diff options
Diffstat (limited to 'fs/cifs')
| -rw-r--r-- | fs/cifs/CHANGES | 3 | ||||
| -rw-r--r-- | fs/cifs/asn1.c | 2 | ||||
| -rw-r--r-- | fs/cifs/cifs_dfs_ref.c | 2 | ||||
| -rw-r--r-- | fs/cifs/cifsfs.c | 3 | ||||
| -rw-r--r-- | fs/cifs/cifsfs.h | 3 | ||||
| -rw-r--r-- | fs/cifs/cifsglob.h | 3 | ||||
| -rw-r--r-- | fs/cifs/cifspdu.h | 6 | ||||
| -rw-r--r-- | fs/cifs/cifsproto.h | 13 | ||||
| -rw-r--r-- | fs/cifs/cifssmb.c | 497 | ||||
| -rw-r--r-- | fs/cifs/connect.c | 8 | ||||
| -rw-r--r-- | fs/cifs/dir.c | 2 | ||||
| -rw-r--r-- | fs/cifs/file.c | 11 | ||||
| -rw-r--r-- | fs/cifs/inode.c | 300 | ||||
| -rw-r--r-- | fs/cifs/misc.c | 2 | ||||
| -rw-r--r-- | fs/cifs/xattr.c | 8 |
15 files changed, 483 insertions, 380 deletions
diff --git a/fs/cifs/CHANGES b/fs/cifs/CHANGES index 49503d2edc7e..bc0025cdd1c9 100644 --- a/fs/cifs/CHANGES +++ b/fs/cifs/CHANGES | |||
| @@ -1,6 +1,7 @@ | |||
| 1 | Version 1.62 | 1 | Version 1.62 |
| 2 | ------------ | 2 | ------------ |
| 3 | Add sockopt=TCP_NODELAY mount option. | 3 | Add sockopt=TCP_NODELAY mount option. EA (xattr) routines hardened |
| 4 | to more strictly handle corrupt frames. | ||
| 4 | 5 | ||
| 5 | Version 1.61 | 6 | Version 1.61 |
| 6 | ------------ | 7 | ------------ |
diff --git a/fs/cifs/asn1.c b/fs/cifs/asn1.c index 20692fbfdb24..a20bea598933 100644 --- a/fs/cifs/asn1.c +++ b/fs/cifs/asn1.c | |||
| @@ -136,7 +136,7 @@ asn1_enum_decode(struct asn1_ctx *ctx, __le32 *val) | |||
| 136 | return 0; | 136 | return 0; |
| 137 | } | 137 | } |
| 138 | 138 | ||
| 139 | ch = *(ctx->pointer)++; /* ch has 0xa, ptr points to lenght octet */ | 139 | ch = *(ctx->pointer)++; /* ch has 0xa, ptr points to length octet */ |
| 140 | if ((ch) == ASN1_ENUM) /* if ch value is ENUM, 0xa */ | 140 | if ((ch) == ASN1_ENUM) /* if ch value is ENUM, 0xa */ |
| 141 | *val = *(++(ctx->pointer)); /* value has enum value */ | 141 | *val = *(++(ctx->pointer)); /* value has enum value */ |
| 142 | else | 142 | else |
diff --git a/fs/cifs/cifs_dfs_ref.c b/fs/cifs/cifs_dfs_ref.c index b44ce0a0711c..b1d61d0bdfc7 100644 --- a/fs/cifs/cifs_dfs_ref.c +++ b/fs/cifs/cifs_dfs_ref.c | |||
| @@ -54,7 +54,7 @@ void cifs_dfs_release_automount_timer(void) | |||
| 54 | * Extracts sharename form full UNC. | 54 | * Extracts sharename form full UNC. |
| 55 | * i.e. strips from UNC trailing path that is not part of share | 55 | * i.e. strips from UNC trailing path that is not part of share |
| 56 | * name and fixup missing '\' in the begining of DFS node refferal | 56 | * name and fixup missing '\' in the begining of DFS node refferal |
| 57 | * if neccessary. | 57 | * if necessary. |
| 58 | * Returns pointer to share name on success or ERR_PTR on error. | 58 | * Returns pointer to share name on success or ERR_PTR on error. |
| 59 | * Caller is responsible for freeing returned string. | 59 | * Caller is responsible for freeing returned string. |
| 60 | */ | 60 | */ |
diff --git a/fs/cifs/cifsfs.c b/fs/cifs/cifsfs.c index 8c6a03627176..5183bc2a1916 100644 --- a/fs/cifs/cifsfs.c +++ b/fs/cifs/cifsfs.c | |||
| @@ -312,6 +312,7 @@ cifs_alloc_inode(struct super_block *sb) | |||
| 312 | cifs_inode->clientCanCacheRead = false; | 312 | cifs_inode->clientCanCacheRead = false; |
| 313 | cifs_inode->clientCanCacheAll = false; | 313 | cifs_inode->clientCanCacheAll = false; |
| 314 | cifs_inode->delete_pending = false; | 314 | cifs_inode->delete_pending = false; |
| 315 | cifs_inode->invalid_mapping = false; | ||
| 315 | cifs_inode->vfs_inode.i_blkbits = 14; /* 2**14 = CIFS_MAX_MSGSIZE */ | 316 | cifs_inode->vfs_inode.i_blkbits = 14; /* 2**14 = CIFS_MAX_MSGSIZE */ |
| 316 | cifs_inode->server_eof = 0; | 317 | cifs_inode->server_eof = 0; |
| 317 | 318 | ||
| @@ -638,7 +639,7 @@ static loff_t cifs_llseek(struct file *file, loff_t offset, int origin) | |||
| 638 | setting the revalidate time to zero */ | 639 | setting the revalidate time to zero */ |
| 639 | CIFS_I(file->f_path.dentry->d_inode)->time = 0; | 640 | CIFS_I(file->f_path.dentry->d_inode)->time = 0; |
| 640 | 641 | ||
| 641 | retval = cifs_revalidate(file->f_path.dentry); | 642 | retval = cifs_revalidate_file(file); |
| 642 | if (retval < 0) | 643 | if (retval < 0) |
| 643 | return (loff_t)retval; | 644 | return (loff_t)retval; |
| 644 | } | 645 | } |
diff --git a/fs/cifs/cifsfs.h b/fs/cifs/cifsfs.h index 78c1b86d55f6..7aa57ecdc437 100644 --- a/fs/cifs/cifsfs.h +++ b/fs/cifs/cifsfs.h | |||
| @@ -61,7 +61,8 @@ extern int cifs_mkdir(struct inode *, struct dentry *, int); | |||
| 61 | extern int cifs_rmdir(struct inode *, struct dentry *); | 61 | extern int cifs_rmdir(struct inode *, struct dentry *); |
| 62 | extern int cifs_rename(struct inode *, struct dentry *, struct inode *, | 62 | extern int cifs_rename(struct inode *, struct dentry *, struct inode *, |
| 63 | struct dentry *); | 63 | struct dentry *); |
| 64 | extern int cifs_revalidate(struct dentry *); | 64 | extern int cifs_revalidate_file(struct file *filp); |
| 65 | extern int cifs_revalidate_dentry(struct dentry *); | ||
| 65 | extern int cifs_getattr(struct vfsmount *, struct dentry *, struct kstat *); | 66 | extern int cifs_getattr(struct vfsmount *, struct dentry *, struct kstat *); |
| 66 | extern int cifs_setattr(struct dentry *, struct iattr *); | 67 | extern int cifs_setattr(struct dentry *, struct iattr *); |
| 67 | 68 | ||
diff --git a/fs/cifs/cifsglob.h b/fs/cifs/cifsglob.h index ed751bb657db..63c89d1d70b5 100644 --- a/fs/cifs/cifsglob.h +++ b/fs/cifs/cifsglob.h | |||
| @@ -205,7 +205,7 @@ struct cifsUidInfo { | |||
| 205 | struct cifsSesInfo { | 205 | struct cifsSesInfo { |
| 206 | struct list_head smb_ses_list; | 206 | struct list_head smb_ses_list; |
| 207 | struct list_head tcon_list; | 207 | struct list_head tcon_list; |
| 208 | struct semaphore sesSem; | 208 | struct mutex session_mutex; |
| 209 | #if 0 | 209 | #if 0 |
| 210 | struct cifsUidInfo *uidInfo; /* pointer to user info */ | 210 | struct cifsUidInfo *uidInfo; /* pointer to user info */ |
| 211 | #endif | 211 | #endif |
| @@ -389,6 +389,7 @@ struct cifsInodeInfo { | |||
| 389 | bool clientCanCacheRead:1; /* read oplock */ | 389 | bool clientCanCacheRead:1; /* read oplock */ |
| 390 | bool clientCanCacheAll:1; /* read and writebehind oplock */ | 390 | bool clientCanCacheAll:1; /* read and writebehind oplock */ |
| 391 | bool delete_pending:1; /* DELETE_ON_CLOSE is set */ | 391 | bool delete_pending:1; /* DELETE_ON_CLOSE is set */ |
| 392 | bool invalid_mapping:1; /* pagecache is invalid */ | ||
| 392 | u64 server_eof; /* current file size on server */ | 393 | u64 server_eof; /* current file size on server */ |
| 393 | u64 uniqueid; /* server inode number */ | 394 | u64 uniqueid; /* server inode number */ |
| 394 | struct inode vfs_inode; | 395 | struct inode vfs_inode; |
diff --git a/fs/cifs/cifspdu.h b/fs/cifs/cifspdu.h index 3877737f96a6..14d036d8db11 100644 --- a/fs/cifs/cifspdu.h +++ b/fs/cifs/cifspdu.h | |||
| @@ -415,10 +415,10 @@ struct smb_hdr { | |||
| 415 | __u8 WordCount; | 415 | __u8 WordCount; |
| 416 | } __attribute__((packed)); | 416 | } __attribute__((packed)); |
| 417 | /* given a pointer to an smb_hdr retrieve the value of byte count */ | 417 | /* given a pointer to an smb_hdr retrieve the value of byte count */ |
| 418 | #define BCC(smb_var) (*(__u16 *)((char *)smb_var + sizeof(struct smb_hdr) + (2 * smb_var->WordCount))) | 418 | #define BCC(smb_var) (*(__u16 *)((char *)(smb_var) + sizeof(struct smb_hdr) + (2 * (smb_var)->WordCount))) |
| 419 | #define BCC_LE(smb_var) (*(__le16 *)((char *)smb_var + sizeof(struct smb_hdr) + (2 * smb_var->WordCount))) | 419 | #define BCC_LE(smb_var) (*(__le16 *)((char *)(smb_var) + sizeof(struct smb_hdr) + (2 * (smb_var)->WordCount))) |
| 420 | /* given a pointer to an smb_hdr retrieve the pointer to the byte area */ | 420 | /* given a pointer to an smb_hdr retrieve the pointer to the byte area */ |
| 421 | #define pByteArea(smb_var) ((unsigned char *)smb_var + sizeof(struct smb_hdr) + (2 * smb_var->WordCount) + 2) | 421 | #define pByteArea(smb_var) ((unsigned char *)(smb_var) + sizeof(struct smb_hdr) + (2 * (smb_var)->WordCount) + 2) |
| 422 | 422 | ||
| 423 | /* | 423 | /* |
| 424 | * Computer Name Length (since Netbios name was length 16 with last byte 0x20) | 424 | * Computer Name Length (since Netbios name was length 16 with last byte 0x20) |
