Linux Audio

Check our new training course

Loading...
v3.15
   1/*
   2 *  SMB1 (CIFS) version specific operations
   3 *
   4 *  Copyright (c) 2012, Jeff Layton <jlayton@redhat.com>
   5 *
   6 *  This library is free software; you can redistribute it and/or modify
   7 *  it under the terms of the GNU General Public License v2 as published
   8 *  by the Free Software Foundation.
   9 *
  10 *  This library is distributed in the hope that it will be useful,
  11 *  but WITHOUT ANY WARRANTY; without even the implied warranty of
  12 *  MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See
  13 *  the GNU Lesser General Public License for more details.
  14 *
  15 *  You should have received a copy of the GNU Lesser General Public License
  16 *  along with this library; if not, write to the Free Software
  17 *  Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
  18 */
  19
  20#include <linux/pagemap.h>
  21#include <linux/vfs.h>
  22#include "cifsglob.h"
  23#include "cifsproto.h"
  24#include "cifs_debug.h"
  25#include "cifspdu.h"
  26
  27/*
  28 * An NT cancel request header looks just like the original request except:
  29 *
  30 * The Command is SMB_COM_NT_CANCEL
  31 * The WordCount is zeroed out
  32 * The ByteCount is zeroed out
  33 *
  34 * This function mangles an existing request buffer into a
  35 * SMB_COM_NT_CANCEL request and then sends it.
  36 */
  37static int
  38send_nt_cancel(struct TCP_Server_Info *server, void *buf,
  39	       struct mid_q_entry *mid)
  40{
  41	int rc = 0;
  42	struct smb_hdr *in_buf = (struct smb_hdr *)buf;
  43
  44	/* -4 for RFC1001 length and +2 for BCC field */
  45	in_buf->smb_buf_length = cpu_to_be32(sizeof(struct smb_hdr) - 4  + 2);
  46	in_buf->Command = SMB_COM_NT_CANCEL;
  47	in_buf->WordCount = 0;
  48	put_bcc(0, in_buf);
  49
  50	mutex_lock(&server->srv_mutex);
  51	rc = cifs_sign_smb(in_buf, server, &mid->sequence_number);
  52	if (rc) {
  53		mutex_unlock(&server->srv_mutex);
  54		return rc;
  55	}
  56
  57	/*
  58	 * The response to this call was already factored into the sequence
  59	 * number when the call went out, so we must adjust it back downward
  60	 * after signing here.
  61	 */
  62	--server->sequence_number;
  63	rc = smb_send(server, in_buf, be32_to_cpu(in_buf->smb_buf_length));
  64	if (rc < 0)
  65		server->sequence_number--;
  66
  67	mutex_unlock(&server->srv_mutex);
  68
  69	cifs_dbg(FYI, "issued NT_CANCEL for mid %u, rc = %d\n",
  70		 get_mid(in_buf), rc);
  71
  72	return rc;
  73}
  74
  75static bool
  76cifs_compare_fids(struct cifsFileInfo *ob1, struct cifsFileInfo *ob2)
  77{
  78	return ob1->fid.netfid == ob2->fid.netfid;
  79}
  80
  81static unsigned int
  82cifs_read_data_offset(char *buf)
  83{
  84	READ_RSP *rsp = (READ_RSP *)buf;
  85	return le16_to_cpu(rsp->DataOffset);
  86}
  87
  88static unsigned int
  89cifs_read_data_length(char *buf)
  90{
  91	READ_RSP *rsp = (READ_RSP *)buf;
  92	return (le16_to_cpu(rsp->DataLengthHigh) << 16) +
  93	       le16_to_cpu(rsp->DataLength);
  94}
  95
  96static struct mid_q_entry *
  97cifs_find_mid(struct TCP_Server_Info *server, char *buffer)
  98{
  99	struct smb_hdr *buf = (struct smb_hdr *)buffer;
 100	struct mid_q_entry *mid;
 101
 102	spin_lock(&GlobalMid_Lock);
 103	list_for_each_entry(mid, &server->pending_mid_q, qhead) {
 104		if (compare_mid(mid->mid, buf) &&
 105		    mid->mid_state == MID_REQUEST_SUBMITTED &&
 106		    le16_to_cpu(mid->command) == buf->Command) {
 107			spin_unlock(&GlobalMid_Lock);
 108			return mid;
 109		}
 110	}
 111	spin_unlock(&GlobalMid_Lock);
 112	return NULL;
 113}
 114
 115static void
 116cifs_add_credits(struct TCP_Server_Info *server, const unsigned int add,
 117		 const int optype)
 118{
 119	spin_lock(&server->req_lock);
 120	server->credits += add;
 121	server->in_flight--;
 122	spin_unlock(&server->req_lock);
 123	wake_up(&server->request_q);
 124}
 125
 126static void
 127cifs_set_credits(struct TCP_Server_Info *server, const int val)
 128{
 129	spin_lock(&server->req_lock);
 130	server->credits = val;
 131	server->oplocks = val > 1 ? enable_oplocks : false;
 132	spin_unlock(&server->req_lock);
 133}
 134
 135static int *
 136cifs_get_credits_field(struct TCP_Server_Info *server, const int optype)
 137{
 138	return &server->credits;
 139}
 140
 141static unsigned int
 142cifs_get_credits(struct mid_q_entry *mid)
 143{
 144	return 1;
 145}
 146
 147/*
 148 * Find a free multiplex id (SMB mid). Otherwise there could be
 149 * mid collisions which might cause problems, demultiplexing the
 150 * wrong response to this request. Multiplex ids could collide if
 151 * one of a series requests takes much longer than the others, or
 152 * if a very large number of long lived requests (byte range
 153 * locks or FindNotify requests) are pending. No more than
 154 * 64K-1 requests can be outstanding at one time. If no
 155 * mids are available, return zero. A future optimization
 156 * could make the combination of mids and uid the key we use
 157 * to demultiplex on (rather than mid alone).
 158 * In addition to the above check, the cifs demultiplex
 159 * code already used the command code as a secondary
 160 * check of the frame and if signing is negotiated the
 161 * response would be discarded if the mid were the same
 162 * but the signature was wrong. Since the mid is not put in the
 163 * pending queue until later (when it is about to be dispatched)
 164 * we do have to limit the number of outstanding requests
 165 * to somewhat less than 64K-1 although it is hard to imagine
 166 * so many threads being in the vfs at one time.
 167 */
 168static __u64
 169cifs_get_next_mid(struct TCP_Server_Info *server)
 170{
 171	__u64 mid = 0;
 172	__u16 last_mid, cur_mid;
 173	bool collision;
 174
 175	spin_lock(&GlobalMid_Lock);
 176
 177	/* mid is 16 bit only for CIFS/SMB */
 178	cur_mid = (__u16)((server->CurrentMid) & 0xffff);
 179	/* we do not want to loop forever */
 180	last_mid = cur_mid;
 181	cur_mid++;
 182
 183	/*
 184	 * This nested loop looks more expensive than it is.
 185	 * In practice the list of pending requests is short,
 186	 * fewer than 50, and the mids are likely to be unique
 187	 * on the first pass through the loop unless some request
 188	 * takes longer than the 64 thousand requests before it
