4 * Copyright (C) International Business Machines Corp., 2002,2007
5 * Author(s): Steve French (sfrench@us.ibm.com)
7 * Contains the routines for constructing the SMB PDUs themselves
9 * This library is free software; you can redistribute it and/or modify
10 * it under the terms of the GNU Lesser General Public License as published
11 * by the Free Software Foundation; either version 2.1 of the License, or
12 * (at your option) any later version.
14 * This library is distributed in the hope that it will be useful,
15 * but WITHOUT ANY WARRANTY; without even the implied warranty of
16 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See
17 * the GNU Lesser General Public License for more details.
19 * You should have received a copy of the GNU Lesser General Public License
20 * along with this library; if not, write to the Free Software
21 * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
24 /* SMB/CIFS PDU handling routines here - except for leftovers in connect.c */
25 /* These are mostly routines that operate on a pathname, or on a tree id */
26 /* (mounted volume), but there are eight handle based routines which must be */
27 /* treated slightly differently for reconnection purposes since we never */
28 /* want to reuse a stale file handle and only the caller knows the file info */
31 #include <linux/kernel.h>
32 #include <linux/vfs.h>
33 #include <linux/posix_acl_xattr.h>
34 #include <asm/uaccess.h>
38 #include "cifsproto.h"
39 #include "cifs_unicode.h"
40 #include "cifs_debug.h"
42 #ifdef CONFIG_CIFS_POSIX
47 #ifdef CONFIG_CIFS_WEAK_PW_HASH
48 {LANMAN_PROT, "\2LM1.2X002"},
49 {LANMAN2_PROT, "\2LANMAN2.1"},
50 #endif /* weak password hashing for legacy clients */
51 {CIFS_PROT, "\2NT LM 0.12"},
52 {POSIX_PROT, "\2POSIX 2"},
60 #ifdef CONFIG_CIFS_WEAK_PW_HASH
61 {LANMAN_PROT, "\2LM1.2X002"},
62 {LANMAN2_PROT, "\2LANMAN2.1"},
63 #endif /* weak password hashing for legacy clients */
64 {CIFS_PROT, "\2NT LM 0.12"},
69 /* define the number of elements in the cifs dialect array */
70 #ifdef CONFIG_CIFS_POSIX
71 #ifdef CONFIG_CIFS_WEAK_PW_HASH
72 #define CIFS_NUM_PROT 4
74 #define CIFS_NUM_PROT 2
75 #endif /* CIFS_WEAK_PW_HASH */
77 #ifdef CONFIG_CIFS_WEAK_PW_HASH
78 #define CIFS_NUM_PROT 3
80 #define CIFS_NUM_PROT 1
81 #endif /* CONFIG_CIFS_WEAK_PW_HASH */
82 #endif /* CIFS_POSIX */
85 /* Mark as invalid, all open files on tree connections since they
86 were closed when session to server was lost */
87 static void mark_open_files_invalid(struct cifsTconInfo *pTcon)
89 struct cifsFileInfo *open_file = NULL;
90 struct list_head *tmp;
91 struct list_head *tmp1;
93 /* list all files open on tree connection and mark them invalid */
94 write_lock(&GlobalSMBSeslock);
95 list_for_each_safe(tmp, tmp1, &pTcon->openFileList) {
96 open_file = list_entry(tmp, struct cifsFileInfo, tlist);
98 open_file->invalidHandle = TRUE;
100 write_unlock(&GlobalSMBSeslock);
101 /* BB Add call to invalidate_inodes(sb) for all superblocks mounted
105 /* If the return code is zero, this function must fill in request_buf pointer */
107 small_smb_init(int smb_command, int wct, struct cifsTconInfo *tcon,
108 void **request_buf /* returned */)
112 /* SMBs NegProt, SessSetup, uLogoff do not have tcon yet so
113 check for tcp and smb session status done differently
114 for those three - in the calling routine */
116 if (tcon->tidStatus == CifsExiting) {
117 /* only tree disconnect, open, and write,
118 (and ulogoff which does not have tcon)
119 are allowed as we start force umount */
120 if ((smb_command != SMB_COM_WRITE_ANDX) &&
121 (smb_command != SMB_COM_OPEN_ANDX) &&
122 (smb_command != SMB_COM_TREE_DISCONNECT)) {
123 cFYI(1, ("can not send cmd %d while umounting",
128 if ((tcon->ses) && (tcon->ses->status != CifsExiting) &&
129 (tcon->ses->server)) {
130 struct nls_table *nls_codepage;
131 /* Give Demultiplex thread up to 10 seconds to
132 reconnect, should be greater than cifs socket
133 timeout which is 7 seconds */
134 while (tcon->ses->server->tcpStatus ==
136 wait_event_interruptible_timeout(tcon->ses->server->response_q,
137 (tcon->ses->server->tcpStatus ==
139 if (tcon->ses->server->tcpStatus ==
141 /* on "soft" mounts we wait once */
142 if ((tcon->retry == FALSE) ||
143 (tcon->ses->status == CifsExiting)) {
144 cFYI(1, ("gave up waiting on "
145 "reconnect in smb_init"));
147 } /* else "hard" mount - keep retrying
148 until process is killed or server
149 comes back on-line */
150 } else /* TCP session is reestablished now */
154 nls_codepage = load_nls_default();
155 /* need to prevent multiple threads trying to
156 simultaneously reconnect the same SMB session */
157 down(&tcon->ses->sesSem);
158 if (tcon->ses->status == CifsNeedReconnect)
159 rc = cifs_setup_session(0, tcon->ses,
161 if (!rc && (tcon->tidStatus == CifsNeedReconnect)) {
162 mark_open_files_invalid(tcon);
163 rc = CIFSTCon(0, tcon->ses, tcon->treeName,
165 up(&tcon->ses->sesSem);
166 /* tell server which Unix caps we support */
167 if (tcon->ses->capabilities & CAP_UNIX)
168 reset_cifs_unix_caps(0 /* no xid */,
170 NULL /* we do not know sb */,
171 NULL /* no vol info */);
172 /* BB FIXME add code to check if wsize needs
173 update due to negotiated smb buffer size
176 atomic_inc(&tconInfoReconnectCount);
178 cFYI(1, ("reconnect tcon rc = %d", rc));
179 /* Removed call to reopen open files here.
180 It is safer (and faster) to reopen files
181 one at a time as needed in read and write */
183 /* Check if handle based operation so we
184 know whether we can continue or not without
185 returning to caller to reset file handle */
186 switch (smb_command) {
187 case SMB_COM_READ_ANDX:
188 case SMB_COM_WRITE_ANDX:
190 case SMB_COM_FIND_CLOSE2:
191 case SMB_COM_LOCKING_ANDX: {
192 unload_nls(nls_codepage);
197 up(&tcon->ses->sesSem);
199 unload_nls(nls_codepage);
208 *request_buf = cifs_small_buf_get();
209 if (*request_buf == NULL) {
210 /* BB should we add a retry in here if not a writepage? */
214 header_assemble((struct smb_hdr *) *request_buf, smb_command,
218 cifs_stats_inc(&tcon->num_smbs_sent);
224 small_smb_init_no_tc(const int smb_command, const int wct,
225 struct cifsSesInfo *ses, void **request_buf)
228 struct smb_hdr *buffer;
230 rc = small_smb_init(smb_command, wct, NULL, request_buf);
234 buffer = (struct smb_hdr *)*request_buf;
235 buffer->Mid = GetNextMid(ses->server);
236 if (ses->capabilities & CAP_UNICODE)
237 buffer->Flags2 |= SMBFLG2_UNICODE;
238 if (ses->capabilities & CAP_STATUS32)
239 buffer->Flags2 |= SMBFLG2_ERR_STATUS;
241 /* uid, tid can stay at zero as set in header assemble */
243 /* BB add support for turning on the signing when
244 this function is used after 1st of session setup requests */
249 /* If the return code is zero, this function must fill in request_buf pointer */
251 smb_init(int smb_command, int wct, struct cifsTconInfo *tcon,
252 void **request_buf /* returned */ ,
253 void **response_buf /* returned */ )
257 /* SMBs NegProt, SessSetup, uLogoff do not have tcon yet so
258 check for tcp and smb session status done differently
259 for those three - in the calling routine */
261 if (tcon->tidStatus == CifsExiting) {
262 /* only tree disconnect, open, and write,
263 (and ulogoff which does not have tcon)
264 are allowed as we start force umount */
265 if ((smb_command != SMB_COM_WRITE_ANDX) &&
266 (smb_command != SMB_COM_OPEN_ANDX) &&
267 (smb_command != SMB_COM_TREE_DISCONNECT)) {
268 cFYI(1, ("can not send cmd %d while umounting",
274 if ((tcon->ses) && (tcon->ses->status != CifsExiting) &&
275 (tcon->ses->server)) {
276 struct nls_table *nls_codepage;
277 /* Give Demultiplex thread up to 10 seconds to
278 reconnect, should be greater than cifs socket
279 timeout which is 7 seconds */
280 while (tcon->ses->server->tcpStatus ==
282 wait_event_interruptible_timeout(tcon->ses->server->response_q,
283 (tcon->ses->server->tcpStatus ==
285 if (tcon->ses->server->tcpStatus ==
287 /* on "soft" mounts we wait once */
288 if ((tcon->retry == FALSE) ||
289 (tcon->ses->status == CifsExiting)) {
290 cFYI(1, ("gave up waiting on "
291 "reconnect in smb_init"));
293 } /* else "hard" mount - keep retrying
294 until process is killed or server
296 } else /* TCP session is reestablished now */
299 nls_codepage = load_nls_default();
300 /* need to prevent multiple threads trying to
301 simultaneously reconnect the same SMB session */
302 down(&tcon->ses->sesSem);
303 if (tcon->ses->status == CifsNeedReconnect)
304 rc = cifs_setup_session(0, tcon->ses,
306 if (!rc && (tcon->tidStatus == CifsNeedReconnect)) {
307 mark_open_files_invalid(tcon);
308 rc = CIFSTCon(0, tcon->ses, tcon->treeName,
310 up(&tcon->ses->sesSem);
311 /* tell server which Unix caps we support */
312 if (tcon->ses->capabilities & CAP_UNIX)
313 reset_cifs_unix_caps(0 /* no xid */,
315 NULL /* do not know sb */,
316 NULL /* no vol info */);
317 /* BB FIXME add code to check if wsize needs
318 update due to negotiated smb buffer size
321 atomic_inc(&tconInfoReconnectCount);
323 cFYI(1, ("reconnect tcon rc = %d", rc));
324 /* Removed call to reopen open files here.
325 It is safer (and faster) to reopen files
326 one at a time as needed in read and write */
328 /* Check if handle based operation so we
329 know whether we can continue or not without
330 returning to caller to reset file handle */
331 switch (smb_command) {
332 case SMB_COM_READ_ANDX:
333 case SMB_COM_WRITE_ANDX:
335 case SMB_COM_FIND_CLOSE2:
336 case SMB_COM_LOCKING_ANDX: {
337 unload_nls(nls_codepage);
342 up(&tcon->ses->sesSem);
344 unload_nls(nls_codepage);
353 *request_buf = cifs_buf_get();
354 if (*request_buf == NULL) {
355 /* BB should we add a retry in here if not a writepage? */
358 /* Although the original thought was we needed the response buf for */
359 /* potential retries of smb operations it turns out we can determine */
360 /* from the mid flags when the request buffer can be resent without */
361 /* having to use a second distinct buffer for the response */
363 *response_buf = *request_buf;
365 header_assemble((struct smb_hdr *) *request_buf, smb_command, tcon,
369 cifs_stats_inc(&tcon->num_smbs_sent);
374 static int validate_t2(struct smb_t2_rsp *pSMB)
380 /* check for plausible wct, bcc and t2 data and parm sizes */
381 /* check for parm and data offset going beyond end of smb */
382 if (pSMB->hdr.WordCount >= 10) {
383 if ((le16_to_cpu(pSMB->t2_rsp.ParameterOffset) <= 1024) &&
384 (le16_to_cpu(pSMB->t2_rsp.DataOffset) <= 1024)) {
385 /* check that bcc is at least as big as parms + data */
386 /* check that bcc is less than negotiated smb buffer */
387 total_size = le16_to_cpu(pSMB->t2_rsp.ParameterCount);
388 if (total_size < 512) {
390 le16_to_cpu(pSMB->t2_rsp.DataCount);
391 /* BCC le converted in SendReceive */
392 pBCC = (pSMB->hdr.WordCount * 2) +
393 sizeof(struct smb_hdr) +
395 if ((total_size <= (*(u16 *)pBCC)) &&
397 CIFSMaxBufSize+MAX_CIFS_HDR_SIZE)) {
403 cifs_dump_mem("Invalid transact2 SMB: ", (char *)pSMB,
404 sizeof(struct smb_t2_rsp) + 16);
408 CIFSSMBNegotiate(unsigned int xid, struct cifsSesInfo *ses)
411 NEGOTIATE_RSP *pSMBr;
415 struct TCP_Server_Info *server;
417 unsigned int secFlags;
421 server = ses->server;
426 rc = smb_init(SMB_COM_NEGOTIATE, 0, NULL /* no tcon yet */ ,
427 (void **) &pSMB, (void **) &pSMBr);
431 /* if any of auth flags (ie not sign or seal) are overriden use them */
432 if (ses->overrideSecFlg & (~(CIFSSEC_MUST_SIGN | CIFSSEC_MUST_SEAL)))
433 secFlags = ses->overrideSecFlg; /* BB FIXME fix sign flags? */
434 else /* if override flags set only sign/seal OR them with global auth */
435 secFlags = extended_security | ses->overrideSecFlg;
437 cFYI(1, ("secFlags 0x%x", secFlags));
439 pSMB->hdr.Mid = GetNextMid(server);
440 pSMB->hdr.Flags2 |= (SMBFLG2_UNICODE | SMBFLG2_ERR_STATUS);
442 if ((secFlags & CIFSSEC_MUST_KRB5) == CIFSSEC_MUST_KRB5)
443 pSMB->hdr.Flags2 |= SMBFLG2_EXT_SEC;
444 else if ((secFlags & CIFSSEC_AUTH_MASK) == CIFSSEC_MAY_KRB5) {
445 cFYI(1, ("Kerberos only mechanism, enable extended security"));
446 pSMB->hdr.Flags2 |= SMBFLG2_EXT_SEC;
450 for (i = 0; i < CIFS_NUM_PROT; i++) {
451 strncpy(pSMB->DialectsArray+count, protocols[i].name, 16);
452 count += strlen(protocols[i].name) + 1;
453 /* null at end of source and target buffers anyway */
455 pSMB->hdr.smb_buf_length += count;
456 pSMB->ByteCount = cpu_to_le16(count);
458 rc = SendReceive(xid, ses, (struct smb_hdr *) pSMB,
459 (struct smb_hdr *) pSMBr, &bytes_returned, 0);
463 dialect = le16_to_cpu(pSMBr->DialectIndex);
464 cFYI(1, ("Dialect: %d", dialect));
465 /* Check wct = 1 error case */
466 if ((pSMBr->hdr.WordCount < 13) || (dialect == BAD_PROT)) {
467 /* core returns wct = 1, but we do not ask for core - otherwise
468 small wct just comes when dialect index is -1 indicating we
469 could not negotiate a common dialect */
472 #ifdef CONFIG_CIFS_WEAK_PW_HASH
473 } else if ((pSMBr->hdr.WordCount == 13)
474 && ((dialect == LANMAN_PROT)
475 || (dialect == LANMAN2_PROT))) {
477 struct lanman_neg_rsp *rsp = (struct lanman_neg_rsp *)pSMBr;
479 if ((secFlags & CIFSSEC_MAY_LANMAN) ||
480 (secFlags & CIFSSEC_MAY_PLNTXT))
481 server->secType = LANMAN;
483 cERROR(1, ("mount failed weak security disabled"
484 " in /proc/fs/cifs/SecurityFlags"));
488 server->secMode = (__u8)le16_to_cpu(rsp->SecurityMode);
489 server->maxReq = le16_to_cpu(rsp->MaxMpxCount);
490 server->maxBuf = min((__u32)le16_to_cpu(rsp->MaxBufSize),
491 (__u32)CIFSMaxBufSize + MAX_CIFS_HDR_SIZE);
492 GETU32(server->sessid) = le32_to_cpu(rsp->SessionKey);
493 /* even though we do not use raw we might as well set this
494 accurately, in case we ever find a need for it */
495 if ((le16_to_cpu(rsp->RawMode) & RAW_ENABLE) == RAW_ENABLE) {
496 server->maxRw = 0xFF00;
497 server->capabilities = CAP_MPX_MODE | CAP_RAW_MODE;
499 server->maxRw = 0;/* we do not need to use raw anyway */
500 server->capabilities = CAP_MPX_MODE;
502 tmp = (__s16)le16_to_cpu(rsp->ServerTimeZone);
504 /* OS/2 often does not set timezone therefore
505 * we must use server time to calc time zone.
506 * Could deviate slightly from the right zone.
507 * Smallest defined timezone difference is 15 minutes
508 * (i.e. Nepal). Rounding up/down is done to match
511 int val, seconds, remain, result;
512 struct timespec ts, utc;
514 ts = cnvrtDosUnixTm(le16_to_cpu(rsp->SrvTime.Date),
515 le16_to_cpu(rsp->SrvTime.Time));
516 cFYI(1, ("SrvTime %d sec since 1970 (utc: %d) diff: %d",
517 (int)ts.tv_sec, (int)utc.tv_sec,
518 (int)(utc.tv_sec - ts.tv_sec)));
519 val = (int)(utc.tv_sec - ts.tv_sec);
521 result = (seconds / MIN_TZ_ADJ) * MIN_TZ_ADJ;
522 remain = seconds % MIN_TZ_ADJ;
523 if (remain >= (MIN_TZ_ADJ / 2))
524 result += MIN_TZ_ADJ;
527 server->timeAdj = result;
529 server->timeAdj = (int)tmp;
530 server->timeAdj *= 60; /* also in seconds */
532 cFYI(1, ("server->timeAdj: %d seconds", server->timeAdj));
535 /* BB get server time for time conversions and add
536 code to use it and timezone since this is not UTC */
538 if (rsp->EncryptionKeyLength ==
539 cpu_to_le16(CIFS_CRYPTO_KEY_SIZE)) {
540 memcpy(server->cryptKey, rsp->EncryptionKey,
541 CIFS_CRYPTO_KEY_SIZE);
542 } else if (server->secMode & SECMODE_PW_ENCRYPT) {
543 rc = -EIO; /* need cryptkey unless plain text */
547 cFYI(1, ("LANMAN negotiated"));
548 /* we will not end up setting signing flags - as no signing
549 was in LANMAN and server did not return the flags on */
551 #else /* weak security disabled */
552 } else if (pSMBr->hdr.WordCount == 13) {
553 cERROR(1, ("mount failed, cifs module not built "
554 "with CIFS_WEAK_PW_HASH support"));
556 #endif /* WEAK_PW_HASH */
558 } else if (pSMBr->hdr.WordCount != 17) {
563 /* else wct == 17 NTLM */
564 server->secMode = pSMBr->SecurityMode;
565 if ((server->secMode & SECMODE_USER) == 0)
566 cFYI(1, ("share mode security"));
568 if ((server->secMode & SECMODE_PW_ENCRYPT) == 0)
569 #ifdef CONFIG_CIFS_WEAK_PW_HASH
570 if ((secFlags & CIFSSEC_MAY_PLNTXT) == 0)
571 #endif /* CIFS_WEAK_PW_HASH */
572 cERROR(1, ("Server requests plain text password"
573 " but client support disabled"));
575 if ((secFlags & CIFSSEC_MUST_NTLMV2) == CIFSSEC_MUST_NTLMV2)
576 server->secType = NTLMv2;
577 else if (secFlags & CIFSSEC_MAY_NTLM)
578 server->secType = NTLM;
579 else if (secFlags & CIFSSEC_MAY_NTLMV2)
580 server->secType = NTLMv2;
581 else if (secFlags & CIFSSEC_MAY_KRB5)
582 server->secType = Kerberos;
583 else if (secFlags & CIFSSEC_MAY_LANMAN)
584 server->secType = LANMAN;
585 /* #ifdef CONFIG_CIFS_EXPERIMENTAL
586 else if (secFlags & CIFSSEC_MAY_PLNTXT)
591 cERROR(1, ("Invalid security type"));
594 /* else ... any others ...? */
596 /* one byte, so no need to convert this or EncryptionKeyLen from
598 server->maxReq = le16_to_cpu(pSMBr->MaxMpxCount);
599 /* probably no need to store and check maxvcs */
600 server->maxBuf = min(le32_to_cpu(pSMBr->MaxBufferSize),
601 (__u32) CIFSMaxBufSize + MAX_CIFS_HDR_SIZE);
602 server->maxRw = le32_to_cpu(pSMBr->MaxRawSize);
603 cFYI(0, ("Max buf = %d", ses->server->maxBuf));
604 GETU32(ses->server->sessid) = le32_to_cpu(pSMBr->SessionKey);
605 server->capabilities = le32_to_cpu(pSMBr->Capabilities);
606 server->timeAdj = (int)(__s16)le16_to_cpu(pSMBr->ServerTimeZone);
607 server->timeAdj *= 60;
608 if (pSMBr->EncryptionKeyLength == CIFS_CRYPTO_KEY_SIZE) {
609 memcpy(server->cryptKey, pSMBr->u.EncryptionKey,
610 CIFS_CRYPTO_KEY_SIZE);
611 } else if ((pSMBr->hdr.Flags2 & SMBFLG2_EXT_SEC)
612 && (pSMBr->EncryptionKeyLength == 0)) {
613 /* decode security blob */
614 } else if (server->secMode & SECMODE_PW_ENCRYPT) {
615 rc = -EIO; /* no crypt key only if plain text pwd */
619 /* BB might be helpful to save off the domain of server here */
621 if ((pSMBr->hdr.Flags2 & SMBFLG2_EXT_SEC) &&
622 (server->capabilities & CAP_EXTENDED_SECURITY)) {
623 count = pSMBr->ByteCount;
626 else if (count == 16) {
627 server->secType = RawNTLMSSP;
628 if (server->socketUseCount.counter > 1) {
629 if (memcmp(server->server_GUID,
630 pSMBr->u.extended_response.
632 cFYI(1, ("server UID changed"));
633 memcpy(server->server_GUID,
634 pSMBr->u.extended_response.GUID,
638 memcpy(server->server_GUID,
639 pSMBr->u.extended_response.GUID, 16);
641 rc = decode_negTokenInit(pSMBr->u.extended_response.
646 /* BB Need to fill struct for sessetup here */
653 server->capabilities &= ~CAP_EXTENDED_SECURITY;
655 #ifdef CONFIG_CIFS_WEAK_PW_HASH
658 if ((secFlags & CIFSSEC_MAY_SIGN) == 0) {
659 /* MUST_SIGN already includes the MAY_SIGN FLAG
660 so if this is zero it means that signing is disabled */
661 cFYI(1, ("Signing disabled"));
662 if (server->secMode & SECMODE_SIGN_REQUIRED)
663 cERROR(1, ("Server requires "
664 "/proc/fs/cifs/PacketSigningEnabled "
667 ~(SECMODE_SIGN_ENABLED | SECMODE_SIGN_REQUIRED);
668 } else if ((secFlags & CIFSSEC_MUST_SIGN) == CIFSSEC_MUST_SIGN) {
669 /* signing required */
670 cFYI(1, ("Must sign - secFlags 0x%x", secFlags));
671 if ((server->secMode &
672 (SECMODE_SIGN_ENABLED | SECMODE_SIGN_REQUIRED)) == 0) {
674 ("signing required but server lacks support"));
677 server->secMode |= SECMODE_SIGN_REQUIRED;
679 /* signing optional ie CIFSSEC_MAY_SIGN */
680 if ((server->secMode & SECMODE_SIGN_REQUIRED) == 0)
682 ~(SECMODE_SIGN_ENABLED | SECMODE_SIGN_REQUIRED);
686 cifs_buf_release(pSMB);
688 cFYI(1, ("negprot rc %d", rc));
693 CIFSSMBTDis(const int xid, struct cifsTconInfo *tcon)
695 struct smb_hdr *smb_buffer;
696 struct smb_hdr *smb_buffer_response; /* BB removeme BB */
700 cFYI(1, ("In tree disconnect"));
702 * If last user of the connection and
703 * connection alive - disconnect it
704 * If this is the last connection on the server session disconnect it
705 * (and inside session disconnect we should check if tcp socket needs
706 * to be freed and kernel thread woken up).
