Skip to content
Projects
Groups
Snippets
Help
This project
Loading...
Sign in / Register
Toggle navigation
E
etercifs
Project
Project
Details
Activity
Cycle Analytics
Repository
Repository
Files
Commits
Branches
Tags
Contributors
Graph
Compare
Charts
Issues
0
Issues
0
List
Board
Labels
Milestones
Merge Requests
0
Merge Requests
0
CI / CD
CI / CD
Pipelines
Jobs
Schedules
Charts
Wiki
Wiki
Members
Members
Collapse sidebar
Close sidebar
Activity
Graph
Charts
Create a new issue
Jobs
Commits
Issue Boards
Open sidebar
etersoft
etercifs
Commits
d5b88c2b
Commit
d5b88c2b
authored
Jul 02, 2016
by
Pavel Shilovsky
Browse files
Options
Browse Files
Download
Email Patches
Plain Diff
Update 3.18 sources from stable (v3.18.36)
parent
25188977
Hide whitespace changes
Inline
Side-by-side
Showing
17 changed files
with
252 additions
and
185 deletions
+252
-185
cifs_debug.c
sources/3.18/cifs_debug.c
+4
-22
cifs_debug.h
sources/3.18/cifs_debug.h
+5
-7
cifs_spnego.c
sources/3.18/cifs_spnego.c
+67
-0
cifsencrypt.c
sources/3.18/cifsencrypt.c
+1
-1
cifsfs.c
sources/3.18/cifsfs.c
+2
-2
cifsfs.h
sources/3.18/cifsfs.h
+4
-8
cifsproto.h
sources/3.18/cifsproto.h
+2
-0
cifssmb.c
sources/3.18/cifssmb.c
+20
-6
connect.c
sources/3.18/connect.c
+19
-34
misc.c
sources/3.18/misc.c
+2
-30
readdir.c
sources/3.18/readdir.c
+1
-0
sess.c
sources/3.18/sess.c
+80
-59
smb2glob.h
sources/3.18/smb2glob.h
+1
-0
smb2inode.c
sources/3.18/smb2inode.c
+6
-2
smb2pdu.c
sources/3.18/smb2pdu.c
+30
-10
smb2proto.h
sources/3.18/smb2proto.h
+2
-0
transport.c
sources/3.18/transport.c
+6
-4
No files found.
sources/3.18/cifs_debug.c
View file @
d5b88c2b
...
...
@@ -34,27 +34,9 @@
void
cifs_dump_mem
(
char
*
label
,
void
*
data
,
int
length
)
{
int
i
,
j
;
int
*
intptr
=
data
;
char
*
charptr
=
data
;
char
buf
[
10
],
line
[
80
];
printk
(
KERN_DEBUG
"%s: dump of %d bytes of data at 0x%p
\n
"
,
label
,
length
,
data
);
for
(
i
=
0
;
i
<
length
;
i
+=
16
)
{
line
[
0
]
=
0
;
for
(
j
=
0
;
(
j
<
4
)
&&
(
i
+
j
*
4
<
length
);
j
++
)
{
sprintf
(
buf
,
" %08x"
,
intptr
[
i
/
4
+
j
]);
strcat
(
line
,
buf
);
}
buf
[
0
]
=
' '
;
buf
[
2
]
=
0
;
for
(
j
=
0
;
(
j
<
16
)
&&
(
i
+
j
<
length
);
j
++
)
{
buf
[
1
]
=
isprint
(
charptr
[
i
+
j
])
?
charptr
[
i
+
j
]
:
'.'
;
strcat
(
line
,
buf
);
}
printk
(
KERN_DEBUG
"%s
\n
"
,
line
);
}
pr_debug
(
"%s: dump of %d bytes of data at 0x%p
\n
"
,
label
,
length
,
data
);
print_hex_dump
(
KERN_DEBUG
,
""
,
DUMP_PREFIX_OFFSET
,
16
,
4
,
data
,
length
,
true
);
}
#ifdef CONFIG_CIFS_DEBUG
...
...
@@ -68,7 +50,7 @@ void cifs_vfs_err(const char *fmt, ...)
vaf
.
fmt
=
fmt
;
vaf
.
va
=
&
args
;
pr
intk
(
KERN_ERR
"CIFS VFS: %pV"
,
&
vaf
);
pr
_err_ratelimited
(
"CIFS VFS: %pV"
,
&
vaf
);
va_end
(
args
);
}
...
...
sources/3.18/cifs_debug.h
View file @
d5b88c2b
...
...
@@ -51,15 +51,13 @@ __printf(1, 2) void cifs_vfs_err(const char *fmt, ...);
/* information message: e.g., configuration, major event */
#define cifs_dbg(type, fmt, ...) \
do { \
if (type == FYI) { \
if (cifsFYI & CIFS_INFO) { \
printk(KERN_DEBUG "%s: " fmt, \
__FILE__, ##__VA_ARGS__); \
} \
if (type == FYI && cifsFYI & CIFS_INFO) { \
pr_debug_ratelimited("%s: " \
fmt, __FILE__, ##__VA_ARGS__); \
} else if (type == VFS) { \
cifs_vfs_err(fmt, ##__VA_ARGS__); \
} else if (type == NOISY && type != 0) { \
pr
intk(KERN_DEBUG fmt, ##__VA_ARGS__);
\
pr
_debug_ratelimited(fmt, ##__VA_ARGS__);
\
} \
} while (0)
...
...
@@ -71,7 +69,7 @@ do { \
#define cifs_dbg(type, fmt, ...) \
do { \
if (0) \
pr
intk(KERN_DEBUG fmt, ##__VA_ARGS__);
\
pr
_debug(fmt, ##__VA_ARGS__);
\
} while (0)
#endif
...
