4 * Copyright (C) International Business Machines Corp., 2002,2010
5 * Author(s): Steve French (sfrench@us.ibm.com)
7 * Contains the routines for constructing the SMB PDUs themselves
9 * This library is free software; you can redistribute it and/or modify
10 * it under the terms of the GNU Lesser General Public License as published
11 * by the Free Software Foundation; either version 2.1 of the License, or
12 * (at your option) any later version.
14 * This library is distributed in the hope that it will be useful,
15 * but WITHOUT ANY WARRANTY; without even the implied warranty of
16 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See
17 * the GNU Lesser General Public License for more details.
19 * You should have received a copy of the GNU Lesser General Public License
20 * along with this library; if not, write to the Free Software
21 * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
24 /* SMB/CIFS PDU handling routines here - except for leftovers in connect.c */
25 /* These are mostly routines that operate on a pathname, or on a tree id */
26 /* (mounted volume), but there are eight handle based routines which must be */
27 /* treated slightly differently for reconnection purposes since we never */
28 /* want to reuse a stale file handle and only the caller knows the file info */
31 #include <linux/kernel.h>
32 #include <linux/vfs.h>
33 #include <linux/slab.h>
34 #include <linux/posix_acl_xattr.h>
35 #include <linux/pagemap.h>
36 #include <linux/swap.h>
37 #include <linux/task_io_accounting_ops.h>
38 #include <linux/uaccess.h>
42 #include "cifsproto.h"
43 #include "cifs_unicode.h"
44 #include "cifs_debug.h"
46 #include "smbdirect.h"
47 #ifdef CONFIG_CIFS_DFS_UPCALL
48 #include "dfs_cache.h"
51 #ifdef CONFIG_CIFS_POSIX
56 #ifdef CONFIG_CIFS_WEAK_PW_HASH
57 {LANMAN_PROT, "\2LM1.2X002"},
58 {LANMAN2_PROT, "\2LANMAN2.1"},
59 #endif /* weak password hashing for legacy clients */
60 {CIFS_PROT, "\2NT LM 0.12"},
61 {POSIX_PROT, "\2POSIX 2"},
69 #ifdef CONFIG_CIFS_WEAK_PW_HASH
70 {LANMAN_PROT, "\2LM1.2X002"},
71 {LANMAN2_PROT, "\2LANMAN2.1"},
72 #endif /* weak password hashing for legacy clients */
73 {CIFS_PROT, "\2NT LM 0.12"},
78 /* define the number of elements in the cifs dialect array */
79 #ifdef CONFIG_CIFS_POSIX
80 #ifdef CONFIG_CIFS_WEAK_PW_HASH
81 #define CIFS_NUM_PROT 4
83 #define CIFS_NUM_PROT 2
84 #endif /* CIFS_WEAK_PW_HASH */
86 #ifdef CONFIG_CIFS_WEAK_PW_HASH
87 #define CIFS_NUM_PROT 3
89 #define CIFS_NUM_PROT 1
90 #endif /* CONFIG_CIFS_WEAK_PW_HASH */
91 #endif /* CIFS_POSIX */
94 * Mark as invalid, all open files on tree connections since they
95 * were closed when session to server was lost.
98 cifs_mark_open_files_invalid(struct cifs_tcon *tcon)
100 struct cifsFileInfo *open_file = NULL;
101 struct list_head *tmp;
102 struct list_head *tmp1;
104 /* list all files open on tree connection and mark them invalid */
105 spin_lock(&tcon->open_file_lock);
106 list_for_each_safe(tmp, tmp1, &tcon->openFileList) {
107 open_file = list_entry(tmp, struct cifsFileInfo, tlist);
108 open_file->invalidHandle = true;
109 open_file->oplock_break_cancelled = true;
111 spin_unlock(&tcon->open_file_lock);
113 mutex_lock(&tcon->crfid.fid_mutex);
114 tcon->crfid.is_valid = false;
115 memset(tcon->crfid.fid, 0, sizeof(struct cifs_fid));
116 mutex_unlock(&tcon->crfid.fid_mutex);
119 * BB Add call to invalidate_inodes(sb) for all superblocks mounted
124 #ifdef CONFIG_CIFS_DFS_UPCALL
125 static int __cifs_reconnect_tcon(const struct nls_table *nlsc,
126 struct cifs_tcon *tcon)
129 struct dfs_cache_tgt_list tl;
130 struct dfs_cache_tgt_iterator *it = NULL;
132 const char *tcp_host;
134 const char *dfs_host;
137 tree = kzalloc(MAX_TREE_SIZE, GFP_KERNEL);
142 scnprintf(tree, MAX_TREE_SIZE, "\\\\%s\\IPC$",
143 tcon->ses->server->hostname);
144 rc = CIFSTCon(0, tcon->ses, tree, tcon, nlsc);
148 if (!tcon->dfs_path) {
149 rc = CIFSTCon(0, tcon->ses, tcon->treeName, tcon, nlsc);
153 rc = dfs_cache_noreq_find(tcon->dfs_path + 1, NULL, &tl);
157 extract_unc_hostname(tcon->ses->server->hostname, &tcp_host,
160 for (it = dfs_cache_get_tgt_iterator(&tl); it;
161 it = dfs_cache_get_next_tgt(&tl, it)) {
162 const char *tgt = dfs_cache_get_tgt_name(it);
164 extract_unc_hostname(tgt, &dfs_host, &dfs_host_len);
166 if (dfs_host_len != tcp_host_len
167 || strncasecmp(dfs_host, tcp_host, dfs_host_len) != 0) {
168 cifs_dbg(FYI, "%s: skipping %.*s, doesn't match %.*s",
170 (int)dfs_host_len, dfs_host,
171 (int)tcp_host_len, tcp_host);
175 scnprintf(tree, MAX_TREE_SIZE, "\\%s", tgt);
177 rc = CIFSTCon(0, tcon->ses, tree, tcon, nlsc);
186 rc = dfs_cache_noreq_update_tgthint(tcon->dfs_path + 1,
191 dfs_cache_free_tgts(&tl);
197 static inline int __cifs_reconnect_tcon(const struct nls_table *nlsc,
198 struct cifs_tcon *tcon)
200 return CIFSTCon(0, tcon->ses, tcon->treeName, tcon, nlsc);
204 /* reconnect the socket, tcon, and smb session if needed */
206 cifs_reconnect_tcon(struct cifs_tcon *tcon, int smb_command)
209 struct cifs_ses *ses;
210 struct TCP_Server_Info *server;
211 struct nls_table *nls_codepage;
215 * SMBs NegProt, SessSetup, uLogoff do not have tcon yet so check for
216 * tcp and smb session status done differently for those three - in the
223 server = ses->server;
226 * only tree disconnect, open, and write, (and ulogoff which does not
227 * have tcon) are allowed as we start force umount
229 if (tcon->tidStatus == CifsExiting) {
230 if (smb_command != SMB_COM_WRITE_ANDX &&
231 smb_command != SMB_COM_OPEN_ANDX &&
232 smb_command != SMB_COM_TREE_DISCONNECT) {
233 cifs_dbg(FYI, "can not send cmd %d while umounting\n",
239 retries = server->nr_targets;
242 * Give demultiplex thread up to 10 seconds to each target available for
243 * reconnect -- should be greater than cifs socket timeout which is 7
246 while (server->tcpStatus == CifsNeedReconnect) {
247 rc = wait_event_interruptible_timeout(server->response_q,
248 (server->tcpStatus != CifsNeedReconnect),
251 cifs_dbg(FYI, "%s: aborting reconnect due to a received"
252 " signal by the process\n", __func__);
256 /* are we still trying to reconnect? */
257 if (server->tcpStatus != CifsNeedReconnect)
264 * on "soft" mounts we wait once. Hard mounts keep
265 * retrying until process is killed or server comes
269 cifs_dbg(FYI, "gave up waiting on reconnect in smb_init\n");
272 retries = server->nr_targets;
275 if (!ses->need_reconnect && !tcon->need_reconnect)
278 nls_codepage = load_nls_default();
281 * need to prevent multiple threads trying to simultaneously
282 * reconnect the same SMB session
284 mutex_lock(&ses->session_mutex);
287 * Recheck after acquire mutex. If another thread is negotiating
288 * and the server never sends an answer the socket will be closed
289 * and tcpStatus set to reconnect.
291 if (server->tcpStatus == CifsNeedReconnect) {
293 mutex_unlock(&ses->session_mutex);
297 rc = cifs_negotiate_protocol(0, ses);
298 if (rc == 0 && ses->need_reconnect)
299 rc = cifs_setup_session(0, ses, nls_codepage);
301 /* do we need to reconnect tcon? */
302 if (rc || !tcon->need_reconnect) {
303 mutex_unlock(&ses->session_mutex);
307 cifs_mark_open_files_invalid(tcon);
308 rc = __cifs_reconnect_tcon(nls_codepage, tcon);
309 mutex_unlock(&ses->session_mutex);
310 cifs_dbg(FYI, "reconnect tcon rc = %d\n", rc);
313 printk_once(KERN_WARNING "reconnect tcon failed rc = %d\n", rc);
317 atomic_inc(&tconInfoReconnectCount);
319 /* tell server Unix caps we support */
320 if (ses->capabilities & CAP_UNIX)
321 reset_cifs_unix_caps(0, tcon, NULL, NULL);
324 * Removed call to reopen open files here. It is safer (and faster) to
325 * reopen files one at a time as needed in read and write.
327 * FIXME: what about file locks? don't we need to reclaim them ASAP?
332 * Check if handle based operation so we know whether we can continue
333 * or not without returning to caller to reset file handle
335 switch (smb_command) {
336 case SMB_COM_READ_ANDX:
337 case SMB_COM_WRITE_ANDX:
339 case SMB_COM_FIND_CLOSE2:
340 case SMB_COM_LOCKING_ANDX:
344 unload_nls(nls_codepage);
348 /* Allocate and return pointer to an SMB request buffer, and set basic
349 SMB information in the SMB header. If the return code is zero, this
350 function must have filled in request_buf pointer */
352 small_smb_init(int smb_command, int wct, struct cifs_tcon *tcon,
357 rc = cifs_reconnect_tcon(tcon, smb_command);
361 *request_buf = cifs_small_buf_get();
362 if (*request_buf == NULL) {
363 /* BB should we add a retry in here if not a writepage? */
367 header_assemble((struct smb_hdr *) *request_buf, smb_command,
371 cifs_stats_inc(&tcon->num_smbs_sent);
377 small_smb_init_no_tc(const int smb_command, const int wct,
378 struct cifs_ses *ses, void **request_buf)
381 struct smb_hdr *buffer;
383 rc = small_smb_init(smb_command, wct, NULL, request_buf);
387 buffer = (struct smb_hdr *)*request_buf;
388 buffer->Mid = get_next_mid(ses->server);
389 if (ses->capabilities & CAP_UNICODE)
390 buffer->Flags2 |= SMBFLG2_UNICODE;
391 if (ses->capabilities & CAP_STATUS32)
392 buffer->Flags2 |= SMBFLG2_ERR_STATUS;
394 /* uid, tid can stay at zero as set in header assemble */
396 /* BB add support for turning on the signing when
397 this function is used after 1st of session setup requests */
402 /* If the return code is zero, this function must fill in request_buf pointer */
404 __smb_init(int smb_command, int wct, struct cifs_tcon *tcon,
405 void **request_buf, void **response_buf)
407 *request_buf = cifs_buf_get();
408 if (*request_buf == NULL) {
409 /* BB should we add a retry in here if not a writepage? */
412 /* Although the original thought was we needed the response buf for */
413 /* potential retries of smb operations it turns out we can determine */
414 /* from the mid flags when the request buffer can be resent without */
415 /* having to use a second distinct buffer for the response */
417 *response_buf = *request_buf;
419 header_assemble((struct smb_hdr *) *request_buf, smb_command, tcon,
423 cifs_stats_inc(&tcon->num_smbs_sent);
428 /* If the return code is zero, this function must fill in request_buf pointer */
430 smb_init(int smb_command, int wct, struct cifs_tcon *tcon,
431 void **request_buf, void **response_buf)
435 rc = cifs_reconnect_tcon(tcon, smb_command);
439 return __smb_init(smb_command, wct, tcon, request_buf, response_buf);
443 smb_init_no_reconnect(int smb_command, int wct, struct cifs_tcon *tcon,
444 void **request_buf, void **response_buf)
446 if (tcon->ses->need_reconnect || tcon->need_reconnect)
449 return __smb_init(smb_command, wct, tcon, request_buf, response_buf);
452 static int validate_t2(struct smb_t2_rsp *pSMB)
454 unsigned int total_size;
456 /* check for plausible wct */
457 if (pSMB->hdr.WordCount < 10)
460 /* check for parm and data offset going beyond end of smb */
461 if (get_unaligned_le16(&pSMB->t2_rsp.ParameterOffset) > 1024 ||
462 get_unaligned_le16(&pSMB->t2_rsp.DataOffset) > 1024)
465 total_size = get_unaligned_le16(&pSMB->t2_rsp.ParameterCount);
466 if (total_size >= 512)
469 /* check that bcc is at least as big as parms + data, and that it is
470 * less than negotiated smb buffer
472 total_size += get_unaligned_le16(&pSMB->t2_rsp.DataCount);
473 if (total_size > get_bcc(&pSMB->hdr) ||
474 total_size >= CIFSMaxBufSize + MAX_CIFS_HDR_SIZE)
479 cifs_dump_mem("Invalid transact2 SMB: ", (char *)pSMB,
480 sizeof(struct smb_t2_rsp) + 16);
485 decode_ext_sec_blob(struct cifs_ses *ses, NEGOTIATE_RSP *pSMBr)
489 char *guid = pSMBr->u.extended_response.GUID;
490 struct TCP_Server_Info *server = ses->server;
492 count = get_bcc(&pSMBr->hdr);
493 if (count < SMB1_CLIENT_GUID_SIZE)
496 spin_lock(&cifs_tcp_ses_lock);
497 if (server->srv_count > 1) {
498 spin_unlock(&cifs_tcp_ses_lock);
499 if (memcmp(server->server_GUID, guid, SMB1_CLIENT_GUID_SIZE) != 0) {
500 cifs_dbg(FYI, "server UID changed\n");
501 memcpy(server->server_GUID, guid, SMB1_CLIENT_GUID_SIZE);
504 spin_unlock(&cifs_tcp_ses_lock);
505 memcpy(server->server_GUID, guid, SMB1_CLIENT_GUID_SIZE);
508 if (count == SMB1_CLIENT_GUID_SIZE) {
509 server->sec_ntlmssp = true;
511 count -= SMB1_CLIENT_GUID_SIZE;
512 rc = decode_negTokenInit(
513 pSMBr->u.extended_response.SecurityBlob, count, server);
522 cifs_enable_signing(struct TCP_Server_Info *server, bool mnt_sign_required)
524 bool srv_sign_required = server->sec_mode & server->vals->signing_required;
525 bool srv_sign_enabled = server->sec_mode & server->vals->signing_enabled;
526 bool mnt_sign_enabled = global_secflags & CIFSSEC_MAY_SIGN;
529 * Is signing required by mnt options? If not then check
530 * global_secflags to see if it is there.
532 if (!mnt_sign_required)
533 mnt_sign_required = ((global_secflags & CIFSSEC_MUST_SIGN) ==
537 * If signing is required then it's automatically enabled too,
538 * otherwise, check to see if the secflags allow it.
540 mnt_sign_enabled = mnt_sign_required ? mnt_sign_required :
541 (global_secflags & CIFSSEC_MAY_SIGN);
543 /* If server requires signing, does client allow it? */
544 if (srv_sign_required) {
545 if (!mnt_sign_enabled) {
546 cifs_dbg(VFS, "Server requires signing, but it's disabled in SecurityFlags!");
552 /* If client requires signing, does server allow it? */
553 if (mnt_sign_required) {
554 if (!srv_sign_enabled) {
555 cifs_dbg(VFS, "Server does not support signing!");
561 if (cifs_rdma_enabled(server) && server->sign)
562 cifs_dbg(VFS, "Signing is enabled, and RDMA read/write will be disabled");
567 #ifdef CONFIG_CIFS_WEAK_PW_HASH
569 decode_lanman_negprot_rsp(struct TCP_Server_Info *server, NEGOTIATE_RSP *pSMBr)
572 struct lanman_neg_rsp *rsp = (struct lanman_neg_rsp *)pSMBr;
574 if (server->dialect != LANMAN_PROT && server->dialect != LANMAN2_PROT)
577 server->sec_mode = le16_to_cpu(rsp->SecurityMode);
578 server->maxReq = min_t(unsigned int,
579 le16_to_cpu(rsp->MaxMpxCount),
581 set_credits(server, server->maxReq);
582 server->maxBuf = le16_to_cpu(rsp->MaxBufSize);
583 /* even though we do not use raw we might as well set this
584 accurately, in case we ever find a need for it */
585 if ((le16_to_cpu(rsp->RawMode) & RAW_ENABLE) == RAW_ENABLE) {
586 server->max_rw = 0xFF00;
587 server->capabilities = CAP_MPX_MODE | CAP_RAW_MODE;
589 server->max_rw = 0;/* do not need to use raw anyway */
590 server->capabilities = CAP_MPX_MODE;
592 tmp = (__s16)le16_to_cpu(rsp->ServerTimeZone);
594 /* OS/2 often does not set timezone therefore
595 * we must use server time to calc time zone.
596 * Could deviate slightly from the right zone.
597 * Smallest defined timezone difference is 15 minutes
598 * (i.e. Nepal). Rounding up/down is done to match
601 int val, seconds, remain, result;
602 struct timespec64 ts;
603 time64_t utc = ktime_get_real_seconds();
604 ts = cnvrtDosUnixTm(rsp->SrvTime.Date,
605 rsp->SrvTime.Time, 0);
606 cifs_dbg(FYI, "SrvTime %lld sec since 1970 (utc: %lld) diff: %lld\n",
609 val = (int)(utc - ts.tv_sec);
611 result = (seconds / MIN_TZ_ADJ) * MIN_TZ_ADJ;
612 remain = seconds % MIN_TZ_ADJ;
613 if (remain >= (MIN_TZ_ADJ / 2))
614 result += MIN_TZ_ADJ;
617 server->timeAdj = result;
619 server->timeAdj = (int)tmp;
620 server->timeAdj *= 60; /* also in seconds */
622 cifs_dbg(FYI, "server->timeAdj: %d seconds\n", server->timeAdj);
625 /* BB get server time for time conversions and add
626 code to use it and timezone since this is not UTC */
628 if (rsp->EncryptionKeyLength ==
629 cpu_to_le16(CIFS_CRYPTO_KEY_SIZE)) {
630 memcpy(server->cryptkey, rsp->EncryptionKey,
631 CIFS_CRYPTO_KEY_SIZE);
632 } else if (server->sec_mode & SECMODE_PW_ENCRYPT) {
633 return -EIO; /* need cryptkey unless plain text */
636 cifs_dbg(FYI, "LANMAN negotiated\n");
641 decode_lanman_negprot_rsp(struct TCP_Server_Info *server, NEGOTIATE_RSP *pSMBr)
643 cifs_dbg(VFS, "mount failed, cifs module not built with CIFS_WEAK_PW_HASH support\n");
649 should_set_ext_sec_flag(enum securityEnum sectype)
656 if (global_secflags &
657 (CIFSSEC_MAY_KRB5 | CIFSSEC_MAY_NTLMSSP))
666 CIFSSMBNegotiate(const unsigned int xid, struct cifs_ses *ses)
669 NEGOTIATE_RSP *pSMBr;
673 struct TCP_Server_Info *server = ses->server;
677 WARN(1, "%s: server is NULL!\n", __func__);
681 rc = smb_init(SMB_COM_NEGOTIATE, 0, NULL /* no tcon yet */ ,
682 (void **) &pSMB, (void **) &pSMBr);
686 pSMB->hdr.Mid = get_next_mid(server);
687 pSMB->hdr.Flags2 |= (SMBFLG2_UNICODE | SMBFLG2_ERR_STATUS);
689 if (should_set_ext_sec_flag(ses->sectype)) {
690 cifs_dbg(FYI, "Requesting extended security.");
691 pSMB->hdr.Flags2 |= SMBFLG2_EXT_SEC;
696 * We know that all the name entries in the protocols array
697 * are short (< 16 bytes anyway) and are NUL terminated.
699 for (i = 0; i < CIFS_NUM_PROT; i++) {
700 size_t len = strlen(protocols[i].name) + 1;
702 memcpy(pSMB->DialectsArray+count, protocols[i].name, len);
705 inc_rfc1001_len(pSMB, count);
706 pSMB->ByteCount = cpu_to_le16(count);
708 rc = SendReceive(xid, ses, (struct smb_hdr *) pSMB,
709 (struct smb_hdr *) pSMBr, &bytes_returned, 0);
713 server->dialect = le16_to_cpu(pSMBr->DialectIndex);
714 cifs_dbg(FYI, "Dialect: %d\n", server->dialect);
715 /* Check wct = 1 error case */
716 if ((pSMBr->hdr.WordCount < 13) || (server->dialect == BAD_PROT)) {
717 /* core returns wct = 1, but we do not ask for core - otherwise
718 small wct just comes when dialect index is -1 indicating we
719 could not negotiate a common dialect */
722 } else if (pSMBr->hdr.WordCount == 13) {
723 server->negflavor = CIFS_NEGFLAVOR_LANMAN;
724 rc = decode_lanman_negprot_rsp(server, pSMBr);
726 } else if (pSMBr->hdr.WordCount != 17) {
731 /* else wct == 17, NTLM or better */
733 server->sec_mode = pSMBr->SecurityMode;
734 if ((server->sec_mode & SECMODE_USER) == 0)
735 cifs_dbg(FYI, "share mode security\n");
737 /* one byte, so no need to convert this or EncryptionKeyLen from
739 server->maxReq = min_t(unsigned int, le16_to_cpu(pSMBr->MaxMpxCount),
741 set_credits(server, server->maxReq);
742 /* probably no need to store and check maxvcs */
743 server->maxBuf = le32_to_cpu(pSMBr->MaxBufferSize);
744 server->max_rw = le32_to_cpu(pSMBr->MaxRawSize);
745 cifs_dbg(NOISY, "Max buf = %d\n", ses->server->maxBuf);
746 server->capabilities = le32_to_cpu(pSMBr->Capabilities);
747 server->timeAdj = (int)(__s16)le16_to_cpu(pSMBr->ServerTimeZone);
748 server->timeAdj *= 60;
750 if (pSMBr->EncryptionKeyLength == CIFS_CRYPTO_KEY_SIZE) {
751 server->negflavor = CIFS_NEGFLAVOR_UNENCAP;
752 memcpy(ses->server->cryptkey, pSMBr->u.EncryptionKey,
753 CIFS_CRYPTO_KEY_SIZE);
754 } else if (pSMBr->hdr.Flags2 & SMBFLG2_EXT_SEC ||
755 server->capabilities & CAP_EXTENDED_SECURITY) {
756 server->negflavor = CIFS_NEGFLAVOR_EXTENDED;
757 rc = decode_ext_sec_blob(ses, pSMBr);
758 } else if (server->sec_mode & SECMODE_PW_ENCRYPT) {
759 rc = -EIO; /* no crypt key only if plain text pwd */
761 server->negflavor = CIFS_NEGFLAVOR_UNENCAP;
762 server->capabilities &= ~CAP_EXTENDED_SECURITY;
767 rc = cifs_enable_signing(server, ses->sign);
769 cifs_buf_release(pSMB);
771 cifs_dbg(FYI, "negprot rc %d\n", rc);
776 CIFSSMBTDis(const unsigned int xid, struct cifs_tcon *tcon)
778 struct smb_hdr *smb_buffer;
781 cifs_dbg(FYI, "In tree disconnect\n");
783 /* BB: do we need to check this? These should never be NULL. */
784 if ((tcon->ses == NULL) || (tcon->ses->server == NULL))
788 * No need to return error on this operation if tid invalidated and
789 * closed on server already e.g. due to tcp session crashing. Also,
790 * the tcon is no longer on the list, so no need to take lock before
793 if ((tcon->need_reconnect) || (tcon->ses->need_reconnect))
796 rc = small_smb_init(SMB_COM_TREE_DISCONNECT, 0, tcon,
797 (void **)&smb_buffer);
801 rc = SendReceiveNoRsp(xid, tcon->ses, (char *)smb_buffer, 0);
802 cifs_small_buf_release(smb_buffer);
804 cifs_dbg(FYI, "Tree disconnect failed %d\n", rc);
806 /* No need to return error on this operation if tid invalidated and
807 closed on server already e.g. due to tcp session crashing */
815 * This is a no-op for now. We're not really interested in the reply, but
816 * rather in the fact that the server sent one and that server->lstrp
819 * FIXME: maybe we should consider checking that the reply matches request?