diff --git a/fs/cifs/cifsproto.h b/fs/cifs/cifsproto.h index 5646727e33f5..39e47f46dea5 100644 --- a/fs/cifs/cifsproto.h +++ b/fs/cifs/cifsproto.h | |||
| @@ -104,10 +104,12 @@ extern void cifs_fattr_to_inode(struct inode *inode, struct cifs_fattr *fattr); | |||
| 104 | extern struct inode *cifs_iget(struct super_block *sb, | 104 | extern struct inode *cifs_iget(struct super_block *sb, |
| 105 | struct cifs_fattr *fattr); | 105 | struct cifs_fattr *fattr); |
| 106 | 106 | ||
| 107 | extern int cifs_get_file_info(struct file *filp); | ||
| 107 | extern int cifs_get_inode_info(struct inode **pinode, | 108 | extern int cifs_get_inode_info(struct inode **pinode, |
| 108 | const unsigned char *search_path, | 109 | const unsigned char *search_path, |
| 109 | FILE_ALL_INFO *pfile_info, | 110 | FILE_ALL_INFO *pfile_info, |
| 110 | struct super_block *sb, int xid, const __u16 *pfid); | 111 | struct super_block *sb, int xid, const __u16 *pfid); |
| 112 | extern int cifs_get_file_info_unix(struct file *filp); | ||
| 111 | extern int cifs_get_inode_info_unix(struct inode **pinode, | 113 | extern int cifs_get_inode_info_unix(struct inode **pinode, |
| 112 | const unsigned char *search_path, | 114 | const unsigned char *search_path, |
| 113 | struct super_block *sb, int xid); | 115 | struct super_block *sb, int xid); |
| @@ -142,6 +144,8 @@ extern int CIFSFindNext(const int xid, struct cifsTconInfo *tcon, | |||
| 142 | extern int CIFSFindClose(const int, struct cifsTconInfo *tcon, | 144 | extern int CIFSFindClose(const int, struct cifsTconInfo *tcon, |
| 143 | const __u16 search_handle); | 145 | const __u16 search_handle); |
| 144 | 146 | ||
| 147 | extern int CIFSSMBQFileInfo(const int xid, struct cifsTconInfo *tcon, | ||
| 148 | u16 netfid, FILE_ALL_INFO *pFindData); | ||
| 145 | extern int CIFSSMBQPathInfo(const int xid, struct cifsTconInfo *tcon, | 149 | extern int CIFSSMBQPathInfo(const int xid, struct cifsTconInfo *tcon, |
| 146 | const unsigned char *searchName, | 150 | const unsigned char *searchName, |
| 147 | FILE_ALL_INFO *findData, | 151 | FILE_ALL_INFO *findData, |
| @@ -152,6 +156,8 @@ extern int SMBQueryInformation(const int xid, struct cifsTconInfo *tcon, | |||
| 152 | FILE_ALL_INFO *findData, | 156 | FILE_ALL_INFO *findData, |
| 153 | const struct nls_table *nls_codepage, int remap); | 157 | const struct nls_table *nls_codepage, int remap); |
| 154 | 158 | ||
| 159 | extern int CIFSSMBUnixQFileInfo(const int xid, struct cifsTconInfo *tcon, | ||
| 160 | u16 netfid, FILE_UNIX_BASIC_INFO *pFindData); | ||
| 155 | extern int CIFSSMBUnixQPathInfo(const int xid, | 161 | extern int CIFSSMBUnixQPathInfo(const int xid, |
| 156 | struct cifsTconInfo *tcon, | 162 | struct cifsTconInfo *tcon, |
| 157 | const unsigned char *searchName, | 163 | const unsigned char *searchName, |
| @@ -363,13 +369,10 @@ extern int CIFSSMBNotify(const int xid, struct cifsTconInfo *tcon, | |||
| 363 | __u32 filter, struct file *file, int multishot, | 369 | __u32 filter, struct file *file, int multishot, |
| 364 | const struct nls_table *nls_codepage); | 370 | const struct nls_table *nls_codepage); |
| 365 | extern ssize_t CIFSSMBQAllEAs(const int xid, struct cifsTconInfo *tcon, | 371 | extern ssize_t CIFSSMBQAllEAs(const int xid, struct cifsTconInfo *tcon, |
| 366 | const unsigned char *searchName, char *EAData, | 372 | const unsigned char *searchName, |
| 373 | const unsigned char *ea_name, char *EAData, | ||
| 367 | size_t bufsize, const struct nls_table *nls_codepage, | 374 | size_t bufsize, const struct nls_table *nls_codepage, |
| 368 | int remap_special_chars); | 375 | int remap_special_chars); |
| 369 | extern ssize_t CIFSSMBQueryEA(const int xid, struct cifsTconInfo *tcon, | ||
| 370 | const unsigned char *searchName, const unsigned char *ea_name, | ||
| 371 | unsigned char *ea_value, size_t buf_size, | ||
| 372 | const struct nls_table *nls_codepage, int remap_special_chars); | ||
| 373 | extern int CIFSSMBSetEA(const int xid, struct cifsTconInfo *tcon, | 376 | extern int CIFSSMBSetEA(const int xid, struct cifsTconInfo *tcon, |
| 374 | const char *fileName, const char *ea_name, | 377 | const char *fileName, const char *ea_name, |
| 375 | const void *ea_value, const __u16 ea_value_len, | 378 | const void *ea_value, const __u16 ea_value_len, |
diff --git a/fs/cifs/cifssmb.c b/fs/cifs/cifssmb.c index 941441d3e386..7cc7f83e9314 100644 --- a/fs/cifs/cifssmb.c +++ b/fs/cifs/cifssmb.c | |||
| @@ -170,19 +170,19 @@ cifs_reconnect_tcon(struct cifsTconInfo *tcon, int smb_command) | |||
| 170 | * need to prevent multiple threads trying to simultaneously | 170 | * need to prevent multiple threads trying to simultaneously |
| 171 | * reconnect the same SMB session | 171 | * reconnect the same SMB session |
| 172 | */ | 172 | */ |
| 173 | down(&ses->sesSem); | 173 | mutex_lock(&ses->session_mutex); |
| 174 | if (ses->need_reconnect) | 174 | if (ses->need_reconnect) |
| 175 | rc = cifs_setup_session(0, ses, nls_codepage); | 175 | rc = cifs_setup_session(0, ses, nls_codepage); |
| 176 | 176 | ||
| 177 | /* do we need to reconnect tcon? */ | 177 | /* do we need to reconnect tcon? */ |
| 178 | if (rc || !tcon->need_reconnect) { | 178 | if (rc || !tcon->need_reconnect) { |
| 179 | up(&ses->sesSem); | 179 | mutex_unlock(&ses->session_mutex); |
| 180 | goto out; | 180 | goto out; |
| 181 | } | 181 | } |
| 182 | 182 | ||
| 183 | mark_open_files_invalid(tcon); | 183 | mark_open_files_invalid(tcon); |
| 184 | rc = CIFSTCon(0, ses, tcon->treeName, tcon, nls_codepage); | 184 | rc = CIFSTCon(0, ses, tcon->treeName, tcon, nls_codepage); |
| 185 | up(&ses->sesSem); | 185 | mutex_unlock(&ses->session_mutex); |
| 186 | cFYI(1, ("reconnect tcon rc = %d", rc)); | 186 | cFYI(1, ("reconnect tcon rc = %d", rc)); |
| 187 | 187 | ||
| 188 | if (rc) | 188 | if (rc) |
| @@ -500,7 +500,7 @@ CIFSSMBNegotiate(unsigned int xid, struct cifsSesInfo *ses) | |||
| 500 | } else if (pSMBr->hdr.WordCount == 13) { | 500 | } else if (pSMBr->hdr.WordCount == 13) { |
| 501 | cERROR(1, ("mount failed, cifs module not built " | 501 | cERROR(1, ("mount failed, cifs module not built " |
| 502 | "with CIFS_WEAK_PW_HASH support")); | 502 | "with CIFS_WEAK_PW_HASH support")); |
| 503 | rc = -EOPNOTSUPP; | 503 | rc = -EOPNOTSUPP; |
| 504 | #endif /* WEAK_PW_HASH */ | 504 | #endif /* WEAK_PW_HASH */ |
| 505 | goto neg_err_exit; | 505 | goto neg_err_exit; |
| 506 | } else if (pSMBr->hdr.WordCount != 17) { | 506 | } else if (pSMBr->hdr.WordCount != 17) { |
| @@ -700,13 +700,13 @@ CIFSSMBLogoff(const int xid, struct cifsSesInfo *ses) | |||
| 700 | if (!ses || !ses->server) | 700 | if (!ses || !ses->server) |
| 701 | return -EIO; | 701 | return -EIO; |
| 702 | 702 | ||
| 703 | down(&ses->sesSem); | 703 | mutex_lock(&ses->session_mutex); |
| 704 | if (ses->need_reconnect) | 704 | if (ses->need_reconnect) |
| 705 | goto session_already_dead; /* no need to send SMBlogoff if uid | 705 | goto session_already_dead; /* no need to send SMBlogoff if uid |
| 706 | already closed due to reconnect */ | 706 | already closed due to reconnect */ |
| 707 | rc = small_smb_init(SMB_COM_LOGOFF_ANDX, 2, NULL, (void **)&pSMB); | 707 | rc = small_smb_init(SMB_COM_LOGOFF_ANDX, 2, NULL, (void **)&pSMB); |
| 708 | if (rc) { | 708 | if (rc) { |
| 709 | up(&ses->sesSem); | 709 | mutex_unlock(&ses->session_mutex); |
| 710 | return rc; | 710 | return rc; |
| 711 | } | 711 | } |
| 712 | 712 | ||
| @@ -721,7 +721,7 @@ CIFSSMBLogoff(const int xid, struct cifsSesInfo *ses) | |||
| 721 | pSMB->AndXCommand = 0xFF; | 721 | pSMB->AndXCommand = 0xFF; |
| 722 | rc = SendReceiveNoRsp(xid, ses, (struct smb_hdr *) pSMB, 0); | 722 | rc = SendReceiveNoRsp(xid, ses, (struct smb_hdr *) pSMB, 0); |
| 723 | session_already_dead: | 723 | session_already_dead: |
| 724 | up(&ses->sesSem); | 724 | mutex_unlock(&ses->session_mutex); |
| 725 | 725 | ||
| 726 | /* if session dead then we do not need to do ulogoff, | 726 | /* if session dead then we do not need to do ulogoff, |
| 727 | since server closed smb session, no sense reporting | 727 | since server closed smb session, no sense reporting |
| @@ -3230,8 +3230,72 @@ QInfRetry: | |||
| 3230 | return rc; | 3230 | return rc; |
| 3231 | } | 3231 | } |
| 3232 | 3232 | ||
| 3233 | int | ||
