CIFS: Move trans2 processing to ops struct
[deliverable/linux.git] / fs / cifs / cifssmb.c
CommitLineData
1da177e4
LT
1/*
2 * fs/cifs/cifssmb.c
3 *
f19159dc 4 * Copyright (C) International Business Machines Corp., 2002,2010
1da177e4
LT
5 * Author(s): Steve French (sfrench@us.ibm.com)
6 *
7 * Contains the routines for constructing the SMB PDUs themselves
8 *
9 * This library is free software; you can redistribute it and/or modify
10 * it under the terms of the GNU Lesser General Public License as published
11 * by the Free Software Foundation; either version 2.1 of the License, or
12 * (at your option) any later version.
13 *
14 * This library is distributed in the hope that it will be useful,
15 * but WITHOUT ANY WARRANTY; without even the implied warranty of
16 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See
17 * the GNU Lesser General Public License for more details.
18 *
19 * You should have received a copy of the GNU Lesser General Public License
20 * along with this library; if not, write to the Free Software
21 * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
22 */
23
24 /* SMB/CIFS PDU handling routines here - except for leftovers in connect.c */
25 /* These are mostly routines that operate on a pathname, or on a tree id */
26 /* (mounted volume), but there are eight handle based routines which must be */
2dd29d31
SF
27 /* treated slightly differently for reconnection purposes since we never */
28 /* want to reuse a stale file handle and only the caller knows the file info */
1da177e4
LT
29
30#include <linux/fs.h>
31#include <linux/kernel.h>
32#include <linux/vfs.h>
5a0e3ad6 33#include <linux/slab.h>
1da177e4 34#include <linux/posix_acl_xattr.h>
c28c89fc 35#include <linux/pagemap.h>
e28bc5b1
JL
36#include <linux/swap.h>
37#include <linux/task_io_accounting_ops.h>
1da177e4
LT
38#include <asm/uaccess.h>
39#include "cifspdu.h"
40#include "cifsglob.h"
d0d66c44 41#include "cifsacl.h"
1da177e4
LT
42#include "cifsproto.h"
43#include "cifs_unicode.h"
44#include "cifs_debug.h"
e28bc5b1 45#include "fscache.h"
1da177e4
LT
46
47#ifdef CONFIG_CIFS_POSIX
48static struct {
49 int index;
50 char *name;
51} protocols[] = {
3979877e
SF
52#ifdef CONFIG_CIFS_WEAK_PW_HASH
53 {LANMAN_PROT, "\2LM1.2X002"},
9ac00b7d 54 {LANMAN2_PROT, "\2LANMAN2.1"},
3979877e 55#endif /* weak password hashing for legacy clients */
50c2f753 56 {CIFS_PROT, "\2NT LM 0.12"},
3979877e 57 {POSIX_PROT, "\2POSIX 2"},
1da177e4
LT
58 {BAD_PROT, "\2"}
59};
60#else
61static struct {
62 int index;
63 char *name;
64} protocols[] = {
3979877e
SF
65#ifdef CONFIG_CIFS_WEAK_PW_HASH
66 {LANMAN_PROT, "\2LM1.2X002"},
18f75ca0 67 {LANMAN2_PROT, "\2LANMAN2.1"},
3979877e 68#endif /* weak password hashing for legacy clients */
790fe579 69 {CIFS_PROT, "\2NT LM 0.12"},
1da177e4
LT
70 {BAD_PROT, "\2"}
71};
72#endif
73
3979877e
SF
74/* define the number of elements in the cifs dialect array */
75#ifdef CONFIG_CIFS_POSIX
76#ifdef CONFIG_CIFS_WEAK_PW_HASH
9ac00b7d 77#define CIFS_NUM_PROT 4
3979877e
SF
78#else
79#define CIFS_NUM_PROT 2
80#endif /* CIFS_WEAK_PW_HASH */
81#else /* not posix */
82#ifdef CONFIG_CIFS_WEAK_PW_HASH
9ac00b7d 83#define CIFS_NUM_PROT 3
3979877e
SF
84#else
85#define CIFS_NUM_PROT 1
86#endif /* CONFIG_CIFS_WEAK_PW_HASH */
87#endif /* CIFS_POSIX */
88
3cf003c0
JL
89#ifdef CONFIG_HIGHMEM
90/*
91 * On arches that have high memory, kmap address space is limited. By
92 * serializing the kmap operations on those arches, we ensure that we don't
93 * end up with a bunch of threads in writeback with partially mapped page
94 * arrays, stuck waiting for kmap to come back. That situation prevents
95 * progress and can deadlock.
96 */
97static DEFINE_MUTEX(cifs_kmap_mutex);
98
99static inline void
100cifs_kmap_lock(void)
101{
102 mutex_lock(&cifs_kmap_mutex);
103}
104
105static inline void
106cifs_kmap_unlock(void)
107{
108 mutex_unlock(&cifs_kmap_mutex);
109}
110#else /* !CONFIG_HIGHMEM */
111#define cifs_kmap_lock() do { ; } while(0)
112#define cifs_kmap_unlock() do { ; } while(0)
113#endif /* CONFIG_HIGHMEM */
e28bc5b1 114
1da177e4
LT
115/* Mark as invalid, all open files on tree connections since they
116 were closed when session to server was lost */
96daf2b0 117static void mark_open_files_invalid(struct cifs_tcon *pTcon)
1da177e4
LT
118{
119 struct cifsFileInfo *open_file = NULL;
790fe579
SF
120 struct list_head *tmp;
121 struct list_head *tmp1;
1da177e4
LT
122
123/* list all files open on tree connection and mark them invalid */
4477288a 124 spin_lock(&cifs_file_list_lock);
1da177e4 125 list_for_each_safe(tmp, tmp1, &pTcon->openFileList) {
790fe579 126 open_file = list_entry(tmp, struct cifsFileInfo, tlist);
ad8b15f0 127 open_file->invalidHandle = true;
3bc303c2 128 open_file->oplock_break_cancelled = true;
1da177e4 129 }
4477288a 130 spin_unlock(&cifs_file_list_lock);
09d1db5c
SF
131 /* BB Add call to invalidate_inodes(sb) for all superblocks mounted
132 to this tcon */
1da177e4
LT
133}
134
9162ab20
JL
135/* reconnect the socket, tcon, and smb session if needed */
136static int
96daf2b0 137cifs_reconnect_tcon(struct cifs_tcon *tcon, int smb_command)
9162ab20 138{
c4a5534a 139 int rc;
96daf2b0 140 struct cifs_ses *ses;
9162ab20
JL
141 struct TCP_Server_Info *server;
142 struct nls_table *nls_codepage;
143
144 /*
145 * SMBs NegProt, SessSetup, uLogoff do not have tcon yet so check for
146 * tcp and smb session status done differently for those three - in the
147 * calling routine
148 */
149 if (!tcon)
150 return 0;
151
152 ses = tcon->ses;
153 server = ses->server;
154
155 /*
156 * only tree disconnect, open, and write, (and ulogoff which does not
157 * have tcon) are allowed as we start force umount
158 */
159 if (tcon->tidStatus == CifsExiting) {
160 if (smb_command != SMB_COM_WRITE_ANDX &&
161 smb_command != SMB_COM_OPEN_ANDX &&
162 smb_command != SMB_COM_TREE_DISCONNECT) {
b6b38f70
JP
163 cFYI(1, "can not send cmd %d while umounting",
164 smb_command);
9162ab20
JL
165 return -ENODEV;
166 }
167 }
168
9162ab20
JL
169 /*
170 * Give demultiplex thread up to 10 seconds to reconnect, should be
171 * greater than cifs socket timeout which is 7 seconds
172 */
173 while (server->tcpStatus == CifsNeedReconnect) {
174 wait_event_interruptible_timeout(server->response_q,
fd88ce93 175 (server->tcpStatus != CifsNeedReconnect), 10 * HZ);
9162ab20 176
fd88ce93 177 /* are we still trying to reconnect? */
9162ab20
JL
178 if (server->tcpStatus != CifsNeedReconnect)
179 break;
180
181 /*
182 * on "soft" mounts we wait once. Hard mounts keep
183 * retrying until process is killed or server comes
184 * back on-line
185 */
d402539b 186 if (!tcon->retry) {
b6b38f70 187 cFYI(1, "gave up waiting on reconnect in smb_init");
9162ab20
JL
188 return -EHOSTDOWN;
189 }
190 }
191
192 if (!ses->need_reconnect && !tcon->need_reconnect)
193 return 0;
194
195 nls_codepage = load_nls_default();
196
197 /*
198 * need to prevent multiple threads trying to simultaneously
199 * reconnect the same SMB session
200 */
d7b619cf 201 mutex_lock(&ses->session_mutex);
198b5682
JL
202 rc = cifs_negotiate_protocol(0, ses);
203 if (rc == 0 && ses->need_reconnect)
9162ab20
JL
204 rc = cifs_setup_session(0, ses, nls_codepage);
205
206 /* do we need to reconnect tcon? */
207 if (rc || !tcon->need_reconnect) {
d7b619cf 208 mutex_unlock(&ses->session_mutex);
9162ab20
JL
209 goto out;
210 }
211
212 mark_open_files_invalid(tcon);
213 rc = CIFSTCon(0, ses, tcon->treeName, tcon, nls_codepage);
d7b619cf 214 mutex_unlock(&ses->session_mutex);
b6b38f70 215 cFYI(1, "reconnect tcon rc = %d", rc);
9162ab20
JL
216
217 if (rc)
218 goto out;
219
220 /*
221 * FIXME: check if wsize needs updated due to negotiated smb buffer
222 * size shrinking
223 */
224 atomic_inc(&tconInfoReconnectCount);
225
226 /* tell server Unix caps we support */
227 if (ses->capabilities & CAP_UNIX)
228 reset_cifs_unix_caps(0, tcon, NULL, NULL);
229
230 /*
231 * Removed call to reopen open files here. It is safer (and faster) to
232 * reopen files one at a time as needed in read and write.
233 *
234 * FIXME: what about file locks? don't we need to reclaim them ASAP?
235 */
236
237out:
238 /*
239 * Check if handle based operation so we know whether we can continue
240 * or not without returning to caller to reset file handle
241 */
242 switch (smb_command) {
243 case SMB_COM_READ_ANDX:
244 case SMB_COM_WRITE_ANDX:
245 case SMB_COM_CLOSE:
246 case SMB_COM_FIND_CLOSE2:
247 case SMB_COM_LOCKING_ANDX:
248 rc = -EAGAIN;
249 }
250
251 unload_nls(nls_codepage);
252 return rc;
253}
254
ad7a2926
SF
255/* Allocate and return pointer to an SMB request buffer, and set basic
256 SMB information in the SMB header. If the return code is zero, this
257 function must have filled in request_buf pointer */
1da177e4 258static int
96daf2b0 259small_smb_init(int smb_command, int wct, struct cifs_tcon *tcon,
ad7a2926 260 void **request_buf)
1da177e4 261{
f569599a 262 int rc;
1da177e4 263
9162ab20 264 rc = cifs_reconnect_tcon(tcon, smb_command);
790fe579 265 if (rc)
1da177e4
LT
266 return rc;
267
268 *request_buf = cifs_small_buf_get();
269 if (*request_buf == NULL) {
270 /* BB should we add a retry in here if not a writepage? */
271 return -ENOMEM;
272 }
273
63135e08 274 header_assemble((struct smb_hdr *) *request_buf, smb_command,
c18c842b 275 tcon, wct);
1da177e4 276
790fe579
SF
277 if (tcon != NULL)
278 cifs_stats_inc(&tcon->num_smbs_sent);
a4544347 279
f569599a 280 return 0;
5815449d
SF
281}
282
12b3b8ff 283int
50c2f753 284small_smb_init_no_tc(const int smb_command, const int wct,
96daf2b0 285 struct cifs_ses *ses, void **request_buf)
12b3b8ff
SF
286{
287 int rc;
50c2f753 288 struct smb_hdr *buffer;
12b3b8ff 289
5815449d 290 rc = small_smb_init(smb_command, wct, NULL, request_buf);
790fe579 291 if (rc)
12b3b8ff
SF
292 return rc;
293
04fdabe1 294 buffer = (struct smb_hdr *)*request_buf;
88257360 295 buffer->Mid = get_next_mid(ses->server);
12b3b8ff
SF
296 if (ses->capabilities & CAP_UNICODE)
297 buffer->Flags2 |= SMBFLG2_UNICODE;
04fdabe1 298 if (ses->capabilities & CAP_STATUS32)
12b3b8ff
SF
299 buffer->Flags2 |= SMBFLG2_ERR_STATUS;
300
301 /* uid, tid can stay at zero as set in header assemble */
302
50c2f753 303 /* BB add support for turning on the signing when
12b3b8ff
SF
304 this function is used after 1st of session setup requests */
305
306 return rc;
307}
1da177e4
LT
308
309/* If the return code is zero, this function must fill in request_buf pointer */
310static int
96daf2b0 311__smb_init(int smb_command, int wct, struct cifs_tcon *tcon,
f569599a 312 void **request_buf, void **response_buf)
1da177e4 313{
1da177e4
LT
314 *request_buf = cifs_buf_get();
315 if (*request_buf == NULL) {
316 /* BB should we add a retry in here if not a writepage? */
317 return -ENOMEM;
318 }
319 /* Although the original thought was we needed the response buf for */
320 /* potential retries of smb operations it turns out we can determine */
321 /* from the mid flags when the request buffer can be resent without */
322 /* having to use a second distinct buffer for the response */
790fe579 323 if (response_buf)
50c2f753 324 *response_buf = *request_buf;
1da177e4
LT
325
326 header_assemble((struct smb_hdr *) *request_buf, smb_command, tcon,
ad7a2926 327 wct);
1da177e4 328
790fe579
SF
329 if (tcon != NULL)
330 cifs_stats_inc(&tcon->num_smbs_sent);
a4544347 331
f569599a
JL
332 return 0;
333}
334
335/* If the return code is zero, this function must fill in request_buf pointer */
336static int
96daf2b0 337smb_init(int smb_command, int wct, struct cifs_tcon *tcon,
f569599a
JL
338 void **request_buf, void **response_buf)
339{
340 int rc;
341
342 rc = cifs_reconnect_tcon(tcon, smb_command);
343 if (rc)
344 return rc;
345
346 return __smb_init(smb_command, wct, tcon, request_buf, response_buf);
347}
348
349static int
96daf2b0 350smb_init_no_reconnect(int smb_command, int wct, struct cifs_tcon *tcon,
f569599a
JL
351 void **request_buf, void **response_buf)
352{
353 if (tcon->ses->need_reconnect || tcon->need_reconnect)
354 return -EHOSTDOWN;
355
356 return __smb_init(smb_command, wct, tcon, request_buf, response_buf);
1da177e4
LT
357}
358
50c2f753 359static int validate_t2(struct smb_t2_rsp *pSMB)
1da177e4 360{
12df83c9
JL
361 unsigned int total_size;
362
363 /* check for plausible wct */
364 if (pSMB->hdr.WordCount < 10)
365 goto vt2_err;
1da177e4 366
1da177e4 367 /* check for parm and data offset going beyond end of smb */
12df83c9
JL
368 if (get_unaligned_le16(&pSMB->t2_rsp.ParameterOffset) > 1024 ||
369 get_unaligned_le16(&pSMB->t2_rsp.DataOffset) > 1024)
370 goto vt2_err;
371
12df83c9
JL
372 total_size = get_unaligned_le16(&pSMB->t2_rsp.ParameterCount);
373 if (total_size >= 512)
374 goto vt2_err;
375
fd5707e1
JL
376 /* check that bcc is at least as big as parms + data, and that it is
377 * less than negotiated smb buffer
378 */
12df83c9
JL
379 total_size += get_unaligned_le16(&pSMB->t2_rsp.DataCount);
380 if (total_size > get_bcc(&pSMB->hdr) ||
381 total_size >= CIFSMaxBufSize + MAX_CIFS_HDR_SIZE)
382 goto vt2_err;
383
384 return 0;
385vt2_err:
50c2f753 386 cifs_dump_mem("Invalid transact2 SMB: ", (char *)pSMB,
1da177e4 387 sizeof(struct smb_t2_rsp) + 16);
12df83c9 388 return -EINVAL;
1da177e4 389}
690c522f 390
be8e3b00
SF
391static inline void inc_rfc1001_len(void *pSMB, int count)
392{
393 struct smb_hdr *hdr = (struct smb_hdr *)pSMB;
394
395 be32_add_cpu(&hdr->smb_buf_length, count);
396}
397
1da177e4 398int
96daf2b0 399CIFSSMBNegotiate(unsigned int xid, struct cifs_ses *ses)
1da177e4
LT
400{
401 NEGOTIATE_REQ *pSMB;
402 NEGOTIATE_RSP *pSMBr;
403 int rc = 0;
404 int bytes_returned;
3979877e 405 int i;
50c2f753 406 struct TCP_Server_Info *server;
1da177e4 407 u16 count;
750d1151 408 unsigned int secFlags;
1da177e4 409
790fe579 410 if (ses->server)
1da177e4
LT
411 server = ses->server;
412 else {
413 rc = -EIO;
414 return rc;
415 }
416 rc = smb_init(SMB_COM_NEGOTIATE, 0, NULL /* no tcon yet */ ,
417 (void **) &pSMB, (void **) &pSMBr);
418 if (rc)
419 return rc;
750d1151
SF
420
421 /* if any of auth flags (ie not sign or seal) are overriden use them */
790fe579 422 if (ses->overrideSecFlg & (~(CIFSSEC_MUST_SIGN | CIFSSEC_MUST_SEAL)))
762e5ab7 423 secFlags = ses->overrideSecFlg; /* BB FIXME fix sign flags? */
750d1151 424 else /* if override flags set only sign/seal OR them with global auth */
04912d6a 425 secFlags = global_secflags | ses->overrideSecFlg;
750d1151 426
b6b38f70 427 cFYI(1, "secFlags 0x%x", secFlags);
f40c5628 428
88257360 429 pSMB->hdr.Mid = get_next_mid(server);
100c1ddc 430 pSMB->hdr.Flags2 |= (SMBFLG2_UNICODE | SMBFLG2_ERR_STATUS);
a013689d 431
100c1ddc 432 if ((secFlags & CIFSSEC_MUST_KRB5) == CIFSSEC_MUST_KRB5)
254e55ed 433 pSMB->hdr.Flags2 |= SMBFLG2_EXT_SEC;
a013689d 434 else if ((secFlags & CIFSSEC_AUTH_MASK) == CIFSSEC_MAY_KRB5) {
b6b38f70 435 cFYI(1, "Kerberos only mechanism, enable extended security");
a013689d 436 pSMB->hdr.Flags2 |= SMBFLG2_EXT_SEC;
b4d6fcf1 437 } else if ((secFlags & CIFSSEC_MUST_NTLMSSP) == CIFSSEC_MUST_NTLMSSP)
ac683924
SF
438 pSMB->hdr.Flags2 |= SMBFLG2_EXT_SEC;
439 else if ((secFlags & CIFSSEC_AUTH_MASK) == CIFSSEC_MAY_NTLMSSP) {
b6b38f70 440 cFYI(1, "NTLMSSP only mechanism, enable extended security");
ac683924
SF
441 pSMB->hdr.Flags2 |= SMBFLG2_EXT_SEC;
442 }
50c2f753 443
3979877e 444 count = 0;
50c2f753 445 for (i = 0; i < CIFS_NUM_PROT; i++) {
3979877e
SF
446 strncpy(pSMB->DialectsArray+count, protocols[i].name, 16);
447 count += strlen(protocols[i].name) + 1;
448 /* null at end of source and target buffers anyway */
449 }
be8e3b00 450 inc_rfc1001_len(pSMB, count);
1da177e4
LT
451 pSMB->ByteCount = cpu_to_le16(count);
452
453 rc = SendReceive(xid, ses, (struct smb_hdr *) pSMB,
454 (struct smb_hdr *) pSMBr, &bytes_returned, 0);
50c2f753 455 if (rc != 0)
254e55ed
SF
456 goto neg_err_exit;
457
9bf67e51
JL
458 server->dialect = le16_to_cpu(pSMBr->DialectIndex);
459 cFYI(1, "Dialect: %d", server->dialect);
254e55ed 460 /* Check wct = 1 error case */
9bf67e51 461 if ((pSMBr->hdr.WordCount < 13) || (server->dialect == BAD_PROT)) {
254e55ed 462 /* core returns wct = 1, but we do not ask for core - otherwise
50c2f753 463 small wct just comes when dialect index is -1 indicating we
254e55ed
SF
464 could not negotiate a common dialect */
465 rc = -EOPNOTSUPP;
466 goto neg_err_exit;
50c2f753 467#ifdef CONFIG_CIFS_WEAK_PW_HASH
790fe579 468 } else if ((pSMBr->hdr.WordCount == 13)
9bf67e51
JL
469 && ((server->dialect == LANMAN_PROT)
470 || (server->dialect == LANMAN2_PROT))) {
b815f1e5 471 __s16 tmp;
50c2f753 472 struct lanman_neg_rsp *rsp = (struct lanman_neg_rsp *)pSMBr;
254e55ed 473
790fe579 474 if ((secFlags & CIFSSEC_MAY_LANMAN) ||
750d1151 475 (secFlags & CIFSSEC_MAY_PLNTXT))
254e55ed
SF
476 server->secType = LANMAN;
477 else {
b6b38f70
JP
478 cERROR(1, "mount failed weak security disabled"
479 " in /proc/fs/cifs/SecurityFlags");
3979877e
SF
480 rc = -EOPNOTSUPP;
481 goto neg_err_exit;
50c2f753 482 }
96daf2b0 483 server->sec_mode = (__u8)le16_to_cpu(rsp->SecurityMode);
10b9b98e
PS
484 server->maxReq = min_t(unsigned int,
485 le16_to_cpu(rsp->MaxMpxCount),
486 cifs_max_pending);
45275789 487 set_credits(server, server->maxReq);
c974befa 488 server->maxBuf = le16_to_cpu(rsp->MaxBufSize);
eca6acf9 489 server->max_vcs = le16_to_cpu(rsp->MaxNumberVcs);
254e55ed
SF
490 /* even though we do not use raw we might as well set this
491 accurately, in case we ever find a need for it */
790fe579 492 if ((le16_to_cpu(rsp->RawMode) & RAW_ENABLE) == RAW_ENABLE) {
eca6acf9 493 server->max_rw = 0xFF00;
254e55ed
SF
494 server->capabilities = CAP_MPX_MODE | CAP_RAW_MODE;
495 } else {
eca6acf9 496 server->max_rw = 0;/* do not need to use raw anyway */
254e55ed
SF
497 server->capabilities = CAP_MPX_MODE;
498 }
b815f1e5 499 tmp = (__s16)le16_to_cpu(rsp->ServerTimeZone);
1a70d652 500 if (tmp == -1) {
25ee4a98
SF
501 /* OS/2 often does not set timezone therefore
502 * we must use server time to calc time zone.
b815f1e5
SF
503 * Could deviate slightly from the right zone.
504 * Smallest defined timezone difference is 15 minutes
505 * (i.e. Nepal). Rounding up/down is done to match
506 * this requirement.
25ee4a98 507 */
b815f1e5 508 int val, seconds, remain, result;
25ee4a98
SF
509 struct timespec ts, utc;
510 utc = CURRENT_TIME;
c4a2c08d
JL
511 ts = cnvrtDosUnixTm(rsp->SrvTime.Date,
512 rsp->SrvTime.Time, 0);
b6b38f70 513 cFYI(1, "SrvTime %d sec since 1970 (utc: %d) diff: %d",
50c2f753 514 (int)ts.tv_sec, (int)utc.tv_sec,
b6b38f70 515 (int)(utc.tv_sec - ts.tv_sec));
b815f1e5 516 val = (int)(utc.tv_sec - ts.tv_sec);
8594c15a 517 seconds = abs(val);
947a5067 518 result = (seconds / MIN_TZ_ADJ) * MIN_TZ_ADJ;
b815f1e5 519 remain = seconds % MIN_TZ_ADJ;
790fe579 520 if (remain >= (MIN_TZ_ADJ / 2))
b815f1e5 521 result += MIN_TZ_ADJ;
790fe579 522 if (val < 0)
ad7a2926 523 result = -result;
b815f1e5 524 server->timeAdj = result;
25ee4a98 525 } else {
b815f1e5
SF
526 server->timeAdj = (int)tmp;
527 server->timeAdj *= 60; /* also in seconds */
25ee4a98 528 }
b6b38f70 529 cFYI(1, "server->timeAdj: %d seconds", server->timeAdj);
25ee4a98 530
3979877e 531
254e55ed 532 /* BB get server time for time conversions and add
50c2f753 533 code to use it and timezone since this is not UTC */
3979877e 534
50c2f753 535 if (rsp->EncryptionKeyLength ==
25ee4a98 536 cpu_to_le16(CIFS_CRYPTO_KEY_SIZE)) {
d3ba50b1 537 memcpy(ses->server->cryptkey, rsp->EncryptionKey,
254e55ed 538 CIFS_CRYPTO_KEY_SIZE);
96daf2b0 539 } else if (server->sec_mode & SECMODE_PW_ENCRYPT) {
254e55ed
SF
540 rc = -EIO; /* need cryptkey unless plain text */
541 goto neg_err_exit;
542 }
3979877e 543
f19159dc 544 cFYI(1, "LANMAN negotiated");
254e55ed
SF
545 /* we will not end up setting signing flags - as no signing
546 was in LANMAN and server did not return the flags on */
547 goto signing_check;
7c7b25bc 548#else /* weak security disabled */
790fe579 549 } else if (pSMBr->hdr.WordCount == 13) {
f19159dc
SF
550 cERROR(1, "mount failed, cifs module not built "
551 "with CIFS_WEAK_PW_HASH support");
8212cf75 552 rc = -EOPNOTSUPP;
7c7b25bc 553#endif /* WEAK_PW_HASH */
254e55ed 554 goto neg_err_exit;
790fe579 555 } else if (pSMBr->hdr.WordCount != 17) {
254e55ed
SF
556 /* unknown wct */
557 rc = -EOPNOTSUPP;
558 goto neg_err_exit;
559 }
560 /* else wct == 17 NTLM */
96daf2b0
SF
561 server->sec_mode = pSMBr->SecurityMode;
562 if ((server->sec_mode & SECMODE_USER) == 0)
b6b38f70 563 cFYI(1, "share mode security");
bdc4bf6e 564
96daf2b0 565 if ((server->sec_mode & SECMODE_PW_ENCRYPT) == 0)
bdc4bf6e 566#ifdef CONFIG_CIFS_WEAK_PW_HASH
750d1151 567 if ((secFlags & CIFSSEC_MAY_PLNTXT) == 0)
bdc4bf6e 568#endif /* CIFS_WEAK_PW_HASH */
b6b38f70
JP
569 cERROR(1, "Server requests plain text password"
570 " but client support disabled");
9312f675 571
790fe579 572 if ((secFlags & CIFSSEC_MUST_NTLMV2) == CIFSSEC_MUST_NTLMV2)
254e55ed 573 server->secType = NTLMv2;
790fe579 574 else if (secFlags & CIFSSEC_MAY_NTLM)
254e55ed 575 server->secType = NTLM;
790fe579 576 else if (secFlags & CIFSSEC_MAY_NTLMV2)
f40c5628 577 server->secType = NTLMv2;
a013689d
SF
578 else if (secFlags & CIFSSEC_MAY_KRB5)
579 server->secType = Kerberos;
ac683924 580 else if (secFlags & CIFSSEC_MAY_NTLMSSP)
f46c7234 581 server->secType = RawNTLMSSP;
a013689d
SF
582 else if (secFlags & CIFSSEC_MAY_LANMAN)
583 server->secType = LANMAN;
a013689d
SF
584 else {
585 rc = -EOPNOTSUPP;
b6b38f70 586 cERROR(1, "Invalid security type");
a013689d
SF
587 goto neg_err_exit;
588 }
589 /* else ... any others ...? */
254e55ed
SF
590
591 /* one byte, so no need to convert this or EncryptionKeyLen from
592 little endian */
10b9b98e
PS
593 server->maxReq = min_t(unsigned int, le16_to_cpu(pSMBr->MaxMpxCount),
594 cifs_max_pending);
45275789 595 set_credits(server, server->maxReq);
254e55ed 596 /* probably no need to store and check maxvcs */
c974befa 597 server->maxBuf = le32_to_cpu(pSMBr->MaxBufferSize);
eca6acf9 598 server->max_rw = le32_to_cpu(pSMBr->MaxRawSize);
b6b38f70 599 cFYI(DBG2, "Max buf = %d", ses->server->maxBuf);
254e55ed 600 server->capabilities = le32_to_cpu(pSMBr->Capabilities);
b815f1e5
SF
601 server->timeAdj = (int)(__s16)le16_to_cpu(pSMBr->ServerTimeZone);
602 server->timeAdj *= 60;
254e55ed 603 if (pSMBr->EncryptionKeyLength == CIFS_CRYPTO_KEY_SIZE) {
d3ba50b1 604 memcpy(ses->server->cryptkey, pSMBr->u.EncryptionKey,
254e55ed 605 CIFS_CRYPTO_KEY_SIZE);
07cc6cf9
SF
606 } else if ((pSMBr->hdr.Flags2 & SMBFLG2_EXT_SEC ||
607 server->capabilities & CAP_EXTENDED_SECURITY) &&
608 (pSMBr->EncryptionKeyLength == 0)) {
254e55ed 609 /* decode security blob */
820a803f 610 count = get_bcc(&pSMBr->hdr);
e187e44e 611 if (count < 16) {
254e55ed 612 rc = -EIO;
e187e44e
JL
613 goto neg_err_exit;
614 }
3f9bcca7 615 spin_lock(&cifs_tcp_ses_lock);
e7ddee90 616 if (server->srv_count > 1) {
3f9bcca7 617 spin_unlock(&cifs_tcp_ses_lock);
e187e44e
JL
618 if (memcmp(server->server_GUID,
619 pSMBr->u.extended_response.
620 GUID, 16) != 0) {
b6b38f70 621 cFYI(1, "server UID changed");
254e55ed 622 memcpy(server->server_GUID,
e187e44e
JL
623 pSMBr->u.extended_response.GUID,
624 16);
625 }
e7ddee90 626 } else {
3f9bcca7 627 spin_unlock(&cifs_tcp_ses_lock);
e187e44e
JL
628 memcpy(server->server_GUID,
629 pSMBr->u.extended_response.GUID, 16);
e7ddee90 630 }
e187e44e
JL
631
632 if (count == 16) {
633 server->secType = RawNTLMSSP;
254e55ed
SF
634 } else {
635 rc = decode_negTokenInit(pSMBr->u.extended_response.
26efa0ba
JL
636 SecurityBlob, count - 16,
637 server);
ef571cad 638 if (rc == 1)
e545937a 639 rc = 0;
ef571cad 640 else
254e55ed 641 rc = -EINVAL;
2b149f11
SP
642 if (server->secType == Kerberos) {
643 if (!server->sec_kerberos &&
644 !server->sec_mskerberos)
645 rc = -EOPNOTSUPP;
646 } else if (server->secType == RawNTLMSSP) {
647 if (!server->sec_ntlmssp)
648 rc = -EOPNOTSUPP;
649 } else
650 rc = -EOPNOTSUPP;
1da177e4 651 }
96daf2b0 652 } else if (server->sec_mode & SECMODE_PW_ENCRYPT) {
07cc6cf9
SF
653 rc = -EIO; /* no crypt key only if plain text pwd */
654 goto neg_err_exit;
254e55ed
SF
655 } else
656 server->capabilities &= ~CAP_EXTENDED_SECURITY;
657
6344a423 658#ifdef CONFIG_CIFS_WEAK_PW_HASH
254e55ed 659signing_check:
6344a423 660#endif
762e5ab7
SF
661 if ((secFlags & CIFSSEC_MAY_SIGN) == 0) {
662 /* MUST_SIGN already includes the MAY_SIGN FLAG
663 so if this is zero it means that signing is disabled */
b6b38f70 664 cFYI(1, "Signing disabled");
96daf2b0 665 if (server->sec_mode & SECMODE_SIGN_REQUIRED) {
b6b38f70 666 cERROR(1, "Server requires "
7111d214 667 "packet signing to be enabled in "
b6b38f70 668 "/proc/fs/cifs/SecurityFlags.");
abb63d6c
SF
669 rc = -EOPNOTSUPP;
670 }
96daf2b0 671 server->sec_mode &=
254e55ed 672 ~(SECMODE_SIGN_ENABLED | SECMODE_SIGN_REQUIRED);
762e5ab7
SF
673 } else if ((secFlags & CIFSSEC_MUST_SIGN) == CIFSSEC_MUST_SIGN) {
674 /* signing required */
b6b38f70 675 cFYI(1, "Must sign - secFlags 0x%x", secFlags);
96daf2b0 676 if ((server->sec_mode &
762e5ab7 677 (SECMODE_SIGN_ENABLED | SECMODE_SIGN_REQUIRED)) == 0) {
b6b38f70 678 cERROR(1, "signing required but server lacks support");
38c10a1d 679 rc = -EOPNOTSUPP;
762e5ab7 680 } else
96daf2b0 681 server->sec_mode |= SECMODE_SIGN_REQUIRED;
762e5ab7
SF
682 } else {
683 /* signing optional ie CIFSSEC_MAY_SIGN */
96daf2b0
SF
684 if ((server->sec_mode & SECMODE_SIGN_REQUIRED) == 0)
685 server->sec_mode &=
254e55ed 686 ~(SECMODE_SIGN_ENABLED | SECMODE_SIGN_REQUIRED);
1da177e4 687 }
50c2f753
SF
688
689neg_err_exit:
4a6d87f1 690 cifs_buf_release(pSMB);
254e55ed 691
b6b38f70 692 cFYI(1, "negprot rc %d", rc);
1da177e4
LT
693 return rc;
694}
695
696int
96daf2b0 697CIFSSMBTDis(const int xid, struct cifs_tcon *tcon)
1da177e4
LT
698{
699 struct smb_hdr *smb_buffer;
1da177e4 700 int rc = 0;
1da177e4 701
b6b38f70 702 cFYI(1, "In tree disconnect");
1da177e4 703
f1987b44
JL
704 /* BB: do we need to check this? These should never be NULL. */
705 if ((tcon->ses == NULL) || (tcon->ses->server == NULL))
706 return -EIO;
1da177e4 707
f1987b44
JL
708 /*
709 * No need to return error on this operation if tid invalidated and
710 * closed on server already e.g. due to tcp session crashing. Also,
711 * the tcon is no longer on the list, so no need to take lock before
712 * checking this.
713 */
268875b9 714 if ((tcon->need_reconnect) || (tcon->ses->need_reconnect))
50c2f753 715 return 0;
1da177e4 716
50c2f753 717 rc = small_smb_init(SMB_COM_TREE_DISCONNECT, 0, tcon,
09d1db5c 718 (void **)&smb_buffer);
f1987b44 719 if (rc)
1da177e4 720 return rc;
133672ef 721
792af7b0 722 rc = SendReceiveNoRsp(xid, tcon->ses, (char *)smb_buffer, 0);
1da177e4 723 if (rc)
b6b38f70 724 cFYI(1, "Tree disconnect failed %d", rc);
1da177e4 725
50c2f753 726 /* No need to return error on this operation if tid invalidated and
f1987b44 727 closed on server already e.g. due to tcp session crashing */
1da177e4
LT
728 if (rc == -EAGAIN)
729 rc = 0;
730
731 return rc;
732}
733
766fdbb5
JL
734/*
735 * This is a no-op for now. We're not really interested in the reply, but
736 * rather in the fact that the server sent one and that server->lstrp
737 * gets updated.
738 *
739 * FIXME: maybe we should consider checking that the reply matches request?