822 cifs_echo_callback(struct mid_q_entry *mid)
824 struct TCP_Server_Info *server = mid->callback_data;
825 struct cifs_credits credits = { .value = 1, .instance = 0 };
827 DeleteMidQEntry(mid);
828 add_credits(server, &credits, CIFS_ECHO_OP);
832 CIFSSMBEcho(struct TCP_Server_Info *server)
837 struct smb_rqst rqst = { .rq_iov = iov,
840 cifs_dbg(FYI, "In echo request\n");
842 rc = small_smb_init(SMB_COM_ECHO, 0, NULL, (void **)&smb);
846 if (server->capabilities & CAP_UNICODE)
847 smb->hdr.Flags2 |= SMBFLG2_UNICODE;
849 /* set up echo request */
850 smb->hdr.Tid = 0xffff;
851 smb->hdr.WordCount = 1;
852 put_unaligned_le16(1, &smb->EchoCount);
853 put_bcc(1, &smb->hdr);
855 inc_rfc1001_len(smb, 3);
858 iov[0].iov_base = smb;
859 iov[1].iov_len = get_rfc1002_length(smb);
860 iov[1].iov_base = (char *)smb + 4;
862 rc = cifs_call_async(server, &rqst, NULL, cifs_echo_callback, NULL,
863 server, CIFS_ASYNC_OP | CIFS_ECHO_OP, NULL);
865 cifs_dbg(FYI, "Echo request failed: %d\n", rc);
867 cifs_small_buf_release(smb);
873 CIFSSMBLogoff(const unsigned int xid, struct cifs_ses *ses)
875 LOGOFF_ANDX_REQ *pSMB;
878 cifs_dbg(FYI, "In SMBLogoff for session disconnect\n");
881 * BB: do we need to check validity of ses and server? They should
882 * always be valid since we have an active reference. If not, that
883 * should probably be a BUG()
885 if (!ses || !ses->server)
888 mutex_lock(&ses->session_mutex);
889 if (ses->need_reconnect)
890 goto session_already_dead; /* no need to send SMBlogoff if uid
891 already closed due to reconnect */
892 rc = small_smb_init(SMB_COM_LOGOFF_ANDX, 2, NULL, (void **)&pSMB);
894 mutex_unlock(&ses->session_mutex);
898 pSMB->hdr.Mid = get_next_mid(ses->server);
900 if (ses->server->sign)
901 pSMB->hdr.Flags2 |= SMBFLG2_SECURITY_SIGNATURE;
903 pSMB->hdr.Uid = ses->Suid;
905 pSMB->AndXCommand = 0xFF;
906 rc = SendReceiveNoRsp(xid, ses, (char *) pSMB, 0);
907 cifs_small_buf_release(pSMB);
908 session_already_dead:
909 mutex_unlock(&ses->session_mutex);
911 /* if session dead then we do not need to do ulogoff,
912 since server closed smb session, no sense reporting
920 CIFSPOSIXDelFile(const unsigned int xid, struct cifs_tcon *tcon,
921 const char *fileName, __u16 type,
922 const struct nls_table *nls_codepage, int remap)
924 TRANSACTION2_SPI_REQ *pSMB = NULL;
925 TRANSACTION2_SPI_RSP *pSMBr = NULL;
926 struct unlink_psx_rq *pRqD;
929 int bytes_returned = 0;
930 __u16 params, param_offset, offset, byte_count;
932 cifs_dbg(FYI, "In POSIX delete\n");
934 rc = smb_init(SMB_COM_TRANSACTION2, 15, tcon, (void **) &pSMB,
939 if (pSMB->hdr.Flags2 & SMBFLG2_UNICODE) {
941 cifsConvertToUTF16((__le16 *) pSMB->FileName, fileName,
942 PATH_MAX, nls_codepage, remap);
943 name_len++; /* trailing null */
945 } else { /* BB add path length overrun check */
946 name_len = strnlen(fileName, PATH_MAX);
947 name_len++; /* trailing null */
948 strncpy(pSMB->FileName, fileName, name_len);
951 params = 6 + name_len;
952 pSMB->MaxParameterCount = cpu_to_le16(2);
953 pSMB->MaxDataCount = 0; /* BB double check this with jra */
954 pSMB->MaxSetupCount = 0;
959 param_offset = offsetof(struct smb_com_transaction2_spi_req,
960 InformationLevel) - 4;
961 offset = param_offset + params;
963 /* Setup pointer to Request Data (inode type) */
964 pRqD = (struct unlink_psx_rq *)(((char *)&pSMB->hdr.Protocol) + offset);
965 pRqD->type = cpu_to_le16(type);
966 pSMB->ParameterOffset = cpu_to_le16(param_offset);
967 pSMB->DataOffset = cpu_to_le16(offset);
968 pSMB->SetupCount = 1;
970 pSMB->SubCommand = cpu_to_le16(TRANS2_SET_PATH_INFORMATION);
971 byte_count = 3 /* pad */ + params + sizeof(struct unlink_psx_rq);
973 pSMB->DataCount = cpu_to_le16(sizeof(struct unlink_psx_rq));
974 pSMB->TotalDataCount = cpu_to_le16(sizeof(struct unlink_psx_rq));
975 pSMB->ParameterCount = cpu_to_le16(params);
976 pSMB->TotalParameterCount = pSMB->ParameterCount;
977 pSMB->InformationLevel = cpu_to_le16(SMB_POSIX_UNLINK);
979 inc_rfc1001_len(pSMB, byte_count);
980 pSMB->ByteCount = cpu_to_le16(byte_count);
981 rc = SendReceive(xid, tcon->ses, (struct smb_hdr *) pSMB,
982 (struct smb_hdr *) pSMBr, &bytes_returned, 0);
984 cifs_dbg(FYI, "Posix delete returned %d\n", rc);
985 cifs_buf_release(pSMB);
987 cifs_stats_inc(&tcon->stats.cifs_stats.num_deletes);
996 CIFSSMBDelFile(const unsigned int xid, struct cifs_tcon *tcon, const char *name,
997 struct cifs_sb_info *cifs_sb)
999 DELETE_FILE_REQ *pSMB = NULL;
1000 DELETE_FILE_RSP *pSMBr = NULL;
1004 int remap = cifs_remap(cifs_sb);
1007 rc = smb_init(SMB_COM_DELETE, 1, tcon, (void **) &pSMB,
1012 if (pSMB->hdr.Flags2 & SMBFLG2_UNICODE) {
1013 name_len = cifsConvertToUTF16((__le16 *) pSMB->fileName, name,
1014 PATH_MAX, cifs_sb->local_nls,
1016 name_len++; /* trailing null */
1018 } else { /* BB improve check for buffer overruns BB */
1019 name_len = strnlen(name, PATH_MAX);
1020 name_len++; /* trailing null */
1021 strncpy(pSMB->fileName, name, name_len);
1023 pSMB->SearchAttributes =
1024 cpu_to_le16(ATTR_READONLY | ATTR_HIDDEN | ATTR_SYSTEM);
1025 pSMB->BufferFormat = 0x04;
1026 inc_rfc1001_len(pSMB, name_len + 1);
1027 pSMB->ByteCount = cpu_to_le16(name_len + 1);
1028 rc = SendReceive(xid, tcon->ses, (struct smb_hdr *) pSMB,
1029 (struct smb_hdr *) pSMBr, &bytes_returned, 0);
1030 cifs_stats_inc(&tcon->stats.cifs_stats.num_deletes);
1032 cifs_dbg(FYI, "Error in RMFile = %d\n", rc);
1034 cifs_buf_release(pSMB);
1042 CIFSSMBRmDir(const unsigned int xid, struct cifs_tcon *tcon, const char *name,
1043 struct cifs_sb_info *cifs_sb)
1045 DELETE_DIRECTORY_REQ *pSMB = NULL;
1046 DELETE_DIRECTORY_RSP *pSMBr = NULL;
1050 int remap = cifs_remap(cifs_sb);
1052 cifs_dbg(FYI, "In CIFSSMBRmDir\n");
1054 rc = smb_init(SMB_COM_DELETE_DIRECTORY, 0, tcon, (void **) &pSMB,
1059 if (pSMB->hdr.Flags2 & SMBFLG2_UNICODE) {
1060 name_len = cifsConvertToUTF16((__le16 *) pSMB->DirName, name,
1061 PATH_MAX, cifs_sb->local_nls,
1063 name_len++; /* trailing null */
1065 } else { /* BB improve check for buffer overruns BB */
1066 name_len = strnlen(name, PATH_MAX);
1067 name_len++; /* trailing null */
1068 strncpy(pSMB->DirName, name, name_len);
1071 pSMB->BufferFormat = 0x04;
1072 inc_rfc1001_len(pSMB, name_len + 1);
1073 pSMB->ByteCount = cpu_to_le16(name_len + 1);
1074 rc = SendReceive(xid, tcon->ses, (struct smb_hdr *) pSMB,
1075 (struct smb_hdr *) pSMBr, &bytes_returned, 0);
1076 cifs_stats_inc(&tcon->stats.cifs_stats.num_rmdirs);
1078 cifs_dbg(FYI, "Error in RMDir = %d\n", rc);
1080 cifs_buf_release(pSMB);
1087 CIFSSMBMkDir(const unsigned int xid, struct cifs_tcon *tcon, const char *name,
1088 struct cifs_sb_info *cifs_sb)
1091 CREATE_DIRECTORY_REQ *pSMB = NULL;
1092 CREATE_DIRECTORY_RSP *pSMBr = NULL;
1095 int remap = cifs_remap(cifs_sb);
1097 cifs_dbg(FYI, "In CIFSSMBMkDir\n");
1099 rc = smb_init(SMB_COM_CREATE_DIRECTORY, 0, tcon, (void **) &pSMB,
1104 if (pSMB->hdr.Flags2 & SMBFLG2_UNICODE) {
1105 name_len = cifsConvertToUTF16((__le16 *) pSMB->DirName, name,
1106 PATH_MAX, cifs_sb->local_nls,
1108 name_len++; /* trailing null */
1110 } else { /* BB improve check for buffer overruns BB */
1111 name_len = strnlen(name, PATH_MAX);
1112 name_len++; /* trailing null */
1113 strncpy(pSMB->DirName, name, name_len);
1116 pSMB->BufferFormat = 0x04;
1117 inc_rfc1001_len(pSMB, name_len + 1);
1118 pSMB->ByteCount = cpu_to_le16(name_len + 1);
1119 rc = SendReceive(xid, tcon->ses, (struct smb_hdr *) pSMB,
1120 (struct smb_hdr *) pSMBr, &bytes_returned, 0);
1121 cifs_stats_inc(&tcon->stats.cifs_stats.num_mkdirs);
1123 cifs_dbg(FYI, "Error in Mkdir = %d\n", rc);
1125 cifs_buf_release(pSMB);
1132 CIFSPOSIXCreate(const unsigned int xid, struct cifs_tcon *tcon,
1133 __u32 posix_flags, __u64 mode, __u16 *netfid,
1134 FILE_UNIX_BASIC_INFO *pRetData, __u32 *pOplock,
1135 const char *name, const struct nls_table *nls_codepage,
1138 TRANSACTION2_SPI_REQ *pSMB = NULL;
1139 TRANSACTION2_SPI_RSP *pSMBr = NULL;
1142 int bytes_returned = 0;
1143 __u16 params, param_offset, offset, byte_count, count;
1144 OPEN_PSX_REQ *pdata;
1145 OPEN_PSX_RSP *psx_rsp;
1147 cifs_dbg(FYI, "In POSIX Create\n");
1149 rc = smb_init(SMB_COM_TRANSACTION2, 15, tcon, (void **) &pSMB,
1154 if (pSMB->hdr.Flags2 & SMBFLG2_UNICODE) {
1156 cifsConvertToUTF16((__le16 *) pSMB->FileName, name,
1157 PATH_MAX, nls_codepage, remap);
1158 name_len++; /* trailing null */
1160 } else { /* BB improve the check for buffer overruns BB */
1161 name_len = strnlen(name, PATH_MAX);
1162 name_len++; /* trailing null */
1163 strncpy(pSMB->FileName, name, name_len);
1166 params = 6 + name_len;
1167 count = sizeof(OPEN_PSX_REQ);
1168 pSMB->MaxParameterCount = cpu_to_le16(2);
1169 pSMB->MaxDataCount = cpu_to_le16(1000); /* large enough */
1170 pSMB->MaxSetupCount = 0;
1174 pSMB->Reserved2 = 0;
1175 param_offset = offsetof(struct smb_com_transaction2_spi_req,
1176 InformationLevel) - 4;
1177 offset = param_offset + params;
1178 pdata = (OPEN_PSX_REQ *)(((char *)&pSMB->hdr.Protocol) + offset);
1179 pdata->Level = cpu_to_le16(SMB_QUERY_FILE_UNIX_BASIC);
1180 pdata->Permissions = cpu_to_le64(mode);
1181 pdata->PosixOpenFlags = cpu_to_le32(posix_flags);
1182 pdata->OpenFlags = cpu_to_le32(*pOplock);
1183 pSMB->ParameterOffset = cpu_to_le16(param_offset);
1184 pSMB->DataOffset = cpu_to_le16(offset);
1185 pSMB->SetupCount = 1;
1186 pSMB->Reserved3 = 0;
1187 pSMB->SubCommand = cpu_to_le16(TRANS2_SET_PATH_INFORMATION);
1188 byte_count = 3 /* pad */ + params + count;
1190 pSMB->DataCount = cpu_to_le16(count);
1191 pSMB->ParameterCount = cpu_to_le16(params);
1192 pSMB->TotalDataCount = pSMB->DataCount;
1193 pSMB->TotalParameterCount = pSMB->ParameterCount;
1194 pSMB->InformationLevel = cpu_to_le16(SMB_POSIX_OPEN);
1195 pSMB->Reserved4 = 0;
1196 inc_rfc1001_len(pSMB, byte_count);
1197 pSMB->ByteCount = cpu_to_le16(byte_count);
1198 rc = SendReceive(xid, tcon->ses, (struct smb_hdr *) pSMB,
1199 (struct smb_hdr *) pSMBr, &bytes_returned, 0);
1201 cifs_dbg(FYI, "Posix create returned %d\n", rc);
1202 goto psx_create_err;
1205 cifs_dbg(FYI, "copying inode info\n");
1206 rc = validate_t2((struct smb_t2_rsp *)pSMBr);
1208 if (rc || get_bcc(&pSMBr->hdr) < sizeof(OPEN_PSX_RSP)) {
1209 rc = -EIO; /* bad smb */
1210 goto psx_create_err;
1213 /* copy return information to pRetData */
1214 psx_rsp = (OPEN_PSX_RSP *)((char *) &pSMBr->hdr.Protocol
1215 + le16_to_cpu(pSMBr->t2.DataOffset));
1217 *pOplock = le16_to_cpu(psx_rsp->OplockFlags);
1219 *netfid = psx_rsp->Fid; /* cifs fid stays in le */
1220 /* Let caller know file was created so we can set the mode. */
1221 /* Do we care about the CreateAction in any other cases? */
1222 if (cpu_to_le32(FILE_CREATE) == psx_rsp->CreateAction)
1223 *pOplock |= CIFS_CREATE_ACTION;
1224 /* check to make sure response data is there */
1225 if (psx_rsp->ReturnedLevel != cpu_to_le16(SMB_QUERY_FILE_UNIX_BASIC)) {
1226 pRetData->Type = cpu_to_le32(-1); /* unknown */
1227 cifs_dbg(NOISY, "unknown type\n");
1229 if (get_bcc(&pSMBr->hdr) < sizeof(OPEN_PSX_RSP)
1230 + sizeof(FILE_UNIX_BASIC_INFO)) {
1231 cifs_dbg(VFS, "Open response data too small\n");
1232 pRetData->Type = cpu_to_le32(-1);
1233 goto psx_create_err;
1235 memcpy((char *) pRetData,
1236 (char *)psx_rsp + sizeof(OPEN_PSX_RSP),
1237 sizeof(FILE_UNIX_BASIC_INFO));
1241 cifs_buf_release(pSMB);
1243 if (posix_flags & SMB_O_DIRECTORY)
1244 cifs_stats_inc(&tcon->stats.cifs_stats.num_posixmkdirs);
1246 cifs_stats_inc(&tcon->stats.cifs_stats.num_posixopens);
1254 static __u16 convert_disposition(int disposition)
1258 switch (disposition) {
1259 case FILE_SUPERSEDE:
1260 ofun = SMBOPEN_OCREATE | SMBOPEN_OTRUNC;
1263 ofun = SMBOPEN_OAPPEND;
1266 ofun = SMBOPEN_OCREATE;
1269 ofun = SMBOPEN_OCREATE | SMBOPEN_OAPPEND;
1271 case FILE_OVERWRITE:
1272 ofun = SMBOPEN_OTRUNC;
1274 case FILE_OVERWRITE_IF:
1275 ofun = SMBOPEN_OCREATE | SMBOPEN_OTRUNC;
1278 cifs_dbg(FYI, "unknown disposition %d\n", disposition);
1279 ofun = SMBOPEN_OAPPEND; /* regular open */
1285 access_flags_to_smbopen_mode(const int access_flags)
1287 int masked_flags = access_flags & (GENERIC_READ | GENERIC_WRITE);
1289 if (masked_flags == GENERIC_READ)
1290 return SMBOPEN_READ;
1291 else if (masked_flags == GENERIC_WRITE)
1292 return SMBOPEN_WRITE;
1294 /* just go for read/write */
1295 return SMBOPEN_READWRITE;
1299 SMBLegacyOpen(const unsigned int xid, struct cifs_tcon *tcon,
1300 const char *fileName, const int openDisposition,
1301 const int access_flags, const int create_options, __u16 *netfid,
1302 int *pOplock, FILE_ALL_INFO *pfile_info,
1303 const struct nls_table *nls_codepage, int remap)
1306 OPENX_REQ *pSMB = NULL;
1307 OPENX_RSP *pSMBr = NULL;
1313 rc = smb_init(SMB_COM_OPEN_ANDX, 15, tcon, (void **) &pSMB,
1318 pSMB->AndXCommand = 0xFF; /* none */
1320 if (pSMB->hdr.Flags2 & SMBFLG2_UNICODE) {
1321 count = 1; /* account for one byte pad to word boundary */
1323 cifsConvertToUTF16((__le16 *) (pSMB->fileName + 1),
1324 fileName, PATH_MAX, nls_codepage, remap);
1325 name_len++; /* trailing null */
1327 } else { /* BB improve check for buffer overruns BB */
1328 count = 0; /* no pad */
1329 name_len = strnlen(fileName, PATH_MAX);
1330 name_len++; /* trailing null */
1331 strncpy(pSMB->fileName, fileName, name_len);
1333 if (*pOplock & REQ_OPLOCK)
1334 pSMB->OpenFlags = cpu_to_le16(REQ_OPLOCK);
1335 else if (*pOplock & REQ_BATCHOPLOCK)
1336 pSMB->OpenFlags = cpu_to_le16(REQ_BATCHOPLOCK);
1338 pSMB->OpenFlags |= cpu_to_le16(REQ_MORE_INFO);
1339 pSMB->Mode = cpu_to_le16(access_flags_to_smbopen_mode(access_flags));
1340 pSMB->Mode |= cpu_to_le16(0x40); /* deny none */
1341 /* set file as system file if special file such
1342 as fifo and server expecting SFU style and
1343 no Unix extensions */
1345 if (create_options & CREATE_OPTION_SPECIAL)
1346 pSMB->FileAttributes = cpu_to_le16(ATTR_SYSTEM);
1347 else /* BB FIXME BB */
1348 pSMB->FileAttributes = cpu_to_le16(0/*ATTR_NORMAL*/);
1350 if (create_options & CREATE_OPTION_READONLY)
1351 pSMB->FileAttributes |= cpu_to_le16(ATTR_READONLY);
1354 /* pSMB->CreateOptions = cpu_to_le32(create_options &
1355 CREATE_OPTIONS_MASK); */
1356 /* BB FIXME END BB */
1358 pSMB->Sattr = cpu_to_le16(ATTR_HIDDEN | ATTR_SYSTEM | ATTR_DIRECTORY);
1359 pSMB->OpenFunction = cpu_to_le16(convert_disposition(openDisposition));
1361 inc_rfc1001_len(pSMB, count);
1363 pSMB->ByteCount = cpu_to_le16(count);
1364 rc = SendReceive(xid, tcon->ses, (struct smb_hdr *) pSMB,
1365 (struct smb_hdr *)pSMBr, &bytes_returned, 0);
1366 cifs_stats_inc(&tcon->stats.cifs_stats.num_opens);
1368 cifs_dbg(FYI, "Error in Open = %d\n", rc);
1370 /* BB verify if wct == 15 */
1372 /* *pOplock = pSMBr->OplockLevel; */ /* BB take from action field*/
1374 *netfid = pSMBr->Fid; /* cifs fid stays in le */
1375 /* Let caller know file was created so we can set the mode. */
1376 /* Do we care about the CreateAction in any other cases? */
1378 /* if (cpu_to_le32(FILE_CREATE) == pSMBr->CreateAction)
1379 *pOplock |= CIFS_CREATE_ACTION; */
1383 pfile_info->CreationTime = 0; /* BB convert CreateTime*/
1384 pfile_info->LastAccessTime = 0; /* BB fixme */
1385 pfile_info->LastWriteTime = 0; /* BB fixme */
1386 pfile_info->ChangeTime = 0; /* BB fixme */
1387 pfile_info->Attributes =
1388 cpu_to_le32(le16_to_cpu(pSMBr->FileAttributes));
1389 /* the file_info buf is endian converted by caller */
1390 pfile_info->AllocationSize =
1391 cpu_to_le64(le32_to_cpu(pSMBr->EndOfFile));
1392 pfile_info->EndOfFile = pfile_info->AllocationSize;
1393 pfile_info->NumberOfLinks = cpu_to_le32(1);
1394 pfile_info->DeletePending = 0;
1398 cifs_buf_release(pSMB);
1405 CIFS_open(const unsigned int xid, struct cifs_open_parms *oparms, int *oplock,
1409 OPEN_REQ *req = NULL;
1410 OPEN_RSP *rsp = NULL;
1414 struct cifs_sb_info *cifs_sb = oparms->cifs_sb;
1415 struct cifs_tcon *tcon = oparms->tcon;
1416 int remap = cifs_remap(cifs_sb);
1417 const struct nls_table *nls = cifs_sb->local_nls;
1418 int create_options = oparms->create_options;
1419 int desired_access = oparms->desired_access;
1420 int disposition = oparms->disposition;
1421 const char *path = oparms->path;
1424 rc = smb_init(SMB_COM_NT_CREATE_ANDX, 24, tcon, (void **)&req,
1429 /* no commands go after this */
1430 req->AndXCommand = 0xFF;
1432 if (req->hdr.Flags2 & SMBFLG2_UNICODE) {
1433 /* account for one byte pad to word boundary */
1435 name_len = cifsConvertToUTF16((__le16 *)(req->fileName + 1),
1436 path, PATH_MAX, nls, remap);
1440 req->NameLength = cpu_to_le16(name_len);
1442 /* BB improve check for buffer overruns BB */
1445 name_len = strnlen(path, PATH_MAX);
1448 req->NameLength = cpu_to_le16(name_len);
1449 strncpy(req->fileName, path, name_len);
1452 if (*oplock & REQ_OPLOCK)
1453 req->OpenFlags = cpu_to_le32(REQ_OPLOCK);
1454 else if (*oplock & REQ_BATCHOPLOCK)
1455 req->OpenFlags = cpu_to_le32(REQ_BATCHOPLOCK);
1457 req->DesiredAccess = cpu_to_le32(desired_access);
1458 req->AllocationSize = 0;
1461 * Set file as system file if special file such as fifo and server
1462 * expecting SFU style and no Unix extensions.
1464 if (create_options & CREATE_OPTION_SPECIAL)
1465 req->FileAttributes = cpu_to_le32(ATTR_SYSTEM);
1467 req->FileAttributes = cpu_to_le32(ATTR_NORMAL);
1470 * XP does not handle ATTR_POSIX_SEMANTICS but it helps speed up case
1471 * sensitive checks for other servers such as Samba.
1473 if (tcon->ses->capabilities & CAP_UNIX)
1474 req->FileAttributes |= cpu_to_le32(ATTR_POSIX_SEMANTICS);
1476 if (create_options & CREATE_OPTION_READONLY)
1477 req->FileAttributes |= cpu_to_le32(ATTR_READONLY);
1479 req->ShareAccess = cpu_to_le32(FILE_SHARE_ALL);
1480 req->CreateDisposition = cpu_to_le32(disposition);
1481 req->CreateOptions = cpu_to_le32(create_options & CREATE_OPTIONS_MASK);
1483 /* BB Expirement with various impersonation levels and verify */
1484 req->ImpersonationLevel = cpu_to_le32(SECURITY_IMPERSONATION);
1485 req->SecurityFlags = SECURITY_CONTEXT_TRACKING|SECURITY_EFFECTIVE_ONLY;
1488 inc_rfc1001_len(req, count);
1490 req->ByteCount = cpu_to_le16(count);
1491 rc = SendReceive(xid, tcon->ses, (struct smb_hdr *)req,
1492 (struct smb_hdr *)rsp, &bytes_returned, 0);
1493 cifs_stats_inc(&tcon->stats.cifs_stats.num_opens);
1495 cifs_dbg(FYI, "Error in Open = %d\n", rc);
1496 cifs_buf_release(req);
1502 /* 1 byte no need to le_to_cpu */
1503 *oplock = rsp->OplockLevel;
1504 /* cifs fid stays in le */
1505 oparms->fid->netfid = rsp->Fid;
1507 /* Let caller know file was created so we can set the mode. */
1508 /* Do we care about the CreateAction in any other cases? */
1509 if (cpu_to_le32(FILE_CREATE) == rsp->CreateAction)
1510 *oplock |= CIFS_CREATE_ACTION;
1513 /* copy from CreationTime to Attributes */
1514 memcpy((char *)buf, (char *)&rsp->CreationTime, 36);
1515 /* the file_info buf is endian converted by caller */
1516 buf->AllocationSize = rsp->AllocationSize;
1517 buf->EndOfFile = rsp->EndOfFile;
1518 buf->NumberOfLinks = cpu_to_le32(1);
1519 buf->DeletePending = 0;
1522 cifs_buf_release(req);
1527 * Discard any remaining data in the current SMB. To do this, we borrow the
1531 cifs_discard_remaining_data(struct TCP_Server_Info *server)
1533 unsigned int rfclen = server->pdu_size;
1534 int remaining = rfclen + server->vals->header_preamble_size -
1537 while (remaining > 0) {
1540 length = cifs_read_from_socket(server, server->bigbuf,
1541 min_t(unsigned int, remaining,
1542 CIFSMaxBufSize + MAX_HEADER_SIZE(server)));
1545 server->total_read += length;
1546 remaining -= length;
1553 __cifs_readv_discard(struct TCP_Server_Info *server, struct mid_q_entry *mid,
1558 length = cifs_discard_remaining_data(server);
1559 dequeue_mid(mid, malformed);
1560 mid->resp_buf = server->smallbuf;
1561 server->smallbuf = NULL;
1566 cifs_readv_discard(struct TCP_Server_Info *server, struct mid_q_entry *mid)
1568 struct cifs_readdata *rdata = mid->callback_data;
1570 return __cifs_readv_discard(server, mid, rdata->result);
1574 cifs_readv_receive(struct TCP_Server_Info *server, struct mid_q_entry *mid)
1577 unsigned int data_offset, data_len;
1578 struct cifs_readdata *rdata = mid->callback_data;
1579 char *buf = server->smallbuf;
1580 unsigned int buflen = server->pdu_size +
1581 server->vals->header_preamble_size;
1582 bool use_rdma_mr = false;
1584 cifs_dbg(FYI, "%s: mid=%llu offset=%llu bytes=%u\n",
1585 __func__, mid->mid, rdata->offset, rdata->bytes);
1588 * read the rest of READ_RSP header (sans Data array), or whatever we
1589 * can if there's not enough data. At this point, we've read down to
1592 len = min_t(unsigned int, buflen, server->vals->read_rsp_size) -
1593 HEADER_SIZE(server) + 1;
1595 length = cifs_read_from_socket(server,
1596 buf + HEADER_SIZE(server) - 1, len);
1599 server->total_read += length;
1601 if (server->ops->is_session_expired &&
1602 server->ops->is_session_expired(buf)) {
1603 cifs_reconnect(server);
1604 wake_up(&server->response_q);
1608 if (server->ops->is_status_pending &&
1609 server->ops->is_status_pending(buf, server)) {
1610 cifs_discard_remaining_data(server);
1614 /* set up first two iov for signature check and to get credits */
1615 rdata->iov[0].iov_base = buf;
1616 rdata->iov[0].iov_len = server->vals->header_preamble_size;
1617 rdata->iov[1].iov_base = buf + server->vals->header_preamble_size;
1618 rdata->iov[1].iov_len =
1619 server->total_read - server->vals->header_preamble_size;
1620 cifs_dbg(FYI, "0: iov_base=%p iov_len=%zu\n",
1621 rdata->iov[0].iov_base, rdata->iov[0].iov_len);
1622 cifs_dbg(FYI, "1: iov_base=%p iov_len=%zu\n",
1623 rdata->iov[1].iov_base, rdata->iov[1].iov_len);
1625 /* Was the SMB read successful? */
1626 rdata->result = server->ops->map_error(buf, false);
1627 if (rdata->result != 0) {
1628 cifs_dbg(FYI, "%s: server returned error %d\n",
1629 __func__, rdata->result);
1630 /* normal error on read response */
1631 return __cifs_readv_discard(server, mid, false);
1634 /* Is there enough to get to the rest of the READ_RSP header? */
1635 if (server->total_read < server->vals->read_rsp_size) {
1636 cifs_dbg(FYI, "%s: server returned short header. got=%u expected=%zu\n",
1637 __func__, server->total_read,
1638 server->vals->read_rsp_size);
1639 rdata->result = -EIO;
1640 return cifs_readv_discard(server, mid);
1643 data_offset = server->ops->read_data_offset(buf) +
1644 server->vals->header_preamble_size;
1645 if (data_offset < server->total_read) {
1647 * win2k8 sometimes sends an offset of 0 when the read
1648 * is beyond the EOF. Treat it as if the data starts just after
1651 cifs_dbg(FYI, "%s: data offset (%u) inside read response header\n",
1652 __func__, data_offset);
1653 data_offset = server->total_read;
1654 } else if (data_offset > MAX_CIFS_SMALL_BUFFER_SIZE) {
1655 /* data_offset is beyond the end of smallbuf */
1656 cifs_dbg(FYI, "%s: data offset (%u) beyond end of smallbuf\n",
1657 __func__, data_offset);
1658 rdata->result = -EIO;
1659 return cifs_readv_discard(server, mid);
1662 cifs_dbg(FYI, "%s: total_read=%u data_offset=%u\n",
1663 __func__, server->total_read, data_offset);
1665 len = data_offset - server->total_read;
1667 /* read any junk before data into the rest of smallbuf */
1668 length = cifs_read_from_socket(server,
1669 buf + server->total_read, len);
1672 server->total_read += length;
1675 /* how much data is in the response? */
1676 #ifdef CONFIG_CIFS_SMB_DIRECT
1677 use_rdma_mr = rdata->mr;
1679 data_len = server->ops->read_data_length(buf, use_rdma_mr);
1680 if (!use_rdma_mr && (data_offset + data_len > buflen)) {
1681 /* data_len is corrupt -- discard frame */
1682 rdata->result = -EIO;
1683 return cifs_readv_discard(server, mid);
1686 length = rdata->read_into_pages(server, rdata, data_len);
1690 server->total_read += length;
1692 cifs_dbg(FYI, "total_read=%u buflen=%u remaining=%u\n",
1693 server->total_read, buflen, data_len);
1695 /* discard anything left over */
1696 if (server->total_read < buflen)
1697 return cifs_readv_discard(server, mid);
1699 dequeue_mid(mid, false);
1700 mid->resp_buf = server->smallbuf;
1701 server->smallbuf = NULL;
1706 cifs_readv_callback(struct mid_q_entry *mid)
1708 struct cifs_readdata *rdata = mid->callback_data;
1709 struct cifs_tcon *tcon = tlink_tcon(rdata->cfile->tlink);
1710 struct TCP_Server_Info *server = tcon->ses->server;
1711 struct smb_rqst rqst = { .rq_iov = rdata->iov,
1713 .rq_pages = rdata->pages,
1714 .rq_offset = rdata->page_offset,
1715 .rq_npages = rdata->nr_pages,
1716 .rq_pagesz = rdata->pagesz,
1717 .rq_tailsz = rdata->tailsz };
1718 struct cifs_credits credits = { .value = 1, .instance = 0 };
1720 cifs_dbg(FYI, "%s: mid=%llu state=%d result=%d bytes=%u\n",
1721 __func__, mid->mid, mid->mid_state, rdata->result,
1724 switch (mid->mid_state) {
1725 case MID_RESPONSE_RECEIVED:
1726 /* result already set, check signature */
1730 rc = cifs_verify_signature(&rqst, server,
1731 mid->sequence_number);
1733 cifs_dbg(VFS, "SMB signature verification returned error = %d\n",
1736 /* FIXME: should this be counted toward the initiating task? */
1737 task_io_account_read(rdata->got_bytes);
1738 cifs_stats_bytes_read(tcon, rdata->got_bytes);
1740 case MID_REQUEST_SUBMITTED:
1741 case MID_RETRY_NEEDED:
1742 rdata->result = -EAGAIN;
1743 if (server->sign && rdata->got_bytes)
1744 /* reset bytes number since we can not check a sign */
1745 rdata->got_bytes = 0;
1746 /* FIXME: should this be counted toward the initiating task? */
1747 task_io_account_read(rdata->got_bytes);
1748 cifs_stats_bytes_read(tcon, rdata->got_bytes);
1751 rdata->result = -EIO;
1754 queue_work(cifsiod_wq, &rdata->work);
1755 DeleteMidQEntry(mid);
1756 add_credits(server, &credits, 0);
1759 /* cifs_async_readv - send an async write, and set up mid to handle result */
1761 cifs_async_readv(struct cifs_readdata *rdata)
1764 READ_REQ *smb = NULL;
1766 struct cifs_tcon *tcon = tlink_tcon(rdata->cfile->tlink);
1767 struct smb_rqst rqst = { .rq_iov = rdata->iov,
1770 cifs_dbg(FYI, "%s: offset=%llu bytes=%u\n",
1771 __func__, rdata->offset, rdata->bytes);
1773 if (tcon->ses->capabilities & CAP_LARGE_FILES)
1776 wct = 10; /* old style read */
1777 if ((rdata->offset >> 32) > 0) {
1778 /* can not handle this big offset for old */
1783 rc = small_smb_init(SMB_COM_READ_ANDX, wct, tcon, (void **)&smb);
1787 smb->hdr.Pid = cpu_to_le16((__u16)rdata->pid);
1788 smb->hdr.PidHigh = cpu_to_le16((__u16)(rdata->pid >> 16));
1790 smb->AndXCommand = 0xFF; /* none */
1791 smb->Fid = rdata->cfile->fid.netfid;
1792 smb->OffsetLow = cpu_to_le32(rdata->offset & 0xFFFFFFFF);
1794 smb->OffsetHigh = cpu_to_le32(rdata->offset >> 32);
1796 smb->MaxCount = cpu_to_le16(rdata->bytes & 0xFFFF);
1797 smb->MaxCountHigh = cpu_to_le32(rdata->bytes >> 16);
1801 /* old style read */
1802 struct smb_com_readx_req *smbr =
1803 (struct smb_com_readx_req *)smb;
1804 smbr->ByteCount = 0;
1807 /* 4 for RFC1001 length + 1 for BCC */
1808 rdata->iov[0].iov_base = smb;
1809 rdata->iov[0].iov_len = 4;
1810 rdata->iov[1].iov_base = (char *)smb + 4;
1811 rdata->iov[1].iov_len = get_rfc1002_length(smb);
1813 kref_get(&rdata->refcount);
1814 rc = cifs_call_async(tcon->ses->server, &rqst, cifs_readv_receive,
1815 cifs_readv_callback, NULL, rdata, 0, NULL);
1818 cifs_stats_inc(&tcon->stats.cifs_stats.num_reads);
1820 kref_put(&rdata->refcount, cifs_readdata_release);
1822 cifs_small_buf_release(smb);
1827 CIFSSMBRead(const unsigned int xid, struct cifs_io_parms *io_parms,
1828 unsigned int *nbytes, char **buf, int *pbuf_type)
1831 READ_REQ *pSMB = NULL;
1832 READ_RSP *pSMBr = NULL;
1833 char *pReadData = NULL;
1835 int resp_buf_type = 0;
1837 struct kvec rsp_iov;
1838 __u32 pid = io_parms->pid;
1839 __u16 netfid = io_parms->netfid;
1840 __u64 offset = io_parms->offset;
1841 struct cifs_tcon *tcon = io_parms->tcon;
1842 unsigned int count = io_parms->length;
1844 cifs_dbg(FYI, "Reading %d bytes on fid %d\n", count, netfid);
1845 if (tcon->ses->capabilities & CAP_LARGE_FILES)
1848 wct = 10; /* old style read */
1849 if ((offset >> 32) > 0) {
1850 /* can not handle this big offset for old */
1856 rc = small_smb_init(SMB_COM_READ_ANDX, wct, tcon, (void **) &pSMB);
1860 pSMB->hdr.Pid = cpu_to_le16((__u16)pid);
1861 pSMB->hdr.PidHigh = cpu_to_le16((__u16)(pid >> 16));
1863 /* tcon and ses pointer are checked in smb_init */
1864 if (tcon->ses->server == NULL)
1865 return -ECONNABORTED;
1867 pSMB->AndXCommand = 0xFF; /* none */
1869 pSMB->OffsetLow = cpu_to_le32(offset & 0xFFFFFFFF);
1871 pSMB->OffsetHigh = cpu_to_le32(offset >> 32);
1873 pSMB->Remaining = 0;
1874 pSMB->MaxCount = cpu_to_le16(count & 0xFFFF);
1875 pSMB->MaxCountHigh = cpu_to_le32(count >> 16);
1877 pSMB->ByteCount = 0; /* no need to do le conversion since 0 */
1879 /* old style read */
1880 struct smb_com_readx_req *pSMBW =
1881 (struct smb_com_readx_req *)pSMB;
1882 pSMBW->ByteCount = 0;
1885 iov[0].iov_base = (char *)pSMB;
1886 iov[0].iov_len = be32_to_cpu(pSMB->hdr.smb_buf_length) + 4;
1887 rc = SendReceive2(xid, tcon->ses, iov, 1, &resp_buf_type,
1888 CIFS_LOG_ERROR, &rsp_iov);
1889 cifs_small_buf_release(pSMB);
1890 cifs_stats_inc(&tcon->stats.cifs_stats.num_reads);
1891 pSMBr = (READ_RSP *)rsp_iov.iov_base;
1893 cifs_dbg(VFS, "Send error in read = %d\n", rc);
1895 int data_length = le16_to_cpu(pSMBr->DataLengthHigh);
1896 data_length = data_length << 16;
1897 data_length += le16_to_cpu(pSMBr->DataLength);
1898 *nbytes = data_length;
1900 /*check that DataLength would not go beyond end of SMB */
1901 if ((data_length > CIFSMaxBufSize)
1902 || (data_length > count)) {
1903 cifs_dbg(FYI, "bad length %d for count %d\n",
1904 data_length, count);
1908 pReadData = (char *) (&pSMBr->hdr.Protocol) +
1909 le16_to_cpu(pSMBr->DataOffset);
1910 /* if (rc = copy_to_user(buf, pReadData, data_length)) {
1911 cifs_dbg(VFS, "Faulting on read rc = %d\n",rc);
1913 }*/ /* can not use copy_to_user when using page cache*/
1915 memcpy(*buf, pReadData, data_length);
1920 free_rsp_buf(resp_buf_type, rsp_iov.iov_base);
1921 } else if (resp_buf_type != CIFS_NO_BUFFER) {
1922 /* return buffer to caller to free */
1923 *buf = rsp_iov.iov_base;
1924 if (resp_buf_type == CIFS_SMALL_BUFFER)
1925 *pbuf_type = CIFS_SMALL_BUFFER;
1926 else if (resp_buf_type == CIFS_LARGE_BUFFER)
1927 *pbuf_type = CIFS_LARGE_BUFFER;
1928 } /* else no valid buffer on return - leave as null */
1930 /* Note: On -EAGAIN error only caller can retry on handle based calls
1931 since file handle passed in no longer valid */
1937 CIFSSMBWrite(const unsigned int xid, struct cifs_io_parms *io_parms,
1938 unsigned int *nbytes, const char *buf)
1941 WRITE_REQ *pSMB = NULL;
1942 WRITE_RSP *pSMBr = NULL;
1943 int bytes_returned, wct;
1946 __u32 pid = io_parms->pid;
1947 __u16 netfid = io_parms->netfid;
1948 __u64 offset = io_parms->offset;
1949 struct cifs_tcon *tcon = io_parms->tcon;
1950 unsigned int count = io_parms->length;
1954 /* cifs_dbg(FYI, "write at %lld %d bytes\n", offset, count);*/
1955 if (tcon->ses == NULL)
1956 return -ECONNABORTED;
1958 if (tcon->ses->capabilities & CAP_LARGE_FILES)
1962 if ((offset >> 32) > 0) {
1963 /* can not handle big offset for old srv */
1968 rc = smb_init(SMB_COM_WRITE_ANDX, wct, tcon, (void **) &pSMB,
1973 pSMB->hdr.Pid = cpu_to_le16((__u16)pid);
1974 pSMB->hdr.PidHigh = cpu_to_le16((__u16)(pid >> 16));
1976 /* tcon and ses pointer are checked in smb_init */
1977 if (tcon->ses->server == NULL)
1978 return -ECONNABORTED;
1980 pSMB->AndXCommand = 0xFF; /* none */
1982 pSMB->OffsetLow = cpu_to_le32(offset & 0xFFFFFFFF);
1984 pSMB->OffsetHigh = cpu_to_le32(offset >> 32);
1986 pSMB->Reserved = 0xFFFFFFFF;
1987 pSMB->WriteMode = 0;
1988 pSMB->Remaining = 0;
1990 /* Can increase buffer size if buffer is big enough in some cases ie we
1991 can send more if LARGE_WRITE_X capability returned by the server and if
1992 our buffer is big enough or if we convert to iovecs on socket writes
1993 and eliminate the copy to the CIFS buffer */
1994 if (tcon->ses->capabilities & CAP_LARGE_WRITE_X) {
1995 bytes_sent = min_t(const unsigned int, CIFSMaxBufSize, count);
1997 bytes_sent = (tcon->ses->server->maxBuf - MAX_CIFS_HDR_SIZE)
2001 if (bytes_sent > count)
2004 cpu_to_le16(offsetof(struct smb_com_write_req, Data) - 4);
2006 memcpy(pSMB->Data, buf, bytes_sent);
2007 else if (count != 0) {
2009 cifs_buf_release(pSMB);
2011 } /* else setting file size with write of zero bytes */
2013 byte_count = bytes_sent + 1; /* pad */
2014 else /* wct == 12 */
2015 byte_count = bytes_sent + 5; /* bigger pad, smaller smb hdr */
2017 pSMB->DataLengthLow = cpu_to_le16(bytes_sent & 0xFFFF);
2018 pSMB->DataLengthHigh = cpu_to_le16(bytes_sent >> 16);
2019 inc_rfc1001_len(pSMB, byte_count);
2022 pSMB->ByteCount = cpu_to_le16(byte_count);
2023 else { /* old style write has byte count 4 bytes earlier
2025 struct smb_com_writex_req *pSMBW =
2026 (struct smb_com_writex_req *)pSMB;
2027 pSMBW->ByteCount = cpu_to_le16(byte_count);
2030 rc = SendReceive(xid, tcon->ses, (struct smb_hdr *) pSMB,
2031 (struct smb_hdr *) pSMBr, &bytes_returned, 0);
2032 cifs_stats_inc(&tcon->stats.cifs_stats.num_writes);
2034 cifs_dbg(FYI, "Send error in write = %d\n", rc);
2036 *nbytes = le16_to_cpu(pSMBr->CountHigh);
2037 *nbytes = (*nbytes) << 16;
2038 *nbytes += le16_to_cpu(pSMBr->Count);
2041 * Mask off high 16 bits when bytes written as returned by the
2042 * server is greater than bytes requested by the client. Some
2043 * OS/2 servers are known to set incorrect CountHigh values.
