| 1 | --- a/Documentation/Configure.help |
| 2 | +++ b/Documentation/Configure.help |
| 3 | @@ -18007,6 +18007,34 @@ CONFIG_UNIXWARE_DISKLABEL |
| 4 | |
| 5 | If you don't know what all this is about, say N. |
| 6 | |
| 7 | +CIFS (Common Internet File System) support |
| 8 | +CONFIG_CIFS |
| 9 | + This is the client VFS module for the Common Internet File System |
| 10 | + (CIFS) protocol which is the successor to the Server Message Block |
| 11 | + (SMB) protocol, the native file sharing mechanism for most early |
| 12 | + PC operating systems. CIFS is fully supported by current network |
| 13 | + file servers such as Windows 2000, Windows 2003 (including |
| 14 | + Windows XP) as well by Samba (which provides excellent CIFS |
| 15 | + server support for Linux and many other operating systems). |
| 16 | + The smbfs module should be used instead of this cifs module for |
| 17 | + mounting to older SMB servers such as OS/2. The smbfs and cifs |
| 18 | + modules can coexist and do not conflict. |
| 19 | + |
| 20 | + The intent of this module is to provide the most advanced network |
| 21 | + file system function for CIFS compliant servers, including better |
| 22 | + POSIX compliance, secure per-user session establishment, high |
| 23 | + performance safe distributed caching (oplock), optional packet |
| 24 | + signing, Unicode support and other internationalization improvements |
| 25 | + For more information see the project page at |
| 26 | + http://us1.samba.org/samba/Linux_CIFS_client.html |
| 27 | + |
| 28 | +CIFS Debugging |
| 29 | +CONFIG_CIFS_DEBUG |
| 30 | + If you are experiencing any problems with the CIFS filesystem, say |
| 31 | + Y here. This will result in additional debugging messages to be |
| 32 | + written to the system log. Under normal circumstances, this |
| 33 | + results in very little overhead. |
| 34 | + |
| 35 | SMB file system support (to mount Windows shares etc.) |
| 36 | CONFIG_SMB_FS |
| 37 | SMB (Server Message Block) is the protocol Windows for Workgroups |
| 38 | --- a/Documentation/filesystems/00-INDEX |
| 39 | +++ b/Documentation/filesystems/00-INDEX |
| 40 | @@ -10,6 +10,8 @@ befs.txt |
| 41 | - info for the BeOS file system (BFS) |
| 42 | bfs.txt |
| 43 | - info for the SCO UnixWare Boot Filesystem (BFS). |
| 44 | +cifs.txt |
| 45 | + - info on the Common Internet File System (CIFS) |
| 46 | coda.txt |
| 47 | - description of the CODA filesystem. |
| 48 | cramfs.txt |
| 49 | --- /dev/null |
| 50 | +++ b/Documentation/filesystems/cifs.txt |
| 51 | @@ -0,0 +1,51 @@ |
| 52 | + This is the client VFS module for the Common Internet File System |
| 53 | + (CIFS) protocol which is the successor to the Server Message Block |
| 54 | + (SMB) protocol, the native file sharing mechanism for most early |
| 55 | + PC operating systems. CIFS is fully supported by current network |
| 56 | + file servers such as Windows 2000, Windows 2003 (including |
| 57 | + Windows XP) as well by Samba (which provides excellent CIFS |
| 58 | + server support for Linux and many other operating systems), so |
| 59 | + this network filesystem client can mount to a wide variety of |
| 60 | + servers. The smbfs module should be used instead of this cifs module |
| 61 | + for mounting to older SMB servers such as OS/2. The smbfs and cifs |
| 62 | + modules can coexist and do not conflict. The CIFS VFS filesystem |
| 63 | + module is designed to work well with servers that implement the |
| 64 | + newer versions (dialects) of the SMB/CIFS protocol such as Samba, |
| 65 | + the program written by Andrew Tridgell that turns any Unix host |
| 66 | + into a SMB/CIFS file server. |
| 67 | + |
| 68 | + The intent of this module is to provide the most advanced network |
| 69 | + file system function for CIFS compliant servers, including better |
| 70 | + POSIX compliance, secure per-user session establishment, high |
| 71 | + performance safe distributed caching (oplock), optional packet |
| 72 | + signing, large files, Unicode support and other internationalization |
| 73 | + improvements. Since both Samba server and this filesystem client support |
| 74 | + the CIFS Unix extensions, the combination can provide a reasonable |
| 75 | + alternative to NFSv4 for fileserving in some Linux to Linux environments, |
| 76 | + not just in Linux to Windows environments. |
| 77 | + |
| 78 | + This filesystem has an optional mount utility (mount.cifs) that can |
| 79 | + be obtained from the project page and installed in the path in the same |
| 80 | + directory with the other mount helpers (such as mount.smbfs). |
| 81 | + Mounting using the cifs filesystem without installing the mount helper |
| 82 | + requires specifying the server's ip address. |
| 83 | + |
| 84 | + For Linux 2.4: |
| 85 | + mount //anything/here /mnt_target -o |
| 86 | + user=username,pass=password,unc=//ip_address_of_server/sharename |
| 87 | + |
| 88 | + For Linux 2.5: |
| 89 | + mount //ip_address_of_server/sharename /mnt_target -o user=username, pass=password |
| 90 | + |
| 91 | + |
| 92 | + For more information on the module see the project page at |
| 93 | + |
| 94 | + http://us1.samba.org/samba/Linux_CIFS_client.html |
| 95 | + |
| 96 | + For more information on CIFS see: |
| 97 | + |
| 98 | + http://www.snia.org/tech_activities/CIFS |
| 99 | + |
| 100 | + or the Samba site: |
| 101 | + |
| 102 | + http://www.samba.org |
| 103 | --- /dev/null |
| 104 | +++ b/fs/cifs/asn1.c |
| 105 | @@ -0,0 +1,614 @@ |
| 106 | +/* |
| 107 | + * The ASB.1/BER parsing code is derived from ip_nat_snmp_basic.c which was in |
| 108 | + * turn derived from the gxsnmp package by Gregory McLean & Jochen Friedrich |
| 109 | + * |
| 110 | + * Copyright (c) 2000 RP Internet (www.rpi.net.au). |
| 111 | + * |
| 112 | + * This program is free software; you can redistribute it and/or modify |
| 113 | + * it under the terms of the GNU General Public License as published by |
| 114 | + * the Free Software Foundation; either version 2 of the License, or |
| 115 | + * (at your option) any later version. |
| 116 | + * This program is distributed in the hope that it will be useful, |
| 117 | + * but WITHOUT ANY WARRANTY; without even the implied warranty of |
| 118 | + * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the |
| 119 | + * GNU General Public License for more details. |
| 120 | + * You should have received a copy of the GNU General Public License |
| 121 | + * along with this program; if not, write to the Free Software |
| 122 | + * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA |
| 123 | + */ |
| 124 | + |
| 125 | +#include <linux/config.h> |
| 126 | +#include <linux/module.h> |
| 127 | +#include <linux/types.h> |
| 128 | +#include <linux/kernel.h> |
| 129 | +#include <linux/mm.h> |
| 130 | +#include <linux/slab.h> |
| 131 | +#include "cifspdu.h" |
| 132 | +#include "cifsglob.h" |
| 133 | +#include "cifs_debug.h" |
| 134 | + |
| 135 | +/***************************************************************************** |
| 136 | + * |
| 137 | + * Basic ASN.1 decoding routines (gxsnmp author Dirk Wisse) |
| 138 | + * |
| 139 | + *****************************************************************************/ |
| 140 | + |
| 141 | +/* Class */ |
| 142 | +#define ASN1_UNI 0 /* Universal */ |
| 143 | +#define ASN1_APL 1 /* Application */ |
| 144 | +#define ASN1_CTX 2 /* Context */ |
| 145 | +#define ASN1_PRV 3 /* Private */ |
| 146 | + |
| 147 | +/* Tag */ |
| 148 | +#define ASN1_EOC 0 /* End Of Contents or N/A */ |
| 149 | +#define ASN1_BOL 1 /* Boolean */ |
| 150 | +#define ASN1_INT 2 /* Integer */ |
| 151 | +#define ASN1_BTS 3 /* Bit String */ |
| 152 | +#define ASN1_OTS 4 /* Octet String */ |
| 153 | +#define ASN1_NUL 5 /* Null */ |
| 154 | +#define ASN1_OJI 6 /* Object Identifier */ |
| 155 | +#define ASN1_OJD 7 /* Object Description */ |
| 156 | +#define ASN1_EXT 8 /* External */ |
| 157 | +#define ASN1_SEQ 16 /* Sequence */ |
| 158 | +#define ASN1_SET 17 /* Set */ |
| 159 | +#define ASN1_NUMSTR 18 /* Numerical String */ |
| 160 | +#define ASN1_PRNSTR 19 /* Printable String */ |
| 161 | +#define ASN1_TEXSTR 20 /* Teletext String */ |
| 162 | +#define ASN1_VIDSTR 21 /* Video String */ |
| 163 | +#define ASN1_IA5STR 22 /* IA5 String */ |
| 164 | +#define ASN1_UNITIM 23 /* Universal Time */ |
| 165 | +#define ASN1_GENTIM 24 /* General Time */ |
| 166 | +#define ASN1_GRASTR 25 /* Graphical String */ |
| 167 | +#define ASN1_VISSTR 26 /* Visible String */ |
| 168 | +#define ASN1_GENSTR 27 /* General String */ |
| 169 | + |
| 170 | +/* Primitive / Constructed methods*/ |
| 171 | +#define ASN1_PRI 0 /* Primitive */ |
| 172 | +#define ASN1_CON 1 /* Constructed */ |
| 173 | + |
| 174 | +/* |
| 175 | + * Error codes. |
| 176 | + */ |
| 177 | +#define ASN1_ERR_NOERROR 0 |
| 178 | +#define ASN1_ERR_DEC_EMPTY 2 |
| 179 | +#define ASN1_ERR_DEC_EOC_MISMATCH 3 |
| 180 | +#define ASN1_ERR_DEC_LENGTH_MISMATCH 4 |
| 181 | +#define ASN1_ERR_DEC_BADVALUE 5 |
| 182 | + |
| 183 | +#define SPNEGO_OID_LEN 7 |
| 184 | +#define NTLMSSP_OID_LEN 10 |
| 185 | +unsigned long SPNEGO_OID[7] = { 1, 3, 6, 1, 5, 5, 2 }; |
| 186 | +unsigned long NTLMSSP_OID[10] = { 1, 3, 6, 1, 4, 1, 311, 2, 2, 10 }; |
| 187 | + |
| 188 | +/* |
| 189 | + * ASN.1 context. |
| 190 | + */ |
| 191 | +struct asn1_ctx { |
| 192 | + int error; /* Error condition */ |
| 193 | + unsigned char *pointer; /* Octet just to be decoded */ |
| 194 | + unsigned char *begin; /* First octet */ |
| 195 | + unsigned char *end; /* Octet after last octet */ |
| 196 | +}; |
| 197 | + |
| 198 | +/* |
| 199 | + * Octet string (not null terminated) |
| 200 | + */ |
| 201 | +struct asn1_octstr { |
| 202 | + unsigned char *data; |
| 203 | + unsigned int len; |
| 204 | +}; |
| 205 | + |
| 206 | +static void |
| 207 | +asn1_open(struct asn1_ctx *ctx, unsigned char *buf, unsigned int len) |
| 208 | +{ |
| 209 | + ctx->begin = buf; |
| 210 | + ctx->end = buf + len; |
| 211 | + ctx->pointer = buf; |
| 212 | + ctx->error = ASN1_ERR_NOERROR; |
| 213 | +} |
| 214 | + |
| 215 | +static unsigned char |
| 216 | +asn1_octet_decode(struct asn1_ctx *ctx, unsigned char *ch) |
| 217 | +{ |
| 218 | + if (ctx->pointer >= ctx->end) { |
| 219 | + ctx->error = ASN1_ERR_DEC_EMPTY; |
| 220 | + return 0; |
| 221 | + } |
| 222 | + *ch = *(ctx->pointer)++; |
| 223 | + return 1; |
| 224 | +} |
| 225 | + |
| 226 | +static unsigned char |
| 227 | +asn1_tag_decode(struct asn1_ctx *ctx, unsigned int *tag) |
| 228 | +{ |
| 229 | + unsigned char ch; |
| 230 | + |
| 231 | + *tag = 0; |
| 232 | + |
| 233 | + do { |
| 234 | + if (!asn1_octet_decode(ctx, &ch)) |
| 235 | + return 0; |
| 236 | + *tag <<= 7; |
| 237 | + *tag |= ch & 0x7F; |
| 238 | + } while ((ch & 0x80) == 0x80); |
| 239 | + return 1; |
| 240 | +} |
| 241 | + |
| 242 | +static unsigned char |
| 243 | +asn1_id_decode(struct asn1_ctx *ctx, |
| 244 | + unsigned int *cls, unsigned int *con, unsigned int *tag) |
| 245 | +{ |
| 246 | + unsigned char ch; |
| 247 | + |
| 248 | + if (!asn1_octet_decode(ctx, &ch)) |
| 249 | + return 0; |
| 250 | + |
| 251 | + *cls = (ch & 0xC0) >> 6; |
| 252 | + *con = (ch & 0x20) >> 5; |
| 253 | + *tag = (ch & 0x1F); |
| 254 | + |
| 255 | + if (*tag == 0x1F) { |
| 256 | + if (!asn1_tag_decode(ctx, tag)) |
| 257 | + return 0; |
| 258 | + } |
| 259 | + return 1; |
| 260 | +} |
| 261 | + |
| 262 | +static unsigned char |
| 263 | +asn1_length_decode(struct asn1_ctx *ctx, unsigned int *def, unsigned int *len) |
| 264 | +{ |
| 265 | + unsigned char ch, cnt; |
| 266 | + |
| 267 | + if (!asn1_octet_decode(ctx, &ch)) |
| 268 | + return 0; |
| 269 | + |
| 270 | + if (ch == 0x80) |
| 271 | + *def = 0; |
| 272 | + else { |
| 273 | + *def = 1; |
| 274 | + |
| 275 | + if (ch < 0x80) |
| 276 | + *len = ch; |
| 277 | + else { |
| 278 | + cnt = (unsigned char) (ch & 0x7F); |
| 279 | + *len = 0; |
| 280 | + |
| 281 | + while (cnt > 0) { |
| 282 | + if (!asn1_octet_decode(ctx, &ch)) |
| 283 | + return 0; |
| 284 | + *len <<= 8; |
| 285 | + *len |= ch; |
| 286 | + cnt--; |
| 287 | + } |
| 288 | + } |
| 289 | + } |
| 290 | + return 1; |
| 291 | +} |
| 292 | + |
| 293 | +static unsigned char |
| 294 | +asn1_header_decode(struct asn1_ctx *ctx, |
| 295 | + unsigned char **eoc, |
| 296 | + unsigned int *cls, unsigned int *con, unsigned int *tag) |
| 297 | +{ |
| 298 | + unsigned int def, len; |
| 299 | + |
| 300 | + if (!asn1_id_decode(ctx, cls, con, tag)) |
| 301 | + return 0; |
| 302 | + |
| 303 | + if (!asn1_length_decode(ctx, &def, &len)) |
| 304 | + return 0; |
| 305 | + |
| 306 | + if (def) |
| 307 | + *eoc = ctx->pointer + len; |
| 308 | + else |
| 309 | + *eoc = NULL; |
| 310 | + return 1; |
| 311 | +} |
| 312 | + |
| 313 | +static unsigned char |
| 314 | +asn1_eoc_decode(struct asn1_ctx *ctx, unsigned char *eoc) |
| 315 | +{ |
| 316 | + unsigned char ch; |
| 317 | + |
| 318 | + if (eoc == 0) { |
| 319 | + if (!asn1_octet_decode(ctx, &ch)) |
| 320 | + return 0; |
| 321 | + |
| 322 | + if (ch != 0x00) { |
| 323 | + ctx->error = ASN1_ERR_DEC_EOC_MISMATCH; |
| 324 | + return 0; |
| 325 | + } |
| 326 | + |
| 327 | + if (!asn1_octet_decode(ctx, &ch)) |
| 328 | + return 0; |
| 329 | + |
| 330 | + if (ch != 0x00) { |
| 331 | + ctx->error = ASN1_ERR_DEC_EOC_MISMATCH; |
| 332 | + return 0; |
| 333 | + } |
| 334 | + return 1; |
| 335 | + } else { |
| 336 | + if (ctx->pointer != eoc) { |
| 337 | + ctx->error = ASN1_ERR_DEC_LENGTH_MISMATCH; |
| 338 | + return 0; |
| 339 | + } |
| 340 | + return 1; |
| 341 | + } |
| 342 | +} |
| 343 | + |
| 344 | +/* static unsigned char asn1_null_decode(struct asn1_ctx *ctx, |
| 345 | + unsigned char *eoc) |
| 346 | +{ |
| 347 | + ctx->pointer = eoc; |
| 348 | + return 1; |
| 349 | +} |
| 350 | + |
| 351 | +static unsigned char asn1_long_decode(struct asn1_ctx *ctx, |
| 352 | + unsigned char *eoc, long *integer) |
| 353 | +{ |
| 354 | + unsigned char ch; |
| 355 | + unsigned int len; |
| 356 | + |
| 357 | + if (!asn1_octet_decode(ctx, &ch)) |
| 358 | + return 0; |
| 359 | + |
| 360 | + *integer = (signed char) ch; |
| 361 | + len = 1; |
| 362 | + |
| 363 | + while (ctx->pointer < eoc) { |
| 364 | + if (++len > sizeof(long)) { |
| 365 | + ctx->error = ASN1_ERR_DEC_BADVALUE; |
| 366 | + return 0; |
| 367 | + } |
| 368 | + |
| 369 | + if (!asn1_octet_decode(ctx, &ch)) |
| 370 | + return 0; |
| 371 | + |
| 372 | + *integer <<= 8; |
| 373 | + *integer |= ch; |
| 374 | + } |
| 375 | + return 1; |
| 376 | +} |
| 377 | + |
| 378 | +static unsigned char asn1_uint_decode(struct asn1_ctx *ctx, |
| 379 | + unsigned char *eoc, |
| 380 | + unsigned int *integer) |
| 381 | +{ |
| 382 | + unsigned char ch; |
| 383 | + unsigned int len; |
| 384 | + |
| 385 | + if (!asn1_octet_decode(ctx, &ch)) |
| 386 | + return 0; |
| 387 | + |
| 388 | + *integer = ch; |
| 389 | + if (ch == 0) |
| 390 | + len = 0; |
| 391 | + else |
| 392 | + len = 1; |
| 393 | + |
| 394 | + while (ctx->pointer < eoc) { |
| 395 | + if (++len > sizeof(unsigned int)) { |
| 396 | + ctx->error = ASN1_ERR_DEC_BADVALUE; |
| 397 | + return 0; |
| 398 | + } |
| 399 | + |
| 400 | + if (!asn1_octet_decode(ctx, &ch)) |
| 401 | + return 0; |
| 402 | + |
| 403 | + *integer <<= 8; |
| 404 | + *integer |= ch; |
| 405 | + } |
| 406 | + return 1; |
| 407 | +} |
| 408 | + |
| 409 | +static unsigned char asn1_ulong_decode(struct asn1_ctx *ctx, |
| 410 | + unsigned char *eoc, |
| 411 | + unsigned long *integer) |
| 412 | +{ |
| 413 | + unsigned char ch; |
| 414 | + unsigned int len; |
| 415 | + |
| 416 | + if (!asn1_octet_decode(ctx, &ch)) |
| 417 | + return 0; |
| 418 | + |
| 419 | + *integer = ch; |
| 420 | + if (ch == 0) |
| 421 | + len = 0; |
| 422 | + else |
| 423 | + len = 1; |
| 424 | + |
| 425 | + while (ctx->pointer < eoc) { |
| 426 | + if (++len > sizeof(unsigned long)) { |
| 427 | + ctx->error = ASN1_ERR_DEC_BADVALUE; |
| 428 | + return 0; |
| 429 | + } |
| 430 | + |
| 431 | + if (!asn1_octet_decode(ctx, &ch)) |
| 432 | + return 0; |
| 433 | + |
| 434 | + *integer <<= 8; |
| 435 | + *integer |= ch; |
| 436 | + } |
| 437 | + return 1; |
| 438 | +} |
| 439 | + |
| 440 | +static unsigned char |
| 441 | +asn1_octets_decode(struct asn1_ctx *ctx, |
| 442 | + unsigned char *eoc, |
| 443 | + unsigned char **octets, unsigned int *len) |
| 444 | +{ |
| 445 | + unsigned char *ptr; |
| 446 | + |
| 447 | + *len = 0; |
| 448 | + |
| 449 | + *octets = kmalloc(eoc - ctx->pointer, GFP_ATOMIC); |
| 450 | + if (*octets == NULL) { |
| 451 | + return 0; |
| 452 | + } |
| 453 | + |
| 454 | + ptr = *octets; |
| 455 | + while (ctx->pointer < eoc) { |
| 456 | + if (!asn1_octet_decode(ctx, (unsigned char *) ptr++)) { |
| 457 | + kfree(*octets); |
| 458 | + *octets = NULL; |
| 459 | + return 0; |
| 460 | + } |
| 461 | + (*len)++; |
| 462 | + } |
| 463 | + return 1; |
| 464 | +} */ |
| 465 | + |
| 466 | +static unsigned char |
| 467 | +asn1_subid_decode(struct asn1_ctx *ctx, unsigned long *subid) |
| 468 | +{ |
| 469 | + unsigned char ch; |
| 470 | + |
| 471 | + *subid = 0; |
| 472 | + |
| 473 | + do { |
| 474 | + if (!asn1_octet_decode(ctx, &ch)) |
| 475 | + return 0; |
| 476 | + |
| 477 | + *subid <<= 7; |
| 478 | + *subid |= ch & 0x7F; |
| 479 | + } while ((ch & 0x80) == 0x80); |
| 480 | + return 1; |
| 481 | +} |
| 482 | + |
| 483 | +static unsigned char |
| 484 | +asn1_oid_decode(struct asn1_ctx *ctx, |
| 485 | + unsigned char *eoc, unsigned long **oid, unsigned int *len) |
| 486 | +{ |
| 487 | + unsigned long subid; |
| 488 | + unsigned int size; |
| 489 | + unsigned long *optr; |
| 490 | + |
| 491 | + size = eoc - ctx->pointer + 1; |
| 492 | + *oid = kmalloc(size * sizeof (unsigned long), GFP_ATOMIC); |
| 493 | + if (*oid == NULL) { |
| 494 | + return 0; |
| 495 | + } |
| 496 | + |
| 497 | + optr = *oid; |
| 498 | + |
| 499 | + if (!asn1_subid_decode(ctx, &subid)) { |
| 500 | + kfree(*oid); |
| 501 | + *oid = NULL; |
| 502 | + return 0; |
| 503 | + } |
| 504 | + |
| 505 | + if (subid < 40) { |
| 506 | + optr[0] = 0; |
| 507 | + optr[1] = subid; |
| 508 | + } else if (subid < 80) { |
| 509 | + optr[0] = 1; |
| 510 | + optr[1] = subid - 40; |
| 511 | + } else { |
| 512 | + optr[0] = 2; |
| 513 | + optr[1] = subid - 80; |
| 514 | + } |
| 515 | + |
| 516 | + *len = 2; |
| 517 | + optr += 2; |
| 518 | + |
| 519 | + while (ctx->pointer < eoc) { |
| 520 | + if (++(*len) > size) { |
| 521 | + ctx->error = ASN1_ERR_DEC_BADVALUE; |
| 522 | + kfree(*oid); |
| 523 | + *oid = NULL; |
| 524 | + return 0; |
| 525 | + } |
| 526 | + |
| 527 | + if (!asn1_subid_decode(ctx, optr++)) { |
| 528 | + kfree(*oid); |
| 529 | + *oid = NULL; |
| 530 | + return 0; |
| 531 | + } |
| 532 | + } |
| 533 | + return 1; |
| 534 | +} |
| 535 | + |
| 536 | +static int |
| 537 | +compare_oid(unsigned long *oid1, unsigned int oid1len, |
| 538 | + unsigned long *oid2, unsigned int oid2len) |
| 539 | +{ |
| 540 | + unsigned int i; |
| 541 | + |
| 542 | + if (oid1len != oid2len) |
| 543 | + return 0; |
| 544 | + else { |
| 545 | + for (i = 0; i < oid1len; i++) { |
| 546 | + if (oid1[i] != oid2[i]) |
| 547 | + return 0; |
| 548 | + } |
| 549 | + return 1; |
| 550 | + } |
| 551 | +} |
| 552 | + |
| 553 | + /* BB check for endian conversion issues here */ |
| 554 | + |
| 555 | +int |
| 556 | +decode_negTokenInit(unsigned char *security_blob, int length, |
| 557 | + enum securityEnum *secType) |
| 558 | +{ |
| 559 | + struct asn1_ctx ctx; |
| 560 | + unsigned char *end; |
| 561 | + unsigned char *sequence_end; |
| 562 | + unsigned long *oid; |
| 563 | + unsigned int cls, con, tag, oidlen, rc; |
| 564 | + int use_ntlmssp = FALSE; |
| 565 | + |
| 566 | + *secType = NTLM; /* BB eventually make Kerberos or NLTMSSP the default */ |
| 567 | + |
| 568 | + /* cifs_dump_mem(" Received SecBlob ", security_blob, length); */ |
| 569 | + |
| 570 | + asn1_open(&ctx, security_blob, length); |
| 571 | + |
| 572 | + if (asn1_header_decode(&ctx, &end, &cls, &con, &tag) == 0) { |
| 573 | + cFYI(1, ("Error decoding negTokenInit header ")); |
| 574 | + return 0; |
| 575 | + } else if ((cls != ASN1_APL) || (con != ASN1_CON) |
| 576 | + || (tag != ASN1_EOC)) { |
| 577 | + cFYI(1, ("cls = %d con = %d tag = %d", cls, con, tag)); |
| 578 | + return 0; |
| 579 | + } else { |
| 580 | + /* remember to free obj->oid */ |
| 581 | + rc = asn1_header_decode(&ctx, &end, &cls, &con, &tag); |
| 582 | + if (rc) { |
| 583 | + if ((tag == ASN1_OJI) && (cls == ASN1_PRI)) { |
| 584 | + rc = asn1_oid_decode(&ctx, end, &oid, &oidlen); |
| 585 | + if (rc) { |
| 586 | + rc = compare_oid(oid, oidlen, |
| 587 | + SPNEGO_OID, |
| 588 | + SPNEGO_OID_LEN); |
| 589 | + kfree(oid); |
| 590 | + } |
| 591 | + } else |
| 592 | + rc = 0; |
| 593 | + } |
| 594 | + |
| 595 | + if (!rc) { |
| 596 | + cFYI(1, ("Error decoding negTokenInit header")); |
| 597 | + return 0; |
| 598 | + } |
| 599 | + |
| 600 | + if (asn1_header_decode(&ctx, &end, &cls, &con, &tag) == 0) { |
| 601 | + cFYI(1, ("Error decoding negTokenInit ")); |
| 602 | + return 0; |
| 603 | + } else if ((cls != ASN1_CTX) || (con != ASN1_CON) |
| 604 | + || (tag != ASN1_EOC)) { |
| 605 | + cFYI(1,("cls = %d con = %d tag = %d end = %p (%d) exit 0", |
| 606 | + cls, con, tag, end, *end)); |
| 607 | + return 0; |
| 608 | + } |
| 609 | + |
| 610 | + if (asn1_header_decode(&ctx, &end, &cls, &con, &tag) == 0) { |
| 611 | + cFYI(1, ("Error decoding negTokenInit ")); |
| 612 | + return 0; |
| 613 | + } else if ((cls != ASN1_UNI) || (con != ASN1_CON) |
| 614 | + || (tag != ASN1_SEQ)) { |
| 615 | + cFYI(1,("cls = %d con = %d tag = %d end = %p (%d) exit 1", |
| 616 | + cls, con, tag, end, *end)); |
| 617 | + return 0; |
| 618 | + } |
| 619 | + |
| 620 | + if (asn1_header_decode(&ctx, &end, &cls, &con, &tag) == 0) { |
| 621 | + cFYI(1, ("Error decoding 2nd part of negTokenInit ")); |
| 622 | + return 0; |
| 623 | + } else if ((cls != ASN1_CTX) || (con != ASN1_CON) |
| 624 | + || (tag != ASN1_EOC)) { |
| 625 | + cFYI(1, |
| 626 | + ("cls = %d con = %d tag = %d end = %p (%d) exit 0", |
| 627 | + cls, con, tag, end, *end)); |
| 628 | + return 0; |
| 629 | + } |
| 630 | + |
| 631 | + if (asn1_header_decode |
| 632 | + (&ctx, &sequence_end, &cls, &con, &tag) == 0) { |
| 633 | + cFYI(1, ("Error decoding 2nd part of negTokenInit ")); |
| 634 | + return 0; |
| 635 | + } else if ((cls != ASN1_UNI) || (con != ASN1_CON) |
| 636 | + || (tag != ASN1_SEQ)) { |
| 637 | + cFYI(1, |
| 638 | + ("cls = %d con = %d tag = %d end = %p (%d) exit 1", |
| 639 | + cls, con, tag, end, *end)); |
| 640 | + return 0; |
| 641 | + } |
| 642 | + |
| 643 | + while (!asn1_eoc_decode(&ctx, sequence_end)) { |
| 644 | + rc = asn1_header_decode(&ctx, &end, &cls, &con, &tag); |
| 645 | + if (!rc) { |
| 646 | + cFYI(1, |
| 647 | + ("Error 1 decoding negTokenInit header exit 2")); |
| 648 | + return 0; |
| 649 | + } |
| 650 | + if ((tag == ASN1_OJI) && (con == ASN1_PRI)) { |
| 651 | + asn1_oid_decode(&ctx, end, &oid, &oidlen); |
| 652 | + cFYI(1, |
| 653 | + ("OID len = %d oid = 0x%lx 0x%lx 0x%lx 0x%lx", |
| 654 | + oidlen, *oid, *(oid + 1), *(oid + 2), |
| 655 | + *(oid + 3))); |
| 656 | + rc = compare_oid(oid, oidlen, NTLMSSP_OID, |
| 657 | + NTLMSSP_OID_LEN); |
| 658 | + kfree(oid); |
| 659 | + if (rc) |
| 660 | + use_ntlmssp = TRUE; |
| 661 | + } else { |
| 662 | + cFYI(1,("This should be an oid what is going on? ")); |
| 663 | + } |
| 664 | + } |
| 665 | + |
| 666 | + if (asn1_header_decode(&ctx, &end, &cls, &con, &tag) == 0) { |
| 667 | + cFYI(1, |
| 668 | + ("Error decoding last part of negTokenInit exit 3")); |
| 669 | + return 0; |
| 670 | + } else if ((cls != ASN1_CTX) || (con != ASN1_CON)) { /* tag = 3 indicating mechListMIC */ |
| 671 | + cFYI(1, |
| 672 | + ("Exit 4 cls = %d con = %d tag = %d end = %p (%d)", |
| 673 | + cls, con, tag, end, *end)); |
| 674 | + return 0; |
| 675 | + } |
| 676 | + if (asn1_header_decode(&ctx, &end, &cls, &con, &tag) == 0) { |
| 677 | + cFYI(1, |
| 678 | + ("Error decoding last part of negTokenInit exit 5")); |
| 679 | + return 0; |
| 680 | + } else if ((cls != ASN1_UNI) || (con != ASN1_CON) |
| 681 | + || (tag != ASN1_SEQ)) { |
| 682 | + cFYI(1, |
| 683 | + ("Exit 6 cls = %d con = %d tag = %d end = %p (%d)", |
| 684 | + cls, con, tag, end, *end)); |
| 685 | + } |
| 686 | + |
| 687 | + if (asn1_header_decode(&ctx, &end, &cls, &con, &tag) == 0) { |
| 688 | + cFYI(1, |
| 689 | + ("Error decoding last part of negTokenInit exit 7")); |
| 690 | + return 0; |
| 691 | + } else if ((cls != ASN1_CTX) || (con != ASN1_CON)) { |
| 692 | + cFYI(1, |
| 693 | + ("Exit 8 cls = %d con = %d tag = %d end = %p (%d)", |
| 694 | + cls, con, tag, end, *end)); |
| 695 | + return 0; |
| 696 | + } |
| 697 | + if (asn1_header_decode(&ctx, &end, &cls, &con, &tag) == 0) { |
| 698 | + cFYI(1, |
| 699 | + ("Error decoding last part of negTokenInit exit 9")); |
| 700 | + return 0; |
| 701 | + } else if ((cls != ASN1_UNI) || (con != ASN1_PRI) |
| 702 | + || (tag != ASN1_GENSTR)) { |
| 703 | + cFYI(1, |
| 704 | + ("Exit 10 cls = %d con = %d tag = %d end = %p (%d)", |
| 705 | + cls, con, tag, end, *end)); |
| 706 | + return 0; |
| 707 | + } |
| 708 | + cFYI(1, ("Need to call asn1_octets_decode() function for this %s", ctx.pointer)); /* is this UTF-8 or ASCII? */ |
| 709 | + } |
| 710 | + |
| 711 | + /* if (use_kerberos) |
| 712 | + *secType = Kerberos |
| 713 | + else */ |
| 714 | + if (use_ntlmssp) { |
| 715 | + *secType = NTLMSSP; |
| 716 | + } |
| 717 | + |
| 718 | + return 1; |
| 719 | +} |
| 720 | --- /dev/null |
| 721 | +++ b/fs/cifs/AUTHORS |
| 722 | @@ -0,0 +1,37 @@ |
| 723 | +Original Author |
| 724 | +=============== |
| 725 | +Steve French (sfrench@samba.org) |
| 726 | + |
| 727 | +The author wishes to express his appreciation and thanks to: |
| 728 | +Andrew Tridgell (Samba team) for his early suggestions about smb/cifs VFS |
| 729 | +improvements. Thanks to IBM for allowing me the time and test resources to pursue |
| 730 | +this project. Jim McDonough from IBM (and the Samba Team) for his help. |
| 731 | +The IBM Linux JFS team for explaining many esoteric Linux filesystem features. |
| 732 | +Dave Boutcher of IBM Rochester (author of the OS/400 smb/cifs filesystem client) |
| 733 | +for proving years ago that a very good smb/cifs client could be done on a Unix like |
| 734 | +operating system. Volker Lendecke, Andrew Tridgell, Urban Widmark, John Newbigin |
| 735 | +and others for their work on the Linux smbfs module over the years. Thanks to |
| 736 | +the other members of the Storage Network Industry Association CIFS Technical |
| 737 | +Workgroup for their work specifying this highly complex protocol and finally |
| 738 | +thanks to the Samba team for their technical advice and encouragement. |
| 739 | + |
| 740 | +Patch Contributors |
| 741 | +------------------ |
| 742 | +Zwane Mwaikambo |
| 743 | +Andi Kleen |
| 744 | +Amrut Joshi |
| 745 | +Shobhit Dayal |
| 746 | +Sergey Vlasov |
| 747 | +Richard Hughes |
| 748 | +Yury Umanets |
| 749 | + |
| 750 | +Test case and Bug Report contributors |
| 751 | +------------------------------------- |
| 752 | +Thanks to those in the community who have submitted detailed bug reports |
| 753 | +and debug of problems they have found: Jochen Dolze, David Blaine, |
| 754 | +Rene Scharfe, Martin Josefsson, Alexander Wild, Anthony Liguori, |
| 755 | +Lars Muller, Urban Widmark, Massimiliano Ferrero, Howard Owen, |
| 756 | +Olaf Kirch, Kieron Briggs, Nick Millington and others. |
| 757 | + |
| 758 | +And thanks to the IBM LTC and Power test teams and SuSE testers for |
| 759 | +finding multiple bugs during excellent stress test runs. |
| 760 | --- /dev/null |
| 761 | +++ b/fs/cifs/CHANGES |
| 762 | @@ -0,0 +1,572 @@ |
| 763 | +Version 1.20 |
| 764 | +------------ |
| 765 | +Make transaction counts more consistent. Merge /proc/fs/cifs/SimultaneousOps |
| 766 | +info into /proc/fs/cifs/DebugData. Fix oops in rare oops in readdir |
| 767 | +(in build_wildcard_path_from_dentry). Fix mknod to pass type field |
| 768 | +(block/char/fifo) properly. Remove spurious mount warning log entry when |
| 769 | +credentials passed as mount argument. Set major/minor device number in |
| 770 | +inode for block and char devices when unix extensions enabled. |
| 771 | + |
| 772 | +Version 1.19 |
| 773 | +------------ |
| 774 | +Fix /proc/fs/cifs/Stats and DebugData display to handle larger |
| 775 | +amounts of return data. Properly limit requests to MAX_REQ (50 |
| 776 | +is the usual maximum active multiplex SMB/CIFS requests per server). |
| 777 | +Do not kill cifsd (and thus hurt the other SMB session) when more than one |
| 778 | +session to the same server (but with different userids) exists and one |
| 779 | +of the two user's smb sessions is being removed while leaving the other. |
| 780 | +Do not loop reconnecting in cifsd demultiplex thread when admin |
| 781 | +kills the thread without going through unmount. |
| 782 | + |
| 783 | +Version 1.18 |
| 784 | +------------ |
| 785 | +Do not rename hardlinked files (since that should be a noop). Flush |
| 786 | +cached write behind data when reopening a file after session abend, |
| 787 | +except when already in write. Grab per socket sem during reconnect |
| 788 | +to avoid oops in sendmsg if overlapping with reconnect. Do not |
| 789 | +reset cached inode file size on readdir for files open for write on |
| 790 | +client. |
| 791 | + |
| 792 | + |
| 793 | +Version 1.17 |
| 794 | +------------ |
| 795 | +Update number of blocks in file so du command is happier (in Linux a fake |
| 796 | +blocksize of 512 is required for calculating number of blocks in inode). |
| 797 | +Fix prepare write of partial pages to read in data from server if possible. |
| 798 | +Fix race on tcpStatus field between unmount and reconnection code, causing |
| 799 | +cifsd process sometimes to hang around forever. Improve out of memory |
| 800 | +checks in cifs_filldir |
| 801 | + |
| 802 | +Version 1.16 |
| 803 | +------------ |
| 804 | +Fix incorrect file size in file handle based setattr on big endian hardware. |
| 805 | +Fix oops in build_path_from_dentry when out of memory. Add checks for invalid |
| 806 | +and closing file structs in writepage/partialpagewrite. Add statistics |
| 807 | +for each mounted share (new menuconfig option). Fix endianness problem in |
| 808 | +volume information displayed in /proc/fs/cifs/DebugData (only affects |
| 809 | +affects big endian architectures). Prevent renames while constructing |
| 810 | +path names for open, mkdir and rmdir. |
| 811 | + |
| 812 | +Version 1.15 |
| 813 | +------------ |
| 814 | +Change to mempools for alloc smb request buffers and multiplex structs |
| 815 | +to better handle low memory problems (and potential deadlocks). |
| 816 | + |
| 817 | +Version 1.14 |
| 818 | +------------ |
| 819 | +Fix incomplete listings of large directories on Samba servers when Unix |
| 820 | +extensions enabled. Fix oops when smb_buffer can not be allocated. Fix |
| 821 | +rename deadlock when writing out dirty pages at same time. |
| 822 | + |
| 823 | +Version 1.13 |
| 824 | +------------ |
| 825 | +Fix open of files in which O_CREATE can cause the mode to change in |
| 826 | +some cases. Fix case in which retry of write overlaps file close. |
| 827 | +Fix PPC64 build error. Reduce excessive stack usage in smb password |
| 828 | +hashing. Fix overwrite of Linux user's view of file mode to Windows servers. |
| 829 | + |
| 830 | +Version 1.12 |
| 831 | +------------ |
| 832 | +Fixes for large file copy, signal handling, socket retry, buffer |
| 833 | +allocation and low memory situations. |
| 834 | + |
| 835 | +Version 1.11 |
| 836 | +------------ |
| 837 | +Better port 139 support to Windows servers (RFC1001/RFC1002 Session_Initialize) |
| 838 | +also now allowing support for specifying client netbiosname. NT4 support added. |
| 839 | + |
| 840 | +Version 1.10 |
| 841 | +------------ |
| 842 | +Fix reconnection (and certain failed mounts) to properly wake up the |
| 843 | +blocked users thread so it does not seem hung (in some cases was blocked |
| 844 | +until the cifs receive timeout expired). Fix spurious error logging |
| 845 | +to kernel log when application with open network files killed. |
| 846 | + |
| 847 | +Version 1.09 |
| 848 | +------------ |
| 849 | +Fix /proc/fs module unload warning message (that could be logged |
| 850 | +to the kernel log). Fix intermittent failure in connectathon |
| 851 | +test7 (hardlink count not immediately refreshed in case in which |
| 852 | +inode metadata can be incorrectly kept cached when time near zero) |
| 853 | + |
| 854 | +Version 1.08 |
| 855 | +------------ |
| 856 | +Allow file_mode and dir_mode (specified at mount time) to be enforced |
| 857 | +locally (the server already enforced its own ACLs too) for servers |
| 858 | +that do not report the correct mode (do not support the |
| 859 | +CIFS Unix Extensions). |
| 860 | + |
| 861 | +Version 1.07 |
| 862 | +------------ |
| 863 | +Fix some small memory leaks in some unmount error paths. Fix major leak |
| 864 | +of cache pages in readpages causing multiple read oriented stress |
| 865 | +testcases (including fsx, and even large file copy) to fail over time. |
| 866 | + |
| 867 | +Version 1.06 |
| 868 | +------------ |
| 869 | +Send NTCreateX with ATTR_POSIX if Linux/Unix extensions negotiated with server. |
| 870 | +This allows files that differ only in case and improves performance of file |
| 871 | +creation and file open to such servers. Fix semaphore conflict which causes |
| 872 | +slow delete of open file to Samba (which unfortunately can cause an oplock |
| 873 | +break to self while vfs_unlink held i_sem) which can hang for 20 seconds. |
| 874 | + |
| 875 | +Version 1.05 |
| 876 | +------------ |
| 877 | +fixes to cifs_readpages for fsx test case |
| 878 | + |
| 879 | +Version 1.04 |
| 880 | +------------ |
| 881 | +Fix caching data integrity bug when extending file size especially when no |
| 882 | +oplock on file. Fix spurious logging of valid already parsed mount options |
| 883 | +that are parsed outside of the cifs vfs such as nosuid. |
| 884 | + |
| 885 | + |
| 886 | +Version 1.03 |
| 887 | +------------ |
| 888 | +Connect to server when port number override not specified, and tcp port |
| 889 | +unitialized. Reset search to restart at correct file when kernel routine |
| 890 | +filldir returns error during large directory searches (readdir). |
| 891 | + |
| 892 | +Version 1.02 |
| 893 | +------------ |
| 894 | +Fix caching problem when files opened by multiple clients in which |
| 895 | +page cache could contain stale data, and write through did |
| 896 | +not occur often enough while file was still open when read ahead |
| 897 | +(read oplock) not allowed. Treat "sep=" when first mount option |
| 898 | +as an overrride of comma as the default separator between mount |
| 899 | +options. |
| 900 | + |
| 901 | +Version 1.01 |
| 902 | +------------ |
| 903 | +Allow passwords longer than 16 bytes. Allow null password string. |
| 904 | + |
| 905 | +Version 1.00 |
| 906 | +------------ |
| 907 | +Gracefully clean up failed mounts when attempting to mount to servers such as |
| 908 | +Windows 98 that terminate tcp sessions during prototocol negotiation. Handle |
| 909 | +embedded commas in mount parsing of passwords. |
| 910 | + |
| 911 | +Version 0.99 |
| 912 | +------------ |
| 913 | +Invalidate local inode cached pages on oplock break and when last file |
| 914 | +instance is closed so that the client does not continue using stale local |
| 915 | +copy rather than later modified server copy of file. Do not reconnect |
| 916 | +when server drops the tcp session prematurely before negotiate |
| 917 | +protocol response. Fix oops in roepen_file when dentry freed. Allow |
| 918 | +the support for CIFS Unix Extensions to be disabled via proc interface. |
| 919 | + |
| 920 | +Version 0.98 |
| 921 | +------------ |
| 922 | +Fix hang in commit_write during reconnection of open files under heavy load. |
| 923 | +Fix unload_nls oops in a mount failure path. Serialize writes to same socket |
| 924 | +which also fixes any possible races when cifs signatures are enabled in SMBs |
| 925 | +being sent out of signature sequence number order. |
| 926 | + |
| 927 | +Version 0.97 |
| 928 | +------------ |
| 929 | +Fix byte range locking bug (endian problem) causing bad offset and |
| 930 | +length. |
| 931 | + |
| 932 | +Version 0.96 |
| 933 | +------------ |
| 934 | +Fix oops (in send_sig) caused by CIFS unmount code trying to |
| 935 | +wake up the demultiplex thread after it had exited. Do not log |
| 936 | +error on harmless oplock release of closed handle. |
| 937 | + |
| 938 | +Version 0.95 |
| 939 | +------------ |
| 940 | +Fix unsafe global variable usage and password hash failure on gcc 3.3.1 |
| 941 | +Fix problem reconnecting secondary mounts to same server after session |
| 942 | +failure. Fix invalid dentry - race in mkdir when directory gets created |
| 943 | +by another client between the lookup and mkdir. |
| 944 | + |
| 945 | +Version 0.94 |
| 946 | +------------ |
| 947 | +Fix to list processing in reopen_files. Fix reconnection when server hung |
| 948 | +but tcpip session still alive. Set proper timeout on socket read. |
| 949 | + |
| 950 | +Version 0.93 |
| 951 | +------------ |
| 952 | +Add missing mount options including iocharset. SMP fixes in write and open. |
| 953 | +Fix errors in reconnecting after TCP session failure. Fix module unloading |
| 954 | +of default nls codepage |
| 955 | + |
| 956 | +Version 0.92 |
| 957 | +------------ |
| 958 | +Active smb transactions should never go negative (fix double FreeXid). Fix |
| 959 | +list processing in file routines. Check return code on kmalloc in open. |
| 960 | +Fix spinlock usage for SMP. |
| 961 | + |
| 962 | +Version 0.91 |
| 963 | +------------ |
| 964 | +Fix oops in reopen_files when invalid dentry. drop dentry on server rename |
| 965 | +and on revalidate errors. Fix cases where pid is now tgid. Fix return code |
| 966 | +on create hard link when server does not support them. |
| 967 | + |
| 968 | +Version 0.90 |
| 969 | +------------ |
| 970 | +Fix scheduling while atomic error in getting inode info on newly created file. |
| 971 | +Fix truncate of existing files opened with O_CREAT but not O_TRUNC set. |
| 972 | + |
| 973 | +Version 0.89 |
| 974 | +------------ |
| 975 | +Fix oops on write to dead tcp session. Remove error log write for case when file open |
| 976 | +O_CREAT but not O_EXCL |
| 977 | + |
| 978 | +Version 0.88 |
| 979 | +------------ |
| 980 | +Fix non-POSIX behavior on rename of open file and delete of open file by taking |
| 981 | +advantage of trans2 SetFileInfo rename facility if available on target server. |
| 982 | +Retry on ENOSPC and EAGAIN socket errors. |
| 983 | + |
| 984 | +Version 0.87 |
| 985 | +------------ |
| 986 | +Fix oops on big endian readdir. Set blksize to be even power of two (2**blkbits) to fix |
| 987 | +allocation size miscalculation. After oplock token lost do not read through |
| 988 | +cache. |
| 989 | + |
| 990 | +Version 0.86 |
| 991 | +------------ |
| 992 | +Fix oops on empty file readahead. Fix for file size handling for locally cached files. |
| 993 | + |
| 994 | +Version 0.85 |
| 995 | +------------ |
| 996 | +Fix oops in mkdir when server fails to return inode info. Fix oops in reopen_files |
| 997 | +during auto reconnection to server after server recovered from failure. |
| 998 | + |
| 999 | +Version 0.84 |
| 1000 | +------------ |
| 1001 | +Finish support for Linux 2.5 open/create changes, which removes the |
| 1002 | +redundant NTCreate/QPathInfo/close that was sent during file create. |
| 1003 | +Enable oplock by default. Enable packet signing by default (needed to |
| 1004 | +access many recent Windows servers) |
| 1005 | + |
| 1006 | +Version 0.83 |
| 1007 | +------------ |
| 1008 | +Fix oops when mounting to long server names caused by inverted parms to kmalloc. |
| 1009 | +Fix MultiuserMount (/proc/fs/cifs configuration setting) so that when enabled |
| 1010 | +we will choose a cifs user session (smb uid) that better matches the local |
| 1011 | +uid if a) the mount uid does not match the current uid and b) we have another |
| 1012 | +session to the same server (ip address) for a different mount which |
| 1013 | +matches the current local uid. |
| 1014 | + |
| 1015 | +Version 0.82 |
| 1016 | +------------ |
| 1017 | +Add support for mknod of block or character devices. Fix oplock |
| 1018 | +code (distributed caching) to properly send response to oplock |
| 1019 | +break from server. |
| 1020 | + |
| 1021 | +Version 0.81 |
| 1022 | +------------ |
| 1023 | +Finish up CIFS packet digital signing for the default |
| 1024 | +NTLM security case. This should help Windows 2003 |
| 1025 | +network interoperability since it is common for |
| 1026 | +packet signing to be required now. Fix statfs (stat -f) |
| 1027 | +which recently started returning errors due to |
| 1028 | +invalid value (-1 instead of 0) being set in the |
| 1029 | +struct kstatfs f_ffiles field. |
| 1030 | + |
| 1031 | +Version 0.80 |
| 1032 | +----------- |
| 1033 | +Fix oops on stopping oplock thread when removing cifs when |
| 1034 | +built as module. |
| 1035 | + |
| 1036 | +Version 0.79 |
| 1037 | +------------ |
| 1038 | +Fix mount options for ro (readonly), uid, gid and file and directory mode. |
| 1039 | + |
| 1040 | +Version 0.78 |
| 1041 | +------------ |
| 1042 | +Fix errors displayed on failed mounts to be more understandable. |
| 1043 | +Fixed various incorrect or misleading smb to posix error code mappings. |
| 1044 | + |
| 1045 | +Version 0.77 |
| 1046 | +------------ |
| 1047 | +Fix display of NTFS DFS junctions to display as symlinks. |
| 1048 | +They are the network equivalent. Fix oops in |
| 1049 | +cifs_partialpagewrite caused by missing spinlock protection |
| 1050 | +of openfile linked list. Allow writebehind caching errors to |
| 1051 | +be returned to the application at file close. |
| 1052 | + |
| 1053 | +Version 0.76 |
| 1054 | +------------ |
| 1055 | +Clean up options displayed in /proc/mounts by show_options to |
| 1056 | +be more consistent with other filesystems. |
| 1057 | + |
| 1058 | +Version 0.75 |
| 1059 | +------------ |
| 1060 | +Fix delete of readonly file to Windows servers. Reflect |
| 1061 | +presence or absence of read only dos attribute in mode |
| 1062 | +bits for servers that do not support CIFS Unix extensions. |
| 1063 | +Fix shortened results on readdir of large directories to |
| 1064 | +servers supporting CIFS Unix extensions (caused by |
| 1065 | +incorrect resume key). |
| 1066 | + |
| 1067 | +Version 0.74 |
| 1068 | +------------ |
| 1069 | +Fix truncate bug (set file size) that could cause hangs e.g. running fsx |
| 1070 | + |
| 1071 | +Version 0.73 |
| 1072 | +------------ |
| 1073 | +unload nls if mount fails. |
| 1074 | + |
| 1075 | +Version 0.72 |
| 1076 | +------------ |
| 1077 | +Add resume key support to search (readdir) code to workaround |
| 1078 | +Windows bug. Add /proc/fs/cifs/LookupCacheEnable which |
| 1079 | +allows disabling caching of attribute information for |
| 1080 | +lookups. |
| 1081 | + |
| 1082 | +Version 0.71 |
| 1083 | +------------ |
| 1084 | +Add more oplock handling (distributed caching code). Remove |
| 1085 | +dead code. Remove excessive stack space utilization from |
| 1086 | +symlink routines. |
| 1087 | + |
| 1088 | +Version 0.70 |
| 1089 | +------------ |
| 1090 | +Fix oops in get dfs referral (triggered when null path sent in to |
| 1091 | +mount). Add support for overriding rsize at mount time. |
| 1092 | + |
| 1093 | +Version 0.69 |
| 1094 | +------------ |
| 1095 | +Fix buffer overrun in readdir which caused intermittent kernel oopses. |
| 1096 | +Fix writepage code to release kmap on write data. Allow "-ip=" new |
| 1097 | +mount option to be passed in on parameter distinct from the first part |
| 1098 | +(server name portion of) the UNC name. Allow override of the |
| 1099 | +tcp port of the target server via new mount option "-port=" |
| 1100 | + |
| 1101 | +Version 0.68 |
| 1102 | +------------ |
| 1103 | +Fix search handle leak on rewind. Fix setuid and gid so that they are |
| 1104 | +reflected in the local inode immediately. Cleanup of whitespace |
| 1105 | +to make 2.4 and 2.5 versions more consistent. |
| 1106 | + |
| 1107 | + |
| 1108 | +Version 0.67 |
| 1109 | +------------ |
| 1110 | +Fix signal sending so that captive thread (cifsd) exits on umount |
| 1111 | +(which was causing the warning in kmem_cache_free of the request buffers |
| 1112 | +at rmmod time). This had broken as a sideeffect of the recent global |
| 1113 | +kernel change to daemonize. Fix memory leak in readdir code which |
| 1114 | +showed up in "ls -R" (and applications that did search rewinding). |
| 1115 | + |
| 1116 | +Version 0.66 |
| 1117 | +------------ |
| 1118 | +Reconnect tids and fids after session reconnection (still do not |
| 1119 | +reconnect byte range locks though). Fix problem caching |
| 1120 | +lookup information for directory inodes, improving performance, |
| 1121 | +especially in deep directory trees. Fix various build warnings. |
| 1122 | + |
| 1123 | +Version 0.65 |
| 1124 | +------------ |
| 1125 | +Finish fixes to commit write for caching/readahead consistency. fsx |
| 1126 | +now works to Samba servers. Fix oops caused when readahead |
| 1127 | +was interrupted by a signal. |
| 1128 | + |
| 1129 | +Version 0.64 |
| 1130 | +------------ |
| 1131 | +Fix data corruption (in partial page after truncate) that caused fsx to |
| 1132 | +fail to Windows servers. Cleaned up some extraneous error logging in |
| 1133 | +common error paths. Add generic sendfile support. |
| 1134 | + |
| 1135 | +Version 0.63 |
| 1136 | +------------ |
| 1137 | +Fix memory leak in AllocMidQEntry. |
| 1138 | +Finish reconnection logic, so connection with server can be dropped |
| 1139 | +(or server rebooted) and the cifs client will reconnect. |
| 1140 | + |
| 1141 | +Version 0.62 |
| 1142 | +------------ |
| 1143 | +Fix temporary socket leak when bad userid or password specified |
| 1144 | +(or other SMBSessSetup failure). Increase maximum buffer size to slightly |
| 1145 | +over 16K to allow negotiation of up to Samba and Windows server default read |
| 1146 | +sizes. Add support for readpages |
| 1147 | + |
| 1148 | +Version 0.61 |
| 1149 | +------------ |
| 1150 | +Fix oops when username not passed in on mount. Extensive fixes and improvements |
| 1151 | +to error logging (strip redundant newlines, change debug macros to ensure newline |
| 1152 | +passed in and to be more consistent). Fix writepage wrong file handle problem, |
| 1153 | +a readonly file handle could be incorrectly used to attempt to write out |
| 1154 | +file updates through the page cache to multiply open files. This could cause |
| 1155 | +the iozone benchmark to fail on the fwrite test. Fix bug mounting two different |
| 1156 | +shares to the same Windows server when using different usernames |
| 1157 | +(doing this to Samba servers worked but Windows was rejecting it) - now it is |
| 1158 | +possible to use different userids when connecting to the same server from a |
| 1159 | +Linux client. Fix oops when treeDisconnect called during unmount on |
| 1160 | +previously freed socket. |
| 1161 | + |
| 1162 | +Version 0.60 |
| 1163 | +------------ |
| 1164 | +Fix oops in readpages caused by not setting address space operations in inode in |
| 1165 | +rare code path. |
| 1166 | + |
| 1167 | +Version 0.59 |
| 1168 | +------------ |
| 1169 | +Includes support for deleting of open files and renaming over existing files (per POSIX |
| 1170 | +requirement). Add readlink support for Windows junction points (directory symlinks). |
| 1171 | + |
| 1172 | +Version 0.58 |
| 1173 | +------------ |
| 1174 | +Changed read and write to go through pagecache. Added additional address space operations. |
| 1175 | +Memory mapped operations now working. |
| 1176 | + |
| 1177 | +Version 0.57 |
| 1178 | +------------ |
| 1179 | +Added writepage code for additional memory mapping support. Fixed leak in xids causing |
| 1180 | +the simultaneous operations counter (/proc/fs/cifs/SimultaneousOps) to increase on |
| 1181 | +every stat call. Additional formatting cleanup. |
| 1182 | + |
| 1183 | +Version 0.56 |
| 1184 | +------------ |
| 1185 | +Fix bigendian bug in order of time conversion. Merge 2.5 to 2.4 version. Formatting cleanup. |
| 1186 | + |
| 1187 | +Version 0.55 |
| 1188 | +------------ |
| 1189 | +Fixes from Zwane Mwaikambo for adding missing return code checking in a few places. |
| 1190 | +Also included a modified version of his fix to protect global list manipulation of |
| 1191 | +the smb session and tree connection and mid related global variables. |
| 1192 | + |
| 1193 | +Version 0.54 |
| 1194 | +------------ |
| 1195 | +Fix problem with captive thread hanging around at unmount time. Adjust to 2.5.42-pre |
| 1196 | +changes to superblock layout. Remove wasteful allocation of smb buffers (now the send |
| 1197 | +buffer is reused for responses). Add more oplock handling. Additional minor cleanup. |
| 1198 | + |
| 1199 | +Version 0.53 |
| 1200 | +------------ |
| 1201 | +More stylistic updates to better match kernel style. Add additional statistics |
| 1202 | +for filesystem which can be viewed via /proc/fs/cifs. Add more pieces of NTLMv2 |
| 1203 | +and CIFS Packet Signing enablement. |
| 1204 | + |
| 1205 | +Version 0.52 |
| 1206 | +------------ |
| 1207 | +Replace call to sleep_on with safer wait_on_event. |
| 1208 | +Make stylistic changes to better match kernel style recommendations. |
| 1209 | +Remove most typedef usage (except for the PDUs themselves). |
| 1210 | + |
| 1211 | +Version 0.51 |
| 1212 | +------------ |
| 1213 | +Update mount so the -unc mount option is no longer required (the ip address can be specified |
| 1214 | +in a UNC style device name. Implementation of readpage/writepage started. |
| 1215 | + |
| 1216 | +Version 0.50 |
| 1217 | +------------ |
| 1218 | +Fix intermittent problem with incorrect smb header checking on badly |
| 1219 | +fragmented tcp responses |
| 1220 | + |
| 1221 | +Version 0.49 |
| 1222 | +------------ |
| 1223 | +Fixes to setting of allocation size and file size. |
| 1224 | + |
| 1225 | +Version 0.48 |
| 1226 | +------------ |
| 1227 | +Various 2.5.38 fixes. Now works on 2.5.38 |
| 1228 | + |
| 1229 | +Version 0.47 |
| 1230 | +------------ |
| 1231 | +Prepare for 2.5 kernel merge. Remove ifdefs. |
| 1232 | + |
| 1233 | +Version 0.46 |
| 1234 | +------------ |
| 1235 | +Socket buffer management fixes. Fix dual free. |
| 1236 | + |
| 1237 | +Version 0.45 |
| 1238 | +------------ |
| 1239 | +Various big endian fixes for hardlinks and symlinks and also for dfs. |
| 1240 | + |
| 1241 | +Version 0.44 |
| 1242 | +------------ |
| 1243 | +Various big endian fixes for servers with Unix extensions such as Samba |
| 1244 | + |
| 1245 | +Version 0.43 |
| 1246 | +------------ |
| 1247 | +Various FindNext fixes for incorrect filenames on large directory searches on big endian |
| 1248 | +clients. basic posix file i/o tests now work on big endian machines, not just le |
| 1249 | + |
| 1250 | +Version 0.42 |
| 1251 | +------------ |
| 1252 | +SessionSetup and NegotiateProtocol now work from Big Endian machines. |
| 1253 | +Various Big Endian fixes found during testing on the Linux on 390. Various fixes for compatibility with older |
| 1254 | +versions of 2.4 kernel (now builds and works again on kernels at least as early as 2.4.7). |
| 1255 | + |
| 1256 | +Version 0.41 |
| 1257 | +------------ |
| 1258 | +Various minor fixes for Connectathon Posix "basic" file i/o test suite. Directory caching fixed so hardlinked |
| 1259 | +files now return the correct rumber of links on fstat as they are repeatedly linked and unlinked. |
| 1260 | + |
| 1261 | +Version 0.40 |
| 1262 | +------------ |
| 1263 | +Implemented "Raw" (i.e. not encapsulated in SPNEGO) NTLMSSP (i.e. the Security Provider Interface used to negotiate |
| 1264 | +session advanced session authentication). Raw NTLMSSP is preferred by Windows 2000 Professional and Windows XP. |
| 1265 | +Began implementing support for SPNEGO encapsulation of NTLMSSP based session authentication blobs |
| 1266 | +(which is the mechanism preferred by Windows 2000 server in the absence of Kerberos). |
| 1267 | + |
| 1268 | +Version 0.38 |
| 1269 | +------------ |
| 1270 | +Introduced optional mount helper utility mount.cifs and made coreq changes to cifs vfs to enable |
| 1271 | +it. Fixed a few bugs in the DFS code (e.g. bcc two bytes too short and incorrect uid in PDU). |
| 1272 | + |
| 1273 | +Version 0.37 |
| 1274 | +------------ |
| 1275 | +Rewrote much of connection and mount/unmount logic to handle bugs with |
| 1276 | +multiple uses to same share, multiple users to same server etc. |
| 1277 | + |
| 1278 | +Version 0.36 |
| 1279 | +------------ |
| 1280 | +Fixed major problem with dentry corruption (missing call to dput) |
| 1281 | + |
| 1282 | +Version 0.35 |
| 1283 | +------------ |
| 1284 | +Rewrite of readdir code to fix bug. Various fixes for bigendian machines. |
| 1285 | +Begin adding oplock support. Multiusermount and oplockEnabled flags added to /proc/fs/cifs |
| 1286 | +although corresponding function not fully implemented in the vfs yet |
| 1287 | + |
| 1288 | +Version 0.34 |
| 1289 | +------------ |
| 1290 | +Fixed dentry caching bug, misc. cleanup |
| 1291 | + |
| 1292 | +Version 0.33 |
| 1293 | +------------ |
| 1294 | +Fixed 2.5 support to handle build and configure changes as well as misc. 2.5 changes. Now can build |
| 1295 | +on current 2.5 beta version (2.5.24) of the Linux kernel as well as on 2.4 Linux kernels. |
| 1296 | +Support for STATUS codes (newer 32 bit NT error codes) added. DFS support begun to be added. |
| 1297 | + |
| 1298 | +Version 0.32 |
| 1299 | +------------ |
| 1300 | +Unix extensions (symlink, readlink, hardlink, chmod and some chgrp and chown) implemented |
| 1301 | +and tested against Samba 2.2.5 |
| 1302 | + |
| 1303 | + |
| 1304 | +Version 0.31 |
| 1305 | +------------ |
| 1306 | +1) Fixed lockrange to be correct (it was one byte too short) |
| 1307 | + |
| 1308 | +2) Fixed GETLK (i.e. the fcntl call to test a range of bytes in a file to see if locked) to correctly |
| 1309 | +show range as locked when there is a conflict with an existing lock. |
| 1310 | + |
| 1311 | +3) default file perms are now 2767 (indicating support for mandatory locks) instead of 777 for directories |
| 1312 | +in most cases. Eventually will offer optional ability to query server for the correct perms. |
| 1313 | + |
| 1314 | +3) Fixed eventual trap when mounting twice to different shares on the same server when the first succeeded |
| 1315 | +but the second one was invalid and failed (the second one was incorrectly disconnecting the tcp and smb |
| 1316 | +session) |
| 1317 | + |
| 1318 | +4) Fixed error logging of valid mount options |
| 1319 | + |
| 1320 | +5) Removed logging of password field. |
| 1321 | + |
| 1322 | +6) Moved negotiate, treeDisconnect and uloggoffX (only tConx and SessSetup remain in connect.c) to cifssmb.c |
| 1323 | +and cleaned them up and made them more consistent with other cifs functions. |
| 1324 | + |
| 1325 | +7) Server support for Unix extensions is now fully detected and FindFirst is implemented both ways |
| 1326 | +(with or without Unix exentions) but FindNext and QueryPathInfo with the Unix extensions are not completed, |
| 1327 | +nor is the symlink support using the Unix extensions |
| 1328 | + |
| 1329 | +8) Started adding the readlink and follow_link code |
| 1330 | + |
| 1331 | +Version 0.3 |
| 1332 | +----------- |
| 1333 | +Initial drop |
| 1334 | + |
| 1335 | --- /dev/null |
| 1336 | +++ b/fs/cifs/cifs_debug.c |
| 1337 | @@ -0,0 +1,797 @@ |
| 1338 | +/* |
| 1339 | + * fs/cifs_debug.c |
| 1340 | + * |
| 1341 | + * Copyright (C) International Business Machines Corp., 2000,2003 |
| 1342 | + * |
| 1343 | + * Modified by Steve French (sfrench@us.ibm.com) |
| 1344 | + * |
| 1345 | + * This program is free software; you can redistribute it and/or modify |
| 1346 | + * it under the terms of the GNU General Public License as published by |
| 1347 | + * the Free Software Foundation; either version 2 of the License, or |
| 1348 | + * (at your option) any later version. |
| 1349 | + * |
| 1350 | + * This program is distributed in the hope that it will be useful, |
| 1351 | + * but WITHOUT ANY WARRANTY; without even the implied warranty of |
| 1352 | + * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See |
| 1353 | + * the GNU General Public License for more details. |
| 1354 | + * |
| 1355 | + * You should have received a copy of the GNU General Public License |
| 1356 | + * along with this program; if not, write to the Free Software |
| 1357 | + * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA |
| 1358 | + */ |
| 1359 | +#include <linux/fs.h> |
| 1360 | +#include <linux/string.h> |
| 1361 | +#include <linux/ctype.h> |
| 1362 | +#include <linux/module.h> |
| 1363 | +#include <linux/proc_fs.h> |
| 1364 | +#include <asm/uaccess.h> |
| 1365 | +#include "cifspdu.h" |
| 1366 | +#include "cifsglob.h" |
| 1367 | +#include "cifsproto.h" |
| 1368 | +#include "cifs_debug.h" |
| 1369 | + |
| 1370 | +void |
| 1371 | +cifs_dump_mem(char *label, void *data, int length) |
| 1372 | +{ |
| 1373 | + int i, j; |
| 1374 | + int *intptr = data; |
| 1375 | + char *charptr = data; |
| 1376 | + char buf[10], line[80]; |
| 1377 | + |
| 1378 | + printk(KERN_DEBUG "%s: dump of %d bytes of data at 0x%p\n\n", |
| 1379 | + label, length, data); |
| 1380 | + for (i = 0; i < length; i += 16) { |
| 1381 | + line[0] = 0; |
| 1382 | + for (j = 0; (j < 4) && (i + j * 4 < length); j++) { |
| 1383 | + sprintf(buf, " %08x", intptr[i / 4 + j]); |
| 1384 | + strcat(line, buf); |
| 1385 | + } |
| 1386 | + buf[0] = ' '; |
| 1387 | + buf[2] = 0; |
| 1388 | + for (j = 0; (j < 16) && (i + j < length); j++) { |
| 1389 | + buf[1] = isprint(charptr[i + j]) ? charptr[i + j] : '.'; |
| 1390 | + strcat(line, buf); |
| 1391 | + } |
| 1392 | + printk(KERN_DEBUG "%s\n", line); |
| 1393 | + } |
| 1394 | +} |
| 1395 | + |
| 1396 | +#ifdef CONFIG_PROC_FS |
| 1397 | +int |
| 1398 | +cifs_debug_data_read(char *buf, char **beginBuffer, off_t offset, |
| 1399 | + int count, int *eof, void *data) |
| 1400 | +{ |
| 1401 | + struct list_head *tmp; |
| 1402 | + struct list_head *tmp1; |
| 1403 | + struct mid_q_entry * mid_entry; |
| 1404 | + struct cifsSesInfo *ses; |
| 1405 | + struct cifsTconInfo *tcon; |
| 1406 | + int i; |
| 1407 | + int length = 0; |
| 1408 | + char * original_buf = buf; |
| 1409 | + |
| 1410 | + *beginBuffer = buf + offset; |
| 1411 | + |
| 1412 | + |
| 1413 | + length = |
| 1414 | + sprintf(buf, |
| 1415 | + "Display Internal CIFS Data Structures for Debugging\n" |
| 1416 | + "---------------------------------------------------\n"); |
| 1417 | + buf += length; |
| 1418 | + |
| 1419 | + length = sprintf(buf, "Servers:\n"); |
| 1420 | + buf += length; |
| 1421 | + |
| 1422 | + i = 0; |
| 1423 | + read_lock(&GlobalSMBSeslock); |
| 1424 | + list_for_each(tmp, &GlobalSMBSessionList) { |
| 1425 | + i++; |
| 1426 | + ses = list_entry(tmp, struct cifsSesInfo, cifsSessionList); |
| 1427 | + length = |
| 1428 | + sprintf(buf, |
| 1429 | + "\n%d) Name: %s Domain: %s Mounts: %d ServerOS: %s \n\tServerNOS: %s\tCapabilities: 0x%x\n\tSMB session status: %d\tTCP status: %d", |
| 1430 | + i, ses->serverName, ses->serverDomain, atomic_read(&ses->inUse), |
| 1431 | + ses->serverOS, ses->serverNOS, ses->capabilities,ses->status,ses->server->tcpStatus); |
| 1432 | + buf += length; |
| 1433 | + if(ses->server) { |
| 1434 | + buf += sprintf(buf, "\n\tLocal Users To Server: %d SecMode: 0x%x Req Active: %d", |
| 1435 | + atomic_read(&ses->server->socketUseCount), |
| 1436 | + ses->server->secMode, |
| 1437 | + atomic_read(&ses->server->inFlight)); |
| 1438 | + |
| 1439 | + length = sprintf(buf, "\nMIDs: \n"); |
| 1440 | + buf += length; |
| 1441 | + |
| 1442 | + spin_lock(&GlobalMid_Lock); |
| 1443 | + list_for_each(tmp1, &ses->server->pending_mid_q) { |
| 1444 | + mid_entry = list_entry(tmp1, struct |
| 1445 | + mid_q_entry, |
| 1446 | + qhead); |
| 1447 | + if(mid_entry) { |
| 1448 | + length = sprintf(buf,"State: %d com: %d pid: %d tsk: %p mid %d\n",mid_entry->midState,mid_entry->command,mid_entry->pid,mid_entry->tsk,mid_entry->mid); |
| 1449 | + buf += length; |
| 1450 | + } |
| 1451 | + } |
| 1452 | + spin_unlock(&GlobalMid_Lock); |
| 1453 | + } |
| 1454 | + |
| 1455 | + } |
| 1456 | + read_unlock(&GlobalSMBSeslock); |
| 1457 | + sprintf(buf, "\n"); |
| 1458 | + buf++; |
| 1459 | + |
| 1460 | + length = sprintf(buf, "\nShares:\n"); |
| 1461 | + buf += length; |
| 1462 | + |
| 1463 | + i = 0; |
| 1464 | + read_lock(&GlobalSMBSeslock); |
| 1465 | + list_for_each(tmp, &GlobalTreeConnectionList) { |
| 1466 | + i++; |
| 1467 | + tcon = list_entry(tmp, struct cifsTconInfo, cifsConnectionList); |
| 1468 | + length = |
| 1469 | + sprintf(buf, |
| 1470 | + "\n%d) %s Uses: %d Type: %s Characteristics: 0x%x Attributes: 0x%x\nPathComponentMax: %d Status: %d", |
| 1471 | + i, tcon->treeName, |
| 1472 | + atomic_read(&tcon->useCount), |
| 1473 | + tcon->nativeFileSystem, |
| 1474 | + tcon->fsDevInfo.DeviceCharacteristics, |
| 1475 | + tcon->fsAttrInfo.Attributes, |
| 1476 | + tcon->fsAttrInfo.MaxPathNameComponentLength,tcon->tidStatus); |
| 1477 | + buf += length; |
| 1478 | + if (tcon->fsDevInfo.DeviceType == FILE_DEVICE_DISK) |
| 1479 | + length = sprintf(buf, " type: DISK "); |
| 1480 | + else if (tcon->fsDevInfo.DeviceType == FILE_DEVICE_CD_ROM) |
| 1481 | + length = sprintf(buf, " type: CDROM "); |
| 1482 | + else |
| 1483 | + length = |
| 1484 | + sprintf(buf, " type: %d ", |
| 1485 | + tcon->fsDevInfo.DeviceType); |
| 1486 | + buf += length; |
| 1487 | + if(tcon->tidStatus == CifsNeedReconnect) { |
| 1488 | + buf += sprintf(buf, "\tDISCONNECTED "); |
| 1489 | + length += 14; |
| 1490 | + } |
| 1491 | + } |
| 1492 | + read_unlock(&GlobalSMBSeslock); |
| 1493 | + |
| 1494 | + length = sprintf(buf, "\n"); |
| 1495 | + buf += length; |
| 1496 | + |
| 1497 | + /* BB add code to dump additional info such as TCP session info now */ |
| 1498 | + /* Now calculate total size of returned data */ |
| 1499 | + length = buf - original_buf; |
| 1500 | + |
| 1501 | + if(offset + count >= length) |
| 1502 | + *eof = 1; |
| 1503 | + if(length < offset) { |
| 1504 | + *eof = 1; |
| 1505 | + return 0; |
| 1506 | + } else { |
| 1507 | + length = length - offset; |
| 1508 | + } |
| 1509 | + if (length > count) |
| 1510 | + length = count; |
| 1511 | + |
| 1512 | + return length; |
| 1513 | +} |
| 1514 | + |
| 1515 | +#ifdef CONFIG_CIFS_STATS |
| 1516 | +int |
| 1517 | +cifs_stats_read(char *buf, char **beginBuffer, off_t offset, |
| 1518 | + int count, int *eof, void *data) |
| 1519 | +{ |
| 1520 | + int item_length,i,length; |
| 1521 | + struct list_head *tmp; |
| 1522 | + struct cifsTconInfo *tcon; |
| 1523 | + |
| 1524 | + *beginBuffer = buf + offset; |
| 1525 | + |
| 1526 | + length = sprintf(buf, |
| 1527 | + "Resources in use\nCIFS Session: %d\n", |
| 1528 | + sesInfoAllocCount.counter); |
| 1529 | + buf += length; |
| 1530 | + item_length = |
| 1531 | + sprintf(buf,"Share (unique mount targets): %d\n", |
| 1532 | + tconInfoAllocCount.counter); |
| 1533 | + length += item_length; |
| 1534 | + buf += item_length; |
| 1535 | + item_length = |
| 1536 | + sprintf(buf,"SMB Request/Response Buffer: %d\n", |
| 1537 | + bufAllocCount.counter); |
| 1538 | + length += item_length; |
| 1539 | + buf += item_length; |
| 1540 | + item_length = |
| 1541 | + sprintf(buf,"Operations (MIDs): %d\n", |
| 1542 | + midCount.counter); |
| 1543 | + length += item_length; |
| 1544 | + buf += item_length; |
| 1545 | + item_length = sprintf(buf, |
| 1546 | + "\n%d session %d share reconnects\n", |
| 1547 | + tcpSesReconnectCount.counter,tconInfoReconnectCount.counter); |
| 1548 | + length += item_length; |
| 1549 | + buf += item_length; |
| 1550 | + |
| 1551 | + item_length = sprintf(buf, |
| 1552 | + "Total vfs operations: %d maximum at one time: %d\n", |
| 1553 | + GlobalCurrentXid,GlobalMaxActiveXid); |
| 1554 | + length += item_length; |
| 1555 | + buf += item_length; |
| 1556 | + |
| 1557 | + i = 0; |
| 1558 | + read_lock(&GlobalSMBSeslock); |
| 1559 | + list_for_each(tmp, &GlobalTreeConnectionList) { |
| 1560 | + i++; |
| 1561 | + tcon = list_entry(tmp, struct cifsTconInfo, cifsConnectionList); |
| 1562 | + item_length = sprintf(buf,"\n%d) %s",i, tcon->treeName); |
| 1563 | + buf += item_length; |
| 1564 | + length += item_length; |
| 1565 | + if(tcon->tidStatus == CifsNeedReconnect) { |
| 1566 | + buf += sprintf(buf, "\tDISCONNECTED "); |
| 1567 | + length += 14; |
| 1568 | + } |
| 1569 | + item_length = sprintf(buf,"\nSMBs: %d Oplock Breaks: %d", |
| 1570 | + atomic_read(&tcon->num_smbs_sent), |
| 1571 | + atomic_read(&tcon->num_oplock_brks)); |
| 1572 | + buf += item_length; |
| 1573 | + length += item_length; |
| 1574 | + item_length = sprintf(buf,"\nReads: %d Bytes %lld", |
| 1575 | + atomic_read(&tcon->num_reads), |
| 1576 | + (long long)(tcon->bytes_read)); |
| 1577 | + buf += item_length; |
| 1578 | + length += item_length; |
| 1579 | + item_length = sprintf(buf,"\nWrites: %d Bytes: %lld", |
| 1580 | + atomic_read(&tcon->num_writes), |
| 1581 | + (long long)(tcon->bytes_written)); |
| 1582 | + buf += item_length; |
| 1583 | + length += item_length; |
| 1584 | + item_length = sprintf(buf, |
| 1585 | + "\nOpens: %d Deletes: %d\nMkdirs: %d Rmdirs: %d", |
| 1586 | + atomic_read(&tcon->num_opens), |
| 1587 | + atomic_read(&tcon->num_deletes), |
| 1588 | + atomic_read(&tcon->num_mkdirs), |
| 1589 | + atomic_read(&tcon->num_rmdirs)); |
| 1590 | + buf += item_length; |
| 1591 | + length += item_length; |
| 1592 | + item_length = sprintf(buf, |
| 1593 | + "\nRenames: %d T2 Renames %d", |
| 1594 | + atomic_read(&tcon->num_renames), |
| 1595 | + atomic_read(&tcon->num_t2renames)); |
| 1596 | + buf += item_length; |
| 1597 | + length += item_length; |
| 1598 | + } |
| 1599 | + read_unlock(&GlobalSMBSeslock); |
| 1600 | + |
| 1601 | + buf += sprintf(buf,"\n"); |
| 1602 | + length++; |
| 1603 | + |
| 1604 | + if(offset + count >= length) |
| 1605 | + *eof = 1; |
| 1606 | + if(length < offset) { |
| 1607 | + *eof = 1; |
| 1608 | + return 0; |
| 1609 | + } else { |
| 1610 | + length = length - offset; |
| 1611 | + } |
| 1612 | + if (length > count) |
| 1613 | + length = count; |
| 1614 | + |
| 1615 | + return length; |
| 1616 | +} |
| 1617 | +#endif |
| 1618 | + |
| 1619 | +struct proc_dir_entry *proc_fs_cifs; |
| 1620 | +read_proc_t cifs_txanchor_read; |
| 1621 | +static read_proc_t cifsFYI_read; |
| 1622 | +static write_proc_t cifsFYI_write; |
| 1623 | +static read_proc_t oplockEnabled_read; |
| 1624 | +static write_proc_t oplockEnabled_write; |
| 1625 | +static read_proc_t lookupFlag_read; |
| 1626 | +static write_proc_t lookupFlag_write; |
| 1627 | +static read_proc_t traceSMB_read; |
| 1628 | +static write_proc_t traceSMB_write; |
| 1629 | +static read_proc_t multiuser_mount_read; |
| 1630 | +static write_proc_t multiuser_mount_write; |
| 1631 | +static read_proc_t extended_security_read; |
| 1632 | +static write_proc_t extended_security_write; |
| 1633 | +static read_proc_t ntlmv2_enabled_read; |
| 1634 | +static write_proc_t ntlmv2_enabled_write; |
| 1635 | +static read_proc_t packet_signing_enabled_read; |
| 1636 | +static write_proc_t packet_signing_enabled_write; |
| 1637 | +static read_proc_t quotaEnabled_read; |
| 1638 | +static write_proc_t quotaEnabled_write; |
| 1639 | +static read_proc_t linuxExtensionsEnabled_read; |
| 1640 | +static write_proc_t linuxExtensionsEnabled_write; |
| 1641 | + |
| 1642 | +void |
| 1643 | +cifs_proc_init(void) |
| 1644 | +{ |
| 1645 | + struct proc_dir_entry *pde; |
| 1646 | + |
| 1647 | + proc_fs_cifs = proc_mkdir("cifs", proc_root_fs); |
| 1648 | + if (proc_fs_cifs == NULL) |
| 1649 | + return; |
| 1650 | + |
| 1651 | + proc_fs_cifs->owner = THIS_MODULE; |
| 1652 | + create_proc_read_entry("DebugData", 0, proc_fs_cifs, |
| 1653 | + cifs_debug_data_read, NULL); |
| 1654 | + |
| 1655 | +#ifdef CONFIG_CIFS_STATS |
| 1656 | + create_proc_read_entry("Stats", 0, proc_fs_cifs, |
| 1657 | + cifs_stats_read, NULL); |
| 1658 | +#endif |
| 1659 | + pde = create_proc_read_entry("cifsFYI", 0, proc_fs_cifs, |
| 1660 | + cifsFYI_read, NULL); |
| 1661 | + if (pde) |
| 1662 | + pde->write_proc = cifsFYI_write; |
| 1663 | + |
| 1664 | + pde = |
| 1665 | + create_proc_read_entry("traceSMB", 0, proc_fs_cifs, |
| 1666 | + traceSMB_read, NULL); |
| 1667 | + if (pde) |
| 1668 | + pde->write_proc = traceSMB_write; |
| 1669 | + |
| 1670 | + pde = create_proc_read_entry("OplockEnabled", 0, proc_fs_cifs, |
| 1671 | + oplockEnabled_read, NULL); |
| 1672 | + if (pde) |
| 1673 | + pde->write_proc = oplockEnabled_write; |
| 1674 | + |
| 1675 | + pde = create_proc_read_entry("QuotaEnabled", 0, proc_fs_cifs, |
| 1676 | + quotaEnabled_read, NULL); |
| 1677 | + if (pde) |
| 1678 | + pde->write_proc = quotaEnabled_write; |
| 1679 | + |
| 1680 | + pde = create_proc_read_entry("LinuxExtensionsEnabled", 0, proc_fs_cifs, |
| 1681 | + linuxExtensionsEnabled_read, NULL); |
| 1682 | + if (pde) |
| 1683 | + pde->write_proc = linuxExtensionsEnabled_write; |
| 1684 | + |
| 1685 | + pde = |
| 1686 | + create_proc_read_entry("MultiuserMount", 0, proc_fs_cifs, |
| 1687 | + multiuser_mount_read, NULL); |
| 1688 | + if (pde) |
| 1689 | + pde->write_proc = multiuser_mount_write; |
| 1690 | + |
| 1691 | + pde = |
| 1692 | + create_proc_read_entry("ExtendedSecurity", 0, proc_fs_cifs, |
| 1693 | + extended_security_read, NULL); |
| 1694 | + if (pde) |
| 1695 | + pde->write_proc = extended_security_write; |
| 1696 | + |
| 1697 | + pde = |
| 1698 | + create_proc_read_entry("LookupCacheEnabled", 0, proc_fs_cifs, |
| 1699 | + lookupFlag_read, NULL); |
| 1700 | + if (pde) |
| 1701 | + pde->write_proc = lookupFlag_write; |
| 1702 | + |
| 1703 | + pde = |
| 1704 | + create_proc_read_entry("NTLMV2Enabled", 0, proc_fs_cifs, |
| 1705 | + ntlmv2_enabled_read, NULL); |
| 1706 | + if (pde) |
| 1707 | + pde->write_proc = ntlmv2_enabled_write; |
| 1708 | + |
| 1709 | + pde = |
| 1710 | + create_proc_read_entry("PacketSigningEnabled", 0, proc_fs_cifs, |
| 1711 | + packet_signing_enabled_read, NULL); |
| 1712 | + if (pde) |
| 1713 | + pde->write_proc = packet_signing_enabled_write; |
| 1714 | +} |
| 1715 | + |
| 1716 | +void |
| 1717 | +cifs_proc_clean(void) |
| 1718 | +{ |
| 1719 | + if (proc_fs_cifs == NULL) |
| 1720 | + return; |
| 1721 | + |
| 1722 | + remove_proc_entry("DebugData", proc_fs_cifs); |
| 1723 | + remove_proc_entry("cifsFYI", proc_fs_cifs); |
| 1724 | + remove_proc_entry("traceSMB", proc_fs_cifs); |
| 1725 | +#ifdef CONFIG_CIFS_STATS |
| 1726 | + remove_proc_entry("Stats", proc_fs_cifs); |
| 1727 | +#endif |
| 1728 | + remove_proc_entry("MultiuserMount", proc_fs_cifs); |
| 1729 | + remove_proc_entry("OplockEnabled", proc_fs_cifs); |
| 1730 | + remove_proc_entry("NTLMV2Enabled",proc_fs_cifs); |
| 1731 | + remove_proc_entry("ExtendedSecurity",proc_fs_cifs); |
| 1732 | + remove_proc_entry("PacketSigningEnabled",proc_fs_cifs); |
| 1733 | + remove_proc_entry("LinuxExtensionsEnabled",proc_fs_cifs); |
| 1734 | + remove_proc_entry("QuotaEnabled",proc_fs_cifs); |
| 1735 | + remove_proc_entry("LookupCacheEnabled",proc_fs_cifs); |
| 1736 | + remove_proc_entry("cifs", proc_root_fs); |
| 1737 | +} |
| 1738 | + |
| 1739 | +static int |
| 1740 | +cifsFYI_read(char *page, char **start, off_t off, int count, |
| 1741 | + int *eof, void *data) |
| 1742 | +{ |
| 1743 | + int len; |
| 1744 | + |
| 1745 | + len = sprintf(page, "%d\n", cifsFYI); |
| 1746 | + |
| 1747 | + len -= off; |
| 1748 | + *start = page + off; |
| 1749 | + |
| 1750 | + if (len > count) |
| 1751 | + len = count; |
| 1752 | + else |
| 1753 | + *eof = 1; |
| 1754 | + |
| 1755 | + if (len < 0) |
| 1756 | + len = 0; |
| 1757 | + |
| 1758 | + return len; |
| 1759 | +} |
| 1760 | +static int |
| 1761 | +cifsFYI_write(struct file *file, const char *buffer, |
| 1762 | + unsigned long count, void *data) |
| 1763 | +{ |
| 1764 | + char c; |
| 1765 | + int rc; |
| 1766 | + |
| 1767 | + rc = get_user(c, buffer); |
| 1768 | + if (rc) |
| 1769 | + return rc; |
| 1770 | + if (c == '0' || c == 'n' || c == 'N') |
| 1771 | + cifsFYI = 0; |
| 1772 | + else if (c == '1' || c == 'y' || c == 'Y') |
| 1773 | + cifsFYI = 1; |
| 1774 | + |
| 1775 | + return count; |
| 1776 | +} |
| 1777 | + |
| 1778 | +static int |
| 1779 | +oplockEnabled_read(char *page, char **start, off_t off, |
| 1780 | + int count, int *eof, void *data) |
| 1781 | +{ |
| 1782 | + int len; |
| 1783 | + |
| 1784 | + len = sprintf(page, "%d\n", oplockEnabled); |
| 1785 | + |
| 1786 | + len -= off; |
| 1787 | + *start = page + off; |
| 1788 | + |
| 1789 | + if (len > count) |
| 1790 | + len = count; |
| 1791 | + else |
| 1792 | + *eof = 1; |
| 1793 | + |
| 1794 | + if (len < 0) |
| 1795 | + len = 0; |
| 1796 | + |
| 1797 | + return len; |
| 1798 | +} |
| 1799 | +static int |
| 1800 | +oplockEnabled_write(struct file *file, const char *buffer, |
| 1801 | + unsigned long count, void *data) |
| 1802 | +{ |
| 1803 | + char c; |
| 1804 | + int rc; |
| 1805 | + |
| 1806 | + rc = get_user(c, buffer); |
| 1807 | + if (rc) |
| 1808 | + return rc; |
| 1809 | + if (c == '0' || c == 'n' || c == 'N') |
| 1810 | + oplockEnabled = 0; |
| 1811 | + else if (c == '1' || c == 'y' || c == 'Y') |
| 1812 | + oplockEnabled = 1; |
| 1813 | + |
| 1814 | + return count; |
| 1815 | +} |
| 1816 | + |
| 1817 | +static int |
| 1818 | +quotaEnabled_read(char *page, char **start, off_t off, |
| 1819 | + int count, int *eof, void *data) |
| 1820 | +{ |
| 1821 | + int len; |
| 1822 | + |
| 1823 | + len = sprintf(page, "%d\n", quotaEnabled); |
| 1824 | +/* could also check if quotas are enabled in kernel |
| 1825 | + as a whole first */ |
| 1826 | + len -= off; |
| 1827 | + *start = page + off; |
| 1828 | + |
| 1829 | + if (len > count) |
| 1830 | + len = count; |
| 1831 | + else |
| 1832 | + *eof = 1; |
| 1833 | + |
| 1834 | + if (len < 0) |
| 1835 | + len = 0; |
| 1836 | + |
| 1837 | + return len; |
| 1838 | +} |
| 1839 | +static int |
| 1840 | +quotaEnabled_write(struct file *file, const char *buffer, |
| 1841 | + unsigned long count, void *data) |
| 1842 | +{ |
| 1843 | + char c; |
| 1844 | + int rc; |
| 1845 | + |
| 1846 | + rc = get_user(c, buffer); |
| 1847 | + if (rc) |
| 1848 | + return rc; |
| 1849 | + if (c == '0' || c == 'n' || c == 'N') |
| 1850 | + quotaEnabled = 0; |
| 1851 | + else if (c == '1' || c == 'y' || c == 'Y') |
| 1852 | + quotaEnabled = 1; |
| 1853 | + |
| 1854 | + return count; |
| 1855 | +} |
| 1856 | + |
| 1857 | +static int |
| 1858 | +linuxExtensionsEnabled_read(char *page, char **start, off_t off, |
| 1859 | + int count, int *eof, void *data) |
| 1860 | +{ |
| 1861 | + int len; |
| 1862 | + |
| 1863 | + len = sprintf(page, "%d\n", linuxExtEnabled); |
| 1864 | +/* could also check if quotas are enabled in kernel |
| 1865 | + as a whole first */ |
| 1866 | + len -= off; |
| 1867 | + *start = page + off; |
| 1868 | + |
| 1869 | + if (len > count) |
| 1870 | + len = count; |
| 1871 | + else |
| 1872 | + *eof = 1; |
| 1873 | + |
| 1874 | + if (len < 0) |
| 1875 | + len = 0; |
| 1876 | + |
| 1877 | + return len; |
| 1878 | +} |
| 1879 | +static int |
| 1880 | +linuxExtensionsEnabled_write(struct file *file, const char *buffer, |
| 1881 | + unsigned long count, void *data) |
| 1882 | +{ |
| 1883 | + char c; |
| 1884 | + int rc; |
| 1885 | + |
| 1886 | + rc = get_user(c, buffer); |
| 1887 | + if (rc) |
| 1888 | + return rc; |
| 1889 | + if (c == '0' || c == 'n' || c == 'N') |
| 1890 | + linuxExtEnabled = 0; |
| 1891 | + else if (c == '1' || c == 'y' || c == 'Y') |
| 1892 | + linuxExtEnabled = 1; |
| 1893 | + |
| 1894 | + return count; |
| 1895 | +} |
| 1896 | + |
| 1897 | + |
| 1898 | +static int |
| 1899 | +lookupFlag_read(char *page, char **start, off_t off, |
| 1900 | + int count, int *eof, void *data) |
| 1901 | +{ |
| 1902 | + int len; |
| 1903 | + |
| 1904 | + len = sprintf(page, "%d\n", lookupCacheEnabled); |
| 1905 | + |
| 1906 | + len -= off; |
| 1907 | + *start = page + off; |
| 1908 | + |
| 1909 | + if (len > count) |
| 1910 | + len = count; |
| 1911 | + else |
| 1912 | + *eof = 1; |
| 1913 | + |
| 1914 | + if (len < 0) |
| 1915 | + len = 0; |
| 1916 | + |
| 1917 | + return len; |
| 1918 | +} |
| 1919 | +static int |
| 1920 | +lookupFlag_write(struct file *file, const char *buffer, |
| 1921 | + unsigned long count, void *data) |
| 1922 | +{ |
| 1923 | + char c; |
| 1924 | + int rc; |
| 1925 | + |
| 1926 | + rc = get_user(c, buffer); |
| 1927 | + if (rc) |
| 1928 | + return rc; |
| 1929 | + if (c == '0' || c == 'n' || c == 'N') |
| 1930 | + lookupCacheEnabled = 0; |
| 1931 | + else if (c == '1' || c == 'y' || c == 'Y') |
| 1932 | + lookupCacheEnabled = 1; |
| 1933 | + |
| 1934 | + return count; |
| 1935 | +} |
| 1936 | +static int |
| 1937 | +traceSMB_read(char *page, char **start, off_t off, int count, |
| 1938 | + int *eof, void *data) |
| 1939 | +{ |
| 1940 | + int len; |
| 1941 | + |
| 1942 | + len = sprintf(page, "%d\n", traceSMB); |
| 1943 | + |
| 1944 | + len -= off; |
| 1945 | + *start = page + off; |
| 1946 | + |
| 1947 | + if (len > count) |
| 1948 | + len = count; |
| 1949 | + else |
| 1950 | + *eof = 1; |
| 1951 | + |
| 1952 | + if (len < 0) |
| 1953 | + len = 0; |
| 1954 | + |
| 1955 | + return len; |
| 1956 | +} |
| 1957 | +static int |
| 1958 | +traceSMB_write(struct file *file, const char *buffer, |
| 1959 | + unsigned long count, void *data) |
| 1960 | +{ |
| 1961 | + char c; |
| 1962 | + int rc; |
| 1963 | + |
| 1964 | + rc = get_user(c, buffer); |
| 1965 | + if (rc) |
| 1966 | + return rc; |
| 1967 | + if (c == '0' || c == 'n' || c == 'N') |
| 1968 | + traceSMB = 0; |
| 1969 | + else if (c == '1' || c == 'y' || c == 'Y') |
| 1970 | + traceSMB = 1; |
| 1971 | + |
| 1972 | + return count; |
| 1973 | +} |
| 1974 | + |
| 1975 | +static int |
| 1976 | +multiuser_mount_read(char *page, char **start, off_t off, |
| 1977 | + int count, int *eof, void *data) |
| 1978 | +{ |
| 1979 | + int len; |
| 1980 | + |
| 1981 | + len = sprintf(page, "%d\n", multiuser_mount); |
| 1982 | + |
| 1983 | + len -= off; |
| 1984 | + *start = page + off; |
| 1985 | + |
| 1986 | + if (len > count) |
| 1987 | + len = count; |
| 1988 | + else |
| 1989 | + *eof = 1; |
| 1990 | + |
| 1991 | + if (len < 0) |
| 1992 | + len = 0; |
| 1993 | + |
| 1994 | + return len; |
| 1995 | +} |
| 1996 | +static int |
| 1997 | +multiuser_mount_write(struct file *file, const char *buffer, |
| 1998 | + unsigned long count, void *data) |
| 1999 | +{ |
| 2000 | + char c; |
| 2001 | + int rc; |
| 2002 | + |
| 2003 | + rc = get_user(c, buffer); |
| 2004 | + if (rc) |
| 2005 | + return rc; |
| 2006 | + if (c == '0' || c == 'n' || c == 'N') |
| 2007 | + multiuser_mount = 0; |
| 2008 | + else if (c == '1' || c == 'y' || c == 'Y') |
| 2009 | + multiuser_mount = 1; |
| 2010 | + |
| 2011 | + return count; |
| 2012 | +} |
| 2013 | + |
| 2014 | +static int |
| 2015 | +extended_security_read(char *page, char **start, off_t off, |
| 2016 | + int count, int *eof, void *data) |
| 2017 | +{ |
| 2018 | + int len; |
| 2019 | + |
| 2020 | + len = sprintf(page, "%d\n", extended_security); |
| 2021 | + |
| 2022 | + len -= off; |
| 2023 | + *start = page + off; |
| 2024 | + |
| 2025 | + if (len > count) |
| 2026 | + len = count; |
| 2027 | + else |
| 2028 | + *eof = 1; |
| 2029 | + |
| 2030 | + if (len < 0) |
| 2031 | + len = 0; |
| 2032 | + |
| 2033 | + return len; |
| 2034 | +} |
| 2035 | +static int |
| 2036 | +extended_security_write(struct file *file, const char *buffer, |
| 2037 | + unsigned long count, void *data) |
| 2038 | +{ |
| 2039 | + char c; |
| 2040 | + int rc; |
| 2041 | + |
| 2042 | + rc = get_user(c, buffer); |
| 2043 | + if (rc) |
| 2044 | + return rc; |
| 2045 | + if (c == '0' || c == 'n' || c == 'N') |
| 2046 | + extended_security = 0; |
| 2047 | + else if (c == '1' || c == 'y' || c == 'Y') |
| 2048 | + extended_security = 1; |
| 2049 | + |
| 2050 | + return count; |
| 2051 | +} |
| 2052 | + |
| 2053 | +static int |
| 2054 | +ntlmv2_enabled_read(char *page, char **start, off_t off, |
| 2055 | + int count, int *eof, void *data) |
| 2056 | +{ |
| 2057 | + int len; |
| 2058 | + |
| 2059 | + len = sprintf(page, "%d\n", ntlmv2_support); |
| 2060 | + |
| 2061 | + len -= off; |
| 2062 | + *start = page + off; |
| 2063 | + |
| 2064 | + if (len > count) |
| 2065 | + len = count; |
| 2066 | + else |
| 2067 | + *eof = 1; |
| 2068 | + |
| 2069 | + if (len < 0) |
| 2070 | + len = 0; |
| 2071 | + |
| 2072 | + return len; |
| 2073 | +} |
| 2074 | +static int |
| 2075 | +ntlmv2_enabled_write(struct file *file, const char *buffer, |
| 2076 | + unsigned long count, void *data) |
| 2077 | +{ |
| 2078 | + char c; |
| 2079 | + int rc; |
| 2080 | + |
| 2081 | + rc = get_user(c, buffer); |
| 2082 | + if (rc) |
| 2083 | + return rc; |
| 2084 | + if (c == '0' || c == 'n' || c == 'N') |
| 2085 | + ntlmv2_support = 0; |
| 2086 | + else if (c == '1' || c == 'y' || c == 'Y') |
| 2087 | + ntlmv2_support = 1; |
| 2088 | + |
| 2089 | + return count; |
| 2090 | +} |
| 2091 | + |
| 2092 | +static int |
| 2093 | +packet_signing_enabled_read(char *page, char **start, off_t off, |
| 2094 | + int count, int *eof, void *data) |
| 2095 | +{ |
| 2096 | + int len; |
| 2097 | + |
| 2098 | + len = sprintf(page, "%d\n", sign_CIFS_PDUs); |
| 2099 | + |
| 2100 | + len -= off; |
| 2101 | + *start = page + off; |
| 2102 | + |
| 2103 | + if (len > count) |
| 2104 | + len = count; |
| 2105 | + else |
| 2106 | + *eof = 1; |
| 2107 | + |
| 2108 | + if (len < 0) |
| 2109 | + len = 0; |
| 2110 | + |
| 2111 | + return len; |
| 2112 | +} |
| 2113 | +static int |
| 2114 | +packet_signing_enabled_write(struct file *file, const char *buffer, |
| 2115 | + unsigned long count, void *data) |
| 2116 | +{ |
| 2117 | + char c; |
| 2118 | + int rc; |
| 2119 | + |
| 2120 | + rc = get_user(c, buffer); |
| 2121 | + if (rc) |
| 2122 | + return rc; |
| 2123 | + if (c == '0' || c == 'n' || c == 'N') |
| 2124 | + sign_CIFS_PDUs = 0; |
| 2125 | + else if (c == '1' || c == 'y' || c == 'Y') |
| 2126 | + sign_CIFS_PDUs = 1; |
| 2127 | + else if (c == '2') |
| 2128 | + sign_CIFS_PDUs = 2; |
| 2129 | + |
| 2130 | + return count; |
| 2131 | +} |
| 2132 | + |
| 2133 | + |
| 2134 | +#endif |
| 2135 | --- /dev/null |
| 2136 | +++ b/fs/cifs/cifs_debug.h |
| 2137 | @@ -0,0 +1,66 @@ |
| 2138 | +/* |
| 2139 | + * |
| 2140 | + * Copyright (c) International Business Machines Corp., 2000,2002 |
| 2141 | + * Modified by Steve French (sfrench@us.ibm.com) |
| 2142 | + * |
| 2143 | + * This program is free software; you can redistribute it and/or modify |
| 2144 | + * it under the terms of the GNU General Public License as published by |
| 2145 | + * the Free Software Foundation; either version 2 of the License, or |
| 2146 | + * (at your option) any later version. |
| 2147 | + * |
| 2148 | + * This program is distributed in the hope that it will be useful, |
| 2149 | + * but WITHOUT ANY WARRANTY; without even the implied warranty of |
| 2150 | + * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See |
| 2151 | + * the GNU General Public License for more details. |
| 2152 | + * |
| 2153 | + * You should have received a copy of the GNU General Public License |
| 2154 | + * along with this program; if not, write to the Free Software |
| 2155 | + * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA |
| 2156 | + * |
| 2157 | +*/ |
| 2158 | +#define CIFS_DEBUG /* BB temporary */ |
| 2159 | + |
| 2160 | +#ifndef _H_CIFS_DEBUG |
| 2161 | +#define _H_CIFS_DEBUG |
| 2162 | + |
| 2163 | +void cifs_dump_mem(char *label, void *data, int length); |
| 2164 | +extern int traceSMB; /* flag which enables the function below */ |
| 2165 | +void dump_smb(struct smb_hdr *, int); |
| 2166 | + |
| 2167 | +/* |
| 2168 | + * debug ON |
| 2169 | + * -------- |
| 2170 | + */ |
| 2171 | +#ifdef CIFS_DEBUG |
| 2172 | + |
| 2173 | + |
| 2174 | +/* information message: e.g., configuration, major event */ |
| 2175 | +extern int cifsFYI; |
| 2176 | +#define cifsfyi(format,arg...) if (cifsFYI) printk(KERN_DEBUG " " __FILE__ ": " format "\n" "" , ## arg) |
| 2177 | + |
| 2178 | +#define cFYI(button,prspec) if (button) cifsfyi prspec |
| 2179 | + |
| 2180 | +#define cifswarn(format, arg...) printk(KERN_WARNING ": " format "\n" , ## arg) |
| 2181 | + |
| 2182 | +/* debug event message: */ |
| 2183 | +extern int cifsERROR; |
| 2184 | + |
| 2185 | +#define cEVENT(format,arg...) if (cifsERROR) printk(KERN_EVENT __FILE__ ": " format "\n" , ## arg) |
| 2186 | + |
| 2187 | +/* error event message: e.g., i/o error */ |
| 2188 | +#define cifserror(format,arg...) if (cifsERROR) printk(KERN_ERR " CIFS VFS: " format "\n" "" , ## arg) |
| 2189 | + |
| 2190 | +#define cERROR(button, prspec) if (button) cifserror prspec |
| 2191 | + |
| 2192 | +/* |
| 2193 | + * debug OFF |
| 2194 | + * --------- |
| 2195 | + */ |
| 2196 | +#else /* _CIFS_DEBUG */ |
| 2197 | +#define cERROR(button,prspec) |
| 2198 | +#define cEVENT(format,arg...) |
| 2199 | +#define cFYI(button, prspec) |
| 2200 | +#define cifserror(format,arg...) |
| 2201 | +#endif /* _CIFS_DEBUG */ |
| 2202 | + |
| 2203 | +#endif /* _H_CIFS_DEBUG */ |
| 2204 | --- /dev/null |
| 2205 | +++ b/fs/cifs/cifsencrypt.c |
| 2206 | @@ -0,0 +1,204 @@ |
| 2207 | +/* |
| 2208 | + * fs/cifs/cifsencrypt.c |
| 2209 | + * |
| 2210 | + * Copyright (C) International Business Machines Corp., 2003 |
| 2211 | + * Author(s): Steve French (sfrench@us.ibm.com) |
| 2212 | + * |
| 2213 | + * This library is free software; you can redistribute it and/or modify |
| 2214 | + * it under the terms of the GNU Lesser General Public License as published |
| 2215 | + * by the Free Software Foundation; either version 2.1 of the License, or |
| 2216 | + * (at your option) any later version. |
| 2217 | + * |
| 2218 | + * This library is distributed in the hope that it will be useful, |
| 2219 | + * but WITHOUT ANY WARRANTY; without even the implied warranty of |
| 2220 | + * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See |
| 2221 | + * the GNU Lesser General Public License for more details. |
| 2222 | + * |
| 2223 | + * You should have received a copy of the GNU Lesser General Public License |
| 2224 | + * along with this library; if not, write to the Free Software |
| 2225 | + * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA |
| 2226 | + */ |
| 2227 | + |
| 2228 | +#include <linux/fs.h> |
| 2229 | +#include "cifspdu.h" |
| 2230 | +#include "cifsglob.h" |
| 2231 | +#include "cifs_debug.h" |
| 2232 | +#include "md5.h" |
| 2233 | +#include "cifs_unicode.h" |
| 2234 | + |
| 2235 | +/* Calculate and return the CIFS signature based on the mac key and the smb pdu */ |
| 2236 | +/* the 16 byte signature must be allocated by the caller */ |
| 2237 | +/* Note we only use the 1st eight bytes */ |
| 2238 | +/* Note that the smb header signature field on input contains the |
| 2239 | + sequence number before this function is called */ |
| 2240 | + |
| 2241 | +extern void mdfour(unsigned char *out, unsigned char *in, int n); |
| 2242 | +extern void E_md4hash(const unsigned char *passwd, unsigned char *p16); |
| 2243 | + |
| 2244 | +static int cifs_calculate_signature(const struct smb_hdr * cifs_pdu, const char * key, char * signature) |
| 2245 | +{ |
| 2246 | + struct MD5Context context; |
| 2247 | + |
| 2248 | + if((cifs_pdu == NULL) || (signature == NULL)) |
| 2249 | + return -EINVAL; |
| 2250 | + |
| 2251 | + MD5Init(&context); |
| 2252 | + MD5Update(&context,key,CIFS_SESSION_KEY_SIZE+16); |
| 2253 | + MD5Update(&context,cifs_pdu->Protocol,cifs_pdu->smb_buf_length); |
| 2254 | + MD5Final(signature,&context); |
| 2255 | + return 0; |
| 2256 | +} |
| 2257 | + |
| 2258 | +int cifs_sign_smb(struct smb_hdr * cifs_pdu, struct cifsSesInfo * ses, |
| 2259 | + __u32 * pexpected_response_sequence_number) |
| 2260 | +{ |
| 2261 | + int rc = 0; |
| 2262 | + char smb_signature[20]; |
| 2263 | + |
| 2264 | + /* BB remember to initialize sequence number elsewhere and initialize mac_signing key elsewhere BB */ |
| 2265 | + /* BB remember to add code to save expected sequence number in midQ entry BB */ |
| 2266 | + |
| 2267 | + if((cifs_pdu == NULL) || (ses == NULL)) |
| 2268 | + return -EINVAL; |
| 2269 | + |
| 2270 | + if((le32_to_cpu(cifs_pdu->Flags2) & SMBFLG2_SECURITY_SIGNATURE) == 0) |
| 2271 | + return rc; |
| 2272 | + |
| 2273 | + spin_lock(&GlobalMid_Lock); |
| 2274 | + cifs_pdu->Signature.Sequence.SequenceNumber = cpu_to_le32(ses->sequence_number); |
| 2275 | + cifs_pdu->Signature.Sequence.Reserved = 0; |
| 2276 | + |
| 2277 | + *pexpected_response_sequence_number = ses->sequence_number++; |
| 2278 | + ses->sequence_number++; |
| 2279 | + spin_unlock(&GlobalMid_Lock); |
| 2280 | + |
| 2281 | + rc = cifs_calculate_signature(cifs_pdu, ses->mac_signing_key,smb_signature); |
| 2282 | + if(rc) |
| 2283 | + memset(cifs_pdu->Signature.SecuritySignature, 0, 8); |
| 2284 | + else |
| 2285 | + memcpy(cifs_pdu->Signature.SecuritySignature, smb_signature, 8); |
| 2286 | + |
| 2287 | + return rc; |
| 2288 | +} |
| 2289 | + |
| 2290 | +int cifs_verify_signature(struct smb_hdr * cifs_pdu, const char * mac_key, |
| 2291 | + __u32 expected_sequence_number) |
| 2292 | +{ |
| 2293 | + unsigned int rc; |
| 2294 | + char server_response_sig[8]; |
| 2295 | + char what_we_think_sig_should_be[20]; |
| 2296 | + |
| 2297 | + if((cifs_pdu == NULL) || (mac_key == NULL)) |
| 2298 | + return -EINVAL; |
| 2299 | + |
| 2300 | + if (cifs_pdu->Command == SMB_COM_NEGOTIATE) |
| 2301 | + return 0; |
| 2302 | + |
| 2303 | + if (cifs_pdu->Command == SMB_COM_LOCKING_ANDX) { |
| 2304 | + struct smb_com_lock_req * pSMB = (struct smb_com_lock_req *)cifs_pdu; |
| 2305 | + if(pSMB->LockType & LOCKING_ANDX_OPLOCK_RELEASE) |
| 2306 | + return 0; |
| 2307 | + } |
| 2308 | + |
| 2309 | + /* BB what if signatures are supposed to be on for session but server does not |
| 2310 | + send one? BB */ |
| 2311 | + |
| 2312 | + /* Do not need to verify session setups with signature "BSRSPYL " */ |
| 2313 | + if(memcmp(cifs_pdu->Signature.SecuritySignature,"BSRSPYL ",8)==0) |
| 2314 | + cFYI(1,("dummy signature received for smb command 0x%x",cifs_pdu->Command)); |
| 2315 | + |
| 2316 | + expected_sequence_number = cpu_to_le32(expected_sequence_number); |
| 2317 | + |
| 2318 | + /* save off the origiginal signature so we can modify the smb and check |
| 2319 | + its signature against what the server sent */ |
| 2320 | + memcpy(server_response_sig,cifs_pdu->Signature.SecuritySignature,8); |
| 2321 | + |
| 2322 | + cifs_pdu->Signature.Sequence.SequenceNumber = expected_sequence_number; |
| 2323 | + cifs_pdu->Signature.Sequence.Reserved = 0; |
| 2324 | + |
| 2325 | + rc = cifs_calculate_signature(cifs_pdu, mac_key, |
| 2326 | + what_we_think_sig_should_be); |
| 2327 | + |
| 2328 | + if(rc) |
| 2329 | + return rc; |
| 2330 | + |
| 2331 | + |
| 2332 | +/* cifs_dump_mem("what we think it should be: ",what_we_think_sig_should_be,16); */ |
| 2333 | + |
| 2334 | + if(memcmp(server_response_sig, what_we_think_sig_should_be, 8)) |
| 2335 | + return -EACCES; |
| 2336 | + else |
| 2337 | + return 0; |
| 2338 | + |
| 2339 | +} |
| 2340 | + |
| 2341 | +/* We fill in key by putting in 40 byte array which was allocated by caller */ |
| 2342 | +int cifs_calculate_mac_key(char * key, const char * rn, const char * password) |
| 2343 | +{ |
| 2344 | + char temp_key[16]; |
| 2345 | + if ((key == NULL) || (rn == NULL)) |
| 2346 | + return -EINVAL; |
| 2347 | + |
| 2348 | + E_md4hash(password, temp_key); |
| 2349 | + mdfour(key,temp_key,16); |
| 2350 | + memcpy(key+16,rn, CIFS_SESSION_KEY_SIZE); |
| 2351 | + return 0; |
| 2352 | +} |
| 2353 | + |
| 2354 | +int CalcNTLMv2_partial_mac_key(struct cifsSesInfo * ses, struct nls_table * nls_info) |
| 2355 | +{ |
| 2356 | + char temp_hash[16]; |
| 2357 | + struct HMACMD5Context ctx; |
| 2358 | + char * ucase_buf; |
| 2359 | + wchar_t * unicode_buf; |
| 2360 | + unsigned int i,user_name_len,dom_name_len; |
| 2361 | + |
| 2362 | + if(ses) |
| 2363 | + return -EINVAL; |
| 2364 | + |
| 2365 | + E_md4hash(ses->password, temp_hash); |
| 2366 | + |
| 2367 | + hmac_md5_init_limK_to_64(temp_hash, 16, &ctx); |
| 2368 | + user_name_len = strlen(ses->userName); |
| 2369 | + if(user_name_len > MAX_USERNAME_SIZE) |
| 2370 | + return -EINVAL; |
| 2371 | + dom_name_len = strlen(ses->domainName); |
| 2372 | + if(dom_name_len > MAX_USERNAME_SIZE) |
| 2373 | + return -EINVAL; |
| 2374 | + |
| 2375 | + ucase_buf = kmalloc((MAX_USERNAME_SIZE+1), GFP_KERNEL); |
| 2376 | + unicode_buf = kmalloc((MAX_USERNAME_SIZE+1)*4, GFP_KERNEL); |
| 2377 | + |
| 2378 | + for(i=0;i<user_name_len;i++) |
| 2379 | + ucase_buf[i] = nls_info->charset2upper[(int)ses->userName[i]]; |
| 2380 | + ucase_buf[i] = 0; |
| 2381 | + user_name_len = cifs_strtoUCS(unicode_buf, ucase_buf, MAX_USERNAME_SIZE*2, nls_info); |
| 2382 | + unicode_buf[user_name_len] = 0; |
| 2383 | + user_name_len++; |
| 2384 | + |
| 2385 | + for(i=0;i<dom_name_len;i++) |
| 2386 | + ucase_buf[i] = nls_info->charset2upper[(int)ses->domainName[i]]; |
| 2387 | + ucase_buf[i] = 0; |
| 2388 | + dom_name_len = cifs_strtoUCS(unicode_buf+user_name_len, ucase_buf, MAX_USERNAME_SIZE*2, nls_info); |
| 2389 | + |
| 2390 | + unicode_buf[user_name_len + dom_name_len] = 0; |
| 2391 | + hmac_md5_update((const unsigned char *) unicode_buf, |
| 2392 | + (user_name_len+dom_name_len)*2,&ctx); |
| 2393 | + |
| 2394 | + hmac_md5_final(ses->mac_signing_key,&ctx); |
| 2395 | + kfree(ucase_buf); |
| 2396 | + kfree(unicode_buf); |
| 2397 | + return 0; |
| 2398 | +} |
| 2399 | +void CalcNTLMv2_response(const struct cifsSesInfo * ses,char * v2_session_response) |
| 2400 | +{ |
| 2401 | + struct HMACMD5Context context; |
| 2402 | + memcpy(v2_session_response + 8, ses->server->cryptKey,8); |
| 2403 | + /* gen_blob(v2_session_response + 16); */ |
| 2404 | + hmac_md5_init_limK_to_64(ses->mac_signing_key, 16, &context); |
| 2405 | + |
| 2406 | + hmac_md5_update(ses->server->cryptKey,8,&context); |
| 2407 | +/* hmac_md5_update(v2_session_response+16)client thing,8,&context); */ /* BB fix */ |
| 2408 | + |
| 2409 | + hmac_md5_final(v2_session_response,&context); |
| 2410 | +} |
| 2411 | --- /dev/null |
| 2412 | +++ b/fs/cifs/cifserr.c |
| 2413 | @@ -0,0 +1,70 @@ |
| 2414 | +/* |
| 2415 | + * fs/cifserr.c |
| 2416 | + * |
| 2417 | + * Copyright (c) International Business Machines Corp., 2002 |
| 2418 | + * Author(s): Steve French (sfrench@us.ibm.com) |
| 2419 | + * |
| 2420 | + * This library is free software; you can redistribute it and/or modify |
| 2421 | + * it under the terms of the GNU Lesser General Public License as published |
| 2422 | + * by the Free Software Foundation; either version 2.1 of the License, or |
| 2423 | + * (at your option) any later version. |
| 2424 | + * |
| 2425 | + * This library is distributed in the hope that it will be useful, |
| 2426 | + * but WITHOUT ANY WARRANTY; without even the implied warranty of |
| 2427 | + * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See |
| 2428 | + * the GNU Lesser General Public License for more details. |
| 2429 | + * |
| 2430 | + * You should have received a copy of the GNU Lesser General Public License |
| 2431 | + * along with this library; if not, write to the Free Software |
| 2432 | + * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA |
| 2433 | + */ |
| 2434 | + |
| 2435 | +#include <linux/errno.h> |
| 2436 | +#include <linux/fs.h> |
| 2437 | +#include <linux/smbno.h> |
| 2438 | +#include "cifsfs.h" |
| 2439 | + |
| 2440 | +int map_cifs_error(int error_class, int error_code, |
| 2441 | + int status_codes_negotiated) |
| 2442 | +{ |
| 2443 | + |
| 2444 | + |
| 2445 | + if (status_codes_negotiated) { |
| 2446 | + switch (error_code) { |
| 2447 | + default: |
| 2448 | + return EIO; |
| 2449 | + } |
| 2450 | + } else |
| 2451 | + switch (error_class) { |
| 2452 | + case SUCCESS: |
| 2453 | + return 0; |
| 2454 | + |
| 2455 | + case ERRDOS: |
| 2456 | + switch (error_code) { |
| 2457 | + case ERRbadfunc: |
| 2458 | + return EINVAL; |
| 2459 | + default: |
| 2460 | + return EIO; |
| 2461 | + } |
| 2462 | + |
| 2463 | + case ERRSRV: |
| 2464 | + switch (error_code) { |
| 2465 | + default: |
| 2466 | + return EIO; |
| 2467 | + } |
| 2468 | + |
| 2469 | + case ERRHRD: |
| 2470 | + switch (error_code) { |
| 2471 | + default: |
| 2472 | + return EIO; |
| 2473 | + } |
| 2474 | + default: |
| 2475 | + return EIO; |
| 2476 | + } |
| 2477 | + return 0; |
| 2478 | +} |
| 2479 | + |
| 2480 | +int map_smb_error(int error_class, int error_code) |
| 2481 | +{ |
| 2482 | + return map_cifs_error(error_class, error_code, FALSE); |
| 2483 | +} |
| 2484 | --- /dev/null |
| 2485 | +++ b/fs/cifs/cifsfs.c |
| 2486 | @@ -0,0 +1,769 @@ |
| 2487 | +/* |
| 2488 | + * fs/cifs/cifsfs.c |
| 2489 | + * |
| 2490 | + * Copyright (C) International Business Machines Corp., 2002,2004 |
| 2491 | + * Author(s): Steve French (sfrench@us.ibm.com) |
| 2492 | + * |
| 2493 | + * Common Internet FileSystem (CIFS) client |
| 2494 | + * |
| 2495 | + * This library is free software; you can redistribute it and/or modify |
| 2496 | + * it under the terms of the GNU Lesser General Public License as published |
| 2497 | + * by the Free Software Foundation; either version 2.1 of the License, or |
| 2498 | + * (at your option) any later version. |
| 2499 | + * |
| 2500 | + * This library is distributed in the hope that it will be useful, |
| 2501 | + * but WITHOUT ANY WARRANTY; without even the implied warranty of |
| 2502 | + * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See |
| 2503 | + * the GNU Lesser General Public License for more details. |
| 2504 | + * |
| 2505 | + * You should have received a copy of the GNU Lesser General Public License |
| 2506 | + * along with this library; if not, write to the Free Software |
| 2507 | + * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA |
| 2508 | + */ |
| 2509 | + |
| 2510 | +/* Note that BB means BUGBUG (ie something to fix eventually) */ |
| 2511 | + |
| 2512 | +#include <linux/module.h> |
| 2513 | +#include <linux/fs.h> |
| 2514 | +#include <linux/mount.h> |
| 2515 | +#include <linux/slab.h> |
| 2516 | +#include <linux/init.h> |
| 2517 | +#include <linux/version.h> |
| 2518 | +#include <linux/list.h> |
| 2519 | +#if (LINUX_VERSION_CODE > KERNEL_VERSION(2,4,15)) |
| 2520 | +#include <linux/seq_file.h> |
| 2521 | +#endif |
| 2522 | +#include <linux/vfs.h> |
| 2523 | +#include "cifsfs.h" |
| 2524 | +#include "cifspdu.h" |
| 2525 | +#define DECLARE_GLOBALS_HERE |
| 2526 | +#include "cifsglob.h" |
| 2527 | +#include "cifsproto.h" |
| 2528 | +#include "cifs_debug.h" |
| 2529 | +#include "cifs_fs_sb.h" |
| 2530 | +#include <linux/mm.h> |
| 2531 | +#define CIFS_MAGIC_NUMBER 0xFF534D42 /* the first four bytes of SMB PDUs */ |
| 2532 | +/* BB when mempool_resize is added back in, we will resize pool on new mount */ |
| 2533 | +#define CIFS_MIN_RCV_POOL 11 /* enough for progress to five servers */ |
| 2534 | + |
| 2535 | +#ifdef CONFIG_CIFS_QUOTA |
| 2536 | +static struct quotactl_ops cifs_quotactl_ops; |
| 2537 | +#endif |
| 2538 | + |
| 2539 | +extern struct file_system_type cifs_fs_type; |
| 2540 | + |
| 2541 | +int cifsFYI = 0; |
| 2542 | +int cifsERROR = 1; |
| 2543 | +int traceSMB = 0; |
| 2544 | +unsigned int oplockEnabled = 1; |
| 2545 | +unsigned int quotaEnabled = 0; |
| 2546 | +unsigned int linuxExtEnabled = 1; |
| 2547 | +unsigned int lookupCacheEnabled = 1; |
| 2548 | +unsigned int multiuser_mount = 0; |
| 2549 | +unsigned int extended_security = 0; |
| 2550 | +unsigned int ntlmv2_support = 0; |
| 2551 | +unsigned int sign_CIFS_PDUs = 1; |
| 2552 | +unsigned int CIFSMaximumBufferSize = CIFS_MAX_MSGSIZE; |
| 2553 | +struct task_struct * oplockThread = NULL; |
| 2554 | + |
| 2555 | +extern int cifs_mount(struct super_block *, struct cifs_sb_info *, char *, |
| 2556 | + const char *); |
| 2557 | +extern int cifs_umount(struct super_block *, struct cifs_sb_info *); |
| 2558 | +void cifs_proc_init(void); |
| 2559 | +void cifs_proc_clean(void); |
| 2560 | + |
| 2561 | +static DECLARE_COMPLETION(cifs_oplock_exited); |
| 2562 | + |
| 2563 | + |
| 2564 | +struct super_block * |
| 2565 | +cifs_read_super(struct super_block *sb, void *data, int silent) |
| 2566 | +{ |
| 2567 | + struct inode *inode; |
| 2568 | + struct cifs_sb_info *cifs_sb; |
| 2569 | + int rc = 0; |
| 2570 | + |
| 2571 | + sb->s_flags |= MS_NODIRATIME; /* and probably even noatime */ |
| 2572 | + cifs_sb = CIFS_SB(sb); |
| 2573 | + if(cifs_sb == NULL) |
| 2574 | + return 0; |
| 2575 | + else |
| 2576 | + memset(cifs_sb,0,sizeof(struct cifs_sb_info)); |
| 2577 | + |
| 2578 | + |
| 2579 | + rc = cifs_mount(sb, cifs_sb, data, NULL); |
| 2580 | + |
| 2581 | + if (rc) { |
| 2582 | + if (!silent) |
| 2583 | + cERROR(1, |
| 2584 | + ("cifs_mount failed w/return code = %d", rc)); |
| 2585 | + goto out_mount_failed; |
| 2586 | + } |
| 2587 | + |
| 2588 | + sb->s_magic = CIFS_MAGIC_NUMBER; |
| 2589 | + sb->s_op = &cifs_super_ops; |
| 2590 | +/* if(cifs_sb->tcon->ses->server->maxBuf > MAX_CIFS_HDR_SIZE + 512) |
| 2591 | + sb->s_blocksize = cifs_sb->tcon->ses->server->maxBuf - MAX_CIFS_HDR_SIZE; */ |
| 2592 | +#ifdef CONFIG_CIFS_QUOTA |
| 2593 | + sb->s_qcop = &cifs_quotactl_ops; |
| 2594 | +#endif |
| 2595 | + sb->s_blocksize = CIFS_MAX_MSGSIZE; |
| 2596 | + sb->s_blocksize_bits = 14; /* default 2**14 = CIFS_MAX_MSGSIZE */ |
| 2597 | + inode = iget(sb, ROOT_I); |
| 2598 | + |
| 2599 | + if (!inode) { |
| 2600 | + goto out_no_root; |
| 2601 | + } |
| 2602 | + |
| 2603 | + sb->s_root = d_alloc_root(inode); |
| 2604 | + |
| 2605 | + if (!sb->s_root) { |
| 2606 | + goto out_no_root; |
| 2607 | + } |
| 2608 | + |
| 2609 | + return sb; |
| 2610 | + |
| 2611 | +out_no_root: |
| 2612 | + cERROR(1, ("cifs_read_super: get root inode failed")); |
| 2613 | + if (inode) |
| 2614 | + iput(inode); |
| 2615 | + |
| 2616 | +out_mount_failed: |
| 2617 | + if(cifs_sb->local_nls) |
| 2618 | + unload_nls(cifs_sb->local_nls); |
| 2619 | + sb->s_dev = 0; |
| 2620 | + return 0; |
| 2621 | +} |
| 2622 | + |
| 2623 | +static void |
| 2624 | +cifs_put_super(struct super_block *sb) |
| 2625 | +{ |
| 2626 | + int rc = 0; |
| 2627 | + struct cifs_sb_info *cifs_sb; |
| 2628 | + |
| 2629 | + cFYI(1, ("In cifs_put_super")); |
| 2630 | + cifs_sb = CIFS_SB(sb); |
| 2631 | + if(cifs_sb == NULL) { |
| 2632 | + cFYI(1,("Empty cifs superblock info passed to unmount")); |
| 2633 | + return; |
| 2634 | + } |
| 2635 | + rc = cifs_umount(sb, cifs_sb); |
| 2636 | + if (rc) { |
| 2637 | + cERROR(1, ("cifs_umount failed with return code %d", rc)); |
| 2638 | + } |
| 2639 | + unload_nls(cifs_sb->local_nls); |
| 2640 | + return; |
| 2641 | +} |
| 2642 | + |
| 2643 | +static int |
| 2644 | +cifs_statfs(struct super_block *sb, struct statfs *buf) |
| 2645 | +{ |
| 2646 | + int xid, rc; |
| 2647 | + struct cifs_sb_info *cifs_sb; |
| 2648 | + struct cifsTconInfo *pTcon; |
| 2649 | + |
| 2650 | + xid = GetXid(); |
| 2651 | + |
| 2652 | + cifs_sb = CIFS_SB(sb); |
| 2653 | + pTcon = cifs_sb->tcon; |
| 2654 | + |
| 2655 | + buf->f_type = CIFS_MAGIC_NUMBER; |
| 2656 | + |
| 2657 | + /* instead could get the real value via SMB_QUERY_FS_ATTRIBUTE_INFO */ |
| 2658 | + buf->f_namelen = PATH_MAX; /* PATH_MAX may be too long - it would presumably |
| 2659 | + be length of total path, note that some servers may be |
| 2660 | + able to support more than this, but best to be safe |
| 2661 | + since Win2k and others can not handle very long filenames */ |
| 2662 | + buf->f_files = 0; /* undefined */ |
| 2663 | + buf->f_ffree = 0; /* unlimited */ |
| 2664 | + |
| 2665 | + rc = CIFSSMBQFSInfo(xid, pTcon, buf, cifs_sb->local_nls); |
| 2666 | + |
| 2667 | + /* |
| 2668 | + int f_type; |
| 2669 | + __fsid_t f_fsid; |
| 2670 | + int f_namelen; */ |
| 2671 | + /* BB get from info put in tcon struct at mount time with call to QFSAttrInfo */ |
| 2672 | + FreeXid(xid); |
| 2673 | + return 0; /* always return success? what if volume is no longer available? */ |
| 2674 | +} |
| 2675 | + |
| 2676 | +static int cifs_permission(struct inode * inode, int mask) |
| 2677 | +{ |
| 2678 | + /* the server does permission checks, we do not need to do it here */ |
| 2679 | + return 0; |
| 2680 | +} |
| 2681 | + |
| 2682 | +kmem_cache_t *cifs_req_cachep; |
| 2683 | +kmem_cache_t *cifs_mid_cachep; |
| 2684 | +kmem_cache_t *cifs_oplock_cachep; |
| 2685 | + |
| 2686 | +#if (LINUX_VERSION_CODE > KERNEL_VERSION(2,5,0)) |
| 2687 | +static struct inode * |
| 2688 | +cifs_alloc_inode(struct super_block *sb) |
| 2689 | +{ |
| 2690 | + struct cifsInodeInfo *cifs_inode; |
| 2691 | + cifs_inode = |
| 2692 | + (struct cifsInodeInfo *) kmem_cache_alloc(cifs_inode_cachep, |
| 2693 | + SLAB_KERNEL); |
| 2694 | + if (!cifs_inode) |
| 2695 | + return NULL; |
| 2696 | + cifs_inode->cifsAttrs = 0x20; /* default */ |
| 2697 | + atomic_set(&cifs_inode->inUse, 0); |
| 2698 | + cifs_inode->time = 0; |
| 2699 | + /* Until the file is open and we have gotten oplock |
| 2700 | + info back from the server, can not assume caching of |
| 2701 | + file data or metadata */ |
| 2702 | + cifs_inode->clientCanCacheRead = FALSE; |
| 2703 | + cifs_inode->clientCanCacheAll = FALSE; |
| 2704 | + INIT_LIST_HEAD(&cifs_inode->openFileList); |
| 2705 | + return &cifs_inode->vfs_inode; |
| 2706 | +} |
| 2707 | + |
| 2708 | +static void |
| 2709 | +cifs_destroy_inode(struct inode *inode) |
| 2710 | +{ |
| 2711 | + kmem_cache_free(cifs_inode_cachep, CIFS_I(inode)); |
| 2712 | +} |
| 2713 | +#endif |
| 2714 | + |
| 2715 | +/* |
| 2716 | + * cifs_show_options() is for displaying mount options in /proc/mounts. |
| 2717 | + * Not all settable options are displayed but most of the important |
| 2718 | + * ones are. |
| 2719 | + */ |
| 2720 | +#if (LINUX_VERSION_CODE > KERNEL_VERSION(2,4,15)) |
| 2721 | +static int |
| 2722 | +cifs_show_options(struct seq_file *s, struct vfsmount *m) |
| 2723 | +{ |
| 2724 | + struct cifs_sb_info *cifs_sb; |
| 2725 | + |
| 2726 | + cifs_sb = CIFS_SB(m->mnt_sb); |
| 2727 | + |
| 2728 | + if (cifs_sb) { |
| 2729 | + if (cifs_sb->tcon) { |
| 2730 | + seq_printf(s, ",unc=%s", cifs_sb->tcon->treeName); |
| 2731 | + if ((cifs_sb->tcon->ses) && (cifs_sb->tcon->ses->userName)) |
| 2732 | + seq_printf(s, ",username=%s", |
| 2733 | + cifs_sb->tcon->ses->userName); |
| 2734 | + if(cifs_sb->tcon->ses->domainName) |
| 2735 | + seq_printf(s, ",domain=%s", |
| 2736 | + cifs_sb->tcon->ses->domainName); |
| 2737 | + } |
| 2738 | + seq_printf(s, ",rsize=%d",cifs_sb->rsize); |
| 2739 | + seq_printf(s, ",wsize=%d",cifs_sb->wsize); |
| 2740 | + } |
| 2741 | + return 0; |
| 2742 | +} |
| 2743 | +#endif |
| 2744 | + |
| 2745 | +#ifdef CONFIG_CIFS_QUOTA |
| 2746 | +int cifs_xquota_set(struct super_block * sb, int quota_type, qid_t qid, |
| 2747 | + struct fs_disk_quota * pdquota) |
| 2748 | +{ |
| 2749 | + int xid; |
| 2750 | + int rc = 0; |
| 2751 | + struct cifs_sb_info *cifs_sb = CIFS_SB(sb); |
| 2752 | + struct cifsTconInfo *pTcon; |
| 2753 | + |
| 2754 | + if(cifs_sb) |
| 2755 | + pTcon = cifs_sb->tcon; |
| 2756 | + else |
| 2757 | + return -EIO; |
| 2758 | + |
| 2759 | + |
| 2760 | + xid = GetXid(); |
| 2761 | + if(pTcon) { |
| 2762 | + cFYI(1,("set type: 0x%x id: %d",quota_type,qid)); |
| 2763 | + } else { |
| 2764 | + return -EIO; |
| 2765 | + } |
| 2766 | + |
| 2767 | + FreeXid(xid); |
| 2768 | + return rc; |
| 2769 | +} |
| 2770 | + |
| 2771 | +int cifs_xquota_get(struct super_block * sb, int quota_type, qid_t qid, |
| 2772 | + struct fs_disk_quota * pdquota) |
| 2773 | +{ |
| 2774 | + int xid; |
| 2775 | + int rc = 0; |
| 2776 | + struct cifs_sb_info *cifs_sb = CIFS_SB(sb); |
| 2777 | + struct cifsTconInfo *pTcon; |
| 2778 | + |
| 2779 | + if(cifs_sb) |
| 2780 | + pTcon = cifs_sb->tcon; |
| 2781 | + else |
| 2782 | + return -EIO; |
| 2783 | + |
| 2784 | + xid = GetXid(); |
| 2785 | + if(pTcon) { |
| 2786 | + cFYI(1,("set type: 0x%x id: %d",quota_type,qid)); |
| 2787 | + } else { |
| 2788 | + rc = -EIO; |
| 2789 | + } |
| 2790 | + |
| 2791 | + FreeXid(xid); |
| 2792 | + return rc; |
| 2793 | +} |
| 2794 | + |
| 2795 | +int cifs_xstate_set(struct super_block * sb, unsigned int flags, int operation) |
| 2796 | +{ |
| 2797 | + int xid; |
| 2798 | + int rc = 0; |
| 2799 | + struct cifs_sb_info *cifs_sb = CIFS_SB(sb); |
| 2800 | + struct cifsTconInfo *pTcon; |
| 2801 | + |
| 2802 | + if(cifs_sb) |
| 2803 | + pTcon = cifs_sb->tcon; |
| 2804 | + else |
| 2805 | + return -EIO; |
| 2806 | + |
| 2807 | + xid = GetXid(); |
| 2808 | + if(pTcon) { |
| 2809 | + cFYI(1,("flags: 0x%x operation: 0x%x",flags,operation)); |
| 2810 | + } else { |
| 2811 | + rc = -EIO; |
| 2812 | + } |
| 2813 | + |
| 2814 | + FreeXid(xid); |
| 2815 | + return rc; |
| 2816 | +} |
| 2817 | + |
| 2818 | +int cifs_xstate_get(struct super_block * sb, struct fs_quota_stat *qstats) |
| 2819 | +{ |
| 2820 | + int xid; |
| 2821 | + int rc = 0; |
| 2822 | + struct cifs_sb_info *cifs_sb = CIFS_SB(sb); |
| 2823 | + struct cifsTconInfo *pTcon; |
| 2824 | + |
| 2825 | + if(cifs_sb) { |
| 2826 | + pTcon = cifs_sb->tcon; |
| 2827 | + } else { |
| 2828 | + return -EIO; |
| 2829 | + } |
| 2830 | + xid = GetXid(); |
| 2831 | + if(pTcon) { |
| 2832 | + cFYI(1,("pqstats %p",qstats)); |
| 2833 | + } else { |
| 2834 | + rc = -EIO; |
| 2835 | + } |
| 2836 | + |
| 2837 | + FreeXid(xid); |
| 2838 | + return rc; |
| 2839 | +} |
| 2840 | + |
| 2841 | +static struct quotactl_ops cifs_quotactl_ops = { |
| 2842 | + .set_xquota = cifs_xquota_set, |
| 2843 | + .get_xquota = cifs_xquota_set, |
| 2844 | + .set_xstate = cifs_xstate_set, |
| 2845 | + .get_xstate = cifs_xstate_get, |
| 2846 | +}; |
| 2847 | +#endif |
| 2848 | + |
| 2849 | +static int cifs_remount(struct super_block *sb, int *flags, char *data) |
| 2850 | +{ |
| 2851 | + *flags |= MS_NODIRATIME; |
| 2852 | + return 0; |
| 2853 | +} |
| 2854 | + |
| 2855 | +struct super_operations cifs_super_ops = { |
| 2856 | + .read_inode = cifs_read_inode, |
| 2857 | + .put_super = cifs_put_super, |
| 2858 | + .statfs = cifs_statfs, |
| 2859 | +/* .alloc_inode = cifs_alloc_inode, |
| 2860 | + .destroy_inode = cifs_destroy_inode, */ |
| 2861 | +/* .drop_inode = generic_delete_inode, |
| 2862 | + .delete_inode = cifs_delete_inode, *//* Do not need the above two functions |
| 2863 | + unless later we add lazy close of inodes or unless the kernel forgets to call |
| 2864 | + us with the same number of releases (closes) as opens */ |
| 2865 | +#if (LINUX_VERSION_CODE > KERNEL_VERSION(2,4,15)) |
| 2866 | + .show_options = cifs_show_options, |
| 2867 | +#endif |
| 2868 | +/* .umount_begin = cifs_umount_begin, *//* consider adding in the future */ |
| 2869 | +}; |
| 2870 | + |
| 2871 | +#if (LINUX_VERSION_CODE > KERNEL_VERSION(2,5,0)) |
| 2872 | +static struct super_block * |
| 2873 | +cifs_get_sb(struct file_system_type *fs_type, |
| 2874 | + int flags, const char *dev_name, void *data) |
| 2875 | +{ |
| 2876 | + int rc; |
| 2877 | + struct super_block *sb = sget(fs_type, NULL, set_anon_super, NULL); |
| 2878 | + |
| 2879 | + cFYI(1, ("Devname: %s flags: %d ", dev_name, flags)); |
| 2880 | + |
| 2881 | + if (IS_ERR(sb)) |
| 2882 | + return sb; |
| 2883 | + |
| 2884 | + sb->s_flags = flags; |
| 2885 | + |
| 2886 | + rc = cifs_read_super(sb, data, dev_name, flags & MS_VERBOSE ? 1 : 0); |
| 2887 | + if (rc) { |
| 2888 | + up_write(&sb->s_umount); |
| 2889 | + deactivate_super(sb); |
| 2890 | + return ERR_PTR(rc); |
| 2891 | + } |
| 2892 | + sb->s_flags |= MS_ACTIVE; |
| 2893 | + return sb; |
| 2894 | +} |
| 2895 | +#endif |
| 2896 | + |
| 2897 | +static ssize_t |
| 2898 | +cifs_read_wrapper(struct file * file, char *read_data, size_t read_size, |
| 2899 | + loff_t * poffset) |
| 2900 | +{ |
| 2901 | + if(file == NULL) |
| 2902 | + return -EIO; |
| 2903 | + else if(file->f_dentry == NULL) |
| 2904 | + return -EIO; |
| 2905 | + else if(file->f_dentry->d_inode == NULL) |
| 2906 | + return -EIO; |
| 2907 | + |
| 2908 | + if(CIFS_I(file->f_dentry->d_inode)->clientCanCacheRead) { |
| 2909 | + return generic_file_read(file,read_data,read_size,poffset); |
| 2910 | + } else { |
| 2911 | + /* BB do we need to lock inode from here until after invalidate? */ |
| 2912 | +/* if(file->f_dentry->d_inode->i_mapping) { |
| 2913 | + filemap_fdatawrite(file->f_dentry->d_inode->i_mapping); |
| 2914 | + filemap_fdatawait(file->f_dentry->d_inode->i_mapping); |
| 2915 | + }*/ |
| 2916 | +/* cifs_revalidate(file->f_dentry);*/ /* BB fixme */ |
| 2917 | + |
| 2918 | + /* BB we should make timer configurable - perhaps |
| 2919 | + by simply calling cifs_revalidate here */ |
| 2920 | + /* invalidate_remote_inode(file->f_dentry->d_inode);*/ |
| 2921 | + return generic_file_read(file,read_data,read_size,poffset); |
| 2922 | + } |
| 2923 | +} |
| 2924 | + |
| 2925 | +static ssize_t |
| 2926 | +cifs_write_wrapper(struct file * file, const char *write_data, |
| 2927 | + size_t write_size, loff_t * poffset) |
| 2928 | +{ |
| 2929 | + ssize_t written; |
| 2930 | + |
| 2931 | + if(file == NULL) |
| 2932 | + return -EIO; |
| 2933 | + else if(file->f_dentry == NULL) |
| 2934 | + return -EIO; |
| 2935 | + else if(file->f_dentry->d_inode == NULL) |
| 2936 | + return -EIO; |
| 2937 | + |
| 2938 | + /* check whether we can cache writes locally */ |
| 2939 | + written = generic_file_write(file,write_data,write_size,poffset); |
| 2940 | + if(!CIFS_I(file->f_dentry->d_inode)->clientCanCacheAll) { |
| 2941 | + if(file->f_dentry->d_inode->i_mapping) { |
| 2942 | + filemap_fdatasync(file->f_dentry->d_inode->i_mapping); |
| 2943 | + } |
| 2944 | + } |
| 2945 | + return written; |
| 2946 | +} |
| 2947 | + |
| 2948 | +#if (LINUX_VERSION_CODE > KERNEL_VERSION(2,5,0)) |
| 2949 | +static struct file_system_type cifs_fs_type = { |
| 2950 | + .owner = THIS_MODULE, |
| 2951 | + .name = "cifs", |
| 2952 | + .get_sb = cifs_get_sb, |
| 2953 | + .kill_sb = kill_anon_super, |
| 2954 | + /* .fs_flags */ |
| 2955 | +}; |
| 2956 | +#endif |
| 2957 | + |
| 2958 | +static DECLARE_FSTYPE(cifs_fs_type, "cifs", cifs_read_super,0); |
| 2959 | + |
| 2960 | + |
| 2961 | +struct inode_operations cifs_dir_inode_ops = { |
| 2962 | + .create = cifs_create, |
| 2963 | + .lookup = cifs_lookup, |
| 2964 | + .unlink = cifs_unlink, |
| 2965 | + .link = cifs_hardlink, |
| 2966 | + .mkdir = cifs_mkdir, |
| 2967 | + .rmdir = cifs_rmdir, |
| 2968 | + .rename = cifs_rename, |
| 2969 | + .permission = cifs_permission, |
| 2970 | + .revalidate = cifs_revalidate, |
| 2971 | + .setattr = cifs_setattr, |
| 2972 | + .symlink = cifs_symlink, |
| 2973 | + .mknod = cifs_mknod, |
| 2974 | +}; |
| 2975 | + |
| 2976 | +struct inode_operations cifs_file_inode_ops = { |
| 2977 | + .revalidate = cifs_revalidate, |
| 2978 | + .setattr = cifs_setattr, |
| 2979 | +/* .getattr = cifs_getattr,*/ |
| 2980 | + .rename = cifs_rename, |
| 2981 | + .permission = cifs_permission, |
| 2982 | +#ifdef CONFIG_CIFS_XATTR |
| 2983 | + .setxattr = cifs_setxattr, |
| 2984 | + .getxattr = cifs_getxattr, |
| 2985 | + .listxattr = cifs_listxattr, |
| 2986 | + .removexattr = cifs_removexattr, |
| 2987 | +#endif |
| 2988 | +}; |
| 2989 | + |
| 2990 | +struct inode_operations cifs_symlink_inode_ops = { |
| 2991 | + .readlink = cifs_readlink, |
| 2992 | + .follow_link = cifs_follow_link, |
| 2993 | + .permission = cifs_permission, |
| 2994 | + /* BB add the following two eventually */ |
| 2995 | + /* revalidate: cifs_revalidate, |
| 2996 | + setattr: cifs_notify_change, *//* BB do we need notify change */ |
| 2997 | +#ifdef CONFIG_CIFS_XATTR |
| 2998 | + .setxattr = cifs_setxattr, |
| 2999 | + .getxattr = cifs_getxattr, |
| 3000 | + .listxattr = cifs_listxattr, |
| 3001 | + .removexattr = cifs_removexattr, |
| 3002 | +#endif |
| 3003 | +}; |
| 3004 | + |
| 3005 | +struct file_operations cifs_file_ops = { |
| 3006 | + .read = cifs_read_wrapper, |
| 3007 | + .write = cifs_write_wrapper, |
| 3008 | + .open = cifs_open, |
| 3009 | + .release = cifs_close, |
| 3010 | + .lock = cifs_lock, |
| 3011 | + .fsync = cifs_fsync, |
| 3012 | + .flush = cifs_flush, |
| 3013 | + .mmap = cifs_file_mmap, |
| 3014 | +/* .sendfile = generic_file_sendfile,*/ |
| 3015 | +#ifdef CONFIG_CIFS_FCNTL |
| 3016 | + .fcntl = cifs_fcntl, |
| 3017 | +#endif |
| 3018 | +}; |
| 3019 | + |
| 3020 | +struct file_operations cifs_dir_ops = { |
| 3021 | + .readdir = cifs_readdir, |
| 3022 | + .release = cifs_closedir, |
| 3023 | + .read = generic_read_dir, |
| 3024 | +#ifdef CONFIG_CIFS_FCNTL |
| 3025 | + .fcntl = cifs_fcntl, |
| 3026 | +#endif |
| 3027 | +}; |
| 3028 | +/* |
| 3029 | +static void |
| 3030 | +cifs_init_once(void *inode, kmem_cache_t * cachep, unsigned long flags) |
| 3031 | +{ |
| 3032 | + struct cifsInodeInfo *cifsi = (struct cifsInodeInfo *) inode; |
| 3033 | + |
| 3034 | + if ((flags & (SLAB_CTOR_VERIFY | SLAB_CTOR_CONSTRUCTOR)) == |
| 3035 | + SLAB_CTOR_CONSTRUCTOR) { |
| 3036 | + inode_init_once(&cifsi->vfs_inode); |
| 3037 | + INIT_LIST_HEAD(&cifsi->lockList); |
| 3038 | + } |
| 3039 | +} |
| 3040 | + |
| 3041 | +static int |
| 3042 | +cifs_init_inodecache(void) |
| 3043 | +{ |
| 3044 | + cifs_inode_cachep = kmem_cache_create("cifs_inode_cache", |
| 3045 | + sizeof (struct cifsInodeInfo), |
| 3046 | + 0, SLAB_HWCACHE_ALIGN, |
| 3047 | + cifs_init_once, NULL); |
| 3048 | + if (cifs_inode_cachep == NULL) |
| 3049 | + return -ENOMEM; |
| 3050 | + |
| 3051 | + |
| 3052 | + return 0; |
| 3053 | +} |
| 3054 | + |
| 3055 | +static void |
| 3056 | +cifs_destroy_inodecache(void) |
| 3057 | +{ |
| 3058 | + if (kmem_cache_destroy(cifs_inode_cachep)) |
| 3059 | + printk(KERN_WARNING "cifs_inode_cache: error freeing\n"); |
| 3060 | +} */ |
| 3061 | + |
| 3062 | +static int |
| 3063 | +cifs_init_request_bufs(void) |
| 3064 | +{ |
| 3065 | + cifs_req_cachep = kmem_cache_create("cifs_request", |
| 3066 | + CIFS_MAX_MSGSIZE + |
| 3067 | + MAX_CIFS_HDR_SIZE, 0, |
| 3068 | + SLAB_HWCACHE_ALIGN, NULL, NULL); |
| 3069 | + if (cifs_req_cachep == NULL) |
| 3070 | + return -ENOMEM; |
| 3071 | + |
| 3072 | + return 0; |
| 3073 | +} |
| 3074 | + |
| 3075 | +static void |
| 3076 | +cifs_destroy_request_bufs(void) |
| 3077 | +{ |
| 3078 | + if (kmem_cache_destroy(cifs_req_cachep)) |
| 3079 | + printk(KERN_WARNING |
| 3080 | + "cifs_destroy_request_cache: error not all structures were freed\n"); |
| 3081 | +} |
| 3082 | + |
| 3083 | +static int |
| 3084 | +cifs_init_mids(void) |
| 3085 | +{ |
| 3086 | + cifs_mid_cachep = kmem_cache_create("cifs_mpx_ids", |
| 3087 | + sizeof (struct mid_q_entry), 0, |
| 3088 | + SLAB_HWCACHE_ALIGN, NULL, NULL); |
| 3089 | + if (cifs_mid_cachep == NULL) |
| 3090 | + return -ENOMEM; |
| 3091 | + cifs_oplock_cachep = kmem_cache_create("cifs_oplock_struct", |
| 3092 | + sizeof (struct oplock_q_entry), 0, |
| 3093 | + SLAB_HWCACHE_ALIGN, NULL, NULL); |
| 3094 | + if (cifs_oplock_cachep == NULL) { |
| 3095 | + kmem_cache_destroy(cifs_mid_cachep); |
| 3096 | + return -ENOMEM; |
| 3097 | + } |
| 3098 | + |
| 3099 | + return 0; |
| 3100 | +} |
| 3101 | + |
| 3102 | +static void |
| 3103 | +cifs_destroy_mids(void) |
| 3104 | +{ |
| 3105 | + if (kmem_cache_destroy(cifs_mid_cachep)) |
| 3106 | + printk(KERN_WARNING |
| 3107 | + "cifs_destroy_mids: error not all structures were freed\n"); |
| 3108 | + if (kmem_cache_destroy(cifs_oplock_cachep)) |
| 3109 | + printk(KERN_WARNING |
| 3110 | + "error not all oplock structures were freed\n"); |
