cifs: rename cifs_sign_smb2 to cifs_sign_smbv
[GitHub/mt8127/android_kernel_alcatel_ttab.git] / fs / cifs / transport.c
CommitLineData
1da177e4
LT
1/*
2 * fs/cifs/transport.c
3 *
ad7a2926 4 * Copyright (C) International Business Machines Corp., 2002,2008
1da177e4 5 * Author(s): Steve French (sfrench@us.ibm.com)
14a441a2 6 * Jeremy Allison (jra@samba.org) 2006.
79a58d1f 7 *
1da177e4
LT
8 * This library is free software; you can redistribute it and/or modify
9 * it under the terms of the GNU Lesser General Public License as published
10 * by the Free Software Foundation; either version 2.1 of the License, or
11 * (at your option) any later version.
12 *
13 * This library is distributed in the hope that it will be useful,
14 * but WITHOUT ANY WARRANTY; without even the implied warranty of
15 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See
16 * the GNU Lesser General Public License for more details.
17 *
18 * You should have received a copy of the GNU Lesser General Public License
19 * along with this library; if not, write to the Free Software
79a58d1f 20 * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
1da177e4
LT
21 */
22
23#include <linux/fs.h>
24#include <linux/list.h>
5a0e3ad6 25#include <linux/gfp.h>
1da177e4
LT
26#include <linux/wait.h>
27#include <linux/net.h>
28#include <linux/delay.h>
f06ac72e 29#include <linux/freezer.h>
1da177e4
LT
30#include <asm/uaccess.h>
31#include <asm/processor.h>
32#include <linux/mempool.h>
33#include "cifspdu.h"
34#include "cifsglob.h"
35#include "cifsproto.h"
36#include "cifs_debug.h"
50c2f753 37
1da177e4 38extern mempool_t *cifs_mid_poolp;
1da177e4 39
2b84a36c
JL
40static void
41wake_up_task(struct mid_q_entry *mid)
42{
43 wake_up_process(mid->callback_data);
44}
45
a6827c18 46struct mid_q_entry *
24b9b06b 47AllocMidQEntry(const struct smb_hdr *smb_buffer, struct TCP_Server_Info *server)
1da177e4
LT
48{
49 struct mid_q_entry *temp;
50
24b9b06b 51 if (server == NULL) {
b6b38f70 52 cERROR(1, "Null TCP session in AllocMidQEntry");
1da177e4
LT
53 return NULL;
54 }
50c2f753 55
232087cb 56 temp = mempool_alloc(cifs_mid_poolp, GFP_NOFS);
1da177e4
LT
57 if (temp == NULL)
58 return temp;
59 else {
26f57364 60 memset(temp, 0, sizeof(struct mid_q_entry));
1da177e4
LT
61 temp->mid = smb_buffer->Mid; /* always LE */
62 temp->pid = current->pid;
7c9421e1
PS
63 temp->command = cpu_to_le16(smb_buffer->Command);
64 cFYI(1, "For smb_command %d", smb_buffer->Command);
1047abc1
SF
65 /* do_gettimeofday(&temp->when_sent);*/ /* easier to use jiffies */
66 /* when mid allocated can be before when sent */
67 temp->when_alloc = jiffies;
2b84a36c
JL
68
69 /*
70 * The default is for the mid to be synchronous, so the
71 * default callback just wakes up the current task.
72 */
73 temp->callback = wake_up_task;
74 temp->callback_data = current;
1da177e4
LT
75 }
76
1da177e4 77 atomic_inc(&midCount);
7c9421e1 78 temp->mid_state = MID_REQUEST_ALLOCATED;
1da177e4
LT
79 return temp;
80}
81
766fdbb5 82void
1da177e4
LT
83DeleteMidQEntry(struct mid_q_entry *midEntry)
84{
1047abc1
SF
85#ifdef CONFIG_CIFS_STATS2
86 unsigned long now;
87#endif
7c9421e1 88 midEntry->mid_state = MID_FREE;
8097531a 89 atomic_dec(&midCount);
7c9421e1 90 if (midEntry->large_buf)
b8643e1b
SF
91 cifs_buf_release(midEntry->resp_buf);
92 else
93 cifs_small_buf_release(midEntry->resp_buf);
1047abc1
SF
94#ifdef CONFIG_CIFS_STATS2
95 now = jiffies;
96 /* commands taking longer than one second are indications that
97 something is wrong, unless it is quite a slow link or server */
79a58d1f
SF
98 if ((now - midEntry->when_alloc) > HZ) {
99 if ((cifsFYI & CIFS_TIMER) &&
7c9421e1
PS
100 (midEntry->command != cpu_to_le16(SMB_COM_LOCKING_ANDX))) {
101 printk(KERN_DEBUG " CIFS slow rsp: cmd %d mid %llu",
1047abc1
SF
102 midEntry->command, midEntry->mid);
103 printk(" A: 0x%lx S: 0x%lx R: 0x%lx\n",
104 now - midEntry->when_alloc,
105 now - midEntry->when_sent,
106 now - midEntry->when_received);
107 }
108 }
109#endif
1da177e4
LT
110 mempool_free(midEntry, cifs_mid_poolp);
111}
112
ddc8cf8f
JL
113static void
114delete_mid(struct mid_q_entry *mid)
115{
116 spin_lock(&GlobalMid_Lock);
117 list_del(&mid->qhead);
118 spin_unlock(&GlobalMid_Lock);
119
120 DeleteMidQEntry(mid);
