Viewing file: proc.c (62.26 KB) -rw-r--r-- Select action/file-type: (+) | (+) | (+) | Code (+) | Session (+) | (+) | SDB (+) | (+) | (+) | (+) | (+) | (+) |
/* * proc.c * * Copyright (C) 1995, 1996 by Paal-Kr. Engstad and Volker Lendecke * Copyright (C) 1997 by Volker Lendecke * * Please add a note about your changes to smbfs in the ChangeLog file. */
#include <linux/types.h> #include <linux/errno.h> #include <linux/slab.h> #include <linux/fs.h> #include <linux/file.h> #include <linux/stat.h> #include <linux/fcntl.h> #include <linux/dcache.h> #include <linux/dirent.h> #include <linux/nls.h>
#include <linux/smb_fs.h> #include <linux/smbno.h> #include <linux/smb_mount.h>
#include <asm/string.h> #include <asm/div64.h>
#include "smb_debug.h" #include "proto.h"
/* Features. Undefine if they cause problems, this should perhaps be a config option. */ #define SMBFS_POSIX_UNLINK 1
/* Allow smb_retry to be interrupted. */ #define SMB_RETRY_INTR
#define SMB_VWV(packet) ((packet) + SMB_HEADER_LEN) #define SMB_CMD(packet) (*(packet+8)) #define SMB_WCT(packet) (*(packet+SMB_HEADER_LEN - 1)) #define SMB_BCC(packet) smb_bcc(packet) #define SMB_BUF(packet) ((packet) + SMB_HEADER_LEN + SMB_WCT(packet) * 2 + 2)
#define SMB_DIRINFO_SIZE 43 #define SMB_STATUS_SIZE 21
#define SMB_ST_BLKSIZE (PAGE_SIZE) #define SMB_ST_BLKSHIFT (PAGE_SHIFT)
static int smb_proc_setattr_ext(struct smb_sb_info *, struct inode *, struct smb_fattr *); static int smb_proc_setattr_core(struct smb_sb_info *server, struct dentry *dentry, __u16 attr); static int smb_proc_do_getattr(struct smb_sb_info *server, struct dentry *dir, struct smb_fattr *fattr);
static void str_upper(char *name, int len) { while (len--) { if (*name >= 'a' && *name <= 'z') *name -= ('a' - 'A'); name++; } }
#if 0 static void str_lower(char *name, int len) { while (len--) { if (*name >= 'A' && *name <= 'Z') *name += ('a' - 'A'); name++; } } #endif
/* reverse a string inline. This is used by the dircache walking routines */ static void reverse_string(char *buf, int len) { char c; char *end = buf+len-1;
while(buf < end) { c = *buf; *(buf++) = *end; *(end--) = c; } }
/* no conversion, just a wrapper for memcpy. */ static int convert_memcpy(char *output, int olen, const char *input, int ilen, struct nls_table *nls_from, struct nls_table *nls_to) { if (olen < ilen) return -ENAMETOOLONG; memcpy(output, input, ilen); return ilen; }
/* convert from one "codepage" to another (possibly being utf8). */ static int convert_cp(char *output, int olen, const char *input, int ilen, struct nls_table *nls_from, struct nls_table *nls_to) { int len = 0; int n; wchar_t ch;
if (!nls_from || !nls_to) { PARANOIA("nls_from=%p, nls_to=%p\n", nls_from, nls_to); return convert_memcpy(output, olen, input, ilen, NULL, NULL); }
while (ilen > 0) { /* convert by changing to unicode and back to the new cp */ n = nls_from->char2uni((unsigned char *)input, ilen, &ch); if (n < 0) goto fail; input += n; ilen -= n;
n = nls_to->uni2char(ch, output, olen); if (n < 0) goto fail; output += n; olen -= n;
len += n; } return len; fail: return n; }
static int setcodepage(struct nls_table **p, char *name) { struct nls_table *nls;
if (!name || !*name) { nls = NULL; } else if ( (nls = load_nls(name)) == NULL) { printk (KERN_ERR "smbfs: failed to load nls '%s'\n", name); return -EINVAL; }
/* if already set, unload the previous one. */ if (*p) unload_nls(*p); *p = nls;
return 0; }
/* Handles all changes to codepage settings. */ int smb_setcodepage(struct smb_sb_info *server, struct smb_nls_codepage *cp) { int n = 0;
smb_lock_server(server);
/* Don't load any nls_* at all, if no remote is requested */ if (!*cp->remote_name) goto out;
n = setcodepage(&server->local_nls, cp->local_name); if (n != 0) goto out; n = setcodepage(&server->remote_nls, cp->remote_name); if (n != 0) setcodepage(&server->local_nls, NULL);
out: if (server->local_nls != NULL && server->remote_nls != NULL) server->convert = convert_cp; else server->convert = convert_memcpy;
smb_unlock_server(server); return n; }
/*****************************************************************************/ /* */ /* Encoding/Decoding section */ /* */ /*****************************************************************************/
static __u8 * smb_encode_smb_length(__u8 * p, __u32 len) { *p = 0; *(p+1) = 0; *(p+2) = (len & 0xFF00) >> 8; *(p+3) = (len & 0xFF); if (len > 0xFFFF) { *(p+1) = 1; } return p + 4; }
/* * smb_build_path: build the path to entry and name storing it in buf. * The path returned will have the trailing '\0'. */ static int smb_build_path(struct smb_sb_info *server, char * buf, int maxlen, struct dentry * entry, struct qstr * name) { char *path = buf; int len;
if (maxlen < 2) return -ENAMETOOLONG;
if (maxlen > SMB_MAXNAMELEN + 1) maxlen = SMB_MAXNAMELEN + 1;
if (entry == NULL) goto test_name_and_out;
/* * If IS_ROOT, we have to do no walking at all. */ if (IS_ROOT(entry) && !name) { *path++ = '\\'; *path++ = '\0'; return 2; }
/* * Build the path string walking the tree backward from end to ROOT * and store it in reversed order [see reverse_string()] */ while (!IS_ROOT(entry)) { if (maxlen < 3) return -ENAMETOOLONG;
len = server->convert(path, maxlen-2, entry->d_name.name, entry->d_name.len, server->local_nls, server->remote_nls); if (len < 0) return len; reverse_string(path, len); path += len; *path++ = '\\'; maxlen -= len+1;
entry = entry->d_parent; if (IS_ROOT(entry)) break; } reverse_string(buf, path-buf);
/* maxlen is at least 1 */ test_name_and_out: if (name) { if (maxlen < 3) return -ENAMETOOLONG; *path++ = '\\'; len = server->convert(path, maxlen-2, name->name, name->len, server->local_nls, server->remote_nls); if (len < 0) return len; path += len; maxlen -= len+1; } /* maxlen is at least 1 */ *path++ = '\0'; return path-buf; }
static int smb_encode_path(struct smb_sb_info *server, char *buf, int maxlen, struct dentry *dir, struct qstr *name) { int result;
result = smb_build_path(server, buf, maxlen, dir, name); if (result < 0) goto out; if (server->opt.protocol <= SMB_PROTOCOL_COREPLUS) str_upper(buf, result); out: return result; }
static int smb_simple_encode_path(struct smb_sb_info *server, char **p, struct dentry * entry, struct qstr * name) { char *s = *p; int res; int maxlen = ((char *)server->packet + server->packet_size) - s;
if (!maxlen) return -ENAMETOOLONG; *s++ = 4; res = smb_encode_path(server, s, maxlen-1, entry, name); if (res < 0) return res; *p = s + res; return 0; }
/* The following are taken directly from msdos-fs */
/* Linear day numbers of the respective 1sts in non-leap years. */
static int day_n[] = {0, 31, 59, 90, 120, 151, 181, 212, 243, 273, 304, 334, 0, 0, 0, 0}; /* JanFebMarApr May Jun Jul Aug Sep Oct Nov Dec */
static time_t utc2local(struct smb_sb_info *server, time_t time) { return time - server->opt.serverzone*60; }
static time_t local2utc(struct smb_sb_info *server, time_t time) { return time + server->opt.serverzone*60; }
/* Convert a MS-DOS time/date pair to a UNIX date (seconds since 1 1 70). */
static time_t date_dos2unix(struct smb_sb_info *server, __u16 date, __u16 time) { int month, year; time_t secs;
