sess.c 15.7 KB
Newer Older
1 2 3 4 5
/*
 *   fs/cifs/sess.c
 *
 *   SMB/CIFS session setup handling routines
 *
S
Steve French 已提交
6
 *   Copyright (c) International Business Machines  Corp., 2006, 2007
7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30
 *   Author(s): Steve French (sfrench@us.ibm.com)
 *
 *   This library is free software; you can redistribute it and/or modify
 *   it under the terms of the GNU Lesser General Public License as published
 *   by the Free Software Foundation; either version 2.1 of the License, or
 *   (at your option) any later version.
 *
 *   This library is distributed in the hope that it will be useful,
 *   but WITHOUT ANY WARRANTY; without even the implied warranty of
 *   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See
 *   the GNU Lesser General Public License for more details.
 *
 *   You should have received a copy of the GNU Lesser General Public License
 *   along with this library; if not, write to the Free Software
 *   Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
 */

#include "cifspdu.h"
#include "cifsglob.h"
#include "cifsproto.h"
#include "cifs_unicode.h"
#include "cifs_debug.h"
#include "ntlmssp.h"
#include "nterr.h"
31
#include <linux/utsname.h>
32 33

extern void SMBNTencrypt(unsigned char *passwd, unsigned char *c8,
S
Steve French 已提交
34
			 unsigned char *p24);
35 36 37 38 39 40 41 42 43 44 45 46 47

static __u32 cifs_ssetup_hdr(struct cifsSesInfo *ses, SESSION_SETUP_ANDX *pSMB)
{
	__u32 capabilities = 0;

	/* init fields common to all four types of SessSetup */
	/* note that header is initialized to zero in header_assemble */
	pSMB->req.AndXCommand = 0xFF;
	pSMB->req.MaxBufferSize = cpu_to_le16(ses->server->maxBuf);
	pSMB->req.MaxMpxCount = cpu_to_le16(ses->server->maxReq);

	/* Now no need to set SMBFLG_CASELESS or obsolete CANONICAL PATH */

S
Steve French 已提交
48
	/* BB verify whether signing required on neg or just on auth frame
49 50 51 52 53
	   (and NTLM case) */

	capabilities = CAP_LARGE_FILES | CAP_NT_SMBS | CAP_LEVEL_II_OPLOCKS |
			CAP_LARGE_WRITE_X | CAP_LARGE_READ_X;

S
Steve French 已提交
54 55
	if (ses->server->secMode &
	    (SECMODE_SIGN_REQUIRED | SECMODE_SIGN_ENABLED))
56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77
		pSMB->req.hdr.Flags2 |= SMBFLG2_SECURITY_SIGNATURE;

	if (ses->capabilities & CAP_UNICODE) {
		pSMB->req.hdr.Flags2 |= SMBFLG2_UNICODE;
		capabilities |= CAP_UNICODE;
	}
	if (ses->capabilities & CAP_STATUS32) {
		pSMB->req.hdr.Flags2 |= SMBFLG2_ERR_STATUS;
		capabilities |= CAP_STATUS32;
	}
	if (ses->capabilities & CAP_DFS) {
		pSMB->req.hdr.Flags2 |= SMBFLG2_DFS;
		capabilities |= CAP_DFS;
	}
	if (ses->capabilities & CAP_UNIX) {
		capabilities |= CAP_UNIX;
	}

	/* BB check whether to init vcnum BB */
	return capabilities;
}

S
Steve French 已提交
78
static void unicode_ssetup_strings(char **pbcc_area, struct cifsSesInfo *ses,
S
Steve French 已提交
79
				   const struct nls_table *nls_cp)
80
{
S
Steve French 已提交
81
	char *bcc_ptr = *pbcc_area;
82 83 84 85 86
	int bytes_ret = 0;

	/* BB FIXME add check that strings total less
	than 335 or will need to send them as arrays */