709 down(&tcon->tconSem);
713 atomic_dec(&tcon->useCount);
714 if (atomic_read(&tcon->useCount) > 0) {
719 /* No need to return error on this operation if tid invalidated and
720 closed on server already e.g. due to tcp session crashing */
721 if (tcon->tidStatus == CifsNeedReconnect) {
726 if ((tcon->ses == NULL) || (tcon->ses->server == NULL)) {
730 rc = small_smb_init(SMB_COM_TREE_DISCONNECT, 0, tcon,
731 (void **)&smb_buffer);
736 smb_buffer_response = smb_buffer; /* BB removeme BB */
738 rc = SendReceive(xid, tcon->ses, smb_buffer, smb_buffer_response,
741 cFYI(1, ("Tree disconnect failed %d", rc));
744 cifs_small_buf_release(smb_buffer);
747 /* No need to return error on this operation if tid invalidated and
748 closed on server already e.g. due to tcp session crashing */
756 CIFSSMBLogoff(const int xid, struct cifsSesInfo *ses)
758 struct smb_hdr *smb_buffer_response;
759 LOGOFF_ANDX_REQ *pSMB;
763 cFYI(1, ("In SMBLogoff for session disconnect"));
769 atomic_dec(&ses->inUse);
770 if (atomic_read(&ses->inUse) > 0) {
774 rc = small_smb_init(SMB_COM_LOGOFF_ANDX, 2, NULL, (void **)&pSMB);
780 smb_buffer_response = (struct smb_hdr *)pSMB; /* BB removeme BB */
783 pSMB->hdr.Mid = GetNextMid(ses->server);
785 if (ses->server->secMode &
786 (SECMODE_SIGN_REQUIRED | SECMODE_SIGN_ENABLED))
787 pSMB->hdr.Flags2 |= SMBFLG2_SECURITY_SIGNATURE;
790 pSMB->hdr.Uid = ses->Suid;
792 pSMB->AndXCommand = 0xFF;
793 rc = SendReceive(xid, ses, (struct smb_hdr *) pSMB,
794 smb_buffer_response, &length, 0);
796 atomic_dec(&ses->server->socketUseCount);
797 if (atomic_read(&ses->server->socketUseCount) == 0) {
798 spin_lock(&GlobalMid_Lock);
799 ses->server->tcpStatus = CifsExiting;
800 spin_unlock(&GlobalMid_Lock);
805 cifs_small_buf_release(pSMB);
807 /* if session dead then we do not need to do ulogoff,
808 since server closed smb session, no sense reporting
816 CIFSPOSIXDelFile(const int xid, struct cifsTconInfo *tcon, const char *fileName,
817 __u16 type, const struct nls_table *nls_codepage, int remap)
819 TRANSACTION2_SPI_REQ *pSMB = NULL;
820 TRANSACTION2_SPI_RSP *pSMBr = NULL;
821 struct unlink_psx_rq *pRqD;
824 int bytes_returned = 0;
825 __u16 params, param_offset, offset, byte_count;
827 cFYI(1, ("In POSIX delete"));
829 rc = smb_init(SMB_COM_TRANSACTION2, 15, tcon, (void **) &pSMB,
834 if (pSMB->hdr.Flags2 & SMBFLG2_UNICODE) {
836 cifsConvertToUCS((__le16 *) pSMB->FileName, fileName,
837 PATH_MAX, nls_codepage, remap);
838 name_len++; /* trailing null */
840 } else { /* BB add path length overrun check */
841 name_len = strnlen(fileName, PATH_MAX);
842 name_len++; /* trailing null */
843 strncpy(pSMB->FileName, fileName, name_len);
846 params = 6 + name_len;
847 pSMB->MaxParameterCount = cpu_to_le16(2);
848 pSMB->MaxDataCount = 0; /* BB double check this with jra */
849 pSMB->MaxSetupCount = 0;
854 param_offset = offsetof(struct smb_com_transaction2_spi_req,
855 InformationLevel) - 4;
856 offset = param_offset + params;
858 /* Setup pointer to Request Data (inode type) */
859 pRqD = (struct unlink_psx_rq *)(((char *)&pSMB->hdr.Protocol) + offset);
860 pRqD->type = cpu_to_le16(type);
861 pSMB->ParameterOffset = cpu_to_le16(param_offset);
862 pSMB->DataOffset = cpu_to_le16(offset);
863 pSMB->SetupCount = 1;
865 pSMB->SubCommand = cpu_to_le16(TRANS2_SET_PATH_INFORMATION);
866 byte_count = 3 /* pad */ + params + sizeof(struct unlink_psx_rq);
868 pSMB->DataCount = cpu_to_le16(sizeof(struct unlink_psx_rq));
869 pSMB->TotalDataCount = cpu_to_le16(sizeof(struct unlink_psx_rq));
870 pSMB->ParameterCount = cpu_to_le16(params);
871 pSMB->TotalParameterCount = pSMB->ParameterCount;
872 pSMB->InformationLevel = cpu_to_le16(SMB_POSIX_UNLINK);
874 pSMB->hdr.smb_buf_length += byte_count;
875 pSMB->ByteCount = cpu_to_le16(byte_count);
876 rc = SendReceive(xid, tcon->ses, (struct smb_hdr *) pSMB,
877 (struct smb_hdr *) pSMBr, &bytes_returned, 0);
879 cFYI(1, ("Posix delete returned %d", rc));
881 cifs_buf_release(pSMB);
883 cifs_stats_inc(&tcon->num_deletes);
892 CIFSSMBDelFile(const int xid, struct cifsTconInfo *tcon, const char *fileName,
893 const struct nls_table *nls_codepage, int remap)
895 DELETE_FILE_REQ *pSMB = NULL;
896 DELETE_FILE_RSP *pSMBr = NULL;
902 rc = smb_init(SMB_COM_DELETE, 1, tcon, (void **) &pSMB,
907 if (pSMB->hdr.Flags2 & SMBFLG2_UNICODE) {
909 cifsConvertToUCS((__le16 *) pSMB->fileName, fileName,
910 PATH_MAX, nls_codepage, remap);
911 name_len++; /* trailing null */
913 } else { /* BB improve check for buffer overruns BB */
914 name_len = strnlen(fileName, PATH_MAX);
915 name_len++; /* trailing null */
916 strncpy(pSMB->fileName, fileName, name_len);
918 pSMB->SearchAttributes =
919 cpu_to_le16(ATTR_READONLY | ATTR_HIDDEN | ATTR_SYSTEM);
920 pSMB->BufferFormat = 0x04;
921 pSMB->hdr.smb_buf_length += name_len + 1;
922 pSMB->ByteCount = cpu_to_le16(name_len + 1);
923 rc = SendReceive(xid, tcon->ses, (struct smb_hdr *) pSMB,
924 (struct smb_hdr *) pSMBr, &bytes_returned, 0);
925 cifs_stats_inc(&tcon->num_deletes);
927 cFYI(1, ("Error in RMFile = %d", rc));
930 cifs_buf_release(pSMB);
938 CIFSSMBRmDir(const int xid, struct cifsTconInfo *tcon, const char *dirName,
939 const struct nls_table *nls_codepage, int remap)
941 DELETE_DIRECTORY_REQ *pSMB = NULL;
942 DELETE_DIRECTORY_RSP *pSMBr = NULL;
947 cFYI(1, ("In CIFSSMBRmDir"));
949 rc = smb_init(SMB_COM_DELETE_DIRECTORY, 0, tcon, (void **) &pSMB,
954 if (pSMB->hdr.Flags2 & SMBFLG2_UNICODE) {
955 name_len = cifsConvertToUCS((__le16 *) pSMB->DirName, dirName,
956 PATH_MAX, nls_codepage, remap);
957 name_len++; /* trailing null */
959 } else { /* BB improve check for buffer overruns BB */
960 name_len = strnlen(dirName, PATH_MAX);
961 name_len++; /* trailing null */
962 strncpy(pSMB->DirName, dirName, name_len);
965 pSMB->BufferFormat = 0x04;
966 pSMB->hdr.smb_buf_length += name_len + 1;
967 pSMB->ByteCount = cpu_to_le16(name_len + 1);
968 rc = SendReceive(xid, tcon->ses, (struct smb_hdr *) pSMB,
969 (struct smb_hdr *) pSMBr, &bytes_returned, 0);
970 cifs_stats_inc(&tcon->num_rmdirs);
972 cFYI(1, ("Error in RMDir = %d", rc));
975 cifs_buf_release(pSMB);
982 CIFSSMBMkDir(const int xid, struct cifsTconInfo *tcon,
983 const char *name, const struct nls_table *nls_codepage, int remap)
986 CREATE_DIRECTORY_REQ *pSMB = NULL;
987 CREATE_DIRECTORY_RSP *pSMBr = NULL;
991 cFYI(1, ("In CIFSSMBMkDir"));
993 rc = smb_init(SMB_COM_CREATE_DIRECTORY, 0, tcon, (void **) &pSMB,
998 if (pSMB->hdr.Flags2 & SMBFLG2_UNICODE) {
999 name_len = cifsConvertToUCS((__le16 *) pSMB->DirName, name,
1000 PATH_MAX, nls_codepage, remap);
1001 name_len++; /* trailing null */
1003 } else { /* BB improve check for buffer overruns BB */
1004 name_len = strnlen(name, PATH_MAX);
1005 name_len++; /* trailing null */
1006 strncpy(pSMB->DirName, name, name_len);
1009 pSMB->BufferFormat = 0x04;
1010 pSMB->hdr.smb_buf_length += name_len + 1;
1011 pSMB->ByteCount = cpu_to_le16(name_len + 1);
1012 rc = SendReceive(xid, tcon->ses, (struct smb_hdr *) pSMB,
1013 (struct smb_hdr *) pSMBr, &bytes_returned, 0);
1014 cifs_stats_inc(&tcon->num_mkdirs);
1016 cFYI(1, ("Error in Mkdir = %d", rc));
1019 cifs_buf_release(pSMB);
1026 CIFSPOSIXCreate(const int xid, struct cifsTconInfo *tcon, __u32 posix_flags,
1027 __u64 mode, __u16 * netfid, FILE_UNIX_BASIC_INFO *pRetData,
1028 __u32 *pOplock, const char *name,
1029 const struct nls_table *nls_codepage, int remap)
1031 TRANSACTION2_SPI_REQ *pSMB = NULL;
1032 TRANSACTION2_SPI_RSP *pSMBr = NULL;
1035 int bytes_returned = 0;
1036 __u16 params, param_offset, offset, byte_count, count;
1037 OPEN_PSX_REQ * pdata;
1038 OPEN_PSX_RSP * psx_rsp;
1040 cFYI(1, ("In POSIX Create"));
1042 rc = smb_init(SMB_COM_TRANSACTION2, 15, tcon, (void **) &pSMB,
1047 if (pSMB->hdr.Flags2 & SMBFLG2_UNICODE) {
1049 cifsConvertToUCS((__le16 *) pSMB->FileName, name,
1050 PATH_MAX, nls_codepage, remap);
1051 name_len++; /* trailing null */
1053 } else { /* BB improve the check for buffer overruns BB */
1054 name_len = strnlen(name, PATH_MAX);
1055 name_len++; /* trailing null */
1056 strncpy(pSMB->FileName, name, name_len);
1059 params = 6 + name_len;
1060 count = sizeof(OPEN_PSX_REQ);
1061 pSMB->MaxParameterCount = cpu_to_le16(2);
1062 pSMB->MaxDataCount = cpu_to_le16(1000); /* large enough */
1063 pSMB->MaxSetupCount = 0;
1067 pSMB->Reserved2 = 0;
1068 param_offset = offsetof(struct smb_com_transaction2_spi_req,
1069 InformationLevel) - 4;
1070 offset = param_offset + params;
1071 pdata = (OPEN_PSX_REQ *)(((char *)&pSMB->hdr.Protocol) + offset);
1072 pdata->Level = SMB_QUERY_FILE_UNIX_BASIC;
1073 pdata->Permissions = cpu_to_le64(mode);
1074 pdata->PosixOpenFlags = cpu_to_le32(posix_flags);
1075 pdata->OpenFlags = cpu_to_le32(*pOplock);
1076 pSMB->ParameterOffset = cpu_to_le16(param_offset);
1077 pSMB->DataOffset = cpu_to_le16(offset);
1078 pSMB->SetupCount = 1;
1079 pSMB->Reserved3 = 0;
1080 pSMB->SubCommand = cpu_to_le16(TRANS2_SET_PATH_INFORMATION);
1081 byte_count = 3 /* pad */ + params + count;
1083 pSMB->DataCount = cpu_to_le16(count);
1084 pSMB->ParameterCount = cpu_to_le16(params);
1085 pSMB->TotalDataCount = pSMB->DataCount;
1086 pSMB->TotalParameterCount = pSMB->ParameterCount;
1087 pSMB->InformationLevel = cpu_to_le16(SMB_POSIX_OPEN);
1088 pSMB->Reserved4 = 0;
1089 pSMB->hdr.smb_buf_length += byte_count;
1090 pSMB->ByteCount = cpu_to_le16(byte_count);
1091 rc = SendReceive(xid, tcon->ses, (struct smb_hdr *) pSMB,
1092 (struct smb_hdr *) pSMBr, &bytes_returned, 0);
1094 cFYI(1, ("Posix create returned %d", rc));
1095 goto psx_create_err;
1098 cFYI(1, ("copying inode info"));
1099 rc = validate_t2((struct smb_t2_rsp *)pSMBr);
1101 if (rc || (pSMBr->ByteCount < sizeof(OPEN_PSX_RSP))) {
1102 rc = -EIO; /* bad smb */
1103 goto psx_create_err;
1106 /* copy return information to pRetData */
1107 psx_rsp = (OPEN_PSX_RSP *)((char *) &pSMBr->hdr.Protocol
1108 + le16_to_cpu(pSMBr->t2.DataOffset));
1110 *pOplock = le16_to_cpu(psx_rsp->OplockFlags);
1112 *netfid = psx_rsp->Fid; /* cifs fid stays in le */
1113 /* Let caller know file was created so we can set the mode. */
1114 /* Do we care about the CreateAction in any other cases? */
1115 if (cpu_to_le32(FILE_CREATE) == psx_rsp->CreateAction)
1116 *pOplock |= CIFS_CREATE_ACTION;
1117 /* check to make sure response data is there */
1118 if (psx_rsp->ReturnedLevel != SMB_QUERY_FILE_UNIX_BASIC) {
1119 pRetData->Type = -1; /* unknown */
1120 #ifdef CONFIG_CIFS_DEBUG2
1121 cFYI(1, ("unknown type"));
1124 if (pSMBr->ByteCount < sizeof(OPEN_PSX_RSP)
1125 + sizeof(FILE_UNIX_BASIC_INFO)) {
1126 cERROR(1, ("Open response data too small"));
1127 pRetData->Type = -1;
1128 goto psx_create_err;
1130 memcpy((char *) pRetData,
1131 (char *)psx_rsp + sizeof(OPEN_PSX_RSP),
1132 sizeof(FILE_UNIX_BASIC_INFO));
1136 cifs_buf_release(pSMB);
1138 cifs_stats_inc(&tcon->num_mkdirs);
1146 static __u16 convert_disposition(int disposition)
1150 switch (disposition) {
1151 case FILE_SUPERSEDE:
1152 ofun = SMBOPEN_OCREATE | SMBOPEN_OTRUNC;
1155 ofun = SMBOPEN_OAPPEND;
1158 ofun = SMBOPEN_OCREATE;
1161 ofun = SMBOPEN_OCREATE | SMBOPEN_OAPPEND;
1163 case FILE_OVERWRITE:
1164 ofun = SMBOPEN_OTRUNC;
1166 case FILE_OVERWRITE_IF:
1167 ofun = SMBOPEN_OCREATE | SMBOPEN_OTRUNC;
1170 cFYI(1, ("unknown disposition %d", disposition));
1171 ofun = SMBOPEN_OAPPEND; /* regular open */
1177 SMBLegacyOpen(const int xid, struct cifsTconInfo *tcon,
1178 const char *fileName, const int openDisposition,
1179 const int access_flags, const int create_options, __u16 * netfid,
1180 int *pOplock, FILE_ALL_INFO * pfile_info,
1181 const struct nls_table *nls_codepage, int remap)
1184 OPENX_REQ *pSMB = NULL;
1185 OPENX_RSP *pSMBr = NULL;
1191 rc = smb_init(SMB_COM_OPEN_ANDX, 15, tcon, (void **) &pSMB,
1196 pSMB->AndXCommand = 0xFF; /* none */
1198 if (pSMB->hdr.Flags2 & SMBFLG2_UNICODE) {
1199 count = 1; /* account for one byte pad to word boundary */
1201 cifsConvertToUCS((__le16 *) (pSMB->fileName + 1),
1202 fileName, PATH_MAX, nls_codepage, remap);
1203 name_len++; /* trailing null */
1205 } else { /* BB improve check for buffer overruns BB */
1206 count = 0; /* no pad */
1207 name_len = strnlen(fileName, PATH_MAX);
1208 name_len++; /* trailing null */
1209 strncpy(pSMB->fileName, fileName, name_len);
1211 if (*pOplock & REQ_OPLOCK)
1212 pSMB->OpenFlags = cpu_to_le16(REQ_OPLOCK);
1213 else if (*pOplock & REQ_BATCHOPLOCK)
1214 pSMB->OpenFlags = cpu_to_le16(REQ_BATCHOPLOCK);
1216 pSMB->OpenFlags |= cpu_to_le16(REQ_MORE_INFO);
1217 /* BB fixme add conversion for access_flags to bits 0 - 2 of mode */
1223 pSMB->Mode = cpu_to_le16(2);
1224 pSMB->Mode |= cpu_to_le16(0x40); /* deny none */
1225 /* set file as system file if special file such
1226 as fifo and server expecting SFU style and
1227 no Unix extensions */
1229 if (create_options & CREATE_OPTION_SPECIAL)
1230 pSMB->FileAttributes = cpu_to_le16(ATTR_SYSTEM);
1232 pSMB->FileAttributes = cpu_to_le16(0/*ATTR_NORMAL*/); /* BB FIXME */
1234 /* if ((omode & S_IWUGO) == 0)
1235 pSMB->FileAttributes |= cpu_to_le32(ATTR_READONLY);*/
1236 /* Above line causes problems due to vfs splitting create into two
1237 pieces - need to set mode after file created not while it is
1241 /* pSMB->CreateOptions = cpu_to_le32(create_options &
1242 CREATE_OPTIONS_MASK); */
1243 /* BB FIXME END BB */
1245 pSMB->Sattr = cpu_to_le16(ATTR_HIDDEN | ATTR_SYSTEM | ATTR_DIRECTORY);
1246 pSMB->OpenFunction = cpu_to_le16(convert_disposition(openDisposition));
1248 pSMB->hdr.smb_buf_length += count;
1250 pSMB->ByteCount = cpu_to_le16(count);
1251 /* long_op set to 1 to allow for oplock break timeouts */
1252 rc = SendReceive(xid, tcon->ses, (struct smb_hdr *) pSMB,
1253 (struct smb_hdr *) pSMBr, &bytes_returned, 1);
1254 cifs_stats_inc(&tcon->num_opens);
1256 cFYI(1, ("Error in Open = %d", rc));
1258 /* BB verify if wct == 15 */
1260 /* *pOplock = pSMBr->OplockLevel; */ /* BB take from action field BB */
1262 *netfid = pSMBr->Fid; /* cifs fid stays in le */
1263 /* Let caller know file was created so we can set the mode. */
1264 /* Do we care about the CreateAction in any other cases? */
1266 /* if (cpu_to_le32(FILE_CREATE) == pSMBr->CreateAction)
1267 *pOplock |= CIFS_CREATE_ACTION; */
1271 pfile_info->CreationTime = 0; /* BB convert CreateTime*/
1272 pfile_info->LastAccessTime = 0; /* BB fixme */
1273 pfile_info->LastWriteTime = 0; /* BB fixme */
1274 pfile_info->ChangeTime = 0; /* BB fixme */
1275 pfile_info->Attributes =
1276 cpu_to_le32(le16_to_cpu(pSMBr->FileAttributes));
1277 /* the file_info buf is endian converted by caller */
1278 pfile_info->AllocationSize =
1279 cpu_to_le64(le32_to_cpu(pSMBr->EndOfFile));
1280 pfile_info->EndOfFile = pfile_info->AllocationSize;
1281 pfile_info->NumberOfLinks = cpu_to_le32(1);
1285 cifs_buf_release(pSMB);
1292 CIFSSMBOpen(const int xid, struct cifsTconInfo *tcon,
1293 const char *fileName, const int openDisposition,
1294 const int access_flags, const int create_options, __u16 * netfid,
1295 int *pOplock, FILE_ALL_INFO * pfile_info,
1296 const struct nls_table *nls_codepage, int remap)
1299 OPEN_REQ *pSMB = NULL;
1300 OPEN_RSP *pSMBr = NULL;
1306 rc = smb_init(SMB_COM_NT_CREATE_ANDX, 24, tcon, (void **) &pSMB,
1311 pSMB->AndXCommand = 0xFF; /* none */
1313 if (pSMB->hdr.Flags2 & SMBFLG2_UNICODE) {
1314 count = 1; /* account for one byte pad to word boundary */
1316 cifsConvertToUCS((__le16 *) (pSMB->fileName + 1),
1317 fileName, PATH_MAX, nls_codepage, remap);
1318 name_len++; /* trailing null */
1320 pSMB->NameLength = cpu_to_le16(name_len);
1321 } else { /* BB improve check for buffer overruns BB */
1322 count = 0; /* no pad */
1323 name_len = strnlen(fileName, PATH_MAX);
1324 name_len++; /* trailing null */
1325 pSMB->NameLength = cpu_to_le16(name_len);
1326 strncpy(pSMB->fileName, fileName, name_len);
1328 if (*pOplock & REQ_OPLOCK)
1329 pSMB->OpenFlags = cpu_to_le32(REQ_OPLOCK);
1330 else if (*pOplock & REQ_BATCHOPLOCK)
1331 pSMB->OpenFlags = cpu_to_le32(REQ_BATCHOPLOCK);
1332 pSMB->DesiredAccess = cpu_to_le32(access_flags);
1333 pSMB->AllocationSize = 0;
1334 /* set file as system file if special file such
1335 as fifo and server expecting SFU style and
1336 no Unix extensions */
1337 if (create_options & CREATE_OPTION_SPECIAL)
1338 pSMB->FileAttributes = cpu_to_le32(ATTR_SYSTEM);
1340 pSMB->FileAttributes = cpu_to_le32(ATTR_NORMAL);
1341 /* XP does not handle ATTR_POSIX_SEMANTICS */
1342 /* but it helps speed up case sensitive checks for other
1343 servers such as Samba */
1344 if (tcon->ses->capabilities & CAP_UNIX)
1345 pSMB->FileAttributes |= cpu_to_le32(ATTR_POSIX_SEMANTICS);
1347 /* if ((omode & S_IWUGO) == 0)
1348 pSMB->FileAttributes |= cpu_to_le32(ATTR_READONLY);*/
1349 /* Above line causes problems due to vfs splitting create into two
1350 pieces - need to set mode after file created not while it is
1352 pSMB->ShareAccess = cpu_to_le32(FILE_SHARE_ALL);
1353 pSMB->CreateDisposition = cpu_to_le32(openDisposition);
1354 pSMB->CreateOptions = cpu_to_le32(create_options & CREATE_OPTIONS_MASK);
1355 /* BB Expirement with various impersonation levels and verify */
1356 pSMB->ImpersonationLevel = cpu_to_le32(SECURITY_IMPERSONATION);
1357 pSMB->SecurityFlags =
1358 SECURITY_CONTEXT_TRACKING | SECURITY_EFFECTIVE_ONLY;
1361 pSMB->hdr.smb_buf_length += count;
1363 pSMB->ByteCount = cpu_to_le16(count);
1364 /* long_op set to 1 to allow for oplock break timeouts */
1365 rc = SendReceive(xid, tcon->ses, (struct smb_hdr *) pSMB,
1366 (struct smb_hdr *) pSMBr, &bytes_returned, 1);
1367 cifs_stats_inc(&tcon->num_opens);
1369 cFYI(1, ("Error in Open = %d", rc));
1371 *pOplock = pSMBr->OplockLevel; /* 1 byte no need to le_to_cpu */
1372 *netfid = pSMBr->Fid; /* cifs fid stays in le */
1373 /* Let caller know file was created so we can set the mode. */
1374 /* Do we care about the CreateAction in any other cases? */
1375 if (cpu_to_le32(FILE_CREATE) == pSMBr->CreateAction)
1376 *pOplock |= CIFS_CREATE_ACTION;
1378 memcpy((char *)pfile_info, (char *)&pSMBr->CreationTime,
1379 36 /* CreationTime to Attributes */);
1380 /* the file_info buf is endian converted by caller */
1381 pfile_info->AllocationSize = pSMBr->AllocationSize;
1382 pfile_info->EndOfFile = pSMBr->EndOfFile;
1383 pfile_info->NumberOfLinks = cpu_to_le32(1);
1387 cifs_buf_release(pSMB);
1394 CIFSSMBRead(const int xid, struct cifsTconInfo *tcon, const int netfid,
1395 const unsigned int count, const __u64 lseek, unsigned int *nbytes,
1396 char **buf, int *pbuf_type)
1399 READ_REQ *pSMB = NULL;
1400 READ_RSP *pSMBr = NULL;
1401 char *pReadData = NULL;
1403 int resp_buf_type = 0;
1406 cFYI(1, ("Reading %d bytes on fid %d", count, netfid));
1407 if (tcon->ses->capabilities & CAP_LARGE_FILES)
1410 wct = 10; /* old style read */
1413 rc = small_smb_init(SMB_COM_READ_ANDX, wct, tcon, (void **) &pSMB);
1417 /* tcon and ses pointer are checked in smb_init */
1418 if (tcon->ses->server == NULL)
1419 return -ECONNABORTED;
1421 pSMB->AndXCommand = 0xFF; /* none */
1423 pSMB->OffsetLow = cpu_to_le32(lseek & 0xFFFFFFFF);
1425 pSMB->OffsetHigh = cpu_to_le32(lseek >> 32);
1426 else if ((lseek >> 32) > 0) /* can not handle this big offset for old */
1429 pSMB->Remaining = 0;
1430 pSMB->MaxCount = cpu_to_le16(count & 0xFFFF);
1431 pSMB->MaxCountHigh = cpu_to_le32(count >> 16);
1433 pSMB->ByteCount = 0; /* no need to do le conversion since 0 */
1435 /* old style read */
1436 struct smb_com_readx_req *pSMBW =
1437 (struct smb_com_readx_req *)pSMB;
1438 pSMBW->ByteCount = 0;
1441 iov[0].iov_base = (char *)pSMB;
1442 iov[0].iov_len = pSMB->hdr.smb_buf_length + 4;
1443 rc = SendReceive2(xid, tcon->ses, iov,
1446 cifs_stats_inc(&tcon->num_reads);
1447 pSMBr = (READ_RSP *)iov[0].iov_base;
1449 cERROR(1, ("Send error in read = %d", rc));
1451 int data_length = le16_to_cpu(pSMBr->DataLengthHigh);
1452 data_length = data_length << 16;