740 */
741static void
742cifs_echo_callback(struct mid_q_entry *mid)
743{
744 struct TCP_Server_Info *server = mid->callback_data;
745
746 DeleteMidQEntry(mid);
45275789 747 add_credits(server, 1);
766fdbb5
JL
748}
749
750int
751CIFSSMBEcho(struct TCP_Server_Info *server)
752{
753 ECHO_REQ *smb;
754 int rc = 0;
fcc31cb6 755 struct kvec iov;
766fdbb5
JL
756
757 cFYI(1, "In echo request");
758
759 rc = small_smb_init(SMB_COM_ECHO, 0, NULL, (void **)&smb);
760 if (rc)
761 return rc;
762
763 /* set up echo request */
5443d130 764 smb->hdr.Tid = 0xffff;
99d86c8f
JL
765 smb->hdr.WordCount = 1;
766 put_unaligned_le16(1, &smb->EchoCount);
820a803f 767 put_bcc(1, &smb->hdr);
766fdbb5 768 smb->Data[0] = 'a';
be8e3b00 769 inc_rfc1001_len(smb, 3);
fcc31cb6
JL
770 iov.iov_base = smb;
771 iov.iov_len = be32_to_cpu(smb->hdr.smb_buf_length) + 4;
766fdbb5 772
44d22d84
JL
773 rc = cifs_call_async(server, &iov, 1, NULL, cifs_echo_callback,
774 server, true);
766fdbb5
JL
775 if (rc)
776 cFYI(1, "Echo request failed: %d", rc);
777
778 cifs_small_buf_release(smb);
779
780 return rc;
781}
782
1da177e4 783int
96daf2b0 784CIFSSMBLogoff(const int xid, struct cifs_ses *ses)
1da177e4 785{
1da177e4
LT
786 LOGOFF_ANDX_REQ *pSMB;
787 int rc = 0;
1da177e4 788
b6b38f70 789 cFYI(1, "In SMBLogoff for session disconnect");
3b795210 790
14fbf50d
JL
791 /*
792 * BB: do we need to check validity of ses and server? They should
793 * always be valid since we have an active reference. If not, that
794 * should probably be a BUG()
795 */
796 if (!ses || !ses->server)
3b795210
SF
797 return -EIO;
798
d7b619cf 799 mutex_lock(&ses->session_mutex);
3b795210
SF
800 if (ses->need_reconnect)
801 goto session_already_dead; /* no need to send SMBlogoff if uid
802 already closed due to reconnect */
1da177e4
LT
803 rc = small_smb_init(SMB_COM_LOGOFF_ANDX, 2, NULL, (void **)&pSMB);
804 if (rc) {
d7b619cf 805 mutex_unlock(&ses->session_mutex);
1da177e4
LT
806 return rc;
807 }
808
88257360 809 pSMB->hdr.Mid = get_next_mid(ses->server);
1982c344 810
96daf2b0 811 if (ses->server->sec_mode &
1da177e4
LT
812 (SECMODE_SIGN_REQUIRED | SECMODE_SIGN_ENABLED))
813 pSMB->hdr.Flags2 |= SMBFLG2_SECURITY_SIGNATURE;
1da177e4
LT
814
815 pSMB->hdr.Uid = ses->Suid;
816
817 pSMB->AndXCommand = 0xFF;
792af7b0 818 rc = SendReceiveNoRsp(xid, ses, (char *) pSMB, 0);
3b795210 819session_already_dead:
d7b619cf 820 mutex_unlock(&ses->session_mutex);
1da177e4
LT
821
822 /* if session dead then we do not need to do ulogoff,
50c2f753 823 since server closed smb session, no sense reporting
1da177e4
LT
824 error */
825 if (rc == -EAGAIN)
826 rc = 0;
827 return rc;
828}
829
2d785a50 830int
96daf2b0 831CIFSPOSIXDelFile(const int xid, struct cifs_tcon *tcon, const char *fileName,
2d785a50
SF
832 __u16 type, const struct nls_table *nls_codepage, int remap)
833{
834 TRANSACTION2_SPI_REQ *pSMB = NULL;
835 TRANSACTION2_SPI_RSP *pSMBr = NULL;
836 struct unlink_psx_rq *pRqD;
837 int name_len;
838 int rc = 0;
839 int bytes_returned = 0;
840 __u16 params, param_offset, offset, byte_count;
841
b6b38f70 842 cFYI(1, "In POSIX delete");
2d785a50
SF
843PsxDelete:
844 rc = smb_init(SMB_COM_TRANSACTION2, 15, tcon, (void **) &pSMB,
845 (void **) &pSMBr);
846 if (rc)
847 return rc;
848
849 if (pSMB->hdr.Flags2 & SMBFLG2_UNICODE) {
850 name_len =
acbbb76a
SF
851 cifsConvertToUTF16((__le16 *) pSMB->FileName, fileName,
852 PATH_MAX, nls_codepage, remap);
2d785a50
SF
853 name_len++; /* trailing null */
854 name_len *= 2;
855 } else { /* BB add path length overrun check */
856 name_len = strnlen(fileName, PATH_MAX);
857 name_len++; /* trailing null */
858 strncpy(pSMB->FileName, fileName, name_len);
859 }
860
861 params = 6 + name_len;
862 pSMB->MaxParameterCount = cpu_to_le16(2);
863 pSMB->MaxDataCount = 0; /* BB double check this with jra */
864 pSMB->MaxSetupCount = 0;
865 pSMB->Reserved = 0;
866 pSMB->Flags = 0;
867 pSMB->Timeout = 0;
868 pSMB->Reserved2 = 0;
869 param_offset = offsetof(struct smb_com_transaction2_spi_req,
870 InformationLevel) - 4;
871 offset = param_offset + params;
872
873 /* Setup pointer to Request Data (inode type) */
874 pRqD = (struct unlink_psx_rq *)(((char *)&pSMB->hdr.Protocol) + offset);
875 pRqD->type = cpu_to_le16(type);
876 pSMB->ParameterOffset = cpu_to_le16(param_offset);
877 pSMB->DataOffset = cpu_to_le16(offset);
878 pSMB->SetupCount = 1;
879 pSMB->Reserved3 = 0;
880 pSMB->SubCommand = cpu_to_le16(TRANS2_SET_PATH_INFORMATION);
881 byte_count = 3 /* pad */ + params + sizeof(struct unlink_psx_rq);
882
883 pSMB->DataCount = cpu_to_le16(sizeof(struct unlink_psx_rq));
884 pSMB->TotalDataCount = cpu_to_le16(sizeof(struct unlink_psx_rq));
885 pSMB->ParameterCount = cpu_to_le16(params);
886 pSMB->TotalParameterCount = pSMB->ParameterCount;
887 pSMB->InformationLevel = cpu_to_le16(SMB_POSIX_UNLINK);
888 pSMB->Reserved4 = 0;
be8e3b00 889 inc_rfc1001_len(pSMB, byte_count);
2d785a50
SF
890 pSMB->ByteCount = cpu_to_le16(byte_count);
891 rc = SendReceive(xid, tcon->ses, (struct smb_hdr *) pSMB,
892 (struct smb_hdr *) pSMBr, &bytes_returned, 0);
ad7a2926 893 if (rc)
b6b38f70 894 cFYI(1, "Posix delete returned %d", rc);
2d785a50
SF
895 cifs_buf_release(pSMB);
896
897 cifs_stats_inc(&tcon->num_deletes);
898
899 if (rc == -EAGAIN)
900 goto PsxDelete;
901
902 return rc;
903}
904
1da177e4 905int
96daf2b0 906CIFSSMBDelFile(const int xid, struct cifs_tcon *tcon, const char *fileName,
737b758c 907 const struct nls_table *nls_codepage, int remap)
1da177e4
LT
908{
909 DELETE_FILE_REQ *pSMB = NULL;
910 DELETE_FILE_RSP *pSMBr = NULL;
911 int rc = 0;
912 int bytes_returned;
913 int name_len;
914
915DelFileRetry:
916 rc = smb_init(SMB_COM_DELETE, 1, tcon, (void **) &pSMB,
917 (void **) &pSMBr);
918 if (rc)
919 return rc;
920
921 if (pSMB->hdr.Flags2 & SMBFLG2_UNICODE) {
922 name_len =
acbbb76a
SF
923 cifsConvertToUTF16((__le16 *) pSMB->fileName, fileName,
924 PATH_MAX, nls_codepage, remap);
1da177e4
LT
925 name_len++; /* trailing null */
926 name_len *= 2;
09d1db5c 927 } else { /* BB improve check for buffer overruns BB */
1da177e4
LT
928 name_len = strnlen(fileName, PATH_MAX);
929 name_len++; /* trailing null */
930 strncpy(pSMB->fileName, fileName, name_len);
931 }
932 pSMB->SearchAttributes =
933 cpu_to_le16(ATTR_READONLY | ATTR_HIDDEN | ATTR_SYSTEM);
934 pSMB->BufferFormat = 0x04;
be8e3b00 935 inc_rfc1001_len(pSMB, name_len + 1);
1da177e4
LT
936 pSMB->ByteCount = cpu_to_le16(name_len + 1);
937 rc = SendReceive(xid, tcon->ses, (struct smb_hdr *) pSMB,
938 (struct smb_hdr *) pSMBr, &bytes_returned, 0);
a4544347 939 cifs_stats_inc(&tcon->num_deletes);
ad7a2926 940 if (rc)
b6b38f70 941 cFYI(1, "Error in RMFile = %d", rc);
1da177e4
LT
942
943 cifs_buf_release(pSMB);
944 if (rc == -EAGAIN)
945 goto DelFileRetry;
946
947 return rc;
948}
949
950int
96daf2b0 951CIFSSMBRmDir(const int xid, struct cifs_tcon *tcon, const char *dirName,
737b758c 952 const struct nls_table *nls_codepage, int remap)
1da177e4
LT
953{
954 DELETE_DIRECTORY_REQ *pSMB = NULL;
955 DELETE_DIRECTORY_RSP *pSMBr = NULL;
956 int rc = 0;
957 int bytes_returned;
958 int name_len;
959
b6b38f70 960 cFYI(1, "In CIFSSMBRmDir");
1da177e4
LT
961RmDirRetry:
962 rc = smb_init(SMB_COM_DELETE_DIRECTORY, 0, tcon, (void **) &pSMB,
963 (void **) &pSMBr);
964 if (rc)
965 return rc;
966
967 if (pSMB->hdr.Flags2 & SMBFLG2_UNICODE) {
acbbb76a
SF
968 name_len = cifsConvertToUTF16((__le16 *) pSMB->DirName, dirName,
969 PATH_MAX, nls_codepage, remap);
1da177e4
LT
970 name_len++; /* trailing null */
971 name_len *= 2;
09d1db5c 972 } else { /* BB improve check for buffer overruns BB */
1da177e4
LT
973 name_len = strnlen(dirName, PATH_MAX);
974 name_len++; /* trailing null */
975 strncpy(pSMB->DirName, dirName, name_len);
976 }
977
978 pSMB->BufferFormat = 0x04;
be8e3b00 979 inc_rfc1001_len(pSMB, name_len + 1);
1da177e4
LT
980 pSMB->ByteCount = cpu_to_le16(name_len + 1);
981 rc = SendReceive(xid, tcon->ses, (struct smb_hdr *) pSMB,
982 (struct smb_hdr *) pSMBr, &bytes_returned, 0);
a4544347 983 cifs_stats_inc(&tcon->num_rmdirs);
ad7a2926 984 if (rc)
b6b38f70 985 cFYI(1, "Error in RMDir = %d", rc);
1da177e4
LT
986
987 cifs_buf_release(pSMB);
988 if (rc == -EAGAIN)
989 goto RmDirRetry;
990 return rc;
991}
992
993int
96daf2b0 994CIFSSMBMkDir(const int xid, struct cifs_tcon *tcon,
737b758c 995 const char *name, const struct nls_table *nls_codepage, int remap)
1da177e4
LT
996{
997 int rc = 0;
998 CREATE_DIRECTORY_REQ *pSMB = NULL;
999 CREATE_DIRECTORY_RSP *pSMBr = NULL;
1000 int bytes_returned;
1001 int name_len;
1002
b6b38f70 1003 cFYI(1, "In CIFSSMBMkDir");
1da177e4
LT
1004MkDirRetry:
1005 rc = smb_init(SMB_COM_CREATE_DIRECTORY, 0, tcon, (void **) &pSMB,
1006 (void **) &pSMBr);
1007 if (rc)
1008 return rc;
1009
1010 if (pSMB->hdr.Flags2 & SMBFLG2_UNICODE) {
acbbb76a
SF
1011 name_len = cifsConvertToUTF16((__le16 *) pSMB->DirName, name,
1012 PATH_MAX, nls_codepage, remap);
1da177e4
LT
1013 name_len++; /* trailing null */
1014 name_len *= 2;
09d1db5c 1015 } else { /* BB improve check for buffer overruns BB */
1da177e4
LT
1016 name_len = strnlen(name, PATH_MAX);
1017 name_len++; /* trailing null */
1018 strncpy(pSMB->DirName, name, name_len);
1019 }
1020
1021 pSMB->BufferFormat = 0x04;
be8e3b00 1022 inc_rfc1001_len(pSMB, name_len + 1);
1da177e4
LT
1023 pSMB->ByteCount = cpu_to_le16(name_len + 1);
1024 rc = SendReceive(xid, tcon->ses, (struct smb_hdr *) pSMB,
1025 (struct smb_hdr *) pSMBr, &bytes_returned, 0);
a4544347 1026 cifs_stats_inc(&tcon->num_mkdirs);
ad7a2926 1027 if (rc)
b6b38f70 1028 cFYI(1, "Error in Mkdir = %d", rc);
a5a2b489 1029
1da177e4
LT
1030 cifs_buf_release(pSMB);
1031 if (rc == -EAGAIN)
1032 goto MkDirRetry;
1033 return rc;
1034}
1035
2dd29d31 1036int
96daf2b0 1037CIFSPOSIXCreate(const int xid, struct cifs_tcon *tcon, __u32 posix_flags,
ad7a2926 1038 __u64 mode, __u16 *netfid, FILE_UNIX_BASIC_INFO *pRetData,
50c2f753 1039 __u32 *pOplock, const char *name,
2dd29d31
SF
1040 const struct nls_table *nls_codepage, int remap)
1041{
1042 TRANSACTION2_SPI_REQ *pSMB = NULL;
1043 TRANSACTION2_SPI_RSP *pSMBr = NULL;
1044 int name_len;
1045 int rc = 0;
1046 int bytes_returned = 0;
2dd29d31 1047 __u16 params, param_offset, offset, byte_count, count;
ad7a2926
SF
1048 OPEN_PSX_REQ *pdata;
1049 OPEN_PSX_RSP *psx_rsp;
2dd29d31 1050
b6b38f70 1051 cFYI(1, "In POSIX Create");
2dd29d31
SF
1052PsxCreat:
1053 rc = smb_init(SMB_COM_TRANSACTION2, 15, tcon, (void **) &pSMB,
1054 (void **) &pSMBr);
1055 if (rc)
1056 return rc;
1057
1058 if (pSMB->hdr.Flags2 & SMBFLG2_UNICODE) {
1059 name_len =
acbbb76a
SF
1060 cifsConvertToUTF16((__le16 *) pSMB->FileName, name,
1061 PATH_MAX, nls_codepage, remap);
2dd29d31
SF
1062 name_len++; /* trailing null */
1063 name_len *= 2;
1064 } else { /* BB improve the check for buffer overruns BB */
1065 name_len = strnlen(name, PATH_MAX);
1066 name_len++; /* trailing null */
1067 strncpy(pSMB->FileName, name, name_len);
1068 }
1069
1070 params = 6 + name_len;
1071 count = sizeof(OPEN_PSX_REQ);
1072 pSMB->MaxParameterCount = cpu_to_le16(2);
1073 pSMB->MaxDataCount = cpu_to_le16(1000); /* large enough */
1074 pSMB->MaxSetupCount = 0;
1075 pSMB->Reserved = 0;
1076 pSMB->Flags = 0;
1077 pSMB->Timeout = 0;
1078 pSMB->Reserved2 = 0;
1079 param_offset = offsetof(struct smb_com_transaction2_spi_req,
50c2f753 1080 InformationLevel) - 4;
2dd29d31 1081 offset = param_offset + params;
2dd29d31 1082 pdata = (OPEN_PSX_REQ *)(((char *)&pSMB->hdr.Protocol) + offset);
8f2376ad 1083 pdata->Level = cpu_to_le16(SMB_QUERY_FILE_UNIX_BASIC);
2dd29d31 1084 pdata->Permissions = cpu_to_le64(mode);
50c2f753 1085 pdata->PosixOpenFlags = cpu_to_le32(posix_flags);
2dd29d31
SF
1086 pdata->OpenFlags = cpu_to_le32(*pOplock);
1087 pSMB->ParameterOffset = cpu_to_le16(param_offset);
1088 pSMB->DataOffset = cpu_to_le16(offset);
1089 pSMB->SetupCount = 1;
1090 pSMB->Reserved3 = 0;
1091 pSMB->SubCommand = cpu_to_le16(TRANS2_SET_PATH_INFORMATION);
1092 byte_count = 3 /* pad */ + params + count;
1093
1094 pSMB->DataCount = cpu_to_le16(count);
1095 pSMB->ParameterCount = cpu_to_le16(params);
1096 pSMB->TotalDataCount = pSMB->DataCount;
1097 pSMB->TotalParameterCount = pSMB->ParameterCount;
1098 pSMB->InformationLevel = cpu_to_le16(SMB_POSIX_OPEN);
1099 pSMB->Reserved4 = 0;
be8e3b00 1100 inc_rfc1001_len(pSMB, byte_count);
2dd29d31
SF
1101 pSMB->ByteCount = cpu_to_le16(byte_count);
1102 rc = SendReceive(xid, tcon->ses, (struct smb_hdr *) pSMB,
1103 (struct smb_hdr *) pSMBr, &bytes_returned, 0);
1104 if (rc) {
b6b38f70 1105 cFYI(1, "Posix create returned %d", rc);
2dd29d31
SF
1106 goto psx_create_err;
1107 }
1108
b6b38f70 1109 cFYI(1, "copying inode info");
2dd29d31
SF
1110 rc = validate_t2((struct smb_t2_rsp *)pSMBr);
1111
820a803f 1112 if (rc || get_bcc(&pSMBr->hdr) < sizeof(OPEN_PSX_RSP)) {
2dd29d31
SF
1113 rc = -EIO; /* bad smb */
1114 goto psx_create_err;
1115 }
1116
1117 /* copy return information to pRetData */
50c2f753 1118 psx_rsp = (OPEN_PSX_RSP *)((char *) &pSMBr->hdr.Protocol
2dd29d31 1119 + le16_to_cpu(pSMBr->t2.DataOffset));
50c2f753 1120
2dd29d31 1121 *pOplock = le16_to_cpu(psx_rsp->OplockFlags);
790fe579 1122 if (netfid)
2dd29d31
SF
1123 *netfid = psx_rsp->Fid; /* cifs fid stays in le */
1124 /* Let caller know file was created so we can set the mode. */
1125 /* Do we care about the CreateAction in any other cases? */
790fe579 1126 if (cpu_to_le32(FILE_CREATE) == psx_rsp->CreateAction)
2dd29d31
SF
1127 *pOplock |= CIFS_CREATE_ACTION;
1128 /* check to make sure response data is there */
8f2376ad
CG
1129 if (psx_rsp->ReturnedLevel != cpu_to_le16(SMB_QUERY_FILE_UNIX_BASIC)) {
1130 pRetData->Type = cpu_to_le32(-1); /* unknown */
b6b38f70 1131 cFYI(DBG2, "unknown type");
cbac3cba 1132 } else {
820a803f 1133 if (get_bcc(&pSMBr->hdr) < sizeof(OPEN_PSX_RSP)
2dd29d31 1134 + sizeof(FILE_UNIX_BASIC_INFO)) {
b6b38f70 1135 cERROR(1, "Open response data too small");
8f2376ad 1136 pRetData->Type = cpu_to_le32(-1);
2dd29d31
SF
1137 goto psx_create_err;
1138 }
50c2f753 1139 memcpy((char *) pRetData,
cbac3cba 1140 (char *)psx_rsp + sizeof(OPEN_PSX_RSP),
26f57364 1141 sizeof(FILE_UNIX_BASIC_INFO));
2dd29d31 1142 }
2dd29d31
SF
1143
1144psx_create_err:
1145 cifs_buf_release(pSMB);
1146
65bc98b0
SF
1147 if (posix_flags & SMB_O_DIRECTORY)
1148 cifs_stats_inc(&tcon->num_posixmkdirs);
1149 else
1150 cifs_stats_inc(&tcon->num_posixopens);
2dd29d31
SF
1151
1152 if (rc == -EAGAIN)
1153 goto PsxCreat;
1154
50c2f753 1155 return rc;
2dd29d31
SF
1156}
1157
a9d02ad4
SF
1158static __u16 convert_disposition(int disposition)
1159{
1160 __u16 ofun = 0;
1161
1162 switch (disposition) {
1163 case FILE_SUPERSEDE:
1164 ofun = SMBOPEN_OCREATE | SMBOPEN_OTRUNC;
1165 break;
1166 case FILE_OPEN:
1167 ofun = SMBOPEN_OAPPEND;
1168 break;
1169 case FILE_CREATE:
1170 ofun = SMBOPEN_OCREATE;
1171 break;
1172 case FILE_OPEN_IF:
1173 ofun = SMBOPEN_OCREATE | SMBOPEN_OAPPEND;
1174 break;
1175 case FILE_OVERWRITE:
1176 ofun = SMBOPEN_OTRUNC;
1177 break;
1178 case FILE_OVERWRITE_IF:
1179 ofun = SMBOPEN_OCREATE | SMBOPEN_OTRUNC;
1180 break;
1181 default:
b6b38f70 1182 cFYI(1, "unknown disposition %d", disposition);
a9d02ad4
SF
1183 ofun = SMBOPEN_OAPPEND; /* regular open */
1184 }
1185 return ofun;
1186}
1187
35fc37d5
JL
1188static int
1189access_flags_to_smbopen_mode(const int access_flags)
1190{
1191 int masked_flags = access_flags & (GENERIC_READ | GENERIC_WRITE);
1192
1193 if (masked_flags == GENERIC_READ)
1194 return SMBOPEN_READ;
1195 else if (masked_flags == GENERIC_WRITE)
1196 return SMBOPEN_WRITE;
1197
1198 /* just go for read/write */
1199 return SMBOPEN_READWRITE;
1200}
1201
a9d02ad4 1202int
96daf2b0 1203SMBLegacyOpen(const int xid, struct cifs_tcon *tcon,
a9d02ad4 1204 const char *fileName, const int openDisposition,
ad7a2926
SF
1205 const int access_flags, const int create_options, __u16 *netfid,
1206 int *pOplock, FILE_ALL_INFO *pfile_info,
a9d02ad4
SF
1207 const struct nls_table *nls_codepage, int remap)
1208{
1209 int rc = -EACCES;
1210 OPENX_REQ *pSMB = NULL;
1211 OPENX_RSP *pSMBr = NULL;
1212 int bytes_returned;
1213 int name_len;
1214 __u16 count;
1215
1216OldOpenRetry:
1217 rc = smb_init(SMB_COM_OPEN_ANDX, 15, tcon, (void **) &pSMB,
1218 (void **) &pSMBr);
1219 if (rc)
1220 return rc;
1221
1222 pSMB->AndXCommand = 0xFF; /* none */
1223
1224 if (pSMB->hdr.Flags2 & SMBFLG2_UNICODE) {
1225 count = 1; /* account for one byte pad to word boundary */
1226 name_len =
acbbb76a
SF
1227 cifsConvertToUTF16((__le16 *) (pSMB->fileName + 1),
1228 fileName, PATH_MAX, nls_codepage, remap);
a9d02ad4
SF
1229 name_len++; /* trailing null */
1230 name_len *= 2;
1231 } else { /* BB improve check for buffer overruns BB */
1232 count = 0; /* no pad */
1233 name_len = strnlen(fileName, PATH_MAX);
1234 name_len++; /* trailing null */
1235 strncpy(pSMB->fileName, fileName, name_len);
1236 }
1237 if (*pOplock & REQ_OPLOCK)
1238 pSMB->OpenFlags = cpu_to_le16(REQ_OPLOCK);
26f57364 1239 else if (*pOplock & REQ_BATCHOPLOCK)
a9d02ad4 1240 pSMB->OpenFlags = cpu_to_le16(REQ_BATCHOPLOCK);
26f57364 1241
a9d02ad4 1242 pSMB->OpenFlags |= cpu_to_le16(REQ_MORE_INFO);
35fc37d5 1243 pSMB->Mode = cpu_to_le16(access_flags_to_smbopen_mode(access_flags));
a9d02ad4
SF
1244 pSMB->Mode |= cpu_to_le16(0x40); /* deny none */
1245 /* set file as system file if special file such
1246 as fifo and server expecting SFU style and
1247 no Unix extensions */
1248
790fe579
SF
1249 if (create_options & CREATE_OPTION_SPECIAL)
1250 pSMB->FileAttributes = cpu_to_le16(ATTR_SYSTEM);
ad7a2926
SF
1251 else /* BB FIXME BB */
1252 pSMB->FileAttributes = cpu_to_le16(0/*ATTR_NORMAL*/);
a9d02ad4 1253
67750fb9
JL
1254 if (create_options & CREATE_OPTION_READONLY)
1255 pSMB->FileAttributes |= cpu_to_le16(ATTR_READONLY);
a9d02ad4
SF
1256
1257 /* BB FIXME BB */
50c2f753
SF
1258/* pSMB->CreateOptions = cpu_to_le32(create_options &
1259 CREATE_OPTIONS_MASK); */
a9d02ad4 1260 /* BB FIXME END BB */
3e87d803
SF
1261
1262 pSMB->Sattr = cpu_to_le16(ATTR_HIDDEN | ATTR_SYSTEM | ATTR_DIRECTORY);
70ca734a 1263 pSMB->OpenFunction = cpu_to_le16(convert_disposition(openDisposition));
a9d02ad4 1264 count += name_len;
be8e3b00 1265 inc_rfc1001_len(pSMB, count);
a9d02ad4
SF
1266
1267 pSMB->ByteCount = cpu_to_le16(count);
1268 /* long_op set to 1 to allow for oplock break timeouts */
1269 rc = SendReceive(xid, tcon->ses, (struct smb_hdr *) pSMB,
7749981e 1270 (struct smb_hdr *)pSMBr, &bytes_returned, 0);
a9d02ad4
SF
1271 cifs_stats_inc(&tcon->num_opens);
1272 if (rc) {
b6b38f70 1273 cFYI(1, "Error in Open = %d", rc);
a9d02ad4
SF
1274 } else {
1275 /* BB verify if wct == 15 */
1276
582d21e5 1277/* *pOplock = pSMBr->OplockLevel; */ /* BB take from action field*/
a9d02ad4
SF
1278
1279 *netfid = pSMBr->Fid; /* cifs fid stays in le */
1280 /* Let caller know file was created so we can set the mode. */
1281 /* Do we care about the CreateAction in any other cases? */
1282 /* BB FIXME BB */
790fe579 1283/* if (cpu_to_le32(FILE_CREATE) == pSMBr->CreateAction)
a9d02ad4
SF
1284 *pOplock |= CIFS_CREATE_ACTION; */
1285 /* BB FIXME END */
1286
790fe579 1287 if (pfile_info) {
a9d02ad4
SF
1288 pfile_info->CreationTime = 0; /* BB convert CreateTime*/
1289 pfile_info->LastAccessTime = 0; /* BB fixme */
1290 pfile_info->LastWriteTime = 0; /* BB fixme */
1291 pfile_info->ChangeTime = 0; /* BB fixme */
70ca734a 1292 pfile_info->Attributes =
50c2f753 1293 cpu_to_le32(le16_to_cpu(pSMBr->FileAttributes));
a9d02ad4 1294 /* the file_info buf is endian converted by caller */
70ca734a
SF
1295 pfile_info->AllocationSize =
1296 cpu_to_le64(le32_to_cpu(pSMBr->EndOfFile));
1297 pfile_info->EndOfFile = pfile_info->AllocationSize;
a9d02ad4 1298 pfile_info->NumberOfLinks = cpu_to_le32(1);
9a8165fc 1299 pfile_info->DeletePending = 0;
a9d02ad4
SF
1300 }
1301 }
1302
1303 cifs_buf_release(pSMB);
1304 if (rc == -EAGAIN)
1305 goto OldOpenRetry;
1306 return rc;
1307}
1308
1da177e4 1309int
96daf2b0 1310CIFSSMBOpen(const int xid, struct cifs_tcon *tcon,
1da177e4 1311 const char *fileName, const int openDisposition,
ad7a2926
SF
1312 const int access_flags, const int create_options, __u16 *netfid,
1313 int *pOplock, FILE_ALL_INFO *pfile_info,
737b758c 1314 const struct nls_table *nls_codepage, int remap)
1da177e4
LT
1315{
1316 int rc = -EACCES;
1317 OPEN_REQ *pSMB = NULL;
1318 OPEN_RSP *pSMBr = NULL;
1319 int bytes_returned;
1320 int name_len;
1321 __u16 count;
1322
1323openRetry:
1324 rc = smb_init(SMB_COM_NT_CREATE_ANDX, 24, tcon, (void **) &pSMB,
1325 (void **) &pSMBr);
1326 if (rc)
1327 return rc;
1328
1329 pSMB->AndXCommand = 0xFF; /* none */
1330
1331 if (pSMB->hdr.Flags2 & SMBFLG2_UNICODE) {
1332 count = 1; /* account for one byte pad to word boundary */
1333 name_len =
acbbb76a
SF
1334 cifsConvertToUTF16((__le16 *) (pSMB->fileName + 1),
1335 fileName, PATH_MAX, nls_codepage, remap);
1da177e4
LT
1336 name_len++; /* trailing null */
1337 name_len *= 2;
1338 pSMB->NameLength = cpu_to_le16(name_len);
09d1db5c 1339 } else { /* BB improve check for buffer overruns BB */
1da177e4
LT
1340 count = 0; /* no pad */
1341 name_len = strnlen(fileName, PATH_MAX);
1342 name_len++; /* trailing null */
1343 pSMB->NameLength = cpu_to_le16(name_len);
1344 strncpy(pSMB->fileName, fileName, name_len);
1345 }
1346 if (*pOplock & REQ_OPLOCK)
1347 pSMB->OpenFlags = cpu_to_le32(REQ_OPLOCK);
26f57364 1348 else if (*pOplock & REQ_BATCHOPLOCK)
1da177e4 1349 pSMB->OpenFlags = cpu_to_le32(REQ_BATCHOPLOCK);
1da177e4
LT
1350 pSMB->DesiredAccess = cpu_to_le32(access_flags);
1351 pSMB->AllocationSize = 0;
eda3c029
SF
1352 /* set file as system file if special file such
1353 as fifo and server expecting SFU style and
1354 no Unix extensions */
790fe579 1355 if (create_options & CREATE_OPTION_SPECIAL)
eda3c029
SF
1356 pSMB->FileAttributes = cpu_to_le32(ATTR_SYSTEM);
1357 else
1358 pSMB->FileAttributes = cpu_to_le32(ATTR_NORMAL);
67750fb9 1359
1da177e4
LT
1360 /* XP does not handle ATTR_POSIX_SEMANTICS */
1361 /* but it helps speed up case sensitive checks for other
1362 servers such as Samba */
1363 if (tcon->ses->capabilities & CAP_UNIX)
1364 pSMB->FileAttributes |= cpu_to_le32(ATTR_POSIX_SEMANTICS);
1365
67750fb9
JL
1366 if (create_options & CREATE_OPTION_READONLY)
1367 pSMB->FileAttributes |= cpu_to_le32(ATTR_READONLY);
1368
1da177e4
LT
1369 pSMB->ShareAccess = cpu_to_le32(FILE_SHARE_ALL);
1370 pSMB->CreateDisposition = cpu_to_le32(openDisposition);
eda3c029 1371 pSMB->CreateOptions = cpu_to_le32(create_options & CREATE_OPTIONS_MASK);
09d1db5c
SF
1372 /* BB Expirement with various impersonation levels and verify */
1373 pSMB->ImpersonationLevel = cpu_to_le32(SECURITY_IMPERSONATION);
1da177e4
LT
1374 pSMB->SecurityFlags =
1375 SECURITY_CONTEXT_TRACKING | SECURITY_EFFECTIVE_ONLY;
1376
1377 count += name_len;
be8e3b00 1378 inc_rfc1001_len(pSMB, count);
1da177e4
LT
1379
1380 pSMB->ByteCount = cpu_to_le16(count);
1381 /* long_op set to 1 to allow for oplock break timeouts */
1382 rc = SendReceive(xid, tcon->ses, (struct smb_hdr *) pSMB,
7749981e 1383 (struct smb_hdr *)pSMBr, &bytes_returned, 0);
a4544347 1384 cifs_stats_inc(&tcon->num_opens);
1da177e4 1385 if (rc) {
b6b38f70 1386 cFYI(1, "Error in Open = %d", rc);
1da177e4 1387 } else {
09d1db5c 1388 *pOplock = pSMBr->OplockLevel; /* 1 byte no need to le_to_cpu */
1da177e4
LT
1389 *netfid = pSMBr->Fid; /* cifs fid stays in le */
1390 /* Let caller know file was created so we can set the mode. */
1391 /* Do we care about the CreateAction in any other cases? */
790fe579 1392 if (cpu_to_le32(FILE_CREATE) == pSMBr->CreateAction)
50c2f753 1393 *pOplock |= CIFS_CREATE_ACTION;
790fe579 1394 if (pfile_info) {
61e74801
SF
1395 memcpy((char *)pfile_info, (char *)&pSMBr->CreationTime,
1396 36 /* CreationTime to Attributes */);
1397 /* the file_info buf is endian converted by caller */
1398 pfile_info->AllocationSize = pSMBr->AllocationSize;
1399 pfile_info->EndOfFile = pSMBr->EndOfFile;
1400 pfile_info->NumberOfLinks = cpu_to_le32(1);
1401 pfile_info->DeletePending = 0;
1da177e4 1402 }
1da177e4 1403 }
a5a2b489 1404
1da177e4
LT
1405 cifs_buf_release(pSMB);
1406 if (rc == -EAGAIN)
1407 goto openRetry;
1408 return rc;
1409}
1410
e28bc5b1
JL
1411/*
1412 * Discard any remaining data in the current SMB. To do this, we borrow the
1413 * current bigbuf.
1414 */
1415static int
1416cifs_readv_discard(struct TCP_Server_Info *server, struct mid_q_entry *mid)
1417{
5ffef7bf 1418 unsigned int rfclen = get_rfc1002_length(server->smallbuf);
e28bc5b1
JL
1419 int remaining = rfclen + 4 - server->total_read;
1420 struct cifs_readdata *rdata = mid->callback_data;
1421
1422 while (remaining > 0) {
1423 int length;
1424
1425 length = cifs_read_from_socket(server, server->bigbuf,
1426 min_t(unsigned int, remaining,
1887f601 1427 CIFSMaxBufSize + MAX_HEADER_SIZE(server)));
e28bc5b1
JL
1428 if (length < 0)
1429 return length;
1430 server->total_read += length;
1431 remaining -= length;
1432 }
1433
1434 dequeue_mid(mid, rdata->result);
1435 return 0;
1436}
1437
1438static int
1439cifs_readv_receive(struct TCP_Server_Info *server, struct mid_q_entry *mid)
1440{
1441 int length, len;
8d5ce4d2 1442 unsigned int data_offset, data_len;
e28bc5b1 1443 struct cifs_readdata *rdata = mid->callback_data;
5ffef7bf
PS
1444 char *buf = server->smallbuf;
1445 unsigned int buflen = get_rfc1002_length(buf) + 4;
e28bc5b1 1446
7c9421e1 1447 cFYI(1, "%s: mid=%llu offset=%llu bytes=%u", __func__,
e28bc5b1
JL
1448 mid->mid, rdata->offset, rdata->bytes);
1449
1450 /*
1451 * read the rest of READ_RSP header (sans Data array), or whatever we
1452 * can if there's not enough data. At this point, we've read down to
1453 * the Mid.
1454 */
eb378711 1455 len = min_t(unsigned int, buflen, server->vals->read_rsp_size) -
1887f601 1456 HEADER_SIZE(server) + 1;
e28bc5b1 1457
1887f601 1458 rdata->iov[0].iov_base = buf + HEADER_SIZE(server) - 1;
e28bc5b1
JL
1459 rdata->iov[0].iov_len = len;
1460
1461 length = cifs_readv_from_socket(server, rdata->iov, 1, len);
1462 if (length < 0)
1463 return length;
1464 server->total_read += length;
1465
1466 /* Was the SMB read successful? */
eb378711 1467 rdata->result = server->ops->map_error(buf, false);
e28bc5b1
JL
1468 if (rdata->result != 0) {
1469 cFYI(1, "%s: server returned error %d", __func__,
1470 rdata->result);
1471 return cifs_readv_discard(server, mid);
1472 }
1473
1474 /* Is there enough to get to the rest of the READ_RSP header? */
eb378711 1475 if (server->total_read < server->vals->read_rsp_size) {
e28bc5b1 1476 cFYI(1, "%s: server returned short header. got=%u expected=%zu",
eb378711
PS
1477 __func__, server->total_read,
1478 server->vals->read_rsp_size);
e28bc5b1
JL
1479 rdata->result = -EIO;
1480 return cifs_readv_discard(server, mid);
1481 }
1482
eb378711 1483 data_offset = server->ops->read_data_offset(buf) + 4;
e28bc5b1
JL
1484 if (data_offset < server->total_read) {
1485 /*
1486 * win2k8 sometimes sends an offset of 0 when the read
1487 * is beyond the EOF. Treat it as if the data starts just after
1488 * the header.