/* first subtract and mask after that... Otherwise, if date == 0, bad things happen */ month = ((date >> 5) - 1) & 15; year = date >> 9; secs = (time & 31) * 2 + 60 * ((time >> 5) & 63) + (time >> 11) * 3600 + 86400 * ((date & 31) - 1 + day_n[month] + (year / 4) + year * 365 - ((year & 3) == 0 && month < 2 ? 1 : 0) + 3653); /* days since 1.1.70 plus 80's leap day */ return local2utc(server, secs); }
/* Convert linear UNIX date to a MS-DOS time/date pair. */
static void date_unix2dos(struct smb_sb_info *server, int unix_date, __u16 *date, __u16 *time) { int day, year, nl_day, month;
unix_date = utc2local(server, unix_date); if (unix_date < 315532800) unix_date = 315532800;
*time = (unix_date % 60) / 2 + (((unix_date / 60) % 60) << 5) + (((unix_date / 3600) % 24) << 11);
day = unix_date / 86400 - 3652; year = day / 365; if ((year + 3) / 4 + 365 * year > day) year--; day -= (year + 3) / 4 + 365 * year; if (day == 59 && !(year & 3)) { nl_day = day; month = 2; } else { nl_day = (year & 3) || day <= 59 ? day : day - 1; for (month = 0; month < 12; month++) if (day_n[month] > nl_day) break; } *date = nl_day - day_n[month - 1] + 1 + (month << 5) + (year << 9); }
/* The following are taken from fs/ntfs/util.c */
#define NTFS_TIME_OFFSET ((u64)(369*365 + 89) * 24 * 3600 * 10000000)
/* * Convert the NT UTC (based 1601-01-01, in hundred nanosecond units) * into Unix UTC (based 1970-01-01, in seconds). */ static time_t smb_ntutc2unixutc(u64 ntutc) { /* FIXME: what about the timezone difference? */ /* Subtract the NTFS time offset, then convert to 1s intervals. */ u64 t = ntutc - NTFS_TIME_OFFSET; do_div(t, 10000000); return (time_t)t; }
#if 0 /* Convert the Unix UTC into NT time */ static u64 smb_unixutc2ntutc(struct smb_sb_info *server, time_t t) { /* Note: timezone conversion is probably wrong. */ return ((u64)utc2local(server, t)) * 10000000 + NTFS_TIME_OFFSET; } #endif
/*****************************************************************************/ /* */ /* Support section. */ /* */ /*****************************************************************************/
__u32 smb_len(__u8 * p) { return ((*(p+1) & 0x1) << 16L) | (*(p+2) << 8L) | *(p+3); }
static __u16 smb_bcc(__u8 * packet) { int pos = SMB_HEADER_LEN + SMB_WCT(packet) * sizeof(__u16); return WVAL(packet, pos); }
/* smb_valid_packet: We check if packet fulfills the basic requirements of a smb packet */
static int smb_valid_packet(__u8 * packet) { return (packet[4] == 0xff && packet[5] == 'S' && packet[6] == 'M' && packet[7] == 'B' && (smb_len(packet) + 4 == SMB_HEADER_LEN + SMB_WCT(packet) * 2 + SMB_BCC(packet))); }
/* smb_verify: We check if we got the answer we expected, and if we got enough data. If bcc == -1, we don't care. */
static int smb_verify(__u8 * packet, int command, int wct, int bcc) { if (SMB_CMD(packet) != command) goto bad_command; if (SMB_WCT(packet) < wct) goto bad_wct; if (bcc != -1 && SMB_BCC(packet) < bcc) goto bad_bcc; return 0;
bad_command: printk(KERN_ERR "smb_verify: command=%x, SMB_CMD=%x??\n", command, SMB_CMD(packet)); goto fail; bad_wct: printk(KERN_ERR "smb_verify: command=%x, wct=%d, SMB_WCT=%d??\n", command, wct, SMB_WCT(packet)); goto fail; bad_bcc: printk(KERN_ERR "smb_verify: command=%x, bcc=%d, SMB_BCC=%d??\n", command, bcc, SMB_BCC(packet)); fail: return -EIO; }
/* * Returns the maximum read or write size for the "payload". Making all of the * packet fit within the negotiated max_xmit size. * * N.B. Since this value is usually computed before locking the server, * the server's packet size must never be decreased! */ static inline int smb_get_xmitsize(struct smb_sb_info *server, int overhead) { return server->opt.max_xmit - overhead; }
/* * Calculate the maximum read size */ int smb_get_rsize(struct smb_sb_info *server) { int overhead = SMB_HEADER_LEN + 5 * sizeof(__u16) + 2 + 1 + 2; int size = smb_get_xmitsize(server, overhead);
VERBOSE("packet=%d, xmit=%d, size=%d\n", server->packet_size, server->opt.max_xmit, size);
return size; }
/* * Calculate the maximum write size */ int smb_get_wsize(struct smb_sb_info *server) { int overhead = SMB_HEADER_LEN + 5 * sizeof(__u16) + 2 + 1 + 2; int size = smb_get_xmitsize(server, overhead);
VERBOSE("packet=%d, xmit=%d, size=%d\n", server->packet_size, server->opt.max_xmit, size);
return size; }
/* * Convert SMB error codes to -E... errno values. */ int smb_errno(struct smb_sb_info *server) { int errcls = server->rcls; int error = server->err; char *class = "Unknown";
VERBOSE("errcls %d code %d from command 0x%x\n", errcls, error, SMB_CMD(server->packet));
if (errcls == ERRDOS) { switch (error) { case ERRbadfunc: return -EINVAL; case ERRbadfile: case ERRbadpath: return -ENOENT; case ERRnofids: return -EMFILE; case ERRnoaccess: return -EACCES; case ERRbadfid: return -EBADF; case ERRbadmcb: return -EREMOTEIO; case ERRnomem: return -ENOMEM; case ERRbadmem: return -EFAULT; case ERRbadenv: case ERRbadformat: return -EREMOTEIO; case ERRbadaccess: return -EACCES; case ERRbaddata: return -E2BIG; case ERRbaddrive: return -ENXIO; case ERRremcd: return -EREMOTEIO; case ERRdiffdevice: return -EXDEV; case ERRnofiles: return -ENOENT; case ERRbadshare: return -ETXTBSY; case ERRlock: return -EDEADLK; case ERRfilexists: return -EEXIST; case ERROR_INVALID_PARAMETER: return -EINVAL; case ERROR_DISK_FULL: return -ENOSPC; case ERROR_INVALID_NAME: return -ENOENT; case ERROR_DIR_NOT_EMPTY: return -ENOTEMPTY; case ERROR_NOT_LOCKED: return -ENOLCK; case ERROR_ALREADY_EXISTS: return -EEXIST; default: class = "ERRDOS"; goto err_unknown; } } else if (errcls == ERRSRV) { switch (error) { /* N.B. This is wrong ... EIO ? */ case ERRerror: return -ENFILE; case ERRbadpw: return -EINVAL; case ERRbadtype: return -EIO; case ERRaccess: return -EACCES; /* * This is a fatal error, as it means the "tree ID" * for this connection is no longer valid. We map * to a special error code and get a new connection. */ case ERRinvnid: return -EBADSLT; default: class = "ERRSRV"; goto err_unknown; } } else if (errcls == ERRHRD) { switch (error) { case ERRnowrite: return -EROFS; case ERRbadunit: return -ENODEV; case ERRnotready: return -EUCLEAN; case ERRbadcmd: case ERRdata: return -EIO; case ERRbadreq: return -ERANGE; case ERRbadshare: return -ETXTBSY; case ERRlock: return -EDEADLK; case ERRdiskfull: return -ENOSPC; default: class = "ERRHRD"; goto err_unknown; } } else if (errcls == ERRCMD) { class = "ERRCMD"; } else if (errcls == SUCCESS) { return 0; /* This is the only valid 0 return */ }
err_unknown: printk(KERN_ERR "smb_errno: class %s, code %d from command 0x%x\n", class, error, SMB_CMD(server->packet)); return -EIO; }
/* * smb_retry: This function should be called when smb_request_ok has * indicated an error. If the error was indicated because the * connection was killed, we try to reconnect. If smb_retry returns 0, * the error was indicated for another reason, so a retry would not be * of any use. * N.B. The server must be locked for this call. */ static int smb_retry(struct smb_sb_info *server) { pid_t pid = server->conn_pid; int error, result = 0;
if (server->state == CONN_VALID || server->state == CONN_RETRYING) goto out;
smb_close_socket(server);
if (pid == 0) { printk(KERN_ERR "smb_retry: no connection process\n"); server->state = CONN_RETRIED; goto out; }
