 8)) {
1190 override_uid = 1;
1191 } else if (!strnicmp(data, "noforceuid", 10)) {
1192 override_uid = 0;
1193 } else if (!strnicmp(data, "gid", 3) && value && *value) {
1194 vol->linux_gid = simple_strtoul(value, &value, 0);
1195 gid_specified = true;
1196 } else if (!strnicmp(data, "forcegid", 8)) {
1197 override_gid = 1;
1198 } else if (!strnicmp(data, "noforcegid", 10)) {
1199 override_gid = 0;
Linus Torvalds1da177e2005-04-16 15:20:36 -07001200 } else if (strnicmp(data, "file_mode", 4) == 0) {
1201 if (value && *value) {
1202 vol->file_mode =
1203 simple_strtoul(value, &value, 0);
1204 }
1205 } else if (strnicmp(data, "dir_mode", 4) == 0) {
1206 if (value && *value) {
1207 vol->dir_mode =
1208 simple_strtoul(value, &value, 0);
1209 }
1210 } else if (strnicmp(data, "dirmode", 4) == 0) {
1211 if (value && *value) {
1212 vol->dir_mode =
1213 simple_strtoul(value, &value, 0);
1214 }
1215 } else if (strnicmp(data, "port", 4) == 0) {
1216 if (value && *value) {
1217 vol->port =
1218 simple_strtoul(value, &value, 0);
1219 }
1220 } else if (strnicmp(data, "rsize", 5) == 0) {
1221 if (value && *value) {
1222 vol->rsize =
1223 simple_strtoul(value, &value, 0);
1224 }
1225 } else if (strnicmp(data, "wsize", 5) == 0) {
1226 if (value && *value) {
1227 vol->wsize =
1228 simple_strtoul(value, &value, 0);
1229 }
1230 } else if (strnicmp(data, "sockopt", 5) == 0) {
Steve French6a5fa2362010-01-01 01:28:43 +00001231 if (!value || !*value) {
Joe Perchesb6b38f72010-04-21 03:50:45 +00001232 cERROR(1, "no socket option specified");
Steve French6a5fa2362010-01-01 01:28:43 +00001233 continue;
1234 } else if (strnicmp(value, "TCP_NODELAY", 11) == 0) {
1235 vol->sockopt_tcp_nodelay = 1;
Linus Torvalds1da177e2005-04-16 15:20:36 -07001236 }
1237 } else if (strnicmp(data, "netbiosname", 4) == 0) {
1238 if (!value || !*value || (*value == ' ')) {
Joe Perchesb6b38f72010-04-21 03:50:45 +00001239 cFYI(1, "invalid (empty) netbiosname");
Linus Torvalds1da177e2005-04-16 15:20:36 -07001240 } else {
Jeff Layton1397f2e2011-01-07 11:30:28 -05001241 memset(vol->source_rfc1001_name, 0x20,
1242 RFC1001_NAME_LEN);
1243 /*
1244 * FIXME: are there cases in which a comma can
1245 * be valid in workstation netbios name (and
1246 * need special handling)?
1247 */
1248 for (i = 0; i < RFC1001_NAME_LEN; i++) {
1249 /* don't ucase netbiosname for user */
Steve French50c2f752007-07-13 00:33:32 +00001250 if (value[i] == 0)
Linus Torvalds1da177e2005-04-16 15:20:36 -07001251 break;
Jeff Layton1397f2e2011-01-07 11:30:28 -05001252 vol->source_rfc1001_name[i] = value[i];
Linus Torvalds1da177e2005-04-16 15:20:36 -07001253 }
1254 /* The string has 16th byte zero still from
1255 set at top of the function */
Jeff Layton1397f2e2011-01-07 11:30:28 -05001256 if (i == RFC1001_NAME_LEN && value[i] != 0)
Steve French50c2f752007-07-13 00:33:32 +00001257 printk(KERN_WARNING "CIFS: netbiosname"
1258 " longer than 15 truncated.\n");
Steve Frencha10faeb22005-08-22 21:38:31 -07001259 }
1260 } else if (strnicmp(data, "servern", 7) == 0) {
1261 /* servernetbiosname specified override *SMBSERVER */
1262 if (!value || !*value || (*value == ' ')) {
Joe Perchesb6b38f72010-04-21 03:50:45 +00001263 cFYI(1, "empty server netbiosname specified");
Steve Frencha10faeb22005-08-22 21:38:31 -07001264 } else {
1265 /* last byte, type, is 0x20 for servr type */
Jeff Layton1397f2e2011-01-07 11:30:28 -05001266 memset(vol->target_rfc1001_name, 0x20,
1267 RFC1001_NAME_LEN_WITH_NULL);
Steve Frencha10faeb22005-08-22 21:38:31 -07001268
Steve French50c2f752007-07-13 00:33:32 +00001269 for (i = 0; i < 15; i++) {
Steve Frencha10faeb22005-08-22 21:38:31 -07001270 /* BB are there cases in which a comma can be
Steve French50c2f752007-07-13 00:33:32 +00001271 valid in this workstation netbios name
1272 (and need special handling)? */
Steve Frencha10faeb22005-08-22 21:38:31 -07001273
Steve French50c2f752007-07-13 00:33:32 +00001274 /* user or mount helper must uppercase
1275 the netbiosname */
1276 if (value[i] == 0)
Steve Frencha10faeb22005-08-22 21:38:31 -07001277 break;
1278 else
Steve French50c2f752007-07-13 00:33:32 +00001279 vol->target_rfc1001_name[i] =
1280 value[i];
Steve Frencha10faeb22005-08-22 21:38:31 -07001281 }
1282 /* The string has 16th byte zero still from
1283 set at top of the function */
Jeff Layton1397f2e2011-01-07 11:30:28 -05001284 if (i == RFC1001_NAME_LEN && value[i] != 0)
Steve French50c2f752007-07-13 00:33:32 +00001285 printk(KERN_WARNING "CIFS: server net"
1286 "biosname longer than 15 truncated.\n");
Linus Torvalds1da177e2005-04-16 15:20:36 -07001287 }
Suresh Jayaraman6d20e842010-12-01 14:42:28 +05301288 } else if (strnicmp(data, "actimeo", 7) == 0) {
1289 if (value && *value) {
1290 vol->actimeo = HZ * simple_strtoul(value,
1291 &value, 0);
1292 if (vol->actimeo > CIFS_MAX_ACTIMEO) {
1293 cERROR(1, "CIFS: attribute cache"
1294 "timeout too large");
Sean Finneyb9468452011-04-11 13:19:32 +00001295 goto cifs_parse_mount_err;
Suresh Jayaraman6d20e842010-12-01 14:42:28 +05301296 }
1297 }
Linus Torvalds1da177e2005-04-16 15:20:36 -07001298 } else if (strnicmp(data, "credentials", 4) == 0) {
1299 /* ignore */
1300 } else if (strnicmp(data, "version", 3) == 0) {
1301 /* ignore */
Steve French50c2f752007-07-13 00:33:32 +00001302 } else if (strnicmp(data, "guest", 5) == 0) {
Linus Torvalds1da177e2005-04-16 15:20:36 -07001303 /* ignore */
Steve French71a394f2009-06-26 04:07:18 +00001304 } else if (strnicmp(data, "rw", 2) == 0) {
1305 /* ignore */
1306 } else if (strnicmp(data, "ro", 2) == 0) {
1307 /* ignore */
Steve Frenchedf1ae42008-10-29 00:47:57 +00001308 } else if (strnicmp(data, "noblocksend", 11) == 0) {
1309 vol->noblocksnd = 1;
1310 } else if (strnicmp(data, "noautotune", 10) == 0) {
1311 vol->noautotune = 1;
Linus Torvalds1da177e2005-04-16 15:20:36 -07001312 } else if ((strnicmp(data, "suid", 4) == 0) ||
1313 (strnicmp(data, "nosuid", 6) == 0) ||
1314 (strnicmp(data, "exec", 4) == 0) ||
1315 (strnicmp(data, "noexec", 6) == 0) ||
1316 (strnicmp(data, "nodev", 5) == 0) ||
1317 (strnicmp(data, "noauto", 6) == 0) ||
1318 (strnicmp(data, "dev", 3) == 0)) {
1319 /* The mount tool or mount.cifs helper (if present)
Steve French50c2f752007-07-13 00:33:32 +00001320 uses these opts to set flags, and the flags are read
1321 by the kernel vfs layer before we get here (ie
1322 before read super) so there is no point trying to
1323 parse these options again and set anything and it
1324 is ok to just ignore them */
Linus Torvalds1da177e2005-04-16 15:20:36 -07001325 continue;
Linus Torvalds1da177e2005-04-16 15:20:36 -07001326 } else if (strnicmp(data, "hard", 4) == 0) {
1327 vol->retry = 1;
1328 } else if (strnicmp(data, "soft", 4) == 0) {
1329 vol->retry = 0;
1330 } else if (strnicmp(data, "perm", 4) == 0) {
1331 vol->noperm = 0;
1332 } else if (strnicmp(data, "noperm", 6) == 0) {
1333 vol->noperm = 1;
Steve French6a0b4822005-04-28 22:41:05 -07001334 } else if (strnicmp(data, "mapchars", 8) == 0) {
1335 vol->remap = 1;
1336 } else if (strnicmp(data, "nomapchars", 10) == 0) {
1337 vol->remap = 0;
Steve French50c2f752007-07-13 00:33:32 +00001338 } else if (strnicmp(data, "sfu", 3) == 0) {
1339 vol->sfu_emul = 1;
1340 } else if (strnicmp(data, "nosfu", 5) == 0) {
1341 vol->sfu_emul = 0;
Steve French2c1b8612008-10-16 18:35:21 +00001342 } else if (strnicmp(data, "nodfs", 5) == 0) {
1343 vol->nodfs = 1;
Jeremy Allisonac670552005-06-22 17:26:35 -07001344 } else if (strnicmp(data, "posixpaths", 10) == 0) {
1345 vol->posix_paths = 1;
1346 } else if (strnicmp(data, "noposixpaths", 12) == 0) {
1347 vol->posix_paths = 0;
Steve Frenchc18c8422007-07-18 23:21:09 +00001348 } else if (strnicmp(data, "nounix", 6) == 0) {
1349 vol->no_linux_ext = 1;
1350 } else if (strnicmp(data, "nolinux", 7) == 0) {
1351 vol->no_linux_ext = 1;
Steve French50c2f752007-07-13 00:33:32 +00001352 } else if ((strnicmp(data, "nocase", 6) == 0) ||
Steve Frencha10faeb22005-08-22 21:38:31 -07001353 (strnicmp(data, "ignorecase", 10) == 0)) {
Steve French50c2f752007-07-13 00:33:32 +00001354 vol->nocase = 1;
Jeff Laytonf636a342010-07-26 10:29:58 -04001355 } else if (strnicmp(data, "mand", 4) == 0) {
1356 /* ignore */
1357 } else if (strnicmp(data, "nomand", 6) == 0) {
1358 /* ignore */
1359 } else if (strnicmp(data, "_netdev", 7) == 0) {
1360 /* ignore */
Steve Frenchc46fa8a2005-08-18 20:49:57 -07001361 } else if (strnicmp(data, "brl", 3) == 0) {
1362 vol->nobrl = 0;
Steve French50c2f752007-07-13 00:33:32 +00001363 } else if ((strnicmp(data, "nobrl", 5) == 0) ||
Steve French1c955182005-08-30 20:58:07 -07001364 (strnicmp(data, "nolock", 6) == 0)) {
Steve Frenchc46fa8a2005-08-18 20:49:57 -07001365 vol->nobrl = 1;
Steve Frenchd3485d32005-08-19 11:04:29 -07001366 /* turn off mandatory locking in mode
1367 if remote locking is turned off since the
1368 local vfs will do advisory */
Steve French50c2f752007-07-13 00:33:32 +00001369 if (vol->file_mode ==
1370 (S_IALLUGO & ~(S_ISUID | S_IXGRP)))
Steve Frenchd3485d32005-08-19 11:04:29 -07001371 vol->file_mode = S_IALLUGO;
Steve French13a6e422008-12-02 17:24:33 +00001372 } else if (strnicmp(data, "forcemandatorylock", 9) == 0) {
1373 /* will take the shorter form "forcemand" as well */
1374 /* This mount option will force use of mandatory
1375 (DOS/Windows style) byte range locks, instead of
1376 using posix advisory byte range locks, even if the
1377 Unix extensions are available and posix locks would
1378 be supported otherwise. If Unix extensions are not
1379 negotiated this has no effect since mandatory locks
1380 would be used (mandatory locks is all that those
1381 those servers support) */
1382 vol->mand_lock = 1;
Linus Torvalds1da177e2005-04-16 15:20:36 -07001383 } else if (strnicmp(data, "setuids", 7) == 0) {
1384 vol->setuids = 1;
1385 } else if (strnicmp(data, "nosetuids", 9) == 0) {
1386 vol->setuids = 0;
Jeff Laytond0a9c072008-05-12 22:23:49 +00001387 } else if (strnicmp(data, "dynperm", 7) == 0) {
1388 vol->dynperm = true;
1389 } else if (strnicmp(data, "nodynperm", 9) == 0) {
1390 vol->dynperm = false;
Linus Torvalds1da177e2005-04-16 15:20:36 -07001391 } else if (strnicmp(data, "nohard", 6) == 0) {
1392 vol->retry = 0;
1393 } else if (strnicmp(data, "nosoft", 6) == 0) {
1394 vol->retry = 1;
1395 } else if (strnicmp(data, "nointr", 6) == 0) {
1396 vol->intr = 0;
1397 } else if (strnicmp(data, "intr", 4) == 0) {
1398 vol->intr = 1;
Steve Frenchbe652442009-02-23 15:21:59 +00001399 } else if (strnicmp(data, "nostrictsync", 12) == 0) {
1400 vol->nostrictsync = 1;
1401 } else if (strnicmp(data, "strictsync", 10) == 0) {
1402 vol->nostrictsync = 0;
Steve French50c2f752007-07-13 00:33:32 +00001403 } else if (strnicmp(data, "serverino", 7) == 0) {
Linus Torvalds1da177e2005-04-16 15:20:36 -07001404 vol->server_ino = 1;
Steve French50c2f752007-07-13 00:33:32 +00001405 } else if (strnicmp(data, "noserverino", 9) == 0) {
Linus Torvalds1da177e2005-04-16 15:20:36 -07001406 vol->server_ino = 0;
Steve French50c2f752007-07-13 00:33:32 +00001407 } else if (strnicmp(data, "cifsacl", 7) == 0) {
Steve French0a4b92c2006-01-12 15:44:21 -08001408 vol->cifs_acl = 1;
1409 } else if (strnicmp(data, "nocifsacl", 9) == 0) {
1410 vol->cifs_acl = 0;
Steve French50c2f752007-07-13 00:33:32 +00001411 } else if (strnicmp(data, "acl", 3) == 0) {
Linus Torvalds1da177e2005-04-16 15:20:36 -07001412 vol->no_psx_acl = 0;
Steve French50c2f752007-07-13 00:33:32 +00001413 } else if (strnicmp(data, "noacl", 5) == 0) {
Linus Torvalds1da177e2005-04-16 15:20:36 -07001414 vol->no_psx_acl = 1;
Steve French84210e92008-10-23 04:42:37 +00001415 } else if (strnicmp(data, "locallease", 6) == 0) {
1416 vol->local_lease = 1;
Steve French50c2f752007-07-13 00:33:32 +00001417 } else if (strnicmp(data, "sign", 4) == 0) {
Steve French750d1152006-06-27 06:28:30 +00001418 vol->secFlg |= CIFSSEC_MUST_SIGN;
Steve French95b1cb92008-05-15 16:44:38 +00001419 } else if (strnicmp(data, "seal", 4) == 0) {
1420 /* we do not do the following in secFlags because seal
1421 is a per tree connection (mount) not a per socket
1422 or per-smb connection option in the protocol */
1423 /* vol->secFlg |= CIFSSEC_MUST_SEAL; */
1424 vol->seal = 1;
Steve French50c2f752007-07-13 00:33:32 +00001425 } else if (strnicmp(data, "direct", 6) == 0) {
Linus Torvalds1da177e2005-04-16 15:20:36 -07001426 vol->direct_io = 1;
Steve French50c2f752007-07-13 00:33:32 +00001427 } else if (strnicmp(data, "forcedirectio", 13) == 0) {
Linus Torvalds1da177e2005-04-16 15:20:36 -07001428 vol->direct_io = 1;
Pavel Shilovskyd39454f2011-01-24 14:16:35 -05001429 } else if (strnicmp(data, "strictcache", 11) == 0) {
1430 vol->strict_io = 1;
Linus Torvalds1da177e2005-04-16 15:20:36 -07001431 } else if (strnicmp(data, "noac", 4) == 0) {
Steve French50c2f752007-07-13 00:33:32 +00001432 printk(KERN_WARNING "CIFS: Mount option noac not "
1433 "supported. Instead set "
1434 "/proc/fs/cifs/LookupCacheEnabled to 0\n");
Suresh Jayaramanfa1df752010-07-05 18:13:36 +05301435 } else if (strnicmp(data, "fsc", 3) == 0) {
Suresh Jayaraman607a5692010-11-24 17:49:05 +05301436#ifndef CONFIG_CIFS_FSCACHE
1437 cERROR(1, "FS-Cache support needs CONFIG_CIFS_FSCACHE"
1438 "kernel config option set");
Sean Finneyb9468452011-04-11 13:19:32 +00001439 goto cifs_parse_mount_err;
Suresh Jayaraman607a5692010-11-24 17:49:05 +05301440#endif
Suresh Jayaramanfa1df752010-07-05 18:13:36 +05301441 vol->fsc = true;
Stefan Metzmacher736a33202010-07-30 14:56:00 +02001442 } else if (strnicmp(data, "mfsymlinks", 10) == 0) {
1443 vol->mfsymlinks = true;
Jeff Layton0eb8a132010-10-06 19:51:12 -04001444 } else if (strnicmp(data, "multiuser", 8) == 0) {
1445 vol->multiuser = true;
Linus Torvalds1da177e2005-04-16 15:20:36 -07001446 } else
Steve French50c2f752007-07-13 00:33:32 +00001447 printk(KERN_WARNING "CIFS: Unknown mount option %s\n",
1448 data);
Linus Torvalds1da177e2005-04-16 15:20:36 -07001449 }
1450 if (vol->UNC == NULL) {
Steve French4523cc32007-04-30 20:13:06 +00001451 if (devname == NULL) {
Steve French50c2f752007-07-13 00:33:32 +00001452 printk(KERN_WARNING "CIFS: Missing UNC name for mount "
1453 "target\n");
Sean Finneyb9468452011-04-11 13:19:32 +00001454 goto cifs_parse_mount_err;
Linus Torvalds1da177e2005-04-16 15:20:36 -07001455 }
1456 if ((temp_len = strnlen(devname, 300)) < 300) {
Steve French50c2f752007-07-13 00:33:32 +00001457 vol->UNC = kmalloc(temp_len+1, GFP_KERNEL);
Steve French4523cc32007-04-30 20:13:06 +00001458 if (vol->UNC == NULL)
Sean Finneyb9468452011-04-11 13:19:32 +00001459 goto cifs_parse_mount_err;
Steve French50c2f752007-07-13 00:33:32 +00001460 strcpy(vol->UNC, devname);
Linus Torvalds1da177e2005-04-16 15:20:36 -07001461 if (strncmp(vol->UNC, "//", 2) == 0) {
1462 vol->UNC[0] = '\\';
1463 vol->UNC[1] = '\\';
1464 } else if (strncmp(vol->UNC, "\\\\", 2) != 0) {
Steve French50c2f752007-07-13 00:33:32 +00001465 printk(KERN_WARNING "CIFS: UNC Path does not "
1466 "begin with // or \\\\ \n");
Sean Finneyb9468452011-04-11 13:19:32 +00001467 goto cifs_parse_mount_err;
Linus Torvalds1da177e2005-04-16 15:20:36 -07001468 }
Igor Mammedov7c5e6282008-05-08 20:48:42 +00001469 value = strpbrk(vol->UNC+2, "/\\");
1470 if (value)
1471 *value = '\\';
Linus Torvalds1da177e2005-04-16 15:20:36 -07001472 } else {
1473 printk(KERN_WARNING "CIFS: UNC name too long\n");
Sean Finneyb9468452011-04-11 13:19:32 +00001474 goto cifs_parse_mount_err;
Linus Torvalds1da177e2005-04-16 15:20:36 -07001475 }
1476 }
Jeff Layton0eb8a132010-10-06 19:51:12 -04001477
1478 if (vol->multiuser && !(vol->secFlg & CIFSSEC_MAY_KRB5)) {
1479 cERROR(1, "Multiuser mounts currently require krb5 "
1480 "authentication!");
Sean Finneyb9468452011-04-11 13:19:32 +00001481 goto cifs_parse_mount_err;
Jeff Layton0eb8a132010-10-06 19:51:12 -04001482 }
1483
Steve Frenchfb8c4b12007-07-10 01:16:18 +00001484 if (vol->UNCip == NULL)
Linus Torvalds1da177e2005-04-16 15:20:36 -07001485 vol->UNCip = &vol->UNC[2];
1486
Jeff Layton9b9d6b242009-07-31 06:56:09 -04001487 if (uid_specified)
1488 vol->override_uid = override_uid;
1489 else if (override_uid == 1)
1490 printk(KERN_NOTICE "CIFS: ignoring forceuid mount option "
1491 "specified with no uid= option.\n");
1492
1493 if (gid_specified)
1494 vol->override_gid = override_gid;
1495 else if (override_gid == 1)
1496 printk(KERN_NOTICE "CIFS: ignoring forcegid mount option "
1497 "specified with no gid= option.\n");
1498
Sean Finneyb9468452011-04-11 13:19:32 +00001499 kfree(mountdata_copy);
Linus Torvalds1da177e2005-04-16 15:20:36 -07001500 return 0;
Sean Finneyb9468452011-04-11 13:19:32 +00001501
1502cifs_parse_mount_err:
1503 kfree(mountdata_copy);
1504 return 1;
Linus Torvalds1da177e2005-04-16 15:20:36 -07001505}
1506
Ben Greear3eb9a882010-09-01 17:06:02 -07001507/** Returns true if srcaddr isn't specified and rhs isn't
1508 * specified, or if srcaddr is specified and
1509 * matches the IP address of the rhs argument.
