Loading...
1// SPDX-License-Identifier: LGPL-2.1
2/*
3 *
4 * Copyright (C) International Business Machines Corp., 2002, 2011
5 * Author(s): Steve French (sfrench@us.ibm.com),
6 * Pavel Shilovsky ((pshilovsky@samba.org) 2012
7 *
8 */
9#include <linux/fs.h>
10#include <linux/stat.h>
11#include <linux/slab.h>
12#include <linux/pagemap.h>
13#include <asm/div64.h>
14#include "cifsfs.h"
15#include "cifspdu.h"
16#include "cifsglob.h"
17#include "cifsproto.h"
18#include "cifs_debug.h"
19#include "cifs_fs_sb.h"
20#include "cifs_unicode.h"
21#include "fscache.h"
22#include "smb2proto.h"
23#include "smb2status.h"
24
25static struct smb2_symlink_err_rsp *symlink_data(const struct kvec *iov)
26{
27 struct smb2_err_rsp *err = iov->iov_base;
28 struct smb2_symlink_err_rsp *sym = ERR_PTR(-EINVAL);
29 u32 len;
30
31 if (err->ErrorContextCount) {
32 struct smb2_error_context_rsp *p, *end;
33
34 len = (u32)err->ErrorContextCount * (offsetof(struct smb2_error_context_rsp,
35 ErrorContextData) +
36 sizeof(struct smb2_symlink_err_rsp));
37 if (le32_to_cpu(err->ByteCount) < len || iov->iov_len < len + sizeof(*err))
38 return ERR_PTR(-EINVAL);
39
40 p = (struct smb2_error_context_rsp *)err->ErrorData;
41 end = (struct smb2_error_context_rsp *)((u8 *)err + iov->iov_len);
42 do {
43 if (le32_to_cpu(p->ErrorId) == SMB2_ERROR_ID_DEFAULT) {
44 sym = (struct smb2_symlink_err_rsp *)&p->ErrorContextData;
45 break;
46 }
47 cifs_dbg(FYI, "%s: skipping unhandled error context: 0x%x\n",
48 __func__, le32_to_cpu(p->ErrorId));
49
50 len = ALIGN(le32_to_cpu(p->ErrorDataLength), 8);
51 p = (struct smb2_error_context_rsp *)((u8 *)&p->ErrorContextData + len);
52 } while (p < end);
53 } else if (le32_to_cpu(err->ByteCount) >= sizeof(*sym) &&
54 iov->iov_len >= SMB2_SYMLINK_STRUCT_SIZE) {
55 sym = (struct smb2_symlink_err_rsp *)err->ErrorData;
56 }
57
58 if (!IS_ERR(sym) && (le32_to_cpu(sym->SymLinkErrorTag) != SYMLINK_ERROR_TAG ||
59 le32_to_cpu(sym->ReparseTag) != IO_REPARSE_TAG_SYMLINK))
60 sym = ERR_PTR(-EINVAL);
61
62 return sym;
63}
64
65int smb2_parse_symlink_response(struct cifs_sb_info *cifs_sb, const struct kvec *iov, char **path)
66{
67 struct smb2_symlink_err_rsp *sym;
68 unsigned int sub_offs, sub_len;
69 unsigned int print_offs, print_len;
70 char *s;
71
72 if (!cifs_sb || !iov || !iov->iov_base || !iov->iov_len || !path)
73 return -EINVAL;
74
75 sym = symlink_data(iov);
76 if (IS_ERR(sym))
77 return PTR_ERR(sym);
78
79 sub_len = le16_to_cpu(sym->SubstituteNameLength);
80 sub_offs = le16_to_cpu(sym->SubstituteNameOffset);
81 print_len = le16_to_cpu(sym->PrintNameLength);
82 print_offs = le16_to_cpu(sym->PrintNameOffset);
83
84 if (iov->iov_len < SMB2_SYMLINK_STRUCT_SIZE + sub_offs + sub_len ||
85 iov->iov_len < SMB2_SYMLINK_STRUCT_SIZE + print_offs + print_len)
86 return -EINVAL;
87
88 s = cifs_strndup_from_utf16((char *)sym->PathBuffer + sub_offs, sub_len, true,
89 cifs_sb->local_nls);
90 if (!s)
91 return -ENOMEM;
92 convert_delimiter(s, '/');
93 cifs_dbg(FYI, "%s: symlink target: %s\n", __func__, s);
94
95 *path = s;
96 return 0;
97}
98
99int smb2_open_file(const unsigned int xid, struct cifs_open_parms *oparms, __u32 *oplock, void *buf)
100{
101 int rc;
