CIFS: Map SMB2 status codes to POSIX errors
[GitHub/mt8127/android_kernel_alcatel_ttab.git] / fs / cifs / transport.c
CommitLineData
1da177e4
LT
1/*
2 * fs/cifs/transport.c
3 *
ad7a2926 4 * Copyright (C) International Business Machines Corp., 2002,2008
1da177e4 5 * Author(s): Steve French (sfrench@us.ibm.com)
14a441a2 6 * Jeremy Allison (jra@samba.org) 2006.
79a58d1f 7 *
1da177e4
LT
8 * This library is free software; you can redistribute it and/or modify
9 * it under the terms of the GNU Lesser General Public License as published
10 * by the Free Software Foundation; either version 2.1 of the License, or
11 * (at your option) any later version.
12 *
13 * This library is distributed in the hope that it will be useful,
14 * but WITHOUT ANY WARRANTY; without even the implied warranty of
15 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See
16 * the GNU Lesser General Public License for more details.
17 *
18 * You should have received a copy of the GNU Lesser General Public License
19 * along with this library; if not, write to the Free Software
79a58d1f 20 * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
1da177e4
LT
21 */
22
23#include <linux/fs.h>
24#include <linux/list.h>
5a0e3ad6 25#include <linux/gfp.h>
1da177e4
LT
26#include <linux/wait.h>
27#include <linux/net.h>
28#include <linux/delay.h>
f06ac72e 29#include <linux/freezer.h>
1da177e4
LT
30#include <asm/uaccess.h>
31#include <asm/processor.h>
32#include <linux/mempool.h>
33#include "cifspdu.h"
34#include "cifsglob.h"
35#include "cifsproto.h"
36#include "cifs_debug.h"
50c2f753 37
1da177e4 38extern mempool_t *cifs_mid_poolp;
1da177e4 39
2b84a36c
JL
40static void
41wake_up_task(struct mid_q_entry *mid)
42{
43 wake_up_process(mid->callback_data);
44}
45
a6827c18 46struct mid_q_entry *
24b9b06b 47AllocMidQEntry(const struct smb_hdr *smb_buffer, struct TCP_Server_Info *server)
1da177e4
LT
48{
49 struct mid_q_entry *temp;
50
24b9b06b 51 if (server == NULL) {
b6b38f70 52 cERROR(1, "Null TCP session in AllocMidQEntry");
1da177e4
LT
53 return NULL;
54 }
50c2f753 55
232087cb 56 temp = mempool_alloc(cifs_mid_poolp, GFP_NOFS);
1da177e4
LT
57 if (temp == NULL)
58 return temp;
59 else {
26f57364 60 memset(temp, 0, sizeof(struct mid_q_entry));
1da177e4
LT
61 temp->mid = smb_buffer->Mid; /* always LE */
62 temp->pid = current->pid;
7c9421e1
PS
63 temp->command = cpu_to_le16(smb_buffer->Command);
64 cFYI(1, "For smb_command %d", smb_buffer->Command);
1047abc1
SF
65 /* do_gettimeofday(&temp->when_sent);*/ /* easier to use jiffies */
66 /* when mid allocated can be before when sent */
67 temp->when_alloc = jiffies;
2b84a36c
JL
68
69 /*
70 * The default is for the mid to be synchronous, so the
71 * default callback just wakes up the current task.
72 */
73 temp->callback = wake_up_task;
74 temp->callback_data = current;
1da177e4
LT
75 }
76
1da177e4 77 atomic_inc(&midCount);
7c9421e1 78 temp->mid_state = MID_REQUEST_ALLOCATED;
1da177e4
LT
79 return temp;
80}
81
766fdbb5 82void
1da177e4
LT
83DeleteMidQEntry(struct mid_q_entry *midEntry)
84{
1047abc1
SF
85#ifdef CONFIG_CIFS_STATS2
86 unsigned long now;
87#endif
7c9421e1 88 midEntry->mid_state = MID_FREE;
8097531a 89 atomic_dec(&midCount);
7c9421e1 90 if (midEntry->large_buf)
b8643e1b
SF
91 cifs_buf_release(midEntry->resp_buf);
92 else
93 cifs_small_buf_release(midEntry->resp_buf);
1047abc1
SF
94#ifdef CONFIG_CIFS_STATS2
95 now = jiffies;
96 /* commands taking longer than one second are indications that
97 something is wrong, unless it is quite a slow link or server */
79a58d1f
SF
98 if ((now - midEntry->when_alloc) > HZ) {
99 if ((cifsFYI & CIFS_TIMER) &&
7c9421e1
PS
100 (midEntry->command != cpu_to_le16(SMB_COM_LOCKING_ANDX))) {
101 printk(KERN_DEBUG " CIFS slow rsp: cmd %d mid %llu",
1047abc1
SF
102 midEntry->command, midEntry->mid);
103 printk(" A: 0x%lx S: 0x%lx R: 0x%lx\n",
104 now - midEntry->when_alloc,
105 now - midEntry->when_sent,
106 now - midEntry->when_received);
107 }
108 }
109#endif
1da177e4
LT
110 mempool_free(midEntry, cifs_mid_poolp);
111}
112
ddc8cf8f
JL
113static void
114delete_mid(struct mid_q_entry *mid)
115{
116 spin_lock(&GlobalMid_Lock);
117 list_del(&mid->qhead);
118 spin_unlock(&GlobalMid_Lock);
119
120 DeleteMidQEntry(mid);
121}
122