 189	 * (and it would also have to have been a request that
 190	 * did not time out).
 191	 */
 192	while (cur_mid != last_mid) {
 193		struct mid_q_entry *mid_entry;
 194		unsigned int num_mids;
 195
 196		collision = false;
 197		if (cur_mid == 0)
 198			cur_mid++;
 199
 200		num_mids = 0;
 201		list_for_each_entry(mid_entry, &server->pending_mid_q, qhead) {
 202			++num_mids;
 203			if (mid_entry->mid == cur_mid &&
 204			    mid_entry->mid_state == MID_REQUEST_SUBMITTED) {
 205				/* This mid is in use, try a different one */
 206				collision = true;
 207				break;
 208			}
 209		}
 210
 211		/*
 212		 * if we have more than 32k mids in the list, then something
 213		 * is very wrong. Possibly a local user is trying to DoS the
 214		 * box by issuing long-running calls and SIGKILL'ing them. If
 215		 * we get to 2^16 mids then we're in big trouble as this
 216		 * function could loop forever.
 217		 *
 218		 * Go ahead and assign out the mid in this situation, but force
 219		 * an eventual reconnect to clean out the pending_mid_q.
 220		 */
 221		if (num_mids > 32768)
 222			server->tcpStatus = CifsNeedReconnect;
 223
 224		if (!collision) {
 225			mid = (__u64)cur_mid;
 226			server->CurrentMid = mid;
 227			break;
 228		}
 229		cur_mid++;
 230	}
 231	spin_unlock(&GlobalMid_Lock);
 232	return mid;
 233}
 234
 235/*
 236	return codes:
 237		0	not a transact2, or all data present
 238		>0	transact2 with that much data missing
 239		-EINVAL	invalid transact2
 240 */
 241static int
 242check2ndT2(char *buf)
 243{
 244	struct smb_hdr *pSMB = (struct smb_hdr *)buf;
 245	struct smb_t2_rsp *pSMBt;
 246	int remaining;
 247	__u16 total_data_size, data_in_this_rsp;
 248
 249	if (pSMB->Command != SMB_COM_TRANSACTION2)
 250		return 0;
 251
 252	/* check for plausible wct, bcc and t2 data and parm sizes */
 253	/* check for parm and data offset going beyond end of smb */
 254	if (pSMB->WordCount != 10) { /* coalesce_t2 depends on this */
 255		cifs_dbg(FYI, "invalid transact2 word count\n");
 256		return -EINVAL;
 257	}
 258
 259	pSMBt = (struct smb_t2_rsp *)pSMB;
 260
 261	total_data_size = get_unaligned_le16(&pSMBt->t2_rsp.TotalDataCount);
 262	data_in_this_rsp = get_unaligned_le16(&pSMBt->t2_rsp.DataCount);
 263
 264	if (total_data_size == data_in_this_rsp)
 265		return 0;
 266	else if (total_data_size < data_in_this_rsp) {
 267		cifs_dbg(FYI, "total data %d smaller than data in frame %d\n",
 268			 total_data_size, data_in_this_rsp);
 269		return -EINVAL;
 270	}
 271
 272	remaining = total_data_size - data_in_this_rsp;
 273
 274	cifs_dbg(FYI, "missing %d bytes from transact2, check next response\n",
 275		 remaining);
 276	if (total_data_size > CIFSMaxBufSize) {
 277		cifs_dbg(VFS, "TotalDataSize %d is over maximum buffer %d\n",
 278			 total_data_size, CIFSMaxBufSize);
 279		return -EINVAL;
 280	}
 281	return remaining;
 282}
 283
 284static int
 285coalesce_t2(char *second_buf, struct smb_hdr *target_hdr)
 286{
 287	struct smb_t2_rsp *pSMBs = (struct smb_t2_rsp *)second_buf;
 288	struct smb_t2_rsp *pSMBt  = (struct smb_t2_rsp *)target_hdr;
 289	char *data_area_of_tgt;
 290	char *data_area_of_src;
 291	int remaining;
 292	unsigned int byte_count, total_in_tgt;
 293	__u16 tgt_total_cnt, src_total_cnt, total_in_src;
 294
 295	src_total_cnt = get_unaligned_le16(&pSMBs->t2_rsp.TotalDataCount);
 296	tgt_total_cnt = get_unaligned_le16(&pSMBt->t2_rsp.TotalDataCount);
 297
 298	if (tgt_total_cnt != src_total_cnt)
 299		cifs_dbg(FYI, "total data count of primary and secondary t2 differ source=%hu target=%hu\n",
 300			 src_total_cnt, tgt_total_cnt);
 301
 302	total_in_tgt = get_unaligned_le16(&pSMBt->t2_rsp.DataCount);
 303
 304	remaining = tgt_total_cnt - total_in_tgt;
 305
 306	if (remaining < 0) {
 307		cifs_dbg(FYI, "Server sent too much data. tgt_total_cnt=%hu total_in_tgt=%hu\n",
 308			 tgt_total_cnt, total_in_tgt);
 309		return -EPROTO;
 310	}
 311
 312	if (remaining == 0) {
 313		/* nothing to do, ignore */
 314		cifs_dbg(FYI, "no more data remains\n");
 315		return 0;
 316	}
 317
 318	total_in_src = get_unaligned_le16(&pSMBs->t2_rsp.DataCount);
 319	if (remaining < total_in_src)
 320		cifs_dbg(FYI, "transact2 2nd response contains too much data\n");
 321
 322	/* find end of first SMB data area */
 323	data_area_of_tgt = (char *)&pSMBt->hdr.Protocol +
 324				get_unaligned_le16(&pSMBt->t2_rsp.DataOffset);
 325
 326	/* validate target area */
 327	data_area_of_src = (char *)&pSMBs->hdr.Protocol +
 328				get_unaligned_le16(&pSMBs->t2_rsp.DataOffset);
 329
 330	data_area_of_tgt += total_in_tgt;
 331
 332	total_in_tgt += total_in_src;
 333	/* is the result too big for the field? */
 334	if (total_in_tgt > USHRT_MAX) {
 335		cifs_dbg(FYI, "coalesced DataCount too large (%u)\n",
 336			 total_in_tgt);
 337		return -EPROTO;
 338	}
 339	put_unaligned_le16(total_in_tgt, &pSMBt->t2_rsp.DataCount);
 340
 341	/* fix up the BCC */
 342	byte_count = get_bcc(target_hdr);
 343	byte_count += total_in_src;
 344	/* is the result too big for the field? */
 345	if (byte_count > USHRT_MAX) {
 346		cifs_dbg(FYI, "coalesced BCC too large (%u)\n", byte_count);
 347		return -EPROTO;
 348	}
 349	put_bcc(byte_count, target_hdr);
 350
 351	byte_count = be32_to_cpu(target_hdr->smb_buf_length);
 352	byte_count += total_in_src;
 353	/* don't allow buffer to overflow */
 354	if (byte_count > CIFSMaxBufSize + MAX_CIFS_HDR_SIZE - 4) {
 355		cifs_dbg(FYI, "coalesced BCC exceeds buffer size (%u)\n",
 356			 byte_count);
 357		return -ENOBUFS;
 358	}
 359	target_hdr->smb_buf_length = cpu_to_be32(byte_count);
 360
 361	/* copy second buffer into end of first buffer */
 362	memcpy(data_area_of_tgt, data_area_of_src, total_in_src);
 363
 364	if (remaining != total_in_src) {
 365		/* more responses to go */
 366		cifs_dbg(FYI, "waiting for more secondary responses\n");
 367		return 1;
 368	}
 369
 370	/* we are done */
 371	cifs_dbg(FYI, "found the last secondary response\n");
 372	return 0;
 373}
 374
 375static void
 376cifs_downgrade_oplock(struct TCP_Server_Info *server,
 377			struct cifsInodeInfo *cinode, bool set_level2)
 378{
 379	if (set_level2)
 380		cifs_set_oplock_level(cinode, OPLOCK_READ);
 381	else
 382		cifs_set_oplock_level(cinode, 0);
 383}
 384
 385static bool
 386cifs_check_trans2(struct mid_q_entry *mid, struct TCP_Server_Info *server,
