cifs: Include backup intent search flags during searches {try #2)
[deliverable/linux.git] / fs / cifs / transport.c
CommitLineData
1da177e4
LT
1/*
2 * fs/cifs/transport.c
3 *
ad7a2926 4 * Copyright (C) International Business Machines Corp., 2002,2008
1da177e4 5 * Author(s): Steve French (sfrench@us.ibm.com)
14a441a2 6 * Jeremy Allison (jra@samba.org) 2006.
79a58d1f 7 *
1da177e4
LT
8 * This library is free software; you can redistribute it and/or modify
9 * it under the terms of the GNU Lesser General Public License as published
10 * by the Free Software Foundation; either version 2.1 of the License, or
11 * (at your option) any later version.
12 *
13 * This library is distributed in the hope that it will be useful,
14 * but WITHOUT ANY WARRANTY; without even the implied warranty of
15 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See
16 * the GNU Lesser General Public License for more details.
17 *
18 * You should have received a copy of the GNU Lesser General Public License
19 * along with this library; if not, write to the Free Software
79a58d1f 20 * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
1da177e4
LT
21 */
22
23#include <linux/fs.h>
24#include <linux/list.h>
5a0e3ad6 25#include <linux/gfp.h>
1da177e4
LT
26#include <linux/wait.h>
27#include <linux/net.h>
28#include <linux/delay.h>
f06ac72e 29#include <linux/freezer.h>
1da177e4
LT
30#include <asm/uaccess.h>
31#include <asm/processor.h>
32#include <linux/mempool.h>
33#include "cifspdu.h"
34#include "cifsglob.h"
35#include "cifsproto.h"
36#include "cifs_debug.h"
50c2f753 37
1da177e4 38extern mempool_t *cifs_mid_poolp;
1da177e4 39
2b84a36c
JL
40static void
41wake_up_task(struct mid_q_entry *mid)
42{
43 wake_up_process(mid->callback_data);
44}
45
a6827c18 46struct mid_q_entry *
24b9b06b 47AllocMidQEntry(const struct smb_hdr *smb_buffer, struct TCP_Server_Info *server)
1da177e4
LT
48{
49 struct mid_q_entry *temp;
50
24b9b06b 51 if (server == NULL) {
b6b38f70 52 cERROR(1, "Null TCP session in AllocMidQEntry");
1da177e4
LT
53 return NULL;
54 }
50c2f753 55
232087cb 56 temp = mempool_alloc(cifs_mid_poolp, GFP_NOFS);
1da177e4
LT
57 if (temp == NULL)
58 return temp;
59 else {
26f57364 60 memset(temp, 0, sizeof(struct mid_q_entry));
1da177e4
LT
61 temp->mid = smb_buffer->Mid; /* always LE */
62 temp->pid = current->pid;
7c9421e1
PS
63 temp->command = cpu_to_le16(smb_buffer->Command);
64 cFYI(1, "For smb_command %d", smb_buffer->Command);
1047abc1
SF
65 /* do_gettimeofday(&temp->when_sent);*/ /* easier to use jiffies */
66 /* when mid allocated can be before when sent */
67 temp->when_alloc = jiffies;
2b84a36c
JL
68
69 /*
70 * The default is for the mid to be synchronous, so the
71 * default callback just wakes up the current task.
72 */
73 temp->callback = wake_up_task;
74 temp->callback_data = current;
1da177e4
LT
75 }
76
1da177e4 77 atomic_inc(&midCount);
7c9421e1 78 temp->mid_state = MID_REQUEST_ALLOCATED;
1da177e4
LT
79 return temp;
80}
81
766fdbb5 82void
1da177e4
LT
83DeleteMidQEntry(struct mid_q_entry *midEntry)
84{
1047abc1
SF
85#ifdef CONFIG_CIFS_STATS2
86 unsigned long now;
87#endif
7c9421e1 88 midEntry->mid_state = MID_FREE;
8097531a 89 atomic_dec(&midCount);
7c9421e1 90 if (midEntry->large_buf)
b8643e1b
SF
91 cifs_buf_release(midEntry->resp_buf);
92 else
93 cifs_small_buf_release(midEntry->resp_buf);
1047abc1
SF
94#ifdef CONFIG_CIFS_STATS2
95 now = jiffies;
96 /* commands taking longer than one second are indications that
97 something is wrong, unless it is quite a slow link or server */
79a58d1f
SF
98 if ((now - midEntry->when_alloc) > HZ) {
99 if ((cifsFYI & CIFS_TIMER) &&
7c9421e1
PS
100 (midEntry->command != cpu_to_le16(SMB_COM_LOCKING_ANDX))) {
101 printk(KERN_DEBUG " CIFS slow rsp: cmd %d mid %llu",
1047abc1
SF
102 midEntry->command, midEntry->mid);
103 printk(" A: 0x%lx S: 0x%lx R: 0x%lx\n",
104 now - midEntry->when_alloc,
105 now - midEntry->when_sent,
106 now - midEntry->when_received);
107 }
108 }
109#endif
1da177e4
LT
110 mempool_free(midEntry, cifs_mid_poolp);
111}
112
ddc8cf8f
JL
113static void
114delete_mid(struct mid_q_entry *mid)
115{
116 spin_lock(&GlobalMid_Lock);
117 list_del(&mid->qhead);
118 spin_unlock(&GlobalMid_Lock);
119
120 DeleteMidQEntry(mid);
121}
122
d6e04ae6 123static int
0496e02d 124smb_sendv(struct TCP_Server_Info *server, struct kvec *iov, int n_vec)
