1 // SPDX-License-Identifier: GPL-2.0-or-later
2 /*
3 * Copyright (C) 2016 Namjae Jeon <linkinjeon@kernel.org>
4 * Copyright (C) 2018 Samsung Electronics Co., Ltd.
5 */
6
7 #include <linux/freezer.h>
8
9 #include "smb_common.h"
10 #include "server.h"
11 #include "auth.h"
12 #include "connection.h"
13 #include "transport_tcp.h"
14
15 #define IFACE_STATE_DOWN BIT(0)
16 #define IFACE_STATE_CONFIGURED BIT(1)
17
18 static atomic_t active_num_conn;
19
20 struct interface {
21 struct task_struct *ksmbd_kthread;
22 struct socket *ksmbd_socket;
23 struct list_head entry;
24 char *name;
25 struct mutex sock_release_lock;
26 int state;
27 };
28
29 static LIST_HEAD(iface_list);
30
31 static int bind_additional_ifaces;
32
33 struct tcp_transport {
34 struct ksmbd_transport transport;
35 struct socket *sock;
36 struct kvec *iov;
37 unsigned int nr_iov;
38 };
39
40 static const struct ksmbd_transport_ops ksmbd_tcp_transport_ops;
41
42 static void tcp_stop_kthread(struct task_struct *kthread);
43 static struct interface *alloc_iface(char *ifname);
44
45 #define KSMBD_TRANS(t) (&(t)->transport)
46 #define TCP_TRANS(t) ((struct tcp_transport *)container_of(t, \
47 struct tcp_transport, transport))
48
ksmbd_tcp_nodelay(struct socket * sock)49 static inline void ksmbd_tcp_nodelay(struct socket *sock)
50 {
51 tcp_sock_set_nodelay(sock->sk);
52 }
53
ksmbd_tcp_reuseaddr(struct socket * sock)54 static inline void ksmbd_tcp_reuseaddr(struct socket *sock)
55 {
56 sock_set_reuseaddr(sock->sk);
57 }
58
ksmbd_tcp_rcv_timeout(struct socket * sock,s64 secs)59 static inline void ksmbd_tcp_rcv_timeout(struct socket *sock, s64 secs)
60 {
61 lock_sock(sock->sk);
62 if (secs && secs < MAX_SCHEDULE_TIMEOUT / HZ - 1)
63 sock->sk->sk_rcvtimeo = secs * HZ;
64 else
65 sock->sk->sk_rcvtimeo = MAX_SCHEDULE_TIMEOUT;
66 release_sock(sock->sk);
67 }
68
ksmbd_tcp_snd_timeout(struct socket * sock,s64 secs)69 static inline void ksmbd_tcp_snd_timeout(struct socket *sock, s64 secs)
70 {
71 sock_set_sndtimeo(sock->sk, secs);
72 }
73
alloc_transport(struct socket * client_sk)74 static struct tcp_transport *alloc_transport(struct socket *client_sk)
75 {
76 struct tcp_transport *t;
77 struct ksmbd_conn *conn;
78
79 t = kzalloc(sizeof(*t), KSMBD_DEFAULT_GFP);
80 if (!t)
81 return NULL;
82 t->sock = client_sk;
83
84 conn = ksmbd_conn_alloc();
85 if (!conn) {
86 kfree(t);
87 return NULL;
88 }
89
90 #if IS_ENABLED(CONFIG_IPV6)
91 if (client_sk->sk->sk_family == AF_INET6)
92 memcpy(&conn->inet6_addr, &client_sk->sk->sk_v6_daddr, 16);
93 else
94 conn->inet_addr = inet_sk(client_sk->sk)->inet_daddr;
95 #else
96 conn->inet_addr = inet_sk(client_sk->sk)->inet_daddr;
97 #endif
98 conn->transport = KSMBD_TRANS(t);
99 KSMBD_TRANS(t)->conn = conn;
100 KSMBD_TRANS(t)->ops = &ksmbd_tcp_transport_ops;
101 return t;
102 }
103
ksmbd_tcp_free_transport(struct ksmbd_transport * kt)104 static void ksmbd_tcp_free_transport(struct ksmbd_transport *kt)
105 {
106 struct tcp_transport *t = TCP_TRANS(kt);
107
108 sock_release(t->sock);
109 kfree(t->iov);
110 kfree(t);
111 }
112
free_transport(struct tcp_transport * t)113 static void free_transport(struct tcp_transport *t)
114 {
115 kernel_sock_shutdown(t->sock, SHUT_RDWR);
116 ksmbd_conn_free(KSMBD_TRANS(t)->conn);
117 }
118
119 /**
120 * kvec_array_init() - initialize a IO vector segment
121 * @new: IO vector to be initialized
122 * @iov: base IO vector
123 * @nr_segs: number of segments in base iov
124 * @bytes: total iovec length so far for read
125 *
126 * Return: Number of IO segments
127 */
kvec_array_init(struct kvec * new,struct kvec * iov,unsigned int nr_segs,size_t bytes)128 static unsigned int kvec_array_init(struct kvec *new, struct kvec *iov,