 387		  char *buf, int malformed)
 388{
 389	if (malformed)
 390		return false;
 391	if (check2ndT2(buf) <= 0)
 392		return false;
 393	mid->multiRsp = true;
 394	if (mid->resp_buf) {
 395		/* merge response - fix up 1st*/
 396		malformed = coalesce_t2(buf, mid->resp_buf);
 397		if (malformed > 0)
 398			return true;
 399		/* All parts received or packet is malformed. */
 400		mid->multiEnd = true;
 401		dequeue_mid(mid, malformed);
 402		return true;
 403	}
 404	if (!server->large_buf) {
 405		/*FIXME: switch to already allocated largebuf?*/
 406		cifs_dbg(VFS, "1st trans2 resp needs bigbuf\n");
 407	} else {
 408		/* Have first buffer */
 409		mid->resp_buf = buf;
 410		mid->large_buf = true;
 411		server->bigbuf = NULL;
 412	}
 413	return true;
 414}
 415
 416static bool
 417cifs_need_neg(struct TCP_Server_Info *server)
 418{
 419	return server->maxBuf == 0;
 420}
 421
 422static int
 423cifs_negotiate(const unsigned int xid, struct cifs_ses *ses)
 424{
 425	int rc;
 426	rc = CIFSSMBNegotiate(xid, ses);
 427	if (rc == -EAGAIN) {
 428		/* retry only once on 1st time connection */
 429		set_credits(ses->server, 1);
 430		rc = CIFSSMBNegotiate(xid, ses);
 431		if (rc == -EAGAIN)
 432			rc = -EHOSTDOWN;
 433	}
 434	return rc;
 435}
 436
 437static unsigned int
 438cifs_negotiate_wsize(struct cifs_tcon *tcon, struct smb_vol *volume_info)
 439{
 440	__u64 unix_cap = le64_to_cpu(tcon->fsUnixInfo.Capability);
 441	struct TCP_Server_Info *server = tcon->ses->server;
 442	unsigned int wsize;
 443
 444	/* start with specified wsize, or default */
 445	if (volume_info->wsize)
 446		wsize = volume_info->wsize;
 447	else if (tcon->unix_ext && (unix_cap & CIFS_UNIX_LARGE_WRITE_CAP))
 448		wsize = CIFS_DEFAULT_IOSIZE;
 449	else
 450		wsize = CIFS_DEFAULT_NON_POSIX_WSIZE;
 451
 452	/* can server support 24-bit write sizes? (via UNIX extensions) */
 453	if (!tcon->unix_ext || !(unix_cap & CIFS_UNIX_LARGE_WRITE_CAP))
 454		wsize = min_t(unsigned int, wsize, CIFS_MAX_RFC1002_WSIZE);
 455
 456	/*
 457	 * no CAP_LARGE_WRITE_X or is signing enabled without CAP_UNIX set?
 458	 * Limit it to max buffer offered by the server, minus the size of the
 459	 * WRITEX header, not including the 4 byte RFC1001 length.
 460	 */
 461	if (!(server->capabilities & CAP_LARGE_WRITE_X) ||
 462	    (!(server->capabilities & CAP_UNIX) && server->sign))
 463		wsize = min_t(unsigned int, wsize,
 464				server->maxBuf - sizeof(WRITE_REQ) + 4);
 465
 466	/* hard limit of CIFS_MAX_WSIZE */
 467	wsize = min_t(unsigned int, wsize, CIFS_MAX_WSIZE);
 468
 469	return wsize;
 470}
 471
 472static unsigned int
 473cifs_negotiate_rsize(struct cifs_tcon *tcon, struct smb_vol *volume_info)
 474{
 475	__u64 unix_cap = le64_to_cpu(tcon->fsUnixInfo.Capability);
 476	struct TCP_Server_Info *server = tcon->ses->server;
 477	unsigned int rsize, defsize;
 478
 479	/*
 480	 * Set default value...
 481	 *
 482	 * HACK alert! Ancient servers have very small buffers. Even though
 483	 * MS-CIFS indicates that servers are only limited by the client's
 484	 * bufsize for reads, testing against win98se shows that it throws
 485	 * INVALID_PARAMETER errors if you try to request too large a read.
 486	 * OS/2 just sends back short reads.
 487	 *
 488	 * If the server doesn't advertise CAP_LARGE_READ_X, then assume that
 489	 * it can't handle a read request larger than its MaxBufferSize either.
 490	 */
 491	if (tcon->unix_ext && (unix_cap & CIFS_UNIX_LARGE_READ_CAP))
 492		defsize = CIFS_DEFAULT_IOSIZE;
 493	else if (server->capabilities & CAP_LARGE_READ_X)
 494		defsize = CIFS_DEFAULT_NON_POSIX_RSIZE;
 495	else
 496		defsize = server->maxBuf - sizeof(READ_RSP);
 497
 498	rsize = volume_info->rsize ? volume_info->rsize : defsize;
 499
 500	/*
 501	 * no CAP_LARGE_READ_X? Then MS-CIFS states that we must limit this to
 502	 * the client's MaxBufferSize.
 503	 */
 504	if (!(server->capabilities & CAP_LARGE_READ_X))
 505		rsize = min_t(unsigned int, CIFSMaxBufSize, rsize);
 506
 507	/* hard limit of CIFS_MAX_RSIZE */
 508	rsize = min_t(unsigned int, rsize, CIFS_MAX_RSIZE);
 509
 510	return rsize;
 511}
 512
 513static void
 514cifs_qfs_tcon(const unsigned int xid, struct cifs_tcon *tcon)
 515{
 516	CIFSSMBQFSDeviceInfo(xid, tcon);
 517	CIFSSMBQFSAttributeInfo(xid, tcon);
 518}
 519
 520static int
 521cifs_is_path_accessible(const unsigned int xid, struct cifs_tcon *tcon,
 522			struct cifs_sb_info *cifs_sb, const char *full_path)
 523{
 524	int rc;
 525	FILE_ALL_INFO *file_info;
 526
 527	file_info = kmalloc(sizeof(FILE_ALL_INFO), GFP_KERNEL);
 528	if (file_info == NULL)
 529		return -ENOMEM;
 530
 531	rc = CIFSSMBQPathInfo(xid, tcon, full_path, file_info,
 532			      0 /* not legacy */, cifs_sb->local_nls,
 533			      cifs_sb->mnt_cifs_flags &
 534				CIFS_MOUNT_MAP_SPECIAL_CHR);
 535
 536	if (rc == -EOPNOTSUPP || rc == -EINVAL)
 537		rc = SMBQueryInformation(xid, tcon, full_path, file_info,
 538				cifs_sb->local_nls, cifs_sb->mnt_cifs_flags &
 539				  CIFS_MOUNT_MAP_SPECIAL_CHR);
 540	kfree(file_info);
 541	return rc;
 542}
 543
 544static int
 545cifs_query_path_info(const unsigned int xid, struct cifs_tcon *tcon,
 546		     struct cifs_sb_info *cifs_sb, const char *full_path,
 547		     FILE_ALL_INFO *data, bool *adjustTZ, bool *symlink)
 548{
 549	int rc;
 550
 551	*symlink = false;
 552
 553	/* could do find first instead but this returns more info */
 554	rc = CIFSSMBQPathInfo(xid, tcon, full_path, data, 0 /* not legacy */,
 555			      cifs_sb->local_nls, cifs_sb->mnt_cifs_flags &
 556						CIFS_MOUNT_MAP_SPECIAL_CHR);
 557	/*
 558	 * BB optimize code so we do not make the above call when server claims
 559	 * no NT SMB support and the above call failed at least once - set flag
 560	 * in tcon or mount.
 561	 */
 562	if ((rc == -EOPNOTSUPP) || (rc == -EINVAL)) {
 563		rc = SMBQueryInformation(xid, tcon, full_path, data,
 564					 cifs_sb->local_nls,
 565					 cifs_sb->mnt_cifs_flags &
 566						CIFS_MOUNT_MAP_SPECIAL_CHR);
 567		*adjustTZ = true;
 568	}
 569
 570	if (!rc && (le32_to_cpu(data->Attributes) & ATTR_REPARSE)) {
 571		int tmprc;
 572		int oplock = 0;
 573		struct cifs_fid fid;
 574		struct cifs_open_parms oparms;
 575
 576		oparms.tcon = tcon;
 577		oparms.cifs_sb = cifs_sb;
 578		oparms.desired_access = FILE_READ_ATTRIBUTES;
 579		oparms.create_options = 0;