87 88
	/* unicode strings, must be word aligned before the call */
/*	if ((long) bcc_ptr % 2)	{
89 90
		*bcc_ptr = 0;
		bcc_ptr++;
91
	} */
92
	/* copy user */
S
Steve French 已提交
93
	if (ses->userName == NULL) {
94 95 96
		/* null user mount */
		*bcc_ptr = 0;
		*(bcc_ptr+1) = 0;
97 98 99 100 101 102 103
	} else { /* 300 should be long enough for any conceivable user name */
		bytes_ret = cifs_strtoUCS((__le16 *) bcc_ptr, ses->userName,
					  300, nls_cp);
	}
	bcc_ptr += 2 * bytes_ret;
	bcc_ptr += 2; /* account for null termination */
	/* copy domain */
S
Steve French 已提交
104
	if (ses->domainName == NULL) {
105 106 107 108 109 110
		/* Sending null domain better than using a bogus domain name (as
		we did briefly in 2.6.18) since server will use its default */
		*bcc_ptr = 0;
		*(bcc_ptr+1) = 0;
		bytes_ret = 0;
	} else
S
Steve French 已提交
111
		bytes_ret = cifs_strtoUCS((__le16 *) bcc_ptr, ses->domainName,
112 113 114 115 116 117 118 119
					  256, nls_cp);
	bcc_ptr += 2 * bytes_ret;
	bcc_ptr += 2;  /* account for null terminator */

	/* Copy OS version */
	bytes_ret = cifs_strtoUCS((__le16 *)bcc_ptr, "Linux version ", 32,
				  nls_cp);
	bcc_ptr += 2 * bytes_ret;
120
	bytes_ret = cifs_strtoUCS((__le16 *) bcc_ptr, init_utsname()->release,
121 122 123 124 125
				  32, nls_cp);
	bcc_ptr += 2 * bytes_ret;
	bcc_ptr += 2; /* trailing null */

	bytes_ret = cifs_strtoUCS((__le16 *) bcc_ptr, CIFS_NETWORK_OPSYS,
S
Steve French 已提交
126
				  32, nls_cp);
127 128 129 130 131 132
	bcc_ptr += 2 * bytes_ret;
	bcc_ptr += 2; /* trailing null */

	*pbcc_area = bcc_ptr;
}

S
Steve French 已提交
133
static void ascii_ssetup_strings(char **pbcc_area, struct cifsSesInfo *ses,
S
Steve French 已提交
134
				 const struct nls_table *nls_cp)
135
{
S
Steve French 已提交
136
	char *bcc_ptr = *pbcc_area;
137 138 139

	/* copy user */
	/* BB what about null user mounts - check that we do this BB */
S
Steve French 已提交
140 141 142 143 144 145
	/* copy user */
	if (ses->userName == NULL) {
		/* BB what about null user mounts - check that we do this BB */
	} else { /* 300 should be long enough for any conceivable user name */
		strncpy(bcc_ptr, ses->userName, 300);
	}
146
	/* BB improve check for overflow */
S
Steve French 已提交
147
	bcc_ptr += strnlen(ses->userName, 300);
148
	*bcc_ptr = 0;
S
Steve French 已提交
149
	bcc_ptr++; /* account for null termination */
150

S
Steve French 已提交
151 152 153 154
	/* copy domain */

	if (ses->domainName != NULL) {
		strncpy(bcc_ptr, ses->domainName, 256);
155
		bcc_ptr += strnlen(ses->domainName, 256);
S
Steve French 已提交
156
	} /* else we will send a null domain name
157
	     so the server will default to its own domain */
158 159 160 161 162 163 164
	*bcc_ptr = 0;
	bcc_ptr++;

	/* BB check for overflow here */

	strcpy(bcc_ptr, "Linux version ");
	bcc_ptr += strlen("Linux version ");
165 166
	strcpy(bcc_ptr, init_utsname()->release);
	bcc_ptr += strlen(init_utsname()->release) + 1;
167 168 169 170

	strcpy(bcc_ptr, CIFS_NETWORK_OPSYS);
	bcc_ptr += strlen(CIFS_NETWORK_OPSYS) + 1;

S
Steve French 已提交
171
	*pbcc_area = bcc_ptr;
172 173
}

S
Steve French 已提交
174 175 176
static int decode_unicode_ssetup(char **pbcc_area, int bleft,
				 struct cifsSesInfo *ses,
				 const struct nls_table *nls_cp)
177 178 179
{
	int rc = 0;
	int words_left, len;
S
Steve French 已提交
180
	char *data = *pbcc_area;
181 182 183



S
Steve French 已提交
184
	cFYI(1, ("bleft %d", bleft));
185 186


187 188 189 190 191 192 193 194
	/* SMB header is unaligned, so cifs servers word align start of
	   Unicode strings */
	data++;
	bleft--; /* Windows servers do not always double null terminate
		    their final Unicode string - in which case we
		    now will not attempt to decode the byte of junk
		    which follows it */
		    
