| /* |
| * proc.c |
| * |
| * Copyright (C) 1995, 1996 by Paal-Kr. Engstad and Volker Lendecke |
| * Copyright (C) 1997 by Volker Lendecke |
| * |
| * Please add a note about your changes to smbfs in the ChangeLog file. |
| */ |
| |
| #include <linux/types.h> |
| #include <linux/errno.h> |
| #include <linux/slab.h> |
| #include <linux/fs.h> |
| #include <linux/file.h> |
| #include <linux/stat.h> |
| #include <linux/fcntl.h> |
| #include <linux/dcache.h> |
| #include <linux/dirent.h> |
| #include <linux/nls.h> |
| |
| #include <linux/smb_fs.h> |
| #include <linux/smbno.h> |
| #include <linux/smb_mount.h> |
| |
| #include <asm/string.h> |
| #include <asm/div64.h> |
| |
| #include "smb_debug.h" |
| #include "proto.h" |
| |
| |
| /* Features. Undefine if they cause problems, this should perhaps be a |
| config option. */ |
| #define SMBFS_POSIX_UNLINK 1 |
| |
| /* Allow smb_retry to be interrupted. */ |
| #define SMB_RETRY_INTR |
| |
| #define SMB_VWV(packet) ((packet) + SMB_HEADER_LEN) |
| #define SMB_CMD(packet) (*(packet+8)) |
| #define SMB_WCT(packet) (*(packet+SMB_HEADER_LEN - 1)) |
| #define SMB_BCC(packet) smb_bcc(packet) |
| #define SMB_BUF(packet) ((packet) + SMB_HEADER_LEN + SMB_WCT(packet) * 2 + 2) |
| |
| #define SMB_DIRINFO_SIZE 43 |
| #define SMB_STATUS_SIZE 21 |
| |
| #define SMB_ST_BLKSIZE (PAGE_SIZE) |
| #define SMB_ST_BLKSHIFT (PAGE_SHIFT) |
| |
| static int |
| smb_proc_setattr_ext(struct smb_sb_info *, struct inode *, |
| struct smb_fattr *); |
| static int |
| smb_proc_setattr_core(struct smb_sb_info *server, struct dentry *dentry, |
| __u16 attr); |
| static int |
| smb_proc_do_getattr(struct smb_sb_info *server, struct dentry *dir, |
| struct smb_fattr *fattr); |
| |
| |
| |
| static void |
| str_upper(char *name, int len) |
| { |
| while (len--) |
| { |
| if (*name >= 'a' && *name <= 'z') |
| *name -= ('a' - 'A'); |
| name++; |
| } |
| } |
| |
| #if 0 |
| static void |
| str_lower(char *name, int len) |
| { |
| while (len--) |
| { |
| if (*name >= 'A' && *name <= 'Z') |
| *name += ('a' - 'A'); |
| name++; |
| } |
| } |
| #endif |
| |
| /* reverse a string inline. This is used by the dircache walking routines */ |
| static void reverse_string(char *buf, int len) |
| { |
| char c; |
| char *end = buf+len-1; |
| |
| while(buf < end) { |
| c = *buf; |
| *(buf++) = *end; |
| *(end--) = c; |
| } |
| } |
| |
| /* no conversion, just a wrapper for memcpy. */ |
| static int convert_memcpy(char *output, int olen, |
| const char *input, int ilen, |
| struct nls_table *nls_from, |
| struct nls_table *nls_to) |
| { |
| memcpy(output, input, ilen); |
| return ilen; |
| } |
| |
| /* convert from one "codepage" to another (possibly being utf8). */ |
| static int convert_cp(char *output, int olen, |
| const char *input, int ilen, |
| struct nls_table *nls_from, |
| struct nls_table *nls_to) |
| { |
| int len = 0; |
| int n; |
| wchar_t ch; |
| |
| if (!nls_from || !nls_to) { |
| PARANOIA("nls_from=%p, nls_to=%p\n", nls_from, nls_to); |
| return convert_memcpy(output, olen, input, ilen, NULL, NULL); |
| } |
| |
| while (ilen > 0) { |
| /* convert by changing to unicode and back to the new cp */ |
| n = nls_from->char2uni((unsigned char *)input, ilen, &ch); |
| if (n < 0) |
| goto out; |
| input += n; |
| ilen -= n; |
| |
| n = nls_to->uni2char(ch, output, olen); |
| if (n < 0) |
| goto out; |
| output += n; |
| olen -= n; |
| |
| len += n; |
| } |
| out: |
| return len; |
| } |
| |
| static int setcodepage(struct nls_table **p, char *name) |
| { |
| struct nls_table *nls; |
| |
| if (!name || !*name) { |
| nls = NULL; |
| } else if ( (nls = load_nls(name)) == NULL) { |
| printk (KERN_ERR "smbfs: failed to load nls '%s'\n", name); |
| return -EINVAL; |
| } |
| |
| /* if already set, unload the previous one. */ |
| if (*p) |
| unload_nls(*p); |
| *p = nls; |
| |
| return 0; |
| } |
| |
| /* Handles all changes to codepage settings. */ |
| int smb_setcodepage(struct smb_sb_info *server, struct smb_nls_codepage *cp) |
| { |
| int n = 0; |
| |
| smb_lock_server(server); |
| |
| /* Don't load any nls_* at all, if no remote is requested */ |
| if (!*cp->remote_name) |
| goto out; |
| |
| n = setcodepage(&server->local_nls, cp->local_name); |
| if (n != 0) |
| goto out; |
| n = setcodepage(&server->remote_nls, cp->remote_name); |
| if (n != 0) |
| setcodepage(&server->local_nls, NULL); |
| |
| out: |
| if (server->local_nls != NULL && server->remote_nls != NULL) |
| server->convert = convert_cp; |
| else |
| server->convert = convert_memcpy; |
| |
| smb_unlock_server(server); |
| return n; |
| } |
| |
| |
| /*****************************************************************************/ |
| /* */ |
| /* Encoding/Decoding section */ |
| /* */ |
| /*****************************************************************************/ |
| |
| static __u8 * |
| smb_encode_smb_length(__u8 * p, __u32 len) |
| { |
| *p = 0; |
| *(p+1) = 0; |
| *(p+2) = (len & 0xFF00) >> 8; |
| *(p+3) = (len & 0xFF); |
| if (len > 0xFFFF) |
| { |
| *(p+1) = 1; |
| } |
| return p + 4; |
| } |
| |
| /* |
| * smb_build_path: build the path to entry and name storing it in buf. |
| * The path returned will have the trailing '\0'. |
| */ |
| static int smb_build_path(struct smb_sb_info *server, char * buf, |
| struct dentry * entry, struct qstr * name) |
| { |
| char *path = buf; |
| int len; |
| |
| if (entry == NULL) |
| goto test_name_and_out; |
| |
| /* |
| * If IS_ROOT, we have to do no walking at all. |
| */ |
| if (IS_ROOT(entry)) { |
| *(path++) = '\\'; |
| if (name != NULL) |
| goto name_and_out; |
| goto out; |
| } |
| |
| /* |
| * Build the path string walking the tree backward from end to ROOT |
| * and store it in reversed order [see reverse_string()] |
| */ |
| for (;;) { |
| if (entry->d_name.len > SMB_MAXNAMELEN) |
| return -ENAMETOOLONG; |
| if (path - buf + entry->d_name.len > SMB_MAXPATHLEN) |
| return -ENAMETOOLONG; |
| |
| len = server->convert(path, SMB_MAXNAMELEN, |
| entry->d_name.name, entry->d_name.len, |
| server->local_nls, server->remote_nls); |
| reverse_string(path, len); |
| path += len; |
| |
| *(path++) = '\\'; |
| |
| entry = entry->d_parent; |
| |
| if (IS_ROOT(entry)) |
| break; |
| } |
| |
| reverse_string(buf, path-buf); |
| |
| test_name_and_out: |
| if (name != NULL) { |
| *(path++) = '\\'; |
| name_and_out: |
| len = server->convert(path, SMB_MAXNAMELEN, |
| name->name, name->len, |
| server->local_nls, server->remote_nls); |
| path += len; |
| } |
| out: |
| *(path++) = '\0'; |
| return (path-buf); |
| } |
| |
| static int smb_encode_path(struct smb_sb_info *server, char *buf, |
| struct dentry *dir, struct qstr *name) |
| { |
| int result; |
| |
| result = smb_build_path(server, buf, dir, name); |
| if (result < 0) |
| goto out; |
| if (server->opt.protocol <= SMB_PROTOCOL_COREPLUS) |
| str_upper(buf, result); |
| out: |
| return result; |
| } |
| |
| /* The following are taken directly from msdos-fs */ |
| |
| /* Linear day numbers of the respective 1sts in non-leap years. */ |
| |
| static int day_n[] = |
| {0, 31, 59, 90, 120, 151, 181, 212, 243, 273, 304, 334, 0, 0, 0, 0}; |
| /* JanFebMarApr May Jun Jul Aug Sep Oct Nov Dec */ |
| |
| |
| static time_t |
| utc2local(struct smb_sb_info *server, time_t time) |
| { |
| return time - server->opt.serverzone*60; |
| } |
| |
| static time_t |
| local2utc(struct smb_sb_info *server, time_t time) |
| { |
| return time + server->opt.serverzone*60; |
| } |
| |
| /* Convert a MS-DOS time/date pair to a UNIX date (seconds since 1 1 70). */ |
| |
| static time_t |
| date_dos2unix(struct smb_sb_info *server, __u16 date, __u16 time) |
| { |
| int month, year; |
| time_t secs; |
| |
| /* first subtract and mask after that... Otherwise, if |
| date == 0, bad things happen */ |
| month = ((date >> 5) - 1) & 15; |
| year = date >> 9; |
| secs = (time & 31) * 2 + 60 * ((time >> 5) & 63) + (time >> 11) * 3600 + 86400 * |
| ((date & 31) - 1 + day_n[month] + (year / 4) + year * 365 - ((year & 3) == 0 && |
| month < 2 ? 1 : 0) + 3653); |
| /* days since 1.1.70 plus 80's leap day */ |
| return local2utc(server, secs); |
| } |
| |
| |
| /* Convert linear UNIX date to a MS-DOS time/date pair. */ |
| |
| static void |
| date_unix2dos(struct smb_sb_info *server, |
| int unix_date, __u16 *date, __u16 *time) |
| { |
| int day, year, nl_day, month; |
| |
| unix_date = utc2local(server, unix_date); |
| if (unix_date < 315532800) |
| unix_date = 315532800; |
| |
| *time = (unix_date % 60) / 2 + |
| (((unix_date / 60) % 60) << 5) + |
| (((unix_date / 3600) % 24) << 11); |
| |
| day = unix_date / 86400 - 3652; |