| 3234 | CIFSSMBQFileInfo(const int xid, struct cifsTconInfo *tcon, | ||
| 3235 | u16 netfid, FILE_ALL_INFO *pFindData) | ||
| 3236 | { | ||
| 3237 | struct smb_t2_qfi_req *pSMB = NULL; | ||
| 3238 | struct smb_t2_qfi_rsp *pSMBr = NULL; | ||
| 3239 | int rc = 0; | ||
| 3240 | int bytes_returned; | ||
| 3241 | __u16 params, byte_count; | ||
| 3242 | |||
| 3243 | QFileInfoRetry: | ||
| 3244 | rc = smb_init(SMB_COM_TRANSACTION2, 15, tcon, (void **) &pSMB, | ||
| 3245 | (void **) &pSMBr); | ||
| 3246 | if (rc) | ||
| 3247 | return rc; | ||
| 3248 | |||
| 3249 | params = 2 /* level */ + 2 /* fid */; | ||
| 3250 | pSMB->t2.TotalDataCount = 0; | ||
| 3251 | pSMB->t2.MaxParameterCount = cpu_to_le16(4); | ||
| 3252 | /* BB find exact max data count below from sess structure BB */ | ||
| 3253 | pSMB->t2.MaxDataCount = cpu_to_le16(CIFSMaxBufSize); | ||
| 3254 | pSMB->t2.MaxSetupCount = 0; | ||
| 3255 | pSMB->t2.Reserved = 0; | ||
| 3256 | pSMB->t2.Flags = 0; | ||
| 3257 | pSMB->t2.Timeout = 0; | ||
| 3258 | pSMB->t2.Reserved2 = 0; | ||
| 3259 | pSMB->t2.ParameterOffset = cpu_to_le16(offsetof(struct smb_t2_qfi_req, | ||
| 3260 | Fid) - 4); | ||
| 3261 | pSMB->t2.DataCount = 0; | ||
| 3262 | pSMB->t2.DataOffset = 0; | ||
| 3263 | pSMB->t2.SetupCount = 1; | ||
| 3264 | pSMB->t2.Reserved3 = 0; | ||
| 3265 | pSMB->t2.SubCommand = cpu_to_le16(TRANS2_QUERY_FILE_INFORMATION); | ||
| 3266 | byte_count = params + 1 /* pad */ ; | ||
| 3267 | pSMB->t2.TotalParameterCount = cpu_to_le16(params); | ||
| 3268 | pSMB->t2.ParameterCount = pSMB->t2.TotalParameterCount; | ||
| 3269 | pSMB->InformationLevel = cpu_to_le16(SMB_QUERY_FILE_ALL_INFO); | ||
| 3270 | pSMB->Pad = 0; | ||
| 3271 | pSMB->Fid = netfid; | ||
| 3272 | pSMB->hdr.smb_buf_length += byte_count; | ||
| 3273 | |||
| 3274 | rc = SendReceive(xid, tcon->ses, (struct smb_hdr *) pSMB, | ||
| 3275 | (struct smb_hdr *) pSMBr, &bytes_returned, 0); | ||
| 3276 | if (rc) { | ||
| 3277 | cFYI(1, ("Send error in QPathInfo = %d", rc)); | ||
| 3278 | } else { /* decode response */ | ||
| 3279 | rc = validate_t2((struct smb_t2_rsp *)pSMBr); | ||
| 3233 | 3280 | ||
| 3281 | if (rc) /* BB add auto retry on EOPNOTSUPP? */ | ||
| 3282 | rc = -EIO; | ||
| 3283 | else if (pSMBr->ByteCount < 40) | ||
| 3284 | rc = -EIO; /* bad smb */ | ||
| 3285 | else if (pFindData) { | ||
| 3286 | __u16 data_offset = le16_to_cpu(pSMBr->t2.DataOffset); | ||
| 3287 | memcpy((char *) pFindData, | ||
| 3288 | (char *) &pSMBr->hdr.Protocol + | ||
| 3289 | data_offset, sizeof(FILE_ALL_INFO)); | ||
| 3290 | } else | ||
| 3291 | rc = -ENOMEM; | ||
| 3292 | } | ||
| 3293 | cifs_buf_release(pSMB); | ||
| 3294 | if (rc == -EAGAIN) | ||
| 3295 | goto QFileInfoRetry; | ||
| 3234 | 3296 | ||
| 3297 | return rc; | ||
| 3298 | } | ||
| 3235 | 3299 | ||
| 3236 | int | 3300 | int |
| 3237 | CIFSSMBQPathInfo(const int xid, struct cifsTconInfo *tcon, | 3301 | CIFSSMBQPathInfo(const int xid, struct cifsTconInfo *tcon, |
| @@ -3335,6 +3399,75 @@ QPathInfoRetry: | |||
| 3335 | } | 3399 | } |
| 3336 | 3400 | ||
| 3337 | int | 3401 | int |
| 3402 | CIFSSMBUnixQFileInfo(const int xid, struct cifsTconInfo *tcon, | ||
| 3403 | u16 netfid, FILE_UNIX_BASIC_INFO *pFindData) | ||
| 3404 | { | ||
| 3405 | struct smb_t2_qfi_req *pSMB = NULL; | ||
| 3406 | struct smb_t2_qfi_rsp *pSMBr = NULL; | ||
| 3407 | int rc = 0; | ||
| 3408 | int bytes_returned; | ||
| 3409 | __u16 params, byte_count; | ||
| 3410 | |||
| 3411 | UnixQFileInfoRetry: | ||
| 3412 | rc = smb_init(SMB_COM_TRANSACTION2, 15, tcon, (void **) &pSMB, | ||
| 3413 | (void **) &pSMBr); | ||
| 3414 | if (rc) | ||
| 3415 | return rc; | ||
| 3416 | |||
| 3417 | params = 2 /* level */ + 2 /* fid */; | ||
| 3418 | pSMB->t2.TotalDataCount = 0; | ||
| 3419 | pSMB->t2.MaxParameterCount = cpu_to_le16(4); | ||
| 3420 | /* BB find exact max data count below from sess structure BB */ | ||
| 3421 | pSMB->t2.MaxDataCount = cpu_to_le16(CIFSMaxBufSize); | ||
| 3422 | pSMB->t2.MaxSetupCount = 0; | ||
| 3423 | pSMB->t2.Reserved = 0; | ||
| 3424 | pSMB->t2.Flags = 0; | ||
| 3425 | pSMB->t2.Timeout = 0; | ||
| 3426 | pSMB->t2.Reserved2 = 0; | ||
| 3427 | pSMB->t2.ParameterOffset = cpu_to_le16(offsetof(struct smb_t2_qfi_req, | ||
| 3428 | Fid) - 4); | ||
| 3429 | pSMB->t2.DataCount = 0; | ||
| 3430 | pSMB->t2.DataOffset = 0; | ||
| 3431 | pSMB->t2.SetupCount = 1; | ||
| 3432 | pSMB->t2.Reserved3 = 0; | ||
| 3433 | pSMB->t2.SubCommand = cpu_to_le16(TRANS2_QUERY_FILE_INFORMATION); | ||
| 3434 | byte_count = params + 1 /* pad */ ; | ||
| 3435 | pSMB->t2.TotalParameterCount = cpu_to_le16(params); | ||
| 3436 | pSMB->t2.ParameterCount = pSMB->t2.TotalParameterCount; | ||
| 3437 | pSMB->InformationLevel = cpu_to_le16(SMB_QUERY_FILE_UNIX_BASIC); | ||
| 3438 | pSMB->Pad = 0; | ||
| 3439 | pSMB->Fid = netfid; | ||
| 3440 | pSMB->hdr.smb_buf_length += byte_count; | ||
| 3441 | |||
| 3442 | rc = SendReceive(xid, tcon->ses, (struct smb_hdr *) pSMB, | ||
| 3443 | (struct smb_hdr *) pSMBr, &bytes_returned, 0); | ||
| 3444 | if (rc) { | ||
| 3445 | cFYI(1, ("Send error in QPathInfo = %d", rc)); | ||
| 3446 | } else { /* decode response */ | ||
| 3447 | rc = validate_t2((struct smb_t2_rsp *)pSMBr); | ||
| 3448 | |||
| 3449 | if (rc || (pSMBr->ByteCount < sizeof(FILE_UNIX_BASIC_INFO))) { | ||
| 3450 | cERROR(1, ("Malformed FILE_UNIX_BASIC_INFO response.\n" | ||
| 3451 | "Unix Extensions can be disabled on mount " | ||
| 3452 | "by specifying the nosfu mount option.")); | ||
| 3453 | rc = -EIO; /* bad smb */ | ||
| 3454 | } else { | ||
| 3455 | __u16 data_offset = le16_to_cpu(pSMBr->t2.DataOffset); | ||
| 3456 | memcpy((char *) pFindData, | ||
| 3457 | (char *) &pSMBr->hdr.Protocol + | ||
| 3458 | data_offset, | ||
| 3459 | sizeof(FILE_UNIX_BASIC_INFO)); | ||
| 3460 | } | ||
| 3461 | } | ||
| 3462 | |||
| 3463 | cifs_buf_release(pSMB); | ||
| 3464 | if (rc == -EAGAIN) | ||
| 3465 | goto UnixQFileInfoRetry; | ||
| 3466 | |||
| 3467 | return rc; | ||
| 3468 | } | ||
| 3469 | |||
| 3470 | int | ||
| 3338 | CIFSSMBUnixQPathInfo(const int xid, struct cifsTconInfo *tcon, | 3471 | CIFSSMBUnixQPathInfo(const int xid, struct cifsTconInfo *tcon, |
| 3339 | const unsigned char *searchName, | 3472 | const unsigned char *searchName, |
| 3340 | FILE_UNIX_BASIC_INFO *pFindData, | 3473 | FILE_UNIX_BASIC_INFO *pFindData, |
| @@ -3886,7 +4019,7 @@ parse_DFS_referrals(TRANSACTION2_GET_DFS_REFER_RSP *pSMBr, | |||
| 3886 | goto parse_DFS_referrals_exit; | 4019 | goto parse_DFS_referrals_exit; |
| 3887 | } | 4020 | } |
| 3888 | 4021 | ||
| 3889 | /* collect neccessary data from referrals */ | 4022 | /* collect necessary data from referrals */ |
| 3890 | for (i = 0; i < *num_of_nodes; i++) { | 4023 | for (i = 0; i < *num_of_nodes; i++) { |
| 3891 | char *temp; | 4024 | char *temp; |
| 3892 | int max_len; | 4025 | int max_len; |
| @@ -5269,22 +5402,34 @@ int CIFSSMBNotify(const int xid, struct cifsTconInfo *tcon, | |||
| 5269 | cifs_buf_release(pSMB); | 5402 | cifs_buf_release(pSMB); |
| 5270 | return rc; | 5403 | return rc; |
| 5271 | } | 5404 | } |
| 5405 | |||
| 5272 | #ifdef CONFIG_CIFS_XATTR | 5406 | #ifdef CONFIG_CIFS_XATTR |
| 5407 | /* | ||
| 5408 | * Do a path-based QUERY_ALL_EAS call and parse the result. This is a common | ||
| 5409 | * function used by listxattr and getxattr type calls. When ea_name is set, | ||
| 5410 | * it looks for that attribute name and stuffs that value into the EAData | ||
| 5411 | * buffer. When ea_name is NULL, it stuffs a list of attribute names into the | ||
| 5412 | * buffer. In both cases, the return value is either the length of the | ||
| 5413 | * resulting data or a negative error code. If EAData is a NULL pointer then | ||
| 5414 | * the data isn't copied to it, but the length is returned. | ||
| 5415 | */ | ||
| 5273 | ssize_t | 5416 | ssize_t |
| 5274 | CIFSSMBQAllEAs(const int xid, struct cifsTconInfo *tcon, | 5417 | CIFSSMBQAllEAs(const int xid, struct cifsTconInfo *tcon, |
| 5275 | const unsigned char *searchName, | 5418 | const unsigned char *searchName, const unsigned char *ea_name, |
| 5276 | char *EAData, size_t buf_size, | 5419 | char *EAData, size_t buf_size, |
| 5277 | const struct nls_table *nls_codepage, int remap) | 5420 | const struct nls_table *nls_codepage, int remap) |
| 5278 | { | 5421 | { |
| 5279 | /* BB assumes one setup word */ | 5422 | /* BB assumes one setup word */ |