121}
122
d6e04ae6 123static int
0496e02d 124smb_sendv(struct TCP_Server_Info *server, struct kvec *iov, int n_vec)
1da177e4
LT
125{
126 int rc = 0;
127 int i = 0;
128 struct msghdr smb_msg;
3e84469d
SF
129 unsigned int len = iov[0].iov_len;
130 unsigned int total_len;
131 int first_vec = 0;
792af7b0 132 unsigned int smb_buf_length = get_rfc1002_length(iov[0].iov_base);
edf1ae40 133 struct socket *ssocket = server->ssocket;
50c2f753 134
79a58d1f 135 if (ssocket == NULL)
1da177e4 136 return -ENOTSOCK; /* BB eventually add reconnect code here */
3e84469d 137
a9f1b85e 138 smb_msg.msg_name = (struct sockaddr *) &server->dstaddr;
26f57364 139 smb_msg.msg_namelen = sizeof(struct sockaddr);
1da177e4
LT
140 smb_msg.msg_control = NULL;
141 smb_msg.msg_controllen = 0;
0496e02d 142 if (server->noblocksnd)
edf1ae40
SF
143 smb_msg.msg_flags = MSG_DONTWAIT + MSG_NOSIGNAL;
144 else
145 smb_msg.msg_flags = MSG_NOSIGNAL;
1da177e4 146
3e84469d
SF
147 total_len = 0;
148 for (i = 0; i < n_vec; i++)
149 total_len += iov[i].iov_len;
150
b6b38f70 151 cFYI(1, "Sending smb: total_len %d", total_len);
792af7b0 152 dump_smb(iov[0].iov_base, len);
1da177e4 153
17680356 154 i = 0;
3e84469d
SF
155 while (total_len) {
156 rc = kernel_sendmsg(ssocket, &smb_msg, &iov[first_vec],
157 n_vec - first_vec, total_len);
1da177e4
LT
158 if ((rc == -ENOSPC) || (rc == -EAGAIN)) {
159 i++;
792af7b0
PS
160 /*
161 * If blocking send we try 3 times, since each can block
162 * for 5 seconds. For nonblocking we have to try more
163 * but wait increasing amounts of time allowing time for
164 * socket to clear. The overall time we wait in either
165 * case to send on the socket is about 15 seconds.
166 * Similarly we wait for 15 seconds for a response from
167 * the server in SendReceive[2] for the server to send
168 * a response back for most types of requests (except
169 * SMB Write past end of file which can be slow, and
170 * blocking lock operations). NFS waits slightly longer
171 * than CIFS, but this can make it take longer for
172 * nonresponsive servers to be detected and 15 seconds
173 * is more than enough time for modern networks to
174 * send a packet. In most cases if we fail to send
175 * after the retries we will kill the socket and
176 * reconnect which may clear the network problem.
177 */
da505c38 178 if ((i >= 14) || (!server->noblocksnd && (i > 2))) {
b6b38f70
JP
179 cERROR(1, "sends on sock %p stuck for 15 seconds",
180 ssocket);
1da177e4
LT
181 rc = -EAGAIN;
182 break;
183 }
68058e75 184 msleep(1 << i);
1da177e4
LT
185 continue;
186 }
79a58d1f 187 if (rc < 0)
1da177e4 188 break;
3e84469d 189
61de800d
SF
190 if (rc == total_len) {
191 total_len = 0;
192 break;
193 } else if (rc > total_len) {
b6b38f70 194 cERROR(1, "sent %d requested %d", rc, total_len);
3e84469d
SF
195 break;
196 }
79a58d1f 197 if (rc == 0) {
3e84469d
SF
198 /* should never happen, letting socket clear before
199 retrying is our only obvious option here */
b6b38f70 200 cERROR(1, "tcp sent no data");
3e84469d
SF
201 msleep(500);
202 continue;
d6e04ae6 203 }
3e84469d 204 total_len -= rc;
68058e75 205 /* the line below resets i */
3e84469d
SF
206 for (i = first_vec; i < n_vec; i++) {
207 if (iov[i].iov_len) {
208 if (rc > iov[i].iov_len) {
209 rc -= iov[i].iov_len;
210 iov[i].iov_len = 0;
211 } else {
212 iov[i].iov_base += rc;
213 iov[i].iov_len -= rc;
214 first_vec = i;
215 break;
216 }
217 }
d6e04ae6 218 }
5e1253b5 219 i = 0; /* in case we get ENOSPC on the next send */
1da177e4
LT
220 }
221
edf1ae40 222 if ((total_len > 0) && (total_len != smb_buf_length + 4)) {
b6b38f70
JP
223 cFYI(1, "partial send (%d remaining), terminating session",
224 total_len);
edf1ae40
SF
225 /* If we have only sent part of an SMB then the next SMB
226 could be taken as the remainder of this one. We need
227 to kill the socket so the server throws away the partial
228 SMB */
229 server->tcpStatus = CifsNeedReconnect;
230 }
231
d804d41d 232 if (rc < 0 && rc != -EINTR)
b6b38f70 233 cERROR(1, "Error %d sending data on socket to server", rc);
d804d41d 234 else
1da177e4 235 rc = 0;
1da177e4
LT
236
237 return rc;
238}
239
0496e02d
JL
240int
241smb_send(struct TCP_Server_Info *server, struct smb_hdr *smb_buffer,
