4 * Copyright (C) International Business Machines Corp., 2002,2010
7 * Contains the routines for constructing the SMB PDUs themselves
9 * This library is free software; you can redistribute it and/or modify
10 * it under the terms of the GNU Lesser General Public License as published
11 * by the Free Software Foundation; either version 2.1 of the License, or
12 * (at your option) any later version.
14 * This library is distributed in the hope that it will be useful,
15 * but WITHOUT ANY WARRANTY; without even the implied warranty of
16 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See
17 * the GNU Lesser General Public License for more details.
19 * You should have received a copy of the GNU Lesser General Public License
20 * along with this library; if not, write to the Free Software
21 * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
24 /* SMB/CIFS PDU handling routines here - except for leftovers in connect.c */
25 /* These are mostly routines that operate on a pathname, or on a tree id */
26 /* (mounted volume), but there are eight handle based routines which must be */
27 /* treated slightly differently for reconnection purposes since we never */
28 /* want to reuse a stale file handle and only the caller knows the file info */
31 #include <linux/kernel.h>
32 #include <linux/vfs.h>
33 #include <linux/slab.h>
34 #include <linux/posix_acl_xattr.h>
35 #include <linux/pagemap.h>
36 #include <linux/swap.h>
37 #include <linux/task_io_accounting_ops.h>
38 #include <asm/uaccess.h>
42 #include "cifsproto.h"
43 #include "cifs_unicode.h"
44 #include "cifs_debug.h"
47 #ifdef CONFIG_CIFS_POSIX
52 #ifdef CONFIG_CIFS_WEAK_PW_HASH
53 {LANMAN_PROT, "\2LM1.2X002"},
54 {LANMAN2_PROT, "\2LANMAN2.1"},
55 #endif /* weak password hashing for legacy clients */
56 {CIFS_PROT, "\2NT LM 0.12"},
57 {POSIX_PROT, "\2POSIX 2"},
65 #ifdef CONFIG_CIFS_WEAK_PW_HASH
66 {LANMAN_PROT, "\2LM1.2X002"},
67 {LANMAN2_PROT, "\2LANMAN2.1"},
68 #endif /* weak password hashing for legacy clients */
69 {CIFS_PROT, "\2NT LM 0.12"},
74 /* define the number of elements in the cifs dialect array */
75 #ifdef CONFIG_CIFS_POSIX
76 #ifdef CONFIG_CIFS_WEAK_PW_HASH
77 #define CIFS_NUM_PROT 4
79 #define CIFS_NUM_PROT 2
80 #endif /* CIFS_WEAK_PW_HASH */
82 #ifdef CONFIG_CIFS_WEAK_PW_HASH
83 #define CIFS_NUM_PROT 3
85 #define CIFS_NUM_PROT 1
86 #endif /* CONFIG_CIFS_WEAK_PW_HASH */
87 #endif /* CIFS_POSIX */
90 * Mark as invalid, all open files on tree connections since they
91 * were closed when session to server was lost.
94 cifs_mark_open_files_invalid(struct cifs_tcon *tcon)
96 struct cifsFileInfo *open_file = NULL;
97 struct list_head *tmp;
98 struct list_head *tmp1;
100 /* list all files open on tree connection and mark them invalid */
101 spin_lock(&cifs_file_list_lock);
102 list_for_each_safe(tmp, tmp1, &tcon->openFileList) {
103 open_file = list_entry(tmp, struct cifsFileInfo, tlist);
104 open_file->invalidHandle = true;
105 open_file->oplock_break_cancelled = true;
107 spin_unlock(&cifs_file_list_lock);
109 * BB Add call to invalidate_inodes(sb) for all superblocks mounted
114 /* reconnect the socket, tcon, and smb session if needed */
116 cifs_reconnect_tcon(struct cifs_tcon *tcon, int smb_command)
119 struct cifs_ses *ses;
120 struct TCP_Server_Info *server;
121 struct nls_table *nls_codepage;
124 * SMBs NegProt, SessSetup, uLogoff do not have tcon yet so check for
125 * tcp and smb session status done differently for those three - in the
132 server = ses->server;
135 * only tree disconnect, open, and write, (and ulogoff which does not
136 * have tcon) are allowed as we start force umount
138 if (tcon->tidStatus == CifsExiting) {
139 if (smb_command != SMB_COM_WRITE_ANDX &&
140 smb_command != SMB_COM_OPEN_ANDX &&
141 smb_command != SMB_COM_TREE_DISCONNECT) {
142 cFYI(1, "can not send cmd %d while umounting",
149 * Give demultiplex thread up to 10 seconds to reconnect, should be
150 * greater than cifs socket timeout which is 7 seconds
152 while (server->tcpStatus == CifsNeedReconnect) {
153 wait_event_interruptible_timeout(server->response_q,
154 (server->tcpStatus != CifsNeedReconnect), 10 * HZ);
156 /* are we still trying to reconnect? */
157 if (server->tcpStatus != CifsNeedReconnect)
161 * on "soft" mounts we wait once. Hard mounts keep
162 * retrying until process is killed or server comes
166 cFYI(1, "gave up waiting on reconnect in smb_init");
171 if (!ses->need_reconnect && !tcon->need_reconnect)
174 nls_codepage = load_nls_default();
177 * need to prevent multiple threads trying to simultaneously
178 * reconnect the same SMB session
180 mutex_lock(&ses->session_mutex);
181 rc = cifs_negotiate_protocol(0, ses);
182 if (rc == 0 && ses->need_reconnect)
183 rc = cifs_setup_session(0, ses, nls_codepage);
185 /* do we need to reconnect tcon? */
186 if (rc || !tcon->need_reconnect) {
187 mutex_unlock(&ses->session_mutex);
191 cifs_mark_open_files_invalid(tcon);
192 rc = CIFSTCon(0, ses, tcon->treeName, tcon, nls_codepage);
193 mutex_unlock(&ses->session_mutex);
194 cFYI(1, "reconnect tcon rc = %d", rc);
200 * FIXME: check if wsize needs updated due to negotiated smb buffer
203 atomic_inc(&tconInfoReconnectCount);
205 /* tell server Unix caps we support */
206 if (ses->capabilities & CAP_UNIX)
207 reset_cifs_unix_caps(0, tcon, NULL, NULL);
210 * Removed call to reopen open files here. It is safer (and faster) to
211 * reopen files one at a time as needed in read and write.
213 * FIXME: what about file locks? don't we need to reclaim them ASAP?
218 * Check if handle based operation so we know whether we can continue
219 * or not without returning to caller to reset file handle
221 switch (smb_command) {
222 case SMB_COM_READ_ANDX:
223 case SMB_COM_WRITE_ANDX:
225 case SMB_COM_FIND_CLOSE2:
226 case SMB_COM_LOCKING_ANDX:
230 unload_nls(nls_codepage);
234 /* Allocate and return pointer to an SMB request buffer, and set basic
235 SMB information in the SMB header. If the return code is zero, this
236 function must have filled in request_buf pointer */
238 small_smb_init(int smb_command, int wct, struct cifs_tcon *tcon,
243 rc = cifs_reconnect_tcon(tcon, smb_command);
247 *request_buf = cifs_small_buf_get();
248 if (*request_buf == NULL) {
249 /* BB should we add a retry in here if not a writepage? */
253 header_assemble((struct smb_hdr *) *request_buf, smb_command,
257 cifs_stats_inc(&tcon->num_smbs_sent);
263 small_smb_init_no_tc(const int smb_command, const int wct,
264 struct cifs_ses *ses, void **request_buf)
267 struct smb_hdr *buffer;
269 rc = small_smb_init(smb_command, wct, NULL, request_buf);
273 buffer = (struct smb_hdr *)*request_buf;
274 buffer->Mid = get_next_mid(ses->server);
275 if (ses->capabilities & CAP_UNICODE)
276 buffer->Flags2 |= SMBFLG2_UNICODE;
277 if (ses->capabilities & CAP_STATUS32)
278 buffer->Flags2 |= SMBFLG2_ERR_STATUS;
280 /* uid, tid can stay at zero as set in header assemble */
282 /* BB add support for turning on the signing when
283 this function is used after 1st of session setup requests */
288 /* If the return code is zero, this function must fill in request_buf pointer */
290 __smb_init(int smb_command, int wct, struct cifs_tcon *tcon,
291 void **request_buf, void **response_buf)
293 *request_buf = cifs_buf_get();
294 if (*request_buf == NULL) {
295 /* BB should we add a retry in here if not a writepage? */
298 /* Although the original thought was we needed the response buf for */
299 /* potential retries of smb operations it turns out we can determine */
300 /* from the mid flags when the request buffer can be resent without */
301 /* having to use a second distinct buffer for the response */
303 *response_buf = *request_buf;
305 header_assemble((struct smb_hdr *) *request_buf, smb_command, tcon,
309 cifs_stats_inc(&tcon->num_smbs_sent);
314 /* If the return code is zero, this function must fill in request_buf pointer */
316 smb_init(int smb_command, int wct, struct cifs_tcon *tcon,
317 void **request_buf, void **response_buf)
321 rc = cifs_reconnect_tcon(tcon, smb_command);
325 return __smb_init(smb_command, wct, tcon, request_buf, response_buf);
329 smb_init_no_reconnect(int smb_command, int wct, struct cifs_tcon *tcon,
330 void **request_buf, void **response_buf)
332 if (tcon->ses->need_reconnect || tcon->need_reconnect)
335 return __smb_init(smb_command, wct, tcon, request_buf, response_buf);
338 static int validate_t2(struct smb_t2_rsp *pSMB)
340 unsigned int total_size;
342 /* check for plausible wct */
343 if (pSMB->hdr.WordCount < 10)
346 /* check for parm and data offset going beyond end of smb */
347 if (get_unaligned_le16(&pSMB->t2_rsp.ParameterOffset) > 1024 ||
348 get_unaligned_le16(&pSMB->t2_rsp.DataOffset) > 1024)
351 total_size = get_unaligned_le16(&pSMB->t2_rsp.ParameterCount);
352 if (total_size >= 512)
355 /* check that bcc is at least as big as parms + data, and that it is
356 * less than negotiated smb buffer
358 total_size += get_unaligned_le16(&pSMB->t2_rsp.DataCount);
359 if (total_size > get_bcc(&pSMB->hdr) ||
360 total_size >= CIFSMaxBufSize + MAX_CIFS_HDR_SIZE)
365 cifs_dump_mem("Invalid transact2 SMB: ", (char *)pSMB,
366 sizeof(struct smb_t2_rsp) + 16);
371 CIFSSMBNegotiate(const unsigned int xid, struct cifs_ses *ses)
374 NEGOTIATE_RSP *pSMBr;
378 struct TCP_Server_Info *server;
380 unsigned int secFlags;
383 server = ses->server;
388 rc = smb_init(SMB_COM_NEGOTIATE, 0, NULL /* no tcon yet */ ,
389 (void **) &pSMB, (void **) &pSMBr);
393 /* if any of auth flags (ie not sign or seal) are overriden use them */
394 if (ses->overrideSecFlg & (~(CIFSSEC_MUST_SIGN | CIFSSEC_MUST_SEAL)))
395 secFlags = ses->overrideSecFlg; /* BB FIXME fix sign flags? */
396 else /* if override flags set only sign/seal OR them with global auth */
397 secFlags = global_secflags | ses->overrideSecFlg;
399 cFYI(1, "secFlags 0x%x", secFlags);
401 pSMB->hdr.Mid = get_next_mid(server);
402 pSMB->hdr.Flags2 |= (SMBFLG2_UNICODE | SMBFLG2_ERR_STATUS);
404 if ((secFlags & CIFSSEC_MUST_KRB5) == CIFSSEC_MUST_KRB5)
405 pSMB->hdr.Flags2 |= SMBFLG2_EXT_SEC;
406 else if ((secFlags & CIFSSEC_AUTH_MASK) == CIFSSEC_MAY_KRB5) {
407 cFYI(1, "Kerberos only mechanism, enable extended security");
408 pSMB->hdr.Flags2 |= SMBFLG2_EXT_SEC;
409 } else if ((secFlags & CIFSSEC_MUST_NTLMSSP) == CIFSSEC_MUST_NTLMSSP)
410 pSMB->hdr.Flags2 |= SMBFLG2_EXT_SEC;
411 else if ((secFlags & CIFSSEC_AUTH_MASK) == CIFSSEC_MAY_NTLMSSP) {
412 cFYI(1, "NTLMSSP only mechanism, enable extended security");
413 pSMB->hdr.Flags2 |= SMBFLG2_EXT_SEC;
417 for (i = 0; i < CIFS_NUM_PROT; i++) {
418 strncpy(pSMB->DialectsArray+count, protocols[i].name, 16);
419 count += strlen(protocols[i].name) + 1;
420 /* null at end of source and target buffers anyway */
422 inc_rfc1001_len(pSMB, count);
423 pSMB->ByteCount = cpu_to_le16(count);
425 rc = SendReceive(xid, ses, (struct smb_hdr *) pSMB,
426 (struct smb_hdr *) pSMBr, &bytes_returned, 0);
430 server->dialect = le16_to_cpu(pSMBr->DialectIndex);
431 cFYI(1, "Dialect: %d", server->dialect);
432 /* Check wct = 1 error case */
433 if ((pSMBr->hdr.WordCount < 13) || (server->dialect == BAD_PROT)) {
434 /* core returns wct = 1, but we do not ask for core - otherwise
435 small wct just comes when dialect index is -1 indicating we
436 could not negotiate a common dialect */
439 #ifdef CONFIG_CIFS_WEAK_PW_HASH
440 } else if ((pSMBr->hdr.WordCount == 13)
441 && ((server->dialect == LANMAN_PROT)
442 || (server->dialect == LANMAN2_PROT))) {
444 struct lanman_neg_rsp *rsp = (struct lanman_neg_rsp *)pSMBr;
446 if ((secFlags & CIFSSEC_MAY_LANMAN) ||
447 (secFlags & CIFSSEC_MAY_PLNTXT))
448 server->secType = LANMAN;
450 cERROR(1, "mount failed weak security disabled"
451 " in /proc/fs/cifs/SecurityFlags");
455 server->sec_mode = le16_to_cpu(rsp->SecurityMode);
456 server->maxReq = min_t(unsigned int,
457 le16_to_cpu(rsp->MaxMpxCount),
459 set_credits(server, server->maxReq);
460 server->maxBuf = le16_to_cpu(rsp->MaxBufSize);
461 server->max_vcs = le16_to_cpu(rsp->MaxNumberVcs);
462 /* even though we do not use raw we might as well set this
463 accurately, in case we ever find a need for it */
464 if ((le16_to_cpu(rsp->RawMode) & RAW_ENABLE) == RAW_ENABLE) {
465 server->max_rw = 0xFF00;
466 server->capabilities = CAP_MPX_MODE | CAP_RAW_MODE;
468 server->max_rw = 0;/* do not need to use raw anyway */
469 server->capabilities = CAP_MPX_MODE;
471 tmp = (__s16)le16_to_cpu(rsp->ServerTimeZone);
473 /* OS/2 often does not set timezone therefore
474 * we must use server time to calc time zone.
475 * Could deviate slightly from the right zone.
476 * Smallest defined timezone difference is 15 minutes
477 * (i.e. Nepal). Rounding up/down is done to match
480 int val, seconds, remain, result;
481 struct timespec ts, utc;
483 ts = cnvrtDosUnixTm(rsp->SrvTime.Date,
484 rsp->SrvTime.Time, 0);
485 cFYI(1, "SrvTime %d sec since 1970 (utc: %d) diff: %d",
486 (int)ts.tv_sec, (int)utc.tv_sec,
487 (int)(utc.tv_sec - ts.tv_sec));
488 val = (int)(utc.tv_sec - ts.tv_sec);
490 result = (seconds / MIN_TZ_ADJ) * MIN_TZ_ADJ;
491 remain = seconds % MIN_TZ_ADJ;
492 if (remain >= (MIN_TZ_ADJ / 2))
493 result += MIN_TZ_ADJ;
496 server->timeAdj = result;
498 server->timeAdj = (int)tmp;
499 server->timeAdj *= 60; /* also in seconds */
501 cFYI(1, "server->timeAdj: %d seconds", server->timeAdj);
504 /* BB get server time for time conversions and add
505 code to use it and timezone since this is not UTC */
507 if (rsp->EncryptionKeyLength ==
508 cpu_to_le16(CIFS_CRYPTO_KEY_SIZE)) {
509 memcpy(ses->server->cryptkey, rsp->EncryptionKey,
510 CIFS_CRYPTO_KEY_SIZE);
511 } else if (server->sec_mode & SECMODE_PW_ENCRYPT) {
512 rc = -EIO; /* need cryptkey unless plain text */
516 cFYI(1, "LANMAN negotiated");
517 /* we will not end up setting signing flags - as no signing
518 was in LANMAN and server did not return the flags on */
520 #else /* weak security disabled */
521 } else if (pSMBr->hdr.WordCount == 13) {
522 cERROR(1, "mount failed, cifs module not built "
523 "with CIFS_WEAK_PW_HASH support");
525 #endif /* WEAK_PW_HASH */
527 } else if (pSMBr->hdr.WordCount != 17) {
532 /* else wct == 17 NTLM */
533 server->sec_mode = pSMBr->SecurityMode;
534 if ((server->sec_mode & SECMODE_USER) == 0)
535 cFYI(1, "share mode security");
537 if ((server->sec_mode & SECMODE_PW_ENCRYPT) == 0)
538 #ifdef CONFIG_CIFS_WEAK_PW_HASH
539 if ((secFlags & CIFSSEC_MAY_PLNTXT) == 0)
540 #endif /* CIFS_WEAK_PW_HASH */
541 cERROR(1, "Server requests plain text password"
542 " but client support disabled");
544 if ((secFlags & CIFSSEC_MUST_NTLMV2) == CIFSSEC_MUST_NTLMV2)
545 server->secType = NTLMv2;
546 else if (secFlags & CIFSSEC_MAY_NTLM)
547 server->secType = NTLM;
548 else if (secFlags & CIFSSEC_MAY_NTLMV2)
549 server->secType = NTLMv2;
550 else if (secFlags & CIFSSEC_MAY_KRB5)
551 server->secType = Kerberos;
552 else if (secFlags & CIFSSEC_MAY_NTLMSSP)
553 server->secType = RawNTLMSSP;
554 else if (secFlags & CIFSSEC_MAY_LANMAN)
555 server->secType = LANMAN;
558 cERROR(1, "Invalid security type");
561 /* else ... any others ...? */
563 /* one byte, so no need to convert this or EncryptionKeyLen from
565 server->maxReq = min_t(unsigned int, le16_to_cpu(pSMBr->MaxMpxCount),
567 set_credits(server, server->maxReq);
568 /* probably no need to store and check maxvcs */
569 server->maxBuf = le32_to_cpu(pSMBr->MaxBufferSize);
570 server->max_rw = le32_to_cpu(pSMBr->MaxRawSize);
571 cFYI(DBG2, "Max buf = %d", ses->server->maxBuf);
572 server->capabilities = le32_to_cpu(pSMBr->Capabilities);
573 server->timeAdj = (int)(__s16)le16_to_cpu(pSMBr->ServerTimeZone);
574 server->timeAdj *= 60;
575 if (pSMBr->EncryptionKeyLength == CIFS_CRYPTO_KEY_SIZE) {
576 memcpy(ses->server->cryptkey, pSMBr->u.EncryptionKey,
577 CIFS_CRYPTO_KEY_SIZE);
578 } else if ((pSMBr->hdr.Flags2 & SMBFLG2_EXT_SEC ||
579 server->capabilities & CAP_EXTENDED_SECURITY) &&
580 (pSMBr->EncryptionKeyLength == 0)) {
581 /* decode security blob */
582 count = get_bcc(&pSMBr->hdr);
587 spin_lock(&cifs_tcp_ses_lock);
588 if (server->srv_count > 1) {
589 spin_unlock(&cifs_tcp_ses_lock);
590 if (memcmp(server->server_GUID,
591 pSMBr->u.extended_response.
593 cFYI(1, "server UID changed");
594 memcpy(server->server_GUID,
595 pSMBr->u.extended_response.GUID,
599 spin_unlock(&cifs_tcp_ses_lock);
600 memcpy(server->server_GUID,
601 pSMBr->u.extended_response.GUID, 16);
605 server->secType = RawNTLMSSP;
607 rc = decode_negTokenInit(pSMBr->u.extended_response.
608 SecurityBlob, count - 16,
614 if (server->secType == Kerberos) {
615 if (!server->sec_kerberos &&
616 !server->sec_mskerberos)
618 } else if (server->secType == RawNTLMSSP) {
619 if (!server->sec_ntlmssp)
624 } else if (server->sec_mode & SECMODE_PW_ENCRYPT) {
625 rc = -EIO; /* no crypt key only if plain text pwd */
628 server->capabilities &= ~CAP_EXTENDED_SECURITY;
630 #ifdef CONFIG_CIFS_WEAK_PW_HASH
633 if ((secFlags & CIFSSEC_MAY_SIGN) == 0) {
634 /* MUST_SIGN already includes the MAY_SIGN FLAG
635 so if this is zero it means that signing is disabled */
636 cFYI(1, "Signing disabled");
637 if (server->sec_mode & SECMODE_SIGN_REQUIRED) {
638 cERROR(1, "Server requires "
639 "packet signing to be enabled in "
640 "/proc/fs/cifs/SecurityFlags.");
644 ~(SECMODE_SIGN_ENABLED | SECMODE_SIGN_REQUIRED);
645 } else if ((secFlags & CIFSSEC_MUST_SIGN) == CIFSSEC_MUST_SIGN) {
646 /* signing required */
647 cFYI(1, "Must sign - secFlags 0x%x", secFlags);
648 if ((server->sec_mode &
649 (SECMODE_SIGN_ENABLED | SECMODE_SIGN_REQUIRED)) == 0) {
650 cERROR(1, "signing required but server lacks support");
653 server->sec_mode |= SECMODE_SIGN_REQUIRED;
655 /* signing optional ie CIFSSEC_MAY_SIGN */
656 if ((server->sec_mode & SECMODE_SIGN_REQUIRED) == 0)
658 ~(SECMODE_SIGN_ENABLED | SECMODE_SIGN_REQUIRED);
662 cifs_buf_release(pSMB);
664 cFYI(1, "negprot rc %d", rc);
669 CIFSSMBTDis(const unsigned int xid, struct cifs_tcon *tcon)
671 struct smb_hdr *smb_buffer;
674 cFYI(1, "In tree disconnect");
676 /* BB: do we need to check this? These should never be NULL. */
677 if ((tcon->ses == NULL) || (tcon->ses->server == NULL))
681 * No need to return error on this operation if tid invalidated and
682 * closed on server already e.g. due to tcp session crashing. Also,
683 * the tcon is no longer on the list, so no need to take lock before
686 if ((tcon->need_reconnect) || (tcon->ses->need_reconnect))
689 rc = small_smb_init(SMB_COM_TREE_DISCONNECT, 0, tcon,
690 (void **)&smb_buffer);
694 rc = SendReceiveNoRsp(xid, tcon->ses, (char *)smb_buffer, 0);
696 cFYI(1, "Tree disconnect failed %d", rc);
698 /* No need to return error on this operation if tid invalidated and
699 closed on server already e.g. due to tcp session crashing */
707 * This is a no-op for now. We're not really interested in the reply, but
708 * rather in the fact that the server sent one and that server->lstrp
711 * FIXME: maybe we should consider checking that the reply matches request?