1489 */
1490 cFYI(1, "%s: data offset (%u) inside read response header",
1491 __func__, data_offset);
1492 data_offset = server->total_read;
1493 } else if (data_offset > MAX_CIFS_SMALL_BUFFER_SIZE) {
1494 /* data_offset is beyond the end of smallbuf */
1495 cFYI(1, "%s: data offset (%u) beyond end of smallbuf",
1496 __func__, data_offset);
1497 rdata->result = -EIO;
1498 return cifs_readv_discard(server, mid);
1499 }
1500
1501 cFYI(1, "%s: total_read=%u data_offset=%u", __func__,
1502 server->total_read, data_offset);
1503
1504 len = data_offset - server->total_read;
1505 if (len > 0) {
1506 /* read any junk before data into the rest of smallbuf */
5ffef7bf 1507 rdata->iov[0].iov_base = buf + server->total_read;
e28bc5b1
JL
1508 rdata->iov[0].iov_len = len;
1509 length = cifs_readv_from_socket(server, rdata->iov, 1, len);
1510 if (length < 0)
1511 return length;
1512 server->total_read += length;
1513 }
1514
1515 /* set up first iov for signature check */
5ffef7bf 1516 rdata->iov[0].iov_base = buf;
e28bc5b1
JL
1517 rdata->iov[0].iov_len = server->total_read;
1518 cFYI(1, "0: iov_base=%p iov_len=%zu",
1519 rdata->iov[0].iov_base, rdata->iov[0].iov_len);
1520
1521 /* how much data is in the response? */
eb378711 1522 data_len = server->ops->read_data_length(buf);
5ffef7bf 1523 if (data_offset + data_len > buflen) {
e28bc5b1
JL
1524 /* data_len is corrupt -- discard frame */
1525 rdata->result = -EIO;
1526 return cifs_readv_discard(server, mid);
1527 }
1528
1529 /* marshal up the page array */
3cf003c0 1530 cifs_kmap_lock();
8d5ce4d2 1531 len = rdata->marshal_iov(rdata, data_len);
3cf003c0 1532 cifs_kmap_unlock();
8d5ce4d2 1533 data_len -= len;
e28bc5b1
JL
1534
1535 /* issue the read if we have any iovecs left to fill */
1536 if (rdata->nr_iov > 1) {
1537 length = cifs_readv_from_socket(server, &rdata->iov[1],
1538 rdata->nr_iov - 1, len);
1539 if (length < 0)
1540 return length;
1541 server->total_read += length;
1542 } else {
1543 length = 0;
1544 }
1545
1546 rdata->bytes = length;
1547
5ffef7bf 1548 cFYI(1, "total_read=%u buflen=%u remaining=%u", server->total_read,
8d5ce4d2 1549 buflen, data_len);
e28bc5b1
JL
1550
1551 /* discard anything left over */
5ffef7bf 1552 if (server->total_read < buflen)
e28bc5b1
JL
1553 return cifs_readv_discard(server, mid);
1554
1555 dequeue_mid(mid, false);
1556 return length;
1557}
1558
e28bc5b1
JL
1559static void
1560cifs_readv_callback(struct mid_q_entry *mid)
1561{
1562 struct cifs_readdata *rdata = mid->callback_data;
1563 struct cifs_tcon *tcon = tlink_tcon(rdata->cfile->tlink);
1564 struct TCP_Server_Info *server = tcon->ses->server;
1565
7c9421e1
PS
1566 cFYI(1, "%s: mid=%llu state=%d result=%d bytes=%u", __func__,
1567 mid->mid, mid->mid_state, rdata->result, rdata->bytes);
e28bc5b1 1568
7c9421e1 1569 switch (mid->mid_state) {
e28bc5b1
JL
1570 case MID_RESPONSE_RECEIVED:
1571 /* result already set, check signature */
1572 if (server->sec_mode &
1573 (SECMODE_SIGN_REQUIRED | SECMODE_SIGN_ENABLED)) {
1574 if (cifs_verify_signature(rdata->iov, rdata->nr_iov,
1575 server, mid->sequence_number + 1))
1576 cERROR(1, "Unexpected SMB signature");
1577 }
1578 /* FIXME: should this be counted toward the initiating task? */
1579 task_io_account_read(rdata->bytes);
1580 cifs_stats_bytes_read(tcon, rdata->bytes);
1581 break;
1582 case MID_REQUEST_SUBMITTED:
1583 case MID_RETRY_NEEDED:
1584 rdata->result = -EAGAIN;
1585 break;
1586 default:
1587 rdata->result = -EIO;
1588 }
1589
da472fc8 1590 queue_work(cifsiod_wq, &rdata->work);
e28bc5b1 1591 DeleteMidQEntry(mid);
45275789 1592 add_credits(server, 1);
e28bc5b1
JL
1593}
1594
1595/* cifs_async_readv - send an async write, and set up mid to handle result */
1596int
1597cifs_async_readv(struct cifs_readdata *rdata)
1598{
1599 int rc;
1600 READ_REQ *smb = NULL;
1601 int wct;
1602 struct cifs_tcon *tcon = tlink_tcon(rdata->cfile->tlink);
1603
1604 cFYI(1, "%s: offset=%llu bytes=%u", __func__,
1605 rdata->offset, rdata->bytes);
1606
1607 if (tcon->ses->capabilities & CAP_LARGE_FILES)
1608 wct = 12;
1609 else {
1610 wct = 10; /* old style read */
1611 if ((rdata->offset >> 32) > 0) {
1612 /* can not handle this big offset for old */
1613 return -EIO;
1614 }
1615 }
1616
1617 rc = small_smb_init(SMB_COM_READ_ANDX, wct, tcon, (void **)&smb);
1618 if (rc)
1619 return rc;
1620
1621 smb->hdr.Pid = cpu_to_le16((__u16)rdata->pid);
1622 smb->hdr.PidHigh = cpu_to_le16((__u16)(rdata->pid >> 16));
1623
1624 smb->AndXCommand = 0xFF; /* none */
1625 smb->Fid = rdata->cfile->netfid;
1626 smb->OffsetLow = cpu_to_le32(rdata->offset & 0xFFFFFFFF);
1627 if (wct == 12)
1628 smb->OffsetHigh = cpu_to_le32(rdata->offset >> 32);
1629 smb->Remaining = 0;
1630 smb->MaxCount = cpu_to_le16(rdata->bytes & 0xFFFF);
1631 smb->MaxCountHigh = cpu_to_le32(rdata->bytes >> 16);
1632 if (wct == 12)
1633 smb->ByteCount = 0;
1634 else {
1635 /* old style read */
1636 struct smb_com_readx_req *smbr =
1637 (struct smb_com_readx_req *)smb;
1638 smbr->ByteCount = 0;
1639 }
1640
1641 /* 4 for RFC1001 length + 1 for BCC */
1642 rdata->iov[0].iov_base = smb;
1643 rdata->iov[0].iov_len = be32_to_cpu(smb->hdr.smb_buf_length) + 4;
1644
6993f74a 1645 kref_get(&rdata->refcount);
e28bc5b1
JL
1646 rc = cifs_call_async(tcon->ses->server, rdata->iov, 1,
1647 cifs_readv_receive, cifs_readv_callback,
1648 rdata, false);
1649
1650 if (rc == 0)
1651 cifs_stats_inc(&tcon->num_reads);
6993f74a
JL
1652 else
1653 kref_put(&rdata->refcount, cifs_readdata_release);
e28bc5b1
JL
1654
1655 cifs_small_buf_release(smb);
1656 return rc;
1657}
1658
1da177e4 1659int
d4ffff1f 1660CIFSSMBRead(const int xid, struct cifs_io_parms *io_parms, unsigned int *nbytes,
50c2f753 1661 char **buf, int *pbuf_type)
1da177e4
LT
1662{
1663 int rc = -EACCES;
1664 READ_REQ *pSMB = NULL;
1665 READ_RSP *pSMBr = NULL;
1666 char *pReadData = NULL;
bfa0d75a 1667 int wct;
ec637e3f
SF
1668 int resp_buf_type = 0;
1669 struct kvec iov[1];
d4ffff1f
PS
1670 __u32 pid = io_parms->pid;
1671 __u16 netfid = io_parms->netfid;
1672 __u64 offset = io_parms->offset;
96daf2b0 1673 struct cifs_tcon *tcon = io_parms->tcon;
d4ffff1f 1674 unsigned int count = io_parms->length;
1da177e4 1675
b6b38f70 1676 cFYI(1, "Reading %d bytes on fid %d", count, netfid);
790fe579 1677 if (tcon->ses->capabilities & CAP_LARGE_FILES)
bfa0d75a 1678 wct = 12;
4c3130ef 1679 else {
bfa0d75a 1680 wct = 10; /* old style read */
d4ffff1f 1681 if ((offset >> 32) > 0) {
4c3130ef
SF
1682 /* can not handle this big offset for old */
1683 return -EIO;
1684 }
1685 }
1da177e4
LT
1686
1687 *nbytes = 0;
ec637e3f 1688 rc = small_smb_init(SMB_COM_READ_ANDX, wct, tcon, (void **) &pSMB);
1da177e4
LT
1689 if (rc)
1690 return rc;
1691
d4ffff1f
PS
1692 pSMB->hdr.Pid = cpu_to_le16((__u16)pid);
1693 pSMB->hdr.PidHigh = cpu_to_le16((__u16)(pid >> 16));
1694
1da177e4
LT
1695 /* tcon and ses pointer are checked in smb_init */
1696 if (tcon->ses->server == NULL)
1697 return -ECONNABORTED;
1698
ec637e3f 1699 pSMB->AndXCommand = 0xFF; /* none */
1da177e4 1700 pSMB->Fid = netfid;
d4ffff1f 1701 pSMB->OffsetLow = cpu_to_le32(offset & 0xFFFFFFFF);
790fe579 1702 if (wct == 12)
d4ffff1f 1703 pSMB->OffsetHigh = cpu_to_le32(offset >> 32);
bfa0d75a 1704
1da177e4
LT
1705 pSMB->Remaining = 0;
1706 pSMB->MaxCount = cpu_to_le16(count & 0xFFFF);
1707 pSMB->MaxCountHigh = cpu_to_le32(count >> 16);
790fe579 1708 if (wct == 12)
bfa0d75a
SF
1709 pSMB->ByteCount = 0; /* no need to do le conversion since 0 */
1710 else {
1711 /* old style read */
50c2f753 1712 struct smb_com_readx_req *pSMBW =
bfa0d75a 1713 (struct smb_com_readx_req *)pSMB;
ec637e3f 1714 pSMBW->ByteCount = 0;
bfa0d75a 1715 }
ec637e3f
SF
1716
1717 iov[0].iov_base = (char *)pSMB;
be8e3b00 1718 iov[0].iov_len = be32_to_cpu(pSMB->hdr.smb_buf_length) + 4;
a761ac57 1719 rc = SendReceive2(xid, tcon->ses, iov, 1 /* num iovecs */,
7749981e 1720 &resp_buf_type, CIFS_LOG_ERROR);
a4544347 1721 cifs_stats_inc(&tcon->num_reads);
ec637e3f 1722 pSMBr = (READ_RSP *)iov[0].iov_base;
1da177e4 1723 if (rc) {
b6b38f70 1724 cERROR(1, "Send error in read = %d", rc);
1da177e4
LT
1725 } else {
1726 int data_length = le16_to_cpu(pSMBr->DataLengthHigh);
1727 data_length = data_length << 16;
1728 data_length += le16_to_cpu(pSMBr->DataLength);
1729 *nbytes = data_length;
1730
1731 /*check that DataLength would not go beyond end of SMB */
ec637e3f 1732 if ((data_length > CIFSMaxBufSize)
1da177e4 1733 || (data_length > count)) {
b6b38f70
JP
1734 cFYI(1, "bad length %d for count %d",
1735 data_length, count);
1da177e4
LT
1736 rc = -EIO;
1737 *nbytes = 0;
1738 } else {
ec637e3f 1739 pReadData = (char *) (&pSMBr->hdr.Protocol) +
26f57364
SF
1740 le16_to_cpu(pSMBr->DataOffset);
1741/* if (rc = copy_to_user(buf, pReadData, data_length)) {
b6b38f70 1742 cERROR(1, "Faulting on read rc = %d",rc);
50c2f753 1743 rc = -EFAULT;
26f57364 1744 }*/ /* can not use copy_to_user when using page cache*/
790fe579 1745 if (*buf)
50c2f753 1746 memcpy(*buf, pReadData, data_length);
1da177e4
LT
1747 }
1748 }
1da177e4 1749
4b8f930f 1750/* cifs_small_buf_release(pSMB); */ /* Freed earlier now in SendReceive2 */
790fe579
SF
1751 if (*buf) {
1752 if (resp_buf_type == CIFS_SMALL_BUFFER)
ec637e3f 1753 cifs_small_buf_release(iov[0].iov_base);
790fe579 1754 else if (resp_buf_type == CIFS_LARGE_BUFFER)
ec637e3f 1755 cifs_buf_release(iov[0].iov_base);
790fe579 1756 } else if (resp_buf_type != CIFS_NO_BUFFER) {
50c2f753
SF
1757 /* return buffer to caller to free */
1758 *buf = iov[0].iov_base;
790fe579 1759 if (resp_buf_type == CIFS_SMALL_BUFFER)
ec637e3f 1760 *pbuf_type = CIFS_SMALL_BUFFER;
790fe579 1761 else if (resp_buf_type == CIFS_LARGE_BUFFER)
ec637e3f 1762 *pbuf_type = CIFS_LARGE_BUFFER;
6cec2aed 1763 } /* else no valid buffer on return - leave as null */
ec637e3f
SF
1764
1765 /* Note: On -EAGAIN error only caller can retry on handle based calls
1da177e4
LT
1766 since file handle passed in no longer valid */
1767 return rc;
1768}
1769
ec637e3f 1770
1da177e4 1771int
fa2989f4
PS
1772CIFSSMBWrite(const int xid, struct cifs_io_parms *io_parms,
1773 unsigned int *nbytes, const char *buf,
50c2f753 1774 const char __user *ubuf, const int long_op)
1da177e4
LT
1775{
1776 int rc = -EACCES;
1777 WRITE_REQ *pSMB = NULL;
1778 WRITE_RSP *pSMBr = NULL;
1c955187 1779 int bytes_returned, wct;
1da177e4
LT
1780 __u32 bytes_sent;
1781 __u16 byte_count;
fa2989f4
PS
1782 __u32 pid = io_parms->pid;
1783 __u16 netfid = io_parms->netfid;
1784 __u64 offset = io_parms->offset;
96daf2b0 1785 struct cifs_tcon *tcon = io_parms->tcon;
fa2989f4 1786 unsigned int count = io_parms->length;
1da177e4 1787
a24e2d7d
SF
1788 *nbytes = 0;
1789
b6b38f70 1790 /* cFYI(1, "write at %lld %d bytes", offset, count);*/
790fe579 1791 if (tcon->ses == NULL)
1c955187
SF
1792 return -ECONNABORTED;
1793
790fe579 1794 if (tcon->ses->capabilities & CAP_LARGE_FILES)
1c955187 1795 wct = 14;
4c3130ef 1796 else {
1c955187 1797 wct = 12;
4c3130ef
SF
1798 if ((offset >> 32) > 0) {
1799 /* can not handle big offset for old srv */
1800 return -EIO;
1801 }
1802 }
1c955187
SF
1803
1804 rc = smb_init(SMB_COM_WRITE_ANDX, wct, tcon, (void **) &pSMB,
1da177e4
LT
1805 (void **) &pSMBr);
1806 if (rc)
1807 return rc;
fa2989f4
PS
1808
1809 pSMB->hdr.Pid = cpu_to_le16((__u16)pid);
1810 pSMB->hdr.PidHigh = cpu_to_le16((__u16)(pid >> 16));
1811
1da177e4
LT
1812 /* tcon and ses pointer are checked in smb_init */
1813 if (tcon->ses->server == NULL)
1814 return -ECONNABORTED;
1815
1816 pSMB->AndXCommand = 0xFF; /* none */
1817 pSMB->Fid = netfid;
1818 pSMB->OffsetLow = cpu_to_le32(offset & 0xFFFFFFFF);
790fe579 1819 if (wct == 14)
1c955187 1820 pSMB->OffsetHigh = cpu_to_le32(offset >> 32);
50c2f753 1821
1da177e4
LT
1822 pSMB->Reserved = 0xFFFFFFFF;
1823 pSMB->WriteMode = 0;
1824 pSMB->Remaining = 0;
1825
50c2f753 1826 /* Can increase buffer size if buffer is big enough in some cases ie we
1da177e4
LT
1827 can send more if LARGE_WRITE_X capability returned by the server and if
1828 our buffer is big enough or if we convert to iovecs on socket writes
1829 and eliminate the copy to the CIFS buffer */
790fe579 1830 if (tcon->ses->capabilities & CAP_LARGE_WRITE_X) {
1da177e4
LT
1831 bytes_sent = min_t(const unsigned int, CIFSMaxBufSize, count);
1832 } else {
1833 bytes_sent = (tcon->ses->server->maxBuf - MAX_CIFS_HDR_SIZE)
1834 & ~0xFF;
1835 }
1836
1837 if (bytes_sent > count)
1838 bytes_sent = count;
1839 pSMB->DataOffset =
50c2f753 1840 cpu_to_le16(offsetof(struct smb_com_write_req, Data) - 4);
790fe579 1841 if (buf)
61e74801 1842 memcpy(pSMB->Data, buf, bytes_sent);
790fe579
SF
1843 else if (ubuf) {
1844 if (copy_from_user(pSMB->Data, ubuf, bytes_sent)) {
1da177e4
LT
1845 cifs_buf_release(pSMB);
1846 return -EFAULT;
1847 }
e30dcf3a 1848 } else if (count != 0) {
1da177e4
LT
1849 /* No buffer */
1850 cifs_buf_release(pSMB);
1851 return -EINVAL;
e30dcf3a 1852 } /* else setting file size with write of zero bytes */
790fe579 1853 if (wct == 14)
e30dcf3a 1854 byte_count = bytes_sent + 1; /* pad */
ad7a2926 1855 else /* wct == 12 */
e30dcf3a 1856 byte_count = bytes_sent + 5; /* bigger pad, smaller smb hdr */
ad7a2926 1857
1da177e4
LT
1858 pSMB->DataLengthLow = cpu_to_le16(bytes_sent & 0xFFFF);
1859 pSMB->DataLengthHigh = cpu_to_le16(bytes_sent >> 16);
be8e3b00 1860 inc_rfc1001_len(pSMB, byte_count);
1c955187 1861
790fe579 1862 if (wct == 14)
1c955187 1863 pSMB->ByteCount = cpu_to_le16(byte_count);
50c2f753
SF
1864 else { /* old style write has byte count 4 bytes earlier
1865 so 4 bytes pad */
1866 struct smb_com_writex_req *pSMBW =
1c955187
SF
1867 (struct smb_com_writex_req *)pSMB;
1868 pSMBW->ByteCount = cpu_to_le16(byte_count);
1869 }
1da177e4
LT
1870
1871 rc = SendReceive(xid, tcon->ses, (struct smb_hdr *) pSMB,
1872 (struct smb_hdr *) pSMBr, &bytes_returned, long_op);
a4544347 1873 cifs_stats_inc(&tcon->num_writes);
1da177e4 1874 if (rc) {
f19159dc 1875 cFYI(1, "Send error in write = %d", rc);
1da177e4
LT
1876 } else {
1877 *nbytes = le16_to_cpu(pSMBr->CountHigh);
1878 *nbytes = (*nbytes) << 16;
1879 *nbytes += le16_to_cpu(pSMBr->Count);
6513a81e
SJ
1880
1881 /*
1882 * Mask off high 16 bits when bytes written as returned by the
1883 * server is greater than bytes requested by the client. Some
1884 * OS/2 servers are known to set incorrect CountHigh values.
1885 */
1886 if (*nbytes > count)
1887 *nbytes &= 0xFFFF;
1da177e4
LT
1888 }
1889
1890 cifs_buf_release(pSMB);
1891
50c2f753 1892 /* Note: On -EAGAIN error only caller can retry on handle based calls
1da177e4
LT
1893 since file handle passed in no longer valid */
1894
1895 return rc;
1896}
1897
c28c89fc
JL
1898void
1899cifs_writedata_release(struct kref *refcount)
1900{
1901 struct cifs_writedata *wdata = container_of(refcount,
1902 struct cifs_writedata, refcount);
1903
1904 if (wdata->cfile)
1905 cifsFileInfo_put(wdata->cfile);
1906
1907 kfree(wdata);
1908}
1909
1910/*
1911 * Write failed with a retryable error. Resend the write request. It's also
1912 * possible that the page was redirtied so re-clean the page.
1913 */
1914static void
1915cifs_writev_requeue(struct cifs_writedata *wdata)
1916{
1917 int i, rc;
1918 struct inode *inode = wdata->cfile->dentry->d_inode;
1919
1920 for (i = 0; i < wdata->nr_pages; i++) {
1921 lock_page(wdata->pages[i]);
1922 clear_page_dirty_for_io(wdata->pages[i]);
1923 }
1924
1925 do {
1926 rc = cifs_async_writev(wdata);
1927 } while (rc == -EAGAIN);
1928
1929 for (i = 0; i < wdata->nr_pages; i++) {
1930 if (rc != 0)
1931 SetPageError(wdata->pages[i]);
1932 unlock_page(wdata->pages[i]);
1933 }
1934
1935 mapping_set_error(inode->i_mapping, rc);
1936 kref_put(&wdata->refcount, cifs_writedata_release);
1937}
1938
c2e87640 1939void
c28c89fc
JL
1940cifs_writev_complete(struct work_struct *work)
1941{
1942 struct cifs_writedata *wdata = container_of(work,
1943 struct cifs_writedata, work);
1944 struct inode *inode = wdata->cfile->dentry->d_inode;
1945 int i = 0;
1946
1947 if (wdata->result == 0) {
597b027f 1948 spin_lock(&inode->i_lock);
c28c89fc 1949 cifs_update_eof(CIFS_I(inode), wdata->offset, wdata->bytes);
597b027f 1950 spin_unlock(&inode->i_lock);
c28c89fc
JL
1951 cifs_stats_bytes_written(tlink_tcon(wdata->cfile->tlink),
1952 wdata->bytes);
1953 } else if (wdata->sync_mode == WB_SYNC_ALL && wdata->result == -EAGAIN)
1954 return cifs_writev_requeue(wdata);
1955
1956 for (i = 0; i < wdata->nr_pages; i++) {
1957 struct page *page = wdata->pages[i];
1958 if (wdata->result == -EAGAIN)
1959 __set_page_dirty_nobuffers(page);
1960 else if (wdata->result < 0)
1961 SetPageError(page);
1962 end_page_writeback(page);
1963 page_cache_release(page);
1964 }
1965 if (wdata->result != -EAGAIN)
1966 mapping_set_error(inode->i_mapping, wdata->result);
1967 kref_put(&wdata->refcount, cifs_writedata_release);
1968}
1969
1970struct cifs_writedata *
c2e87640 1971cifs_writedata_alloc(unsigned int nr_pages, work_func_t complete)
c28c89fc
JL
1972{
1973 struct cifs_writedata *wdata;
1974
1975 /* this would overflow */
1976 if (nr_pages == 0) {
1977 cERROR(1, "%s: called with nr_pages == 0!", __func__);
1978 return NULL;
1979 }
1980
1981 /* writedata + number of page pointers */
1982 wdata = kzalloc(sizeof(*wdata) +
1983 sizeof(struct page *) * (nr_pages - 1), GFP_NOFS);
1984 if (wdata != NULL) {
c28c89fc 1985 kref_init(&wdata->refcount);
da82f7e7
JL
1986 INIT_LIST_HEAD(&wdata->list);
1987 init_completion(&wdata->done);
1988 INIT_WORK(&wdata->work, complete);
c28c89fc
JL
1989 }
1990 return wdata;
1991}
1992
1993/*
7c9421e1 1994 * Check the mid_state and signature on received buffer (if any), and queue the
c28c89fc
JL
1995 * workqueue completion task.
1996 */
1997static void
1998cifs_writev_callback(struct mid_q_entry *mid)
1999{
2000 struct cifs_writedata *wdata = mid->callback_data;
96daf2b0 2001 struct cifs_tcon *tcon = tlink_tcon(wdata->cfile->tlink);
c28c89fc
JL
2002 unsigned int written;
2003 WRITE_RSP *smb = (WRITE_RSP *)mid->resp_buf;
2004
7c9421e1 2005 switch (mid->mid_state) {
c28c89fc
JL
2006 case MID_RESPONSE_RECEIVED:
2007 wdata->result = cifs_check_receive(mid, tcon->ses->server, 0);
2008 if (wdata->result != 0)
2009 break;
2010
2011 written = le16_to_cpu(smb->CountHigh);
2012 written <<= 16;
2013 written += le16_to_cpu(smb->Count);
2014 /*
2015 * Mask off high 16 bits when bytes written as returned
2016 * by the server is greater than bytes requested by the
2017 * client. OS/2 servers are known to set incorrect
2018 * CountHigh values.
2019 */
2020 if (written > wdata->bytes)
2021 written &= 0xFFFF;
2022
2023 if (written < wdata->bytes)
2024 wdata->result = -ENOSPC;
2025 else
2026 wdata->bytes = written;
2027 break;
2028 case MID_REQUEST_SUBMITTED:
2029 case MID_RETRY_NEEDED:
2030 wdata->result = -EAGAIN;
2031 break;
2032 default:
2033 wdata->result = -EIO;
2034 break;
2035 }
2036
da472fc8 2037 queue_work(cifsiod_wq, &wdata->work);
c28c89fc 2038 DeleteMidQEntry(mid);
45275789 2039 add_credits(tcon->ses->server, 1);
c28c89fc
JL
2040}
2041
2042/* cifs_async_writev - send an async write, and set up mid to handle result */
2043int
2044cifs_async_writev(struct cifs_writedata *wdata)
2045{
2046 int i, rc = -EACCES;
2047 WRITE_REQ *smb = NULL;
2048 int wct;
96daf2b0 2049 struct cifs_tcon *tcon = tlink_tcon(wdata->cfile->tlink);
c28c89fc
JL
2050 struct kvec *iov = NULL;
2051
2052 if (tcon->ses->capabilities & CAP_LARGE_FILES) {
2053 wct = 14;
2054 } else {
2055 wct = 12;
2056 if (wdata->offset >> 32 > 0) {
2057 /* can not handle big offset for old srv */
2058 return -EIO;
2059 }
2060 }
2061
2062 rc = small_smb_init(SMB_COM_WRITE_ANDX, wct, tcon, (void **)&smb);
2063 if (rc)
2064 goto async_writev_out;
2065
2066 /* 1 iov per page + 1 for header */
2067 iov = kzalloc((wdata->nr_pages + 1) * sizeof(*iov), GFP_NOFS);
2068 if (iov == NULL) {
2069 rc = -ENOMEM;
2070 goto async_writev_out;
2071 }
2072
fe5f5d2e
JL
2073 smb->hdr.Pid = cpu_to_le16((__u16)wdata->pid);
2074 smb->hdr.PidHigh = cpu_to_le16((__u16)(wdata->pid >> 16));
fa2989f4 2075
c28c89fc
JL
2076 smb->AndXCommand = 0xFF; /* none */
2077 smb->Fid = wdata->cfile->netfid;
2078 smb->OffsetLow = cpu_to_le32(wdata->offset & 0xFFFFFFFF);
2079 if (wct == 14)
2080 smb->OffsetHigh = cpu_to_le32(wdata->offset >> 32);
2081 smb->Reserved = 0xFFFFFFFF;
2082 smb->WriteMode = 0;
2083 smb->Remaining = 0;
2084
2085 smb->DataOffset =
2086 cpu_to_le16(offsetof(struct smb_com_write_req, Data) - 4);
2087
2088 /* 4 for RFC1001 length + 1 for BCC */
2089 iov[0].iov_len = be32_to_cpu(smb->hdr.smb_buf_length) + 4 + 1;
2090 iov[0].iov_base = smb;
2091
e9492871
JL
2092 /*
2093 * This function should marshal up the page array into the kvec
2094 * array, reserving [0] for the header. It should kmap the pages
2095 * and set the iov_len properly for each one. It may also set
2096 * wdata->bytes too.
2097 */
3cf003c0 2098 cifs_kmap_lock();
e9492871 2099 wdata->marshal_iov(iov, wdata);
3cf003c0 2100 cifs_kmap_unlock();
c28c89fc
JL
2101
2102 cFYI(1, "async write at %llu %u bytes", wdata->offset, wdata->bytes);
2103
2104 smb->DataLengthLow = cpu_to_le16(wdata->bytes & 0xFFFF);
2105 smb->DataLengthHigh = cpu_to_le16(wdata->bytes >> 16);
2106
2107 if (wct == 14) {
2108 inc_rfc1001_len(&smb->hdr, wdata->bytes + 1);
2109 put_bcc(wdata->bytes + 1, &smb->hdr);
2110 } else {
2111 /* wct == 12 */
2112 struct smb_com_writex_req *smbw =
2113 (struct smb_com_writex_req *)smb;
2114 inc_rfc1001_len(&smbw->hdr, wdata->bytes + 5);
2115 put_bcc(wdata->bytes + 5, &smbw->hdr);
2116 iov[0].iov_len += 4; /* pad bigger by four bytes */
2117 }
2118
2119 kref_get(&wdata->refcount);
2120 rc = cifs_call_async(tcon->ses->server, iov, wdata->nr_pages + 1,
44d22d84 2121 NULL, cifs_writev_callback, wdata, false);
c28c89fc
JL
2122
2123 if (rc == 0)
2124 cifs_stats_inc(&tcon->num_writes);
2125 else
2126 kref_put(&wdata->refcount, cifs_writedata_release);
2127
2128 /* send is done, unmap pages */
2129 for (i = 0; i < wdata->nr_pages; i++)
2130 kunmap(wdata->pages[i]);
2131
2132async_writev_out:
2133 cifs_small_buf_release(smb);
2134 kfree(iov);
2135 return rc;
2136}
2137
d6e04ae6 2138int
fa2989f4
PS
2139CIFSSMBWrite2(const int xid, struct cifs_io_parms *io_parms,
2140 unsigned int *nbytes, struct kvec *iov, int n_vec,
2141 const int long_op)
1da177e4
LT
2142{
2143 int rc = -EACCES;
2144 WRITE_REQ *pSMB = NULL;
ec637e3f 2145 int wct;
d6e04ae6 2146 int smb_hdr_len;
ec637e3f 2147 int resp_buf_type = 0;
fa2989f4
PS
2148 __u32 pid = io_parms->pid;
2149 __u16 netfid = io_parms->netfid;
2150 __u64 offset = io_parms->offset;
96daf2b0 2151 struct cifs_tcon *tcon = io_parms->tcon;
fa2989f4 2152 unsigned int count = io_parms->length;
1da177e4 2153
fbec9ab9
JL
2154 *nbytes = 0;
2155
b6b38f70 2156 cFYI(1, "write2 at %lld %d bytes", (long long)offset, count);
ff7feac9 2157
4c3130ef 2158 if (tcon->ses->capabilities & CAP_LARGE_FILES) {
8cc64c6e 2159 wct = 14;
4c3130ef 2160 } else {
8cc64c6e 2161 wct = 12;
4c3130ef
SF
2162 if ((offset >> 32) > 0) {
2163 /* can not handle big offset for old srv */
2164 return -EIO;
2165 }
2166 }
8cc64c6e 2167 rc = small_smb_init(SMB_COM_WRITE_ANDX, wct, tcon, (void **) &pSMB);
1da177e4
LT
2168 if (rc)
2169 return rc;
fa2989f4
PS
2170
2171 pSMB->hdr.Pid = cpu_to_le16((__u16)pid);
2172 pSMB->hdr.PidHigh = cpu_to_le16((__u16)(pid >> 16));
2173
1da177e4
LT
2174 /* tcon and ses pointer are checked in smb_init */
2175 if (tcon->ses->server == NULL)
2176 return -ECONNABORTED;
2177
d6e04ae6 2178 pSMB->AndXCommand = 0xFF; /* none */
1da177e4
LT
2179 pSMB->Fid = netfid;
2180 pSMB->OffsetLow = cpu_to_le32(offset & 0xFFFFFFFF);
790fe579 2181 if (wct == 14)
8cc64c6e 2182 pSMB->OffsetHigh = cpu_to_le32(offset >> 32);
1da177e4
LT
2183 pSMB->Reserved = 0xFFFFFFFF;
2184 pSMB->WriteMode = 0;
2185 pSMB->Remaining = 0;
d6e04ae6 2186
1da177e4 2187 pSMB->DataOffset =
50c2f753 2188 cpu_to_le16(offsetof(struct smb_com_write_req, Data) - 4);
1da177e4 2189
3e84469d
SF
2190 pSMB->DataLengthLow = cpu_to_le16(count & 0xFFFF);
2191 pSMB->DataLengthHigh = cpu_to_le16(count >> 16);
be8e3b00
SF
2192 /* header + 1 byte pad */
2193 smb_hdr_len = be32_to_cpu(pSMB->hdr.smb_buf_length) + 1;
790fe579 2194 if (wct == 14)
be8e3b00 2195 inc_rfc1001_len(pSMB, count + 1);
8cc64c6e 2196 else /* wct == 12 */
be8e3b00 2197 inc_rfc1001_len(pSMB, count + 5); /* smb data starts later */
790fe579 2198 if (wct == 14)
8cc64c6e
SF
2199 pSMB->ByteCount = cpu_to_le16(count + 1);
2200 else /* wct == 12 */ /* bigger pad, smaller smb hdr, keep offset ok */ {
50c2f753 2201 struct smb_com_writex_req *pSMBW =
8cc64c6e
SF
2202 (struct smb_com_writex_req *)pSMB;
2203 pSMBW->ByteCount = cpu_to_le16(count + 5);
2204 }
3e84469d 2205 iov[0].iov_base = pSMB;
790fe579 2206 if (wct == 14)
ec637e3f
SF
2207 iov[0].iov_len = smb_hdr_len + 4;
2208 else /* wct == 12 pad bigger by four bytes */
2209 iov[0].iov_len = smb_hdr_len + 8;
50c2f753 2210
1da177e4 2211
ec637e3f 2212 rc = SendReceive2(xid, tcon->ses, iov, n_vec + 1, &resp_buf_type,
133672ef 2213 long_op);
a4544347 2214 cifs_stats_inc(&tcon->num_writes);
1da177e4 2215 if (rc) {
b6b38f70 2216 cFYI(1, "Send error Write2 = %d", rc);
790fe579 2217 } else if (resp_buf_type == 0) {
ec637e3f
SF
2218 /* presumably this can not happen, but best to be safe */
2219 rc = -EIO;
d6e04ae6 2220 } else {
ad7a2926 2221 WRITE_RSP *pSMBr = (WRITE_RSP *)iov[0].iov_base;
d6e04ae6
SF
2222 *nbytes = le16_to_cpu(pSMBr->CountHigh);
2223 *nbytes = (*nbytes) << 16;
2224 *nbytes += le16_to_cpu(pSMBr->Count);
6513a81e
SJ
2225
2226 /*
2227 * Mask off high 16 bits when bytes written as returned by the
2228 * server is greater than bytes requested by the client. OS/2
2229 * servers are known to set incorrect CountHigh values.
2230 */
2231 if (*nbytes > count)
2232 *nbytes &= 0xFFFF;
50c2f753 2233 }
1da177e4 2234
4b8f930f 2235/* cifs_small_buf_release(pSMB); */ /* Freed earlier now in SendReceive2 */
790fe579 2236 if (resp_buf_type == CIFS_SMALL_BUFFER)
ec637e3f 2237 cifs_small_buf_release(iov[0].iov_base);
790fe579 2238 else if (resp_buf_type == CIFS_LARGE_BUFFER)
ec637e3f 2239 cifs_buf_release(iov[0].iov_base);
1da177e4 2240
50c2f753 2241 /* Note: On -EAGAIN error only caller can retry on handle based calls
1da177e4
LT
2242 since file handle passed in no longer valid */
2243
2244 return rc;
2245}
d6e04ae6 2246
9ee305b7
PS
2247int cifs_lockv(const int xid, struct cifs_tcon *tcon, const __u16 netfid,
2248 const __u8 lock_type, const __u32 num_unlock,
2249 const __u32 num_lock, LOCKING_ANDX_RANGE *buf)
2250{
2251 int rc = 0;
2252 LOCK_REQ *pSMB = NULL;
2253 struct kvec iov[2];
2254 int resp_buf_type;
2255 __u16 count;
2256
2257 cFYI(1, "cifs_lockv num lock %d num unlock %d", num_lock, num_unlock);
2258
2259 rc = small_smb_init(SMB_COM_LOCKING_ANDX, 8, tcon, (void **) &pSMB);
2260 if (rc)
2261 return rc;
2262
2263 pSMB->Timeout = 0;
2264 pSMB->NumberOfLocks = cpu_to_le16(num_lock);
2265 pSMB->NumberOfUnlocks = cpu_to_le16(num_unlock);
2266 pSMB->LockType = lock_type;
2267 pSMB->AndXCommand = 0xFF; /* none */
2268 pSMB->Fid = netfid; /* netfid stays le */
2269
2270 count = (num_unlock + num_lock) * sizeof(LOCKING_ANDX_RANGE);
2271 inc_rfc1001_len(pSMB, count);
2272 pSMB->ByteCount = cpu_to_le16(count);
2273
2274 iov[0].iov_base = (char *)pSMB;
2275 iov[0].iov_len = be32_to_cpu(pSMB->hdr.smb_buf_length) + 4 -
2276 (num_unlock + num_lock) * sizeof(LOCKING_ANDX_RANGE);
2277 iov[1].iov_base = (char *)buf;
2278 iov[1].iov_len = (num_unlock + num_lock) * sizeof(LOCKING_ANDX_RANGE);
2279
2280 cifs_stats_inc(&tcon->num_locks);
2281 rc = SendReceive2(xid, tcon->ses, iov, 2, &resp_buf_type, CIFS_NO_RESP);
2282 if (rc)
2283 cFYI(1, "Send error in cifs_lockv = %d", rc);
2284
2285 return rc;
2286}
d6e04ae6 2287
1da177e4 2288int
96daf2b0 2289CIFSSMBLock(const int xid, struct cifs_tcon *tcon,
03776f45 2290 const __u16 smb_file_id, const __u32 netpid, const __u64 len,
1da177e4 2291 const __u64 offset, const __u32 numUnlock,
12fed00d
PS
2292 const __u32 numLock, const __u8 lockType,
2293 const bool waitFlag, const __u8 oplock_level)
1da177e4
LT
2294{
2295 int rc = 0;
2296 LOCK_REQ *pSMB = NULL;
aaa9bbe0 2297/* LOCK_RSP *pSMBr = NULL; */ /* No response data other than rc to parse */
1da177e4
LT
2298 int bytes_returned;
2299 int timeout = 0;
2300 __u16 count;
2301
b6b38f70 2302 cFYI(1, "CIFSSMBLock timeout %d numLock %d", (int)waitFlag, numLock);
46810cbf
SF
2303 rc = small_smb_init(SMB_COM_LOCKING_ANDX, 8, tcon, (void **) &pSMB);
2304
1da177e4
LT
2305 if (rc)
2306 return rc;
2307
790fe579 2308 if (lockType == LOCKING_ANDX_OPLOCK_RELEASE) {
133672ef 2309 timeout = CIFS_ASYNC_OP; /* no response expected */
1da177e4 2310 pSMB->Timeout = 0;
4b18f2a9 2311 } else if (waitFlag) {
133672ef 2312 timeout = CIFS_BLOCKING_OP; /* blocking operation, no timeout */
1da177e4
LT
2313 pSMB->Timeout = cpu_to_le32(-1);/* blocking - do not time out */
2314 } else {
2315 pSMB->Timeout = 0;
2316 }
2317
2318 pSMB->NumberOfLocks = cpu_to_le16(numLock);
2319 pSMB->NumberOfUnlocks = cpu_to_le16(numUnlock);
2320 pSMB->LockType = lockType;
12fed00d 2321 pSMB->OplockLevel = oplock_level;
1da177e4
LT
2322 pSMB->AndXCommand = 0xFF; /* none */
2323 pSMB->Fid = smb_file_id; /* netfid stays le */
2324
790fe579 2325 if ((numLock != 0) || (numUnlock != 0)) {
03776f45 2326 pSMB->Locks[0].Pid = cpu_to_le16(netpid);
1da177e4
LT
2327 /* BB where to store pid high? */
2328 pSMB->Locks[0].LengthLow = cpu_to_le32((u32)len);
2329 pSMB->Locks[0].LengthHigh = cpu_to_le32((u32)(len>>32));
2330 pSMB->Locks[0].OffsetLow = cpu_to_le32((u32)offset);