195 196 197 198 199 200 201 202
	words_left = bleft / 2;

	/* save off server operating system */
	len = UniStrnlen((wchar_t *) data, words_left);

/* We look for obvious messed up bcc or strings in response so we do not go off
   the end since (at least) WIN2K and Windows XP have a major bug in not null
   terminating last Unicode string in response  */
S
Steve French 已提交
203
	if (len >= words_left)
204 205
		return rc;

S
Steve French 已提交
206
	if (ses->serverOS)
207 208 209
		kfree(ses->serverOS);
	/* UTF-8 string will not grow more than four times as big as UCS-16 */
	ses->serverOS = kzalloc(4 * len, GFP_KERNEL);
S
Steve French 已提交
210
	if (ses->serverOS != NULL) {
211 212 213 214 215 216 217 218 219
		cifs_strfromUCS_le(ses->serverOS, (__le16 *)data, len,
				   nls_cp);
	}
	data += 2 * (len + 1);
	words_left -= len + 1;

	/* save off server network operating system */
	len = UniStrnlen((wchar_t *) data, words_left);

S
Steve French 已提交
220
	if (len >= words_left)
221 222
		return rc;

S
Steve French 已提交
223
	if (ses->serverNOS)
224 225
		kfree(ses->serverNOS);
	ses->serverNOS = kzalloc(4 * len, GFP_KERNEL); /* BB this is wrong length FIXME BB */
S
Steve French 已提交
226
	if (ses->serverNOS != NULL) {
227 228
		cifs_strfromUCS_le(ses->serverNOS, (__le16 *)data, len,
				   nls_cp);
S
Steve French 已提交
229 230
		if (strncmp(ses->serverNOS, "NT LAN Manager 4", 16) == 0) {
			cFYI(1, ("NT4 server"));
231 232 233 234 235 236
			ses->flags |= CIFS_SES_NT4;
		}
	}
	data += 2 * (len + 1);
	words_left -= len + 1;

S
Steve French 已提交
237 238 239 240 241 242 243 244 245 246 247 248 249 250 251 252 253 254 255
	/* save off server domain */
	len = UniStrnlen((wchar_t *) data, words_left);

	if (len > words_left)
		return rc;

	if (ses->serverDomain)
		kfree(ses->serverDomain);
	ses->serverDomain = kzalloc(2 * (len + 1), GFP_KERNEL); /* BB FIXME wrong length */
	if (ses->serverDomain != NULL) {
		cifs_strfromUCS_le(ses->serverDomain, (__le16 *)data, len,
				   nls_cp);
		ses->serverDomain[2*len] = 0;
		ses->serverDomain[(2*len) + 1] = 0;
	}
	data += 2 * (len + 1);
	words_left -= len + 1;

	cFYI(1, ("words left: %d", words_left));
256 257 258 259

	return rc;
}

S
Steve French 已提交
260 261 262
static int decode_ascii_ssetup(char **pbcc_area, int bleft,
			       struct cifsSesInfo *ses,
			       const struct nls_table *nls_cp)
263 264 265
{
	int rc = 0;
	int len;
S
Steve French 已提交
266
	char *bcc_ptr = *pbcc_area;
267

S
Steve French 已提交
268
	cFYI(1, ("decode sessetup ascii. bleft %d", bleft));
269 270
	
	len = strnlen(bcc_ptr, bleft);
S
Steve French 已提交
271
	if (len >= bleft)
272 273
		return rc;
	
S
Steve French 已提交
274
	if (ses->serverOS)
275 276 277
		kfree(ses->serverOS);

	ses->serverOS = kzalloc(len + 1, GFP_KERNEL);
S
Steve French 已提交
278
	if (ses->serverOS)
279
		strncpy(ses->serverOS, bcc_ptr, len);
S
Steve French 已提交
280 281
	if (strncmp(ses->serverOS, "OS/2", 4) == 0) {
			cFYI(1, ("OS/2 server"));
282 283
			ses->flags |= CIFS_SES_OS2;
	}
284 285 286 287 288

	bcc_ptr += len + 1;
	bleft -= len + 1;

	len = strnlen(bcc_ptr, bleft);
S
Steve French 已提交
289
	if (len >= bleft)
290 291
		return rc;