| year = day / 365; |
| if ((year + 3) / 4 + 365 * year > day) |
| year--; |
| day -= (year + 3) / 4 + 365 * year; |
| if (day == 59 && !(year & 3)) { |
| nl_day = day; |
| month = 2; |
| } else { |
| nl_day = (year & 3) || day <= 59 ? day : day - 1; |
| for (month = 0; month < 12; month++) |
| if (day_n[month] > nl_day) |
| break; |
| } |
| *date = nl_day - day_n[month - 1] + 1 + (month << 5) + (year << 9); |
| } |
| |
| /* The following are taken from fs/ntfs/util.c */ |
| |
| #define NTFS_TIME_OFFSET ((u64)(369*365 + 89) * 24 * 3600 * 10000000) |
| |
| /* |
| * Convert the NT UTC (based 1601-01-01, in hundred nanosecond units) |
| * into Unix UTC (based 1970-01-01, in seconds). |
| */ |
| static time_t |
| smb_ntutc2unixutc(u64 ntutc) |
| { |
| /* FIXME: what about the timezone difference? */ |
| /* Subtract the NTFS time offset, then convert to 1s intervals. */ |
| u64 t = ntutc - NTFS_TIME_OFFSET; |
| do_div(t, 10000000); |
| return (time_t)t; |
| } |
| |
| #if 0 |
| /* Convert the Unix UTC into NT time */ |
| static u64 |
| smb_unixutc2ntutc(struct smb_sb_info *server, time_t t) |
| { |
| /* Note: timezone conversion is probably wrong. */ |
| return ((u64)utc2local(server, t)) * 10000000 + NTFS_TIME_OFFSET; |
| } |
| #endif |
| |
| |
| /*****************************************************************************/ |
| /* */ |
| /* Support section. */ |
| /* */ |
| /*****************************************************************************/ |
| |
| __u32 |
| smb_len(__u8 * p) |
| { |
| return ((*(p+1) & 0x1) << 16L) | (*(p+2) << 8L) | *(p+3); |
| } |
| |
| static __u16 |
| smb_bcc(__u8 * packet) |
| { |
| int pos = SMB_HEADER_LEN + SMB_WCT(packet) * sizeof(__u16); |
| return WVAL(packet, pos); |
| } |
| |
| /* smb_valid_packet: We check if packet fulfills the basic |
| requirements of a smb packet */ |
| |
| static int |
| smb_valid_packet(__u8 * packet) |
| { |
| return (packet[4] == 0xff |
| && packet[5] == 'S' |
| && packet[6] == 'M' |
| && packet[7] == 'B' |
| && (smb_len(packet) + 4 == SMB_HEADER_LEN |
| + SMB_WCT(packet) * 2 + SMB_BCC(packet))); |
| } |
| |
| /* smb_verify: We check if we got the answer we expected, and if we |
| got enough data. If bcc == -1, we don't care. */ |
| |
| static int |
| smb_verify(__u8 * packet, int command, int wct, int bcc) |
| { |
| if (SMB_CMD(packet) != command) |
| goto bad_command; |
| if (SMB_WCT(packet) < wct) |
| goto bad_wct; |
| if (bcc != -1 && SMB_BCC(packet) < bcc) |
| goto bad_bcc; |
| return 0; |
| |
| bad_command: |
| printk(KERN_ERR "smb_verify: command=%x, SMB_CMD=%x??\n", |
| command, SMB_CMD(packet)); |
| goto fail; |
| bad_wct: |
| printk(KERN_ERR "smb_verify: command=%x, wct=%d, SMB_WCT=%d??\n", |
| command, wct, SMB_WCT(packet)); |
| goto fail; |
| bad_bcc: |
| printk(KERN_ERR "smb_verify: command=%x, bcc=%d, SMB_BCC=%d??\n", |
| command, bcc, SMB_BCC(packet)); |
| fail: |
| return -EIO; |
| } |
| |
| /* |
| * Returns the maximum read or write size for the "payload". Making all of the |
| * packet fit within the negotiated max_xmit size. |
| * |
| * N.B. Since this value is usually computed before locking the server, |
| * the server's packet size must never be decreased! |
| */ |
| static inline int |
| smb_get_xmitsize(struct smb_sb_info *server, int overhead) |
| { |
| return server->opt.max_xmit - overhead; |
| } |
| |
| /* |
| * Calculate the maximum read size |
| */ |
| int |
| smb_get_rsize(struct smb_sb_info *server) |
| { |
| int overhead = SMB_HEADER_LEN + 5 * sizeof(__u16) + 2 + 1 + 2; |
| int size = smb_get_xmitsize(server, overhead); |
| |
| VERBOSE("packet=%d, xmit=%d, size=%d\n", |
| server->packet_size, server->opt.max_xmit, size); |
| |
| return size; |
| } |
| |
| /* |
| * Calculate the maximum write size |
| */ |
| int |
| smb_get_wsize(struct smb_sb_info *server) |
| { |
| int overhead = SMB_HEADER_LEN + 5 * sizeof(__u16) + 2 + 1 + 2; |
| int size = smb_get_xmitsize(server, overhead); |
| |
| VERBOSE("packet=%d, xmit=%d, size=%d\n", |
| server->packet_size, server->opt.max_xmit, size); |
| |
| return size; |
| } |
| |
| /* |
| * Convert SMB error codes to -E... errno values. |
| */ |
| int |
| smb_errno(struct smb_sb_info *server) |
| { |
| int errcls = server->rcls; |
| int error = server->err; |
| char *class = "Unknown"; |
| |
| VERBOSE("errcls %d code %d from command 0x%x\n", |
| errcls, error, SMB_CMD(server->packet)); |
| |
| if (errcls == ERRDOS) { |
| switch (error) { |
| case ERRbadfunc: |
| return -EINVAL; |
| case ERRbadfile: |
| case ERRbadpath: |
| return -ENOENT; |
| case ERRnofids: |
| return -EMFILE; |
| case ERRnoaccess: |
| return -EACCES; |
| case ERRbadfid: |
| return -EBADF; |
| case ERRbadmcb: |
| return -EREMOTEIO; |
| case ERRnomem: |
| return -ENOMEM; |
| case ERRbadmem: |
| return -EFAULT; |
| case ERRbadenv: |
| case ERRbadformat: |
| return -EREMOTEIO; |
| case ERRbadaccess: |
| return -EACCES; |
| case ERRbaddata: |
| return -E2BIG; |
| case ERRbaddrive: |
| return -ENXIO; |
| case ERRremcd: |
| return -EREMOTEIO; |
| case ERRdiffdevice: |
| return -EXDEV; |
| case ERRnofiles: |
| return -ENOENT; |
| case ERRbadshare: |
| return -ETXTBSY; |
| case ERRlock: |
| return -EDEADLK; |
| case ERRfilexists: |
| return -EEXIST; |
| case ERROR_INVALID_PARAMETER: |
| return -EINVAL; |
| case ERROR_DISK_FULL: |
| return -ENOSPC; |
| case ERROR_INVALID_NAME: |
| return -ENOENT; |
| case ERROR_DIR_NOT_EMPTY: |
| return -ENOTEMPTY; |
| case ERROR_NOT_LOCKED: |
| return -ENOLCK; |
| case ERROR_ALREADY_EXISTS: |
| return -EEXIST; |
| default: |
| class = "ERRDOS"; |
| goto err_unknown; |
| } |
| } else if (errcls == ERRSRV) { |
| switch (error) { |
| /* N.B. This is wrong ... EIO ? */ |
| case ERRerror: |
| return -ENFILE; |
| case ERRbadpw: |
| return -EINVAL; |
| case ERRbadtype: |
| return -EIO; |
| case ERRaccess: |
| return -EACCES; |
| /* |
| * This is a fatal error, as it means the "tree ID" |
| * for this connection is no longer valid. We map |
| * to a special error code and get a new connection. |
| */ |
| case ERRinvnid: |
| return -EBADSLT; |
| default: |
| class = "ERRSRV"; |
| goto err_unknown; |
| } |
| } else if (errcls == ERRHRD) { |
| switch (error) { |
| case ERRnowrite: |
| return -EROFS; |
| case ERRbadunit: |
| return -ENODEV; |
| case ERRnotready: |
| return -EUCLEAN; |
| case ERRbadcmd: |
| case ERRdata: |
| return -EIO; |
| case ERRbadreq: |
| return -ERANGE; |
| case ERRbadshare: |
| return -ETXTBSY; |
| case ERRlock: |
| return -EDEADLK; |
| case ERRdiskfull: |
| return -ENOSPC; |
| default: |
| class = "ERRHRD"; |
| goto err_unknown; |
| } |
| } else if (errcls == ERRCMD) { |
| class = "ERRCMD"; |
| } else if (errcls == SUCCESS) { |
| return 0; /* This is the only valid 0 return */ |
| } |
| |
| err_unknown: |
| printk(KERN_ERR "smb_errno: class %s, code %d from command 0x%x\n", |
| class, error, SMB_CMD(server->packet)); |
| return -EIO; |
| } |
| |
| /* |
| * smb_retry: This function should be called when smb_request_ok has |
| * indicated an error. If the error was indicated because the |
| * connection was killed, we try to reconnect. If smb_retry returns 0, |
| * the error was indicated for another reason, so a retry would not be |
| * of any use. |
| * N.B. The server must be locked for this call. |
| */ |
| static int |
| smb_retry(struct smb_sb_info *server) |
| { |
| pid_t pid = server->conn_pid; |
| int error, result = 0; |
| |
| if (server->state == CONN_VALID || server->state == CONN_RETRYING) |
| goto out; |
| |
| smb_close_socket(server); |
| |
| if (pid == 0) { |
| printk(KERN_ERR "smb_retry: no connection process\n"); |
| server->state = CONN_RETRIED; |
| goto out; |
| } |
| |
| /* |
| * Change state so that only one retry per server will be started. |
| */ |
| server->state = CONN_RETRYING; |
| |
| /* |
| * Note: use the "priv" flag, as a user process may need to reconnect. |
| */ |
| error = kill_proc(pid, SIGUSR1, 1); |
| if (error) { |
| /* FIXME: this is fatal */ |
| printk(KERN_ERR "smb_retry: signal failed, error=%d\n", error); |
| goto out; |
| } |
| VERBOSE("signalled pid %d, waiting for new connection\n", pid); |
| |
| /* |
| * Wait for the new connection. |
| */ |
| #ifdef SMB_RETRY_INTR |
| smb_unlock_server(server); |
| interruptible_sleep_on_timeout(&server->wait, 30*HZ); |
| smb_lock_server(server); |
| if (signal_pending(current)) |
| printk(KERN_INFO "smb_retry: caught signal\n"); |
| #else |
| /* |
| * We don't want to be interrupted. For example, what if 'current' |
| * already has received a signal? sleep_on would terminate immediately |