129 unsigned int nr_segs, size_t bytes)
130 {
131 size_t base = 0;
132
133 while (bytes || !iov->iov_len) {
134 int copy = min(bytes, iov->iov_len);
135
136 bytes -= copy;
137 base += copy;
138 if (iov->iov_len == base) {
139 iov++;
140 nr_segs--;
141 base = 0;
142 }
143 }
144
145 memcpy(new, iov, sizeof(*iov) * nr_segs);
146 new->iov_base += base;
147 new->iov_len -= base;
148 return nr_segs;
149 }
150
151 /**
152 * get_conn_iovec() - get connection iovec for reading from socket
153 * @t: TCP transport instance
154 * @nr_segs: number of segments in iov
155 *
156 * Return: return existing or newly allocate iovec
157 */
get_conn_iovec(struct tcp_transport * t,unsigned int nr_segs)158 static struct kvec *get_conn_iovec(struct tcp_transport *t, unsigned int nr_segs)
159 {
160 struct kvec *new_iov;
161
162 if (t->iov && nr_segs <= t->nr_iov)
163 return t->iov;
164
165 /* not big enough -- allocate a new one and release the old */
166 new_iov = kmalloc_array(nr_segs, sizeof(*new_iov), KSMBD_DEFAULT_GFP);
167 if (new_iov) {
168 kfree(t->iov);
169 t->iov = new_iov;
170 t->nr_iov = nr_segs;
171 }
172 return new_iov;
173 }
174
ksmbd_tcp_get_port(const struct sockaddr * sa)175 static unsigned short ksmbd_tcp_get_port(const struct sockaddr *sa)
176 {
177 switch (sa->sa_family) {
178 case AF_INET:
179 return ntohs(((struct sockaddr_in *)sa)->sin_port);
180 case AF_INET6:
181 return ntohs(((struct sockaddr_in6 *)sa)->sin6_port);
182 }
183 return 0;
184 }
185
186 /**
187 * ksmbd_tcp_new_connection() - create a new tcp session on mount
188 * @client_sk: socket associated with new connection
189 *
190 * whenever a new connection is requested, create a conn thread
191 * (session thread) to handle new incoming smb requests from the connection
192 *
193 * Return: 0 on success, otherwise error
194 */
ksmbd_tcp_new_connection(struct socket * client_sk)195 static int ksmbd_tcp_new_connection(struct socket *client_sk)
196 {
197 struct sockaddr *csin;
198 int rc = 0;
199 struct tcp_transport *t;
200 struct task_struct *handler;
201
202 t = alloc_transport(client_sk);
203 if (!t) {
204 sock_release(client_sk);
205 return -ENOMEM;
206 }
207
208 csin = KSMBD_TCP_PEER_SOCKADDR(KSMBD_TRANS(t)->conn);
209 if (kernel_getpeername(client_sk, csin) < 0) {
210 pr_err("client ip resolution failed\n");
211 rc = -EINVAL;
212 goto out_error;
213 }
214
215 handler = kthread_run(ksmbd_conn_handler_loop,
216 KSMBD_TRANS(t)->conn,
217 "ksmbd:%u",
218 ksmbd_tcp_get_port(csin));
219 if (IS_ERR(handler)) {
220 pr_err("cannot start conn thread\n");
221 rc = PTR_ERR(handler);
222 free_transport(t);
223 }
224 return rc;
225
226 out_error:
227 free_transport(t);
228 return rc;
229 }
230
231 /**
232 * ksmbd_kthread_fn() - listen to new SMB connections and callback server
233 * @p: arguments to forker thread
234 *
235 * Return: 0 on success, error number otherwise
236 */
ksmbd_kthread_fn(void * p)237 static int ksmbd_kthread_fn(void *p)
238 {
239 struct socket *client_sk = NULL;
240 struct interface *iface = (struct interface *)p;
241 struct ksmbd_conn *conn;
242 int ret;
243
244 while (!kthread_should_stop()) {
245 mutex_lock(&iface->sock_release_lock);
246 if (!iface->ksmbd_socket) {
247 mutex_unlock(&iface->sock_release_lock);
248 break;
249 }
250 ret = kernel_accept(iface->ksmbd_socket, &client_sk,
251 SOCK_NONBLOCK);
252 mutex_unlock(&iface->sock_release_lock);
253 if (ret) {
254 if (ret == -EAGAIN)
255 /* check for new connections every 100 msecs */
256 schedule_timeout_interruptible(HZ / 10);
257 continue;
258 }
259
260 /*
261 * Limits repeated connections from clients with the same IP.
