connect.c 94.4 KB
Newer Older
L
Linus Torvalds 已提交
1 2 3
/*
 *   fs/cifs/connect.c
 *
4
 *   Copyright (C) International Business Machines  Corp., 2002,2009
L
Linus Torvalds 已提交
5 6 7 8 9 10 11 12 13 14 15 16 17 18
 *   Author(s): Steve French (sfrench@us.ibm.com)
 *
 *   This library is free software; you can redistribute it and/or modify
 *   it under the terms of the GNU Lesser General Public License as published
 *   by the Free Software Foundation; either version 2.1 of the License, or
 *   (at your option) any later version.
 *
 *   This library is distributed in the hope that it will be useful,
 *   but WITHOUT ANY WARRANTY; without even the implied warranty of
 *   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See
 *   the GNU Lesser General Public License for more details.
 *
 *   You should have received a copy of the GNU Lesser General Public License
 *   along with this library; if not, write to the Free Software
S
Steve French 已提交
19
 *   Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
L
Linus Torvalds 已提交
20 21 22 23 24 25
 */
#include <linux/fs.h>
#include <linux/net.h>
#include <linux/string.h>
#include <linux/list.h>
#include <linux/wait.h>
26
#include <linux/slab.h>
L
Linus Torvalds 已提交
27 28 29 30
#include <linux/pagemap.h>
#include <linux/ctype.h>
#include <linux/utsname.h>
#include <linux/mempool.h>
31
#include <linux/delay.h>
32
#include <linux/completion.h>
33
#include <linux/kthread.h>
34
#include <linux/pagevec.h>
35
#include <linux/freezer.h>
36
#include <linux/namei.h>
L
Linus Torvalds 已提交
37 38
#include <asm/uaccess.h>
#include <asm/processor.h>
39
#include <linux/inet.h>
40
#include <net/ipv6.h>
L
Linus Torvalds 已提交
41 42 43 44 45 46 47 48 49
#include "cifspdu.h"
#include "cifsglob.h"
#include "cifsproto.h"
#include "cifs_unicode.h"
#include "cifs_debug.h"
#include "cifs_fs_sb.h"
#include "ntlmssp.h"
#include "nterr.h"
#include "rfc1002pdu.h"
50
#include "fscache.h"
L
Linus Torvalds 已提交
51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67

#define CIFS_PORT 445
#define RFC1001_PORT 139

extern void SMBNTencrypt(unsigned char *passwd, unsigned char *c8,
			 unsigned char *p24);

extern mempool_t *cifs_req_poolp;

struct smb_vol {
	char *username;
	char *password;
	char *domainname;
	char *UNC;
	char *UNCip;
	char *iocharset;  /* local code page for mapping to and from Unicode */
	char source_rfc1001_name[16]; /* netbios name of client */
68
	char target_rfc1001_name[16]; /* netbios name of server for Win9x/ME */
69
	uid_t cred_uid;
L
Linus Torvalds 已提交
70 71 72 73
	uid_t linux_uid;
	gid_t linux_gid;
	mode_t file_mode;
	mode_t dir_mode;
74
	unsigned secFlg;
75 76 77 78 79
	bool retry:1;
	bool intr:1;
	bool setuids:1;
	bool override_uid:1;
	bool override_gid:1;
80
	bool dynperm:1;
81 82 83 84 85 86
	bool noperm:1;
	bool no_psx_acl:1; /* set if posix acl support should be disabled */
	bool cifs_acl:1;
	bool no_xattr:1;   /* set if xattr (EA) support should be disabled*/
	bool server_ino:1; /* use inode numbers from server ie UniqueId */
	bool direct_io:1;
87 88
	bool remap:1;      /* set to remap seven reserved chars in filenames */
	bool posix_paths:1; /* unset to not ask for posix pathnames. */
89 90
	bool no_linux_ext:1;
	bool sfu_emul:1;
91 92 93
	bool nullauth:1;   /* attempt to authenticate with null user */
	bool nocase:1;     /* request case insensitive filenames */
	bool nobrl:1;      /* disable sending byte range locks to srv */
94
	bool mand_lock:1;  /* send mandatory not posix byte range lock reqs */
95
	bool seal:1;       /* request transport encryption on share */
S
Steve French 已提交
96 97
	bool nodfs:1;      /* Do not request DFS, even if available */
	bool local_lease:1; /* check leases only on local system, not remote */
98 99
	bool noblocksnd:1;
	bool noautotune:1;
100
	bool nostrictsync:1; /* do not force expensive SMBflush on every sync */
101
	bool fsc:1;	/* enable fscache */
102
	bool mfsymlinks:1; /* use Minshall+French Symlinks */
J
Jeff Layton 已提交
103
	bool multiuser:1;
L
Linus Torvalds 已提交
104 105
	unsigned int rsize;
	unsigned int wsize;
106
	bool sockopt_tcp_nodelay:1;
L
Linus Torvalds 已提交
107
	unsigned short int port;
S
Steve French 已提交
108
	char *prepath;
109
	struct sockaddr_storage srcaddr; /* allow binding to a local IP */
110
	struct nls_table *local_nls;
L
Linus Torvalds 已提交
111 112
};

113 114 115
#define TLINK_ERROR_EXPIRE	(1 * HZ)


116
static int ipv4_connect(struct TCP_Server_Info *server);
117
static int ipv6_connect(struct TCP_Server_Info *server);
L
Linus Torvalds 已提交
118

119 120 121 122 123 124 125 126
/*
 * cifs tcp session reconnection
 *
 * mark tcp session as reconnecting so temporarily locked
 * mark all smb sessions as reconnecting for tcp session
 * reconnect tcp session
 * wake up waiters on reconnection? - (not needed currently)
 */
127
static int
L
Linus Torvalds 已提交
128 129 130
cifs_reconnect(struct TCP_Server_Info *server)
{
	int rc = 0;
131
	struct list_head *tmp, *tmp2;
L
Linus Torvalds 已提交
132 133
	struct cifsSesInfo *ses;
	struct cifsTconInfo *tcon;
S
Steve French 已提交
134
	struct mid_q_entry *mid_entry;
135

L
Linus Torvalds 已提交
136
	spin_lock(&GlobalMid_Lock);
137
	if (server->tcpStatus == CifsExiting) {
S
Steve French 已提交
138
		/* the demux thread will exit normally
L
Linus Torvalds 已提交
139 140 141 142 143 144 145 146
		next time through the loop */
		spin_unlock(&GlobalMid_Lock);
		return rc;
	} else
		server->tcpStatus = CifsNeedReconnect;
	spin_unlock(&GlobalMid_Lock);
	server->maxBuf = 0;

147
	cFYI(1, "Reconnecting tcp session");
L
Linus Torvalds 已提交
148 149 150

	/* before reconnecting the tcp session, mark the smb session (uid)
		and the tid bad so they are not used until reconnected */
151 152 153 154 155
	read_lock(&cifs_tcp_ses_lock);
	list_for_each(tmp, &server->smb_ses_list) {
		ses = list_entry(tmp, struct cifsSesInfo, smb_ses_list);
		ses->need_reconnect = true;
		ses->ipc_tid = 0;
156 157
		list_for_each(tmp2, &ses->tcon_list) {
			tcon = list_entry(tmp2, struct cifsTconInfo, tcon_list);
S
Steve French 已提交
158
			tcon->need_reconnect = true;
L
Linus Torvalds 已提交
159 160
		}
	}
161
	read_unlock(&cifs_tcp_ses_lock);
L
Linus Torvalds 已提交
162
	/* do not want to be sending data on a socket we are freeing */
J
Jeff Layton 已提交
163
	mutex_lock(&server->srv_mutex);
S
Steve French 已提交
164
	if (server->ssocket) {
165 166
		cFYI(1, "State: 0x%x Flags: 0x%lx", server->ssocket->state,
			server->ssocket->flags);
167
		kernel_sock_shutdown(server->ssocket, SHUT_WR);
168
		cFYI(1, "Post shutdown state: 0x%x Flags: 0x%lx",
S
Steve French 已提交
169
			server->ssocket->state,
170
			server->ssocket->flags);
L
Linus Torvalds 已提交
171 172 173 174 175 176 177 178 179
		sock_release(server->ssocket);
		server->ssocket = NULL;
	}

	spin_lock(&GlobalMid_Lock);
	list_for_each(tmp, &server->pending_mid_q) {
		mid_entry = list_entry(tmp, struct
					mid_q_entry,
					qhead);
180
		if (mid_entry->midState == MID_REQUEST_SUBMITTED) {
181 182 183 184
				/* Mark other intransit requests as needing
				   retry so we do not immediately mark the
				   session bad again (ie after we reconnect
				   below) as they timeout too */
185
			mid_entry->midState = MID_RETRY_NEEDED;
L
Linus Torvalds 已提交
186 187 188
		}
	}
	spin_unlock(&GlobalMid_Lock);
J
Jeff Layton 已提交
189
	mutex_unlock(&server->srv_mutex);
L
Linus Torvalds 已提交
190

191 192
	while ((server->tcpStatus != CifsExiting) &&
	       (server->tcpStatus != CifsGood)) {
193
		try_to_freeze();
194
		if (server->addr.sockAddr6.sin6_family == AF_INET6)
195
			rc = ipv6_connect(server);
196 197
		else
			rc = ipv4_connect(server);
S
Steve French 已提交
198
		if (rc) {
199
			cFYI(1, "reconnect error %d", rc);
200
			msleep(3000);
L
Linus Torvalds 已提交
201 202 203
		} else {
			atomic_inc(&tcpSesReconnectCount);
			spin_lock(&GlobalMid_Lock);
204
			if (server->tcpStatus != CifsExiting)
L
Linus Torvalds 已提交
205
				server->tcpStatus = CifsGood;
206
			server->sequence_number = 0;
S
Steve French 已提交
207
			spin_unlock(&GlobalMid_Lock);
L
Linus Torvalds 已提交
208 209 210 211 212 213 214
	/*		atomic_set(&server->inFlight,0);*/
			wake_up(&server->response_q);
		}
	}
	return rc;
}

S
Steve French 已提交
215
/*
216 217 218 219 220 221
	return codes:
		0 	not a transact2, or all data present
		>0 	transact2 with that much data missing
		-EINVAL = invalid transact2

 */
S
Steve French 已提交
222
static int check2ndT2(struct smb_hdr *pSMB, unsigned int maxBufSize)
223
{
S
Steve French 已提交
224 225
	struct smb_t2_rsp *pSMBt;
	int total_data_size;
226 227 228
	int data_in_this_rsp;
	int remaining;

S
Steve French 已提交
229
	if (pSMB->Command != SMB_COM_TRANSACTION2)
230 231
		return 0;

S
Steve French 已提交
232 233 234
	/* check for plausible wct, bcc and t2 data and parm sizes */
	/* check for parm and data offset going beyond end of smb */
	if (pSMB->WordCount != 10) { /* coalesce_t2 depends on this */
235
		cFYI(1, "invalid transact2 word count");
236 237 238 239 240 241 242 243 244 245
		return -EINVAL;
	}

	pSMBt = (struct smb_t2_rsp *)pSMB;

	total_data_size = le16_to_cpu(pSMBt->t2_rsp.TotalDataCount);
	data_in_this_rsp = le16_to_cpu(pSMBt->t2_rsp.DataCount);

	remaining = total_data_size - data_in_this_rsp;

S
Steve French 已提交
246
	if (remaining == 0)
247
		return 0;
S
Steve French 已提交
248
	else if (remaining < 0) {
249 250
		cFYI(1, "total data %d smaller than data in frame %d",
			total_data_size, data_in_this_rsp);
251 252
		return -EINVAL;
	} else {
253 254
		cFYI(1, "missing %d bytes from transact2, check next response",
			remaining);
S
Steve French 已提交
255
		if (total_data_size > maxBufSize) {
256 257
			cERROR(1, "TotalDataSize %d is over maximum buffer %d",
				total_data_size, maxBufSize);
S
Steve French 已提交
258
			return -EINVAL;
259 260 261 262 263
		}
		return remaining;
	}
}

S
Steve French 已提交
264
static int coalesce_t2(struct smb_hdr *psecond, struct smb_hdr *pTargetSMB)
265 266 267 268 269 270 271
{
	struct smb_t2_rsp *pSMB2 = (struct smb_t2_rsp *)psecond;
	struct smb_t2_rsp *pSMBt  = (struct smb_t2_rsp *)pTargetSMB;
	int total_data_size;
	int total_in_buf;
	int remaining;
	int total_in_buf2;
S
Steve French 已提交
272 273
	char *data_area_of_target;
	char *data_area_of_buf2;
274 275 276 277
	__u16 byte_count;

	total_data_size = le16_to_cpu(pSMBt->t2_rsp.TotalDataCount);

S
Steve French 已提交
278
	if (total_data_size != le16_to_cpu(pSMB2->t2_rsp.TotalDataCount)) {
279
		cFYI(1, "total data size of primary and secondary t2 differ");
280 281 282 283 284
	}

	total_in_buf = le16_to_cpu(pSMBt->t2_rsp.DataCount);

	remaining = total_data_size - total_in_buf;
285

S
Steve French 已提交
286
	if (remaining < 0)
287 288
		return -EINVAL;

S
Steve French 已提交
289
	if (remaining == 0) /* nothing to do, ignore */
290
		return 0;
291

292
	total_in_buf2 = le16_to_cpu(pSMB2->t2_rsp.DataCount);
S
Steve French 已提交
293
	if (remaining < total_in_buf2) {
294
		cFYI(1, "transact2 2nd response contains too much data");
295 296 297
	}

	/* find end of first SMB data area */
S
Steve French 已提交
298
	data_area_of_target = (char *)&pSMBt->hdr.Protocol +
299 300 301 302
				le16_to_cpu(pSMBt->t2_rsp.DataOffset);
	/* validate target area */

	data_area_of_buf2 = (char *) &pSMB2->hdr.Protocol +
S
Steve French 已提交
303
					le16_to_cpu(pSMB2->t2_rsp.DataOffset);
304 305 306 307

	data_area_of_target += total_in_buf;

	/* copy second buffer into end of first buffer */
S
Steve French 已提交
308
	memcpy(data_area_of_target, data_area_of_buf2, total_in_buf2);
309 310 311 312 313 314
	total_in_buf += total_in_buf2;
	pSMBt->t2_rsp.DataCount = cpu_to_le16(total_in_buf);
	byte_count = le16_to_cpu(BCC_LE(pTargetSMB));
	byte_count += total_in_buf2;
	BCC_LE(pTargetSMB) = cpu_to_le16(byte_count);

315
	byte_count = pTargetSMB->smb_buf_length;
316 317 318
	byte_count += total_in_buf2;

	/* BB also add check that we are not beyond maximum buffer size */
319

320
	pTargetSMB->smb_buf_length = byte_count;
321

S
Steve French 已提交
322
	if (remaining == total_in_buf2) {
323
		cFYI(1, "found the last secondary response");
324 325 326 327 328 329
		return 0; /* we are done */
	} else /* more responses to go */
		return 1;

}

L
Linus Torvalds 已提交
330 331 332 333 334 335
static int
cifs_demultiplex_thread(struct TCP_Server_Info *server)
{
	int length;
	unsigned int pdu_length, total_read;
	struct smb_hdr *smb_buffer = NULL;
336 337
	struct smb_hdr *bigbuf = NULL;
	struct smb_hdr *smallbuf = NULL;
L
Linus Torvalds 已提交
338 339 340 341 342 343 344
	struct msghdr smb_msg;
	struct kvec iov;
	struct socket *csocket = server->ssocket;
	struct list_head *tmp;
	struct cifsSesInfo *ses;
	struct task_struct *task_to_wake = NULL;
	struct mid_q_entry *mid_entry;
345
	char temp;
346 347
	bool isLargeBuf = false;
	bool isMultiRsp;
348
	int reconnect;
L
Linus Torvalds 已提交
349 350

	current->flags |= PF_MEMALLOC;
351
	cFYI(1, "Demultiplex PID: %d", task_pid_nr(current));
352 353 354

	length = atomic_inc_return(&tcpSesAllocCount);
	if (length > 1)
355 356
		mempool_resize(cifs_req_poolp, length + cifs_min_rcv,
				GFP_KERNEL);
L
Linus Torvalds 已提交
357

358
	set_freezable();
359
	while (server->tcpStatus != CifsExiting) {
360 361
		if (try_to_freeze())
			continue;
362 363
		if (bigbuf == NULL) {
			bigbuf = cifs_buf_get();
364
			if (!bigbuf) {
365
				cERROR(1, "No memory for large SMB response");
366 367 368 369
				msleep(3000);
				/* retry will check if exiting */
				continue;
			}
370 371
		} else if (isLargeBuf) {
			/* we are reusing a dirty large buf, clear its start */
372
			memset(bigbuf, 0, sizeof(struct smb_hdr));
L
Linus Torvalds 已提交
373
		}
374 375 376

		if (smallbuf == NULL) {
			smallbuf = cifs_small_buf_get();
377
			if (!smallbuf) {
378
				cERROR(1, "No memory for SMB response");
379 380 381 382 383 384
				msleep(1000);
				/* retry will check if exiting */
				continue;
			}
			/* beginning of smb buffer is cleared in our buf_get */
		} else /* if existing small buf clear beginning */
385
			memset(smallbuf, 0, sizeof(struct smb_hdr));
386

387 388
		isLargeBuf = false;
		isMultiRsp = false;
389
		smb_buffer = smallbuf;
L
Linus Torvalds 已提交
390 391 392 393
		iov.iov_base = smb_buffer;
		iov.iov_len = 4;
		smb_msg.msg_control = NULL;
		smb_msg.msg_controllen = 0;
394 395
		pdu_length = 4; /* enough to get RFC1001 header */
incomplete_rcv:
L
Linus Torvalds 已提交
396 397
		length =
		    kernel_recvmsg(csocket, &smb_msg,
398
				&iov, 1, pdu_length, 0 /* BB other flags? */);
L
Linus Torvalds 已提交
399

400
		if (server->tcpStatus == CifsExiting) {
L
Linus Torvalds 已提交
401 402
			break;
		} else if (server->tcpStatus == CifsNeedReconnect) {
403
			cFYI(1, "Reconnect after server stopped responding");
L
Linus Torvalds 已提交
404
			cifs_reconnect(server);
405
			cFYI(1, "call to reconnect done");
L
Linus Torvalds 已提交
406 407
			csocket = server->ssocket;
			continue;
408 409 410
		} else if (length == -ERESTARTSYS ||
			   length == -EAGAIN ||
			   length == -EINTR) {
411
			msleep(1); /* minimum sleep to prevent looping
L
Linus Torvalds 已提交
412 413
				allowing socket to clear and app threads to set
				tcpStatus CifsNeedReconnect if server hung */
414 415 416 417 418 419
			if (pdu_length < 4) {
				iov.iov_base = (4 - pdu_length) +
							(char *)smb_buffer;
				iov.iov_len = pdu_length;
				smb_msg.msg_control = NULL;
				smb_msg.msg_controllen = 0;
420
				goto incomplete_rcv;
421
			} else
422
				continue;
L
Linus Torvalds 已提交
423
		} else if (length <= 0) {
424 425
			cFYI(1, "Reconnect after unexpected peek error %d",
				length);
L
Linus Torvalds 已提交
426 427 428 429
			cifs_reconnect(server);
			csocket = server->ssocket;
			wake_up(&server->response_q);
			continue;
430
		} else if (length < pdu_length) {
431 432
			cFYI(1, "requested %d bytes but only got %d bytes",
				  pdu_length, length);
433 434 435
			pdu_length -= length;
			msleep(1);
			goto incomplete_rcv;
436
		}
L
Linus Torvalds 已提交
437

