misc.c 13.8 KB
Newer Older
1 2 3
/*
 *   fs/cifs/misc.c
 *
4
 *   Copyright (C) International Business Machines  Corp., 2002,2003
5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27
 *   Author(s): Steve French (sfrench@us.ibm.com)
 *
 *   This library is free software; you can redistribute it and/or modify
 *   it under the terms of the GNU Lesser General Public License as published
 *   by the Free Software Foundation; either version 2.1 of the License, or
 *   (at your option) any later version.
 *
 *   This library is distributed in the hope that it will be useful,
 *   but WITHOUT ANY WARRANTY; without even the implied warranty of
 *   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See
 *   the GNU Lesser General Public License for more details.
 *
 *   You should have received a copy of the GNU Lesser General Public License
 *   along with this library; if not, write to the Free Software
 *   Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA 
 */

#include <linux/slab.h>
#include <linux/ctype.h>
#include "cifspdu.h"
#include "cifsglob.h"
#include "cifsproto.h"
#include "cifs_debug.h"
28 29
#include "smberr.h"
#include "nterr.h"
30 31

extern kmem_cache_t *cifs_req_cachep;
32
extern struct task_struct * oplockThread;
33 34 35 36 37 38 39 40 41 42 43 44 45 46

__u16 GlobalMid;		/* multiplex id - rotating counter */

/* The xid serves as a useful identifier for each incoming vfs request, 
   in a similar way to the mid which is useful to track each sent smb, 
   and CurrentXid can also provide a running counter (although it 
   will eventually wrap past zero) of the total vfs operations handled 
   since the cifs fs was mounted */

unsigned int
_GetXid(void)
{
	unsigned int xid;

47
	spin_lock(&GlobalMid_Lock);
48 49 50 51
	GlobalTotalActiveXid++;
	if (GlobalTotalActiveXid > GlobalMaxActiveXid)
		GlobalMaxActiveXid = GlobalTotalActiveXid;	/* keep high water mark for number of simultaneous vfs ops in our filesystem */
	xid = GlobalCurrentXid++;
52
	spin_unlock(&GlobalMid_Lock);
53 54 55 56 57 58
	return xid;
}

void
_FreeXid(unsigned int xid)
{
59
	spin_lock(&GlobalMid_Lock);
60 61
	/* if(GlobalTotalActiveXid == 0)
		BUG(); */
62
	GlobalTotalActiveXid--;
63
	spin_unlock(&GlobalMid_Lock);
64 65 66 67 68 69 70 71 72 73 74 75
}

struct cifsSesInfo *
sesInfoAlloc(void)
{
	struct cifsSesInfo *ret_buf;

	ret_buf =
	    (struct cifsSesInfo *) kmalloc(sizeof (struct cifsSesInfo),
					   GFP_KERNEL);
	if (ret_buf) {
		memset(ret_buf, 0, sizeof (struct cifsSesInfo));
76
		write_lock(&GlobalSMBSeslock);
77
		atomic_inc(&sesInfoAllocCount);
78
		ret_buf->status = CifsNew;
79 80
		list_add(&ret_buf->cifsSessionList, &GlobalSMBSessionList);
		init_MUTEX(&ret_buf->sesSem);
81
		write_unlock(&GlobalSMBSeslock);
82 83 84 85 86 87 88 89
	}
	return ret_buf;
}

void
sesInfoFree(struct cifsSesInfo *buf_to_free)
{
	if (buf_to_free == NULL) {
90
		cFYI(1, ("Null buffer passed to sesInfoFree"));
91 92 93
		return;
	}

