The Design and Implementation of the FreeBSD Operating System, Second Edition
Now available: The Design and Implementation of the FreeBSD Operating System (Second Edition)


[ source navigation ] [ diff markup ] [ identifier search ] [ freetext search ] [ file search ] [ list types ] [ track identifier ]

FreeBSD/Linux Kernel Cross Reference
sys/fs/smbfs/proc.c

Version: -  FREEBSD  -  FREEBSD-13-STABLE  -  FREEBSD-13-0  -  FREEBSD-12-STABLE  -  FREEBSD-12-0  -  FREEBSD-11-STABLE  -  FREEBSD-11-0  -  FREEBSD-10-STABLE  -  FREEBSD-10-0  -  FREEBSD-9-STABLE  -  FREEBSD-9-0  -  FREEBSD-8-STABLE  -  FREEBSD-8-0  -  FREEBSD-7-STABLE  -  FREEBSD-7-0  -  FREEBSD-6-STABLE  -  FREEBSD-6-0  -  FREEBSD-5-STABLE  -  FREEBSD-5-0  -  FREEBSD-4-STABLE  -  FREEBSD-3-STABLE  -  FREEBSD22  -  l41  -  OPENBSD  -  linux-2.6  -  MK84  -  PLAN9  -  xnu-8792 
SearchContext: -  none  -  3  -  10 

    1 /*
    2  *  proc.c
    3  *
    4  *  Copyright (C) 1995, 1996 by Paal-Kr. Engstad and Volker Lendecke
    5  *  Copyright (C) 1997 by Volker Lendecke
    6  *
    7  *  Please add a note about your changes to smbfs in the ChangeLog file.
    8  */
    9 
   10 #include <linux/types.h>
   11 #include <linux/capability.h>
   12 #include <linux/errno.h>
   13 #include <linux/slab.h>
   14 #include <linux/fs.h>
   15 #include <linux/file.h>
   16 #include <linux/stat.h>
   17 #include <linux/fcntl.h>
   18 #include <linux/dcache.h>
   19 #include <linux/nls.h>
   20 #include <linux/smp_lock.h>
   21 #include <linux/net.h>
   22 #include <linux/vfs.h>
   23 #include <linux/smb_fs.h>
   24 #include <linux/smbno.h>
   25 #include <linux/smb_mount.h>
   26 
   27 #include <net/sock.h>
   28 
   29 #include <asm/string.h>
   30 #include <asm/div64.h>
   31 
   32 #include "smb_debug.h"
   33 #include "proto.h"
   34 #include "request.h"
   35 
   36 
   37 /* Features. Undefine if they cause problems, this should perhaps be a
   38    config option. */
   39 #define SMBFS_POSIX_UNLINK 1
   40 
   41 /* Allow smb_retry to be interrupted. */
   42 #define SMB_RETRY_INTR
   43 
   44 #define SMB_VWV(packet)  ((packet) + SMB_HEADER_LEN)
   45 #define SMB_CMD(packet)  (*(packet+8))
   46 #define SMB_WCT(packet)  (*(packet+SMB_HEADER_LEN - 1))
   47 
   48 #define SMB_DIRINFO_SIZE 43
   49 #define SMB_STATUS_SIZE  21
   50 
   51 #define SMB_ST_BLKSIZE  (PAGE_SIZE)
   52 #define SMB_ST_BLKSHIFT (PAGE_SHIFT)
   53 
   54 static struct smb_ops smb_ops_core;
   55 static struct smb_ops smb_ops_os2;
   56 static struct smb_ops smb_ops_win95;
   57 static struct smb_ops smb_ops_winNT;
   58 static struct smb_ops smb_ops_unix;
   59 static struct smb_ops smb_ops_null;
   60 
   61 static void
   62 smb_init_dirent(struct smb_sb_info *server, struct smb_fattr *fattr);
   63 static void
   64 smb_finish_dirent(struct smb_sb_info *server, struct smb_fattr *fattr);
   65 static int
   66 smb_proc_getattr_core(struct smb_sb_info *server, struct dentry *dir,
   67                       struct smb_fattr *fattr);
   68 static int
   69 smb_proc_getattr_ff(struct smb_sb_info *server, struct dentry *dentry,
   70                     struct smb_fattr *fattr);
   71 static int
   72 smb_proc_setattr_core(struct smb_sb_info *server, struct dentry *dentry,
   73                       u16 attr);
   74 static int
   75 smb_proc_setattr_ext(struct smb_sb_info *server,
   76                      struct inode *inode, struct smb_fattr *fattr);
   77 static int
   78 smb_proc_query_cifsunix(struct smb_sb_info *server);
   79 static void
   80 install_ops(struct smb_ops *dst, struct smb_ops *src);
   81 
   82 
   83 static void
   84 str_upper(char *name, int len)
   85 {
   86         while (len--)
   87         {
   88                 if (*name >= 'a' && *name <= 'z')
   89                         *name -= ('a' - 'A');
   90                 name++;
   91         }
   92 }
   93 
   94 #if 0
   95 static void
   96 str_lower(char *name, int len)
   97 {
   98         while (len--)
   99         {
  100                 if (*name >= 'A' && *name <= 'Z')
  101                         *name += ('a' - 'A');
  102                 name++;
  103         }
  104 }
  105 #endif
  106 
  107 /* reverse a string inline. This is used by the dircache walking routines */
  108 static void reverse_string(char *buf, int len)
  109 {
  110         char c;
  111         char *end = buf+len-1;
  112 
  113         while(buf < end) {
  114                 c = *buf;
  115                 *(buf++) = *end;
  116                 *(end--) = c;
  117         }
  118 }
  119 
  120 /* no conversion, just a wrapper for memcpy. */
  121 static int convert_memcpy(unsigned char *output, int olen,
  122                           const unsigned char *input, int ilen,
  123                           struct nls_table *nls_from,
  124                           struct nls_table *nls_to)
  125 {
  126         if (olen < ilen)
  127                 return -ENAMETOOLONG;
  128         memcpy(output, input, ilen);
  129         return ilen;
  130 }
  131 
  132 static inline int write_char(unsigned char ch, char *output, int olen)
  133 {
  134         if (olen < 4)
  135                 return -ENAMETOOLONG;
  136         sprintf(output, ":x%02x", ch);
  137         return 4;
  138 }
  139 
  140 static inline int write_unichar(wchar_t ch, char *output, int olen)
  141 {
  142         if (olen < 5)
  143                 return -ENAMETOOLONG;
  144         sprintf(output, ":%04x", ch);
  145         return 5;
  146 }
  147 
  148 /* convert from one "codepage" to another (possibly being utf8). */
  149 static int convert_cp(unsigned char *output, int olen,
  150                       const unsigned char *input, int ilen,
  151                       struct nls_table *nls_from,
  152                       struct nls_table *nls_to)
  153 {
  154         int len = 0;
  155         int n;
  156         wchar_t ch;
  157 
  158         while (ilen > 0) {
  159                 /* convert by changing to unicode and back to the new cp */
  160                 n = nls_from->char2uni(input, ilen, &ch);
  161                 if (n == -EINVAL) {
  162                         ilen--;
  163                         n = write_char(*input++, output, olen);
  164                         if (n < 0)
  165                                 goto fail;
  166                         output += n;
  167                         olen -= n;
  168                         len += n;
  169                         continue;
  170                 } else if (n < 0)
  171                         goto fail;
  172                 input += n;
  173                 ilen -= n;
  174 
  175                 n = nls_to->uni2char(ch, output, olen);
  176                 if (n == -EINVAL)
  177                         n = write_unichar(ch, output, olen);
  178                 if (n < 0)
  179                         goto fail;
  180                 output += n;
  181                 olen -= n;
  182 
  183                 len += n;
  184         }
  185         return len;
  186 fail:
  187         return n;
  188 }
  189 
  190 /* ----------------------------------------------------------- */
  191 
  192 /*
  193  * nls_unicode
  194  *
  195  * This encodes/decodes little endian unicode format
  196  */
  197 
  198 static int uni2char(wchar_t uni, unsigned char *out, int boundlen)
  199 {
  200         if (boundlen < 2)
  201                 return -EINVAL;
  202         *out++ = uni & 0xff;
  203         *out++ = uni >> 8;
  204         return 2;
  205 }
  206 
  207 static int char2uni(const unsigned char *rawstring, int boundlen, wchar_t *uni)
  208 {
  209         if (boundlen < 2)
  210                 return -EINVAL;
  211         *uni = (rawstring[1] << 8) | rawstring[0];
  212         return 2;
  213 }
  214 
  215 static struct nls_table unicode_table = {
  216         .charset        = "unicode",
  217         .uni2char       = uni2char,
  218         .char2uni       = char2uni,
  219 };
  220 
  221 /* ----------------------------------------------------------- */
  222 
  223 static int setcodepage(struct nls_table **p, char *name)
  224 {
  225         struct nls_table *nls;
  226 
  227         if (!name || !*name) {
  228                 nls = NULL;
  229         } else if ( (nls = load_nls(name)) == NULL) {
  230                 printk (KERN_ERR "smbfs: failed to load nls '%s'\n", name);
  231                 return -EINVAL;
  232         }
  233 
  234         /* if already set, unload the previous one. */
  235         if (*p && *p != &unicode_table)
  236                 unload_nls(*p);
  237         *p = nls;
  238 
  239         return 0;
  240 }
  241 
  242 /* Handles all changes to codepage settings. */
  243 int smb_setcodepage(struct smb_sb_info *server, struct smb_nls_codepage *cp)
  244 {
  245         int n = 0;
  246 
  247         smb_lock_server(server);
  248 
  249         /* Don't load any nls_* at all, if no remote is requested */
  250         if (!*cp->remote_name)
  251                 goto out;
  252 
  253         /* local */
  254         n = setcodepage(&server->local_nls, cp->local_name);
  255         if (n != 0)
  256                 goto out;
  257 
  258         /* remote */
  259         if (!strcmp(cp->remote_name, "unicode")) {
  260                 server->remote_nls = &unicode_table;
  261         } else {
  262                 n = setcodepage(&server->remote_nls, cp->remote_name);
  263                 if (n != 0)
  264                         setcodepage(&server->local_nls, NULL);
  265         }
  266 
  267 out:
  268         if (server->local_nls != NULL && server->remote_nls != NULL)
  269                 server->ops->convert = convert_cp;
  270         else
  271                 server->ops->convert = convert_memcpy;
  272 
  273         smb_unlock_server(server);
  274         return n;
  275 }
  276 
  277 
  278 /*****************************************************************************/
  279 /*                                                                           */
  280 /*  Encoding/Decoding section                                                */
  281 /*                                                                           */
  282 /*****************************************************************************/
  283 
  284 static __u8 *
  285 smb_encode_smb_length(__u8 * p, __u32 len)
  286 {
  287         *p = 0;
  288         *(p+1) = 0;
  289         *(p+2) = (len & 0xFF00) >> 8;
  290         *(p+3) = (len & 0xFF);
  291         if (len > 0xFFFF)
  292         {
  293                 *(p+1) = 1;
  294         }
  295         return p + 4;
  296 }
  297 
  298 /*
  299  * smb_build_path: build the path to entry and name storing it in buf.
  300  * The path returned will have the trailing '\0'.
  301  */
  302 static int smb_build_path(struct smb_sb_info *server, unsigned char *buf,
  303                           int maxlen,
  304                           struct dentry *entry, struct qstr *name)
  305 {
  306         unsigned char *path = buf;
  307         int len;
  308         int unicode = (server->mnt->flags & SMB_MOUNT_UNICODE) != 0;
  309 
  310         if (maxlen < (2<<unicode))
  311                 return -ENAMETOOLONG;
  312 
  313         if (maxlen > SMB_MAXPATHLEN + 1)
  314                 maxlen = SMB_MAXPATHLEN + 1;
  315 
  316         if (entry == NULL)
  317                 goto test_name_and_out;
  318 
  319         /*
  320          * If IS_ROOT, we have to do no walking at all.
  321          */
  322         if (IS_ROOT(entry) && !name) {
  323                 *path++ = '\\';
  324                 if (unicode) *path++ = '\0';
  325                 *path++ = '\0';
  326                 if (unicode) *path++ = '\0';
  327                 return path-buf;
  328         }
  329 
  330         /*
  331          * Build the path string walking the tree backward from end to ROOT
  332          * and store it in reversed order [see reverse_string()]
  333          */
  334         dget(entry);
  335         spin_lock(&entry->d_lock);
  336         while (!IS_ROOT(entry)) {
  337                 struct dentry *parent;
  338 
  339                 if (maxlen < (3<<unicode)) {
  340                         spin_unlock(&entry->d_lock);
  341                         dput(entry);
  342                         return -ENAMETOOLONG;
  343                 }
  344 
  345                 len = server->ops->convert(path, maxlen-2, 
  346                                       entry->d_name.name, entry->d_name.len,
  347                                       server->local_nls, server->remote_nls);
  348                 if (len < 0) {
  349                         spin_unlock(&entry->d_lock);
  350                         dput(entry);
  351                         return len;
  352                 }
  353                 reverse_string(path, len);
  354                 path += len;
  355                 if (unicode) {
  356                         /* Note: reverse order */
  357                         *path++ = '\0';
  358                         maxlen--;
  359                 }
  360                 *path++ = '\\';
  361                 maxlen -= len+1;
  362 
  363                 parent = entry->d_parent;
  364                 dget(parent);
  365                 spin_unlock(&entry->d_lock);
  366                 dput(entry);
  367                 entry = parent;
  368                 spin_lock(&entry->d_lock);
  369         }
  370         spin_unlock(&entry->d_lock);
  371         dput(entry);
  372         reverse_string(buf, path-buf);
  373 
  374         /* maxlen has space for at least one char */
  375 test_name_and_out:
  376         if (name) {
  377                 if (maxlen < (3<<unicode))
  378                         return -ENAMETOOLONG;
  379                 *path++ = '\\';
  380                 if (unicode) {
  381                         *path++ = '\0';
  382                         maxlen--;
  383                 }
  384                 len = server->ops->convert(path, maxlen-2, 
  385                                       name->name, name->len,
  386                                       server->local_nls, server->remote_nls);
  387                 if (len < 0)
  388                         return len;
  389                 path += len;
  390                 maxlen -= len+1;
  391         }
  392         /* maxlen has space for at least one char */
  393         *path++ = '\0';
  394         if (unicode) *path++ = '\0';
  395         return path-buf;
  396 }
  397 
  398 static int smb_encode_path(struct smb_sb_info *server, char *buf, int maxlen,
  399                            struct dentry *dir, struct qstr *name)
  400 {
  401         int result;
  402 
  403         result = smb_build_path(server, buf, maxlen, dir, name);
  404         if (result < 0)
  405                 goto out;
  406         if (server->opt.protocol <= SMB_PROTOCOL_COREPLUS)
  407                 str_upper(buf, result);
  408 out:
  409         return result;
  410 }
  411 
  412 /* encode_path for non-trans2 request SMBs */
  413 static int smb_simple_encode_path(struct smb_request *req, char **p,
  414                                   struct dentry * entry, struct qstr * name)
  415 {
  416         struct smb_sb_info *server = req->rq_server;
  417         char *s = *p;
  418         int res;
  419         int maxlen = ((char *)req->rq_buffer + req->rq_bufsize) - s;
  420         int unicode = (server->mnt->flags & SMB_MOUNT_UNICODE);
  421 
  422         if (!maxlen)
  423                 return -ENAMETOOLONG;
  424         *s++ = 4;       /* ASCII data format */
  425 
  426         /*
  427          * SMB Unicode strings must be 16bit aligned relative the start of the
  428          * packet. If they are not they must be padded with 0.
  429          */
  430         if (unicode) {
  431                 int align = s - (char *)req->rq_buffer;
  432                 if (!(align & 1)) {
  433                         *s++ = '\0';
  434                         maxlen--;
  435                 }
  436         }
  437 
  438         res = smb_encode_path(server, s, maxlen-1, entry, name);
  439         if (res < 0)
  440                 return res;
  441         *p = s + res;
  442         return 0;
  443 }
  444 
  445 /* The following are taken directly from msdos-fs */
  446 
  447 /* Linear day numbers of the respective 1sts in non-leap years. */
  448 
  449 static int day_n[] =
  450 {0, 31, 59, 90, 120, 151, 181, 212, 243, 273, 304, 334, 0, 0, 0, 0};
  451                   /* JanFebMarApr May Jun Jul Aug Sep Oct Nov Dec */
  452 
  453 
  454 static time_t
  455 utc2local(struct smb_sb_info *server, time_t time)
  456 {
  457         return time - server->opt.serverzone*60;
  458 }
  459 
  460 static time_t
  461 local2utc(struct smb_sb_info *server, time_t time)
  462 {
  463         return time + server->opt.serverzone*60;
  464 }
  465 
  466 /* Convert a MS-DOS time/date pair to a UNIX date (seconds since 1 1 70). */
  467 
  468 static time_t
  469 date_dos2unix(struct smb_sb_info *server, __u16 date, __u16 time)
  470 {
  471         int month, year;
  472         time_t secs;
  473 
  474         /* first subtract and mask after that... Otherwise, if
  475            date == 0, bad things happen */
  476         month = ((date >> 5) - 1) & 15;
  477         year = date >> 9;
  478         secs = (time & 31) * 2 + 60 * ((time >> 5) & 63) + (time >> 11) * 3600 + 86400 *
  479             ((date & 31) - 1 + day_n[month] + (year / 4) + year * 365 - ((year & 3) == 0 &&
  480                                                    month < 2 ? 1 : 0) + 3653);
  481         /* days since 1.1.70 plus 80's leap day */
  482         return local2utc(server, secs);
  483 }
  484 
  485 
  486 /* Convert linear UNIX date to a MS-DOS time/date pair. */
  487 
  488 static void
  489 date_unix2dos(struct smb_sb_info *server,
  490               int unix_date, __u16 *date, __u16 *time)
  491 {
  492         int day, year, nl_day, month;
  493 
  494         unix_date = utc2local(server, unix_date);
  495         if (unix_date < 315532800)
  496                 unix_date = 315532800;
  497 
  498         *time = (unix_date % 60) / 2 +
  499                 (((unix_date / 60) % 60) << 5) +
  500                 (((unix_date / 3600) % 24) << 11);
  501 
  502         day = unix_date / 86400 - 3652;
  503         year = day / 365;
  504         if ((year + 3) / 4 + 365 * year > day)
  505                 year--;
  506         day -= (year + 3) / 4 + 365 * year;
  507         if (day == 59 && !(year & 3)) {
  508                 nl_day = day;
  509                 month = 2;
  510         } else {
  511                 nl_day = (year & 3) || day <= 59 ? day : day - 1;
  512                 for (month = 1; month < 12; month++)
  513                         if (day_n[month] > nl_day)
  514                                 break;
  515         }
  516         *date = nl_day - day_n[month - 1] + 1 + (month << 5) + (year << 9);
  517 }
  518 
  519 /* The following are taken from fs/ntfs/util.c */
  520 
  521 #define NTFS_TIME_OFFSET ((u64)(369*365 + 89) * 24 * 3600 * 10000000)
  522 
  523 /*
  524  * Convert the NT UTC (based 1601-01-01, in hundred nanosecond units)
  525  * into Unix UTC (based 1970-01-01, in seconds).