102 __le16 *smb2_path;
103 __u8 smb2_oplock;
104 struct cifs_open_info_data *data = buf;
105 struct smb2_file_all_info file_info = {};
106 struct smb2_file_all_info *smb2_data = data ? &file_info : NULL;
107 struct kvec err_iov = {};
108 int err_buftype = CIFS_NO_BUFFER;
109 struct cifs_fid *fid = oparms->fid;
110 struct network_resiliency_req nr_ioctl_req;
111
112 smb2_path = cifs_convert_path_to_utf16(oparms->path, oparms->cifs_sb);
113 if (smb2_path == NULL)
114 return -ENOMEM;
115
116 oparms->desired_access |= FILE_READ_ATTRIBUTES;
117 smb2_oplock = SMB2_OPLOCK_LEVEL_BATCH;
118
119 rc = SMB2_open(xid, oparms, smb2_path, &smb2_oplock, smb2_data, NULL, &err_iov,
120 &err_buftype);
121 if (rc && data) {
122 struct smb2_hdr *hdr = err_iov.iov_base;
123
124 if (unlikely(!err_iov.iov_base || err_buftype == CIFS_NO_BUFFER))
125 goto out;
126 if (hdr->Status == STATUS_STOPPED_ON_SYMLINK) {
127 rc = smb2_parse_symlink_response(oparms->cifs_sb, &err_iov,
128 &data->symlink_target);
129 if (!rc) {
130 memset(smb2_data, 0, sizeof(*smb2_data));
131 oparms->create_options |= OPEN_REPARSE_POINT;
132 rc = SMB2_open(xid, oparms, smb2_path, &smb2_oplock, smb2_data,
133 NULL, NULL, NULL);
134 oparms->create_options &= ~OPEN_REPARSE_POINT;
135 }
136 }
137 }
138
139 if (rc)
140 goto out;
141
142 if (oparms->tcon->use_resilient) {
143 /* default timeout is 0, servers pick default (120 seconds) */
144 nr_ioctl_req.Timeout =
145 cpu_to_le32(oparms->tcon->handle_timeout);
146 nr_ioctl_req.Reserved = 0;
147 rc = SMB2_ioctl(xid, oparms->tcon, fid->persistent_fid,
148 fid->volatile_fid, FSCTL_LMR_REQUEST_RESILIENCY,
149 (char *)&nr_ioctl_req, sizeof(nr_ioctl_req),
150 CIFSMaxBufSize, NULL, NULL /* no return info */);
151 if (rc == -EOPNOTSUPP) {
152 cifs_dbg(VFS,
153 "resiliency not supported by server, disabling\n");
154 oparms->tcon->use_resilient = false;
155 } else if (rc)
156 cifs_dbg(FYI, "error %d setting resiliency\n", rc);
157
158 rc = 0;
159 }
160
161 if (smb2_data) {
162 /* if open response does not have IndexNumber field - get it */
163 if (smb2_data->IndexNumber == 0) {
164 rc = SMB2_get_srv_num(xid, oparms->tcon,
165 fid->persistent_fid,
166 fid->volatile_fid,
167 &smb2_data->IndexNumber);
168 if (rc) {
169 /*
170 * let get_inode_info disable server inode
171 * numbers
172 */
173 smb2_data->IndexNumber = 0;
174 rc = 0;
175 }
176 }
177 memcpy(&data->fi, smb2_data, sizeof(data->fi));
178 }
179
180 *oplock = smb2_oplock;
181out:
182 free_rsp_buf(err_buftype, err_iov.iov_base);
183 kfree(smb2_path);
184 return rc;
185}
186
187int
188smb2_unlock_range(struct cifsFileInfo *cfile, struct file_lock *flock,
189 const unsigned int xid)
190{
191 int rc = 0, stored_rc;
192 unsigned int max_num, num = 0, max_buf;
193 struct smb2_lock_element *buf, *cur;
194 struct cifs_tcon *tcon = tlink_tcon(cfile->tlink);
195 struct cifsInodeInfo *cinode = CIFS_I(d_inode(cfile->dentry));
196 struct cifsLockInfo *li, *tmp;
197 __u64 length = 1 + flock->fl_end - flock->fl_start;
198 struct list_head tmp_llist;
199
200 INIT_LIST_HEAD(&tmp_llist);
201
202 /*
203 * Accessing maxBuf is racy with cifs_reconnect - need to store value
204 * and check it before using.