| * and smbmount would not be able to re-establish connection. |
| * |
| * smbmount should be able to reconnect later, but it can't because |
| * it will get an -EIO on attempts to open the mountpoint! |
| * |
| * FIXME: go back to the interruptable version now that smbmount |
| * can avoid -EIO on the mountpoint when reconnecting? |
| */ |
| smb_unlock_server(server); |
| sleep_on_timeout(&server->wait, 30*HZ); |
| smb_lock_server(server); |
| #endif |
| |
| /* |
| * Check for a valid connection. |
| */ |
| if (server->state == CONN_VALID) { |
| /* This should be changed to VERBOSE, except many smbfs |
| problems is with the userspace daemon not reconnecting. */ |
| PARANOIA("successful, new pid=%d, generation=%d\n", |
| server->conn_pid, server->generation); |
| result = 1; |
| } else if (server->state == CONN_RETRYING) { |
| /* allow further attempts later */ |
| server->state = CONN_RETRIED; |
| } |
| |
| out: |
| return result; |
| } |
| |
| /* smb_request_ok: We expect the server to be locked. Then we do the |
| request and check the answer completely. When smb_request_ok |
| returns 0, you can be quite sure that everything went well. When |
| the answer is <=0, the returned number is a valid unix errno. */ |
| |
| static int |
| smb_request_ok(struct smb_sb_info *s, int command, int wct, int bcc) |
| { |
| int result = -EIO; |
| |
| s->rcls = 0; |
| s->err = 0; |
| |
| /* Make sure we have a connection */ |
| if (s->state != CONN_VALID) { |
| if (!smb_retry(s)) |
| goto out; |
| } |
| |
| if (smb_request(s) < 0) { |
| DEBUG1("smb_request failed\n"); |
| goto out; |
| } |
| if (smb_valid_packet(s->packet) != 0) { |
| PARANOIA("invalid packet!\n"); |
| goto out; |
| } |
| |
| /* |
| * Check for server errors. |
| */ |
| if (s->rcls != 0) { |
| result = smb_errno(s); |
| if (!result) |
| printk(KERN_DEBUG "smb_request_ok: rcls=%d, err=%d mapped to 0\n", |
| s->rcls, s->err); |
| /* |
| * Exit now even if the error was squashed ... |
| * packet verify will fail anyway. |
| */ |
| goto out; |
| } |
| result = smb_verify(s->packet, command, wct, bcc); |
| |
| out: |
| return result; |
| } |
| |
| /* |
| * This implements the NEWCONN ioctl. It installs the server pid, |
| * sets server->state to CONN_VALID, and wakes up the waiting process. |
| */ |
| int |
| smb_newconn(struct smb_sb_info *server, struct smb_conn_opt *opt) |
| { |
| struct file *filp; |
| int error; |
| |
| VERBOSE("fd=%d, pid=%d\n", opt->fd, current->pid); |
| |
| smb_lock_server(server); |
| |
| /* |
| * Make sure we don't already have a valid connection ... |
| */ |
| error = -EINVAL; |
| if (server->state == CONN_VALID) |
| goto out; |
| |
| error = -EACCES; |
| if (current->uid != server->mnt->mounted_uid && |
| !capable(CAP_SYS_ADMIN)) |
| goto out; |
| |
| error = -EBADF; |
| filp = fget(opt->fd); |
| if (!filp) |
| goto out; |
| if (!smb_valid_socket(filp->f_dentry->d_inode)) |
| goto out_putf; |
| |
| server->sock_file = filp; |
| server->conn_pid = current->pid; |
| smb_catch_keepalive(server); |
| server->opt = *opt; |
| server->generation += 1; |
| server->state = CONN_VALID; |
| error = 0; |
| |
| /* check if we have an old smbmount that uses seconds for the |
| serverzone */ |
| if (server->opt.serverzone > 12*60 || server->opt.serverzone < -12*60) |
| server->opt.serverzone /= 60; |
| |
| /* now that we have an established connection we can detect the server |
| type and enable bug workarounds */ |
| if (server->opt.protocol == SMB_PROTOCOL_NT1 && |
| (server->opt.max_xmit < 0x1000) && |
| !(server->opt.capabilities & SMB_CAP_NT_SMBS)) { |
| server->mnt->flags |= SMB_MOUNT_WIN95; |
| VERBOSE("smb_newconn: detected WIN95 server\n"); |
| } |
| |
| VERBOSE("protocol=%d, max_xmit=%d, pid=%d capabilities=0x%x\n", |
| server->opt.protocol, server->opt.max_xmit, server->conn_pid, |
| server->opt.capabilities); |
| |
| /* Make sure we can fit a message of the negotiated size in our |
| packet buffer. */ |
| if (server->opt.max_xmit > server->packet_size) { |
| int len = smb_round_length(server->opt.max_xmit); |
| char *buf = smb_vmalloc(len); |
| if (buf) { |
| if (server->packet) |
| smb_vfree(server->packet); |
| server->packet = buf; |
| server->packet_size = len; |
| } else { |
| /* else continue with the too small buffer? */ |
| PARANOIA("Failed to allocate new packet buffer: " |
| "max_xmit=%d, packet_size=%d\n", |
| server->opt.max_xmit, server->packet_size); |
| server->opt.max_xmit = server->packet_size; |
| } |
| } |
| |
| out: |
| smb_unlock_server(server); |
| smb_wakeup(server); |
| return error; |
| |
| out_putf: |
| fput(filp); |
| goto out; |
| } |
| |
| int |
| smb_wakeup(struct smb_sb_info *server) |
| { |
| #ifdef SMB_RETRY_INTR |
| wake_up_interruptible(&server->wait); |
| #else |
| wake_up(&server->wait); |
| #endif |
| return 0; |
| } |
| |
| /* smb_setup_header: We completely set up the packet. You only have to |
| insert the command-specific fields */ |
| |
| __u8 * |
| smb_setup_header(struct smb_sb_info * server, __u8 command, __u16 wct, __u16 bcc) |
| { |
| __u32 xmit_len = SMB_HEADER_LEN + wct * sizeof(__u16) + bcc + 2; |
| __u8 *p = server->packet; |
| __u8 *buf = server->packet; |
| |
| if (xmit_len > server->packet_size) |
| printk(KERN_DEBUG "smb_setup_header: " |
| "Aieee, xmit len > packet! len=%d, size=%d\n", |
| xmit_len, server->packet_size); |
| |
| p = smb_encode_smb_length(p, xmit_len - 4); |
| |
| *p++ = 0xff; |
| *p++ = 'S'; |
| *p++ = 'M'; |
| *p++ = 'B'; |
| *p++ = command; |
| |
| memset(p, '\0', 19); |
| p += 19; |
| p += 8; |
| |
| WSET(buf, smb_tid, server->opt.tid); |
| WSET(buf, smb_pid, 1); |
| WSET(buf, smb_uid, server->opt.server_uid); |
| WSET(buf, smb_mid, 1); |
| |
| if (server->opt.protocol > SMB_PROTOCOL_CORE) |
| { |
| *(buf+smb_flg) = 0x8; |
| WSET(buf, smb_flg2, 0x3); |
| } |
| *p++ = wct; /* wct */ |
| p += 2 * wct; |
| WSET(p, 0, bcc); |
| return p + 2; |
| } |
| |
| static void |
| smb_setup_bcc(struct smb_sb_info *server, __u8 * p) |
| { |
| __u8 *packet = server->packet; |
| __u8 *pbcc = packet + SMB_HEADER_LEN + 2 * SMB_WCT(packet); |
| __u16 bcc = p - (pbcc + 2); |
| |
| WSET(pbcc, 0, bcc); |
| smb_encode_smb_length(packet, |
| SMB_HEADER_LEN + 2 * SMB_WCT(packet) - 2 + bcc); |
| } |
| |
| /* |
| * Called with the server locked |
| */ |
| static int |
| smb_proc_seek(struct smb_sb_info *server, __u16 fileid, |
| __u16 mode, off_t offset) |
| { |
| int result; |
| |
| smb_setup_header(server, SMBlseek, 4, 0); |
| WSET(server->packet, smb_vwv0, fileid); |
| WSET(server->packet, smb_vwv1, mode); |
| DSET(server->packet, smb_vwv2, offset); |
| |
| result = smb_request_ok(server, SMBlseek, 2, 0); |
| if (result < 0) { |
| result = 0; |
| goto out; |
| } |
| |
| result = DVAL(server->packet, smb_vwv0); |
| out: |
| return result; |
| } |
| |
| /* |
| * We're called with the server locked, and we leave it that way. |
| */ |
| static int |
| smb_proc_open(struct smb_sb_info *server, struct dentry *dentry, int wish) |
| { |
| struct inode *ino = dentry->d_inode; |
| struct smb_inode_info *ei = SMB_I(ino); |
| int mode, read_write = 0x42, read_only = 0x40; |
| int res; |
| char *p; |
| |
| /* |
| * Attempt to open r/w, unless there are no write privileges. |
| */ |
| mode = read_write; |
| if (!(ino->i_mode & (S_IWUSR | S_IWGRP | S_IWOTH))) |
| mode = read_only; |
| #if 0 |
| /* FIXME: why is this code not in? below we fix it so that a caller |
| wanting RO doesn't get RW. smb_revalidate_inode does some |
| optimization based on access mode. tail -f needs it to be correct. |
| |
| We must open rw since we don't do the open if called a second time |
| with different 'wish'. Is that not supported by smb servers? */ |
| if (!(wish & (O_WRONLY | O_RDWR))) |
| mode = read_only; |
| #endif |
| |
| retry: |
| p = smb_setup_header(server, SMBopen, 2, 0); |
| WSET(server->packet, smb_vwv0, mode); |
| WSET(server->packet, smb_vwv1, aSYSTEM | aHIDDEN | aDIR); |
| *p++ = 4; |
| res = smb_encode_path(server, p, dentry, NULL); |
| if (res < 0) |
| goto out; |
| p += res; |
| |
| smb_setup_bcc(server, p); |
| |
| res = smb_request_ok(server, SMBopen, 7, 0); |
| if (res != 0) { |
| if (smb_retry(server)) |
| goto retry; |
| |
| if (mode == read_write && |
| (res == -EACCES || res == -ETXTBSY || res == -EROFS)) |
| { |
| VERBOSE("%s/%s R/W failed, error=%d, retrying R/O\n", |
| DENTRY_PATH(dentry), res); |
| mode = read_only; |
| goto retry; |
| } |
| goto out; |
| } |
| /* We should now have data in vwv[0..6]. */ |
| |
| ei->fileid = WVAL(server->packet, smb_vwv0); |
| ei->attr = WVAL(server->packet, smb_vwv1); |