  526  */
  527 static struct timespec
  528 smb_ntutc2unixutc(u64 ntutc)
  529 {
  530         struct timespec ts;
  531         /* FIXME: what about the timezone difference? */
  532         /* Subtract the NTFS time offset, then convert to 1s intervals. */
  533         u64 t = ntutc - NTFS_TIME_OFFSET;
  534         ts.tv_nsec = do_div(t, 10000000) * 100;
  535         ts.tv_sec = t; 
  536         return ts;
  537 }
  538 
  539 /* Convert the Unix UTC into NT time */
  540 static u64
  541 smb_unixutc2ntutc(struct timespec ts)
  542 {
  543         /* Note: timezone conversion is probably wrong. */
  544         /* return ((u64)utc2local(server, t)) * 10000000 + NTFS_TIME_OFFSET; */
  545         return ((u64)ts.tv_sec) * 10000000 + ts.tv_nsec/100 + NTFS_TIME_OFFSET;
  546 }
  547 
  548 #define MAX_FILE_MODE   6
  549 static mode_t file_mode[] = {
  550         S_IFREG, S_IFDIR, S_IFLNK, S_IFCHR, S_IFBLK, S_IFIFO, S_IFSOCK
  551 };
  552 
  553 static int smb_filetype_to_mode(u32 filetype)
  554 {
  555         if (filetype > MAX_FILE_MODE) {
  556                 PARANOIA("Filetype out of range: %d\n", filetype);
  557                 return S_IFREG;
  558         }
  559         return file_mode[filetype];
  560 }
  561 
  562 static u32 smb_filetype_from_mode(int mode)
  563 {
  564         if (S_ISREG(mode))
  565                 return UNIX_TYPE_FILE;
  566         if (S_ISDIR(mode))
  567                 return UNIX_TYPE_DIR;
  568         if (S_ISLNK(mode))
  569                 return UNIX_TYPE_SYMLINK;
  570         if (S_ISCHR(mode))
  571                 return UNIX_TYPE_CHARDEV;
  572         if (S_ISBLK(mode))
  573                 return UNIX_TYPE_BLKDEV;
  574         if (S_ISFIFO(mode))
  575                 return UNIX_TYPE_FIFO;
  576         if (S_ISSOCK(mode))
  577                 return UNIX_TYPE_SOCKET;
  578         return UNIX_TYPE_UNKNOWN;
  579 }
  580 
  581 
  582 /*****************************************************************************/
  583 /*                                                                           */
  584 /*  Support section.                                                         */
  585 /*                                                                           */
  586 /*****************************************************************************/
  587 
  588 __u32
  589 smb_len(__u8 * p)
  590 {
  591         return ((*(p+1) & 0x1) << 16L) | (*(p+2) << 8L) | *(p+3);
  592 }
  593 
  594 static __u16
  595 smb_bcc(__u8 * packet)
  596 {
  597         int pos = SMB_HEADER_LEN + SMB_WCT(packet) * sizeof(__u16);
  598         return WVAL(packet, pos);
  599 }
  600 
  601 /* smb_valid_packet: We check if packet fulfills the basic
  602    requirements of a smb packet */
  603 
  604 static int
  605 smb_valid_packet(__u8 * packet)
  606 {
  607         return (packet[4] == 0xff
  608                 && packet[5] == 'S'
  609                 && packet[6] == 'M'
  610                 && packet[7] == 'B'
  611                 && (smb_len(packet) + 4 == SMB_HEADER_LEN
  612                     + SMB_WCT(packet) * 2 + smb_bcc(packet)));
  613 }
  614 
  615 /* smb_verify: We check if we got the answer we expected, and if we
  616    got enough data. If bcc == -1, we don't care. */
  617 
  618 static int
  619 smb_verify(__u8 * packet, int command, int wct, int bcc)
  620 {
  621         if (SMB_CMD(packet) != command)
  622                 goto bad_command;
  623         if (SMB_WCT(packet) < wct)
  624                 goto bad_wct;
  625         if (bcc != -1 && smb_bcc(packet) < bcc)
  626                 goto bad_bcc;
  627         return 0;
  628 
  629 bad_command:
  630         printk(KERN_ERR "smb_verify: command=%x, SMB_CMD=%x??\n",
  631                command, SMB_CMD(packet));
  632         goto fail;
  633 bad_wct:
  634         printk(KERN_ERR "smb_verify: command=%x, wct=%d, SMB_WCT=%d??\n",
  635                command, wct, SMB_WCT(packet));
  636         goto fail;
  637 bad_bcc:
  638         printk(KERN_ERR "smb_verify: command=%x, bcc=%d, SMB_BCC=%d??\n",
  639                command, bcc, smb_bcc(packet));
  640 fail:
  641         return -EIO;
  642 }
  643 
  644 /*
  645  * Returns the maximum read or write size for the "payload". Making all of the
  646  * packet fit within the negotiated max_xmit size.
  647  *
  648  * N.B. Since this value is usually computed before locking the server,
  649  * the server's packet size must never be decreased!
  650  */
  651 static inline int
  652 smb_get_xmitsize(struct smb_sb_info *server, int overhead)
  653 {
  654         return server->opt.max_xmit - overhead;
  655 }
  656 
  657 /*
  658  * Calculate the maximum read size
  659  */
  660 int
  661 smb_get_rsize(struct smb_sb_info *server)
  662 {
  663         /* readX has 12 parameters, read has 5 */
  664         int overhead = SMB_HEADER_LEN + 12 * sizeof(__u16) + 2 + 1 + 2;
  665         int size = smb_get_xmitsize(server, overhead);
  666 
  667         VERBOSE("xmit=%d, size=%d\n", server->opt.max_xmit, size);
  668 
  669         return size;
  670 }
  671 
  672 /*
  673  * Calculate the maximum write size
  674  */
  675 int
  676 smb_get_wsize(struct smb_sb_info *server)
  677 {
  678         /* writeX has 14 parameters, write has 5 */
  679         int overhead = SMB_HEADER_LEN + 14 * sizeof(__u16) + 2 + 1 + 2;
  680         int size = smb_get_xmitsize(server, overhead);
  681 
  682         VERBOSE("xmit=%d, size=%d\n", server->opt.max_xmit, size);
  683 
  684         return size;
  685 }
  686 
  687 /*
  688  * Convert SMB error codes to -E... errno values.
  689  */
  690 int
  691 smb_errno(struct smb_request *req)
  692 {
  693         int errcls = req->rq_rcls;
  694         int error  = req->rq_err;
  695         char *class = "Unknown";
  696 
  697         VERBOSE("errcls %d  code %d  from command 0x%x\n",
  698                 errcls, error, SMB_CMD(req->rq_header));
  699 
  700         if (errcls == ERRDOS) {
  701                 switch (error) {
  702                 case ERRbadfunc:
  703                         return -EINVAL;
  704                 case ERRbadfile:
  705                 case ERRbadpath:
  706                         return -ENOENT;
  707                 case ERRnofids:
  708                         return -EMFILE;
  709                 case ERRnoaccess:
  710                         return -EACCES;
  711                 case ERRbadfid:
  712                         return -EBADF;
  713                 case ERRbadmcb:
  714                         return -EREMOTEIO;
  715                 case ERRnomem:
  716                         return -ENOMEM;
  717                 case ERRbadmem:
  718                         return -EFAULT;
  719                 case ERRbadenv:
  720                 case ERRbadformat:
  721                         return -EREMOTEIO;
  722                 case ERRbadaccess:
  723                         return -EACCES;
  724                 case ERRbaddata:
  725                         return -E2BIG;
  726                 case ERRbaddrive:
  727                         return -ENXIO;
  728                 case ERRremcd:
  729                         return -EREMOTEIO;
  730                 case ERRdiffdevice:
  731                         return -EXDEV;
  732                 case ERRnofiles:
  733                         return -ENOENT;
  734                 case ERRbadshare:
  735                         return -ETXTBSY;
  736                 case ERRlock:
  737                         return -EDEADLK;
  738                 case ERRfilexists:
  739                         return -EEXIST;
  740                 case ERROR_INVALID_PARAMETER:
  741                         return -EINVAL;
  742                 case ERROR_DISK_FULL:
  743                         return -ENOSPC;
  744                 case ERROR_INVALID_NAME:
  745                         return -ENOENT;
  746                 case ERROR_DIR_NOT_EMPTY:
  747                         return -ENOTEMPTY;
  748                 case ERROR_NOT_LOCKED:
  749                        return -ENOLCK;
  750                 case ERROR_ALREADY_EXISTS:
  751                         return -EEXIST;
  752                 default:
  753                         class = "ERRDOS";
  754                         goto err_unknown;
  755                 }
  756         } else if (errcls == ERRSRV) {
  757                 switch (error) {
  758                 /* N.B. This is wrong ... EIO ? */
  759                 case ERRerror:
  760                         return -ENFILE;
  761                 case ERRbadpw:
  762                         return -EINVAL;
  763                 case ERRbadtype:
  764                 case ERRtimeout:
  765                         return -EIO;
  766                 case ERRaccess:
  767                         return -EACCES;
  768                 /*
  769                  * This is a fatal error, as it means the "tree ID"
  770                  * for this connection is no longer valid. We map
  771                  * to a special error code and get a new connection.
  772                  */
  773                 case ERRinvnid:
  774                         return -EBADSLT;
  775                 default:
  776                         class = "ERRSRV";
  777                         goto err_unknown;
  778                 }
  779         } else if (errcls == ERRHRD) {
  780                 switch (error) {
  781                 case ERRnowrite:
  782                         return -EROFS;
  783                 case ERRbadunit:
  784                         return -ENODEV;
  785                 case ERRnotready:
  786                         return -EUCLEAN;
  787                 case ERRbadcmd:
  788                 case ERRdata:
  789                         return -EIO;
  790                 case ERRbadreq:
  791                         return -ERANGE;
  792                 case ERRbadshare:
  793                         return -ETXTBSY;
  794                 case ERRlock:
  795                         return -EDEADLK;
  796                 case ERRdiskfull:
  797                         return -ENOSPC;
  798                 default:
  799                         class = "ERRHRD";
  800                         goto err_unknown;
  801                 }
  802         } else if (errcls == ERRCMD) {
  803                 class = "ERRCMD";
  804         } else if (errcls == SUCCESS) {
  805                 return 0;       /* This is the only valid 0 return */
  806         }
  807 
  808 err_unknown:
  809         printk(KERN_ERR "smb_errno: class %s, code %d from command 0x%x\n",
  810                class, error, SMB_CMD(req->rq_header));
  811         return -EIO;
  812 }
  813 
  814 /* smb_request_ok: We expect the server to be locked. Then we do the
  815    request and check the answer completely. When smb_request_ok
  816    returns 0, you can be quite sure that everything went well. When
  817    the answer is <=0, the returned number is a valid unix errno. */
  818 
  819 static int
  820 smb_request_ok(struct smb_request *req, int command, int wct, int bcc)
  821 {
  822         int result;
  823 
  824         req->rq_resp_wct = wct;
  825         req->rq_resp_bcc = bcc;
  826 
  827         result = smb_add_request(req);
  828         if (result != 0) {
  829                 DEBUG1("smb_request failed\n");
  830                 goto out;
  831         }
  832 
  833         if (smb_valid_packet(req->rq_header) != 0) {
  834                 PARANOIA("invalid packet!\n");
  835                 goto out;
  836         }
  837 
  838         result = smb_verify(req->rq_header, command, wct, bcc);
  839 
  840 out:
  841         return result;
  842 }
  843 
  844 /*
  845  * This implements the NEWCONN ioctl. It installs the server pid,
  846  * sets server->state to CONN_VALID, and wakes up the waiting process.
  847  */
  848 int
  849 smb_newconn(struct smb_sb_info *server, struct smb_conn_opt *opt)
  850 {
  851         struct file *filp;
  852         struct sock *sk;
  853         int error;
  854 
  855         VERBOSE("fd=%d, pid=%d\n", opt->fd, current->pid);
  856 
  857         smb_lock_server(server);
  858 
  859         /*
  860          * Make sure we don't already have a valid connection ...
  861          */
  862         error = -EINVAL;
  863         if (server->state == CONN_VALID)
  864                 goto out;
  865 
  866         error = -EACCES;
  867         if (current_uid() != server->mnt->mounted_uid &&
  868             !capable(CAP_SYS_ADMIN))
  869                 goto out;
  870 
  871         error = -EBADF;
  872         filp = fget(opt->fd);
  873         if (!filp)
  874                 goto out;
  875         if (!smb_valid_socket(filp->f_path.dentry->d_inode))
  876                 goto out_putf;
  877 
  878         server->sock_file = filp;
  879         server->conn_pid = get_pid(task_pid(current));
  880         server->opt = *opt;
  881         server->generation += 1;
  882         server->state = CONN_VALID;
  883         error = 0;
  884 
  885         if (server->conn_error) {
  886                 /*
  887                  * conn_error is the returncode we originally decided to
  888                  * drop the old connection on. This message should be positive
  889                  * and not make people ask questions on why smbfs is printing
  890                  * error messages ...
  891                  */
  892                 printk(KERN_INFO "SMB connection re-established (%d)\n",
  893                        server->conn_error);
  894                 server->conn_error = 0;
  895         }
  896 
  897         /*
  898          * Store the server in sock user_data (Only used by sunrpc)
  899          */
  900         sk = SOCKET_I(filp->f_path.dentry->d_inode)->sk;
  901         sk->sk_user_data = server;
  902 
  903         /* chain into the data_ready callback */
  904         server->data_ready = xchg(&sk->sk_data_ready, smb_data_ready);
  905 
  906         /* check if we have an old smbmount that uses seconds for the 
  907            serverzone */
  908         if (server->opt.serverzone > 12*60 || server->opt.serverzone < -12*60)
  909                 server->opt.serverzone /= 60;
  910 
  911         /* now that we have an established connection we can detect the server
  912            type and enable bug workarounds */
  913         if (server->opt.protocol < SMB_PROTOCOL_LANMAN2)
  914                 install_ops(server->ops, &smb_ops_core);
  915         else if (server->opt.protocol == SMB_PROTOCOL_LANMAN2)
  916                 install_ops(server->ops, &smb_ops_os2);
  917         else if (server->opt.protocol == SMB_PROTOCOL_NT1 &&
  918                  (server->opt.max_xmit < 0x1000) &&
  919                  !(server->opt.capabilities & SMB_CAP_NT_SMBS)) {
  920                 /* FIXME: can we kill the WIN95 flag now? */
  921                 server->mnt->flags |= SMB_MOUNT_WIN95;
  922                 VERBOSE("detected WIN95 server\n");
  923                 install_ops(server->ops, &smb_ops_win95);
  924         } else {
  925                 /*
  926                  * Samba has max_xmit 65535
  927                  * NT4spX has max_xmit 4536 (or something like that)
  928                  * win2k has ...