| 3111 | +} |
| 3112 | + |
| 3113 | +static int cifs_oplock_thread(void * dummyarg) |
| 3114 | +{ |
| 3115 | + struct oplock_q_entry * oplock_item; |
| 3116 | + struct cifsTconInfo *pTcon; |
| 3117 | + struct inode * inode; |
| 3118 | + __u16 netfid; |
| 3119 | + int rc = 0; |
| 3120 | + |
| 3121 | + daemonize(); |
| 3122 | + sprintf(current->comm,"cifsoplockd"); |
| 3123 | + |
| 3124 | + oplockThread = current; |
| 3125 | + do { |
| 3126 | + set_current_state(TASK_INTERRUPTIBLE); |
| 3127 | + |
| 3128 | + schedule_timeout(1*HZ); |
| 3129 | + spin_lock(&GlobalMid_Lock); |
| 3130 | + if(list_empty(&GlobalOplock_Q)) { |
| 3131 | + spin_unlock(&GlobalMid_Lock); |
| 3132 | + set_current_state(TASK_INTERRUPTIBLE); |
| 3133 | + schedule_timeout(39*HZ); |
| 3134 | + } else { |
| 3135 | + oplock_item = list_entry(GlobalOplock_Q.next, |
| 3136 | + struct oplock_q_entry, qhead); |
| 3137 | + if(oplock_item) { |
| 3138 | + cFYI(1,("found oplock item to write out")); |
| 3139 | + pTcon = oplock_item->tcon; |
| 3140 | + inode = oplock_item->pinode; |
| 3141 | + netfid = oplock_item->netfid; |
| 3142 | + spin_unlock(&GlobalMid_Lock); |
| 3143 | + DeleteOplockQEntry(oplock_item); |
| 3144 | + /* can not grab inode sem here since it would |
| 3145 | + deadlock when oplock received on delete |
| 3146 | + since vfs_unlink holds the i_sem across |
| 3147 | + the call */ |
| 3148 | + /* down(&inode->i_sem);*/ |
| 3149 | + if (S_ISREG(inode->i_mode)) { |
| 3150 | +#if (LINUX_VERSION_CODE > KERNEL_VERSION(2,4,17)) |
| 3151 | + rc = filemap_fdatasync(inode->i_mapping); |
| 3152 | + if(rc) |
| 3153 | + CIFS_I(inode)->write_behind_rc = rc; |
| 3154 | +#else |
| 3155 | + filemap_fdatasync(inode->i_mapping); |
| 3156 | +#endif |
| 3157 | + if(CIFS_I(inode)->clientCanCacheRead == 0) |
| 3158 | + invalidate_inode_pages(inode); |
| 3159 | + } else |
| 3160 | + rc = 0; |
| 3161 | + /* releasing a stale oplock after recent reconnection |
| 3162 | + of smb session using a now incorrect file |
| 3163 | + handle is not a data integrity issue but do |
| 3164 | + not bother sending an oplock release if session |
| 3165 | + to server still is disconnected since oplock |
| 3166 | + already released by the server in that case */ |
| 3167 | + if(pTcon->tidStatus != CifsNeedReconnect) { |
| 3168 | + rc = CIFSSMBLock(0, pTcon, |
| 3169 | + netfid, |
| 3170 | + 0 /* len */ , 0 /* offset */, 0, |
| 3171 | + 0, LOCKING_ANDX_OPLOCK_RELEASE, |
| 3172 | + 0 /* wait flag */); |
| 3173 | + cFYI(1,("Oplock release rc = %d ",rc)); |
| 3174 | + } |
| 3175 | + } else |
| 3176 | + spin_unlock(&GlobalMid_Lock); |
| 3177 | + } |
| 3178 | + } while(!signal_pending(current)); |
| 3179 | + complete_and_exit (&cifs_oplock_exited, 0); |
| 3180 | +} |
| 3181 | + |
| 3182 | +static int __init |
| 3183 | +init_cifs(void) |
| 3184 | +{ |
| 3185 | + int rc = 0; |
| 3186 | +#if CONFIG_PROC_FS |
| 3187 | + cifs_proc_init(); |
| 3188 | +#endif |
| 3189 | + INIT_LIST_HEAD(&GlobalServerList); /* BB not implemented yet */ |
| 3190 | + INIT_LIST_HEAD(&GlobalSMBSessionList); |
| 3191 | + INIT_LIST_HEAD(&GlobalTreeConnectionList); |
| 3192 | + INIT_LIST_HEAD(&GlobalOplock_Q); |
| 3193 | +/* |
| 3194 | + * Initialize Global counters |
| 3195 | + */ |
| 3196 | + atomic_set(&sesInfoAllocCount, 0); |
| 3197 | + atomic_set(&tconInfoAllocCount, 0); |
| 3198 | + atomic_set(&tcpSesReconnectCount, 0); |
| 3199 | + atomic_set(&tconInfoReconnectCount, 0); |
| 3200 | + |
| 3201 | + atomic_set(&bufAllocCount, 0); |
| 3202 | + atomic_set(&midCount, 0); |
| 3203 | + GlobalCurrentXid = 0; |
| 3204 | + GlobalTotalActiveXid = 0; |
| 3205 | + GlobalMaxActiveXid = 0; |
| 3206 | + GlobalSMBSeslock = RW_LOCK_UNLOCKED; |
| 3207 | + GlobalMid_Lock = SPIN_LOCK_UNLOCKED; |
| 3208 | + |
| 3209 | +/* rc = cifs_init_inodecache();*/ |
| 3210 | + if (!rc) { |
| 3211 | + rc = cifs_init_mids(); |
| 3212 | + if (!rc) { |
| 3213 | + rc = cifs_init_request_bufs(); |
| 3214 | + if (!rc) { |
| 3215 | + rc = register_filesystem(&cifs_fs_type); |
| 3216 | + if (!rc) { |
| 3217 | + kernel_thread(cifs_oplock_thread, NULL, |
| 3218 | + CLONE_FS | CLONE_FILES | CLONE_VM); |
| 3219 | + return rc; /* Success */ |
| 3220 | + } else |
| 3221 | + cifs_destroy_request_bufs(); |
| 3222 | + } |
| 3223 | + cifs_destroy_mids(); |
| 3224 | + } |
| 3225 | +/* cifs_destroy_inodecache(); */ |
| 3226 | + } |
| 3227 | +#if CONFIG_PROC_FS |
| 3228 | + cifs_proc_clean(); |
| 3229 | +#endif |
| 3230 | + return rc; |
| 3231 | +} |
| 3232 | + |
| 3233 | +static void __exit |
| 3234 | +exit_cifs(void) |
| 3235 | +{ |
| 3236 | + cFYI(0, ("In unregister ie exit_cifs")); |
| 3237 | +#if CONFIG_PROC_FS |
| 3238 | + cifs_proc_clean(); |
| 3239 | +#endif |
| 3240 | + unregister_filesystem(&cifs_fs_type); |
| 3241 | +/* cifs_destroy_inodecache();*/ |
| 3242 | + cifs_destroy_mids(); |
| 3243 | + cifs_destroy_request_bufs(); |
| 3244 | + if(oplockThread) { |
| 3245 | + send_sig(SIGTERM, oplockThread, 1); |
| 3246 | + wait_for_completion(&cifs_oplock_exited); |
| 3247 | + } |
| 3248 | +} |
| 3249 | + |
| 3250 | +MODULE_AUTHOR("Steve French <sfrench@us.ibm.com>"); |
| 3251 | +MODULE_LICENSE("GPL"); /* combination of LGPL + GPL source behaves as GPL */ |
| 3252 | +MODULE_DESCRIPTION |
| 3253 | + ("VFS to access servers complying with the SNIA CIFS Specification e.g. Samba and Windows"); |
| 3254 | +module_init(init_cifs) |
| 3255 | +module_exit(exit_cifs) |
| 3256 | --- /dev/null |
| 3257 | +++ b/fs/cifs/cifsfs.h |
| 3258 | @@ -0,0 +1,97 @@ |
| 3259 | +/* |
| 3260 | + * fs/cifs/cifsfs.h |
| 3261 | + * |
| 3262 | + * Copyright (c) International Business Machines Corp., 2002 |
| 3263 | + * Author(s): Steve French (sfrench@us.ibm.com) |
| 3264 | + * |
| 3265 | + * This library is free software; you can redistribute it and/or modify |
| 3266 | + * it under the terms of the GNU Lesser General Public License as published |
| 3267 | + * by the Free Software Foundation; either version 2.1 of the License, or |
| 3268 | + * (at your option) any later version. |
| 3269 | + * |
| 3270 | + * This library is distributed in the hope that it will be useful, |
| 3271 | + * but WITHOUT ANY WARRANTY; without even the implied warranty of |
| 3272 | + * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See |
| 3273 | + * the GNU Lesser General Public License for more details. |
| 3274 | + * |
| 3275 | + * You should have received a copy of the GNU Lesser General Public License |
| 3276 | + * along with this library; if not, write to the Free Software |
| 3277 | + * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA |
| 3278 | + */ |
| 3279 | + |
| 3280 | +#ifndef _CIFSFS_H |
| 3281 | +#define _CIFSFS_H |
| 3282 | + |
| 3283 | +#define ROOT_I 2 |
| 3284 | + |
| 3285 | +#ifndef FALSE |
| 3286 | +#define FALSE 0 |
| 3287 | +#endif |
| 3288 | + |
| 3289 | +#ifndef TRUE |
| 3290 | +#define TRUE 1 |
| 3291 | +#endif |
| 3292 | + |
| 3293 | +extern int map_cifs_error(int error_class, int error_code, |
| 3294 | + int status_codes_negotiated); |
| 3295 | + |
| 3296 | +extern struct address_space_operations cifs_addr_ops; |
| 3297 | + |
| 3298 | +/* Functions related to super block operations */ |
| 3299 | +extern struct super_operations cifs_super_ops; |
| 3300 | +extern void cifs_put_inode(struct inode *); |
| 3301 | +extern void cifs_read_inode(struct inode *); |
| 3302 | +extern void cifs_delete_inode(struct inode *); |
| 3303 | +/* extern void cifs_write_inode(struct inode *); *//* BB not needed yet */ |
| 3304 | + |
| 3305 | +/* Functions related to inodes */ |
| 3306 | +extern struct inode_operations cifs_dir_inode_ops; |
| 3307 | +extern int cifs_create(struct inode *, struct dentry *, int); |
| 3308 | +extern struct dentry *cifs_lookup(struct inode *, struct dentry *); |
| 3309 | +extern int cifs_unlink(struct inode *, struct dentry *); |
| 3310 | +extern int cifs_hardlink(struct dentry *, struct inode *, struct dentry *); |
| 3311 | +extern int cifs_mknod(struct inode *, struct dentry *, int, int); |
| 3312 | +extern int cifs_mkdir(struct inode *, struct dentry *, int); |
| 3313 | +extern int cifs_rmdir(struct inode *, struct dentry *); |
| 3314 | +extern int cifs_rename(struct inode *, struct dentry *, struct inode *, |
| 3315 | + struct dentry *); |
| 3316 | +extern int cifs_revalidate(struct dentry *); |
| 3317 | +extern int cifs_setattr(struct dentry *, struct iattr *); |
| 3318 | + |
| 3319 | +extern struct inode_operations cifs_file_inode_ops; |
| 3320 | +extern void cifs_truncate_file(struct inode *); |
| 3321 | +extern struct inode_operations cifs_symlink_inode_ops; |
| 3322 | + |
| 3323 | +/* Functions related to files and directories */ |
| 3324 | +extern struct file_operations cifs_file_ops; |
| 3325 | +extern int cifs_open(struct inode *inode, struct file *file); |
| 3326 | +extern int cifs_close(struct inode *inode, struct file *file); |
| 3327 | +extern int cifs_closedir(struct inode *inode, struct file *file); |
| 3328 | +extern ssize_t cifs_read(struct file *file, char *read_data, |
| 3329 | + size_t read_size, loff_t * poffset); |
| 3330 | +extern ssize_t cifs_write(struct file *file, const char *write_data, |
| 3331 | + size_t write_size, loff_t * poffset); |
| 3332 | +extern int cifs_lock(struct file *, int, struct file_lock *); |
| 3333 | +extern int cifs_fsync(struct file *, struct dentry *, int); |
| 3334 | +extern int cifs_flush(struct file *); |
| 3335 | +extern int cifs_file_mmap(struct file * , struct vm_area_struct *); |
| 3336 | +extern struct file_operations cifs_dir_ops; |
| 3337 | +extern int cifs_dir_open(struct inode *inode, struct file *file); |
| 3338 | +extern int cifs_readdir(struct file *file, void *direntry, filldir_t filldir); |
| 3339 | +extern long cifs_fcntl(int, unsigned int, unsigned long, struct file *); |
| 3340 | + |
| 3341 | +/* Functions related to dir entries */ |
| 3342 | +extern struct dentry_operations cifs_dentry_ops; |
| 3343 | + |
| 3344 | +/* Functions related to symlinks */ |
| 3345 | +extern int cifs_follow_link(struct dentry *direntry, struct nameidata *nd); |
| 3346 | +extern int cifs_readlink(struct dentry *direntry, char *buffer, int buflen); |
| 3347 | +extern int cifs_symlink(struct inode *inode, struct dentry *direntry, |
| 3348 | + const char *symname); |
| 3349 | +extern int cifs_removexattr(struct dentry *, const char *); |
| 3350 | +extern int cifs_setxattr(struct dentry *, const char *, const void *, |
| 3351 | + size_t, int); |
| 3352 | +extern ssize_t cifs_getxattr(struct dentry *, const char *, void *, size_t); |
| 3353 | +extern ssize_t cifs_listxattr(struct dentry *, char *, size_t); |
| 3354 | +#define CIFS_VERSION "1.20" |
| 3355 | +#endif /* _CIFSFS_H */ |
| 3356 | --- /dev/null |
| 3357 | +++ b/fs/cifs/cifs_fs_sb.h |
| 3358 | @@ -0,0 +1,32 @@ |
| 3359 | +/* |
| 3360 | + * fs/cifs/cifs_fs_sb.h |
| 3361 | + * |
| 3362 | + * Copyright (c) International Business Machines Corp., 2002 |
| 3363 | + * Author(s): Steve French (sfrench@us.ibm.com) |
| 3364 | + * |
| 3365 | + * This library is free software; you can redistribute it and/or modify |
| 3366 | + * it under the terms of the GNU Lesser General Public License as published |
| 3367 | + * by the Free Software Foundation; either version 2.1 of the License, or |
| 3368 | + * (at your option) any later version. |
| 3369 | + * |
| 3370 | + * This library is distributed in the hope that it will be useful, |
| 3371 | + * but WITHOUT ANY WARRANTY; without even the implied warranty of |
| 3372 | + * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See |
| 3373 | + * the GNU Lesser General Public License for more details. |
| 3374 | + * |
| 3375 | + */ |
| 3376 | +#ifndef _CIFS_FS_SB_H |
| 3377 | +#define _CIFS_FS_SB_H |
| 3378 | + |
| 3379 | +struct cifs_sb_info { |
| 3380 | + struct cifsTconInfo *tcon; /* primary mount */ |
| 3381 | + struct list_head nested_tcon_q; |
| 3382 | + struct nls_table *local_nls; |
| 3383 | + unsigned int rsize; |
| 3384 | + unsigned int wsize; |
| 3385 | + uid_t mnt_uid; |
| 3386 | + gid_t mnt_gid; |
| 3387 | + mode_t mnt_file_mode; |
| 3388 | + mode_t mnt_dir_mode; |
| 3389 | +}; |
| 3390 | +#endif /* _CIFS_FS_SB_H */ |
| 3391 | --- /dev/null |
| 3392 | +++ b/fs/cifs/cifsglob.h |
| 3393 | @@ -0,0 +1,413 @@ |
| 3394 | +/* |
| 3395 | + * fs/cifs/cifsglob.h |
| 3396 | + * |
| 3397 | + * Copyright (C) International Business Machines Corp., 2002,2003 |
| 3398 | + * Author(s): Steve French (sfrench@us.ibm.com) |
| 3399 | + * |
| 3400 | + * This library is free software; you can redistribute it and/or modify |
| 3401 | + * it under the terms of the GNU Lesser General Public License as published |
| 3402 | + * by the Free Software Foundation; either version 2.1 of the License, or |
| 3403 | + * (at your option) any later version. |
| 3404 | + * |
| 3405 | + * This library is distributed in the hope that it will be useful, |
| 3406 | + * but WITHOUT ANY WARRANTY; without even the implied warranty of |
| 3407 | + * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See |
| 3408 | + * the GNU Lesser General Public License for more details. |
| 3409 | + * |
| 3410 | + */ |
| 3411 | +#include <linux/in.h> |
| 3412 | +#include <linux/in6.h> |
| 3413 | +#include "cifs_fs_sb.h" |
| 3414 | +/* |
| 3415 | + * The sizes of various internal tables and strings |
| 3416 | + */ |
| 3417 | +#define MAX_UID_INFO 16 |
| 3418 | +#define MAX_SES_INFO 2 |
| 3419 | +#define MAX_TCON_INFO 4 |
| 3420 | + |
| 3421 | +#define MAX_TREE_SIZE 2 + MAX_SERVER_SIZE + 1 + MAX_SHARE_SIZE + 1 |
| 3422 | +#define MAX_SERVER_SIZE 15 |
| 3423 | +#define MAX_SHARE_SIZE 64 /* used to be 20 - this should still be enough */ |
| 3424 | +#define MAX_USERNAME_SIZE 32 /* 32 is to allow for 15 char names + null |
| 3425 | + termination then *2 for unicode versions */ |
| 3426 | +#define MAX_PASSWORD_SIZE 16 |
| 3427 | + |
| 3428 | +/* |
| 3429 | + * MAX_REQ is the maximum number of requests that WE will send |
| 3430 | + * on one socket concurently. It also matches the most common |
| 3431 | + * value of max multiplex returned by servers. We may |
| 3432 | + * eventually want to use the negotiated value (in case |
| 3433 | + * future servers can handle more) when we are more confident that |
| 3434 | + * we will not have problems oveloading the socket with pending |
| 3435 | + * write data. |
| 3436 | + */ |
| 3437 | +#define CIFS_MAX_REQ 50 |
| 3438 | + |
| 3439 | +#define SERVER_NAME_LENGTH 15 |
| 3440 | +#define SERVER_NAME_LEN_WITH_NULL (SERVER_NAME_LENGTH + 1) |
| 3441 | + |
| 3442 | +/* used to define string lengths for reversing unicode strings */ |
| 3443 | +/* (256+1)*2 = 514 */ |
| 3444 | +/* (max path length + 1 for null) * 2 for unicode */ |
| 3445 | +#define MAX_NAME 514 |
| 3446 | + |
| 3447 | +#include "cifspdu.h" |
| 3448 | + |
| 3449 | +#ifndef FALSE |
| 3450 | +#define FALSE 0 |
| 3451 | +#endif |
| 3452 | + |
| 3453 | +#ifndef TRUE |
| 3454 | +#define TRUE 1 |
| 3455 | +#endif |
| 3456 | + |
| 3457 | +#ifndef XATTR_DOS_ATTRIB |
| 3458 | +#define XATTR_DOS_ATTRIB "user.DOSATTRIB" |
| 3459 | +#endif |
| 3460 | + |
| 3461 | +/* |
| 3462 | + * This information is kept on every Server we know about. |
| 3463 | + * |
| 3464 | + * Some things to note: |
| 3465 | + * |
| 3466 | + */ |
| 3467 | +#define SERVER_NAME_LEN_WITH_NULL (SERVER_NAME_LENGTH + 1) |
| 3468 | + |
| 3469 | +/* |
| 3470 | + * CIFS vfs client Status information (based on what we know.) |
| 3471 | + */ |
| 3472 | + |
| 3473 | + /* associated with each tcp and smb session */ |
| 3474 | +enum statusEnum { |
| 3475 | + CifsNew = 0, |
| 3476 | + CifsGood, |
| 3477 | + CifsExiting, |
| 3478 | + CifsNeedReconnect |
| 3479 | +}; |
| 3480 | + |
| 3481 | +enum securityEnum { |
| 3482 | + NTLM = 0, /* Legacy NTLM012 auth with NTLM hash */ |
| 3483 | + NTLMv2, /* Legacy NTLM auth with NTLMv2 hash */ |
| 3484 | + RawNTLMSSP, /* NTLMSSP without SPNEGO */ |
| 3485 | + NTLMSSP, /* NTLMSSP via SPNEGO */ |
| 3486 | + Kerberos /* Kerberos via SPNEGO */ |
| 3487 | +}; |
| 3488 | + |
| 3489 | +enum protocolEnum { |
| 3490 | + IPV4 = 0, |
| 3491 | + IPV6, |
| 3492 | + SCTP |
| 3493 | + /* Netbios frames protocol not supported at this time */ |
| 3494 | +}; |
| 3495 | + |
| 3496 | +/* |
| 3497 | + ***************************************************************** |
| 3498 | + * Except the CIFS PDUs themselves all the |
| 3499 | + * globally interesting structs should go here |
| 3500 | + ***************************************************************** |
| 3501 | + */ |
| 3502 | + |
| 3503 | +struct TCP_Server_Info { |
| 3504 | + char server_Name[SERVER_NAME_LEN_WITH_NULL]; /* 15 chars + X'20'in 16th */ |
| 3505 | + char unicode_server_Name[SERVER_NAME_LEN_WITH_NULL * 2]; /* Unicode version of server_Name */ |
| 3506 | + struct socket *ssocket; |
| 3507 | + union { |
| 3508 | + struct sockaddr_in sockAddr; |
| 3509 | + struct sockaddr_in6 sockAddr6; |
| 3510 | + } addr; |
| 3511 | + wait_queue_head_t response_q; |
| 3512 | + wait_queue_head_t request_q; /* if more than maxmpx to srvr must block*/ |
| 3513 | + struct list_head pending_mid_q; |
| 3514 | + void *Server_NlsInfo; /* BB - placeholder for future NLS info */ |
| 3515 | + unsigned short server_codepage; /* codepage for the server */ |
| 3516 | + unsigned long ip_address; /* IP addr for the server if known */ |
| 3517 | + enum protocolEnum protocolType; |
| 3518 | + char versionMajor; |
| 3519 | + char versionMinor; |
| 3520 | + int svlocal:1; /* local server or remote */ |
| 3521 | + atomic_t socketUseCount; /* number of open cifs sessions on socket */ |
| 3522 | + atomic_t inFlight; /* number of requests on the wire to server */ |
| 3523 | + enum statusEnum tcpStatus; /* what we think the status is */ |
| 3524 | + struct semaphore tcpSem; |
| 3525 | + struct task_struct *tsk; |
| 3526 | + char server_GUID[16]; |
| 3527 | + char secMode; |
| 3528 | + enum securityEnum secType; |
| 3529 | + unsigned int maxReq; /* Clients should submit no more */ |
| 3530 | + /* than maxReq distinct unanswered SMBs to the server when using */ |
| 3531 | + /* multiplexed reads or writes */ |
| 3532 | + unsigned int maxBuf; /* maxBuf specifies the maximum */ |
| 3533 | + /* message size the server can send or receive for non-raw SMBs */ |
| 3534 | + unsigned int maxRw; /* maxRw specifies the maximum */ |
| 3535 | + /* message size the server can send or receive for */ |
| 3536 | + /* SMB_COM_WRITE_RAW or SMB_COM_READ_RAW. */ |
| 3537 | + char sessid[4]; /* unique token id for this session */ |
| 3538 | + /* (returned on Negotiate */ |
| 3539 | + int capabilities; /* allow selective disabling of caps by smb sess */ |
| 3540 | + __u16 timeZone; |
| 3541 | + char cryptKey[CIFS_CRYPTO_KEY_SIZE]; |
| 3542 | + char workstation_RFC1001_name[16]; /* 16th byte is always zero */ |
| 3543 | +}; |
| 3544 | + |
| 3545 | +/* |
| 3546 | + * The following is our shortcut to user information. We surface the uid, |
| 3547 | + * and name. We always get the password on the fly in case it |
| 3548 | + * has changed. We also hang a list of sessions owned by this user off here. |
| 3549 | + */ |
| 3550 | +struct cifsUidInfo { |
| 3551 | + struct list_head userList; |
| 3552 | + struct list_head sessionList; /* SMB sessions for this user */ |
| 3553 | + uid_t linux_uid; |
| 3554 | + char user[MAX_USERNAME_SIZE + 1]; /* ascii name of user */ |
| 3555 | + /* BB may need ptr or callback for PAM or WinBind info */ |
| 3556 | +}; |
| 3557 | + |
| 3558 | +/* |
| 3559 | + * Session structure. One of these for each uid session with a particular host |
| 3560 | + */ |
| 3561 | +struct cifsSesInfo { |
| 3562 | + struct list_head cifsSessionList; |
| 3563 | + struct semaphore sesSem; |
| 3564 | + struct cifsUidInfo *uidInfo; /* pointer to user info */ |
| 3565 | + struct TCP_Server_Info *server; /* pointer to server info */ |
| 3566 | + atomic_t inUse; /* # of mounts (tree connections) on this ses */ |
| 3567 | + enum statusEnum status; |
| 3568 | + __u32 sequence_number; /* needed for CIFS PDU signature */ |
| 3569 | + __u16 ipc_tid; /* special tid for connection to IPC share */ |
| 3570 | + char mac_signing_key[CIFS_SESSION_KEY_SIZE + 16]; |
| 3571 | + char *serverOS; /* name of operating system underlying the server */ |
| 3572 | + char *serverNOS; /* name of network operating system that the server is running */ |
| 3573 | + char *serverDomain; /* security realm of server */ |
| 3574 | + int Suid; /* remote smb uid */ |
| 3575 | + uid_t linux_uid; /* local Linux uid */ |
| 3576 | + int capabilities; |
| 3577 | + char serverName[SERVER_NAME_LEN_WITH_NULL * 2]; /* BB make bigger for tcp names - will ipv6 and sctp addresses fit here?? */ |
| 3578 | + char userName[MAX_USERNAME_SIZE + 1]; |
| 3579 | + char domainName[MAX_USERNAME_SIZE + 1]; |
| 3580 | + char * password; |
| 3581 | +}; |
| 3582 | + |
| 3583 | +/* |
| 3584 | + * there is one of these for each connection to a resource on a particular |
| 3585 | + * session |
| 3586 | + */ |
| 3587 | +struct cifsTconInfo { |
| 3588 | + struct list_head cifsConnectionList; |
| 3589 | + struct list_head openFileList; |
| 3590 | + struct semaphore tconSem; |
| 3591 | + struct cifsSesInfo *ses; /* pointer to session associated with */ |
| 3592 | + char treeName[MAX_TREE_SIZE + 1]; /* UNC name of resource (in ASCII not UTF) */ |
| 3593 | + char *nativeFileSystem; |
| 3594 | + __u16 tid; /* The 2 byte tree id */ |
| 3595 | + __u16 Flags; /* optional support bits */ |
| 3596 | + enum statusEnum tidStatus; |
| 3597 | + atomic_t useCount; /* how many mounts (explicit or implicit) to this share */ |
| 3598 | +#ifdef CONFIG_CIFS_STATS |
| 3599 | + atomic_t num_smbs_sent; |
| 3600 | + atomic_t num_writes; |
| 3601 | + atomic_t num_reads; |
| 3602 | + atomic_t num_oplock_brks; |
| 3603 | + atomic_t num_opens; |
| 3604 | + atomic_t num_deletes; |
| 3605 | + atomic_t num_mkdirs; |
| 3606 | + atomic_t num_rmdirs; |
| 3607 | + atomic_t num_renames; |
| 3608 | + atomic_t num_t2renames; |
| 3609 | + __u64 bytes_read; |
| 3610 | + __u64 bytes_written; |
| 3611 | + spinlock_t stat_lock; |
| 3612 | +#endif |
| 3613 | + FILE_SYSTEM_DEVICE_INFO fsDevInfo; |
| 3614 | + FILE_SYSTEM_ATTRIBUTE_INFO fsAttrInfo; /* ok if file system name truncated */ |
| 3615 | + FILE_SYSTEM_UNIX_INFO fsUnixInfo; |
| 3616 | + int retry:1; |
| 3617 | + /* BB add field for back pointer to sb struct? */ |
| 3618 | +}; |
| 3619 | + |
| 3620 | +/* |
| 3621 | + * This info hangs off the cifsFileInfo structure. This is used to track |
| 3622 | + * byte stream locks on the file |
| 3623 | + */ |
| 3624 | +struct cifsLockInfo { |
| 3625 | + struct cifsLockInfo *next; |
| 3626 | + int start; |
| 3627 | + int length; |
| 3628 | + int type; |
| 3629 | +}; |
| 3630 | + |
| 3631 | +/* |
| 3632 | + * One of these for each open instance of a file |
| 3633 | + */ |
| 3634 | +struct cifsFileInfo { |
| 3635 | + struct list_head tlist; /* pointer to next fid owned by tcon */ |
| 3636 | + struct list_head flist; /* next fid (file instance) for this inode */ |
| 3637 | + unsigned int uid; /* allows finding which FileInfo structure */ |
| 3638 | + __u32 pid; /* process id who opened file */ |
| 3639 | + __u16 netfid; /* file id from remote */ |
| 3640 | + /* BB add lock scope info here if needed */ ; |
| 3641 | + /* lock scope id (0 if none) */ |
| 3642 | + struct file * pfile; /* needed for writepage */ |
| 3643 | + struct inode * pInode; /* needed for oplock break */ |
| 3644 | + int endOfSearch:1; /* we have reached end of search */ |
| 3645 | + int closePend:1; /* file is marked to close */ |
| 3646 | + int emptyDir:1; |
| 3647 | + int invalidHandle:1; /* file closed via session abend */ |
| 3648 | + struct semaphore fh_sem; /* prevents reopen race after dead ses*/ |
| 3649 | + char * search_resume_name; |
| 3650 | + unsigned int resume_name_length; |
| 3651 | + __u32 resume_key; |
| 3652 | +}; |
| 3653 | + |
| 3654 | +/* |
| 3655 | + * One of these for each file inode |
| 3656 | + */ |
| 3657 | + |
| 3658 | +struct cifsInodeInfo { |
| 3659 | + struct list_head lockList; |
| 3660 | + /* BB add in lists for dirty pages - i.e. write caching info for oplock */ |
| 3661 | + struct list_head openFileList; |
| 3662 | + int write_behind_rc; |
| 3663 | + __u32 cifsAttrs; /* e.g. DOS archive bit, sparse, compressed, system */ |
| 3664 | + atomic_t inUse; /* num concurrent users (local openers cifs) of file*/ |
| 3665 | + unsigned long time; /* jiffies of last update/check of inode */ |
| 3666 | + int clientCanCacheRead:1; /* read oplock */ |
| 3667 | + int clientCanCacheAll:1; /* read and writebehind oplock */ |
| 3668 | + int oplockPending:1; |
| 3669 | + struct inode vfs_inode; |
| 3670 | +}; |
| 3671 | + |
| 3672 | +static inline struct cifsInodeInfo * CIFS_I(struct inode *inode) |
| 3673 | +{ |
| 3674 | + return (struct cifsInodeInfo *)&(inode->u); |
| 3675 | +} |
| 3676 | + |
| 3677 | +static inline struct cifs_sb_info * CIFS_SB(struct super_block *sb) |
| 3678 | +{ |
| 3679 | + return (struct cifs_sb_info *) &(sb->u); |
| 3680 | +} |
| 3681 | + |
| 3682 | + |
| 3683 | +/* one of these for every pending CIFS request to the server */ |
| 3684 | +struct mid_q_entry { |
| 3685 | + struct list_head qhead; /* mids waiting on reply from this server */ |
| 3686 | + __u16 mid; /* multiplex id */ |
| 3687 | + __u16 pid; /* process id */ |
| 3688 | + __u32 sequence_number; /* for CIFS signing */ |
| 3689 | + __u16 command; /* smb command code */ |
| 3690 | + struct timeval when_sent; /* time when smb sent */ |
| 3691 | + struct cifsSesInfo *ses; /* smb was sent to this server */ |
| 3692 | + struct task_struct *tsk; /* task waiting for response */ |
| 3693 | + struct smb_hdr *resp_buf; /* response buffer */ |
| 3694 | + int midState; /* wish this were enum but can not pass to wait_event */ |
| 3695 | +}; |
| 3696 | + |
| 3697 | +struct oplock_q_entry { |
| 3698 | + struct list_head qhead; |
| 3699 | + struct inode * pinode; |
| 3700 | + struct cifsTconInfo * tcon; |
| 3701 | + __u16 netfid; |
| 3702 | +}; |
| 3703 | + |
| 3704 | +#define MID_FREE 0 |
| 3705 | +#define MID_REQUEST_ALLOCATED 1 |
| 3706 | +#define MID_REQUEST_SUBMITTED 2 |
| 3707 | +#define MID_RESPONSE_RECEIVED 4 |
| 3708 | +#define MID_RETRY_NEEDED 8 /* session closed while this request out */ |
| 3709 | + |
| 3710 | +/* |
| 3711 | + ***************************************************************** |
| 3712 | + * All constants go here |
| 3713 | + ***************************************************************** |
| 3714 | + */ |
| 3715 | + |
| 3716 | +#define UID_HASH (16) |
| 3717 | + |
| 3718 | +/* |
| 3719 | + * Note that ONE module should define _DECLARE_GLOBALS_HERE to cause the |
| 3720 | + * following to be declared. |
| 3721 | + */ |
| 3722 | + |
| 3723 | +/**************************************************************************** |
| 3724 | + * Locking notes. All updates to global variables and lists should be |
| 3725 | + * protected by spinlocks or semaphores. |
| 3726 | + * |
| 3727 | + * Spinlocks |
| 3728 | + * --------- |
| 3729 | + * GlobalMid_Lock protects: |
| 3730 | + * list operations on pending_mid_q and oplockQ |
| 3731 | + * updates to XID counters, multiplex id and SMB sequence numbers |
| 3732 | + * GlobalSMBSesLock protects: |
| 3733 | + * list operations on tcp and SMB session lists and tCon lists |
| 3734 | + * f_owner.lock protects certain per file struct operations |
| 3735 | + * mapping->page_lock protects certain per page operations |
| 3736 | + * |
| 3737 | + * Semaphores |
| 3738 | + * ---------- |
| 3739 | + * sesSem operations on smb session |
| 3740 | + * tconSem operations on tree connection |
| 3741 | + * fh_sem file handle reconnection operations |
| 3742 | + * |
| 3743 | + ****************************************************************************/ |
| 3744 | + |
| 3745 | +#ifdef DECLARE_GLOBALS_HERE |
| 3746 | +#define GLOBAL_EXTERN |
| 3747 | +#else |
| 3748 | +#define GLOBAL_EXTERN extern |
| 3749 | +#endif |
| 3750 | + |
| 3751 | +/* |
| 3752 | + * The list of servers that did not respond with NT LM 0.12. |
| 3753 | + * This list helps improve performance and eliminate the messages indicating |
| 3754 | + * that we had a communications error talking to the server in this list. |
| 3755 | + */ |
| 3756 | +GLOBAL_EXTERN struct servers_not_supported *NotSuppList; /*@z4a */ |
| 3757 | + |
| 3758 | +/* |
| 3759 | + * The following is a hash table of all the users we know about. |
| 3760 | + */ |
| 3761 | +GLOBAL_EXTERN struct smbUidInfo *GlobalUidList[UID_HASH]; |
| 3762 | + |
| 3763 | +GLOBAL_EXTERN struct list_head GlobalServerList; /* BB not implemented yet */ |
| 3764 | +GLOBAL_EXTERN struct list_head GlobalSMBSessionList; |
| 3765 | +GLOBAL_EXTERN struct list_head GlobalTreeConnectionList; |
| 3766 | +GLOBAL_EXTERN rwlock_t GlobalSMBSeslock; /* protects list inserts on 3 above */ |
| 3767 | + |
| 3768 | +GLOBAL_EXTERN struct list_head GlobalOplock_Q; |
| 3769 | + |
| 3770 | +/* |
| 3771 | + * Global transaction id (XID) information |
| 3772 | + */ |
| 3773 | +GLOBAL_EXTERN unsigned int GlobalCurrentXid; /* protected by GlobalMid_Sem */ |
| 3774 | +GLOBAL_EXTERN unsigned int GlobalTotalActiveXid; /* prot by GlobalMid_Sem */ |
| 3775 | +GLOBAL_EXTERN unsigned int GlobalMaxActiveXid; /* prot by GlobalMid_Sem */ |
| 3776 | +GLOBAL_EXTERN spinlock_t GlobalMid_Lock; /* protects above and list operations */ |
| 3777 | + /* on midQ entries */ |
| 3778 | +GLOBAL_EXTERN char Local_System_Name[15]; |
| 3779 | + |
| 3780 | +/* |
| 3781 | + * Global counters, updated atomically |
| 3782 | + */ |
| 3783 | +GLOBAL_EXTERN atomic_t sesInfoAllocCount; |
| 3784 | +GLOBAL_EXTERN atomic_t tconInfoAllocCount; |
| 3785 | + |
| 3786 | +GLOBAL_EXTERN atomic_t tcpSesReconnectCount; |
| 3787 | +GLOBAL_EXTERN atomic_t tconInfoReconnectCount; |
| 3788 | + |
| 3789 | +/* Various Debug counters to remove someday (BB) */ |
| 3790 | +GLOBAL_EXTERN atomic_t bufAllocCount; |
| 3791 | +GLOBAL_EXTERN atomic_t midCount; |
| 3792 | + |
| 3793 | +/* Misc globals */ |
| 3794 | +GLOBAL_EXTERN unsigned int multiuser_mount; /* if enabled allows new sessions |
| 3795 | + to be established on existing mount if we |
| 3796 | + have the uid/password or Kerberos credential |
| 3797 | + or equivalent for current user */ |
| 3798 | +GLOBAL_EXTERN unsigned int oplockEnabled; |
| 3799 | +GLOBAL_EXTERN unsigned int quotaEnabled; |
| 3800 | +GLOBAL_EXTERN unsigned int lookupCacheEnabled; |
| 3801 | +GLOBAL_EXTERN unsigned int extended_security; /* if on, session setup sent |
| 3802 | + with more secure ntlmssp2 challenge/resp */ |
| 3803 | +GLOBAL_EXTERN unsigned int ntlmv2_support; /* better optional password hash */ |
| 3804 | +GLOBAL_EXTERN unsigned int sign_CIFS_PDUs; /* enable smb packet signing */ |
| 3805 | +GLOBAL_EXTERN unsigned int linuxExtEnabled; /* enable Linux/Unix CIFS extensions */ |
| 3806 | + |
| 3807 | --- /dev/null |
| 3808 | +++ b/fs/cifs/cifspdu.h |
| 3809 | @@ -0,0 +1,1793 @@ |
| 3810 | +/* |
| 3811 | + * fs/cifs/cifspdu.h |
| 3812 | + * |
| 3813 | + * Copyright (c) International Business Machines Corp., 2002 |
| 3814 | + * Author(s): Steve French (sfrench@us.ibm.com) |
| 3815 | + * |
| 3816 | + * This library is free software; you can redistribute it and/or modify |
| 3817 | + * it under the terms of the GNU Lesser General Public License as published |
| 3818 | + * by the Free Software Foundation; either version 2.1 of the License, or |
| 3819 | + * (at your option) any later version. |
| 3820 | + * |
| 3821 | + * This library is distributed in the hope that it will be useful, |
| 3822 | + * but WITHOUT ANY WARRANTY; without even the implied warranty of |
| 3823 | + * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See |
| 3824 | + * the GNU Lesser General Public License for more details. |
| 3825 | + * |
| 3826 | + * You should have received a copy of the GNU Lesser General Public License |
| 3827 | + * along with this library; if not, write to the Free Software |
| 3828 | + * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA |
| 3829 | + */ |
| 3830 | + |
| 3831 | +#ifndef _CIFSPDU_H |
| 3832 | +#define _CIFSPDU_H |
| 3833 | + |
| 3834 | +#include <net/sock.h> |
| 3835 | + |
| 3836 | +#define CIFS_PROT 0 |
| 3837 | +#define BAD_PROT CIFS_PROT+1 |
| 3838 | + |
| 3839 | +/* SMB command codes */ |
| 3840 | +#define SMB_COM_CREATE_DIRECTORY 0x00 |
| 3841 | +#define SMB_COM_DELETE_DIRECTORY 0x01 |
| 3842 | +#define SMB_COM_CLOSE 0x04 |
| 3843 | +#define SMB_COM_DELETE 0x06 |
| 3844 | +#define SMB_COM_RENAME 0x07 |
| 3845 | +#define SMB_COM_LOCKING_ANDX 0x24 |
| 3846 | +#define SMB_COM_COPY 0x29 |
| 3847 | +#define SMB_COM_READ_ANDX 0x2E |
| 3848 | +#define SMB_COM_WRITE_ANDX 0x2F |
| 3849 | +#define SMB_COM_TRANSACTION2 0x32 |
| 3850 | +#define SMB_COM_TRANSACTION2_SECONDARY 0x33 |
| 3851 | +#define SMB_COM_FIND_CLOSE2 0x34 |
| 3852 | +#define SMB_COM_TREE_DISCONNECT 0x71 |
| 3853 | +#define SMB_COM_NEGOTIATE 0x72 |
| 3854 | +#define SMB_COM_SESSION_SETUP_ANDX 0x73 |
| 3855 | +#define SMB_COM_LOGOFF_ANDX 0x74 |
| 3856 | +#define SMB_COM_TREE_CONNECT_ANDX 0x75 |
| 3857 | +#define SMB_COM_NT_TRANSACT 0xA0 |
| 3858 | +#define SMB_COM_NT_TRANSACT_SECONDARY 0xA1 |
| 3859 | +#define SMB_COM_NT_CREATE_ANDX 0xA2 |
| 3860 | +#define SMB_COM_NT_RENAME 0xA5 |
| 3861 | + |
| 3862 | +/* Transact2 subcommand codes */ |
| 3863 | +#define TRANS2_OPEN 0x00 |
| 3864 | +#define TRANS2_FIND_FIRST 0x01 |
| 3865 | +#define TRANS2_FIND_NEXT 0x02 |
| 3866 | +#define TRANS2_QUERY_FS_INFORMATION 0x03 |
| 3867 | +#define TRANS2_QUERY_PATH_INFORMATION 0x05 |
| 3868 | +#define TRANS2_SET_PATH_INFORMATION 0x06 |
| 3869 | +#define TRANS2_QUERY_FILE_INFORMATION 0x07 |
| 3870 | +#define TRANS2_SET_FILE_INFORMATION 0x08 |
| 3871 | +#define TRANS2_GET_DFS_REFERRAL 0x10 |
| 3872 | +#define TRANS2_REPORT_DFS_INCOSISTENCY 0x11 |
| 3873 | + |
| 3874 | +/* NT Transact subcommand codes */ |
| 3875 | +#define NT_TRANSACT_CREATE 0x01 |
| 3876 | +#define NT_TRANSACT_IOCTL 0x02 |
| 3877 | +#define NT_TRANSACT_SET_SECURITY_DESC 0x03 |
| 3878 | +#define NT_TRANSACT_NOTIFY_CHANGE 0x04 |
| 3879 | +#define NT_TRANSACT_RENAME 0x05 |
| 3880 | +#define NT_TRANSACT_QUERY_SECURITY_DESC 0x06 |
| 3881 | +#define NT_TRANSACT_GET_USER_QUOTA 0x07 |
| 3882 | +#define NT_TRANSACT_SET_USER_QUOTA 0x08 |
| 3883 | + |
| 3884 | +#define MAX_CIFS_HDR_SIZE 256 /* chained NTCreateXReadX will probably be biggest */ |
| 3885 | + |
| 3886 | +/* internal cifs vfs structures */ |
| 3887 | +/***************************************************************** |
| 3888 | + * All constants go here |
| 3889 | + ***************************************************************** |
| 3890 | + */ |
| 3891 | + |
| 3892 | +/* |
| 3893 | + * Starting value for maximum SMB size negotiation |
| 3894 | + */ |
| 3895 | +#define CIFS_MAX_MSGSIZE (4*4096) |
| 3896 | + |
| 3897 | +/* |
| 3898 | + * Size of encrypted user password in bytes |
| 3899 | + */ |
| 3900 | +#define CIFS_ENCPWD_SIZE (16) |
| 3901 | + |
| 3902 | +/* |
| 3903 | + * Size of the crypto key returned on the negotiate SMB in bytes |
| 3904 | + */ |
| 3905 | +#define CIFS_CRYPTO_KEY_SIZE (8) |
| 3906 | + |
| 3907 | +/* |
| 3908 | + * Size of the session key (crypto key encrypted with the password |
| 3909 | + */ |
| 3910 | +#define CIFS_SESSION_KEY_SIZE (24) |
| 3911 | + |
| 3912 | +/* |
| 3913 | + * Maximum user name length |
| 3914 | + */ |
| 3915 | +#define CIFS_UNLEN (20) |
| 3916 | + |
| 3917 | +/* |
| 3918 | + * Flags on SMB open |
| 3919 | + */ |
| 3920 | +#define SMBOPEN_WRITE_THROUGH 0x4000 |
| 3921 | +#define SMBOPEN_DENY_ALL 0x0010 |
| 3922 | +#define SMBOPEN_DENY_WRITE 0x0020 |
| 3923 | +#define SMBOPEN_DENY_READ 0x0030 |
| 3924 | +#define SMBOPEN_DENY_NONE 0x0040 |
| 3925 | +#define SMBOPEN_READ 0x0000 |
| 3926 | +#define SMBOPEN_WRITE 0x0001 |
| 3927 | +#define SMBOPEN_READWRITE 0x0002 |
| 3928 | +#define SMBOPEN_EXECUTE 0x0003 |
| 3929 | + |
| 3930 | +#define SMBOPEN_OCREATE 0x0010 |
| 3931 | +#define SMBOPEN_OTRUNC 0x0002 |
| 3932 | +#define SMBOPEN_OAPPEND 0x0001 |
| 3933 | + |
| 3934 | +/* |
| 3935 | + * SMB flag definitions |
| 3936 | + */ |
| 3937 | +#define SMBFLG_EXTD_LOCK 0x01 /* server supports lock-read write-unlock primitives */ |
| 3938 | +#define SMBFLG_RCV_POSTED 0x02 /* obsolete */ |
| 3939 | +#define SMBFLG_RSVD 0x04 |
| 3940 | +#define SMBFLG_CASELESS 0x08 /* all pathnames treated as caseless (off implies case sensitive file handling requested) */ |
| 3941 | +#define SMBFLG_CANONICAL_PATH_FORMAT 0x10 /* obsolete */ |
| 3942 | +#define SMBFLG_OLD_OPLOCK 0x20 /* obsolete */ |
| 3943 | +#define SMBFLG_OLD_OPLOCK_NOTIFY 0x40 /* obsolete */ |
| 3944 | +#define SMBFLG_RESPONSE 0x80 /* this PDU is a response from server */ |
| 3945 | + |
| 3946 | +/* |
| 3947 | + * SMB flag2 definitions |
| 3948 | + */ |
| 3949 | +#define SMBFLG2_KNOWS_LONG_NAMES 0x0001 /* can send long (non-8.3) path names in response */ |
| 3950 | +#define SMBFLG2_KNOWS_EAS 0x0002 |
| 3951 | +#define SMBFLG2_SECURITY_SIGNATURE 0x0004 |
| 3952 | +#define SMBFLG2_IS_LONG_NAME 0x0040 |
| 3953 | +#define SMBFLG2_EXT_SEC 0x0800 |
| 3954 | +#define SMBFLG2_DFS 0x1000 |
| 3955 | +#define SMBFLG2_PAGING_IO 0x2000 |
| 3956 | +#define SMBFLG2_ERR_STATUS 0x4000 |
| 3957 | +#define SMBFLG2_UNICODE 0x8000 |
| 3958 | + |
| 3959 | +/* |
| 3960 | + * These are the file access permission bits defined in CIFS for the |
| 3961 | + * NTCreateAndX as well as the level 0x107 |
| 3962 | + * TRANS2_QUERY_PATH_INFORMATION API. The level 0x107, SMB_QUERY_FILE_ALL_INFO |
| 3963 | + * responds with the AccessFlags. |
| 3964 | + * The AccessFlags specifies the access permissions a caller has to the |
| 3965 | + * file and can have any suitable combination of the following values: |
| 3966 | + */ |
| 3967 | + |
| 3968 | +#define FILE_READ_DATA 0x00000001 /* Data can be read from the file */ |
| 3969 | +#define FILE_WRITE_DATA 0x00000002 /* Data can be written to the file */ |
| 3970 | +#define FILE_APPEND_DATA 0x00000004 /* Data can be appended to the file */ |
| 3971 | +#define FILE_READ_EA 0x00000008 /* Extended attributes associated */ |
| 3972 | + /* with the file can be read */ |
| 3973 | +#define FILE_WRITE_EA 0x00000010 /* Extended attributes associated */ |
| 3974 | + /* with the file can be written */ |
| 3975 | +#define FILE_EXECUTE 0x00000020 /*Data can be read into memory from */ |
| 3976 | + /* the file using system paging I/O */ |
| 3977 | +#define FILE_DELETE_CHILD 0x00000040 |
| 3978 | +#define FILE_READ_ATTRIBUTES 0x00000080 /* Attributes associated with the */ |
| 3979 | + /* file can be read */ |
| 3980 | +#define FILE_WRITE_ATTRIBUTES 0x00000100 /* Attributes associated with the */ |
| 3981 | + /* file can be written */ |
| 3982 | +#define DELETE 0x00010000 /* The file can be deleted */ |
| 3983 | +#define READ_CONTROL 0x00020000 /* The access control list and */ |
| 3984 | + /* ownership associated with the */ |
| 3985 | + /* file can be read */ |
| 3986 | +#define WRITE_DAC 0x00040000 /* The access control list and */ |
| 3987 | + /* ownership associated with the */ |
| 3988 | + /* file can be written. */ |
| 3989 | +#define WRITE_OWNER 0x00080000 /* Ownership information associated */ |
| 3990 | + /* with the file can be written */ |
| 3991 | +#define SYNCHRONIZE 0x00100000 /* The file handle can waited on to */ |
| 3992 | + /* synchronize with the completion */ |
| 3993 | + /* of an input/output request */ |
| 3994 | +#define GENERIC_ALL 0x10000000 |
| 3995 | +#define GENERIC_EXECUTE 0x20000000 |
| 3996 | +#define GENERIC_WRITE 0x40000000 |
| 3997 | +#define GENERIC_READ 0x80000000 |
| 3998 | + /* In summary - Relevant file */ |
| 3999 | + /* access flags from CIFS are */ |
| 4000 | + /* file_read_data, file_write_data */ |
| 4001 | + /* file_execute, file_read_attributes */ |
| 4002 | + /* write_dac, and delete. */ |
| 4003 | + |
| 4004 | +/* |
| 4005 | + * Invalid readdir handle |
| 4006 | + */ |
| 4007 | +#define CIFS_NO_HANDLE 0xFFFF |
| 4008 | + |
| 4009 | +/* IPC$ in ASCII */ |
| 4010 | +#define CIFS_IPC_RESOURCE "\x49\x50\x43\x24" |
| 4011 | + |
| 4012 | +/* IPC$ in Unicode */ |
| 4013 | +#define CIFS_IPC_UNICODE_RESOURCE "\x00\x49\x00\x50\x00\x43\x00\x24\x00\x00" |
| 4014 | + |
| 4015 | +/* Unicode Null terminate 2 bytes of 0 */ |
| 4016 | +#define UNICODE_NULL "\x00\x00" |
| 4017 | +#define ASCII_NULL 0x00 |
| 4018 | + |
| 4019 | +/* |
| 4020 | + * Server type values (returned on EnumServer API |
| 4021 | + */ |
| 4022 | +#define CIFS_SV_TYPE_DC 0x00000008 |
| 4023 | +#define CIFS_SV_TYPE_BACKDC 0x00000010 |
| 4024 | + |
| 4025 | +/* |
| 4026 | + * Alias type flags (From EnumAlias API call |
| 4027 | + */ |
| 4028 | +#define CIFS_ALIAS_TYPE_FILE 0x0001 |
| 4029 | +#define CIFS_SHARE_TYPE_FILE 0x0000 |
| 4030 | + |
| 4031 | +/* |
| 4032 | + * File Attribute flags |
| 4033 | + */ |
| 4034 | +#define ATTR_READONLY 0x0001 |
| 4035 | +#define ATTR_HIDDEN 0x0002 |
| 4036 | +#define ATTR_SYSTEM 0x0004 |
| 4037 | +#define ATTR_VOLUME 0x0008 |
| 4038 | +#define ATTR_DIRECTORY 0x0010 |
| 4039 | +#define ATTR_ARCHIVE 0x0020 |
| 4040 | +#define ATTR_DEVICE 0x0040 |
| 4041 | +#define ATTR_NORMAL 0x0080 |
| 4042 | +#define ATTR_TEMPORARY 0x0100 |
| 4043 | +#define ATTR_SPARSE 0x0200 |
| 4044 | +#define ATTR_REPARSE 0x0400 |
| 4045 | +#define ATTR_COMPRESSED 0x0800 |
| 4046 | +#define ATTR_OFFLINE 0x1000 /* ie file not immediately available - offline storage */ |
| 4047 | +#define ATTR_NOT_CONTENT_INDEXED 0x2000 |
| 4048 | +#define ATTR_ENCRYPTED 0x4000 |
| 4049 | +#define ATTR_POSIX_SEMANTICS 0x01000000 |
| 4050 | +#define ATTR_BACKUP_SEMANTICS 0x02000000 |
| 4051 | +#define ATTR_DELETE_ON_CLOSE 0x04000000 |
| 4052 | +#define ATTR_SEQUENTIAL_SCAN 0x08000000 |
| 4053 | +#define ATTR_RANDOM_ACCESS 0x10000000 |
| 4054 | +#define ATTR_NO_BUFFERING 0x20000000 |
| 4055 | +#define ATTR_WRITE_THROUGH 0x80000000 |
| 4056 | + |
| 4057 | +/* ShareAccess flags */ |
| 4058 | +#define FILE_NO_SHARE 0x00000000 |
| 4059 | +#define FILE_SHARE_READ 0x00000001 |
| 4060 | +#define FILE_SHARE_WRITE 0x00000002 |
| 4061 | +#define FILE_SHARE_DELETE 0x00000004 |
| 4062 | +#define FILE_SHARE_ALL 0x00000007 |
| 4063 | + |
| 4064 | +/* CreateDisposition flags */ |
| 4065 | +#define FILE_SUPERSEDE 0x00000000 |
| 4066 | +#define FILE_OPEN 0x00000001 |
| 4067 | +#define FILE_CREATE 0x00000002 |
| 4068 | +#define FILE_OPEN_IF 0x00000003 |
| 4069 | +#define FILE_OVERWRITE 0x00000004 |
| 4070 | +#define FILE_OVERWRITE_IF 0x00000005 |
| 4071 | + |
| 4072 | +/* CreateOptions */ |
| 4073 | +#define CREATE_NOT_FILE 0x00000001 /* if set must not be file */ |
| 4074 | +#define CREATE_WRITE_THROUGH 0x00000002 |
| 4075 | +#define CREATE_NOT_DIR 0x00000040 /* if set must not be directory */ |
| 4076 | +#define CREATE_RANDOM_ACCESS 0x00000800 |
| 4077 | +#define CREATE_DELETE_ON_CLOSE 0x00001000 |
| 4078 | +#define OPEN_REPARSE_POINT 0x00200000 |
| 4079 | + |
| 4080 | +/* ImpersonationLevel flags */ |
| 4081 | +#define SECURITY_ANONYMOUS 0 |
| 4082 | +#define SECURITY_IDENTIFICATION 1 |
| 4083 | +#define SECURITY_IMPERSONATION 2 |
| 4084 | +#define SECURITY_DELEGATION 3 |
| 4085 | + |
| 4086 | +/* SecurityFlags */ |
| 4087 | +#define SECURITY_CONTEXT_TRACKING 0x01 |
| 4088 | +#define SECURITY_EFFECTIVE_ONLY 0x02 |
| 4089 | + |
| 4090 | +/* |
| 4091 | + * Default PID value, used in all SMBs where the PID is not important |
| 4092 | + */ |
| 4093 | +#define CIFS_DFT_PID 0x1234 |
| 4094 | + |
| 4095 | +/* |
| 4096 | + * We use the same routine for Copy and Move SMBs. This flag is used to |
| 4097 | + * distinguish |
| 4098 | + */ |
| 4099 | +#define CIFS_COPY_OP 1 |
| 4100 | +#define CIFS_RENAME_OP 2 |
| 4101 | + |
| 4102 | +#define GETU16(var) (*((__u16 *)var)) /* BB check for endian issues */ |
| 4103 | +#define GETU32(var) (*((__u32 *)var)) /* BB check for endian issues */ |
| 4104 | + |
| 4105 | +#pragma pack(1) |
| 4106 | + |
| 4107 | +struct smb_hdr { |
| 4108 | + __u32 smb_buf_length; /* big endian on wire *//* BB length is only two or three bytes - with one or two byte type preceding it but that is always zero - we could mask the type byte off just in case BB */ |
| 4109 | + __u8 Protocol[4]; |
| 4110 | + __u8 Command; |
| 4111 | + union { |
| 4112 | + struct { |
| 4113 | + __u8 ErrorClass; |
| 4114 | + __u8 Reserved; |
| 4115 | + __u16 Error; /* note: treated as little endian (le) on wire */ |
| 4116 | + } DosError; |
| 4117 | + __u32 CifsError; /* note: le */ |
| 4118 | + } Status; |
| 4119 | + __u8 Flags; |
| 4120 | + __u16 Flags2; /* note: le */ |
| 4121 | + __u16 PidHigh; /* note: le */ |
| 4122 | + union { |
| 4123 | + struct { |
| 4124 | + __u32 SequenceNumber; /* le */ |
| 4125 | + __u32 Reserved; /* zero */ |
| 4126 | + } Sequence; |
| 4127 | + __u8 SecuritySignature[8]; /* le */ |
| 4128 | + } Signature; |
| 4129 | + __u8 pad[2]; |
| 4130 | + __u16 Tid; |
| 4131 | + __u16 Pid; /* note: le */ |
| 4132 | + __u16 Uid; |
| 4133 | + __u16 Mid; |
| 4134 | + __u8 WordCount; |
| 4135 | +}; |
| 4136 | +/* given a pointer to an smb_hdr retrieve the value of byte count */ |
| 4137 | +#define BCC(smb_var) ( *(__u16 *)((char *)smb_var + sizeof(struct smb_hdr) + (2* smb_var->WordCount) ) ) |
| 4138 | + |
| 4139 | +/* given a pointer to an smb_hdr retrieve the pointer to the byte area */ |
| 4140 | +#define pByteArea(smb_var) ((char *)smb_var + sizeof(struct smb_hdr) + (2* smb_var->WordCount) + 2 ) |
| 4141 | + |
| 4142 | +/* |
| 4143 | + * Computer Name Length |
| 4144 | + */ |
| 4145 | +#define CNLEN 15 |
| 4146 | + |
| 4147 | +/* |
| 4148 | + * Share Name Length @S8A |
| 4149 | + * Note: This length is limited by the SMB used to get @S8A |
| 4150 | + * the Share info. NetShareEnum only returns 13 @S8A |
| 4151 | + * chars, including the null termination. @S8A |
| 4152 | + */ |
| 4153 | +#define SNLEN 12 /*@S8A */ |
| 4154 | + |
| 4155 | +/* |
| 4156 | + * Comment Length |
| 4157 | + */ |
| 4158 | +#define MAXCOMMENTLEN 40 |
| 4159 | + |
| 4160 | +/* |
| 4161 | + * The OS/2 maximum path name |
| 4162 | + */ |
| 4163 | +#define MAX_PATHCONF 256 |
| 4164 | + |
| 4165 | +/* |
| 4166 | + * SMB frame definitions (following must be packed structs) |
| 4167 | + * See the SNIA CIFS Specification for details. |
| 4168 | + * |
| 4169 | + * The Naming convention is the lower case version of the |
| 4170 | + * smb command code name for the struct and this is typedef to the |
| 4171 | + * uppercase version of the same name with the prefix SMB_ removed |
| 4172 | + * for brevity. Although typedefs are not commonly used for |
| 4173 | + * structure definitions in the Linux kernel, their use in the |
| 4174 | + * CIFS standards document, which this code is based on, may |
| 4175 | + * make this one of the cases where typedefs for structures make |
| 4176 | + * sense to improve readability for readers of the standards doc. |
| 4177 | + * Typedefs can always be removed later if they are too distracting |
| 4178 | + * and they are only used for the CIFSs PDUs themselves, not |
| 4179 | + * internal cifs vfs structures |
| 4180 | + * |
| 4181 | + */ |
| 4182 | + |
| 4183 | +typedef struct negotiate_req { |
| 4184 | + struct smb_hdr hdr; /* wct = 0 */ |
| 4185 | + __u16 ByteCount; |
| 4186 | + unsigned char DialectsArray[1]; |
| 4187 | +} NEGOTIATE_REQ; |
| 4188 | + |
| 4189 | +typedef struct negotiate_rsp { |
| 4190 | + struct smb_hdr hdr; /* wct = 17 */ |
| 4191 | + __u16 DialectIndex; |
| 4192 | + __u8 SecurityMode; |
| 4193 | + __u16 MaxMpxCount; |
| 4194 | + __u16 MaxNumberVcs; |
| 4195 | + __u32 MaxBufferSize; |
| 4196 | + __u32 MaxRawSize; |
| 4197 | + __u32 SessionKey; |
| 4198 | + __u32 Capabilities; /* see below */ |
| 4199 | + __u32 SystemTimeLow; |
| 4200 | + __u32 SystemTimeHigh; |
| 4201 | + __u16 ServerTimeZone; |
| 4202 | + __u8 EncryptionKeyLength; |
| 4203 | + __u16 ByteCount; |
| 4204 | + union { |
| 4205 | + unsigned char EncryptionKey[1]; /* if cap extended security is off */ |
| 4206 | + /* followed by Domain name - if extended security is off */ |
| 4207 | + /* followed by 16 bytes of server GUID */ |
| 4208 | + /* followed by security blob if cap_extended_security negotiated */ |
| 4209 | + struct { |
| 4210 | + unsigned char GUID[16]; |
| 4211 | + unsigned char SecurityBlob[1]; |
| 4212 | + } extended_response; |
| 4213 | + } u; |
| 4214 | +} NEGOTIATE_RSP; |
| 4215 | + |
| 4216 | +/* SecurityMode bits */ |
| 4217 | +#define SECMODE_USER 0x01 /* off indicates share level security */ |
| 4218 | +#define SECMODE_PW_ENCRYPT 0x02 |
| 4219 | +#define SECMODE_SIGN_ENABLED 0x04 /* SMB security signatures enabled */ |
| 4220 | +#define SECMODE_SIGN_REQUIRED 0x08 /* SMB security signatures required */ |
| 4221 | + |
| 4222 | +/* Negotiate response Capabilities */ |
| 4223 | +#define CAP_RAW_MODE 0x00000001 |
| 4224 | +#define CAP_MPX_MODE 0x00000002 |
| 4225 | +#define CAP_UNICODE 0x00000004 |
| 4226 | +#define CAP_LARGE_FILES 0x00000008 |
| 4227 | +#define CAP_NT_SMBS 0x00000010 /* implies CAP_NT_FIND */ |
| 4228 | +#define CAP_RPC_REMOTE_APIS 0x00000020 |
| 4229 | +#define CAP_STATUS32 0x00000040 |
| 4230 | +#define CAP_LEVEL_II_OPLOCKS 0x00000080 |
| 4231 | +#define CAP_LOCK_AND_READ 0x00000100 |
| 4232 | +#define CAP_NT_FIND 0x00000200 |
| 4233 | +#define CAP_DFS 0x00001000 |
| 4234 | +#define CAP_INFOLEVEL_PASSTHRU 0x00002000 |
| 4235 | +#define CAP_LARGE_READ_X 0x00004000 |
| 4236 | +#define CAP_LARGE_WRITE_X 0x00008000 |
| 4237 | +#define CAP_UNIX 0x00800000 |
| 4238 | +#define CAP_RESERVED 0x02000000 |
| 4239 | +#define CAP_BULK_TRANSFER 0x20000000 |
| 4240 | +#define CAP_COMPRESSED_DATA 0x40000000 |
| 4241 | +#define CAP_EXTENDED_SECURITY 0x80000000 |
| 4242 | + |
| 4243 | +typedef union smb_com_session_setup_andx { |
| 4244 | + struct { /* request format */ |
| 4245 | + struct smb_hdr hdr; /* wct = 12 */ |
| 4246 | + __u8 AndXCommand; |
| 4247 | + __u8 AndXReserved; |
| 4248 | + __u16 AndXOffset; |
| 4249 | + __u16 MaxBufferSize; |
| 4250 | + __u16 MaxMpxCount; |
| 4251 | + __u16 VcNumber; |
| 4252 | + __u32 SessionKey; |
| 4253 | + __u16 SecurityBlobLength; |
| 4254 | + __u32 Reserved; |
| 4255 | + __u32 Capabilities; /* see below */ |
| 4256 | + __u16 ByteCount; |
| 4257 | + unsigned char SecurityBlob[1]; /* followed by */ |
| 4258 | + /* STRING NativeOS */ |
| 4259 | + /* STRING NativeLanMan */ |
| 4260 | + } req; /* NTLM request format (with extended security */ |
| 4261 | + |
| 4262 | + struct { /* request format */ |
| 4263 | + struct smb_hdr hdr; /* wct = 13 */ |
| 4264 | + __u8 AndXCommand; |
| 4265 | + __u8 AndXReserved; |
| 4266 | + __u16 AndXOffset; |
| 4267 | + __u16 MaxBufferSize; |
| 4268 | + __u16 MaxMpxCount; |
| 4269 | + __u16 VcNumber; |
| 4270 | + __u32 SessionKey; |
| 4271 | + __u16 CaseInsensitivePasswordLength; /* ASCII password length */ |
| 4272 | + __u16 CaseSensitivePasswordLength; /* Unicode password length */ |
| 4273 | + __u32 Reserved; /* see below */ |
| 4274 | + __u32 Capabilities; |
| 4275 | + __u16 ByteCount; |
| 4276 | + unsigned char CaseInsensitivePassword[1]; /* followed by: */ |
| 4277 | + /* unsigned char * CaseSensitivePassword; */ |
| 4278 | + /* STRING AccountName */ |
| 4279 | + /* STRING PrimaryDomain */ |
| 4280 | + /* STRING NativeOS */ |
| 4281 | + /* STRING NativeLanMan */ |
| 4282 | + } req_no_secext; /* NTLM request format (without extended security */ |
| 4283 | + |
| 4284 | + struct { /* default (NTLM) response format */ |
| 4285 | + struct smb_hdr hdr; /* wct = 4 */ |
| 4286 | + __u8 AndXCommand; |
| 4287 | + __u8 AndXReserved; |
| 4288 | + __u16 AndXOffset; |
| 4289 | + __u16 Action; /* see below */ |
| 4290 | + __u16 SecurityBlobLength; |
| 4291 | + __u16 ByteCount; |
| 4292 | + unsigned char SecurityBlob[1]; /* followed by */ |
| 4293 | +/* unsigned char * NativeOS; */ |
| 4294 | +/* unsigned char * NativeLanMan; */ |
| 4295 | +/* unsigned char * PrimaryDomain; */ |
| 4296 | + } resp; /* NTLM response format (with or without extended security */ |
| 4297 | + |
| 4298 | + struct { /* request format */ |
| 4299 | + struct smb_hdr hdr; /* wct = 10 */ |
| 4300 | + __u8 AndXCommand; |
| 4301 | + __u8 AndXReserved; |
| 4302 | + __u16 AndXOffset; |
| 4303 | + __u16 MaxBufferSize; |
| 4304 | + __u16 MaxMpxCount; |
| 4305 | + __u16 VcNumber; |
| 4306 | + __u32 SessionKey; |
| 4307 | + __u16 PassswordLength; |
| 4308 | + __u32 Reserved; |
| 4309 | + __u16 ByteCount; |
| 4310 | + unsigned char AccountPassword[1]; /* followed by */ |
| 4311 | + /* STRING AccountName */ |
| 4312 | + /* STRING PrimaryDomain */ |
| 4313 | + /* STRING NativeOS */ |
| 4314 | + /* STRING NativeLanMan */ |
| 4315 | + } old_req; /* pre-NTLM (LANMAN2.1) request format */ |
| 4316 | + |
| 4317 | + struct { /* default (NTLM) response format */ |
| 4318 | + struct smb_hdr hdr; /* wct = 3 */ |
| 4319 | + __u8 AndXCommand; |
| 4320 | + __u8 AndXReserved; |
| 4321 | + __u16 AndXOffset; |
| 4322 | + __u16 Action; /* see below */ |
| 4323 | + __u16 ByteCount; |
| 4324 | + unsigned char NativeOS[1]; /* followed by */ |
| 4325 | +/* unsigned char * NativeLanMan; */ |
| 4326 | +/* unsigned char * PrimaryDomain; */ |
| 4327 | + } old_resp; /* pre-NTLM (LANMAN2.1) response format */ |
| 4328 | +} SESSION_SETUP_ANDX; |
| 4329 | + |
| 4330 | +#define CIFS_NETWORK_OPSYS "CIFS VFS Client for Linux" |
| 4331 | + |
| 4332 | +/* Capabilities bits (for NTLM SessSetup request) */ |
| 4333 | +#define CAP_UNICODE 0x00000004 |
| 4334 | +#define CAP_LARGE_FILES 0x00000008 |
| 4335 | +#define CAP_NT_SMBS 0x00000010 |
| 4336 | +#define CAP_STATUS32 0x00000040 |
| 4337 | +#define CAP_LEVEL_II_OPLOCKS 0x00000080 |
| 4338 | +#define CAP_NT_FIND 0x00000200 /* reserved should be zero (presumably because NT_SMBs implies the same thing) */ |
| 4339 | +#define CAP_BULK_TRANSFER 0x20000000 |
| 4340 | +#define CAP_EXTENDED_SECURITY 0x80000000 |
| 4341 | + |
| 4342 | +/* Action bits */ |
| 4343 | +#define GUEST_LOGIN 1 |
| 4344 | + |
| 4345 | +typedef struct smb_com_tconx_req { |
| 4346 | + struct smb_hdr hdr; /* wct = 4 */ |
| 4347 | + __u8 AndXCommand; |
| 4348 | + __u8 AndXReserved; |
| 4349 | + __u16 AndXOffset; |
| 4350 | + __u16 Flags; /* see below */ |
| 4351 | + __u16 PasswordLength; |
| 4352 | + __u16 ByteCount; |
| 4353 | + unsigned char Password[1]; /* followed by */ |
| 4354 | +/* STRING Path *//* \\server\share name */ |
| 4355 | + /* STRING Service */ |
| 4356 | +} TCONX_REQ; |
| 4357 | + |
| 4358 | +typedef struct smb_com_tconx_rsp { |
| 4359 | + struct smb_hdr hdr; /* wct = 3 *//* note that Win2000 has sent wct=7 in some cases on responses. Four unspecified words followed OptionalSupport */ |
| 4360 | + __u8 AndXCommand; |
| 4361 | + __u8 AndXReserved; |
| 4362 | + __u16 AndXOffset; |
| 4363 | + __u16 OptionalSupport; /* see below */ |
| 4364 | + __u16 ByteCount; |
| 4365 | + unsigned char Service[1]; /* always ASCII, not Unicode */ |
| 4366 | + /* STRING NativeFileSystem */ |
| 4367 | +} TCONX_RSP; |
| 4368 | + |
| 4369 | +/* tree connect Flags */ |
| 4370 | +#define DISCONNECT_TID 0x0001 |
| 4371 | +#define TCON_EXTENDED_SECINFO 0x0008 |
| 4372 | +/* OptionalSupport bits */ |
| 4373 | +#define SMB_SUPPORT_SEARCH_BITS 0x0001 /* must have bits (exclusive searches suppt. */ |
| 4374 | +#define SMB_SHARE_IS_IN_DFS 0x0002 |
| 4375 | + |
| 4376 | +typedef struct smb_com_logoff_andx_req { |
| 4377 | + |
| 4378 | + struct smb_hdr hdr; /* wct = 2 */ |
| 4379 | + __u8 AndXCommand; |
| 4380 | + __u8 AndXReserved; |
| 4381 | + __u16 AndXOffset; |
| 4382 | + __u16 ByteCount; |
| 4383 | +} LOGOFF_ANDX_REQ; |
| 4384 | + |
| 4385 | +typedef struct smb_com_logoff_andx_rsp { |
| 4386 | + struct smb_hdr hdr; /* wct = 2 */ |
| 4387 | + __u8 AndXCommand; |
| 4388 | + __u8 AndXReserved; |
| 4389 | + __u16 AndXOffset; |
| 4390 | + __u16 ByteCount; |
| 4391 | +} LOGOFF_ANDX_RSP; |
| 4392 | + |
| 4393 | +typedef union smb_com_tree_disconnect { /* as an altetnative can use flag on tree_connect PDU to effect disconnect *//* probably the simplest SMB PDU */ |
| 4394 | + struct { |
| 4395 | + struct smb_hdr hdr; /* wct = 0 */ |
| 4396 | + __u16 ByteCount; /* bcc = 0 */ |
| 4397 | + } req; |
| 4398 | + struct { |
| 4399 | + struct smb_hdr hdr; /* wct = 0 */ |
| 4400 | + __u16 ByteCount; /* bcc = 0 */ |
| 4401 | + } resp; |
| 4402 | +} TREE_DISCONNECT; |
| 4403 | + |
| 4404 | +typedef struct smb_com_close_req { |
| 4405 | + struct smb_hdr hdr; /* wct = 3 */ |
| 4406 | + __u16 FileID; |
| 4407 | + __u32 LastWriteTime; /* should be zero */ |
| 4408 | + __u16 ByteCount; /* 0 */ |
| 4409 | +} CLOSE_REQ; |
| 4410 | + |
| 4411 | +typedef struct smb_com_close_rsp { |
| 4412 | + struct smb_hdr hdr; /* wct = 0 */ |
| 4413 | + __u16 ByteCount; /* bct = 0 */ |
| 4414 | +} CLOSE_RSP; |
| 4415 | + |
| 4416 | +typedef struct smb_com_findclose_req { |
| 4417 | + struct smb_hdr hdr; /* wct = 1 */ |
| 4418 | + __u16 FileID; |
| 4419 | + __u16 ByteCount; /* 0 */ |
| 4420 | +} FINDCLOSE_REQ; |
| 4421 | + |
| 4422 | +/* OpenFlags */ |
| 4423 | +#define REQ_OPLOCK 0x00000002 |
| 4424 | +#define REQ_BATCHOPLOCK 0x00000004 |
| 4425 | +#define REQ_OPENDIRONLY 0x00000008 |
| 4426 | + |
| 4427 | +typedef struct smb_com_open_req { /* also handles create */ |
| 4428 | + struct smb_hdr hdr; /* wct = 24 */ |
| 4429 | + __u8 AndXCommand; |
| 4430 | + __u8 AndXReserved; |
| 4431 | + __u16 AndXOffset; |
| 4432 | + __u8 Reserved; /* Must Be Zero */ |
| 4433 | + __u16 NameLength; |
| 4434 | + __u32 OpenFlags; |
| 4435 | + __u32 RootDirectoryFid; |
| 4436 | + __u32 DesiredAccess; |
| 4437 | + __u64 AllocationSize; |
| 4438 | + __u32 FileAttributes; |
| 4439 | + __u32 ShareAccess; |
| 4440 | + __u32 CreateDisposition; |
| 4441 | + __u32 CreateOptions; |
| 4442 | + __u32 ImpersonationLevel; |
| 4443 | + __u8 SecurityFlags; |
| 4444 | + __u16 ByteCount; |
| 4445 | + char fileName[1]; |
| 4446 | +} OPEN_REQ; |
| 4447 | + |
| 4448 | +/* open response: oplock levels */ |
| 4449 | +#define OPLOCK_NONE 0 |
| 4450 | +#define OPLOCK_EXCLUSIVE 1 |
| 4451 | +#define OPLOCK_BATCH 2 |
| 4452 | +#define OPLOCK_READ 3 /* level 2 oplock */ |
| 4453 | + |
| 4454 | +/* open response for CreateAction shifted left */ |
| 4455 | +#define CIFS_CREATE_ACTION 0x20000 /* file created */ |
| 4456 | + |
| 4457 | +typedef struct smb_com_open_rsp { |
| 4458 | + struct smb_hdr hdr; /* wct = 34 BB */ |
| 4459 | + __u8 AndXCommand; |
| 4460 | + __u8 AndXReserved; |
| 4461 | + __u16 AndXOffset; |
| 4462 | + __u8 OplockLevel; |
| 4463 | + __u16 Fid; |
| 4464 | + __u32 CreateAction; |
| 4465 | + __u64 CreationTime; |
| 4466 | + __u64 LastAccessTime; |
| 4467 | + __u64 LastWriteTime; |
| 4468 | + __u64 ChangeTime; |
| 4469 | + __u32 FileAttributes; |
| 4470 | + __u64 AllocationSize; |
| 4471 | + __u64 EndOfFile; |
| 4472 | + __u16 FileType; |
| 4473 | + __u16 DeviceState; |
| 4474 | + __u8 DirectoryFlag; |
| 4475 | + __u16 ByteCount; /* bct = 0 */ |
| 4476 | +} OPEN_RSP; |
| 4477 | + |
| 4478 | +typedef struct smb_com_write_req { |
| 4479 | + struct smb_hdr hdr; /* wct = 14 */ |
| 4480 | + __u8 AndXCommand; |
| 4481 | + __u8 AndXReserved; |
| 4482 | + __u16 AndXOffset; |
| 4483 | + __u16 Fid; |
| 4484 | + __u32 OffsetLow; |
| 4485 | + __u32 Reserved; |
| 4486 | + __u16 WriteMode; |
| 4487 | + __u16 Remaining; |
| 4488 | + __u16 DataLengthHigh; |
| 4489 | + __u16 DataLengthLow; |
| 4490 | + __u16 DataOffset; |
| 4491 | + __u32 OffsetHigh; |
| 4492 | + __u16 ByteCount; |
| 4493 | + __u8 Pad; /* BB check for whether padded to DWORD boundary and optimum performance here */ |
| 4494 | + char Data[1]; |
| 4495 | +} WRITE_REQ; |
| 4496 | + |
| 4497 | +typedef struct smb_com_write_rsp { |
| 4498 | + struct smb_hdr hdr; /* wct = 6 */ |
| 4499 | + __u8 AndXCommand; |
| 4500 | + __u8 AndXReserved; |
| 4501 | + __u16 AndXOffset; |
| 4502 | + __u16 Count; |
| 4503 | + __u16 Remaining; |
| 4504 | + __u32 Reserved; |
| 4505 | + __u16 ByteCount; |
| 4506 | +} WRITE_RSP; |
| 4507 | + |
| 4508 | +typedef struct smb_com_read_req { |
| 4509 | + struct smb_hdr hdr; /* wct = 12 */ |
| 4510 | + __u8 AndXCommand; |
| 4511 | + __u8 AndXReserved; |
| 4512 | + __u16 AndXOffset; |
| 4513 | + __u16 Fid; |
| 4514 | + __u32 OffsetLow; |
| 4515 | + __u16 MaxCount; |
| 4516 | + __u16 MinCount; /* obsolete */ |
| 4517 | + __u32 MaxCountHigh; |
| 4518 | + __u16 Remaining; |
| 4519 | + __u32 OffsetHigh; |
| 4520 | + __u16 ByteCount; |
| 4521 | +} READ_REQ; |
| 4522 | + |
| 4523 | +typedef struct smb_com_read_rsp { |
| 4524 | + struct smb_hdr hdr; /* wct = 12 */ |
| 4525 | + __u8 AndXCommand; |
| 4526 | + __u8 AndXReserved; |
| 4527 | + __u16 AndXOffset; |
| 4528 | + __u16 Remaining; |
| 4529 | + __u16 DataCompactionMode; |
| 4530 | + __u16 Reserved; |
| 4531 | + __u16 DataLength; |
| 4532 | + __u16 DataOffset; |
| 4533 | + __u16 DataLengthHigh; |
| 4534 | + __u64 Reserved2; |
| 4535 | + __u16 ByteCount; |
| 4536 | + __u8 Pad; /* BB check for whether padded to DWORD boundary and optimum performance here */ |
| 4537 | + char Data[1]; |
| 4538 | +} READ_RSP; |
| 4539 | + |
| 4540 | +typedef struct locking_andx_range { |
| 4541 | + __u16 Pid; |
| 4542 | + __u16 Pad; |
| 4543 | + __u32 OffsetHigh; |
| 4544 | + __u32 OffsetLow; |
| 4545 | + __u32 LengthHigh; |
| 4546 | + __u32 LengthLow; |
| 4547 | +} LOCKING_ANDX_RANGE; |
| 4548 | + |
| 4549 | +#define LOCKING_ANDX_SHARED_LOCK 0x01 |
| 4550 | +#define LOCKING_ANDX_OPLOCK_RELEASE 0x02 |
| 4551 | +#define LOCKING_ANDX_CHANGE_LOCKTYPE 0x04 |
| 4552 | +#define LOCKING_ANDX_CANCEL_LOCK 0x08 |
| 4553 | +#define LOCKING_ANDX_LARGE_FILES 0x10 /* always on for us */ |
| 4554 | + |
| 4555 | +typedef struct smb_com_lock_req { |
| 4556 | + struct smb_hdr hdr; /* wct = 8 */ |
| 4557 | + __u8 AndXCommand; |
| 4558 | + __u8 AndXReserved; |
| 4559 | + __u16 AndXOffset; |
| 4560 | + __u16 Fid; |
| 4561 | + __u8 LockType; |
| 4562 | + __u8 OplockLevel; |
| 4563 | + __u32 Timeout; |
| 4564 | + __u16 NumberOfUnlocks; |
| 4565 | + __u16 NumberOfLocks; |
| 4566 | + __u16 ByteCount; |
| 4567 | + LOCKING_ANDX_RANGE Locks[1]; |
| 4568 | +} LOCK_REQ; |
| 4569 | + |
| 4570 | +typedef struct smb_com_lock_rsp { |
| 4571 | + struct smb_hdr hdr; /* wct = 2 */ |
| 4572 | + __u8 AndXCommand; |
| 4573 | + __u8 AndXReserved; |
| 4574 | + __u16 AndXOffset; |
| 4575 | + __u16 ByteCount; |
| 4576 | +} LOCK_RSP; |
| 4577 | + |
| 4578 | +typedef struct smb_com_rename_req { |
| 4579 | + struct smb_hdr hdr; /* wct = 1 */ |
| 4580 | + __u16 SearchAttributes; /* target file attributes */ |
| 4581 | + __u16 ByteCount; |
| 4582 | + __u8 BufferFormat; /* 4 = ASCII or Unicode */ |
| 4583 | + unsigned char OldFileName[1]; |
| 4584 | + /* followed by __u8 BufferFormat2 */ |
| 4585 | + /* followed by NewFileName */ |
| 4586 | +} RENAME_REQ; |
| 4587 | + |
| 4588 | + /* copy request flags */ |
| 4589 | +#define COPY_MUST_BE_FILE 0x0001 |
| 4590 | +#define COPY_MUST_BE_DIR 0x0002 |
| 4591 | +#define COPY_TARGET_MODE_ASCII 0x0004 /* if not set, binary */ |
| 4592 | +#define COPY_SOURCE_MODE_ASCII 0x0008 /* if not set, binary */ |
| 4593 | +#define COPY_VERIFY_WRITES 0x0010 |
| 4594 | +#define COPY_TREE 0x0020 |
| 4595 | + |
| 4596 | +typedef struct smb_com_copy_req { |
| 4597 | + struct smb_hdr hdr; /* wct = 3 */ |
| 4598 | + __u16 Tid2; |
| 4599 | + __u16 OpenFunction; |
| 4600 | + __u16 Flags; |
| 4601 | + __u16 ByteCount; |
| 4602 | + __u8 BufferFormat; /* 4 = ASCII or Unicode */ |
| 4603 | + unsigned char OldFileName[1]; |
| 4604 | + /* followed by __u8 BufferFormat2 */ |
| 4605 | + /* followed by NewFileName string */ |
| 4606 | +} COPY_REQ; |
| 4607 | + |
| 4608 | +typedef struct smb_com_copy_rsp { |
| 4609 | + struct smb_hdr hdr; /* wct = 1 */ |
| 4610 | + __u16 CopyCount; /* number of files copied */ |
| 4611 | + __u16 ByteCount; /* may be zero */ |
| 4612 | + __u8 BufferFormat; /* 0x04 - only present if errored file follows */ |
| 4613 | + unsigned char ErrorFileName[1]; /* only present if error in copy */ |
| 4614 | +} COPY_RSP; |
| 4615 | + |
| 4616 | +#define CREATE_HARD_LINK 0x103 |
| 4617 | +#define MOVEFILE_COPY_ALLOWED 0x0002 |
| 4618 | +#define MOVEFILE_REPLACE_EXISTING 0x0001 |
| 4619 | + |
| 4620 | +typedef struct smb_com_nt_rename_req { /* A5 - also used for create hardlink */ |
| 4621 | + struct smb_hdr hdr; /* wct = 4 */ |
| 4622 | + __u16 SearchAttributes; /* target file attributes */ |
| 4623 | + __u16 Flags; /* spec says Information Level */ |
| 4624 | + __u32 ClusterCount; |
| 4625 | + __u16 ByteCount; |
| 4626 | + __u8 BufferFormat; /* 4 = ASCII or Unicode */ |
| 4627 | + unsigned char OldFileName[1]; |
| 4628 | + /* followed by __u8 BufferFormat2 */ |
| 4629 | + /* followed by NewFileName */ |
| 4630 | +} NT_RENAME_REQ; |
| 4631 | + |
| 4632 | +typedef struct smb_com_rename_rsp { |
| 4633 | + struct smb_hdr hdr; /* wct = 0 */ |
| 4634 | + __u16 ByteCount; /* bct = 0 */ |
| 4635 | +} RENAME_RSP; |
| 4636 | + |
| 4637 | +typedef struct smb_com_delete_file_req { |
| 4638 | + struct smb_hdr hdr; /* wct = 1 */ |
| 4639 | + __u16 SearchAttributes; |
| 4640 | + __u16 ByteCount; |
| 4641 | + __u8 BufferFormat; /* 4 = ASCII */ |
| 4642 | + unsigned char fileName[1]; |
| 4643 | +} DELETE_FILE_REQ; |
| 4644 | + |
| 4645 | +typedef struct smb_com_delete_file_rsp { |
| 4646 | + struct smb_hdr hdr; /* wct = 0 */ |
| 4647 | + __u16 ByteCount; /* bct = 0 */ |
| 4648 | +} DELETE_FILE_RSP; |
| 4649 | + |
| 4650 | +typedef struct smb_com_delete_directory_req { |
| 4651 | + struct smb_hdr hdr; /* wct = 0 */ |
| 4652 | + __u16 ByteCount; |
| 4653 | + __u8 BufferFormat; /* 4 = ASCII */ |
| 4654 | + unsigned char DirName[1]; |
| 4655 | +} DELETE_DIRECTORY_REQ; |
| 4656 | + |
| 4657 | +typedef struct smb_com_delete_directory_rsp { |
| 4658 | + struct smb_hdr hdr; /* wct = 0 */ |
| 4659 | + __u16 ByteCount; /* bct = 0 */ |
| 4660 | +} DELETE_DIRECTORY_RSP; |
| 4661 | + |
| 4662 | +typedef struct smb_com_create_directory_req { |
| 4663 | + struct smb_hdr hdr; /* wct = 0 */ |
| 4664 | + __u16 ByteCount; |
| 4665 | + __u8 BufferFormat; /* 4 = ASCII */ |
| 4666 | + unsigned char DirName[1]; |
| 4667 | +} CREATE_DIRECTORY_REQ; |
| 4668 | + |
| 4669 | +typedef struct smb_com_create_directory_rsp { |
| 4670 | + struct smb_hdr hdr; /* wct = 0 */ |
| 4671 | + __u16 ByteCount; /* bct = 0 */ |
| 4672 | +} CREATE_DIRECTORY_RSP; |
| 4673 | + |
| 4674 | +/***************************************************/ |
| 4675 | +/* NT Transact structure defintions follow */ |
| 4676 | +/* Currently only ioctl and notify are implemented */ |
| 4677 | +/***************************************************/ |
| 4678 | +typedef struct smb_com_transaction_ioctl_req { |
| 4679 | + struct smb_hdr hdr; /* wct = 23 */ |
| 4680 | + __u8 MaxSetupCount; |
| 4681 | + __u16 Reserved; |
| 4682 | + __u32 TotalParameterCount; |
| 4683 | + __u32 TotalDataCount; |
| 4684 | + __u32 MaxParameterCount; |
| 4685 | + __u32 MaxDataCount; |
| 4686 | + __u32 ParameterCount; |
| 4687 | + __u32 ParameterOffset; |
| 4688 | + __u32 DataCount; |
| 4689 | + __u32 DataOffset; |
| 4690 | + __u8 SetupCount; /* four setup words follow subcommand */ |
| 4691 | + /* SNIA spec incorrectly included spurious pad here */ |
| 4692 | + __u16 SubCommand;/* 2 = IOCTL/FSCTL */ |
| 4693 | + __u32 FunctionCode; |
| 4694 | + __u16 Fid; |
| 4695 | + __u8 IsFsctl; /* 1 = File System Control, 0 = device control (IOCTL)*/ |
| 4696 | + __u8 IsRootFlag; /* 1 = apply command to root of share (must be DFS share)*/ |
| 4697 | + __u16 ByteCount; |
| 4698 | + __u8 Pad[3]; |
| 4699 | + __u8 Data[1]; |
| 4700 | +} TRANSACT_IOCTL_REQ; |
| 4701 | + |
| 4702 | +typedef struct smb_com_transaction_ioctl_rsp { |
| 4703 | + struct smb_hdr hdr; /* wct = 19 */ |
| 4704 | + __u8 Reserved[3]; |
| 4705 | + __u32 TotalParameterCount; |
| 4706 | + __u32 TotalDataCount; |
| 4707 | + __u32 ParameterCount; |
| 4708 | + __u32 ParameterOffset; |
| 4709 | + __u32 ParameterDisplacement; |
| 4710 | + __u32 DataCount; |
| 4711 | + __u32 DataOffset; |
| 4712 | + __u32 DataDisplacement; |
| 4713 | + __u8 SetupCount; /* 1 */ |
| 4714 | + __u16 ReturnedDataLen; |
| 4715 | + __u16 ByteCount; |
| 4716 | + __u8 Pad[3]; |
| 4717 | +} TRANSACT_IOCTL_RSP; |
| 4718 | + |
| 4719 | +typedef struct smb_com_transaction_change_notify_req { |
| 4720 | + struct smb_hdr hdr; /* wct = 23 */ |
| 4721 | + __u8 MaxSetupCount; |
| 4722 | + __u16 Reserved; |
| 4723 | + __u32 TotalParameterCount; |
| 4724 | + __u32 TotalDataCount; |
| 4725 | + __u32 MaxParameterCount; |
| 4726 | + __u32 MaxDataCount; |
| 4727 | + __u32 ParameterCount; |
| 4728 | + __u32 ParameterOffset; |
| 4729 | + __u32 DataCount; |
| 4730 | + __u32 DataOffset; |
| 4731 | + __u8 SetupCount; /* four setup words follow subcommand */ |
| 4732 | + /* SNIA spec incorrectly included spurious pad here */ |
| 4733 | + __u16 SubCommand;/* 4 = Change Notify */ |
| 4734 | + __u32 CompletionFilter; /* operation to monitor */ |
| 4735 | + __u16 Fid; |
| 4736 | + __u8 WatchTree; /* 1 = Monitor subdirectories */ |
| 4737 | + __u8 Reserved2; |
| 4738 | + __u16 ByteCount; |
| 4739 | +/* __u8 Pad[3];*/ |
| 4740 | +/* __u8 Data[1];*/ |
| 4741 | +} TRANSACT_CHANGE_NOTIFY_REQ; |
| 4742 | + |
| 4743 | +typedef struct smb_com_transaction_change_notify_rsp { |
| 4744 | + struct smb_hdr hdr; /* wct = 18 */ |
| 4745 | + __u8 Reserved[3]; |
| 4746 | + __u32 TotalParameterCount; |
| 4747 | + __u32 TotalDataCount; |
| 4748 | + __u32 ParameterCount; |
| 4749 | + __u32 ParameterOffset; |
| 4750 | + __u32 ParameterDisplacement; |
| 4751 | + __u32 DataCount; |
| 4752 | + __u32 DataOffset; |
| 4753 | + __u32 DataDisplacement; |
| 4754 | + __u8 SetupCount; /* 0 */ |
| 4755 | + __u16 ByteCount; |
| 4756 | + /* __u8 Pad[3]; */ |
| 4757 | +} TRANSACT_CHANGE_NOTIFY_RSP; |
| 4758 | +/* Completion Filter flags for Notify */ |
| 4759 | +#define FILE_NOTIFY_CHANGE_FILE_NAME 0x00000001 |
| 4760 | +#define FILE_NOTIFY_CHANGE_DIR_NAME 0x00000002 |
| 4761 | +#define FILE_NOTIFY_CHANGE_NAME 0x00000003 |
| 4762 | +#define FILE_NOTIFY_CHANGE_ATTRIBUTES 0x00000004 |
| 4763 | +#define FILE_NOTIFY_CHANGE_SIZE 0x00000008 |
| 4764 | +#define FILE_NOTIFY_CHANGE_LAST_WRITE 0x00000010 |
| 4765 | +#define FILE_NOTIFY_CHANGE_LAST_ACCESS 0x00000020 |
| 4766 | +#define FILE_NOTIFY_CHANGE_CREATION 0x00000040 |
| 4767 | +#define FILE_NOTIFY_CHANGE_EA 0x00000080 |
| 4768 | +#define FILE_NOTIFY_CHANGE_SECURITY 0x00000100 |
| 4769 | +#define FILE_NOTIFY_CHANGE_STREAM_NAME 0x00000200 |
| 4770 | +#define FILE_NOTIFY_CHANGE_STREAM_SIZE 0x00000400 |
| 4771 | +#define FILE_NOTIFY_CHANGE_STREAM_WRITE 0x00000800 |
| 4772 | + |
| 4773 | +#define FILE_ACTION_ADDED 0x00000001 |
| 4774 | +#define FILE_ACTION_REMOVED 0x00000002 |
| 4775 | +#define FILE_ACTION_MODIFIED 0x00000003 |
| 4776 | +#define FILE_ACTION_RENAMED_OLD_NAME 0x00000004 |
| 4777 | +#define FILE_ACTION_RENAMED_NEW_NAME 0x00000005 |
| 4778 | +#define FILE_ACTION_ADDED_STREAM 0x00000006 |
| 4779 | +#define FILE_ACTION_REMOVED_STREAM 0x00000007 |
| 4780 | +#define FILE_ACTION_MODIFIED_STREAM 0x00000008 |
| 4781 | + |
| 4782 | +/* response contains array of the following structures */ |
| 4783 | +struct file_notify_information { |
| 4784 | + __u32 NextEntryOffset; |
| 4785 | + __u32 Action; |
| 4786 | + __u32 FileNameLength; |
| 4787 | + __u8 FileName[1]; |
| 4788 | +}; |
| 4789 | + |
| 4790 | +struct reparse_data { |
| 4791 | + __u32 ReparseTag; |
| 4792 | + __u16 ReparseDataLength; |
| 4793 | + __u16 Reserved; |
| 4794 | + __u16 AltNameOffset; |
| 4795 | + __u16 AltNameLen; |
| 4796 | + __u16 TargetNameOffset; |
| 4797 | + __u16 TargetNameLen; |
| 4798 | + char LinkNamesBuf[1]; |
| 4799 | +}; |
| 4800 | + |
| 4801 | +struct cifs_quota_data { |
| 4802 | + __u32 rsrvd1; /* 0 */ |
| 4803 | + __u32 sid_size; |
| 4804 | + __u64 rsrvd2; /* 0 */ |
| 4805 | + __u64 space_used; |
| 4806 | + __u64 soft_limit; |
| 4807 | + __u64 hard_limit; |
| 4808 | + char sid[1]; /* variable size? */ |
| 4809 | +}; |
| 4810 | + |
| 4811 | +/* quota sub commands */ |
| 4812 | +#define QUOTA_LIST_CONTINUE 0 |
| 4813 | +#define QUOTA_LIST_START 0x100 |
| 4814 | +#define QUOTA_FOR_SID 0x101 |
| 4815 | + |
| 4816 | +typedef union smb_com_transaction2 { |
| 4817 | + struct { |
| 4818 | + struct smb_hdr hdr; /* wct = 14+ */ |
| 4819 | + __u16 TotalParameterCount; |
| 4820 | + __u16 TotalDataCount; |
| 4821 | + __u16 MaxParameterCount; |
| 4822 | + __u16 MaxDataCount; |
| 4823 | + __u8 MaxSetupCount; |
| 4824 | + __u8 Reserved; |
| 4825 | + __u16 Flags; |
| 4826 | + __u32 Timeout; |
| 4827 | + __u16 Reserved2; |
| 4828 | + __u16 ParameterCount; |
| 4829 | + __u16 ParameterOffset; |
| 4830 | + __u16 DataCount; |
| 4831 | + __u16 DataOffset; |
| 4832 | + __u8 SetupCount; |
| 4833 | + __u8 Reserved3; |
| 4834 | + __u16 SubCommand; /* 1st setup word - can be followed by SetupCount words */ |
| 4835 | + __u16 ByteCount; /* careful - setupcount is not always one */ |
| 4836 | + } req; |
| 4837 | + struct { |
| 4838 | + struct smb_hdr hdr; /* wct = 0 */ |
| 4839 | + __u16 TotalParameterCount; |
| 4840 | + __u16 TotalDataCount; |
| 4841 | + __u16 Reserved; |
| 4842 | + __u16 ParameterCount; |
| 4843 | + __u16 ParamterOffset; |
| 4844 | + __u16 ParameterDisplacement; |
| 4845 | + __u16 DataCount; |
| 4846 | + __u16 DataOffset; |
| 4847 | + __u16 DataDisplacement; |
| 4848 | + __u8 SetupCount; |
| 4849 | + __u8 Reserved1; /* should be zero setup words following */ |
| 4850 | + __u16 ByteCount; |
| 4851 | + __u16 Reserved2; /* parameter word reserved - present for infolevels > 100 */ |
| 4852 | + /* data area follows */ |
| 4853 | + } resp; |
| 4854 | +} TRANSACTION2; |
| 4855 | + |
| 4856 | +/* PathInfo/FileInfo infolevels */ |
| 4857 | +#define SMB_INFO_STANDARD 1 |
| 4858 | +#define SMB_INFO_QUERY_EAS_FROM_LIST 3 |
| 4859 | +#define SMB_INFO_QUERY_ALL_EAS 4 |
| 4860 | +#define SMB_INFO_IS_NAME_VALID 6 |
| 4861 | +#define SMB_QUERY_FILE_BASIC_INFO 0x101 |
| 4862 | +#define SMB_QUERY_FILE_STANDARD_INFO 0x102 |
| 4863 | +#define SMB_QUERY_FILE_EA_INFO 0x103 |
| 4864 | +#define SMB_QUERY_FILE_NAME_INFO 0x104 |
| 4865 | +#define SMB_QUERY_FILE_ALLOCATION_INFO 0x105 |
| 4866 | +#define SMB_QUERY_FILE_END_OF_FILEINFO 0x106 |
| 4867 | +#define SMB_QUERY_FILE_ALL_INFO 0x107 |
| 4868 | +#define SMB_QUERY_ALT_NAME_INFO 0x108 |
| 4869 | +#define SMB_QUERY_FILE_STREAM_INFO 0x109 |
| 4870 | +#define SMB_QUERY_FILE_COMPRESSION_INFO 0x10B |
| 4871 | +#define SMB_QUERY_FILE_UNIX_BASIC 0x200 |
| 4872 | +#define SMB_QUERY_FILE_UNIX_LINK 0x201 |
| 4873 | + |
| 4874 | +#define SMB_SET_FILE_BASIC_INFO 0x101 |
| 4875 | +#define SMB_SET_FILE_DISPOSITION_INFO 0x102 |
| 4876 | +#define SMB_SET_FILE_ALLOCATION_INFO 0x103 |
| 4877 | +#define SMB_SET_FILE_END_OF_FILE_INFO 0x104 |
| 4878 | +#define SMB_SET_FILE_UNIX_BASIC 0x200 |
| 4879 | +#define SMB_SET_FILE_UNIX_LINK 0x201 |
| 4880 | +#define SMB_SET_FILE_UNIX_HLINK 0x203 |
| 4881 | +#define SMB_SET_FILE_BASIC_INFO2 0x3ec |
| 4882 | +#define SMB_SET_FILE_RENAME_INFORMATION 0x3f2 |
| 4883 | +#define SMB_FILE_ALL_INFO2 0x3fa |
| 4884 | +#define SMB_SET_FILE_ALLOCATION_INFO2 0x3fb |
| 4885 | +#define SMB_SET_FILE_END_OF_FILE_INFO2 0x3fc |
| 4886 | +#define SMB_FILE_MOVE_CLUSTER_INFO 0x407 |
| 4887 | +#define SMB_FILE_QUOTA_INFO 0x408 |
| 4888 | +#define SMB_FILE_REPARSEPOINT_INFO 0x409 |
| 4889 | +#define SMB_FILE_MAXIMUM_INFO 0x40d |
| 4890 | + |
| 4891 | +/* Find File infolevels */ |
| 4892 | +#define SMB_FIND_FILE_DIRECTORY_INFO 0x101 |
| 4893 | +#define SMB_FIND_FILE_FULL_DIRECTORY_INFO 0x102 |
| 4894 | +#define SMB_FIND_FILE_NAMES_INFO 0x103 |
| 4895 | +#define SMB_FIND_FILE_BOTH_DIRECTORY_INFO 0x104 |
| 4896 | +#define SMB_FIND_FILE_UNIX 0x202 |
| 4897 | + |
| 4898 | +typedef struct smb_com_transaction2_qpi_req { |
| 4899 | + struct smb_hdr hdr; /* wct = 14+ */ |
| 4900 | + __u16 TotalParameterCount; |
| 4901 | + __u16 TotalDataCount; |
| 4902 | + __u16 MaxParameterCount; |
| 4903 | + __u16 MaxDataCount; |
| 4904 | + __u8 MaxSetupCount; |
| 4905 | + __u8 Reserved; |
| 4906 | + __u16 Flags; |
| 4907 | + __u32 Timeout; |
| 4908 | + __u16 Reserved2; |
| 4909 | + __u16 ParameterCount; |
| 4910 | + __u16 ParameterOffset; |
| 4911 | + __u16 DataCount; |
| 4912 | + __u16 DataOffset; |
| 4913 | + __u8 SetupCount; |
| 4914 | + __u8 Reserved3; |
| 4915 | + __u16 SubCommand; /* one setup word */ |
| 4916 | + __u16 ByteCount; |
| 4917 | + __u8 Pad; |
| 4918 | + __u16 InformationLevel; |
| 4919 | + __u32 Reserved4; |
| 4920 | + char FileName[1]; |
| 4921 | +} TRANSACTION2_QPI_REQ; |
| 4922 | + |
| 4923 | +typedef struct smb_com_transaction2_qpi_rsp { |
| 4924 | + struct smb_hdr hdr; /* wct = 10 + SetupCount */ |
| 4925 | + __u16 TotalParameterCount; |
| 4926 | + __u16 TotalDataCount; |
| 4927 | + __u16 Reserved; |
| 4928 | + __u16 ParameterCount; |
| 4929 | + __u16 ParameterOffset; |
| 4930 | + __u16 ParameterDisplacement; |
| 4931 | + __u16 DataCount; |
| 4932 | + __u16 DataOffset; |
| 4933 | + __u16 DataDisplacement; |
| 4934 | + __u8 SetupCount; |
| 4935 | + __u8 Reserved1; /* should be zero setup words following */ |
| 4936 | + __u16 ByteCount; |
| 4937 | + __u16 Reserved2; /* parameter word reserved - present for infolevels > 100 */ |
| 4938 | +} TRANSACTION2_QPI_RSP; |
| 4939 | + |
| 4940 | +typedef struct smb_com_transaction2_spi_req { |
| 4941 | + struct smb_hdr hdr; /* wct = 15 */ |
| 4942 | + __u16 TotalParameterCount; |
| 4943 | + __u16 TotalDataCount; |
| 4944 | + __u16 MaxParameterCount; |
| 4945 | + __u16 MaxDataCount; |
| 4946 | + __u8 MaxSetupCount; |
| 4947 | + __u8 Reserved; |
| 4948 | + __u16 Flags; |
| 4949 | + __u32 Timeout; |
| 4950 | + __u16 Reserved2; |
| 4951 | + __u16 ParameterCount; |
| 4952 | + __u16 ParameterOffset; |
| 4953 | + __u16 DataCount; |
| 4954 | + __u16 DataOffset; |
| 4955 | + __u8 SetupCount; |
| 4956 | + __u8 Reserved3; |
| 4957 | + __u16 SubCommand; /* one setup word */ |
| 4958 | + __u16 ByteCount; |
| 4959 | + __u8 Pad; |
| 4960 | + __u16 Pad1; |
| 4961 | + __u16 InformationLevel; |
| 4962 | + __u32 Reserved4; |
| 4963 | + char FileName[1]; |
| 4964 | +} TRANSACTION2_SPI_REQ; |
| 4965 | + |
| 4966 | +typedef struct smb_com_transaction2_spi_rsp { |
| 4967 | + struct smb_hdr hdr; /* wct = 10 + SetupCount */ |
| 4968 | + __u16 TotalParameterCount; |
| 4969 | + __u16 TotalDataCount; |
| 4970 | + __u16 Reserved; |
| 4971 | + __u16 ParameterCount; |
| 4972 | + __u16 ParameterOffset; |
| 4973 | + __u16 ParameterDisplacement; |
| 4974 | + __u16 DataCount; |
| 4975 | + __u16 DataOffset; |
| 4976 | + __u16 DataDisplacement; |
| 4977 | + __u8 SetupCount; |
| 4978 | + __u8 Reserved1; /* should be zero setup words following */ |
| 4979 | + __u16 ByteCount; |
| 4980 | + __u16 Reserved2; /* parameter word reserved - present for infolevels > 100 */ |
| 4981 | +} TRANSACTION2_SPI_RSP; |
| 4982 | + |
| 4983 | +struct set_file_rename { |
| 4984 | + __u32 overwrite; /* 1 = overwrite dest */ |
| 4985 | + __u32 root_fid; /* zero */ |
| 4986 | + __u32 target_name_len; |
| 4987 | + char target_name[0]; /* Must be unicode */ |
| 4988 | +}; |
| 4989 | + |
| 4990 | +struct smb_com_transaction2_sfi_req { |
| 4991 | + struct smb_hdr hdr; /* wct = 15 */ |
| 4992 | + __u16 TotalParameterCount; |
| 4993 | + __u16 TotalDataCount; |
| 4994 | + __u16 MaxParameterCount; |
| 4995 | + __u16 MaxDataCount; |
| 4996 | + __u8 MaxSetupCount; |
| 4997 | + __u8 Reserved; |
| 4998 | + __u16 Flags; |
| 4999 | + __u32 Timeout; |
| 5000 | + __u16 Reserved2; |
| 5001 | + __u16 ParameterCount; |
| 5002 | + __u16 ParameterOffset; |
| 5003 | + __u16 DataCount; |
| 5004 | + __u16 DataOffset; |
| 5005 | + __u8 SetupCount; |
| 5006 | + __u8 Reserved3; |
| 5007 | + __u16 SubCommand; /* one setup word */ |
| 5008 | + __u16 ByteCount; |
| 5009 | + __u8 Pad; |
| 5010 | + __u16 Pad1; |
| 5011 | + __u16 Fid; |
| 5012 | + __u16 InformationLevel; |
| 5013 | + __u16 Reserved4; |
| 5014 | +}; |
| 5015 | + |
| 5016 | +struct smb_com_transaction2_sfi_rsp { |
| 5017 | + struct smb_hdr hdr; /* wct = 10 + SetupCount */ |
| 5018 | + __u16 TotalParameterCount; |
| 5019 | + __u16 TotalDataCount; |
| 5020 | + __u16 Reserved; |
| 5021 | + __u16 ParameterCount; |
| 5022 | + __u16 ParameterOffset; |
| 5023 | + __u16 ParameterDisplacement; |
| 5024 | + __u16 DataCount; |
| 5025 | + __u16 DataOffset; |
| 5026 | + __u16 DataDisplacement; |
| 5027 | + __u8 SetupCount; |
| 5028 | + __u8 Reserved1; /* should be zero setup words following */ |
| 5029 | + __u16 ByteCount; |
| 5030 | + __u16 Reserved2; /* parameter word reserved - present for infolevels > 100 */ |
| 5031 | +}; |
| 5032 | + |
| 5033 | + |
| 5034 | +/* |
| 5035 | + * Flags on T2 FINDFIRST and FINDNEXT |
| 5036 | + */ |
| 5037 | +#define CIFS_SEARCH_CLOSE_ALWAYS 0x0001 |
| 5038 | +#define CIFS_SEARCH_CLOSE_AT_END 0x0002 |
| 5039 | +#define CIFS_SEARCH_RETURN_RESUME 0x0004 |
| 5040 | +#define CIFS_SEARCH_CONTINUE_FROM_LAST 0x0008 |
| 5041 | +#define CIFS_SEARCH_BACKUP_SEARCH 0x0010 |
| 5042 | + |
| 5043 | +/* |
| 5044 | + * Size of the resume key on FINDFIRST and FINDNEXT calls |
| 5045 | + */ |
| 5046 | +#define CIFS_SMB_RESUME_KEY_SIZE 4 |
| 5047 | + |
| 5048 | +typedef struct smb_com_transaction2_ffirst_req { |
| 5049 | + struct smb_hdr hdr; /* wct = 15 */ |
| 5050 | + __u16 TotalParameterCount; |
| 5051 | + __u16 TotalDataCount; |
| 5052 | + __u16 MaxParameterCount; |
| 5053 | + __u16 MaxDataCount; |
| 5054 | + __u8 MaxSetupCount; |
| 5055 | + __u8 Reserved; |
| 5056 | + __u16 Flags; |
| 5057 | + __u32 Timeout; |
| 5058 | + __u16 Reserved2; |
| 5059 | + __u16 ParameterCount; |
| 5060 | + __u16 ParameterOffset; |
| 5061 | + __u16 DataCount; |
| 5062 | + __u16 DataOffset; |
| 5063 | + __u8 SetupCount; /* one */ |
| 5064 | + __u8 Reserved3; |
| 5065 | + __u16 SubCommand; /* TRANS2_FIND_FIRST */ |
| 5066 | + __u16 ByteCount; |
| 5067 | + __u8 Pad; |
| 5068 | + __u16 SearchAttributes; |
| 5069 | + __u16 SearchCount; |
| 5070 | + __u16 SearchFlags; |
| 5071 | + __u16 InformationLevel; |
| 5072 | + __u32 SearchStorageType; |
| 5073 | + char FileName[1]; |
| 5074 | +} TRANSACTION2_FFIRST_REQ; |
| 5075 | + |
| 5076 | +typedef struct smb_com_transaction2_ffirst_rsp { |
| 5077 | + struct smb_hdr hdr; /* wct = 10 */ |
| 5078 | + __u16 TotalParameterCount; |
| 5079 | + __u16 TotalDataCount; |
| 5080 | + __u16 Reserved; |
| 5081 | + __u16 ParameterCount; |
| 5082 | + __u16 ParameterOffset; |
| 5083 | + __u16 ParameterDisplacement; |
| 5084 | + __u16 DataCount; |
| 5085 | + __u16 DataOffset; |
| 5086 | + __u16 DataDisplacement; |
| 5087 | + __u8 SetupCount; |
| 5088 | + __u8 Reserved1; /* should be zero setup words following */ |
| 5089 | + __u16 ByteCount; |
| 5090 | +} TRANSACTION2_FFIRST_RSP; |
| 5091 | + |
| 5092 | +typedef struct smb_com_transaction2_ffirst_rsp_parms { |
| 5093 | + __u16 SearchHandle; |
| 5094 | + __u16 SearchCount; |
| 5095 | + __u16 EndofSearch; |
| 5096 | + __u16 EAErrorOffset; |
| 5097 | + __u16 LastNameOffset; |
| 5098 | +} T2_FFIRST_RSP_PARMS; |
| 5099 | + |
| 5100 | +typedef struct smb_com_transaction2_fnext_req { |
| 5101 | + struct smb_hdr hdr; /* wct = 15 */ |
| 5102 | + __u16 TotalParameterCount; |
| 5103 | + __u16 TotalDataCount; |
| 5104 | + __u16 MaxParameterCount; |
| 5105 | + __u16 MaxDataCount; |
| 5106 | + __u8 MaxSetupCount; |
| 5107 | + __u8 Reserved; |
| 5108 | + __u16 Flags; |
| 5109 | + __u32 Timeout; |
| 5110 | + __u16 Reserved2; |
| 5111 | + __u16 ParameterCount; |
| 5112 | + __u16 ParameterOffset; |
| 5113 | + __u16 DataCount; |
| 5114 | + __u16 DataOffset; |
| 5115 | + __u8 SetupCount; /* one */ |
| 5116 | + __u8 Reserved3; |
| 5117 | + __u16 SubCommand; /* TRANS2_FIND_NEXT */ |
| 5118 | + __u16 ByteCount; |
| 5119 | + __u8 Pad; |
| 5120 | + __u16 SearchHandle; |
| 5121 | + __u16 SearchCount; |
| 5122 | + __u16 InformationLevel; |
| 5123 | + __u32 ResumeKey; |
| 5124 | + __u16 SearchFlags; |
| 5125 | + char ResumeFileName[1]; |
| 5126 | +} TRANSACTION2_FNEXT_REQ; |
| 5127 | + |
| 5128 | +typedef struct smb_com_transaction2_fnext_rsp { |
| 5129 | + struct smb_hdr hdr; /* wct = 10 */ |
| 5130 | + __u16 TotalParameterCount; |
| 5131 | + __u16 TotalDataCount; |
| 5132 | + __u16 Reserved; |
| 5133 | + __u16 ParameterCount; |
| 5134 | + __u16 ParameterOffset; |
| 5135 | + __u16 ParameterDisplacement; |
| 5136 | + __u16 DataCount; |
| 5137 | + __u16 DataOffset; |
| 5138 | + __u16 DataDisplacement; |
| 5139 | + __u8 SetupCount; |
| 5140 | + __u8 Reserved1; /* should be zero setup words following */ |
| 5141 | + __u16 ByteCount; |
| 5142 | +} TRANSACTION2_FNEXT_RSP; |
| 5143 | + |
| 5144 | +typedef struct smb_com_transaction2_fnext_rsp_parms { |
| 5145 | + __u16 SearchCount; |
| 5146 | + __u16 EndofSearch; |
| 5147 | + __u16 EAErrorOffset; |
| 5148 | + __u16 LastNameOffset; |
| 5149 | +} T2_FNEXT_RSP_PARMS; |
| 5150 | + |
| 5151 | +/* QFSInfo Levels */ |
| 5152 | +#define SMB_INFO_ALLOCATION 1 |
| 5153 | +#define SMB_INFO_VOLUME 2 |
| 5154 | +#define SMB_QUERY_FS_VOLUME_INFO 0x102 |
| 5155 | +#define SMB_QUERY_FS_SIZE_INFO 0x103 |
| 5156 | +#define SMB_QUERY_FS_DEVICE_INFO 0x104 |
| 5157 | +#define SMB_QUERY_FS_ATTRIBUTE_INFO 0x105 |
| 5158 | +#define SMB_QUERY_CIFS_UNIX_INFO 0x200 |
| 5159 | +#define SMB_QUERY_LABEL_INFO 0x3ea |
| 5160 | +#define SMB_QUERY_FS_QUOTA_INFO 0x3ee |
| 5161 | + |
| 5162 | +typedef struct smb_com_transaction2_qfsi_req { |
| 5163 | + struct smb_hdr hdr; /* wct = 14+ */ |
| 5164 | + __u16 TotalParameterCount; |
| 5165 | + __u16 TotalDataCount; |
| 5166 | + __u16 MaxParameterCount; |
| 5167 | + __u16 MaxDataCount; |
| 5168 | + __u8 MaxSetupCount; |
| 5169 | + __u8 Reserved; |
| 5170 | + __u16 Flags; |
| 5171 | + __u32 Timeout; |
| 5172 | + __u16 Reserved2; |
| 5173 | + __u16 ParameterCount; |
| 5174 | + __u16 ParameterOffset; |
| 5175 | + __u16 DataCount; |
| 5176 | + __u16 DataOffset; |
| 5177 | + __u8 SetupCount; |
| 5178 | + __u8 Reserved3; |
| 5179 | + __u16 SubCommand; /* one setup word */ |
| 5180 | + __u16 ByteCount; |
| 5181 | + __u8 Pad; |
| 5182 | + __u16 InformationLevel; |
| 5183 | +} TRANSACTION2_QFSI_REQ; |
| 5184 | + |
| 5185 | +typedef struct smb_com_transaction_qfsi_rsp { |
| 5186 | + struct smb_hdr hdr; /* wct = 10 + SetupCount */ |
| 5187 | + __u16 TotalParameterCount; |
| 5188 | + __u16 TotalDataCount; |
| 5189 | + __u16 Reserved; |
| 5190 | + __u16 ParameterCount; |
| 5191 | + __u16 ParameterOffset; |
| 5192 | + __u16 ParameterDisplacement; |
| 5193 | + __u16 DataCount; |
| 5194 | + __u16 DataOffset; |
| 5195 | + __u16 DataDisplacement; |
| 5196 | + __u8 SetupCount; |
| 5197 | + __u8 Reserved1; /* should be zero setup words following */ |
| 5198 | + __u16 ByteCount; |
| 5199 | + __u8 Pad; /* may be three bytes *//* followed by data area */ |
| 5200 | +} TRANSACTION2_QFSI_RSP; |
| 5201 | + |
| 5202 | +typedef struct smb_com_transaction2_get_dfs_refer_req { |
| 5203 | + struct smb_hdr hdr; /* wct = 15 */ |
| 5204 | + __u16 TotalParameterCount; |
| 5205 | + __u16 TotalDataCount; |
| 5206 | + __u16 MaxParameterCount; |
| 5207 | + __u16 MaxDataCount; |
| 5208 | + __u8 MaxSetupCount; |
| 5209 | + __u8 Reserved; |
| 5210 | + __u16 Flags; |
| 5211 | + __u32 Timeout; |
| 5212 | + __u16 Reserved2; |
| 5213 | + __u16 ParameterCount; |
| 5214 | + __u16 ParameterOffset; |
| 5215 | + __u16 DataCount; |
| 5216 | + __u16 DataOffset; |
| 5217 | + __u8 SetupCount; |
| 5218 | + __u8 Reserved3; |
| 5219 | + __u16 SubCommand; /* one setup word */ |
| 5220 | + __u16 ByteCount; |
| 5221 | + __u8 Pad[3]; /* Win2K has sent 0x0F01 (max resp length perhaps?) followed by one byte pad - doesn't seem to matter though */ |
| 5222 | + __u16 MaxReferralLevel; |
| 5223 | + char RequestFileName[1]; |
| 5224 | +} TRANSACTION2_GET_DFS_REFER_REQ; |
| 5225 | + |
| 5226 | +typedef struct dfs_referral_level_3 { |
| 5227 | + __u16 VersionNumber; |
| 5228 | + __u16 ReferralSize; |
| 5229 | + __u16 ServerType; /* 0x0001 = CIFS server */ |
| 5230 | + __u16 ReferralFlags; /* or proximity - not clear which since always set to zero - SNIA spec says 0x01 means strip off PathConsumed chars before submitting RequestFileName to remote node */ |
| 5231 | + __u16 TimeToLive; |
| 5232 | + __u16 Proximity; |
| 5233 | + __u16 DfsPathOffset; |
| 5234 | + __u16 DfsAlternatePathOffset; |
| 5235 | + __u16 NetworkAddressOffset; |
| 5236 | +} REFERRAL3; |
| 5237 | + |
| 5238 | +typedef struct smb_com_transaction_get_dfs_refer_rsp { |
| 5239 | + struct smb_hdr hdr; /* wct = 10 */ |
| 5240 | + __u16 TotalParameterCount; |
| 5241 | + __u16 TotalDataCount; |
| 5242 | + __u16 Reserved; |
| 5243 | + __u16 ParameterCount; |
| 5244 | + __u16 ParameterOffset; |
| 5245 | + __u16 ParameterDisplacement; |
| 5246 | + __u16 DataCount; |
| 5247 | + __u16 DataOffset; |
| 5248 | + __u16 DataDisplacement; |
| 5249 | + __u8 SetupCount; |
| 5250 | + __u8 Reserved1; /* zero setup words following */ |
| 5251 | + __u16 ByteCount; |
| 5252 | + __u8 Pad; |
| 5253 | + __u16 PathConsumed; |
| 5254 | + __u16 NumberOfReferrals; |
| 5255 | + __u16 DFSFlags; |
| 5256 | + __u16 Pad2; |
| 5257 | + REFERRAL3 referrals[1]; /* array of level 3 dfs_referral structures */ |
| 5258 | + /* followed by the strings pointed to by the referral structures */ |
| 5259 | +} TRANSACTION2_GET_DFS_REFER_RSP; |
| 5260 | + |
| 5261 | +/* DFS Flags */ |
| 5262 | +#define DFSREF_REFERRAL_SERVER 0x0001 |
| 5263 | +#define DFSREF_STORAGE_SERVER 0x0002 |
| 5264 | + |
| 5265 | +/* IOCTL information */ |
| 5266 | +/* List of ioctl function codes that look to be of interest to remote clients like this. */ |
| 5267 | +/* Need to do some experimentation to make sure they all work remotely. */ |
| 5268 | +/* Some of the following such as the encryption/compression ones would be */ |
| 5269 | +/* invoked from tools via a specialized hook into the VFS rather than via the */ |
| 5270 | +/* standard vfs entry points */ |
| 5271 | +#define FSCTL_REQUEST_OPLOCK_LEVEL_1 0x00090000 |
| 5272 | +#define FSCTL_REQUEST_OPLOCK_LEVEL_2 0x00090004 |
| 5273 | +#define FSCTL_REQUEST_BATCH_OPLOCK 0x00090008 |
| 5274 | +#define FSCTL_LOCK_VOLUME 0x00090018 |
| 5275 | +#define FSCTL_UNLOCK_VOLUME 0x0009001C |
| 5276 | +#define FSCTL_GET_COMPRESSION 0x0009003C |
| 5277 | +#define FSCTL_SET_COMPRESSION 0x0009C040 |
| 5278 | +#define FSCTL_REQUEST_FILTER_OPLOCK 0x0009008C |
| 5279 | +#define FSCTL_FILESYS_GET_STATISTICS 0x00090090 |
| 5280 | +#define FSCTL_SET_REPARSE_POINT 0x000900A4 |
| 5281 | +#define FSCTL_GET_REPARSE_POINT 0x000900A8 |
| 5282 | +#define FSCTL_DELETE_REPARSE_POINT 0x000900AC |
| 5283 | +#define FSCTL_SET_SPARSE 0x000900C4 |
| 5284 | +#define FSCTL_SET_ZERO_DATA 0x000900C8 |
| 5285 | +#define FSCTL_SET_ENCRYPTION 0x000900D7 |
| 5286 | +#define FSCTL_ENCRYPTION_FSCTL_IO 0x000900DB |
| 5287 | +#define FSCTL_WRITE_RAW_ENCRYPTED 0x000900DF |
| 5288 | +#define FSCTL_READ_RAW_ENCRYPTED 0x000900E3 |
| 5289 | +#define FSCTL_SIS_COPYFILE 0x00090100 |
| 5290 | +#define FSCTL_SIS_LINK_FILES 0x0009C104 |
| 5291 | + |
| 5292 | +#define IO_REPARSE_TAG_MOUNT_POINT 0xA0000003 |
| 5293 | +#define IO_REPARSE_TAG_HSM 0xC0000004 |
| 5294 | +#define IO_REPARSE_TAG_SIS 0x80000007 |
| 5295 | + |
| 5296 | +/* |
| 5297 | + ************************************************************************ |
| 5298 | + * All structs for everything above the SMB PDUs themselves |
| 5299 | + * (such as the T2 level specific data) go here |
| 5300 | + ************************************************************************ |
| 5301 | + */ |
| 5302 | + |
| 5303 | +/* |
| 5304 | + * Information on a server |
| 5305 | + */ |
| 5306 | + |
| 5307 | +struct serverInfo { |
| 5308 | + char name[16]; |
| 5309 | + unsigned char versionMajor; |
| 5310 | + unsigned char versionMinor; |
| 5311 | + unsigned long type; |
| 5312 | + unsigned int commentOffset; |
| 5313 | +}; |
| 5314 | + |
| 5315 | +/* |
| 5316 | + * The following structure is the format of the data returned on a NetShareEnum |
| 5317 | + * with level "90" (x5A) |
| 5318 | + */ |
| 5319 | + |
| 5320 | +struct shareInfo { |
| 5321 | + char shareName[13]; |
| 5322 | + char pad; |
| 5323 | + unsigned short type; |
| 5324 | + unsigned int commentOffset; |
| 5325 | +}; |
| 5326 | + |
| 5327 | +struct aliasInfo { |
| 5328 | + char aliasName[9]; |
| 5329 | + char pad; |
| 5330 | + unsigned int commentOffset; |
| 5331 | + unsigned char type[2]; |
| 5332 | +}; |
| 5333 | + |
| 5334 | +struct aliasInfo92 { |
| 5335 | + int aliasNameOffset; |
| 5336 | + int serverNameOffset; |
| 5337 | + int shareNameOffset; |
| 5338 | +}; |
| 5339 | + |
| 5340 | +typedef struct { |
| 5341 | + __u64 TotalAllocationUnits; |
| 5342 | + __u64 FreeAllocationUnits; |
| 5343 | + __u32 SectorsPerAllocationUnit; |
| 5344 | + __u32 BytesPerSector; |
| 5345 | +} FILE_SYSTEM_INFO; /* size info, level 0x103 */ |
| 5346 | + |
| 5347 | +typedef struct { |
| 5348 | + __u16 MajorVersionNumber; |
| 5349 | + __u16 MinorVersionNumber; |
| 5350 | + __u64 Capability; |
| 5351 | +} FILE_SYSTEM_UNIX_INFO; /* Unix extensions info, level 0x200 */ |
| 5352 | +/* Linux/Unix extensions capability flags */ |
| 5353 | +#define CIFS_UNIX_FCNTL_CAP 0x00000001 /* support for fcntl locks */ |
| 5354 | +#define CIFS_UNIX_POSIX_ACL_CAP 0x00000002 |
| 5355 | + |
| 5356 | +/* DeviceType Flags */ |
| 5357 | +#define FILE_DEVICE_CD_ROM 0x00000002 |
| 5358 | +#define FILE_DEVICE_CD_ROM_FILE_SYSTEM 0x00000003 |
| 5359 | +#define FILE_DEVICE_DFS 0x00000006 |
| 5360 | +#define FILE_DEVICE_DISK 0x00000007 |
| 5361 | +#define FILE_DEVICE_DISK_FILE_SYSTEM 0x00000008 |
| 5362 | +#define FILE_DEVICE_FILE_SYSTEM 0x00000009 |
| 5363 | +#define FILE_DEVICE_NAMED_PIPE 0x00000011 |
| 5364 | +#define FILE_DEVICE_NETWORK 0x00000012 |
| 5365 | +#define FILE_DEVICE_NETWORK_FILE_SYSTEM 0x00000014 |
| 5366 | +#define FILE_DEVICE_NULL 0x00000015 |
| 5367 | +#define FILE_DEVICE_PARALLEL_PORT 0x00000016 |
| 5368 | +#define FILE_DEVICE_PRINTER 0x00000018 |
| 5369 | +#define FILE_DEVICE_SERIAL_PORT 0x0000001b |
| 5370 | +#define FILE_DEVICE_STREAMS 0x0000001e |
| 5371 | +#define FILE_DEVICE_TAPE 0x0000001f |
| 5372 | +#define FILE_DEVICE_TAPE_FILE_SYSTEM 0x00000020 |
| 5373 | +#define FILE_DEVICE_VIRTUAL_DISK 0x00000024 |
| 5374 | +#define FILE_DEVICE_NETWORK_REDIRECTOR 0x00000028 |
| 5375 | + |
| 5376 | +typedef struct { |
| 5377 | + __u32 DeviceType; |
| 5378 | + __u32 DeviceCharacteristics; |
| 5379 | +} FILE_SYSTEM_DEVICE_INFO; /* device info, level 0x104 */ |
| 5380 | + |
| 5381 | +typedef struct { |
| 5382 | + __u32 Attributes; |
| 5383 | + __u32 MaxPathNameComponentLength; |
| 5384 | + __u32 FileSystemNameLen; |
| 5385 | + char FileSystemName[52]; /* do not really need to save this - so potentially get only subset of name */ |
| 5386 | +} FILE_SYSTEM_ATTRIBUTE_INFO; |
| 5387 | + |
| 5388 | +typedef struct { /* data block encoding of response to level 263 QPathInfo */ |
| 5389 | + __u64 CreationTime; |
| 5390 | + __u64 LastAccessTime; |
| 5391 | + __u64 LastWriteTime; |
| 5392 | + __u64 ChangeTime; |
| 5393 | + __u32 Attributes; |
| 5394 | + __u32 Pad1; |
| 5395 | + __u64 AllocationSize; |
| 5396 | + __u64 EndOfFile; /* size ie offset to first free byte in file */ |
| 5397 | + __u32 NumberOfLinks; /* hard links */ |
| 5398 | + __u8 DeletePending; |
| 5399 | + __u8 Directory; |
| 5400 | + __u16 Pad2; |
| 5401 | + __u64 IndexNumber; |
| 5402 | + __u32 EASize; |
| 5403 | + __u32 AccessFlags; |
| 5404 | + __u64 IndexNumber1; |
| 5405 | + __u64 CurrentByteOffset; |
| 5406 | + __u32 Mode; |
| 5407 | + __u32 AlignmentRequirement; |
| 5408 | + __u32 FileNameLength; |
| 5409 | + char FileName[1]; |
| 5410 | +} FILE_ALL_INFO; /* level 263 QPathInfo */ |
| 5411 | + |
| 5412 | +typedef struct { |
| 5413 | + __u64 EndOfFile; |
| 5414 | + __u64 NumOfBytes; |
| 5415 | + __u64 LastStatusChange; /*SNIA spec says DCE time for the three time fields */ |
| 5416 | + __u64 LastAccessTime; |
| 5417 | + __u64 LastModificationTime; |
| 5418 | + __u64 Uid; |
| 5419 | + __u64 Gid; |
| 5420 | + __u32 Type; |
| 5421 | + __u64 DevMajor; |
| 5422 | + __u64 DevMinor; |
| 5423 | + __u64 UniqueId; |
| 5424 | + __u64 Permissions; |
| 5425 | + __u64 Nlinks; |
| 5426 | +} FILE_UNIX_BASIC_INFO; /* level 512 QPathInfo */ |
| 5427 | + |
| 5428 | +typedef struct { |
| 5429 | + char LinkDest[1]; |
| 5430 | +} FILE_UNIX_LINK_INFO; /* level 513 QPathInfo */ |
| 5431 | + |
| 5432 | +/* defines for enumerating possible values of the Unix type field below */ |
| 5433 | +#define UNIX_FILE 0 |
| 5434 | +#define UNIX_DIR 1 |
| 5435 | +#define UNIX_SYMLINK 2 |
| 5436 | +#define UNIX_CHARDEV 3 |
| 5437 | +#define UNIX_BLOCKDEV 4 |
| 5438 | +#define UNIX_FIFO 5 |
| 5439 | +#define UNIX_SOCKET 6 |
| 5440 | + |
| 5441 | +typedef struct { |
| 5442 | + __u32 NextEntryOffset; |
| 5443 | + __u32 ResumeKey; |
| 5444 | + __u64 EndOfFile; |
| 5445 | + __u64 NumOfBytes; |
| 5446 | + __u64 LastStatusChange; /*SNIA spec says DCE time for the three time fields */ |
| 5447 | + __u64 LastAccessTime; |
| 5448 | + __u64 LastModificationTime; |
| 5449 | + __u64 Uid; |
| 5450 | + __u64 Gid; |
| 5451 | + __u32 Type; |
| 5452 | + __u64 DevMajor; |
| 5453 | + __u64 DevMinor; |
| 5454 | + __u64 UniqueId; |
| 5455 | + __u64 Permissions; |
| 5456 | + __u64 Nlinks; |
| 5457 | + char FileName[1]; |
| 5458 | +} FILE_UNIX_INFO; |
| 5459 | + |
| 5460 | +typedef struct { |
| 5461 | + __u64 CreationTime; |
| 5462 | + __u64 LastAccessTime; |
| 5463 | + __u64 LastWriteTime; |
| 5464 | + __u64 ChangeTime; |
| 5465 | + __u32 Attributes; |
| 5466 | + __u32 Pad; |
| 5467 | +} FILE_BASIC_INFO; /* size info, level 0x101 */ |
| 5468 | + |
| 5469 | +struct file_allocation_info { |
| 5470 | + __u64 AllocationSize; |
| 5471 | +}; /* size info, level 0x103 */ |
| 5472 | + |
| 5473 | +struct file_end_of_file_info { |
| 5474 | + __u64 FileSize; /* offset to end of file */ |
| 5475 | +}; /* size info, level 0x104 */ |
| 5476 | + |
| 5477 | +typedef struct { |
| 5478 | + __u32 NextEntryOffset; |
| 5479 | + __u32 FileIndex; |
| 5480 | + __u64 CreationTime; |
| 5481 | + __u64 LastAccessTime; |
| 5482 | + __u64 LastWriteTime; |
| 5483 | + __u64 ChangeTime; |
| 5484 | + __u64 EndOfFile; |
| 5485 | + __u64 AllocationSize; |
| 5486 | + __u32 ExtFileAttributes; |
| 5487 | + __u32 FileNameLength; |
| 5488 | + char FileName[1]; |
| 5489 | +} FILE_DIRECTORY_INFO; /* level 257 FF response data area */ |
| 5490 | + |
| 5491 | +struct gea { |
| 5492 | + unsigned char cbName; |
| 5493 | + char szName[1]; |
| 5494 | +}; |
| 5495 | + |
| 5496 | +struct gealist { |
| 5497 | + unsigned long cbList; |
| 5498 | + struct gea list[1]; |
| 5499 | +}; |
| 5500 | + |
| 5501 | +struct fea { |
| 5502 | + unsigned char EA_flags; |
| 5503 | + __u8 name_len; |
| 5504 | + __u16 value_len; |
| 5505 | + char szName[1]; |
| 5506 | + /* optionally followed by value */ |
| 5507 | +}; |
| 5508 | +/* flags for _FEA.fEA */ |
| 5509 | +#define FEA_NEEDEA 0x80 /* need EA bit */ |
| 5510 | + |
| 5511 | +struct fealist { |
| 5512 | + __u32 list_len; |
| 5513 | + struct fea list[1]; |
| 5514 | +}; |
| 5515 | + |
| 5516 | +/* used to hold an arbitrary blob of data */ |
| 5517 | +struct data_blob { |
| 5518 | + __u8 *data; |
| 5519 | + size_t length; |
| 5520 | + void (*free) (struct data_blob * data_blob); |
| 5521 | +}; |
| 5522 | + |
| 5523 | +#ifdef CONFIG_CIFS_POSIX |
| 5524 | +/* |
| 5525 | + For better POSIX semantics from Linux client, (even better |
| 5526 | + than the existing CIFS Unix Extensions) we need updated PDUs for: |
| 5527 | + |
| 5528 | + 1) PosixCreateX - to set and return the mode, inode#, device info and |
| 5529 | + perhaps add a CreateDevice - to create Pipes and other special .inodes |
| 5530 | + Also note POSIX open flags |
| 5531 | + 2) Close - to return the last write time to do cache across close more safely |
| 5532 | + 3) PosixQFSInfo - to return statfs info |
| 5533 | + 4) FindFirst return unique inode number - what about resume key, two forms short (matches readdir) and full (enough info to cache inodes) |
| 5534 | + 5) Mkdir - set mode |
| 5535 | + |
| 5536 | + And under consideration: |
| 5537 | + 6) FindClose2 (return nanosecond timestamp ??) |
| 5538 | + 7) Use nanosecond timestamps throughout all time fields if |
| 5539 | + corresponding attribute flag is set |
| 5540 | + 8) sendfile - handle based copy |
| 5541 | + 9) Direct i/o |
| 5542 | + 10) "POSIX ACL" support |
| 5543 | + 11) Misc fcntls? |
| 5544 | + |
| 5545 | + what about fixing 64 bit alignment |
| 5546 | + |
| 5547 | + There are also various legacy SMB/CIFS requests used as is |
| 5548 | + |
| 5549 | + From existing Lanman and NTLM dialects: |
| 5550 | + -------------------------------------- |
| 5551 | + NEGOTIATE |
| 5552 | + SESSION_SETUP_ANDX (BB which?) |
| 5553 | + TREE_CONNECT_ANDX (BB which wct?) |
| 5554 | + TREE_DISCONNECT (BB add volume timestamp on response) |
| 5555 | + LOGOFF_ANDX |
| 5556 | + DELETE (note delete open file behavior) |
| 5557 | + DELETE_DIRECTORY |
| 5558 | + READ_AND_X |
| 5559 | + WRITE_AND_X |
| 5560 | + LOCKING_AND_X (note posix lock semantics) |
| 5561 | + RENAME (note rename across dirs and open file rename posix behaviors) |
| 5562 | + NT_RENAME (for hardlinks) Is this good enough for all features? |
| 5563 | + FIND_CLOSE2 |
| 5564 | + TRANSACTION2 (18 cases) |
| 5565 | + SMB_SET_FILE_END_OF_FILE_INFO2 SMB_SET_PATH_END_OF_FILE_INFO2 |
| 5566 | + (BB verify that never need to set allocation size) |
| 5567 | + SMB_SET_FILE_BASIC_INFO2 (setting times - BB can it be done via Unix ext?) |
| 5568 | + |
| 5569 | + COPY (note support for copy across directories) - FUTURE, OPTIONAL |
| 5570 | + setting/getting OS/2 EAs - FUTURE (BB can this handle |
| 5571 | + setting Linux xattrs perfectly) - OPTIONAL |
| 5572 | + dnotify - FUTURE, OPTIONAL |
| 5573 | + quota - FUTURE, OPTIONAL |
| 5574 | + |
| 5575 | + Note that various requests implemented for NT interop such as |
| 5576 | + NT_TRANSACT (IOCTL) QueryReparseInfo |
| 5577 | + are unneeded to servers compliant with the CIFS POSIX extensions |
| 5578 | + |
| 5579 | + From CIFS Unix Extensions: |
| 5580 | + ------------------------- |
| 5581 | + T2 SET_PATH_INFO (SMB_SET_FILE_UNIX_LINK) for symlinks |
| 5582 | + T2 SET_PATH_INFO (SMB_SET_FILE_BASIC_INFO2) |
| 5583 | + T2 QUERY_PATH_INFO (SMB_QUERY_FILE_UNIX_LINK) |
| 5584 | + T2 QUERY_PATH_INFO (SMB_QUERY_FILE_UNIX_BASIC) - BB check for missing inode fields |
| 5585 | + Actually need QUERY_FILE_UNIX_INFO since has inode num |
| 5586 | + BB what about a) blksize/blkbits/blocks |
| 5587 | + b) i_version |
| 5588 | + c) i_rdev |
| 5589 | + d) notify mask? |
| 5590 | + e) generation |
| 5591 | + f) size_seqcount |
| 5592 | + T2 FIND_FIRST/FIND_NEXT FIND_FILE_UNIX |
| 5593 | + TRANS2_GET_DFS_REFERRAL - OPTIONAL but recommended |
| 5594 | + T2_QFS_INFO QueryDevice/AttributeInfo - OPTIONAL |
| 5595 | + |
| 5596 | + |
| 5597 | + */ |
| 5598 | +#endif |
| 5599 | + |
| 5600 | +#pragma pack() /* resume default structure packing */ |
| 5601 | + |
| 5602 | +#endif /* _CIFSPDU_H */ |
| 5603 | --- /dev/null |
| 5604 | +++ b/fs/cifs/cifsproto.h |
| 5605 | @@ -0,0 +1,254 @@ |
| 5606 | +/* |
| 5607 | + * fs/cifs/cifsproto.h |
| 5608 | + * |
| 5609 | + * Copyright (c) International Business Machines Corp., 2002 |
| 5610 | + * Author(s): Steve French (sfrench@us.ibm.com) |
| 5611 | + * |
| 5612 | + * This library is free software; you can redistribute it and/or modify |
| 5613 | + * it under the terms of the GNU Lesser General Public License as published |
| 5614 | + * by the Free Software Foundation; either version 2.1 of the License, or |
| 5615 | + * (at your option) any later version. |
| 5616 | + * |
| 5617 | + * This library is distributed in the hope that it will be useful, |
| 5618 | + * but WITHOUT ANY WARRANTY; without even the implied warranty of |
| 5619 | + * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See |
| 5620 | + * the GNU Lesser General Public License for more details. |
| 5621 | + * |
| 5622 | + * You should have received a copy of the GNU Lesser General Public License |
| 5623 | + * along with this library; if not, write to the Free Software |
| 5624 | + * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA |
| 5625 | + */ |
| 5626 | +#ifndef _CIFSPROTO_H |
| 5627 | +#define _CIFSPROTO_H |
| 5628 | +#include <linux/nls.h> |
| 5629 | + |
| 5630 | +struct statfs; |
| 5631 | + |
| 5632 | +/* |
| 5633 | + ***************************************************************** |
| 5634 | + * All Prototypes |
| 5635 | + ***************************************************************** |
| 5636 | + */ |
| 5637 | + |
| 5638 | +extern struct smb_hdr *cifs_buf_get(void); |
| 5639 | +extern void cifs_buf_release(void *); |
| 5640 | +extern int smb_send(struct socket *, struct smb_hdr *, |
| 5641 | + unsigned int /* length */ , struct sockaddr *); |
| 5642 | +extern unsigned int _GetXid(void); |
| 5643 | +extern void _FreeXid(unsigned int); |
| 5644 | +#define GetXid() (int)_GetXid(); cFYI(1,("CIFS VFS: in %s as Xid: %d with uid: %d",__FUNCTION__, xid,current->fsuid)); |
| 5645 | +#define FreeXid(curr_xid) {_FreeXid(curr_xid); cFYI(1,("CIFS VFS: leaving %s (xid = %d) rc = %d",__FUNCTION__,curr_xid,rc));} |
| 5646 | +extern char *build_path_from_dentry(struct dentry *); |
| 5647 | +extern char *build_wildcard_path_from_dentry(struct dentry *direntry); |
| 5648 | +extern void renew_parental_timestamps(struct dentry *direntry); |
| 5649 | +extern int SendReceive(const unsigned int /* xid */ , struct cifsSesInfo *, |
| 5650 | + struct smb_hdr * /* input */ , |
| 5651 | + struct smb_hdr * /* out */ , |
| 5652 | + int * /* bytes returned */ , const int long_op); |
| 5653 | +extern int checkSMBhdr(struct smb_hdr *smb, __u16 mid); |
| 5654 | +extern int checkSMB(struct smb_hdr *smb, __u16 mid, int length); |
| 5655 | +extern int is_valid_oplock_break(struct smb_hdr *smb); |
| 5656 | +extern unsigned int smbCalcSize(struct smb_hdr *ptr); |
| 5657 | +extern int decode_negTokenInit(unsigned char *security_blob, int length, |
| 5658 | + enum securityEnum *secType); |
| 5659 | +extern int map_smb_to_linux_error(struct smb_hdr *smb); |
| 5660 | +extern void header_assemble(struct smb_hdr *, char /* command */ , |
| 5661 | + const struct cifsTconInfo *, int |
| 5662 | + /* length of fixed section (word count) in two byte units */ |
| 5663 | + ); |
| 5664 | +struct oplock_q_entry * AllocOplockQEntry(struct inode *, u16, struct cifsTconInfo *); |
| 5665 | +void DeleteOplockQEntry(struct oplock_q_entry *); |
| 5666 | +extern time_t cifs_NTtimeToUnix(u64 /* utc nanoseconds since 1601 */ ); |
| 5667 | +extern u64 cifs_UnixTimeToNT(time_t); |
| 5668 | +extern int cifs_get_inode_info(struct inode **pinode, |
| 5669 | + const unsigned char *search_path, |
| 5670 | + FILE_ALL_INFO * pfile_info, |
| 5671 | + struct super_block *sb, int xid); |
| 5672 | +extern int cifs_get_inode_info_unix(struct inode **pinode, |
| 5673 | + const unsigned char *search_path, |
| 5674 | + struct super_block *sb,int xid); |
| 5675 | + |
| 5676 | +extern int cifs_setup_session(unsigned int xid, struct cifsSesInfo *pSesInfo, |
| 5677 | + struct nls_table * nls_info); |
| 5678 | +extern int CIFSSMBNegotiate(unsigned int xid, struct cifsSesInfo *ses); |
| 5679 | + |
| 5680 | +extern int CIFSTCon(unsigned int xid, struct cifsSesInfo *ses, |
| 5681 | + const char *tree, struct cifsTconInfo *tcon, |
| 5682 | + const struct nls_table *); |
| 5683 | + |
| 5684 | +extern int CIFSFindFirst(const int xid, struct cifsTconInfo *tcon, |
| 5685 | + const char *searchName, |
| 5686 | + FILE_DIRECTORY_INFO * findData, |
| 5687 | + T2_FFIRST_RSP_PARMS * findParms, |
| 5688 | + const struct nls_table *nls_codepage, |
| 5689 | + int *pUnicodeFlag, |
| 5690 | + int *pUnixFlag /* if Unix extensions used */ ); |
| 5691 | +extern int CIFSFindNext(const int xid, struct cifsTconInfo *tcon, |
| 5692 | + FILE_DIRECTORY_INFO * findData, |
| 5693 | + T2_FNEXT_RSP_PARMS * findParms, |
| 5694 | + const __u16 searchHandle, char * resume_name, |
| 5695 | + int name_length, __u32 resume_key, |
| 5696 | + int *UnicodeFlag, int *pUnixFlag); |
| 5697 | + |
| 5698 | +extern int CIFSFindClose(const int, struct cifsTconInfo *tcon, |
| 5699 | + const __u16 search_handle); |
| 5700 | + |
| 5701 | +extern int CIFSSMBQPathInfo(const int xid, struct cifsTconInfo *tcon, |
| 5702 | + const unsigned char *searchName, |
| 5703 | + FILE_ALL_INFO * findData, |
| 5704 | + const struct nls_table *nls_codepage); |
| 5705 | + |
| 5706 | +extern int CIFSSMBUnixQPathInfo(const int xid, |
| 5707 | + struct cifsTconInfo *tcon, |
| 5708 | + const unsigned char *searchName, |
| 5709 | + FILE_UNIX_BASIC_INFO * pFindData, |
| 5710 | + const struct nls_table *nls_codepage); |
| 5711 | + |
| 5712 | +extern int CIFSGetDFSRefer(const int xid, struct cifsSesInfo *ses, |
| 5713 | + const unsigned char *searchName, |
| 5714 | + unsigned char **targetUNCs, |
| 5715 | + unsigned int *number_of_UNC_in_array, |
| 5716 | + const struct nls_table *nls_codepage); |
| 5717 | + |
| 5718 | +extern int connect_to_dfs_path(int xid, struct cifsSesInfo *pSesInfo, |
| 5719 | + const char *old_path, |
| 5720 | + const struct nls_table *nls_codepage); |
| 5721 | +extern int get_dfs_path(int xid, struct cifsSesInfo *pSesInfo, |
| 5722 | + const char *old_path, const struct nls_table *nls_codepage, |
| 5723 | + unsigned int *pnum_referrals, unsigned char ** preferrals); |
| 5724 | +extern int CIFSSMBQFSInfo(const int xid, struct cifsTconInfo *tcon, |
| 5725 | + struct statfs *FSData, |
| 5726 | + const struct nls_table *nls_codepage); |
| 5727 | +extern int CIFSSMBQFSAttributeInfo(const int xid, |
| 5728 | + struct cifsTconInfo *tcon, |
| 5729 | + const struct nls_table *nls_codepage); |
| 5730 | +extern int CIFSSMBQFSDeviceInfo(const int xid, struct cifsTconInfo *tcon, |
| 5731 | + const struct nls_table *nls_codepage); |
| 5732 | +extern int CIFSSMBQFSUnixInfo(const int xid, struct cifsTconInfo *tcon, |
| 5733 | + const struct nls_table *nls_codepage); |
| 5734 | + |
| 5735 | +extern int CIFSSMBSetTimes(const int xid, struct cifsTconInfo *tcon, |
| 5736 | + char *fileName, FILE_BASIC_INFO * data, |
| 5737 | + const struct nls_table *nls_codepage); |
| 5738 | +extern int CIFSSMBSetEOF(const int xid, struct cifsTconInfo *tcon, |
| 5739 | + char *fileName, __u64 size,int setAllocationSizeFlag, |
| 5740 | + const struct nls_table *nls_codepage); |
| 5741 | +extern int CIFSSMBSetFileSize(const int xid, struct cifsTconInfo *tcon, |
| 5742 | + __u64 size, __u16 fileHandle,__u32 opener_pid, int AllocSizeFlag); |
| 5743 | +extern int CIFSSMBUnixSetPerms(const int xid, struct cifsTconInfo *pTcon, |
| 5744 | + char *full_path, __u64 mode, __u64 uid, |
| 5745 | + __u64 gid, dev_t dev, const struct nls_table *nls_codepage); |
| 5746 | + |
| 5747 | +extern int CIFSSMBMkDir(const int xid, struct cifsTconInfo *tcon, |
| 5748 | + const char *newName, |
| 5749 | + const struct nls_table *nls_codepage); |
| 5750 | +extern int CIFSSMBRmDir(const int xid, struct cifsTconInfo *tcon, |
| 5751 | + const char *name, const struct nls_table *nls_codepage); |
| 5752 | + |
| 5753 | +extern int CIFSSMBDelFile(const int xid, struct cifsTconInfo *tcon, |
| 5754 | + const char *name, |
| 5755 | + const struct nls_table *nls_codepage); |
| 5756 | +extern int CIFSSMBRename(const int xid, struct cifsTconInfo *tcon, |
| 5757 | + const char *fromName, const char *toName, |
| 5758 | + const struct nls_table *nls_codepage); |
| 5759 | +extern int CIFSSMBRenameOpenFile(const int xid,struct cifsTconInfo *pTcon, |
| 5760 | + int netfid, char * target_name, const struct nls_table *nls_codepage); |
| 5761 | +extern int CIFSCreateHardLink(const int xid, |
| 5762 | + struct cifsTconInfo *tcon, |
| 5763 | + const char *fromName, const char *toName, |
| 5764 | + const struct nls_table *nls_codepage); |
| 5765 | +extern int CIFSUnixCreateHardLink(const int xid, |
| 5766 | + struct cifsTconInfo *tcon, |
| 5767 | + const char *fromName, const char *toName, |
| 5768 | + const struct nls_table *nls_codepage); |
| 5769 | +extern int CIFSUnixCreateSymLink(const int xid, |
| 5770 | + struct cifsTconInfo *tcon, |
| 5771 | + const char *fromName, const char *toName, |
| 5772 | + const struct nls_table *nls_codepage); |
| 5773 | +extern int CIFSSMBUnixQuerySymLink(const int xid, |
| 5774 | + struct cifsTconInfo *tcon, |
| 5775 | + const unsigned char *searchName, |
| 5776 | + char *syminfo, const int buflen, |
| 5777 | + const struct nls_table *nls_codepage); |
| 5778 | +extern int CIFSSMBQueryReparseLinkInfo(const int xid, |
| 5779 | + struct cifsTconInfo *tcon, |
| 5780 | + const unsigned char *searchName, |
| 5781 | + char *symlinkinfo, const int buflen, __u16 fid, |
| 5782 | + const struct nls_table *nls_codepage); |
| 5783 | + |
| 5784 | +extern int CIFSSMBOpen(const int xid, struct cifsTconInfo *tcon, |
| 5785 | + const char *fileName, const int disposition, |
| 5786 | + const int access_flags, const int omode, |
| 5787 | + __u16 * netfid, int *pOplock, FILE_ALL_INFO *, |
| 5788 | + const struct nls_table *nls_codepage); |
| 5789 | +extern int CIFSSMBClose(const int xid, struct cifsTconInfo *tcon, |
| 5790 | + const int smb_file_id); |
| 5791 | + |
| 5792 | +extern int CIFSSMBRead(const int xid, struct cifsTconInfo *tcon, |
| 5793 | + const int netfid, unsigned int count, |
| 5794 | + const __u64 lseek, unsigned int *nbytes, char **buf); |
| 5795 | +extern int CIFSSMBWrite(const int xid, struct cifsTconInfo *tcon, |
| 5796 | + const int netfid, const unsigned int count, |
| 5797 | + const __u64 lseek, unsigned int *nbytes, |
| 5798 | + const char *buf, const int long_op); |
| 5799 | +extern int CIFSSMBLock(const int xid, struct cifsTconInfo *tcon, |
| 5800 | + const __u16 netfid, const __u64 len, |
| 5801 | + const __u64 offset, const __u32 numUnlock, |
| 5802 | + const __u32 numLock, const __u8 lockType, |
| 5803 | + const int waitFlag); |
| 5804 | + |
| 5805 | +extern int CIFSSMBTDis(const int xid, struct cifsTconInfo *tcon); |
| 5806 | +extern int CIFSSMBLogoff(const int xid, struct cifsSesInfo *ses); |
| 5807 | + |
| 5808 | +extern struct cifsSesInfo *sesInfoAlloc(void); |
| 5809 | +extern void sesInfoFree(struct cifsSesInfo *); |
| 5810 | +extern struct cifsTconInfo *tconInfoAlloc(void); |
| 5811 | +extern void tconInfoFree(struct cifsTconInfo *); |
| 5812 | + |
| 5813 | +extern int cifs_reconnect(struct TCP_Server_Info *server); |
| 5814 | + |
| 5815 | +extern int cifs_sign_smb(struct smb_hdr *, struct cifsSesInfo *,__u32 *); |
| 5816 | +extern int cifs_verify_signature(const struct smb_hdr *, const char * mac_key, |
| 5817 | + __u32 expected_sequence_number); |
| 5818 | +extern int cifs_calculate_mac_key(char * key,const char * rn,const char * pass); |
| 5819 | +extern void CalcNTLMv2_partial_mac_key(struct cifsSesInfo *, struct nls_table *); |
| 5820 | +extern void CalcNTLMv2_response(const struct cifsSesInfo *,char * ); |
| 5821 | + |
| 5822 | +extern int CIFSBuildServerList(int xid, char *serverBufferList, |
| 5823 | + int recordlength, int *entries, |
| 5824 | + int *totalEntries, int *topoChangedFlag); |
| 5825 | +extern int CIFSSMBQueryShares(int xid, struct cifsTconInfo *tcon, |
| 5826 | + struct shareInfo *shareList, int bufferLen, |
| 5827 | + int *entries, int *totalEntries); |
| 5828 | +extern int CIFSSMBQueryAlias(int xid, struct cifsTconInfo *tcon, |
| 5829 | + struct aliasInfo *aliasList, int bufferLen, |
| 5830 | + int *entries, int *totalEntries); |
| 5831 | +extern int CIFSSMBAliasInfo(int xid, struct cifsTconInfo *tcon, |
| 5832 | + char *aliasName, char *serverName, |
| 5833 | + char *shareName, char *comment); |
| 5834 | +extern int CIFSSMBGetShareInfo(int xid, struct cifsTconInfo *tcon, |
| 5835 | + char *share, char *comment); |
| 5836 | +extern int CIFSSMBGetUserPerms(int xid, struct cifsTconInfo *tcon, |
| 5837 | + char *userName, char *searchName, int *perms); |
| 5838 | +extern int CIFSSMBSync(int xid, struct cifsTconInfo *tcon, int netfid, int pid); |
| 5839 | + |
| 5840 | +extern int CIFSSMBSeek(int xid, |
| 5841 | + struct cifsTconInfo *tcon, |
| 5842 | + int netfid, |
| 5843 | + int pid, |
| 5844 | + int whence, unsigned long offset, long long *newoffset); |
| 5845 | + |
| 5846 | +extern int CIFSSMBCopy(int xid, |
| 5847 | + struct cifsTconInfo *source_tcon, |
| 5848 | + const char *fromName, |
| 5849 | + const __u16 target_tid, |
| 5850 | + const char *toName, const int flags, |
| 5851 | + const struct nls_table *nls_codepage); |
| 5852 | +extern int CIFSSMBNotify(const int xid, struct cifsTconInfo *tcon, |
| 5853 | + const int notify_subdirs,const __u16 netfid,__u32 filter, |
| 5854 | + const struct nls_table *nls_codepage); |
| 5855 | +extern int CIFSSMBQAllEAs(const int xid, struct cifsTconInfo *tcon, |
| 5856 | + const unsigned char *searchName, |
| 5857 | + char * EAData, size_t size, |
| 5858 | + const struct nls_table *nls_codepage); |
| 5859 | +#endif /* _CIFSPROTO_H */ |
| 5860 | --- /dev/null |
| 5861 | +++ b/fs/cifs/cifssmb.c |
| 5862 | @@ -0,0 +1,3016 @@ |
| 5863 | +/* |
| 5864 | + * fs/cifs/cifssmb.c |
| 5865 | + * |
| 5866 | + * Copyright (C) International Business Machines Corp., 2002,2003 |
| 5867 | + * Author(s): Steve French (sfrench@us.ibm.com) |
| 5868 | + * |
| 5869 | + * Contains the routines for constructing the SMB PDUs themselves |
| 5870 | + * |
| 5871 | + * This library is free software; you can redistribute it and/or modify |
| 5872 | + * it under the terms of the GNU Lesser General Public License as published |
| 5873 | + * by the Free Software Foundation; either version 2.1 of the License, or |
| 5874 | + * (at your option) any later version. |
| 5875 | + * |
| 5876 | + * This library is distributed in the hope that it will be useful, |
| 5877 | + * but WITHOUT ANY WARRANTY; without even the implied warranty of |
| 5878 | + * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See |
| 5879 | + * the GNU Lesser General Public License for more details. |
| 5880 | + * |
| 5881 | + * You should have received a copy of the GNU Lesser General Public License |
| 5882 | + * along with this library; if not, write to the Free Software |
| 5883 | + * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA |
| 5884 | + */ |
| 5885 | + |
| 5886 | + /* SMB/CIFS PDU handling routines here - except for leftovers in connect.c */ |
| 5887 | + /* These are mostly routines that operate on a pathname, or on a tree id */ |
| 5888 | + /* (mounted volume), but there are eight handle based routines which must be */ |
| 5889 | + /* treated slightly different for reconnection purposes since we never want */ |
| 5890 | + /* to reuse a stale file handle and the caller knows the file handle */ |
| 5891 | + |
| 5892 | +#include <linux/fs.h> |
| 5893 | +#include <linux/kernel.h> |
| 5894 | +#include <linux/vfs.h> |
| 5895 | +#include <asm/uaccess.h> |
| 5896 | +#include "cifspdu.h" |
| 5897 | +#include "cifsglob.h" |
| 5898 | +#include "cifsproto.h" |
| 5899 | +#include "cifs_unicode.h" |
| 5900 | +#include "cifs_debug.h" |
| 5901 | + |
| 5902 | +#ifdef CONFIG_CIFS_POSIX |
| 5903 | +static struct { |
| 5904 | + int index; |
| 5905 | + char *name; |
| 5906 | +} protocols[] = { |
| 5907 | + {CIFS_PROT, "\2NT LM 0.12"}, |
| 5908 | + {CIFS_PROT, "\2POSIX 2"}, |
| 5909 | + {BAD_PROT, "\2"} |
| 5910 | +}; |
| 5911 | +#else |
| 5912 | +static struct { |
| 5913 | + int index; |
| 5914 | + char *name; |
| 5915 | +} protocols[] = { |
| 5916 | + {CIFS_PROT, "\2NT LM 0.12"}, |
| 5917 | + {BAD_PROT, "\2"} |
| 5918 | +}; |
| 5919 | +#endif |
| 5920 | + |
| 5921 | + |
| 5922 | +/* Mark as invalid, all open files on tree connections since they |
| 5923 | + were closed when session to server was lost */ |
| 5924 | +static void mark_open_files_invalid(struct cifsTconInfo * pTcon) |
| 5925 | +{ |
| 5926 | + struct cifsFileInfo *open_file = NULL; |
| 5927 | + struct list_head * tmp; |