...
sources/3.18/cifs_spnego.c
View file @
d5b88c2b
...
...
@@ -24,10 +24,13 @@
#include <linux/string.h>
#include <keys/user-type.h>
#include <linux/key-type.h>
#include <linux/keyctl.h>
#include <linux/inet.h>
#include "cifsglob.h"
#include "cifs_spnego.h"
#include "cifs_debug.h"
#include "cifsproto.h"
static
const
struct
cred
*
spnego_cred
;
/* create a new cifs key */
static
int
...
...
@@ -102,6 +105,7 @@ cifs_get_spnego_key(struct cifs_ses *sesInfo)
size_t
desc_len
;
struct
key
*
spnego_key
;
const
char
*
hostname
=
server
->
hostname
;
const
struct
cred
*
saved_cred
;
/* length of fields (with semicolons): ver=0xyz ip4=ipaddress
host=hostname sec=mechanism uid=0xFF user=username */
...
...
@@ -163,7 +167,9 @@ cifs_get_spnego_key(struct cifs_ses *sesInfo)
sprintf
(
dp
,
";pid=0x%x"
,
current
->
pid
);
cifs_dbg
(
FYI
,
"key description = %s
\n
"
,
description
);
saved_cred
=
override_creds
(
spnego_cred
);
spnego_key
=
request_key
(
&
cifs_spnego_key_type
,
description
,
""
);
revert_creds
(
saved_cred
);
#ifdef CONFIG_CIFS_DEBUG2
if
(
cifsFYI
&&
!
IS_ERR
(
spnego_key
))
{
...
...
@@ -177,3 +183,64 @@ out:
kfree
(
description
);
return
spnego_key
;
}
int
init_cifs_spnego
(
void
)
{
struct
cred
*
cred
;
struct
key
*
keyring
;
int
ret
;
cifs_dbg
(
FYI
,
"Registering the %s key type
\n
"
,
cifs_spnego_key_type
.
name
);
/*
* Create an override credential set with special thread keyring for
* spnego upcalls.
*/
cred
=
prepare_kernel_cred
(
NULL
);
if
(
!
cred
)
return
-
ENOMEM
;
keyring
=
keyring_alloc
(
".cifs_spnego"
,
GLOBAL_ROOT_UID
,
GLOBAL_ROOT_GID
,
cred
,
(
KEY_POS_ALL
&
~
KEY_POS_SETATTR
)
|
KEY_USR_VIEW
|
KEY_USR_READ
,
KEY_ALLOC_NOT_IN_QUOTA
,
NULL
);
if
(
IS_ERR
(
keyring
))
{
ret
=
PTR_ERR
(
keyring
);
goto
failed_put_cred
;
}
ret
=
register_key_type
(
&
cifs_spnego_key_type
);
if
(
ret
<
0
)
goto
failed_put_key
;
/*
* instruct request_key() to use this special keyring as a cache for
* the results it looks up
*/
set_bit
(
KEY_FLAG_ROOT_CAN_CLEAR
,
&
keyring
->
flags
);
cred
->
thread_keyring
=
keyring
;
cred
->
jit_keyring
=
KEY_REQKEY_DEFL_THREAD_KEYRING
;
spnego_cred
=
cred
;
cifs_dbg
(
FYI
,
"cifs spnego keyring: %d
\n
"
,
key_serial
(
keyring
));
return
0
;
failed_put_key:
key_put
(
keyring
);
failed_put_cred:
put_cred
(
cred
);
return
ret
;
}
void
exit_cifs_spnego
(
void
)
{
key_revoke
(
spnego_cred
->
thread_keyring
);
unregister_key_type
(
&
cifs_spnego_key_type
);
put_cred
(
spnego_cred
);
cifs_dbg
(
FYI
,
"Unregistered %s key type
\n
"
,
cifs_spnego_key_type
.
name
);
}
sources/3.18/cifsencrypt.c
View file @
d5b88c2b
...
...
@@ -710,7 +710,7 @@ setup_ntlmv2_rsp(struct cifs_ses *ses, const struct nls_table *nls_cp)
ses
->
auth_key
.
response
=
kmalloc
(
baselen
+
tilen
,
GFP_KERNEL
);
if
(
!
ses
->
auth_key
.
response
)
{
rc
=
ENOMEM
;
rc
=
-
ENOMEM
;
ses
->
auth_key
.
len
=
0
;
goto
setup_ntlmv2_rsp_ret
;
}
...
...
sources/3.18/cifsfs.c
View file @
d5b88c2b
...
...
@@ -1252,7 +1252,7 @@ init_cifs(void)
goto
out_destroy_mids
;
#ifdef CONFIG_CIFS_UPCALL
rc
=
register_key_type
(
&
cifs_spnego_key_type
);
rc
=
init_cifs_spnego
(
);
if
(
rc
)
goto
out_destroy_request_bufs
;
#endif
/* CONFIG_CIFS_UPCALL */
...
...
@@ -1275,7 +1275,7 @@ out_init_cifs_idmap:
out_register_key_type:
#endif
#ifdef CONFIG_CIFS_UPCALL
unregister_key_type
(
&
cifs_spnego_key_type
);
exit_cifs_spnego
(
);
out_destroy_request_bufs:
#endif
cifs_destroy_request_bufs
();
...
...
sources/3.18/cifsfs.h
View file @
d5b88c2b
...
...
@@ -31,19 +31,15 @@
* so that it will fit. We use hash_64 to convert the value to 31 bits, and
* then add 1, to ensure that we don't end up with a 0 as the value.