2331 pSMB->Locks[0].OffsetHigh = cpu_to_le32((u32)(offset>>32));
2332 count = sizeof(LOCKING_ANDX_RANGE);
2333 } else {
2334 /* oplock break */
2335 count = 0;
2336 }
be8e3b00 2337 inc_rfc1001_len(pSMB, count);
1da177e4
LT
2338 pSMB->ByteCount = cpu_to_le16(count);
2339
7ee1af76
JA
2340 if (waitFlag) {
2341 rc = SendReceiveBlockingLock(xid, tcon, (struct smb_hdr *) pSMB,
aaa9bbe0 2342 (struct smb_hdr *) pSMB, &bytes_returned);
133672ef 2343 cifs_small_buf_release(pSMB);
7ee1af76 2344 } else {
792af7b0 2345 rc = SendReceiveNoRsp(xid, tcon->ses, (char *)pSMB, timeout);
133672ef 2346 /* SMB buffer freed by function above */
7ee1af76 2347 }
a4544347 2348 cifs_stats_inc(&tcon->num_locks);
ad7a2926 2349 if (rc)
b6b38f70 2350 cFYI(1, "Send error in Lock = %d", rc);
1da177e4 2351
50c2f753 2352 /* Note: On -EAGAIN error only caller can retry on handle based calls
1da177e4
LT
2353 since file handle passed in no longer valid */
2354 return rc;
2355}
2356
08547b03 2357int
96daf2b0 2358CIFSSMBPosixLock(const int xid, struct cifs_tcon *tcon,
c5fd363d
JL
2359 const __u16 smb_file_id, const __u32 netpid,
2360 const loff_t start_offset, const __u64 len,
2361 struct file_lock *pLockData, const __u16 lock_type,
2362 const bool waitFlag)
08547b03
SF
2363{
2364 struct smb_com_transaction2_sfi_req *pSMB = NULL;
2365 struct smb_com_transaction2_sfi_rsp *pSMBr = NULL;
08547b03
SF
2366 struct cifs_posix_lock *parm_data;
2367 int rc = 0;
3a5ff61c 2368 int timeout = 0;
08547b03 2369 int bytes_returned = 0;
133672ef 2370 int resp_buf_type = 0;
08547b03 2371 __u16 params, param_offset, offset, byte_count, count;
133672ef 2372 struct kvec iov[1];
08547b03 2373
b6b38f70 2374 cFYI(1, "Posix Lock");
fc94cdb9 2375
08547b03
SF
2376 rc = small_smb_init(SMB_COM_TRANSACTION2, 15, tcon, (void **) &pSMB);
2377
2378 if (rc)
2379 return rc;
2380
2381 pSMBr = (struct smb_com_transaction2_sfi_rsp *)pSMB;
2382
50c2f753 2383 params = 6;
08547b03
SF
2384 pSMB->MaxSetupCount = 0;
2385 pSMB->Reserved = 0;
2386 pSMB->Flags = 0;
08547b03
SF
2387 pSMB->Reserved2 = 0;
2388 param_offset = offsetof(struct smb_com_transaction2_sfi_req, Fid) - 4;
2389 offset = param_offset + params;
2390
08547b03
SF
2391 count = sizeof(struct cifs_posix_lock);
2392 pSMB->MaxParameterCount = cpu_to_le16(2);
ad7a2926 2393 pSMB->MaxDataCount = cpu_to_le16(1000); /* BB find max SMB from sess */
08547b03
SF
2394 pSMB->SetupCount = 1;
2395 pSMB->Reserved3 = 0;
c5fd363d 2396 if (pLockData)
08547b03
SF
2397 pSMB->SubCommand = cpu_to_le16(TRANS2_QUERY_FILE_INFORMATION);
2398 else
2399 pSMB->SubCommand = cpu_to_le16(TRANS2_SET_FILE_INFORMATION);
2400 byte_count = 3 /* pad */ + params + count;
2401 pSMB->DataCount = cpu_to_le16(count);
2402 pSMB->ParameterCount = cpu_to_le16(params);
2403 pSMB->TotalDataCount = pSMB->DataCount;
2404 pSMB->TotalParameterCount = pSMB->ParameterCount;
2405 pSMB->ParameterOffset = cpu_to_le16(param_offset);
50c2f753 2406 parm_data = (struct cifs_posix_lock *)
08547b03
SF
2407 (((char *) &pSMB->hdr.Protocol) + offset);
2408
2409 parm_data->lock_type = cpu_to_le16(lock_type);
790fe579 2410 if (waitFlag) {
133672ef 2411 timeout = CIFS_BLOCKING_OP; /* blocking operation, no timeout */
cec6815a 2412 parm_data->lock_flags = cpu_to_le16(1);
3a5ff61c
SF
2413 pSMB->Timeout = cpu_to_le32(-1);
2414 } else
2415 pSMB->Timeout = 0;
2416
4f6bcec9 2417 parm_data->pid = cpu_to_le32(netpid);
c5fd363d 2418 parm_data->start = cpu_to_le64(start_offset);
cec6815a 2419 parm_data->length = cpu_to_le64(len); /* normalize negative numbers */
08547b03
SF
2420
2421 pSMB->DataOffset = cpu_to_le16(offset);
f26282c9 2422 pSMB->Fid = smb_file_id;
08547b03
SF
2423 pSMB->InformationLevel = cpu_to_le16(SMB_SET_POSIX_LOCK);
2424 pSMB->Reserved4 = 0;
be8e3b00 2425 inc_rfc1001_len(pSMB, byte_count);
08547b03 2426 pSMB->ByteCount = cpu_to_le16(byte_count);
7ee1af76
JA
2427 if (waitFlag) {
2428 rc = SendReceiveBlockingLock(xid, tcon, (struct smb_hdr *) pSMB,
2429 (struct smb_hdr *) pSMBr, &bytes_returned);
2430 } else {
133672ef 2431 iov[0].iov_base = (char *)pSMB;
be8e3b00 2432 iov[0].iov_len = be32_to_cpu(pSMB->hdr.smb_buf_length) + 4;
133672ef
SF
2433 rc = SendReceive2(xid, tcon->ses, iov, 1 /* num iovecs */,
2434 &resp_buf_type, timeout);
2435 pSMB = NULL; /* request buf already freed by SendReceive2. Do
2436 not try to free it twice below on exit */
2437 pSMBr = (struct smb_com_transaction2_sfi_rsp *)iov[0].iov_base;
7ee1af76
JA
2438 }
2439
08547b03 2440 if (rc) {
b6b38f70 2441 cFYI(1, "Send error in Posix Lock = %d", rc);
c5fd363d 2442 } else if (pLockData) {
fc94cdb9
SF
2443 /* lock structure can be returned on get */
2444 __u16 data_offset;
2445 __u16 data_count;
2446 rc = validate_t2((struct smb_t2_rsp *)pSMBr);
2447
820a803f 2448 if (rc || get_bcc(&pSMBr->hdr) < sizeof(*parm_data)) {
fc94cdb9
SF
2449 rc = -EIO; /* bad smb */
2450 goto plk_err_exit;
2451 }
fc94cdb9
SF
2452 data_offset = le16_to_cpu(pSMBr->t2.DataOffset);
2453 data_count = le16_to_cpu(pSMBr->t2.DataCount);
790fe579 2454 if (data_count < sizeof(struct cifs_posix_lock)) {
fc94cdb9
SF
2455 rc = -EIO;
2456 goto plk_err_exit;
2457 }
2458 parm_data = (struct cifs_posix_lock *)
2459 ((char *)&pSMBr->hdr.Protocol + data_offset);
f05337c6 2460 if (parm_data->lock_type == __constant_cpu_to_le16(CIFS_UNLCK))
fc94cdb9 2461 pLockData->fl_type = F_UNLCK;
f05337c6
PS
2462 else {
2463 if (parm_data->lock_type ==
2464 __constant_cpu_to_le16(CIFS_RDLCK))
2465 pLockData->fl_type = F_RDLCK;
2466 else if (parm_data->lock_type ==
2467 __constant_cpu_to_le16(CIFS_WRLCK))
2468 pLockData->fl_type = F_WRLCK;
2469
5443d130
SF
2470 pLockData->fl_start = le64_to_cpu(parm_data->start);
2471 pLockData->fl_end = pLockData->fl_start +
2472 le64_to_cpu(parm_data->length) - 1;
2473 pLockData->fl_pid = le32_to_cpu(parm_data->pid);
f05337c6 2474 }
08547b03 2475 }
50c2f753 2476
fc94cdb9 2477plk_err_exit:
08547b03
SF
2478 if (pSMB)
2479 cifs_small_buf_release(pSMB);
2480
133672ef
SF
2481 if (resp_buf_type == CIFS_SMALL_BUFFER)
2482 cifs_small_buf_release(iov[0].iov_base);
2483 else if (resp_buf_type == CIFS_LARGE_BUFFER)
2484 cifs_buf_release(iov[0].iov_base);
2485
08547b03
SF
2486 /* Note: On -EAGAIN error only caller can retry on handle based calls
2487 since file handle passed in no longer valid */
2488
2489 return rc;
2490}
2491
2492
1da177e4 2493int
96daf2b0 2494CIFSSMBClose(const int xid, struct cifs_tcon *tcon, int smb_file_id)
1da177e4
LT
2495{
2496 int rc = 0;
2497 CLOSE_REQ *pSMB = NULL;
b6b38f70 2498 cFYI(1, "In CIFSSMBClose");
1da177e4
LT
2499
2500/* do not retry on dead session on close */
2501 rc = small_smb_init(SMB_COM_CLOSE, 3, tcon, (void **) &pSMB);
790fe579 2502 if (rc == -EAGAIN)
1da177e4
LT
2503 return 0;
2504 if (rc)
2505 return rc;
2506
1da177e4 2507 pSMB->FileID = (__u16) smb_file_id;
b815f1e5 2508 pSMB->LastWriteTime = 0xFFFFFFFF;
1da177e4 2509 pSMB->ByteCount = 0;
792af7b0 2510 rc = SendReceiveNoRsp(xid, tcon->ses, (char *) pSMB, 0);
a4544347 2511 cifs_stats_inc(&tcon->num_closes);
1da177e4 2512 if (rc) {
790fe579 2513 if (rc != -EINTR) {
1da177e4 2514 /* EINTR is expected when user ctl-c to kill app */
b6b38f70 2515 cERROR(1, "Send error in Close = %d", rc);
1da177e4
LT
2516 }
2517 }
2518
1da177e4 2519 /* Since session is dead, file will be closed on server already */
790fe579 2520 if (rc == -EAGAIN)
1da177e4
LT
2521 rc = 0;
2522
2523 return rc;
2524}
2525
b298f223 2526int
96daf2b0 2527CIFSSMBFlush(const int xid, struct cifs_tcon *tcon, int smb_file_id)
b298f223
SF
2528{
2529 int rc = 0;
2530 FLUSH_REQ *pSMB = NULL;
b6b38f70 2531 cFYI(1, "In CIFSSMBFlush");
b298f223
SF
2532
2533 rc = small_smb_init(SMB_COM_FLUSH, 1, tcon, (void **) &pSMB);
2534 if (rc)
2535 return rc;
2536
2537 pSMB->FileID = (__u16) smb_file_id;
2538 pSMB->ByteCount = 0;
792af7b0 2539 rc = SendReceiveNoRsp(xid, tcon->ses, (char *) pSMB, 0);
b298f223
SF
2540 cifs_stats_inc(&tcon->num_flushes);
2541 if (rc)
b6b38f70 2542 cERROR(1, "Send error in Flush = %d", rc);
b298f223
SF
2543
2544 return rc;
2545}
2546
1da177e4 2547int
96daf2b0 2548CIFSSMBRename(const int xid, struct cifs_tcon *tcon,
1da177e4 2549 const char *fromName, const char *toName,
737b758c 2550 const struct nls_table *nls_codepage, int remap)
1da177e4
LT
2551{
2552 int rc = 0;
2553 RENAME_REQ *pSMB = NULL;
2554 RENAME_RSP *pSMBr = NULL;
2555 int bytes_returned;
2556 int name_len, name_len2;
2557 __u16 count;
2558
b6b38f70 2559 cFYI(1, "In CIFSSMBRename");
1da177e4
LT
2560renameRetry:
2561 rc = smb_init(SMB_COM_RENAME, 1, tcon, (void **) &pSMB,
2562 (void **) &pSMBr);
2563 if (rc)
2564 return rc;
2565
2566 pSMB->BufferFormat = 0x04;
2567 pSMB->SearchAttributes =
2568 cpu_to_le16(ATTR_READONLY | ATTR_HIDDEN | ATTR_SYSTEM |
2569 ATTR_DIRECTORY);
2570
2571 if (pSMB->hdr.Flags2 & SMBFLG2_UNICODE) {
2572 name_len =
acbbb76a
SF
2573 cifsConvertToUTF16((__le16 *) pSMB->OldFileName, fromName,
2574 PATH_MAX, nls_codepage, remap);
1da177e4
LT
2575 name_len++; /* trailing null */
2576 name_len *= 2;
2577 pSMB->OldFileName[name_len] = 0x04; /* pad */
2578 /* protocol requires ASCII signature byte on Unicode string */
2579 pSMB->OldFileName[name_len + 1] = 0x00;
2580 name_len2 =
acbbb76a
SF
2581 cifsConvertToUTF16((__le16 *)&pSMB->OldFileName[name_len+2],
2582 toName, PATH_MAX, nls_codepage, remap);
1da177e4
LT
2583 name_len2 += 1 /* trailing null */ + 1 /* Signature word */ ;
2584 name_len2 *= 2; /* convert to bytes */
50c2f753 2585 } else { /* BB improve the check for buffer overruns BB */
1da177e4
LT
2586 name_len = strnlen(fromName, PATH_MAX);
2587 name_len++; /* trailing null */
2588 strncpy(pSMB->OldFileName, fromName, name_len);
2589 name_len2 = strnlen(toName, PATH_MAX);
2590 name_len2++; /* trailing null */
2591 pSMB->OldFileName[name_len] = 0x04; /* 2nd buffer format */
2592 strncpy(&pSMB->OldFileName[name_len + 1], toName, name_len2);
2593 name_len2++; /* trailing null */
2594 name_len2++; /* signature byte */
2595 }
2596
2597 count = 1 /* 1st signature byte */ + name_len + name_len2;
be8e3b00 2598 inc_rfc1001_len(pSMB, count);
1da177e4
LT
2599 pSMB->ByteCount = cpu_to_le16(count);
2600
2601 rc = SendReceive(xid, tcon->ses, (struct smb_hdr *) pSMB,
2602 (struct smb_hdr *) pSMBr, &bytes_returned, 0);
a4544347 2603 cifs_stats_inc(&tcon->num_renames);
ad7a2926 2604 if (rc)
b6b38f70 2605 cFYI(1, "Send error in rename = %d", rc);
1da177e4 2606
1da177e4
LT
2607 cifs_buf_release(pSMB);
2608
2609 if (rc == -EAGAIN)
2610 goto renameRetry;
2611
2612 return rc;
2613}
2614
96daf2b0 2615int CIFSSMBRenameOpenFile(const int xid, struct cifs_tcon *pTcon,
391e5755 2616 int netfid, const char *target_name,
50c2f753 2617 const struct nls_table *nls_codepage, int remap)
1da177e4
LT
2618{
2619 struct smb_com_transaction2_sfi_req *pSMB = NULL;
2620 struct smb_com_transaction2_sfi_rsp *pSMBr = NULL;
50c2f753 2621 struct set_file_rename *rename_info;
1da177e4
LT
2622 char *data_offset;
2623 char dummy_string[30];
2624 int rc = 0;
2625 int bytes_returned = 0;
2626 int len_of_str;
2627 __u16 params, param_offset, offset, count, byte_count;
2628
b6b38f70 2629 cFYI(1, "Rename to File by handle");
1da177e4
LT
2630 rc = smb_init(SMB_COM_TRANSACTION2, 15, pTcon, (void **) &pSMB,
2631 (void **) &pSMBr);
2632 if (rc)
2633 return rc;
2634
2635 params = 6;
2636 pSMB->MaxSetupCount = 0;
2637 pSMB->Reserved = 0;
2638 pSMB->Flags = 0;
2639 pSMB->Timeout = 0;
2640 pSMB->Reserved2 = 0;
2641 param_offset = offsetof(struct smb_com_transaction2_sfi_req, Fid) - 4;
2642 offset = param_offset + params;
2643
2644 data_offset = (char *) (&pSMB->hdr.Protocol) + offset;
2645 rename_info = (struct set_file_rename *) data_offset;
2646 pSMB->MaxParameterCount = cpu_to_le16(2);
ad7a2926 2647 pSMB->MaxDataCount = cpu_to_le16(1000); /* BB find max SMB from sess */
1da177e4
LT
2648 pSMB->SetupCount = 1;
2649 pSMB->Reserved3 = 0;
2650 pSMB->SubCommand = cpu_to_le16(TRANS2_SET_FILE_INFORMATION);
2651 byte_count = 3 /* pad */ + params;
2652 pSMB->ParameterCount = cpu_to_le16(params);
2653 pSMB->TotalParameterCount = pSMB->ParameterCount;
2654 pSMB->ParameterOffset = cpu_to_le16(param_offset);
2655 pSMB->DataOffset = cpu_to_le16(offset);
2656 /* construct random name ".cifs_tmp<inodenum><mid>" */
2657 rename_info->overwrite = cpu_to_le32(1);
2658 rename_info->root_fid = 0;
2659 /* unicode only call */
790fe579 2660 if (target_name == NULL) {
50c2f753 2661 sprintf(dummy_string, "cifs%x", pSMB->hdr.Mid);
acbbb76a
SF
2662 len_of_str =
2663 cifsConvertToUTF16((__le16 *)rename_info->target_name,
737b758c 2664 dummy_string, 24, nls_codepage, remap);
1da177e4 2665 } else {
acbbb76a
SF
2666 len_of_str =
2667 cifsConvertToUTF16((__le16 *)rename_info->target_name,
50c2f753
SF
2668 target_name, PATH_MAX, nls_codepage,
2669 remap);
1da177e4
LT
2670 }
2671 rename_info->target_name_len = cpu_to_le32(2 * len_of_str);
391e5755 2672 count = 12 /* sizeof(struct set_file_rename) */ + (2 * len_of_str);
1da177e4
LT
2673 byte_count += count;
2674 pSMB->DataCount = cpu_to_le16(count);
2675 pSMB->TotalDataCount = pSMB->DataCount;
2676 pSMB->Fid = netfid;
2677 pSMB->InformationLevel =
2678 cpu_to_le16(SMB_SET_FILE_RENAME_INFORMATION);
2679 pSMB->Reserved4 = 0;
be8e3b00 2680 inc_rfc1001_len(pSMB, byte_count);
1da177e4
LT
2681 pSMB->ByteCount = cpu_to_le16(byte_count);
2682 rc = SendReceive(xid, pTcon->ses, (struct smb_hdr *) pSMB,
50c2f753 2683 (struct smb_hdr *) pSMBr, &bytes_returned, 0);
a4544347 2684 cifs_stats_inc(&pTcon->num_t2renames);
ad7a2926 2685 if (rc)
b6b38f70 2686 cFYI(1, "Send error in Rename (by file handle) = %d", rc);
a5a2b489 2687
1da177e4
LT
2688 cifs_buf_release(pSMB);
2689
2690 /* Note: On -EAGAIN error only caller can retry on handle based calls
2691 since file handle passed in no longer valid */
2692
2693 return rc;
2694}
2695
2696int
96daf2b0 2697CIFSSMBCopy(const int xid, struct cifs_tcon *tcon, const char *fromName,
50c2f753
SF
2698 const __u16 target_tid, const char *toName, const int flags,
2699 const struct nls_table *nls_codepage, int remap)
1da177e4
LT
2700{
2701 int rc = 0;
2702 COPY_REQ *pSMB = NULL;
2703 COPY_RSP *pSMBr = NULL;
2704 int bytes_returned;
2705 int name_len, name_len2;
2706 __u16 count;
2707
b6b38f70 2708 cFYI(1, "In CIFSSMBCopy");
1da177e4
LT
2709copyRetry:
2710 rc = smb_init(SMB_COM_COPY, 1, tcon, (void **) &pSMB,
2711 (void **) &pSMBr);
2712 if (rc)
2713 return rc;
2714
2715 pSMB->BufferFormat = 0x04;
2716 pSMB->Tid2 = target_tid;
2717
2718 pSMB->Flags = cpu_to_le16(flags & COPY_TREE);
2719
2720 if (pSMB->hdr.Flags2 & SMBFLG2_UNICODE) {
acbbb76a
SF
2721 name_len = cifsConvertToUTF16((__le16 *) pSMB->OldFileName,
2722 fromName, PATH_MAX, nls_codepage,
2723 remap);
1da177e4
LT
2724 name_len++; /* trailing null */
2725 name_len *= 2;
2726 pSMB->OldFileName[name_len] = 0x04; /* pad */
2727 /* protocol requires ASCII signature byte on Unicode string */
2728 pSMB->OldFileName[name_len + 1] = 0x00;
50c2f753 2729 name_len2 =
acbbb76a
SF
2730 cifsConvertToUTF16((__le16 *)&pSMB->OldFileName[name_len+2],
2731 toName, PATH_MAX, nls_codepage, remap);
1da177e4
LT
2732 name_len2 += 1 /* trailing null */ + 1 /* Signature word */ ;
2733 name_len2 *= 2; /* convert to bytes */
50c2f753 2734 } else { /* BB improve the check for buffer overruns BB */
1da177e4
LT
2735 name_len = strnlen(fromName, PATH_MAX);
2736 name_len++; /* trailing null */
2737 strncpy(pSMB->OldFileName, fromName, name_len);
2738 name_len2 = strnlen(toName, PATH_MAX);
2739 name_len2++; /* trailing null */
2740 pSMB->OldFileName[name_len] = 0x04; /* 2nd buffer format */
2741 strncpy(&pSMB->OldFileName[name_len + 1], toName, name_len2);
2742 name_len2++; /* trailing null */
2743 name_len2++; /* signature byte */
2744 }
2745
2746 count = 1 /* 1st signature byte */ + name_len + name_len2;
be8e3b00 2747 inc_rfc1001_len(pSMB, count);
1da177e4
LT
2748 pSMB->ByteCount = cpu_to_le16(count);
2749
2750 rc = SendReceive(xid, tcon->ses, (struct smb_hdr *) pSMB,
2751 (struct smb_hdr *) pSMBr, &bytes_returned, 0);
2752 if (rc) {
b6b38f70
JP
2753 cFYI(1, "Send error in copy = %d with %d files copied",
2754 rc, le16_to_cpu(pSMBr->CopyCount));
1da177e4 2755 }
0d817bc0 2756 cifs_buf_release(pSMB);
1da177e4
LT
2757
2758 if (rc == -EAGAIN)
2759 goto copyRetry;
2760
2761 return rc;
2762}
2763
2764int
96daf2b0 2765CIFSUnixCreateSymLink(const int xid, struct cifs_tcon *tcon,
1da177e4
LT
2766 const char *fromName, const char *toName,
2767 const struct nls_table *nls_codepage)
2768{
2769 TRANSACTION2_SPI_REQ *pSMB = NULL;
2770 TRANSACTION2_SPI_RSP *pSMBr = NULL;
2771 char *data_offset;
2772 int name_len;
2773 int name_len_target;
2774 int rc = 0;
2775 int bytes_returned = 0;
2776 __u16 params, param_offset, offset, byte_count;
2777
b6b38f70 2778 cFYI(1, "In Symlink Unix style");
1da177e4
LT
2779createSymLinkRetry:
2780 rc = smb_init(SMB_COM_TRANSACTION2, 15, tcon, (void **) &pSMB,
2781 (void **) &pSMBr);
2782 if (rc)
2783 return rc;
2784
2785 if (pSMB->hdr.Flags2 & SMBFLG2_UNICODE) {
2786 name_len =
acbbb76a
SF
2787 cifs_strtoUTF16((__le16 *) pSMB->FileName, fromName,
2788 /* find define for this maxpathcomponent */
2789 PATH_MAX, nls_codepage);
1da177e4
LT
2790 name_len++; /* trailing null */
2791 name_len *= 2;
2792
50c2f753 2793 } else { /* BB improve the check for buffer overruns BB */
1da177e4
LT
2794 name_len = strnlen(fromName, PATH_MAX);
2795 name_len++; /* trailing null */
2796 strncpy(pSMB->FileName, fromName, name_len);
2797 }
2798 params = 6 + name_len;
2799 pSMB->MaxSetupCount = 0;
2800 pSMB->Reserved = 0;
2801 pSMB->Flags = 0;
2802 pSMB->Timeout = 0;
2803 pSMB->Reserved2 = 0;
2804 param_offset = offsetof(struct smb_com_transaction2_spi_req,
50c2f753 2805 InformationLevel) - 4;
1da177e4
LT
2806 offset = param_offset + params;
2807
2808 data_offset = (char *) (&pSMB->hdr.Protocol) + offset;
2809 if (pSMB->hdr.Flags2 & SMBFLG2_UNICODE) {
2810 name_len_target =
acbbb76a
SF
2811 cifs_strtoUTF16((__le16 *) data_offset, toName, PATH_MAX
2812 /* find define for this maxpathcomponent */
2813 , nls_codepage);
1da177e4
LT
2814 name_len_target++; /* trailing null */
2815 name_len_target *= 2;
50c2f753 2816 } else { /* BB improve the check for buffer overruns BB */
1da177e4
LT
2817 name_len_target = strnlen(toName, PATH_MAX);
2818 name_len_target++; /* trailing null */
2819 strncpy(data_offset, toName, name_len_target);
2820 }
2821
2822 pSMB->MaxParameterCount = cpu_to_le16(2);
2823 /* BB find exact max on data count below from sess */
2824 pSMB->MaxDataCount = cpu_to_le16(1000);
2825 pSMB->SetupCount = 1;
2826 pSMB->Reserved3 = 0;
2827 pSMB->SubCommand = cpu_to_le16(TRANS2_SET_PATH_INFORMATION);
2828 byte_count = 3 /* pad */ + params + name_len_target;
2829 pSMB->DataCount = cpu_to_le16(name_len_target);
2830 pSMB->ParameterCount = cpu_to_le16(params);
2831 pSMB->TotalDataCount = pSMB->DataCount;
2832 pSMB->TotalParameterCount = pSMB->ParameterCount;
2833 pSMB->ParameterOffset = cpu_to_le16(param_offset);
2834 pSMB->DataOffset = cpu_to_le16(offset);
2835 pSMB->InformationLevel = cpu_to_le16(SMB_SET_FILE_UNIX_LINK);
2836 pSMB->Reserved4 = 0;
be8e3b00 2837 inc_rfc1001_len(pSMB, byte_count);
1da177e4
LT
2838 pSMB->ByteCount = cpu_to_le16(byte_count);
2839 rc = SendReceive(xid, tcon->ses, (struct smb_hdr *) pSMB,
2840 (struct smb_hdr *) pSMBr, &bytes_returned, 0);
a4544347 2841 cifs_stats_inc(&tcon->num_symlinks);
ad7a2926 2842 if (rc)
b6b38f70 2843 cFYI(1, "Send error in SetPathInfo create symlink = %d", rc);
1da177e4 2844
0d817bc0 2845 cifs_buf_release(pSMB);
1da177e4
LT
2846
2847 if (rc == -EAGAIN)
2848 goto createSymLinkRetry;
2849
2850 return rc;
2851}
2852
2853int
96daf2b0 2854CIFSUnixCreateHardLink(const int xid, struct cifs_tcon *tcon,
1da177e4 2855 const char *fromName, const char *toName,
737b758c 2856 const struct nls_table *nls_codepage, int remap)
1da177e4
LT
2857{
2858 TRANSACTION2_SPI_REQ *pSMB = NULL;
2859 TRANSACTION2_SPI_RSP *pSMBr = NULL;
2860 char *data_offset;
2861 int name_len;
2862 int name_len_target;
2863 int rc = 0;
2864 int bytes_returned = 0;
2865 __u16 params, param_offset, offset, byte_count;
2866
b6b38f70 2867 cFYI(1, "In Create Hard link Unix style");
1da177e4
LT
2868createHardLinkRetry:
2869 rc = smb_init(SMB_COM_TRANSACTION2, 15, tcon, (void **) &pSMB,
2870 (void **) &pSMBr);
2871 if (rc)
2872 return rc;
2873
2874 if (pSMB->hdr.Flags2 & SMBFLG2_UNICODE) {
acbbb76a
SF
2875 name_len = cifsConvertToUTF16((__le16 *) pSMB->FileName, toName,
2876 PATH_MAX, nls_codepage, remap);
1da177e4
LT
2877 name_len++; /* trailing null */
2878 name_len *= 2;
2879
50c2f753 2880 } else { /* BB improve the check for buffer overruns BB */
1da177e4
LT
2881 name_len = strnlen(toName, PATH_MAX);
2882 name_len++; /* trailing null */
2883 strncpy(pSMB->FileName, toName, name_len);
2884 }
2885 params = 6 + name_len;
2886 pSMB->MaxSetupCount = 0;
2887 pSMB->Reserved = 0;
2888 pSMB->Flags = 0;
2889 pSMB->Timeout = 0;
2890 pSMB->Reserved2 = 0;
2891 param_offset = offsetof(struct smb_com_transaction2_spi_req,
50c2f753 2892 InformationLevel) - 4;
1da177e4
LT
2893 offset = param_offset + params;
2894
2895 data_offset = (char *) (&pSMB->hdr.Protocol) + offset;
2896 if (pSMB->hdr.Flags2 & SMBFLG2_UNICODE) {
2897 name_len_target =
acbbb76a
SF
2898 cifsConvertToUTF16((__le16 *) data_offset, fromName,
2899 PATH_MAX, nls_codepage, remap);
1da177e4
LT
2900 name_len_target++; /* trailing null */
2901 name_len_target *= 2;
50c2f753 2902 } else { /* BB improve the check for buffer overruns BB */
1da177e4
LT
2903 name_len_target = strnlen(fromName, PATH_MAX);
2904 name_len_target++; /* trailing null */
2905 strncpy(data_offset, fromName, name_len_target);
2906 }
2907
2908 pSMB->MaxParameterCount = cpu_to_le16(2);
2909 /* BB find exact max on data count below from sess*/
2910 pSMB->MaxDataCount = cpu_to_le16(1000);
2911 pSMB->SetupCount = 1;
2912 pSMB->Reserved3 = 0;
2913 pSMB->SubCommand = cpu_to_le16(TRANS2_SET_PATH_INFORMATION);
2914 byte_count = 3 /* pad */ + params + name_len_target;
2915 pSMB->ParameterCount = cpu_to_le16(params);
2916 pSMB->TotalParameterCount = pSMB->ParameterCount;
2917 pSMB->DataCount = cpu_to_le16(name_len_target);
2918 pSMB->TotalDataCount = pSMB->DataCount;
2919 pSMB->ParameterOffset = cpu_to_le16(param_offset);
2920 pSMB->DataOffset = cpu_to_le16(offset);
2921 pSMB->InformationLevel = cpu_to_le16(SMB_SET_FILE_UNIX_HLINK);
2922 pSMB->Reserved4 = 0;
be8e3b00 2923 inc_rfc1001_len(pSMB, byte_count);
1da177e4
LT
2924 pSMB->ByteCount = cpu_to_le16(byte_count);
2925 rc = SendReceive(xid, tcon->ses, (struct smb_hdr *) pSMB,
2926 (struct smb_hdr *) pSMBr, &bytes_returned, 0);
a4544347 2927 cifs_stats_inc(&tcon->num_hardlinks);
ad7a2926 2928 if (rc)
b6b38f70 2929 cFYI(1, "Send error in SetPathInfo (hard link) = %d", rc);
1da177e4
LT
2930
2931 cifs_buf_release(pSMB);
2932 if (rc == -EAGAIN)
2933 goto createHardLinkRetry;
2934
2935 return rc;
2936}
2937
2938int
96daf2b0 2939CIFSCreateHardLink(const int xid, struct cifs_tcon *tcon,
1da177e4 2940 const char *fromName, const char *toName,
737b758c 2941 const struct nls_table *nls_codepage, int remap)
1da177e4
LT
2942{
2943 int rc = 0;
2944 NT_RENAME_REQ *pSMB = NULL;
2945 RENAME_RSP *pSMBr = NULL;
2946 int bytes_returned;
2947 int name_len, name_len2;
2948 __u16 count;
2949
b6b38f70 2950 cFYI(1, "In CIFSCreateHardLink");
1da177e4
LT
2951winCreateHardLinkRetry:
2952
2953 rc = smb_init(SMB_COM_NT_RENAME, 4, tcon, (void **) &pSMB,
2954 (void **) &pSMBr);
2955 if (rc)
2956 return rc;
2957
2958 pSMB->SearchAttributes =
2959 cpu_to_le16(ATTR_READONLY | ATTR_HIDDEN | ATTR_SYSTEM |
2960 ATTR_DIRECTORY);
2961 pSMB->Flags = cpu_to_le16(CREATE_HARD_LINK);
2962 pSMB->ClusterCount = 0;
2963
2964 pSMB->BufferFormat = 0x04;
2965
2966 if (pSMB->hdr.Flags2 & SMBFLG2_UNICODE) {
2967 name_len =
acbbb76a
SF
2968 cifsConvertToUTF16((__le16 *) pSMB->OldFileName, fromName,
2969 PATH_MAX, nls_codepage, remap);
1da177e4
LT
2970 name_len++; /* trailing null */
2971 name_len *= 2;
fcc7c09d
JL
2972
2973 /* protocol specifies ASCII buffer format (0x04) for unicode */
2974 pSMB->OldFileName[name_len] = 0x04;
2975 pSMB->OldFileName[name_len + 1] = 0x00; /* pad */
1da177e4 2976 name_len2 =
acbbb76a
SF
2977 cifsConvertToUTF16((__le16 *)&pSMB->OldFileName[name_len+2],
2978 toName, PATH_MAX, nls_codepage, remap);
1da177e4
LT
2979 name_len2 += 1 /* trailing null */ + 1 /* Signature word */ ;
2980 name_len2 *= 2; /* convert to bytes */
50c2f753 2981 } else { /* BB improve the check for buffer overruns BB */
1da177e4
LT
2982 name_len = strnlen(fromName, PATH_MAX);
2983 name_len++; /* trailing null */
2984 strncpy(pSMB->OldFileName, fromName, name_len);
2985 name_len2 = strnlen(toName, PATH_MAX);
2986 name_len2++; /* trailing null */
2987 pSMB->OldFileName[name_len] = 0x04; /* 2nd buffer format */
2988 strncpy(&pSMB->OldFileName[name_len + 1], toName, name_len2);
2989 name_len2++; /* trailing null */
2990 name_len2++; /* signature byte */
2991 }
2992
2993 count = 1 /* string type byte */ + name_len + name_len2;
be8e3b00 2994 inc_rfc1001_len(pSMB, count);
1da177e4
LT
2995 pSMB->ByteCount = cpu_to_le16(count);
2996
2997 rc = SendReceive(xid, tcon->ses, (struct smb_hdr *) pSMB,
2998 (struct smb_hdr *) pSMBr, &bytes_returned, 0);
a4544347 2999 cifs_stats_inc(&tcon->num_hardlinks);
ad7a2926 3000 if (rc)
b6b38f70 3001 cFYI(1, "Send error in hard link (NT rename) = %d", rc);
ad7a2926 3002
1da177e4
LT
3003 cifs_buf_release(pSMB);
3004 if (rc == -EAGAIN)
3005 goto winCreateHardLinkRetry;
3006
3007 return rc;
3008}
3009
3010int
96daf2b0 3011CIFSSMBUnixQuerySymLink(const int xid, struct cifs_tcon *tcon,
460b9696 3012 const unsigned char *searchName, char **symlinkinfo,
1da177e4
LT
3013 const struct nls_table *nls_codepage)
3014{
3015/* SMB_QUERY_FILE_UNIX_LINK */
3016 TRANSACTION2_QPI_REQ *pSMB = NULL;
3017 TRANSACTION2_QPI_RSP *pSMBr = NULL;
3018 int rc = 0;
3019 int bytes_returned;
3020 int name_len;
3021 __u16 params, byte_count;
460b9696 3022 char *data_start;
1da177e4 3023
b6b38f70 3024 cFYI(1, "In QPathSymLinkInfo (Unix) for path %s", searchName);
1da177e4
LT
3025
3026querySymLinkRetry:
3027 rc = smb_init(SMB_COM_TRANSACTION2, 15, tcon, (void **) &pSMB,
3028 (void **) &pSMBr);
3029 if (rc)
3030 return rc;
3031
3032 if (pSMB->hdr.Flags2 & SMBFLG2_UNICODE) {
3033 name_len =
acbbb76a
SF
3034 cifs_strtoUTF16((__le16 *) pSMB->FileName, searchName,
3035 PATH_MAX, nls_codepage);
1da177e4
LT
3036 name_len++; /* trailing null */
3037 name_len *= 2;
50c2f753 3038 } else { /* BB improve the check for buffer overruns BB */
1da177e4
LT
3039 name_len = strnlen(searchName, PATH_MAX);
3040 name_len++; /* trailing null */
3041 strncpy(pSMB->FileName, searchName, name_len);
3042 }
3043
3044 params = 2 /* level */ + 4 /* rsrvd */ + name_len /* incl null */ ;
3045 pSMB->TotalDataCount = 0;
3046 pSMB->MaxParameterCount = cpu_to_le16(2);
46a7574c 3047 pSMB->MaxDataCount = cpu_to_le16(CIFSMaxBufSize);
1da177e4
LT
3048 pSMB->MaxSetupCount = 0;
3049 pSMB->Reserved = 0;
3050 pSMB->Flags = 0;
3051 pSMB->Timeout = 0;
3052 pSMB->Reserved2 = 0;
3053 pSMB->ParameterOffset = cpu_to_le16(offsetof(
50c2f753 3054 struct smb_com_transaction2_qpi_req, InformationLevel) - 4);
1da177e4
LT
3055 pSMB->DataCount = 0;
3056 pSMB->DataOffset = 0;
3057 pSMB->SetupCount = 1;
3058 pSMB->Reserved3 = 0;
3059 pSMB->SubCommand = cpu_to_le16(TRANS2_QUERY_PATH_INFORMATION);
3060 byte_count = params + 1 /* pad */ ;
3061 pSMB->TotalParameterCount = cpu_to_le16(params);
3062 pSMB->ParameterCount = pSMB->TotalParameterCount;
3063 pSMB->InformationLevel = cpu_to_le16(SMB_QUERY_FILE_UNIX_LINK);
3064 pSMB->Reserved4 = 0;
be8e3b00 3065 inc_rfc1001_len(pSMB, byte_count);
1da177e4
LT
3066 pSMB->ByteCount = cpu_to_le16(byte_count);
3067
3068 rc = SendReceive(xid, tcon->ses, (struct smb_hdr *) pSMB,
3069 (struct smb_hdr *) pSMBr, &bytes_returned, 0);
3070 if (rc) {
b6b38f70 3071 cFYI(1, "Send error in QuerySymLinkInfo = %d", rc);
1da177e4
LT
3072 } else {
3073 /* decode response */
3074
3075 rc = validate_t2((struct smb_t2_rsp *)pSMBr);
1da177e4 3076 /* BB also check enough total bytes returned */
820a803f 3077 if (rc || get_bcc(&pSMBr->hdr) < 2)
460b9696 3078 rc = -EIO;
1da177e4 3079 else {
0e0d2cf3 3080 bool is_unicode;
460b9696
JL
3081 u16 count = le16_to_cpu(pSMBr->t2.DataCount);
3082
3083 data_start = ((char *) &pSMBr->hdr.Protocol) +
3084 le16_to_cpu(pSMBr->t2.DataOffset);
1da177e4 3085
0e0d2cf3
SF
3086 if (pSMBr->hdr.Flags2 & SMBFLG2_UNICODE)
3087 is_unicode = true;
3088 else
3089 is_unicode = false;
3090
737b758c 3091 /* BB FIXME investigate remapping reserved chars here */
acbbb76a
SF
3092 *symlinkinfo = cifs_strndup_from_utf16(data_start,
3093 count, is_unicode, nls_codepage);
8b6427a2 3094 if (!*symlinkinfo)
460b9696 3095 rc = -ENOMEM;
1da177e4
LT
3096 }
3097 }
3098 cifs_buf_release(pSMB);
3099 if (rc == -EAGAIN)
3100 goto querySymLinkRetry;
3101 return rc;
3102}
3103
c52a9554
SF
3104#ifdef CONFIG_CIFS_SYMLINK_EXPERIMENTAL
3105/*
3106 * Recent Windows versions now create symlinks more frequently
3107 * and they use the "reparse point" mechanism below. We can of course
3108 * do symlinks nicely to Samba and other servers which support the
3109 * CIFS Unix Extensions and we can also do SFU symlinks and "client only"
3110 * "MF" symlinks optionally, but for recent Windows we really need to
3111 * reenable the code below and fix the cifs_symlink callers to handle this.
3112 * In the interim this code has been moved to its own config option so
3113 * it is not compiled in by default until callers fixed up and more tested.