| 5928 | + struct list_head * tmp1; |
| 5929 | + |
| 5930 | +/* list all files open on tree connection and mark them invalid */ |
| 5931 | + write_lock(&GlobalSMBSeslock); |
| 5932 | + list_for_each_safe(tmp, tmp1, &pTcon->openFileList) { |
| 5933 | + open_file = list_entry(tmp,struct cifsFileInfo, tlist); |
| 5934 | + if(open_file) { |
| 5935 | + open_file->invalidHandle = TRUE; |
| 5936 | + } |
| 5937 | + } |
| 5938 | + write_unlock(&GlobalSMBSeslock); |
| 5939 | + /* BB Add call to invalidate_inodes(sb) for all superblocks mounted to this tcon */ |
| 5940 | +} |
| 5941 | + |
| 5942 | +static int |
| 5943 | +smb_init(int smb_command, int wct, struct cifsTconInfo *tcon, |
| 5944 | + void **request_buf /* returned */ , |
| 5945 | + void **response_buf /* returned */ ) |
| 5946 | +{ |
| 5947 | + int rc = 0; |
| 5948 | + int timeout = 10 * HZ; |
| 5949 | + |
| 5950 | + /* SMBs NegProt, SessSetup, uLogoff do not have tcon yet so |
| 5951 | + check for tcp and smb session status done differently |
| 5952 | + for those three - in the calling routine */ |
| 5953 | + if(tcon) { |
| 5954 | + if((tcon->ses) && (tcon->ses->server)){ |
| 5955 | + struct nls_table *nls_codepage; |
| 5956 | + /* Give Demultiplex thread up to 10 seconds to |
| 5957 | + reconnect, should be greater than cifs socket |
| 5958 | + timeout which is 7 seconds */ |
| 5959 | + while(tcon->ses->server->tcpStatus == CifsNeedReconnect) { |
| 5960 | + while ((tcon->ses->server->tcpStatus != CifsGood) && (timeout > 0)){ |
| 5961 | + timeout = interruptible_sleep_on_timeout(&tcon->ses->server->response_q,timeout); |
| 5962 | + } |
| 5963 | + if(tcon->ses->server->tcpStatus == CifsNeedReconnect) { |
| 5964 | + /* on "soft" mounts we wait once */ |
| 5965 | + if((tcon->retry == FALSE) || |
| 5966 | + (tcon->ses->status == CifsExiting)) { |
| 5967 | + cFYI(1,("gave up waiting on reconnect in smb_init")); |
| 5968 | + return -EHOSTDOWN; |
| 5969 | + } /* else "hard" mount - keep retrying until |
| 5970 | + process is killed or server comes back up */ |
| 5971 | + } else /* TCP session is reestablished now */ |
| 5972 | + break; |
| 5973 | + |
| 5974 | + } |
| 5975 | + |
| 5976 | + nls_codepage = load_nls_default(); |
| 5977 | + /* need to prevent multiple threads trying to |
| 5978 | + simultaneously reconnect the same SMB session */ |
| 5979 | + down(&tcon->ses->sesSem); |
| 5980 | + if(tcon->ses->status == CifsNeedReconnect) |
| 5981 | + rc = cifs_setup_session(0, tcon->ses, nls_codepage); |
| 5982 | + if(!rc && (tcon->tidStatus == CifsNeedReconnect)) { |
| 5983 | + mark_open_files_invalid(tcon); |
| 5984 | + rc = CIFSTCon(0, tcon->ses, tcon->treeName, tcon, |
| 5985 | + nls_codepage); |
| 5986 | + up(&tcon->ses->sesSem); |
| 5987 | + if(rc == 0) |
| 5988 | + atomic_inc(&tconInfoReconnectCount); |
| 5989 | + |
| 5990 | + cFYI(1, ("reconnect tcon rc = %d", rc)); |
| 5991 | + /* Removed call to reopen open files here - |
| 5992 | + it is safer (and faster) to reopen files |
| 5993 | + one at a time as needed in read and write */ |
| 5994 | + |
| 5995 | + /* Check if handle based operation so we |
| 5996 | + know whether we can continue or not without |
| 5997 | + returning to caller to reset file handle */ |
| 5998 | + switch(smb_command) { |
| 5999 | + case SMB_COM_READ_ANDX: |
| 6000 | + case SMB_COM_WRITE_ANDX: |
| 6001 | + case SMB_COM_CLOSE: |
| 6002 | + case SMB_COM_FIND_CLOSE2: |
| 6003 | + case SMB_COM_LOCKING_ANDX: { |
| 6004 | + unload_nls(nls_codepage); |
| 6005 | + return -EAGAIN; |
| 6006 | + } |
| 6007 | + } |
| 6008 | + } else { |
| 6009 | + up(&tcon->ses->sesSem); |
| 6010 | + } |
| 6011 | + unload_nls(nls_codepage); |
| 6012 | + |
| 6013 | + } else { |
| 6014 | + return -EIO; |
| 6015 | + } |
| 6016 | + } |
| 6017 | + if(rc) |
| 6018 | + return rc; |
| 6019 | + |
| 6020 | + *request_buf = cifs_buf_get(); |
| 6021 | + if (*request_buf == 0) { |
| 6022 | + /* BB should we add a retry in here if not a writepage? */ |
| 6023 | + return -ENOMEM; |
| 6024 | + } |
| 6025 | + /* Although the original thought was we needed the response buf for */ |
| 6026 | + /* potential retries of smb operations it turns out we can determine */ |
| 6027 | + /* from the mid flags when the request buffer can be resent without */ |
| 6028 | + /* having to use a second distinct buffer for the response */ |
| 6029 | + *response_buf = *request_buf; |
| 6030 | + |
| 6031 | + header_assemble((struct smb_hdr *) *request_buf, smb_command, tcon, |
| 6032 | + wct /*wct */ ); |
| 6033 | + |
| 6034 | +#ifdef CONFIG_CIFS_STATS |
| 6035 | + if(tcon != NULL) { |
| 6036 | + atomic_inc(&tcon->num_smbs_sent); |
| 6037 | + } |
| 6038 | +#endif |
| 6039 | + return rc; |
| 6040 | +} |
| 6041 | + |
| 6042 | +int |
| 6043 | +CIFSSMBNegotiate(unsigned int xid, struct cifsSesInfo *ses) |
| 6044 | +{ |
| 6045 | + NEGOTIATE_REQ *pSMB; |
| 6046 | + NEGOTIATE_RSP *pSMBr; |
| 6047 | + int rc = 0; |
| 6048 | + int bytes_returned; |
| 6049 | + struct TCP_Server_Info * server; |
| 6050 | + |
| 6051 | + if(ses->server) |
| 6052 | + server = ses->server; |
| 6053 | + else { |
| 6054 | + rc = -EIO; |
| 6055 | + return rc; |
| 6056 | + } |
| 6057 | + rc = smb_init(SMB_COM_NEGOTIATE, 0, NULL /* no tcon yet */ , |
| 6058 | + (void **) &pSMB, (void **) &pSMBr); |
| 6059 | + if (rc) |
| 6060 | + return rc; |
| 6061 | + |
| 6062 | + pSMB->hdr.Flags2 |= SMBFLG2_UNICODE; |
| 6063 | + if (extended_security) |
| 6064 | + pSMB->hdr.Flags2 |= SMBFLG2_EXT_SEC; |
| 6065 | + |
| 6066 | + pSMB->ByteCount = strlen(protocols[0].name) + 1; |
| 6067 | + strncpy(pSMB->DialectsArray, protocols[0].name, 30); |
| 6068 | + /* null guaranteed to be at end of source and target buffers anyway */ |
| 6069 | + |
| 6070 | + pSMB->hdr.smb_buf_length += pSMB->ByteCount; |
| 6071 | + pSMB->ByteCount = cpu_to_le16(pSMB->ByteCount); |
| 6072 | + |
| 6073 | + rc = SendReceive(xid, ses, (struct smb_hdr *) pSMB, |
| 6074 | + (struct smb_hdr *) pSMBr, &bytes_returned, 0); |
| 6075 | + if (rc == 0) { |
| 6076 | + server->secMode = pSMBr->SecurityMode; |
| 6077 | + server->secType = NTLM; /* BB override default for NTLMv2 or krb*/ |
| 6078 | + /* one byte - no need to convert this or EncryptionKeyLen from le,*/ |
| 6079 | + server->maxReq = le16_to_cpu(pSMBr->MaxMpxCount); |
| 6080 | + /* probably no need to store and check maxvcs */ |
| 6081 | + server->maxBuf = |
| 6082 | + min(le32_to_cpu(pSMBr->MaxBufferSize), |
| 6083 | + (__u32) CIFS_MAX_MSGSIZE + MAX_CIFS_HDR_SIZE); |
| 6084 | + server->maxRw = le32_to_cpu(pSMBr->MaxRawSize); |
| 6085 | + cFYI(0, ("Max buf = %d ", ses->server->maxBuf)); |
| 6086 | + GETU32(ses->server->sessid) = le32_to_cpu(pSMBr->SessionKey); |
| 6087 | + server->capabilities = le32_to_cpu(pSMBr->Capabilities); |
| 6088 | + server->timeZone = le16_to_cpu(pSMBr->ServerTimeZone); |
| 6089 | + /* BB with UTC do we ever need to be using srvr timezone? */ |
| 6090 | + if (pSMBr->EncryptionKeyLength == CIFS_CRYPTO_KEY_SIZE) { |
| 6091 | + memcpy(server->cryptKey, pSMBr->u.EncryptionKey, |
| 6092 | + CIFS_CRYPTO_KEY_SIZE); |
| 6093 | + } else if ((pSMBr->hdr.Flags2 & SMBFLG2_EXT_SEC) |
| 6094 | + && (pSMBr->EncryptionKeyLength == 0)) { |
| 6095 | + /* decode security blob */ |
| 6096 | + } else |
| 6097 | + rc = -EIO; |
| 6098 | + |
| 6099 | + /* BB might be helpful to save off the domain of server here */ |
| 6100 | + |
| 6101 | + if (pSMBr->hdr.Flags2 & SMBFLG2_EXT_SEC) { |
| 6102 | + if (pSMBr->ByteCount < 16) |
| 6103 | + rc = -EIO; |
| 6104 | + else if (pSMBr->ByteCount == 16) { |
| 6105 | + server->secType = RawNTLMSSP; |
| 6106 | + if (server->socketUseCount.counter > 1) { |
| 6107 | + if (memcmp |
| 6108 | + (server->server_GUID, |
| 6109 | + pSMBr->u.extended_response. |
| 6110 | + GUID, 16) != 0) { |
| 6111 | + cFYI(1, |
| 6112 | + ("UID of server does not match previous connection to same ip address")); |
| 6113 | + memcpy(server-> |
| 6114 | + server_GUID, |
| 6115 | + pSMBr->u. |
| 6116 | + extended_response. |
| 6117 | + GUID, 16); |
| 6118 | + } |
| 6119 | + } else |
| 6120 | + memcpy(server->server_GUID, |
| 6121 | + pSMBr->u.extended_response. |
| 6122 | + GUID, 16); |
| 6123 | + } else { |
| 6124 | + rc = decode_negTokenInit(pSMBr->u. |
| 6125 | + extended_response. |
| 6126 | + SecurityBlob, |
| 6127 | + pSMBr->ByteCount - |
| 6128 | + 16, &server->secType); |
| 6129 | + } |
| 6130 | + } else |
| 6131 | + server->capabilities &= ~CAP_EXTENDED_SECURITY; |
| 6132 | + if(sign_CIFS_PDUs == FALSE) { |
| 6133 | + if(server->secMode & SECMODE_SIGN_REQUIRED) |
| 6134 | + cERROR(1, |
| 6135 | + ("Server requires /proc/fs/cifs/PacketSigningEnabled")); |
| 6136 | + server->secMode &= ~(SECMODE_SIGN_ENABLED | SECMODE_SIGN_REQUIRED); |
| 6137 | + } else if(sign_CIFS_PDUs == 1) { |
| 6138 | + if((server->secMode & SECMODE_SIGN_REQUIRED) == 0) |
| 6139 | + server->secMode &= ~(SECMODE_SIGN_ENABLED | SECMODE_SIGN_REQUIRED); |
| 6140 | + } |
| 6141 | + |
| 6142 | + } |
| 6143 | + if (pSMB) |
| 6144 | + cifs_buf_release(pSMB); |
| 6145 | + return rc; |
| 6146 | +} |
| 6147 | + |
| 6148 | +int |
| 6149 | +CIFSSMBTDis(const int xid, struct cifsTconInfo *tcon) |
| 6150 | +{ |
| 6151 | + struct smb_hdr *smb_buffer; |
| 6152 | + struct smb_hdr *smb_buffer_response; |
| 6153 | + int rc = 0; |
| 6154 | + int length; |
| 6155 | + |
| 6156 | + cFYI(1, ("In tree disconnect")); |
| 6157 | + /* |
| 6158 | + * If last user of the connection and |
| 6159 | + * connection alive - disconnect it |
| 6160 | + * If this is the last connection on the server session disconnect it |
| 6161 | + * (and inside session disconnect we should check if tcp socket needs |
| 6162 | + * to be freed and kernel thread woken up). |
| 6163 | + */ |
| 6164 | + if (tcon) |
| 6165 | + down(&tcon->tconSem); |
| 6166 | + else |
| 6167 | + return -EIO; |
| 6168 | + |
| 6169 | + atomic_dec(&tcon->useCount); |
| 6170 | + if (atomic_read(&tcon->useCount) > 0) { |
| 6171 | + up(&tcon->tconSem); |
| 6172 | + return -EBUSY; |
| 6173 | + } |
| 6174 | + |
| 6175 | + /* No need to return error on this operation if tid invalidated and |
| 6176 | + closed on server already e.g. due to tcp session crashing */ |
| 6177 | + if(tcon->tidStatus == CifsNeedReconnect) { |
| 6178 | + up(&tcon->tconSem); |
| 6179 | + return 0; |
| 6180 | + } |
| 6181 | + |
| 6182 | + if((tcon->ses == 0) || (tcon->ses->server == 0)) { |
| 6183 | + up(&tcon->tconSem); |
| 6184 | + return -EIO; |
| 6185 | + } |
| 6186 | + |
| 6187 | + rc = smb_init(SMB_COM_TREE_DISCONNECT, 0, tcon, |
| 6188 | + (void **) &smb_buffer, (void **) &smb_buffer_response); |
| 6189 | + if (rc) { |
| 6190 | + up(&tcon->tconSem); |
| 6191 | + return rc; |
| 6192 | + } |
| 6193 | + rc = SendReceive(xid, tcon->ses, smb_buffer, smb_buffer_response, |
| 6194 | + &length, 0); |
| 6195 | + if (rc) |
| 6196 | + cFYI(1, (" Tree disconnect failed %d", rc)); |
| 6197 | + |
| 6198 | + if (smb_buffer) |
| 6199 | + cifs_buf_release(smb_buffer); |
| 6200 | + up(&tcon->tconSem); |
| 6201 | + |
| 6202 | + /* No need to return error on this operation if tid invalidated and |
| 6203 | + closed on server already e.g. due to tcp session crashing */ |
| 6204 | + if (rc == -EAGAIN) |
| 6205 | + rc = 0; |
| 6206 | + |
| 6207 | + return rc; |
| 6208 | +} |
| 6209 | + |
| 6210 | +int |
| 6211 | +CIFSSMBLogoff(const int xid, struct cifsSesInfo *ses) |
| 6212 | +{ |
| 6213 | + struct smb_hdr *smb_buffer_response; |
| 6214 | + LOGOFF_ANDX_REQ *pSMB; |
| 6215 | + int rc = 0; |
| 6216 | + int length; |
| 6217 | + |
| 6218 | + cFYI(1, ("In SMBLogoff for session disconnect")); |
| 6219 | + if (ses) |
| 6220 | + down(&ses->sesSem); |
| 6221 | + else |
| 6222 | + return -EIO; |
| 6223 | + |
| 6224 | + atomic_dec(&ses->inUse); |
| 6225 | + if (atomic_read(&ses->inUse) > 0) { |
| 6226 | + up(&ses->sesSem); |
| 6227 | + return -EBUSY; |
| 6228 | + } |
| 6229 | + |
| 6230 | + rc = smb_init(SMB_COM_LOGOFF_ANDX, 2, NULL /* no tcon anymore */, |
| 6231 | + (void **) &pSMB, (void **) &smb_buffer_response); |
| 6232 | + |
| 6233 | + if(ses->server->secMode & (SECMODE_SIGN_REQUIRED | SECMODE_SIGN_ENABLED)) |
| 6234 | + pSMB->hdr.Flags2 |= SMBFLG2_SECURITY_SIGNATURE; |
| 6235 | + |
| 6236 | + if (rc) { |
| 6237 | + up(&ses->sesSem); |
| 6238 | + return rc; |
| 6239 | + } |
| 6240 | + |
| 6241 | + pSMB->hdr.Uid = ses->Suid; |
| 6242 | + |
| 6243 | + pSMB->AndXCommand = 0xFF; |
| 6244 | + rc = SendReceive(xid, ses, (struct smb_hdr *) pSMB, |
| 6245 | + smb_buffer_response, &length, 0); |
| 6246 | + if (ses->server) { |
| 6247 | + atomic_dec(&ses->server->socketUseCount); |
| 6248 | + if (atomic_read(&ses->server->socketUseCount) == 0) { |
| 6249 | + spin_lock(&GlobalMid_Lock); |
| 6250 | + ses->server->tcpStatus = CifsExiting; |
| 6251 | + spin_unlock(&GlobalMid_Lock); |
| 6252 | + rc = -ESHUTDOWN; |
| 6253 | + } |
| 6254 | + } |
| 6255 | + if (pSMB) |
| 6256 | + cifs_buf_release(pSMB); |
| 6257 | + up(&ses->sesSem); |
| 6258 | + |
| 6259 | + /* if session dead then we do not need to do ulogoff, |
| 6260 | + since server closed smb session, no sense reporting |
| 6261 | + error */ |
| 6262 | + if (rc == -EAGAIN) |
| 6263 | + rc = 0; |
| 6264 | + return rc; |
| 6265 | +} |
| 6266 | + |
| 6267 | +int |
| 6268 | +CIFSSMBDelFile(const int xid, struct cifsTconInfo *tcon, |
| 6269 | + const char *fileName, const struct nls_table *nls_codepage) |
| 6270 | +{ |
| 6271 | + DELETE_FILE_REQ *pSMB = NULL; |
| 6272 | + DELETE_FILE_RSP *pSMBr = NULL; |
| 6273 | + int rc = 0; |
| 6274 | + int bytes_returned; |
| 6275 | + int name_len; |
| 6276 | + |
| 6277 | +DelFileRetry: |
| 6278 | + rc = smb_init(SMB_COM_DELETE, 1, tcon, (void **) &pSMB, |
| 6279 | + (void **) &pSMBr); |
| 6280 | + if (rc) |
| 6281 | + return rc; |
| 6282 | + |
| 6283 | + if (pSMB->hdr.Flags2 & SMBFLG2_UNICODE) { |
| 6284 | + name_len = |
| 6285 | + cifs_strtoUCS((wchar_t *) pSMB->fileName, fileName, 530 |
| 6286 | + /* find define for this maxpathcomponent */ |
| 6287 | + , nls_codepage); |
| 6288 | + name_len++; /* trailing null */ |
| 6289 | + name_len *= 2; |
| 6290 | + } else { /* BB improve the check for buffer overruns BB */ |
| 6291 | + name_len = strnlen(fileName, 530); |
| 6292 | + name_len++; /* trailing null */ |
| 6293 | + strncpy(pSMB->fileName, fileName, name_len); |
| 6294 | + } |
| 6295 | + pSMB->SearchAttributes = |
| 6296 | + cpu_to_le16(ATTR_READONLY | ATTR_HIDDEN | ATTR_SYSTEM); |
| 6297 | + pSMB->ByteCount = name_len + 1; |
| 6298 | + pSMB->BufferFormat = 0x04; |
| 6299 | + pSMB->hdr.smb_buf_length += pSMB->ByteCount; |
| 6300 | + pSMB->ByteCount = cpu_to_le16(pSMB->ByteCount); |
| 6301 | + rc = SendReceive(xid, tcon->ses, (struct smb_hdr *) pSMB, |
| 6302 | + (struct smb_hdr *) pSMBr, &bytes_returned, 0); |
| 6303 | + if (rc) { |
| 6304 | + cFYI(1, ("Error in RMFile = %d", rc)); |
| 6305 | + } |
| 6306 | +#ifdef CONFIG_CIFS_STATS |
| 6307 | + else { |
| 6308 | + atomic_inc(&tcon->num_deletes); |
| 6309 | + } |
| 6310 | +#endif |
| 6311 | + |
| 6312 | + if (pSMB) |
| 6313 | + cifs_buf_release(pSMB); |
| 6314 | + if (rc == -EAGAIN) |
| 6315 | + goto DelFileRetry; |
| 6316 | + |
| 6317 | + return rc; |
| 6318 | +} |
| 6319 | + |
| 6320 | +int |
| 6321 | +CIFSSMBRmDir(const int xid, struct cifsTconInfo *tcon, |
| 6322 | + const char *dirName, const struct nls_table *nls_codepage) |
| 6323 | +{ |
| 6324 | + DELETE_DIRECTORY_REQ *pSMB = NULL; |
| 6325 | + DELETE_DIRECTORY_RSP *pSMBr = NULL; |
| 6326 | + int rc = 0; |
| 6327 | + int bytes_returned; |
| 6328 | + int name_len; |
| 6329 | + |
| 6330 | + cFYI(1, ("In CIFSSMBRmDir")); |
| 6331 | +RmDirRetry: |
| 6332 | + rc = smb_init(SMB_COM_DELETE_DIRECTORY, 0, tcon, (void **) &pSMB, |
| 6333 | + (void **) &pSMBr); |
| 6334 | + if (rc) |
| 6335 | + return rc; |
| 6336 | + |
| 6337 | + if (pSMB->hdr.Flags2 & SMBFLG2_UNICODE) { |
| 6338 | + name_len = cifs_strtoUCS((wchar_t *) pSMB->DirName, dirName, 530 |
| 6339 | + /* find define for this maxpathcomponent */ |
| 6340 | + , nls_codepage); |
| 6341 | + name_len++; /* trailing null */ |
| 6342 | + name_len *= 2; |
| 6343 | + } else { /* BB improve the check for buffer overruns BB */ |
| 6344 | + name_len = strnlen(dirName, 530); |
| 6345 | + name_len++; /* trailing null */ |
| 6346 | + strncpy(pSMB->DirName, dirName, name_len); |
| 6347 | + } |
| 6348 | + |
| 6349 | + pSMB->ByteCount = name_len + 1; |
| 6350 | + pSMB->BufferFormat = 0x04; |
| 6351 | + pSMB->hdr.smb_buf_length += pSMB->ByteCount; |
| 6352 | + pSMB->ByteCount = cpu_to_le16(pSMB->ByteCount); |
| 6353 | + rc = SendReceive(xid, tcon->ses, (struct smb_hdr *) pSMB, |
| 6354 | + (struct smb_hdr *) pSMBr, &bytes_returned, 0); |
| 6355 | + if (rc) { |
| 6356 | + cFYI(1, ("Error in RMDir = %d", rc)); |
| 6357 | + } |
| 6358 | +#ifdef CONFIG_CIFS_STATS |
| 6359 | + else { |
| 6360 | + atomic_inc(&tcon->num_rmdirs); |
| 6361 | + } |
| 6362 | +#endif |
| 6363 | + |
| 6364 | + if (pSMB) |
| 6365 | + cifs_buf_release(pSMB); |
| 6366 | + if (rc == -EAGAIN) |
| 6367 | + goto RmDirRetry; |
| 6368 | + return rc; |
| 6369 | +} |
| 6370 | + |
| 6371 | +int |
| 6372 | +CIFSSMBMkDir(const int xid, struct cifsTconInfo *tcon, |
| 6373 | + const char *name, const struct nls_table *nls_codepage) |
| 6374 | +{ |
| 6375 | + int rc = 0; |
| 6376 | + CREATE_DIRECTORY_REQ *pSMB = NULL; |
| 6377 | + CREATE_DIRECTORY_RSP *pSMBr = NULL; |
| 6378 | + int bytes_returned; |
| 6379 | + int name_len; |
| 6380 | + |
| 6381 | + cFYI(1, ("In CIFSSMBMkDir")); |
| 6382 | +MkDirRetry: |
| 6383 | + rc = smb_init(SMB_COM_CREATE_DIRECTORY, 0, tcon, (void **) &pSMB, |
| 6384 | + (void **) &pSMBr); |
| 6385 | + if (rc) |
| 6386 | + return rc; |
| 6387 | + |
| 6388 | + if (pSMB->hdr.Flags2 & SMBFLG2_UNICODE) { |
| 6389 | + name_len = cifs_strtoUCS((wchar_t *) pSMB->DirName, name, 530 |
| 6390 | + /* find define for this maxpathcomponent */ |
| 6391 | + , nls_codepage); |
| 6392 | + name_len++; /* trailing null */ |
| 6393 | + name_len *= 2; |
| 6394 | + } else { /* BB improve the check for buffer overruns BB */ |
| 6395 | + name_len = strnlen(name, 530); |
| 6396 | + name_len++; /* trailing null */ |
| 6397 | + strncpy(pSMB->DirName, name, name_len); |
| 6398 | + } |
| 6399 | + |
| 6400 | + pSMB->ByteCount = name_len + 1 /* for buf format */ ; |
| 6401 | + pSMB->BufferFormat = 0x04; |
| 6402 | + pSMB->hdr.smb_buf_length += pSMB->ByteCount; |
| 6403 | + pSMB->ByteCount = cpu_to_le16(pSMB->ByteCount); |
| 6404 | + rc = SendReceive(xid, tcon->ses, (struct smb_hdr *) pSMB, |
| 6405 | + (struct smb_hdr *) pSMBr, &bytes_returned, 0); |
| 6406 | + if (rc) { |
| 6407 | + cFYI(1, ("Error in Mkdir = %d", rc)); |
| 6408 | + } |
| 6409 | +#ifdef CONFIG_CIFS_STATS |
| 6410 | + else { |
| 6411 | + atomic_inc(&tcon->num_mkdirs); |
| 6412 | + } |
| 6413 | +#endif |
| 6414 | + if (pSMB) |
| 6415 | + cifs_buf_release(pSMB); |
| 6416 | + if (rc == -EAGAIN) |
| 6417 | + goto MkDirRetry; |
| 6418 | + return rc; |
| 6419 | +} |
| 6420 | + |
| 6421 | +int |
| 6422 | +CIFSSMBOpen(const int xid, struct cifsTconInfo *tcon, |
| 6423 | + const char *fileName, const int openDisposition, |
| 6424 | + const int access_flags, const int create_options, __u16 * netfid, |
| 6425 | + int *pOplock, FILE_ALL_INFO * pfile_info, |
| 6426 | + const struct nls_table *nls_codepage) |
| 6427 | +{ |
| 6428 | + int rc = -EACCES; |
| 6429 | + OPEN_REQ *pSMB = NULL; |
| 6430 | + OPEN_RSP *pSMBr = NULL; |
| 6431 | + int bytes_returned; |
| 6432 | + int name_len; |
| 6433 | + |
| 6434 | +openRetry: |
| 6435 | + rc = smb_init(SMB_COM_NT_CREATE_ANDX, 24, tcon, (void **) &pSMB, |
| 6436 | + (void **) &pSMBr); |
| 6437 | + if (rc) |
| 6438 | + return rc; |
| 6439 | + |
| 6440 | + pSMB->AndXCommand = 0xFF; /* none */ |
| 6441 | + |
| 6442 | + if (pSMB->hdr.Flags2 & SMBFLG2_UNICODE) { |
| 6443 | + pSMB->ByteCount = 1; /* account for one byte pad to word boundary */ |
| 6444 | + name_len = |
| 6445 | + cifs_strtoUCS((wchar_t *) (pSMB->fileName + 1), |
| 6446 | + fileName, 530 |
| 6447 | + /* find define for this maxpathcomponent */ |
| 6448 | + , nls_codepage); |
| 6449 | + name_len++; /* trailing null */ |
| 6450 | + name_len *= 2; |
| 6451 | + pSMB->NameLength = cpu_to_le16(name_len); |
| 6452 | + } else { /* BB improve the check for buffer overruns BB */ |
| 6453 | + pSMB->ByteCount = 0; /* no pad */ |
| 6454 | + name_len = strnlen(fileName, 530); |
| 6455 | + name_len++; /* trailing null */ |
| 6456 | + pSMB->NameLength = cpu_to_le16(name_len); |
| 6457 | + strncpy(pSMB->fileName, fileName, name_len); |
| 6458 | + } |
| 6459 | + if (*pOplock & REQ_OPLOCK) |
| 6460 | + pSMB->OpenFlags = cpu_to_le32(REQ_OPLOCK); |
| 6461 | + else if (*pOplock & REQ_BATCHOPLOCK) { |
| 6462 | + pSMB->OpenFlags = cpu_to_le32(REQ_BATCHOPLOCK); |
| 6463 | + } |
| 6464 | + pSMB->DesiredAccess = cpu_to_le32(access_flags); |
| 6465 | + pSMB->AllocationSize = 0; |
| 6466 | + pSMB->FileAttributes = ATTR_NORMAL; |
| 6467 | + /* XP does not handle ATTR_POSIX_SEMANTICS */ |
| 6468 | + /* but it helps speed up case sensitive checks for other |
| 6469 | + servers such as Samba */ |
| 6470 | + if (tcon->ses->capabilities & CAP_UNIX) |
| 6471 | + pSMB->FileAttributes |= ATTR_POSIX_SEMANTICS; |
| 6472 | + |
| 6473 | + /* if ((omode & S_IWUGO) == 0) |
| 6474 | + pSMB->FileAttributes |= ATTR_READONLY;*/ |
| 6475 | + /* Above line causes problems due to vfs splitting create into two |
| 6476 | + pieces - need to set mode after file created not while it is |
| 6477 | + being created */ |
| 6478 | + pSMB->FileAttributes = cpu_to_le32(pSMB->FileAttributes); |
| 6479 | + pSMB->ShareAccess = cpu_to_le32(FILE_SHARE_ALL); |
| 6480 | + pSMB->CreateDisposition = cpu_to_le32(openDisposition); |
| 6481 | + pSMB->CreateOptions = cpu_to_le32(create_options); |
| 6482 | + pSMB->ImpersonationLevel = cpu_to_le32(SECURITY_IMPERSONATION); /* BB ??*/ |
| 6483 | + pSMB->SecurityFlags = |
| 6484 | + cpu_to_le32(SECURITY_CONTEXT_TRACKING | SECURITY_EFFECTIVE_ONLY); |
| 6485 | + |
| 6486 | + pSMB->ByteCount += name_len; |
| 6487 | + pSMB->hdr.smb_buf_length += pSMB->ByteCount; |
| 6488 | + |
| 6489 | + pSMB->ByteCount = cpu_to_le16(pSMB->ByteCount); |
| 6490 | + /* long_op set to 1 to allow for oplock break timeouts */ |
| 6491 | + rc = SendReceive(xid, tcon->ses, (struct smb_hdr *) pSMB, |
| 6492 | + (struct smb_hdr *) pSMBr, &bytes_returned, 1); |
| 6493 | + if (rc) { |
| 6494 | + cFYI(1, ("Error in Open = %d", rc)); |
| 6495 | + } else { |
| 6496 | + *pOplock = pSMBr->OplockLevel; /* one byte no need to le_to_cpu */ |
| 6497 | + *netfid = pSMBr->Fid; /* cifs fid stays in le */ |
| 6498 | + /* Let caller know file was created so we can set the mode. */ |
| 6499 | + /* Do we care about the CreateAction in any other cases? */ |
| 6500 | + if(cpu_to_le32(FILE_CREATE) == pSMBr->CreateAction) |
| 6501 | + *pOplock |= CIFS_CREATE_ACTION; |
| 6502 | + if(pfile_info) { |
| 6503 | + memcpy((char *)pfile_info,(char *)&pSMBr->CreationTime, |
| 6504 | + 36 /* CreationTime to Attributes */); |
| 6505 | + /* the file_info buf is endian converted by caller */ |
| 6506 | + pfile_info->AllocationSize = pSMBr->AllocationSize; |
| 6507 | + pfile_info->EndOfFile = pSMBr->EndOfFile; |
| 6508 | + pfile_info->NumberOfLinks = cpu_to_le32(1); |
| 6509 | + } |
| 6510 | + |
| 6511 | +#ifdef CONFIG_CIFS_STATS |
| 6512 | + atomic_inc(&tcon->num_opens); |
| 6513 | +#endif |
| 6514 | + } |
| 6515 | + if (pSMB) |
| 6516 | + cifs_buf_release(pSMB); |
| 6517 | + if (rc == -EAGAIN) |
| 6518 | + goto openRetry; |
| 6519 | + return rc; |
| 6520 | +} |
| 6521 | + |
| 6522 | +/* If no buffer passed in, then caller wants to do the copy |
| 6523 | + as in the case of readpages so the SMB buffer must be |
| 6524 | + freed by the caller */ |
| 6525 | + |
| 6526 | +int |
| 6527 | +CIFSSMBRead(const int xid, struct cifsTconInfo *tcon, |
| 6528 | + const int netfid, const unsigned int count, |
| 6529 | + const __u64 lseek, unsigned int *nbytes, char **buf) |
| 6530 | +{ |
| 6531 | + int rc = -EACCES; |
| 6532 | + READ_REQ *pSMB = NULL; |
| 6533 | + READ_RSP *pSMBr = NULL; |
| 6534 | + char *pReadData = NULL; |
| 6535 | + int bytes_returned; |
| 6536 | + |
| 6537 | + *nbytes = 0; |
| 6538 | + rc = smb_init(SMB_COM_READ_ANDX, 12, tcon, (void **) &pSMB, |
| 6539 | + (void **) &pSMBr); |
| 6540 | + if (rc) |
| 6541 | + return rc; |
| 6542 | + |
| 6543 | + /* tcon and ses pointer are checked in smb_init */ |
| 6544 | + if (tcon->ses->server == NULL) |
| 6545 | + return -ECONNABORTED; |
| 6546 | + |
| 6547 | + pSMB->AndXCommand = 0xFF; /* none */ |
| 6548 | + pSMB->Fid = netfid; |
| 6549 | + pSMB->OffsetLow = cpu_to_le32(lseek & 0xFFFFFFFF); |
| 6550 | + pSMB->OffsetHigh = cpu_to_le32(lseek >> 32); |
| 6551 | + pSMB->Remaining = 0; |
| 6552 | + pSMB->MaxCount = cpu_to_le16(count); |
| 6553 | + pSMB->MaxCountHigh = 0; |
| 6554 | + pSMB->ByteCount = 0; /* no need to do le conversion since it is 0 */ |
| 6555 | + |
| 6556 | + rc = SendReceive(xid, tcon->ses, (struct smb_hdr *) pSMB, |
| 6557 | + (struct smb_hdr *) pSMBr, &bytes_returned, 0); |
| 6558 | + if (rc) { |
| 6559 | + cERROR(1, ("Send error in read = %d", rc)); |
| 6560 | + } else { |
| 6561 | + pSMBr->DataLength = le16_to_cpu(pSMBr->DataLength); |
| 6562 | + *nbytes = pSMBr->DataLength; |
| 6563 | + /*check that DataLength would not go beyond end of SMB */ |
| 6564 | + if ((pSMBr->DataLength > CIFS_MAX_MSGSIZE) |
| 6565 | + || (pSMBr->DataLength > count)) { |
| 6566 | + cFYI(1,("bad length %d for count %d",pSMBr->DataLength,count)); |
| 6567 | + rc = -EIO; |
| 6568 | + *nbytes = 0; |
| 6569 | + } else { |
| 6570 | + pReadData = |
| 6571 | + (char *) (&pSMBr->hdr.Protocol) + |
| 6572 | + le16_to_cpu(pSMBr->DataOffset); |
| 6573 | +/* if(rc = copy_to_user(buf, pReadData, pSMBr->DataLength)) { |
| 6574 | + cERROR(1,("Faulting on read rc = %d",rc)); |
| 6575 | + rc = -EFAULT; |
| 6576 | + }*/ /* can not use copy_to_user when using page cache*/ |
| 6577 | + if(*buf) |
| 6578 | + memcpy(*buf,pReadData,pSMBr->DataLength); |
| 6579 | + } |
| 6580 | + } |
| 6581 | + if (pSMB) { |
| 6582 | + if(*buf) |
| 6583 | + cifs_buf_release(pSMB); |
| 6584 | + else |
| 6585 | + *buf = (char *)pSMB; |
| 6586 | + } |
| 6587 | + |
| 6588 | + /* Note: On -EAGAIN error only caller can retry on handle based calls |
| 6589 | + since file handle passed in no longer valid */ |
| 6590 | + return rc; |
| 6591 | +} |
| 6592 | + |
| 6593 | +int |
| 6594 | +CIFSSMBWrite(const int xid, struct cifsTconInfo *tcon, |
| 6595 | + const int netfid, const unsigned int count, |
| 6596 | + const __u64 offset, unsigned int *nbytes, const char *buf, |
| 6597 | + const int long_op) |
| 6598 | +{ |
| 6599 | + int rc = -EACCES; |
| 6600 | + WRITE_REQ *pSMB = NULL; |
| 6601 | + WRITE_RSP *pSMBr = NULL; |
| 6602 | + int bytes_returned; |
| 6603 | + |
| 6604 | + rc = smb_init(SMB_COM_WRITE_ANDX, 14, tcon, (void **) &pSMB, |
| 6605 | + (void **) &pSMBr); |
| 6606 | + if (rc) |
| 6607 | + return rc; |
| 6608 | + /* tcon and ses pointer are checked in smb_init */ |
| 6609 | + if (tcon->ses->server == NULL) |
| 6610 | + return -ECONNABORTED; |
| 6611 | + |
| 6612 | + pSMB->AndXCommand = 0xFF; /* none */ |
| 6613 | + pSMB->Fid = netfid; |
| 6614 | + pSMB->OffsetLow = cpu_to_le32(offset & 0xFFFFFFFF); |
| 6615 | + pSMB->OffsetHigh = cpu_to_le32(offset >> 32); |
| 6616 | + pSMB->Remaining = 0; |
| 6617 | + if (count > ((tcon->ses->server->maxBuf - MAX_CIFS_HDR_SIZE) & 0xFFFFFF00)) |
| 6618 | + pSMB->DataLengthLow = |
| 6619 | + (tcon->ses->server->maxBuf - MAX_CIFS_HDR_SIZE) & 0xFFFFFF00; |
| 6620 | + else |
| 6621 | + pSMB->DataLengthLow = count; |
| 6622 | + pSMB->DataLengthHigh = 0; |
| 6623 | + pSMB->DataOffset = |
| 6624 | + cpu_to_le16(offsetof(struct smb_com_write_req,Data) - 4); |
| 6625 | + |
| 6626 | + memcpy(pSMB->Data,buf,pSMB->DataLengthLow); |
| 6627 | + |
| 6628 | + pSMB->ByteCount += pSMB->DataLengthLow + 1 /* pad */ ; |
| 6629 | + pSMB->DataLengthLow = cpu_to_le16(pSMB->DataLengthLow); |
| 6630 | + pSMB->hdr.smb_buf_length += pSMB->ByteCount; |
| 6631 | + pSMB->ByteCount = cpu_to_le16(pSMB->ByteCount); |
| 6632 | + |
| 6633 | + rc = SendReceive(xid, tcon->ses, (struct smb_hdr *) pSMB, |
| 6634 | + (struct smb_hdr *) pSMBr, &bytes_returned, long_op); |
| 6635 | + if (rc) { |
| 6636 | + cFYI(1, ("Send error in write = %d", rc)); |
| 6637 | + *nbytes = 0; |
| 6638 | + } else |
| 6639 | + *nbytes = le16_to_cpu(pSMBr->Count); |
| 6640 | + |
| 6641 | + if (pSMB) |
| 6642 | + cifs_buf_release(pSMB); |
| 6643 | + |
| 6644 | + /* Note: On -EAGAIN error only caller can retry on handle based calls |
| 6645 | + since file handle passed in no longer valid */ |
| 6646 | + |
| 6647 | + return rc; |
| 6648 | +} |
| 6649 | + |
| 6650 | +int |
| 6651 | +CIFSSMBLock(const int xid, struct cifsTconInfo *tcon, |
| 6652 | + const __u16 smb_file_id, const __u64 len, |
| 6653 | + const __u64 offset, const __u32 numUnlock, |
| 6654 | + const __u32 numLock, const __u8 lockType, const int waitFlag) |
| 6655 | +{ |
| 6656 | + int rc = 0; |
| 6657 | + LOCK_REQ *pSMB = NULL; |
| 6658 | + LOCK_RSP *pSMBr = NULL; |
| 6659 | + int bytes_returned; |
| 6660 | + int timeout = 0; |
| 6661 | + __u64 temp; |
| 6662 | + |
| 6663 | + cFYI(1, ("In CIFSSMBLock - timeout %d numLock %d",waitFlag,numLock)); |
| 6664 | + rc = smb_init(SMB_COM_LOCKING_ANDX, 8, tcon, (void **) &pSMB, |
| 6665 | + (void **) &pSMBr); |
| 6666 | + if (rc) |
| 6667 | + return rc; |
| 6668 | + |
| 6669 | + if(lockType == LOCKING_ANDX_OPLOCK_RELEASE) { |
| 6670 | + timeout = -1; /* no response expected */ |
| 6671 | + pSMB->Timeout = 0; |
| 6672 | + } else if (waitFlag == TRUE) { |
| 6673 | + timeout = 3; /* blocking operation, no timeout */ |
| 6674 | + pSMB->Timeout = -1; /* blocking - do not time out */ |
| 6675 | + } else { |
| 6676 | + pSMB->Timeout = 0; |
| 6677 | + } |
| 6678 | + |
| 6679 | + pSMB->NumberOfLocks = cpu_to_le32(numLock); |
| 6680 | + pSMB->NumberOfUnlocks = cpu_to_le32(numUnlock); |
| 6681 | + pSMB->LockType = lockType; |
| 6682 | + pSMB->AndXCommand = 0xFF; /* none */ |
| 6683 | + pSMB->Fid = smb_file_id; /* netfid stays le */ |
| 6684 | + |
| 6685 | + if(numLock != 0) { |
| 6686 | + pSMB->Locks[0].Pid = cpu_to_le16(current->tgid); |
| 6687 | + /* BB where to store pid high? */ |
| 6688 | + temp = cpu_to_le64(len); |
| 6689 | + pSMB->Locks[0].LengthLow = (__u32)(temp & 0xFFFFFFFF); |
| 6690 | + pSMB->Locks[0].LengthHigh = (__u32)(temp>>32); |
| 6691 | + temp = cpu_to_le64(offset); |
| 6692 | + pSMB->Locks[0].OffsetLow = (__u32)(temp & 0xFFFFFFFF); |
| 6693 | + pSMB->Locks[0].OffsetHigh = (__u32)(temp>>32); |
| 6694 | + pSMB->ByteCount = sizeof (LOCKING_ANDX_RANGE); |
| 6695 | + } else { |
| 6696 | + /* oplock break */ |
| 6697 | + pSMB->ByteCount = 0; |
| 6698 | + } |
| 6699 | + pSMB->hdr.smb_buf_length += pSMB->ByteCount; |
| 6700 | + pSMB->ByteCount = cpu_to_le16(pSMB->ByteCount); |
| 6701 | + |
| 6702 | + rc = SendReceive(xid, tcon->ses, (struct smb_hdr *) pSMB, |
| 6703 | + (struct smb_hdr *) pSMBr, &bytes_returned, timeout); |
| 6704 | + |
| 6705 | + if (rc) { |
| 6706 | + cFYI(1, ("Send error in Lock = %d", rc)); |
| 6707 | + } |
| 6708 | + if (pSMB) |
| 6709 | + cifs_buf_release(pSMB); |
| 6710 | + |
| 6711 | + /* Note: On -EAGAIN error only caller can retry on handle based calls |
| 6712 | + since file handle passed in no longer valid */ |
| 6713 | + return rc; |
| 6714 | +} |
| 6715 | + |
| 6716 | +int |
| 6717 | +CIFSSMBClose(const int xid, struct cifsTconInfo *tcon, int smb_file_id) |
| 6718 | +{ |
| 6719 | + int rc = 0; |
| 6720 | + CLOSE_REQ *pSMB = NULL; |
| 6721 | + CLOSE_RSP *pSMBr = NULL; |
| 6722 | + int bytes_returned; |
| 6723 | + cFYI(1, ("In CIFSSMBClose")); |
| 6724 | + |
| 6725 | +/* do not retry on dead session on close */ |
| 6726 | + rc = smb_init(SMB_COM_CLOSE, 3, tcon, (void **) &pSMB, |
| 6727 | + (void **) &pSMBr); |
| 6728 | + if(rc == -EAGAIN) |
| 6729 | + return 0; |
| 6730 | + if (rc) |
| 6731 | + return rc; |
| 6732 | + |
| 6733 | + pSMB->FileID = (__u16) smb_file_id; |
| 6734 | + pSMB->LastWriteTime = 0; |
| 6735 | + pSMB->ByteCount = 0; |
| 6736 | + rc = SendReceive(xid, tcon->ses, (struct smb_hdr *) pSMB, |
| 6737 | + (struct smb_hdr *) pSMBr, &bytes_returned, 0); |
| 6738 | + if (rc) { |
| 6739 | + if(rc!=-EINTR) { |
| 6740 | + /* EINTR is expected when user ctl-c to kill app */ |
| 6741 | + cERROR(1, ("Send error in Close = %d", rc)); |
| 6742 | + } |
| 6743 | + } |
| 6744 | + if (pSMB) |
| 6745 | + cifs_buf_release(pSMB); |
| 6746 | + |
| 6747 | + /* Since session is dead, file will be closed on server already */ |
| 6748 | + if(rc == -EAGAIN) |
| 6749 | + rc = 0; |
| 6750 | + |
| 6751 | + return rc; |
| 6752 | +} |
| 6753 | + |
| 6754 | +int |
| 6755 | +CIFSSMBRename(const int xid, struct cifsTconInfo *tcon, |
| 6756 | + const char *fromName, const char *toName, |
| 6757 | + const struct nls_table *nls_codepage) |
| 6758 | +{ |
| 6759 | + int rc = 0; |
| 6760 | + RENAME_REQ *pSMB = NULL; |
| 6761 | + RENAME_RSP *pSMBr = NULL; |
| 6762 | + int bytes_returned; |
| 6763 | + int name_len, name_len2; |
| 6764 | + |
| 6765 | + cFYI(1, ("In CIFSSMBRename")); |
| 6766 | +renameRetry: |
| 6767 | + rc = smb_init(SMB_COM_RENAME, 1, tcon, (void **) &pSMB, |
| 6768 | + (void **) &pSMBr); |
| 6769 | + if (rc) |
| 6770 | + return rc; |
| 6771 | + |
| 6772 | + pSMB->BufferFormat = 0x04; |
| 6773 | + pSMB->SearchAttributes = |
| 6774 | + cpu_to_le16(ATTR_READONLY | ATTR_HIDDEN | ATTR_SYSTEM | |
| 6775 | + ATTR_DIRECTORY); |
| 6776 | + |
| 6777 | + if (pSMB->hdr.Flags2 & SMBFLG2_UNICODE) { |
| 6778 | + name_len = |
| 6779 | + cifs_strtoUCS((wchar_t *) pSMB->OldFileName, fromName, 530 |
| 6780 | + /* find define for this maxpathcomponent */ |
| 6781 | + , nls_codepage); |
| 6782 | + name_len++; /* trailing null */ |
| 6783 | + name_len *= 2; |
| 6784 | + pSMB->OldFileName[name_len] = 0x04; /* pad */ |
| 6785 | + /* protocol requires ASCII signature byte on Unicode string */ |
| 6786 | + pSMB->OldFileName[name_len + 1] = 0x00; |
| 6787 | + name_len2 = |
| 6788 | + cifs_strtoUCS((wchar_t *) & pSMB-> |
| 6789 | + OldFileName[name_len + 2], toName, 530, |
| 6790 | + nls_codepage); |
| 6791 | + name_len2 += 1 /* trailing null */ + 1 /* Signature word */ ; |
| 6792 | + name_len2 *= 2; /* convert to bytes */ |
| 6793 | + } else { /* BB improve the check for buffer overruns BB */ |
| 6794 | + name_len = strnlen(fromName, 530); |
| 6795 | + name_len++; /* trailing null */ |
| 6796 | + strncpy(pSMB->OldFileName, fromName, name_len); |
| 6797 | + name_len2 = strnlen(toName, 530); |
| 6798 | + name_len2++; /* trailing null */ |
| 6799 | + pSMB->OldFileName[name_len] = 0x04; /* 2nd buffer format */ |
| 6800 | + strncpy(&pSMB->OldFileName[name_len + 1], toName, name_len2); |
| 6801 | + name_len2++; /* trailing null */ |
| 6802 | + name_len2++; /* signature byte */ |
| 6803 | + } |
| 6804 | + |
| 6805 | + pSMB->ByteCount = 1 /* 1st signature byte */ + name_len + name_len2; |
| 6806 | + pSMB->hdr.smb_buf_length += pSMB->ByteCount; |
| 6807 | + pSMB->ByteCount = cpu_to_le16(pSMB->ByteCount); |
| 6808 | + |
| 6809 | + rc = SendReceive(xid, tcon->ses, (struct smb_hdr *) pSMB, |
| 6810 | + (struct smb_hdr *) pSMBr, &bytes_returned, 0); |
| 6811 | + if (rc) { |
| 6812 | + cFYI(1, ("Send error in rename = %d", rc)); |
| 6813 | + } |
| 6814 | + |
| 6815 | +#ifdef CONFIG_CIFS_STATS |
| 6816 | + else { |
| 6817 | + atomic_inc(&tcon->num_renames); |
| 6818 | + } |
| 6819 | +#endif |
| 6820 | + |
| 6821 | + if (pSMB) |
| 6822 | + cifs_buf_release(pSMB); |
| 6823 | + |
| 6824 | + if (rc == -EAGAIN) |
| 6825 | + goto renameRetry; |
| 6826 | + |
| 6827 | + return rc; |
| 6828 | +} |
| 6829 | + |
| 6830 | +int CIFSSMBRenameOpenFile(const int xid,struct cifsTconInfo *pTcon, |
| 6831 | + int netfid, char * target_name, const struct nls_table * nls_codepage) |
| 6832 | +{ |
| 6833 | + struct smb_com_transaction2_sfi_req *pSMB = NULL; |
| 6834 | + struct smb_com_transaction2_sfi_rsp *pSMBr = NULL; |
| 6835 | + struct set_file_rename * rename_info; |
| 6836 | + char *data_offset; |
| 6837 | + char dummy_string[30]; |
| 6838 | + int rc = 0; |
| 6839 | + int bytes_returned = 0; |
| 6840 | + int len_of_str; |
| 6841 | + |
| 6842 | + cFYI(1, ("Rename to File by handle")); |
| 6843 | + rc = smb_init(SMB_COM_TRANSACTION2, 15, pTcon, (void **) &pSMB, |
| 6844 | + (void **) &pSMBr); |
| 6845 | + if (rc) |
| 6846 | + return rc; |
| 6847 | + |
| 6848 | + pSMB->ParameterCount = 6; |
| 6849 | + pSMB->MaxSetupCount = 0; |
| 6850 | + pSMB->Reserved = 0; |
| 6851 | + pSMB->Flags = 0; |
| 6852 | + pSMB->Timeout = 0; |
| 6853 | + pSMB->Reserved2 = 0; |
| 6854 | + pSMB->ParameterOffset = offsetof(struct smb_com_transaction2_sfi_req, |
| 6855 | + Fid) - 4; |
| 6856 | + pSMB->DataOffset = pSMB->ParameterOffset + pSMB->ParameterCount; |
| 6857 | + |
| 6858 | + data_offset = (char *) (&pSMB->hdr.Protocol) + pSMB->DataOffset; |
| 6859 | + rename_info = (struct set_file_rename *) data_offset; |
| 6860 | + pSMB->MaxParameterCount = cpu_to_le16(2); |
| 6861 | + pSMB->MaxDataCount = cpu_to_le16(1000); /* BB find max SMB PDU from sess */ |
| 6862 | + pSMB->SetupCount = 1; |
| 6863 | + pSMB->Reserved3 = 0; |
| 6864 | + pSMB->SubCommand = cpu_to_le16(TRANS2_SET_FILE_INFORMATION); |
| 6865 | + pSMB->ByteCount = 3 /* pad */ + pSMB->ParameterCount; |
| 6866 | + pSMB->ParameterCount = cpu_to_le16(pSMB->ParameterCount); |
| 6867 | + pSMB->TotalParameterCount = pSMB->ParameterCount; |
| 6868 | + pSMB->ParameterOffset = cpu_to_le16(pSMB->ParameterOffset); |
| 6869 | + pSMB->DataOffset = cpu_to_le16(pSMB->DataOffset); |
| 6870 | + /* construct random name ".cifs_tmp<inodenum><mid>" */ |
| 6871 | + rename_info->overwrite = cpu_to_le32(1); |
| 6872 | + rename_info->root_fid = 0; |
| 6873 | + /* unicode only call */ |
| 6874 | + if(target_name == NULL) { |
| 6875 | + sprintf(dummy_string,"cifs%x",pSMB->hdr.Mid); |
| 6876 | + len_of_str = cifs_strtoUCS((wchar_t *) rename_info->target_name, dummy_string, 24, nls_codepage); |
| 6877 | + } else { |
| 6878 | + len_of_str = cifs_strtoUCS((wchar_t *) rename_info->target_name, target_name, 530, nls_codepage); |
| 6879 | + } |
| 6880 | + rename_info->target_name_len = cpu_to_le32(2 * len_of_str); |
| 6881 | + pSMB->DataCount = 12 /* sizeof(struct set_file_rename) */ + (2 * len_of_str) + 2; |
| 6882 | + pSMB->ByteCount += pSMB->DataCount; |
| 6883 | + pSMB->DataCount = cpu_to_le16(pSMB->DataCount); |
| 6884 | + pSMB->TotalDataCount = pSMB->DataCount; |
| 6885 | + pSMB->Fid = netfid; |
| 6886 | + pSMB->InformationLevel = |
| 6887 | + cpu_to_le16(SMB_SET_FILE_RENAME_INFORMATION); |
| 6888 | + pSMB->Reserved4 = 0; |
| 6889 | + pSMB->hdr.smb_buf_length += pSMB->ByteCount; |
| 6890 | + pSMB->ByteCount = cpu_to_le16(pSMB->ByteCount); |
| 6891 | + rc = SendReceive(xid, pTcon->ses, (struct smb_hdr *) pSMB, |
| 6892 | + (struct smb_hdr *) pSMBr, &bytes_returned, 0); |
| 6893 | + if (rc) { |
| 6894 | + cFYI(1,("Send error in Rename (by file handle) = %d", rc)); |
| 6895 | + } |
| 6896 | +#ifdef CONFIG_CIFS_STATS |
| 6897 | + else { |
| 6898 | + atomic_inc(&pTcon->num_t2renames); |
| 6899 | + } |
| 6900 | +#endif |
| 6901 | + if (pSMB) |
| 6902 | + cifs_buf_release(pSMB); |
| 6903 | + |
| 6904 | + /* Note: On -EAGAIN error only caller can retry on handle based calls |
| 6905 | + since file handle passed in no longer valid */ |
| 6906 | + |
| 6907 | + return rc; |
| 6908 | +} |
| 6909 | + |
| 6910 | +int |
| 6911 | +CIFSSMBCopy(const int xid, struct cifsTconInfo *tcon, const char * fromName, |
| 6912 | + const __u16 target_tid, const char *toName, const int flags, |
| 6913 | + const struct nls_table *nls_codepage) |
| 6914 | +{ |
| 6915 | + int rc = 0; |
| 6916 | + COPY_REQ *pSMB = NULL; |
| 6917 | + COPY_RSP *pSMBr = NULL; |
| 6918 | + int bytes_returned; |
| 6919 | + int name_len, name_len2; |
| 6920 | + |
| 6921 | + cFYI(1, ("In CIFSSMBCopy")); |
| 6922 | +copyRetry: |
| 6923 | + rc = smb_init(SMB_COM_COPY, 1, tcon, (void **) &pSMB, |
| 6924 | + (void **) &pSMBr); |
| 6925 | + if (rc) |
| 6926 | + return rc; |
| 6927 | + |
| 6928 | + pSMB->BufferFormat = 0x04; |
| 6929 | + pSMB->Tid2 = target_tid; |
| 6930 | + |
| 6931 | + if(flags & COPY_TREE) |
| 6932 | + pSMB->Flags |= COPY_TREE; |
| 6933 | + pSMB->Flags = cpu_to_le16(pSMB->Flags); |
| 6934 | + |
| 6935 | + if (pSMB->hdr.Flags2 & SMBFLG2_UNICODE) { |
| 6936 | + name_len = cifs_strtoUCS((wchar_t *) pSMB->OldFileName, |
| 6937 | + fromName, |
| 6938 | + 530 /* find define for this maxpathcomponent */, |
| 6939 | + nls_codepage); |
| 6940 | + name_len++; /* trailing null */ |
| 6941 | + name_len *= 2; |
| 6942 | + pSMB->OldFileName[name_len] = 0x04; /* pad */ |
| 6943 | + /* protocol requires ASCII signature byte on Unicode string */ |
| 6944 | + pSMB->OldFileName[name_len + 1] = 0x00; |
| 6945 | + name_len2 = cifs_strtoUCS((wchar_t *) & pSMB-> |
| 6946 | + OldFileName[name_len + 2], toName, 530, |
| 6947 | + nls_codepage); |
| 6948 | + name_len2 += 1 /* trailing null */ + 1 /* Signature word */ ; |
| 6949 | + name_len2 *= 2; /* convert to bytes */ |
| 6950 | + } else { /* BB improve the check for buffer overruns BB */ |
| 6951 | + name_len = strnlen(fromName, 530); |
| 6952 | + name_len++; /* trailing null */ |
| 6953 | + strncpy(pSMB->OldFileName, fromName, name_len); |
| 6954 | + name_len2 = strnlen(toName, 530); |
| 6955 | + name_len2++; /* trailing null */ |
| 6956 | + pSMB->OldFileName[name_len] = 0x04; /* 2nd buffer format */ |
| 6957 | + strncpy(&pSMB->OldFileName[name_len + 1], toName, name_len2); |
| 6958 | + name_len2++; /* trailing null */ |
| 6959 | + name_len2++; /* signature byte */ |
| 6960 | + } |
| 6961 | + |
| 6962 | + pSMB->ByteCount = 1 /* 1st signature byte */ + name_len + name_len2; |
| 6963 | + pSMB->hdr.smb_buf_length += pSMB->ByteCount; |
| 6964 | + pSMB->ByteCount = cpu_to_le16(pSMB->ByteCount); |
| 6965 | + |
| 6966 | + rc = SendReceive(xid, tcon->ses, (struct smb_hdr *) pSMB, |
| 6967 | + (struct smb_hdr *) pSMBr, &bytes_returned, 0); |
| 6968 | + if (rc) { |
| 6969 | + cFYI(1, ("Send error in copy = %d with %d files copied", |
| 6970 | + rc, pSMBr->CopyCount)); |
| 6971 | + } |
| 6972 | + if (pSMB) |
| 6973 | + cifs_buf_release(pSMB); |
| 6974 | + |
| 6975 | + if (rc == -EAGAIN) |
| 6976 | + goto copyRetry; |
| 6977 | + |
| 6978 | + return rc; |
| 6979 | +} |
| 6980 | + |
| 6981 | +int |
| 6982 | +CIFSUnixCreateSymLink(const int xid, struct cifsTconInfo *tcon, |
| 6983 | + const char *fromName, const char *toName, |
| 6984 | + const struct nls_table *nls_codepage) |
| 6985 | +{ |
| 6986 | + TRANSACTION2_SPI_REQ *pSMB = NULL; |
| 6987 | + TRANSACTION2_SPI_RSP *pSMBr = NULL; |
| 6988 | + char *data_offset; |
| 6989 | + int name_len; |
| 6990 | + int name_len_target; |
| 6991 | + int rc = 0; |
| 6992 | + int bytes_returned = 0; |
| 6993 | + |
| 6994 | + cFYI(1, ("In Symlink Unix style")); |
| 6995 | +createSymLinkRetry: |
| 6996 | + rc = smb_init(SMB_COM_TRANSACTION2, 15, tcon, (void **) &pSMB, |
| 6997 | + (void **) &pSMBr); |
| 6998 | + if (rc) |
| 6999 | + return rc; |
| 7000 | + |
| 7001 | + if (pSMB->hdr.Flags2 & SMBFLG2_UNICODE) { |
| 7002 | + name_len = |
| 7003 | + cifs_strtoUCS((wchar_t *) pSMB->FileName, fromName, 530 |
| 7004 | + /* find define for this maxpathcomponent */ |
| 7005 | + , nls_codepage); |
| 7006 | + name_len++; /* trailing null */ |
| 7007 | + name_len *= 2; |
| 7008 | + |
| 7009 | + } else { /* BB improve the check for buffer overruns BB */ |
| 7010 | + name_len = strnlen(fromName, 530); |
| 7011 | + name_len++; /* trailing null */ |
| 7012 | + strncpy(pSMB->FileName, fromName, name_len); |
| 7013 | + } |
| 7014 | + pSMB->ParameterCount = 6 + name_len; |
| 7015 | + pSMB->MaxSetupCount = 0; |
| 7016 | + pSMB->Reserved = 0; |
| 7017 | + pSMB->Flags = 0; |
| 7018 | + pSMB->Timeout = 0; |
| 7019 | + pSMB->Reserved2 = 0; |
| 7020 | + pSMB->ParameterOffset = offsetof(struct smb_com_transaction2_spi_req, |
| 7021 | + InformationLevel) - 4; |
| 7022 | + pSMB->DataOffset = pSMB->ParameterOffset + pSMB->ParameterCount; |
| 7023 | + |
| 7024 | + data_offset = (char *) (&pSMB->hdr.Protocol) + pSMB->DataOffset; |
| 7025 | + if (pSMB->hdr.Flags2 & SMBFLG2_UNICODE) { |
| 7026 | + name_len_target = |
| 7027 | + cifs_strtoUCS((wchar_t *) data_offset, toName, 530 |
| 7028 | + /* find define for this maxpathcomponent */ |
| 7029 | + , nls_codepage); |
| 7030 | + name_len_target++; /* trailing null */ |
| 7031 | + name_len_target *= 2; |
| 7032 | + } else { /* BB improve the check for buffer overruns BB */ |
| 7033 | + name_len_target = strnlen(toName, 530); |
| 7034 | + name_len_target++; /* trailing null */ |
| 7035 | + strncpy(data_offset, toName, name_len_target); |
| 7036 | + } |
| 7037 | + |
| 7038 | + pSMB->DataCount = name_len_target; |
| 7039 | + pSMB->MaxParameterCount = cpu_to_le16(2); |
| 7040 | + /* BB find exact max on data count below from sess */ |
| 7041 | + pSMB->MaxDataCount = cpu_to_le16(1000); |
| 7042 | + pSMB->SetupCount = 1; |
| 7043 | + pSMB->Reserved3 = 0; |
| 7044 | + pSMB->SubCommand = cpu_to_le16(TRANS2_SET_PATH_INFORMATION); |
| 7045 | + pSMB->ByteCount = 3 /* pad */ + pSMB->ParameterCount + pSMB->DataCount; |
| 7046 | + pSMB->DataCount = cpu_to_le16(pSMB->DataCount); |
| 7047 | + pSMB->ParameterCount = cpu_to_le16(pSMB->ParameterCount); |
| 7048 | + pSMB->TotalDataCount = pSMB->DataCount; |
| 7049 | + pSMB->TotalParameterCount = pSMB->ParameterCount; |
| 7050 | + pSMB->ParameterOffset = cpu_to_le16(pSMB->ParameterOffset); |
| 7051 | + pSMB->DataOffset = cpu_to_le16(pSMB->DataOffset); |
| 7052 | + pSMB->InformationLevel = cpu_to_le16(SMB_SET_FILE_UNIX_LINK); |
| 7053 | + pSMB->Reserved4 = 0; |
| 7054 | + pSMB->hdr.smb_buf_length += pSMB->ByteCount; |
| 7055 | + pSMB->ByteCount = cpu_to_le16(pSMB->ByteCount); |
| 7056 | + rc = SendReceive(xid, tcon->ses, (struct smb_hdr *) pSMB, |
| 7057 | + (struct smb_hdr *) pSMBr, &bytes_returned, 0); |
| 7058 | + if (rc) { |
| 7059 | + cFYI(1, |
| 7060 | + ("Send error in SetPathInfo (create symlink) = %d", |
| 7061 | + rc)); |
| 7062 | + } |
| 7063 | + |
| 7064 | + if (pSMB) |
| 7065 | + cifs_buf_release(pSMB); |
| 7066 | + |
| 7067 | + if (rc == -EAGAIN) |
| 7068 | + goto createSymLinkRetry; |
| 7069 | + |
| 7070 | + return rc; |
| 7071 | +} |
| 7072 | + |
| 7073 | +int |
| 7074 | +CIFSUnixCreateHardLink(const int xid, struct cifsTconInfo *tcon, |
| 7075 | + const char *fromName, const char *toName, |
| 7076 | + const struct nls_table *nls_codepage) |
| 7077 | +{ |
| 7078 | + TRANSACTION2_SPI_REQ *pSMB = NULL; |
| 7079 | + TRANSACTION2_SPI_RSP *pSMBr = NULL; |
| 7080 | + char *data_offset; |
| 7081 | + int name_len; |
| 7082 | + int name_len_target; |
| 7083 | + int rc = 0; |
| 7084 | + int bytes_returned = 0; |
| 7085 | + |
| 7086 | + cFYI(1, ("In Create Hard link Unix style")); |
| 7087 | +createHardLinkRetry: |
| 7088 | + rc = smb_init(SMB_COM_TRANSACTION2, 15, tcon, (void **) &pSMB, |
| 7089 | + (void **) &pSMBr); |
| 7090 | + if (rc) |
| 7091 | + return rc; |
| 7092 | + |
| 7093 | + if (pSMB->hdr.Flags2 & SMBFLG2_UNICODE) { |
| 7094 | + name_len = cifs_strtoUCS((wchar_t *) pSMB->FileName, toName, 530 |
| 7095 | + /* find define for this maxpathcomponent */ |
| 7096 | + , nls_codepage); |
| 7097 | + name_len++; /* trailing null */ |
| 7098 | + name_len *= 2; |
| 7099 | + |
| 7100 | + } else { /* BB improve the check for buffer overruns BB */ |
| 7101 | + name_len = strnlen(toName, 530); |
| 7102 | + name_len++; /* trailing null */ |
| 7103 | + strncpy(pSMB->FileName, toName, name_len); |
| 7104 | + } |
| 7105 | + pSMB->ParameterCount = 6 + name_len; |
| 7106 | + pSMB->MaxSetupCount = 0; |
| 7107 | + pSMB->Reserved = 0; |
| 7108 | + pSMB->Flags = 0; |
| 7109 | + pSMB->Timeout = 0; |
| 7110 | + pSMB->Reserved2 = 0; |
| 7111 | + pSMB->ParameterOffset = offsetof(struct smb_com_transaction2_spi_req, |
| 7112 | + InformationLevel) - 4; |
| 7113 | + pSMB->DataOffset = pSMB->ParameterOffset + pSMB->ParameterCount; |
| 7114 | + |
| 7115 | + data_offset = (char *) (&pSMB->hdr.Protocol) + pSMB->DataOffset; |
| 7116 | + if (pSMB->hdr.Flags2 & SMBFLG2_UNICODE) { |
| 7117 | + name_len_target = |
| 7118 | + cifs_strtoUCS((wchar_t *) data_offset, fromName, 530 |
| 7119 | + /* find define for this maxpathcomponent */ |
| 7120 | + , nls_codepage); |
| 7121 | + name_len_target++; /* trailing null */ |
| 7122 | + name_len_target *= 2; |
| 7123 | + } else { /* BB improve the check for buffer overruns BB */ |
| 7124 | + name_len_target = strnlen(fromName, 530); |
| 7125 | + name_len_target++; /* trailing null */ |
| 7126 | + strncpy(data_offset, fromName, name_len_target); |
| 7127 | + } |
| 7128 | + |
| 7129 | + pSMB->DataCount = name_len_target; |
| 7130 | + pSMB->MaxParameterCount = cpu_to_le16(2); |
| 7131 | + /* BB find exact max on data count below from sess*/ |
| 7132 | + pSMB->MaxDataCount = cpu_to_le16(1000); |
| 7133 | + pSMB->SetupCount = 1; |
| 7134 | + pSMB->Reserved3 = 0; |
| 7135 | + pSMB->SubCommand = cpu_to_le16(TRANS2_SET_PATH_INFORMATION); |
| 7136 | + pSMB->ByteCount = 3 /* pad */ + pSMB->ParameterCount + pSMB->DataCount; |
| 7137 | + pSMB->ParameterCount = cpu_to_le16(pSMB->ParameterCount); |
| 7138 | + pSMB->TotalParameterCount = pSMB->ParameterCount; |
| 7139 | + pSMB->DataCount = cpu_to_le16(pSMB->DataCount); |
| 7140 | + pSMB->TotalDataCount = pSMB->DataCount; |
| 7141 | + pSMB->ParameterOffset = cpu_to_le16(pSMB->ParameterOffset); |
| 7142 | + pSMB->DataOffset = cpu_to_le16(pSMB->DataOffset); |
| 7143 | + pSMB->InformationLevel = cpu_to_le16(SMB_SET_FILE_UNIX_HLINK); |
| 7144 | + pSMB->Reserved4 = 0; |
| 7145 | + pSMB->hdr.smb_buf_length += pSMB->ByteCount; |
| 7146 | + pSMB->ByteCount = cpu_to_le16(pSMB->ByteCount); |
| 7147 | + rc = SendReceive(xid, tcon->ses, (struct smb_hdr *) pSMB, |
| 7148 | + (struct smb_hdr *) pSMBr, &bytes_returned, 0); |
| 7149 | + if (rc) { |
| 7150 | + cFYI(1, ("Send error in SetPathInfo (hard link) = %d", rc)); |
| 7151 | + } |
| 7152 | + |
| 7153 | + if (pSMB) |
| 7154 | + cifs_buf_release(pSMB); |
| 7155 | + if (rc == -EAGAIN) |
| 7156 | + goto createHardLinkRetry; |
| 7157 | + |
| 7158 | + return rc; |
| 7159 | +} |
| 7160 | + |
| 7161 | +int |
| 7162 | +CIFSCreateHardLink(const int xid, struct cifsTconInfo *tcon, |
| 7163 | + const char *fromName, const char *toName, |
| 7164 | + const struct nls_table *nls_codepage) |
| 7165 | +{ |
| 7166 | + int rc = 0; |
| 7167 | + NT_RENAME_REQ *pSMB = NULL; |
| 7168 | + RENAME_RSP *pSMBr = NULL; |
| 7169 | + int bytes_returned; |
| 7170 | + int name_len, name_len2; |
| 7171 | + |
| 7172 | + cFYI(1, ("In CIFSCreateHardLink")); |
| 7173 | +winCreateHardLinkRetry: |
| 7174 | + |
| 7175 | + rc = smb_init(SMB_COM_NT_RENAME, 4, tcon, (void **) &pSMB, |
| 7176 | + (void **) &pSMBr); |
| 7177 | + if (rc) |
| 7178 | + return rc; |
| 7179 | + |
| 7180 | + pSMB->SearchAttributes = |
| 7181 | + cpu_to_le16(ATTR_READONLY | ATTR_HIDDEN | ATTR_SYSTEM | |
| 7182 | + ATTR_DIRECTORY); |
| 7183 | + pSMB->Flags = cpu_to_le16(CREATE_HARD_LINK); |
| 7184 | + pSMB->ClusterCount = 0; |
| 7185 | + |
| 7186 | + pSMB->BufferFormat = 0x04; |
| 7187 | + |
| 7188 | + if (pSMB->hdr.Flags2 & SMBFLG2_UNICODE) { |
| 7189 | + name_len = |
| 7190 | + cifs_strtoUCS((wchar_t *) pSMB->OldFileName, fromName, 530 |
| 7191 | + /* find define for this maxpathcomponent */ |
| 7192 | + , nls_codepage); |
| 7193 | + name_len++; /* trailing null */ |
| 7194 | + name_len *= 2; |
| 7195 | + pSMB->OldFileName[name_len] = 0; /* pad */ |
| 7196 | + pSMB->OldFileName[name_len + 1] = 0x04; |
| 7197 | + name_len2 = |
| 7198 | + cifs_strtoUCS((wchar_t *) & pSMB-> |
| 7199 | + OldFileName[name_len + 2], toName, 530, |
| 7200 | + nls_codepage); |
| 7201 | + name_len2 += 1 /* trailing null */ + 1 /* Signature word */ ; |
| 7202 | + name_len2 *= 2; /* convert to bytes */ |
| 7203 | + } else { /* BB improve the check for buffer overruns BB */ |
| 7204 | + name_len = strnlen(fromName, 530); |
| 7205 | + name_len++; /* trailing null */ |
| 7206 | + strncpy(pSMB->OldFileName, fromName, name_len); |
| 7207 | + name_len2 = strnlen(toName, 530); |
| 7208 | + name_len2++; /* trailing null */ |
| 7209 | + pSMB->OldFileName[name_len] = 0x04; /* 2nd buffer format */ |
| 7210 | + strncpy(&pSMB->OldFileName[name_len + 1], toName, name_len2); |
| 7211 | + name_len2++; /* trailing null */ |
| 7212 | + name_len2++; /* signature byte */ |
| 7213 | + } |
| 7214 | + |
| 7215 | + pSMB->ByteCount = 1 /* string type byte */ + name_len + name_len2; |
| 7216 | + pSMB->hdr.smb_buf_length += pSMB->ByteCount; |
| 7217 | + pSMB->ByteCount = cpu_to_le16(pSMB->ByteCount); |
| 7218 | + |
| 7219 | + rc = SendReceive(xid, tcon->ses, (struct smb_hdr *) pSMB, |
| 7220 | + (struct smb_hdr *) pSMBr, &bytes_returned, 0); |
| 7221 | + if (rc) { |
| 7222 | + cFYI(1, ("Send error in hard link (NT rename) = %d", rc)); |
| 7223 | + } |
| 7224 | + if (pSMB) |
| 7225 | + cifs_buf_release(pSMB); |
| 7226 | + if (rc == -EAGAIN) |
| 7227 | + goto winCreateHardLinkRetry; |
| 7228 | + |
| 7229 | + return rc; |
| 7230 | +} |
| 7231 | + |
| 7232 | +int |
| 7233 | +CIFSSMBUnixQuerySymLink(const int xid, struct cifsTconInfo *tcon, |
| 7234 | + const unsigned char *searchName, |
| 7235 | + char *symlinkinfo, const int buflen, |
| 7236 | + const struct nls_table *nls_codepage) |
| 7237 | +{ |
| 7238 | +/* SMB_QUERY_FILE_UNIX_LINK */ |
| 7239 | + TRANSACTION2_QPI_REQ *pSMB = NULL; |
| 7240 | + TRANSACTION2_QPI_RSP *pSMBr = NULL; |
| 7241 | + int rc = 0; |
| 7242 | + int bytes_returned; |
| 7243 | + int name_len; |
| 7244 | + |
| 7245 | + cFYI(1, ("In QPathSymLinkInfo (Unix) for path %s", searchName)); |
| 7246 | + |
| 7247 | +querySymLinkRetry: |
| 7248 | + rc = smb_init(SMB_COM_TRANSACTION2, 15, tcon, (void **) &pSMB, |
| 7249 | + (void **) &pSMBr); |
| 7250 | + if (rc) |
| 7251 | + return rc; |
| 7252 | + |
| 7253 | + if (pSMB->hdr.Flags2 & SMBFLG2_UNICODE) { |
| 7254 | + name_len = |
| 7255 | + cifs_strtoUCS((wchar_t *) pSMB->FileName, searchName, 530 |
| 7256 | + /* find define for this maxpathcomponent */ |
| 7257 | + , nls_codepage); |
| 7258 | + name_len++; /* trailing null */ |
| 7259 | + name_len *= 2; |
| 7260 | + } else { /* BB improve the check for buffer overruns BB */ |
| 7261 | + name_len = strnlen(searchName, 530); |
| 7262 | + name_len++; /* trailing null */ |
| 7263 | + strncpy(pSMB->FileName, searchName, name_len); |
| 7264 | + } |
| 7265 | + |
| 7266 | + pSMB->TotalParameterCount = |
| 7267 | + 2 /* level */ + 4 /* rsrvd */ + name_len /* incl null */ ; |
| 7268 | + pSMB->TotalDataCount = 0; |
| 7269 | + pSMB->MaxParameterCount = cpu_to_le16(2); |
| 7270 | + /* BB find exact max data count below from sess structure BB */ |
| 7271 | + pSMB->MaxDataCount = cpu_to_le16(4000); |
| 7272 | + pSMB->MaxSetupCount = 0; |
| 7273 | + pSMB->Reserved = 0; |
| 7274 | + pSMB->Flags = 0; |
| 7275 | + pSMB->Timeout = 0; |
| 7276 | + pSMB->Reserved2 = 0; |
| 7277 | + pSMB->ParameterOffset = cpu_to_le16(offsetof( |
| 7278 | + struct smb_com_transaction2_qpi_req ,InformationLevel) - 4); |
| 7279 | + pSMB->DataCount = 0; |
| 7280 | + pSMB->DataOffset = 0; |
| 7281 | + pSMB->SetupCount = 1; |
| 7282 | + pSMB->Reserved3 = 0; |
| 7283 | + pSMB->SubCommand = cpu_to_le16(TRANS2_QUERY_PATH_INFORMATION); |
| 7284 | + pSMB->ByteCount = pSMB->TotalParameterCount + 1 /* pad */ ; |
| 7285 | + pSMB->TotalParameterCount = cpu_to_le16(pSMB->TotalParameterCount); |
| 7286 | + pSMB->ParameterCount = pSMB->TotalParameterCount; |
| 7287 | + pSMB->InformationLevel = cpu_to_le16(SMB_QUERY_FILE_UNIX_LINK); |
| 7288 | + pSMB->Reserved4 = 0; |
| 7289 | + pSMB->hdr.smb_buf_length += pSMB->ByteCount; |
| 7290 | + pSMB->ByteCount = cpu_to_le16(pSMB->ByteCount); |
| 7291 | + |
| 7292 | + rc = SendReceive(xid, tcon->ses, (struct smb_hdr *) pSMB, |
| 7293 | + (struct smb_hdr *) pSMBr, &bytes_returned, 0); |
| 7294 | + if (rc) { |
| 7295 | + cFYI(1, ("Send error in QuerySymLinkInfo = %d", rc)); |
| 7296 | + } else { /* decode response */ |
| 7297 | + pSMBr->DataOffset = le16_to_cpu(pSMBr->DataOffset); |
| 7298 | + pSMBr->DataCount = le16_to_cpu(pSMBr->DataCount); |
| 7299 | + if ((pSMBr->ByteCount < 2) || (pSMBr->DataOffset > 512)) |
| 7300 | + /* BB also check enough total bytes returned */ |
| 7301 | + rc = -EIO; /* bad smb */ |
| 7302 | + else { |
| 7303 | + if (pSMBr->hdr.Flags2 & SMBFLG2_UNICODE) { |
| 7304 | + name_len = UniStrnlen((wchar_t *) ((char *) |
| 7305 | + &pSMBr->hdr.Protocol +pSMBr->DataOffset), |
| 7306 | + min_t(const int, buflen,pSMBr->DataCount) / 2); |
| 7307 | + cifs_strfromUCS_le(symlinkinfo, |
| 7308 | + (wchar_t *) ((char *)&pSMBr->hdr.Protocol + |
| 7309 | + pSMBr->DataOffset), |
| 7310 | + name_len, nls_codepage); |
| 7311 | + } else { |
| 7312 | + strncpy(symlinkinfo, |
| 7313 | + (char *) &pSMBr->hdr.Protocol + |
| 7314 | + pSMBr->DataOffset, |
| 7315 | + min_t(const int, buflen, pSMBr->DataCount)); |
| 7316 | + } |
| 7317 | + symlinkinfo[buflen] = 0; |
| 7318 | + /* just in case so calling code does not go off the end of buffer */ |
| 7319 | + } |
| 7320 | + } |
| 7321 | + if (pSMB) |
| 7322 | + cifs_buf_release(pSMB); |
| 7323 | + if (rc == -EAGAIN) |
| 7324 | + goto querySymLinkRetry; |
| 7325 | + return rc; |
| 7326 | +} |
| 7327 | + |
| 7328 | + |
| 7329 | + |
| 7330 | +int |
| 7331 | +CIFSSMBQueryReparseLinkInfo(const int xid, struct cifsTconInfo *tcon, |
| 7332 | + const unsigned char *searchName, |
| 7333 | + char *symlinkinfo, const int buflen,__u16 fid, |
| 7334 | + const struct nls_table *nls_codepage) |
| 7335 | +{ |
| 7336 | + int rc = 0; |
| 7337 | + int bytes_returned; |
| 7338 | + int name_len; |
| 7339 | + struct smb_com_transaction_ioctl_req * pSMB; |
| 7340 | + struct smb_com_transaction_ioctl_rsp * pSMBr; |
| 7341 | + |
| 7342 | + cFYI(1, ("In Windows reparse style QueryLink for path %s", searchName)); |
| 7343 | + rc = smb_init(SMB_COM_NT_TRANSACT, 23, tcon, (void **) &pSMB, |
| 7344 | + (void **) &pSMBr); |
| 7345 | + if (rc) |
| 7346 | + return rc; |
| 7347 | + |
| 7348 | + pSMB->TotalParameterCount = 0 ; |
| 7349 | + pSMB->TotalDataCount = 0; |
| 7350 | + pSMB->MaxParameterCount = cpu_to_le32(2); |
| 7351 | + /* BB find exact data count max from sess structure BB */ |
| 7352 | + pSMB->MaxDataCount = cpu_to_le32(4000); |
| 7353 | + pSMB->MaxSetupCount = 4; |
| 7354 | + pSMB->Reserved = 0; |
| 7355 | + pSMB->ParameterOffset = 0; |
| 7356 | + pSMB->DataCount = 0; |
| 7357 | + pSMB->DataOffset = 0; |
| 7358 | + pSMB->SetupCount = 4; |
| 7359 | + pSMB->SubCommand = cpu_to_le16(NT_TRANSACT_IOCTL); |
| 7360 | + pSMB->ParameterCount = pSMB->TotalParameterCount; |
| 7361 | + pSMB->FunctionCode = cpu_to_le32(FSCTL_GET_REPARSE_POINT); |
| 7362 | + pSMB->IsFsctl = 1; /* FSCTL */ |
| 7363 | + pSMB->IsRootFlag = 0; |
| 7364 | + pSMB->Fid = fid; /* file handle always le */ |
| 7365 | + pSMB->ByteCount = 0; |
| 7366 | + |
| 7367 | + rc = SendReceive(xid, tcon->ses, (struct smb_hdr *) pSMB, |
| 7368 | + (struct smb_hdr *) pSMBr, &bytes_returned, 0); |
| 7369 | + if (rc) { |
| 7370 | + cFYI(1, ("Send error in QueryReparseLinkInfo = %d", rc)); |
| 7371 | + } else { /* decode response */ |
| 7372 | + pSMBr->DataOffset = le16_to_cpu(pSMBr->DataOffset); |
| 7373 | + pSMBr->DataCount = le16_to_cpu(pSMBr->DataCount); |
| 7374 | + if ((pSMBr->ByteCount < 2) || (pSMBr->DataOffset > 512)) |
| 7375 | + /* BB also check enough total bytes returned */ |
| 7376 | + rc = -EIO; /* bad smb */ |
| 7377 | + else { |
| 7378 | + if(pSMBr->DataCount && (pSMBr->DataCount < 2048)) { |
| 7379 | + /* could also validate reparse tag && better check name length */ |
| 7380 | + struct reparse_data * reparse_buf = (struct reparse_data *) |
| 7381 | + ((char *)&pSMBr->hdr.Protocol + pSMBr->DataOffset); |
| 7382 | + if (pSMBr->hdr.Flags2 & SMBFLG2_UNICODE) { |
| 7383 | + name_len = UniStrnlen((wchar_t *) |
| 7384 | + (reparse_buf->LinkNamesBuf + |
| 7385 | + reparse_buf->TargetNameOffset), |
| 7386 | + min(buflen/2, reparse_buf->TargetNameLen / 2)); |
| 7387 | + cifs_strfromUCS_le(symlinkinfo, |
| 7388 | + (wchar_t *) (reparse_buf->LinkNamesBuf + |
| 7389 | + reparse_buf->TargetNameOffset), |
| 7390 | + name_len, nls_codepage); |
| 7391 | + } else { /* ASCII names */ |
| 7392 | + strncpy(symlinkinfo,reparse_buf->LinkNamesBuf + |
| 7393 | + reparse_buf->TargetNameOffset, |
| 7394 | + min_t(const int, buflen, reparse_buf->TargetNameLen)); |
| 7395 | + } |
| 7396 | + } else { |
| 7397 | + rc = -EIO; |
| 7398 | + cFYI(1,("Invalid return data count on get reparse info ioctl")); |
| 7399 | + } |
| 7400 | + symlinkinfo[buflen] = 0; /* just in case so the caller |
| 7401 | + does not go off the end of the buffer */ |
| 7402 | + cFYI(1,("readlink result - %s ",symlinkinfo)); |
| 7403 | + } |
| 7404 | + } |
| 7405 | + if (pSMB) |
| 7406 | + cifs_buf_release(pSMB); |
| 7407 | + |
| 7408 | + /* Note: On -EAGAIN error only caller can retry on handle based calls |
| 7409 | + since file handle passed in no longer valid */ |
| 7410 | + |
| 7411 | + return rc; |
| 7412 | +} |
| 7413 | + |
| 7414 | +int |
| 7415 | +CIFSSMBQPathInfo(const int xid, struct cifsTconInfo *tcon, |
| 7416 | + const unsigned char *searchName, |
| 7417 | + FILE_ALL_INFO * pFindData, |
| 7418 | + const struct nls_table *nls_codepage) |
| 7419 | +{ |
| 7420 | +/* level 263 SMB_QUERY_FILE_ALL_INFO */ |
| 7421 | + TRANSACTION2_QPI_REQ *pSMB = NULL; |
| 7422 | + TRANSACTION2_QPI_RSP *pSMBr = NULL; |
| 7423 | + int rc = 0; |
| 7424 | + int bytes_returned; |
| 7425 | + int name_len; |
| 7426 | + |
| 7427 | + cFYI(1, ("In QPathInfo path %s", searchName)); |
| 7428 | +QPathInfoRetry: |
| 7429 | + rc = smb_init(SMB_COM_TRANSACTION2, 15, tcon, (void **) &pSMB, |
| 7430 | + (void **) &pSMBr); |
| 7431 | + if (rc) |
| 7432 | + return rc; |
| 7433 | + |
| 7434 | + if (pSMB->hdr.Flags2 & SMBFLG2_UNICODE) { |
| 7435 | + name_len = |
| 7436 | + cifs_strtoUCS((wchar_t *) pSMB->FileName, searchName, 530 |
| 7437 | + /* find define for this maxpathcomponent */ |
| 7438 | + , nls_codepage); |
| 7439 | + name_len++; /* trailing null */ |
| 7440 | + name_len *= 2; |
| 7441 | + } else { /* BB improve the check for buffer overruns BB */ |
| 7442 | + name_len = strnlen(searchName, 530); |
| 7443 | + name_len++; /* trailing null */ |
| 7444 | + strncpy(pSMB->FileName, searchName, name_len); |
| 7445 | + } |
| 7446 | + |
| 7447 | + pSMB->TotalParameterCount = 2 /* level */ + 4 /* reserved */ + |
| 7448 | + name_len /* includes null */ ; |
| 7449 | + pSMB->TotalDataCount = 0; |
| 7450 | + pSMB->MaxParameterCount = cpu_to_le16(2); |
| 7451 | + pSMB->MaxDataCount = cpu_to_le16(4000); /* BB find exact max SMB PDU from sess structure BB */ |
| 7452 | + pSMB->MaxSetupCount = 0; |
| 7453 | + pSMB->Reserved = 0; |
| 7454 | + pSMB->Flags = 0; |
| 7455 | + pSMB->Timeout = 0; |
| 7456 | + pSMB->Reserved2 = 0; |
| 7457 | + pSMB->ParameterOffset = cpu_to_le16(offsetof( |
| 7458 | + struct smb_com_transaction2_qpi_req ,InformationLevel) - 4); |
| 7459 | + pSMB->DataCount = 0; |
| 7460 | + pSMB->DataOffset = 0; |
| 7461 | + pSMB->SetupCount = 1; |
| 7462 | + pSMB->Reserved3 = 0; |
| 7463 | + pSMB->SubCommand = cpu_to_le16(TRANS2_QUERY_PATH_INFORMATION); |
| 7464 | + pSMB->ByteCount = pSMB->TotalParameterCount + 1 /* pad */ ; |
| 7465 | + pSMB->TotalParameterCount = cpu_to_le16(pSMB->TotalParameterCount); |
| 7466 | + pSMB->ParameterCount = pSMB->TotalParameterCount; |
| 7467 | + pSMB->InformationLevel = cpu_to_le16(SMB_QUERY_FILE_ALL_INFO); |
| 7468 | + pSMB->Reserved4 = 0; |
| 7469 | + pSMB->hdr.smb_buf_length += pSMB->ByteCount; |
| 7470 | + pSMB->ByteCount = cpu_to_le16(pSMB->ByteCount); |
| 7471 | + |
| 7472 | + rc = SendReceive(xid, tcon->ses, (struct smb_hdr *) pSMB, |
| 7473 | + (struct smb_hdr *) pSMBr, &bytes_returned, 0); |
| 7474 | + if (rc) { |
| 7475 | + cFYI(1, ("Send error in QPathInfo = %d", rc)); |
| 7476 | + } else { /* decode response */ |
| 7477 | + pSMBr->DataOffset = le16_to_cpu(pSMBr->DataOffset); |
| 7478 | + /* BB also check enough total bytes returned */ |
| 7479 | + /* BB we need to improve the validity checking |
| 7480 | + of these trans2 responses */ |
| 7481 | + if ((pSMBr->ByteCount < 40) || (pSMBr->DataOffset > 512)) |
| 7482 | + rc = -EIO; /* bad smb */ |
| 7483 | + else if (pFindData){ |
| 7484 | + memcpy((char *) pFindData, |
| 7485 | + (char *) &pSMBr->hdr.Protocol + |
| 7486 | + pSMBr->DataOffset, sizeof (FILE_ALL_INFO)); |
| 7487 | + } else |
| 7488 | + rc = -ENOMEM; |
| 7489 | + } |
| 7490 | + if (pSMB) |
| 7491 | + cifs_buf_release(pSMB); |
| 7492 | + if (rc == -EAGAIN) |
| 7493 | + goto QPathInfoRetry; |
| 7494 | + |
| 7495 | + return rc; |
| 7496 | +} |
| 7497 | + |
| 7498 | +int |
| 7499 | +CIFSSMBUnixQPathInfo(const int xid, struct cifsTconInfo *tcon, |
| 7500 | + const unsigned char *searchName, |
| 7501 | + FILE_UNIX_BASIC_INFO * pFindData, |
| 7502 | + const struct nls_table *nls_codepage) |
| 7503 | +{ |
| 7504 | +/* SMB_QUERY_FILE_UNIX_BASIC */ |
| 7505 | + TRANSACTION2_QPI_REQ *pSMB = NULL; |
| 7506 | + TRANSACTION2_QPI_RSP *pSMBr = NULL; |
| 7507 | + int rc = 0; |
| 7508 | + int bytes_returned = 0; |
| 7509 | + int name_len; |
| 7510 | + |
| 7511 | + cFYI(1, ("In QPathInfo (Unix) the path %s", searchName)); |
| 7512 | +UnixQPathInfoRetry: |
| 7513 | + rc = smb_init(SMB_COM_TRANSACTION2, 15, tcon, (void **) &pSMB, |
| 7514 | + (void **) &pSMBr); |
| 7515 | + if (rc) |
| 7516 | + return rc; |
| 7517 | + |
| 7518 | + if (pSMB->hdr.Flags2 & SMBFLG2_UNICODE) { |
| 7519 | + name_len = |
| 7520 | + cifs_strtoUCS((wchar_t *) pSMB->FileName, searchName, 530 |
| 7521 | + /* find define for this maxpathcomponent */ |
| 7522 | + , nls_codepage); |
| 7523 | + name_len++; /* trailing null */ |
| 7524 | + name_len *= 2; |
| 7525 | + } else { /* BB improve the check for buffer overruns BB */ |
| 7526 | + name_len = strnlen(searchName, 530); |
| 7527 | + name_len++; /* trailing null */ |
| 7528 | + strncpy(pSMB->FileName, searchName, name_len); |
| 7529 | + } |
| 7530 | + |
| 7531 | + pSMB->TotalParameterCount = 2 /* level */ + 4 /* reserved */ + |
| 7532 | + name_len /* includes null */ ; |
| 7533 | + pSMB->TotalDataCount = 0; |
| 7534 | + pSMB->MaxParameterCount = cpu_to_le16(2); |
| 7535 | + /* BB find exact max SMB PDU from sess structure BB */ |
| 7536 | + pSMB->MaxDataCount = cpu_to_le16(4000); |
| 7537 | + pSMB->MaxSetupCount = 0; |
| 7538 | + pSMB->Reserved = 0; |
| 7539 | + pSMB->Flags = 0; |
| 7540 | + pSMB->Timeout = 0; |
| 7541 | + pSMB->Reserved2 = 0; |
| 7542 | + pSMB->ParameterOffset = cpu_to_le16(offsetof( |
| 7543 | + struct smb_com_transaction2_qpi_req ,InformationLevel) - 4); |
| 7544 | + pSMB->DataCount = 0; |
| 7545 | + pSMB->DataOffset = 0; |
| 7546 | + pSMB->SetupCount = 1; |
| 7547 | + pSMB->Reserved3 = 0; |
| 7548 | + pSMB->SubCommand = cpu_to_le16(TRANS2_QUERY_PATH_INFORMATION); |
| 7549 | + pSMB->ByteCount = pSMB->TotalParameterCount + 1 /* pad */ ; |
| 7550 | + pSMB->TotalParameterCount = cpu_to_le16(pSMB->TotalParameterCount); |
| 7551 | + pSMB->ParameterCount = pSMB->TotalParameterCount; |
| 7552 | + pSMB->InformationLevel = cpu_to_le16(SMB_QUERY_FILE_UNIX_BASIC); |
| 7553 | + pSMB->Reserved4 = 0; |
| 7554 | + pSMB->hdr.smb_buf_length += pSMB->ByteCount; |
| 7555 | + pSMB->ByteCount = cpu_to_le16(pSMB->ByteCount); |
| 7556 | + |
| 7557 | + rc = SendReceive(xid, tcon->ses, (struct smb_hdr *) pSMB, |
| 7558 | + (struct smb_hdr *) pSMBr, &bytes_returned, 0); |
| 7559 | + if (rc) { |
| 7560 | + cFYI(1, ("Send error in QPathInfo = %d", rc)); |
| 7561 | + } else { /* decode response */ |
| 7562 | + pSMBr->DataOffset = le16_to_cpu(pSMBr->DataOffset); |
| 7563 | + /* BB also check if enough total bytes returned */ |
| 7564 | + if ((pSMBr->ByteCount < sizeof(FILE_UNIX_BASIC_INFO)) || |
| 7565 | + (pSMBr->DataOffset > 512) || |
| 7566 | + (pSMBr->DataOffset < sizeof(struct smb_hdr))) { |
| 7567 | + cFYI(1,("UnixQPathinfo invalid data offset %d bytes returned %d", |
| 7568 | + (int)pSMBr->DataOffset,bytes_returned)); |
| 7569 | + rc = -EIO; /* bad smb */ |
| 7570 | + } else { |
| 7571 | + memcpy((char *) pFindData, |
| 7572 | + (char *) &pSMBr->hdr.Protocol + |
| 7573 | + pSMBr->DataOffset, |
| 7574 | + sizeof (FILE_UNIX_BASIC_INFO)); |
| 7575 | + } |
| 7576 | + } |
| 7577 | + if (pSMB) |
| 7578 | + cifs_buf_release(pSMB); |
| 7579 | + if (rc == -EAGAIN) |
| 7580 | + goto UnixQPathInfoRetry; |
| 7581 | + |
| 7582 | + return rc; |
| 7583 | +} |
| 7584 | + |
| 7585 | +int |
| 7586 | +CIFSFindSingle(const int xid, struct cifsTconInfo *tcon, |
| 7587 | + const char *searchName, FILE_ALL_INFO * findData, |
| 7588 | + const struct nls_table *nls_codepage) |
| 7589 | +{ |
| 7590 | +/* level 257 SMB_ */ |
| 7591 | + TRANSACTION2_FFIRST_REQ *pSMB = NULL; |
| 7592 | + TRANSACTION2_FFIRST_RSP *pSMBr = NULL; |
| 7593 | + int rc = 0; |
| 7594 | + int bytes_returned; |
| 7595 | + int name_len; |
| 7596 | + |
| 7597 | + cFYI(1, ("In FindUnique")); |
| 7598 | +findUniqueRetry: |
| 7599 | + rc = smb_init(SMB_COM_TRANSACTION2, 15, tcon, (void **) &pSMB, |
| 7600 | + (void **) &pSMBr); |
| 7601 | + if (rc) |
| 7602 | + return rc; |
| 7603 | + |
| 7604 | + if (pSMB->hdr.Flags2 & SMBFLG2_UNICODE) { |
| 7605 | + name_len = |
| 7606 | + cifs_strtoUCS((wchar_t *) pSMB->FileName, searchName, 530 |
| 7607 | + /* find define for this maxpathcomponent */ |
| 7608 | + , nls_codepage); |
| 7609 | + name_len++; /* trailing null */ |
| 7610 | + name_len *= 2; |
| 7611 | + } else { /* BB improve the check for buffer overruns BB */ |
| 7612 | + name_len = strnlen(searchName, 530); |
| 7613 | + name_len++; /* trailing null */ |
| 7614 | + strncpy(pSMB->FileName, searchName, name_len); |
| 7615 | + } |
| 7616 | + |
| 7617 | + pSMB->TotalParameterCount = 12 + name_len /* includes null */ ; |
| 7618 | + pSMB->TotalDataCount = 0; /* no EAs */ |
| 7619 | + pSMB->MaxParameterCount = cpu_to_le16(2); |
| 7620 | + pSMB->MaxDataCount = cpu_to_le16(4000); /* BB find exact max SMB PDU from sess structure BB */ |
| 7621 | + pSMB->MaxSetupCount = 0; |
| 7622 | + pSMB->Reserved = 0; |
| 7623 | + pSMB->Flags = 0; |
| 7624 | + pSMB->Timeout = 0; |
| 7625 | + pSMB->Reserved2 = 0; |
| 7626 | + pSMB->ParameterOffset = cpu_to_le16( |
| 7627 | + offsetof(struct smb_com_transaction2_ffirst_req,InformationLevel) - 4); |
| 7628 | + pSMB->DataCount = 0; |
| 7629 | + pSMB->DataOffset = 0; |
| 7630 | + pSMB->SetupCount = 1; /* one byte, no need to le convert */ |
| 7631 | + pSMB->Reserved3 = 0; |
| 7632 | + pSMB->SubCommand = cpu_to_le16(TRANS2_FIND_FIRST); |
| 7633 | + pSMB->ByteCount = pSMB->TotalParameterCount + 1 /* pad */ ; |
| 7634 | + pSMB->TotalParameterCount = cpu_to_le16(pSMB->TotalDataCount); |
| 7635 | + pSMB->ParameterCount = pSMB->TotalParameterCount; |
| 7636 | + pSMB->SearchAttributes = |
| 7637 | + cpu_to_le16(ATTR_READONLY | ATTR_HIDDEN | ATTR_SYSTEM | |
| 7638 | + ATTR_DIRECTORY); |
| 7639 | + pSMB->SearchCount = cpu_to_le16(16); /* BB increase */ |
| 7640 | + pSMB->SearchFlags = cpu_to_le16(1); |
| 7641 | + pSMB->InformationLevel = cpu_to_le16(SMB_FIND_FILE_DIRECTORY_INFO); |
| 7642 | + pSMB->SearchStorageType = 0; /* BB what should we set this to? BB */ |
| 7643 | + pSMB->hdr.smb_buf_length += pSMB->ByteCount; |
| 7644 | + pSMB->ByteCount = cpu_to_le16(pSMB->ByteCount); |
| 7645 | + |
| 7646 | + rc = SendReceive(xid, tcon->ses, (struct smb_hdr *) pSMB, |
| 7647 | + (struct smb_hdr *) pSMBr, &bytes_returned, 0); |
| 7648 | + |
| 7649 | + if (rc) { |
| 7650 | + cFYI(1, ("Send error in FindFileDirInfo = %d", rc)); |
| 7651 | + } else { /* decode response */ |
| 7652 | + |
| 7653 | + /* BB fill in */ |
| 7654 | + } |
| 7655 | + if (pSMB) |
| 7656 | + cifs_buf_release(pSMB); |
| 7657 | + if (rc == -EAGAIN) |
| 7658 | + goto findUniqueRetry; |
| 7659 | + |
| 7660 | + return rc; |
| 7661 | +} |
| 7662 | + |
| 7663 | +int |
| 7664 | +CIFSFindFirst(const int xid, struct cifsTconInfo *tcon, |
| 7665 | + const char *searchName, FILE_DIRECTORY_INFO * findData, |
| 7666 | + T2_FFIRST_RSP_PARMS * findParms, |
| 7667 | + const struct nls_table *nls_codepage, int *pUnicodeFlag, |
| 7668 | + int *pUnixFlag) |
| 7669 | +{ |
| 7670 | +/* level 257 SMB_ */ |
| 7671 | + TRANSACTION2_FFIRST_REQ *pSMB = NULL; |
| 7672 | + TRANSACTION2_FFIRST_RSP *pSMBr = NULL; |
| 7673 | + char *response_data; |
| 7674 | + int rc = 0; |
| 7675 | + int bytes_returned; |
| 7676 | + int name_len; |
| 7677 | + |
| 7678 | + cFYI(1, ("In FindFirst")); |
| 7679 | +findFirstRetry: |
| 7680 | + rc = smb_init(SMB_COM_TRANSACTION2, 15, tcon, (void **) &pSMB, |
| 7681 | + (void **) &pSMBr); |
| 7682 | + if (rc) |
| 7683 | + return rc; |
| 7684 | + |
| 7685 | + if (pSMB->hdr.Flags2 & SMBFLG2_UNICODE) { |
| 7686 | + name_len = |
| 7687 | + cifs_strtoUCS((wchar_t *) pSMB->FileName, searchName, 530 |
| 7688 | + /* find define for this maxpathcomponent */ |
| 7689 | + , nls_codepage); |
| 7690 | + name_len++; /* trailing null */ |
| 7691 | + name_len *= 2; |
| 7692 | + } else { /* BB improve the check for buffer overruns BB */ |
| 7693 | + name_len = strnlen(searchName, 530); |
| 7694 | + name_len++; /* trailing null */ |
| 7695 | + strncpy(pSMB->FileName, searchName, name_len); |
| 7696 | + } |
| 7697 | + |
| 7698 | + pSMB->TotalParameterCount = 12 + name_len /* includes null */ ; |
| 7699 | + pSMB->TotalDataCount = 0; /* no EAs */ |
| 7700 | + pSMB->MaxParameterCount = cpu_to_le16(10); |
| 7701 | + pSMB->MaxDataCount = cpu_to_le16((tcon->ses->server->maxBuf - |
| 7702 | + MAX_CIFS_HDR_SIZE) & 0xFFFFFF00); |
| 7703 | + pSMB->MaxSetupCount = 0; |
| 7704 | + pSMB->Reserved = 0; |
| 7705 | + pSMB->Flags = 0; |
| 7706 | + pSMB->Timeout = 0; |
| 7707 | + pSMB->Reserved2 = 0; |
| 7708 | + pSMB->ByteCount = pSMB->TotalParameterCount + 1 /* pad */ ; |
| 7709 | + pSMB->TotalParameterCount = cpu_to_le16(pSMB->TotalParameterCount); |
| 7710 | + pSMB->ParameterCount = pSMB->TotalParameterCount; |
| 7711 | + pSMB->ParameterOffset = cpu_to_le16(offsetof(struct |
| 7712 | + smb_com_transaction2_ffirst_req, SearchAttributes) - 4); |
| 7713 | + pSMB->DataCount = 0; |
| 7714 | + pSMB->DataOffset = 0; |
| 7715 | + pSMB->SetupCount = 1; /* one byte no need to make endian neutral */ |
| 7716 | + pSMB->Reserved3 = 0; |
| 7717 | + pSMB->SubCommand = cpu_to_le16(TRANS2_FIND_FIRST); |
| 7718 | + pSMB->SearchAttributes = |
| 7719 | + cpu_to_le16(ATTR_READONLY | ATTR_HIDDEN | ATTR_SYSTEM | |
| 7720 | + ATTR_DIRECTORY); |
| 7721 | + pSMB->SearchCount = cpu_to_le16(CIFS_MAX_MSGSIZE / sizeof (FILE_DIRECTORY_INFO)); /* should this be shrunk even more ? */ |
| 7722 | + pSMB->SearchFlags = cpu_to_le16(CIFS_SEARCH_CLOSE_AT_END | CIFS_SEARCH_RETURN_RESUME); |
| 7723 | + |
| 7724 | + /* test for Unix extensions */ |
| 7725 | + if (tcon->ses->capabilities & CAP_UNIX) { |
| 7726 | + pSMB->InformationLevel = cpu_to_le16(SMB_FIND_FILE_UNIX); |
| 7727 | + *pUnixFlag = TRUE; |
| 7728 | + } else { |
| 7729 | + pSMB->InformationLevel = |
| 7730 | + cpu_to_le16(SMB_FIND_FILE_DIRECTORY_INFO); |
| 7731 | + *pUnixFlag = FALSE; |
| 7732 | + } |
| 7733 | + pSMB->SearchStorageType = 0; /* BB what should we set this to? It is not clear if it matters BB */ |
| 7734 | + pSMB->hdr.smb_buf_length += pSMB->ByteCount; |
| 7735 | + pSMB->ByteCount = cpu_to_le16(pSMB->ByteCount); |
| 7736 | + |
| 7737 | + rc = SendReceive(xid, tcon->ses, (struct smb_hdr *) pSMB, |
| 7738 | + (struct smb_hdr *) pSMBr, &bytes_returned, 0); |
| 7739 | + |
| 7740 | + if (rc) { /* BB add logic to retry regular search if Unix search rejected unexpectedly by server */ |
| 7741 | + cFYI(1, ("Error in FindFirst = %d", rc)); |
| 7742 | + } else { /* decode response */ |
| 7743 | + /* BB add safety checks for these memcpys */ |
| 7744 | + if (pSMBr->hdr.Flags2 & SMBFLG2_UNICODE) |
| 7745 | + *pUnicodeFlag = TRUE; |
| 7746 | + else |
| 7747 | + *pUnicodeFlag = FALSE; |
| 7748 | + memcpy(findParms, |
| 7749 | + (char *) &pSMBr->hdr.Protocol + |
| 7750 | + le16_to_cpu(pSMBr->ParameterOffset), |
| 7751 | + sizeof (T2_FFIRST_RSP_PARMS)); |
| 7752 | + /* search handle can stay LE and EAoffset not needed so not converted */ |
| 7753 | + findParms->EndofSearch = le16_to_cpu(findParms->EndofSearch); |
| 7754 | + findParms->LastNameOffset = |
| 7755 | + le16_to_cpu(findParms->LastNameOffset); |
| 7756 | + findParms->SearchCount = le16_to_cpu(findParms->SearchCount); |
| 7757 | + response_data = |
| 7758 | + (char *) &pSMBr->hdr.Protocol + |
| 7759 | + le16_to_cpu(pSMBr->DataOffset); |
| 7760 | + memcpy(findData, response_data, le16_to_cpu(pSMBr->DataCount)); |
| 7761 | + } |
| 7762 | + if (pSMB) |
| 7763 | + cifs_buf_release(pSMB); |
| 7764 | + |
| 7765 | + if (rc == -EAGAIN) |
| 7766 | + goto findFirstRetry; |
| 7767 | + |
| 7768 | + return rc; |
| 7769 | +} |
| 7770 | + |
| 7771 | +int |
| 7772 | +CIFSFindNext(const int xid, struct cifsTconInfo *tcon, |
| 7773 | + FILE_DIRECTORY_INFO * findData, T2_FNEXT_RSP_PARMS * findParms, |
| 7774 | + const __u16 searchHandle, char * resume_file_name, int name_len, |
| 7775 | + __u32 resume_key, int *pUnicodeFlag, int *pUnixFlag) |
| 7776 | +{ |
| 7777 | +/* level 257 SMB_ */ |
| 7778 | + TRANSACTION2_FNEXT_REQ *pSMB = NULL; |
| 7779 | + TRANSACTION2_FNEXT_RSP *pSMBr = NULL; |
| 7780 | + char *response_data; |
| 7781 | + int rc = 0; |
| 7782 | + int bytes_returned; |
| 7783 | + |
| 7784 | + cFYI(1, ("In FindNext")); |
| 7785 | + |
| 7786 | + if(resume_file_name == NULL) { |
| 7787 | + return -EIO; |
| 7788 | + } |
| 7789 | + rc = smb_init(SMB_COM_TRANSACTION2, 15, tcon, (void **) &pSMB, |
| 7790 | + (void **) &pSMBr); |
| 7791 | + if (rc) |
| 7792 | + return rc; |
| 7793 | + |
| 7794 | + pSMB->TotalParameterCount = 14; /* includes 2 bytes of null string, converted to LE below */ |
| 7795 | + pSMB->TotalDataCount = 0; /* no EAs */ |
| 7796 | + pSMB->MaxParameterCount = cpu_to_le16(8); |
| 7797 | + pSMB->MaxDataCount = |
| 7798 | + cpu_to_le16((tcon->ses->server->maxBuf - MAX_CIFS_HDR_SIZE) & 0xFFFFFF00); |
| 7799 | + pSMB->MaxSetupCount = 0; |
| 7800 | + pSMB->Reserved = 0; |
| 7801 | + pSMB->Flags = 0; |
| 7802 | + pSMB->Timeout = 0; |
| 7803 | + pSMB->Reserved2 = 0; |
| 7804 | + pSMB->ParameterOffset = cpu_to_le16(offsetof( |
| 7805 | + struct smb_com_transaction2_fnext_req,SearchHandle) - 4); |
| 7806 | + pSMB->DataCount = 0; |
| 7807 | + pSMB->DataOffset = 0; |
| 7808 | + pSMB->SetupCount = 1; |
| 7809 | + pSMB->Reserved3 = 0; |
| 7810 | + pSMB->SubCommand = cpu_to_le16(TRANS2_FIND_NEXT); |
| 7811 | + pSMB->SearchHandle = searchHandle; /* always kept as le */ |
| 7812 | + findParms->SearchCount = 0; /* set to zero in case of error */ |
| 7813 | + pSMB->SearchCount = |
| 7814 | + cpu_to_le16(CIFS_MAX_MSGSIZE / sizeof (FILE_DIRECTORY_INFO)); |
| 7815 | + /* test for Unix extensions */ |
| 7816 | + if (tcon->ses->capabilities & CAP_UNIX) { |
| 7817 | + pSMB->InformationLevel = cpu_to_le16(SMB_FIND_FILE_UNIX); |
| 7818 | + *pUnixFlag = TRUE; |
| 7819 | + } else { |
| 7820 | + pSMB->InformationLevel = |
| 7821 | + cpu_to_le16(SMB_FIND_FILE_DIRECTORY_INFO); |
| 7822 | + *pUnixFlag = FALSE; |
| 7823 | + } |
| 7824 | + pSMB->ResumeKey = resume_key; |
| 7825 | + pSMB->SearchFlags = |
| 7826 | + cpu_to_le16(CIFS_SEARCH_CLOSE_AT_END | CIFS_SEARCH_RETURN_RESUME); |
| 7827 | + /* BB add check to make sure we do not cross end of smb */ |
| 7828 | + if(name_len < CIFS_MAX_MSGSIZE) { |
| 7829 | + memcpy(pSMB->ResumeFileName, resume_file_name, name_len); |
| 7830 | + pSMB->ByteCount += name_len; |
| 7831 | + } |
| 7832 | + pSMB->TotalParameterCount += name_len; |
| 7833 | + pSMB->ByteCount = pSMB->TotalParameterCount + 1 /* pad */ ; |
| 7834 | + pSMB->TotalParameterCount = cpu_to_le16(pSMB->TotalParameterCount); |
| 7835 | + pSMB->ParameterCount = pSMB->TotalParameterCount; |
| 7836 | + /* BB improve error handling here */ |
| 7837 | + pSMB->hdr.smb_buf_length += pSMB->ByteCount; |
| 7838 | + pSMB->ByteCount = cpu_to_le16(pSMB->ByteCount); |
| 7839 | + |
| 7840 | + rc = SendReceive(xid, tcon->ses, (struct smb_hdr *) pSMB, |
| 7841 | + (struct smb_hdr *) pSMBr, &bytes_returned, 0); |
| 7842 | + |
| 7843 | + if (rc) { |
| 7844 | + if (rc == -EBADF) |
| 7845 | + rc = 0; /* search probably was closed at end of search above */ |
| 7846 | + else |
| 7847 | + cFYI(1, ("FindNext returned = %d", rc)); |
| 7848 | + } else { /* decode response */ |
| 7849 | + /* BB add safety checks for these memcpys */ |
| 7850 | + if (pSMBr->hdr.Flags2 & SMBFLG2_UNICODE) |
| 7851 | + *pUnicodeFlag = TRUE; |
| 7852 | + else |
| 7853 | + *pUnicodeFlag = FALSE; |
| 7854 | + memcpy(findParms, |
| 7855 | + (char *) &pSMBr->hdr.Protocol + |
| 7856 | + le16_to_cpu(pSMBr->ParameterOffset), |
| 7857 | + sizeof (T2_FNEXT_RSP_PARMS)); |
| 7858 | + findParms->EndofSearch = le16_to_cpu(findParms->EndofSearch); |
| 7859 | + findParms->LastNameOffset = |
| 7860 | + le16_to_cpu(findParms->LastNameOffset); |
| 7861 | + findParms->SearchCount = le16_to_cpu(findParms->SearchCount); |
| 7862 | + response_data = |
| 7863 | + (char *) &pSMBr->hdr.Protocol + |
| 7864 | + le16_to_cpu(pSMBr->DataOffset); |
| 7865 | + memcpy(findData, response_data, le16_to_cpu(pSMBr->DataCount)); |
| 7866 | + } |
| 7867 | + if (pSMB) |
| 7868 | + cifs_buf_release(pSMB); |
| 7869 | + |
| 7870 | + /* Note: On -EAGAIN error only caller can retry on handle based calls |
| 7871 | + since file handle passed in no longer valid */ |
| 7872 | + |
| 7873 | + return rc; |
| 7874 | +} |
| 7875 | + |
| 7876 | +int |
| 7877 | +CIFSFindClose(const int xid, struct cifsTconInfo *tcon, const __u16 searchHandle) |
| 7878 | +{ |
| 7879 | + int rc = 0; |
| 7880 | + FINDCLOSE_REQ *pSMB = NULL; |
| 7881 | + CLOSE_RSP *pSMBr = NULL; |
| 7882 | + int bytes_returned; |
| 7883 | + |
| 7884 | + cFYI(1, ("In CIFSSMBFindClose")); |
| 7885 | + rc = smb_init(SMB_COM_FIND_CLOSE2, 1, tcon, (void **) &pSMB, |
| 7886 | + (void **) &pSMBr); |
| 7887 | + /* no sense returning error if session restarted |
| 7888 | + file handle has been closed */ |
| 7889 | + if(rc == -EAGAIN) |
| 7890 | + return 0; |
| 7891 | + if (rc) |
| 7892 | + return rc; |
| 7893 | + |
| 7894 | + pSMB->FileID = searchHandle; |
| 7895 | + pSMB->ByteCount = 0; |
| 7896 | + rc = SendReceive(xid, tcon->ses, (struct smb_hdr *) pSMB, |
| 7897 | + (struct smb_hdr *) pSMBr, &bytes_returned, 0); |
| 7898 | + if (rc) { |
| 7899 | + cERROR(1, ("Send error in FindClose = %d", rc)); |
| 7900 | + } |
| 7901 | + if (pSMB) |
| 7902 | + cifs_buf_release(pSMB); |
| 7903 | + |
| 7904 | + /* Since session is dead, search handle closed on server already */ |
| 7905 | + if (rc == -EAGAIN) |
| 7906 | + rc = 0; |
| 7907 | + |
| 7908 | + return rc; |
| 7909 | +} |
| 7910 | + |
| 7911 | +int |
| 7912 | +CIFSGetDFSRefer(const int xid, struct cifsSesInfo *ses, |
| 7913 | + const unsigned char *searchName, |
| 7914 | + unsigned char **targetUNCs, |
| 7915 | + unsigned int *number_of_UNC_in_array, |
| 7916 | + const struct nls_table *nls_codepage) |
| 7917 | +{ |
| 7918 | +/* TRANS2_GET_DFS_REFERRAL */ |
| 7919 | + TRANSACTION2_GET_DFS_REFER_REQ *pSMB = NULL; |
| 7920 | + TRANSACTION2_GET_DFS_REFER_RSP *pSMBr = NULL; |
| 7921 | + struct dfs_referral_level_3 * referrals = NULL; |
| 7922 | + int rc = 0; |
| 7923 | + int bytes_returned; |
| 7924 | + int name_len; |
| 7925 | + unsigned int i; |
| 7926 | + char * temp; |
| 7927 | + *number_of_UNC_in_array = 0; |
| 7928 | + *targetUNCs = NULL; |
| 7929 | + |
| 7930 | + cFYI(1, ("In GetDFSRefer the path %s", searchName)); |
| 7931 | + if (ses == NULL) |
| 7932 | + return -ENODEV; |
| 7933 | +getDFSRetry: |
| 7934 | + rc = smb_init(SMB_COM_TRANSACTION2, 15, NULL, (void **) &pSMB, |
| 7935 | + (void **) &pSMBr); |
| 7936 | + if (rc) |
| 7937 | + return rc; |
| 7938 | + |
| 7939 | + pSMB->hdr.Tid = ses->ipc_tid; |
| 7940 | + pSMB->hdr.Uid = ses->Suid; |
| 7941 | + if (ses->capabilities & CAP_STATUS32) { |
| 7942 | + pSMB->hdr.Flags2 |= SMBFLG2_ERR_STATUS; |
| 7943 | + } |
| 7944 | + if (ses->capabilities & CAP_DFS) { |
| 7945 | + pSMB->hdr.Flags2 |= SMBFLG2_DFS; |
| 7946 | + } |
| 7947 | + |
| 7948 | + if (ses->capabilities & CAP_UNICODE) { |
| 7949 | + pSMB->hdr.Flags2 |= SMBFLG2_UNICODE; |
| 7950 | + name_len = |
| 7951 | + cifs_strtoUCS((wchar_t *) pSMB->RequestFileName, |
| 7952 | + searchName, 530 |
| 7953 | + /* find define for this maxpathcomponent */ |
| 7954 | + , nls_codepage); |
| 7955 | + name_len++; /* trailing null */ |
| 7956 | + name_len *= 2; |
| 7957 | + } else { /* BB improve the check for buffer overruns BB */ |
| 7958 | + name_len = strnlen(searchName, 530); |
| 7959 | + name_len++; /* trailing null */ |
| 7960 | + strncpy(pSMB->RequestFileName, searchName, name_len); |
| 7961 | + } |
| 7962 | + |
| 7963 | + pSMB->ParameterCount = 2 /* level */ + name_len /*includes null */ ; |
| 7964 | + pSMB->TotalDataCount = 0; |
| 7965 | + pSMB->DataCount = 0; |
| 7966 | + pSMB->DataOffset = 0; |
| 7967 | + pSMB->MaxParameterCount = 0; |
| 7968 | + pSMB->MaxDataCount = cpu_to_le16(4000); /* BB find exact max SMB PDU from sess structure BB */ |
| 7969 | + pSMB->MaxSetupCount = 0; |
| 7970 | + pSMB->Reserved = 0; |
| 7971 | + pSMB->Flags = 0; |
| 7972 | + pSMB->Timeout = 0; |
| 7973 | + pSMB->Reserved2 = 0; |
| 7974 | + pSMB->ParameterOffset = cpu_to_le16(offsetof( |
| 7975 | + struct smb_com_transaction2_get_dfs_refer_req, MaxReferralLevel) - 4); |
| 7976 | + pSMB->SetupCount = 1; |
| 7977 | + pSMB->Reserved3 = 0; |
| 7978 | + pSMB->SubCommand = cpu_to_le16(TRANS2_GET_DFS_REFERRAL); |
| 7979 | + pSMB->ByteCount = pSMB->ParameterCount + 3 /* pad */ ; |
| 7980 | + pSMB->ParameterCount = cpu_to_le16(pSMB->ParameterCount); |
| 7981 | + pSMB->TotalParameterCount = pSMB->ParameterCount; |
| 7982 | + pSMB->MaxReferralLevel = cpu_to_le16(3); |
| 7983 | + pSMB->hdr.smb_buf_length += pSMB->ByteCount; |
| 7984 | + pSMB->ByteCount = cpu_to_le16(pSMB->ByteCount); |
| 7985 | + |
| 7986 | + rc = SendReceive(xid, ses, (struct smb_hdr *) pSMB, |
| 7987 | + (struct smb_hdr *) pSMBr, &bytes_returned, 0); |
| 7988 | + if (rc) { |
| 7989 | + cFYI(1, ("Send error in GetDFSRefer = %d", rc)); |
| 7990 | + } else { /* decode response */ |
| 7991 | +/* BB Add logic to parse referrals here */ |
| 7992 | + pSMBr->DataOffset = le16_to_cpu(pSMBr->DataOffset); |
| 7993 | + pSMBr->DataCount = le16_to_cpu(pSMBr->DataCount); |
| 7994 | + cFYI(1, |
| 7995 | + ("Decoding GetDFSRefer response. BCC: %d Offset %d", |
| 7996 | + pSMBr->ByteCount, pSMBr->DataOffset)); |
| 7997 | + if ((pSMBr->ByteCount < 17) || (pSMBr->DataOffset > 512)) /* BB also check enough total bytes returned */ |
| 7998 | + rc = -EIO; /* bad smb */ |
| 7999 | + else { |
| 8000 | + referrals = |
| 8001 | + (struct dfs_referral_level_3 *) |
| 8002 | + (8 /* sizeof start of data block */ + |
| 8003 | + pSMBr->DataOffset + |
| 8004 | + (char *) &pSMBr->hdr.Protocol); |
| 8005 | + cFYI(1,("num_referrals: %d dfs flags: 0x%x ... \nfor referral one refer size: 0x%x srv type: 0x%x refer flags: 0x%x ttl: 0x%x",pSMBr->NumberOfReferrals,pSMBr->DFSFlags, referrals->ReferralSize,referrals->ServerType,referrals->ReferralFlags,referrals->TimeToLive)); |
| 8006 | + /* BB This field is actually two bytes in from start of |
| 8007 | + data block so we could do safety check that DataBlock |
| 8008 | + begins at address of pSMBr->NumberOfReferrals */ |
| 8009 | + *number_of_UNC_in_array = le16_to_cpu(pSMBr->NumberOfReferrals); |
| 8010 | + |
| 8011 | + /* BB Fix below so can return more than one referral */ |
| 8012 | + if(*number_of_UNC_in_array > 1) |
| 8013 | + *number_of_UNC_in_array = 1; |
| 8014 | + |
| 8015 | + /* get the length of the strings describing refs */ |
| 8016 | + name_len = 0; |
| 8017 | + for(i=0;i<*number_of_UNC_in_array;i++) { |
| 8018 | + /* make sure that DfsPathOffset not past end */ |
| 8019 | + referrals->DfsPathOffset = le16_to_cpu(referrals->DfsPathOffset); |
| 8020 | + if(referrals->DfsPathOffset > pSMBr->DataCount) { |
| 8021 | + /* if invalid referral, stop here and do |
| 8022 | + not try to copy any more */ |
| 8023 | + *number_of_UNC_in_array = i; |
| 8024 | + break; |
| 8025 | + } |
| 8026 | + temp = ((char *)referrals) + referrals->DfsPathOffset; |
| 8027 | + |
| 8028 | + if (pSMBr->hdr.Flags2 & SMBFLG2_UNICODE) { |
| 8029 | + name_len += UniStrnlen((wchar_t *)temp,pSMBr->DataCount); |
| 8030 | + } else { |
| 8031 | + name_len += strnlen(temp,pSMBr->DataCount); |
| 8032 | + } |
| 8033 | + referrals++; |
| 8034 | + /* BB add check that referral pointer does not fall off end PDU */ |
| 8035 | + |
| 8036 | + } |
| 8037 | + /* BB add check for name_len bigger than bcc */ |
| 8038 | + *targetUNCs = |
| 8039 | + kmalloc(name_len+1+ (*number_of_UNC_in_array),GFP_KERNEL); |
| 8040 | + /* copy the ref strings */ |
| 8041 | + referrals = |
| 8042 | + (struct dfs_referral_level_3 *) |
| 8043 | + (8 /* sizeof data hdr */ + |
| 8044 | + pSMBr->DataOffset + |
| 8045 | + (char *) &pSMBr->hdr.Protocol); |
| 8046 | + |
| 8047 | + for(i=0;i<*number_of_UNC_in_array;i++) { |
| 8048 | + temp = ((char *)referrals) + referrals->DfsPathOffset; |
| 8049 | + if (pSMBr->hdr.Flags2 & SMBFLG2_UNICODE) { |
| 8050 | + cifs_strfromUCS_le(*targetUNCs, |
| 8051 | + (wchar_t *) temp, name_len, nls_codepage); |
| 8052 | + } else { |
| 8053 | + strncpy(*targetUNCs,temp,name_len); |
| 8054 | + } |
| 8055 | + /* BB update target_uncs pointers */ |
| 8056 | + referrals++; |
| 8057 | + } |
| 8058 | + temp = *targetUNCs; |
| 8059 | + temp[name_len] = 0; |
| 8060 | + } |
| 8061 | + |
| 8062 | + } |
| 8063 | + if (pSMB) |
| 8064 | + cifs_buf_release(pSMB); |
| 8065 | + |
| 8066 | + if (rc == -EAGAIN) |
| 8067 | + goto getDFSRetry; |
| 8068 | + |
| 8069 | + return rc; |
| 8070 | +} |
| 8071 | + |
| 8072 | +int |
| 8073 | +CIFSSMBQFSInfo(const int xid, struct cifsTconInfo *tcon, |
| 8074 | + struct statfs *FSData, const struct nls_table *nls_codepage) |
| 8075 | +{ |
| 8076 | +/* level 0x103 SMB_QUERY_FILE_SYSTEM_INFO */ |
| 8077 | + TRANSACTION2_QFSI_REQ *pSMB = NULL; |
| 8078 | + TRANSACTION2_QFSI_RSP *pSMBr = NULL; |
| 8079 | + FILE_SYSTEM_INFO *response_data; |
| 8080 | + int rc = 0; |
| 8081 | + int bytes_returned = 0; |
| 8082 | + |
| 8083 | + cFYI(1, ("In QFSInfo")); |
| 8084 | +QFSInfoRetry: |
| 8085 | + rc = smb_init(SMB_COM_TRANSACTION2, 15, tcon, (void **) &pSMB, |
| 8086 | + (void **) &pSMBr); |
| 8087 | + if (rc) |
| 8088 | + return rc; |
| 8089 | + |
| 8090 | + pSMB->TotalParameterCount = 2; /* level */ |
| 8091 | + pSMB->TotalDataCount = 0; |
| 8092 | + pSMB->MaxParameterCount = cpu_to_le16(2); |
| 8093 | + pSMB->MaxDataCount = cpu_to_le16(1000); /* BB find exact max SMB PDU from sess structure BB */ |
| 8094 | + pSMB->MaxSetupCount = 0; |
| 8095 | + pSMB->Reserved = 0; |
| 8096 | + pSMB->Flags = 0; |
| 8097 | + pSMB->Timeout = 0; |
| 8098 | + pSMB->Reserved2 = 0; |
| 8099 | + pSMB->ByteCount = pSMB->TotalParameterCount + 1 /* pad */ ; |
| 8100 | + pSMB->TotalParameterCount = cpu_to_le16(pSMB->TotalParameterCount); |
| 8101 | + pSMB->ParameterCount = pSMB->TotalParameterCount; |
| 8102 | + pSMB->ParameterOffset = cpu_to_le16(offsetof( |
| 8103 | + struct smb_com_transaction2_qfsi_req, InformationLevel) - 4); |
| 8104 | + pSMB->DataCount = 0; |
| 8105 | + pSMB->DataOffset = 0; |
| 8106 | + pSMB->SetupCount = 1; |
| 8107 | + pSMB->Reserved3 = 0; |
| 8108 | + pSMB->SubCommand = cpu_to_le16(TRANS2_QUERY_FS_INFORMATION); |
| 8109 | + pSMB->InformationLevel = cpu_to_le16(SMB_QUERY_FS_SIZE_INFO); |
| 8110 | + pSMB->hdr.smb_buf_length += pSMB->ByteCount; |
| 8111 | + pSMB->ByteCount = cpu_to_le16(pSMB->ByteCount); |
| 8112 | + |
| 8113 | + rc = SendReceive(xid, tcon->ses, (struct smb_hdr *) pSMB, |
| 8114 | + (struct smb_hdr *) pSMBr, &bytes_returned, 0); |
| 8115 | + if (rc) { |
| 8116 | + cERROR(1, ("Send error in QFSInfo = %d", rc)); |
| 8117 | + } else { /* decode response */ |
| 8118 | + pSMBr->DataOffset = le16_to_cpu(pSMBr->DataOffset); |
| 8119 | + cFYI(1, |
| 8120 | + ("Decoding qfsinfo response. BCC: %d Offset %d", |
| 8121 | + pSMBr->ByteCount, pSMBr->DataOffset)); |
| 8122 | + if ((pSMBr->ByteCount < 24) || (pSMBr->DataOffset > 512)) /* BB also check enough total bytes returned */ |
| 8123 | + rc = -EIO; /* bad smb */ |
| 8124 | + else { |
| 8125 | + response_data = |
| 8126 | + (FILE_SYSTEM_INFO |
| 8127 | + *) (((char *) &pSMBr->hdr.Protocol) + |
| 8128 | + pSMBr->DataOffset); |
| 8129 | + FSData->f_bsize = |
| 8130 | + le32_to_cpu(response_data->BytesPerSector) * |
| 8131 | + le32_to_cpu(response_data-> |
| 8132 | + SectorsPerAllocationUnit); |
| 8133 | + FSData->f_blocks = |
| 8134 | + le64_to_cpu(response_data->TotalAllocationUnits); |
| 8135 | + FSData->f_bfree = FSData->f_bavail = |
| 8136 | + le64_to_cpu(response_data->FreeAllocationUnits); |
| 8137 | + cFYI(1, |
| 8138 | + ("Blocks: %lld Free: %lld Block size %ld", |
| 8139 | + (unsigned long long)FSData->f_blocks, |
| 8140 | + (unsigned long long)FSData->f_bfree, |
| 8141 | + FSData->f_bsize)); |
| 8142 | + } |
| 8143 | + } |
| 8144 | + if (pSMB) |
| 8145 | + cifs_buf_release(pSMB); |
| 8146 | + |
| 8147 | + if (rc == -EAGAIN) |
| 8148 | + goto QFSInfoRetry; |
| 8149 | + |
| 8150 | + return rc; |
| 8151 | +} |
| 8152 | + |
| 8153 | +int |
| 8154 | +CIFSSMBQFSAttributeInfo(int xid, struct cifsTconInfo *tcon, |
| 8155 | + const struct nls_table *nls_codepage) |
| 8156 | +{ |
| 8157 | +/* level 0x105 SMB_QUERY_FILE_SYSTEM_INFO */ |
| 8158 | + TRANSACTION2_QFSI_REQ *pSMB = NULL; |
| 8159 | + TRANSACTION2_QFSI_RSP *pSMBr = NULL; |
| 8160 | + FILE_SYSTEM_ATTRIBUTE_INFO *response_data; |
| 8161 | + int rc = 0; |
| 8162 | + int bytes_returned = 0; |
| 8163 | + |
| 8164 | + cFYI(1, ("In QFSAttributeInfo")); |
| 8165 | +QFSAttributeRetry: |
| 8166 | + rc = smb_init(SMB_COM_TRANSACTION2, 15, tcon, (void **) &pSMB, |
| 8167 | + (void **) &pSMBr); |
| 8168 | + if (rc) |
| 8169 | + return rc; |
| 8170 | + |
| 8171 | + pSMB->TotalParameterCount = 2; /* level */ |
| 8172 | + pSMB->TotalDataCount = 0; |
| 8173 | + pSMB->MaxParameterCount = cpu_to_le16(2); |
| 8174 | + pSMB->MaxDataCount = cpu_to_le16(1000); /* BB find exact max SMB PDU from sess structure BB */ |
| 8175 | + pSMB->MaxSetupCount = 0; |
| 8176 | + pSMB->Reserved = 0; |
| 8177 | + pSMB->Flags = 0; |
| 8178 | + pSMB->Timeout = 0; |
| 8179 | + pSMB->Reserved2 = 0; |
| 8180 | + pSMB->ByteCount = pSMB->TotalParameterCount + 1 /* pad */ ; |
| 8181 | + pSMB->TotalParameterCount = cpu_to_le16(pSMB->TotalParameterCount); |
| 8182 | + pSMB->ParameterCount = pSMB->TotalParameterCount; |
| 8183 | + pSMB->ParameterOffset = cpu_to_le16(offsetof( |
| 8184 | + struct smb_com_transaction2_qfsi_req, InformationLevel) - 4); |
| 8185 | + pSMB->DataCount = 0; |
| 8186 | + pSMB->DataOffset = 0; |
| 8187 | + pSMB->SetupCount = 1; |
| 8188 | + pSMB->Reserved3 = 0; |
| 8189 | + pSMB->SubCommand = cpu_to_le16(TRANS2_QUERY_FS_INFORMATION); |
| 8190 | + pSMB->InformationLevel = cpu_to_le16(SMB_QUERY_FS_ATTRIBUTE_INFO); |
| 8191 | + pSMB->hdr.smb_buf_length += pSMB->ByteCount; |
| 8192 | + pSMB->ByteCount = cpu_to_le16(pSMB->ByteCount); |
| 8193 | + |
| 8194 | + rc = SendReceive(xid, tcon->ses, (struct smb_hdr *) pSMB, |
| 8195 | + (struct smb_hdr *) pSMBr, &bytes_returned, 0); |
| 8196 | + if (rc) { |
| 8197 | + cERROR(1, ("Send error in QFSAttributeInfo = %d", rc)); |
| 8198 | + } else { /* decode response */ |
| 8199 | + pSMBr->DataOffset = le16_to_cpu(pSMBr->DataOffset); |
| 8200 | + if ((pSMBr->ByteCount < 13) || (pSMBr->DataOffset > 512)) { /* BB also check enough bytes returned */ |
| 8201 | + rc = -EIO; /* bad smb */ |
| 8202 | + } else { |
| 8203 | + response_data = |
| 8204 | + (FILE_SYSTEM_ATTRIBUTE_INFO |
| 8205 | + *) (((char *) &pSMBr->hdr.Protocol) + |
| 8206 | + pSMBr->DataOffset); |
| 8207 | + response_data->Attributes = le32_to_cpu(response_data->Attributes); |
| 8208 | + response_data->MaxPathNameComponentLength = |
| 8209 | + le32_to_cpu(response_data->MaxPathNameComponentLength); |
| 8210 | + response_data->FileSystemNameLen = |
| 8211 | + le32_to_cpu(response_data->FileSystemNameLen); |
| 8212 | + memcpy(&tcon->fsAttrInfo, response_data, |
| 8213 | + sizeof (FILE_SYSTEM_ATTRIBUTE_INFO)); |
| 8214 | + } |
| 8215 | + } |
| 8216 | + if (pSMB) |
| 8217 | + cifs_buf_release(pSMB); |
| 8218 | + |
| 8219 | + if (rc == -EAGAIN) |
| 8220 | + goto QFSAttributeRetry; |
| 8221 | + |
| 8222 | + return rc; |
| 8223 | +} |
| 8224 | + |
| 8225 | +int |
| 8226 | +CIFSSMBQFSDeviceInfo(int xid, struct cifsTconInfo *tcon, |
| 8227 | + const struct nls_table *nls_codepage) |
| 8228 | +{ |
| 8229 | +/* level 0x104 SMB_QUERY_FILE_SYSTEM_INFO */ |
| 8230 | + TRANSACTION2_QFSI_REQ *pSMB = NULL; |
| 8231 | + TRANSACTION2_QFSI_RSP *pSMBr = NULL; |
| 8232 | + FILE_SYSTEM_DEVICE_INFO *response_data; |
| 8233 | + int rc = 0; |
| 8234 | + int bytes_returned = 0; |
| 8235 | + |
| 8236 | + cFYI(1, ("In QFSDeviceInfo")); |
| 8237 | +QFSDeviceRetry: |
| 8238 | + rc = smb_init(SMB_COM_TRANSACTION2, 15, tcon, (void **) &pSMB, |
| 8239 | + (void **) &pSMBr); |
| 8240 | + if (rc) |
| 8241 | + return rc; |
| 8242 | + |
| 8243 | + pSMB->TotalParameterCount = 2; /* level */ |
| 8244 | + pSMB->TotalDataCount = 0; |
| 8245 | + pSMB->MaxParameterCount = cpu_to_le16(2); |
| 8246 | + pSMB->MaxDataCount = cpu_to_le16(1000); /* BB find exact max SMB PDU from sess structure BB */ |
| 8247 | + pSMB->MaxSetupCount = 0; |
| 8248 | + pSMB->Reserved = 0; |
| 8249 | + pSMB->Flags = 0; |
| 8250 | + pSMB->Timeout = 0; |
| 8251 | + pSMB->Reserved2 = 0; |
| 8252 | + pSMB->ByteCount = pSMB->TotalParameterCount + 1 /* pad */ ; |
| 8253 | + pSMB->TotalParameterCount = cpu_to_le16(pSMB->TotalParameterCount); |
| 8254 | + pSMB->ParameterCount = pSMB->TotalParameterCount; |
| 8255 | + pSMB->ParameterOffset = cpu_to_le16(offsetof( |
| 8256 | + struct smb_com_transaction2_qfsi_req, InformationLevel) - 4); |
| 8257 | + |
| 8258 | + pSMB->DataCount = 0; |
| 8259 | + pSMB->DataOffset = 0; |
| 8260 | + pSMB->SetupCount = 1; |
| 8261 | + pSMB->Reserved3 = 0; |
| 8262 | + pSMB->SubCommand = cpu_to_le16(TRANS2_QUERY_FS_INFORMATION); |
| 8263 | + pSMB->InformationLevel = cpu_to_le16(SMB_QUERY_FS_DEVICE_INFO); |
| 8264 | + pSMB->hdr.smb_buf_length += pSMB->ByteCount; |
| 8265 | + pSMB->ByteCount = cpu_to_le16(pSMB->ByteCount); |
| 8266 | + |
| 8267 | + rc = SendReceive(xid, tcon->ses, (struct smb_hdr *) pSMB, |
| 8268 | + (struct smb_hdr *) pSMBr, &bytes_returned, 0); |
| 8269 | + if (rc) { |
| 8270 | + cFYI(1, ("Send error in QFSDeviceInfo = %d", rc)); |
| 8271 | + } else { /* decode response */ |
| 8272 | + pSMBr->DataOffset = le16_to_cpu(pSMBr->DataOffset); |
| 8273 | + if ((pSMBr->ByteCount < sizeof (FILE_SYSTEM_DEVICE_INFO)) |
| 8274 | + || (pSMBr->DataOffset > 512)) |
| 8275 | + rc = -EIO; /* bad smb */ |
| 8276 | + else { |
| 8277 | + response_data = |
| 8278 | + (FILE_SYSTEM_DEVICE_INFO |
| 8279 | + *) (((char *) &pSMBr->hdr.Protocol) + |
| 8280 | + pSMBr->DataOffset); |
| 8281 | + response_data->DeviceType = |
| 8282 | + le32_to_cpu(response_data->DeviceType); |
| 8283 | + response_data->DeviceCharacteristics = |
| 8284 | + le32_to_cpu(response_data->DeviceCharacteristics); |
| 8285 | + memcpy(&tcon->fsDevInfo, response_data, |
| 8286 | + sizeof (FILE_SYSTEM_DEVICE_INFO)); |
| 8287 | + } |
| 8288 | + } |
| 8289 | + if (pSMB) |
| 8290 | + cifs_buf_release(pSMB); |
| 8291 | + |
| 8292 | + if (rc == -EAGAIN) |
| 8293 | + goto QFSDeviceRetry; |
| 8294 | + |
| 8295 | + return rc; |
| 8296 | +} |
| 8297 | + |
| 8298 | +int |
| 8299 | +CIFSSMBQFSUnixInfo(int xid, struct cifsTconInfo *tcon, |
| 8300 | + const struct nls_table *nls_codepage) |
| 8301 | +{ |
| 8302 | +/* level 0x200 SMB_QUERY_CIFS_UNIX_INFO */ |
| 8303 | + TRANSACTION2_QFSI_REQ *pSMB = NULL; |
| 8304 | + TRANSACTION2_QFSI_RSP *pSMBr = NULL; |
| 8305 | + FILE_SYSTEM_UNIX_INFO *response_data; |
| 8306 | + int rc = 0; |
| 8307 | + int bytes_returned = 0; |
| 8308 | + |
| 8309 | + cFYI(1, ("In QFSUnixInfo")); |
| 8310 | +QFSUnixRetry: |
| 8311 | + rc = smb_init(SMB_COM_TRANSACTION2, 15, tcon, (void **) &pSMB, |
| 8312 | + (void **) &pSMBr); |
| 8313 | + if (rc) |
| 8314 | + return rc; |
| 8315 | + |
| 8316 | + pSMB->ParameterCount = 2; /* level */ |
| 8317 | + pSMB->TotalDataCount = 0; |
| 8318 | + pSMB->DataCount = 0; |
| 8319 | + pSMB->DataOffset = 0; |
| 8320 | + pSMB->MaxParameterCount = cpu_to_le16(2); |
| 8321 | + pSMB->MaxDataCount = cpu_to_le16(100); /* BB find exact max SMB PDU from sess structure BB */ |
| 8322 | + pSMB->MaxSetupCount = 0; |
| 8323 | + pSMB->Reserved = 0; |
| 8324 | + pSMB->Flags = 0; |
| 8325 | + pSMB->Timeout = 0; |
| 8326 | + pSMB->Reserved2 = 0; |
| 8327 | + pSMB->ByteCount = pSMB->ParameterCount + 1 /* pad */ ; |
| 8328 | + pSMB->ParameterCount = cpu_to_le16(pSMB->ParameterCount); |
| 8329 | + pSMB->TotalParameterCount = pSMB->ParameterCount; |
| 8330 | + pSMB->ParameterOffset = cpu_to_le16(offsetof(struct |
| 8331 | + smb_com_transaction2_qfsi_req, InformationLevel) - 4); |
| 8332 | + pSMB->SetupCount = 1; |
| 8333 | + pSMB->Reserved3 = 0; |
| 8334 | + pSMB->SubCommand = cpu_to_le16(TRANS2_QUERY_FS_INFORMATION); |
| 8335 | + pSMB->InformationLevel = cpu_to_le16(SMB_QUERY_CIFS_UNIX_INFO); |
| 8336 | + pSMB->hdr.smb_buf_length += pSMB->ByteCount; |
| 8337 | + pSMB->ByteCount = cpu_to_le16(pSMB->ByteCount); |
| 8338 | + |
| 8339 | + rc = SendReceive(xid, tcon->ses, (struct smb_hdr *) pSMB, |
| 8340 | + (struct smb_hdr *) pSMBr, &bytes_returned, 0); |
| 8341 | + if (rc) { |
| 8342 | + cERROR(1, ("Send error in QFSUnixInfo = %d", rc)); |
| 8343 | + } else { /* decode response */ |
| 8344 | + pSMBr->DataOffset = cpu_to_le16(pSMBr->DataOffset); |
| 8345 | + if ((pSMBr->ByteCount < 13) || (pSMBr->DataOffset > 512)) { |
| 8346 | + rc = -EIO; /* bad smb */ |
| 8347 | + } else { |
| 8348 | + response_data = |
| 8349 | + (FILE_SYSTEM_UNIX_INFO |
| 8350 | + *) (((char *) &pSMBr->hdr.Protocol) + |
| 8351 | + pSMBr->DataOffset); |
| 8352 | + response_data->MajorVersionNumber = |
| 8353 | + le16_to_cpu(response_data->MajorVersionNumber); |
| 8354 | + response_data->MinorVersionNumber = |
| 8355 | + le16_to_cpu(response_data->MinorVersionNumber); |
| 8356 | + response_data->Capability = |
| 8357 | + le64_to_cpu(response_data->Capability); |
| 8358 | + memcpy(&tcon->fsUnixInfo, response_data, |
| 8359 | + sizeof (FILE_SYSTEM_UNIX_INFO)); |
| 8360 | + } |
| 8361 | + } |
| 8362 | + if (pSMB) |
| 8363 | + cifs_buf_release(pSMB); |
| 8364 | + |
| 8365 | + if (rc == -EAGAIN) |
| 8366 | + goto QFSUnixRetry; |
| 8367 | + |
| 8368 | + |
| 8369 | + return rc; |
| 8370 | +} |
| 8371 | + |
| 8372 | +/* We can not use write of zero bytes trick to |
| 8373 | + set file size due to need for large file support. Also note that |
| 8374 | + this SetPathInfo is preferred to SetFileInfo based method in next |
| 8375 | + routine which is only needed to work around a sharing violation bug |
| 8376 | + in Samba which this routine can run into */ |
| 8377 | + |
| 8378 | +int |
| 8379 | +CIFSSMBSetEOF(int xid, struct cifsTconInfo *tcon, char *fileName, |
| 8380 | + __u64 size, int SetAllocation, const struct nls_table *nls_codepage) |
| 8381 | +{ |
| 8382 | + struct smb_com_transaction2_spi_req *pSMB = NULL; |
| 8383 | + struct smb_com_transaction2_spi_rsp *pSMBr = NULL; |
| 8384 | + struct file_end_of_file_info *parm_data; |
| 8385 | + int name_len; |
| 8386 | + int rc = 0; |
| 8387 | + int bytes_returned = 0; |
| 8388 | + |
| 8389 | + cFYI(1, ("In SetEOF")); |
| 8390 | +SetEOFRetry: |
| 8391 | + rc = smb_init(SMB_COM_TRANSACTION2, 15, tcon, (void **) &pSMB, |
| 8392 | + (void **) &pSMBr); |
| 8393 | + if (rc) |
| 8394 | + return rc; |
| 8395 | + |
| 8396 | + if (pSMB->hdr.Flags2 & SMBFLG2_UNICODE) { |
| 8397 | + name_len = |
| 8398 | + cifs_strtoUCS((wchar_t *) pSMB->FileName, fileName, 530 |
| 8399 | + /* find define for this maxpathcomponent */ |
| 8400 | + , nls_codepage); |
| 8401 | + name_len++; /* trailing null */ |
| 8402 | + name_len *= 2; |
| 8403 | + } else { /* BB improve the check for buffer overruns BB */ |
| 8404 | + name_len = strnlen(fileName, 530); |
| 8405 | + name_len++; /* trailing null */ |
| 8406 | + strncpy(pSMB->FileName, fileName, name_len); |
| 8407 | + } |
| 8408 | + pSMB->ParameterCount = 6 + name_len; |
| 8409 | + pSMB->DataCount = sizeof (struct file_end_of_file_info); |
| 8410 | + pSMB->MaxParameterCount = cpu_to_le16(2); |
| 8411 | + pSMB->MaxDataCount = cpu_to_le16(1000); /* BB find max SMB size from sess */ |
| 8412 | + pSMB->MaxSetupCount = 0; |
| 8413 | + pSMB->Reserved = 0; |
| 8414 | + pSMB->Flags = 0; |
| 8415 | + pSMB->Timeout = 0; |
| 8416 | + pSMB->Reserved2 = 0; |
| 8417 | + pSMB->ParameterOffset = offsetof(struct smb_com_transaction2_spi_req, |
| 8418 | + InformationLevel) - 4; |
| 8419 | + pSMB->DataOffset = pSMB->ParameterOffset + pSMB->ParameterCount; |
| 8420 | + if(SetAllocation) { |
| 8421 | + if (tcon->ses->capabilities & CAP_INFOLEVEL_PASSTHRU) |
| 8422 | + pSMB->InformationLevel = |
| 8423 | + cpu_to_le16(SMB_SET_FILE_ALLOCATION_INFO2); |
| 8424 | + else |
| 8425 | + pSMB->InformationLevel = |
| 8426 | + cpu_to_le16(SMB_SET_FILE_ALLOCATION_INFO); |
| 8427 | + } else /* Set File Size */ { |
| 8428 | + if (tcon->ses->capabilities & CAP_INFOLEVEL_PASSTHRU) |
| 8429 | + pSMB->InformationLevel = |
| 8430 | + cpu_to_le16(SMB_SET_FILE_END_OF_FILE_INFO2); |
| 8431 | + else |
| 8432 | + pSMB->InformationLevel = |
| 8433 | + cpu_to_le16(SMB_SET_FILE_END_OF_FILE_INFO); |
| 8434 | + } |
| 8435 | + |
| 8436 | + parm_data = |
| 8437 | + (struct file_end_of_file_info *) (((char *) &pSMB->hdr.Protocol) + |
| 8438 | + pSMB->DataOffset); |
| 8439 | + pSMB->ParameterOffset = cpu_to_le16(pSMB->ParameterOffset); |
| 8440 | + pSMB->DataOffset = cpu_to_le16(pSMB->DataOffset); |
| 8441 | + pSMB->SetupCount = 1; |
| 8442 | + pSMB->Reserved3 = 0; |
| 8443 | + pSMB->SubCommand = cpu_to_le16(TRANS2_SET_PATH_INFORMATION); |
| 8444 | + pSMB->ByteCount = 3 /* pad */ + pSMB->ParameterCount + pSMB->DataCount; |
| 8445 | + pSMB->DataCount = cpu_to_le16(pSMB->DataCount); |
| 8446 | + pSMB->TotalDataCount = pSMB->DataCount; |
| 8447 | + pSMB->ParameterCount = cpu_to_le16(pSMB->ParameterCount); |
| 8448 | + pSMB->TotalParameterCount = pSMB->ParameterCount; |
| 8449 | + pSMB->Reserved4 = 0; |
| 8450 | + pSMB->hdr.smb_buf_length += pSMB->ByteCount; |
| 8451 | + parm_data->FileSize = cpu_to_le64(size); |
| 8452 | + pSMB->ByteCount = cpu_to_le16(pSMB->ByteCount); |
| 8453 | + rc = SendReceive(xid, tcon->ses, (struct smb_hdr *) pSMB, |
| 8454 | + (struct smb_hdr *) pSMBr, &bytes_returned, 0); |
| 8455 | + if (rc) { |
| 8456 | + cFYI(1, ("SetPathInfo (file size) returned %d", rc)); |
| 8457 | + } |
| 8458 | + |
| 8459 | + if (pSMB) |
| 8460 | + cifs_buf_release(pSMB); |
| 8461 | + |
| 8462 | + if (rc == -EAGAIN) |
| 8463 | + goto SetEOFRetry; |
| 8464 | + |
| 8465 | + return rc; |
| 8466 | +} |
| 8467 | + |
| 8468 | +int |
| 8469 | +CIFSSMBSetFileSize(const int xid, struct cifsTconInfo *tcon, __u64 size, |
| 8470 | + __u16 fid, __u32 pid_of_opener, int SetAllocation) |
| 8471 | +{ |
| 8472 | + struct smb_com_transaction2_sfi_req *pSMB = NULL; |
| 8473 | + struct smb_com_transaction2_sfi_rsp *pSMBr = NULL; |
| 8474 | + char *data_offset; |
| 8475 | + struct file_end_of_file_info *parm_data; |
| 8476 | + int rc = 0; |
| 8477 | + int bytes_returned = 0; |
| 8478 | + __u32 tmp; |
| 8479 | + |
| 8480 | + cFYI(1, ("SetFileSize (via SetFileInfo) %lld", |
| 8481 | + (long long)size)); |
| 8482 | + rc = smb_init(SMB_COM_TRANSACTION2, 15, tcon, (void **) &pSMB, |
| 8483 | + (void **) &pSMBr); |
| 8484 | + if (rc) |
| 8485 | + return rc; |
| 8486 | + |
| 8487 | + tmp = cpu_to_le32(pid_of_opener); /* override pid of current process |
| 8488 | + so network fid will be valid */ |
| 8489 | + pSMB->hdr.Pid = tmp & 0xFFFF; |
| 8490 | + tmp >>= 16; |
| 8491 | + pSMB->hdr.PidHigh = tmp & 0xFFFF; |
| 8492 | + |
| 8493 | + pSMB->ParameterCount = 6; |
| 8494 | + pSMB->MaxSetupCount = 0; |
| 8495 | + pSMB->Reserved = 0; |
| 8496 | + pSMB->Flags = 0; |
| 8497 | + pSMB->Timeout = 0; |
| 8498 | + pSMB->Reserved2 = 0; |
| 8499 | + pSMB->ParameterOffset = offsetof(struct smb_com_transaction2_sfi_req, |
| 8500 | + Fid) - 4; |
| 8501 | + pSMB->DataOffset = pSMB->ParameterOffset + pSMB->ParameterCount; |
| 8502 | + |
| 8503 | + data_offset = (char *) (&pSMB->hdr.Protocol) + pSMB->DataOffset; |
| 8504 | + |
| 8505 | + pSMB->DataCount = sizeof(struct file_end_of_file_info); |
| 8506 | + pSMB->MaxParameterCount = cpu_to_le16(2); |
| 8507 | + pSMB->MaxDataCount = cpu_to_le16(1000); /* BB find max SMB PDU from sess */ |
| 8508 | + pSMB->SetupCount = 1; |
| 8509 | + pSMB->Reserved3 = 0; |
| 8510 | + pSMB->SubCommand = cpu_to_le16(TRANS2_SET_FILE_INFORMATION); |
| 8511 | + pSMB->ByteCount = 3 /* pad */ + pSMB->ParameterCount + pSMB->DataCount; |
| 8512 | + pSMB->DataCount = cpu_to_le16(pSMB->DataCount); |
| 8513 | + pSMB->ParameterCount = cpu_to_le16(pSMB->ParameterCount); |
| 8514 | + pSMB->TotalDataCount = pSMB->DataCount; |
| 8515 | + pSMB->TotalParameterCount = pSMB->ParameterCount; |
| 8516 | + pSMB->ParameterOffset = cpu_to_le16(pSMB->ParameterOffset); |
| 8517 | + parm_data = |
| 8518 | + (struct file_end_of_file_info *) (((char *) &pSMB->hdr.Protocol) + |
| 8519 | + pSMB->DataOffset); |
| 8520 | + pSMB->DataOffset = cpu_to_le16(pSMB->DataOffset); /* now safe to change to le */ |
| 8521 | + parm_data->FileSize = cpu_to_le64(size); |
| 8522 | + pSMB->Fid = fid; |
| 8523 | + if(SetAllocation) { |
| 8524 | + if (tcon->ses->capabilities & CAP_INFOLEVEL_PASSTHRU) |
| 8525 | + pSMB->InformationLevel = |
| 8526 | + cpu_to_le16(SMB_SET_FILE_ALLOCATION_INFO2); |
| 8527 | + else |
| 8528 | + pSMB->InformationLevel = |
| 8529 | + cpu_to_le16(SMB_SET_FILE_ALLOCATION_INFO); |
| 8530 | + } else /* Set File Size */ { |
| 8531 | + if (tcon->ses->capabilities & CAP_INFOLEVEL_PASSTHRU) |
| 8532 | + pSMB->InformationLevel = |
| 8533 | + cpu_to_le16(SMB_SET_FILE_END_OF_FILE_INFO2); |
| 8534 | + else |
| 8535 | + pSMB->InformationLevel = |
| 8536 | + cpu_to_le16(SMB_SET_FILE_END_OF_FILE_INFO); |
| 8537 | + } |
| 8538 | + pSMB->Reserved4 = 0; |
| 8539 | + pSMB->hdr.smb_buf_length += pSMB->ByteCount; |
| 8540 | + pSMB->ByteCount = cpu_to_le16(pSMB->ByteCount); |
| 8541 | + rc = SendReceive(xid, tcon->ses, (struct smb_hdr *) pSMB, |
| 8542 | + (struct smb_hdr *) pSMBr, &bytes_returned, 0); |
| 8543 | + if (rc) { |
| 8544 | + cFYI(1, |
| 8545 | + ("Send error in SetFileInfo (SetFileSize) = %d", |
| 8546 | + rc)); |
| 8547 | + } |
| 8548 | + |
| 8549 | + if (pSMB) |
| 8550 | + cifs_buf_release(pSMB); |
| 8551 | + |
| 8552 | + /* Note: On -EAGAIN error only caller can retry on handle based calls |
| 8553 | + since file handle passed in no longer valid */ |
| 8554 | + |
| 8555 | + return rc; |
| 8556 | +} |
| 8557 | + |
| 8558 | +int |
| 8559 | +CIFSSMBSetTimes(int xid, struct cifsTconInfo *tcon, char *fileName, |
| 8560 | + FILE_BASIC_INFO * data, const struct nls_table *nls_codepage) |
| 8561 | +{ |
| 8562 | + TRANSACTION2_SPI_REQ *pSMB = NULL; |
| 8563 | + TRANSACTION2_SPI_RSP *pSMBr = NULL; |
| 8564 | + int name_len; |
| 8565 | + int rc = 0; |
| 8566 | + int bytes_returned = 0; |
| 8567 | + char *data_offset; |
| 8568 | + |
| 8569 | + cFYI(1, ("In SetTimes")); |
| 8570 | + |
| 8571 | +SetTimesRetry: |
| 8572 | + rc = smb_init(SMB_COM_TRANSACTION2, 15, tcon, (void **) &pSMB, |
| 8573 | + (void **) &pSMBr); |
| 8574 | + if (rc) |
| 8575 | + return rc; |
| 8576 | + |
| 8577 | + if (pSMB->hdr.Flags2 & SMBFLG2_UNICODE) { |
| 8578 | + name_len = |
| 8579 | + cifs_strtoUCS((wchar_t *) pSMB->FileName, fileName, 530 |
| 8580 | + /* find define for this maxpathcomponent */ |
| 8581 | + , nls_codepage); |
| 8582 | + name_len++; /* trailing null */ |
| 8583 | + name_len *= 2; |
| 8584 | + } else { /* BB improve the check for buffer overruns BB */ |
| 8585 | + name_len = strnlen(fileName, 530); |
| 8586 | + name_len++; /* trailing null */ |
| 8587 | + strncpy(pSMB->FileName, fileName, name_len); |
| 8588 | + } |
| 8589 | + |
| 8590 | + pSMB->ParameterCount = 6 + name_len; |
| 8591 | + pSMB->DataCount = sizeof (FILE_BASIC_INFO); |
| 8592 | + pSMB->MaxParameterCount = cpu_to_le16(2); |
| 8593 | + pSMB->MaxDataCount = cpu_to_le16(1000); /* BB find exact max SMB PDU from sess structure BB */ |
| 8594 | + pSMB->MaxSetupCount = 0; |
| 8595 | + pSMB->Reserved = 0; |
| 8596 | + pSMB->Flags = 0; |
| 8597 | + pSMB->Timeout = 0; |
| 8598 | + pSMB->Reserved2 = 0; |
| 8599 | + pSMB->ParameterOffset = offsetof(struct smb_com_transaction2_spi_req, |
| 8600 | + InformationLevel) - 4; |
| 8601 | + pSMB->DataOffset = pSMB->ParameterOffset + pSMB->ParameterCount; |
| 8602 | + data_offset = (char *) (&pSMB->hdr.Protocol) + pSMB->DataOffset; |
| 8603 | + pSMB->ParameterOffset = cpu_to_le16(pSMB->ParameterOffset); |
| 8604 | + pSMB->DataOffset = cpu_to_le16(pSMB->DataOffset); |
| 8605 | + pSMB->SetupCount = 1; |
| 8606 | + pSMB->Reserved3 = 0; |
| 8607 | + pSMB->SubCommand = cpu_to_le16(TRANS2_SET_PATH_INFORMATION); |
| 8608 | + pSMB->ByteCount = 3 /* pad */ + pSMB->ParameterCount + pSMB->DataCount; |
| 8609 | + |
| 8610 | + pSMB->DataCount = cpu_to_le16(pSMB->DataCount); |
| 8611 | + pSMB->ParameterCount = cpu_to_le16(pSMB->ParameterCount); |
| 8612 | + pSMB->TotalDataCount = pSMB->DataCount; |
| 8613 | + pSMB->TotalParameterCount = pSMB->ParameterCount; |
| 8614 | + if (tcon->ses->capabilities & CAP_INFOLEVEL_PASSTHRU) |
| 8615 | + pSMB->InformationLevel = cpu_to_le16(SMB_SET_FILE_BASIC_INFO2); |
| 8616 | + else |
| 8617 | + pSMB->InformationLevel = cpu_to_le16(SMB_SET_FILE_BASIC_INFO); |
| 8618 | + pSMB->Reserved4 = 0; |
| 8619 | + pSMB->hdr.smb_buf_length += pSMB->ByteCount; |
| 8620 | + memcpy(data_offset, data, sizeof (FILE_BASIC_INFO)); |
| 8621 | + pSMB->ByteCount = cpu_to_le16(pSMB->ByteCount); |
| 8622 | + rc = SendReceive(xid, tcon->ses, (struct smb_hdr *) pSMB, |
| 8623 | + (struct smb_hdr *) pSMBr, &bytes_returned, 0); |
| 8624 | + if (rc) { |
| 8625 | + cFYI(1, ("SetPathInfo (times) returned %d", rc)); |
| 8626 | + } |
| 8627 | + |
| 8628 | + if (pSMB) |
| 8629 | + cifs_buf_release(pSMB); |
| 8630 | + |
| 8631 | + if (rc == -EAGAIN) |
| 8632 | + goto SetTimesRetry; |
| 8633 | + |
| 8634 | + return rc; |
| 8635 | +} |
| 8636 | + |
| 8637 | +int |
| 8638 | +CIFSSMBUnixSetPerms(const int xid, struct cifsTconInfo *tcon, |
| 8639 | + char *fileName, __u64 mode, __u64 uid, __u64 gid, |
| 8640 | + dev_t device, const struct nls_table *nls_codepage) |
| 8641 | +{ |
| 8642 | + TRANSACTION2_SPI_REQ *pSMB = NULL; |
| 8643 | + TRANSACTION2_SPI_RSP *pSMBr = NULL; |
| 8644 | + int name_len; |
| 8645 | + int rc = 0; |
| 8646 | + int bytes_returned = 0; |
| 8647 | + FILE_UNIX_BASIC_INFO *data_offset; |
| 8648 | + |
| 8649 | + cFYI(1, ("In SetUID/GID/Mode")); |
| 8650 | +setPermsRetry: |
| 8651 | + rc = smb_init(SMB_COM_TRANSACTION2, 15, tcon, (void **) &pSMB, |
| 8652 | + (void **) &pSMBr); |
| 8653 | + if (rc) |
| 8654 | + return rc; |
| 8655 | + |
| 8656 | + if (pSMB->hdr.Flags2 & SMBFLG2_UNICODE) { |
| 8657 | + name_len = |
| 8658 | + cifs_strtoUCS((wchar_t *) pSMB->FileName, fileName, 530 |
| 8659 | + /* find define for this maxpathcomponent */ |
| 8660 | + , nls_codepage); |
| 8661 | + name_len++; /* trailing null */ |
| 8662 | + name_len *= 2; |
| 8663 | + } else { /* BB improve the check for buffer overruns BB */ |
| 8664 | + name_len = strnlen(fileName, 530); |
| 8665 | + name_len++; /* trailing null */ |
| 8666 | + strncpy(pSMB->FileName, fileName, name_len); |
| 8667 | + } |
| 8668 | + |
| 8669 | + pSMB->ParameterCount = 6 + name_len; |
| 8670 | + pSMB->DataCount = sizeof (FILE_UNIX_BASIC_INFO); |
| 8671 | + pSMB->MaxParameterCount = cpu_to_le16(2); |
| 8672 | + pSMB->MaxDataCount = cpu_to_le16(1000); /* BB find exact max SMB PDU from sess structure BB */ |
| 8673 | + pSMB->MaxSetupCount = 0; |
| 8674 | + pSMB->Reserved = 0; |
| 8675 | + pSMB->Flags = 0; |
| 8676 | + pSMB->Timeout = 0; |
| 8677 | + pSMB->Reserved2 = 0; |
| 8678 | + pSMB->ParameterOffset = offsetof(struct smb_com_transaction2_spi_req, |
| 8679 | + InformationLevel) - 4; |
| 8680 | + pSMB->DataOffset = pSMB->ParameterOffset + pSMB->ParameterCount; |
| 8681 | + data_offset = |
| 8682 | + (FILE_UNIX_BASIC_INFO *) ((char *) &pSMB->hdr.Protocol + |
| 8683 | + pSMB->DataOffset); |
| 8684 | + pSMB->DataOffset = cpu_to_le16(pSMB->DataOffset); |
| 8685 | + pSMB->ParameterOffset = cpu_to_le16(pSMB->ParameterOffset); |
| 8686 | + pSMB->SetupCount = 1; |
| 8687 | + pSMB->Reserved3 = 0; |
| 8688 | + pSMB->SubCommand = cpu_to_le16(TRANS2_SET_PATH_INFORMATION); |
| 8689 | + pSMB->ByteCount = 3 /* pad */ + pSMB->ParameterCount + pSMB->DataCount; |
| 8690 | + pSMB->ParameterCount = cpu_to_le16(pSMB->ParameterCount); |
| 8691 | + pSMB->DataCount = cpu_to_le16(pSMB->DataCount); |
| 8692 | + pSMB->TotalParameterCount = pSMB->ParameterCount; |
| 8693 | + pSMB->TotalDataCount = pSMB->DataCount; |
| 8694 | + pSMB->InformationLevel = cpu_to_le16(SMB_SET_FILE_UNIX_BASIC); |
| 8695 | + pSMB->Reserved4 = 0; |
| 8696 | + pSMB->hdr.smb_buf_length += pSMB->ByteCount; |
| 8697 | + data_offset->Uid = cpu_to_le64(uid); |
| 8698 | + data_offset->Gid = cpu_to_le64(gid); |
| 8699 | + /* better to leave device as zero when it is */ |
| 8700 | + data_offset->DevMajor = cpu_to_le64(MAJOR(device)); |
| 8701 | + data_offset->DevMinor = cpu_to_le64(MINOR(device)); |
| 8702 | + data_offset->Permissions = cpu_to_le64(mode); |
| 8703 | + |
| 8704 | + if(S_ISREG(mode)) |
| 8705 | + data_offset->Type = cpu_to_le32(UNIX_FILE); |
| 8706 | + else if(S_ISDIR(mode)) |
| 8707 | + data_offset->Type = cpu_to_le32(UNIX_DIR); |
| 8708 | + else if(S_ISLNK(mode)) |
| 8709 | + data_offset->Type = cpu_to_le32(UNIX_SYMLINK); |
| 8710 | + else if(S_ISCHR(mode)) |
| 8711 | + data_offset->Type = cpu_to_le32(UNIX_CHARDEV); |
| 8712 | + else if(S_ISBLK(mode)) |
| 8713 | + data_offset->Type = cpu_to_le32(UNIX_BLOCKDEV); |
| 8714 | + else if(S_ISFIFO(mode)) |
| 8715 | + data_offset->Type = cpu_to_le32(UNIX_FIFO); |
| 8716 | + else if(S_ISSOCK(mode)) |
| 8717 | + data_offset->Type = cpu_to_le32(UNIX_SOCKET); |
| 8718 | + |
| 8719 | + |
| 8720 | + pSMB->ByteCount = cpu_to_le16(pSMB->ByteCount); |
| 8721 | + rc = SendReceive(xid, tcon->ses, (struct smb_hdr *) pSMB, |
| 8722 | + (struct smb_hdr *) pSMBr, &bytes_returned, 0); |
| 8723 | + if (rc) { |
| 8724 | + cFYI(1, ("SetPathInfo (perms) returned %d", rc)); |
| 8725 | + } |
| 8726 | + |
| 8727 | + if (pSMB) |
| 8728 | + cifs_buf_release(pSMB); |
| 8729 | + if (rc == -EAGAIN) |
| 8730 | + goto setPermsRetry; |
| 8731 | + return rc; |
| 8732 | +} |
| 8733 | + |
| 8734 | +int CIFSSMBNotify(const int xid, struct cifsTconInfo *tcon, |
| 8735 | + const int notify_subdirs, const __u16 netfid, |
| 8736 | + __u32 filter, const struct nls_table *nls_codepage) |
| 8737 | +{ |
| 8738 | + int rc = 0; |
| 8739 | + struct smb_com_transaction_change_notify_req * pSMB = NULL; |
| 8740 | + struct smb_com_transaction_change_notify_rsp * pSMBr = NULL; |
| 8741 | + int bytes_returned; |
| 8742 | + |
| 8743 | + cFYI(1, ("In CIFSSMBNotify for file handle %d",(int)netfid)); |
| 8744 | + rc = smb_init(SMB_COM_NT_TRANSACT, 23, tcon, (void **) &pSMB, |
| 8745 | + (void **) &pSMBr); |
| 8746 | + if (rc) |
| 8747 | + return rc; |
| 8748 | + |
| 8749 | + pSMB->TotalParameterCount = 0 ; |
| 8750 | + pSMB->TotalDataCount = 0; |
| 8751 | + pSMB->MaxParameterCount = cpu_to_le32(2); |
| 8752 | + /* BB find exact data count max from sess structure BB */ |
| 8753 | + pSMB->MaxDataCount = 0; /* same in little endian or be */ |
| 8754 | + pSMB->MaxSetupCount = 4; |
| 8755 | + pSMB->Reserved = 0; |
| 8756 | + pSMB->ParameterOffset = 0; |
| 8757 | + pSMB->DataCount = 0; |
| 8758 | + pSMB->DataOffset = 0; |
