1 /* SPDX-License-Identifier: GPL-2.0-or-later */
3 * Copyright (C) 2018 Samsung Electronics Co., Ltd.
5 * linux-ksmbd-devel@lists.sourceforge.net
8 #ifndef _LINUX_KSMBD_SERVER_H
9 #define _LINUX_KSMBD_SERVER_H
11 #include <linux/types.h>
14 * This is a userspace ABI to communicate data between ksmbd and user IPC
15 * daemon using netlink. This is added to track and cache user account DB
16 * and share configuration info from userspace.
18 * - KSMBD_EVENT_HEARTBEAT_REQUEST(ksmbd_heartbeat)
19 * This event is to check whether user IPC daemon is alive. If user IPC
20 * daemon is dead, ksmbd keep existing connection till disconnecting and
21 * new connection will be denied.
23 * - KSMBD_EVENT_STARTING_UP(ksmbd_startup_request)
24 * This event is to receive the information that initializes the ksmbd
25 * server from the user IPC daemon and to start the server. The global
26 * section parameters are given from smb.conf as initialization
29 * - KSMBD_EVENT_SHUTTING_DOWN(ksmbd_shutdown_request)
30 * This event is to shutdown ksmbd server.
32 * - KSMBD_EVENT_LOGIN_REQUEST/RESPONSE(ksmbd_login_request/response)
33 * This event is to get user account info to user IPC daemon.
35 * - KSMBD_EVENT_SHARE_CONFIG_REQUEST/RESPONSE(ksmbd_share_config_request/response)
36 * This event is to get net share configuration info.
38 * - KSMBD_EVENT_TREE_CONNECT_REQUEST/RESPONSE(ksmbd_tree_connect_request/response)
39 * This event is to get session and tree connect info.
41 * - KSMBD_EVENT_TREE_DISCONNECT_REQUEST(ksmbd_tree_disconnect_request)
42 * This event is to send tree disconnect info to user IPC daemon.
44 * - KSMBD_EVENT_LOGOUT_REQUEST(ksmbd_logout_request)
45 * This event is to send logout request to user IPC daemon.
47 * - KSMBD_EVENT_RPC_REQUEST/RESPONSE(ksmbd_rpc_command)
48 * This event is to make DCE/RPC request like srvsvc, wkssvc, lsarpc,
49 * samr to be processed in userspace.
51 * - KSMBD_EVENT_SPNEGO_AUTHEN_REQUEST/RESPONSE(ksmbd_spnego_authen_request/response)
52 * This event is to make kerberos authentication to be processed in
56 #define KSMBD_GENL_NAME "SMBD_GENL"
57 #define KSMBD_GENL_VERSION 0x01
59 #define KSMBD_REQ_MAX_ACCOUNT_NAME_SZ 48
60 #define KSMBD_REQ_MAX_HASH_SZ 18
61 #define KSMBD_REQ_MAX_SHARE_NAME 64
64 * IPC heartbeat frame to check whether user IPC daemon is alive.
66 struct ksmbd_heartbeat {
71 * Global config flags.
73 #define KSMBD_GLOBAL_FLAG_INVALID (0)
74 #define KSMBD_GLOBAL_FLAG_SMB2_LEASES BIT(0)
75 #define KSMBD_GLOBAL_FLAG_SMB2_ENCRYPTION BIT(1)
76 #define KSMBD_GLOBAL_FLAG_SMB3_MULTICHANNEL BIT(2)
79 * IPC request for ksmbd server startup
81 struct ksmbd_startup_request {
82 __u32 flags; /* Flags for global config */
83 __s32 signing; /* Signing enabled */
84 __s8 min_prot[16]; /* The minimum SMB protocol version */
85 __s8 max_prot[16]; /* The maximum SMB protocol version */
86 __s8 netbios_name[16];
87 __s8 work_group[64]; /* Workgroup */
88 __s8 server_string[64]; /* Server string */
89 __u16 tcp_port; /* tcp port */
91 * specifies the number of seconds
92 * server will wait for the userspace to
93 * reply to heartbeat frames.