262 */
263 down_read(&conn_list_lock);
264 list_for_each_entry(conn, &conn_list, conns_list)
265 #if IS_ENABLED(CONFIG_IPV6)
266 if (client_sk->sk->sk_family == AF_INET6) {
267 if (memcmp(&client_sk->sk->sk_v6_daddr,
268 &conn->inet6_addr, 16) == 0) {
269 ret = -EAGAIN;
270 break;
271 }
272 } else if (inet_sk(client_sk->sk)->inet_daddr ==
273 conn->inet_addr) {
274 ret = -EAGAIN;
275 break;
276 }
277 #else
278 if (inet_sk(client_sk->sk)->inet_daddr ==
279 conn->inet_addr) {
280 ret = -EAGAIN;
281 break;
282 }
283 #endif
284 up_read(&conn_list_lock);
285 if (ret == -EAGAIN)
286 continue;
287
288 if (server_conf.max_connections &&
289 atomic_inc_return(&active_num_conn) >= server_conf.max_connections) {
290 pr_info_ratelimited("Limit the maximum number of connections(%u)\n",
291 atomic_read(&active_num_conn));
292 atomic_dec(&active_num_conn);
293 sock_release(client_sk);
294 continue;
295 }
296
297 ksmbd_debug(CONN, "connect success: accepted new connection\n");
298 client_sk->sk->sk_rcvtimeo = KSMBD_TCP_RECV_TIMEOUT;
299 client_sk->sk->sk_sndtimeo = KSMBD_TCP_SEND_TIMEOUT;
300
301 ksmbd_tcp_new_connection(client_sk);
302 }
303
304 ksmbd_debug(CONN, "releasing socket\n");
305 return 0;
306 }
307
308 /**
309 * ksmbd_tcp_run_kthread() - start forker thread
310 * @iface: pointer to struct interface
311 *
312 * start forker thread(ksmbd/0) at module init time to listen
313 * on port 445 for new SMB connection requests. It creates per connection
314 * server threads(ksmbd/x)
315 *
316 * Return: 0 on success or error number
317 */
ksmbd_tcp_run_kthread(struct interface * iface)318 static int ksmbd_tcp_run_kthread(struct interface *iface)
319 {
320 int rc;
321 struct task_struct *kthread;
322
323 kthread = kthread_run(ksmbd_kthread_fn, (void *)iface, "ksmbd-%s",
324 iface->name);
325 if (IS_ERR(kthread)) {
326 rc = PTR_ERR(kthread);
327 return rc;
328 }
329 iface->ksmbd_kthread = kthread;
330
331 return 0;
332 }
333
334 /**
335 * ksmbd_tcp_readv() - read data from socket in given iovec
336 * @t: TCP transport instance
337 * @iov_orig: base IO vector
338 * @nr_segs: number of segments in base iov
339 * @to_read: number of bytes to read from socket
340 * @max_retries: maximum retry count
341 *
342 * Return: on success return number of bytes read from socket,
343 * otherwise return error number
344 */
ksmbd_tcp_readv(struct tcp_transport * t,struct kvec * iov_orig,unsigned int nr_segs,unsigned int to_read,int max_retries)345 static int ksmbd_tcp_readv(struct tcp_transport *t, struct kvec *iov_orig,
346 unsigned int nr_segs, unsigned int to_read,
347 int max_retries)
348 {
349 int length = 0;
350 int total_read;
351 unsigned int segs;
352 struct msghdr ksmbd_msg;
353 struct kvec *iov;
354 struct ksmbd_conn *conn = KSMBD_TRANS(t)->conn;
355
356 iov = get_conn_iovec(t, nr_segs);
357 if (!iov)
358 return -ENOMEM;
359
360 ksmbd_msg.msg_control = NULL;
361 ksmbd_msg.msg_controllen = 0;
362
363 for (total_read = 0; to_read; total_read += length, to_read -= length) {
364 try_to_freeze();
365