94
	write_lock(&GlobalSMBSeslock);
95 96
	atomic_dec(&sesInfoAllocCount);
	list_del(&buf_to_free->cifsSessionList);
97
	write_unlock(&GlobalSMBSeslock);
98 99 100 101 102 103
	if (buf_to_free->serverOS)
		kfree(buf_to_free->serverOS);
	if (buf_to_free->serverDomain)
		kfree(buf_to_free->serverDomain);
	if (buf_to_free->serverNOS)
		kfree(buf_to_free->serverNOS);
104 105
	if (buf_to_free->password)
		kfree(buf_to_free->password);
106 107 108 109 110 111 112 113 114 115 116 117
	kfree(buf_to_free);
}

struct cifsTconInfo *
tconInfoAlloc(void)
{
	struct cifsTconInfo *ret_buf;
	ret_buf =
	    (struct cifsTconInfo *) kmalloc(sizeof (struct cifsTconInfo),
					    GFP_KERNEL);
	if (ret_buf) {
		memset(ret_buf, 0, sizeof (struct cifsTconInfo));
118
		write_lock(&GlobalSMBSeslock);
119 120 121
		atomic_inc(&tconInfoAllocCount);
		list_add(&ret_buf->cifsConnectionList,
			 &GlobalTreeConnectionList);
122
		ret_buf->tidStatus = CifsNew;
123
		INIT_LIST_HEAD(&ret_buf->openFileList);
124
		init_MUTEX(&ret_buf->tconSem);
125
		write_unlock(&GlobalSMBSeslock);
126 127 128 129 130 131 132 133
	}
	return ret_buf;
}

void
tconInfoFree(struct cifsTconInfo *buf_to_free)
{
	if (buf_to_free == NULL) {
134
		cFYI(1, ("Null buffer passed to tconInfoFree"));
135 136
		return;
	}
137
	write_lock(&GlobalSMBSeslock);
138 139
	atomic_dec(&tconInfoAllocCount);
	list_del(&buf_to_free->cifsConnectionList);
140
	write_unlock(&GlobalSMBSeslock);
141 142 143 144 145 146
	if (buf_to_free->nativeFileSystem)
		kfree(buf_to_free->nativeFileSystem);
	kfree(buf_to_free);
}

struct smb_hdr *
147
cifs_buf_get(void)
148
{
Steve French's avatar
Steve French committed
149
	struct smb_hdr *ret_buf = 0;
150 151 152

/* We could use negotiated size instead of max_msgsize - 
   but it may be more efficient to always alloc same size 
153 154
   albeit slightly larger than necessary and maxbuffersize 
   defaults to this and can not be bigger */
155 156 157 158 159 160 161 162 163 164 165 166 167
	ret_buf =
	    (struct smb_hdr *) kmem_cache_alloc(cifs_req_cachep, SLAB_KERNEL);

	/* clear the first few header bytes */
	if (ret_buf) {
		memset(ret_buf, 0, sizeof (struct smb_hdr));
		atomic_inc(&bufAllocCount);
	}

	return ret_buf;
}

void
168
cifs_buf_release(void *buf_to_free)
169 170 171
{

	if (buf_to_free == NULL) {
172
		cFYI(1, ("Null buffer passed to cifs_buf_release"));
173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188
		return;
	}
	kmem_cache_free(cifs_req_cachep, buf_to_free);

	atomic_dec(&bufAllocCount);
	return;
}

void
header_assemble(struct smb_hdr *buffer, char smb_command /* command */ ,
		const struct cifsTconInfo *treeCon, int word_count
		/* length of fixed section (word count) in two byte units  */
    )
{
	int i;
	__u32 tmp;
189 190
	struct list_head* temp_item;
	struct cifsSesInfo * ses;
191 192 193 194 195 196 197 198 199 200 201 202 203 204 205 206 207 208 209
	char *temp = (char *) buffer;

	for (i = 0; i < MAX_CIFS_HDR_SIZE; i++) {
		temp[i] = 0;	/* BB is this needed ?? */
	}

	buffer->smb_buf_length =
	    (2 * word_count) + sizeof (struct smb_hdr) -
	    4 /*  RFC 1001 length field does not count */  +
	    2 /* for bcc field itself */ ;
	/* Note that this is the only network field that has to be converted to big endian and it is done just before we send it */