1453 data_length += le16_to_cpu(pSMBr->DataLength);
1454 *nbytes = data_length;
1456 /*check that DataLength would not go beyond end of SMB */
1457 if ((data_length > CIFSMaxBufSize)
1458 || (data_length > count)) {
1459 cFYI(1, ("bad length %d for count %d",
1460 data_length, count));
1464 pReadData = (char *) (&pSMBr->hdr.Protocol) +
1465 le16_to_cpu(pSMBr->DataOffset);
1466 /* if (rc = copy_to_user(buf, pReadData, data_length)) {
1467 cERROR(1,("Faulting on read rc = %d",rc));
1469 }*/ /* can not use copy_to_user when using page cache*/
1471 memcpy(*buf, pReadData, data_length);
1475 /* cifs_small_buf_release(pSMB); */ /* Freed earlier now in SendReceive2 */
1477 if (resp_buf_type == CIFS_SMALL_BUFFER)
1478 cifs_small_buf_release(iov[0].iov_base);
1479 else if (resp_buf_type == CIFS_LARGE_BUFFER)
1480 cifs_buf_release(iov[0].iov_base);
1481 } else if (resp_buf_type != CIFS_NO_BUFFER) {
1482 /* return buffer to caller to free */
1483 *buf = iov[0].iov_base;
1484 if (resp_buf_type == CIFS_SMALL_BUFFER)
1485 *pbuf_type = CIFS_SMALL_BUFFER;
1486 else if (resp_buf_type == CIFS_LARGE_BUFFER)
1487 *pbuf_type = CIFS_LARGE_BUFFER;
1488 } /* else no valid buffer on return - leave as null */
1490 /* Note: On -EAGAIN error only caller can retry on handle based calls
1491 since file handle passed in no longer valid */
1497 CIFSSMBWrite(const int xid, struct cifsTconInfo *tcon,
1498 const int netfid, const unsigned int count,
1499 const __u64 offset, unsigned int *nbytes, const char *buf,
1500 const char __user *ubuf, const int long_op)
1503 WRITE_REQ *pSMB = NULL;
1504 WRITE_RSP *pSMBr = NULL;
1505 int bytes_returned, wct;
1509 /* cFYI(1,("write at %lld %d bytes",offset,count));*/
1510 if (tcon->ses == NULL)
1511 return -ECONNABORTED;
1513 if (tcon->ses->capabilities & CAP_LARGE_FILES)
1518 rc = smb_init(SMB_COM_WRITE_ANDX, wct, tcon, (void **) &pSMB,
1522 /* tcon and ses pointer are checked in smb_init */
1523 if (tcon->ses->server == NULL)
1524 return -ECONNABORTED;
1526 pSMB->AndXCommand = 0xFF; /* none */
1528 pSMB->OffsetLow = cpu_to_le32(offset & 0xFFFFFFFF);
1530 pSMB->OffsetHigh = cpu_to_le32(offset >> 32);
1531 else if ((offset >> 32) > 0) /* can not handle big offset for old srv */
1534 pSMB->Reserved = 0xFFFFFFFF;
1535 pSMB->WriteMode = 0;
1536 pSMB->Remaining = 0;
1538 /* Can increase buffer size if buffer is big enough in some cases ie we
1539 can send more if LARGE_WRITE_X capability returned by the server and if
1540 our buffer is big enough or if we convert to iovecs on socket writes
1541 and eliminate the copy to the CIFS buffer */
1542 if (tcon->ses->capabilities & CAP_LARGE_WRITE_X) {
1543 bytes_sent = min_t(const unsigned int, CIFSMaxBufSize, count);
1545 bytes_sent = (tcon->ses->server->maxBuf - MAX_CIFS_HDR_SIZE)
1549 if (bytes_sent > count)
1552 cpu_to_le16(offsetof(struct smb_com_write_req, Data) - 4);
1554 memcpy(pSMB->Data, buf, bytes_sent);
1556 if (copy_from_user(pSMB->Data, ubuf, bytes_sent)) {
1557 cifs_buf_release(pSMB);
1560 } else if (count != 0) {
1562 cifs_buf_release(pSMB);
1564 } /* else setting file size with write of zero bytes */
1566 byte_count = bytes_sent + 1; /* pad */
1567 else /* wct == 12 */ {
1568 byte_count = bytes_sent + 5; /* bigger pad, smaller smb hdr */
1570 pSMB->DataLengthLow = cpu_to_le16(bytes_sent & 0xFFFF);
1571 pSMB->DataLengthHigh = cpu_to_le16(bytes_sent >> 16);
1572 pSMB->hdr.smb_buf_length += byte_count;
1575 pSMB->ByteCount = cpu_to_le16(byte_count);
1576 else { /* old style write has byte count 4 bytes earlier
1578 struct smb_com_writex_req *pSMBW =
1579 (struct smb_com_writex_req *)pSMB;
1580 pSMBW->ByteCount = cpu_to_le16(byte_count);
1583 rc = SendReceive(xid, tcon->ses, (struct smb_hdr *) pSMB,
1584 (struct smb_hdr *) pSMBr, &bytes_returned, long_op);
1585 cifs_stats_inc(&tcon->num_writes);
1587 cFYI(1, ("Send error in write = %d", rc));
1590 *nbytes = le16_to_cpu(pSMBr->CountHigh);
1591 *nbytes = (*nbytes) << 16;
1592 *nbytes += le16_to_cpu(pSMBr->Count);
1595 cifs_buf_release(pSMB);
1597 /* Note: On -EAGAIN error only caller can retry on handle based calls
1598 since file handle passed in no longer valid */
1604 CIFSSMBWrite2(const int xid, struct cifsTconInfo *tcon,
1605 const int netfid, const unsigned int count,
1606 const __u64 offset, unsigned int *nbytes, struct kvec *iov,
1607 int n_vec, const int long_op)
1610 WRITE_REQ *pSMB = NULL;
1613 int resp_buf_type = 0;
1615 cFYI(1, ("write2 at %lld %d bytes", (long long)offset, count));
1617 if (tcon->ses->capabilities & CAP_LARGE_FILES)
1621 rc = small_smb_init(SMB_COM_WRITE_ANDX, wct, tcon, (void **) &pSMB);
1624 /* tcon and ses pointer are checked in smb_init */
1625 if (tcon->ses->server == NULL)
1626 return -ECONNABORTED;
1628 pSMB->AndXCommand = 0xFF; /* none */
1630 pSMB->OffsetLow = cpu_to_le32(offset & 0xFFFFFFFF);
1632 pSMB->OffsetHigh = cpu_to_le32(offset >> 32);
1633 else if ((offset >> 32) > 0) /* can not handle big offset for old srv */
1635 pSMB->Reserved = 0xFFFFFFFF;
1636 pSMB->WriteMode = 0;
1637 pSMB->Remaining = 0;
1640 cpu_to_le16(offsetof(struct smb_com_write_req, Data) - 4);
1642 pSMB->DataLengthLow = cpu_to_le16(count & 0xFFFF);
1643 pSMB->DataLengthHigh = cpu_to_le16(count >> 16);
1644 smb_hdr_len = pSMB->hdr.smb_buf_length + 1; /* hdr + 1 byte pad */
1646 pSMB->hdr.smb_buf_length += count+1;
1647 else /* wct == 12 */
1648 pSMB->hdr.smb_buf_length += count+5; /* smb data starts later */
1650 pSMB->ByteCount = cpu_to_le16(count + 1);
1651 else /* wct == 12 */ /* bigger pad, smaller smb hdr, keep offset ok */ {
1652 struct smb_com_writex_req *pSMBW =
1653 (struct smb_com_writex_req *)pSMB;
1654 pSMBW->ByteCount = cpu_to_le16(count + 5);
1656 iov[0].iov_base = pSMB;
1658 iov[0].iov_len = smb_hdr_len + 4;
1659 else /* wct == 12 pad bigger by four bytes */
1660 iov[0].iov_len = smb_hdr_len + 8;
1663 rc = SendReceive2(xid, tcon->ses, iov, n_vec + 1, &resp_buf_type,
1665 cifs_stats_inc(&tcon->num_writes);
1667 cFYI(1, ("Send error Write2 = %d", rc));
1669 } else if (resp_buf_type == 0) {
1670 /* presumably this can not happen, but best to be safe */
1674 WRITE_RSP * pSMBr = (WRITE_RSP *)iov[0].iov_base;
1675 *nbytes = le16_to_cpu(pSMBr->CountHigh);
1676 *nbytes = (*nbytes) << 16;
1677 *nbytes += le16_to_cpu(pSMBr->Count);
1680 /* cifs_small_buf_release(pSMB); */ /* Freed earlier now in SendReceive2 */
1681 if (resp_buf_type == CIFS_SMALL_BUFFER)
1682 cifs_small_buf_release(iov[0].iov_base);
1683 else if (resp_buf_type == CIFS_LARGE_BUFFER)
1684 cifs_buf_release(iov[0].iov_base);
1686 /* Note: On -EAGAIN error only caller can retry on handle based calls
1687 since file handle passed in no longer valid */
1694 CIFSSMBLock(const int xid, struct cifsTconInfo *tcon,
1695 const __u16 smb_file_id, const __u64 len,
1696 const __u64 offset, const __u32 numUnlock,
1697 const __u32 numLock, const __u8 lockType, const int waitFlag)
1700 LOCK_REQ *pSMB = NULL;
1701 LOCK_RSP *pSMBr = NULL;
1706 cFYI(1, ("In CIFSSMBLock - timeout %d numLock %d", waitFlag, numLock));
1707 rc = small_smb_init(SMB_COM_LOCKING_ANDX, 8, tcon, (void **) &pSMB);
1712 pSMBr = (LOCK_RSP *)pSMB; /* BB removeme BB */
1714 if (lockType == LOCKING_ANDX_OPLOCK_RELEASE) {
1715 timeout = -1; /* no response expected */
1717 } else if (waitFlag == TRUE) {
1718 timeout = 3; /* blocking operation, no timeout */
1719 pSMB->Timeout = cpu_to_le32(-1);/* blocking - do not time out */
1724 pSMB->NumberOfLocks = cpu_to_le16(numLock);
1725 pSMB->NumberOfUnlocks = cpu_to_le16(numUnlock);
1726 pSMB->LockType = lockType;
1727 pSMB->AndXCommand = 0xFF; /* none */
1728 pSMB->Fid = smb_file_id; /* netfid stays le */
1730 if ((numLock != 0) || (numUnlock != 0)) {
1731 pSMB->Locks[0].Pid = cpu_to_le16(current->tgid);
1732 /* BB where to store pid high? */
1733 pSMB->Locks[0].LengthLow = cpu_to_le32((u32)len);
1734 pSMB->Locks[0].LengthHigh = cpu_to_le32((u32)(len>>32));
1735 pSMB->Locks[0].OffsetLow = cpu_to_le32((u32)offset);
1736 pSMB->Locks[0].OffsetHigh = cpu_to_le32((u32)(offset>>32));
1737 count = sizeof(LOCKING_ANDX_RANGE);
1742 pSMB->hdr.smb_buf_length += count;
1743 pSMB->ByteCount = cpu_to_le16(count);
1746 rc = SendReceiveBlockingLock(xid, tcon, (struct smb_hdr *) pSMB,
1747 (struct smb_hdr *) pSMBr, &bytes_returned);
1749 rc = SendReceive(xid, tcon->ses, (struct smb_hdr *) pSMB,
1750 (struct smb_hdr *) pSMBr, &bytes_returned, timeout);
1752 cifs_stats_inc(&tcon->num_locks);
1754 cFYI(1, ("Send error in Lock = %d", rc));
1756 cifs_small_buf_release(pSMB);
1758 /* Note: On -EAGAIN error only caller can retry on handle based calls
1759 since file handle passed in no longer valid */
1764 CIFSSMBPosixLock(const int xid, struct cifsTconInfo *tcon,
1765 const __u16 smb_file_id, const int get_flag, const __u64 len,
1766 struct file_lock *pLockData, const __u16 lock_type,
1769 struct smb_com_transaction2_sfi_req *pSMB = NULL;
1770 struct smb_com_transaction2_sfi_rsp *pSMBr = NULL;
1771 struct cifs_posix_lock *parm_data;
1774 int bytes_returned = 0;
1775 __u16 params, param_offset, offset, byte_count, count;
1777 cFYI(1, ("Posix Lock"));
1779 if (pLockData == NULL)
1782 rc = small_smb_init(SMB_COM_TRANSACTION2, 15, tcon, (void **) &pSMB);
1787 pSMBr = (struct smb_com_transaction2_sfi_rsp *)pSMB;
1790 pSMB->MaxSetupCount = 0;
1793 pSMB->Reserved2 = 0;
1794 param_offset = offsetof(struct smb_com_transaction2_sfi_req, Fid) - 4;
1795 offset = param_offset + params;
1797 count = sizeof(struct cifs_posix_lock);
1798 pSMB->MaxParameterCount = cpu_to_le16(2);
1799 pSMB->MaxDataCount = cpu_to_le16(1000); /* BB find max SMB PDU from sess */
1800 pSMB->SetupCount = 1;
1801 pSMB->Reserved3 = 0;
1803 pSMB->SubCommand = cpu_to_le16(TRANS2_QUERY_FILE_INFORMATION);
1805 pSMB->SubCommand = cpu_to_le16(TRANS2_SET_FILE_INFORMATION);
1806 byte_count = 3 /* pad */ + params + count;
1807 pSMB->DataCount = cpu_to_le16(count);
1808 pSMB->ParameterCount = cpu_to_le16(params);
1809 pSMB->TotalDataCount = pSMB->DataCount;
1810 pSMB->TotalParameterCount = pSMB->ParameterCount;
1811 pSMB->ParameterOffset = cpu_to_le16(param_offset);
1812 parm_data = (struct cifs_posix_lock *)
1813 (((char *) &pSMB->hdr.Protocol) + offset);
1815 parm_data->lock_type = cpu_to_le16(lock_type);
1817 timeout = 3; /* blocking operation, no timeout */
1818 parm_data->lock_flags = cpu_to_le16(1);
1819 pSMB->Timeout = cpu_to_le32(-1);
1823 parm_data->pid = cpu_to_le32(current->tgid);
1824 parm_data->start = cpu_to_le64(pLockData->fl_start);
1825 parm_data->length = cpu_to_le64(len); /* normalize negative numbers */
1827 pSMB->DataOffset = cpu_to_le16(offset);
1828 pSMB->Fid = smb_file_id;
1829 pSMB->InformationLevel = cpu_to_le16(SMB_SET_POSIX_LOCK);
1830 pSMB->Reserved4 = 0;
1831 pSMB->hdr.smb_buf_length += byte_count;
1832 pSMB->ByteCount = cpu_to_le16(byte_count);
1834 rc = SendReceiveBlockingLock(xid, tcon, (struct smb_hdr *) pSMB,
1835 (struct smb_hdr *) pSMBr, &bytes_returned);
1837 rc = SendReceive(xid, tcon->ses, (struct smb_hdr *) pSMB,
1838 (struct smb_hdr *) pSMBr, &bytes_returned, timeout);
1842 cFYI(1, ("Send error in Posix Lock = %d", rc));
1843 } else if (get_flag) {
1844 /* lock structure can be returned on get */
1847 rc = validate_t2((struct smb_t2_rsp *)pSMBr);
1849 if (rc || (pSMBr->ByteCount < sizeof(struct cifs_posix_lock))) {
1850 rc = -EIO; /* bad smb */
1853 if (pLockData == NULL) {
1857 data_offset = le16_to_cpu(pSMBr->t2.DataOffset);
1858 data_count = le16_to_cpu(pSMBr->t2.DataCount);
1859 if (data_count < sizeof(struct cifs_posix_lock)) {
1863 parm_data = (struct cifs_posix_lock *)
1864 ((char *)&pSMBr->hdr.Protocol + data_offset);
1865 if (parm_data->lock_type == cpu_to_le16(CIFS_UNLCK))
1866 pLockData->fl_type = F_UNLCK;
1871 cifs_small_buf_release(pSMB);
1873 /* Note: On -EAGAIN error only caller can retry on handle based calls
1874 since file handle passed in no longer valid */
1881 CIFSSMBClose(const int xid, struct cifsTconInfo *tcon, int smb_file_id)
1884 CLOSE_REQ *pSMB = NULL;
1885 CLOSE_RSP *pSMBr = NULL;
1887 cFYI(1, ("In CIFSSMBClose"));
1889 /* do not retry on dead session on close */
1890 rc = small_smb_init(SMB_COM_CLOSE, 3, tcon, (void **) &pSMB);
1896 pSMBr = (CLOSE_RSP *)pSMB; /* BB removeme BB */
1898 pSMB->FileID = (__u16) smb_file_id;
1899 pSMB->LastWriteTime = 0xFFFFFFFF;
1900 pSMB->ByteCount = 0;
1901 rc = SendReceive(xid, tcon->ses, (struct smb_hdr *) pSMB,
1902 (struct smb_hdr *) pSMBr, &bytes_returned, 0);
1903 cifs_stats_inc(&tcon->num_closes);
1906 /* EINTR is expected when user ctl-c to kill app */
1907 cERROR(1, ("Send error in Close = %d", rc));
1911 cifs_small_buf_release(pSMB);
1913 /* Since session is dead, file will be closed on server already */
1921 CIFSSMBRename(const int xid, struct cifsTconInfo *tcon,
1922 const char *fromName, const char *toName,
1923 const struct nls_table *nls_codepage, int remap)
1926 RENAME_REQ *pSMB = NULL;
1927 RENAME_RSP *pSMBr = NULL;
1929 int name_len, name_len2;
1932 cFYI(1, ("In CIFSSMBRename"));
1934 rc = smb_init(SMB_COM_RENAME, 1, tcon, (void **) &pSMB,
1939 pSMB->BufferFormat = 0x04;
1940 pSMB->SearchAttributes =
1941 cpu_to_le16(ATTR_READONLY | ATTR_HIDDEN | ATTR_SYSTEM |
1944 if (pSMB->hdr.Flags2 & SMBFLG2_UNICODE) {
1946 cifsConvertToUCS((__le16 *) pSMB->OldFileName, fromName,
1947 PATH_MAX, nls_codepage, remap);
1948 name_len++; /* trailing null */
1950 pSMB->OldFileName[name_len] = 0x04; /* pad */
1951 /* protocol requires ASCII signature byte on Unicode string */
1952 pSMB->OldFileName[name_len + 1] = 0x00;
1954 cifsConvertToUCS((__le16 *) &pSMB->OldFileName[name_len + 2],
1955 toName, PATH_MAX, nls_codepage, remap);
1956 name_len2 += 1 /* trailing null */ + 1 /* Signature word */ ;
1957 name_len2 *= 2; /* convert to bytes */
1958 } else { /* BB improve the check for buffer overruns BB */
1959 name_len = strnlen(fromName, PATH_MAX);
1960 name_len++; /* trailing null */
1961 strncpy(pSMB->OldFileName, fromName, name_len);
1962 name_len2 = strnlen(toName, PATH_MAX);
1963 name_len2++; /* trailing null */
1964 pSMB->OldFileName[name_len] = 0x04; /* 2nd buffer format */
1965 strncpy(&pSMB->OldFileName[name_len + 1], toName, name_len2);
1966 name_len2++; /* trailing null */
1967 name_len2++; /* signature byte */
1970 count = 1 /* 1st signature byte */ + name_len + name_len2;
1971 pSMB->hdr.smb_buf_length += count;
1972 pSMB->ByteCount = cpu_to_le16(count);
1974 rc = SendReceive(xid, tcon->ses, (struct smb_hdr *) pSMB,
1975 (struct smb_hdr *) pSMBr, &bytes_returned, 0);
1976 cifs_stats_inc(&tcon->num_renames);
1978 cFYI(1, ("Send error in rename = %d", rc));
1981 cifs_buf_release(pSMB);
1989 int CIFSSMBRenameOpenFile(const int xid, struct cifsTconInfo *pTcon,
1990 int netfid, char *target_name,
1991 const struct nls_table *nls_codepage, int remap)
1993 struct smb_com_transaction2_sfi_req *pSMB = NULL;
1994 struct smb_com_transaction2_sfi_rsp *pSMBr = NULL;
1995 struct set_file_rename *rename_info;
1997 char dummy_string[30];
1999 int bytes_returned = 0;
2001 __u16 params, param_offset, offset, count, byte_count;
2003 cFYI(1, ("Rename to File by handle"));
2004 rc = smb_init(SMB_COM_TRANSACTION2, 15, pTcon, (void **) &pSMB,
2010 pSMB->MaxSetupCount = 0;
2014 pSMB->Reserved2 = 0;
2015 param_offset = offsetof(struct smb_com_transaction2_sfi_req, Fid) - 4;
2016 offset = param_offset + params;
2018 data_offset = (char *) (&pSMB->hdr.Protocol) + offset;
2019 rename_info = (struct set_file_rename *) data_offset;
2020 pSMB->MaxParameterCount = cpu_to_le16(2);
2021 pSMB->MaxDataCount = cpu_to_le16(1000); /* BB find max SMB PDU from sess */
2022 pSMB->SetupCount = 1;
2023 pSMB->Reserved3 = 0;
2024 pSMB->SubCommand = cpu_to_le16(TRANS2_SET_FILE_INFORMATION);
2025 byte_count = 3 /* pad */ + params;
2026 pSMB->ParameterCount = cpu_to_le16(params);
2027 pSMB->TotalParameterCount = pSMB->ParameterCount;
2028 pSMB->ParameterOffset = cpu_to_le16(param_offset);
2029 pSMB->DataOffset = cpu_to_le16(offset);
2030 /* construct random name ".cifs_tmp<inodenum><mid>" */
2031 rename_info->overwrite = cpu_to_le32(1);
2032 rename_info->root_fid = 0;
2033 /* unicode only call */
2034 if (target_name == NULL) {
2035 sprintf(dummy_string, "cifs%x", pSMB->hdr.Mid);
2036 len_of_str = cifsConvertToUCS((__le16 *)rename_info->target_name,
2037 dummy_string, 24, nls_codepage, remap);
2039 len_of_str = cifsConvertToUCS((__le16 *)rename_info->target_name,
2040 target_name, PATH_MAX, nls_codepage,
2043 rename_info->target_name_len = cpu_to_le32(2 * len_of_str);
2044 count = 12 /* sizeof(struct set_file_rename) */ + (2 * len_of_str) + 2;
2045 byte_count += count;
2046 pSMB->DataCount = cpu_to_le16(count);
2047 pSMB->TotalDataCount = pSMB->DataCount;
2049 pSMB->InformationLevel =
2050 cpu_to_le16(SMB_SET_FILE_RENAME_INFORMATION);
2051 pSMB->Reserved4 = 0;
2052 pSMB->hdr.smb_buf_length += byte_count;
2053 pSMB->ByteCount = cpu_to_le16(byte_count);
2054 rc = SendReceive(xid, pTcon->ses, (struct smb_hdr *) pSMB,
2055 (struct smb_hdr *) pSMBr, &bytes_returned, 0);
2056 cifs_stats_inc(&pTcon->num_t2renames);
2058 cFYI(1, ("Send error in Rename (by file handle) = %d", rc));
2061 cifs_buf_release(pSMB);
2063 /* Note: On -EAGAIN error only caller can retry on handle based calls
2064 since file handle passed in no longer valid */
2070 CIFSSMBCopy(const int xid, struct cifsTconInfo *tcon, const char *fromName,
2071 const __u16 target_tid, const char *toName, const int flags,
2072 const struct nls_table *nls_codepage, int remap)
2075 COPY_REQ *pSMB = NULL;
2076 COPY_RSP *pSMBr = NULL;
2078 int name_len, name_len2;
2081 cFYI(1, ("In CIFSSMBCopy"));
2083 rc = smb_init(SMB_COM_COPY, 1, tcon, (void **) &pSMB,
2088 pSMB->BufferFormat = 0x04;
2089 pSMB->Tid2 = target_tid;
2091 pSMB->Flags = cpu_to_le16(flags & COPY_TREE);
2093 if (pSMB->hdr.Flags2 & SMBFLG2_UNICODE) {
2094 name_len = cifsConvertToUCS((__le16 *) pSMB->OldFileName,
2095 fromName, PATH_MAX, nls_codepage,
2097 name_len++; /* trailing null */
2099 pSMB->OldFileName[name_len] = 0x04; /* pad */
2100 /* protocol requires ASCII signature byte on Unicode string */
2101 pSMB->OldFileName[name_len + 1] = 0x00;
2103 cifsConvertToUCS((__le16 *)&pSMB->OldFileName[name_len + 2],
2104 toName, PATH_MAX, nls_codepage, remap);
2105 name_len2 += 1 /* trailing null */ + 1 /* Signature word */ ;
2106 name_len2 *= 2; /* convert to bytes */
2107 } else { /* BB improve the check for buffer overruns BB */
2108 name_len = strnlen(fromName, PATH_MAX);
2109 name_len++; /* trailing null */
2110 strncpy(pSMB->OldFileName, fromName, name_len);
2111 name_len2 = strnlen(toName, PATH_MAX);
2112 name_len2++; /* trailing null */
2113 pSMB->OldFileName[name_len] = 0x04; /* 2nd buffer format */
2114 strncpy(&pSMB->OldFileName[name_len + 1], toName, name_len2);
2115 name_len2++; /* trailing null */
2116 name_len2++; /* signature byte */
2119 count = 1 /* 1st signature byte */ + name_len + name_len2;
2120 pSMB->hdr.smb_buf_length += count;
2121 pSMB->ByteCount = cpu_to_le16(count);
2123 rc = SendReceive(xid, tcon->ses, (struct smb_hdr *) pSMB,
2124 (struct smb_hdr *) pSMBr, &bytes_returned, 0);
2126 cFYI(1, ("Send error in copy = %d with %d files copied",
2127 rc, le16_to_cpu(pSMBr->CopyCount)));
2130 cifs_buf_release(pSMB);
2139 CIFSUnixCreateSymLink(const int xid, struct cifsTconInfo *tcon,
2140 const char *fromName, const char *toName,
2141 const struct nls_table *nls_codepage)
2143 TRANSACTION2_SPI_REQ *pSMB = NULL;
2144 TRANSACTION2_SPI_RSP *pSMBr = NULL;
2147 int name_len_target;
2149 int bytes_returned = 0;
2150 __u16 params, param_offset, offset, byte_count;
2152 cFYI(1, ("In Symlink Unix style"));
2154 rc = smb_init(SMB_COM_TRANSACTION2, 15, tcon, (void **) &pSMB,
2159 if (pSMB->hdr.Flags2 & SMBFLG2_UNICODE) {
2161 cifs_strtoUCS((__le16 *) pSMB->FileName, fromName, PATH_MAX
2162 /* find define for this maxpathcomponent */