 580		oparms.disposition = FILE_OPEN;
 581		oparms.path = full_path;
 582		oparms.fid = &fid;
 583		oparms.reconnect = false;
 584
 585		/* Need to check if this is a symbolic link or not */
 586		tmprc = CIFS_open(xid, &oparms, &oplock, NULL);
 587		if (tmprc == -EOPNOTSUPP)
 588			*symlink = true;
 589		else
 590			CIFSSMBClose(xid, tcon, fid.netfid);
 591	}
 592
 593	return rc;
 594}
 595
 596static int
 597cifs_get_srv_inum(const unsigned int xid, struct cifs_tcon *tcon,
 598		  struct cifs_sb_info *cifs_sb, const char *full_path,
 599		  u64 *uniqueid, FILE_ALL_INFO *data)
 600{
 601	/*
 602	 * We can not use the IndexNumber field by default from Windows or
 603	 * Samba (in ALL_INFO buf) but we can request it explicitly. The SNIA
 604	 * CIFS spec claims that this value is unique within the scope of a
 605	 * share, and the windows docs hint that it's actually unique
 606	 * per-machine.
 607	 *
 608	 * There may be higher info levels that work but are there Windows
 609	 * server or network appliances for which IndexNumber field is not
 610	 * guaranteed unique?
 611	 */
 612	return CIFSGetSrvInodeNumber(xid, tcon, full_path, uniqueid,
 613				     cifs_sb->local_nls,
 614				     cifs_sb->mnt_cifs_flags &
 615						CIFS_MOUNT_MAP_SPECIAL_CHR);
 616}
 617
 618static int
 619cifs_query_file_info(const unsigned int xid, struct cifs_tcon *tcon,
 620		     struct cifs_fid *fid, FILE_ALL_INFO *data)
 621{
 622	return CIFSSMBQFileInfo(xid, tcon, fid->netfid, data);
 623}
 624
 625static void
 626cifs_clear_stats(struct cifs_tcon *tcon)
 627{
 628#ifdef CONFIG_CIFS_STATS
 629	atomic_set(&tcon->stats.cifs_stats.num_writes, 0);
 630	atomic_set(&tcon->stats.cifs_stats.num_reads, 0);
 631	atomic_set(&tcon->stats.cifs_stats.num_flushes, 0);
 632	atomic_set(&tcon->stats.cifs_stats.num_oplock_brks, 0);
 633	atomic_set(&tcon->stats.cifs_stats.num_opens, 0);
 634	atomic_set(&tcon->stats.cifs_stats.num_posixopens, 0);
 635	atomic_set(&tcon->stats.cifs_stats.num_posixmkdirs, 0);
 636	atomic_set(&tcon->stats.cifs_stats.num_closes, 0);
 637	atomic_set(&tcon->stats.cifs_stats.num_deletes, 0);
 638	atomic_set(&tcon->stats.cifs_stats.num_mkdirs, 0);
 639	atomic_set(&tcon->stats.cifs_stats.num_rmdirs, 0);
 640	atomic_set(&tcon->stats.cifs_stats.num_renames, 0);
 641	atomic_set(&tcon->stats.cifs_stats.num_t2renames, 0);
 642	atomic_set(&tcon->stats.cifs_stats.num_ffirst, 0);
 643	atomic_set(&tcon->stats.cifs_stats.num_fnext, 0);
 644	atomic_set(&tcon->stats.cifs_stats.num_fclose, 0);
 645	atomic_set(&tcon->stats.cifs_stats.num_hardlinks, 0);
 646	atomic_set(&tcon->stats.cifs_stats.num_symlinks, 0);
 647	atomic_set(&tcon->stats.cifs_stats.num_locks, 0);
 648	atomic_set(&tcon->stats.cifs_stats.num_acl_get, 0);
 649	atomic_set(&tcon->stats.cifs_stats.num_acl_set, 0);
 650#endif
 651}
 652
 653static void
 654cifs_print_stats(struct seq_file *m, struct cifs_tcon *tcon)
 655{
 656#ifdef CONFIG_CIFS_STATS
 657	seq_printf(m, " Oplocks breaks: %d",
 658		   atomic_read(&tcon->stats.cifs_stats.num_oplock_brks));
 659	seq_printf(m, "\nReads:  %d Bytes: %llu",
 660		   atomic_read(&tcon->stats.cifs_stats.num_reads),
 661		   (long long)(tcon->bytes_read));
 662	seq_printf(m, "\nWrites: %d Bytes: %llu",
 663		   atomic_read(&tcon->stats.cifs_stats.num_writes),
 664		   (long long)(tcon->bytes_written));
 665	seq_printf(m, "\nFlushes: %d",
 666		   atomic_read(&tcon->stats.cifs_stats.num_flushes));
 667	seq_printf(m, "\nLocks: %d HardLinks: %d Symlinks: %d",
 668		   atomic_read(&tcon->stats.cifs_stats.num_locks),
 669		   atomic_read(&tcon->stats.cifs_stats.num_hardlinks),
 670		   atomic_read(&tcon->stats.cifs_stats.num_symlinks));
 671	seq_printf(m, "\nOpens: %d Closes: %d Deletes: %d",
 672		   atomic_read(&tcon->stats.cifs_stats.num_opens),
 673		   atomic_read(&tcon->stats.cifs_stats.num_closes),
 674		   atomic_read(&tcon->stats.cifs_stats.num_deletes));
 675	seq_printf(m, "\nPosix Opens: %d Posix Mkdirs: %d",
 676		   atomic_read(&tcon->stats.cifs_stats.num_posixopens),
 677		   atomic_read(&tcon->stats.cifs_stats.num_posixmkdirs));
 678	seq_printf(m, "\nMkdirs: %d Rmdirs: %d",
 679		   atomic_read(&tcon->stats.cifs_stats.num_mkdirs),
 680		   atomic_read(&tcon->stats.cifs_stats.num_rmdirs));
 681	seq_printf(m, "\nRenames: %d T2 Renames %d",
 682		   atomic_read(&tcon->stats.cifs_stats.num_renames),
 683		   atomic_read(&tcon->stats.cifs_stats.num_t2renames));
 684	seq_printf(m, "\nFindFirst: %d FNext %d FClose %d",
 685		   atomic_read(&tcon->stats.cifs_stats.num_ffirst),
 686		   atomic_read(&tcon->stats.cifs_stats.num_fnext),
 687		   atomic_read(&tcon->stats.cifs_stats.num_fclose));
 688#endif
 689}
 690
 691static void
 692cifs_mkdir_setinfo(struct inode *inode, const char *full_path,
 693		   struct cifs_sb_info *cifs_sb, struct cifs_tcon *tcon,
 694		   const unsigned int xid)
 695{
 696	FILE_BASIC_INFO info;
 697	struct cifsInodeInfo *cifsInode;
 698	u32 dosattrs;
 699	int rc;
 700
 701	memset(&info, 0, sizeof(info));
 702	cifsInode = CIFS_I(inode);
 703	dosattrs = cifsInode->cifsAttrs|ATTR_READONLY;
 704	info.Attributes = cpu_to_le32(dosattrs);
 705	rc = CIFSSMBSetPathInfo(xid, tcon, full_path, &info, cifs_sb->local_nls,
 706				cifs_sb->mnt_cifs_flags &
 707						CIFS_MOUNT_MAP_SPECIAL_CHR);
 708	if (rc == 0)
 709		cifsInode->cifsAttrs = dosattrs;
 710}
 711
 712static int
 713cifs_open_file(const unsigned int xid, struct cifs_open_parms *oparms,
 714	       __u32 *oplock, FILE_ALL_INFO *buf)
 715{
 716	if (!(oparms->tcon->ses->capabilities & CAP_NT_SMBS))
 717		return SMBLegacyOpen(xid, oparms->tcon, oparms->path,
 718				     oparms->disposition,
 719				     oparms->desired_access,
 720				     oparms->create_options,
 721				     &oparms->fid->netfid, oplock, buf,
 722				     oparms->cifs_sb->local_nls,
 723				     oparms->cifs_sb->mnt_cifs_flags
 724						& CIFS_MOUNT_MAP_SPECIAL_CHR);
 725	return CIFS_open(xid, oparms, oplock, buf);
 726}
 727
 728static void
 729cifs_set_fid(struct cifsFileInfo *cfile, struct cifs_fid *fid, __u32 oplock)
 730{
 731	struct cifsInodeInfo *cinode = CIFS_I(cfile->dentry->d_inode);
 732	cfile->fid.netfid = fid->netfid;
 733	cifs_set_oplock_level(cinode, oplock);
 734	cinode->can_cache_brlcks = CIFS_CACHE_WRITE(cinode);
 735}
 736
 737static void