366 if (!ksmbd_conn_alive(conn)) {
367 total_read = -ESHUTDOWN;
368 break;
369 }
370 segs = kvec_array_init(iov, iov_orig, nr_segs, total_read);
371
372 length = kernel_recvmsg(t->sock, &ksmbd_msg,
373 iov, segs, to_read, 0);
374
375 if (length == -EINTR) {
376 total_read = -ESHUTDOWN;
377 break;
378 } else if (ksmbd_conn_need_reconnect(conn)) {
379 total_read = -EAGAIN;
380 break;
381 } else if (length == -ERESTARTSYS || length == -EAGAIN) {
382 /*
383 * If max_retries is negative, Allow unlimited
384 * retries to keep connection with inactive sessions.
385 */
386 if (max_retries == 0) {
387 total_read = length;
388 break;
389 } else if (max_retries > 0) {
390 max_retries--;
391 }
392
393 usleep_range(1000, 2000);
394 length = 0;
395 continue;
396 } else if (length <= 0) {
397 total_read = length;
398 break;
399 }
400 }
401 return total_read;
402 }
403
404 /**
405 * ksmbd_tcp_read() - read data from socket in given buffer
406 * @t: TCP transport instance
407 * @buf: buffer to store read data from socket
408 * @to_read: number of bytes to read from socket
409 * @max_retries: number of retries if reading from socket fails
410 *
411 * Return: on success return number of bytes read from socket,
412 * otherwise return error number
413 */
ksmbd_tcp_read(struct ksmbd_transport * t,char * buf,unsigned int to_read,int max_retries)414 static int ksmbd_tcp_read(struct ksmbd_transport *t, char *buf,
415 unsigned int to_read, int max_retries)
416 {
417 struct kvec iov;
418
419 iov.iov_base = buf;
420 iov.iov_len = to_read;
421
422 return ksmbd_tcp_readv(TCP_TRANS(t), &iov, 1, to_read, max_retries);
423 }
424
ksmbd_tcp_writev(struct ksmbd_transport * t,struct kvec * iov,int nvecs,int size,bool need_invalidate,unsigned int remote_key)425 static int ksmbd_tcp_writev(struct ksmbd_transport *t, struct kvec *iov,
426 int nvecs, int size, bool need_invalidate,
427 unsigned int remote_key)
428
429 {
430 struct msghdr smb_msg = {.msg_flags = MSG_NOSIGNAL};
431
432 return kernel_sendmsg(TCP_TRANS(t)->sock, &smb_msg, iov, nvecs, size);
433 }
434
ksmbd_tcp_disconnect(struct ksmbd_transport * t)435 static void ksmbd_tcp_disconnect(struct ksmbd_transport *t)
436 {
437 free_transport(TCP_TRANS(t));
438 if (server_conf.max_connections)
439 atomic_dec(&active_num_conn);
440 }
441
tcp_destroy_socket(struct socket * ksmbd_socket)442 static void tcp_destroy_socket(struct socket *ksmbd_socket)
443 {
444 int ret;
445
446 if (!ksmbd_socket)
447 return;
448
449 /* set zero to timeout */
450 ksmbd_tcp_rcv_timeout(ksmbd_socket, 0);
451 ksmbd_tcp_snd_timeout(ksmbd_socket, 0);
452
453 ret = kernel_sock_shutdown(ksmbd_socket, SHUT_RDWR);
454 if (ret)
455 pr_err("Failed to shutdown socket: %d\n", ret);
456 sock_release(ksmbd_socket);
457 }
458
459 /**
460 * create_socket - create socket for ksmbd/0
461 * @iface: interface to bind the created socket to
462 *
463 * Return: 0 on success, error number otherwise
464 */
create_socket(struct interface * iface)465 static int create_socket(struct interface *iface)
466 {
467 int ret;