*/
#if BITS_PER_LONG == 64
static
inline
ino_t
cifs_uniqueid_to_ino_t
(
u64
fileid
)
{
if
((
sizeof
(
ino_t
))
<
(
sizeof
(
u64
)))
return
(
ino_t
)
hash_64
(
fileid
,
(
sizeof
(
ino_t
)
*
8
)
-
1
)
+
1
;
return
(
ino_t
)
fileid
;
}
#else
static
inline
ino_t
cifs_uniqueid_to_ino_t
(
u64
fileid
)
{
return
(
ino_t
)
hash_64
(
fileid
,
(
sizeof
(
ino_t
)
*
8
)
-
1
)
+
1
;
}
#endif
extern
struct
file_system_type
cifs_fs_type
;
extern
const
struct
address_space_operations
cifs_addr_ops
;
...
...
sources/3.18/cifsproto.h
View file @
d5b88c2b
...
...
@@ -60,6 +60,8 @@ do { \
} while (0)
extern
int
init_cifs_idmap
(
void
);
extern
void
exit_cifs_idmap
(
void
);
extern
int
init_cifs_spnego
(
void
);
extern
void
exit_cifs_spnego
(
void
);
extern
char
*
build_path_from_dentry
(
struct
dentry
*
);
extern
char
*
cifs_build_path_to_root
(
struct
smb_vol
*
vol
,
struct
cifs_sb_info
*
cifs_sb
,
...
...
sources/3.18/cifssmb.c
View file @
d5b88c2b
...
...
@@ -625,9 +625,8 @@ CIFSSMBNegotiate(const unsigned int xid, struct cifs_ses *ses)
server
->
negflavor
=
CIFS_NEGFLAVOR_UNENCAP
;
memcpy
(
ses
->
server
->
cryptkey
,
pSMBr
->
u
.
EncryptionKey
,
CIFS_CRYPTO_KEY_SIZE
);
}
else
if
((
pSMBr
->
hdr
.
Flags2
&
SMBFLG2_EXT_SEC
||
server
->
capabilities
&
CAP_EXTENDED_SECURITY
)
&&
(
pSMBr
->
EncryptionKeyLength
==
0
))
{
}
else
if
(
pSMBr
->
hdr
.
Flags2
&
SMBFLG2_EXT_SEC
||
server
->
capabilities
&
CAP_EXTENDED_SECURITY
)
{
server
->
negflavor
=
CIFS_NEGFLAVOR_EXTENDED
;
rc
=
decode_ext_sec_blob
(
ses
,
pSMBr
);
}
else
if
(
server
->
sec_mode
&
SECMODE_PW_ENCRYPT
)
{
...
...
@@ -1402,11 +1401,10 @@ openRetry:
* current bigbuf.
*/
static
int
cifs_readv_discard
(
struct
TCP_Server_Info
*
server
,
struct
mid_q_entry
*
mid
)
discard_remaining_data
(
struct
TCP_Server_Info
*
server
)
{
unsigned
int
rfclen
=
get_rfc1002_length
(
server
->
smallbuf
);
int
remaining
=
rfclen
+
4
-
server
->
total_read
;
struct
cifs_readdata
*
rdata
=
mid
->
callback_data
;
while
(
remaining
>
0
)
{
int
length
;
...
...
@@ -1420,10 +1418,20 @@ cifs_readv_discard(struct TCP_Server_Info *server, struct mid_q_entry *mid)
remaining
-=
length
;
}
dequeue_mid
(
mid
,
rdata
->
result
);
return
0
;
}
static
int
cifs_readv_discard
(
struct
TCP_Server_Info
*
server
,
struct
mid_q_entry
*
mid
)
{
int
length
;
struct
cifs_readdata
*
rdata
=
mid
->
callback_data
;
length
=
discard_remaining_data
(
server
);
dequeue_mid
(
mid
,
rdata
->
result
);
return
length
;
}
int
cifs_readv_receive
(
struct
TCP_Server_Info
*
server
,
struct
mid_q_entry
*
mid
)
{
...
...
@@ -1452,6 +1460,12 @@ cifs_readv_receive(struct TCP_Server_Info *server, struct mid_q_entry *mid)
return
length
;
server
->
total_read
+=
length
;
if
(
server
->
ops
->
is_status_pending
&&
server
->
ops
->
is_status_pending
(
buf
,
server
,
0
))
{
discard_remaining_data
(
server
);
return
-
1
;
}
/* Was the SMB read successful? */
rdata
->
result
=
server
->
ops
->
map_error
(
buf
,
false
);
if
(
rdata
->
result
!=
0
)
{
...
...
sources/3.18/connect.c
View file @
d5b88c2b
...
...
@@ -358,7 +358,6 @@ cifs_reconnect(struct TCP_Server_Info *server)
server
->
session_key
.
response
=
NULL
;
server
->
session_key
.
len
=
0
;
server
->
lstrp
=
jiffies
;
mutex_unlock
(
&
server
->
srv_mutex
);
/* mark submitted MIDs for retry and issue callback */
INIT_LIST_HEAD
(
&
retry_list
);
...
...
@@ -371,6 +370,7 @@ cifs_reconnect(struct TCP_Server_Info *server)
list_move
(
&
mid_entry
->
qhead
,
&
retry_list
);
}
spin_unlock
(
&
GlobalMid_Lock
);
mutex_unlock
(
&
server
->
srv_mutex
);
cifs_dbg
(
FYI
,
"%s: issuing mid callbacks
\n
"
,
__func__
);
list_for_each_safe
(
tmp
,
tmp2
,
&
retry_list
)
{
...