95 __u32 deadtime; /* Number of minutes of inactivity */
96 __u32 file_max; /* Limits the maximum number of open files */
97 __u32 smb2_max_write; /* MAX write size */
98 __u32 smb2_max_read; /* MAX read size */
99 __u32 smb2_max_trans; /* MAX trans size */
100 __u32 share_fake_fscaps; /*
101 * Support some special application that
102 * makes QFSINFO calls to check whether
103 * we set the SPARSE_FILES bit (0x40).
105 __u32 sub_auth[3]; /* Subauth value for Security ID */
106 __u32 smb2_max_credits; /* MAX credits */
107 __u32 smbd_max_io_size; /* smbd read write size */
108 __u32 reserved[127]; /* Reserved room */
109 __u32 ifc_list_sz; /* interfaces list size */
113 #define KSMBD_STARTUP_CONFIG_INTERFACES(s) ((s)->____payload)
116 * IPC request to shutdown ksmbd server.
118 struct ksmbd_shutdown_request {
123 * IPC user login request.
125 struct ksmbd_login_request {
127 __s8 account[KSMBD_REQ_MAX_ACCOUNT_NAME_SZ]; /* user account name */
128 __u32 reserved[16]; /* Reserved room */
132 * IPC user login response.
134 struct ksmbd_login_response {
136 __u32 gid; /* group id */
137 __u32 uid; /* user id */
138 __s8 account[KSMBD_REQ_MAX_ACCOUNT_NAME_SZ]; /* user account name */
140 __u16 hash_sz; /* hash size */
141 __s8 hash[KSMBD_REQ_MAX_HASH_SZ]; /* password hash */
142 __u32 reserved[16]; /* Reserved room */
146 * IPC request to fetch net share config.
148 struct ksmbd_share_config_request {
150 __s8 share_name[KSMBD_REQ_MAX_SHARE_NAME]; /* share name */
151 __u32 reserved[16]; /* Reserved room */
155 * IPC response to the net share config request.
157 struct ksmbd_share_config_response {
161 __u16 directory_mask;
162 __u16 force_create_mode;
163 __u16 force_directory_mode;
166 __u32 reserved[128]; /* Reserved room */
171 #define KSMBD_SHARE_CONFIG_VETO_LIST(s) ((s)->____payload)
174 ksmbd_share_config_path(struct ksmbd_share_config_response *sc)
176 char *p = sc->____payload;
178 if (sc->veto_list_sz)
179 p += sc->veto_list_sz + 1;
185 * IPC request for tree connection. This request include session and tree
186 * connect info from client.
188 struct ksmbd_tree_connect_request {
194 __s8 account[KSMBD_REQ_MAX_ACCOUNT_NAME_SZ];
195 __s8 share[KSMBD_REQ_MAX_SHARE_NAME];
197 __u32 reserved[16]; /* Reserved room */
201 * IPC Response structure for tree connection.
203 struct ksmbd_tree_connect_response {
206 __u16 connection_flags;
207 __u32 reserved[16]; /* Reserved room */
211 * IPC Request struture to disconnect tree connection.
213 struct ksmbd_tree_disconnect_request {
214 __u64 session_id; /* session id */
215 __u64 connect_id; /* tree connection id */
216 __u32 reserved[16]; /* Reserved room */
220 * IPC Response structure to logout user account.
222 struct ksmbd_logout_request {
223 __s8 account[KSMBD_REQ_MAX_ACCOUNT_NAME_SZ]; /* user account name */
225 __u32 reserved[16]; /* Reserved room */
229 * RPC command structure to send rpc request like srvsvc or wkssvc to
232 struct ksmbd_rpc_command {
240 * IPC Request Kerberos authentication
242 struct ksmbd_spnego_authen_request {
244 __u16 spnego_blob_len; /* the length of spnego_blob */
245 __u8 spnego_blob[]; /*
246 * the GSS token from SecurityBuffer of
247 * SMB2 SESSION SETUP request
252 * Response data which includes the GSS token and the session key generated by
255 struct ksmbd_spnego_authen_response {
257 struct ksmbd_login_response login_response; /*
258 * the login response with
259 * a user identified by the
260 * GSS token from a client
262 __u16 session_key_len; /* the length of the session key */
263 __u16 spnego_blob_len; /*
264 * the length of the GSS token which will be
265 * stored in SecurityBuffer of SMB2 SESSION
268 __u8 payload[]; /* session key + AP_REP */
272 * This also used as NETLINK attribute type value.