d6e04ae6 123static int
0496e02d 124smb_sendv(struct TCP_Server_Info *server, struct kvec *iov, int n_vec)
1da177e4
LT
125{
126 int rc = 0;
127 int i = 0;
128 struct msghdr smb_msg;
3e84469d
SF
129 unsigned int len = iov[0].iov_len;
130 unsigned int total_len;
131 int first_vec = 0;
792af7b0 132 unsigned int smb_buf_length = get_rfc1002_length(iov[0].iov_base);
edf1ae40 133 struct socket *ssocket = server->ssocket;
50c2f753 134
79a58d1f 135 if (ssocket == NULL)
1da177e4 136 return -ENOTSOCK; /* BB eventually add reconnect code here */
3e84469d 137
a9f1b85e 138 smb_msg.msg_name = (struct sockaddr *) &server->dstaddr;
26f57364 139 smb_msg.msg_namelen = sizeof(struct sockaddr);
1da177e4
LT
140 smb_msg.msg_control = NULL;
141 smb_msg.msg_controllen = 0;
0496e02d 142 if (server->noblocksnd)
edf1ae40
SF
143 smb_msg.msg_flags = MSG_DONTWAIT + MSG_NOSIGNAL;
144 else
145 smb_msg.msg_flags = MSG_NOSIGNAL;
1da177e4 146
3e84469d
SF
147 total_len = 0;
148 for (i = 0; i < n_vec; i++)
149 total_len += iov[i].iov_len;
150
b6b38f70 151 cFYI(1, "Sending smb: total_len %d", total_len);
792af7b0 152 dump_smb(iov[0].iov_base, len);
1da177e4 153
17680356 154 i = 0;
3e84469d
SF
155 while (total_len) {
156 rc = kernel_sendmsg(ssocket, &smb_msg, &iov[first_vec],
157 n_vec - first_vec, total_len);
1da177e4
LT
158 if ((rc == -ENOSPC) || (rc == -EAGAIN)) {
159 i++;
792af7b0
PS
160 /*
161 * If blocking send we try 3 times, since each can block
162 * for 5 seconds. For nonblocking we have to try more
163 * but wait increasing amounts of time allowing time for
164 * socket to clear. The overall time we wait in either
165 * case to send on the socket is about 15 seconds.
166 * Similarly we wait for 15 seconds for a response from
167 * the server in SendReceive[2] for the server to send
168 * a response back for most types of requests (except
169 * SMB Write past end of file which can be slow, and
170 * blocking lock operations). NFS waits slightly longer
171 * than CIFS, but this can make it take longer for
172 * nonresponsive servers to be detected and 15 seconds
173 * is more than enough time for modern networks to
174 * send a packet. In most cases if we fail to send
175 * after the retries we will kill the socket and
176 * reconnect which may clear the network problem.
177 */
da505c38 178 if ((i >= 14) || (!server->noblocksnd && (i > 2))) {
b6b38f70
JP
179 cERROR(1, "sends on sock %p stuck for 15 seconds",
180 ssocket);
1da177e4
LT
181 rc = -EAGAIN;
182 break;
183 }
68058e75 184 msleep(1 << i);
1da177e4
LT
185 continue;
186 }
79a58d1f 187 if (rc < 0)
1da177e4 188 break;
3e84469d 189
61de800d
SF
190 if (rc == total_len) {
191 total_len = 0;
192 break;
193 } else if (rc > total_len) {
b6b38f70 194 cERROR(1, "sent %d requested %d", rc, total_len);
3e84469d
SF
195 break;
196 }
79a58d1f 197 if (rc == 0) {
3e84469d
SF
198 /* should never happen, letting socket clear before
199 retrying is our only obvious option here */
b6b38f70 200 cERROR(1, "tcp sent no data");
3e84469d
SF
201 msleep(500);
202 continue;
d6e04ae6 203 }
3e84469d 204 total_len -= rc;
68058e75 205 /* the line below resets i */
3e84469d
SF
206 for (i = first_vec; i < n_vec; i++) {
207 if (iov[i].iov_len) {
208 if (rc > iov[i].iov_len) {
209 rc -= iov[i].iov_len;
210 iov[i].iov_len = 0;
211 } else {
212 iov[i].iov_base += rc;
213 iov[i].iov_len -= rc;
214 first_vec = i;
215 break;
216 }
217 }
d6e04ae6 218 }
5e1253b5 219 i = 0; /* in case we get ENOSPC on the next send */
1da177e4
LT
220 }
221
edf1ae40 222 if ((total_len > 0) && (total_len != smb_buf_length + 4)) {
b6b38f70
JP
223 cFYI(1, "partial send (%d remaining), terminating session",
224 total_len);
edf1ae40
SF
225 /* If we have only sent part of an SMB then the next SMB
226 could be taken as the remainder of this one. We need
227 to kill the socket so the server throws away the partial
228 SMB */
229 server->tcpStatus = CifsNeedReconnect;
230 }
231
d804d41d 232 if (rc < 0 && rc != -EINTR)
b6b38f70 233 cERROR(1, "Error %d sending data on socket to server", rc);
d804d41d 234 else
1da177e4 235 rc = 0;
1da177e4
LT
236
237 return rc;
238}
239
0496e02d
JL
240int
241smb_send(struct TCP_Server_Info *server, struct smb_hdr *smb_buffer,
242 unsigned int smb_buf_length)
243{
244 struct kvec iov;