| /* smb_vwv2 has mtime */ |
| /* smb_vwv4 has size */ |
| ei->access = (WVAL(server->packet, smb_vwv6) & SMB_ACCMASK); |
| ei->open = server->generation; |
| |
| out: |
| return res; |
| } |
| |
| /* |
| * Make sure the file is open, and check that the access |
| * is compatible with the desired access. |
| */ |
| int |
| smb_open(struct dentry *dentry, int wish) |
| { |
| struct inode *inode = dentry->d_inode; |
| int result; |
| __u16 access; |
| |
| result = -ENOENT; |
| if (!inode) { |
| printk(KERN_ERR "smb_open: no inode for dentry %s/%s\n", |
| DENTRY_PATH(dentry)); |
| goto out; |
| } |
| |
| if (!smb_is_open(inode)) { |
| struct smb_sb_info *server = server_from_inode(inode); |
| smb_lock_server(server); |
| result = 0; |
| if (!smb_is_open(inode)) |
| result = smb_proc_open(server, dentry, wish); |
| smb_unlock_server(server); |
| if (result) { |
| PARANOIA("%s/%s open failed, result=%d\n", |
| DENTRY_PATH(dentry), result); |
| goto out; |
| } |
| /* |
| * A successful open means the path is still valid ... |
| */ |
| smb_renew_times(dentry); |
| } |
| |
| /* |
| * Check whether the access is compatible with the desired mode. |
| */ |
| result = 0; |
| access = SMB_I(inode)->access; |
| if (access != wish && access != SMB_O_RDWR) { |
| PARANOIA("%s/%s access denied, access=%x, wish=%x\n", |
| DENTRY_PATH(dentry), access, wish); |
| result = -EACCES; |
| } |
| out: |
| return result; |
| } |
| |
| /* We're called with the server locked */ |
| |
| static int |
| smb_proc_close(struct smb_sb_info *server, __u16 fileid, __u32 mtime) |
| { |
| smb_setup_header(server, SMBclose, 3, 0); |
| WSET(server->packet, smb_vwv0, fileid); |
| DSET(server->packet, smb_vwv1, utc2local(server, mtime)); |
| return smb_request_ok(server, SMBclose, 0, 0); |
| } |
| |
| /* |
| * Called with the server locked. |
| * |
| * Win NT 4.0 has an apparent bug in that it fails to update the |
| * modify time when writing to a file. As a workaround, we update |
| * both modify and access time locally, and post the times to the |
| * server when closing the file. |
| */ |
| static int |
| smb_proc_close_inode(struct smb_sb_info *server, struct inode * ino) |
| { |
| struct smb_inode_info *ei = SMB_I(ino); |
| int result = 0; |
| if (smb_is_open(ino)) |
| { |
| /* |
| * We clear the open flag in advance, in case another |
| * process observes the value while we block below. |
| */ |
| ei->open = 0; |
| |
| /* |
| * Kludge alert: SMB timestamps are accurate only to |
| * two seconds ... round the times to avoid needless |
| * cache invalidations! |
| */ |
| if (ino->i_mtime & 1) |
| ino->i_mtime--; |
| if (ino->i_atime & 1) |
| ino->i_atime--; |
| /* |
| * If the file is open with write permissions, |
| * update the time stamps to sync mtime and atime. |
| */ |
| if ((server->opt.protocol >= SMB_PROTOCOL_LANMAN2) && |
| !(ei->access == SMB_O_RDONLY)) |
| { |
| struct smb_fattr fattr; |
| smb_get_inode_attr(ino, &fattr); |
| smb_proc_setattr_ext(server, ino, &fattr); |
| } |
| |
| result = smb_proc_close(server, ei->fileid, ino->i_mtime); |
| /* |
| * Force a revalidation after closing ... some servers |
| * don't post the size until the file has been closed. |
| */ |
| if (server->opt.protocol < SMB_PROTOCOL_NT1) |
| ei->oldmtime = 0; |
| ei->closed = jiffies; |
| } |
| return result; |
| } |
| |
| int |
| smb_close(struct inode *ino) |
| { |
| int result = 0; |
| |
| if (smb_is_open(ino)) { |
| struct smb_sb_info *server = server_from_inode(ino); |
| smb_lock_server(server); |
| result = smb_proc_close_inode(server, ino); |
| smb_unlock_server(server); |
| } |
| return result; |
| } |
| |
| /* |
| * This is used to close a file following a failed instantiate. |
| * Since we don't have an inode, we can't use any of the above. |
| */ |
| int |
| smb_close_fileid(struct dentry *dentry, __u16 fileid) |
| { |
| struct smb_sb_info *server = server_from_dentry(dentry); |
| int result; |
| |
| smb_lock_server(server); |
| result = smb_proc_close(server, fileid, CURRENT_TIME); |
| smb_unlock_server(server); |
| return result; |
| } |
| |
| /* In smb_proc_read and smb_proc_write we do not retry, because the |
| file-id would not be valid after a reconnection. */ |
| |
| int |
| smb_proc_read(struct inode *inode, off_t offset, int count, char *data) |
| { |
| struct smb_sb_info *server = server_from_inode(inode); |
| __u16 returned_count, data_len; |
| unsigned char *buf; |
| int result; |
| |
| smb_lock_server(server); |
| smb_setup_header(server, SMBread, 5, 0); |
| buf = server->packet; |
| WSET(buf, smb_vwv0, SMB_I(inode)->fileid); |
| WSET(buf, smb_vwv1, count); |
| DSET(buf, smb_vwv2, offset); |
| WSET(buf, smb_vwv4, 0); |
| |
| result = smb_request_ok(server, SMBread, 5, -1); |
| if (result < 0) |
| goto out; |
| returned_count = WVAL(server->packet, smb_vwv0); |
| |
| buf = SMB_BUF(server->packet); |
| data_len = WVAL(buf, 1); |
| |
| /* we can NOT simply trust the data_len given by the server ... */ |
| if (data_len > server->packet_size - (buf+3 - server->packet)) { |
| printk(KERN_ERR "smb_proc_read: invalid data length!! " |
| "%d > %d - (%p - %p)\n", |
| data_len, server->packet_size, buf+3, server->packet); |
| result = -EIO; |
| goto out; |
| } |
| |
| memcpy(data, buf+3, data_len); |
| |
| if (returned_count != data_len) { |
| printk(KERN_NOTICE "smb_proc_read: returned != data_len\n"); |
| printk(KERN_NOTICE "smb_proc_read: ret_c=%d, data_len=%d\n", |
| returned_count, data_len); |
| } |
| result = data_len; |
| |
| out: |
| VERBOSE("ino=%ld, fileid=%d, count=%d, result=%d\n", |
| inode->i_ino, SMB_I(inode)->fileid, count, result); |
| smb_unlock_server(server); |
| return result; |
| } |
| |
| int |
| smb_proc_write(struct inode *inode, off_t offset, int count, const char *data) |
| { |
| struct smb_sb_info *server = server_from_inode(inode); |
| int result; |
| __u8 *p; |
| __u16 fileid = SMB_I(inode)->fileid; |
| |
| VERBOSE("ino=%ld, fileid=%d, count=%d@%ld, packet_size=%d\n", |
| inode->i_ino, SMB_I(inode)->fileid, count, offset, |
| server->packet_size); |
| |
| smb_lock_server(server); |
| p = smb_setup_header(server, SMBwrite, 5, count + 3); |
| WSET(server->packet, smb_vwv0, fileid); |
| WSET(server->packet, smb_vwv1, count); |
| DSET(server->packet, smb_vwv2, offset); |
| WSET(server->packet, smb_vwv4, 0); |
| |
| *p++ = 1; |
| WSET(p, 0, count); |
| memcpy(p+2, data, count); |
| |
| result = smb_request_ok(server, SMBwrite, 1, 0); |
| if (result >= 0) |
| result = WVAL(server->packet, smb_vwv0); |
| |
| smb_unlock_server(server); |
| return result; |
| } |
| |
| int |
| smb_proc_create(struct dentry *dentry, __u16 attr, time_t ctime, __u16 *fileid) |
| { |
| struct smb_sb_info *server = server_from_dentry(dentry); |
| char *p; |
| int result; |
| |
| smb_lock_server(server); |
| |
| retry: |
| p = smb_setup_header(server, SMBcreate, 3, 0); |
| WSET(server->packet, smb_vwv0, attr); |
| DSET(server->packet, smb_vwv1, utc2local(server, ctime)); |
| *p++ = 4; |
| result = smb_encode_path(server, p, dentry, NULL); |
| if (result < 0) |
| goto out; |
| p += result; |
| smb_setup_bcc(server, p); |
| |
| result = smb_request_ok(server, SMBcreate, 1, 0); |
| if (result < 0) { |
| if (smb_retry(server)) |
| goto retry; |
| goto out; |
| } |
| *fileid = WVAL(server->packet, smb_vwv0); |
| result = 0; |
| |
| out: |
| smb_unlock_server(server); |
| return result; |
| } |
| |
| int |
| smb_proc_mv(struct dentry *old_dentry, struct dentry *new_dentry) |
| { |
| struct smb_sb_info *server = server_from_dentry(old_dentry); |
| char *p; |
| int result; |
| |
| smb_lock_server(server); |
| |
| retry: |
| p = smb_setup_header(server, SMBmv, 1, 0); |
| WSET(server->packet, smb_vwv0, aSYSTEM | aHIDDEN | aDIR); |
| |
| *p++ = 4; |
| result = smb_encode_path(server, p, old_dentry, NULL); |
| if (result < 0) |
| goto out; |
| p += result; |
| |
| *p++ = 4; |
| result = smb_encode_path(server, p, new_dentry, NULL); |
| if (result < 0) |
| goto out; |
| p += result; |
| |
| smb_setup_bcc(server, p); |
| |
| if ((result = smb_request_ok(server, SMBmv, 0, 0)) < 0) { |
| if (smb_retry(server)) |
| goto retry; |
| goto out; |
| } |
| result = 0; |
| out: |
| smb_unlock_server(server); |
| return result; |
| } |
| |
| /* |
| * Code common to mkdir and rmdir. |
| */ |
| static int |
| smb_proc_generic_command(struct dentry *dentry, __u8 command) |
| { |
| struct smb_sb_info *server = server_from_dentry(dentry); |
| char *p; |
| int result; |
| |
| smb_lock_server(server); |
| |
| retry: |
| p = smb_setup_header(server, command, 0, 0); |