714 cifs_echo_callback(struct mid_q_entry *mid)
716 struct TCP_Server_Info *server = mid->callback_data;
718 DeleteMidQEntry(mid);
719 add_credits(server, 1, CIFS_ECHO_OP);
723 CIFSSMBEcho(struct TCP_Server_Info *server)
728 struct smb_rqst rqst = { .rq_iov = &iov,
731 cFYI(1, "In echo request");
733 rc = small_smb_init(SMB_COM_ECHO, 0, NULL, (void **)&smb);
737 /* set up echo request */
738 smb->hdr.Tid = 0xffff;
739 smb->hdr.WordCount = 1;
740 put_unaligned_le16(1, &smb->EchoCount);
741 put_bcc(1, &smb->hdr);
743 inc_rfc1001_len(smb, 3);
745 iov.iov_len = be32_to_cpu(smb->hdr.smb_buf_length) + 4;
747 rc = cifs_call_async(server, &rqst, NULL, cifs_echo_callback,
748 server, CIFS_ASYNC_OP | CIFS_ECHO_OP);
750 cFYI(1, "Echo request failed: %d", rc);
752 cifs_small_buf_release(smb);
758 CIFSSMBLogoff(const unsigned int xid, struct cifs_ses *ses)
760 LOGOFF_ANDX_REQ *pSMB;
763 cFYI(1, "In SMBLogoff for session disconnect");
766 * BB: do we need to check validity of ses and server? They should
767 * always be valid since we have an active reference. If not, that
768 * should probably be a BUG()
770 if (!ses || !ses->server)
773 mutex_lock(&ses->session_mutex);
774 if (ses->need_reconnect)
775 goto session_already_dead; /* no need to send SMBlogoff if uid
776 already closed due to reconnect */
777 rc = small_smb_init(SMB_COM_LOGOFF_ANDX, 2, NULL, (void **)&pSMB);
779 mutex_unlock(&ses->session_mutex);
783 pSMB->hdr.Mid = get_next_mid(ses->server);
785 if (ses->server->sec_mode &
786 (SECMODE_SIGN_REQUIRED | SECMODE_SIGN_ENABLED))
787 pSMB->hdr.Flags2 |= SMBFLG2_SECURITY_SIGNATURE;
789 pSMB->hdr.Uid = ses->Suid;
791 pSMB->AndXCommand = 0xFF;
792 rc = SendReceiveNoRsp(xid, ses, (char *) pSMB, 0);
793 session_already_dead:
794 mutex_unlock(&ses->session_mutex);
796 /* if session dead then we do not need to do ulogoff,
797 since server closed smb session, no sense reporting
805 CIFSPOSIXDelFile(const unsigned int xid, struct cifs_tcon *tcon,
806 const char *fileName, __u16 type,
807 const struct nls_table *nls_codepage, int remap)
809 TRANSACTION2_SPI_REQ *pSMB = NULL;
810 TRANSACTION2_SPI_RSP *pSMBr = NULL;
811 struct unlink_psx_rq *pRqD;
814 int bytes_returned = 0;
815 __u16 params, param_offset, offset, byte_count;
817 cFYI(1, "In POSIX delete");
819 rc = smb_init(SMB_COM_TRANSACTION2, 15, tcon, (void **) &pSMB,
824 if (pSMB->hdr.Flags2 & SMBFLG2_UNICODE) {
826 cifsConvertToUTF16((__le16 *) pSMB->FileName, fileName,
827 PATH_MAX, nls_codepage, remap);
828 name_len++; /* trailing null */
830 } else { /* BB add path length overrun check */
831 name_len = strnlen(fileName, PATH_MAX);
832 name_len++; /* trailing null */
833 strncpy(pSMB->FileName, fileName, name_len);
836 params = 6 + name_len;
837 pSMB->MaxParameterCount = cpu_to_le16(2);
838 pSMB->MaxDataCount = 0; /* BB double check this with jra */
839 pSMB->MaxSetupCount = 0;
844 param_offset = offsetof(struct smb_com_transaction2_spi_req,
845 InformationLevel) - 4;
846 offset = param_offset + params;
848 /* Setup pointer to Request Data (inode type) */
849 pRqD = (struct unlink_psx_rq *)(((char *)&pSMB->hdr.Protocol) + offset);
850 pRqD->type = cpu_to_le16(type);
851 pSMB->ParameterOffset = cpu_to_le16(param_offset);
852 pSMB->DataOffset = cpu_to_le16(offset);
853 pSMB->SetupCount = 1;
855 pSMB->SubCommand = cpu_to_le16(TRANS2_SET_PATH_INFORMATION);
856 byte_count = 3 /* pad */ + params + sizeof(struct unlink_psx_rq);
858 pSMB->DataCount = cpu_to_le16(sizeof(struct unlink_psx_rq));
859 pSMB->TotalDataCount = cpu_to_le16(sizeof(struct unlink_psx_rq));
860 pSMB->ParameterCount = cpu_to_le16(params);
861 pSMB->TotalParameterCount = pSMB->ParameterCount;
862 pSMB->InformationLevel = cpu_to_le16(SMB_POSIX_UNLINK);
864 inc_rfc1001_len(pSMB, byte_count);
865 pSMB->ByteCount = cpu_to_le16(byte_count);
866 rc = SendReceive(xid, tcon->ses, (struct smb_hdr *) pSMB,
867 (struct smb_hdr *) pSMBr, &bytes_returned, 0);
869 cFYI(1, "Posix delete returned %d", rc);
870 cifs_buf_release(pSMB);
872 cifs_stats_inc(&tcon->stats.cifs_stats.num_deletes);
881 CIFSSMBDelFile(const unsigned int xid, struct cifs_tcon *tcon, const char *name,
882 struct cifs_sb_info *cifs_sb)
884 DELETE_FILE_REQ *pSMB = NULL;
885 DELETE_FILE_RSP *pSMBr = NULL;
889 int remap = cifs_sb->mnt_cifs_flags & CIFS_MOUNT_MAP_SPECIAL_CHR;
892 rc = smb_init(SMB_COM_DELETE, 1, tcon, (void **) &pSMB,
897 if (pSMB->hdr.Flags2 & SMBFLG2_UNICODE) {
898 name_len = cifsConvertToUTF16((__le16 *) pSMB->fileName, name,
899 PATH_MAX, cifs_sb->local_nls,
901 name_len++; /* trailing null */
903 } else { /* BB improve check for buffer overruns BB */
904 name_len = strnlen(name, PATH_MAX);
905 name_len++; /* trailing null */
906 strncpy(pSMB->fileName, name, name_len);
908 pSMB->SearchAttributes =
909 cpu_to_le16(ATTR_READONLY | ATTR_HIDDEN | ATTR_SYSTEM);
910 pSMB->BufferFormat = 0x04;
911 inc_rfc1001_len(pSMB, name_len + 1);
912 pSMB->ByteCount = cpu_to_le16(name_len + 1);
913 rc = SendReceive(xid, tcon->ses, (struct smb_hdr *) pSMB,
914 (struct smb_hdr *) pSMBr, &bytes_returned, 0);
915 cifs_stats_inc(&tcon->stats.cifs_stats.num_deletes);
917 cFYI(1, "Error in RMFile = %d", rc);
919 cifs_buf_release(pSMB);
927 CIFSSMBRmDir(const unsigned int xid, struct cifs_tcon *tcon, const char *name,
928 struct cifs_sb_info *cifs_sb)
930 DELETE_DIRECTORY_REQ *pSMB = NULL;
931 DELETE_DIRECTORY_RSP *pSMBr = NULL;
935 int remap = cifs_sb->mnt_cifs_flags & CIFS_MOUNT_MAP_SPECIAL_CHR;
937 cFYI(1, "In CIFSSMBRmDir");
939 rc = smb_init(SMB_COM_DELETE_DIRECTORY, 0, tcon, (void **) &pSMB,
944 if (pSMB->hdr.Flags2 & SMBFLG2_UNICODE) {
945 name_len = cifsConvertToUTF16((__le16 *) pSMB->DirName, name,
946 PATH_MAX, cifs_sb->local_nls,
948 name_len++; /* trailing null */
950 } else { /* BB improve check for buffer overruns BB */
951 name_len = strnlen(name, PATH_MAX);
952 name_len++; /* trailing null */
953 strncpy(pSMB->DirName, name, name_len);
956 pSMB->BufferFormat = 0x04;
957 inc_rfc1001_len(pSMB, name_len + 1);
958 pSMB->ByteCount = cpu_to_le16(name_len + 1);
959 rc = SendReceive(xid, tcon->ses, (struct smb_hdr *) pSMB,
960 (struct smb_hdr *) pSMBr, &bytes_returned, 0);
961 cifs_stats_inc(&tcon->stats.cifs_stats.num_rmdirs);
963 cFYI(1, "Error in RMDir = %d", rc);
965 cifs_buf_release(pSMB);
972 CIFSSMBMkDir(const unsigned int xid, struct cifs_tcon *tcon, const char *name,
973 struct cifs_sb_info *cifs_sb)
976 CREATE_DIRECTORY_REQ *pSMB = NULL;
977 CREATE_DIRECTORY_RSP *pSMBr = NULL;
980 int remap = cifs_sb->mnt_cifs_flags & CIFS_MOUNT_MAP_SPECIAL_CHR;
982 cFYI(1, "In CIFSSMBMkDir");
984 rc = smb_init(SMB_COM_CREATE_DIRECTORY, 0, tcon, (void **) &pSMB,
989 if (pSMB->hdr.Flags2 & SMBFLG2_UNICODE) {
990 name_len = cifsConvertToUTF16((__le16 *) pSMB->DirName, name,
991 PATH_MAX, cifs_sb->local_nls,
993 name_len++; /* trailing null */
995 } else { /* BB improve check for buffer overruns BB */
996 name_len = strnlen(name, PATH_MAX);
997 name_len++; /* trailing null */
998 strncpy(pSMB->DirName, name, name_len);
1001 pSMB->BufferFormat = 0x04;
1002 inc_rfc1001_len(pSMB, name_len + 1);
1003 pSMB->ByteCount = cpu_to_le16(name_len + 1);
1004 rc = SendReceive(xid, tcon->ses, (struct smb_hdr *) pSMB,
1005 (struct smb_hdr *) pSMBr, &bytes_returned, 0);
1006 cifs_stats_inc(&tcon->stats.cifs_stats.num_mkdirs);
1008 cFYI(1, "Error in Mkdir = %d", rc);
1010 cifs_buf_release(pSMB);
1017 CIFSPOSIXCreate(const unsigned int xid, struct cifs_tcon *tcon,
1018 __u32 posix_flags, __u64 mode, __u16 *netfid,
1019 FILE_UNIX_BASIC_INFO *pRetData, __u32 *pOplock,
1020 const char *name, const struct nls_table *nls_codepage,
1023 TRANSACTION2_SPI_REQ *pSMB = NULL;
1024 TRANSACTION2_SPI_RSP *pSMBr = NULL;
1027 int bytes_returned = 0;
1028 __u16 params, param_offset, offset, byte_count, count;
1029 OPEN_PSX_REQ *pdata;
1030 OPEN_PSX_RSP *psx_rsp;
1032 cFYI(1, "In POSIX Create");
1034 rc = smb_init(SMB_COM_TRANSACTION2, 15, tcon, (void **) &pSMB,
1039 if (pSMB->hdr.Flags2 & SMBFLG2_UNICODE) {
1041 cifsConvertToUTF16((__le16 *) pSMB->FileName, name,
1042 PATH_MAX, nls_codepage, remap);
1043 name_len++; /* trailing null */
1045 } else { /* BB improve the check for buffer overruns BB */
1046 name_len = strnlen(name, PATH_MAX);
1047 name_len++; /* trailing null */
1048 strncpy(pSMB->FileName, name, name_len);
1051 params = 6 + name_len;
1052 count = sizeof(OPEN_PSX_REQ);
1053 pSMB->MaxParameterCount = cpu_to_le16(2);
1054 pSMB->MaxDataCount = cpu_to_le16(1000); /* large enough */
1055 pSMB->MaxSetupCount = 0;
1059 pSMB->Reserved2 = 0;
1060 param_offset = offsetof(struct smb_com_transaction2_spi_req,
1061 InformationLevel) - 4;
1062 offset = param_offset + params;
1063 pdata = (OPEN_PSX_REQ *)(((char *)&pSMB->hdr.Protocol) + offset);
1064 pdata->Level = cpu_to_le16(SMB_QUERY_FILE_UNIX_BASIC);
1065 pdata->Permissions = cpu_to_le64(mode);
1066 pdata->PosixOpenFlags = cpu_to_le32(posix_flags);
1067 pdata->OpenFlags = cpu_to_le32(*pOplock);
1068 pSMB->ParameterOffset = cpu_to_le16(param_offset);
1069 pSMB->DataOffset = cpu_to_le16(offset);
1070 pSMB->SetupCount = 1;
1071 pSMB->Reserved3 = 0;
1072 pSMB->SubCommand = cpu_to_le16(TRANS2_SET_PATH_INFORMATION);
1073 byte_count = 3 /* pad */ + params + count;
1075 pSMB->DataCount = cpu_to_le16(count);
1076 pSMB->ParameterCount = cpu_to_le16(params);
1077 pSMB->TotalDataCount = pSMB->DataCount;
1078 pSMB->TotalParameterCount = pSMB->ParameterCount;
1079 pSMB->InformationLevel = cpu_to_le16(SMB_POSIX_OPEN);
1080 pSMB->Reserved4 = 0;
1081 inc_rfc1001_len(pSMB, byte_count);
1082 pSMB->ByteCount = cpu_to_le16(byte_count);
1083 rc = SendReceive(xid, tcon->ses, (struct smb_hdr *) pSMB,
1084 (struct smb_hdr *) pSMBr, &bytes_returned, 0);
1086 cFYI(1, "Posix create returned %d", rc);
1087 goto psx_create_err;
1090 cFYI(1, "copying inode info");
1091 rc = validate_t2((struct smb_t2_rsp *)pSMBr);
1093 if (rc || get_bcc(&pSMBr->hdr) < sizeof(OPEN_PSX_RSP)) {
1094 rc = -EIO; /* bad smb */
1095 goto psx_create_err;
1098 /* copy return information to pRetData */
1099 psx_rsp = (OPEN_PSX_RSP *)((char *) &pSMBr->hdr.Protocol
1100 + le16_to_cpu(pSMBr->t2.DataOffset));
1102 *pOplock = le16_to_cpu(psx_rsp->OplockFlags);
1104 *netfid = psx_rsp->Fid; /* cifs fid stays in le */
1105 /* Let caller know file was created so we can set the mode. */
1106 /* Do we care about the CreateAction in any other cases? */
1107 if (cpu_to_le32(FILE_CREATE) == psx_rsp->CreateAction)
1108 *pOplock |= CIFS_CREATE_ACTION;
1109 /* check to make sure response data is there */
1110 if (psx_rsp->ReturnedLevel != cpu_to_le16(SMB_QUERY_FILE_UNIX_BASIC)) {
1111 pRetData->Type = cpu_to_le32(-1); /* unknown */
1112 cFYI(DBG2, "unknown type");
1114 if (get_bcc(&pSMBr->hdr) < sizeof(OPEN_PSX_RSP)
1115 + sizeof(FILE_UNIX_BASIC_INFO)) {
1116 cERROR(1, "Open response data too small");
1117 pRetData->Type = cpu_to_le32(-1);
1118 goto psx_create_err;
1120 memcpy((char *) pRetData,
1121 (char *)psx_rsp + sizeof(OPEN_PSX_RSP),
1122 sizeof(FILE_UNIX_BASIC_INFO));
1126 cifs_buf_release(pSMB);
1128 if (posix_flags & SMB_O_DIRECTORY)
1129 cifs_stats_inc(&tcon->stats.cifs_stats.num_posixmkdirs);
1131 cifs_stats_inc(&tcon->stats.cifs_stats.num_posixopens);
1139 static __u16 convert_disposition(int disposition)
1143 switch (disposition) {
1144 case FILE_SUPERSEDE:
1145 ofun = SMBOPEN_OCREATE | SMBOPEN_OTRUNC;
1148 ofun = SMBOPEN_OAPPEND;
1151 ofun = SMBOPEN_OCREATE;
1154 ofun = SMBOPEN_OCREATE | SMBOPEN_OAPPEND;
1156 case FILE_OVERWRITE:
1157 ofun = SMBOPEN_OTRUNC;
1159 case FILE_OVERWRITE_IF:
1160 ofun = SMBOPEN_OCREATE | SMBOPEN_OTRUNC;
1163 cFYI(1, "unknown disposition %d", disposition);
1164 ofun = SMBOPEN_OAPPEND; /* regular open */
1170 access_flags_to_smbopen_mode(const int access_flags)
1172 int masked_flags = access_flags & (GENERIC_READ | GENERIC_WRITE);
1174 if (masked_flags == GENERIC_READ)
1175 return SMBOPEN_READ;
1176 else if (masked_flags == GENERIC_WRITE)
1177 return SMBOPEN_WRITE;
1179 /* just go for read/write */
1180 return SMBOPEN_READWRITE;
1184 SMBLegacyOpen(const unsigned int xid, struct cifs_tcon *tcon,
1185 const char *fileName, const int openDisposition,
1186 const int access_flags, const int create_options, __u16 *netfid,
1187 int *pOplock, FILE_ALL_INFO *pfile_info,
1188 const struct nls_table *nls_codepage, int remap)
1191 OPENX_REQ *pSMB = NULL;
1192 OPENX_RSP *pSMBr = NULL;
1198 rc = smb_init(SMB_COM_OPEN_ANDX, 15, tcon, (void **) &pSMB,
1203 pSMB->AndXCommand = 0xFF; /* none */
1205 if (pSMB->hdr.Flags2 & SMBFLG2_UNICODE) {
1206 count = 1; /* account for one byte pad to word boundary */
1208 cifsConvertToUTF16((__le16 *) (pSMB->fileName + 1),
1209 fileName, PATH_MAX, nls_codepage, remap);
1210 name_len++; /* trailing null */
1212 } else { /* BB improve check for buffer overruns BB */
1213 count = 0; /* no pad */
1214 name_len = strnlen(fileName, PATH_MAX);
1215 name_len++; /* trailing null */
1216 strncpy(pSMB->fileName, fileName, name_len);
1218 if (*pOplock & REQ_OPLOCK)
1219 pSMB->OpenFlags = cpu_to_le16(REQ_OPLOCK);
1220 else if (*pOplock & REQ_BATCHOPLOCK)
1221 pSMB->OpenFlags = cpu_to_le16(REQ_BATCHOPLOCK);
1223 pSMB->OpenFlags |= cpu_to_le16(REQ_MORE_INFO);
1224 pSMB->Mode = cpu_to_le16(access_flags_to_smbopen_mode(access_flags));
1225 pSMB->Mode |= cpu_to_le16(0x40); /* deny none */
1226 /* set file as system file if special file such
1227 as fifo and server expecting SFU style and
1228 no Unix extensions */
1230 if (create_options & CREATE_OPTION_SPECIAL)
1231 pSMB->FileAttributes = cpu_to_le16(ATTR_SYSTEM);
1232 else /* BB FIXME BB */
1233 pSMB->FileAttributes = cpu_to_le16(0/*ATTR_NORMAL*/);
1235 if (create_options & CREATE_OPTION_READONLY)
1236 pSMB->FileAttributes |= cpu_to_le16(ATTR_READONLY);
1239 /* pSMB->CreateOptions = cpu_to_le32(create_options &
1240 CREATE_OPTIONS_MASK); */
1241 /* BB FIXME END BB */
1243 pSMB->Sattr = cpu_to_le16(ATTR_HIDDEN | ATTR_SYSTEM | ATTR_DIRECTORY);
1244 pSMB->OpenFunction = cpu_to_le16(convert_disposition(openDisposition));
1246 inc_rfc1001_len(pSMB, count);
1248 pSMB->ByteCount = cpu_to_le16(count);
1249 /* long_op set to 1 to allow for oplock break timeouts */
1250 rc = SendReceive(xid, tcon->ses, (struct smb_hdr *) pSMB,
1251 (struct smb_hdr *)pSMBr, &bytes_returned, 0);
1252 cifs_stats_inc(&tcon->stats.cifs_stats.num_opens);
1254 cFYI(1, "Error in Open = %d", rc);
1256 /* BB verify if wct == 15 */
1258 /* *pOplock = pSMBr->OplockLevel; */ /* BB take from action field*/
1260 *netfid = pSMBr->Fid; /* cifs fid stays in le */
1261 /* Let caller know file was created so we can set the mode. */
1262 /* Do we care about the CreateAction in any other cases? */
1264 /* if (cpu_to_le32(FILE_CREATE) == pSMBr->CreateAction)
1265 *pOplock |= CIFS_CREATE_ACTION; */
1269 pfile_info->CreationTime = 0; /* BB convert CreateTime*/
1270 pfile_info->LastAccessTime = 0; /* BB fixme */
1271 pfile_info->LastWriteTime = 0; /* BB fixme */
1272 pfile_info->ChangeTime = 0; /* BB fixme */
1273 pfile_info->Attributes =
1274 cpu_to_le32(le16_to_cpu(pSMBr->FileAttributes));
1275 /* the file_info buf is endian converted by caller */
1276 pfile_info->AllocationSize =
1277 cpu_to_le64(le32_to_cpu(pSMBr->EndOfFile));
1278 pfile_info->EndOfFile = pfile_info->AllocationSize;
1279 pfile_info->NumberOfLinks = cpu_to_le32(1);
1280 pfile_info->DeletePending = 0;
1284 cifs_buf_release(pSMB);
1291 CIFSSMBOpen(const unsigned int xid, struct cifs_tcon *tcon,
1292 const char *fileName, const int openDisposition,
1293 const int access_flags, const int create_options, __u16 *netfid,
1294 int *pOplock, FILE_ALL_INFO *pfile_info,
1295 const struct nls_table *nls_codepage, int remap)
1298 OPEN_REQ *pSMB = NULL;
1299 OPEN_RSP *pSMBr = NULL;
1305 rc = smb_init(SMB_COM_NT_CREATE_ANDX, 24, tcon, (void **) &pSMB,
1310 pSMB->AndXCommand = 0xFF; /* none */
1312 if (pSMB->hdr.Flags2 & SMBFLG2_UNICODE) {
1313 count = 1; /* account for one byte pad to word boundary */
1315 cifsConvertToUTF16((__le16 *) (pSMB->fileName + 1),
1316 fileName, PATH_MAX, nls_codepage, remap);
1317 name_len++; /* trailing null */
1319 pSMB->NameLength = cpu_to_le16(name_len);
1320 } else { /* BB improve check for buffer overruns BB */
1321 count = 0; /* no pad */
1322 name_len = strnlen(fileName, PATH_MAX);
1323 name_len++; /* trailing null */
1324 pSMB->NameLength = cpu_to_le16(name_len);
1325 strncpy(pSMB->fileName, fileName, name_len);
1327 if (*pOplock & REQ_OPLOCK)
1328 pSMB->OpenFlags = cpu_to_le32(REQ_OPLOCK);
1329 else if (*pOplock & REQ_BATCHOPLOCK)
1330 pSMB->OpenFlags = cpu_to_le32(REQ_BATCHOPLOCK);
1331 pSMB->DesiredAccess = cpu_to_le32(access_flags);
1332 pSMB->AllocationSize = 0;
1333 /* set file as system file if special file such
1334 as fifo and server expecting SFU style and
1335 no Unix extensions */
1336 if (create_options & CREATE_OPTION_SPECIAL)
1337 pSMB->FileAttributes = cpu_to_le32(ATTR_SYSTEM);
1339 pSMB->FileAttributes = cpu_to_le32(ATTR_NORMAL);
1341 /* XP does not handle ATTR_POSIX_SEMANTICS */
1342 /* but it helps speed up case sensitive checks for other
1343 servers such as Samba */
1344 if (tcon->ses->capabilities & CAP_UNIX)
1345 pSMB->FileAttributes |= cpu_to_le32(ATTR_POSIX_SEMANTICS);
1347 if (create_options & CREATE_OPTION_READONLY)
1348 pSMB->FileAttributes |= cpu_to_le32(ATTR_READONLY);
1350 pSMB->ShareAccess = cpu_to_le32(FILE_SHARE_ALL);
1351 pSMB->CreateDisposition = cpu_to_le32(openDisposition);
1352 pSMB->CreateOptions = cpu_to_le32(create_options & CREATE_OPTIONS_MASK);
1353 /* BB Expirement with various impersonation levels and verify */
1354 pSMB->ImpersonationLevel = cpu_to_le32(SECURITY_IMPERSONATION);
1355 pSMB->SecurityFlags =
1356 SECURITY_CONTEXT_TRACKING | SECURITY_EFFECTIVE_ONLY;
1359 inc_rfc1001_len(pSMB, count);
1361 pSMB->ByteCount = cpu_to_le16(count);
1362 /* long_op set to 1 to allow for oplock break timeouts */
1363 rc = SendReceive(xid, tcon->ses, (struct smb_hdr *) pSMB,
1364 (struct smb_hdr *)pSMBr, &bytes_returned, 0);
1365 cifs_stats_inc(&tcon->stats.cifs_stats.num_opens);
1367 cFYI(1, "Error in Open = %d", rc);
1369 *pOplock = pSMBr->OplockLevel; /* 1 byte no need to le_to_cpu */
1370 *netfid = pSMBr->Fid; /* cifs fid stays in le */
1371 /* Let caller know file was created so we can set the mode. */
1372 /* Do we care about the CreateAction in any other cases? */
1373 if (cpu_to_le32(FILE_CREATE) == pSMBr->CreateAction)
1374 *pOplock |= CIFS_CREATE_ACTION;
1376 memcpy((char *)pfile_info, (char *)&pSMBr->CreationTime,
1377 36 /* CreationTime to Attributes */);
1378 /* the file_info buf is endian converted by caller */
1379 pfile_info->AllocationSize = pSMBr->AllocationSize;
1380 pfile_info->EndOfFile = pSMBr->EndOfFile;
1381 pfile_info->NumberOfLinks = cpu_to_le32(1);
1382 pfile_info->DeletePending = 0;
1386 cifs_buf_release(pSMB);
1393 * Discard any remaining data in the current SMB. To do this, we borrow the
1397 cifs_readv_discard(struct TCP_Server_Info *server, struct mid_q_entry *mid)
1399 unsigned int rfclen = get_rfc1002_length(server->smallbuf);
1400 int remaining = rfclen + 4 - server->total_read;
1401 struct cifs_readdata *rdata = mid->callback_data;
1403 while (remaining > 0) {
1406 length = cifs_read_from_socket(server, server->bigbuf,
1407 min_t(unsigned int, remaining,
1408 CIFSMaxBufSize + MAX_HEADER_SIZE(server)));
1411 server->total_read += length;
1412 remaining -= length;
1415 dequeue_mid(mid, rdata->result);
1420 cifs_readv_receive(struct TCP_Server_Info *server, struct mid_q_entry *mid)
1423 unsigned int data_offset, data_len;
1424 struct cifs_readdata *rdata = mid->callback_data;
1425 char *buf = server->smallbuf;
1426 unsigned int buflen = get_rfc1002_length(buf) + 4;
1428 cFYI(1, "%s: mid=%llu offset=%llu bytes=%u", __func__,
1429 mid->mid, rdata->offset, rdata->bytes);
1432 * read the rest of READ_RSP header (sans Data array), or whatever we
1433 * can if there's not enough data. At this point, we've read down to
1436 len = min_t(unsigned int, buflen, server->vals->read_rsp_size) -
1437 HEADER_SIZE(server) + 1;
1439 rdata->iov[0].iov_base = buf + HEADER_SIZE(server) - 1;
1440 rdata->iov[0].iov_len = len;
1442 length = cifs_readv_from_socket(server, rdata->iov, 1, len);
1445 server->total_read += length;
1447 /* Was the SMB read successful? */
1448 rdata->result = server->ops->map_error(buf, false);
1449 if (rdata->result != 0) {
1450 cFYI(1, "%s: server returned error %d", __func__,
1452 return cifs_readv_discard(server, mid);
1455 /* Is there enough to get to the rest of the READ_RSP header? */
1456 if (server->total_read < server->vals->read_rsp_size) {
1457 cFYI(1, "%s: server returned short header. got=%u expected=%zu",
1458 __func__, server->total_read,
1459 server->vals->read_rsp_size);
1460 rdata->result = -EIO;
1461 return cifs_readv_discard(server, mid);
1464 data_offset = server->ops->read_data_offset(buf) + 4;
1465 if (data_offset < server->total_read) {
1467 * win2k8 sometimes sends an offset of 0 when the read
1468 * is beyond the EOF. Treat it as if the data starts just after
1471 cFYI(1, "%s: data offset (%u) inside read response header",
1472 __func__, data_offset);
1473 data_offset = server->total_read;
1474 } else if (data_offset > MAX_CIFS_SMALL_BUFFER_SIZE) {
1475 /* data_offset is beyond the end of smallbuf */
1476 cFYI(1, "%s: data offset (%u) beyond end of smallbuf",
1477 __func__, data_offset);
1478 rdata->result = -EIO;
1479 return cifs_readv_discard(server, mid);
1482 cFYI(1, "%s: total_read=%u data_offset=%u", __func__,
1483 server->total_read, data_offset);
1485 len = data_offset - server->total_read;
1487 /* read any junk before data into the rest of smallbuf */
1488 rdata->iov[0].iov_base = buf + server->total_read;
1489 rdata->iov[0].iov_len = len;
1490 length = cifs_readv_from_socket(server, rdata->iov, 1, len);
1493 server->total_read += length;
1496 /* set up first iov for signature check */
1497 rdata->iov[0].iov_base = buf;
1498 rdata->iov[0].iov_len = server->total_read;
1499 cFYI(1, "0: iov_base=%p iov_len=%zu",
1500 rdata->iov[0].iov_base, rdata->iov[0].iov_len);
1502 /* how much data is in the response? */
1503 data_len = server->ops->read_data_length(buf);
1504 if (data_offset + data_len > buflen) {
1505 /* data_len is corrupt -- discard frame */
1506 rdata->result = -EIO;
1507 return cifs_readv_discard(server, mid);
1510 /* marshal up the page array */
1512 len = rdata->marshal_iov(rdata, data_len);
1516 /* issue the read if we have any iovecs left to fill */
1517 if (rdata->nr_iov > 1) {
1518 length = cifs_readv_from_socket(server, &rdata->iov[1],
1519 rdata->nr_iov - 1, len);
1522 server->total_read += length;
1527 rdata->bytes = length;
1529 cFYI(1, "total_read=%u buflen=%u remaining=%u", server->total_read,
1532 /* discard anything left over */
1533 if (server->total_read < buflen)
1534 return cifs_readv_discard(server, mid);
1536 dequeue_mid(mid, false);
1541 cifs_readv_callback(struct mid_q_entry *mid)
1543 struct cifs_readdata *rdata = mid->callback_data;
1544 struct cifs_tcon *tcon = tlink_tcon(rdata->cfile->tlink);
1545 struct TCP_Server_Info *server = tcon->ses->server;
1546 struct smb_rqst rqst = { .rq_iov = rdata->iov,
1547 .rq_nvec = rdata->nr_iov };
1549 cFYI(1, "%s: mid=%llu state=%d result=%d bytes=%u", __func__,
1550 mid->mid, mid->mid_state, rdata->result, rdata->bytes);
1552 switch (mid->mid_state) {
1553 case MID_RESPONSE_RECEIVED:
1554 /* result already set, check signature */
1555 if (server->sec_mode &
1556 (SECMODE_SIGN_REQUIRED | SECMODE_SIGN_ENABLED)) {
1559 rc = cifs_verify_signature(&rqst, server,
1560 mid->sequence_number + 1);
1562 cERROR(1, "SMB signature verification returned "
1565 /* FIXME: should this be counted toward the initiating task? */
1566 task_io_account_read(rdata->bytes);
1567 cifs_stats_bytes_read(tcon, rdata->bytes);
1569 case MID_REQUEST_SUBMITTED:
1570 case MID_RETRY_NEEDED:
1571 rdata->result = -EAGAIN;
1574 rdata->result = -EIO;
1577 queue_work(cifsiod_wq, &rdata->work);
1578 DeleteMidQEntry(mid);
1579 add_credits(server, 1, 0);
1582 /* cifs_async_readv - send an async write, and set up mid to handle result */
1584 cifs_async_readv(struct cifs_readdata *rdata)
1587 READ_REQ *smb = NULL;
1589 struct cifs_tcon *tcon = tlink_tcon(rdata->cfile->tlink);
1590 struct smb_rqst rqst = { .rq_iov = rdata->iov,
1593 cFYI(1, "%s: offset=%llu bytes=%u", __func__,
1594 rdata->offset, rdata->bytes);
1596 if (tcon->ses->capabilities & CAP_LARGE_FILES)
1599 wct = 10; /* old style read */
1600 if ((rdata->offset >> 32) > 0) {
1601 /* can not handle this big offset for old */
1606 rc = small_smb_init(SMB_COM_READ_ANDX, wct, tcon, (void **)&smb);
1610 smb->hdr.Pid = cpu_to_le16((__u16)rdata->pid);
1611 smb->hdr.PidHigh = cpu_to_le16((__u16)(rdata->pid >> 16));
1613 smb->AndXCommand = 0xFF; /* none */
1614 smb->Fid = rdata->cfile->fid.netfid;
1615 smb->OffsetLow = cpu_to_le32(rdata->offset & 0xFFFFFFFF);
1617 smb->OffsetHigh = cpu_to_le32(rdata->offset >> 32);
1619 smb->MaxCount = cpu_to_le16(rdata->bytes & 0xFFFF);
1620 smb->MaxCountHigh = cpu_to_le32(rdata->bytes >> 16);
1624 /* old style read */
1625 struct smb_com_readx_req *smbr =
1626 (struct smb_com_readx_req *)smb;
1627 smbr->ByteCount = 0;
1630 /* 4 for RFC1001 length + 1 for BCC */
1631 rdata->iov[0].iov_base = smb;
1632 rdata->iov[0].iov_len = be32_to_cpu(smb->hdr.smb_buf_length) + 4;
1634 kref_get(&rdata->refcount);
1635 rc = cifs_call_async(tcon->ses->server, &rqst, cifs_readv_receive,
1636 cifs_readv_callback, rdata, 0);
1639 cifs_stats_inc(&tcon->stats.cifs_stats.num_reads);
1641 kref_put(&rdata->refcount, cifs_readdata_release);
1643 cifs_small_buf_release(smb);
1648 CIFSSMBRead(const unsigned int xid, struct cifs_io_parms *io_parms,
1649 unsigned int *nbytes, char **buf, int *pbuf_type)
1652 READ_REQ *pSMB = NULL;
1653 READ_RSP *pSMBr = NULL;
1654 char *pReadData = NULL;
1656 int resp_buf_type = 0;
1658 __u32 pid = io_parms->pid;
1659 __u16 netfid = io_parms->netfid;
1660 __u64 offset = io_parms->offset;
1661 struct cifs_tcon *tcon = io_parms->tcon;
1662 unsigned int count = io_parms->length;
1664 cFYI(1, "Reading %d bytes on fid %d", count, netfid);
1665 if (tcon->ses->capabilities & CAP_LARGE_FILES)
1668 wct = 10; /* old style read */
1669 if ((offset >> 32) > 0) {
1670 /* can not handle this big offset for old */
1676 rc = small_smb_init(SMB_COM_READ_ANDX, wct, tcon, (void **) &pSMB);
1680 pSMB->hdr.Pid = cpu_to_le16((__u16)pid);
1681 pSMB->hdr.PidHigh = cpu_to_le16((__u16)(pid >> 16));
1683 /* tcon and ses pointer are checked in smb_init */
1684 if (tcon->ses->server == NULL)
1685 return -ECONNABORTED;
1687 pSMB->AndXCommand = 0xFF; /* none */
1689 pSMB->OffsetLow = cpu_to_le32(offset & 0xFFFFFFFF);
1691 pSMB->OffsetHigh = cpu_to_le32(offset >> 32);
1693 pSMB->Remaining = 0;
1694 pSMB->MaxCount = cpu_to_le16(count & 0xFFFF);
1695 pSMB->MaxCountHigh = cpu_to_le32(count >> 16);
1697 pSMB->ByteCount = 0; /* no need to do le conversion since 0 */
1699 /* old style read */
1700 struct smb_com_readx_req *pSMBW =
1701 (struct smb_com_readx_req *)pSMB;
1702 pSMBW->ByteCount = 0;
1705 iov[0].iov_base = (char *)pSMB;
1706 iov[0].iov_len = be32_to_cpu(pSMB->hdr.smb_buf_length) + 4;
1707 rc = SendReceive2(xid, tcon->ses, iov, 1 /* num iovecs */,
1708 &resp_buf_type, CIFS_LOG_ERROR);
1709 cifs_stats_inc(&tcon->stats.cifs_stats.num_reads);
1710 pSMBr = (READ_RSP *)iov[0].iov_base;
1712 cERROR(1, "Send error in read = %d", rc);
1714 int data_length = le16_to_cpu(pSMBr->DataLengthHigh);
1715 data_length = data_length << 16;
1716 data_length += le16_to_cpu(pSMBr->DataLength);
1717 *nbytes = data_length;
1719 /*check that DataLength would not go beyond end of SMB */
1720 if ((data_length > CIFSMaxBufSize)
1721 || (data_length > count)) {
1722 cFYI(1, "bad length %d for count %d",
1723 data_length, count);
1727 pReadData = (char *) (&pSMBr->hdr.Protocol) +
1728 le16_to_cpu(pSMBr->DataOffset);
1729 /* if (rc = copy_to_user(buf, pReadData, data_length)) {
1730 cERROR(1, "Faulting on read rc = %d",rc);
1732 }*/ /* can not use copy_to_user when using page cache*/
1734 memcpy(*buf, pReadData, data_length);
1738 /* cifs_small_buf_release(pSMB); */ /* Freed earlier now in SendReceive2 */
1740 if (resp_buf_type == CIFS_SMALL_BUFFER)
1741 cifs_small_buf_release(iov[0].iov_base);
1742 else if (resp_buf_type == CIFS_LARGE_BUFFER)
1743 cifs_buf_release(iov[0].iov_base);
1744 } else if (resp_buf_type != CIFS_NO_BUFFER) {
1745 /* return buffer to caller to free */
1746 *buf = iov[0].iov_base;
1747 if (resp_buf_type == CIFS_SMALL_BUFFER)
1748 *pbuf_type = CIFS_SMALL_BUFFER;
1749 else if (resp_buf_type == CIFS_LARGE_BUFFER)
1750 *pbuf_type = CIFS_LARGE_BUFFER;
1751 } /* else no valid buffer on return - leave as null */
1753 /* Note: On -EAGAIN error only caller can retry on handle based calls
1754 since file handle passed in no longer valid */
1760 CIFSSMBWrite(const unsigned int xid, struct cifs_io_parms *io_parms,
1761 unsigned int *nbytes, const char *buf,
1762 const char __user *ubuf, const int long_op)
1765 WRITE_REQ *pSMB = NULL;
1766 WRITE_RSP *pSMBr = NULL;
1767 int bytes_returned, wct;
1770 __u32 pid = io_parms->pid;
1771 __u16 netfid = io_parms->netfid;
1772 __u64 offset = io_parms->offset;
1773 struct cifs_tcon *tcon = io_parms->tcon;
1774 unsigned int count = io_parms->length;
1778 /* cFYI(1, "write at %lld %d bytes", offset, count);*/
1779 if (tcon->ses == NULL)
1780 return -ECONNABORTED;
1782 if (tcon->ses->capabilities & CAP_LARGE_FILES)
1786 if ((offset >> 32) > 0) {
1787 /* can not handle big offset for old srv */
1792 rc = smb_init(SMB_COM_WRITE_ANDX, wct, tcon, (void **) &pSMB,
1797 pSMB->hdr.Pid = cpu_to_le16((__u16)pid);
1798 pSMB->hdr.PidHigh = cpu_to_le16((__u16)(pid >> 16));
1800 /* tcon and ses pointer are checked in smb_init */
1801 if (tcon->ses->server == NULL)
1802 return -ECONNABORTED;
1804 pSMB->AndXCommand = 0xFF; /* none */
1806 pSMB->OffsetLow = cpu_to_le32(offset & 0xFFFFFFFF);
1808 pSMB->OffsetHigh = cpu_to_le32(offset >> 32);
1810 pSMB->Reserved = 0xFFFFFFFF;
1811 pSMB->WriteMode = 0;
1812 pSMB->Remaining = 0;
1814 /* Can increase buffer size if buffer is big enough in some cases ie we
1815 can send more if LARGE_WRITE_X capability returned by the server and if
1816 our buffer is big enough or if we convert to iovecs on socket writes
1817 and eliminate the copy to the CIFS buffer */
1818 if (tcon->ses->capabilities & CAP_LARGE_WRITE_X) {
1819 bytes_sent = min_t(const unsigned int, CIFSMaxBufSize, count);
1821 bytes_sent = (tcon->ses->server->maxBuf - MAX_CIFS_HDR_SIZE)
1825 if (bytes_sent > count)
1828 cpu_to_le16(offsetof(struct smb_com_write_req, Data) - 4);
1830 memcpy(pSMB->Data, buf, bytes_sent);
1832 if (copy_from_user(pSMB->Data, ubuf, bytes_sent)) {
1833 cifs_buf_release(pSMB);
1836 } else if (count != 0) {
1838 cifs_buf_release(pSMB);
1840 } /* else setting file size with write of zero bytes */
1842 byte_count = bytes_sent + 1; /* pad */
1843 else /* wct == 12 */
1844 byte_count = bytes_sent + 5; /* bigger pad, smaller smb hdr */
1846 pSMB->DataLengthLow = cpu_to_le16(bytes_sent & 0xFFFF);
1847 pSMB->DataLengthHigh = cpu_to_le16(bytes_sent >> 16);
1848 inc_rfc1001_len(pSMB, byte_count);
1851 pSMB->ByteCount = cpu_to_le16(byte_count);
1852 else { /* old style write has byte count 4 bytes earlier
1854 struct smb_com_writex_req *pSMBW =
1855 (struct smb_com_writex_req *)pSMB;
1856 pSMBW->ByteCount = cpu_to_le16(byte_count);
1859 rc = SendReceive(xid, tcon->ses, (struct smb_hdr *) pSMB,
1860 (struct smb_hdr *) pSMBr, &bytes_returned, long_op);
1861 cifs_stats_inc(&tcon->stats.cifs_stats.num_writes);
1863 cFYI(1, "Send error in write = %d", rc);
1865 *nbytes = le16_to_cpu(pSMBr->CountHigh);
1866 *nbytes = (*nbytes) << 16;
1867 *nbytes += le16_to_cpu(pSMBr->Count);
1870 * Mask off high 16 bits when bytes written as returned by the
1871 * server is greater than bytes requested by the client. Some
1872 * OS/2 servers are known to set incorrect CountHigh values.