245
246 iov.iov_base = smb_buffer;
247 iov.iov_len = smb_buf_length + 4;
248
249 return smb_sendv(server, &iov, 1);
250}
251
fc40f9cf 252static int
a891f0f8 253wait_for_free_credits(struct TCP_Server_Info *server, const int timeout,
bc205ed1 254 int *credits)
1da177e4 255{
5bc59498
PS
256 int rc;
257
fc40f9cf 258 spin_lock(&server->req_lock);
a891f0f8 259 if (timeout == CIFS_ASYNC_OP) {
1da177e4 260 /* oplock breaks must not be held up */
fc40f9cf 261 server->in_flight++;
bc205ed1 262 *credits -= 1;
fc40f9cf 263 spin_unlock(&server->req_lock);
27a97a61
VL
264 return 0;
265 }
266
27a97a61 267 while (1) {
bc205ed1 268 if (*credits <= 0) {
fc40f9cf 269 spin_unlock(&server->req_lock);
789e6661 270 cifs_num_waiters_inc(server);
5bc59498 271 rc = wait_event_killable(server->request_q,
bc205ed1 272 has_credits(server, credits));
789e6661 273 cifs_num_waiters_dec(server);
5bc59498
PS
274 if (rc)
275 return rc;
fc40f9cf 276 spin_lock(&server->req_lock);
27a97a61 277 } else {
c5797a94 278 if (server->tcpStatus == CifsExiting) {
fc40f9cf 279 spin_unlock(&server->req_lock);
27a97a61 280 return -ENOENT;
1da177e4 281 }
27a97a61 282
2d86dbc9
PS
283 /*
284 * Can not count locking commands against total
285 * as they are allowed to block on server.
286 */
27a97a61
VL
287
288 /* update # of requests on the wire to server */
a891f0f8 289 if (timeout != CIFS_BLOCKING_OP) {
bc205ed1 290 *credits -= 1;
fc40f9cf 291 server->in_flight++;
2d86dbc9 292 }
fc40f9cf 293 spin_unlock(&server->req_lock);
27a97a61 294 break;
1da177e4
LT
295 }
296 }
7ee1af76
JA
297 return 0;
298}
1da177e4 299
bc205ed1 300static int
a891f0f8
PS
301wait_for_free_request(struct TCP_Server_Info *server, const int timeout,
302 const int optype)
bc205ed1 303{
a891f0f8
PS
304 return wait_for_free_credits(server, timeout,
305 server->ops->get_credits_field(server, optype));
bc205ed1
PS
306}
307
96daf2b0 308static int allocate_mid(struct cifs_ses *ses, struct smb_hdr *in_buf,
7ee1af76
JA
309 struct mid_q_entry **ppmidQ)
310{
1da177e4 311 if (ses->server->tcpStatus == CifsExiting) {
7ee1af76 312 return -ENOENT;
8fbbd365
VL
313 }
314
315 if (ses->server->tcpStatus == CifsNeedReconnect) {
b6b38f70 316 cFYI(1, "tcp session dead - return to caller to retry");
7ee1af76 317 return -EAGAIN;
8fbbd365
VL
318 }
319
320 if (ses->status != CifsGood) {
1da177e4 321 /* check if SMB session is bad because we are setting it up */
79a58d1f 322 if ((in_buf->Command != SMB_COM_SESSION_SETUP_ANDX) &&
ad7a2926 323 (in_buf->Command != SMB_COM_NEGOTIATE))
7ee1af76 324 return -EAGAIN;
ad7a2926 325 /* else ok - we are setting up session */
1da177e4 326 }
24b9b06b 327 *ppmidQ = AllocMidQEntry(in_buf, ses->server);
26f57364 328 if (*ppmidQ == NULL)
7ee1af76 329 return -ENOMEM;
ddc8cf8f
JL
330 spin_lock(&GlobalMid_Lock);
331 list_add_tail(&(*ppmidQ)->qhead, &ses->server->pending_mid_q);
332 spin_unlock(&GlobalMid_Lock);
7ee1af76
JA
333 return 0;
334}
335
0ade640e
JL
336static int
337wait_for_response(struct TCP_Server_Info *server, struct mid_q_entry *midQ)
7ee1af76 338{
0ade640e 339 int error;
7ee1af76 340
f06ac72e 341 error = wait_event_freezekillable(server->response_q,
7c9421e1 342 midQ->mid_state != MID_REQUEST_SUBMITTED);
0ade640e
JL
343 if (error < 0)
344 return -ERESTARTSYS;
7ee1af76 345
0ade640e 346 return 0;
7ee1af76
JA
347}
348
792af7b0
PS
349static int
350cifs_setup_async_request(struct TCP_Server_Info *server, struct kvec *iov,
351 unsigned int nvec, struct mid_q_entry **ret_mid)
352{
353 int rc;
354 struct smb_hdr *hdr = (struct smb_hdr *)iov[0].iov_base;
355 struct mid_q_entry *mid;
356
357 /* enable signing if server requires it */
358 if (server->sec_mode & (SECMODE_SIGN_REQUIRED | SECMODE_SIGN_ENABLED))
359 hdr->Flags2 |= SMBFLG2_SECURITY_SIGNATURE;
360
361 mid = AllocMidQEntry(hdr, server);
362 if (mid == NULL)
363 return -ENOMEM;
364
762a4206 365 rc = cifs_sign_smbv(iov, nvec, server, &mid->sequence_number);
ffc61ccb
SP
366 if (rc) {
367 DeleteMidQEntry(mid);
368 return rc;
369 }
370
792af7b0 371 *ret_mid = mid;
ffc61ccb 372 return 0;
792af7b0 373}
133672ef 374
a6827c18
JL
375/*
376 * Send a SMB request and set the callback function in the mid to handle
377 * the result. Caller is responsible for dealing with timeouts.