| *p++ = 4; |
| result = smb_encode_path(server, p, dentry, NULL); |
| if (result < 0) |
| goto out; |
| p += result; |
| smb_setup_bcc(server, p); |
| |
| result = smb_request_ok(server, command, 0, 0); |
| if (result < 0) { |
| if (smb_retry(server)) |
| goto retry; |
| goto out; |
| } |
| result = 0; |
| out: |
| smb_unlock_server(server); |
| return result; |
| } |
| |
| int |
| smb_proc_mkdir(struct dentry *dentry) |
| { |
| return smb_proc_generic_command(dentry, SMBmkdir); |
| } |
| |
| int |
| smb_proc_rmdir(struct dentry *dentry) |
| { |
| return smb_proc_generic_command(dentry, SMBrmdir); |
| } |
| |
| #if SMBFS_POSIX_UNLINK |
| /* |
| * Removes readonly attribute from a file. Used by unlink to give posix |
| * semantics. |
| * Note: called with the server locked. |
| */ |
| static int |
| smb_set_rw(struct dentry *dentry,struct smb_sb_info *server) |
| { |
| int result; |
| struct smb_fattr fattr; |
| |
| /* first get current attribute */ |
| result = smb_proc_do_getattr(server, dentry, &fattr); |
| if (result < 0) |
| return result; |
| |
| /* if RONLY attribute is set, remove it */ |
| if (fattr.attr & aRONLY) { /* read only attribute is set */ |
| fattr.attr &= ~aRONLY; |
| result = smb_proc_setattr_core(server, dentry, fattr.attr); |
| } |
| return result; |
| } |
| #endif |
| |
| int |
| smb_proc_unlink(struct dentry *dentry) |
| { |
| struct smb_sb_info *server = server_from_dentry(dentry); |
| int flag = 0; |
| char *p; |
| int result; |
| |
| smb_lock_server(server); |
| |
| retry: |
| p = smb_setup_header(server, SMBunlink, 1, 0); |
| WSET(server->packet, smb_vwv0, aSYSTEM | aHIDDEN); |
| *p++ = 4; |
| result = smb_encode_path(server, p, dentry, NULL); |
| if (result < 0) |
| goto out; |
| p += result; |
| smb_setup_bcc(server, p); |
| |
| if ((result = smb_request_ok(server, SMBunlink, 0, 0)) < 0) { |
| #if SMBFS_POSIX_UNLINK |
| if (result == -EACCES && !flag) { |
| /* Posix semantics is for the read-only state |
| of a file to be ignored in unlink(). In the |
| SMB world a unlink() is refused on a |
| read-only file. To make things easier for |
| unix users we try to override the files |
| permission if the unlink fails with the |
| right error. |
| This introduces a race condition that could |
| lead to a file being written by someone who |
| shouldn't have access, but as far as I can |
| tell that is unavoidable */ |
| |
| /* remove RONLY attribute and try again */ |
| result = smb_set_rw(dentry,server); |
| if (result == 0) { |
| flag = 1; |
| goto retry; |
| } |
| } |
| #endif |
| if (smb_retry(server)) |
| goto retry; |
| goto out; |
| } |
| result = 0; |
| out: |
| smb_unlock_server(server); |
| return result; |
| } |
| |
| /* |
| * Called with the server locked |
| */ |
| int |
| smb_proc_flush(struct smb_sb_info *server, __u16 fileid) |
| { |
| smb_setup_header(server, SMBflush, 1, 0); |
| WSET(server->packet, smb_vwv0, fileid); |
| return smb_request_ok(server, SMBflush, 0, 0); |
| } |
| |
| int |
| smb_proc_trunc(struct smb_sb_info *server, __u16 fid, __u32 length) |
| { |
| char *p; |
| int result; |
| |
| smb_lock_server(server); |
| |
| retry: |
| p = smb_setup_header(server, SMBwrite, 5, 3); |
| WSET(server->packet, smb_vwv0, fid); |
| WSET(server->packet, smb_vwv1, 0); |
| DSET(server->packet, smb_vwv2, length); |
| WSET(server->packet, smb_vwv4, 0); |
| *p++ = 1; |
| WSET(p, 0, 0); |
| |
| if ((result = smb_request_ok(server, SMBwrite, 1, 0)) < 0) { |
| if (smb_retry(server)) |
| goto retry; |
| goto out; |
| } |
| |
| /* |
| * win9x doesn't appear to update the size immediately. |
| * It will return the old file size after the truncate, |
| * confusing smbfs. |
| * NT and Samba return the new value immediately. |
| */ |
| if (server->mnt->flags & SMB_MOUNT_WIN95) |
| smb_proc_flush(server, fid); |
| out: |
| smb_unlock_server(server); |
| return result; |
| } |
| |
| static void |
| smb_init_dirent(struct smb_sb_info *server, struct smb_fattr *fattr) |
| { |
| memset(fattr, 0, sizeof(*fattr)); |
| |
| fattr->f_nlink = 1; |
| fattr->f_uid = server->mnt->uid; |
| fattr->f_gid = server->mnt->gid; |
| fattr->f_blksize = SMB_ST_BLKSIZE; |
| } |
| |
| static void |
| smb_finish_dirent(struct smb_sb_info *server, struct smb_fattr *fattr) |
| { |
| fattr->f_mode = server->mnt->file_mode; |
| if (fattr->attr & aDIR) |
| { |
| fattr->f_mode = server->mnt->dir_mode; |
| fattr->f_size = SMB_ST_BLKSIZE; |
| } |
| /* Check the read-only flag */ |
| if (fattr->attr & aRONLY) |
| fattr->f_mode &= ~(S_IWUSR | S_IWGRP | S_IWOTH); |
| |
| /* How many 512 byte blocks do we need for this file? */ |
| fattr->f_blocks = 0; |
| if (fattr->f_size != 0) |
| fattr->f_blocks = 1 + ((fattr->f_size-1) >> 9); |
| return; |
| } |
| |
| void |
| smb_init_root_dirent(struct smb_sb_info *server, struct smb_fattr *fattr) |
| { |
| smb_init_dirent(server, fattr); |
| fattr->attr = aDIR; |
| fattr->f_ino = 2; /* traditional root inode number */ |
| fattr->f_mtime = CURRENT_TIME; |
| smb_finish_dirent(server, fattr); |
| } |
| |
| /* |
| * Decode a dirent for old protocols |
| * |
| * qname is filled with the decoded, and possibly translated, name. |
| * fattr receives decoded attributes |
| * |
| * Bugs Noted: |
| * (1) Pathworks servers may pad the name with extra spaces. |
| */ |
| static char * |
| smb_decode_short_dirent(struct smb_sb_info *server, char *p, |
| struct qstr *qname, struct smb_fattr *fattr) |
| { |
| int len; |
| |
| /* |
| * SMB doesn't have a concept of inode numbers ... |
| */ |
| smb_init_dirent(server, fattr); |
| fattr->f_ino = 0; /* FIXME: do we need this? */ |
| |
| p += SMB_STATUS_SIZE; /* reserved (search_status) */ |
| fattr->attr = *p; |
| fattr->f_mtime = date_dos2unix(server, WVAL(p, 3), WVAL(p, 1)); |
| fattr->f_size = DVAL(p, 5); |
| fattr->f_ctime = fattr->f_mtime; |
| fattr->f_atime = fattr->f_mtime; |
| qname->name = p + 9; |
| len = strnlen(qname->name, 12); |
| |
| /* |
| * Trim trailing blanks for Pathworks servers |
| */ |
| while (len > 2 && qname->name[len-1] == ' ') |
| len--; |
| qname->len = len; |
| |
| smb_finish_dirent(server, fattr); |
| |
| #if 0 |
| /* FIXME: These only work for ascii chars, and recent smbmount doesn't |
| allow the flag to be set anyway. It kills const. Remove? */ |
| switch (server->opt.case_handling) { |
| case SMB_CASE_UPPER: |
| str_upper(entry->name, len); |
| break; |
| case SMB_CASE_LOWER: |
| str_lower(entry->name, len); |
| break; |
| default: |
| break; |
| } |
| #endif |
| |
| qname->len = server->convert(server->name_buf, SMB_MAXNAMELEN, |
| qname->name, len, |
| server->remote_nls, server->local_nls); |
| qname->name = server->name_buf; |
| |
| DEBUG1("len=%d, name=%.*s\n", qname->len, qname->len, qname->name); |
| return p + 22; |
| } |
| |
| /* |
| * This routine is used to read in directory entries from the network. |
| * Note that it is for short directory name seeks, i.e.: protocol < |
| * SMB_PROTOCOL_LANMAN2 |
| */ |
| static int |
| smb_proc_readdir_short(struct file *filp, void *dirent, filldir_t filldir, |
| struct smb_cache_control *ctl) |
| { |
| struct dentry *dir = filp->f_dentry; |
| struct smb_sb_info *server = server_from_dentry(dir); |
| struct qstr qname; |
| struct smb_fattr fattr; |
| |
| unsigned char *p; |
| int result; |
| int i, first, entries_seen, entries; |
| int entries_asked = (server->opt.max_xmit - 100) / SMB_DIRINFO_SIZE; |
| __u16 bcc; |
| __u16 count; |
| char status[SMB_STATUS_SIZE]; |
| static struct qstr mask = { "*.*", 3, 0 }; |
| unsigned char *last_status; |
| |
| VERBOSE("%s/%s\n", DENTRY_PATH(dir)); |
| |
| smb_lock_server(server); |
| |
| first = 1; |
| entries = 0; |
| entries_seen = 2; /* implicit . and .. */ |
| |
| while (1) { |
| p = smb_setup_header(server, SMBsearch, 2, 0); |
| WSET(server->packet, smb_vwv0, entries_asked); |
| WSET(server->packet, smb_vwv1, aDIR); |
| *p++ = 4; |
| if (first == 1) { |
| result = smb_encode_path(server, p, dir, &mask); |
| if (result < 0) |
| goto unlock_return; |
| p += result; |
| *p++ = 5; |
| WSET(p, 0, 0); |
| p += 2; |
| first = 0; |
| } else { |
| *p++ = 0; |
| *p++ = 5; |
| WSET(p, 0, SMB_STATUS_SIZE); |
| p += 2; |
| memcpy(p, status, SMB_STATUS_SIZE); |
| p += SMB_STATUS_SIZE; |
| } |
| |
| smb_setup_bcc(server, p); |
| |
| result = smb_request_ok(server, SMBsearch, 1, -1); |
| if (result < 0) { |
| if ((server->rcls == ERRDOS) && |
| (server->err == ERRnofiles)) |
| break; |
| if (smb_retry(server)) { |
| ctl->idx = -1; /* retry */ |
| result = 0; |
| } |
| goto unlock_return; |
| } |
| p = SMB_VWV(server->packet); |