...
@@ -1471,9 +1471,7 @@ cifs_parse_mount_options(const char *mountdata, const char *devname,
vol
->
seal
=
1
;
break
;
case
Opt_noac
:
printk
(
KERN_WARNING
"CIFS: Mount option noac not "
"supported. Instead set "
"/proc/fs/cifs/LookupCacheEnabled to 0
\n
"
);
pr_warn
(
"CIFS: Mount option noac not supported. Instead set /proc/fs/cifs/LookupCacheEnabled to 0
\n
"
);
break
;
case
Opt_fsc
:
#ifndef CONFIG_CIFS_FSCACHE
...
...
@@ -1603,7 +1601,7 @@ cifs_parse_mount_options(const char *mountdata, const char *devname,
if
(
strnlen
(
string
,
CIFS_MAX_USERNAME_LEN
)
>
CIFS_MAX_USERNAME_LEN
)
{
pr
intk
(
KERN_WARNING
"CIFS: username too long
\n
"
);
pr
_warn
(
"CIFS: username too long
\n
"
);
goto
cifs_parse_mount_err
;
}
vol
->
username
=
kstrdup
(
string
,
GFP_KERNEL
);
...
...
@@ -1667,8 +1665,7 @@ cifs_parse_mount_options(const char *mountdata, const char *devname,
temp_len
=
strlen
(
value
);
vol
->
password
=
kzalloc
(
temp_len
+
1
,
GFP_KERNEL
);
if
(
vol
->
password
==
NULL
)
{
printk
(
KERN_WARNING
"CIFS: no memory "
"for password
\n
"
);
pr_warn
(
"CIFS: no memory for password
\n
"
);
goto
cifs_parse_mount_err
;
}
...
...
@@ -1692,8 +1689,7 @@ cifs_parse_mount_options(const char *mountdata, const char *devname,
if
(
!
cifs_convert_address
(
dstaddr
,
string
,
strlen
(
string
)))
{
printk
(
KERN_ERR
"CIFS: bad ip= option (%s).
\n
"
,
string
);
pr_err
(
"CIFS: bad ip= option (%s).
\n
"
,
string
);
goto
cifs_parse_mount_err
;
}
got_ip
=
true
;
...
...
@@ -1705,15 +1701,13 @@ cifs_parse_mount_options(const char *mountdata, const char *devname,
if
(
strnlen
(
string
,
CIFS_MAX_DOMAINNAME_LEN
)
==
CIFS_MAX_DOMAINNAME_LEN
)
{
printk
(
KERN_WARNING
"CIFS: domain name too"
" long
\n
"
);
pr_warn
(
"CIFS: domain name too long
\n
"
);
goto
cifs_parse_mount_err
;
}
vol
->
domainname
=
kstrdup
(
string
,
GFP_KERNEL
);
if
(
!
vol
->
domainname
)
{
printk
(
KERN_WARNING
"CIFS: no memory "
"for domainname
\n
"
);
pr_warn
(
"CIFS: no memory for domainname
\n
"
);
goto
cifs_parse_mount_err
;
}
cifs_dbg
(
FYI
,
"Domain name set
\n
"
);
...
...
@@ -1726,8 +1720,8 @@ cifs_parse_mount_options(const char *mountdata, const char *devname,
if
(
!
cifs_convert_address
(
(
struct
sockaddr
*
)
&
vol
->
srcaddr
,
string
,
strlen
(
string
)))
{
pr
intk
(
KERN_WARNING
"CIFS: Could not parse"
" srcaddr: %s
\n
"
,
string
);
pr
_warn
(
"CIFS: Could not parse srcaddr: %s
\n
"
,
string
);
goto
cifs_parse_mount_err
;
}
break
;
...
...
@@ -1737,8 +1731,7 @@ cifs_parse_mount_options(const char *mountdata, const char *devname,
goto
out_nomem
;
if
(
strnlen
(
string
,
1024
)
>=
65
)
{
printk
(
KERN_WARNING
"CIFS: iocharset name "
"too long.
\n
"
);
pr_warn
(
"CIFS: iocharset name too long.
\n
"
);
goto
cifs_parse_mount_err
;
}
...
...
@@ -1746,8 +1739,7 @@ cifs_parse_mount_options(const char *mountdata, const char *devname,
vol
->
iocharset
=
kstrdup
(
string
,
GFP_KERNEL
);
if
(
!
vol
->
iocharset
)
{
printk
(
KERN_WARNING
"CIFS: no memory"
"for charset
\n
"
);
pr_warn
(
"CIFS: no memory for charset
\n
"
);
goto
cifs_parse_mount_err
;
}
}
...
...
@@ -1778,9 +1770,7 @@ cifs_parse_mount_options(const char *mountdata, const char *devname,
* set at top of the function
*/
if
(
i
==
RFC1001_NAME_LEN
&&
string
[
i
]
!=
0
)
printk
(
KERN_WARNING
"CIFS: netbiosname"
" longer than 15 truncated.
\n
"
);
pr_warn
(
"CIFS: netbiosname longer than 15 truncated.
\n
"
);
break
;
case
Opt_servern
:
/* servernetbiosname specified override *SMBSERVER */
...
...
@@ -1806,8 +1796,7 @@ cifs_parse_mount_options(const char *mountdata, const char *devname,
/* The string has 16th byte zero still from
set at top of the function */
if
(
i
==
RFC1001_NAME_LEN
&&
string
[
i
]
!=
0
)
printk
(
KERN_WARNING
"CIFS: server net"
"biosname longer than 15 truncated.
\n
"
);
pr_warn
(
"CIFS: server netbiosname longer than 15 truncated.