| 5280 | TRANSACTION2_QPI_REQ *pSMB = NULL; | 5423 | TRANSACTION2_QPI_REQ *pSMB = NULL; |
| 5281 | TRANSACTION2_QPI_RSP *pSMBr = NULL; | 5424 | TRANSACTION2_QPI_RSP *pSMBr = NULL; |
| 5282 | int rc = 0; | 5425 | int rc = 0; |
| 5283 | int bytes_returned; | 5426 | int bytes_returned; |
| 5284 | int name_len; | 5427 | int list_len; |
| 5428 | struct fealist *ea_response_data; | ||
| 5285 | struct fea *temp_fea; | 5429 | struct fea *temp_fea; |
| 5286 | char *temp_ptr; | 5430 | char *temp_ptr; |
| 5287 | __u16 params, byte_count; | 5431 | char *end_of_smb; |
| 5432 | __u16 params, byte_count, data_offset; | ||
| 5288 | 5433 | ||
| 5289 | cFYI(1, ("In Query All EAs path %s", searchName)); | 5434 | cFYI(1, ("In Query All EAs path %s", searchName)); |
| 5290 | QAllEAsRetry: | 5435 | QAllEAsRetry: |
| @@ -5294,22 +5439,22 @@ QAllEAsRetry: | |||
| 5294 | return rc; | 5439 | return rc; |
| 5295 | 5440 | ||
| 5296 | if (pSMB->hdr.Flags2 & SMBFLG2_UNICODE) { | 5441 | if (pSMB->hdr.Flags2 & SMBFLG2_UNICODE) { |
| 5297 | name_len = | 5442 | list_len = |
| 5298 | cifsConvertToUCS((__le16 *) pSMB->FileName, searchName, | 5443 | cifsConvertToUCS((__le16 *) pSMB->FileName, searchName, |
| 5299 | PATH_MAX, nls_codepage, remap); | 5444 | PATH_MAX, nls_codepage, remap); |
| 5300 | name_len++; /* trailing null */ | 5445 | list_len++; /* trailing null */ |
| 5301 | name_len *= 2; | 5446 | list_len *= 2; |
| 5302 | } else { /* BB improve the check for buffer overruns BB */ | 5447 | } else { /* BB improve the check for buffer overruns BB */ |
| 5303 | name_len = strnlen(searchName, PATH_MAX); | 5448 | list_len = strnlen(searchName, PATH_MAX); |
| 5304 | name_len++; /* trailing null */ | 5449 | list_len++; /* trailing null */ |
| 5305 | strncpy(pSMB->FileName, searchName, name_len); | 5450 | strncpy(pSMB->FileName, searchName, list_len); |
| 5306 | } | 5451 | } |
| 5307 | 5452 | ||
| 5308 | params = 2 /* level */ + 4 /* reserved */ + name_len /* includes NUL */; | 5453 | params = 2 /* level */ + 4 /* reserved */ + list_len /* includes NUL */; |
| 5309 | pSMB->TotalDataCount = 0; | 5454 | pSMB->TotalDataCount = 0; |
| 5310 | pSMB->MaxParameterCount = cpu_to_le16(2); | 5455 | pSMB->MaxParameterCount = cpu_to_le16(2); |
| 5311 | /* BB find exact max SMB PDU from sess structure BB */ | 5456 | /* BB find exact max SMB PDU from sess structure BB */ |
| 5312 | pSMB->MaxDataCount = cpu_to_le16(4000); | 5457 | pSMB->MaxDataCount = cpu_to_le16(CIFSMaxBufSize); |
| 5313 | pSMB->MaxSetupCount = 0; | 5458 | pSMB->MaxSetupCount = 0; |
| 5314 | pSMB->Reserved = 0; | 5459 | pSMB->Reserved = 0; |
| 5315 | pSMB->Flags = 0; | 5460 | pSMB->Flags = 0; |
| @@ -5334,237 +5479,117 @@ QAllEAsRetry: | |||
| 5334 | (struct smb_hdr *) pSMBr, &bytes_returned, 0); | 5479 | (struct smb_hdr *) pSMBr, &bytes_returned, 0); |
| 5335 | if (rc) { | 5480 | if (rc) { |
| 5336 | cFYI(1, ("Send error in QueryAllEAs = %d", rc)); | 5481 | cFYI(1, ("Send error in QueryAllEAs = %d", rc)); |
| 5337 | } else { /* decode response */ | 5482 | goto QAllEAsOut; |
| 5338 | rc = validate_t2((struct smb_t2_rsp *)pSMBr); | 5483 | } |
| 5339 | 5484 | ||
| 5340 | /* BB also check enough total bytes returned */ | 5485 | |
| 5341 | /* BB we need to improve the validity checking | 5486 | /* BB also check enough total bytes returned */ |
| 5342 | of these trans2 responses */ | 5487 | /* BB we need to improve the validity checking |
| 5343 | if (rc || (pSMBr->ByteCount < 4)) | 5488 | of these trans2 responses */ |
| 5344 | rc = -EIO; /* bad smb */ | 5489 | |
| 5345 | /* else if (pFindData){ | 5490 | rc = validate_t2((struct smb_t2_rsp *)pSMBr); |
| 5346 | memcpy((char *) pFindData, | 5491 | if (rc || (pSMBr->ByteCount < 4)) { |
| 5347 | (char *) &pSMBr->hdr.Protocol + | 5492 | rc = -EIO; /* bad smb */ |
| 5348 | data_offset, kl); | 5493 | goto QAllEAsOut; |
| 5349 | }*/ else { | ||
| 5350 | /* check that length of list is not more than bcc */ | ||
| 5351 | /* check that each entry does not go beyond length | ||
| 5352 | of list */ | ||
| 5353 | /* check that each element of each entry does not | ||
| 5354 | go beyond end of list */ | ||
| 5355 | __u16 data_offset = le16_to_cpu(pSMBr->t2.DataOffset); | ||
| 5356 | struct fealist *ea_response_data; | ||
| 5357 | rc = 0; | ||
| 5358 | /* validate_trans2_offsets() */ | ||
| 5359 | /* BB check if start of smb + data_offset > &bcc+ bcc */ | ||
| 5360 | ea_response_data = (struct fealist *) | ||
| 5361 | (((char *) &pSMBr->hdr.Protocol) + | ||
| 5362 | data_offset); | ||
| 5363 | name_len = le32_to_cpu(ea_response_data->list_len); | ||
| 5364 | cFYI(1, ("ea length %d", name_len)); | ||
| 5365 | if (name_len <= 8) { | ||
| 5366 | /* returned EA size zeroed at top of function */ | ||
| 5367 | cFYI(1, ("empty EA list returned from server")); | ||
| 5368 | } else { | ||
| 5369 | /* account for ea list len */ | ||
| 5370 | name_len -= 4; | ||
| 5371 | temp_fea = ea_response_data->list; | ||
| 5372 | temp_ptr = (char *)temp_fea; | ||
| 5373 | while (name_len > 0) { | ||
| 5374 | __u16 value_len; | ||
| 5375 | name_len -= 4; | ||
| 5376 | temp_ptr += 4; | ||
| 5377 | rc += temp_fea->name_len; | ||
| 5378 | /* account for prefix user. and trailing null */ | ||
| 5379 | rc = rc + 5 + 1; | ||
| 5380 | if (rc < (int)buf_size) { | ||
| 5381 | memcpy(EAData, "user.", 5); | ||
| 5382 | EAData += 5; | ||
| 5383 | memcpy(EAData, temp_ptr, | ||
| 5384 | temp_fea->name_len); | ||
| 5385 | EAData += temp_fea->name_len; | ||
| 5386 | /* null terminate name */ | ||
| 5387 | *EAData = 0; | ||
| 5388 | EAData = EAData + 1; | ||
| 5389 | } else if (buf_size == 0) { | ||
| 5390 | /* skip copy - calc size only */ | ||
| 5391 | } else { | ||
| 5392 | /* stop before overrun buffer */ | ||
| 5393 | rc = -ERANGE; | ||
| 5394 | break; | ||
| 5395 | } | ||
| 5396 | name_len -= temp_fea->name_len; | ||
| 5397 | temp_ptr += temp_fea->name_len; | ||
| 5398 | /* account for trailing null */ | ||
| 5399 | name_len--; | ||
| 5400 | temp_ptr++; | ||
| 5401 | value_len = | ||
| 5402 | le16_to_cpu(temp_fea->value_len); | ||
| 5403 | name_len -= value_len; | ||
| 5404 | temp_ptr += value_len; | ||
| 5405 | /* BB check that temp_ptr is still | ||
| 5406 | within the SMB BB*/ | ||
| 5407 | |||
| 5408 | /* no trailing null to account for | ||
| 5409 | in value len */ | ||
| 5410 | /* go on to next EA */ | ||
| 5411 | temp_fea = (struct fea *)temp_ptr; | ||
| 5412 | } | ||
| 5413 | } | ||
| 5414 | } | ||
| 5415 | } | 5494 | } |
| 5416 | cifs_buf_release(pSMB); | ||
| 5417 | if (rc == -EAGAIN) | ||
| 5418 | goto QAllEAsRetry; | ||
| 5419 | 5495 | ||
| 5420 | return (ssize_t)rc; | 5496 | /* check that length of list is not more than bcc */ |
| 5421 | } | 5497 | /* check that each entry does not go beyond length |
| 5498 | of list */ | ||
| 5499 | /* check that each element of each entry does not | ||
| 5500 | go beyond end of list */ | ||
| 5501 | /* validate_trans2_offsets() */ | ||
| 5502 | /* BB check if start of smb + data_offset > &bcc+ bcc */ | ||
| 5422 | 5503 | ||
| 5423 | ssize_t CIFSSMBQueryEA(const int xid, struct cifsTconInfo *tcon, | 5504 | data_offset = le16_to_cpu(pSMBr->t2.DataOffset); |
| 5424 | const unsigned char *searchName, const unsigned char *ea_name, | 5505 | ea_response_data = (struct fealist *) |
| 5425 | unsigned char *ea_value, size_t buf_size, | 5506 | (((char *) &pSMBr->hdr.Protocol) + data_offset); |
| 5426 | const struct nls_table *nls_codepage, int remap) | ||
| 5427 | { | ||
| 5428 | TRANSACTION2_QPI_REQ *pSMB = NULL; | ||
| 5429 | TRANSACTION2_QPI_RSP *pSMBr = NULL; | ||
| 5430 | int rc = 0; | ||
| 5431 | int bytes_returned; | ||
| 5432 | int name_len; | ||
| 5433 | struct fea *temp_fea; | ||
| 5434 | char *temp_ptr; | ||
| 5435 | __u16 params, byte_count; | ||
| 5436 | 5507 | ||
| 5437 | cFYI(1, ("In Query EA path %s", searchName)); | 5508 | list_len = le32_to_cpu(ea_response_data->list_len); |
| 5438 | QEARetry: | 5509 | cFYI(1, ("ea length %d", list_len)); |
| 5439 | rc = smb_init(SMB_COM_TRANSACTION2, 15, tcon, (void **) &pSMB, | 5510 | if (list_len <= 8) { |
| 5440 | (void **) &pSMBr); | 5511 | cFYI(1, ("empty EA list returned from server")); |
| 5441 | if (rc) | 5512 | goto QAllEAsOut; |
| 5442 | return rc; | 5513 | } |
| 5443 | 5514 | ||