3114 */
1da177e4 3115int
96daf2b0 3116CIFSSMBQueryReparseLinkInfo(const int xid, struct cifs_tcon *tcon,
1da177e4 3117 const unsigned char *searchName,
50c2f753 3118 char *symlinkinfo, const int buflen, __u16 fid,
1da177e4
LT
3119 const struct nls_table *nls_codepage)
3120{
3121 int rc = 0;
3122 int bytes_returned;
50c2f753
SF
3123 struct smb_com_transaction_ioctl_req *pSMB;
3124 struct smb_com_transaction_ioctl_rsp *pSMBr;
1da177e4 3125
b6b38f70 3126 cFYI(1, "In Windows reparse style QueryLink for path %s", searchName);
1da177e4
LT
3127 rc = smb_init(SMB_COM_NT_TRANSACT, 23, tcon, (void **) &pSMB,
3128 (void **) &pSMBr);
3129 if (rc)
3130 return rc;
3131
3132 pSMB->TotalParameterCount = 0 ;
3133 pSMB->TotalDataCount = 0;
3134 pSMB->MaxParameterCount = cpu_to_le32(2);
3135 /* BB find exact data count max from sess structure BB */
c974befa 3136 pSMB->MaxDataCount = cpu_to_le32(CIFSMaxBufSize & 0xFFFFFF00);
1da177e4
LT
3137 pSMB->MaxSetupCount = 4;
3138 pSMB->Reserved = 0;
3139 pSMB->ParameterOffset = 0;
3140 pSMB->DataCount = 0;
3141 pSMB->DataOffset = 0;
3142 pSMB->SetupCount = 4;
3143 pSMB->SubCommand = cpu_to_le16(NT_TRANSACT_IOCTL);
3144 pSMB->ParameterCount = pSMB->TotalParameterCount;
3145 pSMB->FunctionCode = cpu_to_le32(FSCTL_GET_REPARSE_POINT);
3146 pSMB->IsFsctl = 1; /* FSCTL */
3147 pSMB->IsRootFlag = 0;
3148 pSMB->Fid = fid; /* file handle always le */
3149 pSMB->ByteCount = 0;
3150
3151 rc = SendReceive(xid, tcon->ses, (struct smb_hdr *) pSMB,
3152 (struct smb_hdr *) pSMBr, &bytes_returned, 0);
3153 if (rc) {
b6b38f70 3154 cFYI(1, "Send error in QueryReparseLinkInfo = %d", rc);
1da177e4
LT
3155 } else { /* decode response */
3156 __u32 data_offset = le32_to_cpu(pSMBr->DataOffset);
3157 __u32 data_count = le32_to_cpu(pSMBr->DataCount);
820a803f
JL
3158 if (get_bcc(&pSMBr->hdr) < 2 || data_offset > 512) {
3159 /* BB also check enough total bytes returned */
1da177e4 3160 rc = -EIO; /* bad smb */
afe48c31
SF
3161 goto qreparse_out;
3162 }
3163 if (data_count && (data_count < 2048)) {
3164 char *end_of_smb = 2 /* sizeof byte count */ +
820a803f 3165 get_bcc(&pSMBr->hdr) + (char *)&pSMBr->ByteCount;
1da177e4 3166
afe48c31 3167 struct reparse_data *reparse_buf =
50c2f753
SF
3168 (struct reparse_data *)
3169 ((char *)&pSMBr->hdr.Protocol
3170 + data_offset);
afe48c31
SF
3171 if ((char *)reparse_buf >= end_of_smb) {
3172 rc = -EIO;
3173 goto qreparse_out;
3174 }
3175 if ((reparse_buf->LinkNamesBuf +
3176 reparse_buf->TargetNameOffset +
3177 reparse_buf->TargetNameLen) > end_of_smb) {
b6b38f70 3178 cFYI(1, "reparse buf beyond SMB");
afe48c31
SF
3179 rc = -EIO;
3180 goto qreparse_out;
3181 }
50c2f753 3182
afe48c31
SF
3183 if (pSMBr->hdr.Flags2 & SMBFLG2_UNICODE) {
3184 cifs_from_ucs2(symlinkinfo, (__le16 *)
50c2f753
SF
3185 (reparse_buf->LinkNamesBuf +
3186 reparse_buf->TargetNameOffset),
afe48c31
SF
3187 buflen,
3188 reparse_buf->TargetNameLen,
3189 nls_codepage, 0);
3190 } else { /* ASCII names */
3191 strncpy(symlinkinfo,
3192 reparse_buf->LinkNamesBuf +
3193 reparse_buf->TargetNameOffset,
3194 min_t(const int, buflen,
3195 reparse_buf->TargetNameLen));
1da177e4 3196 }
afe48c31
SF
3197 } else {
3198 rc = -EIO;
b6b38f70
JP
3199 cFYI(1, "Invalid return data count on "
3200 "get reparse info ioctl");
1da177e4 3201 }
afe48c31
SF
3202 symlinkinfo[buflen] = 0; /* just in case so the caller
3203 does not go off the end of the buffer */
b6b38f70 3204 cFYI(1, "readlink result - %s", symlinkinfo);
1da177e4 3205 }
989c7e51 3206
1da177e4 3207qreparse_out:
4a6d87f1 3208 cifs_buf_release(pSMB);
1da177e4
LT
3209
3210 /* Note: On -EAGAIN error only caller can retry on handle based calls
3211 since file handle passed in no longer valid */
3212
3213 return rc;
3214}
c52a9554 3215#endif /* CIFS_SYMLINK_EXPERIMENTAL */ /* BB temporarily unused */
1da177e4
LT
3216
3217#ifdef CONFIG_CIFS_POSIX
3218
3219/*Convert an Access Control Entry from wire format to local POSIX xattr format*/
50c2f753
SF
3220static void cifs_convert_ace(posix_acl_xattr_entry *ace,
3221 struct cifs_posix_ace *cifs_ace)
1da177e4
LT
3222{
3223 /* u8 cifs fields do not need le conversion */
ff7feac9
SF
3224 ace->e_perm = cpu_to_le16(cifs_ace->cifs_e_perm);
3225 ace->e_tag = cpu_to_le16(cifs_ace->cifs_e_tag);
3226 ace->e_id = cpu_to_le32(le64_to_cpu(cifs_ace->cifs_uid));
b6b38f70 3227 /* cFYI(1, "perm %d tag %d id %d",ace->e_perm,ace->e_tag,ace->e_id); */
1da177e4
LT
3228
3229 return;
3230}
3231
3232/* Convert ACL from CIFS POSIX wire format to local Linux POSIX ACL xattr */
50c2f753
SF
3233static int cifs_copy_posix_acl(char *trgt, char *src, const int buflen,
3234 const int acl_type, const int size_of_data_area)
1da177e4
LT
3235{
3236 int size = 0;
3237 int i;
3238 __u16 count;
50c2f753
SF
3239 struct cifs_posix_ace *pACE;
3240 struct cifs_posix_acl *cifs_acl = (struct cifs_posix_acl *)src;
3241 posix_acl_xattr_header *local_acl = (posix_acl_xattr_header *)trgt;
1da177e4
LT
3242
3243 if (le16_to_cpu(cifs_acl->version) != CIFS_ACL_VERSION)
3244 return -EOPNOTSUPP;
3245
790fe579 3246 if (acl_type & ACL_TYPE_ACCESS) {
1da177e4
LT
3247 count = le16_to_cpu(cifs_acl->access_entry_count);
3248 pACE = &cifs_acl->ace_array[0];
3249 size = sizeof(struct cifs_posix_acl);
3250 size += sizeof(struct cifs_posix_ace) * count;
3251 /* check if we would go beyond end of SMB */
790fe579 3252 if (size_of_data_area < size) {
b6b38f70
JP
3253 cFYI(1, "bad CIFS POSIX ACL size %d vs. %d",
3254 size_of_data_area, size);
1da177e4
LT
3255 return -EINVAL;
3256 }
790fe579 3257 } else if (acl_type & ACL_TYPE_DEFAULT) {
1da177e4
LT
3258 count = le16_to_cpu(cifs_acl->access_entry_count);
3259 size = sizeof(struct cifs_posix_acl);
3260 size += sizeof(struct cifs_posix_ace) * count;
3261/* skip past access ACEs to get to default ACEs */
3262 pACE = &cifs_acl->ace_array[count];
3263 count = le16_to_cpu(cifs_acl->default_entry_count);
3264 size += sizeof(struct cifs_posix_ace) * count;
3265 /* check if we would go beyond end of SMB */
790fe579 3266 if (size_of_data_area < size)
1da177e4
LT
3267 return -EINVAL;
3268 } else {
3269 /* illegal type */
3270 return -EINVAL;
3271 }
3272
3273 size = posix_acl_xattr_size(count);
790fe579 3274 if ((buflen == 0) || (local_acl == NULL)) {
50c2f753 3275 /* used to query ACL EA size */
790fe579 3276 } else if (size > buflen) {
1da177e4
LT
3277 return -ERANGE;
3278 } else /* buffer big enough */ {
ff7feac9 3279 local_acl->a_version = cpu_to_le32(POSIX_ACL_XATTR_VERSION);
50c2f753
SF
3280 for (i = 0; i < count ; i++) {
3281 cifs_convert_ace(&local_acl->a_entries[i], pACE);
3282 pACE++;
1da177e4
LT
3283 }
3284 }
3285 return size;
3286}
3287
50c2f753
SF
3288static __u16 convert_ace_to_cifs_ace(struct cifs_posix_ace *cifs_ace,
3289 const posix_acl_xattr_entry *local_ace)
1da177e4
LT
3290{
3291 __u16 rc = 0; /* 0 = ACL converted ok */
3292
ff7feac9
SF
3293 cifs_ace->cifs_e_perm = le16_to_cpu(local_ace->e_perm);
3294 cifs_ace->cifs_e_tag = le16_to_cpu(local_ace->e_tag);
1da177e4 3295 /* BB is there a better way to handle the large uid? */
790fe579 3296 if (local_ace->e_id == cpu_to_le32(-1)) {
1da177e4
LT
3297 /* Probably no need to le convert -1 on any arch but can not hurt */
3298 cifs_ace->cifs_uid = cpu_to_le64(-1);
50c2f753 3299 } else
ff7feac9 3300 cifs_ace->cifs_uid = cpu_to_le64(le32_to_cpu(local_ace->e_id));
b6b38f70 3301 /*cFYI(1, "perm %d tag %d id %d",ace->e_perm,ace->e_tag,ace->e_id);*/
1da177e4
LT
3302 return rc;
3303}
3304
3305/* Convert ACL from local Linux POSIX xattr to CIFS POSIX ACL wire format */
50c2f753
SF
3306static __u16 ACL_to_cifs_posix(char *parm_data, const char *pACL,
3307 const int buflen, const int acl_type)
1da177e4
LT
3308{
3309 __u16 rc = 0;
50c2f753
SF
3310 struct cifs_posix_acl *cifs_acl = (struct cifs_posix_acl *)parm_data;
3311 posix_acl_xattr_header *local_acl = (posix_acl_xattr_header *)pACL;
1da177e4
LT
3312 int count;
3313 int i;
3314
790fe579 3315 if ((buflen == 0) || (pACL == NULL) || (cifs_acl == NULL))
1da177e4
LT
3316 return 0;
3317
3318 count = posix_acl_xattr_count((size_t)buflen);
b6b38f70 3319 cFYI(1, "setting acl with %d entries from buf of length %d and "
63135e08 3320 "version of %d",
b6b38f70 3321 count, buflen, le32_to_cpu(local_acl->a_version));
790fe579 3322 if (le32_to_cpu(local_acl->a_version) != 2) {
b6b38f70
JP
3323 cFYI(1, "unknown POSIX ACL version %d",
3324 le32_to_cpu(local_acl->a_version));
1da177e4
LT
3325 return 0;
3326 }
3327 cifs_acl->version = cpu_to_le16(1);
790fe579 3328 if (acl_type == ACL_TYPE_ACCESS)
ff7feac9 3329 cifs_acl->access_entry_count = cpu_to_le16(count);
790fe579 3330 else if (acl_type == ACL_TYPE_DEFAULT)
ff7feac9 3331 cifs_acl->default_entry_count = cpu_to_le16(count);
1da177e4 3332 else {
b6b38f70 3333 cFYI(1, "unknown ACL type %d", acl_type);
1da177e4
LT
3334 return 0;
3335 }
50c2f753 3336 for (i = 0; i < count; i++) {
1da177e4
LT
3337 rc = convert_ace_to_cifs_ace(&cifs_acl->ace_array[i],
3338 &local_acl->a_entries[i]);
790fe579 3339 if (rc != 0) {
1da177e4
LT
3340 /* ACE not converted */
3341 break;
3342 }
3343 }
790fe579 3344 if (rc == 0) {
1da177e4
LT
3345 rc = (__u16)(count * sizeof(struct cifs_posix_ace));
3346 rc += sizeof(struct cifs_posix_acl);
3347 /* BB add check to make sure ACL does not overflow SMB */
3348 }
3349 return rc;
3350}
3351
3352int
96daf2b0 3353CIFSSMBGetPosixACL(const int xid, struct cifs_tcon *tcon,
50c2f753
SF
3354 const unsigned char *searchName,
3355 char *acl_inf, const int buflen, const int acl_type,
3356 const struct nls_table *nls_codepage, int remap)
1da177e4
LT
3357{
3358/* SMB_QUERY_POSIX_ACL */
3359 TRANSACTION2_QPI_REQ *pSMB = NULL;
3360 TRANSACTION2_QPI_RSP *pSMBr = NULL;
3361 int rc = 0;
3362 int bytes_returned;
3363 int name_len;
3364 __u16 params, byte_count;
50c2f753 3365
b6b38f70 3366 cFYI(1, "In GetPosixACL (Unix) for path %s", searchName);
1da177e4
LT
3367
3368queryAclRetry:
3369 rc = smb_init(SMB_COM_TRANSACTION2, 15, tcon, (void **) &pSMB,
3370 (void **) &pSMBr);
3371 if (rc)
3372 return rc;
50c2f753 3373
1da177e4
LT
3374 if (pSMB->hdr.Flags2 & SMBFLG2_UNICODE) {
3375 name_len =
acbbb76a
SF
3376 cifsConvertToUTF16((__le16 *) pSMB->FileName,
3377 searchName, PATH_MAX, nls_codepage,
3378 remap);
1da177e4
LT
3379 name_len++; /* trailing null */
3380 name_len *= 2;
3381 pSMB->FileName[name_len] = 0;
3382 pSMB->FileName[name_len+1] = 0;
50c2f753 3383 } else { /* BB improve the check for buffer overruns BB */
1da177e4
LT
3384 name_len = strnlen(searchName, PATH_MAX);
3385 name_len++; /* trailing null */
3386 strncpy(pSMB->FileName, searchName, name_len);
3387 }
3388
3389 params = 2 /* level */ + 4 /* rsrvd */ + name_len /* incl null */ ;
3390 pSMB->TotalDataCount = 0;
3391 pSMB->MaxParameterCount = cpu_to_le16(2);
50c2f753 3392 /* BB find exact max data count below from sess structure BB */
1da177e4
LT
3393 pSMB->MaxDataCount = cpu_to_le16(4000);
3394 pSMB->MaxSetupCount = 0;
3395 pSMB->Reserved = 0;
3396 pSMB->Flags = 0;
3397 pSMB->Timeout = 0;
3398 pSMB->Reserved2 = 0;
3399 pSMB->ParameterOffset = cpu_to_le16(
50c2f753
SF
3400 offsetof(struct smb_com_transaction2_qpi_req,
3401 InformationLevel) - 4);
1da177e4
LT
3402 pSMB->DataCount = 0;
3403 pSMB->DataOffset = 0;
3404 pSMB->SetupCount = 1;
3405 pSMB->Reserved3 = 0;
3406 pSMB->SubCommand = cpu_to_le16(TRANS2_QUERY_PATH_INFORMATION);
3407 byte_count = params + 1 /* pad */ ;
3408 pSMB->TotalParameterCount = cpu_to_le16(params);
3409 pSMB->ParameterCount = pSMB->TotalParameterCount;
3410 pSMB->InformationLevel = cpu_to_le16(SMB_QUERY_POSIX_ACL);
3411 pSMB->Reserved4 = 0;
be8e3b00 3412 inc_rfc1001_len(pSMB, byte_count);
1da177e4
LT
3413 pSMB->ByteCount = cpu_to_le16(byte_count);
3414
3415 rc = SendReceive(xid, tcon->ses, (struct smb_hdr *) pSMB,
3416 (struct smb_hdr *) pSMBr, &bytes_returned, 0);
0a4b92c0 3417 cifs_stats_inc(&tcon->num_acl_get);
1da177e4 3418 if (rc) {
b6b38f70 3419 cFYI(1, "Send error in Query POSIX ACL = %d", rc);
1da177e4
LT
3420 } else {
3421 /* decode response */
50c2f753 3422
1da177e4 3423 rc = validate_t2((struct smb_t2_rsp *)pSMBr);
1da177e4 3424 /* BB also check enough total bytes returned */
820a803f 3425 if (rc || get_bcc(&pSMBr->hdr) < 2)
1da177e4
LT
3426 rc = -EIO; /* bad smb */
3427 else {
3428 __u16 data_offset = le16_to_cpu(pSMBr->t2.DataOffset);
3429 __u16 count = le16_to_cpu(pSMBr->t2.DataCount);
3430 rc = cifs_copy_posix_acl(acl_inf,
3431 (char *)&pSMBr->hdr.Protocol+data_offset,
50c2f753 3432 buflen, acl_type, count);
1da177e4
LT
3433 }
3434 }
3435 cifs_buf_release(pSMB);
3436 if (rc == -EAGAIN)
3437 goto queryAclRetry;
3438 return rc;
3439}
3440
3441int
96daf2b0 3442CIFSSMBSetPosixACL(const int xid, struct cifs_tcon *tcon,
50c2f753
SF
3443 const unsigned char *fileName,
3444 const char *local_acl, const int buflen,
3445 const int acl_type,
3446 const struct nls_table *nls_codepage, int remap)
1da177e4
LT
3447{
3448 struct smb_com_transaction2_spi_req *pSMB = NULL;
3449 struct smb_com_transaction2_spi_rsp *pSMBr = NULL;
3450 char *parm_data;
3451 int name_len;
3452 int rc = 0;
3453 int bytes_returned = 0;
3454 __u16 params, byte_count, data_count, param_offset, offset;
3455
b6b38f70 3456 cFYI(1, "In SetPosixACL (Unix) for path %s", fileName);
1da177e4
LT
3457setAclRetry:
3458 rc = smb_init(SMB_COM_TRANSACTION2, 15, tcon, (void **) &pSMB,
50c2f753 3459 (void **) &pSMBr);
1da177e4
LT
3460 if (rc)
3461 return rc;
3462 if (pSMB->hdr.Flags2 & SMBFLG2_UNICODE) {
3463 name_len =
acbbb76a
SF
3464 cifsConvertToUTF16((__le16 *) pSMB->FileName, fileName,
3465 PATH_MAX, nls_codepage, remap);
1da177e4
LT
3466 name_len++; /* trailing null */
3467 name_len *= 2;
50c2f753 3468 } else { /* BB improve the check for buffer overruns BB */
1da177e4
LT
3469 name_len = strnlen(fileName, PATH_MAX);
3470 name_len++; /* trailing null */
3471 strncpy(pSMB->FileName, fileName, name_len);
3472 }
3473 params = 6 + name_len;
3474 pSMB->MaxParameterCount = cpu_to_le16(2);
582d21e5
SF
3475 /* BB find max SMB size from sess */
3476 pSMB->MaxDataCount = cpu_to_le16(1000);
1da177e4
LT
3477 pSMB->MaxSetupCount = 0;
3478 pSMB->Reserved = 0;
3479 pSMB->Flags = 0;
3480 pSMB->Timeout = 0;
3481 pSMB->Reserved2 = 0;
3482 param_offset = offsetof(struct smb_com_transaction2_spi_req,
50c2f753 3483 InformationLevel) - 4;
1da177e4
LT
3484 offset = param_offset + params;
3485 parm_data = ((char *) &pSMB->hdr.Protocol) + offset;
3486 pSMB->ParameterOffset = cpu_to_le16(param_offset);
3487
3488 /* convert to on the wire format for POSIX ACL */
50c2f753 3489 data_count = ACL_to_cifs_posix(parm_data, local_acl, buflen, acl_type);
1da177e4 3490
790fe579 3491 if (data_count == 0) {
1da177e4
LT
3492 rc = -EOPNOTSUPP;
3493 goto setACLerrorExit;
3494 }
3495 pSMB->DataOffset = cpu_to_le16(offset);
3496 pSMB->SetupCount = 1;
3497 pSMB->Reserved3 = 0;
3498 pSMB->SubCommand = cpu_to_le16(TRANS2_SET_PATH_INFORMATION);
3499 pSMB->InformationLevel = cpu_to_le16(SMB_SET_POSIX_ACL);
3500 byte_count = 3 /* pad */ + params + data_count;
3501 pSMB->DataCount = cpu_to_le16(data_count);
3502 pSMB->TotalDataCount = pSMB->DataCount;
3503 pSMB->ParameterCount = cpu_to_le16(params);
3504 pSMB->TotalParameterCount = pSMB->ParameterCount;
3505 pSMB->Reserved4 = 0;
be8e3b00 3506 inc_rfc1001_len(pSMB, byte_count);
1da177e4
LT
3507 pSMB->ByteCount = cpu_to_le16(byte_count);
3508 rc = SendReceive(xid, tcon->ses, (struct smb_hdr *) pSMB,
50c2f753 3509 (struct smb_hdr *) pSMBr, &bytes_returned, 0);
ad7a2926 3510 if (rc)
b6b38f70 3511 cFYI(1, "Set POSIX ACL returned %d", rc);
1da177e4
LT
3512
3513setACLerrorExit:
3514 cifs_buf_release(pSMB);
3515 if (rc == -EAGAIN)
3516 goto setAclRetry;
3517 return rc;
3518}
3519
f654bac2
SF
3520/* BB fix tabs in this function FIXME BB */
3521int
96daf2b0 3522CIFSGetExtAttr(const int xid, struct cifs_tcon *tcon,
ad7a2926 3523 const int netfid, __u64 *pExtAttrBits, __u64 *pMask)
f654bac2 3524{
50c2f753
SF
3525 int rc = 0;
3526 struct smb_t2_qfi_req *pSMB = NULL;
3527 struct smb_t2_qfi_rsp *pSMBr = NULL;
3528 int bytes_returned;
3529 __u16 params, byte_count;
f654bac2 3530
b6b38f70 3531 cFYI(1, "In GetExtAttr");
790fe579
SF
3532 if (tcon == NULL)
3533 return -ENODEV;
f654bac2
SF
3534
3535GetExtAttrRetry:
790fe579
SF
3536 rc = smb_init(SMB_COM_TRANSACTION2, 15, tcon, (void **) &pSMB,
3537 (void **) &pSMBr);
3538 if (rc)
3539 return rc;
f654bac2 3540
ad7a2926 3541 params = 2 /* level */ + 2 /* fid */;
790fe579
SF
3542 pSMB->t2.TotalDataCount = 0;
3543 pSMB->t2.MaxParameterCount = cpu_to_le16(4);
3544 /* BB find exact max data count below from sess structure BB */
3545 pSMB->t2.MaxDataCount = cpu_to_le16(4000);
3546 pSMB->t2.MaxSetupCount = 0;
3547 pSMB->t2.Reserved = 0;
3548 pSMB->t2.Flags = 0;
3549 pSMB->t2.Timeout = 0;
3550 pSMB->t2.Reserved2 = 0;
3551 pSMB->t2.ParameterOffset = cpu_to_le16(offsetof(struct smb_t2_qfi_req,
3552 Fid) - 4);
3553 pSMB->t2.DataCount = 0;
3554 pSMB->t2.DataOffset = 0;
3555 pSMB->t2.SetupCount = 1;
3556 pSMB->t2.Reserved3 = 0;
3557 pSMB->t2.SubCommand = cpu_to_le16(TRANS2_QUERY_FILE_INFORMATION);
3558 byte_count = params + 1 /* pad */ ;
3559 pSMB->t2.TotalParameterCount = cpu_to_le16(params);
3560 pSMB->t2.ParameterCount = pSMB->t2.TotalParameterCount;
3561 pSMB->InformationLevel = cpu_to_le16(SMB_QUERY_ATTR_FLAGS);
3562 pSMB->Pad = 0;
f654bac2 3563 pSMB->Fid = netfid;
be8e3b00 3564 inc_rfc1001_len(pSMB, byte_count);
790fe579
SF
3565 pSMB->t2.ByteCount = cpu_to_le16(byte_count);
3566
3567 rc = SendReceive(xid, tcon->ses, (struct smb_hdr *) pSMB,
3568 (struct smb_hdr *) pSMBr, &bytes_returned, 0);
3569 if (rc) {
b6b38f70 3570 cFYI(1, "error %d in GetExtAttr", rc);
790fe579
SF
3571 } else {
3572 /* decode response */
3573 rc = validate_t2((struct smb_t2_rsp *)pSMBr);
790fe579 3574 /* BB also check enough total bytes returned */
820a803f 3575 if (rc || get_bcc(&pSMBr->hdr) < 2)
790fe579
SF
3576 /* If rc should we check for EOPNOSUPP and
3577 disable the srvino flag? or in caller? */
3578 rc = -EIO; /* bad smb */
3579 else {
3580 __u16 data_offset = le16_to_cpu(pSMBr->t2.DataOffset);
3581 __u16 count = le16_to_cpu(pSMBr->t2.DataCount);
3582 struct file_chattr_info *pfinfo;
3583 /* BB Do we need a cast or hash here ? */
3584 if (count != 16) {
b6b38f70 3585 cFYI(1, "Illegal size ret in GetExtAttr");
790fe579
SF
3586 rc = -EIO;
3587 goto GetExtAttrOut;
3588 }
3589 pfinfo = (struct file_chattr_info *)
3590 (data_offset + (char *) &pSMBr->hdr.Protocol);
3591 *pExtAttrBits = le64_to_cpu(pfinfo->mode);
f654bac2 3592 *pMask = le64_to_cpu(pfinfo->mask);
790fe579
SF
3593 }
3594 }
f654bac2 3595GetExtAttrOut:
790fe579
SF
3596 cifs_buf_release(pSMB);
3597 if (rc == -EAGAIN)
3598 goto GetExtAttrRetry;
3599 return rc;
f654bac2
SF
3600}
3601
f654bac2 3602#endif /* CONFIG_POSIX */
1da177e4 3603
79df1bae
JL
3604#ifdef CONFIG_CIFS_ACL
3605/*
3606 * Initialize NT TRANSACT SMB into small smb request buffer. This assumes that
3607 * all NT TRANSACTS that we init here have total parm and data under about 400
3608 * bytes (to fit in small cifs buffer size), which is the case so far, it
3609 * easily fits. NB: Setup words themselves and ByteCount MaxSetupCount (size of
3610 * returned setup area) and MaxParameterCount (returned parms size) must be set
3611 * by caller
3612 */
3613static int
3614smb_init_nttransact(const __u16 sub_command, const int setup_count,
96daf2b0 3615 const int parm_len, struct cifs_tcon *tcon,
79df1bae
JL
3616 void **ret_buf)
3617{
3618 int rc;
3619 __u32 temp_offset;
3620 struct smb_com_ntransact_req *pSMB;
3621
3622 rc = small_smb_init(SMB_COM_NT_TRANSACT, 19 + setup_count, tcon,
3623 (void **)&pSMB);
3624 if (rc)
3625 return rc;
3626 *ret_buf = (void *)pSMB;
3627 pSMB->Reserved = 0;
3628 pSMB->TotalParameterCount = cpu_to_le32(parm_len);
3629 pSMB->TotalDataCount = 0;
c974befa 3630 pSMB->MaxDataCount = cpu_to_le32(CIFSMaxBufSize & 0xFFFFFF00);
79df1bae
JL
3631 pSMB->ParameterCount = pSMB->TotalParameterCount;
3632 pSMB->DataCount = pSMB->TotalDataCount;
3633 temp_offset = offsetof(struct smb_com_ntransact_req, Parms) +
3634 (setup_count * 2) - 4 /* for rfc1001 length itself */;
3635 pSMB->ParameterOffset = cpu_to_le32(temp_offset);
3636 pSMB->DataOffset = cpu_to_le32(temp_offset + parm_len);
3637 pSMB->SetupCount = setup_count; /* no need to le convert byte fields */
3638 pSMB->SubCommand = cpu_to_le16(sub_command);
3639 return 0;
3640}
3641
3642static int
3643validate_ntransact(char *buf, char **ppparm, char **ppdata,
3644 __u32 *pparmlen, __u32 *pdatalen)
3645{
3646 char *end_of_smb;
3647 __u32 data_count, data_offset, parm_count, parm_offset;
3648 struct smb_com_ntransact_rsp *pSMBr;
820a803f 3649 u16 bcc;
79df1bae
JL
3650
3651 *pdatalen = 0;
3652 *pparmlen = 0;
3653
3654 if (buf == NULL)
3655 return -EINVAL;
3656
3657 pSMBr = (struct smb_com_ntransact_rsp *)buf;
3658
820a803f
JL
3659 bcc = get_bcc(&pSMBr->hdr);
3660 end_of_smb = 2 /* sizeof byte count */ + bcc +
79df1bae
JL
3661 (char *)&pSMBr->ByteCount;
3662
3663 data_offset = le32_to_cpu(pSMBr->DataOffset);
3664 data_count = le32_to_cpu(pSMBr->DataCount);
3665 parm_offset = le32_to_cpu(pSMBr->ParameterOffset);
3666 parm_count = le32_to_cpu(pSMBr->ParameterCount);
3667
3668 *ppparm = (char *)&pSMBr->hdr.Protocol + parm_offset;
3669 *ppdata = (char *)&pSMBr->hdr.Protocol + data_offset;
3670
3671 /* should we also check that parm and data areas do not overlap? */
3672 if (*ppparm > end_of_smb) {
3673 cFYI(1, "parms start after end of smb");
3674 return -EINVAL;
3675 } else if (parm_count + *ppparm > end_of_smb) {
3676 cFYI(1, "parm end after end of smb");
3677 return -EINVAL;
3678 } else if (*ppdata > end_of_smb) {
3679 cFYI(1, "data starts after end of smb");
3680 return -EINVAL;
3681 } else if (data_count + *ppdata > end_of_smb) {
3682 cFYI(1, "data %p + count %d (%p) past smb end %p start %p",
3683 *ppdata, data_count, (data_count + *ppdata),
3684 end_of_smb, pSMBr);
3685 return -EINVAL;
820a803f 3686 } else if (parm_count + data_count > bcc) {
79df1bae
JL
3687 cFYI(1, "parm count and data count larger than SMB");
3688 return -EINVAL;
3689 }
3690 *pdatalen = data_count;
3691 *pparmlen = parm_count;
3692 return 0;
3693}
3694
0a4b92c0
SF
3695/* Get Security Descriptor (by handle) from remote server for a file or dir */
3696int
96daf2b0 3697CIFSSMBGetCIFSACL(const int xid, struct cifs_tcon *tcon, __u16 fid,
630f3f0c 3698 struct cifs_ntsd **acl_inf, __u32 *pbuflen)
0a4b92c0
SF
3699{
3700 int rc = 0;
3701 int buf_type = 0;
ad7a2926 3702 QUERY_SEC_DESC_REQ *pSMB;
0a4b92c0
SF
3703 struct kvec iov[1];
3704
b6b38f70 3705 cFYI(1, "GetCifsACL");
0a4b92c0 3706
630f3f0c
SF
3707 *pbuflen = 0;
3708 *acl_inf = NULL;
3709
b9c7a2bb 3710 rc = smb_init_nttransact(NT_TRANSACT_QUERY_SECURITY_DESC, 0,
0a4b92c0
SF
3711 8 /* parm len */, tcon, (void **) &pSMB);
3712 if (rc)
3713 return rc;
3714
3715 pSMB->MaxParameterCount = cpu_to_le32(4);
3716 /* BB TEST with big acls that might need to be e.g. larger than 16K */
3717 pSMB->MaxSetupCount = 0;
3718 pSMB->Fid = fid; /* file handle always le */
3719 pSMB->AclFlags = cpu_to_le32(CIFS_ACL_OWNER | CIFS_ACL_GROUP |
3720 CIFS_ACL_DACL);
3721 pSMB->ByteCount = cpu_to_le16(11); /* 3 bytes pad + 8 bytes parm */
be8e3b00 3722 inc_rfc1001_len(pSMB, 11);
0a4b92c0 3723 iov[0].iov_base = (char *)pSMB;
be8e3b00 3724 iov[0].iov_len = be32_to_cpu(pSMB->hdr.smb_buf_length) + 4;
0a4b92c0 3725
a761ac57 3726 rc = SendReceive2(xid, tcon->ses, iov, 1 /* num iovec */, &buf_type,
7749981e 3727 0);
0a4b92c0
SF
3728 cifs_stats_inc(&tcon->num_acl_get);
3729 if (rc) {
b6b38f70 3730 cFYI(1, "Send error in QuerySecDesc = %d", rc);
0a4b92c0 3731 } else { /* decode response */
ad7a2926 3732 __le32 *parm;
630f3f0c
SF
3733 __u32 parm_len;
3734 __u32 acl_len;
50c2f753 3735 struct smb_com_ntransact_rsp *pSMBr;
630f3f0c 3736 char *pdata;
0a4b92c0
SF
3737
3738/* validate_nttransact */
50c2f753 3739 rc = validate_ntransact(iov[0].iov_base, (char **)&parm,
630f3f0c 3740 &pdata, &parm_len, pbuflen);
790fe579 3741 if (rc)
0a4b92c0
SF
3742 goto qsec_out;
3743 pSMBr = (struct smb_com_ntransact_rsp *)iov[0].iov_base;
3744
b6b38f70 3745 cFYI(1, "smb %p parm %p data %p", pSMBr, parm, *acl_inf);
0a4b92c0
SF
3746
3747 if (le32_to_cpu(pSMBr->ParameterCount) != 4) {
3748 rc = -EIO; /* bad smb */
630f3f0c 3749 *pbuflen = 0;
0a4b92c0
SF
3750 goto qsec_out;
3751 }
3752
3753/* BB check that data area is minimum length and as big as acl_len */
3754
af6f4612 3755 acl_len = le32_to_cpu(*parm);
630f3f0c 3756 if (acl_len != *pbuflen) {
b6b38f70
JP
3757 cERROR(1, "acl length %d does not match %d",
3758 acl_len, *pbuflen);
630f3f0c
SF
3759 if (*pbuflen > acl_len)
3760 *pbuflen = acl_len;
3761 }
0a4b92c0 3762
630f3f0c
SF
3763 /* check if buffer is big enough for the acl
3764 header followed by the smallest SID */
3765 if ((*pbuflen < sizeof(struct cifs_ntsd) + 8) ||
3766 (*pbuflen >= 64 * 1024)) {
b6b38f70 3767 cERROR(1, "bad acl length %d", *pbuflen);
630f3f0c
SF
3768 rc = -EINVAL;
3769 *pbuflen = 0;
3770 } else {
3771 *acl_inf = kmalloc(*pbuflen, GFP_KERNEL);
3772 if (*acl_inf == NULL) {
3773 *pbuflen = 0;
3774 rc = -ENOMEM;
3775 }
3776 memcpy(*acl_inf, pdata, *pbuflen);
3777 }
0a4b92c0
SF
3778 }
3779qsec_out:
790fe579 3780 if (buf_type == CIFS_SMALL_BUFFER)
0a4b92c0 3781 cifs_small_buf_release(iov[0].iov_base);
790fe579 3782 else if (buf_type == CIFS_LARGE_BUFFER)
0a4b92c0 3783 cifs_buf_release(iov[0].iov_base);
4b8f930f 3784/* cifs_small_buf_release(pSMB); */ /* Freed earlier now in SendReceive2 */
0a4b92c0
SF
3785 return rc;
3786}
97837582
SF
3787
3788int
96daf2b0 3789CIFSSMBSetCIFSACL(const int xid, struct cifs_tcon *tcon, __u16 fid,
a5ff3769 3790 struct cifs_ntsd *pntsd, __u32 acllen, int aclflag)
97837582
SF
3791{
3792 __u16 byte_count, param_count, data_count, param_offset, data_offset;
3793 int rc = 0;
3794 int bytes_returned = 0;
3795 SET_SEC_DESC_REQ *pSMB = NULL;
b2a3ad9c 3796 void *pSMBr;
97837582
SF
3797
3798setCifsAclRetry:
b2a3ad9c 3799 rc = smb_init(SMB_COM_NT_TRANSACT, 19, tcon, (void **) &pSMB, &pSMBr);
97837582 3800 if (rc)
b2a3ad9c 3801 return rc;
97837582
SF
3802
3803 pSMB->MaxSetupCount = 0;
3804 pSMB->Reserved = 0;
3805
3806 param_count = 8;
3807 param_offset = offsetof(struct smb_com_transaction_ssec_req, Fid) - 4;
3808 data_count = acllen;
3809 data_offset = param_offset + param_count;
3810 byte_count = 3 /* pad */ + param_count;
3811
3812 pSMB->DataCount = cpu_to_le32(data_count);
3813 pSMB->TotalDataCount = pSMB->DataCount;
3814 pSMB->MaxParameterCount = cpu_to_le32(4);
3815 pSMB->MaxDataCount = cpu_to_le32(16384);
3816 pSMB->ParameterCount = cpu_to_le32(param_count);
3817 pSMB->ParameterOffset = cpu_to_le32(param_offset);
3818 pSMB->TotalParameterCount = pSMB->ParameterCount;
3819 pSMB->DataOffset = cpu_to_le32(data_offset);
3820 pSMB->SetupCount = 0;
3821 pSMB->SubCommand = cpu_to_le16(NT_TRANSACT_SET_SECURITY_DESC);
3822 pSMB->ByteCount = cpu_to_le16(byte_count+data_count);
3823
3824 pSMB->Fid = fid; /* file handle always le */
3825 pSMB->Reserved2 = 0;
a5ff3769 3826 pSMB->AclFlags = cpu_to_le32(aclflag);
97837582
SF
3827
3828 if (pntsd && acllen) {
b2a3ad9c
JL
3829 memcpy((char *)pSMBr + offsetof(struct smb_hdr, Protocol) +
3830 data_offset, pntsd, acllen);
be8e3b00 3831 inc_rfc1001_len(pSMB, byte_count + data_count);
97837582 3832 } else
be8e3b00 3833 inc_rfc1001_len(pSMB, byte_count);
97837582
SF
3834
3835 rc = SendReceive(xid, tcon->ses, (struct smb_hdr *) pSMB,
3836 (struct smb_hdr *) pSMBr, &bytes_returned, 0);
3837
b6b38f70 3838 cFYI(1, "SetCIFSACL bytes_returned: %d, rc: %d", bytes_returned, rc);
97837582 3839 if (rc)
b6b38f70 3840 cFYI(1, "Set CIFS ACL returned %d", rc);
97837582
SF
3841 cifs_buf_release(pSMB);
3842
3843 if (rc == -EAGAIN)
3844 goto setCifsAclRetry;
3845
3846 return (rc);
3847}
3848
79df1bae 3849#endif /* CONFIG_CIFS_ACL */
0a4b92c0 3850
6b8edfe0
SF
3851/* Legacy Query Path Information call for lookup to old servers such
3852 as Win9x/WinME */
96daf2b0 3853int SMBQueryInformation(const int xid, struct cifs_tcon *tcon,
50c2f753
SF
3854 const unsigned char *searchName,
3855 FILE_ALL_INFO *pFinfo,
3856 const struct nls_table *nls_codepage, int remap)
6b8edfe0 3857{
ad7a2926
SF
3858 QUERY_INFORMATION_REQ *pSMB;
3859 QUERY_INFORMATION_RSP *pSMBr;
6b8edfe0
SF
3860 int rc = 0;
3861 int bytes_returned;
3862 int name_len;
3863
b6b38f70 3864 cFYI(1, "In SMBQPath path %s", searchName);
6b8edfe0
SF
3865QInfRetry:
3866 rc = smb_init(SMB_COM_QUERY_INFORMATION, 0, tcon, (void **) &pSMB,
50c2f753 3867 (void **) &pSMBr);
6b8edfe0
SF
3868 if (rc)
3869 return rc;
3870
3871 if (pSMB->hdr.Flags2 & SMBFLG2_UNICODE) {
3872 name_len =
acbbb76a
SF
3873 cifsConvertToUTF16((__le16 *) pSMB->FileName,
3874 searchName, PATH_MAX, nls_codepage,
3875 remap);
6b8edfe0
SF
3876 name_len++; /* trailing null */
3877 name_len *= 2;
50c2f753 3878 } else {
6b8edfe0
SF
3879 name_len = strnlen(searchName, PATH_MAX);
3880 name_len++; /* trailing null */
3881 strncpy(pSMB->FileName, searchName, name_len);
3882 }
3883 pSMB->BufferFormat = 0x04;
50c2f753 3884 name_len++; /* account for buffer type byte */
be8e3b00 3885 inc_rfc1001_len(pSMB, (__u16)name_len);
6b8edfe0
SF
3886 pSMB->ByteCount = cpu_to_le16(name_len);
3887
3888 rc = SendReceive(xid, tcon->ses, (struct smb_hdr *) pSMB,
50c2f753 3889 (struct smb_hdr *) pSMBr, &bytes_returned, 0);
6b8edfe0 3890 if (rc) {
b6b38f70 3891 cFYI(1, "Send error in QueryInfo = %d", rc);
ad7a2926 3892 } else if (pFinfo) {
1bd5bbcb
SF
3893 struct timespec ts;
3894 __u32 time = le32_to_cpu(pSMBr->last_write_time);
ad7a2926
SF
3895
3896 /* decode response */
1bd5bbcb 3897 /* BB FIXME - add time zone adjustment BB */
6b8edfe0 3898 memset(pFinfo, 0, sizeof(FILE_ALL_INFO));
1bd5bbcb
SF
3899 ts.tv_nsec = 0;
3900 ts.tv_sec = time;
3901 /* decode time fields */
733f99ac 3902 pFinfo->ChangeTime = cpu_to_le64(cifs_UnixTimeToNT(ts));
1bd5bbcb
SF
3903 pFinfo->LastWriteTime = pFinfo->ChangeTime;
3904 pFinfo->LastAccessTime = 0;
70ca734a
SF
3905 pFinfo->AllocationSize =
3906 cpu_to_le64(le32_to_cpu(pSMBr->size));
3907 pFinfo->EndOfFile = pFinfo->AllocationSize;
3908 pFinfo->Attributes =
3909 cpu_to_le32(le16_to_cpu(pSMBr->attr));
6b8edfe0
SF
3910 } else
3911 rc = -EIO; /* bad buffer passed in */
3912
3913 cifs_buf_release(pSMB);
3914
3915 if (rc == -EAGAIN)
3916 goto QInfRetry;
3917
3918 return rc;
3919}
3920
bcd5357f 3921int
96daf2b0 3922CIFSSMBQFileInfo(const int xid, struct cifs_tcon *tcon,
bcd5357f
JL
3923 u16 netfid, FILE_ALL_INFO *pFindData)
3924{
3925 struct smb_t2_qfi_req *pSMB = NULL;
3926 struct smb_t2_qfi_rsp *pSMBr = NULL;
3927 int rc = 0;
3928 int bytes_returned;
3929 __u16 params, byte_count;
3930
3931QFileInfoRetry:
3932 rc = smb_init(SMB_COM_TRANSACTION2, 15, tcon, (void **) &pSMB,
3933 (void **) &pSMBr);
3934 if (rc)
3935 return rc;
3936