242 unsigned int smb_buf_length)
243{
244 struct kvec iov;
245
246 iov.iov_base = smb_buffer;
247 iov.iov_len = smb_buf_length + 4;
248
249 return smb_sendv(server, &iov, 1);
250}
251
fc40f9cf 252static int
bc205ed1
PS
253wait_for_free_credits(struct TCP_Server_Info *server, const int optype,
254 int *credits)
1da177e4 255{
5bc59498
PS
256 int rc;
257
fc40f9cf 258 spin_lock(&server->req_lock);
bc205ed1 259 if (optype == CIFS_ASYNC_OP) {
1da177e4 260 /* oplock breaks must not be held up */
fc40f9cf 261 server->in_flight++;
bc205ed1 262 *credits -= 1;
fc40f9cf 263 spin_unlock(&server->req_lock);
27a97a61
VL
264 return 0;
265 }
266
27a97a61 267 while (1) {
bc205ed1 268 if (*credits <= 0) {
fc40f9cf 269 spin_unlock(&server->req_lock);
789e6661 270 cifs_num_waiters_inc(server);
5bc59498 271 rc = wait_event_killable(server->request_q,
bc205ed1 272 has_credits(server, credits));
789e6661 273 cifs_num_waiters_dec(server);
5bc59498
PS
274 if (rc)
275 return rc;
fc40f9cf 276 spin_lock(&server->req_lock);
27a97a61 277 } else {
c5797a94 278 if (server->tcpStatus == CifsExiting) {
fc40f9cf 279 spin_unlock(&server->req_lock);
27a97a61 280 return -ENOENT;
1da177e4 281 }
27a97a61 282
2d86dbc9
PS
283 /*
284 * Can not count locking commands against total
285 * as they are allowed to block on server.
286 */
27a97a61
VL
287
288 /* update # of requests on the wire to server */
bc205ed1
PS
289 if (optype != CIFS_BLOCKING_OP) {
290 *credits -= 1;
fc40f9cf 291 server->in_flight++;
2d86dbc9 292 }
fc40f9cf 293 spin_unlock(&server->req_lock);
27a97a61 294 break;
1da177e4
LT
295 }
296 }
7ee1af76
JA
297 return 0;
298}
1da177e4 299
bc205ed1
PS
300static int
301wait_for_free_request(struct TCP_Server_Info *server, const int optype)
302{
45275789
PS
303 return wait_for_free_credits(server, optype,
304 server->ops->get_credits_field(server));
bc205ed1
PS
305}
306
96daf2b0 307static int allocate_mid(struct cifs_ses *ses, struct smb_hdr *in_buf,
7ee1af76
JA
308 struct mid_q_entry **ppmidQ)
309{
1da177e4 310 if (ses->server->tcpStatus == CifsExiting) {
7ee1af76 311 return -ENOENT;
8fbbd365
VL
312 }
313
314 if (ses->server->tcpStatus == CifsNeedReconnect) {
b6b38f70 315 cFYI(1, "tcp session dead - return to caller to retry");
7ee1af76 316 return -EAGAIN;
8fbbd365
VL
317 }
318
319 if (ses->status != CifsGood) {
1da177e4 320 /* check if SMB session is bad because we are setting it up */
79a58d1f 321 if ((in_buf->Command != SMB_COM_SESSION_SETUP_ANDX) &&
ad7a2926 322 (in_buf->Command != SMB_COM_NEGOTIATE))
7ee1af76 323 return -EAGAIN;
ad7a2926 324 /* else ok - we are setting up session */
1da177e4 325 }
24b9b06b 326 *ppmidQ = AllocMidQEntry(in_buf, ses->server);
26f57364 327 if (*ppmidQ == NULL)
7ee1af76 328 return -ENOMEM;
ddc8cf8f
JL
329 spin_lock(&GlobalMid_Lock);
330 list_add_tail(&(*ppmidQ)->qhead, &ses->server->pending_mid_q);
331 spin_unlock(&GlobalMid_Lock);
7ee1af76
JA
332 return 0;
333}
334
0ade640e
JL
335static int
336wait_for_response(struct TCP_Server_Info *server, struct mid_q_entry *midQ)
7ee1af76 337{
0ade640e 338 int error;
7ee1af76 339
f06ac72e 340 error = wait_event_freezekillable(server->response_q,
7c9421e1 341 midQ->mid_state != MID_REQUEST_SUBMITTED);
0ade640e
JL
342 if (error < 0)
343 return -ERESTARTSYS;
7ee1af76 344
0ade640e 345 return 0;
7ee1af76
JA
346}
347
792af7b0
PS
348static int
349cifs_setup_async_request(struct TCP_Server_Info *server, struct kvec *iov,
350 unsigned int nvec, struct mid_q_entry **ret_mid)
351{
352 int rc;
353 struct smb_hdr *hdr = (struct smb_hdr *)iov[0].iov_base;
354 struct mid_q_entry *mid;
355
356 /* enable signing if server requires it */
357 if (server->sec_mode & (SECMODE_SIGN_REQUIRED | SECMODE_SIGN_ENABLED))
358 hdr->Flags2 |= SMBFLG2_SECURITY_SIGNATURE;
359
360 mid = AllocMidQEntry(hdr, server);
361 if (mid == NULL)
362 return -ENOMEM;
363
762a4206 364 rc = cifs_sign_smbv(iov, nvec, server, &mid->sequence_number);
ffc61ccb
SP
365 if (rc) {
366 DeleteMidQEntry(mid);
367 return rc;
368 }
369
792af7b0 370 *ret_mid = mid;
ffc61ccb 371 return 0;
792af7b0 372}
133672ef 373
a6827c18
JL
374/*
375 * Send a SMB request and set the callback function in the mid to handle
376 * the result. Caller is responsible for dealing with timeouts.