\n
"
);
break
;
case
Opt_ver
:
string
=
match_strdup
(
args
);
...
...
@@ -1819,8 +1808,7 @@ cifs_parse_mount_options(const char *mountdata, const char *devname,
break
;
}
/* For all other value, error */
printk
(
KERN_WARNING
"CIFS: Invalid version"
" specified
\n
"
);
pr_warn
(
"CIFS: Invalid version specified
\n
"
);
goto
cifs_parse_mount_err
;
case
Opt_vers
:
string
=
match_strdup
(
args
);
...
...
@@ -1861,7 +1849,7 @@ cifs_parse_mount_options(const char *mountdata, const char *devname,
}
if
(
!
sloppy
&&
invalid
)
{
pr
intk
(
KERN_ERR
"CIFS: Unknown mount option
\"
%s
\"\n
"
,
invalid
);
pr
_err
(
"CIFS: Unknown mount option
\"
%s
\"\n
"
,
invalid
);
goto
cifs_parse_mount_err
;
}
...
...
@@ -1887,8 +1875,7 @@ cifs_parse_mount_options(const char *mountdata, const char *devname,
/* No ip= option specified? Try to get it from UNC */
if
(
!
cifs_convert_address
(
dstaddr
,
&
vol
->
UNC
[
2
],
strlen
(
&
vol
->
UNC
[
2
])))
{
printk
(
KERN_ERR
"Unable to determine destination "
"address.
\n
"
);
pr_err
(
"Unable to determine destination address.
\n
"
);
goto
cifs_parse_mount_err
;
}
}
...
...
@@ -1899,20 +1886,18 @@ cifs_parse_mount_options(const char *mountdata, const char *devname,
if
(
uid_specified
)
vol
->
override_uid
=
override_uid
;
else
if
(
override_uid
==
1
)
printk
(
KERN_NOTICE
"CIFS: ignoring forceuid mount option "
"specified with no uid= option.
\n
"
);
pr_notice
(
"CIFS: ignoring forceuid mount option specified with no uid= option.
\n
"
);
if
(
gid_specified
)
vol
->
override_gid
=
override_gid
;
else
if
(
override_gid
==
1
)
printk
(
KERN_NOTICE
"CIFS: ignoring forcegid mount option "
"specified with no gid= option.
\n
"
);
pr_notice
(
"CIFS: ignoring forcegid mount option specified with no gid= option.
\n
"
);
kfree
(
mountdata_copy
);
return
0
;
out_nomem:
pr
intk
(
KERN_WARNING
"Could not allocate temporary buffer
\n
"
);
pr
_warn
(
"Could not allocate temporary buffer
\n
"
);
cifs_parse_mount_err:
kfree
(
string
);
kfree
(
mountdata_copy
);
...
...
sources/3.18/misc.c
View file @
d5b88c2b
...
...
@@ -513,39 +513,11 @@ is_valid_oplock_break(char *buffer, struct TCP_Server_Info *srv)
void
dump_smb
(
void
*
buf
,
int
smb_buf_length
)
{
int
i
,
j
;
char
debug_line
[
17
];
unsigned
char
*
buffer
=
buf
;
if
(
traceSMB
==
0
)
return
;
for
(
i
=
0
,
j
=
0
;
i
<
smb_buf_length
;
i
++
,
j
++
)
{
if
(
i
%
8
==
0
)
{
/* have reached the beginning of line */
printk
(
KERN_DEBUG
"| "
);
j
=
0
;
}
printk
(
"%0#4x "
,
buffer
[
i
]);
debug_line
[
2
*
j
]
=
' '
;
if
(
isprint
(
buffer
[
i
]))
debug_line
[
1
+
(
2
*
j
)]
=
buffer
[
i
];
else
debug_line
[
1
+
(
2
*
j
)]
=
'_'
;
if
(
i
%
8
==
7
)
{
/* reached end of line, time to print ascii */
debug_line
[
16
]
=
0
;
printk
(
" | %s
\n
"
,
debug_line
);
}
}
for
(;
j
<
8
;
j
++
)
{
printk
(
" "
);
debug_line
[
2
*
j
]
=
' '
;
debug_line
[
1
+
(
2
*
j
)]
=
' '
;
}
printk
(
" | %s
\n
"
,
debug_line
);
return
;
print_hex_dump
(
KERN_DEBUG
,
""
,
DUMP_PREFIX_NONE
,
8
,
2
,
buf
,
smb_buf_length
,
true
);
}
void
...
...
sources/3.18/readdir.c
View file @
d5b88c2b
...
...
@@ -845,6 +845,7 @@ int cifs_readdir(struct file *file, struct dir_context *ctx)
* if buggy server returns . and .. late do we want to
* check for that here?
*/
*
tmp_buf
=
0
;
rc
=
cifs_filldir
(
current_entry
,
file
,
ctx
,
tmp_buf
,
max_len
);
if
(
rc
)
{
...
...
sources/3.18/sess.c
View file @
d5b88c2b
...
...
@@ -400,19 +400,27 @@ int build_ntlmssp_auth_blob(unsigned char *pbuffer,
sec_blob
->
LmChallengeResponse
.
MaximumLength
=
0
;
sec_blob
->
NtChallengeResponse
.