438 439
		/* The right amount was read from socket - 4 bytes */
		/* so we can now interpret the length field */
440

441 442 443 444
		/* the first byte big endian of the length field,
		is actually not part of the length but the type
		with the most common, zero, as regular data */
		temp = *((char *) smb_buffer);
445

S
Steve French 已提交
446
		/* Note that FC 1001 length is big endian on the wire,
447 448
		but we convert it here so it is always manipulated
		as host byte order */
449
		pdu_length = be32_to_cpu((__force __be32)smb_buffer->smb_buf_length);
450 451
		smb_buffer->smb_buf_length = pdu_length;

452
		cFYI(1, "rfc1002 length 0x%x", pdu_length+4);
453

454
		if (temp == (char) RFC1002_SESSION_KEEP_ALIVE) {
S
Steve French 已提交
455
			continue;
456
		} else if (temp == (char)RFC1002_POSITIVE_SESSION_RESPONSE) {
457
			cFYI(1, "Good RFC 1002 session rsp");
458
			continue;
459
		} else if (temp == (char)RFC1002_NEGATIVE_SESSION_RESPONSE) {
S
Steve French 已提交
460
			/* we get this from Windows 98 instead of
461
			   an error on SMB negprot response */
462 463
			cFYI(1, "Negative RFC1002 Session Response Error 0x%x)",
				pdu_length);
464 465 466 467 468 469 470
			/* give server a second to clean up  */
			msleep(1000);
			/* always try 445 first on reconnect since we get NACK
			 * on some if we ever connected to port 139 (the NACK
			 * is since we do not begin with RFC1001 session
			 * initialize frame)
			 */
471 472
			cifs_set_port((struct sockaddr *)
					&server->addr.sockAddr, CIFS_PORT);
473 474 475 476
			cifs_reconnect(server);
			csocket = server->ssocket;
			wake_up(&server->response_q);
			continue;
477
		} else if (temp != (char) 0) {
478
			cERROR(1, "Unknown RFC 1002 frame");
479 480
			cifs_dump_mem(" Received Data: ", (char *)smb_buffer,
				      length);
481 482 483
			cifs_reconnect(server);
			csocket = server->ssocket;
			continue;
484 485 486
		}

		/* else we have an SMB response */
S
Steve French 已提交
487
		if ((pdu_length > CIFSMaxBufSize + MAX_CIFS_HDR_SIZE - 4) ||
488
			    (pdu_length < sizeof(struct smb_hdr) - 1 - 4)) {
489 490
			cERROR(1, "Invalid size SMB length %d pdu_length %d",
					length, pdu_length+4);
491 492 493 494
			cifs_reconnect(server);
			csocket = server->ssocket;
			wake_up(&server->response_q);
			continue;
S
Steve French 已提交
495
		}
496 497 498 499

		/* else length ok */
		reconnect = 0;

S
Steve French 已提交
500
		if (pdu_length > MAX_CIFS_SMALL_BUFFER_SIZE - 4) {
501
			isLargeBuf = true;
502 503 504 505 506 507
			memcpy(bigbuf, smallbuf, 4);
			smb_buffer = bigbuf;
		}
		length = 0;
		iov.iov_base = 4 + (char *)smb_buffer;
		iov.iov_len = pdu_length;
S
Steve French 已提交
508
		for (total_read = 0; total_read < pdu_length;
509 510 511
		     total_read += length) {
			length = kernel_recvmsg(csocket, &smb_msg, &iov, 1,
						pdu_length - total_read, 0);
512
			if (server->tcpStatus == CifsExiting) {
513 514 515 516
				/* then will exit */
				reconnect = 2;
				break;
			} else if (server->tcpStatus == CifsNeedReconnect) {
517 518
				cifs_reconnect(server);
				csocket = server->ssocket;
S
Steve French 已提交
519
				/* Reconnect wakes up rspns q */
520 521 522
				/* Now we will reread sock */
				reconnect = 1;
				break;
523 524 525
			} else if (length == -ERESTARTSYS ||
				   length == -EAGAIN ||
				   length == -EINTR) {
526
				msleep(1); /* minimum sleep to prevent looping,
S
Steve French 已提交
527
					      allowing socket to clear and app
528 529
					      threads to set tcpStatus
					      CifsNeedReconnect if server hung*/
530
				length = 0;
531
				continue;
532
			} else if (length <= 0) {
533 534
				cERROR(1, "Received no data, expecting %d",
					      pdu_length - total_read);
535 536 537 538
				cifs_reconnect(server);
				csocket = server->ssocket;
				reconnect = 1;
				break;
539
			}
540
		}
S
Steve French 已提交
541
		if (reconnect == 2)
542
			break;
S
Steve French 已提交
543
		else if (reconnect == 1)
544
			continue;
L
Linus Torvalds 已提交
545

546
		length += 4; /* account for rfc1002 hdr */
547

548

549
		dump_smb(smb_buffer, length);
550
		if (checkSMB(smb_buffer, smb_buffer->Mid, total_read+4)) {
551
			cifs_dump_mem("Bad SMB: ", smb_buffer, 48);
552 553
			continue;
		}
L
Linus Torvalds 已提交
554

555 556 557 558 559 560

		task_to_wake = NULL;
		spin_lock(&GlobalMid_Lock);
		list_for_each(tmp, &server->pending_mid_q) {
			mid_entry = list_entry(tmp, struct mid_q_entry, qhead);

561
			if ((mid_entry->mid == smb_buffer->Mid) &&
562 563
			    (mid_entry->midState == MID_REQUEST_SUBMITTED) &&
			    (mid_entry->command == smb_buffer->Command)) {
S
Steve French 已提交
564
				if (check2ndT2(smb_buffer,server->maxBuf) > 0) {
565
					/* We have a multipart transact2 resp */
566
					isMultiRsp = true;
S
Steve French 已提交
567
					if (mid_entry->resp_buf) {
568
						/* merge response - fix up 1st*/
569
						if (coalesce_t2(smb_buffer,
570
							mid_entry->resp_buf)) {
571 572
							mid_entry->multiRsp =
								 true;
573 574 575
							break;
						} else {
							/* all parts received */
576 577
							mid_entry->multiEnd =
								 true;
578
							goto multi_t2_fnd;
579 580
						}
					} else {
S
Steve French 已提交
581
						if (!isLargeBuf) {
582
							cERROR(1, "1st trans2 resp needs bigbuf");
583
					/* BB maybe we can fix this up,  switch
584
					   to already allocated large buffer? */
585
						} else {
586
							/* Have first buffer */
587 588
							mid_entry->resp_buf =
								 smb_buffer;
589 590
							mid_entry->largeBuf =
								 true;
591 592 593 594
							bigbuf = NULL;
						}
					}
					break;
595
				}
596
				mid_entry->resp_buf = smb_buffer;
597
				mid_entry->largeBuf = isLargeBuf;
598 599 600
multi_t2_fnd:
				task_to_wake = mid_entry->tsk;
				mid_entry->midState = MID_RESPONSE_RECEIVED;
S
Steve French 已提交
601 602 603
#ifdef CONFIG_CIFS_STATS2
				mid_entry->when_received = jiffies;
#endif
604 605 606 607
				/* so we do not time out requests to  server
				which is still responding (since server could
				be busy but not dead) */
				server->lstrp = jiffies;
608
				break;
609
			}
L
Linus Torvalds 已提交
610
		}
611 612
		spin_unlock(&GlobalMid_Lock);
		if (task_to_wake) {
613
			/* Was previous buf put in mpx struct for multi-rsp? */
S
Steve French 已提交
614
			if (!isMultiRsp) {
615
				/* smb buffer will be freed by user thread */
616
				if (isLargeBuf)
617
					bigbuf = NULL;
618
				else
619 620
					smallbuf = NULL;
			}
621
			wake_up_process(task_to_wake);
622 623
		} else if (!is_valid_oplock_break(smb_buffer, server) &&
			   !isMultiRsp) {
624 625
			cERROR(1, "No task to wake, unknown frame received! "
				   "NumMids %d", midCount.counter);
626
			cifs_dump_mem("Received Data is: ", (char *)smb_buffer,
627
				      sizeof(struct smb_hdr));
628 629 630 631
#ifdef CONFIG_CIFS_DEBUG2
			cifs_dump_detail(smb_buffer);
			cifs_dump_mids(server);
#endif /* CIFS_DEBUG2 */
632

633 634 635
		}
	} /* end while !EXITING */

636 637 638 639 640
	/* take it off the list, if it's not already */
	write_lock(&cifs_tcp_ses_lock);
	list_del_init(&server->tcp_ses_list);
	write_unlock(&cifs_tcp_ses_lock);

L
Linus Torvalds 已提交
641 642
	spin_lock(&GlobalMid_Lock);
	server->tcpStatus = CifsExiting;
643
	spin_unlock(&GlobalMid_Lock);
644
	wake_up_all(&server->response_q);
645

646 647 648
	/* check if we have blocked requests that need to free */
	/* Note that cifs_max_pending is normally 50, but
	can be set at module install time to as little as two */
649
	spin_lock(&GlobalMid_Lock);
S
Steve French 已提交
650
	if (atomic_read(&server->inFlight) >= cifs_max_pending)
651 652 653
		atomic_set(&server->inFlight, cifs_max_pending - 1);
	/* We do not want to set the max_pending too low or we
	could end up with the counter going negative */
L
Linus Torvalds 已提交
654
	spin_unlock(&GlobalMid_Lock);
655
	/* Although there should not be any requests blocked on
L
Linus Torvalds 已提交
656
	this queue it can not hurt to be paranoid and try to wake up requests
657
	that may haven been blocked when more than 50 at time were on the wire
L
Linus Torvalds 已提交
658 659 660 661
	to the same server - they now will see the session is in exit state
	and get out of SendReceive.  */
	wake_up_all(&server->request_q);
	/* give those requests time to exit */
662
	msleep(125);
663

S
Steve French 已提交
664
	if (server->ssocket) {
L
Linus Torvalds 已提交
665 666 667
		sock_release(csocket);
		server->ssocket = NULL;
	}
668
	/* buffer usuallly freed in free_mid - need to free it here on exit */
669 670
	cifs_buf_release(bigbuf);
	if (smallbuf) /* no sense logging a debug message if NULL */
671
		cifs_small_buf_release(smallbuf);
L
Linus Torvalds 已提交
672

673 674 675 676 677
	/*
	 * BB: we shouldn't have to do any of this. It shouldn't be
	 * possible to exit from the thread with active SMB sessions
	 */
	read_lock(&cifs_tcp_ses_lock);
L
Linus Torvalds 已提交
678
	if (list_empty(&server->pending_mid_q)) {
679 680
		/* loop through server session structures attached to this and
		    mark them dead */
681 682 683 684 685
		list_for_each(tmp, &server->smb_ses_list) {
			ses = list_entry(tmp, struct cifsSesInfo,
					 smb_ses_list);
			ses->status = CifsExiting;
			ses->server = NULL;
L
Linus Torvalds 已提交
686
		}
687
		read_unlock(&cifs_tcp_ses_lock);
L
Linus Torvalds 已提交
688
	} else {
689 690 691
		/* although we can not zero the server struct pointer yet,
		since there are active requests which may depnd on them,
		mark the corresponding SMB sessions as exiting too */
692
		list_for_each(tmp, &server->smb_ses_list) {
693
			ses = list_entry(tmp, struct cifsSesInfo,
694 695
					 smb_ses_list);
			ses->status = CifsExiting;
696 697
		}

L
Linus Torvalds 已提交
698 699 700 701
		spin_lock(&GlobalMid_Lock);
		list_for_each(tmp, &server->pending_mid_q) {
		mid_entry = list_entry(tmp, struct mid_q_entry, qhead);
			if (mid_entry->midState == MID_REQUEST_SUBMITTED) {
702 703
				cFYI(1, "Clearing Mid 0x%x - waking up ",
					 mid_entry->mid);
L
Linus Torvalds 已提交
704
				task_to_wake = mid_entry->tsk;
705
				if (task_to_wake)
L
Linus Torvalds 已提交
706 707 708 709
					wake_up_process(task_to_wake);
			}
		}
		spin_unlock(&GlobalMid_Lock);
710
		read_unlock(&cifs_tcp_ses_lock);
L
Linus Torvalds 已提交
711
		/* 1/8th of sec is more than enough time for them to exit */
712
		msleep(125);
L
Linus Torvalds 已提交
713 714
	}

715
	if (!list_empty(&server->pending_mid_q)) {
716
		/* mpx threads have not exited yet give them
L
Linus Torvalds 已提交
717
		at least the smb send timeout time for long ops */
718 719 720 721
		/* due to delays on oplock break requests, we need
		to wait at least 45 seconds before giving up
		on a request getting a response and going ahead
		and killing cifsd */
722
		cFYI(1, "Wait for exit from demultiplex thread");
723
		msleep(46000);
L
Linus Torvalds 已提交
724 725 726 727
		/* if threads still have not exited they are probably never
		coming home not much else we can do but free the memory */
	}

728 729
	/* last chance to mark ses pointers invalid
	if there are any pointing to this (e.g
730
	if a crazy root user tried to kill cifsd
731
	kernel thread explicitly this might happen) */
732 733 734 735 736
	/* BB: This shouldn't be necessary, see above */
	read_lock(&cifs_tcp_ses_lock);
	list_for_each(tmp, &server->smb_ses_list) {
		ses = list_entry(tmp, struct cifsSesInfo, smb_ses_list);
		ses->server = NULL;
737
	}
738
	read_unlock(&cifs_tcp_ses_lock);
739

740
	kfree(server->hostname);
741
	task_to_wake = xchg(&server->tsk, NULL);
742
	kfree(server);
743 744

	length = atomic_dec_return(&tcpSesAllocCount);
745 746 747
	if (length  > 0)
		mempool_resize(cifs_req_poolp, length + cifs_min_rcv,
				GFP_KERNEL);
748

749 750 751 752 753 754 755 756 757 758
	/* if server->tsk was NULL then wait for a signal before exiting */
	if (!task_to_wake) {
		set_current_state(TASK_INTERRUPTIBLE);
		while (!signal_pending(current)) {
			schedule();
			set_current_state(TASK_INTERRUPTIBLE);
		}
		set_current_state(TASK_RUNNING);
	}

759
	module_put_and_exit(0);
L
Linus Torvalds 已提交
760 761
}

762 763 764 765 766 767 768 769 770 771 772 773 774 775 776 777 778 779 780 781 782 783 784 785 786 787 788 789
/* extract the host portion of the UNC string */
static char *
extract_hostname(const char *unc)
{
	const char *src;
	char *dst, *delim;
	unsigned int len;

	/* skip double chars at beginning of string */
	/* BB: check validity of these bytes? */
	src = unc + 2;

	/* delimiter between hostname and sharename is always '\\' now */
	delim = strchr(src, '\\');
	if (!delim)
		return ERR_PTR(-EINVAL);

	len = delim - src;
	dst = kmalloc((len + 1), GFP_KERNEL);
	if (dst == NULL)
		return ERR_PTR(-ENOMEM);

	memcpy(dst, src, len);
	dst[len] = '\0';

	return dst;
}

L
Linus Torvalds 已提交
790
static int
791 792
cifs_parse_mount_options(char *options, const char *devname,
			 struct smb_vol *vol)
L
Linus Torvalds 已提交
793 794 795 796 797
{
	char *value;
	char *data;
	unsigned int  temp_len, i, j;
	char separator[2];
798 799 800 801
	short int override_uid = -1;
	short int override_gid = -1;
	bool uid_specified = false;
	bool gid_specified = false;
L
Linus Torvalds 已提交
802 803

	separator[0] = ',';
804
	separator[1] = 0;
L
Linus Torvalds 已提交
805

806
	if (Local_System_Name[0] != 0)
807
		memcpy(vol->source_rfc1001_name, Local_System_Name, 15);
808
	else {
809
		char *nodename = utsname()->nodename;
810 811 812
		int n = strnlen(nodename, 15);
		memset(vol->source_rfc1001_name, 0x20, 15);
		for (i = 0; i < n; i++) {
813 814 815
			/* does not have to be perfect mapping since field is
			informational, only used for servers that do not support
			port 445 and it can be overridden at mount time */
816
			vol->source_rfc1001_name[i] = toupper(nodename[i]);
817
		}
L
Linus Torvalds 已提交
818 819
	}
	vol->source_rfc1001_name[15] = 0;
820 821 822
	/* null target name indicates to use *SMBSERVR default called name
	   if we end up sending RFC1001 session initialize */
	vol->target_rfc1001_name[0] = 0;
823 824
	vol->cred_uid = current_uid();
	vol->linux_uid = current_uid();
825
	vol->linux_gid = current_gid();
826 827 828

	/* default to only allowing write access to owner of the mount */
	vol->dir_mode = vol->file_mode = S_IRUGO | S_IXUGO | S_IWUSR;
L
Linus Torvalds 已提交
829 830

	/* vol->retry default is 0 (i.e. "soft" limited retry not hard retry) */
831 832
	/* default is always to request posix paths. */
	vol->posix_paths = 1;
833 834
	/* default to using server inode numbers where available */
	vol->server_ino = 1;
835

L
Linus Torvalds 已提交
836 837 838
	if (!options)
		return 1;

839
	if (strncmp(options, "sep=", 4) == 0) {
S
Steve French 已提交
840
		if (options[4] != 0) {
L
Linus Torvalds 已提交
841 842 843
			separator[0] = options[4];
			options += 5;
		} else {
844
			cFYI(1, "Null separator not allowed");
L
Linus Torvalds 已提交
845 846
		}
	}
847

L
Linus Torvalds 已提交
848 849 850 851 852 853
	while ((data = strsep(&options, separator)) != NULL) {
		if (!*data)
			continue;
		if ((value = strchr(data, '=')) != NULL)
			*value++ = '\0';

854 855
		/* Have to parse this before we parse for "user" */
		if (strnicmp(data, "user_xattr", 10) == 0) {
L
Linus Torvalds 已提交
856
			vol->no_xattr = 0;
857
		} else if (strnicmp(data, "nouser_xattr", 12) == 0) {
L
Linus Torvalds 已提交
858 859
			vol->no_xattr = 1;
		} else if (strnicmp(data, "user", 4) == 0) {
S
Steve French 已提交
860
			if (!value) {
L
Linus Torvalds 已提交
861 862 863
				printk(KERN_WARNING
				       "CIFS: invalid or missing username\n");
				return 1;	/* needs_arg; */
S
Steve French 已提交
864
			} else if (!*value) {
S
Steve French 已提交
865 866
				/* null user, ie anonymous, authentication */
				vol->nullauth = 1;
L
Linus Torvalds 已提交
867 868 869 870 871 872 873 874 875 876 877
			}
			if (strnlen(value, 200) < 200) {
				vol->username = value;
			} else {
				printk(KERN_WARNING "CIFS: username too long\n");
				return 1;
			}
		} else if (strnicmp(data, "pass", 4) == 0) {
			if (!value) {
				vol->password = NULL;
				continue;
S
Steve French 已提交
878
			} else if (value[0] == 0) {
L
Linus Torvalds 已提交
879 880 881 882
				/* check if string begins with double comma
				   since that would mean the password really
				   does start with a comma, and would not
				   indicate an empty string */
S
Steve French 已提交
883
				if (value[1] != separator[0]) {
L
Linus Torvalds 已提交
884 885 886 887 888 889 890 891
					vol->password = NULL;
					continue;
				}
			}
			temp_len = strlen(value);
			/* removed password length check, NTLM passwords
				can be arbitrarily long */