1874 if (*nbytes > count)
1878 cifs_buf_release(pSMB);
1880 /* Note: On -EAGAIN error only caller can retry on handle based calls
1881 since file handle passed in no longer valid */
1887 cifs_writedata_release(struct kref *refcount)
1889 struct cifs_writedata *wdata = container_of(refcount,
1890 struct cifs_writedata, refcount);
1893 cifsFileInfo_put(wdata->cfile);
1899 * Write failed with a retryable error. Resend the write request. It's also
1900 * possible that the page was redirtied so re-clean the page.
1903 cifs_writev_requeue(struct cifs_writedata *wdata)
1906 struct inode *inode = wdata->cfile->dentry->d_inode;
1907 struct TCP_Server_Info *server;
1909 for (i = 0; i < wdata->nr_pages; i++) {
1910 lock_page(wdata->pages[i]);
1911 clear_page_dirty_for_io(wdata->pages[i]);
1915 server = tlink_tcon(wdata->cfile->tlink)->ses->server;
1916 rc = server->ops->async_writev(wdata);
1917 } while (rc == -EAGAIN);
1919 for (i = 0; i < wdata->nr_pages; i++) {
1921 SetPageError(wdata->pages[i]);
1922 unlock_page(wdata->pages[i]);
1925 mapping_set_error(inode->i_mapping, rc);
1926 kref_put(&wdata->refcount, cifs_writedata_release);
1930 cifs_writev_complete(struct work_struct *work)
1932 struct cifs_writedata *wdata = container_of(work,
1933 struct cifs_writedata, work);
1934 struct inode *inode = wdata->cfile->dentry->d_inode;
1937 if (wdata->result == 0) {
1938 spin_lock(&inode->i_lock);
1939 cifs_update_eof(CIFS_I(inode), wdata->offset, wdata->bytes);
1940 spin_unlock(&inode->i_lock);
1941 cifs_stats_bytes_written(tlink_tcon(wdata->cfile->tlink),
1943 } else if (wdata->sync_mode == WB_SYNC_ALL && wdata->result == -EAGAIN)
1944 return cifs_writev_requeue(wdata);
1946 for (i = 0; i < wdata->nr_pages; i++) {
1947 struct page *page = wdata->pages[i];
1948 if (wdata->result == -EAGAIN)
1949 __set_page_dirty_nobuffers(page);
1950 else if (wdata->result < 0)
1952 end_page_writeback(page);
1953 page_cache_release(page);
1955 if (wdata->result != -EAGAIN)
1956 mapping_set_error(inode->i_mapping, wdata->result);
1957 kref_put(&wdata->refcount, cifs_writedata_release);
1960 struct cifs_writedata *
1961 cifs_writedata_alloc(unsigned int nr_pages, work_func_t complete)
1963 struct cifs_writedata *wdata;
1965 /* this would overflow */
1966 if (nr_pages == 0) {
1967 cERROR(1, "%s: called with nr_pages == 0!", __func__);
1971 /* writedata + number of page pointers */
1972 wdata = kzalloc(sizeof(*wdata) +
1973 sizeof(struct page *) * (nr_pages - 1), GFP_NOFS);
1974 if (wdata != NULL) {
1975 kref_init(&wdata->refcount);
1976 INIT_LIST_HEAD(&wdata->list);
1977 init_completion(&wdata->done);
1978 INIT_WORK(&wdata->work, complete);
1984 * Check the mid_state and signature on received buffer (if any), and queue the
1985 * workqueue completion task.
1988 cifs_writev_callback(struct mid_q_entry *mid)
1990 struct cifs_writedata *wdata = mid->callback_data;
1991 struct cifs_tcon *tcon = tlink_tcon(wdata->cfile->tlink);
1992 unsigned int written;
1993 WRITE_RSP *smb = (WRITE_RSP *)mid->resp_buf;
1995 switch (mid->mid_state) {
1996 case MID_RESPONSE_RECEIVED:
1997 wdata->result = cifs_check_receive(mid, tcon->ses->server, 0);
1998 if (wdata->result != 0)
2001 written = le16_to_cpu(smb->CountHigh);
2003 written += le16_to_cpu(smb->Count);
2005 * Mask off high 16 bits when bytes written as returned
2006 * by the server is greater than bytes requested by the
2007 * client. OS/2 servers are known to set incorrect
2010 if (written > wdata->bytes)
2013 if (written < wdata->bytes)
2014 wdata->result = -ENOSPC;
2016 wdata->bytes = written;
2018 case MID_REQUEST_SUBMITTED:
2019 case MID_RETRY_NEEDED:
2020 wdata->result = -EAGAIN;
2023 wdata->result = -EIO;
2027 queue_work(cifsiod_wq, &wdata->work);
2028 DeleteMidQEntry(mid);
2029 add_credits(tcon->ses->server, 1, 0);
2032 /* cifs_async_writev - send an async write, and set up mid to handle result */
2034 cifs_async_writev(struct cifs_writedata *wdata)
2037 WRITE_REQ *smb = NULL;
2039 struct cifs_tcon *tcon = tlink_tcon(wdata->cfile->tlink);
2041 struct smb_rqst rqst = { };
2043 if (tcon->ses->capabilities & CAP_LARGE_FILES) {
2047 if (wdata->offset >> 32 > 0) {
2048 /* can not handle big offset for old srv */
2053 rc = small_smb_init(SMB_COM_WRITE_ANDX, wct, tcon, (void **)&smb);
2055 goto async_writev_out;
2057 smb->hdr.Pid = cpu_to_le16((__u16)wdata->pid);
2058 smb->hdr.PidHigh = cpu_to_le16((__u16)(wdata->pid >> 16));
2060 smb->AndXCommand = 0xFF; /* none */
2061 smb->Fid = wdata->cfile->fid.netfid;
2062 smb->OffsetLow = cpu_to_le32(wdata->offset & 0xFFFFFFFF);
2064 smb->OffsetHigh = cpu_to_le32(wdata->offset >> 32);
2065 smb->Reserved = 0xFFFFFFFF;
2070 cpu_to_le16(offsetof(struct smb_com_write_req, Data) - 4);
2072 /* 4 for RFC1001 length + 1 for BCC */
2073 iov.iov_len = be32_to_cpu(smb->hdr.smb_buf_length) + 4 + 1;
2078 rqst.rq_pages = wdata->pages;
2079 rqst.rq_npages = wdata->nr_pages;
2080 rqst.rq_pagesz = wdata->pagesz;
2081 rqst.rq_tailsz = wdata->tailsz;
2083 cFYI(1, "async write at %llu %u bytes", wdata->offset, wdata->bytes);
2085 smb->DataLengthLow = cpu_to_le16(wdata->bytes & 0xFFFF);
2086 smb->DataLengthHigh = cpu_to_le16(wdata->bytes >> 16);
2089 inc_rfc1001_len(&smb->hdr, wdata->bytes + 1);
2090 put_bcc(wdata->bytes + 1, &smb->hdr);
2093 struct smb_com_writex_req *smbw =
2094 (struct smb_com_writex_req *)smb;
2095 inc_rfc1001_len(&smbw->hdr, wdata->bytes + 5);
2096 put_bcc(wdata->bytes + 5, &smbw->hdr);
2097 iov.iov_len += 4; /* pad bigger by four bytes */
2100 kref_get(&wdata->refcount);
2101 rc = cifs_call_async(tcon->ses->server, &rqst, NULL,
2102 cifs_writev_callback, wdata, 0);
2105 cifs_stats_inc(&tcon->stats.cifs_stats.num_writes);
2107 kref_put(&wdata->refcount, cifs_writedata_release);
2110 cifs_small_buf_release(smb);
2115 CIFSSMBWrite2(const unsigned int xid, struct cifs_io_parms *io_parms,
2116 unsigned int *nbytes, struct kvec *iov, int n_vec)
2119 WRITE_REQ *pSMB = NULL;
2122 int resp_buf_type = 0;
2123 __u32 pid = io_parms->pid;
2124 __u16 netfid = io_parms->netfid;
2125 __u64 offset = io_parms->offset;
2126 struct cifs_tcon *tcon = io_parms->tcon;
2127 unsigned int count = io_parms->length;
2131 cFYI(1, "write2 at %lld %d bytes", (long long)offset, count);
2133 if (tcon->ses->capabilities & CAP_LARGE_FILES) {
2137 if ((offset >> 32) > 0) {
2138 /* can not handle big offset for old srv */
2142 rc = small_smb_init(SMB_COM_WRITE_ANDX, wct, tcon, (void **) &pSMB);
2146 pSMB->hdr.Pid = cpu_to_le16((__u16)pid);
2147 pSMB->hdr.PidHigh = cpu_to_le16((__u16)(pid >> 16));
2149 /* tcon and ses pointer are checked in smb_init */
2150 if (tcon->ses->server == NULL)
2151 return -ECONNABORTED;
2153 pSMB->AndXCommand = 0xFF; /* none */
2155 pSMB->OffsetLow = cpu_to_le32(offset & 0xFFFFFFFF);
2157 pSMB->OffsetHigh = cpu_to_le32(offset >> 32);
2158 pSMB->Reserved = 0xFFFFFFFF;
2159 pSMB->WriteMode = 0;
2160 pSMB->Remaining = 0;
2163 cpu_to_le16(offsetof(struct smb_com_write_req, Data) - 4);
2165 pSMB->DataLengthLow = cpu_to_le16(count & 0xFFFF);
2166 pSMB->DataLengthHigh = cpu_to_le16(count >> 16);
2167 /* header + 1 byte pad */
2168 smb_hdr_len = be32_to_cpu(pSMB->hdr.smb_buf_length) + 1;
2170 inc_rfc1001_len(pSMB, count + 1);
2171 else /* wct == 12 */
2172 inc_rfc1001_len(pSMB, count + 5); /* smb data starts later */
2174 pSMB->ByteCount = cpu_to_le16(count + 1);
2175 else /* wct == 12 */ /* bigger pad, smaller smb hdr, keep offset ok */ {
2176 struct smb_com_writex_req *pSMBW =
2177 (struct smb_com_writex_req *)pSMB;
2178 pSMBW->ByteCount = cpu_to_le16(count + 5);
2180 iov[0].iov_base = pSMB;
2182 iov[0].iov_len = smb_hdr_len + 4;
2183 else /* wct == 12 pad bigger by four bytes */
2184 iov[0].iov_len = smb_hdr_len + 8;
2187 rc = SendReceive2(xid, tcon->ses, iov, n_vec + 1, &resp_buf_type, 0);
2188 cifs_stats_inc(&tcon->stats.cifs_stats.num_writes);
2190 cFYI(1, "Send error Write2 = %d", rc);
2191 } else if (resp_buf_type == 0) {
2192 /* presumably this can not happen, but best to be safe */
2195 WRITE_RSP *pSMBr = (WRITE_RSP *)iov[0].iov_base;
2196 *nbytes = le16_to_cpu(pSMBr->CountHigh);
2197 *nbytes = (*nbytes) << 16;
2198 *nbytes += le16_to_cpu(pSMBr->Count);
2201 * Mask off high 16 bits when bytes written as returned by the
2202 * server is greater than bytes requested by the client. OS/2
2203 * servers are known to set incorrect CountHigh values.
2205 if (*nbytes > count)
2209 /* cifs_small_buf_release(pSMB); */ /* Freed earlier now in SendReceive2 */
2210 if (resp_buf_type == CIFS_SMALL_BUFFER)
2211 cifs_small_buf_release(iov[0].iov_base);
2212 else if (resp_buf_type == CIFS_LARGE_BUFFER)
2213 cifs_buf_release(iov[0].iov_base);
2215 /* Note: On -EAGAIN error only caller can retry on handle based calls
2216 since file handle passed in no longer valid */
2221 int cifs_lockv(const unsigned int xid, struct cifs_tcon *tcon,
2222 const __u16 netfid, const __u8 lock_type, const __u32 num_unlock,
2223 const __u32 num_lock, LOCKING_ANDX_RANGE *buf)
2226 LOCK_REQ *pSMB = NULL;
2231 cFYI(1, "cifs_lockv num lock %d num unlock %d", num_lock, num_unlock);
2233 rc = small_smb_init(SMB_COM_LOCKING_ANDX, 8, tcon, (void **) &pSMB);
2238 pSMB->NumberOfLocks = cpu_to_le16(num_lock);
2239 pSMB->NumberOfUnlocks = cpu_to_le16(num_unlock);
2240 pSMB->LockType = lock_type;
2241 pSMB->AndXCommand = 0xFF; /* none */
2242 pSMB->Fid = netfid; /* netfid stays le */
2244 count = (num_unlock + num_lock) * sizeof(LOCKING_ANDX_RANGE);
2245 inc_rfc1001_len(pSMB, count);
2246 pSMB->ByteCount = cpu_to_le16(count);
2248 iov[0].iov_base = (char *)pSMB;
2249 iov[0].iov_len = be32_to_cpu(pSMB->hdr.smb_buf_length) + 4 -
2250 (num_unlock + num_lock) * sizeof(LOCKING_ANDX_RANGE);
2251 iov[1].iov_base = (char *)buf;
2252 iov[1].iov_len = (num_unlock + num_lock) * sizeof(LOCKING_ANDX_RANGE);
2254 cifs_stats_inc(&tcon->stats.cifs_stats.num_locks);
2255 rc = SendReceive2(xid, tcon->ses, iov, 2, &resp_buf_type, CIFS_NO_RESP);
2257 cFYI(1, "Send error in cifs_lockv = %d", rc);
2263 CIFSSMBLock(const unsigned int xid, struct cifs_tcon *tcon,
2264 const __u16 smb_file_id, const __u32 netpid, const __u64 len,
2265 const __u64 offset, const __u32 numUnlock,
2266 const __u32 numLock, const __u8 lockType,
2267 const bool waitFlag, const __u8 oplock_level)
2270 LOCK_REQ *pSMB = NULL;
2271 /* LOCK_RSP *pSMBr = NULL; */ /* No response data other than rc to parse */
2276 cFYI(1, "CIFSSMBLock timeout %d numLock %d", (int)waitFlag, numLock);
2277 rc = small_smb_init(SMB_COM_LOCKING_ANDX, 8, tcon, (void **) &pSMB);
2282 if (lockType == LOCKING_ANDX_OPLOCK_RELEASE) {
2283 /* no response expected */
2284 flags = CIFS_ASYNC_OP | CIFS_OBREAK_OP;
2286 } else if (waitFlag) {
2287 flags = CIFS_BLOCKING_OP; /* blocking operation, no timeout */
2288 pSMB->Timeout = cpu_to_le32(-1);/* blocking - do not time out */
2293 pSMB->NumberOfLocks = cpu_to_le16(numLock);
2294 pSMB->NumberOfUnlocks = cpu_to_le16(numUnlock);
2295 pSMB->LockType = lockType;
2296 pSMB->OplockLevel = oplock_level;
2297 pSMB->AndXCommand = 0xFF; /* none */
2298 pSMB->Fid = smb_file_id; /* netfid stays le */
2300 if ((numLock != 0) || (numUnlock != 0)) {
2301 pSMB->Locks[0].Pid = cpu_to_le16(netpid);
2302 /* BB where to store pid high? */
2303 pSMB->Locks[0].LengthLow = cpu_to_le32((u32)len);
2304 pSMB->Locks[0].LengthHigh = cpu_to_le32((u32)(len>>32));
2305 pSMB->Locks[0].OffsetLow = cpu_to_le32((u32)offset);
2306 pSMB->Locks[0].OffsetHigh = cpu_to_le32((u32)(offset>>32));
2307 count = sizeof(LOCKING_ANDX_RANGE);
2312 inc_rfc1001_len(pSMB, count);
2313 pSMB->ByteCount = cpu_to_le16(count);
2316 rc = SendReceiveBlockingLock(xid, tcon, (struct smb_hdr *) pSMB,
2317 (struct smb_hdr *) pSMB, &bytes_returned);
2318 cifs_small_buf_release(pSMB);
2320 rc = SendReceiveNoRsp(xid, tcon->ses, (char *)pSMB, flags);
2321 /* SMB buffer freed by function above */
2323 cifs_stats_inc(&tcon->stats.cifs_stats.num_locks);
2325 cFYI(1, "Send error in Lock = %d", rc);
2327 /* Note: On -EAGAIN error only caller can retry on handle based calls
2328 since file handle passed in no longer valid */
2333 CIFSSMBPosixLock(const unsigned int xid, struct cifs_tcon *tcon,
2334 const __u16 smb_file_id, const __u32 netpid,
2335 const loff_t start_offset, const __u64 len,
2336 struct file_lock *pLockData, const __u16 lock_type,
2337 const bool waitFlag)
2339 struct smb_com_transaction2_sfi_req *pSMB = NULL;
2340 struct smb_com_transaction2_sfi_rsp *pSMBr = NULL;
2341 struct cifs_posix_lock *parm_data;
2344 int bytes_returned = 0;
2345 int resp_buf_type = 0;
2346 __u16 params, param_offset, offset, byte_count, count;
2349 cFYI(1, "Posix Lock");
2351 rc = small_smb_init(SMB_COM_TRANSACTION2, 15, tcon, (void **) &pSMB);
2356 pSMBr = (struct smb_com_transaction2_sfi_rsp *)pSMB;
2359 pSMB->MaxSetupCount = 0;
2362 pSMB->Reserved2 = 0;
2363 param_offset = offsetof(struct smb_com_transaction2_sfi_req, Fid) - 4;
2364 offset = param_offset + params;
2366 count = sizeof(struct cifs_posix_lock);
2367 pSMB->MaxParameterCount = cpu_to_le16(2);
2368 pSMB->MaxDataCount = cpu_to_le16(1000); /* BB find max SMB from sess */
2369 pSMB->SetupCount = 1;
2370 pSMB->Reserved3 = 0;
2372 pSMB->SubCommand = cpu_to_le16(TRANS2_QUERY_FILE_INFORMATION);
2374 pSMB->SubCommand = cpu_to_le16(TRANS2_SET_FILE_INFORMATION);
2375 byte_count = 3 /* pad */ + params + count;
2376 pSMB->DataCount = cpu_to_le16(count);
2377 pSMB->ParameterCount = cpu_to_le16(params);
2378 pSMB->TotalDataCount = pSMB->DataCount;
2379 pSMB->TotalParameterCount = pSMB->ParameterCount;
2380 pSMB->ParameterOffset = cpu_to_le16(param_offset);
2381 parm_data = (struct cifs_posix_lock *)
2382 (((char *) &pSMB->hdr.Protocol) + offset);
2384 parm_data->lock_type = cpu_to_le16(lock_type);
2386 timeout = CIFS_BLOCKING_OP; /* blocking operation, no timeout */
2387 parm_data->lock_flags = cpu_to_le16(1);
2388 pSMB->Timeout = cpu_to_le32(-1);
2392 parm_data->pid = cpu_to_le32(netpid);
2393 parm_data->start = cpu_to_le64(start_offset);
2394 parm_data->length = cpu_to_le64(len); /* normalize negative numbers */
2396 pSMB->DataOffset = cpu_to_le16(offset);
2397 pSMB->Fid = smb_file_id;
2398 pSMB->InformationLevel = cpu_to_le16(SMB_SET_POSIX_LOCK);
2399 pSMB->Reserved4 = 0;
2400 inc_rfc1001_len(pSMB, byte_count);
2401 pSMB->ByteCount = cpu_to_le16(byte_count);
2403 rc = SendReceiveBlockingLock(xid, tcon, (struct smb_hdr *) pSMB,
2404 (struct smb_hdr *) pSMBr, &bytes_returned);
2406 iov[0].iov_base = (char *)pSMB;
2407 iov[0].iov_len = be32_to_cpu(pSMB->hdr.smb_buf_length) + 4;
2408 rc = SendReceive2(xid, tcon->ses, iov, 1 /* num iovecs */,
2409 &resp_buf_type, timeout);
2410 pSMB = NULL; /* request buf already freed by SendReceive2. Do
2411 not try to free it twice below on exit */
2412 pSMBr = (struct smb_com_transaction2_sfi_rsp *)iov[0].iov_base;
2416 cFYI(1, "Send error in Posix Lock = %d", rc);
2417 } else if (pLockData) {
2418 /* lock structure can be returned on get */
2421 rc = validate_t2((struct smb_t2_rsp *)pSMBr);
2423 if (rc || get_bcc(&pSMBr->hdr) < sizeof(*parm_data)) {
2424 rc = -EIO; /* bad smb */
2427 data_offset = le16_to_cpu(pSMBr->t2.DataOffset);
2428 data_count = le16_to_cpu(pSMBr->t2.DataCount);
2429 if (data_count < sizeof(struct cifs_posix_lock)) {
2433 parm_data = (struct cifs_posix_lock *)
2434 ((char *)&pSMBr->hdr.Protocol + data_offset);
2435 if (parm_data->lock_type == __constant_cpu_to_le16(CIFS_UNLCK))
2436 pLockData->fl_type = F_UNLCK;
2438 if (parm_data->lock_type ==
2439 __constant_cpu_to_le16(CIFS_RDLCK))
2440 pLockData->fl_type = F_RDLCK;
2441 else if (parm_data->lock_type ==
2442 __constant_cpu_to_le16(CIFS_WRLCK))
2443 pLockData->fl_type = F_WRLCK;
2445 pLockData->fl_start = le64_to_cpu(parm_data->start);
2446 pLockData->fl_end = pLockData->fl_start +
2447 le64_to_cpu(parm_data->length) - 1;
2448 pLockData->fl_pid = le32_to_cpu(parm_data->pid);
2454 cifs_small_buf_release(pSMB);
2456 if (resp_buf_type == CIFS_SMALL_BUFFER)
2457 cifs_small_buf_release(iov[0].iov_base);
2458 else if (resp_buf_type == CIFS_LARGE_BUFFER)
2459 cifs_buf_release(iov[0].iov_base);
2461 /* Note: On -EAGAIN error only caller can retry on handle based calls
2462 since file handle passed in no longer valid */
2469 CIFSSMBClose(const unsigned int xid, struct cifs_tcon *tcon, int smb_file_id)
2472 CLOSE_REQ *pSMB = NULL;
2473 cFYI(1, "In CIFSSMBClose");
2475 /* do not retry on dead session on close */
2476 rc = small_smb_init(SMB_COM_CLOSE, 3, tcon, (void **) &pSMB);
2482 pSMB->FileID = (__u16) smb_file_id;
2483 pSMB->LastWriteTime = 0xFFFFFFFF;
2484 pSMB->ByteCount = 0;
2485 rc = SendReceiveNoRsp(xid, tcon->ses, (char *) pSMB, 0);
2486 cifs_stats_inc(&tcon->stats.cifs_stats.num_closes);
2489 /* EINTR is expected when user ctl-c to kill app */
2490 cERROR(1, "Send error in Close = %d", rc);
2494 /* Since session is dead, file will be closed on server already */
2502 CIFSSMBFlush(const unsigned int xid, struct cifs_tcon *tcon, int smb_file_id)
2505 FLUSH_REQ *pSMB = NULL;
2506 cFYI(1, "In CIFSSMBFlush");
2508 rc = small_smb_init(SMB_COM_FLUSH, 1, tcon, (void **) &pSMB);
2512 pSMB->FileID = (__u16) smb_file_id;
2513 pSMB->ByteCount = 0;
2514 rc = SendReceiveNoRsp(xid, tcon->ses, (char *) pSMB, 0);
2515 cifs_stats_inc(&tcon->stats.cifs_stats.num_flushes);
2517 cERROR(1, "Send error in Flush = %d", rc);