BufferOffset
=
cpu_to_le32
(
tmp
-
pbuffer
);
rc
=
setup_ntlmv2_rsp
(
ses
,
nls_cp
);
if
(
rc
)
{
cifs_dbg
(
VFS
,
"Error %d during NTLMSSP authentication
\n
"
,
rc
);
goto
setup_ntlmv2_ret
;
if
(
ses
->
user_name
!=
NULL
)
{
rc
=
setup_ntlmv2_rsp
(
ses
,
nls_cp
);
if
(
rc
)
{
cifs_dbg
(
VFS
,
"Error %d during NTLMSSP authentication
\n
"
,
rc
);
goto
setup_ntlmv2_ret
;
}
memcpy
(
tmp
,
ses
->
auth_key
.
response
+
CIFS_SESS_KEY_SIZE
,
ses
->
auth_key
.
len
-
CIFS_SESS_KEY_SIZE
);
tmp
+=
ses
->
auth_key
.
len
-
CIFS_SESS_KEY_SIZE
;
sec_blob
->
NtChallengeResponse
.
Length
=
cpu_to_le16
(
ses
->
auth_key
.
len
-
CIFS_SESS_KEY_SIZE
);
sec_blob
->
NtChallengeResponse
.
MaximumLength
=
cpu_to_le16
(
ses
->
auth_key
.
len
-
CIFS_SESS_KEY_SIZE
);
}
else
{
/*
* don't send an NT Response for anonymous access
*/
sec_blob
->
NtChallengeResponse
.
Length
=
0
;
sec_blob
->
NtChallengeResponse
.
MaximumLength
=
0
;
}
memcpy
(
tmp
,
ses
->
auth_key
.
response
+
CIFS_SESS_KEY_SIZE
,
ses
->
auth_key
.
len
-
CIFS_SESS_KEY_SIZE
);
tmp
+=
ses
->
auth_key
.
len
-
CIFS_SESS_KEY_SIZE
;
sec_blob
->
NtChallengeResponse
.
Length
=
cpu_to_le16
(
ses
->
auth_key
.
len
-
CIFS_SESS_KEY_SIZE
);
sec_blob
->
NtChallengeResponse
.
MaximumLength
=
cpu_to_le16
(
ses
->
auth_key
.
len
-
CIFS_SESS_KEY_SIZE
);
if
(
ses
->
domainName
==
NULL
)
{
sec_blob
->
DomainName
.
BufferOffset
=
cpu_to_le32
(
tmp
-
pbuffer
);
...
...
@@ -670,20 +678,24 @@ sess_auth_lanman(struct sess_data *sess_data)
pSMB
->
req
.
hdr
.
Flags2
&=
~
SMBFLG2_UNICODE
;
/* no capabilities flags in old lanman negotiation */
pSMB
->
old_req
.
PasswordLength
=
cpu_to_le16
(
CIFS_AUTH_RESP_SIZE
);
/* Calculate hash with password and copy into bcc_ptr.
* Encryption Key (stored as in cryptkey) gets used if the
* security mode bit in Negottiate Protocol response states
* to use challenge/response method (i.e. Password bit is 1).
*/
rc
=
calc_lanman_hash
(
ses
->
password
,
ses
->
server
->
cryptkey
,
ses
->
server
->
sec_mode
&
SECMODE_PW_ENCRYPT
?
true
:
false
,
lnm_session_key
);
memcpy
(
bcc_ptr
,
(
char
*
)
lnm_session_key
,
CIFS_AUTH_RESP_SIZE
);
bcc_ptr
+=
CIFS_AUTH_RESP_SIZE
;
if
(
ses
->
user_name
!=
NULL
)
{
/* no capabilities flags in old lanman negotiation */
pSMB
->
old_req
.
PasswordLength
=
cpu_to_le16
(
CIFS_AUTH_RESP_SIZE
);
/* Calculate hash with password and copy into bcc_ptr.
* Encryption Key (stored as in cryptkey) gets used if the
* security mode bit in Negottiate Protocol response states
* to use challenge/response method (i.e. Password bit is 1).
*/
rc
=
calc_lanman_hash
(
ses
->
password
,
ses
->
server
->
cryptkey
,
ses
->
server
->
sec_mode
&
SECMODE_PW_ENCRYPT
?
true
:
false
,
lnm_session_key
);
memcpy
(
bcc_ptr
,
(
char
*
)
lnm_session_key
,
CIFS_AUTH_RESP_SIZE
);
bcc_ptr
+=
CIFS_AUTH_RESP_SIZE
;
}
else
{
pSMB
->
old_req
.
PasswordLength
=
0
;
}
/*
* can not sign if LANMAN negotiated so no need
...
...
@@ -769,26 +781,31 @@ sess_auth_ntlm(struct sess_data *sess_data)
capabilities
=
cifs_ssetup_hdr
(
ses
,
pSMB
);
pSMB
->
req_no_secext
.
Capabilities
=
cpu_to_le32
(
capabilities
);
pSMB
->
req_no_secext
.
CaseInsensitivePasswordLength
=
cpu_to_le16
(
CIFS_AUTH_RESP_SIZE
);
pSMB
->
req_no_secext
.
CaseSensitivePasswordLength
=
cpu_to_le16
(
CIFS_AUTH_RESP_SIZE
);
/* calculate ntlm response and session key */
rc
=
setup_ntlm_response
(
ses
,
sess_data
->
nls_cp
);
if
(
rc
)
{
cifs_dbg
(
VFS
,
"Error %d during NTLM authentication
\n
"
,
rc
);
goto
out
;
}
if
(
ses
->
user_name
!=
NULL
)
{
pSMB
->
req_no_secext
.
CaseInsensitivePasswordLength
=
cpu_to_le16
(
CIFS_AUTH_RESP_SIZE
);
pSMB
->
req_no_secext
.