 738cifs_close_file(const unsigned int xid, struct cifs_tcon *tcon,
 739		struct cifs_fid *fid)
 740{
 741	CIFSSMBClose(xid, tcon, fid->netfid);
 742}
 743
 744static int
 745cifs_flush_file(const unsigned int xid, struct cifs_tcon *tcon,
 746		struct cifs_fid *fid)
 747{
 748	return CIFSSMBFlush(xid, tcon, fid->netfid);
 749}
 750
 751static int
 752cifs_sync_read(const unsigned int xid, struct cifsFileInfo *cfile,
 753	       struct cifs_io_parms *parms, unsigned int *bytes_read,
 754	       char **buf, int *buf_type)
 755{
 756	parms->netfid = cfile->fid.netfid;
 757	return CIFSSMBRead(xid, parms, bytes_read, buf, buf_type);
 758}
 759
 760static int
 761cifs_sync_write(const unsigned int xid, struct cifsFileInfo *cfile,
 762		struct cifs_io_parms *parms, unsigned int *written,
 763		struct kvec *iov, unsigned long nr_segs)
 764{
 765
 766	parms->netfid = cfile->fid.netfid;
 767	return CIFSSMBWrite2(xid, parms, written, iov, nr_segs);
 768}
 769
 770static int
 771smb_set_file_info(struct inode *inode, const char *full_path,
 772		  FILE_BASIC_INFO *buf, const unsigned int xid)
 773{
 774	int oplock = 0;
 775	int rc;
 776	__u32 netpid;
 777	struct cifs_fid fid;
 778	struct cifs_open_parms oparms;
 779	struct cifsFileInfo *open_file;
 780	struct cifsInodeInfo *cinode = CIFS_I(inode);
 781	struct cifs_sb_info *cifs_sb = CIFS_SB(inode->i_sb);
 782	struct tcon_link *tlink = NULL;
 783	struct cifs_tcon *tcon;
 784
 785	/* if the file is already open for write, just use that fileid */
 786	open_file = find_writable_file(cinode, true);
 787	if (open_file) {
 788		fid.netfid = open_file->fid.netfid;
 789		netpid = open_file->pid;
 790		tcon = tlink_tcon(open_file->tlink);
 791		goto set_via_filehandle;
 792	}
 793
 794	tlink = cifs_sb_tlink(cifs_sb);
 795	if (IS_ERR(tlink)) {
 796		rc = PTR_ERR(tlink);
 797		tlink = NULL;
 798		goto out;
 799	}
 800	tcon = tlink_tcon(tlink);
 801
 802	rc = CIFSSMBSetPathInfo(xid, tcon, full_path, buf, cifs_sb->local_nls,
 803					cifs_sb->mnt_cifs_flags &
 804						CIFS_MOUNT_MAP_SPECIAL_CHR);
 805	if (rc == 0) {
 806		cinode->cifsAttrs = le32_to_cpu(buf->Attributes);
 807		goto out;
 808	} else if (rc != -EOPNOTSUPP && rc != -EINVAL) {
 809		goto out;
 810	}
 811
 812	oparms.tcon = tcon;
 813	oparms.cifs_sb = cifs_sb;
 814	oparms.desired_access = SYNCHRONIZE | FILE_WRITE_ATTRIBUTES;
 815	oparms.create_options = CREATE_NOT_DIR;
 816	oparms.disposition = FILE_OPEN;
 817	oparms.path = full_path;
 818	oparms.fid = &fid;
 819	oparms.reconnect = false;
 820
 821	cifs_dbg(FYI, "calling SetFileInfo since SetPathInfo for times not supported by this server\n");
 822	rc = CIFS_open(xid, &oparms, &oplock, NULL);
 823	if (rc != 0) {
 824		if (rc == -EIO)
 825			rc = -EINVAL;
 826		goto out;
 827	}
 828
 829	netpid = current->tgid;
 830
 831set_via_filehandle:
 832	rc = CIFSSMBSetFileInfo(xid, tcon, buf, fid.netfid, netpid);
 833	if (!rc)
 834		cinode->cifsAttrs = le32_to_cpu(buf->Attributes);
 835
 836	if (open_file == NULL)
 837		CIFSSMBClose(xid, tcon, fid.netfid);
 838	else
 839		cifsFileInfo_put(open_file);
 840out:
 841	if (tlink != NULL)
 842		cifs_put_tlink(tlink);
 843	return rc;
 844}
 845
 846static int
 847cifs_set_compression(const unsigned int xid, struct cifs_tcon *tcon,
 848		   struct cifsFileInfo *cfile)
 849{
 850	return CIFSSMB_set_compression(xid, tcon, cfile->fid.netfid);
 851}
 852
 853static int
 854cifs_query_dir_first(const unsigned int xid, struct cifs_tcon *tcon,
 855		     const char *path, struct cifs_sb_info *cifs_sb,
 856		     struct cifs_fid *fid, __u16 search_flags,
 857		     struct cifs_search_info *srch_inf)
 858{
 859	return CIFSFindFirst(xid, tcon, path, cifs_sb,
 860			     &fid->netfid, search_flags, srch_inf, true);
 861}
 862
 863static int
 864cifs_query_dir_next(const unsigned int xid, struct cifs_tcon *tcon,
 865		    struct cifs_fid *fid, __u16 search_flags,
 866		    struct cifs_search_info *srch_inf)
 867{
 868	return CIFSFindNext(xid, tcon, fid->netfid, search_flags, srch_inf);
 869}
 870
 871static int
 872cifs_close_dir(const unsigned int xid, struct cifs_tcon *tcon,
 873	       struct cifs_fid *fid)
 874{
 875	return CIFSFindClose(xid, tcon, fid->netfid);
 876}
 877
 878static int
 879cifs_oplock_response(struct cifs_tcon *tcon, struct cifs_fid *fid,
 880		     struct cifsInodeInfo *cinode)
 881{
 882	return CIFSSMBLock(0, tcon, fid->netfid, current->tgid, 0, 0, 0, 0,
 883			   LOCKING_ANDX_OPLOCK_RELEASE, false,
 884			   CIFS_CACHE_READ(cinode) ? 1 : 0);
 885}
 886
 887static int
 888cifs_queryfs(const unsigned int xid, struct cifs_tcon *tcon,
 889	     struct kstatfs *buf)
 890{
 891	int rc = -EOPNOTSUPP;
 892
 893	buf->f_type = CIFS_MAGIC_NUMBER;
 894
 895	/*
 896	 * We could add a second check for a QFS Unix capability bit
 897	 */
 898	if ((tcon->ses->capabilities & CAP_UNIX) &&
 899	    (CIFS_POSIX_EXTENSIONS & le64_to_cpu(tcon->fsUnixInfo.Capability)))
 900		rc = CIFSSMBQFSPosixInfo(xid, tcon, buf);
 901
 902	/*
 903	 * Only need to call the old QFSInfo if failed on newer one,
 904	 * e.g. by OS/2.
 905	 **/
 906	if (rc && (tcon->ses->capabilities & CAP_NT_SMBS))
 907		rc = CIFSSMBQFSInfo(xid, tcon, buf);
 908
 909	/*
 910	 * Some old Windows servers also do not support level 103, retry with
 911	 * older level one if old server failed the previous call or we
 912	 * bypassed it because we detected that this was an older LANMAN sess
 913	 */
 914	if (rc)
 915		rc = SMBOldQFSInfo(xid, tcon, buf);
 916	return rc;
 917}
 918
 919static int
 920cifs_mand_lock(const unsigned int xid, struct cifsFileInfo *cfile, __u64 offset,
 921	       __u64 length, __u32 type, int lock, int unlock, bool wait)
 922{
 923	return CIFSSMBLock(xid, tlink_tcon(cfile->tlink), cfile->fid.netfid,
 924			   current->tgid, length, offset, unlock, lock,
 925			   (__u8)type, wait, 0);
 926}
 927
 928static int
 929cifs_unix_dfs_readlink(const unsigned int xid, struct cifs_tcon *tcon,
 930		       const unsigned char *searchName, char **symlinkinfo,
 931		       const struct nls_table *nls_codepage)
 932{
 933#ifdef CONFIG_CIFS_DFS_UPCALL
 934	int rc;
 935	unsigned int num_referrals = 0;
 936	struct dfs_info3_param *referrals = NULL;
 937
 938	rc = get_dfs_path(xid, tcon->ses, searchName, nls_codepage,
 939			  &num_referrals, &referrals, 0);
 940
 941	if (!rc && num_referrals > 0) {