2164 name_len++; /* trailing null */
2167 } else { /* BB improve the check for buffer overruns BB */
2168 name_len = strnlen(fromName, PATH_MAX);
2169 name_len++; /* trailing null */
2170 strncpy(pSMB->FileName, fromName, name_len);
2172 params = 6 + name_len;
2173 pSMB->MaxSetupCount = 0;
2177 pSMB->Reserved2 = 0;
2178 param_offset = offsetof(struct smb_com_transaction2_spi_req,
2179 InformationLevel) - 4;
2180 offset = param_offset + params;
2182 data_offset = (char *) (&pSMB->hdr.Protocol) + offset;
2183 if (pSMB->hdr.Flags2 & SMBFLG2_UNICODE) {
2185 cifs_strtoUCS((__le16 *) data_offset, toName, PATH_MAX
2186 /* find define for this maxpathcomponent */
2188 name_len_target++; /* trailing null */
2189 name_len_target *= 2;
2190 } else { /* BB improve the check for buffer overruns BB */
2191 name_len_target = strnlen(toName, PATH_MAX);
2192 name_len_target++; /* trailing null */
2193 strncpy(data_offset, toName, name_len_target);
2196 pSMB->MaxParameterCount = cpu_to_le16(2);
2197 /* BB find exact max on data count below from sess */
2198 pSMB->MaxDataCount = cpu_to_le16(1000);
2199 pSMB->SetupCount = 1;
2200 pSMB->Reserved3 = 0;
2201 pSMB->SubCommand = cpu_to_le16(TRANS2_SET_PATH_INFORMATION);
2202 byte_count = 3 /* pad */ + params + name_len_target;
2203 pSMB->DataCount = cpu_to_le16(name_len_target);
2204 pSMB->ParameterCount = cpu_to_le16(params);
2205 pSMB->TotalDataCount = pSMB->DataCount;
2206 pSMB->TotalParameterCount = pSMB->ParameterCount;
2207 pSMB->ParameterOffset = cpu_to_le16(param_offset);
2208 pSMB->DataOffset = cpu_to_le16(offset);
2209 pSMB->InformationLevel = cpu_to_le16(SMB_SET_FILE_UNIX_LINK);
2210 pSMB->Reserved4 = 0;
2211 pSMB->hdr.smb_buf_length += byte_count;
2212 pSMB->ByteCount = cpu_to_le16(byte_count);
2213 rc = SendReceive(xid, tcon->ses, (struct smb_hdr *) pSMB,
2214 (struct smb_hdr *) pSMBr, &bytes_returned, 0);
2215 cifs_stats_inc(&tcon->num_symlinks);
2217 cFYI(1, ("Send error in SetPathInfo create symlink = %d", rc));
2221 cifs_buf_release(pSMB);
2224 goto createSymLinkRetry;
2230 CIFSUnixCreateHardLink(const int xid, struct cifsTconInfo *tcon,
2231 const char *fromName, const char *toName,
2232 const struct nls_table *nls_codepage, int remap)
2234 TRANSACTION2_SPI_REQ *pSMB = NULL;
2235 TRANSACTION2_SPI_RSP *pSMBr = NULL;
2238 int name_len_target;
2240 int bytes_returned = 0;
2241 __u16 params, param_offset, offset, byte_count;
2243 cFYI(1, ("In Create Hard link Unix style"));
2244 createHardLinkRetry:
2245 rc = smb_init(SMB_COM_TRANSACTION2, 15, tcon, (void **) &pSMB,
2250 if (pSMB->hdr.Flags2 & SMBFLG2_UNICODE) {
2251 name_len = cifsConvertToUCS((__le16 *) pSMB->FileName, toName,
2252 PATH_MAX, nls_codepage, remap);
2253 name_len++; /* trailing null */
2256 } else { /* BB improve the check for buffer overruns BB */
2257 name_len = strnlen(toName, PATH_MAX);
2258 name_len++; /* trailing null */
2259 strncpy(pSMB->FileName, toName, name_len);
2261 params = 6 + name_len;
2262 pSMB->MaxSetupCount = 0;
2266 pSMB->Reserved2 = 0;
2267 param_offset = offsetof(struct smb_com_transaction2_spi_req,
2268 InformationLevel) - 4;
2269 offset = param_offset + params;
2271 data_offset = (char *) (&pSMB->hdr.Protocol) + offset;
2272 if (pSMB->hdr.Flags2 & SMBFLG2_UNICODE) {
2274 cifsConvertToUCS((__le16 *) data_offset, fromName, PATH_MAX,
2275 nls_codepage, remap);
2276 name_len_target++; /* trailing null */
2277 name_len_target *= 2;
2278 } else { /* BB improve the check for buffer overruns BB */
2279 name_len_target = strnlen(fromName, PATH_MAX);
2280 name_len_target++; /* trailing null */
2281 strncpy(data_offset, fromName, name_len_target);
2284 pSMB->MaxParameterCount = cpu_to_le16(2);
2285 /* BB find exact max on data count below from sess*/
2286 pSMB->MaxDataCount = cpu_to_le16(1000);
2287 pSMB->SetupCount = 1;
2288 pSMB->Reserved3 = 0;
2289 pSMB->SubCommand = cpu_to_le16(TRANS2_SET_PATH_INFORMATION);
2290 byte_count = 3 /* pad */ + params + name_len_target;
2291 pSMB->ParameterCount = cpu_to_le16(params);
2292 pSMB->TotalParameterCount = pSMB->ParameterCount;
2293 pSMB->DataCount = cpu_to_le16(name_len_target);
2294 pSMB->TotalDataCount = pSMB->DataCount;
2295 pSMB->ParameterOffset = cpu_to_le16(param_offset);
2296 pSMB->DataOffset = cpu_to_le16(offset);
2297 pSMB->InformationLevel = cpu_to_le16(SMB_SET_FILE_UNIX_HLINK);
2298 pSMB->Reserved4 = 0;
2299 pSMB->hdr.smb_buf_length += byte_count;
2300 pSMB->ByteCount = cpu_to_le16(byte_count);
2301 rc = SendReceive(xid, tcon->ses, (struct smb_hdr *) pSMB,
2302 (struct smb_hdr *) pSMBr, &bytes_returned, 0);
2303 cifs_stats_inc(&tcon->num_hardlinks);
2305 cFYI(1, ("Send error in SetPathInfo (hard link) = %d", rc));
2308 cifs_buf_release(pSMB);
2310 goto createHardLinkRetry;
2316 CIFSCreateHardLink(const int xid, struct cifsTconInfo *tcon,
2317 const char *fromName, const char *toName,
2318 const struct nls_table *nls_codepage, int remap)
2321 NT_RENAME_REQ *pSMB = NULL;
2322 RENAME_RSP *pSMBr = NULL;
2324 int name_len, name_len2;
2327 cFYI(1, ("In CIFSCreateHardLink"));
2328 winCreateHardLinkRetry:
2330 rc = smb_init(SMB_COM_NT_RENAME, 4, tcon, (void **) &pSMB,
2335 pSMB->SearchAttributes =
2336 cpu_to_le16(ATTR_READONLY | ATTR_HIDDEN | ATTR_SYSTEM |
2338 pSMB->Flags = cpu_to_le16(CREATE_HARD_LINK);
2339 pSMB->ClusterCount = 0;
2341 pSMB->BufferFormat = 0x04;
2343 if (pSMB->hdr.Flags2 & SMBFLG2_UNICODE) {
2345 cifsConvertToUCS((__le16 *) pSMB->OldFileName, fromName,
2346 PATH_MAX, nls_codepage, remap);
2347 name_len++; /* trailing null */
2349 pSMB->OldFileName[name_len] = 0; /* pad */
2350 pSMB->OldFileName[name_len + 1] = 0x04;
2352 cifsConvertToUCS((__le16 *)&pSMB->OldFileName[name_len + 2],
2353 toName, PATH_MAX, nls_codepage, remap);
2354 name_len2 += 1 /* trailing null */ + 1 /* Signature word */ ;
2355 name_len2 *= 2; /* convert to bytes */
2356 } else { /* BB improve the check for buffer overruns BB */
2357 name_len = strnlen(fromName, PATH_MAX);
2358 name_len++; /* trailing null */
2359 strncpy(pSMB->OldFileName, fromName, name_len);
2360 name_len2 = strnlen(toName, PATH_MAX);
2361 name_len2++; /* trailing null */
2362 pSMB->OldFileName[name_len] = 0x04; /* 2nd buffer format */
2363 strncpy(&pSMB->OldFileName[name_len + 1], toName, name_len2);
2364 name_len2++; /* trailing null */
2365 name_len2++; /* signature byte */
2368 count = 1 /* string type byte */ + name_len + name_len2;
2369 pSMB->hdr.smb_buf_length += count;
2370 pSMB->ByteCount = cpu_to_le16(count);
2372 rc = SendReceive(xid, tcon->ses, (struct smb_hdr *) pSMB,
2373 (struct smb_hdr *) pSMBr, &bytes_returned, 0);
2374 cifs_stats_inc(&tcon->num_hardlinks);
2376 cFYI(1, ("Send error in hard link (NT rename) = %d", rc));
2378 cifs_buf_release(pSMB);
2380 goto winCreateHardLinkRetry;
2386 CIFSSMBUnixQuerySymLink(const int xid, struct cifsTconInfo *tcon,
2387 const unsigned char *searchName,
2388 char *symlinkinfo, const int buflen,
2389 const struct nls_table *nls_codepage)
2391 /* SMB_QUERY_FILE_UNIX_LINK */
2392 TRANSACTION2_QPI_REQ *pSMB = NULL;
2393 TRANSACTION2_QPI_RSP *pSMBr = NULL;
2397 __u16 params, byte_count;
2399 cFYI(1, ("In QPathSymLinkInfo (Unix) for path %s", searchName));
2402 rc = smb_init(SMB_COM_TRANSACTION2, 15, tcon, (void **) &pSMB,
2407 if (pSMB->hdr.Flags2 & SMBFLG2_UNICODE) {
2409 cifs_strtoUCS((__le16 *) pSMB->FileName, searchName,
2410 PATH_MAX, nls_codepage);
2411 name_len++; /* trailing null */
2413 } else { /* BB improve the check for buffer overruns BB */
2414 name_len = strnlen(searchName, PATH_MAX);
2415 name_len++; /* trailing null */
2416 strncpy(pSMB->FileName, searchName, name_len);
2419 params = 2 /* level */ + 4 /* rsrvd */ + name_len /* incl null */ ;
2420 pSMB->TotalDataCount = 0;
2421 pSMB->MaxParameterCount = cpu_to_le16(2);
2422 /* BB find exact max data count below from sess structure BB */
2423 pSMB->MaxDataCount = cpu_to_le16(4000);
2424 pSMB->MaxSetupCount = 0;
2428 pSMB->Reserved2 = 0;
2429 pSMB->ParameterOffset = cpu_to_le16(offsetof(
2430 struct smb_com_transaction2_qpi_req, InformationLevel) - 4);
2431 pSMB->DataCount = 0;
2432 pSMB->DataOffset = 0;
2433 pSMB->SetupCount = 1;
2434 pSMB->Reserved3 = 0;
2435 pSMB->SubCommand = cpu_to_le16(TRANS2_QUERY_PATH_INFORMATION);
2436 byte_count = params + 1 /* pad */ ;
2437 pSMB->TotalParameterCount = cpu_to_le16(params);
2438 pSMB->ParameterCount = pSMB->TotalParameterCount;
2439 pSMB->InformationLevel = cpu_to_le16(SMB_QUERY_FILE_UNIX_LINK);
2440 pSMB->Reserved4 = 0;
2441 pSMB->hdr.smb_buf_length += byte_count;
2442 pSMB->ByteCount = cpu_to_le16(byte_count);
2444 rc = SendReceive(xid, tcon->ses, (struct smb_hdr *) pSMB,
2445 (struct smb_hdr *) pSMBr, &bytes_returned, 0);
2447 cFYI(1, ("Send error in QuerySymLinkInfo = %d", rc));
2449 /* decode response */
2451 rc = validate_t2((struct smb_t2_rsp *)pSMBr);
2452 if (rc || (pSMBr->ByteCount < 2))
2453 /* BB also check enough total bytes returned */
2454 rc = -EIO; /* bad smb */
2456 __u16 data_offset = le16_to_cpu(pSMBr->t2.DataOffset);
2457 __u16 count = le16_to_cpu(pSMBr->t2.DataCount);
2459 if (pSMBr->hdr.Flags2 & SMBFLG2_UNICODE) {
2460 name_len = UniStrnlen((wchar_t *) ((char *)
2461 &pSMBr->hdr.Protocol + data_offset),
2462 min_t(const int, buflen, count) / 2);
2463 /* BB FIXME investigate remapping reserved chars here */
2464 cifs_strfromUCS_le(symlinkinfo,
2465 (__le16 *) ((char *)&pSMBr->hdr.Protocol
2467 name_len, nls_codepage);
2469 strncpy(symlinkinfo,
2470 (char *) &pSMBr->hdr.Protocol +
2472 min_t(const int, buflen, count));
2474 symlinkinfo[buflen] = 0;
2475 /* just in case so calling code does not go off the end of buffer */
2478 cifs_buf_release(pSMB);
2480 goto querySymLinkRetry;
2484 /* Initialize NT TRANSACT SMB into small smb request buffer.
2485 This assumes that all NT TRANSACTS that we init here have
2486 total parm and data under about 400 bytes (to fit in small cifs
2487 buffer size), which is the case so far, it easily fits. NB:
2488 Setup words themselves and ByteCount
2489 MaxSetupCount (size of returned setup area) and
2490 MaxParameterCount (returned parms size) must be set by caller */
2492 smb_init_ntransact(const __u16 sub_command, const int setup_count,
2493 const int parm_len, struct cifsTconInfo *tcon,
2498 struct smb_com_ntransact_req *pSMB;
2500 rc = small_smb_init(SMB_COM_NT_TRANSACT, 19 + setup_count, tcon,
2504 *ret_buf = (void *)pSMB;
2506 pSMB->TotalParameterCount = cpu_to_le32(parm_len);
2507 pSMB->TotalDataCount = 0;
2508 pSMB->MaxDataCount = cpu_to_le32((tcon->ses->server->maxBuf -
2509 MAX_CIFS_HDR_SIZE) & 0xFFFFFF00);
2510 pSMB->ParameterCount = pSMB->TotalParameterCount;
2511 pSMB->DataCount = pSMB->TotalDataCount;
2512 temp_offset = offsetof(struct smb_com_ntransact_req, Parms) +
2513 (setup_count * 2) - 4 /* for rfc1001 length itself */;
2514 pSMB->ParameterOffset = cpu_to_le32(temp_offset);
2515 pSMB->DataOffset = cpu_to_le32(temp_offset + parm_len);
2516 pSMB->SetupCount = setup_count; /* no need to le convert byte fields */
2517 pSMB->SubCommand = cpu_to_le16(sub_command);
2522 validate_ntransact(char *buf, char **ppparm, char **ppdata,
2523 int *pdatalen, int *pparmlen)
2526 __u32 data_count, data_offset, parm_count, parm_offset;
2527 struct smb_com_ntransact_rsp *pSMBr;
2532 pSMBr = (struct smb_com_ntransact_rsp *)buf;
2534 /* ByteCount was converted from little endian in SendReceive */
2535 end_of_smb = 2 /* sizeof byte count */ + pSMBr->ByteCount +
2536 (char *)&pSMBr->ByteCount;
2538 data_offset = le32_to_cpu(pSMBr->DataOffset);
2539 data_count = le32_to_cpu(pSMBr->DataCount);
2540 parm_offset = le32_to_cpu(pSMBr->ParameterOffset);
2541 parm_count = le32_to_cpu(pSMBr->ParameterCount);
2543 *ppparm = (char *)&pSMBr->hdr.Protocol + parm_offset;
2544 *ppdata = (char *)&pSMBr->hdr.Protocol + data_offset;
2546 /* should we also check that parm and data areas do not overlap? */
2547 if (*ppparm > end_of_smb) {
2548 cFYI(1, ("parms start after end of smb"));
2550 } else if (parm_count + *ppparm > end_of_smb) {
2551 cFYI(1, ("parm end after end of smb"));
2553 } else if (*ppdata > end_of_smb) {
2554 cFYI(1, ("data starts after end of smb"));
2556 } else if (data_count + *ppdata > end_of_smb) {
2557 cFYI(1, ("data %p + count %d (%p) ends after end of smb %p start %p",
2558 *ppdata, data_count, (data_count + *ppdata),
2559 end_of_smb, pSMBr));
2561 } else if (parm_count + data_count > pSMBr->ByteCount) {
2562 cFYI(1, ("parm count and data count larger than SMB"));
2569 CIFSSMBQueryReparseLinkInfo(const int xid, struct cifsTconInfo *tcon,
2570 const unsigned char *searchName,
2571 char *symlinkinfo, const int buflen, __u16 fid,
2572 const struct nls_table *nls_codepage)
2577 struct smb_com_transaction_ioctl_req *pSMB;
2578 struct smb_com_transaction_ioctl_rsp *pSMBr;
2580 cFYI(1, ("In Windows reparse style QueryLink for path %s", searchName));
2581 rc = smb_init(SMB_COM_NT_TRANSACT, 23, tcon, (void **) &pSMB,
2586 pSMB->TotalParameterCount = 0 ;
2587 pSMB->TotalDataCount = 0;
2588 pSMB->MaxParameterCount = cpu_to_le32(2);
2589 /* BB find exact data count max from sess structure BB */
2590 pSMB->MaxDataCount = cpu_to_le32((tcon->ses->server->maxBuf -
2591 MAX_CIFS_HDR_SIZE) & 0xFFFFFF00);
2592 pSMB->MaxSetupCount = 4;
2594 pSMB->ParameterOffset = 0;
2595 pSMB->DataCount = 0;
2596 pSMB->DataOffset = 0;
2597 pSMB->SetupCount = 4;
2598 pSMB->SubCommand = cpu_to_le16(NT_TRANSACT_IOCTL);
2599 pSMB->ParameterCount = pSMB->TotalParameterCount;
2600 pSMB->FunctionCode = cpu_to_le32(FSCTL_GET_REPARSE_POINT);
2601 pSMB->IsFsctl = 1; /* FSCTL */
2602 pSMB->IsRootFlag = 0;
2603 pSMB->Fid = fid; /* file handle always le */
2604 pSMB->ByteCount = 0;
2606 rc = SendReceive(xid, tcon->ses, (struct smb_hdr *) pSMB,
2607 (struct smb_hdr *) pSMBr, &bytes_returned, 0);
2609 cFYI(1, ("Send error in QueryReparseLinkInfo = %d", rc));
2610 } else { /* decode response */
2611 __u32 data_offset = le32_to_cpu(pSMBr->DataOffset);
2612 __u32 data_count = le32_to_cpu(pSMBr->DataCount);
2613 if ((pSMBr->ByteCount < 2) || (data_offset > 512))
2614 /* BB also check enough total bytes returned */
2615 rc = -EIO; /* bad smb */
2617 if (data_count && (data_count < 2048)) {
2618 char *end_of_smb = 2 /* sizeof byte count */ +
2620 (char *)&pSMBr->ByteCount;
2622 struct reparse_data *reparse_buf =
2623 (struct reparse_data *)
2624 ((char *)&pSMBr->hdr.Protocol
2626 if ((char *)reparse_buf >= end_of_smb) {
2630 if ((reparse_buf->LinkNamesBuf +
2631 reparse_buf->TargetNameOffset +
2632 reparse_buf->TargetNameLen) >
2634 cFYI(1, ("reparse buf beyond SMB"));
2639 if (pSMBr->hdr.Flags2 & SMBFLG2_UNICODE) {
2640 name_len = UniStrnlen((wchar_t *)
2641 (reparse_buf->LinkNamesBuf +
2642 reparse_buf->TargetNameOffset),
2644 reparse_buf->TargetNameLen / 2));
2645 cifs_strfromUCS_le(symlinkinfo,
2646 (__le16 *) (reparse_buf->LinkNamesBuf +
2647 reparse_buf->TargetNameOffset),
2648 name_len, nls_codepage);
2649 } else { /* ASCII names */
2650 strncpy(symlinkinfo,
2651 reparse_buf->LinkNamesBuf +
2652 reparse_buf->TargetNameOffset,
2653 min_t(const int, buflen,
2654 reparse_buf->TargetNameLen));
2658 cFYI(1, ("Invalid return data count on "
2659 "get reparse info ioctl"));
2661 symlinkinfo[buflen] = 0; /* just in case so the caller
2662 does not go off the end of the buffer */
2663 cFYI(1, ("readlink result - %s", symlinkinfo));
2667 cifs_buf_release(pSMB);
2669 /* Note: On -EAGAIN error only caller can retry on handle based calls
2670 since file handle passed in no longer valid */
2675 #ifdef CONFIG_CIFS_POSIX
2677 /*Convert an Access Control Entry from wire format to local POSIX xattr format*/
2678 static void cifs_convert_ace(posix_acl_xattr_entry *ace,
2679 struct cifs_posix_ace *cifs_ace)
2681 /* u8 cifs fields do not need le conversion */
2682 ace->e_perm = cpu_to_le16(cifs_ace->cifs_e_perm);
2683 ace->e_tag = cpu_to_le16(cifs_ace->cifs_e_tag);
2684 ace->e_id = cpu_to_le32(le64_to_cpu(cifs_ace->cifs_uid));
2685 /* cFYI(1,("perm %d tag %d id %d",ace->e_perm,ace->e_tag,ace->e_id)); */
2690 /* Convert ACL from CIFS POSIX wire format to local Linux POSIX ACL xattr */
2691 static int cifs_copy_posix_acl(char *trgt, char *src, const int buflen,
2692 const int acl_type, const int size_of_data_area)
2697 struct cifs_posix_ace *pACE;
2698 struct cifs_posix_acl *cifs_acl = (struct cifs_posix_acl *)src;
2699 posix_acl_xattr_header *local_acl = (posix_acl_xattr_header *)trgt;
2701 if (le16_to_cpu(cifs_acl->version) != CIFS_ACL_VERSION)
2704 if (acl_type & ACL_TYPE_ACCESS) {
2705 count = le16_to_cpu(cifs_acl->access_entry_count);
2706 pACE = &cifs_acl->ace_array[0];
2707 size = sizeof(struct cifs_posix_acl);
2708 size += sizeof(struct cifs_posix_ace) * count;
2709 /* check if we would go beyond end of SMB */
2710 if (size_of_data_area < size) {
2711 cFYI(1, ("bad CIFS POSIX ACL size %d vs. %d",
2712 size_of_data_area, size));
2715 } else if (acl_type & ACL_TYPE_DEFAULT) {
2716 count = le16_to_cpu(cifs_acl->access_entry_count);
2717 size = sizeof(struct cifs_posix_acl);
2718 size += sizeof(struct cifs_posix_ace) * count;
2719 /* skip past access ACEs to get to default ACEs */
2720 pACE = &cifs_acl->ace_array[count];
2721 count = le16_to_cpu(cifs_acl->default_entry_count);
2722 size += sizeof(struct cifs_posix_ace) * count;
2723 /* check if we would go beyond end of SMB */
2724 if (size_of_data_area < size)
2731 size = posix_acl_xattr_size(count);
2732 if ((buflen == 0) || (local_acl == NULL)) {
2733 /* used to query ACL EA size */
2734 } else if (size > buflen) {
2736 } else /* buffer big enough */ {
2737 local_acl->a_version = cpu_to_le32(POSIX_ACL_XATTR_VERSION);
2738 for (i = 0; i < count ; i++) {
2739 cifs_convert_ace(&local_acl->a_entries[i], pACE);
2746 static __u16 convert_ace_to_cifs_ace(struct cifs_posix_ace *cifs_ace,
2747 const posix_acl_xattr_entry *local_ace)
2749 __u16 rc = 0; /* 0 = ACL converted ok */
2751 cifs_ace->cifs_e_perm = le16_to_cpu(local_ace->e_perm);
2752 cifs_ace->cifs_e_tag = le16_to_cpu(local_ace->e_tag);
2753 /* BB is there a better way to handle the large uid? */
2754 if (local_ace->e_id == cpu_to_le32(-1)) {
2755 /* Probably no need to le convert -1 on any arch but can not hurt */
2756 cifs_ace->cifs_uid = cpu_to_le64(-1);
2758 cifs_ace->cifs_uid = cpu_to_le64(le32_to_cpu(local_ace->e_id));
2759 /*cFYI(1,("perm %d tag %d id %d",ace->e_perm,ace->e_tag,ace->e_id));*/
2763 /* Convert ACL from local Linux POSIX xattr to CIFS POSIX ACL wire format */
2764 static __u16 ACL_to_cifs_posix(char *parm_data, const char *pACL,
2765 const int buflen, const int acl_type)
2768 struct cifs_posix_acl *cifs_acl = (struct cifs_posix_acl *)parm_data;
2769 posix_acl_xattr_header *local_acl = (posix_acl_xattr_header *)pACL;
2773 if ((buflen == 0) || (pACL == NULL) || (cifs_acl == NULL))
2776 count = posix_acl_xattr_count((size_t)buflen);
2777 cFYI(1, ("setting acl with %d entries from buf of length %d and "
2779 count, buflen, le32_to_cpu(local_acl->a_version)));
2780 if (le32_to_cpu(local_acl->a_version) != 2) {
2781 cFYI(1, ("unknown POSIX ACL version %d",
2782 le32_to_cpu(local_acl->a_version)));
2785 cifs_acl->version = cpu_to_le16(1);
2786 if (acl_type == ACL_TYPE_ACCESS)
2787 cifs_acl->access_entry_count = cpu_to_le16(count);
2788 else if (acl_type == ACL_TYPE_DEFAULT)
2789 cifs_acl->default_entry_count = cpu_to_le16(count);
2791 cFYI(1, ("unknown ACL type %d", acl_type));
2794 for (i = 0; i < count; i++) {
2795 rc = convert_ace_to_cifs_ace(&cifs_acl->ace_array[i],
2796 &local_acl->a_entries[i]);
2798 /* ACE not converted */
2803 rc = (__u16)(count * sizeof(struct cifs_posix_ace));
2804 rc += sizeof(struct cifs_posix_acl);
2805 /* BB add check to make sure ACL does not overflow SMB */
2811 CIFSSMBGetPosixACL(const int xid, struct cifsTconInfo *tcon,
2812 const unsigned char *searchName,
2813 char *acl_inf, const int buflen, const int acl_type,