377 */
378int
fcc31cb6 379cifs_call_async(struct TCP_Server_Info *server, struct kvec *iov,
44d22d84
JL
380 unsigned int nvec, mid_receive_t *receive,
381 mid_callback_t *callback, void *cbdata, bool ignore_pend)
a6827c18
JL
382{
383 int rc;
384 struct mid_q_entry *mid;
385
59ffd841 386 rc = wait_for_free_request(server, ignore_pend ? CIFS_ASYNC_OP : 0);
a6827c18
JL
387 if (rc)
388 return rc;
389
390 mutex_lock(&server->srv_mutex);
792af7b0
PS
391 rc = cifs_setup_async_request(server, iov, nvec, &mid);
392 if (rc) {
a6827c18 393 mutex_unlock(&server->srv_mutex);
45275789 394 add_credits(server, 1);
0193e072 395 wake_up(&server->request_q);
792af7b0 396 return rc;
a6827c18
JL
397 }
398
44d22d84 399 mid->receive = receive;
a6827c18
JL
400 mid->callback = callback;
401 mid->callback_data = cbdata;
7c9421e1 402 mid->mid_state = MID_REQUEST_SUBMITTED;
789e6661 403
ffc61ccb
SP
404 /* put it on the pending_mid_q */
405 spin_lock(&GlobalMid_Lock);
406 list_add_tail(&mid->qhead, &server->pending_mid_q);
407 spin_unlock(&GlobalMid_Lock);
408
409
789e6661 410 cifs_in_send_inc(server);
fcc31cb6 411 rc = smb_sendv(server, iov, nvec);
789e6661
SF
412 cifs_in_send_dec(server);
413 cifs_save_when_sent(mid);
a6827c18 414 mutex_unlock(&server->srv_mutex);
789e6661 415
ffc61ccb
SP
416 if (rc == 0)
417 return 0;
a6827c18 418
a6827c18 419 delete_mid(mid);
45275789 420 add_credits(server, 1);
a6827c18
JL
421 wake_up(&server->request_q);
422 return rc;
423}
424
133672ef
SF
425/*
426 *
427 * Send an SMB Request. No response info (other than return code)
428 * needs to be parsed.
429 *
430 * flags indicate the type of request buffer and how long to wait
431 * and whether to log NT STATUS code (error) before mapping it to POSIX error
432 *
433 */
434int
96daf2b0 435SendReceiveNoRsp(const unsigned int xid, struct cifs_ses *ses,
792af7b0 436 char *in_buf, int flags)
133672ef
SF
437{
438 int rc;
439 struct kvec iov[1];
440 int resp_buf_type;
441
792af7b0
PS
442 iov[0].iov_base = in_buf;
443 iov[0].iov_len = get_rfc1002_length(in_buf) + 4;
133672ef
SF
444 flags |= CIFS_NO_RESP;
445 rc = SendReceive2(xid, ses, iov, 1, &resp_buf_type, flags);
b6b38f70 446 cFYI(DBG2, "SendRcvNoRsp flags %d rc %d", flags, rc);
90c81e0b 447
133672ef
SF
448 return rc;
449}
450
053d5034 451static int
3c1105df 452cifs_sync_mid_result(struct mid_q_entry *mid, struct TCP_Server_Info *server)
053d5034
JL
453{
454 int rc = 0;
455
7c9421e1
PS
456 cFYI(1, "%s: cmd=%d mid=%llu state=%d", __func__,
457 le16_to_cpu(mid->command), mid->mid, mid->mid_state);
053d5034 458
74dd92a8 459 spin_lock(&GlobalMid_Lock);
7c9421e1 460 switch (mid->mid_state) {
74dd92a8 461 case MID_RESPONSE_RECEIVED:
053d5034
JL
462 spin_unlock(&GlobalMid_Lock);
463 return rc;
74dd92a8
JL
464 case MID_RETRY_NEEDED:
465 rc = -EAGAIN;
466 break;
71823baf
JL
467 case MID_RESPONSE_MALFORMED:
468 rc = -EIO;
469 break;
3c1105df
JL
470 case MID_SHUTDOWN:
471 rc = -EHOSTDOWN;
472 break;
74dd92a8 473 default:
3c1105df 474 list_del_init(&mid->qhead);
7c9421e1
PS
475 cERROR(1, "%s: invalid mid state mid=%llu state=%d", __func__,
476 mid->mid, mid->mid_state);
74dd92a8 477 rc = -EIO;
053d5034
JL
478 }
479 spin_unlock(&GlobalMid_Lock);
480
2b84a36c 481 DeleteMidQEntry(mid);
053d5034
JL
482 return rc;
483}
484
121b046a
JL
485static inline int
486send_cancel(struct TCP_Server_Info *server, void *buf, struct mid_q_entry *mid)
76dcc26f 487{
121b046a
JL
488 return server->ops->send_cancel ?