CaseSensitivePasswordLength
=
cpu_to_le16
(
CIFS_AUTH_RESP_SIZE
);
/* calculate ntlm response and session key */
rc
=
setup_ntlm_response
(
ses
,
sess_data
->
nls_cp
);
if
(
rc
)
{
cifs_dbg
(
VFS
,
"Error %d during NTLM authentication
\n
"
,
rc
);
goto
out
;
}
/* copy ntlm response */
memcpy
(
bcc_ptr
,
ses
->
auth_key
.
response
+
CIFS_SESS_KEY_SIZE
,
CIFS_AUTH_RESP_SIZE
);
bcc_ptr
+=
CIFS_AUTH_RESP_SIZE
;
memcpy
(
bcc_ptr
,
ses
->
auth_key
.
response
+
CIFS_SESS_KEY_SIZE
,
CIFS_AUTH_RESP_SIZE
);
bcc_ptr
+=
CIFS_AUTH_RESP_SIZE
;
/* copy ntlm response */
memcpy
(
bcc_ptr
,
ses
->
auth_key
.
response
+
CIFS_SESS_KEY_SIZE
,
CIFS_AUTH_RESP_SIZE
);
bcc_ptr
+=
CIFS_AUTH_RESP_SIZE
;
memcpy
(
bcc_ptr
,
ses
->
auth_key
.
response
+
CIFS_SESS_KEY_SIZE
,
CIFS_AUTH_RESP_SIZE
);
bcc_ptr
+=
CIFS_AUTH_RESP_SIZE
;
}
else
{
pSMB
->
req_no_secext
.
CaseInsensitivePasswordLength
=
0
;
pSMB
->
req_no_secext
.
CaseSensitivePasswordLength
=
0
;
}
if
(
ses
->
capabilities
&
CAP_UNICODE
)
{
/* unicode strings must be word aligned */
...
...
@@ -878,22 +895,26 @@ sess_auth_ntlmv2(struct sess_data *sess_data)
/* LM2 password would be here if we supported it */
pSMB
->
req_no_secext
.
CaseInsensitivePasswordLength
=
0
;
/* calculate nlmv2 response and session key */
rc
=
setup_ntlmv2_rsp
(
ses
,
sess_data
->
nls_cp
);
if
(
rc
)
{
cifs_dbg
(
VFS
,
"Error %d during NTLMv2 authentication
\n
"
,
rc
);
goto
out
;
}
if
(
ses
->
user_name
!=
NULL
)
{
/* calculate nlmv2 response and session key */
rc
=
setup_ntlmv2_rsp
(
ses
,
sess_data
->
nls_cp
);
if
(
rc
)
{
cifs_dbg
(
VFS
,
"Error %d during NTLMv2 authentication
\n
"
,
rc
);
goto
out
;
}
memcpy
(
bcc_ptr
,
ses
->
auth_key
.
response
+
CIFS_SESS_KEY_SIZE
,
ses
->
auth_key
.
len
-
CIFS_SESS_KEY_SIZE
);
bcc_ptr
+=
ses
->
auth_key
.
len
-
CIFS_SESS_KEY_SIZE
;
memcpy
(
bcc_ptr
,
ses
->
auth_key
.
response
+
CIFS_SESS_KEY_SIZE
,
ses
->
auth_key
.
len
-
CIFS_SESS_KEY_SIZE
);
bcc_ptr
+=
ses
->
auth_key
.
len
-
CIFS_SESS_KEY_SIZE
;
/* set case sensitive password length after tilen may get
* assigned, tilen is 0 otherwise.
*/
pSMB
->
req_no_secext
.
CaseSensitivePasswordLength
=
cpu_to_le16
(
ses
->
auth_key
.
len
-
CIFS_SESS_KEY_SIZE
);
/* set case sensitive password length after tilen may get
* assigned, tilen is 0 otherwise.
*/
pSMB
->
req_no_secext
.
CaseSensitivePasswordLength
=
cpu_to_le16
(
ses
->
auth_key
.
len
-
CIFS_SESS_KEY_SIZE
);
}
else
{
pSMB
->
req_no_secext
.
CaseSensitivePasswordLength
=
0
;
}
if
(
ses
->
capabilities
&
CAP_UNICODE
)
{
if
(
sess_data
->
iov
[
0
].
iov_len
%
2
)
{
...
...
sources/3.18/smb2glob.h
View file @
d5b88c2b
...
...
@@ -44,6 +44,7 @@
#define SMB2_OP_DELETE 7
#define SMB2_OP_HARDLINK 8
#define SMB2_OP_SET_EOF 9
#define SMB2_OP_RMDIR 10
/* Used when constructing chained read requests. */
#define CHAINED_REQUEST 1
...
...
sources/3.18/smb2inode.c
View file @
d5b88c2b
...
...
@@ -81,6 +81,10 @@ smb2_open_op_close(const unsigned int xid, struct cifs_tcon *tcon,
* SMB2_open() call.
*/
break
;
case
SMB2_OP_RMDIR
:
tmprc
=
SMB2_rmdir
(
xid
,
tcon
,
fid
.
persistent_fid
,
fid
.
volatile_fid
);
break
;
case
SMB2_OP_RENAME
:
tmprc
=
SMB2_rename
(
xid
,
tcon
,
fid
.
persistent_fid
,
fid
.
volatile_fid
,
(
__le16
*
)
data
);
...
...
@@ -192,8 +196,8 @@ smb2_rmdir(const unsigned int xid, struct cifs_tcon *tcon, const char *name,
struct
cifs_sb_info
*
cifs_sb
)
{
return
smb2_open_op_close
(
xid
,
tcon
,
cifs_sb
,
name
,
DELETE
,
FILE_OPEN
,
CREATE_NOT_FILE
|
CREATE_DELETE_ON_CLOSE
,
NULL
,
SMB2_OP_
DELETE
);
CREATE_NOT_FILE
,
NULL
,
SMB2_OP_
RMDIR
);
}
int
...