1da177e4
LT
125{
126 int rc = 0;
127 int i = 0;
128 struct msghdr smb_msg;
792af7b0 129 __be32 *buf_len = (__be32 *)(iov[0].iov_base);
3e84469d
SF
130 unsigned int len = iov[0].iov_len;
131 unsigned int total_len;
132 int first_vec = 0;
792af7b0 133 unsigned int smb_buf_length = get_rfc1002_length(iov[0].iov_base);
edf1ae40 134 struct socket *ssocket = server->ssocket;
50c2f753 135
79a58d1f 136 if (ssocket == NULL)
1da177e4 137 return -ENOTSOCK; /* BB eventually add reconnect code here */
3e84469d 138
a9f1b85e 139 smb_msg.msg_name = (struct sockaddr *) &server->dstaddr;
26f57364 140 smb_msg.msg_namelen = sizeof(struct sockaddr);
1da177e4
LT
141 smb_msg.msg_control = NULL;
142 smb_msg.msg_controllen = 0;
0496e02d 143 if (server->noblocksnd)
edf1ae40
SF
144 smb_msg.msg_flags = MSG_DONTWAIT + MSG_NOSIGNAL;
145 else
146 smb_msg.msg_flags = MSG_NOSIGNAL;
1da177e4 147
3e84469d
SF
148 total_len = 0;
149 for (i = 0; i < n_vec; i++)
150 total_len += iov[i].iov_len;
151
b6b38f70 152 cFYI(1, "Sending smb: total_len %d", total_len);
792af7b0 153 dump_smb(iov[0].iov_base, len);
1da177e4 154
17680356 155 i = 0;
3e84469d
SF
156 while (total_len) {
157 rc = kernel_sendmsg(ssocket, &smb_msg, &iov[first_vec],
158 n_vec - first_vec, total_len);
1da177e4
LT
159 if ((rc == -ENOSPC) || (rc == -EAGAIN)) {
160 i++;
792af7b0
PS
161 /*
162 * If blocking send we try 3 times, since each can block
163 * for 5 seconds. For nonblocking we have to try more
164 * but wait increasing amounts of time allowing time for
165 * socket to clear. The overall time we wait in either
166 * case to send on the socket is about 15 seconds.
167 * Similarly we wait for 15 seconds for a response from
168 * the server in SendReceive[2] for the server to send
169 * a response back for most types of requests (except
170 * SMB Write past end of file which can be slow, and
171 * blocking lock operations). NFS waits slightly longer
172 * than CIFS, but this can make it take longer for
173 * nonresponsive servers to be detected and 15 seconds
174 * is more than enough time for modern networks to
175 * send a packet. In most cases if we fail to send
176 * after the retries we will kill the socket and
177 * reconnect which may clear the network problem.
178 */
da505c38 179 if ((i >= 14) || (!server->noblocksnd && (i > 2))) {
b6b38f70
JP
180 cERROR(1, "sends on sock %p stuck for 15 seconds",
181 ssocket);
1da177e4
LT
182 rc = -EAGAIN;
183 break;
184 }
68058e75 185 msleep(1 << i);
1da177e4
LT
186 continue;
187 }
79a58d1f 188 if (rc < 0)
1da177e4 189 break;
3e84469d 190
61de800d
SF
191 if (rc == total_len) {
192 total_len = 0;
193 break;
194 } else if (rc > total_len) {
b6b38f70 195 cERROR(1, "sent %d requested %d", rc, total_len);
3e84469d
SF
196 break;
197 }
79a58d1f 198 if (rc == 0) {
3e84469d
SF
199 /* should never happen, letting socket clear before
200 retrying is our only obvious option here */
b6b38f70 201 cERROR(1, "tcp sent no data");
3e84469d
SF
202 msleep(500);
203 continue;
d6e04ae6 204 }
3e84469d 205 total_len -= rc;
68058e75 206 /* the line below resets i */
3e84469d
SF
207 for (i = first_vec; i < n_vec; i++) {
208 if (iov[i].iov_len) {
209 if (rc > iov[i].iov_len) {
210 rc -= iov[i].iov_len;
211 iov[i].iov_len = 0;
212 } else {
213 iov[i].iov_base += rc;
214 iov[i].iov_len -= rc;
215 first_vec = i;
216 break;
217 }
218 }
d6e04ae6 219 }
5e1253b5 220 i = 0; /* in case we get ENOSPC on the next send */
1da177e4
LT
221 }
222
edf1ae40 223 if ((total_len > 0) && (total_len != smb_buf_length + 4)) {
b6b38f70
JP
224 cFYI(1, "partial send (%d remaining), terminating session",
225 total_len);
edf1ae40
SF
226 /* If we have only sent part of an SMB then the next SMB
227 could be taken as the remainder of this one. We need
228 to kill the socket so the server throws away the partial
229 SMB */
230 server->tcpStatus = CifsNeedReconnect;
231 }
232
d804d41d 233 if (rc < 0 && rc != -EINTR)
b6b38f70 234 cERROR(1, "Error %d sending data on socket to server", rc);
d804d41d 235 else
1da177e4 236 rc = 0;
1da177e4 237
792af7b0
PS
238 /* Don't want to modify the buffer as a side effect of this call. */
239 *buf_len = cpu_to_be32(smb_buf_length);
7ee1af76 240
1da177e4
LT
241 return rc;
242}
243
0496e02d
JL
244int
245smb_send(struct TCP_Server_Info *server, struct smb_hdr *smb_buffer,