205 */
206 max_buf = tcon->ses->server->maxBuf;
207 if (max_buf < sizeof(struct smb2_lock_element))
208 return -EINVAL;
209
210 BUILD_BUG_ON(sizeof(struct smb2_lock_element) > PAGE_SIZE);
211 max_buf = min_t(unsigned int, max_buf, PAGE_SIZE);
212 max_num = max_buf / sizeof(struct smb2_lock_element);
213 buf = kcalloc(max_num, sizeof(struct smb2_lock_element), GFP_KERNEL);
214 if (!buf)
215 return -ENOMEM;
216
217 cur = buf;
218
219 cifs_down_write(&cinode->lock_sem);
220 list_for_each_entry_safe(li, tmp, &cfile->llist->locks, llist) {
221 if (flock->fl_start > li->offset ||
222 (flock->fl_start + length) <
223 (li->offset + li->length))
224 continue;
225 if (current->tgid != li->pid)
226 /*
227 * flock and OFD lock are associated with an open
228 * file description, not the process.
229 */
230 if (!(flock->fl_flags & (FL_FLOCK | FL_OFDLCK)))
231 continue;
232 if (cinode->can_cache_brlcks) {
233 /*
234 * We can cache brlock requests - simply remove a lock
235 * from the file's list.
236 */
237 list_del(&li->llist);
238 cifs_del_lock_waiters(li);
239 kfree(li);
240 continue;
241 }
242 cur->Length = cpu_to_le64(li->length);
243 cur->Offset = cpu_to_le64(li->offset);
244 cur->Flags = cpu_to_le32(SMB2_LOCKFLAG_UNLOCK);
245 /*
246 * We need to save a lock here to let us add it again to the
247 * file's list if the unlock range request fails on the server.
248 */
249 list_move(&li->llist, &tmp_llist);
250 if (++num == max_num) {
251 stored_rc = smb2_lockv(xid, tcon,
252 cfile->fid.persistent_fid,
253 cfile->fid.volatile_fid,
254 current->tgid, num, buf);
255 if (stored_rc) {
256 /*
257 * We failed on the unlock range request - add
258 * all locks from the tmp list to the head of
259 * the file's list.
260 */
261 cifs_move_llist(&tmp_llist,
262 &cfile->llist->locks);
263 rc = stored_rc;
264 } else
265 /*
266 * The unlock range request succeed - free the
267 * tmp list.
268 */
269 cifs_free_llist(&tmp_llist);
270 cur = buf;
271 num = 0;
272 } else
273 cur++;
274 }
275 if (num) {
276 stored_rc = smb2_lockv(xid, tcon, cfile->fid.persistent_fid,
277 cfile->fid.volatile_fid, current->tgid,
278 num, buf);
279 if (stored_rc) {
280 cifs_move_llist(&tmp_llist, &cfile->llist->locks);
281 rc = stored_rc;
282 } else
283 cifs_free_llist(&tmp_llist);
284 }
285 up_write(&cinode->lock_sem);
286
287 kfree(buf);
288 return rc;
289}
290
291static int
292smb2_push_mand_fdlocks(struct cifs_fid_locks *fdlocks, const unsigned int xid,
293 struct smb2_lock_element *buf, unsigned int max_num)
294{
295 int rc = 0, stored_rc;
296 struct cifsFileInfo *cfile = fdlocks->cfile;
297 struct cifsLockInfo *li;
298 unsigned int num = 0;
299 struct smb2_lock_element *cur = buf;
300 struct cifs_tcon *tcon = tlink_tcon(cfile->tlink);
301
302 list_for_each_entry(li, &fdlocks->locks, llist) {
303 cur->Length = cpu_to_le64(li->length);
304 cur->Offset = cpu_to_le64(li->offset);
305 cur->Flags = cpu_to_le32(li->type |
306 SMB2_LOCKFLAG_FAIL_IMMEDIATELY);
307 if (++num == max_num) {
308 stored_rc = smb2_lockv(xid, tcon,
309 cfile->fid.persistent_fid,
310 cfile->fid.volatile_fid,
311 current->tgid, num, buf);
312 if (stored_rc)
313 rc = stored_rc;
314 cur = buf;
315 num = 0;
316 } else
317 cur++;
318 }
319 if (num) {
320 stored_rc = smb2_lockv(xid, tcon,
321 cfile->fid.persistent_fid,
322 cfile->fid.volatile_fid,
323 current->tgid, num, buf);
324 if (stored_rc)
325 rc = stored_rc;
326 }
327
328 return rc;
329}
330
331int
332smb2_push_mandatory_locks(struct cifsFileInfo *cfile)
333{
334 int rc = 0, stored_rc;
335 unsigned int xid;
336 unsigned int max_num, max_buf;
337 struct smb2_lock_element *buf;
338 struct cifsInodeInfo *cinode = CIFS_I(d_inode(cfile->dentry));
339 struct cifs_fid_locks *fdlocks;
340
341 xid = get_xid();
342
343 /*
344 * Accessing maxBuf is racy with cifs_reconnect - need to store value
345 * and check it for zero before using.