...
sources/3.18/smb2pdu.c
View file @
d5b88c2b
...
...
@@ -997,21 +997,25 @@ parse_lease_state(struct TCP_Server_Info *server, struct smb2_create_rsp *rsp,
{
char
*
data_offset
;
struct
create_context
*
cc
;
unsigned
int
next
=
0
;
unsigned
int
next
;
unsigned
int
remaining
;
char
*
name
;
data_offset
=
(
char
*
)
rsp
+
4
+
le32_to_cpu
(
rsp
->
CreateContextsOffset
);
remaining
=
le32_to_cpu
(
rsp
->
CreateContextsLength
);
cc
=
(
struct
create_context
*
)
data_offset
;
do
{
cc
=
(
struct
create_context
*
)((
char
*
)
cc
+
next
);
while
(
remaining
>=
sizeof
(
struct
create_context
))
{
name
=
le16_to_cpu
(
cc
->
NameOffset
)
+
(
char
*
)
cc
;
if
(
le16_to_cpu
(
cc
->
NameLength
)
!=
4
||
strncmp
(
name
,
"RqLs"
,
4
))
{
next
=
le32_to_cpu
(
cc
->
Next
);
continue
;
}
return
server
->
ops
->
parse_lease_buf
(
cc
,
epoch
);
}
while
(
next
!=
0
);
if
(
le16_to_cpu
(
cc
->
NameLength
)
==
4
&&
strncmp
(
name
,
"RqLs"
,
4
)
==
0
)
return
server
->
ops
->
parse_lease_buf
(
cc
,
epoch
);
next
=
le32_to_cpu
(
cc
->
Next
);
if
(
!
next
)
break
;
remaining
-=
next
;
cc
=
(
struct
create_context
*
)((
char
*
)
cc
+
next
);
}
return
0
;
}
...
...
@@ -2332,6 +2336,22 @@ SMB2_rename(const unsigned int xid, struct cifs_tcon *tcon,
}
int
SMB2_rmdir
(
const
unsigned
int
xid
,
struct
cifs_tcon
*
tcon
,
u64
persistent_fid
,
u64
volatile_fid
)
{
__u8
delete_pending
=
1
;
void
*
data
;
unsigned
int
size
;
data
=
&
delete_pending
;
size
=
1
;
/* sizeof __u8 */
return
send_set_info
(
xid
,
tcon
,
persistent_fid
,
volatile_fid
,
current
->
tgid
,
FILE_DISPOSITION_INFORMATION
,
1
,
&
data
,
&
size
);
}
int
SMB2_set_hardlink
(
const
unsigned
int
xid
,
struct
cifs_tcon
*
tcon
,
u64
persistent_fid
,
u64
volatile_fid
,
__le16
*
target_file
)
{
...
...
sources/3.18/smb2proto.h
View file @
d5b88c2b
...
...
@@ -140,6 +140,8 @@ extern int SMB2_query_directory(const unsigned int xid, struct cifs_tcon *tcon,
extern
int
SMB2_rename
(
const
unsigned
int
xid
,
struct
cifs_tcon
*
tcon
,
u64
persistent_fid
,
u64
volatile_fid
,
__le16
*
target_file
);
extern
int
SMB2_rmdir
(
const
unsigned
int
xid
,
struct
cifs_tcon
*
tcon
,
u64
persistent_fid
,
u64
volatile_fid
);
extern
int
SMB2_set_hardlink
(
const
unsigned
int
xid
,
struct
cifs_tcon
*
tcon
,
u64
persistent_fid
,
u64
volatile_fid
,
__le16
*
target_file
);
...
...
sources/3.18/transport.c
View file @
d5b88c2b
...
...
@@ -99,9 +99,9 @@ DeleteMidQEntry(struct mid_q_entry *midEntry)
something is wrong, unless it is quite a slow link or server */
if
((
now
-
midEntry
->
when_alloc
)
>
HZ
)
{
if
((
cifsFYI
&
CIFS_TIMER
)
&&
(
midEntry
->
command
!=
command
))
{
pr
intk
(
KERN_DEBUG
" CIFS slow rsp: cmd %d mid %llu"
,
pr
_debug
(
" CIFS slow rsp: cmd %d mid %llu"
,
midEntry
->
command
,
midEntry
->
mid
);
pr
intk
(
" A: 0x%lx S: 0x%lx R: 0x%lx
\n
"
,
pr
_info
(
" A: 0x%lx S: 0x%lx R: 0x%lx
\n
"
,
now
-
midEntry
->
when_alloc
,
now
-
midEntry
->
when_sent
,
now
-
midEntry
->
when_received
);
...
...
@@ -576,14 +576,16 @@ cifs_call_async(struct TCP_Server_Info *server, struct smb_rqst *rqst,
cifs_in_send_dec
(
server
);
cifs_save_when_sent
(
mid
);
if
(
rc
<
0
)
if
(
rc
<
0
)
{
server
->
sequence_number
-=
2
;
cifs_delete_mid
(
mid
);
}
mutex_unlock
(
&
server
->
srv_mutex
);
if
(
rc
==
0
)
return
0
;
cifs_delete_mid
(
mid
);
add_credits_and_wake_if
(
server
,
credits
,
optype
);
return
rc
;
}
...
...
Write
Preview
Markdown
is supported
0%
Try again
or
attach a new file
Attach a file
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Cancel
Please
register
or
sign in
to comment