2523 CIFSSMBRename(const unsigned int xid, struct cifs_tcon *tcon,
2524 const char *from_name, const char *to_name,
2525 struct cifs_sb_info *cifs_sb)
2528 RENAME_REQ *pSMB = NULL;
2529 RENAME_RSP *pSMBr = NULL;
2531 int name_len, name_len2;
2533 int remap = cifs_sb->mnt_cifs_flags & CIFS_MOUNT_MAP_SPECIAL_CHR;
2535 cFYI(1, "In CIFSSMBRename");
2537 rc = smb_init(SMB_COM_RENAME, 1, tcon, (void **) &pSMB,
2542 pSMB->BufferFormat = 0x04;
2543 pSMB->SearchAttributes =
2544 cpu_to_le16(ATTR_READONLY | ATTR_HIDDEN | ATTR_SYSTEM |
2547 if (pSMB->hdr.Flags2 & SMBFLG2_UNICODE) {
2548 name_len = cifsConvertToUTF16((__le16 *) pSMB->OldFileName,
2549 from_name, PATH_MAX,
2550 cifs_sb->local_nls, remap);
2551 name_len++; /* trailing null */
2553 pSMB->OldFileName[name_len] = 0x04; /* pad */
2554 /* protocol requires ASCII signature byte on Unicode string */
2555 pSMB->OldFileName[name_len + 1] = 0x00;
2557 cifsConvertToUTF16((__le16 *)&pSMB->OldFileName[name_len+2],
2558 to_name, PATH_MAX, cifs_sb->local_nls,
2560 name_len2 += 1 /* trailing null */ + 1 /* Signature word */ ;
2561 name_len2 *= 2; /* convert to bytes */
2562 } else { /* BB improve the check for buffer overruns BB */
2563 name_len = strnlen(from_name, PATH_MAX);
2564 name_len++; /* trailing null */
2565 strncpy(pSMB->OldFileName, from_name, name_len);
2566 name_len2 = strnlen(to_name, PATH_MAX);
2567 name_len2++; /* trailing null */
2568 pSMB->OldFileName[name_len] = 0x04; /* 2nd buffer format */
2569 strncpy(&pSMB->OldFileName[name_len + 1], to_name, name_len2);
2570 name_len2++; /* trailing null */
2571 name_len2++; /* signature byte */
2574 count = 1 /* 1st signature byte */ + name_len + name_len2;
2575 inc_rfc1001_len(pSMB, count);
2576 pSMB->ByteCount = cpu_to_le16(count);
2578 rc = SendReceive(xid, tcon->ses, (struct smb_hdr *) pSMB,
2579 (struct smb_hdr *) pSMBr, &bytes_returned, 0);
2580 cifs_stats_inc(&tcon->stats.cifs_stats.num_renames);
2582 cFYI(1, "Send error in rename = %d", rc);
2584 cifs_buf_release(pSMB);
2592 int CIFSSMBRenameOpenFile(const unsigned int xid, struct cifs_tcon *pTcon,
2593 int netfid, const char *target_name,
2594 const struct nls_table *nls_codepage, int remap)
2596 struct smb_com_transaction2_sfi_req *pSMB = NULL;
2597 struct smb_com_transaction2_sfi_rsp *pSMBr = NULL;
2598 struct set_file_rename *rename_info;
2600 char dummy_string[30];
2602 int bytes_returned = 0;
2604 __u16 params, param_offset, offset, count, byte_count;
2606 cFYI(1, "Rename to File by handle");
2607 rc = smb_init(SMB_COM_TRANSACTION2, 15, pTcon, (void **) &pSMB,
2613 pSMB->MaxSetupCount = 0;
2617 pSMB->Reserved2 = 0;
2618 param_offset = offsetof(struct smb_com_transaction2_sfi_req, Fid) - 4;
2619 offset = param_offset + params;
2621 data_offset = (char *) (&pSMB->hdr.Protocol) + offset;
2622 rename_info = (struct set_file_rename *) data_offset;
2623 pSMB->MaxParameterCount = cpu_to_le16(2);
2624 pSMB->MaxDataCount = cpu_to_le16(1000); /* BB find max SMB from sess */
2625 pSMB->SetupCount = 1;
2626 pSMB->Reserved3 = 0;
2627 pSMB->SubCommand = cpu_to_le16(TRANS2_SET_FILE_INFORMATION);
2628 byte_count = 3 /* pad */ + params;
2629 pSMB->ParameterCount = cpu_to_le16(params);
2630 pSMB->TotalParameterCount = pSMB->ParameterCount;
2631 pSMB->ParameterOffset = cpu_to_le16(param_offset);
2632 pSMB->DataOffset = cpu_to_le16(offset);
2633 /* construct random name ".cifs_tmp<inodenum><mid>" */
2634 rename_info->overwrite = cpu_to_le32(1);
2635 rename_info->root_fid = 0;
2636 /* unicode only call */
2637 if (target_name == NULL) {
2638 sprintf(dummy_string, "cifs%x", pSMB->hdr.Mid);
2640 cifsConvertToUTF16((__le16 *)rename_info->target_name,
2641 dummy_string, 24, nls_codepage, remap);
2644 cifsConvertToUTF16((__le16 *)rename_info->target_name,
2645 target_name, PATH_MAX, nls_codepage,
2648 rename_info->target_name_len = cpu_to_le32(2 * len_of_str);
2649 count = 12 /* sizeof(struct set_file_rename) */ + (2 * len_of_str);
2650 byte_count += count;
2651 pSMB->DataCount = cpu_to_le16(count);
2652 pSMB->TotalDataCount = pSMB->DataCount;
2654 pSMB->InformationLevel =
2655 cpu_to_le16(SMB_SET_FILE_RENAME_INFORMATION);
2656 pSMB->Reserved4 = 0;
2657 inc_rfc1001_len(pSMB, byte_count);
2658 pSMB->ByteCount = cpu_to_le16(byte_count);
2659 rc = SendReceive(xid, pTcon->ses, (struct smb_hdr *) pSMB,
2660 (struct smb_hdr *) pSMBr, &bytes_returned, 0);
2661 cifs_stats_inc(&pTcon->stats.cifs_stats.num_t2renames);
2663 cFYI(1, "Send error in Rename (by file handle) = %d", rc);
2665 cifs_buf_release(pSMB);
2667 /* Note: On -EAGAIN error only caller can retry on handle based calls
2668 since file handle passed in no longer valid */
2674 CIFSSMBCopy(const unsigned int xid, struct cifs_tcon *tcon,
2675 const char *fromName, const __u16 target_tid, const char *toName,
2676 const int flags, const struct nls_table *nls_codepage, int remap)
2679 COPY_REQ *pSMB = NULL;
2680 COPY_RSP *pSMBr = NULL;
2682 int name_len, name_len2;
2685 cFYI(1, "In CIFSSMBCopy");
2687 rc = smb_init(SMB_COM_COPY, 1, tcon, (void **) &pSMB,
2692 pSMB->BufferFormat = 0x04;
2693 pSMB->Tid2 = target_tid;
2695 pSMB->Flags = cpu_to_le16(flags & COPY_TREE);
2697 if (pSMB->hdr.Flags2 & SMBFLG2_UNICODE) {
2698 name_len = cifsConvertToUTF16((__le16 *) pSMB->OldFileName,
2699 fromName, PATH_MAX, nls_codepage,
2701 name_len++; /* trailing null */
2703 pSMB->OldFileName[name_len] = 0x04; /* pad */
2704 /* protocol requires ASCII signature byte on Unicode string */
2705 pSMB->OldFileName[name_len + 1] = 0x00;
2707 cifsConvertToUTF16((__le16 *)&pSMB->OldFileName[name_len+2],
2708 toName, PATH_MAX, nls_codepage, remap);
2709 name_len2 += 1 /* trailing null */ + 1 /* Signature word */ ;
2710 name_len2 *= 2; /* convert to bytes */
2711 } else { /* BB improve the check for buffer overruns BB */
2712 name_len = strnlen(fromName, PATH_MAX);
2713 name_len++; /* trailing null */
2714 strncpy(pSMB->OldFileName, fromName, name_len);
2715 name_len2 = strnlen(toName, PATH_MAX);
2716 name_len2++; /* trailing null */
2717 pSMB->OldFileName[name_len] = 0x04; /* 2nd buffer format */
2718 strncpy(&pSMB->OldFileName[name_len + 1], toName, name_len2);
2719 name_len2++; /* trailing null */
2720 name_len2++; /* signature byte */
2723 count = 1 /* 1st signature byte */ + name_len + name_len2;
2724 inc_rfc1001_len(pSMB, count);
2725 pSMB->ByteCount = cpu_to_le16(count);
2727 rc = SendReceive(xid, tcon->ses, (struct smb_hdr *) pSMB,
2728 (struct smb_hdr *) pSMBr, &bytes_returned, 0);
2730 cFYI(1, "Send error in copy = %d with %d files copied",
2731 rc, le16_to_cpu(pSMBr->CopyCount));
2733 cifs_buf_release(pSMB);
2742 CIFSUnixCreateSymLink(const unsigned int xid, struct cifs_tcon *tcon,
2743 const char *fromName, const char *toName,
2744 const struct nls_table *nls_codepage)
2746 TRANSACTION2_SPI_REQ *pSMB = NULL;
2747 TRANSACTION2_SPI_RSP *pSMBr = NULL;
2750 int name_len_target;
2752 int bytes_returned = 0;
2753 __u16 params, param_offset, offset, byte_count;
2755 cFYI(1, "In Symlink Unix style");
2757 rc = smb_init(SMB_COM_TRANSACTION2, 15, tcon, (void **) &pSMB,
2762 if (pSMB->hdr.Flags2 & SMBFLG2_UNICODE) {
2764 cifs_strtoUTF16((__le16 *) pSMB->FileName, fromName,
2765 /* find define for this maxpathcomponent */
2766 PATH_MAX, nls_codepage);
2767 name_len++; /* trailing null */
2770 } else { /* BB improve the check for buffer overruns BB */
2771 name_len = strnlen(fromName, PATH_MAX);
2772 name_len++; /* trailing null */
2773 strncpy(pSMB->FileName, fromName, name_len);
2775 params = 6 + name_len;
2776 pSMB->MaxSetupCount = 0;
2780 pSMB->Reserved2 = 0;
2781 param_offset = offsetof(struct smb_com_transaction2_spi_req,
2782 InformationLevel) - 4;
2783 offset = param_offset + params;
2785 data_offset = (char *) (&pSMB->hdr.Protocol) + offset;
2786 if (pSMB->hdr.Flags2 & SMBFLG2_UNICODE) {
2788 cifs_strtoUTF16((__le16 *) data_offset, toName, PATH_MAX
2789 /* find define for this maxpathcomponent */
2791 name_len_target++; /* trailing null */
2792 name_len_target *= 2;
2793 } else { /* BB improve the check for buffer overruns BB */
2794 name_len_target = strnlen(toName, PATH_MAX);
2795 name_len_target++; /* trailing null */
2796 strncpy(data_offset, toName, name_len_target);
2799 pSMB->MaxParameterCount = cpu_to_le16(2);
2800 /* BB find exact max on data count below from sess */
2801 pSMB->MaxDataCount = cpu_to_le16(1000);
2802 pSMB->SetupCount = 1;
2803 pSMB->Reserved3 = 0;
2804 pSMB->SubCommand = cpu_to_le16(TRANS2_SET_PATH_INFORMATION);
2805 byte_count = 3 /* pad */ + params + name_len_target;
2806 pSMB->DataCount = cpu_to_le16(name_len_target);
2807 pSMB->ParameterCount = cpu_to_le16(params);
2808 pSMB->TotalDataCount = pSMB->DataCount;
2809 pSMB->TotalParameterCount = pSMB->ParameterCount;
2810 pSMB->ParameterOffset = cpu_to_le16(param_offset);
2811 pSMB->DataOffset = cpu_to_le16(offset);
2812 pSMB->InformationLevel = cpu_to_le16(SMB_SET_FILE_UNIX_LINK);
2813 pSMB->Reserved4 = 0;
2814 inc_rfc1001_len(pSMB, byte_count);
2815 pSMB->ByteCount = cpu_to_le16(byte_count);
2816 rc = SendReceive(xid, tcon->ses, (struct smb_hdr *) pSMB,
2817 (struct smb_hdr *) pSMBr, &bytes_returned, 0);
2818 cifs_stats_inc(&tcon->stats.cifs_stats.num_symlinks);
2820 cFYI(1, "Send error in SetPathInfo create symlink = %d", rc);
2822 cifs_buf_release(pSMB);
2825 goto createSymLinkRetry;
2831 CIFSUnixCreateHardLink(const unsigned int xid, struct cifs_tcon *tcon,
2832 const char *fromName, const char *toName,
2833 const struct nls_table *nls_codepage, int remap)
2835 TRANSACTION2_SPI_REQ *pSMB = NULL;
2836 TRANSACTION2_SPI_RSP *pSMBr = NULL;
2839 int name_len_target;
2841 int bytes_returned = 0;
2842 __u16 params, param_offset, offset, byte_count;
2844 cFYI(1, "In Create Hard link Unix style");
2845 createHardLinkRetry:
2846 rc = smb_init(SMB_COM_TRANSACTION2, 15, tcon, (void **) &pSMB,
2851 if (pSMB->hdr.Flags2 & SMBFLG2_UNICODE) {
2852 name_len = cifsConvertToUTF16((__le16 *) pSMB->FileName, toName,
2853 PATH_MAX, nls_codepage, remap);
2854 name_len++; /* trailing null */
2857 } else { /* BB improve the check for buffer overruns BB */
2858 name_len = strnlen(toName, PATH_MAX);
2859 name_len++; /* trailing null */
2860 strncpy(pSMB->FileName, toName, name_len);
2862 params = 6 + name_len;
2863 pSMB->MaxSetupCount = 0;
2867 pSMB->Reserved2 = 0;
2868 param_offset = offsetof(struct smb_com_transaction2_spi_req,
2869 InformationLevel) - 4;
2870 offset = param_offset + params;
2872 data_offset = (char *) (&pSMB->hdr.Protocol) + offset;
2873 if (pSMB->hdr.Flags2 & SMBFLG2_UNICODE) {
2875 cifsConvertToUTF16((__le16 *) data_offset, fromName,
2876 PATH_MAX, nls_codepage, remap);
2877 name_len_target++; /* trailing null */
2878 name_len_target *= 2;
2879 } else { /* BB improve the check for buffer overruns BB */
2880 name_len_target = strnlen(fromName, PATH_MAX);
2881 name_len_target++; /* trailing null */
2882 strncpy(data_offset, fromName, name_len_target);
2885 pSMB->MaxParameterCount = cpu_to_le16(2);
2886 /* BB find exact max on data count below from sess*/
2887 pSMB->MaxDataCount = cpu_to_le16(1000);
2888 pSMB->SetupCount = 1;
2889 pSMB->Reserved3 = 0;
2890 pSMB->SubCommand = cpu_to_le16(TRANS2_SET_PATH_INFORMATION);
2891 byte_count = 3 /* pad */ + params + name_len_target;
2892 pSMB->ParameterCount = cpu_to_le16(params);
2893 pSMB->TotalParameterCount = pSMB->ParameterCount;
2894 pSMB->DataCount = cpu_to_le16(name_len_target);
2895 pSMB->TotalDataCount = pSMB->DataCount;
2896 pSMB->ParameterOffset = cpu_to_le16(param_offset);
2897 pSMB->DataOffset = cpu_to_le16(offset);
2898 pSMB->InformationLevel = cpu_to_le16(SMB_SET_FILE_UNIX_HLINK);
2899 pSMB->Reserved4 = 0;
2900 inc_rfc1001_len(pSMB, byte_count);
2901 pSMB->ByteCount = cpu_to_le16(byte_count);
2902 rc = SendReceive(xid, tcon->ses, (struct smb_hdr *) pSMB,
2903 (struct smb_hdr *) pSMBr, &bytes_returned, 0);
2904 cifs_stats_inc(&tcon->stats.cifs_stats.num_hardlinks);
2906 cFYI(1, "Send error in SetPathInfo (hard link) = %d", rc);
2908 cifs_buf_release(pSMB);
2910 goto createHardLinkRetry;
2916 CIFSCreateHardLink(const unsigned int xid, struct cifs_tcon *tcon,
2917 const char *from_name, const char *to_name,
2918 struct cifs_sb_info *cifs_sb)
2921 NT_RENAME_REQ *pSMB = NULL;
2922 RENAME_RSP *pSMBr = NULL;
2924 int name_len, name_len2;
2926 int remap = cifs_sb->mnt_cifs_flags & CIFS_MOUNT_MAP_SPECIAL_CHR;
2928 cFYI(1, "In CIFSCreateHardLink");
2929 winCreateHardLinkRetry:
2931 rc = smb_init(SMB_COM_NT_RENAME, 4, tcon, (void **) &pSMB,
2936 pSMB->SearchAttributes =
2937 cpu_to_le16(ATTR_READONLY | ATTR_HIDDEN | ATTR_SYSTEM |
2939 pSMB->Flags = cpu_to_le16(CREATE_HARD_LINK);
2940 pSMB->ClusterCount = 0;
2942 pSMB->BufferFormat = 0x04;
2944 if (pSMB->hdr.Flags2 & SMBFLG2_UNICODE) {
2946 cifsConvertToUTF16((__le16 *) pSMB->OldFileName, from_name,
2947 PATH_MAX, cifs_sb->local_nls, remap);
2948 name_len++; /* trailing null */
2951 /* protocol specifies ASCII buffer format (0x04) for unicode */
2952 pSMB->OldFileName[name_len] = 0x04;
2953 pSMB->OldFileName[name_len + 1] = 0x00; /* pad */
2955 cifsConvertToUTF16((__le16 *)&pSMB->OldFileName[name_len+2],
2956 to_name, PATH_MAX, cifs_sb->local_nls,
2958 name_len2 += 1 /* trailing null */ + 1 /* Signature word */ ;
2959 name_len2 *= 2; /* convert to bytes */
2960 } else { /* BB improve the check for buffer overruns BB */
2961 name_len = strnlen(from_name, PATH_MAX);
2962 name_len++; /* trailing null */
2963 strncpy(pSMB->OldFileName, from_name, name_len);
2964 name_len2 = strnlen(to_name, PATH_MAX);
2965 name_len2++; /* trailing null */
2966 pSMB->OldFileName[name_len] = 0x04; /* 2nd buffer format */
2967 strncpy(&pSMB->OldFileName[name_len + 1], to_name, name_len2);
2968 name_len2++; /* trailing null */
2969 name_len2++; /* signature byte */
2972 count = 1 /* string type byte */ + name_len + name_len2;
2973 inc_rfc1001_len(pSMB, count);
2974 pSMB->ByteCount = cpu_to_le16(count);
2976 rc = SendReceive(xid, tcon->ses, (struct smb_hdr *) pSMB,
2977 (struct smb_hdr *) pSMBr, &bytes_returned, 0);
2978 cifs_stats_inc(&tcon->stats.cifs_stats.num_hardlinks);
2980 cFYI(1, "Send error in hard link (NT rename) = %d", rc);
2982 cifs_buf_release(pSMB);
2984 goto winCreateHardLinkRetry;
2990 CIFSSMBUnixQuerySymLink(const unsigned int xid, struct cifs_tcon *tcon,
2991 const unsigned char *searchName, char **symlinkinfo,
2992 const struct nls_table *nls_codepage)
2994 /* SMB_QUERY_FILE_UNIX_LINK */
2995 TRANSACTION2_QPI_REQ *pSMB = NULL;
2996 TRANSACTION2_QPI_RSP *pSMBr = NULL;
3000 __u16 params, byte_count;
3003 cFYI(1, "In QPathSymLinkInfo (Unix) for path %s", searchName);
3006 rc = smb_init(SMB_COM_TRANSACTION2, 15, tcon, (void **) &pSMB,
3011 if (pSMB->hdr.Flags2 & SMBFLG2_UNICODE) {
3013 cifs_strtoUTF16((__le16 *) pSMB->FileName, searchName,
3014 PATH_MAX, nls_codepage);
3015 name_len++; /* trailing null */
3017 } else { /* BB improve the check for buffer overruns BB */
3018 name_len = strnlen(searchName, PATH_MAX);
3019 name_len++; /* trailing null */
3020 strncpy(pSMB->FileName, searchName, name_len);
3023 params = 2 /* level */ + 4 /* rsrvd */ + name_len /* incl null */ ;
3024 pSMB->TotalDataCount = 0;
3025 pSMB->MaxParameterCount = cpu_to_le16(2);
3026 pSMB->MaxDataCount = cpu_to_le16(CIFSMaxBufSize);
3027 pSMB->MaxSetupCount = 0;
3031 pSMB->Reserved2 = 0;
3032 pSMB->ParameterOffset = cpu_to_le16(offsetof(
3033 struct smb_com_transaction2_qpi_req, InformationLevel) - 4);
3034 pSMB->DataCount = 0;
3035 pSMB->DataOffset = 0;
3036 pSMB->SetupCount = 1;
3037 pSMB->Reserved3 = 0;
3038 pSMB->SubCommand = cpu_to_le16(TRANS2_QUERY_PATH_INFORMATION);
3039 byte_count = params + 1 /* pad */ ;
3040 pSMB->TotalParameterCount = cpu_to_le16(params);
3041 pSMB->ParameterCount = pSMB->TotalParameterCount;
3042 pSMB->InformationLevel = cpu_to_le16(SMB_QUERY_FILE_UNIX_LINK);
3043 pSMB->Reserved4 = 0;
3044 inc_rfc1001_len(pSMB, byte_count);
3045 pSMB->ByteCount = cpu_to_le16(byte_count);
3047 rc = SendReceive(xid, tcon->ses, (struct smb_hdr *) pSMB,
3048 (struct smb_hdr *) pSMBr, &bytes_returned, 0);
3050 cFYI(1, "Send error in QuerySymLinkInfo = %d", rc);
3052 /* decode response */
3054 rc = validate_t2((struct smb_t2_rsp *)pSMBr);
3055 /* BB also check enough total bytes returned */
3056 if (rc || get_bcc(&pSMBr->hdr) < 2)
3060 u16 count = le16_to_cpu(pSMBr->t2.DataCount);
3062 data_start = ((char *) &pSMBr->hdr.Protocol) +
3063 le16_to_cpu(pSMBr->t2.DataOffset);
3065 if (pSMBr->hdr.Flags2 & SMBFLG2_UNICODE)
3070 /* BB FIXME investigate remapping reserved chars here */
3071 *symlinkinfo = cifs_strndup_from_utf16(data_start,
3072 count, is_unicode, nls_codepage);
3077 cifs_buf_release(pSMB);
3079 goto querySymLinkRetry;
3083 #ifdef CONFIG_CIFS_SYMLINK_EXPERIMENTAL
3085 * Recent Windows versions now create symlinks more frequently
3086 * and they use the "reparse point" mechanism below. We can of course
3087 * do symlinks nicely to Samba and other servers which support the
3088 * CIFS Unix Extensions and we can also do SFU symlinks and "client only"
3089 * "MF" symlinks optionally, but for recent Windows we really need to
3090 * reenable the code below and fix the cifs_symlink callers to handle this.
3091 * In the interim this code has been moved to its own config option so
3092 * it is not compiled in by default until callers fixed up and more tested.