| 8759 | + pSMB->SetupCount = 4; /* single byte does not need le conversion */ |
| 8760 | + pSMB->SubCommand = cpu_to_le16(NT_TRANSACT_NOTIFY_CHANGE); |
| 8761 | + pSMB->ParameterCount = pSMB->TotalParameterCount; |
| 8762 | + if(notify_subdirs) |
| 8763 | + pSMB->WatchTree = 1; /* one byte - no le conversion needed */ |
| 8764 | + pSMB->Reserved2 = 0; |
| 8765 | + pSMB->CompletionFilter = cpu_to_le32(filter); |
| 8766 | + pSMB->Fid = netfid; /* file handle always le */ |
| 8767 | + pSMB->ByteCount = 0; |
| 8768 | + |
| 8769 | + pSMB->hdr.smb_buf_length += pSMB->ByteCount; |
| 8770 | + rc = SendReceive(xid, tcon->ses, (struct smb_hdr *) pSMB, |
| 8771 | + (struct smb_hdr *) pSMBr, &bytes_returned, 0); |
| 8772 | + if (rc) { |
| 8773 | + cFYI(1, ("Error in Notify = %d", rc)); |
| 8774 | + } |
| 8775 | + if (pSMB) |
| 8776 | + cifs_buf_release(pSMB); |
| 8777 | +/* if (rc == -EAGAIN) |
| 8778 | + goto NotifyRetry; */ |
| 8779 | + return rc; |
| 8780 | +} |
| 8781 | +#ifdef CONFIG_CIFS_XATTR |
| 8782 | +int |
| 8783 | +CIFSSMBQAllEAs(const int xid, struct cifsTconInfo *tcon, |
| 8784 | + const unsigned char *searchName, |
| 8785 | + char * EAData, size_t size, |
| 8786 | + const struct nls_table *nls_codepage) |
| 8787 | +{ |
| 8788 | + /* BB assumes one setup word */ |
| 8789 | + TRANSACTION2_QPI_REQ *pSMB = NULL; |
| 8790 | + TRANSACTION2_QPI_RSP *pSMBr = NULL; |
| 8791 | + int rc = 0; |
| 8792 | + int bytes_returned; |
| 8793 | + int name_len; |
| 8794 | + |
| 8795 | + cFYI(1, ("In Query All EAs path %s", searchName)); |
| 8796 | +QAllEAsRetry: |
| 8797 | + rc = smb_init(SMB_COM_TRANSACTION2, 15, tcon, (void **) &pSMB, |
| 8798 | + (void **) &pSMBr); |
| 8799 | + if (rc) |
| 8800 | + return rc; |
| 8801 | + |
| 8802 | + if (pSMB->hdr.Flags2 & SMBFLG2_UNICODE) { |
| 8803 | + name_len = |
| 8804 | + cifs_strtoUCS((wchar_t *) pSMB->FileName, searchName, 530 |
| 8805 | + /* find define for this maxpathcomponent */ |
| 8806 | + , nls_codepage); |
| 8807 | + name_len++; /* trailing null */ |
| 8808 | + name_len *= 2; |
| 8809 | + } else { /* BB improve the check for buffer overruns BB */ |
| 8810 | + name_len = strnlen(searchName, 530); |
| 8811 | + name_len++; /* trailing null */ |
| 8812 | + strncpy(pSMB->FileName, searchName, name_len); |
| 8813 | + } |
| 8814 | + |
| 8815 | + pSMB->TotalParameterCount = 2 /* level */ + 4 /* reserved */ + |
| 8816 | + name_len /* includes null */ ; |
| 8817 | + pSMB->TotalDataCount = 0; |
| 8818 | + pSMB->MaxParameterCount = cpu_to_le16(2); |
| 8819 | + pSMB->MaxDataCount = cpu_to_le16(4000); /* BB find exact max SMB PDU from sess structure BB */ |
| 8820 | + pSMB->MaxSetupCount = 0; |
| 8821 | + pSMB->Reserved = 0; |
| 8822 | + pSMB->Flags = 0; |
| 8823 | + pSMB->Timeout = 0; |
| 8824 | + pSMB->Reserved2 = 0; |
| 8825 | + pSMB->ParameterOffset = cpu_to_le16(offsetof( |
| 8826 | + struct smb_com_transaction2_qpi_req ,InformationLevel) - 4); |
| 8827 | + pSMB->DataCount = 0; |
| 8828 | + pSMB->DataOffset = 0; |
| 8829 | + pSMB->SetupCount = 1; |
| 8830 | + pSMB->Reserved3 = 0; |
| 8831 | + pSMB->SubCommand = cpu_to_le16(TRANS2_QUERY_PATH_INFORMATION); |
| 8832 | + pSMB->ByteCount = pSMB->TotalParameterCount + 1 /* pad */ ; |
| 8833 | + pSMB->TotalParameterCount = cpu_to_le16(pSMB->TotalParameterCount); |
| 8834 | + pSMB->ParameterCount = pSMB->TotalParameterCount; |
| 8835 | + pSMB->InformationLevel = cpu_to_le16(SMB_INFO_QUERY_ALL_EAS); |
| 8836 | + pSMB->Reserved4 = 0; |
| 8837 | + pSMB->hdr.smb_buf_length += pSMB->ByteCount; |
| 8838 | + pSMB->ByteCount = cpu_to_le16(pSMB->ByteCount); |
| 8839 | + |
| 8840 | + rc = SendReceive(xid, tcon->ses, (struct smb_hdr *) pSMB, |
| 8841 | + (struct smb_hdr *) pSMBr, &bytes_returned, 0); |
| 8842 | + if (rc) { |
| 8843 | + cFYI(1, ("Send error in QueryAllEAs = %d", rc)); |
| 8844 | + } else { /* decode response */ |
| 8845 | + pSMBr->DataOffset = le16_to_cpu(pSMBr->DataOffset); |
| 8846 | + /* BB also check enough total bytes returned */ |
| 8847 | + /* BB we need to improve the validity checking |
| 8848 | + of these trans2 responses */ |
| 8849 | + if ((pSMBr->ByteCount < 4) || (pSMBr->DataOffset > 512)) |
| 8850 | + rc = -EIO; /* bad smb */ |
| 8851 | + /* else if (pFindData){ |
| 8852 | + memcpy((char *) pFindData, |
| 8853 | + (char *) &pSMBr->hdr.Protocol + |
| 8854 | + pSMBr->DataOffset, kl); |
| 8855 | + }*/ else { |
| 8856 | + /* check that length of list is not more than bcc */ |
| 8857 | + /* check that each entry does not go beyond length |
| 8858 | + of list */ |
| 8859 | + /* check that each element of each entry does not |
| 8860 | + go beyond end of list */ |
| 8861 | + struct fealist * ea_response_data; |
| 8862 | + rc = 0; |
| 8863 | + /* validate_trans2_offsets() */ |
| 8864 | + /* BB to check if(start of smb + pSMBr->DataOffset > &bcc+ bcc)*/ |
| 8865 | + ea_response_data = (struct fealist *) |
| 8866 | + (((char *) &pSMBr->hdr.Protocol) + |
| 8867 | + pSMBr->DataOffset); |
| 8868 | + cFYI(1,("ea length %d",ea_response_data->list_len)); |
| 8869 | + } |
| 8870 | + } |
| 8871 | + if (pSMB) |
| 8872 | + cifs_buf_release(pSMB); |
| 8873 | + if (rc == -EAGAIN) |
| 8874 | + goto QAllEAsRetry; |
| 8875 | + |
| 8876 | + return rc; |
| 8877 | +} |
| 8878 | +#endif |
| 8879 | --- /dev/null |
| 8880 | +++ b/fs/cifs/cifs_unicode.c |
| 8881 | @@ -0,0 +1,87 @@ |
| 8882 | +/* |
| 8883 | + * fs/cifs/cifs_unicode.c |
| 8884 | + * |
| 8885 | + * Copyright (c) International Business Machines Corp., 2000,2002 |
| 8886 | + * Modified by Steve French (sfrench@us.ibm.com) |
| 8887 | + * |
| 8888 | + * This program is free software; you can redistribute it and/or modify |
| 8889 | + * it under the terms of the GNU General Public License as published by |
| 8890 | + * the Free Software Foundation; either version 2 of the License, or |
| 8891 | + * (at your option) any later version. |
| 8892 | + * |
| 8893 | + * This program is distributed in the hope that it will be useful, |
| 8894 | + * but WITHOUT ANY WARRANTY; without even the implied warranty of |
| 8895 | + * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See |
| 8896 | + * the GNU General Public License for more details. |
| 8897 | + * |
| 8898 | + * You should have received a copy of the GNU General Public License |
| 8899 | + * along with this program; if not, write to the Free Software |
| 8900 | + * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA |
| 8901 | + */ |
| 8902 | +#include <linux/fs.h> |
| 8903 | +#include "cifs_unicode.h" |
| 8904 | +#include "cifs_uniupr.h" |
| 8905 | +#include "cifspdu.h" |
| 8906 | +#include "cifs_debug.h" |
| 8907 | + |
| 8908 | +/* |
| 8909 | + * NAME: cifs_strfromUCS() |
| 8910 | + * |
| 8911 | + * FUNCTION: Convert little-endian unicode string to character string |
| 8912 | + * |
| 8913 | + */ |
| 8914 | +int |
| 8915 | +cifs_strfromUCS_le(char *to, const wchar_t * from, /* LITTLE ENDIAN */ |
| 8916 | + int len, const struct nls_table *codepage) |
| 8917 | +{ |
| 8918 | + int i; |
| 8919 | + int outlen = 0; |
| 8920 | + |
| 8921 | + for (i = 0; (i < len) && from[i]; i++) { |
| 8922 | + int charlen; |
| 8923 | + /* 2.4.0 kernel or greater */ |
| 8924 | + charlen = |
| 8925 | + codepage->uni2char(le16_to_cpu(from[i]), &to[outlen], |
| 8926 | + NLS_MAX_CHARSET_SIZE); |
| 8927 | + if (charlen > 0) { |
| 8928 | + outlen += charlen; |
| 8929 | + } else { |
| 8930 | + to[outlen++] = '?'; |
| 8931 | + } |
| 8932 | + } |
| 8933 | + to[outlen] = 0; |
| 8934 | + return outlen; |
| 8935 | +} |
| 8936 | + |
| 8937 | +/* |
| 8938 | + * NAME: cifs_strtoUCS() |
| 8939 | + * |
| 8940 | + * FUNCTION: Convert character string to unicode string |
| 8941 | + * |
| 8942 | + */ |
| 8943 | +int |
| 8944 | +cifs_strtoUCS(wchar_t * to, const char *from, int len, |
| 8945 | + const struct nls_table *codepage) |
| 8946 | +{ |
| 8947 | + int charlen; |
| 8948 | + int i; |
| 8949 | + |
| 8950 | + for (i = 0; len && *from; i++, from += charlen, len -= charlen) { |
| 8951 | + |
| 8952 | + /* works for 2.4.0 kernel or later */ |
| 8953 | + charlen = codepage->char2uni(from, len, &to[i]); |
| 8954 | + if (charlen < 1) { |
| 8955 | + cERROR(1, |
| 8956 | + ("cifs_strtoUCS: char2uni returned %d", |
| 8957 | + charlen)); |
| 8958 | + to[i] = cpu_to_le16(0x003f); /* a question mark */ |
| 8959 | + charlen = 1; |
| 8960 | + } |
| 8961 | + to[i] = cpu_to_le16(to[i]); |
| 8962 | + |
| 8963 | + } |
| 8964 | + |
| 8965 | + to[i] = 0; |
| 8966 | + return i; |
| 8967 | +} |
| 8968 | + |
| 8969 | --- /dev/null |
| 8970 | +++ b/fs/cifs/cifs_unicode.h |
| 8971 | @@ -0,0 +1,353 @@ |
| 8972 | +/* |
| 8973 | + * cifs_unicode: Unicode kernel case support |
| 8974 | + * |
| 8975 | + * Function: |
| 8976 | + * Convert a unicode character to upper or lower case using |
| 8977 | + * compressed tables. |
| 8978 | + * |
| 8979 | + * Copyright (c) International Business Machines Corp., 2000,2002 |
| 8980 | + * |
| 8981 | + * This program is free software; you can redistribute it and/or modify |
| 8982 | + * it under the terms of the GNU General Public License as published by |
| 8983 | + * the Free Software Foundation; either version 2 of the License, or |
| 8984 | + * (at your option) any later version. |
| 8985 | + * |
| 8986 | + * This program is distributed in the hope that it will be useful, |
| 8987 | + * but WITHOUT ANY WARRANTY; without even the implied warranty of |
| 8988 | + * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See |
| 8989 | + * the GNU General Public License for more details. |
| 8990 | + * |
| 8991 | + * You should have received a copy of the GNU General Public License |
| 8992 | + * along with this program; if not, write to the Free Software |
| 8993 | + * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA |
| 8994 | + * |
| 8995 | + * |
| 8996 | + * Notes: |
| 8997 | + * These APIs are based on the C library functions. The semantics |
| 8998 | + * should match the C functions but with expanded size operands. |
| 8999 | + * |
| 9000 | + * The upper/lower functions are based on a table created by mkupr. |
| 9001 | + * This is a compressed table of upper and lower case conversion. |
| 9002 | + * |
| 9003 | + */ |
| 9004 | + |
| 9005 | +#include <asm/byteorder.h> |
| 9006 | +#include <linux/types.h> |
| 9007 | +#include <linux/nls.h> |
| 9008 | + |
| 9009 | +#define UNIUPR_NOLOWER /* Example to not expand lower case tables */ |
| 9010 | + |
| 9011 | +/* Just define what we want from uniupr.h. We don't want to define the tables |
| 9012 | + * in each source file. |
| 9013 | + */ |
| 9014 | +#ifndef UNICASERANGE_DEFINED |
| 9015 | +struct UniCaseRange { |
| 9016 | + wchar_t start; |
| 9017 | + wchar_t end; |
| 9018 | + signed char *table; |
| 9019 | +}; |
| 9020 | +#endif /* UNICASERANGE_DEFINED */ |
| 9021 | + |
| 9022 | +#ifndef UNIUPR_NOUPPER |
| 9023 | +extern signed char CifsUniUpperTable[512]; |
| 9024 | +extern const struct UniCaseRange CifsUniUpperRange[]; |
| 9025 | +#endif /* UNIUPR_NOUPPER */ |
| 9026 | + |
| 9027 | +#ifndef UNIUPR_NOLOWER |
| 9028 | +extern signed char UniLowerTable[512]; |
| 9029 | +extern struct UniCaseRange UniLowerRange[]; |
| 9030 | +#endif /* UNIUPR_NOLOWER */ |
| 9031 | + |
| 9032 | +#ifdef __KERNEL__ |
| 9033 | +int cifs_strfromUCS_le(char *, const wchar_t *, int, const struct nls_table *); |
| 9034 | +int cifs_strtoUCS(wchar_t *, const char *, int, const struct nls_table *); |
| 9035 | +#endif |
| 9036 | + |
| 9037 | +/* |
| 9038 | + * UniStrcat: Concatenate the second string to the first |
| 9039 | + * |
| 9040 | + * Returns: |
| 9041 | + * Address of the first string |
| 9042 | + */ |
| 9043 | +static inline wchar_t * |
| 9044 | +UniStrcat(wchar_t * ucs1, const wchar_t * ucs2) |
| 9045 | +{ |
| 9046 | + wchar_t *anchor = ucs1; /* save a pointer to start of ucs1 */ |
| 9047 | + |
| 9048 | + while (*ucs1++) ; /* To end of first string */ |
| 9049 | + ucs1--; /* Return to the null */ |
| 9050 | + while ((*ucs1++ = *ucs2++)) ; /* copy string 2 over */ |
| 9051 | + return anchor; |
| 9052 | +} |
| 9053 | + |
| 9054 | +/* |
| 9055 | + * UniStrchr: Find a character in a string |
| 9056 | + * |
| 9057 | + * Returns: |
| 9058 | + * Address of first occurrence of character in string |
| 9059 | + * or NULL if the character is not in the string |
| 9060 | + */ |
| 9061 | +static inline wchar_t * |
| 9062 | +UniStrchr(const wchar_t * ucs, wchar_t uc) |
| 9063 | +{ |
| 9064 | + while ((*ucs != uc) && *ucs) |
| 9065 | + ucs++; |
| 9066 | + |
| 9067 | + if (*ucs == uc) |
| 9068 | + return (wchar_t *) ucs; |
| 9069 | + return NULL; |
| 9070 | +} |
| 9071 | + |
| 9072 | +/* |
| 9073 | + * UniStrcmp: Compare two strings |
| 9074 | + * |
| 9075 | + * Returns: |
| 9076 | + * < 0: First string is less than second |
| 9077 | + * = 0: Strings are equal |
| 9078 | + * > 0: First string is greater than second |
| 9079 | + */ |
| 9080 | +static inline int |
| 9081 | +UniStrcmp(const wchar_t * ucs1, const wchar_t * ucs2) |
| 9082 | +{ |
| 9083 | + while ((*ucs1 == *ucs2) && *ucs1) { |
| 9084 | + ucs1++; |
| 9085 | + ucs2++; |
| 9086 | + } |
| 9087 | + return (int) *ucs1 - (int) *ucs2; |
| 9088 | +} |
| 9089 | + |
| 9090 | +/* |
| 9091 | + * UniStrcpy: Copy a string |
| 9092 | + */ |
| 9093 | +static inline wchar_t * |
| 9094 | +UniStrcpy(wchar_t * ucs1, const wchar_t * ucs2) |
| 9095 | +{ |
| 9096 | + wchar_t *anchor = ucs1; /* save the start of result string */ |
| 9097 | + |
| 9098 | + while ((*ucs1++ = *ucs2++)) ; |
| 9099 | + return anchor; |
| 9100 | +} |
| 9101 | + |
| 9102 | +/* |
| 9103 | + * UniStrlen: Return the length of a string (in 16 bit Unicode chars not bytes) |
| 9104 | + */ |
| 9105 | +static inline size_t |
| 9106 | +UniStrlen(const wchar_t * ucs1) |
| 9107 | +{ |
| 9108 | + int i = 0; |
| 9109 | + |
| 9110 | + while (*ucs1++) |
| 9111 | + i++; |
| 9112 | + return i; |
| 9113 | +} |
| 9114 | + |
| 9115 | +/* |
| 9116 | + * UniStrnlen: Return the length (in 16 bit Unicode chars not bytes) of a string (length limited) |
| 9117 | + */ |
| 9118 | +static inline size_t |
| 9119 | +UniStrnlen(const wchar_t * ucs1, int maxlen) |
| 9120 | +{ |
| 9121 | + int i = 0; |
| 9122 | + |
| 9123 | + while (*ucs1++) { |
| 9124 | + i++; |
| 9125 | + if (i >= maxlen) |
| 9126 | + break; |
| 9127 | + } |
| 9128 | + return i; |
| 9129 | +} |
| 9130 | + |
| 9131 | +/* |
| 9132 | + * UniStrncat: Concatenate length limited string |
| 9133 | + */ |
| 9134 | +static inline wchar_t * |
| 9135 | +UniStrncat(wchar_t * ucs1, const wchar_t * ucs2, size_t n) |
| 9136 | +{ |
| 9137 | + wchar_t *anchor = ucs1; /* save pointer to string 1 */ |
| 9138 | + |
| 9139 | + while (*ucs1++) ; |
| 9140 | + ucs1--; /* point to null terminator of s1 */ |
| 9141 | + while (n-- && (*ucs1 = *ucs2)) { /* copy s2 after s1 */ |
| 9142 | + ucs1++; |
| 9143 | + ucs2++; |
| 9144 | + } |
| 9145 | + *ucs1 = 0; /* Null terminate the result */ |
| 9146 | + return (anchor); |
| 9147 | +} |
| 9148 | + |
| 9149 | +/* |
| 9150 | + * UniStrncmp: Compare length limited string |
| 9151 | + */ |
| 9152 | +static inline int |
| 9153 | +UniStrncmp(const wchar_t * ucs1, const wchar_t * ucs2, size_t n) |
| 9154 | +{ |
| 9155 | + if (!n) |
| 9156 | + return 0; /* Null strings are equal */ |
| 9157 | + while ((*ucs1 == *ucs2) && *ucs1 && --n) { |
| 9158 | + ucs1++; |
| 9159 | + ucs2++; |
| 9160 | + } |
| 9161 | + return (int) *ucs1 - (int) *ucs2; |
| 9162 | +} |
| 9163 | + |
| 9164 | +/* |
| 9165 | + * UniStrncmp_le: Compare length limited string - native to little-endian |
| 9166 | + */ |
| 9167 | +static inline int |
| 9168 | +UniStrncmp_le(const wchar_t * ucs1, const wchar_t * ucs2, size_t n) |
| 9169 | +{ |
| 9170 | + if (!n) |
| 9171 | + return 0; /* Null strings are equal */ |
| 9172 | + while ((*ucs1 == __le16_to_cpu(*ucs2)) && *ucs1 && --n) { |
| 9173 | + ucs1++; |
| 9174 | + ucs2++; |
| 9175 | + } |
| 9176 | + return (int) *ucs1 - (int) __le16_to_cpu(*ucs2); |
| 9177 | +} |
| 9178 | + |
| 9179 | +/* |
| 9180 | + * UniStrncpy: Copy length limited string with pad |
| 9181 | + */ |
| 9182 | +static inline wchar_t * |
| 9183 | +UniStrncpy(wchar_t * ucs1, const wchar_t * ucs2, size_t n) |
| 9184 | +{ |
| 9185 | + wchar_t *anchor = ucs1; |
| 9186 | + |
| 9187 | + while (n-- && *ucs2) /* Copy the strings */ |
| 9188 | + *ucs1++ = *ucs2++; |
| 9189 | + |
| 9190 | + n++; |
| 9191 | + while (n--) /* Pad with nulls */ |
| 9192 | + *ucs1++ = 0; |
| 9193 | + return anchor; |
| 9194 | +} |
| 9195 | + |
| 9196 | +/* |
| 9197 | + * UniStrncpy_le: Copy length limited string with pad to little-endian |
| 9198 | + */ |
| 9199 | +static inline wchar_t * |
| 9200 | +UniStrncpy_le(wchar_t * ucs1, const wchar_t * ucs2, size_t n) |
| 9201 | +{ |
| 9202 | + wchar_t *anchor = ucs1; |
| 9203 | + |
| 9204 | + while (n-- && *ucs2) /* Copy the strings */ |
| 9205 | + *ucs1++ = __le16_to_cpu(*ucs2++); |
| 9206 | + |
| 9207 | + n++; |
| 9208 | + while (n--) /* Pad with nulls */ |
| 9209 | + *ucs1++ = 0; |
| 9210 | + return anchor; |
| 9211 | +} |
| 9212 | + |
| 9213 | +/* |
| 9214 | + * UniStrstr: Find a string in a string |
| 9215 | + * |
| 9216 | + * Returns: |
| 9217 | + * Address of first match found |
| 9218 | + * NULL if no matching string is found |
| 9219 | + */ |
| 9220 | +static inline wchar_t * |
| 9221 | +UniStrstr(const wchar_t * ucs1, const wchar_t * ucs2) |
| 9222 | +{ |
| 9223 | + const wchar_t *anchor1 = ucs1; |
| 9224 | + const wchar_t *anchor2 = ucs2; |
| 9225 | + |
| 9226 | + while (*ucs1) { |
| 9227 | + if (*ucs1 == *ucs2) { /* Partial match found */ |
| 9228 | + ucs1++; |
| 9229 | + ucs2++; |
| 9230 | + } else { |
| 9231 | + if (!*ucs2) /* Match found */ |
| 9232 | + return (wchar_t *) anchor1; |
| 9233 | + ucs1 = ++anchor1; /* No match */ |
| 9234 | + ucs2 = anchor2; |
| 9235 | + } |
| 9236 | + } |
| 9237 | + |
| 9238 | + if (!*ucs2) /* Both end together */ |
| 9239 | + return (wchar_t *) anchor1; /* Match found */ |
| 9240 | + return NULL; /* No match */ |
| 9241 | +} |
| 9242 | + |
| 9243 | +#ifndef UNIUPR_NOUPPER |
| 9244 | +/* |
| 9245 | + * UniToupper: Convert a unicode character to upper case |
| 9246 | + */ |
| 9247 | +static inline wchar_t |
| 9248 | +UniToupper(register wchar_t uc) |
| 9249 | +{ |
| 9250 | + register const struct UniCaseRange *rp; |
| 9251 | + |
| 9252 | + if (uc < sizeof (CifsUniUpperTable)) { /* Latin characters */ |
| 9253 | + return uc + CifsUniUpperTable[uc]; /* Use base tables */ |
| 9254 | + } else { |
| 9255 | + rp = CifsUniUpperRange; /* Use range tables */ |
| 9256 | + while (rp->start) { |
| 9257 | + if (uc < rp->start) /* Before start of range */ |
| 9258 | + return uc; /* Uppercase = input */ |
| 9259 | + if (uc <= rp->end) /* In range */ |
| 9260 | + return uc + rp->table[uc - rp->start]; |
| 9261 | + rp++; /* Try next range */ |
| 9262 | + } |
| 9263 | + } |
| 9264 | + return uc; /* Past last range */ |
| 9265 | +} |
| 9266 | + |
| 9267 | +/* |
| 9268 | + * UniStrupr: Upper case a unicode string |
| 9269 | + */ |
| 9270 | +static inline wchar_t * |
| 9271 | +UniStrupr(register wchar_t * upin) |
| 9272 | +{ |
| 9273 | + register wchar_t *up; |
| 9274 | + |
| 9275 | + up = upin; |
| 9276 | + while (*up) { /* For all characters */ |
| 9277 | + *up = UniToupper(*up); |
| 9278 | + up++; |
| 9279 | + } |
| 9280 | + return upin; /* Return input pointer */ |
| 9281 | +} |
| 9282 | +#endif /* UNIUPR_NOUPPER */ |
| 9283 | + |
| 9284 | +#ifndef UNIUPR_NOLOWER |
| 9285 | +/* |
| 9286 | + * UniTolower: Convert a unicode character to lower case |
| 9287 | + */ |
| 9288 | +static inline wchar_t |
| 9289 | +UniTolower(wchar_t uc) |
| 9290 | +{ |
| 9291 | + register struct UniCaseRange *rp; |
| 9292 | + |
| 9293 | + if (uc < sizeof (UniLowerTable)) { /* Latin characters */ |
| 9294 | + return uc + UniLowerTable[uc]; /* Use base tables */ |
| 9295 | + } else { |
| 9296 | + rp = UniLowerRange; /* Use range tables */ |
| 9297 | + while (rp->start) { |
| 9298 | + if (uc < rp->start) /* Before start of range */ |
| 9299 | + return uc; /* Uppercase = input */ |
| 9300 | + if (uc <= rp->end) /* In range */ |
| 9301 | + return uc + rp->table[uc - rp->start]; |
| 9302 | + rp++; /* Try next range */ |
| 9303 | + } |
| 9304 | + } |
| 9305 | + return uc; /* Past last range */ |
| 9306 | +} |
| 9307 | + |
| 9308 | +/* |
| 9309 | + * UniStrlwr: Lower case a unicode string |
| 9310 | + */ |
| 9311 | +static inline wchar_t * |
| 9312 | +UniStrlwr(register wchar_t * upin) |
| 9313 | +{ |
| 9314 | + register wchar_t *up; |
| 9315 | + |
| 9316 | + up = upin; |
| 9317 | + while (*up) { /* For all characters */ |
| 9318 | + *up = UniTolower(*up); |
| 9319 | + up++; |
| 9320 | + } |
| 9321 | + return upin; /* Return input pointer */ |
| 9322 | +} |
| 9323 | + |
| 9324 | +#endif |
| 9325 | --- /dev/null |
| 9326 | +++ b/fs/cifs/cifs_uniupr.h |
| 9327 | @@ -0,0 +1,253 @@ |
| 9328 | +/* |
| 9329 | + * Copyright (c) International Business Machines Corp., 2000,2002 |
| 9330 | + * |
| 9331 | + * This program is free software; you can redistribute it and/or modify |
| 9332 | + * it under the terms of the GNU General Public License as published by |
| 9333 | + * the Free Software Foundation; either version 2 of the License, or |
| 9334 | + * (at your option) any later version. |
| 9335 | + * |
| 9336 | + * This program is distributed in the hope that it will be useful, |
| 9337 | + * but WITHOUT ANY WARRANTY; without even the implied warranty of |
| 9338 | + * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See |
| 9339 | + * the GNU General Public License for more details. |
| 9340 | + * |
| 9341 | + * You should have received a copy of the GNU General Public License |
| 9342 | + * along with this program; if not, write to the Free Software |
| 9343 | + * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA |
| 9344 | + * |
| 9345 | + * uniupr.h - Unicode compressed case ranges |
| 9346 | + * |
| 9347 | +*/ |
| 9348 | + |
| 9349 | +#ifndef UNIUPR_NOUPPER |
| 9350 | +/* |
| 9351 | + * Latin upper case |
| 9352 | + */ |
| 9353 | +signed char CifsUniUpperTable[512] = { |
| 9354 | + 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, /* 000-00f */ |
| 9355 | + 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, /* 010-01f */ |
| 9356 | + 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, /* 020-02f */ |
| 9357 | + 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, /* 030-03f */ |
| 9358 | + 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, /* 040-04f */ |
| 9359 | + 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, /* 050-05f */ |
| 9360 | + 0, -32, -32, -32, -32, -32, -32, -32, -32, -32, -32, -32, -32, -32, -32, -32, /* 060-06f */ |
| 9361 | + -32, -32, -32, -32, -32, -32, -32, -32, -32, -32, -32, 0, 0, 0, 0, 0, /* 070-07f */ |
| 9362 | + 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, /* 080-08f */ |
| 9363 | + 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, /* 090-09f */ |
| 9364 | + 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, /* 0a0-0af */ |
| 9365 | + 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, /* 0b0-0bf */ |
| 9366 | + 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, /* 0c0-0cf */ |
| 9367 | + 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, /* 0d0-0df */ |
| 9368 | + -32, -32, -32, -32, -32, -32, -32, -32, -32, -32, -32, -32, -32, -32, -32, -32, /* 0e0-0ef */ |
| 9369 | + -32, -32, -32, -32, -32, -32, -32, 0, -32, -32, -32, -32, -32, -32, -32, 121, /* 0f0-0ff */ |
| 9370 | + 0, -1, 0, -1, 0, -1, 0, -1, 0, -1, 0, -1, 0, -1, 0, -1, /* 100-10f */ |
| 9371 | + 0, -1, 0, -1, 0, -1, 0, -1, 0, -1, 0, -1, 0, -1, 0, -1, /* 110-11f */ |
| 9372 | + 0, -1, 0, -1, 0, -1, 0, -1, 0, -1, 0, -1, 0, -1, 0, -1, /* 120-12f */ |
| 9373 | + 0, 0, 0, -1, 0, -1, 0, -1, 0, 0, -1, 0, -1, 0, -1, 0, /* 130-13f */ |
| 9374 | + -1, 0, -1, 0, -1, 0, -1, 0, -1, 0, 0, -1, 0, -1, 0, -1, /* 140-14f */ |
| 9375 | + 0, -1, 0, -1, 0, -1, 0, -1, 0, -1, 0, -1, 0, -1, 0, -1, /* 150-15f */ |
| 9376 | + 0, -1, 0, -1, 0, -1, 0, -1, 0, -1, 0, -1, 0, -1, 0, -1, /* 160-16f */ |
| 9377 | + 0, -1, 0, -1, 0, -1, 0, -1, 0, 0, -1, 0, -1, 0, -1, 0, /* 170-17f */ |
| 9378 | + 0, 0, 0, -1, 0, -1, 0, 0, -1, 0, 0, 0, -1, 0, 0, 0, /* 180-18f */ |
| 9379 | + 0, 0, -1, 0, 0, 0, 0, 0, 0, -1, 0, 0, 0, 0, 0, 0, /* 190-19f */ |
| 9380 | + 0, -1, 0, -1, 0, -1, 0, 0, -1, 0, 0, 0, 0, -1, 0, 0, /* 1a0-1af */ |
| 9381 | + -1, 0, 0, 0, -1, 0, -1, 0, 0, -1, 0, 0, 0, -1, 0, 0, /* 1b0-1bf */ |
| 9382 | + 0, 0, 0, 0, 0, -1, -2, 0, -1, -2, 0, -1, -2, 0, -1, 0, /* 1c0-1cf */ |
| 9383 | + -1, 0, -1, 0, -1, 0, -1, 0, -1, 0, -1, 0, -1, -79, 0, -1, /* 1d0-1df */ |
| 9384 | + 0, -1, 0, -1, 0, -1, 0, -1, 0, -1, 0, -1, 0, -1, 0, -1, /* 1e0-1ef */ |
| 9385 | + 0, 0, -1, -2, 0, -1, 0, 0, 0, -1, 0, -1, 0, -1, 0, -1, /* 1f0-1ff */ |
| 9386 | +}; |
| 9387 | + |
| 9388 | +/* Upper case range - Greek */ |
| 9389 | +static signed char UniCaseRangeU03a0[47] = { |
| 9390 | + 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, -38, -37, -37, -37, /* 3a0-3af */ |
| 9391 | + 0, -32, -32, -32, -32, -32, -32, -32, -32, -32, -32, -32, -32, -32, -32, -32, /* 3b0-3bf */ |
| 9392 | + -32, -32, -31, -32, -32, -32, -32, -32, -32, -32, -32, -32, -64, |
| 9393 | + -63, -63, |
| 9394 | +}; |
| 9395 | + |
| 9396 | +/* Upper case range - Cyrillic */ |
| 9397 | +static signed char UniCaseRangeU0430[48] = { |
| 9398 | + -32, -32, -32, -32, -32, -32, -32, -32, -32, -32, -32, -32, -32, -32, -32, -32, /* 430-43f */ |
| 9399 | + -32, -32, -32, -32, -32, -32, -32, -32, -32, -32, -32, -32, -32, -32, -32, -32, /* 440-44f */ |
| 9400 | + 0, -80, -80, -80, -80, -80, -80, -80, -80, -80, -80, -80, -80, 0, -80, -80, /* 450-45f */ |
| 9401 | +}; |
| 9402 | + |
| 9403 | +/* Upper case range - Extended cyrillic */ |
| 9404 | +static signed char UniCaseRangeU0490[61] = { |
| 9405 | + 0, -1, 0, -1, 0, -1, 0, -1, 0, -1, 0, -1, 0, -1, 0, -1, /* 490-49f */ |
| 9406 | + 0, -1, 0, -1, 0, -1, 0, -1, 0, -1, 0, -1, 0, -1, 0, -1, /* 4a0-4af */ |
| 9407 | + 0, -1, 0, -1, 0, -1, 0, -1, 0, -1, 0, -1, 0, -1, 0, -1, /* 4b0-4bf */ |
| 9408 | + 0, 0, -1, 0, -1, 0, 0, 0, -1, 0, 0, 0, -1, |
| 9409 | +}; |
| 9410 | + |
| 9411 | +/* Upper case range - Extended latin and greek */ |
| 9412 | +static signed char UniCaseRangeU1e00[509] = { |
| 9413 | + 0, -1, 0, -1, 0, -1, 0, -1, 0, -1, 0, -1, 0, -1, 0, -1, /* 1e00-1e0f */ |
| 9414 | + 0, -1, 0, -1, 0, -1, 0, -1, 0, -1, 0, -1, 0, -1, 0, -1, /* 1e10-1e1f */ |
| 9415 | + 0, -1, 0, -1, 0, -1, 0, -1, 0, -1, 0, -1, 0, -1, 0, -1, /* 1e20-1e2f */ |
| 9416 | + 0, -1, 0, -1, 0, -1, 0, -1, 0, -1, 0, -1, 0, -1, 0, -1, /* 1e30-1e3f */ |
| 9417 | + 0, -1, 0, -1, 0, -1, 0, -1, 0, -1, 0, -1, 0, -1, 0, -1, /* 1e40-1e4f */ |
| 9418 | + 0, -1, 0, -1, 0, -1, 0, -1, 0, -1, 0, -1, 0, -1, 0, -1, /* 1e50-1e5f */ |
| 9419 | + 0, -1, 0, -1, 0, -1, 0, -1, 0, -1, 0, -1, 0, -1, 0, -1, /* 1e60-1e6f */ |
| 9420 | + 0, -1, 0, -1, 0, -1, 0, -1, 0, -1, 0, -1, 0, -1, 0, -1, /* 1e70-1e7f */ |
| 9421 | + 0, -1, 0, -1, 0, -1, 0, -1, 0, -1, 0, -1, 0, -1, 0, -1, /* 1e80-1e8f */ |
| 9422 | + 0, -1, 0, -1, 0, -1, 0, 0, 0, 0, 0, -59, 0, -1, 0, -1, /* 1e90-1e9f */ |
| 9423 | + 0, -1, 0, -1, 0, -1, 0, -1, 0, -1, 0, -1, 0, -1, 0, -1, /* 1ea0-1eaf */ |
| 9424 | + 0, -1, 0, -1, 0, -1, 0, -1, 0, -1, 0, -1, 0, -1, 0, -1, /* 1eb0-1ebf */ |
| 9425 | + 0, -1, 0, -1, 0, -1, 0, -1, 0, -1, 0, -1, 0, -1, 0, -1, /* 1ec0-1ecf */ |
| 9426 | + 0, -1, 0, -1, 0, -1, 0, -1, 0, -1, 0, -1, 0, -1, 0, -1, /* 1ed0-1edf */ |
| 9427 | + 0, -1, 0, -1, 0, -1, 0, -1, 0, -1, 0, -1, 0, -1, 0, -1, /* 1ee0-1eef */ |
| 9428 | + 0, -1, 0, -1, 0, -1, 0, -1, 0, -1, 0, 0, 0, 0, 0, 0, /* 1ef0-1eff */ |
| 9429 | + 8, 8, 8, 8, 8, 8, 8, 8, 0, 0, 0, 0, 0, 0, 0, 0, /* 1f00-1f0f */ |
| 9430 | + 8, 8, 8, 8, 8, 8, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, /* 1f10-1f1f */ |
| 9431 | + 8, 8, 8, 8, 8, 8, 8, 8, 0, 0, 0, 0, 0, 0, 0, 0, /* 1f20-1f2f */ |
| 9432 | + 8, 8, 8, 8, 8, 8, 8, 8, 0, 0, 0, 0, 0, 0, 0, 0, /* 1f30-1f3f */ |
| 9433 | + 8, 8, 8, 8, 8, 8, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, /* 1f40-1f4f */ |
| 9434 | + 0, 8, 0, 8, 0, 8, 0, 8, 0, 0, 0, 0, 0, 0, 0, 0, /* 1f50-1f5f */ |
| 9435 | + 8, 8, 8, 8, 8, 8, 8, 8, 0, 0, 0, 0, 0, 0, 0, 0, /* 1f60-1f6f */ |
| 9436 | + 74, 74, 86, 86, 86, 86, 100, 100, 0, 0, 112, 112, 126, 126, 0, 0, /* 1f70-1f7f */ |
| 9437 | + 8, 8, 8, 8, 8, 8, 8, 8, 0, 0, 0, 0, 0, 0, 0, 0, /* 1f80-1f8f */ |
| 9438 | + 8, 8, 8, 8, 8, 8, 8, 8, 0, 0, 0, 0, 0, 0, 0, 0, /* 1f90-1f9f */ |
| 9439 | + 8, 8, 8, 8, 8, 8, 8, 8, 0, 0, 0, 0, 0, 0, 0, 0, /* 1fa0-1faf */ |
| 9440 | + 8, 8, 0, 9, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, /* 1fb0-1fbf */ |
| 9441 | + 0, 0, 0, 9, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, /* 1fc0-1fcf */ |
| 9442 | + 8, 8, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, /* 1fd0-1fdf */ |
| 9443 | + 8, 8, 0, 0, 0, 7, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, /* 1fe0-1fef */ |
| 9444 | + 0, 0, 0, 9, 0, 0, 0, 0, 0, 0, 0, 0, 0, |
| 9445 | +}; |
| 9446 | + |
| 9447 | +/* Upper case range - Wide latin */ |
| 9448 | +static signed char UniCaseRangeUff40[27] = { |
| 9449 | + 0, -32, -32, -32, -32, -32, -32, -32, -32, -32, -32, -32, -32, -32, -32, -32, /* ff40-ff4f */ |
| 9450 | + -32, -32, -32, -32, -32, -32, -32, -32, -32, -32, -32, |
| 9451 | +}; |
| 9452 | + |
| 9453 | +/* |
| 9454 | + * Upper Case Range |
| 9455 | + */ |
| 9456 | +const struct UniCaseRange CifsUniUpperRange[] = { |
| 9457 | + {0x03a0, 0x03ce, UniCaseRangeU03a0}, |
| 9458 | + {0x0430, 0x045f, UniCaseRangeU0430}, |
| 9459 | + {0x0490, 0x04cc, UniCaseRangeU0490}, |
| 9460 | + {0x1e00, 0x1ffc, UniCaseRangeU1e00}, |
| 9461 | + {0xff40, 0xff5a, UniCaseRangeUff40}, |
| 9462 | + {0, 0, NULL} |
| 9463 | +}; |
| 9464 | +#endif |
| 9465 | + |
| 9466 | +#ifndef UNIUPR_NOLOWER |
| 9467 | +/* |
| 9468 | + * Latin lower case |
| 9469 | + */ |
| 9470 | +static signed char CifsUniLowerTable[512] = { |
| 9471 | + 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, /* 000-00f */ |
| 9472 | + 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, /* 010-01f */ |
| 9473 | + 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, /* 020-02f */ |
| 9474 | + 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, /* 030-03f */ |
| 9475 | + 0, 32, 32, 32, 32, 32, 32, 32, 32, 32, 32, 32, 32, 32, 32, 32, /* 040-04f */ |
| 9476 | + 32, 32, 32, 32, 32, 32, 32, 32, 32, 32, 32, 0, 0, 0, 0, 0, /* 050-05f */ |
| 9477 | + 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, /* 060-06f */ |
| 9478 | + 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, /* 070-07f */ |
| 9479 | + 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, /* 080-08f */ |
| 9480 | + 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, /* 090-09f */ |
| 9481 | + 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, /* 0a0-0af */ |
| 9482 | + 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, /* 0b0-0bf */ |
| 9483 | + 32, 32, 32, 32, 32, 32, 32, 32, 32, 32, 32, 32, 32, 32, 32, 32, /* 0c0-0cf */ |
| 9484 | + 32, 32, 32, 32, 32, 32, 32, 0, 32, 32, 32, 32, 32, 32, 32, 0, /* 0d0-0df */ |
| 9485 | + 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, /* 0e0-0ef */ |
| 9486 | + 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, /* 0f0-0ff */ |
| 9487 | + 1, 0, 1, 0, 1, 0, 1, 0, 1, 0, 1, 0, 1, 0, 1, 0, /* 100-10f */ |
| 9488 | + 1, 0, 1, 0, 1, 0, 1, 0, 1, 0, 1, 0, 1, 0, 1, 0, /* 110-11f */ |
| 9489 | + 1, 0, 1, 0, 1, 0, 1, 0, 1, 0, 1, 0, 1, 0, 1, 0, /* 120-12f */ |
| 9490 | + 0, 0, 1, 0, 1, 0, 1, 0, 0, 1, 0, 1, 0, 1, 0, 1, /* 130-13f */ |
| 9491 | + 0, 1, 0, 1, 0, 1, 0, 1, 0, 0, 1, 0, 1, 0, 1, 0, /* 140-14f */ |
| 9492 | + 1, 0, 1, 0, 1, 0, 1, 0, 1, 0, 1, 0, 1, 0, 1, 0, /* 150-15f */ |
| 9493 | + 1, 0, 1, 0, 1, 0, 1, 0, 1, 0, 1, 0, 1, 0, 1, 0, /* 160-16f */ |
| 9494 | + 1, 0, 1, 0, 1, 0, 1, 0, -121, 1, 0, 1, 0, 1, 0, 0, /* 170-17f */ |
| 9495 | + 0, 0, 1, 0, 1, 0, 0, 1, 0, 0, 0, 1, 0, 0, 79, 0, /* 180-18f */ |
| 9496 | + 0, 1, 0, 0, 0, 0, 0, 0, 1, 0, 0, 0, 0, 0, 0, 0, /* 190-19f */ |
| 9497 | + 1, 0, 1, 0, 1, 0, 0, 1, 0, 0, 0, 0, 1, 0, 0, 1, /* 1a0-1af */ |
| 9498 | + 0, 0, 0, 1, 0, 1, 0, 0, 1, 0, 0, 0, 1, 0, 0, 0, /* 1b0-1bf */ |
| 9499 | + 0, 0, 0, 0, 2, 1, 0, 2, 1, 0, 2, 1, 0, 1, 0, 1, /* 1c0-1cf */ |
| 9500 | + 0, 1, 0, 1, 0, 1, 0, 1, 0, 1, 0, 1, 0, 0, 1, 0, /* 1d0-1df */ |
| 9501 | + 1, 0, 1, 0, 1, 0, 1, 0, 1, 0, 1, 0, 1, 0, 1, 0, /* 1e0-1ef */ |
| 9502 | + 0, 2, 1, 0, 1, 0, 0, 0, 1, 0, 1, 0, 1, 0, 1, 0, /* 1f0-1ff */ |
| 9503 | +}; |
| 9504 | + |
| 9505 | +/* Lower case range - Greek */ |
| 9506 | +static signed char UniCaseRangeL0380[44] = { |
| 9507 | + 0, 0, 0, 0, 0, 0, 38, 0, 37, 37, 37, 0, 64, 0, 63, 63, /* 380-38f */ |
| 9508 | + 0, 32, 32, 32, 32, 32, 32, 32, 32, 32, 32, 32, 32, 32, 32, 32, /* 390-39f */ |
| 9509 | + 32, 32, 0, 32, 32, 32, 32, 32, 32, 32, 32, 32, |
| 9510 | +}; |
| 9511 | + |
| 9512 | +/* Lower case range - Cyrillic */ |
| 9513 | +static signed char UniCaseRangeL0400[48] = { |
| 9514 | + 0, 80, 80, 80, 80, 80, 80, 80, 80, 80, 80, 80, 80, 0, 80, 80, /* 400-40f */ |
| 9515 | + 32, 32, 32, 32, 32, 32, 32, 32, 32, 32, 32, 32, 32, 32, 32, 32, /* 410-41f */ |
| 9516 | + 32, 32, 32, 32, 32, 32, 32, 32, 32, 32, 32, 32, 32, 32, 32, 32, /* 420-42f */ |
| 9517 | +}; |
| 9518 | + |
| 9519 | +/* Lower case range - Extended cyrillic */ |
| 9520 | +static signed char UniCaseRangeL0490[60] = { |
| 9521 | + 1, 0, 1, 0, 1, 0, 1, 0, 1, 0, 1, 0, 1, 0, 1, 0, /* 490-49f */ |
| 9522 | + 1, 0, 1, 0, 1, 0, 1, 0, 1, 0, 1, 0, 1, 0, 1, 0, /* 4a0-4af */ |
| 9523 | + 1, 0, 1, 0, 1, 0, 1, 0, 1, 0, 1, 0, 1, 0, 1, 0, /* 4b0-4bf */ |
| 9524 | + 0, 1, 0, 1, 0, 0, 0, 1, 0, 0, 0, 1, |
| 9525 | +}; |
| 9526 | + |
| 9527 | +/* Lower case range - Extended latin and greek */ |
| 9528 | +static signed char UniCaseRangeL1e00[504] = { |
| 9529 | + 1, 0, 1, 0, 1, 0, 1, 0, 1, 0, 1, 0, 1, 0, 1, 0, /* 1e00-1e0f */ |
| 9530 | + 1, 0, 1, 0, 1, 0, 1, 0, 1, 0, 1, 0, 1, 0, 1, 0, /* 1e10-1e1f */ |
| 9531 | + 1, 0, 1, 0, 1, 0, 1, 0, 1, 0, 1, 0, 1, 0, 1, 0, /* 1e20-1e2f */ |
| 9532 | + 1, 0, 1, 0, 1, 0, 1, 0, 1, 0, 1, 0, 1, 0, 1, 0, /* 1e30-1e3f */ |
| 9533 | + 1, 0, 1, 0, 1, 0, 1, 0, 1, 0, 1, 0, 1, 0, 1, 0, /* 1e40-1e4f */ |
| 9534 | + 1, 0, 1, 0, 1, 0, 1, 0, 1, 0, 1, 0, 1, 0, 1, 0, /* 1e50-1e5f */ |
| 9535 | + 1, 0, 1, 0, 1, 0, 1, 0, 1, 0, 1, 0, 1, 0, 1, 0, /* 1e60-1e6f */ |
| 9536 | + 1, 0, 1, 0, 1, 0, 1, 0, 1, 0, 1, 0, 1, 0, 1, 0, /* 1e70-1e7f */ |
| 9537 | + 1, 0, 1, 0, 1, 0, 1, 0, 1, 0, 1, 0, 1, 0, 1, 0, /* 1e80-1e8f */ |
| 9538 | + 1, 0, 1, 0, 1, 0, 0, 0, 0, 0, 0, 0, 1, 0, 1, 0, /* 1e90-1e9f */ |
| 9539 | + 1, 0, 1, 0, 1, 0, 1, 0, 1, 0, 1, 0, 1, 0, 1, 0, /* 1ea0-1eaf */ |
| 9540 | + 1, 0, 1, 0, 1, 0, 1, 0, 1, 0, 1, 0, 1, 0, 1, 0, /* 1eb0-1ebf */ |
| 9541 | + 1, 0, 1, 0, 1, 0, 1, 0, 1, 0, 1, 0, 1, 0, 1, 0, /* 1ec0-1ecf */ |
| 9542 | + 1, 0, 1, 0, 1, 0, 1, 0, 1, 0, 1, 0, 1, 0, 1, 0, /* 1ed0-1edf */ |
| 9543 | + 1, 0, 1, 0, 1, 0, 1, 0, 1, 0, 1, 0, 1, 0, 1, 0, /* 1ee0-1eef */ |
| 9544 | + 1, 0, 1, 0, 1, 0, 1, 0, 1, 0, 0, 0, 0, 0, 0, 0, /* 1ef0-1eff */ |
| 9545 | + 0, 0, 0, 0, 0, 0, 0, 0, -8, -8, -8, -8, -8, -8, -8, -8, /* 1f00-1f0f */ |
| 9546 | + 0, 0, 0, 0, 0, 0, 0, 0, -8, -8, -8, -8, -8, -8, 0, 0, /* 1f10-1f1f */ |
| 9547 | + 0, 0, 0, 0, 0, 0, 0, 0, -8, -8, -8, -8, -8, -8, -8, -8, /* 1f20-1f2f */ |
| 9548 | + 0, 0, 0, 0, 0, 0, 0, 0, -8, -8, -8, -8, -8, -8, -8, -8, /* 1f30-1f3f */ |
| 9549 | + 0, 0, 0, 0, 0, 0, 0, 0, -8, -8, -8, -8, -8, -8, 0, 0, /* 1f40-1f4f */ |
| 9550 | + 0, 0, 0, 0, 0, 0, 0, 0, 0, -8, 0, -8, 0, -8, 0, -8, /* 1f50-1f5f */ |
| 9551 | + 0, 0, 0, 0, 0, 0, 0, 0, -8, -8, -8, -8, -8, -8, -8, -8, /* 1f60-1f6f */ |
| 9552 | + 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, /* 1f70-1f7f */ |
| 9553 | + 0, 0, 0, 0, 0, 0, 0, 0, -8, -8, -8, -8, -8, -8, -8, -8, /* 1f80-1f8f */ |
| 9554 | + 0, 0, 0, 0, 0, 0, 0, 0, -8, -8, -8, -8, -8, -8, -8, -8, /* 1f90-1f9f */ |
| 9555 | + 0, 0, 0, 0, 0, 0, 0, 0, -8, -8, -8, -8, -8, -8, -8, -8, /* 1fa0-1faf */ |
| 9556 | + 0, 0, 0, 0, 0, 0, 0, 0, -8, -8, -74, -74, -9, 0, 0, 0, /* 1fb0-1fbf */ |
| 9557 | + 0, 0, 0, 0, 0, 0, 0, 0, -86, -86, -86, -86, -9, 0, 0, 0, /* 1fc0-1fcf */ |
| 9558 | + 0, 0, 0, 0, 0, 0, 0, 0, -8, -8, -100, -100, 0, 0, 0, 0, /* 1fd0-1fdf */ |
| 9559 | + 0, 0, 0, 0, 0, 0, 0, 0, -8, -8, -112, -112, -7, 0, 0, 0, /* 1fe0-1fef */ |
| 9560 | + 0, 0, 0, 0, 0, 0, 0, 0, |
| 9561 | +}; |
| 9562 | + |
| 9563 | +/* Lower case range - Wide latin */ |
| 9564 | +static signed char UniCaseRangeLff20[27] = { |
| 9565 | + 0, 32, 32, 32, 32, 32, 32, 32, 32, 32, 32, 32, 32, 32, 32, 32, /* ff20-ff2f */ |
| 9566 | + 32, 32, 32, 32, 32, 32, 32, 32, 32, 32, 32, |
| 9567 | +}; |
| 9568 | + |
| 9569 | +/* |
| 9570 | + * Lower Case Range |
| 9571 | + */ |
| 9572 | +const static struct UniCaseRange CifsUniLowerRange[] = { |
| 9573 | + 0x0380, 0x03ab, UniCaseRangeL0380, |
| 9574 | + 0x0400, 0x042f, UniCaseRangeL0400, |
| 9575 | + 0x0490, 0x04cb, UniCaseRangeL0490, |
| 9576 | + 0x1e00, 0x1ff7, UniCaseRangeL1e00, |
| 9577 | + 0xff20, 0xff3a, UniCaseRangeLff20, |
| 9578 | + 0, 0, 0 |
| 9579 | +}; |
| 9580 | +#endif |
| 9581 | --- /dev/null |
| 9582 | +++ b/fs/cifs/connect.c |
| 9583 | @@ -0,0 +1,2924 @@ |
| 9584 | +/* |
| 9585 | + * fs/cifs/connect.c |
| 9586 | + * |
| 9587 | + * Copyright (C) International Business Machines Corp., 2002,2004 |
| 9588 | + * Author(s): Steve French (sfrench@us.ibm.com) |
| 9589 | + * |
| 9590 | + * This library is free software; you can redistribute it and/or modify |
| 9591 | + * it under the terms of the GNU Lesser General Public License as published |
| 9592 | + * by the Free Software Foundation; either version 2.1 of the License, or |
| 9593 | + * (at your option) any later version. |
| 9594 | + * |
| 9595 | + * This library is distributed in the hope that it will be useful, |
| 9596 | + * but WITHOUT ANY WARRANTY; without even the implied warranty of |
| 9597 | + * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See |
| 9598 | + * the GNU Lesser General Public License for more details. |
| 9599 | + * |
| 9600 | + * You should have received a copy of the GNU Lesser General Public License |
| 9601 | + * along with this library; if not, write to the Free Software |
| 9602 | + * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA |
| 9603 | + */ |
| 9604 | +#include <linux/fs.h> |
| 9605 | +#include <linux/net.h> |
| 9606 | +#include <linux/string.h> |
| 9607 | +#include <linux/list.h> |
| 9608 | +#include <linux/wait.h> |
| 9609 | +#include <linux/version.h> |
| 9610 | +#include <linux/ipv6.h> |
| 9611 | +#include <linux/pagemap.h> |
| 9612 | +#include <linux/ctype.h> |
| 9613 | +#include <linux/utsname.h> |
| 9614 | +#include <asm/uaccess.h> |
| 9615 | +#include <asm/processor.h> |
| 9616 | +#include "cifspdu.h" |
| 9617 | +#include "cifsglob.h" |
| 9618 | +#include "cifsproto.h" |
| 9619 | +#include "cifs_unicode.h" |
| 9620 | +#include "cifs_debug.h" |
| 9621 | +#include "cifs_fs_sb.h" |
| 9622 | +#include "ntlmssp.h" |
| 9623 | +#include "nterr.h" |
| 9624 | +#include "rfc1002pdu.h" |
| 9625 | + |
| 9626 | +#define CIFS_PORT 445 |
| 9627 | +#define RFC1001_PORT 139 |
| 9628 | + |
| 9629 | +extern void SMBencrypt(unsigned char *passwd, unsigned char *c8, |
| 9630 | + unsigned char *p24); |
| 9631 | +extern void SMBNTencrypt(unsigned char *passwd, unsigned char *c8, |
| 9632 | + unsigned char *p24); |
| 9633 | +extern int cifs_inet_pton(int, const char *, void *dst); |
| 9634 | + |
| 9635 | +struct smb_vol { |
| 9636 | + char *username; |
| 9637 | + char *password; |
| 9638 | + char *domainname; |
| 9639 | + char *UNC; |
| 9640 | + char *UNCip; |
| 9641 | + char *iocharset; /* local code page for mapping to and from Unicode */ |
| 9642 | + char source_rfc1001_name[16]; /* netbios name of client */ |
| 9643 | + uid_t linux_uid; |
| 9644 | + gid_t linux_gid; |
| 9645 | + mode_t file_mode; |
| 9646 | + mode_t dir_mode; |
| 9647 | + int rw:1; |
| 9648 | + int retry:1; |
| 9649 | + int intr:1; |
| 9650 | + unsigned int rsize; |
| 9651 | + unsigned int wsize; |
| 9652 | + unsigned int sockopt; |
| 9653 | + unsigned short int port; |
| 9654 | +}; |
| 9655 | + |
| 9656 | +static int ipv4_connect(struct sockaddr_in *psin_server, |
| 9657 | + struct socket **csocket, |
| 9658 | + char * netb_name); |
| 9659 | +static int ipv6_connect(struct sockaddr_in6 *psin_server, |
| 9660 | + struct socket **csocket); |
| 9661 | + |
| 9662 | + |
| 9663 | + /* |
| 9664 | + * cifs tcp session reconnection |
| 9665 | + * |
| 9666 | + * mark tcp session as reconnecting so temporarily locked |
| 9667 | + * mark all smb sessions as reconnecting for tcp session |
| 9668 | + * reconnect tcp session |
| 9669 | + * wake up waiters on reconnection? - (not needed currently) |
| 9670 | + */ |
| 9671 | + |
| 9672 | +int |
| 9673 | +cifs_reconnect(struct TCP_Server_Info *server) |
| 9674 | +{ |
| 9675 | + int rc = 0; |
| 9676 | + struct list_head *tmp; |
| 9677 | + struct cifsSesInfo *ses; |
| 9678 | + struct cifsTconInfo *tcon; |
| 9679 | + struct mid_q_entry * mid_entry; |
| 9680 | + |
| 9681 | + spin_lock(&GlobalMid_Lock); |
| 9682 | + if(server->tcpStatus == CifsExiting) { |
| 9683 | + /* the demux thread will exit normally |
| 9684 | + next time through the loop */ |
| 9685 | + spin_unlock(&GlobalMid_Lock); |
| 9686 | + return rc; |
| 9687 | + } else |
| 9688 | + server->tcpStatus = CifsNeedReconnect; |
| 9689 | + spin_unlock(&GlobalMid_Lock); |
| 9690 | + server->maxBuf = 0; |
| 9691 | + |
| 9692 | + cFYI(1, ("Reconnecting tcp session ")); |
| 9693 | + |
| 9694 | + /* before reconnecting the tcp session, mark the smb session (uid) |
| 9695 | + and the tid bad so they are not used until reconnected */ |
| 9696 | + read_lock(&GlobalSMBSeslock); |
| 9697 | + list_for_each(tmp, &GlobalSMBSessionList) { |
| 9698 | + ses = list_entry(tmp, struct cifsSesInfo, cifsSessionList); |
| 9699 | + if (ses->server) { |
| 9700 | + if (ses->server == server) { |
| 9701 | + ses->status = CifsNeedReconnect; |
| 9702 | + ses->ipc_tid = 0; |
| 9703 | + } |
| 9704 | + } |
| 9705 | + /* else tcp and smb sessions need reconnection */ |
| 9706 | + } |
| 9707 | + list_for_each(tmp, &GlobalTreeConnectionList) { |
| 9708 | + tcon = list_entry(tmp, struct cifsTconInfo, cifsConnectionList); |
| 9709 | + if((tcon) && (tcon->ses) && (tcon->ses->server == server)) { |
| 9710 | + tcon->tidStatus = CifsNeedReconnect; |
| 9711 | + } |
| 9712 | + } |
| 9713 | + read_unlock(&GlobalSMBSeslock); |
| 9714 | + /* do not want to be sending data on a socket we are freeing */ |
| 9715 | + down(&server->tcpSem); |
| 9716 | + if(server->ssocket) { |
| 9717 | + cFYI(1,("State: 0x%x Flags: 0x%lx", server->ssocket->state, |
| 9718 | + server->ssocket->flags)); |
| 9719 | + server->ssocket->ops->shutdown(server->ssocket,SEND_SHUTDOWN); |
| 9720 | + cFYI(1,("Post shutdown state: 0x%x Flags: 0x%lx", server->ssocket->state, |
| 9721 | + server->ssocket->flags)); |
| 9722 | + sock_release(server->ssocket); |
| 9723 | + server->ssocket = NULL; |
| 9724 | + } |
| 9725 | + |
| 9726 | + spin_lock(&GlobalMid_Lock); |
| 9727 | + list_for_each(tmp, &server->pending_mid_q) { |
| 9728 | + mid_entry = list_entry(tmp, struct |
| 9729 | + mid_q_entry, |
| 9730 | + qhead); |
| 9731 | + if(mid_entry) { |
| 9732 | + if(mid_entry->midState == MID_REQUEST_SUBMITTED) { |
| 9733 | + /* Mark other intransit requests as needing retry so |
| 9734 | + we do not immediately mark the session bad again |
| 9735 | + (ie after we reconnect below) as they timeout too */ |
| 9736 | + mid_entry->midState = MID_RETRY_NEEDED; |
| 9737 | + } |
| 9738 | + } |
| 9739 | + } |
| 9740 | + spin_unlock(&GlobalMid_Lock); |
| 9741 | + up(&server->tcpSem); |
| 9742 | + |
| 9743 | + while ((server->tcpStatus != CifsExiting) && (server->tcpStatus != CifsGood)) |
| 9744 | + { |
| 9745 | + if(server->protocolType == IPV6) { |
| 9746 | + rc = ipv6_connect(&server->addr.sockAddr6,&server->ssocket); |
| 9747 | + } else { |
| 9748 | + rc = ipv4_connect(&server->addr.sockAddr, |
| 9749 | + &server->ssocket, |
| 9750 | + server->workstation_RFC1001_name); |
| 9751 | + } |
| 9752 | + if(rc) { |
| 9753 | + set_current_state(TASK_INTERRUPTIBLE); |
| 9754 | + schedule_timeout(3 * HZ); |
| 9755 | + } else { |
| 9756 | + atomic_inc(&tcpSesReconnectCount); |
| 9757 | + spin_lock(&GlobalMid_Lock); |
| 9758 | + if(server->tcpStatus != CifsExiting) |
| 9759 | + server->tcpStatus = CifsGood; |
| 9760 | + spin_unlock(&GlobalMid_Lock); |
| 9761 | + /* atomic_set(&server->inFlight,0);*/ |
| 9762 | + wake_up(&server->response_q); |
| 9763 | + } |
| 9764 | + } |
| 9765 | + return rc; |
| 9766 | +} |
| 9767 | + |
| 9768 | +static int |
| 9769 | +cifs_demultiplex_thread(struct TCP_Server_Info *server) |
| 9770 | +{ |
| 9771 | + int length; |
| 9772 | + unsigned int pdu_length, total_read; |
| 9773 | + struct smb_hdr *smb_buffer = NULL; |
| 9774 | + struct msghdr smb_msg; |
| 9775 | + mm_segment_t temp_fs; |
| 9776 | + struct iovec iov; |
| 9777 | + struct socket *csocket = server->ssocket; |
| 9778 | + struct list_head *tmp; |
| 9779 | + struct cifsSesInfo *ses; |
| 9780 | + struct task_struct *task_to_wake = NULL; |
| 9781 | + struct mid_q_entry *mid_entry; |
| 9782 | + char *temp; |
| 9783 | + |
| 9784 | + daemonize(); |
| 9785 | + sprintf(current->comm,"cifsd"); |
| 9786 | + /* allow_signal(SIGKILL);*/ |
| 9787 | + current->flags |= PF_MEMALLOC; |
| 9788 | + server->tsk = current; /* save process info to wake at shutdown */ |
| 9789 | + cFYI(1, ("Demultiplex PID: %d", current->pid)); |
| 9790 | + |
| 9791 | + temp_fs = get_fs(); /* we must turn off socket api parm checking */ |
| 9792 | + set_fs(get_ds()); |
| 9793 | + |
| 9794 | + while (server->tcpStatus != CifsExiting) { |
| 9795 | + if (smb_buffer == NULL) |
| 9796 | + smb_buffer = cifs_buf_get(); |
| 9797 | + else |
| 9798 | + memset(smb_buffer, 0, sizeof (struct smb_hdr)); |
| 9799 | + |
| 9800 | + if (smb_buffer == NULL) { |
| 9801 | + cERROR(1,("Can not get memory for SMB response")); |
| 9802 | + set_current_state(TASK_INTERRUPTIBLE); |
| 9803 | + schedule_timeout(HZ * 3); /* give system time to free memory */ |
| 9804 | + continue; |
| 9805 | + } |
| 9806 | + iov.iov_base = smb_buffer; |
| 9807 | + iov.iov_len = sizeof (struct smb_hdr) - 1; |
| 9808 | + /* 1 byte less above since wct is not always returned in error cases */ |
| 9809 | + smb_msg.msg_iov = &iov; |
| 9810 | + smb_msg.msg_iovlen = 1; |
| 9811 | + smb_msg.msg_control = NULL; |
| 9812 | + smb_msg.msg_controllen = 0; |
| 9813 | + |
| 9814 | + length = |
| 9815 | + sock_recvmsg(csocket, &smb_msg, |
| 9816 | + sizeof (struct smb_hdr) - |
| 9817 | + 1 /* RFC1001 header and SMB header */ , |
| 9818 | + MSG_PEEK /* flags see socket.h */ ); |
| 9819 | + |
| 9820 | + if(server->tcpStatus == CifsExiting) { |
| 9821 | + break; |
| 9822 | + } else if (server->tcpStatus == CifsNeedReconnect) { |
| 9823 | + cFYI(1,("Reconnecting after server stopped responding")); |
| 9824 | + cifs_reconnect(server); |
| 9825 | + cFYI(1,("call to reconnect done")); |
| 9826 | + csocket = server->ssocket; |
| 9827 | + continue; |
| 9828 | + } else if ((length == -ERESTARTSYS) || (length == -EAGAIN)) { |
| 9829 | + set_current_state(TASK_INTERRUPTIBLE); |
| 9830 | + schedule_timeout(1); /* minimum sleep to prevent looping |
| 9831 | + allowing socket to clear and app threads to set |
| 9832 | + tcpStatus CifsNeedReconnect if server hung */ |
| 9833 | + continue; |
| 9834 | + } else if (length <= 0) { |
| 9835 | + if(server->tcpStatus == CifsNew) { |
| 9836 | + cFYI(1,("tcp session abended prematurely (after SMBnegprot)")); |
| 9837 | + /* some servers kill tcp session rather than returning |
| 9838 | + smb negprot error in which case reconnecting here is |
| 9839 | + not going to help - return error to mount */ |
| 9840 | + break; |
| 9841 | + } |
| 9842 | + if(length == -EINTR) { |
| 9843 | + cFYI(1,("cifsd thread killed")); |
| 9844 | + break; |
| 9845 | + } |
| 9846 | + cFYI(1,("Reconnecting after unexpected peek error %d",length)); |
| 9847 | + cifs_reconnect(server); |
| 9848 | + csocket = server->ssocket; |
| 9849 | + wake_up(&server->response_q); |
| 9850 | + continue; |
| 9851 | + } |
| 9852 | + |
| 9853 | + pdu_length = 4 + ntohl(smb_buffer->smb_buf_length); |
| 9854 | + /* Ony read pdu_length after below checks for too short (due |
| 9855 | + to e.g. int overflow) and too long ie beyond end of buf */ |
| 9856 | + cFYI(1, ("Peek length rcvd: 0x%x beginning 0x%x)", length, pdu_length)); |
| 9857 | + |
| 9858 | + temp = (char *) smb_buffer; |
| 9859 | + if (length > 3) { |
| 9860 | + if (temp[0] == (char) RFC1002_SESSION_KEEP_ALIVE) { |
| 9861 | + iov.iov_base = smb_buffer; |
| 9862 | + iov.iov_len = 4; |
| 9863 | + length = sock_recvmsg(csocket, &smb_msg, 4, 0); |
| 9864 | + cFYI(0,("Received 4 byte keep alive packet")); |
| 9865 | + } else if (temp[0] == (char) RFC1002_POSITIVE_SESSION_RESPONSE) { |
| 9866 | + iov.iov_base = smb_buffer; |
| 9867 | + iov.iov_len = 4; |
| 9868 | + length = sock_recvmsg(csocket, &smb_msg, 4, 0); |
| 9869 | + cFYI(1,("Good RFC 1002 session rsp")); |
| 9870 | + } else if ((temp[0] == (char)RFC1002_NEGATIVE_SESSION_RESPONSE) |
| 9871 | + && (length == 5)) { |
| 9872 | + /* we get this from Windows 98 instead of error on SMB negprot response */ |
| 9873 | + cFYI(1,("Negative RFC 1002 Session Response Error 0x%x)",temp[4])); |
| 9874 | + if(server->tcpStatus == CifsNew) { |
| 9875 | + /* if nack on negprot (rather than |
| 9876 | + ret of smb negprot error) reconnecting |
| 9877 | + not going to help, ret error to mount */ |
| 9878 | + break; |
| 9879 | + } else { |
| 9880 | + /* give server a second to |
| 9881 | + clean up before reconnect attempt */ |
| 9882 | + set_current_state(TASK_INTERRUPTIBLE); |
| 9883 | + schedule_timeout(HZ); |
| 9884 | + /* always try 445 first on reconnect |
| 9885 | + since we get NACK on some if we ever |
| 9886 | + connected to port 139 (the NACK is |
| 9887 | + since we do not begin with RFC1001 |
| 9888 | + session initialize frame) */ |
| 9889 | + server->addr.sockAddr.sin_port = CIFS_PORT; |
| 9890 | + cifs_reconnect(server); |
| 9891 | + csocket = server->ssocket; |
| 9892 | + wake_up(&server->response_q); |
| 9893 | + continue; |
| 9894 | + } |
| 9895 | + } else if (temp[0] != (char) 0) { |
| 9896 | + cERROR(1,("Unknown RFC 1002 frame")); |
| 9897 | + cifs_dump_mem(" Received Data: ", temp, length); |
| 9898 | + cifs_reconnect(server); |
| 9899 | + csocket = server->ssocket; |
| 9900 | + continue; |
| 9901 | + } else { |
| 9902 | + if ((length != sizeof (struct smb_hdr) - 1) |
| 9903 | + || (pdu_length > |
| 9904 | + CIFS_MAX_MSGSIZE + MAX_CIFS_HDR_SIZE) |
| 9905 | + || (pdu_length < |
| 9906 | + sizeof (struct smb_hdr) - 1) |
| 9907 | + || |
| 9908 | + (checkSMBhdr |
| 9909 | + (smb_buffer, smb_buffer->Mid))) { |
| 9910 | + cERROR(1, |
| 9911 | + ("Invalid size or format for SMB found with length %d and pdu_lenght %d", |
| 9912 | + length, pdu_length)); |
| 9913 | + cifs_dump_mem("Received Data is: ",temp,sizeof(struct smb_hdr)); |
| 9914 | + /* could we fix this network corruption by finding next |
| 9915 | + smb header (instead of killing the session) and |
| 9916 | + restart reading from next valid SMB found? */ |
| 9917 | + cifs_reconnect(server); |
| 9918 | + csocket = server->ssocket; |
| 9919 | + continue; |
| 9920 | + } else { /* length ok */ |
| 9921 | + |
| 9922 | + length = 0; |
| 9923 | + iov.iov_base = smb_buffer; |
| 9924 | + iov.iov_len = pdu_length; |
| 9925 | + for (total_read = 0; |
| 9926 | + total_read < pdu_length; |
| 9927 | + total_read += length) { |
| 9928 | + length = sock_recvmsg(csocket, &smb_msg, |
| 9929 | + pdu_length - total_read, 0); |
| 9930 | + if (length == 0) { |
| 9931 | + cERROR(1, |
| 9932 | + ("Zero length receive when expecting %d ", |
| 9933 | + pdu_length - total_read)); |
| 9934 | + cifs_reconnect(server); |
| 9935 | + csocket = server->ssocket; |
| 9936 | + continue; |
| 9937 | + } |
| 9938 | + } |
| 9939 | + } |
| 9940 | + |
| 9941 | + dump_smb(smb_buffer, length); |
| 9942 | + if (checkSMB |
| 9943 | + (smb_buffer, smb_buffer->Mid, total_read)) { |
| 9944 | + cERROR(1, ("Bad SMB Received ")); |
| 9945 | + continue; |
| 9946 | + } |
| 9947 | + |
| 9948 | + task_to_wake = NULL; |
| 9949 | + spin_lock(&GlobalMid_Lock); |
| 9950 | + list_for_each(tmp, &server->pending_mid_q) { |
| 9951 | + mid_entry = list_entry(tmp, struct |
| 9952 | + mid_q_entry, |
| 9953 | + qhead); |
| 9954 | + |
| 9955 | + if ((mid_entry->mid == smb_buffer->Mid) && (mid_entry->midState == MID_REQUEST_SUBMITTED)) { |
| 9956 | + cFYI(1, |
| 9957 | + (" Mid 0x%x matched - waking up ",mid_entry->mid)); |
| 9958 | + task_to_wake = mid_entry->tsk; |
| 9959 | + mid_entry->resp_buf = |
| 9960 | + smb_buffer; |
| 9961 | + mid_entry->midState = |
| 9962 | + MID_RESPONSE_RECEIVED; |
| 9963 | + } |
| 9964 | + } |
| 9965 | + spin_unlock(&GlobalMid_Lock); |
| 9966 | + if (task_to_wake) { |
| 9967 | + smb_buffer = NULL; /* will be freed by users thread after he is done */ |
| 9968 | + wake_up_process(task_to_wake); |
| 9969 | + } else if (is_valid_oplock_break(smb_buffer) == FALSE) { |
| 9970 | + cERROR(1, ("No task to wake, unknown frame rcvd!")); |
| 9971 | + cifs_dump_mem("Received Data is: ",temp,sizeof(struct smb_hdr)); |
| 9972 | + } |
| 9973 | + } |
| 9974 | + } else { |
| 9975 | + cFYI(0, |
| 9976 | + ("Frame less than four bytes received %d bytes long.", |
| 9977 | + length)); |
| 9978 | + if (length > 0) { |
| 9979 | + length = sock_recvmsg(csocket, &smb_msg, length, 0); /* throw away junk frame */ |
| 9980 | + cFYI(1, |
| 9981 | + (" with junk 0x%x in it ", |
| 9982 | + *(__u32 *) smb_buffer)); |
| 9983 | + } |
| 9984 | + } |
| 9985 | + } |
| 9986 | + spin_lock(&GlobalMid_Lock); |
| 9987 | + server->tcpStatus = CifsExiting; |
| 9988 | + server->tsk = NULL; |
| 9989 | + atomic_set(&server->inFlight, 0); |
| 9990 | + spin_unlock(&GlobalMid_Lock); |
| 9991 | + /* Although there should not be any requests blocked on |
| 9992 | + this queue it can not hurt to be paranoid and try to wake up requests |
| 9993 | + that may haven been blocked when more than 50 at time were on the wire |
| 9994 | + to the same server - they now will see the session is in exit state |
| 9995 | + and get out of SendReceive. */ |
| 9996 | + wake_up_all(&server->request_q); |
| 9997 | + /* give those requests time to exit */ |
| 9998 | + set_current_state(TASK_INTERRUPTIBLE); |
| 9999 | + schedule_timeout(HZ/8); |
| 10000 | + |
| 10001 | + if(server->ssocket) { |
| 10002 | + sock_release(csocket); |
| 10003 | + server->ssocket = NULL; |
| 10004 | + } |
| 10005 | + set_fs(temp_fs); |
| 10006 | + if (smb_buffer) /* buffer usually freed in free_mid - need to free it on error or exit */ |
| 10007 | + cifs_buf_release(smb_buffer); |
| 10008 | + |
| 10009 | + read_lock(&GlobalSMBSeslock); |
| 10010 | + if (list_empty(&server->pending_mid_q)) { |
| 10011 | + /* loop through server session structures attached to this and mark them dead */ |
| 10012 | + list_for_each(tmp, &GlobalSMBSessionList) { |
| 10013 | + ses = |
| 10014 | + list_entry(tmp, struct cifsSesInfo, |
| 10015 | + cifsSessionList); |
| 10016 | + if (ses->server == server) { |
| 10017 | + ses->status = CifsExiting; |
| 10018 | + ses->server = NULL; |
| 10019 | + } |
| 10020 | + } |
| 10021 | + read_unlock(&GlobalSMBSeslock); |
| 10022 | + } else { |
| 10023 | + spin_lock(&GlobalMid_Lock); |
| 10024 | + list_for_each(tmp, &server->pending_mid_q) { |
| 10025 | + mid_entry = list_entry(tmp, struct mid_q_entry, qhead); |
| 10026 | + if (mid_entry->midState == MID_REQUEST_SUBMITTED) { |
| 10027 | + cFYI(1, |
| 10028 | + (" Clearing Mid 0x%x - waking up ",mid_entry->mid)); |
| 10029 | + task_to_wake = mid_entry->tsk; |
| 10030 | + if(task_to_wake) { |
| 10031 | + wake_up_process(task_to_wake); |
| 10032 | + } |
| 10033 | + } |
| 10034 | + } |
| 10035 | + spin_unlock(&GlobalMid_Lock); |
| 10036 | + read_unlock(&GlobalSMBSeslock); |
| 10037 | + set_current_state(TASK_INTERRUPTIBLE); |
| 10038 | + /* 1/8th of sec is more than enough time for them to exit */ |
| 10039 | + schedule_timeout(HZ/8); |
| 10040 | + } |
| 10041 | + |
| 10042 | + if (list_empty(&server->pending_mid_q)) { |
| 10043 | + /* mpx threads have not exited yet give them |
| 10044 | + at least the smb send timeout time for long ops */ |
| 10045 | + cFYI(1, ("Wait for exit from demultiplex thread")); |
| 10046 | + set_current_state(TASK_INTERRUPTIBLE); |
| 10047 | + schedule_timeout(46 * HZ); |
| 10048 | + /* if threads still have not exited they are probably never |
| 10049 | + coming home not much else we can do but free the memory */ |
| 10050 | + } |
| 10051 | + kfree(server); |
| 10052 | + |
| 10053 | + set_current_state(TASK_INTERRUPTIBLE); |
| 10054 | + schedule_timeout(HZ/4); |
| 10055 | + return 0; |
| 10056 | +} |
| 10057 | + |
| 10058 | +static void * |
| 10059 | +cifs_kcalloc(size_t size, int type) |
| 10060 | +{ |
| 10061 | + void *addr; |
| 10062 | + addr = kmalloc(size, type); |
| 10063 | + if (addr) |
| 10064 | + memset(addr, 0, size); |
| 10065 | + return addr; |
| 10066 | +} |
| 10067 | + |
| 10068 | +static int |
| 10069 | +cifs_parse_mount_options(char *options, const char *devname, struct smb_vol *vol) |
| 10070 | +{ |
| 10071 | + char *value; |
| 10072 | + char *data; |
| 10073 | + unsigned int temp_len, i, j; |
| 10074 | + char separator[2]; |
| 10075 | + |
| 10076 | + separator[0] = ','; |
| 10077 | + separator[1] = 0; |
| 10078 | + |
| 10079 | + memset(vol->source_rfc1001_name,0x20,15); |
| 10080 | + for(i=0;i < strnlen(system_utsname.nodename,15);i++) { |
| 10081 | + /* does not have to be a perfect mapping since the field is |
| 10082 | + informational, only used for servers that do not support |
| 10083 | + port 445 and it can be overridden at mount time */ |
| 10084 | + vol->source_rfc1001_name[i] = toupper(system_utsname.nodename[i]); |
| 10085 | + } |
| 10086 | + vol->source_rfc1001_name[15] = 0; |
| 10087 | + |
| 10088 | + vol->linux_uid = current->uid; /* current->euid instead? */ |
| 10089 | + vol->linux_gid = current->gid; |
| 10090 | + vol->dir_mode = S_IRWXUGO; |
| 10091 | + /* 2767 perms indicate mandatory locking support */ |
| 10092 | + vol->file_mode = S_IALLUGO & ~(S_ISUID | S_IXGRP); |
| 10093 | + |
| 10094 | + /* vol->retry default is 0 (i.e. "soft" limited retry not hard retry) */ |
| 10095 | + vol->rw = TRUE; |
| 10096 | + |
| 10097 | + if (!options) |
| 10098 | + return 1; |
| 10099 | + |
| 10100 | + if(strncmp(options,"sep=",4) == 0) { |
| 10101 | + if(options[4] != 0) { |
| 10102 | + separator[0] = options[4]; |
| 10103 | + options += 5; |
| 10104 | + } else { |
| 10105 | + cFYI(1,("Null separator not allowed")); |
| 10106 | + } |
| 10107 | + } |
| 10108 | + |
| 10109 | + while ((data = strsep(&options, separator)) != NULL) { |
| 10110 | + if (!*data) |
| 10111 | + continue; |
| 10112 | + if ((value = strchr(data, '=')) != NULL) |
| 10113 | + *value++ = '\0'; |
| 10114 | + if (strnicmp(data, "user", 4) == 0) { |
| 10115 | + if (!value || !*value) { |
| 10116 | + printk(KERN_WARNING |
| 10117 | + "CIFS: invalid or missing username\n"); |
| 10118 | + return 1; /* needs_arg; */ |
| 10119 | + } |
| 10120 | + if (strnlen(value, 200) < 200) { |
| 10121 | + vol->username = value; |
| 10122 | + } else { |
| 10123 | + printk(KERN_WARNING "CIFS: username too long\n"); |
| 10124 | + return 1; |
| 10125 | + } |
| 10126 | + } else if (strnicmp(data, "pass", 4) == 0) { |
| 10127 | + if (!value || !*value) { |
| 10128 | + vol->password = NULL; |
| 10129 | + continue; |
| 10130 | + } |
| 10131 | + temp_len = strlen(value); |
| 10132 | + /* removed password length check, NTLM passwords |
| 10133 | + can be arbitrarily long */ |
| 10134 | + |
| 10135 | + /* if comma in password, the string will be |
| 10136 | + prematurely null terminated. Commas in password are |
| 10137 | + specified across the cifs mount interface by a double |
| 10138 | + comma ie ,, and a comma used as in other cases ie ',' |
| 10139 | + as a parameter delimiter/separator is single and due |
| 10140 | + to the strsep above is temporarily zeroed. */ |
| 10141 | + |
| 10142 | + /* NB: password legally can have multiple commas and |
| 10143 | + the only illegal character in a password is null */ |
| 10144 | + |
| 10145 | + if ((value[temp_len] == 0) && (value[temp_len+1] == separator[0])) { |
| 10146 | + /* reinsert comma */ |
| 10147 | + value[temp_len] = separator[0]; |
| 10148 | + temp_len+=2; /* move after the second comma */ |
| 10149 | + while(value[temp_len] != 0) { |
| 10150 | + if((value[temp_len] == separator[0]) && (value[temp_len+1] != separator[0])) { |
| 10151 | + /* single comma indicating start of next parm */ |
| 10152 | + break; |
| 10153 | + } |
| 10154 | + temp_len++; |
| 10155 | + } |
| 10156 | + if(value[temp_len] == 0) { |
| 10157 | + options = NULL; |
| 10158 | + } else { |
| 10159 | + value[temp_len] = 0; |
| 10160 | + /* move options to point to start of next parm */ |
| 10161 | + options = value + temp_len + 1; |
| 10162 | + } |
| 10163 | + /* go from value to (value + temp_len) condensing double commas to singles */ |
| 10164 | + vol->password = cifs_kcalloc(temp_len, GFP_KERNEL); |
| 10165 | + for(i=0,j=0;i<temp_len;i++,j++) { |
| 10166 | + vol->password[j] = value[i]; |
| 10167 | + if(value[i] == separator[0] && value[i+1] == separator[0]) { |
| 10168 | + /* skip second comma */ |
| 10169 | + i++; |
| 10170 | + } |
| 10171 | + } |
| 10172 | + /* value[temp_len] is zeroed above so |
| 10173 | + vol->password[temp_len] guaranteed to be null */ |
| 10174 | + } else { |
| 10175 | + vol->password = cifs_kcalloc(temp_len + 1, GFP_KERNEL); |
| 10176 | + strcpy(vol->password, value); |
| 10177 | + } |
| 10178 | + } else if (strnicmp(data, "ip", 2) == 0) { |
| 10179 | + if (!value || !*value) { |
| 10180 | + vol->UNCip = NULL; |
| 10181 | + } else if (strnlen(value, 35) < 35) { |
| 10182 | + vol->UNCip = value; |
| 10183 | + } else { |
| 10184 | + printk(KERN_WARNING "CIFS: ip address too long\n"); |
| 10185 | + return 1; |
| 10186 | + } |
| 10187 | + } else if ((strnicmp(data, "unc", 3) == 0) |
| 10188 | + || (strnicmp(data, "target", 6) == 0) |
| 10189 | + || (strnicmp(data, "path", 4) == 0)) { |
| 10190 | + if (!value || !*value) { |
| 10191 | + printk(KERN_WARNING |
| 10192 | + "CIFS: invalid path to network resource\n"); |
| 10193 | + return 1; /* needs_arg; */ |
| 10194 | + } |
| 10195 | + if ((temp_len = strnlen(value, 300)) < 300) { |
| 10196 | + vol->UNC = kmalloc(temp_len+1,GFP_KERNEL); |
| 10197 | + if(vol->UNC == NULL) |
| 10198 | + return 1; |
| 10199 | + strcpy(vol->UNC,value); |
| 10200 | + if (strncmp(vol->UNC, "//", 2) == 0) { |
| 10201 | + vol->UNC[0] = '\\'; |
| 10202 | + vol->UNC[1] = '\\'; |
| 10203 | + } else if (strncmp(vol->UNC, "\\\\", 2) != 0) { |
| 10204 | + printk(KERN_WARNING |
| 10205 | + "CIFS: UNC Path does not begin with // or \\\\ \n"); |
| 10206 | + return 1; |
| 10207 | + } |
| 10208 | + } else { |
| 10209 | + printk(KERN_WARNING "CIFS: UNC name too long\n"); |
| 10210 | + return 1; |
| 10211 | + } |
| 10212 | + } else if ((strnicmp(data, "domain", 3) == 0) |
| 10213 | + || (strnicmp(data, "workgroup", 5) == 0)) { |
| 10214 | + if (!value || !*value) { |
| 10215 | + printk(KERN_WARNING "CIFS: invalid domain name\n"); |
| 10216 | + return 1; /* needs_arg; */ |
| 10217 | + } |
| 10218 | + /* BB are there cases in which a comma can be valid in |
| 10219 | + a domain name and need special handling? */ |
| 10220 | + if (strnlen(value, 65) < 65) { |
| 10221 | + vol->domainname = value; |
| 10222 | + cFYI(1, ("Domain name set")); |
| 10223 | + } else { |
| 10224 | + printk(KERN_WARNING "CIFS: domain name too long\n"); |
| 10225 | + return 1; |
| 10226 | + } |
| 10227 | + } else if (strnicmp(data, "iocharset", 9) == 0) { |
| 10228 | + if (!value || !*value) { |
| 10229 | + printk(KERN_WARNING "CIFS: invalid iocharset specified\n"); |
| 10230 | + return 1; /* needs_arg; */ |
| 10231 | + } |
| 10232 | + if (strnlen(value, 65) < 65) { |
| 10233 | + if(strnicmp(value,"default",7)) |
| 10234 | + vol->iocharset = value; |
| 10235 | + /* if iocharset not set load_nls_default used by caller */ |
| 10236 | + cFYI(1, ("iocharset set to %s",value)); |
| 10237 | + } else { |
| 10238 | + printk(KERN_WARNING "CIFS: iocharset name too long.\n"); |
| 10239 | + return 1; |
| 10240 | + } |
| 10241 | + } else if (strnicmp(data, "uid", 3) == 0) { |
| 10242 | + if (value && *value) { |
| 10243 | + vol->linux_uid = |
| 10244 | + simple_strtoul(value, &value, 0); |
| 10245 | + } |
| 10246 | + } else if (strnicmp(data, "gid", 3) == 0) { |
| 10247 | + if (value && *value) { |
| 10248 | + vol->linux_gid = |
| 10249 | + simple_strtoul(value, &value, 0); |
| 10250 | + } |
| 10251 | + } else if (strnicmp(data, "file_mode", 4) == 0) { |
| 10252 | + if (value && *value) { |
| 10253 | + vol->file_mode = |
| 10254 | + simple_strtoul(value, &value, 0); |
| 10255 | + } |
| 10256 | + } else if (strnicmp(data, "dir_mode", 3) == 0) { |
| 10257 | + if (value && *value) { |
| 10258 | + vol->dir_mode = |
| 10259 | + simple_strtoul(value, &value, 0); |
| 10260 | + } |
| 10261 | + } else if (strnicmp(data, "port", 4) == 0) { |
| 10262 | + if (value && *value) { |
| 10263 | + vol->port = |
| 10264 | + simple_strtoul(value, &value, 0); |
| 10265 | + } |
| 10266 | + } else if (strnicmp(data, "rsize", 5) == 0) { |
| 10267 | + if (value && *value) { |
| 10268 | + vol->rsize = |
| 10269 | + simple_strtoul(value, &value, 0); |
| 10270 | + } |
| 10271 | + } else if (strnicmp(data, "wsize", 5) == 0) { |
| 10272 | + if (value && *value) { |
| 10273 | + vol->wsize = |
| 10274 | + simple_strtoul(value, &value, 0); |
| 10275 | + } |
| 10276 | + } else if (strnicmp(data, "sockopt", 5) == 0) { |
| 10277 | + if (value && *value) { |
| 10278 | + vol->sockopt = |
| 10279 | + simple_strtoul(value, &value, 0); |
| 10280 | + } |
| 10281 | + } else if (strnicmp(data, "netbiosname", 4) == 0) { |
| 10282 | + if (!value || !*value || (*value == ' ')) { |
| 10283 | + cFYI(1,("invalid (empty) netbiosname specified")); |
| 10284 | + } else { |
| 10285 | + memset(vol->source_rfc1001_name,0x20,15); |
| 10286 | + for(i=0;i<15;i++) { |
| 10287 | + /* BB are there cases in which a comma can be |
| 10288 | + valid in this workstation netbios name (and need |
| 10289 | + special handling)? */ |
| 10290 | + |
| 10291 | + /* We do not uppercase netbiosname for user */ |
| 10292 | + if (value[i]==0) |
| 10293 | + break; |
| 10294 | + else |
| 10295 | + vol->source_rfc1001_name[i] = value[i]; |
| 10296 | + } |
| 10297 | + /* The string has 16th byte zero still from |
| 10298 | + set at top of the function */ |
| 10299 | + if((i==15) && (value[i] != 0)) |
| 10300 | + printk(KERN_WARNING "CIFS: netbiosname longer than 15 and was truncated.\n"); |
| 10301 | + } |
| 10302 | + } else if (strnicmp(data, "credentials", 4) == 0) { |
| 10303 | + /* ignore */ |
| 10304 | + } else if (strnicmp(data, "version", 3) == 0) { |
| 10305 | + /* ignore */ |
| 10306 | + } else if (strnicmp(data, "rw", 2) == 0) { |
| 10307 | + vol->rw = TRUE; |
| 10308 | + } else if ((strnicmp(data, "suid", 4) == 0) || |
| 10309 | + (strnicmp(data, "nosuid", 6) == 0) || |
| 10310 | + (strnicmp(data, "exec", 4) == 0) || |
| 10311 | + (strnicmp(data, "noexec", 6) == 0) || |
| 10312 | + (strnicmp(data, "nodev", 5) == 0) || |
| 10313 | + (strnicmp(data, "noauto", 6) == 0) || |
| 10314 | + (strnicmp(data, "dev", 3) == 0)) { |
| 10315 | + /* The mount tool or mount.cifs helper (if present) |
| 10316 | + uses these opts to set flags, and the flags are read |
| 10317 | + by the kernel vfs layer before we get here (ie |
| 10318 | + before read super) so there is no point trying to |
| 10319 | + parse these options again and set anything and it |
| 10320 | + is ok to just ignore them */ |
| 10321 | + continue; |
| 10322 | + } else if (strnicmp(data, "ro", 2) == 0) { |
| 10323 | + vol->rw = FALSE; |
| 10324 | + } else if (strnicmp(data, "hard", 4) == 0) { |
| 10325 | + vol->retry = 1; |
| 10326 | + } else if (strnicmp(data, "soft", 4) == 0) { |
| 10327 | + vol->retry = 0; |
| 10328 | + } else if (strnicmp(data, "nohard", 6) == 0) { |
| 10329 | + vol->retry = 0; |
| 10330 | + } else if (strnicmp(data, "nosoft", 6) == 0) { |
| 10331 | + vol->retry = 1; |
| 10332 | + } else if (strnicmp(data, "nointr", 6) == 0) { |
| 10333 | + vol->intr = 0; |
| 10334 | + } else if (strnicmp(data, "intr", 4) == 0) { |
| 10335 | + vol->intr = 1; |
| 10336 | + } else if (strnicmp(data, "noac", 4) == 0) { |
| 10337 | + printk(KERN_WARNING "CIFS: Mount option noac not supported. Instead set /proc/fs/cifs/LookupCacheEnabled to 0\n"); |
| 10338 | + } else |
| 10339 | + printk(KERN_WARNING "CIFS: Unknown mount option %s\n",data); |
| 10340 | + } |
| 10341 | + if (vol->UNC == NULL) { |
| 10342 | + if(devname == NULL) { |
| 10343 | + printk(KERN_WARNING "CIFS: Missing UNC name for mount target\n"); |
| 10344 | + return 1; |
| 10345 | + } |
| 10346 | + if ((temp_len = strnlen(devname, 300)) < 300) { |
| 10347 | + vol->UNC = kmalloc(temp_len+1,GFP_KERNEL); |
| 10348 | + if(vol->UNC == NULL) |
| 10349 | + return 1; |
| 10350 | + strcpy(vol->UNC,devname); |
| 10351 | + if (strncmp(vol->UNC, "//", 2) == 0) { |
| 10352 | + vol->UNC[0] = '\\'; |
| 10353 | + vol->UNC[1] = '\\'; |
| 10354 | + } else if (strncmp(vol->UNC, "\\\\", 2) != 0) { |
| 10355 | + printk(KERN_WARNING "CIFS: UNC Path does not begin with // or \\\\ \n"); |
| 10356 | + return 1; |
| 10357 | + } |
| 10358 | + } else { |
| 10359 | + printk(KERN_WARNING "CIFS: UNC name too long\n"); |
| 10360 | + return 1; |
| 10361 | + } |
| 10362 | + } |
| 10363 | + if(vol->UNCip == 0) |
| 10364 | + vol->UNCip = &vol->UNC[2]; |
| 10365 | + |
| 10366 | + return 0; |
| 10367 | +} |
| 10368 | + |
| 10369 | +static struct cifsSesInfo * |
| 10370 | +cifs_find_tcp_session(__u32 new_target_ip_addr, |
| 10371 | + char *userName, struct TCP_Server_Info **psrvTcp) |
| 10372 | +{ |
| 10373 | + struct list_head *tmp; |
| 10374 | + struct cifsSesInfo *ses; |
| 10375 | + |
| 10376 | + *psrvTcp = NULL; |
| 10377 | + read_lock(&GlobalSMBSeslock); |
| 10378 | + list_for_each(tmp, &GlobalSMBSessionList) { |
| 10379 | + ses = list_entry(tmp, struct cifsSesInfo, cifsSessionList); |
| 10380 | + if (ses->server) { |
| 10381 | + if (ses->server->addr.sockAddr.sin_addr.s_addr == |
| 10382 | + new_target_ip_addr) { |
| 10383 | + /* BB lock server and tcp session and increment use count here?? */ |
| 10384 | + *psrvTcp = ses->server; /* found a match on the TCP session */ |
| 10385 | + /* BB check if reconnection needed */ |
| 10386 | + if (strncmp |
| 10387 | + (ses->userName, userName, |
| 10388 | + MAX_USERNAME_SIZE) == 0){ |
| 10389 | + read_unlock(&GlobalSMBSeslock); |
| 10390 | + return ses; /* found exact match on both tcp and SMB sessions */ |
| 10391 | + } |
| 10392 | + } |
| 10393 | + } |
| 10394 | + /* else tcp and smb sessions need reconnection */ |
| 10395 | + } |
| 10396 | + read_unlock(&GlobalSMBSeslock); |
| 10397 | + return NULL; |
| 10398 | +} |
| 10399 | + |
| 10400 | +static struct cifsTconInfo * |
| 10401 | +find_unc(__u32 new_target_ip_addr, char *uncName, char *userName) |
| 10402 | +{ |
| 10403 | + struct list_head *tmp; |
| 10404 | + struct cifsTconInfo *tcon; |
| 10405 | + |
| 10406 | + read_lock(&GlobalSMBSeslock); |
| 10407 | + list_for_each(tmp, &GlobalTreeConnectionList) { |
| 10408 | + cFYI(1, ("Next tcon - ")); |
| 10409 | + tcon = list_entry(tmp, struct cifsTconInfo, cifsConnectionList); |
| 10410 | + if (tcon->ses) { |
| 10411 | + if (tcon->ses->server) { |
| 10412 | + cFYI(1, |
| 10413 | + (" old ip addr: %x == new ip %x ?", |
| 10414 | + tcon->ses->server->addr.sockAddr.sin_addr. |
| 10415 | + s_addr, new_target_ip_addr)); |
| 10416 | + if (tcon->ses->server->addr.sockAddr.sin_addr. |
| 10417 | + s_addr == new_target_ip_addr) { |
| 10418 | + /* BB lock tcon and server and tcp session and increment use count here? */ |
| 10419 | + /* found a match on the TCP session */ |
| 10420 | + /* BB check if reconnection needed */ |
| 10421 | + cFYI(1,("Matched ip, old UNC: %s == new: %s ?", |
| 10422 | + tcon->treeName, uncName)); |
| 10423 | + if (strncmp |
| 10424 | + (tcon->treeName, uncName, |
| 10425 | + MAX_TREE_SIZE) == 0) { |
| 10426 | + cFYI(1, |
| 10427 | + ("Matched UNC, old user: %s == new: %s ?", |
| 10428 | + tcon->treeName, uncName)); |
| 10429 | + if (strncmp |
| 10430 | + (tcon->ses->userName, |
| 10431 | + userName, |
| 10432 | + MAX_USERNAME_SIZE) == 0) { |
| 10433 | + read_unlock(&GlobalSMBSeslock); |
| 10434 | + return tcon;/* also matched user (smb session)*/ |
| 10435 | + } |
| 10436 | + } |
| 10437 | + } |
| 10438 | + } |
| 10439 | + } |
| 10440 | + } |
| 10441 | + read_unlock(&GlobalSMBSeslock); |
| 10442 | + return NULL; |
| 10443 | +} |
| 10444 | + |
| 10445 | +int |
| 10446 | +connect_to_dfs_path(int xid, struct cifsSesInfo *pSesInfo, |
| 10447 | + const char *old_path, const struct nls_table *nls_codepage) |
| 10448 | +{ |
| 10449 | + unsigned char *referrals = NULL; |
| 10450 | + unsigned int num_referrals; |
| 10451 | + int rc = 0; |
| 10452 | + |
| 10453 | + rc = get_dfs_path(xid, pSesInfo,old_path, nls_codepage, |
| 10454 | + &num_referrals, &referrals); |
| 10455 | + |
| 10456 | + /* BB Add in code to: if valid refrl, if not ip address contact |
| 10457 | + the helper that resolves tcp names, mount to it, try to |
| 10458 | + tcon to it unmount it if fail */ |
| 10459 | + |
| 10460 | + if(referrals) |
| 10461 | + kfree(referrals); |
| 10462 | + |
| 10463 | + return rc; |
| 10464 | +} |
| 10465 | + |
| 10466 | +int |
| 10467 | +get_dfs_path(int xid, struct cifsSesInfo *pSesInfo, |
| 10468 | + const char *old_path, const struct nls_table *nls_codepage, |
| 10469 | + unsigned int *pnum_referrals, unsigned char ** preferrals) |
| 10470 | +{ |
| 10471 | + char *temp_unc; |
| 10472 | + int rc = 0; |
| 10473 | + |
| 10474 | + *pnum_referrals = 0; |
| 10475 | + |
| 10476 | + if (pSesInfo->ipc_tid == 0) { |
| 10477 | + temp_unc = kmalloc(2 /* for slashes */ + |
| 10478 | + strnlen(pSesInfo->serverName,SERVER_NAME_LEN_WITH_NULL * 2) |
| 10479 | + + 1 + 4 /* slash IPC$ */ + 2, |
| 10480 | + GFP_KERNEL); |
| 10481 | + if (temp_unc == NULL) |
| 10482 | + return -ENOMEM; |
| 10483 | + temp_unc[0] = '\\'; |
| 10484 | + temp_unc[1] = '\\'; |
| 10485 | + strcpy(temp_unc + 2, pSesInfo->serverName); |
| 10486 | + strcpy(temp_unc + 2 + strlen(pSesInfo->serverName), "\\IPC$"); |
| 10487 | + rc = CIFSTCon(xid, pSesInfo, temp_unc, NULL, nls_codepage); |
| 10488 | + cFYI(1, |
| 10489 | + ("CIFS Tcon rc = %d ipc_tid = %d", rc,pSesInfo->ipc_tid)); |
| 10490 | + kfree(temp_unc); |
| 10491 | + } |
| 10492 | + if (rc == 0) |
| 10493 | + rc = CIFSGetDFSRefer(xid, pSesInfo, old_path, preferrals, |
| 10494 | + pnum_referrals, nls_codepage); |
| 10495 | + |
| 10496 | + return rc; |
| 10497 | +} |
| 10498 | + |
| 10499 | +/* See RFC1001 section 14 on representation of Netbios names */ |
| 10500 | +static void rfc1002mangle(char * target,char * source, unsigned int length) |
| 10501 | +{ |
| 10502 | + unsigned int i,j; |
| 10503 | + |
| 10504 | + for(i=0,j=0;i<(length);i++) { |
| 10505 | + /* mask a nibble at a time and encode */ |
| 10506 | + target[j] = 'A' + (0x0F & (source[i] >> 4)); |
| 10507 | + target[j+1] = 'A' + (0x0F & source[i]); |
| 10508 | + j+=2; |
| 10509 | + } |
| 10510 | + |
| 10511 | +} |
| 10512 | + |
| 10513 | + |
| 10514 | +static int |
| 10515 | +ipv4_connect(struct sockaddr_in *psin_server, struct socket **csocket, |
| 10516 | + char * netbios_name) |
| 10517 | +{ |
| 10518 | + int rc = 0; |
| 10519 | + int connected = 0; |
| 10520 | + unsigned short int orig_port = 0; |
| 10521 | + |
| 10522 | + if(*csocket == NULL) { |
| 10523 | + rc = sock_create(PF_INET, SOCK_STREAM, IPPROTO_TCP, csocket); |
| 10524 | + if (rc < 0) { |
| 10525 | + cERROR(1, ("Error %d creating socket",rc)); |
| 10526 | + *csocket = NULL; |
| 10527 | + return rc; |
| 10528 | + } else { |
| 10529 | + /* BB other socket options to set KEEPALIVE, NODELAY? */ |
| 10530 | + cFYI(1,("Socket created")); |
| 10531 | + (*csocket)->sk->allocation = GFP_NOFS; |
| 10532 | + } |
| 10533 | + } |
| 10534 | + |
| 10535 | + psin_server->sin_family = AF_INET; |
| 10536 | + if(psin_server->sin_port) { /* user overrode default port */ |
| 10537 | + rc = (*csocket)->ops->connect(*csocket, |
| 10538 | + (struct sockaddr *) psin_server, |
| 10539 | + sizeof (struct sockaddr_in),0); |
| 10540 | + if (rc >= 0) |
| 10541 | + connected = 1; |
| 10542 | + } |
| 10543 | + |
| 10544 | + if(!connected) { |
| 10545 | + /* save original port so we can retry user specified port |
| 10546 | + later if fall back ports fail this time */ |
| 10547 | + orig_port = psin_server->sin_port; |
| 10548 | + |
| 10549 | + /* do not retry on the same port we just failed on */ |
| 10550 | + if(psin_server->sin_port != htons(CIFS_PORT)) { |
| 10551 | + psin_server->sin_port = htons(CIFS_PORT); |
| 10552 | + |
| 10553 | + rc = (*csocket)->ops->connect(*csocket, |
| 10554 | + (struct sockaddr *) psin_server, |
| 10555 | + sizeof (struct sockaddr_in),0); |
| 10556 | + if (rc >= 0) |
| 10557 | + connected = 1; |
| 10558 | + } |
| 10559 | + } |
| 10560 | + if (!connected) { |
| 10561 | + psin_server->sin_port = htons(RFC1001_PORT); |
| 10562 | + rc = (*csocket)->ops->connect(*csocket, (struct sockaddr *) |
| 10563 | + psin_server, sizeof (struct sockaddr_in),0); |
| 10564 | + if (rc >= 0) |
| 10565 | + connected = 1; |
| 10566 | + } |
| 10567 | + |
| 10568 | + /* give up here - unless we want to retry on different |
| 10569 | + protocol families some day */ |
| 10570 | + if (!connected) { |
| 10571 | + if(orig_port) |
| 10572 | + psin_server->sin_port = orig_port; |
| 10573 | + cFYI(1,("Error %d connecting to server via ipv4",rc)); |
| 10574 | + sock_release(*csocket); |
| 10575 | + *csocket = NULL; |
| 10576 | + return rc; |
| 10577 | + } |
| 10578 | + /* Eventually check for other socket options to change from |
| 10579 | + the default. sock_setsockopt not used because it expects |
| 10580 | + user space buffer */ |
| 10581 | + (*csocket)->sk->rcvtimeo = 7 * HZ; |
| 10582 | + |
| 10583 | + /* send RFC1001 sessinit */ |
| 10584 | + |
| 10585 | + if(psin_server->sin_port == htons(139)) { |
| 10586 | + /* some servers require RFC1001 sessinit before sending |
| 10587 | + negprot - BB check reconnection in case where second |
| 10588 | + sessinit is sent but no second negprot */ |
| 10589 | + struct rfc1002_session_packet * ses_init_buf; |
| 10590 | + struct smb_hdr * smb_buf; |
| 10591 | + ses_init_buf = cifs_kcalloc(sizeof(struct rfc1002_session_packet), GFP_KERNEL); |
| 10592 | + if(ses_init_buf) { |
| 10593 | + ses_init_buf->trailer.session_req.called_len = 32; |
| 10594 | + rfc1002mangle(ses_init_buf->trailer.session_req.called_name, |
| 10595 | + DEFAULT_CIFS_CALLED_NAME,16); |
| 10596 | + ses_init_buf->trailer.session_req.calling_len = 32; |
| 10597 | + /* calling name ends in null (byte 16) from old smb |
| 10598 | + convention. */ |
| 10599 | + if(netbios_name && (netbios_name[0] !=0)) { |
| 10600 | + rfc1002mangle(ses_init_buf->trailer.session_req.calling_name, |
| 10601 | + netbios_name,16); |
| 10602 | + } else { |
| 10603 | + rfc1002mangle(ses_init_buf->trailer.session_req.calling_name, |
| 10604 | + "LINUX_CIFS_CLNT",16); |
| 10605 | + } |
| 10606 | + ses_init_buf->trailer.session_req.scope1 = 0; |
| 10607 | + ses_init_buf->trailer.session_req.scope2 = 0; |
| 10608 | + smb_buf = (struct smb_hdr *)ses_init_buf; |
| 10609 | + /* sizeof RFC1002_SESSION_REQUEST with no scope */ |
| 10610 | + smb_buf->smb_buf_length = 0x81000044; |
| 10611 | + rc = smb_send(*csocket, smb_buf, 0x44, |
| 10612 | + (struct sockaddr *)psin_server); |
| 10613 | + kfree(ses_init_buf); |
| 10614 | + } |
| 10615 | + /* else the negprot may still work without this |
| 10616 | + even though malloc failed */ |
| 10617 | + |
| 10618 | + } |
| 10619 | + |
| 10620 | + return rc; |
| 10621 | +} |
| 10622 | + |
| 10623 | +static int |
| 10624 | +ipv6_connect(struct sockaddr_in6 *psin_server, struct socket **csocket) |
| 10625 | +{ |
| 10626 | + int rc = 0; |
| 10627 | + int connected = 0; |
| 10628 | + |
| 10629 | + if(*csocket == NULL) { |
| 10630 | + rc = sock_create(PF_INET6, SOCK_STREAM, IPPROTO_TCP, csocket); |
| 10631 | + if (rc < 0) { |
| 10632 | + cERROR(1, ("Error %d creating ipv6 socket",rc)); |
| 10633 | + *csocket = NULL; |
| 10634 | + return rc; |
| 10635 | + } else { |
| 10636 | + /* BB other socket options to set KEEPALIVE, NODELAY? */ |
| 10637 | + cFYI(1,("ipv6 Socket created")); |
| 10638 | + (*csocket)->sk->allocation = GFP_NOFS; |
| 10639 | + } |
| 10640 | + } |
| 10641 | + |
| 10642 | + psin_server->sin6_family = AF_INET6; |
| 10643 | + |
| 10644 | + if(psin_server->sin6_port) { /* user overrode default port */ |
| 10645 | + rc = (*csocket)->ops->connect(*csocket, |
| 10646 | + (struct sockaddr *) psin_server, |
| 10647 | + sizeof (struct sockaddr_in6),0); |
| 10648 | + if (rc >= 0) |
| 10649 | + connected = 1; |
| 10650 | + } |
| 10651 | + |
| 10652 | + if(!connected) { |
| 10653 | + /* do not retry on the same port we just failed on */ |
| 10654 | + if(psin_server->sin6_port != htons(CIFS_PORT)) { |
| 10655 | + psin_server->sin6_port = htons(CIFS_PORT); |
| 10656 | + |
| 10657 | + rc = (*csocket)->ops->connect(*csocket, |
| 10658 | + (struct sockaddr *) psin_server, |
| 10659 | + sizeof (struct sockaddr_in6),0); |
| 10660 | + if (rc >= 0) |
| 10661 | + connected = 1; |
| 10662 | + } |
| 10663 | + } |
| 10664 | + if (!connected) { |
| 10665 | + psin_server->sin6_port = htons(RFC1001_PORT); |
| 10666 | + rc = (*csocket)->ops->connect(*csocket, (struct sockaddr *) |
| 10667 | + psin_server, sizeof (struct sockaddr_in6),0); |
| 10668 | + if (rc >= 0) |
| 10669 | + connected = 1; |
| 10670 | + } |
| 10671 | + |
| 10672 | + /* give up here - unless we want to retry on different |
| 10673 | + protocol families some day */ |
| 10674 | + if (!connected) { |
| 10675 | + cFYI(1,("Error %d connecting to server via ipv6",rc)); |
| 10676 | + sock_release(*csocket); |
| 10677 | + *csocket = NULL; |
| 10678 | + return rc; |
| 10679 | + } |
| 10680 | + /* Eventually check for other socket options to change from |
| 10681 | + the default. sock_setsockopt not used because it expects |
| 10682 | + user space buffer */ |
| 10683 | + (*csocket)->sk->rcvtimeo = 7 * HZ; |
| 10684 | + |
| 10685 | + return rc; |
| 10686 | +} |
| 10687 | + |
| 10688 | +int |
| 10689 | +cifs_mount(struct super_block *sb, struct cifs_sb_info *cifs_sb, |
| 10690 | + char *mount_data, const char *devname) |
| 10691 | +{ |
| 10692 | + int rc = 0; |
| 10693 | + int xid; |
| 10694 | + struct socket *csocket = NULL; |
| 10695 | + struct sockaddr_in sin_server; |
| 10696 | + struct sockaddr_in6 sin_server6; |
| 10697 | + struct smb_vol volume_info; |
| 10698 | + struct cifsSesInfo *pSesInfo = NULL; |
| 10699 | + struct cifsSesInfo *existingCifsSes = NULL; |
| 10700 | + struct cifsTconInfo *tcon = NULL; |
| 10701 | + struct TCP_Server_Info *srvTcp = NULL; |
| 10702 | + |
| 10703 | + xid = GetXid(); |
| 10704 | + |
| 10705 | + cFYI(1, ("Entering cifs_mount. Xid: %d with: %s", xid, mount_data)); /* BB removeme BB fixme */ |
| 10706 | + |
| 10707 | + memset(&volume_info,0,sizeof(struct smb_vol)); |
| 10708 | + if (cifs_parse_mount_options(mount_data, devname, &volume_info)) { |
| 10709 | + if(volume_info.UNC) |
| 10710 | + kfree(volume_info.UNC); |
| 10711 | + if(volume_info.password) |
| 10712 | + kfree(volume_info.password); |
| 10713 | + FreeXid(xid); |
| 10714 | + return -EINVAL; |
| 10715 | + } |
| 10716 | + |
| 10717 | + if (volume_info.username) { |
| 10718 | + cFYI(1, ("Username: %s ", volume_info.username)); |
| 10719 | + |
| 10720 | + } else { |
| 10721 | + cifserror("No username specified "); |
| 10722 | + /* In userspace mount helper we can get user name from alternate |
| 10723 | + locations such as env variables and files on disk */ |
| 10724 | + if(volume_info.UNC) |
| 10725 | + kfree(volume_info.UNC); |
| 10726 | + if(volume_info.password) |
| 10727 | + kfree(volume_info.password); |
| 10728 | + FreeXid(xid); |
| 10729 | + return -EINVAL; |
| 10730 | + } |
| 10731 | + |
| 10732 | + if (volume_info.UNCip && volume_info.UNC) { |
| 10733 | + rc = cifs_inet_pton(AF_INET, volume_info.UNCip,&sin_server.sin_addr.s_addr); |
| 10734 | + |
| 10735 | + if(rc == 0) { |
| 10736 | + /* not ipv4 address, try ipv6 */ |
| 10737 | + rc = cifs_inet_pton(AF_INET6,volume_info.UNCip,&sin_server6.sin6_addr.in6_u); |
| 10738 | + } |
| 10739 | + |
| 10740 | + if(rc != 1) { |
| 10741 | + /* we failed translating address */ |
| 10742 | + if(volume_info.UNC) |
| 10743 | + kfree(volume_info.UNC); |
| 10744 | + if(volume_info.password) |
| 10745 | + kfree(volume_info.password); |
| 10746 | + FreeXid(xid); |
| 10747 | + return -EINVAL; |
| 10748 | + } |
| 10749 | + |
| 10750 | + cFYI(1, ("UNC: %s ip: %s", volume_info.UNC, volume_info.UNCip)); |
| 10751 | + /* success */ |
| 10752 | + rc = 0; |
| 10753 | + } else if (volume_info.UNCip){ |
| 10754 | + /* BB using ip addr as server name connect to the DFS root below */ |
| 10755 | + cERROR(1,("Connecting to DFS root not implemented yet")); |
| 10756 | + if(volume_info.UNC) |
| 10757 | + kfree(volume_info.UNC); |
| 10758 | + if(volume_info.password) |
| 10759 | + kfree(volume_info.password); |
| 10760 | + FreeXid(xid); |
| 10761 | + return -EINVAL; |
| 10762 | + } else /* which servers DFS root would we conect to */ { |
| 10763 | + cERROR(1, |
| 10764 | + ("CIFS mount error: No UNC path (e.g. -o unc=//192.168.1.100/public) specified ")); |
| 10765 | + if(volume_info.UNC) |
| 10766 | + kfree(volume_info.UNC); |
| 10767 | + if(volume_info.password) |
| 10768 | + kfree(volume_info.password); |
| 10769 | + FreeXid(xid); |
| 10770 | + return -EINVAL; |
| 10771 | + } |
| 10772 | + |
| 10773 | + /* this is needed for ASCII cp to Unicode converts */ |
| 10774 | + if(volume_info.iocharset == NULL) { |
| 10775 | + cifs_sb->local_nls = load_nls_default(); |
| 10776 | + /* load_nls_default can not return null */ |
| 10777 | + } else { |
| 10778 | + cifs_sb->local_nls = load_nls(volume_info.iocharset); |
| 10779 | + if(cifs_sb->local_nls == NULL) { |
| 10780 | + cERROR(1,("CIFS mount error: iocharset %s not found",volume_info.iocharset)); |
| 10781 | + if(volume_info.UNC) |
| 10782 | + kfree(volume_info.UNC); |
| 10783 | + if(volume_info.password) |
| 10784 | + kfree(volume_info.password); |
| 10785 | + FreeXid(xid); |
| 10786 | + return -ELIBACC; |
| 10787 | + } |
| 10788 | + } |
| 10789 | + |
| 10790 | + existingCifsSes = |
| 10791 | + cifs_find_tcp_session(sin_server.sin_addr.s_addr, |
| 10792 | + volume_info.username, &srvTcp); |
| 10793 | + if (srvTcp) { |
| 10794 | + cFYI(1, ("Existing tcp session with server found ")); |
| 10795 | + } else { /* create socket */ |
| 10796 | + if(volume_info.port) |
| 10797 | + sin_server.sin_port = htons(volume_info.port); |
| 10798 | + else |
| 10799 | + sin_server.sin_port = 0; |
| 10800 | + rc = ipv4_connect(&sin_server,&csocket,volume_info.source_rfc1001_name); |
| 10801 | + if (rc < 0) { |
| 10802 | + cERROR(1, |
| 10803 | + ("Error connecting to IPv4 socket. Aborting operation")); |
| 10804 | + if(csocket != NULL) |
| 10805 | + sock_release(csocket); |
| 10806 | + if(volume_info.UNC) |
| 10807 | + kfree(volume_info.UNC); |
| 10808 | + if(volume_info.password) |
| 10809 | + kfree(volume_info.password); |
| 10810 | + FreeXid(xid); |
| 10811 | + return rc; |
| 10812 | + } |
| 10813 | + |
| 10814 | + srvTcp = kmalloc(sizeof (struct TCP_Server_Info), GFP_KERNEL); |
| 10815 | + if (srvTcp == NULL) { |
| 10816 | + rc = -ENOMEM; |
| 10817 | + sock_release(csocket); |
| 10818 | + if(volume_info.UNC) |
| 10819 | + kfree(volume_info.UNC); |
| 10820 | + if(volume_info.password) |
| 10821 | + kfree(volume_info.password); |
| 10822 | + FreeXid(xid); |
| 10823 | + return rc; |
| 10824 | + } else { |
| 10825 | + memset(srvTcp, 0, sizeof (struct TCP_Server_Info)); |
| 10826 | + memcpy(&srvTcp->addr.sockAddr, &sin_server, sizeof (struct sockaddr_in)); |
| 10827 | + atomic_set(&srvTcp->inFlight,0); |
| 10828 | + /* BB Add code for ipv6 case too */ |
| 10829 | + srvTcp->ssocket = csocket; |
| 10830 | + srvTcp->protocolType = IPV4; |
| 10831 | + init_waitqueue_head(&srvTcp->response_q); |
| 10832 | + init_waitqueue_head(&srvTcp->request_q); |
| 10833 | + INIT_LIST_HEAD(&srvTcp->pending_mid_q); |
| 10834 | + /* at this point we are the only ones with the pointer |
| 10835 | + to the struct since the kernel thread not created yet |
| 10836 | + so no need to spinlock this init of tcpStatus */ |
| 10837 | + srvTcp->tcpStatus = CifsNew; |
| 10838 | + init_MUTEX(&srvTcp->tcpSem); |
| 10839 | + kernel_thread((void *)(void *)cifs_demultiplex_thread, srvTcp, |
| 10840 | + CLONE_FS | CLONE_FILES | CLONE_VM); |
| 10841 | + memcpy(srvTcp->workstation_RFC1001_name, volume_info.source_rfc1001_name,16); |
| 10842 | + } |
| 10843 | + } |
| 10844 | + |
| 10845 | + if (existingCifsSes) { |
| 10846 | + pSesInfo = existingCifsSes; |
| 10847 | + cFYI(1, ("Existing smb sess found ")); |
| 10848 | + if(volume_info.password) |
| 10849 | + kfree(volume_info.password); |
| 10850 | + /* volume_info.UNC freed at end of function */ |
| 10851 | + } else if (!rc) { |
| 10852 | + cFYI(1, ("Existing smb sess not found ")); |
| 10853 | + pSesInfo = sesInfoAlloc(); |
| 10854 | + if (pSesInfo == NULL) |
| 10855 | + rc = -ENOMEM; |
| 10856 | + else { |
| 10857 | + pSesInfo->server = srvTcp; |
| 10858 | + sprintf(pSesInfo->serverName, "%u.%u.%u.%u", |
| 10859 | + NIPQUAD(sin_server.sin_addr.s_addr)); |
| 10860 | + } |
| 10861 | + |
| 10862 | + if (!rc){ |
| 10863 | + /* volume_info.password freed at unmount */ |
| 10864 | + if (volume_info.password) |
| 10865 | + pSesInfo->password = volume_info.password; |
| 10866 | + if (volume_info.username) |
| 10867 | + strncpy(pSesInfo->userName, |
| 10868 | + volume_info.username,MAX_USERNAME_SIZE); |
| 10869 | + if (volume_info.domainname) |
| 10870 | + strncpy(pSesInfo->domainName, |
| 10871 | + volume_info.domainname,MAX_USERNAME_SIZE); |
| 10872 | + pSesInfo->linux_uid = volume_info.linux_uid; |
| 10873 | + down(&pSesInfo->sesSem); |
| 10874 | + rc = cifs_setup_session(xid,pSesInfo, cifs_sb->local_nls); |
| 10875 | + up(&pSesInfo->sesSem); |
| 10876 | + if(!rc) |
| 10877 | + atomic_inc(&srvTcp->socketUseCount); |
| 10878 | + } else |
| 10879 | + if(volume_info.password) |
| 10880 | + kfree(volume_info.password); |
| 10881 | + } |
| 10882 | + |
| 10883 | + /* search for existing tcon to this server share */ |
| 10884 | + if (!rc) { |
| 10885 | + if((volume_info.rsize) && (volume_info.rsize + MAX_CIFS_HDR_SIZE < srvTcp->maxBuf)) |
| 10886 | + cifs_sb->rsize = volume_info.rsize; |
| 10887 | + else |
| 10888 | + cifs_sb->rsize = srvTcp->maxBuf - MAX_CIFS_HDR_SIZE; /* default */ |
| 10889 | + if((volume_info.wsize) && (volume_info.wsize + MAX_CIFS_HDR_SIZE < srvTcp->maxBuf)) |
| 10890 | + cifs_sb->wsize = volume_info.wsize; |
| 10891 | + else |
| 10892 | + cifs_sb->wsize = srvTcp->maxBuf - MAX_CIFS_HDR_SIZE; /* default */ |
| 10893 | + if(cifs_sb->rsize < PAGE_CACHE_SIZE) { |
| 10894 | + cifs_sb->rsize = PAGE_CACHE_SIZE; |
| 10895 | + cERROR(1,("Attempt to set readsize for mount to less than one page (4096)")); |
| 10896 | + } |
| 10897 | + cifs_sb->mnt_uid = volume_info.linux_uid; |
| 10898 | + cifs_sb->mnt_gid = volume_info.linux_gid; |
| 10899 | + cifs_sb->mnt_file_mode = volume_info.file_mode; |
| 10900 | + cifs_sb->mnt_dir_mode = volume_info.dir_mode; |
| 10901 | + cFYI(1,("file mode: 0x%x dir mode: 0x%x",cifs_sb->mnt_file_mode,cifs_sb->mnt_dir_mode)); |
| 10902 | + tcon = |
| 10903 | + find_unc(sin_server.sin_addr.s_addr, volume_info.UNC, |
| 10904 | + volume_info.username); |
| 10905 | + if (tcon) { |
| 10906 | + cFYI(1, ("Found match on UNC path ")); |
| 10907 | + /* we can have only one retry value for a connection |
| 10908 | + to a share so for resources mounted more than once |
| 10909 | + to the same server share the last value passed in |
| 10910 | + for the retry flag is used */ |
| 10911 | + tcon->retry = volume_info.retry; |
| 10912 | + } else { |
| 10913 | + tcon = tconInfoAlloc(); |
| 10914 | + if (tcon == NULL) |
| 10915 | + rc = -ENOMEM; |
| 10916 | + else { |
| 10917 | + /* check for null share name ie connect to dfs root */ |
| 10918 | + |
| 10919 | + /* BB check if this works for exactly length three strings */ |
| 10920 | + if ((strchr(volume_info.UNC + 3, '\\') == NULL) |
| 10921 | + && (strchr(volume_info.UNC + 3, '/') == |
| 10922 | + NULL)) { |
| 10923 | + rc = connect_to_dfs_path(xid, |
| 10924 | + pSesInfo, |
| 10925 | + "", |
| 10926 | + cifs_sb-> |
| 10927 | + local_nls); |
| 10928 | + if(volume_info.UNC) |
| 10929 | + kfree(volume_info.UNC); |
| 10930 | + FreeXid(xid); |
| 10931 | + return -ENODEV; |
| 10932 | + } else { |
| 10933 | + rc = CIFSTCon(xid, pSesInfo, |
| 10934 | + volume_info.UNC, |
| 10935 | + tcon, cifs_sb->local_nls); |
| 10936 | + cFYI(1, ("CIFS Tcon rc = %d", rc)); |
| 10937 | + } |
| 10938 | + if (!rc) { |
| 10939 | + atomic_inc(&pSesInfo->inUse); |
| 10940 | + tcon->retry = volume_info.retry; |
| 10941 | + } |
| 10942 | + } |
| 10943 | + } |
| 10944 | + } |
| 10945 | + if(pSesInfo) { |
| 10946 | + if (pSesInfo->capabilities & CAP_LARGE_FILES) { |
| 10947 | + sb->s_maxbytes = (u64) 1 << 63; |
| 10948 | + } else |
| 10949 | + sb->s_maxbytes = (u64) 1 << 31; /* 2 GB */ |
| 10950 | + } |
| 10951 | + |
| 10952 | +/* on error free sesinfo and tcon struct if needed */ |
| 10953 | + if (rc) { |
| 10954 | + /* if session setup failed, use count is zero but |
| 10955 | + we still need to free cifsd thread */ |
| 10956 | + if(atomic_read(&srvTcp->socketUseCount) == 0) { |
| 10957 | + spin_lock(&GlobalMid_Lock); |
| 10958 | + srvTcp->tcpStatus = CifsExiting; |
| 10959 | + spin_unlock(&GlobalMid_Lock); |
| 10960 | + if(srvTcp->tsk) |
| 10961 | + send_sig(SIGKILL,srvTcp->tsk,1); |
| 10962 | + } |
| 10963 | + /* If find_unc succeeded then rc == 0 so we can not end */ |
| 10964 | + if (tcon) /* up accidently freeing someone elses tcon struct */ |
| 10965 | + tconInfoFree(tcon); |
| 10966 | + if (existingCifsSes == 0) { |
| 10967 | + if (pSesInfo) { |
| 10968 | + if ((pSesInfo->server) && |
| 10969 | + (pSesInfo->status == CifsGood)) { |
| 10970 | + int temp_rc; |
| 10971 | + temp_rc = CIFSSMBLogoff(xid, pSesInfo); |
| 10972 | + /* if the socketUseCount is now zero */ |
| 10973 | + if((temp_rc == -ESHUTDOWN) && |
| 10974 | + (pSesInfo->server->tsk)) |
| 10975 | + send_sig(SIGKILL,pSesInfo->server->tsk,1); |
| 10976 | + } else |
| 10977 | + cFYI(1, ("No session or bad tcon")); |
| 10978 | + sesInfoFree(pSesInfo); |
| 10979 | + /* pSesInfo = NULL; */ |
| 10980 | + } |
| 10981 | + } |
| 10982 | + } else { |
| 10983 | + atomic_inc(&tcon->useCount); |
| 10984 | + cifs_sb->tcon = tcon; |
| 10985 | + tcon->ses = pSesInfo; |
| 10986 | + |
| 10987 | + /* do not care if following two calls succeed - informational only */ |
| 10988 | + CIFSSMBQFSDeviceInfo(xid, tcon, cifs_sb->local_nls); |
| 10989 | + CIFSSMBQFSAttributeInfo(xid, tcon, cifs_sb->local_nls); |
| 10990 | + if (tcon->ses->capabilities & CAP_UNIX) |
| 10991 | + CIFSSMBQFSUnixInfo(xid, tcon, cifs_sb->local_nls); |
| 10992 | + } |
| 10993 | + |
| 10994 | + /* volume_info.password is freed above when existing session found |
| 10995 | + (in which case it is not needed anymore) but when new sesion is created |
| 10996 | + the password ptr is put in the new session structure (in which case the |
| 10997 | + password will be freed at unmount time) */ |
| 10998 | + if(volume_info.UNC) |
| 10999 | + kfree(volume_info.UNC); |
| 11000 | + FreeXid(xid); |
| 11001 | + return rc; |
| 11002 | +} |
| 11003 | + |
| 11004 | +static int |
| 11005 | +CIFSSessSetup(unsigned int xid, struct cifsSesInfo *ses, |
| 11006 | + char session_key[CIFS_SESSION_KEY_SIZE], |
| 11007 | + const struct nls_table *nls_codepage) |
| 11008 | +{ |
| 11009 | + struct smb_hdr *smb_buffer; |
| 11010 | + struct smb_hdr *smb_buffer_response; |
| 11011 | + SESSION_SETUP_ANDX *pSMB; |
| 11012 | + SESSION_SETUP_ANDX *pSMBr; |
| 11013 | + char *bcc_ptr; |
| 11014 | + char *user = ses->userName; |
| 11015 | + char *domain = ses->domainName; |
| 11016 | + int rc = 0; |
| 11017 | + int remaining_words = 0; |
| 11018 | + int bytes_returned = 0; |
| 11019 | + int len; |
| 11020 | + |
| 11021 | + cFYI(1, ("In sesssetup ")); |
| 11022 | + |
| 11023 | + smb_buffer = cifs_buf_get(); |
| 11024 | + if (smb_buffer == 0) { |
| 11025 | + return -ENOMEM; |
| 11026 | + } |
| 11027 | + smb_buffer_response = smb_buffer; |
| 11028 | + pSMBr = pSMB = (SESSION_SETUP_ANDX *) smb_buffer; |
| 11029 | + |
| 11030 | + /* send SMBsessionSetup here */ |
| 11031 | + header_assemble(smb_buffer, SMB_COM_SESSION_SETUP_ANDX, |
| 11032 | + NULL /* no tCon exists yet */ , 13 /* wct */ ); |
| 11033 | + |
| 11034 | + pSMB->req_no_secext.AndXCommand = 0xFF; |
| 11035 | + pSMB->req_no_secext.MaxBufferSize = cpu_to_le16(ses->server->maxBuf); |
| 11036 | + pSMB->req_no_secext.MaxMpxCount = cpu_to_le16(ses->server->maxReq); |
| 11037 | + |
| 11038 | + if(ses->server->secMode & (SECMODE_SIGN_REQUIRED | SECMODE_SIGN_ENABLED)) |
| 11039 | + smb_buffer->Flags2 |= SMBFLG2_SECURITY_SIGNATURE; |
| 11040 | + |
| 11041 | + pSMB->req_no_secext.Capabilities = |
| 11042 | + CAP_LARGE_FILES | CAP_NT_SMBS | CAP_LEVEL_II_OPLOCKS; |
| 11043 | + if (ses->capabilities & CAP_UNICODE) { |
| 11044 | + smb_buffer->Flags2 |= SMBFLG2_UNICODE; |
| 11045 | + pSMB->req_no_secext.Capabilities |= CAP_UNICODE; |
| 11046 | + } |
| 11047 | + if (ses->capabilities & CAP_STATUS32) { |
| 11048 | + smb_buffer->Flags2 |= SMBFLG2_ERR_STATUS; |
| 11049 | + pSMB->req_no_secext.Capabilities |= CAP_STATUS32; |
| 11050 | + } |
| 11051 | + if (ses->capabilities & CAP_DFS) { |
| 11052 | + smb_buffer->Flags2 |= SMBFLG2_DFS; |
| 11053 | + pSMB->req_no_secext.Capabilities |= CAP_DFS; |
| 11054 | + } |
| 11055 | + pSMB->req_no_secext.Capabilities = |
| 11056 | + cpu_to_le32(pSMB->req_no_secext.Capabilities); |
| 11057 | + /* pSMB->req_no_secext.CaseInsensitivePasswordLength = |
| 11058 | + CIFS_SESSION_KEY_SIZE; */ |
| 11059 | + pSMB->req_no_secext.CaseInsensitivePasswordLength = 0; |
| 11060 | + pSMB->req_no_secext.CaseSensitivePasswordLength = |
| 11061 | + cpu_to_le16(CIFS_SESSION_KEY_SIZE); |
| 11062 | + bcc_ptr = pByteArea(smb_buffer); |
| 11063 | + /* memcpy(bcc_ptr, (char *) lm_session_key, CIFS_SESSION_KEY_SIZE); |
| 11064 | + bcc_ptr += CIFS_SESSION_KEY_SIZE; */ |
| 11065 | + memcpy(bcc_ptr, (char *) session_key, CIFS_SESSION_KEY_SIZE); |
| 11066 | + bcc_ptr += CIFS_SESSION_KEY_SIZE; |
| 11067 | + |
| 11068 | + if (ses->capabilities & CAP_UNICODE) { |
| 11069 | + if ((long) bcc_ptr % 2) { /* must be word aligned for Unicode */ |
| 11070 | + *bcc_ptr = 0; |
| 11071 | + bcc_ptr++; |
| 11072 | + } |
| 11073 | + if(user == NULL) |
| 11074 | + bytes_returned = 0; /* skill null user */ |
| 11075 | + else |
| 11076 | + bytes_returned = |
| 11077 | + cifs_strtoUCS((wchar_t *) bcc_ptr, user, 100, |
| 11078 | + nls_codepage); |
| 11079 | + bcc_ptr += 2 * bytes_returned; /* convert num 16 bit words to bytes */ |
| 11080 | + bcc_ptr += 2; /* trailing null */ |
| 11081 | + if (domain == NULL) |
| 11082 | + bytes_returned = |
| 11083 | + cifs_strtoUCS((wchar_t *) bcc_ptr, |
| 11084 | + "CIFS_LINUX_DOM", 32, nls_codepage); |
| 11085 | + else |
| 11086 | + bytes_returned = |
| 11087 | + cifs_strtoUCS((wchar_t *) bcc_ptr, domain, 64, |
| 11088 | + nls_codepage); |
| 11089 | + bcc_ptr += 2 * bytes_returned; |
| 11090 | + bcc_ptr += 2; |
| 11091 | + bytes_returned = |
| 11092 | + cifs_strtoUCS((wchar_t *) bcc_ptr, "Linux version ", |
| 11093 | + 32, nls_codepage); |
| 11094 | + bcc_ptr += 2 * bytes_returned; |
| 11095 | + bytes_returned = |
| 11096 | + cifs_strtoUCS((wchar_t *) bcc_ptr, UTS_RELEASE, 32, |
| 11097 | + nls_codepage); |
| 11098 | + bcc_ptr += 2 * bytes_returned; |
| 11099 | + bcc_ptr += 2; |
| 11100 | + bytes_returned = |
| 11101 | + cifs_strtoUCS((wchar_t *) bcc_ptr, CIFS_NETWORK_OPSYS, |
| 11102 | + 64, nls_codepage); |
| 11103 | + bcc_ptr += 2 * bytes_returned; |
| 11104 | + bcc_ptr += 2; |
| 11105 | + } else { |
| 11106 | + if(user != NULL) { |
| 11107 | + strncpy(bcc_ptr, user, 200); |
| 11108 | + bcc_ptr += strnlen(user, 200); |
| 11109 | + } |
| 11110 | + *bcc_ptr = 0; |
| 11111 | + bcc_ptr++; |
| 11112 | + if (domain == NULL) { |
| 11113 | + strcpy(bcc_ptr, "CIFS_LINUX_DOM"); |
| 11114 | + bcc_ptr += strlen("CIFS_LINUX_DOM") + 1; |
| 11115 | + } else { |
| 11116 | + strncpy(bcc_ptr, domain, 64); |
| 11117 | + bcc_ptr += strnlen(domain, 64); |
| 11118 | + *bcc_ptr = 0; |
| 11119 | + bcc_ptr++; |
| 11120 | + } |
| 11121 | + strcpy(bcc_ptr, "Linux version "); |
| 11122 | + bcc_ptr += strlen("Linux version "); |
| 11123 | + strcpy(bcc_ptr, UTS_RELEASE); |
| 11124 | + bcc_ptr += strlen(UTS_RELEASE) + 1; |
| 11125 | + strcpy(bcc_ptr, CIFS_NETWORK_OPSYS); |
| 11126 | + bcc_ptr += strlen(CIFS_NETWORK_OPSYS) + 1; |
| 11127 | + } |
| 11128 | + BCC(smb_buffer) = (long) bcc_ptr - (long) pByteArea(smb_buffer); |
| 11129 | + smb_buffer->smb_buf_length += BCC(smb_buffer); |
| 11130 | + BCC(smb_buffer) = cpu_to_le16(BCC(smb_buffer)); |
| 11131 | + |
| 11132 | + rc = SendReceive(xid, ses, smb_buffer, smb_buffer_response, |
| 11133 | + &bytes_returned, 1); |
| 11134 | + if (rc) { |
| 11135 | +/* rc = map_smb_to_linux_error(smb_buffer_response); now done in SendReceive */ |
| 11136 | + } else if ((smb_buffer_response->WordCount == 3) |
| 11137 | + || (smb_buffer_response->WordCount == 4)) { |
| 11138 | + pSMBr->resp.Action = le16_to_cpu(pSMBr->resp.Action); |
| 11139 | + if (pSMBr->resp.Action & GUEST_LOGIN) |
| 11140 | + cFYI(1, (" Guest login")); /* do we want to mark SesInfo struct ? */ |
| 11141 | + if (ses) { |
| 11142 | + ses->Suid = smb_buffer_response->Uid; /* UID left in wire format (le) */ |
| 11143 | + cFYI(1, ("UID = %d ", ses->Suid)); |
| 11144 | + /* response can have either 3 or 4 word count - Samba sends 3 */ |
| 11145 | + bcc_ptr = pByteArea(smb_buffer_response); |
| 11146 | + if ((pSMBr->resp.hdr.WordCount == 3) |
| 11147 | + || ((pSMBr->resp.hdr.WordCount == 4) |
| 11148 | + && (pSMBr->resp.SecurityBlobLength < |
| 11149 | + pSMBr->resp.ByteCount))) { |
| 11150 | + if (pSMBr->resp.hdr.WordCount == 4) |
| 11151 | + bcc_ptr += |
| 11152 | + pSMBr->resp.SecurityBlobLength; |
| 11153 | + |
| 11154 | + if (smb_buffer->Flags2 & SMBFLG2_UNICODE) { |
| 11155 | + if ((long) (bcc_ptr) % 2) { |
| 11156 | + remaining_words = |
| 11157 | + (BCC(smb_buffer_response) |
| 11158 | + - 1) / 2; |
| 11159 | + bcc_ptr++; /* Unicode strings must be word aligned */ |
| 11160 | + } else { |
| 11161 | + remaining_words = |
| 11162 | + BCC |
| 11163 | + (smb_buffer_response) / 2; |
| 11164 | + } |
| 11165 | + len = |
| 11166 | + UniStrnlen((wchar_t *) bcc_ptr, |
| 11167 | + remaining_words - 1); |
| 11168 | +/* We look for obvious messed up bcc or strings in response so we do not go off |
| 11169 | + the end since (at least) WIN2K and Windows XP have a major bug in not null |
| 11170 | + terminating last Unicode string in response */ |
| 11171 | + ses->serverOS = cifs_kcalloc(2 * (len + 1), GFP_KERNEL); |
| 11172 | + cifs_strfromUCS_le(ses->serverOS, |
| 11173 | + (wchar_t *)bcc_ptr, len,nls_codepage); |
| 11174 | + bcc_ptr += 2 * (len + 1); |
| 11175 | + remaining_words -= len + 1; |
| 11176 | + ses->serverOS[2 * len] = 0; |
| 11177 | + ses->serverOS[1 + (2 * len)] = 0; |
| 11178 | + if (remaining_words > 0) { |
| 11179 | + len = UniStrnlen((wchar_t *)bcc_ptr, |
| 11180 | + remaining_words |
| 11181 | + - 1); |
| 11182 | + ses->serverNOS =cifs_kcalloc(2 * (len + 1),GFP_KERNEL); |
| 11183 | + cifs_strfromUCS_le(ses->serverNOS, |
| 11184 | + (wchar_t *)bcc_ptr,len,nls_codepage); |
| 11185 | + bcc_ptr += 2 * (len + 1); |
| 11186 | + ses->serverNOS[2 * len] = 0; |
| 11187 | + ses->serverNOS[1 + (2 * len)] = 0; |
| 11188 | + remaining_words -= len + 1; |
| 11189 | + if (remaining_words > 0) { |
| 11190 | + len = UniStrnlen((wchar_t *) bcc_ptr, remaining_words); |
| 11191 | + /* last string is not always null terminated (for e.g. for Windows XP & 2000) */ |
| 11192 | + ses->serverDomain = |
| 11193 | + cifs_kcalloc(2*(len+1),GFP_KERNEL); |
| 11194 | + cifs_strfromUCS_le(ses->serverDomain, |
| 11195 | + (wchar_t *)bcc_ptr,len,nls_codepage); |
| 11196 | + bcc_ptr += 2 * (len + 1); |
| 11197 | + ses->serverDomain[2*len] = 0; |
| 11198 | + ses->serverDomain[1+(2*len)] = 0; |
| 11199 | + } /* else no more room so create dummy domain string */ |
| 11200 | + else |
| 11201 | + ses->serverDomain = |
| 11202 | + cifs_kcalloc(2, |
| 11203 | + GFP_KERNEL); |
| 11204 | + } else { /* no room so create dummy domain and NOS string */ |
| 11205 | + ses->serverDomain = |
| 11206 | + cifs_kcalloc(2, GFP_KERNEL); |
| 11207 | + ses->serverNOS = |
| 11208 | + cifs_kcalloc(2, GFP_KERNEL); |
| 11209 | + } |
| 11210 | + } else { /* ASCII */ |
| 11211 | + len = strnlen(bcc_ptr, 1024); |
| 11212 | + if (((long) bcc_ptr + len) - (long) |
| 11213 | + pByteArea(smb_buffer_response) |
| 11214 | + <= BCC(smb_buffer_response)) { |
| 11215 | + ses->serverOS = cifs_kcalloc(len + 1,GFP_KERNEL); |
| 11216 | + strncpy(ses->serverOS,bcc_ptr, len); |
| 11217 | + |
| 11218 | + bcc_ptr += len; |
| 11219 | + bcc_ptr[0] = 0; /* null terminate the string */ |
| 11220 | + bcc_ptr++; |
| 11221 | + |
| 11222 | + len = strnlen(bcc_ptr, 1024); |
| 11223 | + ses->serverNOS = cifs_kcalloc(len + 1,GFP_KERNEL); |
| 11224 | + strncpy(ses->serverNOS, bcc_ptr, len); |
| 11225 | + bcc_ptr += len; |
| 11226 | + bcc_ptr[0] = 0; |
| 11227 | + bcc_ptr++; |
| 11228 | + |
| 11229 | + len = strnlen(bcc_ptr, 1024); |
| 11230 | + ses->serverDomain = cifs_kcalloc(len + 1,GFP_KERNEL); |
| 11231 | + strncpy(ses->serverDomain, bcc_ptr, len); |
| 11232 | + bcc_ptr += len; |
| 11233 | + bcc_ptr[0] = 0; |
| 11234 | + bcc_ptr++; |
| 11235 | + } else |
| 11236 | + cFYI(1, |
| 11237 | + ("Variable field of length %d extends beyond end of smb ", |
| 11238 | + len)); |
| 11239 | + } |
| 11240 | + } else { |
| 11241 | + cERROR(1, |
| 11242 | + (" Security Blob Length extends beyond end of SMB")); |
| 11243 | + } |
| 11244 | + } else { |
| 11245 | + cERROR(1, ("No session structure passed in.")); |
| 11246 | + } |
| 11247 | + } else { |
| 11248 | + cERROR(1, |
| 11249 | + (" Invalid Word count %d: ", |
| 11250 | + smb_buffer_response->WordCount)); |
| 11251 | + rc = -EIO; |
| 11252 | + } |
| 11253 | + |
| 11254 | + if (smb_buffer) |
| 11255 | + cifs_buf_release(smb_buffer); |
| 11256 | + |
| 11257 | + return rc; |
| 11258 | +} |
| 11259 | + |
| 11260 | +static int |
| 11261 | +CIFSSpnegoSessSetup(unsigned int xid, struct cifsSesInfo *ses, |
| 11262 | + char *SecurityBlob,int SecurityBlobLength, |
| 11263 | + const struct nls_table *nls_codepage) |
| 11264 | +{ |
| 11265 | + struct smb_hdr *smb_buffer; |
| 11266 | + struct smb_hdr *smb_buffer_response; |
| 11267 | + SESSION_SETUP_ANDX *pSMB; |
| 11268 | + SESSION_SETUP_ANDX *pSMBr; |
| 11269 | + char *bcc_ptr; |
| 11270 | + char *user = ses->userName; |
| 11271 | + char *domain = ses->domainName; |
| 11272 | + int rc = 0; |
| 11273 | + int remaining_words = 0; |
| 11274 | + int bytes_returned = 0; |
| 11275 | + int len; |
| 11276 | + |
| 11277 | + cFYI(1, ("In spnego sesssetup ")); |
| 11278 | + |
| 11279 | + smb_buffer = cifs_buf_get(); |
| 11280 | + if (smb_buffer == 0) { |
| 11281 | + return -ENOMEM; |
| 11282 | + } |
| 11283 | + smb_buffer_response = smb_buffer; |
| 11284 | + pSMBr = pSMB = (SESSION_SETUP_ANDX *) smb_buffer; |
| 11285 | + |
| 11286 | + /* send SMBsessionSetup here */ |
| 11287 | + header_assemble(smb_buffer, SMB_COM_SESSION_SETUP_ANDX, |
| 11288 | + NULL /* no tCon exists yet */ , 12 /* wct */ ); |
| 11289 | + pSMB->req.hdr.Flags2 |= SMBFLG2_EXT_SEC; |
| 11290 | + pSMB->req.AndXCommand = 0xFF; |
| 11291 | + pSMB->req.MaxBufferSize = cpu_to_le16(ses->server->maxBuf); |
| 11292 | + pSMB->req.MaxMpxCount = cpu_to_le16(ses->server->maxReq); |
| 11293 | + |
| 11294 | + if(ses->server->secMode & (SECMODE_SIGN_REQUIRED | SECMODE_SIGN_ENABLED)) |
| 11295 | + smb_buffer->Flags2 |= SMBFLG2_SECURITY_SIGNATURE; |
| 11296 | + |
| 11297 | + pSMB->req.Capabilities = |
| 11298 | + CAP_LARGE_FILES | CAP_NT_SMBS | CAP_LEVEL_II_OPLOCKS | |
| 11299 | + CAP_EXTENDED_SECURITY; |
| 11300 | + if (ses->capabilities & CAP_UNICODE) { |
| 11301 | + smb_buffer->Flags2 |= SMBFLG2_UNICODE; |
| 11302 | + pSMB->req.Capabilities |= CAP_UNICODE; |
| 11303 | + } |
| 11304 | + if (ses->capabilities & CAP_STATUS32) { |
| 11305 | + smb_buffer->Flags2 |= SMBFLG2_ERR_STATUS; |
| 11306 | + pSMB->req.Capabilities |= CAP_STATUS32; |
| 11307 | + } |
| 11308 | + if (ses->capabilities & CAP_DFS) { |
| 11309 | + smb_buffer->Flags2 |= SMBFLG2_DFS; |
| 11310 | + pSMB->req.Capabilities |= CAP_DFS; |
| 11311 | + } |
| 11312 | + pSMB->req.Capabilities = cpu_to_le32(pSMB->req.Capabilities); |
| 11313 | + |
| 11314 | + pSMB->req.SecurityBlobLength = cpu_to_le16(SecurityBlobLength); |
| 11315 | + bcc_ptr = pByteArea(smb_buffer); |
| 11316 | + memcpy(bcc_ptr, SecurityBlob, SecurityBlobLength); |
| 11317 | + bcc_ptr += SecurityBlobLength; |
| 11318 | + |
| 11319 | + if (ses->capabilities & CAP_UNICODE) { |
| 11320 | + if ((long) bcc_ptr % 2) { /* must be word aligned for Unicode strings */ |
| 11321 | + *bcc_ptr = 0; |
| 11322 | + bcc_ptr++; |
| 11323 | + } |
| 11324 | + bytes_returned = |
| 11325 | + cifs_strtoUCS((wchar_t *) bcc_ptr, user, 100, nls_codepage); |
| 11326 | + bcc_ptr += 2 * bytes_returned; /* convert num of 16 bit words to bytes */ |
| 11327 | + bcc_ptr += 2; /* trailing null */ |
| 11328 | + if (domain == NULL) |
| 11329 | + bytes_returned = |
| 11330 | + cifs_strtoUCS((wchar_t *) bcc_ptr, |
| 11331 | + "CIFS_LINUX_DOM", 32, nls_codepage); |
| 11332 | + else |
| 11333 | + bytes_returned = |
| 11334 | + cifs_strtoUCS((wchar_t *) bcc_ptr, domain, 64, |
| 11335 | + nls_codepage); |
| 11336 | + bcc_ptr += 2 * bytes_returned; |
| 11337 | + bcc_ptr += 2; |
| 11338 | + bytes_returned = |
| 11339 | + cifs_strtoUCS((wchar_t *) bcc_ptr, "Linux version ", |
| 11340 | + 32, nls_codepage); |
| 11341 | + bcc_ptr += 2 * bytes_returned; |
| 11342 | + bytes_returned = |
| 11343 | + cifs_strtoUCS((wchar_t *) bcc_ptr, UTS_RELEASE, 32, |
| 11344 | + nls_codepage); |
| 11345 | + bcc_ptr += 2 * bytes_returned; |
| 11346 | + bcc_ptr += 2; |
| 11347 | + bytes_returned = |
| 11348 | + cifs_strtoUCS((wchar_t *) bcc_ptr, CIFS_NETWORK_OPSYS, |
| 11349 | + 64, nls_codepage); |
| 11350 | + bcc_ptr += 2 * bytes_returned; |
| 11351 | + bcc_ptr += 2; |
| 11352 | + } else { |
| 11353 | + strncpy(bcc_ptr, user, 200); |
| 11354 | + bcc_ptr += strnlen(user, 200); |
| 11355 | + *bcc_ptr = 0; |
| 11356 | + bcc_ptr++; |
| 11357 | + if (domain == NULL) { |
| 11358 | + strcpy(bcc_ptr, "CIFS_LINUX_DOM"); |
| 11359 | + bcc_ptr += strlen("CIFS_LINUX_DOM") + 1; |
| 11360 | + } else { |
| 11361 | + strncpy(bcc_ptr, domain, 64); |
| 11362 | + bcc_ptr += strnlen(domain, 64); |
| 11363 | + *bcc_ptr = 0; |
| 11364 | + bcc_ptr++; |
| 11365 | + } |
| 11366 | + strcpy(bcc_ptr, "Linux version "); |
| 11367 | + bcc_ptr += strlen("Linux version "); |
| 11368 | + strcpy(bcc_ptr, UTS_RELEASE); |
| 11369 | + bcc_ptr += strlen(UTS_RELEASE) + 1; |
| 11370 | + strcpy(bcc_ptr, CIFS_NETWORK_OPSYS); |
| 11371 | + bcc_ptr += strlen(CIFS_NETWORK_OPSYS) + 1; |
| 11372 | + } |
| 11373 | + BCC(smb_buffer) = (long) bcc_ptr - (long) pByteArea(smb_buffer); |
| 11374 | + smb_buffer->smb_buf_length += BCC(smb_buffer); |
| 11375 | + BCC(smb_buffer) = cpu_to_le16(BCC(smb_buffer)); |
| 11376 | + |
| 11377 | + rc = SendReceive(xid, ses, smb_buffer, smb_buffer_response, |
| 11378 | + &bytes_returned, 1); |
| 11379 | + if (rc) { |
| 11380 | +/* rc = map_smb_to_linux_error(smb_buffer_response); *//* done in SendReceive now */ |
| 11381 | + } else if ((smb_buffer_response->WordCount == 3) |
| 11382 | + || (smb_buffer_response->WordCount == 4)) { |
| 11383 | + pSMBr->resp.Action = le16_to_cpu(pSMBr->resp.Action); |
| 11384 | + pSMBr->resp.SecurityBlobLength = |
| 11385 | + le16_to_cpu(pSMBr->resp.SecurityBlobLength); |
| 11386 | + if (pSMBr->resp.Action & GUEST_LOGIN) |
| 11387 | + cFYI(1, (" Guest login")); /* BB do we want to set anything in SesInfo struct ? */ |
| 11388 | + if (ses) { |
| 11389 | + ses->Suid = smb_buffer_response->Uid; /* UID left in wire format (le) */ |
| 11390 | + cFYI(1, ("UID = %d ", ses->Suid)); |
| 11391 | + bcc_ptr = pByteArea(smb_buffer_response); /* response can have either 3 or 4 word count - Samba sends 3 */ |
| 11392 | + |
| 11393 | + /* BB Fix below to make endian neutral !! */ |
| 11394 | + |
| 11395 | + if ((pSMBr->resp.hdr.WordCount == 3) |
| 11396 | + || ((pSMBr->resp.hdr.WordCount == 4) |
| 11397 | + && (pSMBr->resp.SecurityBlobLength < |
| 11398 | + pSMBr->resp.ByteCount))) { |
| 11399 | + if (pSMBr->resp.hdr.WordCount == 4) { |
| 11400 | + bcc_ptr += |
| 11401 | + pSMBr->resp.SecurityBlobLength; |
| 11402 | + cFYI(1, |
| 11403 | + ("Security Blob Length %d ", |
| 11404 | + pSMBr->resp.SecurityBlobLength)); |
| 11405 | + } |
| 11406 | + |
| 11407 | + if (smb_buffer->Flags2 & SMBFLG2_UNICODE) { |
| 11408 | + if ((long) (bcc_ptr) % 2) { |
| 11409 | + remaining_words = |
| 11410 | + (BCC(smb_buffer_response) |
| 11411 | + - 1) / 2; |
| 11412 | + bcc_ptr++; /* Unicode strings must be word aligned */ |
| 11413 | + } else { |
| 11414 | + remaining_words = |
| 11415 | + BCC |
| 11416 | + (smb_buffer_response) / 2; |
| 11417 | + } |
| 11418 | + len = |
| 11419 | + UniStrnlen((wchar_t *) bcc_ptr, |
| 11420 | + remaining_words - 1); |
| 11421 | +/* We look for obvious messed up bcc or strings in response so we do not go off |
| 11422 | + the end since (at least) WIN2K and Windows XP have a major bug in not null |
| 11423 | + terminating last Unicode string in response */ |
| 11424 | + ses->serverOS = |
| 11425 | + cifs_kcalloc(2 * (len + 1), GFP_KERNEL); |
| 11426 | + cifs_strfromUCS_le(ses->serverOS, |
| 11427 | + (wchar_t *) |
| 11428 | + bcc_ptr, len, |
| 11429 | + nls_codepage); |
| 11430 | + bcc_ptr += 2 * (len + 1); |
| 11431 | + remaining_words -= len + 1; |
| 11432 | + ses->serverOS[2 * len] = 0; |
| 11433 | + ses->serverOS[1 + (2 * len)] = 0; |
| 11434 | + if (remaining_words > 0) { |
| 11435 | + len = UniStrnlen((wchar_t *)bcc_ptr, |
| 11436 | + remaining_words |
| 11437 | + - 1); |
| 11438 | + ses->serverNOS = |
| 11439 | + cifs_kcalloc(2 * (len + 1), |
| 11440 | + GFP_KERNEL); |
| 11441 | + cifs_strfromUCS_le(ses->serverNOS, |
| 11442 | + (wchar_t *)bcc_ptr, |
| 11443 | + len, |
| 11444 | + nls_codepage); |
| 11445 | + bcc_ptr += 2 * (len + 1); |
| 11446 | + ses->serverNOS[2 * len] = 0; |
| 11447 | + ses->serverNOS[1 + (2 * len)] = 0; |
| 11448 | + remaining_words -= len + 1; |
| 11449 | + if (remaining_words > 0) { |
| 11450 | + len = UniStrnlen((wchar_t *) bcc_ptr, remaining_words); |
| 11451 | + /* last string is not always null terminated (for e.g. for Windows XP & 2000) */ |
| 11452 | + ses->serverDomain = cifs_kcalloc(2*(len+1),GFP_KERNEL); |
| 11453 | + cifs_strfromUCS_le(ses->serverDomain, |
| 11454 | + (wchar_t *)bcc_ptr, |
| 11455 | + len, |
| 11456 | + nls_codepage); |
| 11457 | + bcc_ptr += 2*(len+1); |
| 11458 | + ses->serverDomain[2*len] = 0; |
| 11459 | + ses->serverDomain[1+(2*len)] = 0; |
| 11460 | + } /* else no more room so create dummy domain string */ |
| 11461 | + else |
| 11462 | + ses->serverDomain = |
| 11463 | + cifs_kcalloc(2,GFP_KERNEL); |
| 11464 | + } else { /* no room so create dummy domain and NOS string */ |
| 11465 | + ses->serverDomain = cifs_kcalloc(2, GFP_KERNEL); |
| 11466 | + ses->serverNOS = cifs_kcalloc(2, GFP_KERNEL); |
| 11467 | + } |
| 11468 | + } else { /* ASCII */ |
| 11469 | + |
| 11470 | + len = strnlen(bcc_ptr, 1024); |
| 11471 | + if (((long) bcc_ptr + len) - (long) |
| 11472 | + pByteArea(smb_buffer_response) |
| 11473 | + <= BCC(smb_buffer_response)) { |
| 11474 | + ses->serverOS = cifs_kcalloc(len + 1, GFP_KERNEL); |
| 11475 | + strncpy(ses->serverOS, bcc_ptr, len); |
| 11476 | + |
| 11477 | + bcc_ptr += len; |
| 11478 | + bcc_ptr[0] = 0; /* null terminate the string */ |
| 11479 | + bcc_ptr++; |
| 11480 | + |
| 11481 | + len = strnlen(bcc_ptr, 1024); |
| 11482 | + ses->serverNOS = cifs_kcalloc(len + 1,GFP_KERNEL); |
| 11483 | + strncpy(ses->serverNOS, bcc_ptr, len); |
| 11484 | + bcc_ptr += len; |
| 11485 | + bcc_ptr[0] = 0; |
| 11486 | + bcc_ptr++; |
| 11487 | + |
| 11488 | + len = strnlen(bcc_ptr, 1024); |
| 11489 | + ses->serverDomain = cifs_kcalloc(len + 1, GFP_KERNEL); |
| 11490 | + strncpy(ses->serverDomain, bcc_ptr, len); |
| 11491 | + bcc_ptr += len; |
| 11492 | + bcc_ptr[0] = 0; |
| 11493 | + bcc_ptr++; |
| 11494 | + } else |
| 11495 | + cFYI(1, |
| 11496 | + ("Variable field of length %d extends beyond end of smb ", |
| 11497 | + len)); |
| 11498 | + } |
| 11499 | + } else { |
| 11500 | + cERROR(1, |
| 11501 | + (" Security Blob Length extends beyond end of SMB")); |
| 11502 | + } |
| 11503 | + } else { |
| 11504 | + cERROR(1, ("No session structure passed in.")); |
| 11505 | + } |
| 11506 | + } else { |
| 11507 | + cERROR(1, |
| 11508 | + (" Invalid Word count %d: ", |
| 11509 | + smb_buffer_response->WordCount)); |
| 11510 | + rc = -EIO; |
| 11511 | + } |
| 11512 | + |
| 11513 | + if (smb_buffer) |
| 11514 | + cifs_buf_release(smb_buffer); |
| 11515 | + |
| 11516 | + return rc; |
| 11517 | +} |
| 11518 | + |
| 11519 | +static int |
| 11520 | +CIFSNTLMSSPNegotiateSessSetup(unsigned int xid, |
| 11521 | + struct cifsSesInfo *ses, int * pNTLMv2_flag, |
| 11522 | + const struct nls_table *nls_codepage) |
| 11523 | +{ |
| 11524 | + struct smb_hdr *smb_buffer; |
| 11525 | + struct smb_hdr *smb_buffer_response; |
| 11526 | + SESSION_SETUP_ANDX *pSMB; |
| 11527 | + SESSION_SETUP_ANDX *pSMBr; |
| 11528 | + char *bcc_ptr; |
| 11529 | + char *domain = ses->domainName; |
| 11530 | + int rc = 0; |
| 11531 | + int remaining_words = 0; |
| 11532 | + int bytes_returned = 0; |
| 11533 | + int len; |
| 11534 | + int SecurityBlobLength = sizeof (NEGOTIATE_MESSAGE); |
| 11535 | + PNEGOTIATE_MESSAGE SecurityBlob; |
| 11536 | + PCHALLENGE_MESSAGE SecurityBlob2; |
| 11537 | + |
| 11538 | + cFYI(1, ("In NTLMSSP sesssetup (negotiate) ")); |
| 11539 | + *pNTLMv2_flag = FALSE; |
| 11540 | + smb_buffer = cifs_buf_get(); |
| 11541 | + if (smb_buffer == 0) { |
| 11542 | + return -ENOMEM; |
| 11543 | + } |
| 11544 | + smb_buffer_response = smb_buffer; |
| 11545 | + pSMB = (SESSION_SETUP_ANDX *) smb_buffer; |
| 11546 | + pSMBr = (SESSION_SETUP_ANDX *) smb_buffer_response; |
| 11547 | + |
| 11548 | + /* send SMBsessionSetup here */ |
| 11549 | + header_assemble(smb_buffer, SMB_COM_SESSION_SETUP_ANDX, |
| 11550 | + NULL /* no tCon exists yet */ , 12 /* wct */ ); |
| 11551 | + pSMB->req.hdr.Flags2 |= SMBFLG2_EXT_SEC; |
| 11552 | + pSMB->req.hdr.Flags |= (SMBFLG_CASELESS | SMBFLG_CANONICAL_PATH_FORMAT); |
| 11553 | + |
| 11554 | + pSMB->req.AndXCommand = 0xFF; |
| 11555 | + pSMB->req.MaxBufferSize = cpu_to_le16(ses->server->maxBuf); |
| 11556 | + pSMB->req.MaxMpxCount = cpu_to_le16(ses->server->maxReq); |
| 11557 | + |
| 11558 | + if(ses->server->secMode & (SECMODE_SIGN_REQUIRED | SECMODE_SIGN_ENABLED)) |
| 11559 | + smb_buffer->Flags2 |= SMBFLG2_SECURITY_SIGNATURE; |
| 11560 | + |
| 11561 | + pSMB->req.Capabilities = |
| 11562 | + CAP_LARGE_FILES | CAP_NT_SMBS | CAP_LEVEL_II_OPLOCKS | |
| 11563 | + CAP_EXTENDED_SECURITY; |
| 11564 | + if (ses->capabilities & CAP_UNICODE) { |
| 11565 | + smb_buffer->Flags2 |= SMBFLG2_UNICODE; |
