smb2transport.c 19.0 KB
Newer Older
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32
/*
 *   fs/cifs/smb2transport.c
 *
 *   Copyright (C) International Business Machines  Corp., 2002, 2011
 *                 Etersoft, 2012
 *   Author(s): Steve French (sfrench@us.ibm.com)
 *              Jeremy Allison (jra@samba.org) 2006
 *              Pavel Shilovsky (pshilovsky@samba.org) 2012
 *
 *   This library is free software; you can redistribute it and/or modify
 *   it under the terms of the GNU Lesser General Public License as published
 *   by the Free Software Foundation; either version 2.1 of the License, or
 *   (at your option) any later version.
 *
 *   This library is distributed in the hope that it will be useful,
 *   but WITHOUT ANY WARRANTY; without even the implied warranty of
 *   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See
 *   the GNU Lesser General Public License for more details.
 *
 *   You should have received a copy of the GNU Lesser General Public License
 *   along with this library; if not, write to the Free Software
 *   Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
 */

#include <linux/fs.h>
#include <linux/list.h>
#include <linux/wait.h>
#include <linux/net.h>
#include <linux/delay.h>
#include <linux/uaccess.h>
#include <asm/processor.h>
#include <linux/mempool.h>
33
#include <linux/highmem.h>
34
#include <crypto/aead.h>
35 36 37 38 39 40
#include "smb2pdu.h"
#include "cifsglob.h"
#include "cifsproto.h"
#include "smb2proto.h"
#include "cifs_debug.h"
#include "smb2status.h"
P
Pavel Shilovsky 已提交
41 42
#include "smb2glob.h"

43 44 45
static int
smb2_crypto_shash_allocate(struct TCP_Server_Info *server)
{
46 47 48
	return cifs_alloc_hash("hmac(sha256)",
			       &server->secmech.hmacsha256,
			       &server->secmech.sdeschmacsha256);
49 50 51 52 53
}

static int
smb3_crypto_shash_allocate(struct TCP_Server_Info *server)
{
54
	struct cifs_secmech *p = &server->secmech;
55 56
	int rc;

57 58 59
	rc = cifs_alloc_hash("hmac(sha256)",
			     &p->hmacsha256,
			     &p->sdeschmacsha256);
60
	if (rc)
61
		goto err;
62

63 64 65
	rc = cifs_alloc_hash("cmac(aes)", &p->cmacaes, &p->sdesccmacaes);
	if (rc)
		goto err;
66 67

	return 0;
68 69 70
err:
	cifs_free_hash(&p->hmacsha256, &p->sdeschmacsha256);
	return rc;
71 72
}

A
Aurelien Aptel 已提交
73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100
int
smb311_crypto_shash_allocate(struct TCP_Server_Info *server)
{
	struct cifs_secmech *p = &server->secmech;
	int rc = 0;

	rc = cifs_alloc_hash("hmac(sha256)",
			     &p->hmacsha256,
			     &p->sdeschmacsha256);
	if (rc)
		return rc;

	rc = cifs_alloc_hash("cmac(aes)", &p->cmacaes, &p->sdesccmacaes);
	if (rc)
		goto err;

	rc = cifs_alloc_hash("sha512", &p->sha512, &p->sdescsha512);
	if (rc)
		goto err;

	return 0;

err:
	cifs_free_hash(&p->cmacaes, &p->sdesccmacaes);
	cifs_free_hash(&p->hmacsha256, &p->sdeschmacsha256);
	return rc;
}

S
Sachin Prabhu 已提交
101 102
static struct cifs_ses *
smb2_find_smb_ses_unlocked(struct TCP_Server_Info *server, __u64 ses_id)
103 104 105 106
{
	struct cifs_ses *ses;

	list_for_each_entry(ses, &server->smb_ses_list, smb_ses_list) {
107
		if (ses->Suid != ses_id)
108 109 110
			continue;
		return ses;
	}
S
Sachin Prabhu 已提交
111 112 113 114 115 116 117 118 119 120 121

	return NULL;
}

struct cifs_ses *
smb2_find_smb_ses(struct TCP_Server_Info *server, __u64 ses_id)
{
	struct cifs_ses *ses;

	spin_lock(&cifs_tcp_ses_lock);
	ses = smb2_find_smb_ses_unlocked(server, ses_id);
122 123
	spin_unlock(&cifs_tcp_ses_lock);