3095 CIFSSMBQueryReparseLinkInfo(const unsigned int xid, struct cifs_tcon *tcon,
3096 const unsigned char *searchName,
3097 char *symlinkinfo, const int buflen, __u16 fid,
3098 const struct nls_table *nls_codepage)
3102 struct smb_com_transaction_ioctl_req *pSMB;
3103 struct smb_com_transaction_ioctl_rsp *pSMBr;
3105 cFYI(1, "In Windows reparse style QueryLink for path %s", searchName);
3106 rc = smb_init(SMB_COM_NT_TRANSACT, 23, tcon, (void **) &pSMB,
3111 pSMB->TotalParameterCount = 0 ;
3112 pSMB->TotalDataCount = 0;
3113 pSMB->MaxParameterCount = cpu_to_le32(2);
3114 /* BB find exact data count max from sess structure BB */
3115 pSMB->MaxDataCount = cpu_to_le32(CIFSMaxBufSize & 0xFFFFFF00);
3116 pSMB->MaxSetupCount = 4;
3118 pSMB->ParameterOffset = 0;
3119 pSMB->DataCount = 0;
3120 pSMB->DataOffset = 0;
3121 pSMB->SetupCount = 4;
3122 pSMB->SubCommand = cpu_to_le16(NT_TRANSACT_IOCTL);
3123 pSMB->ParameterCount = pSMB->TotalParameterCount;
3124 pSMB->FunctionCode = cpu_to_le32(FSCTL_GET_REPARSE_POINT);
3125 pSMB->IsFsctl = 1; /* FSCTL */
3126 pSMB->IsRootFlag = 0;
3127 pSMB->Fid = fid; /* file handle always le */
3128 pSMB->ByteCount = 0;
3130 rc = SendReceive(xid, tcon->ses, (struct smb_hdr *) pSMB,
3131 (struct smb_hdr *) pSMBr, &bytes_returned, 0);
3133 cFYI(1, "Send error in QueryReparseLinkInfo = %d", rc);
3134 } else { /* decode response */
3135 __u32 data_offset = le32_to_cpu(pSMBr->DataOffset);
3136 __u32 data_count = le32_to_cpu(pSMBr->DataCount);
3137 if (get_bcc(&pSMBr->hdr) < 2 || data_offset > 512) {
3138 /* BB also check enough total bytes returned */
3139 rc = -EIO; /* bad smb */
3142 if (data_count && (data_count < 2048)) {
3143 char *end_of_smb = 2 /* sizeof byte count */ +
3144 get_bcc(&pSMBr->hdr) + (char *)&pSMBr->ByteCount;
3146 struct reparse_data *reparse_buf =
3147 (struct reparse_data *)
3148 ((char *)&pSMBr->hdr.Protocol
3150 if ((char *)reparse_buf >= end_of_smb) {
3154 if ((reparse_buf->LinkNamesBuf +
3155 reparse_buf->TargetNameOffset +
3156 reparse_buf->TargetNameLen) > end_of_smb) {
3157 cFYI(1, "reparse buf beyond SMB");
3162 if (pSMBr->hdr.Flags2 & SMBFLG2_UNICODE) {
3163 cifs_from_ucs2(symlinkinfo, (__le16 *)
3164 (reparse_buf->LinkNamesBuf +
3165 reparse_buf->TargetNameOffset),
3167 reparse_buf->TargetNameLen,
3169 } else { /* ASCII names */
3170 strncpy(symlinkinfo,
3171 reparse_buf->LinkNamesBuf +
3172 reparse_buf->TargetNameOffset,
3173 min_t(const int, buflen,
3174 reparse_buf->TargetNameLen));
3178 cFYI(1, "Invalid return data count on "
3179 "get reparse info ioctl");
3181 symlinkinfo[buflen] = 0; /* just in case so the caller
3182 does not go off the end of the buffer */
3183 cFYI(1, "readlink result - %s", symlinkinfo);
3187 cifs_buf_release(pSMB);
3189 /* Note: On -EAGAIN error only caller can retry on handle based calls
3190 since file handle passed in no longer valid */
3194 #endif /* CIFS_SYMLINK_EXPERIMENTAL */ /* BB temporarily unused */
3196 #ifdef CONFIG_CIFS_POSIX
3198 /*Convert an Access Control Entry from wire format to local POSIX xattr format*/
3199 static void cifs_convert_ace(posix_acl_xattr_entry *ace,
3200 struct cifs_posix_ace *cifs_ace)
3202 /* u8 cifs fields do not need le conversion */
3203 ace->e_perm = cpu_to_le16(cifs_ace->cifs_e_perm);
3204 ace->e_tag = cpu_to_le16(cifs_ace->cifs_e_tag);
3205 ace->e_id = cpu_to_le32(le64_to_cpu(cifs_ace->cifs_uid));
3206 /* cFYI(1, "perm %d tag %d id %d",ace->e_perm,ace->e_tag,ace->e_id); */
3211 /* Convert ACL from CIFS POSIX wire format to local Linux POSIX ACL xattr */
3212 static int cifs_copy_posix_acl(char *trgt, char *src, const int buflen,
3213 const int acl_type, const int size_of_data_area)
3218 struct cifs_posix_ace *pACE;
3219 struct cifs_posix_acl *cifs_acl = (struct cifs_posix_acl *)src;
3220 posix_acl_xattr_header *local_acl = (posix_acl_xattr_header *)trgt;
3222 if (le16_to_cpu(cifs_acl->version) != CIFS_ACL_VERSION)
3225 if (acl_type & ACL_TYPE_ACCESS) {
3226 count = le16_to_cpu(cifs_acl->access_entry_count);
3227 pACE = &cifs_acl->ace_array[0];
3228 size = sizeof(struct cifs_posix_acl);
3229 size += sizeof(struct cifs_posix_ace) * count;
3230 /* check if we would go beyond end of SMB */
3231 if (size_of_data_area < size) {
3232 cFYI(1, "bad CIFS POSIX ACL size %d vs. %d",
3233 size_of_data_area, size);
3236 } else if (acl_type & ACL_TYPE_DEFAULT) {
3237 count = le16_to_cpu(cifs_acl->access_entry_count);
3238 size = sizeof(struct cifs_posix_acl);
3239 size += sizeof(struct cifs_posix_ace) * count;
3240 /* skip past access ACEs to get to default ACEs */
3241 pACE = &cifs_acl->ace_array[count];
3242 count = le16_to_cpu(cifs_acl->default_entry_count);
3243 size += sizeof(struct cifs_posix_ace) * count;
3244 /* check if we would go beyond end of SMB */
3245 if (size_of_data_area < size)
3252 size = posix_acl_xattr_size(count);
3253 if ((buflen == 0) || (local_acl == NULL)) {
3254 /* used to query ACL EA size */
3255 } else if (size > buflen) {
3257 } else /* buffer big enough */ {
3258 local_acl->a_version = cpu_to_le32(POSIX_ACL_XATTR_VERSION);
3259 for (i = 0; i < count ; i++) {
3260 cifs_convert_ace(&local_acl->a_entries[i], pACE);
3267 static __u16 convert_ace_to_cifs_ace(struct cifs_posix_ace *cifs_ace,
3268 const posix_acl_xattr_entry *local_ace)
3270 __u16 rc = 0; /* 0 = ACL converted ok */
3272 cifs_ace->cifs_e_perm = le16_to_cpu(local_ace->e_perm);
3273 cifs_ace->cifs_e_tag = le16_to_cpu(local_ace->e_tag);
3274 /* BB is there a better way to handle the large uid? */
3275 if (local_ace->e_id == cpu_to_le32(-1)) {
3276 /* Probably no need to le convert -1 on any arch but can not hurt */
3277 cifs_ace->cifs_uid = cpu_to_le64(-1);
3279 cifs_ace->cifs_uid = cpu_to_le64(le32_to_cpu(local_ace->e_id));
3280 /*cFYI(1, "perm %d tag %d id %d",ace->e_perm,ace->e_tag,ace->e_id);*/
3284 /* Convert ACL from local Linux POSIX xattr to CIFS POSIX ACL wire format */
3285 static __u16 ACL_to_cifs_posix(char *parm_data, const char *pACL,
3286 const int buflen, const int acl_type)
3289 struct cifs_posix_acl *cifs_acl = (struct cifs_posix_acl *)parm_data;
3290 posix_acl_xattr_header *local_acl = (posix_acl_xattr_header *)pACL;
3294 if ((buflen == 0) || (pACL == NULL) || (cifs_acl == NULL))
3297 count = posix_acl_xattr_count((size_t)buflen);
3298 cFYI(1, "setting acl with %d entries from buf of length %d and "
3300 count, buflen, le32_to_cpu(local_acl->a_version));
3301 if (le32_to_cpu(local_acl->a_version) != 2) {
3302 cFYI(1, "unknown POSIX ACL version %d",
3303 le32_to_cpu(local_acl->a_version));
3306 cifs_acl->version = cpu_to_le16(1);
3307 if (acl_type == ACL_TYPE_ACCESS)
3308 cifs_acl->access_entry_count = cpu_to_le16(count);
3309 else if (acl_type == ACL_TYPE_DEFAULT)
3310 cifs_acl->default_entry_count = cpu_to_le16(count);
3312 cFYI(1, "unknown ACL type %d", acl_type);
3315 for (i = 0; i < count; i++) {
3316 rc = convert_ace_to_cifs_ace(&cifs_acl->ace_array[i],
3317 &local_acl->a_entries[i]);
3319 /* ACE not converted */
3324 rc = (__u16)(count * sizeof(struct cifs_posix_ace));
3325 rc += sizeof(struct cifs_posix_acl);
3326 /* BB add check to make sure ACL does not overflow SMB */
3332 CIFSSMBGetPosixACL(const unsigned int xid, struct cifs_tcon *tcon,
3333 const unsigned char *searchName,
3334 char *acl_inf, const int buflen, const int acl_type,
3335 const struct nls_table *nls_codepage, int remap)
3337 /* SMB_QUERY_POSIX_ACL */
3338 TRANSACTION2_QPI_REQ *pSMB = NULL;
3339 TRANSACTION2_QPI_RSP *pSMBr = NULL;
3343 __u16 params, byte_count;
3345 cFYI(1, "In GetPosixACL (Unix) for path %s", searchName);
3348 rc = smb_init(SMB_COM_TRANSACTION2, 15, tcon, (void **) &pSMB,
3353 if (pSMB->hdr.Flags2 & SMBFLG2_UNICODE) {
3355 cifsConvertToUTF16((__le16 *) pSMB->FileName,
3356 searchName, PATH_MAX, nls_codepage,
3358 name_len++; /* trailing null */
3360 pSMB->FileName[name_len] = 0;
3361 pSMB->FileName[name_len+1] = 0;
3362 } else { /* BB improve the check for buffer overruns BB */
3363 name_len = strnlen(searchName, PATH_MAX);
3364 name_len++; /* trailing null */
3365 strncpy(pSMB->FileName, searchName, name_len);
3368 params = 2 /* level */ + 4 /* rsrvd */ + name_len /* incl null */ ;
3369 pSMB->TotalDataCount = 0;
3370 pSMB->MaxParameterCount = cpu_to_le16(2);
3371 /* BB find exact max data count below from sess structure BB */
3372 pSMB->MaxDataCount = cpu_to_le16(4000);
3373 pSMB->MaxSetupCount = 0;
3377 pSMB->Reserved2 = 0;
3378 pSMB->ParameterOffset = cpu_to_le16(
3379 offsetof(struct smb_com_transaction2_qpi_req,
3380 InformationLevel) - 4);
3381 pSMB->DataCount = 0;
3382 pSMB->DataOffset = 0;
3383 pSMB->SetupCount = 1;
3384 pSMB->Reserved3 = 0;
3385 pSMB->SubCommand = cpu_to_le16(TRANS2_QUERY_PATH_INFORMATION);
3386 byte_count = params + 1 /* pad */ ;
3387 pSMB->TotalParameterCount = cpu_to_le16(params);
3388 pSMB->ParameterCount = pSMB->TotalParameterCount;
3389 pSMB->InformationLevel = cpu_to_le16(SMB_QUERY_POSIX_ACL);
3390 pSMB->Reserved4 = 0;
3391 inc_rfc1001_len(pSMB, byte_count);
3392 pSMB->ByteCount = cpu_to_le16(byte_count);
3394 rc = SendReceive(xid, tcon->ses, (struct smb_hdr *) pSMB,
3395 (struct smb_hdr *) pSMBr, &bytes_returned, 0);
3396 cifs_stats_inc(&tcon->stats.cifs_stats.num_acl_get);
3398 cFYI(1, "Send error in Query POSIX ACL = %d", rc);
3400 /* decode response */
3402 rc = validate_t2((struct smb_t2_rsp *)pSMBr);
3403 /* BB also check enough total bytes returned */
3404 if (rc || get_bcc(&pSMBr->hdr) < 2)
3405 rc = -EIO; /* bad smb */
3407 __u16 data_offset = le16_to_cpu(pSMBr->t2.DataOffset);
3408 __u16 count = le16_to_cpu(pSMBr->t2.DataCount);
3409 rc = cifs_copy_posix_acl(acl_inf,
3410 (char *)&pSMBr->hdr.Protocol+data_offset,
3411 buflen, acl_type, count);
3414 cifs_buf_release(pSMB);
3421 CIFSSMBSetPosixACL(const unsigned int xid, struct cifs_tcon *tcon,
3422 const unsigned char *fileName,
3423 const char *local_acl, const int buflen,
3425 const struct nls_table *nls_codepage, int remap)
3427 struct smb_com_transaction2_spi_req *pSMB = NULL;
3428 struct smb_com_transaction2_spi_rsp *pSMBr = NULL;
3432 int bytes_returned = 0;
3433 __u16 params, byte_count, data_count, param_offset, offset;
3435 cFYI(1, "In SetPosixACL (Unix) for path %s", fileName);
3437 rc = smb_init(SMB_COM_TRANSACTION2, 15, tcon, (void **) &pSMB,
3441 if (pSMB->hdr.Flags2 & SMBFLG2_UNICODE) {
3443 cifsConvertToUTF16((__le16 *) pSMB->FileName, fileName,
3444 PATH_MAX, nls_codepage, remap);
3445 name_len++; /* trailing null */
3447 } else { /* BB improve the check for buffer overruns BB */
3448 name_len = strnlen(fileName, PATH_MAX);
3449 name_len++; /* trailing null */
3450 strncpy(pSMB->FileName, fileName, name_len);
3452 params = 6 + name_len;
3453 pSMB->MaxParameterCount = cpu_to_le16(2);
3454 /* BB find max SMB size from sess */
3455 pSMB->MaxDataCount = cpu_to_le16(1000);
3456 pSMB->MaxSetupCount = 0;
3460 pSMB->Reserved2 = 0;
3461 param_offset = offsetof(struct smb_com_transaction2_spi_req,
3462 InformationLevel) - 4;
3463 offset = param_offset + params;
3464 parm_data = ((char *) &pSMB->hdr.Protocol) + offset;
3465 pSMB->ParameterOffset = cpu_to_le16(param_offset);
3467 /* convert to on the wire format for POSIX ACL */
3468 data_count = ACL_to_cifs_posix(parm_data, local_acl, buflen, acl_type);
3470 if (data_count == 0) {
3472 goto setACLerrorExit;
3474 pSMB->DataOffset = cpu_to_le16(offset);
3475 pSMB->SetupCount = 1;
3476 pSMB->Reserved3 = 0;
3477 pSMB->SubCommand = cpu_to_le16(TRANS2_SET_PATH_INFORMATION);
3478 pSMB->InformationLevel = cpu_to_le16(SMB_SET_POSIX_ACL);
3479 byte_count = 3 /* pad */ + params + data_count;
3480 pSMB->DataCount = cpu_to_le16(data_count);
3481 pSMB->TotalDataCount = pSMB->DataCount;
3482 pSMB->ParameterCount = cpu_to_le16(params);
3483 pSMB->TotalParameterCount = pSMB->ParameterCount;
3484 pSMB->Reserved4 = 0;
3485 inc_rfc1001_len(pSMB, byte_count);
3486 pSMB->ByteCount = cpu_to_le16(byte_count);
3487 rc = SendReceive(xid, tcon->ses, (struct smb_hdr *) pSMB,
3488 (struct smb_hdr *) pSMBr, &bytes_returned, 0);
3490 cFYI(1, "Set POSIX ACL returned %d", rc);
3493 cifs_buf_release(pSMB);
3499 /* BB fix tabs in this function FIXME BB */
3501 CIFSGetExtAttr(const unsigned int xid, struct cifs_tcon *tcon,
3502 const int netfid, __u64 *pExtAttrBits, __u64 *pMask)
3505 struct smb_t2_qfi_req *pSMB = NULL;
3506 struct smb_t2_qfi_rsp *pSMBr = NULL;
3508 __u16 params, byte_count;
3510 cFYI(1, "In GetExtAttr");
3515 rc = smb_init(SMB_COM_TRANSACTION2, 15, tcon, (void **) &pSMB,
3520 params = 2 /* level */ + 2 /* fid */;
3521 pSMB->t2.TotalDataCount = 0;
3522 pSMB->t2.MaxParameterCount = cpu_to_le16(4);
3523 /* BB find exact max data count below from sess structure BB */
3524 pSMB->t2.MaxDataCount = cpu_to_le16(4000);
3525 pSMB->t2.MaxSetupCount = 0;
3526 pSMB->t2.Reserved = 0;
3528 pSMB->t2.Timeout = 0;
3529 pSMB->t2.Reserved2 = 0;
3530 pSMB->t2.ParameterOffset = cpu_to_le16(offsetof(struct smb_t2_qfi_req,
3532 pSMB->t2.DataCount = 0;
3533 pSMB->t2.DataOffset = 0;
3534 pSMB->t2.SetupCount = 1;
3535 pSMB->t2.Reserved3 = 0;
3536 pSMB->t2.SubCommand = cpu_to_le16(TRANS2_QUERY_FILE_INFORMATION);
3537 byte_count = params + 1 /* pad */ ;
3538 pSMB->t2.TotalParameterCount = cpu_to_le16(params);
3539 pSMB->t2.ParameterCount = pSMB->t2.TotalParameterCount;
3540 pSMB->InformationLevel = cpu_to_le16(SMB_QUERY_ATTR_FLAGS);
3543 inc_rfc1001_len(pSMB, byte_count);
3544 pSMB->t2.ByteCount = cpu_to_le16(byte_count);
3546 rc = SendReceive(xid, tcon->ses, (struct smb_hdr *) pSMB,
3547 (struct smb_hdr *) pSMBr, &bytes_returned, 0);
3549 cFYI(1, "error %d in GetExtAttr", rc);
3551 /* decode response */
3552 rc = validate_t2((struct smb_t2_rsp *)pSMBr);
3553 /* BB also check enough total bytes returned */
3554 if (rc || get_bcc(&pSMBr->hdr) < 2)
3555 /* If rc should we check for EOPNOSUPP and
3556 disable the srvino flag? or in caller? */
3557 rc = -EIO; /* bad smb */
3559 __u16 data_offset = le16_to_cpu(pSMBr->t2.DataOffset);
3560 __u16 count = le16_to_cpu(pSMBr->t2.DataCount);
3561 struct file_chattr_info *pfinfo;
3562 /* BB Do we need a cast or hash here ? */
3564 cFYI(1, "Illegal size ret in GetExtAttr");
3568 pfinfo = (struct file_chattr_info *)
3569 (data_offset + (char *) &pSMBr->hdr.Protocol);
3570 *pExtAttrBits = le64_to_cpu(pfinfo->mode);
3571 *pMask = le64_to_cpu(pfinfo->mask);
3575 cifs_buf_release(pSMB);
3577 goto GetExtAttrRetry;
3581 #endif /* CONFIG_POSIX */
3583 #ifdef CONFIG_CIFS_ACL
3585 * Initialize NT TRANSACT SMB into small smb request buffer. This assumes that
3586 * all NT TRANSACTS that we init here have total parm and data under about 400
3587 * bytes (to fit in small cifs buffer size), which is the case so far, it
3588 * easily fits. NB: Setup words themselves and ByteCount MaxSetupCount (size of
3589 * returned setup area) and MaxParameterCount (returned parms size) must be set
3593 smb_init_nttransact(const __u16 sub_command, const int setup_count,
3594 const int parm_len, struct cifs_tcon *tcon,
3599 struct smb_com_ntransact_req *pSMB;
3601 rc = small_smb_init(SMB_COM_NT_TRANSACT, 19 + setup_count, tcon,
3605 *ret_buf = (void *)pSMB;
3607 pSMB->TotalParameterCount = cpu_to_le32(parm_len);
3608 pSMB->TotalDataCount = 0;
3609 pSMB->MaxDataCount = cpu_to_le32(CIFSMaxBufSize & 0xFFFFFF00);
3610 pSMB->ParameterCount = pSMB->TotalParameterCount;
3611 pSMB->DataCount = pSMB->TotalDataCount;
3612 temp_offset = offsetof(struct smb_com_ntransact_req, Parms) +
3613 (setup_count * 2) - 4 /* for rfc1001 length itself */;
3614 pSMB->ParameterOffset = cpu_to_le32(temp_offset);
3615 pSMB->DataOffset = cpu_to_le32(temp_offset + parm_len);
3616 pSMB->SetupCount = setup_count; /* no need to le convert byte fields */
3617 pSMB->SubCommand = cpu_to_le16(sub_command);
3622 validate_ntransact(char *buf, char **ppparm, char **ppdata,
3623 __u32 *pparmlen, __u32 *pdatalen)
3626 __u32 data_count, data_offset, parm_count, parm_offset;
3627 struct smb_com_ntransact_rsp *pSMBr;
3636 pSMBr = (struct smb_com_ntransact_rsp *)buf;
3638 bcc = get_bcc(&pSMBr->hdr);
3639 end_of_smb = 2 /* sizeof byte count */ + bcc +
3640 (char *)&pSMBr->ByteCount;
3642 data_offset = le32_to_cpu(pSMBr->DataOffset);
3643 data_count = le32_to_cpu(pSMBr->DataCount);
3644 parm_offset = le32_to_cpu(pSMBr->ParameterOffset);
3645 parm_count = le32_to_cpu(pSMBr->ParameterCount);
3647 *ppparm = (char *)&pSMBr->hdr.Protocol + parm_offset;
3648 *ppdata = (char *)&pSMBr->hdr.Protocol + data_offset;
3650 /* should we also check that parm and data areas do not overlap? */
3651 if (*ppparm > end_of_smb) {
3652 cFYI(1, "parms start after end of smb");
3654 } else if (parm_count + *ppparm > end_of_smb) {
3655 cFYI(1, "parm end after end of smb");
3657 } else if (*ppdata > end_of_smb) {
3658 cFYI(1, "data starts after end of smb");
3660 } else if (data_count + *ppdata > end_of_smb) {
3661 cFYI(1, "data %p + count %d (%p) past smb end %p start %p",
3662 *ppdata, data_count, (data_count + *ppdata),
3665 } else if (parm_count + data_count > bcc) {
3666 cFYI(1, "parm count and data count larger than SMB");
3669 *pdatalen = data_count;
3670 *pparmlen = parm_count;
3674 /* Get Security Descriptor (by handle) from remote server for a file or dir */
3676 CIFSSMBGetCIFSACL(const unsigned int xid, struct cifs_tcon *tcon, __u16 fid,
3677 struct cifs_ntsd **acl_inf, __u32 *pbuflen)
3681 QUERY_SEC_DESC_REQ *pSMB;
3684 cFYI(1, "GetCifsACL");
3689 rc = smb_init_nttransact(NT_TRANSACT_QUERY_SECURITY_DESC, 0,
3690 8 /* parm len */, tcon, (void **) &pSMB);
3694 pSMB->MaxParameterCount = cpu_to_le32(4);
3695 /* BB TEST with big acls that might need to be e.g. larger than 16K */
3696 pSMB->MaxSetupCount = 0;
3697 pSMB->Fid = fid; /* file handle always le */
3698 pSMB->AclFlags = cpu_to_le32(CIFS_ACL_OWNER | CIFS_ACL_GROUP |
3700 pSMB->ByteCount = cpu_to_le16(11); /* 3 bytes pad + 8 bytes parm */
3701 inc_rfc1001_len(pSMB, 11);
3702 iov[0].iov_base = (char *)pSMB;
3703 iov[0].iov_len = be32_to_cpu(pSMB->hdr.smb_buf_length) + 4;
3705 rc = SendReceive2(xid, tcon->ses, iov, 1 /* num iovec */, &buf_type,
3707 cifs_stats_inc(&tcon->stats.cifs_stats.num_acl_get);
3709 cFYI(1, "Send error in QuerySecDesc = %d", rc);
3710 } else { /* decode response */
3714 struct smb_com_ntransact_rsp *pSMBr;
3717 /* validate_nttransact */
3718 rc = validate_ntransact(iov[0].iov_base, (char **)&parm,
3719 &pdata, &parm_len, pbuflen);
3722 pSMBr = (struct smb_com_ntransact_rsp *)iov[0].iov_base;
3724 cFYI(1, "smb %p parm %p data %p", pSMBr, parm, *acl_inf);
3726 if (le32_to_cpu(pSMBr->ParameterCount) != 4) {
3727 rc = -EIO; /* bad smb */
3732 /* BB check that data area is minimum length and as big as acl_len */
3734 acl_len = le32_to_cpu(*parm);
3735 if (acl_len != *pbuflen) {
3736 cERROR(1, "acl length %d does not match %d",
3738 if (*pbuflen > acl_len)
3742 /* check if buffer is big enough for the acl
3743 header followed by the smallest SID */
3744 if ((*pbuflen < sizeof(struct cifs_ntsd) + 8) ||
3745 (*pbuflen >= 64 * 1024)) {
3746 cERROR(1, "bad acl length %d", *pbuflen);
3750 *acl_inf = kmalloc(*pbuflen, GFP_KERNEL);
3751 if (*acl_inf == NULL) {
3755 memcpy(*acl_inf, pdata, *pbuflen);
3759 if (buf_type == CIFS_SMALL_BUFFER)
3760 cifs_small_buf_release(iov[0].iov_base);
3761 else if (buf_type == CIFS_LARGE_BUFFER)
3762 cifs_buf_release(iov[0].iov_base);
3763 /* cifs_small_buf_release(pSMB); */ /* Freed earlier now in SendReceive2 */
3768 CIFSSMBSetCIFSACL(const unsigned int xid, struct cifs_tcon *tcon, __u16 fid,
3769 struct cifs_ntsd *pntsd, __u32 acllen, int aclflag)
3771 __u16 byte_count, param_count, data_count, param_offset, data_offset;
3773 int bytes_returned = 0;
3774 SET_SEC_DESC_REQ *pSMB = NULL;
3778 rc = smb_init(SMB_COM_NT_TRANSACT, 19, tcon, (void **) &pSMB, &pSMBr);
3782 pSMB->MaxSetupCount = 0;
3786 param_offset = offsetof(struct smb_com_transaction_ssec_req, Fid) - 4;
3787 data_count = acllen;
3788 data_offset = param_offset + param_count;
3789 byte_count = 3 /* pad */ + param_count;
3791 pSMB->DataCount = cpu_to_le32(data_count);
3792 pSMB->TotalDataCount = pSMB->DataCount;
3793 pSMB->MaxParameterCount = cpu_to_le32(4);
3794 pSMB->MaxDataCount = cpu_to_le32(16384);
3795 pSMB->ParameterCount = cpu_to_le32(param_count);
3796 pSMB->ParameterOffset = cpu_to_le32(param_offset);
3797 pSMB->TotalParameterCount = pSMB->ParameterCount;
3798 pSMB->DataOffset = cpu_to_le32(data_offset);
3799 pSMB->SetupCount = 0;
3800 pSMB->SubCommand = cpu_to_le16(NT_TRANSACT_SET_SECURITY_DESC);
3801 pSMB->ByteCount = cpu_to_le16(byte_count+data_count);
3803 pSMB->Fid = fid; /* file handle always le */
3804 pSMB->Reserved2 = 0;
3805 pSMB->AclFlags = cpu_to_le32(aclflag);
3807 if (pntsd && acllen) {
3808 memcpy((char *)pSMBr + offsetof(struct smb_hdr, Protocol) +
3809 data_offset, pntsd, acllen);
3810 inc_rfc1001_len(pSMB, byte_count + data_count);
3812 inc_rfc1001_len(pSMB, byte_count);
3814 rc = SendReceive(xid, tcon->ses, (struct smb_hdr *) pSMB,
3815 (struct smb_hdr *) pSMBr, &bytes_returned, 0);
3817 cFYI(1, "SetCIFSACL bytes_returned: %d, rc: %d", bytes_returned, rc);
3819 cFYI(1, "Set CIFS ACL returned %d", rc);
3820 cifs_buf_release(pSMB);
3823 goto setCifsAclRetry;
3828 #endif /* CONFIG_CIFS_ACL */
3830 /* Legacy Query Path Information call for lookup to old servers such
3833 SMBQueryInformation(const unsigned int xid, struct cifs_tcon *tcon,
3834 const char *search_name, FILE_ALL_INFO *data,
3835 const struct nls_table *nls_codepage, int remap)
3837 QUERY_INFORMATION_REQ *pSMB;
3838 QUERY_INFORMATION_RSP *pSMBr;
3843 cFYI(1, "In SMBQPath path %s", search_name);
3845 rc = smb_init(SMB_COM_QUERY_INFORMATION, 0, tcon, (void **) &pSMB,
3850 if (pSMB->hdr.Flags2 & SMBFLG2_UNICODE) {
3852 cifsConvertToUTF16((__le16 *) pSMB->FileName,
3853 search_name, PATH_MAX, nls_codepage,
3855 name_len++; /* trailing null */
3858 name_len = strnlen(search_name, PATH_MAX);
3859 name_len++; /* trailing null */
3860 strncpy(pSMB->FileName, search_name, name_len);
3862 pSMB->BufferFormat = 0x04;
3863 name_len++; /* account for buffer type byte */
3864 inc_rfc1001_len(pSMB, (__u16)name_len);
3865 pSMB->ByteCount = cpu_to_le16(name_len);
3867 rc = SendReceive(xid, tcon->ses, (struct smb_hdr *) pSMB,
3868 (struct smb_hdr *) pSMBr, &bytes_returned, 0);
3870 cFYI(1, "Send error in QueryInfo = %d", rc);
3873 __u32 time = le32_to_cpu(pSMBr->last_write_time);
3875 /* decode response */
3876 /* BB FIXME - add time zone adjustment BB */
3877 memset(data, 0, sizeof(FILE_ALL_INFO));
3880 /* decode time fields */
3881 data->ChangeTime = cpu_to_le64(cifs_UnixTimeToNT(ts));
3882 data->LastWriteTime = data->ChangeTime;
3883 data->LastAccessTime = 0;
3884 data->AllocationSize =
3885 cpu_to_le64(le32_to_cpu(pSMBr->size));
3886 data->EndOfFile = data->AllocationSize;
3888 cpu_to_le32(le16_to_cpu(pSMBr->attr));
3890 rc = -EIO; /* bad buffer passed in */
3892 cifs_buf_release(pSMB);
3901 CIFSSMBQFileInfo(const unsigned int xid, struct cifs_tcon *tcon,
3902 u16 netfid, FILE_ALL_INFO *pFindData)
3904 struct smb_t2_qfi_req *pSMB = NULL;
3905 struct smb_t2_qfi_rsp *pSMBr = NULL;
3908 __u16 params, byte_count;
3911 rc = smb_init(SMB_COM_TRANSACTION2, 15, tcon, (void **) &pSMB,
3916 params = 2 /* level */ + 2 /* fid */;
3917 pSMB->t2.TotalDataCount = 0;
3918 pSMB->t2.MaxParameterCount = cpu_to_le16(4);
3919 /* BB find exact max data count below from sess structure BB */
3920 pSMB->t2.MaxDataCount = cpu_to_le16(CIFSMaxBufSize);
3921 pSMB->t2.MaxSetupCount = 0;
3922 pSMB->t2.Reserved = 0;
3924 pSMB->t2.Timeout = 0;
3925 pSMB->t2.Reserved2 = 0;
3926 pSMB->t2.ParameterOffset = cpu_to_le16(offsetof(struct smb_t2_qfi_req,
3928 pSMB->t2.DataCount = 0;
3929 pSMB->t2.DataOffset = 0;
3930 pSMB->t2.SetupCount = 1;
3931 pSMB->t2.Reserved3 = 0;
3932 pSMB->t2.SubCommand = cpu_to_le16(TRANS2_QUERY_FILE_INFORMATION);
3933 byte_count = params + 1 /* pad */ ;
3934 pSMB->t2.TotalParameterCount = cpu_to_le16(params);
3935 pSMB->t2.ParameterCount = pSMB->t2.TotalParameterCount;
3936 pSMB->InformationLevel = cpu_to_le16(SMB_QUERY_FILE_ALL_INFO);
3939 inc_rfc1001_len(pSMB, byte_count);
3941 rc = SendReceive(xid, tcon->ses, (struct smb_hdr *) pSMB,
3942 (struct smb_hdr *) pSMBr, &bytes_returned, 0);
3944 cFYI(1, "Send error in QPathInfo = %d", rc);
3945 } else { /* decode response */
3946 rc = validate_t2((struct smb_t2_rsp *)pSMBr);
3948 if (rc) /* BB add auto retry on EOPNOTSUPP? */
3950 else if (get_bcc(&pSMBr->hdr) < 40)
3951 rc = -EIO; /* bad smb */
3952 else if (pFindData) {
3953 __u16 data_offset = le16_to_cpu(pSMBr->t2.DataOffset);
3954 memcpy((char *) pFindData,
3955 (char *) &pSMBr->hdr.Protocol +
3956 data_offset, sizeof(FILE_ALL_INFO));
3960 cifs_buf_release(pSMB);
3962 goto QFileInfoRetry;
3968 CIFSSMBQPathInfo(const unsigned int xid, struct cifs_tcon *tcon,
3969 const char *search_name, FILE_ALL_INFO *data,
3970 int legacy /* old style infolevel */,
3971 const struct nls_table *nls_codepage, int remap)
3973 /* level 263 SMB_QUERY_FILE_ALL_INFO */
3974 TRANSACTION2_QPI_REQ *pSMB = NULL;
3975 TRANSACTION2_QPI_RSP *pSMBr = NULL;
3979 __u16 params, byte_count;
3981 /* cFYI(1, "In QPathInfo path %s", search_name); */
3983 rc = smb_init(SMB_COM_TRANSACTION2, 15, tcon, (void **) &pSMB,
3988 if (pSMB->hdr.Flags2 & SMBFLG2_UNICODE) {
3990 cifsConvertToUTF16((__le16 *) pSMB->FileName, search_name,
3991 PATH_MAX, nls_codepage, remap);
3992 name_len++; /* trailing null */
3994 } else { /* BB improve the check for buffer overruns BB */
3995 name_len = strnlen(search_name, PATH_MAX);
3996 name_len++; /* trailing null */
3997 strncpy(pSMB->FileName, search_name, name_len);
4000 params = 2 /* level */ + 4 /* reserved */ + name_len /* includes NUL */;
4001 pSMB->TotalDataCount = 0;
4002 pSMB->MaxParameterCount = cpu_to_le16(2);
4003 /* BB find exact max SMB PDU from sess structure BB */
4004 pSMB->MaxDataCount = cpu_to_le16(4000);
4005 pSMB->MaxSetupCount = 0;
4009 pSMB->Reserved2 = 0;
4010 pSMB->ParameterOffset = cpu_to_le16(offsetof(
4011 struct smb_com_transaction2_qpi_req, InformationLevel) - 4);
4012 pSMB->DataCount = 0;
4013 pSMB->DataOffset = 0;
4014 pSMB->SetupCount = 1;
4015 pSMB->Reserved3 = 0;
4016 pSMB->SubCommand = cpu_to_le16(TRANS2_QUERY_PATH_INFORMATION);
4017 byte_count = params + 1 /* pad */ ;
4018 pSMB->TotalParameterCount = cpu_to_le16(params);
4019 pSMB->ParameterCount = pSMB->TotalParameterCount;
4021 pSMB->InformationLevel = cpu_to_le16(SMB_INFO_STANDARD);
4023 pSMB->InformationLevel = cpu_to_le16(SMB_QUERY_FILE_ALL_INFO);
4024 pSMB->Reserved4 = 0;
4025 inc_rfc1001_len(pSMB, byte_count);
4026 pSMB->ByteCount = cpu_to_le16(byte_count);
4028 rc = SendReceive(xid, tcon->ses, (struct smb_hdr *) pSMB,
4029 (struct smb_hdr *) pSMBr, &bytes_returned, 0);
4031 cFYI(1, "Send error in QPathInfo = %d", rc);
4032 } else { /* decode response */
4033 rc = validate_t2((struct smb_t2_rsp *)pSMBr);
4035 if (rc) /* BB add auto retry on EOPNOTSUPP? */
4037 else if (!legacy && get_bcc(&pSMBr->hdr) < 40)
4038 rc = -EIO; /* bad smb */
4039 else if (legacy && get_bcc(&pSMBr->hdr) < 24)
4040 rc = -EIO; /* 24 or 26 expected but we do not read
4044 __u16 data_offset = le16_to_cpu(pSMBr->t2.DataOffset);
4047 * On legacy responses we do not read the last field,
4048 * EAsize, fortunately since it varies by subdialect and
4049 * also note it differs on Set vs Get, ie two bytes or 4
4050 * bytes depending but we don't care here.
