mirror of
				https://github.com/torvalds/linux.git
				synced 2025-10-31 08:38:45 +02:00 
			
		
		
		
	 0066f623bc
			
		
	
	
		0066f623bc
		
	
	
	
	
		
			
			Prefer to report ENOMEM rather than incur the oom for allocations in ksmbd. __GFP_NORETRY could not achieve that, It would fail the allocations just too easily. __GFP_RETRY_MAYFAIL will keep retrying the allocation until there is no more progress and fail the allocation instead go OOM and let the caller to deal with it. Signed-off-by: Namjae Jeon <linkinjeon@kernel.org> Signed-off-by: Steve French <stfrench@microsoft.com>
		
			
				
	
	
		
			241 lines
		
	
	
	
		
			5.6 KiB
		
	
	
	
		
			C
		
	
	
	
	
	
			
		
		
	
	
			241 lines
		
	
	
	
		
			5.6 KiB
		
	
	
	
		
			C
		
	
	
	
	
	
| // SPDX-License-Identifier: GPL-2.0-or-later
 | |
| /*
 | |
|  * The ASB.1/BER parsing code is derived from ip_nat_snmp_basic.c which was in
 | |
|  * turn derived from the gxsnmp package by Gregory McLean & Jochen Friedrich
 | |
|  *
 | |
|  * Copyright (c) 2000 RP Internet (www.rpi.net.au).
 | |
|  */
 | |
| 
 | |
| #include <linux/module.h>
 | |
| #include <linux/types.h>
 | |
| #include <linux/kernel.h>
 | |
| #include <linux/mm.h>
 | |
| #include <linux/slab.h>
 | |
| #include <linux/oid_registry.h>
 | |
| 
 | |
| #include "glob.h"
 | |
| 
 | |
| #include "asn1.h"
 | |
| #include "connection.h"
 | |
| #include "auth.h"
 | |
| #include "ksmbd_spnego_negtokeninit.asn1.h"
 | |
| #include "ksmbd_spnego_negtokentarg.asn1.h"
 | |
| 
 | |
| #define NTLMSSP_OID_LEN  10
 | |
| 
 | |
| static char NTLMSSP_OID_STR[NTLMSSP_OID_LEN] = { 0x2b, 0x06, 0x01, 0x04, 0x01,
 | |
| 	0x82, 0x37, 0x02, 0x02, 0x0a };
 | |
| 
 | |
| int
 | |
| ksmbd_decode_negTokenInit(unsigned char *security_blob, int length,
 | |
| 			  struct ksmbd_conn *conn)
 | |
| {
 | |
| 	return asn1_ber_decoder(&ksmbd_spnego_negtokeninit_decoder, conn,
 | |
| 				security_blob, length);
 | |
| }
 | |
| 
 | |
| int
 | |
| ksmbd_decode_negTokenTarg(unsigned char *security_blob, int length,
 | |
| 			  struct ksmbd_conn *conn)
 | |
| {
 | |
| 	return asn1_ber_decoder(&ksmbd_spnego_negtokentarg_decoder, conn,
 | |
| 				security_blob, length);
 | |
| }
 | |
| 
 | |
| static int compute_asn_hdr_len_bytes(int len)
 | |
| {
 | |
| 	if (len > 0xFFFFFF)
 | |
| 		return 4;
 | |
| 	else if (len > 0xFFFF)
 | |
| 		return 3;
 | |
| 	else if (len > 0xFF)
 | |
| 		return 2;
 | |
| 	else if (len > 0x7F)
 | |
| 		return 1;
 | |
| 	else
 | |
| 		return 0;
 | |
| }
 | |
| 
 | |
| static void encode_asn_tag(char *buf, unsigned int *ofs, char tag, char seq,
 | |
| 			   int length)
 | |
| {
 | |
| 	int i;
 | |
| 	int index = *ofs;
 | |
| 	char hdr_len = compute_asn_hdr_len_bytes(length);