| 5444 | if (pSMB->hdr.Flags2 & SMBFLG2_UNICODE) { | 5515 | /* make sure list_len doesn't go past end of SMB */ |
| 5445 | name_len = | 5516 | end_of_smb = (char *)pByteArea(&pSMBr->hdr) + BCC(&pSMBr->hdr); |
| 5446 | cifsConvertToUCS((__le16 *) pSMB->FileName, searchName, | 5517 | if ((char *)ea_response_data + list_len > end_of_smb) { |
| 5447 | PATH_MAX, nls_codepage, remap); | 5518 | cFYI(1, ("EA list appears to go beyond SMB")); |
| 5448 | name_len++; /* trailing null */ | 5519 | rc = -EIO; |
| 5449 | name_len *= 2; | 5520 | goto QAllEAsOut; |
| 5450 | } else { /* BB improve the check for buffer overruns BB */ | ||
| 5451 | name_len = strnlen(searchName, PATH_MAX); | ||
| 5452 | name_len++; /* trailing null */ | ||
| 5453 | strncpy(pSMB->FileName, searchName, name_len); | ||
| 5454 | } | 5521 | } |
| 5455 | 5522 | ||
| 5456 | params = 2 /* level */ + 4 /* reserved */ + name_len /* includes NUL */; | 5523 | /* account for ea list len */ |
| 5457 | pSMB->TotalDataCount = 0; | 5524 | list_len -= 4; |
| 5458 | pSMB->MaxParameterCount = cpu_to_le16(2); | 5525 | temp_fea = ea_response_data->list; |
| 5459 | /* BB find exact max SMB PDU from sess structure BB */ | 5526 | temp_ptr = (char *)temp_fea; |
| 5460 | pSMB->MaxDataCount = cpu_to_le16(4000); | 5527 | while (list_len > 0) { |
| 5461 | pSMB->MaxSetupCount = 0; | 5528 | unsigned int name_len; |
| 5462 | pSMB->Reserved = 0; | 5529 | __u16 value_len; |
| 5463 | pSMB->Flags = 0; | 5530 | |
| 5464 | pSMB->Timeout = 0; | 5531 | list_len -= 4; |
| 5465 | pSMB->Reserved2 = 0; | 5532 | temp_ptr += 4; |
| 5466 | pSMB->ParameterOffset = cpu_to_le16(offsetof( | 5533 | /* make sure we can read name_len and value_len */ |
| 5467 | struct smb_com_transaction2_qpi_req, InformationLevel) - 4); | 5534 | if (list_len < 0) { |
| 5468 | pSMB->DataCount = 0; | 5535 | cFYI(1, ("EA entry goes beyond length of list")); |
| 5469 | pSMB->DataOffset = 0; | 5536 | rc = -EIO; |
| 5470 | pSMB->SetupCount = 1; | 5537 | goto QAllEAsOut; |
| 5471 | pSMB->Reserved3 = 0; | 5538 | } |
| 5472 | pSMB->SubCommand = cpu_to_le16(TRANS2_QUERY_PATH_INFORMATION); | ||
| 5473 | byte_count = params + 1 /* pad */ ; | ||
| 5474 | pSMB->TotalParameterCount = cpu_to_le16(params); | ||
| 5475 | pSMB->ParameterCount = pSMB->TotalParameterCount; | ||
| 5476 | pSMB->InformationLevel = cpu_to_le16(SMB_INFO_QUERY_ALL_EAS); | ||
| 5477 | pSMB->Reserved4 = 0; | ||
| 5478 | pSMB->hdr.smb_buf_length += byte_count; | ||
| 5479 | pSMB->ByteCount = cpu_to_le16(byte_count); | ||
| 5480 | 5539 | ||
| 5481 | rc = SendReceive(xid, tcon->ses, (struct smb_hdr *) pSMB, | 5540 | name_len = temp_fea->name_len; |
| 5482 | (struct smb_hdr *) pSMBr, &bytes_returned, 0); | 5541 | value_len = le16_to_cpu(temp_fea->value_len); |
| 5483 | if (rc) { | 5542 | list_len -= name_len + 1 + value_len; |
| 5484 | cFYI(1, ("Send error in Query EA = %d", rc)); | 5543 | if (list_len < 0) { |
| 5485 | } else { /* decode response */ | 5544 | cFYI(1, ("EA entry goes beyond length of list")); |
| 5486 | rc = validate_t2((struct smb_t2_rsp *)pSMBr); | 5545 | rc = -EIO; |
| 5546 | goto QAllEAsOut; | ||
| 5547 | } | ||
| 5487 | 5548 | ||
| 5488 | /* BB also check enough total bytes returned */ | 5549 | if (ea_name) { |
| 5489 | /* BB we need to improve the validity checking | 5550 | if (strncmp(ea_name, temp_ptr, name_len) == 0) { |
| 5490 | of these trans2 responses */ | 5551 | temp_ptr += name_len + 1; |
| 5491 | if (rc || (pSMBr->ByteCount < 4)) | 5552 | rc = value_len; |
| 5492 | rc = -EIO; /* bad smb */ | 5553 | if (buf_size == 0) |
| 5493 | /* else if (pFindData){ | 5554 | goto QAllEAsOut; |
| 5494 | memcpy((char *) pFindData, | 5555 | if ((size_t)value_len > buf_size) { |
| 5495 | (char *) &pSMBr->hdr.Protocol + | 5556 | rc = -ERANGE; |
| 5496 | data_offset, kl); | 5557 | goto QAllEAsOut; |
| 5497 | }*/ else { | ||
| 5498 | /* check that length of list is not more than bcc */ | ||
| 5499 | /* check that each entry does not go beyond length | ||
| 5500 | of list */ | ||
| 5501 | /* check that each element of each entry does not | ||
| 5502 | go beyond end of list */ | ||
| 5503 | __u16 data_offset = le16_to_cpu(pSMBr->t2.DataOffset); | ||
| 5504 | struct fealist *ea_response_data; | ||
| 5505 | rc = -ENODATA; | ||
| 5506 | /* validate_trans2_offsets() */ | ||
| 5507 | /* BB check if start of smb + data_offset > &bcc+ bcc*/ | ||
| 5508 | ea_response_data = (struct fealist *) | ||
| 5509 | (((char *) &pSMBr->hdr.Protocol) + | ||
| 5510 | data_offset); | ||
| 5511 | name_len = le32_to_cpu(ea_response_data->list_len); | ||
| 5512 | cFYI(1, ("ea length %d", name_len)); | ||
| 5513 | if (name_len <= 8) { | ||
| 5514 | /* returned EA size zeroed at top of function */ | ||
| 5515 | cFYI(1, ("empty EA list returned from server")); | ||
| 5516 | } else { | ||
| 5517 | /* account for ea list len */ | ||
| 5518 | name_len -= 4; | ||
| 5519 | temp_fea = ea_response_data->list; | ||
| 5520 | temp_ptr = (char *)temp_fea; | ||
| 5521 | /* loop through checking if we have a matching | ||
| 5522 | name and then return the associated value */ | ||
| 5523 | while (name_len > 0) { | ||
| 5524 | __u16 value_len; | ||
| 5525 | name_len -= 4; | ||
| 5526 | temp_ptr += 4; | ||
| 5527 | value_len = | ||
| 5528 | le16_to_cpu(temp_fea->value_len); | ||
| 5529 | /* BB validate that value_len falls within SMB, | ||
| 5530 | even though maximum for name_len is 255 */ | ||
| 5531 | if (memcmp(temp_fea->name, ea_name, | ||
| 5532 | temp_fea->name_len) == 0) { | ||
| 5533 | /* found a match */ | ||
| 5534 | rc = value_len; | ||
| 5535 | /* account for prefix user. and trailing null */ | ||
| 5536 | if (rc <= (int)buf_size) { | ||
| 5537 | memcpy(ea_value, | ||
| 5538 | temp_fea->name+temp_fea->name_len+1, | ||
| 5539 | rc); | ||
| 5540 | /* ea values, unlike ea | ||
| 5541 | names, are not null | ||
| 5542 | terminated */ | ||
| 5543 | } else if (buf_size == 0) { | ||
| 5544 | /* skip copy - calc size only */ | ||
| 5545 | } else { | ||
| 5546 | /* stop before overrun buffer */ | ||
| 5547 | rc = -ERANGE; | ||
| 5548 | } | ||
| 5549 | break; | ||
| 5550 | } | ||
| 5551 | name_len -= temp_fea->name_len; | ||
| 5552 | temp_ptr += temp_fea->name_len; | ||
| 5553 | /* account for trailing null */ | ||
| 5554 | name_len--; | ||
| 5555 | temp_ptr++; | ||
| 5556 | name_len -= value_len; | ||
| 5557 | temp_ptr += value_len; | ||
| 5558 | /* No trailing null to account for in | ||
| 5559 | value_len. Go on to next EA */ | ||
| 5560 | temp_fea = (struct fea *)temp_ptr; | ||
| 5561 | } | 5558 | } |
| 5559 | memcpy(EAData, temp_ptr, value_len); | ||
| 5560 | goto QAllEAsOut; | ||
| 5561 | } | ||
| 5562 | } else { | ||
| 5563 | /* account for prefix user. and trailing null */ | ||
| 5564 | rc += (5 + 1 + name_len); | ||
| 5565 | if (rc < (int) buf_size) { | ||
| 5566 | memcpy(EAData, "user.", 5); | ||
| 5567 | EAData += 5; | ||
| 5568 | memcpy(EAData, temp_ptr, name_len); | ||
| 5569 | EAData += name_len; | ||
| 5570 | /* null terminate name */ | ||
| 5571 | *EAData = 0; | ||
| 5572 | ++EAData; | ||
| 5573 | } else if (buf_size == 0) { | ||
| 5574 | /* skip copy - calc size only */ | ||
| 5575 | } else { | ||
| 5576 | /* stop before overrun buffer */ | ||
| 5577 | rc = -ERANGE; | ||
| 5578 | break; | ||
| 5562 | } | 5579 | } |
| 5563 | } | 5580 | } |
| 5581 | temp_ptr += name_len + 1 + value_len; | ||
| 5582 | temp_fea = (struct fea *)temp_ptr; | ||
| 5564 | } | 5583 | } |
| 5584 | |||
| 5585 | /* didn't find the named attribute */ | ||
| 5586 | if (ea_name) | ||
| 5587 | rc = -ENODATA; | ||
| 5588 | |||
| 5589 | QAllEAsOut: | ||
| 5565 | cifs_buf_release(pSMB); | 5590 | cifs_buf_release(pSMB); |
| 5566 | if (rc == -EAGAIN) | 5591 | if (rc == -EAGAIN) |
| 5567 | goto QEARetry; | 5592 | goto QAllEAsRetry; |
| 5568 | 5593 | ||
| 5569 | return (ssize_t)rc; | 5594 | return (ssize_t)rc; |
| 5570 | } | 5595 | } |
diff --git a/fs/cifs/connect.c b/fs/cifs/connect.c index 2e9e09ca0e30..45eb6cba793f 100644 --- a/fs/cifs/connect.c +++ b/fs/cifs/connect.c | |||
| @@ -2388,13 +2388,13 @@ try_mount_again: | |||
| 2388 | */ | 2388 | */ |
| 2389 | cifs_put_tcp_session(srvTcp); | 2389 | cifs_put_tcp_session(srvTcp); |
| 2390 | 2390 | ||
| 2391 | down(&pSesInfo->sesSem); | 2391 | mutex_lock(&pSesInfo->session_mutex); |
| 2392 | if (pSesInfo->need_reconnect) { | 2392 | if (pSesInfo->need_reconnect) { |