/* * Change state so that only one retry per server will be started. */ server->state = CONN_RETRYING;
/* * Note: use the "priv" flag, as a user process may need to reconnect. */ error = kill_proc(pid, SIGUSR1, 1); if (error) { /* FIXME: this is fatal */ printk(KERN_ERR "smb_retry: signal failed, error=%d\n", error); goto out; } VERBOSE("signalled pid %d, waiting for new connection\n", pid);
/* * Wait for the new connection. */ #ifdef SMB_RETRY_INTR smb_unlock_server(server); interruptible_sleep_on_timeout(&server->wait, 30*HZ); smb_lock_server(server); if (signal_pending(current)) printk(KERN_INFO "smb_retry: caught signal\n"); #else /* * We don't want to be interrupted. For example, what if 'current' * already has received a signal? sleep_on would terminate immediately * and smbmount would not be able to re-establish connection. * * smbmount should be able to reconnect later, but it can't because * it will get an -EIO on attempts to open the mountpoint! * * FIXME: go back to the interruptable version now that smbmount * can avoid -EIO on the mountpoint when reconnecting? */ smb_unlock_server(server); sleep_on_timeout(&server->wait, 30*HZ); smb_lock_server(server); #endif
/* * Check for a valid connection. */ if (server->state == CONN_VALID) { /* This should be changed to VERBOSE, except many smbfs problems is with the userspace daemon not reconnecting. */ PARANOIA("successful, new pid=%d, generation=%d\n", server->conn_pid, server->generation); result = 1; } else if (server->state == CONN_RETRYING) { /* allow further attempts later */ server->state = CONN_RETRIED; }
out: return result; }
/* smb_request_ok: We expect the server to be locked. Then we do the request and check the answer completely. When smb_request_ok returns 0, you can be quite sure that everything went well. When the answer is <=0, the returned number is a valid unix errno. */
static int smb_request_ok(struct smb_sb_info *s, int command, int wct, int bcc) { int result = -EIO;
s->rcls = 0; s->err = 0;
/* Make sure we have a connection */ if (s->state != CONN_VALID) { if (!smb_retry(s)) goto out; }
if (smb_request(s) < 0) { DEBUG1("smb_request failed\n"); goto out; } if (smb_valid_packet(s->packet) != 0) { PARANOIA("invalid packet!\n"); goto out; }
/* * Check for server errors. */ if (s->rcls != 0) { result = smb_errno(s); if (!result) printk(KERN_DEBUG "smb_request_ok: rcls=%d, err=%d mapped to 0\n", s->rcls, s->err); /* * Exit now even if the error was squashed ... * packet verify will fail anyway. */ goto out; } result = smb_verify(s->packet, command, wct, bcc);
out: return result; }
/* * This implements the NEWCONN ioctl. It installs the server pid, * sets server->state to CONN_VALID, and wakes up the waiting process. */ int smb_newconn(struct smb_sb_info *server, struct smb_conn_opt *opt) { struct file *filp; int error;
VERBOSE("fd=%d, pid=%d\n", opt->fd, current->pid);
smb_lock_server(server);
/* * Make sure we don't already have a valid connection ... */ error = -EINVAL; if (server->state == CONN_VALID) goto out;
error = -EACCES; if (current->uid != server->mnt->mounted_uid && !capable(CAP_SYS_ADMIN)) goto out;
error = -EBADF; filp = fget(opt->fd); if (!filp) goto out; if (!smb_valid_socket(filp->f_dentry->d_inode)) goto out_putf;
server->sock_file = filp; server->conn_pid = current->pid; smb_catch_keepalive(server); server->opt = *opt; server->generation += 1; server->state = CONN_VALID; error = 0;
/* check if we have an old smbmount that uses seconds for the serverzone */ if (server->opt.serverzone > 12*60 || server->opt.serverzone < -12*60) server->opt.serverzone /= 60;
/* now that we have an established connection we can detect the server type and enable bug workarounds */ if (server->opt.protocol == SMB_PROTOCOL_NT1 && (server->opt.max_xmit < 0x1000) && !(server->opt.capabilities & SMB_CAP_NT_SMBS)) { server->mnt->flags |= SMB_MOUNT_WIN95; VERBOSE("smb_newconn: detected WIN95 server\n"); }
VERBOSE("protocol=%d, max_xmit=%d, pid=%d capabilities=0x%x\n", server->opt.protocol, server->opt.max_xmit, server->conn_pid, server->opt.capabilities);
/* Make sure we can fit a message of the negotiated size in our packet buffer. */ if (server->opt.max_xmit > server->packet_size) { int len = smb_round_length(server->opt.max_xmit); char *buf = smb_vmalloc(len); if (buf) { if (server->packet) smb_vfree(server->packet); server->packet = buf; server->packet_size = len; } else { /* else continue with the too small buffer? */ PARANOIA("Failed to allocate new packet buffer: " "max_xmit=%d, packet_size=%d\n", server->opt.max_xmit, server->packet_size); server->opt.max_xmit = server->packet_size; } }
out: smb_unlock_server(server); smb_wakeup(server); return error;
out_putf: fput(filp); goto out; }
int smb_wakeup(struct smb_sb_info *server) { #ifdef SMB_RETRY_INTR wake_up_interruptible(&server->wait); #else wake_up(&server->wait); #endif return 0; }
/* smb_setup_header: We completely set up the packet. You only have to insert the command-specific fields */
__u8 * smb_setup_header(struct smb_sb_info * server, __u8 command, __u16 wct, __u16 bcc) { __u32 xmit_len = SMB_HEADER_LEN + wct * sizeof(__u16) + bcc + 2; __u8 *p = server->packet; __u8 *buf = server->packet;
if (xmit_len > server->packet_size) printk(KERN_DEBUG "smb_setup_header: " "Aieee, xmit len > packet! len=%d, size=%d\n", xmit_len, server->packet_size);
p = smb_encode_smb_length(p, xmit_len - 4);
*p++ = 0xff; *p++ = 'S'; *p++ = 'M'; *p++ = 'B'; *p++ = command;
memset(p, '\0', 19); p += 19; p += 8;
WSET(buf, smb_tid, server->opt.tid); WSET(buf, smb_pid, 1); WSET(buf, smb_uid, server->opt.server_uid); WSET(buf, smb_mid, 1);
if (server->opt.protocol > SMB_PROTOCOL_CORE) { *(buf+smb_flg) = 0x8; WSET(buf, smb_flg2, 0x3); } *p++ = wct; /* wct */ p += 2 * wct; WSET(p, 0, bcc); return p + 2; }
static void smb_setup_bcc(struct smb_sb_info *server, __u8 * p) { __u8 *packet = server->packet; __u8 *pbcc = packet + SMB_HEADER_LEN + 2 * SMB_WCT(packet); __u16 bcc = p - (pbcc + 2);
WSET(pbcc, 0, bcc); smb_encode_smb_length(packet, SMB_HEADER_LEN + 2 * SMB_WCT(packet) - 2 + bcc); }
/* * Called with the server locked */ static int smb_proc_seek(struct smb_sb_info *server, __u16 fileid, __u16 mode, off_t offset) { int result;
smb_setup_header(server, SMBlseek, 4, 0); WSET(server->packet, smb_vwv0, fileid); WSET(server->packet, smb_vwv1, mode); DSET(server->packet, smb_vwv2, offset);
result = smb_request_ok(server, SMBlseek, 2, 0); if (result < 0) { result = 0; goto out; }
result = DVAL(server->packet, smb_vwv0); out: return result; }
/* * We're called with the server locked, and we leave it that way. */ static int smb_proc_open(struct smb_sb_info *server, struct dentry *dentry, int wish) { struct inode *ino = dentry->d_inode; int mode, read_write = 0x42, read_only = 0x40; int res; char *p;
/* * Attempt to open r/w, unless there are no write privileges. */ mode = read_write; if (!(ino->i_mode & (S_IWUSR | S_IWGRP | S_IWOTH))) mode = read_only; #if 0 /* FIXME: why is this code not in? below we fix it so that a caller wanting RO doesn't get RW. smb_revalidate_inode does some optimization based on access mode. tail -f needs it to be correct.
