Lines Matching defs:sess

64 	struct ksmbd_session *sess;
69 sess = ksmbd_session_lookup_all(conn, id);
70 if (sess)
76 struct channel *lookup_chann_list(struct ksmbd_session *sess, struct ksmbd_conn *conn)
78 return xa_load(&sess->ksmbd_chann_list, (long)conn);
101 if (xa_empty(&work->sess->tree_conns)) {
125 work->tcon = ksmbd_tree_conn_lookup(work->sess, tree_id);
587 * Just validate session id in header with work->sess->id.
590 if (!work->sess) {
591 pr_err("The first operation in the compound does not have sess\n");
594 if (sess_id != ULLONG_MAX && work->sess->id != sess_id) {
596 sess_id, work->sess->id);
603 work->sess = ksmbd_session_lookup_all(conn, sess_id);
604 if (work->sess)
1274 static int alloc_preauth_hash(struct ksmbd_session *sess,
1277 if (sess->Preauth_HashValue)
1280 sess->Preauth_HashValue = kmemdup(conn->preauth_info->Preauth_HashValue,
1282 if (!sess->Preauth_HashValue)
1291 struct ksmbd_session *sess = work->sess;
1300 preauth_sess = ksmbd_preauth_session_lookup(conn, sess->id);
1302 preauth_sess = ksmbd_preauth_session_alloc(conn, sess->id);
1309 if (!sess->Preauth_HashValue)
1310 if (alloc_preauth_hash(sess, conn))
1312 preauth_hash = sess->Preauth_HashValue;
1452 struct ksmbd_session *sess = work->sess;
1483 if (prev_id && prev_id != sess->id)
1486 if (sess->state == SMB2_SESSION_VALID) {
1496 if (!ksmbd_compare_user(sess->user, user)) {
1502 sess->user = user;
1505 if (conn->binding == false && user_guest(sess->user)) {
1515 rc = ksmbd_decode_ntlmssp_auth_blob(authblob, sz, conn, sess);
1517 set_user_flag(sess->user, KSMBD_USER_FLAG_BAD_PASSWORD);
1528 if (sess->state == SMB2_SESSION_VALID) {
1537 sess->sign = true;
1541 rc = conn->ops->generate_encryptionkey(conn, sess);
1547 sess->enc = true;
1554 sess->sign = false;
1559 chann = lookup_chann_list(sess, conn);
1566 xa_store(&sess->ksmbd_chann_list, (long)conn, chann, GFP_KERNEL);
1571 rc = conn->ops->generate_signingkey(sess, conn);
1591 struct ksmbd_session *sess = work->sess;
1608 if (prev_sess_id && prev_sess_id != sess->id)
1609 destroy_previous_session(conn, sess->user, prev_sess_id);
1611 if (sess->state == SMB2_SESSION_VALID)
1612 ksmbd_free_user(sess->user);
1614 retval = ksmbd_krb5_authenticate(sess, in_blob, in_len,
1624 sess->sign = true;
1627 retval = conn->ops->generate_encryptionkey(conn, sess);
1633 sess->enc = true;
1636 sess->sign = false;
1640 chann = lookup_chann_list(sess, conn);
1647 xa_store(&sess->ksmbd_chann_list, (long)conn, chann, GFP_KERNEL);
1652 retval = conn->ops->generate_signingkey(sess, conn);
1679 struct ksmbd_session *sess;
1695 sess = ksmbd_smb2_session_create();
1696 if (!sess) {
1700 rsp->hdr.SessionId = cpu_to_le64(sess->id);
1701 rc = ksmbd_session_register(conn, sess);
1709 sess = ksmbd_session_lookup_slowpath(sess_id);
1710 if (!sess) {
1715 if (conn->dialect != sess->dialect) {
1725 if (strncmp(conn->ClientGUID, sess->ClientGUID,
1731 if (sess->state == SMB2_SESSION_IN_PROGRESS) {
1736 if (sess->state == SMB2_SESSION_EXPIRED) {