S
Sachin Prabhu 已提交
124 125 126 127 128 129 130 131 132 133 134 135 136 137 138
	return ses;
}

static struct cifs_tcon *
smb2_find_smb_sess_tcon_unlocked(struct cifs_ses *ses, __u32  tid)
{
	struct cifs_tcon *tcon;

	list_for_each_entry(tcon, &ses->tcon_list, tcon_list) {
		if (tcon->tid != tid)
			continue;
		++tcon->tc_count;
		return tcon;
	}

139 140 141
	return NULL;
}

S
Sachin Prabhu 已提交
142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164
/*
 * Obtain tcon corresponding to the tid in the given
 * cifs_ses
 */

struct cifs_tcon *
smb2_find_smb_tcon(struct TCP_Server_Info *server, __u64 ses_id, __u32  tid)
{
	struct cifs_ses *ses;
	struct cifs_tcon *tcon;

	spin_lock(&cifs_tcp_ses_lock);
	ses = smb2_find_smb_ses_unlocked(server, ses_id);
	if (!ses) {
		spin_unlock(&cifs_tcp_ses_lock);
		return NULL;
	}
	tcon = smb2_find_smb_sess_tcon_unlocked(ses, tid);
	spin_unlock(&cifs_tcp_ses_lock);

	return tcon;
}

165
int
166
smb2_calc_signature(struct smb_rqst *rqst, struct TCP_Server_Info *server)
P
Pavel Shilovsky 已提交
167
{
168
	int rc;
P
Pavel Shilovsky 已提交
169 170
	unsigned char smb2_signature[SMB2_HMACSHA256_SIZE];
	unsigned char *sigptr = smb2_signature;
171
	struct kvec *iov = rqst->rq_iov;
172
	struct smb2_sync_hdr *shdr = (struct smb2_sync_hdr *)iov[0].iov_base;
173
	struct cifs_ses *ses;
174
	struct shash_desc *shash;
175
	struct smb_rqst drqst;
176

177
	ses = smb2_find_smb_ses(server, shdr->SessionId);
178
	if (!ses) {
179
		cifs_server_dbg(VFS, "%s: Could not find session\n", __func__);
180 181
		return 0;
	}
P
Pavel Shilovsky 已提交
182 183

	memset(smb2_signature, 0x0, SMB2_HMACSHA256_SIZE);
184
	memset(shdr->Signature, 0x0, SMB2_SIGNATURE_SIZE);
P
Pavel Shilovsky 已提交
185

186 187
	rc = smb2_crypto_shash_allocate(server);
	if (rc) {
188
		cifs_server_dbg(VFS, "%s: sha256 alloc failed\n", __func__);
189 190 191
		return rc;
	}

P
Pavel Shilovsky 已提交
192
	rc = crypto_shash_setkey(server->secmech.hmacsha256,
193
				 ses->auth_key.response, SMB2_NTLMV2_SESSKEY_SIZE);
P
Pavel Shilovsky 已提交
194
	if (rc) {
195
		cifs_server_dbg(VFS, "%s: Could not update with response\n", __func__);
P
Pavel Shilovsky 已提交
196 197 198
		return rc;
	}

199
	shash = &server->secmech.sdeschmacsha256->shash;
200
	rc = crypto_shash_init(shash);
P
Pavel Shilovsky 已提交
201
	if (rc) {
202
		cifs_server_dbg(VFS, "%s: Could not init sha256", __func__);
P
Pavel Shilovsky 已提交
203 204 205
		return rc;
	}