| count = WVAL(p, 0); |
| if (count <= 0) |
| break; |
| |
| result = -EIO; |
| bcc = WVAL(p, 2); |
| if (bcc != count * SMB_DIRINFO_SIZE + 3) |
| goto unlock_return; |
| p += 7; |
| |
| |
| /* Make sure the response fits in the buffer. Fixed sized |
| entries means we don't have to check in the decode loop. */ |
| |
| last_status = SMB_BUF(server->packet) + 3 + (count - 1) * |
| SMB_DIRINFO_SIZE; |
| |
| if (last_status + SMB_DIRINFO_SIZE >= |
| server->packet + server->packet_size) { |
| printk(KERN_ERR "smb_proc_readdir_short: " |
| "last dir entry outside buffer! " |
| "%d@%p %d@%p\n", SMB_DIRINFO_SIZE, last_status, |
| server->packet_size, server->packet); |
| goto unlock_return; |
| } |
| |
| /* Read the last entry into the status field. */ |
| memcpy(status, last_status, SMB_STATUS_SIZE); |
| |
| |
| /* Now we are ready to parse smb directory entries. */ |
| |
| for (i = 0; i < count; i++) { |
| p = smb_decode_short_dirent(server, p, |
| &qname, &fattr); |
| |
| if (entries_seen == 2 && qname.name[0] == '.') { |
| if (qname.len == 1) |
| continue; |
| if (qname.name[1] == '.' && qname.len == 2) |
| continue; |
| } |
| if (!smb_fill_cache(filp, dirent, filldir, ctl, |
| &qname, &fattr)) |
| ; /* stop reading? */ |
| entries_seen++; |
| } |
| } |
| result = entries; |
| |
| unlock_return: |
| smb_unlock_server(server); |
| return result; |
| } |
| |
| /* |
| * Interpret a long filename structure using the specified info level: |
| * level 1 for anything below NT1 protocol |
| * level 260 for NT1 protocol |
| * |
| * qname is filled with the decoded, and possibly translated, name |
| * fattr receives decoded attributes. |
| * |
| * Bugs Noted: |
| * (1) Win NT 4.0 appends a null byte to names and counts it in the length! |
| */ |
| static char * |
| smb_decode_long_dirent(struct smb_sb_info *server, char *p, int level, |
| struct qstr *qname, struct smb_fattr *fattr) |
| { |
| char *result; |
| unsigned int len = 0; |
| __u16 date, time; |
| |
| /* |
| * SMB doesn't have a concept of inode numbers ... |
| */ |
| smb_init_dirent(server, fattr); |
| fattr->f_ino = 0; /* FIXME: do we need this? */ |
| |
| switch (level) { |
| case 1: |
| len = *((unsigned char *) p + 22); |
| qname->name = p + 23; |
| result = p + 24 + len; |
| |
| date = WVAL(p, 0); |
| time = WVAL(p, 2); |
| fattr->f_ctime = date_dos2unix(server, date, time); |
| |
| date = WVAL(p, 4); |
| time = WVAL(p, 6); |
| fattr->f_atime = date_dos2unix(server, date, time); |
| |
| date = WVAL(p, 8); |
| time = WVAL(p, 10); |
| fattr->f_mtime = date_dos2unix(server, date, time); |
| fattr->f_size = DVAL(p, 12); |
| /* ULONG allocation size */ |
| fattr->attr = WVAL(p, 20); |
| |
| VERBOSE("info 1 at %p, len=%d, name=%.*s\n", |
| p, len, len, qname->name); |
| break; |
| case 260: |
| result = p + WVAL(p, 0); |
| len = DVAL(p, 60); |
| if (len > 255) len = 255; |
| /* NT4 null terminates */ |
| qname->name = p + 94; |
| if (len && qname->name[len-1] == '\0') |
| len--; |
| |
| fattr->f_ctime = smb_ntutc2unixutc(LVAL(p, 8)); |
| fattr->f_atime = smb_ntutc2unixutc(LVAL(p, 16)); |
| fattr->f_mtime = smb_ntutc2unixutc(LVAL(p, 24)); |
| /* change time (32) */ |
| fattr->f_size = DVAL(p, 40); |
| /* alloc size (48) */ |
| fattr->attr = DVAL(p, 56); |
| |
| VERBOSE("info 260 at %p, len=%d, name=%.*s\n", |
| p, len, len, qname->name); |
| break; |
| default: |
| PARANOIA("Unknown info level %d\n", level); |
| result = p + WVAL(p, 0); |
| goto out; |
| } |
| |
| smb_finish_dirent(server, fattr); |
| |
| #if 0 |
| /* FIXME: These only work for ascii chars, and recent smbmount doesn't |
| allow the flag to be set anyway. Remove? */ |
| switch (server->opt.case_handling) { |
| case SMB_CASE_UPPER: |
| str_upper(qname->name, len); |
| break; |
| case SMB_CASE_LOWER: |
| str_lower(qname->name, len); |
| break; |
| default: |
| break; |
| } |
| #endif |
| |
| qname->len = server->convert(server->name_buf, SMB_MAXNAMELEN, |
| qname->name, len, |
| server->remote_nls, server->local_nls); |
| qname->name = server->name_buf; |
| |
| out: |
| return result; |
| } |
| |
| /* findfirst/findnext flags */ |
| #define SMB_CLOSE_AFTER_FIRST (1<<0) |
| #define SMB_CLOSE_IF_END (1<<1) |
| #define SMB_REQUIRE_RESUME_KEY (1<<2) |
| #define SMB_CONTINUE_BIT (1<<3) |
| |
| /* |
| * Note: samba-2.0.7 (at least) has a very similar routine, cli_list, in |
| * source/libsmb/clilist.c. When looking for smb bugs in the readdir code, |
| * go there for advise. |
| * |
| * Bugs Noted: |
| * (1) When using Info Level 1 Win NT 4.0 truncates directory listings |
| * for certain patterns of names and/or lengths. The breakage pattern |
| * is completely reproducible and can be toggled by the creation of a |
| * single file. (E.g. echo hi >foo breaks, rm -f foo works.) |
| */ |
| static int |
| smb_proc_readdir_long(struct file *filp, void *dirent, filldir_t filldir, |
| struct smb_cache_control *ctl) |
| { |
| struct dentry *dir = filp->f_dentry; |
| struct smb_sb_info *server = server_from_dentry(dir); |
| struct qstr qname; |
| struct smb_fattr fattr; |
| |
| unsigned char *p, *lastname; |
| char *mask, *param = server->temp_buf; |
| __u16 command; |
| int first, entries_seen; |
| |
| /* Both NT and OS/2 accept info level 1 (but see note below). */ |
| int info_level = 260; |
| const int max_matches = 512; |
| |
| unsigned char *resp_data = NULL; |
| unsigned char *resp_param = NULL; |
| int resp_data_len = 0; |
| int resp_param_len = 0; |
| int ff_searchcount = 0; |
| int ff_eos = 0; |
| int ff_lastname = 0; |
| int ff_dir_handle = 0; |
| int loop_count = 0; |
| int mask_len, i, result; |
| static struct qstr star = { "*", 1, 0 }; |
| |
| /* |
| * use info level 1 for older servers that don't do 260 |
| */ |
| if (server->opt.protocol < SMB_PROTOCOL_NT1) |
| info_level = 1; |
| |
| smb_lock_server(server); |
| |
| /* |
| * Encode the initial path |
| */ |
| mask = param + 12; |
| |
| mask_len = smb_encode_path(server, mask, dir, &star); |
| if (mask_len < 0) { |
| result = mask_len; |
| goto unlock_return; |
| } |
| mask_len--; /* mask_len is strlen, not #bytes */ |
| first = 1; |
| VERBOSE("starting mask_len=%d, mask=%s\n", mask_len, mask); |
| |
| result = 0; |
| entries_seen = 2; |
| ff_eos = 0; |
| |
| while (ff_eos == 0) { |
| loop_count += 1; |
| if (loop_count > 10) { |
| printk(KERN_WARNING "smb_proc_readdir_long: " |
| "Looping in FIND_NEXT??\n"); |
| result = -EIO; |
| break; |
| } |
| |
| if (first != 0) { |
| command = TRANSACT2_FINDFIRST; |
| WSET(param, 0, aSYSTEM | aHIDDEN | aDIR); |
| WSET(param, 2, max_matches); /* max count */ |
| WSET(param, 4, SMB_CLOSE_IF_END); |
| WSET(param, 6, info_level); |
| DSET(param, 8, 0); |
| } else { |
| command = TRANSACT2_FINDNEXT; |
| |
| VERBOSE("handle=0x%X, lastname=%d, mask=%s\n", |
| ff_dir_handle, ff_lastname, mask); |
| |
| WSET(param, 0, ff_dir_handle); /* search handle */ |
| WSET(param, 2, max_matches); /* max count */ |
| WSET(param, 4, info_level); |
| DSET(param, 6, 0); |
| WSET(param, 10, SMB_CONTINUE_BIT|SMB_CLOSE_IF_END); |
| } |
| |
| result = smb_trans2_request(server, command, |
| 0, NULL, 12 + mask_len + 1, param, |
| &resp_data_len, &resp_data, |
| &resp_param_len, &resp_param); |
| |
| if (result < 0) { |
| if (smb_retry(server)) { |
| PARANOIA("error=%d, retrying\n", result); |
| ctl->idx = -1; /* retry */ |
| result = 0; |
| goto unlock_return; |
| } |
| PARANOIA("error=%d, breaking\n", result); |
| break; |
| } |
| |
| if (server->rcls == ERRSRV && server->err == ERRerror) { |
| /* a damn Win95 bug - sometimes it clags if you |
| ask it too fast */ |
| current->state = TASK_INTERRUPTIBLE; |
| schedule_timeout(HZ/5); |
| continue; |
| } |
| |
| if (server->rcls != 0) { |
| result = smb_errno(server); |
| PARANOIA("name=%s, result=%d, rcls=%d, err=%d\n", |
| mask, result, server->rcls, server->err); |
| break; |
| } |
| |
| /* parse out some important return info */ |
| if (first != 0) { |
| ff_dir_handle = WVAL(resp_param, 0); |
| ff_searchcount = WVAL(resp_param, 2); |
| ff_eos = WVAL(resp_param, 4); |
| ff_lastname = WVAL(resp_param, 8); |
| } else { |
| ff_searchcount = WVAL(resp_param, 0); |
| ff_eos = WVAL(resp_param, 2); |
| ff_lastname = WVAL(resp_param, 6); |
| } |
| |
| if (ff_searchcount == 0) |
| break; |
| |
| /* |
| * We might need the lastname for continuations. |
| * |
| * Note that some servers (win95?) point to the filename and |
| * others (NT4, Samba using NT1) to the dir entry. We assume |
| * here that those who do not point to a filename do not need |
| * this info to continue the listing. |
| * |