489 server->ops->send_cancel(server, buf, mid) : 0;
76dcc26f
JL
490}
491
2c8f981d
JL
492int
493cifs_check_receive(struct mid_q_entry *mid, struct TCP_Server_Info *server,
494 bool log_error)
495{
792af7b0 496 unsigned int len = get_rfc1002_length(mid->resp_buf) + 4;
826a95e4
JL
497
498 dump_smb(mid->resp_buf, min_t(u32, 92, len));
2c8f981d
JL
499
500 /* convert the length into a more usable form */
96daf2b0 501 if (server->sec_mode & (SECMODE_SIGN_REQUIRED | SECMODE_SIGN_ENABLED)) {
826a95e4
JL
502 struct kvec iov;
503
504 iov.iov_base = mid->resp_buf;
505 iov.iov_len = len;
2c8f981d 506 /* FIXME: add code to kill session */
826a95e4 507 if (cifs_verify_signature(&iov, 1, server,
2c8f981d
JL
508 mid->sequence_number + 1) != 0)
509 cERROR(1, "Unexpected SMB signature");
510 }
511
512 /* BB special case reconnect tid and uid here? */
513 return map_smb_to_linux_error(mid->resp_buf, log_error);
514}
515
082d0642 516int
792af7b0
PS
517cifs_setup_request(struct cifs_ses *ses, struct kvec *iov,
518 unsigned int nvec, struct mid_q_entry **ret_mid)
519{
520 int rc;
521 struct smb_hdr *hdr = (struct smb_hdr *)iov[0].iov_base;
522 struct mid_q_entry *mid;
523
524 rc = allocate_mid(ses, hdr, &mid);
525 if (rc)
526 return rc;
762a4206 527 rc = cifs_sign_smbv(iov, nvec, ses->server, &mid->sequence_number);
792af7b0
PS
528 if (rc)
529 delete_mid(mid);
530 *ret_mid = mid;
531 return rc;
532}
533
7ee1af76 534int
96daf2b0 535SendReceive2(const unsigned int xid, struct cifs_ses *ses,
79a58d1f 536 struct kvec *iov, int n_vec, int *pRespBufType /* ret */,
133672ef 537 const int flags)
7ee1af76
JA
538{
539 int rc = 0;
133672ef 540 int long_op;
7ee1af76 541 struct mid_q_entry *midQ;
792af7b0 542 char *buf = iov[0].iov_base;
50c2f753 543
133672ef
SF
544 long_op = flags & CIFS_TIMEOUT_MASK;
545
7ee1af76
JA
546 *pRespBufType = CIFS_NO_BUFFER; /* no response buf yet */
547
548 if ((ses == NULL) || (ses->server == NULL)) {
792af7b0 549 cifs_small_buf_release(buf);
b6b38f70 550 cERROR(1, "Null session");
7ee1af76
JA
551 return -EIO;
552 }
553
79a58d1f 554 if (ses->server->tcpStatus == CifsExiting) {
792af7b0 555 cifs_small_buf_release(buf);
7ee1af76
JA
556 return -ENOENT;
557 }
558
792af7b0
PS
559 /*
560 * Ensure that we do not send more than 50 overlapping requests
561 * to the same server. We may make this configurable later or
562 * use ses->maxReq.
563 */
7ee1af76 564
c5797a94 565 rc = wait_for_free_request(ses->server, long_op);
7ee1af76 566 if (rc) {
792af7b0 567 cifs_small_buf_release(buf);
7ee1af76
JA
568 return rc;
569 }
570
792af7b0
PS
571 /*
572 * Make sure that we sign in the same order that we send on this socket
573 * and avoid races inside tcp sendmsg code that could cause corruption
574 * of smb data.