	buffer->Protocol[0] = 0xFF;
	buffer->Protocol[1] = 'S';
	buffer->Protocol[2] = 'M';
	buffer->Protocol[3] = 'B';
	buffer->Command = smb_command;
	buffer->Flags = 0x00;	/* case sensitive */
	buffer->Flags2 = SMBFLG2_KNOWS_LONG_NAMES;
210
	tmp = cpu_to_le32(current->tgid);
211 212 213
	buffer->Pid = tmp & 0xFFFF;
	tmp >>= 16;
	buffer->PidHigh = tmp & 0xFFFF;
214
	spin_lock(&GlobalMid_Lock);
215 216
	GlobalMid++;
	buffer->Mid = GlobalMid;
217
	spin_unlock(&GlobalMid_Lock);
218 219 220 221 222 223 224 225
	if (treeCon) {
		buffer->Tid = treeCon->tid;
		if (treeCon->ses) {
			if (treeCon->ses->capabilities & CAP_UNICODE)
				buffer->Flags2 |= SMBFLG2_UNICODE;
			if (treeCon->ses->capabilities & CAP_STATUS32) {
				buffer->Flags2 |= SMBFLG2_ERR_STATUS;
			}
226

227
			buffer->Uid = treeCon->ses->Suid;	/* always in LE format */
228 229 230 231 232 233 234 235 236 237 238 239 240 241 242 243 244 245 246 247 248 249 250 251 252 253 254 255 256 257 258 259 260 261 262 263
			if(multiuser_mount != 0) {
		/* For the multiuser case, there are few obvious technically  */
		/* possible mechanisms to match the local linux user (uid)    */
		/* to a valid remote smb user (smb_uid):		      */
		/* 	1) Query Winbind (or other local pam/nss daemon       */
		/* 	  for userid/password/logon_domain or credential      */
		/*      2) Query Winbind for uid to sid to username mapping   */
		/* 	   and see if we have a matching password for existing*/
		/*         session for that user perhas getting password by   */
		/*         adding a new pam_cifs module that stores passwords */
		/*         so that the cifs vfs can get at that for all logged*/
		/*	   on users					      */
		/*	3) (Which is the mechanism we have chosen)	      */
		/*	   Search through sessions to the same server for a   */
		/*	   a match on the uid that was passed in on mount     */
		/*         with the current processes uid (or euid?) and use  */
		/* 	   that smb uid.   If no existing smb session for     */
		/* 	   that uid found, use the default smb session ie     */
		/*         the smb session for the volume mounted which is    */
		/* 	   the same as would be used if the multiuser mount   */
		/* 	   flag were disabled.  */

		/*  BB Add support for establishing new tCon and SMB Session  */
		/*      with userid/password pairs found on the smb session   */ 
		/*	for other target tcp/ip addresses 		BB    */
				if(current->uid != treeCon->ses->linux_uid) {
					cFYI(1,("Multiuser mode and UID did not match tcon uid "));
					read_lock(&GlobalSMBSeslock);
					list_for_each(temp_item, &GlobalSMBSessionList) {
						ses = list_entry(temp_item, struct cifsSesInfo, cifsSessionList);
						if(ses->linux_uid == current->uid) {
							if(ses->server == treeCon->ses->server) {
								cFYI(1,("found matching uid substitute right smb_uid"));  
								buffer->Uid = ses->Suid;
								break;
							} else {
264
								/* BB eventually call cifs_setup_session here */
265 266 267 268 269 270 271
								cFYI(1,("local UID found but smb sess with this server does not exist"));  
							}
						}
					}
					read_unlock(&GlobalSMBSeslock);
				}
			}
272 273 274
		}
		if (treeCon->Flags & SMB_SHARE_IS_IN_DFS)
			buffer->Flags2 |= SMBFLG2_DFS;
275 276 277 278
		if(treeCon->ses->server)
			if(treeCon->ses->server->secMode & 
			  (SECMODE_SIGN_REQUIRED | SECMODE_SIGN_ENABLED))
				buffer->Flags2 |= SMBFLG2_SECURITY_SIGNATURE;
279 280 281 282 283 284 285 286 287 288 289
	}