346 */
347 max_buf = tlink_tcon(cfile->tlink)->ses->server->maxBuf;
348 if (max_buf < sizeof(struct smb2_lock_element)) {
349 free_xid(xid);
350 return -EINVAL;
351 }
352
353 BUILD_BUG_ON(sizeof(struct smb2_lock_element) > PAGE_SIZE);
354 max_buf = min_t(unsigned int, max_buf, PAGE_SIZE);
355 max_num = max_buf / sizeof(struct smb2_lock_element);
356 buf = kcalloc(max_num, sizeof(struct smb2_lock_element), GFP_KERNEL);
357 if (!buf) {
358 free_xid(xid);
359 return -ENOMEM;
360 }
361
362 list_for_each_entry(fdlocks, &cinode->llist, llist) {
363 stored_rc = smb2_push_mand_fdlocks(fdlocks, xid, buf, max_num);
364 if (stored_rc)
365 rc = stored_rc;
366 }
367
368 kfree(buf);
369 free_xid(xid);
370 return rc;
371}
1/*
2 * fs/cifs/smb2file.c
3 *
4 * Copyright (C) International Business Machines Corp., 2002, 2011
5 * Author(s): Steve French (sfrench@us.ibm.com),
6 * Pavel Shilovsky ((pshilovsky@samba.org) 2012
7 *
8 * This library is free software; you can redistribute it and/or modify
9 * it under the terms of the GNU Lesser General Public License as published
10 * by the Free Software Foundation; either version 2.1 of the License, or
11 * (at your option) any later version.
12 *
13 * This library is distributed in the hope that it will be useful,
14 * but WITHOUT ANY WARRANTY; without even the implied warranty of
15 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See
16 * the GNU Lesser General Public License for more details.
17 *
18 * You should have received a copy of the GNU Lesser General Public License
19 * along with this library; if not, write to the Free Software
20 * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
21 */
22#include <linux/fs.h>
23#include <linux/stat.h>
24#include <linux/slab.h>
25#include <linux/pagemap.h>
26#include <asm/div64.h>
27#include "cifsfs.h"
28#include "cifspdu.h"
29#include "cifsglob.h"
30#include "cifsproto.h"
31#include "cifs_debug.h"
32#include "cifs_fs_sb.h"
33#include "cifs_unicode.h"
34#include "fscache.h"
35#include "smb2proto.h"
36
37int
38smb2_open_file(const unsigned int xid, struct cifs_open_parms *oparms,
39 __u32 *oplock, FILE_ALL_INFO *buf)
40{
41 int rc;
42 __le16 *smb2_path;
43 struct smb2_file_all_info *smb2_data = NULL;
44 __u8 smb2_oplock;
45 struct cifs_fid *fid = oparms->fid;
46 struct network_resiliency_req nr_ioctl_req;
47
48 smb2_path = cifs_convert_path_to_utf16(oparms->path, oparms->cifs_sb);
49 if (smb2_path == NULL) {
50 rc = -ENOMEM;
51 goto out;
52 }
53
54 smb2_data = kzalloc(sizeof(struct smb2_file_all_info) + PATH_MAX * 2,
55 GFP_KERNEL);
56 if (smb2_data == NULL) {
57 rc = -ENOMEM;
58 goto out;
59 }
60
61 oparms->desired_access |= FILE_READ_ATTRIBUTES;
62 smb2_oplock = SMB2_OPLOCK_LEVEL_BATCH;
63
64 rc = SMB2_open(xid, oparms, smb2_path, &smb2_oplock, smb2_data, NULL,
65 NULL, NULL);
66 if (rc)
67 goto out;
68
69
70 if (oparms->tcon->use_resilient) {
71 /* default timeout is 0, servers pick default (120 seconds) */
72 nr_ioctl_req.Timeout =
73 cpu_to_le32(oparms->tcon->handle_timeout);