246 unsigned int smb_buf_length)
247{
248 struct kvec iov;
249
250 iov.iov_base = smb_buffer;
251 iov.iov_len = smb_buf_length + 4;
252
253 return smb_sendv(server, &iov, 1);
254}
255
fc40f9cf 256static int
bc205ed1
PS
257wait_for_free_credits(struct TCP_Server_Info *server, const int optype,
258 int *credits)
1da177e4 259{
5bc59498
PS
260 int rc;
261
fc40f9cf 262 spin_lock(&server->req_lock);
bc205ed1 263 if (optype == CIFS_ASYNC_OP) {
1da177e4 264 /* oplock breaks must not be held up */
fc40f9cf 265 server->in_flight++;
bc205ed1 266 *credits -= 1;
fc40f9cf 267 spin_unlock(&server->req_lock);
27a97a61
VL
268 return 0;
269 }
270
27a97a61 271 while (1) {
bc205ed1 272 if (*credits <= 0) {
fc40f9cf 273 spin_unlock(&server->req_lock);
789e6661 274 cifs_num_waiters_inc(server);
5bc59498 275 rc = wait_event_killable(server->request_q,
bc205ed1 276 has_credits(server, credits));
789e6661 277 cifs_num_waiters_dec(server);
5bc59498
PS
278 if (rc)
279 return rc;
fc40f9cf 280 spin_lock(&server->req_lock);
27a97a61 281 } else {
c5797a94 282 if (server->tcpStatus == CifsExiting) {
fc40f9cf 283 spin_unlock(&server->req_lock);
27a97a61 284 return -ENOENT;
1da177e4 285 }
27a97a61 286
2d86dbc9
PS
287 /*
288 * Can not count locking commands against total
289 * as they are allowed to block on server.
290 */
27a97a61
VL
291
292 /* update # of requests on the wire to server */
bc205ed1
PS
293 if (optype != CIFS_BLOCKING_OP) {
294 *credits -= 1;
fc40f9cf 295 server->in_flight++;
2d86dbc9 296 }
fc40f9cf 297 spin_unlock(&server->req_lock);
27a97a61 298 break;
1da177e4
LT
299 }
300 }
7ee1af76
JA
301 return 0;
302}
1da177e4 303
bc205ed1
PS
304static int
305wait_for_free_request(struct TCP_Server_Info *server, const int optype)
306{
307 return wait_for_free_credits(server, optype, get_credits_field(server));
308}
309
96daf2b0 310static int allocate_mid(struct cifs_ses *ses, struct smb_hdr *in_buf,
7ee1af76
JA
311 struct mid_q_entry **ppmidQ)
312{
1da177e4 313 if (ses->server->tcpStatus == CifsExiting) {
7ee1af76 314 return -ENOENT;
8fbbd365
VL
315 }
316
317 if (ses->server->tcpStatus == CifsNeedReconnect) {
b6b38f70 318 cFYI(1, "tcp session dead - return to caller to retry");
7ee1af76 319 return -EAGAIN;
8fbbd365
VL
320 }
321
322 if (ses->status != CifsGood) {
1da177e4 323 /* check if SMB session is bad because we are setting it up */
79a58d1f 324 if ((in_buf->Command != SMB_COM_SESSION_SETUP_ANDX) &&
ad7a2926 325 (in_buf->Command != SMB_COM_NEGOTIATE))
7ee1af76 326 return -EAGAIN;
ad7a2926 327 /* else ok - we are setting up session */
1da177e4 328 }
24b9b06b 329 *ppmidQ = AllocMidQEntry(in_buf, ses->server);
26f57364 330 if (*ppmidQ == NULL)
7ee1af76 331 return -ENOMEM;
ddc8cf8f
JL
332 spin_lock(&GlobalMid_Lock);
333 list_add_tail(&(*ppmidQ)->qhead, &ses->server->pending_mid_q);
334 spin_unlock(&GlobalMid_Lock);
7ee1af76
JA
335 return 0;
336}
337
0ade640e
JL
338static int
339wait_for_response(struct TCP_Server_Info *server, struct mid_q_entry *midQ)
7ee1af76 340{
0ade640e 341 int error;
7ee1af76 342
f06ac72e 343 error = wait_event_freezekillable(server->response_q,
7c9421e1 344 midQ->mid_state != MID_REQUEST_SUBMITTED);
0ade640e
JL
345 if (error < 0)
346 return -ERESTARTSYS;
7ee1af76 347
0ade640e 348 return 0;
7ee1af76
JA
349}
350
792af7b0
PS
351static int
352cifs_setup_async_request(struct TCP_Server_Info *server, struct kvec *iov,
353 unsigned int nvec, struct mid_q_entry **ret_mid)
354{
355 int rc;
356 struct smb_hdr *hdr = (struct smb_hdr *)iov[0].iov_base;
357 struct mid_q_entry *mid;
358
359 /* enable signing if server requires it */
360 if (server->sec_mode & (SECMODE_SIGN_REQUIRED | SECMODE_SIGN_ENABLED))
361 hdr->Flags2 |= SMBFLG2_SECURITY_SIGNATURE;
362
363 mid = AllocMidQEntry(hdr, server);
364 if (mid == NULL)
365 return -ENOMEM;
366
367 /* put it on the pending_mid_q */
368 spin_lock(&GlobalMid_Lock);
369 list_add_tail(&mid->qhead, &server->pending_mid_q);
370 spin_unlock(&GlobalMid_Lock);
371
372 rc = cifs_sign_smb2(iov, nvec, server, &mid->sequence_number);
373 if (rc)
374 delete_mid(mid);
375 *ret_mid = mid;
376 return rc;
377}
133672ef 378
a6827c18
JL
379/*
380 * Send a SMB request and set the callback function in the mid to handle
381 * the result. Caller is responsible for dealing with timeouts.