2045 if (*nbytes > count)
2049 cifs_buf_release(pSMB);
2051 /* Note: On -EAGAIN error only caller can retry on handle based calls
2052 since file handle passed in no longer valid */
2058 cifs_writedata_release(struct kref *refcount)
2060 struct cifs_writedata *wdata = container_of(refcount,
2061 struct cifs_writedata, refcount);
2062 #ifdef CONFIG_CIFS_SMB_DIRECT
2064 smbd_deregister_mr(wdata->mr);
2070 cifsFileInfo_put(wdata->cfile);
2072 kvfree(wdata->pages);
2077 * Write failed with a retryable error. Resend the write request. It's also
2078 * possible that the page was redirtied so re-clean the page.
2081 cifs_writev_requeue(struct cifs_writedata *wdata)
2084 struct inode *inode = d_inode(wdata->cfile->dentry);
2085 struct TCP_Server_Info *server;
2086 unsigned int rest_len;
2088 server = tlink_tcon(wdata->cfile->tlink)->ses->server;
2090 rest_len = wdata->bytes;
2092 struct cifs_writedata *wdata2;
2093 unsigned int j, nr_pages, wsize, tailsz, cur_len;
2095 wsize = server->ops->wp_retry_size(inode);
2096 if (wsize < rest_len) {
2097 nr_pages = wsize / PAGE_SIZE;
2102 cur_len = nr_pages * PAGE_SIZE;
2105 nr_pages = DIV_ROUND_UP(rest_len, PAGE_SIZE);
2107 tailsz = rest_len - (nr_pages - 1) * PAGE_SIZE;
2110 wdata2 = cifs_writedata_alloc(nr_pages, cifs_writev_complete);
2116 for (j = 0; j < nr_pages; j++) {
2117 wdata2->pages[j] = wdata->pages[i + j];
2118 lock_page(wdata2->pages[j]);
2119 clear_page_dirty_for_io(wdata2->pages[j]);
2122 wdata2->sync_mode = wdata->sync_mode;
2123 wdata2->nr_pages = nr_pages;
2124 wdata2->offset = page_offset(wdata2->pages[0]);
2125 wdata2->pagesz = PAGE_SIZE;
2126 wdata2->tailsz = tailsz;
2127 wdata2->bytes = cur_len;
2129 wdata2->cfile = find_writable_file(CIFS_I(inode), false);
2130 if (!wdata2->cfile) {
2131 cifs_dbg(VFS, "No writable handle to retry writepages\n");
2134 wdata2->pid = wdata2->cfile->pid;
2135 rc = server->ops->async_writev(wdata2,
2136 cifs_writedata_release);
2139 for (j = 0; j < nr_pages; j++) {
2140 unlock_page(wdata2->pages[j]);
2141 if (rc != 0 && !is_retryable_error(rc)) {
2142 SetPageError(wdata2->pages[j]);
2143 end_page_writeback(wdata2->pages[j]);
2144 put_page(wdata2->pages[j]);
2149 kref_put(&wdata2->refcount, cifs_writedata_release);
2150 if (is_retryable_error(rc))
2156 rest_len -= cur_len;
2158 } while (i < wdata->nr_pages);
2160 /* cleanup remaining pages from the original wdata */
2161 for (; i < wdata->nr_pages; i++) {
2162 SetPageError(wdata->pages[i]);
2163 end_page_writeback(wdata->pages[i]);
2164 put_page(wdata->pages[i]);
2167 if (rc != 0 && !is_retryable_error(rc))
2168 mapping_set_error(inode->i_mapping, rc);
2169 kref_put(&wdata->refcount, cifs_writedata_release);
2173 cifs_writev_complete(struct work_struct *work)
2175 struct cifs_writedata *wdata = container_of(work,
2176 struct cifs_writedata, work);
2177 struct inode *inode = d_inode(wdata->cfile->dentry);
2180 if (wdata->result == 0) {
2181 spin_lock(&inode->i_lock);
2182 cifs_update_eof(CIFS_I(inode), wdata->offset, wdata->bytes);
2183 spin_unlock(&inode->i_lock);
2184 cifs_stats_bytes_written(tlink_tcon(wdata->cfile->tlink),
2186 } else if (wdata->sync_mode == WB_SYNC_ALL && wdata->result == -EAGAIN)
2187 return cifs_writev_requeue(wdata);
2189 for (i = 0; i < wdata->nr_pages; i++) {
2190 struct page *page = wdata->pages[i];
2191 if (wdata->result == -EAGAIN)
2192 __set_page_dirty_nobuffers(page);
2193 else if (wdata->result < 0)
2195 end_page_writeback(page);
2198 if (wdata->result != -EAGAIN)
2199 mapping_set_error(inode->i_mapping, wdata->result);
2200 kref_put(&wdata->refcount, cifs_writedata_release);
2203 struct cifs_writedata *
2204 cifs_writedata_alloc(unsigned int nr_pages, work_func_t complete)
2206 struct page **pages =
2207 kcalloc(nr_pages, sizeof(struct page *), GFP_NOFS);
2209 return cifs_writedata_direct_alloc(pages, complete);
2214 struct cifs_writedata *
2215 cifs_writedata_direct_alloc(struct page **pages, work_func_t complete)
2217 struct cifs_writedata *wdata;
2219 wdata = kzalloc(sizeof(*wdata), GFP_NOFS);
2220 if (wdata != NULL) {
2221 wdata->pages = pages;
2222 kref_init(&wdata->refcount);
2223 INIT_LIST_HEAD(&wdata->list);
2224 init_completion(&wdata->done);
2225 INIT_WORK(&wdata->work, complete);
2231 * Check the mid_state and signature on received buffer (if any), and queue the
2232 * workqueue completion task.
2235 cifs_writev_callback(struct mid_q_entry *mid)
2237 struct cifs_writedata *wdata = mid->callback_data;
2238 struct cifs_tcon *tcon = tlink_tcon(wdata->cfile->tlink);
2239 unsigned int written;
2240 WRITE_RSP *smb = (WRITE_RSP *)mid->resp_buf;
2241 struct cifs_credits credits = { .value = 1, .instance = 0 };
2243 switch (mid->mid_state) {
2244 case MID_RESPONSE_RECEIVED:
2245 wdata->result = cifs_check_receive(mid, tcon->ses->server, 0);
2246 if (wdata->result != 0)
2249 written = le16_to_cpu(smb->CountHigh);
2251 written += le16_to_cpu(smb->Count);
2253 * Mask off high 16 bits when bytes written as returned
2254 * by the server is greater than bytes requested by the
2255 * client. OS/2 servers are known to set incorrect
2258 if (written > wdata->bytes)
2261 if (written < wdata->bytes)
2262 wdata->result = -ENOSPC;
2264 wdata->bytes = written;
2266 case MID_REQUEST_SUBMITTED:
2267 case MID_RETRY_NEEDED:
2268 wdata->result = -EAGAIN;
2271 wdata->result = -EIO;
2275 queue_work(cifsiod_wq, &wdata->work);
2276 DeleteMidQEntry(mid);
2277 add_credits(tcon->ses->server, &credits, 0);
2280 /* cifs_async_writev - send an async write, and set up mid to handle result */
2282 cifs_async_writev(struct cifs_writedata *wdata,
2283 void (*release)(struct kref *kref))
2286 WRITE_REQ *smb = NULL;
2288 struct cifs_tcon *tcon = tlink_tcon(wdata->cfile->tlink);
2290 struct smb_rqst rqst = { };
2292 if (tcon->ses->capabilities & CAP_LARGE_FILES) {
2296 if (wdata->offset >> 32 > 0) {
2297 /* can not handle big offset for old srv */
2302 rc = small_smb_init(SMB_COM_WRITE_ANDX, wct, tcon, (void **)&smb);
2304 goto async_writev_out;
2306 smb->hdr.Pid = cpu_to_le16((__u16)wdata->pid);
2307 smb->hdr.PidHigh = cpu_to_le16((__u16)(wdata->pid >> 16));
2309 smb->AndXCommand = 0xFF; /* none */
2310 smb->Fid = wdata->cfile->fid.netfid;
2311 smb->OffsetLow = cpu_to_le32(wdata->offset & 0xFFFFFFFF);
2313 smb->OffsetHigh = cpu_to_le32(wdata->offset >> 32);
2314 smb->Reserved = 0xFFFFFFFF;
2319 cpu_to_le16(offsetof(struct smb_com_write_req, Data) - 4);
2321 /* 4 for RFC1001 length + 1 for BCC */
2323 iov[0].iov_base = smb;
2324 iov[1].iov_len = get_rfc1002_length(smb) + 1;
2325 iov[1].iov_base = (char *)smb + 4;
2329 rqst.rq_pages = wdata->pages;
2330 rqst.rq_offset = wdata->page_offset;
2331 rqst.rq_npages = wdata->nr_pages;
2332 rqst.rq_pagesz = wdata->pagesz;
2333 rqst.rq_tailsz = wdata->tailsz;
2335 cifs_dbg(FYI, "async write at %llu %u bytes\n",
2336 wdata->offset, wdata->bytes);
2338 smb->DataLengthLow = cpu_to_le16(wdata->bytes & 0xFFFF);
2339 smb->DataLengthHigh = cpu_to_le16(wdata->bytes >> 16);
2342 inc_rfc1001_len(&smb->hdr, wdata->bytes + 1);
2343 put_bcc(wdata->bytes + 1, &smb->hdr);
2346 struct smb_com_writex_req *smbw =
2347 (struct smb_com_writex_req *)smb;
2348 inc_rfc1001_len(&smbw->hdr, wdata->bytes + 5);
2349 put_bcc(wdata->bytes + 5, &smbw->hdr);
2350 iov[1].iov_len += 4; /* pad bigger by four bytes */
2353 kref_get(&wdata->refcount);
2354 rc = cifs_call_async(tcon->ses->server, &rqst, NULL,
2355 cifs_writev_callback, NULL, wdata, 0, NULL);
2358 cifs_stats_inc(&tcon->stats.cifs_stats.num_writes);
2360 kref_put(&wdata->refcount, release);
2363 cifs_small_buf_release(smb);
2368 CIFSSMBWrite2(const unsigned int xid, struct cifs_io_parms *io_parms,
2369 unsigned int *nbytes, struct kvec *iov, int n_vec)
2372 WRITE_REQ *pSMB = NULL;
2375 int resp_buf_type = 0;
2376 __u32 pid = io_parms->pid;
2377 __u16 netfid = io_parms->netfid;
2378 __u64 offset = io_parms->offset;
2379 struct cifs_tcon *tcon = io_parms->tcon;
2380 unsigned int count = io_parms->length;
2381 struct kvec rsp_iov;
2385 cifs_dbg(FYI, "write2 at %lld %d bytes\n", (long long)offset, count);
2387 if (tcon->ses->capabilities & CAP_LARGE_FILES) {
2391 if ((offset >> 32) > 0) {
2392 /* can not handle big offset for old srv */
2396 rc = small_smb_init(SMB_COM_WRITE_ANDX, wct, tcon, (void **) &pSMB);
2400 pSMB->hdr.Pid = cpu_to_le16((__u16)pid);
2401 pSMB->hdr.PidHigh = cpu_to_le16((__u16)(pid >> 16));
2403 /* tcon and ses pointer are checked in smb_init */
2404 if (tcon->ses->server == NULL)
2405 return -ECONNABORTED;
2407 pSMB->AndXCommand = 0xFF; /* none */
2409 pSMB->OffsetLow = cpu_to_le32(offset & 0xFFFFFFFF);
2411 pSMB->OffsetHigh = cpu_to_le32(offset >> 32);
2412 pSMB->Reserved = 0xFFFFFFFF;
2413 pSMB->WriteMode = 0;
2414 pSMB->Remaining = 0;
2417 cpu_to_le16(offsetof(struct smb_com_write_req, Data) - 4);
2419 pSMB->DataLengthLow = cpu_to_le16(count & 0xFFFF);
2420 pSMB->DataLengthHigh = cpu_to_le16(count >> 16);
2421 /* header + 1 byte pad */
2422 smb_hdr_len = be32_to_cpu(pSMB->hdr.smb_buf_length) + 1;
2424 inc_rfc1001_len(pSMB, count + 1);
2425 else /* wct == 12 */
2426 inc_rfc1001_len(pSMB, count + 5); /* smb data starts later */
2428 pSMB->ByteCount = cpu_to_le16(count + 1);
2429 else /* wct == 12 */ /* bigger pad, smaller smb hdr, keep offset ok */ {
2430 struct smb_com_writex_req *pSMBW =
2431 (struct smb_com_writex_req *)pSMB;
2432 pSMBW->ByteCount = cpu_to_le16(count + 5);
2434 iov[0].iov_base = pSMB;
2436 iov[0].iov_len = smb_hdr_len + 4;
2437 else /* wct == 12 pad bigger by four bytes */
2438 iov[0].iov_len = smb_hdr_len + 8;
2440 rc = SendReceive2(xid, tcon->ses, iov, n_vec + 1, &resp_buf_type, 0,
2442 cifs_small_buf_release(pSMB);
2443 cifs_stats_inc(&tcon->stats.cifs_stats.num_writes);
2445 cifs_dbg(FYI, "Send error Write2 = %d\n", rc);
2446 } else if (resp_buf_type == 0) {
2447 /* presumably this can not happen, but best to be safe */
2450 WRITE_RSP *pSMBr = (WRITE_RSP *)rsp_iov.iov_base;
2451 *nbytes = le16_to_cpu(pSMBr->CountHigh);
2452 *nbytes = (*nbytes) << 16;
2453 *nbytes += le16_to_cpu(pSMBr->Count);
2456 * Mask off high 16 bits when bytes written as returned by the
2457 * server is greater than bytes requested by the client. OS/2
2458 * servers are known to set incorrect CountHigh values.
2460 if (*nbytes > count)
2464 free_rsp_buf(resp_buf_type, rsp_iov.iov_base);
2466 /* Note: On -EAGAIN error only caller can retry on handle based calls
2467 since file handle passed in no longer valid */
2472 int cifs_lockv(const unsigned int xid, struct cifs_tcon *tcon,
2473 const __u16 netfid, const __u8 lock_type, const __u32 num_unlock,
2474 const __u32 num_lock, LOCKING_ANDX_RANGE *buf)
2477 LOCK_REQ *pSMB = NULL;
2479 struct kvec rsp_iov;
2483 cifs_dbg(FYI, "cifs_lockv num lock %d num unlock %d\n",
2484 num_lock, num_unlock);
2486 rc = small_smb_init(SMB_COM_LOCKING_ANDX, 8, tcon, (void **) &pSMB);
2491 pSMB->NumberOfLocks = cpu_to_le16(num_lock);
2492 pSMB->NumberOfUnlocks = cpu_to_le16(num_unlock);
2493 pSMB->LockType = lock_type;
2494 pSMB->AndXCommand = 0xFF; /* none */
2495 pSMB->Fid = netfid; /* netfid stays le */
2497 count = (num_unlock + num_lock) * sizeof(LOCKING_ANDX_RANGE);
2498 inc_rfc1001_len(pSMB, count);
2499 pSMB->ByteCount = cpu_to_le16(count);
2501 iov[0].iov_base = (char *)pSMB;
2502 iov[0].iov_len = be32_to_cpu(pSMB->hdr.smb_buf_length) + 4 -
2503 (num_unlock + num_lock) * sizeof(LOCKING_ANDX_RANGE);
2504 iov[1].iov_base = (char *)buf;
2505 iov[1].iov_len = (num_unlock + num_lock) * sizeof(LOCKING_ANDX_RANGE);
2507 cifs_stats_inc(&tcon->stats.cifs_stats.num_locks);
2508 rc = SendReceive2(xid, tcon->ses, iov, 2, &resp_buf_type, CIFS_NO_RESP,
2510 cifs_small_buf_release(pSMB);
2512 cifs_dbg(FYI, "Send error in cifs_lockv = %d\n", rc);
2518 CIFSSMBLock(const unsigned int xid, struct cifs_tcon *tcon,
2519 const __u16 smb_file_id, const __u32 netpid, const __u64 len,
2520 const __u64 offset, const __u32 numUnlock,
2521 const __u32 numLock, const __u8 lockType,
2522 const bool waitFlag, const __u8 oplock_level)
2525 LOCK_REQ *pSMB = NULL;
2526 /* LOCK_RSP *pSMBr = NULL; */ /* No response data other than rc to parse */
2531 cifs_dbg(FYI, "CIFSSMBLock timeout %d numLock %d\n",
2532 (int)waitFlag, numLock);
2533 rc = small_smb_init(SMB_COM_LOCKING_ANDX, 8, tcon, (void **) &pSMB);
2538 if (lockType == LOCKING_ANDX_OPLOCK_RELEASE) {
2539 /* no response expected */
2540 flags = CIFS_ASYNC_OP | CIFS_OBREAK_OP;
2542 } else if (waitFlag) {
2543 flags = CIFS_BLOCKING_OP; /* blocking operation, no timeout */
2544 pSMB->Timeout = cpu_to_le32(-1);/* blocking - do not time out */
2549 pSMB->NumberOfLocks = cpu_to_le16(numLock);
2550 pSMB->NumberOfUnlocks = cpu_to_le16(numUnlock);
2551 pSMB->LockType = lockType;
2552 pSMB->OplockLevel = oplock_level;
2553 pSMB->AndXCommand = 0xFF; /* none */
2554 pSMB->Fid = smb_file_id; /* netfid stays le */
2556 if ((numLock != 0) || (numUnlock != 0)) {
2557 pSMB->Locks[0].Pid = cpu_to_le16(netpid);
2558 /* BB where to store pid high? */
2559 pSMB->Locks[0].LengthLow = cpu_to_le32((u32)len);
2560 pSMB->Locks[0].LengthHigh = cpu_to_le32((u32)(len>>32));
2561 pSMB->Locks[0].OffsetLow = cpu_to_le32((u32)offset);
2562 pSMB->Locks[0].OffsetHigh = cpu_to_le32((u32)(offset>>32));
2563 count = sizeof(LOCKING_ANDX_RANGE);
2568 inc_rfc1001_len(pSMB, count);
2569 pSMB->ByteCount = cpu_to_le16(count);
2572 rc = SendReceiveBlockingLock(xid, tcon, (struct smb_hdr *) pSMB,
2573 (struct smb_hdr *) pSMB, &bytes_returned);
2575 rc = SendReceiveNoRsp(xid, tcon->ses, (char *)pSMB, flags);
2576 cifs_small_buf_release(pSMB);
2577 cifs_stats_inc(&tcon->stats.cifs_stats.num_locks);
2579 cifs_dbg(FYI, "Send error in Lock = %d\n", rc);
2581 /* Note: On -EAGAIN error only caller can retry on handle based calls
2582 since file handle passed in no longer valid */
2587 CIFSSMBPosixLock(const unsigned int xid, struct cifs_tcon *tcon,
2588 const __u16 smb_file_id, const __u32 netpid,
2589 const loff_t start_offset, const __u64 len,
2590 struct file_lock *pLockData, const __u16 lock_type,
2591 const bool waitFlag)
2593 struct smb_com_transaction2_sfi_req *pSMB = NULL;
2594 struct smb_com_transaction2_sfi_rsp *pSMBr = NULL;
2595 struct cifs_posix_lock *parm_data;
2598 int bytes_returned = 0;
2599 int resp_buf_type = 0;
2600 __u16 params, param_offset, offset, byte_count, count;
2602 struct kvec rsp_iov;
2604 cifs_dbg(FYI, "Posix Lock\n");
2606 rc = small_smb_init(SMB_COM_TRANSACTION2, 15, tcon, (void **) &pSMB);
2611 pSMBr = (struct smb_com_transaction2_sfi_rsp *)pSMB;
2614 pSMB->MaxSetupCount = 0;
2617 pSMB->Reserved2 = 0;
2618 param_offset = offsetof(struct smb_com_transaction2_sfi_req, Fid) - 4;
2619 offset = param_offset + params;
2621 count = sizeof(struct cifs_posix_lock);
2622 pSMB->MaxParameterCount = cpu_to_le16(2);
2623 pSMB->MaxDataCount = cpu_to_le16(1000); /* BB find max SMB from sess */
2624 pSMB->SetupCount = 1;
2625 pSMB->Reserved3 = 0;
2627 pSMB->SubCommand = cpu_to_le16(TRANS2_QUERY_FILE_INFORMATION);
2629 pSMB->SubCommand = cpu_to_le16(TRANS2_SET_FILE_INFORMATION);
2630 byte_count = 3 /* pad */ + params + count;
2631 pSMB->DataCount = cpu_to_le16(count);
2632 pSMB->ParameterCount = cpu_to_le16(params);
2633 pSMB->TotalDataCount = pSMB->DataCount;
2634 pSMB->TotalParameterCount = pSMB->ParameterCount;
2635 pSMB->ParameterOffset = cpu_to_le16(param_offset);
2636 parm_data = (struct cifs_posix_lock *)
2637 (((char *) &pSMB->hdr.Protocol) + offset);
2639 parm_data->lock_type = cpu_to_le16(lock_type);
2641 timeout = CIFS_BLOCKING_OP; /* blocking operation, no timeout */
2642 parm_data->lock_flags = cpu_to_le16(1);
2643 pSMB->Timeout = cpu_to_le32(-1);
2647 parm_data->pid = cpu_to_le32(netpid);
2648 parm_data->start = cpu_to_le64(start_offset);
2649 parm_data->length = cpu_to_le64(len); /* normalize negative numbers */
2651 pSMB->DataOffset = cpu_to_le16(offset);
2652 pSMB->Fid = smb_file_id;
2653 pSMB->InformationLevel = cpu_to_le16(SMB_SET_POSIX_LOCK);
2654 pSMB->Reserved4 = 0;
2655 inc_rfc1001_len(pSMB, byte_count);
2656 pSMB->ByteCount = cpu_to_le16(byte_count);
2658 rc = SendReceiveBlockingLock(xid, tcon, (struct smb_hdr *) pSMB,
2659 (struct smb_hdr *) pSMBr, &bytes_returned);
2661 iov[0].iov_base = (char *)pSMB;
2662 iov[0].iov_len = be32_to_cpu(pSMB->hdr.smb_buf_length) + 4;
2663 rc = SendReceive2(xid, tcon->ses, iov, 1 /* num iovecs */,
2664 &resp_buf_type, timeout, &rsp_iov);
2665 pSMBr = (struct smb_com_transaction2_sfi_rsp *)rsp_iov.iov_base;
2667 cifs_small_buf_release(pSMB);
2670 cifs_dbg(FYI, "Send error in Posix Lock = %d\n", rc);
2671 } else if (pLockData) {
2672 /* lock structure can be returned on get */
2675 rc = validate_t2((struct smb_t2_rsp *)pSMBr);
2677 if (rc || get_bcc(&pSMBr->hdr) < sizeof(*parm_data)) {
2678 rc = -EIO; /* bad smb */
2681 data_offset = le16_to_cpu(pSMBr->t2.DataOffset);
2682 data_count = le16_to_cpu(pSMBr->t2.DataCount);
2683 if (data_count < sizeof(struct cifs_posix_lock)) {
2687 parm_data = (struct cifs_posix_lock *)
2688 ((char *)&pSMBr->hdr.Protocol + data_offset);
2689 if (parm_data->lock_type == cpu_to_le16(CIFS_UNLCK))
2690 pLockData->fl_type = F_UNLCK;
2692 if (parm_data->lock_type ==
2693 cpu_to_le16(CIFS_RDLCK))
2694 pLockData->fl_type = F_RDLCK;
2695 else if (parm_data->lock_type ==
2696 cpu_to_le16(CIFS_WRLCK))
2697 pLockData->fl_type = F_WRLCK;
2699 pLockData->fl_start = le64_to_cpu(parm_data->start);
2700 pLockData->fl_end = pLockData->fl_start +
2701 le64_to_cpu(parm_data->length) - 1;
2702 pLockData->fl_pid = -le32_to_cpu(parm_data->pid);
2707 free_rsp_buf(resp_buf_type, rsp_iov.iov_base);
2709 /* Note: On -EAGAIN error only caller can retry on handle based calls
2710 since file handle passed in no longer valid */
2717 CIFSSMBClose(const unsigned int xid, struct cifs_tcon *tcon, int smb_file_id)
2720 CLOSE_REQ *pSMB = NULL;
2721 cifs_dbg(FYI, "In CIFSSMBClose\n");
2723 /* do not retry on dead session on close */
2724 rc = small_smb_init(SMB_COM_CLOSE, 3, tcon, (void **) &pSMB);
2730 pSMB->FileID = (__u16) smb_file_id;
2731 pSMB->LastWriteTime = 0xFFFFFFFF;
2732 pSMB->ByteCount = 0;
2733 rc = SendReceiveNoRsp(xid, tcon->ses, (char *) pSMB, 0);
2734 cifs_small_buf_release(pSMB);
2735 cifs_stats_inc(&tcon->stats.cifs_stats.num_closes);
2738 /* EINTR is expected when user ctl-c to kill app */
2739 cifs_dbg(VFS, "Send error in Close = %d\n", rc);
2743 /* Since session is dead, file will be closed on server already */
2751 CIFSSMBFlush(const unsigned int xid, struct cifs_tcon *tcon, int smb_file_id)
2754 FLUSH_REQ *pSMB = NULL;
2755 cifs_dbg(FYI, "In CIFSSMBFlush\n");
2757 rc = small_smb_init(SMB_COM_FLUSH, 1, tcon, (void **) &pSMB);
2761 pSMB->FileID = (__u16) smb_file_id;
2762 pSMB->ByteCount = 0;
2763 rc = SendReceiveNoRsp(xid, tcon->ses, (char *) pSMB, 0);
2764 cifs_small_buf_release(pSMB);
2765 cifs_stats_inc(&tcon->stats.cifs_stats.num_flushes);
2767 cifs_dbg(VFS, "Send error in Flush = %d\n", rc);
2773 CIFSSMBRename(const unsigned int xid, struct cifs_tcon *tcon,
2774 const char *from_name, const char *to_name,
2775 struct cifs_sb_info *cifs_sb)
2778 RENAME_REQ *pSMB = NULL;
2779 RENAME_RSP *pSMBr = NULL;
2781 int name_len, name_len2;
2783 int remap = cifs_remap(cifs_sb);
2785 cifs_dbg(FYI, "In CIFSSMBRename\n");
2787 rc = smb_init(SMB_COM_RENAME, 1, tcon, (void **) &pSMB,
2792 pSMB->BufferFormat = 0x04;
2793 pSMB->SearchAttributes =
2794 cpu_to_le16(ATTR_READONLY | ATTR_HIDDEN | ATTR_SYSTEM |
2797 if (pSMB->hdr.Flags2 & SMBFLG2_UNICODE) {
2798 name_len = cifsConvertToUTF16((__le16 *) pSMB->OldFileName,
2799 from_name, PATH_MAX,
2800 cifs_sb->local_nls, remap);
2801 name_len++; /* trailing null */
2803 pSMB->OldFileName[name_len] = 0x04; /* pad */
2804 /* protocol requires ASCII signature byte on Unicode string */
2805 pSMB->OldFileName[name_len + 1] = 0x00;
2807 cifsConvertToUTF16((__le16 *)&pSMB->OldFileName[name_len+2],
2808 to_name, PATH_MAX, cifs_sb->local_nls,
2810 name_len2 += 1 /* trailing null */ + 1 /* Signature word */ ;
2811 name_len2 *= 2; /* convert to bytes */
2812 } else { /* BB improve the check for buffer overruns BB */
2813 name_len = strnlen(from_name, PATH_MAX);
2814 name_len++; /* trailing null */
2815 strncpy(pSMB->OldFileName, from_name, name_len);
2816 name_len2 = strnlen(to_name, PATH_MAX);
2817 name_len2++; /* trailing null */
2818 pSMB->OldFileName[name_len] = 0x04; /* 2nd buffer format */
2819 strncpy(&pSMB->OldFileName[name_len + 1], to_name, name_len2);
2820 name_len2++; /* trailing null */
2821 name_len2++; /* signature byte */
2824 count = 1 /* 1st signature byte */ + name_len + name_len2;