2814 const struct nls_table *nls_codepage, int remap)
2816 /* SMB_QUERY_POSIX_ACL */
2817 TRANSACTION2_QPI_REQ *pSMB = NULL;
2818 TRANSACTION2_QPI_RSP *pSMBr = NULL;
2822 __u16 params, byte_count;
2824 cFYI(1, ("In GetPosixACL (Unix) for path %s", searchName));
2827 rc = smb_init(SMB_COM_TRANSACTION2, 15, tcon, (void **) &pSMB,
2832 if (pSMB->hdr.Flags2 & SMBFLG2_UNICODE) {
2834 cifsConvertToUCS((__le16 *) pSMB->FileName, searchName,
2835 PATH_MAX, nls_codepage, remap);
2836 name_len++; /* trailing null */
2838 pSMB->FileName[name_len] = 0;
2839 pSMB->FileName[name_len+1] = 0;
2840 } else { /* BB improve the check for buffer overruns BB */
2841 name_len = strnlen(searchName, PATH_MAX);
2842 name_len++; /* trailing null */
2843 strncpy(pSMB->FileName, searchName, name_len);
2846 params = 2 /* level */ + 4 /* rsrvd */ + name_len /* incl null */ ;
2847 pSMB->TotalDataCount = 0;
2848 pSMB->MaxParameterCount = cpu_to_le16(2);
2849 /* BB find exact max data count below from sess structure BB */
2850 pSMB->MaxDataCount = cpu_to_le16(4000);
2851 pSMB->MaxSetupCount = 0;
2855 pSMB->Reserved2 = 0;
2856 pSMB->ParameterOffset = cpu_to_le16(
2857 offsetof(struct smb_com_transaction2_qpi_req,
2858 InformationLevel) - 4);
2859 pSMB->DataCount = 0;
2860 pSMB->DataOffset = 0;
2861 pSMB->SetupCount = 1;
2862 pSMB->Reserved3 = 0;
2863 pSMB->SubCommand = cpu_to_le16(TRANS2_QUERY_PATH_INFORMATION);
2864 byte_count = params + 1 /* pad */ ;
2865 pSMB->TotalParameterCount = cpu_to_le16(params);
2866 pSMB->ParameterCount = pSMB->TotalParameterCount;
2867 pSMB->InformationLevel = cpu_to_le16(SMB_QUERY_POSIX_ACL);
2868 pSMB->Reserved4 = 0;
2869 pSMB->hdr.smb_buf_length += byte_count;
2870 pSMB->ByteCount = cpu_to_le16(byte_count);
2872 rc = SendReceive(xid, tcon->ses, (struct smb_hdr *) pSMB,
2873 (struct smb_hdr *) pSMBr, &bytes_returned, 0);
2874 cifs_stats_inc(&tcon->num_acl_get);
2876 cFYI(1, ("Send error in Query POSIX ACL = %d", rc));
2878 /* decode response */
2880 rc = validate_t2((struct smb_t2_rsp *)pSMBr);
2881 if (rc || (pSMBr->ByteCount < 2))
2882 /* BB also check enough total bytes returned */
2883 rc = -EIO; /* bad smb */
2885 __u16 data_offset = le16_to_cpu(pSMBr->t2.DataOffset);
2886 __u16 count = le16_to_cpu(pSMBr->t2.DataCount);
2887 rc = cifs_copy_posix_acl(acl_inf,
2888 (char *)&pSMBr->hdr.Protocol+data_offset,
2889 buflen, acl_type, count);
2892 cifs_buf_release(pSMB);
2899 CIFSSMBSetPosixACL(const int xid, struct cifsTconInfo *tcon,
2900 const unsigned char *fileName,
2901 const char *local_acl, const int buflen,
2903 const struct nls_table *nls_codepage, int remap)
2905 struct smb_com_transaction2_spi_req *pSMB = NULL;
2906 struct smb_com_transaction2_spi_rsp *pSMBr = NULL;
2910 int bytes_returned = 0;
2911 __u16 params, byte_count, data_count, param_offset, offset;
2913 cFYI(1, ("In SetPosixACL (Unix) for path %s", fileName));
2915 rc = smb_init(SMB_COM_TRANSACTION2, 15, tcon, (void **) &pSMB,
2919 if (pSMB->hdr.Flags2 & SMBFLG2_UNICODE) {
2921 cifsConvertToUCS((__le16 *) pSMB->FileName, fileName,
2922 PATH_MAX, nls_codepage, remap);
2923 name_len++; /* trailing null */
2925 } else { /* BB improve the check for buffer overruns BB */
2926 name_len = strnlen(fileName, PATH_MAX);
2927 name_len++; /* trailing null */
2928 strncpy(pSMB->FileName, fileName, name_len);
2930 params = 6 + name_len;
2931 pSMB->MaxParameterCount = cpu_to_le16(2);
2932 pSMB->MaxDataCount = cpu_to_le16(1000); /* BB find max SMB size from sess */
2933 pSMB->MaxSetupCount = 0;
2937 pSMB->Reserved2 = 0;
2938 param_offset = offsetof(struct smb_com_transaction2_spi_req,
2939 InformationLevel) - 4;
2940 offset = param_offset + params;
2941 parm_data = ((char *) &pSMB->hdr.Protocol) + offset;
2942 pSMB->ParameterOffset = cpu_to_le16(param_offset);
2944 /* convert to on the wire format for POSIX ACL */
2945 data_count = ACL_to_cifs_posix(parm_data, local_acl, buflen, acl_type);
2947 if (data_count == 0) {
2949 goto setACLerrorExit;
2951 pSMB->DataOffset = cpu_to_le16(offset);
2952 pSMB->SetupCount = 1;
2953 pSMB->Reserved3 = 0;
2954 pSMB->SubCommand = cpu_to_le16(TRANS2_SET_PATH_INFORMATION);
2955 pSMB->InformationLevel = cpu_to_le16(SMB_SET_POSIX_ACL);
2956 byte_count = 3 /* pad */ + params + data_count;
2957 pSMB->DataCount = cpu_to_le16(data_count);
2958 pSMB->TotalDataCount = pSMB->DataCount;
2959 pSMB->ParameterCount = cpu_to_le16(params);
2960 pSMB->TotalParameterCount = pSMB->ParameterCount;
2961 pSMB->Reserved4 = 0;
2962 pSMB->hdr.smb_buf_length += byte_count;
2963 pSMB->ByteCount = cpu_to_le16(byte_count);
2964 rc = SendReceive(xid, tcon->ses, (struct smb_hdr *) pSMB,
2965 (struct smb_hdr *) pSMBr, &bytes_returned, 0);
2967 cFYI(1, ("Set POSIX ACL returned %d", rc));
2971 cifs_buf_release(pSMB);
2977 /* BB fix tabs in this function FIXME BB */
2979 CIFSGetExtAttr(const int xid, struct cifsTconInfo *tcon,
2980 const int netfid, __u64 * pExtAttrBits, __u64 *pMask)
2983 struct smb_t2_qfi_req *pSMB = NULL;
2984 struct smb_t2_qfi_rsp *pSMBr = NULL;
2986 __u16 params, byte_count;
2988 cFYI(1, ("In GetExtAttr"));
2993 rc = smb_init(SMB_COM_TRANSACTION2, 15, tcon, (void **) &pSMB,
2998 params = 2 /* level */ +2 /* fid */;
2999 pSMB->t2.TotalDataCount = 0;
3000 pSMB->t2.MaxParameterCount = cpu_to_le16(4);
3001 /* BB find exact max data count below from sess structure BB */
3002 pSMB->t2.MaxDataCount = cpu_to_le16(4000);
3003 pSMB->t2.MaxSetupCount = 0;
3004 pSMB->t2.Reserved = 0;
3006 pSMB->t2.Timeout = 0;
3007 pSMB->t2.Reserved2 = 0;
3008 pSMB->t2.ParameterOffset = cpu_to_le16(offsetof(struct smb_t2_qfi_req,
3010 pSMB->t2.DataCount = 0;
3011 pSMB->t2.DataOffset = 0;
3012 pSMB->t2.SetupCount = 1;
3013 pSMB->t2.Reserved3 = 0;
3014 pSMB->t2.SubCommand = cpu_to_le16(TRANS2_QUERY_FILE_INFORMATION);
3015 byte_count = params + 1 /* pad */ ;
3016 pSMB->t2.TotalParameterCount = cpu_to_le16(params);
3017 pSMB->t2.ParameterCount = pSMB->t2.TotalParameterCount;
3018 pSMB->InformationLevel = cpu_to_le16(SMB_QUERY_ATTR_FLAGS);
3021 pSMB->hdr.smb_buf_length += byte_count;
3022 pSMB->t2.ByteCount = cpu_to_le16(byte_count);
3024 rc = SendReceive(xid, tcon->ses, (struct smb_hdr *) pSMB,
3025 (struct smb_hdr *) pSMBr, &bytes_returned, 0);
3027 cFYI(1, ("error %d in GetExtAttr", rc));
3029 /* decode response */
3030 rc = validate_t2((struct smb_t2_rsp *)pSMBr);
3031 if (rc || (pSMBr->ByteCount < 2))
3032 /* BB also check enough total bytes returned */
3033 /* If rc should we check for EOPNOSUPP and
3034 disable the srvino flag? or in caller? */
3035 rc = -EIO; /* bad smb */
3037 __u16 data_offset = le16_to_cpu(pSMBr->t2.DataOffset);
3038 __u16 count = le16_to_cpu(pSMBr->t2.DataCount);
3039 struct file_chattr_info *pfinfo;
3040 /* BB Do we need a cast or hash here ? */
3042 cFYI(1, ("Illegal size ret in GetExtAttr"));
3046 pfinfo = (struct file_chattr_info *)
3047 (data_offset + (char *) &pSMBr->hdr.Protocol);
3048 *pExtAttrBits = le64_to_cpu(pfinfo->mode);
3049 *pMask = le64_to_cpu(pfinfo->mask);
3053 cifs_buf_release(pSMB);
3055 goto GetExtAttrRetry;
3059 #endif /* CONFIG_POSIX */
3061 /* Get Security Descriptor (by handle) from remote server for a file or dir */
3063 CIFSSMBGetCIFSACL(const int xid, struct cifsTconInfo *tcon, __u16 fid,
3064 /* BB fix up return info */ char *acl_inf, const int buflen,
3069 QUERY_SEC_DESC_REQ * pSMB;
3072 cFYI(1, ("GetCifsACL"));
3074 rc = smb_init_ntransact(NT_TRANSACT_QUERY_SECURITY_DESC, 0,
3075 8 /* parm len */, tcon, (void **) &pSMB);
3079 pSMB->MaxParameterCount = cpu_to_le32(4);
3080 /* BB TEST with big acls that might need to be e.g. larger than 16K */
3081 pSMB->MaxSetupCount = 0;
3082 pSMB->Fid = fid; /* file handle always le */
3083 pSMB->AclFlags = cpu_to_le32(CIFS_ACL_OWNER | CIFS_ACL_GROUP |
3085 pSMB->ByteCount = cpu_to_le16(11); /* 3 bytes pad + 8 bytes parm */
3086 pSMB->hdr.smb_buf_length += 11;
3087 iov[0].iov_base = (char *)pSMB;
3088 iov[0].iov_len = pSMB->hdr.smb_buf_length + 4;
3090 rc = SendReceive2(xid, tcon->ses, iov, 1 /* num iovec */, &buf_type, 0);
3091 cifs_stats_inc(&tcon->num_acl_get);
3093 cFYI(1, ("Send error in QuerySecDesc = %d", rc));
3094 } else { /* decode response */
3095 struct cifs_ntsd *psec_desc;
3100 struct smb_com_ntransact_rsp *pSMBr;
3102 /* validate_nttransact */
3103 rc = validate_ntransact(iov[0].iov_base, (char **)&parm,
3104 (char **)&psec_desc,
3105 &parm_len, &data_len);
3108 pSMBr = (struct smb_com_ntransact_rsp *)iov[0].iov_base;
3110 cFYI(1, ("smb %p parm %p data %p", pSMBr, parm, psec_desc));
3112 if (le32_to_cpu(pSMBr->ParameterCount) != 4) {
3113 rc = -EIO; /* bad smb */
3117 /* BB check that data area is minimum length and as big as acl_len */
3119 acl_len = le32_to_cpu(*(__le32 *)parm);
3120 /* BB check if (acl_len > bufsize) */
3122 parse_sec_desc(psec_desc, acl_len);
3125 if (buf_type == CIFS_SMALL_BUFFER)
3126 cifs_small_buf_release(iov[0].iov_base);
3127 else if (buf_type == CIFS_LARGE_BUFFER)
3128 cifs_buf_release(iov[0].iov_base);
3129 /* cifs_small_buf_release(pSMB); */ /* Freed earlier now in SendReceive2 */
3133 /* Legacy Query Path Information call for lookup to old servers such
3135 int SMBQueryInformation(const int xid, struct cifsTconInfo *tcon,
3136 const unsigned char *searchName,
3137 FILE_ALL_INFO *pFinfo,
3138 const struct nls_table *nls_codepage, int remap)
3140 QUERY_INFORMATION_REQ * pSMB;
3141 QUERY_INFORMATION_RSP * pSMBr;
3146 cFYI(1, ("In SMBQPath path %s", searchName));
3148 rc = smb_init(SMB_COM_QUERY_INFORMATION, 0, tcon, (void **) &pSMB,
3153 if (pSMB->hdr.Flags2 & SMBFLG2_UNICODE) {
3155 cifsConvertToUCS((__le16 *) pSMB->FileName, searchName,
3156 PATH_MAX, nls_codepage, remap);
3157 name_len++; /* trailing null */
3160 name_len = strnlen(searchName, PATH_MAX);
3161 name_len++; /* trailing null */
3162 strncpy(pSMB->FileName, searchName, name_len);
3164 pSMB->BufferFormat = 0x04;
3165 name_len++; /* account for buffer type byte */
3166 pSMB->hdr.smb_buf_length += (__u16) name_len;
3167 pSMB->ByteCount = cpu_to_le16(name_len);
3169 rc = SendReceive(xid, tcon->ses, (struct smb_hdr *) pSMB,
3170 (struct smb_hdr *) pSMBr, &bytes_returned, 0);
3172 cFYI(1, ("Send error in QueryInfo = %d", rc));
3173 } else if (pFinfo) { /* decode response */
3175 __u32 time = le32_to_cpu(pSMBr->last_write_time);
3176 /* BB FIXME - add time zone adjustment BB */
3177 memset(pFinfo, 0, sizeof(FILE_ALL_INFO));
3180 /* decode time fields */
3181 pFinfo->ChangeTime = cpu_to_le64(cifs_UnixTimeToNT(ts));
3182 pFinfo->LastWriteTime = pFinfo->ChangeTime;
3183 pFinfo->LastAccessTime = 0;
3184 pFinfo->AllocationSize =
3185 cpu_to_le64(le32_to_cpu(pSMBr->size));
3186 pFinfo->EndOfFile = pFinfo->AllocationSize;
3187 pFinfo->Attributes =
3188 cpu_to_le32(le16_to_cpu(pSMBr->attr));
3190 rc = -EIO; /* bad buffer passed in */
3192 cifs_buf_release(pSMB);
3204 CIFSSMBQPathInfo(const int xid, struct cifsTconInfo *tcon,
3205 const unsigned char *searchName,
3206 FILE_ALL_INFO * pFindData,
3207 int legacy /* old style infolevel */,
3208 const struct nls_table *nls_codepage, int remap)
3210 /* level 263 SMB_QUERY_FILE_ALL_INFO */
3211 TRANSACTION2_QPI_REQ *pSMB = NULL;
3212 TRANSACTION2_QPI_RSP *pSMBr = NULL;
3216 __u16 params, byte_count;
3218 /* cFYI(1, ("In QPathInfo path %s", searchName)); */
3220 rc = smb_init(SMB_COM_TRANSACTION2, 15, tcon, (void **) &pSMB,
3225 if (pSMB->hdr.Flags2 & SMBFLG2_UNICODE) {
3227 cifsConvertToUCS((__le16 *) pSMB->FileName, searchName,
3228 PATH_MAX, nls_codepage, remap);
3229 name_len++; /* trailing null */
3231 } else { /* BB improve the check for buffer overruns BB */
3232 name_len = strnlen(searchName, PATH_MAX);
3233 name_len++; /* trailing null */
3234 strncpy(pSMB->FileName, searchName, name_len);
3237 params = 2 /* level */ + 4 /* reserved */ + name_len /* includes NUL */;
3238 pSMB->TotalDataCount = 0;
3239 pSMB->MaxParameterCount = cpu_to_le16(2);
3240 pSMB->MaxDataCount = cpu_to_le16(4000); /* BB find exact max SMB PDU from sess structure BB */
3241 pSMB->MaxSetupCount = 0;
3245 pSMB->Reserved2 = 0;
3246 pSMB->ParameterOffset = cpu_to_le16(offsetof(
3247 struct smb_com_transaction2_qpi_req, InformationLevel) - 4);
3248 pSMB->DataCount = 0;
3249 pSMB->DataOffset = 0;
3250 pSMB->SetupCount = 1;
3251 pSMB->Reserved3 = 0;
3252 pSMB->SubCommand = cpu_to_le16(TRANS2_QUERY_PATH_INFORMATION);
3253 byte_count = params + 1 /* pad */ ;
3254 pSMB->TotalParameterCount = cpu_to_le16(params);
3255 pSMB->ParameterCount = pSMB->TotalParameterCount;
3257 pSMB->InformationLevel = cpu_to_le16(SMB_INFO_STANDARD);
3259 pSMB->InformationLevel = cpu_to_le16(SMB_QUERY_FILE_ALL_INFO);
3260 pSMB->Reserved4 = 0;
3261 pSMB->hdr.smb_buf_length += byte_count;
3262 pSMB->ByteCount = cpu_to_le16(byte_count);
3264 rc = SendReceive(xid, tcon->ses, (struct smb_hdr *) pSMB,
3265 (struct smb_hdr *) pSMBr, &bytes_returned, 0);
3267 cFYI(1, ("Send error in QPathInfo = %d", rc));
3268 } else { /* decode response */
3269 rc = validate_t2((struct smb_t2_rsp *)pSMBr);
3271 if (rc) /* BB add auto retry on EOPNOTSUPP? */
3273 else if (!legacy && (pSMBr->ByteCount < 40))
3274 rc = -EIO; /* bad smb */
3275 else if (legacy && (pSMBr->ByteCount < 24))
3276 rc = -EIO; /* 24 or 26 expected but we do not read
3278 else if (pFindData) {
3280 __u16 data_offset = le16_to_cpu(pSMBr->t2.DataOffset);
3281 if (legacy) /* we do not read the last field, EAsize,
3282 fortunately since it varies by subdialect
3283 and on Set vs. Get, is two bytes or 4
3284 bytes depending but we don't care here */
3285 size = sizeof(FILE_INFO_STANDARD);
3287 size = sizeof(FILE_ALL_INFO);
3288 memcpy((char *) pFindData,
3289 (char *) &pSMBr->hdr.Protocol +
3294 cifs_buf_release(pSMB);
3296 goto QPathInfoRetry;
3302 CIFSSMBUnixQPathInfo(const int xid, struct cifsTconInfo *tcon,
3303 const unsigned char *searchName,
3304 FILE_UNIX_BASIC_INFO * pFindData,
3305 const struct nls_table *nls_codepage, int remap)
3307 /* SMB_QUERY_FILE_UNIX_BASIC */
3308 TRANSACTION2_QPI_REQ *pSMB = NULL;
3309 TRANSACTION2_QPI_RSP *pSMBr = NULL;
3311 int bytes_returned = 0;
3313 __u16 params, byte_count;
3315 cFYI(1, ("In QPathInfo (Unix) the path %s", searchName));
3317 rc = smb_init(SMB_COM_TRANSACTION2, 15, tcon, (void **) &pSMB,
3322 if (pSMB->hdr.Flags2 & SMBFLG2_UNICODE) {
3324 cifsConvertToUCS((__le16 *) pSMB->FileName, searchName,
3325 PATH_MAX, nls_codepage, remap);
3326 name_len++; /* trailing null */
3328 } else { /* BB improve the check for buffer overruns BB */
3329 name_len = strnlen(searchName, PATH_MAX);
3330 name_len++; /* trailing null */
3331 strncpy(pSMB->FileName, searchName, name_len);
3334 params = 2 /* level */ + 4 /* reserved */ + name_len /* includes NUL */;
3335 pSMB->TotalDataCount = 0;
3336 pSMB->MaxParameterCount = cpu_to_le16(2);
3337 /* BB find exact max SMB PDU from sess structure BB */
3338 pSMB->MaxDataCount = cpu_to_le16(4000);
3339 pSMB->MaxSetupCount = 0;
3343 pSMB->Reserved2 = 0;
3344 pSMB->ParameterOffset = cpu_to_le16(offsetof(
3345 struct smb_com_transaction2_qpi_req, InformationLevel) - 4);
3346 pSMB->DataCount = 0;
3347 pSMB->DataOffset = 0;
3348 pSMB->SetupCount = 1;
3349 pSMB->Reserved3 = 0;
3350 pSMB->SubCommand = cpu_to_le16(TRANS2_QUERY_PATH_INFORMATION);
3351 byte_count = params + 1 /* pad */ ;
3352 pSMB->TotalParameterCount = cpu_to_le16(params);
3353 pSMB->ParameterCount = pSMB->TotalParameterCount;
3354 pSMB->InformationLevel = cpu_to_le16(SMB_QUERY_FILE_UNIX_BASIC);
3355 pSMB->Reserved4 = 0;
3356 pSMB->hdr.smb_buf_length += byte_count;
3357 pSMB->ByteCount = cpu_to_le16(byte_count);
3359 rc = SendReceive(xid, tcon->ses, (struct smb_hdr *) pSMB,
3360 (struct smb_hdr *) pSMBr, &bytes_returned, 0);
3362 cFYI(1, ("Send error in QPathInfo = %d", rc));
3363 } else { /* decode response */
3364 rc = validate_t2((struct smb_t2_rsp *)pSMBr);
3366 if (rc || (pSMBr->ByteCount < sizeof(FILE_UNIX_BASIC_INFO))) {
3367 cERROR(1, ("Malformed FILE_UNIX_BASIC_INFO response.\n"
3368 "Unix Extensions can be disabled on mount "
3369 "by specifying the nosfu mount option."));
3370 rc = -EIO; /* bad smb */
3372 __u16 data_offset = le16_to_cpu(pSMBr->t2.DataOffset);
3373 memcpy((char *) pFindData,
3374 (char *) &pSMBr->hdr.Protocol +
3376 sizeof (FILE_UNIX_BASIC_INFO));
3379 cifs_buf_release(pSMB);
3381 goto UnixQPathInfoRetry;
3386 #if 0 /* function unused at present */
3387 int CIFSFindSingle(const int xid, struct cifsTconInfo *tcon,
3388 const char *searchName, FILE_ALL_INFO * findData,
3389 const struct nls_table *nls_codepage)
3391 /* level 257 SMB_ */
3392 TRANSACTION2_FFIRST_REQ *pSMB = NULL;
3393 TRANSACTION2_FFIRST_RSP *pSMBr = NULL;
3397 __u16 params, byte_count;
3399 cFYI(1, ("In FindUnique"));
3401 rc = smb_init(SMB_COM_TRANSACTION2, 15, tcon, (void **) &pSMB,
3406 if (pSMB->hdr.Flags2 & SMBFLG2_UNICODE) {
3408 cifsConvertToUCS((__le16 *) pSMB->FileName, searchName,
3409 PATH_MAX, nls_codepage);
3410 name_len++; /* trailing null */
3412 } else { /* BB improve the check for buffer overruns BB */
3413 name_len = strnlen(searchName, PATH_MAX);
3414 name_len++; /* trailing null */
3415 strncpy(pSMB->FileName, searchName, name_len);
3418 params = 12 + name_len /* includes null */ ;
3419 pSMB->TotalDataCount = 0; /* no EAs */
3420 pSMB->MaxParameterCount = cpu_to_le16(2);
3421 pSMB->MaxDataCount = cpu_to_le16(4000); /* BB find exact max SMB PDU from sess structure BB */
3422 pSMB->MaxSetupCount = 0;
3426 pSMB->Reserved2 = 0;
3427 pSMB->ParameterOffset = cpu_to_le16(
3428 offsetof(struct smb_com_transaction2_ffirst_req, InformationLevel)-4);
3429 pSMB->DataCount = 0;
3430 pSMB->DataOffset = 0;
3431 pSMB->SetupCount = 1; /* one byte, no need to le convert */
3432 pSMB->Reserved3 = 0;
3433 pSMB->SubCommand = cpu_to_le16(TRANS2_FIND_FIRST);
3434 byte_count = params + 1 /* pad */ ;
3435 pSMB->TotalParameterCount = cpu_to_le16(params);
3436 pSMB->ParameterCount = pSMB->TotalParameterCount;
3437 pSMB->SearchAttributes =
3438 cpu_to_le16(ATTR_READONLY | ATTR_HIDDEN | ATTR_SYSTEM |
3440 pSMB->SearchCount = cpu_to_le16(16); /* BB increase */
3441 pSMB->SearchFlags = cpu_to_le16(1);
3442 pSMB->InformationLevel = cpu_to_le16(SMB_FIND_FILE_DIRECTORY_INFO);
3443 pSMB->SearchStorageType = 0; /* BB what should we set this to? BB */
3444 pSMB->hdr.smb_buf_length += byte_count;
3445 pSMB->ByteCount = cpu_to_le16(byte_count);
3447 rc = SendReceive(xid, tcon->ses, (struct smb_hdr *) pSMB,
3448 (struct smb_hdr *) pSMBr, &bytes_returned, 0);
3451 cFYI(1, ("Send error in FindFileDirInfo = %d", rc));
3452 } else { /* decode response */
3453 cifs_stats_inc(&tcon->num_ffirst);
3457 cifs_buf_release(pSMB);
3459 goto findUniqueRetry;
3463 #endif /* end unused (temporarily) function */
3465 /* xid, tcon, searchName and codepage are input parms, rest are returned */
3467 CIFSFindFirst(const int xid, struct cifsTconInfo *tcon,
3468 const char *searchName,
3469 const struct nls_table *nls_codepage,
3471 struct cifs_search_info *psrch_inf, int remap, const char dirsep)
3473 /* level 257 SMB_ */
3474 TRANSACTION2_FFIRST_REQ *pSMB = NULL;
3475 TRANSACTION2_FFIRST_RSP *pSMBr = NULL;
3476 T2_FFIRST_RSP_PARMS * parms;
3478 int bytes_returned = 0;
3480 __u16 params, byte_count;
3482 cFYI(1, ("In FindFirst for %s", searchName));
3485 rc = smb_init(SMB_COM_TRANSACTION2, 15, tcon, (void **) &pSMB,
3490 if (pSMB->hdr.Flags2 & SMBFLG2_UNICODE) {
3492 cifsConvertToUCS((__le16 *) pSMB->FileName, searchName,
3493 PATH_MAX, nls_codepage, remap);
3494 /* We can not add the asterik earlier in case
3495 it got remapped to 0xF03A as if it were part of the
3496 directory name instead of a wildcard */
3498 pSMB->FileName[name_len] = dirsep;
3499 pSMB->FileName[name_len+1] = 0;
3500 pSMB->FileName[name_len+2] = '*';
3501 pSMB->FileName[name_len+3] = 0;
3502 name_len += 4; /* now the trailing null */
3503 pSMB->FileName[name_len] = 0; /* null terminate just in case */
3504 pSMB->FileName[name_len+1] = 0;