378 */
379int
fcc31cb6 380cifs_call_async(struct TCP_Server_Info *server, struct kvec *iov,
44d22d84 381 unsigned int nvec, mid_receive_t *receive,
a891f0f8 382 mid_callback_t *callback, void *cbdata, const int flags)
a6827c18 383{
a891f0f8 384 int rc, timeout, optype;
a6827c18
JL
385 struct mid_q_entry *mid;
386
a891f0f8
PS
387 timeout = flags & CIFS_TIMEOUT_MASK;
388 optype = flags & CIFS_OP_MASK;
389
390 rc = wait_for_free_request(server, timeout, optype);
a6827c18
JL
391 if (rc)
392 return rc;
393
394 mutex_lock(&server->srv_mutex);
792af7b0
PS
395 rc = cifs_setup_async_request(server, iov, nvec, &mid);
396 if (rc) {
a6827c18 397 mutex_unlock(&server->srv_mutex);
a891f0f8 398 add_credits(server, 1, optype);
0193e072 399 wake_up(&server->request_q);
792af7b0 400 return rc;
a6827c18
JL
401 }
402
44d22d84 403 mid->receive = receive;
a6827c18
JL
404 mid->callback = callback;
405 mid->callback_data = cbdata;
7c9421e1 406 mid->mid_state = MID_REQUEST_SUBMITTED;
789e6661 407
ffc61ccb
SP
408 /* put it on the pending_mid_q */
409 spin_lock(&GlobalMid_Lock);
410 list_add_tail(&mid->qhead, &server->pending_mid_q);
411 spin_unlock(&GlobalMid_Lock);
412
413
789e6661 414 cifs_in_send_inc(server);
fcc31cb6 415 rc = smb_sendv(server, iov, nvec);
789e6661
SF
416 cifs_in_send_dec(server);
417 cifs_save_when_sent(mid);
a6827c18 418 mutex_unlock(&server->srv_mutex);
789e6661 419
ffc61ccb
SP
420 if (rc == 0)
421 return 0;
a6827c18 422
a6827c18 423 delete_mid(mid);
a891f0f8 424 add_credits(server, 1, optype);
a6827c18
JL
425 wake_up(&server->request_q);
426 return rc;
427}
428
133672ef
SF
429/*
430 *
431 * Send an SMB Request. No response info (other than return code)
432 * needs to be parsed.
433 *
434 * flags indicate the type of request buffer and how long to wait
435 * and whether to log NT STATUS code (error) before mapping it to POSIX error
436 *
437 */
438int
96daf2b0 439SendReceiveNoRsp(const unsigned int xid, struct cifs_ses *ses,
792af7b0 440 char *in_buf, int flags)
133672ef
SF
441{
442 int rc;
443 struct kvec iov[1];
444 int resp_buf_type;
445
792af7b0
PS
446 iov[0].iov_base = in_buf;
447 iov[0].iov_len = get_rfc1002_length(in_buf) + 4;
133672ef
SF
448 flags |= CIFS_NO_RESP;
449 rc = SendReceive2(xid, ses, iov, 1, &resp_buf_type, flags);
b6b38f70 450 cFYI(DBG2, "SendRcvNoRsp flags %d rc %d", flags, rc);
90c81e0b 451
133672ef
SF
452 return rc;
453}
454
053d5034 455static int
3c1105df 456cifs_sync_mid_result(struct mid_q_entry *mid, struct TCP_Server_Info *server)
053d5034
JL
457{
458 int rc = 0;
459
7c9421e1
PS
460 cFYI(1, "%s: cmd=%d mid=%llu state=%d", __func__,
461 le16_to_cpu(mid->command), mid->mid, mid->mid_state);
053d5034 462
74dd92a8 463 spin_lock(&GlobalMid_Lock);
7c9421e1 464 switch (mid->mid_state) {
74dd92a8 465 case MID_RESPONSE_RECEIVED:
053d5034
JL
466 spin_unlock(&GlobalMid_Lock);
467 return rc;
74dd92a8
JL
468 case MID_RETRY_NEEDED:
469 rc = -EAGAIN;
470 break;
71823baf
JL
471 case MID_RESPONSE_MALFORMED:
472 rc = -EIO;
473 break;
3c1105df
JL
474 case MID_SHUTDOWN:
475 rc = -EHOSTDOWN;
476 break;
74dd92a8 477 default:
3c1105df 478 list_del_init(&mid->qhead);
7c9421e1
PS
479 cERROR(1, "%s: invalid mid state mid=%llu state=%d", __func__,
480 mid->mid, mid->mid_state);
74dd92a8 481 rc = -EIO;
053d5034
JL
482 }
483 spin_unlock(&GlobalMid_Lock);
484
2b84a36c 485 DeleteMidQEntry(mid);
053d5034
JL
486 return rc;
487}
488
121b046a
JL
489static inline int
490send_cancel(struct TCP_Server_Info *server, void *buf, struct mid_q_entry *mid)
76dcc26f 491{
121b046a
JL
492 return server->ops->send_cancel ?