| 2393 | cFYI(1, ("Session needs reconnect")); | 2393 | cFYI(1, ("Session needs reconnect")); |
| 2394 | rc = cifs_setup_session(xid, pSesInfo, | 2394 | rc = cifs_setup_session(xid, pSesInfo, |
| 2395 | cifs_sb->local_nls); | 2395 | cifs_sb->local_nls); |
| 2396 | } | 2396 | } |
| 2397 | up(&pSesInfo->sesSem); | 2397 | mutex_unlock(&pSesInfo->session_mutex); |
| 2398 | } else if (!rc) { | 2398 | } else if (!rc) { |
| 2399 | cFYI(1, ("Existing smb sess not found")); | 2399 | cFYI(1, ("Existing smb sess not found")); |
| 2400 | pSesInfo = sesInfoAlloc(); | 2400 | pSesInfo = sesInfoAlloc(); |
| @@ -2437,12 +2437,12 @@ try_mount_again: | |||
| 2437 | } | 2437 | } |
| 2438 | pSesInfo->linux_uid = volume_info->linux_uid; | 2438 | pSesInfo->linux_uid = volume_info->linux_uid; |
| 2439 | pSesInfo->overrideSecFlg = volume_info->secFlg; | 2439 | pSesInfo->overrideSecFlg = volume_info->secFlg; |
| 2440 | down(&pSesInfo->sesSem); | 2440 | mutex_lock(&pSesInfo->session_mutex); |
| 2441 | 2441 | ||
| 2442 | /* BB FIXME need to pass vol->secFlgs BB */ | 2442 | /* BB FIXME need to pass vol->secFlgs BB */ |
| 2443 | rc = cifs_setup_session(xid, pSesInfo, | 2443 | rc = cifs_setup_session(xid, pSesInfo, |
| 2444 | cifs_sb->local_nls); | 2444 | cifs_sb->local_nls); |
| 2445 | up(&pSesInfo->sesSem); | 2445 | mutex_unlock(&pSesInfo->session_mutex); |
| 2446 | } | 2446 | } |
| 2447 | 2447 | ||
| 2448 | /* search for existing tcon to this server share */ | 2448 | /* search for existing tcon to this server share */ |
diff --git a/fs/cifs/dir.c b/fs/cifs/dir.c index 6ccf7262d1b7..e9f7ecc2714b 100644 --- a/fs/cifs/dir.c +++ b/fs/cifs/dir.c | |||
| @@ -739,7 +739,7 @@ cifs_d_revalidate(struct dentry *direntry, struct nameidata *nd) | |||
| 739 | int isValid = 1; | 739 | int isValid = 1; |
| 740 | 740 | ||
| 741 | if (direntry->d_inode) { | 741 | if (direntry->d_inode) { |
| 742 | if (cifs_revalidate(direntry)) | 742 | if (cifs_revalidate_dentry(direntry)) |
| 743 | return 0; | 743 | return 0; |
| 744 | } else { | 744 | } else { |
| 745 | cFYI(1, ("neg dentry 0x%p name = %s", | 745 | cFYI(1, ("neg dentry 0x%p name = %s", |
diff --git a/fs/cifs/file.c b/fs/cifs/file.c index 057e1dae12ab..ca2ba7a0193c 100644 --- a/fs/cifs/file.c +++ b/fs/cifs/file.c | |||
| @@ -219,8 +219,8 @@ static inline int cifs_open_inode_helper(struct inode *inode, struct file *file, | |||
| 219 | cFYI(1, ("inode unchanged on server")); | 219 | cFYI(1, ("inode unchanged on server")); |
| 220 | } else { | 220 | } else { |
| 221 | if (file->f_path.dentry->d_inode->i_mapping) { | 221 | if (file->f_path.dentry->d_inode->i_mapping) { |
| 222 | /* BB no need to lock inode until after invalidate | 222 | /* BB no need to lock inode until after invalidate |
| 223 | since namei code should already have it locked? */ | 223 | since namei code should already have it locked? */ |
| 224 | rc = filemap_write_and_wait(file->f_path.dentry->d_inode->i_mapping); | 224 | rc = filemap_write_and_wait(file->f_path.dentry->d_inode->i_mapping); |
| 225 | if (rc != 0) | 225 | if (rc != 0) |
| 226 | CIFS_I(file->f_path.dentry->d_inode)->write_behind_rc = rc; | 226 | CIFS_I(file->f_path.dentry->d_inode)->write_behind_rc = rc; |
| @@ -1890,11 +1890,10 @@ static ssize_t cifs_read(struct file *file, char *read_data, size_t read_size, | |||
| 1890 | 1890 | ||
| 1891 | int cifs_file_mmap(struct file *file, struct vm_area_struct *vma) | 1891 | int cifs_file_mmap(struct file *file, struct vm_area_struct *vma) |
| 1892 | { | 1892 | { |
| 1893 | struct dentry *dentry = file->f_path.dentry; | ||
| 1894 | int rc, xid; | 1893 | int rc, xid; |
| 1895 | 1894 | ||
| 1896 | xid = GetXid(); | 1895 | xid = GetXid(); |
| 1897 | rc = cifs_revalidate(dentry); | 1896 | rc = cifs_revalidate_file(file); |
| 1898 | if (rc) { | 1897 | if (rc) { |
| 1899 | cFYI(1, ("Validation prior to mmap failed, error=%d", rc)); | 1898 | cFYI(1, ("Validation prior to mmap failed, error=%d", rc)); |
| 1900 | FreeXid(xid); | 1899 | FreeXid(xid); |
| @@ -2289,9 +2288,9 @@ cifs_oplock_break(struct slow_work *work) | |||
| 2289 | if (inode && S_ISREG(inode->i_mode)) { | 2288 | if (inode && S_ISREG(inode->i_mode)) { |
| 2290 | #ifdef CONFIG_CIFS_EXPERIMENTAL | 2289 | #ifdef CONFIG_CIFS_EXPERIMENTAL |
| 2291 | if (cinode->clientCanCacheAll == 0) | 2290 | if (cinode->clientCanCacheAll == 0) |
| 2292 | break_lease(inode, FMODE_READ); | 2291 | break_lease(inode, O_RDONLY); |
| 2293 | else if (cinode->clientCanCacheRead == 0) | 2292 | else if (cinode->clientCanCacheRead == 0) |
| 2294 | break_lease(inode, FMODE_WRITE); | 2293 | break_lease(inode, O_WRONLY); |
| 2295 | #endif | 2294 | #endif |
| 2296 | rc = filemap_fdatawrite(inode->i_mapping); | 2295 | rc = filemap_fdatawrite(inode->i_mapping); |
| 2297 | if (cinode->clientCanCacheRead == 0) { | 2296 | if (cinode->clientCanCacheRead == 0) { |
diff --git a/fs/cifs/inode.c b/fs/cifs/inode.c index e3fda978f481..723daaccbd0e 100644 --- a/fs/cifs/inode.c +++ b/fs/cifs/inode.c | |||
| @@ -77,6 +77,41 @@ static void cifs_set_ops(struct inode *inode, const bool is_dfs_referral) | |||
| 77 | } | 77 | } |
| 78 | } | 78 | } |
| 79 | 79 | ||
| 80 | /* check inode attributes against fattr. If they don't match, tag the | ||
| 81 | * inode for cache invalidation | ||
| 82 | */ | ||
| 83 | static void | ||
| 84 | cifs_revalidate_cache(struct inode *inode, struct cifs_fattr *fattr) | ||
| 85 | { | ||
| 86 | struct cifsInodeInfo *cifs_i = CIFS_I(inode); | ||
| 87 | |||
| 88 | cFYI(1, ("%s: revalidating inode %llu", __func__, cifs_i->uniqueid)); | ||
| 89 | |||
| 90 | if (inode->i_state & I_NEW) { | ||
| 91 | cFYI(1, ("%s: inode %llu is new", __func__, cifs_i->uniqueid)); | ||
| 92 | return; | ||
| 93 | } | ||
| 94 | |||
| 95 | /* don't bother with revalidation if we have an oplock */ | ||
| 96 | if (cifs_i->clientCanCacheRead) { | ||
| 97 | cFYI(1, ("%s: inode %llu is oplocked", __func__, | ||
| 98 | cifs_i->uniqueid)); | ||
| 99 | return; | ||
| 100 | } | ||
| 101 | |||
| 102 | /* revalidate if mtime or size have changed */ | ||
| 103 | if (timespec_equal(&inode->i_mtime, &fattr->cf_mtime) && | ||
| 104 | cifs_i->server_eof == fattr->cf_eof) { | ||
| 105 | cFYI(1, ("%s: inode %llu is unchanged", __func__, | ||
| 106 | cifs_i->uniqueid)); | ||
| 107 | return; | ||
| 108 | } | ||
| 109 | |||
| 110 | cFYI(1, ("%s: invalidating inode %llu mapping", __func__, | ||
| 111 | cifs_i->uniqueid)); | ||
| 112 | cifs_i->invalid_mapping = true; | ||
| 113 | } | ||
| 114 | |||
| 80 | /* populate an inode with info from a cifs_fattr struct */ | 115 | /* populate an inode with info from a cifs_fattr struct */ |
| 81 | void | 116 | void |
| 82 | cifs_fattr_to_inode(struct inode *inode, struct cifs_fattr *fattr) | 117 | cifs_fattr_to_inode(struct inode *inode, struct cifs_fattr *fattr) |
| @@ -85,6 +120,8 @@ cifs_fattr_to_inode(struct inode *inode, struct cifs_fattr *fattr) | |||
| 85 | struct cifs_sb_info *cifs_sb = CIFS_SB(inode->i_sb); | 120 | struct cifs_sb_info *cifs_sb = CIFS_SB(inode->i_sb); |
| 86 | unsigned long oldtime = cifs_i->time; | 121 | unsigned long oldtime = cifs_i->time; |
| 87 | 122 | ||
| 123 | cifs_revalidate_cache(inode, fattr); | ||
| 124 | |||
| 88 | inode->i_atime = fattr->cf_atime; | 125 | inode->i_atime = fattr->cf_atime; |
| 89 | inode->i_mtime = fattr->cf_mtime; | 126 | inode->i_mtime = fattr->cf_mtime; |
| 90 | inode->i_ctime = fattr->cf_ctime; | 127 | inode->i_ctime = fattr->cf_ctime; |
| @@ -111,6 +148,7 @@ cifs_fattr_to_inode(struct inode *inode, struct cifs_fattr *fattr) | |||
| 111 | 148 | ||
| 112 | cifs_i->delete_pending = fattr->cf_flags & CIFS_FATTR_DELETE_PENDING; | 149 | cifs_i->delete_pending = fattr->cf_flags & CIFS_FATTR_DELETE_PENDING; |
| 113 | 150 | ||
| 151 | cifs_i->server_eof = fattr->cf_eof; | ||
| 114 | /* | 152 | /* |
| 115 | * Can't safely change the file size here if the client is writing to | 153 | * Can't safely change the file size here if the client is writing to |
| 116 | * it due to potential races. | 154 | * it due to potential races. |
| @@ -230,6 +268,31 @@ cifs_create_dfs_fattr(struct cifs_fattr *fattr, struct super_block *sb) | |||
| 230 | fattr->cf_flags |= CIFS_FATTR_DFS_REFERRAL; | 268 | fattr->cf_flags |= CIFS_FATTR_DFS_REFERRAL; |
| 231 | } | 269 | } |
| 232 | 270 | ||
| 271 | int cifs_get_file_info_unix(struct file *filp) | ||