206 207 208 209 210 211 212 213 214 215 216 217
	/*
	 * For SMB2+, __cifs_calc_signature() expects to sign only the actual
	 * data, that is, iov[0] should not contain a rfc1002 length.
	 *
	 * Sign the rfc1002 length prior to passing the data (iov[1-N]) down to
	 * __cifs_calc_signature().
	 */
	drqst = *rqst;
	if (drqst.rq_nvec >= 2 && iov[0].iov_len == 4) {
		rc = crypto_shash_update(shash, iov[0].iov_base,
					 iov[0].iov_len);
		if (rc) {
218
			cifs_server_dbg(VFS, "%s: Could not update with payload\n",
219 220 221 222 223 224
				 __func__);
			return rc;
		}
		drqst.rq_iov++;
		drqst.rq_nvec--;
	}
P
Pavel Shilovsky 已提交
225

226
	rc = __cifs_calc_signature(&drqst, server, sigptr, shash);
227
	if (!rc)
228
		memcpy(shdr->Signature, sigptr, SMB2_SIGNATURE_SIZE);
P
Pavel Shilovsky 已提交
229 230 231 232

	return rc;
}

233 234
static int generate_key(struct cifs_ses *ses, struct kvec label,
			struct kvec context, __u8 *key, unsigned int key_size)
S
Steve French 已提交
235 236 237 238 239 240 241
{
	unsigned char zero = 0x0;
	__u8 i[4] = {0, 0, 0, 1};
	__u8 L[4] = {0, 0, 0, 128};
	int rc = 0;
	unsigned char prfhash[SMB2_HMACSHA256_SIZE];
	unsigned char *hashptr = prfhash;
242
	struct TCP_Server_Info *server = ses->server;
S
Steve French 已提交
243 244

	memset(prfhash, 0x0, SMB2_HMACSHA256_SIZE);
245
	memset(key, 0x0, key_size);
S
Steve French 已提交
246

247
	rc = smb3_crypto_shash_allocate(server);
248
	if (rc) {
249
		cifs_server_dbg(VFS, "%s: crypto alloc failed\n", __func__);
250 251 252
		goto smb3signkey_ret;
	}

253
	rc = crypto_shash_setkey(server->secmech.hmacsha256,
254
		ses->auth_key.response, SMB2_NTLMV2_SESSKEY_SIZE);
S
Steve French 已提交
255
	if (rc) {
256
		cifs_server_dbg(VFS, "%s: Could not set with session key\n", __func__);
S
Steve French 已提交
257 258 259
		goto smb3signkey_ret;
	}

260
	rc = crypto_shash_init(&server->secmech.sdeschmacsha256->shash);
S
Steve French 已提交
261
	if (rc) {
262
		cifs_server_dbg(VFS, "%s: Could not init sign hmac\n", __func__);
S
Steve French 已提交
263 264 265
		goto smb3signkey_ret;
	}

266
	rc = crypto_shash_update(&server->secmech.sdeschmacsha256->shash,
S
Steve French 已提交
267 268
				i, 4);
	if (rc) {
269
		cifs_server_dbg(VFS, "%s: Could not update with n\n", __func__);
S
Steve French 已提交
270 271 272
		goto smb3signkey_ret;
	}

273
	rc = crypto_shash_update(&server->secmech.sdeschmacsha256->shash,
274
				label.iov_base, label.iov_len);
S
Steve French 已提交
275
	if (rc) {
276
		cifs_server_dbg(VFS, "%s: Could not update with label\n", __func__);
S
Steve French 已提交
277 278 279
		goto smb3signkey_ret;
	}

280
	rc = crypto_shash_update(&server->secmech.sdeschmacsha256->shash,
S
Steve French 已提交
281 282
				&zero, 1);
	if (rc) {
283
		cifs_server_dbg(VFS, "%s: Could not update with zero\n", __func__);
S
Steve French 已提交
284 285 286
		goto smb3signkey_ret;
	}

287
	rc = crypto_shash_update(&server->secmech.sdeschmacsha256->shash,
288
				context.iov_base, context.iov_len);
S
Steve French 已提交
289
	if (rc) {
290
		cifs_server_dbg(VFS, "%s: Could not update with context\n", __func__);
S
Steve French 已提交
291 292 293
		goto smb3signkey_ret;
	}