3937 params = 2 /* level */ + 2 /* fid */;
3938 pSMB->t2.TotalDataCount = 0;
3939 pSMB->t2.MaxParameterCount = cpu_to_le16(4);
3940 /* BB find exact max data count below from sess structure BB */
3941 pSMB->t2.MaxDataCount = cpu_to_le16(CIFSMaxBufSize);
3942 pSMB->t2.MaxSetupCount = 0;
3943 pSMB->t2.Reserved = 0;
3944 pSMB->t2.Flags = 0;
3945 pSMB->t2.Timeout = 0;
3946 pSMB->t2.Reserved2 = 0;
3947 pSMB->t2.ParameterOffset = cpu_to_le16(offsetof(struct smb_t2_qfi_req,
3948 Fid) - 4);
3949 pSMB->t2.DataCount = 0;
3950 pSMB->t2.DataOffset = 0;
3951 pSMB->t2.SetupCount = 1;
3952 pSMB->t2.Reserved3 = 0;
3953 pSMB->t2.SubCommand = cpu_to_le16(TRANS2_QUERY_FILE_INFORMATION);
3954 byte_count = params + 1 /* pad */ ;
3955 pSMB->t2.TotalParameterCount = cpu_to_le16(params);
3956 pSMB->t2.ParameterCount = pSMB->t2.TotalParameterCount;
3957 pSMB->InformationLevel = cpu_to_le16(SMB_QUERY_FILE_ALL_INFO);
3958 pSMB->Pad = 0;
3959 pSMB->Fid = netfid;
be8e3b00 3960 inc_rfc1001_len(pSMB, byte_count);
6b8edfe0 3961
bcd5357f
JL
3962 rc = SendReceive(xid, tcon->ses, (struct smb_hdr *) pSMB,
3963 (struct smb_hdr *) pSMBr, &bytes_returned, 0);
3964 if (rc) {
f19159dc 3965 cFYI(1, "Send error in QPathInfo = %d", rc);
bcd5357f
JL
3966 } else { /* decode response */
3967 rc = validate_t2((struct smb_t2_rsp *)pSMBr);
6b8edfe0 3968
bcd5357f
JL
3969 if (rc) /* BB add auto retry on EOPNOTSUPP? */
3970 rc = -EIO;
820a803f 3971 else if (get_bcc(&pSMBr->hdr) < 40)
bcd5357f
JL
3972 rc = -EIO; /* bad smb */
3973 else if (pFindData) {
3974 __u16 data_offset = le16_to_cpu(pSMBr->t2.DataOffset);
3975 memcpy((char *) pFindData,
3976 (char *) &pSMBr->hdr.Protocol +
3977 data_offset, sizeof(FILE_ALL_INFO));
3978 } else
3979 rc = -ENOMEM;
3980 }
3981 cifs_buf_release(pSMB);
3982 if (rc == -EAGAIN)
3983 goto QFileInfoRetry;
6b8edfe0 3984
bcd5357f
JL
3985 return rc;
3986}
6b8edfe0 3987
1da177e4 3988int
96daf2b0 3989CIFSSMBQPathInfo(const int xid, struct cifs_tcon *tcon,
1da177e4 3990 const unsigned char *searchName,
ad7a2926 3991 FILE_ALL_INFO *pFindData,
acf1a1b1 3992 int legacy /* old style infolevel */,
737b758c 3993 const struct nls_table *nls_codepage, int remap)
1da177e4
LT
3994{
3995/* level 263 SMB_QUERY_FILE_ALL_INFO */
3996 TRANSACTION2_QPI_REQ *pSMB = NULL;
3997 TRANSACTION2_QPI_RSP *pSMBr = NULL;
3998 int rc = 0;
3999 int bytes_returned;
4000 int name_len;
4001 __u16 params, byte_count;
4002
b6b38f70 4003/* cFYI(1, "In QPathInfo path %s", searchName); */
1da177e4
LT
4004QPathInfoRetry:
4005 rc = smb_init(SMB_COM_TRANSACTION2, 15, tcon, (void **) &pSMB,
4006 (void **) &pSMBr);
4007 if (rc)
4008 return rc;
4009
4010 if (pSMB->hdr.Flags2 & SMBFLG2_UNICODE) {
4011 name_len =
acbbb76a
SF
4012 cifsConvertToUTF16((__le16 *) pSMB->FileName, searchName,
4013 PATH_MAX, nls_codepage, remap);
1da177e4
LT
4014 name_len++; /* trailing null */
4015 name_len *= 2;
50c2f753 4016 } else { /* BB improve the check for buffer overruns BB */
1da177e4
LT
4017 name_len = strnlen(searchName, PATH_MAX);
4018 name_len++; /* trailing null */
4019 strncpy(pSMB->FileName, searchName, name_len);
4020 }
4021
50c2f753 4022 params = 2 /* level */ + 4 /* reserved */ + name_len /* includes NUL */;
1da177e4
LT
4023 pSMB->TotalDataCount = 0;
4024 pSMB->MaxParameterCount = cpu_to_le16(2);
582d21e5
SF
4025 /* BB find exact max SMB PDU from sess structure BB */
4026 pSMB->MaxDataCount = cpu_to_le16(4000);
1da177e4
LT
4027 pSMB->MaxSetupCount = 0;
4028 pSMB->Reserved = 0;
4029 pSMB->Flags = 0;
4030 pSMB->Timeout = 0;
4031 pSMB->Reserved2 = 0;
4032 pSMB->ParameterOffset = cpu_to_le16(offsetof(
50c2f753 4033 struct smb_com_transaction2_qpi_req, InformationLevel) - 4);
1da177e4
LT
4034 pSMB->DataCount = 0;
4035 pSMB->DataOffset = 0;
4036 pSMB->SetupCount = 1;
4037 pSMB->Reserved3 = 0;
4038 pSMB->SubCommand = cpu_to_le16(TRANS2_QUERY_PATH_INFORMATION);
4039 byte_count = params + 1 /* pad */ ;
4040 pSMB->TotalParameterCount = cpu_to_le16(params);
4041 pSMB->ParameterCount = pSMB->TotalParameterCount;
790fe579 4042 if (legacy)
acf1a1b1
SF
4043 pSMB->InformationLevel = cpu_to_le16(SMB_INFO_STANDARD);
4044 else
4045 pSMB->InformationLevel = cpu_to_le16(SMB_QUERY_FILE_ALL_INFO);
1da177e4 4046 pSMB->Reserved4 = 0;
be8e3b00 4047 inc_rfc1001_len(pSMB, byte_count);
1da177e4
LT
4048 pSMB->ByteCount = cpu_to_le16(byte_count);
4049
4050 rc = SendReceive(xid, tcon->ses, (struct smb_hdr *) pSMB,
4051 (struct smb_hdr *) pSMBr, &bytes_returned, 0);
4052 if (rc) {
b6b38f70 4053 cFYI(1, "Send error in QPathInfo = %d", rc);
1da177e4
LT
4054 } else { /* decode response */
4055 rc = validate_t2((struct smb_t2_rsp *)pSMBr);
4056
acf1a1b1
SF
4057 if (rc) /* BB add auto retry on EOPNOTSUPP? */
4058 rc = -EIO;
820a803f 4059 else if (!legacy && get_bcc(&pSMBr->hdr) < 40)
1da177e4 4060 rc = -EIO; /* bad smb */
820a803f 4061 else if (legacy && get_bcc(&pSMBr->hdr) < 24)
50c2f753
SF
4062 rc = -EIO; /* 24 or 26 expected but we do not read
4063 last field */
4064 else if (pFindData) {
acf1a1b1 4065 int size;
1da177e4 4066 __u16 data_offset = le16_to_cpu(pSMBr->t2.DataOffset);
ad7a2926
SF
4067
4068 /* On legacy responses we do not read the last field,
4069 EAsize, fortunately since it varies by subdialect and
4070 also note it differs on Set vs. Get, ie two bytes or 4
4071 bytes depending but we don't care here */
4072 if (legacy)
acf1a1b1
SF
4073 size = sizeof(FILE_INFO_STANDARD);
4074 else
4075 size = sizeof(FILE_ALL_INFO);
1da177e4
LT
4076 memcpy((char *) pFindData,
4077 (char *) &pSMBr->hdr.Protocol +
acf1a1b1 4078 data_offset, size);
1da177e4
LT
4079 } else
4080 rc = -ENOMEM;
4081 }
4082 cifs_buf_release(pSMB);
4083 if (rc == -EAGAIN)
4084 goto QPathInfoRetry;
4085
4086 return rc;
4087}
4088
c8634fd3 4089int
96daf2b0 4090CIFSSMBUnixQFileInfo(const int xid, struct cifs_tcon *tcon,
c8634fd3
JL
4091 u16 netfid, FILE_UNIX_BASIC_INFO *pFindData)
4092{
4093 struct smb_t2_qfi_req *pSMB = NULL;
4094 struct smb_t2_qfi_rsp *pSMBr = NULL;
4095 int rc = 0;
4096 int bytes_returned;
4097 __u16 params, byte_count;
4098
4099UnixQFileInfoRetry:
4100 rc = smb_init(SMB_COM_TRANSACTION2, 15, tcon, (void **) &pSMB,
4101 (void **) &pSMBr);
4102 if (rc)
4103 return rc;
4104
4105 params = 2 /* level */ + 2 /* fid */;
4106 pSMB->t2.TotalDataCount = 0;
4107 pSMB->t2.MaxParameterCount = cpu_to_le16(4);
4108 /* BB find exact max data count below from sess structure BB */
4109 pSMB->t2.MaxDataCount = cpu_to_le16(CIFSMaxBufSize);
4110 pSMB->t2.MaxSetupCount = 0;
4111 pSMB->t2.Reserved = 0;
4112 pSMB->t2.Flags = 0;
4113 pSMB->t2.Timeout = 0;
4114 pSMB->t2.Reserved2 = 0;
4115 pSMB->t2.ParameterOffset = cpu_to_le16(offsetof(struct smb_t2_qfi_req,
4116 Fid) - 4);
4117 pSMB->t2.DataCount = 0;
4118 pSMB->t2.DataOffset = 0;
4119 pSMB->t2.SetupCount = 1;
4120 pSMB->t2.Reserved3 = 0;
4121 pSMB->t2.SubCommand = cpu_to_le16(TRANS2_QUERY_FILE_INFORMATION);
4122 byte_count = params + 1 /* pad */ ;
4123 pSMB->t2.TotalParameterCount = cpu_to_le16(params);
4124 pSMB->t2.ParameterCount = pSMB->t2.TotalParameterCount;
4125 pSMB->InformationLevel = cpu_to_le16(SMB_QUERY_FILE_UNIX_BASIC);
4126 pSMB->Pad = 0;
4127 pSMB->Fid = netfid;
be8e3b00 4128 inc_rfc1001_len(pSMB, byte_count);
c8634fd3
JL
4129
4130 rc = SendReceive(xid, tcon->ses, (struct smb_hdr *) pSMB,
4131 (struct smb_hdr *) pSMBr, &bytes_returned, 0);
4132 if (rc) {
f19159dc 4133 cFYI(1, "Send error in QPathInfo = %d", rc);
c8634fd3
JL
4134 } else { /* decode response */
4135 rc = validate_t2((struct smb_t2_rsp *)pSMBr);
4136
820a803f 4137 if (rc || get_bcc(&pSMBr->hdr) < sizeof(FILE_UNIX_BASIC_INFO)) {
ac3aa2f8 4138 cERROR(1, "Malformed FILE_UNIX_BASIC_INFO response. "
c8634fd3 4139 "Unix Extensions can be disabled on mount "
f19159dc 4140 "by specifying the nosfu mount option.");
c8634fd3
JL
4141 rc = -EIO; /* bad smb */
4142 } else {
4143 __u16 data_offset = le16_to_cpu(pSMBr->t2.DataOffset);
4144 memcpy((char *) pFindData,
4145 (char *) &pSMBr->hdr.Protocol +
4146 data_offset,
4147 sizeof(FILE_UNIX_BASIC_INFO));
4148 }
4149 }
4150
4151 cifs_buf_release(pSMB);
4152 if (rc == -EAGAIN)
4153 goto UnixQFileInfoRetry;
4154
4155 return rc;
4156}
4157
1da177e4 4158int
96daf2b0 4159CIFSSMBUnixQPathInfo(const int xid, struct cifs_tcon *tcon,
1da177e4 4160 const unsigned char *searchName,
582d21e5 4161 FILE_UNIX_BASIC_INFO *pFindData,
737b758c 4162 const struct nls_table *nls_codepage, int remap)
1da177e4
LT
4163{
4164/* SMB_QUERY_FILE_UNIX_BASIC */
4165 TRANSACTION2_QPI_REQ *pSMB = NULL;
4166 TRANSACTION2_QPI_RSP *pSMBr = NULL;
4167 int rc = 0;
4168 int bytes_returned = 0;
4169 int name_len;
4170 __u16 params, byte_count;
4171
b6b38f70 4172 cFYI(1, "In QPathInfo (Unix) the path %s", searchName);
1da177e4
LT
4173UnixQPathInfoRetry:
4174 rc = smb_init(SMB_COM_TRANSACTION2, 15, tcon, (void **) &pSMB,
4175 (void **) &pSMBr);
4176 if (rc)
4177 return rc;
4178
4179 if (pSMB->hdr.Flags2 & SMBFLG2_UNICODE) {
4180 name_len =
acbbb76a
SF
4181 cifsConvertToUTF16((__le16 *) pSMB->FileName, searchName,
4182 PATH_MAX, nls_codepage, remap);
1da177e4
LT
4183 name_len++; /* trailing null */
4184 name_len *= 2;
50c2f753 4185 } else { /* BB improve the check for buffer overruns BB */
1da177e4
LT
4186 name_len = strnlen(searchName, PATH_MAX);
4187 name_len++; /* trailing null */
4188 strncpy(pSMB->FileName, searchName, name_len);
4189 }
4190
50c2f753 4191 params = 2 /* level */ + 4 /* reserved */ + name_len /* includes NUL */;
1da177e4
LT
4192 pSMB->TotalDataCount = 0;
4193 pSMB->MaxParameterCount = cpu_to_le16(2);
4194 /* BB find exact max SMB PDU from sess structure BB */
50c2f753 4195 pSMB->MaxDataCount = cpu_to_le16(4000);
1da177e4
LT
4196 pSMB->MaxSetupCount = 0;
4197 pSMB->Reserved = 0;
4198 pSMB->Flags = 0;
4199 pSMB->Timeout = 0;
4200 pSMB->Reserved2 = 0;
4201 pSMB->ParameterOffset = cpu_to_le16(offsetof(
50c2f753 4202 struct smb_com_transaction2_qpi_req, InformationLevel) - 4);
1da177e4
LT
4203 pSMB->DataCount = 0;
4204 pSMB->DataOffset = 0;
4205 pSMB->SetupCount = 1;
4206 pSMB->Reserved3 = 0;
4207 pSMB->SubCommand = cpu_to_le16(TRANS2_QUERY_PATH_INFORMATION);
4208 byte_count = params + 1 /* pad */ ;
4209 pSMB->TotalParameterCount = cpu_to_le16(params);
4210 pSMB->ParameterCount = pSMB->TotalParameterCount;
4211 pSMB->InformationLevel = cpu_to_le16(SMB_QUERY_FILE_UNIX_BASIC);
4212 pSMB->Reserved4 = 0;
be8e3b00 4213 inc_rfc1001_len(pSMB, byte_count);
1da177e4
LT
4214 pSMB->ByteCount = cpu_to_le16(byte_count);
4215
4216 rc = SendReceive(xid, tcon->ses, (struct smb_hdr *) pSMB,
4217 (struct smb_hdr *) pSMBr, &bytes_returned, 0);
4218 if (rc) {
b6b38f70 4219 cFYI(1, "Send error in QPathInfo = %d", rc);
1da177e4
LT
4220 } else { /* decode response */
4221 rc = validate_t2((struct smb_t2_rsp *)pSMBr);
4222
820a803f 4223 if (rc || get_bcc(&pSMBr->hdr) < sizeof(FILE_UNIX_BASIC_INFO)) {
ac3aa2f8 4224 cERROR(1, "Malformed FILE_UNIX_BASIC_INFO response. "
1e71f25d 4225 "Unix Extensions can be disabled on mount "
b6b38f70 4226 "by specifying the nosfu mount option.");
1da177e4
LT
4227 rc = -EIO; /* bad smb */
4228 } else {
4229 __u16 data_offset = le16_to_cpu(pSMBr->t2.DataOffset);
4230 memcpy((char *) pFindData,
4231 (char *) &pSMBr->hdr.Protocol +
4232 data_offset,
630f3f0c 4233 sizeof(FILE_UNIX_BASIC_INFO));
1da177e4
LT
4234 }
4235 }
4236 cifs_buf_release(pSMB);
4237 if (rc == -EAGAIN)
4238 goto UnixQPathInfoRetry;
4239
4240 return rc;
4241}
4242
1da177e4
LT
4243/* xid, tcon, searchName and codepage are input parms, rest are returned */
4244int
96daf2b0 4245CIFSFindFirst(const int xid, struct cifs_tcon *tcon,
50c2f753 4246 const char *searchName,
1da177e4 4247 const struct nls_table *nls_codepage,
2608bee7 4248 __u16 *pnetfid, __u16 search_flags,
50c2f753 4249 struct cifs_search_info *psrch_inf, int remap, const char dirsep)
1da177e4
LT
4250{
4251/* level 257 SMB_ */
4252 TRANSACTION2_FFIRST_REQ *pSMB = NULL;
4253 TRANSACTION2_FFIRST_RSP *pSMBr = NULL;
ad7a2926 4254 T2_FFIRST_RSP_PARMS *parms;
1da177e4
LT
4255 int rc = 0;
4256 int bytes_returned = 0;
4257 int name_len;
4258 __u16 params, byte_count;
4259
b6b38f70 4260 cFYI(1, "In FindFirst for %s", searchName);
1da177e4
LT
4261
4262findFirstRetry:
4263 rc = smb_init(SMB_COM_TRANSACTION2, 15, tcon, (void **) &pSMB,
4264 (void **) &pSMBr);
4265 if (rc)
4266 return rc;
4267
4268 if (pSMB->hdr.Flags2 & SMBFLG2_UNICODE) {
4269 name_len =
acbbb76a
SF
4270 cifsConvertToUTF16((__le16 *) pSMB->FileName, searchName,
4271 PATH_MAX, nls_codepage, remap);
737b758c
SF
4272 /* We can not add the asterik earlier in case
4273 it got remapped to 0xF03A as if it were part of the
4274 directory name instead of a wildcard */
1da177e4 4275 name_len *= 2;
ac67055e 4276 pSMB->FileName[name_len] = dirsep;
737b758c
SF
4277 pSMB->FileName[name_len+1] = 0;
4278 pSMB->FileName[name_len+2] = '*';
4279 pSMB->FileName[name_len+3] = 0;
4280 name_len += 4; /* now the trailing null */
1da177e4
LT
4281 pSMB->FileName[name_len] = 0; /* null terminate just in case */
4282 pSMB->FileName[name_len+1] = 0;
737b758c 4283 name_len += 2;
1da177e4
LT
4284 } else { /* BB add check for overrun of SMB buf BB */
4285 name_len = strnlen(searchName, PATH_MAX);
1da177e4 4286/* BB fix here and in unicode clause above ie
790fe579 4287 if (name_len > buffersize-header)
1da177e4
LT
4288 free buffer exit; BB */
4289 strncpy(pSMB->FileName, searchName, name_len);
ac67055e 4290 pSMB->FileName[name_len] = dirsep;
68575476
SF
4291 pSMB->FileName[name_len+1] = '*';
4292 pSMB->FileName[name_len+2] = 0;
4293 name_len += 3;
1da177e4
LT
4294 }
4295
4296 params = 12 + name_len /* includes null */ ;
4297 pSMB->TotalDataCount = 0; /* no EAs */
4298 pSMB->MaxParameterCount = cpu_to_le16(10);
c974befa 4299 pSMB->MaxDataCount = cpu_to_le16(CIFSMaxBufSize & 0xFFFFFF00);
1da177e4
LT
4300 pSMB->MaxSetupCount = 0;
4301 pSMB->Reserved = 0;
4302 pSMB->Flags = 0;
4303 pSMB->Timeout = 0;
4304 pSMB->Reserved2 = 0;
4305 byte_count = params + 1 /* pad */ ;
4306 pSMB->TotalParameterCount = cpu_to_le16(params);
4307 pSMB->ParameterCount = pSMB->TotalParameterCount;
4308 pSMB->ParameterOffset = cpu_to_le16(
88274815
SF
4309 offsetof(struct smb_com_transaction2_ffirst_req, SearchAttributes)
4310 - 4);
1da177e4
LT
4311 pSMB->DataCount = 0;
4312 pSMB->DataOffset = 0;
4313 pSMB->SetupCount = 1; /* one byte, no need to make endian neutral */
4314 pSMB->Reserved3 = 0;
4315 pSMB->SubCommand = cpu_to_le16(TRANS2_FIND_FIRST);
4316 pSMB->SearchAttributes =
4317 cpu_to_le16(ATTR_READONLY | ATTR_HIDDEN | ATTR_SYSTEM |
4318 ATTR_DIRECTORY);
50c2f753 4319 pSMB->SearchCount = cpu_to_le16(CIFSMaxBufSize/sizeof(FILE_UNIX_INFO));
2608bee7 4320 pSMB->SearchFlags = cpu_to_le16(search_flags);
1da177e4
LT
4321 pSMB->InformationLevel = cpu_to_le16(psrch_inf->info_level);
4322
4323 /* BB what should we set StorageType to? Does it matter? BB */
4324 pSMB->SearchStorageType = 0;
be8e3b00 4325 inc_rfc1001_len(pSMB, byte_count);
1da177e4
LT
4326 pSMB->ByteCount = cpu_to_le16(byte_count);
4327
4328 rc = SendReceive(xid, tcon->ses, (struct smb_hdr *) pSMB,
4329 (struct smb_hdr *) pSMBr, &bytes_returned, 0);
a4544347 4330 cifs_stats_inc(&tcon->num_ffirst);
1da177e4 4331
88274815
SF
4332 if (rc) {/* BB add logic to retry regular search if Unix search
4333 rejected unexpectedly by server */
1da177e4 4334 /* BB Add code to handle unsupported level rc */
b6b38f70 4335 cFYI(1, "Error in FindFirst = %d", rc);
1982c344 4336
88274815 4337 cifs_buf_release(pSMB);
1da177e4
LT
4338
4339 /* BB eventually could optimize out free and realloc of buf */
4340 /* for this case */
4341 if (rc == -EAGAIN)
4342 goto findFirstRetry;
4343 } else { /* decode response */
4344 /* BB remember to free buffer if error BB */
4345 rc = validate_t2((struct smb_t2_rsp *)pSMBr);
790fe579 4346 if (rc == 0) {
b77d753c
SF
4347 unsigned int lnoff;
4348
1da177e4 4349 if (pSMBr->hdr.Flags2 & SMBFLG2_UNICODE)
4b18f2a9 4350 psrch_inf->unicode = true;
1da177e4 4351 else
4b18f2a9 4352 psrch_inf->unicode = false;
1da177e4
LT
4353
4354 psrch_inf->ntwrk_buf_start = (char *)pSMBr;
d47d7c1a 4355 psrch_inf->smallBuf = 0;
50c2f753
SF
4356 psrch_inf->srch_entries_start =
4357 (char *) &pSMBr->hdr.Protocol +
1da177e4 4358 le16_to_cpu(pSMBr->t2.DataOffset);
1da177e4
LT
4359 parms = (T2_FFIRST_RSP_PARMS *)((char *) &pSMBr->hdr.Protocol +
4360 le16_to_cpu(pSMBr->t2.ParameterOffset));
4361
790fe579 4362 if (parms->EndofSearch)
4b18f2a9 4363 psrch_inf->endOfSearch = true;
1da177e4 4364 else
4b18f2a9 4365 psrch_inf->endOfSearch = false;
1da177e4 4366
50c2f753
SF
4367 psrch_inf->entries_in_buffer =
4368 le16_to_cpu(parms->SearchCount);
60808233 4369 psrch_inf->index_of_last_entry = 2 /* skip . and .. */ +
1da177e4 4370 psrch_inf->entries_in_buffer;
b77d753c 4371 lnoff = le16_to_cpu(parms->LastNameOffset);
c974befa 4372 if (CIFSMaxBufSize < lnoff) {
b6b38f70 4373 cERROR(1, "ignoring corrupt resume name");
b77d753c
SF
4374 psrch_inf->last_entry = NULL;
4375 return rc;
4376 }
4377
0752f152 4378 psrch_inf->last_entry = psrch_inf->srch_entries_start +
b77d753c
SF
4379 lnoff;
4380
1da177e4
LT
4381 *pnetfid = parms->SearchHandle;
4382 } else {
4383 cifs_buf_release(pSMB);
4384 }
4385 }
4386
4387 return rc;
4388}
4389
2608bee7
SP
4390int CIFSFindNext(const int xid, struct cifs_tcon *tcon, __u16 searchHandle,
4391 __u16 search_flags, struct cifs_search_info *psrch_inf)
1da177e4
LT
4392{
4393 TRANSACTION2_FNEXT_REQ *pSMB = NULL;
4394 TRANSACTION2_FNEXT_RSP *pSMBr = NULL;
ad7a2926 4395 T2_FNEXT_RSP_PARMS *parms;
1da177e4
LT
4396 char *response_data;
4397 int rc = 0;
9438fabb
JL
4398 int bytes_returned;
4399 unsigned int name_len;
1da177e4
LT
4400 __u16 params, byte_count;
4401
b6b38f70 4402 cFYI(1, "In FindNext");
1da177e4 4403
4b18f2a9 4404 if (psrch_inf->endOfSearch)
1da177e4
LT
4405 return -ENOENT;
4406
4407 rc = smb_init(SMB_COM_TRANSACTION2, 15, tcon, (void **) &pSMB,
4408 (void **) &pSMBr);
4409 if (rc)
4410 return rc;
4411
50c2f753 4412 params = 14; /* includes 2 bytes of null string, converted to LE below*/
1da177e4
LT
4413 byte_count = 0;
4414 pSMB->TotalDataCount = 0; /* no EAs */
4415 pSMB->MaxParameterCount = cpu_to_le16(8);
c974befa 4416 pSMB->MaxDataCount = cpu_to_le16(CIFSMaxBufSize & 0xFFFFFF00);
1da177e4
LT
4417 pSMB->MaxSetupCount = 0;
4418 pSMB->Reserved = 0;
4419 pSMB->Flags = 0;
4420 pSMB->Timeout = 0;
4421 pSMB->Reserved2 = 0;
4422 pSMB->ParameterOffset = cpu_to_le16(
4423 offsetof(struct smb_com_transaction2_fnext_req,SearchHandle) - 4);
4424 pSMB->DataCount = 0;
4425 pSMB->DataOffset = 0;
4426 pSMB->SetupCount = 1;
4427 pSMB->Reserved3 = 0;
4428 pSMB->SubCommand = cpu_to_le16(TRANS2_FIND_NEXT);
4429 pSMB->SearchHandle = searchHandle; /* always kept as le */
4430 pSMB->SearchCount =
630f3f0c 4431 cpu_to_le16(CIFSMaxBufSize / sizeof(FILE_UNIX_INFO));
1da177e4
LT
4432 pSMB->InformationLevel = cpu_to_le16(psrch_inf->info_level);
4433 pSMB->ResumeKey = psrch_inf->resume_key;
2608bee7 4434 pSMB->SearchFlags = cpu_to_le16(search_flags);
1da177e4
LT
4435
4436 name_len = psrch_inf->resume_name_len;
4437 params += name_len;
790fe579 4438 if (name_len < PATH_MAX) {
1da177e4
LT
4439 memcpy(pSMB->ResumeFileName, psrch_inf->presume_name, name_len);
4440 byte_count += name_len;
ef6724e3
SF
4441 /* 14 byte parm len above enough for 2 byte null terminator */
4442 pSMB->ResumeFileName[name_len] = 0;
4443 pSMB->ResumeFileName[name_len+1] = 0;
1da177e4
LT
4444 } else {
4445 rc = -EINVAL;
4446 goto FNext2_err_exit;
4447 }
4448 byte_count = params + 1 /* pad */ ;
4449 pSMB->TotalParameterCount = cpu_to_le16(params);
4450 pSMB->ParameterCount = pSMB->TotalParameterCount;
be8e3b00 4451 inc_rfc1001_len(pSMB, byte_count);
1da177e4 4452 pSMB->ByteCount = cpu_to_le16(byte_count);
50c2f753 4453
1da177e4
LT
4454 rc = SendReceive(xid, tcon->ses, (struct smb_hdr *) pSMB,
4455 (struct smb_hdr *) pSMBr, &bytes_returned, 0);
a4544347 4456 cifs_stats_inc(&tcon->num_fnext);
1da177e4
LT
4457 if (rc) {
4458 if (rc == -EBADF) {
4b18f2a9 4459 psrch_inf->endOfSearch = true;
6353450a 4460 cifs_buf_release(pSMB);
50c2f753 4461 rc = 0; /* search probably was closed at end of search*/
1da177e4 4462 } else
b6b38f70 4463 cFYI(1, "FindNext returned = %d", rc);
1da177e4
LT
4464 } else { /* decode response */
4465 rc = validate_t2((struct smb_t2_rsp *)pSMBr);
50c2f753 4466
790fe579 4467 if (rc == 0) {
b77d753c
SF
4468 unsigned int lnoff;
4469
1da177e4
LT
4470 /* BB fixme add lock for file (srch_info) struct here */
4471 if (pSMBr->hdr.Flags2 & SMBFLG2_UNICODE)
4b18f2a9 4472 psrch_inf->unicode = true;
1da177e4 4473 else
4b18f2a9 4474 psrch_inf->unicode = false;
1da177e4
LT
4475 response_data = (char *) &pSMBr->hdr.Protocol +
4476 le16_to_cpu(pSMBr->t2.ParameterOffset);
4477 parms = (T2_FNEXT_RSP_PARMS *)response_data;
4478 response_data = (char *)&pSMBr->hdr.Protocol +
4479 le16_to_cpu(pSMBr->t2.DataOffset);
790fe579 4480 if (psrch_inf->smallBuf)
d47d7c1a
SF
4481 cifs_small_buf_release(
4482 psrch_inf->ntwrk_buf_start);
4483 else
4484 cifs_buf_release(psrch_inf->ntwrk_buf_start);
1da177e4
LT
4485 psrch_inf->srch_entries_start = response_data;
4486 psrch_inf->ntwrk_buf_start = (char *)pSMB;
d47d7c1a 4487 psrch_inf->smallBuf = 0;
790fe579 4488 if (parms->EndofSearch)
4b18f2a9 4489 psrch_inf->endOfSearch = true;
1da177e4 4490 else
4b18f2a9 4491 psrch_inf->endOfSearch = false;
50c2f753
SF
4492 psrch_inf->entries_in_buffer =
4493 le16_to_cpu(parms->SearchCount);
1da177e4
LT
4494 psrch_inf->index_of_last_entry +=
4495 psrch_inf->entries_in_buffer;
b77d753c 4496 lnoff = le16_to_cpu(parms->LastNameOffset);
c974befa 4497 if (CIFSMaxBufSize < lnoff) {
b6b38f70 4498 cERROR(1, "ignoring corrupt resume name");
b77d753c
SF
4499 psrch_inf->last_entry = NULL;
4500 return rc;
4501 } else
4502 psrch_inf->last_entry =
4503 psrch_inf->srch_entries_start + lnoff;
4504
b6b38f70
JP
4505/* cFYI(1, "fnxt2 entries in buf %d index_of_last %d",
4506 psrch_inf->entries_in_buffer, psrch_inf->index_of_last_entry); */
1da177e4
LT
4507
4508 /* BB fixme add unlock here */
4509 }
4510
4511 }
4512
4513 /* BB On error, should we leave previous search buf (and count and
4514 last entry fields) intact or free the previous one? */
4515
4516 /* Note: On -EAGAIN error only caller can retry on handle based calls
4517 since file handle passed in no longer valid */
4518FNext2_err_exit:
4519 if (rc != 0)
4520 cifs_buf_release(pSMB);
1da177e4
LT
4521 return rc;
4522}
4523
4524int
96daf2b0 4525CIFSFindClose(const int xid, struct cifs_tcon *tcon,
50c2f753 4526 const __u16 searchHandle)
1da177e4
LT
4527{
4528 int rc = 0;
4529 FINDCLOSE_REQ *pSMB = NULL;
1da177e4 4530
b6b38f70 4531 cFYI(1, "In CIFSSMBFindClose");
1da177e4
LT
4532 rc = small_smb_init(SMB_COM_FIND_CLOSE2, 1, tcon, (void **)&pSMB);
4533
4534 /* no sense returning error if session restarted
4535 as file handle has been closed */
790fe579 4536 if (rc == -EAGAIN)
1da177e4
LT
4537 return 0;
4538 if (rc)
4539 return rc;
4540
1da177e4
LT
4541 pSMB->FileID = searchHandle;
4542 pSMB->ByteCount = 0;
792af7b0 4543 rc = SendReceiveNoRsp(xid, tcon->ses, (char *) pSMB, 0);
ad7a2926 4544 if (rc)
b6b38f70 4545 cERROR(1, "Send error in FindClose = %d", rc);
ad7a2926 4546
a4544347 4547 cifs_stats_inc(&tcon->num_fclose);
1da177e4
LT
4548
4549 /* Since session is dead, search handle closed on server already */
4550 if (rc == -EAGAIN)
4551 rc = 0;
4552
4553 return rc;
4554}
4555
1da177e4 4556int
96daf2b0 4557CIFSGetSrvInodeNumber(const int xid, struct cifs_tcon *tcon,
50c2f753 4558 const unsigned char *searchName,
ad7a2926 4559 __u64 *inode_number,
50c2f753 4560 const struct nls_table *nls_codepage, int remap)
1da177e4
LT
4561{
4562 int rc = 0;
4563 TRANSACTION2_QPI_REQ *pSMB = NULL;
4564 TRANSACTION2_QPI_RSP *pSMBr = NULL;
4565 int name_len, bytes_returned;
4566 __u16 params, byte_count;
4567
b6b38f70 4568 cFYI(1, "In GetSrvInodeNum for %s", searchName);
790fe579 4569 if (tcon == NULL)
50c2f753 4570 return -ENODEV;
1da177e4
LT
4571
4572GetInodeNumberRetry:
4573 rc = smb_init(SMB_COM_TRANSACTION2, 15, tcon, (void **) &pSMB,
50c2f753 4574 (void **) &pSMBr);
1da177e4
LT
4575 if (rc)
4576 return rc;
4577
1da177e4
LT
4578 if (pSMB->hdr.Flags2 & SMBFLG2_UNICODE) {
4579 name_len =
acbbb76a
SF
4580 cifsConvertToUTF16((__le16 *) pSMB->FileName,
4581 searchName, PATH_MAX, nls_codepage,
4582 remap);
1da177e4
LT
4583 name_len++; /* trailing null */
4584 name_len *= 2;
50c2f753 4585 } else { /* BB improve the check for buffer overruns BB */
1da177e4
LT
4586 name_len = strnlen(searchName, PATH_MAX);
4587 name_len++; /* trailing null */
4588 strncpy(pSMB->FileName, searchName, name_len);
4589 }
4590
4591 params = 2 /* level */ + 4 /* rsrvd */ + name_len /* incl null */ ;
4592 pSMB->TotalDataCount = 0;
4593 pSMB->MaxParameterCount = cpu_to_le16(2);
4594 /* BB find exact max data count below from sess structure BB */
4595 pSMB->MaxDataCount = cpu_to_le16(4000);
4596 pSMB->MaxSetupCount = 0;
4597 pSMB->Reserved = 0;
4598 pSMB->Flags = 0;
4599 pSMB->Timeout = 0;
4600 pSMB->Reserved2 = 0;
4601 pSMB->ParameterOffset = cpu_to_le16(offsetof(
50c2f753 4602 struct smb_com_transaction2_qpi_req, InformationLevel) - 4);
1da177e4
LT
4603 pSMB->DataCount = 0;
4604 pSMB->DataOffset = 0;
4605 pSMB->SetupCount = 1;
4606 pSMB->Reserved3 = 0;
4607 pSMB->SubCommand = cpu_to_le16(TRANS2_QUERY_PATH_INFORMATION);
4608 byte_count = params + 1 /* pad */ ;
4609 pSMB->TotalParameterCount = cpu_to_le16(params);
4610 pSMB->ParameterCount = pSMB->TotalParameterCount;
4611 pSMB->InformationLevel = cpu_to_le16(SMB_QUERY_FILE_INTERNAL_INFO);
4612 pSMB->Reserved4 = 0;
be8e3b00 4613 inc_rfc1001_len(pSMB, byte_count);
1da177e4
LT
4614 pSMB->ByteCount = cpu_to_le16(byte_count);
4615
4616 rc = SendReceive(xid, tcon->ses, (struct smb_hdr *) pSMB,
4617 (struct smb_hdr *) pSMBr, &bytes_returned, 0);
4618 if (rc) {
b6b38f70 4619 cFYI(1, "error %d in QueryInternalInfo", rc);
1da177e4
LT
4620 } else {
4621 /* decode response */
4622 rc = validate_t2((struct smb_t2_rsp *)pSMBr);
1da177e4 4623 /* BB also check enough total bytes returned */
820a803f 4624 if (rc || get_bcc(&pSMBr->hdr) < 2)
1da177e4
LT
4625 /* If rc should we check for EOPNOSUPP and
4626 disable the srvino flag? or in caller? */
4627 rc = -EIO; /* bad smb */
50c2f753 4628 else {
1da177e4
LT
4629 __u16 data_offset = le16_to_cpu(pSMBr->t2.DataOffset);
4630 __u16 count = le16_to_cpu(pSMBr->t2.DataCount);
50c2f753 4631 struct file_internal_info *pfinfo;
1da177e4 4632 /* BB Do we need a cast or hash here ? */
790fe579 4633 if (count < 8) {
b6b38f70 4634 cFYI(1, "Illegal size ret in QryIntrnlInf");
1da177e4
LT
4635 rc = -EIO;
4636 goto GetInodeNumOut;
4637 }
4638 pfinfo = (struct file_internal_info *)
4639 (data_offset + (char *) &pSMBr->hdr.Protocol);
85a6dac5 4640 *inode_number = le64_to_cpu(pfinfo->UniqueId);
1da177e4
LT
4641 }
4642 }
4643GetInodeNumOut:
4644 cifs_buf_release(pSMB);
4645 if (rc == -EAGAIN)
4646 goto GetInodeNumberRetry;
4647 return rc;
4648}
1da177e4 4649
fec4585f
IM
4650/* parses DFS refferal V3 structure
4651 * caller is responsible for freeing target_nodes
4652 * returns:
4653 * on success - 0
4654 * on failure - errno
4655 */
4656static int
a1fe78f1 4657parse_DFS_referrals(TRANSACTION2_GET_DFS_REFER_RSP *pSMBr,
fec4585f
IM
4658 unsigned int *num_of_nodes,
4659 struct dfs_info3_param **target_nodes,
2c55608f
IM
4660 const struct nls_table *nls_codepage, int remap,
4661 const char *searchName)
fec4585f
IM
4662{
4663 int i, rc = 0;
4664 char *data_end;
4665 bool is_unicode;
4666 struct dfs_referral_level_3 *ref;
4667
5ca33c6a
HH
4668 if (pSMBr->hdr.Flags2 & SMBFLG2_UNICODE)
4669 is_unicode = true;
4670 else
4671 is_unicode = false;
fec4585f
IM
4672 *num_of_nodes = le16_to_cpu(pSMBr->NumberOfReferrals);
4673
4674 if (*num_of_nodes < 1) {
b6b38f70 4675 cERROR(1, "num_referrals: must be at least > 0,"
ac3aa2f8 4676 "but we get num_referrals = %d", *num_of_nodes);
fec4585f 4677 rc = -EINVAL;
a1fe78f1 4678 goto parse_DFS_referrals_exit;
fec4585f
IM
4679 }
4680
4681 ref = (struct dfs_referral_level_3 *) &(pSMBr->referrals);
1d92cfd5 4682 if (ref->VersionNumber != cpu_to_le16(3)) {
b6b38f70
JP
4683 cERROR(1, "Referrals of V%d version are not supported,"
4684 "should be V3", le16_to_cpu(ref->VersionNumber));
fec4585f 4685 rc = -EINVAL;
a1fe78f1 4686 goto parse_DFS_referrals_exit;
fec4585f
IM
4687 }
4688
4689 /* get the upper boundary of the resp buffer */
4690 data_end = (char *)(&(pSMBr->PathConsumed)) +
4691 le16_to_cpu(pSMBr->t2.DataCount);
4692
ac3aa2f8 4693 cFYI(1, "num_referrals: %d dfs flags: 0x%x ...",
fec4585f 4694 *num_of_nodes,
b6b38f70 4695 le32_to_cpu(pSMBr->DFSFlags));
fec4585f
IM
4696
4697 *target_nodes = kzalloc(sizeof(struct dfs_info3_param) *
4698 *num_of_nodes, GFP_KERNEL);
4699 if (*target_nodes == NULL) {
ac3aa2f8 4700 cERROR(1, "Failed to allocate buffer for target_nodes");
fec4585f 4701 rc = -ENOMEM;
a1fe78f1 4702 goto parse_DFS_referrals_exit;
fec4585f
IM
4703 }
4704
3ad2f3fb 4705 /* collect necessary data from referrals */
fec4585f
IM
4706 for (i = 0; i < *num_of_nodes; i++) {
4707 char *temp;
4708 int max_len;
4709 struct dfs_info3_param *node = (*target_nodes)+i;
4710
0e0d2cf3 4711 node->flags = le32_to_cpu(pSMBr->DFSFlags);
2c55608f 4712 if (is_unicode) {
331c3135
JL
4713 __le16 *tmp = kmalloc(strlen(searchName)*2 + 2,
4714 GFP_KERNEL);
2920ee2b
SF
4715 if (tmp == NULL) {
4716 rc = -ENOMEM;
4717 goto parse_DFS_referrals_exit;
4718 }
acbbb76a
SF
4719 cifsConvertToUTF16((__le16 *) tmp, searchName,
4720 PATH_MAX, nls_codepage, remap);
4721 node->path_consumed = cifs_utf16_bytes(tmp,
69f801fc 4722 le16_to_cpu(pSMBr->PathConsumed),
2c55608f
IM
4723 nls_codepage);
4724 kfree(tmp);
4725 } else
4726 node->path_consumed = le16_to_cpu(pSMBr->PathConsumed);
4727
fec4585f
IM
4728 node->server_type = le16_to_cpu(ref->ServerType);
4729 node->ref_flag = le16_to_cpu(ref->ReferralEntryFlags);
4730
4731 /* copy DfsPath */
4732 temp = (char *)ref + le16_to_cpu(ref->DfsPathOffset);
4733 max_len = data_end - temp;
acbbb76a
SF
4734 node->path_name = cifs_strndup_from_utf16(temp, max_len,
4735 is_unicode, nls_codepage);
d8e2f53a
JL
4736 if (!node->path_name) {
4737 rc = -ENOMEM;
a1fe78f1 4738 goto parse_DFS_referrals_exit;
066ce689 4739 }
fec4585f
IM
4740
4741 /* copy link target UNC */
4742 temp = (char *)ref + le16_to_cpu(ref->NetworkAddressOffset);
4743 max_len = data_end - temp;
acbbb76a
SF
4744 node->node_name = cifs_strndup_from_utf16(temp, max_len,
4745 is_unicode, nls_codepage);
d8f2799b 4746 if (!node->node_name) {
d8e2f53a 4747 rc = -ENOMEM;
d8f2799b
SM
4748 goto parse_DFS_referrals_exit;
4749 }
4750
4751 ref++;
fec4585f
IM
4752 }
4753
a1fe78f1 4754parse_DFS_referrals_exit:
fec4585f
IM
4755 if (rc) {
4756 free_dfs_info_array(*target_nodes, *num_of_nodes);
4757 *target_nodes = NULL;
4758 *num_of_nodes = 0;
4759 }