4053 size = sizeof(FILE_INFO_STANDARD);
4055 size = sizeof(FILE_ALL_INFO);
4056 memcpy((char *) data, (char *) &pSMBr->hdr.Protocol +
4061 cifs_buf_release(pSMB);
4063 goto QPathInfoRetry;
4069 CIFSSMBUnixQFileInfo(const unsigned int xid, struct cifs_tcon *tcon,
4070 u16 netfid, FILE_UNIX_BASIC_INFO *pFindData)
4072 struct smb_t2_qfi_req *pSMB = NULL;
4073 struct smb_t2_qfi_rsp *pSMBr = NULL;
4076 __u16 params, byte_count;
4079 rc = smb_init(SMB_COM_TRANSACTION2, 15, tcon, (void **) &pSMB,
4084 params = 2 /* level */ + 2 /* fid */;
4085 pSMB->t2.TotalDataCount = 0;
4086 pSMB->t2.MaxParameterCount = cpu_to_le16(4);
4087 /* BB find exact max data count below from sess structure BB */
4088 pSMB->t2.MaxDataCount = cpu_to_le16(CIFSMaxBufSize);
4089 pSMB->t2.MaxSetupCount = 0;
4090 pSMB->t2.Reserved = 0;
4092 pSMB->t2.Timeout = 0;
4093 pSMB->t2.Reserved2 = 0;
4094 pSMB->t2.ParameterOffset = cpu_to_le16(offsetof(struct smb_t2_qfi_req,
4096 pSMB->t2.DataCount = 0;
4097 pSMB->t2.DataOffset = 0;
4098 pSMB->t2.SetupCount = 1;
4099 pSMB->t2.Reserved3 = 0;
4100 pSMB->t2.SubCommand = cpu_to_le16(TRANS2_QUERY_FILE_INFORMATION);
4101 byte_count = params + 1 /* pad */ ;
4102 pSMB->t2.TotalParameterCount = cpu_to_le16(params);
4103 pSMB->t2.ParameterCount = pSMB->t2.TotalParameterCount;
4104 pSMB->InformationLevel = cpu_to_le16(SMB_QUERY_FILE_UNIX_BASIC);
4107 inc_rfc1001_len(pSMB, byte_count);
4109 rc = SendReceive(xid, tcon->ses, (struct smb_hdr *) pSMB,
4110 (struct smb_hdr *) pSMBr, &bytes_returned, 0);
4112 cFYI(1, "Send error in QPathInfo = %d", rc);
4113 } else { /* decode response */
4114 rc = validate_t2((struct smb_t2_rsp *)pSMBr);
4116 if (rc || get_bcc(&pSMBr->hdr) < sizeof(FILE_UNIX_BASIC_INFO)) {
4117 cERROR(1, "Malformed FILE_UNIX_BASIC_INFO response. "
4118 "Unix Extensions can be disabled on mount "
4119 "by specifying the nosfu mount option.");
4120 rc = -EIO; /* bad smb */
4122 __u16 data_offset = le16_to_cpu(pSMBr->t2.DataOffset);
4123 memcpy((char *) pFindData,
4124 (char *) &pSMBr->hdr.Protocol +
4126 sizeof(FILE_UNIX_BASIC_INFO));
4130 cifs_buf_release(pSMB);
4132 goto UnixQFileInfoRetry;
4138 CIFSSMBUnixQPathInfo(const unsigned int xid, struct cifs_tcon *tcon,
4139 const unsigned char *searchName,
4140 FILE_UNIX_BASIC_INFO *pFindData,
4141 const struct nls_table *nls_codepage, int remap)
4143 /* SMB_QUERY_FILE_UNIX_BASIC */
4144 TRANSACTION2_QPI_REQ *pSMB = NULL;
4145 TRANSACTION2_QPI_RSP *pSMBr = NULL;
4147 int bytes_returned = 0;
4149 __u16 params, byte_count;
4151 cFYI(1, "In QPathInfo (Unix) the path %s", searchName);
4153 rc = smb_init(SMB_COM_TRANSACTION2, 15, tcon, (void **) &pSMB,
4158 if (pSMB->hdr.Flags2 & SMBFLG2_UNICODE) {
4160 cifsConvertToUTF16((__le16 *) pSMB->FileName, searchName,
4161 PATH_MAX, nls_codepage, remap);
4162 name_len++; /* trailing null */
4164 } else { /* BB improve the check for buffer overruns BB */
4165 name_len = strnlen(searchName, PATH_MAX);
4166 name_len++; /* trailing null */
4167 strncpy(pSMB->FileName, searchName, name_len);
4170 params = 2 /* level */ + 4 /* reserved */ + name_len /* includes NUL */;
4171 pSMB->TotalDataCount = 0;
4172 pSMB->MaxParameterCount = cpu_to_le16(2);
4173 /* BB find exact max SMB PDU from sess structure BB */
4174 pSMB->MaxDataCount = cpu_to_le16(4000);
4175 pSMB->MaxSetupCount = 0;
4179 pSMB->Reserved2 = 0;
4180 pSMB->ParameterOffset = cpu_to_le16(offsetof(
4181 struct smb_com_transaction2_qpi_req, InformationLevel) - 4);
4182 pSMB->DataCount = 0;
4183 pSMB->DataOffset = 0;
4184 pSMB->SetupCount = 1;
4185 pSMB->Reserved3 = 0;
4186 pSMB->SubCommand = cpu_to_le16(TRANS2_QUERY_PATH_INFORMATION);
4187 byte_count = params + 1 /* pad */ ;
4188 pSMB->TotalParameterCount = cpu_to_le16(params);
4189 pSMB->ParameterCount = pSMB->TotalParameterCount;
4190 pSMB->InformationLevel = cpu_to_le16(SMB_QUERY_FILE_UNIX_BASIC);
4191 pSMB->Reserved4 = 0;
4192 inc_rfc1001_len(pSMB, byte_count);
4193 pSMB->ByteCount = cpu_to_le16(byte_count);
4195 rc = SendReceive(xid, tcon->ses, (struct smb_hdr *) pSMB,
4196 (struct smb_hdr *) pSMBr, &bytes_returned, 0);
4198 cFYI(1, "Send error in QPathInfo = %d", rc);
4199 } else { /* decode response */
4200 rc = validate_t2((struct smb_t2_rsp *)pSMBr);
4202 if (rc || get_bcc(&pSMBr->hdr) < sizeof(FILE_UNIX_BASIC_INFO)) {
4203 cERROR(1, "Malformed FILE_UNIX_BASIC_INFO response. "
4204 "Unix Extensions can be disabled on mount "
4205 "by specifying the nosfu mount option.");
4206 rc = -EIO; /* bad smb */
4208 __u16 data_offset = le16_to_cpu(pSMBr->t2.DataOffset);
4209 memcpy((char *) pFindData,
4210 (char *) &pSMBr->hdr.Protocol +
4212 sizeof(FILE_UNIX_BASIC_INFO));
4215 cifs_buf_release(pSMB);
4217 goto UnixQPathInfoRetry;
4222 /* xid, tcon, searchName and codepage are input parms, rest are returned */
4224 CIFSFindFirst(const unsigned int xid, struct cifs_tcon *tcon,
4225 const char *searchName,
4226 const struct nls_table *nls_codepage,
4227 __u16 *pnetfid, __u16 search_flags,
4228 struct cifs_search_info *psrch_inf, int remap, const char dirsep)
4230 /* level 257 SMB_ */
4231 TRANSACTION2_FFIRST_REQ *pSMB = NULL;
4232 TRANSACTION2_FFIRST_RSP *pSMBr = NULL;
4233 T2_FFIRST_RSP_PARMS *parms;
4235 int bytes_returned = 0;
4237 __u16 params, byte_count;
4239 cFYI(1, "In FindFirst for %s", searchName);
4242 rc = smb_init(SMB_COM_TRANSACTION2, 15, tcon, (void **) &pSMB,
4247 if (pSMB->hdr.Flags2 & SMBFLG2_UNICODE) {
4249 cifsConvertToUTF16((__le16 *) pSMB->FileName, searchName,
4250 PATH_MAX, nls_codepage, remap);
4251 /* We can not add the asterik earlier in case
4252 it got remapped to 0xF03A as if it were part of the
4253 directory name instead of a wildcard */
4255 pSMB->FileName[name_len] = dirsep;
4256 pSMB->FileName[name_len+1] = 0;
4257 pSMB->FileName[name_len+2] = '*';
4258 pSMB->FileName[name_len+3] = 0;
4259 name_len += 4; /* now the trailing null */
4260 pSMB->FileName[name_len] = 0; /* null terminate just in case */
4261 pSMB->FileName[name_len+1] = 0;
4263 } else { /* BB add check for overrun of SMB buf BB */
4264 name_len = strnlen(searchName, PATH_MAX);
4265 /* BB fix here and in unicode clause above ie
4266 if (name_len > buffersize-header)
4267 free buffer exit; BB */
4268 strncpy(pSMB->FileName, searchName, name_len);
4269 pSMB->FileName[name_len] = dirsep;
4270 pSMB->FileName[name_len+1] = '*';
4271 pSMB->FileName[name_len+2] = 0;
4275 params = 12 + name_len /* includes null */ ;
4276 pSMB->TotalDataCount = 0; /* no EAs */
4277 pSMB->MaxParameterCount = cpu_to_le16(10);
4278 pSMB->MaxDataCount = cpu_to_le16(CIFSMaxBufSize & 0xFFFFFF00);
4279 pSMB->MaxSetupCount = 0;
4283 pSMB->Reserved2 = 0;
4284 byte_count = params + 1 /* pad */ ;
4285 pSMB->TotalParameterCount = cpu_to_le16(params);
4286 pSMB->ParameterCount = pSMB->TotalParameterCount;
4287 pSMB->ParameterOffset = cpu_to_le16(
4288 offsetof(struct smb_com_transaction2_ffirst_req, SearchAttributes)
4290 pSMB->DataCount = 0;
4291 pSMB->DataOffset = 0;
4292 pSMB->SetupCount = 1; /* one byte, no need to make endian neutral */
4293 pSMB->Reserved3 = 0;
4294 pSMB->SubCommand = cpu_to_le16(TRANS2_FIND_FIRST);
4295 pSMB->SearchAttributes =
4296 cpu_to_le16(ATTR_READONLY | ATTR_HIDDEN | ATTR_SYSTEM |
4298 pSMB->SearchCount = cpu_to_le16(CIFSMaxBufSize/sizeof(FILE_UNIX_INFO));
4299 pSMB->SearchFlags = cpu_to_le16(search_flags);
4300 pSMB->InformationLevel = cpu_to_le16(psrch_inf->info_level);
4302 /* BB what should we set StorageType to? Does it matter? BB */
4303 pSMB->SearchStorageType = 0;
4304 inc_rfc1001_len(pSMB, byte_count);
4305 pSMB->ByteCount = cpu_to_le16(byte_count);
4307 rc = SendReceive(xid, tcon->ses, (struct smb_hdr *) pSMB,
4308 (struct smb_hdr *) pSMBr, &bytes_returned, 0);
4309 cifs_stats_inc(&tcon->stats.cifs_stats.num_ffirst);
4311 if (rc) {/* BB add logic to retry regular search if Unix search
4312 rejected unexpectedly by server */
4313 /* BB Add code to handle unsupported level rc */
4314 cFYI(1, "Error in FindFirst = %d", rc);
4316 cifs_buf_release(pSMB);
4318 /* BB eventually could optimize out free and realloc of buf */
4321 goto findFirstRetry;
4322 } else { /* decode response */
4323 /* BB remember to free buffer if error BB */
4324 rc = validate_t2((struct smb_t2_rsp *)pSMBr);
4328 if (pSMBr->hdr.Flags2 & SMBFLG2_UNICODE)
4329 psrch_inf->unicode = true;
4331 psrch_inf->unicode = false;
4333 psrch_inf->ntwrk_buf_start = (char *)pSMBr;
4334 psrch_inf->smallBuf = 0;
4335 psrch_inf->srch_entries_start =
4336 (char *) &pSMBr->hdr.Protocol +
4337 le16_to_cpu(pSMBr->t2.DataOffset);
4338 parms = (T2_FFIRST_RSP_PARMS *)((char *) &pSMBr->hdr.Protocol +
4339 le16_to_cpu(pSMBr->t2.ParameterOffset));
4341 if (parms->EndofSearch)
4342 psrch_inf->endOfSearch = true;
4344 psrch_inf->endOfSearch = false;
4346 psrch_inf->entries_in_buffer =
4347 le16_to_cpu(parms->SearchCount);
4348 psrch_inf->index_of_last_entry = 2 /* skip . and .. */ +
4349 psrch_inf->entries_in_buffer;
4350 lnoff = le16_to_cpu(parms->LastNameOffset);
4351 if (CIFSMaxBufSize < lnoff) {
4352 cERROR(1, "ignoring corrupt resume name");
4353 psrch_inf->last_entry = NULL;
4357 psrch_inf->last_entry = psrch_inf->srch_entries_start +
4360 *pnetfid = parms->SearchHandle;
4362 cifs_buf_release(pSMB);
4369 int CIFSFindNext(const unsigned int xid, struct cifs_tcon *tcon,
4370 __u16 searchHandle, __u16 search_flags,
4371 struct cifs_search_info *psrch_inf)
4373 TRANSACTION2_FNEXT_REQ *pSMB = NULL;
4374 TRANSACTION2_FNEXT_RSP *pSMBr = NULL;
4375 T2_FNEXT_RSP_PARMS *parms;
4376 char *response_data;
4379 unsigned int name_len;
4380 __u16 params, byte_count;
4382 cFYI(1, "In FindNext");
4384 if (psrch_inf->endOfSearch)
4387 rc = smb_init(SMB_COM_TRANSACTION2, 15, tcon, (void **) &pSMB,
4392 params = 14; /* includes 2 bytes of null string, converted to LE below*/
4394 pSMB->TotalDataCount = 0; /* no EAs */
4395 pSMB->MaxParameterCount = cpu_to_le16(8);
4396 pSMB->MaxDataCount = cpu_to_le16(CIFSMaxBufSize & 0xFFFFFF00);
4397 pSMB->MaxSetupCount = 0;
4401 pSMB->Reserved2 = 0;
4402 pSMB->ParameterOffset = cpu_to_le16(
4403 offsetof(struct smb_com_transaction2_fnext_req,SearchHandle) - 4);
4404 pSMB->DataCount = 0;
4405 pSMB->DataOffset = 0;
4406 pSMB->SetupCount = 1;
4407 pSMB->Reserved3 = 0;
4408 pSMB->SubCommand = cpu_to_le16(TRANS2_FIND_NEXT);
4409 pSMB->SearchHandle = searchHandle; /* always kept as le */
4411 cpu_to_le16(CIFSMaxBufSize / sizeof(FILE_UNIX_INFO));
4412 pSMB->InformationLevel = cpu_to_le16(psrch_inf->info_level);
4413 pSMB->ResumeKey = psrch_inf->resume_key;
4414 pSMB->SearchFlags = cpu_to_le16(search_flags);
4416 name_len = psrch_inf->resume_name_len;
4418 if (name_len < PATH_MAX) {
4419 memcpy(pSMB->ResumeFileName, psrch_inf->presume_name, name_len);
4420 byte_count += name_len;
4421 /* 14 byte parm len above enough for 2 byte null terminator */
4422 pSMB->ResumeFileName[name_len] = 0;
4423 pSMB->ResumeFileName[name_len+1] = 0;
4426 goto FNext2_err_exit;
4428 byte_count = params + 1 /* pad */ ;
4429 pSMB->TotalParameterCount = cpu_to_le16(params);
4430 pSMB->ParameterCount = pSMB->TotalParameterCount;
4431 inc_rfc1001_len(pSMB, byte_count);
4432 pSMB->ByteCount = cpu_to_le16(byte_count);
4434 rc = SendReceive(xid, tcon->ses, (struct smb_hdr *) pSMB,
4435 (struct smb_hdr *) pSMBr, &bytes_returned, 0);
4436 cifs_stats_inc(&tcon->stats.cifs_stats.num_fnext);
4439 psrch_inf->endOfSearch = true;
4440 cifs_buf_release(pSMB);
4441 rc = 0; /* search probably was closed at end of search*/
4443 cFYI(1, "FindNext returned = %d", rc);
4444 } else { /* decode response */
4445 rc = validate_t2((struct smb_t2_rsp *)pSMBr);
4450 /* BB fixme add lock for file (srch_info) struct here */
4451 if (pSMBr->hdr.Flags2 & SMBFLG2_UNICODE)
4452 psrch_inf->unicode = true;
4454 psrch_inf->unicode = false;
4455 response_data = (char *) &pSMBr->hdr.Protocol +
4456 le16_to_cpu(pSMBr->t2.ParameterOffset);
4457 parms = (T2_FNEXT_RSP_PARMS *)response_data;
4458 response_data = (char *)&pSMBr->hdr.Protocol +
4459 le16_to_cpu(pSMBr->t2.DataOffset);
4460 if (psrch_inf->smallBuf)
4461 cifs_small_buf_release(
4462 psrch_inf->ntwrk_buf_start);
4464 cifs_buf_release(psrch_inf->ntwrk_buf_start);
4465 psrch_inf->srch_entries_start = response_data;
4466 psrch_inf->ntwrk_buf_start = (char *)pSMB;
4467 psrch_inf->smallBuf = 0;
4468 if (parms->EndofSearch)
4469 psrch_inf->endOfSearch = true;
4471 psrch_inf->endOfSearch = false;
4472 psrch_inf->entries_in_buffer =
4473 le16_to_cpu(parms->SearchCount);
4474 psrch_inf->index_of_last_entry +=
4475 psrch_inf->entries_in_buffer;
4476 lnoff = le16_to_cpu(parms->LastNameOffset);
4477 if (CIFSMaxBufSize < lnoff) {
4478 cERROR(1, "ignoring corrupt resume name");
4479 psrch_inf->last_entry = NULL;
4482 psrch_inf->last_entry =
4483 psrch_inf->srch_entries_start + lnoff;
4485 /* cFYI(1, "fnxt2 entries in buf %d index_of_last %d",
4486 psrch_inf->entries_in_buffer, psrch_inf->index_of_last_entry); */
4488 /* BB fixme add unlock here */
4493 /* BB On error, should we leave previous search buf (and count and
4494 last entry fields) intact or free the previous one? */
4496 /* Note: On -EAGAIN error only caller can retry on handle based calls
4497 since file handle passed in no longer valid */
4500 cifs_buf_release(pSMB);
4505 CIFSFindClose(const unsigned int xid, struct cifs_tcon *tcon,
4506 const __u16 searchHandle)
4509 FINDCLOSE_REQ *pSMB = NULL;
4511 cFYI(1, "In CIFSSMBFindClose");
4512 rc = small_smb_init(SMB_COM_FIND_CLOSE2, 1, tcon, (void **)&pSMB);
4514 /* no sense returning error if session restarted
4515 as file handle has been closed */
4521 pSMB->FileID = searchHandle;
4522 pSMB->ByteCount = 0;
4523 rc = SendReceiveNoRsp(xid, tcon->ses, (char *) pSMB, 0);
4525 cERROR(1, "Send error in FindClose = %d", rc);
4527 cifs_stats_inc(&tcon->stats.cifs_stats.num_fclose);
4529 /* Since session is dead, search handle closed on server already */
4537 CIFSGetSrvInodeNumber(const unsigned int xid, struct cifs_tcon *tcon,
4538 const char *search_name, __u64 *inode_number,
4539 const struct nls_table *nls_codepage, int remap)
4542 TRANSACTION2_QPI_REQ *pSMB = NULL;
4543 TRANSACTION2_QPI_RSP *pSMBr = NULL;
4544 int name_len, bytes_returned;
4545 __u16 params, byte_count;
4547 cFYI(1, "In GetSrvInodeNum for %s", search_name);
4551 GetInodeNumberRetry:
4552 rc = smb_init(SMB_COM_TRANSACTION2, 15, tcon, (void **) &pSMB,
4557 if (pSMB->hdr.Flags2 & SMBFLG2_UNICODE) {
4559 cifsConvertToUTF16((__le16 *) pSMB->FileName,
4560 search_name, PATH_MAX, nls_codepage,
4562 name_len++; /* trailing null */
4564 } else { /* BB improve the check for buffer overruns BB */
4565 name_len = strnlen(search_name, PATH_MAX);
4566 name_len++; /* trailing null */
4567 strncpy(pSMB->FileName, search_name, name_len);
4570 params = 2 /* level */ + 4 /* rsrvd */ + name_len /* incl null */ ;
4571 pSMB->TotalDataCount = 0;
4572 pSMB->MaxParameterCount = cpu_to_le16(2);
4573 /* BB find exact max data count below from sess structure BB */
4574 pSMB->MaxDataCount = cpu_to_le16(4000);
4575 pSMB->MaxSetupCount = 0;
4579 pSMB->Reserved2 = 0;
4580 pSMB->ParameterOffset = cpu_to_le16(offsetof(
4581 struct smb_com_transaction2_qpi_req, InformationLevel) - 4);
4582 pSMB->DataCount = 0;
4583 pSMB->DataOffset = 0;
4584 pSMB->SetupCount = 1;
4585 pSMB->Reserved3 = 0;
4586 pSMB->SubCommand = cpu_to_le16(TRANS2_QUERY_PATH_INFORMATION);
4587 byte_count = params + 1 /* pad */ ;
4588 pSMB->TotalParameterCount = cpu_to_le16(params);
4589 pSMB->ParameterCount = pSMB->TotalParameterCount;
4590 pSMB->InformationLevel = cpu_to_le16(SMB_QUERY_FILE_INTERNAL_INFO);
4591 pSMB->Reserved4 = 0;
4592 inc_rfc1001_len(pSMB, byte_count);
4593 pSMB->ByteCount = cpu_to_le16(byte_count);
4595 rc = SendReceive(xid, tcon->ses, (struct smb_hdr *) pSMB,
4596 (struct smb_hdr *) pSMBr, &bytes_returned, 0);
4598 cFYI(1, "error %d in QueryInternalInfo", rc);
4600 /* decode response */
4601 rc = validate_t2((struct smb_t2_rsp *)pSMBr);
4602 /* BB also check enough total bytes returned */
4603 if (rc || get_bcc(&pSMBr->hdr) < 2)
4604 /* If rc should we check for EOPNOSUPP and
4605 disable the srvino flag? or in caller? */
4606 rc = -EIO; /* bad smb */
4608 __u16 data_offset = le16_to_cpu(pSMBr->t2.DataOffset);
4609 __u16 count = le16_to_cpu(pSMBr->t2.DataCount);
4610 struct file_internal_info *pfinfo;
4611 /* BB Do we need a cast or hash here ? */
4613 cFYI(1, "Illegal size ret in QryIntrnlInf");
4615 goto GetInodeNumOut;
4617 pfinfo = (struct file_internal_info *)
4618 (data_offset + (char *) &pSMBr->hdr.Protocol);
4619 *inode_number = le64_to_cpu(pfinfo->UniqueId);
4623 cifs_buf_release(pSMB);
4625 goto GetInodeNumberRetry;
4629 /* parses DFS refferal V3 structure
4630 * caller is responsible for freeing target_nodes
4633 * on failure - errno
4636 parse_DFS_referrals(TRANSACTION2_GET_DFS_REFER_RSP *pSMBr,
4637 unsigned int *num_of_nodes,
4638 struct dfs_info3_param **target_nodes,
4639 const struct nls_table *nls_codepage, int remap,
4640 const char *searchName)
4645 struct dfs_referral_level_3 *ref;
4647 if (pSMBr->hdr.Flags2 & SMBFLG2_UNICODE)
4651 *num_of_nodes = le16_to_cpu(pSMBr->NumberOfReferrals);
4653 if (*num_of_nodes < 1) {
4654 cERROR(1, "num_referrals: must be at least > 0,"
4655 "but we get num_referrals = %d", *num_of_nodes);
4657 goto parse_DFS_referrals_exit;
4660 ref = (struct dfs_referral_level_3 *) &(pSMBr->referrals);
4661 if (ref->VersionNumber != cpu_to_le16(3)) {
4662 cERROR(1, "Referrals of V%d version are not supported,"
4663 "should be V3", le16_to_cpu(ref->VersionNumber));
4665 goto parse_DFS_referrals_exit;
4668 /* get the upper boundary of the resp buffer */
4669 data_end = (char *)(&(pSMBr->PathConsumed)) +
4670 le16_to_cpu(pSMBr->t2.DataCount);
4672 cFYI(1, "num_referrals: %d dfs flags: 0x%x ...",
4674 le32_to_cpu(pSMBr->DFSFlags));
4676 *target_nodes = kzalloc(sizeof(struct dfs_info3_param) *
4677 *num_of_nodes, GFP_KERNEL);
4678 if (*target_nodes == NULL) {
4679 cERROR(1, "Failed to allocate buffer for target_nodes");
4681 goto parse_DFS_referrals_exit;
4684 /* collect necessary data from referrals */
4685 for (i = 0; i < *num_of_nodes; i++) {
4688 struct dfs_info3_param *node = (*target_nodes)+i;
4690 node->flags = le32_to_cpu(pSMBr->DFSFlags);
4692 __le16 *tmp = kmalloc(strlen(searchName)*2 + 2,
4696 goto parse_DFS_referrals_exit;
4698 cifsConvertToUTF16((__le16 *) tmp, searchName,
4699 PATH_MAX, nls_codepage, remap);
4700 node->path_consumed = cifs_utf16_bytes(tmp,
4701 le16_to_cpu(pSMBr->PathConsumed),
4705 node->path_consumed = le16_to_cpu(pSMBr->PathConsumed);
4707 node->server_type = le16_to_cpu(ref->ServerType);
4708 node->ref_flag = le16_to_cpu(ref->ReferralEntryFlags);
4711 temp = (char *)ref + le16_to_cpu(ref->DfsPathOffset);
4712 max_len = data_end - temp;
4713 node->path_name = cifs_strndup_from_utf16(temp, max_len,
4714 is_unicode, nls_codepage);
4715 if (!node->path_name) {
4717 goto parse_DFS_referrals_exit;
4720 /* copy link target UNC */
4721 temp = (char *)ref + le16_to_cpu(ref->NetworkAddressOffset);
4722 max_len = data_end - temp;
4723 node->node_name = cifs_strndup_from_utf16(temp, max_len,
4724 is_unicode, nls_codepage);
4725 if (!node->node_name) {
4727 goto parse_DFS_referrals_exit;
4733 parse_DFS_referrals_exit:
4735 free_dfs_info_array(*target_nodes, *num_of_nodes);
4736 *target_nodes = NULL;
4743 CIFSGetDFSRefer(const unsigned int xid, struct cifs_ses *ses,
4744 const char *search_name, struct dfs_info3_param **target_nodes,
4745 unsigned int *num_of_nodes,
4746 const struct nls_table *nls_codepage, int remap)
4748 /* TRANS2_GET_DFS_REFERRAL */
4749 TRANSACTION2_GET_DFS_REFER_REQ *pSMB = NULL;
4750 TRANSACTION2_GET_DFS_REFER_RSP *pSMBr = NULL;
4754 __u16 params, byte_count;
4756 *target_nodes = NULL;
4758 cFYI(1, "In GetDFSRefer the path %s", search_name);
4762 rc = smb_init(SMB_COM_TRANSACTION2, 15, NULL, (void **) &pSMB,
4767 /* server pointer checked in called function,
4768 but should never be null here anyway */
4769 pSMB->hdr.Mid = get_next_mid(ses->server);
4770 pSMB->hdr.Tid = ses->ipc_tid;
4771 pSMB->hdr.Uid = ses->Suid;
4772 if (ses->capabilities & CAP_STATUS32)
4773 pSMB->hdr.Flags2 |= SMBFLG2_ERR_STATUS;
4774 if (ses->capabilities & CAP_DFS)
4775 pSMB->hdr.Flags2 |= SMBFLG2_DFS;
4777 if (ses->capabilities & CAP_UNICODE) {
4778 pSMB->hdr.Flags2 |= SMBFLG2_UNICODE;
4780 cifsConvertToUTF16((__le16 *) pSMB->RequestFileName,
4781 search_name, PATH_MAX, nls_codepage,
4783 name_len++; /* trailing null */
4785 } else { /* BB improve the check for buffer overruns BB */
4786 name_len = strnlen(search_name, PATH_MAX);
4787 name_len++; /* trailing null */
4788 strncpy(pSMB->RequestFileName, search_name, name_len);
4792 if (ses->server->sec_mode &
4793 (SECMODE_SIGN_REQUIRED | SECMODE_SIGN_ENABLED))
4794 pSMB->hdr.Flags2 |= SMBFLG2_SECURITY_SIGNATURE;
4797 pSMB->hdr.Uid = ses->Suid;
4799 params = 2 /* level */ + name_len /*includes null */ ;
4800 pSMB->TotalDataCount = 0;
4801 pSMB->DataCount = 0;
4802 pSMB->DataOffset = 0;
4803 pSMB->MaxParameterCount = 0;
4804 /* BB find exact max SMB PDU from sess structure BB */
4805 pSMB->MaxDataCount = cpu_to_le16(4000);
4806 pSMB->MaxSetupCount = 0;
4810 pSMB->Reserved2 = 0;
4811 pSMB->ParameterOffset = cpu_to_le16(offsetof(
4812 struct smb_com_transaction2_get_dfs_refer_req, MaxReferralLevel) - 4);
4813 pSMB->SetupCount = 1;
4814 pSMB->Reserved3 = 0;
4815 pSMB->SubCommand = cpu_to_le16(TRANS2_GET_DFS_REFERRAL);
4816 byte_count = params + 3 /* pad */ ;
4817 pSMB->ParameterCount = cpu_to_le16(params);
4818 pSMB->TotalParameterCount = pSMB->ParameterCount;
4819 pSMB->MaxReferralLevel = cpu_to_le16(3);
4820 inc_rfc1001_len(pSMB, byte_count);
4821 pSMB->ByteCount = cpu_to_le16(byte_count);
4823 rc = SendReceive(xid, ses, (struct smb_hdr *) pSMB,
4824 (struct smb_hdr *) pSMBr, &bytes_returned, 0);
4826 cFYI(1, "Send error in GetDFSRefer = %d", rc);
4829 rc = validate_t2((struct smb_t2_rsp *)pSMBr);
4831 /* BB Also check if enough total bytes returned? */
4832 if (rc || get_bcc(&pSMBr->hdr) < 17) {
4833 rc = -EIO; /* bad smb */
4837 cFYI(1, "Decoding GetDFSRefer response BCC: %d Offset %d",
4838 get_bcc(&pSMBr->hdr),
4839 le16_to_cpu(pSMBr->t2.DataOffset));
4841 /* parse returned result into more usable form */
4842 rc = parse_DFS_referrals(pSMBr, num_of_nodes,
4843 target_nodes, nls_codepage, remap,
4847 cifs_buf_release(pSMB);
4855 /* Query File System Info such as free space to old servers such as Win 9x */
4857 SMBOldQFSInfo(const unsigned int xid, struct cifs_tcon *tcon,
4858 struct kstatfs *FSData)