We must open rw since we don't do the open if called a second time with different 'wish'. Is that not supported by smb servers? */ if (!(wish & (O_WRONLY | O_RDWR))) mode = read_only; #endif
retry: p = smb_setup_header(server, SMBopen, 2, 0); WSET(server->packet, smb_vwv0, mode); WSET(server->packet, smb_vwv1, aSYSTEM | aHIDDEN | aDIR); res = smb_simple_encode_path(server, &p, dentry, NULL); if (res < 0) goto out; smb_setup_bcc(server, p);
res = smb_request_ok(server, SMBopen, 7, 0); if (res != 0) { if (smb_retry(server)) goto retry;
if (mode == read_write && (res == -EACCES || res == -ETXTBSY || res == -EROFS)) { VERBOSE("%s/%s R/W failed, error=%d, retrying R/O\n", DENTRY_PATH(dentry), res); mode = read_only; goto retry; } goto out; } /* We should now have data in vwv[0..6]. */
ino->u.smbfs_i.fileid = WVAL(server->packet, smb_vwv0); ino->u.smbfs_i.attr = WVAL(server->packet, smb_vwv1); /* smb_vwv2 has mtime */ /* smb_vwv4 has size */ ino->u.smbfs_i.access = (WVAL(server->packet, smb_vwv6) & SMB_ACCMASK); ino->u.smbfs_i.open = server->generation;
out: return res; }
/* * Make sure the file is open, and check that the access * is compatible with the desired access. */ int smb_open(struct dentry *dentry, int wish) { struct inode *inode = dentry->d_inode; int result;
result = -ENOENT; if (!inode) { printk(KERN_ERR "smb_open: no inode for dentry %s/%s\n", DENTRY_PATH(dentry)); goto out; }
if (!smb_is_open(inode)) { struct smb_sb_info *server = server_from_inode(inode); smb_lock_server(server); result = 0; if (!smb_is_open(inode)) result = smb_proc_open(server, dentry, wish); smb_unlock_server(server); if (result) { PARANOIA("%s/%s open failed, result=%d\n", DENTRY_PATH(dentry), result); goto out; } /* * A successful open means the path is still valid ... */ smb_renew_times(dentry); }
/* * Check whether the access is compatible with the desired mode. */ result = 0; if (inode->u.smbfs_i.access != wish && inode->u.smbfs_i.access != SMB_O_RDWR) { PARANOIA("%s/%s access denied, access=%x, wish=%x\n", DENTRY_PATH(dentry), inode->u.smbfs_i.access, wish); result = -EACCES; } out: return result; }
/* We're called with the server locked */
static int smb_proc_close(struct smb_sb_info *server, __u16 fileid, __u32 mtime) { smb_setup_header(server, SMBclose, 3, 0); WSET(server->packet, smb_vwv0, fileid); DSET(server->packet, smb_vwv1, utc2local(server, mtime)); return smb_request_ok(server, SMBclose, 0, 0); }
/* * Called with the server locked. * * Win NT 4.0 has an apparent bug in that it fails to update the * modify time when writing to a file. As a workaround, we update * both modify and access time locally, and post the times to the * server when closing the file. */ static int smb_proc_close_inode(struct smb_sb_info *server, struct inode * ino) { int result = 0; if (smb_is_open(ino)) { /* * We clear the open flag in advance, in case another * process observes the value while we block below. */ ino->u.smbfs_i.open = 0;
/* * Kludge alert: SMB timestamps are accurate only to * two seconds ... round the times to avoid needless * cache invalidations! */ if (ino->i_mtime & 1) ino->i_mtime--; if (ino->i_atime & 1) ino->i_atime--; /* * If the file is open with write permissions, * update the time stamps to sync mtime and atime. */ if ((server->opt.protocol >= SMB_PROTOCOL_LANMAN2) && !(ino->u.smbfs_i.access == SMB_O_RDONLY)) { struct smb_fattr fattr; smb_get_inode_attr(ino, &fattr); smb_proc_setattr_ext(server, ino, &fattr); }
result = smb_proc_close(server, ino->u.smbfs_i.fileid, ino->i_mtime); /* * Force a revalidation after closing ... some servers * don't post the size until the file has been closed. */ if (server->opt.protocol < SMB_PROTOCOL_NT1) ino->u.smbfs_i.oldmtime = 0; ino->u.smbfs_i.closed = jiffies; } return result; }
int smb_close(struct inode *ino) { int result = 0;
if (smb_is_open(ino)) { struct smb_sb_info *server = server_from_inode(ino); smb_lock_server(server); result = smb_proc_close_inode(server, ino); smb_unlock_server(server); } return result; }
/* * This is used to close a file following a failed instantiate. * Since we don't have an inode, we can't use any of the above. */ int smb_close_fileid(struct dentry *dentry, __u16 fileid) { struct smb_sb_info *server = server_from_dentry(dentry); int result;
smb_lock_server(server); result = smb_proc_close(server, fileid, CURRENT_TIME); smb_unlock_server(server); return result; }
/* In smb_proc_read and smb_proc_write we do not retry, because the file-id would not be valid after a reconnection. */
int smb_proc_read(struct inode *inode, off_t offset, int count, char *data) { struct smb_sb_info *server = server_from_inode(inode); __u16 returned_count, data_len; unsigned char *buf; int result;
smb_lock_server(server); smb_setup_header(server, SMBread, 5, 0); buf = server->packet; WSET(buf, smb_vwv0, inode->u.smbfs_i.fileid); WSET(buf, smb_vwv1, count); DSET(buf, smb_vwv2, offset); WSET(buf, smb_vwv4, 0);
result = smb_request_ok(server, SMBread, 5, -1); if (result < 0) goto out; returned_count = WVAL(server->packet, smb_vwv0);
buf = SMB_BUF(server->packet); data_len = WVAL(buf, 1);
/* we can NOT simply trust the data_len given by the server ... */ if (data_len > server->packet_size - (buf+3 - server->packet)) { printk(KERN_ERR "smb_proc_read: invalid data length!! " "%d > %d - (%p - %p)\n", data_len, server->packet_size, buf+3, server->packet); result = -EIO; goto out; }
memcpy(data, buf+3, data_len);
if (returned_count != data_len) { printk(KERN_NOTICE "smb_proc_read: returned != data_len\n"); printk(KERN_NOTICE "smb_proc_read: ret_c=%d, data_len=%d\n", returned_count, data_len); } result = data_len;
out: VERBOSE("ino=%ld, fileid=%d, count=%d, result=%d\n", inode->i_ino, inode->u.smbfs_i.fileid, count, result); smb_unlock_server(server); return result; }
int smb_proc_write(struct inode *inode, off_t offset, int count, const char *data) { struct smb_sb_info *server = server_from_inode(inode); int result; __u8 *p; __u16 fileid = inode->u.smbfs_i.fileid;
VERBOSE("ino=%ld, fileid=%d, count=%d@%ld, packet_size=%d\n", inode->i_ino, inode->u.smbfs_i.fileid, count, offset, server->packet_size);
smb_lock_server(server); p = smb_setup_header(server, SMBwrite, 5, count + 3); WSET(server->packet, smb_vwv0, fileid); WSET(server->packet, smb_vwv1, count); DSET(server->packet, smb_vwv2, offset); WSET(server->packet, smb_vwv4, 0);
*p++ = 1; WSET(p, 0, count); memcpy(p+2, data, count);
result = smb_request_ok(server, SMBwrite, 1, 0); if (result >= 0) result = WVAL(server->packet, smb_vwv0);
smb_unlock_server(server); return result; }
int smb_proc_create(struct dentry *dentry, __u16 attr, time_t ctime, __u16 *fileid) { struct smb_sb_info *server = server_from_dentry(dentry); char *p; int result;
smb_lock_server(server);
retry: p = smb_setup_header(server, SMBcreate, 3, 0); WSET(server->packet, smb_vwv0, attr); DSET(server->packet, smb_vwv1, utc2local(server, ctime)); result = smb_simple_encode_path(server, &p, dentry, NULL); if (result < 0) goto out; smb_setup_bcc(server, p);
result = smb_request_ok(server, SMBcreate, 1, 0); if (result < 0) { if (smb_retry(server)) goto retry; goto out; } *fileid = WVAL(server->packet, smb_vwv0); result = 0;
out: smb_unlock_server(server); return result; }
int smb_proc_mv(struct dentry *old_dentry, struct dentry *new_dentry) { struct smb_sb_info *server = server_from_dentry(old_dentry); char *p; int result;
smb_lock_server(server);