| 272 | { | ||
| 273 | int rc; | ||
| 274 | int xid; | ||
| 275 | FILE_UNIX_BASIC_INFO find_data; | ||
| 276 | struct cifs_fattr fattr; | ||
| 277 | struct inode *inode = filp->f_path.dentry->d_inode; | ||
| 278 | struct cifs_sb_info *cifs_sb = CIFS_SB(inode->i_sb); | ||
| 279 | struct cifsTconInfo *tcon = cifs_sb->tcon; | ||
| 280 | struct cifsFileInfo *cfile = (struct cifsFileInfo *) filp->private_data; | ||
| 281 | |||
| 282 | xid = GetXid(); | ||
| 283 | rc = CIFSSMBUnixQFileInfo(xid, tcon, cfile->netfid, &find_data); | ||
| 284 | if (!rc) { | ||
| 285 | cifs_unix_basic_to_fattr(&fattr, &find_data, cifs_sb); | ||
| 286 | } else if (rc == -EREMOTE) { | ||
| 287 | cifs_create_dfs_fattr(&fattr, inode->i_sb); | ||
| 288 | rc = 0; | ||
| 289 | } | ||
| 290 | |||
| 291 | cifs_fattr_to_inode(inode, &fattr); | ||
| 292 | FreeXid(xid); | ||
| 293 | return rc; | ||
| 294 | } | ||
| 295 | |||
| 233 | int cifs_get_inode_info_unix(struct inode **pinode, | 296 | int cifs_get_inode_info_unix(struct inode **pinode, |
| 234 | const unsigned char *full_path, | 297 | const unsigned char *full_path, |
| 235 | struct super_block *sb, int xid) | 298 | struct super_block *sb, int xid) |
| @@ -366,7 +429,7 @@ static int cifs_sfu_mode(struct cifs_fattr *fattr, const unsigned char *path, | |||
| 366 | char ea_value[4]; | 429 | char ea_value[4]; |
| 367 | __u32 mode; | 430 | __u32 mode; |
| 368 | 431 | ||
| 369 | rc = CIFSSMBQueryEA(xid, cifs_sb->tcon, path, "SETFILEBITS", | 432 | rc = CIFSSMBQAllEAs(xid, cifs_sb->tcon, path, "SETFILEBITS", |
| 370 | ea_value, 4 /* size of buf */, cifs_sb->local_nls, | 433 | ea_value, 4 /* size of buf */, cifs_sb->local_nls, |
| 371 | cifs_sb->mnt_cifs_flags & | 434 | cifs_sb->mnt_cifs_flags & |
| 372 | CIFS_MOUNT_MAP_SPECIAL_CHR); | 435 | CIFS_MOUNT_MAP_SPECIAL_CHR); |
| @@ -431,6 +494,47 @@ cifs_all_info_to_fattr(struct cifs_fattr *fattr, FILE_ALL_INFO *info, | |||
| 431 | fattr->cf_gid = cifs_sb->mnt_gid; | 494 | fattr->cf_gid = cifs_sb->mnt_gid; |
| 432 | } | 495 | } |
| 433 | 496 | ||
| 497 | int cifs_get_file_info(struct file *filp) | ||
| 498 | { | ||
| 499 | int rc; | ||
| 500 | int xid; | ||
| 501 | FILE_ALL_INFO find_data; | ||
| 502 | struct cifs_fattr fattr; | ||
| 503 | struct inode *inode = filp->f_path.dentry->d_inode; | ||
| 504 | struct cifs_sb_info *cifs_sb = CIFS_SB(inode->i_sb); | ||
| 505 | struct cifsTconInfo *tcon = cifs_sb->tcon; | ||
| 506 | struct cifsFileInfo *cfile = (struct cifsFileInfo *) filp->private_data; | ||
| 507 | |||
| 508 | xid = GetXid(); | ||
| 509 | rc = CIFSSMBQFileInfo(xid, tcon, cfile->netfid, &find_data); | ||
| 510 | if (rc == -EOPNOTSUPP || rc == -EINVAL) { | ||
| 511 | /* | ||
| 512 | * FIXME: legacy server -- fall back to path-based call? | ||
| 513 | * for now, just skip revalidating and mark inode for | ||
| 514 | * immediate reval. | ||
| 515 | */ | ||
| 516 | rc = 0; | ||
| 517 | CIFS_I(inode)->time = 0; | ||
| 518 | goto cgfi_exit; | ||
| 519 | } else if (rc == -EREMOTE) { | ||
| 520 | cifs_create_dfs_fattr(&fattr, inode->i_sb); | ||
| 521 | rc = 0; | ||
| 522 | } else if (rc) | ||
| 523 | goto cgfi_exit; | ||
| 524 | |||
| 525 | /* | ||
| 526 | * don't bother with SFU junk here -- just mark inode as needing | ||
| 527 | * revalidation. | ||
| 528 | */ | ||
| 529 | cifs_all_info_to_fattr(&fattr, &find_data, cifs_sb, false); | ||
| 530 | fattr.cf_uniqueid = CIFS_I(inode)->uniqueid; | ||
| 531 | fattr.cf_flags |= CIFS_FATTR_NEED_REVAL; | ||
| 532 | cifs_fattr_to_inode(inode, &fattr); | ||
| 533 | cgfi_exit: | ||
| 534 | FreeXid(xid); | ||
| 535 | return rc; | ||
| 536 | } | ||
| 537 | |||
| 434 | int cifs_get_inode_info(struct inode **pinode, | 538 | int cifs_get_inode_info(struct inode **pinode, |
| 435 | const unsigned char *full_path, FILE_ALL_INFO *pfindData, | 539 | const unsigned char *full_path, FILE_ALL_INFO *pfindData, |
| 436 | struct super_block *sb, int xid, const __u16 *pfid) | 540 | struct super_block *sb, int xid, const __u16 *pfid) |
| @@ -1388,135 +1492,103 @@ cifs_rename_exit: | |||
| 1388 | return rc; | 1492 | return rc; |
| 1389 | } | 1493 | } |
| 1390 | 1494 | ||
| 1391 | int cifs_revalidate(struct dentry *direntry) | 1495 | static bool |
| 1496 | cifs_inode_needs_reval(struct inode *inode) | ||
| 1392 | { | 1497 | { |
| 1393 | int xid; | 1498 | struct cifsInodeInfo *cifs_i = CIFS_I(inode); |
| 1394 | int rc = 0, wbrc = 0; | ||
| 1395 | char *full_path; | ||
| 1396 | struct cifs_sb_info *cifs_sb; | ||
| 1397 | struct cifsInodeInfo *cifsInode; | ||
| 1398 | loff_t local_size; | ||
| 1399 | struct timespec local_mtime; | ||
| 1400 | bool invalidate_inode = false; | ||
| 1401 | 1499 | ||
| 1402 | if (direntry->d_inode == NULL) | 1500 | if (cifs_i->clientCanCacheRead) |
| 1403 | return -ENOENT; | 1501 | return false; |
| 1404 | 1502 | ||
| 1405 | cifsInode = CIFS_I(direntry->d_inode); | 1503 | if (!lookupCacheEnabled) |
| 1504 | return true; | ||
| 1406 | 1505 | ||
| 1407 | if (cifsInode == NULL) | 1506 | if (cifs_i->time == 0) |
| 1408 | return -ENOENT; | 1507 | return true; |
| 1409 | 1508 | ||
| 1410 | /* no sense revalidating inode info on file that no one can write */ | 1509 | /* FIXME: the actimeo should be tunable */ |
| 1411 | if (CIFS_I(direntry->d_inode)->clientCanCacheRead) | 1510 | if (time_after_eq(jiffies, cifs_i->time + HZ)) |
| 1412 | return rc; | 1511 | return true; |
| 1512 | |||
| 1513 | return false; | ||
| 1514 | } | ||
| 1515 | |||
| 1516 | /* check invalid_mapping flag and zap the cache if it's set */ | ||
| 1517 | static void | ||
| 1518 | cifs_invalidate_mapping(struct inode *inode) | ||
| 1519 | { | ||
| 1520 | int rc; | ||
| 1521 | struct cifsInodeInfo *cifs_i = CIFS_I(inode); | ||
| 1522 | |||
| 1523 | cifs_i->invalid_mapping = false; | ||
| 1524 | |||
| 1525 | /* write back any cached data */ | ||
| 1526 | if (inode->i_mapping && inode->i_mapping->nrpages != 0) { | ||
| 1527 | rc = filemap_write_and_wait(inode->i_mapping); | ||
| 1528 | if (rc) | ||
| 1529 | cifs_i->write_behind_rc = rc; | ||
| 1530 | } | ||
| 1531 | invalidate_remote_inode(inode); | ||
| 1532 | } | ||
| 1533 | |||
| 1534 | int cifs_revalidate_file(struct file *filp) | ||
| 1535 | { | ||
| 1536 | int rc = 0; | ||
| 1537 | struct inode *inode = filp->f_path.dentry->d_inode; | ||
| 1538 | |||
| 1539 | if (!cifs_inode_needs_reval(inode)) | ||
| 1540 | goto check_inval; | ||
| 1541 | |||
| 1542 | if (CIFS_SB(inode->i_sb)->tcon->unix_ext) | ||
| 1543 | rc = cifs_get_file_info_unix(filp); | ||
| 1544 | else | ||
| 1545 | rc = cifs_get_file_info(filp); | ||
| 1546 | |||
| 1547 | check_inval: | ||
| 1548 | if (CIFS_I(inode)->invalid_mapping) | ||
| 1549 | cifs_invalidate_mapping(inode); | ||
| 1550 | |||
| 1551 | return rc; | ||
| 1552 | } | ||
| 1553 | |||
| 1554 | /* revalidate a dentry's inode attributes */ | ||
| 1555 | int cifs_revalidate_dentry(struct dentry *dentry) | ||
| 1556 | { | ||
| 1557 | int xid; | ||
| 1558 | int rc = 0; | ||
| 1559 | char *full_path = NULL; | ||
| 1560 | struct inode *inode = dentry->d_inode; | ||
| 1561 | struct super_block *sb = dentry->d_sb; | ||
| 1562 | |||
| 1563 | if (inode == NULL) | ||
| 1564 | return -ENOENT; | ||
| 1413 | 1565 | ||
| 1414 | xid = GetXid(); | 1566 | xid = GetXid(); |
| 1415 | 1567 | ||
| 1416 | cifs_sb = CIFS_SB(direntry->d_sb); | 1568 | if (!cifs_inode_needs_reval(inode)) |
| 1569 | goto check_inval; | ||
| 1417 | 1570 | ||
| 1418 | /* can not safely grab the rename sem here if rename calls revalidate | 1571 | /* can not safely grab the rename sem here if rename calls revalidate |
| 1419 | since that would deadlock */ | 1572 | since that would deadlock */ |
| 1420 | full_path = build_path_from_dentry(direntry); | 1573 | full_path = build_path_from_dentry(dentry); |
| 1421 | if (full_path == NULL) { | 1574 | if (full_path == NULL) { |
| 1422 | rc = -ENOMEM; | 1575 | rc = -ENOMEM; |
| 1423 | FreeXid(xid); | 1576 | goto check_inval; |
| 1424 | return rc; | ||
| 1425 | } | ||
| 1426 | cFYI(1, ("Revalidate: %s inode 0x%p count %d dentry: 0x%p d_time %ld " | ||
| 1427 | "jiffies %ld", full_path, direntry->d_inode, | ||
| 1428 | direntry->d_inode->i_count.counter, direntry, | ||
| 1429 | direntry->d_time, jiffies)); | ||
| 1430 | |||
| 1431 | if (cifsInode->time == 0) { | ||