74 nr_ioctl_req.Reserved = 0;
75 rc = SMB2_ioctl(xid, oparms->tcon, fid->persistent_fid,
76 fid->volatile_fid, FSCTL_LMR_REQUEST_RESILIENCY,
77 true /* is_fsctl */,
78 (char *)&nr_ioctl_req, sizeof(nr_ioctl_req),
79 CIFSMaxBufSize, NULL, NULL /* no return info */);
80 if (rc == -EOPNOTSUPP) {
81 cifs_dbg(VFS,
82 "resiliency not supported by server, disabling\n");
83 oparms->tcon->use_resilient = false;
84 } else if (rc)
85 cifs_dbg(FYI, "error %d setting resiliency\n", rc);
86
87 rc = 0;
88 }
89
90 if (buf) {
91 /* if open response does not have IndexNumber field - get it */
92 if (smb2_data->IndexNumber == 0) {
93 rc = SMB2_get_srv_num(xid, oparms->tcon,
94 fid->persistent_fid,
95 fid->volatile_fid,
96 &smb2_data->IndexNumber);
97 if (rc) {
98 /*
99 * let get_inode_info disable server inode
100 * numbers
101 */
102 smb2_data->IndexNumber = 0;
103 rc = 0;
104 }
105 }
106 move_smb2_info_to_cifs(buf, smb2_data);
107 }
108
109 *oplock = smb2_oplock;
110out:
111 kfree(smb2_data);
112 kfree(smb2_path);
113 return rc;
114}
115
116int
117smb2_unlock_range(struct cifsFileInfo *cfile, struct file_lock *flock,
118 const unsigned int xid)
119{
120 int rc = 0, stored_rc;
121 unsigned int max_num, num = 0, max_buf;
122 struct smb2_lock_element *buf, *cur;
123 struct cifs_tcon *tcon = tlink_tcon(cfile->tlink);
124 struct cifsInodeInfo *cinode = CIFS_I(d_inode(cfile->dentry));
125 struct cifsLockInfo *li, *tmp;
126 __u64 length = 1 + flock->fl_end - flock->fl_start;
127 struct list_head tmp_llist;
128
129 INIT_LIST_HEAD(&tmp_llist);
130
131 /*
132 * Accessing maxBuf is racy with cifs_reconnect - need to store value
133 * and check it before using.
134 */
135 max_buf = tcon->ses->server->maxBuf;
136 if (max_buf < sizeof(struct smb2_lock_element))
137 return -EINVAL;
138
139 BUILD_BUG_ON(sizeof(struct smb2_lock_element) > PAGE_SIZE);
140 max_buf = min_t(unsigned int, max_buf, PAGE_SIZE);
141 max_num = max_buf / sizeof(struct smb2_lock_element);
142 buf = kcalloc(max_num, sizeof(struct smb2_lock_element), GFP_KERNEL);
143 if (!buf)
144 return -ENOMEM;
145
146 cur = buf;
147
148 cifs_down_write(&cinode->lock_sem);
149 list_for_each_entry_safe(li, tmp, &cfile->llist->locks, llist) {
150 if (flock->fl_start > li->offset ||
151 (flock->fl_start + length) <
152 (li->offset + li->length))
153 continue;
154 if (current->tgid != li->pid)
155 /*
156 * flock and OFD lock are associated with an open
157 * file description, not the process.
158 */
159 if (!(flock->fl_flags & (FL_FLOCK | FL_OFDLCK)))
160 continue;
161 if (cinode->can_cache_brlcks) {
162 /*
163 * We can cache brlock requests - simply remove a lock
164 * from the file's list.
165 */
166 list_del(&li->llist);
167 cifs_del_lock_waiters(li);
168 kfree(li);
169 continue;
170 }
171 cur->Length = cpu_to_le64(li->length);
172 cur->Offset = cpu_to_le64(li->offset);
173 cur->Flags = cpu_to_le32(SMB2_LOCKFLAG_UNLOCK);
174 /*
175 * We need to save a lock here to let us add it again to the
176 * file's list if the unlock range request fails on the server.