382 */
383int
fcc31cb6 384cifs_call_async(struct TCP_Server_Info *server, struct kvec *iov,
44d22d84
JL
385 unsigned int nvec, mid_receive_t *receive,
386 mid_callback_t *callback, void *cbdata, bool ignore_pend)
a6827c18
JL
387{
388 int rc;
389 struct mid_q_entry *mid;
390
59ffd841 391 rc = wait_for_free_request(server, ignore_pend ? CIFS_ASYNC_OP : 0);
a6827c18
JL
392 if (rc)
393 return rc;
394
395 mutex_lock(&server->srv_mutex);
792af7b0
PS
396 rc = cifs_setup_async_request(server, iov, nvec, &mid);
397 if (rc) {
a6827c18 398 mutex_unlock(&server->srv_mutex);
2d86dbc9 399 cifs_add_credits(server, 1);
0193e072 400 wake_up(&server->request_q);
792af7b0 401 return rc;
a6827c18
JL
402 }
403
44d22d84 404 mid->receive = receive;
a6827c18
JL
405 mid->callback = callback;
406 mid->callback_data = cbdata;
7c9421e1 407 mid->mid_state = MID_REQUEST_SUBMITTED;
789e6661
SF
408
409 cifs_in_send_inc(server);
fcc31cb6 410 rc = smb_sendv(server, iov, nvec);
789e6661
SF
411 cifs_in_send_dec(server);
412 cifs_save_when_sent(mid);
a6827c18 413 mutex_unlock(&server->srv_mutex);
789e6661 414
a6827c18
JL
415 if (rc)
416 goto out_err;
417
418 return rc;
419out_err:
420 delete_mid(mid);
2d86dbc9 421 cifs_add_credits(server, 1);
a6827c18
JL
422 wake_up(&server->request_q);
423 return rc;
424}
425
133672ef
SF
426/*
427 *
428 * Send an SMB Request. No response info (other than return code)
429 * needs to be parsed.
430 *
431 * flags indicate the type of request buffer and how long to wait
432 * and whether to log NT STATUS code (error) before mapping it to POSIX error
433 *
434 */
435int
96daf2b0 436SendReceiveNoRsp(const unsigned int xid, struct cifs_ses *ses,
792af7b0 437 char *in_buf, int flags)
133672ef
SF
438{
439 int rc;
440 struct kvec iov[1];
441 int resp_buf_type;
442
792af7b0
PS
443 iov[0].iov_base = in_buf;
444 iov[0].iov_len = get_rfc1002_length(in_buf) + 4;
133672ef
SF
445 flags |= CIFS_NO_RESP;
446 rc = SendReceive2(xid, ses, iov, 1, &resp_buf_type, flags);
b6b38f70 447 cFYI(DBG2, "SendRcvNoRsp flags %d rc %d", flags, rc);
90c81e0b 448
133672ef
SF
449 return rc;
450}
451
053d5034 452static int
3c1105df 453cifs_sync_mid_result(struct mid_q_entry *mid, struct TCP_Server_Info *server)
053d5034
JL
454{
455 int rc = 0;
456
7c9421e1
PS
457 cFYI(1, "%s: cmd=%d mid=%llu state=%d", __func__,
458 le16_to_cpu(mid->command), mid->mid, mid->mid_state);
053d5034 459
74dd92a8 460 spin_lock(&GlobalMid_Lock);
7c9421e1 461 switch (mid->mid_state) {
74dd92a8 462 case MID_RESPONSE_RECEIVED:
053d5034
JL
463 spin_unlock(&GlobalMid_Lock);
464 return rc;
74dd92a8
JL
465 case MID_RETRY_NEEDED:
466 rc = -EAGAIN;
467 break;
71823baf
JL
468 case MID_RESPONSE_MALFORMED:
469 rc = -EIO;
470 break;
3c1105df
JL
471 case MID_SHUTDOWN:
472 rc = -EHOSTDOWN;
473 break;
74dd92a8 474 default:
3c1105df 475 list_del_init(&mid->qhead);
7c9421e1
PS
476 cERROR(1, "%s: invalid mid state mid=%llu state=%d", __func__,
477 mid->mid, mid->mid_state);
74dd92a8 478 rc = -EIO;
053d5034
JL
479 }
480 spin_unlock(&GlobalMid_Lock);
481
2b84a36c 482 DeleteMidQEntry(mid);
053d5034
JL
483 return rc;
484}
485
121b046a
JL
486static inline int
487send_cancel(struct TCP_Server_Info *server, void *buf, struct mid_q_entry *mid)
76dcc26f 488{
121b046a
JL
489 return server->ops->send_cancel ?