4860 /* level 0x01 SMB_QUERY_FILE_SYSTEM_INFO */
4861 TRANSACTION2_QFSI_REQ *pSMB = NULL;
4862 TRANSACTION2_QFSI_RSP *pSMBr = NULL;
4863 FILE_SYSTEM_ALLOC_INFO *response_data;
4865 int bytes_returned = 0;
4866 __u16 params, byte_count;
4868 cFYI(1, "OldQFSInfo");
4870 rc = smb_init(SMB_COM_TRANSACTION2, 15, tcon, (void **) &pSMB,
4875 params = 2; /* level */
4876 pSMB->TotalDataCount = 0;
4877 pSMB->MaxParameterCount = cpu_to_le16(2);
4878 pSMB->MaxDataCount = cpu_to_le16(1000);
4879 pSMB->MaxSetupCount = 0;
4883 pSMB->Reserved2 = 0;
4884 byte_count = params + 1 /* pad */ ;
4885 pSMB->TotalParameterCount = cpu_to_le16(params);
4886 pSMB->ParameterCount = pSMB->TotalParameterCount;
4887 pSMB->ParameterOffset = cpu_to_le16(offsetof(
4888 struct smb_com_transaction2_qfsi_req, InformationLevel) - 4);
4889 pSMB->DataCount = 0;
4890 pSMB->DataOffset = 0;
4891 pSMB->SetupCount = 1;
4892 pSMB->Reserved3 = 0;
4893 pSMB->SubCommand = cpu_to_le16(TRANS2_QUERY_FS_INFORMATION);
4894 pSMB->InformationLevel = cpu_to_le16(SMB_INFO_ALLOCATION);
4895 inc_rfc1001_len(pSMB, byte_count);
4896 pSMB->ByteCount = cpu_to_le16(byte_count);
4898 rc = SendReceive(xid, tcon->ses, (struct smb_hdr *) pSMB,
4899 (struct smb_hdr *) pSMBr, &bytes_returned, 0);
4901 cFYI(1, "Send error in QFSInfo = %d", rc);
4902 } else { /* decode response */
4903 rc = validate_t2((struct smb_t2_rsp *)pSMBr);
4905 if (rc || get_bcc(&pSMBr->hdr) < 18)
4906 rc = -EIO; /* bad smb */
4908 __u16 data_offset = le16_to_cpu(pSMBr->t2.DataOffset);
4909 cFYI(1, "qfsinf resp BCC: %d Offset %d",
4910 get_bcc(&pSMBr->hdr), data_offset);
4912 response_data = (FILE_SYSTEM_ALLOC_INFO *)
4913 (((char *) &pSMBr->hdr.Protocol) + data_offset);
4915 le16_to_cpu(response_data->BytesPerSector) *
4916 le32_to_cpu(response_data->
4917 SectorsPerAllocationUnit);
4919 le32_to_cpu(response_data->TotalAllocationUnits);
4920 FSData->f_bfree = FSData->f_bavail =
4921 le32_to_cpu(response_data->FreeAllocationUnits);
4922 cFYI(1, "Blocks: %lld Free: %lld Block size %ld",
4923 (unsigned long long)FSData->f_blocks,
4924 (unsigned long long)FSData->f_bfree,
4928 cifs_buf_release(pSMB);
4931 goto oldQFSInfoRetry;
4937 CIFSSMBQFSInfo(const unsigned int xid, struct cifs_tcon *tcon,
4938 struct kstatfs *FSData)
4940 /* level 0x103 SMB_QUERY_FILE_SYSTEM_INFO */
4941 TRANSACTION2_QFSI_REQ *pSMB = NULL;
4942 TRANSACTION2_QFSI_RSP *pSMBr = NULL;
4943 FILE_SYSTEM_INFO *response_data;
4945 int bytes_returned = 0;
4946 __u16 params, byte_count;
4948 cFYI(1, "In QFSInfo");
4950 rc = smb_init(SMB_COM_TRANSACTION2, 15, tcon, (void **) &pSMB,
4955 params = 2; /* level */
4956 pSMB->TotalDataCount = 0;
4957 pSMB->MaxParameterCount = cpu_to_le16(2);
4958 pSMB->MaxDataCount = cpu_to_le16(1000);
4959 pSMB->MaxSetupCount = 0;
4963 pSMB->Reserved2 = 0;
4964 byte_count = params + 1 /* pad */ ;
4965 pSMB->TotalParameterCount = cpu_to_le16(params);
4966 pSMB->ParameterCount = pSMB->TotalParameterCount;
4967 pSMB->ParameterOffset = cpu_to_le16(offsetof(
4968 struct smb_com_transaction2_qfsi_req, InformationLevel) - 4);
4969 pSMB->DataCount = 0;
4970 pSMB->DataOffset = 0;
4971 pSMB->SetupCount = 1;
4972 pSMB->Reserved3 = 0;
4973 pSMB->SubCommand = cpu_to_le16(TRANS2_QUERY_FS_INFORMATION);
4974 pSMB->InformationLevel = cpu_to_le16(SMB_QUERY_FS_SIZE_INFO);
4975 inc_rfc1001_len(pSMB, byte_count);
4976 pSMB->ByteCount = cpu_to_le16(byte_count);
4978 rc = SendReceive(xid, tcon->ses, (struct smb_hdr *) pSMB,
4979 (struct smb_hdr *) pSMBr, &bytes_returned, 0);
4981 cFYI(1, "Send error in QFSInfo = %d", rc);
4982 } else { /* decode response */
4983 rc = validate_t2((struct smb_t2_rsp *)pSMBr);
4985 if (rc || get_bcc(&pSMBr->hdr) < 24)
4986 rc = -EIO; /* bad smb */
4988 __u16 data_offset = le16_to_cpu(pSMBr->t2.DataOffset);
4992 *) (((char *) &pSMBr->hdr.Protocol) +
4995 le32_to_cpu(response_data->BytesPerSector) *
4996 le32_to_cpu(response_data->
4997 SectorsPerAllocationUnit);
4999 le64_to_cpu(response_data->TotalAllocationUnits);
5000 FSData->f_bfree = FSData->f_bavail =
5001 le64_to_cpu(response_data->FreeAllocationUnits);
5002 cFYI(1, "Blocks: %lld Free: %lld Block size %ld",
5003 (unsigned long long)FSData->f_blocks,
5004 (unsigned long long)FSData->f_bfree,
5008 cifs_buf_release(pSMB);
5017 CIFSSMBQFSAttributeInfo(const unsigned int xid, struct cifs_tcon *tcon)
5019 /* level 0x105 SMB_QUERY_FILE_SYSTEM_INFO */
5020 TRANSACTION2_QFSI_REQ *pSMB = NULL;
5021 TRANSACTION2_QFSI_RSP *pSMBr = NULL;
5022 FILE_SYSTEM_ATTRIBUTE_INFO *response_data;
5024 int bytes_returned = 0;
5025 __u16 params, byte_count;
5027 cFYI(1, "In QFSAttributeInfo");
5029 rc = smb_init(SMB_COM_TRANSACTION2, 15, tcon, (void **) &pSMB,
5034 params = 2; /* level */
5035 pSMB->TotalDataCount = 0;
5036 pSMB->MaxParameterCount = cpu_to_le16(2);
5037 /* BB find exact max SMB PDU from sess structure BB */
5038 pSMB->MaxDataCount = cpu_to_le16(1000);
5039 pSMB->MaxSetupCount = 0;
5043 pSMB->Reserved2 = 0;
5044 byte_count = params + 1 /* pad */ ;
5045 pSMB->TotalParameterCount = cpu_to_le16(params);
5046 pSMB->ParameterCount = pSMB->TotalParameterCount;
5047 pSMB->ParameterOffset = cpu_to_le16(offsetof(
5048 struct smb_com_transaction2_qfsi_req, InformationLevel) - 4);
5049 pSMB->DataCount = 0;
5050 pSMB->DataOffset = 0;
5051 pSMB->SetupCount = 1;
5052 pSMB->Reserved3 = 0;
5053 pSMB->SubCommand = cpu_to_le16(TRANS2_QUERY_FS_INFORMATION);
5054 pSMB->InformationLevel = cpu_to_le16(SMB_QUERY_FS_ATTRIBUTE_INFO);
5055 inc_rfc1001_len(pSMB, byte_count);
5056 pSMB->ByteCount = cpu_to_le16(byte_count);
5058 rc = SendReceive(xid, tcon->ses, (struct smb_hdr *) pSMB,
5059 (struct smb_hdr *) pSMBr, &bytes_returned, 0);
5061 cERROR(1, "Send error in QFSAttributeInfo = %d", rc);
5062 } else { /* decode response */
5063 rc = validate_t2((struct smb_t2_rsp *)pSMBr);
5065 if (rc || get_bcc(&pSMBr->hdr) < 13) {
5066 /* BB also check if enough bytes returned */
5067 rc = -EIO; /* bad smb */
5069 __u16 data_offset = le16_to_cpu(pSMBr->t2.DataOffset);
5071 (FILE_SYSTEM_ATTRIBUTE_INFO
5072 *) (((char *) &pSMBr->hdr.Protocol) +
5074 memcpy(&tcon->fsAttrInfo, response_data,
5075 sizeof(FILE_SYSTEM_ATTRIBUTE_INFO));
5078 cifs_buf_release(pSMB);
5081 goto QFSAttributeRetry;
5087 CIFSSMBQFSDeviceInfo(const unsigned int xid, struct cifs_tcon *tcon)
5089 /* level 0x104 SMB_QUERY_FILE_SYSTEM_INFO */
5090 TRANSACTION2_QFSI_REQ *pSMB = NULL;
5091 TRANSACTION2_QFSI_RSP *pSMBr = NULL;
5092 FILE_SYSTEM_DEVICE_INFO *response_data;
5094 int bytes_returned = 0;
5095 __u16 params, byte_count;
5097 cFYI(1, "In QFSDeviceInfo");
5099 rc = smb_init(SMB_COM_TRANSACTION2, 15, tcon, (void **) &pSMB,
5104 params = 2; /* level */
5105 pSMB->TotalDataCount = 0;
5106 pSMB->MaxParameterCount = cpu_to_le16(2);
5107 /* BB find exact max SMB PDU from sess structure BB */
5108 pSMB->MaxDataCount = cpu_to_le16(1000);
5109 pSMB->MaxSetupCount = 0;
5113 pSMB->Reserved2 = 0;
5114 byte_count = params + 1 /* pad */ ;
5115 pSMB->TotalParameterCount = cpu_to_le16(params);
5116 pSMB->ParameterCount = pSMB->TotalParameterCount;
5117 pSMB->ParameterOffset = cpu_to_le16(offsetof(
5118 struct smb_com_transaction2_qfsi_req, InformationLevel) - 4);
5120 pSMB->DataCount = 0;
5121 pSMB->DataOffset = 0;
5122 pSMB->SetupCount = 1;
5123 pSMB->Reserved3 = 0;
5124 pSMB->SubCommand = cpu_to_le16(TRANS2_QUERY_FS_INFORMATION);
5125 pSMB->InformationLevel = cpu_to_le16(SMB_QUERY_FS_DEVICE_INFO);
5126 inc_rfc1001_len(pSMB, byte_count);
5127 pSMB->ByteCount = cpu_to_le16(byte_count);
5129 rc = SendReceive(xid, tcon->ses, (struct smb_hdr *) pSMB,
5130 (struct smb_hdr *) pSMBr, &bytes_returned, 0);
5132 cFYI(1, "Send error in QFSDeviceInfo = %d", rc);
5133 } else { /* decode response */
5134 rc = validate_t2((struct smb_t2_rsp *)pSMBr);
5136 if (rc || get_bcc(&pSMBr->hdr) <
5137 sizeof(FILE_SYSTEM_DEVICE_INFO))
5138 rc = -EIO; /* bad smb */
5140 __u16 data_offset = le16_to_cpu(pSMBr->t2.DataOffset);
5142 (FILE_SYSTEM_DEVICE_INFO *)
5143 (((char *) &pSMBr->hdr.Protocol) +
5145 memcpy(&tcon->fsDevInfo, response_data,
5146 sizeof(FILE_SYSTEM_DEVICE_INFO));
5149 cifs_buf_release(pSMB);
5152 goto QFSDeviceRetry;
5158 CIFSSMBQFSUnixInfo(const unsigned int xid, struct cifs_tcon *tcon)
5160 /* level 0x200 SMB_QUERY_CIFS_UNIX_INFO */
5161 TRANSACTION2_QFSI_REQ *pSMB = NULL;
5162 TRANSACTION2_QFSI_RSP *pSMBr = NULL;
5163 FILE_SYSTEM_UNIX_INFO *response_data;
5165 int bytes_returned = 0;
5166 __u16 params, byte_count;
5168 cFYI(1, "In QFSUnixInfo");
5170 rc = smb_init_no_reconnect(SMB_COM_TRANSACTION2, 15, tcon,
5171 (void **) &pSMB, (void **) &pSMBr);
5175 params = 2; /* level */
5176 pSMB->TotalDataCount = 0;
5177 pSMB->DataCount = 0;
5178 pSMB->DataOffset = 0;
5179 pSMB->MaxParameterCount = cpu_to_le16(2);
5180 /* BB find exact max SMB PDU from sess structure BB */
5181 pSMB->MaxDataCount = cpu_to_le16(100);
5182 pSMB->MaxSetupCount = 0;
5186 pSMB->Reserved2 = 0;
5187 byte_count = params + 1 /* pad */ ;
5188 pSMB->ParameterCount = cpu_to_le16(params);
5189 pSMB->TotalParameterCount = pSMB->ParameterCount;
5190 pSMB->ParameterOffset = cpu_to_le16(offsetof(struct
5191 smb_com_transaction2_qfsi_req, InformationLevel) - 4);
5192 pSMB->SetupCount = 1;
5193 pSMB->Reserved3 = 0;
5194 pSMB->SubCommand = cpu_to_le16(TRANS2_QUERY_FS_INFORMATION);
5195 pSMB->InformationLevel = cpu_to_le16(SMB_QUERY_CIFS_UNIX_INFO);
5196 inc_rfc1001_len(pSMB, byte_count);
5197 pSMB->ByteCount = cpu_to_le16(byte_count);
5199 rc = SendReceive(xid, tcon->ses, (struct smb_hdr *) pSMB,
5200 (struct smb_hdr *) pSMBr, &bytes_returned, 0);
5202 cERROR(1, "Send error in QFSUnixInfo = %d", rc);
5203 } else { /* decode response */
5204 rc = validate_t2((struct smb_t2_rsp *)pSMBr);
5206 if (rc || get_bcc(&pSMBr->hdr) < 13) {
5207 rc = -EIO; /* bad smb */
5209 __u16 data_offset = le16_to_cpu(pSMBr->t2.DataOffset);
5211 (FILE_SYSTEM_UNIX_INFO
5212 *) (((char *) &pSMBr->hdr.Protocol) +
5214 memcpy(&tcon->fsUnixInfo, response_data,
5215 sizeof(FILE_SYSTEM_UNIX_INFO));
5218 cifs_buf_release(pSMB);
5228 CIFSSMBSetFSUnixInfo(const unsigned int xid, struct cifs_tcon *tcon, __u64 cap)
5230 /* level 0x200 SMB_SET_CIFS_UNIX_INFO */
5231 TRANSACTION2_SETFSI_REQ *pSMB = NULL;
5232 TRANSACTION2_SETFSI_RSP *pSMBr = NULL;
5234 int bytes_returned = 0;
5235 __u16 params, param_offset, offset, byte_count;
5237 cFYI(1, "In SETFSUnixInfo");
5239 /* BB switch to small buf init to save memory */
5240 rc = smb_init_no_reconnect(SMB_COM_TRANSACTION2, 15, tcon,
5241 (void **) &pSMB, (void **) &pSMBr);
5245 params = 4; /* 2 bytes zero followed by info level. */
5246 pSMB->MaxSetupCount = 0;
5250 pSMB->Reserved2 = 0;
5251 param_offset = offsetof(struct smb_com_transaction2_setfsi_req, FileNum)
5253 offset = param_offset + params;
5255 pSMB->MaxParameterCount = cpu_to_le16(4);
5256 /* BB find exact max SMB PDU from sess structure BB */
5257 pSMB->MaxDataCount = cpu_to_le16(100);
5258 pSMB->SetupCount = 1;
5259 pSMB->Reserved3 = 0;
5260 pSMB->SubCommand = cpu_to_le16(TRANS2_SET_FS_INFORMATION);
5261 byte_count = 1 /* pad */ + params + 12;
5263 pSMB->DataCount = cpu_to_le16(12);
5264 pSMB->ParameterCount = cpu_to_le16(params);
5265 pSMB->TotalDataCount = pSMB->DataCount;
5266 pSMB->TotalParameterCount = pSMB->ParameterCount;
5267 pSMB->ParameterOffset = cpu_to_le16(param_offset);
5268 pSMB->DataOffset = cpu_to_le16(offset);
5272 pSMB->InformationLevel = cpu_to_le16(SMB_SET_CIFS_UNIX_INFO);
5275 pSMB->ClientUnixMajor = cpu_to_le16(CIFS_UNIX_MAJOR_VERSION);
5276 pSMB->ClientUnixMinor = cpu_to_le16(CIFS_UNIX_MINOR_VERSION);
5277 pSMB->ClientUnixCap = cpu_to_le64(cap);
5279 inc_rfc1001_len(pSMB, byte_count);
5280 pSMB->ByteCount = cpu_to_le16(byte_count);
5282 rc = SendReceive(xid, tcon->ses, (struct smb_hdr *) pSMB,
5283 (struct smb_hdr *) pSMBr, &bytes_returned, 0);
5285 cERROR(1, "Send error in SETFSUnixInfo = %d", rc);
5286 } else { /* decode response */
5287 rc = validate_t2((struct smb_t2_rsp *)pSMBr);
5289 rc = -EIO; /* bad smb */
5291 cifs_buf_release(pSMB);
5294 goto SETFSUnixRetry;
5302 CIFSSMBQFSPosixInfo(const unsigned int xid, struct cifs_tcon *tcon,
5303 struct kstatfs *FSData)
5305 /* level 0x201 SMB_QUERY_CIFS_POSIX_INFO */
5306 TRANSACTION2_QFSI_REQ *pSMB = NULL;
5307 TRANSACTION2_QFSI_RSP *pSMBr = NULL;
5308 FILE_SYSTEM_POSIX_INFO *response_data;
5310 int bytes_returned = 0;
5311 __u16 params, byte_count;
5313 cFYI(1, "In QFSPosixInfo");
5315 rc = smb_init(SMB_COM_TRANSACTION2, 15, tcon, (void **) &pSMB,
5320 params = 2; /* level */
5321 pSMB->TotalDataCount = 0;
5322 pSMB->DataCount = 0;
5323 pSMB->DataOffset = 0;
5324 pSMB->MaxParameterCount = cpu_to_le16(2);
5325 /* BB find exact max SMB PDU from sess structure BB */
5326 pSMB->MaxDataCount = cpu_to_le16(100);
5327 pSMB->MaxSetupCount = 0;
5331 pSMB->Reserved2 = 0;
5332 byte_count = params + 1 /* pad */ ;
5333 pSMB->ParameterCount = cpu_to_le16(params);
5334 pSMB->TotalParameterCount = pSMB->ParameterCount;
5335 pSMB->ParameterOffset = cpu_to_le16(offsetof(struct
5336 smb_com_transaction2_qfsi_req, InformationLevel) - 4);
5337 pSMB->SetupCount = 1;
5338 pSMB->Reserved3 = 0;
5339 pSMB->SubCommand = cpu_to_le16(TRANS2_QUERY_FS_INFORMATION);
5340 pSMB->InformationLevel = cpu_to_le16(SMB_QUERY_POSIX_FS_INFO);
5341 inc_rfc1001_len(pSMB, byte_count);
5342 pSMB->ByteCount = cpu_to_le16(byte_count);
5344 rc = SendReceive(xid, tcon->ses, (struct smb_hdr *) pSMB,
5345 (struct smb_hdr *) pSMBr, &bytes_returned, 0);
5347 cFYI(1, "Send error in QFSUnixInfo = %d", rc);
5348 } else { /* decode response */
5349 rc = validate_t2((struct smb_t2_rsp *)pSMBr);
5351 if (rc || get_bcc(&pSMBr->hdr) < 13) {
5352 rc = -EIO; /* bad smb */
5354 __u16 data_offset = le16_to_cpu(pSMBr->t2.DataOffset);
5356 (FILE_SYSTEM_POSIX_INFO
5357 *) (((char *) &pSMBr->hdr.Protocol) +
5360 le32_to_cpu(response_data->BlockSize);
5362 le64_to_cpu(response_data->TotalBlocks);
5364 le64_to_cpu(response_data->BlocksAvail);
5365 if (response_data->UserBlocksAvail == cpu_to_le64(-1)) {
5366 FSData->f_bavail = FSData->f_bfree;
5369 le64_to_cpu(response_data->UserBlocksAvail);
5371 if (response_data->TotalFileNodes != cpu_to_le64(-1))
5373 le64_to_cpu(response_data->TotalFileNodes);
5374 if (response_data->FreeFileNodes != cpu_to_le64(-1))
5376 le64_to_cpu(response_data->FreeFileNodes);
5379 cifs_buf_release(pSMB);
5389 * We can not use write of zero bytes trick to set file size due to need for
5390 * large file support. Also note that this SetPathInfo is preferred to
5391 * SetFileInfo based method in next routine which is only needed to work around
5392 * a sharing violation bugin Samba which this routine can run into.
5395 CIFSSMBSetEOF(const unsigned int xid, struct cifs_tcon *tcon,
5396 const char *file_name, __u64 size, struct cifs_sb_info *cifs_sb,
5397 bool set_allocation)
5399 struct smb_com_transaction2_spi_req *pSMB = NULL;
5400 struct smb_com_transaction2_spi_rsp *pSMBr = NULL;
5401 struct file_end_of_file_info *parm_data;
5404 int bytes_returned = 0;
5405 int remap = cifs_sb->mnt_cifs_flags & CIFS_MOUNT_MAP_SPECIAL_CHR;
5407 __u16 params, byte_count, data_count, param_offset, offset;
5409 cFYI(1, "In SetEOF");
5411 rc = smb_init(SMB_COM_TRANSACTION2, 15, tcon, (void **) &pSMB,
5416 if (pSMB->hdr.Flags2 & SMBFLG2_UNICODE) {
5418 cifsConvertToUTF16((__le16 *) pSMB->FileName, file_name,
5419 PATH_MAX, cifs_sb->local_nls, remap);
5420 name_len++; /* trailing null */
5422 } else { /* BB improve the check for buffer overruns BB */
5423 name_len = strnlen(file_name, PATH_MAX);
5424 name_len++; /* trailing null */
5425 strncpy(pSMB->FileName, file_name, name_len);
5427 params = 6 + name_len;
5428 data_count = sizeof(struct file_end_of_file_info);
5429 pSMB->MaxParameterCount = cpu_to_le16(2);
5430 pSMB->MaxDataCount = cpu_to_le16(4100);
5431 pSMB->MaxSetupCount = 0;
5435 pSMB->Reserved2 = 0;
5436 param_offset = offsetof(struct smb_com_transaction2_spi_req,
5437 InformationLevel) - 4;
5438 offset = param_offset + params;
5439 if (set_allocation) {
5440 if (tcon->ses->capabilities & CAP_INFOLEVEL_PASSTHRU)
5441 pSMB->InformationLevel =
5442 cpu_to_le16(SMB_SET_FILE_ALLOCATION_INFO2);
5444 pSMB->InformationLevel =
5445 cpu_to_le16(SMB_SET_FILE_ALLOCATION_INFO);
5446 } else /* Set File Size */ {
5447 if (tcon->ses->capabilities & CAP_INFOLEVEL_PASSTHRU)
5448 pSMB->InformationLevel =
5449 cpu_to_le16(SMB_SET_FILE_END_OF_FILE_INFO2);
5451 pSMB->InformationLevel =
5452 cpu_to_le16(SMB_SET_FILE_END_OF_FILE_INFO);
5456 (struct file_end_of_file_info *) (((char *) &pSMB->hdr.Protocol) +
5458 pSMB->ParameterOffset = cpu_to_le16(param_offset);
5459 pSMB->DataOffset = cpu_to_le16(offset);
5460 pSMB->SetupCount = 1;
5461 pSMB->Reserved3 = 0;
5462 pSMB->SubCommand = cpu_to_le16(TRANS2_SET_PATH_INFORMATION);
5463 byte_count = 3 /* pad */ + params + data_count;
5464 pSMB->DataCount = cpu_to_le16(data_count);
5465 pSMB->TotalDataCount = pSMB->DataCount;
5466 pSMB->ParameterCount = cpu_to_le16(params);
5467 pSMB->TotalParameterCount = pSMB->ParameterCount;
5468 pSMB->Reserved4 = 0;
5469 inc_rfc1001_len(pSMB, byte_count);
5470 parm_data->FileSize = cpu_to_le64(size);
5471 pSMB->ByteCount = cpu_to_le16(byte_count);
5472 rc = SendReceive(xid, tcon->ses, (struct smb_hdr *) pSMB,
5473 (struct smb_hdr *) pSMBr, &bytes_returned, 0);
5475 cFYI(1, "SetPathInfo (file size) returned %d", rc);
5477 cifs_buf_release(pSMB);
5486 CIFSSMBSetFileSize(const unsigned int xid, struct cifs_tcon *tcon,
5487 struct cifsFileInfo *cfile, __u64 size, bool set_allocation)
5489 struct smb_com_transaction2_sfi_req *pSMB = NULL;
5490 struct file_end_of_file_info *parm_data;
5492 __u16 params, param_offset, offset, byte_count, count;
5494 cFYI(1, "SetFileSize (via SetFileInfo) %lld",
5496 rc = small_smb_init(SMB_COM_TRANSACTION2, 15, tcon, (void **) &pSMB);
5501 pSMB->hdr.Pid = cpu_to_le16((__u16)cfile->pid);
5502 pSMB->hdr.PidHigh = cpu_to_le16((__u16)(cfile->pid >> 16));
5505 pSMB->MaxSetupCount = 0;
5509 pSMB->Reserved2 = 0;
5510 param_offset = offsetof(struct smb_com_transaction2_sfi_req, Fid) - 4;
5511 offset = param_offset + params;
5513 count = sizeof(struct file_end_of_file_info);
5514 pSMB->MaxParameterCount = cpu_to_le16(2);
5515 /* BB find exact max SMB PDU from sess structure BB */
5516 pSMB->MaxDataCount = cpu_to_le16(1000);
5517 pSMB->SetupCount = 1;
5518 pSMB->Reserved3 = 0;
5519 pSMB->SubCommand = cpu_to_le16(TRANS2_SET_FILE_INFORMATION);
5520 byte_count = 3 /* pad */ + params + count;
5521 pSMB->DataCount = cpu_to_le16(count);
5522 pSMB->ParameterCount = cpu_to_le16(params);
5523 pSMB->TotalDataCount = pSMB->DataCount;
5524 pSMB->TotalParameterCount = pSMB->ParameterCount;
5525 pSMB->ParameterOffset = cpu_to_le16(param_offset);
5527 (struct file_end_of_file_info *) (((char *) &pSMB->hdr.Protocol)
5529 pSMB->DataOffset = cpu_to_le16(offset);
5530 parm_data->FileSize = cpu_to_le64(size);
5531 pSMB->Fid = cfile->fid.netfid;
5532 if (set_allocation) {
5533 if (tcon->ses->capabilities & CAP_INFOLEVEL_PASSTHRU)
5534 pSMB->InformationLevel =
5535 cpu_to_le16(SMB_SET_FILE_ALLOCATION_INFO2);
5537 pSMB->InformationLevel =
5538 cpu_to_le16(SMB_SET_FILE_ALLOCATION_INFO);
5539 } else /* Set File Size */ {
5540 if (tcon->ses->capabilities & CAP_INFOLEVEL_PASSTHRU)
5541 pSMB->InformationLevel =
5542 cpu_to_le16(SMB_SET_FILE_END_OF_FILE_INFO2);
5544 pSMB->InformationLevel =
5545 cpu_to_le16(SMB_SET_FILE_END_OF_FILE_INFO);
5547 pSMB->Reserved4 = 0;
5548 inc_rfc1001_len(pSMB, byte_count);
5549 pSMB->ByteCount = cpu_to_le16(byte_count);
5550 rc = SendReceiveNoRsp(xid, tcon->ses, (char *) pSMB, 0);
5552 cFYI(1, "Send error in SetFileInfo (SetFileSize) = %d", rc);
5555 /* Note: On -EAGAIN error only caller can retry on handle based calls
5556 since file handle passed in no longer valid */
5561 /* Some legacy servers such as NT4 require that the file times be set on
5562 an open handle, rather than by pathname - this is awkward due to
5563 potential access conflicts on the open, but it is unavoidable for these
5564 old servers since the only other choice is to go from 100 nanosecond DCE
5565 time and resort to the original setpathinfo level which takes the ancient
5566 DOS time format with 2 second granularity */
5568 CIFSSMBSetFileInfo(const unsigned int xid, struct cifs_tcon *tcon,
5569 const FILE_BASIC_INFO *data, __u16 fid, __u32 pid_of_opener)
5571 struct smb_com_transaction2_sfi_req *pSMB = NULL;
5574 __u16 params, param_offset, offset, byte_count, count;
5576 cFYI(1, "Set Times (via SetFileInfo)");
5577 rc = small_smb_init(SMB_COM_TRANSACTION2, 15, tcon, (void **) &pSMB);
5582 pSMB->hdr.Pid = cpu_to_le16((__u16)pid_of_opener);
5583 pSMB->hdr.PidHigh = cpu_to_le16((__u16)(pid_of_opener >> 16));
5586 pSMB->MaxSetupCount = 0;
5590 pSMB->Reserved2 = 0;
5591 param_offset = offsetof(struct smb_com_transaction2_sfi_req, Fid) - 4;
5592 offset = param_offset + params;
5594 data_offset = (char *)pSMB +
5595 offsetof(struct smb_hdr, Protocol) + offset;
5597 count = sizeof(FILE_BASIC_INFO);
5598 pSMB->MaxParameterCount = cpu_to_le16(2);
5599 /* BB find max SMB PDU from sess */
5600 pSMB->MaxDataCount = cpu_to_le16(1000);
5601 pSMB->SetupCount = 1;
5602 pSMB->Reserved3 = 0;
5603 pSMB->SubCommand = cpu_to_le16(TRANS2_SET_FILE_INFORMATION);
5604 byte_count = 3 /* pad */ + params + count;
5605 pSMB->DataCount = cpu_to_le16(count);
5606 pSMB->ParameterCount = cpu_to_le16(params);
5607 pSMB->TotalDataCount = pSMB->DataCount;
5608 pSMB->TotalParameterCount = pSMB->ParameterCount;
5609 pSMB->ParameterOffset = cpu_to_le16(param_offset);
5610 pSMB->DataOffset = cpu_to_le16(offset);
5612 if (tcon->ses->capabilities & CAP_INFOLEVEL_PASSTHRU)
5613 pSMB->InformationLevel = cpu_to_le16(SMB_SET_FILE_BASIC_INFO2);
5615 pSMB->InformationLevel = cpu_to_le16(SMB_SET_FILE_BASIC_INFO);
5616 pSMB->Reserved4 = 0;
5617 inc_rfc1001_len(pSMB, byte_count);
5618 pSMB->ByteCount = cpu_to_le16(byte_count);
5619 memcpy(data_offset, data, sizeof(FILE_BASIC_INFO));
5620 rc = SendReceiveNoRsp(xid, tcon->ses, (char *) pSMB, 0);
5622 cFYI(1, "Send error in Set Time (SetFileInfo) = %d", rc);
5624 /* Note: On -EAGAIN error only caller can retry on handle based calls
5625 since file handle passed in no longer valid */
5631 CIFSSMBSetFileDisposition(const unsigned int xid, struct cifs_tcon *tcon,
5632 bool delete_file, __u16 fid, __u32 pid_of_opener)
5634 struct smb_com_transaction2_sfi_req *pSMB = NULL;
5637 __u16 params, param_offset, offset, byte_count, count;
5639 cFYI(1, "Set File Disposition (via SetFileInfo)");