2825 inc_rfc1001_len(pSMB, count);
2826 pSMB->ByteCount = cpu_to_le16(count);
2828 rc = SendReceive(xid, tcon->ses, (struct smb_hdr *) pSMB,
2829 (struct smb_hdr *) pSMBr, &bytes_returned, 0);
2830 cifs_stats_inc(&tcon->stats.cifs_stats.num_renames);
2832 cifs_dbg(FYI, "Send error in rename = %d\n", rc);
2834 cifs_buf_release(pSMB);
2842 int CIFSSMBRenameOpenFile(const unsigned int xid, struct cifs_tcon *pTcon,
2843 int netfid, const char *target_name,
2844 const struct nls_table *nls_codepage, int remap)
2846 struct smb_com_transaction2_sfi_req *pSMB = NULL;
2847 struct smb_com_transaction2_sfi_rsp *pSMBr = NULL;
2848 struct set_file_rename *rename_info;
2850 char dummy_string[30];
2852 int bytes_returned = 0;
2854 __u16 params, param_offset, offset, count, byte_count;
2856 cifs_dbg(FYI, "Rename to File by handle\n");
2857 rc = smb_init(SMB_COM_TRANSACTION2, 15, pTcon, (void **) &pSMB,
2863 pSMB->MaxSetupCount = 0;
2867 pSMB->Reserved2 = 0;
2868 param_offset = offsetof(struct smb_com_transaction2_sfi_req, Fid) - 4;
2869 offset = param_offset + params;
2871 data_offset = (char *) (&pSMB->hdr.Protocol) + offset;
2872 rename_info = (struct set_file_rename *) data_offset;
2873 pSMB->MaxParameterCount = cpu_to_le16(2);
2874 pSMB->MaxDataCount = cpu_to_le16(1000); /* BB find max SMB from sess */
2875 pSMB->SetupCount = 1;
2876 pSMB->Reserved3 = 0;
2877 pSMB->SubCommand = cpu_to_le16(TRANS2_SET_FILE_INFORMATION);
2878 byte_count = 3 /* pad */ + params;
2879 pSMB->ParameterCount = cpu_to_le16(params);
2880 pSMB->TotalParameterCount = pSMB->ParameterCount;
2881 pSMB->ParameterOffset = cpu_to_le16(param_offset);
2882 pSMB->DataOffset = cpu_to_le16(offset);
2883 /* construct random name ".cifs_tmp<inodenum><mid>" */
2884 rename_info->overwrite = cpu_to_le32(1);
2885 rename_info->root_fid = 0;
2886 /* unicode only call */
2887 if (target_name == NULL) {
2888 sprintf(dummy_string, "cifs%x", pSMB->hdr.Mid);
2890 cifsConvertToUTF16((__le16 *)rename_info->target_name,
2891 dummy_string, 24, nls_codepage, remap);
2894 cifsConvertToUTF16((__le16 *)rename_info->target_name,
2895 target_name, PATH_MAX, nls_codepage,
2898 rename_info->target_name_len = cpu_to_le32(2 * len_of_str);
2899 count = 12 /* sizeof(struct set_file_rename) */ + (2 * len_of_str);
2900 byte_count += count;
2901 pSMB->DataCount = cpu_to_le16(count);
2902 pSMB->TotalDataCount = pSMB->DataCount;
2904 pSMB->InformationLevel =
2905 cpu_to_le16(SMB_SET_FILE_RENAME_INFORMATION);
2906 pSMB->Reserved4 = 0;
2907 inc_rfc1001_len(pSMB, byte_count);
2908 pSMB->ByteCount = cpu_to_le16(byte_count);
2909 rc = SendReceive(xid, pTcon->ses, (struct smb_hdr *) pSMB,
2910 (struct smb_hdr *) pSMBr, &bytes_returned, 0);
2911 cifs_stats_inc(&pTcon->stats.cifs_stats.num_t2renames);
2913 cifs_dbg(FYI, "Send error in Rename (by file handle) = %d\n",
2916 cifs_buf_release(pSMB);
2918 /* Note: On -EAGAIN error only caller can retry on handle based calls
2919 since file handle passed in no longer valid */
2925 CIFSSMBCopy(const unsigned int xid, struct cifs_tcon *tcon,
2926 const char *fromName, const __u16 target_tid, const char *toName,
2927 const int flags, const struct nls_table *nls_codepage, int remap)
2930 COPY_REQ *pSMB = NULL;
2931 COPY_RSP *pSMBr = NULL;
2933 int name_len, name_len2;
2936 cifs_dbg(FYI, "In CIFSSMBCopy\n");
2938 rc = smb_init(SMB_COM_COPY, 1, tcon, (void **) &pSMB,
2943 pSMB->BufferFormat = 0x04;
2944 pSMB->Tid2 = target_tid;
2946 pSMB->Flags = cpu_to_le16(flags & COPY_TREE);
2948 if (pSMB->hdr.Flags2 & SMBFLG2_UNICODE) {
2949 name_len = cifsConvertToUTF16((__le16 *) pSMB->OldFileName,
2950 fromName, PATH_MAX, nls_codepage,
2952 name_len++; /* trailing null */
2954 pSMB->OldFileName[name_len] = 0x04; /* pad */
2955 /* protocol requires ASCII signature byte on Unicode string */
2956 pSMB->OldFileName[name_len + 1] = 0x00;
2958 cifsConvertToUTF16((__le16 *)&pSMB->OldFileName[name_len+2],
2959 toName, PATH_MAX, nls_codepage, remap);
2960 name_len2 += 1 /* trailing null */ + 1 /* Signature word */ ;
2961 name_len2 *= 2; /* convert to bytes */
2962 } else { /* BB improve the check for buffer overruns BB */
2963 name_len = strnlen(fromName, PATH_MAX);
2964 name_len++; /* trailing null */
2965 strncpy(pSMB->OldFileName, fromName, name_len);
2966 name_len2 = strnlen(toName, PATH_MAX);
2967 name_len2++; /* trailing null */
2968 pSMB->OldFileName[name_len] = 0x04; /* 2nd buffer format */
2969 strncpy(&pSMB->OldFileName[name_len + 1], toName, name_len2);
2970 name_len2++; /* trailing null */
2971 name_len2++; /* signature byte */
2974 count = 1 /* 1st signature byte */ + name_len + name_len2;
2975 inc_rfc1001_len(pSMB, count);
2976 pSMB->ByteCount = cpu_to_le16(count);
2978 rc = SendReceive(xid, tcon->ses, (struct smb_hdr *) pSMB,
2979 (struct smb_hdr *) pSMBr, &bytes_returned, 0);
2981 cifs_dbg(FYI, "Send error in copy = %d with %d files copied\n",
2982 rc, le16_to_cpu(pSMBr->CopyCount));
2984 cifs_buf_release(pSMB);
2993 CIFSUnixCreateSymLink(const unsigned int xid, struct cifs_tcon *tcon,
2994 const char *fromName, const char *toName,
2995 const struct nls_table *nls_codepage, int remap)
2997 TRANSACTION2_SPI_REQ *pSMB = NULL;
2998 TRANSACTION2_SPI_RSP *pSMBr = NULL;
3001 int name_len_target;
3003 int bytes_returned = 0;
3004 __u16 params, param_offset, offset, byte_count;
3006 cifs_dbg(FYI, "In Symlink Unix style\n");
3008 rc = smb_init(SMB_COM_TRANSACTION2, 15, tcon, (void **) &pSMB,
3013 if (pSMB->hdr.Flags2 & SMBFLG2_UNICODE) {
3015 cifsConvertToUTF16((__le16 *) pSMB->FileName, fromName,
3016 /* find define for this maxpathcomponent */
3017 PATH_MAX, nls_codepage, remap);
3018 name_len++; /* trailing null */
3021 } else { /* BB improve the check for buffer overruns BB */
3022 name_len = strnlen(fromName, PATH_MAX);
3023 name_len++; /* trailing null */
3024 strncpy(pSMB->FileName, fromName, name_len);
3026 params = 6 + name_len;
3027 pSMB->MaxSetupCount = 0;
3031 pSMB->Reserved2 = 0;
3032 param_offset = offsetof(struct smb_com_transaction2_spi_req,
3033 InformationLevel) - 4;
3034 offset = param_offset + params;
3036 data_offset = (char *) (&pSMB->hdr.Protocol) + offset;
3037 if (pSMB->hdr.Flags2 & SMBFLG2_UNICODE) {
3039 cifsConvertToUTF16((__le16 *) data_offset, toName,
3040 /* find define for this maxpathcomponent */
3041 PATH_MAX, nls_codepage, remap);
3042 name_len_target++; /* trailing null */
3043 name_len_target *= 2;
3044 } else { /* BB improve the check for buffer overruns BB */
3045 name_len_target = strnlen(toName, PATH_MAX);
3046 name_len_target++; /* trailing null */
3047 strncpy(data_offset, toName, name_len_target);
3050 pSMB->MaxParameterCount = cpu_to_le16(2);
3051 /* BB find exact max on data count below from sess */
3052 pSMB->MaxDataCount = cpu_to_le16(1000);
3053 pSMB->SetupCount = 1;
3054 pSMB->Reserved3 = 0;
3055 pSMB->SubCommand = cpu_to_le16(TRANS2_SET_PATH_INFORMATION);
3056 byte_count = 3 /* pad */ + params + name_len_target;
3057 pSMB->DataCount = cpu_to_le16(name_len_target);
3058 pSMB->ParameterCount = cpu_to_le16(params);
3059 pSMB->TotalDataCount = pSMB->DataCount;
3060 pSMB->TotalParameterCount = pSMB->ParameterCount;
3061 pSMB->ParameterOffset = cpu_to_le16(param_offset);
3062 pSMB->DataOffset = cpu_to_le16(offset);
3063 pSMB->InformationLevel = cpu_to_le16(SMB_SET_FILE_UNIX_LINK);
3064 pSMB->Reserved4 = 0;
3065 inc_rfc1001_len(pSMB, byte_count);
3066 pSMB->ByteCount = cpu_to_le16(byte_count);
3067 rc = SendReceive(xid, tcon->ses, (struct smb_hdr *) pSMB,
3068 (struct smb_hdr *) pSMBr, &bytes_returned, 0);
3069 cifs_stats_inc(&tcon->stats.cifs_stats.num_symlinks);
3071 cifs_dbg(FYI, "Send error in SetPathInfo create symlink = %d\n",
3074 cifs_buf_release(pSMB);
3077 goto createSymLinkRetry;
3083 CIFSUnixCreateHardLink(const unsigned int xid, struct cifs_tcon *tcon,
3084 const char *fromName, const char *toName,
3085 const struct nls_table *nls_codepage, int remap)
3087 TRANSACTION2_SPI_REQ *pSMB = NULL;
3088 TRANSACTION2_SPI_RSP *pSMBr = NULL;
3091 int name_len_target;
3093 int bytes_returned = 0;
3094 __u16 params, param_offset, offset, byte_count;
3096 cifs_dbg(FYI, "In Create Hard link Unix style\n");
3097 createHardLinkRetry:
3098 rc = smb_init(SMB_COM_TRANSACTION2, 15, tcon, (void **) &pSMB,
3103 if (pSMB->hdr.Flags2 & SMBFLG2_UNICODE) {
3104 name_len = cifsConvertToUTF16((__le16 *) pSMB->FileName, toName,
3105 PATH_MAX, nls_codepage, remap);
3106 name_len++; /* trailing null */
3109 } else { /* BB improve the check for buffer overruns BB */
3110 name_len = strnlen(toName, PATH_MAX);
3111 name_len++; /* trailing null */
3112 strncpy(pSMB->FileName, toName, name_len);
3114 params = 6 + name_len;
3115 pSMB->MaxSetupCount = 0;
3119 pSMB->Reserved2 = 0;
3120 param_offset = offsetof(struct smb_com_transaction2_spi_req,
3121 InformationLevel) - 4;
3122 offset = param_offset + params;
3124 data_offset = (char *) (&pSMB->hdr.Protocol) + offset;
3125 if (pSMB->hdr.Flags2 & SMBFLG2_UNICODE) {
3127 cifsConvertToUTF16((__le16 *) data_offset, fromName,
3128 PATH_MAX, nls_codepage, remap);
3129 name_len_target++; /* trailing null */
3130 name_len_target *= 2;
3131 } else { /* BB improve the check for buffer overruns BB */
3132 name_len_target = strnlen(fromName, PATH_MAX);
3133 name_len_target++; /* trailing null */
3134 strncpy(data_offset, fromName, name_len_target);
3137 pSMB->MaxParameterCount = cpu_to_le16(2);
3138 /* BB find exact max on data count below from sess*/
3139 pSMB->MaxDataCount = cpu_to_le16(1000);
3140 pSMB->SetupCount = 1;
3141 pSMB->Reserved3 = 0;
3142 pSMB->SubCommand = cpu_to_le16(TRANS2_SET_PATH_INFORMATION);
3143 byte_count = 3 /* pad */ + params + name_len_target;
3144 pSMB->ParameterCount = cpu_to_le16(params);
3145 pSMB->TotalParameterCount = pSMB->ParameterCount;
3146 pSMB->DataCount = cpu_to_le16(name_len_target);
3147 pSMB->TotalDataCount = pSMB->DataCount;
3148 pSMB->ParameterOffset = cpu_to_le16(param_offset);
3149 pSMB->DataOffset = cpu_to_le16(offset);
3150 pSMB->InformationLevel = cpu_to_le16(SMB_SET_FILE_UNIX_HLINK);
3151 pSMB->Reserved4 = 0;
3152 inc_rfc1001_len(pSMB, byte_count);
3153 pSMB->ByteCount = cpu_to_le16(byte_count);
3154 rc = SendReceive(xid, tcon->ses, (struct smb_hdr *) pSMB,
3155 (struct smb_hdr *) pSMBr, &bytes_returned, 0);
3156 cifs_stats_inc(&tcon->stats.cifs_stats.num_hardlinks);
3158 cifs_dbg(FYI, "Send error in SetPathInfo (hard link) = %d\n",
3161 cifs_buf_release(pSMB);
3163 goto createHardLinkRetry;
3169 CIFSCreateHardLink(const unsigned int xid, struct cifs_tcon *tcon,
3170 const char *from_name, const char *to_name,
3171 struct cifs_sb_info *cifs_sb)
3174 NT_RENAME_REQ *pSMB = NULL;
3175 RENAME_RSP *pSMBr = NULL;
3177 int name_len, name_len2;
3179 int remap = cifs_remap(cifs_sb);
3181 cifs_dbg(FYI, "In CIFSCreateHardLink\n");
3182 winCreateHardLinkRetry:
3184 rc = smb_init(SMB_COM_NT_RENAME, 4, tcon, (void **) &pSMB,
3189 pSMB->SearchAttributes =
3190 cpu_to_le16(ATTR_READONLY | ATTR_HIDDEN | ATTR_SYSTEM |
3192 pSMB->Flags = cpu_to_le16(CREATE_HARD_LINK);
3193 pSMB->ClusterCount = 0;
3195 pSMB->BufferFormat = 0x04;
3197 if (pSMB->hdr.Flags2 & SMBFLG2_UNICODE) {
3199 cifsConvertToUTF16((__le16 *) pSMB->OldFileName, from_name,
3200 PATH_MAX, cifs_sb->local_nls, remap);
3201 name_len++; /* trailing null */
3204 /* protocol specifies ASCII buffer format (0x04) for unicode */
3205 pSMB->OldFileName[name_len] = 0x04;
3206 pSMB->OldFileName[name_len + 1] = 0x00; /* pad */
3208 cifsConvertToUTF16((__le16 *)&pSMB->OldFileName[name_len+2],
3209 to_name, PATH_MAX, cifs_sb->local_nls,
3211 name_len2 += 1 /* trailing null */ + 1 /* Signature word */ ;
3212 name_len2 *= 2; /* convert to bytes */
3213 } else { /* BB improve the check for buffer overruns BB */
3214 name_len = strnlen(from_name, PATH_MAX);
3215 name_len++; /* trailing null */
3216 strncpy(pSMB->OldFileName, from_name, name_len);
3217 name_len2 = strnlen(to_name, PATH_MAX);
3218 name_len2++; /* trailing null */
3219 pSMB->OldFileName[name_len] = 0x04; /* 2nd buffer format */
3220 strncpy(&pSMB->OldFileName[name_len + 1], to_name, name_len2);
3221 name_len2++; /* trailing null */
3222 name_len2++; /* signature byte */
3225 count = 1 /* string type byte */ + name_len + name_len2;
3226 inc_rfc1001_len(pSMB, count);
3227 pSMB->ByteCount = cpu_to_le16(count);
3229 rc = SendReceive(xid, tcon->ses, (struct smb_hdr *) pSMB,
3230 (struct smb_hdr *) pSMBr, &bytes_returned, 0);
3231 cifs_stats_inc(&tcon->stats.cifs_stats.num_hardlinks);
3233 cifs_dbg(FYI, "Send error in hard link (NT rename) = %d\n", rc);
3235 cifs_buf_release(pSMB);
3237 goto winCreateHardLinkRetry;
3243 CIFSSMBUnixQuerySymLink(const unsigned int xid, struct cifs_tcon *tcon,
3244 const unsigned char *searchName, char **symlinkinfo,
3245 const struct nls_table *nls_codepage, int remap)
3247 /* SMB_QUERY_FILE_UNIX_LINK */
3248 TRANSACTION2_QPI_REQ *pSMB = NULL;
3249 TRANSACTION2_QPI_RSP *pSMBr = NULL;
3253 __u16 params, byte_count;
3256 cifs_dbg(FYI, "In QPathSymLinkInfo (Unix) for path %s\n", searchName);
3259 rc = smb_init(SMB_COM_TRANSACTION2, 15, tcon, (void **) &pSMB,
3264 if (pSMB->hdr.Flags2 & SMBFLG2_UNICODE) {
3266 cifsConvertToUTF16((__le16 *) pSMB->FileName,
3267 searchName, PATH_MAX, nls_codepage,
3269 name_len++; /* trailing null */
3271 } else { /* BB improve the check for buffer overruns BB */
3272 name_len = strnlen(searchName, PATH_MAX);
3273 name_len++; /* trailing null */
3274 strncpy(pSMB->FileName, searchName, name_len);
3277 params = 2 /* level */ + 4 /* rsrvd */ + name_len /* incl null */ ;
3278 pSMB->TotalDataCount = 0;
3279 pSMB->MaxParameterCount = cpu_to_le16(2);
3280 pSMB->MaxDataCount = cpu_to_le16(CIFSMaxBufSize);
3281 pSMB->MaxSetupCount = 0;
3285 pSMB->Reserved2 = 0;
3286 pSMB->ParameterOffset = cpu_to_le16(offsetof(
3287 struct smb_com_transaction2_qpi_req, InformationLevel) - 4);
3288 pSMB->DataCount = 0;
3289 pSMB->DataOffset = 0;
3290 pSMB->SetupCount = 1;
3291 pSMB->Reserved3 = 0;
3292 pSMB->SubCommand = cpu_to_le16(TRANS2_QUERY_PATH_INFORMATION);
3293 byte_count = params + 1 /* pad */ ;
3294 pSMB->TotalParameterCount = cpu_to_le16(params);
3295 pSMB->ParameterCount = pSMB->TotalParameterCount;
3296 pSMB->InformationLevel = cpu_to_le16(SMB_QUERY_FILE_UNIX_LINK);
3297 pSMB->Reserved4 = 0;
3298 inc_rfc1001_len(pSMB, byte_count);
3299 pSMB->ByteCount = cpu_to_le16(byte_count);
3301 rc = SendReceive(xid, tcon->ses, (struct smb_hdr *) pSMB,
3302 (struct smb_hdr *) pSMBr, &bytes_returned, 0);
3304 cifs_dbg(FYI, "Send error in QuerySymLinkInfo = %d\n", rc);
3306 /* decode response */
3308 rc = validate_t2((struct smb_t2_rsp *)pSMBr);
3309 /* BB also check enough total bytes returned */
3310 if (rc || get_bcc(&pSMBr->hdr) < 2)
3314 u16 count = le16_to_cpu(pSMBr->t2.DataCount);
3316 data_start = ((char *) &pSMBr->hdr.Protocol) +
3317 le16_to_cpu(pSMBr->t2.DataOffset);
3319 if (pSMBr->hdr.Flags2 & SMBFLG2_UNICODE)
3324 /* BB FIXME investigate remapping reserved chars here */
3325 *symlinkinfo = cifs_strndup_from_utf16(data_start,
3326 count, is_unicode, nls_codepage);
3331 cifs_buf_release(pSMB);
3333 goto querySymLinkRetry;
3338 * Recent Windows versions now create symlinks more frequently
3339 * and they use the "reparse point" mechanism below. We can of course
3340 * do symlinks nicely to Samba and other servers which support the
3341 * CIFS Unix Extensions and we can also do SFU symlinks and "client only"
3342 * "MF" symlinks optionally, but for recent Windows we really need to
3343 * reenable the code below and fix the cifs_symlink callers to handle this.
3344 * In the interim this code has been moved to its own config option so
3345 * it is not compiled in by default until callers fixed up and more tested.
3348 CIFSSMBQuerySymLink(const unsigned int xid, struct cifs_tcon *tcon,
3349 __u16 fid, char **symlinkinfo,
3350 const struct nls_table *nls_codepage)
3354 struct smb_com_transaction_ioctl_req *pSMB;
3355 struct smb_com_transaction_ioctl_rsp *pSMBr;
3357 unsigned int sub_len;
3359 struct reparse_symlink_data *reparse_buf;
3360 struct reparse_posix_data *posix_buf;
3361 __u32 data_offset, data_count;
3364 cifs_dbg(FYI, "In Windows reparse style QueryLink for fid %u\n", fid);
3365 rc = smb_init(SMB_COM_NT_TRANSACT, 23, tcon, (void **) &pSMB,
3370 pSMB->TotalParameterCount = 0 ;
3371 pSMB->TotalDataCount = 0;
3372 pSMB->MaxParameterCount = cpu_to_le32(2);
3373 /* BB find exact data count max from sess structure BB */
3374 pSMB->MaxDataCount = cpu_to_le32(CIFSMaxBufSize & 0xFFFFFF00);
3375 pSMB->MaxSetupCount = 4;
3377 pSMB->ParameterOffset = 0;
3378 pSMB->DataCount = 0;
3379 pSMB->DataOffset = 0;
3380 pSMB->SetupCount = 4;
3381 pSMB->SubCommand = cpu_to_le16(NT_TRANSACT_IOCTL);
3382 pSMB->ParameterCount = pSMB->TotalParameterCount;
3383 pSMB->FunctionCode = cpu_to_le32(FSCTL_GET_REPARSE_POINT);
3384 pSMB->IsFsctl = 1; /* FSCTL */
3385 pSMB->IsRootFlag = 0;
3386 pSMB->Fid = fid; /* file handle always le */
3387 pSMB->ByteCount = 0;
3389 rc = SendReceive(xid, tcon->ses, (struct smb_hdr *) pSMB,
3390 (struct smb_hdr *) pSMBr, &bytes_returned, 0);
3392 cifs_dbg(FYI, "Send error in QueryReparseLinkInfo = %d\n", rc);
3396 data_offset = le32_to_cpu(pSMBr->DataOffset);
3397 data_count = le32_to_cpu(pSMBr->DataCount);
3398 if (get_bcc(&pSMBr->hdr) < 2 || data_offset > 512) {
3399 /* BB also check enough total bytes returned */
3400 rc = -EIO; /* bad smb */
3403 if (!data_count || (data_count > 2048)) {
3405 cifs_dbg(FYI, "Invalid return data count on get reparse info ioctl\n");
3408 end_of_smb = 2 + get_bcc(&pSMBr->hdr) + (char *)&pSMBr->ByteCount;
3409 reparse_buf = (struct reparse_symlink_data *)
3410 ((char *)&pSMBr->hdr.Protocol + data_offset);
3411 if ((char *)reparse_buf >= end_of_smb) {
3415 if (reparse_buf->ReparseTag == cpu_to_le32(IO_REPARSE_TAG_NFS)) {
3416 cifs_dbg(FYI, "NFS style reparse tag\n");
3417 posix_buf = (struct reparse_posix_data *)reparse_buf;
3419 if (posix_buf->InodeType != cpu_to_le64(NFS_SPECFILE_LNK)) {
3420 cifs_dbg(FYI, "unsupported file type 0x%llx\n",
3421 le64_to_cpu(posix_buf->InodeType));
3426 sub_len = le16_to_cpu(reparse_buf->ReparseDataLength);
3427 if (posix_buf->PathBuffer + sub_len > end_of_smb) {
3428 cifs_dbg(FYI, "reparse buf beyond SMB\n");
3432 *symlinkinfo = cifs_strndup_from_utf16(posix_buf->PathBuffer,
3433 sub_len, is_unicode, nls_codepage);
3435 } else if (reparse_buf->ReparseTag !=
3436 cpu_to_le32(IO_REPARSE_TAG_SYMLINK)) {
3441 /* Reparse tag is NTFS symlink */
3442 sub_start = le16_to_cpu(reparse_buf->SubstituteNameOffset) +
3443 reparse_buf->PathBuffer;
3444 sub_len = le16_to_cpu(reparse_buf->SubstituteNameLength);
3445 if (sub_start + sub_len > end_of_smb) {
3446 cifs_dbg(FYI, "reparse buf beyond SMB\n");
3450 if (pSMBr->hdr.Flags2 & SMBFLG2_UNICODE)
3455 /* BB FIXME investigate remapping reserved chars here */
3456 *symlinkinfo = cifs_strndup_from_utf16(sub_start, sub_len, is_unicode,
3461 cifs_buf_release(pSMB);
3464 * Note: On -EAGAIN error only caller can retry on handle based calls
3465 * since file handle passed in no longer valid.
3471 CIFSSMB_set_compression(const unsigned int xid, struct cifs_tcon *tcon,
3476 struct smb_com_transaction_compr_ioctl_req *pSMB;
3477 struct smb_com_transaction_ioctl_rsp *pSMBr;
3479 cifs_dbg(FYI, "Set compression for %u\n", fid);
3480 rc = smb_init(SMB_COM_NT_TRANSACT, 23, tcon, (void **) &pSMB,
3485 pSMB->compression_state = cpu_to_le16(COMPRESSION_FORMAT_DEFAULT);
3487 pSMB->TotalParameterCount = 0;
3488 pSMB->TotalDataCount = cpu_to_le32(2);
3489 pSMB->MaxParameterCount = 0;
3490 pSMB->MaxDataCount = 0;
3491 pSMB->MaxSetupCount = 4;
3493 pSMB->ParameterOffset = 0;
3494 pSMB->DataCount = cpu_to_le32(2);
3496 cpu_to_le32(offsetof(struct smb_com_transaction_compr_ioctl_req,
3497 compression_state) - 4); /* 84 */
3498 pSMB->SetupCount = 4;
3499 pSMB->SubCommand = cpu_to_le16(NT_TRANSACT_IOCTL);
3500 pSMB->ParameterCount = 0;
3501 pSMB->FunctionCode = cpu_to_le32(FSCTL_SET_COMPRESSION);
3502 pSMB->IsFsctl = 1; /* FSCTL */
3503 pSMB->IsRootFlag = 0;
3504 pSMB->Fid = fid; /* file handle always le */
3505 /* 3 byte pad, followed by 2 byte compress state */
3506 pSMB->ByteCount = cpu_to_le16(5);
3507 inc_rfc1001_len(pSMB, 5);
3509 rc = SendReceive(xid, tcon->ses, (struct smb_hdr *) pSMB,
3510 (struct smb_hdr *) pSMBr, &bytes_returned, 0);
3512 cifs_dbg(FYI, "Send error in SetCompression = %d\n", rc);
3514 cifs_buf_release(pSMB);
3517 * Note: On -EAGAIN error only caller can retry on handle based calls
3518 * since file handle passed in no longer valid.