490 server->ops->send_cancel(server, buf, mid) : 0;
76dcc26f
JL
491}
492
2c8f981d
JL
493int
494cifs_check_receive(struct mid_q_entry *mid, struct TCP_Server_Info *server,
495 bool log_error)
496{
792af7b0 497 unsigned int len = get_rfc1002_length(mid->resp_buf) + 4;
826a95e4
JL
498
499 dump_smb(mid->resp_buf, min_t(u32, 92, len));
2c8f981d
JL
500
501 /* convert the length into a more usable form */
96daf2b0 502 if (server->sec_mode & (SECMODE_SIGN_REQUIRED | SECMODE_SIGN_ENABLED)) {
826a95e4
JL
503 struct kvec iov;
504
505 iov.iov_base = mid->resp_buf;
506 iov.iov_len = len;
2c8f981d 507 /* FIXME: add code to kill session */
826a95e4 508 if (cifs_verify_signature(&iov, 1, server,
2c8f981d
JL
509 mid->sequence_number + 1) != 0)
510 cERROR(1, "Unexpected SMB signature");
511 }
512
513 /* BB special case reconnect tid and uid here? */
514 return map_smb_to_linux_error(mid->resp_buf, log_error);
515}
516
792af7b0
PS
517static int
518cifs_setup_request(struct cifs_ses *ses, struct kvec *iov,
519 unsigned int nvec, struct mid_q_entry **ret_mid)
520{
521 int rc;
522 struct smb_hdr *hdr = (struct smb_hdr *)iov[0].iov_base;
523 struct mid_q_entry *mid;
524
525 rc = allocate_mid(ses, hdr, &mid);
526 if (rc)
527 return rc;
528 rc = cifs_sign_smb2(iov, nvec, ses->server, &mid->sequence_number);
529 if (rc)
530 delete_mid(mid);
531 *ret_mid = mid;
532 return rc;
533}
534
7ee1af76 535int
96daf2b0 536SendReceive2(const unsigned int xid, struct cifs_ses *ses,
79a58d1f 537 struct kvec *iov, int n_vec, int *pRespBufType /* ret */,
133672ef 538 const int flags)
7ee1af76
JA
539{
540 int rc = 0;
133672ef 541 int long_op;
7ee1af76 542 struct mid_q_entry *midQ;
792af7b0 543 char *buf = iov[0].iov_base;
50c2f753 544
133672ef
SF
545 long_op = flags & CIFS_TIMEOUT_MASK;
546
7ee1af76
JA
547 *pRespBufType = CIFS_NO_BUFFER; /* no response buf yet */
548
549 if ((ses == NULL) || (ses->server == NULL)) {
792af7b0 550 cifs_small_buf_release(buf);
b6b38f70 551 cERROR(1, "Null session");
7ee1af76
JA
552 return -EIO;
553 }
554
79a58d1f 555 if (ses->server->tcpStatus == CifsExiting) {
792af7b0 556 cifs_small_buf_release(buf);
7ee1af76
JA
557 return -ENOENT;
558 }
559
792af7b0
PS
560 /*
561 * Ensure that we do not send more than 50 overlapping requests
562 * to the same server. We may make this configurable later or
563 * use ses->maxReq.
564 */
7ee1af76 565
c5797a94 566 rc = wait_for_free_request(ses->server, long_op);
7ee1af76 567 if (rc) {
792af7b0 568 cifs_small_buf_release(buf);
7ee1af76
JA
569 return rc;
570 }
571
792af7b0
PS
572 /*
573 * Make sure that we sign in the same order that we send on this socket
574 * and avoid races inside tcp sendmsg code that could cause corruption
575 * of smb data.