/*  endian conversion of flags is now done just before sending */
	buffer->WordCount = (char) word_count;
	return;
}

int
checkSMBhdr(struct smb_hdr *smb, __u16 mid)
{
	/* Make sure that this really is an SMB, that it is a response, 
290 291 292 293 294 295 296 297 298 299
	   and that the message ids match */
	if ((*(unsigned int *) smb->Protocol == cpu_to_le32(0x424d53ff)) && 
		(mid == smb->Mid)) {    
		if(smb->Flags & SMBFLG_RESPONSE)
			return 0;                    
		else {        
		/* only one valid case where server sends us request */
			if(smb->Command == SMB_COM_LOCKING_ANDX)
				return 0;
			else
300
				cERROR(1, ("Rcvd Request not response "));         
301
		}
302 303 304
	} else { /* bad signature or mid */
		if (*(unsigned int *) smb->Protocol != cpu_to_le32(0x424d53ff))
			cERROR(1,
305
			       ("Bad protocol string signature header %x ",
306 307
				*(unsigned int *) smb->Protocol));
		if (mid != smb->Mid)
308
			cERROR(1, ("Mids do not match"));
309
	}
310
	cERROR(1, ("bad smb detected. The Mid=%d", smb->Mid));
311
	return 1;
312 313 314 315 316 317
}

int
checkSMB(struct smb_hdr *smb, __u16 mid, int length)
{
	cFYI(0,
318
	     ("Entering checkSMB with Length: %x, smb_buf_length: %x ",
319
	      length, ntohl(smb->smb_buf_length)));
320
	if (((unsigned int)length < 2 + sizeof (struct smb_hdr))
321 322
	    || (ntohl(smb->smb_buf_length) >
		CIFS_MAX_MSGSIZE + MAX_CIFS_HDR_SIZE - 4)) {
323
		if ((unsigned int)length < 2 + sizeof (struct smb_hdr)) {
324
			cERROR(1, ("Length less than 2 + sizeof smb_hdr "));
325
			if (((unsigned int)length >= sizeof (struct smb_hdr) - 1)
326
			    && (smb->Status.CifsError != 0))
327
				return 0;	/* some error cases do not return wct and bcc */
328 329

		}
330 331
		if (ntohl(smb->smb_buf_length) >
		    CIFS_MAX_MSGSIZE + MAX_CIFS_HDR_SIZE - 4)
332
			cERROR(1,
333
			       ("smb_buf_length greater than CIFS_MAX_MSGSIZE ... "));
334
		cERROR(1,
335
		       ("bad smb detected. Illegal length. The mid=%d",
336 337 338 339 340 341 342 343
			smb->Mid));
		return 1;
	}

	if (checkSMBhdr(smb, mid))
		return 1;

	if ((4 + ntohl(smb->smb_buf_length) != smbCalcSize(smb))
344
	    || (4 + ntohl(smb->smb_buf_length) != (unsigned int)length)) {
345 346
		return 0;
	} else {
347
		cERROR(1, ("smbCalcSize %x ", smbCalcSize(smb)));
348
		cERROR(1,
349
		       ("bad smb size detected. The Mid=%d", smb->Mid));
350 351 352 353 354 355
		return 1;
	}
}
int
is_valid_oplock_break(struct smb_hdr *buf)
{    
356 357 358 359 360 361 362 363 364 365
	struct smb_com_lock_req * pSMB = (struct smb_com_lock_req *)buf;
	struct list_head *tmp;
	struct list_head *tmp1;
	struct cifsTconInfo *tcon;
	struct cifsFileInfo *netfile;