3524 #ifdef CONFIG_CIFS_POSIX
3526 /*Convert an Access Control Entry from wire format to local POSIX xattr format*/
3527 static void cifs_convert_ace(struct posix_acl_xattr_entry *ace,
3528 struct cifs_posix_ace *cifs_ace)
3530 /* u8 cifs fields do not need le conversion */
3531 ace->e_perm = cpu_to_le16(cifs_ace->cifs_e_perm);
3532 ace->e_tag = cpu_to_le16(cifs_ace->cifs_e_tag);
3533 ace->e_id = cpu_to_le32(le64_to_cpu(cifs_ace->cifs_uid));
3535 cifs_dbg(FYI, "perm %d tag %d id %d\n",
3536 ace->e_perm, ace->e_tag, ace->e_id);
3542 /* Convert ACL from CIFS POSIX wire format to local Linux POSIX ACL xattr */
3543 static int cifs_copy_posix_acl(char *trgt, char *src, const int buflen,
3544 const int acl_type, const int size_of_data_area)
3549 struct cifs_posix_ace *pACE;
3550 struct cifs_posix_acl *cifs_acl = (struct cifs_posix_acl *)src;
3551 struct posix_acl_xattr_header *local_acl = (void *)trgt;
3553 if (le16_to_cpu(cifs_acl->version) != CIFS_ACL_VERSION)
3556 if (acl_type == ACL_TYPE_ACCESS) {
3557 count = le16_to_cpu(cifs_acl->access_entry_count);
3558 pACE = &cifs_acl->ace_array[0];
3559 size = sizeof(struct cifs_posix_acl);
3560 size += sizeof(struct cifs_posix_ace) * count;
3561 /* check if we would go beyond end of SMB */
3562 if (size_of_data_area < size) {
3563 cifs_dbg(FYI, "bad CIFS POSIX ACL size %d vs. %d\n",
3564 size_of_data_area, size);
3567 } else if (acl_type == ACL_TYPE_DEFAULT) {
3568 count = le16_to_cpu(cifs_acl->access_entry_count);
3569 size = sizeof(struct cifs_posix_acl);
3570 size += sizeof(struct cifs_posix_ace) * count;
3571 /* skip past access ACEs to get to default ACEs */
3572 pACE = &cifs_acl->ace_array[count];
3573 count = le16_to_cpu(cifs_acl->default_entry_count);
3574 size += sizeof(struct cifs_posix_ace) * count;
3575 /* check if we would go beyond end of SMB */
3576 if (size_of_data_area < size)
3583 size = posix_acl_xattr_size(count);
3584 if ((buflen == 0) || (local_acl == NULL)) {
3585 /* used to query ACL EA size */
3586 } else if (size > buflen) {
3588 } else /* buffer big enough */ {
3589 struct posix_acl_xattr_entry *ace = (void *)(local_acl + 1);
3591 local_acl->a_version = cpu_to_le32(POSIX_ACL_XATTR_VERSION);
3592 for (i = 0; i < count ; i++) {
3593 cifs_convert_ace(&ace[i], pACE);
3600 static __u16 convert_ace_to_cifs_ace(struct cifs_posix_ace *cifs_ace,
3601 const struct posix_acl_xattr_entry *local_ace)
3603 __u16 rc = 0; /* 0 = ACL converted ok */
3605 cifs_ace->cifs_e_perm = le16_to_cpu(local_ace->e_perm);
3606 cifs_ace->cifs_e_tag = le16_to_cpu(local_ace->e_tag);
3607 /* BB is there a better way to handle the large uid? */
3608 if (local_ace->e_id == cpu_to_le32(-1)) {
3609 /* Probably no need to le convert -1 on any arch but can not hurt */
3610 cifs_ace->cifs_uid = cpu_to_le64(-1);
3612 cifs_ace->cifs_uid = cpu_to_le64(le32_to_cpu(local_ace->e_id));
3614 cifs_dbg(FYI, "perm %d tag %d id %d\n",
3615 ace->e_perm, ace->e_tag, ace->e_id);
3620 /* Convert ACL from local Linux POSIX xattr to CIFS POSIX ACL wire format */
3621 static __u16 ACL_to_cifs_posix(char *parm_data, const char *pACL,
3622 const int buflen, const int acl_type)
3625 struct cifs_posix_acl *cifs_acl = (struct cifs_posix_acl *)parm_data;
3626 struct posix_acl_xattr_header *local_acl = (void *)pACL;
3627 struct posix_acl_xattr_entry *ace = (void *)(local_acl + 1);
3631 if ((buflen == 0) || (pACL == NULL) || (cifs_acl == NULL))
3634 count = posix_acl_xattr_count((size_t)buflen);
3635 cifs_dbg(FYI, "setting acl with %d entries from buf of length %d and version of %d\n",
3636 count, buflen, le32_to_cpu(local_acl->a_version));
3637 if (le32_to_cpu(local_acl->a_version) != 2) {
3638 cifs_dbg(FYI, "unknown POSIX ACL version %d\n",
3639 le32_to_cpu(local_acl->a_version));
3642 cifs_acl->version = cpu_to_le16(1);
3643 if (acl_type == ACL_TYPE_ACCESS) {
3644 cifs_acl->access_entry_count = cpu_to_le16(count);
3645 cifs_acl->default_entry_count = cpu_to_le16(0xFFFF);
3646 } else if (acl_type == ACL_TYPE_DEFAULT) {
3647 cifs_acl->default_entry_count = cpu_to_le16(count);
3648 cifs_acl->access_entry_count = cpu_to_le16(0xFFFF);
3650 cifs_dbg(FYI, "unknown ACL type %d\n", acl_type);
3653 for (i = 0; i < count; i++) {
3654 rc = convert_ace_to_cifs_ace(&cifs_acl->ace_array[i], &ace[i]);
3656 /* ACE not converted */
3661 rc = (__u16)(count * sizeof(struct cifs_posix_ace));
3662 rc += sizeof(struct cifs_posix_acl);
3663 /* BB add check to make sure ACL does not overflow SMB */
3669 CIFSSMBGetPosixACL(const unsigned int xid, struct cifs_tcon *tcon,
3670 const unsigned char *searchName,
3671 char *acl_inf, const int buflen, const int acl_type,
3672 const struct nls_table *nls_codepage, int remap)
3674 /* SMB_QUERY_POSIX_ACL */
3675 TRANSACTION2_QPI_REQ *pSMB = NULL;
3676 TRANSACTION2_QPI_RSP *pSMBr = NULL;
3680 __u16 params, byte_count;
3682 cifs_dbg(FYI, "In GetPosixACL (Unix) for path %s\n", searchName);
3685 rc = smb_init(SMB_COM_TRANSACTION2, 15, tcon, (void **) &pSMB,
3690 if (pSMB->hdr.Flags2 & SMBFLG2_UNICODE) {
3692 cifsConvertToUTF16((__le16 *) pSMB->FileName,
3693 searchName, PATH_MAX, nls_codepage,
3695 name_len++; /* trailing null */
3697 pSMB->FileName[name_len] = 0;
3698 pSMB->FileName[name_len+1] = 0;
3699 } else { /* BB improve the check for buffer overruns BB */
3700 name_len = strnlen(searchName, PATH_MAX);
3701 name_len++; /* trailing null */
3702 strncpy(pSMB->FileName, searchName, name_len);
3705 params = 2 /* level */ + 4 /* rsrvd */ + name_len /* incl null */ ;
3706 pSMB->TotalDataCount = 0;
3707 pSMB->MaxParameterCount = cpu_to_le16(2);
3708 /* BB find exact max data count below from sess structure BB */
3709 pSMB->MaxDataCount = cpu_to_le16(4000);
3710 pSMB->MaxSetupCount = 0;
3714 pSMB->Reserved2 = 0;
3715 pSMB->ParameterOffset = cpu_to_le16(
3716 offsetof(struct smb_com_transaction2_qpi_req,
3717 InformationLevel) - 4);
3718 pSMB->DataCount = 0;
3719 pSMB->DataOffset = 0;
3720 pSMB->SetupCount = 1;
3721 pSMB->Reserved3 = 0;
3722 pSMB->SubCommand = cpu_to_le16(TRANS2_QUERY_PATH_INFORMATION);
3723 byte_count = params + 1 /* pad */ ;
3724 pSMB->TotalParameterCount = cpu_to_le16(params);
3725 pSMB->ParameterCount = pSMB->TotalParameterCount;
3726 pSMB->InformationLevel = cpu_to_le16(SMB_QUERY_POSIX_ACL);
3727 pSMB->Reserved4 = 0;
3728 inc_rfc1001_len(pSMB, byte_count);
3729 pSMB->ByteCount = cpu_to_le16(byte_count);
3731 rc = SendReceive(xid, tcon->ses, (struct smb_hdr *) pSMB,
3732 (struct smb_hdr *) pSMBr, &bytes_returned, 0);
3733 cifs_stats_inc(&tcon->stats.cifs_stats.num_acl_get);
3735 cifs_dbg(FYI, "Send error in Query POSIX ACL = %d\n", rc);
3737 /* decode response */
3739 rc = validate_t2((struct smb_t2_rsp *)pSMBr);
3740 /* BB also check enough total bytes returned */
3741 if (rc || get_bcc(&pSMBr->hdr) < 2)
3742 rc = -EIO; /* bad smb */
3744 __u16 data_offset = le16_to_cpu(pSMBr->t2.DataOffset);
3745 __u16 count = le16_to_cpu(pSMBr->t2.DataCount);
3746 rc = cifs_copy_posix_acl(acl_inf,
3747 (char *)&pSMBr->hdr.Protocol+data_offset,
3748 buflen, acl_type, count);
3751 cifs_buf_release(pSMB);
3758 CIFSSMBSetPosixACL(const unsigned int xid, struct cifs_tcon *tcon,
3759 const unsigned char *fileName,
3760 const char *local_acl, const int buflen,
3762 const struct nls_table *nls_codepage, int remap)
3764 struct smb_com_transaction2_spi_req *pSMB = NULL;
3765 struct smb_com_transaction2_spi_rsp *pSMBr = NULL;
3769 int bytes_returned = 0;
3770 __u16 params, byte_count, data_count, param_offset, offset;
3772 cifs_dbg(FYI, "In SetPosixACL (Unix) for path %s\n", fileName);
3774 rc = smb_init(SMB_COM_TRANSACTION2, 15, tcon, (void **) &pSMB,
3778 if (pSMB->hdr.Flags2 & SMBFLG2_UNICODE) {
3780 cifsConvertToUTF16((__le16 *) pSMB->FileName, fileName,
3781 PATH_MAX, nls_codepage, remap);
3782 name_len++; /* trailing null */
3784 } else { /* BB improve the check for buffer overruns BB */
3785 name_len = strnlen(fileName, PATH_MAX);
3786 name_len++; /* trailing null */
3787 strncpy(pSMB->FileName, fileName, name_len);
3789 params = 6 + name_len;
3790 pSMB->MaxParameterCount = cpu_to_le16(2);
3791 /* BB find max SMB size from sess */
3792 pSMB->MaxDataCount = cpu_to_le16(1000);
3793 pSMB->MaxSetupCount = 0;
3797 pSMB->Reserved2 = 0;
3798 param_offset = offsetof(struct smb_com_transaction2_spi_req,
3799 InformationLevel) - 4;
3800 offset = param_offset + params;
3801 parm_data = ((char *) &pSMB->hdr.Protocol) + offset;
3802 pSMB->ParameterOffset = cpu_to_le16(param_offset);
3804 /* convert to on the wire format for POSIX ACL */
3805 data_count = ACL_to_cifs_posix(parm_data, local_acl, buflen, acl_type);
3807 if (data_count == 0) {
3809 goto setACLerrorExit;
3811 pSMB->DataOffset = cpu_to_le16(offset);
3812 pSMB->SetupCount = 1;
3813 pSMB->Reserved3 = 0;
3814 pSMB->SubCommand = cpu_to_le16(TRANS2_SET_PATH_INFORMATION);
3815 pSMB->InformationLevel = cpu_to_le16(SMB_SET_POSIX_ACL);
3816 byte_count = 3 /* pad */ + params + data_count;
3817 pSMB->DataCount = cpu_to_le16(data_count);
3818 pSMB->TotalDataCount = pSMB->DataCount;
3819 pSMB->ParameterCount = cpu_to_le16(params);
3820 pSMB->TotalParameterCount = pSMB->ParameterCount;
3821 pSMB->Reserved4 = 0;
3822 inc_rfc1001_len(pSMB, byte_count);
3823 pSMB->ByteCount = cpu_to_le16(byte_count);
3824 rc = SendReceive(xid, tcon->ses, (struct smb_hdr *) pSMB,
3825 (struct smb_hdr *) pSMBr, &bytes_returned, 0);
3827 cifs_dbg(FYI, "Set POSIX ACL returned %d\n", rc);
3830 cifs_buf_release(pSMB);
3836 /* BB fix tabs in this function FIXME BB */
3838 CIFSGetExtAttr(const unsigned int xid, struct cifs_tcon *tcon,
3839 const int netfid, __u64 *pExtAttrBits, __u64 *pMask)
3842 struct smb_t2_qfi_req *pSMB = NULL;
3843 struct smb_t2_qfi_rsp *pSMBr = NULL;
3845 __u16 params, byte_count;
3847 cifs_dbg(FYI, "In GetExtAttr\n");
3852 rc = smb_init(SMB_COM_TRANSACTION2, 15, tcon, (void **) &pSMB,
3857 params = 2 /* level */ + 2 /* fid */;
3858 pSMB->t2.TotalDataCount = 0;
3859 pSMB->t2.MaxParameterCount = cpu_to_le16(4);
3860 /* BB find exact max data count below from sess structure BB */
3861 pSMB->t2.MaxDataCount = cpu_to_le16(4000);
3862 pSMB->t2.MaxSetupCount = 0;
3863 pSMB->t2.Reserved = 0;
3865 pSMB->t2.Timeout = 0;
3866 pSMB->t2.Reserved2 = 0;
3867 pSMB->t2.ParameterOffset = cpu_to_le16(offsetof(struct smb_t2_qfi_req,
3869 pSMB->t2.DataCount = 0;
3870 pSMB->t2.DataOffset = 0;
3871 pSMB->t2.SetupCount = 1;
3872 pSMB->t2.Reserved3 = 0;
3873 pSMB->t2.SubCommand = cpu_to_le16(TRANS2_QUERY_FILE_INFORMATION);
3874 byte_count = params + 1 /* pad */ ;
3875 pSMB->t2.TotalParameterCount = cpu_to_le16(params);
3876 pSMB->t2.ParameterCount = pSMB->t2.TotalParameterCount;
3877 pSMB->InformationLevel = cpu_to_le16(SMB_QUERY_ATTR_FLAGS);
3880 inc_rfc1001_len(pSMB, byte_count);
3881 pSMB->t2.ByteCount = cpu_to_le16(byte_count);
3883 rc = SendReceive(xid, tcon->ses, (struct smb_hdr *) pSMB,
3884 (struct smb_hdr *) pSMBr, &bytes_returned, 0);
3886 cifs_dbg(FYI, "error %d in GetExtAttr\n", rc);
3888 /* decode response */
3889 rc = validate_t2((struct smb_t2_rsp *)pSMBr);
3890 /* BB also check enough total bytes returned */
3891 if (rc || get_bcc(&pSMBr->hdr) < 2)
3892 /* If rc should we check for EOPNOSUPP and
3893 disable the srvino flag? or in caller? */
3894 rc = -EIO; /* bad smb */
3896 __u16 data_offset = le16_to_cpu(pSMBr->t2.DataOffset);
3897 __u16 count = le16_to_cpu(pSMBr->t2.DataCount);
3898 struct file_chattr_info *pfinfo;
3899 /* BB Do we need a cast or hash here ? */
3901 cifs_dbg(FYI, "Illegal size ret in GetExtAttr\n");
3905 pfinfo = (struct file_chattr_info *)
3906 (data_offset + (char *) &pSMBr->hdr.Protocol);
3907 *pExtAttrBits = le64_to_cpu(pfinfo->mode);
3908 *pMask = le64_to_cpu(pfinfo->mask);
3912 cifs_buf_release(pSMB);
3914 goto GetExtAttrRetry;
3918 #endif /* CONFIG_POSIX */
3920 #ifdef CONFIG_CIFS_ACL
3922 * Initialize NT TRANSACT SMB into small smb request buffer. This assumes that
3923 * all NT TRANSACTS that we init here have total parm and data under about 400
3924 * bytes (to fit in small cifs buffer size), which is the case so far, it
3925 * easily fits. NB: Setup words themselves and ByteCount MaxSetupCount (size of
3926 * returned setup area) and MaxParameterCount (returned parms size) must be set
3930 smb_init_nttransact(const __u16 sub_command, const int setup_count,
3931 const int parm_len, struct cifs_tcon *tcon,
3936 struct smb_com_ntransact_req *pSMB;
3938 rc = small_smb_init(SMB_COM_NT_TRANSACT, 19 + setup_count, tcon,
3942 *ret_buf = (void *)pSMB;
3944 pSMB->TotalParameterCount = cpu_to_le32(parm_len);
3945 pSMB->TotalDataCount = 0;
3946 pSMB->MaxDataCount = cpu_to_le32(CIFSMaxBufSize & 0xFFFFFF00);
3947 pSMB->ParameterCount = pSMB->TotalParameterCount;
3948 pSMB->DataCount = pSMB->TotalDataCount;
3949 temp_offset = offsetof(struct smb_com_ntransact_req, Parms) +
3950 (setup_count * 2) - 4 /* for rfc1001 length itself */;
3951 pSMB->ParameterOffset = cpu_to_le32(temp_offset);
3952 pSMB->DataOffset = cpu_to_le32(temp_offset + parm_len);
3953 pSMB->SetupCount = setup_count; /* no need to le convert byte fields */
3954 pSMB->SubCommand = cpu_to_le16(sub_command);
3959 validate_ntransact(char *buf, char **ppparm, char **ppdata,
3960 __u32 *pparmlen, __u32 *pdatalen)
3963 __u32 data_count, data_offset, parm_count, parm_offset;
3964 struct smb_com_ntransact_rsp *pSMBr;
3973 pSMBr = (struct smb_com_ntransact_rsp *)buf;
3975 bcc = get_bcc(&pSMBr->hdr);
3976 end_of_smb = 2 /* sizeof byte count */ + bcc +
3977 (char *)&pSMBr->ByteCount;
3979 data_offset = le32_to_cpu(pSMBr->DataOffset);
3980 data_count = le32_to_cpu(pSMBr->DataCount);
3981 parm_offset = le32_to_cpu(pSMBr->ParameterOffset);
3982 parm_count = le32_to_cpu(pSMBr->ParameterCount);
3984 *ppparm = (char *)&pSMBr->hdr.Protocol + parm_offset;
3985 *ppdata = (char *)&pSMBr->hdr.Protocol + data_offset;
3987 /* should we also check that parm and data areas do not overlap? */
3988 if (*ppparm > end_of_smb) {
3989 cifs_dbg(FYI, "parms start after end of smb\n");
3991 } else if (parm_count + *ppparm > end_of_smb) {
3992 cifs_dbg(FYI, "parm end after end of smb\n");
3994 } else if (*ppdata > end_of_smb) {
3995 cifs_dbg(FYI, "data starts after end of smb\n");
3997 } else if (data_count + *ppdata > end_of_smb) {
3998 cifs_dbg(FYI, "data %p + count %d (%p) past smb end %p start %p\n",
3999 *ppdata, data_count, (data_count + *ppdata),
4002 } else if (parm_count + data_count > bcc) {
4003 cifs_dbg(FYI, "parm count and data count larger than SMB\n");
4006 *pdatalen = data_count;
4007 *pparmlen = parm_count;
4011 /* Get Security Descriptor (by handle) from remote server for a file or dir */
4013 CIFSSMBGetCIFSACL(const unsigned int xid, struct cifs_tcon *tcon, __u16 fid,
4014 struct cifs_ntsd **acl_inf, __u32 *pbuflen)
4018 QUERY_SEC_DESC_REQ *pSMB;
4020 struct kvec rsp_iov;
4022 cifs_dbg(FYI, "GetCifsACL\n");
4027 rc = smb_init_nttransact(NT_TRANSACT_QUERY_SECURITY_DESC, 0,
4028 8 /* parm len */, tcon, (void **) &pSMB);
4032 pSMB->MaxParameterCount = cpu_to_le32(4);
4033 /* BB TEST with big acls that might need to be e.g. larger than 16K */
4034 pSMB->MaxSetupCount = 0;
4035 pSMB->Fid = fid; /* file handle always le */
4036 pSMB->AclFlags = cpu_to_le32(CIFS_ACL_OWNER | CIFS_ACL_GROUP |
4038 pSMB->ByteCount = cpu_to_le16(11); /* 3 bytes pad + 8 bytes parm */
4039 inc_rfc1001_len(pSMB, 11);
4040 iov[0].iov_base = (char *)pSMB;
4041 iov[0].iov_len = be32_to_cpu(pSMB->hdr.smb_buf_length) + 4;
4043 rc = SendReceive2(xid, tcon->ses, iov, 1 /* num iovec */, &buf_type,
4045 cifs_small_buf_release(pSMB);
4046 cifs_stats_inc(&tcon->stats.cifs_stats.num_acl_get);
4048 cifs_dbg(FYI, "Send error in QuerySecDesc = %d\n", rc);
4049 } else { /* decode response */
4053 struct smb_com_ntransact_rsp *pSMBr;
4056 /* validate_nttransact */
4057 rc = validate_ntransact(rsp_iov.iov_base, (char **)&parm,
4058 &pdata, &parm_len, pbuflen);
4061 pSMBr = (struct smb_com_ntransact_rsp *)rsp_iov.iov_base;
4063 cifs_dbg(FYI, "smb %p parm %p data %p\n",
4064 pSMBr, parm, *acl_inf);
4066 if (le32_to_cpu(pSMBr->ParameterCount) != 4) {
4067 rc = -EIO; /* bad smb */
4072 /* BB check that data area is minimum length and as big as acl_len */
4074 acl_len = le32_to_cpu(*parm);
4075 if (acl_len != *pbuflen) {
4076 cifs_dbg(VFS, "acl length %d does not match %d\n",
4078 if (*pbuflen > acl_len)
4082 /* check if buffer is big enough for the acl
4083 header followed by the smallest SID */
4084 if ((*pbuflen < sizeof(struct cifs_ntsd) + 8) ||
4085 (*pbuflen >= 64 * 1024)) {
4086 cifs_dbg(VFS, "bad acl length %d\n", *pbuflen);
4090 *acl_inf = kmemdup(pdata, *pbuflen, GFP_KERNEL);
4091 if (*acl_inf == NULL) {
4098 free_rsp_buf(buf_type, rsp_iov.iov_base);
4103 CIFSSMBSetCIFSACL(const unsigned int xid, struct cifs_tcon *tcon, __u16 fid,
4104 struct cifs_ntsd *pntsd, __u32 acllen, int aclflag)
4106 __u16 byte_count, param_count, data_count, param_offset, data_offset;
4108 int bytes_returned = 0;
4109 SET_SEC_DESC_REQ *pSMB = NULL;
4113 rc = smb_init(SMB_COM_NT_TRANSACT, 19, tcon, (void **) &pSMB, &pSMBr);
4117 pSMB->MaxSetupCount = 0;
4121 param_offset = offsetof(struct smb_com_transaction_ssec_req, Fid) - 4;
4122 data_count = acllen;
4123 data_offset = param_offset + param_count;
4124 byte_count = 3 /* pad */ + param_count;
4126 pSMB->DataCount = cpu_to_le32(data_count);
4127 pSMB->TotalDataCount = pSMB->DataCount;
4128 pSMB->MaxParameterCount = cpu_to_le32(4);
4129 pSMB->MaxDataCount = cpu_to_le32(16384);
4130 pSMB->ParameterCount = cpu_to_le32(param_count);
4131 pSMB->ParameterOffset = cpu_to_le32(param_offset);
4132 pSMB->TotalParameterCount = pSMB->ParameterCount;
4133 pSMB->DataOffset = cpu_to_le32(data_offset);
4134 pSMB->SetupCount = 0;
4135 pSMB->SubCommand = cpu_to_le16(NT_TRANSACT_SET_SECURITY_DESC);
4136 pSMB->ByteCount = cpu_to_le16(byte_count+data_count);
4138 pSMB->Fid = fid; /* file handle always le */
4139 pSMB->Reserved2 = 0;
4140 pSMB->AclFlags = cpu_to_le32(aclflag);
4142 if (pntsd && acllen) {
4143 memcpy((char *)pSMBr + offsetof(struct smb_hdr, Protocol) +
4144 data_offset, pntsd, acllen);
4145 inc_rfc1001_len(pSMB, byte_count + data_count);
4147 inc_rfc1001_len(pSMB, byte_count);
4149 rc = SendReceive(xid, tcon->ses, (struct smb_hdr *) pSMB,
4150 (struct smb_hdr *) pSMBr, &bytes_returned, 0);
4152 cifs_dbg(FYI, "SetCIFSACL bytes_returned: %d, rc: %d\n",
4153 bytes_returned, rc);
4155 cifs_dbg(FYI, "Set CIFS ACL returned %d\n", rc);
4156 cifs_buf_release(pSMB);
4159 goto setCifsAclRetry;
4164 #endif /* CONFIG_CIFS_ACL */
4166 /* Legacy Query Path Information call for lookup to old servers such
4169 SMBQueryInformation(const unsigned int xid, struct cifs_tcon *tcon,
4170 const char *search_name, FILE_ALL_INFO *data,
4171 const struct nls_table *nls_codepage, int remap)
4173 QUERY_INFORMATION_REQ *pSMB;
4174 QUERY_INFORMATION_RSP *pSMBr;
4179 cifs_dbg(FYI, "In SMBQPath path %s\n", search_name);
4181 rc = smb_init(SMB_COM_QUERY_INFORMATION, 0, tcon, (void **) &pSMB,
4186 if (pSMB->hdr.Flags2 & SMBFLG2_UNICODE) {
4188 cifsConvertToUTF16((__le16 *) pSMB->FileName,
4189 search_name, PATH_MAX, nls_codepage,
4191 name_len++; /* trailing null */
4194 name_len = strnlen(search_name, PATH_MAX);
4195 name_len++; /* trailing null */
4196 strncpy(pSMB->FileName, search_name, name_len);
4198 pSMB->BufferFormat = 0x04;
4199 name_len++; /* account for buffer type byte */
4200 inc_rfc1001_len(pSMB, (__u16)name_len);
4201 pSMB->ByteCount = cpu_to_le16(name_len);
4203 rc = SendReceive(xid, tcon->ses, (struct smb_hdr *) pSMB,
4204 (struct smb_hdr *) pSMBr, &bytes_returned, 0);
4206 cifs_dbg(FYI, "Send error in QueryInfo = %d\n", rc);
4208 struct timespec64 ts;
4209 __u32 time = le32_to_cpu(pSMBr->last_write_time);
4211 /* decode response */
4212 /* BB FIXME - add time zone adjustment BB */
4213 memset(data, 0, sizeof(FILE_ALL_INFO));
4216 /* decode time fields */
4217 data->ChangeTime = cpu_to_le64(cifs_UnixTimeToNT(ts));
4218 data->LastWriteTime = data->ChangeTime;
4219 data->LastAccessTime = 0;
4220 data->AllocationSize =
4221 cpu_to_le64(le32_to_cpu(pSMBr->size));
4222 data->EndOfFile = data->AllocationSize;
4224 cpu_to_le32(le16_to_cpu(pSMBr->attr));
4226 rc = -EIO; /* bad buffer passed in */
4228 cifs_buf_release(pSMB);
4237 CIFSSMBQFileInfo(const unsigned int xid, struct cifs_tcon *tcon,
4238 u16 netfid, FILE_ALL_INFO *pFindData)
4240 struct smb_t2_qfi_req *pSMB = NULL;
4241 struct smb_t2_qfi_rsp *pSMBr = NULL;
4244 __u16 params, byte_count;
4247 rc = smb_init(SMB_COM_TRANSACTION2, 15, tcon, (void **) &pSMB,
4252 params = 2 /* level */ + 2 /* fid */;
4253 pSMB->t2.TotalDataCount = 0;
4254 pSMB->t2.MaxParameterCount = cpu_to_le16(4);
4255 /* BB find exact max data count below from sess structure BB */
4256 pSMB->t2.MaxDataCount = cpu_to_le16(CIFSMaxBufSize);
4257 pSMB->t2.MaxSetupCount = 0;
4258 pSMB->t2.Reserved = 0;
4260 pSMB->t2.Timeout = 0;
4261 pSMB->t2.Reserved2 = 0;
4262 pSMB->t2.ParameterOffset = cpu_to_le16(offsetof(struct smb_t2_qfi_req,
4264 pSMB->t2.DataCount = 0;
4265 pSMB->t2.DataOffset = 0;
4266 pSMB->t2.SetupCount = 1;
4267 pSMB->t2.Reserved3 = 0;
4268 pSMB->t2.SubCommand = cpu_to_le16(TRANS2_QUERY_FILE_INFORMATION);
4269 byte_count = params + 1 /* pad */ ;
4270 pSMB->t2.TotalParameterCount = cpu_to_le16(params);
4271 pSMB->t2.ParameterCount = pSMB->t2.TotalParameterCount;
4272 pSMB->InformationLevel = cpu_to_le16(SMB_QUERY_FILE_ALL_INFO);
4275 inc_rfc1001_len(pSMB, byte_count);
4276 pSMB->t2.ByteCount = cpu_to_le16(byte_count);
4278 rc = SendReceive(xid, tcon->ses, (struct smb_hdr *) pSMB,
4279 (struct smb_hdr *) pSMBr, &bytes_returned, 0);
4281 cifs_dbg(FYI, "Send error in QFileInfo = %d", rc);
4282 } else { /* decode response */
4283 rc = validate_t2((struct smb_t2_rsp *)pSMBr);
4285 if (rc) /* BB add auto retry on EOPNOTSUPP? */
4287 else if (get_bcc(&pSMBr->hdr) < 40)
4288 rc = -EIO; /* bad smb */
4289 else if (pFindData) {
4290 __u16 data_offset = le16_to_cpu(pSMBr->t2.DataOffset);
4291 memcpy((char *) pFindData,
4292 (char *) &pSMBr->hdr.Protocol +
4293 data_offset, sizeof(FILE_ALL_INFO));
4297 cifs_buf_release(pSMB);
4299 goto QFileInfoRetry;
4305 CIFSSMBQPathInfo(const unsigned int xid, struct cifs_tcon *tcon,
4306 const char *search_name, FILE_ALL_INFO *data,
4307 int legacy /* old style infolevel */,
4308 const struct nls_table *nls_codepage, int remap)
4310 /* level 263 SMB_QUERY_FILE_ALL_INFO */
4311 TRANSACTION2_QPI_REQ *pSMB = NULL;
4312 TRANSACTION2_QPI_RSP *pSMBr = NULL;
4316 __u16 params, byte_count;
4318 /* cifs_dbg(FYI, "In QPathInfo path %s\n", search_name); */
4320 rc = smb_init(SMB_COM_TRANSACTION2, 15, tcon, (void **) &pSMB,
4325 if (pSMB->hdr.Flags2 & SMBFLG2_UNICODE) {
4327 cifsConvertToUTF16((__le16 *) pSMB->FileName, search_name,
4328 PATH_MAX, nls_codepage, remap);
4329 name_len++; /* trailing null */
4331 } else { /* BB improve the check for buffer overruns BB */
4332 name_len = strnlen(search_name, PATH_MAX);
4333 name_len++; /* trailing null */
4334 strncpy(pSMB->FileName, search_name, name_len);
4337 params = 2 /* level */ + 4 /* reserved */ + name_len /* includes NUL */;
4338 pSMB->TotalDataCount = 0;
4339 pSMB->MaxParameterCount = cpu_to_le16(2);
4340 /* BB find exact max SMB PDU from sess structure BB */
4341 pSMB->MaxDataCount = cpu_to_le16(4000);
4342 pSMB->MaxSetupCount = 0;
4346 pSMB->Reserved2 = 0;
4347 pSMB->ParameterOffset = cpu_to_le16(offsetof(
4348 struct smb_com_transaction2_qpi_req, InformationLevel) - 4);
4349 pSMB->DataCount = 0;
4350 pSMB->DataOffset = 0;
4351 pSMB->SetupCount = 1;
4352 pSMB->Reserved3 = 0;
4353 pSMB->SubCommand = cpu_to_le16(TRANS2_QUERY_PATH_INFORMATION);
4354 byte_count = params + 1 /* pad */ ;
4355 pSMB->TotalParameterCount = cpu_to_le16(params);
4356 pSMB->ParameterCount = pSMB->TotalParameterCount;
4358 pSMB->InformationLevel = cpu_to_le16(SMB_INFO_STANDARD);
4360 pSMB->InformationLevel = cpu_to_le16(SMB_QUERY_FILE_ALL_INFO);
4361 pSMB->Reserved4 = 0;
4362 inc_rfc1001_len(pSMB, byte_count);
4363 pSMB->ByteCount = cpu_to_le16(byte_count);
4365 rc = SendReceive(xid, tcon->ses, (struct smb_hdr *) pSMB,
4366 (struct smb_hdr *) pSMBr, &bytes_returned, 0);
4368 cifs_dbg(FYI, "Send error in QPathInfo = %d\n", rc);
4369 } else { /* decode response */
4370 rc = validate_t2((struct smb_t2_rsp *)pSMBr);
4372 if (rc) /* BB add auto retry on EOPNOTSUPP? */
4374 else if (!legacy && get_bcc(&pSMBr->hdr) < 40)
4375 rc = -EIO; /* bad smb */
4376 else if (legacy && get_bcc(&pSMBr->hdr) < 24)
4377 rc = -EIO; /* 24 or 26 expected but we do not read
4381 __u16 data_offset = le16_to_cpu(pSMBr->t2.DataOffset);
4384 * On legacy responses we do not read the last field,
4385 * EAsize, fortunately since it varies by subdialect and
4386 * also note it differs on Set vs Get, ie two bytes or 4
4387 * bytes depending but we don't care here.