275 * Response message type value should be equal to
276 * request message type value + 1.
279 KSMBD_EVENT_UNSPEC = 0,
280 KSMBD_EVENT_HEARTBEAT_REQUEST,
282 KSMBD_EVENT_STARTING_UP,
283 KSMBD_EVENT_SHUTTING_DOWN,
285 KSMBD_EVENT_LOGIN_REQUEST,
286 KSMBD_EVENT_LOGIN_RESPONSE = 5,
288 KSMBD_EVENT_SHARE_CONFIG_REQUEST,
289 KSMBD_EVENT_SHARE_CONFIG_RESPONSE,
291 KSMBD_EVENT_TREE_CONNECT_REQUEST,
292 KSMBD_EVENT_TREE_CONNECT_RESPONSE,
294 KSMBD_EVENT_TREE_DISCONNECT_REQUEST = 10,
296 KSMBD_EVENT_LOGOUT_REQUEST,
298 KSMBD_EVENT_RPC_REQUEST,
299 KSMBD_EVENT_RPC_RESPONSE,
301 KSMBD_EVENT_SPNEGO_AUTHEN_REQUEST,
302 KSMBD_EVENT_SPNEGO_AUTHEN_RESPONSE = 15,
308 * Enumeration for IPC tree connect status.
310 enum KSMBD_TREE_CONN_STATUS {
311 KSMBD_TREE_CONN_STATUS_OK = 0,
312 KSMBD_TREE_CONN_STATUS_NOMEM,
313 KSMBD_TREE_CONN_STATUS_NO_SHARE,
314 KSMBD_TREE_CONN_STATUS_NO_USER,
315 KSMBD_TREE_CONN_STATUS_INVALID_USER,
316 KSMBD_TREE_CONN_STATUS_HOST_DENIED = 5,
317 KSMBD_TREE_CONN_STATUS_CONN_EXIST,
318 KSMBD_TREE_CONN_STATUS_TOO_MANY_CONNS,
319 KSMBD_TREE_CONN_STATUS_TOO_MANY_SESSIONS,
320 KSMBD_TREE_CONN_STATUS_ERROR,
326 #define KSMBD_USER_FLAG_INVALID (0)
327 #define KSMBD_USER_FLAG_OK BIT(0)
328 #define KSMBD_USER_FLAG_BAD_PASSWORD BIT(1)
329 #define KSMBD_USER_FLAG_BAD_UID BIT(2)
330 #define KSMBD_USER_FLAG_BAD_USER BIT(3)
331 #define KSMBD_USER_FLAG_GUEST_ACCOUNT BIT(4)
332 #define KSMBD_USER_FLAG_DELAY_SESSION BIT(5)
335 * Share config flags.
337 #define KSMBD_SHARE_FLAG_INVALID (0)
338 #define KSMBD_SHARE_FLAG_AVAILABLE BIT(0)
339 #define KSMBD_SHARE_FLAG_BROWSEABLE BIT(1)
340 #define KSMBD_SHARE_FLAG_WRITEABLE BIT(2)
341 #define KSMBD_SHARE_FLAG_READONLY BIT(3)
342 #define KSMBD_SHARE_FLAG_GUEST_OK BIT(4)
343 #define KSMBD_SHARE_FLAG_GUEST_ONLY BIT(5)
344 #define KSMBD_SHARE_FLAG_STORE_DOS_ATTRS BIT(6)
345 #define KSMBD_SHARE_FLAG_OPLOCKS BIT(7)
346 #define KSMBD_SHARE_FLAG_PIPE BIT(8)
347 #define KSMBD_SHARE_FLAG_HIDE_DOT_FILES BIT(9)
348 #define KSMBD_SHARE_FLAG_INHERIT_OWNER BIT(10)
349 #define KSMBD_SHARE_FLAG_STREAMS BIT(11)
350 #define KSMBD_SHARE_FLAG_FOLLOW_SYMLINKS BIT(12)
351 #define KSMBD_SHARE_FLAG_ACL_XATTR BIT(13)
352 #define KSMBD_SHARE_FLAG_UPDATE BIT(14)
355 * Tree connect request flags.