	/* could add check for smb response flag 0x80 */
	cFYI(1,("Checking for oplock break"));    
	if(pSMB->hdr.Command != SMB_COM_LOCKING_ANDX)
		return FALSE;
366 367 368 369 370 371 372 373 374 375 376 377 378 379 380 381
	if(pSMB->hdr.Flags & SMBFLG_RESPONSE) {
		/* no sense logging error on invalid handle on oplock
		   break - harmless race between close request and oplock
		   break response is expected from time to time writing out
		   large dirty files cached on the client */
		if ((NT_STATUS_INVALID_HANDLE) == 
		   le32_to_cpu(pSMB->hdr.Status.CifsError)) { 
			cFYI(1,("invalid handle on oplock break"));
			return TRUE;
		} else if (ERRbadfid == 
		   le16_to_cpu(pSMB->hdr.Status.DosError.Error)) {
			return TRUE;	  
		} else {
			return FALSE; /* on valid oplock brk we get "request" */
		}
	}
382 383 384 385 386 387 388 389 390 391 392 393 394 395 396
	if(pSMB->hdr.WordCount != 8)
		return FALSE;

	cFYI(1,(" oplock type 0x%d level 0x%d",pSMB->LockType,pSMB->OplockLevel));
	if(!(pSMB->LockType & LOCKING_ANDX_OPLOCK_RELEASE))
		return FALSE;    

	/* look up tcon based on tid & uid */
	read_lock(&GlobalSMBSeslock);
	list_for_each(tmp, &GlobalTreeConnectionList) {
		tcon = list_entry(tmp, struct cifsTconInfo, cifsConnectionList);
		if (tcon->tid == buf->Tid) {
			list_for_each(tmp1,&tcon->openFileList){
				netfile = list_entry(tmp1,struct cifsFileInfo,tlist);
				if(pSMB->Fid == netfile->netfid) {
397
					struct cifsInodeInfo *pCifsInode;
398 399
			/* BB Add following logic to mark inode for write through 
              		    inode->i_data.a_ops = &cifs_addr_ops_writethrough; */
400 401
					read_unlock(&GlobalSMBSeslock);
					cFYI(1,("Matching file id, processing oplock break"));
402
					pCifsInode = 
403
						CIFS_I(netfile->pInode);
404 405 406 407
					pCifsInode->clientCanCacheAll = FALSE;
					if(pSMB->OplockLevel == 0)
						pCifsInode->clientCanCacheRead = FALSE;
					pCifsInode->oplockPending = TRUE;
408
					AllocOplockQEntry(netfile->pInode, netfile->netfid, tcon);
409
					cFYI(1,("about to wake up oplock thd"));
410
					wake_up_process(oplockThread);               
411 412 413 414 415 416 417 418 419 420 421
					return TRUE;
				}
			}
			read_unlock(&GlobalSMBSeslock);
			cFYI(1,("No matching file for oplock break on connection"));
			return TRUE;
		}
	}
	read_unlock(&GlobalSMBSeslock);
	cFYI(1,("Can not process oplock break for non-existent connection"));
	return TRUE;
422 423 424 425 426 427 428 429 430 431 432 433 434 435 436
}

void
dump_smb(struct smb_hdr *smb_buf, int smb_buf_length)
{
	int i, j;
	char debug_line[17];
	unsigned char *buffer;

	if (traceSMB == 0)
		return;

	buffer = (unsigned char *) smb_buf;
	for (i = 0, j = 0; i < smb_buf_length; i++, j++) {
		if (i % 8 == 0) {	/* we have reached the beginning of line  */
437
			printk(KERN_DEBUG "| ");
438 439 440 441 442 443 444 445 446 447 448
			j = 0;
		}
		printk("%0#4x ", buffer[i]);
		debug_line[2 * j] = ' ';
		if (isprint(buffer[i]))
			debug_line[1 + (2 * j)] = buffer[i];
		else
			debug_line[1 + (2 * j)] = '_';

		if (i % 8 == 7) {	/* we have reached end of line, time to print ascii */
			debug_line[16] = 0;
449
			printk(" | %s\n", debug_line);
450 451 452 453 454 455 456
		}
	}
	for (; j < 8; j++) {
		printk("     ");
		debug_line[2 * j] = ' ';
		debug_line[1 + (2 * j)] = ' ';
	}
457
	printk( " | %s\n", debug_line);
458 459
	return;
}