| 11566 | + pSMB->req.Capabilities |= CAP_UNICODE; |
| 11567 | + } |
| 11568 | + if (ses->capabilities & CAP_STATUS32) { |
| 11569 | + smb_buffer->Flags2 |= SMBFLG2_ERR_STATUS; |
| 11570 | + pSMB->req.Capabilities |= CAP_STATUS32; |
| 11571 | + } |
| 11572 | + if (ses->capabilities & CAP_DFS) { |
| 11573 | + smb_buffer->Flags2 |= SMBFLG2_DFS; |
| 11574 | + pSMB->req.Capabilities |= CAP_DFS; |
| 11575 | + } |
| 11576 | + pSMB->req.Capabilities = cpu_to_le32(pSMB->req.Capabilities); |
| 11577 | + |
| 11578 | + bcc_ptr = (char *) &pSMB->req.SecurityBlob; |
| 11579 | + SecurityBlob = (PNEGOTIATE_MESSAGE) bcc_ptr; |
| 11580 | + strncpy(SecurityBlob->Signature, NTLMSSP_SIGNATURE, 8); |
| 11581 | + SecurityBlob->MessageType = NtLmNegotiate; |
| 11582 | + SecurityBlob->NegotiateFlags = |
| 11583 | + NTLMSSP_NEGOTIATE_UNICODE | NTLMSSP_NEGOTIATE_OEM | |
| 11584 | + NTLMSSP_REQUEST_TARGET | NTLMSSP_NEGOTIATE_NTLM | 0x80000000 | |
| 11585 | + /* NTLMSSP_NEGOTIATE_ALWAYS_SIGN | */ NTLMSSP_NEGOTIATE_128; |
| 11586 | + if(sign_CIFS_PDUs) |
| 11587 | + SecurityBlob->NegotiateFlags |= NTLMSSP_NEGOTIATE_SIGN; |
| 11588 | + if(ntlmv2_support) |
| 11589 | + SecurityBlob->NegotiateFlags |= NTLMSSP_NEGOTIATE_NTLMV2; |
| 11590 | + /* setup pointers to domain name and workstation name */ |
| 11591 | + bcc_ptr += SecurityBlobLength; |
| 11592 | + |
| 11593 | + SecurityBlob->WorkstationName.Buffer = 0; |
| 11594 | + SecurityBlob->WorkstationName.Length = 0; |
| 11595 | + SecurityBlob->WorkstationName.MaximumLength = 0; |
| 11596 | + |
| 11597 | + if (domain == NULL) { |
| 11598 | + SecurityBlob->DomainName.Buffer = 0; |
| 11599 | + SecurityBlob->DomainName.Length = 0; |
| 11600 | + SecurityBlob->DomainName.MaximumLength = 0; |
| 11601 | + } else { |
| 11602 | + SecurityBlob->NegotiateFlags |= |
| 11603 | + NTLMSSP_NEGOTIATE_DOMAIN_SUPPLIED; |
| 11604 | + strncpy(bcc_ptr, domain, 63); |
| 11605 | + SecurityBlob->DomainName.Length = strnlen(domain, 64); |
| 11606 | + SecurityBlob->DomainName.MaximumLength = |
| 11607 | + cpu_to_le16(SecurityBlob->DomainName.Length); |
| 11608 | + SecurityBlob->DomainName.Buffer = |
| 11609 | + cpu_to_le32((long) &SecurityBlob-> |
| 11610 | + DomainString - |
| 11611 | + (long) &SecurityBlob->Signature); |
| 11612 | + bcc_ptr += SecurityBlob->DomainName.Length; |
| 11613 | + SecurityBlobLength += SecurityBlob->DomainName.Length; |
| 11614 | + SecurityBlob->DomainName.Length = |
| 11615 | + cpu_to_le16(SecurityBlob->DomainName.Length); |
| 11616 | + } |
| 11617 | + if (ses->capabilities & CAP_UNICODE) { |
| 11618 | + if ((long) bcc_ptr % 2) { |
| 11619 | + *bcc_ptr = 0; |
| 11620 | + bcc_ptr++; |
| 11621 | + } |
| 11622 | + |
| 11623 | + bytes_returned = |
| 11624 | + cifs_strtoUCS((wchar_t *) bcc_ptr, "Linux version ", |
| 11625 | + 32, nls_codepage); |
| 11626 | + bcc_ptr += 2 * bytes_returned; |
| 11627 | + bytes_returned = |
| 11628 | + cifs_strtoUCS((wchar_t *) bcc_ptr, UTS_RELEASE, 32, |
| 11629 | + nls_codepage); |
| 11630 | + bcc_ptr += 2 * bytes_returned; |
| 11631 | + bcc_ptr += 2; /* null terminate Linux version */ |
| 11632 | + bytes_returned = |
| 11633 | + cifs_strtoUCS((wchar_t *) bcc_ptr, CIFS_NETWORK_OPSYS, |
| 11634 | + 64, nls_codepage); |
| 11635 | + bcc_ptr += 2 * bytes_returned; |
| 11636 | + *(bcc_ptr + 1) = 0; |
| 11637 | + *(bcc_ptr + 2) = 0; |
| 11638 | + bcc_ptr += 2; /* null terminate network opsys string */ |
| 11639 | + *(bcc_ptr + 1) = 0; |
| 11640 | + *(bcc_ptr + 2) = 0; |
| 11641 | + bcc_ptr += 2; /* null domain */ |
| 11642 | + } else { /* ASCII */ |
| 11643 | + strcpy(bcc_ptr, "Linux version "); |
| 11644 | + bcc_ptr += strlen("Linux version "); |
| 11645 | + strcpy(bcc_ptr, UTS_RELEASE); |
| 11646 | + bcc_ptr += strlen(UTS_RELEASE) + 1; |
| 11647 | + strcpy(bcc_ptr, CIFS_NETWORK_OPSYS); |
| 11648 | + bcc_ptr += strlen(CIFS_NETWORK_OPSYS) + 1; |
| 11649 | + bcc_ptr++; /* empty domain field */ |
| 11650 | + *bcc_ptr = 0; |
| 11651 | + } |
| 11652 | + SecurityBlob->NegotiateFlags = |
| 11653 | + cpu_to_le32(SecurityBlob->NegotiateFlags); |
| 11654 | + pSMB->req.SecurityBlobLength = cpu_to_le16(SecurityBlobLength); |
| 11655 | + BCC(smb_buffer) = (long) bcc_ptr - (long) pByteArea(smb_buffer); |
| 11656 | + smb_buffer->smb_buf_length += BCC(smb_buffer); |
| 11657 | + BCC(smb_buffer) = cpu_to_le16(BCC(smb_buffer)); |
| 11658 | + |
| 11659 | + rc = SendReceive(xid, ses, smb_buffer, smb_buffer_response, |
| 11660 | + &bytes_returned, 1); |
| 11661 | + |
| 11662 | + if (smb_buffer_response->Status.CifsError == |
| 11663 | + (NT_STATUS_MORE_PROCESSING_REQUIRED)) |
| 11664 | + rc = 0; |
| 11665 | + |
| 11666 | + if (rc) { |
| 11667 | +/* rc = map_smb_to_linux_error(smb_buffer_response); *//* done in SendReceive now */ |
| 11668 | + } else if ((smb_buffer_response->WordCount == 3) |
| 11669 | + || (smb_buffer_response->WordCount == 4)) { |
| 11670 | + pSMBr->resp.Action = le16_to_cpu(pSMBr->resp.Action); |
| 11671 | + pSMBr->resp.SecurityBlobLength = |
| 11672 | + le16_to_cpu(pSMBr->resp.SecurityBlobLength); |
| 11673 | + if (pSMBr->resp.Action & GUEST_LOGIN) |
| 11674 | + cFYI(1, (" Guest login")); |
| 11675 | + /* Do we want to set anything in SesInfo struct when guest login? */ |
| 11676 | + |
| 11677 | + bcc_ptr = pByteArea(smb_buffer_response); |
| 11678 | + /* response can have either 3 or 4 word count - Samba sends 3 */ |
| 11679 | + |
| 11680 | + SecurityBlob2 = (PCHALLENGE_MESSAGE) bcc_ptr; |
| 11681 | + if (SecurityBlob2->MessageType != NtLmChallenge) { |
| 11682 | + cFYI(1, |
| 11683 | + ("Unexpected NTLMSSP message type received %d", |
| 11684 | + SecurityBlob2->MessageType)); |
| 11685 | + } else if (ses) { |
| 11686 | + ses->Suid = smb_buffer_response->Uid; /* UID left in le format */ |
| 11687 | + cFYI(1, ("UID = %d ", ses->Suid)); |
| 11688 | + if ((pSMBr->resp.hdr.WordCount == 3) |
| 11689 | + || ((pSMBr->resp.hdr.WordCount == 4) |
| 11690 | + && (pSMBr->resp.SecurityBlobLength < |
| 11691 | + pSMBr->resp.ByteCount))) { |
| 11692 | + if (pSMBr->resp.hdr.WordCount == 4) { |
| 11693 | + bcc_ptr += |
| 11694 | + pSMBr->resp.SecurityBlobLength; |
| 11695 | + cFYI(1, |
| 11696 | + ("Security Blob Length %d ", |
| 11697 | + pSMBr->resp.SecurityBlobLength)); |
| 11698 | + } |
| 11699 | + |
| 11700 | + cFYI(1, ("NTLMSSP Challenge rcvd ")); |
| 11701 | + |
| 11702 | + memcpy(ses->server->cryptKey, |
| 11703 | + SecurityBlob2->Challenge, |
| 11704 | + CIFS_CRYPTO_KEY_SIZE); |
| 11705 | + if(SecurityBlob2->NegotiateFlags & NTLMSSP_NEGOTIATE_NTLMV2) |
| 11706 | + *pNTLMv2_flag = TRUE; |
| 11707 | + |
| 11708 | + if((SecurityBlob2->NegotiateFlags & |
| 11709 | + NTLMSSP_NEGOTIATE_ALWAYS_SIGN) |
| 11710 | + || (sign_CIFS_PDUs > 1)) |
| 11711 | + ses->server->secMode |= |
| 11712 | + SECMODE_SIGN_REQUIRED; |
| 11713 | + if ((SecurityBlob2->NegotiateFlags & |
| 11714 | + NTLMSSP_NEGOTIATE_SIGN) && (sign_CIFS_PDUs)) |
| 11715 | + ses->server->secMode |= |
| 11716 | + SECMODE_SIGN_ENABLED; |
| 11717 | + |
| 11718 | + if (smb_buffer->Flags2 & SMBFLG2_UNICODE) { |
| 11719 | + if ((long) (bcc_ptr) % 2) { |
| 11720 | + remaining_words = |
| 11721 | + (BCC(smb_buffer_response) |
| 11722 | + - 1) / 2; |
| 11723 | + bcc_ptr++; /* Unicode strings must be word aligned */ |
| 11724 | + } else { |
| 11725 | + remaining_words = |
| 11726 | + BCC |
| 11727 | + (smb_buffer_response) / 2; |
| 11728 | + } |
| 11729 | + len = |
| 11730 | + UniStrnlen((wchar_t *) bcc_ptr, |
| 11731 | + remaining_words - 1); |
| 11732 | +/* We look for obvious messed up bcc or strings in response so we do not go off |
| 11733 | + the end since (at least) WIN2K and Windows XP have a major bug in not null |
| 11734 | + terminating last Unicode string in response */ |
| 11735 | + ses->serverOS = |
| 11736 | + cifs_kcalloc(2 * (len + 1), GFP_KERNEL); |
| 11737 | + cifs_strfromUCS_le(ses->serverOS, |
| 11738 | + (wchar_t *) |
| 11739 | + bcc_ptr, len, |
| 11740 | + nls_codepage); |
| 11741 | + bcc_ptr += 2 * (len + 1); |
| 11742 | + remaining_words -= len + 1; |
| 11743 | + ses->serverOS[2 * len] = 0; |
| 11744 | + ses->serverOS[1 + (2 * len)] = 0; |
| 11745 | + if (remaining_words > 0) { |
| 11746 | + len = UniStrnlen((wchar_t *) |
| 11747 | + bcc_ptr, |
| 11748 | + remaining_words |
| 11749 | + - 1); |
| 11750 | + ses->serverNOS = |
| 11751 | + cifs_kcalloc(2 * (len + 1), |
| 11752 | + GFP_KERNEL); |
| 11753 | + cifs_strfromUCS_le(ses-> |
| 11754 | + serverNOS, |
| 11755 | + (wchar_t *) |
| 11756 | + bcc_ptr, |
| 11757 | + len, |
| 11758 | + nls_codepage); |
| 11759 | + bcc_ptr += 2 * (len + 1); |
| 11760 | + ses->serverNOS[2 * len] = 0; |
| 11761 | + ses->serverNOS[1 + |
| 11762 | + (2 * len)] = 0; |
| 11763 | + remaining_words -= len + 1; |
| 11764 | + if (remaining_words > 0) { |
| 11765 | + len = UniStrnlen((wchar_t *) bcc_ptr, remaining_words); |
| 11766 | + /* last string is not always null terminated (for e.g. for Windows XP & 2000) */ |
| 11767 | + ses->serverDomain = |
| 11768 | + cifs_kcalloc(2 * |
| 11769 | + (len + |
| 11770 | + 1), |
| 11771 | + GFP_KERNEL); |
| 11772 | + cifs_strfromUCS_le |
| 11773 | + (ses-> |
| 11774 | + serverDomain, |
| 11775 | + (wchar_t *) |
| 11776 | + bcc_ptr, len, |
| 11777 | + nls_codepage); |
| 11778 | + bcc_ptr += |
| 11779 | + 2 * (len + 1); |
| 11780 | + ses-> |
| 11781 | + serverDomain[2 |
| 11782 | + * len] |
| 11783 | + = 0; |
| 11784 | + ses-> |
| 11785 | + serverDomain[1 |
| 11786 | + + |
| 11787 | + (2 |
| 11788 | + * |
| 11789 | + len)] |
| 11790 | + = 0; |
| 11791 | + } /* else no more room so create dummy domain string */ |
| 11792 | + else |
| 11793 | + ses->serverDomain = |
| 11794 | + cifs_kcalloc(2, |
| 11795 | + GFP_KERNEL); |
| 11796 | + } else { /* no room so create dummy domain and NOS string */ |
| 11797 | + ses->serverDomain = |
| 11798 | + cifs_kcalloc(2, GFP_KERNEL); |
| 11799 | + ses->serverNOS = |
| 11800 | + cifs_kcalloc(2, GFP_KERNEL); |
| 11801 | + } |
| 11802 | + } else { /* ASCII */ |
| 11803 | + len = strnlen(bcc_ptr, 1024); |
| 11804 | + if (((long) bcc_ptr + len) - (long) |
| 11805 | + pByteArea(smb_buffer_response) |
| 11806 | + <= BCC(smb_buffer_response)) { |
| 11807 | + ses->serverOS = |
| 11808 | + cifs_kcalloc(len + 1, |
| 11809 | + GFP_KERNEL); |
| 11810 | + strncpy(ses->serverOS, |
| 11811 | + bcc_ptr, len); |
| 11812 | + |
| 11813 | + bcc_ptr += len; |
| 11814 | + bcc_ptr[0] = 0; /* null terminate string */ |
| 11815 | + bcc_ptr++; |
| 11816 | + |
| 11817 | + len = strnlen(bcc_ptr, 1024); |
| 11818 | + ses->serverNOS = |
| 11819 | + cifs_kcalloc(len + 1, |
| 11820 | + GFP_KERNEL); |
| 11821 | + strncpy(ses->serverNOS, bcc_ptr, len); |
| 11822 | + bcc_ptr += len; |
| 11823 | + bcc_ptr[0] = 0; |
| 11824 | + bcc_ptr++; |
| 11825 | + |
| 11826 | + len = strnlen(bcc_ptr, 1024); |
| 11827 | + ses->serverDomain = |
| 11828 | + cifs_kcalloc(len + 1, |
| 11829 | + GFP_KERNEL); |
| 11830 | + strncpy(ses->serverDomain, bcc_ptr, len); |
| 11831 | + bcc_ptr += len; |
| 11832 | + bcc_ptr[0] = 0; |
| 11833 | + bcc_ptr++; |
| 11834 | + } else |
| 11835 | + cFYI(1, |
| 11836 | + ("Variable field of length %d extends beyond end of smb ", |
| 11837 | + len)); |
| 11838 | + } |
| 11839 | + } else { |
| 11840 | + cERROR(1, |
| 11841 | + (" Security Blob Length extends beyond end of SMB")); |
| 11842 | + } |
| 11843 | + } else { |
| 11844 | + cERROR(1, ("No session structure passed in.")); |
| 11845 | + } |
| 11846 | + } else { |
| 11847 | + cERROR(1, |
| 11848 | + (" Invalid Word count %d: ", |
| 11849 | + smb_buffer_response->WordCount)); |
| 11850 | + rc = -EIO; |
| 11851 | + } |
| 11852 | + |
| 11853 | + if (smb_buffer) |
| 11854 | + cifs_buf_release(smb_buffer); |
| 11855 | + |
| 11856 | + return rc; |
| 11857 | +} |
| 11858 | + |
| 11859 | +static int |
| 11860 | +CIFSNTLMSSPAuthSessSetup(unsigned int xid, struct cifsSesInfo *ses, |
| 11861 | + char *ntlm_session_key, int ntlmv2_flag, |
| 11862 | + const struct nls_table *nls_codepage) |
| 11863 | +{ |
| 11864 | + struct smb_hdr *smb_buffer; |
| 11865 | + struct smb_hdr *smb_buffer_response; |
| 11866 | + SESSION_SETUP_ANDX *pSMB; |
| 11867 | + SESSION_SETUP_ANDX *pSMBr; |
| 11868 | + char *bcc_ptr; |
| 11869 | + char *user = ses->userName; |
| 11870 | + char *domain = ses->domainName; |
| 11871 | + int rc = 0; |
| 11872 | + int remaining_words = 0; |
| 11873 | + int bytes_returned = 0; |
| 11874 | + int len; |
| 11875 | + int SecurityBlobLength = sizeof (AUTHENTICATE_MESSAGE); |
| 11876 | + PAUTHENTICATE_MESSAGE SecurityBlob; |
| 11877 | + |
| 11878 | + cFYI(1, ("In NTLMSSPSessSetup (Authenticate)")); |
| 11879 | + |
| 11880 | + smb_buffer = cifs_buf_get(); |
| 11881 | + if (smb_buffer == 0) { |
| 11882 | + return -ENOMEM; |
| 11883 | + } |
| 11884 | + smb_buffer_response = smb_buffer; |
| 11885 | + pSMB = (SESSION_SETUP_ANDX *) smb_buffer; |
| 11886 | + pSMBr = (SESSION_SETUP_ANDX *) smb_buffer_response; |
| 11887 | + |
| 11888 | + /* send SMBsessionSetup here */ |
| 11889 | + header_assemble(smb_buffer, SMB_COM_SESSION_SETUP_ANDX, |
| 11890 | + NULL /* no tCon exists yet */ , 12 /* wct */ ); |
| 11891 | + pSMB->req.hdr.Flags |= (SMBFLG_CASELESS | SMBFLG_CANONICAL_PATH_FORMAT); |
| 11892 | + pSMB->req.hdr.Flags2 |= SMBFLG2_EXT_SEC; |
| 11893 | + pSMB->req.AndXCommand = 0xFF; |
| 11894 | + pSMB->req.MaxBufferSize = cpu_to_le16(ses->server->maxBuf); |
| 11895 | + pSMB->req.MaxMpxCount = cpu_to_le16(ses->server->maxReq); |
| 11896 | + |
| 11897 | + pSMB->req.hdr.Uid = ses->Suid; |
| 11898 | + |
| 11899 | + if(ses->server->secMode & (SECMODE_SIGN_REQUIRED | SECMODE_SIGN_ENABLED)) |
| 11900 | + smb_buffer->Flags2 |= SMBFLG2_SECURITY_SIGNATURE; |
| 11901 | + |
| 11902 | + pSMB->req.Capabilities = |
| 11903 | + CAP_LARGE_FILES | CAP_NT_SMBS | CAP_LEVEL_II_OPLOCKS | |
| 11904 | + CAP_EXTENDED_SECURITY; |
| 11905 | + if (ses->capabilities & CAP_UNICODE) { |
| 11906 | + smb_buffer->Flags2 |= SMBFLG2_UNICODE; |
| 11907 | + pSMB->req.Capabilities |= CAP_UNICODE; |
| 11908 | + } |
| 11909 | + if (ses->capabilities & CAP_STATUS32) { |
| 11910 | + smb_buffer->Flags2 |= SMBFLG2_ERR_STATUS; |
| 11911 | + pSMB->req.Capabilities |= CAP_STATUS32; |
| 11912 | + } |
| 11913 | + if (ses->capabilities & CAP_DFS) { |
| 11914 | + smb_buffer->Flags2 |= SMBFLG2_DFS; |
| 11915 | + pSMB->req.Capabilities |= CAP_DFS; |
| 11916 | + } |
| 11917 | + pSMB->req.Capabilities = cpu_to_le32(pSMB->req.Capabilities); |
| 11918 | + |
| 11919 | + bcc_ptr = (char *) &pSMB->req.SecurityBlob; |
| 11920 | + SecurityBlob = (PAUTHENTICATE_MESSAGE) bcc_ptr; |
| 11921 | + strncpy(SecurityBlob->Signature, NTLMSSP_SIGNATURE, 8); |
| 11922 | + SecurityBlob->MessageType = NtLmAuthenticate; |
| 11923 | + bcc_ptr += SecurityBlobLength; |
| 11924 | + SecurityBlob->NegotiateFlags = |
| 11925 | + NTLMSSP_NEGOTIATE_UNICODE | NTLMSSP_REQUEST_TARGET | |
| 11926 | + NTLMSSP_NEGOTIATE_NTLM | NTLMSSP_NEGOTIATE_TARGET_INFO | |
| 11927 | + 0x80000000 | NTLMSSP_NEGOTIATE_128; |
| 11928 | + if(sign_CIFS_PDUs) |
| 11929 | + SecurityBlob->NegotiateFlags |= /* NTLMSSP_NEGOTIATE_ALWAYS_SIGN |*/ NTLMSSP_NEGOTIATE_SIGN; |
| 11930 | + if(ntlmv2_flag) |
| 11931 | + SecurityBlob->NegotiateFlags |= NTLMSSP_NEGOTIATE_NTLMV2; |
| 11932 | + |
| 11933 | +/* setup pointers to domain name and workstation name */ |
| 11934 | + |
| 11935 | + SecurityBlob->WorkstationName.Buffer = 0; |
| 11936 | + SecurityBlob->WorkstationName.Length = 0; |
| 11937 | + SecurityBlob->WorkstationName.MaximumLength = 0; |
| 11938 | + SecurityBlob->SessionKey.Length = 0; |
| 11939 | + SecurityBlob->SessionKey.MaximumLength = 0; |
| 11940 | + SecurityBlob->SessionKey.Buffer = 0; |
| 11941 | + |
| 11942 | + SecurityBlob->LmChallengeResponse.Length = 0; |
| 11943 | + SecurityBlob->LmChallengeResponse.MaximumLength = 0; |
| 11944 | + SecurityBlob->LmChallengeResponse.Buffer = 0; |
| 11945 | + |
| 11946 | + SecurityBlob->NtChallengeResponse.Length = |
| 11947 | + cpu_to_le16(CIFS_SESSION_KEY_SIZE); |
| 11948 | + SecurityBlob->NtChallengeResponse.MaximumLength = |
| 11949 | + cpu_to_le16(CIFS_SESSION_KEY_SIZE); |
| 11950 | + memcpy(bcc_ptr, ntlm_session_key, CIFS_SESSION_KEY_SIZE); |
| 11951 | + SecurityBlob->NtChallengeResponse.Buffer = |
| 11952 | + cpu_to_le32(SecurityBlobLength); |
| 11953 | + SecurityBlobLength += CIFS_SESSION_KEY_SIZE; |
| 11954 | + bcc_ptr += CIFS_SESSION_KEY_SIZE; |
| 11955 | + |
| 11956 | + if (ses->capabilities & CAP_UNICODE) { |
| 11957 | + if (domain == NULL) { |
| 11958 | + SecurityBlob->DomainName.Buffer = 0; |
| 11959 | + SecurityBlob->DomainName.Length = 0; |
| 11960 | + SecurityBlob->DomainName.MaximumLength = 0; |
| 11961 | + } else { |
| 11962 | + SecurityBlob->DomainName.Length = |
| 11963 | + cifs_strtoUCS((wchar_t *) bcc_ptr, domain, 64, |
| 11964 | + nls_codepage); |
| 11965 | + SecurityBlob->DomainName.Length *= 2; |
| 11966 | + SecurityBlob->DomainName.MaximumLength = |
| 11967 | + cpu_to_le16(SecurityBlob->DomainName.Length); |
| 11968 | + SecurityBlob->DomainName.Buffer = |
| 11969 | + cpu_to_le32(SecurityBlobLength); |
| 11970 | + bcc_ptr += SecurityBlob->DomainName.Length; |
| 11971 | + SecurityBlobLength += SecurityBlob->DomainName.Length; |
| 11972 | + SecurityBlob->DomainName.Length = |
| 11973 | + cpu_to_le16(SecurityBlob->DomainName.Length); |
| 11974 | + } |
| 11975 | + if (user == NULL) { |
| 11976 | + SecurityBlob->UserName.Buffer = 0; |
| 11977 | + SecurityBlob->UserName.Length = 0; |
| 11978 | + SecurityBlob->UserName.MaximumLength = 0; |
| 11979 | + } else { |
| 11980 | + SecurityBlob->UserName.Length = |
| 11981 | + cifs_strtoUCS((wchar_t *) bcc_ptr, user, 64, |
| 11982 | + nls_codepage); |
| 11983 | + SecurityBlob->UserName.Length *= 2; |
| 11984 | + SecurityBlob->UserName.MaximumLength = |
| 11985 | + cpu_to_le16(SecurityBlob->UserName.Length); |
| 11986 | + SecurityBlob->UserName.Buffer = |
| 11987 | + cpu_to_le32(SecurityBlobLength); |
| 11988 | + bcc_ptr += SecurityBlob->UserName.Length; |
| 11989 | + SecurityBlobLength += SecurityBlob->UserName.Length; |
| 11990 | + SecurityBlob->UserName.Length = |
| 11991 | + cpu_to_le16(SecurityBlob->UserName.Length); |
| 11992 | + } |
| 11993 | + |
| 11994 | + /* SecurityBlob->WorkstationName.Length = cifs_strtoUCS((wchar_t *) bcc_ptr, "AMACHINE",64, nls_codepage); |
| 11995 | + SecurityBlob->WorkstationName.Length *= 2; |
| 11996 | + SecurityBlob->WorkstationName.MaximumLength = cpu_to_le16(SecurityBlob->WorkstationName.Length); |
| 11997 | + SecurityBlob->WorkstationName.Buffer = cpu_to_le32(SecurityBlobLength); |
| 11998 | + bcc_ptr += SecurityBlob->WorkstationName.Length; |
| 11999 | + SecurityBlobLength += SecurityBlob->WorkstationName.Length; |
| 12000 | + SecurityBlob->WorkstationName.Length = cpu_to_le16(SecurityBlob->WorkstationName.Length); */ |
| 12001 | + |
| 12002 | + if ((long) bcc_ptr % 2) { |
| 12003 | + *bcc_ptr = 0; |
| 12004 | + bcc_ptr++; |
| 12005 | + } |
| 12006 | + bytes_returned = |
| 12007 | + cifs_strtoUCS((wchar_t *) bcc_ptr, "Linux version ", |
| 12008 | + 32, nls_codepage); |
| 12009 | + bcc_ptr += 2 * bytes_returned; |
| 12010 | + bytes_returned = |
| 12011 | + cifs_strtoUCS((wchar_t *) bcc_ptr, UTS_RELEASE, 32, |
| 12012 | + nls_codepage); |
| 12013 | + bcc_ptr += 2 * bytes_returned; |
| 12014 | + bcc_ptr += 2; /* null term version string */ |
| 12015 | + bytes_returned = |
| 12016 | + cifs_strtoUCS((wchar_t *) bcc_ptr, CIFS_NETWORK_OPSYS, |
| 12017 | + 64, nls_codepage); |
| 12018 | + bcc_ptr += 2 * bytes_returned; |
| 12019 | + *(bcc_ptr + 1) = 0; |
| 12020 | + *(bcc_ptr + 2) = 0; |
| 12021 | + bcc_ptr += 2; /* null terminate network opsys string */ |
| 12022 | + *(bcc_ptr + 1) = 0; |
| 12023 | + *(bcc_ptr + 2) = 0; |
| 12024 | + bcc_ptr += 2; /* null domain */ |
| 12025 | + } else { /* ASCII */ |
| 12026 | + if (domain == NULL) { |
| 12027 | + SecurityBlob->DomainName.Buffer = 0; |
| 12028 | + SecurityBlob->DomainName.Length = 0; |
| 12029 | + SecurityBlob->DomainName.MaximumLength = 0; |
| 12030 | + } else { |
| 12031 | + SecurityBlob->NegotiateFlags |= |
| 12032 | + NTLMSSP_NEGOTIATE_DOMAIN_SUPPLIED; |
| 12033 | + strncpy(bcc_ptr, domain, 63); |
| 12034 | + SecurityBlob->DomainName.Length = strnlen(domain, 64); |
| 12035 | + SecurityBlob->DomainName.MaximumLength = |
| 12036 | + cpu_to_le16(SecurityBlob->DomainName.Length); |
| 12037 | + SecurityBlob->DomainName.Buffer = |
| 12038 | + cpu_to_le32(SecurityBlobLength); |
| 12039 | + bcc_ptr += SecurityBlob->DomainName.Length; |
| 12040 | + SecurityBlobLength += SecurityBlob->DomainName.Length; |
| 12041 | + SecurityBlob->DomainName.Length = |
| 12042 | + cpu_to_le16(SecurityBlob->DomainName.Length); |
| 12043 | + } |
| 12044 | + if (user == NULL) { |
| 12045 | + SecurityBlob->UserName.Buffer = 0; |
| 12046 | + SecurityBlob->UserName.Length = 0; |
| 12047 | + SecurityBlob->UserName.MaximumLength = 0; |
| 12048 | + } else { |
| 12049 | + strncpy(bcc_ptr, user, 63); |
| 12050 | + SecurityBlob->UserName.Length = strnlen(user, 64); |
| 12051 | + SecurityBlob->UserName.MaximumLength = |
| 12052 | + cpu_to_le16(SecurityBlob->UserName.Length); |
| 12053 | + SecurityBlob->UserName.Buffer = |
| 12054 | + cpu_to_le32(SecurityBlobLength); |
| 12055 | + bcc_ptr += SecurityBlob->UserName.Length; |
| 12056 | + SecurityBlobLength += SecurityBlob->UserName.Length; |
| 12057 | + SecurityBlob->UserName.Length = |
| 12058 | + cpu_to_le16(SecurityBlob->UserName.Length); |
| 12059 | + } |
| 12060 | + /* BB fill in our workstation name if known BB */ |
| 12061 | + |
| 12062 | + strcpy(bcc_ptr, "Linux version "); |
| 12063 | + bcc_ptr += strlen("Linux version "); |
| 12064 | + strcpy(bcc_ptr, UTS_RELEASE); |
| 12065 | + bcc_ptr += strlen(UTS_RELEASE) + 1; |
| 12066 | + strcpy(bcc_ptr, CIFS_NETWORK_OPSYS); |
| 12067 | + bcc_ptr += strlen(CIFS_NETWORK_OPSYS) + 1; |
| 12068 | + bcc_ptr++; /* null domain */ |
| 12069 | + *bcc_ptr = 0; |
| 12070 | + } |
| 12071 | + SecurityBlob->NegotiateFlags = |
| 12072 | + cpu_to_le32(SecurityBlob->NegotiateFlags); |
| 12073 | + pSMB->req.SecurityBlobLength = cpu_to_le16(SecurityBlobLength); |
| 12074 | + BCC(smb_buffer) = (long) bcc_ptr - (long) pByteArea(smb_buffer); |
| 12075 | + smb_buffer->smb_buf_length += BCC(smb_buffer); |
| 12076 | + BCC(smb_buffer) = cpu_to_le16(BCC(smb_buffer)); |
| 12077 | + |
| 12078 | + rc = SendReceive(xid, ses, smb_buffer, smb_buffer_response, |
| 12079 | + &bytes_returned, 1); |
| 12080 | + if (rc) { |
| 12081 | +/* rc = map_smb_to_linux_error(smb_buffer_response); *//* done in SendReceive now */ |
| 12082 | + } else if ((smb_buffer_response->WordCount == 3) |
| 12083 | + || (smb_buffer_response->WordCount == 4)) { |
| 12084 | + pSMBr->resp.Action = le16_to_cpu(pSMBr->resp.Action); |
| 12085 | + pSMBr->resp.SecurityBlobLength = |
| 12086 | + le16_to_cpu(pSMBr->resp.SecurityBlobLength); |
| 12087 | + if (pSMBr->resp.Action & GUEST_LOGIN) |
| 12088 | + cFYI(1, (" Guest login")); /* BB do we want to set anything in SesInfo struct ? */ |
| 12089 | +/* if(SecurityBlob2->MessageType != NtLm??){ |
| 12090 | + cFYI("Unexpected message type on auth response is %d ")); |
| 12091 | + } */ |
| 12092 | + if (ses) { |
| 12093 | + cFYI(1, |
| 12094 | + ("Does UID on challenge %d match auth response UID %d ", |
| 12095 | + ses->Suid, smb_buffer_response->Uid)); |
| 12096 | + ses->Suid = smb_buffer_response->Uid; /* UID left in wire format */ |
| 12097 | + bcc_ptr = pByteArea(smb_buffer_response); |
| 12098 | + /* response can have either 3 or 4 word count - Samba sends 3 */ |
| 12099 | + if ((pSMBr->resp.hdr.WordCount == 3) |
| 12100 | + || ((pSMBr->resp.hdr.WordCount == 4) |
| 12101 | + && (pSMBr->resp.SecurityBlobLength < |
| 12102 | + pSMBr->resp.ByteCount))) { |
| 12103 | + if (pSMBr->resp.hdr.WordCount == 4) { |
| 12104 | + bcc_ptr += |
| 12105 | + pSMBr->resp.SecurityBlobLength; |
| 12106 | + cFYI(1, |
| 12107 | + ("Security Blob Length %d ", |
| 12108 | + pSMBr->resp.SecurityBlobLength)); |
| 12109 | + } |
| 12110 | + |
| 12111 | + cFYI(1, |
| 12112 | + ("NTLMSSP response to Authenticate ")); |
| 12113 | + |
| 12114 | + if (smb_buffer->Flags2 & SMBFLG2_UNICODE) { |
| 12115 | + if ((long) (bcc_ptr) % 2) { |
| 12116 | + remaining_words = |
| 12117 | + (BCC(smb_buffer_response) |
| 12118 | + - 1) / 2; |
| 12119 | + bcc_ptr++; /* Unicode strings must be word aligned */ |
| 12120 | + } else { |
| 12121 | + remaining_words = BCC(smb_buffer_response) / 2; |
| 12122 | + } |
| 12123 | + len = |
| 12124 | + UniStrnlen((wchar_t *) bcc_ptr,remaining_words - 1); |
| 12125 | +/* We look for obvious messed up bcc or strings in response so we do not go off |
| 12126 | + the end since (at least) WIN2K and Windows XP have a major bug in not null |
| 12127 | + terminating last Unicode string in response */ |
| 12128 | + ses->serverOS = |
| 12129 | + cifs_kcalloc(2 * (len + 1), GFP_KERNEL); |
| 12130 | + cifs_strfromUCS_le(ses->serverOS, |
| 12131 | + (wchar_t *) |
| 12132 | + bcc_ptr, len, |
| 12133 | + nls_codepage); |
| 12134 | + bcc_ptr += 2 * (len + 1); |
| 12135 | + remaining_words -= len + 1; |
| 12136 | + ses->serverOS[2 * len] = 0; |
| 12137 | + ses->serverOS[1 + (2 * len)] = 0; |
| 12138 | + if (remaining_words > 0) { |
| 12139 | + len = UniStrnlen((wchar_t *) |
| 12140 | + bcc_ptr, |
| 12141 | + remaining_words |
| 12142 | + - 1); |
| 12143 | + ses->serverNOS = |
| 12144 | + cifs_kcalloc(2 * (len + 1), |
| 12145 | + GFP_KERNEL); |
| 12146 | + cifs_strfromUCS_le(ses-> |
| 12147 | + serverNOS, |
| 12148 | + (wchar_t *) |
| 12149 | + bcc_ptr, |
| 12150 | + len, |
| 12151 | + nls_codepage); |
| 12152 | + bcc_ptr += 2 * (len + 1); |
| 12153 | + ses->serverNOS[2 * len] = 0; |
| 12154 | + ses->serverNOS[1+(2*len)] = 0; |
| 12155 | + remaining_words -= len + 1; |
| 12156 | + if (remaining_words > 0) { |
| 12157 | + len = UniStrnlen((wchar_t *) bcc_ptr, remaining_words); |
| 12158 | + /* last string not always null terminated (e.g. for Windows XP & 2000) */ |
| 12159 | + ses->serverDomain = |
| 12160 | + cifs_kcalloc(2 * |
| 12161 | + (len + |
| 12162 | + 1), |
| 12163 | + GFP_KERNEL); |
| 12164 | + cifs_strfromUCS_le |
| 12165 | + (ses-> |
| 12166 | + serverDomain, |
| 12167 | + (wchar_t *) |
| 12168 | + bcc_ptr, len, |
| 12169 | + nls_codepage); |
| 12170 | + bcc_ptr += |
| 12171 | + 2 * (len + 1); |
| 12172 | + ses-> |
| 12173 | + serverDomain[2 |
| 12174 | + * len] |
| 12175 | + = 0; |
| 12176 | + ses-> |
| 12177 | + serverDomain[1 |
| 12178 | + + |
| 12179 | + (2 |
| 12180 | + * |
| 12181 | + len)] |
| 12182 | + = 0; |
| 12183 | + } /* else no more room so create dummy domain string */ |
| 12184 | + else |
| 12185 | + ses->serverDomain = cifs_kcalloc(2,GFP_KERNEL); |
| 12186 | + } else { /* no room so create dummy domain and NOS string */ |
| 12187 | + ses->serverDomain = cifs_kcalloc(2, GFP_KERNEL); |
| 12188 | + ses->serverNOS = cifs_kcalloc(2, GFP_KERNEL); |
| 12189 | + } |
| 12190 | + } else { /* ASCII */ |
| 12191 | + len = strnlen(bcc_ptr, 1024); |
| 12192 | + if (((long) bcc_ptr + len) - |
| 12193 | + (long) pByteArea(smb_buffer_response) |
| 12194 | + <= BCC(smb_buffer_response)) { |
| 12195 | + ses->serverOS = cifs_kcalloc(len + 1,GFP_KERNEL); |
| 12196 | + strncpy(ses->serverOS,bcc_ptr, len); |
| 12197 | + |
| 12198 | + bcc_ptr += len; |
| 12199 | + bcc_ptr[0] = 0; /* null terminate the string */ |
| 12200 | + bcc_ptr++; |
| 12201 | + |
| 12202 | + len = strnlen(bcc_ptr, 1024); |
| 12203 | + ses->serverNOS = cifs_kcalloc(len+1,GFP_KERNEL); |
| 12204 | + strncpy(ses->serverNOS, bcc_ptr, len); |
| 12205 | + bcc_ptr += len; |
| 12206 | + bcc_ptr[0] = 0; |
| 12207 | + bcc_ptr++; |
| 12208 | + |
| 12209 | + len = strnlen(bcc_ptr, 1024); |
| 12210 | + ses->serverDomain = cifs_kcalloc(len+1,GFP_KERNEL); |
| 12211 | + strncpy(ses->serverDomain, bcc_ptr, len); |
| 12212 | + bcc_ptr += len; |
| 12213 | + bcc_ptr[0] = 0; |
| 12214 | + bcc_ptr++; |
| 12215 | + } else |
| 12216 | + cFYI(1, |
| 12217 | + ("Variable field of length %d extends beyond end of smb ", |
| 12218 | + len)); |
| 12219 | + } |
| 12220 | + } else { |
| 12221 | + cERROR(1, |
| 12222 | + (" Security Blob Length extends beyond end of SMB")); |
| 12223 | + } |
| 12224 | + } else { |
| 12225 | + cERROR(1, ("No session structure passed in.")); |
| 12226 | + } |
| 12227 | + } else { |
| 12228 | + cERROR(1, |
| 12229 | + (" Invalid Word count %d: ", |
| 12230 | + smb_buffer_response->WordCount)); |
| 12231 | + rc = -EIO; |
| 12232 | + } |
| 12233 | + |
| 12234 | + if (smb_buffer) |
| 12235 | + cifs_buf_release(smb_buffer); |
| 12236 | + |
| 12237 | + return rc; |
| 12238 | +} |
| 12239 | + |
| 12240 | +int |
| 12241 | +CIFSTCon(unsigned int xid, struct cifsSesInfo *ses, |
| 12242 | + const char *tree, struct cifsTconInfo *tcon, |
| 12243 | + const struct nls_table *nls_codepage) |
| 12244 | +{ |
| 12245 | + struct smb_hdr *smb_buffer; |
| 12246 | + struct smb_hdr *smb_buffer_response; |
| 12247 | + TCONX_REQ *pSMB; |
| 12248 | + TCONX_RSP *pSMBr; |
| 12249 | + char *bcc_ptr; |
| 12250 | + int rc = 0; |
| 12251 | + int length; |
| 12252 | + |
| 12253 | + if (ses == NULL) |
| 12254 | + return -EIO; |
| 12255 | + |
| 12256 | + smb_buffer = cifs_buf_get(); |
| 12257 | + if (smb_buffer == 0) { |
| 12258 | + return -ENOMEM; |
| 12259 | + } |
| 12260 | + smb_buffer_response = smb_buffer; |
| 12261 | + |
| 12262 | + header_assemble(smb_buffer, SMB_COM_TREE_CONNECT_ANDX, |
| 12263 | + NULL /*no tid */ , 4 /*wct */ ); |
| 12264 | + smb_buffer->Uid = ses->Suid; |
| 12265 | + pSMB = (TCONX_REQ *) smb_buffer; |
| 12266 | + pSMBr = (TCONX_RSP *) smb_buffer_response; |
| 12267 | + |
| 12268 | + pSMB->AndXCommand = 0xFF; |
| 12269 | + pSMB->Flags = cpu_to_le16(TCON_EXTENDED_SECINFO); |
| 12270 | + pSMB->PasswordLength = cpu_to_le16(1); /* minimum */ |
| 12271 | + bcc_ptr = &(pSMB->Password[0]); |
| 12272 | + bcc_ptr++; /* skip password */ |
| 12273 | + |
| 12274 | + if(ses->server->secMode & (SECMODE_SIGN_REQUIRED | SECMODE_SIGN_ENABLED)) |
| 12275 | + smb_buffer->Flags2 |= SMBFLG2_SECURITY_SIGNATURE; |
| 12276 | + |
| 12277 | + if (ses->capabilities & CAP_STATUS32) { |
| 12278 | + smb_buffer->Flags2 |= SMBFLG2_ERR_STATUS; |
| 12279 | + } |
| 12280 | + if (ses->capabilities & CAP_DFS) { |
| 12281 | + smb_buffer->Flags2 |= SMBFLG2_DFS; |
| 12282 | + } |
| 12283 | + if (ses->capabilities & CAP_UNICODE) { |
| 12284 | + smb_buffer->Flags2 |= SMBFLG2_UNICODE; |
| 12285 | + length = |
| 12286 | + cifs_strtoUCS((wchar_t *) bcc_ptr, tree, 100, nls_codepage); |
| 12287 | + bcc_ptr += 2 * length; /* convert num of 16 bit words to bytes */ |
| 12288 | + bcc_ptr += 2; /* skip trailing null */ |
| 12289 | + } else { /* ASCII */ |
| 12290 | + |
| 12291 | + strcpy(bcc_ptr, tree); |
| 12292 | + bcc_ptr += strlen(tree) + 1; |
| 12293 | + } |
| 12294 | + strcpy(bcc_ptr, "?????"); |
| 12295 | + bcc_ptr += strlen("?????"); |
| 12296 | + bcc_ptr += 1; |
| 12297 | + BCC(smb_buffer) = (long) bcc_ptr - (long) pByteArea(smb_buffer); |
| 12298 | + smb_buffer->smb_buf_length += BCC(smb_buffer); |
| 12299 | + BCC(smb_buffer) = cpu_to_le16(BCC(smb_buffer)); |
| 12300 | + |
| 12301 | + rc = SendReceive(xid, ses, smb_buffer, smb_buffer_response, &length, 0); |
| 12302 | + |
| 12303 | + /* if (rc) rc = map_smb_to_linux_error(smb_buffer_response); */ |
| 12304 | + /* above now done in SendReceive */ |
| 12305 | + if ((rc == 0) && (tcon != NULL)) { |
| 12306 | + tcon->tidStatus = CifsGood; |
| 12307 | + tcon->tid = smb_buffer_response->Tid; |
| 12308 | + bcc_ptr = pByteArea(smb_buffer_response); |
| 12309 | + length = strnlen(bcc_ptr, BCC(smb_buffer_response) - 2); |
| 12310 | + /* skip service field (NB: this field is always ASCII) */ |
| 12311 | + bcc_ptr += length + 1; |
| 12312 | + strncpy(tcon->treeName, tree, MAX_TREE_SIZE); |
| 12313 | + if (smb_buffer->Flags2 & SMBFLG2_UNICODE) { |
| 12314 | + length = UniStrnlen((wchar_t *) bcc_ptr, 512); |
| 12315 | + if (((long) bcc_ptr + (2 * length)) - |
| 12316 | + (long) pByteArea(smb_buffer_response) <= |
| 12317 | + BCC(smb_buffer_response)) { |
| 12318 | + if(tcon->nativeFileSystem) |
| 12319 | + kfree(tcon->nativeFileSystem); |
| 12320 | + tcon->nativeFileSystem = |
| 12321 | + cifs_kcalloc(length + 2, GFP_KERNEL); |
| 12322 | + cifs_strfromUCS_le(tcon->nativeFileSystem, |
| 12323 | + (wchar_t *) bcc_ptr, |
| 12324 | + length, nls_codepage); |
| 12325 | + bcc_ptr += 2 * length; |
| 12326 | + bcc_ptr[0] = 0; /* null terminate the string */ |
| 12327 | + bcc_ptr[1] = 0; |
| 12328 | + bcc_ptr += 2; |
| 12329 | + } |
| 12330 | + /* else do not bother copying these informational fields */ |
| 12331 | + } else { |
| 12332 | + length = strnlen(bcc_ptr, 1024); |
| 12333 | + if (((long) bcc_ptr + length) - |
| 12334 | + (long) pByteArea(smb_buffer_response) <= |
| 12335 | + BCC(smb_buffer_response)) { |
| 12336 | + if(tcon->nativeFileSystem) |
| 12337 | + kfree(tcon->nativeFileSystem); |
| 12338 | + tcon->nativeFileSystem = |
| 12339 | + cifs_kcalloc(length + 1, GFP_KERNEL); |
| 12340 | + strncpy(tcon->nativeFileSystem, bcc_ptr, |
| 12341 | + length); |
| 12342 | + } |
| 12343 | + /* else do not bother copying these informational fields */ |
| 12344 | + } |
| 12345 | + tcon->Flags = le16_to_cpu(pSMBr->OptionalSupport); |
| 12346 | + cFYI(1, ("Tcon flags: 0x%x ", tcon->Flags)); |
| 12347 | + } else if ((rc == 0) && tcon == NULL) { |
| 12348 | + /* all we need to save for IPC$ connection */ |
| 12349 | + ses->ipc_tid = smb_buffer_response->Tid; |
| 12350 | + } |
| 12351 | + |
| 12352 | + if (smb_buffer) |
| 12353 | + cifs_buf_release(smb_buffer); |
| 12354 | + return rc; |
| 12355 | +} |
| 12356 | + |
| 12357 | +int |
| 12358 | +cifs_umount(struct super_block *sb, struct cifs_sb_info *cifs_sb) |
| 12359 | +{ |
| 12360 | + int rc = 0; |
| 12361 | + int xid; |
| 12362 | + struct cifsSesInfo *ses = NULL; |
| 12363 | + struct task_struct *cifsd_task; |
| 12364 | + |
| 12365 | + xid = GetXid(); |
| 12366 | + |
| 12367 | + if (cifs_sb->tcon) { |
| 12368 | + ses = cifs_sb->tcon->ses; /* save ptr to ses before delete tcon!*/ |
| 12369 | + rc = CIFSSMBTDis(xid, cifs_sb->tcon); |
| 12370 | + if (rc == -EBUSY) { |
| 12371 | + FreeXid(xid); |
| 12372 | + return 0; |
| 12373 | + } |
| 12374 | + tconInfoFree(cifs_sb->tcon); |
| 12375 | + if ((ses) && (ses->server)) { |
| 12376 | + /* save off task so we do not refer to ses later */ |
| 12377 | + cifsd_task = ses->server->tsk; |
| 12378 | + cFYI(1, ("About to do SMBLogoff ")); |
| 12379 | + rc = CIFSSMBLogoff(xid, ses); |
| 12380 | + if (rc == -EBUSY) { |
| 12381 | + FreeXid(xid); |
| 12382 | + return 0; |
| 12383 | + } else if (rc == -ESHUTDOWN) { |
| 12384 | + cFYI(1,("Waking up socket by sending it signal")); |
| 12385 | + send_sig(SIGKILL,cifsd_task,1); |
| 12386 | + rc = 0; |
| 12387 | + } /* else - we have an smb session |
| 12388 | + left on this socket do not kill cifsd */ |
| 12389 | + } else |
| 12390 | + cFYI(1, ("No session or bad tcon")); |
| 12391 | + } |
| 12392 | + |
| 12393 | + cifs_sb->tcon = NULL; |
| 12394 | + if (ses) { |
| 12395 | + set_current_state(TASK_INTERRUPTIBLE); |
| 12396 | + schedule_timeout(HZ / 2); |
| 12397 | + } |
| 12398 | + if (ses) |
| 12399 | + sesInfoFree(ses); |
| 12400 | + |
| 12401 | + FreeXid(xid); |
| 12402 | + return rc; /* BB check if we should always return zero here */ |
| 12403 | +} |
| 12404 | + |
| 12405 | +int cifs_setup_session(unsigned int xid, struct cifsSesInfo *pSesInfo, |
| 12406 | + struct nls_table * nls_info) |
| 12407 | +{ |
| 12408 | + int rc = 0; |
| 12409 | + char ntlm_session_key[CIFS_SESSION_KEY_SIZE]; |
| 12410 | + int ntlmv2_flag = FALSE; |
| 12411 | + |
| 12412 | + /* what if server changes its buffer size after dropping the session? */ |
| 12413 | + if(pSesInfo->server->maxBuf == 0) /* no need to send on reconnect */ { |
| 12414 | + rc = CIFSSMBNegotiate(xid, pSesInfo); |
| 12415 | + if(rc == -EAGAIN) /* retry only once on 1st time connection */ { |
| 12416 | + rc = CIFSSMBNegotiate(xid, pSesInfo); |
| 12417 | + if(rc == -EAGAIN) |
| 12418 | + rc = -EHOSTDOWN; |
| 12419 | + } |
| 12420 | + if(rc == 0) { |
| 12421 | + spin_lock(&GlobalMid_Lock); |
| 12422 | + if(pSesInfo->server->tcpStatus != CifsExiting) |
| 12423 | + pSesInfo->server->tcpStatus = CifsGood; |
| 12424 | + else |
| 12425 | + rc = -EHOSTDOWN; |
| 12426 | + spin_unlock(&GlobalMid_Lock); |
| 12427 | + |
| 12428 | + } |
| 12429 | + } |
| 12430 | + if (!rc) { |
| 12431 | + pSesInfo->capabilities = pSesInfo->server->capabilities; |
| 12432 | + if(linuxExtEnabled == 0) |
| 12433 | + pSesInfo->capabilities &= (~CAP_UNIX); |
| 12434 | + pSesInfo->sequence_number = 0; |
| 12435 | + cFYI(1,("Security Mode: 0x%x Capabilities: 0x%x Time Zone: %d", |
| 12436 | + pSesInfo->server->secMode, |
| 12437 | + pSesInfo->server->capabilities, |
| 12438 | + pSesInfo->server->timeZone)); |
| 12439 | + if (extended_security |
| 12440 | + && (pSesInfo->capabilities & CAP_EXTENDED_SECURITY) |
| 12441 | + && (pSesInfo->server->secType == NTLMSSP)) { |
| 12442 | + cFYI(1, ("New style sesssetup ")); |
| 12443 | + rc = CIFSSpnegoSessSetup(xid, pSesInfo, |
| 12444 | + NULL /* security blob */, |
| 12445 | + 0 /* blob length */, |
| 12446 | + nls_info); |
| 12447 | + } else if (extended_security |
| 12448 | + && (pSesInfo->capabilities & CAP_EXTENDED_SECURITY) |
| 12449 | + && (pSesInfo->server->secType == RawNTLMSSP)) { |
| 12450 | + cFYI(1, ("NTLMSSP sesssetup ")); |
| 12451 | + rc = CIFSNTLMSSPNegotiateSessSetup(xid, |
| 12452 | + pSesInfo, |
| 12453 | + &ntlmv2_flag, |
| 12454 | + nls_info); |
| 12455 | + if (!rc) { |
| 12456 | + if(ntlmv2_flag) { |
| 12457 | + char * v2_response; |
| 12458 | + cFYI(1,("Can use more secure NTLM version 2 password hash")); |
| 12459 | + CalcNTLMv2_partial_mac_key(pSesInfo, |
| 12460 | + nls_info); |
| 12461 | + v2_response = kmalloc(16 + 64 /* blob */, GFP_KERNEL); |
| 12462 | + if(v2_response) { |
| 12463 | + CalcNTLMv2_response(pSesInfo,v2_response); |
| 12464 | +/* cifs_calculate_ntlmv2_mac_key(pSesInfo->mac_signing_key, response, ntlm_session_key, */ |
| 12465 | + kfree(v2_response); |
| 12466 | + /* BB Put dummy sig in SessSetup PDU? */ |
| 12467 | + } else |
| 12468 | + rc = -ENOMEM; |
| 12469 | + |
| 12470 | + } else { |
| 12471 | + SMBNTencrypt(pSesInfo->password, |
| 12472 | + pSesInfo->server->cryptKey, |
| 12473 | + ntlm_session_key); |
| 12474 | + |
| 12475 | + cifs_calculate_mac_key(pSesInfo->mac_signing_key, |
| 12476 | + ntlm_session_key, |
| 12477 | + pSesInfo->password); |
| 12478 | + } |
| 12479 | + /* for better security the weaker lanman hash not sent |
| 12480 | + in AuthSessSetup so we no longer calculate it */ |
| 12481 | + |
| 12482 | + rc = CIFSNTLMSSPAuthSessSetup(xid, |
| 12483 | + pSesInfo, |
| 12484 | + ntlm_session_key, |
| 12485 | + ntlmv2_flag, |
| 12486 | + nls_info); |
| 12487 | + } |
| 12488 | + } else { /* old style NTLM 0.12 session setup */ |
| 12489 | + SMBNTencrypt(pSesInfo->password, |
| 12490 | + pSesInfo->server->cryptKey, |
| 12491 | + ntlm_session_key); |
| 12492 | + |
| 12493 | + cifs_calculate_mac_key(pSesInfo->mac_signing_key, |
| 12494 | + ntlm_session_key, pSesInfo->password); |
| 12495 | + rc = CIFSSessSetup(xid, pSesInfo, |
| 12496 | + ntlm_session_key, nls_info); |
| 12497 | + } |
| 12498 | + if (rc) { |
| 12499 | + cERROR(1,("Send error in SessSetup = %d",rc)); |
| 12500 | + } else { |
| 12501 | + cFYI(1,("CIFS Session Established successfully")); |
| 12502 | + pSesInfo->status = CifsGood; |
| 12503 | + } |
| 12504 | + } |
| 12505 | + return rc; |
| 12506 | +} |
| 12507 | + |
| 12508 | --- /dev/null |
| 12509 | +++ b/fs/cifs/dir.c |
| 12510 | @@ -0,0 +1,425 @@ |
| 12511 | +/* |
| 12512 | + * fs/cifs/dir.c |
| 12513 | + * |
| 12514 | + * vfs operations that deal with dentries |
| 12515 | + * |
| 12516 | + * Copyright (C) International Business Machines Corp., 2002,2003 |
| 12517 | + * Author(s): Steve French (sfrench@us.ibm.com) |
| 12518 | + * |
| 12519 | + * This library is free software; you can redistribute it and/or modify |
| 12520 | + * it under the terms of the GNU Lesser General Public License as published |
| 12521 | + * by the Free Software Foundation; either version 2.1 of the License, or |
| 12522 | + * (at your option) any later version. |
| 12523 | + * |
| 12524 | + * This library is distributed in the hope that it will be useful, |
| 12525 | + * but WITHOUT ANY WARRANTY; without even the implied warranty of |
| 12526 | + * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See |
| 12527 | + * the GNU Lesser General Public License for more details. |
| 12528 | + * |
| 12529 | + * You should have received a copy of the GNU Lesser General Public License |
| 12530 | + * along with this library; if not, write to the Free Software |
| 12531 | + * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA |
| 12532 | + */ |
| 12533 | +#include <linux/fs.h> |
| 12534 | +#include <linux/stat.h> |
| 12535 | +#include <linux/slab.h> |
| 12536 | +#include "cifsfs.h" |
| 12537 | +#include "cifspdu.h" |
| 12538 | +#include "cifsglob.h" |
| 12539 | +#include "cifsproto.h" |
| 12540 | +#include "cifs_debug.h" |
| 12541 | +#include "cifs_fs_sb.h" |
| 12542 | + |
| 12543 | +void |
| 12544 | +renew_parental_timestamps(struct dentry *direntry) |
| 12545 | +{ |
| 12546 | + /* BB check if there is a way to get the kernel to do this or if we really need this */ |
| 12547 | + do { |
| 12548 | + direntry->d_time = jiffies; |
| 12549 | + direntry = direntry->d_parent; |
| 12550 | + } while (!IS_ROOT(direntry)); |
| 12551 | +} |
| 12552 | + |
| 12553 | +/* Note: caller must free return buffer */ |
| 12554 | +char * |
| 12555 | +build_path_from_dentry(struct dentry *direntry) |
| 12556 | +{ |
| 12557 | + struct dentry *temp; |
| 12558 | + int namelen = 0; |
| 12559 | + char *full_path; |
| 12560 | + |
| 12561 | + if(direntry == NULL) |
| 12562 | + return NULL; /* not much we can do if dentry is freed and |
| 12563 | + we need to reopen the file after it was closed implicitly |
| 12564 | + when the server crashed */ |
| 12565 | + |
| 12566 | +cifs_bp_rename_retry: |
| 12567 | + for (temp = direntry; !IS_ROOT(temp);) { |
| 12568 | + namelen += (1 + temp->d_name.len); |
| 12569 | + temp = temp->d_parent; |
| 12570 | + if(temp == NULL) { |
| 12571 | + cERROR(1,("corrupt dentry")); |
| 12572 | + return NULL; |
| 12573 | + } |
| 12574 | + } |
| 12575 | + |
| 12576 | + full_path = kmalloc(namelen+1, GFP_KERNEL); |
| 12577 | + if(full_path == NULL) |
| 12578 | + return full_path; |
| 12579 | + full_path[namelen] = 0; /* trailing null */ |
| 12580 | + |
| 12581 | + for (temp = direntry; !IS_ROOT(temp);) { |
| 12582 | + namelen -= 1 + temp->d_name.len; |
| 12583 | + if (namelen < 0) { |
| 12584 | + break; |
| 12585 | + } else { |
| 12586 | + full_path[namelen] = '\\'; |
| 12587 | + strncpy(full_path + namelen + 1, temp->d_name.name, |
| 12588 | + temp->d_name.len); |
| 12589 | + cFYI(0, (" name: %s ", full_path + namelen)); |
| 12590 | + } |
| 12591 | + temp = temp->d_parent; |
| 12592 | + if(temp == NULL) { |
| 12593 | + cERROR(1,("corrupt dentry")); |
| 12594 | + kfree(full_path); |
| 12595 | + return NULL; |
| 12596 | + } |
| 12597 | + } |
| 12598 | + if (namelen != 0) { |
| 12599 | + cERROR(1, |
| 12600 | + ("We did not end path lookup where we expected namelen is %d", |
| 12601 | + namelen)); |
| 12602 | + /* presumably this is only possible if we were racing with a rename |
| 12603 | + of one of the parent directories (we can not lock the dentries |
| 12604 | + above us to prevent this, but retrying should be harmless) */ |
| 12605 | + kfree(full_path); |
| 12606 | + namelen = 0; |
| 12607 | + goto cifs_bp_rename_retry; |
| 12608 | + } |
| 12609 | + |
| 12610 | + return full_path; |
| 12611 | +} |
| 12612 | + |
| 12613 | +/* Note: caller must free return buffer */ |
| 12614 | +char * |
| 12615 | +build_wildcard_path_from_dentry(struct dentry *direntry) |
| 12616 | +{ |
| 12617 | + struct dentry *temp; |
| 12618 | + int namelen = 0; |
| 12619 | + char *full_path; |
| 12620 | + |
| 12621 | + if(direntry == NULL) |
| 12622 | + return NULL; /* not much we can do if dentry is freed and |
| 12623 | + we need to reopen the file after it was closed implicitly |
| 12624 | + when the server crashed */ |
| 12625 | + |
| 12626 | +cifs_bwp_rename_retry: |
| 12627 | + for (temp = direntry; !IS_ROOT(temp);) { |
| 12628 | + namelen += (1 + temp->d_name.len); |
| 12629 | + temp = temp->d_parent; |
| 12630 | + if(temp == NULL) { |
| 12631 | + cERROR(1,("corrupt dentry")); |
| 12632 | + return NULL; |
| 12633 | + } |
| 12634 | + } |
| 12635 | + |
| 12636 | + full_path = kmalloc(namelen+3, GFP_KERNEL); |
| 12637 | + if(full_path == NULL) |
| 12638 | + return full_path; |
| 12639 | + |
| 12640 | + full_path[namelen] = '\\'; |
| 12641 | + full_path[namelen+1] = '*'; |
| 12642 | + full_path[namelen+2] = 0; /* trailing null */ |
| 12643 | + |
| 12644 | + for (temp = direntry; !IS_ROOT(temp);) { |
| 12645 | + namelen -= 1 + temp->d_name.len; |
| 12646 | + if (namelen < 0) { |
| 12647 | + break; |
| 12648 | + } else { |
| 12649 | + full_path[namelen] = '\\'; |
| 12650 | + strncpy(full_path + namelen + 1, temp->d_name.name, |
| 12651 | + temp->d_name.len); |
| 12652 | + cFYI(0, (" name: %s ", full_path + namelen)); |
| 12653 | + } |
| 12654 | + temp = temp->d_parent; |
| 12655 | + if(temp == NULL) { |
| 12656 | + cERROR(1,("corrupt dentry")); |
| 12657 | + kfree(full_path); |
| 12658 | + return NULL; |
| 12659 | + } |
| 12660 | + } |
| 12661 | + if (namelen != 0) { |
| 12662 | + cERROR(1, |
| 12663 | + ("We did not end path lookup where we expected namelen is %d", |
| 12664 | + namelen)); |
| 12665 | + /* presumably this is only possible if we were racing with a rename |
| 12666 | + of one of the parent directories (we can not lock the dentries |
| 12667 | + above us to prevent this, but retrying should be harmless) */ |
| 12668 | + kfree(full_path); |
| 12669 | + namelen = 0; |
| 12670 | + goto cifs_bwp_rename_retry; |
| 12671 | + } |
| 12672 | + |
| 12673 | + return full_path; |
| 12674 | +} |
| 12675 | + |
| 12676 | +/* Inode operations in similar order to how they appear in the Linux file fs.h */ |
| 12677 | + |
| 12678 | +int |
| 12679 | +cifs_create(struct inode *inode, struct dentry *direntry, int mode) |
| 12680 | +{ |
| 12681 | + int rc = -ENOENT; |
| 12682 | + int xid; |
| 12683 | + int oplock = 0; /* no sense requested oplock if we are just going to |
| 12684 | + immediately close the file */ |
| 12685 | + __u16 fileHandle; |
| 12686 | + struct cifs_sb_info *cifs_sb; |
| 12687 | + struct cifsTconInfo *pTcon; |
| 12688 | + char *full_path = NULL; |
| 12689 | + FILE_ALL_INFO * buf = NULL; |
| 12690 | + struct inode *newinode = NULL; |
| 12691 | + |
| 12692 | + xid = GetXid(); |
| 12693 | + |
| 12694 | + cifs_sb = CIFS_SB(inode->i_sb); |
| 12695 | + pTcon = cifs_sb->tcon; |
| 12696 | + |
| 12697 | + down(&direntry->d_sb->s_vfs_rename_sem); |
| 12698 | + full_path = build_path_from_dentry(direntry); |
| 12699 | + up(&direntry->d_sb->s_vfs_rename_sem); |
| 12700 | + if(full_path == NULL) { |
| 12701 | + FreeXid(xid); |
| 12702 | + return -ENOMEM; |
| 12703 | + } |
| 12704 | + |
| 12705 | + /* BB add processing to set equivalent of mode - e.g. via CreateX with ACLs */ |
| 12706 | + |
| 12707 | + buf = kmalloc(sizeof(FILE_ALL_INFO),GFP_KERNEL); |
| 12708 | + rc = CIFSSMBOpen(xid, pTcon, full_path, FILE_OVERWRITE_IF, |
| 12709 | + GENERIC_WRITE, CREATE_NOT_DIR, |
| 12710 | + &fileHandle, &oplock, buf, cifs_sb->local_nls); |
| 12711 | + if (rc) { |
| 12712 | + cFYI(1, ("cifs_create returned 0x%x ", rc)); |
| 12713 | + } else { |
| 12714 | + /* BB for case of overwriting existing file can we use the inode that was |
| 12715 | + passed in rather than creating new one?? */ |
| 12716 | + if (pTcon->ses->capabilities & CAP_UNIX) |
| 12717 | + rc = cifs_get_inode_info_unix(&newinode, full_path, |
| 12718 | + inode->i_sb,xid); |
| 12719 | + else |
| 12720 | + rc = cifs_get_inode_info(&newinode, full_path, |
| 12721 | + buf, inode->i_sb,xid); |
| 12722 | + |
| 12723 | + if (rc != 0) { |
| 12724 | + cFYI(1,("Create worked but get_inode_info failed with rc = %d", |
| 12725 | + rc)); |
| 12726 | + } else { |
| 12727 | + direntry->d_op = &cifs_dentry_ops; |
| 12728 | + d_instantiate(direntry, newinode); |
| 12729 | + } |
| 12730 | + CIFSSMBClose(xid, pTcon, fileHandle); |
| 12731 | + |
| 12732 | + if(newinode) { |
| 12733 | + newinode->i_mode = mode; |
| 12734 | + if (cifs_sb->tcon->ses->capabilities & CAP_UNIX) |
| 12735 | + CIFSSMBUnixSetPerms(xid, pTcon, full_path, inode->i_mode, |
| 12736 | + (__u64)-1, |
| 12737 | + (__u64)-1, |
| 12738 | + 0 /* dev */, |
| 12739 | + cifs_sb->local_nls); |
| 12740 | + else { /* BB implement via Windows security descriptors */ |
| 12741 | + /* eg CIFSSMBWinSetPerms(xid,pTcon,full_path,mode,-1,-1,local_nls);*/ |
| 12742 | + /* in the meantime could set r/o dos attribute when perms are eg: |
| 12743 | + mode & 0222 == 0 */ |
| 12744 | + } |
| 12745 | + } |
| 12746 | + } |
| 12747 | + |
| 12748 | + if (buf) |
| 12749 | + kfree(buf); |
| 12750 | + if (full_path) |
| 12751 | + kfree(full_path); |
| 12752 | + FreeXid(xid); |
| 12753 | + |
| 12754 | + return rc; |
| 12755 | +} |
| 12756 | + |
| 12757 | +int cifs_mknod(struct inode *inode, struct dentry *direntry, int mode, int device_number) |
| 12758 | +{ |
| 12759 | + int rc = -EPERM; |
| 12760 | + int xid; |
| 12761 | + struct cifs_sb_info *cifs_sb; |
| 12762 | + struct cifsTconInfo *pTcon; |
| 12763 | + char *full_path = NULL; |
| 12764 | + struct inode * newinode = NULL; |
| 12765 | + |
| 12766 | + xid = GetXid(); |
| 12767 | + |
| 12768 | + cifs_sb = CIFS_SB(inode->i_sb); |
| 12769 | + pTcon = cifs_sb->tcon; |
| 12770 | + |
| 12771 | + down(&direntry->d_sb->s_vfs_rename_sem); |
| 12772 | + full_path = build_path_from_dentry(direntry); |
| 12773 | + up(&direntry->d_sb->s_vfs_rename_sem); |
| 12774 | + if(full_path == NULL) |
| 12775 | + rc = -ENOMEM; |
| 12776 | + |
| 12777 | + if (full_path && (pTcon->ses->capabilities & CAP_UNIX)) { |
| 12778 | + rc = CIFSSMBUnixSetPerms(xid, pTcon, |
| 12779 | + full_path, mode, current->euid, current->egid, |
| 12780 | + device_number, cifs_sb->local_nls); |
| 12781 | + if(!rc) { |
| 12782 | + rc = cifs_get_inode_info_unix(&newinode, full_path, |
| 12783 | + inode->i_sb,xid); |
| 12784 | + direntry->d_op = &cifs_dentry_ops; |
| 12785 | + if(rc == 0) |
| 12786 | + d_instantiate(direntry, newinode); |
| 12787 | + } |
| 12788 | + } |
| 12789 | + |
| 12790 | + if (full_path) |
| 12791 | + kfree(full_path); |
| 12792 | + FreeXid(xid); |
| 12793 | + |
| 12794 | + return rc; |
| 12795 | +} |
| 12796 | + |
| 12797 | + |
| 12798 | +struct dentry * |
| 12799 | +cifs_lookup(struct inode *parent_dir_inode, struct dentry *direntry) |
| 12800 | +{ |
| 12801 | + int xid; |
| 12802 | + int rc = 0; /* to get around spurious gcc warning, set to zero here */ |
| 12803 | + struct cifs_sb_info *cifs_sb; |
| 12804 | + struct cifsTconInfo *pTcon; |
| 12805 | + struct inode *newInode = NULL; |
| 12806 | + char *full_path = NULL; |
| 12807 | + |
| 12808 | + xid = GetXid(); |
| 12809 | + |
| 12810 | + cFYI(1, |
| 12811 | + (" parent inode = 0x%p name is: %s and dentry = 0x%p", |
| 12812 | + parent_dir_inode, direntry->d_name.name, direntry)); |
| 12813 | + |
| 12814 | + /* BB Add check of incoming data - e.g. frame not longer than maximum SMB - let server check the namelen BB */ |
| 12815 | + |
| 12816 | + /* check whether path exists */ |
| 12817 | + |
| 12818 | + cifs_sb = CIFS_SB(parent_dir_inode->i_sb); |
| 12819 | + pTcon = cifs_sb->tcon; |
| 12820 | + |
| 12821 | + /* can not grab the rename sem here since it would |
| 12822 | + deadlock in the cases (beginning of sys_rename itself) |
| 12823 | + in which we already have the sb rename sem */ |
| 12824 | + full_path = build_path_from_dentry(direntry); |
| 12825 | + if(full_path == NULL) { |
| 12826 | + FreeXid(xid); |
| 12827 | + return ERR_PTR(-ENOMEM); |
| 12828 | + } |
| 12829 | + |
| 12830 | + if (direntry->d_inode != NULL) { |
| 12831 | + cFYI(1, (" non-NULL inode in lookup")); |
| 12832 | + } else { |
| 12833 | + cFYI(1, (" NULL inode in lookup")); |
| 12834 | + } |
| 12835 | + cFYI(1, |
| 12836 | + (" Full path: %s inode = 0x%p", full_path, direntry->d_inode)); |
| 12837 | + |
| 12838 | + if (pTcon->ses->capabilities & CAP_UNIX) |
| 12839 | + rc = cifs_get_inode_info_unix(&newInode, full_path, |
| 12840 | + parent_dir_inode->i_sb,xid); |
| 12841 | + else |
| 12842 | + rc = cifs_get_inode_info(&newInode, full_path, NULL, |
| 12843 | + parent_dir_inode->i_sb,xid); |
| 12844 | + |
| 12845 | + if ((rc == 0) && (newInode != NULL)) { |
| 12846 | + direntry->d_op = &cifs_dentry_ops; |
| 12847 | + d_add(direntry, newInode); |
| 12848 | + |
| 12849 | + /* since paths are not looked up by component - the parent directories are presumed to be good here */ |
| 12850 | + renew_parental_timestamps(direntry); |
| 12851 | + |
| 12852 | + } else if (rc == -ENOENT) { |
| 12853 | + rc = 0; |
| 12854 | + d_add(direntry, NULL); |
| 12855 | + } else { |
| 12856 | + cERROR(1,("Error 0x%x or on cifs_get_inode_info in lookup",rc)); |
| 12857 | + /* BB special case check for Access Denied - watch security |
| 12858 | + exposure of returning dir info implicitly via different rc |
| 12859 | + if file exists or not but no access BB */ |
| 12860 | + } |
| 12861 | + |
| 12862 | + if (full_path) |
| 12863 | + kfree(full_path); |
| 12864 | + FreeXid(xid); |
| 12865 | + return ERR_PTR(rc); |
| 12866 | +} |
| 12867 | + |
| 12868 | +int |
| 12869 | +cifs_dir_open(struct inode *inode, struct file *file) |
| 12870 | +{ /* NB: currently unused since searches are opened in readdir */ |
| 12871 | + int rc = 0; |
| 12872 | + int xid; |
| 12873 | + struct cifs_sb_info *cifs_sb; |
| 12874 | + struct cifsTconInfo *pTcon; |
| 12875 | + char *full_path = NULL; |
| 12876 | + |
| 12877 | + xid = GetXid(); |
| 12878 | + |
| 12879 | + cifs_sb = CIFS_SB(inode->i_sb); |
| 12880 | + pTcon = cifs_sb->tcon; |
| 12881 | + |
| 12882 | + if(file->f_dentry) { |
| 12883 | + down(&file->f_dentry->d_sb->s_vfs_rename_sem); |
| 12884 | + full_path = build_wildcard_path_from_dentry(file->f_dentry); |
| 12885 | + up(&file->f_dentry->d_sb->s_vfs_rename_sem); |
| 12886 | + } else { |
| 12887 | + FreeXid(xid); |
| 12888 | + return -EIO; |
| 12889 | + } |
| 12890 | + |
| 12891 | + cFYI(1, ("inode = 0x%p and full path is %s", inode, full_path)); |
| 12892 | + |
| 12893 | + if (full_path) |
| 12894 | + kfree(full_path); |
| 12895 | + FreeXid(xid); |
| 12896 | + return rc; |
| 12897 | +} |
| 12898 | + |
| 12899 | +static int |
| 12900 | +cifs_d_revalidate(struct dentry *direntry, int flags) |
| 12901 | +{ |
| 12902 | + int isValid = 1; |
| 12903 | + |
| 12904 | +/* lock_kernel(); *//* surely we do not want to lock the kernel for a whole network round trip which could take seconds */ |
| 12905 | + |
| 12906 | + if (direntry->d_inode) { |
| 12907 | + if (cifs_revalidate(direntry)) { |
| 12908 | + /* unlock_kernel(); */ |
| 12909 | + return 0; |
| 12910 | + } |
| 12911 | + } else { |
| 12912 | + cFYI(1, |
| 12913 | + ("In cifs_d_revalidate with no inode but name = %s and dentry 0x%p", |
| 12914 | + direntry->d_name.name, direntry)); |
| 12915 | + } |
| 12916 | + |
| 12917 | +/* unlock_kernel(); */ |
| 12918 | + |
| 12919 | + return isValid; |
| 12920 | +} |
| 12921 | + |
| 12922 | +/* static int cifs_d_delete(struct dentry *direntry) |
| 12923 | +{ |
| 12924 | + int rc = 0; |
| 12925 | + |
| 12926 | + cFYI(1, ("In cifs d_delete, name = %s", direntry->d_name.name)); |
| 12927 | + |
| 12928 | + return rc; |
| 12929 | +} */ |
| 12930 | + |
| 12931 | +struct dentry_operations cifs_dentry_ops = { |
| 12932 | + .d_revalidate = cifs_d_revalidate, |
| 12933 | +/* d_delete: cifs_d_delete, *//* not needed except for debugging */ |
| 12934 | + /* no need for d_hash, d_compare, d_release, d_iput ... yet. BB confirm this BB */ |
| 12935 | +}; |
| 12936 | --- /dev/null |
| 12937 | +++ b/fs/cifs/file.c |
| 12938 | @@ -0,0 +1,2185 @@ |
| 12939 | +/* |
| 12940 | + * fs/cifs/file.c |
| 12941 | + * |
| 12942 | + * vfs operations that deal with files |
| 12943 | + * |
| 12944 | + * Copyright (C) International Business Machines Corp., 2002,2003 |
| 12945 | + * Author(s): Steve French (sfrench@us.ibm.com) |
| 12946 | + * |
| 12947 | + * This library is free software; you can redistribute it and/or modify |
| 12948 | + * it under the terms of the GNU Lesser General Public License as published |
| 12949 | + * by the Free Software Foundation; either version 2.1 of the License, or |
| 12950 | + * (at your option) any later version. |
| 12951 | + * |
| 12952 | + * This library is distributed in the hope that it will be useful, |
| 12953 | + * but WITHOUT ANY WARRANTY; without even the implied warranty of |
| 12954 | + * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See |
| 12955 | + * the GNU Lesser General Public License for more details. |
| 12956 | + * |
| 12957 | + * You should have received a copy of the GNU Lesser General Public License |
| 12958 | + * along with this library; if not, write to the Free Software |
| 12959 | + * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA |
| 12960 | + */ |
| 12961 | +#include <linux/fs.h> |
| 12962 | +#include <linux/stat.h> |
| 12963 | +#include <linux/fcntl.h> |
| 12964 | +#include <linux/version.h> |
| 12965 | +#include <linux/pagemap.h> |
| 12966 | +#include <linux/smp_lock.h> |
| 12967 | +#include <linux/list.h> |
| 12968 | +#include <asm/div64.h> |
| 12969 | +#include <linux/mm.h> |
| 12970 | +#include <linux/types.h> |
| 12971 | +#include "cifsfs.h" |
| 12972 | +#include "cifspdu.h" |
| 12973 | +#include "cifsglob.h" |
| 12974 | +#include "cifsproto.h" |
| 12975 | +#include "cifs_unicode.h" |
| 12976 | +#include "cifs_debug.h" |
| 12977 | +#include "cifs_fs_sb.h" |
| 12978 | + |
| 12979 | +int |
| 12980 | +cifs_open(struct inode *inode, struct file *file) |
| 12981 | +{ |
| 12982 | + int rc = -EACCES; |
| 12983 | + int xid, oplock; |
| 12984 | + struct cifs_sb_info *cifs_sb; |
| 12985 | + struct cifsTconInfo *pTcon; |
| 12986 | + struct cifsFileInfo *pCifsFile; |
| 12987 | + struct cifsInodeInfo *pCifsInode; |
| 12988 | + char *full_path = NULL; |
| 12989 | + int desiredAccess = 0x20197; |
| 12990 | + int disposition; |
| 12991 | + __u16 netfid; |
| 12992 | + FILE_ALL_INFO * buf = NULL; |
| 12993 | + time_t temp; |
| 12994 | + |
| 12995 | + xid = GetXid(); |
| 12996 | + |
| 12997 | + cifs_sb = CIFS_SB(inode->i_sb); |
| 12998 | + pTcon = cifs_sb->tcon; |
| 12999 | + |
| 13000 | + down(&inode->i_sb->s_vfs_rename_sem); |
| 13001 | + full_path = build_path_from_dentry(file->f_dentry); |
| 13002 | + up(&inode->i_sb->s_vfs_rename_sem); |
| 13003 | + if(full_path == NULL) { |
| 13004 | + FreeXid(xid); |
| 13005 | + return -ENOMEM; |
| 13006 | + } |
| 13007 | + |
| 13008 | + cFYI(1, (" inode = 0x%p file flags are 0x%x for %s", inode, file->f_flags,full_path)); |
| 13009 | + if ((file->f_flags & O_ACCMODE) == O_RDONLY) |
| 13010 | + desiredAccess = GENERIC_READ; |
| 13011 | + else if ((file->f_flags & O_ACCMODE) == O_WRONLY) |
| 13012 | + desiredAccess = GENERIC_WRITE; |
| 13013 | + else if ((file->f_flags & O_ACCMODE) == O_RDWR) { |
| 13014 | + /* GENERIC_ALL is too much permission to request */ |
| 13015 | + /* can cause unnecessary access denied on create */ |
| 13016 | + /* desiredAccess = GENERIC_ALL; */ |
| 13017 | + desiredAccess = GENERIC_READ | GENERIC_WRITE; |
| 13018 | + } |
| 13019 | + |
| 13020 | +/********************************************************************* |
| 13021 | + * open flag mapping table: |
| 13022 | + * |
| 13023 | + * POSIX Flag CIFS Disposition |
| 13024 | + * ---------- ---------------- |
| 13025 | + * O_CREAT FILE_OPEN_IF |
| 13026 | + * O_CREAT | O_EXCL FILE_CREATE |
| 13027 | + * O_CREAT | O_TRUNC FILE_OVERWRITE_IF |
| 13028 | + * O_TRUNC FILE_OVERWRITE |
| 13029 | + * none of the above FILE_OPEN |
| 13030 | + * |
| 13031 | + * Note that there is not a direct match between disposition |
| 13032 | + * FILE_SUPERSEDE (ie create whether or not file exists although |
| 13033 | + * O_CREAT | O_TRUNC is similar but truncates the existing |
| 13034 | + * file rather than creating a new file as FILE_SUPERSEDE does |
| 13035 | + * (which uses the attributes / metadata passed in on open call) |
| 13036 | + *? |
| 13037 | + *? O_SYNC is a reasonable match to CIFS writethrough flag |
| 13038 | + *? and the read write flags match reasonably. O_LARGEFILE |
| 13039 | + *? is irrelevant because largefile support is always used |
| 13040 | + *? by this client. Flags O_APPEND, O_DIRECT, O_DIRECTORY, |
| 13041 | + * O_FASYNC, O_NOFOLLOW, O_NONBLOCK need further investigation |
| 13042 | + *********************************************************************/ |
| 13043 | + |
| 13044 | + /* For 2.4 case, file was already checked for existence |
| 13045 | + before create by vfs lookup and created in create |
| 13046 | + entry point, we are now just opening the newly |
| 13047 | + created file with the right desiredAccess flags */ |
| 13048 | + |
| 13049 | + if((file->f_flags & (O_CREAT | O_EXCL)) == (O_CREAT | O_EXCL)) |
| 13050 | + disposition = FILE_OPEN_IF; |
| 13051 | + else if((file->f_flags & (O_CREAT | O_TRUNC)) == (O_CREAT | O_TRUNC)) |
| 13052 | + disposition = FILE_OVERWRITE_IF; |
| 13053 | + else if((file->f_flags & O_CREAT) == O_CREAT) |
| 13054 | + disposition = FILE_OPEN_IF; |
| 13055 | + else |
| 13056 | + disposition = FILE_OPEN; |
| 13057 | + |
| 13058 | + if (oplockEnabled) |
| 13059 | + oplock = REQ_OPLOCK; |
| 13060 | + else |
| 13061 | + oplock = FALSE; |
| 13062 | + |
| 13063 | + /* BB pass O_SYNC flag through on file attributes .. BB */ |
| 13064 | + |
| 13065 | + /* Also refresh inode by passing in file_info buf returned by SMBOpen |
| 13066 | + and calling get_inode_info with returned buf (at least |
| 13067 | + helps non-Unix server case */ |
| 13068 | + |
| 13069 | + /* BB we can not do this if this is the second open of a file |
| 13070 | + and the first handle has writebehind data, we might be |
| 13071 | + able to simply do a filemap_fdatawrite/filemap_fdatawait first */ |
| 13072 | + buf = kmalloc(sizeof(FILE_ALL_INFO),GFP_KERNEL); |
| 13073 | + if(buf==0) { |
| 13074 | + if (full_path) |
| 13075 | + kfree(full_path); |
| 13076 | + FreeXid(xid); |
| 13077 | + return -ENOMEM; |
| 13078 | + } |
| 13079 | + rc = CIFSSMBOpen(xid, pTcon, full_path, disposition, desiredAccess, |
| 13080 | + CREATE_NOT_DIR, &netfid, &oplock, buf, cifs_sb->local_nls); |
| 13081 | + if (rc) { |
| 13082 | + cFYI(1, ("cifs_open returned 0x%x ", rc)); |
| 13083 | + cFYI(1, ("oplock: %d ", oplock)); |
| 13084 | + } else { |
| 13085 | + file->private_data = |
| 13086 | + kmalloc(sizeof (struct cifsFileInfo), GFP_KERNEL); |
| 13087 | + if (file->private_data) { |
| 13088 | + memset(file->private_data, 0, sizeof(struct cifsFileInfo)); |
| 13089 | + pCifsFile = (struct cifsFileInfo *) file->private_data; |
| 13090 | + pCifsFile->netfid = netfid; |
| 13091 | + pCifsFile->pid = current->pid; |
| 13092 | + init_MUTEX(&pCifsFile->fh_sem); |
| 13093 | + pCifsFile->pfile = file; /* needed for writepage */ |
| 13094 | + pCifsFile->pInode = inode; |
| 13095 | + pCifsFile->invalidHandle = FALSE; |
| 13096 | + pCifsFile->closePend = FALSE; |
| 13097 | + write_lock(&GlobalSMBSeslock); |
| 13098 | + spin_lock(&files_lock); |
| 13099 | + list_add(&pCifsFile->tlist,&pTcon->openFileList); |
| 13100 | + pCifsInode = CIFS_I(file->f_dentry->d_inode); |
| 13101 | + if(pCifsInode) { |
| 13102 | + /* want handles we can use to read with first */ |
| 13103 | + /* in the list so we do not have to walk the */ |
| 13104 | + /* list to search for one in prepare_write */ |
| 13105 | + if ((file->f_flags & O_ACCMODE) == O_WRONLY) { |
| 13106 | + list_add_tail(&pCifsFile->flist,&pCifsInode->openFileList); |
| 13107 | + } else { |
| 13108 | + list_add(&pCifsFile->flist,&pCifsInode->openFileList); |
| 13109 | + } |
| 13110 | + spin_unlock(&files_lock); |
| 13111 | + write_unlock(&GlobalSMBSeslock); |
| 13112 | + if(pCifsInode->clientCanCacheRead) { |
| 13113 | + /* we have the inode open somewhere else |
| 13114 | + no need to discard cache data */ |
| 13115 | + } else { |
| 13116 | + if(buf) { |
| 13117 | + /* BB need same check in cifs_create too? */ |
| 13118 | + |
| 13119 | + /* if not oplocked, invalidate inode pages if mtime |
| 13120 | + or file size changed */ |
| 13121 | + temp = cifs_NTtimeToUnix(le64_to_cpu(buf->LastWriteTime)); |
| 13122 | + if((file->f_dentry->d_inode->i_mtime == temp) && |
| 13123 | + (file->f_dentry->d_inode->i_size == (loff_t)le64_to_cpu(buf->EndOfFile))) { |
| 13124 | + cFYI(1,("inode unchanged on server")); |
| 13125 | + } else { |
| 13126 | + if(file->f_dentry->d_inode->i_mapping) { |
| 13127 | + /* BB no need to lock inode until after invalidate*/ |
| 13128 | + /* since namei code should already have it locked?*/ |
| 13129 | + filemap_fdatasync(file->f_dentry->d_inode->i_mapping); |
| 13130 | + } |
| 13131 | + cFYI(1,("invalidating remote inode since open detected it changed")); |
| 13132 | + invalidate_inode_pages(file->f_dentry->d_inode); |
| 13133 | + } |
| 13134 | + } |
| 13135 | + } |
| 13136 | + if (pTcon->ses->capabilities & CAP_UNIX) |
| 13137 | + rc = cifs_get_inode_info_unix(&file->f_dentry->d_inode, |
| 13138 | + full_path, inode->i_sb,xid); |
| 13139 | + else |
| 13140 | + rc = cifs_get_inode_info(&file->f_dentry->d_inode, |
| 13141 | + full_path, buf, inode->i_sb,xid); |
| 13142 | + |
| 13143 | + if((oplock & 0xF) == OPLOCK_EXCLUSIVE) { |
| 13144 | + pCifsInode->clientCanCacheAll = TRUE; |
| 13145 | + pCifsInode->clientCanCacheRead = TRUE; |
| 13146 | + cFYI(1,("Exclusive Oplock granted on inode %p",file->f_dentry->d_inode)); |
| 13147 | + } else if((oplock & 0xF) == OPLOCK_READ) |
| 13148 | + pCifsInode->clientCanCacheRead = TRUE; |
| 13149 | + } else { |
| 13150 | + spin_unlock(&files_lock); |
| 13151 | + write_unlock(&GlobalSMBSeslock); |
| 13152 | + } |
| 13153 | + if(oplock & CIFS_CREATE_ACTION) { |
| 13154 | + /* time to set mode which we can not set earlier due |
| 13155 | + to problems creating new read-only files */ |
| 13156 | + if (cifs_sb->tcon->ses->capabilities & CAP_UNIX) |
| 13157 | + CIFSSMBUnixSetPerms(xid, pTcon, full_path, inode->i_mode, |
| 13158 | + (__u64)-1, |
| 13159 | + (__u64)-1, |
| 13160 | + 0 /* dev */, |
| 13161 | + cifs_sb->local_nls); |
| 13162 | + else {/* BB implement via Windows security descriptors */ |
| 13163 | + /* eg CIFSSMBWinSetPerms(xid,pTcon,full_path,mode,-1,-1,local_nls);*/ |
| 13164 | + /* in the meantime could set r/o dos attribute when perms are eg: |
| 13165 | + mode & 0222 == 0 */ |
| 13166 | + } |
| 13167 | + } |
| 13168 | + } |
| 13169 | + } |
| 13170 | + |
| 13171 | + if (buf) |
| 13172 | + kfree(buf); |
| 13173 | + if (full_path) |
| 13174 | + kfree(full_path); |
| 13175 | + FreeXid(xid); |
| 13176 | + return rc; |
| 13177 | +} |
| 13178 | + |
| 13179 | +/* Try to reaquire byte range locks that were released when session */ |
| 13180 | +/* to server was lost */ |
| 13181 | +static int cifs_relock_file(struct cifsFileInfo * cifsFile) |
| 13182 | +{ |
| 13183 | + int rc = 0; |
| 13184 | + |
| 13185 | +/* BB list all locks open on this file and relock */ |
| 13186 | + |
| 13187 | + return rc; |
| 13188 | +} |
| 13189 | + |
| 13190 | +static int cifs_reopen_file(struct inode *inode, struct file *file, int can_flush) |
| 13191 | +{ |
| 13192 | + int rc = -EACCES; |
| 13193 | + int xid, oplock; |
| 13194 | + struct cifs_sb_info *cifs_sb; |
| 13195 | + struct cifsTconInfo *pTcon; |
| 13196 | + struct cifsFileInfo *pCifsFile; |
| 13197 | + struct cifsInodeInfo *pCifsInode; |
| 13198 | + char *full_path = NULL; |
| 13199 | + int desiredAccess = 0x20197; |
| 13200 | + int disposition = FILE_OPEN; |
| 13201 | + __u16 netfid; |
| 13202 | + |
| 13203 | + if(inode == NULL) |
| 13204 | + return -EBADF; |
| 13205 | + if (file->private_data) { |
| 13206 | + pCifsFile = (struct cifsFileInfo *) file->private_data; |
| 13207 | + } else |
| 13208 | + return -EBADF; |
| 13209 | + |
| 13210 | + xid = GetXid(); |
| 13211 | + down(&pCifsFile->fh_sem); |
| 13212 | + if(pCifsFile->invalidHandle == FALSE) { |
| 13213 | + up(&pCifsFile->fh_sem); |
| 13214 | + FreeXid(xid); |
| 13215 | + return 0; |
| 13216 | + } |
| 13217 | + |
| 13218 | + if(file->f_dentry == NULL) { |
| 13219 | + up(&pCifsFile->fh_sem); |
| 13220 | + cFYI(1,("failed file reopen, no valid name if dentry freed")); |
| 13221 | + FreeXid(xid); |
| 13222 | + return -EBADF; |
| 13223 | + } |
| 13224 | + cifs_sb = CIFS_SB(inode->i_sb); |
| 13225 | + pTcon = cifs_sb->tcon; |
| 13226 | +/* can not grab rename sem here because various ops, including |
| 13227 | +those that already have the rename sem can end up causing writepage |
| 13228 | +to get called and if the server was down that means we end up here, |
| 13229 | +and we can never tell if the caller already has the rename_sem */ |
| 13230 | + full_path = build_path_from_dentry(file->f_dentry); |
| 13231 | + if(full_path == NULL) { |
| 13232 | + up(&pCifsFile->fh_sem); |
| 13233 | + FreeXid(xid); |
| 13234 | + return -ENOMEM; |
| 13235 | + } |
| 13236 | + |
| 13237 | + cFYI(1, (" inode = 0x%p file flags are 0x%x for %s", inode, file->f_flags,full_path)); |
| 13238 | + if ((file->f_flags & O_ACCMODE) == O_RDONLY) |
| 13239 | + desiredAccess = GENERIC_READ; |
| 13240 | + else if ((file->f_flags & O_ACCMODE) == O_WRONLY) |
| 13241 | + desiredAccess = GENERIC_WRITE; |
| 13242 | + else if ((file->f_flags & O_ACCMODE) == O_RDWR) { |
| 13243 | + /* GENERIC_ALL is too much permission to request */ |
| 13244 | + /* can cause unnecessary access denied on create */ |
| 13245 | + /* desiredAccess = GENERIC_ALL; */ |
| 13246 | + desiredAccess = GENERIC_READ | GENERIC_WRITE; |
| 13247 | + } |
| 13248 | + |
| 13249 | + if (oplockEnabled) |
| 13250 | + oplock = REQ_OPLOCK; |
| 13251 | + else |
| 13252 | + oplock = FALSE; |
| 13253 | + |
| 13254 | + |
| 13255 | + /* Can not refresh inode by passing in file_info buf to be returned |
| 13256 | + by SMBOpen and then calling get_inode_info with returned buf |
| 13257 | + since file might have write behind data that needs to be flushed |
| 13258 | + and server version of file size can be stale. If we |
| 13259 | + knew for sure that inode was not dirty locally we could do this */ |
| 13260 | + |
| 13261 | +/* buf = kmalloc(sizeof(FILE_ALL_INFO),GFP_KERNEL); |
| 13262 | + if(buf==0) { |
| 13263 | + up(&pCifsFile->fh_sem); |
| 13264 | + if (full_path) |
| 13265 | + kfree(full_path); |
| 13266 | + FreeXid(xid); |
| 13267 | + return -ENOMEM; |
| 13268 | + }*/ |
| 13269 | + rc = CIFSSMBOpen(xid, pTcon, full_path, disposition, desiredAccess, |
| 13270 | + CREATE_NOT_DIR, &netfid, &oplock, NULL, cifs_sb->local_nls); |
| 13271 | + if (rc) { |
| 13272 | + up(&pCifsFile->fh_sem); |
| 13273 | + cFYI(1, ("cifs_open returned 0x%x ", rc)); |
| 13274 | + cFYI(1, ("oplock: %d ", oplock)); |
| 13275 | + } else { |
| 13276 | + pCifsFile->netfid = netfid; |
| 13277 | + pCifsFile->invalidHandle = FALSE; |
| 13278 | + up(&pCifsFile->fh_sem); |
| 13279 | + pCifsInode = CIFS_I(inode); |
| 13280 | + if(pCifsInode) { |
| 13281 | + if(can_flush) { |
| 13282 | + filemap_fdatasync(inode->i_mapping); |
| 13283 | + filemap_fdatawait(inode->i_mapping); |
| 13284 | + /* temporarily disable caching while we |
| 13285 | + go to server to get inode info */ |
| 13286 | + pCifsInode->clientCanCacheAll = FALSE; |
| 13287 | + pCifsInode->clientCanCacheRead = FALSE; |
| 13288 | + if (pTcon->ses->capabilities & CAP_UNIX) |
| 13289 | + rc = cifs_get_inode_info_unix(&inode, |
| 13290 | + full_path, inode->i_sb,xid); |
| 13291 | + else |
| 13292 | + rc = cifs_get_inode_info(&inode, |
| 13293 | + full_path, NULL, inode->i_sb,xid); |
| 13294 | + } /* else we are writing out data to server already |
| 13295 | + and could deadlock if we tried to flush data, and |
| 13296 | + since we do not know if we have data that would |
| 13297 | + invalidate the current end of file on the server |
| 13298 | + we can not go to the server to get the new |
| 13299 | + inod info */ |
| 13300 | + if((oplock & 0xF) == OPLOCK_EXCLUSIVE) { |
| 13301 | + pCifsInode->clientCanCacheAll = TRUE; |
| 13302 | + pCifsInode->clientCanCacheRead = TRUE; |
| 13303 | + cFYI(1,("Exclusive Oplock granted on inode %p",file->f_dentry->d_inode)); |
| 13304 | + } else if((oplock & 0xF) == OPLOCK_READ) { |
| 13305 | + pCifsInode->clientCanCacheRead = TRUE; |
| 13306 | + pCifsInode->clientCanCacheAll = FALSE; |
| 13307 | + } else { |
| 13308 | + pCifsInode->clientCanCacheRead = FALSE; |
| 13309 | + pCifsInode->clientCanCacheAll = FALSE; |
| 13310 | + } |
| 13311 | + cifs_relock_file(pCifsFile); |
| 13312 | + } |
| 13313 | + } |
| 13314 | + |
| 13315 | + if (full_path) |
| 13316 | + kfree(full_path); |
| 13317 | + FreeXid(xid); |
| 13318 | + return rc; |
| 13319 | +} |
| 13320 | + |
| 13321 | +int |
| 13322 | +cifs_close(struct inode *inode, struct file *file) |
| 13323 | +{ |
| 13324 | + int rc = 0; |
| 13325 | + int xid; |
| 13326 | + struct cifs_sb_info *cifs_sb; |
| 13327 | + struct cifsTconInfo *pTcon; |
| 13328 | + struct cifsFileInfo *pSMBFile = |
| 13329 | + (struct cifsFileInfo *) file->private_data; |
| 13330 | + |
| 13331 | + xid = GetXid(); |
| 13332 | + |
| 13333 | + cifs_sb = CIFS_SB(inode->i_sb); |
| 13334 | + pTcon = cifs_sb->tcon; |
| 13335 | + if (pSMBFile) { |
| 13336 | + pSMBFile->closePend = TRUE; |
| 13337 | + spin_lock(&files_lock); |
| 13338 | + if(pTcon) { |
| 13339 | + /* no sense reconnecting to close a file that is |
| 13340 | + already closed */ |
| 13341 | + if (pTcon->tidStatus != CifsNeedReconnect) { |
| 13342 | + spin_unlock(&files_lock); |
| 13343 | + rc = CIFSSMBClose(xid,pTcon,pSMBFile->netfid); |
| 13344 | + spin_lock(&files_lock); |
| 13345 | + } |
| 13346 | + } |
| 13347 | + list_del(&pSMBFile->flist); |
| 13348 | + list_del(&pSMBFile->tlist); |
| 13349 | + spin_unlock(&files_lock); |
| 13350 | + if(pSMBFile->search_resume_name) |
| 13351 | + kfree(pSMBFile->search_resume_name); |
| 13352 | + kfree(file->private_data); |
| 13353 | + file->private_data = NULL; |
| 13354 | + } else |
| 13355 | + rc = -EBADF; |
| 13356 | + |
| 13357 | + if(list_empty(&(CIFS_I(inode)->openFileList))) { |
| 13358 | + cFYI(1,("closing last open instance for inode %p",inode)); |
| 13359 | + /* if the file is not open we do not know if we can cache |
| 13360 | + info on this inode, much less write behind and read ahead */ |
| 13361 | + CIFS_I(inode)->clientCanCacheRead = FALSE; |
| 13362 | + CIFS_I(inode)->clientCanCacheAll = FALSE; |
| 13363 | + } |
| 13364 | + if((rc ==0) && CIFS_I(inode)->write_behind_rc) |
| 13365 | + rc = CIFS_I(inode)->write_behind_rc; |
| 13366 | + FreeXid(xid); |
| 13367 | + return rc; |
| 13368 | +} |
| 13369 | + |
| 13370 | +int |
| 13371 | +cifs_closedir(struct inode *inode, struct file *file) |
| 13372 | +{ |
| 13373 | + int rc = 0; |
| 13374 | + int xid; |
| 13375 | + struct cifsFileInfo *pSMBFileStruct = |
| 13376 | + (struct cifsFileInfo *) file->private_data; |
| 13377 | + |
| 13378 | + cFYI(1, ("Closedir inode = 0x%p with ", inode)); |
| 13379 | + |
| 13380 | + xid = GetXid(); |
| 13381 | + |
| 13382 | + if (pSMBFileStruct) { |
| 13383 | + cFYI(1, ("Freeing private data in close dir")); |
| 13384 | + kfree(file->private_data); |
| 13385 | + file->private_data = NULL; |
| 13386 | + } |
| 13387 | + FreeXid(xid); |
| 13388 | + return rc; |
| 13389 | +} |
| 13390 | + |
| 13391 | +int |
| 13392 | +cifs_lock(struct file *file, int cmd, struct file_lock *pfLock) |
| 13393 | +{ |
| 13394 | + int rc, xid; |
| 13395 | + __u32 lockType = LOCKING_ANDX_LARGE_FILES; |
| 13396 | + __u32 numLock = 0; |
| 13397 | + __u32 numUnlock = 0; |
| 13398 | + __u64 length; |
| 13399 | + int wait_flag = FALSE; |
| 13400 | + struct cifs_sb_info *cifs_sb; |
| 13401 | + struct cifsTconInfo *pTcon; |
| 13402 | + length = 1 + pfLock->fl_end - pfLock->fl_start; |
| 13403 | + |
| 13404 | + rc = -EACCES; |
| 13405 | + |
| 13406 | + xid = GetXid(); |
| 13407 | + |
| 13408 | + cFYI(1, |
| 13409 | + ("Lock parm: 0x%x flockflags: 0x%x flocktype: 0x%x start: %lld end: %lld", |
| 13410 | + cmd, pfLock->fl_flags, pfLock->fl_type, pfLock->fl_start, |
| 13411 | + pfLock->fl_end)); |
| 13412 | + |
| 13413 | + if (pfLock->fl_flags & FL_POSIX) |
| 13414 | + cFYI(1, ("Posix ")); |
| 13415 | + if (pfLock->fl_flags & FL_FLOCK) |
| 13416 | + cFYI(1, ("Flock ")); |
| 13417 | +/* if (pfLock->fl_flags & FL_SLEEP) { |
| 13418 | + cFYI(1, ("Blocking lock ")); |
| 13419 | + wait_flag = TRUE; |
| 13420 | + } */ |
| 13421 | + if (pfLock->fl_flags & FL_ACCESS) |
| 13422 | + cFYI(1, ("Process suspended by mandatory locking - not implemented yet ")); |
| 13423 | + if (pfLock->fl_flags & FL_LEASE) |
| 13424 | + cFYI(1, ("Lease on file - not implemented yet")); |
| 13425 | + if (pfLock->fl_flags & (~(FL_POSIX | FL_FLOCK | FL_ACCESS | FL_LEASE))) |
| 13426 | + cFYI(1, ("Unknown lock flags 0x%x",pfLock->fl_flags)); |
| 13427 | + |
| 13428 | + if (pfLock->fl_type == F_WRLCK) { |
| 13429 | + cFYI(1, ("F_WRLCK ")); |
| 13430 | + numLock = 1; |
| 13431 | + } else if (pfLock->fl_type == F_UNLCK) { |
| 13432 | + cFYI(1, ("F_UNLCK ")); |
| 13433 | + numUnlock = 1; |
| 13434 | + } else if (pfLock->fl_type == F_RDLCK) { |
| 13435 | + cFYI(1, ("F_RDLCK ")); |
| 13436 | + lockType |= LOCKING_ANDX_SHARED_LOCK; |
| 13437 | + numLock = 1; |
| 13438 | + } else if (pfLock->fl_type == F_EXLCK) { |
| 13439 | + cFYI(1, ("F_EXLCK ")); |
| 13440 | + numLock = 1; |
| 13441 | + } else if (pfLock->fl_type == F_SHLCK) { |
| 13442 | + cFYI(1, ("F_SHLCK ")); |
| 13443 | + lockType |= LOCKING_ANDX_SHARED_LOCK; |
| 13444 | + numLock = 1; |
| 13445 | + } else |
| 13446 | + cFYI(1, ("Unknown type of lock ")); |
| 13447 | + |
| 13448 | + cifs_sb = CIFS_SB(file->f_dentry->d_sb); |
| 13449 | + pTcon = cifs_sb->tcon; |
| 13450 | + |
| 13451 | + if (file->private_data == NULL) { |
| 13452 | + FreeXid(xid); |
| 13453 | + return -EBADF; |
| 13454 | + } |
| 13455 | + |
| 13456 | + if (IS_GETLK(cmd)) { |
| 13457 | + rc = CIFSSMBLock(xid, pTcon, |
| 13458 | + ((struct cifsFileInfo *) file-> |
| 13459 | + private_data)->netfid, |
| 13460 | + length, |
| 13461 | + pfLock->fl_start, 0, 1, lockType, |
| 13462 | + 0 /* wait flag */ ); |
| 13463 | + if (rc == 0) { |
| 13464 | + rc = CIFSSMBLock(xid, pTcon, |
| 13465 | + ((struct cifsFileInfo *) file-> |
| 13466 | + private_data)->netfid, |
| 13467 | + length, |
| 13468 | + pfLock->fl_start, 1 /* numUnlock */ , |
| 13469 | + 0 /* numLock */ , lockType, |
| 13470 | + 0 /* wait flag */ ); |
| 13471 | + pfLock->fl_type = F_UNLCK; |
| 13472 | + if (rc != 0) |
| 13473 | + cERROR(1, |
| 13474 | + ("Error unlocking previously locked range %d during test of lock ", |
| 13475 | + rc)); |
| 13476 | + rc = 0; |
| 13477 | + |
| 13478 | + } else { |
| 13479 | + /* if rc == ERR_SHARING_VIOLATION ? */ |
| 13480 | + rc = 0; /* do not change lock type to unlock since range in use */ |
| 13481 | + } |
| 13482 | + |
| 13483 | + FreeXid(xid); |
| 13484 | + return rc; |
| 13485 | + } |
| 13486 | + |
| 13487 | + rc = CIFSSMBLock(xid, pTcon, |
| 13488 | + ((struct cifsFileInfo *) file->private_data)-> |
| 13489 | + netfid, length, |
| 13490 | + pfLock->fl_start, numUnlock, numLock, lockType, |
| 13491 | + wait_flag); |
| 13492 | + FreeXid(xid); |
| 13493 | + return rc; |
| 13494 | +} |
| 13495 | + |
| 13496 | +ssize_t |
| 13497 | +cifs_write(struct file * file, const char *write_data, |
| 13498 | + size_t write_size, loff_t * poffset) |
| 13499 | +{ |
| 13500 | + int rc = 0; |
| 13501 | + unsigned int bytes_written = 0; |
| 13502 | + unsigned int total_written; |
| 13503 | + struct cifs_sb_info *cifs_sb; |
| 13504 | + struct cifsTconInfo *pTcon; |
| 13505 | + int xid, long_op; |
| 13506 | + struct cifsFileInfo * open_file; |
| 13507 | + |
| 13508 | + if(file->f_dentry == NULL) |
| 13509 | + return -EBADF; |
| 13510 | + |
| 13511 | + cifs_sb = CIFS_SB(file->f_dentry->d_sb); |
| 13512 | + if(cifs_sb == NULL) { |
| 13513 | + return -EBADF; |
| 13514 | + } |
| 13515 | + pTcon = cifs_sb->tcon; |
| 13516 | + |
| 13517 | + /*cFYI(1, |
| 13518 | + (" write %d bytes to offset %lld of %s", write_size, |
| 13519 | + *poffset, file->f_dentry->d_name.name)); */ |
| 13520 | + |
| 13521 | + if (file->private_data == NULL) { |
| 13522 | + return -EBADF; |
| 13523 | + } else { |
| 13524 | + open_file = (struct cifsFileInfo *) file->private_data; |
| 13525 | + } |
| 13526 | + |
| 13527 | + xid = GetXid(); |
| 13528 | + if(file->f_dentry->d_inode == NULL) { |
| 13529 | + FreeXid(xid); |
| 13530 | + return -EBADF; |
| 13531 | + } |
| 13532 | + |
| 13533 | + if (*poffset > file->f_dentry->d_inode->i_size) |
| 13534 | + long_op = 2; /* writes past end of file can take a long time */ |
| 13535 | + else |
| 13536 | + long_op = 1; |
| 13537 | + |
| 13538 | + for (total_written = 0; write_size > total_written; |
| 13539 | + total_written += bytes_written) { |
| 13540 | + rc = -EAGAIN; |
| 13541 | + while(rc == -EAGAIN) { |
| 13542 | + if(file->private_data == NULL) { |
| 13543 | + /* file has been closed on us */ |
| 13544 | + FreeXid(xid); |
| 13545 | + /* if we have gotten here we have written some data |
| 13546 | + and blocked, and the file has been freed on us |
| 13547 | + while we blocked so return what we managed to write */ |
| 13548 | + return total_written; |
| 13549 | + } |
| 13550 | + if(open_file->closePend) { |
| 13551 | + FreeXid(xid); |
| 13552 | + if(total_written) |
| 13553 | + return total_written; |
| 13554 | + else |
| 13555 | + return -EBADF; |
| 13556 | + } |
| 13557 | + if (open_file->invalidHandle) { |
| 13558 | + if((file->f_dentry == NULL) || |
| 13559 | + (file->f_dentry->d_inode == NULL)) { |
| 13560 | + FreeXid(xid); |
| 13561 | + return total_written; |
| 13562 | + } |
| 13563 | + /* we could deadlock if we called |
| 13564 | + filemap_fdatawait from here so tell |
| 13565 | + reopen_file not to flush data to server now */ |
| 13566 | + rc = cifs_reopen_file(file->f_dentry->d_inode, |
| 13567 | + file,FALSE); |
| 13568 | + if(rc != 0) |
| 13569 | + break; |
| 13570 | + } |
| 13571 | + |
| 13572 | + rc = CIFSSMBWrite(xid, pTcon, |
| 13573 | + open_file->netfid, |
| 13574 | + write_size - total_written, *poffset, |
| 13575 | + &bytes_written, |
| 13576 | + write_data + total_written, long_op); |
| 13577 | + } |
| 13578 | + if (rc || (bytes_written == 0)) { |
| 13579 | + if (total_written) |
| 13580 | + break; |
| 13581 | + else { |
| 13582 | + FreeXid(xid); |
| 13583 | + return rc; |
| 13584 | + } |
| 13585 | + } else |
| 13586 | + *poffset += bytes_written; |
| 13587 | + long_op = FALSE; /* subsequent writes fast - 15 seconds is plenty */ |
| 13588 | + } |
| 13589 | + |
| 13590 | +#ifdef CONFIG_CIFS_STATS |
| 13591 | + if(total_written > 0) { |
| 13592 | + atomic_inc(&pTcon->num_writes); |
| 13593 | + spin_lock(&pTcon->stat_lock); |
| 13594 | + pTcon->bytes_written += total_written; |
| 13595 | + spin_unlock(&pTcon->stat_lock); |
| 13596 | + } |
| 13597 | +#endif |
| 13598 | + |
| 13599 | + /* since the write may have blocked check these pointers again */ |
| 13600 | + if(file->f_dentry) { |
| 13601 | + if(file->f_dentry->d_inode) { |
| 13602 | + file->f_dentry->d_inode->i_ctime = file->f_dentry->d_inode->i_mtime = |
| 13603 | + CURRENT_TIME; |
| 13604 | + if (total_written > 0) { |
| 13605 | + if (*poffset > file->f_dentry->d_inode->i_size) |
| 13606 | + file->f_dentry->d_inode->i_size = *poffset; |
| 13607 | + } |
| 13608 | + mark_inode_dirty_sync(file->f_dentry->d_inode); |
| 13609 | + } |
| 13610 | + } |
| 13611 | + FreeXid(xid); |
| 13612 | + return total_written; |
| 13613 | +} |
| 13614 | + |
| 13615 | +static int |
| 13616 | +cifs_partialpagewrite(struct page *page,unsigned from, unsigned to) |
| 13617 | +{ |
| 13618 | + struct address_space *mapping = page->mapping; |
| 13619 | + loff_t offset = (loff_t)page->index << PAGE_CACHE_SHIFT; |
| 13620 | + char * write_data; |
| 13621 | + int rc = -EFAULT; |
| 13622 | + int bytes_written = 0; |
| 13623 | + struct cifs_sb_info *cifs_sb; |
| 13624 | + struct cifsTconInfo *pTcon; |
| 13625 | + struct inode *inode; |
| 13626 | + struct cifsInodeInfo *cifsInode; |
| 13627 | + struct cifsFileInfo *open_file = NULL; |
| 13628 | + struct list_head *tmp; |
| 13629 | + struct list_head *tmp1; |
| 13630 | + |
| 13631 | + if (!mapping) { |
| 13632 | + return -EFAULT; |
| 13633 | + } else if(!mapping->host) { |
| 13634 | + return -EFAULT; |
| 13635 | + } |
| 13636 | + |
| 13637 | + inode = page->mapping->host; |
| 13638 | + cifs_sb = CIFS_SB(inode->i_sb); |
| 13639 | + pTcon = cifs_sb->tcon; |
| 13640 | + |
| 13641 | + offset += (loff_t)from; |
| 13642 | + write_data = kmap(page); |
| 13643 | + write_data += from; |
| 13644 | + |
| 13645 | + if((to > PAGE_CACHE_SIZE) || (from > to)) { |
| 13646 | + kunmap(page); |
| 13647 | + return -EIO; |
| 13648 | + } |
| 13649 | + |
| 13650 | + /* racing with truncate? */ |
| 13651 | + if(offset > mapping->host->i_size) { |
| 13652 | + kunmap(page); |
| 13653 | + return 0; /* don't care */ |
| 13654 | + } |
| 13655 | + |
| 13656 | + /* check to make sure that we are not extending the file */ |
| 13657 | + if(mapping->host->i_size - offset < (loff_t)to) |
| 13658 | + to = (unsigned)(mapping->host->i_size - offset); |
| 13659 | + |
| 13660 | + |
| 13661 | + cifsInode = CIFS_I(mapping->host); |
| 13662 | + read_lock(&GlobalSMBSeslock); |
| 13663 | + /* BB we should start at the end */ |
| 13664 | + list_for_each_safe(tmp, tmp1, &cifsInode->openFileList) { |
| 13665 | + open_file = list_entry(tmp,struct cifsFileInfo, flist); |
| 13666 | + if(open_file->closePend) |
| 13667 | + continue; |
| 13668 | + /* We check if file is open for writing first */ |
| 13669 | + if((open_file->pfile) && |
| 13670 | + ((open_file->pfile->f_flags & O_RDWR) || |
| 13671 | + (open_file->pfile->f_flags & O_WRONLY))) { |
| 13672 | + read_unlock(&GlobalSMBSeslock); |
| 13673 | + bytes_written = cifs_write(open_file->pfile, write_data, |
| 13674 | + to-from, &offset); |
| 13675 | + read_lock(&GlobalSMBSeslock); |
| 13676 | + /* Does mm or vfs already set times? */ |
| 13677 | + inode->i_atime = inode->i_mtime = CURRENT_TIME; |
| 13678 | + if ((bytes_written > 0) && (offset)) { |
| 13679 | + rc = 0; |
| 13680 | + } else if(bytes_written < 0) { |
| 13681 | + if(rc == -EBADF) { |
| 13682 | + /* have seen a case in which |
| 13683 | + kernel seemed to have closed/freed a file |
| 13684 | + even with writes active so we might as well |
| 13685 | + see if there are other file structs to try |
| 13686 | + for the same inode before giving up */ |
| 13687 | + continue; |
| 13688 | + } else |
| 13689 | + rc = bytes_written; |
| 13690 | + } |
| 13691 | + break; /* now that we found a valid file handle |
| 13692 | + and tried to write to it we are done, no |
| 13693 | + sense continuing to loop looking for another */ |
| 13694 | + } |
| 13695 | + if(tmp->next == NULL) { |
| 13696 | + cFYI(1,("File instance %p removed",tmp)); |
| 13697 | + break; |
| 13698 | + } |
| 13699 | + } |
| 13700 | + read_unlock(&GlobalSMBSeslock); |
| 13701 | + if(open_file == NULL) { |
| 13702 | + cFYI(1,("No writeable filehandles for inode")); |
| 13703 | + rc = -EIO; |
| 13704 | + } |
| 13705 | + |
| 13706 | + kunmap(page); |
| 13707 | + return rc; |
| 13708 | +} |
| 13709 | + |
| 13710 | +#if 0 |
| 13711 | +static int |
| 13712 | +cifs_writepages(struct address_space *mapping, struct writeback_control *wbc) |
| 13713 | +{ |
| 13714 | + int rc = -EFAULT; |
| 13715 | + int xid; |
| 13716 | + |
| 13717 | + xid = GetXid(); |
| 13718 | +/* call 16K write then Setpageuptodate */ |
| 13719 | + FreeXid(xid); |
| 13720 | + return rc; |
| 13721 | +} |
| 13722 | +#endif |
| 13723 | + |
| 13724 | +static int |
| 13725 | +cifs_writepage(struct page* page) |
| 13726 | +{ |
| 13727 | + int rc = -EFAULT; |
| 13728 | + int xid; |
| 13729 | + |
| 13730 | + xid = GetXid(); |
| 13731 | +/* BB add check for wbc flags */ |
| 13732 | + page_cache_get(page); |
| 13733 | + if (!Page_Uptodate(page)) { |
| 13734 | + cFYI(1,("ppw - page not up to date")); |
| 13735 | + } |
| 13736 | + |
| 13737 | + rc = cifs_partialpagewrite(page,0,PAGE_CACHE_SIZE); |
| 13738 | + SetPageUptodate(page); /* BB add check for error and Clearuptodate? */ |
| 13739 | +#if (LINUX_VERSION_CODE > KERNEL_VERSION(2,4,20)) |
| 13740 | + unlock_page(page); |
| 13741 | +#else |
| 13742 | + UnlockPage(page); |
| 13743 | +#endif |
| 13744 | + page_cache_release(page); |
| 13745 | + FreeXid(xid); |
| 13746 | + return rc; |
| 13747 | +} |
| 13748 | + |
| 13749 | +static int |
| 13750 | +cifs_commit_write(struct file *file, struct page *page, unsigned offset, |
| 13751 | + unsigned to) |
| 13752 | +{ |
| 13753 | + int xid; |
| 13754 | + int rc = 0; |
| 13755 | + struct inode *inode = page->mapping->host; |
| 13756 | + loff_t position = ((loff_t)page->index << PAGE_CACHE_SHIFT) + to; |
| 13757 | + char * page_data; |
| 13758 | + |
| 13759 | + xid = GetXid(); |
| 13760 | + cFYI(1,("commit write for page %p up to position %lld for %d",page,position,to)); |
| 13761 | + if (position > inode->i_size){ |
| 13762 | + inode->i_size = position; |
| 13763 | + /*if (file->private_data == NULL) { |
| 13764 | + rc = -EBADF; |
| 13765 | + } else { |
| 13766 | + open_file = (struct cifsFileInfo *)file->private_data; |
| 13767 | + cifs_sb = CIFS_SB(inode->i_sb); |
| 13768 | + rc = -EAGAIN; |
| 13769 | + while(rc == -EAGAIN) { |
| 13770 | + if((open_file->invalidHandle) && |
| 13771 | + (!open_file->closePend)) { |
| 13772 | + rc = cifs_reopen_file(file->f_dentry->d_inode,file); |
| 13773 | + if(rc != 0) |
| 13774 | + break; |
| 13775 | + } |
| 13776 | + if(!open_file->closePend) { |
| 13777 | + rc = CIFSSMBSetFileSize(xid, cifs_sb->tcon, |
| 13778 | + position, open_file->netfid, |
| 13779 | + open_file->pid,FALSE); |
| 13780 | + } else { |
| 13781 | + rc = -EBADF; |
| 13782 | + break; |
| 13783 | + } |
| 13784 | + } |
| 13785 | + cFYI(1,(" SetEOF (commit write) rc = %d",rc)); |
| 13786 | + }*/ |
| 13787 | + } |
| 13788 | + if (!Page_Uptodate(page)) { |
| 13789 | + position = ((loff_t)page->index << PAGE_CACHE_SHIFT) + offset; |
| 13790 | + /* can not rely on (or let) writepage write this data */ |
| 13791 | + if(to < offset) { |
| 13792 | + cFYI(1,("Illegal offsets, can not copy from %d to %d", |
| 13793 | + offset,to)); |
| 13794 | + FreeXid(xid); |
| 13795 | + return rc; |
| 13796 | + } |
| 13797 | + /* this is probably better than directly calling |
| 13798 | + partialpage_write since in this function |
| 13799 | + the file handle is known which we might as well |
| 13800 | + leverage */ |
| 13801 | + /* BB check if anything else missing out of ppw */ |
| 13802 | + /* such as updating last write time */ |
| 13803 | + page_data = kmap(page); |
| 13804 | + rc = cifs_write(file, page_data+offset,to-offset, |
| 13805 | + &position); |
| 13806 | + if(rc > 0) |
| 13807 | + rc = 0; |
| 13808 | + /* else if rc < 0 should we set writebehind rc? */ |
| 13809 | + kunmap(page); |
| 13810 | + } else { |
| 13811 | + set_page_dirty(page); |
| 13812 | + } |
| 13813 | + |
| 13814 | + FreeXid(xid); |
| 13815 | + return rc; |
| 13816 | +} |
| 13817 | + |
| 13818 | +int |
| 13819 | +cifs_fsync(struct file *file, struct dentry *dentry, int datasync) |
| 13820 | +{ |
| 13821 | + int xid; |
| 13822 | + int rc = 0; |
| 13823 | + struct inode * inode = file->f_dentry->d_inode; |
| 13824 | + |
| 13825 | + xid = GetXid(); |
| 13826 | + |
| 13827 | + cFYI(1, ("Sync file - name: %s datasync: 0x%x ", |
| 13828 | + dentry->d_name.name, datasync)); |
| 13829 | +#if (LINUX_VERSION_CODE > KERNEL_VERSION(2,4,17)) |
| 13830 | + rc = filemap_fdatasync(inode->i_mapping); |
| 13831 | +#else |
| 13832 | + filemap_fdatasync(inode->i_mapping); |
| 13833 | +#endif |
| 13834 | + if(rc == 0) |
| 13835 | + CIFS_I(inode)->write_behind_rc = 0; |
| 13836 | + FreeXid(xid); |
| 13837 | + return rc; |
| 13838 | +} |
| 13839 | + |
| 13840 | +static int |
| 13841 | +cifs_sync_page(struct page *page) |
| 13842 | +{ |
| 13843 | + struct address_space *mapping; |
| 13844 | + struct inode *inode; |
| 13845 | + unsigned long index = page->index; |
| 13846 | + unsigned int rpages = 0; |
| 13847 | + int rc = 0; |
| 13848 | + |
| 13849 | + cFYI(1,("sync page %p",page)); |
| 13850 | + mapping = page->mapping; |
| 13851 | + if (!mapping) |
| 13852 | + return 0; |
| 13853 | + inode = mapping->host; |
| 13854 | + if (!inode) |
| 13855 | + return 0; |
| 13856 | + |
| 13857 | +/* fill in rpages then |
| 13858 | + result = cifs_pagein_inode(inode, index, rpages); *//* BB finish */ |
| 13859 | + |
| 13860 | + cFYI(1, ("rpages is %d for sync page of Index %ld ", rpages, index)); |
| 13861 | + |
| 13862 | + if (rc < 0) |
| 13863 | + return rc; |
| 13864 | + return 0; |
| 13865 | +} |
| 13866 | + |
| 13867 | +/* |
| 13868 | + * As file closes, flush all cached write data for this inode checking |
| 13869 | + * for write behind errors. |
| 13870 | + * |
| 13871 | + */ |
| 13872 | +int cifs_flush(struct file *file) |
| 13873 | +{ |
| 13874 | + struct inode * inode = file->f_dentry->d_inode; |
| 13875 | + int rc = 0; |
| 13876 | + |
| 13877 | + /* Rather than do the steps manually: */ |
| 13878 | + /* lock the inode for writing */ |
| 13879 | + /* loop through pages looking for write behind data (dirty pages) */ |
| 13880 | + /* coalesce into contiguous 16K (or smaller) chunks to write to server */ |
| 13881 | + /* send to server (prefer in parallel) */ |
| 13882 | + /* deal with writebehind errors */ |
| 13883 | + /* unlock inode for writing */ |
| 13884 | + /* filemapfdatawrite appears easier for the time being */ |
| 13885 | +#if (LINUX_VERSION_CODE > KERNEL_VERSION(2,4,17)) |
| 13886 | + rc = filemap_fdatasync(inode->i_mapping); |
| 13887 | +#else |
| 13888 | + filemap_fdatasync(inode->i_mapping); |
| 13889 | +#endif |
| 13890 | + if(rc == 0) /* reset wb rc if we were able to write out dirty pages */ |
| 13891 | + CIFS_I(inode)->write_behind_rc = 0; |
| 13892 | + |
| 13893 | + cFYI(1,("Flush inode %p file %p rc %d",inode,file,rc)); |
| 13894 | + |
| 13895 | + return rc; |
| 13896 | +} |
| 13897 | + |
| 13898 | + |
| 13899 | +ssize_t |
| 13900 | +cifs_read(struct file * file, char *read_data, size_t read_size, |
| 13901 | + loff_t * poffset) |
| 13902 | +{ |
| 13903 | + int rc = -EACCES; |
| 13904 | + unsigned int bytes_read = 0; |
| 13905 | + unsigned int total_read; |
| 13906 | + unsigned int current_read_size; |
| 13907 | + struct cifs_sb_info *cifs_sb; |
| 13908 | + struct cifsTconInfo *pTcon; |
| 13909 | + int xid; |
| 13910 | + char * current_offset; |
| 13911 | + struct cifsFileInfo * open_file; |
| 13912 | + |
| 13913 | + xid = GetXid(); |
| 13914 | + cifs_sb = CIFS_SB(file->f_dentry->d_sb); |
| 13915 | + pTcon = cifs_sb->tcon; |
| 13916 | + |
| 13917 | + if (file->private_data == NULL) { |
| 13918 | + FreeXid(xid); |
| 13919 | + return -EBADF; |
| 13920 | + } |
| 13921 | + open_file = (struct cifsFileInfo *)file->private_data; |
| 13922 | + |
| 13923 | + if((file->f_flags & O_ACCMODE) == O_WRONLY) { |
| 13924 | + cFYI(1,("attempting read on write only file instance")); |
| 13925 | + } |
| 13926 | + |
| 13927 | + for (total_read = 0,current_offset=read_data; read_size > total_read; |
| 13928 | + total_read += bytes_read,current_offset+=bytes_read) { |
| 13929 | +#if (LINUX_VERSION_CODE > KERNEL_VERSION(2,4,15)) |
| 13930 | + current_read_size = min_t(const int,read_size - total_read,cifs_sb->rsize); |
| 13931 | +#else |
| 13932 | + current_read_size = min(read_size - total_read,cifs_sb->rsize); |
| 13933 | +#endif |
| 13934 | + rc = -EAGAIN; |
| 13935 | + while(rc == -EAGAIN) { |
| 13936 | + if ((open_file->invalidHandle) && (!open_file->closePend)) { |
| 13937 | + rc = cifs_reopen_file(file->f_dentry->d_inode, |
| 13938 | + file,TRUE); |
| 13939 | + if(rc != 0) |
| 13940 | + break; |
| 13941 | + } |
| 13942 | + |
| 13943 | + rc = CIFSSMBRead(xid, pTcon, |
| 13944 | + open_file->netfid, |
| 13945 | + current_read_size, *poffset, |
| 13946 | + &bytes_read, ¤t_offset); |
| 13947 | + } |
| 13948 | + if (rc || (bytes_read == 0)) { |
| 13949 | + if (total_read) { |
| 13950 | + break; |
| 13951 | + } else { |
| 13952 | + FreeXid(xid); |
| 13953 | + return rc; |
| 13954 | + } |
| 13955 | + } else { |
| 13956 | +#ifdef CONFIG_CIFS_STATS |
| 13957 | + atomic_inc(&pTcon->num_reads); |
| 13958 | + spin_lock(&pTcon->stat_lock); |
| 13959 | + pTcon->bytes_read += total_read; |
| 13960 | + spin_unlock(&pTcon->stat_lock); |
| 13961 | +#endif |
| 13962 | + *poffset += bytes_read; |
| 13963 | + } |
| 13964 | + } |
| 13965 | + FreeXid(xid); |
| 13966 | + return total_read; |
| 13967 | +} |
| 13968 | + |
| 13969 | +int cifs_file_mmap(struct file * file, struct vm_area_struct * vma) |
| 13970 | +{ |
| 13971 | + struct dentry * dentry = file->f_dentry; |
| 13972 | + int rc, xid; |
| 13973 | + |
| 13974 | + xid = GetXid(); |
| 13975 | + rc = cifs_revalidate(dentry); |
| 13976 | + if (rc) { |
| 13977 | + cFYI(1,("Validation prior to mmap failed, error=%d", rc)); |
| 13978 | + FreeXid(xid); |
| 13979 | + return rc; |
| 13980 | + } |
| 13981 | + rc = generic_file_mmap(file, vma); |
| 13982 | + FreeXid(xid); |
| 13983 | + return rc; |
| 13984 | +} |
| 13985 | + |
| 13986 | +#if (LINUX_VERSION_CODE > KERNEL_VERSION(2,5,0)) |
| 13987 | +static void cifs_copy_cache_pages(struct address_space *mapping, |
| 13988 | + struct list_head *pages, int bytes_read, |
| 13989 | + char *data,struct pagevec * plru_pvec) |
| 13990 | +{ |
| 13991 | + struct page *page; |
| 13992 | + char * target; |
| 13993 | + |
| 13994 | + while (bytes_read > 0) { |
| 13995 | + if(list_empty(pages)) |
| 13996 | + break; |
| 13997 | + |
| 13998 | + page = list_entry(pages->prev, struct page, lru); |
| 13999 | + list_del(&page->lru); |
| 14000 | + |
| 14001 | + if (add_to_page_cache(page, mapping, page->index, GFP_KERNEL)) { |
| 14002 | + page_cache_release(page); |
| 14003 | + cFYI(1,("Add page cache failed")); |
| 14004 | + continue; |
| 14005 | + } |
| 14006 | + |
| 14007 | + target = kmap_atomic(page,KM_USER0); |
| 14008 | + |
| 14009 | + if(PAGE_CACHE_SIZE > bytes_read) { |
| 14010 | + memcpy(target,data,bytes_read); |
| 14011 | + /* zero the tail end of this partial page */ |
| 14012 | + memset(target+bytes_read,0,PAGE_CACHE_SIZE-bytes_read); |
| 14013 | + bytes_read = 0; |
| 14014 | + } else { |
| 14015 | + memcpy(target,data,PAGE_CACHE_SIZE); |
| 14016 | + bytes_read -= PAGE_CACHE_SIZE; |
| 14017 | + } |
| 14018 | + kunmap_atomic(target,KM_USER0); |
| 14019 | + |
| 14020 | + flush_dcache_page(page); |
| 14021 | + SetPageUptodate(page); |
| 14022 | + unlock_page(page); |
| 14023 | + if (!pagevec_add(plru_pvec, page)) |
| 14024 | + __pagevec_lru_add(plru_pvec); |
| 14025 | + data += PAGE_CACHE_SIZE; |
| 14026 | + } |
| 14027 | + return; |
| 14028 | +} |
| 14029 | + |
| 14030 | + |
| 14031 | +static int |
| 14032 | +cifs_readpages(struct file *file, struct address_space *mapping, |
| 14033 | + struct list_head *page_list, unsigned num_pages) |
| 14034 | +{ |
| 14035 | + int rc = -EACCES; |
| 14036 | + int xid; |
| 14037 | + loff_t offset; |
| 14038 | + struct page * page; |
| 14039 | + struct cifs_sb_info *cifs_sb; |
| 14040 | + struct cifsTconInfo *pTcon; |
| 14041 | + int bytes_read = 0; |
| 14042 | + unsigned int read_size,i; |
| 14043 | + char * smb_read_data = NULL; |
| 14044 | + struct smb_com_read_rsp * pSMBr; |
| 14045 | + struct pagevec lru_pvec; |
| 14046 | + struct cifsFileInfo * open_file; |
| 14047 | + |
| 14048 | + xid = GetXid(); |
| 14049 | + if (file->private_data == NULL) { |
| 14050 | + FreeXid(xid); |
| 14051 | + return -EBADF; |
| 14052 | + } |
| 14053 | + open_file = (struct cifsFileInfo *)file->private_data; |
| 14054 | + cifs_sb = CIFS_SB(file->f_dentry->d_sb); |
| 14055 | + pTcon = cifs_sb->tcon; |
| 14056 | + |
| 14057 | + pagevec_init(&lru_pvec, 0); |
| 14058 | + |
| 14059 | + for(i = 0;i<num_pages;) { |
| 14060 | + unsigned contig_pages; |
| 14061 | + struct page * tmp_page; |
| 14062 | + unsigned long expected_index; |
| 14063 | + |
| 14064 | + if(list_empty(page_list)) { |
| 14065 | + break; |
| 14066 | + } |
| 14067 | + page = list_entry(page_list->prev, struct page, lru); |
| 14068 | + offset = (loff_t)page->index << PAGE_CACHE_SHIFT; |
| 14069 | + |
| 14070 | + /* count adjacent pages that we will read into */ |
| 14071 | + contig_pages = 0; |
| 14072 | + expected_index = list_entry(page_list->prev,struct page,lru)->index; |
| 14073 | + list_for_each_entry_reverse(tmp_page,page_list,lru) { |
| 14074 | + if(tmp_page->index == expected_index) { |
| 14075 | + contig_pages++; |
| 14076 | + expected_index++; |
| 14077 | + } else { |
| 14078 | + break; |
| 14079 | + } |
| 14080 | + } |
| 14081 | + if(contig_pages + i > num_pages) { |
| 14082 | + contig_pages = num_pages - i; |
| 14083 | + } |
| 14084 | + |
| 14085 | + /* for reads over a certain size could initiate async read ahead */ |
| 14086 | + |
| 14087 | + read_size = contig_pages * PAGE_CACHE_SIZE; |
| 14088 | + /* Read size needs to be in multiples of one page */ |
| 14089 | + read_size = min_t(const unsigned int,read_size,cifs_sb->rsize & PAGE_CACHE_MASK); |
| 14090 | + |
| 14091 | + rc = -EAGAIN; |
| 14092 | + while(rc == -EAGAIN) { |
| 14093 | + if ((open_file->invalidHandle) && (!open_file->closePend)) { |
| 14094 | + rc = cifs_reopen_file(file->f_dentry->d_inode, |
| 14095 | + file, TRUE); |
| 14096 | + if(rc != 0) |
| 14097 | + break; |
| 14098 | + } |
| 14099 | + |
| 14100 | + rc = CIFSSMBRead(xid, pTcon, |
| 14101 | + open_file->netfid, |
| 14102 | + read_size, offset, |
| 14103 | + &bytes_read, &smb_read_data); |
| 14104 | + /* BB need to check return code here */ |
| 14105 | + if(rc== -EAGAIN) { |
| 14106 | + if(smb_read_data) { |
| 14107 | + cifs_buf_release(smb_read_data); |
| 14108 | + smb_read_data = NULL; |
| 14109 | + } |
| 14110 | + } |
| 14111 | + } |
| 14112 | + if ((rc < 0) || (smb_read_data == NULL)) { |
| 14113 | + cFYI(1,("Read error in readpages: %d",rc)); |
| 14114 | + /* clean up remaing pages off list */ |
| 14115 | + while (!list_empty(page_list) && (i < num_pages)) { |
| 14116 | + page = list_entry(page_list->prev, struct page, lru); |
| 14117 | + list_del(&page->lru); |
| 14118 | + page_cache_release(page); |
| 14119 | + } |
| 14120 | + break; |
| 14121 | + } else if (bytes_read > 0) { |
| 14122 | + pSMBr = (struct smb_com_read_rsp *)smb_read_data; |
| 14123 | + cifs_copy_cache_pages(mapping, page_list, bytes_read, |
| 14124 | + smb_read_data + 4 /* RFC1001 hdr */ + |
| 14125 | + le16_to_cpu(pSMBr->DataOffset), &lru_pvec); |
| 14126 | + |
| 14127 | + i += bytes_read >> PAGE_CACHE_SHIFT; |
| 14128 | +#ifdef CONFIG_CIFS_STATS |
| 14129 | + atomic_inc(&pTcon->num_reads); |
| 14130 | + spin_lock(&pTcon->stat_lock); |
| 14131 | + pTcon->bytes_read += bytes_read; |
| 14132 | + spin_unlock(&pTcon->stat_lock); |
| 14133 | +#endif |
| 14134 | + if((int)(bytes_read & PAGE_CACHE_MASK) != bytes_read) { |
| 14135 | + cFYI(1,("Partial page %d of %d read to cache",i++,num_pages)); |
| 14136 | + |
| 14137 | + i++; /* account for partial page */ |
| 14138 | + |
| 14139 | + /* server copy of file can have smaller size than client */ |
| 14140 | + /* BB do we need to verify this common case ? this case is ok - |
| 14141 | + if we are at server EOF we will hit it on next read */ |
| 14142 | + |
| 14143 | + /* while(!list_empty(page_list) && (i < num_pages)) { |
| 14144 | + page = list_entry(page_list->prev,struct page, list); |
| 14145 | + list_del(&page->list); |
| 14146 | + page_cache_release(page); |
| 14147 | + } |
| 14148 | + break; */ |
| 14149 | + } |
| 14150 | + } else { |
| 14151 | + cFYI(1,("No bytes read (%d) at offset %lld . Cleaning remaining pages from readahead list",bytes_read,offset)); |
| 14152 | + /* BB turn off caching and do new lookup on file size at server? */ |
| 14153 | + while (!list_empty(page_list) && (i < num_pages)) { |
| 14154 | + page = list_entry(page_list->prev, struct page, lru); |
| 14155 | + list_del(&page->lru); |
| 14156 | + page_cache_release(page); /* BB removeme - replace with zero of page? */ |
| 14157 | + } |
| 14158 | + break; |
| 14159 | + } |
| 14160 | + if(smb_read_data) { |
| 14161 | + cifs_buf_release(smb_read_data); |
| 14162 | + smb_read_data = NULL; |
| 14163 | + } |
| 14164 | + bytes_read = 0; |
| 14165 | + } |
| 14166 | + |
| 14167 | + pagevec_lru_add(&lru_pvec); |
| 14168 | + |
| 14169 | +/* need to free smb_read_data buf before exit */ |
| 14170 | + if(smb_read_data) { |
| 14171 | + cifs_buf_release(smb_read_data); |
| 14172 | + smb_read_data = NULL; |
| 14173 | + } |
| 14174 | + |
| 14175 | + FreeXid(xid); |
| 14176 | + return rc; |
| 14177 | +} |
| 14178 | +#endif |
| 14179 | + |
| 14180 | +static int cifs_readpage_worker(struct file *file, struct page *page, loff_t * poffset) |
| 14181 | +{ |
| 14182 | + char * read_data; |
| 14183 | + int rc; |
| 14184 | + |
| 14185 | + page_cache_get(page); |
| 14186 | + read_data = kmap(page); |
| 14187 | + /* for reads over a certain size could initiate async read ahead */ |
| 14188 | + |
| 14189 | + rc = cifs_read(file, read_data, PAGE_CACHE_SIZE, poffset); |
| 14190 | + |
| 14191 | + if (rc < 0) |
| 14192 | + goto io_error; |
| 14193 | + else { |
| 14194 | + cFYI(1,("Bytes read %d ",rc)); |
| 14195 | + } |
| 14196 | + |
| 14197 | + file->f_dentry->d_inode->i_atime = CURRENT_TIME; |
| 14198 | + |
| 14199 | + if(PAGE_CACHE_SIZE > rc) { |
| 14200 | + memset(read_data+rc, 0, PAGE_CACHE_SIZE - rc); |
| 14201 | + } |
| 14202 | + flush_dcache_page(page); |
| 14203 | + SetPageUptodate(page); |
| 14204 | + rc = 0; |
| 14205 | + |
| 14206 | +io_error: |
| 14207 | + kunmap(page); |
| 14208 | + page_cache_release(page); |
| 14209 | + return rc; |
| 14210 | +} |
| 14211 | + |
| 14212 | +static int |
| 14213 | +cifs_readpage(struct file *file, struct page *page) |
| 14214 | +{ |
| 14215 | + loff_t offset = (loff_t)page->index << PAGE_CACHE_SHIFT; |
| 14216 | + int rc = -EACCES; |
| 14217 | + int xid; |
| 14218 | + |
| 14219 | + xid = GetXid(); |
| 14220 | + |
| 14221 | + if (file->private_data == NULL) { |
| 14222 | + FreeXid(xid); |
| 14223 | + return -EBADF; |
| 14224 | + } |
| 14225 | + |
| 14226 | + cFYI(1,("readpage %p at offset %d 0x%x\n",page,(int)offset,(int)offset)); |
| 14227 | + |
| 14228 | + rc = cifs_readpage_worker(file,page,&offset); |
| 14229 | + |
| 14230 | +#if (LINUX_VERSION_CODE > KERNEL_VERSION(2,4,20)) |
| 14231 | + unlock_page(page); |
| 14232 | +#else |
| 14233 | + UnlockPage(page); |
| 14234 | +#endif |
| 14235 | + |
| 14236 | + FreeXid(xid); |
| 14237 | + return rc; |
| 14238 | +} |
| 14239 | + |
| 14240 | +/* We do not want to update the file size from server for inodes |
| 14241 | + open for write - to avoid races with writepage extending |
| 14242 | + the file - in the future we could consider allowing |
| 14243 | + refreshing the inode only on increases in the file size |
| 14244 | + but this is tricky to do without racing with writebehind |
| 14245 | + page caching in the current Linux kernel design */ |
| 14246 | + |
| 14247 | +int is_size_safe_to_change(struct cifsInodeInfo * cifsInode) |
| 14248 | +{ |
| 14249 | + struct list_head *tmp; |
| 14250 | + struct list_head *tmp1; |
| 14251 | + struct cifsFileInfo *open_file = NULL; |
| 14252 | + int rc = TRUE; |
| 14253 | + |
| 14254 | + if(cifsInode == NULL) |
| 14255 | + return rc; |
| 14256 | + |
| 14257 | + read_lock(&GlobalSMBSeslock); |
| 14258 | + list_for_each_safe(tmp, tmp1, &cifsInode->openFileList) { |
| 14259 | + open_file = list_entry(tmp,struct cifsFileInfo, flist); |
| 14260 | + if(open_file == NULL) |
| 14261 | + break; |
| 14262 | + if(open_file->closePend) |
| 14263 | + continue; |
| 14264 | + /* We check if file is open for writing, |
| 14265 | + BB we could supplement this with a check to see if file size |
| 14266 | + changes have been flushed to server - ie inode metadata dirty */ |
| 14267 | + if((open_file->pfile) && |
| 14268 | + ((open_file->pfile->f_flags & O_RDWR) || |
| 14269 | + (open_file->pfile->f_flags & O_WRONLY))) { |
| 14270 | + rc = FALSE; |
| 14271 | + break; |
| 14272 | + } |
| 14273 | + if(tmp->next == NULL) { |
| 14274 | + cFYI(1,("File instance %p removed",tmp)); |
| 14275 | + break; |
| 14276 | + } |
| 14277 | + } |
| 14278 | + read_unlock(&GlobalSMBSeslock); |
| 14279 | + return rc; |
| 14280 | +} |
| 14281 | + |
| 14282 | + |
| 14283 | +void |
| 14284 | +fill_in_inode(struct inode *tmp_inode, |
| 14285 | + FILE_DIRECTORY_INFO * pfindData, int *pobject_type) |
| 14286 | +{ |
| 14287 | + struct cifsInodeInfo *cifsInfo = CIFS_I(tmp_inode); |
| 14288 | + struct cifs_sb_info *cifs_sb = CIFS_SB(tmp_inode->i_sb); |
| 14289 | + |
| 14290 | + pfindData->ExtFileAttributes = |
| 14291 | + le32_to_cpu(pfindData->ExtFileAttributes); |
| 14292 | + pfindData->AllocationSize = le64_to_cpu(pfindData->AllocationSize); |
| 14293 | + pfindData->EndOfFile = le64_to_cpu(pfindData->EndOfFile); |
| 14294 | + cifsInfo->cifsAttrs = pfindData->ExtFileAttributes; |
| 14295 | + cifsInfo->time = jiffies; |
| 14296 | + |
| 14297 | + /* Linux can not store file creation time unfortunately so ignore it */ |
| 14298 | + tmp_inode->i_atime = |
| 14299 | + cifs_NTtimeToUnix(le64_to_cpu(pfindData->LastAccessTime)); |
| 14300 | + tmp_inode->i_mtime = |
| 14301 | + cifs_NTtimeToUnix(le64_to_cpu(pfindData->LastWriteTime)); |
| 14302 | + tmp_inode->i_ctime = |
| 14303 | + cifs_NTtimeToUnix(le64_to_cpu(pfindData->ChangeTime)); |
| 14304 | + /* treat dos attribute of read-only as read-only mode bit e.g. 555? */ |
| 14305 | + /* 2767 perms - indicate mandatory locking */ |
| 14306 | + /* BB fill in uid and gid here? with help from winbind? |
| 14307 | + or retrieve from NTFS stream extended attribute */ |
| 14308 | + if(atomic_read(&cifsInfo->inUse) == 0) { |
| 14309 | + tmp_inode->i_uid = cifs_sb->mnt_uid; |
| 14310 | + tmp_inode->i_gid = cifs_sb->mnt_gid; |
| 14311 | + /* set default mode. will override for dirs below */ |
| 14312 | + tmp_inode->i_mode = cifs_sb->mnt_file_mode; |
| 14313 | + } |
| 14314 | + |
| 14315 | + cFYI(0, |
| 14316 | + ("CIFS FFIRST: Attributes came in as 0x%x", |
| 14317 | + pfindData->ExtFileAttributes)); |
| 14318 | + if (pfindData->ExtFileAttributes & ATTR_REPARSE) { |
| 14319 | + *pobject_type = DT_LNK; |
| 14320 | + /* BB can this and S_IFREG or S_IFDIR be set as in Windows? */ |
| 14321 | + tmp_inode->i_mode |= S_IFLNK; |
| 14322 | + } else if (pfindData->ExtFileAttributes & ATTR_DIRECTORY) { |
| 14323 | + *pobject_type = DT_DIR; |
| 14324 | + /* override default perms since we do not lock dirs */ |
| 14325 | + if(atomic_read(&cifsInfo->inUse) == 0) { |
| 14326 | + tmp_inode->i_mode = cifs_sb->mnt_dir_mode; |
| 14327 | + } |
| 14328 | + tmp_inode->i_mode |= S_IFDIR; |
| 14329 | + } else { |
| 14330 | + *pobject_type = DT_REG; |
| 14331 | + tmp_inode->i_mode |= S_IFREG; |
| 14332 | + if(pfindData->ExtFileAttributes & ATTR_READONLY) |
| 14333 | + tmp_inode->i_mode &= ~(S_IWUGO); |
| 14334 | + |
| 14335 | + }/* could add code here - to validate if device or weird share type? */ |
| 14336 | + |
| 14337 | + /* can not fill in nlink here as in qpathinfo version and Unx search */ |
| 14338 | + if(atomic_read(&cifsInfo->inUse) == 0) { |
| 14339 | + atomic_set(&cifsInfo->inUse,1); |
| 14340 | + } |
| 14341 | + if(is_size_safe_to_change(cifsInfo)) { |
| 14342 | + /* can not safely change the file size here if the |
| 14343 | + client is writing to it due to potential races */ |
| 14344 | + tmp_inode->i_size = pfindData->EndOfFile; |
| 14345 | + |
| 14346 | + /* 512 bytes (2**9) is the fake blocksize that must be used */ |
| 14347 | + /* for this calculation, even though the reported blocksize is larger */ |
| 14348 | + tmp_inode->i_blocks = (512 - 1 + pfindData->AllocationSize) >> 9; |
| 14349 | + } |
| 14350 | + |
| 14351 | + if (pfindData->AllocationSize < pfindData->EndOfFile) |
| 14352 | + cFYI(1, ("Possible sparse file: allocation size less than end of file ")); |
| 14353 | + cFYI(1, |
| 14354 | + ("File Size %ld and blocks %ld and blocksize %ld", |
| 14355 | + (unsigned long) tmp_inode->i_size, tmp_inode->i_blocks, |
| 14356 | + tmp_inode->i_blksize)); |
| 14357 | + if (S_ISREG(tmp_inode->i_mode)) { |
| 14358 | + cFYI(1, (" File inode ")); |
| 14359 | + tmp_inode->i_op = &cifs_file_inode_ops; |
| 14360 | + tmp_inode->i_fop = &cifs_file_ops; |
| 14361 | + tmp_inode->i_data.a_ops = &cifs_addr_ops; |
| 14362 | + } else if (S_ISDIR(tmp_inode->i_mode)) { |
| 14363 | + cFYI(1, (" Directory inode")); |
| 14364 | + tmp_inode->i_op = &cifs_dir_inode_ops; |
| 14365 | + tmp_inode->i_fop = &cifs_dir_ops; |
| 14366 | + } else if (S_ISLNK(tmp_inode->i_mode)) { |
| 14367 | + cFYI(1, (" Symbolic Link inode ")); |
| 14368 | + tmp_inode->i_op = &cifs_symlink_inode_ops; |
| 14369 | + } else { |
| 14370 | + cFYI(1, (" Init special inode ")); |
| 14371 | + init_special_inode(tmp_inode, tmp_inode->i_mode, |
| 14372 | + kdev_t_to_nr(tmp_inode->i_rdev)); |
| 14373 | + } |
| 14374 | +} |
| 14375 | + |
| 14376 | +void |
| 14377 | +unix_fill_in_inode(struct inode *tmp_inode, |
| 14378 | + FILE_UNIX_INFO * pfindData, int *pobject_type) |
| 14379 | +{ |
| 14380 | + struct cifsInodeInfo *cifsInfo = CIFS_I(tmp_inode); |
| 14381 | + cifsInfo->time = jiffies; |
| 14382 | + atomic_inc(&cifsInfo->inUse); |
| 14383 | + |
| 14384 | + tmp_inode->i_atime = |
| 14385 | + cifs_NTtimeToUnix(le64_to_cpu(pfindData->LastAccessTime)); |
| 14386 | + tmp_inode->i_mtime = |
| 14387 | + cifs_NTtimeToUnix(le64_to_cpu(pfindData->LastModificationTime)); |
| 14388 | + tmp_inode->i_ctime = |
| 14389 | + cifs_NTtimeToUnix(le64_to_cpu(pfindData->LastStatusChange)); |
| 14390 | + |
| 14391 | + tmp_inode->i_mode = le64_to_cpu(pfindData->Permissions); |
| 14392 | + pfindData->Type = le32_to_cpu(pfindData->Type); |
| 14393 | + if (pfindData->Type == UNIX_FILE) { |
| 14394 | + *pobject_type = DT_REG; |
| 14395 | + tmp_inode->i_mode |= S_IFREG; |
| 14396 | + } else if (pfindData->Type == UNIX_SYMLINK) { |
| 14397 | + *pobject_type = DT_LNK; |
| 14398 | + tmp_inode->i_mode |= S_IFLNK; |
| 14399 | + } else if (pfindData->Type == UNIX_DIR) { |
| 14400 | + *pobject_type = DT_DIR; |
| 14401 | + tmp_inode->i_mode |= S_IFDIR; |
| 14402 | + } else if (pfindData->Type == UNIX_CHARDEV) { |
| 14403 | + *pobject_type = DT_CHR; |
| 14404 | + tmp_inode->i_mode |= S_IFCHR; |
| 14405 | + tmp_inode->i_rdev = MKDEV(le64_to_cpu(pfindData->DevMajor), |
| 14406 | + le64_to_cpu(pfindData->DevMinor) & MINORMASK); |
| 14407 | + } else if (pfindData->Type == UNIX_BLOCKDEV) { |
| 14408 | + *pobject_type = DT_BLK; |
| 14409 | + tmp_inode->i_mode |= S_IFBLK; |
| 14410 | + tmp_inode->i_rdev = MKDEV(le64_to_cpu(pfindData->DevMajor), |
| 14411 | + le64_to_cpu(pfindData->DevMinor) & MINORMASK); |
| 14412 | + } else if (pfindData->Type == UNIX_FIFO) { |
| 14413 | + *pobject_type = DT_FIFO; |
| 14414 | + tmp_inode->i_mode |= S_IFIFO; |
| 14415 | + } else if (pfindData->Type == UNIX_SOCKET) { |
| 14416 | + *pobject_type = DT_SOCK; |
| 14417 | + tmp_inode->i_mode |= S_IFSOCK; |
| 14418 | + } |
| 14419 | + |
| 14420 | + tmp_inode->i_uid = le64_to_cpu(pfindData->Uid); |
| 14421 | + tmp_inode->i_gid = le64_to_cpu(pfindData->Gid); |
| 14422 | + tmp_inode->i_nlink = le64_to_cpu(pfindData->Nlinks); |
| 14423 | + |
| 14424 | + pfindData->NumOfBytes = le64_to_cpu(pfindData->NumOfBytes); |
| 14425 | + if(is_size_safe_to_change(cifsInfo)) { |
| 14426 | + /* can not safely change the file size here if the |
| 14427 | + client is writing to it due to potential races */ |
| 14428 | + pfindData->EndOfFile = le64_to_cpu(pfindData->EndOfFile); |
| 14429 | + tmp_inode->i_size = pfindData->EndOfFile; |
| 14430 | + |
| 14431 | + /* 512 bytes (2**9) is the fake blocksize that must be used */ |
| 14432 | + /* for this calculation, not the real blocksize */ |
| 14433 | + tmp_inode->i_blocks = (512 - 1 + pfindData->NumOfBytes) >> 9; |
| 14434 | + } |
| 14435 | + |
| 14436 | + if (S_ISREG(tmp_inode->i_mode)) { |
| 14437 | + cFYI(1, ("File inode")); |
| 14438 | + tmp_inode->i_op = &cifs_file_inode_ops; |
| 14439 | + tmp_inode->i_fop = &cifs_file_ops; |
| 14440 | + tmp_inode->i_data.a_ops = &cifs_addr_ops; |
| 14441 | + } else if (S_ISDIR(tmp_inode->i_mode)) { |
| 14442 | + cFYI(1, ("Directory inode")); |
| 14443 | + tmp_inode->i_op = &cifs_dir_inode_ops; |
| 14444 | + tmp_inode->i_fop = &cifs_dir_ops; |
| 14445 | + } else if (S_ISLNK(tmp_inode->i_mode)) { |
| 14446 | + cFYI(1, ("Symbolic Link inode")); |
| 14447 | + tmp_inode->i_op = &cifs_symlink_inode_ops; |
| 14448 | +/* tmp_inode->i_fop = *//* do not need to set to anything */ |
| 14449 | + } else { |
| 14450 | + cFYI(1, ("Special inode")); |
| 14451 | + init_special_inode(tmp_inode, tmp_inode->i_mode, |
| 14452 | + kdev_t_to_nr(tmp_inode->i_rdev)); |
| 14453 | + } |
| 14454 | +} |
| 14455 | + |
| 14456 | +static void |
| 14457 | +construct_dentry(struct qstr *qstring, struct file *file, |
| 14458 | + struct inode **ptmp_inode, struct dentry **pnew_dentry) |
| 14459 | +{ |
| 14460 | + struct dentry *tmp_dentry; |
| 14461 | + struct cifs_sb_info *cifs_sb; |
| 14462 | + struct cifsTconInfo *pTcon; |
| 14463 | + struct cifsInodeInfo *pCifsI; |
| 14464 | + |
| 14465 | + cFYI(1, ("For %s ", qstring->name)); |
| 14466 | + cifs_sb = CIFS_SB(file->f_dentry->d_sb); |
| 14467 | + pTcon = cifs_sb->tcon; |
| 14468 | + |
| 14469 | + qstring->hash = full_name_hash(qstring->name, qstring->len); |
| 14470 | + tmp_dentry = d_lookup(file->f_dentry, qstring); |
| 14471 | + if (tmp_dentry) { |
| 14472 | + cFYI(0, (" existing dentry with inode 0x%p", tmp_dentry->d_inode)); |
| 14473 | + *ptmp_inode = tmp_dentry->d_inode; |
| 14474 | + /* BB overwrite the old name? i.e. tmp_dentry->d_name and tmp_dentry->d_name.len ?? */ |
| 14475 | + if(*ptmp_inode == NULL) { |
| 14476 | + *ptmp_inode = new_inode(file->f_dentry->d_sb); |
| 14477 | + if(*ptmp_inode == NULL) |
| 14478 | + return; |
| 14479 | + d_instantiate(tmp_dentry, *ptmp_inode); |
| 14480 | + insert_inode_hash(*ptmp_inode); |
| 14481 | + pCifsI = CIFS_I(*ptmp_inode); |
| 14482 | + INIT_LIST_HEAD(&pCifsI->openFileList); |
| 14483 | + /* can not enable caching for this inode |
| 14484 | + until a file instance is open and we |
| 14485 | + can check the oplock flag on the open |
| 14486 | + response */ |
| 14487 | + (*ptmp_inode)->i_blksize = CIFS_MAX_MSGSIZE; |
| 14488 | +#if (LINUX_VERSION_CODE > KERNEL_VERSION(2,4,15)) |
| 14489 | + (*ptmp_inode)->i_blkbits = 14; /* 2**14 = CIFS_MAX_MSGSIZE */ |
| 14490 | +#endif |
| 14491 | + pCifsI->clientCanCacheRead = FALSE; |
| 14492 | + pCifsI->clientCanCacheAll = FALSE; |
| 14493 | + pCifsI->time = 0; |
| 14494 | + /* do not need to set cifs Attrs since |
| 14495 | + they are about to be overwritten |
| 14496 | + in fill_in_inode */ |
| 14497 | + atomic_set(&pCifsI->inUse, 0); |
| 14498 | + } |
| 14499 | + } else { |
| 14500 | + tmp_dentry = d_alloc(file->f_dentry, qstring); |
| 14501 | + if(tmp_dentry == NULL) { |
| 14502 | + cERROR(1,("Failed allocating dentry")); |
| 14503 | + return; |
| 14504 | + } |
| 14505 | + |
| 14506 | + if(ptmp_inode) { |
| 14507 | + *ptmp_inode = new_inode(file->f_dentry->d_sb); |
| 14508 | + if(*ptmp_inode == NULL) |
| 14509 | + return; |
| 14510 | + pCifsI = CIFS_I(*ptmp_inode); |
| 14511 | + insert_inode_hash(*ptmp_inode); |
| 14512 | + INIT_LIST_HEAD(&pCifsI->openFileList); |
| 14513 | + /* can not enable caching for this inode |
| 14514 | + until a file instance is open and we |
| 14515 | + can check the oplock flag on the open |
| 14516 | + response */ |
| 14517 | + (*ptmp_inode)->i_blksize = CIFS_MAX_MSGSIZE; |