S
Steve French 已提交
292
	if (ses->serverNOS)
293 294 295
		kfree(ses->serverNOS);

	ses->serverNOS = kzalloc(len + 1, GFP_KERNEL);
S
Steve French 已提交
296
	if (ses->serverNOS)
297 298 299 300 301
		strncpy(ses->serverNOS, bcc_ptr, len);

	bcc_ptr += len + 1;
	bleft -= len + 1;

S
Steve French 已提交
302 303 304
	len = strnlen(bcc_ptr, bleft);
	if (len > bleft)
		return rc;
305

306 307 308 309 310
	/* No domain field in LANMAN case. Domain is
	   returned by old servers in the SMB negprot response */
	/* BB For newer servers which do not support Unicode,
	   but thus do return domain here we could add parsing
	   for it later, but it is not very important */
S
Steve French 已提交
311
	cFYI(1, ("ascii: bytes left %d", bleft));
312 313 314 315

	return rc;
}

S
Steve French 已提交
316
int
317 318 319 320 321 322 323
CIFS_SessSetup(unsigned int xid, struct cifsSesInfo *ses, int first_time,
		const struct nls_table *nls_cp)
{
	int rc = 0;
	int wct;
	struct smb_hdr *smb_buf;
	char *bcc_ptr;
324
	char *str_area;
325 326 327 328
	SESSION_SETUP_ANDX *pSMB;
	__u32 capabilities;
	int count;
	int resp_buf_type = 0;
329
	struct kvec iov[2];
330 331 332
	enum securityEnum type;
	__u16 action;
	int bytes_remaining;
333

S
Steve French 已提交
334
	if (ses == NULL)
335 336 337
		return -EINVAL;

	type = ses->server->secType;
338

S
Steve French 已提交
339 340
	cFYI(1, ("sess setup type %d", type));
	if (type == LANMAN) {
341 342 343 344 345 346 347 348 349
#ifndef CONFIG_CIFS_WEAK_PW_HASH
		/* LANMAN and plaintext are less secure and off by default.
		So we make this explicitly be turned on in kconfig (in the
		build) and turned on at runtime (changed from the default)
		in proc/fs/cifs or via mount parm.  Unfortunately this is
		needed for old Win (e.g. Win95), some obscure NAS and OS/2 */
		return -EOPNOTSUPP;
#endif
		wct = 10; /* lanman 2 style sessionsetup */
S
Steve French 已提交
350
	} else if ((type == NTLM) || (type == NTLMv2)) {
351
		/* For NTLMv2 failures eventually may need to retry NTLM */
352
		wct = 13; /* old style NTLM sessionsetup */
S
Steve French 已提交
353
	} else /* same size: negotiate or auth, NTLMSSP or extended security */
354 355 356 357
		wct = 12;

	rc = small_smb_init_no_tc(SMB_COM_SESSION_SETUP_ANDX, wct, ses,
			    (void **)&smb_buf);
S
Steve French 已提交
358
	if (rc)
359 360 361 362 363
		return rc;

	pSMB = (SESSION_SETUP_ANDX *)smb_buf;

	capabilities = cifs_ssetup_hdr(ses, pSMB);
364 365 366 367 368 369

	/* we will send the SMB in two pieces,
	a fixed length beginning part, and a
	second part which will include the strings
	and rest of bcc area, in order to avoid having
	to do a large buffer 17K allocation */
S
Steve French 已提交
370 371
	iov[0].iov_base = (char *)pSMB;
	iov[0].iov_len = smb_buf->smb_buf_length + 4;
372 373 374 375

	/* 2000 big enough to fit max user, domain, NOS name etc. */
	str_area = kmalloc(2000, GFP_KERNEL);
	bcc_ptr = str_area;
376

377 378
	ses->flags &= ~CIFS_SES_LANMAN;

S
Steve French 已提交
379
	if (type == LANMAN) {
380
#ifdef CONFIG_CIFS_WEAK_PW_HASH
381
		char lnm_session_key[CIFS_SESS_KEY_SIZE];
382 383 384

		/* no capabilities flags in old lanman negotiation */

S
Steve French 已提交
385
		pSMB->old_req.PasswordLength = cpu_to_le16(CIFS_SESS_KEY_SIZE);
386 387 388
		/* BB calculate hash with password */
		/* and copy into bcc */