294
	rc = crypto_shash_update(&server->secmech.sdeschmacsha256->shash,
S
Steve French 已提交
295 296
				L, 4);
	if (rc) {
297
		cifs_server_dbg(VFS, "%s: Could not update with L\n", __func__);
S
Steve French 已提交
298 299 300
		goto smb3signkey_ret;
	}

301
	rc = crypto_shash_final(&server->secmech.sdeschmacsha256->shash,
S
Steve French 已提交
302 303
				hashptr);
	if (rc) {
304
		cifs_server_dbg(VFS, "%s: Could not generate sha256 hash\n", __func__);
S
Steve French 已提交
305 306 307
		goto smb3signkey_ret;
	}

308
	memcpy(key, hashptr, key_size);
S
Steve French 已提交
309 310

smb3signkey_ret:
311
	return rc;
S
Steve French 已提交
312 313
}

314 315 316 317 318 319 320 321 322 323 324 325 326 327 328 329 330 331 332 333 334 335 336 337 338 339 340 341 342
struct derivation {
	struct kvec label;
	struct kvec context;
};

struct derivation_triplet {
	struct derivation signing;
	struct derivation encryption;
	struct derivation decryption;
};

static int
generate_smb3signingkey(struct cifs_ses *ses,
			const struct derivation_triplet *ptriplet)
{
	int rc;

	rc = generate_key(ses, ptriplet->signing.label,
			  ptriplet->signing.context, ses->smb3signingkey,
			  SMB3_SIGN_KEY_SIZE);
	if (rc)
		return rc;

	rc = generate_key(ses, ptriplet->encryption.label,
			  ptriplet->encryption.context, ses->smb3encryptionkey,
			  SMB3_SIGN_KEY_SIZE);
	if (rc)
		return rc;

343 344 345 346 347 348 349 350 351 352 353 354 355 356 357 358 359 360 361 362 363 364 365 366 367
	rc = generate_key(ses, ptriplet->decryption.label,
			  ptriplet->decryption.context,
			  ses->smb3decryptionkey, SMB3_SIGN_KEY_SIZE);

	if (rc)
		return rc;

#ifdef CONFIG_CIFS_DEBUG_DUMP_KEYS
	cifs_dbg(VFS, "%s: dumping generated AES session keys\n", __func__);
	/*
	 * The session id is opaque in terms of endianness, so we can't
	 * print it as a long long. we dump it as we got it on the wire
	 */
	cifs_dbg(VFS, "Session Id    %*ph\n", (int)sizeof(ses->Suid),
			&ses->Suid);
	cifs_dbg(VFS, "Session Key   %*ph\n",
		 SMB2_NTLMV2_SESSKEY_SIZE, ses->auth_key.response);
	cifs_dbg(VFS, "Signing Key   %*ph\n",
		 SMB3_SIGN_KEY_SIZE, ses->smb3signingkey);
	cifs_dbg(VFS, "ServerIn Key  %*ph\n",
		 SMB3_SIGN_KEY_SIZE, ses->smb3encryptionkey);
	cifs_dbg(VFS, "ServerOut Key %*ph\n",
		 SMB3_SIGN_KEY_SIZE, ses->smb3decryptionkey);
#endif
	return rc;
368 369 370 371 372 373 374 375 376 377 378 379 380 381 382 383 384 385 386 387 388 389 390 391 392 393 394 395 396 397 398 399 400 401 402 403 404 405
}

int
generate_smb30signingkey(struct cifs_ses *ses)

{
	struct derivation_triplet triplet;
	struct derivation *d;

	d = &triplet.signing;
	d->label.iov_base = "SMB2AESCMAC";
	d->label.iov_len = 12;
	d->context.iov_base = "SmbSign";
	d->context.iov_len = 8;

	d = &triplet.encryption;
	d->label.iov_base = "SMB2AESCCM";
	d->label.iov_len = 11;
	d->context.iov_base = "ServerIn ";
	d->context.iov_len = 10;

	d = &triplet.decryption;
	d->label.iov_base = "SMB2AESCCM";
	d->label.iov_len = 11;
	d->context.iov_base = "ServerOut";
	d->context.iov_len = 10;

	return generate_smb3signingkey(ses, &triplet);
}

int
generate_smb311signingkey(struct cifs_ses *ses)