  929                  */
  930                 VERBOSE("detected NT1 (Samba, NT4/5) server\n");
  931                 install_ops(server->ops, &smb_ops_winNT);
  932         }
  933 
  934         /* FIXME: the win9x code wants to modify these ... (seek/trunc bug) */
  935         if (server->mnt->flags & SMB_MOUNT_OLDATTR) {
  936                 server->ops->getattr = smb_proc_getattr_core;
  937         } else if (server->mnt->flags & SMB_MOUNT_DIRATTR) {
  938                 server->ops->getattr = smb_proc_getattr_ff;
  939         }
  940 
  941         /* Decode server capabilities */
  942         if (server->opt.capabilities & SMB_CAP_LARGE_FILES) {
  943                 /* Should be ok to set this now, as no one can access the
  944                    mount until the connection has been established. */
  945                 SB_of(server)->s_maxbytes = ~0ULL >> 1;
  946                 VERBOSE("LFS enabled\n");
  947         }
  948         if (server->opt.capabilities & SMB_CAP_UNICODE) {
  949                 server->mnt->flags |= SMB_MOUNT_UNICODE;
  950                 VERBOSE("Unicode enabled\n");
  951         } else {
  952                 server->mnt->flags &= ~SMB_MOUNT_UNICODE;
  953         }
  954 #if 0
  955         /* flags we may test for other patches ... */
  956         if (server->opt.capabilities & SMB_CAP_LARGE_READX) {
  957                 VERBOSE("Large reads enabled\n");
  958         }
  959         if (server->opt.capabilities & SMB_CAP_LARGE_WRITEX) {
  960                 VERBOSE("Large writes enabled\n");
  961         }
  962 #endif
  963         if (server->opt.capabilities & SMB_CAP_UNIX) {
  964                 struct inode *inode;
  965                 VERBOSE("Using UNIX CIFS extensions\n");
  966                 install_ops(server->ops, &smb_ops_unix);
  967                 inode = SB_of(server)->s_root->d_inode;
  968                 if (inode)
  969                         inode->i_op = &smb_dir_inode_operations_unix;
  970         }
  971 
  972         VERBOSE("protocol=%d, max_xmit=%d, pid=%d capabilities=0x%x\n",
  973                 server->opt.protocol, server->opt.max_xmit,
  974                 pid_nr(server->conn_pid), server->opt.capabilities);
  975 
  976         /* FIXME: this really should be done by smbmount. */
  977         if (server->opt.max_xmit > SMB_MAX_PACKET_SIZE) {
  978                 server->opt.max_xmit = SMB_MAX_PACKET_SIZE;
  979         }
  980 
  981         smb_unlock_server(server);
  982         smbiod_wake_up();
  983         if (server->opt.capabilities & SMB_CAP_UNIX)
  984                 smb_proc_query_cifsunix(server);
  985 
  986         server->conn_complete++;
  987         wake_up_interruptible_all(&server->conn_wq);
  988         return error;
  989 
  990 out:
  991         smb_unlock_server(server);
  992         smbiod_wake_up();
  993         return error;
  994 
  995 out_putf:
  996         fput(filp);
  997         goto out;
  998 }
  999 
 1000 /* smb_setup_header: We completely set up the packet. You only have to
 1001    insert the command-specific fields */
 1002 
 1003 __u8 *
 1004 smb_setup_header(struct smb_request *req, __u8 command, __u16 wct, __u16 bcc)
 1005 {
 1006         __u32 xmit_len = SMB_HEADER_LEN + wct * sizeof(__u16) + bcc + 2;
 1007         __u8 *p = req->rq_header;
 1008         struct smb_sb_info *server = req->rq_server;
 1009 
 1010         p = smb_encode_smb_length(p, xmit_len - 4);
 1011 
 1012         *p++ = 0xff;
 1013         *p++ = 'S';
 1014         *p++ = 'M';
 1015         *p++ = 'B';
 1016         *p++ = command;
 1017 
 1018         memset(p, '\0', 19);
 1019         p += 19;
 1020         p += 8;
 1021 
 1022         if (server->opt.protocol > SMB_PROTOCOL_CORE) {
 1023                 int flags = SMB_FLAGS_CASELESS_PATHNAMES;
 1024                 int flags2 = SMB_FLAGS2_LONG_PATH_COMPONENTS |
 1025                         SMB_FLAGS2_EXTENDED_ATTRIBUTES; /* EA? not really ... */
 1026 
 1027                 *(req->rq_header + smb_flg) = flags;
 1028                 if (server->mnt->flags & SMB_MOUNT_UNICODE)
 1029                         flags2 |= SMB_FLAGS2_UNICODE_STRINGS;
 1030                 WSET(req->rq_header, smb_flg2, flags2);
 1031         }
 1032         *p++ = wct;             /* wct */
 1033         p += 2 * wct;
 1034         WSET(p, 0, bcc);
 1035 
 1036         /* Include the header in the data to send */
 1037         req->rq_iovlen = 1;
 1038         req->rq_iov[0].iov_base = req->rq_header;
 1039         req->rq_iov[0].iov_len  = xmit_len - bcc;
 1040 
 1041         return req->rq_buffer;
 1042 }
 1043 
 1044 static void
 1045 smb_setup_bcc(struct smb_request *req, __u8 *p)
 1046 {
 1047         u16 bcc = p - req->rq_buffer;
 1048         u8 *pbcc = req->rq_header + SMB_HEADER_LEN + 2*SMB_WCT(req->rq_header);
 1049 
 1050         WSET(pbcc, 0, bcc);
 1051 
 1052         smb_encode_smb_length(req->rq_header, SMB_HEADER_LEN + 
 1053                               2*SMB_WCT(req->rq_header) - 2 + bcc);
 1054 
 1055         /* Include the "bytes" in the data to send */
 1056         req->rq_iovlen = 2;
 1057         req->rq_iov[1].iov_base = req->rq_buffer;
 1058         req->rq_iov[1].iov_len  = bcc;
 1059 }
 1060 
 1061 static int
 1062 smb_proc_seek(struct smb_sb_info *server, __u16 fileid,
 1063               __u16 mode, off_t offset)
 1064 {
 1065         int result;
 1066         struct smb_request *req;
 1067 
 1068         result = -ENOMEM;
 1069         if (! (req = smb_alloc_request(server, 0)))
 1070                 goto out;
 1071 
 1072         smb_setup_header(req, SMBlseek, 4, 0);
 1073         WSET(req->rq_header, smb_vwv0, fileid);
 1074         WSET(req->rq_header, smb_vwv1, mode);
 1075         DSET(req->rq_header, smb_vwv2, offset);
 1076         req->rq_flags |= SMB_REQ_NORETRY;
 1077 
 1078         result = smb_request_ok(req, SMBlseek, 2, 0);
 1079         if (result < 0) {
 1080                 result = 0;
 1081                 goto out_free;
 1082         }
 1083 
 1084         result = DVAL(req->rq_header, smb_vwv0);
 1085 out_free:
 1086         smb_rput(req);
 1087 out:
 1088         return result;
 1089 }
 1090 
 1091 static int
 1092 smb_proc_open(struct smb_sb_info *server, struct dentry *dentry, int wish)
 1093 {
 1094         struct inode *ino = dentry->d_inode;
 1095         struct smb_inode_info *ei = SMB_I(ino);
 1096         int mode, read_write = 0x42, read_only = 0x40;
 1097         int res;
 1098         char *p;
 1099         struct smb_request *req;
 1100 
 1101         /*
 1102          * Attempt to open r/w, unless there are no write privileges.
 1103          */
 1104         mode = read_write;
 1105         if (!(ino->i_mode & (S_IWUSR | S_IWGRP | S_IWOTH)))
 1106                 mode = read_only;
 1107 #if 0
 1108         /* FIXME: why is this code not in? below we fix it so that a caller
 1109            wanting RO doesn't get RW. smb_revalidate_inode does some 
 1110            optimization based on access mode. tail -f needs it to be correct.
 1111 
 1112            We must open rw since we don't do the open if called a second time
 1113            with different 'wish'. Is that not supported by smb servers? */
 1114         if (!(wish & (O_WRONLY | O_RDWR)))
 1115                 mode = read_only;
 1116 #endif
 1117 
 1118         res = -ENOMEM;
 1119         if (! (req = smb_alloc_request(server, PAGE_SIZE)))
 1120                 goto out;
 1121 
 1122       retry:
 1123         p = smb_setup_header(req, SMBopen, 2, 0);
 1124         WSET(req->rq_header, smb_vwv0, mode);
 1125         WSET(req->rq_header, smb_vwv1, aSYSTEM | aHIDDEN | aDIR);
 1126         res = smb_simple_encode_path(req, &p, dentry, NULL);
 1127         if (res < 0)
 1128                 goto out_free;
 1129         smb_setup_bcc(req, p);
 1130 
 1131         res = smb_request_ok(req, SMBopen, 7, 0);
 1132         if (res != 0) {
 1133                 if (mode == read_write &&
 1134                     (res == -EACCES || res == -ETXTBSY || res == -EROFS))
 1135                 {
 1136                         VERBOSE("%s/%s R/W failed, error=%d, retrying R/O\n",
 1137                                 DENTRY_PATH(dentry), res);
 1138                         mode = read_only;
 1139                         req->rq_flags = 0;
 1140                         goto retry;
 1141                 }
 1142                 goto out_free;
 1143         }
 1144         /* We should now have data in vwv[0..6]. */
 1145 
 1146         ei->fileid = WVAL(req->rq_header, smb_vwv0);
 1147         ei->attr   = WVAL(req->rq_header, smb_vwv1);
 1148         /* smb_vwv2 has mtime */
 1149         /* smb_vwv4 has size  */
 1150         ei->access = (WVAL(req->rq_header, smb_vwv6) & SMB_ACCMASK);
 1151         ei->open = server->generation;
 1152 
 1153 out_free:
 1154         smb_rput(req);
 1155 out:
 1156         return res;
 1157 }
 1158 
 1159 /*
 1160  * Make sure the file is open, and check that the access
 1161  * is compatible with the desired access.
 1162  */
 1163 int
 1164 smb_open(struct dentry *dentry, int wish)
 1165 {
 1166         struct inode *inode = dentry->d_inode;
 1167         int result;
 1168         __u16 access;
 1169 
 1170         result = -ENOENT;
 1171         if (!inode) {
 1172                 printk(KERN_ERR "smb_open: no inode for dentry %s/%s\n",
 1173                        DENTRY_PATH(dentry));
 1174                 goto out;
 1175         }
 1176 
 1177         if (!smb_is_open(inode)) {
 1178                 struct smb_sb_info *server = server_from_inode(inode);
 1179                 result = 0;
 1180                 if (!smb_is_open(inode))
 1181                         result = smb_proc_open(server, dentry, wish);
 1182                 if (result)
 1183                         goto out;
 1184                 /*
 1185                  * A successful open means the path is still valid ...
 1186                  */
 1187                 smb_renew_times(dentry);
 1188         }
 1189 
 1190         /*
 1191          * Check whether the access is compatible with the desired mode.
 1192          */
 1193         result = 0;
 1194         access = SMB_I(inode)->access;
 1195         if (access != wish && access != SMB_O_RDWR) {
 1196                 PARANOIA("%s/%s access denied, access=%x, wish=%x\n",
 1197                          DENTRY_PATH(dentry), access, wish);
 1198                 result = -EACCES;
 1199         }
 1200 out:
 1201         return result;
 1202 }
 1203 
 1204 static int 
 1205 smb_proc_close(struct smb_sb_info *server, __u16 fileid, __u32 mtime)
 1206 {
 1207         struct smb_request *req;
 1208         int result = -ENOMEM;
 1209 
 1210         if (! (req = smb_alloc_request(server, 0)))
 1211                 goto out;
 1212 
 1213         smb_setup_header(req, SMBclose, 3, 0);
 1214         WSET(req->rq_header, smb_vwv0, fileid);
 1215         DSET(req->rq_header, smb_vwv1, utc2local(server, mtime));
 1216         req->rq_flags |= SMB_REQ_NORETRY;
 1217         result = smb_request_ok(req, SMBclose, 0, 0);
 1218 
 1219         smb_rput(req);
 1220 out:
 1221         return result;
 1222 }
 1223 
 1224 /*
 1225  * Win NT 4.0 has an apparent bug in that it fails to update the
 1226  * modify time when writing to a file. As a workaround, we update
 1227  * both modify and access time locally, and post the times to the
 1228  * server when closing the file.
 1229  */
 1230 static int 
 1231 smb_proc_close_inode(struct smb_sb_info *server, struct inode * ino)
 1232 {
 1233         struct smb_inode_info *ei = SMB_I(ino);
 1234         int result = 0;
 1235         if (smb_is_open(ino))
 1236         {
 1237                 /*
 1238                  * We clear the open flag in advance, in case another
 1239                  * process observes the value while we block below.
 1240                  */
 1241                 ei->open = 0;
 1242 
 1243                 /*
 1244                  * Kludge alert: SMB timestamps are accurate only to
 1245                  * two seconds ... round the times to avoid needless
 1246                  * cache invalidations!
 1247                  */
 1248                 if (ino->i_mtime.tv_sec & 1) { 
 1249                         ino->i_mtime.tv_sec--;
 1250                         ino->i_mtime.tv_nsec = 0; 
 1251                 }
 1252                 if (ino->i_atime.tv_sec & 1) {
 1253                         ino->i_atime.tv_sec--;
 1254                         ino->i_atime.tv_nsec = 0;
 1255                 }
 1256                 /*
 1257                  * If the file is open with write permissions,
 1258                  * update the time stamps to sync mtime and atime.
 1259                  */
 1260                 if ((server->opt.capabilities & SMB_CAP_UNIX) == 0 &&
 1261                     (server->opt.protocol >= SMB_PROTOCOL_LANMAN2) &&
 1262                     !(ei->access == SMB_O_RDONLY))
 1263                 {
 1264                         struct smb_fattr fattr;
 1265                         smb_get_inode_attr(ino, &fattr);
 1266                         smb_proc_setattr_ext(server, ino, &fattr);
 1267                 }
 1268 
 1269                 result = smb_proc_close(server, ei->fileid, ino->i_mtime.tv_sec);
 1270                 /*
 1271                  * Force a revalidation after closing ... some servers
 1272                  * don't post the size until the file has been closed.
 1273                  */
 1274                 if (server->opt.protocol < SMB_PROTOCOL_NT1)
 1275                         ei->oldmtime = 0;
 1276                 ei->closed = jiffies;
 1277         }
 1278         return result;
 1279 }
 1280 
 1281 int
 1282 smb_close(struct inode *ino)
 1283 {
 1284         int result = 0;
 1285 
 1286         if (smb_is_open(ino)) {
 1287                 struct smb_sb_info *server = server_from_inode(ino);
 1288                 result = smb_proc_close_inode(server, ino);
 1289         }
 1290         return result;
 1291 }
 1292 
 1293 /*
 1294  * This is used to close a file following a failed instantiate.
 1295  * Since we don't have an inode, we can't use any of the above.
 1296  */
 1297 int
 1298 smb_close_fileid(struct dentry *dentry, __u16 fileid)
 1299 {
 1300         struct smb_sb_info *server = server_from_dentry(dentry);
 1301         int result;
 1302 
 1303         result = smb_proc_close(server, fileid, get_seconds());
 1304         return result;
 1305 }
 1306 
 1307 /* In smb_proc_read and smb_proc_write we do not retry, because the
 1308    file-id would not be valid after a reconnection. */
 1309 
 1310 static void
 1311 smb_proc_read_data(struct smb_request *req)
 1312 {
 1313         req->rq_iov[0].iov_base = req->rq_buffer;
 1314         req->rq_iov[0].iov_len  = 3;
 1315 
 1316         req->rq_iov[1].iov_base = req->rq_page;
 1317         req->rq_iov[1].iov_len  = req->rq_rsize;
 1318         req->rq_iovlen = 2;
 1319 
 1320         req->rq_rlen = smb_len(req->rq_header) + 4 - req->rq_bytes_recvd;
 1321 }
 1322 
 1323 static int
 1324 smb_proc_read(struct inode *inode, loff_t offset, int count, char *data)
 1325 {
 1326         struct smb_sb_info *server = server_from_inode(inode);
 1327         __u16 returned_count, data_len;
 1328         unsigned char *buf;
 1329         int result;
 1330         struct smb_request *req;
 1331         u8 rbuf[4];
 1332 
 1333         result = -ENOMEM;
 1334         if (! (req = smb_alloc_request(server, 0)))
 1335                 goto out;
 1336 
 1337         smb_setup_header(req, SMBread, 5, 0);
 1338         buf = req->rq_header;
 1339         WSET(buf, smb_vwv0, SMB_I(inode)->fileid);
 1340         WSET(buf, smb_vwv1, count);
 1341         DSET(buf, smb_vwv2, offset);
 1342         WSET(buf, smb_vwv4, 0);
 1343 
 1344         req->rq_page = data;
 1345         req->rq_rsize = count;
 1346         req->rq_callback = smb_proc_read_data;
 1347         req->rq_buffer = rbuf;
 1348         req->rq_flags |= SMB_REQ_NORETRY | SMB_REQ_STATIC;
 1349 
 1350         result = smb_request_ok(req, SMBread, 5, -1);
 1351         if (result < 0)
 1352                 goto out_free;
 1353         returned_count = WVAL(req->rq_header, smb_vwv0);
 1354 
 1355         data_len = WVAL(rbuf, 1);
 1356 
 1357         if (returned_count != data_len) {
 1358                 printk(KERN_NOTICE "smb_proc_read: returned != data_len\n");
 1359                 printk(KERN_NOTICE "smb_proc_read: ret_c=%d, data_len=%d\n",
 1360                        returned_count, data_len);
 1361         }
 1362         result = data_len;
 1363 
 1364 out_free:
 1365         smb_rput(req);
 1366 out:
 1367         VERBOSE("ino=%ld, fileid=%d, count=%d, result=%d\n",
 1368                 inode->i_ino, SMB_I(inode)->fileid, count, result);
 1369         return result;
 1370 }
 1371 
 1372 static int
 1373 smb_proc_write(struct inode *inode, loff_t offset, int count, const char *data)
 1374 {
 1375         struct smb_sb_info *server = server_from_inode(inode);
 1376         int result;
 1377         u16 fileid = SMB_I(inode)->fileid;
 1378         u8 buf[4];
 1379         struct smb_request *req;
 1380 
 1381         result = -ENOMEM;
 1382         if (! (req = smb_alloc_request(server, 0)))
 1383                 goto out;
 1384 
 1385         VERBOSE("ino=%ld, fileid=%d, count=%d@%Ld\n",
 1386                 inode->i_ino, fileid, count, offset);
 1387 
 1388         smb_setup_header(req, SMBwrite, 5, count + 3);
 1389         WSET(req->rq_header, smb_vwv0, fileid);
 1390         WSET(req->rq_header, smb_vwv1, count);
 1391         DSET(req->rq_header, smb_vwv2, offset);
 1392         WSET(req->rq_header, smb_vwv4, 0);
 1393 
 1394         buf[0] = 1;
 1395         WSET(buf, 1, count);    /* yes, again ... */
 1396         req->rq_iov[1].iov_base = buf;
 1397         req->rq_iov[1].iov_len = 3;
 1398         req->rq_iov[2].iov_base = (char *) data;
 1399         req->rq_iov[2].iov_len = count;
 1400         req->rq_iovlen = 3;
 1401         req->rq_flags |= SMB_REQ_NORETRY;
 1402 
 1403         result = smb_request_ok(req, SMBwrite, 1, 0);
 1404         if (result >= 0)
 1405                 result = WVAL(req->rq_header, smb_vwv0);
 1406 
 1407         smb_rput(req);
 1408 out:
 1409         return result;
 1410 }
 1411 
 1412 /*
 1413  * In smb_proc_readX and smb_proc_writeX we do not retry, because the
 1414  * file-id would not be valid after a reconnection.