3506 } else { /* BB add check for overrun of SMB buf BB */
3507 name_len = strnlen(searchName, PATH_MAX);
3508 /* BB fix here and in unicode clause above ie
3509 if (name_len > buffersize-header)
3510 free buffer exit; BB */
3511 strncpy(pSMB->FileName, searchName, name_len);
3512 pSMB->FileName[name_len] = dirsep;
3513 pSMB->FileName[name_len+1] = '*';
3514 pSMB->FileName[name_len+2] = 0;
3518 params = 12 + name_len /* includes null */ ;
3519 pSMB->TotalDataCount = 0; /* no EAs */
3520 pSMB->MaxParameterCount = cpu_to_le16(10);
3521 pSMB->MaxDataCount = cpu_to_le16((tcon->ses->server->maxBuf -
3522 MAX_CIFS_HDR_SIZE) & 0xFFFFFF00);
3523 pSMB->MaxSetupCount = 0;
3527 pSMB->Reserved2 = 0;
3528 byte_count = params + 1 /* pad */ ;
3529 pSMB->TotalParameterCount = cpu_to_le16(params);
3530 pSMB->ParameterCount = pSMB->TotalParameterCount;
3531 pSMB->ParameterOffset = cpu_to_le16(
3532 offsetof(struct smb_com_transaction2_ffirst_req, SearchAttributes)
3534 pSMB->DataCount = 0;
3535 pSMB->DataOffset = 0;
3536 pSMB->SetupCount = 1; /* one byte, no need to make endian neutral */
3537 pSMB->Reserved3 = 0;
3538 pSMB->SubCommand = cpu_to_le16(TRANS2_FIND_FIRST);
3539 pSMB->SearchAttributes =
3540 cpu_to_le16(ATTR_READONLY | ATTR_HIDDEN | ATTR_SYSTEM |
3542 pSMB->SearchCount = cpu_to_le16(CIFSMaxBufSize/sizeof(FILE_UNIX_INFO));
3543 pSMB->SearchFlags = cpu_to_le16(CIFS_SEARCH_CLOSE_AT_END |
3544 CIFS_SEARCH_RETURN_RESUME);
3545 pSMB->InformationLevel = cpu_to_le16(psrch_inf->info_level);
3547 /* BB what should we set StorageType to? Does it matter? BB */
3548 pSMB->SearchStorageType = 0;
3549 pSMB->hdr.smb_buf_length += byte_count;
3550 pSMB->ByteCount = cpu_to_le16(byte_count);
3552 rc = SendReceive(xid, tcon->ses, (struct smb_hdr *) pSMB,
3553 (struct smb_hdr *) pSMBr, &bytes_returned, 0);
3554 cifs_stats_inc(&tcon->num_ffirst);
3556 if (rc) {/* BB add logic to retry regular search if Unix search
3557 rejected unexpectedly by server */
3558 /* BB Add code to handle unsupported level rc */
3559 cFYI(1, ("Error in FindFirst = %d", rc));
3561 cifs_buf_release(pSMB);
3563 /* BB eventually could optimize out free and realloc of buf */
3566 goto findFirstRetry;
3567 } else { /* decode response */
3568 /* BB remember to free buffer if error BB */
3569 rc = validate_t2((struct smb_t2_rsp *)pSMBr);
3571 if (pSMBr->hdr.Flags2 & SMBFLG2_UNICODE)
3572 psrch_inf->unicode = TRUE;
3574 psrch_inf->unicode = FALSE;
3576 psrch_inf->ntwrk_buf_start = (char *)pSMBr;
3577 psrch_inf->smallBuf = 0;
3578 psrch_inf->srch_entries_start =
3579 (char *) &pSMBr->hdr.Protocol +
3580 le16_to_cpu(pSMBr->t2.DataOffset);
3581 parms = (T2_FFIRST_RSP_PARMS *)((char *) &pSMBr->hdr.Protocol +
3582 le16_to_cpu(pSMBr->t2.ParameterOffset));
3584 if (parms->EndofSearch)
3585 psrch_inf->endOfSearch = TRUE;
3587 psrch_inf->endOfSearch = FALSE;
3589 psrch_inf->entries_in_buffer =
3590 le16_to_cpu(parms->SearchCount);
3591 psrch_inf->index_of_last_entry = 2 /* skip . and .. */ +
3592 psrch_inf->entries_in_buffer;
3593 *pnetfid = parms->SearchHandle;
3595 cifs_buf_release(pSMB);
3602 int CIFSFindNext(const int xid, struct cifsTconInfo *tcon,
3603 __u16 searchHandle, struct cifs_search_info *psrch_inf)
3605 TRANSACTION2_FNEXT_REQ *pSMB = NULL;
3606 TRANSACTION2_FNEXT_RSP *pSMBr = NULL;
3607 T2_FNEXT_RSP_PARMS * parms;
3608 char *response_data;
3610 int bytes_returned, name_len;
3611 __u16 params, byte_count;
3613 cFYI(1, ("In FindNext"));
3615 if (psrch_inf->endOfSearch == TRUE)
3618 rc = smb_init(SMB_COM_TRANSACTION2, 15, tcon, (void **) &pSMB,
3623 params = 14; /* includes 2 bytes of null string, converted to LE below*/
3625 pSMB->TotalDataCount = 0; /* no EAs */
3626 pSMB->MaxParameterCount = cpu_to_le16(8);
3627 pSMB->MaxDataCount =
3628 cpu_to_le16((tcon->ses->server->maxBuf - MAX_CIFS_HDR_SIZE) &
3630 pSMB->MaxSetupCount = 0;
3634 pSMB->Reserved2 = 0;
3635 pSMB->ParameterOffset = cpu_to_le16(
3636 offsetof(struct smb_com_transaction2_fnext_req,SearchHandle) - 4);
3637 pSMB->DataCount = 0;
3638 pSMB->DataOffset = 0;
3639 pSMB->SetupCount = 1;
3640 pSMB->Reserved3 = 0;
3641 pSMB->SubCommand = cpu_to_le16(TRANS2_FIND_NEXT);
3642 pSMB->SearchHandle = searchHandle; /* always kept as le */
3644 cpu_to_le16(CIFSMaxBufSize / sizeof (FILE_UNIX_INFO));
3645 pSMB->InformationLevel = cpu_to_le16(psrch_inf->info_level);
3646 pSMB->ResumeKey = psrch_inf->resume_key;
3648 cpu_to_le16(CIFS_SEARCH_CLOSE_AT_END | CIFS_SEARCH_RETURN_RESUME);
3650 name_len = psrch_inf->resume_name_len;
3652 if (name_len < PATH_MAX) {
3653 memcpy(pSMB->ResumeFileName, psrch_inf->presume_name, name_len);
3654 byte_count += name_len;
3655 /* 14 byte parm len above enough for 2 byte null terminator */
3656 pSMB->ResumeFileName[name_len] = 0;
3657 pSMB->ResumeFileName[name_len+1] = 0;
3660 goto FNext2_err_exit;
3662 byte_count = params + 1 /* pad */ ;
3663 pSMB->TotalParameterCount = cpu_to_le16(params);
3664 pSMB->ParameterCount = pSMB->TotalParameterCount;
3665 pSMB->hdr.smb_buf_length += byte_count;
3666 pSMB->ByteCount = cpu_to_le16(byte_count);
3668 rc = SendReceive(xid, tcon->ses, (struct smb_hdr *) pSMB,
3669 (struct smb_hdr *) pSMBr, &bytes_returned, 0);
3670 cifs_stats_inc(&tcon->num_fnext);
3673 psrch_inf->endOfSearch = TRUE;
3674 rc = 0; /* search probably was closed at end of search*/
3676 cFYI(1, ("FindNext returned = %d", rc));
3677 } else { /* decode response */
3678 rc = validate_t2((struct smb_t2_rsp *)pSMBr);
3681 /* BB fixme add lock for file (srch_info) struct here */
3682 if (pSMBr->hdr.Flags2 & SMBFLG2_UNICODE)
3683 psrch_inf->unicode = TRUE;
3685 psrch_inf->unicode = FALSE;
3686 response_data = (char *) &pSMBr->hdr.Protocol +
3687 le16_to_cpu(pSMBr->t2.ParameterOffset);
3688 parms = (T2_FNEXT_RSP_PARMS *)response_data;
3689 response_data = (char *)&pSMBr->hdr.Protocol +
3690 le16_to_cpu(pSMBr->t2.DataOffset);
3691 if (psrch_inf->smallBuf)
3692 cifs_small_buf_release(
3693 psrch_inf->ntwrk_buf_start);
3695 cifs_buf_release(psrch_inf->ntwrk_buf_start);
3696 psrch_inf->srch_entries_start = response_data;
3697 psrch_inf->ntwrk_buf_start = (char *)pSMB;
3698 psrch_inf->smallBuf = 0;
3699 if (parms->EndofSearch)
3700 psrch_inf->endOfSearch = TRUE;
3702 psrch_inf->endOfSearch = FALSE;
3703 psrch_inf->entries_in_buffer =
3704 le16_to_cpu(parms->SearchCount);
3705 psrch_inf->index_of_last_entry +=
3706 psrch_inf->entries_in_buffer;
3707 /* cFYI(1,("fnxt2 entries in buf %d index_of_last %d",
3708 psrch_inf->entries_in_buffer, psrch_inf->index_of_last_entry)); */
3710 /* BB fixme add unlock here */
3715 /* BB On error, should we leave previous search buf (and count and
3716 last entry fields) intact or free the previous one? */
3718 /* Note: On -EAGAIN error only caller can retry on handle based calls
3719 since file handle passed in no longer valid */
3722 cifs_buf_release(pSMB);
3727 CIFSFindClose(const int xid, struct cifsTconInfo *tcon,
3728 const __u16 searchHandle)
3731 FINDCLOSE_REQ *pSMB = NULL;
3732 CLOSE_RSP *pSMBr = NULL; /* BB removeme BB */
3735 cFYI(1, ("In CIFSSMBFindClose"));
3736 rc = small_smb_init(SMB_COM_FIND_CLOSE2, 1, tcon, (void **)&pSMB);
3738 /* no sense returning error if session restarted
3739 as file handle has been closed */
3745 pSMBr = (CLOSE_RSP *)pSMB; /* BB removeme BB */
3746 pSMB->FileID = searchHandle;
3747 pSMB->ByteCount = 0;
3748 rc = SendReceive(xid, tcon->ses, (struct smb_hdr *) pSMB,
3749 (struct smb_hdr *) pSMBr, &bytes_returned, 0);
3751 cERROR(1, ("Send error in FindClose = %d", rc));
3753 cifs_stats_inc(&tcon->num_fclose);
3754 cifs_small_buf_release(pSMB);
3756 /* Since session is dead, search handle closed on server already */
3764 CIFSGetSrvInodeNumber(const int xid, struct cifsTconInfo *tcon,
3765 const unsigned char *searchName,
3766 __u64 * inode_number,
3767 const struct nls_table *nls_codepage, int remap)
3770 TRANSACTION2_QPI_REQ *pSMB = NULL;
3771 TRANSACTION2_QPI_RSP *pSMBr = NULL;
3772 int name_len, bytes_returned;
3773 __u16 params, byte_count;
3775 cFYI(1, ("In GetSrvInodeNum for %s", searchName));
3779 GetInodeNumberRetry:
3780 rc = smb_init(SMB_COM_TRANSACTION2, 15, tcon, (void **) &pSMB,
3785 if (pSMB->hdr.Flags2 & SMBFLG2_UNICODE) {
3787 cifsConvertToUCS((__le16 *) pSMB->FileName, searchName,
3788 PATH_MAX, nls_codepage, remap);
3789 name_len++; /* trailing null */
3791 } else { /* BB improve the check for buffer overruns BB */
3792 name_len = strnlen(searchName, PATH_MAX);
3793 name_len++; /* trailing null */
3794 strncpy(pSMB->FileName, searchName, name_len);
3797 params = 2 /* level */ + 4 /* rsrvd */ + name_len /* incl null */ ;
3798 pSMB->TotalDataCount = 0;
3799 pSMB->MaxParameterCount = cpu_to_le16(2);
3800 /* BB find exact max data count below from sess structure BB */
3801 pSMB->MaxDataCount = cpu_to_le16(4000);
3802 pSMB->MaxSetupCount = 0;
3806 pSMB->Reserved2 = 0;
3807 pSMB->ParameterOffset = cpu_to_le16(offsetof(
3808 struct smb_com_transaction2_qpi_req, InformationLevel) - 4);
3809 pSMB->DataCount = 0;
3810 pSMB->DataOffset = 0;
3811 pSMB->SetupCount = 1;
3812 pSMB->Reserved3 = 0;
3813 pSMB->SubCommand = cpu_to_le16(TRANS2_QUERY_PATH_INFORMATION);
3814 byte_count = params + 1 /* pad */ ;
3815 pSMB->TotalParameterCount = cpu_to_le16(params);
3816 pSMB->ParameterCount = pSMB->TotalParameterCount;
3817 pSMB->InformationLevel = cpu_to_le16(SMB_QUERY_FILE_INTERNAL_INFO);
3818 pSMB->Reserved4 = 0;
3819 pSMB->hdr.smb_buf_length += byte_count;
3820 pSMB->ByteCount = cpu_to_le16(byte_count);
3822 rc = SendReceive(xid, tcon->ses, (struct smb_hdr *) pSMB,
3823 (struct smb_hdr *) pSMBr, &bytes_returned, 0);
3825 cFYI(1, ("error %d in QueryInternalInfo", rc));
3827 /* decode response */
3828 rc = validate_t2((struct smb_t2_rsp *)pSMBr);
3829 if (rc || (pSMBr->ByteCount < 2))
3830 /* BB also check enough total bytes returned */
3831 /* If rc should we check for EOPNOSUPP and
3832 disable the srvino flag? or in caller? */
3833 rc = -EIO; /* bad smb */
3835 __u16 data_offset = le16_to_cpu(pSMBr->t2.DataOffset);
3836 __u16 count = le16_to_cpu(pSMBr->t2.DataCount);
3837 struct file_internal_info *pfinfo;
3838 /* BB Do we need a cast or hash here ? */
3840 cFYI(1, ("Illegal size ret in QryIntrnlInf"));
3842 goto GetInodeNumOut;
3844 pfinfo = (struct file_internal_info *)
3845 (data_offset + (char *) &pSMBr->hdr.Protocol);
3846 *inode_number = pfinfo->UniqueId;
3850 cifs_buf_release(pSMB);
3852 goto GetInodeNumberRetry;
3857 CIFSGetDFSRefer(const int xid, struct cifsSesInfo *ses,
3858 const unsigned char *searchName,
3859 unsigned char **targetUNCs,
3860 unsigned int *number_of_UNC_in_array,
3861 const struct nls_table *nls_codepage, int remap)
3863 /* TRANS2_GET_DFS_REFERRAL */
3864 TRANSACTION2_GET_DFS_REFER_REQ *pSMB = NULL;
3865 TRANSACTION2_GET_DFS_REFER_RSP *pSMBr = NULL;
3866 struct dfs_referral_level_3 *referrals = NULL;
3872 __u16 params, byte_count;
3873 *number_of_UNC_in_array = 0;
3876 cFYI(1, ("In GetDFSRefer the path %s", searchName));
3880 rc = smb_init(SMB_COM_TRANSACTION2, 15, NULL, (void **) &pSMB,
3885 /* server pointer checked in called function,
3886 but should never be null here anyway */
3887 pSMB->hdr.Mid = GetNextMid(ses->server);
3888 pSMB->hdr.Tid = ses->ipc_tid;
3889 pSMB->hdr.Uid = ses->Suid;
3890 if (ses->capabilities & CAP_STATUS32)
3891 pSMB->hdr.Flags2 |= SMBFLG2_ERR_STATUS;
3892 if (ses->capabilities & CAP_DFS)
3893 pSMB->hdr.Flags2 |= SMBFLG2_DFS;
3895 if (ses->capabilities & CAP_UNICODE) {
3896 pSMB->hdr.Flags2 |= SMBFLG2_UNICODE;
3898 cifsConvertToUCS((__le16 *) pSMB->RequestFileName,
3899 searchName, PATH_MAX, nls_codepage, remap);
3900 name_len++; /* trailing null */
3902 } else { /* BB improve the check for buffer overruns BB */
3903 name_len = strnlen(searchName, PATH_MAX);
3904 name_len++; /* trailing null */
3905 strncpy(pSMB->RequestFileName, searchName, name_len);
3909 if (ses->server->secMode &
3910 (SECMODE_SIGN_REQUIRED | SECMODE_SIGN_ENABLED))
3911 pSMB->hdr.Flags2 |= SMBFLG2_SECURITY_SIGNATURE;
3914 pSMB->hdr.Uid = ses->Suid;
3916 params = 2 /* level */ + name_len /*includes null */ ;
3917 pSMB->TotalDataCount = 0;
3918 pSMB->DataCount = 0;
3919 pSMB->DataOffset = 0;
3920 pSMB->MaxParameterCount = 0;
3921 pSMB->MaxDataCount = cpu_to_le16(4000); /* BB find exact max SMB PDU from sess structure BB */
3922 pSMB->MaxSetupCount = 0;
3926 pSMB->Reserved2 = 0;
3927 pSMB->ParameterOffset = cpu_to_le16(offsetof(
3928 struct smb_com_transaction2_get_dfs_refer_req, MaxReferralLevel) - 4);
3929 pSMB->SetupCount = 1;
3930 pSMB->Reserved3 = 0;
3931 pSMB->SubCommand = cpu_to_le16(TRANS2_GET_DFS_REFERRAL);
3932 byte_count = params + 3 /* pad */ ;
3933 pSMB->ParameterCount = cpu_to_le16(params);
3934 pSMB->TotalParameterCount = pSMB->ParameterCount;
3935 pSMB->MaxReferralLevel = cpu_to_le16(3);
3936 pSMB->hdr.smb_buf_length += byte_count;
3937 pSMB->ByteCount = cpu_to_le16(byte_count);
3939 rc = SendReceive(xid, ses, (struct smb_hdr *) pSMB,
3940 (struct smb_hdr *) pSMBr, &bytes_returned, 0);
3942 cFYI(1, ("Send error in GetDFSRefer = %d", rc));
3943 } else { /* decode response */
3944 /* BB Add logic to parse referrals here */
3945 rc = validate_t2((struct smb_t2_rsp *)pSMBr);
3947 /* BB Also check if enough total bytes returned? */
3948 if (rc || (pSMBr->ByteCount < 17))
3949 rc = -EIO; /* bad smb */
3951 __u16 data_offset = le16_to_cpu(pSMBr->t2.DataOffset);
3952 __u16 data_count = le16_to_cpu(pSMBr->t2.DataCount);
3955 ("Decoding GetDFSRefer response BCC: %d Offset %d",
3956 pSMBr->ByteCount, data_offset));
3958 (struct dfs_referral_level_3 *)
3959 (8 /* sizeof start of data block */ +
3961 (char *) &pSMBr->hdr.Protocol);
3962 cFYI(1, ("num_referrals: %d dfs flags: 0x%x ... \n"
3963 "for referral one refer size: 0x%x srv "
3964 "type: 0x%x refer flags: 0x%x ttl: 0x%x",
3965 le16_to_cpu(pSMBr->NumberOfReferrals),
3966 le16_to_cpu(pSMBr->DFSFlags),
3967 le16_to_cpu(referrals->ReferralSize),
3968 le16_to_cpu(referrals->ServerType),
3969 le16_to_cpu(referrals->ReferralFlags),
3970 le16_to_cpu(referrals->TimeToLive)));
3971 /* BB This field is actually two bytes in from start of
3972 data block so we could do safety check that DataBlock
3973 begins at address of pSMBr->NumberOfReferrals */
3974 *number_of_UNC_in_array =
3975 le16_to_cpu(pSMBr->NumberOfReferrals);
3977 /* BB Fix below so can return more than one referral */
3978 if (*number_of_UNC_in_array > 1)
3979 *number_of_UNC_in_array = 1;
3981 /* get the length of the strings describing refs */
3983 for (i = 0; i < *number_of_UNC_in_array; i++) {
3984 /* make sure that DfsPathOffset not past end */
3986 le16_to_cpu(referrals->DfsPathOffset);
3987 if (offset > data_count) {
3988 /* if invalid referral, stop here and do
3989 not try to copy any more */
3990 *number_of_UNC_in_array = i;
3993 temp = ((char *)referrals) + offset;
3995 if (pSMBr->hdr.Flags2 & SMBFLG2_UNICODE) {
3996 name_len += UniStrnlen((wchar_t *)temp,
3999 name_len += strnlen(temp, data_count);
4002 /* BB add check that referral pointer does
4003 not fall off end PDU */
4005 /* BB add check for name_len bigger than bcc */
4007 kmalloc(name_len+1+(*number_of_UNC_in_array),
4009 if (*targetUNCs == NULL) {
4013 /* copy the ref strings */
4014 referrals = (struct dfs_referral_level_3 *)
4015 (8 /* sizeof data hdr */ + data_offset +
4016 (char *) &pSMBr->hdr.Protocol);
4018 for (i = 0; i < *number_of_UNC_in_array; i++) {
4019 temp = ((char *)referrals) +
4020 le16_to_cpu(referrals->DfsPathOffset);
4021 if (pSMBr->hdr.Flags2 & SMBFLG2_UNICODE) {
4022 cifs_strfromUCS_le(*targetUNCs,
4027 strncpy(*targetUNCs, temp, name_len);
4029 /* BB update target_uncs pointers */
4039 cifs_buf_release(pSMB);
4047 /* Query File System Info such as free space to old servers such as Win 9x */
4049 SMBOldQFSInfo(const int xid, struct cifsTconInfo *tcon, struct kstatfs *FSData)
4051 /* level 0x01 SMB_QUERY_FILE_SYSTEM_INFO */
4052 TRANSACTION2_QFSI_REQ *pSMB = NULL;
4053 TRANSACTION2_QFSI_RSP *pSMBr = NULL;
4054 FILE_SYSTEM_ALLOC_INFO *response_data;
4056 int bytes_returned = 0;
4057 __u16 params, byte_count;
4059 cFYI(1, ("OldQFSInfo"));
4061 rc = smb_init(SMB_COM_TRANSACTION2, 15, tcon, (void **) &pSMB,
4066 params = 2; /* level */
4067 pSMB->TotalDataCount = 0;
4068 pSMB->MaxParameterCount = cpu_to_le16(2);
4069 pSMB->MaxDataCount = cpu_to_le16(1000);
4070 pSMB->MaxSetupCount = 0;
4074 pSMB->Reserved2 = 0;
4075 byte_count = params + 1 /* pad */ ;
4076 pSMB->TotalParameterCount = cpu_to_le16(params);
4077 pSMB->ParameterCount = pSMB->TotalParameterCount;
4078 pSMB->ParameterOffset = cpu_to_le16(offsetof(
4079 struct smb_com_transaction2_qfsi_req, InformationLevel) - 4);
4080 pSMB->DataCount = 0;
4081 pSMB->DataOffset = 0;
4082 pSMB->SetupCount = 1;
4083 pSMB->Reserved3 = 0;
4084 pSMB->SubCommand = cpu_to_le16(TRANS2_QUERY_FS_INFORMATION);
4085 pSMB->InformationLevel = cpu_to_le16(SMB_INFO_ALLOCATION);
4086 pSMB->hdr.smb_buf_length += byte_count;
4087 pSMB->ByteCount = cpu_to_le16(byte_count);
4089 rc = SendReceive(xid, tcon->ses, (struct smb_hdr *) pSMB,
4090 (struct smb_hdr *) pSMBr, &bytes_returned, 0);
4092 cFYI(1, ("Send error in QFSInfo = %d", rc));
4093 } else { /* decode response */
4094 rc = validate_t2((struct smb_t2_rsp *)pSMBr);
4096 if (rc || (pSMBr->ByteCount < 18))
4097 rc = -EIO; /* bad smb */
4099 __u16 data_offset = le16_to_cpu(pSMBr->t2.DataOffset);
4100 cFYI(1, ("qfsinf resp BCC: %d Offset %d",
4101 pSMBr->ByteCount, data_offset));
4103 response_data = (FILE_SYSTEM_ALLOC_INFO *)
4104 (((char *) &pSMBr->hdr.Protocol) + data_offset);
4106 le16_to_cpu(response_data->BytesPerSector) *
4107 le32_to_cpu(response_data->
4108 SectorsPerAllocationUnit);
4110 le32_to_cpu(response_data->TotalAllocationUnits);
4111 FSData->f_bfree = FSData->f_bavail =
4112 le32_to_cpu(response_data->FreeAllocationUnits);
4114 ("Blocks: %lld Free: %lld Block size %ld",
4115 (unsigned long long)FSData->f_blocks,
4116 (unsigned long long)FSData->f_bfree,
4120 cifs_buf_release(pSMB);
4123 goto oldQFSInfoRetry;
4129 CIFSSMBQFSInfo(const int xid, struct cifsTconInfo *tcon, struct kstatfs *FSData)
4131 /* level 0x103 SMB_QUERY_FILE_SYSTEM_INFO */
4132 TRANSACTION2_QFSI_REQ *pSMB = NULL;
4133 TRANSACTION2_QFSI_RSP *pSMBr = NULL;
4134 FILE_SYSTEM_INFO *response_data;
4136 int bytes_returned = 0;
4137 __u16 params, byte_count;
4139 cFYI(1, ("In QFSInfo"));
4141 rc = smb_init(SMB_COM_TRANSACTION2, 15, tcon, (void **) &pSMB,
4146 params = 2; /* level */
4147 pSMB->TotalDataCount = 0;
4148 pSMB->MaxParameterCount = cpu_to_le16(2);
4149 pSMB->MaxDataCount = cpu_to_le16(1000);
4150 pSMB->MaxSetupCount = 0;
4154 pSMB->Reserved2 = 0;
4155 byte_count = params + 1 /* pad */ ;
4156 pSMB->TotalParameterCount = cpu_to_le16(params);
4157 pSMB->ParameterCount = pSMB->TotalParameterCount;
4158 pSMB->ParameterOffset = cpu_to_le16(offsetof(
4159 struct smb_com_transaction2_qfsi_req, InformationLevel) - 4);
4160 pSMB->DataCount = 0;
4161 pSMB->DataOffset = 0;
4162 pSMB->SetupCount = 1;
4163 pSMB->Reserved3 = 0;
4164 pSMB->SubCommand = cpu_to_le16(TRANS2_QUERY_FS_INFORMATION);
4165 pSMB->InformationLevel = cpu_to_le16(SMB_QUERY_FS_SIZE_INFO);
4166 pSMB->hdr.smb_buf_length += byte_count;
4167 pSMB->ByteCount = cpu_to_le16(byte_count);
4169 rc = SendReceive(xid, tcon->ses, (struct smb_hdr *) pSMB,
4170 (struct smb_hdr *) pSMBr, &bytes_returned, 0);
4172 cFYI(1, ("Send error in QFSInfo = %d", rc));
4173 } else { /* decode response */
4174 rc = validate_t2((struct smb_t2_rsp *)pSMBr);
4176 if (rc || (pSMBr->ByteCount < 24))
4177 rc = -EIO; /* bad smb */
4179 __u16 data_offset = le16_to_cpu(pSMBr->t2.DataOffset);
4183 *) (((char *) &pSMBr->hdr.Protocol) +
4186 le32_to_cpu(response_data->BytesPerSector) *
4187 le32_to_cpu(response_data->
4188 SectorsPerAllocationUnit);
4190 le64_to_cpu(response_data->TotalAllocationUnits);
4191 FSData->f_bfree = FSData->f_bavail =