892
			/* if comma in password, the string will be
L
Linus Torvalds 已提交
893 894 895 896 897 898 899 900 901
			prematurely null terminated.  Commas in password are
			specified across the cifs mount interface by a double
			comma ie ,, and a comma used as in other cases ie ','
			as a parameter delimiter/separator is single and due
			to the strsep above is temporarily zeroed. */

			/* NB: password legally can have multiple commas and
			the only illegal character in a password is null */

902
			if ((value[temp_len] == 0) &&
903
			    (value[temp_len+1] == separator[0])) {
L
Linus Torvalds 已提交
904 905
				/* reinsert comma */
				value[temp_len] = separator[0];
906 907
				temp_len += 2;  /* move after second comma */
				while (value[temp_len] != 0)  {
L
Linus Torvalds 已提交
908
					if (value[temp_len] == separator[0]) {
909
						if (value[temp_len+1] ==
910 911 912
						     separator[0]) {
						/* skip second comma */
							temp_len++;
913
						} else {
L
Linus Torvalds 已提交
914 915 916 917 918 919 920
						/* single comma indicating start
							 of next parm */
							break;
						}
					}
					temp_len++;
				}
S
Steve French 已提交
921
				if (value[temp_len] == 0) {
L
Linus Torvalds 已提交
922 923 924 925 926 927
					options = NULL;
				} else {
					value[temp_len] = 0;
					/* point option to start of next parm */
					options = value + temp_len + 1;
				}
928
				/* go from value to value + temp_len condensing
L
Linus Torvalds 已提交
929 930
				double commas to singles. Note that this ends up
				allocating a few bytes too many, which is ok */
931
				vol->password = kzalloc(temp_len, GFP_KERNEL);
S
Steve French 已提交
932
				if (vol->password == NULL) {
933 934
					printk(KERN_WARNING "CIFS: no memory "
							    "for password\n");
935 936
					return 1;
				}
937
				for (i = 0, j = 0; i < temp_len; i++, j++) {
L
Linus Torvalds 已提交
938
					vol->password[j] = value[i];
S
Steve French 已提交
939
					if (value[i] == separator[0]
940
						&& value[i+1] == separator[0]) {
L
Linus Torvalds 已提交
941 942 943 944 945 946
						/* skip second comma */
						i++;
					}
				}
				vol->password[j] = 0;
			} else {
947
				vol->password = kzalloc(temp_len+1, GFP_KERNEL);
S
Steve French 已提交
948
				if (vol->password == NULL) {
949 950
					printk(KERN_WARNING "CIFS: no memory "
							    "for password\n");
951 952
					return 1;
				}
L
Linus Torvalds 已提交
953 954
				strcpy(vol->password, value);
			}
955 956
		} else if (!strnicmp(data, "ip", 2) ||
			   !strnicmp(data, "addr", 4)) {
L
Linus Torvalds 已提交
957 958
			if (!value || !*value) {
				vol->UNCip = NULL;
959 960
			} else if (strnlen(value, INET6_ADDRSTRLEN) <
							INET6_ADDRSTRLEN) {
L
Linus Torvalds 已提交
961 962
				vol->UNCip = value;
			} else {
963 964
				printk(KERN_WARNING "CIFS: ip address "
						    "too long\n");
L
Linus Torvalds 已提交
965 966
				return 1;
			}
967 968
		} else if (strnicmp(data, "sec", 3) == 0) {
			if (!value || !*value) {
969
				cERROR(1, "no security value specified");
970 971 972
				continue;
			} else if (strnicmp(value, "krb5i", 5) == 0) {
				vol->secFlg |= CIFSSEC_MAY_KRB5 |
973
					CIFSSEC_MUST_SIGN;
974
			} else if (strnicmp(value, "krb5p", 5) == 0) {
975 976
				/* vol->secFlg |= CIFSSEC_MUST_SEAL |
					CIFSSEC_MAY_KRB5; */
977
				cERROR(1, "Krb5 cifs privacy not supported");
978 979
				return 1;
			} else if (strnicmp(value, "krb5", 4) == 0) {
980
				vol->secFlg |= CIFSSEC_MAY_KRB5;
981 982 983 984 985 986 987
#ifdef CONFIG_CIFS_EXPERIMENTAL
			} else if (strnicmp(value, "ntlmsspi", 8) == 0) {
				vol->secFlg |= CIFSSEC_MAY_NTLMSSP |
					CIFSSEC_MUST_SIGN;
			} else if (strnicmp(value, "ntlmssp", 7) == 0) {
				vol->secFlg |= CIFSSEC_MAY_NTLMSSP;
#endif
988
			} else if (strnicmp(value, "ntlmv2i", 7) == 0) {
989
				vol->secFlg |= CIFSSEC_MAY_NTLMV2 |
990
					CIFSSEC_MUST_SIGN;
991
			} else if (strnicmp(value, "ntlmv2", 6) == 0) {
992
				vol->secFlg |= CIFSSEC_MAY_NTLMV2;
993
			} else if (strnicmp(value, "ntlmi", 5) == 0) {
994
				vol->secFlg |= CIFSSEC_MAY_NTLM |
995
					CIFSSEC_MUST_SIGN;
996 997
			} else if (strnicmp(value, "ntlm", 4) == 0) {
				/* ntlm is default so can be turned off too */
998
				vol->secFlg |= CIFSSEC_MAY_NTLM;
999
			} else if (strnicmp(value, "nontlm", 6) == 0) {
1000
				/* BB is there a better way to do this? */
1001
				vol->secFlg |= CIFSSEC_MAY_NTLMV2;
1002 1003
#ifdef CONFIG_CIFS_WEAK_PW_HASH
			} else if (strnicmp(value, "lanman", 6) == 0) {
1004
				vol->secFlg |= CIFSSEC_MAY_LANMAN;
1005
#endif
1006
			} else if (strnicmp(value, "none", 4) == 0) {
1007
				vol->nullauth = 1;
1008
			} else {
1009
				cERROR(1, "bad security option: %s", value);
1010 1011
				return 1;
			}
L
Linus Torvalds 已提交
1012 1013 1014 1015
		} else if ((strnicmp(data, "unc", 3) == 0)
			   || (strnicmp(data, "target", 6) == 0)
			   || (strnicmp(data, "path", 4) == 0)) {
			if (!value || !*value) {
1016 1017
				printk(KERN_WARNING "CIFS: invalid path to "
						    "network resource\n");
L
Linus Torvalds 已提交
1018 1019 1020
				return 1;	/* needs_arg; */
			}
			if ((temp_len = strnlen(value, 300)) < 300) {
1021
				vol->UNC = kmalloc(temp_len+1, GFP_KERNEL);
1022
				if (vol->UNC == NULL)
L
Linus Torvalds 已提交
1023
					return 1;
1024
				strcpy(vol->UNC, value);
L
Linus Torvalds 已提交
1025 1026 1027
				if (strncmp(vol->UNC, "//", 2) == 0) {
					vol->UNC[0] = '\\';
					vol->UNC[1] = '\\';
1028
				} else if (strncmp(vol->UNC, "\\\\", 2) != 0) {
L
Linus Torvalds 已提交
1029
					printk(KERN_WARNING
1030 1031
					       "CIFS: UNC Path does not begin "
					       "with // or \\\\ \n");
L
Linus Torvalds 已提交
1032 1033 1034 1035 1036 1037 1038 1039 1040 1041 1042 1043 1044 1045
					return 1;
				}
			} else {
				printk(KERN_WARNING "CIFS: UNC name too long\n");
				return 1;
			}
		} else if ((strnicmp(data, "domain", 3) == 0)
			   || (strnicmp(data, "workgroup", 5) == 0)) {
			if (!value || !*value) {
				printk(KERN_WARNING "CIFS: invalid domain name\n");
				return 1;	/* needs_arg; */
			}
			/* BB are there cases in which a comma can be valid in
			a domain name and need special handling? */
1046
			if (strnlen(value, 256) < 256) {
L
Linus Torvalds 已提交
1047
				vol->domainname = value;
1048
				cFYI(1, "Domain name set");
L
Linus Torvalds 已提交
1049
			} else {
1050 1051
				printk(KERN_WARNING "CIFS: domain name too "
						    "long\n");
L
Linus Torvalds 已提交
1052 1053
				return 1;
			}
1054 1055 1056 1057 1058 1059 1060 1061 1062 1063 1064 1065 1066 1067 1068 1069
		} else if (strnicmp(data, "srcaddr", 7) == 0) {
			vol->srcaddr.ss_family = AF_UNSPEC;

			if (!value || !*value) {
				printk(KERN_WARNING "CIFS: srcaddr value"
				       " not specified.\n");
				return 1;	/* needs_arg; */
			}
			i = cifs_convert_address((struct sockaddr *)&vol->srcaddr,
						 value, strlen(value));
			if (i < 0) {
				printk(KERN_WARNING "CIFS:  Could not parse"
				       " srcaddr: %s\n",
				       value);
				return 1;
			}
1070 1071 1072 1073 1074 1075 1076
		} else if (strnicmp(data, "prefixpath", 10) == 0) {
			if (!value || !*value) {
				printk(KERN_WARNING
					"CIFS: invalid path prefix\n");
				return 1;       /* needs_argument */
			}
			if ((temp_len = strnlen(value, 1024)) < 1024) {
1077
				if (value[0] != '/')
1078
					temp_len++;  /* missing leading slash */
1079 1080 1081
				vol->prepath = kmalloc(temp_len+1, GFP_KERNEL);
				if (vol->prepath == NULL)
					return 1;
1082
				if (value[0] != '/') {
1083
					vol->prepath[0] = '/';
1084
					strcpy(vol->prepath+1, value);
1085
				} else
1086
					strcpy(vol->prepath, value);
1087
				cFYI(1, "prefix path %s", vol->prepath);
1088 1089 1090 1091
			} else {
				printk(KERN_WARNING "CIFS: prefix too long\n");
				return 1;
			}
L
Linus Torvalds 已提交
1092 1093
		} else if (strnicmp(data, "iocharset", 9) == 0) {
			if (!value || !*value) {
1094 1095
				printk(KERN_WARNING "CIFS: invalid iocharset "
						    "specified\n");
L
Linus Torvalds 已提交
1096 1097 1098
				return 1;	/* needs_arg; */
			}
			if (strnlen(value, 65) < 65) {
1099
				if (strnicmp(value, "default", 7))
L
Linus Torvalds 已提交
1100
					vol->iocharset = value;
1101 1102
				/* if iocharset not set then load_nls_default
				   is used by caller */
1103
				cFYI(1, "iocharset set to %s", value);
L
Linus Torvalds 已提交
1104
			} else {
1105 1106
				printk(KERN_WARNING "CIFS: iocharset name "
						    "too long.\n");
L
Linus Torvalds 已提交
1107 1108
				return 1;
			}
1109 1110 1111 1112 1113 1114 1115 1116 1117 1118 1119 1120 1121 1122
		} else if (!strnicmp(data, "uid", 3) && value && *value) {
			vol->linux_uid = simple_strtoul(value, &value, 0);
			uid_specified = true;
		} else if (!strnicmp(data, "forceuid", 8)) {
			override_uid = 1;
		} else if (!strnicmp(data, "noforceuid", 10)) {
			override_uid = 0;
		} else if (!strnicmp(data, "gid", 3) && value && *value) {
			vol->linux_gid = simple_strtoul(value, &value, 0);
			gid_specified = true;
		} else if (!strnicmp(data, "forcegid", 8)) {
			override_gid = 1;
		} else if (!strnicmp(data, "noforcegid", 10)) {
			override_gid = 0;
L
Linus Torvalds 已提交
1123 1124 1125 1126 1127 1128 1129 1130 1131 1132 1133 1134 1135 1136 1137 1138 1139 1140 1141 1142 1143 1144 1145 1146 1147 1148 1149 1150 1151 1152 1153
		} else if (strnicmp(data, "file_mode", 4) == 0) {
			if (value && *value) {
				vol->file_mode =
					simple_strtoul(value, &value, 0);
			}
		} else if (strnicmp(data, "dir_mode", 4) == 0) {
			if (value && *value) {
				vol->dir_mode =
					simple_strtoul(value, &value, 0);
			}
		} else if (strnicmp(data, "dirmode", 4) == 0) {
			if (value && *value) {
				vol->dir_mode =
					simple_strtoul(value, &value, 0);
			}
		} else if (strnicmp(data, "port", 4) == 0) {
			if (value && *value) {
				vol->port =
					simple_strtoul(value, &value, 0);
			}
		} else if (strnicmp(data, "rsize", 5) == 0) {
			if (value && *value) {
				vol->rsize =
					simple_strtoul(value, &value, 0);
			}
		} else if (strnicmp(data, "wsize", 5) == 0) {
			if (value && *value) {
				vol->wsize =
					simple_strtoul(value, &value, 0);
			}
		} else if (strnicmp(data, "sockopt", 5) == 0) {
1154
			if (!value || !*value) {
1155
				cERROR(1, "no socket option specified");
1156 1157 1158
				continue;
			} else if (strnicmp(value, "TCP_NODELAY", 11) == 0) {
				vol->sockopt_tcp_nodelay = 1;
L
Linus Torvalds 已提交
1159 1160 1161
			}
		} else if (strnicmp(data, "netbiosname", 4) == 0) {
			if (!value || !*value || (*value == ' ')) {
1162
				cFYI(1, "invalid (empty) netbiosname");
L
Linus Torvalds 已提交
1163
			} else {
1164 1165 1166
				memset(vol->source_rfc1001_name, 0x20, 15);
				for (i = 0; i < 15; i++) {
				/* BB are there cases in which a comma can be
L
Linus Torvalds 已提交
1167 1168 1169 1170
				valid in this workstation netbios name (and need
				special handling)? */

				/* We do not uppercase netbiosname for user */
1171
					if (value[i] == 0)
L
Linus Torvalds 已提交
1172
						break;
1173 1174 1175
					else
						vol->source_rfc1001_name[i] =
								value[i];
L
Linus Torvalds 已提交
1176 1177 1178
				}
				/* The string has 16th byte zero still from
				set at top of the function  */
1179 1180 1181
				if ((i == 15) && (value[i] != 0))
					printk(KERN_WARNING "CIFS: netbiosname"
						" longer than 15 truncated.\n");
1182 1183 1184 1185
			}
		} else if (strnicmp(data, "servern", 7) == 0) {
			/* servernetbiosname specified override *SMBSERVER */
			if (!value || !*value || (*value == ' ')) {
1186
				cFYI(1, "empty server netbiosname specified");
1187 1188
			} else {
				/* last byte, type, is 0x20 for servr type */
1189
				memset(vol->target_rfc1001_name, 0x20, 16);
1190

1191
				for (i = 0; i < 15; i++) {
1192
				/* BB are there cases in which a comma can be
1193 1194
				   valid in this workstation netbios name
				   (and need special handling)? */
1195