575 */
7ee1af76 576
72ca545b 577 mutex_lock(&ses->server->srv_mutex);
7ee1af76 578
082d0642 579 rc = ses->server->ops->setup_request(ses, iov, n_vec, &midQ);
7ee1af76 580 if (rc) {
72ca545b 581 mutex_unlock(&ses->server->srv_mutex);
792af7b0 582 cifs_small_buf_release(buf);
7ee1af76 583 /* Update # of requests on wire to server */
45275789 584 add_credits(ses->server, 1);
7ee1af76 585 return rc;
1da177e4 586 }
1da177e4 587
7c9421e1 588 midQ->mid_state = MID_REQUEST_SUBMITTED;
789e6661 589 cifs_in_send_inc(ses->server);
0496e02d 590 rc = smb_sendv(ses->server, iov, n_vec);
789e6661
SF
591 cifs_in_send_dec(ses->server);
592 cifs_save_when_sent(midQ);
7ee1af76 593
72ca545b 594 mutex_unlock(&ses->server->srv_mutex);
7ee1af76 595
2db7c581 596 if (rc < 0) {
792af7b0 597 cifs_small_buf_release(buf);
7ee1af76 598 goto out;
2db7c581 599 }
4b8f930f 600
2db7c581 601 if (long_op == CIFS_ASYNC_OP) {
792af7b0 602 cifs_small_buf_release(buf);
133672ef 603 goto out;
2db7c581 604 }
d6e04ae6 605
0ade640e 606 rc = wait_for_response(ses->server, midQ);
1be912dd 607 if (rc != 0) {
121b046a 608 send_cancel(ses->server, buf, midQ);
1be912dd 609 spin_lock(&GlobalMid_Lock);
7c9421e1 610 if (midQ->mid_state == MID_REQUEST_SUBMITTED) {
1be912dd
JL
611 midQ->callback = DeleteMidQEntry;
612 spin_unlock(&GlobalMid_Lock);
792af7b0 613 cifs_small_buf_release(buf);
45275789 614 add_credits(ses->server, 1);
1be912dd
JL
615 return rc;
616 }
617 spin_unlock(&GlobalMid_Lock);
618 }
d6e04ae6 619
792af7b0 620 cifs_small_buf_release(buf);
2db7c581 621
3c1105df 622 rc = cifs_sync_mid_result(midQ, ses->server);
053d5034 623 if (rc != 0) {
45275789 624 add_credits(ses->server, 1);
d6e04ae6
SF
625 return rc;
626 }
50c2f753 627
7c9421e1 628 if (!midQ->resp_buf || midQ->mid_state != MID_RESPONSE_RECEIVED) {
d6e04ae6 629 rc = -EIO;
2c8f981d 630 cFYI(1, "Bad MID state?");
2b2bdfba
SF
631 goto out;
632 }
633
792af7b0
PS
634 buf = (char *)midQ->resp_buf;
635 iov[0].iov_base = buf;
636 iov[0].iov_len = get_rfc1002_length(buf) + 4;
7c9421e1 637 if (midQ->large_buf)
2c8f981d
JL
638 *pRespBufType = CIFS_LARGE_BUFFER;
639 else
640 *pRespBufType = CIFS_SMALL_BUFFER;
2b2bdfba 641
082d0642
PS
642 rc = ses->server->ops->check_receive(midQ, ses->server,
643 flags & CIFS_LOG_ERROR);
1da177e4 644
2c8f981d
JL
645 /* mark it so buf will not be freed by delete_mid */
646 if ((flags & CIFS_NO_RESP) == 0)
647 midQ->resp_buf = NULL;
7ee1af76 648out:
ddc8cf8f 649 delete_mid(midQ);
45275789 650 add_credits(ses->server, 1);
1da177e4 651
d6e04ae6
SF
652 return rc;
653}
1da177e4
LT
654
655int
96daf2b0 656SendReceive(const unsigned int xid, struct cifs_ses *ses,
1da177e4
LT
657 struct smb_hdr *in_buf, struct smb_hdr *out_buf,
658 int *pbytes_returned, const int long_op)
659{
660 int rc = 0;
1da177e4
LT
661 struct mid_q_entry *midQ;
662
663 if (ses == NULL) {
b6b38f70 664 cERROR(1, "Null smb session");
1da177e4
LT
665 return -EIO;
666 }
79a58d1f 667 if (ses->server == NULL) {
b6b38f70 668 cERROR(1, "Null tcp session");
1da177e4
LT
669 return -EIO;
670 }
671
79a58d1f 672 if (ses->server->tcpStatus == CifsExiting)
31ca3bc3
SF
673 return -ENOENT;
674
79a58d1f 675 /* Ensure that we do not send more than 50 overlapping requests
1da177e4
LT
676 to the same server. We may make this configurable later or
677 use ses->maxReq */
1da177e4 678
be8e3b00
SF
679 if (be32_to_cpu(in_buf->smb_buf_length) > CIFSMaxBufSize +
680 MAX_CIFS_HDR_SIZE - 4) {
b6b38f70 681 cERROR(1, "Illegal length, greater than maximum frame, %d",
be8e3b00 682 be32_to_cpu(in_buf->smb_buf_length));
6d9c6d54
VL
683 return -EIO;
684 }
685
c5797a94 686 rc = wait_for_free_request(ses->server, long_op);
7ee1af76
JA
687 if (rc)
688 return rc;
689
79a58d1f 690 /* make sure that we sign in the same order that we send on this socket
1da177e4
LT
691 and avoid races inside tcp sendmsg code that could cause corruption
692 of smb data */