4192 le64_to_cpu(response_data->FreeAllocationUnits);
4194 ("Blocks: %lld Free: %lld Block size %ld",
4195 (unsigned long long)FSData->f_blocks,
4196 (unsigned long long)FSData->f_bfree,
4200 cifs_buf_release(pSMB);
4209 CIFSSMBQFSAttributeInfo(const int xid, struct cifsTconInfo *tcon)
4211 /* level 0x105 SMB_QUERY_FILE_SYSTEM_INFO */
4212 TRANSACTION2_QFSI_REQ *pSMB = NULL;
4213 TRANSACTION2_QFSI_RSP *pSMBr = NULL;
4214 FILE_SYSTEM_ATTRIBUTE_INFO *response_data;
4216 int bytes_returned = 0;
4217 __u16 params, byte_count;
4219 cFYI(1, ("In QFSAttributeInfo"));
4221 rc = smb_init(SMB_COM_TRANSACTION2, 15, tcon, (void **) &pSMB,
4226 params = 2; /* level */
4227 pSMB->TotalDataCount = 0;
4228 pSMB->MaxParameterCount = cpu_to_le16(2);
4229 pSMB->MaxDataCount = cpu_to_le16(1000); /* BB find exact max SMB PDU from sess structure BB */
4230 pSMB->MaxSetupCount = 0;
4234 pSMB->Reserved2 = 0;
4235 byte_count = params + 1 /* pad */ ;
4236 pSMB->TotalParameterCount = cpu_to_le16(params);
4237 pSMB->ParameterCount = pSMB->TotalParameterCount;
4238 pSMB->ParameterOffset = cpu_to_le16(offsetof(
4239 struct smb_com_transaction2_qfsi_req, InformationLevel) - 4);
4240 pSMB->DataCount = 0;
4241 pSMB->DataOffset = 0;
4242 pSMB->SetupCount = 1;
4243 pSMB->Reserved3 = 0;
4244 pSMB->SubCommand = cpu_to_le16(TRANS2_QUERY_FS_INFORMATION);
4245 pSMB->InformationLevel = cpu_to_le16(SMB_QUERY_FS_ATTRIBUTE_INFO);
4246 pSMB->hdr.smb_buf_length += byte_count;
4247 pSMB->ByteCount = cpu_to_le16(byte_count);
4249 rc = SendReceive(xid, tcon->ses, (struct smb_hdr *) pSMB,
4250 (struct smb_hdr *) pSMBr, &bytes_returned, 0);
4252 cERROR(1, ("Send error in QFSAttributeInfo = %d", rc));
4253 } else { /* decode response */
4254 rc = validate_t2((struct smb_t2_rsp *)pSMBr);
4256 if (rc || (pSMBr->ByteCount < 13)) {
4257 /* BB also check if enough bytes returned */
4258 rc = -EIO; /* bad smb */
4260 __u16 data_offset = le16_to_cpu(pSMBr->t2.DataOffset);
4262 (FILE_SYSTEM_ATTRIBUTE_INFO
4263 *) (((char *) &pSMBr->hdr.Protocol) +
4265 memcpy(&tcon->fsAttrInfo, response_data,
4266 sizeof(FILE_SYSTEM_ATTRIBUTE_INFO));
4269 cifs_buf_release(pSMB);
4272 goto QFSAttributeRetry;
4278 CIFSSMBQFSDeviceInfo(const int xid, struct cifsTconInfo *tcon)
4280 /* level 0x104 SMB_QUERY_FILE_SYSTEM_INFO */
4281 TRANSACTION2_QFSI_REQ *pSMB = NULL;
4282 TRANSACTION2_QFSI_RSP *pSMBr = NULL;
4283 FILE_SYSTEM_DEVICE_INFO *response_data;
4285 int bytes_returned = 0;
4286 __u16 params, byte_count;
4288 cFYI(1, ("In QFSDeviceInfo"));
4290 rc = smb_init(SMB_COM_TRANSACTION2, 15, tcon, (void **) &pSMB,
4295 params = 2; /* level */
4296 pSMB->TotalDataCount = 0;
4297 pSMB->MaxParameterCount = cpu_to_le16(2);
4298 pSMB->MaxDataCount = cpu_to_le16(1000); /* BB find exact max SMB PDU from sess structure BB */
4299 pSMB->MaxSetupCount = 0;
4303 pSMB->Reserved2 = 0;
4304 byte_count = params + 1 /* pad */ ;
4305 pSMB->TotalParameterCount = cpu_to_le16(params);
4306 pSMB->ParameterCount = pSMB->TotalParameterCount;
4307 pSMB->ParameterOffset = cpu_to_le16(offsetof(
4308 struct smb_com_transaction2_qfsi_req, InformationLevel) - 4);
4310 pSMB->DataCount = 0;
4311 pSMB->DataOffset = 0;
4312 pSMB->SetupCount = 1;
4313 pSMB->Reserved3 = 0;
4314 pSMB->SubCommand = cpu_to_le16(TRANS2_QUERY_FS_INFORMATION);
4315 pSMB->InformationLevel = cpu_to_le16(SMB_QUERY_FS_DEVICE_INFO);
4316 pSMB->hdr.smb_buf_length += byte_count;
4317 pSMB->ByteCount = cpu_to_le16(byte_count);
4319 rc = SendReceive(xid, tcon->ses, (struct smb_hdr *) pSMB,
4320 (struct smb_hdr *) pSMBr, &bytes_returned, 0);
4322 cFYI(1, ("Send error in QFSDeviceInfo = %d", rc));
4323 } else { /* decode response */
4324 rc = validate_t2((struct smb_t2_rsp *)pSMBr);
4326 if (rc || (pSMBr->ByteCount < sizeof (FILE_SYSTEM_DEVICE_INFO)))
4327 rc = -EIO; /* bad smb */
4329 __u16 data_offset = le16_to_cpu(pSMBr->t2.DataOffset);
4331 (FILE_SYSTEM_DEVICE_INFO *)
4332 (((char *) &pSMBr->hdr.Protocol) +
4334 memcpy(&tcon->fsDevInfo, response_data,
4335 sizeof(FILE_SYSTEM_DEVICE_INFO));
4338 cifs_buf_release(pSMB);
4341 goto QFSDeviceRetry;
4347 CIFSSMBQFSUnixInfo(const int xid, struct cifsTconInfo *tcon)
4349 /* level 0x200 SMB_QUERY_CIFS_UNIX_INFO */
4350 TRANSACTION2_QFSI_REQ *pSMB = NULL;
4351 TRANSACTION2_QFSI_RSP *pSMBr = NULL;
4352 FILE_SYSTEM_UNIX_INFO *response_data;
4354 int bytes_returned = 0;
4355 __u16 params, byte_count;
4357 cFYI(1, ("In QFSUnixInfo"));
4359 rc = smb_init(SMB_COM_TRANSACTION2, 15, tcon, (void **) &pSMB,
4364 params = 2; /* level */
4365 pSMB->TotalDataCount = 0;
4366 pSMB->DataCount = 0;
4367 pSMB->DataOffset = 0;
4368 pSMB->MaxParameterCount = cpu_to_le16(2);
4369 pSMB->MaxDataCount = cpu_to_le16(100); /* BB find exact max SMB PDU from sess structure BB */
4370 pSMB->MaxSetupCount = 0;
4374 pSMB->Reserved2 = 0;
4375 byte_count = params + 1 /* pad */ ;
4376 pSMB->ParameterCount = cpu_to_le16(params);
4377 pSMB->TotalParameterCount = pSMB->ParameterCount;
4378 pSMB->ParameterOffset = cpu_to_le16(offsetof(struct
4379 smb_com_transaction2_qfsi_req, InformationLevel) - 4);
4380 pSMB->SetupCount = 1;
4381 pSMB->Reserved3 = 0;
4382 pSMB->SubCommand = cpu_to_le16(TRANS2_QUERY_FS_INFORMATION);
4383 pSMB->InformationLevel = cpu_to_le16(SMB_QUERY_CIFS_UNIX_INFO);
4384 pSMB->hdr.smb_buf_length += byte_count;
4385 pSMB->ByteCount = cpu_to_le16(byte_count);
4387 rc = SendReceive(xid, tcon->ses, (struct smb_hdr *) pSMB,
4388 (struct smb_hdr *) pSMBr, &bytes_returned, 0);
4390 cERROR(1, ("Send error in QFSUnixInfo = %d", rc));
4391 } else { /* decode response */
4392 rc = validate_t2((struct smb_t2_rsp *)pSMBr);
4394 if (rc || (pSMBr->ByteCount < 13)) {
4395 rc = -EIO; /* bad smb */
4397 __u16 data_offset = le16_to_cpu(pSMBr->t2.DataOffset);
4399 (FILE_SYSTEM_UNIX_INFO
4400 *) (((char *) &pSMBr->hdr.Protocol) +
4402 memcpy(&tcon->fsUnixInfo, response_data,
4403 sizeof(FILE_SYSTEM_UNIX_INFO));
4406 cifs_buf_release(pSMB);
4416 CIFSSMBSetFSUnixInfo(const int xid, struct cifsTconInfo *tcon, __u64 cap)
4418 /* level 0x200 SMB_SET_CIFS_UNIX_INFO */
4419 TRANSACTION2_SETFSI_REQ *pSMB = NULL;
4420 TRANSACTION2_SETFSI_RSP *pSMBr = NULL;
4422 int bytes_returned = 0;
4423 __u16 params, param_offset, offset, byte_count;
4425 cFYI(1, ("In SETFSUnixInfo"));
4427 /* BB switch to small buf init to save memory */
4428 rc = smb_init(SMB_COM_TRANSACTION2, 15, tcon, (void **) &pSMB,
4433 params = 4; /* 2 bytes zero followed by info level. */
4434 pSMB->MaxSetupCount = 0;
4438 pSMB->Reserved2 = 0;
4439 param_offset = offsetof(struct smb_com_transaction2_setfsi_req, FileNum)
4441 offset = param_offset + params;
4443 pSMB->MaxParameterCount = cpu_to_le16(4);
4444 pSMB->MaxDataCount = cpu_to_le16(100); /* BB find exact max SMB PDU from sess structure BB */
4445 pSMB->SetupCount = 1;
4446 pSMB->Reserved3 = 0;
4447 pSMB->SubCommand = cpu_to_le16(TRANS2_SET_FS_INFORMATION);
4448 byte_count = 1 /* pad */ + params + 12;
4450 pSMB->DataCount = cpu_to_le16(12);
4451 pSMB->ParameterCount = cpu_to_le16(params);
4452 pSMB->TotalDataCount = pSMB->DataCount;
4453 pSMB->TotalParameterCount = pSMB->ParameterCount;
4454 pSMB->ParameterOffset = cpu_to_le16(param_offset);
4455 pSMB->DataOffset = cpu_to_le16(offset);
4459 pSMB->InformationLevel = cpu_to_le16(SMB_SET_CIFS_UNIX_INFO);
4462 pSMB->ClientUnixMajor = cpu_to_le16(CIFS_UNIX_MAJOR_VERSION);
4463 pSMB->ClientUnixMinor = cpu_to_le16(CIFS_UNIX_MINOR_VERSION);
4464 pSMB->ClientUnixCap = cpu_to_le64(cap);
4466 pSMB->hdr.smb_buf_length += byte_count;
4467 pSMB->ByteCount = cpu_to_le16(byte_count);
4469 rc = SendReceive(xid, tcon->ses, (struct smb_hdr *) pSMB,
4470 (struct smb_hdr *) pSMBr, &bytes_returned, 0);
4472 cERROR(1, ("Send error in SETFSUnixInfo = %d", rc));
4473 } else { /* decode response */
4474 rc = validate_t2((struct smb_t2_rsp *)pSMBr);
4476 rc = -EIO; /* bad smb */
4479 cifs_buf_release(pSMB);
4482 goto SETFSUnixRetry;
4490 CIFSSMBQFSPosixInfo(const int xid, struct cifsTconInfo *tcon,
4491 struct kstatfs *FSData)
4493 /* level 0x201 SMB_QUERY_CIFS_POSIX_INFO */
4494 TRANSACTION2_QFSI_REQ *pSMB = NULL;
4495 TRANSACTION2_QFSI_RSP *pSMBr = NULL;
4496 FILE_SYSTEM_POSIX_INFO *response_data;
4498 int bytes_returned = 0;
4499 __u16 params, byte_count;
4501 cFYI(1, ("In QFSPosixInfo"));
4503 rc = smb_init(SMB_COM_TRANSACTION2, 15, tcon, (void **) &pSMB,
4508 params = 2; /* level */
4509 pSMB->TotalDataCount = 0;
4510 pSMB->DataCount = 0;
4511 pSMB->DataOffset = 0;
4512 pSMB->MaxParameterCount = cpu_to_le16(2);
4513 pSMB->MaxDataCount = cpu_to_le16(100); /* BB find exact max SMB PDU from sess structure BB */
4514 pSMB->MaxSetupCount = 0;
4518 pSMB->Reserved2 = 0;
4519 byte_count = params + 1 /* pad */ ;
4520 pSMB->ParameterCount = cpu_to_le16(params);
4521 pSMB->TotalParameterCount = pSMB->ParameterCount;
4522 pSMB->ParameterOffset = cpu_to_le16(offsetof(struct
4523 smb_com_transaction2_qfsi_req, InformationLevel) - 4);
4524 pSMB->SetupCount = 1;
4525 pSMB->Reserved3 = 0;
4526 pSMB->SubCommand = cpu_to_le16(TRANS2_QUERY_FS_INFORMATION);
4527 pSMB->InformationLevel = cpu_to_le16(SMB_QUERY_POSIX_FS_INFO);
4528 pSMB->hdr.smb_buf_length += byte_count;
4529 pSMB->ByteCount = cpu_to_le16(byte_count);
4531 rc = SendReceive(xid, tcon->ses, (struct smb_hdr *) pSMB,
4532 (struct smb_hdr *) pSMBr, &bytes_returned, 0);
4534 cFYI(1, ("Send error in QFSUnixInfo = %d", rc));
4535 } else { /* decode response */
4536 rc = validate_t2((struct smb_t2_rsp *)pSMBr);
4538 if (rc || (pSMBr->ByteCount < 13)) {
4539 rc = -EIO; /* bad smb */
4541 __u16 data_offset = le16_to_cpu(pSMBr->t2.DataOffset);
4543 (FILE_SYSTEM_POSIX_INFO
4544 *) (((char *) &pSMBr->hdr.Protocol) +
4547 le32_to_cpu(response_data->BlockSize);
4549 le64_to_cpu(response_data->TotalBlocks);
4551 le64_to_cpu(response_data->BlocksAvail);
4552 if (response_data->UserBlocksAvail == cpu_to_le64(-1)) {
4553 FSData->f_bavail = FSData->f_bfree;
4556 le64_to_cpu(response_data->UserBlocksAvail);
4558 if (response_data->TotalFileNodes != cpu_to_le64(-1))
4560 le64_to_cpu(response_data->TotalFileNodes);
4561 if (response_data->FreeFileNodes != cpu_to_le64(-1))
4563 le64_to_cpu(response_data->FreeFileNodes);
4566 cifs_buf_release(pSMB);
4575 /* We can not use write of zero bytes trick to
4576 set file size due to need for large file support. Also note that
4577 this SetPathInfo is preferred to SetFileInfo based method in next
4578 routine which is only needed to work around a sharing violation bug
4579 in Samba which this routine can run into */
4582 CIFSSMBSetEOF(const int xid, struct cifsTconInfo *tcon, const char *fileName,
4583 __u64 size, int SetAllocation,
4584 const struct nls_table *nls_codepage, int remap)
4586 struct smb_com_transaction2_spi_req *pSMB = NULL;
4587 struct smb_com_transaction2_spi_rsp *pSMBr = NULL;
4588 struct file_end_of_file_info *parm_data;
4591 int bytes_returned = 0;
4592 __u16 params, byte_count, data_count, param_offset, offset;
4594 cFYI(1, ("In SetEOF"));
4596 rc = smb_init(SMB_COM_TRANSACTION2, 15, tcon, (void **) &pSMB,
4601 if (pSMB->hdr.Flags2 & SMBFLG2_UNICODE) {
4603 cifsConvertToUCS((__le16 *) pSMB->FileName, fileName,
4604 PATH_MAX, nls_codepage, remap);
4605 name_len++; /* trailing null */
4607 } else { /* BB improve the check for buffer overruns BB */
4608 name_len = strnlen(fileName, PATH_MAX);
4609 name_len++; /* trailing null */
4610 strncpy(pSMB->FileName, fileName, name_len);
4612 params = 6 + name_len;
4613 data_count = sizeof(struct file_end_of_file_info);
4614 pSMB->MaxParameterCount = cpu_to_le16(2);
4615 pSMB->MaxDataCount = cpu_to_le16(4100);
4616 pSMB->MaxSetupCount = 0;
4620 pSMB->Reserved2 = 0;
4621 param_offset = offsetof(struct smb_com_transaction2_spi_req,
4622 InformationLevel) - 4;
4623 offset = param_offset + params;
4624 if (SetAllocation) {
4625 if (tcon->ses->capabilities & CAP_INFOLEVEL_PASSTHRU)
4626 pSMB->InformationLevel =
4627 cpu_to_le16(SMB_SET_FILE_ALLOCATION_INFO2);
4629 pSMB->InformationLevel =
4630 cpu_to_le16(SMB_SET_FILE_ALLOCATION_INFO);
4631 } else /* Set File Size */ {
4632 if (tcon->ses->capabilities & CAP_INFOLEVEL_PASSTHRU)
4633 pSMB->InformationLevel =
4634 cpu_to_le16(SMB_SET_FILE_END_OF_FILE_INFO2);
4636 pSMB->InformationLevel =
4637 cpu_to_le16(SMB_SET_FILE_END_OF_FILE_INFO);
4641 (struct file_end_of_file_info *) (((char *) &pSMB->hdr.Protocol) +
4643 pSMB->ParameterOffset = cpu_to_le16(param_offset);
4644 pSMB->DataOffset = cpu_to_le16(offset);
4645 pSMB->SetupCount = 1;
4646 pSMB->Reserved3 = 0;
4647 pSMB->SubCommand = cpu_to_le16(TRANS2_SET_PATH_INFORMATION);
4648 byte_count = 3 /* pad */ + params + data_count;
4649 pSMB->DataCount = cpu_to_le16(data_count);
4650 pSMB->TotalDataCount = pSMB->DataCount;
4651 pSMB->ParameterCount = cpu_to_le16(params);
4652 pSMB->TotalParameterCount = pSMB->ParameterCount;
4653 pSMB->Reserved4 = 0;
4654 pSMB->hdr.smb_buf_length += byte_count;
4655 parm_data->FileSize = cpu_to_le64(size);
4656 pSMB->ByteCount = cpu_to_le16(byte_count);
4657 rc = SendReceive(xid, tcon->ses, (struct smb_hdr *) pSMB,
4658 (struct smb_hdr *) pSMBr, &bytes_returned, 0);
4660 cFYI(1, ("SetPathInfo (file size) returned %d", rc));
4663 cifs_buf_release(pSMB);
4672 CIFSSMBSetFileSize(const int xid, struct cifsTconInfo *tcon, __u64 size,
4673 __u16 fid, __u32 pid_of_opener, int SetAllocation)
4675 struct smb_com_transaction2_sfi_req *pSMB = NULL;
4676 struct smb_com_transaction2_sfi_rsp *pSMBr = NULL;
4678 struct file_end_of_file_info *parm_data;
4680 int bytes_returned = 0;
4681 __u16 params, param_offset, offset, byte_count, count;
4683 cFYI(1, ("SetFileSize (via SetFileInfo) %lld",
4685 rc = small_smb_init(SMB_COM_TRANSACTION2, 15, tcon, (void **) &pSMB);
4690 pSMBr = (struct smb_com_transaction2_sfi_rsp *)pSMB;
4692 pSMB->hdr.Pid = cpu_to_le16((__u16)pid_of_opener);
4693 pSMB->hdr.PidHigh = cpu_to_le16((__u16)(pid_of_opener >> 16));
4696 pSMB->MaxSetupCount = 0;
4700 pSMB->Reserved2 = 0;
4701 param_offset = offsetof(struct smb_com_transaction2_sfi_req, Fid) - 4;
4702 offset = param_offset + params;
4704 data_offset = (char *) (&pSMB->hdr.Protocol) + offset;
4706 count = sizeof(struct file_end_of_file_info);
4707 pSMB->MaxParameterCount = cpu_to_le16(2);
4708 pSMB->MaxDataCount = cpu_to_le16(1000); /* BB find max SMB PDU from sess */
4709 pSMB->SetupCount = 1;
4710 pSMB->Reserved3 = 0;
4711 pSMB->SubCommand = cpu_to_le16(TRANS2_SET_FILE_INFORMATION);
4712 byte_count = 3 /* pad */ + params + count;
4713 pSMB->DataCount = cpu_to_le16(count);
4714 pSMB->ParameterCount = cpu_to_le16(params);
4715 pSMB->TotalDataCount = pSMB->DataCount;
4716 pSMB->TotalParameterCount = pSMB->ParameterCount;
4717 pSMB->ParameterOffset = cpu_to_le16(param_offset);
4719 (struct file_end_of_file_info *) (((char *) &pSMB->hdr.Protocol)
4721 pSMB->DataOffset = cpu_to_le16(offset);
4722 parm_data->FileSize = cpu_to_le64(size);
4724 if (SetAllocation) {
4725 if (tcon->ses->capabilities & CAP_INFOLEVEL_PASSTHRU)
4726 pSMB->InformationLevel =
4727 cpu_to_le16(SMB_SET_FILE_ALLOCATION_INFO2);
4729 pSMB->InformationLevel =
4730 cpu_to_le16(SMB_SET_FILE_ALLOCATION_INFO);
4731 } else /* Set File Size */ {
4732 if (tcon->ses->capabilities & CAP_INFOLEVEL_PASSTHRU)
4733 pSMB->InformationLevel =
4734 cpu_to_le16(SMB_SET_FILE_END_OF_FILE_INFO2);
4736 pSMB->InformationLevel =
4737 cpu_to_le16(SMB_SET_FILE_END_OF_FILE_INFO);
4739 pSMB->Reserved4 = 0;
4740 pSMB->hdr.smb_buf_length += byte_count;
4741 pSMB->ByteCount = cpu_to_le16(byte_count);
4742 rc = SendReceive(xid, tcon->ses, (struct smb_hdr *) pSMB,
4743 (struct smb_hdr *) pSMBr, &bytes_returned, 0);
4746 ("Send error in SetFileInfo (SetFileSize) = %d",
4751 cifs_small_buf_release(pSMB);
4753 /* Note: On -EAGAIN error only caller can retry on handle based calls
4754 since file handle passed in no longer valid */
4759 /* Some legacy servers such as NT4 require that the file times be set on
4760 an open handle, rather than by pathname - this is awkward due to
4761 potential access conflicts on the open, but it is unavoidable for these
4762 old servers since the only other choice is to go from 100 nanosecond DCE
4763 time and resort to the original setpathinfo level which takes the ancient
4764 DOS time format with 2 second granularity */
4766 CIFSSMBSetFileTimes(const int xid, struct cifsTconInfo *tcon,
4767 const FILE_BASIC_INFO *data, __u16 fid)
4769 struct smb_com_transaction2_sfi_req *pSMB = NULL;
4770 struct smb_com_transaction2_sfi_rsp *pSMBr = NULL;
4773 int bytes_returned = 0;
4774 __u16 params, param_offset, offset, byte_count, count;
4776 cFYI(1, ("Set Times (via SetFileInfo)"));
4777 rc = small_smb_init(SMB_COM_TRANSACTION2, 15, tcon, (void **) &pSMB);
4782 pSMBr = (struct smb_com_transaction2_sfi_rsp *)pSMB;
4784 /* At this point there is no need to override the current pid
4785 with the pid of the opener, but that could change if we someday
4786 use an existing handle (rather than opening one on the fly) */
4787 /* pSMB->hdr.Pid = cpu_to_le16((__u16)pid_of_opener);
4788 pSMB->hdr.PidHigh = cpu_to_le16((__u16)(pid_of_opener >> 16));*/
4791 pSMB->MaxSetupCount = 0;
4795 pSMB->Reserved2 = 0;
4796 param_offset = offsetof(struct smb_com_transaction2_sfi_req, Fid) - 4;
4797 offset = param_offset + params;
4799 data_offset = (char *) (&pSMB->hdr.Protocol) + offset;
4801 count = sizeof(FILE_BASIC_INFO);
4802 pSMB->MaxParameterCount = cpu_to_le16(2);
4803 pSMB->MaxDataCount = cpu_to_le16(1000); /* BB find max SMB PDU from sess */
4804 pSMB->SetupCount = 1;
4805 pSMB->Reserved3 = 0;
4806 pSMB->SubCommand = cpu_to_le16(TRANS2_SET_FILE_INFORMATION);
4807 byte_count = 3 /* pad */ + params + count;
4808 pSMB->DataCount = cpu_to_le16(count);
4809 pSMB->ParameterCount = cpu_to_le16(params);
4810 pSMB->TotalDataCount = pSMB->DataCount;
4811 pSMB->TotalParameterCount = pSMB->ParameterCount;
4812 pSMB->ParameterOffset = cpu_to_le16(param_offset);
4813 pSMB->DataOffset = cpu_to_le16(offset);
4815 if (tcon->ses->capabilities & CAP_INFOLEVEL_PASSTHRU)
4816 pSMB->InformationLevel = cpu_to_le16(SMB_SET_FILE_BASIC_INFO2);
4818 pSMB->InformationLevel = cpu_to_le16(SMB_SET_FILE_BASIC_INFO);
4819 pSMB->Reserved4 = 0;
4820 pSMB->hdr.smb_buf_length += byte_count;
4821 pSMB->ByteCount = cpu_to_le16(byte_count);
4822 memcpy(data_offset, data, sizeof(FILE_BASIC_INFO));
4823 rc = SendReceive(xid, tcon->ses, (struct smb_hdr *) pSMB,
4824 (struct smb_hdr *) pSMBr, &bytes_returned, 0);
4826 cFYI(1, ("Send error in Set Time (SetFileInfo) = %d", rc));
4829 cifs_small_buf_release(pSMB);
4831 /* Note: On -EAGAIN error only caller can retry on handle based calls
4832 since file handle passed in no longer valid */
4839 CIFSSMBSetTimes(const int xid, struct cifsTconInfo *tcon, const char *fileName,
4840 const FILE_BASIC_INFO *data,
4841 const struct nls_table *nls_codepage, int remap)
4843 TRANSACTION2_SPI_REQ *pSMB = NULL;
4844 TRANSACTION2_SPI_RSP *pSMBr = NULL;
4847 int bytes_returned = 0;
4849 __u16 params, param_offset, offset, byte_count, count;
4851 cFYI(1, ("In SetTimes"));
4854 rc = smb_init(SMB_COM_TRANSACTION2, 15, tcon, (void **) &pSMB,
4859 if (pSMB->hdr.Flags2 & SMBFLG2_UNICODE) {
4861 cifsConvertToUCS((__le16 *) pSMB->FileName, fileName,
4862 PATH_MAX, nls_codepage, remap);
4863 name_len++; /* trailing null */
4865 } else { /* BB improve the check for buffer overruns BB */
4866 name_len = strnlen(fileName, PATH_MAX);
4867 name_len++; /* trailing null */
4868 strncpy(pSMB->FileName, fileName, name_len);
4871 params = 6 + name_len;
4872 count = sizeof(FILE_BASIC_INFO);
4873 pSMB->MaxParameterCount = cpu_to_le16(2);
4874 pSMB->MaxDataCount = cpu_to_le16(1000); /* BB find exact max SMB PDU from sess structure BB */
4875 pSMB->MaxSetupCount = 0;
4879 pSMB->Reserved2 = 0;
4880 param_offset = offsetof(struct smb_com_transaction2_spi_req,
4881 InformationLevel) - 4;
4882 offset = param_offset + params;