1510 */
Jeff Layton45151482010-07-06 20:43:02 -04001511static bool
Ben Greear3eb9a882010-09-01 17:06:02 -07001512srcip_matches(struct sockaddr *srcaddr, struct sockaddr *rhs)
1513{
1514 switch (srcaddr->sa_family) {
1515 case AF_UNSPEC:
1516 return (rhs->sa_family == AF_UNSPEC);
1517 case AF_INET: {
1518 struct sockaddr_in *saddr4 = (struct sockaddr_in *)srcaddr;
1519 struct sockaddr_in *vaddr4 = (struct sockaddr_in *)rhs;
1520 return (saddr4->sin_addr.s_addr == vaddr4->sin_addr.s_addr);
1521 }
1522 case AF_INET6: {
1523 struct sockaddr_in6 *saddr6 = (struct sockaddr_in6 *)srcaddr;
1524 struct sockaddr_in6 *vaddr6 = (struct sockaddr_in6 *)&rhs;
1525 return ipv6_addr_equal(&saddr6->sin6_addr, &vaddr6->sin6_addr);
1526 }
1527 default:
1528 WARN_ON(1);
1529 return false; /* don't expect to be here */
1530 }
1531}
1532
Pavel Shilovsky4b886132010-12-13 22:18:07 +03001533/*
1534 * If no port is specified in addr structure, we try to match with 445 port
1535 * and if it fails - with 139 ports. It should be called only if address
1536 * families of server and addr are equal.
1537 */
1538static bool
1539match_port(struct TCP_Server_Info *server, struct sockaddr *addr)
1540{
Steve French6da97912011-03-13 18:55:55 +00001541 __be16 port, *sport;
Pavel Shilovsky4b886132010-12-13 22:18:07 +03001542
1543 switch (addr->sa_family) {
1544 case AF_INET:
1545 sport = &((struct sockaddr_in *) &server->dstaddr)->sin_port;
1546 port = ((struct sockaddr_in *) addr)->sin_port;
1547 break;
1548 case AF_INET6:
1549 sport = &((struct sockaddr_in6 *) &server->dstaddr)->sin6_port;
1550 port = ((struct sockaddr_in6 *) addr)->sin6_port;
1551 break;
1552 default:
1553 WARN_ON(1);
1554 return false;
1555 }
1556
1557 if (!port) {
1558 port = htons(CIFS_PORT);
1559 if (port == *sport)
1560 return true;
1561
1562 port = htons(RFC1001_PORT);
1563 }
1564
1565 return port == *sport;
1566}
Ben Greear3eb9a882010-09-01 17:06:02 -07001567
1568static bool
1569match_address(struct TCP_Server_Info *server, struct sockaddr *addr,
1570 struct sockaddr *srcaddr)
Linus Torvalds1da177e2005-04-16 15:20:36 -07001571{
Jeff Layton45151482010-07-06 20:43:02 -04001572 switch (addr->sa_family) {
Pavel Shilovskya9f1b852010-12-13 19:08:35 +03001573 case AF_INET: {
1574 struct sockaddr_in *addr4 = (struct sockaddr_in *)addr;
1575 struct sockaddr_in *srv_addr4 =
1576 (struct sockaddr_in *)&server->dstaddr;
1577
1578 if (addr4->sin_addr.s_addr != srv_addr4->sin_addr.s_addr)
Jeff Layton45151482010-07-06 20:43:02 -04001579 return false;
Jeff Layton45151482010-07-06 20:43:02 -04001580 break;
Pavel Shilovskya9f1b852010-12-13 19:08:35 +03001581 }
1582 case AF_INET6: {
1583 struct sockaddr_in6 *addr6 = (struct sockaddr_in6 *)addr;
1584 struct sockaddr_in6 *srv_addr6 =
1585 (struct sockaddr_in6 *)&server->dstaddr;
1586
Jeff Layton45151482010-07-06 20:43:02 -04001587 if (!ipv6_addr_equal(&addr6->sin6_addr,
Pavel Shilovskya9f1b852010-12-13 19:08:35 +03001588 &srv_addr6->sin6_addr))
Jeff Layton45151482010-07-06 20:43:02 -04001589 return false;
Pavel Shilovskya9f1b852010-12-13 19:08:35 +03001590 if (addr6->sin6_scope_id != srv_addr6->sin6_scope_id)
Jeff Layton45151482010-07-06 20:43:02 -04001591 return false;
Jeff Layton45151482010-07-06 20:43:02 -04001592 break;
1593 }
Pavel Shilovskya9f1b852010-12-13 19:08:35 +03001594 default:
1595 WARN_ON(1);
1596 return false; /* don't expect to be here */
1597 }
Jeff Layton45151482010-07-06 20:43:02 -04001598
Ben Greear3eb9a882010-09-01 17:06:02 -07001599 if (!srcip_matches(srcaddr, (struct sockaddr *)&server->srcaddr))
1600 return false;
1601
Jeff Layton45151482010-07-06 20:43:02 -04001602 return true;
1603}
1604
Jeff Laytondaf5b0b2010-07-06 20:43:02 -04001605static bool
1606match_security(struct TCP_Server_Info *server, struct smb_vol *vol)
1607{
1608 unsigned int secFlags;
1609
1610 if (vol->secFlg & (~(CIFSSEC_MUST_SIGN | CIFSSEC_MUST_SEAL)))
1611 secFlags = vol->secFlg;
1612 else
1613 secFlags = global_secflags | vol->secFlg;
1614
1615 switch (server->secType) {
1616 case LANMAN:
1617 if (!(secFlags & (CIFSSEC_MAY_LANMAN|CIFSSEC_MAY_PLNTXT)))
1618 return false;
1619 break;
1620 case NTLMv2:
1621 if (!(secFlags & CIFSSEC_MAY_NTLMV2))
1622 return false;
1623 break;
1624 case NTLM:
1625 if (!(secFlags & CIFSSEC_MAY_NTLM))
1626 return false;
1627 break;
1628 case Kerberos:
1629 if (!(secFlags & CIFSSEC_MAY_KRB5))
1630 return false;
1631 break;
1632 case RawNTLMSSP:
1633 if (!(secFlags & CIFSSEC_MAY_NTLMSSP))
1634 return false;
1635 break;
1636 default:
1637 /* shouldn't happen */
1638 return false;
1639 }
1640
Lucas De Marchi25985ed2011-03-30 22:57:33 -03001641 /* now check if signing mode is acceptable */
Jeff Laytondaf5b0b2010-07-06 20:43:02 -04001642 if ((secFlags & CIFSSEC_MAY_SIGN) == 0 &&
1643 (server->secMode & SECMODE_SIGN_REQUIRED))
1644 return false;
1645 else if (((secFlags & CIFSSEC_MUST_SIGN) == CIFSSEC_MUST_SIGN) &&
1646 (server->secMode &
1647 (SECMODE_SIGN_ENABLED|SECMODE_SIGN_REQUIRED)) == 0)
1648 return false;
1649
1650 return true;
1651}
1652
Jeff Layton45151482010-07-06 20:43:02 -04001653static struct TCP_Server_Info *
Jeff Laytondaf5b0b2010-07-06 20:43:02 -04001654cifs_find_tcp_session(struct sockaddr *addr, struct smb_vol *vol)
Jeff Layton45151482010-07-06 20:43:02 -04001655{
Jeff Laytone7ddee92008-11-14 13:44:38 -05001656 struct TCP_Server_Info *server;
Linus Torvalds1da177e2005-04-16 15:20:36 -07001657
Suresh Jayaraman3f9bcca2010-10-18 23:29:37 +05301658 spin_lock(&cifs_tcp_ses_lock);
Jeff Layton45151482010-07-06 20:43:02 -04001659 list_for_each_entry(server, &cifs_tcp_ses_list, tcp_ses_list) {
Rob Landleyf1d0c992011-01-22 15:44:05 -06001660 if (!net_eq(cifs_net_ns(server), current->nsproxy->net_ns))
1661 continue;
1662
Ben Greear3eb9a882010-09-01 17:06:02 -07001663 if (!match_address(server, addr,
1664 (struct sockaddr *)&vol->srcaddr))
Jeff Layton45151482010-07-06 20:43:02 -04001665 continue;
Steve French50c2f752007-07-13 00:33:32 +00001666
Pavel Shilovsky4b886132010-12-13 22:18:07 +03001667 if (!match_port(server, addr))
1668 continue;
1669
Jeff Laytondaf5b0b2010-07-06 20:43:02 -04001670 if (!match_security(server, vol))
1671 continue;
1672
Jeff Laytone7ddee92008-11-14 13:44:38 -05001673 ++server->srv_count;
Suresh Jayaraman3f9bcca2010-10-18 23:29:37 +05301674 spin_unlock(&cifs_tcp_ses_lock);
Joe Perchesb6b38f72010-04-21 03:50:45 +00001675 cFYI(1, "Existing tcp session with server found");
Jeff Laytone7ddee92008-11-14 13:44:38 -05001676 return server;
Linus Torvalds1da177e2005-04-16 15:20:36 -07001677 }
Suresh Jayaraman3f9bcca2010-10-18 23:29:37 +05301678 spin_unlock(&cifs_tcp_ses_lock);
Linus Torvalds1da177e2005-04-16 15:20:36 -07001679 return NULL;
1680}
1681
Jeff Layton14fbf502008-11-14 13:53:46 -05001682static void
Jeff Laytone7ddee92008-11-14 13:44:38 -05001683cifs_put_tcp_session(struct TCP_Server_Info *server)
Linus Torvalds1da177e2005-04-16 15:20:36 -07001684{
Jeff Laytone7ddee92008-11-14 13:44:38 -05001685 struct task_struct *task;
Linus Torvalds1da177e2005-04-16 15:20:36 -07001686
Suresh Jayaraman3f9bcca2010-10-18 23:29:37 +05301687 spin_lock(&cifs_tcp_ses_lock);
Jeff Laytone7ddee92008-11-14 13:44:38 -05001688 if (--server->srv_count > 0) {
Suresh Jayaraman3f9bcca2010-10-18 23:29:37 +05301689 spin_unlock(&cifs_tcp_ses_lock);
Jeff Laytone7ddee92008-11-14 13:44:38 -05001690 return;
Linus Torvalds1da177e2005-04-16 15:20:36 -07001691 }
Steve Frenchdea570e02008-05-06 22:05:51 +00001692
Rob Landleyf1d0c992011-01-22 15:44:05 -06001693 put_net(cifs_net_ns(server));
1694
Jeff Laytone7ddee92008-11-14 13:44:38 -05001695 list_del_init(&server->tcp_ses_list);
Suresh Jayaraman3f9bcca2010-10-18 23:29:37 +05301696 spin_unlock(&cifs_tcp_ses_lock);
Jeff Laytone7ddee92008-11-14 13:44:38 -05001697
Jeff Laytonc74093b2011-01-11 07:24:23 -05001698 cancel_delayed_work_sync(&server->echo);
1699
Jeff Laytone7ddee92008-11-14 13:44:38 -05001700 spin_lock(&GlobalMid_Lock);
1701 server->tcpStatus = CifsExiting;
1702 spin_unlock(&GlobalMid_Lock);
1703
Shirish Pargaonkard2b91522010-10-21 14:25:08 -05001704 cifs_crypto_shash_release(server);
Suresh Jayaraman488f1d2d2010-07-05 18:12:15 +05301705 cifs_fscache_release_client_cookie(server);
1706
Shirish Pargaonkar21e73392010-10-21 06:42:55 -05001707 kfree(server->session_key.response);
1708 server->session_key.response = NULL;
1709 server->session_key.len = 0;
1710
Jeff Laytone7ddee92008-11-14 13:44:38 -05001711 task = xchg(&server->tsk, NULL);
1712 if (task)
1713 force_sig(SIGKILL, task);
Linus Torvalds1da177e2005-04-16 15:20:36 -07001714}
1715
Jeff Layton63c038c2008-12-01 18:41:46 -05001716static struct TCP_Server_Info *
1717cifs_get_tcp_session(struct smb_vol *volume_info)
1718{
1719 struct TCP_Server_Info *tcp_ses = NULL;
Jeff Laytona9ac49d2009-01-22 14:43:21 -05001720 struct sockaddr_storage addr;
Jeff Layton63c038c2008-12-01 18:41:46 -05001721 struct sockaddr_in *sin_server = (struct sockaddr_in *) &addr;
1722 struct sockaddr_in6 *sin_server6 = (struct sockaddr_in6 *) &addr;
1723 int rc;
1724
Jeff Laytona9ac49d2009-01-22 14:43:21 -05001725 memset(&addr, 0, sizeof(struct sockaddr_storage));
Jeff Layton63c038c2008-12-01 18:41:46 -05001726
Joe Perchesb6b38f72010-04-21 03:50:45 +00001727 cFYI(1, "UNC: %s ip: %s", volume_info->UNC, volume_info->UNCip);
Jeff Layton1e68b2b2009-06-11 10:27:30 -04001728
Jeff Layton63c038c2008-12-01 18:41:46 -05001729 if (volume_info->UNCip && volume_info->UNC) {
Jeff Layton50d97162010-07-06 20:43:01 -04001730 rc = cifs_fill_sockaddr((struct sockaddr *)&addr,
1731 volume_info->UNCip,
David Howells67b76262010-07-22 18:33:01 +01001732 strlen(volume_info->UNCip),
Jeff Layton50d97162010-07-06 20:43:01 -04001733 volume_info->port);
Jeff Layton1e68b2b2009-06-11 10:27:30 -04001734 if (!rc) {
Jeff Layton63c038c2008-12-01 18:41:46 -05001735 /* we failed translating address */
1736 rc = -EINVAL;
1737 goto out_err;
1738 }
Jeff Layton63c038c2008-12-01 18:41:46 -05001739 } else if (volume_info->UNCip) {
1740 /* BB using ip addr as tcp_ses name to connect to the
1741 DFS root below */
Joe Perchesb6b38f72010-04-21 03:50:45 +00001742 cERROR(1, "Connecting to DFS root not implemented yet");
Jeff Layton63c038c2008-12-01 18:41:46 -05001743 rc = -EINVAL;
1744 goto out_err;
1745 } else /* which tcp_sess DFS root would we conect to */ {
Joe Perchesb6b38f72010-04-21 03:50:45 +00001746 cERROR(1, "CIFS mount error: No UNC path (e.g. -o "
1747 "unc=//192.168.1.100/public) specified");
Jeff Layton63c038c2008-12-01 18:41:46 -05001748 rc = -EINVAL;
1749 goto out_err;
1750 }
1751
1752 /* see if we already have a matching tcp_ses */
Jeff Laytondaf5b0b2010-07-06 20:43:02 -04001753 tcp_ses = cifs_find_tcp_session((struct sockaddr *)&addr, volume_info);
Jeff Layton63c038c2008-12-01 18:41:46 -05001754 if (tcp_ses)
1755 return tcp_ses;
1756
1757 tcp_ses = kzalloc(sizeof(struct TCP_Server_Info), GFP_KERNEL);
1758 if (!tcp_ses) {
1759 rc = -ENOMEM;
1760 goto out_err;
1761 }
1762
Shirish Pargaonkard2b91522010-10-21 14:25:08 -05001763 rc = cifs_crypto_shash_allocate(tcp_ses);
1764 if (rc) {
1765 cERROR(1, "could not setup hash structures rc %d", rc);
1766 goto out_err;
1767 }
1768
Rob Landleyf1d0c992011-01-22 15:44:05 -06001769 cifs_set_net_ns(tcp_ses, get_net(current->nsproxy->net_ns));
Jeff Layton63c038c2008-12-01 18:41:46 -05001770 tcp_ses->hostname = extract_hostname(volume_info->UNC);
1771 if (IS_ERR(tcp_ses->hostname)) {
1772 rc = PTR_ERR(tcp_ses->hostname);
Shirish Pargaonkarf7c5445a2010-10-26 18:10:24 -05001773 goto out_err_crypto_release;
Jeff Layton63c038c2008-12-01 18:41:46 -05001774 }
1775
1776 tcp_ses->noblocksnd = volume_info->noblocksnd;
1777 tcp_ses->noautotune = volume_info->noautotune;
Steve French6a5fa2362010-01-01 01:28:43 +00001778 tcp_ses->tcp_nodelay = volume_info->sockopt_tcp_nodelay;
Jeff Layton63c038c2008-12-01 18:41:46 -05001779 atomic_set(&tcp_ses->inFlight, 0);
1780 init_waitqueue_head(&tcp_ses->response_q);
1781 init_waitqueue_head(&tcp_ses->request_q);
1782 INIT_LIST_HEAD(&tcp_ses->pending_mid_q);
1783 mutex_init(&tcp_ses->srv_mutex);
1784 memcpy(tcp_ses->workstation_RFC1001_name,
1785 volume_info->source_rfc1001_name, RFC1001_NAME_LEN_WITH_NULL);
1786 memcpy(tcp_ses->server_RFC1001_name,
1787 volume_info->target_rfc1001_name, RFC1001_NAME_LEN_WITH_NULL);
Shirish Pargaonkar5d0d2882010-10-13 18:15:00 -05001788 tcp_ses->session_estab = false;
Jeff Layton63c038c2008-12-01 18:41:46 -05001789 tcp_ses->sequence_number = 0;
Steve Frenchfda35942011-01-20 18:06:34 +00001790 tcp_ses->lstrp = jiffies;
Jeff Layton63c038c2008-12-01 18:41:46 -05001791 INIT_LIST_HEAD(&tcp_ses->tcp_ses_list);
1792 INIT_LIST_HEAD(&tcp_ses->smb_ses_list);
Jeff Laytonc74093b2011-01-11 07:24:23 -05001793 INIT_DELAYED_WORK(&tcp_ses->echo, cifs_echo_request);
Jeff Layton63c038c2008-12-01 18:41:46 -05001794
1795 /*
1796 * at this point we are the only ones with the pointer
1797 * to the struct since the kernel thread not created yet
1798 * no need to spinlock this init of tcpStatus or srv_count
1799 */
1800 tcp_ses->tcpStatus = CifsNew;
Ben Greear3eb9a882010-09-01 17:06:02 -07001801 memcpy(&tcp_ses->srcaddr, &volume_info->srcaddr,
1802 sizeof(tcp_ses->srcaddr));
Jeff Layton63c038c2008-12-01 18:41:46 -05001803 ++tcp_ses->srv_count;
1804
Jeff Laytona9ac49d2009-01-22 14:43:21 -05001805 if (addr.ss_family == AF_INET6) {
Joe Perchesb6b38f72010-04-21 03:50:45 +00001806 cFYI(1, "attempting ipv6 connect");
Jeff Layton63c038c2008-12-01 18:41:46 -05001807 /* BB should we allow ipv6 on port 139? */
1808 /* other OS never observed in Wild doing 139 with v6 */
Pavel Shilovskya9f1b852010-12-13 19:08:35 +03001809 memcpy(&tcp_ses->dstaddr, sin_server6,
1810 sizeof(struct sockaddr_in6));
1811 } else
1812 memcpy(&tcp_ses->dstaddr, sin_server,
1813 sizeof(struct sockaddr_in));
1814
1815 rc = ip_connect(tcp_ses);
Jeff Layton63c038c2008-12-01 18:41:46 -05001816 if (rc < 0) {
Joe Perchesb6b38f72010-04-21 03:50:45 +00001817 cERROR(1, "Error connecting to socket. Aborting operation");
Shirish Pargaonkarf7c5445a2010-10-26 18:10:24 -05001818 goto out_err_crypto_release;
Jeff Layton63c038c2008-12-01 18:41:46 -05001819 }
1820
1821 /*
1822 * since we're in a cifs function already, we know that
1823 * this will succeed. No need for try_module_get().