576 */
7ee1af76 577
72ca545b 578 mutex_lock(&ses->server->srv_mutex);
7ee1af76 579
792af7b0 580 rc = cifs_setup_request(ses, iov, n_vec, &midQ);
7ee1af76 581 if (rc) {
72ca545b 582 mutex_unlock(&ses->server->srv_mutex);
792af7b0 583 cifs_small_buf_release(buf);
7ee1af76 584 /* Update # of requests on wire to server */
2d86dbc9 585 cifs_add_credits(ses->server, 1);
7ee1af76 586 return rc;
1da177e4 587 }
1da177e4 588
7c9421e1 589 midQ->mid_state = MID_REQUEST_SUBMITTED;
789e6661 590 cifs_in_send_inc(ses->server);
0496e02d 591 rc = smb_sendv(ses->server, iov, n_vec);
789e6661
SF
592 cifs_in_send_dec(ses->server);
593 cifs_save_when_sent(midQ);
7ee1af76 594
72ca545b 595 mutex_unlock(&ses->server->srv_mutex);
7ee1af76 596
2db7c581 597 if (rc < 0) {
792af7b0 598 cifs_small_buf_release(buf);
7ee1af76 599 goto out;
2db7c581 600 }
4b8f930f 601
2db7c581 602 if (long_op == CIFS_ASYNC_OP) {
792af7b0 603 cifs_small_buf_release(buf);
133672ef 604 goto out;
2db7c581 605 }
d6e04ae6 606
0ade640e 607 rc = wait_for_response(ses->server, midQ);
1be912dd 608 if (rc != 0) {
121b046a 609 send_cancel(ses->server, buf, midQ);
1be912dd 610 spin_lock(&GlobalMid_Lock);
7c9421e1 611 if (midQ->mid_state == MID_REQUEST_SUBMITTED) {
1be912dd
JL
612 midQ->callback = DeleteMidQEntry;
613 spin_unlock(&GlobalMid_Lock);
792af7b0 614 cifs_small_buf_release(buf);
2d86dbc9 615 cifs_add_credits(ses->server, 1);
1be912dd
JL
616 return rc;
617 }
618 spin_unlock(&GlobalMid_Lock);
619 }
d6e04ae6 620
792af7b0 621 cifs_small_buf_release(buf);
2db7c581 622
3c1105df 623 rc = cifs_sync_mid_result(midQ, ses->server);
053d5034 624 if (rc != 0) {
2d86dbc9 625 cifs_add_credits(ses->server, 1);
d6e04ae6
SF
626 return rc;
627 }
50c2f753 628
7c9421e1 629 if (!midQ->resp_buf || midQ->mid_state != MID_RESPONSE_RECEIVED) {
d6e04ae6 630 rc = -EIO;
2c8f981d 631 cFYI(1, "Bad MID state?");
2b2bdfba
SF
632 goto out;
633 }
634
792af7b0
PS
635 buf = (char *)midQ->resp_buf;
636 iov[0].iov_base = buf;
637 iov[0].iov_len = get_rfc1002_length(buf) + 4;
7c9421e1 638 if (midQ->large_buf)
2c8f981d
JL
639 *pRespBufType = CIFS_LARGE_BUFFER;
640 else
641 *pRespBufType = CIFS_SMALL_BUFFER;
2b2bdfba 642
2c8f981d 643 rc = cifs_check_receive(midQ, ses->server, flags & CIFS_LOG_ERROR);
1da177e4 644
2c8f981d
JL
645 /* mark it so buf will not be freed by delete_mid */
646 if ((flags & CIFS_NO_RESP) == 0)
647 midQ->resp_buf = NULL;
7ee1af76 648out:
ddc8cf8f 649 delete_mid(midQ);
2d86dbc9 650 cifs_add_credits(ses->server, 1);
1da177e4 651
d6e04ae6
SF
652 return rc;
653}
1da177e4
LT
654
655int
96daf2b0 656SendReceive(const unsigned int xid, struct cifs_ses *ses,
1da177e4
LT
657 struct smb_hdr *in_buf, struct smb_hdr *out_buf,
658 int *pbytes_returned, const int long_op)
659{
660 int rc = 0;
1da177e4
LT
661 struct mid_q_entry *midQ;
662
663 if (ses == NULL) {
b6b38f70 664 cERROR(1, "Null smb session");
1da177e4
LT
665 return -EIO;
666 }
79a58d1f 667 if (ses->server == NULL) {
b6b38f70 668 cERROR(1, "Null tcp session");
1da177e4
LT
669 return -EIO;
670 }
671
79a58d1f 672 if (ses->server->tcpStatus == CifsExiting)
31ca3bc3
SF
673 return -ENOENT;
674
79a58d1f 675 /* Ensure that we do not send more than 50 overlapping requests
1da177e4
LT
676 to the same server. We may make this configurable later or
677 use ses->maxReq */
1da177e4 678
be8e3b00
SF
679 if (be32_to_cpu(in_buf->smb_buf_length) > CIFSMaxBufSize +
680 MAX_CIFS_HDR_SIZE - 4) {
b6b38f70 681 cERROR(1, "Illegal length, greater than maximum frame, %d",
be8e3b00 682 be32_to_cpu(in_buf->smb_buf_length));
6d9c6d54
VL
683 return -EIO;
684 }
685
c5797a94 686 rc = wait_for_free_request(ses->server, long_op);
7ee1af76
JA
687 if (rc)
688 return rc;
689
79a58d1f 690 /* make sure that we sign in the same order that we send on this socket
1da177e4
LT
691 and avoid races inside tcp sendmsg code that could cause corruption
692 of smb data */
693
72ca545b 694 mutex_lock(&ses->server->srv_mutex);