 | |
| 	int len = length + 2 + hdr_len;
 | |
| 
 | |
| 	/* insert tag */
 | |
| 	buf[index++] = tag;
 | |
| 
 | |
| 	if (!hdr_len) {
 | |
| 		buf[index++] = len;
 | |
| 	} else {
 | |
| 		buf[index++] = 0x80 | hdr_len;
 | |
| 		for (i = hdr_len - 1; i >= 0; i--)
 | |
| 			buf[index++] = (len >> (i * 8)) & 0xFF;
 | |
| 	}
 | |
| 
 | |
| 	/* insert seq */
 | |
| 	len = len - (index - *ofs);
 | |
| 	buf[index++] = seq;
 | |
| 
 | |
| 	if (!hdr_len) {
 | |
| 		buf[index++] = len;
 | |
| 	} else {
 | |
| 		buf[index++] = 0x80 | hdr_len;
 | |
| 		for (i = hdr_len - 1; i >= 0; i--)
 | |
| 			buf[index++] = (len >> (i * 8)) & 0xFF;
 | |
| 	}
 | |
| 
 | |
| 	*ofs += (index - *ofs);
 | |
| }
 | |
| 
 | |
| int build_spnego_ntlmssp_neg_blob(unsigned char **pbuffer, u16 *buflen,
 | |
| 				  char *ntlm_blob, int ntlm_blob_len)
 | |
| {
 | |
| 	char *buf;
 | |
| 	unsigned int ofs = 0;
 | |
| 	int neg_result_len = 4 + compute_asn_hdr_len_bytes(1) * 2 + 1;
 | |
| 	int oid_len = 4 + compute_asn_hdr_len_bytes(NTLMSSP_OID_LEN) * 2 +
 | |
| 		NTLMSSP_OID_LEN;
 | |
| 	int ntlmssp_len = 4 + compute_asn_hdr_len_bytes(ntlm_blob_len) * 2 +
 | |
| 		ntlm_blob_len;
 | |
| 	int total_len = 4 + compute_asn_hdr_len_bytes(neg_result_len +
 | |
| 			oid_len + ntlmssp_len) * 2 +
 | |
| 			neg_result_len + oid_len + ntlmssp_len;
 | |
| 
 | |
| 	buf = kmalloc(total_len, KSMBD_DEFAULT_GFP);
 | |
| 	if (!buf)
 | |
| 		return -ENOMEM;
 | |
| 
 | |
| 	/* insert main gss header */
 | |
| 	encode_asn_tag(buf, &ofs, 0xa1, 0x30, neg_result_len + oid_len +
 | |
| 			ntlmssp_len);
 | |
| 
 | |
| 	/* insert neg result */
 | |
| 	encode_asn_tag(buf, &ofs, 0xa0, 0x0a, 1);
 | |
| 	buf[ofs++] = 1;
 | |
| 
 | |
| 	/* insert oid */
 | |
| 	encode_asn_tag(buf, &ofs, 0xa1, 0x06, NTLMSSP_OID_LEN);
 | |
| 	memcpy(buf + ofs, NTLMSSP_OID_STR, NTLMSSP_OID_LEN);
 | |
| 	ofs += NTLMSSP_OID_LEN;
 | |
| 
 | |
| 	/* insert response token - ntlmssp blob */
 | |
| 	encode_asn_tag(buf, &ofs, 0xa2, 0x04, ntlm_blob_len);
 | |
| 	memcpy(buf + ofs, ntlm_blob, ntlm_blob_len);
 | |
| 	ofs += ntlm_blob_len;
 | |
| 
 | |
| 	*pbuffer = buf;
 | |
| 	*buflen = total_len;
 | |
| 	return 0;
 | |
| }
 | |
| 
 | |
| int build_spnego_ntlmssp_auth_blob(unsigned char **pbuffer, u16 *buflen,
 | |
| 				   int neg_result)
 | |
| {
 | |
| 	char *buf;
 | |
| 	unsigned int ofs = 0;
 | |
| 	int neg_result_len = 4 + compute_asn_hdr_len_bytes(1) * 2 + 1;
 | |
| 	int total_len = 4 + compute_asn_hdr_len_bytes(neg_result_len) * 2 +
 | |
| 		neg_result_len;
 | |
| 
 | |
| 	buf = kmalloc(total_len, KSMBD_DEFAULT_GFP);
 | |
| 	if (!buf)
 | |
| 		return -ENOMEM;
 | |
| 
 | |
| 	/* insert main gss header */
 | |
| 	encode_asn_tag(buf, &ofs, 0xa1, 0x30, neg_result_len);