1824 */
1825 __module_get(THIS_MODULE);
1826 tcp_ses->tsk = kthread_run((void *)(void *)cifs_demultiplex_thread,
1827 tcp_ses, "cifsd");
1828 if (IS_ERR(tcp_ses->tsk)) {
1829 rc = PTR_ERR(tcp_ses->tsk);
Joe Perchesb6b38f72010-04-21 03:50:45 +00001830 cERROR(1, "error %d create cifsd thread", rc);
Jeff Layton63c038c2008-12-01 18:41:46 -05001831 module_put(THIS_MODULE);
Shirish Pargaonkarf7c5445a2010-10-26 18:10:24 -05001832 goto out_err_crypto_release;
Jeff Layton63c038c2008-12-01 18:41:46 -05001833 }
Steve Frenchfd88ce92011-04-12 01:01:14 +00001834 tcp_ses->tcpStatus = CifsNeedNegotiate;
Jeff Layton63c038c2008-12-01 18:41:46 -05001835
1836 /* thread spawned, put it on the list */
Suresh Jayaraman3f9bcca2010-10-18 23:29:37 +05301837 spin_lock(&cifs_tcp_ses_lock);
Jeff Layton63c038c2008-12-01 18:41:46 -05001838 list_add(&tcp_ses->tcp_ses_list, &cifs_tcp_ses_list);
Suresh Jayaraman3f9bcca2010-10-18 23:29:37 +05301839 spin_unlock(&cifs_tcp_ses_lock);
Jeff Layton63c038c2008-12-01 18:41:46 -05001840
Suresh Jayaraman488f1d2d2010-07-05 18:12:15 +05301841 cifs_fscache_get_client_cookie(tcp_ses);
1842
Jeff Laytonc74093b2011-01-11 07:24:23 -05001843 /* queue echo request delayed work */
1844 queue_delayed_work(system_nrt_wq, &tcp_ses->echo, SMB_ECHO_INTERVAL);
1845
Jeff Layton63c038c2008-12-01 18:41:46 -05001846 return tcp_ses;
1847
Shirish Pargaonkarf7c5445a2010-10-26 18:10:24 -05001848out_err_crypto_release:
Shirish Pargaonkard2b91522010-10-21 14:25:08 -05001849 cifs_crypto_shash_release(tcp_ses);
1850
Rob Landleyf1d0c992011-01-22 15:44:05 -06001851 put_net(cifs_net_ns(tcp_ses));
1852
Jeff Layton63c038c2008-12-01 18:41:46 -05001853out_err:
1854 if (tcp_ses) {
Steve French8347a5c2009-10-06 18:31:29 +00001855 if (!IS_ERR(tcp_ses->hostname))
1856 kfree(tcp_ses->hostname);
Jeff Layton63c038c2008-12-01 18:41:46 -05001857 if (tcp_ses->ssocket)
1858 sock_release(tcp_ses->ssocket);
1859 kfree(tcp_ses);
1860 }
1861 return ERR_PTR(rc);
1862}
1863
Linus Torvalds1da177e2005-04-16 15:20:36 -07001864static struct cifsSesInfo *
Jeff Layton4ff67b72010-07-06 20:43:02 -04001865cifs_find_smb_ses(struct TCP_Server_Info *server, struct smb_vol *vol)
Linus Torvalds1da177e2005-04-16 15:20:36 -07001866{
Linus Torvalds1da177e2005-04-16 15:20:36 -07001867 struct cifsSesInfo *ses;
1868
Suresh Jayaraman3f9bcca2010-10-18 23:29:37 +05301869 spin_lock(&cifs_tcp_ses_lock);
Jeff Layton4ff67b72010-07-06 20:43:02 -04001870 list_for_each_entry(ses, &server->smb_ses_list, smb_ses_list) {
1871 switch (server->secType) {
1872 case Kerberos:
Jeff Layton3e4b3e12010-07-19 18:00:17 -04001873 if (vol->cred_uid != ses->cred_uid)
Jeff Layton4ff67b72010-07-06 20:43:02 -04001874 continue;
1875 break;
1876 default:
1877 /* anything else takes username/password */
Steve French8727c8a2011-02-25 01:11:56 -06001878 if (ses->user_name == NULL)
1879 continue;
1880 if (strncmp(ses->user_name, vol->username,
Jeff Layton4ff67b72010-07-06 20:43:02 -04001881 MAX_USERNAME_SIZE))
1882 continue;
1883 if (strlen(vol->username) != 0 &&
Jeff Layton24e6cf92010-08-23 11:38:04 -04001884 ses->password != NULL &&
Jeff Laytonfc87a402010-08-18 13:13:39 -04001885 strncmp(ses->password,
1886 vol->password ? vol->password : "",
Jeff Layton4ff67b72010-07-06 20:43:02 -04001887 MAX_PASSWORD_SIZE))
1888 continue;
1889 }
Jeff Layton14fbf502008-11-14 13:53:46 -05001890 ++ses->ses_count;
Suresh Jayaraman3f9bcca2010-10-18 23:29:37 +05301891 spin_unlock(&cifs_tcp_ses_lock);
Jeff Layton14fbf502008-11-14 13:53:46 -05001892 return ses;
Linus Torvalds1da177e2005-04-16 15:20:36 -07001893 }
Suresh Jayaraman3f9bcca2010-10-18 23:29:37 +05301894 spin_unlock(&cifs_tcp_ses_lock);
Linus Torvalds1da177e2005-04-16 15:20:36 -07001895 return NULL;
1896}
1897
Jeff Layton14fbf502008-11-14 13:53:46 -05001898static void
1899cifs_put_smb_ses(struct cifsSesInfo *ses)
1900{
1901 int xid;
1902 struct TCP_Server_Info *server = ses->server;
1903
Jeff Layton36988c72010-04-24 07:57:43 -04001904 cFYI(1, "%s: ses_count=%d\n", __func__, ses->ses_count);
Suresh Jayaraman3f9bcca2010-10-18 23:29:37 +05301905 spin_lock(&cifs_tcp_ses_lock);
Jeff Layton14fbf502008-11-14 13:53:46 -05001906 if (--ses->ses_count > 0) {
Suresh Jayaraman3f9bcca2010-10-18 23:29:37 +05301907 spin_unlock(&cifs_tcp_ses_lock);
Jeff Layton14fbf502008-11-14 13:53:46 -05001908 return;
1909 }
1910
1911 list_del_init(&ses->smb_ses_list);
Suresh Jayaraman3f9bcca2010-10-18 23:29:37 +05301912 spin_unlock(&cifs_tcp_ses_lock);
Jeff Layton14fbf502008-11-14 13:53:46 -05001913
1914 if (ses->status == CifsGood) {
1915 xid = GetXid();
1916 CIFSSMBLogoff(xid, ses);
1917 _FreeXid(xid);
1918 }
1919 sesInfoFree(ses);
1920 cifs_put_tcp_session(server);
1921}
1922
Steve Frenchd9b94202011-04-12 01:24:57 +00001923static bool warned_on_ntlm; /* globals init to false automatically */
1924
Jeff Layton36988c72010-04-24 07:57:43 -04001925static struct cifsSesInfo *
1926cifs_get_smb_ses(struct TCP_Server_Info *server, struct smb_vol *volume_info)
1927{
1928 int rc = -ENOMEM, xid;
1929 struct cifsSesInfo *ses;
Pavel Shilovskya9f1b852010-12-13 19:08:35 +03001930 struct sockaddr_in *addr = (struct sockaddr_in *)&server->dstaddr;
1931 struct sockaddr_in6 *addr6 = (struct sockaddr_in6 *)&server->dstaddr;
Jeff Layton36988c72010-04-24 07:57:43 -04001932
1933 xid = GetXid();
1934
Jeff Layton4ff67b72010-07-06 20:43:02 -04001935 ses = cifs_find_smb_ses(server, volume_info);
Jeff Layton36988c72010-04-24 07:57:43 -04001936 if (ses) {
1937 cFYI(1, "Existing smb sess found (status=%d)", ses->status);
1938
Jeff Layton36988c72010-04-24 07:57:43 -04001939 mutex_lock(&ses->session_mutex);
Jeff Layton198b5682010-04-24 07:57:48 -04001940 rc = cifs_negotiate_protocol(xid, ses);
1941 if (rc) {
1942 mutex_unlock(&ses->session_mutex);
1943 /* problem -- put our ses reference */
1944 cifs_put_smb_ses(ses);
1945 FreeXid(xid);
1946 return ERR_PTR(rc);
1947 }
Jeff Layton36988c72010-04-24 07:57:43 -04001948 if (ses->need_reconnect) {
1949 cFYI(1, "Session needs reconnect");
1950 rc = cifs_setup_session(xid, ses,
1951 volume_info->local_nls);
1952 if (rc) {
1953 mutex_unlock(&ses->session_mutex);
1954 /* problem -- put our reference */
1955 cifs_put_smb_ses(ses);
1956 FreeXid(xid);
1957 return ERR_PTR(rc);
1958 }
1959 }
1960 mutex_unlock(&ses->session_mutex);
Jeff Layton460cf342010-09-14 11:38:24 -04001961
1962 /* existing SMB ses has a server reference already */
1963 cifs_put_tcp_session(server);
Jeff Layton36988c72010-04-24 07:57:43 -04001964 FreeXid(xid);
1965 return ses;
1966 }
1967
1968 cFYI(1, "Existing smb sess not found");
1969 ses = sesInfoAlloc();
1970 if (ses == NULL)
1971 goto get_ses_fail;
1972
1973 /* new SMB session uses our server ref */
1974 ses->server = server;
Pavel Shilovskya9f1b852010-12-13 19:08:35 +03001975 if (server->dstaddr.ss_family == AF_INET6)
1976 sprintf(ses->serverName, "%pI6", &addr6->sin6_addr);
Jeff Layton36988c72010-04-24 07:57:43 -04001977 else
Pavel Shilovskya9f1b852010-12-13 19:08:35 +03001978 sprintf(ses->serverName, "%pI4", &addr->sin_addr);
Jeff Layton36988c72010-04-24 07:57:43 -04001979
Steve French8727c8a2011-02-25 01:11:56 -06001980 if (volume_info->username) {
1981 ses->user_name = kstrdup(volume_info->username, GFP_KERNEL);
1982 if (!ses->user_name)
1983 goto get_ses_fail;
1984 }
Jeff Layton36988c72010-04-24 07:57:43 -04001985
1986 /* volume_info->password freed at unmount */
1987 if (volume_info->password) {
1988 ses->password = kstrdup(volume_info->password, GFP_KERNEL);
1989 if (!ses->password)
1990 goto get_ses_fail;
1991 }
1992 if (volume_info->domainname) {
Shirish Pargaonkard3686d52010-10-28 09:53:07 -05001993 ses->domainName = kstrdup(volume_info->domainname, GFP_KERNEL);
1994 if (!ses->domainName)
1995 goto get_ses_fail;
Jeff Layton36988c72010-04-24 07:57:43 -04001996 }
Jeff Layton3e4b3e12010-07-19 18:00:17 -04001997 ses->cred_uid = volume_info->cred_uid;
Jeff Layton36988c72010-04-24 07:57:43 -04001998 ses->linux_uid = volume_info->linux_uid;
Steve Frenchd9b94202011-04-12 01:24:57 +00001999
2000 /* ntlmv2 is much stronger than ntlm security, and has been broadly
2001 supported for many years, time to update default security mechanism */
2002 if ((volume_info->secFlg == 0) && warned_on_ntlm == false) {
2003 warned_on_ntlm = true;
2004 cERROR(1, "default security mechanism requested. The default "
2005 "security mechanism will be upgraded from ntlm to "
2006 "ntlmv2 in kernel release 2.6.41");
2007 }
Jeff Layton36988c72010-04-24 07:57:43 -04002008 ses->overrideSecFlg = volume_info->secFlg;
2009
2010 mutex_lock(&ses->session_mutex);
Jeff Layton198b5682010-04-24 07:57:48 -04002011 rc = cifs_negotiate_protocol(xid, ses);
2012 if (!rc)
2013 rc = cifs_setup_session(xid, ses, volume_info->local_nls);
Jeff Layton36988c72010-04-24 07:57:43 -04002014 mutex_unlock(&ses->session_mutex);
Steve Frenchc8e56f12010-09-08 21:10:58 +00002015 if (rc)
Jeff Layton36988c72010-04-24 07:57:43 -04002016 goto get_ses_fail;
2017
2018 /* success, put it on the list */
Suresh Jayaraman3f9bcca2010-10-18 23:29:37 +05302019 spin_lock(&cifs_tcp_ses_lock);
Jeff Layton36988c72010-04-24 07:57:43 -04002020 list_add(&ses->smb_ses_list, &server->smb_ses_list);
Suresh Jayaraman3f9bcca2010-10-18 23:29:37 +05302021 spin_unlock(&cifs_tcp_ses_lock);
Jeff Layton36988c72010-04-24 07:57:43 -04002022
2023 FreeXid(xid);
2024 return ses;
2025
2026get_ses_fail:
2027 sesInfoFree(ses);
2028 FreeXid(xid);
2029 return ERR_PTR(rc);
2030}
2031
Linus Torvalds1da177e2005-04-16 15:20:36 -07002032static struct cifsTconInfo *
Jeff Laytonf1987b42008-11-15 11:12:47 -05002033cifs_find_tcon(struct cifsSesInfo *ses, const char *unc)
Linus Torvalds1da177e2005-04-16 15:20:36 -07002034{
2035 struct list_head *tmp;
2036 struct cifsTconInfo *tcon;
Linus Torvalds1da177e2005-04-16 15:20:36 -07002037
Suresh Jayaraman3f9bcca2010-10-18 23:29:37 +05302038 spin_lock(&cifs_tcp_ses_lock);
Jeff Laytonf1987b42008-11-15 11:12:47 -05002039 list_for_each(tmp, &ses->tcon_list) {
2040 tcon = list_entry(tmp, struct cifsTconInfo, tcon_list);
2041 if (tcon->tidStatus == CifsExiting)
2042 continue;
2043 if (strncmp(tcon->treeName, unc, MAX_TREE_SIZE))
Linus Torvalds1da177e2005-04-16 15:20:36 -07002044 continue;
2045
Jeff Laytonf1987b42008-11-15 11:12:47 -05002046 ++tcon->tc_count;
Suresh Jayaraman3f9bcca2010-10-18 23:29:37 +05302047 spin_unlock(&cifs_tcp_ses_lock);
Linus Torvalds1da177e2005-04-16 15:20:36 -07002048 return tcon;
2049 }
Suresh Jayaraman3f9bcca2010-10-18 23:29:37 +05302050 spin_unlock(&cifs_tcp_ses_lock);
Linus Torvalds1da177e2005-04-16 15:20:36 -07002051 return NULL;
2052}
2053
Jeff Laytonf1987b42008-11-15 11:12:47 -05002054static void
2055cifs_put_tcon(struct cifsTconInfo *tcon)
2056{
2057 int xid;
2058 struct cifsSesInfo *ses = tcon->ses;
2059
Jeff Laytond00c28d2010-04-24 07:57:44 -04002060 cFYI(1, "%s: tc_count=%d\n", __func__, tcon->tc_count);
Suresh Jayaraman3f9bcca2010-10-18 23:29:37 +05302061 spin_lock(&cifs_tcp_ses_lock);
Jeff Laytonf1987b42008-11-15 11:12:47 -05002062 if (--tcon->tc_count > 0) {
Suresh Jayaraman3f9bcca2010-10-18 23:29:37 +05302063 spin_unlock(&cifs_tcp_ses_lock);
Jeff Laytonf1987b42008-11-15 11:12:47 -05002064 return;
2065 }
2066
2067 list_del_init(&tcon->tcon_list);
Suresh Jayaraman3f9bcca2010-10-18 23:29:37 +05302068 spin_unlock(&cifs_tcp_ses_lock);
Jeff Laytonf1987b42008-11-15 11:12:47 -05002069
2070 xid = GetXid();
2071 CIFSSMBTDis(xid, tcon);
2072 _FreeXid(xid);
2073
Suresh Jayaramand03382c2010-07-05 18:12:27 +05302074 cifs_fscache_release_super_cookie(tcon);
Steve French9f841592010-07-23 20:37:53 +00002075 tconInfoFree(tcon);
Jeff Laytonf1987b42008-11-15 11:12:47 -05002076 cifs_put_smb_ses(ses);
2077}
2078
Jeff Laytond00c28d2010-04-24 07:57:44 -04002079static struct cifsTconInfo *
2080cifs_get_tcon(struct cifsSesInfo *ses, struct smb_vol *volume_info)
2081{
2082 int rc, xid;
2083 struct cifsTconInfo *tcon;
2084
2085 tcon = cifs_find_tcon(ses, volume_info->UNC);
2086 if (tcon) {
2087 cFYI(1, "Found match on UNC path");
2088 /* existing tcon already has a reference */
2089 cifs_put_smb_ses(ses);
2090 if (tcon->seal != volume_info->seal)
2091 cERROR(1, "transport encryption setting "
2092 "conflicts with existing tid");
2093 return tcon;
2094 }
2095
2096 tcon = tconInfoAlloc();
2097 if (tcon == NULL) {
2098 rc = -ENOMEM;
2099 goto out_fail;
2100 }
2101
2102 tcon->ses = ses;
2103 if (volume_info->password) {
2104 tcon->password = kstrdup(volume_info->password, GFP_KERNEL);
2105 if (!tcon->password) {
2106 rc = -ENOMEM;
2107 goto out_fail;
2108 }
2109 }
2110
2111 if (strchr(volume_info->UNC + 3, '\\') == NULL
2112 && strchr(volume_info->UNC + 3, '/') == NULL) {
2113 cERROR(1, "Missing share name");
2114 rc = -ENODEV;
2115 goto out_fail;
2116 }
2117
2118 /* BB Do we need to wrap session_mutex around
2119 * this TCon call and Unix SetFS as
2120 * we do on SessSetup and reconnect? */
2121 xid = GetXid();
2122 rc = CIFSTCon(xid, ses, volume_info->UNC, tcon, volume_info->local_nls);
2123 FreeXid(xid);
2124 cFYI(1, "CIFS Tcon rc = %d", rc);
2125 if (rc)
2126 goto out_fail;
2127
2128 if (volume_info->nodfs) {
2129 tcon->Flags &= ~SMB_SHARE_IS_IN_DFS;
2130 cFYI(1, "DFS disabled (%d)", tcon->Flags);
2131 }
2132 tcon->seal = volume_info->seal;
2133 /* we can have only one retry value for a connection
2134 to a share so for resources mounted more than once
2135 to the same server share the last value passed in
2136 for the retry flag is used */
2137 tcon->retry = volume_info->retry;
2138 tcon->nocase = volume_info->nocase;