 942		*symlinkinfo = kstrndup(referrals->node_name,
 943					strlen(referrals->node_name),
 944					GFP_KERNEL);
 945		if (!*symlinkinfo)
 946			rc = -ENOMEM;
 947		free_dfs_info_array(referrals, num_referrals);
 948	}
 949	return rc;
 950#else /* No DFS support */
 951	return -EREMOTE;
 952#endif
 953}
 954
 955static int
 956cifs_query_symlink(const unsigned int xid, struct cifs_tcon *tcon,
 957		   const char *full_path, char **target_path,
 958		   struct cifs_sb_info *cifs_sb)
 959{
 960	int rc;
 961	int oplock = 0;
 962	struct cifs_fid fid;
 963	struct cifs_open_parms oparms;
 964
 965	cifs_dbg(FYI, "%s: path: %s\n", __func__, full_path);
 966
 967	/* Check for unix extensions */
 968	if (cap_unix(tcon->ses)) {
 969		rc = CIFSSMBUnixQuerySymLink(xid, tcon, full_path, target_path,
 970					     cifs_sb->local_nls);
 971		if (rc == -EREMOTE)
 972			rc = cifs_unix_dfs_readlink(xid, tcon, full_path,
 973						    target_path,
 974						    cifs_sb->local_nls);
 975
 976		goto out;
 977	}
 978
 979	oparms.tcon = tcon;
 980	oparms.cifs_sb = cifs_sb;
 981	oparms.desired_access = FILE_READ_ATTRIBUTES;
 982	oparms.create_options = OPEN_REPARSE_POINT;
 983	oparms.disposition = FILE_OPEN;
 984	oparms.path = full_path;
 985	oparms.fid = &fid;
 986	oparms.reconnect = false;
 987
 988	rc = CIFS_open(xid, &oparms, &oplock, NULL);
 989	if (rc)
 990		goto out;
 991
 992	rc = CIFSSMBQuerySymLink(xid, tcon, fid.netfid, target_path,
 993				 cifs_sb->local_nls);
 994	if (rc)
 995		goto out_close;
 996
 997	convert_delimiter(*target_path, '/');
 998out_close:
 999	CIFSSMBClose(xid, tcon, fid.netfid);
1000out:
1001	if (!rc)
1002		cifs_dbg(FYI, "%s: target path: %s\n", __func__, *target_path);
1003	return rc;
1004}
1005
1006static bool
1007cifs_is_read_op(__u32 oplock)
1008{
1009	return oplock == OPLOCK_READ;
1010}
1011
1012struct smb_version_operations smb1_operations = {
1013	.send_cancel = send_nt_cancel,
1014	.compare_fids = cifs_compare_fids,
1015	.setup_request = cifs_setup_request,
1016	.setup_async_request = cifs_setup_async_request,
1017	.check_receive = cifs_check_receive,
1018	.add_credits = cifs_add_credits,
1019	.set_credits = cifs_set_credits,
1020	.get_credits_field = cifs_get_credits_field,
1021	.get_credits = cifs_get_credits,
1022	.get_next_mid = cifs_get_next_mid,
1023	.read_data_offset = cifs_read_data_offset,
1024	.read_data_length = cifs_read_data_length,
1025	.map_error = map_smb_to_linux_error,
1026	.find_mid = cifs_find_mid,
1027	.check_message = checkSMB,
1028	.dump_detail = cifs_dump_detail,
1029	.clear_stats = cifs_clear_stats,
1030	.print_stats = cifs_print_stats,
1031	.is_oplock_break = is_valid_oplock_break,
1032	.downgrade_oplock = cifs_downgrade_oplock,
1033	.check_trans2 = cifs_check_trans2,
1034	.need_neg = cifs_need_neg,
1035	.negotiate = cifs_negotiate,
1036	.negotiate_wsize = cifs_negotiate_wsize,
1037	.negotiate_rsize = cifs_negotiate_rsize,
1038	.sess_setup = CIFS_SessSetup,
1039	.logoff = CIFSSMBLogoff,
1040	.tree_connect = CIFSTCon,
1041	.tree_disconnect = CIFSSMBTDis,
1042	.get_dfs_refer = CIFSGetDFSRefer,
1043	.qfs_tcon = cifs_qfs_tcon,
1044	.is_path_accessible = cifs_is_path_accessible,
1045	.query_path_info = cifs_query_path_info,
1046	.query_file_info = cifs_query_file_info,
1047	.get_srv_inum = cifs_get_srv_inum,
1048	.set_path_size = CIFSSMBSetEOF,
1049	.set_file_size = CIFSSMBSetFileSize,
1050	.set_file_info = smb_set_file_info,
1051	.set_compression = cifs_set_compression,
1052	.echo = CIFSSMBEcho,
1053	.mkdir = CIFSSMBMkDir,
1054	.mkdir_setinfo = cifs_mkdir_setinfo,
1055	.rmdir = CIFSSMBRmDir,
1056	.unlink = CIFSSMBDelFile,
1057	.rename_pending_delete = cifs_rename_pending_delete,
1058	.rename = CIFSSMBRename,
1059	.create_hardlink = CIFSCreateHardLink,
1060	.query_symlink = cifs_query_symlink,
1061	.open = cifs_open_file,
1062	.set_fid = cifs_set_fid,
1063	.close = cifs_close_file,
1064	.flush = cifs_flush_file,
1065	.async_readv = cifs_async_readv,
1066	.async_writev = cifs_async_writev,
1067	.sync_read = cifs_sync_read,
1068	.sync_write = cifs_sync_write,
1069	.query_dir_first = cifs_query_dir_first,
1070	.query_dir_next = cifs_query_dir_next,
1071	.close_dir = cifs_close_dir,
1072	.calc_smb_size = smbCalcSize,
1073	.oplock_response = cifs_oplock_response,
1074	.queryfs = cifs_queryfs,
1075	.mand_lock = cifs_mand_lock,
1076	.mand_unlock_range = cifs_unlock_range,
1077	.push_mand_locks = cifs_push_mandatory_locks,
1078	.query_mf_symlink = cifs_query_mf_symlink,
1079	.create_mf_symlink = cifs_create_mf_symlink,
1080	.is_read_op = cifs_is_read_op,
1081#ifdef CONFIG_CIFS_XATTR
1082	.query_all_EAs = CIFSSMBQAllEAs,
1083	.set_EA = CIFSSMBSetEA,
1084#endif /* CIFS_XATTR */
1085#ifdef CONFIG_CIFS_ACL
1086	.get_acl = get_cifs_acl,
1087	.get_acl_by_fid = get_cifs_acl_by_fid,
1088	.set_acl = set_cifs_acl,
1089#endif /* CIFS_ACL */
1090};
1091
1092struct smb_version_values smb1_values = {
1093	.version_string = SMB1_VERSION_STRING,
1094	.large_lock_type = LOCKING_ANDX_LARGE_FILES,
1095	.exclusive_lock_type = 0,
1096	.shared_lock_type = LOCKING_ANDX_SHARED_LOCK,
1097	.unlock_lock_type = 0,
1098	.header_size = sizeof(struct smb_hdr),
1099	.max_header_size = MAX_CIFS_HDR_SIZE,
1100	.read_rsp_size = sizeof(READ_RSP),
1101	.lock_cmd = cpu_to_le16(SMB_COM_LOCKING_ANDX),
1102	.cap_unix = CAP_UNIX,
1103	.cap_nt_find = CAP_NT_SMBS | CAP_NT_FIND,
1104	.cap_large_files = CAP_LARGE_FILES,
1105	.signing_enabled = SECMODE_SIGN_ENABLED,
1106	.signing_required = SECMODE_SIGN_REQUIRED,
1107};
v3.5.6
  1/*
  2 *  SMB1 (CIFS) version specific operations
  3 *
  4 *  Copyright (c) 2012, Jeff Layton <jlayton@redhat.com>
  5 *
  6 *  This library is free software; you can redistribute it and/or modify
  7 *  it under the terms of the GNU General Public License v2 as published
  8 *  by the Free Software Foundation.
  9 *
 10 *  This library is distributed in the hope that it will be useful,
 11 *  but WITHOUT ANY WARRANTY; without even the implied warranty of
 12 *  MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See
 13 *  the GNU Lesser General Public License for more details.
 14 *
 15 *  You should have received a copy of the GNU Lesser General Public License
 16 *  along with this library; if not, write to the Free Software
 17 *  Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
 18 */
 19
 