493 server->ops->send_cancel(server, buf, mid) : 0;
76dcc26f
JL
494}
495
2c8f981d
JL
496int
497cifs_check_receive(struct mid_q_entry *mid, struct TCP_Server_Info *server,
498 bool log_error)
499{
792af7b0 500 unsigned int len = get_rfc1002_length(mid->resp_buf) + 4;
826a95e4
JL
501
502 dump_smb(mid->resp_buf, min_t(u32, 92, len));
2c8f981d
JL
503
504 /* convert the length into a more usable form */
96daf2b0 505 if (server->sec_mode & (SECMODE_SIGN_REQUIRED | SECMODE_SIGN_ENABLED)) {
826a95e4
JL
506 struct kvec iov;
507
508 iov.iov_base = mid->resp_buf;
509 iov.iov_len = len;
2c8f981d 510 /* FIXME: add code to kill session */
826a95e4 511 if (cifs_verify_signature(&iov, 1, server,
2c8f981d
JL
512 mid->sequence_number + 1) != 0)
513 cERROR(1, "Unexpected SMB signature");
514 }
515
516 /* BB special case reconnect tid and uid here? */
517 return map_smb_to_linux_error(mid->resp_buf, log_error);
518}
519
082d0642 520int
792af7b0
PS
521cifs_setup_request(struct cifs_ses *ses, struct kvec *iov,
522 unsigned int nvec, struct mid_q_entry **ret_mid)
523{
524 int rc;
525 struct smb_hdr *hdr = (struct smb_hdr *)iov[0].iov_base;
526 struct mid_q_entry *mid;
527
528 rc = allocate_mid(ses, hdr, &mid);
529 if (rc)
530 return rc;
762a4206 531 rc = cifs_sign_smbv(iov, nvec, ses->server, &mid->sequence_number);
792af7b0
PS
532 if (rc)
533 delete_mid(mid);
534 *ret_mid = mid;
535 return rc;
536}
537
7ee1af76 538int
96daf2b0 539SendReceive2(const unsigned int xid, struct cifs_ses *ses,
a891f0f8 540 struct kvec *iov, int n_vec, int *resp_buf_type /* ret */,
133672ef 541 const int flags)
7ee1af76
JA
542{
543 int rc = 0;
a891f0f8 544 int timeout, optype;
7ee1af76 545 struct mid_q_entry *midQ;
792af7b0 546 char *buf = iov[0].iov_base;
a891f0f8 547 unsigned int credits = 1;
50c2f753 548
a891f0f8
PS
549 timeout = flags & CIFS_TIMEOUT_MASK;
550 optype = flags & CIFS_OP_MASK;
133672ef 551
a891f0f8 552 *resp_buf_type = CIFS_NO_BUFFER; /* no response buf yet */
7ee1af76
JA
553
554 if ((ses == NULL) || (ses->server == NULL)) {
792af7b0 555 cifs_small_buf_release(buf);
b6b38f70 556 cERROR(1, "Null session");
7ee1af76
JA
557 return -EIO;
558 }
559
79a58d1f 560 if (ses->server->tcpStatus == CifsExiting) {
792af7b0 561 cifs_small_buf_release(buf);
7ee1af76
JA
562 return -ENOENT;
563 }
564
792af7b0
PS
565 /*
566 * Ensure that we do not send more than 50 overlapping requests
567 * to the same server. We may make this configurable later or
568 * use ses->maxReq.
569 */
7ee1af76 570
a891f0f8 571 rc = wait_for_free_request(ses->server, timeout, optype);
7ee1af76 572 if (rc) {
792af7b0 573 cifs_small_buf_release(buf);
7ee1af76
JA
574 return rc;
575 }
576
792af7b0
PS
577 /*
578 * Make sure that we sign in the same order that we send on this socket
579 * and avoid races inside tcp sendmsg code that could cause corruption
580 * of smb data.