4390 size = sizeof(FILE_INFO_STANDARD);
4392 size = sizeof(FILE_ALL_INFO);
4393 memcpy((char *) data, (char *) &pSMBr->hdr.Protocol +
4398 cifs_buf_release(pSMB);
4400 goto QPathInfoRetry;
4406 CIFSSMBUnixQFileInfo(const unsigned int xid, struct cifs_tcon *tcon,
4407 u16 netfid, FILE_UNIX_BASIC_INFO *pFindData)
4409 struct smb_t2_qfi_req *pSMB = NULL;
4410 struct smb_t2_qfi_rsp *pSMBr = NULL;
4413 __u16 params, byte_count;
4416 rc = smb_init(SMB_COM_TRANSACTION2, 15, tcon, (void **) &pSMB,
4421 params = 2 /* level */ + 2 /* fid */;
4422 pSMB->t2.TotalDataCount = 0;
4423 pSMB->t2.MaxParameterCount = cpu_to_le16(4);
4424 /* BB find exact max data count below from sess structure BB */
4425 pSMB->t2.MaxDataCount = cpu_to_le16(CIFSMaxBufSize);
4426 pSMB->t2.MaxSetupCount = 0;
4427 pSMB->t2.Reserved = 0;
4429 pSMB->t2.Timeout = 0;
4430 pSMB->t2.Reserved2 = 0;
4431 pSMB->t2.ParameterOffset = cpu_to_le16(offsetof(struct smb_t2_qfi_req,
4433 pSMB->t2.DataCount = 0;
4434 pSMB->t2.DataOffset = 0;
4435 pSMB->t2.SetupCount = 1;
4436 pSMB->t2.Reserved3 = 0;
4437 pSMB->t2.SubCommand = cpu_to_le16(TRANS2_QUERY_FILE_INFORMATION);
4438 byte_count = params + 1 /* pad */ ;
4439 pSMB->t2.TotalParameterCount = cpu_to_le16(params);
4440 pSMB->t2.ParameterCount = pSMB->t2.TotalParameterCount;
4441 pSMB->InformationLevel = cpu_to_le16(SMB_QUERY_FILE_UNIX_BASIC);
4444 inc_rfc1001_len(pSMB, byte_count);
4445 pSMB->t2.ByteCount = cpu_to_le16(byte_count);
4447 rc = SendReceive(xid, tcon->ses, (struct smb_hdr *) pSMB,
4448 (struct smb_hdr *) pSMBr, &bytes_returned, 0);
4450 cifs_dbg(FYI, "Send error in UnixQFileInfo = %d", rc);
4451 } else { /* decode response */
4452 rc = validate_t2((struct smb_t2_rsp *)pSMBr);
4454 if (rc || get_bcc(&pSMBr->hdr) < sizeof(FILE_UNIX_BASIC_INFO)) {
4455 cifs_dbg(VFS, "Malformed FILE_UNIX_BASIC_INFO response. Unix Extensions can be disabled on mount by specifying the nosfu mount option.\n");
4456 rc = -EIO; /* bad smb */
4458 __u16 data_offset = le16_to_cpu(pSMBr->t2.DataOffset);
4459 memcpy((char *) pFindData,
4460 (char *) &pSMBr->hdr.Protocol +
4462 sizeof(FILE_UNIX_BASIC_INFO));
4466 cifs_buf_release(pSMB);
4468 goto UnixQFileInfoRetry;
4474 CIFSSMBUnixQPathInfo(const unsigned int xid, struct cifs_tcon *tcon,
4475 const unsigned char *searchName,
4476 FILE_UNIX_BASIC_INFO *pFindData,
4477 const struct nls_table *nls_codepage, int remap)
4479 /* SMB_QUERY_FILE_UNIX_BASIC */
4480 TRANSACTION2_QPI_REQ *pSMB = NULL;
4481 TRANSACTION2_QPI_RSP *pSMBr = NULL;
4483 int bytes_returned = 0;
4485 __u16 params, byte_count;
4487 cifs_dbg(FYI, "In QPathInfo (Unix) the path %s\n", searchName);
4489 rc = smb_init(SMB_COM_TRANSACTION2, 15, tcon, (void **) &pSMB,
4494 if (pSMB->hdr.Flags2 & SMBFLG2_UNICODE) {
4496 cifsConvertToUTF16((__le16 *) pSMB->FileName, searchName,
4497 PATH_MAX, nls_codepage, remap);
4498 name_len++; /* trailing null */
4500 } else { /* BB improve the check for buffer overruns BB */
4501 name_len = strnlen(searchName, PATH_MAX);
4502 name_len++; /* trailing null */
4503 strncpy(pSMB->FileName, searchName, name_len);
4506 params = 2 /* level */ + 4 /* reserved */ + name_len /* includes NUL */;
4507 pSMB->TotalDataCount = 0;
4508 pSMB->MaxParameterCount = cpu_to_le16(2);
4509 /* BB find exact max SMB PDU from sess structure BB */
4510 pSMB->MaxDataCount = cpu_to_le16(4000);
4511 pSMB->MaxSetupCount = 0;
4515 pSMB->Reserved2 = 0;
4516 pSMB->ParameterOffset = cpu_to_le16(offsetof(
4517 struct smb_com_transaction2_qpi_req, InformationLevel) - 4);
4518 pSMB->DataCount = 0;
4519 pSMB->DataOffset = 0;
4520 pSMB->SetupCount = 1;
4521 pSMB->Reserved3 = 0;
4522 pSMB->SubCommand = cpu_to_le16(TRANS2_QUERY_PATH_INFORMATION);
4523 byte_count = params + 1 /* pad */ ;
4524 pSMB->TotalParameterCount = cpu_to_le16(params);
4525 pSMB->ParameterCount = pSMB->TotalParameterCount;
4526 pSMB->InformationLevel = cpu_to_le16(SMB_QUERY_FILE_UNIX_BASIC);
4527 pSMB->Reserved4 = 0;
4528 inc_rfc1001_len(pSMB, byte_count);
4529 pSMB->ByteCount = cpu_to_le16(byte_count);
4531 rc = SendReceive(xid, tcon->ses, (struct smb_hdr *) pSMB,
4532 (struct smb_hdr *) pSMBr, &bytes_returned, 0);
4534 cifs_dbg(FYI, "Send error in UnixQPathInfo = %d", rc);
4535 } else { /* decode response */
4536 rc = validate_t2((struct smb_t2_rsp *)pSMBr);
4538 if (rc || get_bcc(&pSMBr->hdr) < sizeof(FILE_UNIX_BASIC_INFO)) {
4539 cifs_dbg(VFS, "Malformed FILE_UNIX_BASIC_INFO response. Unix Extensions can be disabled on mount by specifying the nosfu mount option.\n");
4540 rc = -EIO; /* bad smb */
4542 __u16 data_offset = le16_to_cpu(pSMBr->t2.DataOffset);
4543 memcpy((char *) pFindData,
4544 (char *) &pSMBr->hdr.Protocol +
4546 sizeof(FILE_UNIX_BASIC_INFO));
4549 cifs_buf_release(pSMB);
4551 goto UnixQPathInfoRetry;
4556 /* xid, tcon, searchName and codepage are input parms, rest are returned */
4558 CIFSFindFirst(const unsigned int xid, struct cifs_tcon *tcon,
4559 const char *searchName, struct cifs_sb_info *cifs_sb,
4560 __u16 *pnetfid, __u16 search_flags,
4561 struct cifs_search_info *psrch_inf, bool msearch)
4563 /* level 257 SMB_ */
4564 TRANSACTION2_FFIRST_REQ *pSMB = NULL;
4565 TRANSACTION2_FFIRST_RSP *pSMBr = NULL;
4566 T2_FFIRST_RSP_PARMS *parms;
4568 int bytes_returned = 0;
4569 int name_len, remap;
4570 __u16 params, byte_count;
4571 struct nls_table *nls_codepage;
4573 cifs_dbg(FYI, "In FindFirst for %s\n", searchName);
4576 rc = smb_init(SMB_COM_TRANSACTION2, 15, tcon, (void **) &pSMB,
4581 nls_codepage = cifs_sb->local_nls;
4582 remap = cifs_remap(cifs_sb);
4584 if (pSMB->hdr.Flags2 & SMBFLG2_UNICODE) {
4586 cifsConvertToUTF16((__le16 *) pSMB->FileName, searchName,
4587 PATH_MAX, nls_codepage, remap);
4588 /* We can not add the asterik earlier in case
4589 it got remapped to 0xF03A as if it were part of the
4590 directory name instead of a wildcard */
4593 pSMB->FileName[name_len] = CIFS_DIR_SEP(cifs_sb);
4594 pSMB->FileName[name_len+1] = 0;
4595 pSMB->FileName[name_len+2] = '*';
4596 pSMB->FileName[name_len+3] = 0;
4597 name_len += 4; /* now the trailing null */
4598 /* null terminate just in case */
4599 pSMB->FileName[name_len] = 0;
4600 pSMB->FileName[name_len+1] = 0;
4603 } else { /* BB add check for overrun of SMB buf BB */
4604 name_len = strnlen(searchName, PATH_MAX);
4605 /* BB fix here and in unicode clause above ie
4606 if (name_len > buffersize-header)
4607 free buffer exit; BB */
4608 strncpy(pSMB->FileName, searchName, name_len);
4610 pSMB->FileName[name_len] = CIFS_DIR_SEP(cifs_sb);
4611 pSMB->FileName[name_len+1] = '*';
4612 pSMB->FileName[name_len+2] = 0;
4617 params = 12 + name_len /* includes null */ ;
4618 pSMB->TotalDataCount = 0; /* no EAs */
4619 pSMB->MaxParameterCount = cpu_to_le16(10);
4620 pSMB->MaxDataCount = cpu_to_le16(CIFSMaxBufSize & 0xFFFFFF00);
4621 pSMB->MaxSetupCount = 0;
4625 pSMB->Reserved2 = 0;
4626 byte_count = params + 1 /* pad */ ;
4627 pSMB->TotalParameterCount = cpu_to_le16(params);
4628 pSMB->ParameterCount = pSMB->TotalParameterCount;
4629 pSMB->ParameterOffset = cpu_to_le16(
4630 offsetof(struct smb_com_transaction2_ffirst_req, SearchAttributes)
4632 pSMB->DataCount = 0;
4633 pSMB->DataOffset = 0;
4634 pSMB->SetupCount = 1; /* one byte, no need to make endian neutral */
4635 pSMB->Reserved3 = 0;
4636 pSMB->SubCommand = cpu_to_le16(TRANS2_FIND_FIRST);
4637 pSMB->SearchAttributes =
4638 cpu_to_le16(ATTR_READONLY | ATTR_HIDDEN | ATTR_SYSTEM |
4640 pSMB->SearchCount = cpu_to_le16(CIFSMaxBufSize/sizeof(FILE_UNIX_INFO));
4641 pSMB->SearchFlags = cpu_to_le16(search_flags);
4642 pSMB->InformationLevel = cpu_to_le16(psrch_inf->info_level);
4644 /* BB what should we set StorageType to? Does it matter? BB */
4645 pSMB->SearchStorageType = 0;
4646 inc_rfc1001_len(pSMB, byte_count);
4647 pSMB->ByteCount = cpu_to_le16(byte_count);
4649 rc = SendReceive(xid, tcon->ses, (struct smb_hdr *) pSMB,
4650 (struct smb_hdr *) pSMBr, &bytes_returned, 0);
4651 cifs_stats_inc(&tcon->stats.cifs_stats.num_ffirst);
4653 if (rc) {/* BB add logic to retry regular search if Unix search
4654 rejected unexpectedly by server */
4655 /* BB Add code to handle unsupported level rc */
4656 cifs_dbg(FYI, "Error in FindFirst = %d\n", rc);
4658 cifs_buf_release(pSMB);
4660 /* BB eventually could optimize out free and realloc of buf */
4663 goto findFirstRetry;
4664 } else { /* decode response */
4665 /* BB remember to free buffer if error BB */
4666 rc = validate_t2((struct smb_t2_rsp *)pSMBr);
4670 if (pSMBr->hdr.Flags2 & SMBFLG2_UNICODE)
4671 psrch_inf->unicode = true;
4673 psrch_inf->unicode = false;
4675 psrch_inf->ntwrk_buf_start = (char *)pSMBr;
4676 psrch_inf->smallBuf = 0;
4677 psrch_inf->srch_entries_start =
4678 (char *) &pSMBr->hdr.Protocol +
4679 le16_to_cpu(pSMBr->t2.DataOffset);
4680 parms = (T2_FFIRST_RSP_PARMS *)((char *) &pSMBr->hdr.Protocol +
4681 le16_to_cpu(pSMBr->t2.ParameterOffset));
4683 if (parms->EndofSearch)
4684 psrch_inf->endOfSearch = true;
4686 psrch_inf->endOfSearch = false;
4688 psrch_inf->entries_in_buffer =
4689 le16_to_cpu(parms->SearchCount);
4690 psrch_inf->index_of_last_entry = 2 /* skip . and .. */ +
4691 psrch_inf->entries_in_buffer;
4692 lnoff = le16_to_cpu(parms->LastNameOffset);
4693 if (CIFSMaxBufSize < lnoff) {
4694 cifs_dbg(VFS, "ignoring corrupt resume name\n");
4695 psrch_inf->last_entry = NULL;
4699 psrch_inf->last_entry = psrch_inf->srch_entries_start +
4703 *pnetfid = parms->SearchHandle;
4705 cifs_buf_release(pSMB);
4712 int CIFSFindNext(const unsigned int xid, struct cifs_tcon *tcon,
4713 __u16 searchHandle, __u16 search_flags,
4714 struct cifs_search_info *psrch_inf)
4716 TRANSACTION2_FNEXT_REQ *pSMB = NULL;
4717 TRANSACTION2_FNEXT_RSP *pSMBr = NULL;
4718 T2_FNEXT_RSP_PARMS *parms;
4719 char *response_data;
4722 unsigned int name_len;
4723 __u16 params, byte_count;
4725 cifs_dbg(FYI, "In FindNext\n");
4727 if (psrch_inf->endOfSearch)
4730 rc = smb_init(SMB_COM_TRANSACTION2, 15, tcon, (void **) &pSMB,
4735 params = 14; /* includes 2 bytes of null string, converted to LE below*/
4737 pSMB->TotalDataCount = 0; /* no EAs */
4738 pSMB->MaxParameterCount = cpu_to_le16(8);
4739 pSMB->MaxDataCount = cpu_to_le16(CIFSMaxBufSize & 0xFFFFFF00);
4740 pSMB->MaxSetupCount = 0;
4744 pSMB->Reserved2 = 0;
4745 pSMB->ParameterOffset = cpu_to_le16(
4746 offsetof(struct smb_com_transaction2_fnext_req,SearchHandle) - 4);
4747 pSMB->DataCount = 0;
4748 pSMB->DataOffset = 0;
4749 pSMB->SetupCount = 1;
4750 pSMB->Reserved3 = 0;
4751 pSMB->SubCommand = cpu_to_le16(TRANS2_FIND_NEXT);
4752 pSMB->SearchHandle = searchHandle; /* always kept as le */
4754 cpu_to_le16(CIFSMaxBufSize / sizeof(FILE_UNIX_INFO));
4755 pSMB->InformationLevel = cpu_to_le16(psrch_inf->info_level);
4756 pSMB->ResumeKey = psrch_inf->resume_key;
4757 pSMB->SearchFlags = cpu_to_le16(search_flags);
4759 name_len = psrch_inf->resume_name_len;
4761 if (name_len < PATH_MAX) {
4762 memcpy(pSMB->ResumeFileName, psrch_inf->presume_name, name_len);
4763 byte_count += name_len;
4764 /* 14 byte parm len above enough for 2 byte null terminator */
4765 pSMB->ResumeFileName[name_len] = 0;
4766 pSMB->ResumeFileName[name_len+1] = 0;
4769 goto FNext2_err_exit;
4771 byte_count = params + 1 /* pad */ ;
4772 pSMB->TotalParameterCount = cpu_to_le16(params);
4773 pSMB->ParameterCount = pSMB->TotalParameterCount;
4774 inc_rfc1001_len(pSMB, byte_count);
4775 pSMB->ByteCount = cpu_to_le16(byte_count);
4777 rc = SendReceive(xid, tcon->ses, (struct smb_hdr *) pSMB,
4778 (struct smb_hdr *) pSMBr, &bytes_returned, 0);
4779 cifs_stats_inc(&tcon->stats.cifs_stats.num_fnext);
4782 psrch_inf->endOfSearch = true;
4783 cifs_buf_release(pSMB);
4784 rc = 0; /* search probably was closed at end of search*/
4786 cifs_dbg(FYI, "FindNext returned = %d\n", rc);
4787 } else { /* decode response */
4788 rc = validate_t2((struct smb_t2_rsp *)pSMBr);
4793 /* BB fixme add lock for file (srch_info) struct here */
4794 if (pSMBr->hdr.Flags2 & SMBFLG2_UNICODE)
4795 psrch_inf->unicode = true;
4797 psrch_inf->unicode = false;
4798 response_data = (char *) &pSMBr->hdr.Protocol +
4799 le16_to_cpu(pSMBr->t2.ParameterOffset);
4800 parms = (T2_FNEXT_RSP_PARMS *)response_data;
4801 response_data = (char *)&pSMBr->hdr.Protocol +
4802 le16_to_cpu(pSMBr->t2.DataOffset);
4803 if (psrch_inf->smallBuf)
4804 cifs_small_buf_release(
4805 psrch_inf->ntwrk_buf_start);
4807 cifs_buf_release(psrch_inf->ntwrk_buf_start);
4808 psrch_inf->srch_entries_start = response_data;
4809 psrch_inf->ntwrk_buf_start = (char *)pSMB;
4810 psrch_inf->smallBuf = 0;
4811 if (parms->EndofSearch)
4812 psrch_inf->endOfSearch = true;
4814 psrch_inf->endOfSearch = false;
4815 psrch_inf->entries_in_buffer =
4816 le16_to_cpu(parms->SearchCount);
4817 psrch_inf->index_of_last_entry +=
4818 psrch_inf->entries_in_buffer;
4819 lnoff = le16_to_cpu(parms->LastNameOffset);
4820 if (CIFSMaxBufSize < lnoff) {
4821 cifs_dbg(VFS, "ignoring corrupt resume name\n");
4822 psrch_inf->last_entry = NULL;
4825 psrch_inf->last_entry =
4826 psrch_inf->srch_entries_start + lnoff;
4828 /* cifs_dbg(FYI, "fnxt2 entries in buf %d index_of_last %d\n",
4829 psrch_inf->entries_in_buffer, psrch_inf->index_of_last_entry); */
4831 /* BB fixme add unlock here */
4836 /* BB On error, should we leave previous search buf (and count and
4837 last entry fields) intact or free the previous one? */
4839 /* Note: On -EAGAIN error only caller can retry on handle based calls
4840 since file handle passed in no longer valid */
4843 cifs_buf_release(pSMB);
4848 CIFSFindClose(const unsigned int xid, struct cifs_tcon *tcon,
4849 const __u16 searchHandle)
4852 FINDCLOSE_REQ *pSMB = NULL;
4854 cifs_dbg(FYI, "In CIFSSMBFindClose\n");
4855 rc = small_smb_init(SMB_COM_FIND_CLOSE2, 1, tcon, (void **)&pSMB);
4857 /* no sense returning error if session restarted
4858 as file handle has been closed */
4864 pSMB->FileID = searchHandle;
4865 pSMB->ByteCount = 0;
4866 rc = SendReceiveNoRsp(xid, tcon->ses, (char *) pSMB, 0);
4867 cifs_small_buf_release(pSMB);
4869 cifs_dbg(VFS, "Send error in FindClose = %d\n", rc);
4871 cifs_stats_inc(&tcon->stats.cifs_stats.num_fclose);
4873 /* Since session is dead, search handle closed on server already */
4881 CIFSGetSrvInodeNumber(const unsigned int xid, struct cifs_tcon *tcon,
4882 const char *search_name, __u64 *inode_number,
4883 const struct nls_table *nls_codepage, int remap)
4886 TRANSACTION2_QPI_REQ *pSMB = NULL;
4887 TRANSACTION2_QPI_RSP *pSMBr = NULL;
4888 int name_len, bytes_returned;
4889 __u16 params, byte_count;
4891 cifs_dbg(FYI, "In GetSrvInodeNum for %s\n", search_name);
4895 GetInodeNumberRetry:
4896 rc = smb_init(SMB_COM_TRANSACTION2, 15, tcon, (void **) &pSMB,
4901 if (pSMB->hdr.Flags2 & SMBFLG2_UNICODE) {
4903 cifsConvertToUTF16((__le16 *) pSMB->FileName,
4904 search_name, PATH_MAX, nls_codepage,
4906 name_len++; /* trailing null */
4908 } else { /* BB improve the check for buffer overruns BB */
4909 name_len = strnlen(search_name, PATH_MAX);
4910 name_len++; /* trailing null */
4911 strncpy(pSMB->FileName, search_name, name_len);
4914 params = 2 /* level */ + 4 /* rsrvd */ + name_len /* incl null */ ;
4915 pSMB->TotalDataCount = 0;
4916 pSMB->MaxParameterCount = cpu_to_le16(2);
4917 /* BB find exact max data count below from sess structure BB */
4918 pSMB->MaxDataCount = cpu_to_le16(4000);
4919 pSMB->MaxSetupCount = 0;
4923 pSMB->Reserved2 = 0;
4924 pSMB->ParameterOffset = cpu_to_le16(offsetof(
4925 struct smb_com_transaction2_qpi_req, InformationLevel) - 4);
4926 pSMB->DataCount = 0;
4927 pSMB->DataOffset = 0;
4928 pSMB->SetupCount = 1;
4929 pSMB->Reserved3 = 0;
4930 pSMB->SubCommand = cpu_to_le16(TRANS2_QUERY_PATH_INFORMATION);
4931 byte_count = params + 1 /* pad */ ;
4932 pSMB->TotalParameterCount = cpu_to_le16(params);
4933 pSMB->ParameterCount = pSMB->TotalParameterCount;
4934 pSMB->InformationLevel = cpu_to_le16(SMB_QUERY_FILE_INTERNAL_INFO);
4935 pSMB->Reserved4 = 0;
4936 inc_rfc1001_len(pSMB, byte_count);
4937 pSMB->ByteCount = cpu_to_le16(byte_count);
4939 rc = SendReceive(xid, tcon->ses, (struct smb_hdr *) pSMB,
4940 (struct smb_hdr *) pSMBr, &bytes_returned, 0);
4942 cifs_dbg(FYI, "error %d in QueryInternalInfo\n", rc);
4944 /* decode response */
4945 rc = validate_t2((struct smb_t2_rsp *)pSMBr);
4946 /* BB also check enough total bytes returned */
4947 if (rc || get_bcc(&pSMBr->hdr) < 2)
4948 /* If rc should we check for EOPNOSUPP and
4949 disable the srvino flag? or in caller? */
4950 rc = -EIO; /* bad smb */
4952 __u16 data_offset = le16_to_cpu(pSMBr->t2.DataOffset);
4953 __u16 count = le16_to_cpu(pSMBr->t2.DataCount);
4954 struct file_internal_info *pfinfo;
4955 /* BB Do we need a cast or hash here ? */
4957 cifs_dbg(FYI, "Illegal size ret in QryIntrnlInf\n");
4959 goto GetInodeNumOut;
4961 pfinfo = (struct file_internal_info *)
4962 (data_offset + (char *) &pSMBr->hdr.Protocol);
4963 *inode_number = le64_to_cpu(pfinfo->UniqueId);
4967 cifs_buf_release(pSMB);
4969 goto GetInodeNumberRetry;
4974 CIFSGetDFSRefer(const unsigned int xid, struct cifs_ses *ses,
4975 const char *search_name, struct dfs_info3_param **target_nodes,
4976 unsigned int *num_of_nodes,
4977 const struct nls_table *nls_codepage, int remap)
4979 /* TRANS2_GET_DFS_REFERRAL */
4980 TRANSACTION2_GET_DFS_REFER_REQ *pSMB = NULL;
4981 TRANSACTION2_GET_DFS_REFER_RSP *pSMBr = NULL;
4985 __u16 params, byte_count;
4987 *target_nodes = NULL;
4989 cifs_dbg(FYI, "In GetDFSRefer the path %s\n", search_name);
4990 if (ses == NULL || ses->tcon_ipc == NULL)
4994 rc = smb_init(SMB_COM_TRANSACTION2, 15, ses->tcon_ipc, (void **) &pSMB,
4999 /* server pointer checked in called function,
5000 but should never be null here anyway */
5001 pSMB->hdr.Mid = get_next_mid(ses->server);
5002 pSMB->hdr.Tid = ses->tcon_ipc->tid;
5003 pSMB->hdr.Uid = ses->Suid;
5004 if (ses->capabilities & CAP_STATUS32)
5005 pSMB->hdr.Flags2 |= SMBFLG2_ERR_STATUS;
5006 if (ses->capabilities & CAP_DFS)
5007 pSMB->hdr.Flags2 |= SMBFLG2_DFS;
5009 if (ses->capabilities & CAP_UNICODE) {
5010 pSMB->hdr.Flags2 |= SMBFLG2_UNICODE;
5012 cifsConvertToUTF16((__le16 *) pSMB->RequestFileName,
5013 search_name, PATH_MAX, nls_codepage,
5015 name_len++; /* trailing null */
5017 } else { /* BB improve the check for buffer overruns BB */
5018 name_len = strnlen(search_name, PATH_MAX);
5019 name_len++; /* trailing null */
5020 strncpy(pSMB->RequestFileName, search_name, name_len);
5023 if (ses->server->sign)
5024 pSMB->hdr.Flags2 |= SMBFLG2_SECURITY_SIGNATURE;
5026 pSMB->hdr.Uid = ses->Suid;
5028 params = 2 /* level */ + name_len /*includes null */ ;
5029 pSMB->TotalDataCount = 0;
5030 pSMB->DataCount = 0;
5031 pSMB->DataOffset = 0;
5032 pSMB->MaxParameterCount = 0;
5033 /* BB find exact max SMB PDU from sess structure BB */
5034 pSMB->MaxDataCount = cpu_to_le16(4000);
5035 pSMB->MaxSetupCount = 0;
5039 pSMB->Reserved2 = 0;
5040 pSMB->ParameterOffset = cpu_to_le16(offsetof(
5041 struct smb_com_transaction2_get_dfs_refer_req, MaxReferralLevel) - 4);
5042 pSMB->SetupCount = 1;
5043 pSMB->Reserved3 = 0;
5044 pSMB->SubCommand = cpu_to_le16(TRANS2_GET_DFS_REFERRAL);
5045 byte_count = params + 3 /* pad */ ;
5046 pSMB->ParameterCount = cpu_to_le16(params);
5047 pSMB->TotalParameterCount = pSMB->ParameterCount;
5048 pSMB->MaxReferralLevel = cpu_to_le16(3);
5049 inc_rfc1001_len(pSMB, byte_count);
5050 pSMB->ByteCount = cpu_to_le16(byte_count);
5052 rc = SendReceive(xid, ses, (struct smb_hdr *) pSMB,
5053 (struct smb_hdr *) pSMBr, &bytes_returned, 0);
5055 cifs_dbg(FYI, "Send error in GetDFSRefer = %d\n", rc);
5058 rc = validate_t2((struct smb_t2_rsp *)pSMBr);
5060 /* BB Also check if enough total bytes returned? */
5061 if (rc || get_bcc(&pSMBr->hdr) < 17) {
5062 rc = -EIO; /* bad smb */
5066 cifs_dbg(FYI, "Decoding GetDFSRefer response BCC: %d Offset %d\n",
5067 get_bcc(&pSMBr->hdr), le16_to_cpu(pSMBr->t2.DataOffset));
5069 /* parse returned result into more usable form */
5070 rc = parse_dfs_referrals(&pSMBr->dfs_data,
5071 le16_to_cpu(pSMBr->t2.DataCount),
5072 num_of_nodes, target_nodes, nls_codepage,
5074 (pSMBr->hdr.Flags2 & SMBFLG2_UNICODE) != 0);
5077 cifs_buf_release(pSMB);
5085 /* Query File System Info such as free space to old servers such as Win 9x */
5087 SMBOldQFSInfo(const unsigned int xid, struct cifs_tcon *tcon,
5088 struct kstatfs *FSData)
5090 /* level 0x01 SMB_QUERY_FILE_SYSTEM_INFO */
5091 TRANSACTION2_QFSI_REQ *pSMB = NULL;
5092 TRANSACTION2_QFSI_RSP *pSMBr = NULL;
5093 FILE_SYSTEM_ALLOC_INFO *response_data;
5095 int bytes_returned = 0;
5096 __u16 params, byte_count;
5098 cifs_dbg(FYI, "OldQFSInfo\n");
5100 rc = smb_init(SMB_COM_TRANSACTION2, 15, tcon, (void **) &pSMB,
5105 params = 2; /* level */
5106 pSMB->TotalDataCount = 0;
5107 pSMB->MaxParameterCount = cpu_to_le16(2);
5108 pSMB->MaxDataCount = cpu_to_le16(1000);
5109 pSMB->MaxSetupCount = 0;
5113 pSMB->Reserved2 = 0;
5114 byte_count = params + 1 /* pad */ ;
5115 pSMB->TotalParameterCount = cpu_to_le16(params);
5116 pSMB->ParameterCount = pSMB->TotalParameterCount;
5117 pSMB->ParameterOffset = cpu_to_le16(offsetof(
5118 struct smb_com_transaction2_qfsi_req, InformationLevel) - 4);
5119 pSMB->DataCount = 0;
5120 pSMB->DataOffset = 0;
5121 pSMB->SetupCount = 1;
5122 pSMB->Reserved3 = 0;
5123 pSMB->SubCommand = cpu_to_le16(TRANS2_QUERY_FS_INFORMATION);
5124 pSMB->InformationLevel = cpu_to_le16(SMB_INFO_ALLOCATION);
5125 inc_rfc1001_len(pSMB, byte_count);
5126 pSMB->ByteCount = cpu_to_le16(byte_count);
5128 rc = SendReceive(xid, tcon->ses, (struct smb_hdr *) pSMB,
5129 (struct smb_hdr *) pSMBr, &bytes_returned, 0);
5131 cifs_dbg(FYI, "Send error in QFSInfo = %d\n", rc);
5132 } else { /* decode response */
5133 rc = validate_t2((struct smb_t2_rsp *)pSMBr);
5135 if (rc || get_bcc(&pSMBr->hdr) < 18)
5136 rc = -EIO; /* bad smb */
5138 __u16 data_offset = le16_to_cpu(pSMBr->t2.DataOffset);
5139 cifs_dbg(FYI, "qfsinf resp BCC: %d Offset %d\n",
5140 get_bcc(&pSMBr->hdr), data_offset);
5142 response_data = (FILE_SYSTEM_ALLOC_INFO *)
5143 (((char *) &pSMBr->hdr.Protocol) + data_offset);
5145 le16_to_cpu(response_data->BytesPerSector) *
5146 le32_to_cpu(response_data->
5147 SectorsPerAllocationUnit);
5149 * much prefer larger but if server doesn't report
5150 * a valid size than 4K is a reasonable minimum