 
 20#include "cifsglob.h"
 21#include "cifsproto.h"
 22#include "cifs_debug.h"
 23#include "cifspdu.h"
 24
 25/*
 26 * An NT cancel request header looks just like the original request except:
 27 *
 28 * The Command is SMB_COM_NT_CANCEL
 29 * The WordCount is zeroed out
 30 * The ByteCount is zeroed out
 31 *
 32 * This function mangles an existing request buffer into a
 33 * SMB_COM_NT_CANCEL request and then sends it.
 34 */
 35static int
 36send_nt_cancel(struct TCP_Server_Info *server, void *buf,
 37	       struct mid_q_entry *mid)
 38{
 39	int rc = 0;
 40	struct smb_hdr *in_buf = (struct smb_hdr *)buf;
 41
 42	/* -4 for RFC1001 length and +2 for BCC field */
 43	in_buf->smb_buf_length = cpu_to_be32(sizeof(struct smb_hdr) - 4  + 2);
 44	in_buf->Command = SMB_COM_NT_CANCEL;
 45	in_buf->WordCount = 0;
 46	put_bcc(0, in_buf);
 47
 48	mutex_lock(&server->srv_mutex);
 49	rc = cifs_sign_smb(in_buf, server, &mid->sequence_number);
 50	if (rc) {
 51		mutex_unlock(&server->srv_mutex);
 52		return rc;
 53	}
 