 | |
| 
 | |
| 	/* insert neg result */
 | |
| 	encode_asn_tag(buf, &ofs, 0xa0, 0x0a, 1);
 | |
| 	if (neg_result)
 | |
| 		buf[ofs++] = 2;
 | |
| 	else
 | |
| 		buf[ofs++] = 0;
 | |
| 
 | |
| 	*pbuffer = buf;
 | |
| 	*buflen = total_len;
 | |
| 	return 0;
 | |
| }
 | |
| 
 | |
| int ksmbd_gssapi_this_mech(void *context, size_t hdrlen, unsigned char tag,
 | |
| 			   const void *value, size_t vlen)
 | |
| {
 | |
| 	enum OID oid;
 | |
| 
 | |
| 	oid = look_up_OID(value, vlen);
 | |
| 	if (oid != OID_spnego) {
 | |
| 		char buf[50];
 | |
| 
 | |
| 		sprint_oid(value, vlen, buf, sizeof(buf));
 | |
| 		ksmbd_debug(AUTH, "Unexpected OID: %s\n", buf);
 | |
| 		return -EBADMSG;
 | |
| 	}
 | |
| 
 | |
| 	return 0;
 | |
| }
 | |
| 
 | |
| int ksmbd_neg_token_init_mech_type(void *context, size_t hdrlen,
 | |
| 				   unsigned char tag, const void *value,
 | |
| 				   size_t vlen)
 | |
| {
 | |
| 	struct ksmbd_conn *conn = context;
 | |
| 	enum OID oid;
 | |
| 	int mech_type;
 | |
| 
 | |
| 	oid = look_up_OID(value, vlen);
 | |
| 	if (oid == OID_ntlmssp) {
 | |
| 		mech_type = KSMBD_AUTH_NTLMSSP;
 | |
| 	} else if (oid == OID_mskrb5) {
 | |
| 		mech_type = KSMBD_AUTH_MSKRB5;
 | |
| 	} else if (oid == OID_krb5) {
 | |
| 		mech_type = KSMBD_AUTH_KRB5;
 | |
| 	} else if (oid == OID_krb5u2u) {
 | |
| 		mech_type = KSMBD_AUTH_KRB5U2U;
 | |
| 	} else {
 | |
| 		char buf[50];
 | |
| 
 | |
| 		sprint_oid(value, vlen, buf, sizeof(buf));
 | |
| 		ksmbd_debug(AUTH, "Unexpected OID: %s\n", buf);
 | |
| 		return -EBADMSG;
 | |
| 	}
 | |
| 
 | |
| 	conn->auth_mechs |= mech_type;
 | |
| 	if (conn->preferred_auth_mech == 0)
 | |
| 		conn->preferred_auth_mech = mech_type;
 | |
| 
 | |
| 	return 0;
 | |
| }
 | |
| 
 | |
| static int ksmbd_neg_token_alloc(void *context, size_t hdrlen,
 | |
| 				 unsigned char tag, const void *value,
 | |
| 				 size_t vlen)
 | |
| {
 | |
| 	struct ksmbd_conn *conn = context;
 | |
| 
 | |
| 	if (!vlen)
 | |
| 		return -EINVAL;
 | |
| 
 | |
| 	conn->mechToken = kmemdup_nul(value, vlen, KSMBD_DEFAULT_GFP);
 | |
| 	if (!conn->mechToken)
 | |
| 		return -ENOMEM;
 | |
| 
 | |
| 	conn->mechTokenLen = (unsigned int)vlen;
 | |
| 
 | |
| 	return 0;
 | |
| }
 | |
| 
 | |
| int ksmbd_neg_token_init_mech_token(void *context, size_t hdrlen,
 | |
| 				    unsigned char tag, const void *value,
 | |
| 				    size_t vlen)
 | |
| {
 | |
| 	return ksmbd_neg_token_alloc(context, hdrlen, tag, value, vlen);
 | |
| }
 | |
| 
 | |
| int ksmbd_neg_token_targ_resp_token(void *context, size_t hdrlen,
 | |
| 				    unsigned char tag, const void *value,
 | |
| 				    size_t vlen)
 | |
| {
 | |
| 	return ksmbd_neg_token_alloc(context, hdrlen, tag, value, vlen);
 | |
| }
 |