| 1432 | /* was set to zero previously to force revalidate */ | ||
| 1433 | } else if (time_before(jiffies, cifsInode->time + HZ) && | ||
| 1434 | lookupCacheEnabled) { | ||
| 1435 | if ((S_ISREG(direntry->d_inode->i_mode) == 0) || | ||
| 1436 | (direntry->d_inode->i_nlink == 1)) { | ||
| 1437 | kfree(full_path); | ||
| 1438 | FreeXid(xid); | ||
| 1439 | return rc; | ||
| 1440 | } else { | ||
| 1441 | cFYI(1, ("Have to revalidate file due to hardlinks")); | ||
| 1442 | } | ||
| 1443 | } | ||
| 1444 | |||
| 1445 | /* save mtime and size */ | ||
| 1446 | local_mtime = direntry->d_inode->i_mtime; | ||
| 1447 | local_size = direntry->d_inode->i_size; | ||
| 1448 | |||
| 1449 | if (cifs_sb->tcon->unix_ext) { | ||
| 1450 | rc = cifs_get_inode_info_unix(&direntry->d_inode, full_path, | ||
| 1451 | direntry->d_sb, xid); | ||
| 1452 | if (rc) { | ||
| 1453 | cFYI(1, ("error on getting revalidate info %d", rc)); | ||
| 1454 | /* if (rc != -ENOENT) | ||
| 1455 | rc = 0; */ /* BB should we cache info on | ||
| 1456 | certain errors? */ | ||
| 1457 | } | ||
| 1458 | } else { | ||
| 1459 | rc = cifs_get_inode_info(&direntry->d_inode, full_path, NULL, | ||
| 1460 | direntry->d_sb, xid, NULL); | ||
| 1461 | if (rc) { | ||
| 1462 | cFYI(1, ("error on getting revalidate info %d", rc)); | ||
| 1463 | /* if (rc != -ENOENT) | ||
| 1464 | rc = 0; */ /* BB should we cache info on | ||
| 1465 | certain errors? */ | ||
| 1466 | } | ||
| 1467 | } | 1577 | } |
| 1468 | /* should we remap certain errors, access denied?, to zero */ | ||
| 1469 | 1578 | ||
| 1470 | /* if not oplocked, we invalidate inode pages if mtime or file size | 1579 | cFYI(1, ("Revalidate: %s inode 0x%p count %d dentry: 0x%p d_time %ld " |
| 1471 | had changed on server */ | 1580 | "jiffies %ld", full_path, inode, inode->i_count.counter, |
| 1581 | dentry, dentry->d_time, jiffies)); | ||
| 1472 | 1582 | ||
| 1473 | if (timespec_equal(&local_mtime, &direntry->d_inode->i_mtime) && | 1583 | if (CIFS_SB(sb)->tcon->unix_ext) |
| 1474 | (local_size == direntry->d_inode->i_size)) { | 1584 | rc = cifs_get_inode_info_unix(&inode, full_path, sb, xid); |
| 1475 | cFYI(1, ("cifs_revalidate - inode unchanged")); | 1585 | else |
| 1476 | } else { | 1586 | rc = cifs_get_inode_info(&inode, full_path, NULL, sb, |
| 1477 | /* file may have changed on server */ | 1587 | xid, NULL); |
| 1478 | if (cifsInode->clientCanCacheRead) { | ||
| 1479 | /* no need to invalidate inode pages since we were the | ||
| 1480 | only ones who could have modified the file and the | ||
| 1481 | server copy is staler than ours */ | ||
| 1482 | } else { | ||
| 1483 | invalidate_inode = true; | ||
| 1484 | } | ||
| 1485 | } | ||
| 1486 | 1588 | ||
| 1487 | /* can not grab this sem since kernel filesys locking documentation | 1589 | check_inval: |
| 1488 | indicates i_mutex may be taken by the kernel on lookup and rename | 1590 | if (CIFS_I(inode)->invalid_mapping) |
| 1489 | which could deadlock if we grab the i_mutex here as well */ | 1591 | cifs_invalidate_mapping(inode); |
| 1490 | /* mutex_lock(&direntry->d_inode->i_mutex);*/ | ||
| 1491 | /* need to write out dirty pages here */ | ||
| 1492 | if (direntry->d_inode->i_mapping) { | ||
| 1493 | /* do we need to lock inode until after invalidate completes | ||
| 1494 | below? */ | ||
| 1495 | wbrc = filemap_fdatawrite(direntry->d_inode->i_mapping); | ||
| 1496 | if (wbrc) | ||
| 1497 | CIFS_I(direntry->d_inode)->write_behind_rc = wbrc; | ||
| 1498 | } | ||
| 1499 | if (invalidate_inode) { | ||
| 1500 | /* shrink_dcache not necessary now that cifs dentry ops | ||
| 1501 | are exported for negative dentries */ | ||
| 1502 | /* if (S_ISDIR(direntry->d_inode->i_mode)) | ||
| 1503 | shrink_dcache_parent(direntry); */ | ||
| 1504 | if (S_ISREG(direntry->d_inode->i_mode)) { | ||
| 1505 | if (direntry->d_inode->i_mapping) { | ||
| 1506 | wbrc = filemap_fdatawait(direntry->d_inode->i_mapping); | ||
| 1507 | if (wbrc) | ||
| 1508 | CIFS_I(direntry->d_inode)->write_behind_rc = wbrc; | ||
| 1509 | } | ||
| 1510 | /* may eventually have to do this for open files too */ | ||
| 1511 | if (list_empty(&(cifsInode->openFileList))) { | ||
| 1512 | /* changed on server - flush read ahead pages */ | ||
| 1513 | cFYI(1, ("Invalidating read ahead data on " | ||
| 1514 | "closed file")); | ||
| 1515 | invalidate_remote_inode(direntry->d_inode); | ||
| 1516 | } | ||
| 1517 | } | ||
| 1518 | } | ||
| 1519 | /* mutex_unlock(&direntry->d_inode->i_mutex); */ | ||
| 1520 | 1592 | ||
| 1521 | kfree(full_path); | 1593 | kfree(full_path); |
| 1522 | FreeXid(xid); | 1594 | FreeXid(xid); |
| @@ -1526,7 +1598,7 @@ int cifs_revalidate(struct dentry *direntry) | |||
| 1526 | int cifs_getattr(struct vfsmount *mnt, struct dentry *dentry, | 1598 | int cifs_getattr(struct vfsmount *mnt, struct dentry *dentry, |
| 1527 | struct kstat *stat) | 1599 | struct kstat *stat) |
| 1528 | { | 1600 | { |
| 1529 | int err = cifs_revalidate(dentry); | 1601 | int err = cifs_revalidate_dentry(dentry); |
| 1530 | if (!err) { | 1602 | if (!err) { |
| 1531 | generic_fillattr(dentry->d_inode, stat); | 1603 | generic_fillattr(dentry->d_inode, stat); |
| 1532 | stat->blksize = CIFS_MAX_MSGSIZE; | 1604 | stat->blksize = CIFS_MAX_MSGSIZE; |
diff --git a/fs/cifs/misc.c b/fs/cifs/misc.c index d27d4ec6579b..d1474996a812 100644 --- a/fs/cifs/misc.c +++ b/fs/cifs/misc.c | |||
| @@ -79,7 +79,7 @@ sesInfoAlloc(void) | |||
| 79 | ++ret_buf->ses_count; | 79 | ++ret_buf->ses_count; |
| 80 | INIT_LIST_HEAD(&ret_buf->smb_ses_list); | 80 | INIT_LIST_HEAD(&ret_buf->smb_ses_list); |
| 81 | INIT_LIST_HEAD(&ret_buf->tcon_list); | 81 | INIT_LIST_HEAD(&ret_buf->tcon_list); |
| 82 | init_MUTEX(&ret_buf->sesSem); | 82 | mutex_init(&ret_buf->session_mutex); |
| 83 | } | 83 | } |
| 84 | return ret_buf; | 84 | return ret_buf; |
| 85 | } | 85 | } |
diff --git a/fs/cifs/xattr.c b/fs/cifs/xattr.c index a75afa3dd9e1..3e2ef0de1209 100644 --- a/fs/cifs/xattr.c +++ b/fs/cifs/xattr.c | |||
| @@ -244,7 +244,7 @@ ssize_t cifs_getxattr(struct dentry *direntry, const char *ea_name, | |||
| 244 | /* revalidate/getattr then populate from inode */ | 244 | /* revalidate/getattr then populate from inode */ |
| 245 | } /* BB add else when above is implemented */ | 245 | } /* BB add else when above is implemented */ |
| 246 | ea_name += 5; /* skip past user. prefix */ | 246 | ea_name += 5; /* skip past user. prefix */ |
| 247 | rc = CIFSSMBQueryEA(xid, pTcon, full_path, ea_name, ea_value, | 247 | rc = CIFSSMBQAllEAs(xid, pTcon, full_path, ea_name, ea_value, |
| 248 | buf_size, cifs_sb->local_nls, | 248 | buf_size, cifs_sb->local_nls, |
| 249 | cifs_sb->mnt_cifs_flags & CIFS_MOUNT_MAP_SPECIAL_CHR); | 249 | cifs_sb->mnt_cifs_flags & CIFS_MOUNT_MAP_SPECIAL_CHR); |
| 250 | } else if (strncmp(ea_name, CIFS_XATTR_OS2_PREFIX, 4) == 0) { | 250 | } else if (strncmp(ea_name, CIFS_XATTR_OS2_PREFIX, 4) == 0) { |
| @@ -252,7 +252,7 @@ ssize_t cifs_getxattr(struct dentry *direntry, const char *ea_name, | |||
| 252 | goto get_ea_exit; | 252 | goto get_ea_exit; |
| 253 | 253 | ||
| 254 | ea_name += 4; /* skip past os2. prefix */ | 254 | ea_name += 4; /* skip past os2. prefix */ |
| 255 | rc = CIFSSMBQueryEA(xid, pTcon, full_path, ea_name, ea_value, | 255 | rc = CIFSSMBQAllEAs(xid, pTcon, full_path, ea_name, ea_value, |
| 256 | buf_size, cifs_sb->local_nls, | 256 | buf_size, cifs_sb->local_nls, |
| 257 | cifs_sb->mnt_cifs_flags & CIFS_MOUNT_MAP_SPECIAL_CHR); | 257 | cifs_sb->mnt_cifs_flags & CIFS_MOUNT_MAP_SPECIAL_CHR); |
| 258 | } else if (strncmp(ea_name, POSIX_ACL_XATTR_ACCESS, | 258 | } else if (strncmp(ea_name, POSIX_ACL_XATTR_ACCESS, |
| @@ -364,8 +364,8 @@ ssize_t cifs_listxattr(struct dentry *direntry, char *data, size_t buf_size) | |||
| 364 | /* if proc/fs/cifs/streamstoxattr is set then | 364 | /* if proc/fs/cifs/streamstoxattr is set then |
| 365 | search server for EAs or streams to | 365 | search server for EAs or streams to |
| 366 | returns as xattrs */ | 366 | returns as xattrs */ |
| 367 | rc = CIFSSMBQAllEAs(xid, pTcon, full_path, data, buf_size, | 367 | rc = CIFSSMBQAllEAs(xid, pTcon, full_path, NULL, data, |
| 368 | cifs_sb->local_nls, | 368 | buf_size, cifs_sb->local_nls, |
| 369 | cifs_sb->mnt_cifs_flags & | 369 | cifs_sb->mnt_cifs_flags & |
| 370 | CIFS_MOUNT_MAP_SPECIAL_CHR); | 370 | CIFS_MOUNT_MAP_SPECIAL_CHR); |
| 371 | 371 | ||