1da177e4 695
7ee1af76
JA
696 rc = allocate_mid(ses, in_buf, &midQ);
697 if (rc) {
72ca545b 698 mutex_unlock(&ses->server->srv_mutex);
7ee1af76 699 /* Update # of requests on wire to server */
2d86dbc9 700 cifs_add_credits(ses->server, 1);
7ee1af76 701 return rc;
1da177e4
LT
702 }
703
ad009ac9 704 rc = cifs_sign_smb(in_buf, ses->server, &midQ->sequence_number);
829049cb
VL
705 if (rc) {
706 mutex_unlock(&ses->server->srv_mutex);
707 goto out;
708 }
1da177e4 709
7c9421e1 710 midQ->mid_state = MID_REQUEST_SUBMITTED;
789e6661
SF
711
712 cifs_in_send_inc(ses->server);
be8e3b00 713 rc = smb_send(ses->server, in_buf, be32_to_cpu(in_buf->smb_buf_length));
789e6661
SF
714 cifs_in_send_dec(ses->server);
715 cifs_save_when_sent(midQ);
72ca545b 716 mutex_unlock(&ses->server->srv_mutex);
7ee1af76 717
79a58d1f 718 if (rc < 0)
7ee1af76
JA
719 goto out;
720
0ade640e 721 if (long_op == CIFS_ASYNC_OP)
7ee1af76 722 goto out;
1da177e4 723
0ade640e 724 rc = wait_for_response(ses->server, midQ);
1be912dd 725 if (rc != 0) {
121b046a 726 send_cancel(ses->server, in_buf, midQ);
1be912dd 727 spin_lock(&GlobalMid_Lock);
7c9421e1 728 if (midQ->mid_state == MID_REQUEST_SUBMITTED) {
1be912dd
JL
729 /* no longer considered to be "in-flight" */
730 midQ->callback = DeleteMidQEntry;
731 spin_unlock(&GlobalMid_Lock);
2d86dbc9 732 cifs_add_credits(ses->server, 1);
1be912dd
JL
733 return rc;
734 }
735 spin_unlock(&GlobalMid_Lock);
736 }
1da177e4 737
3c1105df 738 rc = cifs_sync_mid_result(midQ, ses->server);
053d5034 739 if (rc != 0) {
2d86dbc9 740 cifs_add_credits(ses->server, 1);
1da177e4
LT
741 return rc;
742 }
50c2f753 743
2c8f981d 744 if (!midQ->resp_buf || !out_buf ||
7c9421e1 745 midQ->mid_state != MID_RESPONSE_RECEIVED) {
2b2bdfba 746 rc = -EIO;
b6b38f70 747 cERROR(1, "Bad MID state?");
2c8f981d 748 goto out;
1da177e4 749 }
7ee1af76 750
d4e4854f 751 *pbytes_returned = get_rfc1002_length(midQ->resp_buf);
2c8f981d
JL
752 memcpy(out_buf, midQ->resp_buf, *pbytes_returned + 4);
753 rc = cifs_check_receive(midQ, ses->server, 0);
7ee1af76 754out:
ddc8cf8f 755 delete_mid(midQ);
2d86dbc9 756 cifs_add_credits(ses->server, 1);
1da177e4 757
7ee1af76
JA
758 return rc;
759}
1da177e4 760
7ee1af76
JA
761/* We send a LOCKINGX_CANCEL_LOCK to cause the Windows
762 blocking lock to return. */
763
764static int
96daf2b0 765send_lock_cancel(const unsigned int xid, struct cifs_tcon *tcon,
7ee1af76
JA
766 struct smb_hdr *in_buf,
767 struct smb_hdr *out_buf)
768{
769 int bytes_returned;
96daf2b0 770 struct cifs_ses *ses = tcon->ses;
7ee1af76
JA
771 LOCK_REQ *pSMB = (LOCK_REQ *)in_buf;
772
773 /* We just modify the current in_buf to change
774 the type of lock from LOCKING_ANDX_SHARED_LOCK
775 or LOCKING_ANDX_EXCLUSIVE_LOCK to
776 LOCKING_ANDX_CANCEL_LOCK. */
777
778 pSMB->LockType = LOCKING_ANDX_CANCEL_LOCK|LOCKING_ANDX_LARGE_FILES;
779 pSMB->Timeout = 0;
780 pSMB->hdr.Mid = GetNextMid(ses->server);
781
782 return SendReceive(xid, ses, in_buf, out_buf,
7749981e 783 &bytes_returned, 0);
7ee1af76
JA
784}
785
786int
96daf2b0 787SendReceiveBlockingLock(const unsigned int xid, struct cifs_tcon *tcon,
7ee1af76
JA
788 struct smb_hdr *in_buf, struct smb_hdr *out_buf,
789 int *pbytes_returned)
790{
791 int rc = 0;
792 int rstart = 0;
7ee1af76 793 struct mid_q_entry *midQ;
96daf2b0 794 struct cifs_ses *ses;
7ee1af76
JA
795
796 if (tcon == NULL || tcon->ses == NULL) {
b6b38f70 797 cERROR(1, "Null smb session");
7ee1af76
JA
798 return -EIO;
799 }
800 ses = tcon->ses;
801
79a58d1f 802 if (ses->server == NULL) {
b6b38f70 803 cERROR(1, "Null tcp session");
7ee1af76
JA
804 return -EIO;
805 }
806
79a58d1f 807 if (ses->server->tcpStatus == CifsExiting)
7ee1af76
JA
808 return -ENOENT;
809
79a58d1f 810 /* Ensure that we do not send more than 50 overlapping requests
7ee1af76
JA
811 to the same server. We may make this configurable later or
812 use ses->maxReq */
813
be8e3b00