| * OS/2 needs this and talks infolevel 1 |
| * NetApps want lastname with infolevel 260 |
| * |
| * Both are happy if we return the data they point to. So we do. |
| */ |
| mask_len = 0; |
| if (ff_lastname > 0 && ff_lastname < resp_data_len) { |
| lastname = resp_data + ff_lastname; |
| |
| switch (info_level) { |
| case 260: |
| mask_len = resp_data_len - ff_lastname; |
| break; |
| case 1: |
| /* lastname points to a length byte */ |
| mask_len = *lastname++; |
| if (ff_lastname + 1 + mask_len > resp_data_len) |
| mask_len = resp_data_len - ff_lastname - 1; |
| break; |
| } |
| |
| /* |
| * Update the mask string for the next message. |
| */ |
| if (mask_len < 0) |
| mask_len = 0; |
| if (mask_len > 255) |
| mask_len = 255; |
| if (mask_len) |
| strncpy(mask, lastname, mask_len); |
| } |
| mask_len = strnlen(mask, mask_len); |
| VERBOSE("new mask, len=%d@%d of %d, mask=%.*s\n", |
| mask_len, ff_lastname, resp_data_len, mask_len, mask); |
| |
| /* Now we are ready to parse smb directory entries. */ |
| |
| /* point to the data bytes */ |
| p = resp_data; |
| for (i = 0; i < ff_searchcount; i++) { |
| /* make sure we stay within the buffer */ |
| if (p >= resp_data + resp_data_len) { |
| printk(KERN_ERR "smb_proc_readdir_long: " |
| "dirent pointer outside buffer! " |
| "%p %d@%p %d@%p\n", |
| p, resp_data_len, resp_data, |
| server->packet_size, server->packet); |
| result = -EIO; /* always a comm. error? */ |
| goto unlock_return; |
| } |
| |
| p = smb_decode_long_dirent(server, p, info_level, |
| &qname, &fattr); |
| |
| /* ignore . and .. from the server */ |
| if (entries_seen == 2 && qname.name[0] == '.') { |
| if (qname.len == 1) |
| continue; |
| if (qname.name[1] == '.' && qname.len == 2) |
| continue; |
| } |
| |
| if (!smb_fill_cache(filp, dirent, filldir, ctl, |
| &qname, &fattr)) |
| ; /* stop reading? */ |
| entries_seen++; |
| } |
| |
| VERBOSE("received %d entries, eos=%d\n", ff_searchcount,ff_eos); |
| |
| first = 0; |
| loop_count = 0; |
| } |
| |
| unlock_return: |
| smb_unlock_server(server); |
| return result; |
| } |
| |
| int |
| smb_proc_readdir(struct file *filp, void *dirent, filldir_t filldir, |
| struct smb_cache_control *ctl) |
| { |
| struct smb_sb_info *server = server_from_dentry(filp->f_dentry); |
| |
| if (server->opt.protocol >= SMB_PROTOCOL_LANMAN2) |
| return smb_proc_readdir_long(filp, dirent, filldir, ctl); |
| else |
| return smb_proc_readdir_short(filp, dirent, filldir, ctl); |
| } |
| |
| /* |
| * This version uses the trans2 TRANSACT2_FINDFIRST message |
| * to get the attribute data. |
| * Note: called with the server locked. |
| * |
| * Bugs Noted: |
| */ |
| static int |
| smb_proc_getattr_ff(struct smb_sb_info *server, struct dentry *dentry, |
| struct smb_fattr *fattr) |
| { |
| char *param = server->temp_buf, *mask = param + 12; |
| __u16 date, time; |
| unsigned char *resp_data = NULL; |
| unsigned char *resp_param = NULL; |
| int resp_data_len = 0; |
| int resp_param_len = 0; |
| int mask_len, result; |
| |
| retry: |
| mask_len = smb_encode_path(server, mask, dentry, NULL); |
| if (mask_len < 0) { |
| result = mask_len; |
| goto out; |
| } |
| VERBOSE("name=%s, len=%d\n", mask, mask_len); |
| WSET(param, 0, aSYSTEM | aHIDDEN | aDIR); |
| WSET(param, 2, 1); /* max count */ |
| WSET(param, 4, 1); /* close after this call */ |
| WSET(param, 6, 1); /* info_level */ |
| DSET(param, 8, 0); |
| |
| result = smb_trans2_request(server, TRANSACT2_FINDFIRST, |
| 0, NULL, 12 + mask_len, param, |
| &resp_data_len, &resp_data, |
| &resp_param_len, &resp_param); |
| if (result < 0) |
| { |
| if (smb_retry(server)) |
| goto retry; |
| goto out; |
| } |
| if (server->rcls != 0) |
| { |
| result = smb_errno(server); |
| #ifdef SMBFS_PARANOIA |
| if (result != -ENOENT) |
| PARANOIA("error for %s, rcls=%d, err=%d\n", |
| mask, server->rcls, server->err); |
| #endif |
| goto out; |
| } |
| /* Make sure we got enough data ... */ |
| result = -EINVAL; |
| if (resp_data_len < 22 || WVAL(resp_param, 2) != 1) |
| { |
| PARANOIA("bad result for %s, len=%d, count=%d\n", |
| mask, resp_data_len, WVAL(resp_param, 2)); |
| goto out; |
| } |
| |
| /* |
| * Decode the response into the fattr ... |
| */ |
| date = WVAL(resp_data, 0); |
| time = WVAL(resp_data, 2); |
| fattr->f_ctime = date_dos2unix(server, date, time); |
| |
| date = WVAL(resp_data, 4); |
| time = WVAL(resp_data, 6); |
| fattr->f_atime = date_dos2unix(server, date, time); |
| |
| date = WVAL(resp_data, 8); |
| time = WVAL(resp_data, 10); |
| fattr->f_mtime = date_dos2unix(server, date, time); |
| VERBOSE("name=%s, date=%x, time=%x, mtime=%ld\n", |
| mask, date, time, fattr->f_mtime); |
| fattr->f_size = DVAL(resp_data, 12); |
| /* ULONG allocation size */ |
| fattr->attr = WVAL(resp_data, 20); |
| result = 0; |
| |
| out: |
| return result; |
| } |
| |
| /* |
| * Note: called with the server locked. |
| */ |
| static int |
| smb_proc_getattr_core(struct smb_sb_info *server, struct dentry *dir, |
| struct smb_fattr *fattr) |
| { |
| int result; |
| char *p; |
| |
| retry: |
| p = smb_setup_header(server, SMBgetatr, 0, 0); |
| *p++ = 4; |
| result = smb_encode_path(server, p, dir, NULL); |
| if (result < 0) |
| goto out; |
| p += result; |
| smb_setup_bcc(server, p); |
| |
| if ((result = smb_request_ok(server, SMBgetatr, 10, 0)) < 0) |
| { |
| if (smb_retry(server)) |
| goto retry; |
| goto out; |
| } |
| fattr->attr = WVAL(server->packet, smb_vwv0); |
| fattr->f_mtime = local2utc(server, DVAL(server->packet, smb_vwv1)); |
| fattr->f_size = DVAL(server->packet, smb_vwv3); |
| fattr->f_ctime = fattr->f_mtime; |
| fattr->f_atime = fattr->f_mtime; |
| #ifdef SMBFS_DEBUG_TIMESTAMP |
| printk("getattr_core: %s/%s, mtime=%ld\n", |
| DENTRY_PATH(dir), fattr->f_mtime); |
| #endif |
| result = 0; |
| |
| out: |
| return result; |
| } |
| |
| /* |
| * Note: called with the server locked. |
| * |
| * Bugs Noted: |
| * (1) Win 95 swaps the date and time fields in the standard info level. |
| */ |
| static int |
| smb_proc_getattr_trans2(struct smb_sb_info *server, struct dentry *dir, |
| struct smb_fattr *attr) |
| { |
| char *p, *param = server->temp_buf; |
| __u16 date, time; |
| int off_date = 0, off_time = 2; |
| unsigned char *resp_data = NULL; |
| unsigned char *resp_param = NULL; |
| int resp_data_len = 0; |
| int resp_param_len = 0; |
| int result; |
| |
| retry: |
| WSET(param, 0, 1); /* Info level SMB_INFO_STANDARD */ |
| DSET(param, 2, 0); |
| result = smb_encode_path(server, param + 6, dir, NULL); |
| if (result < 0) |
| goto out; |
| p = param + 6 + result; |
| |
| result = smb_trans2_request(server, TRANSACT2_QPATHINFO, |
| 0, NULL, p - param, param, |
| &resp_data_len, &resp_data, |
| &resp_param_len, &resp_param); |
| if (result < 0) |
| { |
| if (smb_retry(server)) |
| goto retry; |
| goto out; |
| } |
| if (server->rcls != 0) |
| { |
| VERBOSE("for %s: result=%d, rcls=%d, err=%d\n", |
| ¶m[6], result, server->rcls, server->err); |
| result = smb_errno(server); |
| goto out; |
| } |
| result = -ENOENT; |
| if (resp_data_len < 22) |
| { |
| PARANOIA("not enough data for %s, len=%d\n", |
| ¶m[6], resp_data_len); |
| goto out; |
| } |
| |
| /* |
| * Kludge alert: Win 95 swaps the date and time field, |
| * contrary to the CIFS docs and Win NT practice. |
| */ |
| if (server->mnt->flags & SMB_MOUNT_WIN95) { |
| off_date = 2; |
| off_time = 0; |
| } |
| date = WVAL(resp_data, off_date); |
| time = WVAL(resp_data, off_time); |
| attr->f_ctime = date_dos2unix(server, date, time); |
| |
| date = WVAL(resp_data, 4 + off_date); |
| time = WVAL(resp_data, 4 + off_time); |
| attr->f_atime = date_dos2unix(server, date, time); |
| |
| date = WVAL(resp_data, 8 + off_date); |
| time = WVAL(resp_data, 8 + off_time); |
| attr->f_mtime = date_dos2unix(server, date, time); |
| #ifdef SMBFS_DEBUG_TIMESTAMP |
| printk(KERN_DEBUG "getattr_trans2: %s/%s, date=%x, time=%x, mtime=%ld\n", |
| DENTRY_PATH(dir), date, time, attr->f_mtime); |
| #endif |
| attr->f_size = DVAL(resp_data, 12); |
| attr->attr = WVAL(resp_data, 20); |
| result = 0; |
| |
| out: |
| return result; |
| } |
| |
| /* |
| * Note: called with the server locked |
| */ |
| static int |
| smb_proc_do_getattr(struct smb_sb_info *server, struct dentry *dir, |
| struct smb_fattr *fattr) |
| { |
| int result; |
| struct inode *inode = dir->d_inode; |
| |
| smb_init_dirent(server, fattr); |
| |
| /* |
| * Select whether to use core or trans2 getattr. |
| * Win 95 appears to break with the trans2 getattr. |
| */ |
| if (server->opt.protocol < SMB_PROTOCOL_LANMAN2 || |
| (server->mnt->flags & (SMB_MOUNT_OLDATTR|SMB_MOUNT_WIN95)) ) { |