 1415  */
 1416 
 1417 #define SMB_READX_MAX_PAD      64
 1418 static void
 1419 smb_proc_readX_data(struct smb_request *req)
 1420 {
 1421         /* header length, excluding the netbios length (-4) */
 1422         int hdrlen = SMB_HEADER_LEN + req->rq_resp_wct*2 - 2;
 1423         int data_off = WVAL(req->rq_header, smb_vwv6);
 1424 
 1425         /*
 1426          * Some genius made the padding to the data bytes arbitrary.
 1427          * So we must first calculate the amount of padding used by the server.
 1428          */
 1429         data_off -= hdrlen;
 1430         if (data_off > SMB_READX_MAX_PAD || data_off < 0) {
 1431                 PARANOIA("offset is larger than SMB_READX_MAX_PAD or negative!\n");
 1432                 PARANOIA("%d > %d || %d < 0\n", data_off, SMB_READX_MAX_PAD, data_off);
 1433                 req->rq_rlen = req->rq_bufsize + 1;
 1434                 return;
 1435         }
 1436         req->rq_iov[0].iov_base = req->rq_buffer;
 1437         req->rq_iov[0].iov_len  = data_off;
 1438 
 1439         req->rq_iov[1].iov_base = req->rq_page;
 1440         req->rq_iov[1].iov_len  = req->rq_rsize;
 1441         req->rq_iovlen = 2;
 1442 
 1443         req->rq_rlen = smb_len(req->rq_header) + 4 - req->rq_bytes_recvd;
 1444 }
 1445 
 1446 static int
 1447 smb_proc_readX(struct inode *inode, loff_t offset, int count, char *data)
 1448 {
 1449         struct smb_sb_info *server = server_from_inode(inode);
 1450         unsigned char *buf;
 1451         int result;
 1452         struct smb_request *req;
 1453         static char pad[SMB_READX_MAX_PAD];
 1454 
 1455         result = -ENOMEM;
 1456         if (! (req = smb_alloc_request(server, 0)))
 1457                 goto out;
 1458 
 1459         smb_setup_header(req, SMBreadX, 12, 0);
 1460         buf = req->rq_header;
 1461         WSET(buf, smb_vwv0, 0x00ff);
 1462         WSET(buf, smb_vwv1, 0);
 1463         WSET(buf, smb_vwv2, SMB_I(inode)->fileid);
 1464         DSET(buf, smb_vwv3, (u32)offset);               /* low 32 bits */
 1465         WSET(buf, smb_vwv5, count);
 1466         WSET(buf, smb_vwv6, 0);
 1467         DSET(buf, smb_vwv7, 0);
 1468         WSET(buf, smb_vwv9, 0);
 1469         DSET(buf, smb_vwv10, (u32)(offset >> 32));      /* high 32 bits */
 1470         WSET(buf, smb_vwv11, 0);
 1471 
 1472         req->rq_page = data;
 1473         req->rq_rsize = count;
 1474         req->rq_callback = smb_proc_readX_data;
 1475         req->rq_buffer = pad;
 1476         req->rq_bufsize = SMB_READX_MAX_PAD;
 1477         req->rq_flags |= SMB_REQ_STATIC | SMB_REQ_NORETRY;
 1478 
 1479         result = smb_request_ok(req, SMBreadX, 12, -1);
 1480         if (result < 0)
 1481                 goto out_free;
 1482         result = WVAL(req->rq_header, smb_vwv5);
 1483 
 1484 out_free:
 1485         smb_rput(req);
 1486 out:
 1487         VERBOSE("ino=%ld, fileid=%d, count=%d, result=%d\n",
 1488                 inode->i_ino, SMB_I(inode)->fileid, count, result);
 1489         return result;
 1490 }
 1491 
 1492 static int
 1493 smb_proc_writeX(struct inode *inode, loff_t offset, int count, const char *data)
 1494 {
 1495         struct smb_sb_info *server = server_from_inode(inode);
 1496         int result;
 1497         u8 *p;
 1498         static u8 pad[4];
 1499         struct smb_request *req;
 1500 
 1501         result = -ENOMEM;
 1502         if (! (req = smb_alloc_request(server, 0)))
 1503                 goto out;
 1504 
 1505         VERBOSE("ino=%ld, fileid=%d, count=%d@%Ld\n",
 1506                 inode->i_ino, SMB_I(inode)->fileid, count, offset);
 1507 
 1508         p = smb_setup_header(req, SMBwriteX, 14, count + 1);
 1509         WSET(req->rq_header, smb_vwv0, 0x00ff);
 1510         WSET(req->rq_header, smb_vwv1, 0);
 1511         WSET(req->rq_header, smb_vwv2, SMB_I(inode)->fileid);
 1512         DSET(req->rq_header, smb_vwv3, (u32)offset);    /* low 32 bits */
 1513         DSET(req->rq_header, smb_vwv5, 0);
 1514         WSET(req->rq_header, smb_vwv7, 0);              /* write mode */
 1515         WSET(req->rq_header, smb_vwv8, 0);
 1516         WSET(req->rq_header, smb_vwv9, 0);
 1517         WSET(req->rq_header, smb_vwv10, count);         /* data length */
 1518         WSET(req->rq_header, smb_vwv11, smb_vwv12 + 2 + 1);
 1519         DSET(req->rq_header, smb_vwv12, (u32)(offset >> 32));
 1520 
 1521         req->rq_iov[1].iov_base = pad;
 1522         req->rq_iov[1].iov_len = 1;
 1523         req->rq_iov[2].iov_base = (char *) data;
 1524         req->rq_iov[2].iov_len = count;
 1525         req->rq_iovlen = 3;
 1526         req->rq_flags |= SMB_REQ_NORETRY;
 1527 
 1528         result = smb_request_ok(req, SMBwriteX, 6, 0);
 1529         if (result >= 0)
 1530                 result = WVAL(req->rq_header, smb_vwv2);
 1531 
 1532         smb_rput(req);
 1533 out:
 1534         return result;
 1535 }
 1536 
 1537 int
 1538 smb_proc_create(struct dentry *dentry, __u16 attr, time_t ctime, __u16 *fileid)
 1539 {
 1540         struct smb_sb_info *server = server_from_dentry(dentry);
 1541         char *p;
 1542         int result;
 1543         struct smb_request *req;
 1544 
 1545         result = -ENOMEM;
 1546         if (! (req = smb_alloc_request(server, PAGE_SIZE)))
 1547                 goto out;
 1548 
 1549         p = smb_setup_header(req, SMBcreate, 3, 0);
 1550         WSET(req->rq_header, smb_vwv0, attr);
 1551         DSET(req->rq_header, smb_vwv1, utc2local(server, ctime));
 1552         result = smb_simple_encode_path(req, &p, dentry, NULL);
 1553         if (result < 0)
 1554                 goto out_free;
 1555         smb_setup_bcc(req, p);
 1556 
 1557         result = smb_request_ok(req, SMBcreate, 1, 0);
 1558         if (result < 0)
 1559                 goto out_free;
 1560 
 1561         *fileid = WVAL(req->rq_header, smb_vwv0);
 1562         result = 0;
 1563 
 1564 out_free:
 1565         smb_rput(req);
 1566 out:
 1567         return result;
 1568 }
 1569 
 1570 int
 1571 smb_proc_mv(struct dentry *old_dentry, struct dentry *new_dentry)
 1572 {
 1573         struct smb_sb_info *server = server_from_dentry(old_dentry);
 1574         char *p;
 1575         int result;
 1576         struct smb_request *req;
 1577 
 1578         result = -ENOMEM;
 1579         if (! (req = smb_alloc_request(server, PAGE_SIZE)))
 1580                 goto out;
 1581 
 1582         p = smb_setup_header(req, SMBmv, 1, 0);
 1583         WSET(req->rq_header, smb_vwv0, aSYSTEM | aHIDDEN | aDIR);
 1584         result = smb_simple_encode_path(req, &p, old_dentry, NULL);
 1585         if (result < 0)
 1586                 goto out_free;
 1587         result = smb_simple_encode_path(req, &p, new_dentry, NULL);
 1588         if (result < 0)
 1589                 goto out_free;
 1590         smb_setup_bcc(req, p);
 1591 
 1592         if ((result = smb_request_ok(req, SMBmv, 0, 0)) < 0)
 1593                 goto out_free;
 1594         result = 0;
 1595 
 1596 out_free:
 1597         smb_rput(req);
 1598 out:
 1599         return result;
 1600 }
 1601 
 1602 /*
 1603  * Code common to mkdir and rmdir.
 1604  */
 1605 static int
 1606 smb_proc_generic_command(struct dentry *dentry, __u8 command)
 1607 {
 1608         struct smb_sb_info *server = server_from_dentry(dentry);
 1609         char *p;
 1610         int result;
 1611         struct smb_request *req;
 1612 
 1613         result = -ENOMEM;
 1614         if (! (req = smb_alloc_request(server, PAGE_SIZE)))
 1615                 goto out;
 1616 
 1617         p = smb_setup_header(req, command, 0, 0);
 1618         result = smb_simple_encode_path(req, &p, dentry, NULL);
 1619         if (result < 0)
 1620                 goto out_free;
 1621         smb_setup_bcc(req, p);
 1622 
 1623         result = smb_request_ok(req, command, 0, 0);
 1624         if (result < 0)
 1625                 goto out_free;
 1626         result = 0;
 1627 
 1628 out_free:
 1629         smb_rput(req);
 1630 out:
 1631         return result;
 1632 }
 1633 
 1634 int
 1635 smb_proc_mkdir(struct dentry *dentry)
 1636 {
 1637         return smb_proc_generic_command(dentry, SMBmkdir);
 1638 }
 1639 
 1640 int
 1641 smb_proc_rmdir(struct dentry *dentry)
 1642 {
 1643         return smb_proc_generic_command(dentry, SMBrmdir);
 1644 }
 1645 
 1646 #if SMBFS_POSIX_UNLINK
 1647 /*
 1648  * Removes readonly attribute from a file. Used by unlink to give posix
 1649  * semantics.
 1650  */
 1651 static int
 1652 smb_set_rw(struct dentry *dentry,struct smb_sb_info *server)
 1653 {
 1654         int result;
 1655         struct smb_fattr fattr;
 1656 
 1657         /* FIXME: cifsUE should allow removing a readonly file. */
 1658 
 1659         /* first get current attribute */
 1660         smb_init_dirent(server, &fattr);
 1661         result = server->ops->getattr(server, dentry, &fattr);
 1662         smb_finish_dirent(server, &fattr);
 1663         if (result < 0)
 1664                 return result;
 1665 
 1666         /* if RONLY attribute is set, remove it */
 1667         if (fattr.attr & aRONLY) {  /* read only attribute is set */
 1668                 fattr.attr &= ~aRONLY;
 1669                 result = smb_proc_setattr_core(server, dentry, fattr.attr);
 1670         }
 1671         return result;
 1672 }
 1673 #endif
 1674 
 1675 int
 1676 smb_proc_unlink(struct dentry *dentry)
 1677 {
 1678         struct smb_sb_info *server = server_from_dentry(dentry);
 1679         int flag = 0;
 1680         char *p;
 1681         int result;
 1682         struct smb_request *req;
 1683 
 1684         result = -ENOMEM;
 1685         if (! (req = smb_alloc_request(server, PAGE_SIZE)))
 1686                 goto out;
 1687 
 1688       retry:
 1689         p = smb_setup_header(req, SMBunlink, 1, 0);
 1690         WSET(req->rq_header, smb_vwv0, aSYSTEM | aHIDDEN);
 1691         result = smb_simple_encode_path(req, &p, dentry, NULL);
 1692         if (result < 0)
 1693                 goto out_free;
 1694         smb_setup_bcc(req, p);
 1695 
 1696         if ((result = smb_request_ok(req, SMBunlink, 0, 0)) < 0) {
 1697 #if SMBFS_POSIX_UNLINK
 1698                 if (result == -EACCES && !flag) {
 1699                         /* Posix semantics is for the read-only state
 1700                            of a file to be ignored in unlink(). In the
 1701                            SMB world a unlink() is refused on a
 1702                            read-only file. To make things easier for
 1703                            unix users we try to override the files
 1704                            permission if the unlink fails with the
 1705                            right error.
 1706                            This introduces a race condition that could
 1707                            lead to a file being written by someone who
 1708                            shouldn't have access, but as far as I can
 1709                            tell that is unavoidable */
 1710 
 1711                         /* remove RONLY attribute and try again */
 1712                         result = smb_set_rw(dentry,server);
 1713                         if (result == 0) {
 1714                                 flag = 1;
 1715                                 req->rq_flags = 0;
 1716                                 goto retry;
 1717                         }
 1718                 }
 1719 #endif
 1720                 goto out_free;
 1721         }
 1722         result = 0;
 1723 
 1724 out_free:
 1725         smb_rput(req);
 1726 out:
 1727         return result;
 1728 }
 1729 
 1730 int
 1731 smb_proc_flush(struct smb_sb_info *server, __u16 fileid)
 1732 {
 1733         int result;
 1734         struct smb_request *req;
 1735 
 1736         result = -ENOMEM;
 1737         if (! (req = smb_alloc_request(server, 0)))
 1738                 goto out;
 1739 
 1740         smb_setup_header(req, SMBflush, 1, 0);
 1741         WSET(req->rq_header, smb_vwv0, fileid);
 1742         req->rq_flags |= SMB_REQ_NORETRY;
 1743         result = smb_request_ok(req, SMBflush, 0, 0);
 1744 
 1745         smb_rput(req);
 1746 out:
 1747         return result;
 1748 }
 1749 
 1750 static int
 1751 smb_proc_trunc32(struct inode *inode, loff_t length)
 1752 {
 1753         /*
 1754          * Writing 0bytes is old-SMB magic for truncating files.
 1755          * MAX_NON_LFS should prevent this from being called with a too
 1756          * large offset.
 1757          */
 1758         return smb_proc_write(inode, length, 0, NULL);
 1759 }
 1760 
 1761 static int
 1762 smb_proc_trunc64(struct inode *inode, loff_t length)
 1763 {
 1764         struct smb_sb_info *server = server_from_inode(inode);
 1765         int result;
 1766         char *param;
 1767         char *data;
 1768         struct smb_request *req;
 1769 
 1770         result = -ENOMEM;
 1771         if (! (req = smb_alloc_request(server, 14)))
 1772                 goto out;
 1773 
 1774         param = req->rq_buffer;
 1775         data = req->rq_buffer + 6;
 1776 
 1777         /* FIXME: must we also set allocation size? winNT seems to do that */
 1778         WSET(param, 0, SMB_I(inode)->fileid);
 1779         WSET(param, 2, SMB_SET_FILE_END_OF_FILE_INFO);
 1780         WSET(param, 4, 0);
 1781         LSET(data, 0, length);
 1782 
 1783         req->rq_trans2_command = TRANSACT2_SETFILEINFO;
 1784         req->rq_ldata = 8;
 1785         req->rq_data  = data;
 1786         req->rq_lparm = 6;
 1787         req->rq_parm  = param;
 1788         req->rq_flags |= SMB_REQ_NORETRY;
 1789         result = smb_add_request(req);
 1790         if (result < 0)
 1791                 goto out_free;
 1792 
 1793         result = 0;
 1794         if (req->rq_rcls != 0)
 1795                 result = smb_errno(req);
 1796 
 1797 out_free:
 1798         smb_rput(req);
 1799 out:
 1800         return result;
 1801 }
 1802 
 1803 static int
 1804 smb_proc_trunc95(struct inode *inode, loff_t length)
 1805 {
 1806         struct smb_sb_info *server = server_from_inode(inode);
 1807         int result = smb_proc_trunc32(inode, length);
 1808  
 1809         /*
 1810          * win9x doesn't appear to update the size immediately.
 1811          * It will return the old file size after the truncate,
 1812          * confusing smbfs. So we force an update.
 1813          *
 1814          * FIXME: is this still necessary?