581 */
7ee1af76 582
72ca545b 583 mutex_lock(&ses->server->srv_mutex);
7ee1af76 584
082d0642 585 rc = ses->server->ops->setup_request(ses, iov, n_vec, &midQ);
7ee1af76 586 if (rc) {
72ca545b 587 mutex_unlock(&ses->server->srv_mutex);
792af7b0 588 cifs_small_buf_release(buf);
7ee1af76 589 /* Update # of requests on wire to server */
a891f0f8 590 add_credits(ses->server, 1, optype);
7ee1af76 591 return rc;
1da177e4 592 }
1da177e4 593
7c9421e1 594 midQ->mid_state = MID_REQUEST_SUBMITTED;
789e6661 595 cifs_in_send_inc(ses->server);
0496e02d 596 rc = smb_sendv(ses->server, iov, n_vec);
789e6661
SF
597 cifs_in_send_dec(ses->server);
598 cifs_save_when_sent(midQ);
7ee1af76 599
72ca545b 600 mutex_unlock(&ses->server->srv_mutex);
7ee1af76 601
2db7c581 602 if (rc < 0) {
792af7b0 603 cifs_small_buf_release(buf);
7ee1af76 604 goto out;
2db7c581 605 }
4b8f930f 606
a891f0f8 607 if (timeout == CIFS_ASYNC_OP) {
792af7b0 608 cifs_small_buf_release(buf);
133672ef 609 goto out;
2db7c581 610 }
d6e04ae6 611
0ade640e 612 rc = wait_for_response(ses->server, midQ);
1be912dd 613 if (rc != 0) {
121b046a 614 send_cancel(ses->server, buf, midQ);
1be912dd 615 spin_lock(&GlobalMid_Lock);
7c9421e1 616 if (midQ->mid_state == MID_REQUEST_SUBMITTED) {
1be912dd
JL
617 midQ->callback = DeleteMidQEntry;
618 spin_unlock(&GlobalMid_Lock);
792af7b0 619 cifs_small_buf_release(buf);
a891f0f8 620 add_credits(ses->server, 1, optype);
1be912dd
JL
621 return rc;
622 }
623 spin_unlock(&GlobalMid_Lock);
624 }
d6e04ae6 625
792af7b0 626 cifs_small_buf_release(buf);
2db7c581 627
3c1105df 628 rc = cifs_sync_mid_result(midQ, ses->server);
053d5034 629 if (rc != 0) {
a891f0f8 630 add_credits(ses->server, 1, optype);
d6e04ae6
SF
631 return rc;
632 }
50c2f753 633
7c9421e1 634 if (!midQ->resp_buf || midQ->mid_state != MID_RESPONSE_RECEIVED) {
d6e04ae6 635 rc = -EIO;
2c8f981d 636 cFYI(1, "Bad MID state?");
2b2bdfba
SF
637 goto out;
638 }
639
792af7b0
PS
640 buf = (char *)midQ->resp_buf;
641 iov[0].iov_base = buf;
642 iov[0].iov_len = get_rfc1002_length(buf) + 4;
7c9421e1 643 if (midQ->large_buf)
a891f0f8 644 *resp_buf_type = CIFS_LARGE_BUFFER;
2c8f981d 645 else
a891f0f8
PS
646 *resp_buf_type = CIFS_SMALL_BUFFER;
647
648 credits = ses->server->ops->get_credits(midQ);
2b2bdfba 649
082d0642
PS
650 rc = ses->server->ops->check_receive(midQ, ses->server,
651 flags & CIFS_LOG_ERROR);
1da177e4 652
2c8f981d
JL
653 /* mark it so buf will not be freed by delete_mid */
654 if ((flags & CIFS_NO_RESP) == 0)
655 midQ->resp_buf = NULL;
7ee1af76 656out:
ddc8cf8f 657 delete_mid(midQ);
a891f0f8 658 add_credits(ses->server, credits, optype);
1da177e4 659
d6e04ae6
SF
660 return rc;
661}
1da177e4
LT
662
663int
96daf2b0 664SendReceive(const unsigned int xid, struct cifs_ses *ses,
1da177e4 665 struct smb_hdr *in_buf, struct smb_hdr *out_buf,
a891f0f8 666 int *pbytes_returned, const int timeout)
1da177e4
LT
667{
668 int rc = 0;
1da177e4
LT
669 struct mid_q_entry *midQ;
670
671 if (ses == NULL) {
b6b38f70 672 cERROR(1, "Null smb session");
1da177e4
LT
673 return -EIO;
674 }
79a58d1f 675 if (ses->server == NULL) {
b6b38f70 676 cERROR(1, "Null tcp session");
1da177e4
LT
677 return -EIO;
678 }
679
79a58d1f 680 if (ses->server->tcpStatus == CifsExiting)
31ca3bc3
SF
681 return -ENOENT;
682
79a58d1f 683 /* Ensure that we do not send more than 50 overlapping requests
1da177e4
LT
684 to the same server. We may make this configurable later or
685 use ses->maxReq */
1da177e4 686
be8e3b00
SF
687 if (be32_to_cpu(in_buf->smb_buf_length) > CIFSMaxBufSize +
688 MAX_CIFS_HDR_SIZE - 4) {
b6b38f70 689 cERROR(1, "Illegal length, greater than maximum frame, %d",
be8e3b00 690 be32_to_cpu(in_buf->smb_buf_length));
6d9c6d54
VL
691 return -EIO;
692 }
693
a891f0f8 694 rc = wait_for_free_request(ses->server, timeout, 0);
7ee1af76
JA
695 if (rc)
696 return rc;
697
79a58d1f 698 /* make sure that we sign in the same order that we send on this socket
1da177e4
LT