2139 tcon->local_lease = volume_info->local_lease;
2140
Suresh Jayaraman3f9bcca2010-10-18 23:29:37 +05302141 spin_lock(&cifs_tcp_ses_lock);
Jeff Laytond00c28d2010-04-24 07:57:44 -04002142 list_add(&tcon->tcon_list, &ses->tcon_list);
Suresh Jayaraman3f9bcca2010-10-18 23:29:37 +05302143 spin_unlock(&cifs_tcp_ses_lock);
Jeff Laytond00c28d2010-04-24 07:57:44 -04002144
Suresh Jayaramand03382c2010-07-05 18:12:27 +05302145 cifs_fscache_get_super_cookie(tcon);
2146
Jeff Laytond00c28d2010-04-24 07:57:44 -04002147 return tcon;
2148
2149out_fail:
2150 tconInfoFree(tcon);
2151 return ERR_PTR(rc);
2152}
2153
Jeff Layton9d002df2010-10-06 19:51:11 -04002154void
2155cifs_put_tlink(struct tcon_link *tlink)
2156{
2157 if (!tlink || IS_ERR(tlink))
2158 return;
2159
2160 if (!atomic_dec_and_test(&tlink->tl_count) ||
2161 test_bit(TCON_LINK_IN_TREE, &tlink->tl_flags)) {
2162 tlink->tl_time = jiffies;
2163 return;
2164 }
2165
2166 if (!IS_ERR(tlink_tcon(tlink)))
2167 cifs_put_tcon(tlink_tcon(tlink));
2168 kfree(tlink);
2169 return;
2170}
Jeff Laytond00c28d2010-04-24 07:57:44 -04002171
Linus Torvalds1da177e2005-04-16 15:20:36 -07002172int
Steve French50c2f752007-07-13 00:33:32 +00002173get_dfs_path(int xid, struct cifsSesInfo *pSesInfo, const char *old_path,
2174 const struct nls_table *nls_codepage, unsigned int *pnum_referrals,
Steve French366781c2008-01-25 10:12:41 +00002175 struct dfs_info3_param **preferrals, int remap)
Linus Torvalds1da177e2005-04-16 15:20:36 -07002176{
2177 char *temp_unc;
2178 int rc = 0;
2179
2180 *pnum_referrals = 0;
Steve French366781c2008-01-25 10:12:41 +00002181 *preferrals = NULL;
Linus Torvalds1da177e2005-04-16 15:20:36 -07002182
2183 if (pSesInfo->ipc_tid == 0) {
2184 temp_unc = kmalloc(2 /* for slashes */ +
Steve French50c2f752007-07-13 00:33:32 +00002185 strnlen(pSesInfo->serverName,
2186 SERVER_NAME_LEN_WITH_NULL * 2)
Linus Torvalds1da177e2005-04-16 15:20:36 -07002187 + 1 + 4 /* slash IPC$ */ + 2,
2188 GFP_KERNEL);
2189 if (temp_unc == NULL)
2190 return -ENOMEM;
2191 temp_unc[0] = '\\';
2192 temp_unc[1] = '\\';
2193 strcpy(temp_unc + 2, pSesInfo->serverName);
2194 strcpy(temp_unc + 2 + strlen(pSesInfo->serverName), "\\IPC$");
2195 rc = CIFSTCon(xid, pSesInfo, temp_unc, NULL, nls_codepage);
Joe Perchesb6b38f72010-04-21 03:50:45 +00002196 cFYI(1, "CIFS Tcon rc = %d ipc_tid = %d", rc, pSesInfo->ipc_tid);
Linus Torvalds1da177e2005-04-16 15:20:36 -07002197 kfree(temp_unc);
2198 }
2199 if (rc == 0)
Steve Frenchc2cf07d2008-05-15 06:20:02 +00002200 rc = CIFSGetDFSRefer(xid, pSesInfo, old_path, preferrals,
Steve French737b7582005-04-28 22:41:06 -07002201 pnum_referrals, nls_codepage, remap);
Steve French366781c2008-01-25 10:12:41 +00002202 /* BB map targetUNCs to dfs_info3 structures, here or
2203 in CIFSGetDFSRefer BB */
Linus Torvalds1da177e2005-04-16 15:20:36 -07002204
2205 return rc;
2206}
2207
Jeff Layton09e50d52008-07-23 10:11:19 -04002208#ifdef CONFIG_DEBUG_LOCK_ALLOC
2209static struct lock_class_key cifs_key[2];
2210static struct lock_class_key cifs_slock_key[2];
2211
2212static inline void
2213cifs_reclassify_socket4(struct socket *sock)
2214{
2215 struct sock *sk = sock->sk;
2216 BUG_ON(sock_owned_by_user(sk));
2217 sock_lock_init_class_and_name(sk, "slock-AF_INET-CIFS",
2218 &cifs_slock_key[0], "sk_lock-AF_INET-CIFS", &cifs_key[0]);
2219}
2220
2221static inline void
2222cifs_reclassify_socket6(struct socket *sock)
2223{
2224 struct sock *sk = sock->sk;
2225 BUG_ON(sock_owned_by_user(sk));
2226 sock_lock_init_class_and_name(sk, "slock-AF_INET6-CIFS",
2227 &cifs_slock_key[1], "sk_lock-AF_INET6-CIFS", &cifs_key[1]);
2228}
2229#else
2230static inline void
2231cifs_reclassify_socket4(struct socket *sock)
2232{
2233}
2234
2235static inline void
2236cifs_reclassify_socket6(struct socket *sock)
2237{
2238}
2239#endif
2240
Linus Torvalds1da177e2005-04-16 15:20:36 -07002241/* See RFC1001 section 14 on representation of Netbios names */
Steve French50c2f752007-07-13 00:33:32 +00002242static void rfc1002mangle(char *target, char *source, unsigned int length)
Linus Torvalds1da177e2005-04-16 15:20:36 -07002243{
Steve French50c2f752007-07-13 00:33:32 +00002244 unsigned int i, j;
Linus Torvalds1da177e2005-04-16 15:20:36 -07002245
Steve French50c2f752007-07-13 00:33:32 +00002246 for (i = 0, j = 0; i < (length); i++) {
Linus Torvalds1da177e2005-04-16 15:20:36 -07002247 /* mask a nibble at a time and encode */
2248 target[j] = 'A' + (0x0F & (source[i] >> 4));
2249 target[j+1] = 'A' + (0x0F & source[i]);
Steve French50c2f752007-07-13 00:33:32 +00002250 j += 2;
Linus Torvalds1da177e2005-04-16 15:20:36 -07002251 }
2252
2253}
2254
Ben Greear3eb9a882010-09-01 17:06:02 -07002255static int
2256bind_socket(struct TCP_Server_Info *server)
2257{
2258 int rc = 0;
2259 if (server->srcaddr.ss_family != AF_UNSPEC) {
2260 /* Bind to the specified local IP address */
2261 struct socket *socket = server->ssocket;
2262 rc = socket->ops->bind(socket,
2263 (struct sockaddr *) &server->srcaddr,
2264 sizeof(server->srcaddr));
2265 if (rc < 0) {
2266 struct sockaddr_in *saddr4;
2267 struct sockaddr_in6 *saddr6;
2268 saddr4 = (struct sockaddr_in *)&server->srcaddr;
2269 saddr6 = (struct sockaddr_in6 *)&server->srcaddr;
2270 if (saddr6->sin6_family == AF_INET6)
2271 cERROR(1, "cifs: "
2272 "Failed to bind to: %pI6c, error: %d\n",
2273 &saddr6->sin6_addr, rc);
2274 else
2275 cERROR(1, "cifs: "
2276 "Failed to bind to: %pI4, error: %d\n",
2277 &saddr4->sin_addr.s_addr, rc);
2278 }
2279 }
2280 return rc;
2281}
Linus Torvalds1da177e2005-04-16 15:20:36 -07002282
2283static int
Pavel Shilovskya9f1b852010-12-13 19:08:35 +03002284ip_rfc1001_connect(struct TCP_Server_Info *server)
Linus Torvalds1da177e2005-04-16 15:20:36 -07002285{
2286 int rc = 0;
Pavel Shilovskya9f1b852010-12-13 19:08:35 +03002287 /*
2288 * some servers require RFC1001 sessinit before sending
2289 * negprot - BB check reconnection in case where second
2290 * sessinit is sent but no second negprot
2291 */
2292 struct rfc1002_session_packet *ses_init_buf;
2293 struct smb_hdr *smb_buf;
2294 ses_init_buf = kzalloc(sizeof(struct rfc1002_session_packet),
2295 GFP_KERNEL);
2296 if (ses_init_buf) {
2297 ses_init_buf->trailer.session_req.called_len = 32;
2298
2299 if (server->server_RFC1001_name &&
2300 server->server_RFC1001_name[0] != 0)
2301 rfc1002mangle(ses_init_buf->trailer.
2302 session_req.called_name,
2303 server->server_RFC1001_name,
2304 RFC1001_NAME_LEN_WITH_NULL);
2305 else
2306 rfc1002mangle(ses_init_buf->trailer.
2307 session_req.called_name,
2308 DEFAULT_CIFS_CALLED_NAME,
2309 RFC1001_NAME_LEN_WITH_NULL);
2310
2311 ses_init_buf->trailer.session_req.calling_len = 32;
2312
2313 /*
2314 * calling name ends in null (byte 16) from old smb
2315 * convention.
2316 */
2317 if (server->workstation_RFC1001_name &&
2318 server->workstation_RFC1001_name[0] != 0)
2319 rfc1002mangle(ses_init_buf->trailer.
2320 session_req.calling_name,
2321 server->workstation_RFC1001_name,
2322 RFC1001_NAME_LEN_WITH_NULL);
2323 else
2324 rfc1002mangle(ses_init_buf->trailer.
2325 session_req.calling_name,
2326 "LINUX_CIFS_CLNT",
2327 RFC1001_NAME_LEN_WITH_NULL);
2328
2329 ses_init_buf->trailer.session_req.scope1 = 0;
2330 ses_init_buf->trailer.session_req.scope2 = 0;
2331 smb_buf = (struct smb_hdr *)ses_init_buf;
2332
2333 /* sizeof RFC1002_SESSION_REQUEST with no scope */
Steve Frenchbe8e3b02011-04-29 05:40:20 +00002334 smb_buf->smb_buf_length = cpu_to_be32(0x81000044);
Pavel Shilovskya9f1b852010-12-13 19:08:35 +03002335 rc = smb_send(server, smb_buf, 0x44);
2336 kfree(ses_init_buf);
2337 /*
2338 * RFC1001 layer in at least one server
2339 * requires very short break before negprot
2340 * presumably because not expecting negprot
2341 * to follow so fast. This is a simple
2342 * solution that works without
2343 * complicating the code and causes no
2344 * significant slowing down on mount
2345 * for everyone else
2346 */
2347 usleep_range(1000, 2000);
2348 }
2349 /*
2350 * else the negprot may still work without this
2351 * even though malloc failed
2352 */
2353
2354 return rc;
2355}
2356
2357static int
2358generic_ip_connect(struct TCP_Server_Info *server)
2359{
2360 int rc = 0;
Steve French6da97912011-03-13 18:55:55 +00002361 __be16 sport;
Pavel Shilovskya9f1b852010-12-13 19:08:35 +03002362 int slen, sfamily;
Jeff Laytonbcf4b102008-12-01 18:42:15 -05002363 struct socket *socket = server->ssocket;
Pavel Shilovskya9f1b852010-12-13 19:08:35 +03002364 struct sockaddr *saddr;
2365
2366 saddr = (struct sockaddr *) &server->dstaddr;
2367
2368 if (server->dstaddr.ss_family == AF_INET6) {
2369 sport = ((struct sockaddr_in6 *) saddr)->sin6_port;
2370 slen = sizeof(struct sockaddr_in6);
2371 sfamily = AF_INET6;
2372 } else {
2373 sport = ((struct sockaddr_in *) saddr)->sin_port;
2374 slen = sizeof(struct sockaddr_in);
2375 sfamily = AF_INET;
2376 }
Linus Torvalds1da177e2005-04-16 15:20:36 -07002377
Jeff Laytonbcf4b102008-12-01 18:42:15 -05002378 if (socket == NULL) {
Rob Landleyf1d0c992011-01-22 15:44:05 -06002379 rc = __sock_create(cifs_net_ns(server), sfamily, SOCK_STREAM,
2380 IPPROTO_TCP, &socket, 1);
Linus Torvalds1da177e2005-04-16 15:20:36 -07002381 if (rc < 0) {
Joe Perchesb6b38f72010-04-21 03:50:45 +00002382 cERROR(1, "Error %d creating socket", rc);
Pavel Shilovskya9f1b852010-12-13 19:08:35 +03002383 server->ssocket = NULL;
Linus Torvalds1da177e2005-04-16 15:20:36 -07002384 return rc;
Linus Torvalds1da177e2005-04-16 15:20:36 -07002385 }
Jeff Laytonbcf4b102008-12-01 18:42:15 -05002386
2387 /* BB other socket options to set KEEPALIVE, NODELAY? */
Joe Perchesb6b38f72010-04-21 03:50:45 +00002388 cFYI(1, "Socket created");
Jeff Laytonbcf4b102008-12-01 18:42:15 -05002389 server->ssocket = socket;
2390 socket->sk->sk_allocation = GFP_NOFS;
Pavel Shilovskya9f1b852010-12-13 19:08:35 +03002391 if (sfamily == AF_INET6)
2392 cifs_reclassify_socket6(socket);
2393 else
2394 cifs_reclassify_socket4(socket);
Linus Torvalds1da177e2005-04-16 15:20:36 -07002395 }
2396
Ben Greear3eb9a882010-09-01 17:06:02 -07002397 rc = bind_socket(server);
2398 if (rc < 0)
2399 return rc;
2400
Pavel Shilovskya9f1b852010-12-13 19:08:35 +03002401 rc = socket->ops->connect(socket, saddr, slen, 0);
2402 if (rc < 0) {
2403 cFYI(1, "Error %d connecting to server", rc);
Jeff Laytond5c56052008-12-01 18:42:33 -05002404 sock_release(socket);
2405 server->ssocket = NULL;
Linus Torvalds1da177e2005-04-16 15:20:36 -07002406 return rc;
2407 }
Steve Frenchedf1ae42008-10-29 00:47:57 +00002408
Jeff Laytond5c56052008-12-01 18:42:33 -05002409 /*
2410 * Eventually check for other socket options to change from
2411 * the default. sock_setsockopt not used because it expects
2412 * user space buffer
2413 */
2414 socket->sk->sk_rcvtimeo = 7 * HZ;
Steve Frenchda505c32009-01-19 03:49:35 +00002415 socket->sk->sk_sndtimeo = 5 * HZ;
Steve French6a5fa2362010-01-01 01:28:43 +00002416
Pavel Shilovskya9f1b852010-12-13 19:08:35 +03002417 /* make the bufsizes depend on wsize/rsize and max requests */
2418 if (server->noautotune) {
2419 if (socket->sk->sk_sndbuf < (200 * 1024))
2420 socket->sk->sk_sndbuf = 200 * 1024;
2421 if (socket->sk->sk_rcvbuf < (140 * 1024))
2422 socket->sk->sk_rcvbuf = 140 * 1024;
2423 }
2424
Steve French6a5fa2362010-01-01 01:28:43 +00002425 if (server->tcp_nodelay) {
Pavel Shilovskya9f1b852010-12-13 19:08:35 +03002426 int val = 1;
Steve French6a5fa2362010-01-01 01:28:43 +00002427 rc = kernel_setsockopt(socket, SOL_TCP, TCP_NODELAY,
2428 (char *)&val, sizeof(val));
2429 if (rc)
Joe Perchesb6b38f72010-04-21 03:50:45 +00002430 cFYI(1, "set TCP_NODELAY socket option error %d", rc);
Steve French6a5fa2362010-01-01 01:28:43 +00002431 }
2432
Pavel Shilovskya9f1b852010-12-13 19:08:35 +03002433 cFYI(1, "sndbuf %d rcvbuf %d rcvtimeo 0x%lx",
2434 socket->sk->sk_sndbuf,
2435 socket->sk->sk_rcvbuf, socket->sk->sk_rcvtimeo);
2436
2437 if (sport == htons(RFC1001_PORT))
2438 rc = ip_rfc1001_connect(server);
Steve French50c2f752007-07-13 00:33:32 +00002439
Linus Torvalds1da177e2005-04-16 15:20:36 -07002440 return rc;
2441}
2442
Pavel Shilovskya9f1b852010-12-13 19:08:35 +03002443static int
2444ip_connect(struct TCP_Server_Info *server)
2445{
Steve French6da97912011-03-13 18:55:55 +00002446 __be16 *sport;
Pavel Shilovskya9f1b852010-12-13 19:08:35 +03002447 struct sockaddr_in6 *addr6 = (struct sockaddr_in6 *)&server->dstaddr;
2448 struct sockaddr_in *addr = (struct sockaddr_in *)&server->dstaddr;
2449
2450 if (server->dstaddr.ss_family == AF_INET6)
2451 sport = &addr6->sin6_port;
2452 else
2453 sport = &addr->sin_port;
2454
2455 if (*sport == 0) {
2456 int rc;
2457
2458 /* try with 445 port at first */
2459 *sport = htons(CIFS_PORT);
2460
2461 rc = generic_ip_connect(server);
2462 if (rc >= 0)
2463 return rc;
2464
2465 /* if it failed, try with 139 port */
2466 *sport = htons(RFC1001_PORT);
2467 }
2468
2469 return generic_ip_connect(server);
2470}
2471
Steve French50c2f752007-07-13 00:33:32 +00002472void reset_cifs_unix_caps(int xid, struct cifsTconInfo *tcon,
2473 struct super_block *sb, struct smb_vol *vol_info)
Steve French8af18972007-02-14 04:42:51 +00002474{
2475 /* if we are reconnecting then should we check to see if
2476 * any requested capabilities changed locally e.g. via
2477 * remount but we can not do much about it here
2478 * if they have (even if we could detect it by the following)
2479 * Perhaps we could add a backpointer to array of sb from tcon
2480 * or if we change to make all sb to same share the same
2481 * sb as NFS - then we only have one backpointer to sb.