389
		calc_lanman_hash(ses, lnm_session_key);
S
Steve French 已提交
390
		ses->flags |= CIFS_SES_LANMAN;
391
/* #ifdef CONFIG_CIFS_DEBUG2
392
		cifs_dump_mem("cryptkey: ",ses->server->cryptKey,
393
			CIFS_SESS_KEY_SIZE);
394
#endif */
395 396
		memcpy(bcc_ptr, (char *)lnm_session_key, CIFS_SESS_KEY_SIZE);
		bcc_ptr += CIFS_SESS_KEY_SIZE;
397 398 399 400 401 402

		/* can not sign if LANMAN negotiated so no need
		to calculate signing key? but what if server
		changed to do higher than lanman dialect and
		we reconnected would we ever calc signing_key? */

S
Steve French 已提交
403
		cFYI(1, ("Negotiating LANMAN setting up strings"));
404 405
		/* Unicode not allowed for LANMAN dialects */
		ascii_ssetup_strings(&bcc_ptr, ses, nls_cp);
S
Steve French 已提交
406
#endif
407
	} else if (type == NTLM) {
408
		char ntlm_session_key[CIFS_SESS_KEY_SIZE];
409 410 411

		pSMB->req_no_secext.Capabilities = cpu_to_le32(capabilities);
		pSMB->req_no_secext.CaseInsensitivePasswordLength =
412
			cpu_to_le16(CIFS_SESS_KEY_SIZE);
413
		pSMB->req_no_secext.CaseSensitivePasswordLength =
414
			cpu_to_le16(CIFS_SESS_KEY_SIZE);
415 416 417 418 419
	
		/* calculate session key */
		SMBNTencrypt(ses->password, ses->server->cryptKey,
			     ntlm_session_key);

S
Steve French 已提交
420
		if (first_time) /* should this be moved into common code
421
				  with similar ntlmv2 path? */
422
			cifs_calculate_mac_key(ses->server->mac_signing_key,
423 424 425
				ntlm_session_key, ses->password);
		/* copy session key */

S
Steve French 已提交
426
		memcpy(bcc_ptr, (char *)ntlm_session_key, CIFS_SESS_KEY_SIZE);
427
		bcc_ptr += CIFS_SESS_KEY_SIZE;
S
Steve French 已提交
428
		memcpy(bcc_ptr, (char *)ntlm_session_key, CIFS_SESS_KEY_SIZE);
429
		bcc_ptr += CIFS_SESS_KEY_SIZE;
S
Steve French 已提交
430
		if (ses->capabilities & CAP_UNICODE) {
431 432 433
			/* unicode strings must be word aligned */
			if (iov[0].iov_len % 2) {
				*bcc_ptr = 0;
S
Steve French 已提交
434 435
				bcc_ptr++;
			}
436
			unicode_ssetup_strings(&bcc_ptr, ses, nls_cp);
437
		} else
438 439
			ascii_ssetup_strings(&bcc_ptr, ses, nls_cp);
	} else if (type == NTLMv2) {
S
Steve French 已提交
440
		char *v2_sess_key =
S
Steve French 已提交
441
			kmalloc(sizeof(struct ntlmv2_resp), GFP_KERNEL);
S
Steve French 已提交
442 443 444

		/* BB FIXME change all users of v2_sess_key to
		   struct ntlmv2_resp */
445

S
Steve French 已提交
446
		if (v2_sess_key == NULL) {
447 448 449 450 451 452 453 454 455 456 457
			cifs_small_buf_release(smb_buf);
			return -ENOMEM;
		}

		pSMB->req_no_secext.Capabilities = cpu_to_le32(capabilities);

		/* LM2 password would be here if we supported it */
		pSMB->req_no_secext.CaseInsensitivePasswordLength = 0;
		/*	cpu_to_le16(LM2_SESS_KEY_SIZE); */

		pSMB->req_no_secext.CaseSensitivePasswordLength =
S
Steve French 已提交
458
			cpu_to_le16(sizeof(struct ntlmv2_resp));
459 460

		/* calculate session key */
S
Steve French 已提交
461
		setup_ntlmv2_rsp(ses, v2_sess_key, nls_cp);
S
Steve French 已提交
462 463
		if (first_time) /* should this be moved into common code
				   with similar ntlmv2 path? */
464 465 466 467 468 469 470
		/*   cifs_calculate_ntlmv2_mac_key(ses->server->mac_signing_key,
				response BB FIXME, v2_sess_key); */