retry: p = smb_setup_header(server, SMBmv, 1, 0); WSET(server->packet, smb_vwv0, aSYSTEM | aHIDDEN | aDIR); result = smb_simple_encode_path(server, &p, old_dentry, NULL); if (result < 0) goto out; result = smb_simple_encode_path(server, &p, new_dentry, NULL); if (result < 0) goto out; smb_setup_bcc(server, p);
if ((result = smb_request_ok(server, SMBmv, 0, 0)) < 0) { if (smb_retry(server)) goto retry; goto out; } result = 0; out: smb_unlock_server(server); return result; }
/* * Code common to mkdir and rmdir. */ static int smb_proc_generic_command(struct dentry *dentry, __u8 command) { struct smb_sb_info *server = server_from_dentry(dentry); char *p; int result;
smb_lock_server(server);
retry: p = smb_setup_header(server, command, 0, 0); result = smb_simple_encode_path(server, &p, dentry, NULL); if (result < 0) goto out; smb_setup_bcc(server, p);
result = smb_request_ok(server, command, 0, 0); if (result < 0) { if (smb_retry(server)) goto retry; goto out; } result = 0; out: smb_unlock_server(server); return result; }
int smb_proc_mkdir(struct dentry *dentry) { return smb_proc_generic_command(dentry, SMBmkdir); }
int smb_proc_rmdir(struct dentry *dentry) { return smb_proc_generic_command(dentry, SMBrmdir); }
#if SMBFS_POSIX_UNLINK /* * Removes readonly attribute from a file. Used by unlink to give posix * semantics. * Note: called with the server locked. */ static int smb_set_rw(struct dentry *dentry,struct smb_sb_info *server) { int result; struct smb_fattr fattr;
/* first get current attribute */ result = smb_proc_do_getattr(server, dentry, &fattr); if (result < 0) return result;
/* if RONLY attribute is set, remove it */ if (fattr.attr & aRONLY) { /* read only attribute is set */ fattr.attr &= ~aRONLY; result = smb_proc_setattr_core(server, dentry, fattr.attr); } return result; } #endif
int smb_proc_unlink(struct dentry *dentry) { struct smb_sb_info *server = server_from_dentry(dentry); int flag = 0; char *p; int result;
smb_lock_server(server);
retry: p = smb_setup_header(server, SMBunlink, 1, 0); WSET(server->packet, smb_vwv0, aSYSTEM | aHIDDEN); result = smb_simple_encode_path(server, &p, dentry, NULL); if (result < 0) goto out; smb_setup_bcc(server, p);
if ((result = smb_request_ok(server, SMBunlink, 0, 0)) < 0) { #if SMBFS_POSIX_UNLINK if (result == -EACCES && !flag) { /* Posix semantics is for the read-only state of a file to be ignored in unlink(). In the SMB world a unlink() is refused on a read-only file. To make things easier for unix users we try to override the files permission if the unlink fails with the right error. This introduces a race condition that could lead to a file being written by someone who shouldn't have access, but as far as I can tell that is unavoidable */
/* remove RONLY attribute and try again */ result = smb_set_rw(dentry,server); if (result == 0) { flag = 1; goto retry; } } #endif if (smb_retry(server)) goto retry; goto out; } result = 0; out: smb_unlock_server(server); return result; }
/* * Called with the server locked */ int smb_proc_flush(struct smb_sb_info *server, __u16 fileid) { smb_setup_header(server, SMBflush, 1, 0); WSET(server->packet, smb_vwv0, fileid); return smb_request_ok(server, SMBflush, 0, 0); }
int smb_proc_trunc(struct smb_sb_info *server, __u16 fid, __u32 length) { char *p; int result;
smb_lock_server(server);
retry: p = smb_setup_header(server, SMBwrite, 5, 3); WSET(server->packet, smb_vwv0, fid); WSET(server->packet, smb_vwv1, 0); DSET(server->packet, smb_vwv2, length); WSET(server->packet, smb_vwv4, 0); *p++ = 1; WSET(p, 0, 0);
if ((result = smb_request_ok(server, SMBwrite, 1, 0)) < 0) { if (smb_retry(server)) goto retry; goto out; }
/* * win9x doesn't appear to update the size immediately. * It will return the old file size after the truncate, * confusing smbfs. * NT and Samba return the new value immediately. */ if (server->mnt->flags & SMB_MOUNT_WIN95) smb_proc_flush(server, fid); out: smb_unlock_server(server); return result; }
static void smb_init_dirent(struct smb_sb_info *server, struct smb_fattr *fattr) { memset(fattr, 0, sizeof(*fattr));
fattr->f_nlink = 1; fattr->f_uid = server->mnt->uid; fattr->f_gid = server->mnt->gid; fattr->f_blksize = SMB_ST_BLKSIZE; }
static void smb_finish_dirent(struct smb_sb_info *server, struct smb_fattr *fattr) { fattr->f_mode = server->mnt->file_mode; if (fattr->attr & aDIR) { fattr->f_mode = server->mnt->dir_mode; fattr->f_size = SMB_ST_BLKSIZE; } /* Check the read-only flag */ if (fattr->attr & aRONLY) fattr->f_mode &= ~(S_IWUSR | S_IWGRP | S_IWOTH);
/* How many 512 byte blocks do we need for this file? */ fattr->f_blocks = 0; if (fattr->f_size != 0) fattr->f_blocks = 1 + ((fattr->f_size-1) >> 9); return; }
void smb_init_root_dirent(struct smb_sb_info *server, struct smb_fattr *fattr) { smb_init_dirent(server, fattr); fattr->attr = aDIR; fattr->f_ino = 2; /* traditional root inode number */ fattr->f_mtime = CURRENT_TIME; smb_finish_dirent(server, fattr); }
/* * Decode a dirent for old protocols * * qname is filled with the decoded, and possibly translated, name. * fattr receives decoded attributes * * Bugs Noted: * (1) Pathworks servers may pad the name with extra spaces. */ static char * smb_decode_short_dirent(struct smb_sb_info *server, char *p, struct qstr *qname, struct smb_fattr *fattr) { int len;
/* * SMB doesn't have a concept of inode numbers ... */ smb_init_dirent(server, fattr); fattr->f_ino = 0; /* FIXME: do we need this? */
p += SMB_STATUS_SIZE; /* reserved (search_status) */ fattr->attr = *p; fattr->f_mtime = date_dos2unix(server, WVAL(p, 3), WVAL(p, 1)); fattr->f_size = DVAL(p, 5); fattr->f_ctime = fattr->f_mtime; fattr->f_atime = fattr->f_mtime; qname->name = p + 9; len = strnlen(qname->name, 12);
/* * Trim trailing blanks for Pathworks servers */ while (len > 2 && qname->name[len-1] == ' ') len--; qname->len = len;
smb_finish_dirent(server, fattr);
#if 0 /* FIXME: These only work for ascii chars, and recent smbmount doesn't allow the flag to be set anyway. It kills const. Remove? */ switch (server->opt.case_handling) { case SMB_CASE_UPPER: str_upper(entry->name, len); break; case SMB_CASE_LOWER: str_lower(entry->name, len); break; default: break; } #endif
qname->len = server->convert(server->name_buf, SMB_MAXNAMELEN, qname->name, len, server->remote_nls, server->local_nls); qname->name = server->name_buf;
DEBUG1("len=%d, name=%.*s\n", qname->len, qname->len, qname->name); return p + 22; }
/* * This routine is used to read in directory entries from the network. * Note that it is for short directory name seeks, i.e.: protocol < * SMB_PROTOCOL_LANMAN2 */ static int smb_proc_readdir_short(struct file *filp, void *dirent, filldir_t filldir, struct smb_cache_control *ctl) { struct dentry *dir = filp->f_dentry; struct smb_sb_info *server = server_from_dentry(dir); struct qstr qname; struct smb_fattr fattr; char *p; int result; int i, first, entries_seen, entries; int entries_asked = (server->opt.max_xmit - 100) / SMB_DIRINFO_SIZE; __u16 bcc; __u16 count; char status[SMB_STATUS_SIZE]; static struct qstr mask = { "*.*", 3, 0 }; unsigned char *last_status;
VERBOSE("%s/%s\n", DENTRY_PATH(dir));
smb_lock_server(server);
first = 1; entries = 0; entries_seen = 2; /* implicit . and .. */
while (1) { p = smb_setup_header(server, SMBsearch, 2, 0); WSET(server->packet, smb_vwv0, entries_asked); WSET(server->packet, smb_vwv1, aDIR); if (first == 1) { result = smb_simple_encode_path(server, &p, dir, &mask); if (result < 0) goto unlock_return; if (p + 3 > (char*)server->packet+server->packet_size) { result = -ENAMETOOLONG; goto unlock_return; } *p++ = 5; WSET(p, 0, 0); p += 2; first = 0; } else { if (p + 5 + SMB_STATUS_SIZE > (char*)server->packet + server->packet_size) { result = -ENAMETOOLONG; goto unlock_return; } *p++ = 4; *p++ = 0; *p++ = 5; WSET(p, 0, SMB_STATUS_SIZE); p += 2; memcpy(p, status, SMB_STATUS_SIZE); p += SMB_STATUS_SIZE; }