1196 1197 1198
				/* user or mount helper must uppercase
				   the netbiosname */
					if (value[i] == 0)
1199 1200
						break;
					else
1201 1202
						vol->target_rfc1001_name[i] =
								value[i];
1203 1204 1205
				}
				/* The string has 16th byte zero still from
				   set at top of the function  */
1206 1207 1208
				if ((i == 15) && (value[i] != 0))
					printk(KERN_WARNING "CIFS: server net"
					"biosname longer than 15 truncated.\n");
L
Linus Torvalds 已提交
1209 1210 1211 1212 1213
			}
		} else if (strnicmp(data, "credentials", 4) == 0) {
			/* ignore */
		} else if (strnicmp(data, "version", 3) == 0) {
			/* ignore */
1214
		} else if (strnicmp(data, "guest", 5) == 0) {
L
Linus Torvalds 已提交
1215
			/* ignore */
1216 1217 1218 1219
		} else if (strnicmp(data, "rw", 2) == 0) {
			/* ignore */
		} else if (strnicmp(data, "ro", 2) == 0) {
			/* ignore */
1220 1221 1222 1223
		} else if (strnicmp(data, "noblocksend", 11) == 0) {
			vol->noblocksnd = 1;
		} else if (strnicmp(data, "noautotune", 10) == 0) {
			vol->noautotune = 1;
L
Linus Torvalds 已提交
1224 1225 1226 1227 1228 1229 1230 1231
		} else if ((strnicmp(data, "suid", 4) == 0) ||
				   (strnicmp(data, "nosuid", 6) == 0) ||
				   (strnicmp(data, "exec", 4) == 0) ||
				   (strnicmp(data, "noexec", 6) == 0) ||
				   (strnicmp(data, "nodev", 5) == 0) ||
				   (strnicmp(data, "noauto", 6) == 0) ||
				   (strnicmp(data, "dev", 3) == 0)) {
			/*  The mount tool or mount.cifs helper (if present)
1232 1233 1234 1235 1236
			    uses these opts to set flags, and the flags are read
			    by the kernel vfs layer before we get here (ie
			    before read super) so there is no point trying to
			    parse these options again and set anything and it
			    is ok to just ignore them */
L
Linus Torvalds 已提交
1237 1238 1239 1240 1241 1242 1243 1244 1245
			continue;
		} else if (strnicmp(data, "hard", 4) == 0) {
			vol->retry = 1;
		} else if (strnicmp(data, "soft", 4) == 0) {
			vol->retry = 0;
		} else if (strnicmp(data, "perm", 4) == 0) {
			vol->noperm = 0;
		} else if (strnicmp(data, "noperm", 6) == 0) {
			vol->noperm = 1;
1246 1247 1248 1249
		} else if (strnicmp(data, "mapchars", 8) == 0) {
			vol->remap = 1;
		} else if (strnicmp(data, "nomapchars", 10) == 0) {
			vol->remap = 0;
1250 1251 1252 1253
		} else if (strnicmp(data, "sfu", 3) == 0) {
			vol->sfu_emul = 1;
		} else if (strnicmp(data, "nosfu", 5) == 0) {
			vol->sfu_emul = 0;
S
Steve French 已提交
1254 1255
		} else if (strnicmp(data, "nodfs", 5) == 0) {
			vol->nodfs = 1;
1256 1257 1258 1259
		} else if (strnicmp(data, "posixpaths", 10) == 0) {
			vol->posix_paths = 1;
		} else if (strnicmp(data, "noposixpaths", 12) == 0) {
			vol->posix_paths = 0;
1260 1261 1262 1263
		} else if (strnicmp(data, "nounix", 6) == 0) {
			vol->no_linux_ext = 1;
		} else if (strnicmp(data, "nolinux", 7) == 0) {
			vol->no_linux_ext = 1;
1264
		} else if ((strnicmp(data, "nocase", 6) == 0) ||
1265
			   (strnicmp(data, "ignorecase", 10)  == 0)) {
1266
			vol->nocase = 1;
1267 1268 1269 1270 1271 1272
		} else if (strnicmp(data, "mand", 4) == 0) {
			/* ignore */
		} else if (strnicmp(data, "nomand", 6) == 0) {
			/* ignore */
		} else if (strnicmp(data, "_netdev", 7) == 0) {
			/* ignore */
1273 1274
		} else if (strnicmp(data, "brl", 3) == 0) {
			vol->nobrl =  0;
1275
		} else if ((strnicmp(data, "nobrl", 5) == 0) ||
1276
			   (strnicmp(data, "nolock", 6) == 0)) {
1277
			vol->nobrl =  1;
1278 1279 1280
			/* turn off mandatory locking in mode
			if remote locking is turned off since the
			local vfs will do advisory */
1281 1282
			if (vol->file_mode ==
				(S_IALLUGO & ~(S_ISUID | S_IXGRP)))
1283
				vol->file_mode = S_IALLUGO;
1284 1285 1286 1287 1288 1289 1290 1291 1292 1293 1294
		} else if (strnicmp(data, "forcemandatorylock", 9) == 0) {
			/* will take the shorter form "forcemand" as well */
			/* This mount option will force use of mandatory
			  (DOS/Windows style) byte range locks, instead of
			  using posix advisory byte range locks, even if the
			  Unix extensions are available and posix locks would
			  be supported otherwise. If Unix extensions are not
			  negotiated this has no effect since mandatory locks
			  would be used (mandatory locks is all that those
			  those servers support) */
			vol->mand_lock = 1;
L
Linus Torvalds 已提交
1295 1296 1297 1298
		} else if (strnicmp(data, "setuids", 7) == 0) {
			vol->setuids = 1;
		} else if (strnicmp(data, "nosetuids", 9) == 0) {
			vol->setuids = 0;
1299 1300 1301 1302
		} else if (strnicmp(data, "dynperm", 7) == 0) {
			vol->dynperm = true;
		} else if (strnicmp(data, "nodynperm", 9) == 0) {
			vol->dynperm = false;
L
Linus Torvalds 已提交
1303 1304 1305 1306 1307 1308 1309 1310
		} else if (strnicmp(data, "nohard", 6) == 0) {
			vol->retry = 0;
		} else if (strnicmp(data, "nosoft", 6) == 0) {
			vol->retry = 1;
		} else if (strnicmp(data, "nointr", 6) == 0) {
			vol->intr = 0;
		} else if (strnicmp(data, "intr", 4) == 0) {
			vol->intr = 1;
1311 1312 1313 1314
		} else if (strnicmp(data, "nostrictsync", 12) == 0) {
			vol->nostrictsync = 1;
		} else if (strnicmp(data, "strictsync", 10) == 0) {
			vol->nostrictsync = 0;
1315
		} else if (strnicmp(data, "serverino", 7) == 0) {
L
Linus Torvalds 已提交
1316
			vol->server_ino = 1;
1317
		} else if (strnicmp(data, "noserverino", 9) == 0) {
L
Linus Torvalds 已提交
1318
			vol->server_ino = 0;
1319
		} else if (strnicmp(data, "cifsacl", 7) == 0) {
1320 1321 1322
			vol->cifs_acl = 1;
		} else if (strnicmp(data, "nocifsacl", 9) == 0) {
			vol->cifs_acl = 0;
1323
		} else if (strnicmp(data, "acl", 3) == 0) {
L
Linus Torvalds 已提交
1324
			vol->no_psx_acl = 0;
1325
		} else if (strnicmp(data, "noacl", 5) == 0) {
L
Linus Torvalds 已提交
1326
			vol->no_psx_acl = 1;
S
Steve French 已提交
1327 1328 1329 1330
#ifdef CONFIG_CIFS_EXPERIMENTAL
		} else if (strnicmp(data, "locallease", 6) == 0) {
			vol->local_lease = 1;
#endif
1331
		} else if (strnicmp(data, "sign", 4) == 0) {
1332
			vol->secFlg |= CIFSSEC_MUST_SIGN;
1333 1334 1335 1336 1337 1338
		} else if (strnicmp(data, "seal", 4) == 0) {
			/* we do not do the following in secFlags because seal
			   is a per tree connection (mount) not a per socket
			   or per-smb connection option in the protocol */
			/* vol->secFlg |= CIFSSEC_MUST_SEAL; */
			vol->seal = 1;
1339
		} else if (strnicmp(data, "direct", 6) == 0) {
L
Linus Torvalds 已提交
1340
			vol->direct_io = 1;
1341
		} else if (strnicmp(data, "forcedirectio", 13) == 0) {
L
Linus Torvalds 已提交
1342 1343
			vol->direct_io = 1;
		} else if (strnicmp(data, "noac", 4) == 0) {
1344 1345 1346
			printk(KERN_WARNING "CIFS: Mount option noac not "
				"supported. Instead set "
				"/proc/fs/cifs/LookupCacheEnabled to 0\n");
1347 1348
		} else if (strnicmp(data, "fsc", 3) == 0) {
			vol->fsc = true;
1349 1350
		} else if (strnicmp(data, "mfsymlinks", 10) == 0) {
			vol->mfsymlinks = true;
J
Jeff Layton 已提交
1351 1352
		} else if (strnicmp(data, "multiuser", 8) == 0) {
			vol->multiuser = true;
L
Linus Torvalds 已提交
1353
		} else
1354 1355
			printk(KERN_WARNING "CIFS: Unknown mount option %s\n",
						data);
L
Linus Torvalds 已提交
1356 1357
	}
	if (vol->UNC == NULL) {
1358
		if (devname == NULL) {
1359 1360
			printk(KERN_WARNING "CIFS: Missing UNC name for mount "
						"target\n");
L
Linus Torvalds 已提交
1361 1362 1363
			return 1;
		}
		if ((temp_len = strnlen(devname, 300)) < 300) {
1364
			vol->UNC = kmalloc(temp_len+1, GFP_KERNEL);
1365
			if (vol->UNC == NULL)
L
Linus Torvalds 已提交
1366
				return 1;
1367
			strcpy(vol->UNC, devname);
L
Linus Torvalds 已提交
1368 1369 1370 1371
			if (strncmp(vol->UNC, "//", 2) == 0) {
				vol->UNC[0] = '\\';
				vol->UNC[1] = '\\';
			} else if (strncmp(vol->UNC, "\\\\", 2) != 0) {
1372 1373
				printk(KERN_WARNING "CIFS: UNC Path does not "
						    "begin with // or \\\\ \n");
L
Linus Torvalds 已提交
1374 1375
				return 1;
			}
1376 1377 1378
			value = strpbrk(vol->UNC+2, "/\\");
			if (value)
				*value = '\\';
L
Linus Torvalds 已提交
1379 1380 1381 1382 1383
		} else {
			printk(KERN_WARNING "CIFS: UNC name too long\n");
			return 1;
		}
	}
J
Jeff Layton 已提交
1384 1385 1386 1387 1388 1389 1390

	if (vol->multiuser && !(vol->secFlg & CIFSSEC_MAY_KRB5)) {
		cERROR(1, "Multiuser mounts currently require krb5 "
			  "authentication!");
		return 1;
	}

S
Steve French 已提交
1391
	if (vol->UNCip == NULL)
L
Linus Torvalds 已提交
1392 1393
		vol->UNCip = &vol->UNC[2];

1394 1395 1396 1397 1398 1399 1400 1401 1402 1403 1404 1405
	if (uid_specified)
		vol->override_uid = override_uid;
	else if (override_uid == 1)
		printk(KERN_NOTICE "CIFS: ignoring forceuid mount option "
				   "specified with no uid= option.\n");

	if (gid_specified)
		vol->override_gid = override_gid;
	else if (override_gid == 1)
		printk(KERN_NOTICE "CIFS: ignoring forcegid mount option "
				   "specified with no gid= option.\n");

L
Linus Torvalds 已提交
1406 1407 1408
	return 0;
}

1409 1410 1411 1412 1413 1414 1415 1416 1417 1418 1419 1420 1421 1422 1423 1424 1425 1426 1427 1428 1429 1430 1431 1432 1433 1434 1435
/** Returns true if srcaddr isn't specified and rhs isn't
 * specified, or if srcaddr is specified and
 * matches the IP address of the rhs argument.
 */
static bool
srcip_matches(struct sockaddr *srcaddr, struct sockaddr *rhs)
{
	switch (srcaddr->sa_family) {
	case AF_UNSPEC:
		return (rhs->sa_family == AF_UNSPEC);
	case AF_INET: {
		struct sockaddr_in *saddr4 = (struct sockaddr_in *)srcaddr;
		struct sockaddr_in *vaddr4 = (struct sockaddr_in *)rhs;
		return (saddr4->sin_addr.s_addr == vaddr4->sin_addr.s_addr);
	}
	case AF_INET6: {
		struct sockaddr_in6 *saddr6 = (struct sockaddr_in6 *)srcaddr;
		struct sockaddr_in6 *vaddr6 = (struct sockaddr_in6 *)&rhs;
		return ipv6_addr_equal(&saddr6->sin6_addr, &vaddr6->sin6_addr);
	}
	default:
		WARN_ON(1);
		return false; /* don't expect to be here */
	}
}


1436
static bool
1437 1438
match_address(struct TCP_Server_Info *server, struct sockaddr *addr,
	      struct sockaddr *srcaddr)
1439 1440 1441 1442 1443 1444 1445 1446 1447 1448 1449 1450 1451 1452 1453 1454 1455 1456 1457 1458 1459 1460 1461 1462 1463 1464
{
	struct sockaddr_in *addr4 = (struct sockaddr_in *)addr;
	struct sockaddr_in6 *addr6 = (struct sockaddr_in6 *)addr;

	switch (addr->sa_family) {
	case AF_INET:
		if (addr4->sin_addr.s_addr !=
		    server->addr.sockAddr.sin_addr.s_addr)
			return false;
		if (addr4->sin_port &&
		    addr4->sin_port != server->addr.sockAddr.sin_port)
			return false;
		break;
	case AF_INET6:
		if (!ipv6_addr_equal(&addr6->sin6_addr,
				     &server->addr.sockAddr6.sin6_addr))
			return false;
		if (addr6->sin6_scope_id !=
		    server->addr.sockAddr6.sin6_scope_id)
			return false;
		if (addr6->sin6_port &&
		    addr6->sin6_port != server->addr.sockAddr6.sin6_port)
			return false;
		break;
	}

1465 1466 1467
	if (!srcip_matches(srcaddr, (struct sockaddr *)&server->srcaddr))
		return false;

1468 1469 1470
	return true;
}

1471 1472 1473 1474 1475 1476 1477 1478 1479 1480 1481 1482 1483 1484 1485 1486 1487 1488 1489 1490 1491 1492 1493 1494 1495 1496 1497 1498 1499 1500 1501 1502 1503 1504 1505 1506 1507 1508 1509 1510 1511 1512 1513 1514 1515 1516 1517 1518
static bool
match_security(struct TCP_Server_Info *server, struct smb_vol *vol)
{
	unsigned int secFlags;

	if (vol->secFlg & (~(CIFSSEC_MUST_SIGN | CIFSSEC_MUST_SEAL)))
		secFlags = vol->secFlg;
	else
		secFlags = global_secflags | vol->secFlg;

	switch (server->secType) {
	case LANMAN:
		if (!(secFlags & (CIFSSEC_MAY_LANMAN|CIFSSEC_MAY_PLNTXT)))
			return false;
		break;
	case NTLMv2:
		if (!(secFlags & CIFSSEC_MAY_NTLMV2))
			return false;
		break;
	case NTLM:
		if (!(secFlags & CIFSSEC_MAY_NTLM))
			return false;
		break;
	case Kerberos:
		if (!(secFlags & CIFSSEC_MAY_KRB5))
			return false;
		break;
	case RawNTLMSSP:
		if (!(secFlags & CIFSSEC_MAY_NTLMSSP))
			return false;
		break;
	default:
		/* shouldn't happen */
		return false;
	}

	/* now check if signing mode is acceptible */
	if ((secFlags & CIFSSEC_MAY_SIGN) == 0 &&
	    (server->secMode & SECMODE_SIGN_REQUIRED))
			return false;
	else if (((secFlags & CIFSSEC_MUST_SIGN) == CIFSSEC_MUST_SIGN) &&
		 (server->secMode &
		  (SECMODE_SIGN_ENABLED|SECMODE_SIGN_REQUIRED)) == 0)
			return false;

	return true;
}

1519
static struct TCP_Server_Info *
1520
cifs_find_tcp_session(struct sockaddr *addr, struct smb_vol *vol)
L
Linus Torvalds 已提交
1521
{
1522 1523 1524
	struct TCP_Server_Info *server;

	write_lock(&cifs_tcp_ses_lock);
1525
	list_for_each_entry(server, &cifs_tcp_ses_list, tcp_ses_list) {
1526 1527
		if (!match_address(server, addr,
				   (struct sockaddr *)&vol->srcaddr))
1528
			continue;
1529

1530 1531 1532
		if (!match_security(server, vol))
			continue;

1533 1534
		++server->srv_count;
		write_unlock(&cifs_tcp_ses_lock);
1535
		cFYI(1, "Existing tcp session with server found");
1536
		return server;
L
Linus Torvalds 已提交
1537
	}
1538
	write_unlock(&cifs_tcp_ses_lock);
L
Linus Torvalds 已提交
1539 1540
	return NULL;
}
1541

1542
static void
1543
cifs_put_tcp_session(struct TCP_Server_Info *server)
L
Linus Torvalds 已提交
1544
{
1545
	struct task_struct *task;
1546

1547 1548 1549 1550
	write_lock(&cifs_tcp_ses_lock);
	if (--server->srv_count > 0) {
		write_unlock(&cifs_tcp_ses_lock);
		return;
L
Linus Torvalds 已提交
1551
	}
1552

1553 1554
	list_del_init(&server->tcp_ses_list);
	write_unlock(&cifs_tcp_ses_lock);
1555

1556 1557 1558
	spin_lock(&GlobalMid_Lock);
	server->tcpStatus = CifsExiting;
	spin_unlock(&GlobalMid_Lock);
1559

1560 1561
	cifs_fscache_release_client_cookie(server);

1562 1563 1564
	task = xchg(&server->tsk, NULL);
	if (task)
		force_sig(SIGKILL, task);
L
Linus Torvalds 已提交
1565 1566
}

1567 1568 1569 1570
static struct TCP_Server_Info *
cifs_get_tcp_session(struct smb_vol *volume_info)
{
	struct TCP_Server_Info *tcp_ses = NULL;
1571
	struct sockaddr_storage addr;
1572 1573 1574 1575
	struct sockaddr_in *sin_server = (struct sockaddr_in *) &addr;
	struct sockaddr_in6 *sin_server6 = (struct sockaddr_in6 *) &addr;
	int rc;

1576
	memset(&addr, 0, sizeof(struct sockaddr_storage));
1577

1578
	cFYI(1, "UNC: %s ip: %s", volume_info->UNC, volume_info->UNCip);
1579

1580
	if (volume_info->UNCip && volume_info->UNC) {
1581 1582
		rc = cifs_fill_sockaddr((struct sockaddr *)&addr,
					volume_info->UNCip,
1583
					strlen(volume_info->UNCip),
1584
					volume_info->port);
1585
		if (!rc) {
1586 1587 1588 1589 1590 1591 1592
			/* we failed translating address */
			rc = -EINVAL;
			goto out_err;
		}
	} else if (volume_info->UNCip) {
		/* BB using ip addr as tcp_ses name to connect to the
		   DFS root below */
1593
		cERROR(1, "Connecting to DFS root not implemented yet");
1594 1595 1596
		rc = -EINVAL;
		goto out_err;
	} else /* which tcp_sess DFS root would we conect to */ {
1597 1598
		cERROR(1, "CIFS mount error: No UNC path (e.g. -o "
			"unc=//192.168.1.100/public) specified");
1599 1600 1601 1602 1603
		rc = -EINVAL;
		goto out_err;
	}

	/* see if we already have a matching tcp_ses */
1604
	tcp_ses = cifs_find_tcp_session((struct sockaddr *)&addr, volume_info);
1605 1606 1607 1608 1609 1610 1611 1612 1613 1614 1615 1616 1617 1618 1619 1620 1621
	if (tcp_ses)
		return tcp_ses;

	tcp_ses = kzalloc(sizeof(struct TCP_Server_Info), GFP_KERNEL);
	if (!tcp_ses) {
		rc = -ENOMEM;
		goto out_err;
	}

	tcp_ses->hostname = extract_hostname(volume_info->UNC);
	if (IS_ERR(tcp_ses->hostname)) {
		rc = PTR_ERR(tcp_ses->hostname);
		goto out_err;
	}

	tcp_ses->noblocksnd = volume_info->noblocksnd;
	tcp_ses->noautotune = volume_info->noautotune;
1622
	tcp_ses->tcp_nodelay = volume_info->sockopt_tcp_nodelay;
1623 1624 1625 1626 1627 1628 1629 1630 1631 1632 1633 1634 1635 1636 1637 1638 1639 1640 1641
	atomic_set(&tcp_ses->inFlight, 0);
	init_waitqueue_head(&tcp_ses->response_q);
	init_waitqueue_head(&tcp_ses->request_q);
	INIT_LIST_HEAD(&tcp_ses->pending_mid_q);
	mutex_init(&tcp_ses->srv_mutex);
	memcpy(tcp_ses->workstation_RFC1001_name,
		volume_info->source_rfc1001_name, RFC1001_NAME_LEN_WITH_NULL);
	memcpy(tcp_ses->server_RFC1001_name,
		volume_info->target_rfc1001_name, RFC1001_NAME_LEN_WITH_NULL);
	tcp_ses->sequence_number = 0;
	INIT_LIST_HEAD(&tcp_ses->tcp_ses_list);
	INIT_LIST_HEAD(&tcp_ses->smb_ses_list);

	/*
	 * at this point we are the only ones with the pointer
	 * to the struct since the kernel thread not created yet
	 * no need to spinlock this init of tcpStatus or srv_count
	 */
	tcp_ses->tcpStatus = CifsNew;
1642 1643
	memcpy(&tcp_ses->srcaddr, &volume_info->srcaddr,
	       sizeof(tcp_ses->srcaddr));
1644 1645
	++tcp_ses->srv_count;

1646
	if (addr.ss_family == AF_INET6) {
1647
		cFYI(1, "attempting ipv6 connect");
1648 1649 1650 1651
		/* BB should we allow ipv6 on port 139? */
		/* other OS never observed in Wild doing 139 with v6 */
		memcpy(&tcp_ses->addr.sockAddr6, sin_server6,
			sizeof(struct sockaddr_in6));
1652
		rc = ipv6_connect(tcp_ses);
1653 1654 1655
	} else {
		memcpy(&tcp_ses->addr.sockAddr, sin_server,
			sizeof(struct sockaddr_in));
1656
		rc = ipv4_connect(tcp_ses);
1657 1658
	}
	if (rc < 0) {
1659
		cERROR(1, "Error connecting to socket. Aborting operation");
1660 1661 1662 1663 1664 1665 1666 1667 1668 1669 1670 1671
		goto out_err;
	}

	/*
	 * since we're in a cifs function already, we know that
	 * this will succeed. No need for try_module_get().
	 */
	__module_get(THIS_MODULE);
	tcp_ses->tsk = kthread_run((void *)(void *)cifs_demultiplex_thread,
				  tcp_ses, "cifsd");
	if (IS_ERR(tcp_ses->tsk)) {
		rc = PTR_ERR(tcp_ses->tsk);
1672
		cERROR(1, "error %d create cifsd thread", rc);
1673 1674 1675 1676 1677 1678 1679 1680 1681
		module_put(THIS_MODULE);
		goto out_err;
	}

	/* thread spawned, put it on the list */
	write_lock(&cifs_tcp_ses_lock);
	list_add(&tcp_ses->tcp_ses_list, &cifs_tcp_ses_list);
	write_unlock(&cifs_tcp_ses_lock);

1682 1683
	cifs_fscache_get_client_cookie(tcp_ses);

1684 1685 1686 1687
	return tcp_ses;

out_err:
	if (tcp_ses) {
1688 1689
		if (!IS_ERR(tcp_ses->hostname))
			kfree(tcp_ses->hostname);
1690 1691 1692 1693 1694 1695 1696
		if (tcp_ses->ssocket)
			sock_release(tcp_ses->ssocket);
		kfree(tcp_ses);
	}
	return ERR_PTR(rc);
}