4760 return rc;
4761}
4762
1da177e4 4763int
96daf2b0 4764CIFSGetDFSRefer(const int xid, struct cifs_ses *ses,
1da177e4 4765 const unsigned char *searchName,
c2cf07d5
SF
4766 struct dfs_info3_param **target_nodes,
4767 unsigned int *num_of_nodes,
737b758c 4768 const struct nls_table *nls_codepage, int remap)
1da177e4
LT
4769{
4770/* TRANS2_GET_DFS_REFERRAL */
4771 TRANSACTION2_GET_DFS_REFER_REQ *pSMB = NULL;
4772 TRANSACTION2_GET_DFS_REFER_RSP *pSMBr = NULL;
1da177e4
LT
4773 int rc = 0;
4774 int bytes_returned;
4775 int name_len;
1da177e4 4776 __u16 params, byte_count;
c2cf07d5
SF
4777 *num_of_nodes = 0;
4778 *target_nodes = NULL;
1da177e4 4779
b6b38f70 4780 cFYI(1, "In GetDFSRefer the path %s", searchName);
1da177e4
LT
4781 if (ses == NULL)
4782 return -ENODEV;
4783getDFSRetry:
4784 rc = smb_init(SMB_COM_TRANSACTION2, 15, NULL, (void **) &pSMB,
4785 (void **) &pSMBr);
4786 if (rc)
4787 return rc;
50c2f753
SF
4788
4789 /* server pointer checked in called function,
1982c344 4790 but should never be null here anyway */
88257360 4791 pSMB->hdr.Mid = get_next_mid(ses->server);
1da177e4
LT
4792 pSMB->hdr.Tid = ses->ipc_tid;
4793 pSMB->hdr.Uid = ses->Suid;
26f57364 4794 if (ses->capabilities & CAP_STATUS32)
1da177e4 4795 pSMB->hdr.Flags2 |= SMBFLG2_ERR_STATUS;
26f57364 4796 if (ses->capabilities & CAP_DFS)
1da177e4 4797 pSMB->hdr.Flags2 |= SMBFLG2_DFS;
1da177e4
LT
4798
4799 if (ses->capabilities & CAP_UNICODE) {
4800 pSMB->hdr.Flags2 |= SMBFLG2_UNICODE;
4801 name_len =
acbbb76a
SF
4802 cifsConvertToUTF16((__le16 *) pSMB->RequestFileName,
4803 searchName, PATH_MAX, nls_codepage,
4804 remap);
1da177e4
LT
4805 name_len++; /* trailing null */
4806 name_len *= 2;
50c2f753 4807 } else { /* BB improve the check for buffer overruns BB */
1da177e4
LT
4808 name_len = strnlen(searchName, PATH_MAX);
4809 name_len++; /* trailing null */
4810 strncpy(pSMB->RequestFileName, searchName, name_len);
4811 }
4812
790fe579 4813 if (ses->server) {
96daf2b0 4814 if (ses->server->sec_mode &
1a4e15a0
SF
4815 (SECMODE_SIGN_REQUIRED | SECMODE_SIGN_ENABLED))
4816 pSMB->hdr.Flags2 |= SMBFLG2_SECURITY_SIGNATURE;
4817 }
4818
50c2f753 4819 pSMB->hdr.Uid = ses->Suid;
1a4e15a0 4820
1da177e4
LT
4821 params = 2 /* level */ + name_len /*includes null */ ;
4822 pSMB->TotalDataCount = 0;
4823 pSMB->DataCount = 0;
4824 pSMB->DataOffset = 0;
4825 pSMB->MaxParameterCount = 0;
582d21e5
SF
4826 /* BB find exact max SMB PDU from sess structure BB */
4827 pSMB->MaxDataCount = cpu_to_le16(4000);
1da177e4
LT
4828 pSMB->MaxSetupCount = 0;
4829 pSMB->Reserved = 0;
4830 pSMB->Flags = 0;
4831 pSMB->Timeout = 0;
4832 pSMB->Reserved2 = 0;
4833 pSMB->ParameterOffset = cpu_to_le16(offsetof(
50c2f753 4834 struct smb_com_transaction2_get_dfs_refer_req, MaxReferralLevel) - 4);
1da177e4
LT
4835 pSMB->SetupCount = 1;
4836 pSMB->Reserved3 = 0;
4837 pSMB->SubCommand = cpu_to_le16(TRANS2_GET_DFS_REFERRAL);
4838 byte_count = params + 3 /* pad */ ;
4839 pSMB->ParameterCount = cpu_to_le16(params);
4840 pSMB->TotalParameterCount = pSMB->ParameterCount;
4841 pSMB->MaxReferralLevel = cpu_to_le16(3);
be8e3b00 4842 inc_rfc1001_len(pSMB, byte_count);
1da177e4
LT
4843 pSMB->ByteCount = cpu_to_le16(byte_count);
4844
4845 rc = SendReceive(xid, ses, (struct smb_hdr *) pSMB,
4846 (struct smb_hdr *) pSMBr, &bytes_returned, 0);
4847 if (rc) {
b6b38f70 4848 cFYI(1, "Send error in GetDFSRefer = %d", rc);
c2cf07d5
SF
4849 goto GetDFSRefExit;
4850 }
4851 rc = validate_t2((struct smb_t2_rsp *)pSMBr);
1da177e4 4852
c2cf07d5 4853 /* BB Also check if enough total bytes returned? */
820a803f 4854 if (rc || get_bcc(&pSMBr->hdr) < 17) {
c2cf07d5 4855 rc = -EIO; /* bad smb */
fec4585f
IM
4856 goto GetDFSRefExit;
4857 }
c2cf07d5 4858
b6b38f70 4859 cFYI(1, "Decoding GetDFSRefer response BCC: %d Offset %d",
820a803f 4860 get_bcc(&pSMBr->hdr),
b6b38f70 4861 le16_to_cpu(pSMBr->t2.DataOffset));
1da177e4 4862
fec4585f 4863 /* parse returned result into more usable form */
a1fe78f1 4864 rc = parse_DFS_referrals(pSMBr, num_of_nodes,
2c55608f
IM
4865 target_nodes, nls_codepage, remap,
4866 searchName);
c2cf07d5 4867
1da177e4 4868GetDFSRefExit:
0d817bc0 4869 cifs_buf_release(pSMB);
1da177e4
LT
4870
4871 if (rc == -EAGAIN)
4872 goto getDFSRetry;
4873
4874 return rc;
4875}
4876
20962438
SF
4877/* Query File System Info such as free space to old servers such as Win 9x */
4878int
96daf2b0 4879SMBOldQFSInfo(const int xid, struct cifs_tcon *tcon, struct kstatfs *FSData)
20962438
SF
4880{
4881/* level 0x01 SMB_QUERY_FILE_SYSTEM_INFO */
4882 TRANSACTION2_QFSI_REQ *pSMB = NULL;
4883 TRANSACTION2_QFSI_RSP *pSMBr = NULL;
4884 FILE_SYSTEM_ALLOC_INFO *response_data;
4885 int rc = 0;
4886 int bytes_returned = 0;
4887 __u16 params, byte_count;
4888
b6b38f70 4889 cFYI(1, "OldQFSInfo");
20962438
SF
4890oldQFSInfoRetry:
4891 rc = smb_init(SMB_COM_TRANSACTION2, 15, tcon, (void **) &pSMB,
4892 (void **) &pSMBr);
4893 if (rc)
4894 return rc;
20962438
SF
4895
4896 params = 2; /* level */
4897 pSMB->TotalDataCount = 0;
4898 pSMB->MaxParameterCount = cpu_to_le16(2);
4899 pSMB->MaxDataCount = cpu_to_le16(1000);
4900 pSMB->MaxSetupCount = 0;
4901 pSMB->Reserved = 0;
4902 pSMB->Flags = 0;
4903 pSMB->Timeout = 0;
4904 pSMB->Reserved2 = 0;
4905 byte_count = params + 1 /* pad */ ;
4906 pSMB->TotalParameterCount = cpu_to_le16(params);
4907 pSMB->ParameterCount = pSMB->TotalParameterCount;
4908 pSMB->ParameterOffset = cpu_to_le16(offsetof(
4909 struct smb_com_transaction2_qfsi_req, InformationLevel) - 4);
4910 pSMB->DataCount = 0;
4911 pSMB->DataOffset = 0;
4912 pSMB->SetupCount = 1;
4913 pSMB->Reserved3 = 0;
4914 pSMB->SubCommand = cpu_to_le16(TRANS2_QUERY_FS_INFORMATION);
4915 pSMB->InformationLevel = cpu_to_le16(SMB_INFO_ALLOCATION);
be8e3b00 4916 inc_rfc1001_len(pSMB, byte_count);
20962438
SF
4917 pSMB->ByteCount = cpu_to_le16(byte_count);
4918
4919 rc = SendReceive(xid, tcon->ses, (struct smb_hdr *) pSMB,
4920 (struct smb_hdr *) pSMBr, &bytes_returned, 0);
4921 if (rc) {
b6b38f70 4922 cFYI(1, "Send error in QFSInfo = %d", rc);
20962438
SF
4923 } else { /* decode response */
4924 rc = validate_t2((struct smb_t2_rsp *)pSMBr);
4925
820a803f 4926 if (rc || get_bcc(&pSMBr->hdr) < 18)
20962438
SF
4927 rc = -EIO; /* bad smb */
4928 else {
4929 __u16 data_offset = le16_to_cpu(pSMBr->t2.DataOffset);
b6b38f70 4930 cFYI(1, "qfsinf resp BCC: %d Offset %d",
820a803f 4931 get_bcc(&pSMBr->hdr), data_offset);
20962438 4932
50c2f753 4933 response_data = (FILE_SYSTEM_ALLOC_INFO *)
20962438
SF
4934 (((char *) &pSMBr->hdr.Protocol) + data_offset);
4935 FSData->f_bsize =
4936 le16_to_cpu(response_data->BytesPerSector) *
4937 le32_to_cpu(response_data->
4938 SectorsPerAllocationUnit);
4939 FSData->f_blocks =
50c2f753 4940 le32_to_cpu(response_data->TotalAllocationUnits);
20962438
SF
4941 FSData->f_bfree = FSData->f_bavail =
4942 le32_to_cpu(response_data->FreeAllocationUnits);
b6b38f70
JP
4943 cFYI(1, "Blocks: %lld Free: %lld Block size %ld",
4944 (unsigned long long)FSData->f_blocks,
4945 (unsigned long long)FSData->f_bfree,
4946 FSData->f_bsize);
20962438
SF
4947 }
4948 }
4949 cifs_buf_release(pSMB);
4950
4951 if (rc == -EAGAIN)
4952 goto oldQFSInfoRetry;
4953
4954 return rc;
4955}
4956
1da177e4 4957int
96daf2b0 4958CIFSSMBQFSInfo(const int xid, struct cifs_tcon *tcon, struct kstatfs *FSData)
1da177e4
LT
4959{
4960/* level 0x103 SMB_QUERY_FILE_SYSTEM_INFO */
4961 TRANSACTION2_QFSI_REQ *pSMB = NULL;
4962 TRANSACTION2_QFSI_RSP *pSMBr = NULL;
4963 FILE_SYSTEM_INFO *response_data;
4964 int rc = 0;
4965 int bytes_returned = 0;
4966 __u16 params, byte_count;
4967
b6b38f70 4968 cFYI(1, "In QFSInfo");
1da177e4
LT
4969QFSInfoRetry:
4970 rc = smb_init(SMB_COM_TRANSACTION2, 15, tcon, (void **) &pSMB,
4971 (void **) &pSMBr);
4972 if (rc)
4973 return rc;
4974
4975 params = 2; /* level */
4976 pSMB->TotalDataCount = 0;
4977 pSMB->MaxParameterCount = cpu_to_le16(2);
20962438 4978 pSMB->MaxDataCount = cpu_to_le16(1000);
1da177e4
LT
4979 pSMB->MaxSetupCount = 0;
4980 pSMB->Reserved = 0;
4981 pSMB->Flags = 0;
4982 pSMB->Timeout = 0;
4983 pSMB->Reserved2 = 0;
4984 byte_count = params + 1 /* pad */ ;
4985 pSMB->TotalParameterCount = cpu_to_le16(params);
4986 pSMB->ParameterCount = pSMB->TotalParameterCount;
4987 pSMB->ParameterOffset = cpu_to_le16(offsetof(
50c2f753 4988 struct smb_com_transaction2_qfsi_req, InformationLevel) - 4);
1da177e4
LT
4989 pSMB->DataCount = 0;
4990 pSMB->DataOffset = 0;
4991 pSMB->SetupCount = 1;
4992 pSMB->Reserved3 = 0;
4993 pSMB->SubCommand = cpu_to_le16(TRANS2_QUERY_FS_INFORMATION);
4994 pSMB->InformationLevel = cpu_to_le16(SMB_QUERY_FS_SIZE_INFO);
be8e3b00 4995 inc_rfc1001_len(pSMB, byte_count);
1da177e4
LT
4996 pSMB->ByteCount = cpu_to_le16(byte_count);
4997
4998 rc = SendReceive(xid, tcon->ses, (struct smb_hdr *) pSMB,
4999 (struct smb_hdr *) pSMBr, &bytes_returned, 0);
5000 if (rc) {
b6b38f70 5001 cFYI(1, "Send error in QFSInfo = %d", rc);
1da177e4 5002 } else { /* decode response */
50c2f753 5003 rc = validate_t2((struct smb_t2_rsp *)pSMBr);
1da177e4 5004
820a803f 5005 if (rc || get_bcc(&pSMBr->hdr) < 24)
1da177e4
LT
5006 rc = -EIO; /* bad smb */
5007 else {
5008 __u16 data_offset = le16_to_cpu(pSMBr->t2.DataOffset);
1da177e4
LT
5009
5010 response_data =
5011 (FILE_SYSTEM_INFO
5012 *) (((char *) &pSMBr->hdr.Protocol) +
5013 data_offset);
5014 FSData->f_bsize =
5015 le32_to_cpu(response_data->BytesPerSector) *
5016 le32_to_cpu(response_data->
5017 SectorsPerAllocationUnit);
5018 FSData->f_blocks =
5019 le64_to_cpu(response_data->TotalAllocationUnits);
5020 FSData->f_bfree = FSData->f_bavail =
5021 le64_to_cpu(response_data->FreeAllocationUnits);
b6b38f70
JP
5022 cFYI(1, "Blocks: %lld Free: %lld Block size %ld",
5023 (unsigned long long)FSData->f_blocks,
5024 (unsigned long long)FSData->f_bfree,
5025 FSData->f_bsize);
1da177e4
LT
5026 }
5027 }
5028 cifs_buf_release(pSMB);
5029
5030 if (rc == -EAGAIN)
5031 goto QFSInfoRetry;
5032
5033 return rc;
5034}
5035
5036int
96daf2b0 5037CIFSSMBQFSAttributeInfo(const int xid, struct cifs_tcon *tcon)
1da177e4
LT
5038{
5039/* level 0x105 SMB_QUERY_FILE_SYSTEM_INFO */
5040 TRANSACTION2_QFSI_REQ *pSMB = NULL;
5041 TRANSACTION2_QFSI_RSP *pSMBr = NULL;
5042 FILE_SYSTEM_ATTRIBUTE_INFO *response_data;
5043 int rc = 0;
5044 int bytes_returned = 0;
5045 __u16 params, byte_count;
5046
b6b38f70 5047 cFYI(1, "In QFSAttributeInfo");
1da177e4
LT
5048QFSAttributeRetry:
5049 rc = smb_init(SMB_COM_TRANSACTION2, 15, tcon, (void **) &pSMB,
5050 (void **) &pSMBr);
5051 if (rc)
5052 return rc;
5053
5054 params = 2; /* level */
5055 pSMB->TotalDataCount = 0;
5056 pSMB->MaxParameterCount = cpu_to_le16(2);
582d21e5
SF
5057 /* BB find exact max SMB PDU from sess structure BB */
5058 pSMB->MaxDataCount = cpu_to_le16(1000);
1da177e4
LT
5059 pSMB->MaxSetupCount = 0;
5060 pSMB->Reserved = 0;
5061 pSMB->Flags = 0;
5062 pSMB->Timeout = 0;
5063 pSMB->Reserved2 = 0;
5064 byte_count = params + 1 /* pad */ ;
5065 pSMB->TotalParameterCount = cpu_to_le16(params);
5066 pSMB->ParameterCount = pSMB->TotalParameterCount;
5067 pSMB->ParameterOffset = cpu_to_le16(offsetof(
50c2f753 5068 struct smb_com_transaction2_qfsi_req, InformationLevel) - 4);
1da177e4
LT
5069 pSMB->DataCount = 0;
5070 pSMB->DataOffset = 0;
5071 pSMB->SetupCount = 1;
5072 pSMB->Reserved3 = 0;
5073 pSMB->SubCommand = cpu_to_le16(TRANS2_QUERY_FS_INFORMATION);
5074 pSMB->InformationLevel = cpu_to_le16(SMB_QUERY_FS_ATTRIBUTE_INFO);
be8e3b00 5075 inc_rfc1001_len(pSMB, byte_count);
1da177e4
LT
5076 pSMB->ByteCount = cpu_to_le16(byte_count);
5077
5078 rc = SendReceive(xid, tcon->ses, (struct smb_hdr *) pSMB,
5079 (struct smb_hdr *) pSMBr, &bytes_returned, 0);
5080 if (rc) {
b6b38f70 5081 cERROR(1, "Send error in QFSAttributeInfo = %d", rc);
1da177e4
LT
5082 } else { /* decode response */
5083 rc = validate_t2((struct smb_t2_rsp *)pSMBr);
5084
820a803f 5085 if (rc || get_bcc(&pSMBr->hdr) < 13) {
50c2f753 5086 /* BB also check if enough bytes returned */
1da177e4
LT
5087 rc = -EIO; /* bad smb */
5088 } else {
5089 __u16 data_offset = le16_to_cpu(pSMBr->t2.DataOffset);
5090 response_data =
5091 (FILE_SYSTEM_ATTRIBUTE_INFO
5092 *) (((char *) &pSMBr->hdr.Protocol) +
5093 data_offset);
5094 memcpy(&tcon->fsAttrInfo, response_data,
26f57364 5095 sizeof(FILE_SYSTEM_ATTRIBUTE_INFO));
1da177e4
LT
5096 }
5097 }
5098 cifs_buf_release(pSMB);
5099
5100 if (rc == -EAGAIN)
5101 goto QFSAttributeRetry;
5102
5103 return rc;
5104}
5105
5106int
96daf2b0 5107CIFSSMBQFSDeviceInfo(const int xid, struct cifs_tcon *tcon)
1da177e4
LT
5108{
5109/* level 0x104 SMB_QUERY_FILE_SYSTEM_INFO */
5110 TRANSACTION2_QFSI_REQ *pSMB = NULL;
5111 TRANSACTION2_QFSI_RSP *pSMBr = NULL;
5112 FILE_SYSTEM_DEVICE_INFO *response_data;
5113 int rc = 0;
5114 int bytes_returned = 0;
5115 __u16 params, byte_count;
5116
b6b38f70 5117 cFYI(1, "In QFSDeviceInfo");
1da177e4
LT
5118QFSDeviceRetry:
5119 rc = smb_init(SMB_COM_TRANSACTION2, 15, tcon, (void **) &pSMB,
5120 (void **) &pSMBr);
5121 if (rc)
5122 return rc;
5123
5124 params = 2; /* level */
5125 pSMB->TotalDataCount = 0;
5126 pSMB->MaxParameterCount = cpu_to_le16(2);
582d21e5
SF
5127 /* BB find exact max SMB PDU from sess structure BB */
5128 pSMB->MaxDataCount = cpu_to_le16(1000);
1da177e4
LT
5129 pSMB->MaxSetupCount = 0;
5130 pSMB->Reserved = 0;
5131 pSMB->Flags = 0;
5132 pSMB->Timeout = 0;
5133 pSMB->Reserved2 = 0;
5134 byte_count = params + 1 /* pad */ ;
5135 pSMB->TotalParameterCount = cpu_to_le16(params);
5136 pSMB->ParameterCount = pSMB->TotalParameterCount;
5137 pSMB->ParameterOffset = cpu_to_le16(offsetof(
50c2f753 5138 struct smb_com_transaction2_qfsi_req, InformationLevel) - 4);
1da177e4
LT
5139
5140 pSMB->DataCount = 0;
5141 pSMB->DataOffset = 0;
5142 pSMB->SetupCount = 1;
5143 pSMB->Reserved3 = 0;
5144 pSMB->SubCommand = cpu_to_le16(TRANS2_QUERY_FS_INFORMATION);
5145 pSMB->InformationLevel = cpu_to_le16(SMB_QUERY_FS_DEVICE_INFO);
be8e3b00 5146 inc_rfc1001_len(pSMB, byte_count);
1da177e4
LT
5147 pSMB->ByteCount = cpu_to_le16(byte_count);
5148
5149 rc = SendReceive(xid, tcon->ses, (struct smb_hdr *) pSMB,
5150 (struct smb_hdr *) pSMBr, &bytes_returned, 0);
5151 if (rc) {
b6b38f70 5152 cFYI(1, "Send error in QFSDeviceInfo = %d", rc);
1da177e4
LT
5153 } else { /* decode response */
5154 rc = validate_t2((struct smb_t2_rsp *)pSMBr);
5155
820a803f
JL
5156 if (rc || get_bcc(&pSMBr->hdr) <
5157 sizeof(FILE_SYSTEM_DEVICE_INFO))
1da177e4
LT
5158 rc = -EIO; /* bad smb */
5159 else {
5160 __u16 data_offset = le16_to_cpu(pSMBr->t2.DataOffset);
5161 response_data =
737b758c
SF
5162 (FILE_SYSTEM_DEVICE_INFO *)
5163 (((char *) &pSMBr->hdr.Protocol) +
1da177e4
LT
5164 data_offset);
5165 memcpy(&tcon->fsDevInfo, response_data,
26f57364 5166 sizeof(FILE_SYSTEM_DEVICE_INFO));
1da177e4
LT
5167 }
5168 }
5169 cifs_buf_release(pSMB);
5170
5171 if (rc == -EAGAIN)
5172 goto QFSDeviceRetry;
5173
5174 return rc;
5175}
5176
5177int
96daf2b0 5178CIFSSMBQFSUnixInfo(const int xid, struct cifs_tcon *tcon)
1da177e4
LT
5179{
5180/* level 0x200 SMB_QUERY_CIFS_UNIX_INFO */
5181 TRANSACTION2_QFSI_REQ *pSMB = NULL;
5182 TRANSACTION2_QFSI_RSP *pSMBr = NULL;
5183 FILE_SYSTEM_UNIX_INFO *response_data;
5184 int rc = 0;
5185 int bytes_returned = 0;
5186 __u16 params, byte_count;
5187
b6b38f70 5188 cFYI(1, "In QFSUnixInfo");
1da177e4 5189QFSUnixRetry:
f569599a
JL
5190 rc = smb_init_no_reconnect(SMB_COM_TRANSACTION2, 15, tcon,
5191 (void **) &pSMB, (void **) &pSMBr);
1da177e4
LT
5192 if (rc)
5193 return rc;
5194
5195 params = 2; /* level */
5196 pSMB->TotalDataCount = 0;
5197 pSMB->DataCount = 0;
5198 pSMB->DataOffset = 0;
5199 pSMB->MaxParameterCount = cpu_to_le16(2);
582d21e5
SF
5200 /* BB find exact max SMB PDU from sess structure BB */
5201 pSMB->MaxDataCount = cpu_to_le16(100);
1da177e4
LT
5202 pSMB->MaxSetupCount = 0;
5203 pSMB->Reserved = 0;
5204 pSMB->Flags = 0;
5205 pSMB->Timeout = 0;
5206 pSMB->Reserved2 = 0;
5207 byte_count = params + 1 /* pad */ ;
5208 pSMB->ParameterCount = cpu_to_le16(params);
5209 pSMB->TotalParameterCount = pSMB->ParameterCount;
50c2f753
SF
5210 pSMB->ParameterOffset = cpu_to_le16(offsetof(struct
5211 smb_com_transaction2_qfsi_req, InformationLevel) - 4);
1da177e4
LT
5212 pSMB->SetupCount = 1;
5213 pSMB->Reserved3 = 0;
5214 pSMB->SubCommand = cpu_to_le16(TRANS2_QUERY_FS_INFORMATION);
5215 pSMB->InformationLevel = cpu_to_le16(SMB_QUERY_CIFS_UNIX_INFO);
be8e3b00 5216 inc_rfc1001_len(pSMB, byte_count);
1da177e4
LT
5217 pSMB->ByteCount = cpu_to_le16(byte_count);
5218
5219 rc = SendReceive(xid, tcon->ses, (struct smb_hdr *) pSMB,
5220 (struct smb_hdr *) pSMBr, &bytes_returned, 0);
5221 if (rc) {
b6b38f70 5222 cERROR(1, "Send error in QFSUnixInfo = %d", rc);
1da177e4
LT
5223 } else { /* decode response */
5224 rc = validate_t2((struct smb_t2_rsp *)pSMBr);
5225
820a803f 5226 if (rc || get_bcc(&pSMBr->hdr) < 13) {
1da177e4
LT
5227 rc = -EIO; /* bad smb */
5228 } else {
5229 __u16 data_offset = le16_to_cpu(pSMBr->t2.DataOffset);
5230 response_data =
5231 (FILE_SYSTEM_UNIX_INFO
5232 *) (((char *) &pSMBr->hdr.Protocol) +
5233 data_offset);
5234 memcpy(&tcon->fsUnixInfo, response_data,
26f57364 5235 sizeof(FILE_SYSTEM_UNIX_INFO));
1da177e4
LT
5236 }
5237 }
5238 cifs_buf_release(pSMB);
5239
5240 if (rc == -EAGAIN)
5241 goto QFSUnixRetry;
5242
5243
5244 return rc;
5245}
5246
ac67055e 5247int
96daf2b0 5248CIFSSMBSetFSUnixInfo(const int xid, struct cifs_tcon *tcon, __u64 cap)
ac67055e
JA
5249{
5250/* level 0x200 SMB_SET_CIFS_UNIX_INFO */
5251 TRANSACTION2_SETFSI_REQ *pSMB = NULL;
5252 TRANSACTION2_SETFSI_RSP *pSMBr = NULL;
5253 int rc = 0;
5254 int bytes_returned = 0;
5255 __u16 params, param_offset, offset, byte_count;
5256
b6b38f70 5257 cFYI(1, "In SETFSUnixInfo");
ac67055e 5258SETFSUnixRetry:
f26282c9 5259 /* BB switch to small buf init to save memory */
f569599a
JL
5260 rc = smb_init_no_reconnect(SMB_COM_TRANSACTION2, 15, tcon,
5261 (void **) &pSMB, (void **) &pSMBr);
ac67055e
JA
5262 if (rc)
5263 return rc;
5264
5265 params = 4; /* 2 bytes zero followed by info level. */
5266 pSMB->MaxSetupCount = 0;
5267 pSMB->Reserved = 0;
5268 pSMB->Flags = 0;
5269 pSMB->Timeout = 0;
5270 pSMB->Reserved2 = 0;
50c2f753
SF
5271 param_offset = offsetof(struct smb_com_transaction2_setfsi_req, FileNum)
5272 - 4;
ac67055e
JA
5273 offset = param_offset + params;
5274
5275 pSMB->MaxParameterCount = cpu_to_le16(4);
582d21e5
SF
5276 /* BB find exact max SMB PDU from sess structure BB */
5277 pSMB->MaxDataCount = cpu_to_le16(100);
ac67055e
JA
5278 pSMB->SetupCount = 1;
5279 pSMB->Reserved3 = 0;
5280 pSMB->SubCommand = cpu_to_le16(TRANS2_SET_FS_INFORMATION);
5281 byte_count = 1 /* pad */ + params + 12;
5282
5283 pSMB->DataCount = cpu_to_le16(12);
5284 pSMB->ParameterCount = cpu_to_le16(params);
5285 pSMB->TotalDataCount = pSMB->DataCount;
5286 pSMB->TotalParameterCount = pSMB->ParameterCount;
5287 pSMB->ParameterOffset = cpu_to_le16(param_offset);
5288 pSMB->DataOffset = cpu_to_le16(offset);
5289
5290 /* Params. */
5291 pSMB->FileNum = 0;
5292 pSMB->InformationLevel = cpu_to_le16(SMB_SET_CIFS_UNIX_INFO);
5293
5294 /* Data. */
5295 pSMB->ClientUnixMajor = cpu_to_le16(CIFS_UNIX_MAJOR_VERSION);
5296 pSMB->ClientUnixMinor = cpu_to_le16(CIFS_UNIX_MINOR_VERSION);
5297 pSMB->ClientUnixCap = cpu_to_le64(cap);
5298
be8e3b00 5299 inc_rfc1001_len(pSMB, byte_count);
ac67055e
JA
5300 pSMB->ByteCount = cpu_to_le16(byte_count);
5301
5302 rc = SendReceive(xid, tcon->ses, (struct smb_hdr *) pSMB,
5303 (struct smb_hdr *) pSMBr, &bytes_returned, 0);
5304 if (rc) {
b6b38f70 5305 cERROR(1, "Send error in SETFSUnixInfo = %d", rc);
ac67055e
JA
5306 } else { /* decode response */
5307 rc = validate_t2((struct smb_t2_rsp *)pSMBr);
ad7a2926 5308 if (rc)
ac67055e 5309 rc = -EIO; /* bad smb */
ac67055e
JA
5310 }
5311 cifs_buf_release(pSMB);
5312
5313 if (rc == -EAGAIN)
5314 goto SETFSUnixRetry;
5315
5316 return rc;
5317}
5318
5319
1da177e4
LT
5320
5321int
96daf2b0 5322CIFSSMBQFSPosixInfo(const int xid, struct cifs_tcon *tcon,
737b758c 5323 struct kstatfs *FSData)
1da177e4
LT
5324{
5325/* level 0x201 SMB_QUERY_CIFS_POSIX_INFO */
5326 TRANSACTION2_QFSI_REQ *pSMB = NULL;
5327 TRANSACTION2_QFSI_RSP *pSMBr = NULL;
5328 FILE_SYSTEM_POSIX_INFO *response_data;
5329 int rc = 0;
5330 int bytes_returned = 0;
5331 __u16 params, byte_count;
5332
b6b38f70 5333 cFYI(1, "In QFSPosixInfo");
1da177e4
LT
5334QFSPosixRetry:
5335 rc = smb_init(SMB_COM_TRANSACTION2, 15, tcon, (void **) &pSMB,
5336 (void **) &pSMBr);
5337 if (rc)
5338 return rc;
5339
5340 params = 2; /* level */
5341 pSMB->TotalDataCount = 0;
5342 pSMB->DataCount = 0;
5343 pSMB->DataOffset = 0;
5344 pSMB->MaxParameterCount = cpu_to_le16(2);
582d21e5
SF
5345 /* BB find exact max SMB PDU from sess structure BB */
5346 pSMB->MaxDataCount = cpu_to_le16(100);
1da177e4
LT
5347 pSMB->MaxSetupCount = 0;
5348 pSMB->Reserved = 0;
5349 pSMB->Flags = 0;
5350 pSMB->Timeout = 0;
5351 pSMB->Reserved2 = 0;
5352 byte_count = params + 1 /* pad */ ;
5353 pSMB->ParameterCount = cpu_to_le16(params);
5354 pSMB->TotalParameterCount = pSMB->ParameterCount;
50c2f753
SF
5355 pSMB->ParameterOffset = cpu_to_le16(offsetof(struct
5356 smb_com_transaction2_qfsi_req, InformationLevel) - 4);
1da177e4
LT
5357 pSMB->SetupCount = 1;
5358 pSMB->Reserved3 = 0;
5359 pSMB->SubCommand = cpu_to_le16(TRANS2_QUERY_FS_INFORMATION);
5360 pSMB->InformationLevel = cpu_to_le16(SMB_QUERY_POSIX_FS_INFO);
be8e3b00 5361 inc_rfc1001_len(pSMB, byte_count);
1da177e4
LT
5362 pSMB->ByteCount = cpu_to_le16(byte_count);
5363
5364 rc = SendReceive(xid, tcon->ses, (struct smb_hdr *) pSMB,
5365 (struct smb_hdr *) pSMBr, &bytes_returned, 0);
5366 if (rc) {
b6b38f70 5367 cFYI(1, "Send error in QFSUnixInfo = %d", rc);
1da177e4
LT
5368 } else { /* decode response */
5369 rc = validate_t2((struct smb_t2_rsp *)pSMBr);
5370
820a803f 5371 if (rc || get_bcc(&pSMBr->hdr) < 13) {
1da177e4
LT
5372 rc = -EIO; /* bad smb */
5373 } else {
5374 __u16 data_offset = le16_to_cpu(pSMBr->t2.DataOffset);
5375 response_data =
5376 (FILE_SYSTEM_POSIX_INFO
5377 *) (((char *) &pSMBr->hdr.Protocol) +
5378 data_offset);
5379 FSData->f_bsize =
5380 le32_to_cpu(response_data->BlockSize);
5381 FSData->f_blocks =
5382 le64_to_cpu(response_data->TotalBlocks);
5383 FSData->f_bfree =
5384 le64_to_cpu(response_data->BlocksAvail);
790fe579 5385 if (response_data->UserBlocksAvail == cpu_to_le64(-1)) {
1da177e4
LT
5386 FSData->f_bavail = FSData->f_bfree;
5387 } else {
5388 FSData->f_bavail =
50c2f753 5389 le64_to_cpu(response_data->UserBlocksAvail);
1da177e4 5390 }
790fe579 5391 if (response_data->TotalFileNodes != cpu_to_le64(-1))
1da177e4 5392 FSData->f_files =
50c2f753 5393 le64_to_cpu(response_data->TotalFileNodes);
790fe579 5394 if (response_data->FreeFileNodes != cpu_to_le64(-1))
1da177e4 5395 FSData->f_ffree =
50c2f753 5396 le64_to_cpu(response_data->FreeFileNodes);
1da177e4
LT
5397 }
5398 }
5399 cifs_buf_release(pSMB);
5400
5401 if (rc == -EAGAIN)
5402 goto QFSPosixRetry;
5403
5404 return rc;
5405}
5406
5407
50c2f753
SF
5408/* We can not use write of zero bytes trick to
5409 set file size due to need for large file support. Also note that
5410 this SetPathInfo is preferred to SetFileInfo based method in next
1da177e4
LT
5411 routine which is only needed to work around a sharing violation bug
5412 in Samba which this routine can run into */
5413
5414int
96daf2b0 5415CIFSSMBSetEOF(const int xid, struct cifs_tcon *tcon, const char *fileName,
4b18f2a9 5416 __u64 size, bool SetAllocation,
737b758c 5417 const struct nls_table *nls_codepage, int remap)
1da177e4
LT
5418{
5419 struct smb_com_transaction2_spi_req *pSMB = NULL;
5420 struct smb_com_transaction2_spi_rsp *pSMBr = NULL;
5421 struct file_end_of_file_info *parm_data;
5422 int name_len;
5423 int rc = 0;
5424 int bytes_returned = 0;
5425 __u16 params, byte_count, data_count, param_offset, offset;
5426
b6b38f70 5427 cFYI(1, "In SetEOF");
1da177e4
LT
5428SetEOFRetry:
5429 rc = smb_init(SMB_COM_TRANSACTION2, 15, tcon, (void **) &pSMB,
5430 (void **) &pSMBr);
5431 if (rc)
5432 return rc;
5433
5434 if (pSMB->hdr.Flags2 & SMBFLG2_UNICODE) {
5435 name_len =
acbbb76a
SF
5436 cifsConvertToUTF16((__le16 *) pSMB->FileName, fileName,
5437 PATH_MAX, nls_codepage, remap);
1da177e4
LT
5438 name_len++; /* trailing null */
5439 name_len *= 2;
3e87d803 5440 } else { /* BB improve the check for buffer overruns BB */
1da177e4
LT
5441 name_len = strnlen(fileName, PATH_MAX);
5442 name_len++; /* trailing null */
5443 strncpy(pSMB->FileName, fileName, name_len);
5444 }
5445 params = 6 + name_len;
26f57364 5446 data_count = sizeof(struct file_end_of_file_info);
1da177e4 5447 pSMB->MaxParameterCount = cpu_to_le16(2);
3e87d803 5448 pSMB->MaxDataCount = cpu_to_le16(4100);
1da177e4
LT
5449 pSMB->MaxSetupCount = 0;
5450 pSMB->Reserved = 0;
5451 pSMB->Flags = 0;
5452 pSMB->Timeout = 0;
5453 pSMB->Reserved2 = 0;
5454 param_offset = offsetof(struct smb_com_transaction2_spi_req,
50c2f753 5455 InformationLevel) - 4;
1da177e4 5456 offset = param_offset + params;
790fe579 5457 if (SetAllocation) {
50c2f753
SF
5458 if (tcon->ses->capabilities & CAP_INFOLEVEL_PASSTHRU)
5459 pSMB->InformationLevel =
5460 cpu_to_le16(SMB_SET_FILE_ALLOCATION_INFO2);
5461 else
5462 pSMB->InformationLevel =
5463 cpu_to_le16(SMB_SET_FILE_ALLOCATION_INFO);
5464 } else /* Set File Size */ {
1da177e4
LT
5465 if (tcon->ses->capabilities & CAP_INFOLEVEL_PASSTHRU)
5466 pSMB->InformationLevel =
50c2f753 5467 cpu_to_le16(SMB_SET_FILE_END_OF_FILE_INFO2);
1da177e4
LT
5468 else
5469 pSMB->InformationLevel =
50c2f753 5470 cpu_to_le16(SMB_SET_FILE_END_OF_FILE_INFO);
1da177e4
LT
5471 }
5472
5473 parm_data =
5474 (struct file_end_of_file_info *) (((char *) &pSMB->hdr.Protocol) +
5475 offset);
5476 pSMB->ParameterOffset = cpu_to_le16(param_offset);
5477 pSMB->DataOffset = cpu_to_le16(offset);
5478 pSMB->SetupCount = 1;
5479 pSMB->Reserved3 = 0;
5480 pSMB->SubCommand = cpu_to_le16(TRANS2_SET_PATH_INFORMATION);
5481 byte_count = 3 /* pad */ + params + data_count;
5482 pSMB->DataCount = cpu_to_le16(data_count);
5483 pSMB->TotalDataCount = pSMB->DataCount;
5484 pSMB->ParameterCount = cpu_to_le16(params);
5485 pSMB->TotalParameterCount = pSMB->ParameterCount;
5486 pSMB->Reserved4 = 0;
be8e3b00 5487 inc_rfc1001_len(pSMB, byte_count);
1da177e4
LT
5488 parm_data->FileSize = cpu_to_le64(size);
5489 pSMB->ByteCount = cpu_to_le16(byte_count);
5490 rc = SendReceive(xid, tcon->ses, (struct smb_hdr *) pSMB,
5491 (struct smb_hdr *) pSMBr, &bytes_returned, 0);
ad7a2926 5492 if (rc)
b6b38f70 5493 cFYI(1, "SetPathInfo (file size) returned %d", rc);
1da177e4
LT
5494
5495 cifs_buf_release(pSMB);
5496
5497 if (rc == -EAGAIN)
5498 goto SetEOFRetry;
5499
5500 return rc;
5501}
5502
5503int
96daf2b0 5504CIFSSMBSetFileSize(const int xid, struct cifs_tcon *tcon, __u64 size,
4b18f2a9 5505 __u16 fid, __u32 pid_of_opener, bool SetAllocation)
1da177e4
LT
5506{
5507 struct smb_com_transaction2_sfi_req *pSMB = NULL;
1da177e4
LT
5508 struct file_end_of_file_info *parm_data;
5509 int rc = 0;
1da177e4
LT
5510 __u16 params, param_offset, offset, byte_count, count;
5511
b6b38f70
JP
5512 cFYI(1, "SetFileSize (via SetFileInfo) %lld",
5513 (long long)size);
cd63499c
SF
5514 rc = small_smb_init(SMB_COM_TRANSACTION2, 15, tcon, (void **) &pSMB);
5515
1da177e4
LT
5516 if (rc)
5517 return rc;
5518
5519 pSMB->hdr.Pid = cpu_to_le16((__u16)pid_of_opener);
5520 pSMB->hdr.PidHigh = cpu_to_le16((__u16)(pid_of_opener >> 16));
50c2f753 5521
1da177e4
LT
5522 params = 6;
5523 pSMB->MaxSetupCount = 0;
5524 pSMB->Reserved = 0;
5525 pSMB->Flags = 0;
5526 pSMB->Timeout = 0;
5527 pSMB->Reserved2 = 0;
5528 param_offset = offsetof(struct smb_com_transaction2_sfi_req, Fid) - 4;
5529 offset = param_offset + params;
5530
1da177e4
LT
5531 count = sizeof(struct file_end_of_file_info);
5532 pSMB->MaxParameterCount = cpu_to_le16(2);
582d21e5
SF
5533 /* BB find exact max SMB PDU from sess structure BB */
5534 pSMB->MaxDataCount = cpu_to_le16(1000);
1da177e4
LT
5535 pSMB->SetupCount = 1;
5536 pSMB->Reserved3 = 0;
5537 pSMB->SubCommand = cpu_to_le16(TRANS2_SET_FILE_INFORMATION);
5538 byte_count = 3 /* pad */ + params + count;
5539 pSMB->DataCount = cpu_to_le16(count);
5540 pSMB->ParameterCount = cpu_to_le16(params);
5541 pSMB->TotalDataCount = pSMB->DataCount;
5542 pSMB->TotalParameterCount = pSMB->ParameterCount;
5543 pSMB->ParameterOffset = cpu_to_le16(param_offset);
5544 parm_data =
50c2f753
SF
5545 (struct file_end_of_file_info *) (((char *) &pSMB->hdr.Protocol)
5546 + offset);
1da177e4
LT
5547 pSMB->DataOffset = cpu_to_le16(offset);
5548 parm_data->FileSize = cpu_to_le64(size);
5549 pSMB->Fid = fid;
790fe579 5550 if (SetAllocation) {
1da177e4
LT
5551 if (tcon->ses->capabilities & CAP_INFOLEVEL_PASSTHRU)
5552 pSMB->InformationLevel =
5553 cpu_to_le16(SMB_SET_FILE_ALLOCATION_INFO2);
5554 else
5555 pSMB->InformationLevel =
5556 cpu_to_le16(SMB_SET_FILE_ALLOCATION_INFO);
50c2f753 5557 } else /* Set File Size */ {
1da177e4
LT
5558 if (tcon->ses->capabilities & CAP_INFOLEVEL_PASSTHRU)
5559 pSMB->InformationLevel =
50c2f753 5560 cpu_to_le16(SMB_SET_FILE_END_OF_FILE_INFO2);
1da177e4
LT
5561 else
5562 pSMB->InformationLevel =
50c2f753 5563 cpu_to_le16(SMB_SET_FILE_END_OF_FILE_INFO);
1da177e4
LT
5564 }
5565 pSMB->Reserved4 = 0;
be8e3b00 5566 inc_rfc1001_len(pSMB, byte_count);
1da177e4 5567 pSMB->ByteCount = cpu_to_le16(byte_count);
792af7b0 5568 rc = SendReceiveNoRsp(xid, tcon->ses, (char *) pSMB, 0);
1da177e4 5569 if (rc) {
b6b38f70 5570 cFYI(1, "Send error in SetFileInfo (SetFileSize) = %d", rc);
1da177e4
LT
5571 }
5572
50c2f753 5573 /* Note: On -EAGAIN error only caller can retry on handle based calls
1da177e4
LT
5574 since file handle passed in no longer valid */
5575
5576 return rc;
5577}
5578
50c2f753 5579/* Some legacy servers such as NT4 require that the file times be set on
1da177e4
LT
5580 an open handle, rather than by pathname - this is awkward due to
5581 potential access conflicts on the open, but it is unavoidable for these
5582 old servers since the only other choice is to go from 100 nanosecond DCE
5583 time and resort to the original setpathinfo level which takes the ancient
5584 DOS time format with 2 second granularity */
5585int
96daf2b0 5586CIFSSMBSetFileInfo(const int xid, struct cifs_tcon *tcon,
2dd2dfa0 5587 const FILE_BASIC_INFO *data, __u16 fid, __u32 pid_of_opener)
1da177e4
LT
5588{
5589 struct smb_com_transaction2_sfi_req *pSMB = NULL;
1da177e4
LT
5590 char *data_offset;
5591 int rc = 0;
1da177e4
LT
5592 __u16 params, param_offset, offset, byte_count, count;
5593
b6b38f70 5594 cFYI(1, "Set Times (via SetFileInfo)");
cd63499c
SF
5595 rc = small_smb_init(SMB_COM_TRANSACTION2, 15, tcon, (void **) &pSMB);
5596
1da177e4
LT
5597 if (rc)
5598 return rc;
5599
2dd2dfa0
JL
5600 pSMB->hdr.Pid = cpu_to_le16((__u16)pid_of_opener);