693
72ca545b 694 mutex_lock(&ses->server->srv_mutex);
1da177e4 695
7ee1af76
JA
696 rc = allocate_mid(ses, in_buf, &midQ);
697 if (rc) {
72ca545b 698 mutex_unlock(&ses->server->srv_mutex);
7ee1af76 699 /* Update # of requests on wire to server */
45275789 700 add_credits(ses->server, 1);
7ee1af76 701 return rc;
1da177e4
LT
702 }
703
ad009ac9 704 rc = cifs_sign_smb(in_buf, ses->server, &midQ->sequence_number);
829049cb
VL
705 if (rc) {
706 mutex_unlock(&ses->server->srv_mutex);
707 goto out;
708 }
1da177e4 709
7c9421e1 710 midQ->mid_state = MID_REQUEST_SUBMITTED;
789e6661
SF
711
712 cifs_in_send_inc(ses->server);
be8e3b00 713 rc = smb_send(ses->server, in_buf, be32_to_cpu(in_buf->smb_buf_length));
789e6661
SF
714 cifs_in_send_dec(ses->server);
715 cifs_save_when_sent(midQ);
72ca545b 716 mutex_unlock(&ses->server->srv_mutex);
7ee1af76 717
79a58d1f 718 if (rc < 0)
7ee1af76
JA
719 goto out;
720
0ade640e 721 if (long_op == CIFS_ASYNC_OP)
7ee1af76 722 goto out;
1da177e4 723
0ade640e 724 rc = wait_for_response(ses->server, midQ);
1be912dd 725 if (rc != 0) {
121b046a 726 send_cancel(ses->server, in_buf, midQ);
1be912dd 727 spin_lock(&GlobalMid_Lock);
7c9421e1 728 if (midQ->mid_state == MID_REQUEST_SUBMITTED) {
1be912dd
JL
729 /* no longer considered to be "in-flight" */
730 midQ->callback = DeleteMidQEntry;
731 spin_unlock(&GlobalMid_Lock);
45275789 732 add_credits(ses->server, 1);
1be912dd
JL
733 return rc;
734 }
735 spin_unlock(&GlobalMid_Lock);
736 }
1da177e4 737
3c1105df 738 rc = cifs_sync_mid_result(midQ, ses->server);
053d5034 739 if (rc != 0) {
45275789 740 add_credits(ses->server, 1);
1da177e4
LT
741 return rc;
742 }
50c2f753 743
2c8f981d 744 if (!midQ->resp_buf || !out_buf ||
7c9421e1 745 midQ->mid_state != MID_RESPONSE_RECEIVED) {
2b2bdfba 746 rc = -EIO;
b6b38f70 747 cERROR(1, "Bad MID state?");
2c8f981d 748 goto out;
1da177e4 749 }
7ee1af76 750
d4e4854f 751 *pbytes_returned = get_rfc1002_length(midQ->resp_buf);
2c8f981d
JL
752 memcpy(out_buf, midQ->resp_buf, *pbytes_returned + 4);
753 rc = cifs_check_receive(midQ, ses->server, 0);
7ee1af76 754out:
ddc8cf8f 755 delete_mid(midQ);
45275789 756 add_credits(ses->server, 1);
1da177e4 757
7ee1af76
JA
758 return rc;
759}
1da177e4 760
7ee1af76
JA
761/* We send a LOCKINGX_CANCEL_LOCK to cause the Windows
762 blocking lock to return. */
763
764static int
96daf2b0 765send_lock_cancel(const unsigned int xid, struct cifs_tcon *tcon,
7ee1af76
JA
766 struct smb_hdr *in_buf,
767 struct smb_hdr *out_buf)
768{
769 int bytes_returned;
96daf2b0 770 struct cifs_ses *ses = tcon->ses;
7ee1af76
JA
771 LOCK_REQ *pSMB = (LOCK_REQ *)in_buf;
772
773 /* We just modify the current in_buf to change
774 the type of lock from LOCKING_ANDX_SHARED_LOCK
775 or LOCKING_ANDX_EXCLUSIVE_LOCK to
776 LOCKING_ANDX_CANCEL_LOCK. */
777
778 pSMB->LockType = LOCKING_ANDX_CANCEL_LOCK|LOCKING_ANDX_LARGE_FILES;
779 pSMB->Timeout = 0;
88257360 780 pSMB->hdr.Mid = get_next_mid(ses->server);
7ee1af76
JA
781
782 return SendReceive(xid, ses, in_buf, out_buf,
7749981e 783 &bytes_returned, 0);
7ee1af76
JA
784}
785
786int
96daf2b0 787SendReceiveBlockingLock(const unsigned int xid, struct cifs_tcon *tcon,
7ee1af76
JA
788 struct smb_hdr *in_buf, struct smb_hdr *out_buf,
789 int *pbytes_returned)
790{
791 int rc = 0;
792 int rstart = 0;
7ee1af76 793 struct mid_q_entry *midQ;
96daf2b0 794 struct cifs_ses *ses;
7ee1af76
JA
795
796 if (tcon == NULL || tcon->ses == NULL) {
b6b38f70 797 cERROR(1, "Null smb session");
7ee1af76
JA
798 return -EIO;
799 }
800 ses = tcon->ses;
801
79a58d1f 802 if (ses->server == NULL) {
b6b38f70 803 cERROR(1, "Null tcp session");
7ee1af76
JA
804 return -EIO;
805 }
806
79a58d1f 807 if (ses->server->tcpStatus == CifsExiting)
7ee1af76
JA
808 return -ENOENT;
809
79a58d1f 810 /* Ensure that we do not send more than 50 overlapping requests
7ee1af76
JA
811 to the same server. We may make this configurable later or