5152 if (FSData->f_bsize < 512)
5153 FSData->f_bsize = 4096;
5156 le32_to_cpu(response_data->TotalAllocationUnits);
5157 FSData->f_bfree = FSData->f_bavail =
5158 le32_to_cpu(response_data->FreeAllocationUnits);
5159 cifs_dbg(FYI, "Blocks: %lld Free: %lld Block size %ld\n",
5160 (unsigned long long)FSData->f_blocks,
5161 (unsigned long long)FSData->f_bfree,
5165 cifs_buf_release(pSMB);
5168 goto oldQFSInfoRetry;
5174 CIFSSMBQFSInfo(const unsigned int xid, struct cifs_tcon *tcon,
5175 struct kstatfs *FSData)
5177 /* level 0x103 SMB_QUERY_FILE_SYSTEM_INFO */
5178 TRANSACTION2_QFSI_REQ *pSMB = NULL;
5179 TRANSACTION2_QFSI_RSP *pSMBr = NULL;
5180 FILE_SYSTEM_INFO *response_data;
5182 int bytes_returned = 0;
5183 __u16 params, byte_count;
5185 cifs_dbg(FYI, "In QFSInfo\n");
5187 rc = smb_init(SMB_COM_TRANSACTION2, 15, tcon, (void **) &pSMB,
5192 params = 2; /* level */
5193 pSMB->TotalDataCount = 0;
5194 pSMB->MaxParameterCount = cpu_to_le16(2);
5195 pSMB->MaxDataCount = cpu_to_le16(1000);
5196 pSMB->MaxSetupCount = 0;
5200 pSMB->Reserved2 = 0;
5201 byte_count = params + 1 /* pad */ ;
5202 pSMB->TotalParameterCount = cpu_to_le16(params);
5203 pSMB->ParameterCount = pSMB->TotalParameterCount;
5204 pSMB->ParameterOffset = cpu_to_le16(offsetof(
5205 struct smb_com_transaction2_qfsi_req, InformationLevel) - 4);
5206 pSMB->DataCount = 0;
5207 pSMB->DataOffset = 0;
5208 pSMB->SetupCount = 1;
5209 pSMB->Reserved3 = 0;
5210 pSMB->SubCommand = cpu_to_le16(TRANS2_QUERY_FS_INFORMATION);
5211 pSMB->InformationLevel = cpu_to_le16(SMB_QUERY_FS_SIZE_INFO);
5212 inc_rfc1001_len(pSMB, byte_count);
5213 pSMB->ByteCount = cpu_to_le16(byte_count);
5215 rc = SendReceive(xid, tcon->ses, (struct smb_hdr *) pSMB,
5216 (struct smb_hdr *) pSMBr, &bytes_returned, 0);
5218 cifs_dbg(FYI, "Send error in QFSInfo = %d\n", rc);
5219 } else { /* decode response */
5220 rc = validate_t2((struct smb_t2_rsp *)pSMBr);
5222 if (rc || get_bcc(&pSMBr->hdr) < 24)
5223 rc = -EIO; /* bad smb */
5225 __u16 data_offset = le16_to_cpu(pSMBr->t2.DataOffset);
5229 *) (((char *) &pSMBr->hdr.Protocol) +
5232 le32_to_cpu(response_data->BytesPerSector) *
5233 le32_to_cpu(response_data->
5234 SectorsPerAllocationUnit);
5236 * much prefer larger but if server doesn't report
5237 * a valid size than 4K is a reasonable minimum
5239 if (FSData->f_bsize < 512)
5240 FSData->f_bsize = 4096;
5243 le64_to_cpu(response_data->TotalAllocationUnits);
5244 FSData->f_bfree = FSData->f_bavail =
5245 le64_to_cpu(response_data->FreeAllocationUnits);
5246 cifs_dbg(FYI, "Blocks: %lld Free: %lld Block size %ld\n",
5247 (unsigned long long)FSData->f_blocks,
5248 (unsigned long long)FSData->f_bfree,
5252 cifs_buf_release(pSMB);
5261 CIFSSMBQFSAttributeInfo(const unsigned int xid, struct cifs_tcon *tcon)
5263 /* level 0x105 SMB_QUERY_FILE_SYSTEM_INFO */
5264 TRANSACTION2_QFSI_REQ *pSMB = NULL;
5265 TRANSACTION2_QFSI_RSP *pSMBr = NULL;
5266 FILE_SYSTEM_ATTRIBUTE_INFO *response_data;
5268 int bytes_returned = 0;
5269 __u16 params, byte_count;
5271 cifs_dbg(FYI, "In QFSAttributeInfo\n");
5273 rc = smb_init(SMB_COM_TRANSACTION2, 15, tcon, (void **) &pSMB,
5278 params = 2; /* level */
5279 pSMB->TotalDataCount = 0;
5280 pSMB->MaxParameterCount = cpu_to_le16(2);
5281 /* BB find exact max SMB PDU from sess structure BB */
5282 pSMB->MaxDataCount = cpu_to_le16(1000);
5283 pSMB->MaxSetupCount = 0;
5287 pSMB->Reserved2 = 0;
5288 byte_count = params + 1 /* pad */ ;
5289 pSMB->TotalParameterCount = cpu_to_le16(params);
5290 pSMB->ParameterCount = pSMB->TotalParameterCount;
5291 pSMB->ParameterOffset = cpu_to_le16(offsetof(
5292 struct smb_com_transaction2_qfsi_req, InformationLevel) - 4);
5293 pSMB->DataCount = 0;
5294 pSMB->DataOffset = 0;
5295 pSMB->SetupCount = 1;
5296 pSMB->Reserved3 = 0;
5297 pSMB->SubCommand = cpu_to_le16(TRANS2_QUERY_FS_INFORMATION);
5298 pSMB->InformationLevel = cpu_to_le16(SMB_QUERY_FS_ATTRIBUTE_INFO);
5299 inc_rfc1001_len(pSMB, byte_count);
5300 pSMB->ByteCount = cpu_to_le16(byte_count);
5302 rc = SendReceive(xid, tcon->ses, (struct smb_hdr *) pSMB,
5303 (struct smb_hdr *) pSMBr, &bytes_returned, 0);
5305 cifs_dbg(VFS, "Send error in QFSAttributeInfo = %d\n", rc);
5306 } else { /* decode response */
5307 rc = validate_t2((struct smb_t2_rsp *)pSMBr);
5309 if (rc || get_bcc(&pSMBr->hdr) < 13) {
5310 /* BB also check if enough bytes returned */
5311 rc = -EIO; /* bad smb */
5313 __u16 data_offset = le16_to_cpu(pSMBr->t2.DataOffset);
5315 (FILE_SYSTEM_ATTRIBUTE_INFO
5316 *) (((char *) &pSMBr->hdr.Protocol) +
5318 memcpy(&tcon->fsAttrInfo, response_data,
5319 sizeof(FILE_SYSTEM_ATTRIBUTE_INFO));
5322 cifs_buf_release(pSMB);
5325 goto QFSAttributeRetry;
5331 CIFSSMBQFSDeviceInfo(const unsigned int xid, struct cifs_tcon *tcon)
5333 /* level 0x104 SMB_QUERY_FILE_SYSTEM_INFO */
5334 TRANSACTION2_QFSI_REQ *pSMB = NULL;
5335 TRANSACTION2_QFSI_RSP *pSMBr = NULL;
5336 FILE_SYSTEM_DEVICE_INFO *response_data;
5338 int bytes_returned = 0;
5339 __u16 params, byte_count;
5341 cifs_dbg(FYI, "In QFSDeviceInfo\n");
5343 rc = smb_init(SMB_COM_TRANSACTION2, 15, tcon, (void **) &pSMB,
5348 params = 2; /* level */
5349 pSMB->TotalDataCount = 0;
5350 pSMB->MaxParameterCount = cpu_to_le16(2);
5351 /* BB find exact max SMB PDU from sess structure BB */
5352 pSMB->MaxDataCount = cpu_to_le16(1000);
5353 pSMB->MaxSetupCount = 0;
5357 pSMB->Reserved2 = 0;
5358 byte_count = params + 1 /* pad */ ;
5359 pSMB->TotalParameterCount = cpu_to_le16(params);
5360 pSMB->ParameterCount = pSMB->TotalParameterCount;
5361 pSMB->ParameterOffset = cpu_to_le16(offsetof(
5362 struct smb_com_transaction2_qfsi_req, InformationLevel) - 4);
5364 pSMB->DataCount = 0;
5365 pSMB->DataOffset = 0;
5366 pSMB->SetupCount = 1;
5367 pSMB->Reserved3 = 0;
5368 pSMB->SubCommand = cpu_to_le16(TRANS2_QUERY_FS_INFORMATION);
5369 pSMB->InformationLevel = cpu_to_le16(SMB_QUERY_FS_DEVICE_INFO);
5370 inc_rfc1001_len(pSMB, byte_count);
5371 pSMB->ByteCount = cpu_to_le16(byte_count);
5373 rc = SendReceive(xid, tcon->ses, (struct smb_hdr *) pSMB,
5374 (struct smb_hdr *) pSMBr, &bytes_returned, 0);
5376 cifs_dbg(FYI, "Send error in QFSDeviceInfo = %d\n", rc);
5377 } else { /* decode response */
5378 rc = validate_t2((struct smb_t2_rsp *)pSMBr);
5380 if (rc || get_bcc(&pSMBr->hdr) <
5381 sizeof(FILE_SYSTEM_DEVICE_INFO))
5382 rc = -EIO; /* bad smb */
5384 __u16 data_offset = le16_to_cpu(pSMBr->t2.DataOffset);
5386 (FILE_SYSTEM_DEVICE_INFO *)
5387 (((char *) &pSMBr->hdr.Protocol) +
5389 memcpy(&tcon->fsDevInfo, response_data,
5390 sizeof(FILE_SYSTEM_DEVICE_INFO));
5393 cifs_buf_release(pSMB);
5396 goto QFSDeviceRetry;
5402 CIFSSMBQFSUnixInfo(const unsigned int xid, struct cifs_tcon *tcon)
5404 /* level 0x200 SMB_QUERY_CIFS_UNIX_INFO */
5405 TRANSACTION2_QFSI_REQ *pSMB = NULL;
5406 TRANSACTION2_QFSI_RSP *pSMBr = NULL;
5407 FILE_SYSTEM_UNIX_INFO *response_data;
5409 int bytes_returned = 0;
5410 __u16 params, byte_count;
5412 cifs_dbg(FYI, "In QFSUnixInfo\n");
5414 rc = smb_init_no_reconnect(SMB_COM_TRANSACTION2, 15, tcon,
5415 (void **) &pSMB, (void **) &pSMBr);
5419 params = 2; /* level */
5420 pSMB->TotalDataCount = 0;
5421 pSMB->DataCount = 0;
5422 pSMB->DataOffset = 0;
5423 pSMB->MaxParameterCount = cpu_to_le16(2);
5424 /* BB find exact max SMB PDU from sess structure BB */
5425 pSMB->MaxDataCount = cpu_to_le16(100);
5426 pSMB->MaxSetupCount = 0;
5430 pSMB->Reserved2 = 0;
5431 byte_count = params + 1 /* pad */ ;
5432 pSMB->ParameterCount = cpu_to_le16(params);
5433 pSMB->TotalParameterCount = pSMB->ParameterCount;
5434 pSMB->ParameterOffset = cpu_to_le16(offsetof(struct
5435 smb_com_transaction2_qfsi_req, InformationLevel) - 4);
5436 pSMB->SetupCount = 1;
5437 pSMB->Reserved3 = 0;
5438 pSMB->SubCommand = cpu_to_le16(TRANS2_QUERY_FS_INFORMATION);
5439 pSMB->InformationLevel = cpu_to_le16(SMB_QUERY_CIFS_UNIX_INFO);
5440 inc_rfc1001_len(pSMB, byte_count);
5441 pSMB->ByteCount = cpu_to_le16(byte_count);
5443 rc = SendReceive(xid, tcon->ses, (struct smb_hdr *) pSMB,
5444 (struct smb_hdr *) pSMBr, &bytes_returned, 0);
5446 cifs_dbg(VFS, "Send error in QFSUnixInfo = %d\n", rc);
5447 } else { /* decode response */
5448 rc = validate_t2((struct smb_t2_rsp *)pSMBr);
5450 if (rc || get_bcc(&pSMBr->hdr) < 13) {
5451 rc = -EIO; /* bad smb */
5453 __u16 data_offset = le16_to_cpu(pSMBr->t2.DataOffset);
5455 (FILE_SYSTEM_UNIX_INFO
5456 *) (((char *) &pSMBr->hdr.Protocol) +
5458 memcpy(&tcon->fsUnixInfo, response_data,
5459 sizeof(FILE_SYSTEM_UNIX_INFO));
5462 cifs_buf_release(pSMB);
5472 CIFSSMBSetFSUnixInfo(const unsigned int xid, struct cifs_tcon *tcon, __u64 cap)
5474 /* level 0x200 SMB_SET_CIFS_UNIX_INFO */
5475 TRANSACTION2_SETFSI_REQ *pSMB = NULL;
5476 TRANSACTION2_SETFSI_RSP *pSMBr = NULL;
5478 int bytes_returned = 0;
5479 __u16 params, param_offset, offset, byte_count;
5481 cifs_dbg(FYI, "In SETFSUnixInfo\n");
5483 /* BB switch to small buf init to save memory */
5484 rc = smb_init_no_reconnect(SMB_COM_TRANSACTION2, 15, tcon,
5485 (void **) &pSMB, (void **) &pSMBr);
5489 params = 4; /* 2 bytes zero followed by info level. */
5490 pSMB->MaxSetupCount = 0;
5494 pSMB->Reserved2 = 0;
5495 param_offset = offsetof(struct smb_com_transaction2_setfsi_req, FileNum)
5497 offset = param_offset + params;
5499 pSMB->MaxParameterCount = cpu_to_le16(4);
5500 /* BB find exact max SMB PDU from sess structure BB */
5501 pSMB->MaxDataCount = cpu_to_le16(100);
5502 pSMB->SetupCount = 1;
5503 pSMB->Reserved3 = 0;
5504 pSMB->SubCommand = cpu_to_le16(TRANS2_SET_FS_INFORMATION);
5505 byte_count = 1 /* pad */ + params + 12;
5507 pSMB->DataCount = cpu_to_le16(12);
5508 pSMB->ParameterCount = cpu_to_le16(params);
5509 pSMB->TotalDataCount = pSMB->DataCount;
5510 pSMB->TotalParameterCount = pSMB->ParameterCount;
5511 pSMB->ParameterOffset = cpu_to_le16(param_offset);
5512 pSMB->DataOffset = cpu_to_le16(offset);
5516 pSMB->InformationLevel = cpu_to_le16(SMB_SET_CIFS_UNIX_INFO);
5519 pSMB->ClientUnixMajor = cpu_to_le16(CIFS_UNIX_MAJOR_VERSION);
5520 pSMB->ClientUnixMinor = cpu_to_le16(CIFS_UNIX_MINOR_VERSION);
5521 pSMB->ClientUnixCap = cpu_to_le64(cap);
5523 inc_rfc1001_len(pSMB, byte_count);
5524 pSMB->ByteCount = cpu_to_le16(byte_count);
5526 rc = SendReceive(xid, tcon->ses, (struct smb_hdr *) pSMB,
5527 (struct smb_hdr *) pSMBr, &bytes_returned, 0);
5529 cifs_dbg(VFS, "Send error in SETFSUnixInfo = %d\n", rc);
5530 } else { /* decode response */
5531 rc = validate_t2((struct smb_t2_rsp *)pSMBr);
5533 rc = -EIO; /* bad smb */
5535 cifs_buf_release(pSMB);
5538 goto SETFSUnixRetry;
5546 CIFSSMBQFSPosixInfo(const unsigned int xid, struct cifs_tcon *tcon,
5547 struct kstatfs *FSData)
5549 /* level 0x201 SMB_QUERY_CIFS_POSIX_INFO */
5550 TRANSACTION2_QFSI_REQ *pSMB = NULL;
5551 TRANSACTION2_QFSI_RSP *pSMBr = NULL;
5552 FILE_SYSTEM_POSIX_INFO *response_data;
5554 int bytes_returned = 0;
5555 __u16 params, byte_count;
5557 cifs_dbg(FYI, "In QFSPosixInfo\n");
5559 rc = smb_init(SMB_COM_TRANSACTION2, 15, tcon, (void **) &pSMB,
5564 params = 2; /* level */
5565 pSMB->TotalDataCount = 0;
5566 pSMB->DataCount = 0;
5567 pSMB->DataOffset = 0;
5568 pSMB->MaxParameterCount = cpu_to_le16(2);
5569 /* BB find exact max SMB PDU from sess structure BB */
5570 pSMB->MaxDataCount = cpu_to_le16(100);
5571 pSMB->MaxSetupCount = 0;
5575 pSMB->Reserved2 = 0;
5576 byte_count = params + 1 /* pad */ ;
5577 pSMB->ParameterCount = cpu_to_le16(params);
5578 pSMB->TotalParameterCount = pSMB->ParameterCount;
5579 pSMB->ParameterOffset = cpu_to_le16(offsetof(struct
5580 smb_com_transaction2_qfsi_req, InformationLevel) - 4);
5581 pSMB->SetupCount = 1;
5582 pSMB->Reserved3 = 0;
5583 pSMB->SubCommand = cpu_to_le16(TRANS2_QUERY_FS_INFORMATION);
5584 pSMB->InformationLevel = cpu_to_le16(SMB_QUERY_POSIX_FS_INFO);
5585 inc_rfc1001_len(pSMB, byte_count);
5586 pSMB->ByteCount = cpu_to_le16(byte_count);
5588 rc = SendReceive(xid, tcon->ses, (struct smb_hdr *) pSMB,
5589 (struct smb_hdr *) pSMBr, &bytes_returned, 0);
5591 cifs_dbg(FYI, "Send error in QFSUnixInfo = %d\n", rc);
5592 } else { /* decode response */
5593 rc = validate_t2((struct smb_t2_rsp *)pSMBr);
5595 if (rc || get_bcc(&pSMBr->hdr) < 13) {
5596 rc = -EIO; /* bad smb */
5598 __u16 data_offset = le16_to_cpu(pSMBr->t2.DataOffset);
5600 (FILE_SYSTEM_POSIX_INFO
5601 *) (((char *) &pSMBr->hdr.Protocol) +
5604 le32_to_cpu(response_data->BlockSize);
5606 * much prefer larger but if server doesn't report
5607 * a valid size than 4K is a reasonable minimum
5609 if (FSData->f_bsize < 512)
5610 FSData->f_bsize = 4096;
5613 le64_to_cpu(response_data->TotalBlocks);
5615 le64_to_cpu(response_data->BlocksAvail);
5616 if (response_data->UserBlocksAvail == cpu_to_le64(-1)) {
5617 FSData->f_bavail = FSData->f_bfree;
5620 le64_to_cpu(response_data->UserBlocksAvail);
5622 if (response_data->TotalFileNodes != cpu_to_le64(-1))
5624 le64_to_cpu(response_data->TotalFileNodes);
5625 if (response_data->FreeFileNodes != cpu_to_le64(-1))
5627 le64_to_cpu(response_data->FreeFileNodes);
5630 cifs_buf_release(pSMB);
5640 * We can not use write of zero bytes trick to set file size due to need for
5641 * large file support. Also note that this SetPathInfo is preferred to
5642 * SetFileInfo based method in next routine which is only needed to work around
5643 * a sharing violation bugin Samba which this routine can run into.
5646 CIFSSMBSetEOF(const unsigned int xid, struct cifs_tcon *tcon,
5647 const char *file_name, __u64 size, struct cifs_sb_info *cifs_sb,
5648 bool set_allocation)
5650 struct smb_com_transaction2_spi_req *pSMB = NULL;
5651 struct smb_com_transaction2_spi_rsp *pSMBr = NULL;
5652 struct file_end_of_file_info *parm_data;
5655 int bytes_returned = 0;
5656 int remap = cifs_remap(cifs_sb);
5658 __u16 params, byte_count, data_count, param_offset, offset;
5660 cifs_dbg(FYI, "In SetEOF\n");
5662 rc = smb_init(SMB_COM_TRANSACTION2, 15, tcon, (void **) &pSMB,
5667 if (pSMB->hdr.Flags2 & SMBFLG2_UNICODE) {
5669 cifsConvertToUTF16((__le16 *) pSMB->FileName, file_name,
5670 PATH_MAX, cifs_sb->local_nls, remap);
5671 name_len++; /* trailing null */
5673 } else { /* BB improve the check for buffer overruns BB */
5674 name_len = strnlen(file_name, PATH_MAX);
5675 name_len++; /* trailing null */
5676 strncpy(pSMB->FileName, file_name, name_len);
5678 params = 6 + name_len;
5679 data_count = sizeof(struct file_end_of_file_info);
5680 pSMB->MaxParameterCount = cpu_to_le16(2);
5681 pSMB->MaxDataCount = cpu_to_le16(4100);
5682 pSMB->MaxSetupCount = 0;
5686 pSMB->Reserved2 = 0;
5687 param_offset = offsetof(struct smb_com_transaction2_spi_req,
5688 InformationLevel) - 4;
5689 offset = param_offset + params;
5690 if (set_allocation) {
5691 if (tcon->ses->capabilities & CAP_INFOLEVEL_PASSTHRU)
5692 pSMB->InformationLevel =
5693 cpu_to_le16(SMB_SET_FILE_ALLOCATION_INFO2);
5695 pSMB->InformationLevel =
5696 cpu_to_le16(SMB_SET_FILE_ALLOCATION_INFO);
5697 } else /* Set File Size */ {
5698 if (tcon->ses->capabilities & CAP_INFOLEVEL_PASSTHRU)
5699 pSMB->InformationLevel =
5700 cpu_to_le16(SMB_SET_FILE_END_OF_FILE_INFO2);
5702 pSMB->InformationLevel =
5703 cpu_to_le16(SMB_SET_FILE_END_OF_FILE_INFO);
5707 (struct file_end_of_file_info *) (((char *) &pSMB->hdr.Protocol) +
5709 pSMB->ParameterOffset = cpu_to_le16(param_offset);
5710 pSMB->DataOffset = cpu_to_le16(offset);
5711 pSMB->SetupCount = 1;
5712 pSMB->Reserved3 = 0;
5713 pSMB->SubCommand = cpu_to_le16(TRANS2_SET_PATH_INFORMATION);
5714 byte_count = 3 /* pad */ + params + data_count;
5715 pSMB->DataCount = cpu_to_le16(data_count);
5716 pSMB->TotalDataCount = pSMB->DataCount;
5717 pSMB->ParameterCount = cpu_to_le16(params);
5718 pSMB->TotalParameterCount = pSMB->ParameterCount;
5719 pSMB->Reserved4 = 0;
5720 inc_rfc1001_len(pSMB, byte_count);
5721 parm_data->FileSize = cpu_to_le64(size);
5722 pSMB->ByteCount = cpu_to_le16(byte_count);
5723 rc = SendReceive(xid, tcon->ses, (struct smb_hdr *) pSMB,
5724 (struct smb_hdr *) pSMBr, &bytes_returned, 0);
5726 cifs_dbg(FYI, "SetPathInfo (file size) returned %d\n", rc);
5728 cifs_buf_release(pSMB);
5737 CIFSSMBSetFileSize(const unsigned int xid, struct cifs_tcon *tcon,
5738 struct cifsFileInfo *cfile, __u64 size, bool set_allocation)
5740 struct smb_com_transaction2_sfi_req *pSMB = NULL;
5741 struct file_end_of_file_info *parm_data;
5743 __u16 params, param_offset, offset, byte_count, count;
5745 cifs_dbg(FYI, "SetFileSize (via SetFileInfo) %lld\n",
5747 rc = small_smb_init(SMB_COM_TRANSACTION2, 15, tcon, (void **) &pSMB);
5752 pSMB->hdr.Pid = cpu_to_le16((__u16)cfile->pid);
5753 pSMB->hdr.PidHigh = cpu_to_le16((__u16)(cfile->pid >> 16));
5756 pSMB->MaxSetupCount = 0;
5760 pSMB->Reserved2 = 0;
5761 param_offset = offsetof(struct smb_com_transaction2_sfi_req, Fid) - 4;
5762 offset = param_offset + params;
5764 count = sizeof(struct file_end_of_file_info);
5765 pSMB->MaxParameterCount = cpu_to_le16(2);
5766 /* BB find exact max SMB PDU from sess structure BB */
5767 pSMB->MaxDataCount = cpu_to_le16(1000);
5768 pSMB->SetupCount = 1;
5769 pSMB->Reserved3 = 0;
5770 pSMB->SubCommand = cpu_to_le16(TRANS2_SET_FILE_INFORMATION);
5771 byte_count = 3 /* pad */ + params + count;
5772 pSMB->DataCount = cpu_to_le16(count);
5773 pSMB->ParameterCount = cpu_to_le16(params);
5774 pSMB->TotalDataCount = pSMB->DataCount;
5775 pSMB->TotalParameterCount = pSMB->ParameterCount;
5776 pSMB->ParameterOffset = cpu_to_le16(param_offset);
5778 (struct file_end_of_file_info *) (((char *) &pSMB->hdr.Protocol)
5780 pSMB->DataOffset = cpu_to_le16(offset);
5781 parm_data->FileSize = cpu_to_le64(size);
5782 pSMB->Fid = cfile->fid.netfid;
5783 if (set_allocation) {
5784 if (tcon->ses->capabilities & CAP_INFOLEVEL_PASSTHRU)
5785 pSMB->InformationLevel =
5786 cpu_to_le16(SMB_SET_FILE_ALLOCATION_INFO2);
5788 pSMB->InformationLevel =
5789 cpu_to_le16(SMB_SET_FILE_ALLOCATION_INFO);
5790 } else /* Set File Size */ {
5791 if (tcon->ses->capabilities & CAP_INFOLEVEL_PASSTHRU)
5792 pSMB->InformationLevel =
5793 cpu_to_le16(SMB_SET_FILE_END_OF_FILE_INFO2);
5795 pSMB->InformationLevel =
5796 cpu_to_le16(SMB_SET_FILE_END_OF_FILE_INFO);
5798 pSMB->Reserved4 = 0;
5799 inc_rfc1001_len(pSMB, byte_count);
5800 pSMB->ByteCount = cpu_to_le16(byte_count);
5801 rc = SendReceiveNoRsp(xid, tcon->ses, (char *) pSMB, 0);
5802 cifs_small_buf_release(pSMB);
5804 cifs_dbg(FYI, "Send error in SetFileInfo (SetFileSize) = %d\n",
5808 /* Note: On -EAGAIN error only caller can retry on handle based calls
5809 since file handle passed in no longer valid */
5814 /* Some legacy servers such as NT4 require that the file times be set on
5815 an open handle, rather than by pathname - this is awkward due to
5816 potential access conflicts on the open, but it is unavoidable for these
5817 old servers since the only other choice is to go from 100 nanosecond DCE
5818 time and resort to the original setpathinfo level which takes the ancient
5819 DOS time format with 2 second granularity */
5821 CIFSSMBSetFileInfo(const unsigned int xid, struct cifs_tcon *tcon,
5822 const FILE_BASIC_INFO *data, __u16 fid, __u32 pid_of_opener)
5824 struct smb_com_transaction2_sfi_req *pSMB = NULL;
5827 __u16 params, param_offset, offset, byte_count, count;
5829 cifs_dbg(FYI, "Set Times (via SetFileInfo)\n");
5830 rc = small_smb_init(SMB_COM_TRANSACTION2, 15, tcon, (void **) &pSMB);
5835 pSMB->hdr.Pid = cpu_to_le16((__u16)pid_of_opener);
5836 pSMB->hdr.PidHigh = cpu_to_le16((__u16)(pid_of_opener >> 16));
5839 pSMB->MaxSetupCount = 0;
5843 pSMB->Reserved2 = 0;
5844 param_offset = offsetof(struct smb_com_transaction2_sfi_req, Fid) - 4;
5845 offset = param_offset + params;
5847 data_offset = (char *)pSMB +
5848 offsetof(struct smb_hdr, Protocol) + offset;
5850 count = sizeof(FILE_BASIC_INFO);
5851 pSMB->MaxParameterCount = cpu_to_le16(2);
5852 /* BB find max SMB PDU from sess */
5853 pSMB->MaxDataCount = cpu_to_le16(1000);
5854 pSMB->SetupCount = 1;
5855 pSMB->Reserved3 = 0;
5856 pSMB->SubCommand = cpu_to_le16(TRANS2_SET_FILE_INFORMATION);
5857 byte_count = 3 /* pad */ + params + count;
5858 pSMB->DataCount = cpu_to_le16(count);
5859 pSMB->ParameterCount = cpu_to_le16(params);
5860 pSMB->TotalDataCount = pSMB->DataCount;
5861 pSMB->TotalParameterCount = pSMB->ParameterCount;
5862 pSMB->ParameterOffset = cpu_to_le16(param_offset);
5863 pSMB->DataOffset = cpu_to_le16(offset);
5865 if (tcon->ses->capabilities & CAP_INFOLEVEL_PASSTHRU)
5866 pSMB->InformationLevel = cpu_to_le16(SMB_SET_FILE_BASIC_INFO2);
5868 pSMB->InformationLevel = cpu_to_le16(SMB_SET_FILE_BASIC_INFO);
5869 pSMB->Reserved4 = 0;
5870 inc_rfc1001_len(pSMB, byte_count);
5871 pSMB->ByteCount = cpu_to_le16(byte_count);
5872 memcpy(data_offset, data, sizeof(FILE_BASIC_INFO));
5873 rc = SendReceiveNoRsp(xid, tcon->ses, (char *) pSMB, 0);
5874 cifs_small_buf_release(pSMB);
5876 cifs_dbg(FYI, "Send error in Set Time (SetFileInfo) = %d\n",
5879 /* Note: On -EAGAIN error only caller can retry on handle based calls
5880 since file handle passed in no longer valid */
5886 CIFSSMBSetFileDisposition(const unsigned int xid, struct cifs_tcon *tcon,
5887 bool delete_file, __u16 fid, __u32 pid_of_opener)
5889 struct smb_com_transaction2_sfi_req *pSMB = NULL;
5892 __u16 params, param_offset, offset, byte_count, count;
5894 cifs_dbg(FYI, "Set File Disposition (via SetFileInfo)\n");
5895 rc = small_smb_init(SMB_COM_TRANSACTION2, 15, tcon, (void **) &pSMB);
5900 pSMB->hdr.Pid = cpu_to_le16((__u16)pid_of_opener);
5901 pSMB->hdr.PidHigh = cpu_to_le16((__u16)(pid_of_opener >> 16));
5904 pSMB->MaxSetupCount = 0;
5908 pSMB->Reserved2 = 0;
5909 param_offset = offsetof(struct smb_com_transaction2_sfi_req, Fid) - 4;
5910 offset = param_offset + params;
5912 data_offset = (char *) (&pSMB->hdr.Protocol) + offset;
5915 pSMB->MaxParameterCount = cpu_to_le16(2);
5916 /* BB find max SMB PDU from sess */
5917 pSMB->MaxDataCount = cpu_to_le16(1000);
5918 pSMB->SetupCount = 1;
5919 pSMB->Reserved3 = 0;
5920 pSMB->SubCommand = cpu_to_le16(TRANS2_SET_FILE_INFORMATION);
5921 byte_count = 3 /* pad */ + params + count;
5922 pSMB->DataCount = cpu_to_le16(count);
5923 pSMB->ParameterCount = cpu_to_le16(params);
5924 pSMB->TotalDataCount = pSMB->DataCount;
5925 pSMB->TotalParameterCount = pSMB->ParameterCount;
5926 pSMB->ParameterOffset = cpu_to_le16(param_offset);