 1815          */
 1816         smb_proc_flush(server, SMB_I(inode)->fileid);
 1817         return result;
 1818 }
 1819 
 1820 static void
 1821 smb_init_dirent(struct smb_sb_info *server, struct smb_fattr *fattr)
 1822 {
 1823         memset(fattr, 0, sizeof(*fattr));
 1824 
 1825         fattr->f_nlink = 1;
 1826         fattr->f_uid = server->mnt->uid;
 1827         fattr->f_gid = server->mnt->gid;
 1828         fattr->f_unix = 0;
 1829 }
 1830 
 1831 static void
 1832 smb_finish_dirent(struct smb_sb_info *server, struct smb_fattr *fattr)
 1833 {
 1834         if (fattr->f_unix)
 1835                 return;
 1836 
 1837         fattr->f_mode = server->mnt->file_mode;
 1838         if (fattr->attr & aDIR) {
 1839                 fattr->f_mode = server->mnt->dir_mode;
 1840                 fattr->f_size = SMB_ST_BLKSIZE;
 1841         }
 1842         /* Check the read-only flag */
 1843         if (fattr->attr & aRONLY)
 1844                 fattr->f_mode &= ~(S_IWUSR | S_IWGRP | S_IWOTH);
 1845 
 1846         /* How many 512 byte blocks do we need for this file? */
 1847         fattr->f_blocks = 0;
 1848         if (fattr->f_size != 0)
 1849                 fattr->f_blocks = 1 + ((fattr->f_size-1) >> 9);
 1850         return;
 1851 }
 1852 
 1853 void
 1854 smb_init_root_dirent(struct smb_sb_info *server, struct smb_fattr *fattr,
 1855                      struct super_block *sb)
 1856 {
 1857         smb_init_dirent(server, fattr);
 1858         fattr->attr = aDIR;
 1859         fattr->f_ino = 2; /* traditional root inode number */
 1860         fattr->f_mtime = current_fs_time(sb);
 1861         smb_finish_dirent(server, fattr);
 1862 }
 1863 
 1864 /*
 1865  * Decode a dirent for old protocols
 1866  *
 1867  * qname is filled with the decoded, and possibly translated, name.
 1868  * fattr receives decoded attributes
 1869  *
 1870  * Bugs Noted:
 1871  * (1) Pathworks servers may pad the name with extra spaces.
 1872  */
 1873 static char *
 1874 smb_decode_short_dirent(struct smb_sb_info *server, char *p,
 1875                         struct qstr *qname, struct smb_fattr *fattr,
 1876                         unsigned char *name_buf)
 1877 {
 1878         int len;
 1879 
 1880         /*
 1881          * SMB doesn't have a concept of inode numbers ...
 1882          */
 1883         smb_init_dirent(server, fattr);
 1884         fattr->f_ino = 0;       /* FIXME: do we need this? */
 1885 
 1886         p += SMB_STATUS_SIZE;   /* reserved (search_status) */
 1887         fattr->attr = *p;
 1888         fattr->f_mtime.tv_sec = date_dos2unix(server, WVAL(p, 3), WVAL(p, 1));
 1889         fattr->f_mtime.tv_nsec = 0;
 1890         fattr->f_size = DVAL(p, 5);
 1891         fattr->f_ctime = fattr->f_mtime;
 1892         fattr->f_atime = fattr->f_mtime;
 1893         qname->name = p + 9;
 1894         len = strnlen(qname->name, 12);
 1895 
 1896         /*
 1897          * Trim trailing blanks for Pathworks servers
 1898          */
 1899         while (len > 2 && qname->name[len-1] == ' ')
 1900                 len--;
 1901 
 1902         smb_finish_dirent(server, fattr);
 1903 
 1904 #if 0
 1905         /* FIXME: These only work for ascii chars, and recent smbmount doesn't
 1906            allow the flag to be set anyway. It kills const. Remove? */
 1907         switch (server->opt.case_handling) {
 1908         case SMB_CASE_UPPER:
 1909                 str_upper(entry->name, len);
 1910                 break;
 1911         case SMB_CASE_LOWER:
 1912                 str_lower(entry->name, len);
 1913                 break;
 1914         default:
 1915                 break;
 1916         }
 1917 #endif
 1918 
 1919         qname->len = 0;
 1920         len = server->ops->convert(name_buf, SMB_MAXNAMELEN,
 1921                                    qname->name, len,
 1922                                    server->remote_nls, server->local_nls);
 1923         if (len > 0) {
 1924                 qname->len = len;
 1925                 qname->name = name_buf;
 1926                 DEBUG1("len=%d, name=%.*s\n",qname->len,qname->len,qname->name);
 1927         }
 1928 
 1929         return p + 22;
 1930 }
 1931 
 1932 /*
 1933  * This routine is used to read in directory entries from the network.
 1934  * Note that it is for short directory name seeks, i.e.: protocol <
 1935  * SMB_PROTOCOL_LANMAN2
 1936  */
 1937 static int
 1938 smb_proc_readdir_short(struct file *filp, void *dirent, filldir_t filldir,
 1939                        struct smb_cache_control *ctl)
 1940 {
 1941         struct dentry *dir = filp->f_path.dentry;
 1942         struct smb_sb_info *server = server_from_dentry(dir);
 1943         struct qstr qname;
 1944         struct smb_fattr fattr;
 1945         char *p;
 1946         int result;
 1947         int i, first, entries_seen, entries;
 1948         int entries_asked = (server->opt.max_xmit - 100) / SMB_DIRINFO_SIZE;
 1949         __u16 bcc;
 1950         __u16 count;
 1951         char status[SMB_STATUS_SIZE];
 1952         static struct qstr mask = {
 1953                 .name   = "*.*",
 1954                 .len    = 3,
 1955         };
 1956         unsigned char *last_status;
 1957         struct smb_request *req;
 1958         unsigned char *name_buf;
 1959 
 1960         VERBOSE("%s/%s\n", DENTRY_PATH(dir));
 1961 
 1962         lock_kernel();
 1963 
 1964         result = -ENOMEM;
 1965         if (! (name_buf = kmalloc(SMB_MAXNAMELEN, GFP_KERNEL)))
 1966                 goto out;
 1967 
 1968         first = 1;
 1969         entries = 0;
 1970         entries_seen = 2; /* implicit . and .. */
 1971 
 1972         result = -ENOMEM;
 1973         if (! (req = smb_alloc_request(server, server->opt.max_xmit)))
 1974                 goto out_name;
 1975 
 1976         while (1) {
 1977                 p = smb_setup_header(req, SMBsearch, 2, 0);
 1978                 WSET(req->rq_header, smb_vwv0, entries_asked);
 1979                 WSET(req->rq_header, smb_vwv1, aDIR);
 1980                 if (first == 1) {
 1981                         result = smb_simple_encode_path(req, &p, dir, &mask);
 1982                         if (result < 0)
 1983                                 goto out_free;
 1984                         if (p + 3 > (char *)req->rq_buffer + req->rq_bufsize) {
 1985                                 result = -ENAMETOOLONG;
 1986                                 goto out_free;
 1987                         }
 1988                         *p++ = 5;
 1989                         WSET(p, 0, 0);
 1990                         p += 2;
 1991                         first = 0;
 1992                 } else {
 1993                         if (p + 5 + SMB_STATUS_SIZE >
 1994                             (char *)req->rq_buffer + req->rq_bufsize) {
 1995                                 result = -ENAMETOOLONG;
 1996                                 goto out_free;
 1997                         }
 1998                                 
 1999                         *p++ = 4;
 2000                         *p++ = 0;
 2001                         *p++ = 5;
 2002                         WSET(p, 0, SMB_STATUS_SIZE);
 2003                         p += 2;
 2004                         memcpy(p, status, SMB_STATUS_SIZE);
 2005                         p += SMB_STATUS_SIZE;
 2006                 }
 2007 
 2008                 smb_setup_bcc(req, p);
 2009 
 2010                 result = smb_request_ok(req, SMBsearch, 1, -1);
 2011                 if (result < 0) {
 2012                         if ((req->rq_rcls == ERRDOS) && 
 2013                             (req->rq_err  == ERRnofiles))
 2014                                 break;
 2015                         goto out_free;
 2016                 }
 2017                 count = WVAL(req->rq_header, smb_vwv0);
 2018                 if (count <= 0)
 2019                         break;
 2020 
 2021                 result = -EIO;
 2022                 bcc = smb_bcc(req->rq_header);
 2023                 if (bcc != count * SMB_DIRINFO_SIZE + 3)
 2024                         goto out_free;
 2025                 p = req->rq_buffer + 3;
 2026 
 2027 
 2028                 /* Make sure the response fits in the buffer. Fixed sized 
 2029                    entries means we don't have to check in the decode loop. */
 2030 
 2031                 last_status = req->rq_buffer + 3 + (count-1) * SMB_DIRINFO_SIZE;
 2032 
 2033                 if (last_status + SMB_DIRINFO_SIZE >=
 2034                     req->rq_buffer + req->rq_bufsize) {
 2035                         printk(KERN_ERR "smb_proc_readdir_short: "
 2036                                "last dir entry outside buffer! "
 2037                                "%d@%p  %d@%p\n", SMB_DIRINFO_SIZE, last_status,
 2038                                req->rq_bufsize, req->rq_buffer);
 2039                         goto out_free;
 2040                 }
 2041 
 2042                 /* Read the last entry into the status field. */
 2043                 memcpy(status, last_status, SMB_STATUS_SIZE);
 2044 
 2045 
 2046                 /* Now we are ready to parse smb directory entries. */
 2047 
 2048                 for (i = 0; i < count; i++) {
 2049                         p = smb_decode_short_dirent(server, p, 
 2050                                                     &qname, &fattr, name_buf);
 2051                         if (qname.len == 0)
 2052                                 continue;
 2053 
 2054                         if (entries_seen == 2 && qname.name[0] == '.') {
 2055                                 if (qname.len == 1)
 2056                                         continue;
 2057                                 if (qname.name[1] == '.' && qname.len == 2)
 2058                                         continue;
 2059                         }
 2060                         if (!smb_fill_cache(filp, dirent, filldir, ctl, 
 2061                                             &qname, &fattr))
 2062                                 ;       /* stop reading? */
 2063                         entries_seen++;
 2064                 }
 2065         }
 2066         result = entries;
 2067 
 2068 out_free:
 2069         smb_rput(req);
 2070 out_name:
 2071         kfree(name_buf);
 2072 out:
 2073         unlock_kernel();
 2074         return result;
 2075 }
 2076 
 2077 static void smb_decode_unix_basic(struct smb_fattr *fattr, struct smb_sb_info *server, char *p)
 2078 {
 2079         u64 size, disk_bytes;
 2080 
 2081         /* FIXME: verify nls support. all is sent as utf8? */
 2082 
 2083         fattr->f_unix = 1;
 2084         fattr->f_mode = 0;
 2085 
 2086         /* FIXME: use the uniqueID from the remote instead? */
 2087         /* 0 L file size in bytes */
 2088         /* 8 L file size on disk in bytes (block count) */
 2089         /* 40 L uid */
 2090         /* 48 L gid */
 2091         /* 56 W file type */
 2092         /* 60 L devmajor */
 2093         /* 68 L devminor */
 2094         /* 76 L unique ID (inode) */
 2095         /* 84 L permissions */
 2096         /* 92 L link count */
 2097 
 2098         size = LVAL(p, 0);
 2099         disk_bytes = LVAL(p, 8);
 2100 
 2101         /*
 2102          * Some samba versions round up on-disk byte usage
 2103          * to 1MB boundaries, making it useless. When seeing
 2104          * that, use the size instead.
 2105          */
 2106         if (!(disk_bytes & 0xfffff))
 2107                 disk_bytes = size+511;
 2108 
 2109         fattr->f_size = size;
 2110         fattr->f_blocks = disk_bytes >> 9;
 2111         fattr->f_ctime = smb_ntutc2unixutc(LVAL(p, 16));
 2112         fattr->f_atime = smb_ntutc2unixutc(LVAL(p, 24));
 2113         fattr->f_mtime = smb_ntutc2unixutc(LVAL(p, 32));
 2114 
 2115         if (server->mnt->flags & SMB_MOUNT_UID)
 2116                 fattr->f_uid = server->mnt->uid;
 2117         else
 2118                 fattr->f_uid = LVAL(p, 40);
 2119 
 2120         if (server->mnt->flags & SMB_MOUNT_GID)
 2121                 fattr->f_gid = server->mnt->gid;
 2122         else
 2123                 fattr->f_gid = LVAL(p, 48);
 2124 
 2125         fattr->f_mode |= smb_filetype_to_mode(WVAL(p, 56));
 2126 
 2127         if (S_ISBLK(fattr->f_mode) || S_ISCHR(fattr->f_mode)) {
 2128                 __u64 major = LVAL(p, 60);
 2129                 __u64 minor = LVAL(p, 68);
 2130 
 2131                 fattr->f_rdev = MKDEV(major & 0xffffffff, minor & 0xffffffff);
 2132                 if (MAJOR(fattr->f_rdev) != (major & 0xffffffff) ||
 2133                 MINOR(fattr->f_rdev) != (minor & 0xffffffff))
 2134                         fattr->f_rdev = 0;
 2135         }
 2136 
 2137         fattr->f_mode |= LVAL(p, 84);
 2138 
 2139         if ( (server->mnt->flags & SMB_MOUNT_DMODE) &&
 2140              (S_ISDIR(fattr->f_mode)) )
 2141                 fattr->f_mode = (server->mnt->dir_mode & S_IRWXUGO) | S_IFDIR;
 2142         else if ( (server->mnt->flags & SMB_MOUNT_FMODE) &&
 2143                   !(S_ISDIR(fattr->f_mode)) )
 2144                 fattr->f_mode = (server->mnt->file_mode & S_IRWXUGO) |
 2145                                 (fattr->f_mode & S_IFMT);
 2146 
 2147 }
 2148 
 2149 /*
 2150  * Interpret a long filename structure using the specified info level:
 2151  *   level 1 for anything below NT1 protocol
 2152  *   level 260 for NT1 protocol
 2153  *
 2154  * qname is filled with the decoded, and possibly translated, name
 2155  * fattr receives decoded attributes.
 2156  *
 2157  * Bugs Noted:
 2158  * (1) Win NT 4.0 appends a null byte to names and counts it in the length!
 2159  */
 2160 static char *
 2161 smb_decode_long_dirent(struct smb_sb_info *server, char *p, int level,
 2162                        struct qstr *qname, struct smb_fattr *fattr,
 2163                        unsigned char *name_buf)
 2164 {
 2165         char *result;
 2166         unsigned int len = 0;
 2167         int n;
 2168         __u16 date, time;
 2169         int unicode = (server->mnt->flags & SMB_MOUNT_UNICODE);
 2170 
 2171         /*
 2172          * SMB doesn't have a concept of inode numbers ...
 2173          */
 2174         smb_init_dirent(server, fattr);
 2175         fattr->f_ino = 0;       /* FIXME: do we need this? */
 2176 
 2177         switch (level) {
 2178         case 1:
 2179                 len = *((unsigned char *) p + 22);
 2180                 qname->name = p + 23;
 2181                 result = p + 24 + len;
 2182 
 2183                 date = WVAL(p, 0);
 2184                 time = WVAL(p, 2);
 2185                 fattr->f_ctime.tv_sec = date_dos2unix(server, date, time);
 2186                 fattr->f_ctime.tv_nsec = 0;
 2187 
 2188                 date = WVAL(p, 4);
 2189                 time = WVAL(p, 6);
 2190                 fattr->f_atime.tv_sec = date_dos2unix(server, date, time);
 2191                 fattr->f_atime.tv_nsec = 0;
 2192 
 2193                 date = WVAL(p, 8);
 2194                 time = WVAL(p, 10);
 2195                 fattr->f_mtime.tv_sec = date_dos2unix(server, date, time);
 2196                 fattr->f_mtime.tv_nsec = 0;
 2197                 fattr->f_size = DVAL(p, 12);
 2198                 /* ULONG allocation size */
 2199                 fattr->attr = WVAL(p, 20);
 2200 
 2201                 VERBOSE("info 1 at %p, len=%d, name=%.*s\n",
 2202                         p, len, len, qname->name);
 2203                 break;
 2204         case 260:
 2205                 result = p + WVAL(p, 0);
 2206                 len = DVAL(p, 60);
 2207                 if (len > 255) len = 255;
 2208                 /* NT4 null terminates, unless we are using unicode ... */
 2209                 qname->name = p + 94;
 2210                 if (!unicode && len && qname->name[len-1] == '\0')
 2211                         len--;
 2212 
 2213                 fattr->f_ctime = smb_ntutc2unixutc(LVAL(p, 8));
 2214                 fattr->f_atime = smb_ntutc2unixutc(LVAL(p, 16));
 2215                 fattr->f_mtime = smb_ntutc2unixutc(LVAL(p, 24));
 2216                 /* change time (32) */
 2217                 fattr->f_size = LVAL(p, 40);
 2218                 /* alloc size (48) */
 2219                 fattr->attr = DVAL(p, 56);
 2220 
 2221                 VERBOSE("info 260 at %p, len=%d, name=%.*s\n",
 2222                         p, len, len, qname->name);
 2223                 break;
 2224         case SMB_FIND_FILE_UNIX:
 2225                 result = p + WVAL(p, 0);
 2226                 qname->name = p + 108;
 2227 
 2228                 len = strlen(qname->name);
 2229                 /* FIXME: should we check the length?? */
 2230 
 2231                 p += 8;
 2232                 smb_decode_unix_basic(fattr, server, p);
 2233                 VERBOSE("info SMB_FIND_FILE_UNIX at %p, len=%d, name=%.*s\n",
 2234                         p, len, len, qname->name);
 2235                 break;
 2236         default:
 2237                 PARANOIA("Unknown info level %d\n", level);
 2238                 result = p + WVAL(p, 0);
 2239                 goto out;
 2240         }
 2241 
 2242         smb_finish_dirent(server, fattr);
 2243 
 2244 #if 0
 2245         /* FIXME: These only work for ascii chars, and recent smbmount doesn't
 2246            allow the flag to be set anyway. Remove? */
 2247         switch (server->opt.case_handling) {
 2248         case SMB_CASE_UPPER:
 2249                 str_upper(qname->name, len);
 2250                 break;
 2251         case SMB_CASE_LOWER:
 2252                 str_lower(qname->name, len);
 2253                 break;
 2254         default:
 2255                 break;
 2256         }
 2257 #endif
 2258 
 2259         qname->len = 0;
 2260         n = server->ops->convert(name_buf, SMB_MAXNAMELEN,
 2261                                  qname->name, len,
 2262                                  server->remote_nls, server->local_nls);
 2263         if (n > 0) {
 2264                 qname->len = n;
 2265                 qname->name = name_buf;
 2266         }
 2267 
 2268 out:
 2269         return result;
 2270 }
 2271 
 2272 /* findfirst/findnext flags */
 2273 #define SMB_CLOSE_AFTER_FIRST (1<<0)
 2274 #define SMB_CLOSE_IF_END (1<<1)
 2275 #define SMB_REQUIRE_RESUME_KEY (1<<2)
 2276 #define SMB_CONTINUE_BIT (1<<3)
 2277 
 2278 /*
 2279  * Note: samba-2.0.7 (at least) has a very similar routine, cli_list, in
 2280  * source/libsmb/clilist.c. When looking for smb bugs in the readdir code,
 2281  * go there for advise.