| 14518 | +#if (LINUX_VERSION_CODE > KERNEL_VERSION(2,4,15)) |
| 14519 | + (*ptmp_inode)->i_blkbits = 14; /* 2**14 = CIFS_MAX_MSGSIZE */ |
| 14520 | +#endif |
| 14521 | + pCifsI->clientCanCacheRead = FALSE; |
| 14522 | + pCifsI->clientCanCacheAll = FALSE; |
| 14523 | + pCifsI->time = 0; |
| 14524 | + /* do not need to set cifs Attrs since |
| 14525 | + they are about to be overwritten |
| 14526 | + in fill_in_inode */ |
| 14527 | + atomic_set(&pCifsI->inUse, 0); |
| 14528 | + } |
| 14529 | + tmp_dentry->d_op = &cifs_dentry_ops; |
| 14530 | + d_instantiate(tmp_dentry, *ptmp_inode); |
| 14531 | + d_rehash(tmp_dentry); |
| 14532 | + } |
| 14533 | + |
| 14534 | + tmp_dentry->d_time = jiffies; |
| 14535 | + *pnew_dentry = tmp_dentry; |
| 14536 | +} |
| 14537 | + |
| 14538 | +static void reset_resume_key(struct file * dir_file, |
| 14539 | + unsigned char * filename, |
| 14540 | + unsigned int len,int Unicode,struct nls_table * nls_tab) { |
| 14541 | + struct cifsFileInfo *cifsFile; |
| 14542 | + |
| 14543 | + cifsFile = (struct cifsFileInfo *)dir_file->private_data; |
| 14544 | + if(cifsFile == NULL) |
| 14545 | + return; |
| 14546 | + if(cifsFile->search_resume_name) { |
| 14547 | + kfree(cifsFile->search_resume_name); |
| 14548 | + } |
| 14549 | + |
| 14550 | + if(Unicode) |
| 14551 | + len *= 2; |
| 14552 | + cifsFile->resume_name_length = len; |
| 14553 | + |
| 14554 | + cifsFile->search_resume_name = |
| 14555 | + kmalloc(cifsFile->resume_name_length, GFP_KERNEL); |
| 14556 | + |
| 14557 | + if(cifsFile->search_resume_name == NULL) { |
| 14558 | + cERROR(1,("failed new resume key allocate, length %d", |
| 14559 | + cifsFile->resume_name_length)); |
| 14560 | + return; |
| 14561 | + } |
| 14562 | + if(Unicode) |
| 14563 | + cifs_strtoUCS((wchar_t *) cifsFile->search_resume_name, |
| 14564 | + filename, len, nls_tab); |
| 14565 | + else |
| 14566 | + memcpy(cifsFile->search_resume_name, filename, |
| 14567 | + cifsFile->resume_name_length); |
| 14568 | + cFYI(1,("Reset resume key to: %s with len %d",filename,len)); |
| 14569 | + return; |
| 14570 | +} |
| 14571 | + |
| 14572 | + |
| 14573 | + |
| 14574 | +static int |
| 14575 | +cifs_filldir(struct qstr *pqstring, FILE_DIRECTORY_INFO * pfindData, |
| 14576 | + struct file *file, filldir_t filldir, void *direntry) |
| 14577 | +{ |
| 14578 | + struct inode *tmp_inode; |
| 14579 | + struct dentry *tmp_dentry; |
| 14580 | + int object_type,rc; |
| 14581 | + |
| 14582 | + pqstring->name = pfindData->FileName; |
| 14583 | + pqstring->len = pfindData->FileNameLength; |
| 14584 | + |
| 14585 | + construct_dentry(pqstring, file, &tmp_inode, &tmp_dentry); |
| 14586 | + if((tmp_inode == NULL) || (tmp_dentry == NULL)) { |
| 14587 | + return -ENOMEM; |
| 14588 | + } |
| 14589 | + fill_in_inode(tmp_inode, pfindData, &object_type); |
| 14590 | + rc = filldir(direntry, pfindData->FileName, pqstring->len, file->f_pos, |
| 14591 | + tmp_inode->i_ino, object_type); |
| 14592 | + if(rc) { |
| 14593 | + /* due to readdir error we need to recalculate resume |
| 14594 | + key so next readdir will restart on right entry */ |
| 14595 | + cFYI(1,("Error %d on filldir of %s",rc ,pfindData->FileName)); |
| 14596 | + } |
| 14597 | + dput(tmp_dentry); |
| 14598 | + return rc; |
| 14599 | +} |
| 14600 | + |
| 14601 | +static int |
| 14602 | +cifs_filldir_unix(struct qstr *pqstring, |
| 14603 | + FILE_UNIX_INFO * pUnixFindData, struct file *file, |
| 14604 | + filldir_t filldir, void *direntry) |
| 14605 | +{ |
| 14606 | + struct inode *tmp_inode; |
| 14607 | + struct dentry *tmp_dentry; |
| 14608 | + int object_type, rc; |
| 14609 | + |
| 14610 | + pqstring->name = pUnixFindData->FileName; |
| 14611 | + pqstring->len = strnlen(pUnixFindData->FileName, MAX_PATHCONF); |
| 14612 | + |
| 14613 | + construct_dentry(pqstring, file, &tmp_inode, &tmp_dentry); |
| 14614 | + if((tmp_inode == NULL) || (tmp_dentry == NULL)) { |
| 14615 | + return -ENOMEM; |
| 14616 | + } |
| 14617 | + |
| 14618 | + unix_fill_in_inode(tmp_inode, pUnixFindData, &object_type); |
| 14619 | + rc = filldir(direntry, pUnixFindData->FileName, pqstring->len, |
| 14620 | + file->f_pos, tmp_inode->i_ino, object_type); |
| 14621 | + if(rc) { |
| 14622 | + /* due to readdir error we need to recalculate resume |
| 14623 | + key so next readdir will restart on right entry */ |
| 14624 | + cFYI(1,("Error %d on filldir of %s",rc ,pUnixFindData->FileName)); |
| 14625 | + } |
| 14626 | + dput(tmp_dentry); |
| 14627 | + return rc; |
| 14628 | +} |
| 14629 | + |
| 14630 | +int |
| 14631 | +cifs_readdir(struct file *file, void *direntry, filldir_t filldir) |
| 14632 | +{ |
| 14633 | + int rc = 0; |
| 14634 | + int xid; |
| 14635 | + int Unicode = FALSE; |
| 14636 | + int UnixSearch = FALSE; |
| 14637 | + unsigned int bufsize, i; |
| 14638 | + __u16 searchHandle; |
| 14639 | + struct cifs_sb_info *cifs_sb; |
| 14640 | + struct cifsTconInfo *pTcon; |
| 14641 | + struct cifsFileInfo *cifsFile = NULL; |
| 14642 | + char *full_path = NULL; |
| 14643 | + char *data; |
| 14644 | + struct qstr qstring; |
| 14645 | + T2_FFIRST_RSP_PARMS findParms; |
| 14646 | + T2_FNEXT_RSP_PARMS findNextParms; |
| 14647 | + FILE_DIRECTORY_INFO *pfindData; |
| 14648 | + FILE_DIRECTORY_INFO *lastFindData; |
| 14649 | + FILE_UNIX_INFO *pfindDataUnix; |
| 14650 | + |
| 14651 | + xid = GetXid(); |
| 14652 | + |
| 14653 | + cifs_sb = CIFS_SB(file->f_dentry->d_sb); |
| 14654 | + pTcon = cifs_sb->tcon; |
| 14655 | + bufsize = pTcon->ses->server->maxBuf - MAX_CIFS_HDR_SIZE; |
| 14656 | + if(bufsize > CIFS_MAX_MSGSIZE) { |
| 14657 | + FreeXid(xid); |
| 14658 | + return -EIO; |
| 14659 | + } |
| 14660 | + data = kmalloc(bufsize, GFP_KERNEL); |
| 14661 | + pfindData = (FILE_DIRECTORY_INFO *) data; |
| 14662 | + |
| 14663 | + if(file->f_dentry == NULL) { |
| 14664 | + FreeXid(xid); |
| 14665 | + return -EIO; |
| 14666 | + } |
| 14667 | + down(&file->f_dentry->d_sb->s_vfs_rename_sem); |
| 14668 | + full_path = build_wildcard_path_from_dentry(file->f_dentry); |
| 14669 | + up(&file->f_dentry->d_sb->s_vfs_rename_sem); |
| 14670 | + |
| 14671 | + |
| 14672 | + cFYI(1, ("Full path: %s start at: %lld ", full_path, file->f_pos)); |
| 14673 | + |
| 14674 | + switch ((int) file->f_pos) { |
| 14675 | + case 0: |
| 14676 | + if (filldir(direntry, ".", 1, file->f_pos, |
| 14677 | + file->f_dentry->d_inode->i_ino, DT_DIR) < 0) { |
| 14678 | + cERROR(1, ("Filldir for current dir failed ")); |
| 14679 | + break; |
| 14680 | + } |
| 14681 | + file->f_pos++; |
| 14682 | + /* fallthrough */ |
| 14683 | + case 1: |
| 14684 | + if (filldir(direntry, "..", 2, file->f_pos, |
| 14685 | + file->f_dentry->d_parent->d_inode->i_ino, DT_DIR) < 0) { |
| 14686 | + cERROR(1, ("Filldir for parent dir failed ")); |
| 14687 | + break; |
| 14688 | + } |
| 14689 | + file->f_pos++; |
| 14690 | + /* fallthrough */ |
| 14691 | + case 2: |
| 14692 | + if (file->private_data != NULL) { |
| 14693 | + cifsFile = |
| 14694 | + (struct cifsFileInfo *) file->private_data; |
| 14695 | + if (cifsFile->endOfSearch) { |
| 14696 | + if(cifsFile->emptyDir) { |
| 14697 | + cFYI(1, ("End of search, empty dir")); |
| 14698 | + rc = 0; |
| 14699 | + break; |
| 14700 | + } |
| 14701 | + } else { |
| 14702 | + cifsFile->invalidHandle = TRUE; |
| 14703 | + CIFSFindClose(xid, pTcon, cifsFile->netfid); |
| 14704 | + } |
| 14705 | + if(cifsFile->search_resume_name) { |
| 14706 | + kfree(cifsFile->search_resume_name); |
| 14707 | + cifsFile->search_resume_name = NULL; |
| 14708 | + } |
| 14709 | + } |
| 14710 | + rc = CIFSFindFirst(xid, pTcon, full_path, pfindData, |
| 14711 | + &findParms, cifs_sb->local_nls, |
| 14712 | + &Unicode, &UnixSearch); |
| 14713 | + cFYI(1, ("Count: %d End: %d ", findParms.SearchCount, |
| 14714 | + findParms.EndofSearch)); |
| 14715 | + |
| 14716 | + if (rc == 0) { |
| 14717 | + searchHandle = findParms.SearchHandle; |
| 14718 | + if(file->private_data == NULL) |
| 14719 | + file->private_data = |
| 14720 | + kmalloc(sizeof(struct cifsFileInfo),GFP_KERNEL); |
| 14721 | + if (file->private_data) { |
| 14722 | + memset(file->private_data, 0, |
| 14723 | + sizeof (struct cifsFileInfo)); |
| 14724 | + cifsFile = |
| 14725 | + (struct cifsFileInfo *) file->private_data; |
| 14726 | + cifsFile->netfid = searchHandle; |
| 14727 | + cifsFile->invalidHandle = FALSE; |
| 14728 | + init_MUTEX(&cifsFile->fh_sem); |
| 14729 | + } else { |
| 14730 | + rc = -ENOMEM; |
| 14731 | + break; |
| 14732 | + } |
| 14733 | + |
| 14734 | + renew_parental_timestamps(file->f_dentry); |
| 14735 | + lastFindData = |
| 14736 | + (FILE_DIRECTORY_INFO *) ((char *) pfindData + |
| 14737 | + findParms.LastNameOffset); |
| 14738 | + if((char *)lastFindData > (char *)pfindData + bufsize) { |
| 14739 | + cFYI(1,("last search entry past end of packet")); |
| 14740 | + rc = -EIO; |
| 14741 | + break; |
| 14742 | + } |
| 14743 | + /* Offset of resume key same for levels 257 and 514 */ |
| 14744 | + cifsFile->resume_key = lastFindData->FileIndex; |
| 14745 | + if(UnixSearch == FALSE) { |
| 14746 | + cifsFile->resume_name_length = |
| 14747 | + le32_to_cpu(lastFindData->FileNameLength); |
| 14748 | + if(cifsFile->resume_name_length > bufsize - 64) { |
| 14749 | + cFYI(1,("Illegal resume file name length %d", |
| 14750 | + cifsFile->resume_name_length)); |
| 14751 | + rc = -ENOMEM; |
| 14752 | + break; |
| 14753 | + } |
| 14754 | + cifsFile->search_resume_name = |
| 14755 | + kmalloc(cifsFile->resume_name_length, GFP_KERNEL); |
| 14756 | + cFYI(1,("Last file: %s with name %d bytes long", |
| 14757 | + lastFindData->FileName, |
| 14758 | + cifsFile->resume_name_length)); |
| 14759 | + memcpy(cifsFile->search_resume_name, |
| 14760 | + lastFindData->FileName, |
| 14761 | + cifsFile->resume_name_length); |
| 14762 | + } else { |
| 14763 | + pfindDataUnix = (FILE_UNIX_INFO *)lastFindData; |
| 14764 | + if (Unicode == TRUE) { |
| 14765 | + for(i=0;(pfindDataUnix->FileName[i] |
| 14766 | + | pfindDataUnix->FileName[i+1]); |
| 14767 | + i+=2) { |
| 14768 | + if(i > bufsize-64) |
| 14769 | + break; |
| 14770 | + } |
| 14771 | + cifsFile->resume_name_length = i + 2; |
| 14772 | + } else { |
| 14773 | + cifsFile->resume_name_length = |
| 14774 | + strnlen(pfindDataUnix->FileName, |
| 14775 | + bufsize-63); |
| 14776 | + } |
| 14777 | + if(cifsFile->resume_name_length > bufsize - 64) { |
| 14778 | + cFYI(1,("Illegal resume file name length %d", |
| 14779 | + cifsFile->resume_name_length)); |
| 14780 | + rc = -ENOMEM; |
| 14781 | + break; |
| 14782 | + } |
| 14783 | + cifsFile->search_resume_name = |
| 14784 | + kmalloc(cifsFile->resume_name_length, GFP_KERNEL); |
| 14785 | + cFYI(1,("Last file: %s with name %d bytes long", |
| 14786 | + pfindDataUnix->FileName, |
| 14787 | + cifsFile->resume_name_length)); |
| 14788 | + memcpy(cifsFile->search_resume_name, |
| 14789 | + pfindDataUnix->FileName, |
| 14790 | + cifsFile->resume_name_length); |
| 14791 | + } |
| 14792 | + for (i = 2; i < (unsigned int)findParms.SearchCount + 2; i++) { |
| 14793 | + if (UnixSearch == FALSE) { |
| 14794 | + pfindData->FileNameLength = |
| 14795 | + le32_to_cpu(pfindData->FileNameLength); |
| 14796 | + if (Unicode == TRUE) |
| 14797 | + pfindData->FileNameLength = |
| 14798 | + cifs_strfromUCS_le |
| 14799 | + (pfindData->FileName, |
| 14800 | + (wchar_t *) |
| 14801 | + pfindData->FileName, |
| 14802 | + (pfindData-> |
| 14803 | + FileNameLength) / 2, |
| 14804 | + cifs_sb->local_nls); |
| 14805 | + qstring.len = pfindData->FileNameLength; |
| 14806 | + if (((qstring.len != 1) |
| 14807 | + || (pfindData->FileName[0] != '.')) |
| 14808 | + && ((qstring.len != 2) |
| 14809 | + || (pfindData-> |
| 14810 | + FileName[0] != '.') |
| 14811 | + || (pfindData-> |
| 14812 | + FileName[1] != '.'))) { |
| 14813 | + if(cifs_filldir(&qstring, |
| 14814 | + pfindData, |
| 14815 | + file, filldir, |
| 14816 | + direntry)) { |
| 14817 | + /* do not end search if |
| 14818 | + kernel not ready to take |
| 14819 | + remaining entries yet */ |
| 14820 | + reset_resume_key(file, pfindData->FileName,qstring.len, |
| 14821 | + Unicode, cifs_sb->local_nls); |
| 14822 | + findParms.EndofSearch = 0; |
| 14823 | + break; |
| 14824 | + } |
| 14825 | + file->f_pos++; |
| 14826 | + } |
| 14827 | + } else { /* UnixSearch */ |
| 14828 | + pfindDataUnix = |
| 14829 | + (FILE_UNIX_INFO *) pfindData; |
| 14830 | + if (Unicode == TRUE) |
| 14831 | + qstring.len = |
| 14832 | + cifs_strfromUCS_le |
| 14833 | + (pfindDataUnix->FileName, |
| 14834 | + (wchar_t *) |
| 14835 | + pfindDataUnix->FileName, |
| 14836 | + MAX_PATHCONF, |
| 14837 | + cifs_sb->local_nls); |
| 14838 | + else |
| 14839 | + qstring.len = |
| 14840 | + strnlen(pfindDataUnix-> |
| 14841 | + FileName, |
| 14842 | + MAX_PATHCONF); |
| 14843 | + if (((qstring.len != 1) |
| 14844 | + || (pfindDataUnix-> |
| 14845 | + FileName[0] != '.')) |
| 14846 | + && ((qstring.len != 2) |
| 14847 | + || (pfindDataUnix-> |
| 14848 | + FileName[0] != '.') |
| 14849 | + || (pfindDataUnix-> |
| 14850 | + FileName[1] != '.'))) { |
| 14851 | + if(cifs_filldir_unix(&qstring, |
| 14852 | + pfindDataUnix, |
| 14853 | + file, |
| 14854 | + filldir, |
| 14855 | + direntry)) { |
| 14856 | + /* do not end search if |
| 14857 | + kernel not ready to take |
| 14858 | + remaining entries yet */ |
| 14859 | + findParms.EndofSearch = 0; |
| 14860 | + reset_resume_key(file, pfindDataUnix->FileName, |
| 14861 | + qstring.len,Unicode,cifs_sb->local_nls); |
| 14862 | + break; |
| 14863 | + } |
| 14864 | + file->f_pos++; |
| 14865 | + } |
| 14866 | + } |
| 14867 | + /* works also for Unix ff struct since first field of both */ |
| 14868 | + pfindData = |
| 14869 | + (FILE_DIRECTORY_INFO *) ((char *) pfindData |
| 14870 | + + le32_to_cpu(pfindData->NextEntryOffset)); |
| 14871 | + /* BB also should check to make sure that pointer is not beyond the end of the SMB */ |
| 14872 | + /* if(pfindData > lastFindData) rc = -EIO; break; */ |
| 14873 | + } /* end for loop */ |
| 14874 | + if ((findParms.EndofSearch != 0) && cifsFile) { |
| 14875 | + cifsFile->endOfSearch = TRUE; |
| 14876 | + if(findParms.SearchCount == 2) |
| 14877 | + cifsFile->emptyDir = TRUE; |
| 14878 | + } |
| 14879 | + } else { |
| 14880 | + if (cifsFile) |
| 14881 | + cifsFile->endOfSearch = TRUE; |
| 14882 | + /* unless parent directory gone do not return error */ |
| 14883 | + rc = 0; |
| 14884 | + } |
| 14885 | + break; |
| 14886 | + default: |
| 14887 | + if (file->private_data == NULL) { |
| 14888 | + rc = -EBADF; |
| 14889 | + cFYI(1, |
| 14890 | + ("Readdir on closed srch, pos = %lld", |
| 14891 | + file->f_pos)); |
| 14892 | + } else { |
| 14893 | + cifsFile = (struct cifsFileInfo *) file->private_data; |
| 14894 | + if (cifsFile->endOfSearch) { |
| 14895 | + rc = 0; |
| 14896 | + cFYI(1, ("End of search ")); |
| 14897 | + break; |
| 14898 | + } |
| 14899 | + searchHandle = cifsFile->netfid; |
| 14900 | + rc = CIFSFindNext(xid, pTcon, pfindData, |
| 14901 | + &findNextParms, searchHandle, |
| 14902 | + cifsFile->search_resume_name, |
| 14903 | + cifsFile->resume_name_length, |
| 14904 | + cifsFile->resume_key, |
| 14905 | + &Unicode, &UnixSearch); |
| 14906 | + cFYI(1,("Count: %d End: %d ", |
| 14907 | + findNextParms.SearchCount, |
| 14908 | + findNextParms.EndofSearch)); |
| 14909 | + if ((rc == 0) && (findNextParms.SearchCount != 0)) { |
| 14910 | + /* BB save off resume key, key name and name length */ |
| 14911 | + lastFindData = |
| 14912 | + (FILE_DIRECTORY_INFO *) ((char *) pfindData |
| 14913 | + + findNextParms.LastNameOffset); |
| 14914 | + if((char *)lastFindData > (char *)pfindData + bufsize) { |
| 14915 | + cFYI(1,("last search entry past end of packet")); |
| 14916 | + rc = -EIO; |
| 14917 | + break; |
| 14918 | + } |
| 14919 | + /* Offset of resume key same for levels 257 and 514 */ |
| 14920 | + cifsFile->resume_key = lastFindData->FileIndex; |
| 14921 | + |
| 14922 | + if(UnixSearch == FALSE) { |
| 14923 | + cifsFile->resume_name_length = |
| 14924 | + le32_to_cpu(lastFindData->FileNameLength); |
| 14925 | + if(cifsFile->resume_name_length > bufsize - 64) { |
| 14926 | + cFYI(1,("Illegal resume file name length %d", |
| 14927 | + cifsFile->resume_name_length)); |
| 14928 | + rc = -ENOMEM; |
| 14929 | + break; |
| 14930 | + } |
| 14931 | + /* Free the memory allocated by previous findfirst |
| 14932 | + or findnext call - we can not reuse the memory since |
| 14933 | + the resume name may not be same string length */ |
| 14934 | + if(cifsFile->search_resume_name) |
| 14935 | + kfree(cifsFile->search_resume_name); |
| 14936 | + cifsFile->search_resume_name = |
| 14937 | + kmalloc(cifsFile->resume_name_length, GFP_KERNEL); |
| 14938 | + cFYI(1,("Last file: %s with name %d bytes long", |
| 14939 | + lastFindData->FileName, |
| 14940 | + cifsFile->resume_name_length)); |
| 14941 | + memcpy(cifsFile->search_resume_name, |
| 14942 | + lastFindData->FileName, |
| 14943 | + cifsFile->resume_name_length); |
| 14944 | + } else { |
| 14945 | + pfindDataUnix = (FILE_UNIX_INFO *)lastFindData; |
| 14946 | + if (Unicode == TRUE) { |
| 14947 | + for(i=0;(pfindDataUnix->FileName[i] |
| 14948 | + | pfindDataUnix->FileName[i+1]); |
| 14949 | + i+=2) { |
| 14950 | + if(i > bufsize-64) |
| 14951 | + break; |
| 14952 | + } |
| 14953 | + cifsFile->resume_name_length = i + 2; |
| 14954 | + } else { |
| 14955 | + cifsFile->resume_name_length = |
| 14956 | + strnlen(pfindDataUnix-> |
| 14957 | + FileName, |
| 14958 | + MAX_PATHCONF); |
| 14959 | + } |
| 14960 | + if(cifsFile->resume_name_length > bufsize - 64) { |
| 14961 | + cFYI(1,("Illegal resume file name length %d", |
| 14962 | + cifsFile->resume_name_length)); |
| 14963 | + rc = -ENOMEM; |
| 14964 | + break; |
| 14965 | + } |
| 14966 | + /* Free the memory allocated by previous findfirst |
| 14967 | + or findnext call - we can not reuse the memory since |
| 14968 | + the resume name may not be same string length */ |
| 14969 | + if(cifsFile->search_resume_name) |
| 14970 | + kfree(cifsFile->search_resume_name); |
| 14971 | + cifsFile->search_resume_name = |
| 14972 | + kmalloc(cifsFile->resume_name_length, GFP_KERNEL); |
| 14973 | + cFYI(1,("fnext last file: %s with name %d bytes long", |
| 14974 | + pfindDataUnix->FileName, |
| 14975 | + cifsFile->resume_name_length)); |
| 14976 | + memcpy(cifsFile->search_resume_name, |
| 14977 | + pfindDataUnix->FileName, |
| 14978 | + cifsFile->resume_name_length); |
| 14979 | + } |
| 14980 | + |
| 14981 | + for (i = 0; i < findNextParms.SearchCount; i++) { |
| 14982 | + pfindData->FileNameLength = |
| 14983 | + le32_to_cpu(pfindData-> |
| 14984 | + FileNameLength); |
| 14985 | + if (UnixSearch == FALSE) { |
| 14986 | + if (Unicode == TRUE) |
| 14987 | + pfindData->FileNameLength = |
| 14988 | + cifs_strfromUCS_le |
| 14989 | + (pfindData->FileName, |
| 14990 | + (wchar_t *) |
| 14991 | + pfindData->FileName, |
| 14992 | + (pfindData->FileNameLength)/ 2, |
| 14993 | + cifs_sb->local_nls); |
| 14994 | + qstring.len = |
| 14995 | + pfindData->FileNameLength; |
| 14996 | + if (((qstring.len != 1) |
| 14997 | + || (pfindData->FileName[0] != '.')) |
| 14998 | + && ((qstring.len != 2) |
| 14999 | + || (pfindData->FileName[0] != '.') |
| 15000 | + || (pfindData->FileName[1] != |
| 15001 | + '.'))) { |
| 15002 | + if(cifs_filldir |
| 15003 | + (&qstring, |
| 15004 | + pfindData, |
| 15005 | + file, filldir, |
| 15006 | + direntry)) { |
| 15007 | + /* do not end search if |
| 15008 | + kernel not ready to take |
| 15009 | + remaining entries yet */ |
| 15010 | + findNextParms.EndofSearch = 0; |
| 15011 | + reset_resume_key(file, pfindData->FileName,qstring.len, |
| 15012 | + Unicode,cifs_sb->local_nls); |
| 15013 | + break; |
| 15014 | + } |
| 15015 | + file->f_pos++; |
| 15016 | + } |
| 15017 | + } else { /* UnixSearch */ |
| 15018 | + pfindDataUnix = |
| 15019 | + (FILE_UNIX_INFO *) |
| 15020 | + pfindData; |
| 15021 | + if (Unicode == TRUE) |
| 15022 | + qstring.len = |
| 15023 | + cifs_strfromUCS_le |
| 15024 | + (pfindDataUnix->FileName, |
| 15025 | + (wchar_t *) |
| 15026 | + pfindDataUnix->FileName, |
| 15027 | + MAX_PATHCONF, |
| 15028 | + cifs_sb->local_nls); |
| 15029 | + else |
| 15030 | + qstring.len = |
| 15031 | + strnlen |
| 15032 | + (pfindDataUnix-> |
| 15033 | + FileName, |
| 15034 | + MAX_PATHCONF); |
| 15035 | + if (((qstring.len != 1) |
| 15036 | + || (pfindDataUnix-> |
| 15037 | + FileName[0] != '.')) |
| 15038 | + && ((qstring.len != 2) |
| 15039 | + || (pfindDataUnix-> |
| 15040 | + FileName[0] != '.') |
| 15041 | + || (pfindDataUnix-> |
| 15042 | + FileName[1] != |
| 15043 | + '.'))) { |
| 15044 | + if(cifs_filldir_unix |
| 15045 | + (&qstring, |
| 15046 | + pfindDataUnix, |
| 15047 | + file, filldir, |
| 15048 | + direntry)) { |
| 15049 | + /* do not end search if |
| 15050 | + kernel not ready to take |
| 15051 | + remaining entries yet */ |
| 15052 | + findNextParms.EndofSearch = 0; |
| 15053 | + reset_resume_key(file, pfindDataUnix->FileName,qstring.len, |
| 15054 | + Unicode,cifs_sb->local_nls); |
| 15055 | + break; |
| 15056 | + } |
| 15057 | + file->f_pos++; |
| 15058 | + } |
| 15059 | + } |
| 15060 | + pfindData = (FILE_DIRECTORY_INFO *) ((char *) pfindData + le32_to_cpu(pfindData->NextEntryOffset)); /* works also for Unix find struct since this is the first field of both */ |
| 15061 | + /* BB also should check to make sure that pointer is not beyond the end of the SMB */ |
| 15062 | + } /* end for loop */ |
| 15063 | + if (findNextParms.EndofSearch != 0) { |
| 15064 | + cifsFile->endOfSearch = TRUE; |
| 15065 | + } |
| 15066 | + } else { |
| 15067 | + cifsFile->endOfSearch = TRUE; |
| 15068 | + rc = 0; /* unless parent directory disappeared - do not return error here (eg Access Denied or no more files) */ |
| 15069 | + } |
| 15070 | + } |
| 15071 | + } /* end switch */ |
| 15072 | + if (data) |
| 15073 | + kfree(data); |
| 15074 | + if (full_path) |
| 15075 | + kfree(full_path); |
| 15076 | + FreeXid(xid); |
| 15077 | + |
| 15078 | + return rc; |
| 15079 | +} |
| 15080 | +int cifs_prepare_write(struct file *file, struct page *page, |
| 15081 | + unsigned from, unsigned to) |
| 15082 | +{ |
| 15083 | + int rc = 0; |
| 15084 | + loff_t offset = (loff_t)page->index << PAGE_CACHE_SHIFT; |
| 15085 | + cFYI(1,("prepare write for page %p from %d to %d",page,from,to)); |
| 15086 | + if (!Page_Uptodate(page)) { |
| 15087 | + /* if (to - from != PAGE_CACHE_SIZE) { |
| 15088 | + void *kaddr = kmap_atomic(page, KM_USER0); |
| 15089 | + memset(kaddr, 0, from); |
| 15090 | + memset(kaddr + to, 0, PAGE_CACHE_SIZE - to); |
| 15091 | + flush_dcache_page(page); |
| 15092 | + kunmap_atomic(kaddr, KM_USER0); |
| 15093 | + } */ |
| 15094 | + /* If we are writing a full page it will be up to date, |
| 15095 | + no need to read from the server */ |
| 15096 | + if((to==PAGE_CACHE_SIZE) && (from == 0)) |
| 15097 | + SetPageUptodate(page); |
| 15098 | + |
| 15099 | + /* might as well read a page, it is fast enough */ |
| 15100 | + if((file->f_flags & O_ACCMODE) != O_WRONLY) { |
| 15101 | + rc = cifs_readpage_worker(file,page,&offset); |
| 15102 | + } else { |
| 15103 | + /* should we try using another |
| 15104 | + file handle if there is one - how would we lock it |
| 15105 | + to prevent close of that handle racing with this read? */ |
| 15106 | + /* In any case this will be written out by commit_write */ |
| 15107 | + } |
| 15108 | + } |
| 15109 | + |
| 15110 | + /* BB should we pass any errors back? e.g. if we do not have read access to the file */ |
| 15111 | + return 0; |
| 15112 | +} |
| 15113 | + |
| 15114 | + |
| 15115 | +struct address_space_operations cifs_addr_ops = { |
| 15116 | + .readpage = cifs_readpage, |
| 15117 | +/* .readpages = cifs_readpages, */ |
| 15118 | + .writepage = cifs_writepage, |
| 15119 | + .prepare_write = cifs_prepare_write, |
| 15120 | + .commit_write = cifs_commit_write, |
| 15121 | + .sync_page = cifs_sync_page, |
| 15122 | + /*.direct_IO = */ |
| 15123 | +}; |
| 15124 | --- /dev/null |
| 15125 | +++ b/fs/cifs/inode.c |
| 15126 | @@ -0,0 +1,1079 @@ |
| 15127 | +/* |
| 15128 | + * fs/cifs/inode.c |
| 15129 | + * |
| 15130 | + * Copyright (C) International Business Machines Corp., 2002,2003 |
| 15131 | + * Author(s): Steve French (sfrench@us.ibm.com) |
| 15132 | + * |
| 15133 | + * This library is free software; you can redistribute it and/or modify |
| 15134 | + * it under the terms of the GNU Lesser General Public License as published |
| 15135 | + * by the Free Software Foundation; either version 2.1 of the License, or |
| 15136 | + * (at your option) any later version. |
| 15137 | + * |
| 15138 | + * This library is distributed in the hope that it will be useful, |
| 15139 | + * but WITHOUT ANY WARRANTY; without even the implied warranty of |
| 15140 | + * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See |
| 15141 | + * the GNU Lesser General Public License for more details. |
| 15142 | + * |
| 15143 | + * You should have received a copy of the GNU Lesser General Public License |
| 15144 | + * along with this library; if not, write to the Free Software |
| 15145 | + * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA |
| 15146 | + */ |
| 15147 | +#include <linux/fs.h> |
| 15148 | +#include <linux/stat.h> |
| 15149 | +#include <linux/pagemap.h> |
| 15150 | +#include <linux/version.h> |
| 15151 | +#include <asm/div64.h> |
| 15152 | +#include "cifsfs.h" |
| 15153 | +#include "cifspdu.h" |
| 15154 | +#include "cifsglob.h" |
| 15155 | +#include "cifsproto.h" |
| 15156 | +#include "cifs_debug.h" |
| 15157 | +#include "cifs_fs_sb.h" |
| 15158 | + |
| 15159 | +extern int is_size_safe_to_change(struct cifsInodeInfo *); |
| 15160 | + |
| 15161 | +struct inode * get_cifs_inode(struct super_block * sb) |
| 15162 | +{ |
| 15163 | + struct inode * newinode; |
| 15164 | + newinode = new_inode(sb); |
| 15165 | + cFYI(1,("got new inode %p",newinode)); |
| 15166 | + if(newinode) { |
| 15167 | + struct cifsInodeInfo * cifsInfo = CIFS_I(newinode); |
| 15168 | + cifsInfo->clientCanCacheRead = FALSE; |
| 15169 | + cifsInfo->clientCanCacheAll = FALSE; |
| 15170 | + INIT_LIST_HEAD(&cifsInfo->openFileList); |
| 15171 | + cifsInfo->cifsAttrs = 0x20; /* default */ |
| 15172 | + newinode->i_blksize = CIFS_MAX_MSGSIZE; |
| 15173 | +#if (LINUX_VERSION_CODE > KERNEL_VERSION(2,4,15)) |
| 15174 | + newinode->i_blkbits = 14; /* 2**14 = CIFS_MAX_MSGSIZE */ |
| 15175 | +#endif |
| 15176 | + atomic_set(&cifsInfo->inUse, 0); |
| 15177 | + cifsInfo->time = 0; |
| 15178 | + insert_inode_hash(newinode); |
| 15179 | + } |
| 15180 | + return newinode; |
| 15181 | + |
| 15182 | +} |
| 15183 | + |
| 15184 | +int |
| 15185 | +cifs_get_inode_info_unix(struct inode **pinode, |
| 15186 | + const unsigned char *search_path, |
| 15187 | + struct super_block *sb,int xid) |
| 15188 | +{ |
| 15189 | + int rc = 0; |
| 15190 | + FILE_UNIX_BASIC_INFO findData; |
| 15191 | + struct cifsTconInfo *pTcon; |
| 15192 | + struct inode *inode; |
| 15193 | + struct cifs_sb_info *cifs_sb = CIFS_SB(sb); |
| 15194 | + char *tmp_path; |
| 15195 | + |
| 15196 | + pTcon = cifs_sb->tcon; |
| 15197 | + cFYI(1, (" Getting info on %s ", search_path)); |
| 15198 | + /* we could have done a find first instead but this returns more info */ |
| 15199 | + rc = CIFSSMBUnixQPathInfo(xid, pTcon, search_path, &findData, |
| 15200 | + cifs_sb->local_nls); |
| 15201 | + /* dump_mem("\nUnixQPathInfo return data", &findData, sizeof(findData)); */ |
| 15202 | + if (rc) { |
| 15203 | + if (rc == -EREMOTE) { |
| 15204 | + tmp_path = |
| 15205 | + kmalloc(strnlen |
| 15206 | + (pTcon->treeName, |
| 15207 | + MAX_TREE_SIZE + 1) + |
| 15208 | + strnlen(search_path, MAX_PATHCONF) + 1, |
| 15209 | + GFP_KERNEL); |
| 15210 | + if (tmp_path == NULL) { |
| 15211 | + return -ENOMEM; |
| 15212 | + } |
| 15213 | + /* have to skip first of the double backslash of UNC name */ |
| 15214 | + strncpy(tmp_path, pTcon->treeName, MAX_TREE_SIZE); |
| 15215 | + strncat(tmp_path, search_path, MAX_PATHCONF); |
| 15216 | + rc = connect_to_dfs_path(xid, pTcon->ses, |
| 15217 | + /* treename + */ tmp_path, |
| 15218 | + cifs_sb->local_nls); |
| 15219 | + kfree(tmp_path); |
| 15220 | + |
| 15221 | + /* BB fix up inode etc. */ |
| 15222 | + } else if (rc) { |
| 15223 | + return rc; |
| 15224 | + } |
| 15225 | + |
| 15226 | + } else { |
| 15227 | + struct cifsInodeInfo *cifsInfo; |
| 15228 | + |
| 15229 | + /* get new inode */ |
| 15230 | + if (*pinode == NULL) { |
| 15231 | + *pinode = get_cifs_inode(sb); |
| 15232 | + } |
| 15233 | + if(*pinode == NULL) { |
| 15234 | + return -ENOMEM; |
| 15235 | + } |
| 15236 | + |
| 15237 | + inode = *pinode; |
| 15238 | + cifsInfo = CIFS_I(inode); |
| 15239 | + |
| 15240 | + cFYI(1, (" Old time %ld ", cifsInfo->time)); |
| 15241 | + cifsInfo->time = jiffies; |
| 15242 | + cFYI(1, (" New time %ld ", cifsInfo->time)); |
| 15243 | + atomic_set(&cifsInfo->inUse,1); /* ok to set on every refresh of inode */ |
| 15244 | + |
| 15245 | + inode->i_atime = |
| 15246 | + cifs_NTtimeToUnix(le64_to_cpu(findData.LastAccessTime)); |
| 15247 | + inode->i_mtime = |
| 15248 | + cifs_NTtimeToUnix(le64_to_cpu |
| 15249 | + (findData.LastModificationTime)); |
| 15250 | + inode->i_ctime = |
| 15251 | + cifs_NTtimeToUnix(le64_to_cpu(findData.LastStatusChange)); |
| 15252 | + inode->i_mode = le64_to_cpu(findData.Permissions); |
| 15253 | + findData.Type = le32_to_cpu(findData.Type); |
| 15254 | + if (findData.Type == UNIX_FILE) { |
| 15255 | + inode->i_mode |= S_IFREG; |
| 15256 | + } else if (findData.Type == UNIX_SYMLINK) { |
| 15257 | + inode->i_mode |= S_IFLNK; |
| 15258 | + } else if (findData.Type == UNIX_DIR) { |
| 15259 | + inode->i_mode |= S_IFDIR; |
| 15260 | + } else if (findData.Type == UNIX_CHARDEV) { |
| 15261 | + inode->i_mode |= S_IFCHR; |
| 15262 | + inode->i_rdev = MKDEV(le64_to_cpu(findData.DevMajor), |
| 15263 | + le64_to_cpu(findData.DevMinor) & MINORMASK); |
| 15264 | + } else if (findData.Type == UNIX_BLOCKDEV) { |
| 15265 | + inode->i_mode |= S_IFBLK; |
| 15266 | + inode->i_rdev = MKDEV(le64_to_cpu(findData.DevMajor), |
| 15267 | + le64_to_cpu(findData.DevMinor) & MINORMASK); |
| 15268 | + } else if (findData.Type == UNIX_FIFO) { |
| 15269 | + inode->i_mode |= S_IFIFO; |
| 15270 | + } else if (findData.Type == UNIX_SOCKET) { |
| 15271 | + inode->i_mode |= S_IFSOCK; |
| 15272 | + } |
| 15273 | + inode->i_uid = le64_to_cpu(findData.Uid); |
| 15274 | + inode->i_gid = le64_to_cpu(findData.Gid); |
| 15275 | + inode->i_nlink = le64_to_cpu(findData.Nlinks); |
| 15276 | + findData.NumOfBytes = le64_to_cpu(findData.NumOfBytes); |
| 15277 | + findData.EndOfFile = le64_to_cpu(findData.EndOfFile); |
| 15278 | + |
| 15279 | + if(is_size_safe_to_change(cifsInfo)) { |
| 15280 | + /* can not safely change the file size here if the |
| 15281 | + client is writing to it due to potential races */ |
| 15282 | + inode->i_size = findData.EndOfFile; |
| 15283 | +/* blksize needs to be multiple of two. So safer to default to blksize |
| 15284 | + and blkbits set in superblock so 2**blkbits and blksize will match */ |
| 15285 | +/* inode->i_blksize = |
| 15286 | + (pTcon->ses->server->maxBuf - MAX_CIFS_HDR_SIZE) & 0xFFFFFE00;*/ |
| 15287 | + |
| 15288 | + /* This seems incredibly stupid but it turns out that |
| 15289 | + i_blocks is not related to (i_size / i_blksize), instead a |
| 15290 | + size of 512 is required to be used for calculating num blocks */ |
| 15291 | + |
| 15292 | + |
| 15293 | +/* inode->i_blocks = |
| 15294 | + (inode->i_blksize - 1 + findData.NumOfBytes) >> inode->i_blkbits;*/ |
| 15295 | + |
| 15296 | + /* 512 bytes (2**9) is the fake blocksize that must be used */ |
| 15297 | + /* for this calculation */ |
| 15298 | + inode->i_blocks = (512 - 1 + findData.NumOfBytes) >> 9; |
| 15299 | + } |
| 15300 | + |
| 15301 | + if (findData.NumOfBytes < findData.EndOfFile) |
| 15302 | + cFYI(1, ("Server inconsistency Error: it says allocation size less than end of file ")); |
| 15303 | + cFYI(1, |
| 15304 | + ("Size %ld and blocks %ld ", |
| 15305 | + (unsigned long) inode->i_size, inode->i_blocks)); |
| 15306 | + if (S_ISREG(inode->i_mode)) { |
| 15307 | + cFYI(1, (" File inode ")); |
| 15308 | + inode->i_op = &cifs_file_inode_ops; |
| 15309 | + inode->i_fop = &cifs_file_ops; |
| 15310 | + inode->i_data.a_ops = &cifs_addr_ops; |
| 15311 | + } else if (S_ISDIR(inode->i_mode)) { |
| 15312 | + cFYI(1, (" Directory inode")); |
| 15313 | + inode->i_op = &cifs_dir_inode_ops; |
| 15314 | + inode->i_fop = &cifs_dir_ops; |
| 15315 | + } else if (S_ISLNK(inode->i_mode)) { |
| 15316 | + cFYI(1, (" Symbolic Link inode ")); |
| 15317 | + inode->i_op = &cifs_symlink_inode_ops; |
| 15318 | +/* tmp_inode->i_fop = *//* do not need to set to anything */ |
| 15319 | + } else { |
| 15320 | + cFYI(1, (" Init special inode ")); |
| 15321 | + init_special_inode(inode, inode->i_mode, |
| 15322 | + kdev_t_to_nr(inode->i_rdev)); |
| 15323 | + } |
| 15324 | + } |
| 15325 | + return rc; |
| 15326 | +} |
| 15327 | + |
| 15328 | +int |
| 15329 | +cifs_get_inode_info(struct inode **pinode, const unsigned char *search_path, |
| 15330 | + FILE_ALL_INFO * pfindData, struct super_block *sb, int xid) |
| 15331 | +{ |
| 15332 | + int rc = 0; |
| 15333 | + struct cifsTconInfo *pTcon; |
| 15334 | + struct inode *inode; |
| 15335 | + struct cifs_sb_info *cifs_sb = CIFS_SB(sb); |
| 15336 | + char *tmp_path; |
| 15337 | + char *buf = NULL; |
| 15338 | + |
| 15339 | + pTcon = cifs_sb->tcon; |
| 15340 | + cFYI(1,("Getting info on %s ", search_path)); |
| 15341 | + |
| 15342 | + if((pfindData == NULL) && (*pinode != NULL)) { |
| 15343 | + if(CIFS_I(*pinode)->clientCanCacheRead) { |
| 15344 | + cFYI(1,("No need to revalidate inode sizes on cached file ")); |
| 15345 | + return rc; |
| 15346 | + } |
| 15347 | + } |
| 15348 | + |
| 15349 | + /* if file info not passed in then get it from server */ |
| 15350 | + if(pfindData == NULL) { |
| 15351 | + buf = kmalloc(sizeof(FILE_ALL_INFO),GFP_KERNEL); |
| 15352 | + pfindData = (FILE_ALL_INFO *)buf; |
| 15353 | + /* could do find first instead but this returns more info */ |
| 15354 | + rc = CIFSSMBQPathInfo(xid, pTcon, search_path, pfindData, |
| 15355 | + cifs_sb->local_nls); |
| 15356 | + } |
| 15357 | + /* dump_mem("\nQPathInfo return data",&findData, sizeof(findData)); */ |
| 15358 | + if (rc) { |
| 15359 | + if (rc == -EREMOTE) { |
| 15360 | + tmp_path = |
| 15361 | + kmalloc(strnlen |
| 15362 | + (pTcon->treeName, |
| 15363 | + MAX_TREE_SIZE + 1) + |
| 15364 | + strnlen(search_path, MAX_PATHCONF) + 1, |
| 15365 | + GFP_KERNEL); |
| 15366 | + if (tmp_path == NULL) { |
| 15367 | + if(buf) |
| 15368 | + kfree(buf); |
| 15369 | + return -ENOMEM; |
| 15370 | + } |
| 15371 | + |
| 15372 | + strncpy(tmp_path, pTcon->treeName, MAX_TREE_SIZE); |
| 15373 | + strncat(tmp_path, search_path, MAX_PATHCONF); |
| 15374 | + rc = connect_to_dfs_path(xid, pTcon->ses, |
| 15375 | + /* treename + */ tmp_path, |
| 15376 | + cifs_sb->local_nls); |
| 15377 | + kfree(tmp_path); |
| 15378 | + /* BB fix up inode etc. */ |
| 15379 | + } else if (rc) { |
| 15380 | + if(buf) |
| 15381 | + kfree(buf); |
| 15382 | + return rc; |
| 15383 | + } |
| 15384 | + } else { |
| 15385 | + struct cifsInodeInfo *cifsInfo; |
| 15386 | + |
| 15387 | + /* get new inode */ |
| 15388 | + if (*pinode == NULL) { |
| 15389 | + *pinode = get_cifs_inode(sb); |
| 15390 | + } |
| 15391 | + if(*pinode == NULL) |
| 15392 | + return -ENOMEM; |
| 15393 | + inode = *pinode; |
| 15394 | + cifsInfo = CIFS_I(inode); |
| 15395 | + pfindData->Attributes = le32_to_cpu(pfindData->Attributes); |
| 15396 | + cifsInfo->cifsAttrs = pfindData->Attributes; |
| 15397 | + cFYI(1, (" Old time %ld ", cifsInfo->time)); |
| 15398 | + cifsInfo->time = jiffies; |
| 15399 | + cFYI(1, (" New time %ld ", cifsInfo->time)); |
| 15400 | + |
| 15401 | +/* blksize needs to be multiple of two. So safer to default to blksize |
| 15402 | + and blkbits set in superblock so 2**blkbits and blksize will match */ |
| 15403 | +/* inode->i_blksize = |
| 15404 | + (pTcon->ses->server->maxBuf - MAX_CIFS_HDR_SIZE) & 0xFFFFFE00;*/ |
| 15405 | + |
| 15406 | + /* Linux can not store file creation time unfortunately so we ignore it */ |
| 15407 | + inode->i_atime = |
| 15408 | + cifs_NTtimeToUnix(le64_to_cpu(pfindData->LastAccessTime)); |
| 15409 | + inode->i_mtime = |
| 15410 | + cifs_NTtimeToUnix(le64_to_cpu(pfindData->LastWriteTime)); |
| 15411 | + inode->i_ctime = |
| 15412 | + cifs_NTtimeToUnix(le64_to_cpu(pfindData->ChangeTime)); |
| 15413 | + cFYI(0, |
| 15414 | + (" Attributes came in as 0x%x ", pfindData->Attributes)); |
| 15415 | + |
| 15416 | + /* set default mode. will override for dirs below */ |
| 15417 | + if(atomic_read(&cifsInfo->inUse) == 0) |
| 15418 | + /* new inode, can safely set these fields */ |
| 15419 | + inode->i_mode = cifs_sb->mnt_file_mode; |
| 15420 | + |
| 15421 | + if (pfindData->Attributes & ATTR_REPARSE) { |
| 15422 | + /* Can IFLNK be set as it basically is on windows with IFREG or IFDIR? */ |
| 15423 | + inode->i_mode |= S_IFLNK; |
| 15424 | + } else if (pfindData->Attributes & ATTR_DIRECTORY) { |
| 15425 | + /* override default perms since we do not do byte range locking on dirs */ |
| 15426 | + inode->i_mode = cifs_sb->mnt_dir_mode; |
| 15427 | + inode->i_mode |= S_IFDIR; |
| 15428 | + } else { |
| 15429 | + inode->i_mode |= S_IFREG; |
| 15430 | + /* treat the dos attribute of read-only as read-only mode e.g. 555 */ |
| 15431 | + if(cifsInfo->cifsAttrs & ATTR_READONLY) |
| 15432 | + inode->i_mode &= ~(S_IWUGO); |
| 15433 | + /* BB add code here - validate if device or weird share or device type? */ |
| 15434 | + } |
| 15435 | + if(is_size_safe_to_change(cifsInfo)) { |
| 15436 | + /* can not safely change the file size here if the |
| 15437 | + client is writing to it due to potential races */ |
| 15438 | + inode->i_size = le64_to_cpu(pfindData->EndOfFile); |
| 15439 | + |
| 15440 | + /* 512 bytes (2**9) is the fake blocksize that must be used */ |
| 15441 | + /* for this calculation */ |
| 15442 | + inode->i_blocks = (512 - 1 + pfindData->AllocationSize) |
| 15443 | + >> 9; |
| 15444 | + } |
| 15445 | + pfindData->AllocationSize = le64_to_cpu(pfindData->AllocationSize); |
| 15446 | + |
| 15447 | + cFYI(1, |
| 15448 | + (" Size %ld and blocks %ld ", |
| 15449 | + (unsigned long) inode->i_size, inode->i_blocks)); |
| 15450 | + inode->i_nlink = le32_to_cpu(pfindData->NumberOfLinks); |
| 15451 | + |
| 15452 | + /* BB fill in uid and gid here? with help from winbind? |
| 15453 | + or retrieve from NTFS stream extended attribute */ |
| 15454 | + if(atomic_read(&cifsInfo->inUse) == 0) { |
| 15455 | + inode->i_uid = cifs_sb->mnt_uid; |
| 15456 | + inode->i_gid = cifs_sb->mnt_gid; |
| 15457 | + /* set so we do not keep refreshing these fields with |
| 15458 | + bad data after user has changed them in memory */ |
| 15459 | + atomic_set(&cifsInfo->inUse,1); |
| 15460 | + } |
| 15461 | + |
| 15462 | + if (S_ISREG(inode->i_mode)) { |
| 15463 | + cFYI(1, (" File inode ")); |
| 15464 | + inode->i_op = &cifs_file_inode_ops; |
| 15465 | + inode->i_fop = &cifs_file_ops; |
| 15466 | + inode->i_data.a_ops = &cifs_addr_ops; |
| 15467 | + } else if (S_ISDIR(inode->i_mode)) { |
| 15468 | + cFYI(1, (" Directory inode ")); |
| 15469 | + inode->i_op = &cifs_dir_inode_ops; |
| 15470 | + inode->i_fop = &cifs_dir_ops; |
| 15471 | + } else if (S_ISLNK(inode->i_mode)) { |
| 15472 | + cFYI(1, (" Symbolic Link inode ")); |
| 15473 | + inode->i_op = &cifs_symlink_inode_ops; |
| 15474 | + } else { |
| 15475 | + init_special_inode(inode, inode->i_mode, |
| 15476 | + kdev_t_to_nr(inode->i_rdev)); |
| 15477 | + } |
| 15478 | + } |
| 15479 | + if(buf) |
| 15480 | + kfree(buf); |
| 15481 | + return rc; |
| 15482 | +} |
| 15483 | + |
| 15484 | +void |
| 15485 | +cifs_read_inode(struct inode *inode) |
| 15486 | +{ /* gets root inode */ |
| 15487 | + int xid; |
| 15488 | + struct cifs_sb_info *cifs_sb; |
| 15489 | + struct cifsInodeInfo *cifs_inode; |
| 15490 | + |
| 15491 | + cifs_sb = CIFS_SB(inode->i_sb); |
| 15492 | + xid = GetXid(); |
| 15493 | + |
| 15494 | + cifs_inode = CIFS_I(inode); |
| 15495 | + cifs_inode->cifsAttrs = ATTR_DIRECTORY; |
| 15496 | + atomic_set(&cifs_inode->inUse, 0); |
| 15497 | + cifs_inode->time = 0; |
| 15498 | + inode->i_blksize = CIFS_MAX_MSGSIZE; |
| 15499 | + inode->i_blkbits = 14; /* 2**14 = CIFS_MAX_MSGSIZE */ |
| 15500 | + |
| 15501 | + INIT_LIST_HEAD(&cifs_inode->openFileList); |
| 15502 | + |
| 15503 | + if (cifs_sb->tcon->ses->capabilities & CAP_UNIX) |
| 15504 | + cifs_get_inode_info_unix(&inode, "", inode->i_sb,xid); |
| 15505 | + else |
| 15506 | + cifs_get_inode_info(&inode, "", NULL, inode->i_sb,xid); |
| 15507 | + /* can not call macro FreeXid here since in a void func */ |
| 15508 | + _FreeXid(xid); |
| 15509 | +} |
| 15510 | + |
| 15511 | +int |
| 15512 | +cifs_unlink(struct inode *inode, struct dentry *direntry) |
| 15513 | +{ |
| 15514 | + int rc = 0; |
| 15515 | + int xid; |
| 15516 | + struct cifs_sb_info *cifs_sb; |
| 15517 | + struct cifsTconInfo *pTcon; |
| 15518 | + char *full_path = NULL; |
| 15519 | + struct cifsInodeInfo *cifsInode; |
| 15520 | + FILE_BASIC_INFO * pinfo_buf; |
| 15521 | + |
| 15522 | + cFYI(1, (" cifs_unlink, inode = 0x%p with ", inode)); |
| 15523 | + |
| 15524 | + xid = GetXid(); |
| 15525 | + |
| 15526 | + cifs_sb = CIFS_SB(inode->i_sb); |
| 15527 | + pTcon = cifs_sb->tcon; |
| 15528 | + |
| 15529 | +/* Unlink can be called from rename so we can not grab |
| 15530 | + the sem here since we deadlock otherwise */ |
| 15531 | +/* down(&direntry->d_sb->s_vfs_rename_sem);*/ |
| 15532 | + full_path = build_path_from_dentry(direntry); |
| 15533 | +/* up(&direntry->d_sb->s_vfs_rename_sem);*/ |
| 15534 | + if(full_path == NULL) { |
| 15535 | + FreeXid(xid); |
| 15536 | + return -ENOMEM; |
| 15537 | + } |
| 15538 | + rc = CIFSSMBDelFile(xid, pTcon, full_path, cifs_sb->local_nls); |
| 15539 | + |
| 15540 | + if (!rc) { |
| 15541 | + direntry->d_inode->i_nlink--; |
| 15542 | + } else if (rc == -ENOENT) { |
| 15543 | + d_drop(direntry); |
| 15544 | + } else if (rc == -ETXTBSY) { |
| 15545 | + int oplock = FALSE; |
| 15546 | + __u16 netfid; |
| 15547 | + |
| 15548 | + rc = CIFSSMBOpen(xid, pTcon, full_path, FILE_OPEN, DELETE, |
| 15549 | + CREATE_NOT_DIR | CREATE_DELETE_ON_CLOSE, |
| 15550 | + &netfid, &oplock, NULL, cifs_sb->local_nls); |
| 15551 | + if(rc==0) { |
| 15552 | + CIFSSMBRenameOpenFile(xid,pTcon,netfid, |
| 15553 | + NULL, cifs_sb->local_nls); |
| 15554 | + CIFSSMBClose(xid, pTcon, netfid); |
| 15555 | + direntry->d_inode->i_nlink--; |
| 15556 | + } |
| 15557 | + } else if (rc == -EACCES) { |
| 15558 | + /* try only if r/o attribute set in local lookup data? */ |
| 15559 | + pinfo_buf = (FILE_BASIC_INFO *)kmalloc(sizeof(FILE_BASIC_INFO),GFP_KERNEL); |
| 15560 | + if(pinfo_buf) { |
| 15561 | + memset(pinfo_buf,0,sizeof(FILE_BASIC_INFO)); |
| 15562 | + /* ATTRS set to normal clears r/o bit */ |
| 15563 | + pinfo_buf->Attributes = cpu_to_le32(ATTR_NORMAL); |
| 15564 | + rc = CIFSSMBSetTimes(xid, pTcon, full_path, pinfo_buf, |
| 15565 | + cifs_sb->local_nls); |
| 15566 | + kfree(pinfo_buf); |
| 15567 | + } |
| 15568 | + if(rc==0) { |
| 15569 | + rc = CIFSSMBDelFile(xid, pTcon, full_path, cifs_sb->local_nls); |
| 15570 | + if (!rc) { |
| 15571 | + direntry->d_inode->i_nlink--; |
| 15572 | + } else if (rc == -ETXTBSY) { |
| 15573 | + int oplock = FALSE; |
| 15574 | + __u16 netfid; |
| 15575 | + |
| 15576 | + rc = CIFSSMBOpen(xid, pTcon, full_path, FILE_OPEN, DELETE, |
| 15577 | + CREATE_NOT_DIR | CREATE_DELETE_ON_CLOSE, |
| 15578 | + &netfid, &oplock, NULL, cifs_sb->local_nls); |
| 15579 | + if(rc==0) { |
| 15580 | + CIFSSMBRenameOpenFile(xid,pTcon,netfid,NULL,cifs_sb->local_nls); |
| 15581 | + CIFSSMBClose(xid, pTcon, netfid); |
| 15582 | + direntry->d_inode->i_nlink--; |
| 15583 | + } |
| 15584 | + /* BB if rc = -ETXTBUSY goto the rename logic BB */ |
| 15585 | + } |
| 15586 | + } |
| 15587 | + } |
| 15588 | + cifsInode = CIFS_I(direntry->d_inode); |
| 15589 | + cifsInode->time = 0; /* will force revalidate to get info when needed */ |
| 15590 | + direntry->d_inode->i_ctime = inode->i_ctime = inode->i_mtime = |
| 15591 | + CURRENT_TIME; |
| 15592 | + cifsInode = CIFS_I(inode); |
| 15593 | + cifsInode->time = 0; /* force revalidate of dir as well */ |
| 15594 | + |
| 15595 | + if (full_path) |
| 15596 | + kfree(full_path); |
| 15597 | + FreeXid(xid); |
| 15598 | + return rc; |
| 15599 | +} |
| 15600 | + |
| 15601 | +int |
| 15602 | +cifs_mkdir(struct inode *inode, struct dentry *direntry, int mode) |
| 15603 | +{ |
| 15604 | + int rc = 0; |
| 15605 | + int xid; |
| 15606 | + struct cifs_sb_info *cifs_sb; |
| 15607 | + struct cifsTconInfo *pTcon; |
| 15608 | + char *full_path = NULL; |
| 15609 | + struct inode *newinode = NULL; |
| 15610 | + |
| 15611 | + cFYI(1, ("In cifs_mkdir, mode = 0x%x inode = 0x%p ", mode, inode)); |
| 15612 | + |
| 15613 | + xid = GetXid(); |
| 15614 | + |
| 15615 | + cifs_sb = CIFS_SB(inode->i_sb); |
| 15616 | + pTcon = cifs_sb->tcon; |
| 15617 | + |
| 15618 | + down(&inode->i_sb->s_vfs_rename_sem); |
| 15619 | + full_path = build_path_from_dentry(direntry); |
| 15620 | + up(&inode->i_sb->s_vfs_rename_sem); |
| 15621 | + if(full_path == NULL) { |
| 15622 | + FreeXid(xid); |
| 15623 | + return -ENOMEM; |
| 15624 | + } |
| 15625 | + /* BB add setting the equivalent of mode via CreateX w/ACLs */ |
| 15626 | + rc = CIFSSMBMkDir(xid, pTcon, full_path, cifs_sb->local_nls); |
| 15627 | + if (rc) { |
| 15628 | + cFYI(1, ("cifs_mkdir returned 0x%x ", rc)); |
| 15629 | + d_drop(direntry); |
| 15630 | + } else { |
| 15631 | + inode->i_nlink++; |
| 15632 | + if (pTcon->ses->capabilities & CAP_UNIX) |
| 15633 | + rc = cifs_get_inode_info_unix(&newinode, full_path, |
| 15634 | + inode->i_sb,xid); |
| 15635 | + else |
| 15636 | + rc = cifs_get_inode_info(&newinode, full_path,NULL, |
| 15637 | + inode->i_sb,xid); |
| 15638 | + |
| 15639 | + direntry->d_op = &cifs_dentry_ops; |
| 15640 | + d_instantiate(direntry, newinode); |
| 15641 | + if(direntry->d_inode) |
| 15642 | + direntry->d_inode->i_nlink = 2; |
| 15643 | + if (cifs_sb->tcon->ses->capabilities & CAP_UNIX) |
| 15644 | + CIFSSMBUnixSetPerms(xid, pTcon, full_path, mode, |
| 15645 | + (__u64)-1, |
| 15646 | + (__u64)-1, |
| 15647 | + 0 /* dev_t */, |
| 15648 | + cifs_sb->local_nls); |
| 15649 | + else { /* BB to be implemented via Windows secrty descriptors*/ |
| 15650 | + /* eg CIFSSMBWinSetPerms(xid,pTcon,full_path,mode,-1,-1,local_nls);*/ |
| 15651 | + } |
| 15652 | + } |
| 15653 | + if (full_path) |
| 15654 | + kfree(full_path); |
| 15655 | + FreeXid(xid); |
| 15656 | + |
| 15657 | + return rc; |
| 15658 | +} |
| 15659 | + |
| 15660 | +int |
| 15661 | +cifs_rmdir(struct inode *inode, struct dentry *direntry) |
| 15662 | +{ |
| 15663 | + int rc = 0; |
| 15664 | + int xid; |
| 15665 | + struct cifs_sb_info *cifs_sb; |
| 15666 | + struct cifsTconInfo *pTcon; |
| 15667 | + char *full_path = NULL; |
| 15668 | + struct cifsInodeInfo *cifsInode; |
| 15669 | + |
| 15670 | + cFYI(1, (" cifs_rmdir, inode = 0x%p with ", inode)); |
| 15671 | + |
| 15672 | + xid = GetXid(); |
| 15673 | + |
| 15674 | + cifs_sb = CIFS_SB(inode->i_sb); |
| 15675 | + pTcon = cifs_sb->tcon; |
| 15676 | + |
| 15677 | + down(&inode->i_sb->s_vfs_rename_sem); |
| 15678 | + full_path = build_path_from_dentry(direntry); |
| 15679 | + up(&inode->i_sb->s_vfs_rename_sem); |
| 15680 | + if(full_path == NULL) { |
| 15681 | + FreeXid(xid); |
| 15682 | + return -ENOMEM; |
| 15683 | + } |
| 15684 | + |
| 15685 | + rc = CIFSSMBRmDir(xid, pTcon, full_path, cifs_sb->local_nls); |
| 15686 | + |
| 15687 | + if (!rc) { |
| 15688 | + inode->i_nlink--; |
| 15689 | + direntry->d_inode->i_size = 0; |
| 15690 | + direntry->d_inode->i_nlink = 0; |
| 15691 | + } |
| 15692 | + |
| 15693 | + cifsInode = CIFS_I(direntry->d_inode); |
| 15694 | + cifsInode->time = 0; /* force revalidate to go get info when needed */ |
| 15695 | + direntry->d_inode->i_ctime = inode->i_ctime = inode->i_mtime = |
| 15696 | + CURRENT_TIME; |
| 15697 | + |
| 15698 | + if (full_path) |
| 15699 | + kfree(full_path); |
| 15700 | + FreeXid(xid); |
| 15701 | + return rc; |
| 15702 | +} |
| 15703 | + |
| 15704 | +int |
| 15705 | +cifs_rename(struct inode *source_inode, struct dentry *source_direntry, |
| 15706 | + struct inode *target_inode, struct dentry *target_direntry) |
| 15707 | +{ |
| 15708 | + char *fromName; |
| 15709 | + char *toName; |
| 15710 | + struct cifs_sb_info *cifs_sb_source; |
| 15711 | + struct cifs_sb_info *cifs_sb_target; |
| 15712 | + struct cifsTconInfo *pTcon; |
| 15713 | + int xid; |
| 15714 | + int rc = 0; |
| 15715 | + |
| 15716 | + xid = GetXid(); |
| 15717 | + |
| 15718 | + cifs_sb_target = CIFS_SB(target_inode->i_sb); |
| 15719 | + cifs_sb_source = CIFS_SB(source_inode->i_sb); |
| 15720 | + pTcon = cifs_sb_source->tcon; |
| 15721 | + |
| 15722 | + if (pTcon != cifs_sb_target->tcon) { |
| 15723 | + FreeXid(xid); |
| 15724 | + return -EXDEV; /* BB actually could be allowed if same server, but |
| 15725 | + different share. Might eventually add support for this */ |
| 15726 | + } |
| 15727 | + |
| 15728 | + /* we already have the rename sem so we do not need |
| 15729 | + to grab it again here to protect the path integrity */ |
| 15730 | + fromName = build_path_from_dentry(source_direntry); |
| 15731 | + toName = build_path_from_dentry(target_direntry); |
| 15732 | + if((fromName == NULL) || (toName == NULL)) { |
| 15733 | + rc = -ENOMEM; |
| 15734 | + goto cifs_rename_exit; |
| 15735 | + } |
| 15736 | + |
| 15737 | + rc = CIFSSMBRename(xid, pTcon, fromName, toName, |
| 15738 | + cifs_sb_source->local_nls); |
| 15739 | + if(rc == -EEXIST) { |
| 15740 | + /* check if they are the same file |
| 15741 | + because rename of hardlinked files is a noop */ |
| 15742 | + FILE_UNIX_BASIC_INFO * info_buf_source; |
| 15743 | + FILE_UNIX_BASIC_INFO * info_buf_target; |
| 15744 | + |
| 15745 | + info_buf_source = |
| 15746 | + kmalloc(2 * sizeof(FILE_UNIX_BASIC_INFO),GFP_KERNEL); |
| 15747 | + if(info_buf_source != NULL) { |
| 15748 | + info_buf_target = info_buf_source+1; |
| 15749 | + rc = CIFSSMBUnixQPathInfo(xid, pTcon, fromName, |
| 15750 | + info_buf_source, cifs_sb_source->local_nls); |
| 15751 | + if(rc == 0) { |
| 15752 | + rc = CIFSSMBUnixQPathInfo(xid,pTcon,toName, |
| 15753 | + info_buf_target, |
| 15754 | + cifs_sb_target->local_nls); |
| 15755 | + } |
| 15756 | + if((rc == 0) && |
| 15757 | + (info_buf_source->UniqueId == |
| 15758 | + info_buf_target->UniqueId)) { |
| 15759 | + /* do not rename since the files are hardlinked |
| 15760 | + which is a noop */ |
| 15761 | + } else { |
| 15762 | + /* we either can not tell the files are hardlinked |
| 15763 | + (as with Windows servers) or files are not hardlinked |
| 15764 | + so delete the target manually before renaming to |
| 15765 | + follow POSIX rather than Windows semantics */ |
| 15766 | + cifs_unlink(target_inode, target_direntry); |
| 15767 | + rc = CIFSSMBRename(xid, pTcon, fromName, toName, |
| 15768 | + cifs_sb_source->local_nls); |
| 15769 | + } |
| 15770 | + kfree(info_buf_source); |
| 15771 | + } /* if we can not get memory just leave rc as EEXIST */ |
| 15772 | + } |
| 15773 | + |
| 15774 | + if((rc == -EIO)||(rc == -EEXIST)) { |
| 15775 | + int oplock = FALSE; |
| 15776 | + __u16 netfid; |
| 15777 | + |
| 15778 | + rc = CIFSSMBOpen(xid, pTcon, fromName, FILE_OPEN, GENERIC_READ, |
| 15779 | + CREATE_NOT_DIR, |
| 15780 | + &netfid, &oplock, NULL, cifs_sb_source->local_nls); |
| 15781 | + if(rc==0) { |
| 15782 | + CIFSSMBRenameOpenFile(xid,pTcon,netfid, |
| 15783 | + toName, cifs_sb_source->local_nls); |
| 15784 | + CIFSSMBClose(xid, pTcon, netfid); |
| 15785 | + } |
| 15786 | + } |
| 15787 | + |
| 15788 | +cifs_rename_exit: |
| 15789 | + if (fromName) |
| 15790 | + kfree(fromName); |
| 15791 | + if (toName) |
| 15792 | + kfree(toName); |
| 15793 | + |
| 15794 | + FreeXid(xid); |
| 15795 | + return rc; |
| 15796 | +} |
| 15797 | + |
| 15798 | +int |
| 15799 | +cifs_revalidate(struct dentry *direntry) |
| 15800 | +{ |
| 15801 | + int xid; |
| 15802 | + int rc = 0; |
| 15803 | + char *full_path; |
| 15804 | + struct cifs_sb_info *cifs_sb; |
| 15805 | + struct cifsInodeInfo *cifsInode; |
| 15806 | + loff_t local_size; |
| 15807 | + time_t local_mtime; |
| 15808 | + int invalidate_inode = FALSE; |
| 15809 | + |
| 15810 | + if(direntry->d_inode == NULL) |
| 15811 | + return -ENOENT; |
| 15812 | + |
| 15813 | + cifsInode = CIFS_I(direntry->d_inode); |
| 15814 | + |
| 15815 | + if(cifsInode == NULL) |
| 15816 | + return -ENOENT; |
| 15817 | + |
| 15818 | + /* no sense revalidating inode info on file that no one can write */ |
| 15819 | + if(CIFS_I(direntry->d_inode)->clientCanCacheRead) |
| 15820 | + return rc; |
| 15821 | + |
| 15822 | + xid = GetXid(); |
| 15823 | + |
| 15824 | + cifs_sb = CIFS_SB(direntry->d_sb); |
| 15825 | + |
| 15826 | + /* can not safely grab the rename sem here if |
| 15827 | + rename calls revalidate since that would deadlock */ |
| 15828 | + full_path = build_path_from_dentry(direntry); |
| 15829 | + if(full_path == NULL) { |
| 15830 | + FreeXid(xid); |
| 15831 | + return -ENOMEM; |
| 15832 | + } |
| 15833 | + cFYI(1, |
| 15834 | + ("Revalidate: %s inode 0x%p count %d dentry: 0x%p d_time %ld jiffies %ld", |
| 15835 | + full_path, direntry->d_inode, |
| 15836 | + direntry->d_inode->i_count.counter, direntry, |
| 15837 | + direntry->d_time, jiffies)); |
| 15838 | + |
| 15839 | + if (cifsInode->time == 0){ |
| 15840 | + /* was set to zero previously to force revalidate */ |
| 15841 | + } else if (time_before(jiffies, cifsInode->time + HZ) && lookupCacheEnabled) { |
| 15842 | + if((S_ISREG(direntry->d_inode->i_mode) == 0) || |
| 15843 | + (direntry->d_inode->i_nlink == 1)) { |
| 15844 | + if (full_path) |
| 15845 | + kfree(full_path); |
| 15846 | + FreeXid(xid); |
| 15847 | + return rc; |
| 15848 | + } else { |
| 15849 | + cFYI(1,("Have to revalidate file due to hardlinks")); |
| 15850 | + } |
| 15851 | + } |
| 15852 | + |
| 15853 | + /* save mtime and size */ |
| 15854 | + local_mtime = direntry->d_inode->i_mtime; |
| 15855 | + local_size = direntry->d_inode->i_size; |
| 15856 | + |
| 15857 | + if (cifs_sb->tcon->ses->capabilities & CAP_UNIX) { |
| 15858 | + rc = cifs_get_inode_info_unix(&direntry->d_inode, full_path, |
| 15859 | + direntry->d_sb,xid); |
| 15860 | + if(rc) { |
| 15861 | + cFYI(1,("error on getting revalidate info %d",rc)); |
| 15862 | +/* if(rc != -ENOENT) |
| 15863 | + rc = 0; */ /* BB should we cache info on certain errors? */ |
| 15864 | + } |
| 15865 | + } else { |
| 15866 | + rc = cifs_get_inode_info(&direntry->d_inode, full_path, NULL, |
| 15867 | + direntry->d_sb,xid); |
| 15868 | + if(rc) { |
| 15869 | + cFYI(1,("error on getting revalidate info %d",rc)); |
| 15870 | +/* if(rc != -ENOENT) |
| 15871 | + rc = 0; */ /* BB should we cache info on certain errors? */ |
| 15872 | + } |
| 15873 | + } |
| 15874 | + /* should we remap certain errors, access denied?, to zero */ |
| 15875 | + |
| 15876 | + /* if not oplocked, we invalidate inode pages if mtime |
| 15877 | + or file size had changed on server */ |
| 15878 | + |
| 15879 | + if((local_mtime == direntry->d_inode->i_mtime) && |
| 15880 | + (local_size == direntry->d_inode->i_size)) { |
| 15881 | + cFYI(1,("cifs_revalidate - inode unchanged")); |
| 15882 | + } else { |
| 15883 | + /* file may have changed on server */ |
| 15884 | + if(cifsInode->clientCanCacheRead) { |
| 15885 | + /* no need to invalidate inode pages since we were |
| 15886 | + the only ones who could have modified the file and |
| 15887 | + the server copy is staler than ours */ |
| 15888 | + } else { |
| 15889 | + invalidate_inode = TRUE; |
| 15890 | + } |
| 15891 | + } |
| 15892 | + |
| 15893 | + /* can not grab this sem since kernel filesys locking |
| 15894 | + documentation indicates i_sem may be taken by the kernel |
| 15895 | + on lookup and rename which could deadlock if we grab |
| 15896 | + the i_sem here as well */ |
| 15897 | +/* down(&direntry->d_inode->i_sem);*/ |
| 15898 | + /* need to write out dirty pages here */ |
| 15899 | + if(direntry->d_inode->i_mapping) { |
| 15900 | + /* do we need to lock inode until after invalidate completes below? */ |
| 15901 | + filemap_fdatasync(direntry->d_inode->i_mapping); |
| 15902 | + } |
| 15903 | + if(invalidate_inode) { |
| 15904 | + filemap_fdatawait(direntry->d_inode->i_mapping); |
| 15905 | + /* may eventually have to do this for open files too */ |
| 15906 | + if(list_empty(&(cifsInode->openFileList))) { |
| 15907 | + /* Has changed on server - flush read ahead pages */ |
| 15908 | + cFYI(1,("Invalidating read ahead data on closed file")); |
| 15909 | + invalidate_inode_pages(direntry->d_inode); |
| 15910 | + } |
| 15911 | + } |
| 15912 | +/* up(&direntry->d_inode->i_sem);*/ |
| 15913 | + |
| 15914 | + if (full_path) |
| 15915 | + kfree(full_path); |
| 15916 | + FreeXid(xid); |
| 15917 | + |
| 15918 | + return rc; |
| 15919 | +} |
| 15920 | + |
| 15921 | +/* int cifs_getattr(struct vfsmount *mnt, struct dentry *dentry, struct kstat *stat) |
| 15922 | +{ |
| 15923 | + int err = cifs_revalidate(dentry); |
| 15924 | + if (!err) |
| 15925 | + generic_fillattr(dentry->d_inode, stat); |
| 15926 | + return err; |
| 15927 | +} */ |
| 15928 | + |
| 15929 | +void |
| 15930 | +cifs_truncate_file(struct inode *inode) |
| 15931 | +{ /* BB remove - may not need this function after all BB */ |
| 15932 | + int xid; |
| 15933 | + int rc = -EIO; |
| 15934 | + int found = FALSE; |
| 15935 | + struct cifsFileInfo *open_file = NULL; |
| 15936 | + struct cifs_sb_info *cifs_sb; |
| 15937 | + struct cifsTconInfo *pTcon; |
| 15938 | + struct cifsInodeInfo *cifsInode; |
| 15939 | + struct dentry *dirent; |
| 15940 | + struct list_head * tmp; |
| 15941 | + char *full_path = NULL; |
| 15942 | + |
| 15943 | + xid = GetXid(); |
| 15944 | + |
| 15945 | + cifs_sb = CIFS_SB(inode->i_sb); |
| 15946 | + pTcon = cifs_sb->tcon; |
| 15947 | + |
| 15948 | + /* To avoid spurious oplock breaks from server, in the case |
| 15949 | + of inodes that we already have open, avoid doing path |
| 15950 | + based setting of file size if we can do it by handle. |
| 15951 | + This keeps our caching token (oplock) and avoids |
| 15952 | + timeouts when the local oplock break takes longer to flush |
| 15953 | + writebehind data than the SMB timeout for the SetPathInfo |
| 15954 | + request would allow */ |
| 15955 | + read_lock(&GlobalSMBSeslock); |
| 15956 | + cifsInode = CIFS_I(inode); |
| 15957 | + list_for_each(tmp, &cifsInode->openFileList) { |
| 15958 | + open_file = list_entry(tmp,struct cifsFileInfo, flist); |
| 15959 | + /* We check if file is open for writing first */ |
| 15960 | + if((open_file->pfile) && (!open_file->invalidHandle) && |
| 15961 | + ((open_file->pfile->f_flags & O_RDWR) || |
| 15962 | + (open_file->pfile->f_flags & O_WRONLY))) { |
| 15963 | + read_unlock(&GlobalSMBSeslock); |
| 15964 | + found = TRUE; |
| 15965 | + rc = CIFSSMBSetFileSize(xid, pTcon, inode->i_size, |
| 15966 | + open_file->netfid,open_file->pid,FALSE); |
| 15967 | + if(rc == 0) { |
| 15968 | + FreeXid(xid); |
| 15969 | + return; |
| 15970 | + } |
| 15971 | + /* Do not need reopen and retry on EAGAIN since we will |
| 15972 | + retry by pathname below */ |
| 15973 | + if(rc == -EAGAIN) |
| 15974 | + rc = -EHOSTDOWN; |
| 15975 | + |
| 15976 | + break; /* now that we found one valid file handle no |
| 15977 | + sense continuing to loop trying others */ |
| 15978 | + } |
| 15979 | + } |
| 15980 | + if(found == FALSE) |
| 15981 | + read_unlock(&GlobalSMBSeslock); |
| 15982 | + |
| 15983 | + if (list_empty(&inode->i_dentry)) { |
| 15984 | + cERROR(1, |
| 15985 | + ("Can not get pathname from empty dentry in inode 0x%p ", |
| 15986 | + inode)); |
| 15987 | + FreeXid(xid); |
| 15988 | + return; |
| 15989 | + } |
| 15990 | + |
| 15991 | + dirent = list_entry(inode->i_dentry.next, struct dentry, d_alias); |
| 15992 | + if (dirent) { |
| 15993 | + full_path = build_path_from_dentry(dirent); |
| 15994 | + rc = CIFSSMBSetEOF(xid, pTcon, full_path, inode->i_size,FALSE, |
| 15995 | + cifs_sb->local_nls); |
| 15996 | + cFYI(1,(" SetEOF (truncate) rc = %d",rc)); |
| 15997 | + if (!rc) |
| 15998 | + CIFSSMBSetEOF(xid,pTcon,full_path,inode->i_size,TRUE,cifs_sb->local_nls); |
| 15999 | + /* allocation size setting seems optional so ignore return code */ |
| 16000 | + } |
| 16001 | + if (full_path) |
| 16002 | + kfree(full_path); |
| 16003 | + FreeXid(xid); |
| 16004 | + return; |
| 16005 | +} |
| 16006 | + |
| 16007 | +static int cifs_truncate_page(struct address_space *mapping, loff_t from) |
| 16008 | +{ |
| 16009 | + unsigned long index = from >> PAGE_CACHE_SHIFT; |
| 16010 | + unsigned offset = from & (PAGE_CACHE_SIZE-1); |
| 16011 | + struct page *page; |
| 16012 | + char *kaddr; |
| 16013 | + int rc = 0; |
| 16014 | + |
| 16015 | + page = grab_cache_page(mapping, index); |
| 16016 | + if (!page) |
| 16017 | + return -ENOMEM; |
| 16018 | + |
| 16019 | + kaddr = kmap_atomic(page, KM_USER0); |
| 16020 | + memset(kaddr + offset, 0, PAGE_CACHE_SIZE - offset); |
| 16021 | + flush_dcache_page(page); |
| 16022 | + kunmap_atomic(kaddr, KM_USER0); |
| 16023 | + unlock_page(page); |
| 16024 | + page_cache_release(page); |
| 16025 | + return rc; |
| 16026 | +} |
| 16027 | + |
| 16028 | +int |
| 16029 | +cifs_setattr(struct dentry *direntry, struct iattr *attrs) |
| 16030 | +{ |
| 16031 | + int xid; |
| 16032 | + struct cifs_sb_info *cifs_sb; |
| 16033 | + struct cifsTconInfo *pTcon; |
| 16034 | + char *full_path = NULL; |
| 16035 | + int rc = -EACCES; |
| 16036 | + int found = FALSE; |
| 16037 | + struct cifsFileInfo *open_file = NULL; |
| 16038 | + FILE_BASIC_INFO time_buf; |
| 16039 | + int set_time = FALSE; |
| 16040 | + __u64 mode = 0xFFFFFFFFFFFFFFFFULL; |
| 16041 | + __u64 uid = 0xFFFFFFFFFFFFFFFFULL; |
| 16042 | + __u64 gid = 0xFFFFFFFFFFFFFFFFULL; |
| 16043 | + struct cifsInodeInfo *cifsInode; |
| 16044 | + struct list_head * tmp; |
| 16045 | + |
| 16046 | + xid = GetXid(); |
| 16047 | + |
| 16048 | + cFYI(1, |
| 16049 | + (" In cifs_setattr, name = %s attrs->iavalid 0x%x ", |
| 16050 | + direntry->d_name.name, attrs->ia_valid)); |
| 16051 | + cifs_sb = CIFS_SB(direntry->d_inode->i_sb); |
| 16052 | + pTcon = cifs_sb->tcon; |
| 16053 | + |
| 16054 | + down(&direntry->d_sb->s_vfs_rename_sem); |
| 16055 | + full_path = build_path_from_dentry(direntry); |
| 16056 | + up(&direntry->d_sb->s_vfs_rename_sem); |
| 16057 | + if(full_path == NULL) { |
| 16058 | + FreeXid(xid); |
| 16059 | + return -ENOMEM; |
| 16060 | + } |
| 16061 | + cifsInode = CIFS_I(direntry->d_inode); |
| 16062 | + |
| 16063 | + /* BB check if we need to refresh inode from server now ? BB */ |
| 16064 | + |
| 16065 | + /* need to flush data before changing file size on server */ |
| 16066 | + filemap_fdatasync(direntry->d_inode->i_mapping); |
| 16067 | + |
| 16068 | + if (attrs->ia_valid & ATTR_SIZE) { |
| 16069 | + read_lock(&GlobalSMBSeslock); |
| 16070 | + /* To avoid spurious oplock breaks from server, in the case |
| 16071 | + of inodes that we already have open, avoid doing path |
| 16072 | + based setting of file size if we can do it by handle. |
| 16073 | + This keeps our caching token (oplock) and avoids |
| 16074 | + timeouts when the local oplock break takes longer to flush |
| 16075 | + writebehind data than the SMB timeout for the SetPathInfo |
| 16076 | + request would allow */ |
| 16077 | + list_for_each(tmp, &cifsInode->openFileList) { |
| 16078 | + open_file = list_entry(tmp,struct cifsFileInfo, flist); |
| 16079 | + /* We check if file is open for writing first */ |
| 16080 | + if((open_file->pfile) && |
| 16081 | + ((open_file->pfile->f_flags & O_RDWR) || |
| 16082 | + (open_file->pfile->f_flags & O_WRONLY))) { |
| 16083 | + if(open_file->invalidHandle == FALSE) { |
| 16084 | + /* we found a valid, writeable network file |
| 16085 | + handle to use to try to set the file size */ |
| 16086 | + __u16 nfid = open_file->netfid; |
| 16087 | + __u32 npid = open_file->pid; |
| 16088 | + read_unlock(&GlobalSMBSeslock); |
| 16089 | + found = TRUE; |
| 16090 | + rc = CIFSSMBSetFileSize(xid, pTcon, attrs->ia_size, |
| 16091 | + nfid,npid,FALSE); |
| 16092 | + cFYI(1,("SetFileSize by handle (setattrs) rc = %d",rc)); |
| 16093 | + /* Do not need reopen and retry on EAGAIN since we will |
| 16094 | + retry by pathname below */ |
| 16095 | + |
| 16096 | + break; /* now that we found one valid file handle no |
| 16097 | + sense continuing to loop trying others */ |
| 16098 | + } |
| 16099 | + } |
| 16100 | + } |
| 16101 | + if(found == FALSE) { |
| 16102 | + read_unlock(&GlobalSMBSeslock); |
| 16103 | + } |
| 16104 | + |
| 16105 | + |
| 16106 | + if(rc != 0) { |
| 16107 | + /* Set file size by pathname rather than by handle either |
| 16108 | + because no valid, writeable file handle for it was found or |
| 16109 | + because there was an error setting it by handle */ |
| 16110 | + rc = CIFSSMBSetEOF(xid, pTcon, full_path, attrs->ia_size,FALSE, |
| 16111 | + cifs_sb->local_nls); |
| 16112 | + cFYI(1,(" SetEOF by path (setattrs) rc = %d",rc)); |
| 16113 | + } |
| 16114 | + |
| 16115 | + /* Server is ok setting allocation size implicitly - no need to call: */ |
| 16116 | + /*CIFSSMBSetEOF(xid, pTcon, full_path, attrs->ia_size, TRUE, cifs_sb->local_nls);*/ |
| 16117 | + |
| 16118 | + if (rc == 0) { |
| 16119 | + rc = vmtruncate(direntry->d_inode, attrs->ia_size); |
| 16120 | + cifs_truncate_page(direntry->d_inode->i_mapping, direntry->d_inode->i_size); |
| 16121 | + } |
| 16122 | + } |
| 16123 | + if (attrs->ia_valid & ATTR_UID) { |
| 16124 | + cFYI(1, (" CIFS - UID changed to %d", attrs->ia_uid)); |
| 16125 | + uid = attrs->ia_uid; |
| 16126 | + /* entry->uid = cpu_to_le16(attr->ia_uid); */ |
| 16127 | + } |
| 16128 | + if (attrs->ia_valid & ATTR_GID) { |
| 16129 | + cFYI(1, (" CIFS - GID changed to %d", attrs->ia_gid)); |
| 16130 | + gid = attrs->ia_gid; |
| 16131 | + /* entry->gid = cpu_to_le16(attr->ia_gid); */ |
| 16132 | + } |
| 16133 | + |
| 16134 | + time_buf.Attributes = 0; |
| 16135 | + if (attrs->ia_valid & ATTR_MODE) { |
| 16136 | + cFYI(1, (" CIFS - Mode changed to 0x%x", attrs->ia_mode)); |
| 16137 | + mode = attrs->ia_mode; |
| 16138 | + /* entry->mode = cpu_to_le16(attr->ia_mode); */ |
| 16139 | + } |
| 16140 | + |
| 16141 | + if ((cifs_sb->tcon->ses->capabilities & CAP_UNIX) |
| 16142 | + && (attrs->ia_valid & (ATTR_MODE | ATTR_GID | ATTR_UID))) |
| 16143 | + rc = CIFSSMBUnixSetPerms(xid, pTcon, full_path, mode, uid, gid, |
| 16144 | + 0 /* dev_t */, cifs_sb->local_nls); |
| 16145 | + else if (attrs->ia_valid & ATTR_MODE) { |
| 16146 | + if((mode & S_IWUGO) == 0) /* not writeable */ { |
| 16147 | + if((cifsInode->cifsAttrs & ATTR_READONLY) == 0) |
| 16148 | + time_buf.Attributes = |
| 16149 | + cpu_to_le32(cifsInode->cifsAttrs | ATTR_READONLY); |
| 16150 | + } else if((mode & S_IWUGO) == S_IWUGO) { |
| 16151 | + if(cifsInode->cifsAttrs & ATTR_READONLY) |
| 16152 | + time_buf.Attributes = |
| 16153 | + cpu_to_le32(cifsInode->cifsAttrs & (~ATTR_READONLY)); |
| 16154 | + } |
| 16155 | + /* BB to be implemented - via Windows security descriptors or streams */ |
| 16156 | + /* CIFSSMBWinSetPerms(xid,pTcon,full_path,mode,uid,gid,cifs_sb->local_nls);*/ |
| 16157 | + } |
| 16158 | + |
| 16159 | + if (attrs->ia_valid & ATTR_ATIME) { |
| 16160 | + set_time = TRUE; |
| 16161 | + time_buf.LastAccessTime = |
| 16162 | + cpu_to_le64(cifs_UnixTimeToNT(attrs->ia_atime)); |
| 16163 | + } else |
| 16164 | + time_buf.LastAccessTime = 0; |
| 16165 | + |
| 16166 | + if (attrs->ia_valid & ATTR_MTIME) { |
| 16167 | + set_time = TRUE; |
| 16168 | + time_buf.LastWriteTime = |
| 16169 | + cpu_to_le64(cifs_UnixTimeToNT(attrs->ia_mtime)); |
| 16170 | + } else |
| 16171 | + time_buf.LastWriteTime = 0; |
| 16172 | + |
| 16173 | + if (attrs->ia_valid & ATTR_CTIME) { |
| 16174 | + set_time = TRUE; |
| 16175 | + time_buf.ChangeTime = |
| 16176 | + cpu_to_le64(cifs_UnixTimeToNT(attrs->ia_ctime)); |
| 16177 | + } else |
| 16178 | + time_buf.ChangeTime = 0; |
| 16179 | + |
| 16180 | + if (set_time | time_buf.Attributes) { |
| 16181 | + /* BB what if setting one attribute fails |
| 16182 | + (such as size) but time setting works */ |
| 16183 | + time_buf.CreationTime = 0; /* do not change */ |
| 16184 | + /* In the future we should experiment - try setting timestamps |
| 16185 | + via Handle (SetFileInfo) instead of by path */ |
| 16186 | + rc = CIFSSMBSetTimes(xid, pTcon, full_path, &time_buf, |
| 16187 | + cifs_sb->local_nls); |
| 16188 | + } |
| 16189 | + |
| 16190 | + /* do not need local check to inode_check_ok since the server does that */ |
| 16191 | + if (!rc) |
| 16192 | + rc = inode_setattr(direntry->d_inode, attrs); |
| 16193 | + if (full_path) |
| 16194 | + kfree(full_path); |
| 16195 | + FreeXid(xid); |
| 16196 | + return rc; |
| 16197 | +} |
| 16198 | + |
| 16199 | +void |
| 16200 | +cifs_delete_inode(struct inode *inode) |
| 16201 | +{ |
| 16202 | + cFYI(1, ("In cifs_delete_inode, inode = 0x%p ", inode)); |
| 16203 | + /* may have to add back in if and when safe distributed caching of |
| 16204 | + directories added e.g. via FindNotify */ |
| 16205 | +} |
| 16206 | --- /dev/null |
| 16207 | +++ b/fs/cifs/link.c |
| 16208 | @@ -0,0 +1,328 @@ |
| 16209 | +/* |
| 16210 | + * fs/cifs/link.c |
| 16211 | + * |
| 16212 | + * Copyright (C) International Business Machines Corp., 2002,2003 |
| 16213 | + * Author(s): Steve French (sfrench@us.ibm.com) |
| 16214 | + * |
| 16215 | + * This library is free software; you can redistribute it and/or modify |
| 16216 | + * it under the terms of the GNU Lesser General Public License as published |
| 16217 | + * by the Free Software Foundation; either version 2.1 of the License, or |
| 16218 | + * (at your option) any later version. |
| 16219 | + * |
| 16220 | + * This library is distributed in the hope that it will be useful, |
| 16221 | + * but WITHOUT ANY WARRANTY; without even the implied warranty of |
| 16222 | + * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See |
| 16223 | + * the GNU Lesser General Public License for more details. |
| 16224 | + * |
| 16225 | + * You should have received a copy of the GNU Lesser General Public License |
| 16226 | + * along with this library; if not, write to the Free Software |
| 16227 | + * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA |
| 16228 | + */ |
| 16229 | +#include <linux/fs.h> |
| 16230 | +#include <linux/stat.h> |
| 16231 | +#include "cifsfs.h" |
| 16232 | +#include "cifspdu.h" |
| 16233 | +#include "cifsglob.h" |
| 16234 | +#include "cifsproto.h" |
| 16235 | +#include "cifs_debug.h" |
| 16236 | +#include "cifs_fs_sb.h" |
| 16237 | + |
| 16238 | +int |
| 16239 | +cifs_hardlink(struct dentry *old_file, struct inode *inode, |
| 16240 | + struct dentry *direntry) |
| 16241 | +{ |
| 16242 | + int rc = -EACCES; |
| 16243 | + int xid; |
| 16244 | + char *fromName = NULL; |
| 16245 | + char *toName = NULL; |
| 16246 | + struct cifs_sb_info *cifs_sb_target; |
| 16247 | + struct cifsTconInfo *pTcon; |
| 16248 | + struct cifsInodeInfo *cifsInode; |
| 16249 | + |
| 16250 | + xid = GetXid(); |
| 16251 | + |
| 16252 | + cifs_sb_target = CIFS_SB(inode->i_sb); |
| 16253 | + pTcon = cifs_sb_target->tcon; |
| 16254 | + |
| 16255 | +/* No need to check for cross device links since server will do that |
| 16256 | + BB note DFS case in future though (when we may have to check) */ |
| 16257 | + |
| 16258 | + down(&inode->i_sb->s_vfs_rename_sem); |
| 16259 | + fromName = build_path_from_dentry(old_file); |
| 16260 | + toName = build_path_from_dentry(direntry); |
| 16261 | + up(&inode->i_sb->s_vfs_rename_sem); |
| 16262 | + if((fromName == NULL) || (toName == NULL)) { |
| 16263 | + rc = -ENOMEM; |
| 16264 | + goto cifs_hl_exit; |
| 16265 | + } |
| 16266 | + |
| 16267 | + if (cifs_sb_target->tcon->ses->capabilities & CAP_UNIX) |
| 16268 | + rc = CIFSUnixCreateHardLink(xid, pTcon, fromName, toName, |
| 16269 | + cifs_sb_target->local_nls); |
| 16270 | + else { |
| 16271 | + rc = CIFSCreateHardLink(xid, pTcon, fromName, toName, |
| 16272 | + cifs_sb_target->local_nls); |
| 16273 | + if(rc == -EIO) |
| 16274 | + rc = -EOPNOTSUPP; |
| 16275 | + } |
| 16276 | + |
| 16277 | +/* if (!rc) */ |
| 16278 | + { |
| 16279 | + /* renew_parental_timestamps(old_file); |
| 16280 | + inode->i_nlink++; |
| 16281 | + mark_inode_dirty(inode); |
| 16282 | + d_instantiate(direntry, inode); */ |
| 16283 | + /* BB add call to either mark inode dirty or refresh its data and timestamp to current time */ |
| 16284 | + } |
| 16285 | + d_drop(direntry); /* force new lookup from server */ |
| 16286 | + cifsInode = CIFS_I(old_file->d_inode); |
| 16287 | + cifsInode->time = 0; /* will force revalidate to go get info when needed */ |
| 16288 | + |
| 16289 | +cifs_hl_exit: |
| 16290 | + if (fromName) |
| 16291 | + kfree(fromName); |
| 16292 | + if (toName) |
| 16293 | + kfree(toName); |
| 16294 | + FreeXid(xid); |
| 16295 | + return rc; |
| 16296 | +} |
| 16297 | + |
| 16298 | +int |
| 16299 | +cifs_follow_link(struct dentry *direntry, struct nameidata *nd) |
| 16300 | +{ |
| 16301 | + struct inode *inode = direntry->d_inode; |
| 16302 | + int rc = -EACCES; |
| 16303 | + int xid; |
| 16304 | + char *full_path = NULL; |
| 16305 | + char * target_path; |
| 16306 | + struct cifs_sb_info *cifs_sb; |
| 16307 | + struct cifsTconInfo *pTcon; |
| 16308 | + |
| 16309 | + xid = GetXid(); |
| 16310 | + |
| 16311 | + down(&direntry->d_sb->s_vfs_rename_sem); |
| 16312 | + full_path = build_path_from_dentry(direntry); |
| 16313 | + up(&direntry->d_sb->s_vfs_rename_sem); |
| 16314 | + |
| 16315 | + if(full_path == NULL) { |
| 16316 | + FreeXid(xid); |
| 16317 | + return -ENOMEM; |
| 16318 | + } |
| 16319 | + cFYI(1, ("Full path: %s inode = 0x%p", full_path, inode)); |
| 16320 | + cifs_sb = CIFS_SB(inode->i_sb); |
| 16321 | + pTcon = cifs_sb->tcon; |
| 16322 | + target_path = kmalloc(PATH_MAX, GFP_KERNEL); |
| 16323 | + if(target_path == NULL) { |
| 16324 | + if (full_path) |
| 16325 | + kfree(full_path); |
| 16326 | + FreeXid(xid); |
| 16327 | + return -ENOMEM; |
| 16328 | + } |
| 16329 | + /* can not call the following line due to EFAULT in vfs_readlink which is presumably expecting a user space buffer */ |
| 16330 | + /* length = cifs_readlink(direntry,target_path, sizeof(target_path) - 1); */ |
| 16331 | + |
| 16332 | +/* BB add read reparse point symlink code and Unix extensions symlink code here BB */ |
| 16333 | + if (pTcon->ses->capabilities & CAP_UNIX) |
| 16334 | + rc = CIFSSMBUnixQuerySymLink(xid, pTcon, full_path, |
| 16335 | + target_path, |
| 16336 | + PATH_MAX-1, |
| 16337 | + cifs_sb->local_nls); |
| 16338 | + else { |
| 16339 | + /* rc = CIFSSMBQueryReparseLinkInfo */ |
| 16340 | + /* BB Add code to Query ReparsePoint info */ |
| 16341 | + } |
| 16342 | + /* BB Anything else to do to handle recursive links? */ |
| 16343 | + /* BB Should we be using page symlink ops here? */ |
| 16344 | + |
| 16345 | + if (rc == 0) { |
| 16346 | + |
| 16347 | +/* BB Add special case check for Samba DFS symlinks */ |
| 16348 | + |
| 16349 | + target_path[PATH_MAX-1] = 0; |
| 16350 | + rc = vfs_follow_link(nd, target_path); |
| 16351 | + } |
| 16352 | + /* else EACCESS */ |
| 16353 | + |
| 16354 | + if (target_path) |
| 16355 | + kfree(target_path); |
| 16356 | + if (full_path) |
| 16357 | + kfree(full_path); |
| 16358 | + FreeXid(xid); |
| 16359 | + return rc; |
| 16360 | +} |
| 16361 | + |
| 16362 | +int |
| 16363 | +cifs_symlink(struct inode *inode, struct dentry *direntry, const char *symname) |
| 16364 | +{ |
| 16365 | + int rc = -EOPNOTSUPP; |
| 16366 | + int xid; |
| 16367 | + struct cifs_sb_info *cifs_sb; |
| 16368 | + struct cifsTconInfo *pTcon; |
| 16369 | + char *full_path = NULL; |
| 16370 | + struct inode *newinode = NULL; |
| 16371 | + |
| 16372 | + xid = GetXid(); |
| 16373 | + |
| 16374 | + cifs_sb = CIFS_SB(inode->i_sb); |
| 16375 | + pTcon = cifs_sb->tcon; |
| 16376 | + |
| 16377 | + down(&inode->i_sb->s_vfs_rename_sem); |
| 16378 | + full_path = build_path_from_dentry(direntry); |
| 16379 | + up(&inode->i_sb->s_vfs_rename_sem); |
| 16380 | + |
| 16381 | + if(full_path == NULL) { |
| 16382 | + FreeXid(xid); |
| 16383 | + return -ENOMEM; |
| 16384 | + } |
| 16385 | + |
| 16386 | + cFYI(1, ("Full path: %s ", full_path)); |
| 16387 | + cFYI(1, ("symname is %s", symname)); |
| 16388 | + |
| 16389 | + /* BB what if DFS and this volume is on different share? BB */ |
| 16390 | + if (cifs_sb->tcon->ses->capabilities & CAP_UNIX) |
| 16391 | + rc = CIFSUnixCreateSymLink(xid, pTcon, full_path, symname, |
| 16392 | + cifs_sb->local_nls); |
| 16393 | + /* else |
| 16394 | + rc = CIFSCreateReparseSymLink(xid, pTcon, fromName, toName,cifs_sb_target->local_nls); */ |
| 16395 | + |
| 16396 | + if (rc == 0) { |
| 16397 | + if (pTcon->ses->capabilities & CAP_UNIX) |
| 16398 | + rc = cifs_get_inode_info_unix(&newinode, full_path, |
| 16399 | + inode->i_sb,xid); |
| 16400 | + else |
| 16401 | + rc = cifs_get_inode_info(&newinode, full_path, NULL, |
| 16402 | + inode->i_sb,xid); |
| 16403 | + |
| 16404 | + if (rc != 0) { |
| 16405 | + cFYI(1, |
| 16406 | + ("Create symlink worked but get_inode_info failed with rc = %d ", |
| 16407 | + rc)); |
| 16408 | + } else { |
| 16409 | + direntry->d_op = &cifs_dentry_ops; |
| 16410 | + d_instantiate(direntry, newinode); |
| 16411 | + } |
| 16412 | + } |
| 16413 | + |
| 16414 | + if (full_path) |
| 16415 | + kfree(full_path); |
| 16416 | + FreeXid(xid); |
| 16417 | + return rc; |
| 16418 | +} |
| 16419 | + |
| 16420 | +int |
| 16421 | +cifs_readlink(struct dentry *direntry, char *pBuffer, int buflen) |
| 16422 | +{ |
| 16423 | + struct inode *inode = direntry->d_inode; |
| 16424 | + int rc = -EACCES; |
| 16425 | + int xid; |
| 16426 | + int oplock = FALSE; |
| 16427 | + struct cifs_sb_info *cifs_sb; |
| 16428 | + struct cifsTconInfo *pTcon; |
| 16429 | + char *full_path = NULL; |
| 16430 | + char *tmp_path = NULL; |
| 16431 | + char * tmpbuffer; |
| 16432 | + unsigned char * referrals = NULL; |
| 16433 | + int num_referrals = 0; |
| 16434 | + int len; |
| 16435 | + __u16 fid; |
| 16436 | + |
| 16437 | + xid = GetXid(); |
| 16438 | + cifs_sb = CIFS_SB(inode->i_sb); |
| 16439 | + pTcon = cifs_sb->tcon; |
| 16440 | + |
| 16441 | +/* BB would it be safe against deadlock to grab this sem |
| 16442 | + even though rename itself grabs the sem and calls lookup? */ |
| 16443 | +/* down(&inode->i_sb->s_vfs_rename_sem);*/ |
| 16444 | + full_path = build_path_from_dentry(direntry); |
| 16445 | +/* up(&inode->i_sb->s_vfs_rename_sem);*/ |
| 16446 | + |
| 16447 | + if(full_path == NULL) { |
| 16448 | + FreeXid(xid); |
| 16449 | + return -ENOMEM; |
| 16450 | + } |
| 16451 | + |
| 16452 | + cFYI(1, |
| 16453 | + ("Full path: %s inode = 0x%p pBuffer = 0x%p buflen = %d", |
| 16454 | + full_path, inode, pBuffer, buflen)); |
| 16455 | + if(buflen > PATH_MAX) |
| 16456 | + len = PATH_MAX; |
| 16457 | + else |
| 16458 | + len = buflen; |
| 16459 | + tmpbuffer = kmalloc(len,GFP_KERNEL); |
| 16460 | + if(tmpbuffer == NULL) { |
| 16461 | + if (full_path) |
| 16462 | + kfree(full_path); |
| 16463 | + FreeXid(xid); |
| 16464 | + return -ENOMEM; |
| 16465 | + } |
| 16466 | + |
| 16467 | +/* BB add read reparse point symlink code and Unix extensions symlink code here BB */ |
| 16468 | + if (cifs_sb->tcon->ses->capabilities & CAP_UNIX) |
| 16469 | + rc = CIFSSMBUnixQuerySymLink(xid, pTcon, full_path, |
| 16470 | + tmpbuffer, |
| 16471 | + len - 1, |
| 16472 | + cifs_sb->local_nls); |
| 16473 | + else { |
| 16474 | + rc = CIFSSMBOpen(xid, pTcon, full_path, FILE_OPEN, GENERIC_READ, |
| 16475 | + OPEN_REPARSE_POINT,&fid, &oplock, NULL, cifs_sb->local_nls); |
| 16476 | + if(!rc) { |
| 16477 | + rc = CIFSSMBQueryReparseLinkInfo(xid, pTcon, full_path, |
| 16478 | + tmpbuffer, |
| 16479 | + len - 1, |
| 16480 | + fid, |
| 16481 | + cifs_sb->local_nls); |
| 16482 | + if(CIFSSMBClose(xid, pTcon, fid)) { |
| 16483 | + cFYI(1,("Error closing junction point (open for ioctl)")); |
| 16484 | + } |
| 16485 | + if(rc == -EIO) { |
| 16486 | + /* Query if DFS Junction */ |
| 16487 | + tmp_path = |
| 16488 | + kmalloc(MAX_TREE_SIZE + MAX_PATHCONF + 1, |
| 16489 | + GFP_KERNEL); |
| 16490 | + if (tmp_path) { |
| 16491 | + strncpy(tmp_path, pTcon->treeName, MAX_TREE_SIZE); |
| 16492 | + strncat(tmp_path, full_path, MAX_PATHCONF); |
| 16493 | + rc = get_dfs_path(xid, pTcon->ses, tmp_path, |
| 16494 | + cifs_sb->local_nls, &num_referrals, &referrals); |
| 16495 | + cFYI(1,("Get DFS for %s rc = %d ",tmp_path, rc)); |
| 16496 | + if((num_referrals == 0) && (rc == 0)) |
| 16497 | + rc = -EACCES; |
| 16498 | + else { |
| 16499 | + cFYI(1,("num referral: %d",num_referrals)); |
| 16500 | + if(referrals) { |
| 16501 | + cFYI(1,("referral string: %s ",referrals)); |
| 16502 | + strncpy(tmpbuffer, referrals, len-1); |
| 16503 | + } |
| 16504 | + } |
| 16505 | + if(referrals) |
| 16506 | + kfree(referrals); |
| 16507 | + kfree(tmp_path); |
| 16508 | + if(referrals) { |
| 16509 | + kfree(referrals); |
| 16510 | + } |
| 16511 | + } |
| 16512 | + /* BB add code like else decode referrals then memcpy to |
| 16513 | + tmpbuffer and free referrals string array BB */ |
| 16514 | + } |
| 16515 | + } |
| 16516 | + } |
| 16517 | + /* BB Anything else to do to handle recursive links? */ |
| 16518 | + /* BB Should we be using page ops here? */ |
| 16519 | + |
| 16520 | + /* BB null terminate returned string in pBuffer? BB */ |
| 16521 | + if (rc == 0) { |
| 16522 | + rc = vfs_readlink(direntry, pBuffer, len, tmpbuffer); |
| 16523 | + cFYI(1, |
| 16524 | + ("vfs_readlink called from cifs_readlink returned %d", |
| 16525 | + rc)); |
| 16526 | + } |
| 16527 | + |
| 16528 | + if (tmpbuffer) { |
| 16529 | + kfree(tmpbuffer); |
| 16530 | + } |
| 16531 | + if (full_path) { |
| 16532 | + kfree(full_path); |
| 16533 | + } |
| 16534 | + FreeXid(xid); |
| 16535 | + return rc; |
| 16536 | +} |
| 16537 | --- /dev/null |
| 16538 | +++ b/fs/cifs/Makefile |
| 16539 | @@ -0,0 +1,10 @@ |
| 16540 | +# |
| 16541 | +# Makefile for Linux CIFS VFS client |
| 16542 | +# |
| 16543 | +O_TARGET := cifs.o |
| 16544 | + |
| 16545 | +obj-y := cifsfs.o cifssmb.o cifs_debug.o connect.o dir.o file.o inode.o link.o misc.o netmisc.o smbdes.o smbencrypt.o transport.o asn1.o md4.o md5.o cifs_unicode.o nterr.o cifsencrypt.o |
| 16546 | + |
| 16547 | +obj-m := $(O_TARGET) |
| 16548 | + |
| 16549 | +include $(TOPDIR)/Rules.make |
| 16550 | --- /dev/null |
| 16551 | +++ b/fs/cifs/md4.c |
| 16552 | @@ -0,0 +1,203 @@ |
| 16553 | +/* |
| 16554 | + Unix SMB/Netbios implementation. |
| 16555 | + Version 1.9. |
| 16556 | + a implementation of MD4 designed for use in the SMB authentication protocol |
| 16557 | + Copyright (C) Andrew Tridgell 1997-1998. |
| 16558 | + Modified by Steve French (sfrench@us.ibm.com) 2002-2003 |
| 16559 | + |
| 16560 | + This program is free software; you can redistribute it and/or modify |
| 16561 | + it under the terms of the GNU General Public License as published by |
| 16562 | + the Free Software Foundation; either version 2 of the License, or |
| 16563 | + (at your option) any later version. |
| 16564 | + |
| 16565 | + This program is distributed in the hope that it will be useful, |
| 16566 | + but WITHOUT ANY WARRANTY; without even the implied warranty of |
| 16567 | + MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the |
| 16568 | + GNU General Public License for more details. |
| 16569 | + |
| 16570 | + You should have received a copy of the GNU General Public License |
| 16571 | + along with this program; if not, write to the Free Software |
| 16572 | + Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA. |
| 16573 | +*/ |
| 16574 | +#include <linux/module.h> |
| 16575 | +#include <linux/fs.h> |
| 16576 | +/* NOTE: This code makes no attempt to be fast! */ |
| 16577 | + |
| 16578 | +static __u32 |
| 16579 | +F(__u32 X, __u32 Y, __u32 Z) |
| 16580 | +{ |
| 16581 | + return (X & Y) | ((~X) & Z); |
| 16582 | +} |
| 16583 | + |
| 16584 | +static __u32 |
| 16585 | +G(__u32 X, __u32 Y, __u32 Z) |
| 16586 | +{ |
| 16587 | + return (X & Y) | (X & Z) | (Y & Z); |
| 16588 | +} |
| 16589 | + |
| 16590 | +static __u32 |
| 16591 | +H(__u32 X, __u32 Y, __u32 Z) |
| 16592 | +{ |
| 16593 | + return X ^ Y ^ Z; |
| 16594 | +} |
| 16595 | + |
| 16596 | +static __u32 |
| 16597 | +lshift(__u32 x, int s) |
| 16598 | +{ |
| 16599 | + x &= 0xFFFFFFFF; |
| 16600 | + return ((x << s) & 0xFFFFFFFF) | (x >> (32 - s)); |
| 16601 | +} |
| 16602 | + |
| 16603 | +#define ROUND1(a,b,c,d,k,s) (*a) = lshift((*a) + F(*b,*c,*d) + X[k], s) |
| 16604 | +#define ROUND2(a,b,c,d,k,s) (*a) = lshift((*a) + G(*b,*c,*d) + X[k] + (__u32)0x5A827999,s) |
| 16605 | +#define ROUND3(a,b,c,d,k,s) (*a) = lshift((*a) + H(*b,*c,*d) + X[k] + (__u32)0x6ED9EBA1,s) |
| 16606 | + |
| 16607 | +/* this applies md4 to 64 byte chunks */ |
| 16608 | +static void |
| 16609 | +mdfour64(__u32 * M, __u32 * A, __u32 *B, __u32 * C, __u32 *D) |
| 16610 | +{ |
| 16611 | + int j; |
| 16612 | + __u32 AA, BB, CC, DD; |
| 16613 | + __u32 X[16]; |
| 16614 | + |
| 16615 | + |
| 16616 | + for (j = 0; j < 16; j++) |
| 16617 | + X[j] = M[j]; |
| 16618 | + |
| 16619 | + AA = *A; |
| 16620 | + BB = *B; |
| 16621 | + CC = *C; |
| 16622 | + DD = *D; |
| 16623 | + |
| 16624 | + ROUND1(A, B, C, D, 0, 3); |
| 16625 | + ROUND1(D, A, B, C, 1, 7); |
| 16626 | + ROUND1(C, D, A, B, 2, 11); |
| 16627 | + ROUND1(B, C, D, A, 3, 19); |
| 16628 | + ROUND1(A, B, C, D, 4, 3); |
| 16629 | + ROUND1(D, A, B, C, 5, 7); |
| 16630 | + ROUND1(C, D, A, B, 6, 11); |
| 16631 | + ROUND1(B, C, D, A, 7, 19); |
| 16632 | + ROUND1(A, B, C, D, 8, 3); |
| 16633 | + ROUND1(D, A, B, C, 9, 7); |
| 16634 | + ROUND1(C, D, A, B, 10, 11); |
| 16635 | + ROUND1(B, C, D, A, 11, 19); |
| 16636 | + ROUND1(A, B, C, D, 12, 3); |
| 16637 | + ROUND1(D, A, B, C, 13, 7); |
| 16638 | + ROUND1(C, D, A, B, 14, 11); |
| 16639 | + ROUND1(B, C, D, A, 15, 19); |
| 16640 | + |
| 16641 | + ROUND2(A, B, C, D, 0, 3); |
| 16642 | + ROUND2(D, A, B, C, 4, 5); |
| 16643 | + ROUND2(C, D, A, B, 8, 9); |
| 16644 | + ROUND2(B, C, D, A, 12, 13); |
| 16645 | + ROUND2(A, B, C, D, 1, 3); |
| 16646 | + ROUND2(D, A, B, C, 5, 5); |
| 16647 | + ROUND2(C, D, A, B, 9, 9); |
| 16648 | + ROUND2(B, C, D, A, 13, 13); |
| 16649 | + ROUND2(A, B, C, D, 2, 3); |
| 16650 | + ROUND2(D, A, B, C, 6, 5); |
| 16651 | + ROUND2(C, D, A, B, 10, 9); |
| 16652 | + ROUND2(B, C, D, A, 14, 13); |
| 16653 | + ROUND2(A, B, C, D, 3, 3); |
| 16654 | + ROUND2(D, A, B, C, 7, 5); |
| 16655 | + ROUND2(C, D, A, B, 11, 9); |
| 16656 | + ROUND2(B, C, D, A, 15, 13); |
| 16657 | + |
| 16658 | + ROUND3(A, B, C, D, 0, 3); |
| 16659 | + ROUND3(D, A, B, C, 8, 9); |
| 16660 | + ROUND3(C, D, A, B, 4, 11); |
| 16661 | + ROUND3(B, C, D, A, 12, 15); |
| 16662 | + ROUND3(A, B, C, D, 2, 3); |
| 16663 | + ROUND3(D, A, B, C, 10, 9); |
| 16664 | + ROUND3(C, D, A, B, 6, 11); |
| 16665 | + ROUND3(B, C, D, A, 14, 15); |
| 16666 | + ROUND3(A, B, C, D, 1, 3); |
| 16667 | + ROUND3(D, A, B, C, 9, 9); |
| 16668 | + ROUND3(C, D, A, B, 5, 11); |
| 16669 | + ROUND3(B, C, D, A, 13, 15); |
| 16670 | + ROUND3(A, B, C, D, 3, 3); |
| 16671 | + ROUND3(D, A, B, C, 11, 9); |
| 16672 | + ROUND3(C, D, A, B, 7, 11); |
| 16673 | + ROUND3(B, C, D, A, 15, 15); |
| 16674 | + |
| 16675 | + *A += AA; |
| 16676 | + *B += BB; |
| 16677 | + *C += CC; |
| 16678 | + *D += DD; |
| 16679 | + |
| 16680 | + *A &= 0xFFFFFFFF; |
| 16681 | + *B &= 0xFFFFFFFF; |
| 16682 | + *C &= 0xFFFFFFFF; |
| 16683 | + *D &= 0xFFFFFFFF; |
| 16684 | + |
| 16685 | + for (j = 0; j < 16; j++) |
| 16686 | + X[j] = 0; |
| 16687 | +} |
| 16688 | + |
| 16689 | +static void |
| 16690 | +copy64(__u32 * M, unsigned char *in) |
| 16691 | +{ |
| 16692 | + int i; |
| 16693 | + |
| 16694 | + for (i = 0; i < 16; i++) |
| 16695 | + M[i] = (in[i * 4 + 3] << 24) | (in[i * 4 + 2] << 16) | |
| 16696 | + (in[i * 4 + 1] << 8) | (in[i * 4 + 0] << 0); |
| 16697 | +} |
| 16698 | + |
| 16699 | +static void |
| 16700 | +copy4(unsigned char *out, __u32 x) |
| 16701 | +{ |
| 16702 | + out[0] = x & 0xFF; |
| 16703 | + out[1] = (x >> 8) & 0xFF; |
| 16704 | + out[2] = (x >> 16) & 0xFF; |
| 16705 | + out[3] = (x >> 24) & 0xFF; |
| 16706 | +} |
| 16707 | + |
| 16708 | +/* produce a md4 message digest from data of length n bytes */ |
| 16709 | +void |
| 16710 | +mdfour(unsigned char *out, unsigned char *in, int n) |
| 16711 | +{ |
| 16712 | + unsigned char buf[128]; |
| 16713 | + __u32 M[16]; |
| 16714 | + __u32 b = n * 8; |
| 16715 | + int i; |
| 16716 | + __u32 A = 0x67452301; |
| 16717 | + __u32 B = 0xefcdab89; |
| 16718 | + __u32 C = 0x98badcfe; |
| 16719 | + __u32 D = 0x10325476; |
| 16720 | + |
| 16721 | + while (n > 64) { |
| 16722 | + copy64(M, in); |
| 16723 | + mdfour64(M,&A,&B, &C, &D); |
| 16724 | + in += 64; |
| 16725 | + n -= 64; |
| 16726 | + } |
| 16727 | + |
| 16728 | + for (i = 0; i < 128; i++) |
| 16729 | + buf[i] = 0; |
| 16730 | + memcpy(buf, in, n); |
| 16731 | + buf[n] = 0x80; |
| 16732 | + |
| 16733 | + if (n <= 55) { |
| 16734 | + copy4(buf + 56, b); |
| 16735 | + copy64(M, buf); |
| 16736 | + mdfour64(M, &A, &B, &C, &D); |
| 16737 | + } else { |
| 16738 | + copy4(buf + 120, b); |
| 16739 | + copy64(M, buf); |
| 16740 | + mdfour64(M, &A, &B, &C, &D); |
| 16741 | + copy64(M, buf + 64); |
| 16742 | + mdfour64(M, &A, &B, &C, &D); |
| 16743 | + } |
| 16744 | + |
| 16745 | + for (i = 0; i < 128; i++) |
| 16746 | + buf[i] = 0; |
| 16747 | + copy64(M, buf); |
| 16748 | + |
| 16749 | + copy4(out, A); |
| 16750 | + copy4(out + 4, B); |
| 16751 | + copy4(out + 8, C); |
| 16752 | + copy4(out + 12, D); |
| 16753 | + |
| 16754 | + A = B = C = D = 0; |
| 16755 | +} |
| 16756 | --- /dev/null |
| 16757 | +++ b/fs/cifs/md5.c |
| 16758 | @@ -0,0 +1,363 @@ |
| 16759 | +/* |
| 16760 | + * This code implements the MD5 message-digest algorithm. |
| 16761 | + * The algorithm is due to Ron Rivest. This code was |
| 16762 | + * written by Colin Plumb in 1993, no copyright is claimed. |
| 16763 | + * This code is in the public domain; do with it what you wish. |
| 16764 | + * |
| 16765 | + * Equivalent code is available from RSA Data Security, Inc. |
| 16766 | + * This code has been tested against that, and is equivalent, |
| 16767 | + * except that you don't need to include two pages of legalese |
| 16768 | + * with every copy. |
| 16769 | + * |
| 16770 | + * To compute the message digest of a chunk of bytes, declare an |
| 16771 | + * MD5Context structure, pass it to MD5Init, call MD5Update as |
| 16772 | + * needed on buffers full of bytes, and then call MD5Final, which |
| 16773 | + * will fill a supplied 16-byte array with the digest. |
| 16774 | + */ |
| 16775 | + |
| 16776 | +/* This code slightly modified to fit into Samba by |
| 16777 | + abartlet@samba.org Jun 2001 |
| 16778 | + and to fit the cifs vfs by |
| 16779 | + Steve French sfrench@us.ibm.com */ |
| 16780 | + |
| 16781 | +#include <linux/string.h> |
| 16782 | +#include "md5.h" |
| 16783 | + |
| 16784 | +static void MD5Transform(__u32 buf[4], __u32 const in[16]); |
| 16785 | + |
| 16786 | +/* |
| 16787 | + * Note: this code is harmless on little-endian machines. |
| 16788 | + */ |
| 16789 | +static void |
| 16790 | +byteReverse(unsigned char *buf, unsigned longs) |
| 16791 | +{ |
| 16792 | + __u32 t; |
| 16793 | + do { |
| 16794 | + t = (__u32) ((unsigned) buf[3] << 8 | buf[2]) << 16 | |
| 16795 | + ((unsigned) buf[1] << 8 | buf[0]); |
| 16796 | + *(__u32 *) buf = t; |
| 16797 | + buf += 4; |
| 16798 | + } while (--longs); |
| 16799 | +} |
| 16800 | + |
| 16801 | +/* |
| 16802 | + * Start MD5 accumulation. Set bit count to 0 and buffer to mysterious |
| 16803 | + * initialization constants. |
| 16804 | + */ |
| 16805 | +void |
| 16806 | +MD5Init(struct MD5Context *ctx) |
| 16807 | +{ |
| 16808 | + ctx->buf[0] = 0x67452301; |
| 16809 | + ctx->buf[1] = 0xefcdab89; |
| 16810 | + ctx->buf[2] = 0x98badcfe; |
| 16811 | + ctx->buf[3] = 0x10325476; |
| 16812 | + |
| 16813 | + ctx->bits[0] = 0; |
| 16814 | + ctx->bits[1] = 0; |
| 16815 | +} |
| 16816 | + |
| 16817 | +/* |
| 16818 | + * Update context to reflect the concatenation of another buffer full |
| 16819 | + * of bytes. |
| 16820 | + */ |
| 16821 | +void |
| 16822 | +MD5Update(struct MD5Context *ctx, unsigned char const *buf, unsigned len) |
| 16823 | +{ |
| 16824 | + register __u32 t; |
| 16825 | + |
| 16826 | + /* Update bitcount */ |
| 16827 | + |
| 16828 | + t = ctx->bits[0]; |
| 16829 | + if ((ctx->bits[0] = t + ((__u32) len << 3)) < t) |
| 16830 | + ctx->bits[1]++; /* Carry from low to high */ |
| 16831 | + ctx->bits[1] += len >> 29; |
| 16832 | + |
| 16833 | + t = (t >> 3) & 0x3f; /* Bytes already in shsInfo->data */ |
| 16834 | + |
| 16835 | + /* Handle any leading odd-sized chunks */ |
| 16836 | + |
| 16837 | + if (t) { |
| 16838 | + unsigned char *p = (unsigned char *) ctx->in + t; |
| 16839 | + |
| 16840 | + t = 64 - t; |
| 16841 | + if (len < t) { |
| 16842 | + memmove(p, buf, len); |
| 16843 | + return; |
| 16844 | + } |
| 16845 | + memmove(p, buf, t); |
| 16846 | + byteReverse(ctx->in, 16); |
| 16847 | + MD5Transform(ctx->buf, (__u32 *) ctx->in); |
| 16848 | + buf += t; |
| 16849 | + len -= t; |
| 16850 | + } |
| 16851 | + /* Process data in 64-byte chunks */ |
| 16852 | + |
| 16853 | + while (len >= 64) { |
| 16854 | + memmove(ctx->in, buf, 64); |
| 16855 | + byteReverse(ctx->in, 16); |
| 16856 | + MD5Transform(ctx->buf, (__u32 *) ctx->in); |
| 16857 | + buf += 64; |
| 16858 | + len -= 64; |
| 16859 | + } |
| 16860 | + |
| 16861 | + /* Handle any remaining bytes of data. */ |
| 16862 | + |
| 16863 | + memmove(ctx->in, buf, len); |
| 16864 | +} |
| 16865 | + |
| 16866 | +/* |
| 16867 | + * Final wrapup - pad to 64-byte boundary with the bit pattern |
| 16868 | + * 1 0* (64-bit count of bits processed, MSB-first) |
| 16869 | + */ |
| 16870 | +void |
| 16871 | +MD5Final(unsigned char digest[16], struct MD5Context *ctx) |
| 16872 | +{ |
| 16873 | + unsigned int count; |
| 16874 | + unsigned char *p; |
| 16875 | + |
| 16876 | + /* Compute number of bytes mod 64 */ |
| 16877 | + count = (ctx->bits[0] >> 3) & 0x3F; |
| 16878 | + |
| 16879 | + /* Set the first char of padding to 0x80. This is safe since there is |
| 16880 | + always at least one byte free */ |
| 16881 | + p = ctx->in + count; |
| 16882 | + *p++ = 0x80; |
| 16883 | + |
| 16884 | + /* Bytes of padding needed to make 64 bytes */ |
| 16885 | + count = 64 - 1 - count; |
| 16886 | + |
| 16887 | + /* Pad out to 56 mod 64 */ |
| 16888 | + if (count < 8) { |
| 16889 | + /* Two lots of padding: Pad the first block to 64 bytes */ |
| 16890 | + memset(p, 0, count); |
| 16891 | + byteReverse(ctx->in, 16); |
| 16892 | + MD5Transform(ctx->buf, (__u32 *) ctx->in); |
| 16893 | + |
| 16894 | + /* Now fill the next block with 56 bytes */ |
| 16895 | + memset(ctx->in, 0, 56); |
| 16896 | + } else { |
| 16897 | + /* Pad block to 56 bytes */ |
| 16898 | + memset(p, 0, count - 8); |
| 16899 | + } |
| 16900 | + byteReverse(ctx->in, 14); |
| 16901 | + |
| 16902 | + /* Append length in bits and transform */ |
| 16903 | + ((__u32 *) ctx->in)[14] = ctx->bits[0]; |
| 16904 | + ((__u32 *) ctx->in)[15] = ctx->bits[1]; |
| 16905 | + |
| 16906 | + MD5Transform(ctx->buf, (__u32 *) ctx->in); |
| 16907 | + byteReverse((unsigned char *) ctx->buf, 4); |
| 16908 | + memmove(digest, ctx->buf, 16); |
| 16909 | + memset(ctx, 0, sizeof(*ctx)); /* In case it's sensitive */ |
| 16910 | +} |
| 16911 | + |
| 16912 | +/* The four core functions - F1 is optimized somewhat */ |
| 16913 | + |
| 16914 | +/* #define F1(x, y, z) (x & y | ~x & z) */ |
| 16915 | +#define F1(x, y, z) (z ^ (x & (y ^ z))) |
| 16916 | +#define F2(x, y, z) F1(z, x, y) |
| 16917 | +#define F3(x, y, z) (x ^ y ^ z) |
| 16918 | +#define F4(x, y, z) (y ^ (x | ~z)) |
| 16919 | + |
| 16920 | +/* This is the central step in the MD5 algorithm. */ |
| 16921 | +#define MD5STEP(f, w, x, y, z, data, s) \ |
| 16922 | + ( w += f(x, y, z) + data, w = w<<s | w>>(32-s), w += x ) |
| 16923 | + |
| 16924 | +/* |
| 16925 | + * The core of the MD5 algorithm, this alters an existing MD5 hash to |
| 16926 | + * reflect the addition of 16 longwords of new data. MD5Update blocks |
| 16927 | + * the data and converts bytes into longwords for this routine. |
| 16928 | + */ |
| 16929 | +static void |
| 16930 | +MD5Transform(__u32 buf[4], __u32 const in[16]) |
| 16931 | +{ |
| 16932 | + register __u32 a, b, c, d; |
| 16933 | + |
| 16934 | + a = buf[0]; |
| 16935 | + b = buf[1]; |
| 16936 | + c = buf[2]; |
| 16937 | + d = buf[3]; |
| 16938 | + |
| 16939 | + MD5STEP(F1, a, b, c, d, in[0] + 0xd76aa478, 7); |
| 16940 | + MD5STEP(F1, d, a, b, c, in[1] + 0xe8c7b756, 12); |
| 16941 | + MD5STEP(F1, c, d, a, b, in[2] + 0x242070db, 17); |
| 16942 | + MD5STEP(F1, b, c, d, a, in[3] + 0xc1bdceee, 22); |
| 16943 | + MD5STEP(F1, a, b, c, d, in[4] + 0xf57c0faf, 7); |
| 16944 | + MD5STEP(F1, d, a, b, c, in[5] + 0x4787c62a, 12); |
| 16945 | + MD5STEP(F1, c, d, a, b, in[6] + 0xa8304613, 17); |
| 16946 | + MD5STEP(F1, b, c, d, a, in[7] + 0xfd469501, 22); |
| 16947 | + MD5STEP(F1, a, b, c, d, in[8] + 0x698098d8, 7); |
| 16948 | + MD5STEP(F1, d, a, b, c, in[9] + 0x8b44f7af, 12); |
| 16949 | + MD5STEP(F1, c, d, a, b, in[10] + 0xffff5bb1, 17); |
| 16950 | + MD5STEP(F1, b, c, d, a, in[11] + 0x895cd7be, 22); |
| 16951 | + MD5STEP(F1, a, b, c, d, in[12] + 0x6b901122, 7); |
| 16952 | + MD5STEP(F1, d, a, b, c, in[13] + 0xfd987193, 12); |
| 16953 | + MD5STEP(F1, c, d, a, b, in[14] + 0xa679438e, 17); |
| 16954 | + MD5STEP(F1, b, c, d, a, in[15] + 0x49b40821, 22); |
| 16955 | + |
| 16956 | + MD5STEP(F2, a, b, c, d, in[1] + 0xf61e2562, 5); |
| 16957 | + MD5STEP(F2, d, a, b, c, in[6] + 0xc040b340, 9); |
| 16958 | + MD5STEP(F2, c, d, a, b, in[11] + 0x265e5a51, 14); |
| 16959 | + MD5STEP(F2, b, c, d, a, in[0] + 0xe9b6c7aa, 20); |
| 16960 | + MD5STEP(F2, a, b, c, d, in[5] + 0xd62f105d, 5); |
| 16961 | + MD5STEP(F2, d, a, b, c, in[10] + 0x02441453, 9); |
| 16962 | + MD5STEP(F2, c, d, a, b, in[15] + 0xd8a1e681, 14); |
| 16963 | + MD5STEP(F2, b, c, d, a, in[4] + 0xe7d3fbc8, 20); |
| 16964 | + MD5STEP(F2, a, b, c, d, in[9] + 0x21e1cde6, 5); |
| 16965 | + MD5STEP(F2, d, a, b, c, in[14] + 0xc33707d6, 9); |
| 16966 | + MD5STEP(F2, c, d, a, b, in[3] + 0xf4d50d87, 14); |
| 16967 | + MD5STEP(F2, b, c, d, a, in[8] + 0x455a14ed, 20); |
| 16968 | + MD5STEP(F2, a, b, c, d, in[13] + 0xa9e3e905, 5); |
| 16969 | + MD5STEP(F2, d, a, b, c, in[2] + 0xfcefa3f8, 9); |
| 16970 | + MD5STEP(F2, c, d, a, b, in[7] + 0x676f02d9, 14); |
| 16971 | + MD5STEP(F2, b, c, d, a, in[12] + 0x8d2a4c8a, 20); |
| 16972 | + |
| 16973 | + MD5STEP(F3, a, b, c, d, in[5] + 0xfffa3942, 4); |
| 16974 | + MD5STEP(F3, d, a, b, c, in[8] + 0x8771f681, 11); |
| 16975 | + MD5STEP(F3, c, d, a, b, in[11] + 0x6d9d6122, 16); |
| 16976 | + MD5STEP(F3, b, c, d, a, in[14] + 0xfde5380c, 23); |
| 16977 | + MD5STEP(F3, a, b, c, d, in[1] + 0xa4beea44, 4); |
| 16978 | + MD5STEP(F3, d, a, b, c, in[4] + 0x4bdecfa9, 11); |
| 16979 | + MD5STEP(F3, c, d, a, b, in[7] + 0xf6bb4b60, 16); |
| 16980 | + MD5STEP(F3, b, c, d, a, in[10] + 0xbebfbc70, 23); |
| 16981 | + MD5STEP(F3, a, b, c, d, in[13] + 0x289b7ec6, 4); |
| 16982 | + MD5STEP(F3, d, a, b, c, in[0] + 0xeaa127fa, 11); |
| 16983 | + MD5STEP(F3, c, d, a, b, in[3] + 0xd4ef3085, 16); |
| 16984 | + MD5STEP(F3, b, c, d, a, in[6] + 0x04881d05, 23); |
| 16985 | + MD5STEP(F3, a, b, c, d, in[9] + 0xd9d4d039, 4); |
| 16986 | + MD5STEP(F3, d, a, b, c, in[12] + 0xe6db99e5, 11); |
| 16987 | + MD5STEP(F3, c, d, a, b, in[15] + 0x1fa27cf8, 16); |
| 16988 | + MD5STEP(F3, b, c, d, a, in[2] + 0xc4ac5665, 23); |
| 16989 | + |
| 16990 | + MD5STEP(F4, a, b, c, d, in[0] + 0xf4292244, 6); |
| 16991 | + MD5STEP(F4, d, a, b, c, in[7] + 0x432aff97, 10); |
| 16992 | + MD5STEP(F4, c, d, a, b, in[14] + 0xab9423a7, 15); |
| 16993 | + MD5STEP(F4, b, c, d, a, in[5] + 0xfc93a039, 21); |
| 16994 | + MD5STEP(F4, a, b, c, d, in[12] + 0x655b59c3, 6); |
| 16995 | + MD5STEP(F4, d, a, b, c, in[3] + 0x8f0ccc92, 10); |
| 16996 | + MD5STEP(F4, c, d, a, b, in[10] + 0xffeff47d, 15); |
| 16997 | + MD5STEP(F4, b, c, d, a, in[1] + 0x85845dd1, 21); |
| 16998 | + MD5STEP(F4, a, b, c, d, in[8] + 0x6fa87e4f, 6); |
| 16999 | + MD5STEP(F4, d, a, b, c, in[15] + 0xfe2ce6e0, 10); |
| 17000 | + MD5STEP(F4, c, d, a, b, in[6] + 0xa3014314, 15); |
| 17001 | + MD5STEP(F4, b, c, d, a, in[13] + 0x4e0811a1, 21); |
| 17002 | + MD5STEP(F4, a, b, c, d, in[4] + 0xf7537e82, 6); |
| 17003 | + MD5STEP(F4, d, a, b, c, in[11] + 0xbd3af235, 10); |
| 17004 | + MD5STEP(F4, c, d, a, b, in[2] + 0x2ad7d2bb, 15); |
| 17005 | + MD5STEP(F4, b, c, d, a, in[9] + 0xeb86d391, 21); |
| 17006 | + |
| 17007 | + buf[0] += a; |
| 17008 | + buf[1] += b; |
| 17009 | + buf[2] += c; |
| 17010 | + buf[3] += d; |
| 17011 | +} |
| 17012 | + |
| 17013 | +/*********************************************************************** |
| 17014 | + the rfc 2104 version of hmac_md5 initialisation. |
| 17015 | +***********************************************************************/ |
| 17016 | +void |
| 17017 | +hmac_md5_init_rfc2104(unsigned char *key, int key_len, |
| 17018 | + struct HMACMD5Context *ctx) |
| 17019 | +{ |
| 17020 | + int i; |
| 17021 | + |
| 17022 | + /* if key is longer than 64 bytes reset it to key=MD5(key) */ |
| 17023 | + if (key_len > 64) { |
| 17024 | + unsigned char tk[16]; |
| 17025 | + struct MD5Context tctx; |
| 17026 | + |
| 17027 | + MD5Init(&tctx); |
| 17028 | + MD5Update(&tctx, key, key_len); |
| 17029 | + MD5Final(tk, &tctx); |
| 17030 | + |
| 17031 | + key = tk; |
| 17032 | + key_len = 16; |
| 17033 | + } |
| 17034 | + |
| 17035 | + /* start out by storing key in pads */ |
| 17036 | + memset(ctx->k_ipad, 0, sizeof (ctx->k_ipad)); |
| 17037 | + memset(ctx->k_opad, 0, sizeof (ctx->k_opad)); |
| 17038 | + memcpy(ctx->k_ipad, key, key_len); |
| 17039 | + memcpy(ctx->k_opad, key, key_len); |
| 17040 | + |
| 17041 | + /* XOR key with ipad and opad values */ |
| 17042 | + for (i = 0; i < 64; i++) { |
| 17043 | + ctx->k_ipad[i] ^= 0x36; |
| 17044 | + ctx->k_opad[i] ^= 0x5c; |
| 17045 | + } |
| 17046 | + |
| 17047 | + MD5Init(&ctx->ctx); |
| 17048 | + MD5Update(&ctx->ctx, ctx->k_ipad, 64); |
| 17049 | +} |
| 17050 | + |
| 17051 | +/*********************************************************************** |
| 17052 | + the microsoft version of hmac_md5 initialisation. |
| 17053 | +***********************************************************************/ |
| 17054 | +void |
| 17055 | +hmac_md5_init_limK_to_64(const unsigned char *key, int key_len, |
| 17056 | + struct HMACMD5Context *ctx) |
| 17057 | +{ |
| 17058 | + int i; |
| 17059 | + |
| 17060 | + /* if key is longer than 64 bytes truncate it */ |
| 17061 | + if (key_len > 64) { |
| 17062 | + key_len = 64; |
| 17063 | + } |
| 17064 | + |
| 17065 | + /* start out by storing key in pads */ |
| 17066 | + memset(ctx->k_ipad, 0, sizeof (ctx->k_ipad)); |
| 17067 | + memset(ctx->k_opad, 0, sizeof (ctx->k_opad)); |
| 17068 | + memcpy(ctx->k_ipad, key, key_len); |
| 17069 | + memcpy(ctx->k_opad, key, key_len); |
| 17070 | + |
| 17071 | + /* XOR key with ipad and opad values */ |
| 17072 | + for (i = 0; i < 64; i++) { |
| 17073 | + ctx->k_ipad[i] ^= 0x36; |
| 17074 | + ctx->k_opad[i] ^= 0x5c; |
| 17075 | + } |
| 17076 | + |
| 17077 | + MD5Init(&ctx->ctx); |
| 17078 | + MD5Update(&ctx->ctx, ctx->k_ipad, 64); |
| 17079 | +} |
| 17080 | + |
| 17081 | +/*********************************************************************** |
| 17082 | + update hmac_md5 "inner" buffer |
| 17083 | +***********************************************************************/ |
| 17084 | +void |
| 17085 | +hmac_md5_update(const unsigned char *text, int text_len, |
| 17086 | + struct HMACMD5Context *ctx) |
| 17087 | +{ |
| 17088 | + MD5Update(&ctx->ctx, text, text_len); /* then text of datagram */ |
| 17089 | +} |
| 17090 | + |
| 17091 | +/*********************************************************************** |
| 17092 | + finish off hmac_md5 "inner" buffer and generate outer one. |
| 17093 | +***********************************************************************/ |
| 17094 | +void |
| 17095 | +hmac_md5_final(unsigned char *digest, struct HMACMD5Context *ctx) |
| 17096 | +{ |
| 17097 | + struct MD5Context ctx_o; |
| 17098 | + |
| 17099 | + MD5Final(digest, &ctx->ctx); |
| 17100 | + |
| 17101 | + MD5Init(&ctx_o); |
| 17102 | + MD5Update(&ctx_o, ctx->k_opad, 64); |
| 17103 | + MD5Update(&ctx_o, digest, 16); |
| 17104 | + MD5Final(digest, &ctx_o); |
| 17105 | +} |
| 17106 | + |
| 17107 | +/*********************************************************** |
| 17108 | + single function to calculate an HMAC MD5 digest from data. |
| 17109 | + use the microsoft hmacmd5 init method because the key is 16 bytes. |
| 17110 | +************************************************************/ |
| 17111 | +void |
| 17112 | +hmac_md5(unsigned char key[16], unsigned char *data, int data_len, |
| 17113 | + unsigned char *digest) |
| 17114 | +{ |
| 17115 | + struct HMACMD5Context ctx; |
| 17116 | + hmac_md5_init_limK_to_64(key, 16, &ctx); |
| 17117 | + if (data_len != 0) { |
| 17118 | + hmac_md5_update(data, data_len, &ctx); |
| 17119 | + } |
| 17120 | + hmac_md5_final(digest, &ctx); |
| 17121 | +} |
| 17122 | --- /dev/null |
| 17123 | +++ b/fs/cifs/md5.h |
| 17124 | @@ -0,0 +1,38 @@ |
| 17125 | +#ifndef MD5_H |
| 17126 | +#define MD5_H |
| 17127 | +#ifndef HEADER_MD5_H |
| 17128 | +/* Try to avoid clashes with OpenSSL */ |
| 17129 | +#define HEADER_MD5_H |
| 17130 | +#endif |
| 17131 | + |
| 17132 | +struct MD5Context { |
| 17133 | + __u32 buf[4]; |
| 17134 | + __u32 bits[2]; |
| 17135 | + unsigned char in[64]; |
| 17136 | +}; |
| 17137 | +#endif /* !MD5_H */ |
| 17138 | + |
| 17139 | +#ifndef _HMAC_MD5_H |
| 17140 | +struct HMACMD5Context { |
| 17141 | + struct MD5Context ctx; |
| 17142 | + unsigned char k_ipad[65]; |
| 17143 | + unsigned char k_opad[65]; |
| 17144 | +}; |
| 17145 | +#endif /* _HMAC_MD5_H */ |
| 17146 | + |
| 17147 | +void MD5Init(struct MD5Context *context); |
| 17148 | +void MD5Update(struct MD5Context *context, unsigned char const *buf, |
| 17149 | + unsigned len); |
| 17150 | +void MD5Final(unsigned char digest[16], struct MD5Context *context); |
| 17151 | + |
| 17152 | +/* The following definitions come from lib/hmacmd5.c */ |
| 17153 | + |
| 17154 | +void hmac_md5_init_rfc2104(unsigned char *key, int key_len, |
| 17155 | + struct HMACMD5Context *ctx); |
| 17156 | +void hmac_md5_init_limK_to_64(const unsigned char *key, int key_len, |
| 17157 | + struct HMACMD5Context *ctx); |
| 17158 | +void hmac_md5_update(const unsigned char *text, int text_len, |
| 17159 | + struct HMACMD5Context *ctx); |
| 17160 | +void hmac_md5_final(unsigned char *digest, struct HMACMD5Context *ctx); |
| 17161 | +void hmac_md5(unsigned char key[16], unsigned char *data, int data_len, |
| 17162 | + unsigned char *digest); |
| 17163 | --- /dev/null |
| 17164 | +++ b/fs/cifs/misc.c |
| 17165 | @@ -0,0 +1,463 @@ |
| 17166 | +/* |
| 17167 | + * fs/cifs/misc.c |
| 17168 | + * |
| 17169 | + * Copyright (C) International Business Machines Corp., 2002,2003 |
| 17170 | + * Author(s): Steve French (sfrench@us.ibm.com) |
| 17171 | + * |
| 17172 | + * This library is free software; you can redistribute it and/or modify |
| 17173 | + * it under the terms of the GNU Lesser General Public License as published |
| 17174 | + * by the Free Software Foundation; either version 2.1 of the License, or |
| 17175 | + * (at your option) any later version. |
| 17176 | + * |
| 17177 | + * This library is distributed in the hope that it will be useful, |
| 17178 | + * but WITHOUT ANY WARRANTY; without even the implied warranty of |
| 17179 | + * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See |
| 17180 | + * the GNU Lesser General Public License for more details. |
| 17181 | + * |
| 17182 | + * You should have received a copy of the GNU Lesser General Public License |
| 17183 | + * along with this library; if not, write to the Free Software |
| 17184 | + * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA |
| 17185 | + */ |
| 17186 | + |
| 17187 | +#include <linux/slab.h> |
| 17188 | +#include <linux/ctype.h> |
| 17189 | +#include "cifspdu.h" |
| 17190 | +#include "cifsglob.h" |
| 17191 | +#include "cifsproto.h" |
| 17192 | +#include "cifs_debug.h" |
| 17193 | +#include "smberr.h" |
| 17194 | +#include "nterr.h" |
| 17195 | + |
| 17196 | +extern kmem_cache_t *cifs_req_cachep; |
| 17197 | +extern struct task_struct * oplockThread; |
| 17198 | + |
| 17199 | +__u16 GlobalMid; /* multiplex id - rotating counter */ |
| 17200 | + |
| 17201 | +/* The xid serves as a useful identifier for each incoming vfs request, |
| 17202 | + in a similar way to the mid which is useful to track each sent smb, |
| 17203 | + and CurrentXid can also provide a running counter (although it |
| 17204 | + will eventually wrap past zero) of the total vfs operations handled |
| 17205 | + since the cifs fs was mounted */ |
| 17206 | + |
| 17207 | +unsigned int |
| 17208 | +_GetXid(void) |
| 17209 | +{ |
| 17210 | + unsigned int xid; |
| 17211 | + |
| 17212 | + spin_lock(&GlobalMid_Lock); |
| 17213 | + GlobalTotalActiveXid++; |
| 17214 | + if (GlobalTotalActiveXid > GlobalMaxActiveXid) |
| 17215 | + GlobalMaxActiveXid = GlobalTotalActiveXid; /* keep high water mark for number of simultaneous vfs ops in our filesystem */ |
| 17216 | + xid = GlobalCurrentXid++; |
| 17217 | + spin_unlock(&GlobalMid_Lock); |
| 17218 | + return xid; |
| 17219 | +} |
| 17220 | + |
| 17221 | +void |
| 17222 | +_FreeXid(unsigned int xid) |
| 17223 | +{ |
| 17224 | + spin_lock(&GlobalMid_Lock); |
| 17225 | + /* if(GlobalTotalActiveXid == 0) |
| 17226 | + BUG(); */ |
| 17227 | + GlobalTotalActiveXid--; |
| 17228 | + spin_unlock(&GlobalMid_Lock); |
| 17229 | +} |
| 17230 | + |
| 17231 | +struct cifsSesInfo * |
| 17232 | +sesInfoAlloc(void) |
| 17233 | +{ |
| 17234 | + struct cifsSesInfo *ret_buf; |
| 17235 | + |
| 17236 | + ret_buf = |
| 17237 | + (struct cifsSesInfo *) kmalloc(sizeof (struct cifsSesInfo), |
| 17238 | + GFP_KERNEL); |
| 17239 | + if (ret_buf) { |
| 17240 | + memset(ret_buf, 0, sizeof (struct cifsSesInfo)); |
| 17241 | + write_lock(&GlobalSMBSeslock); |
| 17242 | + atomic_inc(&sesInfoAllocCount); |
| 17243 | + ret_buf->status = CifsNew; |
| 17244 | + list_add(&ret_buf->cifsSessionList, &GlobalSMBSessionList); |
| 17245 | + init_MUTEX(&ret_buf->sesSem); |
| 17246 | + write_unlock(&GlobalSMBSeslock); |
| 17247 | + } |
| 17248 | + return ret_buf; |
| 17249 | +} |
| 17250 | + |
| 17251 | +void |
| 17252 | +sesInfoFree(struct cifsSesInfo *buf_to_free) |
| 17253 | +{ |
| 17254 | + if (buf_to_free == NULL) { |
| 17255 | + cFYI(1, ("Null buffer passed to sesInfoFree")); |
| 17256 | + return; |
| 17257 | + } |
| 17258 | + |
| 17259 | + write_lock(&GlobalSMBSeslock); |
| 17260 | + atomic_dec(&sesInfoAllocCount); |
| 17261 | + list_del(&buf_to_free->cifsSessionList); |
| 17262 | + write_unlock(&GlobalSMBSeslock); |
| 17263 | + if (buf_to_free->serverOS) |
| 17264 | + kfree(buf_to_free->serverOS); |
| 17265 | + if (buf_to_free->serverDomain) |
| 17266 | + kfree(buf_to_free->serverDomain); |
| 17267 | + if (buf_to_free->serverNOS) |
| 17268 | + kfree(buf_to_free->serverNOS); |
| 17269 | + if (buf_to_free->password) |
| 17270 | + kfree(buf_to_free->password); |
| 17271 | + kfree(buf_to_free); |
| 17272 | +} |
| 17273 | + |
| 17274 | +struct cifsTconInfo * |
| 17275 | +tconInfoAlloc(void) |
| 17276 | +{ |
| 17277 | + struct cifsTconInfo *ret_buf; |
| 17278 | + ret_buf = |
| 17279 | + (struct cifsTconInfo *) kmalloc(sizeof (struct cifsTconInfo), |
| 17280 | + GFP_KERNEL); |
| 17281 | + if (ret_buf) { |
| 17282 | + memset(ret_buf, 0, sizeof (struct cifsTconInfo)); |
| 17283 | + write_lock(&GlobalSMBSeslock); |
| 17284 | + atomic_inc(&tconInfoAllocCount); |
| 17285 | + list_add(&ret_buf->cifsConnectionList, |
| 17286 | + &GlobalTreeConnectionList); |
| 17287 | + ret_buf->tidStatus = CifsNew; |
| 17288 | + INIT_LIST_HEAD(&ret_buf->openFileList); |
| 17289 | + init_MUTEX(&ret_buf->tconSem); |
| 17290 | +#ifdef CONFIG_CIFS_STATS |
| 17291 | + ret_buf->stat_lock = SPIN_LOCK_UNLOCKED; |
| 17292 | +#endif |
| 17293 | + write_unlock(&GlobalSMBSeslock); |
| 17294 | + } |
| 17295 | + return ret_buf; |
| 17296 | +} |
| 17297 | + |
| 17298 | +void |
| 17299 | +tconInfoFree(struct cifsTconInfo *buf_to_free) |
| 17300 | +{ |
| 17301 | + if (buf_to_free == NULL) { |
| 17302 | + cFYI(1, ("Null buffer passed to tconInfoFree")); |
| 17303 | + return; |
| 17304 | + } |
| 17305 | + write_lock(&GlobalSMBSeslock); |
| 17306 | + atomic_dec(&tconInfoAllocCount); |
| 17307 | + list_del(&buf_to_free->cifsConnectionList); |
| 17308 | + write_unlock(&GlobalSMBSeslock); |
| 17309 | + if (buf_to_free->nativeFileSystem) |
| 17310 | + kfree(buf_to_free->nativeFileSystem); |
| 17311 | + kfree(buf_to_free); |
| 17312 | +} |
| 17313 | + |
| 17314 | +struct smb_hdr * |
| 17315 | +cifs_buf_get(void) |
| 17316 | +{ |
| 17317 | + struct smb_hdr *ret_buf = NULL; |
| 17318 | + |
| 17319 | +/* We could use negotiated size instead of max_msgsize - |
| 17320 | + but it may be more efficient to always alloc same size |
| 17321 | + albeit slightly larger than necessary and maxbuffersize |
| 17322 | + defaults to this and can not be bigger */ |
| 17323 | + ret_buf = |
| 17324 | + (struct smb_hdr *) kmem_cache_alloc(cifs_req_cachep, SLAB_KERNEL); |
| 17325 | + |
| 17326 | + /* clear the first few header bytes */ |
| 17327 | + if (ret_buf) { |
| 17328 | + memset(ret_buf, 0, sizeof (struct smb_hdr)); |
| 17329 | + atomic_inc(&bufAllocCount); |
| 17330 | + } |
| 17331 | + |
| 17332 | + return ret_buf; |
| 17333 | +} |
| 17334 | + |
| 17335 | +void |
| 17336 | +cifs_buf_release(void *buf_to_free) |
| 17337 | +{ |
| 17338 | + |
| 17339 | + if (buf_to_free == NULL) { |
| 17340 | + cFYI(1, ("Null buffer passed to cifs_buf_release")); |
| 17341 | + return; |
| 17342 | + } |
| 17343 | + kmem_cache_free(cifs_req_cachep, buf_to_free); |
| 17344 | + |
| 17345 | + atomic_dec(&bufAllocCount); |
| 17346 | + return; |
| 17347 | +} |
| 17348 | + |
| 17349 | +void |
| 17350 | +header_assemble(struct smb_hdr *buffer, char smb_command /* command */ , |
| 17351 | + const struct cifsTconInfo *treeCon, int word_count |
| 17352 | + /* length of fixed section (word count) in two byte units */ |
| 17353 | + ) |
| 17354 | +{ |
| 17355 | + int i; |
| 17356 | + __u32 tmp; |
| 17357 | + struct list_head* temp_item; |
| 17358 | + struct cifsSesInfo * ses; |
| 17359 | + char *temp = (char *) buffer; |
| 17360 | + |
| 17361 | + for (i = 0; i < MAX_CIFS_HDR_SIZE; i++) { |
| 17362 | + temp[i] = 0; /* BB is this needed ?? */ |
| 17363 | + } |
| 17364 | + |
| 17365 | + buffer->smb_buf_length = |
| 17366 | + (2 * word_count) + sizeof (struct smb_hdr) - |
| 17367 | + 4 /* RFC 1001 length field does not count */ + |
| 17368 | + 2 /* for bcc field itself */ ; |
| 17369 | + /* Note that this is the only network field that has to be converted to big endian and it is done just before we send it */ |
| 17370 | + |
| 17371 | + buffer->Protocol[0] = 0xFF; |
| 17372 | + buffer->Protocol[1] = 'S'; |
| 17373 | + buffer->Protocol[2] = 'M'; |
| 17374 | + buffer->Protocol[3] = 'B'; |
| 17375 | + buffer->Command = smb_command; |
| 17376 | + buffer->Flags = 0x00; /* case sensitive */ |
| 17377 | + buffer->Flags2 = SMBFLG2_KNOWS_LONG_NAMES; |
| 17378 | + tmp = cpu_to_le32(current->pid); |
| 17379 | + buffer->Pid = tmp & 0xFFFF; |
| 17380 | + tmp >>= 16; |
| 17381 | + buffer->PidHigh = tmp & 0xFFFF; |
| 17382 | + spin_lock(&GlobalMid_Lock); |
| 17383 | + GlobalMid++; |
| 17384 | + buffer->Mid = GlobalMid; |
| 17385 | + spin_unlock(&GlobalMid_Lock); |
| 17386 | + if (treeCon) { |
| 17387 | + buffer->Tid = treeCon->tid; |
| 17388 | + if (treeCon->ses) { |
| 17389 | + if (treeCon->ses->capabilities & CAP_UNICODE) |
| 17390 | + buffer->Flags2 |= SMBFLG2_UNICODE; |
| 17391 | + if (treeCon->ses->capabilities & CAP_STATUS32) { |
| 17392 | + buffer->Flags2 |= SMBFLG2_ERR_STATUS; |
| 17393 | + } |
| 17394 | + |
| 17395 | + buffer->Uid = treeCon->ses->Suid; /* always in LE format */ |
| 17396 | + if(multiuser_mount != 0) { |
| 17397 | + /* For the multiuser case, there are few obvious technically */ |
| 17398 | + /* possible mechanisms to match the local linux user (uid) */ |
| 17399 | + /* to a valid remote smb user (smb_uid): */ |
| 17400 | + /* 1) Query Winbind (or other local pam/nss daemon */ |
| 17401 | + /* for userid/password/logon_domain or credential */ |
| 17402 | + /* 2) Query Winbind for uid to sid to username mapping */ |
| 17403 | + /* and see if we have a matching password for existing*/ |
| 17404 | + /* session for that user perhas getting password by */ |
| 17405 | + /* adding a new pam_cifs module that stores passwords */ |
| 17406 | + /* so that the cifs vfs can get at that for all logged*/ |
| 17407 | + /* on users */ |
| 17408 | + /* 3) (Which is the mechanism we have chosen) */ |
| 17409 | + /* Search through sessions to the same server for a */ |
| 17410 | + /* a match on the uid that was passed in on mount */ |
| 17411 | + /* with the current processes uid (or euid?) and use */ |
| 17412 | + /* that smb uid. If no existing smb session for */ |
| 17413 | + /* that uid found, use the default smb session ie */ |
| 17414 | + /* the smb session for the volume mounted which is */ |
| 17415 | + /* the same as would be used if the multiuser mount */ |
| 17416 | + /* flag were disabled. */ |
| 17417 | + |
| 17418 | + /* BB Add support for establishing new tCon and SMB Session */ |
| 17419 | + /* with userid/password pairs found on the smb session */ |
| 17420 | + /* for other target tcp/ip addresses BB */ |
| 17421 | + if(current->uid != treeCon->ses->linux_uid) { |
| 17422 | + cFYI(1,("Multiuser mode and UID did not match tcon uid ")); |
| 17423 | + read_lock(&GlobalSMBSeslock); |
| 17424 | + list_for_each(temp_item, &GlobalSMBSessionList) { |
| 17425 | + ses = list_entry(temp_item, struct cifsSesInfo, cifsSessionList); |
| 17426 | + if(ses->linux_uid == current->uid) { |
| 17427 | + if(ses->server == treeCon->ses->server) { |
| 17428 | + cFYI(1,("found matching uid substitute right smb_uid")); |
| 17429 | + buffer->Uid = ses->Suid; |
| 17430 | + break; |
| 17431 | + } else { |
| 17432 | + /* BB eventually call cifs_setup_session here */ |
| 17433 | + cFYI(1,("local UID found but smb sess with this server does not exist")); |
| 17434 | + } |
| 17435 | + } |
| 17436 | + } |
| 17437 | + read_unlock(&GlobalSMBSeslock); |
| 17438 | + } |
| 17439 | + } |
| 17440 | + } |
| 17441 | + if (treeCon->Flags & SMB_SHARE_IS_IN_DFS) |
| 17442 | + buffer->Flags2 |= SMBFLG2_DFS; |
| 17443 | + if(treeCon->ses->server) |
| 17444 | + if(treeCon->ses->server->secMode & |
| 17445 | + (SECMODE_SIGN_REQUIRED | SECMODE_SIGN_ENABLED)) |
| 17446 | + buffer->Flags2 |= SMBFLG2_SECURITY_SIGNATURE; |
| 17447 | + } |
| 17448 | + |
| 17449 | +/* endian conversion of flags is now done just before sending */ |
| 17450 | + buffer->WordCount = (char) word_count; |
| 17451 | + return; |
| 17452 | +} |
| 17453 | + |
| 17454 | +int |
| 17455 | +checkSMBhdr(struct smb_hdr *smb, __u16 mid) |
| 17456 | +{ |
| 17457 | + /* Make sure that this really is an SMB, that it is a response, |
| 17458 | + and that the message ids match */ |
| 17459 | + if ((*(unsigned int *) smb->Protocol == cpu_to_le32(0x424d53ff)) && |
| 17460 | + (mid == smb->Mid)) { |