177 */
178 list_move(&li->llist, &tmp_llist);
179 if (++num == max_num) {
180 stored_rc = smb2_lockv(xid, tcon,
181 cfile->fid.persistent_fid,
182 cfile->fid.volatile_fid,
183 current->tgid, num, buf);
184 if (stored_rc) {
185 /*
186 * We failed on the unlock range request - add
187 * all locks from the tmp list to the head of
188 * the file's list.
189 */
190 cifs_move_llist(&tmp_llist,
191 &cfile->llist->locks);
192 rc = stored_rc;
193 } else
194 /*
195 * The unlock range request succeed - free the
196 * tmp list.
197 */
198 cifs_free_llist(&tmp_llist);
199 cur = buf;
200 num = 0;
201 } else
202 cur++;
203 }
204 if (num) {
205 stored_rc = smb2_lockv(xid, tcon, cfile->fid.persistent_fid,
206 cfile->fid.volatile_fid, current->tgid,
207 num, buf);
208 if (stored_rc) {
209 cifs_move_llist(&tmp_llist, &cfile->llist->locks);
210 rc = stored_rc;
211 } else
212 cifs_free_llist(&tmp_llist);
213 }
214 up_write(&cinode->lock_sem);
215
216 kfree(buf);
217 return rc;
218}
219
220static int
221smb2_push_mand_fdlocks(struct cifs_fid_locks *fdlocks, const unsigned int xid,
222 struct smb2_lock_element *buf, unsigned int max_num)
223{
224 int rc = 0, stored_rc;
225 struct cifsFileInfo *cfile = fdlocks->cfile;
226 struct cifsLockInfo *li;
227 unsigned int num = 0;
228 struct smb2_lock_element *cur = buf;
229 struct cifs_tcon *tcon = tlink_tcon(cfile->tlink);
230
231 list_for_each_entry(li, &fdlocks->locks, llist) {
232 cur->Length = cpu_to_le64(li->length);
233 cur->Offset = cpu_to_le64(li->offset);
234 cur->Flags = cpu_to_le32(li->type |
235 SMB2_LOCKFLAG_FAIL_IMMEDIATELY);
236 if (++num == max_num) {
237 stored_rc = smb2_lockv(xid, tcon,
238 cfile->fid.persistent_fid,
239 cfile->fid.volatile_fid,
240 current->tgid, num, buf);
241 if (stored_rc)
242 rc = stored_rc;
243 cur = buf;
244 num = 0;
245 } else
246 cur++;
247 }
248 if (num) {
249 stored_rc = smb2_lockv(xid, tcon,
250 cfile->fid.persistent_fid,
251 cfile->fid.volatile_fid,
252 current->tgid, num, buf);
253 if (stored_rc)
254 rc = stored_rc;
255 }
256
257 return rc;
258}
259
260int
261smb2_push_mandatory_locks(struct cifsFileInfo *cfile)
262{
263 int rc = 0, stored_rc;
264 unsigned int xid;
265 unsigned int max_num, max_buf;
266 struct smb2_lock_element *buf;
267 struct cifsInodeInfo *cinode = CIFS_I(d_inode(cfile->dentry));
268 struct cifs_fid_locks *fdlocks;
269
270 xid = get_xid();
271
272 /*
273 * Accessing maxBuf is racy with cifs_reconnect - need to store value
274 * and check it for zero before using.
275 */
276 max_buf = tlink_tcon(cfile->tlink)->ses->server->maxBuf;
277 if (max_buf < sizeof(struct smb2_lock_element)) {
278 free_xid(xid);
279 return -EINVAL;
280 }
281
282 BUILD_BUG_ON(sizeof(struct smb2_lock_element) > PAGE_SIZE);
283 max_buf = min_t(unsigned int, max_buf, PAGE_SIZE);
284 max_num = max_buf / sizeof(struct smb2_lock_element);
285 buf = kcalloc(max_num, sizeof(struct smb2_lock_element), GFP_KERNEL);
286 if (!buf) {
287 free_xid(xid);
288 return -ENOMEM;
289 }
290
291 list_for_each_entry(fdlocks, &cinode->llist, llist) {
292 stored_rc = smb2_push_mand_fdlocks(fdlocks, xid, buf, max_num);
293 if (stored_rc)
294 rc = stored_rc;
295 }
296
297 kfree(buf);
298 free_xid(xid);
299 return rc;
300}