smb_setup_bcc(server, p);
result = smb_request_ok(server, SMBsearch, 1, -1); if (result < 0) { if ((server->rcls == ERRDOS) && (server->err == ERRnofiles)) break; if (smb_retry(server)) { ctl->idx = -1; /* retry */ result = 0; } goto unlock_return; } p = SMB_VWV(server->packet); count = WVAL(p, 0); if (count <= 0) break;
result = -EIO; bcc = WVAL(p, 2); if (bcc != count * SMB_DIRINFO_SIZE + 3) goto unlock_return; p += 7;
/* Make sure the response fits in the buffer. Fixed sized entries means we don't have to check in the decode loop. */
last_status = SMB_BUF(server->packet) + 3 + (count - 1) * SMB_DIRINFO_SIZE;
if (last_status + SMB_DIRINFO_SIZE >= server->packet + server->packet_size) { printk(KERN_ERR "smb_proc_readdir_short: " "last dir entry outside buffer! " "%d@%p %d@%p\n", SMB_DIRINFO_SIZE, last_status, server->packet_size, server->packet); goto unlock_return; }
/* Read the last entry into the status field. */ memcpy(status, last_status, SMB_STATUS_SIZE);
/* Now we are ready to parse smb directory entries. */
for (i = 0; i < count; i++) { p = smb_decode_short_dirent(server, p, &qname, &fattr);
if (entries_seen == 2 && qname.name[0] == '.') { if (qname.len == 1) continue; if (qname.name[1] == '.' && qname.len == 2) continue; } if (!smb_fill_cache(filp, dirent, filldir, ctl, &qname, &fattr)) ; /* stop reading? */ entries_seen++; } } result = entries;
unlock_return: smb_unlock_server(server); return result; }
/* * Interpret a long filename structure using the specified info level: * level 1 for anything below NT1 protocol * level 260 for NT1 protocol * * qname is filled with the decoded, and possibly translated, name * fattr receives decoded attributes. * * Bugs Noted: * (1) Win NT 4.0 appends a null byte to names and counts it in the length! */ static char * smb_decode_long_dirent(struct smb_sb_info *server, char *p, int level, struct qstr *qname, struct smb_fattr *fattr) { char *result; unsigned int len = 0; __u16 date, time;
/* * SMB doesn't have a concept of inode numbers ... */ smb_init_dirent(server, fattr); fattr->f_ino = 0; /* FIXME: do we need this? */
switch (level) { case 1: len = *((unsigned char *) p + 22); qname->name = p + 23; result = p + 24 + len;
date = WVAL(p, 0); time = WVAL(p, 2); fattr->f_ctime = date_dos2unix(server, date, time);
date = WVAL(p, 4); time = WVAL(p, 6); fattr->f_atime = date_dos2unix(server, date, time);
date = WVAL(p, 8); time = WVAL(p, 10); fattr->f_mtime = date_dos2unix(server, date, time); fattr->f_size = DVAL(p, 12); /* ULONG allocation size */ fattr->attr = WVAL(p, 20);
VERBOSE("info 1 at %p, len=%d, name=%.*s\n", p, len, len, qname->name); break; case 260: result = p + WVAL(p, 0); len = DVAL(p, 60); if (len > 255) len = 255; /* NT4 null terminates */ qname->name = p + 94; if (len && qname->name[len-1] == '\0') len--;
fattr->f_ctime = smb_ntutc2unixutc(LVAL(p, 8)); fattr->f_atime = smb_ntutc2unixutc(LVAL(p, 16)); fattr->f_mtime = smb_ntutc2unixutc(LVAL(p, 24)); /* change time (32) */ fattr->f_size = DVAL(p, 40); /* alloc size (48) */ fattr->attr = DVAL(p, 56);
VERBOSE("info 260 at %p, len=%d, name=%.*s\n", p, len, len, qname->name); break; default: PARANOIA("Unknown info level %d\n", level); result = p + WVAL(p, 0); goto out; }
smb_finish_dirent(server, fattr);
#if 0 /* FIXME: These only work for ascii chars, and recent smbmount doesn't allow the flag to be set anyway. Remove? */ switch (server->opt.case_handling) { case SMB_CASE_UPPER: str_upper(qname->name, len); break; case SMB_CASE_LOWER: str_lower(qname->name, len); break; default: break; } #endif
qname->len = server->convert(server->name_buf, SMB_MAXNAMELEN, qname->name, len, server->remote_nls, server->local_nls); qname->name = server->name_buf;
out: return result; }
/* findfirst/findnext flags */ #define SMB_CLOSE_AFTER_FIRST (1<<0) #define SMB_CLOSE_IF_END (1<<1) #define SMB_REQUIRE_RESUME_KEY (1<<2) #define SMB_CONTINUE_BIT (1<<3)
/* * Note: samba-2.0.7 (at least) has a very similar routine, cli_list, in * source/libsmb/clilist.c. When looking for smb bugs in the readdir code, * go there for advise. * * Bugs Noted: * (1) When using Info Level 1 Win NT 4.0 truncates directory listings * for certain patterns of names and/or lengths. The breakage pattern * is completely reproducible and can be toggled by the creation of a * single file. (E.g. echo hi >foo breaks, rm -f foo works.) */ static int smb_proc_readdir_long(struct file *filp, void *dirent, filldir_t filldir, struct smb_cache_control *ctl) { struct dentry *dir = filp->f_dentry; struct smb_sb_info *server = server_from_dentry(dir); struct qstr qname; struct smb_fattr fattr;
unsigned char *p, *lastname; char *mask, *param = server->temp_buf; __u16 command; int first, entries_seen;
/* Both NT and OS/2 accept info level 1 (but see note below). */ int info_level = 260; const int max_matches = 512;
unsigned char *resp_data = NULL; unsigned char *resp_param = NULL; int resp_data_len = 0; int resp_param_len = 0; int ff_searchcount = 0; int ff_eos = 0; int ff_lastname = 0; int ff_dir_handle = 0; int loop_count = 0; int mask_len, i, result; static struct qstr star = { "*", 1, 0 };
/* * use info level 1 for older servers that don't do 260 */ if (server->opt.protocol < SMB_PROTOCOL_NT1) info_level = 1;
smb_lock_server(server);
/* * Encode the initial path */ mask = param + 12;
mask_len = smb_encode_path(server, mask, SMB_MAXNAMELEN+1, dir, &star); if (mask_len < 0) { result = mask_len; goto unlock_return; } mask_len--; /* mask_len is strlen, not #bytes */ first = 1; VERBOSE("starting mask_len=%d, mask=%s\n", mask_len, mask);
result = 0; entries_seen = 2; ff_eos = 0;
while (ff_eos == 0) { loop_count += 1; if (loop_count > 10) { printk(KERN_WARNING "smb_proc_readdir_long: " "Looping in FIND_NEXT??\n"); result = -EIO; break; }
if (first != 0) { command = TRANSACT2_FINDFIRST; WSET(param, 0, aSYSTEM | aHIDDEN | aDIR); WSET(param, 2, max_matches); /* max count */ WSET(param, 4, SMB_CLOSE_IF_END); WSET(param, 6, info_level); DSET(param, 8, 0); } else { command = TRANSACT2_FINDNEXT;
VERBOSE("handle=0x%X, lastname=%d, mask=%s\n", ff_dir_handle, ff_lastname, mask);
WSET(param, 0, ff_dir_handle); /* search handle */ WSET(param, 2, max_matches); /* max count */ WSET(param, 4, info_level); DSET(param, 6, 0); WSET(param, 10, SMB_CONTINUE_BIT|SMB_CLOSE_IF_END); }
result = smb_trans2_request(server, command, 0, NULL, 12 + mask_len + 1, param, &resp_data_len, &resp_data, &resp_param_len, &resp_param);
if (result < 0) { if (smb_retry(server)) { PARANOIA("error=%d, retrying\n", result); ctl->idx = -1; /* retry */ result = 0; goto unlock_return; } PARANOIA("error=%d, breaking\n", result); break; }
if (server->rcls == ERRSRV && server->err == ERRerror) { /* a damn Win95 bug - sometimes it clags if you ask it too fast */ current->state = TASK_INTERRUPTIBLE; schedule_timeout(HZ/5); continue; }
if (server->rcls != 0) { result = smb_errno(server); PARANOIA("name=%s, result=%d, rcls=%d, err=%d\n", mask, result, server->rcls, server->err); break; }
/* parse out some important return info */ if (first != 0) { ff_dir_handle = WVAL(resp_param, 0); ff_searchcount = WVAL(resp_param, 2); ff_eos = WVAL(resp_param, 4); ff_lastname = WVAL(resp_param, 8); } else { ff_searchcount = WVAL(resp_param, 0); ff_eos = WVAL(resp_param, 2); ff_lastname = WVAL(resp_param, 6); }
if (ff_searchcount == 0) break;