5927 pSMB->DataOffset = cpu_to_le16(offset);
5929 pSMB->InformationLevel = cpu_to_le16(SMB_SET_FILE_DISPOSITION_INFO);
5930 pSMB->Reserved4 = 0;
5931 inc_rfc1001_len(pSMB, byte_count);
5932 pSMB->ByteCount = cpu_to_le16(byte_count);
5933 *data_offset = delete_file ? 1 : 0;
5934 rc = SendReceiveNoRsp(xid, tcon->ses, (char *) pSMB, 0);
5935 cifs_small_buf_release(pSMB);
5937 cifs_dbg(FYI, "Send error in SetFileDisposition = %d\n", rc);
5943 CIFSSMBSetPathInfo(const unsigned int xid, struct cifs_tcon *tcon,
5944 const char *fileName, const FILE_BASIC_INFO *data,
5945 const struct nls_table *nls_codepage, int remap)
5947 TRANSACTION2_SPI_REQ *pSMB = NULL;
5948 TRANSACTION2_SPI_RSP *pSMBr = NULL;
5951 int bytes_returned = 0;
5953 __u16 params, param_offset, offset, byte_count, count;
5955 cifs_dbg(FYI, "In SetTimes\n");
5958 rc = smb_init(SMB_COM_TRANSACTION2, 15, tcon, (void **) &pSMB,
5963 if (pSMB->hdr.Flags2 & SMBFLG2_UNICODE) {
5965 cifsConvertToUTF16((__le16 *) pSMB->FileName, fileName,
5966 PATH_MAX, nls_codepage, remap);
5967 name_len++; /* trailing null */
5969 } else { /* BB improve the check for buffer overruns BB */
5970 name_len = strnlen(fileName, PATH_MAX);
5971 name_len++; /* trailing null */
5972 strncpy(pSMB->FileName, fileName, name_len);
5975 params = 6 + name_len;
5976 count = sizeof(FILE_BASIC_INFO);
5977 pSMB->MaxParameterCount = cpu_to_le16(2);
5978 /* BB find max SMB PDU from sess structure BB */
5979 pSMB->MaxDataCount = cpu_to_le16(1000);
5980 pSMB->MaxSetupCount = 0;
5984 pSMB->Reserved2 = 0;
5985 param_offset = offsetof(struct smb_com_transaction2_spi_req,
5986 InformationLevel) - 4;
5987 offset = param_offset + params;
5988 data_offset = (char *) (&pSMB->hdr.Protocol) + offset;
5989 pSMB->ParameterOffset = cpu_to_le16(param_offset);
5990 pSMB->DataOffset = cpu_to_le16(offset);
5991 pSMB->SetupCount = 1;
5992 pSMB->Reserved3 = 0;
5993 pSMB->SubCommand = cpu_to_le16(TRANS2_SET_PATH_INFORMATION);
5994 byte_count = 3 /* pad */ + params + count;
5996 pSMB->DataCount = cpu_to_le16(count);
5997 pSMB->ParameterCount = cpu_to_le16(params);
5998 pSMB->TotalDataCount = pSMB->DataCount;
5999 pSMB->TotalParameterCount = pSMB->ParameterCount;
6000 if (tcon->ses->capabilities & CAP_INFOLEVEL_PASSTHRU)
6001 pSMB->InformationLevel = cpu_to_le16(SMB_SET_FILE_BASIC_INFO2);
6003 pSMB->InformationLevel = cpu_to_le16(SMB_SET_FILE_BASIC_INFO);
6004 pSMB->Reserved4 = 0;
6005 inc_rfc1001_len(pSMB, byte_count);
6006 memcpy(data_offset, data, sizeof(FILE_BASIC_INFO));
6007 pSMB->ByteCount = cpu_to_le16(byte_count);
6008 rc = SendReceive(xid, tcon->ses, (struct smb_hdr *) pSMB,
6009 (struct smb_hdr *) pSMBr, &bytes_returned, 0);
6011 cifs_dbg(FYI, "SetPathInfo (times) returned %d\n", rc);
6013 cifs_buf_release(pSMB);
6021 /* Can not be used to set time stamps yet (due to old DOS time format) */
6022 /* Can be used to set attributes */
6023 #if 0 /* Possibly not needed - since it turns out that strangely NT4 has a bug
6024 handling it anyway and NT4 was what we thought it would be needed for
6025 Do not delete it until we prove whether needed for Win9x though */
6027 CIFSSMBSetAttrLegacy(unsigned int xid, struct cifs_tcon *tcon, char *fileName,
6028 __u16 dos_attrs, const struct nls_table *nls_codepage)
6030 SETATTR_REQ *pSMB = NULL;
6031 SETATTR_RSP *pSMBr = NULL;
6036 cifs_dbg(FYI, "In SetAttrLegacy\n");
6039 rc = smb_init(SMB_COM_SETATTR, 8, tcon, (void **) &pSMB,
6044 if (pSMB->hdr.Flags2 & SMBFLG2_UNICODE) {
6046 ConvertToUTF16((__le16 *) pSMB->fileName, fileName,
6047 PATH_MAX, nls_codepage);
6048 name_len++; /* trailing null */
6050 } else { /* BB improve the check for buffer overruns BB */
6051 name_len = strnlen(fileName, PATH_MAX);
6052 name_len++; /* trailing null */
6053 strncpy(pSMB->fileName, fileName, name_len);
6055 pSMB->attr = cpu_to_le16(dos_attrs);
6056 pSMB->BufferFormat = 0x04;
6057 inc_rfc1001_len(pSMB, name_len + 1);
6058 pSMB->ByteCount = cpu_to_le16(name_len + 1);
6059 rc = SendReceive(xid, tcon->ses, (struct smb_hdr *) pSMB,
6060 (struct smb_hdr *) pSMBr, &bytes_returned, 0);
6062 cifs_dbg(FYI, "Error in LegacySetAttr = %d\n", rc);
6064 cifs_buf_release(pSMB);
6067 goto SetAttrLgcyRetry;
6071 #endif /* temporarily unneeded SetAttr legacy function */
6074 cifs_fill_unix_set_info(FILE_UNIX_BASIC_INFO *data_offset,
6075 const struct cifs_unix_set_info_args *args)
6077 u64 uid = NO_CHANGE_64, gid = NO_CHANGE_64;
6078 u64 mode = args->mode;
6080 if (uid_valid(args->uid))
6081 uid = from_kuid(&init_user_ns, args->uid);
6082 if (gid_valid(args->gid))
6083 gid = from_kgid(&init_user_ns, args->gid);
6086 * Samba server ignores set of file size to zero due to bugs in some
6087 * older clients, but we should be precise - we use SetFileSize to
6088 * set file size and do not want to truncate file size to zero
6089 * accidentally as happened on one Samba server beta by putting
6090 * zero instead of -1 here
6092 data_offset->EndOfFile = cpu_to_le64(NO_CHANGE_64);
6093 data_offset->NumOfBytes = cpu_to_le64(NO_CHANGE_64);
6094 data_offset->LastStatusChange = cpu_to_le64(args->ctime);
6095 data_offset->LastAccessTime = cpu_to_le64(args->atime);
6096 data_offset->LastModificationTime = cpu_to_le64(args->mtime);
6097 data_offset->Uid = cpu_to_le64(uid);
6098 data_offset->Gid = cpu_to_le64(gid);
6099 /* better to leave device as zero when it is */
6100 data_offset->DevMajor = cpu_to_le64(MAJOR(args->device));
6101 data_offset->DevMinor = cpu_to_le64(MINOR(args->device));
6102 data_offset->Permissions = cpu_to_le64(mode);
6105 data_offset->Type = cpu_to_le32(UNIX_FILE);
6106 else if (S_ISDIR(mode))
6107 data_offset->Type = cpu_to_le32(UNIX_DIR);
6108 else if (S_ISLNK(mode))
6109 data_offset->Type = cpu_to_le32(UNIX_SYMLINK);
6110 else if (S_ISCHR(mode))
6111 data_offset->Type = cpu_to_le32(UNIX_CHARDEV);
6112 else if (S_ISBLK(mode))
6113 data_offset->Type = cpu_to_le32(UNIX_BLOCKDEV);
6114 else if (S_ISFIFO(mode))
6115 data_offset->Type = cpu_to_le32(UNIX_FIFO);
6116 else if (S_ISSOCK(mode))
6117 data_offset->Type = cpu_to_le32(UNIX_SOCKET);
6121 CIFSSMBUnixSetFileInfo(const unsigned int xid, struct cifs_tcon *tcon,
6122 const struct cifs_unix_set_info_args *args,
6123 u16 fid, u32 pid_of_opener)
6125 struct smb_com_transaction2_sfi_req *pSMB = NULL;
6128 u16 params, param_offset, offset, byte_count, count;
6130 cifs_dbg(FYI, "Set Unix Info (via SetFileInfo)\n");
6131 rc = small_smb_init(SMB_COM_TRANSACTION2, 15, tcon, (void **) &pSMB);
6136 pSMB->hdr.Pid = cpu_to_le16((__u16)pid_of_opener);
6137 pSMB->hdr.PidHigh = cpu_to_le16((__u16)(pid_of_opener >> 16));
6140 pSMB->MaxSetupCount = 0;
6144 pSMB->Reserved2 = 0;
6145 param_offset = offsetof(struct smb_com_transaction2_sfi_req, Fid) - 4;
6146 offset = param_offset + params;
6148 data_offset = (char *)pSMB +
6149 offsetof(struct smb_hdr, Protocol) + offset;
6151 count = sizeof(FILE_UNIX_BASIC_INFO);
6153 pSMB->MaxParameterCount = cpu_to_le16(2);
6154 /* BB find max SMB PDU from sess */
6155 pSMB->MaxDataCount = cpu_to_le16(1000);
6156 pSMB->SetupCount = 1;
6157 pSMB->Reserved3 = 0;
6158 pSMB->SubCommand = cpu_to_le16(TRANS2_SET_FILE_INFORMATION);
6159 byte_count = 3 /* pad */ + params + count;
6160 pSMB->DataCount = cpu_to_le16(count);
6161 pSMB->ParameterCount = cpu_to_le16(params);
6162 pSMB->TotalDataCount = pSMB->DataCount;
6163 pSMB->TotalParameterCount = pSMB->ParameterCount;
6164 pSMB->ParameterOffset = cpu_to_le16(param_offset);
6165 pSMB->DataOffset = cpu_to_le16(offset);
6167 pSMB->InformationLevel = cpu_to_le16(SMB_SET_FILE_UNIX_BASIC);
6168 pSMB->Reserved4 = 0;
6169 inc_rfc1001_len(pSMB, byte_count);
6170 pSMB->ByteCount = cpu_to_le16(byte_count);
6172 cifs_fill_unix_set_info((FILE_UNIX_BASIC_INFO *)data_offset, args);
6174 rc = SendReceiveNoRsp(xid, tcon->ses, (char *) pSMB, 0);
6175 cifs_small_buf_release(pSMB);
6177 cifs_dbg(FYI, "Send error in Set Time (SetFileInfo) = %d\n",
6180 /* Note: On -EAGAIN error only caller can retry on handle based calls
6181 since file handle passed in no longer valid */
6187 CIFSSMBUnixSetPathInfo(const unsigned int xid, struct cifs_tcon *tcon,
6188 const char *file_name,
6189 const struct cifs_unix_set_info_args *args,
6190 const struct nls_table *nls_codepage, int remap)
6192 TRANSACTION2_SPI_REQ *pSMB = NULL;
6193 TRANSACTION2_SPI_RSP *pSMBr = NULL;
6196 int bytes_returned = 0;
6197 FILE_UNIX_BASIC_INFO *data_offset;
6198 __u16 params, param_offset, offset, count, byte_count;
6200 cifs_dbg(FYI, "In SetUID/GID/Mode\n");
6202 rc = smb_init(SMB_COM_TRANSACTION2, 15, tcon, (void **) &pSMB,
6207 if (pSMB->hdr.Flags2 & SMBFLG2_UNICODE) {
6209 cifsConvertToUTF16((__le16 *) pSMB->FileName, file_name,
6210 PATH_MAX, nls_codepage, remap);
6211 name_len++; /* trailing null */
6213 } else { /* BB improve the check for buffer overruns BB */
6214 name_len = strnlen(file_name, PATH_MAX);
6215 name_len++; /* trailing null */
6216 strncpy(pSMB->FileName, file_name, name_len);
6219 params = 6 + name_len;
6220 count = sizeof(FILE_UNIX_BASIC_INFO);
6221 pSMB->MaxParameterCount = cpu_to_le16(2);
6222 /* BB find max SMB PDU from sess structure BB */
6223 pSMB->MaxDataCount = cpu_to_le16(1000);
6224 pSMB->MaxSetupCount = 0;
6228 pSMB->Reserved2 = 0;
6229 param_offset = offsetof(struct smb_com_transaction2_spi_req,
6230 InformationLevel) - 4;
6231 offset = param_offset + params;
6233 (FILE_UNIX_BASIC_INFO *) ((char *) &pSMB->hdr.Protocol +
6235 memset(data_offset, 0, count);
6236 pSMB->DataOffset = cpu_to_le16(offset);
6237 pSMB->ParameterOffset = cpu_to_le16(param_offset);
6238 pSMB->SetupCount = 1;
6239 pSMB->Reserved3 = 0;
6240 pSMB->SubCommand = cpu_to_le16(TRANS2_SET_PATH_INFORMATION);
6241 byte_count = 3 /* pad */ + params + count;
6242 pSMB->ParameterCount = cpu_to_le16(params);
6243 pSMB->DataCount = cpu_to_le16(count);
6244 pSMB->TotalParameterCount = pSMB->ParameterCount;
6245 pSMB->TotalDataCount = pSMB->DataCount;
6246 pSMB->InformationLevel = cpu_to_le16(SMB_SET_FILE_UNIX_BASIC);
6247 pSMB->Reserved4 = 0;
6248 inc_rfc1001_len(pSMB, byte_count);
6250 cifs_fill_unix_set_info(data_offset, args);
6252 pSMB->ByteCount = cpu_to_le16(byte_count);
6253 rc = SendReceive(xid, tcon->ses, (struct smb_hdr *) pSMB,
6254 (struct smb_hdr *) pSMBr, &bytes_returned, 0);
6256 cifs_dbg(FYI, "SetPathInfo (perms) returned %d\n", rc);
6258 cifs_buf_release(pSMB);
6264 #ifdef CONFIG_CIFS_XATTR
6266 * Do a path-based QUERY_ALL_EAS call and parse the result. This is a common
6267 * function used by listxattr and getxattr type calls. When ea_name is set,
6268 * it looks for that attribute name and stuffs that value into the EAData
6269 * buffer. When ea_name is NULL, it stuffs a list of attribute names into the
6270 * buffer. In both cases, the return value is either the length of the
6271 * resulting data or a negative error code. If EAData is a NULL pointer then
6272 * the data isn't copied to it, but the length is returned.
6275 CIFSSMBQAllEAs(const unsigned int xid, struct cifs_tcon *tcon,
6276 const unsigned char *searchName, const unsigned char *ea_name,
6277 char *EAData, size_t buf_size,
6278 struct cifs_sb_info *cifs_sb)
6280 /* BB assumes one setup word */
6281 TRANSACTION2_QPI_REQ *pSMB = NULL;
6282 TRANSACTION2_QPI_RSP *pSMBr = NULL;
6283 int remap = cifs_remap(cifs_sb);
6284 struct nls_table *nls_codepage = cifs_sb->local_nls;
6288 struct fealist *ea_response_data;
6289 struct fea *temp_fea;
6292 __u16 params, byte_count, data_offset;
6293 unsigned int ea_name_len = ea_name ? strlen(ea_name) : 0;
6295 cifs_dbg(FYI, "In Query All EAs path %s\n", searchName);
6297 rc = smb_init(SMB_COM_TRANSACTION2, 15, tcon, (void **) &pSMB,
6302 if (pSMB->hdr.Flags2 & SMBFLG2_UNICODE) {
6304 cifsConvertToUTF16((__le16 *) pSMB->FileName, searchName,
6305 PATH_MAX, nls_codepage, remap);
6306 list_len++; /* trailing null */
6308 } else { /* BB improve the check for buffer overruns BB */
6309 list_len = strnlen(searchName, PATH_MAX);
6310 list_len++; /* trailing null */
6311 strncpy(pSMB->FileName, searchName, list_len);
6314 params = 2 /* level */ + 4 /* reserved */ + list_len /* includes NUL */;
6315 pSMB->TotalDataCount = 0;
6316 pSMB->MaxParameterCount = cpu_to_le16(2);
6317 /* BB find exact max SMB PDU from sess structure BB */
6318 pSMB->MaxDataCount = cpu_to_le16(CIFSMaxBufSize);
6319 pSMB->MaxSetupCount = 0;
6323 pSMB->Reserved2 = 0;
6324 pSMB->ParameterOffset = cpu_to_le16(offsetof(
6325 struct smb_com_transaction2_qpi_req, InformationLevel) - 4);
6326 pSMB->DataCount = 0;
6327 pSMB->DataOffset = 0;
6328 pSMB->SetupCount = 1;
6329 pSMB->Reserved3 = 0;
6330 pSMB->SubCommand = cpu_to_le16(TRANS2_QUERY_PATH_INFORMATION);
6331 byte_count = params + 1 /* pad */ ;
6332 pSMB->TotalParameterCount = cpu_to_le16(params);
6333 pSMB->ParameterCount = pSMB->TotalParameterCount;
6334 pSMB->InformationLevel = cpu_to_le16(SMB_INFO_QUERY_ALL_EAS);
6335 pSMB->Reserved4 = 0;
6336 inc_rfc1001_len(pSMB, byte_count);
6337 pSMB->ByteCount = cpu_to_le16(byte_count);
6339 rc = SendReceive(xid, tcon->ses, (struct smb_hdr *) pSMB,
6340 (struct smb_hdr *) pSMBr, &bytes_returned, 0);
6342 cifs_dbg(FYI, "Send error in QueryAllEAs = %d\n", rc);
6347 /* BB also check enough total bytes returned */
6348 /* BB we need to improve the validity checking
6349 of these trans2 responses */
6351 rc = validate_t2((struct smb_t2_rsp *)pSMBr);
6352 if (rc || get_bcc(&pSMBr->hdr) < 4) {
6353 rc = -EIO; /* bad smb */
6357 /* check that length of list is not more than bcc */
6358 /* check that each entry does not go beyond length
6360 /* check that each element of each entry does not
6361 go beyond end of list */
6362 /* validate_trans2_offsets() */
6363 /* BB check if start of smb + data_offset > &bcc+ bcc */
6365 data_offset = le16_to_cpu(pSMBr->t2.DataOffset);
6366 ea_response_data = (struct fealist *)
6367 (((char *) &pSMBr->hdr.Protocol) + data_offset);
6369 list_len = le32_to_cpu(ea_response_data->list_len);
6370 cifs_dbg(FYI, "ea length %d\n", list_len);
6371 if (list_len <= 8) {
6372 cifs_dbg(FYI, "empty EA list returned from server\n");
6373 /* didn't find the named attribute */
6379 /* make sure list_len doesn't go past end of SMB */
6380 end_of_smb = (char *)pByteArea(&pSMBr->hdr) + get_bcc(&pSMBr->hdr);
6381 if ((char *)ea_response_data + list_len > end_of_smb) {
6382 cifs_dbg(FYI, "EA list appears to go beyond SMB\n");
6387 /* account for ea list len */
6389 temp_fea = ea_response_data->list;
6390 temp_ptr = (char *)temp_fea;
6391 while (list_len > 0) {
6392 unsigned int name_len;
6397 /* make sure we can read name_len and value_len */
6399 cifs_dbg(FYI, "EA entry goes beyond length of list\n");
6404 name_len = temp_fea->name_len;
6405 value_len = le16_to_cpu(temp_fea->value_len);
6406 list_len -= name_len + 1 + value_len;
6408 cifs_dbg(FYI, "EA entry goes beyond length of list\n");
6414 if (ea_name_len == name_len &&
6415 memcmp(ea_name, temp_ptr, name_len) == 0) {
6416 temp_ptr += name_len + 1;
6420 if ((size_t)value_len > buf_size) {
6424 memcpy(EAData, temp_ptr, value_len);
6428 /* account for prefix user. and trailing null */
6429 rc += (5 + 1 + name_len);
6430 if (rc < (int) buf_size) {
6431 memcpy(EAData, "user.", 5);
6433 memcpy(EAData, temp_ptr, name_len);
6435 /* null terminate name */
6438 } else if (buf_size == 0) {
6439 /* skip copy - calc size only */
6441 /* stop before overrun buffer */
6446 temp_ptr += name_len + 1 + value_len;
6447 temp_fea = (struct fea *)temp_ptr;
6450 /* didn't find the named attribute */
6455 cifs_buf_release(pSMB);
6463 CIFSSMBSetEA(const unsigned int xid, struct cifs_tcon *tcon,
6464 const char *fileName, const char *ea_name, const void *ea_value,
6465 const __u16 ea_value_len, const struct nls_table *nls_codepage,
6466 struct cifs_sb_info *cifs_sb)
6468 struct smb_com_transaction2_spi_req *pSMB = NULL;
6469 struct smb_com_transaction2_spi_rsp *pSMBr = NULL;
6470 struct fealist *parm_data;
6473 int bytes_returned = 0;
6474 __u16 params, param_offset, byte_count, offset, count;
6475 int remap = cifs_remap(cifs_sb);
6477 cifs_dbg(FYI, "In SetEA\n");
6479 rc = smb_init(SMB_COM_TRANSACTION2, 15, tcon, (void **) &pSMB,
6484 if (pSMB->hdr.Flags2 & SMBFLG2_UNICODE) {
6486 cifsConvertToUTF16((__le16 *) pSMB->FileName, fileName,
6487 PATH_MAX, nls_codepage, remap);
6488 name_len++; /* trailing null */
6490 } else { /* BB improve the check for buffer overruns BB */
6491 name_len = strnlen(fileName, PATH_MAX);
6492 name_len++; /* trailing null */
6493 strncpy(pSMB->FileName, fileName, name_len);
6496 params = 6 + name_len;
6498 /* done calculating parms using name_len of file name,
6499 now use name_len to calculate length of ea name
6500 we are going to create in the inode xattrs */
6501 if (ea_name == NULL)
6504 name_len = strnlen(ea_name, 255);
6506 count = sizeof(*parm_data) + ea_value_len + name_len;
6507 pSMB->MaxParameterCount = cpu_to_le16(2);
6508 /* BB find max SMB PDU from sess */
6509 pSMB->MaxDataCount = cpu_to_le16(1000);
6510 pSMB->MaxSetupCount = 0;
6514 pSMB->Reserved2 = 0;
6515 param_offset = offsetof(struct smb_com_transaction2_spi_req,
6516 InformationLevel) - 4;
6517 offset = param_offset + params;
6518 pSMB->InformationLevel =
6519 cpu_to_le16(SMB_SET_FILE_EA);
6521 parm_data = (void *)pSMB + offsetof(struct smb_hdr, Protocol) + offset;
6522 pSMB->ParameterOffset = cpu_to_le16(param_offset);
6523 pSMB->DataOffset = cpu_to_le16(offset);
6524 pSMB->SetupCount = 1;
6525 pSMB->Reserved3 = 0;
6526 pSMB->SubCommand = cpu_to_le16(TRANS2_SET_PATH_INFORMATION);
6527 byte_count = 3 /* pad */ + params + count;
6528 pSMB->DataCount = cpu_to_le16(count);
6529 parm_data->list_len = cpu_to_le32(count);
6530 parm_data->list[0].EA_flags = 0;
6531 /* we checked above that name len is less than 255 */
6532 parm_data->list[0].name_len = (__u8)name_len;
6533 /* EA names are always ASCII */
6535 strncpy(parm_data->list[0].name, ea_name, name_len);
6536 parm_data->list[0].name[name_len] = 0;
6537 parm_data->list[0].value_len = cpu_to_le16(ea_value_len);
6538 /* caller ensures that ea_value_len is less than 64K but
6539 we need to ensure that it fits within the smb */
6541 /*BB add length check to see if it would fit in
6542 negotiated SMB buffer size BB */
6543 /* if (ea_value_len > buffer_size - 512 (enough for header)) */
6545 memcpy(parm_data->list[0].name+name_len+1,
6546 ea_value, ea_value_len);
6548 pSMB->TotalDataCount = pSMB->DataCount;
6549 pSMB->ParameterCount = cpu_to_le16(params);
6550 pSMB->TotalParameterCount = pSMB->ParameterCount;
6551 pSMB->Reserved4 = 0;
6552 inc_rfc1001_len(pSMB, byte_count);
6553 pSMB->ByteCount = cpu_to_le16(byte_count);
6554 rc = SendReceive(xid, tcon->ses, (struct smb_hdr *) pSMB,
6555 (struct smb_hdr *) pSMBr, &bytes_returned, 0);
6557 cifs_dbg(FYI, "SetPathInfo (EA) returned %d\n", rc);
6559 cifs_buf_release(pSMB);
6568 #ifdef CONFIG_CIFS_DNOTIFY_EXPERIMENTAL /* BB unused temporarily */
6570 * Years ago the kernel added a "dnotify" function for Samba server,
6571 * to allow network clients (such as Windows) to display updated
6572 * lists of files in directory listings automatically when
6573 * files are added by one user when another user has the
6574 * same directory open on their desktop. The Linux cifs kernel
6575 * client hooked into the kernel side of this interface for
6576 * the same reason, but ironically when the VFS moved from
6577 * "dnotify" to "inotify" it became harder to plug in Linux
6578 * network file system clients (the most obvious use case
6579 * for notify interfaces is when multiple users can update
6580 * the contents of the same directory - exactly what network
6581 * file systems can do) although the server (Samba) could
6582 * still use it. For the short term we leave the worker
6583 * function ifdeffed out (below) until inotify is fixed
6584 * in the VFS to make it easier to plug in network file
6585 * system clients. If inotify turns out to be permanently
6586 * incompatible for network fs clients, we could instead simply
6587 * expose this config flag by adding a future cifs (and smb2) notify ioctl.
6589 int CIFSSMBNotify(const unsigned int xid, struct cifs_tcon *tcon,
6590 const int notify_subdirs, const __u16 netfid,
6591 __u32 filter, struct file *pfile, int multishot,
6592 const struct nls_table *nls_codepage)
6595 struct smb_com_transaction_change_notify_req *pSMB = NULL;
6596 struct smb_com_ntransaction_change_notify_rsp *pSMBr = NULL;
6597 struct dir_notify_req *dnotify_req;
6600 cifs_dbg(FYI, "In CIFSSMBNotify for file handle %d\n", (int)netfid);
6601 rc = smb_init(SMB_COM_NT_TRANSACT, 23, tcon, (void **) &pSMB,
6606 pSMB->TotalParameterCount = 0 ;
6607 pSMB->TotalDataCount = 0;
6608 pSMB->MaxParameterCount = cpu_to_le32(2);
6609 pSMB->MaxDataCount = cpu_to_le32(CIFSMaxBufSize & 0xFFFFFF00);
6610 pSMB->MaxSetupCount = 4;
6612 pSMB->ParameterOffset = 0;
6613 pSMB->DataCount = 0;
6614 pSMB->DataOffset = 0;
6615 pSMB->SetupCount = 4; /* single byte does not need le conversion */
6616 pSMB->SubCommand = cpu_to_le16(NT_TRANSACT_NOTIFY_CHANGE);
6617 pSMB->ParameterCount = pSMB->TotalParameterCount;
6619 pSMB->WatchTree = 1; /* one byte - no le conversion needed */
6620 pSMB->Reserved2 = 0;
6621 pSMB->CompletionFilter = cpu_to_le32(filter);
6622 pSMB->Fid = netfid; /* file handle always le */
6623 pSMB->ByteCount = 0;
6625 rc = SendReceive(xid, tcon->ses, (struct smb_hdr *) pSMB,
6626 (struct smb_hdr *)pSMBr, &bytes_returned,
6629 cifs_dbg(FYI, "Error in Notify = %d\n", rc);
6631 /* Add file to outstanding requests */
6632 /* BB change to kmem cache alloc */
6633 dnotify_req = kmalloc(
6634 sizeof(struct dir_notify_req),
6637 dnotify_req->Pid = pSMB->hdr.Pid;
6638 dnotify_req->PidHigh = pSMB->hdr.PidHigh;
6639 dnotify_req->Mid = pSMB->hdr.Mid;
6640 dnotify_req->Tid = pSMB->hdr.Tid;
6641 dnotify_req->Uid = pSMB->hdr.Uid;
6642 dnotify_req->netfid = netfid;
6643 dnotify_req->pfile = pfile;
6644 dnotify_req->filter = filter;
6645 dnotify_req->multishot = multishot;
6646 spin_lock(&GlobalMid_Lock);
6647 list_add_tail(&dnotify_req->lhead,
6648 &GlobalDnotifyReqList);
6649 spin_unlock(&GlobalMid_Lock);
6653 cifs_buf_release(pSMB);
6656 #endif /* was needed for dnotify, and will be needed for inotify when VFS fix */