1743 sess = NULL;
1752 if (user_guest(sess->user)) {
1761 sess = NULL;
1765 sess = ksmbd_session_lookup(conn,
1767 if (!sess) {
1772 if (sess->state == SMB2_SESSION_EXPIRED) {
1779 sess = NULL;
1783 work->sess = sess;
1822 sess->state = SMB2_SESSION_VALID;
1824 kfree(sess->Preauth_HashValue);
1825 sess->Preauth_HashValue = NULL;
1840 sess->state = SMB2_SESSION_VALID;
1846 ksmbd_preauth_session_lookup(conn, sess->id);
1852 kfree(sess->Preauth_HashValue);
1853 sess->Preauth_HashValue = NULL;
1897 if (sess) {
1906 if (sess->user && sess->user->flags & KSMBD_USER_FLAG_DELAY_SESSION)
1909 sess->last_active = jiffies;
1910 sess->state = SMB2_SESSION_EXPIRED;
1946 struct ksmbd_session *sess = work->sess;
1972 status = ksmbd_tree_conn_connect(conn, sess, name);
2006 write_lock(&sess->tree_conns_lock);
2008 write_unlock(&sess->tree_conns_lock);
2130 struct ksmbd_session *sess = work->sess;
2148 write_lock(&sess->tree_conns_lock);
2150 write_unlock(&sess->tree_conns_lock);
2158 write_unlock(&sess->tree_conns_lock);
2160 err = ksmbd_tree_conn_disconnect(sess, tcon);
2195 struct ksmbd_session *sess;
2221 sess = ksmbd_session_lookup_all(conn, sess_id);
2222 if (ksmbd_tree_conn_session_logoff(sess)) {
2229 ksmbd_destroy_file_table(&sess->file_table);
2230 sess->state = SMB2_SESSION_EXPIRED;
2232 ksmbd_free_user(sess->user);
2233 sess->user = NULL;
2270 id = ksmbd_session_rpc_open(work->sess, name);
2654 struct ksmbd_session *sess = work->sess;
2965 sess->user->uid);
3111 rc = smb_inherit_dacl(conn, &path, sess->user->uid,
3112 sess->user->gid);
3235 rc = find_same_lease_key(sess, fp->f_ci, lc);
3432 ksmbd_update_fstate(&work->sess->file_table, fp, FP_INITED);
4265 static int smb2_get_info_file_pipe(struct ksmbd_session *sess,
4278 if (!ksmbd_session_rpc_method(sess, id))
4899 return smb2_get_info_file_pipe(work->sess, req, rsp,
5007 struct ksmbd_session *sess = work->sess;
5132 if (!user_guest(sess->user))
5133 memcpy(info->objid, user_passkey(sess->user), 16);
5370 ksmbd_session_rpc_close(work->sess, id);
6154 rpc_resp = ksmbd_rpc_read(work->sess, id);
6452 rpc_resp = ksmbd_rpc_write(work->sess, id, data_buf, length);
7541 rpc_resp = ksmbd_rpc_ioctl(work->sess, id, data_buf,
8372 if (ksmbd_sign_smb2_pdu(work->conn, work->sess->sess_key, iov, 1,
8407 if (!ksmbd_sign_smb2_pdu(work->conn, work->sess->sess_key, iov, n_vec,
8442 signing_key = work->sess->smb3signingkey;
8444 chann = lookup_chann_list(work->sess, conn);
8491 signing_key = work->sess->smb3signingkey;
8493 chann = lookup_chann_list(work->sess, work->conn);
8526 struct ksmbd_session *sess = work->sess;
8539 if (le16_to_cpu(rsp->Command) == SMB2_SESSION_SETUP_HE && sess) {
8545 preauth_sess = ksmbd_preauth_session_lookup(conn, sess->id);
8550 hash_value = sess->Preauth_HashValue;
8608 struct ksmbd_session *sess;
8628 sess = ksmbd_session_lookup_all(work->conn, le64_to_cpu(tr_hdr->SessionId));
8629 if (!sess) {
8652 struct ksmbd_session *sess = work->sess;
8662 sess->user && !user_guest(sess->user) &&