5640 rc = small_smb_init(SMB_COM_TRANSACTION2, 15, tcon, (void **) &pSMB);
5645 pSMB->hdr.Pid = cpu_to_le16((__u16)pid_of_opener);
5646 pSMB->hdr.PidHigh = cpu_to_le16((__u16)(pid_of_opener >> 16));
5649 pSMB->MaxSetupCount = 0;
5653 pSMB->Reserved2 = 0;
5654 param_offset = offsetof(struct smb_com_transaction2_sfi_req, Fid) - 4;
5655 offset = param_offset + params;
5657 data_offset = (char *) (&pSMB->hdr.Protocol) + offset;
5660 pSMB->MaxParameterCount = cpu_to_le16(2);
5661 /* BB find max SMB PDU from sess */
5662 pSMB->MaxDataCount = cpu_to_le16(1000);
5663 pSMB->SetupCount = 1;
5664 pSMB->Reserved3 = 0;
5665 pSMB->SubCommand = cpu_to_le16(TRANS2_SET_FILE_INFORMATION);
5666 byte_count = 3 /* pad */ + params + count;
5667 pSMB->DataCount = cpu_to_le16(count);
5668 pSMB->ParameterCount = cpu_to_le16(params);
5669 pSMB->TotalDataCount = pSMB->DataCount;
5670 pSMB->TotalParameterCount = pSMB->ParameterCount;
5671 pSMB->ParameterOffset = cpu_to_le16(param_offset);
5672 pSMB->DataOffset = cpu_to_le16(offset);
5674 pSMB->InformationLevel = cpu_to_le16(SMB_SET_FILE_DISPOSITION_INFO);
5675 pSMB->Reserved4 = 0;
5676 inc_rfc1001_len(pSMB, byte_count);
5677 pSMB->ByteCount = cpu_to_le16(byte_count);
5678 *data_offset = delete_file ? 1 : 0;
5679 rc = SendReceiveNoRsp(xid, tcon->ses, (char *) pSMB, 0);
5681 cFYI(1, "Send error in SetFileDisposition = %d", rc);
5687 CIFSSMBSetPathInfo(const unsigned int xid, struct cifs_tcon *tcon,
5688 const char *fileName, const FILE_BASIC_INFO *data,
5689 const struct nls_table *nls_codepage, int remap)
5691 TRANSACTION2_SPI_REQ *pSMB = NULL;
5692 TRANSACTION2_SPI_RSP *pSMBr = NULL;
5695 int bytes_returned = 0;
5697 __u16 params, param_offset, offset, byte_count, count;
5699 cFYI(1, "In SetTimes");
5702 rc = smb_init(SMB_COM_TRANSACTION2, 15, tcon, (void **) &pSMB,
5707 if (pSMB->hdr.Flags2 & SMBFLG2_UNICODE) {
5709 cifsConvertToUTF16((__le16 *) pSMB->FileName, fileName,
5710 PATH_MAX, nls_codepage, remap);
5711 name_len++; /* trailing null */
5713 } else { /* BB improve the check for buffer overruns BB */
5714 name_len = strnlen(fileName, PATH_MAX);
5715 name_len++; /* trailing null */
5716 strncpy(pSMB->FileName, fileName, name_len);
5719 params = 6 + name_len;
5720 count = sizeof(FILE_BASIC_INFO);
5721 pSMB->MaxParameterCount = cpu_to_le16(2);
5722 /* BB find max SMB PDU from sess structure BB */
5723 pSMB->MaxDataCount = cpu_to_le16(1000);
5724 pSMB->MaxSetupCount = 0;
5728 pSMB->Reserved2 = 0;
5729 param_offset = offsetof(struct smb_com_transaction2_spi_req,
5730 InformationLevel) - 4;
5731 offset = param_offset + params;
5732 data_offset = (char *) (&pSMB->hdr.Protocol) + offset;
5733 pSMB->ParameterOffset = cpu_to_le16(param_offset);
5734 pSMB->DataOffset = cpu_to_le16(offset);
5735 pSMB->SetupCount = 1;
5736 pSMB->Reserved3 = 0;
5737 pSMB->SubCommand = cpu_to_le16(TRANS2_SET_PATH_INFORMATION);
5738 byte_count = 3 /* pad */ + params + count;
5740 pSMB->DataCount = cpu_to_le16(count);
5741 pSMB->ParameterCount = cpu_to_le16(params);
5742 pSMB->TotalDataCount = pSMB->DataCount;
5743 pSMB->TotalParameterCount = pSMB->ParameterCount;
5744 if (tcon->ses->capabilities & CAP_INFOLEVEL_PASSTHRU)
5745 pSMB->InformationLevel = cpu_to_le16(SMB_SET_FILE_BASIC_INFO2);
5747 pSMB->InformationLevel = cpu_to_le16(SMB_SET_FILE_BASIC_INFO);
5748 pSMB->Reserved4 = 0;
5749 inc_rfc1001_len(pSMB, byte_count);
5750 memcpy(data_offset, data, sizeof(FILE_BASIC_INFO));
5751 pSMB->ByteCount = cpu_to_le16(byte_count);
5752 rc = SendReceive(xid, tcon->ses, (struct smb_hdr *) pSMB,
5753 (struct smb_hdr *) pSMBr, &bytes_returned, 0);
5755 cFYI(1, "SetPathInfo (times) returned %d", rc);
5757 cifs_buf_release(pSMB);
5765 /* Can not be used to set time stamps yet (due to old DOS time format) */
5766 /* Can be used to set attributes */
5767 #if 0 /* Possibly not needed - since it turns out that strangely NT4 has a bug
5768 handling it anyway and NT4 was what we thought it would be needed for
5769 Do not delete it until we prove whether needed for Win9x though */
5771 CIFSSMBSetAttrLegacy(unsigned int xid, struct cifs_tcon *tcon, char *fileName,
5772 __u16 dos_attrs, const struct nls_table *nls_codepage)
5774 SETATTR_REQ *pSMB = NULL;
5775 SETATTR_RSP *pSMBr = NULL;
5780 cFYI(1, "In SetAttrLegacy");
5783 rc = smb_init(SMB_COM_SETATTR, 8, tcon, (void **) &pSMB,
5788 if (pSMB->hdr.Flags2 & SMBFLG2_UNICODE) {
5790 ConvertToUTF16((__le16 *) pSMB->fileName, fileName,
5791 PATH_MAX, nls_codepage);
5792 name_len++; /* trailing null */
5794 } else { /* BB improve the check for buffer overruns BB */
5795 name_len = strnlen(fileName, PATH_MAX);
5796 name_len++; /* trailing null */
5797 strncpy(pSMB->fileName, fileName, name_len);
5799 pSMB->attr = cpu_to_le16(dos_attrs);
5800 pSMB->BufferFormat = 0x04;
5801 inc_rfc1001_len(pSMB, name_len + 1);
5802 pSMB->ByteCount = cpu_to_le16(name_len + 1);
5803 rc = SendReceive(xid, tcon->ses, (struct smb_hdr *) pSMB,
5804 (struct smb_hdr *) pSMBr, &bytes_returned, 0);
5806 cFYI(1, "Error in LegacySetAttr = %d", rc);
5808 cifs_buf_release(pSMB);
5811 goto SetAttrLgcyRetry;
5815 #endif /* temporarily unneeded SetAttr legacy function */
5818 cifs_fill_unix_set_info(FILE_UNIX_BASIC_INFO *data_offset,
5819 const struct cifs_unix_set_info_args *args)
5821 u64 mode = args->mode;
5824 * Samba server ignores set of file size to zero due to bugs in some
5825 * older clients, but we should be precise - we use SetFileSize to
5826 * set file size and do not want to truncate file size to zero
5827 * accidentally as happened on one Samba server beta by putting
5828 * zero instead of -1 here
5830 data_offset->EndOfFile = cpu_to_le64(NO_CHANGE_64);
5831 data_offset->NumOfBytes = cpu_to_le64(NO_CHANGE_64);
5832 data_offset->LastStatusChange = cpu_to_le64(args->ctime);
5833 data_offset->LastAccessTime = cpu_to_le64(args->atime);
5834 data_offset->LastModificationTime = cpu_to_le64(args->mtime);
5835 data_offset->Uid = cpu_to_le64(args->uid);
5836 data_offset->Gid = cpu_to_le64(args->gid);
5837 /* better to leave device as zero when it is */
5838 data_offset->DevMajor = cpu_to_le64(MAJOR(args->device));
5839 data_offset->DevMinor = cpu_to_le64(MINOR(args->device));
5840 data_offset->Permissions = cpu_to_le64(mode);
5843 data_offset->Type = cpu_to_le32(UNIX_FILE);
5844 else if (S_ISDIR(mode))
5845 data_offset->Type = cpu_to_le32(UNIX_DIR);
5846 else if (S_ISLNK(mode))
5847 data_offset->Type = cpu_to_le32(UNIX_SYMLINK);
5848 else if (S_ISCHR(mode))
5849 data_offset->Type = cpu_to_le32(UNIX_CHARDEV);
5850 else if (S_ISBLK(mode))
5851 data_offset->Type = cpu_to_le32(UNIX_BLOCKDEV);
5852 else if (S_ISFIFO(mode))
5853 data_offset->Type = cpu_to_le32(UNIX_FIFO);
5854 else if (S_ISSOCK(mode))
5855 data_offset->Type = cpu_to_le32(UNIX_SOCKET);
5859 CIFSSMBUnixSetFileInfo(const unsigned int xid, struct cifs_tcon *tcon,
5860 const struct cifs_unix_set_info_args *args,
5861 u16 fid, u32 pid_of_opener)
5863 struct smb_com_transaction2_sfi_req *pSMB = NULL;
5866 u16 params, param_offset, offset, byte_count, count;
5868 cFYI(1, "Set Unix Info (via SetFileInfo)");
5869 rc = small_smb_init(SMB_COM_TRANSACTION2, 15, tcon, (void **) &pSMB);
5874 pSMB->hdr.Pid = cpu_to_le16((__u16)pid_of_opener);
5875 pSMB->hdr.PidHigh = cpu_to_le16((__u16)(pid_of_opener >> 16));
5878 pSMB->MaxSetupCount = 0;
5882 pSMB->Reserved2 = 0;
5883 param_offset = offsetof(struct smb_com_transaction2_sfi_req, Fid) - 4;
5884 offset = param_offset + params;
5886 data_offset = (char *)pSMB +
5887 offsetof(struct smb_hdr, Protocol) + offset;
5889 count = sizeof(FILE_UNIX_BASIC_INFO);
5891 pSMB->MaxParameterCount = cpu_to_le16(2);
5892 /* BB find max SMB PDU from sess */
5893 pSMB->MaxDataCount = cpu_to_le16(1000);
5894 pSMB->SetupCount = 1;
5895 pSMB->Reserved3 = 0;
5896 pSMB->SubCommand = cpu_to_le16(TRANS2_SET_FILE_INFORMATION);
5897 byte_count = 3 /* pad */ + params + count;
5898 pSMB->DataCount = cpu_to_le16(count);
5899 pSMB->ParameterCount = cpu_to_le16(params);
5900 pSMB->TotalDataCount = pSMB->DataCount;
5901 pSMB->TotalParameterCount = pSMB->ParameterCount;
5902 pSMB->ParameterOffset = cpu_to_le16(param_offset);
5903 pSMB->DataOffset = cpu_to_le16(offset);
5905 pSMB->InformationLevel = cpu_to_le16(SMB_SET_FILE_UNIX_BASIC);
5906 pSMB->Reserved4 = 0;
5907 inc_rfc1001_len(pSMB, byte_count);
5908 pSMB->ByteCount = cpu_to_le16(byte_count);
5910 cifs_fill_unix_set_info((FILE_UNIX_BASIC_INFO *)data_offset, args);
5912 rc = SendReceiveNoRsp(xid, tcon->ses, (char *) pSMB, 0);
5914 cFYI(1, "Send error in Set Time (SetFileInfo) = %d", rc);
5916 /* Note: On -EAGAIN error only caller can retry on handle based calls
5917 since file handle passed in no longer valid */
5923 CIFSSMBUnixSetPathInfo(const unsigned int xid, struct cifs_tcon *tcon,
5924 const char *file_name,
5925 const struct cifs_unix_set_info_args *args,
5926 const struct nls_table *nls_codepage, int remap)
5928 TRANSACTION2_SPI_REQ *pSMB = NULL;
5929 TRANSACTION2_SPI_RSP *pSMBr = NULL;
5932 int bytes_returned = 0;
5933 FILE_UNIX_BASIC_INFO *data_offset;
5934 __u16 params, param_offset, offset, count, byte_count;
5936 cFYI(1, "In SetUID/GID/Mode");
5938 rc = smb_init(SMB_COM_TRANSACTION2, 15, tcon, (void **) &pSMB,
5943 if (pSMB->hdr.Flags2 & SMBFLG2_UNICODE) {
5945 cifsConvertToUTF16((__le16 *) pSMB->FileName, file_name,
5946 PATH_MAX, nls_codepage, remap);
5947 name_len++; /* trailing null */
5949 } else { /* BB improve the check for buffer overruns BB */
5950 name_len = strnlen(file_name, PATH_MAX);
5951 name_len++; /* trailing null */
5952 strncpy(pSMB->FileName, file_name, name_len);
5955 params = 6 + name_len;
5956 count = sizeof(FILE_UNIX_BASIC_INFO);
5957 pSMB->MaxParameterCount = cpu_to_le16(2);
5958 /* BB find max SMB PDU from sess structure BB */
5959 pSMB->MaxDataCount = cpu_to_le16(1000);
5960 pSMB->MaxSetupCount = 0;
5964 pSMB->Reserved2 = 0;
5965 param_offset = offsetof(struct smb_com_transaction2_spi_req,
5966 InformationLevel) - 4;
5967 offset = param_offset + params;
5969 (FILE_UNIX_BASIC_INFO *) ((char *) &pSMB->hdr.Protocol +
5971 memset(data_offset, 0, count);
5972 pSMB->DataOffset = cpu_to_le16(offset);
5973 pSMB->ParameterOffset = cpu_to_le16(param_offset);
5974 pSMB->SetupCount = 1;
5975 pSMB->Reserved3 = 0;
5976 pSMB->SubCommand = cpu_to_le16(TRANS2_SET_PATH_INFORMATION);
5977 byte_count = 3 /* pad */ + params + count;
5978 pSMB->ParameterCount = cpu_to_le16(params);
5979 pSMB->DataCount = cpu_to_le16(count);
5980 pSMB->TotalParameterCount = pSMB->ParameterCount;
5981 pSMB->TotalDataCount = pSMB->DataCount;
5982 pSMB->InformationLevel = cpu_to_le16(SMB_SET_FILE_UNIX_BASIC);
5983 pSMB->Reserved4 = 0;
5984 inc_rfc1001_len(pSMB, byte_count);
5986 cifs_fill_unix_set_info(data_offset, args);
5988 pSMB->ByteCount = cpu_to_le16(byte_count);
5989 rc = SendReceive(xid, tcon->ses, (struct smb_hdr *) pSMB,
5990 (struct smb_hdr *) pSMBr, &bytes_returned, 0);
5992 cFYI(1, "SetPathInfo (perms) returned %d", rc);
5994 cifs_buf_release(pSMB);
6000 #ifdef CONFIG_CIFS_XATTR
6002 * Do a path-based QUERY_ALL_EAS call and parse the result. This is a common
6003 * function used by listxattr and getxattr type calls. When ea_name is set,
6004 * it looks for that attribute name and stuffs that value into the EAData
6005 * buffer. When ea_name is NULL, it stuffs a list of attribute names into the
6006 * buffer. In both cases, the return value is either the length of the
6007 * resulting data or a negative error code. If EAData is a NULL pointer then
6008 * the data isn't copied to it, but the length is returned.
6011 CIFSSMBQAllEAs(const unsigned int xid, struct cifs_tcon *tcon,
6012 const unsigned char *searchName, const unsigned char *ea_name,
6013 char *EAData, size_t buf_size,
6014 const struct nls_table *nls_codepage, int remap)
6016 /* BB assumes one setup word */
6017 TRANSACTION2_QPI_REQ *pSMB = NULL;
6018 TRANSACTION2_QPI_RSP *pSMBr = NULL;
6022 struct fealist *ea_response_data;
6023 struct fea *temp_fea;
6026 __u16 params, byte_count, data_offset;
6027 unsigned int ea_name_len = ea_name ? strlen(ea_name) : 0;
6029 cFYI(1, "In Query All EAs path %s", searchName);
6031 rc = smb_init(SMB_COM_TRANSACTION2, 15, tcon, (void **) &pSMB,
6036 if (pSMB->hdr.Flags2 & SMBFLG2_UNICODE) {
6038 cifsConvertToUTF16((__le16 *) pSMB->FileName, searchName,
6039 PATH_MAX, nls_codepage, remap);
6040 list_len++; /* trailing null */
6042 } else { /* BB improve the check for buffer overruns BB */
6043 list_len = strnlen(searchName, PATH_MAX);
6044 list_len++; /* trailing null */
6045 strncpy(pSMB->FileName, searchName, list_len);
6048 params = 2 /* level */ + 4 /* reserved */ + list_len /* includes NUL */;
6049 pSMB->TotalDataCount = 0;
6050 pSMB->MaxParameterCount = cpu_to_le16(2);
6051 /* BB find exact max SMB PDU from sess structure BB */
6052 pSMB->MaxDataCount = cpu_to_le16(CIFSMaxBufSize);
6053 pSMB->MaxSetupCount = 0;
6057 pSMB->Reserved2 = 0;
6058 pSMB->ParameterOffset = cpu_to_le16(offsetof(
6059 struct smb_com_transaction2_qpi_req, InformationLevel) - 4);
6060 pSMB->DataCount = 0;
6061 pSMB->DataOffset = 0;
6062 pSMB->SetupCount = 1;
6063 pSMB->Reserved3 = 0;
6064 pSMB->SubCommand = cpu_to_le16(TRANS2_QUERY_PATH_INFORMATION);
6065 byte_count = params + 1 /* pad */ ;
6066 pSMB->TotalParameterCount = cpu_to_le16(params);
6067 pSMB->ParameterCount = pSMB->TotalParameterCount;
6068 pSMB->InformationLevel = cpu_to_le16(SMB_INFO_QUERY_ALL_EAS);
6069 pSMB->Reserved4 = 0;
6070 inc_rfc1001_len(pSMB, byte_count);
6071 pSMB->ByteCount = cpu_to_le16(byte_count);
6073 rc = SendReceive(xid, tcon->ses, (struct smb_hdr *) pSMB,
6074 (struct smb_hdr *) pSMBr, &bytes_returned, 0);
6076 cFYI(1, "Send error in QueryAllEAs = %d", rc);
6081 /* BB also check enough total bytes returned */
6082 /* BB we need to improve the validity checking
6083 of these trans2 responses */
6085 rc = validate_t2((struct smb_t2_rsp *)pSMBr);
6086 if (rc || get_bcc(&pSMBr->hdr) < 4) {
6087 rc = -EIO; /* bad smb */
6091 /* check that length of list is not more than bcc */
6092 /* check that each entry does not go beyond length
6094 /* check that each element of each entry does not
6095 go beyond end of list */
6096 /* validate_trans2_offsets() */
6097 /* BB check if start of smb + data_offset > &bcc+ bcc */
6099 data_offset = le16_to_cpu(pSMBr->t2.DataOffset);
6100 ea_response_data = (struct fealist *)
6101 (((char *) &pSMBr->hdr.Protocol) + data_offset);
6103 list_len = le32_to_cpu(ea_response_data->list_len);
6104 cFYI(1, "ea length %d", list_len);
6105 if (list_len <= 8) {
6106 cFYI(1, "empty EA list returned from server");
6110 /* make sure list_len doesn't go past end of SMB */
6111 end_of_smb = (char *)pByteArea(&pSMBr->hdr) + get_bcc(&pSMBr->hdr);
6112 if ((char *)ea_response_data + list_len > end_of_smb) {
6113 cFYI(1, "EA list appears to go beyond SMB");
6118 /* account for ea list len */
6120 temp_fea = ea_response_data->list;
6121 temp_ptr = (char *)temp_fea;
6122 while (list_len > 0) {
6123 unsigned int name_len;
6128 /* make sure we can read name_len and value_len */
6130 cFYI(1, "EA entry goes beyond length of list");
6135 name_len = temp_fea->name_len;
6136 value_len = le16_to_cpu(temp_fea->value_len);
6137 list_len -= name_len + 1 + value_len;
6139 cFYI(1, "EA entry goes beyond length of list");
6145 if (ea_name_len == name_len &&
6146 memcmp(ea_name, temp_ptr, name_len) == 0) {
6147 temp_ptr += name_len + 1;
6151 if ((size_t)value_len > buf_size) {
6155 memcpy(EAData, temp_ptr, value_len);
6159 /* account for prefix user. and trailing null */
6160 rc += (5 + 1 + name_len);
6161 if (rc < (int) buf_size) {
6162 memcpy(EAData, "user.", 5);
6164 memcpy(EAData, temp_ptr, name_len);
6166 /* null terminate name */
6169 } else if (buf_size == 0) {
6170 /* skip copy - calc size only */
6172 /* stop before overrun buffer */
6177 temp_ptr += name_len + 1 + value_len;
6178 temp_fea = (struct fea *)temp_ptr;
6181 /* didn't find the named attribute */
6186 cifs_buf_release(pSMB);
6194 CIFSSMBSetEA(const unsigned int xid, struct cifs_tcon *tcon,
6195 const char *fileName, const char *ea_name, const void *ea_value,
6196 const __u16 ea_value_len, const struct nls_table *nls_codepage,
6199 struct smb_com_transaction2_spi_req *pSMB = NULL;
6200 struct smb_com_transaction2_spi_rsp *pSMBr = NULL;
6201 struct fealist *parm_data;
6204 int bytes_returned = 0;
6205 __u16 params, param_offset, byte_count, offset, count;
6207 cFYI(1, "In SetEA");
6209 rc = smb_init(SMB_COM_TRANSACTION2, 15, tcon, (void **) &pSMB,
6214 if (pSMB->hdr.Flags2 & SMBFLG2_UNICODE) {
6216 cifsConvertToUTF16((__le16 *) pSMB->FileName, fileName,
6217 PATH_MAX, nls_codepage, remap);
6218 name_len++; /* trailing null */
6220 } else { /* BB improve the check for buffer overruns BB */
6221 name_len = strnlen(fileName, PATH_MAX);
6222 name_len++; /* trailing null */
6223 strncpy(pSMB->FileName, fileName, name_len);
6226 params = 6 + name_len;
6228 /* done calculating parms using name_len of file name,
6229 now use name_len to calculate length of ea name
6230 we are going to create in the inode xattrs */
6231 if (ea_name == NULL)
6234 name_len = strnlen(ea_name, 255);
6236 count = sizeof(*parm_data) + ea_value_len + name_len;
6237 pSMB->MaxParameterCount = cpu_to_le16(2);
6238 /* BB find max SMB PDU from sess */
6239 pSMB->MaxDataCount = cpu_to_le16(1000);
6240 pSMB->MaxSetupCount = 0;
6244 pSMB->Reserved2 = 0;
6245 param_offset = offsetof(struct smb_com_transaction2_spi_req,
6246 InformationLevel) - 4;
6247 offset = param_offset + params;
6248 pSMB->InformationLevel =
6249 cpu_to_le16(SMB_SET_FILE_EA);
6252 (struct fealist *) (((char *) &pSMB->hdr.Protocol) +
6254 pSMB->ParameterOffset = cpu_to_le16(param_offset);
6255 pSMB->DataOffset = cpu_to_le16(offset);
6256 pSMB->SetupCount = 1;
6257 pSMB->Reserved3 = 0;
6258 pSMB->SubCommand = cpu_to_le16(TRANS2_SET_PATH_INFORMATION);
6259 byte_count = 3 /* pad */ + params + count;
6260 pSMB->DataCount = cpu_to_le16(count);
6261 parm_data->list_len = cpu_to_le32(count);
6262 parm_data->list[0].EA_flags = 0;
6263 /* we checked above that name len is less than 255 */
6264 parm_data->list[0].name_len = (__u8)name_len;
6265 /* EA names are always ASCII */
6267 strncpy(parm_data->list[0].name, ea_name, name_len);
6268 parm_data->list[0].name[name_len] = 0;
6269 parm_data->list[0].value_len = cpu_to_le16(ea_value_len);
6270 /* caller ensures that ea_value_len is less than 64K but
6271 we need to ensure that it fits within the smb */
6273 /*BB add length check to see if it would fit in
6274 negotiated SMB buffer size BB */
6275 /* if (ea_value_len > buffer_size - 512 (enough for header)) */
6277 memcpy(parm_data->list[0].name+name_len+1,
6278 ea_value, ea_value_len);
6280 pSMB->TotalDataCount = pSMB->DataCount;
6281 pSMB->ParameterCount = cpu_to_le16(params);
6282 pSMB->TotalParameterCount = pSMB->ParameterCount;
6283 pSMB->Reserved4 = 0;
6284 inc_rfc1001_len(pSMB, byte_count);
6285 pSMB->ByteCount = cpu_to_le16(byte_count);
6286 rc = SendReceive(xid, tcon->ses, (struct smb_hdr *) pSMB,
6287 (struct smb_hdr *) pSMBr, &bytes_returned, 0);
6289 cFYI(1, "SetPathInfo (EA) returned %d", rc);
6291 cifs_buf_release(pSMB);
6300 #ifdef CONFIG_CIFS_DNOTIFY_EXPERIMENTAL /* BB unused temporarily */
6302 * Years ago the kernel added a "dnotify" function for Samba server,
6303 * to allow network clients (such as Windows) to display updated
6304 * lists of files in directory listings automatically when
6305 * files are added by one user when another user has the
6306 * same directory open on their desktop. The Linux cifs kernel
6307 * client hooked into the kernel side of this interface for
6308 * the same reason, but ironically when the VFS moved from
6309 * "dnotify" to "inotify" it became harder to plug in Linux
6310 * network file system clients (the most obvious use case
6311 * for notify interfaces is when multiple users can update
6312 * the contents of the same directory - exactly what network
6313 * file systems can do) although the server (Samba) could
6314 * still use it. For the short term we leave the worker
6315 * function ifdeffed out (below) until inotify is fixed
6316 * in the VFS to make it easier to plug in network file
6317 * system clients. If inotify turns out to be permanently
6318 * incompatible for network fs clients, we could instead simply
6319 * expose this config flag by adding a future cifs (and smb2) notify ioctl.
6321 int CIFSSMBNotify(const unsigned int xid, struct cifs_tcon *tcon,
6322 const int notify_subdirs, const __u16 netfid,
6323 __u32 filter, struct file *pfile, int multishot,
6324 const struct nls_table *nls_codepage)
6327 struct smb_com_transaction_change_notify_req *pSMB = NULL;
6328 struct smb_com_ntransaction_change_notify_rsp *pSMBr = NULL;
6329 struct dir_notify_req *dnotify_req;
6332 cFYI(1, "In CIFSSMBNotify for file handle %d", (int)netfid);
6333 rc = smb_init(SMB_COM_NT_TRANSACT, 23, tcon, (void **) &pSMB,
6338 pSMB->TotalParameterCount = 0 ;
6339 pSMB->TotalDataCount = 0;
6340 pSMB->MaxParameterCount = cpu_to_le32(2);
6341 pSMB->MaxDataCount = cpu_to_le32(CIFSMaxBufSize & 0xFFFFFF00);
6342 pSMB->MaxSetupCount = 4;
6344 pSMB->ParameterOffset = 0;
6345 pSMB->DataCount = 0;
6346 pSMB->DataOffset = 0;
6347 pSMB->SetupCount = 4; /* single byte does not need le conversion */
6348 pSMB->SubCommand = cpu_to_le16(NT_TRANSACT_NOTIFY_CHANGE);
6349 pSMB->ParameterCount = pSMB->TotalParameterCount;
6351 pSMB->WatchTree = 1; /* one byte - no le conversion needed */
6352 pSMB->Reserved2 = 0;
6353 pSMB->CompletionFilter = cpu_to_le32(filter);
6354 pSMB->Fid = netfid; /* file handle always le */
6355 pSMB->ByteCount = 0;
6357 rc = SendReceive(xid, tcon->ses, (struct smb_hdr *) pSMB,
6358 (struct smb_hdr *)pSMBr, &bytes_returned,
6361 cFYI(1, "Error in Notify = %d", rc);
6363 /* Add file to outstanding requests */
6364 /* BB change to kmem cache alloc */
6365 dnotify_req = kmalloc(
6366 sizeof(struct dir_notify_req),
6369 dnotify_req->Pid = pSMB->hdr.Pid;
6370 dnotify_req->PidHigh = pSMB->hdr.PidHigh;
6371 dnotify_req->Mid = pSMB->hdr.Mid;
6372 dnotify_req->Tid = pSMB->hdr.Tid;
6373 dnotify_req->Uid = pSMB->hdr.Uid;
6374 dnotify_req->netfid = netfid;
6375 dnotify_req->pfile = pfile;
6376 dnotify_req->filter = filter;
6377 dnotify_req->multishot = multishot;
6378 spin_lock(&GlobalMid_Lock);
6379 list_add_tail(&dnotify_req->lhead,
6380 &GlobalDnotifyReqList);
6381 spin_unlock(&GlobalMid_Lock);
6385 cifs_buf_release(pSMB);
6388 #endif /* was needed for dnotify, and will be needed for inotify when VFS fix */