2482 * What if we wanted to mount the server share twice once with
2483 * and once without posixacls or posix paths? */
2484 __u64 saved_cap = le64_to_cpu(tcon->fsUnixInfo.Capability);
Steve French50c2f752007-07-13 00:33:32 +00002485
Steve Frenchc18c8422007-07-18 23:21:09 +00002486 if (vol_info && vol_info->no_linux_ext) {
2487 tcon->fsUnixInfo.Capability = 0;
2488 tcon->unix_ext = 0; /* Unix Extensions disabled */
Joe Perchesb6b38f72010-04-21 03:50:45 +00002489 cFYI(1, "Linux protocol extensions disabled");
Steve Frenchc18c8422007-07-18 23:21:09 +00002490 return;
2491 } else if (vol_info)
2492 tcon->unix_ext = 1; /* Unix Extensions supported */
2493
2494 if (tcon->unix_ext == 0) {
Joe Perchesb6b38f72010-04-21 03:50:45 +00002495 cFYI(1, "Unix extensions disabled so not set on reconnect");
Steve Frenchc18c8422007-07-18 23:21:09 +00002496 return;
2497 }
Steve French50c2f752007-07-13 00:33:32 +00002498
Steve Frenchfb8c4b12007-07-10 01:16:18 +00002499 if (!CIFSSMBQFSUnixInfo(xid, tcon)) {
Steve French8af18972007-02-14 04:42:51 +00002500 __u64 cap = le64_to_cpu(tcon->fsUnixInfo.Capability);
Steve French50c2f752007-07-13 00:33:32 +00002501
Steve French8af18972007-02-14 04:42:51 +00002502 /* check for reconnect case in which we do not
2503 want to change the mount behavior if we can avoid it */
Steve Frenchfb8c4b12007-07-10 01:16:18 +00002504 if (vol_info == NULL) {
Steve French50c2f752007-07-13 00:33:32 +00002505 /* turn off POSIX ACL and PATHNAMES if not set
Steve French8af18972007-02-14 04:42:51 +00002506 originally at mount time */
2507 if ((saved_cap & CIFS_UNIX_POSIX_ACL_CAP) == 0)
2508 cap &= ~CIFS_UNIX_POSIX_ACL_CAP;
Igor Mammedov11b6d642008-02-15 19:06:04 +00002509 if ((saved_cap & CIFS_UNIX_POSIX_PATHNAMES_CAP) == 0) {
2510 if (cap & CIFS_UNIX_POSIX_PATHNAMES_CAP)
Joe Perchesb6b38f72010-04-21 03:50:45 +00002511 cERROR(1, "POSIXPATH support change");
Steve French8af18972007-02-14 04:42:51 +00002512 cap &= ~CIFS_UNIX_POSIX_PATHNAMES_CAP;
Igor Mammedov11b6d642008-02-15 19:06:04 +00002513 } else if ((cap & CIFS_UNIX_POSIX_PATHNAMES_CAP) == 0) {
Joe Perchesb6b38f72010-04-21 03:50:45 +00002514 cERROR(1, "possible reconnect error");
2515 cERROR(1, "server disabled POSIX path support");
Igor Mammedov11b6d642008-02-15 19:06:04 +00002516 }
Steve French8af18972007-02-14 04:42:51 +00002517 }
Steve French50c2f752007-07-13 00:33:32 +00002518
Steve French8af18972007-02-14 04:42:51 +00002519 cap &= CIFS_UNIX_CAP_MASK;
Steve French75865f8c2007-06-24 18:30:48 +00002520 if (vol_info && vol_info->no_psx_acl)
Steve French8af18972007-02-14 04:42:51 +00002521 cap &= ~CIFS_UNIX_POSIX_ACL_CAP;
Steve French75865f8c2007-06-24 18:30:48 +00002522 else if (CIFS_UNIX_POSIX_ACL_CAP & cap) {
Joe Perchesb6b38f72010-04-21 03:50:45 +00002523 cFYI(1, "negotiated posix acl support");
Steve Frenchfb8c4b12007-07-10 01:16:18 +00002524 if (sb)
Steve French8af18972007-02-14 04:42:51 +00002525 sb->s_flags |= MS_POSIXACL;
2526 }
2527
Steve French75865f8c2007-06-24 18:30:48 +00002528 if (vol_info && vol_info->posix_paths == 0)
Steve French8af18972007-02-14 04:42:51 +00002529 cap &= ~CIFS_UNIX_POSIX_PATHNAMES_CAP;
Steve French75865f8c2007-06-24 18:30:48 +00002530 else if (cap & CIFS_UNIX_POSIX_PATHNAMES_CAP) {
Joe Perchesb6b38f72010-04-21 03:50:45 +00002531 cFYI(1, "negotiate posix pathnames");
Steve French75865f8c2007-06-24 18:30:48 +00002532 if (sb)
Steve French50c2f752007-07-13 00:33:32 +00002533 CIFS_SB(sb)->mnt_cifs_flags |=
Steve French8af18972007-02-14 04:42:51 +00002534 CIFS_MOUNT_POSIX_PATHS;
2535 }
Steve French50c2f752007-07-13 00:33:32 +00002536
Steve French984acfe2007-04-26 16:42:50 +00002537 /* We might be setting the path sep back to a different
2538 form if we are reconnecting and the server switched its
Steve French50c2f752007-07-13 00:33:32 +00002539 posix path capability for this share */
Steve French75865f8c2007-06-24 18:30:48 +00002540 if (sb && (CIFS_SB(sb)->prepathlen > 0))
Steve French984acfe2007-04-26 16:42:50 +00002541 CIFS_SB(sb)->prepath[0] = CIFS_DIR_SEP(CIFS_SB(sb));
Steve French75865f8c2007-06-24 18:30:48 +00002542
2543 if (sb && (CIFS_SB(sb)->rsize > 127 * 1024)) {
2544 if ((cap & CIFS_UNIX_LARGE_READ_CAP) == 0) {
2545 CIFS_SB(sb)->rsize = 127 * 1024;
Joe Perchesb6b38f72010-04-21 03:50:45 +00002546 cFYI(DBG2, "larger reads not supported by srv");
Steve French75865f8c2007-06-24 18:30:48 +00002547 }
2548 }
Steve French50c2f752007-07-13 00:33:32 +00002549
2550
Joe Perchesb6b38f72010-04-21 03:50:45 +00002551 cFYI(1, "Negotiate caps 0x%x", (int)cap);
Steve French8af18972007-02-14 04:42:51 +00002552#ifdef CONFIG_CIFS_DEBUG2
Steve French75865f8c2007-06-24 18:30:48 +00002553 if (cap & CIFS_UNIX_FCNTL_CAP)
Joe Perchesb6b38f72010-04-21 03:50:45 +00002554 cFYI(1, "FCNTL cap");
Steve French75865f8c2007-06-24 18:30:48 +00002555 if (cap & CIFS_UNIX_EXTATTR_CAP)
Joe Perchesb6b38f72010-04-21 03:50:45 +00002556 cFYI(1, "EXTATTR cap");
Steve French75865f8c2007-06-24 18:30:48 +00002557 if (cap & CIFS_UNIX_POSIX_PATHNAMES_CAP)
Joe Perchesb6b38f72010-04-21 03:50:45 +00002558 cFYI(1, "POSIX path cap");
Steve French75865f8c2007-06-24 18:30:48 +00002559 if (cap & CIFS_UNIX_XATTR_CAP)
Joe Perchesb6b38f72010-04-21 03:50:45 +00002560 cFYI(1, "XATTR cap");
Steve French75865f8c2007-06-24 18:30:48 +00002561 if (cap & CIFS_UNIX_POSIX_ACL_CAP)
Joe Perchesb6b38f72010-04-21 03:50:45 +00002562 cFYI(1, "POSIX ACL cap");
Steve French75865f8c2007-06-24 18:30:48 +00002563 if (cap & CIFS_UNIX_LARGE_READ_CAP)
Joe Perchesb6b38f72010-04-21 03:50:45 +00002564 cFYI(1, "very large read cap");
Steve French75865f8c2007-06-24 18:30:48 +00002565 if (cap & CIFS_UNIX_LARGE_WRITE_CAP)
Joe Perchesb6b38f72010-04-21 03:50:45 +00002566 cFYI(1, "very large write cap");
Steve French8af18972007-02-14 04:42:51 +00002567#endif /* CIFS_DEBUG2 */
2568 if (CIFSSMBSetFSUnixInfo(xid, tcon, cap)) {
Steve French442aa312007-09-24 20:25:46 +00002569 if (vol_info == NULL) {
Joe Perchesb6b38f72010-04-21 03:50:45 +00002570 cFYI(1, "resetting capabilities failed");
Steve French442aa312007-09-24 20:25:46 +00002571 } else
Joe Perchesb6b38f72010-04-21 03:50:45 +00002572 cERROR(1, "Negotiating Unix capabilities "
Steve French5a44b312007-09-20 15:16:24 +00002573 "with the server failed. Consider "
2574 "mounting with the Unix Extensions\n"
2575 "disabled, if problems are found, "
2576 "by specifying the nounix mount "
Joe Perchesb6b38f72010-04-21 03:50:45 +00002577 "option.");
Steve French5a44b312007-09-20 15:16:24 +00002578
Steve French8af18972007-02-14 04:42:51 +00002579 }
2580 }
2581}
2582
Steve French03a143c2008-02-14 06:38:30 +00002583static void
2584convert_delimiter(char *path, char delim)
2585{
2586 int i;
Steve Frenchc2d68ea2008-02-15 19:20:18 +00002587 char old_delim;
Steve French03a143c2008-02-14 06:38:30 +00002588
2589 if (path == NULL)
2590 return;
2591
Steve French582d21e2008-05-13 04:54:12 +00002592 if (delim == '/')
Steve Frenchc2d68ea2008-02-15 19:20:18 +00002593 old_delim = '\\';
2594 else
2595 old_delim = '/';
2596
Steve French03a143c2008-02-14 06:38:30 +00002597 for (i = 0; path[i] != '\0'; i++) {
Steve Frenchc2d68ea2008-02-15 19:20:18 +00002598 if (path[i] == old_delim)
Steve French03a143c2008-02-14 06:38:30 +00002599 path[i] = delim;
2600 }
2601}
2602
Steve French3b795212008-11-13 19:45:32 +00002603static void setup_cifs_sb(struct smb_vol *pvolume_info,
2604 struct cifs_sb_info *cifs_sb)
Jeff Laytonb1c8d2b2008-10-22 13:57:07 -04002605{
Jeff Layton2de970f2010-10-06 19:51:12 -04002606 INIT_DELAYED_WORK(&cifs_sb->prune_tlinks, cifs_prune_tlinks);
2607
Steve French3b795212008-11-13 19:45:32 +00002608 if (pvolume_info->rsize > CIFSMaxBufSize) {
Joe Perchesb6b38f72010-04-21 03:50:45 +00002609 cERROR(1, "rsize %d too large, using MaxBufSize",
2610 pvolume_info->rsize);
Steve French3b795212008-11-13 19:45:32 +00002611 cifs_sb->rsize = CIFSMaxBufSize;
2612 } else if ((pvolume_info->rsize) &&
2613 (pvolume_info->rsize <= CIFSMaxBufSize))
2614 cifs_sb->rsize = pvolume_info->rsize;
2615 else /* default */
2616 cifs_sb->rsize = CIFSMaxBufSize;
Jeff Laytonb1c8d2b2008-10-22 13:57:07 -04002617
Steve French3b795212008-11-13 19:45:32 +00002618 if (pvolume_info->wsize > PAGEVEC_SIZE * PAGE_CACHE_SIZE) {
Joe Perchesb6b38f72010-04-21 03:50:45 +00002619 cERROR(1, "wsize %d too large, using 4096 instead",
2620 pvolume_info->wsize);
Steve French3b795212008-11-13 19:45:32 +00002621 cifs_sb->wsize = 4096;
2622 } else if (pvolume_info->wsize)
2623 cifs_sb->wsize = pvolume_info->wsize;
2624 else
2625 cifs_sb->wsize = min_t(const int,
2626 PAGEVEC_SIZE * PAGE_CACHE_SIZE,
2627 127*1024);
2628 /* old default of CIFSMaxBufSize was too small now
2629 that SMB Write2 can send multiple pages in kvec.