{
	struct derivation_triplet triplet;
	struct derivation *d;

	d = &triplet.signing;
406 407 408 409
	d->label.iov_base = "SMBSigningKey";
	d->label.iov_len = 14;
	d->context.iov_base = ses->preauth_sha_hash;
	d->context.iov_len = 64;
410 411

	d = &triplet.encryption;
412 413 414 415
	d->label.iov_base = "SMBC2SCipherKey";
	d->label.iov_len = 16;
	d->context.iov_base = ses->preauth_sha_hash;
	d->context.iov_len = 64;
416 417

	d = &triplet.decryption;
418 419 420 421
	d->label.iov_base = "SMBS2CCipherKey";
	d->label.iov_len = 16;
	d->context.iov_base = ses->preauth_sha_hash;
	d->context.iov_len = 64;
422 423 424 425

	return generate_smb3signingkey(ses, &triplet);
}

426 427 428
int
smb3_calc_signature(struct smb_rqst *rqst, struct TCP_Server_Info *server)
{
429
	int rc;
S
Steve French 已提交
430 431 432
	unsigned char smb3_signature[SMB2_CMACAES_SIZE];
	unsigned char *sigptr = smb3_signature;
	struct kvec *iov = rqst->rq_iov;
433
	struct smb2_sync_hdr *shdr = (struct smb2_sync_hdr *)iov[0].iov_base;
434
	struct cifs_ses *ses;
435 436
	struct shash_desc *shash = &server->secmech.sdesccmacaes->shash;
	struct smb_rqst drqst;
437

438
	ses = smb2_find_smb_ses(server, shdr->SessionId);
439
	if (!ses) {
440
		cifs_server_dbg(VFS, "%s: Could not find session\n", __func__);
441 442
		return 0;
	}
S
Steve French 已提交
443 444

	memset(smb3_signature, 0x0, SMB2_CMACAES_SIZE);
445
	memset(shdr->Signature, 0x0, SMB2_SIGNATURE_SIZE);
S
Steve French 已提交
446 447

	rc = crypto_shash_setkey(server->secmech.cmacaes,
448
				 ses->smb3signingkey, SMB2_CMACAES_SIZE);
S
Steve French 已提交
449
	if (rc) {
450
		cifs_server_dbg(VFS, "%s: Could not set key for cmac aes\n", __func__);
S
Steve French 已提交
451 452 453
		return rc;
	}

454 455 456 457 458
	/*
	 * we already allocate sdesccmacaes when we init smb3 signing key,
	 * so unlike smb2 case we do not have to check here if secmech are
	 * initialized
	 */
459
	rc = crypto_shash_init(shash);
S
Steve French 已提交
460
	if (rc) {
461
		cifs_server_dbg(VFS, "%s: Could not init cmac aes\n", __func__);
S
Steve French 已提交
462 463
		return rc;
	}
464

465 466 467 468 469 470 471 472 473 474 475 476
	/*
	 * For SMB2+, __cifs_calc_signature() expects to sign only the actual
	 * data, that is, iov[0] should not contain a rfc1002 length.
	 *
	 * Sign the rfc1002 length prior to passing the data (iov[1-N]) down to
	 * __cifs_calc_signature().
	 */
	drqst = *rqst;
	if (drqst.rq_nvec >= 2 && iov[0].iov_len == 4) {
		rc = crypto_shash_update(shash, iov[0].iov_base,
					 iov[0].iov_len);
		if (rc) {
477
			cifs_server_dbg(VFS, "%s: Could not update with payload\n",
478 479 480 481 482 483
				 __func__);
			return rc;
		}
		drqst.rq_iov++;
		drqst.rq_nvec--;
	}
S
Steve French 已提交
484