 2282  *
 2283  * Bugs Noted:
 2284  * (1) When using Info Level 1 Win NT 4.0 truncates directory listings 
 2285  * for certain patterns of names and/or lengths. The breakage pattern
 2286  * is completely reproducible and can be toggled by the creation of a
 2287  * single file. (E.g. echo hi >foo breaks, rm -f foo works.)
 2288  */
 2289 static int
 2290 smb_proc_readdir_long(struct file *filp, void *dirent, filldir_t filldir,
 2291                       struct smb_cache_control *ctl)
 2292 {
 2293         struct dentry *dir = filp->f_path.dentry;
 2294         struct smb_sb_info *server = server_from_dentry(dir);
 2295         struct qstr qname;
 2296         struct smb_fattr fattr;
 2297 
 2298         unsigned char *p, *lastname;
 2299         char *mask, *param;
 2300         __u16 command;
 2301         int first, entries_seen;
 2302 
 2303         /* Both NT and OS/2 accept info level 1 (but see note below). */
 2304         int info_level = 260;
 2305         const int max_matches = 512;
 2306 
 2307         unsigned int ff_searchcount = 0;
 2308         unsigned int ff_eos = 0;
 2309         unsigned int ff_lastname = 0;
 2310         unsigned int ff_dir_handle = 0;
 2311         unsigned int loop_count = 0;
 2312         unsigned int mask_len, i;
 2313         int result;
 2314         struct smb_request *req;
 2315         unsigned char *name_buf;
 2316         static struct qstr star = {
 2317                 .name   = "*",
 2318                 .len    = 1,
 2319         };
 2320 
 2321         lock_kernel();
 2322 
 2323         /*
 2324          * We always prefer unix style. Use info level 1 for older
 2325          * servers that don't do 260.
 2326          */
 2327         if (server->opt.capabilities & SMB_CAP_UNIX)
 2328                 info_level = SMB_FIND_FILE_UNIX;
 2329         else if (server->opt.protocol < SMB_PROTOCOL_NT1)
 2330                 info_level = 1;
 2331 
 2332         result = -ENOMEM;
 2333         if (! (name_buf = kmalloc(SMB_MAXNAMELEN+2, GFP_KERNEL)))
 2334                 goto out;
 2335         if (! (req = smb_alloc_request(server, server->opt.max_xmit)))
 2336                 goto out_name;
 2337         param = req->rq_buffer;
 2338 
 2339         /*
 2340          * Encode the initial path
 2341          */
 2342         mask = param + 12;
 2343 
 2344         result = smb_encode_path(server, mask, SMB_MAXPATHLEN+1, dir, &star);
 2345         if (result <= 0)
 2346                 goto out_free;
 2347         mask_len = result - 1;  /* mask_len is strlen, not #bytes */
 2348         result = 0;
 2349         first = 1;
 2350         VERBOSE("starting mask_len=%d, mask=%s\n", mask_len, mask);
 2351 
 2352         entries_seen = 2;
 2353         ff_eos = 0;
 2354 
 2355         while (ff_eos == 0) {
 2356                 loop_count += 1;
 2357                 if (loop_count > 10) {
 2358                         printk(KERN_WARNING "smb_proc_readdir_long: "
 2359                                "Looping in FIND_NEXT??\n");
 2360                         result = -EIO;
 2361                         break;
 2362                 }
 2363 
 2364                 if (first != 0) {
 2365                         command = TRANSACT2_FINDFIRST;
 2366                         WSET(param, 0, aSYSTEM | aHIDDEN | aDIR);
 2367                         WSET(param, 2, max_matches);    /* max count */
 2368                         WSET(param, 4, SMB_CLOSE_IF_END);
 2369                         WSET(param, 6, info_level);
 2370                         DSET(param, 8, 0);
 2371                 } else {
 2372                         command = TRANSACT2_FINDNEXT;
 2373 
 2374                         VERBOSE("handle=0x%X, lastname=%d, mask=%.*s\n",
 2375                                 ff_dir_handle, ff_lastname, mask_len, mask);
 2376 
 2377                         WSET(param, 0, ff_dir_handle);  /* search handle */
 2378                         WSET(param, 2, max_matches);    /* max count */
 2379                         WSET(param, 4, info_level);
 2380                         DSET(param, 6, 0);
 2381                         WSET(param, 10, SMB_CONTINUE_BIT|SMB_CLOSE_IF_END);
 2382                 }
 2383 
 2384                 req->rq_trans2_command = command;
 2385                 req->rq_ldata = 0;
 2386                 req->rq_data  = NULL;
 2387                 req->rq_lparm = 12 + mask_len + 1;
 2388                 req->rq_parm  = param;
 2389                 req->rq_flags = 0;
 2390                 result = smb_add_request(req);
 2391                 if (result < 0) {
 2392                         PARANOIA("error=%d, breaking\n", result);
 2393                         break;
 2394                 }
 2395 
 2396                 if (req->rq_rcls == ERRSRV && req->rq_err == ERRerror) {
 2397                         /* a damn Win95 bug - sometimes it clags if you 
 2398                            ask it too fast */
 2399                         schedule_timeout_interruptible(msecs_to_jiffies(200));
 2400                         continue;
 2401                 }
 2402 
 2403                 if (req->rq_rcls != 0) {
 2404                         result = smb_errno(req);
 2405                         PARANOIA("name=%s, result=%d, rcls=%d, err=%d\n",
 2406                                  mask, result, req->rq_rcls, req->rq_err);
 2407                         break;
 2408                 }
 2409 
 2410                 /* parse out some important return info */
 2411                 if (first != 0) {
 2412                         ff_dir_handle = WVAL(req->rq_parm, 0);
 2413                         ff_searchcount = WVAL(req->rq_parm, 2);
 2414                         ff_eos = WVAL(req->rq_parm, 4);
 2415                         ff_lastname = WVAL(req->rq_parm, 8);
 2416                 } else {
 2417                         ff_searchcount = WVAL(req->rq_parm, 0);
 2418                         ff_eos = WVAL(req->rq_parm, 2);
 2419                         ff_lastname = WVAL(req->rq_parm, 6);
 2420                 }
 2421 
 2422                 if (ff_searchcount == 0)
 2423                         break;
 2424 
 2425                 /* Now we are ready to parse smb directory entries. */
 2426 
 2427                 /* point to the data bytes */
 2428                 p = req->rq_data;
 2429                 for (i = 0; i < ff_searchcount; i++) {
 2430                         /* make sure we stay within the buffer */
 2431                         if (p >= req->rq_data + req->rq_ldata) {
 2432                                 printk(KERN_ERR "smb_proc_readdir_long: "
 2433                                        "dirent pointer outside buffer! "
 2434                                        "%p  %d@%p\n",
 2435                                        p, req->rq_ldata, req->rq_data);
 2436                                 result = -EIO; /* always a comm. error? */
 2437                                 goto out_free;
 2438                         }
 2439 
 2440                         p = smb_decode_long_dirent(server, p, info_level,
 2441                                                    &qname, &fattr, name_buf);
 2442 
 2443                         /* ignore . and .. from the server */
 2444                         if (entries_seen == 2 && qname.name[0] == '.') {
 2445                                 if (qname.len == 1)
 2446                                         continue;
 2447                                 if (qname.name[1] == '.' && qname.len == 2)
 2448                                         continue;
 2449                         }
 2450 
 2451                         if (!smb_fill_cache(filp, dirent, filldir, ctl, 
 2452                                             &qname, &fattr))
 2453                                 ;       /* stop reading? */
 2454                         entries_seen++;
 2455                 }
 2456 
 2457                 VERBOSE("received %d entries, eos=%d\n", ff_searchcount,ff_eos);
 2458 
 2459                 /*
 2460                  * We might need the lastname for continuations.
 2461                  *
 2462                  * Note that some servers (win95?) point to the filename and
 2463                  * others (NT4, Samba using NT1) to the dir entry. We assume
 2464                  * here that those who do not point to a filename do not need
 2465                  * this info to continue the listing.
 2466                  *
 2467                  * OS/2 needs this and talks infolevel 1.
 2468                  * NetApps want lastname with infolevel 260.
 2469                  * win2k want lastname with infolevel 260, and points to
 2470                  *       the record not to the name.
 2471                  * Samba+CifsUnixExt doesn't need lastname.
 2472                  *
 2473                  * Both are happy if we return the data they point to. So we do.
 2474                  * (FIXME: above is not true with win2k)
 2475                  */
 2476                 mask_len = 0;
 2477                 if (info_level != SMB_FIND_FILE_UNIX &&
 2478                     ff_lastname > 0 && ff_lastname < req->rq_ldata) {
 2479                         lastname = req->rq_data + ff_lastname;
 2480 
 2481                         switch (info_level) {
 2482                         case 260:
 2483                                 mask_len = req->rq_ldata - ff_lastname;
 2484                                 break;
 2485                         case 1:
 2486                                 /* lastname points to a length byte */
 2487                                 mask_len = *lastname++;
 2488                                 if (ff_lastname + 1 + mask_len > req->rq_ldata)
 2489                                         mask_len = req->rq_ldata - ff_lastname - 1;
 2490                                 break;
 2491                         }
 2492 
 2493                         /*
 2494                          * Update the mask string for the next message.
 2495                          */
 2496                         if (mask_len > 255)
 2497                                 mask_len = 255;
 2498                         if (mask_len)
 2499                                 strncpy(mask, lastname, mask_len);
 2500                 }
 2501                 mask_len = strnlen(mask, mask_len);
 2502                 VERBOSE("new mask, len=%d@%d of %d, mask=%.*s\n",
 2503                         mask_len, ff_lastname, req->rq_ldata, mask_len, mask);
 2504 
 2505                 first = 0;
 2506                 loop_count = 0;
 2507         }
 2508 
 2509 out_free:
 2510         smb_rput(req);
 2511 out_name:
 2512         kfree(name_buf);
 2513 out:
 2514         unlock_kernel();
 2515         return result;
 2516 }
 2517 
 2518 /*
 2519  * This version uses the trans2 TRANSACT2_FINDFIRST message 
 2520  * to get the attribute data.
 2521  *
 2522  * Bugs Noted:
 2523  */
 2524 static int
 2525 smb_proc_getattr_ff(struct smb_sb_info *server, struct dentry *dentry,
 2526                         struct smb_fattr *fattr)
 2527 {
 2528         char *param, *mask;
 2529         __u16 date, time;
 2530         int mask_len, result;
 2531         struct smb_request *req;
 2532 
 2533         result = -ENOMEM;
 2534         if (! (req = smb_alloc_request(server, PAGE_SIZE)))
 2535                 goto out;
 2536         param = req->rq_buffer;
 2537         mask = param + 12;
 2538 
 2539         mask_len = smb_encode_path(server, mask, SMB_MAXPATHLEN+1, dentry,NULL);
 2540         if (mask_len < 0) {
 2541                 result = mask_len;
 2542                 goto out_free;
 2543         }
 2544         VERBOSE("name=%s, len=%d\n", mask, mask_len);
 2545         WSET(param, 0, aSYSTEM | aHIDDEN | aDIR);
 2546         WSET(param, 2, 1);      /* max count */
 2547         WSET(param, 4, 1);      /* close after this call */
 2548         WSET(param, 6, 1);      /* info_level */
 2549         DSET(param, 8, 0);
 2550 
 2551         req->rq_trans2_command = TRANSACT2_FINDFIRST;
 2552         req->rq_ldata = 0;
 2553         req->rq_data  = NULL;
 2554         req->rq_lparm = 12 + mask_len;
 2555         req->rq_parm  = param;
 2556         req->rq_flags = 0;
 2557         result = smb_add_request(req);
 2558         if (result < 0)
 2559                 goto out_free;
 2560         if (req->rq_rcls != 0) {
 2561                 result = smb_errno(req);
 2562 #ifdef SMBFS_PARANOIA
 2563                 if (result != -ENOENT)
 2564                         PARANOIA("error for %s, rcls=%d, err=%d\n",
 2565                                  mask, req->rq_rcls, req->rq_err);
 2566 #endif
 2567                 goto out_free;
 2568         }
 2569         /* Make sure we got enough data ... */
 2570         result = -EINVAL;
 2571         if (req->rq_ldata < 22 || WVAL(req->rq_parm, 2) != 1) {
 2572                 PARANOIA("bad result for %s, len=%d, count=%d\n",
 2573                          mask, req->rq_ldata, WVAL(req->rq_parm, 2));
 2574                 goto out_free;
 2575         }
 2576 
 2577         /*
 2578          * Decode the response into the fattr ...
 2579          */
 2580         date = WVAL(req->rq_data, 0);
 2581         time = WVAL(req->rq_data, 2);
 2582         fattr->f_ctime.tv_sec = date_dos2unix(server, date, time);
 2583         fattr->f_ctime.tv_nsec = 0;
 2584 
 2585         date = WVAL(req->rq_data, 4);
 2586         time = WVAL(req->rq_data, 6);
 2587         fattr->f_atime.tv_sec = date_dos2unix(server, date, time);
 2588         fattr->f_atime.tv_nsec = 0;
 2589 
 2590         date = WVAL(req->rq_data, 8);
 2591         time = WVAL(req->rq_data, 10);
 2592         fattr->f_mtime.tv_sec = date_dos2unix(server, date, time);
 2593         fattr->f_mtime.tv_nsec = 0;
 2594         VERBOSE("name=%s, date=%x, time=%x, mtime=%ld\n",
 2595                 mask, date, time, fattr->f_mtime.tv_sec);
 2596         fattr->f_size = DVAL(req->rq_data, 12);
 2597         /* ULONG allocation size */
 2598         fattr->attr = WVAL(req->rq_data, 20);
 2599         result = 0;
 2600 
 2601 out_free:
 2602         smb_rput(req);
 2603 out:
 2604         return result;
 2605 }
 2606 
 2607 static int
 2608 smb_proc_getattr_core(struct smb_sb_info *server, struct dentry *dir,
 2609                       struct smb_fattr *fattr)
 2610 {
 2611         int result;
 2612         char *p;
 2613         struct smb_request *req;
 2614 
 2615         result = -ENOMEM;
 2616         if (! (req = smb_alloc_request(server, PAGE_SIZE)))
 2617                 goto out;
 2618 
 2619         p = smb_setup_header(req, SMBgetatr, 0, 0);
 2620         result = smb_simple_encode_path(req, &p, dir, NULL);
 2621         if (result < 0)
 2622                 goto out_free;
 2623         smb_setup_bcc(req, p);
 2624 
 2625         if ((result = smb_request_ok(req, SMBgetatr, 10, 0)) < 0)
 2626                 goto out_free;
 2627         fattr->attr    = WVAL(req->rq_header, smb_vwv0);
 2628         fattr->f_mtime.tv_sec = local2utc(server, DVAL(req->rq_header, smb_vwv1));
 2629         fattr->f_mtime.tv_nsec = 0;
 2630         fattr->f_size  = DVAL(req->rq_header, smb_vwv3);
 2631         fattr->f_ctime = fattr->f_mtime; 
 2632         fattr->f_atime = fattr->f_mtime; 
 2633 #ifdef SMBFS_DEBUG_TIMESTAMP
 2634         printk("getattr_core: %s/%s, mtime=%ld\n",
 2635                DENTRY_PATH(dir), fattr->f_mtime);
 2636 #endif
 2637         result = 0;
 2638 
 2639 out_free:
 2640         smb_rput(req);
 2641 out:
 2642         return result;
 2643 }
 2644 
 2645 /*
 2646  * Bugs Noted:
 2647  * (1) Win 95 swaps the date and time fields in the standard info level.
