Merge tag 'drm-msm-fixes-2021-05-09' of https://gitlab.freedesktop.org/drm/msm into...
[linux-2.6-microblaze.git] / fs / cifs / ioctl.c
index 08d99fe..28ec8d7 100644 (file)
@@ -164,6 +164,100 @@ static long smb_mnt_get_fsinfo(unsigned int xid, struct cifs_tcon *tcon,
        return rc;
 }
 
+static int cifs_shutdown(struct super_block *sb, unsigned long arg)
+{
+       struct cifs_sb_info *sbi = CIFS_SB(sb);
+       __u32 flags;
+
+       if (!capable(CAP_SYS_ADMIN))
+               return -EPERM;
+
+       if (get_user(flags, (__u32 __user *)arg))
+               return -EFAULT;
+
+       if (flags > CIFS_GOING_FLAGS_NOLOGFLUSH)
+               return -EINVAL;
+
+       if (cifs_forced_shutdown(sbi))
+               return 0;
+
+       cifs_dbg(VFS, "shut down requested (%d)", flags);
+/*     trace_cifs_shutdown(sb, flags);*/
+
+       /*
+        * see:
+        *   https://man7.org/linux/man-pages/man2/ioctl_xfs_goingdown.2.html
+        * for more information and description of original intent of the flags
+        */
+       switch (flags) {
+       /*
+        * We could add support later for default flag which requires:
+        *     "Flush all dirty data and metadata to disk"
+        * would need to call syncfs or equivalent to flush page cache for
+        * the mount and then issue fsync to server (if nostrictsync not set)
+        */
+       case CIFS_GOING_FLAGS_DEFAULT:
+               cifs_dbg(FYI, "shutdown with default flag not supported\n");
+               return -EINVAL;
+       /*
+        * FLAGS_LOGFLUSH is easy since it asks to write out metadata (not
+        * data) but metadata writes are not cached on the client, so can treat
+        * it similarly to NOLOGFLUSH
+        */
+       case CIFS_GOING_FLAGS_LOGFLUSH:
+       case CIFS_GOING_FLAGS_NOLOGFLUSH:
+               sbi->mnt_cifs_flags |= CIFS_MOUNT_SHUTDOWN;
+               return 0;
+       default:
+               return -EINVAL;
+       }
+       return 0;
+}
+
+static int cifs_dump_full_key(struct cifs_tcon *tcon, unsigned long arg)
+{
+       struct smb3_full_key_debug_info pfull_key_inf;
+       __u64 suid;
+       struct list_head *tmp;
+       struct cifs_ses *ses;
+       bool found = false;
+
+       if (!smb3_encryption_required(tcon))
+               return -EOPNOTSUPP;
+
+       ses = tcon->ses; /* default to user id for current user */
+       if (get_user(suid, (__u64 __user *)arg))
+               suid = 0;
+       if (suid) {
+               /* search to see if there is a session with a matching SMB UID */
+               spin_lock(&cifs_tcp_ses_lock);
+               list_for_each(tmp, &tcon->ses->server->smb_ses_list) {
+                       ses = list_entry(tmp, struct cifs_ses, smb_ses_list);
+                       if (ses->Suid == suid) {
+                               found = true;
+                               break;
+                       }
+               }
+               spin_unlock(&cifs_tcp_ses_lock);
+               if (found == false)
+                       return -EINVAL;
+       } /* else uses default user's SMB UID (ie current user) */
+
+       pfull_key_inf.cipher_type = le16_to_cpu(ses->server->cipher_type);
+       pfull_key_inf.Suid = ses->Suid;
+       memcpy(pfull_key_inf.auth_key, ses->auth_key.response,
+              16 /* SMB2_NTLMV2_SESSKEY_SIZE */);
+       memcpy(pfull_key_inf.smb3decryptionkey, ses->smb3decryptionkey,
+              32 /* SMB3_ENC_DEC_KEY_SIZE */);
+       memcpy(pfull_key_inf.smb3encryptionkey,
+              ses->smb3encryptionkey, 32 /* SMB3_ENC_DEC_KEY_SIZE */);
+       if (copy_to_user((void __user *)arg, &pfull_key_inf,
+                        sizeof(struct smb3_full_key_debug_info)))
+               return -EFAULT;
+
+       return 0;
+}
+
 long cifs_ioctl(struct file *filep, unsigned int command, unsigned long arg)
 {
        struct inode *inode = file_inode(filep);
@@ -304,6 +398,21 @@ long cifs_ioctl(struct file *filep, unsigned int command, unsigned long arg)
                        else
                                rc = 0;
                        break;
+               /*
+                * Dump full key (32 bytes instead of 16 bytes) is
+                * needed if GCM256 (stronger encryption) negotiated
+                */
+               case CIFS_DUMP_FULL_KEY:
+                       if (pSMBFile == NULL)
+                               break;
+                       if (!capable(CAP_SYS_ADMIN)) {
+                               rc = -EACCES;
+                               break;
+                       }
+                       tcon = tlink_tcon(pSMBFile->tlink);
+                       rc = cifs_dump_full_key(tcon, arg);
+
+                       break;
                case CIFS_IOC_NOTIFY:
                        if (!S_ISDIR(inode->i_mode)) {
                                /* Notify can only be done on directories */
@@ -325,6 +434,9 @@ long cifs_ioctl(struct file *filep, unsigned int command, unsigned long arg)
                                rc = -EOPNOTSUPP;
                        cifs_put_tlink(tlink);
                        break;
+               case CIFS_IOC_SHUTDOWN:
+                       rc = cifs_shutdown(inode->i_sb, arg);
+                       break;
                default:
                        cifs_dbg(FYI, "unsupported ioctl\n");
                        break;