357 #define KSMBD_TREE_CONN_FLAG_REQUEST_SMB1 (0)
358 #define KSMBD_TREE_CONN_FLAG_REQUEST_IPV6 BIT(0)
359 #define KSMBD_TREE_CONN_FLAG_REQUEST_SMB2 BIT(1)
362 * Tree connect flags.
364 #define KSMBD_TREE_CONN_FLAG_GUEST_ACCOUNT BIT(0)
365 #define KSMBD_TREE_CONN_FLAG_READ_ONLY BIT(1)
366 #define KSMBD_TREE_CONN_FLAG_WRITABLE BIT(2)
367 #define KSMBD_TREE_CONN_FLAG_ADMIN_ACCOUNT BIT(3)
368 #define KSMBD_TREE_CONN_FLAG_UPDATE BIT(4)
373 #define KSMBD_RPC_METHOD_RETURN BIT(0)
374 #define KSMBD_RPC_SRVSVC_METHOD_INVOKE BIT(1)
375 #define KSMBD_RPC_SRVSVC_METHOD_RETURN (KSMBD_RPC_SRVSVC_METHOD_INVOKE | KSMBD_RPC_METHOD_RETURN)
376 #define KSMBD_RPC_WKSSVC_METHOD_INVOKE BIT(2)
377 #define KSMBD_RPC_WKSSVC_METHOD_RETURN (KSMBD_RPC_WKSSVC_METHOD_INVOKE | KSMBD_RPC_METHOD_RETURN)
378 #define KSMBD_RPC_IOCTL_METHOD (BIT(3) | KSMBD_RPC_METHOD_RETURN)
379 #define KSMBD_RPC_OPEN_METHOD BIT(4)
380 #define KSMBD_RPC_WRITE_METHOD BIT(5)
381 #define KSMBD_RPC_READ_METHOD (BIT(6) | KSMBD_RPC_METHOD_RETURN)
382 #define KSMBD_RPC_CLOSE_METHOD BIT(7)
383 #define KSMBD_RPC_RAP_METHOD (BIT(8) | KSMBD_RPC_METHOD_RETURN)
384 #define KSMBD_RPC_RESTRICTED_CONTEXT BIT(9)
385 #define KSMBD_RPC_SAMR_METHOD_INVOKE BIT(10)
386 #define KSMBD_RPC_SAMR_METHOD_RETURN (KSMBD_RPC_SAMR_METHOD_INVOKE | KSMBD_RPC_METHOD_RETURN)
387 #define KSMBD_RPC_LSARPC_METHOD_INVOKE BIT(11)
388 #define KSMBD_RPC_LSARPC_METHOD_RETURN (KSMBD_RPC_LSARPC_METHOD_INVOKE | KSMBD_RPC_METHOD_RETURN)
391 * RPC status definitions.
393 #define KSMBD_RPC_OK 0
394 #define KSMBD_RPC_EBAD_FUNC 0x00000001
395 #define KSMBD_RPC_EACCESS_DENIED 0x00000005
396 #define KSMBD_RPC_EBAD_FID 0x00000006
397 #define KSMBD_RPC_ENOMEM 0x00000008
398 #define KSMBD_RPC_EBAD_DATA 0x0000000D
399 #define KSMBD_RPC_ENOTIMPLEMENTED 0x00000040
400 #define KSMBD_RPC_EINVALID_PARAMETER 0x00000057
401 #define KSMBD_RPC_EMORE_DATA 0x000000EA
402 #define KSMBD_RPC_EINVALID_LEVEL 0x0000007C
403 #define KSMBD_RPC_SOME_NOT_MAPPED 0x00000107
405 #define KSMBD_CONFIG_OPT_DISABLED 0
406 #define KSMBD_CONFIG_OPT_ENABLED 1
407 #define KSMBD_CONFIG_OPT_AUTO 2
408 #define KSMBD_CONFIG_OPT_MANDATORY 3
410 #endif /* _LINUX_KSMBD_SERVER_H */