4883 data_offset = (char *) (&pSMB->hdr.Protocol) + offset;
4884 pSMB->ParameterOffset = cpu_to_le16(param_offset);
4885 pSMB->DataOffset = cpu_to_le16(offset);
4886 pSMB->SetupCount = 1;
4887 pSMB->Reserved3 = 0;
4888 pSMB->SubCommand = cpu_to_le16(TRANS2_SET_PATH_INFORMATION);
4889 byte_count = 3 /* pad */ + params + count;
4891 pSMB->DataCount = cpu_to_le16(count);
4892 pSMB->ParameterCount = cpu_to_le16(params);
4893 pSMB->TotalDataCount = pSMB->DataCount;
4894 pSMB->TotalParameterCount = pSMB->ParameterCount;
4895 if (tcon->ses->capabilities & CAP_INFOLEVEL_PASSTHRU)
4896 pSMB->InformationLevel = cpu_to_le16(SMB_SET_FILE_BASIC_INFO2);
4898 pSMB->InformationLevel = cpu_to_le16(SMB_SET_FILE_BASIC_INFO);
4899 pSMB->Reserved4 = 0;
4900 pSMB->hdr.smb_buf_length += byte_count;
4901 memcpy(data_offset, data, sizeof(FILE_BASIC_INFO));
4902 pSMB->ByteCount = cpu_to_le16(byte_count);
4903 rc = SendReceive(xid, tcon->ses, (struct smb_hdr *) pSMB,
4904 (struct smb_hdr *) pSMBr, &bytes_returned, 0);
4906 cFYI(1, ("SetPathInfo (times) returned %d", rc));
4909 cifs_buf_release(pSMB);
4917 /* Can not be used to set time stamps yet (due to old DOS time format) */
4918 /* Can be used to set attributes */
4919 #if 0 /* Possibly not needed - since it turns out that strangely NT4 has a bug
4920 handling it anyway and NT4 was what we thought it would be needed for
4921 Do not delete it until we prove whether needed for Win9x though */
4923 CIFSSMBSetAttrLegacy(int xid, struct cifsTconInfo *tcon, char *fileName,
4924 __u16 dos_attrs, const struct nls_table *nls_codepage)
4926 SETATTR_REQ *pSMB = NULL;
4927 SETATTR_RSP *pSMBr = NULL;
4932 cFYI(1, ("In SetAttrLegacy"));
4935 rc = smb_init(SMB_COM_SETATTR, 8, tcon, (void **) &pSMB,
4940 if (pSMB->hdr.Flags2 & SMBFLG2_UNICODE) {
4942 ConvertToUCS((__le16 *) pSMB->fileName, fileName,
4943 PATH_MAX, nls_codepage);
4944 name_len++; /* trailing null */
4946 } else { /* BB improve the check for buffer overruns BB */
4947 name_len = strnlen(fileName, PATH_MAX);
4948 name_len++; /* trailing null */
4949 strncpy(pSMB->fileName, fileName, name_len);
4951 pSMB->attr = cpu_to_le16(dos_attrs);
4952 pSMB->BufferFormat = 0x04;
4953 pSMB->hdr.smb_buf_length += name_len + 1;
4954 pSMB->ByteCount = cpu_to_le16(name_len + 1);
4955 rc = SendReceive(xid, tcon->ses, (struct smb_hdr *) pSMB,
4956 (struct smb_hdr *) pSMBr, &bytes_returned, 0);
4958 cFYI(1, ("Error in LegacySetAttr = %d", rc));
4961 cifs_buf_release(pSMB);
4964 goto SetAttrLgcyRetry;
4968 #endif /* temporarily unneeded SetAttr legacy function */
4971 CIFSSMBUnixSetPerms(const int xid, struct cifsTconInfo *tcon,
4972 char *fileName, __u64 mode, __u64 uid, __u64 gid,
4973 dev_t device, const struct nls_table *nls_codepage,
4976 TRANSACTION2_SPI_REQ *pSMB = NULL;
4977 TRANSACTION2_SPI_RSP *pSMBr = NULL;
4980 int bytes_returned = 0;
4981 FILE_UNIX_BASIC_INFO *data_offset;
4982 __u16 params, param_offset, offset, count, byte_count;
4984 cFYI(1, ("In SetUID/GID/Mode"));
4986 rc = smb_init(SMB_COM_TRANSACTION2, 15, tcon, (void **) &pSMB,
4991 if (pSMB->hdr.Flags2 & SMBFLG2_UNICODE) {
4993 cifsConvertToUCS((__le16 *) pSMB->FileName, fileName,
4994 PATH_MAX, nls_codepage, remap);
4995 name_len++; /* trailing null */
4997 } else { /* BB improve the check for buffer overruns BB */
4998 name_len = strnlen(fileName, PATH_MAX);
4999 name_len++; /* trailing null */
5000 strncpy(pSMB->FileName, fileName, name_len);
5003 params = 6 + name_len;
5004 count = sizeof(FILE_UNIX_BASIC_INFO);
5005 pSMB->MaxParameterCount = cpu_to_le16(2);
5006 pSMB->MaxDataCount = cpu_to_le16(1000); /* BB find exact max SMB PDU from sess structure BB */
5007 pSMB->MaxSetupCount = 0;
5011 pSMB->Reserved2 = 0;
5012 param_offset = offsetof(struct smb_com_transaction2_spi_req,
5013 InformationLevel) - 4;
5014 offset = param_offset + params;
5016 (FILE_UNIX_BASIC_INFO *) ((char *) &pSMB->hdr.Protocol +
5018 memset(data_offset, 0, count);
5019 pSMB->DataOffset = cpu_to_le16(offset);
5020 pSMB->ParameterOffset = cpu_to_le16(param_offset);
5021 pSMB->SetupCount = 1;
5022 pSMB->Reserved3 = 0;
5023 pSMB->SubCommand = cpu_to_le16(TRANS2_SET_PATH_INFORMATION);
5024 byte_count = 3 /* pad */ + params + count;
5025 pSMB->ParameterCount = cpu_to_le16(params);
5026 pSMB->DataCount = cpu_to_le16(count);
5027 pSMB->TotalParameterCount = pSMB->ParameterCount;
5028 pSMB->TotalDataCount = pSMB->DataCount;
5029 pSMB->InformationLevel = cpu_to_le16(SMB_SET_FILE_UNIX_BASIC);
5030 pSMB->Reserved4 = 0;
5031 pSMB->hdr.smb_buf_length += byte_count;
5032 /* Samba server ignores set of file size to zero due to bugs in some
5033 older clients, but we should be precise - we use SetFileSize to
5034 set file size and do not want to truncate file size to zero
5035 accidently as happened on one Samba server beta by putting
5036 zero instead of -1 here */
5037 data_offset->EndOfFile = NO_CHANGE_64;
5038 data_offset->NumOfBytes = NO_CHANGE_64;
5039 data_offset->LastStatusChange = NO_CHANGE_64;
5040 data_offset->LastAccessTime = NO_CHANGE_64;
5041 data_offset->LastModificationTime = NO_CHANGE_64;
5042 data_offset->Uid = cpu_to_le64(uid);
5043 data_offset->Gid = cpu_to_le64(gid);
5044 /* better to leave device as zero when it is */
5045 data_offset->DevMajor = cpu_to_le64(MAJOR(device));
5046 data_offset->DevMinor = cpu_to_le64(MINOR(device));
5047 data_offset->Permissions = cpu_to_le64(mode);
5050 data_offset->Type = cpu_to_le32(UNIX_FILE);
5051 else if (S_ISDIR(mode))
5052 data_offset->Type = cpu_to_le32(UNIX_DIR);
5053 else if (S_ISLNK(mode))
5054 data_offset->Type = cpu_to_le32(UNIX_SYMLINK);
5055 else if (S_ISCHR(mode))
5056 data_offset->Type = cpu_to_le32(UNIX_CHARDEV);
5057 else if (S_ISBLK(mode))
5058 data_offset->Type = cpu_to_le32(UNIX_BLOCKDEV);
5059 else if (S_ISFIFO(mode))
5060 data_offset->Type = cpu_to_le32(UNIX_FIFO);
5061 else if (S_ISSOCK(mode))
5062 data_offset->Type = cpu_to_le32(UNIX_SOCKET);
5065 pSMB->ByteCount = cpu_to_le16(byte_count);
5066 rc = SendReceive(xid, tcon->ses, (struct smb_hdr *) pSMB,
5067 (struct smb_hdr *) pSMBr, &bytes_returned, 0);
5069 cFYI(1, ("SetPathInfo (perms) returned %d", rc));
5073 cifs_buf_release(pSMB);
5079 int CIFSSMBNotify(const int xid, struct cifsTconInfo *tcon,
5080 const int notify_subdirs, const __u16 netfid,
5081 __u32 filter, struct file *pfile, int multishot,
5082 const struct nls_table *nls_codepage)
5085 struct smb_com_transaction_change_notify_req *pSMB = NULL;
5086 struct smb_com_ntransaction_change_notify_rsp *pSMBr = NULL;
5087 struct dir_notify_req *dnotify_req;
5090 cFYI(1, ("In CIFSSMBNotify for file handle %d", (int)netfid));
5091 rc = smb_init(SMB_COM_NT_TRANSACT, 23, tcon, (void **) &pSMB,
5096 pSMB->TotalParameterCount = 0 ;
5097 pSMB->TotalDataCount = 0;
5098 pSMB->MaxParameterCount = cpu_to_le32(2);
5099 /* BB find exact data count max from sess structure BB */
5100 pSMB->MaxDataCount = 0; /* same in little endian or be */
5101 /* BB VERIFY verify which is correct for above BB */
5102 pSMB->MaxDataCount = cpu_to_le32((tcon->ses->server->maxBuf -
5103 MAX_CIFS_HDR_SIZE) & 0xFFFFFF00);
5105 pSMB->MaxSetupCount = 4;
5107 pSMB->ParameterOffset = 0;
5108 pSMB->DataCount = 0;
5109 pSMB->DataOffset = 0;
5110 pSMB->SetupCount = 4; /* single byte does not need le conversion */
5111 pSMB->SubCommand = cpu_to_le16(NT_TRANSACT_NOTIFY_CHANGE);
5112 pSMB->ParameterCount = pSMB->TotalParameterCount;
5114 pSMB->WatchTree = 1; /* one byte - no le conversion needed */
5115 pSMB->Reserved2 = 0;
5116 pSMB->CompletionFilter = cpu_to_le32(filter);
5117 pSMB->Fid = netfid; /* file handle always le */
5118 pSMB->ByteCount = 0;
5120 rc = SendReceive(xid, tcon->ses, (struct smb_hdr *) pSMB,
5121 (struct smb_hdr *) pSMBr, &bytes_returned, -1);
5123 cFYI(1, ("Error in Notify = %d", rc));
5125 /* Add file to outstanding requests */
5126 /* BB change to kmem cache alloc */
5127 dnotify_req = kmalloc(
5128 sizeof(struct dir_notify_req),
5131 dnotify_req->Pid = pSMB->hdr.Pid;
5132 dnotify_req->PidHigh = pSMB->hdr.PidHigh;
5133 dnotify_req->Mid = pSMB->hdr.Mid;
5134 dnotify_req->Tid = pSMB->hdr.Tid;
5135 dnotify_req->Uid = pSMB->hdr.Uid;
5136 dnotify_req->netfid = netfid;
5137 dnotify_req->pfile = pfile;
5138 dnotify_req->filter = filter;
5139 dnotify_req->multishot = multishot;
5140 spin_lock(&GlobalMid_Lock);
5141 list_add_tail(&dnotify_req->lhead,
5142 &GlobalDnotifyReqList);
5143 spin_unlock(&GlobalMid_Lock);
5147 cifs_buf_release(pSMB);
5150 #ifdef CONFIG_CIFS_XATTR
5152 CIFSSMBQAllEAs(const int xid, struct cifsTconInfo *tcon,
5153 const unsigned char *searchName,
5154 char *EAData, size_t buf_size,
5155 const struct nls_table *nls_codepage, int remap)
5157 /* BB assumes one setup word */
5158 TRANSACTION2_QPI_REQ *pSMB = NULL;
5159 TRANSACTION2_QPI_RSP *pSMBr = NULL;
5163 struct fea *temp_fea;
5165 __u16 params, byte_count;
5167 cFYI(1, ("In Query All EAs path %s", searchName));
5169 rc = smb_init(SMB_COM_TRANSACTION2, 15, tcon, (void **) &pSMB,
5174 if (pSMB->hdr.Flags2 & SMBFLG2_UNICODE) {
5176 cifsConvertToUCS((__le16 *) pSMB->FileName, searchName,
5177 PATH_MAX, nls_codepage, remap);
5178 name_len++; /* trailing null */
5180 } else { /* BB improve the check for buffer overruns BB */
5181 name_len = strnlen(searchName, PATH_MAX);
5182 name_len++; /* trailing null */
5183 strncpy(pSMB->FileName, searchName, name_len);
5186 params = 2 /* level */ + 4 /* reserved */ + name_len /* includes NUL */;
5187 pSMB->TotalDataCount = 0;
5188 pSMB->MaxParameterCount = cpu_to_le16(2);
5189 pSMB->MaxDataCount = cpu_to_le16(4000); /* BB find exact max SMB PDU from sess structure BB */
5190 pSMB->MaxSetupCount = 0;
5194 pSMB->Reserved2 = 0;
5195 pSMB->ParameterOffset = cpu_to_le16(offsetof(
5196 struct smb_com_transaction2_qpi_req, InformationLevel) - 4);
5197 pSMB->DataCount = 0;
5198 pSMB->DataOffset = 0;
5199 pSMB->SetupCount = 1;
5200 pSMB->Reserved3 = 0;
5201 pSMB->SubCommand = cpu_to_le16(TRANS2_QUERY_PATH_INFORMATION);
5202 byte_count = params + 1 /* pad */ ;
5203 pSMB->TotalParameterCount = cpu_to_le16(params);
5204 pSMB->ParameterCount = pSMB->TotalParameterCount;
5205 pSMB->InformationLevel = cpu_to_le16(SMB_INFO_QUERY_ALL_EAS);
5206 pSMB->Reserved4 = 0;
5207 pSMB->hdr.smb_buf_length += byte_count;
5208 pSMB->ByteCount = cpu_to_le16(byte_count);
5210 rc = SendReceive(xid, tcon->ses, (struct smb_hdr *) pSMB,
5211 (struct smb_hdr *) pSMBr, &bytes_returned, 0);
5213 cFYI(1, ("Send error in QueryAllEAs = %d", rc));
5214 } else { /* decode response */
5215 rc = validate_t2((struct smb_t2_rsp *)pSMBr);
5217 /* BB also check enough total bytes returned */
5218 /* BB we need to improve the validity checking
5219 of these trans2 responses */
5220 if (rc || (pSMBr->ByteCount < 4))
5221 rc = -EIO; /* bad smb */
5222 /* else if (pFindData){
5223 memcpy((char *) pFindData,
5224 (char *) &pSMBr->hdr.Protocol +
5227 /* check that length of list is not more than bcc */
5228 /* check that each entry does not go beyond length
5230 /* check that each element of each entry does not
5231 go beyond end of list */
5232 __u16 data_offset = le16_to_cpu(pSMBr->t2.DataOffset);
5233 struct fealist *ea_response_data;
5235 /* validate_trans2_offsets() */
5236 /* BB check if start of smb + data_offset > &bcc+ bcc */
5237 ea_response_data = (struct fealist *)
5238 (((char *) &pSMBr->hdr.Protocol) +
5240 name_len = le32_to_cpu(ea_response_data->list_len);
5241 cFYI(1, ("ea length %d", name_len));
5242 if (name_len <= 8) {
5243 /* returned EA size zeroed at top of function */
5244 cFYI(1, ("empty EA list returned from server"));
5246 /* account for ea list len */
5248 temp_fea = ea_response_data->list;
5249 temp_ptr = (char *)temp_fea;
5250 while (name_len > 0) {
5254 rc += temp_fea->name_len;
5255 /* account for prefix user. and trailing null */
5257 if (rc < (int)buf_size) {
5258 memcpy(EAData, "user.", 5);
5260 memcpy(EAData, temp_ptr,
5261 temp_fea->name_len);
5262 EAData += temp_fea->name_len;
5263 /* null terminate name */
5265 EAData = EAData + 1;
5266 } else if (buf_size == 0) {
5267 /* skip copy - calc size only */
5269 /* stop before overrun buffer */
5273 name_len -= temp_fea->name_len;
5274 temp_ptr += temp_fea->name_len;
5275 /* account for trailing null */
5279 le16_to_cpu(temp_fea->value_len);
5280 name_len -= value_len;
5281 temp_ptr += value_len;
5282 /* BB check that temp_ptr is still
5285 /* no trailing null to account for
5287 /* go on to next EA */
5288 temp_fea = (struct fea *)temp_ptr;
5294 cifs_buf_release(pSMB);
5301 ssize_t CIFSSMBQueryEA(const int xid, struct cifsTconInfo *tcon,
5302 const unsigned char *searchName, const unsigned char *ea_name,
5303 unsigned char *ea_value, size_t buf_size,
5304 const struct nls_table *nls_codepage, int remap)
5306 TRANSACTION2_QPI_REQ *pSMB = NULL;
5307 TRANSACTION2_QPI_RSP *pSMBr = NULL;
5311 struct fea *temp_fea;
5313 __u16 params, byte_count;
5315 cFYI(1, ("In Query EA path %s", searchName));
5317 rc = smb_init(SMB_COM_TRANSACTION2, 15, tcon, (void **) &pSMB,
5322 if (pSMB->hdr.Flags2 & SMBFLG2_UNICODE) {
5324 cifsConvertToUCS((__le16 *) pSMB->FileName, searchName,
5325 PATH_MAX, nls_codepage, remap);
5326 name_len++; /* trailing null */
5328 } else { /* BB improve the check for buffer overruns BB */
5329 name_len = strnlen(searchName, PATH_MAX);
5330 name_len++; /* trailing null */
5331 strncpy(pSMB->FileName, searchName, name_len);
5334 params = 2 /* level */ + 4 /* reserved */ + name_len /* includes NUL */;
5335 pSMB->TotalDataCount = 0;
5336 pSMB->MaxParameterCount = cpu_to_le16(2);
5337 pSMB->MaxDataCount = cpu_to_le16(4000); /* BB find exact max SMB PDU from sess structure BB */
5338 pSMB->MaxSetupCount = 0;
5342 pSMB->Reserved2 = 0;
5343 pSMB->ParameterOffset = cpu_to_le16(offsetof(
5344 struct smb_com_transaction2_qpi_req, InformationLevel) - 4);
5345 pSMB->DataCount = 0;
5346 pSMB->DataOffset = 0;
5347 pSMB->SetupCount = 1;
5348 pSMB->Reserved3 = 0;
5349 pSMB->SubCommand = cpu_to_le16(TRANS2_QUERY_PATH_INFORMATION);
5350 byte_count = params + 1 /* pad */ ;
5351 pSMB->TotalParameterCount = cpu_to_le16(params);
5352 pSMB->ParameterCount = pSMB->TotalParameterCount;
5353 pSMB->InformationLevel = cpu_to_le16(SMB_INFO_QUERY_ALL_EAS);
5354 pSMB->Reserved4 = 0;
5355 pSMB->hdr.smb_buf_length += byte_count;
5356 pSMB->ByteCount = cpu_to_le16(byte_count);
5358 rc = SendReceive(xid, tcon->ses, (struct smb_hdr *) pSMB,
5359 (struct smb_hdr *) pSMBr, &bytes_returned, 0);
5361 cFYI(1, ("Send error in Query EA = %d", rc));
5362 } else { /* decode response */
5363 rc = validate_t2((struct smb_t2_rsp *)pSMBr);
5365 /* BB also check enough total bytes returned */
5366 /* BB we need to improve the validity checking
5367 of these trans2 responses */
5368 if (rc || (pSMBr->ByteCount < 4))
5369 rc = -EIO; /* bad smb */
5370 /* else if (pFindData){
5371 memcpy((char *) pFindData,
5372 (char *) &pSMBr->hdr.Protocol +
5375 /* check that length of list is not more than bcc */
5376 /* check that each entry does not go beyond length
5378 /* check that each element of each entry does not
5379 go beyond end of list */
5380 __u16 data_offset = le16_to_cpu(pSMBr->t2.DataOffset);
5381 struct fealist *ea_response_data;
5383 /* validate_trans2_offsets() */
5384 /* BB check if start of smb + data_offset > &bcc+ bcc*/
5385 ea_response_data = (struct fealist *)
5386 (((char *) &pSMBr->hdr.Protocol) +
5388 name_len = le32_to_cpu(ea_response_data->list_len);
5389 cFYI(1, ("ea length %d", name_len));
5390 if (name_len <= 8) {
5391 /* returned EA size zeroed at top of function */
5392 cFYI(1, ("empty EA list returned from server"));
5394 /* account for ea list len */
5396 temp_fea = ea_response_data->list;
5397 temp_ptr = (char *)temp_fea;
5398 /* loop through checking if we have a matching
5399 name and then return the associated value */
5400 while (name_len > 0) {
5405 le16_to_cpu(temp_fea->value_len);
5406 /* BB validate that value_len falls within SMB,
5407 even though maximum for name_len is 255 */
5408 if (memcmp(temp_fea->name, ea_name,
5409 temp_fea->name_len) == 0) {
5412 /* account for prefix user. and trailing null */
5413 if (rc <= (int)buf_size) {
5415 temp_fea->name+temp_fea->name_len+1,
5417 /* ea values, unlike ea
5420 } else if (buf_size == 0) {
5421 /* skip copy - calc size only */
5423 /* stop before overrun buffer */
5428 name_len -= temp_fea->name_len;
5429 temp_ptr += temp_fea->name_len;
5430 /* account for trailing null */
5433 name_len -= value_len;
5434 temp_ptr += value_len;
5435 /* No trailing null to account for in
5436 value_len. Go on to next EA */
5437 temp_fea = (struct fea *)temp_ptr;
5443 cifs_buf_release(pSMB);
5451 CIFSSMBSetEA(const int xid, struct cifsTconInfo *tcon, const char *fileName,
5452 const char *ea_name, const void *ea_value,
5453 const __u16 ea_value_len, const struct nls_table *nls_codepage,
5456 struct smb_com_transaction2_spi_req *pSMB = NULL;
5457 struct smb_com_transaction2_spi_rsp *pSMBr = NULL;
5458 struct fealist *parm_data;
5461 int bytes_returned = 0;
5462 __u16 params, param_offset, byte_count, offset, count;
5464 cFYI(1, ("In SetEA"));
5466 rc = smb_init(SMB_COM_TRANSACTION2, 15, tcon, (void **) &pSMB,
5471 if (pSMB->hdr.Flags2 & SMBFLG2_UNICODE) {
5473 cifsConvertToUCS((__le16 *) pSMB->FileName, fileName,
5474 PATH_MAX, nls_codepage, remap);
5475 name_len++; /* trailing null */
5477 } else { /* BB improve the check for buffer overruns BB */
5478 name_len = strnlen(fileName, PATH_MAX);
5479 name_len++; /* trailing null */
5480 strncpy(pSMB->FileName, fileName, name_len);
5483 params = 6 + name_len;
5485 /* done calculating parms using name_len of file name,
5486 now use name_len to calculate length of ea name
5487 we are going to create in the inode xattrs */
5488 if (ea_name == NULL)
5491 name_len = strnlen(ea_name, 255);
5493 count = sizeof(*parm_data) + ea_value_len + name_len + 1;
5494 pSMB->MaxParameterCount = cpu_to_le16(2);
5495 pSMB->MaxDataCount = cpu_to_le16(1000); /* BB find max SMB size from sess */
5496 pSMB->MaxSetupCount = 0;
5500 pSMB->Reserved2 = 0;
5501 param_offset = offsetof(struct smb_com_transaction2_spi_req,
5502 InformationLevel) - 4;
5503 offset = param_offset + params;
5504 pSMB->InformationLevel =
5505 cpu_to_le16(SMB_SET_FILE_EA);
5508 (struct fealist *) (((char *) &pSMB->hdr.Protocol) +
5510 pSMB->ParameterOffset = cpu_to_le16(param_offset);
5511 pSMB->DataOffset = cpu_to_le16(offset);
5512 pSMB->SetupCount = 1;
5513 pSMB->Reserved3 = 0;
5514 pSMB->SubCommand = cpu_to_le16(TRANS2_SET_PATH_INFORMATION);
5515 byte_count = 3 /* pad */ + params + count;
5516 pSMB->DataCount = cpu_to_le16(count);
5517 parm_data->list_len = cpu_to_le32(count);
5518 parm_data->list[0].EA_flags = 0;
5519 /* we checked above that name len is less than 255 */
5520 parm_data->list[0].name_len = (__u8)name_len;
5521 /* EA names are always ASCII */
5523 strncpy(parm_data->list[0].name, ea_name, name_len);
5524 parm_data->list[0].name[name_len] = 0;
5525 parm_data->list[0].value_len = cpu_to_le16(ea_value_len);
5526 /* caller ensures that ea_value_len is less than 64K but
5527 we need to ensure that it fits within the smb */
5529 /*BB add length check to see if it would fit in
5530 negotiated SMB buffer size BB */
5531 /* if (ea_value_len > buffer_size - 512 (enough for header)) */
5533 memcpy(parm_data->list[0].name+name_len+1,
5534 ea_value, ea_value_len);
5536 pSMB->TotalDataCount = pSMB->DataCount;
5537 pSMB->ParameterCount = cpu_to_le16(params);
5538 pSMB->TotalParameterCount = pSMB->ParameterCount;
5539 pSMB->Reserved4 = 0;
5540 pSMB->hdr.smb_buf_length += byte_count;
5541 pSMB->ByteCount = cpu_to_le16(byte_count);
5542 rc = SendReceive(xid, tcon->ses, (struct smb_hdr *) pSMB,
5543 (struct smb_hdr *) pSMBr, &bytes_returned, 0);
5545 cFYI(1, ("SetPathInfo (EA) returned %d", rc));
5548 cifs_buf_release(pSMB);