/* * We might need the lastname for continuations. * * Note that some servers (win95?) point to the filename and * others (NT4, Samba using NT1) to the dir entry. We assume * here that those who do not point to a filename do not need * this info to continue the listing. * * OS/2 needs this and talks infolevel 1 * NetApps want lastname with infolevel 260 * * Both are happy if we return the data they point to. So we do. */ mask_len = 0; if (ff_lastname > 0 && ff_lastname < resp_data_len) { lastname = resp_data + ff_lastname;
switch (info_level) { case 260: mask_len = resp_data_len - ff_lastname; break; case 1: /* lastname points to a length byte */ mask_len = *lastname++; if (ff_lastname + 1 + mask_len > resp_data_len) mask_len = resp_data_len - ff_lastname - 1; break; }
/* * Update the mask string for the next message. */ if (mask_len < 0) mask_len = 0; if (mask_len > 255) mask_len = 255; if (mask_len) strncpy(mask, lastname, mask_len); } mask_len = strnlen(mask, mask_len); VERBOSE("new mask, len=%d@%d of %d, mask=%.*s\n", mask_len, ff_lastname, resp_data_len, mask_len, mask);
/* Now we are ready to parse smb directory entries. */
/* point to the data bytes */ p = resp_data; for (i = 0; i < ff_searchcount; i++) { /* make sure we stay within the buffer */ if (p >= resp_data + resp_data_len) { printk(KERN_ERR "smb_proc_readdir_long: " "dirent pointer outside buffer! " "%p %d@%p %d@%p\n", p, resp_data_len, resp_data, server->packet_size, server->packet); result = -EIO; /* always a comm. error? */ goto unlock_return; }
p = smb_decode_long_dirent(server, p, info_level, &qname, &fattr);
/* ignore . and .. from the server */ if (entries_seen == 2 && qname.name[0] == '.') { if (qname.len == 1) continue; if (qname.name[1] == '.' && qname.len == 2) continue; }
if (!smb_fill_cache(filp, dirent, filldir, ctl, &qname, &fattr)) ; /* stop reading? */ entries_seen++; }
VERBOSE("received %d entries, eos=%d\n", ff_searchcount,ff_eos);
first = 0; loop_count = 0; }
unlock_return: smb_unlock_server(server); return result; }
int smb_proc_readdir(struct file *filp, void *dirent, filldir_t filldir, struct smb_cache_control *ctl) { struct smb_sb_info *server = server_from_dentry(filp->f_dentry);
if (server->opt.protocol >= SMB_PROTOCOL_LANMAN2) return smb_proc_readdir_long(filp, dirent, filldir, ctl); else return smb_proc_readdir_short(filp, dirent, filldir, ctl); }
/* * This version uses the trans2 TRANSACT2_FINDFIRST message * to get the attribute data. * Note: called with the server locked. * * Bugs Noted: */ static int smb_proc_getattr_ff(struct smb_sb_info *server, struct dentry *dentry, struct smb_fattr *fattr) { char *param = server->temp_buf, *mask = param + 12; __u16 date, time; unsigned char *resp_data = NULL; unsigned char *resp_param = NULL; int resp_data_len = 0; int resp_param_len = 0; int mask_len, result;
retry: mask_len = smb_encode_path(server, mask, SMB_MAXNAMELEN+1, dentry, NULL); if (mask_len < 0) { result = mask_len; goto out; } VERBOSE("name=%s, len=%d\n", mask, mask_len); WSET(param, 0, aSYSTEM | aHIDDEN | aDIR); WSET(param, 2, 1); /* max count */ WSET(param, 4, 1); /* close after this call */ WSET(param, 6, 1); /* info_level */ DSET(param, 8, 0);
result = smb_trans2_request(server, TRANSACT2_FINDFIRST, 0, NULL, 12 + mask_len, param, &resp_data_len, &resp_data, &resp_param_len, &resp_param); if (result < 0) { if (smb_retry(server)) goto retry; goto out; } if (server->rcls != 0) { result = smb_errno(server); #ifdef SMBFS_PARANOIA if (result != -ENOENT) PARANOIA("error for %s, rcls=%d, err=%d\n", mask, server->rcls, server->err); #endif goto out; } /* Make sure we got enough data ... */ result = -EINVAL; if (resp_data_len < 22 || WVAL(resp_param, 2) != 1) { PARANOIA("bad result for %s, len=%d, count=%d\n", mask, resp_data_len, WVAL(resp_param, 2)); goto out; }
/* * Decode the response into the fattr ... */ date = WVAL(resp_data, 0); time = WVAL(resp_data, 2); fattr->f_ctime = date_dos2unix(server, date, time);
date = WVAL(resp_data, 4); time = WVAL(resp_data, 6); fattr->f_atime = date_dos2unix(server, date, time);
date = WVAL(resp_data, 8); time = WVAL(resp_data, 10); fattr->f_mtime = date_dos2unix(server, date, time); VERBOSE("name=%s, date=%x, time=%x, mtime=%ld\n", mask, date, time, fattr->f_mtime); fattr->f_size = DVAL(resp_data, 12); /* ULONG allocation size */ fattr->attr = WVAL(resp_data, 20); result = 0;
out: return result; }
/* * Note: called with the server locked. */ static int smb_proc_getattr_core(struct smb_sb_info *server, struct dentry *dir, struct smb_fattr *fattr) { int result; char *p;
retry: p = smb_setup_header(server, SMBgetatr, 0, 0); result = smb_simple_encode_path(server, &p, dir, NULL); if (result < 0) goto out; smb_setup_bcc(server, p);
if ((result = smb_request_ok(server, SMBgetatr, 10, 0)) < 0) { if (smb_retry(server)) goto retry; goto out; } fattr->attr = WVAL(server->packet, smb_vwv0); fattr->f_mtime = local2utc(server, DVAL(server->packet, smb_vwv1)); fattr->f_size = DVAL(server->packet, smb_vwv3); fattr->f_ctime = fattr->f_mtime; fattr->f_atime = fattr->f_mtime; #ifdef SMBFS_DEBUG_TIMESTAMP printk("getattr_core: %s/%s, mtime=%ld\n", DENTRY_PATH(dir), fattr->f_mtime); #endif result = 0;
out: return result; }
/* * Note: called with the server locked. * * Bugs Noted: * (1) Win 95 swaps the date and time fields in the standard info level. */ static int smb_proc_getattr_trans2(struct smb_sb_info *server, struct dentry *dir, struct smb_fattr *attr) { char *p, *param = server->temp_buf; __u16 date, time; int off_date = 0, off_time = 2; unsigned char *resp_data = NULL; unsigned char *resp_param = NULL; int resp_data_len = 0; int resp_param_len = 0; int result;
retry: WSET(param, 0, 1); /* Info level SMB_INFO_STANDARD */ DSET(param, 2, 0); result = smb_encode_path(server, param+6, SMB_MAXNAMELEN+1, dir, NULL); if (result < 0) goto out; p = param + 6 + result;
result = smb_trans2_request(server, TRANSACT2_QPATHINFO, 0, NULL, p - param, param, &resp_data_len, &resp_data, &resp_param_len, &resp_param); if (result < 0) { if (smb_retry(server)) goto retry; goto out; } if (server->rcls != 0) { VERBOSE("for %s: result=%d, rcls=%d, err=%d\n", ¶m[6], result, server->rcls, server->err); result = smb_errno(server); goto out; } result = -ENOENT; if (resp_data_len < 22) { PARANOIA("not enough data for %s, len=%d\n", ¶m[6], resp_data_len); goto out; }
/* * Kludge alert: Win 95 swaps the date and time field, * contrary to the CIFS docs and Win NT practice. */ if (server->mnt->flags & SMB_MOUNT_WIN95) { off_date = 2; off_time = 0; } date = WVAL(resp_data, off_date); time = WVAL(resp_data, off_time); attr->f_ctime = date_dos2unix(server, date, time);
date = WVAL(resp_data, 4 + off_date); time = WVAL(resp_data, 4 + off_time); attr->f_atime = date_dos2unix(server, date, time);
date = WVAL(resp_data, 8 + off_date); time = WVAL(resp_data, 8 + off_time); attr->f_mtime = date_dos2unix(server, date, time); #ifdef SMBFS_DEBUG_TIMESTAMP printk(KERN_DEBUG "getattr_trans2: %s/%s, date=%x, time=%x, mtime=%ld\n", DENTRY_PATH(dir), date, time, attr->f_mtime); #endif attr->f_size = DVAL(resp_data, 12); attr->attr = WVAL(resp_data, 20); result = 0;
out: return result; }
/* * Note: called with the server locked */ static int smb_proc_do_getattr(struct smb_sb_info *server, struct dentry *dir, struct smb_fattr *fattr) { int result; struct inode *inode = dir->d_inode;
smb_init_dirent(server, fattr);