699 and avoid races inside tcp sendmsg code that could cause corruption
700 of smb data */
701
72ca545b 702 mutex_lock(&ses->server->srv_mutex);
1da177e4 703
7ee1af76
JA
704 rc = allocate_mid(ses, in_buf, &midQ);
705 if (rc) {
72ca545b 706 mutex_unlock(&ses->server->srv_mutex);
7ee1af76 707 /* Update # of requests on wire to server */
a891f0f8 708 add_credits(ses->server, 1, 0);
7ee1af76 709 return rc;
1da177e4
LT
710 }
711
ad009ac9 712 rc = cifs_sign_smb(in_buf, ses->server, &midQ->sequence_number);
829049cb
VL
713 if (rc) {
714 mutex_unlock(&ses->server->srv_mutex);
715 goto out;
716 }
1da177e4 717
7c9421e1 718 midQ->mid_state = MID_REQUEST_SUBMITTED;
789e6661
SF
719
720 cifs_in_send_inc(ses->server);
be8e3b00 721 rc = smb_send(ses->server, in_buf, be32_to_cpu(in_buf->smb_buf_length));
789e6661
SF
722 cifs_in_send_dec(ses->server);
723 cifs_save_when_sent(midQ);
72ca545b 724 mutex_unlock(&ses->server->srv_mutex);
7ee1af76 725
79a58d1f 726 if (rc < 0)
7ee1af76
JA
727 goto out;
728
a891f0f8 729 if (timeout == CIFS_ASYNC_OP)
7ee1af76 730 goto out;
1da177e4 731
0ade640e 732 rc = wait_for_response(ses->server, midQ);
1be912dd 733 if (rc != 0) {
121b046a 734 send_cancel(ses->server, in_buf, midQ);
1be912dd 735 spin_lock(&GlobalMid_Lock);
7c9421e1 736 if (midQ->mid_state == MID_REQUEST_SUBMITTED) {
1be912dd
JL
737 /* no longer considered to be "in-flight" */
738 midQ->callback = DeleteMidQEntry;
739 spin_unlock(&GlobalMid_Lock);
a891f0f8 740 add_credits(ses->server, 1, 0);
1be912dd
JL
741 return rc;
742 }
743 spin_unlock(&GlobalMid_Lock);
744 }
1da177e4 745
3c1105df 746 rc = cifs_sync_mid_result(midQ, ses->server);
053d5034 747 if (rc != 0) {
a891f0f8 748 add_credits(ses->server, 1, 0);
1da177e4
LT
749 return rc;
750 }
50c2f753 751
2c8f981d 752 if (!midQ->resp_buf || !out_buf ||
7c9421e1 753 midQ->mid_state != MID_RESPONSE_RECEIVED) {
2b2bdfba 754 rc = -EIO;
b6b38f70 755 cERROR(1, "Bad MID state?");
2c8f981d 756 goto out;
1da177e4 757 }
7ee1af76 758
d4e4854f 759 *pbytes_returned = get_rfc1002_length(midQ->resp_buf);
2c8f981d
JL
760 memcpy(out_buf, midQ->resp_buf, *pbytes_returned + 4);
761 rc = cifs_check_receive(midQ, ses->server, 0);
7ee1af76 762out:
ddc8cf8f 763 delete_mid(midQ);
a891f0f8 764 add_credits(ses->server, 1, 0);
1da177e4 765
7ee1af76
JA
766 return rc;
767}
1da177e4 768
7ee1af76
JA
769/* We send a LOCKINGX_CANCEL_LOCK to cause the Windows
770 blocking lock to return. */
771
772static int
96daf2b0 773send_lock_cancel(const unsigned int xid, struct cifs_tcon *tcon,
7ee1af76
JA
774 struct smb_hdr *in_buf,
775 struct smb_hdr *out_buf)
776{
777 int bytes_returned;
96daf2b0 778 struct cifs_ses *ses = tcon->ses;
7ee1af76
JA
779 LOCK_REQ *pSMB = (LOCK_REQ *)in_buf;
780
781 /* We just modify the current in_buf to change
782 the type of lock from LOCKING_ANDX_SHARED_LOCK
783 or LOCKING_ANDX_EXCLUSIVE_LOCK to
784 LOCKING_ANDX_CANCEL_LOCK. */
785
786 pSMB->LockType = LOCKING_ANDX_CANCEL_LOCK|LOCKING_ANDX_LARGE_FILES;
787 pSMB->Timeout = 0;
88257360 788 pSMB->hdr.Mid = get_next_mid(ses->server);
7ee1af76
JA
789
790 return SendReceive(xid, ses, in_buf, out_buf,
7749981e 791 &bytes_returned, 0);
7ee1af76
JA
792}
793
794int
96daf2b0 795SendReceiveBlockingLock(const unsigned int xid, struct cifs_tcon *tcon,
7ee1af76
JA
796 struct smb_hdr *in_buf, struct smb_hdr *out_buf,
797 int *pbytes_returned)
798{
799 int rc = 0;
800 int rstart = 0;
7ee1af76 801 struct mid_q_entry *midQ;
96daf2b0 802 struct cifs_ses *ses;
7ee1af76
JA
803
804 if (tcon == NULL || tcon->ses == NULL) {
b6b38f70 805 cERROR(1, "Null smb session");
7ee1af76
JA
806 return -EIO;
807 }
808 ses = tcon->ses;
809
79a58d1f 810 if (ses->server == NULL) {
b6b38f70 811 cERROR(1, "Null tcp session");
7ee1af76
JA
812 return -EIO;
813 }
814
79a58d1f 815 if (ses->server->tcpStatus == CifsExiting)
7ee1af76
JA
816 return -ENOENT;
817
79a58d1f 818 /* Ensure that we do not send more than 50 overlapping requests
7ee1af76
JA