 2648  */
 2649 static int
 2650 smb_proc_getattr_trans2(struct smb_sb_info *server, struct dentry *dir,
 2651                         struct smb_request *req, int infolevel)
 2652 {
 2653         char *p, *param;
 2654         int result;
 2655 
 2656         param = req->rq_buffer;
 2657         WSET(param, 0, infolevel);
 2658         DSET(param, 2, 0);
 2659         result = smb_encode_path(server, param+6, SMB_MAXPATHLEN+1, dir, NULL);
 2660         if (result < 0)
 2661                 goto out;
 2662         p = param + 6 + result;
 2663 
 2664         req->rq_trans2_command = TRANSACT2_QPATHINFO;
 2665         req->rq_ldata = 0;
 2666         req->rq_data  = NULL;
 2667         req->rq_lparm = p - param;
 2668         req->rq_parm  = param;
 2669         req->rq_flags = 0;
 2670         result = smb_add_request(req);
 2671         if (result < 0)
 2672                 goto out;
 2673         if (req->rq_rcls != 0) {
 2674                 VERBOSE("for %s: result=%d, rcls=%d, err=%d\n",
 2675                         &param[6], result, req->rq_rcls, req->rq_err);
 2676                 result = smb_errno(req);
 2677                 goto out;
 2678         }
 2679         result = -ENOENT;
 2680         if (req->rq_ldata < 22) {
 2681                 PARANOIA("not enough data for %s, len=%d\n",
 2682                          &param[6], req->rq_ldata);
 2683                 goto out;
 2684         }
 2685 
 2686         result = 0;
 2687 out:
 2688         return result;
 2689 }
 2690 
 2691 static int
 2692 smb_proc_getattr_trans2_std(struct smb_sb_info *server, struct dentry *dir,
 2693                             struct smb_fattr *attr)
 2694 {
 2695         u16 date, time;
 2696         int off_date = 0, off_time = 2;
 2697         int result;
 2698         struct smb_request *req;
 2699 
 2700         result = -ENOMEM;
 2701         if (! (req = smb_alloc_request(server, PAGE_SIZE)))
 2702                 goto out;
 2703 
 2704         result = smb_proc_getattr_trans2(server, dir, req, SMB_INFO_STANDARD);
 2705         if (result < 0)
 2706                 goto out_free;
 2707 
 2708         /*
 2709          * Kludge alert: Win 95 swaps the date and time field,
 2710          * contrary to the CIFS docs and Win NT practice.
 2711          */
 2712         if (server->mnt->flags & SMB_MOUNT_WIN95) {
 2713                 off_date = 2;
 2714                 off_time = 0;
 2715         }
 2716         date = WVAL(req->rq_data, off_date);
 2717         time = WVAL(req->rq_data, off_time);
 2718         attr->f_ctime.tv_sec = date_dos2unix(server, date, time);
 2719         attr->f_ctime.tv_nsec = 0;
 2720 
 2721         date = WVAL(req->rq_data, 4 + off_date);
 2722         time = WVAL(req->rq_data, 4 + off_time);
 2723         attr->f_atime.tv_sec = date_dos2unix(server, date, time);
 2724         attr->f_atime.tv_nsec = 0;
 2725 
 2726         date = WVAL(req->rq_data, 8 + off_date);
 2727         time = WVAL(req->rq_data, 8 + off_time);
 2728         attr->f_mtime.tv_sec = date_dos2unix(server, date, time);
 2729         attr->f_mtime.tv_nsec = 0;
 2730 #ifdef SMBFS_DEBUG_TIMESTAMP
 2731         printk(KERN_DEBUG "getattr_trans2: %s/%s, date=%x, time=%x, mtime=%ld\n",
 2732                DENTRY_PATH(dir), date, time, attr->f_mtime);
 2733 #endif
 2734         attr->f_size = DVAL(req->rq_data, 12);
 2735         attr->attr = WVAL(req->rq_data, 20);
 2736 
 2737 out_free:
 2738         smb_rput(req);
 2739 out:
 2740         return result;
 2741 }
 2742 
 2743 static int
 2744 smb_proc_getattr_trans2_all(struct smb_sb_info *server, struct dentry *dir,
 2745                             struct smb_fattr *attr)
 2746 {
 2747         struct smb_request *req;
 2748         int result;
 2749 
 2750         result = -ENOMEM;
 2751         if (! (req = smb_alloc_request(server, PAGE_SIZE)))
 2752                 goto out;
 2753 
 2754         result = smb_proc_getattr_trans2(server, dir, req,
 2755                                          SMB_QUERY_FILE_ALL_INFO);
 2756         if (result < 0)
 2757                 goto out_free;
 2758 
 2759         attr->f_ctime = smb_ntutc2unixutc(LVAL(req->rq_data, 0));
 2760         attr->f_atime = smb_ntutc2unixutc(LVAL(req->rq_data, 8));
 2761         attr->f_mtime = smb_ntutc2unixutc(LVAL(req->rq_data, 16));
 2762         /* change (24) */
 2763         attr->attr = WVAL(req->rq_data, 32);
 2764         /* pad? (34) */
 2765         /* allocated size (40) */
 2766         attr->f_size = LVAL(req->rq_data, 48);
 2767 
 2768 out_free:
 2769         smb_rput(req);
 2770 out:
 2771         return result;
 2772 }
 2773 
 2774 static int
 2775 smb_proc_getattr_unix(struct smb_sb_info *server, struct dentry *dir,
 2776                       struct smb_fattr *attr)
 2777 {
 2778         struct smb_request *req;
 2779         int result;
 2780 
 2781         result = -ENOMEM;
 2782         if (! (req = smb_alloc_request(server, PAGE_SIZE)))
 2783                 goto out;
 2784 
 2785         result = smb_proc_getattr_trans2(server, dir, req,
 2786                                          SMB_QUERY_FILE_UNIX_BASIC);
 2787         if (result < 0)
 2788                 goto out_free;
 2789 
 2790         smb_decode_unix_basic(attr, server, req->rq_data);
 2791 
 2792 out_free:
 2793         smb_rput(req);
 2794 out:
 2795         return result;
 2796 }
 2797 
 2798 static int
 2799 smb_proc_getattr_95(struct smb_sb_info *server, struct dentry *dir,
 2800                     struct smb_fattr *attr)
 2801 {
 2802         struct inode *inode = dir->d_inode;
 2803         int result;
 2804 
 2805         /* FIXME: why not use the "all" version? */
 2806         result = smb_proc_getattr_trans2_std(server, dir, attr);
 2807         if (result < 0)
 2808                 goto out;
 2809 
 2810         /*
 2811          * None of the getattr versions here can make win9x return the right
 2812          * filesize if there are changes made to an open file.
 2813          * A seek-to-end does return the right size, but we only need to do
 2814          * that on files we have written.
 2815          */
 2816         if (inode && SMB_I(inode)->flags & SMB_F_LOCALWRITE &&
 2817             smb_is_open(inode))
 2818         {
 2819                 __u16 fileid = SMB_I(inode)->fileid;
 2820                 attr->f_size = smb_proc_seek(server, fileid, 2, 0);
 2821         }
 2822 
 2823 out:
 2824         return result;
 2825 }
 2826 
 2827 static int
 2828 smb_proc_ops_wait(struct smb_sb_info *server)
 2829 {
 2830         int result;
 2831 
 2832         result = wait_event_interruptible_timeout(server->conn_wq,
 2833                                 server->conn_complete, 30*HZ);
 2834 
 2835         if (!result || signal_pending(current))
 2836                 return -EIO;
 2837 
 2838         return 0;
 2839 }
 2840 
 2841 static int
 2842 smb_proc_getattr_null(struct smb_sb_info *server, struct dentry *dir,
 2843                           struct smb_fattr *fattr)
 2844 {
 2845         int result;
 2846 
 2847         if (smb_proc_ops_wait(server) < 0)
 2848                 return -EIO;
 2849 
 2850         smb_init_dirent(server, fattr);
 2851         result = server->ops->getattr(server, dir, fattr);
 2852         smb_finish_dirent(server, fattr);
 2853 
 2854         return result;
 2855 }
 2856 
 2857 static int
 2858 smb_proc_readdir_null(struct file *filp, void *dirent, filldir_t filldir,
 2859                       struct smb_cache_control *ctl)
 2860 {
 2861         struct smb_sb_info *server = server_from_dentry(filp->f_path.dentry);
 2862 
 2863         if (smb_proc_ops_wait(server) < 0)
 2864                 return -EIO;
 2865 
 2866         return server->ops->readdir(filp, dirent, filldir, ctl);
 2867 }
 2868 
 2869 int
 2870 smb_proc_getattr(struct dentry *dir, struct smb_fattr *fattr)
 2871 {
 2872         struct smb_sb_info *server = server_from_dentry(dir);
 2873         int result;
 2874 
 2875         smb_init_dirent(server, fattr);
 2876         result = server->ops->getattr(server, dir, fattr);
 2877         smb_finish_dirent(server, fattr);
 2878 
 2879         return result;
 2880 }
 2881 
 2882 
 2883 /*
 2884  * Because of bugs in the core protocol, we use this only to set
 2885  * attributes. See smb_proc_settime() below for timestamp handling.
 2886  *
 2887  * Bugs Noted:
 2888  * (1) If mtime is non-zero, both Win 3.1 and Win 95 fail
 2889  * with an undocumented error (ERRDOS code 50). Setting
 2890  * mtime to 0 allows the attributes to be set.
 2891  * (2) The extra parameters following the name string aren't
 2892  * in the CIFS docs, but seem to be necessary for operation.
 2893  */
 2894 static int
 2895 smb_proc_setattr_core(struct smb_sb_info *server, struct dentry *dentry,
 2896                       __u16 attr)
 2897 {
 2898         char *p;
 2899         int result;
 2900         struct smb_request *req;
 2901 
 2902         result = -ENOMEM;
 2903         if (! (req = smb_alloc_request(server, PAGE_SIZE)))
 2904                 goto out;
 2905 
 2906         p = smb_setup_header(req, SMBsetatr, 8, 0);
 2907         WSET(req->rq_header, smb_vwv0, attr);
 2908         DSET(req->rq_header, smb_vwv1, 0); /* mtime */
 2909         WSET(req->rq_header, smb_vwv3, 0); /* reserved values */
 2910         WSET(req->rq_header, smb_vwv4, 0);
 2911         WSET(req->rq_header, smb_vwv5, 0);
 2912         WSET(req->rq_header, smb_vwv6, 0);
 2913         WSET(req->rq_header, smb_vwv7, 0);
 2914         result = smb_simple_encode_path(req, &p, dentry, NULL);
 2915         if (result < 0)
 2916                 goto out_free;
 2917         if (p + 2 > (char *)req->rq_buffer + req->rq_bufsize) {
 2918                 result = -ENAMETOOLONG;
 2919                 goto out_free;
 2920         }
 2921         *p++ = 4;
 2922         *p++ = 0;
 2923         smb_setup_bcc(req, p);
 2924 
 2925         result = smb_request_ok(req, SMBsetatr, 0, 0);
 2926         if (result < 0)
 2927                 goto out_free;
 2928         result = 0;
 2929 
 2930 out_free:
 2931         smb_rput(req);
 2932 out:
 2933         return result;
 2934 }
 2935 
 2936 /*
 2937  * Because of bugs in the trans2 setattr messages, we must set
 2938  * attributes and timestamps separately. The core SMBsetatr
 2939  * message seems to be the only reliable way to set attributes.
 2940  */
 2941 int
 2942 smb_proc_setattr(struct dentry *dir, struct smb_fattr *fattr)
 2943 {
 2944         struct smb_sb_info *server = server_from_dentry(dir);
 2945         int result;
 2946 
 2947         VERBOSE("setting %s/%s, open=%d\n", 
 2948                 DENTRY_PATH(dir), smb_is_open(dir->d_inode));
 2949         result = smb_proc_setattr_core(server, dir, fattr->attr);
 2950         return result;
 2951 }
 2952 
 2953 /*
 2954  * Sets the timestamps for an file open with write permissions.
 2955  */
 2956 static int
 2957 smb_proc_setattr_ext(struct smb_sb_info *server,
 2958                       struct inode *inode, struct smb_fattr *fattr)
 2959 {
 2960         __u16 date, time;
 2961         int result;
 2962         struct smb_request *req;
 2963 
 2964         result = -ENOMEM;
 2965         if (! (req = smb_alloc_request(server, 0)))
 2966                 goto out;
 2967 
 2968         smb_setup_header(req, SMBsetattrE, 7, 0);
 2969         WSET(req->rq_header, smb_vwv0, SMB_I(inode)->fileid);
 2970         /* We don't change the creation time */
 2971         WSET(req->rq_header, smb_vwv1, 0);
 2972         WSET(req->rq_header, smb_vwv2, 0);
 2973         date_unix2dos(server, fattr->f_atime.tv_sec, &date, &time);
 2974         WSET(req->rq_header, smb_vwv3, date);
 2975         WSET(req->rq_header, smb_vwv4, time);
 2976         date_unix2dos(server, fattr->f_mtime.tv_sec, &date, &time);
 2977         WSET(req->rq_header, smb_vwv5, date);
 2978         WSET(req->rq_header, smb_vwv6, time);
 2979 #ifdef SMBFS_DEBUG_TIMESTAMP
 2980         printk(KERN_DEBUG "smb_proc_setattr_ext: date=%d, time=%d, mtime=%ld\n",
 2981                date, time, fattr->f_mtime);
 2982 #endif
 2983 
 2984         req->rq_flags |= SMB_REQ_NORETRY;
 2985         result = smb_request_ok(req, SMBsetattrE, 0, 0);
 2986         if (result < 0)
 2987                 goto out_free;
 2988         result = 0;
 2989 out_free:
 2990         smb_rput(req);
 2991 out:
 2992         return result;
 2993 }
 2994 
 2995 /*
 2996  * Bugs Noted:
 2997  * (1) The TRANSACT2_SETPATHINFO message under Win NT 4.0 doesn't
 2998  * set the file's attribute flags.
 2999  */
 3000 static int
 3001 smb_proc_setattr_trans2(struct smb_sb_info *server,
 3002                         struct dentry *dir, struct smb_fattr *fattr)
 3003 {
 3004         __u16 date, time;
 3005         char *p, *param;
 3006         int result;
 3007         char data[26];
 3008         struct smb_request *req;
 3009 
 3010         result = -ENOMEM;
 3011         if (! (req = smb_alloc_request(server, PAGE_SIZE)))
 3012                 goto out;
 3013         param = req->rq_buffer;
 3014 
 3015         WSET(param, 0, 1);      /* Info level SMB_INFO_STANDARD */
 3016         DSET(param, 2, 0);
 3017         result = smb_encode_path(server, param+6, SMB_MAXPATHLEN+1, dir, NULL);
 3018         if (result < 0)
 3019                 goto out_free;
 3020         p = param + 6 + result;
 3021 
 3022         WSET(data, 0, 0); /* creation time */
 3023         WSET(data, 2, 0);
 3024         date_unix2dos(server, fattr->f_atime.tv_sec, &date, &time);
 3025         WSET(data, 4, date);
 3026         WSET(data, 6, time);
 3027         date_unix2dos(server, fattr->f_mtime.tv_sec, &date, &time);
 3028         WSET(data, 8, date);
 3029         WSET(data, 10, time);
 3030 #ifdef SMBFS_DEBUG_TIMESTAMP
 3031         printk(KERN_DEBUG "setattr_trans2: %s/%s, date=%x, time=%x, mtime=%ld\n", 
 3032                DENTRY_PATH(dir), date, time, fattr->f_mtime);
 3033 #endif
 3034         DSET(data, 12, 0); /* size */
 3035         DSET(data, 16, 0); /* blksize */
 3036         WSET(data, 20, 0); /* attr */
 3037         DSET(data, 22, 0); /* ULONG EA size */
 3038 
 3039         req->rq_trans2_command = TRANSACT2_SETPATHINFO;
 3040         req->rq_ldata = 26;
 3041         req->rq_data  = data;
 3042         req->rq_lparm = p - param;
 3043         req->rq_parm  = param;
 3044         req->rq_flags = 0;
 3045         result = smb_add_request(req);
 3046         if (result < 0)
 3047                 goto out_free;
 3048         result = 0;
 3049         if (req->rq_rcls != 0)
 3050                 result = smb_errno(req);
 3051 
 3052 out_free:
 3053         smb_rput(req);
 3054 out:
 3055         return result;
 3056 }
 3057 
 3058 /*
 3059  * ATTR_MODE      0x001
 3060  * ATTR_UID       0x002
 3061  * ATTR_GID       0x004
 3062  * ATTR_SIZE      0x008
 3063  * ATTR_ATIME     0x010
 3064  * ATTR_MTIME     0x020
 3065  * ATTR_CTIME     0x040
 3066  * ATTR_ATIME_SET 0x080
 3067  * ATTR_MTIME_SET 0x100
 3068  * ATTR_FORCE     0x200 
 3069  * ATTR_ATTR_FLAG 0x400
 3070  *
 3071  * major/minor should only be set by mknod.