485
	rc = __cifs_calc_signature(&drqst, server, sigptr, shash);
486
	if (!rc)
487
		memcpy(shdr->Signature, sigptr, SMB2_SIGNATURE_SIZE);
S
Steve French 已提交
488 489

	return rc;
490 491
}

P
Pavel Shilovsky 已提交
492 493
/* must be called with server->srv_mutex held */
static int
494
smb2_sign_rqst(struct smb_rqst *rqst, struct TCP_Server_Info *server)
P
Pavel Shilovsky 已提交
495 496
{
	int rc = 0;
497
	struct smb2_sync_hdr *shdr =
498
			(struct smb2_sync_hdr *)rqst->rq_iov[0].iov_base;
P
Pavel Shilovsky 已提交
499

500
	if (!(shdr->Flags & SMB2_FLAGS_SIGNED) ||
P
Pavel Shilovsky 已提交
501 502 503 504
	    server->tcpStatus == CifsNeedNegotiate)
		return rc;

	if (!server->session_estab) {
505
		strncpy(shdr->Signature, "BSRSPYL", 8);
P
Pavel Shilovsky 已提交
506 507 508
		return rc;
	}

509
	rc = server->ops->calc_signature(rqst, server);
P
Pavel Shilovsky 已提交
510 511 512 513 514

	return rc;
}

int
515
smb2_verify_signature(struct smb_rqst *rqst, struct TCP_Server_Info *server)
P
Pavel Shilovsky 已提交
516 517 518
{
	unsigned int rc;
	char server_response_sig[16];
519
	struct smb2_sync_hdr *shdr =
520
			(struct smb2_sync_hdr *)rqst->rq_iov[0].iov_base;
P
Pavel Shilovsky 已提交
521

522 523 524
	if ((shdr->Command == SMB2_NEGOTIATE) ||
	    (shdr->Command == SMB2_SESSION_SETUP) ||
	    (shdr->Command == SMB2_OPLOCK_BREAK) ||
P
Pavel Shilovsky 已提交
525 526 527 528 529 530 531 532 533
	    (!server->session_estab))
		return 0;

	/*
	 * BB what if signatures are supposed to be on for session but
	 * server does not send one? BB
	 */

	/* Do not need to verify session setups with signature "BSRSPYL " */
534
	if (memcmp(shdr->Signature, "BSRSPYL ", 8) == 0)
535
		cifs_dbg(FYI, "dummy signature received for smb command 0x%x\n",
536
			 shdr->Command);
P
Pavel Shilovsky 已提交
537 538 539 540 541

	/*
	 * Save off the origiginal signature so we can modify the smb and check
	 * our calculated signature against what the server sent.
	 */
542
	memcpy(server_response_sig, shdr->Signature, SMB2_SIGNATURE_SIZE);
P
Pavel Shilovsky 已提交
543

544
	memset(shdr->Signature, 0, SMB2_SIGNATURE_SIZE);
P
Pavel Shilovsky 已提交
545 546

	mutex_lock(&server->srv_mutex);
547
	rc = server->ops->calc_signature(rqst, server);
P
Pavel Shilovsky 已提交
548 549 550 551 552
	mutex_unlock(&server->srv_mutex);

	if (rc)
		return rc;

553
	if (memcmp(server_response_sig, shdr->Signature, SMB2_SIGNATURE_SIZE))
P
Pavel Shilovsky 已提交
554 555 556 557 558
		return -EACCES;
	else
		return 0;
}

559 560 561 562 563
/*
 * Set message id for the request. Should be called after wait_for_free_request
 * and when srv_mutex is held.
 */
static inline void
564 565
smb2_seq_num_into_buf(struct TCP_Server_Info *server,
		      struct smb2_sync_hdr *shdr)
566
{
567
	unsigned int i, num = le16_to_cpu(shdr->CreditCharge);
568