2630 RFC1001 does not describe what happens when frame
2631 bigger than 128K is sent so use that as max in
2632 conjunction with 52K kvec constraint on arch with 4K
2633 page size */
2634
2635 if (cifs_sb->rsize < 2048) {
2636 cifs_sb->rsize = 2048;
2637 /* Windows ME may prefer this */
Joe Perchesb6b38f72010-04-21 03:50:45 +00002638 cFYI(1, "readsize set to minimum: 2048");
Steve French3b795212008-11-13 19:45:32 +00002639 }
2640 /* calculate prepath */
2641 cifs_sb->prepath = pvolume_info->prepath;
2642 if (cifs_sb->prepath) {
2643 cifs_sb->prepathlen = strlen(cifs_sb->prepath);
2644 /* we can not convert the / to \ in the path
2645 separators in the prefixpath yet because we do not
2646 know (until reset_cifs_unix_caps is called later)
2647 whether POSIX PATH CAP is available. We normalize
2648 the / to \ after reset_cifs_unix_caps is called */
2649 pvolume_info->prepath = NULL;
2650 } else
2651 cifs_sb->prepathlen = 0;
2652 cifs_sb->mnt_uid = pvolume_info->linux_uid;
2653 cifs_sb->mnt_gid = pvolume_info->linux_gid;
2654 cifs_sb->mnt_file_mode = pvolume_info->file_mode;
2655 cifs_sb->mnt_dir_mode = pvolume_info->dir_mode;
Joe Perchesb6b38f72010-04-21 03:50:45 +00002656 cFYI(1, "file mode: 0x%x dir mode: 0x%x",
2657 cifs_sb->mnt_file_mode, cifs_sb->mnt_dir_mode);
Steve French3b795212008-11-13 19:45:32 +00002658
Suresh Jayaraman6d20e842010-12-01 14:42:28 +05302659 cifs_sb->actimeo = pvolume_info->actimeo;
2660
Steve French3b795212008-11-13 19:45:32 +00002661 if (pvolume_info->noperm)
2662 cifs_sb->mnt_cifs_flags |= CIFS_MOUNT_NO_PERM;
2663 if (pvolume_info->setuids)
2664 cifs_sb->mnt_cifs_flags |= CIFS_MOUNT_SET_UID;
2665 if (pvolume_info->server_ino)
2666 cifs_sb->mnt_cifs_flags |= CIFS_MOUNT_SERVER_INUM;
2667 if (pvolume_info->remap)
2668 cifs_sb->mnt_cifs_flags |= CIFS_MOUNT_MAP_SPECIAL_CHR;
2669 if (pvolume_info->no_xattr)
2670 cifs_sb->mnt_cifs_flags |= CIFS_MOUNT_NO_XATTR;
2671 if (pvolume_info->sfu_emul)
2672 cifs_sb->mnt_cifs_flags |= CIFS_MOUNT_UNX_EMUL;
2673 if (pvolume_info->nobrl)
2674 cifs_sb->mnt_cifs_flags |= CIFS_MOUNT_NO_BRL;
Steve Frenchbe652442009-02-23 15:21:59 +00002675 if (pvolume_info->nostrictsync)
Steve French4717bed2009-02-24 14:44:19 +00002676 cifs_sb->mnt_cifs_flags |= CIFS_MOUNT_NOSSYNC;
Steve French13a6e422008-12-02 17:24:33 +00002677 if (pvolume_info->mand_lock)
2678 cifs_sb->mnt_cifs_flags |= CIFS_MOUNT_NOPOSIXBRL;
Steve French3b795212008-11-13 19:45:32 +00002679 if (pvolume_info->cifs_acl)
2680 cifs_sb->mnt_cifs_flags |= CIFS_MOUNT_CIFS_ACL;
2681 if (pvolume_info->override_uid)
2682 cifs_sb->mnt_cifs_flags |= CIFS_MOUNT_OVERR_UID;
2683 if (pvolume_info->override_gid)
2684 cifs_sb->mnt_cifs_flags |= CIFS_MOUNT_OVERR_GID;
2685 if (pvolume_info->dynperm)
2686 cifs_sb->mnt_cifs_flags |= CIFS_MOUNT_DYNPERM;
Suresh Jayaramanfa1df752010-07-05 18:13:36 +05302687 if (pvolume_info->fsc)
2688 cifs_sb->mnt_cifs_flags |= CIFS_MOUNT_FSCACHE;
Jeff Layton0eb8a132010-10-06 19:51:12 -04002689 if (pvolume_info->multiuser)
2690 cifs_sb->mnt_cifs_flags |= (CIFS_MOUNT_MULTIUSER |
2691 CIFS_MOUNT_NO_PERM);
Pavel Shilovskyd39454f2011-01-24 14:16:35 -05002692 if (pvolume_info->strict_io)
2693 cifs_sb->mnt_cifs_flags |= CIFS_MOUNT_STRICT_IO;
Steve French3b795212008-11-13 19:45:32 +00002694 if (pvolume_info->direct_io) {
Joe Perchesb6b38f72010-04-21 03:50:45 +00002695 cFYI(1, "mounting share using direct i/o");
Steve French3b795212008-11-13 19:45:32 +00002696 cifs_sb->mnt_cifs_flags |= CIFS_MOUNT_DIRECT_IO;
2697 }
Stefan Metzmacher736a33202010-07-30 14:56:00 +02002698 if (pvolume_info->mfsymlinks) {
2699 if (pvolume_info->sfu_emul) {
2700 cERROR(1, "mount option mfsymlinks ignored if sfu "
2701 "mount option is used");
2702 } else {
2703 cifs_sb->mnt_cifs_flags |= CIFS_MOUNT_MF_SYMLINKS;
2704 }
2705 }
Steve French3b795212008-11-13 19:45:32 +00002706
2707 if ((pvolume_info->cifs_acl) && (pvolume_info->dynperm))
Joe Perchesb6b38f72010-04-21 03:50:45 +00002708 cERROR(1, "mount option dynperm ignored if cifsacl "
2709 "mount option supported");
Jeff Laytonb1c8d2b2008-10-22 13:57:07 -04002710}
2711
Igor Mammedove4cce942009-02-10 14:10:26 +03002712static int
2713is_path_accessible(int xid, struct cifsTconInfo *tcon,
2714 struct cifs_sb_info *cifs_sb, const char *full_path)
2715{
2716 int rc;
Igor Mammedove4cce942009-02-10 14:10:26 +03002717 FILE_ALL_INFO *pfile_info;
2718
Igor Mammedove4cce942009-02-10 14:10:26 +03002719 pfile_info = kmalloc(sizeof(FILE_ALL_INFO), GFP_KERNEL);
2720 if (pfile_info == NULL)
2721 return -ENOMEM;
2722
2723 rc = CIFSSMBQPathInfo(xid, tcon, full_path, pfile_info,
2724 0 /* not legacy */, cifs_sb->local_nls,
2725 cifs_sb->mnt_cifs_flags &
2726 CIFS_MOUNT_MAP_SPECIAL_CHR);
Jeff Layton221d1d72011-05-17 06:40:30 -04002727
2728 if (rc == -EOPNOTSUPP || rc == -EINVAL)
2729 rc = SMBQueryInformation(xid, tcon, full_path, pfile_info,
2730 cifs_sb->local_nls, cifs_sb->mnt_cifs_flags &
2731 CIFS_MOUNT_MAP_SPECIAL_CHR);
Igor Mammedove4cce942009-02-10 14:10:26 +03002732 kfree(pfile_info);
2733 return rc;
2734}
2735
Igor Mammedov1bfe73c2009-04-01 17:54:42 +04002736static void
2737cleanup_volume_info(struct smb_vol **pvolume_info)
2738{
2739 struct smb_vol *volume_info;
2740
Dan Carpenterad6cca62010-04-26 12:10:06 +02002741 if (!pvolume_info || !*pvolume_info)
Igor Mammedov1bfe73c2009-04-01 17:54:42 +04002742 return;
2743
2744 volume_info = *pvolume_info;
Sean Finneyb9468452011-04-11 13:19:32 +00002745 kfree(volume_info->username);
Igor Mammedov1bfe73c2009-04-01 17:54:42 +04002746 kzfree(volume_info->password);
2747 kfree(volume_info->UNC);
Sean Finneyb9468452011-04-11 13:19:32 +00002748 kfree(volume_info->UNCip);
2749 kfree(volume_info->domainname);
2750 kfree(volume_info->iocharset);
Igor Mammedov1bfe73c2009-04-01 17:54:42 +04002751 kfree(volume_info->prepath);
2752 kfree(volume_info);
2753 *pvolume_info = NULL;
2754 return;
2755}
2756
Steve French2d6d5892009-04-09 00:36:44 +00002757#ifdef CONFIG_CIFS_DFS_UPCALL
Igor Mammedov1bfe73c2009-04-01 17:54:42 +04002758/* build_path_to_root returns full path to root when
2759 * we do not have an exiting connection (tcon) */
2760static char *
2761build_unc_path_to_root(const struct smb_vol *volume_info,
2762 const struct cifs_sb_info *cifs_sb)
2763{
2764 char *full_path;
2765
2766 int unc_len = strnlen(volume_info->UNC, MAX_TREE_SIZE + 1);
2767 full_path = kmalloc(unc_len + cifs_sb->prepathlen + 1, GFP_KERNEL);
2768 if (full_path == NULL)
2769 return ERR_PTR(-ENOMEM);
2770
2771 strncpy(full_path, volume_info->UNC, unc_len);
2772 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_POSIX_PATHS) {
2773 int i;
2774 for (i = 0; i < unc_len; i++) {
2775 if (full_path[i] == '\\')
2776 full_path[i] = '/';
2777 }
2778 }
2779
2780 if (cifs_sb->prepathlen)
2781 strncpy(full_path + unc_len, cifs_sb->prepath,
2782 cifs_sb->prepathlen);
2783
2784 full_path[unc_len + cifs_sb->prepathlen] = 0; /* add trailing null */
2785 return full_path;
2786}
Sean Finneydd613942011-04-11 13:19:30 +00002787
2788/*
2789 * Perform a dfs referral query for a share and (optionally) prefix
2790 *
Sean Finney046462a2011-04-11 13:19:33 +00002791 * If a referral is found, cifs_sb->mountdata will be (re-)allocated
2792 * to a string containing updated options for the submount. Otherwise it
2793 * will be left untouched.
Sean Finneydd613942011-04-11 13:19:30 +00002794 *
2795 * Returns the rc from get_dfs_path to the caller, which can be used to
2796 * determine whether there were referrals.
2797 */
2798static int
2799expand_dfs_referral(int xid, struct cifsSesInfo *pSesInfo,
2800 struct smb_vol *volume_info, struct cifs_sb_info *cifs_sb,
Sean Finney046462a2011-04-11 13:19:33 +00002801 int check_prefix)
Sean Finneydd613942011-04-11 13:19:30 +00002802{
2803 int rc;
2804 unsigned int num_referrals = 0;
2805 struct dfs_info3_param *referrals = NULL;
2806 char *full_path = NULL, *ref_path = NULL, *mdata = NULL;
2807
2808 full_path = build_unc_path_to_root(volume_info, cifs_sb);
2809 if (IS_ERR(full_path))
2810 return PTR_ERR(full_path);
2811
2812 /* For DFS paths, skip the first '\' of the UNC */
2813 ref_path = check_prefix ? full_path + 1 : volume_info->UNC + 1;
2814
2815 rc = get_dfs_path(xid, pSesInfo , ref_path, cifs_sb->local_nls,
2816 &num_referrals, &referrals,
2817 cifs_sb->mnt_cifs_flags & CIFS_MOUNT_MAP_SPECIAL_CHR);
2818
2819 if (!rc && num_referrals > 0) {
2820 char *fake_devname = NULL;
2821
2822 mdata = cifs_compose_mount_options(cifs_sb->mountdata,
2823 full_path + 1, referrals,
2824 &fake_devname);
2825
2826 free_dfs_info_array(referrals, num_referrals);
2827 kfree(fake_devname);
2828
Sean Finney046462a2011-04-11 13:19:33 +00002829 if (cifs_sb->mountdata != NULL)
2830 kfree(cifs_sb->mountdata);
2831
Sean Finneydd613942011-04-11 13:19:30 +00002832 if (IS_ERR(mdata)) {
2833 rc = PTR_ERR(mdata);
2834 mdata = NULL;
2835 }
Sean Finney046462a2011-04-11 13:19:33 +00002836 cifs_sb->mountdata = mdata;
Sean Finneydd613942011-04-11 13:19:30 +00002837 }
2838 kfree(full_path);
2839 return rc;
2840}
Steve French2d6d5892009-04-09 00:36:44 +00002841#endif
Igor Mammedov1bfe73c2009-04-01 17:54:42 +04002842
Linus Torvalds1da177e2005-04-16 15:20:36 -07002843int
2844cifs_mount(struct super_block *sb, struct cifs_sb_info *cifs_sb,
Igor Mammedov1bfe73c2009-04-01 17:54:42 +04002845 char *mount_data_global, const char *devname)
Linus Torvalds1da177e2005-04-16 15:20:36 -07002846{
Jeff Laytona2934c72009-12-03 08:09:41 -05002847 int rc;
Linus Torvalds1da177e2005-04-16 15:20:36 -07002848 int xid;
Jeff Layton7586b762008-12-01 18:41:49 -05002849 struct smb_vol *volume_info;
Jeff Laytona2934c72009-12-03 08:09:41 -05002850 struct cifsSesInfo *pSesInfo;
2851 struct cifsTconInfo *tcon;
2852 struct TCP_Server_Info *srvTcp;
Igor Mammedove4cce942009-02-10 14:10:26 +03002853 char *full_path;
Steve French2d6d5892009-04-09 00:36:44 +00002854 char *mount_data = mount_data_global;
Jeff Layton9d002df2010-10-06 19:51:11 -04002855 struct tcon_link *tlink;
Steve French2d6d5892009-04-09 00:36:44 +00002856#ifdef CONFIG_CIFS_DFS_UPCALL
Igor Mammedov5c2503a2009-04-21 19:31:05 +04002857 int referral_walks_count = 0;
Igor Mammedov1bfe73c2009-04-01 17:54:42 +04002858try_mount_again:
Sean Finney046462a2011-04-11 13:19:33 +00002859 mount_data = cifs_sb->mountdata;
Sean Finneydd613942011-04-11 13:19:30 +00002860
2861 /* cleanup activities if we're chasing a referral */
2862 if (referral_walks_count) {
2863 if (tcon)
2864 cifs_put_tcon(tcon);
2865 else if (pSesInfo)
2866 cifs_put_smb_ses(pSesInfo);
2867
2868 cleanup_volume_info(&volume_info);
2869 FreeXid(xid);
2870 }
Steve French2d6d5892009-04-09 00:36:44 +00002871#endif
Jeff Laytona2934c72009-12-03 08:09:41 -05002872 rc = 0;
2873 tcon = NULL;
2874 pSesInfo = NULL;
2875 srvTcp = NULL;
Igor Mammedov1bfe73c2009-04-01 17:54:42 +04002876 full_path = NULL;
Jeff Layton9d002df2010-10-06 19:51:11 -04002877 tlink = NULL;
Linus Torvalds1da177e2005-04-16 15:20:36 -07002878
2879 xid = GetXid();
2880
Jeff Layton7586b762008-12-01 18:41:49 -05002881 volume_info = kzalloc(sizeof(struct smb_vol), GFP_KERNEL);
2882 if (!volume_info) {
2883 rc = -ENOMEM;
2884 goto out;
2885 }
Steve French50c2f752007-07-13 00:33:32 +00002886
Jeff Layton7586b762008-12-01 18:41:49 -05002887 if (cifs_parse_mount_options(mount_data, devname, volume_info)) {
Jeff Layton70fe7dc2007-11-16 22:21:07 +00002888 rc = -EINVAL;
2889 goto out;
Linus Torvalds1da177e2005-04-16 15:20:36 -07002890 }
2891
Jeff Layton7586b762008-12-01 18:41:49 -05002892 if (volume_info->nullauth) {
Joe Perchesb6b38f72010-04-21 03:50:45 +00002893 cFYI(1, "null user");
Jeff Layton7586b762008-12-01 18:41:49 -05002894 volume_info->username = "";
2895 } else if (volume_info->username) {
Linus Torvalds1da177e2005-04-16 15:20:36 -07002896 /* BB fixme parse for domain name here */
Joe Perchesb6b38f72010-04-21 03:50:45 +00002897 cFYI(1, "Username: %s", volume_info->username);
Linus Torvalds1da177e2005-04-16 15:20:36 -07002898 } else {
Steve Frenchbf820672005-12-01 22:32:42 -08002899 cifserror("No username specified");
Steve French50c2f752007-07-13 00:33:32 +00002900 /* In userspace mount helper we can get user name from alternate
2901 locations such as env variables and files on disk */
Jeff Layton70fe7dc2007-11-16 22:21:07 +00002902 rc = -EINVAL;
2903 goto out;
Linus Torvalds1da177e2005-04-16 15:20:36 -07002904 }
2905
Linus Torvalds1da177e2005-04-16 15:20:36 -07002906 /* this is needed for ASCII cp to Unicode converts */
Jeff Layton7586b762008-12-01 18:41:49 -05002907 if (volume_info->iocharset == NULL) {
Jeff Laytona5fc4ce2010-04-24 07:57:42 -04002908 /* load_nls_default cannot return null */
2909 volume_info->local_nls = load_nls_default();
Linus Torvalds1da177e2005-04-16 15:20:36 -07002910 } else {
Jeff Laytona5fc4ce2010-04-24 07:57:42 -04002911 volume_info->local_nls = load_nls(volume_info->iocharset);
2912 if (volume_info->local_nls == NULL) {
Joe Perchesb6b38f72010-04-21 03:50:45 +00002913 cERROR(1, "CIFS mount error: iocharset %s not found",
2914 volume_info->iocharset);
Jeff Layton70fe7dc2007-11-16 22:21:07 +00002915 rc = -ELIBACC;
2916 goto out;
Linus Torvalds1da177e2005-04-16 15:20:36 -07002917 }
2918 }
Jeff Laytona5fc4ce2010-04-24 07:57:42 -04002919 cifs_sb->local_nls = volume_info->local_nls;
Linus Torvalds1da177e2005-04-16 15:20:36 -07002920
Jeff Layton63c038c2008-12-01 18:41:46 -05002921 /* get a reference to a tcp session */
Jeff Layton7586b762008-12-01 18:41:49 -05002922 srvTcp = cifs_get_tcp_session(volume_info);
Jeff Layton63c038c2008-12-01 18:41:46 -05002923 if (IS_ERR(srvTcp)) {
2924 rc = PTR_ERR(srvTcp);
2925 goto out;
Linus Torvalds1da177e2005-04-16 15:20:36 -07002926 }
2927
Jeff Layton36988c72010-04-24 07:57:43 -04002928 /* get a reference to a SMB session */
2929 pSesInfo = cifs_get_smb_ses(srvTcp, volume_info);
2930 if (IS_ERR(pSesInfo)) {
2931 rc = PTR_ERR(pSesInfo);
2932 pSesInfo = NULL;
2933 goto mount_fail_check;
Linus Torvalds1da177e2005-04-16 15:20:36 -07002934 }
Steve French50c2f752007-07-13 00:33:32 +00002935
Jeff Laytond00c28d2010-04-24 07:57:44 -04002936 setup_cifs_sb(volume_info, cifs_sb);
2937 if (pSesInfo->capabilities & CAP_LARGE_FILES)
2938 sb->s_maxbytes = MAX_LFS_FILESIZE;
2939 else
2940 sb->s_maxbytes = MAX_NON_LFS;
Linus Torvalds1da177e2005-04-16 15:20:36 -07002941
Steve French8af18972007-02-14 04:42:51 +00002942 /* BB FIXME fix time_gran to be larger for LANMAN sessions */
Linus Torvalds1da177e2005-04-16 15:20:36 -07002943 sb->s_time_gran = 100;
2944
Jeff Laytond00c28d2010-04-24 07:57:44 -04002945 /* search for existing tcon to this server share */
2946 tcon = cifs_get_tcon(pSesInfo, volume_info);
2947 if (IS_ERR(tcon)) {
2948 rc = PTR_ERR(tcon);
2949 tcon = NULL;
Igor Mammedov1bfe73c2009-04-01 17:54:42 +04002950 goto remote_path_check;
Jeff Laytond00c28d2010-04-24 07:57:44 -04002951 }
Igor Mammedov1bfe73c2009-04-01 17:54:42 +04002952
Steve Frenchd82c2df2008-11-15 00:07:26 +00002953 /* do not care if following two calls succeed - informational */
2954 if (!tcon->ipc) {
2955 CIFSSMBQFSDeviceInfo(xid, tcon);
2956 CIFSSMBQFSAttributeInfo(xid, tcon);
2957 }
2958
2959 /* tell server which Unix caps we support */
2960 if (tcon->ses->capabilities & CAP_UNIX)
2961 /* reset of caps checks mount to see if unix extensions
2962 disabled for just this mount */
Jeff Layton7586b762008-12-01 18:41:49 -05002963 reset_cifs_unix_caps(xid, tcon, sb, volume_info);
Steve Frenchd82c2df2008-11-15 00:07:26 +00002964 else
2965 tcon->unix_ext = 0; /* server does not support them */
2966
2967 /* convert forward to back slashes in prepath here if needed */
2968 if ((cifs_sb->mnt_cifs_flags & CIFS_MOUNT_POSIX_PATHS) == 0)
2969 convert_delimiter(cifs_sb->prepath, CIFS_DIR_SEP(cifs_sb));
2970
2971 if ((tcon->unix_ext == 0) && (cifs_sb->rsize > (1024 * 127))) {
2972 cifs_sb->rsize = 1024 * 127;
Joe Perchesb6b38f72010-04-21 03:50:45 +00002973 cFYI(DBG2, "no very large read support, rsize now 127K");
Steve Frenchd82c2df2008-11-15 00:07:26 +00002974 }
2975 if (!(tcon->ses->capabilities & CAP_LARGE_WRITE_X))
2976 cifs_sb->wsize = min(cifs_sb->wsize,
2977 (tcon->ses->server->maxBuf - MAX_CIFS_HDR_SIZE));
2978 if (!(tcon->ses->capabilities & CAP_LARGE_READ_X))
2979 cifs_sb->rsize = min(cifs_sb->rsize,
2980 (tcon->ses->server->maxBuf - MAX_CIFS_HDR_SIZE));
Linus Torvalds1da177e2005-04-16 15:20:36 -07002981
Igor Mammedov1bfe73c2009-04-01 17:54:42 +04002982remote_path_check:
Sean Finneyc1508ca2011-04-11 13:19:31 +00002983#ifdef CONFIG_CIFS_DFS_UPCALL
2984 /*
2985 * Perform an unconditional check for whether there are DFS
2986 * referrals for this path without prefix, to provide support
2987 * for DFS referrals from w2k8 servers which don't seem to respond
2988 * with PATH_NOT_COVERED to requests that include the prefix.
2989 * Chase the referral if found, otherwise continue normally.