| result = smb_proc_getattr_core(server, dir, fattr); |
| } else { |
| if (server->mnt->flags & SMB_MOUNT_DIRATTR) |
| result = smb_proc_getattr_ff(server, dir, fattr); |
| else |
| result = smb_proc_getattr_trans2(server, dir, fattr); |
| } |
| |
| /* |
| * None of the getattr versions here can make win9x return the right |
| * filesize if there are changes made to an open file. |
| * A seek-to-end does return the right size, but we only need to do |
| * that on files we have written. |
| */ |
| if (server->mnt->flags & SMB_MOUNT_WIN95 && |
| inode && |
| SMB_I(inode)->flags & SMB_F_LOCALWRITE && |
| smb_is_open(inode)) |
| { |
| __u16 fileid = SMB_I(inode)->fileid; |
| fattr->f_size = smb_proc_seek(server, fileid, 2, 0); |
| } |
| |
| smb_finish_dirent(server, fattr); |
| return result; |
| } |
| |
| int |
| smb_proc_getattr(struct dentry *dir, struct smb_fattr *fattr) |
| { |
| struct smb_sb_info *server = server_from_dentry(dir); |
| int result; |
| |
| smb_lock_server(server); |
| result = smb_proc_do_getattr(server, dir, fattr); |
| smb_unlock_server(server); |
| return result; |
| } |
| |
| |
| /* |
| * Called with the server locked. Because of bugs in the |
| * core protocol, we use this only to set attributes. See |
| * smb_proc_settime() below for timestamp handling. |
| * |
| * Bugs Noted: |
| * (1) If mtime is non-zero, both Win 3.1 and Win 95 fail |
| * with an undocumented error (ERRDOS code 50). Setting |
| * mtime to 0 allows the attributes to be set. |
| * (2) The extra parameters following the name string aren't |
| * in the CIFS docs, but seem to be necessary for operation. |
| */ |
| static int |
| smb_proc_setattr_core(struct smb_sb_info *server, struct dentry *dentry, |
| __u16 attr) |
| { |
| char *p; |
| int result; |
| |
| retry: |
| p = smb_setup_header(server, SMBsetatr, 8, 0); |
| WSET(server->packet, smb_vwv0, attr); |
| DSET(server->packet, smb_vwv1, 0); /* mtime */ |
| WSET(server->packet, smb_vwv3, 0); /* reserved values */ |
| WSET(server->packet, smb_vwv4, 0); |
| WSET(server->packet, smb_vwv5, 0); |
| WSET(server->packet, smb_vwv6, 0); |
| WSET(server->packet, smb_vwv7, 0); |
| *p++ = 4; |
| result = smb_encode_path(server, p, dentry, NULL); |
| if (result < 0) |
| goto out; |
| p += result; |
| *p++ = 4; |
| *p++ = 0; |
| smb_setup_bcc(server, p); |
| |
| result = smb_request_ok(server, SMBsetatr, 0, 0); |
| if (result < 0) { |
| if (smb_retry(server)) |
| goto retry; |
| goto out; |
| } |
| result = 0; |
| out: |
| return result; |
| } |
| |
| /* |
| * Because of bugs in the trans2 setattr messages, we must set |
| * attributes and timestamps separately. The core SMBsetatr |
| * message seems to be the only reliable way to set attributes. |
| */ |
| int |
| smb_proc_setattr(struct dentry *dir, struct smb_fattr *fattr) |
| { |
| struct smb_sb_info *server = server_from_dentry(dir); |
| int result; |
| |
| VERBOSE("setting %s/%s, open=%d\n", |
| DENTRY_PATH(dir), smb_is_open(dir->d_inode)); |
| smb_lock_server(server); |
| result = smb_proc_setattr_core(server, dir, fattr->attr); |
| smb_unlock_server(server); |
| return result; |
| } |
| |
| /* |
| * Called with the server locked. Sets the timestamps for an |
| * file open with write permissions. |
| */ |
| static int |
| smb_proc_setattr_ext(struct smb_sb_info *server, |
| struct inode *inode, struct smb_fattr *fattr) |
| { |
| __u16 date, time; |
| int result; |
| |
| retry: |
| smb_setup_header(server, SMBsetattrE, 7, 0); |
| WSET(server->packet, smb_vwv0, SMB_I(inode)->fileid); |
| /* We don't change the creation time */ |
| WSET(server->packet, smb_vwv1, 0); |
| WSET(server->packet, smb_vwv2, 0); |
| date_unix2dos(server, fattr->f_atime, &date, &time); |
| WSET(server->packet, smb_vwv3, date); |
| WSET(server->packet, smb_vwv4, time); |
| date_unix2dos(server, fattr->f_mtime, &date, &time); |
| WSET(server->packet, smb_vwv5, date); |
| WSET(server->packet, smb_vwv6, time); |
| #ifdef SMBFS_DEBUG_TIMESTAMP |
| printk(KERN_DEBUG "smb_proc_setattr_ext: date=%d, time=%d, mtime=%ld\n", |
| date, time, fattr->f_mtime); |
| #endif |
| |
| result = smb_request_ok(server, SMBsetattrE, 0, 0); |
| if (result < 0) { |
| if (smb_retry(server)) |
| goto retry; |
| goto out; |
| } |
| result = 0; |
| out: |
| return result; |
| } |
| |
| /* |
| * Note: called with the server locked. |
| * |
| * Bugs Noted: |
| * (1) The TRANSACT2_SETPATHINFO message under Win NT 4.0 doesn't |
| * set the file's attribute flags. |
| */ |
| static int |
| smb_proc_setattr_trans2(struct smb_sb_info *server, |
| struct dentry *dir, struct smb_fattr *fattr) |
| { |
| __u16 date, time; |
| char *p, *param = server->temp_buf; |
| unsigned char *resp_data = NULL; |
| unsigned char *resp_param = NULL; |
| int resp_data_len = 0; |
| int resp_param_len = 0; |
| int result; |
| char data[26]; |
| |
| retry: |
| WSET(param, 0, 1); /* Info level SMB_INFO_STANDARD */ |
| DSET(param, 2, 0); |
| result = smb_encode_path(server, param + 6, dir, NULL); |
| if (result < 0) |
| goto out; |
| p = param + 6 + result; |
| |
| WSET(data, 0, 0); /* creation time */ |
| WSET(data, 2, 0); |
| date_unix2dos(server, fattr->f_atime, &date, &time); |
| WSET(data, 4, date); |
| WSET(data, 6, time); |
| date_unix2dos(server, fattr->f_mtime, &date, &time); |
| WSET(data, 8, date); |
| WSET(data, 10, time); |
| #ifdef SMBFS_DEBUG_TIMESTAMP |
| printk(KERN_DEBUG "setattr_trans2: %s/%s, date=%x, time=%x, mtime=%ld\n", |
| DENTRY_PATH(dir), date, time, fattr->f_mtime); |
| #endif |
| DSET(data, 12, 0); /* size */ |
| DSET(data, 16, 0); /* blksize */ |
| WSET(data, 20, 0); /* attr */ |
| DSET(data, 22, 0); /* ULONG EA size */ |
| |
| result = smb_trans2_request(server, TRANSACT2_SETPATHINFO, |
| 26, data, p - param, param, |
| &resp_data_len, &resp_data, |
| &resp_param_len, &resp_param); |
| if (result < 0) |
| { |
| if (smb_retry(server)) |
| goto retry; |
| goto out; |
| } |
| result = 0; |
| if (server->rcls != 0) |
| result = smb_errno(server); |
| |
| out: |
| return result; |
| } |
| |
| /* |
| * Set the modify and access timestamps for a file. |
| * |
| * Incredibly enough, in all of SMB there is no message to allow |
| * setting both attributes and timestamps at once. |
| * |
| * Bugs Noted: |
| * (1) Win 95 doesn't support the TRANSACT2_SETFILEINFO message |
| * with info level 1 (INFO_STANDARD). |
| * (2) Win 95 seems not to support setting directory timestamps. |
| * (3) Under the core protocol apparently the only way to set the |
| * timestamp is to open and close the file. |
| */ |
| int |
| smb_proc_settime(struct dentry *dentry, struct smb_fattr *fattr) |
| { |
| struct smb_sb_info *server = server_from_dentry(dentry); |
| struct inode *inode = dentry->d_inode; |
| int result; |
| |
| VERBOSE("setting %s/%s, open=%d\n", |
| DENTRY_PATH(dentry), smb_is_open(inode)); |
| |
| smb_lock_server(server); |
| /* setting the time on a Win95 server fails (tridge) */ |
| if (server->opt.protocol >= SMB_PROTOCOL_LANMAN2 && |
| !(server->mnt->flags & SMB_MOUNT_WIN95)) { |
| if (smb_is_open(inode) && SMB_I(inode)->access != SMB_O_RDONLY) |
| result = smb_proc_setattr_ext(server, inode, fattr); |
| else |
| result = smb_proc_setattr_trans2(server, dentry, fattr); |
| } else { |
| /* |
| * Fail silently on directories ... timestamp can't be set? |
| */ |
| result = 0; |
| if (S_ISREG(inode->i_mode)) { |
| /* |
| * Set the mtime by opening and closing the file. |
| * Note that the file is opened read-only, but this |
| * still allows us to set the date (tridge) |
| */ |
| result = -EACCES; |
| if (!smb_is_open(inode)) |
| smb_proc_open(server, dentry, SMB_O_RDONLY); |
| if (smb_is_open(inode)) { |
| inode->i_mtime = fattr->f_mtime; |
| result = smb_proc_close_inode(server, inode); |
| } |
| } |
| } |
| |
| smb_unlock_server(server); |
| return result; |
| } |
| |
| int |
| smb_proc_dskattr(struct super_block *sb, struct statfs *attr) |
| { |
| struct smb_sb_info *server = &(sb->u.smbfs_sb); |
| int result; |
| char *p; |
| long unit; |
| |
| smb_lock_server(server); |
| |
| retry: |
| smb_setup_header(server, SMBdskattr, 0, 0); |
| |
| if ((result = smb_request_ok(server, SMBdskattr, 5, 0)) < 0) { |
| if (smb_retry(server)) |
| goto retry; |
| goto out; |
| } |
| p = SMB_VWV(server->packet); |
| unit = (WVAL(p, 2) * WVAL(p, 4)) >> SMB_ST_BLKSHIFT; |
| attr->f_blocks = WVAL(p, 0) * unit; |
| attr->f_bsize = SMB_ST_BLKSIZE; |
| attr->f_bavail = attr->f_bfree = WVAL(p, 6) * unit; |
| result = 0; |
| |
| out: |
| smb_unlock_server(server); |
| return result; |
| } |