468 struct sockaddr_in6 sin6;
469 struct sockaddr_in sin;
470 struct socket *ksmbd_socket;
471 bool ipv4 = false;
472
473 ret = sock_create(PF_INET6, SOCK_STREAM, IPPROTO_TCP, &ksmbd_socket);
474 if (ret) {
475 if (ret != -EAFNOSUPPORT)
476 pr_err("Can't create socket for ipv6, fallback to ipv4: %d\n", ret);
477 ret = sock_create(PF_INET, SOCK_STREAM, IPPROTO_TCP,
478 &ksmbd_socket);
479 if (ret) {
480 pr_err("Can't create socket for ipv4: %d\n", ret);
481 goto out_clear;
482 }
483
484 sin.sin_family = PF_INET;
485 sin.sin_addr.s_addr = htonl(INADDR_ANY);
486 sin.sin_port = htons(server_conf.tcp_port);
487 ipv4 = true;
488 } else {
489 sin6.sin6_family = PF_INET6;
490 sin6.sin6_addr = in6addr_any;
491 sin6.sin6_port = htons(server_conf.tcp_port);
492
493 lock_sock(ksmbd_socket->sk);
494 ksmbd_socket->sk->sk_ipv6only = false;
495 release_sock(ksmbd_socket->sk);
496 }
497
498 ksmbd_tcp_nodelay(ksmbd_socket);
499 ksmbd_tcp_reuseaddr(ksmbd_socket);
500
501 ret = sock_setsockopt(ksmbd_socket,
502 SOL_SOCKET,
503 SO_BINDTODEVICE,
504 KERNEL_SOCKPTR(iface->name),
505 strlen(iface->name));
506 if (ret != -ENODEV && ret < 0) {
507 pr_err("Failed to set SO_BINDTODEVICE: %d\n", ret);
508 goto out_error;
509 }
510
511 if (ipv4)
512 ret = kernel_bind(ksmbd_socket, (struct sockaddr *)&sin,
513 sizeof(sin));
514 else
515 ret = kernel_bind(ksmbd_socket, (struct sockaddr *)&sin6,
516 sizeof(sin6));
517 if (ret) {
518 pr_err("Failed to bind socket: %d\n", ret);
519 goto out_error;
520 }
521
522 ksmbd_socket->sk->sk_rcvtimeo = KSMBD_TCP_RECV_TIMEOUT;
523 ksmbd_socket->sk->sk_sndtimeo = KSMBD_TCP_SEND_TIMEOUT;
524
525 ret = kernel_listen(ksmbd_socket, KSMBD_SOCKET_BACKLOG);
526 if (ret) {
527 pr_err("Port listen() error: %d\n", ret);
528 goto out_error;
529 }
530
531 iface->ksmbd_socket = ksmbd_socket;
532 ret = ksmbd_tcp_run_kthread(iface);
533 if (ret) {
534 pr_err("Can't start ksmbd main kthread: %d\n", ret);
535 goto out_error;
536 }
537 iface->state = IFACE_STATE_CONFIGURED;
538
539 return 0;
540
541 out_error:
542 tcp_destroy_socket(ksmbd_socket);
543 out_clear:
544 iface->ksmbd_socket = NULL;
545 return ret;
546 }
547
ksmbd_find_netdev_name_iface_list(char * netdev_name)548 struct interface *ksmbd_find_netdev_name_iface_list(char *netdev_name)
549 {
550 struct interface *iface;
551
552 list_for_each_entry(iface, &iface_list, entry)
553 if (!strcmp(iface->name, netdev_name))
554 return iface;
555 return NULL;
556 }
557
ksmbd_netdev_event(struct notifier_block * nb,unsigned long event,void * ptr)558 static int ksmbd_netdev_event(struct notifier_block *nb, unsigned long event,
559 void *ptr)
560 {
561 struct net_device *netdev = netdev_notifier_info_to_dev(ptr);
562 struct interface *iface;
563 int ret;
564
565 switch (event) {
566 case NETDEV_UP:
567 if (netif_is_bridge_port(netdev))
568 return NOTIFY_OK;
569
570 iface = ksmbd_find_netdev_name_iface_list(netdev->name);
571 if (iface && iface->state == IFACE_STATE_DOWN) {
572 ksmbd_debug(CONN, "netdev-up event: netdev(%s) is going up\n",