569
	shdr->MessageId = get_next_mid64(server);
570 571 572
	/* skip message numbers according to CreditCharge field */
	for (i = 1; i < num; i++)
		get_next_mid(server);
573 574 575
}

static struct mid_q_entry *
576
smb2_mid_entry_alloc(const struct smb2_sync_hdr *shdr,
577 578 579
		     struct TCP_Server_Info *server)
{
	struct mid_q_entry *temp;
580
	unsigned int credits = le16_to_cpu(shdr->CreditCharge);
581 582

	if (server == NULL) {
583
		cifs_dbg(VFS, "Null TCP session in smb2_mid_entry_alloc\n");
584 585 586 587
		return NULL;
	}

	temp = mempool_alloc(cifs_mid_poolp, GFP_NOFS);
588
	memset(temp, 0, sizeof(struct mid_q_entry));
589
	kref_init(&temp->refcount);
590
	temp->mid = le64_to_cpu(shdr->MessageId);
591
	temp->credits = credits > 0 ? credits : 1;
592 593 594 595 596 597 598 599 600 601 602
	temp->pid = current->pid;
	temp->command = shdr->Command; /* Always LE */
	temp->when_alloc = jiffies;
	temp->server = server;

	/*
	 * The default is for the mid to be synchronous, so the
	 * default callback just wakes up the current task.
	 */
	temp->callback = cifs_wake_up_task;
	temp->callback_data = current;
603 604 605

	atomic_inc(&midCount);
	temp->mid_state = MID_REQUEST_ALLOCATED;
606 607
	trace_smb3_cmd_enter(shdr->TreeId, shdr->SessionId,
		le16_to_cpu(shdr->Command), temp->mid);
608 609 610 611
	return temp;
}

static int
612
smb2_get_mid_entry(struct cifs_ses *ses, struct smb2_sync_hdr *shdr,
613 614 615 616 617 618
		   struct mid_q_entry **mid)
{
	if (ses->server->tcpStatus == CifsExiting)
		return -ENOENT;

	if (ses->server->tcpStatus == CifsNeedReconnect) {
619
		cifs_dbg(FYI, "tcp session dead - return to caller to retry\n");
620 621 622
		return -EAGAIN;
	}

623 624 625 626
	if (ses->server->tcpStatus == CifsNeedNegotiate &&
	   shdr->Command != SMB2_NEGOTIATE)
		return -EAGAIN;

627
	if (ses->status == CifsNew) {
628 629
		if ((shdr->Command != SMB2_SESSION_SETUP) &&
		    (shdr->Command != SMB2_NEGOTIATE))
630 631 632
			return -EAGAIN;
		/* else ok - we are setting up session */
	}
633 634

	if (ses->status == CifsExiting) {
635
		if (shdr->Command != SMB2_LOGOFF)
636 637 638 639
			return -EAGAIN;
		/* else ok - we are shutting down the session */
	}

640
	*mid = smb2_mid_entry_alloc(shdr, ses->server);
641 642 643 644 645
	if (*mid == NULL)
		return -ENOMEM;
	spin_lock(&GlobalMid_Lock);
	list_add_tail(&(*mid)->qhead, &ses->server->pending_mid_q);
	spin_unlock(&GlobalMid_Lock);
646

647 648 649 650 651 652 653
	return 0;
}

int
smb2_check_receive(struct mid_q_entry *mid, struct TCP_Server_Info *server,
		   bool log_error)
{
654
	unsigned int len = mid->resp_buf_size;
655
	struct kvec iov[1];
656
	struct smb_rqst rqst = { .rq_iov = iov,
657
				 .rq_nvec = 1 };
658

659
	iov[0].iov_base = (char *)mid->resp_buf;
660
	iov[0].iov_len = len;
661 662 663

	dump_smb(mid->resp_buf, min_t(u32, 80, len));
	/* convert the length into a more usable form */
664
	if (len > 24 && server->sign && !mid->decrypted) {
P
Pavel Shilovsky 已提交
665 666
		int rc;