 
 
 
 
 
 
 54	rc = smb_send(server, in_buf, be32_to_cpu(in_buf->smb_buf_length));
 
 
 
 55	mutex_unlock(&server->srv_mutex);
 56
 57	cFYI(1, "issued NT_CANCEL for mid %u, rc = %d",
 58		in_buf->Mid, rc);
 59
 60	return rc;
 61}
 62
 63static bool
 64cifs_compare_fids(struct cifsFileInfo *ob1, struct cifsFileInfo *ob2)
 65{
 66	return ob1->netfid == ob2->netfid;
 67}
 68
 69static unsigned int
 70cifs_read_data_offset(char *buf)
 71{
 72	READ_RSP *rsp = (READ_RSP *)buf;
 73	return le16_to_cpu(rsp->DataOffset);
 74}
 75
 76static unsigned int
 77cifs_read_data_length(char *buf)
 78{
 79	READ_RSP *rsp = (READ_RSP *)buf;
 80	return (le16_to_cpu(rsp->DataLengthHigh) << 16) +
 81	       le16_to_cpu(rsp->DataLength);
 82}
 83
 84static struct mid_q_entry *
 85cifs_find_mid(struct TCP_Server_Info *server, char *buffer)
 86{
 87	struct smb_hdr *buf = (struct smb_hdr *)buffer;
 88	struct mid_q_entry *mid;
 89
 90	spin_lock(&GlobalMid_Lock);
 91	list_for_each_entry(mid, &server->pending_mid_q, qhead) {
 92		if (mid->mid == buf->Mid &&
 93		    mid->mid_state == MID_REQUEST_SUBMITTED &&
 94		    le16_to_cpu(mid->command) == buf->Command) {
 95			spin_unlock(&GlobalMid_Lock);
 96			return mid;
 97		}
 98	}
 99	spin_unlock(&GlobalMid_Lock);
100	return NULL;
101}
102
103static void
104cifs_add_credits(struct TCP_Server_Info *server, const unsigned int add)
 
105{
106	spin_lock(&server->req_lock);
107	server->credits += add;
108	server->in_flight--;
109	spin_unlock(&server->req_lock);
110	wake_up(&server->request_q);
111}
112
113static void
114cifs_set_credits(struct TCP_Server_Info *server, const int val)
115{
116	spin_lock(&server->req_lock);
117	server->credits = val;
118	server->oplocks = val > 1 ? enable_oplocks : false;
119	spin_unlock(&server->req_lock);
120}
121
122static int *
123cifs_get_credits_field(struct TCP_Server_Info *server)
124{
125	return &server->credits;
126}
127
 
 
 
 
 
 
128/*
129 * Find a free multiplex id (SMB mid). Otherwise there could be
130 * mid collisions which might cause problems, demultiplexing the
131 * wrong response to this request. Multiplex ids could collide if
132 * one of a series requests takes much longer than the others, or
133 * if a very large number of long lived requests (byte range
134 * locks or FindNotify requests) are pending. No more than
135 * 64K-1 requests can be outstanding at one time. If no
136 * mids are available, return zero. A future optimization
137 * could make the combination of mids and uid the key we use
138 * to demultiplex on (rather than mid alone).
139 * In addition to the above check, the cifs demultiplex
140 * code already used the command code as a secondary
141 * check of the frame and if signing is negotiated the
142 * response would be discarded if the mid were the same
143 * but the signature was wrong. Since the mid is not put in the
144 * pending queue until later (when it is about to be dispatched)
145 * we do have to limit the number of outstanding requests
146 * to somewhat less than 64K-1 although it is hard to imagine
147 * so many threads being in the vfs at one time.
148 */
149static __u64
150cifs_get_next_mid(struct TCP_Server_Info *server)
151{
152	__u64 mid = 0;
153	__u16 last_mid, cur_mid;
154	bool collision;
155
156	spin_lock(&GlobalMid_Lock);
157
158	/* mid is 16 bit only for CIFS/SMB */
159	cur_mid = (__u16)((server->CurrentMid) & 0xffff);
160	/* we do not want to loop forever */
161	last_mid = cur_mid;
162	cur_mid++;
163
164	/*
165	 * This nested loop looks more expensive than it is.
166	 * In practice the list of pending requests is short,
167	 * fewer than 50, and the mids are likely to be unique
168	 * on the first pass through the loop unless some request
169	 * takes longer than the 64 thousand requests before it
170	 * (and it would also have to have been a request that
171	 * did not time out).
172	 */
173	while (cur_mid != last_mid) {
174		struct mid_q_entry *mid_entry;
175		unsigned int num_mids;
176
177		collision = false;
178		if (cur_mid == 0)
179			cur_mid++;
180
181		num_mids = 0;
182		list_for_each_entry(mid_entry, &server->pending_mid_q, qhead) {
183			++num_mids;
184			if (mid_entry->mid == cur_mid &&
185			    mid_entry->mid_state == MID_REQUEST_SUBMITTED) {
186				/* This mid is in use, try a different one */
187				collision = true;
188				break;
189			}
190		}
191
192		/*
193		 * if we have more than 32k mids in the list, then something
194		 * is very wrong. Possibly a local user is trying to DoS the
195		 * box by issuing long-running calls and SIGKILL'ing them. If
196		 * we get to 2^16 mids then we're in big trouble as this
197		 * function could loop forever.
198		 *
199		 * Go ahead and assign out the mid in this situation, but force
200		 * an eventual reconnect to clean out the pending_mid_q.
201		 */
202		if (num_mids > 32768)
203			server->tcpStatus = CifsNeedReconnect;
204
205		if (!collision) {
206			mid = (__u64)cur_mid;
207			server->CurrentMid = mid;
208			break;
209		}
210		cur_mid++;
211	}
212	spin_unlock(&GlobalMid_Lock);
213	return mid;
214}
215
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
216struct smb_version_operations smb1_operations = {
217	.send_cancel = send_nt_cancel,
218	.compare_fids = cifs_compare_fids,
219	.setup_request = cifs_setup_request,
 
220	.check_receive = cifs_check_receive,
221	.add_credits = cifs_add_credits,
222	.set_credits = cifs_set_credits,
223	.get_credits_field = cifs_get_credits_field,
 
224	.get_next_mid = cifs_get_next_mid,
225	.read_data_offset = cifs_read_data_offset,
226	.read_data_length = cifs_read_data_length,
227	.map_error = map_smb_to_linux_error,
228	.find_mid = cifs_find_mid,
229	.check_message = checkSMB,
230	.dump_detail = cifs_dump_detail,
 
 
231	.is_oplock_break = is_valid_oplock_break,
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
232};
233
234struct smb_version_values smb1_values = {
235	.version_string = SMB1_VERSION_STRING,
236	.large_lock_type = LOCKING_ANDX_LARGE_FILES,
237	.exclusive_lock_type = 0,
238	.shared_lock_type = LOCKING_ANDX_SHARED_LOCK,
239	.unlock_lock_type = 0,
240	.header_size = sizeof(struct smb_hdr),
241	.max_header_size = MAX_CIFS_HDR_SIZE,
242	.read_rsp_size = sizeof(READ_RSP),
 
 
 
 
 
 
243};