573 iface->name);
574 ret = create_socket(iface);
575 if (ret)
576 return NOTIFY_OK;
577 }
578 if (!iface && bind_additional_ifaces) {
579 iface = alloc_iface(kstrdup(netdev->name, KSMBD_DEFAULT_GFP));
580 if (!iface)
581 return NOTIFY_OK;
582 ksmbd_debug(CONN, "netdev-up event: netdev(%s) is going up\n",
583 iface->name);
584 ret = create_socket(iface);
585 if (ret)
586 break;
587 }
588 break;
589 case NETDEV_DOWN:
590 iface = ksmbd_find_netdev_name_iface_list(netdev->name);
591 if (iface && iface->state == IFACE_STATE_CONFIGURED) {
592 ksmbd_debug(CONN, "netdev-down event: netdev(%s) is going down\n",
593 iface->name);
594 tcp_stop_kthread(iface->ksmbd_kthread);
595 iface->ksmbd_kthread = NULL;
596 mutex_lock(&iface->sock_release_lock);
597 tcp_destroy_socket(iface->ksmbd_socket);
598 iface->ksmbd_socket = NULL;
599 mutex_unlock(&iface->sock_release_lock);
600
601 iface->state = IFACE_STATE_DOWN;
602 break;
603 }
604 break;
605 }
606
607 return NOTIFY_DONE;
608 }
609
610 static struct notifier_block ksmbd_netdev_notifier = {
611 .notifier_call = ksmbd_netdev_event,
612 };
613
ksmbd_tcp_init(void)614 int ksmbd_tcp_init(void)
615 {
616 register_netdevice_notifier(&ksmbd_netdev_notifier);
617
618 return 0;
619 }
620
tcp_stop_kthread(struct task_struct * kthread)621 static void tcp_stop_kthread(struct task_struct *kthread)
622 {
623 int ret;
624
625 if (!kthread)
626 return;
627
628 ret = kthread_stop(kthread);
629 if (ret)
630 pr_err("failed to stop forker thread\n");
631 }
632
ksmbd_tcp_destroy(void)633 void ksmbd_tcp_destroy(void)
634 {
635 struct interface *iface, *tmp;
636
637 unregister_netdevice_notifier(&ksmbd_netdev_notifier);
638
639 list_for_each_entry_safe(iface, tmp, &iface_list, entry) {
640 list_del(&iface->entry);
641 kfree(iface->name);
642 kfree(iface);
643 }
644 }
645
alloc_iface(char * ifname)646 static struct interface *alloc_iface(char *ifname)
647 {
648 struct interface *iface;
649
650 if (!ifname)
651 return NULL;
652
653 iface = kzalloc(sizeof(struct interface), KSMBD_DEFAULT_GFP);
654 if (!iface) {
655 kfree(ifname);
656 return NULL;
657 }
658
659 iface->name = ifname;
660 iface->state = IFACE_STATE_DOWN;
661 list_add(&iface->entry, &iface_list);
662 mutex_init(&iface->sock_release_lock);
663 return iface;
664 }
665
ksmbd_tcp_set_interfaces(char * ifc_list,int ifc_list_sz)666 int ksmbd_tcp_set_interfaces(char *ifc_list, int ifc_list_sz)
667 {
668 int sz = 0;
669
670 if (!ifc_list_sz) {
671 bind_additional_ifaces = 1;
672 return 0;
673 }
674
675 while (ifc_list_sz > 0) {
676 if (!alloc_iface(kstrdup(ifc_list, KSMBD_DEFAULT_GFP)))
677 return -ENOMEM;
678
679 sz = strlen(ifc_list);
680 if (!sz)
681 break;
682
683 ifc_list += sz + 1;
684 ifc_list_sz -= (sz + 1);
685 }
686
687 bind_additional_ifaces = 0;
688
689 return 0;
690 }
691
692 static const struct ksmbd_transport_ops ksmbd_tcp_transport_ops = {
693 .read = ksmbd_tcp_read,
694 .writev = ksmbd_tcp_writev,
695 .disconnect = ksmbd_tcp_disconnect,
696 .free_transport = ksmbd_tcp_free_transport,
697 };
698