SF
814 if (be32_to_cpu(in_buf->smb_buf_length) > CIFSMaxBufSize +
815 MAX_CIFS_HDR_SIZE - 4) {
b6b38f70 816 cERROR(1, "Illegal length, greater than maximum frame, %d",
be8e3b00 817 be32_to_cpu(in_buf->smb_buf_length));
6d9c6d54
VL
818 return -EIO;
819 }
820
c5797a94 821 rc = wait_for_free_request(ses->server, CIFS_BLOCKING_OP);
7ee1af76
JA
822 if (rc)
823 return rc;
824
79a58d1f 825 /* make sure that we sign in the same order that we send on this socket
7ee1af76
JA
826 and avoid races inside tcp sendmsg code that could cause corruption
827 of smb data */
828
72ca545b 829 mutex_lock(&ses->server->srv_mutex);
7ee1af76
JA
830
831 rc = allocate_mid(ses, in_buf, &midQ);
832 if (rc) {
72ca545b 833 mutex_unlock(&ses->server->srv_mutex);
7ee1af76
JA
834 return rc;
835 }
836
7ee1af76 837 rc = cifs_sign_smb(in_buf, ses->server, &midQ->sequence_number);
829049cb 838 if (rc) {
ddc8cf8f 839 delete_mid(midQ);
829049cb
VL
840 mutex_unlock(&ses->server->srv_mutex);
841 return rc;
842 }
1da177e4 843
7c9421e1 844 midQ->mid_state = MID_REQUEST_SUBMITTED;
789e6661 845 cifs_in_send_inc(ses->server);
be8e3b00 846 rc = smb_send(ses->server, in_buf, be32_to_cpu(in_buf->smb_buf_length));
789e6661
SF
847 cifs_in_send_dec(ses->server);
848 cifs_save_when_sent(midQ);
72ca545b 849 mutex_unlock(&ses->server->srv_mutex);
7ee1af76 850
79a58d1f 851 if (rc < 0) {
ddc8cf8f 852 delete_mid(midQ);
7ee1af76
JA
853 return rc;
854 }
855
856 /* Wait for a reply - allow signals to interrupt. */
857 rc = wait_event_interruptible(ses->server->response_q,
7c9421e1 858 (!(midQ->mid_state == MID_REQUEST_SUBMITTED)) ||
7ee1af76
JA
859 ((ses->server->tcpStatus != CifsGood) &&
860 (ses->server->tcpStatus != CifsNew)));
861
862 /* Were we interrupted by a signal ? */
863 if ((rc == -ERESTARTSYS) &&
7c9421e1 864 (midQ->mid_state == MID_REQUEST_SUBMITTED) &&
7ee1af76
JA
865 ((ses->server->tcpStatus == CifsGood) ||
866 (ses->server->tcpStatus == CifsNew))) {
867
868 if (in_buf->Command == SMB_COM_TRANSACTION2) {
869 /* POSIX lock. We send a NT_CANCEL SMB to cause the
870 blocking lock to return. */
121b046a 871 rc = send_cancel(ses->server, in_buf, midQ);
7ee1af76 872 if (rc) {
ddc8cf8f 873 delete_mid(midQ);
7ee1af76
JA
874 return rc;
875 }
876 } else {
877 /* Windows lock. We send a LOCKINGX_CANCEL_LOCK
878 to cause the blocking lock to return. */
879
880 rc = send_lock_cancel(xid, tcon, in_buf, out_buf);
881
882 /* If we get -ENOLCK back the lock may have
883 already been removed. Don't exit in this case. */
884 if (rc && rc != -ENOLCK) {
ddc8cf8f 885 delete_mid(midQ);
7ee1af76
JA
886 return rc;
887 }
888 }
889
1be912dd
JL
890 rc = wait_for_response(ses->server, midQ);
891 if (rc) {
121b046a 892 send_cancel(ses->server, in_buf, midQ);
1be912dd 893 spin_lock(&GlobalMid_Lock);
7c9421e1 894 if (midQ->mid_state == MID_REQUEST_SUBMITTED) {
1be912dd
JL
895 /* no longer considered to be "in-flight" */
896 midQ->callback = DeleteMidQEntry;
897 spin_unlock(&GlobalMid_Lock);
898 return rc;
899 }
900 spin_unlock(&GlobalMid_Lock);
7ee1af76 901 }
1be912dd
JL
902
903 /* We got the response - restart system call. */
904 rstart = 1;
7ee1af76
JA
905 }
906
3c1105df 907 rc = cifs_sync_mid_result(midQ, ses->server);
053d5034 908 if (rc != 0)
7ee1af76 909 return rc;
50c2f753 910
17c8bfed 911 /* rcvd frame is ok */
7c9421e1 912 if (out_buf == NULL || midQ->mid_state != MID_RESPONSE_RECEIVED) {
698e96a8 913 rc = -EIO;
b6b38f70 914 cERROR(1, "Bad MID state?");
698e96a8
VL
915 goto out;
916 }
1da177e4 917
d4e4854f 918 *pbytes_returned = get_rfc1002_length(midQ->resp_buf);
2c8f981d
JL
919 memcpy(out_buf, midQ->resp_buf, *pbytes_returned + 4);
920 rc = cifs_check_receive(midQ, ses->server, 0);
17c8bfed 921out:
ddc8cf8f 922 delete_mid(midQ);
7ee1af76
JA
923 if (rstart && rc == -EACCES)
924 return -ERESTARTSYS;
1da177e4
LT
925 return rc;
926}
This page took 0.459098 seconds and 5 git commands to generate.