5601 pSMB->hdr.PidHigh = cpu_to_le16((__u16)(pid_of_opener >> 16));
50c2f753 5602
1da177e4
LT
5603 params = 6;
5604 pSMB->MaxSetupCount = 0;
5605 pSMB->Reserved = 0;
5606 pSMB->Flags = 0;
5607 pSMB->Timeout = 0;
5608 pSMB->Reserved2 = 0;
5609 param_offset = offsetof(struct smb_com_transaction2_sfi_req, Fid) - 4;
5610 offset = param_offset + params;
5611
b2a3ad9c
JL
5612 data_offset = (char *)pSMB +
5613 offsetof(struct smb_hdr, Protocol) + offset;
1da177e4 5614
26f57364 5615 count = sizeof(FILE_BASIC_INFO);
1da177e4 5616 pSMB->MaxParameterCount = cpu_to_le16(2);
582d21e5
SF
5617 /* BB find max SMB PDU from sess */
5618 pSMB->MaxDataCount = cpu_to_le16(1000);
1da177e4
LT
5619 pSMB->SetupCount = 1;
5620 pSMB->Reserved3 = 0;
5621 pSMB->SubCommand = cpu_to_le16(TRANS2_SET_FILE_INFORMATION);
5622 byte_count = 3 /* pad */ + params + count;
5623 pSMB->DataCount = cpu_to_le16(count);
5624 pSMB->ParameterCount = cpu_to_le16(params);
5625 pSMB->TotalDataCount = pSMB->DataCount;
5626 pSMB->TotalParameterCount = pSMB->ParameterCount;
5627 pSMB->ParameterOffset = cpu_to_le16(param_offset);
5628 pSMB->DataOffset = cpu_to_le16(offset);
5629 pSMB->Fid = fid;
5630 if (tcon->ses->capabilities & CAP_INFOLEVEL_PASSTHRU)
5631 pSMB->InformationLevel = cpu_to_le16(SMB_SET_FILE_BASIC_INFO2);
5632 else
5633 pSMB->InformationLevel = cpu_to_le16(SMB_SET_FILE_BASIC_INFO);
5634 pSMB->Reserved4 = 0;
be8e3b00 5635 inc_rfc1001_len(pSMB, byte_count);
1da177e4 5636 pSMB->ByteCount = cpu_to_le16(byte_count);
50c2f753 5637 memcpy(data_offset, data, sizeof(FILE_BASIC_INFO));
792af7b0 5638 rc = SendReceiveNoRsp(xid, tcon->ses, (char *) pSMB, 0);
ad7a2926 5639 if (rc)
b6b38f70 5640 cFYI(1, "Send error in Set Time (SetFileInfo) = %d", rc);
1da177e4 5641
50c2f753 5642 /* Note: On -EAGAIN error only caller can retry on handle based calls
1da177e4
LT
5643 since file handle passed in no longer valid */
5644
5645 return rc;
5646}
5647
6d22f098 5648int
96daf2b0 5649CIFSSMBSetFileDisposition(const int xid, struct cifs_tcon *tcon,
6d22f098
JL
5650 bool delete_file, __u16 fid, __u32 pid_of_opener)
5651{
5652 struct smb_com_transaction2_sfi_req *pSMB = NULL;
5653 char *data_offset;
5654 int rc = 0;
5655 __u16 params, param_offset, offset, byte_count, count;
5656
b6b38f70 5657 cFYI(1, "Set File Disposition (via SetFileInfo)");
6d22f098
JL
5658 rc = small_smb_init(SMB_COM_TRANSACTION2, 15, tcon, (void **) &pSMB);
5659
5660 if (rc)
5661 return rc;
5662
5663 pSMB->hdr.Pid = cpu_to_le16((__u16)pid_of_opener);
5664 pSMB->hdr.PidHigh = cpu_to_le16((__u16)(pid_of_opener >> 16));
5665
5666 params = 6;
5667 pSMB->MaxSetupCount = 0;
5668 pSMB->Reserved = 0;
5669 pSMB->Flags = 0;
5670 pSMB->Timeout = 0;
5671 pSMB->Reserved2 = 0;
5672 param_offset = offsetof(struct smb_com_transaction2_sfi_req, Fid) - 4;
5673 offset = param_offset + params;
5674
5675 data_offset = (char *) (&pSMB->hdr.Protocol) + offset;
5676
5677 count = 1;
5678 pSMB->MaxParameterCount = cpu_to_le16(2);
5679 /* BB find max SMB PDU from sess */
5680 pSMB->MaxDataCount = cpu_to_le16(1000);
5681 pSMB->SetupCount = 1;
5682 pSMB->Reserved3 = 0;
5683 pSMB->SubCommand = cpu_to_le16(TRANS2_SET_FILE_INFORMATION);
5684 byte_count = 3 /* pad */ + params + count;
5685 pSMB->DataCount = cpu_to_le16(count);
5686 pSMB->ParameterCount = cpu_to_le16(params);
5687 pSMB->TotalDataCount = pSMB->DataCount;
5688 pSMB->TotalParameterCount = pSMB->ParameterCount;
5689 pSMB->ParameterOffset = cpu_to_le16(param_offset);
5690 pSMB->DataOffset = cpu_to_le16(offset);
5691 pSMB->Fid = fid;
5692 pSMB->InformationLevel = cpu_to_le16(SMB_SET_FILE_DISPOSITION_INFO);
5693 pSMB->Reserved4 = 0;
be8e3b00 5694 inc_rfc1001_len(pSMB, byte_count);
6d22f098
JL
5695 pSMB->ByteCount = cpu_to_le16(byte_count);
5696 *data_offset = delete_file ? 1 : 0;
792af7b0 5697 rc = SendReceiveNoRsp(xid, tcon->ses, (char *) pSMB, 0);
6d22f098 5698 if (rc)
b6b38f70 5699 cFYI(1, "Send error in SetFileDisposition = %d", rc);
6d22f098
JL
5700
5701 return rc;
5702}
1da177e4
LT
5703
5704int
96daf2b0 5705CIFSSMBSetPathInfo(const int xid, struct cifs_tcon *tcon,
6fc000e5
JL
5706 const char *fileName, const FILE_BASIC_INFO *data,
5707 const struct nls_table *nls_codepage, int remap)
1da177e4
LT
5708{
5709 TRANSACTION2_SPI_REQ *pSMB = NULL;
5710 TRANSACTION2_SPI_RSP *pSMBr = NULL;
5711 int name_len;
5712 int rc = 0;
5713 int bytes_returned = 0;
5714 char *data_offset;
5715 __u16 params, param_offset, offset, byte_count, count;
5716
b6b38f70 5717 cFYI(1, "In SetTimes");
1da177e4
LT
5718
5719SetTimesRetry:
5720 rc = smb_init(SMB_COM_TRANSACTION2, 15, tcon, (void **) &pSMB,
5721 (void **) &pSMBr);
5722 if (rc)
5723 return rc;
5724
5725 if (pSMB->hdr.Flags2 & SMBFLG2_UNICODE) {
5726 name_len =
acbbb76a
SF
5727 cifsConvertToUTF16((__le16 *) pSMB->FileName, fileName,
5728 PATH_MAX, nls_codepage, remap);
1da177e4
LT
5729 name_len++; /* trailing null */
5730 name_len *= 2;
50c2f753 5731 } else { /* BB improve the check for buffer overruns BB */
1da177e4
LT
5732 name_len = strnlen(fileName, PATH_MAX);
5733 name_len++; /* trailing null */
5734 strncpy(pSMB->FileName, fileName, name_len);
5735 }
5736
5737 params = 6 + name_len;
26f57364 5738 count = sizeof(FILE_BASIC_INFO);
1da177e4 5739 pSMB->MaxParameterCount = cpu_to_le16(2);
582d21e5
SF
5740 /* BB find max SMB PDU from sess structure BB */
5741 pSMB->MaxDataCount = cpu_to_le16(1000);
1da177e4
LT
5742 pSMB->MaxSetupCount = 0;
5743 pSMB->Reserved = 0;
5744 pSMB->Flags = 0;
5745 pSMB->Timeout = 0;
5746 pSMB->Reserved2 = 0;
5747 param_offset = offsetof(struct smb_com_transaction2_spi_req,
50c2f753 5748 InformationLevel) - 4;
1da177e4
LT
5749 offset = param_offset + params;
5750 data_offset = (char *) (&pSMB->hdr.Protocol) + offset;
5751 pSMB->ParameterOffset = cpu_to_le16(param_offset);
5752 pSMB->DataOffset = cpu_to_le16(offset);
5753 pSMB->SetupCount = 1;
5754 pSMB->Reserved3 = 0;
5755 pSMB->SubCommand = cpu_to_le16(TRANS2_SET_PATH_INFORMATION);
5756 byte_count = 3 /* pad */ + params + count;
5757
5758 pSMB->DataCount = cpu_to_le16(count);
5759 pSMB->ParameterCount = cpu_to_le16(params);
5760 pSMB->TotalDataCount = pSMB->DataCount;
5761 pSMB->TotalParameterCount = pSMB->ParameterCount;
5762 if (tcon->ses->capabilities & CAP_INFOLEVEL_PASSTHRU)
5763 pSMB->InformationLevel = cpu_to_le16(SMB_SET_FILE_BASIC_INFO2);
5764 else
5765 pSMB->InformationLevel = cpu_to_le16(SMB_SET_FILE_BASIC_INFO);
5766 pSMB->Reserved4 = 0;
be8e3b00 5767 inc_rfc1001_len(pSMB, byte_count);
26f57364 5768 memcpy(data_offset, data, sizeof(FILE_BASIC_INFO));
1da177e4
LT
5769 pSMB->ByteCount = cpu_to_le16(byte_count);
5770 rc = SendReceive(xid, tcon->ses, (struct smb_hdr *) pSMB,
5771 (struct smb_hdr *) pSMBr, &bytes_returned, 0);
ad7a2926 5772 if (rc)
b6b38f70 5773 cFYI(1, "SetPathInfo (times) returned %d", rc);
1da177e4
LT
5774
5775 cifs_buf_release(pSMB);
5776
5777 if (rc == -EAGAIN)
5778 goto SetTimesRetry;
5779
5780 return rc;
5781}
5782
5783/* Can not be used to set time stamps yet (due to old DOS time format) */
5784/* Can be used to set attributes */
5785#if 0 /* Possibly not needed - since it turns out that strangely NT4 has a bug
5786 handling it anyway and NT4 was what we thought it would be needed for
5787 Do not delete it until we prove whether needed for Win9x though */
5788int
96daf2b0 5789CIFSSMBSetAttrLegacy(int xid, struct cifs_tcon *tcon, char *fileName,
1da177e4
LT
5790 __u16 dos_attrs, const struct nls_table *nls_codepage)
5791{
5792 SETATTR_REQ *pSMB = NULL;
5793 SETATTR_RSP *pSMBr = NULL;
5794 int rc = 0;
5795 int bytes_returned;
5796 int name_len;
5797
b6b38f70 5798 cFYI(1, "In SetAttrLegacy");
1da177e4
LT
5799
5800SetAttrLgcyRetry:
5801 rc = smb_init(SMB_COM_SETATTR, 8, tcon, (void **) &pSMB,
5802 (void **) &pSMBr);
5803 if (rc)
5804 return rc;
5805
5806 if (pSMB->hdr.Flags2 & SMBFLG2_UNICODE) {
5807 name_len =
acbbb76a
SF
5808 ConvertToUTF16((__le16 *) pSMB->fileName, fileName,
5809 PATH_MAX, nls_codepage);
1da177e4
LT
5810 name_len++; /* trailing null */
5811 name_len *= 2;
50c2f753 5812 } else { /* BB improve the check for buffer overruns BB */
1da177e4
LT
5813 name_len = strnlen(fileName, PATH_MAX);
5814 name_len++; /* trailing null */
5815 strncpy(pSMB->fileName, fileName, name_len);
5816 }
5817 pSMB->attr = cpu_to_le16(dos_attrs);
5818 pSMB->BufferFormat = 0x04;
be8e3b00 5819 inc_rfc1001_len(pSMB, name_len + 1);
1da177e4
LT
5820 pSMB->ByteCount = cpu_to_le16(name_len + 1);
5821 rc = SendReceive(xid, tcon->ses, (struct smb_hdr *) pSMB,
5822 (struct smb_hdr *) pSMBr, &bytes_returned, 0);
ad7a2926 5823 if (rc)
b6b38f70 5824 cFYI(1, "Error in LegacySetAttr = %d", rc);
1da177e4
LT
5825
5826 cifs_buf_release(pSMB);
5827
5828 if (rc == -EAGAIN)
5829 goto SetAttrLgcyRetry;
5830
5831 return rc;
5832}
5833#endif /* temporarily unneeded SetAttr legacy function */
5834
654cf14a
JL
5835static void
5836cifs_fill_unix_set_info(FILE_UNIX_BASIC_INFO *data_offset,
5837 const struct cifs_unix_set_info_args *args)
5838{
5839 u64 mode = args->mode;
5840
5841 /*
5842 * Samba server ignores set of file size to zero due to bugs in some
5843 * older clients, but we should be precise - we use SetFileSize to
5844 * set file size and do not want to truncate file size to zero
25985edc 5845 * accidentally as happened on one Samba server beta by putting
654cf14a
JL
5846 * zero instead of -1 here
5847 */
5848 data_offset->EndOfFile = cpu_to_le64(NO_CHANGE_64);
5849 data_offset->NumOfBytes = cpu_to_le64(NO_CHANGE_64);
5850 data_offset->LastStatusChange = cpu_to_le64(args->ctime);
5851 data_offset->LastAccessTime = cpu_to_le64(args->atime);
5852 data_offset->LastModificationTime = cpu_to_le64(args->mtime);
5853 data_offset->Uid = cpu_to_le64(args->uid);
5854 data_offset->Gid = cpu_to_le64(args->gid);
5855 /* better to leave device as zero when it is */
5856 data_offset->DevMajor = cpu_to_le64(MAJOR(args->device));
5857 data_offset->DevMinor = cpu_to_le64(MINOR(args->device));
5858 data_offset->Permissions = cpu_to_le64(mode);
5859
5860 if (S_ISREG(mode))
5861 data_offset->Type = cpu_to_le32(UNIX_FILE);
5862 else if (S_ISDIR(mode))
5863 data_offset->Type = cpu_to_le32(UNIX_DIR);
5864 else if (S_ISLNK(mode))
5865 data_offset->Type = cpu_to_le32(UNIX_SYMLINK);
5866 else if (S_ISCHR(mode))
5867 data_offset->Type = cpu_to_le32(UNIX_CHARDEV);
5868 else if (S_ISBLK(mode))
5869 data_offset->Type = cpu_to_le32(UNIX_BLOCKDEV);
5870 else if (S_ISFIFO(mode))
5871 data_offset->Type = cpu_to_le32(UNIX_FIFO);
5872 else if (S_ISSOCK(mode))
5873 data_offset->Type = cpu_to_le32(UNIX_SOCKET);
5874}
5875
3bbeeb3c 5876int
96daf2b0 5877CIFSSMBUnixSetFileInfo(const int xid, struct cifs_tcon *tcon,
3bbeeb3c
JL
5878 const struct cifs_unix_set_info_args *args,
5879 u16 fid, u32 pid_of_opener)
5880{
5881 struct smb_com_transaction2_sfi_req *pSMB = NULL;
b2a3ad9c 5882 char *data_offset;
3bbeeb3c
JL
5883 int rc = 0;
5884 u16 params, param_offset, offset, byte_count, count;
5885
b6b38f70 5886 cFYI(1, "Set Unix Info (via SetFileInfo)");
3bbeeb3c
JL
5887 rc = small_smb_init(SMB_COM_TRANSACTION2, 15, tcon, (void **) &pSMB);
5888
5889 if (rc)
5890 return rc;
5891
5892 pSMB->hdr.Pid = cpu_to_le16((__u16)pid_of_opener);
5893 pSMB->hdr.PidHigh = cpu_to_le16((__u16)(pid_of_opener >> 16));
5894
5895 params = 6;
5896 pSMB->MaxSetupCount = 0;
5897 pSMB->Reserved = 0;
5898 pSMB->Flags = 0;
5899 pSMB->Timeout = 0;
5900 pSMB->Reserved2 = 0;
5901 param_offset = offsetof(struct smb_com_transaction2_sfi_req, Fid) - 4;
5902 offset = param_offset + params;
5903
b2a3ad9c
JL
5904 data_offset = (char *)pSMB +
5905 offsetof(struct smb_hdr, Protocol) + offset;
5906
3bbeeb3c
JL
5907 count = sizeof(FILE_UNIX_BASIC_INFO);
5908
5909 pSMB->MaxParameterCount = cpu_to_le16(2);
5910 /* BB find max SMB PDU from sess */
5911 pSMB->MaxDataCount = cpu_to_le16(1000);
5912 pSMB->SetupCount = 1;
5913 pSMB->Reserved3 = 0;
5914 pSMB->SubCommand = cpu_to_le16(TRANS2_SET_FILE_INFORMATION);
5915 byte_count = 3 /* pad */ + params + count;
5916 pSMB->DataCount = cpu_to_le16(count);
5917 pSMB->ParameterCount = cpu_to_le16(params);
5918 pSMB->TotalDataCount = pSMB->DataCount;
5919 pSMB->TotalParameterCount = pSMB->ParameterCount;
5920 pSMB->ParameterOffset = cpu_to_le16(param_offset);
5921 pSMB->DataOffset = cpu_to_le16(offset);
5922 pSMB->Fid = fid;
5923 pSMB->InformationLevel = cpu_to_le16(SMB_SET_FILE_UNIX_BASIC);
5924 pSMB->Reserved4 = 0;
be8e3b00 5925 inc_rfc1001_len(pSMB, byte_count);
3bbeeb3c
JL
5926 pSMB->ByteCount = cpu_to_le16(byte_count);
5927
b2a3ad9c 5928 cifs_fill_unix_set_info((FILE_UNIX_BASIC_INFO *)data_offset, args);
3bbeeb3c 5929
792af7b0 5930 rc = SendReceiveNoRsp(xid, tcon->ses, (char *) pSMB, 0);
3bbeeb3c 5931 if (rc)
b6b38f70 5932 cFYI(1, "Send error in Set Time (SetFileInfo) = %d", rc);
3bbeeb3c
JL
5933
5934 /* Note: On -EAGAIN error only caller can retry on handle based calls
5935 since file handle passed in no longer valid */
5936
5937 return rc;
5938}
5939
1da177e4 5940int
96daf2b0 5941CIFSSMBUnixSetPathInfo(const int xid, struct cifs_tcon *tcon, char *fileName,
01ea95e3
JL
5942 const struct cifs_unix_set_info_args *args,
5943 const struct nls_table *nls_codepage, int remap)
1da177e4
LT
5944{
5945 TRANSACTION2_SPI_REQ *pSMB = NULL;
5946 TRANSACTION2_SPI_RSP *pSMBr = NULL;
5947 int name_len;
5948 int rc = 0;
5949 int bytes_returned = 0;
5950 FILE_UNIX_BASIC_INFO *data_offset;
5951 __u16 params, param_offset, offset, count, byte_count;
5952
b6b38f70 5953 cFYI(1, "In SetUID/GID/Mode");
1da177e4
LT
5954setPermsRetry:
5955 rc = smb_init(SMB_COM_TRANSACTION2, 15, tcon, (void **) &pSMB,
5956 (void **) &pSMBr);
5957 if (rc)
5958 return rc;
5959
5960 if (pSMB->hdr.Flags2 & SMBFLG2_UNICODE) {
5961 name_len =
acbbb76a
SF
5962 cifsConvertToUTF16((__le16 *) pSMB->FileName, fileName,
5963 PATH_MAX, nls_codepage, remap);
1da177e4
LT
5964 name_len++; /* trailing null */
5965 name_len *= 2;
3e87d803 5966 } else { /* BB improve the check for buffer overruns BB */
1da177e4
LT
5967 name_len = strnlen(fileName, PATH_MAX);
5968 name_len++; /* trailing null */
5969 strncpy(pSMB->FileName, fileName, name_len);
5970 }
5971
5972 params = 6 + name_len;
26f57364 5973 count = sizeof(FILE_UNIX_BASIC_INFO);
1da177e4 5974 pSMB->MaxParameterCount = cpu_to_le16(2);
582d21e5
SF
5975 /* BB find max SMB PDU from sess structure BB */
5976 pSMB->MaxDataCount = cpu_to_le16(1000);
1da177e4
LT
5977 pSMB->MaxSetupCount = 0;
5978 pSMB->Reserved = 0;
5979 pSMB->Flags = 0;
5980 pSMB->Timeout = 0;
5981 pSMB->Reserved2 = 0;
5982 param_offset = offsetof(struct smb_com_transaction2_spi_req,
50c2f753 5983 InformationLevel) - 4;
1da177e4
LT
5984 offset = param_offset + params;
5985 data_offset =
5986 (FILE_UNIX_BASIC_INFO *) ((char *) &pSMB->hdr.Protocol +
5987 offset);
5988 memset(data_offset, 0, count);
5989 pSMB->DataOffset = cpu_to_le16(offset);
5990 pSMB->ParameterOffset = cpu_to_le16(param_offset);
5991 pSMB->SetupCount = 1;
5992 pSMB->Reserved3 = 0;
5993 pSMB->SubCommand = cpu_to_le16(TRANS2_SET_PATH_INFORMATION);
5994 byte_count = 3 /* pad */ + params + count;
5995 pSMB->ParameterCount = cpu_to_le16(params);
5996 pSMB->DataCount = cpu_to_le16(count);
5997 pSMB->TotalParameterCount = pSMB->ParameterCount;
5998 pSMB->TotalDataCount = pSMB->DataCount;
5999 pSMB->InformationLevel = cpu_to_le16(SMB_SET_FILE_UNIX_BASIC);
6000 pSMB->Reserved4 = 0;
be8e3b00 6001 inc_rfc1001_len(pSMB, byte_count);
1da177e4 6002
654cf14a 6003 cifs_fill_unix_set_info(data_offset, args);
1da177e4
LT
6004
6005 pSMB->ByteCount = cpu_to_le16(byte_count);
6006 rc = SendReceive(xid, tcon->ses, (struct smb_hdr *) pSMB,
6007 (struct smb_hdr *) pSMBr, &bytes_returned, 0);
ad7a2926 6008 if (rc)
b6b38f70 6009 cFYI(1, "SetPathInfo (perms) returned %d", rc);
1da177e4 6010
0d817bc0 6011 cifs_buf_release(pSMB);
1da177e4
LT
6012 if (rc == -EAGAIN)
6013 goto setPermsRetry;
6014 return rc;
6015}
6016
1da177e4 6017#ifdef CONFIG_CIFS_XATTR
31c0519f
JL
6018/*
6019 * Do a path-based QUERY_ALL_EAS call and parse the result. This is a common
6020 * function used by listxattr and getxattr type calls. When ea_name is set,
6021 * it looks for that attribute name and stuffs that value into the EAData
6022 * buffer. When ea_name is NULL, it stuffs a list of attribute names into the
6023 * buffer. In both cases, the return value is either the length of the
6024 * resulting data or a negative error code. If EAData is a NULL pointer then
6025 * the data isn't copied to it, but the length is returned.
6026 */
1da177e4 6027ssize_t
96daf2b0 6028CIFSSMBQAllEAs(const int xid, struct cifs_tcon *tcon,
31c0519f
JL
6029 const unsigned char *searchName, const unsigned char *ea_name,
6030 char *EAData, size_t buf_size,
6031 const struct nls_table *nls_codepage, int remap)
1da177e4
LT
6032{
6033 /* BB assumes one setup word */
6034 TRANSACTION2_QPI_REQ *pSMB = NULL;
6035 TRANSACTION2_QPI_RSP *pSMBr = NULL;
6036 int rc = 0;
6037 int bytes_returned;
6e462b9f 6038 int list_len;
f0d3868b 6039 struct fealist *ea_response_data;
50c2f753
SF
6040 struct fea *temp_fea;
6041 char *temp_ptr;
0cd126b5 6042 char *end_of_smb;
f0d3868b 6043 __u16 params, byte_count, data_offset;
5980fc96 6044 unsigned int ea_name_len = ea_name ? strlen(ea_name) : 0;
1da177e4 6045
b6b38f70 6046 cFYI(1, "In Query All EAs path %s", searchName);
1da177e4
LT
6047QAllEAsRetry:
6048 rc = smb_init(SMB_COM_TRANSACTION2, 15, tcon, (void **) &pSMB,
6049 (void **) &pSMBr);
6050 if (rc)
6051 return rc;
6052
6053 if (pSMB->hdr.Flags2 & SMBFLG2_UNICODE) {
6e462b9f 6054 list_len =
acbbb76a
SF
6055 cifsConvertToUTF16((__le16 *) pSMB->FileName, searchName,
6056 PATH_MAX, nls_codepage, remap);
6e462b9f
JL
6057 list_len++; /* trailing null */
6058 list_len *= 2;
1da177e4 6059 } else { /* BB improve the check for buffer overruns BB */
6e462b9f
JL
6060 list_len = strnlen(searchName, PATH_MAX);
6061 list_len++; /* trailing null */
6062 strncpy(pSMB->FileName, searchName, list_len);
1da177e4
LT
6063 }
6064
6e462b9f 6065 params = 2 /* level */ + 4 /* reserved */ + list_len /* includes NUL */;
1da177e4
LT
6066 pSMB->TotalDataCount = 0;
6067 pSMB->MaxParameterCount = cpu_to_le16(2);
582d21e5 6068 /* BB find exact max SMB PDU from sess structure BB */
e529614a 6069 pSMB->MaxDataCount = cpu_to_le16(CIFSMaxBufSize);
1da177e4
LT
6070 pSMB->MaxSetupCount = 0;
6071 pSMB->Reserved = 0;
6072 pSMB->Flags = 0;
6073 pSMB->Timeout = 0;
6074 pSMB->Reserved2 = 0;
6075 pSMB->ParameterOffset = cpu_to_le16(offsetof(
50c2f753 6076 struct smb_com_transaction2_qpi_req, InformationLevel) - 4);
1da177e4
LT
6077 pSMB->DataCount = 0;
6078 pSMB->DataOffset = 0;
6079 pSMB->SetupCount = 1;
6080 pSMB->Reserved3 = 0;
6081 pSMB->SubCommand = cpu_to_le16(TRANS2_QUERY_PATH_INFORMATION);
6082 byte_count = params + 1 /* pad */ ;
6083 pSMB->TotalParameterCount = cpu_to_le16(params);
6084 pSMB->ParameterCount = pSMB->TotalParameterCount;
6085 pSMB->InformationLevel = cpu_to_le16(SMB_INFO_QUERY_ALL_EAS);
6086 pSMB->Reserved4 = 0;
be8e3b00 6087 inc_rfc1001_len(pSMB, byte_count);
1da177e4
LT
6088 pSMB->ByteCount = cpu_to_le16(byte_count);
6089
6090 rc = SendReceive(xid, tcon->ses, (struct smb_hdr *) pSMB,
6091 (struct smb_hdr *) pSMBr, &bytes_returned, 0);
6092 if (rc) {
b6b38f70 6093 cFYI(1, "Send error in QueryAllEAs = %d", rc);
f0d3868b
JL
6094 goto QAllEAsOut;
6095 }
1da177e4 6096
f0d3868b
JL
6097
6098 /* BB also check enough total bytes returned */
6099 /* BB we need to improve the validity checking
6100 of these trans2 responses */
6101
6102 rc = validate_t2((struct smb_t2_rsp *)pSMBr);
820a803f 6103 if (rc || get_bcc(&pSMBr->hdr) < 4) {
f0d3868b
JL
6104 rc = -EIO; /* bad smb */
6105 goto QAllEAsOut;
6106 }
6107
6108 /* check that length of list is not more than bcc */
6109 /* check that each entry does not go beyond length
6110 of list */
6111 /* check that each element of each entry does not
6112 go beyond end of list */
6113 /* validate_trans2_offsets() */
6114 /* BB check if start of smb + data_offset > &bcc+ bcc */
6115
6116 data_offset = le16_to_cpu(pSMBr->t2.DataOffset);
6117 ea_response_data = (struct fealist *)
6118 (((char *) &pSMBr->hdr.Protocol) + data_offset);
6119
6e462b9f 6120 list_len = le32_to_cpu(ea_response_data->list_len);
b6b38f70 6121 cFYI(1, "ea length %d", list_len);
6e462b9f 6122 if (list_len <= 8) {
b6b38f70 6123 cFYI(1, "empty EA list returned from server");
f0d3868b
JL
6124 goto QAllEAsOut;
6125 }
6126
0cd126b5 6127 /* make sure list_len doesn't go past end of SMB */
690c522f 6128 end_of_smb = (char *)pByteArea(&pSMBr->hdr) + get_bcc(&pSMBr->hdr);
0cd126b5 6129 if ((char *)ea_response_data + list_len > end_of_smb) {
b6b38f70 6130 cFYI(1, "EA list appears to go beyond SMB");
0cd126b5
JL
6131 rc = -EIO;
6132 goto QAllEAsOut;
6133 }
6134
f0d3868b 6135 /* account for ea list len */
6e462b9f 6136 list_len -= 4;
f0d3868b
JL
6137 temp_fea = ea_response_data->list;
6138 temp_ptr = (char *)temp_fea;
6e462b9f 6139 while (list_len > 0) {
122ca007 6140 unsigned int name_len;
f0d3868b 6141 __u16 value_len;
0cd126b5 6142
6e462b9f 6143 list_len -= 4;
f0d3868b 6144 temp_ptr += 4;
0cd126b5
JL
6145 /* make sure we can read name_len and value_len */
6146 if (list_len < 0) {
b6b38f70 6147 cFYI(1, "EA entry goes beyond length of list");
0cd126b5
JL
6148 rc = -EIO;
6149 goto QAllEAsOut;
6150 }
6151
6152 name_len = temp_fea->name_len;
6153 value_len = le16_to_cpu(temp_fea->value_len);
6154 list_len -= name_len + 1 + value_len;
6155 if (list_len < 0) {
b6b38f70 6156 cFYI(1, "EA entry goes beyond length of list");
0cd126b5
JL
6157 rc = -EIO;
6158 goto QAllEAsOut;
6159 }
6160
31c0519f 6161 if (ea_name) {
91d065c4 6162 if (ea_name_len == name_len &&
ac423446 6163 memcmp(ea_name, temp_ptr, name_len) == 0) {
31c0519f
JL
6164 temp_ptr += name_len + 1;
6165 rc = value_len;
6166 if (buf_size == 0)
6167 goto QAllEAsOut;
6168 if ((size_t)value_len > buf_size) {
6169 rc = -ERANGE;
6170 goto QAllEAsOut;
6171 }
6172 memcpy(EAData, temp_ptr, value_len);
6173 goto QAllEAsOut;
6174 }
f0d3868b 6175 } else {
31c0519f
JL
6176 /* account for prefix user. and trailing null */
6177 rc += (5 + 1 + name_len);
6178 if (rc < (int) buf_size) {
6179 memcpy(EAData, "user.", 5);
6180 EAData += 5;
6181 memcpy(EAData, temp_ptr, name_len);
6182 EAData += name_len;
6183 /* null terminate name */
6184 *EAData = 0;
6185 ++EAData;
6186 } else if (buf_size == 0) {
6187 /* skip copy - calc size only */
6188 } else {
6189 /* stop before overrun buffer */
6190 rc = -ERANGE;
6191 break;
6192 }
1da177e4 6193 }
0cd126b5 6194 temp_ptr += name_len + 1 + value_len;
f0d3868b 6195 temp_fea = (struct fea *)temp_ptr;
1da177e4 6196 }
f0d3868b 6197
31c0519f
JL
6198 /* didn't find the named attribute */
6199 if (ea_name)
6200 rc = -ENODATA;
6201
f0d3868b 6202QAllEAsOut:
0d817bc0 6203 cifs_buf_release(pSMB);
1da177e4
LT
6204 if (rc == -EAGAIN)
6205 goto QAllEAsRetry;
6206
6207 return (ssize_t)rc;
6208}
6209
1da177e4 6210int
96daf2b0 6211CIFSSMBSetEA(const int xid, struct cifs_tcon *tcon, const char *fileName,
50c2f753
SF
6212 const char *ea_name, const void *ea_value,
6213 const __u16 ea_value_len, const struct nls_table *nls_codepage,
6214 int remap)
1da177e4
LT
6215{
6216 struct smb_com_transaction2_spi_req *pSMB = NULL;
6217 struct smb_com_transaction2_spi_rsp *pSMBr = NULL;
6218 struct fealist *parm_data;
6219 int name_len;
6220 int rc = 0;
6221 int bytes_returned = 0;
6222 __u16 params, param_offset, byte_count, offset, count;
6223
b6b38f70 6224 cFYI(1, "In SetEA");
1da177e4
LT
6225SetEARetry:
6226 rc = smb_init(SMB_COM_TRANSACTION2, 15, tcon, (void **) &pSMB,
6227 (void **) &pSMBr);
6228 if (rc)
6229 return rc;
6230
6231 if (pSMB->hdr.Flags2 & SMBFLG2_UNICODE) {
6232 name_len =
acbbb76a
SF
6233 cifsConvertToUTF16((__le16 *) pSMB->FileName, fileName,
6234 PATH_MAX, nls_codepage, remap);
1da177e4
LT
6235 name_len++; /* trailing null */
6236 name_len *= 2;
50c2f753 6237 } else { /* BB improve the check for buffer overruns BB */
1da177e4
LT
6238 name_len = strnlen(fileName, PATH_MAX);
6239 name_len++; /* trailing null */
6240 strncpy(pSMB->FileName, fileName, name_len);
6241 }
6242
6243 params = 6 + name_len;
6244
6245 /* done calculating parms using name_len of file name,
6246 now use name_len to calculate length of ea name
6247 we are going to create in the inode xattrs */
790fe579 6248 if (ea_name == NULL)
1da177e4
LT
6249 name_len = 0;
6250 else
50c2f753 6251 name_len = strnlen(ea_name, 255);
1da177e4 6252
dae5dbdb 6253 count = sizeof(*parm_data) + ea_value_len + name_len;
1da177e4 6254 pSMB->MaxParameterCount = cpu_to_le16(2);
582d21e5
SF
6255 /* BB find max SMB PDU from sess */
6256 pSMB->MaxDataCount = cpu_to_le16(1000);
1da177e4
LT
6257 pSMB->MaxSetupCount = 0;
6258 pSMB->Reserved = 0;
6259 pSMB->Flags = 0;
6260 pSMB->Timeout = 0;
6261 pSMB->Reserved2 = 0;
6262 param_offset = offsetof(struct smb_com_transaction2_spi_req,
50c2f753 6263 InformationLevel) - 4;
1da177e4
LT
6264 offset = param_offset + params;
6265 pSMB->InformationLevel =
6266 cpu_to_le16(SMB_SET_FILE_EA);
6267
6268 parm_data =
6269 (struct fealist *) (((char *) &pSMB->hdr.Protocol) +
6270 offset);
6271 pSMB->ParameterOffset = cpu_to_le16(param_offset);
6272 pSMB->DataOffset = cpu_to_le16(offset);
6273 pSMB->SetupCount = 1;
6274 pSMB->Reserved3 = 0;
6275 pSMB->SubCommand = cpu_to_le16(TRANS2_SET_PATH_INFORMATION);
6276 byte_count = 3 /* pad */ + params + count;
6277 pSMB->DataCount = cpu_to_le16(count);
6278 parm_data->list_len = cpu_to_le32(count);
6279 parm_data->list[0].EA_flags = 0;
6280 /* we checked above that name len is less than 255 */
53b3531b 6281 parm_data->list[0].name_len = (__u8)name_len;
1da177e4 6282 /* EA names are always ASCII */
790fe579 6283 if (ea_name)
50c2f753 6284 strncpy(parm_data->list[0].name, ea_name, name_len);
1da177e4
LT
6285 parm_data->list[0].name[name_len] = 0;
6286 parm_data->list[0].value_len = cpu_to_le16(ea_value_len);
6287 /* caller ensures that ea_value_len is less than 64K but
6288 we need to ensure that it fits within the smb */
6289
50c2f753
SF
6290 /*BB add length check to see if it would fit in
6291 negotiated SMB buffer size BB */
790fe579
SF
6292 /* if (ea_value_len > buffer_size - 512 (enough for header)) */
6293 if (ea_value_len)
50c2f753
SF
6294 memcpy(parm_data->list[0].name+name_len+1,
6295 ea_value, ea_value_len);
1da177e4
LT
6296
6297 pSMB->TotalDataCount = pSMB->DataCount;
6298 pSMB->ParameterCount = cpu_to_le16(params);
6299 pSMB->TotalParameterCount = pSMB->ParameterCount;
6300 pSMB->Reserved4 = 0;
be8e3b00 6301 inc_rfc1001_len(pSMB, byte_count);
1da177e4
LT
6302 pSMB->ByteCount = cpu_to_le16(byte_count);
6303 rc = SendReceive(xid, tcon->ses, (struct smb_hdr *) pSMB,
6304 (struct smb_hdr *) pSMBr, &bytes_returned, 0);
ad7a2926 6305 if (rc)
b6b38f70 6306 cFYI(1, "SetPathInfo (EA) returned %d", rc);
1da177e4
LT
6307
6308 cifs_buf_release(pSMB);
6309
6310 if (rc == -EAGAIN)
6311 goto SetEARetry;
6312
6313 return rc;
6314}
1da177e4 6315#endif
0eff0e26
SF
6316
6317#ifdef CONFIG_CIFS_DNOTIFY_EXPERIMENTAL /* BB unused temporarily */
6318/*
6319 * Years ago the kernel added a "dnotify" function for Samba server,
6320 * to allow network clients (such as Windows) to display updated
6321 * lists of files in directory listings automatically when
6322 * files are added by one user when another user has the
6323 * same directory open on their desktop. The Linux cifs kernel
6324 * client hooked into the kernel side of this interface for
6325 * the same reason, but ironically when the VFS moved from
6326 * "dnotify" to "inotify" it became harder to plug in Linux
6327 * network file system clients (the most obvious use case
6328 * for notify interfaces is when multiple users can update
6329 * the contents of the same directory - exactly what network
6330 * file systems can do) although the server (Samba) could
6331 * still use it. For the short term we leave the worker
6332 * function ifdeffed out (below) until inotify is fixed
6333 * in the VFS to make it easier to plug in network file
6334 * system clients. If inotify turns out to be permanently
6335 * incompatible for network fs clients, we could instead simply
6336 * expose this config flag by adding a future cifs (and smb2) notify ioctl.
6337 */
96daf2b0 6338int CIFSSMBNotify(const int xid, struct cifs_tcon *tcon,
0eff0e26
SF
6339 const int notify_subdirs, const __u16 netfid,
6340 __u32 filter, struct file *pfile, int multishot,
6341 const struct nls_table *nls_codepage)
6342{
6343 int rc = 0;
6344 struct smb_com_transaction_change_notify_req *pSMB = NULL;
6345 struct smb_com_ntransaction_change_notify_rsp *pSMBr = NULL;
6346 struct dir_notify_req *dnotify_req;
6347 int bytes_returned;
6348
6349 cFYI(1, "In CIFSSMBNotify for file handle %d", (int)netfid);
6350 rc = smb_init(SMB_COM_NT_TRANSACT, 23, tcon, (void **) &pSMB,
6351 (void **) &pSMBr);
6352 if (rc)
6353 return rc;
6354
6355 pSMB->TotalParameterCount = 0 ;
6356 pSMB->TotalDataCount = 0;
6357 pSMB->MaxParameterCount = cpu_to_le32(2);
c974befa 6358 pSMB->MaxDataCount = cpu_to_le32(CIFSMaxBufSize & 0xFFFFFF00);
0eff0e26
SF
6359 pSMB->MaxSetupCount = 4;
6360 pSMB->Reserved = 0;
6361 pSMB->ParameterOffset = 0;
6362 pSMB->DataCount = 0;
6363 pSMB->DataOffset = 0;
6364 pSMB->SetupCount = 4; /* single byte does not need le conversion */
6365 pSMB->SubCommand = cpu_to_le16(NT_TRANSACT_NOTIFY_CHANGE);
6366 pSMB->ParameterCount = pSMB->TotalParameterCount;
6367 if (notify_subdirs)
6368 pSMB->WatchTree = 1; /* one byte - no le conversion needed */
6369 pSMB->Reserved2 = 0;
6370 pSMB->CompletionFilter = cpu_to_le32(filter);
6371 pSMB->Fid = netfid; /* file handle always le */
6372 pSMB->ByteCount = 0;
6373
6374 rc = SendReceive(xid, tcon->ses, (struct smb_hdr *) pSMB,
6375 (struct smb_hdr *)pSMBr, &bytes_returned,
6376 CIFS_ASYNC_OP);
6377 if (rc) {
6378 cFYI(1, "Error in Notify = %d", rc);
6379 } else {
6380 /* Add file to outstanding requests */
6381 /* BB change to kmem cache alloc */
6382 dnotify_req = kmalloc(
6383 sizeof(struct dir_notify_req),
6384 GFP_KERNEL);
6385 if (dnotify_req) {
6386 dnotify_req->Pid = pSMB->hdr.Pid;
6387 dnotify_req->PidHigh = pSMB->hdr.PidHigh;
6388 dnotify_req->Mid = pSMB->hdr.Mid;
6389 dnotify_req->Tid = pSMB->hdr.Tid;
6390 dnotify_req->Uid = pSMB->hdr.Uid;
6391 dnotify_req->netfid = netfid;
6392 dnotify_req->pfile = pfile;
6393 dnotify_req->filter = filter;
6394 dnotify_req->multishot = multishot;
6395 spin_lock(&GlobalMid_Lock);
6396 list_add_tail(&dnotify_req->lhead,
6397 &GlobalDnotifyReqList);
6398 spin_unlock(&GlobalMid_Lock);
6399 } else
6400 rc = -ENOMEM;
6401 }
6402 cifs_buf_release(pSMB);
6403 return rc;
6404}
6405#endif /* was needed for dnotify, and will be needed for inotify when VFS fix */
This page took 0.819633 seconds and 5 git commands to generate.