667
		rc = smb2_verify_signature(&rqst, server);
P
Pavel Shilovsky 已提交
668
		if (rc)
669
			cifs_server_dbg(VFS, "SMB signature verification returned error = %d\n",
670
				 rc);
P
Pavel Shilovsky 已提交
671
	}
672 673 674 675

	return map_smb2_to_linux_error(mid->resp_buf, log_error);
}

676 677
struct mid_q_entry *
smb2_setup_request(struct cifs_ses *ses, struct smb_rqst *rqst)
678 679
{
	int rc;
680
	struct smb2_sync_hdr *shdr =
681
			(struct smb2_sync_hdr *)rqst->rq_iov[0].iov_base;
682 683
	struct mid_q_entry *mid;

684
	smb2_seq_num_into_buf(ses->server, shdr);
685

686
	rc = smb2_get_mid_entry(ses, shdr, &mid);
687 688
	if (rc) {
		revert_current_mid_from_hdr(ses->server, shdr);
689
		return ERR_PTR(rc);
690 691
	}

692 693
	rc = smb2_sign_rqst(rqst, ses->server);
	if (rc) {
694
		revert_current_mid_from_hdr(ses->server, shdr);
P
Pavel Shilovsky 已提交
695
		cifs_delete_mid(mid);
696 697
		return ERR_PTR(rc);
	}
698

699
	return mid;
700 701
}

702 703
struct mid_q_entry *
smb2_setup_async_request(struct TCP_Server_Info *server, struct smb_rqst *rqst)
704
{
705
	int rc;
706
	struct smb2_sync_hdr *shdr =
707
			(struct smb2_sync_hdr *)rqst->rq_iov[0].iov_base;
708 709
	struct mid_q_entry *mid;

710 711 712 713
	if (server->tcpStatus == CifsNeedNegotiate &&
	   shdr->Command != SMB2_NEGOTIATE)
		return ERR_PTR(-EAGAIN);

714
	smb2_seq_num_into_buf(server, shdr);
715

716
	mid = smb2_mid_entry_alloc(shdr, server);
717 718
	if (mid == NULL) {
		revert_current_mid_from_hdr(server, shdr);
719
		return ERR_PTR(-ENOMEM);
720
	}
721

722
	rc = smb2_sign_rqst(rqst, server);
723
	if (rc) {
724
		revert_current_mid_from_hdr(server, shdr);
725
		DeleteMidQEntry(mid);
726
		return ERR_PTR(rc);
P
Pavel Shilovsky 已提交
727 728
	}

729
	return mid;
730
}
731 732 733 734 735 736 737

int
smb3_crypto_aead_allocate(struct TCP_Server_Info *server)
{
	struct crypto_aead *tfm;

	if (!server->secmech.ccmaesencrypt) {
738 739 740 741
		if (server->cipher_type == SMB2_ENCRYPTION_AES128_GCM)
			tfm = crypto_alloc_aead("gcm(aes)", 0, 0);
		else
			tfm = crypto_alloc_aead("ccm(aes)", 0, 0);
742
		if (IS_ERR(tfm)) {
743
			cifs_server_dbg(VFS, "%s: Failed to alloc encrypt aead\n",
744 745 746 747 748 749 750
				 __func__);
			return PTR_ERR(tfm);
		}
		server->secmech.ccmaesencrypt = tfm;
	}

	if (!server->secmech.ccmaesdecrypt) {
751 752 753 754
		if (server->cipher_type == SMB2_ENCRYPTION_AES128_GCM)
			tfm = crypto_alloc_aead("gcm(aes)", 0, 0);
		else
			tfm = crypto_alloc_aead("ccm(aes)", 0, 0);
755 756 757
		if (IS_ERR(tfm)) {
			crypto_free_aead(server->secmech.ccmaesencrypt);
			server->secmech.ccmaesencrypt = NULL;
758
			cifs_server_dbg(VFS, "%s: Failed to alloc decrypt aead\n",
759 760 761 762 763 764 765 766
				 __func__);
			return PTR_ERR(tfm);
		}
		server->secmech.ccmaesdecrypt = tfm;
	}

	return 0;
}