		/* copy session key */

	/*	memcpy(bcc_ptr, (char *)ntlm_session_key,LM2_SESS_KEY_SIZE);
		bcc_ptr += LM2_SESS_KEY_SIZE; */
S
Steve French 已提交
471 472
		memcpy(bcc_ptr, (char *)v2_sess_key,
		       sizeof(struct ntlmv2_resp));
S
Steve French 已提交
473 474
		bcc_ptr += sizeof(struct ntlmv2_resp);
		kfree(v2_sess_key);
S
Steve French 已提交
475 476
		if (ses->capabilities & CAP_UNICODE) {
			if (iov[0].iov_len % 2) {
477 478
				*bcc_ptr = 0;
			}	bcc_ptr++;
479
			unicode_ssetup_strings(&bcc_ptr, ses, nls_cp);
480
		} else
481 482 483 484 485 486 487 488
			ascii_ssetup_strings(&bcc_ptr, ses, nls_cp);
	} else /* NTLMSSP or SPNEGO */ {
		pSMB->req.hdr.Flags2 |= SMBFLG2_EXT_SEC;
		capabilities |= CAP_EXTENDED_SECURITY;
		pSMB->req.Capabilities = cpu_to_le32(capabilities);
		/* BB set password lengths */
	}

489
	count = (long) bcc_ptr - (long) str_area;
490 491 492 493
	smb_buf->smb_buf_length += count;

	BCC_LE(smb_buf) = cpu_to_le16(count);

494
	iov[1].iov_base = str_area;
S
Steve French 已提交
495
	iov[1].iov_len = count;
496
	rc = SendReceive2(xid, ses, iov, 2 /* num_iovecs */, &resp_buf_type, 0);
497 498
	/* SMB request buf freed in SendReceive2 */

S
Steve French 已提交
499 500
	cFYI(1, ("ssetup rc from sendrecv2 is %d", rc));
	if (rc)
501 502 503 504 505
		goto ssetup_exit;

	pSMB = (SESSION_SETUP_ANDX *)iov[0].iov_base;
	smb_buf = (struct smb_hdr *)iov[0].iov_base;

S
Steve French 已提交
506
	if ((smb_buf->WordCount != 3) && (smb_buf->WordCount != 4)) {
507
		rc = -EIO;
S
Steve French 已提交
508
		cERROR(1, ("bad word count %d", smb_buf->WordCount));
509 510 511 512
		goto ssetup_exit;
	}
	action = le16_to_cpu(pSMB->resp.Action);
	if (action & GUEST_LOGIN)
513
		cFYI(1, ("Guest login")); /* BB mark SesInfo struct? */
514 515 516 517 518 519 520
	ses->Suid = smb_buf->Uid;   /* UID left in wire format (le) */
	cFYI(1, ("UID = %d ", ses->Suid));
	/* response can have either 3 or 4 word count - Samba sends 3 */
	/* and lanman response is 3 */
	bytes_remaining = BCC(smb_buf);
	bcc_ptr = pByteArea(smb_buf);

S
Steve French 已提交
521
	if (smb_buf->WordCount == 4) {
522 523 524
		__u16 blob_len;
		blob_len = le16_to_cpu(pSMB->resp.SecurityBlobLength);
		bcc_ptr += blob_len;
S
Steve French 已提交
525 526
		if (blob_len > bytes_remaining) {
			cERROR(1, ("bad security blob length %d", blob_len));
527 528 529 530
			rc = -EINVAL;
			goto ssetup_exit;
		}
		bytes_remaining -= blob_len;
S
Steve French 已提交
531
	}
532 533

	/* BB check if Unicode and decode strings */
S
Steve French 已提交
534
	if (smb_buf->Flags2 & SMBFLG2_UNICODE)
535 536 537 538 539 540
		rc = decode_unicode_ssetup(&bcc_ptr, bytes_remaining,
						   ses, nls_cp);
	else
		rc = decode_ascii_ssetup(&bcc_ptr, bytes_remaining, ses,nls_cp);
	
ssetup_exit:
541
	kfree(str_area);
S
Steve French 已提交
542 543
	if (resp_buf_type == CIFS_SMALL_BUFFER) {
		cFYI(1, ("ssetup freeing small buf %p", iov[0].iov_base));
544
		cifs_small_buf_release(iov[0].iov_base);
S
Steve French 已提交
545
	} else if (resp_buf_type == CIFS_LARGE_BUFFER)
546 547 548 549
		cifs_buf_release(iov[0].iov_base);

	return rc;
}