819 to the same server. We may make this configurable later or
820 use ses->maxReq */
821
be8e3b00
SF
822 if (be32_to_cpu(in_buf->smb_buf_length) > CIFSMaxBufSize +
823 MAX_CIFS_HDR_SIZE - 4) {
b6b38f70 824 cERROR(1, "Illegal length, greater than maximum frame, %d",
be8e3b00 825 be32_to_cpu(in_buf->smb_buf_length));
6d9c6d54
VL
826 return -EIO;
827 }
828
a891f0f8 829 rc = wait_for_free_request(ses->server, CIFS_BLOCKING_OP, 0);
7ee1af76
JA
830 if (rc)
831 return rc;
832
79a58d1f 833 /* make sure that we sign in the same order that we send on this socket
7ee1af76
JA
834 and avoid races inside tcp sendmsg code that could cause corruption
835 of smb data */
836
72ca545b 837 mutex_lock(&ses->server->srv_mutex);
7ee1af76
JA
838
839 rc = allocate_mid(ses, in_buf, &midQ);
840 if (rc) {
72ca545b 841 mutex_unlock(&ses->server->srv_mutex);
7ee1af76
JA
842 return rc;
843 }
844
7ee1af76 845 rc = cifs_sign_smb(in_buf, ses->server, &midQ->sequence_number);
829049cb 846 if (rc) {
ddc8cf8f 847 delete_mid(midQ);
829049cb
VL
848 mutex_unlock(&ses->server->srv_mutex);
849 return rc;
850 }
1da177e4 851
7c9421e1 852 midQ->mid_state = MID_REQUEST_SUBMITTED;
789e6661 853 cifs_in_send_inc(ses->server);
be8e3b00 854 rc = smb_send(ses->server, in_buf, be32_to_cpu(in_buf->smb_buf_length));
789e6661
SF
855 cifs_in_send_dec(ses->server);
856 cifs_save_when_sent(midQ);
72ca545b 857 mutex_unlock(&ses->server->srv_mutex);
7ee1af76 858
79a58d1f 859 if (rc < 0) {
ddc8cf8f 860 delete_mid(midQ);
7ee1af76
JA
861 return rc;
862 }
863
864 /* Wait for a reply - allow signals to interrupt. */
865 rc = wait_event_interruptible(ses->server->response_q,
7c9421e1 866 (!(midQ->mid_state == MID_REQUEST_SUBMITTED)) ||
7ee1af76
JA
867 ((ses->server->tcpStatus != CifsGood) &&
868 (ses->server->tcpStatus != CifsNew)));
869
870 /* Were we interrupted by a signal ? */
871 if ((rc == -ERESTARTSYS) &&
7c9421e1 872 (midQ->mid_state == MID_REQUEST_SUBMITTED) &&
7ee1af76
JA
873 ((ses->server->tcpStatus == CifsGood) ||
874 (ses->server->tcpStatus == CifsNew))) {
875
876 if (in_buf->Command == SMB_COM_TRANSACTION2) {
877 /* POSIX lock. We send a NT_CANCEL SMB to cause the
878 blocking lock to return. */
121b046a 879 rc = send_cancel(ses->server, in_buf, midQ);
7ee1af76 880 if (rc) {
ddc8cf8f 881 delete_mid(midQ);
7ee1af76
JA
882 return rc;
883 }
884 } else {
885 /* Windows lock. We send a LOCKINGX_CANCEL_LOCK
886 to cause the blocking lock to return. */
887
888 rc = send_lock_cancel(xid, tcon, in_buf, out_buf);
889
890 /* If we get -ENOLCK back the lock may have
891 already been removed. Don't exit in this case. */
892 if (rc && rc != -ENOLCK) {
ddc8cf8f 893 delete_mid(midQ);
7ee1af76
JA
894 return rc;
895 }
896 }
897
1be912dd
JL
898 rc = wait_for_response(ses->server, midQ);
899 if (rc) {
121b046a 900 send_cancel(ses->server, in_buf, midQ);
1be912dd 901 spin_lock(&GlobalMid_Lock);
7c9421e1 902 if (midQ->mid_state == MID_REQUEST_SUBMITTED) {
1be912dd
JL
903 /* no longer considered to be "in-flight" */
904 midQ->callback = DeleteMidQEntry;
905 spin_unlock(&GlobalMid_Lock);
906 return rc;
907 }
908 spin_unlock(&GlobalMid_Lock);
7ee1af76 909 }
1be912dd
JL
910
911 /* We got the response - restart system call. */
912 rstart = 1;
7ee1af76
JA
913 }
914
3c1105df 915 rc = cifs_sync_mid_result(midQ, ses->server);
053d5034 916 if (rc != 0)
7ee1af76 917 return rc;
50c2f753 918
17c8bfed 919 /* rcvd frame is ok */
7c9421e1 920 if (out_buf == NULL || midQ->mid_state != MID_RESPONSE_RECEIVED) {
698e96a8 921 rc = -EIO;
b6b38f70 922 cERROR(1, "Bad MID state?");
698e96a8
VL
923 goto out;
924 }
1da177e4 925
d4e4854f 926 *pbytes_returned = get_rfc1002_length(midQ->resp_buf);
2c8f981d
JL
927 memcpy(out_buf, midQ->resp_buf, *pbytes_returned + 4);
928 rc = cifs_check_receive(midQ, ses->server, 0);
17c8bfed 929out:
ddc8cf8f 930 delete_mid(midQ);
7ee1af76
JA
931 if (rstart && rc == -EACCES)
932 return -ERESTARTSYS;
1da177e4
LT
933 return rc;
934}