/* * Select whether to use core or trans2 getattr. * Win 95 appears to break with the trans2 getattr. */ if (server->opt.protocol < SMB_PROTOCOL_LANMAN2 || (server->mnt->flags & (SMB_MOUNT_OLDATTR|SMB_MOUNT_WIN95)) ) { result = smb_proc_getattr_core(server, dir, fattr); } else { if (server->mnt->flags & SMB_MOUNT_DIRATTR) result = smb_proc_getattr_ff(server, dir, fattr); else result = smb_proc_getattr_trans2(server, dir, fattr); }
/* * None of the getattr versions here can make win9x return the right * filesize if there are changes made to an open file. * A seek-to-end does return the right size, but we only need to do * that on files we have written. */ if (server->mnt->flags & SMB_MOUNT_WIN95 && inode && inode->u.smbfs_i.flags & SMB_F_LOCALWRITE && smb_is_open(inode)) { __u16 fileid = inode->u.smbfs_i.fileid; fattr->f_size = smb_proc_seek(server, fileid, 2, 0); }
smb_finish_dirent(server, fattr); return result; }
int smb_proc_getattr(struct dentry *dir, struct smb_fattr *fattr) { struct smb_sb_info *server = server_from_dentry(dir); int result;
smb_lock_server(server); result = smb_proc_do_getattr(server, dir, fattr); smb_unlock_server(server); return result; }
/* * Called with the server locked. Because of bugs in the * core protocol, we use this only to set attributes. See * smb_proc_settime() below for timestamp handling. * * Bugs Noted: * (1) If mtime is non-zero, both Win 3.1 and Win 95 fail * with an undocumented error (ERRDOS code 50). Setting * mtime to 0 allows the attributes to be set. * (2) The extra parameters following the name string aren't * in the CIFS docs, but seem to be necessary for operation. */ static int smb_proc_setattr_core(struct smb_sb_info *server, struct dentry *dentry, __u16 attr) { char *p; int result;
retry: p = smb_setup_header(server, SMBsetatr, 8, 0); WSET(server->packet, smb_vwv0, attr); DSET(server->packet, smb_vwv1, 0); /* mtime */ WSET(server->packet, smb_vwv3, 0); /* reserved values */ WSET(server->packet, smb_vwv4, 0); WSET(server->packet, smb_vwv5, 0); WSET(server->packet, smb_vwv6, 0); WSET(server->packet, smb_vwv7, 0); result = smb_simple_encode_path(server, &p, dentry, NULL); if (result < 0) goto out; if (p + 2 > (char *)server->packet + server->packet_size) { result = -ENAMETOOLONG; goto out; } *p++ = 4; *p++ = 0; smb_setup_bcc(server, p);
result = smb_request_ok(server, SMBsetatr, 0, 0); if (result < 0) { if (smb_retry(server)) goto retry; goto out; } result = 0; out: return result; }
/* * Because of bugs in the trans2 setattr messages, we must set * attributes and timestamps separately. The core SMBsetatr * message seems to be the only reliable way to set attributes. */ int smb_proc_setattr(struct dentry *dir, struct smb_fattr *fattr) { struct smb_sb_info *server = server_from_dentry(dir); int result;
VERBOSE("setting %s/%s, open=%d\n", DENTRY_PATH(dir), smb_is_open(dir->d_inode)); smb_lock_server(server); result = smb_proc_setattr_core(server, dir, fattr->attr); smb_unlock_server(server); return result; }
/* * Called with the server locked. Sets the timestamps for an * file open with write permissions. */ static int smb_proc_setattr_ext(struct smb_sb_info *server, struct inode *inode, struct smb_fattr *fattr) { __u16 date, time; int result;
retry: smb_setup_header(server, SMBsetattrE, 7, 0); WSET(server->packet, smb_vwv0, inode->u.smbfs_i.fileid); /* We don't change the creation time */ WSET(server->packet, smb_vwv1, 0); WSET(server->packet, smb_vwv2, 0); date_unix2dos(server, fattr->f_atime, &date, &time); WSET(server->packet, smb_vwv3, date); WSET(server->packet, smb_vwv4, time); date_unix2dos(server, fattr->f_mtime, &date, &time); WSET(server->packet, smb_vwv5, date); WSET(server->packet, smb_vwv6, time); #ifdef SMBFS_DEBUG_TIMESTAMP printk(KERN_DEBUG "smb_proc_setattr_ext: date=%d, time=%d, mtime=%ld\n", date, time, fattr->f_mtime); #endif
result = smb_request_ok(server, SMBsetattrE, 0, 0); if (result < 0) { if (smb_retry(server)) goto retry; goto out; } result = 0; out: return result; }
/* * Note: called with the server locked. * * Bugs Noted: * (1) The TRANSACT2_SETPATHINFO message under Win NT 4.0 doesn't * set the file's attribute flags. */ static int smb_proc_setattr_trans2(struct smb_sb_info *server, struct dentry *dir, struct smb_fattr *fattr) { __u16 date, time; char *p, *param = server->temp_buf; unsigned char *resp_data = NULL; unsigned char *resp_param = NULL; int resp_data_len = 0; int resp_param_len = 0; int result; char data[26];
retry: WSET(param, 0, 1); /* Info level SMB_INFO_STANDARD */ DSET(param, 2, 0); result = smb_encode_path(server, param+6, SMB_MAXNAMELEN+1, dir, NULL); if (result < 0) goto out; p = param + 6 + result;
WSET(data, 0, 0); /* creation time */ WSET(data, 2, 0); date_unix2dos(server, fattr->f_atime, &date, &time); WSET(data, 4, date); WSET(data, 6, time); date_unix2dos(server, fattr->f_mtime, &date, &time); WSET(data, 8, date); WSET(data, 10, time); #ifdef SMBFS_DEBUG_TIMESTAMP printk(KERN_DEBUG "setattr_trans2: %s/%s, date=%x, time=%x, mtime=%ld\n", DENTRY_PATH(dir), date, time, fattr->f_mtime); #endif DSET(data, 12, 0); /* size */ DSET(data, 16, 0); /* blksize */ WSET(data, 20, 0); /* attr */ DSET(data, 22, 0); /* ULONG EA size */
result = smb_trans2_request(server, TRANSACT2_SETPATHINFO, 26, data, p - param, param, &resp_data_len, &resp_data, &resp_param_len, &resp_param); if (result < 0) { if (smb_retry(server)) goto retry; goto out; } result = 0; if (server->rcls != 0) result = smb_errno(server);
out: return result; }
/* * Set the modify and access timestamps for a file. * * Incredibly enough, in all of SMB there is no message to allow * setting both attributes and timestamps at once. * * Bugs Noted: * (1) Win 95 doesn't support the TRANSACT2_SETFILEINFO message * with info level 1 (INFO_STANDARD). * (2) Win 95 seems not to support setting directory timestamps. * (3) Under the core protocol apparently the only way to set the * timestamp is to open and close the file. */ int smb_proc_settime(struct dentry *dentry, struct smb_fattr *fattr) { struct smb_sb_info *server = server_from_dentry(dentry); struct inode *inode = dentry->d_inode; int result;
VERBOSE("setting %s/%s, open=%d\n", DENTRY_PATH(dentry), smb_is_open(inode));
smb_lock_server(server); /* setting the time on a Win95 server fails (tridge) */ if (server->opt.protocol >= SMB_PROTOCOL_LANMAN2 && !(server->mnt->flags & SMB_MOUNT_WIN95)) { if (smb_is_open(inode) && inode->u.smbfs_i.access != SMB_O_RDONLY) result = smb_proc_setattr_ext(server, inode, fattr); else result = smb_proc_setattr_trans2(server, dentry, fattr); } else { /* * Fail silently on directories ... timestamp can't be set? */ result = 0; if (S_ISREG(inode->i_mode)) { /* * Set the mtime by opening and closing the file. * Note that the file is opened read-only, but this * still allows us to set the date (tridge) */ result = -EACCES; if (!smb_is_open(inode)) smb_proc_open(server, dentry, SMB_O_RDONLY); if (smb_is_open(inode)) { inode->i_mtime = fattr->f_mtime; result = smb_proc_close_inode(server, inode); } } }
smb_unlock_server(server); return result; }
int smb_proc_dskattr(struct super_block *sb, struct statfs *attr) { struct smb_sb_info *server = &(sb->u.smbfs_sb); int result; char *p; long unit;
smb_lock_server(server);
retry: smb_setup_header(server, SMBdskattr, 0, 0);
if ((result = smb_request_ok(server, SMBdskattr, 5, 0)) < 0) { if (smb_retry(server)) goto retry; goto out; } p = SMB_VWV(server->packet); unit = (WVAL(p, 2) * WVAL(p, 4)) >> SMB_ST_BLKSHIFT; attr->f_blocks = WVAL(p, 0) * unit; attr->f_bsize = SMB_ST_BLKSIZE; attr->f_bavail = attr->f_bfree = WVAL(p, 6) * unit; result = 0;
out: smb_unlock_server(server); return result; }
|