1697
static struct cifsSesInfo *
1698
cifs_find_smb_ses(struct TCP_Server_Info *server, struct smb_vol *vol)
L
Linus Torvalds 已提交
1699
{
1700
	struct cifsSesInfo *ses;
1701

1702
	write_lock(&cifs_tcp_ses_lock);
1703 1704 1705
	list_for_each_entry(ses, &server->smb_ses_list, smb_ses_list) {
		switch (server->secType) {
		case Kerberos:
1706
			if (vol->cred_uid != ses->cred_uid)
1707 1708 1709 1710 1711 1712 1713 1714
				continue;
			break;
		default:
			/* anything else takes username/password */
			if (strncmp(ses->userName, vol->username,
				    MAX_USERNAME_SIZE))
				continue;
			if (strlen(vol->username) != 0 &&
1715
			    ses->password != NULL &&
1716 1717
			    strncmp(ses->password,
				    vol->password ? vol->password : "",
1718 1719 1720
				    MAX_PASSWORD_SIZE))
				continue;
		}
1721 1722 1723 1724 1725 1726 1727
		++ses->ses_count;
		write_unlock(&cifs_tcp_ses_lock);
		return ses;
	}
	write_unlock(&cifs_tcp_ses_lock);
	return NULL;
}
1728

1729 1730 1731 1732 1733
static void
cifs_put_smb_ses(struct cifsSesInfo *ses)
{
	int xid;
	struct TCP_Server_Info *server = ses->server;
1734

1735
	cFYI(1, "%s: ses_count=%d\n", __func__, ses->ses_count);
1736 1737 1738 1739 1740
	write_lock(&cifs_tcp_ses_lock);
	if (--ses->ses_count > 0) {
		write_unlock(&cifs_tcp_ses_lock);
		return;
	}
1741

1742 1743
	list_del_init(&ses->smb_ses_list);
	write_unlock(&cifs_tcp_ses_lock);
1744

1745 1746 1747 1748 1749 1750 1751 1752
	if (ses->status == CifsGood) {
		xid = GetXid();
		CIFSSMBLogoff(xid, ses);
		_FreeXid(xid);
	}
	sesInfoFree(ses);
	cifs_put_tcp_session(server);
}
1753

1754 1755 1756 1757 1758 1759 1760 1761
static struct cifsSesInfo *
cifs_get_smb_ses(struct TCP_Server_Info *server, struct smb_vol *volume_info)
{
	int rc = -ENOMEM, xid;
	struct cifsSesInfo *ses;

	xid = GetXid();

1762
	ses = cifs_find_smb_ses(server, volume_info);
1763 1764 1765 1766
	if (ses) {
		cFYI(1, "Existing smb sess found (status=%d)", ses->status);

		mutex_lock(&ses->session_mutex);
1767 1768 1769 1770 1771 1772 1773 1774
		rc = cifs_negotiate_protocol(xid, ses);
		if (rc) {
			mutex_unlock(&ses->session_mutex);
			/* problem -- put our ses reference */
			cifs_put_smb_ses(ses);
			FreeXid(xid);
			return ERR_PTR(rc);
		}
1775 1776 1777 1778 1779 1780 1781 1782 1783 1784 1785 1786 1787
		if (ses->need_reconnect) {
			cFYI(1, "Session needs reconnect");
			rc = cifs_setup_session(xid, ses,
						volume_info->local_nls);
			if (rc) {
				mutex_unlock(&ses->session_mutex);
				/* problem -- put our reference */
				cifs_put_smb_ses(ses);
				FreeXid(xid);
				return ERR_PTR(rc);
			}
		}
		mutex_unlock(&ses->session_mutex);
1788 1789 1790

		/* existing SMB ses has a server reference already */
		cifs_put_tcp_session(server);
1791 1792 1793 1794 1795 1796 1797 1798 1799
		FreeXid(xid);
		return ses;
	}

	cFYI(1, "Existing smb sess not found");
	ses = sesInfoAlloc();
	if (ses == NULL)
		goto get_ses_fail;

1800 1801
	ses->tilen = 0;
	ses->tiblob = NULL;
1802 1803 1804 1805 1806 1807 1808 1809 1810 1811 1812 1813 1814 1815 1816 1817 1818 1819 1820 1821 1822 1823 1824 1825 1826
	/* new SMB session uses our server ref */
	ses->server = server;
	if (server->addr.sockAddr6.sin6_family == AF_INET6)
		sprintf(ses->serverName, "%pI6",
			&server->addr.sockAddr6.sin6_addr);
	else
		sprintf(ses->serverName, "%pI4",
			&server->addr.sockAddr.sin_addr.s_addr);

	if (volume_info->username)
		strncpy(ses->userName, volume_info->username,
			MAX_USERNAME_SIZE);

	/* volume_info->password freed at unmount */
	if (volume_info->password) {
		ses->password = kstrdup(volume_info->password, GFP_KERNEL);
		if (!ses->password)
			goto get_ses_fail;
	}
	if (volume_info->domainname) {
		int len = strlen(volume_info->domainname);
		ses->domainName = kmalloc(len + 1, GFP_KERNEL);
		if (ses->domainName)
			strcpy(ses->domainName, volume_info->domainname);
	}
1827
	ses->cred_uid = volume_info->cred_uid;
1828 1829 1830 1831
	ses->linux_uid = volume_info->linux_uid;
	ses->overrideSecFlg = volume_info->secFlg;

	mutex_lock(&ses->session_mutex);
1832 1833 1834
	rc = cifs_negotiate_protocol(xid, ses);
	if (!rc)
		rc = cifs_setup_session(xid, ses, volume_info->local_nls);
1835
	mutex_unlock(&ses->session_mutex);
1836
	if (rc)
1837 1838 1839 1840 1841 1842 1843 1844 1845 1846 1847 1848 1849 1850 1851 1852
		goto get_ses_fail;

	/* success, put it on the list */
	write_lock(&cifs_tcp_ses_lock);
	list_add(&ses->smb_ses_list, &server->smb_ses_list);
	write_unlock(&cifs_tcp_ses_lock);

	FreeXid(xid);
	return ses;

get_ses_fail:
	sesInfoFree(ses);
	FreeXid(xid);
	return ERR_PTR(rc);
}

1853 1854 1855 1856 1857 1858 1859 1860 1861 1862 1863 1864
static struct cifsTconInfo *
cifs_find_tcon(struct cifsSesInfo *ses, const char *unc)
{
	struct list_head *tmp;
	struct cifsTconInfo *tcon;

	write_lock(&cifs_tcp_ses_lock);
	list_for_each(tmp, &ses->tcon_list) {
		tcon = list_entry(tmp, struct cifsTconInfo, tcon_list);
		if (tcon->tidStatus == CifsExiting)
			continue;
		if (strncmp(tcon->treeName, unc, MAX_TREE_SIZE))
1865 1866
			continue;

1867 1868
		++tcon->tc_count;
		write_unlock(&cifs_tcp_ses_lock);
1869
		return tcon;
L
Linus Torvalds 已提交
1870
	}
1871
	write_unlock(&cifs_tcp_ses_lock);
L
Linus Torvalds 已提交
1872 1873 1874
	return NULL;
}

1875 1876 1877 1878 1879 1880
static void
cifs_put_tcon(struct cifsTconInfo *tcon)
{
	int xid;
	struct cifsSesInfo *ses = tcon->ses;

1881
	cFYI(1, "%s: tc_count=%d\n", __func__, tcon->tc_count);
1882 1883 1884 1885 1886 1887 1888 1889 1890 1891 1892 1893 1894
	write_lock(&cifs_tcp_ses_lock);
	if (--tcon->tc_count > 0) {
		write_unlock(&cifs_tcp_ses_lock);
		return;
	}

	list_del_init(&tcon->tcon_list);
	write_unlock(&cifs_tcp_ses_lock);

	xid = GetXid();
	CIFSSMBTDis(xid, tcon);
	_FreeXid(xid);

1895
	cifs_fscache_release_super_cookie(tcon);
1896
	tconInfoFree(tcon);
1897 1898 1899
	cifs_put_smb_ses(ses);
}

1900 1901 1902 1903 1904 1905 1906 1907 1908 1909 1910 1911 1912 1913 1914 1915 1916 1917 1918 1919 1920 1921 1922 1923 1924 1925 1926 1927 1928 1929 1930 1931 1932 1933 1934 1935 1936 1937 1938 1939 1940 1941 1942 1943 1944 1945 1946 1947 1948 1949 1950 1951 1952 1953 1954 1955 1956 1957 1958 1959 1960 1961 1962 1963 1964 1965
static struct cifsTconInfo *
cifs_get_tcon(struct cifsSesInfo *ses, struct smb_vol *volume_info)
{
	int rc, xid;
	struct cifsTconInfo *tcon;

	tcon = cifs_find_tcon(ses, volume_info->UNC);
	if (tcon) {
		cFYI(1, "Found match on UNC path");
		/* existing tcon already has a reference */
		cifs_put_smb_ses(ses);
		if (tcon->seal != volume_info->seal)
			cERROR(1, "transport encryption setting "
				   "conflicts with existing tid");
		return tcon;
	}

	tcon = tconInfoAlloc();
	if (tcon == NULL) {
		rc = -ENOMEM;
		goto out_fail;
	}

	tcon->ses = ses;
	if (volume_info->password) {
		tcon->password = kstrdup(volume_info->password, GFP_KERNEL);
		if (!tcon->password) {
			rc = -ENOMEM;
			goto out_fail;
		}
	}

	if (strchr(volume_info->UNC + 3, '\\') == NULL
	    && strchr(volume_info->UNC + 3, '/') == NULL) {
		cERROR(1, "Missing share name");
		rc = -ENODEV;
		goto out_fail;
	}

	/* BB Do we need to wrap session_mutex around
	 * this TCon call and Unix SetFS as
	 * we do on SessSetup and reconnect? */
	xid = GetXid();
	rc = CIFSTCon(xid, ses, volume_info->UNC, tcon, volume_info->local_nls);
	FreeXid(xid);
	cFYI(1, "CIFS Tcon rc = %d", rc);
	if (rc)
		goto out_fail;

	if (volume_info->nodfs) {
		tcon->Flags &= ~SMB_SHARE_IS_IN_DFS;
		cFYI(1, "DFS disabled (%d)", tcon->Flags);
	}
	tcon->seal = volume_info->seal;
	/* we can have only one retry value for a connection
	   to a share so for resources mounted more than once
	   to the same server share the last value passed in
	   for the retry flag is used */
	tcon->retry = volume_info->retry;
	tcon->nocase = volume_info->nocase;
	tcon->local_lease = volume_info->local_lease;

	write_lock(&cifs_tcp_ses_lock);
	list_add(&tcon->tcon_list, &ses->tcon_list);
	write_unlock(&cifs_tcp_ses_lock);

1966 1967
	cifs_fscache_get_super_cookie(tcon);

1968 1969 1970 1971 1972 1973 1974
	return tcon;

out_fail:
	tconInfoFree(tcon);
	return ERR_PTR(rc);
}

1975 1976 1977 1978 1979 1980 1981 1982 1983 1984 1985 1986 1987 1988 1989 1990 1991
void
cifs_put_tlink(struct tcon_link *tlink)
{
	if (!tlink || IS_ERR(tlink))
		return;

	if (!atomic_dec_and_test(&tlink->tl_count) ||
	    test_bit(TCON_LINK_IN_TREE, &tlink->tl_flags)) {
		tlink->tl_time = jiffies;
		return;
	}

	if (!IS_ERR(tlink_tcon(tlink)))
		cifs_put_tcon(tlink_tcon(tlink));
	kfree(tlink);
	return;
}
1992

L
Linus Torvalds 已提交
1993
int
1994 1995
get_dfs_path(int xid, struct cifsSesInfo *pSesInfo, const char *old_path,
	     const struct nls_table *nls_codepage, unsigned int *pnum_referrals,
S
Steve French 已提交
1996
	     struct dfs_info3_param **preferrals, int remap)
L
Linus Torvalds 已提交
1997 1998 1999 2000 2001
{
	char *temp_unc;
	int rc = 0;

	*pnum_referrals = 0;
S
Steve French 已提交
2002
	*preferrals = NULL;
L
Linus Torvalds 已提交
2003 2004 2005

	if (pSesInfo->ipc_tid == 0) {
		temp_unc = kmalloc(2 /* for slashes */ +
2006 2007
			strnlen(pSesInfo->serverName,
				SERVER_NAME_LEN_WITH_NULL * 2)
L
Linus Torvalds 已提交
2008 2009 2010 2011 2012 2013 2014 2015 2016
				 + 1 + 4 /* slash IPC$ */  + 2,
				GFP_KERNEL);
		if (temp_unc == NULL)
			return -ENOMEM;
		temp_unc[0] = '\\';
		temp_unc[1] = '\\';
		strcpy(temp_unc + 2, pSesInfo->serverName);
		strcpy(temp_unc + 2 + strlen(pSesInfo->serverName), "\\IPC$");
		rc = CIFSTCon(xid, pSesInfo, temp_unc, NULL, nls_codepage);
2017
		cFYI(1, "CIFS Tcon rc = %d ipc_tid = %d", rc, pSesInfo->ipc_tid);
L
Linus Torvalds 已提交
2018 2019 2020
		kfree(temp_unc);
	}
	if (rc == 0)
S
Steve French 已提交
2021
		rc = CIFSGetDFSRefer(xid, pSesInfo, old_path, preferrals,
2022
				     pnum_referrals, nls_codepage, remap);
S
Steve French 已提交
2023 2024
	/* BB map targetUNCs to dfs_info3 structures, here or
		in CIFSGetDFSRefer BB */
L
Linus Torvalds 已提交
2025 2026 2027 2028

	return rc;
}

2029 2030 2031 2032 2033 2034 2035 2036 2037 2038 2039 2040 2041 2042 2043 2044 2045 2046 2047 2048 2049 2050 2051 2052 2053 2054 2055 2056 2057 2058 2059 2060 2061
#ifdef CONFIG_DEBUG_LOCK_ALLOC
static struct lock_class_key cifs_key[2];
static struct lock_class_key cifs_slock_key[2];

static inline void
cifs_reclassify_socket4(struct socket *sock)
{
	struct sock *sk = sock->sk;
	BUG_ON(sock_owned_by_user(sk));
	sock_lock_init_class_and_name(sk, "slock-AF_INET-CIFS",
		&cifs_slock_key[0], "sk_lock-AF_INET-CIFS", &cifs_key[0]);
}

static inline void
cifs_reclassify_socket6(struct socket *sock)
{
	struct sock *sk = sock->sk;
	BUG_ON(sock_owned_by_user(sk));
	sock_lock_init_class_and_name(sk, "slock-AF_INET6-CIFS",
		&cifs_slock_key[1], "sk_lock-AF_INET6-CIFS", &cifs_key[1]);
}
#else
static inline void
cifs_reclassify_socket4(struct socket *sock)
{
}

static inline void
cifs_reclassify_socket6(struct socket *sock)
{
}
#endif

L
Linus Torvalds 已提交
2062
/* See RFC1001 section 14 on representation of Netbios names */
2063
static void rfc1002mangle(char *target, char *source, unsigned int length)
L
Linus Torvalds 已提交
2064
{
2065
	unsigned int i, j;
L
Linus Torvalds 已提交
2066

2067
	for (i = 0, j = 0; i < (length); i++) {
L
Linus Torvalds 已提交
2068 2069 2070
		/* mask a nibble at a time and encode */
		target[j] = 'A' + (0x0F & (source[i] >> 4));
		target[j+1] = 'A' + (0x0F & source[i]);
2071
		j += 2;
L
Linus Torvalds 已提交
2072 2073 2074 2075
	}

}

2076 2077 2078 2079 2080 2081 2082 2083 2084 2085 2086 2087 2088 2089 2090 2091 2092 2093 2094 2095 2096 2097 2098 2099 2100 2101 2102
static int
bind_socket(struct TCP_Server_Info *server)
{
	int rc = 0;
	if (server->srcaddr.ss_family != AF_UNSPEC) {
		/* Bind to the specified local IP address */
		struct socket *socket = server->ssocket;
		rc = socket->ops->bind(socket,
				       (struct sockaddr *) &server->srcaddr,
				       sizeof(server->srcaddr));
		if (rc < 0) {
			struct sockaddr_in *saddr4;
			struct sockaddr_in6 *saddr6;
			saddr4 = (struct sockaddr_in *)&server->srcaddr;
			saddr6 = (struct sockaddr_in6 *)&server->srcaddr;
			if (saddr6->sin6_family == AF_INET6)
				cERROR(1, "cifs: "
				       "Failed to bind to: %pI6c, error: %d\n",
				       &saddr6->sin6_addr, rc);
			else
				cERROR(1, "cifs: "
				       "Failed to bind to: %pI4, error: %d\n",
				       &saddr4->sin_addr.s_addr, rc);
		}
	}
	return rc;
}
L
Linus Torvalds 已提交
2103 2104

static int
2105
ipv4_connect(struct TCP_Server_Info *server)
L
Linus Torvalds 已提交
2106 2107
{
	int rc = 0;
2108
	int val;
2109
	bool connected = false;
L
Linus Torvalds 已提交
2110
	__be16 orig_port = 0;
2111
	struct socket *socket = server->ssocket;
L
Linus Torvalds 已提交
2112

2113
	if (socket == NULL) {
2114
		rc = sock_create_kern(PF_INET, SOCK_STREAM,
2115
				      IPPROTO_TCP, &socket);
L
Linus Torvalds 已提交
2116
		if (rc < 0) {
2117
			cERROR(1, "Error %d creating socket", rc);
L
Linus Torvalds 已提交
2118 2119
			return rc;
		}
2120 2121

		/* BB other socket options to set KEEPALIVE, NODELAY? */
2122
		cFYI(1, "Socket created");
2123 2124 2125
		server->ssocket = socket;
		socket->sk->sk_allocation = GFP_NOFS;
		cifs_reclassify_socket4(socket);
L
Linus Torvalds 已提交
2126 2127
	}

2128 2129 2130 2131
	rc = bind_socket(server);
	if (rc < 0)
		return rc;

2132 2133 2134 2135 2136
	/* user overrode default port */
	if (server->addr.sockAddr.sin_port) {
		rc = socket->ops->connect(socket, (struct sockaddr *)
					  &server->addr.sockAddr,
					  sizeof(struct sockaddr_in), 0);
L
Linus Torvalds 已提交
2137
		if (rc >= 0)
2138
			connected = true;
2139
	}
L
Linus Torvalds 已提交
2140

S
Steve French 已提交
2141
	if (!connected) {
2142
		/* save original port so we can retry user specified port
L
Linus Torvalds 已提交
2143
			later if fall back ports fail this time  */
2144
		orig_port = server->addr.sockAddr.sin_port;
L
Linus Torvalds 已提交
2145 2146

		/* do not retry on the same port we just failed on */
2147 2148 2149 2150 2151 2152
		if (server->addr.sockAddr.sin_port != htons(CIFS_PORT)) {
			server->addr.sockAddr.sin_port = htons(CIFS_PORT);
			rc = socket->ops->connect(socket,
						(struct sockaddr *)
						&server->addr.sockAddr,
						sizeof(struct sockaddr_in), 0);
L
Linus Torvalds 已提交
2153
			if (rc >= 0)
2154
				connected = true;
L
Linus Torvalds 已提交
2155 2156 2157
		}
	}
	if (!connected) {
2158 2159 2160
		server->addr.sockAddr.sin_port = htons(RFC1001_PORT);
		rc = socket->ops->connect(socket, (struct sockaddr *)
					      &server->addr.sockAddr,
C
Cyrill Gorcunov 已提交
2161
					      sizeof(struct sockaddr_in), 0);
2162
		if (rc >= 0)
2163
			connected = true;
L
Linus Torvalds 已提交
2164 2165 2166 2167 2168
	}