| 17461 | + if(smb->Flags & SMBFLG_RESPONSE) |
| 17462 | + return 0; |
| 17463 | + else { |
| 17464 | + /* only one valid case where server sends us request */ |
| 17465 | + if(smb->Command == SMB_COM_LOCKING_ANDX) |
| 17466 | + return 0; |
| 17467 | + else |
| 17468 | + cERROR(1, ("Rcvd Request not response ")); |
| 17469 | + } |
| 17470 | + } else { /* bad signature or mid */ |
| 17471 | + if (*(unsigned int *) smb->Protocol != cpu_to_le32(0x424d53ff)) |
| 17472 | + cERROR(1, |
| 17473 | + ("Bad protocol string signature header %x ", |
| 17474 | + *(unsigned int *) smb->Protocol)); |
| 17475 | + if (mid != smb->Mid) |
| 17476 | + cERROR(1, ("Mids do not match")); |
| 17477 | + } |
| 17478 | + cERROR(1, ("bad smb detected. The Mid=%d", smb->Mid)); |
| 17479 | + return 1; |
| 17480 | +} |
| 17481 | + |
| 17482 | +int |
| 17483 | +checkSMB(struct smb_hdr *smb, __u16 mid, int length) |
| 17484 | +{ |
| 17485 | + cFYI(0, |
| 17486 | + ("Entering checkSMB with Length: %x, smb_buf_length: %x ", |
| 17487 | + length, ntohl(smb->smb_buf_length))); |
| 17488 | + if (((unsigned int)length < 2 + sizeof (struct smb_hdr)) |
| 17489 | + || (ntohl(smb->smb_buf_length) > |
| 17490 | + CIFS_MAX_MSGSIZE + MAX_CIFS_HDR_SIZE - 4)) { |
| 17491 | + if ((unsigned int)length < 2 + sizeof (struct smb_hdr)) { |
| 17492 | + cERROR(1, ("Length less than 2 + sizeof smb_hdr ")); |
| 17493 | + if (((unsigned int)length >= sizeof (struct smb_hdr) - 1) |
| 17494 | + && (smb->Status.CifsError != 0)) |
| 17495 | + return 0; /* some error cases do not return wct and bcc */ |
| 17496 | + |
| 17497 | + } |
| 17498 | + if (ntohl(smb->smb_buf_length) > |
| 17499 | + CIFS_MAX_MSGSIZE + MAX_CIFS_HDR_SIZE - 4) |
| 17500 | + cERROR(1, |
| 17501 | + ("smb_buf_length greater than CIFS_MAX_MSGSIZE ... ")); |
| 17502 | + cERROR(1, |
| 17503 | + ("bad smb detected. Illegal length. The mid=%d", |
| 17504 | + smb->Mid)); |
| 17505 | + return 1; |
| 17506 | + } |
| 17507 | + |
| 17508 | + if (checkSMBhdr(smb, mid)) |
| 17509 | + return 1; |
| 17510 | + |
| 17511 | + if ((4 + ntohl(smb->smb_buf_length) != smbCalcSize(smb)) |
| 17512 | + || (4 + ntohl(smb->smb_buf_length) != (unsigned int)length)) { |
| 17513 | + return 0; |
| 17514 | + } else { |
| 17515 | + cERROR(1, ("smbCalcSize %x ", smbCalcSize(smb))); |
| 17516 | + cERROR(1, |
| 17517 | + ("bad smb size detected. The Mid=%d", smb->Mid)); |
| 17518 | + return 1; |
| 17519 | + } |
| 17520 | +} |
| 17521 | +int |
| 17522 | +is_valid_oplock_break(struct smb_hdr *buf) |
| 17523 | +{ |
| 17524 | + struct smb_com_lock_req * pSMB = (struct smb_com_lock_req *)buf; |
| 17525 | + struct list_head *tmp; |
| 17526 | + struct list_head *tmp1; |
| 17527 | + struct cifsTconInfo *tcon; |
| 17528 | + struct cifsFileInfo *netfile; |
| 17529 | + |
| 17530 | + /* could add check for smb response flag 0x80 */ |
| 17531 | + cFYI(1,("Checking for oplock break")); |
| 17532 | + if(pSMB->hdr.Command != SMB_COM_LOCKING_ANDX) |
| 17533 | + return FALSE; |
| 17534 | + if(pSMB->hdr.Flags & SMBFLG_RESPONSE) { |
| 17535 | + /* no sense logging error on invalid handle on oplock |
| 17536 | + break - harmless race between close request and oplock |
| 17537 | + break response is expected from time to time writing out |
| 17538 | + large dirty files cached on the client */ |
| 17539 | + if ((NT_STATUS_INVALID_HANDLE) == |
| 17540 | + le32_to_cpu(pSMB->hdr.Status.CifsError)) { |
| 17541 | + cFYI(1,("invalid handle on oplock break")); |
| 17542 | + return TRUE; |
| 17543 | + } else if (ERRbadfid == |
| 17544 | + le16_to_cpu(pSMB->hdr.Status.DosError.Error)) { |
| 17545 | + return TRUE; |
| 17546 | + } else { |
| 17547 | + return FALSE; /* on valid oplock brk we get "request" */ |
| 17548 | + } |
| 17549 | + } |
| 17550 | + if(pSMB->hdr.WordCount != 8) |
| 17551 | + return FALSE; |
| 17552 | + |
| 17553 | + cFYI(1,(" oplock type 0x%d level 0x%d",pSMB->LockType,pSMB->OplockLevel)); |
| 17554 | + if(!(pSMB->LockType & LOCKING_ANDX_OPLOCK_RELEASE)) |
| 17555 | + return FALSE; |
| 17556 | + |
| 17557 | + /* look up tcon based on tid & uid */ |
| 17558 | + read_lock(&GlobalSMBSeslock); |
| 17559 | + list_for_each(tmp, &GlobalTreeConnectionList) { |
| 17560 | + tcon = list_entry(tmp, struct cifsTconInfo, cifsConnectionList); |
| 17561 | + if (tcon->tid == buf->Tid) { |
| 17562 | +#ifdef CONFIG_CIFS_STATS |
| 17563 | + atomic_inc(&tcon->num_oplock_brks); |
| 17564 | +#endif |
| 17565 | + list_for_each(tmp1,&tcon->openFileList){ |
| 17566 | + netfile = list_entry(tmp1,struct cifsFileInfo,tlist); |
| 17567 | + if(pSMB->Fid == netfile->netfid) { |
| 17568 | + struct cifsInodeInfo *pCifsInode; |
| 17569 | + read_unlock(&GlobalSMBSeslock); |
| 17570 | + cFYI(1,("Matching file id, processing oplock break")); |
| 17571 | + pCifsInode = |
| 17572 | + CIFS_I(netfile->pInode); |
| 17573 | + pCifsInode->clientCanCacheAll = FALSE; |
| 17574 | + if(pSMB->OplockLevel == 0) |
| 17575 | + pCifsInode->clientCanCacheRead = FALSE; |
| 17576 | + pCifsInode->oplockPending = TRUE; |
| 17577 | + AllocOplockQEntry(netfile->pInode, netfile->netfid, tcon); |
| 17578 | + cFYI(1,("about to wake up oplock thd")); |
| 17579 | + wake_up_process(oplockThread); |
| 17580 | + return TRUE; |
| 17581 | + } |
| 17582 | + } |
| 17583 | + read_unlock(&GlobalSMBSeslock); |
| 17584 | + cFYI(1,("No matching file for oplock break on connection")); |
| 17585 | + return TRUE; |
| 17586 | + } |
| 17587 | + } |
| 17588 | + read_unlock(&GlobalSMBSeslock); |
| 17589 | + cFYI(1,("Can not process oplock break for non-existent connection")); |
| 17590 | + return TRUE; |
| 17591 | +} |
| 17592 | + |
| 17593 | +void |
| 17594 | +dump_smb(struct smb_hdr *smb_buf, int smb_buf_length) |
| 17595 | +{ |
| 17596 | + int i, j; |
| 17597 | + char debug_line[17]; |
| 17598 | + unsigned char *buffer; |
| 17599 | + |
| 17600 | + if (traceSMB == 0) |
| 17601 | + return; |
| 17602 | + |
| 17603 | + buffer = (unsigned char *) smb_buf; |
| 17604 | + for (i = 0, j = 0; i < smb_buf_length; i++, j++) { |
| 17605 | + if (i % 8 == 0) { /* we have reached the beginning of line */ |
| 17606 | + printk(KERN_DEBUG "| "); |
| 17607 | + j = 0; |
| 17608 | + } |
| 17609 | + printk("%0#4x ", buffer[i]); |
| 17610 | + debug_line[2 * j] = ' '; |
| 17611 | + if (isprint(buffer[i])) |
| 17612 | + debug_line[1 + (2 * j)] = buffer[i]; |
| 17613 | + else |
| 17614 | + debug_line[1 + (2 * j)] = '_'; |
| 17615 | + |
| 17616 | + if (i % 8 == 7) { /* we have reached end of line, time to print ascii */ |
| 17617 | + debug_line[16] = 0; |
| 17618 | + printk(" | %s\n", debug_line); |
| 17619 | + } |
| 17620 | + } |
| 17621 | + for (; j < 8; j++) { |
| 17622 | + printk(" "); |
| 17623 | + debug_line[2 * j] = ' '; |
| 17624 | + debug_line[1 + (2 * j)] = ' '; |
| 17625 | + } |
| 17626 | + printk( " | %s\n", debug_line); |
| 17627 | + return; |
| 17628 | +} |
| 17629 | --- /dev/null |
| 17630 | +++ b/fs/cifs/netmisc.c |
| 17631 | @@ -0,0 +1,905 @@ |
| 17632 | +/* |
| 17633 | + * fs/cifs/netmisc.c |
| 17634 | + * |
| 17635 | + * Copyright (c) International Business Machines Corp., 2002 |
| 17636 | + * Author(s): Steve French (sfrench@us.ibm.com) |
| 17637 | + * |
| 17638 | + * Error mapping routines from Samba libsmb/errormap.c |
| 17639 | + * Copyright (C) Andrew Tridgell 2001 |
| 17640 | + * |
| 17641 | + * |
| 17642 | + * This program is free software; you can redistribute it and/or modify |
| 17643 | + * it under the terms of the GNU General Public License as published by |
| 17644 | + * the Free Software Foundation; either version 2 of the License, or |
| 17645 | + * (at your option) any later version. |
| 17646 | + * |
| 17647 | + * This program is distributed in the hope that it will be useful, |
| 17648 | + * but WITHOUT ANY WARRANTY; without even the implied warranty of |
| 17649 | + * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See |
| 17650 | + * the GNU General Public License for more details. |
| 17651 | + * |
| 17652 | + * You should have received a copy of the GNU General Public License |
| 17653 | + * along with this program; if not, write to the Free Software |
| 17654 | + * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA |
| 17655 | + */ |
| 17656 | + |
| 17657 | +#include <linux/net.h> |
| 17658 | +#include <linux/string.h> |
| 17659 | +#include <linux/in.h> |
| 17660 | +#include <linux/ctype.h> |
| 17661 | +#include <linux/fs.h> |
| 17662 | +#include <asm/div64.h> |
| 17663 | +#include <asm/byteorder.h> |
| 17664 | +#include "cifsfs.h" |
| 17665 | +#include "cifspdu.h" |
| 17666 | +#include "cifsglob.h" |
| 17667 | +#include "cifsproto.h" |
| 17668 | +#include "smberr.h" |
| 17669 | +#include "cifs_debug.h" |
| 17670 | +#include "nterr.h" |
| 17671 | + |
| 17672 | +struct smb_to_posix_error { |
| 17673 | + __u16 smb_err; |
| 17674 | + int posix_code; |
| 17675 | +}; |
| 17676 | + |
| 17677 | +const struct smb_to_posix_error mapping_table_ERRDOS[] = { |
| 17678 | + {ERRbadfunc, -EINVAL}, |
| 17679 | + {ERRbadfile, -ENOENT}, |
| 17680 | + {ERRbadpath, -ENOTDIR}, |
| 17681 | + {ERRnofids, -EMFILE}, |
| 17682 | + {ERRnoaccess, -EACCES}, |
| 17683 | + {ERRbadfid, -EBADF}, |
| 17684 | + {ERRbadmcb, -EIO}, |
| 17685 | + {ERRnomem, -ENOMEM}, |
| 17686 | + {ERRbadmem, -EFAULT}, |
| 17687 | + {ERRbadenv, -EFAULT}, |
| 17688 | + {ERRbadformat, -EINVAL}, |
| 17689 | + {ERRbadaccess, -EACCES}, |
| 17690 | + {ERRbaddata, -EIO}, |
| 17691 | + {ERRbaddrive, -ENXIO}, |
| 17692 | + {ERRremcd, -EACCES}, |
| 17693 | + {ERRdiffdevice, -EXDEV}, |
| 17694 | + {ERRnofiles, -ENOENT}, |
| 17695 | + {ERRbadshare, -ETXTBSY}, |
| 17696 | + {ERRlock, -EACCES}, |
| 17697 | + {ERRunsup, -EINVAL}, |
| 17698 | + {ERRnosuchshare,-ENXIO}, |
| 17699 | + {ERRfilexists, -EEXIST}, |
| 17700 | + {ERRinvparm, -EINVAL}, |
| 17701 | + {ERRdiskfull, -ENOSPC}, |
| 17702 | + {ERRinvname, -ENOENT}, |
| 17703 | + {ERRdirnotempty, -ENOTEMPTY}, |
| 17704 | + {ERRnotlocked, -ENOLCK}, |
| 17705 | + {ERRalreadyexists, -EEXIST}, |
| 17706 | + {ERRmoredata, -EOVERFLOW}, |
| 17707 | + {ErrQuota, -EDQUOT}, |
| 17708 | + {ErrNotALink, -ENOLINK}, |
| 17709 | + {ERRnetlogonNotStarted,-ENOPROTOOPT}, |
| 17710 | + {0, 0} |
| 17711 | +}; |
| 17712 | + |
| 17713 | +const struct smb_to_posix_error mapping_table_ERRSRV[] = { |
| 17714 | + {ERRerror, -EIO}, |
| 17715 | + {ERRbadpw, -EPERM}, |
| 17716 | + {ERRbadtype, -EREMOTE}, |
| 17717 | + {ERRaccess, -EACCES}, |
| 17718 | + {ERRinvtid, -ENXIO}, |
| 17719 | + {ERRinvnetname, -ENODEV}, |
| 17720 | + {ERRinvdevice, -ENXIO}, |
| 17721 | + {ERRqfull, -ENOSPC}, |
| 17722 | + {ERRqtoobig, -ENOSPC}, |
| 17723 | + {ERRqeof, -EIO}, |
| 17724 | + {ERRinvpfid, -EBADF}, |
| 17725 | + {ERRsmbcmd, -EBADRQC}, |
| 17726 | + {ERRsrverror, -EIO}, |
| 17727 | + {ERRbadBID, -EIO}, |
| 17728 | + {ERRfilespecs, -EINVAL}, |
| 17729 | + {ERRbadLink, -EIO}, |
| 17730 | + {ERRbadpermits, -EINVAL}, |
| 17731 | + {ERRbadPID, -ESRCH}, |
| 17732 | + {ERRsetattrmode, -EINVAL}, |
| 17733 | + {ERRpaused, -EHOSTDOWN}, |
| 17734 | + {ERRmsgoff, -EHOSTDOWN}, |
| 17735 | + {ERRnoroom, -ENOSPC}, |
| 17736 | + {ERRrmuns, -EUSERS}, |
| 17737 | + {ERRtimeout, -ETIME}, |
| 17738 | + {ERRnoresource, -ENOBUFS}, |
| 17739 | + {ERRtoomanyuids, -EUSERS}, |
| 17740 | + {ERRbaduid, -EACCES}, |
| 17741 | + {ERRusempx, -EIO}, |
| 17742 | + {ERRusestd, -EIO}, |
| 17743 | + {ERR_NOTIFY_ENUM_DIR, -ENOBUFS}, |
| 17744 | + {ERRaccountexpired, -EACCES}, |
| 17745 | + {ERRbadclient, -EACCES}, |
| 17746 | + {ERRbadLogonTime, -EACCES}, |
| 17747 | + {ERRpasswordExpired, -EACCES}, |
| 17748 | + {ERRnosupport, -EINVAL}, |
| 17749 | + {0, 0} |
| 17750 | +}; |
| 17751 | + |
| 17752 | +const struct smb_to_posix_error mapping_table_ERRHRD[] = { |
| 17753 | + {0, 0} |
| 17754 | +}; |
| 17755 | + |
| 17756 | +/* Convert string containing dotted ip address to binary form */ |
| 17757 | +/* returns 0 if invalid address */ |
| 17758 | + |
| 17759 | +/* BB add address family, change rc to status flag and return union or for ipv6 */ |
| 17760 | +/* will need parent to call something like inet_pton to convert ipv6 address BB */ |
| 17761 | +int |
| 17762 | +cifs_inet_pton(int address_family, char *cp,void *dst) |
| 17763 | +{ |
| 17764 | + struct in_addr address; |
| 17765 | + int value; |
| 17766 | + int digit; |
| 17767 | + int i; |
| 17768 | + char temp; |
| 17769 | + char bytes[4]; |
| 17770 | + char *end = bytes; |
| 17771 | + static const int addr_class_max[4] = |
| 17772 | + { 0xffffffff, 0xffffff, 0xffff, 0xff }; |
| 17773 | + |
| 17774 | + if(address_family != AF_INET) |
| 17775 | + return -EAFNOSUPPORT; |
| 17776 | + |
| 17777 | + for (i = 0; i < 4; i++) { |
| 17778 | + bytes[i] = 0; |
| 17779 | + } |
| 17780 | + |
| 17781 | + temp = *cp; |
| 17782 | + |
| 17783 | + while (TRUE) { |
| 17784 | + if (!isdigit(temp)) |
| 17785 | + return 0; |
| 17786 | + |
| 17787 | + value = 0; |
| 17788 | + digit = 0; |
| 17789 | + for (;;) { |
| 17790 | + if (isascii(temp) && isdigit(temp)) { |
| 17791 | + value = (value * 10) + temp - '0'; |
| 17792 | + temp = *++cp; |
| 17793 | + digit = 1; |
| 17794 | + } else |
| 17795 | + break; |
| 17796 | + } |
| 17797 | + |
| 17798 | + if (temp == '.') { |
| 17799 | + if ((end > bytes + 2) || (value > 255)) |
| 17800 | + return 0; |
| 17801 | + *end++ = value; |
| 17802 | + temp = *++cp; |
| 17803 | + } else if (temp == ':') { |
| 17804 | + cFYI(1,("IPv6 addresses not supported for CIFS mounts yet")); |
| 17805 | + return -1; |
| 17806 | + } else |
| 17807 | + break; |
| 17808 | + } |
| 17809 | + |
| 17810 | + /* check for last characters */ |
| 17811 | + if (temp != '\0' && (!isascii(temp) || !isspace(temp))) |
| 17812 | + if (temp != '\\') { |
| 17813 | + if (temp != '/') |
| 17814 | + return 0; |
| 17815 | + else |
| 17816 | + (*cp = '\\'); /* switch the slash the expected way */ |
| 17817 | + } |
| 17818 | + if (value > addr_class_max[end - bytes]) |
| 17819 | + return 0; |
| 17820 | + |
| 17821 | + address.s_addr = *((int *) bytes) | htonl(value); |
| 17822 | + *((int *)dst) = address.s_addr; |
| 17823 | + return 1; /* success */ |
| 17824 | +} |
| 17825 | + |
| 17826 | +/***************************************************************************** |
| 17827 | +convert a NT status code to a dos class/code |
| 17828 | + *****************************************************************************/ |
| 17829 | +/* NT status -> dos error map */ |
| 17830 | +static const struct { |
| 17831 | + __u8 dos_class; |
| 17832 | + __u16 dos_code; |
| 17833 | + __u32 ntstatus; |
| 17834 | +} ntstatus_to_dos_map[] = { |
| 17835 | + { |
| 17836 | + ERRDOS, ERRgeneral, NT_STATUS_UNSUCCESSFUL}, { |
| 17837 | + ERRDOS, ERRbadfunc, NT_STATUS_NOT_IMPLEMENTED}, { |
| 17838 | + ERRDOS, 87, NT_STATUS_INVALID_INFO_CLASS}, { |
| 17839 | + ERRDOS, 24, NT_STATUS_INFO_LENGTH_MISMATCH}, { |
| 17840 | + ERRHRD, ERRgeneral, NT_STATUS_ACCESS_VIOLATION}, { |
| 17841 | + ERRHRD, ERRgeneral, NT_STATUS_IN_PAGE_ERROR}, { |
| 17842 | + ERRHRD, ERRgeneral, NT_STATUS_PAGEFILE_QUOTA}, { |
| 17843 | + ERRDOS, ERRbadfid, NT_STATUS_INVALID_HANDLE}, { |
| 17844 | + ERRHRD, ERRgeneral, NT_STATUS_BAD_INITIAL_STACK}, { |
| 17845 | + ERRDOS, 193, NT_STATUS_BAD_INITIAL_PC}, { |
| 17846 | + ERRDOS, 87, NT_STATUS_INVALID_CID}, { |
| 17847 | + ERRHRD, ERRgeneral, NT_STATUS_TIMER_NOT_CANCELED}, { |
| 17848 | + ERRDOS, 87, NT_STATUS_INVALID_PARAMETER}, { |
| 17849 | + ERRDOS, ERRbadfile, NT_STATUS_NO_SUCH_DEVICE}, { |
| 17850 | + ERRDOS, ERRbadfile, NT_STATUS_NO_SUCH_FILE}, { |
| 17851 | + ERRDOS, ERRbadfunc, NT_STATUS_INVALID_DEVICE_REQUEST}, { |
| 17852 | + ERRDOS, 38, NT_STATUS_END_OF_FILE}, { |
| 17853 | + ERRDOS, 34, NT_STATUS_WRONG_VOLUME}, { |
| 17854 | + ERRDOS, 21, NT_STATUS_NO_MEDIA_IN_DEVICE}, { |
| 17855 | + ERRHRD, ERRgeneral, NT_STATUS_UNRECOGNIZED_MEDIA}, { |
| 17856 | + ERRDOS, 27, NT_STATUS_NONEXISTENT_SECTOR}, |
| 17857 | +/* { This NT error code was 'sqashed' |
| 17858 | + from NT_STATUS_MORE_PROCESSING_REQUIRED to NT_STATUS_OK |
| 17859 | + during the session setup } */ |
| 17860 | + { |
| 17861 | + ERRDOS, ERRnomem, NT_STATUS_NO_MEMORY}, { |
| 17862 | + ERRDOS, 487, NT_STATUS_CONFLICTING_ADDRESSES}, { |
| 17863 | + ERRDOS, 487, NT_STATUS_NOT_MAPPED_VIEW}, { |
| 17864 | + ERRDOS, 87, NT_STATUS_UNABLE_TO_FREE_VM}, { |
| 17865 | + ERRDOS, 87, NT_STATUS_UNABLE_TO_DELETE_SECTION}, { |
| 17866 | + ERRDOS, 2142, NT_STATUS_INVALID_SYSTEM_SERVICE}, { |
| 17867 | + ERRHRD, ERRgeneral, NT_STATUS_ILLEGAL_INSTRUCTION}, { |
| 17868 | + ERRDOS, ERRnoaccess, NT_STATUS_INVALID_LOCK_SEQUENCE}, { |
| 17869 | + ERRDOS, ERRnoaccess, NT_STATUS_INVALID_VIEW_SIZE}, { |
| 17870 | + ERRDOS, 193, NT_STATUS_INVALID_FILE_FOR_SECTION}, { |
| 17871 | + ERRDOS, ERRnoaccess, NT_STATUS_ALREADY_COMMITTED}, |
| 17872 | +/* { This NT error code was 'sqashed' |
| 17873 | + from NT_STATUS_ACCESS_DENIED to NT_STATUS_TRUSTED_RELATIONSHIP_FAILURE |
| 17874 | + during the session setup } */ |
| 17875 | + { |
| 17876 | + ERRDOS, ERRnoaccess, NT_STATUS_ACCESS_DENIED}, { |
| 17877 | + ERRDOS, 111, NT_STATUS_BUFFER_TOO_SMALL}, { |
| 17878 | + ERRDOS, ERRbadfid, NT_STATUS_OBJECT_TYPE_MISMATCH}, { |
| 17879 | + ERRHRD, ERRgeneral, NT_STATUS_NONCONTINUABLE_EXCEPTION}, { |
| 17880 | + ERRHRD, ERRgeneral, NT_STATUS_INVALID_DISPOSITION}, { |
| 17881 | + ERRHRD, ERRgeneral, NT_STATUS_UNWIND}, { |
| 17882 | + ERRHRD, ERRgeneral, NT_STATUS_BAD_STACK}, { |
| 17883 | + ERRHRD, ERRgeneral, NT_STATUS_INVALID_UNWIND_TARGET}, { |
| 17884 | + ERRDOS, 158, NT_STATUS_NOT_LOCKED}, { |
| 17885 | + ERRHRD, ERRgeneral, NT_STATUS_PARITY_ERROR}, { |
| 17886 | + ERRDOS, 487, NT_STATUS_UNABLE_TO_DECOMMIT_VM}, { |
| 17887 | + ERRDOS, 487, NT_STATUS_NOT_COMMITTED}, { |
| 17888 | + ERRHRD, ERRgeneral, NT_STATUS_INVALID_PORT_ATTRIBUTES}, { |
| 17889 | + ERRHRD, ERRgeneral, NT_STATUS_PORT_MESSAGE_TOO_LONG}, { |
| 17890 | + ERRDOS, 87, NT_STATUS_INVALID_PARAMETER_MIX}, { |
| 17891 | + ERRHRD, ERRgeneral, NT_STATUS_INVALID_QUOTA_LOWER}, { |
| 17892 | + ERRHRD, ERRgeneral, NT_STATUS_DISK_CORRUPT_ERROR}, { |
| 17893 | + ERRDOS, ERRbadfile, NT_STATUS_OBJECT_NAME_INVALID}, { /* mapping changed since shell does lookup on * and expects file not found */ |
| 17894 | + ERRDOS, ERRbadfile, NT_STATUS_OBJECT_NAME_NOT_FOUND}, { |
| 17895 | + ERRDOS, ERRalreadyexists, NT_STATUS_OBJECT_NAME_COLLISION}, { |
| 17896 | + ERRHRD, ERRgeneral, NT_STATUS_HANDLE_NOT_WAITABLE}, { |
| 17897 | + ERRDOS, ERRbadfid, NT_STATUS_PORT_DISCONNECTED}, { |
| 17898 | + ERRHRD, ERRgeneral, NT_STATUS_DEVICE_ALREADY_ATTACHED}, { |
| 17899 | + ERRDOS, 161, NT_STATUS_OBJECT_PATH_INVALID}, { |
| 17900 | + ERRDOS, ERRbadpath, NT_STATUS_OBJECT_PATH_NOT_FOUND}, { |
| 17901 | + ERRDOS, 161, NT_STATUS_OBJECT_PATH_SYNTAX_BAD}, { |
| 17902 | + ERRHRD, ERRgeneral, NT_STATUS_DATA_OVERRUN}, { |
| 17903 | + ERRHRD, ERRgeneral, NT_STATUS_DATA_LATE_ERROR}, { |
| 17904 | + ERRDOS, 23, NT_STATUS_DATA_ERROR}, { |
| 17905 | + ERRDOS, 23, NT_STATUS_CRC_ERROR}, { |
| 17906 | + ERRDOS, ERRnomem, NT_STATUS_SECTION_TOO_BIG}, { |
| 17907 | + ERRDOS, ERRnoaccess, NT_STATUS_PORT_CONNECTION_REFUSED}, { |
| 17908 | + ERRDOS, ERRbadfid, NT_STATUS_INVALID_PORT_HANDLE}, { |
| 17909 | + ERRDOS, ERRbadshare, NT_STATUS_SHARING_VIOLATION}, { |
| 17910 | + ERRHRD, ERRgeneral, NT_STATUS_QUOTA_EXCEEDED}, { |
| 17911 | + ERRDOS, 87, NT_STATUS_INVALID_PAGE_PROTECTION}, { |
| 17912 | + ERRDOS, 288, NT_STATUS_MUTANT_NOT_OWNED}, { |
| 17913 | + ERRDOS, 298, NT_STATUS_SEMAPHORE_LIMIT_EXCEEDED}, { |
| 17914 | + ERRDOS, 87, NT_STATUS_PORT_ALREADY_SET}, { |
| 17915 | + ERRDOS, 87, NT_STATUS_SECTION_NOT_IMAGE}, { |
| 17916 | + ERRDOS, 156, NT_STATUS_SUSPEND_COUNT_EXCEEDED}, { |
| 17917 | + ERRDOS, ERRnoaccess, NT_STATUS_THREAD_IS_TERMINATING}, { |
| 17918 | + ERRDOS, 87, NT_STATUS_BAD_WORKING_SET_LIMIT}, { |
| 17919 | + ERRDOS, 87, NT_STATUS_INCOMPATIBLE_FILE_MAP}, { |
| 17920 | + ERRDOS, 87, NT_STATUS_SECTION_PROTECTION}, { |
| 17921 | + ERRDOS, 282, NT_STATUS_EAS_NOT_SUPPORTED}, { |
| 17922 | + ERRDOS, 255, NT_STATUS_EA_TOO_LARGE}, { |
| 17923 | + ERRHRD, ERRgeneral, NT_STATUS_NONEXISTENT_EA_ENTRY}, { |
| 17924 | + ERRHRD, ERRgeneral, NT_STATUS_NO_EAS_ON_FILE}, { |
| 17925 | + ERRHRD, ERRgeneral, NT_STATUS_EA_CORRUPT_ERROR}, { |
| 17926 | + ERRDOS, ERRlock, NT_STATUS_FILE_LOCK_CONFLICT}, { |
| 17927 | + ERRDOS, ERRlock, NT_STATUS_LOCK_NOT_GRANTED}, { |
| 17928 | + ERRDOS, ERRbadfile, NT_STATUS_DELETE_PENDING}, { |
| 17929 | + ERRDOS, ERRunsup, NT_STATUS_CTL_FILE_NOT_SUPPORTED}, { |
| 17930 | + ERRHRD, ERRgeneral, NT_STATUS_UNKNOWN_REVISION}, { |
| 17931 | + ERRHRD, ERRgeneral, NT_STATUS_REVISION_MISMATCH}, { |
| 17932 | + ERRHRD, ERRgeneral, NT_STATUS_INVALID_OWNER}, { |
| 17933 | + ERRHRD, ERRgeneral, NT_STATUS_INVALID_PRIMARY_GROUP}, { |
| 17934 | + ERRHRD, ERRgeneral, NT_STATUS_NO_IMPERSONATION_TOKEN}, { |
| 17935 | + ERRHRD, ERRgeneral, NT_STATUS_CANT_DISABLE_MANDATORY}, { |
| 17936 | + ERRDOS, 2215, NT_STATUS_NO_LOGON_SERVERS}, { |
| 17937 | + ERRHRD, ERRgeneral, NT_STATUS_NO_SUCH_LOGON_SESSION}, { |
| 17938 | + ERRHRD, ERRgeneral, NT_STATUS_NO_SUCH_PRIVILEGE}, { |
| 17939 | + ERRDOS, ERRnoaccess, NT_STATUS_PRIVILEGE_NOT_HELD}, { |
| 17940 | + ERRHRD, ERRgeneral, NT_STATUS_INVALID_ACCOUNT_NAME}, { |
| 17941 | + ERRHRD, ERRgeneral, NT_STATUS_USER_EXISTS}, |
| 17942 | +/* { This NT error code was 'sqashed' |
| 17943 | + from NT_STATUS_NO_SUCH_USER to NT_STATUS_LOGON_FAILURE |
| 17944 | + during the session setup } */ |
| 17945 | + { |
| 17946 | + ERRDOS, ERRnoaccess, NT_STATUS_NO_SUCH_USER}, { |
| 17947 | + ERRHRD, ERRgeneral, NT_STATUS_GROUP_EXISTS}, { |
| 17948 | + ERRHRD, ERRgeneral, NT_STATUS_NO_SUCH_GROUP}, { |
| 17949 | + ERRHRD, ERRgeneral, NT_STATUS_MEMBER_IN_GROUP}, { |
| 17950 | + ERRHRD, ERRgeneral, NT_STATUS_MEMBER_NOT_IN_GROUP}, { |
| 17951 | + ERRHRD, ERRgeneral, NT_STATUS_LAST_ADMIN}, |
| 17952 | +/* { This NT error code was 'sqashed' |
| 17953 | + from NT_STATUS_WRONG_PASSWORD to NT_STATUS_LOGON_FAILURE |
| 17954 | + during the session setup } */ |
| 17955 | + { |
| 17956 | + ERRSRV, ERRbadpw, NT_STATUS_WRONG_PASSWORD}, { |
| 17957 | + ERRHRD, ERRgeneral, NT_STATUS_ILL_FORMED_PASSWORD}, { |
| 17958 | + ERRHRD, ERRgeneral, NT_STATUS_PASSWORD_RESTRICTION}, { |
| 17959 | + ERRDOS, ERRnoaccess, NT_STATUS_LOGON_FAILURE}, { |
| 17960 | + ERRHRD, ERRgeneral, NT_STATUS_ACCOUNT_RESTRICTION}, { |
| 17961 | + ERRSRV, 2241, NT_STATUS_INVALID_LOGON_HOURS}, { |
| 17962 | + ERRSRV, 2240, NT_STATUS_INVALID_WORKSTATION}, { |
| 17963 | + ERRSRV, 2242, NT_STATUS_PASSWORD_EXPIRED}, { |
| 17964 | + ERRSRV, 2239, NT_STATUS_ACCOUNT_DISABLED}, { |
| 17965 | + ERRHRD, ERRgeneral, NT_STATUS_NONE_MAPPED}, { |
| 17966 | + ERRHRD, ERRgeneral, NT_STATUS_TOO_MANY_LUIDS_REQUESTED}, { |
| 17967 | + ERRHRD, ERRgeneral, NT_STATUS_LUIDS_EXHAUSTED}, { |
| 17968 | + ERRHRD, ERRgeneral, NT_STATUS_INVALID_SUB_AUTHORITY}, { |
| 17969 | + ERRHRD, ERRgeneral, NT_STATUS_INVALID_ACL}, { |
| 17970 | + ERRHRD, ERRgeneral, NT_STATUS_INVALID_SID}, { |
| 17971 | + ERRHRD, ERRgeneral, NT_STATUS_INVALID_SECURITY_DESCR}, { |
| 17972 | + ERRDOS, 127, NT_STATUS_PROCEDURE_NOT_FOUND}, { |
| 17973 | + ERRDOS, 193, NT_STATUS_INVALID_IMAGE_FORMAT}, { |
| 17974 | + ERRHRD, ERRgeneral, NT_STATUS_NO_TOKEN}, { |
| 17975 | + ERRHRD, ERRgeneral, NT_STATUS_BAD_INHERITANCE_ACL}, { |
| 17976 | + ERRDOS, 158, NT_STATUS_RANGE_NOT_LOCKED}, { |
| 17977 | + ERRDOS, 112, NT_STATUS_DISK_FULL}, { |
| 17978 | + ERRHRD, ERRgeneral, NT_STATUS_SERVER_DISABLED}, { |
| 17979 | + ERRHRD, ERRgeneral, NT_STATUS_SERVER_NOT_DISABLED}, { |
| 17980 | + ERRDOS, 68, NT_STATUS_TOO_MANY_GUIDS_REQUESTED}, { |
| 17981 | + ERRDOS, 259, NT_STATUS_GUIDS_EXHAUSTED}, { |
| 17982 | + ERRHRD, ERRgeneral, NT_STATUS_INVALID_ID_AUTHORITY}, { |
| 17983 | + ERRDOS, 259, NT_STATUS_AGENTS_EXHAUSTED}, { |
| 17984 | + ERRDOS, 154, NT_STATUS_INVALID_VOLUME_LABEL}, { |
| 17985 | + ERRDOS, 14, NT_STATUS_SECTION_NOT_EXTENDED}, { |
| 17986 | + ERRDOS, 487, NT_STATUS_NOT_MAPPED_DATA}, { |
| 17987 | + ERRHRD, ERRgeneral, NT_STATUS_RESOURCE_DATA_NOT_FOUND}, { |
| 17988 | + ERRHRD, ERRgeneral, NT_STATUS_RESOURCE_TYPE_NOT_FOUND}, { |
| 17989 | + ERRHRD, ERRgeneral, NT_STATUS_RESOURCE_NAME_NOT_FOUND}, { |
| 17990 | + ERRHRD, ERRgeneral, NT_STATUS_ARRAY_BOUNDS_EXCEEDED}, { |
| 17991 | + ERRHRD, ERRgeneral, NT_STATUS_FLOAT_DENORMAL_OPERAND}, { |
| 17992 | + ERRHRD, ERRgeneral, NT_STATUS_FLOAT_DIVIDE_BY_ZERO}, { |
| 17993 | + ERRHRD, ERRgeneral, NT_STATUS_FLOAT_INEXACT_RESULT}, { |
| 17994 | + ERRHRD, ERRgeneral, NT_STATUS_FLOAT_INVALID_OPERATION}, { |
| 17995 | + ERRHRD, ERRgeneral, NT_STATUS_FLOAT_OVERFLOW}, { |
| 17996 | + ERRHRD, ERRgeneral, NT_STATUS_FLOAT_STACK_CHECK}, { |
| 17997 | + ERRHRD, ERRgeneral, NT_STATUS_FLOAT_UNDERFLOW}, { |
| 17998 | + ERRHRD, ERRgeneral, NT_STATUS_INTEGER_DIVIDE_BY_ZERO}, { |
| 17999 | + ERRDOS, 534, NT_STATUS_INTEGER_OVERFLOW}, { |
| 18000 | + ERRHRD, ERRgeneral, NT_STATUS_PRIVILEGED_INSTRUCTION}, { |
| 18001 | + ERRDOS, ERRnomem, NT_STATUS_TOO_MANY_PAGING_FILES}, { |
| 18002 | + ERRHRD, ERRgeneral, NT_STATUS_FILE_INVALID}, { |
| 18003 | + ERRHRD, ERRgeneral, NT_STATUS_ALLOTTED_SPACE_EXCEEDED}, |
| 18004 | +/* { This NT error code was 'sqashed' |
| 18005 | + from NT_STATUS_INSUFFICIENT_RESOURCES to NT_STATUS_INSUFF_SERVER_RESOURCES |
| 18006 | + during the session setup } */ |
| 18007 | + { |
| 18008 | + ERRDOS, ERRnomem, NT_STATUS_INSUFFICIENT_RESOURCES}, { |
| 18009 | + ERRDOS, ERRbadpath, NT_STATUS_DFS_EXIT_PATH_FOUND}, { |
| 18010 | + ERRDOS, 23, NT_STATUS_DEVICE_DATA_ERROR}, { |
| 18011 | + ERRHRD, ERRgeneral, NT_STATUS_DEVICE_NOT_CONNECTED}, { |
| 18012 | + ERRDOS, 21, NT_STATUS_DEVICE_POWER_FAILURE}, { |
| 18013 | + ERRDOS, 487, NT_STATUS_FREE_VM_NOT_AT_BASE}, { |
| 18014 | + ERRDOS, 487, NT_STATUS_MEMORY_NOT_ALLOCATED}, { |
| 18015 | + ERRHRD, ERRgeneral, NT_STATUS_WORKING_SET_QUOTA}, { |
| 18016 | + ERRDOS, 19, NT_STATUS_MEDIA_WRITE_PROTECTED}, { |
| 18017 | + ERRDOS, 21, NT_STATUS_DEVICE_NOT_READY}, { |
| 18018 | + ERRHRD, ERRgeneral, NT_STATUS_INVALID_GROUP_ATTRIBUTES}, { |
| 18019 | + ERRHRD, ERRgeneral, NT_STATUS_BAD_IMPERSONATION_LEVEL}, { |
| 18020 | + ERRHRD, ERRgeneral, NT_STATUS_CANT_OPEN_ANONYMOUS}, { |
| 18021 | + ERRHRD, ERRgeneral, NT_STATUS_BAD_VALIDATION_CLASS}, { |
| 18022 | + ERRHRD, ERRgeneral, NT_STATUS_BAD_TOKEN_TYPE}, { |
| 18023 | + ERRDOS, 87, NT_STATUS_BAD_MASTER_BOOT_RECORD}, { |
| 18024 | + ERRHRD, ERRgeneral, NT_STATUS_INSTRUCTION_MISALIGNMENT}, { |
| 18025 | + ERRDOS, ERRpipebusy, NT_STATUS_INSTANCE_NOT_AVAILABLE}, { |
| 18026 | + ERRDOS, ERRpipebusy, NT_STATUS_PIPE_NOT_AVAILABLE}, { |
| 18027 | + ERRDOS, ERRbadpipe, NT_STATUS_INVALID_PIPE_STATE}, { |
| 18028 | + ERRDOS, ERRpipebusy, NT_STATUS_PIPE_BUSY}, { |
| 18029 | + ERRDOS, ERRbadfunc, NT_STATUS_ILLEGAL_FUNCTION}, { |
| 18030 | + ERRDOS, ERRnotconnected, NT_STATUS_PIPE_DISCONNECTED}, { |
| 18031 | + ERRDOS, ERRpipeclosing, NT_STATUS_PIPE_CLOSING}, { |
| 18032 | + ERRHRD, ERRgeneral, NT_STATUS_PIPE_CONNECTED}, { |
| 18033 | + ERRHRD, ERRgeneral, NT_STATUS_PIPE_LISTENING}, { |
| 18034 | + ERRDOS, ERRbadpipe, NT_STATUS_INVALID_READ_MODE}, { |
| 18035 | + ERRDOS, 121, NT_STATUS_IO_TIMEOUT}, { |
| 18036 | + ERRDOS, 38, NT_STATUS_FILE_FORCED_CLOSED}, { |
| 18037 | + ERRHRD, ERRgeneral, NT_STATUS_PROFILING_NOT_STARTED}, { |
| 18038 | + ERRHRD, ERRgeneral, NT_STATUS_PROFILING_NOT_STOPPED}, { |
| 18039 | + ERRHRD, ERRgeneral, NT_STATUS_COULD_NOT_INTERPRET}, { |
| 18040 | + ERRDOS, ERRnoaccess, NT_STATUS_FILE_IS_A_DIRECTORY}, { |
| 18041 | + ERRDOS, ERRunsup, NT_STATUS_NOT_SUPPORTED}, { |
| 18042 | + ERRDOS, 51, NT_STATUS_REMOTE_NOT_LISTENING}, { |
| 18043 | + ERRDOS, 52, NT_STATUS_DUPLICATE_NAME}, { |
| 18044 | + ERRDOS, 53, NT_STATUS_BAD_NETWORK_PATH}, { |
| 18045 | + ERRDOS, 54, NT_STATUS_NETWORK_BUSY}, { |
| 18046 | + ERRDOS, 55, NT_STATUS_DEVICE_DOES_NOT_EXIST}, { |
| 18047 | + ERRDOS, 56, NT_STATUS_TOO_MANY_COMMANDS}, { |
| 18048 | + ERRDOS, 57, NT_STATUS_ADAPTER_HARDWARE_ERROR}, { |
| 18049 | + ERRDOS, 58, NT_STATUS_INVALID_NETWORK_RESPONSE}, { |
| 18050 | + ERRDOS, 59, NT_STATUS_UNEXPECTED_NETWORK_ERROR}, { |
| 18051 | + ERRDOS, 60, NT_STATUS_BAD_REMOTE_ADAPTER}, { |
| 18052 | + ERRDOS, 61, NT_STATUS_PRINT_QUEUE_FULL}, { |
| 18053 | + ERRDOS, 62, NT_STATUS_NO_SPOOL_SPACE}, { |
| 18054 | + ERRDOS, 63, NT_STATUS_PRINT_CANCELLED}, { |
| 18055 | + ERRDOS, 64, NT_STATUS_NETWORK_NAME_DELETED}, { |
| 18056 | + ERRDOS, 65, NT_STATUS_NETWORK_ACCESS_DENIED}, { |
| 18057 | + ERRDOS, 66, NT_STATUS_BAD_DEVICE_TYPE}, { |
| 18058 | + ERRDOS, ERRnosuchshare, NT_STATUS_BAD_NETWORK_NAME}, { |
| 18059 | + ERRDOS, 68, NT_STATUS_TOO_MANY_NAMES}, { |
| 18060 | + ERRDOS, 69, NT_STATUS_TOO_MANY_SESSIONS}, { |
| 18061 | + ERRDOS, 70, NT_STATUS_SHARING_PAUSED}, { |
| 18062 | + ERRDOS, 71, NT_STATUS_REQUEST_NOT_ACCEPTED}, { |
| 18063 | + ERRDOS, 72, NT_STATUS_REDIRECTOR_PAUSED}, { |
| 18064 | + ERRDOS, 88, NT_STATUS_NET_WRITE_FAULT}, { |
| 18065 | + ERRHRD, ERRgeneral, NT_STATUS_PROFILING_AT_LIMIT}, { |
| 18066 | + ERRDOS, ERRdiffdevice, NT_STATUS_NOT_SAME_DEVICE}, { |
| 18067 | + ERRDOS, ERRnoaccess, NT_STATUS_FILE_RENAMED}, { |
| 18068 | + ERRDOS, 240, NT_STATUS_VIRTUAL_CIRCUIT_CLOSED}, { |
| 18069 | + ERRHRD, ERRgeneral, NT_STATUS_NO_SECURITY_ON_OBJECT}, { |
| 18070 | + ERRHRD, ERRgeneral, NT_STATUS_CANT_WAIT}, { |
| 18071 | + ERRDOS, ERRpipeclosing, NT_STATUS_PIPE_EMPTY}, { |
| 18072 | + ERRHRD, ERRgeneral, NT_STATUS_CANT_ACCESS_DOMAIN_INFO}, { |
| 18073 | + ERRHRD, ERRgeneral, NT_STATUS_CANT_TERMINATE_SELF}, { |
| 18074 | + ERRHRD, ERRgeneral, NT_STATUS_INVALID_SERVER_STATE}, { |
| 18075 | + ERRHRD, ERRgeneral, NT_STATUS_INVALID_DOMAIN_STATE}, { |
| 18076 | + ERRHRD, ERRgeneral, NT_STATUS_INVALID_DOMAIN_ROLE}, { |
| 18077 | + ERRHRD, ERRgeneral, NT_STATUS_NO_SUCH_DOMAIN}, { |
| 18078 | + ERRHRD, ERRgeneral, NT_STATUS_DOMAIN_EXISTS}, { |
| 18079 | + ERRHRD, ERRgeneral, NT_STATUS_DOMAIN_LIMIT_EXCEEDED}, { |
| 18080 | + ERRDOS, 300, NT_STATUS_OPLOCK_NOT_GRANTED}, { |
| 18081 | + ERRDOS, 301, NT_STATUS_INVALID_OPLOCK_PROTOCOL}, { |
| 18082 | + ERRHRD, ERRgeneral, NT_STATUS_INTERNAL_DB_CORRUPTION}, { |
| 18083 | + ERRHRD, ERRgeneral, NT_STATUS_INTERNAL_ERROR}, { |
| 18084 | + ERRHRD, ERRgeneral, NT_STATUS_GENERIC_NOT_MAPPED}, { |
| 18085 | + ERRHRD, ERRgeneral, NT_STATUS_BAD_DESCRIPTOR_FORMAT}, { |
| 18086 | + ERRHRD, ERRgeneral, NT_STATUS_INVALID_USER_BUFFER}, { |
| 18087 | + ERRHRD, ERRgeneral, NT_STATUS_UNEXPECTED_IO_ERROR}, { |
| 18088 | + ERRHRD, ERRgeneral, NT_STATUS_UNEXPECTED_MM_CREATE_ERR}, { |
| 18089 | + ERRHRD, ERRgeneral, NT_STATUS_UNEXPECTED_MM_MAP_ERROR}, { |
| 18090 | + ERRHRD, ERRgeneral, NT_STATUS_UNEXPECTED_MM_EXTEND_ERR}, { |
| 18091 | + ERRHRD, ERRgeneral, NT_STATUS_NOT_LOGON_PROCESS}, { |
| 18092 | + ERRHRD, ERRgeneral, NT_STATUS_LOGON_SESSION_EXISTS}, { |
| 18093 | + ERRDOS, 87, NT_STATUS_INVALID_PARAMETER_1}, { |
| 18094 | + ERRDOS, 87, NT_STATUS_INVALID_PARAMETER_2}, { |
| 18095 | + ERRDOS, 87, NT_STATUS_INVALID_PARAMETER_3}, { |
| 18096 | + ERRDOS, 87, NT_STATUS_INVALID_PARAMETER_4}, { |
| 18097 | + ERRDOS, 87, NT_STATUS_INVALID_PARAMETER_5}, { |
| 18098 | + ERRDOS, 87, NT_STATUS_INVALID_PARAMETER_6}, { |
| 18099 | + ERRDOS, 87, NT_STATUS_INVALID_PARAMETER_7}, { |
| 18100 | + ERRDOS, 87, NT_STATUS_INVALID_PARAMETER_8}, { |
| 18101 | + ERRDOS, 87, NT_STATUS_INVALID_PARAMETER_9}, { |
| 18102 | + ERRDOS, 87, NT_STATUS_INVALID_PARAMETER_10}, { |
| 18103 | + ERRDOS, 87, NT_STATUS_INVALID_PARAMETER_11}, { |
| 18104 | + ERRDOS, 87, NT_STATUS_INVALID_PARAMETER_12}, { |
| 18105 | + ERRDOS, ERRbadpath, NT_STATUS_REDIRECTOR_NOT_STARTED}, { |
| 18106 | + ERRHRD, ERRgeneral, NT_STATUS_REDIRECTOR_STARTED}, { |
| 18107 | + ERRHRD, ERRgeneral, NT_STATUS_STACK_OVERFLOW}, { |
| 18108 | + ERRHRD, ERRgeneral, NT_STATUS_NO_SUCH_PACKAGE}, { |
| 18109 | + ERRHRD, ERRgeneral, NT_STATUS_BAD_FUNCTION_TABLE}, { |
| 18110 | + ERRDOS, 203, 0xc0000100}, { |
| 18111 | + ERRDOS, 145, NT_STATUS_DIRECTORY_NOT_EMPTY}, { |
| 18112 | + ERRHRD, ERRgeneral, NT_STATUS_FILE_CORRUPT_ERROR}, { |
| 18113 | + ERRDOS, 267, NT_STATUS_NOT_A_DIRECTORY}, { |
| 18114 | + ERRHRD, ERRgeneral, NT_STATUS_BAD_LOGON_SESSION_STATE}, { |
| 18115 | + ERRHRD, ERRgeneral, NT_STATUS_LOGON_SESSION_COLLISION}, { |
| 18116 | + ERRDOS, 206, NT_STATUS_NAME_TOO_LONG}, { |
| 18117 | + ERRDOS, 2401, NT_STATUS_FILES_OPEN}, { |
| 18118 | + ERRDOS, 2404, NT_STATUS_CONNECTION_IN_USE}, { |
| 18119 | + ERRHRD, ERRgeneral, NT_STATUS_MESSAGE_NOT_FOUND}, { |
| 18120 | + ERRDOS, ERRnoaccess, NT_STATUS_PROCESS_IS_TERMINATING}, { |
| 18121 | + ERRHRD, ERRgeneral, NT_STATUS_INVALID_LOGON_TYPE}, { |
| 18122 | + ERRHRD, ERRgeneral, NT_STATUS_NO_GUID_TRANSLATION}, { |
| 18123 | + ERRHRD, ERRgeneral, NT_STATUS_CANNOT_IMPERSONATE}, { |
| 18124 | + ERRHRD, ERRgeneral, NT_STATUS_IMAGE_ALREADY_LOADED}, { |
| 18125 | + ERRHRD, ERRgeneral, NT_STATUS_ABIOS_NOT_PRESENT}, { |
| 18126 | + ERRHRD, ERRgeneral, NT_STATUS_ABIOS_LID_NOT_EXIST}, { |
| 18127 | + ERRHRD, ERRgeneral, NT_STATUS_ABIOS_LID_ALREADY_OWNED}, { |
| 18128 | + ERRHRD, ERRgeneral, NT_STATUS_ABIOS_NOT_LID_OWNER}, { |
| 18129 | + ERRHRD, ERRgeneral, NT_STATUS_ABIOS_INVALID_COMMAND}, { |
| 18130 | + ERRHRD, ERRgeneral, NT_STATUS_ABIOS_INVALID_LID}, { |
| 18131 | + ERRHRD, ERRgeneral, NT_STATUS_ABIOS_SELECTOR_NOT_AVAILABLE}, { |
| 18132 | + ERRHRD, ERRgeneral, NT_STATUS_ABIOS_INVALID_SELECTOR}, { |
| 18133 | + ERRHRD, ERRgeneral, NT_STATUS_NO_LDT}, { |
| 18134 | + ERRHRD, ERRgeneral, NT_STATUS_INVALID_LDT_SIZE}, { |
| 18135 | + ERRHRD, ERRgeneral, NT_STATUS_INVALID_LDT_OFFSET}, { |
| 18136 | + ERRHRD, ERRgeneral, NT_STATUS_INVALID_LDT_DESCRIPTOR}, { |
| 18137 | + ERRDOS, 193, NT_STATUS_INVALID_IMAGE_NE_FORMAT}, { |
| 18138 | + ERRHRD, ERRgeneral, NT_STATUS_RXACT_INVALID_STATE}, { |
| 18139 | + ERRHRD, ERRgeneral, NT_STATUS_RXACT_COMMIT_FAILURE}, { |
| 18140 | + ERRHRD, ERRgeneral, NT_STATUS_MAPPED_FILE_SIZE_ZERO}, { |
| 18141 | + ERRDOS, ERRnofids, NT_STATUS_TOO_MANY_OPENED_FILES}, { |
| 18142 | + ERRHRD, ERRgeneral, NT_STATUS_CANCELLED}, { |
| 18143 | + ERRDOS, ERRnoaccess, NT_STATUS_CANNOT_DELETE}, { |
| 18144 | + ERRHRD, ERRgeneral, NT_STATUS_INVALID_COMPUTER_NAME}, { |
| 18145 | + ERRDOS, ERRnoaccess, NT_STATUS_FILE_DELETED}, { |
| 18146 | + ERRHRD, ERRgeneral, NT_STATUS_SPECIAL_ACCOUNT}, { |
| 18147 | + ERRHRD, ERRgeneral, NT_STATUS_SPECIAL_GROUP}, { |
| 18148 | + ERRHRD, ERRgeneral, NT_STATUS_SPECIAL_USER}, { |
| 18149 | + ERRHRD, ERRgeneral, NT_STATUS_MEMBERS_PRIMARY_GROUP}, { |
| 18150 | + ERRDOS, ERRbadfid, NT_STATUS_FILE_CLOSED}, { |
| 18151 | + ERRHRD, ERRgeneral, NT_STATUS_TOO_MANY_THREADS}, { |
| 18152 | + ERRHRD, ERRgeneral, NT_STATUS_THREAD_NOT_IN_PROCESS}, { |
| 18153 | + ERRHRD, ERRgeneral, NT_STATUS_TOKEN_ALREADY_IN_USE}, { |
| 18154 | + ERRHRD, ERRgeneral, NT_STATUS_PAGEFILE_QUOTA_EXCEEDED}, { |
| 18155 | + ERRHRD, ERRgeneral, NT_STATUS_COMMITMENT_LIMIT}, { |
| 18156 | + ERRDOS, 193, NT_STATUS_INVALID_IMAGE_LE_FORMAT}, { |
| 18157 | + ERRDOS, 193, NT_STATUS_INVALID_IMAGE_NOT_MZ}, { |
| 18158 | + ERRDOS, 193, NT_STATUS_INVALID_IMAGE_PROTECT}, { |
| 18159 | + ERRDOS, 193, NT_STATUS_INVALID_IMAGE_WIN_16}, { |
| 18160 | + ERRHRD, ERRgeneral, NT_STATUS_LOGON_SERVER_CONFLICT}, { |
| 18161 | + ERRHRD, ERRgeneral, NT_STATUS_TIME_DIFFERENCE_AT_DC}, { |
| 18162 | + ERRHRD, ERRgeneral, NT_STATUS_SYNCHRONIZATION_REQUIRED}, { |
| 18163 | + ERRDOS, 126, NT_STATUS_DLL_NOT_FOUND}, { |
| 18164 | + ERRHRD, ERRgeneral, NT_STATUS_OPEN_FAILED}, { |
| 18165 | + ERRHRD, ERRgeneral, NT_STATUS_IO_PRIVILEGE_FAILED}, { |
| 18166 | + ERRDOS, 182, NT_STATUS_ORDINAL_NOT_FOUND}, { |
| 18167 | + ERRDOS, 127, NT_STATUS_ENTRYPOINT_NOT_FOUND}, { |
| 18168 | + ERRHRD, ERRgeneral, NT_STATUS_CONTROL_C_EXIT}, { |
| 18169 | + ERRDOS, 64, NT_STATUS_LOCAL_DISCONNECT}, { |
| 18170 | + ERRDOS, 64, NT_STATUS_REMOTE_DISCONNECT}, { |
| 18171 | + ERRDOS, 51, NT_STATUS_REMOTE_RESOURCES}, { |
| 18172 | + ERRDOS, 59, NT_STATUS_LINK_FAILED}, { |
| 18173 | + ERRDOS, 59, NT_STATUS_LINK_TIMEOUT}, { |
| 18174 | + ERRDOS, 59, NT_STATUS_INVALID_CONNECTION}, { |
| 18175 | + ERRDOS, 59, NT_STATUS_INVALID_ADDRESS}, { |
| 18176 | + ERRHRD, ERRgeneral, NT_STATUS_DLL_INIT_FAILED}, { |
| 18177 | + ERRHRD, ERRgeneral, NT_STATUS_MISSING_SYSTEMFILE}, { |
| 18178 | + ERRHRD, ERRgeneral, NT_STATUS_UNHANDLED_EXCEPTION}, { |
| 18179 | + ERRHRD, ERRgeneral, NT_STATUS_APP_INIT_FAILURE}, { |
| 18180 | + ERRHRD, ERRgeneral, NT_STATUS_PAGEFILE_CREATE_FAILED}, { |
| 18181 | + ERRHRD, ERRgeneral, NT_STATUS_NO_PAGEFILE}, { |
| 18182 | + ERRDOS, 124, NT_STATUS_INVALID_LEVEL}, { |
| 18183 | + ERRDOS, 86, NT_STATUS_WRONG_PASSWORD_CORE}, { |
| 18184 | + ERRHRD, ERRgeneral, NT_STATUS_ILLEGAL_FLOAT_CONTEXT}, { |
| 18185 | + ERRDOS, 109, NT_STATUS_PIPE_BROKEN}, { |
| 18186 | + ERRHRD, ERRgeneral, NT_STATUS_REGISTRY_CORRUPT}, { |
| 18187 | + ERRHRD, ERRgeneral, NT_STATUS_REGISTRY_IO_FAILED}, { |
| 18188 | + ERRHRD, ERRgeneral, NT_STATUS_NO_EVENT_PAIR}, { |
| 18189 | + ERRHRD, ERRgeneral, NT_STATUS_UNRECOGNIZED_VOLUME}, { |
| 18190 | + ERRHRD, ERRgeneral, NT_STATUS_SERIAL_NO_DEVICE_INITED}, { |
| 18191 | + ERRHRD, ERRgeneral, NT_STATUS_NO_SUCH_ALIAS}, { |
| 18192 | + ERRHRD, ERRgeneral, NT_STATUS_MEMBER_NOT_IN_ALIAS}, { |
| 18193 | + ERRHRD, ERRgeneral, NT_STATUS_MEMBER_IN_ALIAS}, { |
| 18194 | + ERRHRD, ERRgeneral, NT_STATUS_ALIAS_EXISTS}, { |
| 18195 | + ERRHRD, ERRgeneral, NT_STATUS_LOGON_NOT_GRANTED}, { |
| 18196 | + ERRHRD, ERRgeneral, NT_STATUS_TOO_MANY_SECRETS}, { |
| 18197 | + ERRHRD, ERRgeneral, NT_STATUS_SECRET_TOO_LONG}, { |
| 18198 | + ERRHRD, ERRgeneral, NT_STATUS_INTERNAL_DB_ERROR}, { |
| 18199 | + ERRHRD, ERRgeneral, NT_STATUS_FULLSCREEN_MODE}, { |
| 18200 | + ERRHRD, ERRgeneral, NT_STATUS_TOO_MANY_CONTEXT_IDS}, { |
| 18201 | + ERRDOS, ERRnoaccess, NT_STATUS_LOGON_TYPE_NOT_GRANTED}, { |
| 18202 | + ERRHRD, ERRgeneral, NT_STATUS_NOT_REGISTRY_FILE}, { |
| 18203 | + ERRHRD, ERRgeneral, NT_STATUS_NT_CROSS_ENCRYPTION_REQUIRED}, { |
| 18204 | + ERRHRD, ERRgeneral, NT_STATUS_DOMAIN_CTRLR_CONFIG_ERROR}, { |
| 18205 | + ERRHRD, ERRgeneral, NT_STATUS_FT_MISSING_MEMBER}, { |
| 18206 | + ERRHRD, ERRgeneral, NT_STATUS_ILL_FORMED_SERVICE_ENTRY}, { |
| 18207 | + ERRHRD, ERRgeneral, NT_STATUS_ILLEGAL_CHARACTER}, { |
| 18208 | + ERRHRD, ERRgeneral, NT_STATUS_UNMAPPABLE_CHARACTER}, { |
| 18209 | + ERRHRD, ERRgeneral, NT_STATUS_UNDEFINED_CHARACTER}, { |
| 18210 | + ERRHRD, ERRgeneral, NT_STATUS_FLOPPY_VOLUME}, { |
| 18211 | + ERRHRD, ERRgeneral, NT_STATUS_FLOPPY_ID_MARK_NOT_FOUND}, { |
| 18212 | + ERRHRD, ERRgeneral, NT_STATUS_FLOPPY_WRONG_CYLINDER}, { |
| 18213 | + ERRHRD, ERRgeneral, NT_STATUS_FLOPPY_UNKNOWN_ERROR}, { |
| 18214 | + ERRHRD, ERRgeneral, NT_STATUS_FLOPPY_BAD_REGISTERS}, { |
| 18215 | + ERRHRD, ERRgeneral, NT_STATUS_DISK_RECALIBRATE_FAILED}, { |
| 18216 | + ERRHRD, ERRgeneral, NT_STATUS_DISK_OPERATION_FAILED}, { |
| 18217 | + ERRHRD, ERRgeneral, NT_STATUS_DISK_RESET_FAILED}, { |
| 18218 | + ERRHRD, ERRgeneral, NT_STATUS_SHARED_IRQ_BUSY}, { |
| 18219 | + ERRHRD, ERRgeneral, NT_STATUS_FT_ORPHANING}, { |
| 18220 | + ERRHRD, ERRgeneral, 0xc000016e}, { |
| 18221 | + ERRHRD, ERRgeneral, 0xc000016f}, { |
| 18222 | + ERRHRD, ERRgeneral, 0xc0000170}, { |
| 18223 | + ERRHRD, ERRgeneral, 0xc0000171}, { |
| 18224 | + ERRHRD, ERRgeneral, NT_STATUS_PARTITION_FAILURE}, { |
| 18225 | + ERRHRD, ERRgeneral, NT_STATUS_INVALID_BLOCK_LENGTH}, { |
| 18226 | + ERRHRD, ERRgeneral, NT_STATUS_DEVICE_NOT_PARTITIONED}, { |
| 18227 | + ERRHRD, ERRgeneral, NT_STATUS_UNABLE_TO_LOCK_MEDIA}, { |
| 18228 | + ERRHRD, ERRgeneral, NT_STATUS_UNABLE_TO_UNLOAD_MEDIA}, { |
| 18229 | + ERRHRD, ERRgeneral, NT_STATUS_EOM_OVERFLOW}, { |
| 18230 | + ERRHRD, ERRgeneral, NT_STATUS_NO_MEDIA}, { |
| 18231 | + ERRHRD, ERRgeneral, 0xc0000179}, { |
| 18232 | + ERRHRD, ERRgeneral, NT_STATUS_NO_SUCH_MEMBER}, { |
| 18233 | + ERRHRD, ERRgeneral, NT_STATUS_INVALID_MEMBER}, { |
| 18234 | + ERRHRD, ERRgeneral, NT_STATUS_KEY_DELETED}, { |
| 18235 | + ERRHRD, ERRgeneral, NT_STATUS_NO_LOG_SPACE}, { |
| 18236 | + ERRHRD, ERRgeneral, NT_STATUS_TOO_MANY_SIDS}, { |
| 18237 | + ERRHRD, ERRgeneral, NT_STATUS_LM_CROSS_ENCRYPTION_REQUIRED}, { |
| 18238 | + ERRHRD, ERRgeneral, NT_STATUS_KEY_HAS_CHILDREN}, { |
| 18239 | + ERRHRD, ERRgeneral, NT_STATUS_CHILD_MUST_BE_VOLATILE}, { |
| 18240 | + ERRDOS, 87, NT_STATUS_DEVICE_CONFIGURATION_ERROR}, { |
| 18241 | + ERRHRD, ERRgeneral, NT_STATUS_DRIVER_INTERNAL_ERROR}, { |
| 18242 | + ERRDOS, 22, NT_STATUS_INVALID_DEVICE_STATE}, { |
| 18243 | + ERRHRD, ERRgeneral, NT_STATUS_IO_DEVICE_ERROR}, { |
| 18244 | + ERRHRD, ERRgeneral, NT_STATUS_DEVICE_PROTOCOL_ERROR}, { |
| 18245 | + ERRHRD, ERRgeneral, NT_STATUS_BACKUP_CONTROLLER}, { |
| 18246 | + ERRHRD, ERRgeneral, NT_STATUS_LOG_FILE_FULL}, { |
| 18247 | + ERRDOS, 19, NT_STATUS_TOO_LATE}, { |
| 18248 | + ERRDOS, ERRnoaccess, NT_STATUS_NO_TRUST_LSA_SECRET}, |
| 18249 | +/* { This NT error code was 'sqashed' |
| 18250 | + from NT_STATUS_NO_TRUST_SAM_ACCOUNT to NT_STATUS_TRUSTED_RELATIONSHIP_FAILURE |
| 18251 | + during the session setup } */ |
| 18252 | + { |
| 18253 | + ERRDOS, ERRnoaccess, NT_STATUS_NO_TRUST_SAM_ACCOUNT}, { |
| 18254 | + ERRDOS, ERRnoaccess, NT_STATUS_TRUSTED_DOMAIN_FAILURE}, { |
| 18255 | + ERRDOS, ERRnoaccess, NT_STATUS_TRUSTED_RELATIONSHIP_FAILURE}, { |
| 18256 | + ERRHRD, ERRgeneral, NT_STATUS_EVENTLOG_FILE_CORRUPT}, { |
| 18257 | + ERRHRD, ERRgeneral, NT_STATUS_EVENTLOG_CANT_START}, { |
| 18258 | + ERRDOS, ERRnoaccess, NT_STATUS_TRUST_FAILURE}, { |
| 18259 | + ERRHRD, ERRgeneral, NT_STATUS_MUTANT_LIMIT_EXCEEDED}, { |
| 18260 | + ERRDOS, ERRnetlogonNotStarted, NT_STATUS_NETLOGON_NOT_STARTED}, { |
| 18261 | + ERRSRV, 2239, NT_STATUS_ACCOUNT_EXPIRED}, { |
| 18262 | + ERRHRD, ERRgeneral, NT_STATUS_POSSIBLE_DEADLOCK}, { |
| 18263 | + ERRHRD, ERRgeneral, NT_STATUS_NETWORK_CREDENTIAL_CONFLICT}, { |
| 18264 | + ERRHRD, ERRgeneral, NT_STATUS_REMOTE_SESSION_LIMIT}, { |
| 18265 | + ERRHRD, ERRgeneral, NT_STATUS_EVENTLOG_FILE_CHANGED}, { |
| 18266 | + ERRDOS, ERRnoaccess, NT_STATUS_NOLOGON_INTERDOMAIN_TRUST_ACCOUNT}, { |
| 18267 | + ERRDOS, ERRnoaccess, NT_STATUS_NOLOGON_WORKSTATION_TRUST_ACCOUNT}, { |
| 18268 | + ERRDOS, ERRnoaccess, NT_STATUS_NOLOGON_SERVER_TRUST_ACCOUNT}, |
| 18269 | +/* { This NT error code was 'sqashed' |
| 18270 | + from NT_STATUS_DOMAIN_TRUST_INCONSISTENT to NT_STATUS_LOGON_FAILURE |
| 18271 | + during the session setup } */ |
| 18272 | + { |
| 18273 | + ERRDOS, ERRnoaccess, NT_STATUS_DOMAIN_TRUST_INCONSISTENT}, { |
| 18274 | + ERRHRD, ERRgeneral, NT_STATUS_FS_DRIVER_REQUIRED}, { |
| 18275 | + ERRHRD, ERRgeneral, NT_STATUS_NO_USER_SESSION_KEY}, { |
| 18276 | + ERRDOS, 59, NT_STATUS_USER_SESSION_DELETED}, { |
| 18277 | + ERRHRD, ERRgeneral, NT_STATUS_RESOURCE_LANG_NOT_FOUND}, { |
| 18278 | + ERRDOS, ERRnomem, NT_STATUS_INSUFF_SERVER_RESOURCES}, { |
| 18279 | + ERRHRD, ERRgeneral, NT_STATUS_INVALID_BUFFER_SIZE}, { |
| 18280 | + ERRHRD, ERRgeneral, NT_STATUS_INVALID_ADDRESS_COMPONENT}, { |
| 18281 | + ERRHRD, ERRgeneral, NT_STATUS_INVALID_ADDRESS_WILDCARD}, { |
| 18282 | + ERRDOS, 68, NT_STATUS_TOO_MANY_ADDRESSES}, { |
| 18283 | + ERRDOS, 52, NT_STATUS_ADDRESS_ALREADY_EXISTS}, { |
| 18284 | + ERRDOS, 64, NT_STATUS_ADDRESS_CLOSED}, { |
| 18285 | + ERRDOS, 64, NT_STATUS_CONNECTION_DISCONNECTED}, { |
| 18286 | + ERRDOS, 64, NT_STATUS_CONNECTION_RESET}, { |
| 18287 | + ERRDOS, 68, NT_STATUS_TOO_MANY_NODES}, { |
| 18288 | + ERRDOS, 59, NT_STATUS_TRANSACTION_ABORTED}, { |
| 18289 | + ERRDOS, 59, NT_STATUS_TRANSACTION_TIMED_OUT}, { |
| 18290 | + ERRDOS, 59, NT_STATUS_TRANSACTION_NO_RELEASE}, { |
| 18291 | + ERRDOS, 59, NT_STATUS_TRANSACTION_NO_MATCH}, { |
| 18292 | + ERRDOS, 59, NT_STATUS_TRANSACTION_RESPONDED}, { |
| 18293 | + ERRDOS, 59, NT_STATUS_TRANSACTION_INVALID_ID}, { |
| 18294 | + ERRDOS, 59, NT_STATUS_TRANSACTION_INVALID_TYPE}, { |
| 18295 | + ERRDOS, ERRunsup, NT_STATUS_NOT_SERVER_SESSION}, { |
| 18296 | + ERRDOS, ERRunsup, NT_STATUS_NOT_CLIENT_SESSION}, { |
| 18297 | + ERRHRD, ERRgeneral, NT_STATUS_CANNOT_LOAD_REGISTRY_FILE}, { |
| 18298 | + ERRHRD, ERRgeneral, NT_STATUS_DEBUG_ATTACH_FAILED}, { |
| 18299 | + ERRHRD, ERRgeneral, NT_STATUS_SYSTEM_PROCESS_TERMINATED}, { |
| 18300 | + ERRHRD, ERRgeneral, NT_STATUS_DATA_NOT_ACCEPTED}, { |
| 18301 | + ERRHRD, ERRgeneral, NT_STATUS_NO_BROWSER_SERVERS_FOUND}, { |
| 18302 | + ERRHRD, ERRgeneral, NT_STATUS_VDM_HARD_ERROR}, { |
| 18303 | + ERRHRD, ERRgeneral, NT_STATUS_DRIVER_CANCEL_TIMEOUT}, { |
| 18304 | + ERRHRD, ERRgeneral, NT_STATUS_REPLY_MESSAGE_MISMATCH}, { |
| 18305 | + ERRHRD, ERRgeneral, NT_STATUS_MAPPED_ALIGNMENT}, { |
| 18306 | + ERRDOS, 193, NT_STATUS_IMAGE_CHECKSUM_MISMATCH}, { |
| 18307 | + ERRHRD, ERRgeneral, NT_STATUS_LOST_WRITEBEHIND_DATA}, { |
| 18308 | + ERRHRD, ERRgeneral, NT_STATUS_CLIENT_SERVER_PARAMETERS_INVALID}, { |
| 18309 | + ERRSRV, 2242, NT_STATUS_PASSWORD_MUST_CHANGE}, { |
| 18310 | + ERRHRD, ERRgeneral, NT_STATUS_NOT_FOUND}, { |
| 18311 | + ERRHRD, ERRgeneral, NT_STATUS_NOT_TINY_STREAM}, { |
| 18312 | + ERRHRD, ERRgeneral, NT_STATUS_RECOVERY_FAILURE}, { |
| 18313 | + ERRHRD, ERRgeneral, NT_STATUS_STACK_OVERFLOW_READ}, { |
| 18314 | + ERRHRD, ERRgeneral, NT_STATUS_FAIL_CHECK}, { |
| 18315 | + ERRHRD, ERRgeneral, NT_STATUS_DUPLICATE_OBJECTID}, { |
| 18316 | + ERRHRD, ERRgeneral, NT_STATUS_OBJECTID_EXISTS}, { |
| 18317 | + ERRHRD, ERRgeneral, NT_STATUS_CONVERT_TO_LARGE}, { |
| 18318 | + ERRHRD, ERRgeneral, NT_STATUS_RETRY}, { |
| 18319 | + ERRHRD, ERRgeneral, NT_STATUS_FOUND_OUT_OF_SCOPE}, { |
| 18320 | + ERRHRD, ERRgeneral, NT_STATUS_ALLOCATE_BUCKET}, { |
| 18321 | + ERRHRD, ERRgeneral, NT_STATUS_PROPSET_NOT_FOUND}, { |
| 18322 | + ERRHRD, ERRgeneral, NT_STATUS_MARSHALL_OVERFLOW}, { |
| 18323 | + ERRHRD, ERRgeneral, NT_STATUS_INVALID_VARIANT}, { |
| 18324 | + ERRHRD, ERRgeneral, NT_STATUS_DOMAIN_CONTROLLER_NOT_FOUND}, { |
| 18325 | + ERRDOS, ERRnoaccess, NT_STATUS_ACCOUNT_LOCKED_OUT}, { |
| 18326 | + ERRDOS, ERRbadfid, NT_STATUS_HANDLE_NOT_CLOSABLE}, { |
| 18327 | + ERRHRD, ERRgeneral, NT_STATUS_CONNECTION_REFUSED}, { |
| 18328 | + ERRHRD, ERRgeneral, NT_STATUS_GRACEFUL_DISCONNECT}, { |
| 18329 | + ERRHRD, ERRgeneral, NT_STATUS_ADDRESS_ALREADY_ASSOCIATED}, { |
| 18330 | + ERRHRD, ERRgeneral, NT_STATUS_ADDRESS_NOT_ASSOCIATED}, { |
| 18331 | + ERRHRD, ERRgeneral, NT_STATUS_CONNECTION_INVALID}, { |
| 18332 | + ERRHRD, ERRgeneral, NT_STATUS_CONNECTION_ACTIVE}, { |
| 18333 | + ERRHRD, ERRgeneral, NT_STATUS_NETWORK_UNREACHABLE}, { |
| 18334 | + ERRHRD, ERRgeneral, NT_STATUS_HOST_UNREACHABLE}, { |
| 18335 | + ERRHRD, ERRgeneral, NT_STATUS_PROTOCOL_UNREACHABLE}, { |
| 18336 | + ERRHRD, ERRgeneral, NT_STATUS_PORT_UNREACHABLE}, { |
| 18337 | + ERRHRD, ERRgeneral, NT_STATUS_REQUEST_ABORTED}, { |
| 18338 | + ERRHRD, ERRgeneral, NT_STATUS_CONNECTION_ABORTED}, { |
| 18339 | + ERRHRD, ERRgeneral, NT_STATUS_BAD_COMPRESSION_BUFFER}, { |
| 18340 | + ERRHRD, ERRgeneral, NT_STATUS_USER_MAPPED_FILE}, { |
| 18341 | + ERRHRD, ERRgeneral, NT_STATUS_AUDIT_FAILED}, { |
| 18342 | + ERRHRD, ERRgeneral, NT_STATUS_TIMER_RESOLUTION_NOT_SET}, { |
| 18343 | + ERRHRD, ERRgeneral, NT_STATUS_CONNECTION_COUNT_LIMIT}, { |
| 18344 | + ERRHRD, ERRgeneral, NT_STATUS_LOGIN_TIME_RESTRICTION}, { |
| 18345 | + ERRHRD, ERRgeneral, NT_STATUS_LOGIN_WKSTA_RESTRICTION}, { |
| 18346 | + ERRDOS, 193, NT_STATUS_IMAGE_MP_UP_MISMATCH}, { |
| 18347 | + ERRHRD, ERRgeneral, 0xc000024a}, { |
| 18348 | + ERRHRD, ERRgeneral, 0xc000024b}, { |
| 18349 | + ERRHRD, ERRgeneral, 0xc000024c}, { |
| 18350 | + ERRHRD, ERRgeneral, 0xc000024d}, { |
| 18351 | + ERRHRD, ERRgeneral, 0xc000024e}, { |
| 18352 | + ERRHRD, ERRgeneral, 0xc000024f}, { |
| 18353 | + ERRHRD, ERRgeneral, NT_STATUS_INSUFFICIENT_LOGON_INFO}, { |
| 18354 | + ERRHRD, ERRgeneral, NT_STATUS_BAD_DLL_ENTRYPOINT}, { |
| 18355 | + ERRHRD, ERRgeneral, NT_STATUS_BAD_SERVICE_ENTRYPOINT}, { |
| 18356 | + ERRHRD, ERRgeneral, NT_STATUS_LPC_REPLY_LOST}, { |
| 18357 | + ERRHRD, ERRgeneral, NT_STATUS_IP_ADDRESS_CONFLICT1}, { |
| 18358 | + ERRHRD, ERRgeneral, NT_STATUS_IP_ADDRESS_CONFLICT2}, { |
| 18359 | + ERRHRD, ERRgeneral, NT_STATUS_REGISTRY_QUOTA_LIMIT}, { |
| 18360 | + ERRSRV, 3, NT_STATUS_PATH_NOT_COVERED}, { |
| 18361 | + ERRHRD, ERRgeneral, NT_STATUS_NO_CALLBACK_ACTIVE}, { |
| 18362 | + ERRHRD, ERRgeneral, NT_STATUS_LICENSE_QUOTA_EXCEEDED}, { |
| 18363 | + ERRHRD, ERRgeneral, NT_STATUS_PWD_TOO_SHORT}, { |
| 18364 | + ERRHRD, ERRgeneral, NT_STATUS_PWD_TOO_RECENT}, { |
| 18365 | + ERRHRD, ERRgeneral, NT_STATUS_PWD_HISTORY_CONFLICT}, { |
| 18366 | + ERRHRD, ERRgeneral, 0xc000025d}, { |
| 18367 | + ERRHRD, ERRgeneral, NT_STATUS_PLUGPLAY_NO_DEVICE}, { |
| 18368 | + ERRHRD, ERRgeneral, NT_STATUS_UNSUPPORTED_COMPRESSION}, { |
| 18369 | + ERRHRD, ERRgeneral, NT_STATUS_INVALID_HW_PROFILE}, { |
| 18370 | + ERRHRD, ERRgeneral, NT_STATUS_INVALID_PLUGPLAY_DEVICE_PATH}, { |
| 18371 | + ERRDOS, 182, NT_STATUS_DRIVER_ORDINAL_NOT_FOUND}, { |
| 18372 | + ERRDOS, 127, NT_STATUS_DRIVER_ENTRYPOINT_NOT_FOUND}, { |
| 18373 | + ERRDOS, 288, NT_STATUS_RESOURCE_NOT_OWNED}, { |
| 18374 | + ERRHRD, ERRgeneral, NT_STATUS_TOO_MANY_LINKS}, { |
| 18375 | + ERRHRD, ERRgeneral, NT_STATUS_QUOTA_LIST_INCONSISTENT}, { |
| 18376 | + ERRHRD, ERRgeneral, NT_STATUS_FILE_IS_OFFLINE}, { |
| 18377 | + ERRDOS, 21, 0xc000026e}, { |
| 18378 | + ERRDOS, 161, 0xc0000281}, { |
| 18379 | + ERRDOS, ERRnoaccess, 0xc000028a}, { |
| 18380 | + ERRDOS, ERRnoaccess, 0xc000028b}, { |
| 18381 | + ERRHRD, ERRgeneral, 0xc000028c}, { |
| 18382 | + ERRDOS, ERRnoaccess, 0xc000028d}, { |
| 18383 | + ERRDOS, ERRnoaccess, 0xc000028e}, { |
| 18384 | + ERRDOS, ERRnoaccess, 0xc000028f}, { |
| 18385 | + ERRDOS, ERRnoaccess, 0xc0000290}, { |
| 18386 | +ERRDOS, ERRbadfunc, 0xc000029c},}; |
| 18387 | + |
| 18388 | +/***************************************************************************** |
| 18389 | + Print an error message from the status code |
| 18390 | + *****************************************************************************/ |
| 18391 | +static void |
| 18392 | +cifs_print_status(__u32 status_code) |
| 18393 | +{ |
| 18394 | + int idx = 0; |
| 18395 | + |
| 18396 | + while (nt_errs[idx].nt_errstr != NULL) { |
| 18397 | + if (((nt_errs[idx].nt_errcode) & 0xFFFFFF) == |
| 18398 | + (status_code & 0xFFFFFF)) { |
| 18399 | + printk(KERN_NOTICE "Status code returned 0x%08x %s\n", |
| 18400 | + status_code,nt_errs[idx].nt_errstr); |
| 18401 | + } |
| 18402 | + idx++; |
| 18403 | + } |
| 18404 | + return; |
| 18405 | +} |
| 18406 | + |
| 18407 | + |
| 18408 | +static void |
| 18409 | +ntstatus_to_dos(__u32 ntstatus, __u8 * eclass, __u16 * ecode) |
| 18410 | +{ |
| 18411 | + int i; |
| 18412 | + if (ntstatus == 0) { |
| 18413 | + *eclass = 0; |
| 18414 | + *ecode = 0; |
| 18415 | + return; |
| 18416 | + } |
| 18417 | + for (i = 0; ntstatus_to_dos_map[i].ntstatus; i++) { |
| 18418 | + if (ntstatus == ntstatus_to_dos_map[i].ntstatus) { |
| 18419 | + *eclass = ntstatus_to_dos_map[i].dos_class; |
| 18420 | + *ecode = ntstatus_to_dos_map[i].dos_code; |
| 18421 | + return; |
| 18422 | + } |
| 18423 | + } |
| 18424 | + *eclass = ERRHRD; |
| 18425 | + *ecode = ERRgeneral; |
| 18426 | +} |
| 18427 | + |
| 18428 | +int |
| 18429 | +map_smb_to_linux_error(struct smb_hdr *smb) |
| 18430 | +{ |
| 18431 | + unsigned int i; |
| 18432 | + int rc = -EIO; /* if transport error smb error may not be set */ |
| 18433 | + __u8 smberrclass; |
| 18434 | + __u16 smberrcode; |
| 18435 | + |
| 18436 | + /* BB if NT Status codes - map NT BB */ |
| 18437 | + |
| 18438 | + /* old style smb error codes */ |
| 18439 | + if (smb->Status.CifsError == 0) |
| 18440 | + return 0; |
| 18441 | + |
| 18442 | + if (smb->Flags2 & SMBFLG2_ERR_STATUS) { |
| 18443 | + /* translate the newer STATUS codes to old style errors and then to POSIX errors */ |
| 18444 | + smb->Status.CifsError = le32_to_cpu(smb->Status.CifsError); |
| 18445 | + if(cifsFYI) |
| 18446 | + cifs_print_status(smb->Status.CifsError); |
| 18447 | + ntstatus_to_dos(smb->Status.CifsError, &smberrclass, |
| 18448 | + &smberrcode); |
| 18449 | + } else { |
| 18450 | + smberrclass = smb->Status.DosError.ErrorClass; |
| 18451 | + smb->Status.DosError.Error = |
| 18452 | + le16_to_cpu(smb->Status.DosError.Error); |
| 18453 | + smberrcode = smb->Status.DosError.Error; |
| 18454 | + } |
| 18455 | + |
| 18456 | + /* old style errors */ |
| 18457 | + |
| 18458 | + /* DOS class smb error codes - map DOS */ |
| 18459 | + if (smberrclass == ERRDOS) { /* one byte field no need to byte reverse */ |
| 18460 | + for (i = 0; |
| 18461 | + i < |
| 18462 | + sizeof (mapping_table_ERRDOS) / |
| 18463 | + sizeof (struct smb_to_posix_error); i++) { |
| 18464 | + if (mapping_table_ERRDOS[i].smb_err == 0) |
| 18465 | + break; |
| 18466 | + else if (mapping_table_ERRDOS[i].smb_err == smberrcode) { |
| 18467 | + rc = mapping_table_ERRDOS[i].posix_code; |
| 18468 | + break; |
| 18469 | + } |
| 18470 | + /* else try the next error mapping one to see if it will match */ |
| 18471 | + } |
| 18472 | + } else if (smberrclass == ERRSRV) { /* server class of error codes */ |
| 18473 | + for (i = 0; |
| 18474 | + i < |
| 18475 | + sizeof (mapping_table_ERRSRV) / |
| 18476 | + sizeof (struct smb_to_posix_error); i++) { |
| 18477 | + if (mapping_table_ERRSRV[i].smb_err == 0) |
| 18478 | + break; |
| 18479 | + else if (mapping_table_ERRSRV[i].smb_err == smberrcode) { |
| 18480 | + rc = mapping_table_ERRSRV[i].posix_code; |
| 18481 | + break; |
| 18482 | + } |
| 18483 | + /* else try the next error mapping one to see if it will match */ |
| 18484 | + } |
| 18485 | + } |
| 18486 | + /* else ERRHRD class errors or junk - return EIO */ |
| 18487 | + |
| 18488 | + cFYI(1, (" !!Mapping smb error code %d to POSIX err %d !!", smberrcode,rc)); |
| 18489 | + |
| 18490 | + /* generic corrective action e.g. reconnect SMB session on ERRbaduid could be added */ |
| 18491 | + |
| 18492 | + return rc; |
| 18493 | +} |
| 18494 | + |
| 18495 | +/* |
| 18496 | + * calculate the size of the SMB message based on the fixed header |
| 18497 | + * portion, the number of word parameters and the data portion of the message |
| 18498 | + */ |
| 18499 | +unsigned int |
| 18500 | +smbCalcSize(struct smb_hdr *ptr) |
| 18501 | +{ |
| 18502 | + return (sizeof (struct smb_hdr) + (2 * ptr->WordCount) + |
| 18503 | + BCC(ptr)); |
| 18504 | +} |
| 18505 | + |
| 18506 | +/* The following are taken from fs/ntfs/util.c */ |
| 18507 | + |
| 18508 | +#define NTFS_TIME_OFFSET ((u64)(369*365 + 89) * 24 * 3600 * 10000000) |
| 18509 | + |
| 18510 | + /* |
| 18511 | + * Convert the NT UTC (based 1601-01-01, in hundred nanosecond units) |
| 18512 | + * into Unix UTC (based 1970-01-01, in seconds). |
| 18513 | + */ |
| 18514 | +time_t |
| 18515 | +cifs_NTtimeToUnix(__u64 ntutc) |
| 18516 | +{ |
| 18517 | + /* BB what about the timezone? BB */ |
| 18518 | + |
| 18519 | + /* Subtract the NTFS time offset, then convert to 1s intervals. */ |
| 18520 | + u64 t; |
| 18521 | + |
| 18522 | + t = ntutc - NTFS_TIME_OFFSET; |
| 18523 | + do_div(t, 10000000); |
| 18524 | + return (time_t)t; |
| 18525 | +} |
| 18526 | + |
| 18527 | +/* Convert the Unix UTC into NT UTC. */ |
| 18528 | +__u64 |
| 18529 | +cifs_UnixTimeToNT(time_t t) |
| 18530 | +{ |
| 18531 | + __u64 dce_time; |
| 18532 | + /* Convert to 100ns intervals and then add the NTFS time offset. */ |
| 18533 | + dce_time = (__u64) t * 10000000; |
| 18534 | + dce_time += NTFS_TIME_OFFSET; |
| 18535 | + return dce_time; |
| 18536 | +} |
| 18537 | --- /dev/null |
| 18538 | +++ b/fs/cifs/nterr.c |
| 18539 | @@ -0,0 +1,687 @@ |
| 18540 | +/* |
| 18541 | + * Unix SMB/Netbios implementation. |
| 18542 | + * Version 1.9. |
| 18543 | + * RPC Pipe client / server routines |
| 18544 | + * Copyright (C) Luke Kenneth Casson Leighton 1997-2001. |
| 18545 | + * |
| 18546 | + * This program is free software; you can redistribute it and/or modify |
| 18547 | + * it under the terms of the GNU General Public License as published by |
| 18548 | + * the Free Software Foundation; either version 2 of the License, or |
| 18549 | + * (at your option) any later version. |
| 18550 | + * |
| 18551 | + * This program is distributed in the hope that it will be useful, |
| 18552 | + * but WITHOUT ANY WARRANTY; without even the implied warranty of |
| 18553 | + * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the |
| 18554 | + * GNU General Public License for more details. |
| 18555 | + * |
| 18556 | + * You should have received a copy of the GNU General Public License |
| 18557 | + * along with this program; if not, write to the Free Software |
| 18558 | + * Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA. |
| 18559 | + */ |
| 18560 | + |
| 18561 | +/* NT error codes - see nterr.h */ |
| 18562 | +#include <linux/types.h> |
| 18563 | +#include <linux/fs.h> |
| 18564 | +#include "nterr.h" |
| 18565 | + |
| 18566 | +const struct nt_err_code_struct nt_errs[] = { |
| 18567 | + {"NT_STATUS_OK", NT_STATUS_OK}, |
| 18568 | + {"NT_STATUS_UNSUCCESSFUL", NT_STATUS_UNSUCCESSFUL}, |
| 18569 | + {"NT_STATUS_NOT_IMPLEMENTED", NT_STATUS_NOT_IMPLEMENTED}, |
| 18570 | + {"NT_STATUS_INVALID_INFO_CLASS", NT_STATUS_INVALID_INFO_CLASS}, |
| 18571 | + {"NT_STATUS_INFO_LENGTH_MISMATCH", NT_STATUS_INFO_LENGTH_MISMATCH}, |
| 18572 | + {"NT_STATUS_ACCESS_VIOLATION", NT_STATUS_ACCESS_VIOLATION}, |
| 18573 | + {"STATUS_BUFFER_OVERFLOW", STATUS_BUFFER_OVERFLOW}, |
| 18574 | + {"NT_STATUS_IN_PAGE_ERROR", NT_STATUS_IN_PAGE_ERROR}, |
| 18575 | + {"NT_STATUS_PAGEFILE_QUOTA", NT_STATUS_PAGEFILE_QUOTA}, |
| 18576 | + {"NT_STATUS_INVALID_HANDLE", NT_STATUS_INVALID_HANDLE}, |
| 18577 | + {"NT_STATUS_BAD_INITIAL_STACK", NT_STATUS_BAD_INITIAL_STACK}, |
| 18578 | + {"NT_STATUS_BAD_INITIAL_PC", NT_STATUS_BAD_INITIAL_PC}, |
| 18579 | + {"NT_STATUS_INVALID_CID", NT_STATUS_INVALID_CID}, |
| 18580 | + {"NT_STATUS_TIMER_NOT_CANCELED", NT_STATUS_TIMER_NOT_CANCELED}, |
| 18581 | + {"NT_STATUS_INVALID_PARAMETER", NT_STATUS_INVALID_PARAMETER}, |
| 18582 | + {"NT_STATUS_NO_SUCH_DEVICE", NT_STATUS_NO_SUCH_DEVICE}, |
| 18583 | + {"NT_STATUS_NO_SUCH_FILE", NT_STATUS_NO_SUCH_FILE}, |
| 18584 | + {"NT_STATUS_INVALID_DEVICE_REQUEST", |
| 18585 | + NT_STATUS_INVALID_DEVICE_REQUEST}, |
| 18586 | + {"NT_STATUS_END_OF_FILE", NT_STATUS_END_OF_FILE}, |
| 18587 | + {"NT_STATUS_WRONG_VOLUME", NT_STATUS_WRONG_VOLUME}, |
| 18588 | + {"NT_STATUS_NO_MEDIA_IN_DEVICE", NT_STATUS_NO_MEDIA_IN_DEVICE}, |
| 18589 | + {"NT_STATUS_UNRECOGNIZED_MEDIA", NT_STATUS_UNRECOGNIZED_MEDIA}, |
| 18590 | + {"NT_STATUS_NONEXISTENT_SECTOR", NT_STATUS_NONEXISTENT_SECTOR}, |
| 18591 | + {"NT_STATUS_MORE_PROCESSING_REQUIRED", |
| 18592 | + NT_STATUS_MORE_PROCESSING_REQUIRED}, |
| 18593 | + {"NT_STATUS_NO_MEMORY", NT_STATUS_NO_MEMORY}, |
| 18594 | + {"NT_STATUS_CONFLICTING_ADDRESSES", |
| 18595 | + NT_STATUS_CONFLICTING_ADDRESSES}, |
| 18596 | + {"NT_STATUS_NOT_MAPPED_VIEW", NT_STATUS_NOT_MAPPED_VIEW}, |
| 18597 | + {"NT_STATUS_UNABLE_TO_FREE_VM", NT_STATUS_UNABLE_TO_FREE_VM}, |
| 18598 | + {"NT_STATUS_UNABLE_TO_DELETE_SECTION", |
| 18599 | + NT_STATUS_UNABLE_TO_DELETE_SECTION}, |
| 18600 | + {"NT_STATUS_INVALID_SYSTEM_SERVICE", |
| 18601 | + NT_STATUS_INVALID_SYSTEM_SERVICE}, |
| 18602 | + {"NT_STATUS_ILLEGAL_INSTRUCTION", NT_STATUS_ILLEGAL_INSTRUCTION}, |
| 18603 | + {"NT_STATUS_INVALID_LOCK_SEQUENCE", |
| 18604 | + NT_STATUS_INVALID_LOCK_SEQUENCE}, |
| 18605 | + {"NT_STATUS_INVALID_VIEW_SIZE", NT_STATUS_INVALID_VIEW_SIZE}, |
| 18606 | + {"NT_STATUS_INVALID_FILE_FOR_SECTION", |
| 18607 | + NT_STATUS_INVALID_FILE_FOR_SECTION}, |
| 18608 | + {"NT_STATUS_ALREADY_COMMITTED", NT_STATUS_ALREADY_COMMITTED}, |
| 18609 | + {"NT_STATUS_ACCESS_DENIED", NT_STATUS_ACCESS_DENIED}, |
| 18610 | + {"NT_STATUS_BUFFER_TOO_SMALL", NT_STATUS_BUFFER_TOO_SMALL}, |
| 18611 | + {"NT_STATUS_OBJECT_TYPE_MISMATCH", NT_STATUS_OBJECT_TYPE_MISMATCH}, |
| 18612 | + {"NT_STATUS_NONCONTINUABLE_EXCEPTION", |
| 18613 | + NT_STATUS_NONCONTINUABLE_EXCEPTION}, |
| 18614 | + {"NT_STATUS_INVALID_DISPOSITION", NT_STATUS_INVALID_DISPOSITION}, |
| 18615 | + {"NT_STATUS_UNWIND", NT_STATUS_UNWIND}, |
| 18616 | + {"NT_STATUS_BAD_STACK", NT_STATUS_BAD_STACK}, |
| 18617 | + {"NT_STATUS_INVALID_UNWIND_TARGET", |
| 18618 | + NT_STATUS_INVALID_UNWIND_TARGET}, |
| 18619 | + {"NT_STATUS_NOT_LOCKED", NT_STATUS_NOT_LOCKED}, |
| 18620 | + {"NT_STATUS_PARITY_ERROR", NT_STATUS_PARITY_ERROR}, |
| 18621 | + {"NT_STATUS_UNABLE_TO_DECOMMIT_VM", |
| 18622 | + NT_STATUS_UNABLE_TO_DECOMMIT_VM}, |
| 18623 | + {"NT_STATUS_NOT_COMMITTED", NT_STATUS_NOT_COMMITTED}, |
| 18624 | + {"NT_STATUS_INVALID_PORT_ATTRIBUTES", |
| 18625 | + NT_STATUS_INVALID_PORT_ATTRIBUTES}, |
| 18626 | + {"NT_STATUS_PORT_MESSAGE_TOO_LONG", |
| 18627 | + NT_STATUS_PORT_MESSAGE_TOO_LONG}, |
| 18628 | + {"NT_STATUS_INVALID_PARAMETER_MIX", |
| 18629 | + NT_STATUS_INVALID_PARAMETER_MIX}, |
| 18630 | + {"NT_STATUS_INVALID_QUOTA_LOWER", NT_STATUS_INVALID_QUOTA_LOWER}, |
| 18631 | + {"NT_STATUS_DISK_CORRUPT_ERROR", NT_STATUS_DISK_CORRUPT_ERROR}, |
| 18632 | + {"NT_STATUS_OBJECT_NAME_INVALID", NT_STATUS_OBJECT_NAME_INVALID}, |
| 18633 | + {"NT_STATUS_OBJECT_NAME_NOT_FOUND", |
| 18634 | + NT_STATUS_OBJECT_NAME_NOT_FOUND}, |
| 18635 | + {"NT_STATUS_OBJECT_NAME_COLLISION", |
| 18636 | + NT_STATUS_OBJECT_NAME_COLLISION}, |
| 18637 | + {"NT_STATUS_HANDLE_NOT_WAITABLE", NT_STATUS_HANDLE_NOT_WAITABLE}, |
| 18638 | + {"NT_STATUS_PORT_DISCONNECTED", NT_STATUS_PORT_DISCONNECTED}, |
| 18639 | + {"NT_STATUS_DEVICE_ALREADY_ATTACHED", |
| 18640 | + NT_STATUS_DEVICE_ALREADY_ATTACHED}, |
| 18641 | + {"NT_STATUS_OBJECT_PATH_INVALID", NT_STATUS_OBJECT_PATH_INVALID}, |
| 18642 | + {"NT_STATUS_OBJECT_PATH_NOT_FOUND", |
| 18643 | + NT_STATUS_OBJECT_PATH_NOT_FOUND}, |
| 18644 | + {"NT_STATUS_OBJECT_PATH_SYNTAX_BAD", |
| 18645 | + NT_STATUS_OBJECT_PATH_SYNTAX_BAD}, |
| 18646 | + {"NT_STATUS_DATA_OVERRUN", NT_STATUS_DATA_OVERRUN}, |
| 18647 | + {"NT_STATUS_DATA_LATE_ERROR", NT_STATUS_DATA_LATE_ERROR}, |
| 18648 | + {"NT_STATUS_DATA_ERROR", NT_STATUS_DATA_ERROR}, |
| 18649 | + {"NT_STATUS_CRC_ERROR", NT_STATUS_CRC_ERROR}, |
| 18650 | + {"NT_STATUS_SECTION_TOO_BIG", NT_STATUS_SECTION_TOO_BIG}, |
| 18651 | + {"NT_STATUS_PORT_CONNECTION_REFUSED", |
| 18652 | + NT_STATUS_PORT_CONNECTION_REFUSED}, |
| 18653 | + {"NT_STATUS_INVALID_PORT_HANDLE", NT_STATUS_INVALID_PORT_HANDLE}, |
| 18654 | + {"NT_STATUS_SHARING_VIOLATION", NT_STATUS_SHARING_VIOLATION}, |
| 18655 | + {"NT_STATUS_QUOTA_EXCEEDED", NT_STATUS_QUOTA_EXCEEDED}, |
| 18656 | + {"NT_STATUS_INVALID_PAGE_PROTECTION", |
| 18657 | + NT_STATUS_INVALID_PAGE_PROTECTION}, |
| 18658 | + {"NT_STATUS_MUTANT_NOT_OWNED", NT_STATUS_MUTANT_NOT_OWNED}, |
| 18659 | + {"NT_STATUS_SEMAPHORE_LIMIT_EXCEEDED", |
| 18660 | + NT_STATUS_SEMAPHORE_LIMIT_EXCEEDED}, |
| 18661 | + {"NT_STATUS_PORT_ALREADY_SET", NT_STATUS_PORT_ALREADY_SET}, |
| 18662 | + {"NT_STATUS_SECTION_NOT_IMAGE", NT_STATUS_SECTION_NOT_IMAGE}, |
| 18663 | + {"NT_STATUS_SUSPEND_COUNT_EXCEEDED", |
| 18664 | + NT_STATUS_SUSPEND_COUNT_EXCEEDED}, |
| 18665 | + {"NT_STATUS_THREAD_IS_TERMINATING", |
| 18666 | + NT_STATUS_THREAD_IS_TERMINATING}, |
| 18667 | + {"NT_STATUS_BAD_WORKING_SET_LIMIT", |
| 18668 | + NT_STATUS_BAD_WORKING_SET_LIMIT}, |
| 18669 | + {"NT_STATUS_INCOMPATIBLE_FILE_MAP", |
| 18670 | + NT_STATUS_INCOMPATIBLE_FILE_MAP}, |
| 18671 | + {"NT_STATUS_SECTION_PROTECTION", NT_STATUS_SECTION_PROTECTION}, |
| 18672 | + {"NT_STATUS_EAS_NOT_SUPPORTED", NT_STATUS_EAS_NOT_SUPPORTED}, |
| 18673 | + {"NT_STATUS_EA_TOO_LARGE", NT_STATUS_EA_TOO_LARGE}, |
| 18674 | + {"NT_STATUS_NONEXISTENT_EA_ENTRY", NT_STATUS_NONEXISTENT_EA_ENTRY}, |
| 18675 | + {"NT_STATUS_NO_EAS_ON_FILE", NT_STATUS_NO_EAS_ON_FILE}, |
| 18676 | + {"NT_STATUS_EA_CORRUPT_ERROR", NT_STATUS_EA_CORRUPT_ERROR}, |
| 18677 | + {"NT_STATUS_FILE_LOCK_CONFLICT", NT_STATUS_FILE_LOCK_CONFLICT}, |
| 18678 | + {"NT_STATUS_LOCK_NOT_GRANTED", NT_STATUS_LOCK_NOT_GRANTED}, |
| 18679 | + {"NT_STATUS_DELETE_PENDING", NT_STATUS_DELETE_PENDING}, |
| 18680 | + {"NT_STATUS_CTL_FILE_NOT_SUPPORTED", |
| 18681 | + NT_STATUS_CTL_FILE_NOT_SUPPORTED}, |
| 18682 | + {"NT_STATUS_UNKNOWN_REVISION", NT_STATUS_UNKNOWN_REVISION}, |
| 18683 | + {"NT_STATUS_REVISION_MISMATCH", NT_STATUS_REVISION_MISMATCH}, |
| 18684 | + {"NT_STATUS_INVALID_OWNER", NT_STATUS_INVALID_OWNER}, |
| 18685 | + {"NT_STATUS_INVALID_PRIMARY_GROUP", |
| 18686 | + NT_STATUS_INVALID_PRIMARY_GROUP}, |
| 18687 | + {"NT_STATUS_NO_IMPERSONATION_TOKEN", |
| 18688 | + NT_STATUS_NO_IMPERSONATION_TOKEN}, |
| 18689 | + {"NT_STATUS_CANT_DISABLE_MANDATORY", |
| 18690 | + NT_STATUS_CANT_DISABLE_MANDATORY}, |
| 18691 | + {"NT_STATUS_NO_LOGON_SERVERS", NT_STATUS_NO_LOGON_SERVERS}, |
| 18692 | + {"NT_STATUS_NO_SUCH_LOGON_SESSION", |
| 18693 | + NT_STATUS_NO_SUCH_LOGON_SESSION}, |
| 18694 | + {"NT_STATUS_NO_SUCH_PRIVILEGE", NT_STATUS_NO_SUCH_PRIVILEGE}, |
| 18695 | + {"NT_STATUS_PRIVILEGE_NOT_HELD", NT_STATUS_PRIVILEGE_NOT_HELD}, |
| 18696 | + {"NT_STATUS_INVALID_ACCOUNT_NAME", NT_STATUS_INVALID_ACCOUNT_NAME}, |
| 18697 | + {"NT_STATUS_USER_EXISTS", NT_STATUS_USER_EXISTS}, |
| 18698 | + {"NT_STATUS_NO_SUCH_USER", NT_STATUS_NO_SUCH_USER}, |
| 18699 | + {"NT_STATUS_GROUP_EXISTS", NT_STATUS_GROUP_EXISTS}, |
| 18700 | + {"NT_STATUS_NO_SUCH_GROUP", NT_STATUS_NO_SUCH_GROUP}, |
| 18701 | + {"NT_STATUS_MEMBER_IN_GROUP", NT_STATUS_MEMBER_IN_GROUP}, |
| 18702 | + {"NT_STATUS_MEMBER_NOT_IN_GROUP", NT_STATUS_MEMBER_NOT_IN_GROUP}, |
| 18703 | + {"NT_STATUS_LAST_ADMIN", NT_STATUS_LAST_ADMIN}, |
| 18704 | + {"NT_STATUS_WRONG_PASSWORD", NT_STATUS_WRONG_PASSWORD}, |
| 18705 | + {"NT_STATUS_ILL_FORMED_PASSWORD", NT_STATUS_ILL_FORMED_PASSWORD}, |
| 18706 | + {"NT_STATUS_PASSWORD_RESTRICTION", NT_STATUS_PASSWORD_RESTRICTION}, |
| 18707 | + {"NT_STATUS_LOGON_FAILURE", NT_STATUS_LOGON_FAILURE}, |
| 18708 | + {"NT_STATUS_ACCOUNT_RESTRICTION", NT_STATUS_ACCOUNT_RESTRICTION}, |
| 18709 | + {"NT_STATUS_INVALID_LOGON_HOURS", NT_STATUS_INVALID_LOGON_HOURS}, |
| 18710 | + {"NT_STATUS_INVALID_WORKSTATION", NT_STATUS_INVALID_WORKSTATION}, |
| 18711 | + {"NT_STATUS_PASSWORD_EXPIRED", NT_STATUS_PASSWORD_EXPIRED}, |
| 18712 | + {"NT_STATUS_ACCOUNT_DISABLED", NT_STATUS_ACCOUNT_DISABLED}, |
| 18713 | + {"NT_STATUS_NONE_MAPPED", NT_STATUS_NONE_MAPPED}, |
| 18714 | + {"NT_STATUS_TOO_MANY_LUIDS_REQUESTED", |
| 18715 | + NT_STATUS_TOO_MANY_LUIDS_REQUESTED}, |
| 18716 | + {"NT_STATUS_LUIDS_EXHAUSTED", NT_STATUS_LUIDS_EXHAUSTED}, |
| 18717 | + {"NT_STATUS_INVALID_SUB_AUTHORITY", |
| 18718 | + NT_STATUS_INVALID_SUB_AUTHORITY}, |
| 18719 | + {"NT_STATUS_INVALID_ACL", NT_STATUS_INVALID_ACL}, |
| 18720 | + {"NT_STATUS_INVALID_SID", NT_STATUS_INVALID_SID}, |
| 18721 | + {"NT_STATUS_INVALID_SECURITY_DESCR", |
| 18722 | + NT_STATUS_INVALID_SECURITY_DESCR}, |
| 18723 | + {"NT_STATUS_PROCEDURE_NOT_FOUND", NT_STATUS_PROCEDURE_NOT_FOUND}, |
| 18724 | + {"NT_STATUS_INVALID_IMAGE_FORMAT", NT_STATUS_INVALID_IMAGE_FORMAT}, |
| 18725 | + {"NT_STATUS_NO_TOKEN", NT_STATUS_NO_TOKEN}, |
| 18726 | + {"NT_STATUS_BAD_INHERITANCE_ACL", NT_STATUS_BAD_INHERITANCE_ACL}, |
| 18727 | + {"NT_STATUS_RANGE_NOT_LOCKED", NT_STATUS_RANGE_NOT_LOCKED}, |
| 18728 | + {"NT_STATUS_DISK_FULL", NT_STATUS_DISK_FULL}, |
| 18729 | + {"NT_STATUS_SERVER_DISABLED", NT_STATUS_SERVER_DISABLED}, |
| 18730 | + {"NT_STATUS_SERVER_NOT_DISABLED", NT_STATUS_SERVER_NOT_DISABLED}, |
| 18731 | + {"NT_STATUS_TOO_MANY_GUIDS_REQUESTED", |
| 18732 | + NT_STATUS_TOO_MANY_GUIDS_REQUESTED}, |
| 18733 | + {"NT_STATUS_GUIDS_EXHAUSTED", NT_STATUS_GUIDS_EXHAUSTED}, |
| 18734 | + {"NT_STATUS_INVALID_ID_AUTHORITY", NT_STATUS_INVALID_ID_AUTHORITY}, |
| 18735 | + {"NT_STATUS_AGENTS_EXHAUSTED", NT_STATUS_AGENTS_EXHAUSTED}, |
| 18736 | + {"NT_STATUS_INVALID_VOLUME_LABEL", NT_STATUS_INVALID_VOLUME_LABEL}, |
| 18737 | + {"NT_STATUS_SECTION_NOT_EXTENDED", NT_STATUS_SECTION_NOT_EXTENDED}, |
| 18738 | + {"NT_STATUS_NOT_MAPPED_DATA", NT_STATUS_NOT_MAPPED_DATA}, |
| 18739 | + {"NT_STATUS_RESOURCE_DATA_NOT_FOUND", |
| 18740 | + NT_STATUS_RESOURCE_DATA_NOT_FOUND}, |
| 18741 | + {"NT_STATUS_RESOURCE_TYPE_NOT_FOUND", |
| 18742 | + NT_STATUS_RESOURCE_TYPE_NOT_FOUND}, |
| 18743 | + {"NT_STATUS_RESOURCE_NAME_NOT_FOUND", |
| 18744 | + NT_STATUS_RESOURCE_NAME_NOT_FOUND}, |
| 18745 | + {"NT_STATUS_ARRAY_BOUNDS_EXCEEDED", |
| 18746 | + NT_STATUS_ARRAY_BOUNDS_EXCEEDED}, |
| 18747 | + {"NT_STATUS_FLOAT_DENORMAL_OPERAND", |
| 18748 | + NT_STATUS_FLOAT_DENORMAL_OPERAND}, |
| 18749 | + {"NT_STATUS_FLOAT_DIVIDE_BY_ZERO", NT_STATUS_FLOAT_DIVIDE_BY_ZERO}, |
| 18750 | + {"NT_STATUS_FLOAT_INEXACT_RESULT", NT_STATUS_FLOAT_INEXACT_RESULT}, |
| 18751 | + {"NT_STATUS_FLOAT_INVALID_OPERATION", |
| 18752 | + NT_STATUS_FLOAT_INVALID_OPERATION}, |
| 18753 | + {"NT_STATUS_FLOAT_OVERFLOW", NT_STATUS_FLOAT_OVERFLOW}, |
| 18754 | + {"NT_STATUS_FLOAT_STACK_CHECK", NT_STATUS_FLOAT_STACK_CHECK}, |
| 18755 | + {"NT_STATUS_FLOAT_UNDERFLOW", NT_STATUS_FLOAT_UNDERFLOW}, |
| 18756 | + {"NT_STATUS_INTEGER_DIVIDE_BY_ZERO", |
| 18757 | + NT_STATUS_INTEGER_DIVIDE_BY_ZERO}, |
| 18758 | + {"NT_STATUS_INTEGER_OVERFLOW", NT_STATUS_INTEGER_OVERFLOW}, |
| 18759 | + {"NT_STATUS_PRIVILEGED_INSTRUCTION", |
| 18760 | + NT_STATUS_PRIVILEGED_INSTRUCTION}, |
| 18761 | + {"NT_STATUS_TOO_MANY_PAGING_FILES", |
| 18762 | + NT_STATUS_TOO_MANY_PAGING_FILES}, |
| 18763 | + {"NT_STATUS_FILE_INVALID", NT_STATUS_FILE_INVALID}, |
| 18764 | + {"NT_STATUS_ALLOTTED_SPACE_EXCEEDED", |
| 18765 | + NT_STATUS_ALLOTTED_SPACE_EXCEEDED}, |
| 18766 | + {"NT_STATUS_INSUFFICIENT_RESOURCES", |
| 18767 | + NT_STATUS_INSUFFICIENT_RESOURCES}, |
| 18768 | + {"NT_STATUS_DFS_EXIT_PATH_FOUND", NT_STATUS_DFS_EXIT_PATH_FOUND}, |
| 18769 | + {"NT_STATUS_DEVICE_DATA_ERROR", NT_STATUS_DEVICE_DATA_ERROR}, |
| 18770 | + {"NT_STATUS_DEVICE_NOT_CONNECTED", NT_STATUS_DEVICE_NOT_CONNECTED}, |
| 18771 | + {"NT_STATUS_DEVICE_POWER_FAILURE", NT_STATUS_DEVICE_POWER_FAILURE}, |
| 18772 | + {"NT_STATUS_FREE_VM_NOT_AT_BASE", NT_STATUS_FREE_VM_NOT_AT_BASE}, |
| 18773 | + {"NT_STATUS_MEMORY_NOT_ALLOCATED", NT_STATUS_MEMORY_NOT_ALLOCATED}, |
| 18774 | + {"NT_STATUS_WORKING_SET_QUOTA", NT_STATUS_WORKING_SET_QUOTA}, |
| 18775 | + {"NT_STATUS_MEDIA_WRITE_PROTECTED", |
| 18776 | + NT_STATUS_MEDIA_WRITE_PROTECTED}, |
| 18777 | + {"NT_STATUS_DEVICE_NOT_READY", NT_STATUS_DEVICE_NOT_READY}, |
| 18778 | + {"NT_STATUS_INVALID_GROUP_ATTRIBUTES", |
| 18779 | + NT_STATUS_INVALID_GROUP_ATTRIBUTES}, |
| 18780 | + {"NT_STATUS_BAD_IMPERSONATION_LEVEL", |
| 18781 | + NT_STATUS_BAD_IMPERSONATION_LEVEL}, |
| 18782 | + {"NT_STATUS_CANT_OPEN_ANONYMOUS", NT_STATUS_CANT_OPEN_ANONYMOUS}, |
| 18783 | + {"NT_STATUS_BAD_VALIDATION_CLASS", NT_STATUS_BAD_VALIDATION_CLASS}, |
| 18784 | + {"NT_STATUS_BAD_TOKEN_TYPE", NT_STATUS_BAD_TOKEN_TYPE}, |
| 18785 | + {"NT_STATUS_BAD_MASTER_BOOT_RECORD", |
| 18786 | + NT_STATUS_BAD_MASTER_BOOT_RECORD}, |
| 18787 | + {"NT_STATUS_INSTRUCTION_MISALIGNMENT", |
| 18788 | + NT_STATUS_INSTRUCTION_MISALIGNMENT}, |
| 18789 | + {"NT_STATUS_INSTANCE_NOT_AVAILABLE", |
| 18790 | + NT_STATUS_INSTANCE_NOT_AVAILABLE}, |
| 18791 | + {"NT_STATUS_PIPE_NOT_AVAILABLE", NT_STATUS_PIPE_NOT_AVAILABLE}, |
| 18792 | + {"NT_STATUS_INVALID_PIPE_STATE", NT_STATUS_INVALID_PIPE_STATE}, |
| 18793 | + {"NT_STATUS_PIPE_BUSY", NT_STATUS_PIPE_BUSY}, |
| 18794 | + {"NT_STATUS_ILLEGAL_FUNCTION", NT_STATUS_ILLEGAL_FUNCTION}, |
| 18795 | + {"NT_STATUS_PIPE_DISCONNECTED", NT_STATUS_PIPE_DISCONNECTED}, |
| 18796 | + {"NT_STATUS_PIPE_CLOSING", NT_STATUS_PIPE_CLOSING}, |
| 18797 | + {"NT_STATUS_PIPE_CONNECTED", NT_STATUS_PIPE_CONNECTED}, |
| 18798 | + {"NT_STATUS_PIPE_LISTENING", NT_STATUS_PIPE_LISTENING}, |
| 18799 | + {"NT_STATUS_INVALID_READ_MODE", NT_STATUS_INVALID_READ_MODE}, |
| 18800 | + {"NT_STATUS_IO_TIMEOUT", NT_STATUS_IO_TIMEOUT}, |
| 18801 | + {"NT_STATUS_FILE_FORCED_CLOSED", NT_STATUS_FILE_FORCED_CLOSED}, |
| 18802 | + {"NT_STATUS_PROFILING_NOT_STARTED", |
| 18803 | + NT_STATUS_PROFILING_NOT_STARTED}, |
| 18804 | + {"NT_STATUS_PROFILING_NOT_STOPPED", |
| 18805 | + NT_STATUS_PROFILING_NOT_STOPPED}, |
| 18806 | + {"NT_STATUS_COULD_NOT_INTERPRET", NT_STATUS_COULD_NOT_INTERPRET}, |
| 18807 | + {"NT_STATUS_FILE_IS_A_DIRECTORY", NT_STATUS_FILE_IS_A_DIRECTORY}, |
| 18808 | + {"NT_STATUS_NOT_SUPPORTED", NT_STATUS_NOT_SUPPORTED}, |
| 18809 | + {"NT_STATUS_REMOTE_NOT_LISTENING", NT_STATUS_REMOTE_NOT_LISTENING}, |
| 18810 | + {"NT_STATUS_DUPLICATE_NAME", NT_STATUS_DUPLICATE_NAME}, |
| 18811 | + {"NT_STATUS_BAD_NETWORK_PATH", NT_STATUS_BAD_NETWORK_PATH}, |
| 18812 | + {"NT_STATUS_NETWORK_BUSY", NT_STATUS_NETWORK_BUSY}, |
| 18813 | + {"NT_STATUS_DEVICE_DOES_NOT_EXIST", |
| 18814 | + NT_STATUS_DEVICE_DOES_NOT_EXIST}, |
| 18815 | + {"NT_STATUS_TOO_MANY_COMMANDS", NT_STATUS_TOO_MANY_COMMANDS}, |
| 18816 | + {"NT_STATUS_ADAPTER_HARDWARE_ERROR", |
| 18817 | + NT_STATUS_ADAPTER_HARDWARE_ERROR}, |
| 18818 | + {"NT_STATUS_INVALID_NETWORK_RESPONSE", |
| 18819 | + NT_STATUS_INVALID_NETWORK_RESPONSE}, |
| 18820 | + {"NT_STATUS_UNEXPECTED_NETWORK_ERROR", |
| 18821 | + NT_STATUS_UNEXPECTED_NETWORK_ERROR}, |
| 18822 | + {"NT_STATUS_BAD_REMOTE_ADAPTER", NT_STATUS_BAD_REMOTE_ADAPTER}, |
| 18823 | + {"NT_STATUS_PRINT_QUEUE_FULL", NT_STATUS_PRINT_QUEUE_FULL}, |
| 18824 | + {"NT_STATUS_NO_SPOOL_SPACE", NT_STATUS_NO_SPOOL_SPACE}, |
| 18825 | + {"NT_STATUS_PRINT_CANCELLED", NT_STATUS_PRINT_CANCELLED}, |
| 18826 | + {"NT_STATUS_NETWORK_NAME_DELETED", NT_STATUS_NETWORK_NAME_DELETED}, |
| 18827 | + {"NT_STATUS_NETWORK_ACCESS_DENIED", |
| 18828 | + NT_STATUS_NETWORK_ACCESS_DENIED}, |
| 18829 | + {"NT_STATUS_BAD_DEVICE_TYPE", NT_STATUS_BAD_DEVICE_TYPE}, |
| 18830 | + {"NT_STATUS_BAD_NETWORK_NAME", NT_STATUS_BAD_NETWORK_NAME}, |
| 18831 | + {"NT_STATUS_TOO_MANY_NAMES", NT_STATUS_TOO_MANY_NAMES}, |
| 18832 | + {"NT_STATUS_TOO_MANY_SESSIONS", NT_STATUS_TOO_MANY_SESSIONS}, |
| 18833 | + {"NT_STATUS_SHARING_PAUSED", NT_STATUS_SHARING_PAUSED}, |
| 18834 | + {"NT_STATUS_REQUEST_NOT_ACCEPTED", NT_STATUS_REQUEST_NOT_ACCEPTED}, |
| 18835 | + {"NT_STATUS_REDIRECTOR_PAUSED", NT_STATUS_REDIRECTOR_PAUSED}, |
| 18836 | + {"NT_STATUS_NET_WRITE_FAULT", NT_STATUS_NET_WRITE_FAULT}, |
| 18837 | + {"NT_STATUS_PROFILING_AT_LIMIT", NT_STATUS_PROFILING_AT_LIMIT}, |
| 18838 | + {"NT_STATUS_NOT_SAME_DEVICE", NT_STATUS_NOT_SAME_DEVICE}, |
| 18839 | + {"NT_STATUS_FILE_RENAMED", NT_STATUS_FILE_RENAMED}, |
| 18840 | + {"NT_STATUS_VIRTUAL_CIRCUIT_CLOSED", |
| 18841 | + NT_STATUS_VIRTUAL_CIRCUIT_CLOSED}, |
| 18842 | + {"NT_STATUS_NO_SECURITY_ON_OBJECT", |
| 18843 | + NT_STATUS_NO_SECURITY_ON_OBJECT}, |
| 18844 | + {"NT_STATUS_CANT_WAIT", NT_STATUS_CANT_WAIT}, |
| 18845 | + {"NT_STATUS_PIPE_EMPTY", NT_STATUS_PIPE_EMPTY}, |
| 18846 | + {"NT_STATUS_CANT_ACCESS_DOMAIN_INFO", |
| 18847 | + NT_STATUS_CANT_ACCESS_DOMAIN_INFO}, |
| 18848 | + {"NT_STATUS_CANT_TERMINATE_SELF", NT_STATUS_CANT_TERMINATE_SELF}, |
| 18849 | + {"NT_STATUS_INVALID_SERVER_STATE", NT_STATUS_INVALID_SERVER_STATE}, |
| 18850 | + {"NT_STATUS_INVALID_DOMAIN_STATE", NT_STATUS_INVALID_DOMAIN_STATE}, |
| 18851 | + {"NT_STATUS_INVALID_DOMAIN_ROLE", NT_STATUS_INVALID_DOMAIN_ROLE}, |
| 18852 | + {"NT_STATUS_NO_SUCH_DOMAIN", NT_STATUS_NO_SUCH_DOMAIN}, |
| 18853 | + {"NT_STATUS_DOMAIN_EXISTS", NT_STATUS_DOMAIN_EXISTS}, |
| 18854 | + {"NT_STATUS_DOMAIN_LIMIT_EXCEEDED", |
| 18855 | + NT_STATUS_DOMAIN_LIMIT_EXCEEDED}, |
| 18856 | + {"NT_STATUS_OPLOCK_NOT_GRANTED", NT_STATUS_OPLOCK_NOT_GRANTED}, |
| 18857 | + {"NT_STATUS_INVALID_OPLOCK_PROTOCOL", |
| 18858 | + NT_STATUS_INVALID_OPLOCK_PROTOCOL}, |
| 18859 | + {"NT_STATUS_INTERNAL_DB_CORRUPTION", |
| 18860 | + NT_STATUS_INTERNAL_DB_CORRUPTION}, |
| 18861 | + {"NT_STATUS_INTERNAL_ERROR", NT_STATUS_INTERNAL_ERROR}, |
| 18862 | + {"NT_STATUS_GENERIC_NOT_MAPPED", NT_STATUS_GENERIC_NOT_MAPPED}, |
| 18863 | + {"NT_STATUS_BAD_DESCRIPTOR_FORMAT", |
| 18864 | + NT_STATUS_BAD_DESCRIPTOR_FORMAT}, |
| 18865 | + {"NT_STATUS_INVALID_USER_BUFFER", NT_STATUS_INVALID_USER_BUFFER}, |
| 18866 | + {"NT_STATUS_UNEXPECTED_IO_ERROR", NT_STATUS_UNEXPECTED_IO_ERROR}, |
| 18867 | + {"NT_STATUS_UNEXPECTED_MM_CREATE_ERR", |
| 18868 | + NT_STATUS_UNEXPECTED_MM_CREATE_ERR}, |
| 18869 | + {"NT_STATUS_UNEXPECTED_MM_MAP_ERROR", |
| 18870 | + NT_STATUS_UNEXPECTED_MM_MAP_ERROR}, |
| 18871 | + {"NT_STATUS_UNEXPECTED_MM_EXTEND_ERR", |
| 18872 | + NT_STATUS_UNEXPECTED_MM_EXTEND_ERR}, |
| 18873 | + {"NT_STATUS_NOT_LOGON_PROCESS", NT_STATUS_NOT_LOGON_PROCESS}, |
| 18874 | + {"NT_STATUS_LOGON_SESSION_EXISTS", NT_STATUS_LOGON_SESSION_EXISTS}, |
| 18875 | + {"NT_STATUS_INVALID_PARAMETER_1", NT_STATUS_INVALID_PARAMETER_1}, |
| 18876 | + {"NT_STATUS_INVALID_PARAMETER_2", NT_STATUS_INVALID_PARAMETER_2}, |
| 18877 | + {"NT_STATUS_INVALID_PARAMETER_3", NT_STATUS_INVALID_PARAMETER_3}, |
| 18878 | + {"NT_STATUS_INVALID_PARAMETER_4", NT_STATUS_INVALID_PARAMETER_4}, |
| 18879 | + {"NT_STATUS_INVALID_PARAMETER_5", NT_STATUS_INVALID_PARAMETER_5}, |
| 18880 | + {"NT_STATUS_INVALID_PARAMETER_6", NT_STATUS_INVALID_PARAMETER_6}, |
| 18881 | + {"NT_STATUS_INVALID_PARAMETER_7", NT_STATUS_INVALID_PARAMETER_7}, |
| 18882 | + {"NT_STATUS_INVALID_PARAMETER_8", NT_STATUS_INVALID_PARAMETER_8}, |
| 18883 | + {"NT_STATUS_INVALID_PARAMETER_9", NT_STATUS_INVALID_PARAMETER_9}, |
| 18884 | + {"NT_STATUS_INVALID_PARAMETER_10", NT_STATUS_INVALID_PARAMETER_10}, |
| 18885 | + {"NT_STATUS_INVALID_PARAMETER_11", NT_STATUS_INVALID_PARAMETER_11}, |
| 18886 | + {"NT_STATUS_INVALID_PARAMETER_12", NT_STATUS_INVALID_PARAMETER_12}, |
| 18887 | + {"NT_STATUS_REDIRECTOR_NOT_STARTED", |
| 18888 | + NT_STATUS_REDIRECTOR_NOT_STARTED}, |
| 18889 | + {"NT_STATUS_REDIRECTOR_STARTED", NT_STATUS_REDIRECTOR_STARTED}, |
| 18890 | + {"NT_STATUS_STACK_OVERFLOW", NT_STATUS_STACK_OVERFLOW}, |
| 18891 | + {"NT_STATUS_NO_SUCH_PACKAGE", NT_STATUS_NO_SUCH_PACKAGE}, |
| 18892 | + {"NT_STATUS_BAD_FUNCTION_TABLE", NT_STATUS_BAD_FUNCTION_TABLE}, |
| 18893 | + {"NT_STATUS_DIRECTORY_NOT_EMPTY", NT_STATUS_DIRECTORY_NOT_EMPTY}, |
| 18894 | + {"NT_STATUS_FILE_CORRUPT_ERROR", NT_STATUS_FILE_CORRUPT_ERROR}, |
| 18895 | + {"NT_STATUS_NOT_A_DIRECTORY", NT_STATUS_NOT_A_DIRECTORY}, |
| 18896 | + {"NT_STATUS_BAD_LOGON_SESSION_STATE", |
| 18897 | + NT_STATUS_BAD_LOGON_SESSION_STATE}, |
| 18898 | + {"NT_STATUS_LOGON_SESSION_COLLISION", |
| 18899 | + NT_STATUS_LOGON_SESSION_COLLISION}, |
| 18900 | + {"NT_STATUS_NAME_TOO_LONG", NT_STATUS_NAME_TOO_LONG}, |
| 18901 | + {"NT_STATUS_FILES_OPEN", NT_STATUS_FILES_OPEN}, |
| 18902 | + {"NT_STATUS_CONNECTION_IN_USE", NT_STATUS_CONNECTION_IN_USE}, |
| 18903 | + {"NT_STATUS_MESSAGE_NOT_FOUND", NT_STATUS_MESSAGE_NOT_FOUND}, |
| 18904 | + {"NT_STATUS_PROCESS_IS_TERMINATING", |
| 18905 | + NT_STATUS_PROCESS_IS_TERMINATING}, |
| 18906 | + {"NT_STATUS_INVALID_LOGON_TYPE", NT_STATUS_INVALID_LOGON_TYPE}, |
| 18907 | + {"NT_STATUS_NO_GUID_TRANSLATION", NT_STATUS_NO_GUID_TRANSLATION}, |
| 18908 | + {"NT_STATUS_CANNOT_IMPERSONATE", NT_STATUS_CANNOT_IMPERSONATE}, |
| 18909 | + {"NT_STATUS_IMAGE_ALREADY_LOADED", NT_STATUS_IMAGE_ALREADY_LOADED}, |
| 18910 | + {"NT_STATUS_ABIOS_NOT_PRESENT", NT_STATUS_ABIOS_NOT_PRESENT}, |
| 18911 | + {"NT_STATUS_ABIOS_LID_NOT_EXIST", NT_STATUS_ABIOS_LID_NOT_EXIST}, |
| 18912 | + {"NT_STATUS_ABIOS_LID_ALREADY_OWNED", |
| 18913 | + NT_STATUS_ABIOS_LID_ALREADY_OWNED}, |
| 18914 | + {"NT_STATUS_ABIOS_NOT_LID_OWNER", NT_STATUS_ABIOS_NOT_LID_OWNER}, |
| 18915 | + {"NT_STATUS_ABIOS_INVALID_COMMAND", |
| 18916 | + NT_STATUS_ABIOS_INVALID_COMMAND}, |
| 18917 | + {"NT_STATUS_ABIOS_INVALID_LID", NT_STATUS_ABIOS_INVALID_LID}, |
| 18918 | + {"NT_STATUS_ABIOS_SELECTOR_NOT_AVAILABLE", |
| 18919 | + NT_STATUS_ABIOS_SELECTOR_NOT_AVAILABLE}, |
| 18920 | + {"NT_STATUS_ABIOS_INVALID_SELECTOR", |
| 18921 | + NT_STATUS_ABIOS_INVALID_SELECTOR}, |
| 18922 | + {"NT_STATUS_NO_LDT", NT_STATUS_NO_LDT}, |
| 18923 | + {"NT_STATUS_INVALID_LDT_SIZE", NT_STATUS_INVALID_LDT_SIZE}, |
| 18924 | + {"NT_STATUS_INVALID_LDT_OFFSET", NT_STATUS_INVALID_LDT_OFFSET}, |
| 18925 | + {"NT_STATUS_INVALID_LDT_DESCRIPTOR", |
| 18926 | + NT_STATUS_INVALID_LDT_DESCRIPTOR}, |
| 18927 | + {"NT_STATUS_INVALID_IMAGE_NE_FORMAT", |
| 18928 | + NT_STATUS_INVALID_IMAGE_NE_FORMAT}, |
| 18929 | + {"NT_STATUS_RXACT_INVALID_STATE", NT_STATUS_RXACT_INVALID_STATE}, |
| 18930 | + {"NT_STATUS_RXACT_COMMIT_FAILURE", NT_STATUS_RXACT_COMMIT_FAILURE}, |
| 18931 | + {"NT_STATUS_MAPPED_FILE_SIZE_ZERO", |
| 18932 | + NT_STATUS_MAPPED_FILE_SIZE_ZERO}, |
| 18933 | + {"NT_STATUS_TOO_MANY_OPENED_FILES", |
| 18934 | + NT_STATUS_TOO_MANY_OPENED_FILES}, |
| 18935 | + {"NT_STATUS_CANCELLED", NT_STATUS_CANCELLED}, |
| 18936 | + {"NT_STATUS_CANNOT_DELETE", NT_STATUS_CANNOT_DELETE}, |
| 18937 | + {"NT_STATUS_INVALID_COMPUTER_NAME", |
| 18938 | + NT_STATUS_INVALID_COMPUTER_NAME}, |
| 18939 | + {"NT_STATUS_FILE_DELETED", NT_STATUS_FILE_DELETED}, |
| 18940 | + {"NT_STATUS_SPECIAL_ACCOUNT", NT_STATUS_SPECIAL_ACCOUNT}, |
| 18941 | + {"NT_STATUS_SPECIAL_GROUP", NT_STATUS_SPECIAL_GROUP}, |
| 18942 | + {"NT_STATUS_SPECIAL_USER", NT_STATUS_SPECIAL_USER}, |
| 18943 | + {"NT_STATUS_MEMBERS_PRIMARY_GROUP", |
| 18944 | + NT_STATUS_MEMBERS_PRIMARY_GROUP}, |
| 18945 | + {"NT_STATUS_FILE_CLOSED", NT_STATUS_FILE_CLOSED}, |
| 18946 | + {"NT_STATUS_TOO_MANY_THREADS", NT_STATUS_TOO_MANY_THREADS}, |
| 18947 | + {"NT_STATUS_THREAD_NOT_IN_PROCESS", |
| 18948 | + NT_STATUS_THREAD_NOT_IN_PROCESS}, |
| 18949 | + {"NT_STATUS_TOKEN_ALREADY_IN_USE", NT_STATUS_TOKEN_ALREADY_IN_USE}, |
| 18950 | + {"NT_STATUS_PAGEFILE_QUOTA_EXCEEDED", |
| 18951 | + NT_STATUS_PAGEFILE_QUOTA_EXCEEDED}, |
| 18952 | + {"NT_STATUS_COMMITMENT_LIMIT", NT_STATUS_COMMITMENT_LIMIT}, |
| 18953 | + {"NT_STATUS_INVALID_IMAGE_LE_FORMAT", |
| 18954 | + NT_STATUS_INVALID_IMAGE_LE_FORMAT}, |
| 18955 | + {"NT_STATUS_INVALID_IMAGE_NOT_MZ", NT_STATUS_INVALID_IMAGE_NOT_MZ}, |
| 18956 | + {"NT_STATUS_INVALID_IMAGE_PROTECT", |
| 18957 | + NT_STATUS_INVALID_IMAGE_PROTECT}, |
| 18958 | + {"NT_STATUS_INVALID_IMAGE_WIN_16", NT_STATUS_INVALID_IMAGE_WIN_16}, |
| 18959 | + {"NT_STATUS_LOGON_SERVER_CONFLICT", |
| 18960 | + NT_STATUS_LOGON_SERVER_CONFLICT}, |
| 18961 | + {"NT_STATUS_TIME_DIFFERENCE_AT_DC", |
| 18962 | + NT_STATUS_TIME_DIFFERENCE_AT_DC}, |
| 18963 | + {"NT_STATUS_SYNCHRONIZATION_REQUIRED", |
| 18964 | + NT_STATUS_SYNCHRONIZATION_REQUIRED}, |
| 18965 | + {"NT_STATUS_DLL_NOT_FOUND", NT_STATUS_DLL_NOT_FOUND}, |
| 18966 | + {"NT_STATUS_OPEN_FAILED", NT_STATUS_OPEN_FAILED}, |
| 18967 | + {"NT_STATUS_IO_PRIVILEGE_FAILED", NT_STATUS_IO_PRIVILEGE_FAILED}, |
| 18968 | + {"NT_STATUS_ORDINAL_NOT_FOUND", NT_STATUS_ORDINAL_NOT_FOUND}, |
| 18969 | + {"NT_STATUS_ENTRYPOINT_NOT_FOUND", NT_STATUS_ENTRYPOINT_NOT_FOUND}, |
| 18970 | + {"NT_STATUS_CONTROL_C_EXIT", NT_STATUS_CONTROL_C_EXIT}, |
| 18971 | + {"NT_STATUS_LOCAL_DISCONNECT", NT_STATUS_LOCAL_DISCONNECT}, |
| 18972 | + {"NT_STATUS_REMOTE_DISCONNECT", NT_STATUS_REMOTE_DISCONNECT}, |
| 18973 | + {"NT_STATUS_REMOTE_RESOURCES", NT_STATUS_REMOTE_RESOURCES}, |
| 18974 | + {"NT_STATUS_LINK_FAILED", NT_STATUS_LINK_FAILED}, |
| 18975 | + {"NT_STATUS_LINK_TIMEOUT", NT_STATUS_LINK_TIMEOUT}, |
| 18976 | + {"NT_STATUS_INVALID_CONNECTION", NT_STATUS_INVALID_CONNECTION}, |
| 18977 | + {"NT_STATUS_INVALID_ADDRESS", NT_STATUS_INVALID_ADDRESS}, |
| 18978 | + {"NT_STATUS_DLL_INIT_FAILED", NT_STATUS_DLL_INIT_FAILED}, |
| 18979 | + {"NT_STATUS_MISSING_SYSTEMFILE", NT_STATUS_MISSING_SYSTEMFILE}, |
| 18980 | + {"NT_STATUS_UNHANDLED_EXCEPTION", NT_STATUS_UNHANDLED_EXCEPTION}, |
| 18981 | + {"NT_STATUS_APP_INIT_FAILURE", NT_STATUS_APP_INIT_FAILURE}, |
| 18982 | + {"NT_STATUS_PAGEFILE_CREATE_FAILED", |
| 18983 | + NT_STATUS_PAGEFILE_CREATE_FAILED}, |
| 18984 | + {"NT_STATUS_NO_PAGEFILE", NT_STATUS_NO_PAGEFILE}, |
| 18985 | + {"NT_STATUS_INVALID_LEVEL", NT_STATUS_INVALID_LEVEL}, |
| 18986 | + {"NT_STATUS_WRONG_PASSWORD_CORE", NT_STATUS_WRONG_PASSWORD_CORE}, |
| 18987 | + {"NT_STATUS_ILLEGAL_FLOAT_CONTEXT", |
| 18988 | + NT_STATUS_ILLEGAL_FLOAT_CONTEXT}, |
| 18989 | + {"NT_STATUS_PIPE_BROKEN", NT_STATUS_PIPE_BROKEN}, |
| 18990 | + {"NT_STATUS_REGISTRY_CORRUPT", NT_STATUS_REGISTRY_CORRUPT}, |
| 18991 | + {"NT_STATUS_REGISTRY_IO_FAILED", NT_STATUS_REGISTRY_IO_FAILED}, |
| 18992 | + {"NT_STATUS_NO_EVENT_PAIR", NT_STATUS_NO_EVENT_PAIR}, |
| 18993 | + {"NT_STATUS_UNRECOGNIZED_VOLUME", NT_STATUS_UNRECOGNIZED_VOLUME}, |
| 18994 | + {"NT_STATUS_SERIAL_NO_DEVICE_INITED", |
| 18995 | + NT_STATUS_SERIAL_NO_DEVICE_INITED}, |
| 18996 | + {"NT_STATUS_NO_SUCH_ALIAS", NT_STATUS_NO_SUCH_ALIAS}, |
| 18997 | + {"NT_STATUS_MEMBER_NOT_IN_ALIAS", NT_STATUS_MEMBER_NOT_IN_ALIAS}, |
| 18998 | + {"NT_STATUS_MEMBER_IN_ALIAS", NT_STATUS_MEMBER_IN_ALIAS}, |
| 18999 | + {"NT_STATUS_ALIAS_EXISTS", NT_STATUS_ALIAS_EXISTS}, |
| 19000 | + {"NT_STATUS_LOGON_NOT_GRANTED", NT_STATUS_LOGON_NOT_GRANTED}, |
| 19001 | + {"NT_STATUS_TOO_MANY_SECRETS", NT_STATUS_TOO_MANY_SECRETS}, |
| 19002 | + {"NT_STATUS_SECRET_TOO_LONG", NT_STATUS_SECRET_TOO_LONG}, |
| 19003 | + {"NT_STATUS_INTERNAL_DB_ERROR", NT_STATUS_INTERNAL_DB_ERROR}, |
| 19004 | + {"NT_STATUS_FULLSCREEN_MODE", NT_STATUS_FULLSCREEN_MODE}, |
| 19005 | + {"NT_STATUS_TOO_MANY_CONTEXT_IDS", NT_STATUS_TOO_MANY_CONTEXT_IDS}, |
| 19006 | + {"NT_STATUS_LOGON_TYPE_NOT_GRANTED", |
| 19007 | + NT_STATUS_LOGON_TYPE_NOT_GRANTED}, |
| 19008 | + {"NT_STATUS_NOT_REGISTRY_FILE", NT_STATUS_NOT_REGISTRY_FILE}, |
| 19009 | + {"NT_STATUS_NT_CROSS_ENCRYPTION_REQUIRED", |
| 19010 | + NT_STATUS_NT_CROSS_ENCRYPTION_REQUIRED}, |
| 19011 | + {"NT_STATUS_DOMAIN_CTRLR_CONFIG_ERROR", |
| 19012 | + NT_STATUS_DOMAIN_CTRLR_CONFIG_ERROR}, |
| 19013 | + {"NT_STATUS_FT_MISSING_MEMBER", NT_STATUS_FT_MISSING_MEMBER}, |
| 19014 | + {"NT_STATUS_ILL_FORMED_SERVICE_ENTRY", |
| 19015 | + NT_STATUS_ILL_FORMED_SERVICE_ENTRY}, |
| 19016 | + {"NT_STATUS_ILLEGAL_CHARACTER", NT_STATUS_ILLEGAL_CHARACTER}, |
| 19017 | + {"NT_STATUS_UNMAPPABLE_CHARACTER", NT_STATUS_UNMAPPABLE_CHARACTER}, |
| 19018 | + {"NT_STATUS_UNDEFINED_CHARACTER", NT_STATUS_UNDEFINED_CHARACTER}, |
| 19019 | + {"NT_STATUS_FLOPPY_VOLUME", NT_STATUS_FLOPPY_VOLUME}, |
| 19020 | + {"NT_STATUS_FLOPPY_ID_MARK_NOT_FOUND", |
| 19021 | + NT_STATUS_FLOPPY_ID_MARK_NOT_FOUND}, |
| 19022 | + {"NT_STATUS_FLOPPY_WRONG_CYLINDER", |
| 19023 | + NT_STATUS_FLOPPY_WRONG_CYLINDER}, |
| 19024 | + {"NT_STATUS_FLOPPY_UNKNOWN_ERROR", NT_STATUS_FLOPPY_UNKNOWN_ERROR}, |
| 19025 | + {"NT_STATUS_FLOPPY_BAD_REGISTERS", NT_STATUS_FLOPPY_BAD_REGISTERS}, |
| 19026 | + {"NT_STATUS_DISK_RECALIBRATE_FAILED", |
| 19027 | + NT_STATUS_DISK_RECALIBRATE_FAILED}, |
| 19028 | + {"NT_STATUS_DISK_OPERATION_FAILED", |
| 19029 | + NT_STATUS_DISK_OPERATION_FAILED}, |
| 19030 | + {"NT_STATUS_DISK_RESET_FAILED", NT_STATUS_DISK_RESET_FAILED}, |
| 19031 | + {"NT_STATUS_SHARED_IRQ_BUSY", NT_STATUS_SHARED_IRQ_BUSY}, |
| 19032 | + {"NT_STATUS_FT_ORPHANING", NT_STATUS_FT_ORPHANING}, |
| 19033 | + {"NT_STATUS_PARTITION_FAILURE", NT_STATUS_PARTITION_FAILURE}, |
| 19034 | + {"NT_STATUS_INVALID_BLOCK_LENGTH", NT_STATUS_INVALID_BLOCK_LENGTH}, |
| 19035 | + {"NT_STATUS_DEVICE_NOT_PARTITIONED", |
| 19036 | + NT_STATUS_DEVICE_NOT_PARTITIONED}, |
| 19037 | + {"NT_STATUS_UNABLE_TO_LOCK_MEDIA", NT_STATUS_UNABLE_TO_LOCK_MEDIA}, |
| 19038 | + {"NT_STATUS_UNABLE_TO_UNLOAD_MEDIA", |
| 19039 | + NT_STATUS_UNABLE_TO_UNLOAD_MEDIA}, |
| 19040 | + {"NT_STATUS_EOM_OVERFLOW", NT_STATUS_EOM_OVERFLOW}, |
| 19041 | + {"NT_STATUS_NO_MEDIA", NT_STATUS_NO_MEDIA}, |
| 19042 | + {"NT_STATUS_NO_SUCH_MEMBER", NT_STATUS_NO_SUCH_MEMBER}, |
| 19043 | + {"NT_STATUS_INVALID_MEMBER", NT_STATUS_INVALID_MEMBER}, |
| 19044 | + {"NT_STATUS_KEY_DELETED", NT_STATUS_KEY_DELETED}, |
| 19045 | + {"NT_STATUS_NO_LOG_SPACE", NT_STATUS_NO_LOG_SPACE}, |
| 19046 | + {"NT_STATUS_TOO_MANY_SIDS", NT_STATUS_TOO_MANY_SIDS}, |
| 19047 | + {"NT_STATUS_LM_CROSS_ENCRYPTION_REQUIRED", |
| 19048 | + NT_STATUS_LM_CROSS_ENCRYPTION_REQUIRED}, |
| 19049 | + {"NT_STATUS_KEY_HAS_CHILDREN", NT_STATUS_KEY_HAS_CHILDREN}, |
| 19050 | + {"NT_STATUS_CHILD_MUST_BE_VOLATILE", |
| 19051 | + NT_STATUS_CHILD_MUST_BE_VOLATILE}, |
| 19052 | + {"NT_STATUS_DEVICE_CONFIGURATION_ERROR", |
| 19053 | + NT_STATUS_DEVICE_CONFIGURATION_ERROR}, |
| 19054 | + {"NT_STATUS_DRIVER_INTERNAL_ERROR", |
| 19055 | + NT_STATUS_DRIVER_INTERNAL_ERROR}, |
| 19056 | + {"NT_STATUS_INVALID_DEVICE_STATE", NT_STATUS_INVALID_DEVICE_STATE}, |
| 19057 | + {"NT_STATUS_IO_DEVICE_ERROR", NT_STATUS_IO_DEVICE_ERROR}, |
| 19058 | + {"NT_STATUS_DEVICE_PROTOCOL_ERROR", |
| 19059 | + NT_STATUS_DEVICE_PROTOCOL_ERROR}, |
| 19060 | + {"NT_STATUS_BACKUP_CONTROLLER", NT_STATUS_BACKUP_CONTROLLER}, |
| 19061 | + {"NT_STATUS_LOG_FILE_FULL", NT_STATUS_LOG_FILE_FULL}, |
| 19062 | + {"NT_STATUS_TOO_LATE", NT_STATUS_TOO_LATE}, |
| 19063 | + {"NT_STATUS_NO_TRUST_LSA_SECRET", NT_STATUS_NO_TRUST_LSA_SECRET}, |
| 19064 | + {"NT_STATUS_NO_TRUST_SAM_ACCOUNT", NT_STATUS_NO_TRUST_SAM_ACCOUNT}, |
| 19065 | + {"NT_STATUS_TRUSTED_DOMAIN_FAILURE", |
| 19066 | + NT_STATUS_TRUSTED_DOMAIN_FAILURE}, |
| 19067 | + {"NT_STATUS_TRUSTED_RELATIONSHIP_FAILURE", |
| 19068 | + NT_STATUS_TRUSTED_RELATIONSHIP_FAILURE}, |
| 19069 | + {"NT_STATUS_EVENTLOG_FILE_CORRUPT", |
| 19070 | + NT_STATUS_EVENTLOG_FILE_CORRUPT}, |
| 19071 | + {"NT_STATUS_EVENTLOG_CANT_START", NT_STATUS_EVENTLOG_CANT_START}, |
| 19072 | + {"NT_STATUS_TRUST_FAILURE", NT_STATUS_TRUST_FAILURE}, |
| 19073 | + {"NT_STATUS_MUTANT_LIMIT_EXCEEDED", |
| 19074 | + NT_STATUS_MUTANT_LIMIT_EXCEEDED}, |
| 19075 | + {"NT_STATUS_NETLOGON_NOT_STARTED", NT_STATUS_NETLOGON_NOT_STARTED}, |
| 19076 | + {"NT_STATUS_ACCOUNT_EXPIRED", NT_STATUS_ACCOUNT_EXPIRED}, |
| 19077 | + {"NT_STATUS_POSSIBLE_DEADLOCK", NT_STATUS_POSSIBLE_DEADLOCK}, |
| 19078 | + {"NT_STATUS_NETWORK_CREDENTIAL_CONFLICT", |
| 19079 | + NT_STATUS_NETWORK_CREDENTIAL_CONFLICT}, |
| 19080 | + {"NT_STATUS_REMOTE_SESSION_LIMIT", NT_STATUS_REMOTE_SESSION_LIMIT}, |
| 19081 | + {"NT_STATUS_EVENTLOG_FILE_CHANGED", |
| 19082 | + NT_STATUS_EVENTLOG_FILE_CHANGED}, |
| 19083 | + {"NT_STATUS_NOLOGON_INTERDOMAIN_TRUST_ACCOUNT", |
| 19084 | + NT_STATUS_NOLOGON_INTERDOMAIN_TRUST_ACCOUNT}, |
| 19085 | + {"NT_STATUS_NOLOGON_WORKSTATION_TRUST_ACCOUNT", |
| 19086 | + NT_STATUS_NOLOGON_WORKSTATION_TRUST_ACCOUNT}, |
| 19087 | + {"NT_STATUS_NOLOGON_SERVER_TRUST_ACCOUNT", |
| 19088 | + NT_STATUS_NOLOGON_SERVER_TRUST_ACCOUNT}, |
| 19089 | + {"NT_STATUS_DOMAIN_TRUST_INCONSISTENT", |
| 19090 | + NT_STATUS_DOMAIN_TRUST_INCONSISTENT}, |
| 19091 | + {"NT_STATUS_FS_DRIVER_REQUIRED", NT_STATUS_FS_DRIVER_REQUIRED}, |
| 19092 | + {"NT_STATUS_NO_USER_SESSION_KEY", NT_STATUS_NO_USER_SESSION_KEY}, |
| 19093 | + {"NT_STATUS_USER_SESSION_DELETED", NT_STATUS_USER_SESSION_DELETED}, |
| 19094 | + {"NT_STATUS_RESOURCE_LANG_NOT_FOUND", |
| 19095 | + NT_STATUS_RESOURCE_LANG_NOT_FOUND}, |
| 19096 | + {"NT_STATUS_INSUFF_SERVER_RESOURCES", |
| 19097 | + NT_STATUS_INSUFF_SERVER_RESOURCES}, |
| 19098 | + {"NT_STATUS_INVALID_BUFFER_SIZE", NT_STATUS_INVALID_BUFFER_SIZE}, |
| 19099 | + {"NT_STATUS_INVALID_ADDRESS_COMPONENT", |
| 19100 | + NT_STATUS_INVALID_ADDRESS_COMPONENT}, |
| 19101 | + {"NT_STATUS_INVALID_ADDRESS_WILDCARD", |
| 19102 | + NT_STATUS_INVALID_ADDRESS_WILDCARD}, |
| 19103 | + {"NT_STATUS_TOO_MANY_ADDRESSES", NT_STATUS_TOO_MANY_ADDRESSES}, |
| 19104 | + {"NT_STATUS_ADDRESS_ALREADY_EXISTS", |
| 19105 | + NT_STATUS_ADDRESS_ALREADY_EXISTS}, |
| 19106 | + {"NT_STATUS_ADDRESS_CLOSED", NT_STATUS_ADDRESS_CLOSED}, |
| 19107 | + {"NT_STATUS_CONNECTION_DISCONNECTED", |
| 19108 | + NT_STATUS_CONNECTION_DISCONNECTED}, |
| 19109 | + {"NT_STATUS_CONNECTION_RESET", NT_STATUS_CONNECTION_RESET}, |
| 19110 | + {"NT_STATUS_TOO_MANY_NODES", NT_STATUS_TOO_MANY_NODES}, |
| 19111 | + {"NT_STATUS_TRANSACTION_ABORTED", NT_STATUS_TRANSACTION_ABORTED}, |
| 19112 | + {"NT_STATUS_TRANSACTION_TIMED_OUT", |
| 19113 | + NT_STATUS_TRANSACTION_TIMED_OUT}, |
| 19114 | + {"NT_STATUS_TRANSACTION_NO_RELEASE", |
| 19115 | + NT_STATUS_TRANSACTION_NO_RELEASE}, |
| 19116 | + {"NT_STATUS_TRANSACTION_NO_MATCH", NT_STATUS_TRANSACTION_NO_MATCH}, |
| 19117 | + {"NT_STATUS_TRANSACTION_RESPONDED", |
| 19118 | + NT_STATUS_TRANSACTION_RESPONDED}, |
| 19119 | + {"NT_STATUS_TRANSACTION_INVALID_ID", |
| 19120 | + NT_STATUS_TRANSACTION_INVALID_ID}, |
| 19121 | + {"NT_STATUS_TRANSACTION_INVALID_TYPE", |
| 19122 | + NT_STATUS_TRANSACTION_INVALID_TYPE}, |
| 19123 | + {"NT_STATUS_NOT_SERVER_SESSION", NT_STATUS_NOT_SERVER_SESSION}, |
| 19124 | + {"NT_STATUS_NOT_CLIENT_SESSION", NT_STATUS_NOT_CLIENT_SESSION}, |
| 19125 | + {"NT_STATUS_CANNOT_LOAD_REGISTRY_FILE", |
| 19126 | + NT_STATUS_CANNOT_LOAD_REGISTRY_FILE}, |
| 19127 | + {"NT_STATUS_DEBUG_ATTACH_FAILED", NT_STATUS_DEBUG_ATTACH_FAILED}, |
| 19128 | + {"NT_STATUS_SYSTEM_PROCESS_TERMINATED", |
| 19129 | + NT_STATUS_SYSTEM_PROCESS_TERMINATED}, |
| 19130 | + {"NT_STATUS_DATA_NOT_ACCEPTED", NT_STATUS_DATA_NOT_ACCEPTED}, |
| 19131 | + {"NT_STATUS_NO_BROWSER_SERVERS_FOUND", |
| 19132 | + NT_STATUS_NO_BROWSER_SERVERS_FOUND}, |
| 19133 | + {"NT_STATUS_VDM_HARD_ERROR", NT_STATUS_VDM_HARD_ERROR}, |
| 19134 | + {"NT_STATUS_DRIVER_CANCEL_TIMEOUT", |
| 19135 | + NT_STATUS_DRIVER_CANCEL_TIMEOUT}, |
| 19136 | + {"NT_STATUS_REPLY_MESSAGE_MISMATCH", |
| 19137 | + NT_STATUS_REPLY_MESSAGE_MISMATCH}, |
| 19138 | + {"NT_STATUS_MAPPED_ALIGNMENT", NT_STATUS_MAPPED_ALIGNMENT}, |
| 19139 | + {"NT_STATUS_IMAGE_CHECKSUM_MISMATCH", |
| 19140 | + NT_STATUS_IMAGE_CHECKSUM_MISMATCH}, |
| 19141 | + {"NT_STATUS_LOST_WRITEBEHIND_DATA", |
| 19142 | + NT_STATUS_LOST_WRITEBEHIND_DATA}, |
| 19143 | + {"NT_STATUS_CLIENT_SERVER_PARAMETERS_INVALID", |
| 19144 | + NT_STATUS_CLIENT_SERVER_PARAMETERS_INVALID}, |
| 19145 | + {"NT_STATUS_PASSWORD_MUST_CHANGE", NT_STATUS_PASSWORD_MUST_CHANGE}, |
| 19146 | + {"NT_STATUS_NOT_FOUND", NT_STATUS_NOT_FOUND}, |
| 19147 | + {"NT_STATUS_NOT_TINY_STREAM", NT_STATUS_NOT_TINY_STREAM}, |
| 19148 | + {"NT_STATUS_RECOVERY_FAILURE", NT_STATUS_RECOVERY_FAILURE}, |
| 19149 | + {"NT_STATUS_STACK_OVERFLOW_READ", NT_STATUS_STACK_OVERFLOW_READ}, |
| 19150 | + {"NT_STATUS_FAIL_CHECK", NT_STATUS_FAIL_CHECK}, |
| 19151 | + {"NT_STATUS_DUPLICATE_OBJECTID", NT_STATUS_DUPLICATE_OBJECTID}, |
| 19152 | + {"NT_STATUS_OBJECTID_EXISTS", NT_STATUS_OBJECTID_EXISTS}, |
| 19153 | + {"NT_STATUS_CONVERT_TO_LARGE", NT_STATUS_CONVERT_TO_LARGE}, |
| 19154 | + {"NT_STATUS_RETRY", NT_STATUS_RETRY}, |
| 19155 | + {"NT_STATUS_FOUND_OUT_OF_SCOPE", NT_STATUS_FOUND_OUT_OF_SCOPE}, |
| 19156 | + {"NT_STATUS_ALLOCATE_BUCKET", NT_STATUS_ALLOCATE_BUCKET}, |
| 19157 | + {"NT_STATUS_PROPSET_NOT_FOUND", NT_STATUS_PROPSET_NOT_FOUND}, |
| 19158 | + {"NT_STATUS_MARSHALL_OVERFLOW", NT_STATUS_MARSHALL_OVERFLOW}, |
| 19159 | + {"NT_STATUS_INVALID_VARIANT", NT_STATUS_INVALID_VARIANT}, |
| 19160 | + {"NT_STATUS_DOMAIN_CONTROLLER_NOT_FOUND", |
| 19161 | + NT_STATUS_DOMAIN_CONTROLLER_NOT_FOUND}, |
| 19162 | + {"NT_STATUS_ACCOUNT_LOCKED_OUT", NT_STATUS_ACCOUNT_LOCKED_OUT}, |
| 19163 | + {"NT_STATUS_HANDLE_NOT_CLOSABLE", NT_STATUS_HANDLE_NOT_CLOSABLE}, |
| 19164 | + {"NT_STATUS_CONNECTION_REFUSED", NT_STATUS_CONNECTION_REFUSED}, |
| 19165 | + {"NT_STATUS_GRACEFUL_DISCONNECT", NT_STATUS_GRACEFUL_DISCONNECT}, |
| 19166 | + {"NT_STATUS_ADDRESS_ALREADY_ASSOCIATED", |
| 19167 | + NT_STATUS_ADDRESS_ALREADY_ASSOCIATED}, |
| 19168 | + {"NT_STATUS_ADDRESS_NOT_ASSOCIATED", |
| 19169 | + NT_STATUS_ADDRESS_NOT_ASSOCIATED}, |
| 19170 | + {"NT_STATUS_CONNECTION_INVALID", NT_STATUS_CONNECTION_INVALID}, |
| 19171 | + {"NT_STATUS_CONNECTION_ACTIVE", NT_STATUS_CONNECTION_ACTIVE}, |
| 19172 | + {"NT_STATUS_NETWORK_UNREACHABLE", NT_STATUS_NETWORK_UNREACHABLE}, |
| 19173 | + {"NT_STATUS_HOST_UNREACHABLE", NT_STATUS_HOST_UNREACHABLE}, |
| 19174 | + {"NT_STATUS_PROTOCOL_UNREACHABLE", NT_STATUS_PROTOCOL_UNREACHABLE}, |
| 19175 | + {"NT_STATUS_PORT_UNREACHABLE", NT_STATUS_PORT_UNREACHABLE}, |
| 19176 | + {"NT_STATUS_REQUEST_ABORTED", NT_STATUS_REQUEST_ABORTED}, |
| 19177 | + {"NT_STATUS_CONNECTION_ABORTED", NT_STATUS_CONNECTION_ABORTED}, |
| 19178 | + {"NT_STATUS_BAD_COMPRESSION_BUFFER", |
| 19179 | + NT_STATUS_BAD_COMPRESSION_BUFFER}, |
| 19180 | + {"NT_STATUS_USER_MAPPED_FILE", NT_STATUS_USER_MAPPED_FILE}, |
| 19181 | + {"NT_STATUS_AUDIT_FAILED", NT_STATUS_AUDIT_FAILED}, |
| 19182 | + {"NT_STATUS_TIMER_RESOLUTION_NOT_SET", |
| 19183 | + NT_STATUS_TIMER_RESOLUTION_NOT_SET}, |
| 19184 | + {"NT_STATUS_CONNECTION_COUNT_LIMIT", |
| 19185 | + NT_STATUS_CONNECTION_COUNT_LIMIT}, |
| 19186 | + {"NT_STATUS_LOGIN_TIME_RESTRICTION", |
| 19187 | + NT_STATUS_LOGIN_TIME_RESTRICTION}, |
| 19188 | + {"NT_STATUS_LOGIN_WKSTA_RESTRICTION", |
| 19189 | + NT_STATUS_LOGIN_WKSTA_RESTRICTION}, |
| 19190 | + {"NT_STATUS_IMAGE_MP_UP_MISMATCH", NT_STATUS_IMAGE_MP_UP_MISMATCH}, |
| 19191 | + {"NT_STATUS_INSUFFICIENT_LOGON_INFO", |
| 19192 | + NT_STATUS_INSUFFICIENT_LOGON_INFO}, |
| 19193 | + {"NT_STATUS_BAD_DLL_ENTRYPOINT", NT_STATUS_BAD_DLL_ENTRYPOINT}, |
| 19194 | + {"NT_STATUS_BAD_SERVICE_ENTRYPOINT", |
| 19195 | + NT_STATUS_BAD_SERVICE_ENTRYPOINT}, |
| 19196 | + {"NT_STATUS_LPC_REPLY_LOST", NT_STATUS_LPC_REPLY_LOST}, |
| 19197 | + {"NT_STATUS_IP_ADDRESS_CONFLICT1", NT_STATUS_IP_ADDRESS_CONFLICT1}, |
| 19198 | + {"NT_STATUS_IP_ADDRESS_CONFLICT2", NT_STATUS_IP_ADDRESS_CONFLICT2}, |
| 19199 | + {"NT_STATUS_REGISTRY_QUOTA_LIMIT", NT_STATUS_REGISTRY_QUOTA_LIMIT}, |
| 19200 | + {"NT_STATUS_PATH_NOT_COVERED", NT_STATUS_PATH_NOT_COVERED}, |
| 19201 | + {"NT_STATUS_NO_CALLBACK_ACTIVE", NT_STATUS_NO_CALLBACK_ACTIVE}, |
| 19202 | + {"NT_STATUS_LICENSE_QUOTA_EXCEEDED", |
| 19203 | + NT_STATUS_LICENSE_QUOTA_EXCEEDED}, |
| 19204 | + {"NT_STATUS_PWD_TOO_SHORT", NT_STATUS_PWD_TOO_SHORT}, |
| 19205 | + {"NT_STATUS_PWD_TOO_RECENT", NT_STATUS_PWD_TOO_RECENT}, |
| 19206 | + {"NT_STATUS_PWD_HISTORY_CONFLICT", NT_STATUS_PWD_HISTORY_CONFLICT}, |
| 19207 | + {"NT_STATUS_PLUGPLAY_NO_DEVICE", NT_STATUS_PLUGPLAY_NO_DEVICE}, |
| 19208 | + {"NT_STATUS_UNSUPPORTED_COMPRESSION", |
| 19209 | + NT_STATUS_UNSUPPORTED_COMPRESSION}, |
| 19210 | + {"NT_STATUS_INVALID_HW_PROFILE", NT_STATUS_INVALID_HW_PROFILE}, |
| 19211 | + {"NT_STATUS_INVALID_PLUGPLAY_DEVICE_PATH", |
| 19212 | + NT_STATUS_INVALID_PLUGPLAY_DEVICE_PATH}, |
| 19213 | + {"NT_STATUS_DRIVER_ORDINAL_NOT_FOUND", |
| 19214 | + NT_STATUS_DRIVER_ORDINAL_NOT_FOUND}, |
| 19215 | + {"NT_STATUS_DRIVER_ENTRYPOINT_NOT_FOUND", |
| 19216 | + NT_STATUS_DRIVER_ENTRYPOINT_NOT_FOUND}, |
| 19217 | + {"NT_STATUS_RESOURCE_NOT_OWNED", NT_STATUS_RESOURCE_NOT_OWNED}, |
| 19218 | + {"NT_STATUS_TOO_MANY_LINKS", NT_STATUS_TOO_MANY_LINKS}, |
| 19219 | + {"NT_STATUS_QUOTA_LIST_INCONSISTENT", |
| 19220 | + NT_STATUS_QUOTA_LIST_INCONSISTENT}, |
| 19221 | + {"NT_STATUS_FILE_IS_OFFLINE", NT_STATUS_FILE_IS_OFFLINE}, |
| 19222 | + {"NT_STATUS_NO_MORE_ENTRIES", NT_STATUS_NO_MORE_ENTRIES}, |
| 19223 | + {"STATUS_MORE_ENTRIES", STATUS_MORE_ENTRIES}, |
| 19224 | + {"STATUS_SOME_UNMAPPED", STATUS_SOME_UNMAPPED}, |
| 19225 | + {NULL, 0} |
| 19226 | +}; |
| 19227 | --- /dev/null |
| 19228 | +++ b/fs/cifs/nterr.h |
| 19229 | @@ -0,0 +1,556 @@ |
| 19230 | +/* |
| 19231 | + Unix SMB/Netbios implementation. |
| 19232 | + Version 1.9. |
| 19233 | + NT error code constants |
| 19234 | + Copyright (C) Andrew Tridgell 1992-2000 |
| 19235 | + Copyright (C) John H Terpstra 1996-2000 |
| 19236 | + Copyright (C) Luke Kenneth Casson Leighton 1996-2000 |
| 19237 | + Copyright (C) Paul Ashton 1998-2000 |
| 19238 | + |
| 19239 | + This program is free software; you can redistribute it and/or modify |
| 19240 | + it under the terms of the GNU General Public License as published by |
| 19241 | + the Free Software Foundation; either version 2 of the License, or |
| 19242 | + (at your option) any later version. |
| 19243 | + |
| 19244 | + This program is distributed in the hope that it will be useful, |
| 19245 | + but WITHOUT ANY WARRANTY; without even the implied warranty of |
| 19246 | + MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the |
| 19247 | + GNU General Public License for more details. |
| 19248 | + |
| 19249 | + You should have received a copy of the GNU General Public License |
| 19250 | + along with this program; if not, write to the Free Software |
| 19251 | + Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA. |
| 19252 | +*/ |
| 19253 | + |
| 19254 | + |
| 19255 | + |
| 19256 | +#ifndef _NTERR_H |
| 19257 | +#define _NTERR_H |
| 19258 | + |
| 19259 | +struct nt_err_code_struct { |
| 19260 | + char *nt_errstr; |
| 19261 | + __u32 nt_errcode; |
| 19262 | +}; |
| 19263 | + |
| 19264 | +extern const struct nt_err_code_struct nt_errs[]; |
| 19265 | + |
| 19266 | +/* Win32 Status codes. */ |
| 19267 | + |
| 19268 | +#define STATUS_BUFFER_OVERFLOW 0x80000005 |
| 19269 | +#define STATUS_MORE_ENTRIES 0x0105 |
| 19270 | +#define ERROR_INVALID_PARAMETER 0x0057 |
| 19271 | +#define ERROR_INSUFFICIENT_BUFFER 0x007a |
| 19272 | +#define STATUS_1804 0x070c |
| 19273 | +#define STATUS_NOTIFY_ENUM_DIR 0x010c |
| 19274 | + |
| 19275 | +/* Win32 Error codes extracted using a loop in smbclient then printing a |
| 19276 | + netmon sniff to a file. */ |
| 19277 | + |
| 19278 | +#define NT_STATUS_OK 0x0000 |
| 19279 | +#define STATUS_SOME_UNMAPPED 0x0107 |
| 19280 | +#define STATUS_BUFFER_OVERFLOW 0x80000005 |
| 19281 | +#define NT_STATUS_NO_MORE_ENTRIES 0x8000001a |
| 19282 | +#define NT_STATUS_UNSUCCESSFUL 0xC0000000 | 0x0001 |
| 19283 | +#define NT_STATUS_NOT_IMPLEMENTED 0xC0000000 | 0x0002 |
| 19284 | +#define NT_STATUS_INVALID_INFO_CLASS 0xC0000000 | 0x0003 |
| 19285 | +#define NT_STATUS_INFO_LENGTH_MISMATCH 0xC0000000 | 0x0004 |
| 19286 | +#define NT_STATUS_ACCESS_VIOLATION 0xC0000000 | 0x0005 |
| 19287 | +#define NT_STATUS_IN_PAGE_ERROR 0xC0000000 | 0x0006 |
| 19288 | +#define NT_STATUS_PAGEFILE_QUOTA 0xC0000000 | 0x0007 |
| 19289 | +#define NT_STATUS_INVALID_HANDLE 0xC0000000 | 0x0008 |
| 19290 | +#define NT_STATUS_BAD_INITIAL_STACK 0xC0000000 | 0x0009 |
| 19291 | +#define NT_STATUS_BAD_INITIAL_PC 0xC0000000 | 0x000a |
| 19292 | +#define NT_STATUS_INVALID_CID 0xC0000000 | 0x000b |
| 19293 | +#define NT_STATUS_TIMER_NOT_CANCELED 0xC0000000 | 0x000c |
| 19294 | +#define NT_STATUS_INVALID_PARAMETER 0xC0000000 | 0x000d |
| 19295 | +#define NT_STATUS_NO_SUCH_DEVICE 0xC0000000 | 0x000e |
| 19296 | +#define NT_STATUS_NO_SUCH_FILE 0xC0000000 | 0x000f |
| 19297 | +#define NT_STATUS_INVALID_DEVICE_REQUEST 0xC0000000 | 0x0010 |
| 19298 | +#define NT_STATUS_END_OF_FILE 0xC0000000 | 0x0011 |
| 19299 | +#define NT_STATUS_WRONG_VOLUME 0xC0000000 | 0x0012 |
| 19300 | +#define NT_STATUS_NO_MEDIA_IN_DEVICE 0xC0000000 | 0x0013 |
| 19301 | +#define NT_STATUS_UNRECOGNIZED_MEDIA 0xC0000000 | 0x0014 |
| 19302 | +#define NT_STATUS_NONEXISTENT_SECTOR 0xC0000000 | 0x0015 |
| 19303 | +#define NT_STATUS_MORE_PROCESSING_REQUIRED 0xC0000000 | 0x0016 |
| 19304 | +#define NT_STATUS_NO_MEMORY 0xC0000000 | 0x0017 |
| 19305 | +#define NT_STATUS_CONFLICTING_ADDRESSES 0xC0000000 | 0x0018 |
| 19306 | +#define NT_STATUS_NOT_MAPPED_VIEW 0xC0000000 | 0x0019 |
| 19307 | +#define NT_STATUS_UNABLE_TO_FREE_VM 0x80000000 | 0x001a |
| 19308 | +#define NT_STATUS_UNABLE_TO_DELETE_SECTION 0xC0000000 | 0x001b |
| 19309 | +#define NT_STATUS_INVALID_SYSTEM_SERVICE 0xC0000000 | 0x001c |
| 19310 | +#define NT_STATUS_ILLEGAL_INSTRUCTION 0xC0000000 | 0x001d |
| 19311 | +#define NT_STATUS_INVALID_LOCK_SEQUENCE 0xC0000000 | 0x001e |
| 19312 | +#define NT_STATUS_INVALID_VIEW_SIZE 0xC0000000 | 0x001f |
| 19313 | +#define NT_STATUS_INVALID_FILE_FOR_SECTION 0xC0000000 | 0x0020 |
| 19314 | +#define NT_STATUS_ALREADY_COMMITTED 0xC0000000 | 0x0021 |
| 19315 | +#define NT_STATUS_ACCESS_DENIED 0xC0000000 | 0x0022 |
| 19316 | +#define NT_STATUS_BUFFER_TOO_SMALL 0xC0000000 | 0x0023 |
| 19317 | +#define NT_STATUS_OBJECT_TYPE_MISMATCH 0xC0000000 | 0x0024 |
| 19318 | +#define NT_STATUS_NONCONTINUABLE_EXCEPTION 0xC0000000 | 0x0025 |
| 19319 | +#define NT_STATUS_INVALID_DISPOSITION 0xC0000000 | 0x0026 |
| 19320 | +#define NT_STATUS_UNWIND 0xC0000000 | 0x0027 |
| 19321 | +#define NT_STATUS_BAD_STACK 0xC0000000 | 0x0028 |
| 19322 | +#define NT_STATUS_INVALID_UNWIND_TARGET 0xC0000000 | 0x0029 |
| 19323 | +#define NT_STATUS_NOT_LOCKED 0xC0000000 | 0x002a |
| 19324 | +#define NT_STATUS_PARITY_ERROR 0xC0000000 | 0x002b |
| 19325 | +#define NT_STATUS_UNABLE_TO_DECOMMIT_VM 0xC0000000 | 0x002c |
| 19326 | +#define NT_STATUS_NOT_COMMITTED 0xC0000000 | 0x002d |
| 19327 | +#define NT_STATUS_INVALID_PORT_ATTRIBUTES 0xC0000000 | 0x002e |
| 19328 | +#define NT_STATUS_PORT_MESSAGE_TOO_LONG 0xC0000000 | 0x002f |
| 19329 | +#define NT_STATUS_INVALID_PARAMETER_MIX 0xC0000000 | 0x0030 |
| 19330 | +#define NT_STATUS_INVALID_QUOTA_LOWER 0xC0000000 | 0x0031 |
| 19331 | +#define NT_STATUS_DISK_CORRUPT_ERROR 0xC0000000 | 0x0032 |
| 19332 | +#define NT_STATUS_OBJECT_NAME_INVALID 0xC0000000 | 0x0033 |
| 19333 | +#define NT_STATUS_OBJECT_NAME_NOT_FOUND 0xC0000000 | 0x0034 |
| 19334 | +#define NT_STATUS_OBJECT_NAME_COLLISION 0xC0000000 | 0x0035 |
| 19335 | +#define NT_STATUS_HANDLE_NOT_WAITABLE 0xC0000000 | 0x0036 |
| 19336 | +#define NT_STATUS_PORT_DISCONNECTED 0xC0000000 | 0x0037 |
| 19337 | +#define NT_STATUS_DEVICE_ALREADY_ATTACHED 0xC0000000 | 0x0038 |
| 19338 | +#define NT_STATUS_OBJECT_PATH_INVALID 0xC0000000 | 0x0039 |
| 19339 | +#define NT_STATUS_OBJECT_PATH_NOT_FOUND 0xC0000000 | 0x003a |
| 19340 | +#define NT_STATUS_OBJECT_PATH_SYNTAX_BAD 0xC0000000 | 0x003b |
| 19341 | +#define NT_STATUS_DATA_OVERRUN 0xC0000000 | 0x003c |
| 19342 | +#define NT_STATUS_DATA_LATE_ERROR 0xC0000000 | 0x003d |
| 19343 | +#define NT_STATUS_DATA_ERROR 0xC0000000 | 0x003e |
| 19344 | +#define NT_STATUS_CRC_ERROR 0xC0000000 | 0x003f |
| 19345 | +#define NT_STATUS_SECTION_TOO_BIG 0xC0000000 | 0x0040 |
| 19346 | +#define NT_STATUS_PORT_CONNECTION_REFUSED 0xC0000000 | 0x0041 |
| 19347 | +#define NT_STATUS_INVALID_PORT_HANDLE 0xC0000000 | 0x0042 |
| 19348 | +#define NT_STATUS_SHARING_VIOLATION 0xC0000000 | 0x0043 |
| 19349 | +#define NT_STATUS_QUOTA_EXCEEDED 0xC0000000 | 0x0044 |
| 19350 | +#define NT_STATUS_INVALID_PAGE_PROTECTION 0xC0000000 | 0x0045 |
| 19351 | +#define NT_STATUS_MUTANT_NOT_OWNED 0xC0000000 | 0x0046 |
| 19352 | +#define NT_STATUS_SEMAPHORE_LIMIT_EXCEEDED 0xC0000000 | 0x0047 |
| 19353 | +#define NT_STATUS_PORT_ALREADY_SET 0xC0000000 | 0x0048 |
| 19354 | +#define NT_STATUS_SECTION_NOT_IMAGE 0xC0000000 | 0x0049 |
| 19355 | +#define NT_STATUS_SUSPEND_COUNT_EXCEEDED 0xC0000000 | 0x004a |
| 19356 | +#define NT_STATUS_THREAD_IS_TERMINATING 0xC0000000 | 0x004b |
| 19357 | +#define NT_STATUS_BAD_WORKING_SET_LIMIT 0xC0000000 | 0x004c |
| 19358 | +#define NT_STATUS_INCOMPATIBLE_FILE_MAP 0xC0000000 | 0x004d |
| 19359 | +#define NT_STATUS_SECTION_PROTECTION 0xC0000000 | 0x004e |
| 19360 | +#define NT_STATUS_EAS_NOT_SUPPORTED 0xC0000000 | 0x004f |
| 19361 | +#define NT_STATUS_EA_TOO_LARGE 0xC0000000 | 0x0050 |
| 19362 | +#define NT_STATUS_NONEXISTENT_EA_ENTRY 0xC0000000 | 0x0051 |
| 19363 | +#define NT_STATUS_NO_EAS_ON_FILE 0xC0000000 | 0x0052 |
| 19364 | +#define NT_STATUS_EA_CORRUPT_ERROR 0xC0000000 | 0x0053 |
| 19365 | +#define NT_STATUS_FILE_LOCK_CONFLICT 0xC0000000 | 0x0054 |
| 19366 | +#define NT_STATUS_LOCK_NOT_GRANTED 0xC0000000 | 0x0055 |
| 19367 | +#define NT_STATUS_DELETE_PENDING 0xC0000000 | 0x0056 |
| 19368 | +#define NT_STATUS_CTL_FILE_NOT_SUPPORTED 0xC0000000 | 0x0057 |
| 19369 | +#define NT_STATUS_UNKNOWN_REVISION 0xC0000000 | 0x0058 |
| 19370 | +#define NT_STATUS_REVISION_MISMATCH 0xC0000000 | 0x0059 |
| 19371 | +#define NT_STATUS_INVALID_OWNER 0xC0000000 | 0x005a |
| 19372 | +#define NT_STATUS_INVALID_PRIMARY_GROUP 0xC0000000 | 0x005b |
| 19373 | +#define NT_STATUS_NO_IMPERSONATION_TOKEN 0xC0000000 | 0x005c |
| 19374 | +#define NT_STATUS_CANT_DISABLE_MANDATORY 0xC0000000 | 0x005d |
| 19375 | +#define NT_STATUS_NO_LOGON_SERVERS 0xC0000000 | 0x005e |
| 19376 | +#define NT_STATUS_NO_SUCH_LOGON_SESSION 0xC0000000 | 0x005f |
| 19377 | +#define NT_STATUS_NO_SUCH_PRIVILEGE 0xC0000000 | 0x0060 |
| 19378 | +#define NT_STATUS_PRIVILEGE_NOT_HELD 0xC0000000 | 0x0061 |
| 19379 | +#define NT_STATUS_INVALID_ACCOUNT_NAME 0xC0000000 | 0x0062 |
| 19380 | +#define NT_STATUS_USER_EXISTS 0xC0000000 | 0x0063 |
| 19381 | +#define NT_STATUS_NO_SUCH_USER 0xC0000000 | 0x0064 |
| 19382 | +#define NT_STATUS_GROUP_EXISTS 0xC0000000 | 0x0065 |
| 19383 | +#define NT_STATUS_NO_SUCH_GROUP 0xC0000000 | 0x0066 |
| 19384 | +#define NT_STATUS_MEMBER_IN_GROUP 0xC0000000 | 0x0067 |
| 19385 | +#define NT_STATUS_MEMBER_NOT_IN_GROUP 0xC0000000 | 0x0068 |
| 19386 | +#define NT_STATUS_LAST_ADMIN 0xC0000000 | 0x0069 |
| 19387 | +#define NT_STATUS_WRONG_PASSWORD 0xC0000000 | 0x006a |
| 19388 | +#define NT_STATUS_ILL_FORMED_PASSWORD 0xC0000000 | 0x006b |
| 19389 | +#define NT_STATUS_PASSWORD_RESTRICTION 0xC0000000 | 0x006c |
| 19390 | +#define NT_STATUS_LOGON_FAILURE 0xC0000000 | 0x006d |
| 19391 | +#define NT_STATUS_ACCOUNT_RESTRICTION 0xC0000000 | 0x006e |
| 19392 | +#define NT_STATUS_INVALID_LOGON_HOURS 0xC0000000 | 0x006f |
| 19393 | +#define NT_STATUS_INVALID_WORKSTATION 0xC0000000 | 0x0070 |
| 19394 | +#define NT_STATUS_PASSWORD_EXPIRED 0xC0000000 | 0x0071 |
| 19395 | +#define NT_STATUS_ACCOUNT_DISABLED 0xC0000000 | 0x0072 |
| 19396 | +#define NT_STATUS_NONE_MAPPED 0xC0000000 | 0x0073 |
| 19397 | +#define NT_STATUS_TOO_MANY_LUIDS_REQUESTED 0xC0000000 | 0x0074 |
| 19398 | +#define NT_STATUS_LUIDS_EXHAUSTED 0xC0000000 | 0x0075 |
| 19399 | +#define NT_STATUS_INVALID_SUB_AUTHORITY 0xC0000000 | 0x0076 |
| 19400 | +#define NT_STATUS_INVALID_ACL 0xC0000000 | 0x0077 |
| 19401 | +#define NT_STATUS_INVALID_SID 0xC0000000 | 0x0078 |
| 19402 | +#define NT_STATUS_INVALID_SECURITY_DESCR 0xC0000000 | 0x0079 |
| 19403 | +#define NT_STATUS_PROCEDURE_NOT_FOUND 0xC0000000 | 0x007a |
| 19404 | +#define NT_STATUS_INVALID_IMAGE_FORMAT 0xC0000000 | 0x007b |
| 19405 | +#define NT_STATUS_NO_TOKEN 0xC0000000 | 0x007c |
| 19406 | +#define NT_STATUS_BAD_INHERITANCE_ACL 0xC0000000 | 0x007d |
| 19407 | +#define NT_STATUS_RANGE_NOT_LOCKED 0xC0000000 | 0x007e |
| 19408 | +#define NT_STATUS_DISK_FULL 0xC0000000 | 0x007f |
| 19409 | +#define NT_STATUS_SERVER_DISABLED 0xC0000000 | 0x0080 |
| 19410 | +#define NT_STATUS_SERVER_NOT_DISABLED 0xC0000000 | 0x0081 |
| 19411 | +#define NT_STATUS_TOO_MANY_GUIDS_REQUESTED 0xC0000000 | 0x0082 |
| 19412 | +#define NT_STATUS_GUIDS_EXHAUSTED 0xC0000000 | 0x0083 |
| 19413 | +#define NT_STATUS_INVALID_ID_AUTHORITY 0xC0000000 | 0x0084 |
| 19414 | +#define NT_STATUS_AGENTS_EXHAUSTED 0xC0000000 | 0x0085 |
| 19415 | +#define NT_STATUS_INVALID_VOLUME_LABEL 0xC0000000 | 0x0086 |
| 19416 | +#define NT_STATUS_SECTION_NOT_EXTENDED 0xC0000000 | 0x0087 |
| 19417 | +#define NT_STATUS_NOT_MAPPED_DATA 0xC0000000 | 0x0088 |
| 19418 | +#define NT_STATUS_RESOURCE_DATA_NOT_FOUND 0xC0000000 | 0x0089 |
| 19419 | +#define NT_STATUS_RESOURCE_TYPE_NOT_FOUND 0xC0000000 | 0x008a |
| 19420 | +#define NT_STATUS_RESOURCE_NAME_NOT_FOUND 0xC0000000 | 0x008b |
| 19421 | +#define NT_STATUS_ARRAY_BOUNDS_EXCEEDED 0xC0000000 | 0x008c |
| 19422 | +#define NT_STATUS_FLOAT_DENORMAL_OPERAND 0xC0000000 | 0x008d |
| 19423 | +#define NT_STATUS_FLOAT_DIVIDE_BY_ZERO 0xC0000000 | 0x008e |
| 19424 | +#define NT_STATUS_FLOAT_INEXACT_RESULT 0xC0000000 | 0x008f |
| 19425 | +#define NT_STATUS_FLOAT_INVALID_OPERATION 0xC0000000 | 0x0090 |
| 19426 | +#define NT_STATUS_FLOAT_OVERFLOW 0xC0000000 | 0x0091 |
| 19427 | +#define NT_STATUS_FLOAT_STACK_CHECK 0xC0000000 | 0x0092 |
| 19428 | +#define NT_STATUS_FLOAT_UNDERFLOW 0xC0000000 | 0x0093 |
| 19429 | +#define NT_STATUS_INTEGER_DIVIDE_BY_ZERO 0xC0000000 | 0x0094 |
| 19430 | +#define NT_STATUS_INTEGER_OVERFLOW 0xC0000000 | 0x0095 |
| 19431 | +#define NT_STATUS_PRIVILEGED_INSTRUCTION 0xC0000000 | 0x0096 |
| 19432 | +#define NT_STATUS_TOO_MANY_PAGING_FILES 0xC0000000 | 0x0097 |
| 19433 | +#define NT_STATUS_FILE_INVALID 0xC0000000 | 0x0098 |
| 19434 | +#define NT_STATUS_ALLOTTED_SPACE_EXCEEDED 0xC0000000 | 0x0099 |
| 19435 | +#define NT_STATUS_INSUFFICIENT_RESOURCES 0xC0000000 | 0x009a |
| 19436 | +#define NT_STATUS_DFS_EXIT_PATH_FOUND 0xC0000000 | 0x009b |
| 19437 | +#define NT_STATUS_DEVICE_DATA_ERROR 0xC0000000 | 0x009c |
| 19438 | +#define NT_STATUS_DEVICE_NOT_CONNECTED 0xC0000000 | 0x009d |
| 19439 | +#define NT_STATUS_DEVICE_POWER_FAILURE 0xC0000000 | 0x009e |
| 19440 | +#define NT_STATUS_FREE_VM_NOT_AT_BASE 0xC0000000 | 0x009f |
| 19441 | +#define NT_STATUS_MEMORY_NOT_ALLOCATED 0xC0000000 | 0x00a0 |
| 19442 | +#define NT_STATUS_WORKING_SET_QUOTA 0xC0000000 | 0x00a1 |
| 19443 | +#define NT_STATUS_MEDIA_WRITE_PROTECTED 0xC0000000 | 0x00a2 |
| 19444 | +#define NT_STATUS_DEVICE_NOT_READY 0xC0000000 | 0x00a3 |
| 19445 | +#define NT_STATUS_INVALID_GROUP_ATTRIBUTES 0xC0000000 | 0x00a4 |
| 19446 | +#define NT_STATUS_BAD_IMPERSONATION_LEVEL 0xC0000000 | 0x00a5 |
| 19447 | +#define NT_STATUS_CANT_OPEN_ANONYMOUS 0xC0000000 | 0x00a6 |
| 19448 | +#define NT_STATUS_BAD_VALIDATION_CLASS 0xC0000000 | 0x00a7 |
| 19449 | +#define NT_STATUS_BAD_TOKEN_TYPE 0xC0000000 | 0x00a8 |
| 19450 | +#define NT_STATUS_BAD_MASTER_BOOT_RECORD 0xC0000000 | 0x00a9 |
| 19451 | +#define NT_STATUS_INSTRUCTION_MISALIGNMENT 0xC0000000 | 0x00aa |
| 19452 | +#define NT_STATUS_INSTANCE_NOT_AVAILABLE 0xC0000000 | 0x00ab |
| 19453 | +#define NT_STATUS_PIPE_NOT_AVAILABLE 0xC0000000 | 0x00ac |
| 19454 | +#define NT_STATUS_INVALID_PIPE_STATE 0xC0000000 | 0x00ad |
| 19455 | +#define NT_STATUS_PIPE_BUSY 0xC0000000 | 0x00ae |
| 19456 | +#define NT_STATUS_ILLEGAL_FUNCTION 0xC0000000 | 0x00af |
| 19457 | +#define NT_STATUS_PIPE_DISCONNECTED 0xC0000000 | 0x00b0 |
| 19458 | +#define NT_STATUS_PIPE_CLOSING 0xC0000000 | 0x00b1 |
| 19459 | +#define NT_STATUS_PIPE_CONNECTED 0xC0000000 | 0x00b2 |
| 19460 | +#define NT_STATUS_PIPE_LISTENING 0xC0000000 | 0x00b3 |
| 19461 | +#define NT_STATUS_INVALID_READ_MODE 0xC0000000 | 0x00b4 |
| 19462 | +#define NT_STATUS_IO_TIMEOUT 0xC0000000 | 0x00b5 |
| 19463 | +#define NT_STATUS_FILE_FORCED_CLOSED 0xC0000000 | 0x00b6 |
| 19464 | +#define NT_STATUS_PROFILING_NOT_STARTED 0xC0000000 | 0x00b7 |
| 19465 | +#define NT_STATUS_PROFILING_NOT_STOPPED 0xC0000000 | 0x00b8 |
| 19466 | +#define NT_STATUS_COULD_NOT_INTERPRET 0xC0000000 | 0x00b9 |
| 19467 | +#define NT_STATUS_FILE_IS_A_DIRECTORY 0xC0000000 | 0x00ba |
| 19468 | +#define NT_STATUS_NOT_SUPPORTED 0xC0000000 | 0x00bb |
| 19469 | +#define NT_STATUS_REMOTE_NOT_LISTENING 0xC0000000 | 0x00bc |
| 19470 | +#define NT_STATUS_DUPLICATE_NAME 0xC0000000 | 0x00bd |
| 19471 | +#define NT_STATUS_BAD_NETWORK_PATH 0xC0000000 | 0x00be |
| 19472 | +#define NT_STATUS_NETWORK_BUSY 0xC0000000 | 0x00bf |
| 19473 | +#define NT_STATUS_DEVICE_DOES_NOT_EXIST 0xC0000000 | 0x00c0 |
| 19474 | +#define NT_STATUS_TOO_MANY_COMMANDS 0xC0000000 | 0x00c1 |
| 19475 | +#define NT_STATUS_ADAPTER_HARDWARE_ERROR 0xC0000000 | 0x00c2 |
| 19476 | +#define NT_STATUS_INVALID_NETWORK_RESPONSE 0xC0000000 | 0x00c3 |
| 19477 | +#define NT_STATUS_UNEXPECTED_NETWORK_ERROR 0xC0000000 | 0x00c4 |
| 19478 | +#define NT_STATUS_BAD_REMOTE_ADAPTER 0xC0000000 | 0x00c5 |
| 19479 | +#define NT_STATUS_PRINT_QUEUE_FULL 0xC0000000 | 0x00c6 |
| 19480 | +#define NT_STATUS_NO_SPOOL_SPACE 0xC0000000 | 0x00c7 |
| 19481 | +#define NT_STATUS_PRINT_CANCELLED 0xC0000000 | 0x00c8 |
| 19482 | +#define NT_STATUS_NETWORK_NAME_DELETED 0xC0000000 | 0x00c9 |
| 19483 | +#define NT_STATUS_NETWORK_ACCESS_DENIED 0xC0000000 | 0x00ca |
| 19484 | +#define NT_STATUS_BAD_DEVICE_TYPE 0xC0000000 | 0x00cb |
| 19485 | +#define NT_STATUS_BAD_NETWORK_NAME 0xC0000000 | 0x00cc |
| 19486 | +#define NT_STATUS_TOO_MANY_NAMES 0xC0000000 | 0x00cd |
| 19487 | +#define NT_STATUS_TOO_MANY_SESSIONS 0xC0000000 | 0x00ce |
| 19488 | +#define NT_STATUS_SHARING_PAUSED 0xC0000000 | 0x00cf |
| 19489 | +#define NT_STATUS_REQUEST_NOT_ACCEPTED 0xC0000000 | 0x00d0 |
| 19490 | +#define NT_STATUS_REDIRECTOR_PAUSED 0xC0000000 | 0x00d1 |
| 19491 | +#define NT_STATUS_NET_WRITE_FAULT 0xC0000000 | 0x00d2 |
| 19492 | +#define NT_STATUS_PROFILING_AT_LIMIT 0xC0000000 | 0x00d3 |
| 19493 | +#define NT_STATUS_NOT_SAME_DEVICE 0xC0000000 | 0x00d4 |
| 19494 | +#define NT_STATUS_FILE_RENAMED 0xC0000000 | 0x00d5 |
| 19495 | +#define NT_STATUS_VIRTUAL_CIRCUIT_CLOSED 0xC0000000 | 0x00d6 |
| 19496 | +#define NT_STATUS_NO_SECURITY_ON_OBJECT 0xC0000000 | 0x00d7 |
| 19497 | +#define NT_STATUS_CANT_WAIT 0xC0000000 | 0x00d8 |
| 19498 | +#define NT_STATUS_PIPE_EMPTY 0xC0000000 | 0x00d9 |
| 19499 | +#define NT_STATUS_CANT_ACCESS_DOMAIN_INFO 0xC0000000 | 0x00da |
| 19500 | +#define NT_STATUS_CANT_TERMINATE_SELF 0xC0000000 | 0x00db |
| 19501 | +#define NT_STATUS_INVALID_SERVER_STATE 0xC0000000 | 0x00dc |
| 19502 | +#define NT_STATUS_INVALID_DOMAIN_STATE 0xC0000000 | 0x00dd |
| 19503 | +#define NT_STATUS_INVALID_DOMAIN_ROLE 0xC0000000 | 0x00de |
| 19504 | +#define NT_STATUS_NO_SUCH_DOMAIN 0xC0000000 | 0x00df |
| 19505 | +#define NT_STATUS_DOMAIN_EXISTS 0xC0000000 | 0x00e0 |
| 19506 | +#define NT_STATUS_DOMAIN_LIMIT_EXCEEDED 0xC0000000 | 0x00e1 |
| 19507 | +#define NT_STATUS_OPLOCK_NOT_GRANTED 0xC0000000 | 0x00e2 |
| 19508 | +#define NT_STATUS_INVALID_OPLOCK_PROTOCOL 0xC0000000 | 0x00e3 |
| 19509 | +#define NT_STATUS_INTERNAL_DB_CORRUPTION 0xC0000000 | 0x00e4 |
| 19510 | +#define NT_STATUS_INTERNAL_ERROR 0xC0000000 | 0x00e5 |
| 19511 | +#define NT_STATUS_GENERIC_NOT_MAPPED 0xC0000000 | 0x00e6 |
| 19512 | +#define NT_STATUS_BAD_DESCRIPTOR_FORMAT 0xC0000000 | 0x00e7 |
| 19513 | +#define NT_STATUS_INVALID_USER_BUFFER 0xC0000000 | 0x00e8 |
| 19514 | +#define NT_STATUS_UNEXPECTED_IO_ERROR 0xC0000000 | 0x00e9 |
| 19515 | +#define NT_STATUS_UNEXPECTED_MM_CREATE_ERR 0xC0000000 | 0x00ea |
| 19516 | +#define NT_STATUS_UNEXPECTED_MM_MAP_ERROR 0xC0000000 | 0x00eb |
| 19517 | +#define NT_STATUS_UNEXPECTED_MM_EXTEND_ERR 0xC0000000 | 0x00ec |
| 19518 | +#define NT_STATUS_NOT_LOGON_PROCESS 0xC0000000 | 0x00ed |
| 19519 | +#define NT_STATUS_LOGON_SESSION_EXISTS 0xC0000000 | 0x00ee |
| 19520 | +#define NT_STATUS_INVALID_PARAMETER_1 0xC0000000 | 0x00ef |
| 19521 | +#define NT_STATUS_INVALID_PARAMETER_2 0xC0000000 | 0x00f0 |
| 19522 | +#define NT_STATUS_INVALID_PARAMETER_3 0xC0000000 | 0x00f1 |
| 19523 | +#define NT_STATUS_INVALID_PARAMETER_4 0xC0000000 | 0x00f2 |
| 19524 | +#define NT_STATUS_INVALID_PARAMETER_5 0xC0000000 | 0x00f3 |
| 19525 | +#define NT_STATUS_INVALID_PARAMETER_6 0xC0000000 | 0x00f4 |
| 19526 | +#define NT_STATUS_INVALID_PARAMETER_7 0xC0000000 | 0x00f5 |
| 19527 | +#define NT_STATUS_INVALID_PARAMETER_8 0xC0000000 | 0x00f6 |
| 19528 | +#define NT_STATUS_INVALID_PARAMETER_9 0xC0000000 | 0x00f7 |
| 19529 | +#define NT_STATUS_INVALID_PARAMETER_10 0xC0000000 | 0x00f8 |
| 19530 | +#define NT_STATUS_INVALID_PARAMETER_11 0xC0000000 | 0x00f9 |
| 19531 | +#define NT_STATUS_INVALID_PARAMETER_12 0xC0000000 | 0x00fa |
| 19532 | +#define NT_STATUS_REDIRECTOR_NOT_STARTED 0xC0000000 | 0x00fb |
| 19533 | +#define NT_STATUS_REDIRECTOR_STARTED 0xC0000000 | 0x00fc |
| 19534 | +#define NT_STATUS_STACK_OVERFLOW 0xC0000000 | 0x00fd |
| 19535 | +#define NT_STATUS_NO_SUCH_PACKAGE 0xC0000000 | 0x00fe |
| 19536 | +#define NT_STATUS_BAD_FUNCTION_TABLE 0xC0000000 | 0x00ff |
| 19537 | +#define NT_STATUS_DIRECTORY_NOT_EMPTY 0xC0000000 | 0x0101 |
| 19538 | +#define NT_STATUS_FILE_CORRUPT_ERROR 0xC0000000 | 0x0102 |
| 19539 | +#define NT_STATUS_NOT_A_DIRECTORY 0xC0000000 | 0x0103 |
| 19540 | +#define NT_STATUS_BAD_LOGON_SESSION_STATE 0xC0000000 | 0x0104 |
| 19541 | +#define NT_STATUS_LOGON_SESSION_COLLISION 0xC0000000 | 0x0105 |
| 19542 | +#define NT_STATUS_NAME_TOO_LONG 0xC0000000 | 0x0106 |
| 19543 | +#define NT_STATUS_FILES_OPEN 0xC0000000 | 0x0107 |
| 19544 | +#define NT_STATUS_CONNECTION_IN_USE 0xC0000000 | 0x0108 |
| 19545 | +#define NT_STATUS_MESSAGE_NOT_FOUND 0xC0000000 | 0x0109 |
| 19546 | +#define NT_STATUS_PROCESS_IS_TERMINATING 0xC0000000 | 0x010a |
| 19547 | +#define NT_STATUS_INVALID_LOGON_TYPE 0xC0000000 | 0x010b |
| 19548 | +#define NT_STATUS_NO_GUID_TRANSLATION 0xC0000000 | 0x010c |
| 19549 | +#define NT_STATUS_CANNOT_IMPERSONATE 0xC0000000 | 0x010d |
| 19550 | +#define NT_STATUS_IMAGE_ALREADY_LOADED 0xC0000000 | 0x010e |