2990 */
2991 if (referral_walks_count == 0) {
2992 int refrc = expand_dfs_referral(xid, pSesInfo, volume_info,
Sean Finney046462a2011-04-11 13:19:33 +00002993 cifs_sb, false);
Sean Finneyc1508ca2011-04-11 13:19:31 +00002994 if (!refrc) {
2995 referral_walks_count++;
2996 goto try_mount_again;
2997 }
2998 }
2999#endif
3000
Igor Mammedov1bfe73c2009-04-01 17:54:42 +04003001 /* check if a whole path (including prepath) is not remote */
Jeff Layton70945642011-03-14 13:48:08 -04003002 if (!rc && tcon) {
Igor Mammedove4cce942009-02-10 14:10:26 +03003003 /* build_path_to_root works only when we have a valid tcon */
Jeff Layton7d161b72010-12-07 02:10:35 -05003004 full_path = cifs_build_path_to_root(cifs_sb, tcon);
Igor Mammedove4cce942009-02-10 14:10:26 +03003005 if (full_path == NULL) {
3006 rc = -ENOMEM;
3007 goto mount_fail_check;
3008 }
3009 rc = is_path_accessible(xid, tcon, cifs_sb, full_path);
Jeff Layton03ceace2010-12-06 21:07:33 -05003010 if (rc != 0 && rc != -EREMOTE) {
Igor Mammedove4cce942009-02-10 14:10:26 +03003011 kfree(full_path);
3012 goto mount_fail_check;
3013 }
3014 kfree(full_path);
3015 }
3016
Igor Mammedov1bfe73c2009-04-01 17:54:42 +04003017 /* get referral if needed */
3018 if (rc == -EREMOTE) {
Steve Frenchd036f502009-04-03 03:12:08 +00003019#ifdef CONFIG_CIFS_DFS_UPCALL
Igor Mammedov5c2503a2009-04-21 19:31:05 +04003020 if (referral_walks_count > MAX_NESTED_LINKS) {
3021 /*
3022 * BB: when we implement proper loop detection,
3023 * we will remove this check. But now we need it
3024 * to prevent an indefinite loop if 'DFS tree' is
3025 * misconfigured (i.e. has loops).
3026 */
3027 rc = -ELOOP;
3028 goto mount_fail_check;
3029 }
Igor Mammedov1bfe73c2009-04-01 17:54:42 +04003030 /* convert forward to back slashes in prepath here if needed */
3031 if ((cifs_sb->mnt_cifs_flags & CIFS_MOUNT_POSIX_PATHS) == 0)
3032 convert_delimiter(cifs_sb->prepath,
3033 CIFS_DIR_SEP(cifs_sb));
Igor Mammedov1bfe73c2009-04-01 17:54:42 +04003034
Sean Finneydd613942011-04-11 13:19:30 +00003035 rc = expand_dfs_referral(xid, pSesInfo, volume_info, cifs_sb,
Sean Finney046462a2011-04-11 13:19:33 +00003036 true);
Jeff Layton7b91e262009-07-23 15:22:30 -04003037
Sean Finneydd613942011-04-11 13:19:30 +00003038 if (!rc) {
Igor Mammedov5c2503a2009-04-21 19:31:05 +04003039 referral_walks_count++;
Igor Mammedov1bfe73c2009-04-01 17:54:42 +04003040 goto try_mount_again;
3041 }
Sean Finneydd613942011-04-11 13:19:30 +00003042 goto mount_fail_check;
Steve Frenchd036f502009-04-03 03:12:08 +00003043#else /* No DFS support, return error on mount */
3044 rc = -EOPNOTSUPP;
3045#endif
Igor Mammedov1bfe73c2009-04-01 17:54:42 +04003046 }
3047
Jeff Layton9d002df2010-10-06 19:51:11 -04003048 if (rc)
3049 goto mount_fail_check;
3050
3051 /* now, hang the tcon off of the superblock */
3052 tlink = kzalloc(sizeof *tlink, GFP_KERNEL);
3053 if (tlink == NULL) {
3054 rc = -ENOMEM;
3055 goto mount_fail_check;
3056 }
3057
Jeff Laytonb647c352010-10-28 11:16:44 -04003058 tlink->tl_uid = pSesInfo->linux_uid;
Jeff Layton9d002df2010-10-06 19:51:11 -04003059 tlink->tl_tcon = tcon;
3060 tlink->tl_time = jiffies;
3061 set_bit(TCON_LINK_MASTER, &tlink->tl_flags);
3062 set_bit(TCON_LINK_IN_TREE, &tlink->tl_flags);
3063
Jeff Layton413e6612010-10-28 13:33:38 -04003064 cifs_sb->master_tlink = tlink;
Jeff Laytonb647c352010-10-28 11:16:44 -04003065 spin_lock(&cifs_sb->tlink_tree_lock);
3066 tlink_rb_insert(&cifs_sb->tlink_tree, tlink);
3067 spin_unlock(&cifs_sb->tlink_tree_lock);
Jeff Layton413e6612010-10-28 13:33:38 -04003068
Jeff Layton2de970f2010-10-06 19:51:12 -04003069 queue_delayed_work(system_nrt_wq, &cifs_sb->prune_tlinks,
3070 TLINK_IDLE_EXPIRE);
3071
Igor Mammedov1bfe73c2009-04-01 17:54:42 +04003072mount_fail_check:
3073 /* on error free sesinfo and tcon struct if needed */
3074 if (rc) {
Igor Mammedov1bfe73c2009-04-01 17:54:42 +04003075 /* If find_unc succeeded then rc == 0 so we can not end */
Lucas De Marchi25985ed2011-03-30 22:57:33 -03003076 /* up accidentally freeing someone elses tcon struct */
Igor Mammedov1bfe73c2009-04-01 17:54:42 +04003077 if (tcon)
3078 cifs_put_tcon(tcon);
3079 else if (pSesInfo)
3080 cifs_put_smb_ses(pSesInfo);
3081 else
3082 cifs_put_tcp_session(srvTcp);
3083 goto out;
3084 }
3085
Jeff Layton7586b762008-12-01 18:41:49 -05003086 /* volume_info->password is freed above when existing session found
Linus Torvalds1da177e2005-04-16 15:20:36 -07003087 (in which case it is not needed anymore) but when new sesion is created
3088 the password ptr is put in the new session structure (in which case the
3089 password will be freed at unmount time) */
Jeff Layton70fe7dc2007-11-16 22:21:07 +00003090out:
3091 /* zero out password before freeing */
Igor Mammedov1bfe73c2009-04-01 17:54:42 +04003092 cleanup_volume_info(&volume_info);
Linus Torvalds1da177e2005-04-16 15:20:36 -07003093 FreeXid(xid);
3094 return rc;
3095}
3096
Linus Torvalds1da177e2005-04-16 15:20:36 -07003097int
3098CIFSTCon(unsigned int xid, struct cifsSesInfo *ses,
3099 const char *tree, struct cifsTconInfo *tcon,
3100 const struct nls_table *nls_codepage)
3101{
3102 struct smb_hdr *smb_buffer;
3103 struct smb_hdr *smb_buffer_response;
3104 TCONX_REQ *pSMB;
3105 TCONX_RSP *pSMBr;
3106 unsigned char *bcc_ptr;
3107 int rc = 0;
Jeff Layton690c5222011-01-20 13:36:51 -05003108 int length;
3109 __u16 bytes_left, count;
Linus Torvalds1da177e2005-04-16 15:20:36 -07003110
3111 if (ses == NULL)
3112 return -EIO;
3113
3114 smb_buffer = cifs_buf_get();
Steve Frenchca43e3b2009-09-01 17:20:50 +00003115 if (smb_buffer == NULL)
Linus Torvalds1da177e2005-04-16 15:20:36 -07003116 return -ENOMEM;
Steve Frenchca43e3b2009-09-01 17:20:50 +00003117
Linus Torvalds1da177e2005-04-16 15:20:36 -07003118 smb_buffer_response = smb_buffer;
3119
3120 header_assemble(smb_buffer, SMB_COM_TREE_CONNECT_ANDX,
3121 NULL /*no tid */ , 4 /*wct */ );
Steve French1982c342005-08-17 12:38:22 -07003122
3123 smb_buffer->Mid = GetNextMid(ses->server);
Linus Torvalds1da177e2005-04-16 15:20:36 -07003124 smb_buffer->Uid = ses->Suid;
3125 pSMB = (TCONX_REQ *) smb_buffer;
3126 pSMBr = (TCONX_RSP *) smb_buffer_response;
3127
3128 pSMB->AndXCommand = 0xFF;
3129 pSMB->Flags = cpu_to_le16(TCON_EXTENDED_SECINFO);
Linus Torvalds1da177e2005-04-16 15:20:36 -07003130 bcc_ptr = &pSMB->Password[0];
Steve Frenchfb8c4b12007-07-10 01:16:18 +00003131 if ((ses->server->secMode) & SECMODE_USER) {
Steve Frencheeac8042006-01-13 21:34:58 -08003132 pSMB->PasswordLength = cpu_to_le16(1); /* minimum */
Steve French7c7b25b2006-06-01 19:20:10 +00003133 *bcc_ptr = 0; /* password is null byte */
Steve Frencheeac8042006-01-13 21:34:58 -08003134 bcc_ptr++; /* skip password */
Steve French7c7b25b2006-06-01 19:20:10 +00003135 /* already aligned so no need to do it below */
Steve Frencheeac8042006-01-13 21:34:58 -08003136 } else {
Shirish Pargaonkar540b2e32011-01-18 22:33:54 -06003137 pSMB->PasswordLength = cpu_to_le16(CIFS_AUTH_RESP_SIZE);
Steve Frencheeac8042006-01-13 21:34:58 -08003138 /* BB FIXME add code to fail this if NTLMv2 or Kerberos
3139 specified as required (when that support is added to
3140 the vfs in the future) as only NTLM or the much
Steve French7c7b25b2006-06-01 19:20:10 +00003141 weaker LANMAN (which we do not send by default) is accepted
Steve Frencheeac8042006-01-13 21:34:58 -08003142 by Samba (not sure whether other servers allow
3143 NTLMv2 password here) */
Steve French7c7b25b2006-06-01 19:20:10 +00003144#ifdef CONFIG_CIFS_WEAK_PW_HASH
Jeff Layton04912d62010-04-24 07:57:45 -04003145 if ((global_secflags & CIFSSEC_MAY_LANMAN) &&
Jeff Layton00e485b2008-12-05 20:41:21 -05003146 (ses->server->secType == LANMAN))
Shirish Pargaonkard3ba50b2010-10-27 15:20:36 -05003147 calc_lanman_hash(tcon->password, ses->server->cryptkey,
Jeff Layton4e53a3f2008-12-05 20:41:21 -05003148 ses->server->secMode &
3149 SECMODE_PW_ENCRYPT ? true : false,
3150 bcc_ptr);
Steve French7c7b25b2006-06-01 19:20:10 +00003151 else
3152#endif /* CIFS_WEAK_PW_HASH */
Shirish Pargaonkaree2c9252011-01-27 09:58:04 -06003153 rc = SMBNTencrypt(tcon->password, ses->server->cryptkey,
3154 bcc_ptr);
Steve Frencheeac8042006-01-13 21:34:58 -08003155
Shirish Pargaonkar540b2e32011-01-18 22:33:54 -06003156 bcc_ptr += CIFS_AUTH_RESP_SIZE;
Steve Frenchfb8c4b12007-07-10 01:16:18 +00003157 if (ses->capabilities & CAP_UNICODE) {
Steve French7c7b25b2006-06-01 19:20:10 +00003158 /* must align unicode strings */
3159 *bcc_ptr = 0; /* null byte password */
3160 bcc_ptr++;
3161 }
Steve Frencheeac8042006-01-13 21:34:58 -08003162 }
Linus Torvalds1da177e2005-04-16 15:20:36 -07003163
Steve French50c2f752007-07-13 00:33:32 +00003164 if (ses->server->secMode &
Steve Frencha878fb22006-05-30 18:04:19 +00003165 (SECMODE_SIGN_REQUIRED | SECMODE_SIGN_ENABLED))
Linus Torvalds1da177e2005-04-16 15:20:36 -07003166 smb_buffer->Flags2 |= SMBFLG2_SECURITY_SIGNATURE;
3167
3168 if (ses->capabilities & CAP_STATUS32) {
3169 smb_buffer->Flags2 |= SMBFLG2_ERR_STATUS;
3170 }
3171 if (ses->capabilities & CAP_DFS) {
3172 smb_buffer->Flags2 |= SMBFLG2_DFS;
3173 }
3174 if (ses->capabilities & CAP_UNICODE) {
3175 smb_buffer->Flags2 |= SMBFLG2_UNICODE;
3176 length =
Steve French50c2f752007-07-13 00:33:32 +00003177 cifs_strtoUCS((__le16 *) bcc_ptr, tree,
3178 6 /* max utf8 char length in bytes */ *
Steve Frencha878fb22006-05-30 18:04:19 +00003179 (/* server len*/ + 256 /* share len */), nls_codepage);
3180 bcc_ptr += 2 * length; /* convert num 16 bit words to bytes */
Linus Torvalds1da177e2005-04-16 15:20:36 -07003181 bcc_ptr += 2; /* skip trailing null */
3182 } else { /* ASCII */
Linus Torvalds1da177e2005-04-16 15:20:36 -07003183 strcpy(bcc_ptr, tree);
3184 bcc_ptr += strlen(tree) + 1;
3185 }
3186 strcpy(bcc_ptr, "?????");
3187 bcc_ptr += strlen("?????");
3188 bcc_ptr += 1;
3189 count = bcc_ptr - &pSMB->Password[0];
Steve Frenchbe8e3b02011-04-29 05:40:20 +00003190 pSMB->hdr.smb_buf_length = cpu_to_be32(be32_to_cpu(
3191 pSMB->hdr.smb_buf_length) + count);
Linus Torvalds1da177e2005-04-16 15:20:36 -07003192 pSMB->ByteCount = cpu_to_le16(count);
3193
Steve French133672e2007-11-13 22:41:37 +00003194 rc = SendReceive(xid, ses, smb_buffer, smb_buffer_response, &length,
Jeff Layton77499812011-01-11 07:24:23 -05003195 0);
Linus Torvalds1da177e2005-04-16 15:20:36 -07003196
Linus Torvalds1da177e2005-04-16 15:20:36 -07003197 /* above now done in SendReceive */
3198 if ((rc == 0) && (tcon != NULL)) {
Steve French0e0d2cf2009-05-01 05:27:32 +00003199 bool is_unicode;
3200
Linus Torvalds1da177e2005-04-16 15:20:36 -07003201 tcon->tidStatus = CifsGood;
Steve French3b795212008-11-13 19:45:32 +00003202 tcon->need_reconnect = false;
Linus Torvalds1da177e2005-04-16 15:20:36 -07003203 tcon->tid = smb_buffer_response->Tid;
3204 bcc_ptr = pByteArea(smb_buffer_response);
Jeff Layton690c5222011-01-20 13:36:51 -05003205 bytes_left = get_bcc(smb_buffer_response);
Jeff Laytoncc20c032009-04-30 07:16:21 -04003206 length = strnlen(bcc_ptr, bytes_left - 2);
Steve French0e0d2cf2009-05-01 05:27:32 +00003207 if (smb_buffer->Flags2 & SMBFLG2_UNICODE)
3208 is_unicode = true;
3209 else
3210 is_unicode = false;
3211
Jeff Laytoncc20c032009-04-30 07:16:21 -04003212
Steve French50c2f752007-07-13 00:33:32 +00003213 /* skip service field (NB: this field is always ASCII) */
Steve French7f8ed422007-09-28 22:28:55 +00003214 if (length == 3) {
3215 if ((bcc_ptr[0] == 'I') && (bcc_ptr[1] == 'P') &&
3216 (bcc_ptr[2] == 'C')) {
Joe Perchesb6b38f72010-04-21 03:50:45 +00003217 cFYI(1, "IPC connection");
Steve French7f8ed422007-09-28 22:28:55 +00003218 tcon->ipc = 1;
3219 }
3220 } else if (length == 2) {
3221 if ((bcc_ptr[0] == 'A') && (bcc_ptr[1] == ':')) {
3222 /* the most common case */
Joe Perchesb6b38f72010-04-21 03:50:45 +00003223 cFYI(1, "disk share connection");
Steve French7f8ed422007-09-28 22:28:55 +00003224 }
3225 }
Steve French50c2f752007-07-13 00:33:32 +00003226 bcc_ptr += length + 1;
Jeff Laytoncc20c032009-04-30 07:16:21 -04003227 bytes_left -= (length + 1);
Linus Torvalds1da177e2005-04-16 15:20:36 -07003228 strncpy(tcon->treeName, tree, MAX_TREE_SIZE);
Jeff Laytoncc20c032009-04-30 07:16:21 -04003229
3230 /* mostly informational -- no need to fail on error here */
Jeff Layton90a98b22009-07-20 13:40:52 -04003231 kfree(tcon->nativeFileSystem);
Steve Frenchd185cda2009-04-30 17:45:10 +00003232 tcon->nativeFileSystem = cifs_strndup_from_ucs(bcc_ptr,
Steve French0e0d2cf2009-05-01 05:27:32 +00003233 bytes_left, is_unicode,
Jeff Laytoncc20c032009-04-30 07:16:21 -04003234 nls_codepage);
3235
Joe Perchesb6b38f72010-04-21 03:50:45 +00003236 cFYI(1, "nativeFileSystem=%s", tcon->nativeFileSystem);
Jeff Laytoncc20c032009-04-30 07:16:21 -04003237
Steve Frenchfb8c4b12007-07-10 01:16:18 +00003238 if ((smb_buffer_response->WordCount == 3) ||
Steve French1a4e15a2006-10-12 21:33:51 +00003239 (smb_buffer_response->WordCount == 7))
3240 /* field is in same location */
Steve French39798772006-05-31 22:40:51 +00003241 tcon->Flags = le16_to_cpu(pSMBr->OptionalSupport);
3242 else
3243 tcon->Flags = 0;
Joe Perchesb6b38f72010-04-21 03:50:45 +00003244 cFYI(1, "Tcon flags: 0x%x ", tcon->Flags);
Linus Torvalds1da177e2005-04-16 15:20:36 -07003245 } else if ((rc == 0) && tcon == NULL) {
Steve French50c2f752007-07-13 00:33:32 +00003246 /* all we need to save for IPC$ connection */
Linus Torvalds1da177e2005-04-16 15:20:36 -07003247 ses->ipc_tid = smb_buffer_response->Tid;
3248 }
3249
Mariusz Kozlowskia8a11d32007-10-03 16:41:24 +00003250 cifs_buf_release(smb_buffer);
Linus Torvalds1da177e2005-04-16 15:20:36 -07003251 return rc;
3252}
3253
3254int
3255cifs_umount(struct super_block *sb, struct cifs_sb_info *cifs_sb)
3256{
Jeff Laytonb647c352010-10-28 11:16:44 -04003257 struct rb_root *root = &cifs_sb->tlink_tree;
3258 struct rb_node *node;
3259 struct tcon_link *tlink;
Steve French50c2f752007-07-13 00:33:32 +00003260 char *tmp;
Linus Torvalds1da177e2005-04-16 15:20:36 -07003261
Jeff Layton2de970f2010-10-06 19:51:12 -04003262 cancel_delayed_work_sync(&cifs_sb->prune_tlinks);