	/* give up here - unless we want to retry on different
		protocol families some day */
	if (!connected) {
S
Steve French 已提交
2169
		if (orig_port)
2170
			server->addr.sockAddr.sin_port = orig_port;
2171
		cFYI(1, "Error %d connecting to server via ipv4", rc);
2172 2173
		sock_release(socket);
		server->ssocket = NULL;
L
Linus Torvalds 已提交
2174 2175
		return rc;
	}
2176 2177 2178 2179 2180 2181 2182 2183


	/*
	 * Eventually check for other socket options to change from
	 *  the default. sock_setsockopt not used because it expects
	 *  user space buffer
	 */
	socket->sk->sk_rcvtimeo = 7 * HZ;
2184
	socket->sk->sk_sndtimeo = 5 * HZ;
2185

2186
	/* make the bufsizes depend on wsize/rsize and max requests */
2187 2188 2189 2190 2191
	if (server->noautotune) {
		if (socket->sk->sk_sndbuf < (200 * 1024))
			socket->sk->sk_sndbuf = 200 * 1024;
		if (socket->sk->sk_rcvbuf < (140 * 1024))
			socket->sk->sk_rcvbuf = 140 * 1024;
2192
	}
L
Linus Torvalds 已提交
2193

2194 2195 2196 2197 2198
	if (server->tcp_nodelay) {
		val = 1;
		rc = kernel_setsockopt(socket, SOL_TCP, TCP_NODELAY,
				(char *)&val, sizeof(val));
		if (rc)
2199
			cFYI(1, "set TCP_NODELAY socket option error %d", rc);
2200 2201
	}

2202
	 cFYI(1, "sndbuf %d rcvbuf %d rcvtimeo 0x%lx",
2203
		 socket->sk->sk_sndbuf,
2204
		 socket->sk->sk_rcvbuf, socket->sk->sk_rcvtimeo);
2205

L
Linus Torvalds 已提交
2206
	/* send RFC1001 sessinit */
2207
	if (server->addr.sockAddr.sin_port == htons(RFC1001_PORT)) {
L
Linus Torvalds 已提交
2208
		/* some servers require RFC1001 sessinit before sending
2209
		negprot - BB check reconnection in case where second
L
Linus Torvalds 已提交
2210
		sessinit is sent but no second negprot */
2211 2212 2213 2214
		struct rfc1002_session_packet *ses_init_buf;
		struct smb_hdr *smb_buf;
		ses_init_buf = kzalloc(sizeof(struct rfc1002_session_packet),
				       GFP_KERNEL);
S
Steve French 已提交
2215
		if (ses_init_buf) {
L
Linus Torvalds 已提交
2216
			ses_init_buf->trailer.session_req.called_len = 32;
2217 2218
			if (server->server_RFC1001_name &&
			    server->server_RFC1001_name[0] != 0)
2219 2220
				rfc1002mangle(ses_init_buf->trailer.
						session_req.called_name,
2221
					      server->server_RFC1001_name,
2222
					      RFC1001_NAME_LEN_WITH_NULL);
2223
			else
2224 2225 2226 2227
				rfc1002mangle(ses_init_buf->trailer.
						session_req.called_name,
					      DEFAULT_CIFS_CALLED_NAME,
					      RFC1001_NAME_LEN_WITH_NULL);
2228

L
Linus Torvalds 已提交
2229
			ses_init_buf->trailer.session_req.calling_len = 32;
2230

L
Linus Torvalds 已提交
2231 2232
			/* calling name ends in null (byte 16) from old smb
			convention. */
2233 2234
			if (server->workstation_RFC1001_name &&
			    server->workstation_RFC1001_name[0] != 0)
2235 2236
				rfc1002mangle(ses_init_buf->trailer.
						session_req.calling_name,
2237
					      server->workstation_RFC1001_name,
2238
					      RFC1001_NAME_LEN_WITH_NULL);
2239
			else
2240 2241 2242 2243
				rfc1002mangle(ses_init_buf->trailer.
						session_req.calling_name,
					      "LINUX_CIFS_CLNT",
					      RFC1001_NAME_LEN_WITH_NULL);
2244

L
Linus Torvalds 已提交
2245 2246 2247 2248 2249
			ses_init_buf->trailer.session_req.scope1 = 0;
			ses_init_buf->trailer.session_req.scope2 = 0;
			smb_buf = (struct smb_hdr *)ses_init_buf;
			/* sizeof RFC1002_SESSION_REQUEST with no scope */
			smb_buf->smb_buf_length = 0x81000044;
2250
			rc = smb_send(server, smb_buf, 0x44);
L
Linus Torvalds 已提交
2251
			kfree(ses_init_buf);
2252
			msleep(1); /* RFC1001 layer in at least one server
2253 2254 2255
				      requires very short break before negprot
				      presumably because not expecting negprot
				      to follow so fast.  This is a simple
2256
				      solution that works without
2257 2258 2259
				      complicating the code and causes no
				      significant slowing down on mount
				      for everyone else */
L
Linus Torvalds 已提交
2260
		}
2261
		/* else the negprot may still work without this
L
Linus Torvalds 已提交
2262
		even though malloc failed */
2263

L
Linus Torvalds 已提交
2264
	}
2265

L
Linus Torvalds 已提交
2266 2267 2268 2269
	return rc;
}

static int
2270
ipv6_connect(struct TCP_Server_Info *server)
L
Linus Torvalds 已提交
2271 2272
{
	int rc = 0;
2273
	int val;
2274
	bool connected = false;
L
Linus Torvalds 已提交
2275
	__be16 orig_port = 0;
2276
	struct socket *socket = server->ssocket;
L
Linus Torvalds 已提交
2277

2278
	if (socket == NULL) {
2279
		rc = sock_create_kern(PF_INET6, SOCK_STREAM,
2280
				      IPPROTO_TCP, &socket);
L
Linus Torvalds 已提交
2281
		if (rc < 0) {
2282
			cERROR(1, "Error %d creating ipv6 socket", rc);
2283
			socket = NULL;
L
Linus Torvalds 已提交
2284 2285 2286
			return rc;
		}

2287
		/* BB other socket options to set KEEPALIVE, NODELAY? */
2288
		cFYI(1, "ipv6 Socket created");
2289 2290 2291 2292
		server->ssocket = socket;
		socket->sk->sk_allocation = GFP_NOFS;
		cifs_reclassify_socket6(socket);
	}
L
Linus Torvalds 已提交
2293

2294 2295 2296 2297
	rc = bind_socket(server);
	if (rc < 0)
		return rc;

2298 2299 2300 2301
	/* user overrode default port */
	if (server->addr.sockAddr6.sin6_port) {
		rc = socket->ops->connect(socket,
				(struct sockaddr *) &server->addr.sockAddr6,
C
Cyrill Gorcunov 已提交
2302
				sizeof(struct sockaddr_in6), 0);
L
Linus Torvalds 已提交
2303
		if (rc >= 0)
2304
			connected = true;
2305
	}
L
Linus Torvalds 已提交
2306

S
Steve French 已提交
2307
	if (!connected) {
2308
		/* save original port so we can retry user specified port
L
Linus Torvalds 已提交
2309 2310
			later if fall back ports fail this time  */

2311
		orig_port = server->addr.sockAddr6.sin6_port;
L
Linus Torvalds 已提交
2312
		/* do not retry on the same port we just failed on */
2313 2314 2315 2316
		if (server->addr.sockAddr6.sin6_port != htons(CIFS_PORT)) {
			server->addr.sockAddr6.sin6_port = htons(CIFS_PORT);
			rc = socket->ops->connect(socket, (struct sockaddr *)
					&server->addr.sockAddr6,
C
Cyrill Gorcunov 已提交
2317
					sizeof(struct sockaddr_in6), 0);
L
Linus Torvalds 已提交
2318
			if (rc >= 0)
2319
				connected = true;
L
Linus Torvalds 已提交
2320 2321 2322
		}
	}
	if (!connected) {
2323 2324 2325 2326
		server->addr.sockAddr6.sin6_port = htons(RFC1001_PORT);
		rc = socket->ops->connect(socket, (struct sockaddr *)
				&server->addr.sockAddr6,
				sizeof(struct sockaddr_in6), 0);
2327
		if (rc >= 0)
2328
			connected = true;
L
Linus Torvalds 已提交
2329 2330 2331 2332 2333
	}

	/* give up here - unless we want to retry on different
		protocol families some day */
	if (!connected) {
S
Steve French 已提交
2334
		if (orig_port)
2335
			server->addr.sockAddr6.sin6_port = orig_port;
2336
		cFYI(1, "Error %d connecting to server via ipv6", rc);
2337 2338
		sock_release(socket);
		server->ssocket = NULL;
L
Linus Torvalds 已提交
2339 2340
		return rc;
	}
2341

2342 2343 2344 2345 2346 2347
	/*
	 * Eventually check for other socket options to change from
	 * the default. sock_setsockopt not used because it expects
	 * user space buffer
	 */
	socket->sk->sk_rcvtimeo = 7 * HZ;
2348
	socket->sk->sk_sndtimeo = 5 * HZ;
2349 2350 2351 2352 2353 2354

	if (server->tcp_nodelay) {
		val = 1;
		rc = kernel_setsockopt(socket, SOL_TCP, TCP_NODELAY,
				(char *)&val, sizeof(val));
		if (rc)
2355
			cFYI(1, "set TCP_NODELAY socket option error %d", rc);
2356 2357
	}

2358
	server->ssocket = socket;
2359

L
Linus Torvalds 已提交
2360 2361 2362
	return rc;
}

2363 2364
void reset_cifs_unix_caps(int xid, struct cifsTconInfo *tcon,
			  struct super_block *sb, struct smb_vol *vol_info)
2365 2366 2367 2368 2369 2370 2371 2372 2373 2374 2375
{
	/* if we are reconnecting then should we check to see if
	 * any requested capabilities changed locally e.g. via
	 * remount but we can not do much about it here
	 * if they have (even if we could detect it by the following)
	 * Perhaps we could add a backpointer to array of sb from tcon
	 * or if we change to make all sb to same share the same
	 * sb as NFS - then we only have one backpointer to sb.
	 * What if we wanted to mount the server share twice once with
	 * and once without posixacls or posix paths? */
	__u64 saved_cap = le64_to_cpu(tcon->fsUnixInfo.Capability);
2376

2377 2378 2379
	if (vol_info && vol_info->no_linux_ext) {
		tcon->fsUnixInfo.Capability = 0;
		tcon->unix_ext = 0; /* Unix Extensions disabled */
2380
		cFYI(1, "Linux protocol extensions disabled");
2381 2382 2383 2384 2385
		return;
	} else if (vol_info)
		tcon->unix_ext = 1; /* Unix Extensions supported */

	if (tcon->unix_ext == 0) {
2386
		cFYI(1, "Unix extensions disabled so not set on reconnect");
2387 2388
		return;
	}
2389

S
Steve French 已提交
2390
	if (!CIFSSMBQFSUnixInfo(xid, tcon)) {
2391
		__u64 cap = le64_to_cpu(tcon->fsUnixInfo.Capability);
2392

2393 2394
		/* check for reconnect case in which we do not
		   want to change the mount behavior if we can avoid it */
S
Steve French 已提交
2395
		if (vol_info == NULL) {
2396
			/* turn off POSIX ACL and PATHNAMES if not set
2397 2398 2399
			   originally at mount time */
			if ((saved_cap & CIFS_UNIX_POSIX_ACL_CAP) == 0)
				cap &= ~CIFS_UNIX_POSIX_ACL_CAP;
2400 2401
			if ((saved_cap & CIFS_UNIX_POSIX_PATHNAMES_CAP) == 0) {
				if (cap & CIFS_UNIX_POSIX_PATHNAMES_CAP)
2402
					cERROR(1, "POSIXPATH support change");
2403
				cap &= ~CIFS_UNIX_POSIX_PATHNAMES_CAP;
2404
			} else if ((cap & CIFS_UNIX_POSIX_PATHNAMES_CAP) == 0) {
2405 2406
				cERROR(1, "possible reconnect error");
				cERROR(1, "server disabled POSIX path support");
2407
			}
2408
		}
2409

2410
		cap &= CIFS_UNIX_CAP_MASK;
2411
		if (vol_info && vol_info->no_psx_acl)
2412
			cap &= ~CIFS_UNIX_POSIX_ACL_CAP;
2413
		else if (CIFS_UNIX_POSIX_ACL_CAP & cap) {
2414
			cFYI(1, "negotiated posix acl support");
S
Steve French 已提交
2415
			if (sb)
2416 2417 2418
				sb->s_flags |= MS_POSIXACL;
		}

2419
		if (vol_info && vol_info->posix_paths == 0)
2420
			cap &= ~CIFS_UNIX_POSIX_PATHNAMES_CAP;
2421
		else if (cap & CIFS_UNIX_POSIX_PATHNAMES_CAP) {
2422
			cFYI(1, "negotiate posix pathnames");
2423
			if (sb)
2424
				CIFS_SB(sb)->mnt_cifs_flags |=
2425 2426
					CIFS_MOUNT_POSIX_PATHS;
		}
2427

2428 2429
		/* We might be setting the path sep back to a different
		form if we are reconnecting and the server switched its
2430
		posix path capability for this share */
2431
		if (sb && (CIFS_SB(sb)->prepathlen > 0))
2432
			CIFS_SB(sb)->prepath[0] = CIFS_DIR_SEP(CIFS_SB(sb));
2433 2434 2435 2436

		if (sb && (CIFS_SB(sb)->rsize > 127 * 1024)) {
			if ((cap & CIFS_UNIX_LARGE_READ_CAP) == 0) {
				CIFS_SB(sb)->rsize = 127 * 1024;
2437
				cFYI(DBG2, "larger reads not supported by srv");
2438 2439
			}
		}
2440 2441


2442
		cFYI(1, "Negotiate caps 0x%x", (int)cap);
2443
#ifdef CONFIG_CIFS_DEBUG2
2444
		if (cap & CIFS_UNIX_FCNTL_CAP)
2445
			cFYI(1, "FCNTL cap");
2446
		if (cap & CIFS_UNIX_EXTATTR_CAP)
2447
			cFYI(1, "EXTATTR cap");
2448
		if (cap & CIFS_UNIX_POSIX_PATHNAMES_CAP)
2449
			cFYI(1, "POSIX path cap");
2450
		if (cap & CIFS_UNIX_XATTR_CAP)
2451
			cFYI(1, "XATTR cap");
2452
		if (cap & CIFS_UNIX_POSIX_ACL_CAP)
2453
			cFYI(1, "POSIX ACL cap");
2454
		if (cap & CIFS_UNIX_LARGE_READ_CAP)
2455
			cFYI(1, "very large read cap");
2456
		if (cap & CIFS_UNIX_LARGE_WRITE_CAP)
2457
			cFYI(1, "very large write cap");
2458 2459
#endif /* CIFS_DEBUG2 */
		if (CIFSSMBSetFSUnixInfo(xid, tcon, cap)) {
2460
			if (vol_info == NULL) {
2461
				cFYI(1, "resetting capabilities failed");
2462
			} else
2463
				cERROR(1, "Negotiating Unix capabilities "
2464 2465 2466 2467
					   "with the server failed.  Consider "
					   "mounting with the Unix Extensions\n"
					   "disabled, if problems are found, "
					   "by specifying the nounix mount "
2468
					   "option.");
2469

2470 2471 2472 2473
		}
	}
}

2474 2475 2476 2477
static void
convert_delimiter(char *path, char delim)
{
	int i;
2478
	char old_delim;
2479 2480 2481 2482

	if (path == NULL)
		return;

2483
	if (delim == '/')
2484 2485 2486 2487
		old_delim = '\\';
	else
		old_delim = '/';

2488
	for (i = 0; path[i] != '\0'; i++) {
2489
		if (path[i] == old_delim)
2490 2491 2492 2493
			path[i] = delim;
	}
}

S
Steve French 已提交
2494 2495
static void setup_cifs_sb(struct smb_vol *pvolume_info,
			  struct cifs_sb_info *cifs_sb)
2496
{
S
Steve French 已提交
2497
	if (pvolume_info->rsize > CIFSMaxBufSize) {
2498 2499
		cERROR(1, "rsize %d too large, using MaxBufSize",
			pvolume_info->rsize);
S
Steve French 已提交
2500 2501 2502 2503 2504 2505 2506 2507
		cifs_sb->rsize = CIFSMaxBufSize;
	} else if ((pvolume_info->rsize) &&
			(pvolume_info->rsize <= CIFSMaxBufSize))
		cifs_sb->rsize = pvolume_info->rsize;
	else /* default */
		cifs_sb->rsize = CIFSMaxBufSize;

	if (pvolume_info->wsize > PAGEVEC_SIZE * PAGE_CACHE_SIZE) {
2508 2509
		cERROR(1, "wsize %d too large, using 4096 instead",
			  pvolume_info->wsize);
S
Steve French 已提交
2510 2511 2512 2513 2514 2515 2516 2517 2518 2519 2520 2521 2522 2523 2524 2525 2526
		cifs_sb->wsize = 4096;
	} else if (pvolume_info->wsize)
		cifs_sb->wsize = pvolume_info->wsize;
	else
		cifs_sb->wsize = min_t(const int,
					PAGEVEC_SIZE * PAGE_CACHE_SIZE,
					127*1024);
		/* old default of CIFSMaxBufSize was too small now
		   that SMB Write2 can send multiple pages in kvec.
		   RFC1001 does not describe what happens when frame
		   bigger than 128K is sent so use that as max in
		   conjunction with 52K kvec constraint on arch with 4K
		   page size  */

	if (cifs_sb->rsize < 2048) {
		cifs_sb->rsize = 2048;
		/* Windows ME may prefer this */
2527
		cFYI(1, "readsize set to minimum: 2048");
S
Steve French 已提交
2528 2529 2530 2531 2532 2533 2534 2535 2536 2537 2538 2539 2540 2541 2542 2543 2544
	}
	/* calculate prepath */
	cifs_sb->prepath = pvolume_info->prepath;
	if (cifs_sb->prepath) {
		cifs_sb->prepathlen = strlen(cifs_sb->prepath);
		/* we can not convert the / to \ in the path
		separators in the prefixpath yet because we do not
		know (until reset_cifs_unix_caps is called later)
		whether POSIX PATH CAP is available. We normalize
		the / to \ after reset_cifs_unix_caps is called */
		pvolume_info->prepath = NULL;
	} else
		cifs_sb->prepathlen = 0;
	cifs_sb->mnt_uid = pvolume_info->linux_uid;
	cifs_sb->mnt_gid = pvolume_info->linux_gid;
	cifs_sb->mnt_file_mode = pvolume_info->file_mode;
	cifs_sb->mnt_dir_mode = pvolume_info->dir_mode;
2545 2546
	cFYI(1, "file mode: 0x%x  dir mode: 0x%x",
		cifs_sb->mnt_file_mode, cifs_sb->mnt_dir_mode);
S
Steve French 已提交
2547 2548 2549 2550 2551 2552 2553 2554 2555 2556 2557 2558 2559 2560 2561