| 19551 | +#define NT_STATUS_ABIOS_NOT_PRESENT 0xC0000000 | 0x010f |
| 19552 | +#define NT_STATUS_ABIOS_LID_NOT_EXIST 0xC0000000 | 0x0110 |
| 19553 | +#define NT_STATUS_ABIOS_LID_ALREADY_OWNED 0xC0000000 | 0x0111 |
| 19554 | +#define NT_STATUS_ABIOS_NOT_LID_OWNER 0xC0000000 | 0x0112 |
| 19555 | +#define NT_STATUS_ABIOS_INVALID_COMMAND 0xC0000000 | 0x0113 |
| 19556 | +#define NT_STATUS_ABIOS_INVALID_LID 0xC0000000 | 0x0114 |
| 19557 | +#define NT_STATUS_ABIOS_SELECTOR_NOT_AVAILABLE 0xC0000000 | 0x0115 |
| 19558 | +#define NT_STATUS_ABIOS_INVALID_SELECTOR 0xC0000000 | 0x0116 |
| 19559 | +#define NT_STATUS_NO_LDT 0xC0000000 | 0x0117 |
| 19560 | +#define NT_STATUS_INVALID_LDT_SIZE 0xC0000000 | 0x0118 |
| 19561 | +#define NT_STATUS_INVALID_LDT_OFFSET 0xC0000000 | 0x0119 |
| 19562 | +#define NT_STATUS_INVALID_LDT_DESCRIPTOR 0xC0000000 | 0x011a |
| 19563 | +#define NT_STATUS_INVALID_IMAGE_NE_FORMAT 0xC0000000 | 0x011b |
| 19564 | +#define NT_STATUS_RXACT_INVALID_STATE 0xC0000000 | 0x011c |
| 19565 | +#define NT_STATUS_RXACT_COMMIT_FAILURE 0xC0000000 | 0x011d |
| 19566 | +#define NT_STATUS_MAPPED_FILE_SIZE_ZERO 0xC0000000 | 0x011e |
| 19567 | +#define NT_STATUS_TOO_MANY_OPENED_FILES 0xC0000000 | 0x011f |
| 19568 | +#define NT_STATUS_CANCELLED 0xC0000000 | 0x0120 |
| 19569 | +#define NT_STATUS_CANNOT_DELETE 0xC0000000 | 0x0121 |
| 19570 | +#define NT_STATUS_INVALID_COMPUTER_NAME 0xC0000000 | 0x0122 |
| 19571 | +#define NT_STATUS_FILE_DELETED 0xC0000000 | 0x0123 |
| 19572 | +#define NT_STATUS_SPECIAL_ACCOUNT 0xC0000000 | 0x0124 |
| 19573 | +#define NT_STATUS_SPECIAL_GROUP 0xC0000000 | 0x0125 |
| 19574 | +#define NT_STATUS_SPECIAL_USER 0xC0000000 | 0x0126 |
| 19575 | +#define NT_STATUS_MEMBERS_PRIMARY_GROUP 0xC0000000 | 0x0127 |
| 19576 | +#define NT_STATUS_FILE_CLOSED 0xC0000000 | 0x0128 |
| 19577 | +#define NT_STATUS_TOO_MANY_THREADS 0xC0000000 | 0x0129 |
| 19578 | +#define NT_STATUS_THREAD_NOT_IN_PROCESS 0xC0000000 | 0x012a |
| 19579 | +#define NT_STATUS_TOKEN_ALREADY_IN_USE 0xC0000000 | 0x012b |
| 19580 | +#define NT_STATUS_PAGEFILE_QUOTA_EXCEEDED 0xC0000000 | 0x012c |
| 19581 | +#define NT_STATUS_COMMITMENT_LIMIT 0xC0000000 | 0x012d |
| 19582 | +#define NT_STATUS_INVALID_IMAGE_LE_FORMAT 0xC0000000 | 0x012e |
| 19583 | +#define NT_STATUS_INVALID_IMAGE_NOT_MZ 0xC0000000 | 0x012f |
| 19584 | +#define NT_STATUS_INVALID_IMAGE_PROTECT 0xC0000000 | 0x0130 |
| 19585 | +#define NT_STATUS_INVALID_IMAGE_WIN_16 0xC0000000 | 0x0131 |
| 19586 | +#define NT_STATUS_LOGON_SERVER_CONFLICT 0xC0000000 | 0x0132 |
| 19587 | +#define NT_STATUS_TIME_DIFFERENCE_AT_DC 0xC0000000 | 0x0133 |
| 19588 | +#define NT_STATUS_SYNCHRONIZATION_REQUIRED 0xC0000000 | 0x0134 |
| 19589 | +#define NT_STATUS_DLL_NOT_FOUND 0xC0000000 | 0x0135 |
| 19590 | +#define NT_STATUS_OPEN_FAILED 0xC0000000 | 0x0136 |
| 19591 | +#define NT_STATUS_IO_PRIVILEGE_FAILED 0xC0000000 | 0x0137 |
| 19592 | +#define NT_STATUS_ORDINAL_NOT_FOUND 0xC0000000 | 0x0138 |
| 19593 | +#define NT_STATUS_ENTRYPOINT_NOT_FOUND 0xC0000000 | 0x0139 |
| 19594 | +#define NT_STATUS_CONTROL_C_EXIT 0xC0000000 | 0x013a |
| 19595 | +#define NT_STATUS_LOCAL_DISCONNECT 0xC0000000 | 0x013b |
| 19596 | +#define NT_STATUS_REMOTE_DISCONNECT 0xC0000000 | 0x013c |
| 19597 | +#define NT_STATUS_REMOTE_RESOURCES 0xC0000000 | 0x013d |
| 19598 | +#define NT_STATUS_LINK_FAILED 0xC0000000 | 0x013e |
| 19599 | +#define NT_STATUS_LINK_TIMEOUT 0xC0000000 | 0x013f |
| 19600 | +#define NT_STATUS_INVALID_CONNECTION 0xC0000000 | 0x0140 |
| 19601 | +#define NT_STATUS_INVALID_ADDRESS 0xC0000000 | 0x0141 |
| 19602 | +#define NT_STATUS_DLL_INIT_FAILED 0xC0000000 | 0x0142 |
| 19603 | +#define NT_STATUS_MISSING_SYSTEMFILE 0xC0000000 | 0x0143 |
| 19604 | +#define NT_STATUS_UNHANDLED_EXCEPTION 0xC0000000 | 0x0144 |
| 19605 | +#define NT_STATUS_APP_INIT_FAILURE 0xC0000000 | 0x0145 |
| 19606 | +#define NT_STATUS_PAGEFILE_CREATE_FAILED 0xC0000000 | 0x0146 |
| 19607 | +#define NT_STATUS_NO_PAGEFILE 0xC0000000 | 0x0147 |
| 19608 | +#define NT_STATUS_INVALID_LEVEL 0xC0000000 | 0x0148 |
| 19609 | +#define NT_STATUS_WRONG_PASSWORD_CORE 0xC0000000 | 0x0149 |
| 19610 | +#define NT_STATUS_ILLEGAL_FLOAT_CONTEXT 0xC0000000 | 0x014a |
| 19611 | +#define NT_STATUS_PIPE_BROKEN 0xC0000000 | 0x014b |
| 19612 | +#define NT_STATUS_REGISTRY_CORRUPT 0xC0000000 | 0x014c |
| 19613 | +#define NT_STATUS_REGISTRY_IO_FAILED 0xC0000000 | 0x014d |
| 19614 | +#define NT_STATUS_NO_EVENT_PAIR 0xC0000000 | 0x014e |
| 19615 | +#define NT_STATUS_UNRECOGNIZED_VOLUME 0xC0000000 | 0x014f |
| 19616 | +#define NT_STATUS_SERIAL_NO_DEVICE_INITED 0xC0000000 | 0x0150 |
| 19617 | +#define NT_STATUS_NO_SUCH_ALIAS 0xC0000000 | 0x0151 |
| 19618 | +#define NT_STATUS_MEMBER_NOT_IN_ALIAS 0xC0000000 | 0x0152 |
| 19619 | +#define NT_STATUS_MEMBER_IN_ALIAS 0xC0000000 | 0x0153 |
| 19620 | +#define NT_STATUS_ALIAS_EXISTS 0xC0000000 | 0x0154 |
| 19621 | +#define NT_STATUS_LOGON_NOT_GRANTED 0xC0000000 | 0x0155 |
| 19622 | +#define NT_STATUS_TOO_MANY_SECRETS 0xC0000000 | 0x0156 |
| 19623 | +#define NT_STATUS_SECRET_TOO_LONG 0xC0000000 | 0x0157 |
| 19624 | +#define NT_STATUS_INTERNAL_DB_ERROR 0xC0000000 | 0x0158 |
| 19625 | +#define NT_STATUS_FULLSCREEN_MODE 0xC0000000 | 0x0159 |
| 19626 | +#define NT_STATUS_TOO_MANY_CONTEXT_IDS 0xC0000000 | 0x015a |
| 19627 | +#define NT_STATUS_LOGON_TYPE_NOT_GRANTED 0xC0000000 | 0x015b |
| 19628 | +#define NT_STATUS_NOT_REGISTRY_FILE 0xC0000000 | 0x015c |
| 19629 | +#define NT_STATUS_NT_CROSS_ENCRYPTION_REQUIRED 0xC0000000 | 0x015d |
| 19630 | +#define NT_STATUS_DOMAIN_CTRLR_CONFIG_ERROR 0xC0000000 | 0x015e |
| 19631 | +#define NT_STATUS_FT_MISSING_MEMBER 0xC0000000 | 0x015f |
| 19632 | +#define NT_STATUS_ILL_FORMED_SERVICE_ENTRY 0xC0000000 | 0x0160 |
| 19633 | +#define NT_STATUS_ILLEGAL_CHARACTER 0xC0000000 | 0x0161 |
| 19634 | +#define NT_STATUS_UNMAPPABLE_CHARACTER 0xC0000000 | 0x0162 |
| 19635 | +#define NT_STATUS_UNDEFINED_CHARACTER 0xC0000000 | 0x0163 |
| 19636 | +#define NT_STATUS_FLOPPY_VOLUME 0xC0000000 | 0x0164 |
| 19637 | +#define NT_STATUS_FLOPPY_ID_MARK_NOT_FOUND 0xC0000000 | 0x0165 |
| 19638 | +#define NT_STATUS_FLOPPY_WRONG_CYLINDER 0xC0000000 | 0x0166 |
| 19639 | +#define NT_STATUS_FLOPPY_UNKNOWN_ERROR 0xC0000000 | 0x0167 |
| 19640 | +#define NT_STATUS_FLOPPY_BAD_REGISTERS 0xC0000000 | 0x0168 |
| 19641 | +#define NT_STATUS_DISK_RECALIBRATE_FAILED 0xC0000000 | 0x0169 |
| 19642 | +#define NT_STATUS_DISK_OPERATION_FAILED 0xC0000000 | 0x016a |
| 19643 | +#define NT_STATUS_DISK_RESET_FAILED 0xC0000000 | 0x016b |
| 19644 | +#define NT_STATUS_SHARED_IRQ_BUSY 0xC0000000 | 0x016c |
| 19645 | +#define NT_STATUS_FT_ORPHANING 0xC0000000 | 0x016d |
| 19646 | +#define NT_STATUS_PARTITION_FAILURE 0xC0000000 | 0x0172 |
| 19647 | +#define NT_STATUS_INVALID_BLOCK_LENGTH 0xC0000000 | 0x0173 |
| 19648 | +#define NT_STATUS_DEVICE_NOT_PARTITIONED 0xC0000000 | 0x0174 |
| 19649 | +#define NT_STATUS_UNABLE_TO_LOCK_MEDIA 0xC0000000 | 0x0175 |
| 19650 | +#define NT_STATUS_UNABLE_TO_UNLOAD_MEDIA 0xC0000000 | 0x0176 |
| 19651 | +#define NT_STATUS_EOM_OVERFLOW 0xC0000000 | 0x0177 |
| 19652 | +#define NT_STATUS_NO_MEDIA 0xC0000000 | 0x0178 |
| 19653 | +#define NT_STATUS_NO_SUCH_MEMBER 0xC0000000 | 0x017a |
| 19654 | +#define NT_STATUS_INVALID_MEMBER 0xC0000000 | 0x017b |
| 19655 | +#define NT_STATUS_KEY_DELETED 0xC0000000 | 0x017c |
| 19656 | +#define NT_STATUS_NO_LOG_SPACE 0xC0000000 | 0x017d |
| 19657 | +#define NT_STATUS_TOO_MANY_SIDS 0xC0000000 | 0x017e |
| 19658 | +#define NT_STATUS_LM_CROSS_ENCRYPTION_REQUIRED 0xC0000000 | 0x017f |
| 19659 | +#define NT_STATUS_KEY_HAS_CHILDREN 0xC0000000 | 0x0180 |
| 19660 | +#define NT_STATUS_CHILD_MUST_BE_VOLATILE 0xC0000000 | 0x0181 |
| 19661 | +#define NT_STATUS_DEVICE_CONFIGURATION_ERROR 0xC0000000 | 0x0182 |
| 19662 | +#define NT_STATUS_DRIVER_INTERNAL_ERROR 0xC0000000 | 0x0183 |
| 19663 | +#define NT_STATUS_INVALID_DEVICE_STATE 0xC0000000 | 0x0184 |
| 19664 | +#define NT_STATUS_IO_DEVICE_ERROR 0xC0000000 | 0x0185 |
| 19665 | +#define NT_STATUS_DEVICE_PROTOCOL_ERROR 0xC0000000 | 0x0186 |
| 19666 | +#define NT_STATUS_BACKUP_CONTROLLER 0xC0000000 | 0x0187 |
| 19667 | +#define NT_STATUS_LOG_FILE_FULL 0xC0000000 | 0x0188 |
| 19668 | +#define NT_STATUS_TOO_LATE 0xC0000000 | 0x0189 |
| 19669 | +#define NT_STATUS_NO_TRUST_LSA_SECRET 0xC0000000 | 0x018a |
| 19670 | +#define NT_STATUS_NO_TRUST_SAM_ACCOUNT 0xC0000000 | 0x018b |
| 19671 | +#define NT_STATUS_TRUSTED_DOMAIN_FAILURE 0xC0000000 | 0x018c |
| 19672 | +#define NT_STATUS_TRUSTED_RELATIONSHIP_FAILURE 0xC0000000 | 0x018d |
| 19673 | +#define NT_STATUS_EVENTLOG_FILE_CORRUPT 0xC0000000 | 0x018e |
| 19674 | +#define NT_STATUS_EVENTLOG_CANT_START 0xC0000000 | 0x018f |
| 19675 | +#define NT_STATUS_TRUST_FAILURE 0xC0000000 | 0x0190 |
| 19676 | +#define NT_STATUS_MUTANT_LIMIT_EXCEEDED 0xC0000000 | 0x0191 |
| 19677 | +#define NT_STATUS_NETLOGON_NOT_STARTED 0xC0000000 | 0x0192 |
| 19678 | +#define NT_STATUS_ACCOUNT_EXPIRED 0xC0000000 | 0x0193 |
| 19679 | +#define NT_STATUS_POSSIBLE_DEADLOCK 0xC0000000 | 0x0194 |
| 19680 | +#define NT_STATUS_NETWORK_CREDENTIAL_CONFLICT 0xC0000000 | 0x0195 |
| 19681 | +#define NT_STATUS_REMOTE_SESSION_LIMIT 0xC0000000 | 0x0196 |
| 19682 | +#define NT_STATUS_EVENTLOG_FILE_CHANGED 0xC0000000 | 0x0197 |
| 19683 | +#define NT_STATUS_NOLOGON_INTERDOMAIN_TRUST_ACCOUNT 0xC0000000 | 0x0198 |
| 19684 | +#define NT_STATUS_NOLOGON_WORKSTATION_TRUST_ACCOUNT 0xC0000000 | 0x0199 |
| 19685 | +#define NT_STATUS_NOLOGON_SERVER_TRUST_ACCOUNT 0xC0000000 | 0x019a |
| 19686 | +#define NT_STATUS_DOMAIN_TRUST_INCONSISTENT 0xC0000000 | 0x019b |
| 19687 | +#define NT_STATUS_FS_DRIVER_REQUIRED 0xC0000000 | 0x019c |
| 19688 | +#define NT_STATUS_NO_USER_SESSION_KEY 0xC0000000 | 0x0202 |
| 19689 | +#define NT_STATUS_USER_SESSION_DELETED 0xC0000000 | 0x0203 |
| 19690 | +#define NT_STATUS_RESOURCE_LANG_NOT_FOUND 0xC0000000 | 0x0204 |
| 19691 | +#define NT_STATUS_INSUFF_SERVER_RESOURCES 0xC0000000 | 0x0205 |
| 19692 | +#define NT_STATUS_INVALID_BUFFER_SIZE 0xC0000000 | 0x0206 |
| 19693 | +#define NT_STATUS_INVALID_ADDRESS_COMPONENT 0xC0000000 | 0x0207 |
| 19694 | +#define NT_STATUS_INVALID_ADDRESS_WILDCARD 0xC0000000 | 0x0208 |
| 19695 | +#define NT_STATUS_TOO_MANY_ADDRESSES 0xC0000000 | 0x0209 |
| 19696 | +#define NT_STATUS_ADDRESS_ALREADY_EXISTS 0xC0000000 | 0x020a |
| 19697 | +#define NT_STATUS_ADDRESS_CLOSED 0xC0000000 | 0x020b |
| 19698 | +#define NT_STATUS_CONNECTION_DISCONNECTED 0xC0000000 | 0x020c |
| 19699 | +#define NT_STATUS_CONNECTION_RESET 0xC0000000 | 0x020d |
| 19700 | +#define NT_STATUS_TOO_MANY_NODES 0xC0000000 | 0x020e |
| 19701 | +#define NT_STATUS_TRANSACTION_ABORTED 0xC0000000 | 0x020f |
| 19702 | +#define NT_STATUS_TRANSACTION_TIMED_OUT 0xC0000000 | 0x0210 |
| 19703 | +#define NT_STATUS_TRANSACTION_NO_RELEASE 0xC0000000 | 0x0211 |
| 19704 | +#define NT_STATUS_TRANSACTION_NO_MATCH 0xC0000000 | 0x0212 |
| 19705 | +#define NT_STATUS_TRANSACTION_RESPONDED 0xC0000000 | 0x0213 |
| 19706 | +#define NT_STATUS_TRANSACTION_INVALID_ID 0xC0000000 | 0x0214 |
| 19707 | +#define NT_STATUS_TRANSACTION_INVALID_TYPE 0xC0000000 | 0x0215 |
| 19708 | +#define NT_STATUS_NOT_SERVER_SESSION 0xC0000000 | 0x0216 |
| 19709 | +#define NT_STATUS_NOT_CLIENT_SESSION 0xC0000000 | 0x0217 |
| 19710 | +#define NT_STATUS_CANNOT_LOAD_REGISTRY_FILE 0xC0000000 | 0x0218 |
| 19711 | +#define NT_STATUS_DEBUG_ATTACH_FAILED 0xC0000000 | 0x0219 |
| 19712 | +#define NT_STATUS_SYSTEM_PROCESS_TERMINATED 0xC0000000 | 0x021a |
| 19713 | +#define NT_STATUS_DATA_NOT_ACCEPTED 0xC0000000 | 0x021b |
| 19714 | +#define NT_STATUS_NO_BROWSER_SERVERS_FOUND 0xC0000000 | 0x021c |
| 19715 | +#define NT_STATUS_VDM_HARD_ERROR 0xC0000000 | 0x021d |
| 19716 | +#define NT_STATUS_DRIVER_CANCEL_TIMEOUT 0xC0000000 | 0x021e |
| 19717 | +#define NT_STATUS_REPLY_MESSAGE_MISMATCH 0xC0000000 | 0x021f |
| 19718 | +#define NT_STATUS_MAPPED_ALIGNMENT 0xC0000000 | 0x0220 |
| 19719 | +#define NT_STATUS_IMAGE_CHECKSUM_MISMATCH 0xC0000000 | 0x0221 |
| 19720 | +#define NT_STATUS_LOST_WRITEBEHIND_DATA 0xC0000000 | 0x0222 |
| 19721 | +#define NT_STATUS_CLIENT_SERVER_PARAMETERS_INVALID 0xC0000000 | 0x0223 |
| 19722 | +#define NT_STATUS_PASSWORD_MUST_CHANGE 0xC0000000 | 0x0224 |
| 19723 | +#define NT_STATUS_NOT_FOUND 0xC0000000 | 0x0225 |
| 19724 | +#define NT_STATUS_NOT_TINY_STREAM 0xC0000000 | 0x0226 |
| 19725 | +#define NT_STATUS_RECOVERY_FAILURE 0xC0000000 | 0x0227 |
| 19726 | +#define NT_STATUS_STACK_OVERFLOW_READ 0xC0000000 | 0x0228 |
| 19727 | +#define NT_STATUS_FAIL_CHECK 0xC0000000 | 0x0229 |
| 19728 | +#define NT_STATUS_DUPLICATE_OBJECTID 0xC0000000 | 0x022a |
| 19729 | +#define NT_STATUS_OBJECTID_EXISTS 0xC0000000 | 0x022b |
| 19730 | +#define NT_STATUS_CONVERT_TO_LARGE 0xC0000000 | 0x022c |
| 19731 | +#define NT_STATUS_RETRY 0xC0000000 | 0x022d |
| 19732 | +#define NT_STATUS_FOUND_OUT_OF_SCOPE 0xC0000000 | 0x022e |
| 19733 | +#define NT_STATUS_ALLOCATE_BUCKET 0xC0000000 | 0x022f |
| 19734 | +#define NT_STATUS_PROPSET_NOT_FOUND 0xC0000000 | 0x0230 |
| 19735 | +#define NT_STATUS_MARSHALL_OVERFLOW 0xC0000000 | 0x0231 |
| 19736 | +#define NT_STATUS_INVALID_VARIANT 0xC0000000 | 0x0232 |
| 19737 | +#define NT_STATUS_DOMAIN_CONTROLLER_NOT_FOUND 0xC0000000 | 0x0233 |
| 19738 | +#define NT_STATUS_ACCOUNT_LOCKED_OUT 0xC0000000 | 0x0234 |
| 19739 | +#define NT_STATUS_HANDLE_NOT_CLOSABLE 0xC0000000 | 0x0235 |
| 19740 | +#define NT_STATUS_CONNECTION_REFUSED 0xC0000000 | 0x0236 |
| 19741 | +#define NT_STATUS_GRACEFUL_DISCONNECT 0xC0000000 | 0x0237 |
| 19742 | +#define NT_STATUS_ADDRESS_ALREADY_ASSOCIATED 0xC0000000 | 0x0238 |
| 19743 | +#define NT_STATUS_ADDRESS_NOT_ASSOCIATED 0xC0000000 | 0x0239 |
| 19744 | +#define NT_STATUS_CONNECTION_INVALID 0xC0000000 | 0x023a |
| 19745 | +#define NT_STATUS_CONNECTION_ACTIVE 0xC0000000 | 0x023b |
| 19746 | +#define NT_STATUS_NETWORK_UNREACHABLE 0xC0000000 | 0x023c |
| 19747 | +#define NT_STATUS_HOST_UNREACHABLE 0xC0000000 | 0x023d |
| 19748 | +#define NT_STATUS_PROTOCOL_UNREACHABLE 0xC0000000 | 0x023e |
| 19749 | +#define NT_STATUS_PORT_UNREACHABLE 0xC0000000 | 0x023f |
| 19750 | +#define NT_STATUS_REQUEST_ABORTED 0xC0000000 | 0x0240 |
| 19751 | +#define NT_STATUS_CONNECTION_ABORTED 0xC0000000 | 0x0241 |
| 19752 | +#define NT_STATUS_BAD_COMPRESSION_BUFFER 0xC0000000 | 0x0242 |
| 19753 | +#define NT_STATUS_USER_MAPPED_FILE 0xC0000000 | 0x0243 |
| 19754 | +#define NT_STATUS_AUDIT_FAILED 0xC0000000 | 0x0244 |
| 19755 | +#define NT_STATUS_TIMER_RESOLUTION_NOT_SET 0xC0000000 | 0x0245 |
| 19756 | +#define NT_STATUS_CONNECTION_COUNT_LIMIT 0xC0000000 | 0x0246 |
| 19757 | +#define NT_STATUS_LOGIN_TIME_RESTRICTION 0xC0000000 | 0x0247 |
| 19758 | +#define NT_STATUS_LOGIN_WKSTA_RESTRICTION 0xC0000000 | 0x0248 |
| 19759 | +#define NT_STATUS_IMAGE_MP_UP_MISMATCH 0xC0000000 | 0x0249 |
| 19760 | +#define NT_STATUS_INSUFFICIENT_LOGON_INFO 0xC0000000 | 0x0250 |
| 19761 | +#define NT_STATUS_BAD_DLL_ENTRYPOINT 0xC0000000 | 0x0251 |
| 19762 | +#define NT_STATUS_BAD_SERVICE_ENTRYPOINT 0xC0000000 | 0x0252 |
| 19763 | +#define NT_STATUS_LPC_REPLY_LOST 0xC0000000 | 0x0253 |
| 19764 | +#define NT_STATUS_IP_ADDRESS_CONFLICT1 0xC0000000 | 0x0254 |
| 19765 | +#define NT_STATUS_IP_ADDRESS_CONFLICT2 0xC0000000 | 0x0255 |
| 19766 | +#define NT_STATUS_REGISTRY_QUOTA_LIMIT 0xC0000000 | 0x0256 |
| 19767 | +#define NT_STATUS_PATH_NOT_COVERED 0xC0000000 | 0x0257 |
| 19768 | +#define NT_STATUS_NO_CALLBACK_ACTIVE 0xC0000000 | 0x0258 |
| 19769 | +#define NT_STATUS_LICENSE_QUOTA_EXCEEDED 0xC0000000 | 0x0259 |
| 19770 | +#define NT_STATUS_PWD_TOO_SHORT 0xC0000000 | 0x025a |
| 19771 | +#define NT_STATUS_PWD_TOO_RECENT 0xC0000000 | 0x025b |
| 19772 | +#define NT_STATUS_PWD_HISTORY_CONFLICT 0xC0000000 | 0x025c |
| 19773 | +#define NT_STATUS_PLUGPLAY_NO_DEVICE 0xC0000000 | 0x025e |
| 19774 | +#define NT_STATUS_UNSUPPORTED_COMPRESSION 0xC0000000 | 0x025f |
| 19775 | +#define NT_STATUS_INVALID_HW_PROFILE 0xC0000000 | 0x0260 |
| 19776 | +#define NT_STATUS_INVALID_PLUGPLAY_DEVICE_PATH 0xC0000000 | 0x0261 |
| 19777 | +#define NT_STATUS_DRIVER_ORDINAL_NOT_FOUND 0xC0000000 | 0x0262 |
| 19778 | +#define NT_STATUS_DRIVER_ENTRYPOINT_NOT_FOUND 0xC0000000 | 0x0263 |
| 19779 | +#define NT_STATUS_RESOURCE_NOT_OWNED 0xC0000000 | 0x0264 |
| 19780 | +#define NT_STATUS_TOO_MANY_LINKS 0xC0000000 | 0x0265 |
| 19781 | +#define NT_STATUS_QUOTA_LIST_INCONSISTENT 0xC0000000 | 0x0266 |
| 19782 | +#define NT_STATUS_FILE_IS_OFFLINE 0xC0000000 | 0x0267 |
| 19783 | +#define NT_STATUS_NO_SUCH_JOB 0xC0000000 | 0xEDE /* scheduler */ |
| 19784 | + |
| 19785 | +#endif /* _NTERR_H */ |
| 19786 | --- /dev/null |
| 19787 | +++ b/fs/cifs/ntlmssp.h |
| 19788 | @@ -0,0 +1,101 @@ |
| 19789 | +/* |
| 19790 | + * fs/cifs/ntlmssp.h |
| 19791 | + * |
| 19792 | + * Copyright (c) International Business Machines Corp., 2002 |
| 19793 | + * Author(s): Steve French (sfrench@us.ibm.com) |
| 19794 | + * |
| 19795 | + * This library is free software; you can redistribute it and/or modify |
| 19796 | + * it under the terms of the GNU Lesser General Public License as published |
| 19797 | + * by the Free Software Foundation; either version 2.1 of the License, or |
| 19798 | + * (at your option) any later version. |
| 19799 | + * |
| 19800 | + * This library is distributed in the hope that it will be useful, |
| 19801 | + * but WITHOUT ANY WARRANTY; without even the implied warranty of |
| 19802 | + * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See |
| 19803 | + * the GNU Lesser General Public License for more details. |
| 19804 | + * |
| 19805 | + * You should have received a copy of the GNU Lesser General Public License |
| 19806 | + * along with this library; if not, write to the Free Software |
| 19807 | + * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA |
| 19808 | + */ |
| 19809 | + |
| 19810 | +#pragma pack(1) |
| 19811 | + |
| 19812 | +#define NTLMSSP_SIGNATURE "NTLMSSP" |
| 19813 | +/* Message Types */ |
| 19814 | +#define NtLmNegotiate 1 |
| 19815 | +#define NtLmChallenge 2 |
| 19816 | +#define NtLmAuthenticate 3 |
| 19817 | +#define UnknownMessage 8 |
| 19818 | + |
| 19819 | +/* Negotiate Flags */ |
| 19820 | +#define NTLMSSP_NEGOTIATE_UNICODE 0x01 // Text strings are in unicode |
| 19821 | +#define NTLMSSP_NEGOTIATE_OEM 0x02 // Text strings are in OEM |
| 19822 | +#define NTLMSSP_REQUEST_TARGET 0x04 // Server return its auth realm |
| 19823 | +#define NTLMSSP_NEGOTIATE_SIGN 0x0010 // Request signature capability |
| 19824 | +#define NTLMSSP_NEGOTIATE_SEAL 0x0020 // Request confidentiality |
| 19825 | +#define NTLMSSP_NEGOTIATE_DGRAM 0x0040 |
| 19826 | +#define NTLMSSP_NEGOTIATE_LM_KEY 0x0080 // Use LM session key for sign/seal |
| 19827 | +#define NTLMSSP_NEGOTIATE_NTLM 0x0200 // NTLM authentication |
| 19828 | +#define NTLMSSP_NEGOTIATE_DOMAIN_SUPPLIED 0x1000 |
| 19829 | +#define NTLMSSP_NEGOTIATE_WORKSTATION_SUPPLIED 0x2000 |
| 19830 | +#define NTLMSSP_NEGOTIATE_LOCAL_CALL 0x4000 // client/server on same machine |
| 19831 | +#define NTLMSSP_NEGOTIATE_ALWAYS_SIGN 0x8000 // Sign for all security levels |
| 19832 | +#define NTLMSSP_TARGET_TYPE_DOMAIN 0x10000 |
| 19833 | +#define NTLMSSP_TARGET_TYPE_SERVER 0x20000 |
| 19834 | +#define NTLMSSP_TARGET_TYPE_SHARE 0x40000 |
| 19835 | +#define NTLMSSP_NEGOTIATE_NTLMV2 0x80000 |
| 19836 | +#define NTLMSSP_REQUEST_INIT_RESP 0x100000 |
| 19837 | +#define NTLMSSP_REQUEST_ACCEPT_RESP 0x200000 |
| 19838 | +#define NTLMSSP_REQUEST_NOT_NT_KEY 0x400000 |
| 19839 | +#define NTLMSSP_NEGOTIATE_TARGET_INFO 0x800000 |
| 19840 | +#define NTLMSSP_NEGOTIATE_128 0x20000000 |
| 19841 | +#define NTLMSSP_NEGOTIATE_KEY_XCH 0x40000000 |
| 19842 | +#define NTLMSSP_NEGOTIATE_56 0x80000000 |
| 19843 | + |
| 19844 | +/* Although typedefs are not commonly used for structure definitions */ |
| 19845 | +/* in the Linux kernel, in this particular case they are useful */ |
| 19846 | +/* to more closely match the standards document for NTLMSSP from */ |
| 19847 | +/* OpenGroup and to make the code more closely match the standard in */ |
| 19848 | +/* appearance */ |
| 19849 | + |
| 19850 | +typedef struct _SECURITY_BUFFER { |
| 19851 | + __u16 Length; |
| 19852 | + __u16 MaximumLength; |
| 19853 | + __u32 Buffer; /* offset to buffer */ |
| 19854 | +} SECURITY_BUFFER; |
| 19855 | + |
| 19856 | +typedef struct _NEGOTIATE_MESSAGE { |
| 19857 | + __u8 Signature[sizeof (NTLMSSP_SIGNATURE)]; |
| 19858 | + __u32 MessageType; /* 1 */ |
| 19859 | + __u32 NegotiateFlags; |
| 19860 | + SECURITY_BUFFER DomainName; /* RFC 1001 style and ASCII */ |
| 19861 | + SECURITY_BUFFER WorkstationName; /* RFC 1001 and ASCII */ |
| 19862 | + char DomainString[0]; |
| 19863 | + /* followed by WorkstationString */ |
| 19864 | +} NEGOTIATE_MESSAGE, *PNEGOTIATE_MESSAGE; |
| 19865 | + |
| 19866 | +typedef struct _CHALLENGE_MESSAGE { |
| 19867 | + __u8 Signature[sizeof (NTLMSSP_SIGNATURE)]; |
| 19868 | + __u32 MessageType; /* 2 */ |
| 19869 | + SECURITY_BUFFER TargetName; |
| 19870 | + __u32 NegotiateFlags; |
| 19871 | + __u8 Challenge[CIFS_CRYPTO_KEY_SIZE]; |
| 19872 | + __u8 Reserved[8]; |
| 19873 | + SECURITY_BUFFER TargetInfoArray; |
| 19874 | +} CHALLENGE_MESSAGE, *PCHALLENGE_MESSAGE; |
| 19875 | + |
| 19876 | +typedef struct _AUTHENTICATE_MESSAGE { |
| 19877 | + __u8 Signature[sizeof (NTLMSSP_SIGNATURE)]; |
| 19878 | + __u32 MessageType; /* 3 */ |
| 19879 | + SECURITY_BUFFER LmChallengeResponse; |
| 19880 | + SECURITY_BUFFER NtChallengeResponse; |
| 19881 | + SECURITY_BUFFER DomainName; |
| 19882 | + SECURITY_BUFFER UserName; |
| 19883 | + SECURITY_BUFFER WorkstationName; |
| 19884 | + SECURITY_BUFFER SessionKey; |
| 19885 | + __u32 NegotiateFlags; |
| 19886 | + char UserString[0]; |
| 19887 | +} AUTHENTICATE_MESSAGE, *PAUTHENTICATE_MESSAGE; |
| 19888 | + |
| 19889 | +#pragma pack() /* resume default structure packing */ |
| 19890 | --- /dev/null |
| 19891 | +++ b/fs/cifs/README |
| 19892 | @@ -0,0 +1,356 @@ |
| 19893 | +The CIFS VFS support for Linux supports many advanced network filesystem |
| 19894 | +features such as heirarchical dfs like namespace, hardlinks, locking and more. |
| 19895 | +It was designed to comply with the SNIA CIFS Technical Reference (which |
| 19896 | +supersedes the 1992 X/Open SMB Standard) as well as to perform best practice |
| 19897 | +practical interoperability with Windows 2000, Windows XP, Samba and equivalent |
| 19898 | +servers. |
| 19899 | + |
| 19900 | +For questions or bug reports please contact: |
| 19901 | + sfrench@samba.org (sfrench@us.ibm.com) |
| 19902 | + |
| 19903 | +Build instructions: |
| 19904 | +================== |
| 19905 | +For Linux 2.4: |
| 19906 | +1) Get the kernel source (e.g.from http://www.kernel.org) |
| 19907 | +and download the cifs vfs source (see the project page |
| 19908 | +at http://us1.samba.org/samba/Linux_CIFS_client.html) |
| 19909 | +and change directory into the top of the kernel directory |
| 19910 | +then patch the kernel (e.g. "patch -p1 < cifs_24.patch") |
| 19911 | +to add the cifs vfs to your kernel configure options if |
| 19912 | +it has not already been added (e.g. current SuSE and UL |
| 19913 | +users do not need to apply the cifs_24.patch since the cifs vfs is |
| 19914 | +already in the kernel configure menu) and then |
| 19915 | +mkdir linux/fs/cifs and then copy the current cifs vfs files from |
| 19916 | +the cifs download to your kernel build directory e.g. |
| 19917 | + |
| 19918 | + cp <cifs_download_dir>/fs/cifs/* to <kernel_download_dir>/fs/cifs |
| 19919 | + |
| 19920 | +2) make menuconfig (or make xconfig) |
| 19921 | +3) select cifs from within the network filesystem choices |
| 19922 | +4) save and exit |
| 19923 | +5) make dep |
| 19924 | +6) make modules (or "make" if CIFS VFS not to be built as a module) |
| 19925 | + |
| 19926 | +For Linux 2.5: |
| 19927 | +1) Download the kernel (e.g. from http://www.kernel.org or from bitkeeper |
| 19928 | +at bk://linux.bkbits.net/linux-2.5) and change directory into the top |
| 19929 | +of the kernel directory tree (e.g. /usr/src/linux-2.5.73) |
| 19930 | +2) make menuconfig (or make xconfig) |
| 19931 | +3) select cifs from within the network filesystem choices |
| 19932 | +4) save and exit |
| 19933 | +5) make |
| 19934 | + |
| 19935 | + |
| 19936 | +Installation instructions: |
| 19937 | +========================= |
| 19938 | +If you have built the CIFS vfs as module (successfully) simply |
| 19939 | +type "make modules_install" (or if you prefer, manually copy the file to |
| 19940 | +the modules directory e.g. /lib/modules/2.4.10-4GB/kernel/fs/cifs/cifs.o). |
| 19941 | + |
| 19942 | +If you have built the CIFS vfs into the kernel itself, follow the instructions |
| 19943 | +for your distribution on how to install a new kernel (usually you |
| 19944 | +would simply type "make install"). |
| 19945 | + |
| 19946 | +If you do not have the utility mount.cifs (in the Samba 3.0 source tree and on |
| 19947 | +the CIFS VFS web site) copy it to the same directory in which mount.smbfs and |
| 19948 | +similar files reside (usually /sbin). Although the helper software is not |
| 19949 | +required, mount.cifs is recommended. Eventually the Samba 3.0 utility program |
| 19950 | +"net" may also be helpful since it may someday provide easier mount syntax for |
| 19951 | +users who are used to Windows e.g. net use <mount point> <UNC name or cifs URL> |
| 19952 | +Note that running the Winbind pam/nss module (logon service) on all of your |
| 19953 | +Linux clients is useful in mapping Uids and Gids consistently across the |
| 19954 | +domain to the proper network user. The mount.cifs mount helper can be |
| 19955 | +trivially built from Samba 3.0 or later source e.g. by executing: |
| 19956 | + |
| 19957 | + gcc samba/source/client/mount.cifs.c -o mount.cifs |
| 19958 | + |
| 19959 | +Note that when the mount.cifs utility is run suid (allowing user mounts), |
| 19960 | +in order to reduce risks, the "nosuid" mount flag is passed in on mount to |
| 19961 | +disallow execution of an suid program mounted on the remote target. |
| 19962 | +When mount is executed as root, nosuid is not passed in by default, |
| 19963 | +and execution of suid programs on the remote target would be enabled |
| 19964 | +by default. This can be changed, as with nfs and other filesystems, |
| 19965 | +by simply specifying "nosuid" among the mount options. For user mounts |
| 19966 | +though to be able to pass the suid flag to mount requires rebuilding |
| 19967 | +mount.cifs with the following flag: |
| 19968 | + |
| 19969 | + gcc samba/source/client/mount.cifs.c -DCIFS_ALLOW_USR_SUID -o mount.cifs |
| 19970 | + |
| 19971 | +There is a corresponding manual page for cifs mounting in the Samba 3.0 and |
| 19972 | +later source tree in docs/manpages/mount.cifs.8 |
| 19973 | + |
| 19974 | +Samba Considerations |
| 19975 | +==================== |
| 19976 | +To get the maximum benefit from the CIFS VFS, we recommend using a server that |
| 19977 | +supports the SNIA CIFS Unix Extensions standard (e.g. Samba 2.2.5 or later or |
| 19978 | +Samba 3.0) but the CIFS vfs works fine with a wide variety of CIFS servers. |
| 19979 | +Note that uid, gid and file permissions will display default values if you do |
| 19980 | +not have a server that supports the Unix extensions for CIFS (such as Samba |
| 19981 | +2.2.5 or later). To enable the Unix CIFS Extensions in the Samba server, add |
| 19982 | +the line: |
| 19983 | + |
| 19984 | + unix extensions = yes |
| 19985 | + |
| 19986 | +to your smb.conf file on the server. Note that the following smb.conf settings |
| 19987 | +are also useful (on the Samba server) when the majority of clients are Unix or |
| 19988 | +Linux: |
| 19989 | + |
| 19990 | + case sensitive = yes |
| 19991 | + delete readonly = yes |
| 19992 | + ea support = yes |
| 19993 | + |
| 19994 | +Note that ea support is required for supporting Linux xattrs. |
| 19995 | +Some administrators also change the "map archive" and the "create mask" |
| 19996 | +parameters from their default values. Creating special devices (mknod) |
| 19997 | +remotely may require specifying a mkdev function to Samba if you are not using |
| 19998 | +Samba 3.0.5 or later. For more information on these see the manual pages |
| 19999 | +("man smb.conf") on the Samba server system. Note that the cifs vfs, |
| 20000 | +unlike the smbfs vfs, does not read the smb.conf on the client system |
| 20001 | +(the few optional settings are passed in on mount via -o parameters instead). |
| 20002 | +Note that Samba 2.2.7 or later includes a fix that allows the CIFS VFS to delete |
| 20003 | +open files (required for strict POSIX compliance). Windows Servers already |
| 20004 | +supported this feature. Samba server does not allow symlinks that refer to files |
| 20005 | +outside of the share, so in Samba versions prior to 3.0.5, most symlinks to |
| 20006 | +files with absolute paths (ie beginning with slash) such as: |
| 20007 | + ln -s /mnt/foo bar |
| 20008 | +would be forbidden. Samba 3.0.5 server or later includes the ability to create |
| 20009 | +such symlinks safely by converting unsafe symlinks (ie symlinks to server |
| 20010 | +files that are outside of the share) to a samba specific format on the server |
| 20011 | +that is ignored by local server applications and non-cifs clients and that will |
| 20012 | +not be traversed by the Samba server). This is opaque to the Linux client |
| 20013 | +application using the cifs vfs. Absolute symlinks will work to Samba 3.0.5 or |
| 20014 | +later, but only for remote clients using the CIFS Unix extensions, and will |
| 20015 | +be invisbile to Windows clients and typically will not affect local |
| 20016 | +applications running on the same server as Samba. |
| 20017 | + |
| 20018 | +Use instructions: |
| 20019 | +================ |
| 20020 | +Once the CIFS VFS support is built into the kernel or installed as a module |
| 20021 | +(cifs.o), you can use mount syntax like the following to access Samba or Windows |
| 20022 | +servers: |
| 20023 | + |
| 20024 | + mount -t cifs //9.53.216.11/e$ /mnt -o user=myname,pass=mypassword |
| 20025 | + |
| 20026 | +Before -o the option -v may be specified to make the mount.cifs |
| 20027 | +mount helper display the mount steps more verbosely. |
| 20028 | +After -o the following commonly used cifs vfs specific options |
| 20029 | +are supported: |
| 20030 | + |
| 20031 | + user=<username> |
| 20032 | + pass=<password> |
| 20033 | + domain=<domain name> |
| 20034 | + |
| 20035 | +Other cifs mount options are described below. Use of TCP names (in addition to |
| 20036 | +ip addresses) is available if the mount helper (mount.cifs) is installed. If |
| 20037 | +you do not trust the server to which are mounted, or if you do not have |
| 20038 | +cifs signing enabled (and the physical network is insecure), consider use |
| 20039 | +of the standard mount options "noexec" and "nosuid" to reduce the risk of |
| 20040 | +running an altered binary on your local system (downloaded from a hostile server |
| 20041 | +or altered by a hostile router). |
| 20042 | + |
| 20043 | +When using the mount helper mount.cifs, passwords may be specified via alternate |
| 20044 | +mechanisms, instead of specifying it after -o using the normal "pass=" syntax |
| 20045 | +on the command line: |
| 20046 | +1) By including it in a credential file. Specify credentials=filename as one |
| 20047 | +of the mount options. Credential files contain two lines |
| 20048 | + username=someuser |
| 20049 | + password=your_password |
| 20050 | +2) By specifying the password in the PASSWD environment variable (similarly |
| 20051 | +the user name can be taken from the USER environment variable). |
| 20052 | +3) By specifying the password in a file by name via PASSWD_FILE |
| 20053 | +4) By specifying the password in a file by file descriptor via PASSWD_FD |
| 20054 | + |
| 20055 | +If no password is provided, mount.cifs will prompt for password entry |
| 20056 | + |
| 20057 | +Restrictions |
| 20058 | +============ |
| 20059 | +Servers must support the NTLM SMB dialect (which is the most recent, supported |
| 20060 | +by Samba and Windows NT version 4, 2000 and XP and many other SMB/CIFS servers) |
| 20061 | +Servers must support either "pure-TCP" (port 445 TCP/IP CIFS connections) or RFC |
| 20062 | +1001/1002 support for "Netbios-Over-TCP/IP." Neither of these is likely to be a |
| 20063 | +problem as most servers support this. IPv6 support is planned for the future. |
| 20064 | + |
| 20065 | +CIFS VFS Mount Options |
| 20066 | +====================== |
| 20067 | +A partial list of the supported mount options follows: |
| 20068 | + user The user name to use when trying to establish |
| 20069 | + the CIFS session. |
| 20070 | + password The user password. If the mount helper is |
| 20071 | + installed, the user will be prompted for password |
| 20072 | + if it is not supplied. |
| 20073 | + ip The ip address of the target server |
| 20074 | + unc The target server Universal Network Name (export) to |
| 20075 | + mount. |
| 20076 | + domain Set the SMB/CIFS workgroup name prepended to the |
| 20077 | + username during CIFS session establishment |
| 20078 | + uid If CIFS Unix extensions are not supported by the server |
| 20079 | + this overrides the default uid for inodes. For mounts to |
| 20080 | + servers which do support the CIFS Unix extensions, such |
| 20081 | + as a properly configured Samba server, the server provides |
| 20082 | + the uid, gid and mode. For servers which do not support |
| 20083 | + the Unix extensions, the default uid (and gid) returned on |
| 20084 | + lookup of existing files is the uid (gid) of the person |
| 20085 | + who executed the mount (root, except when mount.cifs |
| 20086 | + is configured setuid for user mounts) unless the "uid=" |
| 20087 | + (gid) mount option is specified. For the uid (gid) of newly |
| 20088 | + created files and directories, ie files created since |
| 20089 | + the last mount of the server share, the expected uid |
| 20090 | + (gid) is cached as as long as the inode remains in |
| 20091 | + memory on the client. Also note that permission |
| 20092 | + checks (authorization checks) on accesses to a file occur |
| 20093 | + at the server, but there are cases in which an administrator |
| 20094 | + may want to restrict at the client as well. For those |
| 20095 | + servers which do not report a uid/gid owner |
| 20096 | + (such as Windows), permissions can also be checked at the |
| 20097 | + client, and a crude form of client side permission checking |
| 20098 | + can be enabled by specifying file_mode and dir_mode on |
| 20099 | + the client |
| 20100 | + gid If CIFS Unix extensions are not supported by the server |
| 20101 | + this overrides the default gid for inodes. |
| 20102 | + file_mode If CIFS Unix extensions are not supported by the server |
| 20103 | + this overrides the default mode for file inodes. |
| 20104 | + dir_mode If CIFS Unix extensions are not supported by the server |
| 20105 | + this overrides the default mode for directory inodes. |
| 20106 | + port attempt to contact the server on this tcp port, before |
| 20107 | + trying the usual ports (port 445, then 139). |
| 20108 | + iocharset Codepage used to convert local path names to and from |
| 20109 | + Unicode. Unicode is used by default for network path |
| 20110 | + names if the server supports it. If iocharset is |
| 20111 | + not specified then the nls_default specified |
| 20112 | + during the local client kernel build will be used. |
| 20113 | + If server does not support Unicode, this parameter is |
| 20114 | + unused. |
| 20115 | + rsize default read size |
| 20116 | + wsize default write size |
| 20117 | + rw mount the network share read-write (note that the |
| 20118 | + server may still consider the share read-only) |
| 20119 | + ro mount network share read-only |
| 20120 | + version used to distinguish different versions of the |
| 20121 | + mount helper utility (not typically needed) |
| 20122 | + sep if first mount option (after the -o), overrides |
| 20123 | + the comma as the separator between the mount |
| 20124 | + parms. e.g. |
| 20125 | + -o user=myname,password=mypassword,domain=mydom |
| 20126 | + could be passed instead with period as the separator by |
| 20127 | + -o sep=.user=myname.password=mypassword.domain=mydom |
| 20128 | + this might be useful when comma is contained within username |
| 20129 | + or password or domain. This option is less important |
| 20130 | + when the cifs mount helper cifs.mount (version 1.1 or later) |
| 20131 | + is used. |
| 20132 | + nosuid Do not allow remote executables with the suid bit |
| 20133 | + program to be executed. This is only meaningful for mounts |
| 20134 | + to servers such as Samba which support the CIFS Unix Extensions. |
| 20135 | + If you do not trust the servers in your network (your mount |
| 20136 | + targets) it is recommended that you specify this option for |
| 20137 | + greater security. |
| 20138 | + suid Allow remote files on this mountpoint with suid enabled to |
| 20139 | + be executed (default for mounts when executed as root, |
| 20140 | + nosuid is default for user mounts). |
| 20141 | + credentials Although ignored by the cifs kernel component, it is used by |
| 20142 | + the mount helper, mount.cifs. When mount.cifs is installed it |
| 20143 | + opens and reads the credential file specified in order |
| 20144 | + to obtain the userid and password arguments which are passed to |
| 20145 | + the cifs vfs. |
| 20146 | + guest Although ignored by the kernel component, the mount.cifs |
| 20147 | + mount helper will not prompt the user for a password |
| 20148 | + if guest is specified on the mount options. If no |
| 20149 | + password is specified a null password will be used. |
| 20150 | + |
| 20151 | +The mount.cifs mount helper also accepts a few mount options before -o |
| 20152 | +including: |
| 20153 | + |
| 20154 | + -S take password from stdin (equivalent to setting the environment |
| 20155 | + variable "PASSWD_FD=0" |
| 20156 | + -V print mount.cifs version |
| 20157 | + -? display simple usage information |
| 20158 | + |
| 20159 | +With recent 2.6 kernel versions of modutils, the version of the cifs kernel |
| 20160 | +module can be displayed via modinfo. |
| 20161 | + |
| 20162 | +Misc /proc/fs/cifs Flags and Debug Info |
| 20163 | +======================================= |
| 20164 | +Informational pseudo-files: |
| 20165 | +DebugData Displays information about active CIFS sessions |
| 20166 | + and shares. |
| 20167 | +Stats Lists summary resource usage information as well as per |
| 20168 | + share statistics, if CONFIG_CIFS_STATS in enabled |
| 20169 | + in the kernel configuration. |
| 20170 | + |
| 20171 | +Configuration pseudo-files: |
| 20172 | +MultiuserMount If set to one, more than one CIFS session to |
| 20173 | + the same server ip address can be established |
| 20174 | + if more than one uid accesses the same mount |
| 20175 | + point and if the uids user/password mapping |
| 20176 | + information is available. (default is 0) |
| 20177 | +PacketSigningEnabled If set to one, cifs packet signing is enabled |
| 20178 | + and will be used if the server requires |
| 20179 | + it. If set to two, cifs packet signing is |
| 20180 | + required even if the server considers packet |
| 20181 | + signing optional. (default 1) |
| 20182 | +cifsFYI If set to one, additional debug information is |
| 20183 | + logged to the system error log. (default 0) |
| 20184 | +ExtendedSecurity If set to one, SPNEGO session establishment |
| 20185 | + is allowed which enables more advanced |
| 20186 | + secure CIFS session establishment (default 0) |
| 20187 | +NTLMV2Enabled If set to one, more secure password hashes |
| 20188 | + are used when the server supports them and |
| 20189 | + when kerberos is not negotiated (default 0) |
| 20190 | +traceSMB If set to one, debug information is logged to the |
| 20191 | + system error log with the start of smb requests |
| 20192 | + and responses (default 0) |
| 20193 | +LookupCacheEnable If set to one, inode information is kept cached |
| 20194 | + for one second improving performance of lookups |
| 20195 | + (default 1) |
| 20196 | +OplockEnabled If set to one, safe distributed caching enabled. |
| 20197 | + (default 1) |
| 20198 | +LinuxExtensionsEnabled If set to one then the client will attempt to |
| 20199 | + use the CIFS "UNIX" extensions which are optional |
| 20200 | + protocol enhancements that allow CIFS servers |
| 20201 | + to return accurate UID/GID information as well |
| 20202 | + as support symbolic links. If you use servers |
| 20203 | + such as Samba that support the CIFS Unix |
| 20204 | + extensions but do not want to use symbolic link |
| 20205 | + support and want to map the uid and gid fields |
| 20206 | + to values supplied at mount (rather than the |
| 20207 | + actual values, then set this to zero. (default 1) |
| 20208 | + |
| 20209 | +These experimental features and tracing can be enabled by changing flags in |
| 20210 | +/proc/fs/cifs (after the cifs module has been installed or built into the |
| 20211 | +kernel, e.g. insmod cifs). To enable a feature set it to 1 e.g. to enable |
| 20212 | +tracing to the kernel message log type: |
| 20213 | + |
| 20214 | + echo 1 > /proc/fs/cifs/cifsFYI |
| 20215 | + |
| 20216 | +and for more extensive tracing including the start of smb requests and responses |
| 20217 | + |
| 20218 | + echo 1 > /proc/fs/cifs/traceSMB |
| 20219 | + |
| 20220 | +Three other experimental features are under development and to test |
| 20221 | +require enabling an ifdef (e.g. by adding "#define CIFS_FCNTL" in cifsglob.h) |
| 20222 | + |
| 20223 | + CONFIG_CIFS_QUOTA |
| 20224 | + |
| 20225 | + CONFIG_CIFS_XATTR |
| 20226 | + |
| 20227 | + CONFIG_CIFS_FCNTL (fcntl needed for support of directory change |
| 20228 | + notification and perhaps later for file leases) |
| 20229 | + |
| 20230 | +Per share (per client mount) statistics are available in /proc/fs/cifs/DebugData |
| 20231 | +if the kernel was configured with cifs statistics enabled. The statistics |
| 20232 | +represent the number of successful (ie non-zero return code from the server) |
| 20233 | +SMB responses to some of the more common commands (open, delete, mkdir etc.). |
| 20234 | +Also recorded is the total bytes read and bytes written to the server for |
| 20235 | +that share. Note that due to client caching effects this can be less than the |
| 20236 | +number of bytes read and written by the application running on the client. |
| 20237 | +The statistics for the number of total SMBs and oplock breaks are different in |
| 20238 | +that they represent all for that share, not just those for which the server |
| 20239 | +returned success. |
| 20240 | + |
| 20241 | +Also note that "cat /proc/fs/cifs/DebugData" will display information about |
| 20242 | +the active sessions and the shares that are mounted. Note: NTLMv2 enablement |
| 20243 | +will not work since they its implementation is not quite complete yet. |
| 20244 | +Do not alter these configuration values unless you are doing specific testing. |
| 20245 | +Enabling extended security works to Windows 2000 Workstations and XP but not to |
| 20246 | +Windows 2000 server or Samba since it does not usually send "raw NTLMSSP" |
| 20247 | +(instead it sends NTLMSSP encapsulated in SPNEGO/GSSAPI, which support is not |
| 20248 | +complete in the CIFS VFS yet). |
| 20249 | --- /dev/null |
| 20250 | +++ b/fs/cifs/rfc1002pdu.h |
| 20251 | @@ -0,0 +1,79 @@ |
| 20252 | +/* |
| 20253 | + * fs/cifs/rfc1002pdu.h |
| 20254 | + * |
| 20255 | + * Protocol Data Unit definitions for RFC 1001/1002 support |
| 20256 | + * |
| 20257 | + * Copyright (c) International Business Machines Corp., 2004 |
| 20258 | + * Author(s): Steve French (sfrench@us.ibm.com) |
| 20259 | + * |
| 20260 | + * This library is free software; you can redistribute it and/or modify |
| 20261 | + * it under the terms of the GNU Lesser General Public License as published |
| 20262 | + * by the Free Software Foundation; either version 2.1 of the License, or |
| 20263 | + * (at your option) any later version. |
| 20264 | + * |
| 20265 | + * This library is distributed in the hope that it will be useful, |
| 20266 | + * but WITHOUT ANY WARRANTY; without even the implied warranty of |
| 20267 | + * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See |
| 20268 | + * the GNU Lesser General Public License for more details. |
| 20269 | + * |
| 20270 | + * You should have received a copy of the GNU Lesser General Public License |
| 20271 | + * along with this library; if not, write to the Free Software |
| 20272 | + * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA |
| 20273 | + */ |
| 20274 | + |
| 20275 | +#pragma pack(1) |
| 20276 | + |
| 20277 | +/* NB: unlike smb/cifs packets, the RFC1002 structures are big endian */ |
| 20278 | + |
| 20279 | + /* RFC 1002 session packet types */ |
| 20280 | +#define RFC1002_SESSION_MESASAGE 0x00 |
| 20281 | +#define RFC1002_SESSION_REQUEST 0x81 |
| 20282 | +#define RFC1002_POSITIVE_SESSION_RESPONSE 0x82 |
| 20283 | +#define RFC1002_NEGATIVE_SESSION_RESPONSE 0x83 |
| 20284 | +#define RFC1002_RETARGET_SESSION_RESPONSE 0x83 |
| 20285 | +#define RFC1002_SESSION_KEEP_ALIVE 0x85 |
| 20286 | + |
| 20287 | + /* RFC 1002 flags (only one defined */ |
| 20288 | +#define RFC1002_LENGTH_EXTEND 0x80 /* high order bit of length (ie +64K) */ |
| 20289 | + |
| 20290 | +struct rfc1002_session_packet { |
| 20291 | + __u8 type; |
| 20292 | + __u8 flags; |
| 20293 | + __u16 length; |
| 20294 | + union { |
| 20295 | + struct { |
| 20296 | + __u8 called_len; |
| 20297 | + __u8 called_name[32]; |
| 20298 | + __u8 scope1; /* null */ |
| 20299 | + __u8 calling_len; |
| 20300 | + __u8 calling_name[32]; |
| 20301 | + __u8 scope2; /* null */ |
| 20302 | + } session_req; |
| 20303 | + struct { |
| 20304 | + __u32 retarget_ip_addr; |
| 20305 | + __u16 port; |
| 20306 | + } retarget_resp; |
| 20307 | + __u8 neg_ses_resp_error_code; |
| 20308 | + /* POSITIVE_SESSION_RESPONSE packet does not include trailer. |
| 20309 | + SESSION_KEEP_ALIVE packet also does not include a trailer. |
| 20310 | + Trailer for the SESSION_MESSAGE packet is SMB/CIFS header */ |
| 20311 | + } trailer; |
| 20312 | +}; |
| 20313 | + |
| 20314 | +/* Negative Session Response error codes */ |
| 20315 | +#define RFC1002_NOT_LISTENING_CALLED 0x80 /* not listening on called name */ |
| 20316 | +#define RFC1002_NOT_LISTENING_CALLING 0x81 /* not listening on calling name */ |
| 20317 | +#define RFC1002_NOT_PRESENT 0x82 /* called name not present */ |
| 20318 | +#define RFC1002_INSUFFICIENT_RESOURCE 0x83 |
| 20319 | +#define RFC1002_UNSPECIFIED_ERROR 0x8F |
| 20320 | + |
| 20321 | +/* RFC 1002 Datagram service packets are not defined here as they |
| 20322 | +are not needed for the network filesystem client unless we plan on |
| 20323 | +implementing broadcast resolution of the server ip address (from |
| 20324 | +server netbios name). Currently server names are resolved only via DNS |
| 20325 | +(tcp name) or ip address or an /etc/hosts equivalent mapping to ip address.*/ |
| 20326 | + |
| 20327 | +#define DEFAULT_CIFS_CALLED_NAME "*SMBSERVER " |
| 20328 | + |
| 20329 | +#pragma pack() /* resume default structure packing */ |
| 20330 | + |
| 20331 | --- /dev/null |
| 20332 | +++ b/fs/cifs/smbdes.c |
| 20333 | @@ -0,0 +1,408 @@ |
| 20334 | +/* |
| 20335 | + Unix SMB/Netbios implementation. |
| 20336 | + Version 1.9. |
| 20337 | + |
| 20338 | + a partial implementation of DES designed for use in the |
| 20339 | + SMB authentication protocol |
| 20340 | + |
| 20341 | + Copyright (C) Andrew Tridgell 1998 |
| 20342 | + Modified by Steve French (sfrench@us.ibm.com) 2002,2004 |
| 20343 | + |
| 20344 | + This program is free software; you can redistribute it and/or modify |
| 20345 | + it under the terms of the GNU General Public License as published by |
| 20346 | + the Free Software Foundation; either version 2 of the License, or |
| 20347 | + (at your option) any later version. |
| 20348 | + |
| 20349 | + This program is distributed in the hope that it will be useful, |
| 20350 | + but WITHOUT ANY WARRANTY; without even the implied warranty of |
| 20351 | + MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the |
| 20352 | + GNU General Public License for more details. |
| 20353 | + |
| 20354 | + You should have received a copy of the GNU General Public License |
| 20355 | + along with this program; if not, write to the Free Software |
| 20356 | + Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA. |
| 20357 | +*/ |
| 20358 | + |
| 20359 | +/* NOTES: |
| 20360 | + |
| 20361 | + This code makes no attempt to be fast! In fact, it is a very |
| 20362 | + slow implementation |
| 20363 | + |
| 20364 | + This code is NOT a complete DES implementation. It implements only |
| 20365 | + the minimum necessary for SMB authentication, as used by all SMB |
| 20366 | + products (including every copy of Microsoft Windows95 ever sold) |
| 20367 | + |
| 20368 | + In particular, it can only do a unchained forward DES pass. This |
| 20369 | + means it is not possible to use this code for encryption/decryption |
| 20370 | + of data, instead it is only useful as a "hash" algorithm. |
| 20371 | + |
| 20372 | + There is no entry point into this code that allows normal DES operation. |
| 20373 | + |
| 20374 | + I believe this means that this code does not come under ITAR |
| 20375 | + regulations but this is NOT a legal opinion. If you are concerned |
| 20376 | + about the applicability of ITAR regulations to this code then you |
| 20377 | + should confirm it for yourself (and maybe let me know if you come |
| 20378 | + up with a different answer to the one above) |
| 20379 | +*/ |
| 20380 | +#include <linux/slab.h> |
| 20381 | +#define uchar unsigned char |
| 20382 | + |
| 20383 | +static uchar perm1[56] = { 57, 49, 41, 33, 25, 17, 9, |
| 20384 | + 1, 58, 50, 42, 34, 26, 18, |
| 20385 | + 10, 2, 59, 51, 43, 35, 27, |
| 20386 | + 19, 11, 3, 60, 52, 44, 36, |
| 20387 | + 63, 55, 47, 39, 31, 23, 15, |
| 20388 | + 7, 62, 54, 46, 38, 30, 22, |
| 20389 | + 14, 6, 61, 53, 45, 37, 29, |
| 20390 | + 21, 13, 5, 28, 20, 12, 4 |
| 20391 | +}; |
| 20392 | + |
| 20393 | +static uchar perm2[48] = { 14, 17, 11, 24, 1, 5, |
| 20394 | + 3, 28, 15, 6, 21, 10, |
| 20395 | + 23, 19, 12, 4, 26, 8, |
| 20396 | + 16, 7, 27, 20, 13, 2, |
| 20397 | + 41, 52, 31, 37, 47, 55, |
| 20398 | + 30, 40, 51, 45, 33, 48, |
| 20399 | + 44, 49, 39, 56, 34, 53, |
| 20400 | + 46, 42, 50, 36, 29, 32 |
| 20401 | +}; |
| 20402 | + |
| 20403 | +static uchar perm3[64] = { 58, 50, 42, 34, 26, 18, 10, 2, |
| 20404 | + 60, 52, 44, 36, 28, 20, 12, 4, |
| 20405 | + 62, 54, 46, 38, 30, 22, 14, 6, |
| 20406 | + 64, 56, 48, 40, 32, 24, 16, 8, |
| 20407 | + 57, 49, 41, 33, 25, 17, 9, 1, |
| 20408 | + 59, 51, 43, 35, 27, 19, 11, 3, |
| 20409 | + 61, 53, 45, 37, 29, 21, 13, 5, |
| 20410 | + 63, 55, 47, 39, 31, 23, 15, 7 |
| 20411 | +}; |
| 20412 | + |
| 20413 | +static uchar perm4[48] = { 32, 1, 2, 3, 4, 5, |
| 20414 | + 4, 5, 6, 7, 8, 9, |
| 20415 | + 8, 9, 10, 11, 12, 13, |
| 20416 | + 12, 13, 14, 15, 16, 17, |
| 20417 | + 16, 17, 18, 19, 20, 21, |
| 20418 | + 20, 21, 22, 23, 24, 25, |
| 20419 | + 24, 25, 26, 27, 28, 29, |
| 20420 | + 28, 29, 30, 31, 32, 1 |
| 20421 | +}; |
| 20422 | + |
| 20423 | +static uchar perm5[32] = { 16, 7, 20, 21, |
| 20424 | + 29, 12, 28, 17, |
| 20425 | + 1, 15, 23, 26, |
| 20426 | + 5, 18, 31, 10, |
| 20427 | + 2, 8, 24, 14, |
| 20428 | + 32, 27, 3, 9, |
| 20429 | + 19, 13, 30, 6, |
| 20430 | + 22, 11, 4, 25 |
| 20431 | +}; |
| 20432 | + |
| 20433 | +static uchar perm6[64] = { 40, 8, 48, 16, 56, 24, 64, 32, |
| 20434 | + 39, 7, 47, 15, 55, 23, 63, 31, |
| 20435 | + 38, 6, 46, 14, 54, 22, 62, 30, |
| 20436 | + 37, 5, 45, 13, 53, 21, 61, 29, |
| 20437 | + 36, 4, 44, 12, 52, 20, 60, 28, |
| 20438 | + 35, 3, 43, 11, 51, 19, 59, 27, |
| 20439 | + 34, 2, 42, 10, 50, 18, 58, 26, |
| 20440 | + 33, 1, 41, 9, 49, 17, 57, 25 |
| 20441 | +}; |
| 20442 | + |
| 20443 | +static uchar sc[16] = { 1, 1, 2, 2, 2, 2, 2, 2, 1, 2, 2, 2, 2, 2, 2, 1 }; |
| 20444 | + |
| 20445 | +static uchar sbox[8][4][16] = { |
| 20446 | + {{14, 4, 13, 1, 2, 15, 11, 8, 3, 10, 6, 12, 5, 9, 0, 7}, |
| 20447 | + {0, 15, 7, 4, 14, 2, 13, 1, 10, 6, 12, 11, 9, 5, 3, 8}, |
| 20448 | + {4, 1, 14, 8, 13, 6, 2, 11, 15, 12, 9, 7, 3, 10, 5, 0}, |
| 20449 | + {15, 12, 8, 2, 4, 9, 1, 7, 5, 11, 3, 14, 10, 0, 6, 13}}, |
| 20450 | + |
| 20451 | + {{15, 1, 8, 14, 6, 11, 3, 4, 9, 7, 2, 13, 12, 0, 5, 10}, |
| 20452 | + {3, 13, 4, 7, 15, 2, 8, 14, 12, 0, 1, 10, 6, 9, 11, 5}, |
| 20453 | + {0, 14, 7, 11, 10, 4, 13, 1, 5, 8, 12, 6, 9, 3, 2, 15}, |
| 20454 | + {13, 8, 10, 1, 3, 15, 4, 2, 11, 6, 7, 12, 0, 5, 14, 9}}, |
| 20455 | + |
| 20456 | + {{10, 0, 9, 14, 6, 3, 15, 5, 1, 13, 12, 7, 11, 4, 2, 8}, |
| 20457 | + {13, 7, 0, 9, 3, 4, 6, 10, 2, 8, 5, 14, 12, 11, 15, 1}, |
| 20458 | + {13, 6, 4, 9, 8, 15, 3, 0, 11, 1, 2, 12, 5, 10, 14, 7}, |
| 20459 | + {1, 10, 13, 0, 6, 9, 8, 7, 4, 15, 14, 3, 11, 5, 2, 12}}, |
| 20460 | + |
| 20461 | + {{7, 13, 14, 3, 0, 6, 9, 10, 1, 2, 8, 5, 11, 12, 4, 15}, |
| 20462 | + {13, 8, 11, 5, 6, 15, 0, 3, 4, 7, 2, 12, 1, 10, 14, 9}, |
| 20463 | + {10, 6, 9, 0, 12, 11, 7, 13, 15, 1, 3, 14, 5, 2, 8, 4}, |
| 20464 | + {3, 15, 0, 6, 10, 1, 13, 8, 9, 4, 5, 11, 12, 7, 2, 14}}, |
| 20465 | + |
| 20466 | + {{2, 12, 4, 1, 7, 10, 11, 6, 8, 5, 3, 15, 13, 0, 14, 9}, |
| 20467 | + {14, 11, 2, 12, 4, 7, 13, 1, 5, 0, 15, 10, 3, 9, 8, 6}, |
| 20468 | + {4, 2, 1, 11, 10, 13, 7, 8, 15, 9, 12, 5, 6, 3, 0, 14}, |
| 20469 | + {11, 8, 12, 7, 1, 14, 2, 13, 6, 15, 0, 9, 10, 4, 5, 3}}, |
| 20470 | + |
| 20471 | + {{12, 1, 10, 15, 9, 2, 6, 8, 0, 13, 3, 4, 14, 7, 5, 11}, |
| 20472 | + {10, 15, 4, 2, 7, 12, 9, 5, 6, 1, 13, 14, 0, 11, 3, 8}, |
| 20473 | + {9, 14, 15, 5, 2, 8, 12, 3, 7, 0, 4, 10, 1, 13, 11, 6}, |
| 20474 | + {4, 3, 2, 12, 9, 5, 15, 10, 11, 14, 1, 7, 6, 0, 8, 13}}, |
| 20475 | + |
| 20476 | + {{4, 11, 2, 14, 15, 0, 8, 13, 3, 12, 9, 7, 5, 10, 6, 1}, |
| 20477 | + {13, 0, 11, 7, 4, 9, 1, 10, 14, 3, 5, 12, 2, 15, 8, 6}, |
| 20478 | + {1, 4, 11, 13, 12, 3, 7, 14, 10, 15, 6, 8, 0, 5, 9, 2}, |
| 20479 | + {6, 11, 13, 8, 1, 4, 10, 7, 9, 5, 0, 15, 14, 2, 3, 12}}, |
| 20480 | + |
| 20481 | + {{13, 2, 8, 4, 6, 15, 11, 1, 10, 9, 3, 14, 5, 0, 12, 7}, |
| 20482 | + {1, 15, 13, 8, 10, 3, 7, 4, 12, 5, 6, 11, 0, 14, 9, 2}, |
| 20483 | + {7, 11, 4, 1, 9, 12, 14, 2, 0, 6, 10, 13, 15, 3, 5, 8}, |
| 20484 | + {2, 1, 14, 7, 4, 10, 8, 13, 15, 12, 9, 0, 3, 5, 6, 11}} |
| 20485 | +}; |
| 20486 | + |
| 20487 | +static void |
| 20488 | +permute(char *out, char *in, uchar * p, int n) |
| 20489 | +{ |
| 20490 | + int i; |
| 20491 | + for (i = 0; i < n; i++) |
| 20492 | + out[i] = in[p[i] - 1]; |
| 20493 | +} |
| 20494 | + |
| 20495 | +static void |
| 20496 | +lshift(char *d, int count, int n) |
| 20497 | +{ |
| 20498 | + char out[64]; |
| 20499 | + int i; |
| 20500 | + for (i = 0; i < n; i++) |
| 20501 | + out[i] = d[(i + count) % n]; |
| 20502 | + for (i = 0; i < n; i++) |
| 20503 | + d[i] = out[i]; |
| 20504 | +} |
| 20505 | + |
| 20506 | +static void |
| 20507 | +concat(char *out, char *in1, char *in2, int l1, int l2) |
| 20508 | +{ |
| 20509 | + while (l1--) |
| 20510 | + *out++ = *in1++; |
| 20511 | + while (l2--) |
| 20512 | + *out++ = *in2++; |
| 20513 | +} |
| 20514 | + |
| 20515 | +static void |
| 20516 | +xor(char *out, char *in1, char *in2, int n) |
| 20517 | +{ |
| 20518 | + int i; |
| 20519 | + for (i = 0; i < n; i++) |
| 20520 | + out[i] = in1[i] ^ in2[i]; |
| 20521 | +} |
| 20522 | + |
| 20523 | +static void |
| 20524 | +dohash(char *out, char *in, char *key, int forw) |
| 20525 | +{ |
| 20526 | + int i, j, k; |
| 20527 | + char *pk1; |
| 20528 | + char c[28]; |
| 20529 | + char d[28]; |
| 20530 | + char *cd; |
| 20531 | + char ki[16][48]; |
| 20532 | + char *pd1; |
| 20533 | + char l[32], r[32]; |
| 20534 | + char *rl; |
| 20535 | + |
| 20536 | + /* Have to reduce stack usage */ |
| 20537 | + pk1 = kmalloc(56+56+64+64,GFP_KERNEL); |
| 20538 | + if(pk1 == NULL) |
| 20539 | + return; |
| 20540 | + |
| 20541 | + cd = pk1 + 56; |
| 20542 | + pd1= cd + 56; |
| 20543 | + rl = pd1 + 64; |
| 20544 | + |
| 20545 | + permute(pk1, key, perm1, 56); |
| 20546 | + |
| 20547 | + for (i = 0; i < 28; i++) |
| 20548 | + c[i] = pk1[i]; |
| 20549 | + for (i = 0; i < 28; i++) |
| 20550 | + d[i] = pk1[i + 28]; |
| 20551 | + |
| 20552 | + for (i = 0; i < 16; i++) { |
| 20553 | + lshift(c, sc[i], 28); |
| 20554 | + lshift(d, sc[i], 28); |
| 20555 | + |
| 20556 | + concat(cd, c, d, 28, 28); |
| 20557 | + permute(ki[i], cd, perm2, 48); |
| 20558 | + } |
| 20559 | + |
| 20560 | + permute(pd1, in, perm3, 64); |
| 20561 | + |
| 20562 | + for (j = 0; j < 32; j++) { |
| 20563 | + l[j] = pd1[j]; |
| 20564 | + r[j] = pd1[j + 32]; |
| 20565 | + } |
| 20566 | + |
| 20567 | + for (i = 0; i < 16; i++) { |
| 20568 | + char *er; /* er[48] */ |
| 20569 | + char *erk; /* erk[48] */ |
| 20570 | + char b[8][6]; |
| 20571 | + char *cb; /* cb[32] */ |
| 20572 | + char *pcb; /* pcb[32] */ |
| 20573 | + char *r2; /* r2[32] */ |
| 20574 | + |
| 20575 | + er = kmalloc(48+48+32+32+32, GFP_KERNEL); |
| 20576 | + if(er == NULL) { |
| 20577 | + kfree(pk1); |
| 20578 | + return; |
| 20579 | + } |
| 20580 | + erk = er+48; |
| 20581 | + cb = erk+48; |
| 20582 | + pcb = cb+32; |
| 20583 | + r2 = pcb+32; |
| 20584 | + |
| 20585 | + permute(er, r, perm4, 48); |
| 20586 | + |
| 20587 | + xor(erk, er, ki[forw ? i : 15 - i], 48); |
| 20588 | + |
| 20589 | + for (j = 0; j < 8; j++) |
| 20590 | + for (k = 0; k < 6; k++) |
| 20591 | + b[j][k] = erk[j * 6 + k]; |
| 20592 | + |
| 20593 | + for (j = 0; j < 8; j++) { |
| 20594 | + int m, n; |
| 20595 | + m = (b[j][0] << 1) | b[j][5]; |
| 20596 | + |
| 20597 | + n = (b[j][1] << 3) | (b[j][2] << 2) | (b[j][3] << |
| 20598 | + 1) | b[j][4]; |
| 20599 | + |
| 20600 | + for (k = 0; k < 4; k++) |
| 20601 | + b[j][k] = |
| 20602 | + (sbox[j][m][n] & (1 << (3 - k))) ? 1 : 0; |
| 20603 | + } |
| 20604 | + |
| 20605 | + for (j = 0; j < 8; j++) |
| 20606 | + for (k = 0; k < 4; k++) |
| 20607 | + cb[j * 4 + k] = b[j][k]; |
| 20608 | + permute(pcb, cb, perm5, 32); |
| 20609 | + |
| 20610 | + xor(r2, l, pcb, 32); |
| 20611 | + |
| 20612 | + for (j = 0; j < 32; j++) |
| 20613 | + l[j] = r[j]; |
| 20614 | + |
| 20615 | + for (j = 0; j < 32; j++) |
| 20616 | + r[j] = r2[j]; |
| 20617 | + |
| 20618 | + kfree(er); |
| 20619 | + } |
| 20620 | + |
| 20621 | + concat(rl, r, l, 32, 32); |
| 20622 | + |
| 20623 | + permute(out, rl, perm6, 64); |
| 20624 | + kfree(pk1); |
| 20625 | +} |
| 20626 | + |
| 20627 | +static void |
| 20628 | +str_to_key(unsigned char *str, unsigned char *key) |
| 20629 | +{ |
| 20630 | + int i; |
| 20631 | + |
| 20632 | + key[0] = str[0] >> 1; |
| 20633 | + key[1] = ((str[0] & 0x01) << 6) | (str[1] >> 2); |
| 20634 | + key[2] = ((str[1] & 0x03) << 5) | (str[2] >> 3); |
| 20635 | + key[3] = ((str[2] & 0x07) << 4) | (str[3] >> 4); |
| 20636 | + key[4] = ((str[3] & 0x0F) << 3) | (str[4] >> 5); |
| 20637 | + key[5] = ((str[4] & 0x1F) << 2) | (str[5] >> 6); |
| 20638 | + key[6] = ((str[5] & 0x3F) << 1) | (str[6] >> 7); |
| 20639 | + key[7] = str[6] & 0x7F; |
| 20640 | + for (i = 0; i < 8; i++) { |
| 20641 | + key[i] = (key[i] << 1); |
| 20642 | + } |
| 20643 | +} |
| 20644 | + |
| 20645 | +static void |
| 20646 | +smbhash(unsigned char *out, unsigned char *in, unsigned char *key, int forw) |
| 20647 | +{ |
| 20648 | + int i; |
| 20649 | + char *outb; /* outb[64] */ |
| 20650 | + char *inb; /* inb[64] */ |
| 20651 | + char *keyb; /* keyb[64] */ |
| 20652 | + unsigned char key2[8]; |
| 20653 | + |
| 20654 | + outb = kmalloc(64 * 3,GFP_KERNEL); |
| 20655 | + if(outb == NULL) |
| 20656 | + return; |
| 20657 | + |
| 20658 | + inb = outb + 64; |
| 20659 | + keyb = inb + 64; |
| 20660 | + |
| 20661 | + str_to_key(key, key2); |
| 20662 | + |
| 20663 | + for (i = 0; i < 64; i++) { |
| 20664 | + inb[i] = (in[i / 8] & (1 << (7 - (i % 8)))) ? 1 : 0; |
| 20665 | + keyb[i] = (key2[i / 8] & (1 << (7 - (i % 8)))) ? 1 : 0; |
| 20666 | + outb[i] = 0; |
| 20667 | + } |
| 20668 | + |
| 20669 | + dohash(outb, inb, keyb, forw); |
| 20670 | + |
| 20671 | + for (i = 0; i < 8; i++) { |
| 20672 | + out[i] = 0; |
| 20673 | + } |
| 20674 | + |
| 20675 | + for (i = 0; i < 64; i++) { |
| 20676 | + if (outb[i]) |
| 20677 | + out[i / 8] |= (1 << (7 - (i % 8))); |
| 20678 | + } |
| 20679 | + kfree(outb); |
| 20680 | +} |
| 20681 | + |
| 20682 | +void |
| 20683 | +E_P16(unsigned char *p14, unsigned char *p16) |
| 20684 | +{ |
| 20685 | + unsigned char sp8[8] = |
| 20686 | + { 0x4b, 0x47, 0x53, 0x21, 0x40, 0x23, 0x24, 0x25 }; |
| 20687 | + smbhash(p16, sp8, p14, 1); |
| 20688 | + smbhash(p16 + 8, sp8, p14 + 7, 1); |
| 20689 | +} |
| 20690 | + |
| 20691 | +void |
| 20692 | +E_P24(unsigned char *p21, unsigned char *c8, unsigned char *p24) |
| 20693 | +{ |
| 20694 | + smbhash(p24, c8, p21, 1); |
| 20695 | + smbhash(p24 + 8, c8, p21 + 7, 1); |
| 20696 | + smbhash(p24 + 16, c8, p21 + 14, 1); |
| 20697 | +} |
| 20698 | + |
| 20699 | +void |
| 20700 | +D_P16(unsigned char *p14, unsigned char *in, unsigned char *out) |
| 20701 | +{ |
| 20702 | + smbhash(out, in, p14, 0); |
| 20703 | + smbhash(out + 8, in + 8, p14 + 7, 0); |
| 20704 | +} |
| 20705 | + |
| 20706 | +void |
| 20707 | +E_old_pw_hash(unsigned char *p14, unsigned char *in, unsigned char *out) |
| 20708 | +{ |
| 20709 | + smbhash(out, in, p14, 1); |
| 20710 | + smbhash(out + 8, in + 8, p14 + 7, 1); |
| 20711 | +} |
| 20712 | + |
| 20713 | +void |
| 20714 | +cred_hash1(unsigned char *out, unsigned char *in, unsigned char *key) |
| 20715 | +{ |
| 20716 | + unsigned char buf[8]; |
| 20717 | + |
| 20718 | + smbhash(buf, in, key, 1); |
| 20719 | + smbhash(out, buf, key + 9, 1); |
| 20720 | +} |
| 20721 | + |
| 20722 | +void |
| 20723 | +cred_hash2(unsigned char *out, unsigned char *in, unsigned char *key) |
| 20724 | +{ |
| 20725 | + unsigned char buf[8]; |
| 20726 | + static unsigned char key2[8]; |
| 20727 | + |
| 20728 | + smbhash(buf, in, key, 1); |
| 20729 | + key2[0] = key[7]; |
| 20730 | + smbhash(out, buf, key2, 1); |
| 20731 | +} |
| 20732 | + |
| 20733 | +void |
| 20734 | +cred_hash3(unsigned char *out, unsigned char *in, unsigned char *key, int forw) |
| 20735 | +{ |
| 20736 | + static unsigned char key2[8]; |
| 20737 | + |
| 20738 | + smbhash(out, in, key, forw); |
| 20739 | + key2[0] = key[7]; |
| 20740 | + smbhash(out + 8, in + 8, key2, forw); |
| 20741 | +} |
| 20742 | --- /dev/null |
| 20743 | +++ b/fs/cifs/smbencrypt.c |
| 20744 | @@ -0,0 +1,295 @@ |
| 20745 | +/* |
| 20746 | + Unix SMB/Netbios implementation. |
| 20747 | + Version 1.9. |
| 20748 | + SMB parameters and setup |
| 20749 | + Copyright (C) Andrew Tridgell 1992-2000 |
| 20750 | + Copyright (C) Luke Kenneth Casson Leighton 1996-2000 |
| 20751 | + Modified by Jeremy Allison 1995. |
| 20752 | + Copyright (C) Andrew Bartlett <abartlet@samba.org> 2002-2003 |
| 20753 | + Modified by Steve French (sfrench@us.ibm.com) 2002-2003 |
| 20754 | + |
| 20755 | + This program is free software; you can redistribute it and/or modify |
| 20756 | + it under the terms of the GNU General Public License as published by |
| 20757 | + the Free Software Foundation; either version 2 of the License, or |
| 20758 | + (at your option) any later version. |
| 20759 | + |
| 20760 | + This program is distributed in the hope that it will be useful, |
| 20761 | + but WITHOUT ANY WARRANTY; without even the implied warranty of |
| 20762 | + MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the |
| 20763 | + GNU General Public License for more details. |
| 20764 | + |
| 20765 | + You should have received a copy of the GNU General Public License |
| 20766 | + along with this program; if not, write to the Free Software |
| 20767 | + Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA. |
| 20768 | +*/ |
| 20769 | + |
| 20770 | +#include <linux/module.h> |
| 20771 | +#include <linux/fs.h> |
| 20772 | +#include <linux/string.h> |
| 20773 | +#include <linux/kernel.h> |
| 20774 | +#include <linux/random.h> |
| 20775 | +#include "cifs_unicode.h" |
| 20776 | +#include "cifspdu.h" |
| 20777 | +#include "md5.h" |
| 20778 | +#include "cifs_debug.h" |
| 20779 | + |
| 20780 | +#ifndef FALSE |
| 20781 | +#define FALSE 0 |
| 20782 | +#endif |
| 20783 | +#ifndef TRUE |
| 20784 | +#define TRUE 1 |
| 20785 | +#endif |
| 20786 | + |
| 20787 | +/* following came from the other byteorder.h to avoid include conflicts */ |
| 20788 | +#define CVAL(buf,pos) (((unsigned char *)(buf))[pos]) |
| 20789 | +#define SSVALX(buf,pos,val) (CVAL(buf,pos)=(val)&0xFF,CVAL(buf,pos+1)=(val)>>8) |
| 20790 | +#define SSVAL(buf,pos,val) SSVALX((buf),(pos),((__u16)(val))) |
| 20791 | + |
| 20792 | +/*The following definitions come from lib/md4.c */ |
| 20793 | + |
| 20794 | +void mdfour(unsigned char *out, unsigned char *in, int n); |
| 20795 | + |
| 20796 | +/*The following definitions come from libsmb/smbdes.c */ |
| 20797 | + |
| 20798 | +void E_P16(unsigned char *p14, unsigned char *p16); |
| 20799 | +void E_P24(unsigned char *p21, unsigned char *c8, unsigned char *p24); |
| 20800 | +void D_P16(unsigned char *p14, unsigned char *in, unsigned char *out); |
| 20801 | +void E_old_pw_hash(unsigned char *p14, unsigned char *in, unsigned char *out); |
| 20802 | +void cred_hash1(unsigned char *out, unsigned char *in, unsigned char *key); |
| 20803 | +void cred_hash2(unsigned char *out, unsigned char *in, unsigned char *key); |
| 20804 | +void cred_hash3(unsigned char *out, unsigned char *in, unsigned char *key, |
| 20805 | + int forw); |
| 20806 | + |
| 20807 | +/*The following definitions come from libsmb/smbencrypt.c */ |
| 20808 | + |
| 20809 | +void SMBencrypt(unsigned char *passwd, unsigned char *c8, unsigned char *p24); |
| 20810 | +void E_md4hash(const unsigned char *passwd, unsigned char *p16); |
| 20811 | +void nt_lm_owf_gen(char *pwd, unsigned char nt_p16[16], unsigned char p16[16]); |
| 20812 | +void SMBOWFencrypt(unsigned char passwd[16], unsigned char *c8, |
| 20813 | + unsigned char p24[24]); |
| 20814 | +void NTLMSSPOWFencrypt(unsigned char passwd[8], |
| 20815 | + unsigned char *ntlmchalresp, unsigned char p24[24]); |
| 20816 | +void SMBNTencrypt(unsigned char *passwd, unsigned char *c8, unsigned char *p24); |
| 20817 | +int decode_pw_buffer(char in_buffer[516], char *new_pwrd, |
| 20818 | + int new_pwrd_size, __u32 * new_pw_len); |
| 20819 | + |
| 20820 | +/* |
| 20821 | + This implements the X/Open SMB password encryption |
| 20822 | + It takes a password, a 8 byte "crypt key" and puts 24 bytes of |
| 20823 | + encrypted password into p24 */ |
| 20824 | +/* Note that password must be uppercased and null terminated */ |
| 20825 | +void |
| 20826 | +SMBencrypt(unsigned char *passwd, unsigned char *c8, unsigned char *p24) |
| 20827 | +{ |
| 20828 | + unsigned char p14[15], p21[21]; |
| 20829 | + |
| 20830 | + memset(p21, '\0', 21); |
| 20831 | + memset(p14, '\0', 14); |
| 20832 | + strncpy((char *) p14, (char *) passwd, 14); |
| 20833 | + |
| 20834 | +/* strupper((char *)p14); *//* BB at least uppercase the easy range */ |
| 20835 | + E_P16(p14, p21); |
| 20836 | + |
| 20837 | + SMBOWFencrypt(p21, c8, p24); |
| 20838 | + |
| 20839 | + memset(p14,0,15); |
| 20840 | + memset(p21,0,21); |
| 20841 | +} |
| 20842 | + |
| 20843 | +/* Routines for Windows NT MD4 Hash functions. */ |
| 20844 | +static int |
| 20845 | +_my_wcslen(__u16 * str) |
| 20846 | +{ |
| 20847 | + int len = 0; |
| 20848 | + while (*str++ != 0) |
| 20849 | + len++; |
| 20850 | + return len; |
| 20851 | +} |
| 20852 | + |
| 20853 | +/* |
| 20854 | + * Convert a string into an NT UNICODE string. |
| 20855 | + * Note that regardless of processor type |
| 20856 | + * this must be in intel (little-endian) |
| 20857 | + * format. |
| 20858 | + */ |
| 20859 | + |
| 20860 | +static int |
| 20861 | +_my_mbstowcs(__u16 * dst, const unsigned char *src, int len) |
| 20862 | +{ /* not a very good conversion routine - change/fix */ |
| 20863 | + int i; |
| 20864 | + __u16 val; |
| 20865 | + |
| 20866 | + for (i = 0; i < len; i++) { |
| 20867 | + val = *src; |
| 20868 | + SSVAL(dst, 0, val); |
| 20869 | + dst++; |
| 20870 | + src++; |
| 20871 | + if (val == 0) |
| 20872 | + break; |
| 20873 | + } |
| 20874 | + return i; |
| 20875 | +} |
| 20876 | + |
| 20877 | +/* |
| 20878 | + * Creates the MD4 Hash of the users password in NT UNICODE. |
| 20879 | + */ |
| 20880 | + |
| 20881 | +void |
| 20882 | +E_md4hash(const unsigned char *passwd, unsigned char *p16) |
| 20883 | +{ |
| 20884 | + int len; |
| 20885 | + __u16 wpwd[129]; |
| 20886 | + |
| 20887 | + /* Password cannot be longer than 128 characters */ |
| 20888 | + if(passwd) { |
| 20889 | + len = strlen((char *) passwd); |
| 20890 | + if (len > 128) { |
| 20891 | + len = 128; |
| 20892 | + } |
| 20893 | + /* Password must be converted to NT unicode */ |
| 20894 | + _my_mbstowcs(wpwd, passwd, len); |
| 20895 | + } else |
| 20896 | + len = 0; |
| 20897 | + |
| 20898 | + wpwd[len] = 0; /* Ensure string is null terminated */ |
| 20899 | + /* Calculate length in bytes */ |
| 20900 | + len = _my_wcslen(wpwd) * sizeof (__u16); |
| 20901 | + |
| 20902 | + mdfour(p16, (unsigned char *) wpwd, len); |
| 20903 | + memset(wpwd,0,129 * 2); |
| 20904 | +} |
| 20905 | + |
| 20906 | +/* Does both the NT and LM owfs of a user's password */ |
| 20907 | +void |
| 20908 | +nt_lm_owf_gen(char *pwd, unsigned char nt_p16[16], unsigned char p16[16]) |
| 20909 | +{ |
| 20910 | + char passwd[514]; |
| 20911 | + |
| 20912 | + memset(passwd, '\0', 514); |
| 20913 | + if (strlen(pwd) < 513) |
| 20914 | + strcpy(passwd, pwd); |
| 20915 | + else |
| 20916 | + memcpy(passwd, pwd, 512); |
| 20917 | + /* Calculate the MD4 hash (NT compatible) of the password */ |
| 20918 | + memset(nt_p16, '\0', 16); |
| 20919 | + E_md4hash(passwd, nt_p16); |
| 20920 | + |
| 20921 | + /* Mangle the passwords into Lanman format */ |
| 20922 | + passwd[14] = '\0'; |
| 20923 | +/* strupper(passwd); */ |
| 20924 | + |
| 20925 | + /* Calculate the SMB (lanman) hash functions of the password */ |
| 20926 | + |
| 20927 | + memset(p16, '\0', 16); |
| 20928 | + E_P16((unsigned char *) passwd, (unsigned char *) p16); |
| 20929 | + |
| 20930 | + /* clear out local copy of user's password (just being paranoid). */ |
| 20931 | + memset(passwd, '\0', sizeof (passwd)); |
| 20932 | +} |
| 20933 | + |
| 20934 | +/* Does the NTLMv2 owfs of a user's password */ |
| 20935 | +void |
| 20936 | +ntv2_owf_gen(const unsigned char owf[16], const char *user_n, |
| 20937 | + const char *domain_n, unsigned char kr_buf[16], |
| 20938 | + const struct nls_table *nls_codepage) |
| 20939 | +{ |
| 20940 | + wchar_t * user_u; |
| 20941 | + wchar_t * dom_u; |
| 20942 | + int user_l, domain_l; |
| 20943 | + struct HMACMD5Context ctx; |
| 20944 | + |
| 20945 | + /* might as well do one alloc to hold both (user_u and dom_u) */ |
| 20946 | + user_u = kmalloc(2048 * sizeof(wchar_t),GFP_KERNEL); |
| 20947 | + if(user_u == NULL) |
| 20948 | + return; |
| 20949 | + dom_u = user_u + 1024; |
| 20950 | + |
| 20951 | + /* push_ucs2(NULL, user_u, user_n, (user_l+1)*2, STR_UNICODE|STR_NOALIGN|STR_TERMINATE|STR_UPPER); |
| 20952 | + push_ucs2(NULL, dom_u, domain_n, (domain_l+1)*2, STR_UNICODE|STR_NOALIGN|STR_TERMINATE|STR_UPPER); */ |
| 20953 | + |
| 20954 | + /* BB user and domain may need to be uppercased */ |
| 20955 | + user_l = cifs_strtoUCS(user_u, user_n, 511, nls_codepage); |
| 20956 | + domain_l = cifs_strtoUCS(dom_u, domain_n, 511, nls_codepage); |
| 20957 | + |
| 20958 | + user_l++; /* trailing null */ |
| 20959 | + domain_l++; |
| 20960 | + |
| 20961 | + hmac_md5_init_limK_to_64(owf, 16, &ctx); |
| 20962 | + hmac_md5_update((const unsigned char *) user_u, user_l * 2, &ctx); |
| 20963 | + hmac_md5_update((const unsigned char *) dom_u, domain_l * 2, &ctx); |
| 20964 | + hmac_md5_final(kr_buf, &ctx); |
| 20965 | + |
| 20966 | + kfree(user_u); |
| 20967 | +} |
| 20968 | + |
| 20969 | +/* Does the des encryption from the NT or LM MD4 hash. */ |
| 20970 | +void |
| 20971 | +SMBOWFencrypt(unsigned char passwd[16], unsigned char *c8, |
| 20972 | + unsigned char p24[24]) |
| 20973 | +{ |
| 20974 | + unsigned char p21[21]; |
| 20975 | + |
| 20976 | + memset(p21, '\0', 21); |
| 20977 | + |
| 20978 | + memcpy(p21, passwd, 16); |
| 20979 | + E_P24(p21, c8, p24); |
| 20980 | +} |
| 20981 | + |
| 20982 | +/* Does the des encryption from the FIRST 8 BYTES of the NT or LM MD4 hash. */ |
| 20983 | +void |
| 20984 | +NTLMSSPOWFencrypt(unsigned char passwd[8], |
| 20985 | + unsigned char *ntlmchalresp, unsigned char p24[24]) |
| 20986 | +{ |
| 20987 | + unsigned char p21[21]; |
| 20988 | + |
| 20989 | + memset(p21, '\0', 21); |
| 20990 | + memcpy(p21, passwd, 8); |
| 20991 | + memset(p21 + 8, 0xbd, 8); |
| 20992 | + |
| 20993 | + E_P24(p21, ntlmchalresp, p24); |
| 20994 | +} |
| 20995 | + |
| 20996 | +/* Does the NT MD4 hash then des encryption. */ |
| 20997 | + |
| 20998 | +void |
| 20999 | +SMBNTencrypt(unsigned char *passwd, unsigned char *c8, unsigned char *p24) |
| 21000 | +{ |
| 21001 | + unsigned char p21[21]; |
| 21002 | + |
| 21003 | + memset(p21, '\0', 21); |
| 21004 | + |
| 21005 | + E_md4hash(passwd, p21); |
| 21006 | + SMBOWFencrypt(p21, c8, p24); |
| 21007 | +} |
| 21008 | + |
| 21009 | +/* Does the md5 encryption from the NT hash for NTLMv2. */ |
| 21010 | +void |
| 21011 | +SMBOWFencrypt_ntv2(const unsigned char kr[16], |
| 21012 | + const struct data_blob * srv_chal, |
| 21013 | + const struct data_blob * cli_chal, unsigned char resp_buf[16]) |
| 21014 | +{ |
| 21015 | + struct HMACMD5Context ctx; |
| 21016 | + |
| 21017 | + hmac_md5_init_limK_to_64(kr, 16, &ctx); |
| 21018 | + hmac_md5_update(srv_chal->data, srv_chal->length, &ctx); |
| 21019 | + hmac_md5_update(cli_chal->data, cli_chal->length, &ctx); |
| 21020 | + hmac_md5_final(resp_buf, &ctx); |
| 21021 | +} |
| 21022 | + |
| 21023 | +void |
| 21024 | +SMBsesskeygen_ntv2(const unsigned char kr[16], |
| 21025 | + const unsigned char *nt_resp, __u8 sess_key[16]) |
| 21026 | +{ |
| 21027 | + struct HMACMD5Context ctx; |
| 21028 | + |
| 21029 | + hmac_md5_init_limK_to_64(kr, 16, &ctx); |
| 21030 | + hmac_md5_update(nt_resp, 16, &ctx); |
| 21031 | + hmac_md5_final((unsigned char *) sess_key, &ctx); |
| 21032 | +} |
| 21033 | + |
| 21034 | +void |
| 21035 | +SMBsesskeygen_ntv1(const unsigned char kr[16], |
| 21036 | + const unsigned char *nt_resp, __u8 sess_key[16]) |
| 21037 | +{ |
| 21038 | + mdfour((unsigned char *) sess_key, (unsigned char *) kr, 16); |
| 21039 | +} |
| 21040 | --- /dev/null |
| 21041 | +++ b/fs/cifs/smberr.c |
| 21042 | @@ -0,0 +1,240 @@ |
| 21043 | +/* |
| 21044 | + Unix SMB/Netbios implementation. |
| 21045 | + Version 1.9. |
| 21046 | + Copyright (C) Andrew Tridgell 1998 |
| 21047 | + Copyright (C) Steve French (sfrench@us.ibm.com) 2002 |
| 21048 | + This program is free software; you can redistribute it and/or modify |
| 21049 | + it under the terms of the GNU General Public License as published by |
| 21050 | + the Free Software Foundation; either version 2 of the License, or |
| 21051 | + (at your option) any later version. |
| 21052 | + |
| 21053 | + This program is distributed in the hope that it will be useful, |
| 21054 | + but WITHOUT ANY WARRANTY; without even the implied warranty of |
| 21055 | + MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the |
| 21056 | + GNU General Public License for more details. |
| 21057 | + |
| 21058 | + You should have received a copy of the GNU General Public License |
| 21059 | + along with this program; if not, write to the Free Software |
| 21060 | + Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA. |
| 21061 | +*/ |
| 21062 | +include "smberr.h" |
| 21063 | +#define NO_SYSLOG |
| 21064 | +/* error code stuff - put together by Merik Karman |
| 21065 | + merik@blackadder.dsh.oz.au */ |
| 21066 | + typedef const struct { |
| 21067 | + char *name; |
| 21068 | + int code; |
| 21069 | + char *message; |
| 21070 | + int posix_code; |
| 21071 | +} err_code_struct; |
| 21072 | + |
| 21073 | +/* Dos Error Messages */ |
| 21074 | +err_code_struct dos_msgs[] = { |
| 21075 | + {"ERRbadfunc", ERRbadfunc, "Invalid function.", -EINVAL}, |
| 21076 | + {"ERRbadfile", ERRbadfile, "File not found.", -ENOENT}, |
| 21077 | + {"ERRbadpath", ERRbadpath, "Directory invalid.", -ENOENT}, |
| 21078 | + {"ERRnofids", ERRnofids, "No file descriptors available", -EMFILE}, |
| 21079 | + {"ERRnoaccess", ERRnoaccess, "Access denied.", -EACCES}, |
| 21080 | + {"ERRbadfid", ERRbadfid, "Invalid file handle.", -EBADF}, |
| 21081 | + {"ERRbadmcb", 7, "Memory control blocks destroyed.", -EIO}, |
| 21082 | + {"ERRnomem", ERRnomem, |
| 21083 | + "Insufficient server memory to perform the requested function.", |
| 21084 | + -ENOMEM}, |
| 21085 | + {"ERRbadmem", ERRbadmem, "Invalid memory block address.", -EFAULT}, |
| 21086 | + {"ERRbadenv", ERRbadenv, "Invalid environment.", -EFAULT}, |
| 21087 | + {"ERRbadformat", 11, "Invalid format.", -EINVAL}, |
| 21088 | + {"ERRbadaccess", ERRbadaccess, "Invalid open mode." - EACCES}, |
| 21089 | + {"ERRbaddata", ERRbaddata, "Invalid data.", -EIO}, |
| 21090 | + {"ERR", ERRres, "reserved.", -EIO}, |
| 21091 | + {"ERRbaddrive", ERRbaddrive, "Invalid drive specified.", -ENXIO}, |
| 21092 | + {"ERRremcd", ERRremcd, |
| 21093 | + "A Delete Directory request attempted to remove the server's current directory.", |
| 21094 | + -EIO}, |
| 21095 | + {"ERRdiffdevice", ERRdiffdevice, "Not same device.", -EXDEV}, |
| 21096 | + {"ERRnofiles", ERRnofiles, "A File Search command can find no more files matching the specified criteria.", -ENOENT}, /* Note: must map to zero manually in some places such as readdir */ |
| 21097 | + {"ERRbadshare", ERRbadshare, |
| 21098 | + "The sharing mode specified for an Open conflicts with existing FIDs on the file.", |
| 21099 | + -EXTBSY}, |
| 21100 | + {"ERRlock", ERRlock, |
| 21101 | + "A Lock request conflicted with an existing lock or specified an invalid mode, or an Unlock requested attempted to remove a lock held by another process.", |
| 21102 | + -EACCES}, |
| 21103 | + {"ERRunsup", ERRunsup, "The operation is unsupported", -EINVAL}, |
| 21104 | + {"ERRnosuchshare", ERRnosuchshare, |
| 21105 | + "You specified an invalid share name", -ENXIO}, |
| 21106 | + {"ERRfilexists", ERRfilexists, |
| 21107 | + "The file named in a Create Directory, Make New File or Link request already exists.", |
| 21108 | + -EEXIST}, |
| 21109 | + {"ERRinvalidname", ERRinvalidname, "Invalid name", -ENOENT}, |
| 21110 | + {"ERRdiskfull", ERRdiskfull, "Disk full", -ENOSPC} |
| 21111 | + |
| 21112 | + {"ERRmoredata", ERRmoredata, |
| 21113 | + "There is more data to be returned.",}, |
| 21114 | + {"ERRinvgroup", 2455, "Invalid workgroup (try the -W option)"}, |
| 21115 | + {NULL, -1, NULL, -EIO} |
| 21116 | +}; |
| 21117 | + |
| 21118 | +/* Server Error Messages */ |
| 21119 | +err_code_struct server_msgs[] = { |
| 21120 | + {"ERRerror", 1, "Non-specific error code."}, |
| 21121 | + {"ERRbadpw", 2, |
| 21122 | + "Bad password - name/password pair in a Tree Connect or Session Setup are invalid."}, |
| 21123 | + {"ERRbadtype", 3, "reserved."}, |
| 21124 | + {"ERRaccess", 4, |
| 21125 | + "The requester does not have the necessary access rights within the specified context for the requested function. The context is defined by the TID or the UID."}, |
| 21126 | + {"ERRinvnid", 5, |
| 21127 | + "The tree ID (TID) specified in a command was invalid."}, |
| 21128 | + {"ERRinvnetname", 6, "Invalid network name in tree connect."}, |
| 21129 | + {"ERRinvdevice", 7, |
| 21130 | + "Invalid device - printer request made to non-printer connection or non-printer request made to printer connection."}, |
| 21131 | + {"ERRqfull", 49, |
| 21132 | + "Print queue full (files) -- returned by open print file."}, |
| 21133 | + {"ERRqtoobig", 50, "Print queue full -- no space."}, |
| 21134 | + {"ERRqeof", 51, "EOF on print queue dump."}, |
| 21135 | + {"ERRinvpfid", 52, "Invalid print file FID."}, |
| 21136 | + {"ERRsmbcmd", 64, |
| 21137 | + "The server did not recognize the command received."}, |
| 21138 | + {"ERRsrverror", 65, |
| 21139 | + "The server encountered an internal error, e.g., system file unavailable."}, |
| 21140 | + {"ERRfilespecs", 67, |
| 21141 | + "The file handle (FID) and pathname parameters contained an invalid combination of values."}, |
| 21142 | + {"ERRreserved", 68, "reserved."}, |
| 21143 | + {"ERRbadpermits", 69, |
| 21144 | + "The access permissions specified for a file or directory are not a valid combination. The server cannot set the requested attribute."}, |
| 21145 | + {"ERRreserved", 70, "reserved."}, |
| 21146 | + {"ERRsetattrmode", 71, |
| 21147 | + "The attribute mode in the Set File Attribute request is invalid."}, |
| 21148 | + {"ERRpaused", 81, "Server is paused."}, |
| 21149 | + {"ERRmsgoff", 82, "Not receiving messages."}, |
| 21150 | + {"ERRnoroom", 83, "No room to buffer message."}, |
| 21151 | + {"ERRrmuns", 87, "Too many remote user names."}, |
| 21152 | + {"ERRtimeout", 88, "Operation timed out."}, |
| 21153 | + {"ERRnoresource", 89, |
| 21154 | + "No resources currently available for request."}, |
| 21155 | + {"ERRtoomanyuids", 90, "Too many UIDs active on this session."}, |
| 21156 | + {"ERRbaduid", 91, |
| 21157 | + "The UID is not known as a valid ID on this session."}, |
| 21158 | + {"ERRusempx", 250, "Temp unable to support Raw, use MPX mode."}, |
| 21159 | + {"ERRusestd", 251, |
| 21160 | + "Temp unable to support Raw, use standard read/write."}, |
| 21161 | + {"ERRcontmpx", 252, "Continue in MPX mode."}, |
| 21162 | + {"ERRreserved", 253, "reserved."}, |
| 21163 | + {"ERRreserved", 254, "reserved."}, |
| 21164 | + {"ERRnosupport", 0xFFFF, "Function not supported."}, |
| 21165 | + {NULL, -1, NULL} |
| 21166 | +}; |
| 21167 | + |
| 21168 | +/* Hard Error Messages */ |
| 21169 | +err_code_struct hard_msgs[] = { |
| 21170 | + {"ERRnowrite", 19, |
| 21171 | + "Attempt to write on write-protected diskette."}, |
| 21172 | + {"ERRbadunit", 20, "Unknown unit."}, |
| 21173 | + {"ERRnotready", 21, "Drive not ready."}, |
| 21174 | + {"ERRbadcmd", 22, "Unknown command."}, |
| 21175 | + {"ERRdata", 23, "Data error (CRC)."}, |
| 21176 | + {"ERRbadreq", 24, "Bad request structure length."}, |
| 21177 | + {"ERRseek", 25, "Seek error."}, |
| 21178 | + {"ERRbadmedia", 26, "Unknown media type."}, |
| 21179 | + {"ERRbadsector", 27, "Sector not found."}, |
| 21180 | + {"ERRnopaper", 28, "Printer out of paper."}, |
| 21181 | + {"ERRwrite", 29, "Write fault."}, |
| 21182 | + {"ERRread", 30, "Read fault."}, |
| 21183 | + {"ERRgeneral", 31, "General failure."}, |
| 21184 | + {"ERRbadshare", 32, "An open conflicts with an existing open."}, |
| 21185 | + {"ERRlock", 33, |
| 21186 | + "A Lock request conflicted with an existing lock or specified an invalid mode, or an Unlock requested attempted to remove a lock held by another process."}, |
| 21187 | + {"ERRwrongdisk", 34, "The wrong disk was found in a drive."}, |
| 21188 | + {"ERRFCBUnavail", 35, "No FCBs are available to process request."}, |
| 21189 | + {"ERRsharebufexc", 36, "A sharing buffer has been exceeded."}, |
| 21190 | + {NULL, -1, NULL} |
| 21191 | +}; |
| 21192 | + |
| 21193 | + |
| 21194 | +const struct { |
| 21195 | + int code; |
| 21196 | + char *class; |
| 21197 | + err_code_struct *err_msgs; |
| 21198 | +} err_classes[] = { |
| 21199 | + { |
| 21200 | + 0, "SUCCESS", NULL}, { |
| 21201 | + 0x01, "ERRDOS", dos_msgs}, { |
| 21202 | + 0x02, "ERRSRV", server_msgs}, { |
| 21203 | + 0x03, "ERRHRD", hard_msgs}, { |
| 21204 | + 0x04, "ERRXOS", NULL}, { |
| 21205 | + 0xE1, "ERRRMX1", NULL}, { |
| 21206 | + 0xE2, "ERRRMX2", NULL}, { |
| 21207 | + 0xE3, "ERRRMX3", NULL}, { |
| 21208 | + 0xFF, "ERRCMD", NULL}, { |
| 21209 | +-1, NULL, NULL}}; |
| 21210 | + |
| 21211 | + |
| 21212 | +/**************************************************************************** |
| 21213 | +return a SMB error string from a SMB buffer |
| 21214 | +****************************************************************************/ |
| 21215 | +char *smb_dos_errstr(char *inbuf) |
| 21216 | +{ |
| 21217 | + static pstring ret; |
| 21218 | + int class = CVAL(inbuf, smb_rcls); |
| 21219 | + int num = SVAL(inbuf, smb_err); |
| 21220 | + int i, j; |
| 21221 | + |
| 21222 | + for (i = 0; err_classes[i].class; i++) |
| 21223 | + if (err_classes[i].code == class) { |
| 21224 | + if (err_classes[i].err_msgs) { |
| 21225 | + err_code_struct *err = |
| 21226 | + err_classes[i].err_msgs; |
| 21227 | + for (j = 0; err[j].name; j++) |
| 21228 | + if (num == err[j].code) { |
| 21229 | + if (DEBUGLEVEL > 0) |
| 21230 | + slprintf(ret, |
| 21231 | + sizeof |
| 21232 | + (ret) - 1, |
| 21233 | + "%s - %s (%s)", |
| 21234 | + err_classes |
| 21235 | + [i].class, |
| 21236 | + err[j]. |
| 21237 | + name, |
| 21238 | + err[j]. |
| 21239 | + message); |
| 21240 | + else |
| 21241 | + slprintf(ret, |
| 21242 | + sizeof |
| 21243 | + (ret) - 1, |
| 21244 | + "%s - %s", |
| 21245 | + err_classes |
| 21246 | + [i].class, |
| 21247 | + err[j]. |
| 21248 | + name); |
| 21249 | + return ret; |
| 21250 | + } |
| 21251 | + } |
| 21252 | + |
| 21253 | + slprintf(ret, sizeof(ret) - 1, "%s - %d", |
| 21254 | + err_classes[i].class, num); |
| 21255 | + return ret; |
| 21256 | + } |
| 21257 | + |
| 21258 | + slprintf(ret, sizeof(ret) - 1, "Error: Unknown error (%d,%d)", |
| 21259 | + class, num); |
| 21260 | + return (ret); |
| 21261 | +} |
| 21262 | + |
| 21263 | + |
| 21264 | +/***************************************************************************** |
| 21265 | + returns an WERROR error message. |
| 21266 | + *****************************************************************************/ |
| 21267 | +char *werror_str(WERROR status) |
| 21268 | +{ |
| 21269 | + static fstring msg; |
| 21270 | + slprintf(msg, sizeof(msg), "WIN32 code 0x%08x", W_ERROR_V(status)); |
| 21271 | + return msg; |
| 21272 | +} |
| 21273 | + |
| 21274 | + |
| 21275 | +/***************************************************************************** |
| 21276 | +map a unix errno to a win32 error |
| 21277 | + *****************************************************************************/ |
| 21278 | +WERROR map_werror_from_unix(int error) |
| 21279 | +{ |
| 21280 | + NTSTATUS status = map_nt_error_from_unix(error); |
| 21281 | + return ntstatus_to_werror(status); |
| 21282 | +} |
| 21283 | --- /dev/null |
| 21284 | +++ b/fs/cifs/smberr.h |
| 21285 | @@ -0,0 +1,113 @@ |
| 21286 | +/* |
| 21287 | + * fs/cifs/smberr.h |
| 21288 | + * |
| 21289 | + * Copyright (c) International Business Machines Corp., 2002 |
| 21290 | + * Author(s): Steve French (sfrench@us.ibm.com) |
| 21291 | + * |
| 21292 | + * See Error Codes section of the SNIA CIFS Specification |
| 21293 | + * for more information |
| 21294 | + * |
| 21295 | + * This library is free software; you can redistribute it and/or modify |
| 21296 | + * it under the terms of the GNU Lesser General Public License as published |
| 21297 | + * by the Free Software Foundation; either version 2.1 of the License, or |
| 21298 | + * (at your option) any later version. |
| 21299 | + * |
| 21300 | + * This library is distributed in the hope that it will be useful, |
| 21301 | + * but WITHOUT ANY WARRANTY; without even the implied warranty of |
| 21302 | + * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See |
| 21303 | + * the GNU Lesser General Public License for more details. |
| 21304 | + * |
| 21305 | + * You should have received a copy of the GNU Lesser General Public License |
| 21306 | + * along with this library; if not, write to the Free Software |
| 21307 | + * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA |
| 21308 | + */ |
| 21309 | + |
| 21310 | +#define SUCCESS 0 /* The request was successful. */ |
| 21311 | +#define ERRDOS 0x01 /* Error is from the core DOS operating system set */ |
| 21312 | +#define ERRSRV 0x02 /* Error is generated by the file server daemon */ |
| 21313 | +#define ERRHRD 0x03 /* Error is a hardware error. */ |
| 21314 | +#define ERRCMD 0xFF /* Command was not in the "SMB" format. */ |
| 21315 | + |
| 21316 | +/* The following error codes may be generated with the SUCCESS error class.*/ |
| 21317 | + |
| 21318 | +#define SUCCESS 0 /* The request was successful. */ |
| 21319 | + |
| 21320 | +/* The following error codes may be generated with the ERRDOS error class.*/ |
| 21321 | + |
| 21322 | +#define ERRbadfunc 1 /* Invalid function. The server did not recognize or could not perform a system call generated by the server, e.g., set the DIRECTORY attribute on a data file, invalid seek mode. */ |
| 21323 | +#define ERRbadfile 2 /*File not found. The last component of a file's pathname could not be found. */ |
| 21324 | +#define ERRbadpath 3 /* Directory invalid. A directory component in a pathname could not be found. */ |
| 21325 | +#define ERRnofids 4 /* Too many open files. The server has no file handles available. */ |
| 21326 | +#define ERRnoaccess 5 /* Access denied, the client's context does not permit the requested function. This includes the following conditions: invalid rename command, write to Fid open for read only, read on Fid open for write only, attempt to delete a non-empty directory */ |
| 21327 | +#define ERRbadfid 6 /* Invalid file handle. The file handle specified was not recognized by the server. */ |
| 21328 | +#define ERRbadmcb 7 /* Memory control blocks destroyed. */ |
| 21329 | +#define ERRnomem 8 /* Insufficient server memory to perform the requested function. */ |
| 21330 | +#define ERRbadmem 9 /* Invalid memory block address. */ |
| 21331 | +#define ERRbadenv 10 /* Invalid environment. */ |
| 21332 | +#define ERRbadformat 11 /* Invalid format. */ |
| 21333 | +#define ERRbadaccess 12 /* Invalid open mode. */ |
| 21334 | +#define ERRbaddata 13 /* Invalid data (generated only by IOCTL calls within the server). */ |
| 21335 | +#define ERRbaddrive 15 /* Invalid drive specified. */ |
| 21336 | +#define ERRremcd 16 /* A Delete Directory request attempted to remove the server's current directory. */ |
| 21337 | +#define ERRdiffdevice 17 /* Not same device (e.g., a cross volume rename was attempted */ |
| 21338 | +#define ERRnofiles 18 /* A File Search command can find no more files matching the specified criteria. */ |
| 21339 | +#define ERRgeneral 31 |
| 21340 | +#define ERRbadshare 32 /* The sharing mode specified for an Open conflicts with existing FIDs on the file. */ |
| 21341 | +#define ERRlock 33 /* A Lock request conflicted with an existing lock or specified an invalid mode, or an Unlock requested attempted to remove a lock held by another process. */ |
| 21342 | +#define ERRunsup 50 |
| 21343 | +#define ERRnosuchshare 67 |
| 21344 | +#define ERRfilexists 80 /* The file named in the request already exists. */ |
| 21345 | +#define ERRinvparm 87 |
| 21346 | +#define ERRdiskfull 112 |
| 21347 | +#define ERRinvname 123 |
| 21348 | +#define ERRdirnotempty 145 |
| 21349 | +#define ERRnotlocked 158 |
| 21350 | +#define ERRalreadyexists 183 |
| 21351 | +#define ERRbadpipe 230 |
| 21352 | +#define ERRpipebusy 231 |
| 21353 | +#define ERRpipeclosing 232 |
| 21354 | +#define ERRnotconnected 233 |
| 21355 | +#define ERRmoredata 234 |
| 21356 | +#define ErrQuota 0x200 /* The operation would cause a quota limit to be exceeded. */ |
| 21357 | +#define ErrNotALink 0x201 /* A link operation was performed on a pathname that |
| 21358 | + was not a link. */ |
| 21359 | + |
| 21360 | +/* Following error codes may be generated with the ERRSRV error |
| 21361 | +class.*/ |
| 21362 | + |
| 21363 | +#define ERRerror 1 /* Non-specific error code. It is returned under the following conditions: resource other than disk space exhausted (e.g. TIDs), first SMB command was not negotiate, multiple negotiates attempted, and internal server error. */ |
| 21364 | +#define ERRbadpw 2 /* Bad password - name/password pair in a TreeConnect or Session Setup are invalid. */ |
| 21365 | +#define ERRbadtype 3 /* used for indicating DFS referral needed */ |
| 21366 | +#define ERRaccess 4 /* The client does not have the necessary access rights within the specified context for requested function. */ |
| 21367 | +#define ERRinvtid 5 /* The Tid specified in a command was invalid. */ |
| 21368 | +#define ERRinvnetname 6 /* Invalid network name in tree connect. */ |
| 21369 | +#define ERRinvdevice 7 /* Invalid device - printer request made to non-printer connection or non-printer request made to printer connection. */ |
| 21370 | +#define ERRqfull 49 /* Print queue full (files) -- returned by open print file. */ |
| 21371 | +#define ERRqtoobig 50 /* Print queue full -- no space. */ |
| 21372 | +#define ERRqeof 51 /* EOF on print queue dump */ |
| 21373 | +#define ERRinvpfid 52 /* Invalid print file FID. */ |
| 21374 | +#define ERRsmbcmd 64 /* The server did not recognize the command received. */ |
| 21375 | +#define ERRsrverror 65 /* The server encountered an internal error, e.g., system file unavailable. */ |
| 21376 | +#define ERRbadBID 66 /* (obsolete) */ |
| 21377 | +#define ERRfilespecs 67 /* The Fid and pathname parameters contained an invalid combination of values. */ |
| 21378 | +#define ERRbadLink 68 /* (obsolete) */ |
| 21379 | +#define ERRbadpermits 69 /* The access permissions specified for a file or directory are not a valid combination. */ |
| 21380 | +#define ERRbadPID 70 |
| 21381 | +#define ERRsetattrmode 71 /* attribute (mode) is invalid */ |
| 21382 | +#define ERRpaused 81 /* Server is paused */ |
| 21383 | +#define ERRmsgoff 82 /* reserved - messaging off */ |
| 21384 | +#define ERRnoroom 83 /* reserved - no room for message */ |
| 21385 | +#define ERRrmuns 87 /* reserved - too many remote names */ |
| 21386 | +#define ERRtimeout 88 /* operation timed out */ |
| 21387 | +#define ERRnoresource 89 /* No resources available for request */ |
| 21388 | +#define ERRtoomanyuids 90 /* Too many UIDs active on this session */ |
| 21389 | +#define ERRbaduid 91 /* The UID is not known as a valid user */ |
| 21390 | +#define ERRusempx 250 /* temporarily unable to use raw */ |
| 21391 | +#define ERRusestd 251 /* temporarily unable to use either raw or mpx */ |
| 21392 | +#define ERR_NOTIFY_ENUM_DIR 1024 |
| 21393 | +#define ERRaccountexpired 2239 |
| 21394 | +#define ERRbadclient 2240 |
| 21395 | +#define ERRbadLogonTime 2241 |
| 21396 | +#define ERRpasswordExpired 2242 |
| 21397 | +#define ERRnetlogonNotStarted 2455 |
| 21398 | +#define ERRnosupport 0xFFFF |
| 21399 | --- /dev/null |
| 21400 | +++ b/fs/cifs/TODO |
| 21401 | @@ -0,0 +1,106 @@ |
| 21402 | +version 1.16 May 27, 2004 |
| 21403 | + |
| 21404 | +A Partial List of Missing Features |
| 21405 | +================================== |
| 21406 | + |
| 21407 | +Contributions are welcome. There are plenty of opportunities |
| 21408 | +for visible, important contributions to this module. Here |
| 21409 | +is a partial list of the known problems and missing features: |
| 21410 | + |
| 21411 | +a) Support for SecurityDescriptors for chmod/chgrp/chown so |
| 21412 | +these can be supported for Windows servers |
| 21413 | + |
| 21414 | +b) Better pam/winbind integration |
| 21415 | + |
| 21416 | +c) multi-user mounts - multiplexed sessionsetups over single vc |
| 21417 | +(ie tcp session) - prettying up needed |
| 21418 | + |
| 21419 | +d) Kerberos/SPNEGO session setup support - (started) |
| 21420 | + |
| 21421 | +e) NTLMv2 authentication (mostly implemented) |
| 21422 | + |
| 21423 | +f) MD5-HMAC signing SMB PDUs when SPNEGO style SessionSetup |
| 21424 | +used (Kerberos or NTLMSSP). Signing alreadyimplemented for NTLM |
| 21425 | +and raw NTLMSSP already. This is important when enabling |
| 21426 | +extended security and mounting to Windows 2003 Servers |
| 21427 | + |
| 21428 | +f) Directory entry caching relies on a 1 second timer, rather than |
| 21429 | +using FindNotify or equivalent. - (started) |
| 21430 | + |
| 21431 | +g) A few byte range testcases fail due to POSIX vs. Windows/CIFS |
| 21432 | +style byte range lock differences |
| 21433 | + |
| 21434 | +h) quota support |
| 21435 | + |
| 21436 | +i) support for the Linux 2.5 kernel new feature get_xattr and set_xattr |
| 21437 | +which will allow us to expose dos attributes as well as real |
| 21438 | +ACLs. This support has been started in the current code, but is |
| 21439 | +ifdeffed out. |
| 21440 | + |
| 21441 | +k) finish writepages support (multi-page write behind for improved |
| 21442 | +performance) and syncpage |
| 21443 | + |
| 21444 | +l) hook lower into the sockets api (as NFS/SunRPC does) to avoid the |
| 21445 | +extra copy in/out of the socket buffers in some cases. |
| 21446 | + |
| 21447 | +m) finish support for IPv6. This is mostly complete but |
| 21448 | +needs a simple inet_pton like function to convert ipv6 |
| 21449 | +addresses in string representation. |
| 21450 | + |
| 21451 | +o) Better optimize open (and pathbased setfilesize) to reduce the |
| 21452 | +oplock breaks coming from windows srv. Piggyback identical file |
| 21453 | +opens on top of each other by incrementing reference count rather |
| 21454 | +than resending (helps reduce server resource utilization and avoid |
| 21455 | +spurious oplock breaks). |
| 21456 | + |
| 21457 | +p) Improve performance of readpages by sending more than one read |
| 21458 | +at a time when 8 pages or more are requested. Evaluate whether |
| 21459 | +reads larger than 16K would be helpful. |
| 21460 | + |
| 21461 | +q) For support of Windows9x/98 we need to retry failed mounts |
| 21462 | +to *SMBSERVER (default server name) with the uppercase hostname |
| 21463 | +in the RFC1001 session_init request. |
| 21464 | + |
| 21465 | +r) Add Extended Attributed support (for storing UID/GID info |
| 21466 | +to Windows servers) |
| 21467 | + |
| 21468 | +s) Finish fcntl D_NOTIFY support so kde and gnome file list windows |
| 21469 | +will autorefresh |
| 21470 | + |
| 21471 | +t) Add GUI tool to configure /proc/fs/cifs settings and for display of |
| 21472 | +the CIFS statistics |
| 21473 | + |
| 21474 | +KNOWN BUGS (updated May 27, 2004) |
| 21475 | +==================================== |
| 21476 | +1) existing symbolic links (Windows reparse points) are recognized but |
| 21477 | +can not be created remotely. They are implemented for Samba and those that |
| 21478 | +support the CIFS Unix extensions but Samba has a bug currently handling |
| 21479 | +symlink text beginning with slash |
| 21480 | +2) follow_link and readdir code does not follow dfs junctions |
| 21481 | +but recognizes them |
| 21482 | +3) create of new files to FAT partitions on Windows servers can |
| 21483 | +succeed but still return access denied (appears to be Windows |
| 21484 | +server not cifs client problem) and has not been reproduced recently. |
| 21485 | +NTFS partitions do not have this problem. |
| 21486 | +4) debug connectathon lock test case 10 which fails against |
| 21487 | +Samba (may be unmappable due to POSIX to Windows lock model |
| 21488 | +differences but worth investigating). Also debug Samba to |
| 21489 | +see why lock test case 7 takes longer to complete to Samba |
| 21490 | +than to Windows. |
| 21491 | + |
| 21492 | +Misc testing to do |
| 21493 | +================== |
| 21494 | +1) check out max path names and max path name components against various server |
| 21495 | +types. Try nested symlinks. Return max path name in stat -f information |
| 21496 | + |
| 21497 | +2) Modify file portion of ltp so it can run against a mounted network |
| 21498 | +share and run it against cifs vfs. |
| 21499 | + |
| 21500 | +3) Additional performance testing and optimization using iozone and similar - |
| 21501 | +there are some easy changes that can be done to parallelize sequential writes, |
| 21502 | +and when signing is disabled to request larger read sizes (larger than |
| 21503 | +negotiated size) and send larger write sizes to modern servers. |
| 21504 | + |
| 21505 | +4) More exhaustively test the recently added NT4 support against various |
| 21506 | +NT4 service pack levels. |
| 21507 | + |
| 21508 | --- /dev/null |
| 21509 | +++ b/fs/cifs/transport.c |
| 21510 | @@ -0,0 +1,434 @@ |
| 21511 | +/* |
| 21512 | + * fs/cifs/transport.c |
| 21513 | + * |
| 21514 | + * Copyright (C) International Business Machines Corp., 2002,2004 |
| 21515 | + * Author(s): Steve French (sfrench@us.ibm.com) |
| 21516 | + * |
| 21517 | + * This library is free software; you can redistribute it and/or modify |
| 21518 | + * it under the terms of the GNU Lesser General Public License as published |
| 21519 | + * by the Free Software Foundation; either version 2.1 of the License, or |
| 21520 | + * (at your option) any later version. |
| 21521 | + * |
| 21522 | + * This library is distributed in the hope that it will be useful, |
| 21523 | + * but WITHOUT ANY WARRANTY; without even the implied warranty of |
| 21524 | + * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See |
| 21525 | + * the GNU Lesser General Public License for more details. |
| 21526 | + * |
| 21527 | + * You should have received a copy of the GNU Lesser General Public License |
| 21528 | + * along with this library; if not, write to the Free Software |
| 21529 | + * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA |
| 21530 | + */ |
| 21531 | + |
| 21532 | +#include <linux/fs.h> |
| 21533 | +#include <linux/list.h> |
| 21534 | +#include <linux/wait.h> |
| 21535 | +#include <linux/net.h> |
| 21536 | +#include <linux/version.h> |
| 21537 | +#include <asm/uaccess.h> |
| 21538 | +#include <asm/processor.h> |
| 21539 | +#include "cifspdu.h" |
| 21540 | +#include "cifsglob.h" |
| 21541 | +#include "cifsproto.h" |
| 21542 | +#include "cifs_debug.h" |
| 21543 | + |
| 21544 | +extern kmem_cache_t *cifs_mid_cachep; |
| 21545 | +extern kmem_cache_t *cifs_oplock_cachep; |
| 21546 | + |
| 21547 | +struct mid_q_entry * |
| 21548 | +AllocMidQEntry(struct smb_hdr *smb_buffer, struct cifsSesInfo *ses) |
| 21549 | +{ |
| 21550 | + struct mid_q_entry *temp; |
| 21551 | + |
| 21552 | + if (ses == NULL) { |
| 21553 | + cERROR(1, ("Null session passed in to AllocMidQEntry ")); |
| 21554 | + return NULL; |
| 21555 | + } |
| 21556 | + if (ses->server == NULL) { |
| 21557 | + cERROR(1, ("Null TCP session in AllocMidQEntry")); |
| 21558 | + return NULL; |
| 21559 | + } |
| 21560 | + |
| 21561 | + temp = (struct mid_q_entry *) kmem_cache_alloc(cifs_mid_cachep, |
| 21562 | + SLAB_KERNEL); |
| 21563 | + if (temp == NULL) |
| 21564 | + return temp; |
| 21565 | + else { |
| 21566 | + memset(temp, 0, sizeof (struct mid_q_entry)); |
| 21567 | + temp->mid = smb_buffer->Mid; /* always LE */ |
| 21568 | + temp->pid = current->pid; |
| 21569 | + temp->command = smb_buffer->Command; |
| 21570 | + cFYI(1, ("For smb_command %d", temp->command)); |
| 21571 | + do_gettimeofday(&temp->when_sent); |
| 21572 | + temp->ses = ses; |
| 21573 | + temp->tsk = current; |
| 21574 | + } |
| 21575 | + |
| 21576 | + spin_lock(&GlobalMid_Lock); |
| 21577 | + list_add_tail(&temp->qhead, &ses->server->pending_mid_q); |
| 21578 | + atomic_inc(&midCount); |
| 21579 | + temp->midState = MID_REQUEST_ALLOCATED; |
| 21580 | + spin_unlock(&GlobalMid_Lock); |
| 21581 | + return temp; |
| 21582 | +} |
| 21583 | + |
| 21584 | +void |
| 21585 | +DeleteMidQEntry(struct mid_q_entry *midEntry) |
| 21586 | +{ |
| 21587 | + spin_lock(&GlobalMid_Lock); |
| 21588 | + midEntry->midState = MID_FREE; |
| 21589 | + list_del(&midEntry->qhead); |
| 21590 | + atomic_dec(&midCount); |
| 21591 | + spin_unlock(&GlobalMid_Lock); |
| 21592 | + cifs_buf_release(midEntry->resp_buf); |
| 21593 | + kmem_cache_free(cifs_mid_cachep, midEntry); |
| 21594 | +} |
| 21595 | + |
| 21596 | +struct oplock_q_entry * |
| 21597 | +AllocOplockQEntry(struct inode * pinode, __u16 fid, struct cifsTconInfo * tcon) |
| 21598 | +{ |
| 21599 | + struct oplock_q_entry *temp; |
| 21600 | + if ((pinode== NULL) || (tcon == NULL)) { |
| 21601 | + cERROR(1, ("Null parms passed to AllocOplockQEntry")); |
| 21602 | + return NULL; |
| 21603 | + } |
| 21604 | + temp = (struct oplock_q_entry *) kmem_cache_alloc(cifs_oplock_cachep, |
| 21605 | + SLAB_KERNEL); |
| 21606 | + if (temp == NULL) |
| 21607 | + return temp; |
| 21608 | + else { |
| 21609 | + temp->pinode = pinode; |
| 21610 | + temp->tcon = tcon; |
| 21611 | + temp->netfid = fid; |
| 21612 | + spin_lock(&GlobalMid_Lock); |
| 21613 | + list_add_tail(&temp->qhead, &GlobalOplock_Q); |
| 21614 | + spin_unlock(&GlobalMid_Lock); |
| 21615 | + } |
| 21616 | + return temp; |
| 21617 | + |
| 21618 | +} |
| 21619 | + |
| 21620 | +void DeleteOplockQEntry(struct oplock_q_entry * oplockEntry) |
| 21621 | +{ |
| 21622 | + spin_lock(&GlobalMid_Lock); |
| 21623 | + /* should we check if list empty first? */ |
| 21624 | + list_del(&oplockEntry->qhead); |
| 21625 | + spin_unlock(&GlobalMid_Lock); |
| 21626 | + kmem_cache_free(cifs_oplock_cachep, oplockEntry); |
| 21627 | +} |
| 21628 | + |
| 21629 | +int |
| 21630 | +smb_send(struct socket *ssocket, struct smb_hdr *smb_buffer, |
| 21631 | + unsigned int smb_buf_length, struct sockaddr *sin) |
| 21632 | +{ |
| 21633 | + int rc = 0; |
| 21634 | + int i = 0; |
| 21635 | + struct msghdr smb_msg; |
| 21636 | + struct iovec iov; |
| 21637 | + mm_segment_t temp_fs; |
| 21638 | + |
| 21639 | + if(ssocket == NULL) |
| 21640 | + return -ENOTSOCK; /* BB eventually add reconnect code here */ |
| 21641 | + iov.iov_base = smb_buffer; |
| 21642 | + iov.iov_len = smb_buf_length + 4; |
| 21643 | + |
| 21644 | + smb_msg.msg_name = sin; |
| 21645 | + smb_msg.msg_namelen = sizeof (struct sockaddr); |
| 21646 | + smb_msg.msg_iov = &iov; |
| 21647 | + smb_msg.msg_iovlen = 1; |
| 21648 | + smb_msg.msg_control = NULL; |
| 21649 | + smb_msg.msg_controllen = 0; |
| 21650 | + smb_msg.msg_flags = MSG_DONTWAIT + MSG_NOSIGNAL; /* BB add more flags?*/ |
| 21651 | + |
| 21652 | + /* smb header is converted in header_assemble. bcc and rest of SMB word |
| 21653 | + area, and byte area if necessary, is converted to littleendian in |
| 21654 | + cifssmb.c and RFC1001 len is converted to bigendian in smb_send |
| 21655 | + Flags2 is converted in SendReceive */ |
| 21656 | + |
| 21657 | + smb_buffer->smb_buf_length = cpu_to_be32(smb_buffer->smb_buf_length); |
| 21658 | + cFYI(1, ("Sending smb of length %d ", smb_buf_length)); |
| 21659 | + dump_smb(smb_buffer, smb_buf_length + 4); |
| 21660 | + |
| 21661 | + temp_fs = get_fs(); /* we must turn off socket api parm checking */ |
| 21662 | + set_fs(get_ds()); |
| 21663 | + while(iov.iov_len > 0) { |
| 21664 | + rc = sock_sendmsg(ssocket, &smb_msg, smb_buf_length + 4); |
| 21665 | + if ((rc == -ENOSPC) || (rc == -EAGAIN)) { |
| 21666 | + i++; |
| 21667 | + if(i > 60) { |
| 21668 | + cERROR(1, |
| 21669 | + ("sends on sock %p stuck for 30 seconds", |
| 21670 | + ssocket)); |
| 21671 | + rc = -EAGAIN; |
| 21672 | + break; |
| 21673 | + } |
| 21674 | + set_current_state(TASK_INTERRUPTIBLE); |
| 21675 | + schedule_timeout(HZ/2); |
| 21676 | + continue; |
| 21677 | + } |
| 21678 | + if (rc < 0) |
| 21679 | + break; |
| 21680 | + iov.iov_base += rc; |
| 21681 | + iov.iov_len -= rc; |
| 21682 | + } |
| 21683 | + set_fs(temp_fs); |
| 21684 | + |
| 21685 | + if (rc < 0) { |
| 21686 | + cERROR(1,("Error %d sending data on socket to server.", rc)); |
| 21687 | + } else { |
| 21688 | + rc = 0; |
| 21689 | + } |
| 21690 | + |
| 21691 | + return rc; |
| 21692 | +} |
| 21693 | + |
| 21694 | +int |
| 21695 | +SendReceive(const unsigned int xid, struct cifsSesInfo *ses, |
| 21696 | + struct smb_hdr *in_buf, struct smb_hdr *out_buf, |
| 21697 | + int *pbytes_returned, const int long_op) |
| 21698 | +{ |
| 21699 | + int rc = 0; |
| 21700 | + unsigned int receive_len; |
| 21701 | + long timeout; |
| 21702 | + struct mid_q_entry *midQ; |
| 21703 | + |
| 21704 | + if (ses == NULL) { |
| 21705 | + cERROR(1,("Null smb session")); |
| 21706 | + return -EIO; |
| 21707 | + } |
| 21708 | + if(ses->server == NULL) { |
| 21709 | + cERROR(1,("Null tcp session")); |
| 21710 | + return -EIO; |
| 21711 | + } |
| 21712 | + |
| 21713 | + /* Ensure that we do not send more than 50 overlapping requests |
| 21714 | + to the same server. We may make this configurable later or |
| 21715 | + use ses->maxReq */ |
| 21716 | + if(long_op == -1) { |
| 21717 | + /* oplock breaks must not be held up */ |
| 21718 | + atomic_inc(&ses->server->inFlight); |
| 21719 | + } else { |
| 21720 | + spin_lock(&GlobalMid_Lock); |
| 21721 | + while(1) { |
| 21722 | + if(atomic_read(&ses->server->inFlight) >= CIFS_MAX_REQ){ |
| 21723 | + spin_unlock(&GlobalMid_Lock); |
| 21724 | + wait_event(ses->server->request_q, |
| 21725 | + atomic_read(&ses->server->inFlight) |
| 21726 | + < CIFS_MAX_REQ); |
| 21727 | + spin_lock(&GlobalMid_Lock); |
| 21728 | + } else { |
| 21729 | + if(ses->server->tcpStatus == CifsExiting) { |
| 21730 | + spin_unlock(&GlobalMid_Lock); |
| 21731 | + return -ENOENT; |
| 21732 | + } |
| 21733 | + |
| 21734 | + /* can not count locking commands against total since |
| 21735 | + they are allowed to block on server */ |
| 21736 | + |
| 21737 | + if(long_op < 3) { |
| 21738 | + /* update # of requests on the wire to server */ |
| 21739 | + atomic_inc(&ses->server->inFlight); |
| 21740 | + } |
| 21741 | + spin_unlock(&GlobalMid_Lock); |
| 21742 | + break; |
| 21743 | + } |
| 21744 | + } |
| 21745 | + } |
| 21746 | + /* make sure that we sign in the same order that we send on this socket |
| 21747 | + and avoid races inside tcp sendmsg code that could cause corruption |
| 21748 | + of smb data */ |
| 21749 | + |
| 21750 | + down(&ses->server->tcpSem); |
| 21751 | + |
| 21752 | + if (ses->server->tcpStatus == CifsExiting) { |
| 21753 | + rc = -ENOENT; |
| 21754 | + goto out_unlock; |
| 21755 | + } else if (ses->server->tcpStatus == CifsNeedReconnect) { |
| 21756 | + cFYI(1,("tcp session dead - return to caller to retry")); |
| 21757 | + rc = -EAGAIN; |
| 21758 | + goto out_unlock; |
| 21759 | + } else if (ses->status != CifsGood) { |
| 21760 | + /* check if SMB session is bad because we are setting it up */ |
| 21761 | + if((in_buf->Command != SMB_COM_SESSION_SETUP_ANDX) && |
| 21762 | + (in_buf->Command != SMB_COM_NEGOTIATE)) { |
| 21763 | + rc = -EAGAIN; |
| 21764 | + goto out_unlock; |
| 21765 | + } /* else ok - we are setting up session */ |
| 21766 | + } |
| 21767 | + midQ = AllocMidQEntry(in_buf, ses); |
| 21768 | + if (midQ == NULL) { |
| 21769 | + up(&ses->server->tcpSem); |
| 21770 | + /* If not lock req, update # of requests on wire to server */ |
| 21771 | + if(long_op < 3) { |
| 21772 | + atomic_dec(&ses->server->inFlight); |
| 21773 | + wake_up(&ses->server->request_q); |
| 21774 | + } |
| 21775 | + return -ENOMEM; |
| 21776 | + } |
| 21777 | + |
| 21778 | + if (in_buf->smb_buf_length > CIFS_MAX_MSGSIZE + MAX_CIFS_HDR_SIZE - 4) { |
| 21779 | + up(&ses->server->tcpSem); |
| 21780 | + cERROR(1, |
| 21781 | + ("Illegal length, greater than maximum frame, %d ", |
| 21782 | + in_buf->smb_buf_length)); |
| 21783 | + DeleteMidQEntry(midQ); |
| 21784 | + /* If not lock req, update # of requests on wire to server */ |
| 21785 | + if(long_op < 3) { |
| 21786 | + atomic_dec(&ses->server->inFlight); |
| 21787 | + wake_up(&ses->server->request_q); |
| 21788 | + } |
| 21789 | + return -EIO; |
| 21790 | + } |
| 21791 | + |
| 21792 | + if (in_buf->smb_buf_length > 12) |
| 21793 | + in_buf->Flags2 = cpu_to_le16(in_buf->Flags2); |
| 21794 | + |
| 21795 | + rc = cifs_sign_smb(in_buf, ses, &midQ->sequence_number); |
| 21796 | + |
| 21797 | + midQ->midState = MID_REQUEST_SUBMITTED; |
| 21798 | + rc = smb_send(ses->server->ssocket, in_buf, in_buf->smb_buf_length, |
| 21799 | + (struct sockaddr *) &(ses->server->addr.sockAddr)); |
| 21800 | + if(rc < 0) { |
| 21801 | + DeleteMidQEntry(midQ); |
| 21802 | + up(&ses->server->tcpSem); |
| 21803 | + /* If not lock req, update # of requests on wire to server */ |
| 21804 | + if(long_op < 3) { |
| 21805 | + atomic_dec(&ses->server->inFlight); |
| 21806 | + wake_up(&ses->server->request_q); |
| 21807 | + } |
| 21808 | + return rc; |
| 21809 | + } else |
| 21810 | + up(&ses->server->tcpSem); |
| 21811 | + if (long_op == -1) |
| 21812 | + goto cifs_no_response_exit; |
| 21813 | + else if (long_op == 2) /* writes past end of file can take looooong time */ |
| 21814 | + timeout = 300 * HZ; |
| 21815 | + else if (long_op == 1) |
| 21816 | + timeout = 45 * HZ; /* should be greater than |
| 21817 | + servers oplock break timeout (about 43 seconds) */ |
| 21818 | + else if (long_op > 2) { |
| 21819 | + timeout = MAX_SCHEDULE_TIMEOUT; |
| 21820 | + } else |
| 21821 | + timeout = 15 * HZ; |
| 21822 | + /* wait for 15 seconds or until woken up due to response arriving or |
| 21823 | + due to last connection to this server being unmounted */ |
| 21824 | + if (signal_pending(current)) { |
| 21825 | + /* if signal pending do not hold up user for full smb timeout |
| 21826 | + but we still give response a change to complete */ |
| 21827 | + if(midQ->midState & MID_REQUEST_SUBMITTED) { |
| 21828 | + set_current_state(TASK_UNINTERRUPTIBLE); |
| 21829 | + timeout = sleep_on_timeout(&ses->server->response_q,2 * HZ); |
| 21830 | + } |
| 21831 | + } else { /* using normal timeout */ |
| 21832 | + /* timeout = wait_event_interruptible_timeout(ses->server->response_q, |
| 21833 | + (midQ->midState & MID_RESPONSE_RECEIVED) || |
| 21834 | + ((ses->server->tcpStatus != CifsGood) && |
| 21835 | + (ses->server->tcpStatus != CifsNew)), |
| 21836 | + timeout); */ |
| 21837 | + /* Can not allow user interrupts- wreaks havoc with performance */ |
| 21838 | + if(midQ->midState & MID_REQUEST_SUBMITTED) { |
| 21839 | + set_current_state(TASK_UNINTERRUPTIBLE); |
| 21840 | + timeout = sleep_on_timeout(&ses->server->response_q,timeout); |
| 21841 | + } |
| 21842 | + } |
| 21843 | + |
| 21844 | + spin_lock(&GlobalMid_Lock); |
| 21845 | + if (midQ->resp_buf) { |
| 21846 | + spin_unlock(&GlobalMid_Lock); |
| 21847 | + receive_len = be32_to_cpu(midQ->resp_buf->smb_buf_length); |
| 21848 | + } else { |
| 21849 | + cERROR(1,("No response buffer")); |
| 21850 | + if(midQ->midState == MID_REQUEST_SUBMITTED) { |
| 21851 | + if(ses->server->tcpStatus == CifsExiting) |
| 21852 | + rc = -EHOSTDOWN; |
| 21853 | + else { |
| 21854 | + ses->server->tcpStatus = CifsNeedReconnect; |
| 21855 | + midQ->midState = MID_RETRY_NEEDED; |
| 21856 | + } |
| 21857 | + } |
| 21858 | + |
| 21859 | + if (rc != -EHOSTDOWN) { |
| 21860 | + if(midQ->midState == MID_RETRY_NEEDED) { |
| 21861 | + rc = -EAGAIN; |
| 21862 | + cFYI(1,("marking request for retry")); |
| 21863 | + } else { |
| 21864 | + rc = -EIO; |
| 21865 | + } |
| 21866 | + } |
| 21867 | + spin_unlock(&GlobalMid_Lock); |
| 21868 | + DeleteMidQEntry(midQ); |
| 21869 | + /* If not lock req, update # of requests on wire to server */ |
| 21870 | + if(long_op < 3) { |
| 21871 | + atomic_dec(&ses->server->inFlight); |
| 21872 | + wake_up(&ses->server->request_q); |
| 21873 | + } |
| 21874 | + return rc; |
| 21875 | + } |
| 21876 | + |
| 21877 | + if (receive_len > CIFS_MAX_MSGSIZE + MAX_CIFS_HDR_SIZE) { |
| 21878 | + cERROR(1, |
| 21879 | + ("Frame too large received. Length: %d Xid: %d", |
| 21880 | + receive_len, xid)); |
| 21881 | + rc = -EIO; |
| 21882 | + } else { /* rcvd frame is ok */ |
| 21883 | + |
| 21884 | + if (midQ->resp_buf && out_buf |
| 21885 | + && (midQ->midState == MID_RESPONSE_RECEIVED)) { |
| 21886 | + memcpy(out_buf, midQ->resp_buf, |
| 21887 | + receive_len + |
| 21888 | + 4 /* include 4 byte RFC1001 header */ ); |
| 21889 | + |
| 21890 | + dump_smb(out_buf, 92); |
| 21891 | + /* convert the length into a more usable form */ |
| 21892 | + out_buf->smb_buf_length = |
| 21893 | + be32_to_cpu(out_buf->smb_buf_length); |
| 21894 | + if((out_buf->smb_buf_length > 24) && |
| 21895 | + (ses->server->secMode & (SECMODE_SIGN_REQUIRED | SECMODE_SIGN_ENABLED))) { |
| 21896 | + rc = cifs_verify_signature(out_buf, ses->mac_signing_key,midQ->sequence_number); /* BB fix BB */ |
| 21897 | + if(rc) |
| 21898 | + cFYI(1,("Unexpected signature received from server")); |
| 21899 | + } |
| 21900 | + |
| 21901 | + if (out_buf->smb_buf_length > 12) |
| 21902 | + out_buf->Flags2 = le16_to_cpu(out_buf->Flags2); |
| 21903 | + if (out_buf->smb_buf_length > 28) |
| 21904 | + out_buf->Pid = le16_to_cpu(out_buf->Pid); |
| 21905 | + if (out_buf->smb_buf_length > 28) |
| 21906 | + out_buf->PidHigh = |
| 21907 | + le16_to_cpu(out_buf->PidHigh); |
| 21908 | + |
| 21909 | + *pbytes_returned = out_buf->smb_buf_length; |
| 21910 | + |
| 21911 | + /* BB special case reconnect tid and reconnect uid here? */ |
| 21912 | + rc = map_smb_to_linux_error(out_buf); |
| 21913 | + |
| 21914 | + /* convert ByteCount if necessary */ |
| 21915 | + if (receive_len >= |
| 21916 | + sizeof (struct smb_hdr) - |
| 21917 | + 4 /* do not count RFC1001 header */ + |
| 21918 | + (2 * out_buf->WordCount) + 2 /* bcc */ ) |
| 21919 | + BCC(out_buf) = le16_to_cpu(BCC(out_buf)); |
| 21920 | + } else { |
| 21921 | + rc = -EIO; |
| 21922 | + cFYI(1,("Bad MID state? ")); |
| 21923 | + } |
| 21924 | + } |
| 21925 | +cifs_no_response_exit: |
| 21926 | + DeleteMidQEntry(midQ); |
| 21927 | + |
| 21928 | + if(long_op < 3) { |
| 21929 | + atomic_dec(&ses->server->inFlight); |
| 21930 | + wake_up(&ses->server->request_q); |
| 21931 | + } |
| 21932 | + |
| 21933 | + return rc; |
| 21934 | + |
| 21935 | +out_unlock: |
| 21936 | + up(&ses->server->tcpSem); |
| 21937 | + /* If not lock req, update # of requests on wire to server */ |
| 21938 | + if(long_op < 3) { |
| 21939 | + atomic_dec(&ses->server->inFlight); |
| 21940 | + wake_up(&ses->server->request_q); |
| 21941 | + } |
| 21942 | + |
| 21943 | + return rc; |
| 21944 | +} |
| 21945 | --- a/fs/Config.in |
| 21946 | +++ b/fs/Config.in |
| 21947 | @@ -153,6 +153,10 @@ if [ "$CONFIG_NET" = "y" ]; then |
| 21948 | define_bool CONFIG_LOCKD_V4 y |
| 21949 | fi |
| 21950 | |
| 21951 | + dep_tristate 'CIFS support (advanced network filesystem for Samba, Window and other CIFS compliant servers)' CONFIG_CIFS $CONFIG_INET |
| 21952 | + dep_mbool ' CIFS statistics' CONFIG_CIFS_STATS $CONFIG_CIFS |
| 21953 | + dep_mbool ' CIFS POSIX Protocol Extensions' CONFIG_CIFS_POSIX $CONFIG_CIFS |
| 21954 | + |
| 21955 | dep_tristate 'SMB file system support (to mount Windows shares etc.)' CONFIG_SMB_FS $CONFIG_INET |
| 21956 | if [ "$CONFIG_SMB_FS" != "n" ]; then |
| 21957 | bool ' Use a default NLS' CONFIG_SMB_NLS_DEFAULT |
| 21958 | --- a/fs/Makefile |
| 21959 | +++ b/fs/Makefile |
| 21960 | @@ -37,6 +37,7 @@ subdir-$(CONFIG_MSDOS_FS) += msdos |
| 21961 | subdir-$(CONFIG_VFAT_FS) += vfat |
| 21962 | subdir-$(CONFIG_BFS_FS) += bfs |
| 21963 | subdir-$(CONFIG_ISO9660_FS) += isofs |
| 21964 | +subdir-$(CONFIG_CIFS) += cifs |
| 21965 | subdir-$(CONFIG_DEVFS_FS) += devfs |
| 21966 | subdir-$(CONFIG_HFSPLUS_FS) += hfsplus # Before hfs to find wrapped HFS+ |
| 21967 | subdir-$(CONFIG_HFS_FS) += hfs |
| 21968 | --- a/fs/nls/Config.in |
| 21969 | +++ b/fs/nls/Config.in |
| 21970 | @@ -11,6 +11,7 @@ fi |
| 21971 | |
| 21972 | # msdos and Joliet want NLS |
| 21973 | if [ "$CONFIG_JOLIET" = "y" -o "$CONFIG_FAT_FS" != "n" \ |
| 21974 | + -o "$CONFIG_CIFS" != "n" \ |
| 21975 | -o "$CONFIG_NTFS_FS" != "n" -o "$CONFIG_NCPFS_NLS" = "y" \ |
| 21976 | -o "$CONFIG_SMB_NLS" = "y" -o "$CONFIG_JFS_FS" != "n" \ |
| 21977 | -o "$CONFIG_BEFS_FS" != "n" -o "$CONFIG_HFSPLUS_FS" != "n" ]; then |
| 21978 | |