3263
Jeff Laytonb647c352010-10-28 11:16:44 -04003264 spin_lock(&cifs_sb->tlink_tree_lock);
3265 while ((node = rb_first(root))) {
3266 tlink = rb_entry(node, struct tcon_link, tl_rbnode);
3267 cifs_get_tlink(tlink);
3268 clear_bit(TCON_LINK_IN_TREE, &tlink->tl_flags);
3269 rb_erase(node, root);
Steve French50c2f752007-07-13 00:33:32 +00003270
Jeff Laytonb647c352010-10-28 11:16:44 -04003271 spin_unlock(&cifs_sb->tlink_tree_lock);
3272 cifs_put_tlink(tlink);
3273 spin_lock(&cifs_sb->tlink_tree_lock);
3274 }
3275 spin_unlock(&cifs_sb->tlink_tree_lock);
Jeff Layton9d002df2010-10-06 19:51:11 -04003276
Steve French2fe87f02006-09-21 07:02:52 +00003277 tmp = cifs_sb->prepath;
3278 cifs_sb->prepathlen = 0;
3279 cifs_sb->prepath = NULL;
3280 kfree(tmp);
Linus Torvalds1da177e2005-04-16 15:20:36 -07003281
Jeff Layton9d002df2010-10-06 19:51:11 -04003282 return 0;
Steve French50c2f752007-07-13 00:33:32 +00003283}
Linus Torvalds1da177e2005-04-16 15:20:36 -07003284
Jeff Layton198b5682010-04-24 07:57:48 -04003285int cifs_negotiate_protocol(unsigned int xid, struct cifsSesInfo *ses)
Linus Torvalds1da177e2005-04-16 15:20:36 -07003286{
3287 int rc = 0;
Jeff Layton198b5682010-04-24 07:57:48 -04003288 struct TCP_Server_Info *server = ses->server;
Linus Torvalds1da177e2005-04-16 15:20:36 -07003289
Jeff Layton198b5682010-04-24 07:57:48 -04003290 /* only send once per connect */
3291 if (server->maxBuf != 0)
3292 return 0;
Linus Torvalds1da177e2005-04-16 15:20:36 -07003293
Jeff Layton198b5682010-04-24 07:57:48 -04003294 rc = CIFSSMBNegotiate(xid, ses);
3295 if (rc == -EAGAIN) {
3296 /* retry only once on 1st time connection */
3297 rc = CIFSSMBNegotiate(xid, ses);
3298 if (rc == -EAGAIN)
3299 rc = -EHOSTDOWN;
3300 }
3301 if (rc == 0) {
3302 spin_lock(&GlobalMid_Lock);
3303 if (server->tcpStatus != CifsExiting)
3304 server->tcpStatus = CifsGood;
3305 else
3306 rc = -EHOSTDOWN;
3307 spin_unlock(&GlobalMid_Lock);
3308
Linus Torvalds1da177e2005-04-16 15:20:36 -07003309 }
Steve French26b994f2008-08-06 05:11:33 +00003310
Jeff Layton198b5682010-04-24 07:57:48 -04003311 return rc;
3312}
Steve French26b994f2008-08-06 05:11:33 +00003313
Jeff Layton198b5682010-04-24 07:57:48 -04003314
3315int cifs_setup_session(unsigned int xid, struct cifsSesInfo *ses,
3316 struct nls_table *nls_info)
3317{
3318 int rc = 0;
3319 struct TCP_Server_Info *server = ses->server;
3320
3321 ses->flags = 0;
3322 ses->capabilities = server->capabilities;
Steve French26b994f2008-08-06 05:11:33 +00003323 if (linuxExtEnabled == 0)
Jeff Layton198b5682010-04-24 07:57:48 -04003324 ses->capabilities &= (~CAP_UNIX);
Steve French20418ac2009-04-30 16:13:32 +00003325
Joe Perchesb6b38f72010-04-21 03:50:45 +00003326 cFYI(1, "Security Mode: 0x%x Capabilities: 0x%x TimeAdjust: %d",
3327 server->secMode, server->capabilities, server->timeAdj);
Jeff Laytoncb7691b2008-08-18 15:41:05 -04003328
Jeff Layton198b5682010-04-24 07:57:48 -04003329 rc = CIFS_SessSetup(xid, ses, nls_info);
Steve French26b994f2008-08-06 05:11:33 +00003330 if (rc) {
Joe Perchesb6b38f72010-04-21 03:50:45 +00003331 cERROR(1, "Send error in SessSetup = %d", rc);
Steve French26b994f2008-08-06 05:11:33 +00003332 } else {
Shirish Pargaonkar5d0d2882010-10-13 18:15:00 -05003333 mutex_lock(&ses->server->srv_mutex);
3334 if (!server->session_estab) {
Shirish Pargaonkar21e73392010-10-21 06:42:55 -05003335 server->session_key.response = ses->auth_key.response;
Shirish Pargaonkar5d0d2882010-10-13 18:15:00 -05003336 server->session_key.len = ses->auth_key.len;
Shirish Pargaonkar21e73392010-10-21 06:42:55 -05003337 server->sequence_number = 0x2;
3338 server->session_estab = true;
3339 ses->auth_key.response = NULL;
Shirish Pargaonkar5d0d2882010-10-13 18:15:00 -05003340 }
3341 mutex_unlock(&server->srv_mutex);
3342
Joe Perchesb6b38f72010-04-21 03:50:45 +00003343 cFYI(1, "CIFS Session Established successfully");
Steve French20418ac2009-04-30 16:13:32 +00003344 spin_lock(&GlobalMid_Lock);
Jeff Layton198b5682010-04-24 07:57:48 -04003345 ses->status = CifsGood;
3346 ses->need_reconnect = false;
Steve French20418ac2009-04-30 16:13:32 +00003347 spin_unlock(&GlobalMid_Lock);
Steve French26b994f2008-08-06 05:11:33 +00003348 }
3349
Shirish Pargaonkar21e73392010-10-21 06:42:55 -05003350 kfree(ses->auth_key.response);
3351 ses->auth_key.response = NULL;
3352 ses->auth_key.len = 0;
Shirish Pargaonkard3686d52010-10-28 09:53:07 -05003353 kfree(ses->ntlmssp);
3354 ses->ntlmssp = NULL;
Shirish Pargaonkar21e73392010-10-21 06:42:55 -05003355
Linus Torvalds1da177e2005-04-16 15:20:36 -07003356 return rc;
3357}
3358
Steve Frenchd2445552010-10-08 03:38:46 +00003359static struct cifsTconInfo *
Jeff Layton9d002df2010-10-06 19:51:11 -04003360cifs_construct_tcon(struct cifs_sb_info *cifs_sb, uid_t fsuid)
3361{
3362 struct cifsTconInfo *master_tcon = cifs_sb_master_tcon(cifs_sb);
3363 struct cifsSesInfo *ses;
3364 struct cifsTconInfo *tcon = NULL;
3365 struct smb_vol *vol_info;
Steve French34c87902011-03-01 05:02:57 +00003366 char username[28]; /* big enough for "krb50x" + hex of ULONG_MAX 6+16 */
3367 /* We used to have this as MAX_USERNAME which is */
3368 /* way too big now (256 instead of 32) */
Jeff Layton9d002df2010-10-06 19:51:11 -04003369
3370 vol_info = kzalloc(sizeof(*vol_info), GFP_KERNEL);
3371 if (vol_info == NULL) {
3372 tcon = ERR_PTR(-ENOMEM);
3373 goto out;
3374 }
3375
3376 snprintf(username, MAX_USERNAME_SIZE, "krb50x%x", fsuid);
3377 vol_info->username = username;
3378 vol_info->local_nls = cifs_sb->local_nls;
3379 vol_info->linux_uid = fsuid;
3380 vol_info->cred_uid = fsuid;
3381 vol_info->UNC = master_tcon->treeName;
3382 vol_info->retry = master_tcon->retry;
3383 vol_info->nocase = master_tcon->nocase;
3384 vol_info->local_lease = master_tcon->local_lease;
3385 vol_info->no_linux_ext = !master_tcon->unix_ext;
3386
3387 /* FIXME: allow for other secFlg settings */
3388 vol_info->secFlg = CIFSSEC_MUST_KRB5;
3389
3390 /* get a reference for the same TCP session */
Suresh Jayaraman3f9bcca2010-10-18 23:29:37 +05303391 spin_lock(&cifs_tcp_ses_lock);
Jeff Layton9d002df2010-10-06 19:51:11 -04003392 ++master_tcon->ses->server->srv_count;
Suresh Jayaraman3f9bcca2010-10-18 23:29:37 +05303393 spin_unlock(&cifs_tcp_ses_lock);
Jeff Layton9d002df2010-10-06 19:51:11 -04003394
3395 ses = cifs_get_smb_ses(master_tcon->ses->server, vol_info);
3396 if (IS_ERR(ses)) {
3397 tcon = (struct cifsTconInfo *)ses;
3398 cifs_put_tcp_session(master_tcon->ses->server);
3399 goto out;
3400 }
3401
3402 tcon = cifs_get_tcon(ses, vol_info);
3403 if (IS_ERR(tcon)) {
3404 cifs_put_smb_ses(ses);
3405 goto out;
3406 }
3407
3408 if (ses->capabilities & CAP_UNIX)
3409 reset_cifs_unix_caps(0, tcon, NULL, vol_info);
3410out:
3411 kfree(vol_info);
3412
3413 return tcon;
3414}
3415
Jeff Layton413e6612010-10-28 13:33:38 -04003416static inline struct tcon_link *
Jeff Layton9d002df2010-10-06 19:51:11 -04003417cifs_sb_master_tlink(struct cifs_sb_info *cifs_sb)
3418{
Jeff Layton413e6612010-10-28 13:33:38 -04003419 return cifs_sb->master_tlink;
Jeff Layton9d002df2010-10-06 19:51:11 -04003420}
3421
3422struct cifsTconInfo *
3423cifs_sb_master_tcon(struct cifs_sb_info *cifs_sb)
3424{
3425 return tlink_tcon(cifs_sb_master_tlink(cifs_sb));
3426}
3427
3428static int
3429cifs_sb_tcon_pending_wait(void *unused)
3430{
3431 schedule();
3432 return signal_pending(current) ? -ERESTARTSYS : 0;
3433}
3434
Jeff Laytonb647c352010-10-28 11:16:44 -04003435/* find and return a tlink with given uid */
3436static struct tcon_link *
3437tlink_rb_search(struct rb_root *root, uid_t uid)
3438{
3439 struct rb_node *node = root->rb_node;
3440 struct tcon_link *tlink;
3441
3442 while (node) {
3443 tlink = rb_entry(node, struct tcon_link, tl_rbnode);
3444
3445 if (tlink->tl_uid > uid)
3446 node = node->rb_left;
3447 else if (tlink->tl_uid < uid)
3448 node = node->rb_right;
3449 else
3450 return tlink;
3451 }
3452 return NULL;
3453}
3454
3455/* insert a tcon_link into the tree */
3456static void
3457tlink_rb_insert(struct rb_root *root, struct tcon_link *new_tlink)
3458{
3459 struct rb_node **new = &(root->rb_node), *parent = NULL;
3460 struct tcon_link *tlink;
3461
3462 while (*new) {
3463 tlink = rb_entry(*new, struct tcon_link, tl_rbnode);
3464 parent = *new;
3465
3466 if (tlink->tl_uid > new_tlink->tl_uid)
3467 new = &((*new)->rb_left);
3468 else
3469 new = &((*new)->rb_right);
3470 }
3471
3472 rb_link_node(&new_tlink->tl_rbnode, parent, new);
3473 rb_insert_color(&new_tlink->tl_rbnode, root);
3474}
3475
Jeff Layton9d002df2010-10-06 19:51:11 -04003476/*
3477 * Find or construct an appropriate tcon given a cifs_sb and the fsuid of the
3478 * current task.
3479 *
3480 * If the superblock doesn't refer to a multiuser mount, then just return
3481 * the master tcon for the mount.
3482 *
Suresh Jayaraman6ef933a2010-11-03 10:53:49 +05303483 * First, search the rbtree for an existing tcon for this fsuid. If one
Jeff Layton9d002df2010-10-06 19:51:11 -04003484 * exists, then check to see if it's pending construction. If it is then wait
3485 * for construction to complete. Once it's no longer pending, check to see if
3486 * it failed and either return an error or retry construction, depending on
3487 * the timeout.
3488 *
3489 * If one doesn't exist then insert a new tcon_link struct into the tree and
3490 * try to construct a new one.
3491 */
3492struct tcon_link *
3493cifs_sb_tlink(struct cifs_sb_info *cifs_sb)
3494{
3495 int ret;
Jeff Laytonb647c352010-10-28 11:16:44 -04003496 uid_t fsuid = current_fsuid();
Jeff Layton9d002df2010-10-06 19:51:11 -04003497 struct tcon_link *tlink, *newtlink;
3498
3499 if (!(cifs_sb->mnt_cifs_flags & CIFS_MOUNT_MULTIUSER))
3500 return cifs_get_tlink(cifs_sb_master_tlink(cifs_sb));
3501
3502 spin_lock(&cifs_sb->tlink_tree_lock);
Jeff Laytonb647c352010-10-28 11:16:44 -04003503 tlink = tlink_rb_search(&cifs_sb->tlink_tree, fsuid);
Jeff Layton9d002df2010-10-06 19:51:11 -04003504 if (tlink)
3505 cifs_get_tlink(tlink);
3506 spin_unlock(&cifs_sb->tlink_tree_lock);
3507
3508 if (tlink == NULL) {
3509 newtlink = kzalloc(sizeof(*tlink), GFP_KERNEL);
3510 if (newtlink == NULL)
3511 return ERR_PTR(-ENOMEM);
Jeff Laytonb647c352010-10-28 11:16:44 -04003512 newtlink->tl_uid = fsuid;
Jeff Layton9d002df2010-10-06 19:51:11 -04003513 newtlink->tl_tcon = ERR_PTR(-EACCES);
3514 set_bit(TCON_LINK_PENDING, &newtlink->tl_flags);
3515 set_bit(TCON_LINK_IN_TREE, &newtlink->tl_flags);
3516 cifs_get_tlink(newtlink);
3517
Jeff Layton9d002df2010-10-06 19:51:11 -04003518 spin_lock(&cifs_sb->tlink_tree_lock);
3519 /* was one inserted after previous search? */
Jeff Laytonb647c352010-10-28 11:16:44 -04003520 tlink = tlink_rb_search(&cifs_sb->tlink_tree, fsuid);
Jeff Layton9d002df2010-10-06 19:51:11 -04003521 if (tlink) {
3522 cifs_get_tlink(tlink);
3523 spin_unlock(&cifs_sb->tlink_tree_lock);
Jeff Layton9d002df2010-10-06 19:51:11 -04003524 kfree(newtlink);
3525 goto wait_for_construction;
3526 }
Jeff Layton9d002df2010-10-06 19:51:11 -04003527 tlink = newtlink;
Jeff Laytonb647c352010-10-28 11:16:44 -04003528 tlink_rb_insert(&cifs_sb->tlink_tree, tlink);
3529 spin_unlock(&cifs_sb->tlink_tree_lock);
Jeff Layton9d002df2010-10-06 19:51:11 -04003530 } else {
3531wait_for_construction:
3532 ret = wait_on_bit(&tlink->tl_flags, TCON_LINK_PENDING,
3533 cifs_sb_tcon_pending_wait,
3534 TASK_INTERRUPTIBLE);
3535 if (ret) {
3536 cifs_put_tlink(tlink);
3537 return ERR_PTR(ret);
3538 }
3539
3540 /* if it's good, return it */
3541 if (!IS_ERR(tlink->tl_tcon))
3542 return tlink;
3543
3544 /* return error if we tried this already recently */
3545 if (time_before(jiffies, tlink->tl_time + TLINK_ERROR_EXPIRE)) {
3546 cifs_put_tlink(tlink);
3547 return ERR_PTR(-EACCES);
3548 }
3549
3550 if (test_and_set_bit(TCON_LINK_PENDING, &tlink->tl_flags))
3551 goto wait_for_construction;
3552 }
3553
3554 tlink->tl_tcon = cifs_construct_tcon(cifs_sb, fsuid);
3555 clear_bit(TCON_LINK_PENDING, &tlink->tl_flags);
3556 wake_up_bit(&tlink->tl_flags, TCON_LINK_PENDING);
3557
3558 if (IS_ERR(tlink->tl_tcon)) {
3559 cifs_put_tlink(tlink);
3560 return ERR_PTR(-EACCES);
3561 }
3562
3563 return tlink;
3564}
Jeff Layton2de970f2010-10-06 19:51:12 -04003565
3566/*
3567 * periodic workqueue job that scans tcon_tree for a superblock and closes
3568 * out tcons.
3569 */
3570static void
3571cifs_prune_tlinks(struct work_struct *work)
3572{
3573 struct cifs_sb_info *cifs_sb = container_of(work, struct cifs_sb_info,
3574 prune_tlinks.work);
Jeff Laytonb647c352010-10-28 11:16:44 -04003575 struct rb_root *root = &cifs_sb->tlink_tree;
3576 struct rb_node *node = rb_first(root);
3577 struct rb_node *tmp;
3578 struct tcon_link *tlink;
Jeff Layton2de970f2010-10-06 19:51:12 -04003579
Jeff Laytonb647c352010-10-28 11:16:44 -04003580 /*
3581 * Because we drop the spinlock in the loop in order to put the tlink
3582 * it's not guarded against removal of links from the tree. The only
3583 * places that remove entries from the tree are this function and
3584 * umounts. Because this function is non-reentrant and is canceled
3585 * before umount can proceed, this is safe.
3586 */
3587 spin_lock(&cifs_sb->tlink_tree_lock);
3588 node = rb_first(root);
3589 while (node != NULL) {
3590 tmp = node;
3591 node = rb_next(tmp);
3592 tlink = rb_entry(tmp, struct tcon_link, tl_rbnode);
3593
3594 if (test_bit(TCON_LINK_MASTER, &tlink->tl_flags) ||
3595 atomic_read(&tlink->tl_count) != 0 ||
3596 time_after(tlink->tl_time + TLINK_IDLE_EXPIRE, jiffies))
3597 continue;
3598
3599 cifs_get_tlink(tlink);
3600 clear_bit(TCON_LINK_IN_TREE, &tlink->tl_flags);
3601 rb_erase(tmp, root);
3602
Jeff Layton2de970f2010-10-06 19:51:12 -04003603 spin_unlock(&cifs_sb->tlink_tree_lock);
Jeff Laytonb647c352010-10-28 11:16:44 -04003604 cifs_put_tlink(tlink);
3605 spin_lock(&cifs_sb->tlink_tree_lock);
3606 }
3607 spin_unlock(&cifs_sb->tlink_tree_lock);
Jeff Layton2de970f2010-10-06 19:51:12 -04003608
3609 queue_delayed_work(system_nrt_wq, &cifs_sb->prune_tlinks,
3610 TLINK_IDLE_EXPIRE);
3611}