	if (pvolume_info->noperm)
		cifs_sb->mnt_cifs_flags |= CIFS_MOUNT_NO_PERM;
	if (pvolume_info->setuids)
		cifs_sb->mnt_cifs_flags |= CIFS_MOUNT_SET_UID;
	if (pvolume_info->server_ino)
		cifs_sb->mnt_cifs_flags |= CIFS_MOUNT_SERVER_INUM;
	if (pvolume_info->remap)
		cifs_sb->mnt_cifs_flags |= CIFS_MOUNT_MAP_SPECIAL_CHR;
	if (pvolume_info->no_xattr)
		cifs_sb->mnt_cifs_flags |= CIFS_MOUNT_NO_XATTR;
	if (pvolume_info->sfu_emul)
		cifs_sb->mnt_cifs_flags |= CIFS_MOUNT_UNX_EMUL;
	if (pvolume_info->nobrl)
		cifs_sb->mnt_cifs_flags |= CIFS_MOUNT_NO_BRL;
2562
	if (pvolume_info->nostrictsync)
S
Steve French 已提交
2563
		cifs_sb->mnt_cifs_flags |= CIFS_MOUNT_NOSSYNC;
2564 2565
	if (pvolume_info->mand_lock)
		cifs_sb->mnt_cifs_flags |= CIFS_MOUNT_NOPOSIXBRL;
S
Steve French 已提交
2566 2567 2568 2569 2570 2571 2572 2573
	if (pvolume_info->cifs_acl)
		cifs_sb->mnt_cifs_flags |= CIFS_MOUNT_CIFS_ACL;
	if (pvolume_info->override_uid)
		cifs_sb->mnt_cifs_flags |= CIFS_MOUNT_OVERR_UID;
	if (pvolume_info->override_gid)
		cifs_sb->mnt_cifs_flags |= CIFS_MOUNT_OVERR_GID;
	if (pvolume_info->dynperm)
		cifs_sb->mnt_cifs_flags |= CIFS_MOUNT_DYNPERM;
2574 2575
	if (pvolume_info->fsc)
		cifs_sb->mnt_cifs_flags |= CIFS_MOUNT_FSCACHE;
J
Jeff Layton 已提交
2576 2577 2578
	if (pvolume_info->multiuser)
		cifs_sb->mnt_cifs_flags |= (CIFS_MOUNT_MULTIUSER |
					    CIFS_MOUNT_NO_PERM);
S
Steve French 已提交
2579
	if (pvolume_info->direct_io) {
2580
		cFYI(1, "mounting share using direct i/o");
S
Steve French 已提交
2581 2582
		cifs_sb->mnt_cifs_flags |= CIFS_MOUNT_DIRECT_IO;
	}
2583 2584 2585 2586 2587 2588 2589 2590
	if (pvolume_info->mfsymlinks) {
		if (pvolume_info->sfu_emul) {
			cERROR(1,  "mount option mfsymlinks ignored if sfu "
				   "mount option is used");
		} else {
			cifs_sb->mnt_cifs_flags |= CIFS_MOUNT_MF_SYMLINKS;
		}
	}
S
Steve French 已提交
2591 2592

	if ((pvolume_info->cifs_acl) && (pvolume_info->dynperm))
2593 2594
		cERROR(1, "mount option dynperm ignored if cifsacl "
			   "mount option supported");
2595 2596
}

2597 2598 2599 2600 2601 2602 2603 2604 2605 2606 2607 2608 2609 2610 2611 2612 2613 2614 2615
static int
is_path_accessible(int xid, struct cifsTconInfo *tcon,
		   struct cifs_sb_info *cifs_sb, const char *full_path)
{
	int rc;
	FILE_ALL_INFO *pfile_info;

	pfile_info = kmalloc(sizeof(FILE_ALL_INFO), GFP_KERNEL);
	if (pfile_info == NULL)
		return -ENOMEM;

	rc = CIFSSMBQPathInfo(xid, tcon, full_path, pfile_info,
			      0 /* not legacy */, cifs_sb->local_nls,
			      cifs_sb->mnt_cifs_flags &
				CIFS_MOUNT_MAP_SPECIAL_CHR);
	kfree(pfile_info);
	return rc;
}

I
Igor Mammedov 已提交
2616 2617 2618 2619 2620
static void
cleanup_volume_info(struct smb_vol **pvolume_info)
{
	struct smb_vol *volume_info;

D
Dan Carpenter 已提交
2621
	if (!pvolume_info || !*pvolume_info)
I
Igor Mammedov 已提交
2622 2623 2624 2625 2626 2627 2628 2629 2630 2631 2632
		return;

	volume_info = *pvolume_info;
	kzfree(volume_info->password);
	kfree(volume_info->UNC);
	kfree(volume_info->prepath);
	kfree(volume_info);
	*pvolume_info = NULL;
	return;
}

S
Steve French 已提交
2633
#ifdef CONFIG_CIFS_DFS_UPCALL
I
Igor Mammedov 已提交
2634 2635 2636 2637 2638 2639 2640 2641 2642 2643 2644 2645 2646 2647 2648 2649 2650 2651 2652 2653 2654 2655 2656 2657 2658 2659 2660 2661 2662
/* build_path_to_root returns full path to root when
 * we do not have an exiting connection (tcon) */
static char *
build_unc_path_to_root(const struct smb_vol *volume_info,
		const struct cifs_sb_info *cifs_sb)
{
	char *full_path;

	int unc_len = strnlen(volume_info->UNC, MAX_TREE_SIZE + 1);
	full_path = kmalloc(unc_len + cifs_sb->prepathlen + 1, GFP_KERNEL);
	if (full_path == NULL)
		return ERR_PTR(-ENOMEM);

	strncpy(full_path, volume_info->UNC, unc_len);
	if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_POSIX_PATHS) {
		int i;
		for (i = 0; i < unc_len; i++) {
			if (full_path[i] == '\\')
				full_path[i] = '/';
		}
	}

	if (cifs_sb->prepathlen)
		strncpy(full_path + unc_len, cifs_sb->prepath,
				cifs_sb->prepathlen);

	full_path[unc_len + cifs_sb->prepathlen] = 0; /* add trailing null */
	return full_path;
}
S
Steve French 已提交
2663
#endif
I
Igor Mammedov 已提交
2664

L
Linus Torvalds 已提交
2665 2666
int
cifs_mount(struct super_block *sb, struct cifs_sb_info *cifs_sb,
I
Igor Mammedov 已提交
2667
		char *mount_data_global, const char *devname)
L
Linus Torvalds 已提交
2668
{
2669
	int rc;
L
Linus Torvalds 已提交
2670
	int xid;
2671
	struct smb_vol *volume_info;
2672 2673 2674
	struct cifsSesInfo *pSesInfo;
	struct cifsTconInfo *tcon;
	struct TCP_Server_Info *srvTcp;
2675
	char   *full_path;
S
Steve French 已提交
2676
	char *mount_data = mount_data_global;
2677
	struct tcon_link *tlink;
S
Steve French 已提交
2678
#ifdef CONFIG_CIFS_DFS_UPCALL
I
Igor Mammedov 已提交
2679 2680
	struct dfs_info3_param *referrals = NULL;
	unsigned int num_referrals = 0;
2681
	int referral_walks_count = 0;
I
Igor Mammedov 已提交
2682
try_mount_again:
S
Steve French 已提交
2683
#endif
2684 2685 2686 2687
	rc = 0;
	tcon = NULL;
	pSesInfo = NULL;
	srvTcp = NULL;
I
Igor Mammedov 已提交
2688
	full_path = NULL;
2689
	tlink = NULL;
L
Linus Torvalds 已提交
2690 2691 2692

	xid = GetXid();

2693 2694 2695 2696 2697
	volume_info = kzalloc(sizeof(struct smb_vol), GFP_KERNEL);
	if (!volume_info) {
		rc = -ENOMEM;
		goto out;
	}
2698

2699
	if (cifs_parse_mount_options(mount_data, devname, volume_info)) {
2700 2701
		rc = -EINVAL;
		goto out;
L
Linus Torvalds 已提交
2702 2703
	}

2704
	if (volume_info->nullauth) {
2705
		cFYI(1, "null user");
2706 2707
		volume_info->username = "";
	} else if (volume_info->username) {
L
Linus Torvalds 已提交
2708
		/* BB fixme parse for domain name here */
2709
		cFYI(1, "Username: %s", volume_info->username);
L
Linus Torvalds 已提交
2710
	} else {
2711
		cifserror("No username specified");
2712 2713
	/* In userspace mount helper we can get user name from alternate
	   locations such as env variables and files on disk */
2714 2715
		rc = -EINVAL;
		goto out;
L
Linus Torvalds 已提交
2716 2717 2718
	}

	/* this is needed for ASCII cp to Unicode converts */
2719
	if (volume_info->iocharset == NULL) {
2720 2721
		/* load_nls_default cannot return null */
		volume_info->local_nls = load_nls_default();
L
Linus Torvalds 已提交
2722
	} else {
2723 2724
		volume_info->local_nls = load_nls(volume_info->iocharset);
		if (volume_info->local_nls == NULL) {
2725 2726
			cERROR(1, "CIFS mount error: iocharset %s not found",
				 volume_info->iocharset);
2727 2728
			rc = -ELIBACC;
			goto out;
L
Linus Torvalds 已提交
2729 2730
		}
	}
2731
	cifs_sb->local_nls = volume_info->local_nls;
L
Linus Torvalds 已提交
2732

2733
	/* get a reference to a tcp session */
2734
	srvTcp = cifs_get_tcp_session(volume_info);
2735 2736 2737
	if (IS_ERR(srvTcp)) {
		rc = PTR_ERR(srvTcp);
		goto out;
L
Linus Torvalds 已提交
2738 2739
	}

2740 2741 2742 2743 2744 2745
	/* get a reference to a SMB session */
	pSesInfo = cifs_get_smb_ses(srvTcp, volume_info);
	if (IS_ERR(pSesInfo)) {
		rc = PTR_ERR(pSesInfo);
		pSesInfo = NULL;
		goto mount_fail_check;
L
Linus Torvalds 已提交
2746
	}
2747

2748 2749 2750 2751 2752
	setup_cifs_sb(volume_info, cifs_sb);
	if (pSesInfo->capabilities & CAP_LARGE_FILES)
		sb->s_maxbytes = MAX_LFS_FILESIZE;
	else
		sb->s_maxbytes = MAX_NON_LFS;
L
Linus Torvalds 已提交
2753

2754
	/* BB FIXME fix time_gran to be larger for LANMAN sessions */
L
Linus Torvalds 已提交
2755 2756
	sb->s_time_gran = 100;

2757 2758 2759 2760 2761
	/* search for existing tcon to this server share */
	tcon = cifs_get_tcon(pSesInfo, volume_info);
	if (IS_ERR(tcon)) {
		rc = PTR_ERR(tcon);
		tcon = NULL;
I
Igor Mammedov 已提交
2762
		goto remote_path_check;
2763
	}
I
Igor Mammedov 已提交
2764

S
Steve French 已提交
2765 2766 2767 2768 2769
	/* do not care if following two calls succeed - informational */
	if (!tcon->ipc) {
		CIFSSMBQFSDeviceInfo(xid, tcon);
		CIFSSMBQFSAttributeInfo(xid, tcon);
	}
2770

S
Steve French 已提交
2771 2772 2773 2774
	/* tell server which Unix caps we support */
	if (tcon->ses->capabilities & CAP_UNIX)
		/* reset of caps checks mount to see if unix extensions
		   disabled for just this mount */
2775
		reset_cifs_unix_caps(xid, tcon, sb, volume_info);
S
Steve French 已提交
2776 2777
	else
		tcon->unix_ext = 0; /* server does not support them */
2778

S
Steve French 已提交
2779 2780 2781
	/* convert forward to back slashes in prepath here if needed */
	if ((cifs_sb->mnt_cifs_flags & CIFS_MOUNT_POSIX_PATHS) == 0)
		convert_delimiter(cifs_sb->prepath, CIFS_DIR_SEP(cifs_sb));
2782

S
Steve French 已提交
2783 2784
	if ((tcon->unix_ext == 0) && (cifs_sb->rsize > (1024 * 127))) {
		cifs_sb->rsize = 1024 * 127;
2785
		cFYI(DBG2, "no very large read support, rsize now 127K");
L
Linus Torvalds 已提交
2786
	}
S
Steve French 已提交
2787 2788 2789 2790 2791 2792
	if (!(tcon->ses->capabilities & CAP_LARGE_WRITE_X))
		cifs_sb->wsize = min(cifs_sb->wsize,
			       (tcon->ses->server->maxBuf - MAX_CIFS_HDR_SIZE));
	if (!(tcon->ses->capabilities & CAP_LARGE_READ_X))
		cifs_sb->rsize = min(cifs_sb->rsize,
			       (tcon->ses->server->maxBuf - MAX_CIFS_HDR_SIZE));
L
Linus Torvalds 已提交
2793

I
Igor Mammedov 已提交
2794 2795 2796
remote_path_check:
	/* check if a whole path (including prepath) is not remote */
	if (!rc && cifs_sb->prepathlen && tcon) {
2797 2798 2799 2800 2801 2802 2803
		/* build_path_to_root works only when we have a valid tcon */
		full_path = cifs_build_path_to_root(cifs_sb);
		if (full_path == NULL) {
			rc = -ENOMEM;
			goto mount_fail_check;
		}
		rc = is_path_accessible(xid, tcon, cifs_sb, full_path);
I
Igor Mammedov 已提交
2804
		if (rc != -EREMOTE) {
2805 2806 2807 2808 2809 2810
			kfree(full_path);
			goto mount_fail_check;
		}
		kfree(full_path);
	}

I
Igor Mammedov 已提交
2811 2812
	/* get referral if needed */
	if (rc == -EREMOTE) {
2813
#ifdef CONFIG_CIFS_DFS_UPCALL
2814 2815 2816 2817 2818 2819 2820 2821 2822 2823
		if (referral_walks_count > MAX_NESTED_LINKS) {
			/*
			 * BB: when we implement proper loop detection,
			 *     we will remove this check. But now we need it
			 *     to prevent an indefinite loop if 'DFS tree' is
			 *     misconfigured (i.e. has loops).
			 */
			rc = -ELOOP;
			goto mount_fail_check;
		}
I
Igor Mammedov 已提交
2824 2825 2826 2827 2828 2829 2830 2831 2832 2833
		/* convert forward to back slashes in prepath here if needed */
		if ((cifs_sb->mnt_cifs_flags & CIFS_MOUNT_POSIX_PATHS) == 0)
			convert_delimiter(cifs_sb->prepath,
					CIFS_DIR_SEP(cifs_sb));
		full_path = build_unc_path_to_root(volume_info, cifs_sb);
		if (IS_ERR(full_path)) {
			rc = PTR_ERR(full_path);
			goto mount_fail_check;
		}

2834
		cFYI(1, "Getting referral for: %s", full_path);
I
Igor Mammedov 已提交
2835 2836 2837 2838 2839 2840 2841 2842
		rc = get_dfs_path(xid, pSesInfo , full_path + 1,
			cifs_sb->local_nls, &num_referrals, &referrals,
			cifs_sb->mnt_cifs_flags & CIFS_MOUNT_MAP_SPECIAL_CHR);
		if (!rc && num_referrals > 0) {
			char *fake_devname = NULL;

			if (mount_data != mount_data_global)
				kfree(mount_data);
2843

I
Igor Mammedov 已提交
2844 2845 2846
			mount_data = cifs_compose_mount_options(
					cifs_sb->mountdata, full_path + 1,
					referrals, &fake_devname);
2847

I
Igor Mammedov 已提交
2848
			free_dfs_info_array(referrals, num_referrals);
2849 2850 2851 2852 2853 2854 2855 2856
			kfree(fake_devname);
			kfree(full_path);

			if (IS_ERR(mount_data)) {
				rc = PTR_ERR(mount_data);
				mount_data = NULL;
				goto mount_fail_check;
			}
I
Igor Mammedov 已提交
2857 2858 2859 2860 2861 2862 2863

			if (tcon)
				cifs_put_tcon(tcon);
			else if (pSesInfo)
				cifs_put_smb_ses(pSesInfo);

			cleanup_volume_info(&volume_info);
2864
			referral_walks_count++;
2865
			FreeXid(xid);
I
Igor Mammedov 已提交
2866 2867
			goto try_mount_again;
		}
2868 2869 2870
#else /* No DFS support, return error on mount */
		rc = -EOPNOTSUPP;
#endif
I
Igor Mammedov 已提交
2871 2872
	}

2873 2874 2875 2876 2877 2878 2879 2880 2881 2882 2883 2884 2885 2886 2887 2888 2889 2890 2891 2892 2893 2894 2895 2896 2897 2898 2899 2900 2901
	if (rc)
		goto mount_fail_check;

	/* now, hang the tcon off of the superblock */
	tlink = kzalloc(sizeof *tlink, GFP_KERNEL);
	if (tlink == NULL) {
		rc = -ENOMEM;
		goto mount_fail_check;
	}

	tlink->tl_index = pSesInfo->linux_uid;
	tlink->tl_tcon = tcon;
	tlink->tl_time = jiffies;
	set_bit(TCON_LINK_MASTER, &tlink->tl_flags);
	set_bit(TCON_LINK_IN_TREE, &tlink->tl_flags);

	rc = radix_tree_preload(GFP_KERNEL);
	if (rc == -ENOMEM) {
		kfree(tlink);
		goto mount_fail_check;
	}

	spin_lock(&cifs_sb->tlink_tree_lock);
	radix_tree_insert(&cifs_sb->tlink_tree, pSesInfo->linux_uid, tlink);
	radix_tree_tag_set(&cifs_sb->tlink_tree, pSesInfo->linux_uid,
			   CIFS_TLINK_MASTER_TAG);
	spin_unlock(&cifs_sb->tlink_tree_lock);
	radix_tree_preload_end();

I
Igor Mammedov 已提交
2902 2903 2904 2905 2906 2907 2908 2909 2910 2911 2912 2913 2914 2915 2916 2917
mount_fail_check:
	/* on error free sesinfo and tcon struct if needed */
	if (rc) {
		if (mount_data != mount_data_global)
			kfree(mount_data);
		/* If find_unc succeeded then rc == 0 so we can not end */
		/* up accidently freeing someone elses tcon struct */
		if (tcon)
			cifs_put_tcon(tcon);
		else if (pSesInfo)
			cifs_put_smb_ses(pSesInfo);
		else
			cifs_put_tcp_session(srvTcp);
		goto out;
	}

2918
	/* volume_info->password is freed above when existing session found
L
Linus Torvalds 已提交
2919 2920 2921
	(in which case it is not needed anymore) but when new sesion is created
	the password ptr is put in the new session structure (in which case the
	password will be freed at unmount time) */
2922 2923
out:
	/* zero out password before freeing */
I
Igor Mammedov 已提交
2924
	cleanup_volume_info(&volume_info);
L
Linus Torvalds 已提交
2925 2926 2927 2928 2929 2930 2931 2932 2933 2934 2935 2936 2937 2938 2939
	FreeXid(xid);
	return rc;
}

int
CIFSTCon(unsigned int xid, struct cifsSesInfo *ses,
	 const char *tree, struct cifsTconInfo *tcon,
	 const struct nls_table *nls_codepage)
{
	struct smb_hdr *smb_buffer;
	struct smb_hdr *smb_buffer_response;
	TCONX_REQ *pSMB;
	TCONX_RSP *pSMBr;
	unsigned char *bcc_ptr;
	int rc = 0;
2940
	int length, bytes_left;
L
Linus Torvalds 已提交
2941 2942 2943 2944 2945 2946
	__u16 count;

	if (ses == NULL)
		return -EIO;

	smb_buffer = cifs_buf_get();
S
Steve French 已提交
2947
	if (smb_buffer == NULL)
L
Linus Torvalds 已提交
2948
		return -ENOMEM;
S
Steve French 已提交
2949