812 use ses->maxReq */
813
be8e3b00
SF
814 if (be32_to_cpu(in_buf->smb_buf_length) > CIFSMaxBufSize +
815 MAX_CIFS_HDR_SIZE - 4) {
b6b38f70 816 cERROR(1, "Illegal length, greater than maximum frame, %d",
be8e3b00 817 be32_to_cpu(in_buf->smb_buf_length));
6d9c6d54
VL
818 return -EIO;
819 }
820
c5797a94 821 rc = wait_for_free_request(ses->server, CIFS_BLOCKING_OP);
7ee1af76
JA
822 if (rc)
823 return rc;
824
79a58d1f 825 /* make sure that we sign in the same order that we send on this socket
7ee1af76
JA
826 and avoid races inside tcp sendmsg code that could cause corruption
827 of smb data */
828
72ca545b 829 mutex_lock(&ses->server->srv_mutex);
7ee1af76
JA
830
831 rc = allocate_mid(ses, in_buf, &midQ);
832 if (rc) {
72ca545b 833 mutex_unlock(&ses->server->srv_mutex);
7ee1af76
JA
834 return rc;
835 }
836
7ee1af76 837 rc = cifs_sign_smb(in_buf, ses->server, &midQ->sequence_number);
829049cb 838 if (rc) {
ddc8cf8f 839 delete_mid(midQ);
829049cb
VL
840 mutex_unlock(&ses->server->srv_mutex);
841 return rc;
842 }
1da177e4 843
7c9421e1 844 midQ->mid_state = MID_REQUEST_SUBMITTED;
789e6661 845 cifs_in_send_inc(ses->server);
be8e3b00 846 rc = smb_send(ses->server, in_buf, be32_to_cpu(in_buf->smb_buf_length));
789e6661
SF
847 cifs_in_send_dec(ses->server);
848 cifs_save_when_sent(midQ);
72ca545b 849 mutex_unlock(&ses->server->srv_mutex);
7ee1af76 850
79a58d1f 851 if (rc < 0) {
ddc8cf8f 852 delete_mid(midQ);
7ee1af76
JA
853 return rc;
854 }
855
856 /* Wait for a reply - allow signals to interrupt. */
857 rc = wait_event_interruptible(ses->server->response_q,
7c9421e1 858 (!(midQ->mid_state == MID_REQUEST_SUBMITTED)) ||
7ee1af76
JA
859 ((ses->server->tcpStatus != CifsGood) &&
860 (ses->server->tcpStatus != CifsNew)));
861
862 /* Were we interrupted by a signal ? */
863 if ((rc == -ERESTARTSYS) &&
7c9421e1 864 (midQ->mid_state == MID_REQUEST_SUBMITTED) &&
7ee1af76
JA
865 ((ses->server->tcpStatus == CifsGood) ||
866 (ses->server->tcpStatus == CifsNew))) {
867
868 if (in_buf->Command == SMB_COM_TRANSACTION2) {
869 /* POSIX lock. We send a NT_CANCEL SMB to cause the
870 blocking lock to return. */
121b046a 871 rc = send_cancel(ses->server, in_buf, midQ);
7ee1af76 872 if (rc) {
ddc8cf8f 873 delete_mid(midQ);
7ee1af76
JA
874 return rc;
875 }
876 } else {
877 /* Windows lock. We send a LOCKINGX_CANCEL_LOCK
878 to cause the blocking lock to return. */
879
880 rc = send_lock_cancel(xid, tcon, in_buf, out_buf);
881
882 /* If we get -ENOLCK back the lock may have
883 already been removed. Don't exit in this case. */
884 if (rc && rc != -ENOLCK) {
ddc8cf8f 885 delete_mid(midQ);
7ee1af76
JA
886 return rc;
887 }
888 }
889
1be912dd
JL
890 rc = wait_for_response(ses->server, midQ);
891 if (rc) {
121b046a 892 send_cancel(ses->server, in_buf, midQ);
1be912dd 893 spin_lock(&GlobalMid_Lock);
7c9421e1 894 if (midQ->mid_state == MID_REQUEST_SUBMITTED) {
1be912dd
JL
895 /* no longer considered to be "in-flight" */
896 midQ->callback = DeleteMidQEntry;
897 spin_unlock(&GlobalMid_Lock);
898 return rc;
899 }
900 spin_unlock(&GlobalMid_Lock);
7ee1af76 901 }
1be912dd
JL
902
903 /* We got the response - restart system call. */
904 rstart = 1;
7ee1af76
JA
905 }
906
3c1105df 907 rc = cifs_sync_mid_result(midQ, ses->server);
053d5034 908 if (rc != 0)
7ee1af76 909 return rc;
50c2f753 910
17c8bfed 911 /* rcvd frame is ok */
7c9421e1 912 if (out_buf == NULL || midQ->mid_state != MID_RESPONSE_RECEIVED) {
698e96a8 913 rc = -EIO;
b6b38f70 914 cERROR(1, "Bad MID state?");
698e96a8
VL
915 goto out;
916 }
1da177e4 917
d4e4854f 918 *pbytes_returned = get_rfc1002_length(midQ->resp_buf);
2c8f981d
JL
919 memcpy(out_buf, midQ->resp_buf, *pbytes_returned + 4);
920 rc = cifs_check_receive(midQ, ses->server, 0);
17c8bfed 921out:
ddc8cf8f 922 delete_mid(midQ);
7ee1af76
JA
923 if (rstart && rc == -EACCES)
924 return -ERESTARTSYS;
1da177e4
LT
925 return rc;
926}