 3072  */
 3073 int
 3074 smb_proc_setattr_unix(struct dentry *d, struct iattr *attr,
 3075                       unsigned int major, unsigned int minor)
 3076 {
 3077         struct smb_sb_info *server = server_from_dentry(d);
 3078         u64 nttime;
 3079         char *p, *param;
 3080         int result;
 3081         char data[100];
 3082         struct smb_request *req;
 3083 
 3084         result = -ENOMEM;
 3085         if (! (req = smb_alloc_request(server, PAGE_SIZE)))
 3086                 goto out;
 3087         param = req->rq_buffer;
 3088 
 3089         DEBUG1("valid flags = 0x%04x\n", attr->ia_valid);
 3090 
 3091         WSET(param, 0, SMB_SET_FILE_UNIX_BASIC);
 3092         DSET(param, 2, 0);
 3093         result = smb_encode_path(server, param+6, SMB_MAXPATHLEN+1, d, NULL);
 3094         if (result < 0)
 3095                 goto out_free;
 3096         p = param + 6 + result;
 3097 
 3098         /* 0 L file size in bytes */
 3099         /* 8 L file size on disk in bytes (block count) */
 3100         /* 40 L uid */
 3101         /* 48 L gid */
 3102         /* 56 W file type enum */
 3103         /* 60 L devmajor */
 3104         /* 68 L devminor */
 3105         /* 76 L unique ID (inode) */
 3106         /* 84 L permissions */
 3107         /* 92 L link count */
 3108         LSET(data, 0, SMB_SIZE_NO_CHANGE);
 3109         LSET(data, 8, SMB_SIZE_NO_CHANGE);
 3110         LSET(data, 16, SMB_TIME_NO_CHANGE);
 3111         LSET(data, 24, SMB_TIME_NO_CHANGE);
 3112         LSET(data, 32, SMB_TIME_NO_CHANGE);
 3113         LSET(data, 40, SMB_UID_NO_CHANGE);
 3114         LSET(data, 48, SMB_GID_NO_CHANGE);
 3115         DSET(data, 56, smb_filetype_from_mode(attr->ia_mode));
 3116         LSET(data, 60, major);
 3117         LSET(data, 68, minor);
 3118         LSET(data, 76, 0);
 3119         LSET(data, 84, SMB_MODE_NO_CHANGE);
 3120         LSET(data, 92, 0);
 3121 
 3122         if (attr->ia_valid & ATTR_SIZE) {
 3123                 LSET(data, 0, attr->ia_size);
 3124                 LSET(data, 8, 0); /* can't set anyway */
 3125         }
 3126 
 3127         /*
 3128          * FIXME: check the conversion function it the correct one
 3129          *
 3130          * we can't set ctime but we might as well pass this to the server
 3131          * and let it ignore it.
 3132          */
 3133         if (attr->ia_valid & ATTR_CTIME) {
 3134                 nttime = smb_unixutc2ntutc(attr->ia_ctime);
 3135                 LSET(data, 16, nttime);
 3136         }
 3137         if (attr->ia_valid & ATTR_ATIME) {
 3138                 nttime = smb_unixutc2ntutc(attr->ia_atime);
 3139                 LSET(data, 24, nttime);
 3140         }
 3141         if (attr->ia_valid & ATTR_MTIME) {
 3142                 nttime = smb_unixutc2ntutc(attr->ia_mtime);
 3143                 LSET(data, 32, nttime);
 3144         }
 3145         
 3146         if (attr->ia_valid & ATTR_UID) {
 3147                 LSET(data, 40, attr->ia_uid);
 3148         }
 3149         if (attr->ia_valid & ATTR_GID) {
 3150                 LSET(data, 48, attr->ia_gid); 
 3151         }
 3152         
 3153         if (attr->ia_valid & ATTR_MODE) {
 3154                 LSET(data, 84, attr->ia_mode);
 3155         }
 3156 
 3157         req->rq_trans2_command = TRANSACT2_SETPATHINFO;
 3158         req->rq_ldata = 100;
 3159         req->rq_data  = data;
 3160         req->rq_lparm = p - param;
 3161         req->rq_parm  = param;
 3162         req->rq_flags = 0;
 3163         result = smb_add_request(req);
 3164 
 3165 out_free:
 3166         smb_rput(req);
 3167 out:
 3168         return result;
 3169 }
 3170 
 3171 
 3172 /*
 3173  * Set the modify and access timestamps for a file.
 3174  *
 3175  * Incredibly enough, in all of SMB there is no message to allow
 3176  * setting both attributes and timestamps at once. 
 3177  *
 3178  * Bugs Noted:
 3179  * (1) Win 95 doesn't support the TRANSACT2_SETFILEINFO message 
 3180  * with info level 1 (INFO_STANDARD).
 3181  * (2) Win 95 seems not to support setting directory timestamps.
 3182  * (3) Under the core protocol apparently the only way to set the
 3183  * timestamp is to open and close the file.
 3184  */
 3185 int
 3186 smb_proc_settime(struct dentry *dentry, struct smb_fattr *fattr)
 3187 {
 3188         struct smb_sb_info *server = server_from_dentry(dentry);
 3189         struct inode *inode = dentry->d_inode;
 3190         int result;
 3191 
 3192         VERBOSE("setting %s/%s, open=%d\n",
 3193                 DENTRY_PATH(dentry), smb_is_open(inode));
 3194 
 3195         /* setting the time on a Win95 server fails (tridge) */
 3196         if (server->opt.protocol >= SMB_PROTOCOL_LANMAN2 && 
 3197             !(server->mnt->flags & SMB_MOUNT_WIN95)) {
 3198                 if (smb_is_open(inode) && SMB_I(inode)->access != SMB_O_RDONLY)
 3199                         result = smb_proc_setattr_ext(server, inode, fattr);
 3200                 else
 3201                         result = smb_proc_setattr_trans2(server, dentry, fattr);
 3202         } else {
 3203                 /*
 3204                  * Fail silently on directories ... timestamp can't be set?
 3205                  */
 3206                 result = 0;
 3207                 if (S_ISREG(inode->i_mode)) {
 3208                         /*
 3209                          * Set the mtime by opening and closing the file.
 3210                          * Note that the file is opened read-only, but this
 3211                          * still allows us to set the date (tridge)
 3212                          */
 3213                         result = -EACCES;
 3214                         if (!smb_is_open(inode))
 3215                                 smb_proc_open(server, dentry, SMB_O_RDONLY);
 3216                         if (smb_is_open(inode)) {
 3217                                 inode->i_mtime = fattr->f_mtime;
 3218                                 result = smb_proc_close_inode(server, inode);
 3219                         }
 3220                 }
 3221         }
 3222 
 3223         return result;
 3224 }
 3225 
 3226 int
 3227 smb_proc_dskattr(struct dentry *dentry, struct kstatfs *attr)
 3228 {
 3229         struct smb_sb_info *server = SMB_SB(dentry->d_sb);
 3230         int result;
 3231         char *p;
 3232         long unit;
 3233         struct smb_request *req;
 3234 
 3235         result = -ENOMEM;
 3236         if (! (req = smb_alloc_request(server, 0)))
 3237                 goto out;
 3238 
 3239         smb_setup_header(req, SMBdskattr, 0, 0);
 3240         if ((result = smb_request_ok(req, SMBdskattr, 5, 0)) < 0)
 3241                 goto out_free;
 3242         p = SMB_VWV(req->rq_header);
 3243         unit = (WVAL(p, 2) * WVAL(p, 4)) >> SMB_ST_BLKSHIFT;
 3244         attr->f_blocks = WVAL(p, 0) * unit;
 3245         attr->f_bsize  = SMB_ST_BLKSIZE;
 3246         attr->f_bavail = attr->f_bfree = WVAL(p, 6) * unit;
 3247         result = 0;
 3248 
 3249 out_free:
 3250         smb_rput(req);
 3251 out:
 3252         return result;
 3253 }
 3254 
 3255 int
 3256 smb_proc_read_link(struct smb_sb_info *server, struct dentry *d,
 3257                    char *buffer, int len)
 3258 {
 3259         char *p, *param;
 3260         int result;
 3261         struct smb_request *req;
 3262 
 3263         DEBUG1("readlink of %s/%s\n", DENTRY_PATH(d));
 3264 
 3265         result = -ENOMEM;
 3266         if (! (req = smb_alloc_request(server, PAGE_SIZE)))
 3267                 goto out;
 3268         param = req->rq_buffer;
 3269 
 3270         WSET(param, 0, SMB_QUERY_FILE_UNIX_LINK);
 3271         DSET(param, 2, 0);
 3272         result = smb_encode_path(server, param+6, SMB_MAXPATHLEN+1, d, NULL);
 3273         if (result < 0)
 3274                 goto out_free;
 3275         p = param + 6 + result;
 3276 
 3277         req->rq_trans2_command = TRANSACT2_QPATHINFO;
 3278         req->rq_ldata = 0;
 3279         req->rq_data  = NULL;
 3280         req->rq_lparm = p - param;
 3281         req->rq_parm  = param;
 3282         req->rq_flags = 0;
 3283         result = smb_add_request(req);
 3284         if (result < 0)
 3285                 goto out_free;
 3286         DEBUG1("for %s: result=%d, rcls=%d, err=%d\n",
 3287                 &param[6], result, req->rq_rcls, req->rq_err);
 3288 
 3289         /* copy data up to the \0 or buffer length */
 3290         result = len;
 3291         if (req->rq_ldata < len)
 3292                 result = req->rq_ldata;
 3293         strncpy(buffer, req->rq_data, result);
 3294 
 3295 out_free:
 3296         smb_rput(req);
 3297 out:
 3298         return result;
 3299 }
 3300 
 3301 
 3302 /*
 3303  * Create a symlink object called dentry which points to oldpath.
 3304  * Samba does not permit dangling links but returns a suitable error message.
 3305  */
 3306 int
 3307 smb_proc_symlink(struct smb_sb_info *server, struct dentry *d,
 3308                  const char *oldpath)
 3309 {
 3310         char *p, *param;
 3311         int result;
 3312         struct smb_request *req;
 3313 
 3314         result = -ENOMEM;
 3315         if (! (req = smb_alloc_request(server, PAGE_SIZE)))
 3316                 goto out;
 3317         param = req->rq_buffer;
 3318 
 3319         WSET(param, 0, SMB_SET_FILE_UNIX_LINK);
 3320         DSET(param, 2, 0);
 3321         result = smb_encode_path(server, param + 6, SMB_MAXPATHLEN+1, d, NULL);
 3322         if (result < 0)
 3323                 goto out_free;
 3324         p = param + 6 + result;
 3325 
 3326         req->rq_trans2_command = TRANSACT2_SETPATHINFO;
 3327         req->rq_ldata = strlen(oldpath) + 1;
 3328         req->rq_data  = (char *) oldpath;
 3329         req->rq_lparm = p - param;
 3330         req->rq_parm  = param;
 3331         req->rq_flags = 0;
 3332         result = smb_add_request(req);
 3333         if (result < 0)
 3334                 goto out_free;
 3335 
 3336         DEBUG1("for %s: result=%d, rcls=%d, err=%d\n",
 3337                 &param[6], result, req->rq_rcls, req->rq_err);
 3338         result = 0;
 3339 
 3340 out_free:
 3341         smb_rput(req);
 3342 out:
 3343         return result;
 3344 }
 3345 
 3346 /*
 3347  * Create a hard link object called new_dentry which points to dentry.
 3348  */
 3349 int
 3350 smb_proc_link(struct smb_sb_info *server, struct dentry *dentry,
 3351               struct dentry *new_dentry)
 3352 {
 3353         char *p, *param;
 3354         int result;
 3355         struct smb_request *req;
 3356 
 3357         result = -ENOMEM;
 3358         if (! (req = smb_alloc_request(server, PAGE_SIZE)))
 3359                 goto out;
 3360         param = req->rq_buffer;
 3361 
 3362         WSET(param, 0, SMB_SET_FILE_UNIX_HLINK);
 3363         DSET(param, 2, 0);
 3364         result = smb_encode_path(server, param + 6, SMB_MAXPATHLEN+1,
 3365                                  new_dentry, NULL);
 3366         if (result < 0)
 3367                 goto out_free;
 3368         p = param + 6 + result;
 3369 
 3370         /* Grr, pointless separation of parameters and data ... */
 3371         req->rq_data = p;
 3372         req->rq_ldata = smb_encode_path(server, p, SMB_MAXPATHLEN+1,
 3373                                         dentry, NULL);
 3374 
 3375         req->rq_trans2_command = TRANSACT2_SETPATHINFO;
 3376         req->rq_lparm = p - param;
 3377         req->rq_parm  = param;
 3378         req->rq_flags = 0;
 3379         result = smb_add_request(req);
 3380         if (result < 0)
 3381                 goto out_free;
 3382 
 3383         DEBUG1("for %s: result=%d, rcls=%d, err=%d\n",
 3384                &param[6], result, req->rq_rcls, req->rq_err);
 3385         result = 0;
 3386 
 3387 out_free:
 3388         smb_rput(req);
 3389 out:
 3390         return result;
 3391 }
 3392 
 3393 static int
 3394 smb_proc_query_cifsunix(struct smb_sb_info *server)
 3395 {
 3396         int result;
 3397         int major, minor;
 3398         u64 caps;
 3399         char param[2];
 3400         struct smb_request *req;
 3401 
 3402         result = -ENOMEM;
 3403         if (! (req = smb_alloc_request(server, 100)))
 3404                 goto out;
 3405 
 3406         WSET(param, 0, SMB_QUERY_CIFS_UNIX_INFO);
 3407 
 3408         req->rq_trans2_command = TRANSACT2_QFSINFO;
 3409         req->rq_ldata = 0;
 3410         req->rq_data  = NULL;
 3411         req->rq_lparm = 2;
 3412         req->rq_parm  = param;
 3413         req->rq_flags = 0;
 3414         result = smb_add_request(req);
 3415         if (result < 0)
 3416                 goto out_free;
 3417 
 3418         if (req->rq_ldata < 12) {
 3419                 PARANOIA("Not enough data\n");
 3420                 goto out_free;
 3421         }
 3422         major = WVAL(req->rq_data, 0);
 3423         minor = WVAL(req->rq_data, 2);
 3424 
 3425         DEBUG1("Server implements CIFS Extensions for UNIX systems v%d.%d\n",
 3426                major, minor);
 3427         /* FIXME: verify that we are ok with this major/minor? */
 3428 
 3429         caps = LVAL(req->rq_data, 4);
 3430         DEBUG1("Server capabilities 0x%016llx\n", caps);
 3431 
 3432 out_free:
 3433         smb_rput(req);
 3434 out:
 3435         return result;
 3436 }
 3437 
 3438 
 3439 static void
 3440 install_ops(struct smb_ops *dst, struct smb_ops *src)
 3441 {
 3442         memcpy(dst, src, sizeof(void *) * SMB_OPS_NUM_STATIC);
 3443 }
 3444 
 3445 /* < LANMAN2 */
 3446 static struct smb_ops smb_ops_core =
 3447 {
 3448         .read           = smb_proc_read,
 3449         .write          = smb_proc_write,
 3450         .readdir        = smb_proc_readdir_short,
 3451         .getattr        = smb_proc_getattr_core,
 3452         .truncate       = smb_proc_trunc32,
 3453 };
 3454 
 3455 /* LANMAN2, OS/2, others? */
 3456 static struct smb_ops smb_ops_os2 =
 3457 {
 3458         .read           = smb_proc_read,
 3459         .write          = smb_proc_write,
 3460         .readdir        = smb_proc_readdir_long,
 3461         .getattr        = smb_proc_getattr_trans2_std,
 3462         .truncate       = smb_proc_trunc32,
 3463 };
 3464 
 3465 /* Win95, and possibly some NetApp versions too */
 3466 static struct smb_ops smb_ops_win95 =
 3467 {
 3468         .read           = smb_proc_read,    /* does not support 12word readX */
 3469         .write          = smb_proc_write,
 3470         .readdir        = smb_proc_readdir_long,
 3471         .getattr        = smb_proc_getattr_95,
 3472         .truncate       = smb_proc_trunc95,
 3473 };
 3474 
 3475 /* Samba, NT4 and NT5 */
 3476 static struct smb_ops smb_ops_winNT =
 3477 {
 3478         .read           = smb_proc_readX,
 3479         .write          = smb_proc_writeX,
 3480         .readdir        = smb_proc_readdir_long,
 3481         .getattr        = smb_proc_getattr_trans2_all,
 3482         .truncate       = smb_proc_trunc64,
 3483 };
 3484 
 3485 /* Samba w/ unix extensions. Others? */
 3486 static struct smb_ops smb_ops_unix =
 3487 {
 3488         .read           = smb_proc_readX,
 3489         .write          = smb_proc_writeX,
 3490         .readdir        = smb_proc_readdir_long,
 3491         .getattr        = smb_proc_getattr_unix,
 3492         /* FIXME: core/ext/time setattr needs to be cleaned up! */
 3493         /* .setattr     = smb_proc_setattr_unix, */
 3494         .truncate       = smb_proc_trunc64,
 3495 };
 3496 
 3497 /* Place holder until real ops are in place */
 3498 static struct smb_ops smb_ops_null =
 3499 {
 3500         .readdir        = smb_proc_readdir_null,
 3501         .getattr        = smb_proc_getattr_null,
 3502 };
 3503 
 3504 void smb_install_null_ops(struct smb_ops *ops)
 3505 {
 3506         install_ops(ops, &smb_ops_null);
 3507 }

Cache object: a7cec78ba9c811152e8dcc3ab07ca039


[ source navigation ] [ diff markup ] [ identifier search ] [ freetext search ] [ file search ] [ list types ] [ track identifier ]


This page is part of the FreeBSD/Linux Linux Kernel Cross-Reference, and was automatically generated using a modified version of the LXR engine.