L
Linus Torvalds 已提交
2950 2951 2952 2953
	smb_buffer_response = smb_buffer;

	header_assemble(smb_buffer, SMB_COM_TREE_CONNECT_ANDX,
			NULL /*no tid */ , 4 /*wct */ );
2954 2955

	smb_buffer->Mid = GetNextMid(ses->server);
L
Linus Torvalds 已提交
2956 2957 2958 2959 2960 2961 2962
	smb_buffer->Uid = ses->Suid;
	pSMB = (TCONX_REQ *) smb_buffer;
	pSMBr = (TCONX_RSP *) smb_buffer_response;

	pSMB->AndXCommand = 0xFF;
	pSMB->Flags = cpu_to_le16(TCON_EXTENDED_SECINFO);
	bcc_ptr = &pSMB->Password[0];
S
Steve French 已提交
2963
	if ((ses->server->secMode) & SECMODE_USER) {
2964
		pSMB->PasswordLength = cpu_to_le16(1);	/* minimum */
2965
		*bcc_ptr = 0; /* password is null byte */
2966
		bcc_ptr++;              /* skip password */
2967
		/* already aligned so no need to do it below */
2968
	} else {
2969
		pSMB->PasswordLength = cpu_to_le16(CIFS_SESS_KEY_SIZE);
2970 2971 2972
		/* BB FIXME add code to fail this if NTLMv2 or Kerberos
		   specified as required (when that support is added to
		   the vfs in the future) as only NTLM or the much
2973
		   weaker LANMAN (which we do not send by default) is accepted
2974 2975
		   by Samba (not sure whether other servers allow
		   NTLMv2 password here) */
2976
#ifdef CONFIG_CIFS_WEAK_PW_HASH
2977
		if ((global_secflags & CIFSSEC_MAY_LANMAN) &&
J
Jeff Layton 已提交
2978 2979
		    (ses->server->secType == LANMAN))
			calc_lanman_hash(tcon->password, ses->server->cryptKey,
2980 2981 2982
					 ses->server->secMode &
					    SECMODE_PW_ENCRYPT ? true : false,
					 bcc_ptr);
2983 2984
		else
#endif /* CIFS_WEAK_PW_HASH */
J
Jeff Layton 已提交
2985
		SMBNTencrypt(tcon->password, ses->server->cryptKey,
2986 2987
			     bcc_ptr);

2988
		bcc_ptr += CIFS_SESS_KEY_SIZE;
S
Steve French 已提交
2989
		if (ses->capabilities & CAP_UNICODE) {
2990 2991 2992 2993
			/* must align unicode strings */
			*bcc_ptr = 0; /* null byte password */
			bcc_ptr++;
		}
2994
	}
L
Linus Torvalds 已提交
2995

2996
	if (ses->server->secMode &
2997
			(SECMODE_SIGN_REQUIRED | SECMODE_SIGN_ENABLED))
L
Linus Torvalds 已提交
2998 2999 3000 3001 3002 3003 3004 3005 3006 3007 3008
		smb_buffer->Flags2 |= SMBFLG2_SECURITY_SIGNATURE;

	if (ses->capabilities & CAP_STATUS32) {
		smb_buffer->Flags2 |= SMBFLG2_ERR_STATUS;
	}
	if (ses->capabilities & CAP_DFS) {
		smb_buffer->Flags2 |= SMBFLG2_DFS;
	}
	if (ses->capabilities & CAP_UNICODE) {
		smb_buffer->Flags2 |= SMBFLG2_UNICODE;
		length =
3009 3010
		    cifs_strtoUCS((__le16 *) bcc_ptr, tree,
			6 /* max utf8 char length in bytes */ *
3011 3012
			(/* server len*/ + 256 /* share len */), nls_codepage);
		bcc_ptr += 2 * length;	/* convert num 16 bit words to bytes */
L
Linus Torvalds 已提交
3013 3014 3015 3016 3017 3018 3019 3020 3021 3022 3023 3024
		bcc_ptr += 2;	/* skip trailing null */
	} else {		/* ASCII */
		strcpy(bcc_ptr, tree);
		bcc_ptr += strlen(tree) + 1;
	}
	strcpy(bcc_ptr, "?????");
	bcc_ptr += strlen("?????");
	bcc_ptr += 1;
	count = bcc_ptr - &pSMB->Password[0];
	pSMB->hdr.smb_buf_length += count;
	pSMB->ByteCount = cpu_to_le16(count);

3025 3026
	rc = SendReceive(xid, ses, smb_buffer, smb_buffer_response, &length,
			 CIFS_STD_OP);
L
Linus Torvalds 已提交
3027 3028 3029

	/* above now done in SendReceive */
	if ((rc == 0) && (tcon != NULL)) {
3030 3031
		bool is_unicode;

L
Linus Torvalds 已提交
3032
		tcon->tidStatus = CifsGood;
S
Steve French 已提交
3033
		tcon->need_reconnect = false;
L
Linus Torvalds 已提交
3034 3035
		tcon->tid = smb_buffer_response->Tid;
		bcc_ptr = pByteArea(smb_buffer_response);
3036 3037
		bytes_left = BCC(smb_buffer_response);
		length = strnlen(bcc_ptr, bytes_left - 2);
3038 3039 3040 3041 3042
		if (smb_buffer->Flags2 & SMBFLG2_UNICODE)
			is_unicode = true;
		else
			is_unicode = false;

3043

3044
		/* skip service field (NB: this field is always ASCII) */
3045 3046 3047
		if (length == 3) {
			if ((bcc_ptr[0] == 'I') && (bcc_ptr[1] == 'P') &&
			    (bcc_ptr[2] == 'C')) {
3048
				cFYI(1, "IPC connection");
3049 3050 3051 3052 3053
				tcon->ipc = 1;
			}
		} else if (length == 2) {
			if ((bcc_ptr[0] == 'A') && (bcc_ptr[1] == ':')) {
				/* the most common case */
3054
				cFYI(1, "disk share connection");
3055 3056
			}
		}
3057
		bcc_ptr += length + 1;
3058
		bytes_left -= (length + 1);
L
Linus Torvalds 已提交
3059
		strncpy(tcon->treeName, tree, MAX_TREE_SIZE);
3060 3061

		/* mostly informational -- no need to fail on error here */
3062
		kfree(tcon->nativeFileSystem);
3063
		tcon->nativeFileSystem = cifs_strndup_from_ucs(bcc_ptr,
3064
						      bytes_left, is_unicode,
3065 3066
						      nls_codepage);

3067
		cFYI(1, "nativeFileSystem=%s", tcon->nativeFileSystem);
3068

S
Steve French 已提交
3069
		if ((smb_buffer_response->WordCount == 3) ||
S
Steve French 已提交
3070 3071
			 (smb_buffer_response->WordCount == 7))
			/* field is in same location */
3072 3073 3074
			tcon->Flags = le16_to_cpu(pSMBr->OptionalSupport);
		else
			tcon->Flags = 0;
3075
		cFYI(1, "Tcon flags: 0x%x ", tcon->Flags);
L
Linus Torvalds 已提交
3076
	} else if ((rc == 0) && tcon == NULL) {
3077
		/* all we need to save for IPC$ connection */
L
Linus Torvalds 已提交
3078 3079 3080
		ses->ipc_tid = smb_buffer_response->Tid;
	}

3081
	cifs_buf_release(smb_buffer);
L
Linus Torvalds 已提交
3082 3083 3084 3085 3086 3087
	return rc;
}

int
cifs_umount(struct super_block *sb, struct cifs_sb_info *cifs_sb)
{
3088
	int i, ret;
3089
	char *tmp;
3090 3091 3092 3093 3094 3095 3096 3097 3098 3099 3100 3101 3102 3103 3104 3105 3106 3107
	struct tcon_link *tlink[8];
	unsigned long index = 0;

	do {
		spin_lock(&cifs_sb->tlink_tree_lock);
		ret = radix_tree_gang_lookup(&cifs_sb->tlink_tree,
					     (void **)tlink, index,
					     ARRAY_SIZE(tlink));
		/* increment index for next pass */
		if (ret > 0)
			index = tlink[ret - 1]->tl_index + 1;
		for (i = 0; i < ret; i++) {
			cifs_get_tlink(tlink[i]);
			clear_bit(TCON_LINK_IN_TREE, &tlink[i]->tl_flags);
			radix_tree_delete(&cifs_sb->tlink_tree,
							tlink[i]->tl_index);
		}
		spin_unlock(&cifs_sb->tlink_tree_lock);
L
Linus Torvalds 已提交
3108

3109 3110 3111
		for (i = 0; i < ret; i++)
			cifs_put_tlink(tlink[i]);
	} while (ret != 0);
3112

3113 3114 3115 3116
	tmp = cifs_sb->prepath;
	cifs_sb->prepathlen = 0;
	cifs_sb->prepath = NULL;
	kfree(tmp);
L
Linus Torvalds 已提交
3117

3118
	return 0;
3119
}
L
Linus Torvalds 已提交
3120

3121
int cifs_negotiate_protocol(unsigned int xid, struct cifsSesInfo *ses)
L
Linus Torvalds 已提交
3122 3123
{
	int rc = 0;
3124
	struct TCP_Server_Info *server = ses->server;
L
Linus Torvalds 已提交
3125

3126 3127 3128 3129 3130 3131 3132 3133 3134 3135
	/* only send once per connect */
	if (server->maxBuf != 0)
		return 0;

	rc = CIFSSMBNegotiate(xid, ses);
	if (rc == -EAGAIN) {
		/* retry only once on 1st time connection */
		rc = CIFSSMBNegotiate(xid, ses);
		if (rc == -EAGAIN)
			rc = -EHOSTDOWN;
L
Linus Torvalds 已提交
3136
	}
3137 3138 3139 3140 3141 3142 3143
	if (rc == 0) {
		spin_lock(&GlobalMid_Lock);
		if (server->tcpStatus != CifsExiting)
			server->tcpStatus = CifsGood;
		else
			rc = -EHOSTDOWN;
		spin_unlock(&GlobalMid_Lock);
3144

3145 3146 3147 3148 3149 3150 3151 3152 3153 3154 3155
	}

	return rc;
}


int cifs_setup_session(unsigned int xid, struct cifsSesInfo *ses,
			struct nls_table *nls_info)
{
	int rc = 0;
	struct TCP_Server_Info *server = ses->server;
3156

3157 3158
	ses->flags = 0;
	ses->capabilities = server->capabilities;
3159
	if (linuxExtEnabled == 0)
3160
		ses->capabilities &= (~CAP_UNIX);
3161

3162 3163
	cFYI(1, "Security Mode: 0x%x Capabilities: 0x%x TimeAdjust: %d",
		 server->secMode, server->capabilities, server->timeAdj);
3164

3165
	rc = CIFS_SessSetup(xid, ses, nls_info);
3166
	if (rc) {
3167
		cERROR(1, "Send error in SessSetup = %d", rc);
3168
	} else {
3169
		cFYI(1, "CIFS Session Established successfully");
3170
		spin_lock(&GlobalMid_Lock);
3171 3172
		ses->status = CifsGood;
		ses->need_reconnect = false;
3173
		spin_unlock(&GlobalMid_Lock);
L
Linus Torvalds 已提交
3174
	}
3175

L
Linus Torvalds 已提交
3176 3177 3178
	return rc;
}

3179 3180 3181 3182 3183 3184 3185 3186 3187 3188 3189 3190 3191 3192 3193 3194 3195 3196 3197 3198 3199 3200 3201 3202 3203 3204 3205 3206 3207 3208 3209 3210 3211 3212 3213 3214 3215 3216 3217 3218 3219 3220 3221 3222 3223 3224 3225 3226 3227 3228 3229 3230 3231 3232 3233 3234 3235 3236 3237 3238 3239 3240 3241 3242 3243 3244 3245 3246 3247 3248 3249 3250 3251 3252 3253 3254 3255 3256 3257 3258 3259 3260 3261 3262 3263 3264 3265 3266 3267 3268 3269 3270 3271 3272 3273 3274 3275 3276 3277 3278 3279 3280 3281 3282 3283 3284 3285 3286 3287 3288 3289 3290 3291 3292 3293 3294 3295 3296 3297 3298 3299 3300 3301 3302 3303 3304 3305 3306 3307 3308 3309 3310 3311 3312 3313 3314 3315 3316 3317 3318 3319 3320 3321 3322 3323 3324 3325 3326 3327 3328 3329 3330 3331 3332 3333 3334 3335 3336 3337 3338 3339 3340 3341 3342 3343 3344 3345 3346 3347 3348 3349 3350 3351 3352 3353 3354 3355 3356 3357 3358 3359 3360 3361 3362 3363 3364 3365
struct cifsTconInfo *
cifs_construct_tcon(struct cifs_sb_info *cifs_sb, uid_t fsuid)
{
	struct cifsTconInfo *master_tcon = cifs_sb_master_tcon(cifs_sb);
	struct cifsSesInfo *ses;
	struct cifsTconInfo *tcon = NULL;
	struct smb_vol *vol_info;
	char username[MAX_USERNAME_SIZE + 1];

	vol_info = kzalloc(sizeof(*vol_info), GFP_KERNEL);
	if (vol_info == NULL) {
		tcon = ERR_PTR(-ENOMEM);
		goto out;
	}

	snprintf(username, MAX_USERNAME_SIZE, "krb50x%x", fsuid);
	vol_info->username = username;
	vol_info->local_nls = cifs_sb->local_nls;
	vol_info->linux_uid = fsuid;
	vol_info->cred_uid = fsuid;
	vol_info->UNC = master_tcon->treeName;
	vol_info->retry = master_tcon->retry;
	vol_info->nocase = master_tcon->nocase;
	vol_info->local_lease = master_tcon->local_lease;
	vol_info->no_linux_ext = !master_tcon->unix_ext;

	/* FIXME: allow for other secFlg settings */
	vol_info->secFlg = CIFSSEC_MUST_KRB5;

	/* get a reference for the same TCP session */
	write_lock(&cifs_tcp_ses_lock);
	++master_tcon->ses->server->srv_count;
	write_unlock(&cifs_tcp_ses_lock);

	ses = cifs_get_smb_ses(master_tcon->ses->server, vol_info);
	if (IS_ERR(ses)) {
		tcon = (struct cifsTconInfo *)ses;
		cifs_put_tcp_session(master_tcon->ses->server);
		goto out;
	}

	tcon = cifs_get_tcon(ses, vol_info);
	if (IS_ERR(tcon)) {
		cifs_put_smb_ses(ses);
		goto out;
	}

	if (ses->capabilities & CAP_UNIX)
		reset_cifs_unix_caps(0, tcon, NULL, vol_info);
out:
	kfree(vol_info);

	return tcon;
}

static struct tcon_link *
cifs_sb_master_tlink(struct cifs_sb_info *cifs_sb)
{
	struct tcon_link *tlink;
	unsigned int ret;

	spin_lock(&cifs_sb->tlink_tree_lock);
	ret = radix_tree_gang_lookup_tag(&cifs_sb->tlink_tree, (void **)&tlink,
					0, 1, CIFS_TLINK_MASTER_TAG);
	spin_unlock(&cifs_sb->tlink_tree_lock);

	/* the master tcon should always be present */
	if (ret == 0)
		BUG();

	return tlink;
}

struct cifsTconInfo *
cifs_sb_master_tcon(struct cifs_sb_info *cifs_sb)
{
	return tlink_tcon(cifs_sb_master_tlink(cifs_sb));
}

static int
cifs_sb_tcon_pending_wait(void *unused)
{
	schedule();
	return signal_pending(current) ? -ERESTARTSYS : 0;
}

/*
 * Find or construct an appropriate tcon given a cifs_sb and the fsuid of the
 * current task.
 *
 * If the superblock doesn't refer to a multiuser mount, then just return
 * the master tcon for the mount.
 *
 * First, search the radix tree for an existing tcon for this fsuid. If one
 * exists, then check to see if it's pending construction. If it is then wait
 * for construction to complete. Once it's no longer pending, check to see if
 * it failed and either return an error or retry construction, depending on
 * the timeout.
 *
 * If one doesn't exist then insert a new tcon_link struct into the tree and
 * try to construct a new one.
 */
struct tcon_link *
cifs_sb_tlink(struct cifs_sb_info *cifs_sb)
{
	int ret;
	unsigned long fsuid = (unsigned long) current_fsuid();
	struct tcon_link *tlink, *newtlink;

	if (!(cifs_sb->mnt_cifs_flags & CIFS_MOUNT_MULTIUSER))
		return cifs_get_tlink(cifs_sb_master_tlink(cifs_sb));

	spin_lock(&cifs_sb->tlink_tree_lock);
	tlink = radix_tree_lookup(&cifs_sb->tlink_tree, fsuid);
	if (tlink)
		cifs_get_tlink(tlink);
	spin_unlock(&cifs_sb->tlink_tree_lock);

	if (tlink == NULL) {
		newtlink = kzalloc(sizeof(*tlink), GFP_KERNEL);
		if (newtlink == NULL)
			return ERR_PTR(-ENOMEM);
		newtlink->tl_index = fsuid;
		newtlink->tl_tcon = ERR_PTR(-EACCES);
		set_bit(TCON_LINK_PENDING, &newtlink->tl_flags);
		set_bit(TCON_LINK_IN_TREE, &newtlink->tl_flags);
		cifs_get_tlink(newtlink);

		ret = radix_tree_preload(GFP_KERNEL);
		if (ret != 0) {
			kfree(newtlink);
			return ERR_PTR(ret);
		}

		spin_lock(&cifs_sb->tlink_tree_lock);
		/* was one inserted after previous search? */
		tlink = radix_tree_lookup(&cifs_sb->tlink_tree, fsuid);
		if (tlink) {
			cifs_get_tlink(tlink);
			spin_unlock(&cifs_sb->tlink_tree_lock);
			radix_tree_preload_end();
			kfree(newtlink);
			goto wait_for_construction;
		}
		ret = radix_tree_insert(&cifs_sb->tlink_tree, fsuid, newtlink);
		spin_unlock(&cifs_sb->tlink_tree_lock);
		radix_tree_preload_end();
		if (ret) {
			kfree(newtlink);
			return ERR_PTR(ret);
		}
		tlink = newtlink;
	} else {
wait_for_construction:
		ret = wait_on_bit(&tlink->tl_flags, TCON_LINK_PENDING,
				  cifs_sb_tcon_pending_wait,
				  TASK_INTERRUPTIBLE);
		if (ret) {
			cifs_put_tlink(tlink);
			return ERR_PTR(ret);
		}

		/* if it's good, return it */
		if (!IS_ERR(tlink->tl_tcon))
			return tlink;

		/* return error if we tried this already recently */
		if (time_before(jiffies, tlink->tl_time + TLINK_ERROR_EXPIRE)) {
			cifs_put_tlink(tlink);
			return ERR_PTR(-EACCES);
		}

		if (test_and_set_bit(TCON_LINK_PENDING, &tlink->tl_flags))
			goto wait_for_construction;
	}

	tlink->tl_tcon = cifs_construct_tcon(cifs_sb, fsuid);
	clear_bit(TCON_LINK_PENDING, &tlink->tl_flags);
	wake_up_bit(&tlink->tl_flags, TCON_LINK_PENDING);

	if (IS_ERR(tlink->tl_tcon)) {
		cifs_put_tlink(tlink);
		return ERR_PTR(-EACCES);
	}

	return tlink;
}