blob: 766307b725bd4eecd330c787e6bcaf9020debcd1 [file] [log] [blame]
Linus Torvalds1da177e2005-04-16 15:20:36 -07001/*
2 * fs/cifs/transport.c
3 *
Steve Frenchad7a2922008-02-07 23:25:02 +00004 * Copyright (C) International Business Machines Corp., 2002,2008
Linus Torvalds1da177e2005-04-16 15:20:36 -07005 * Author(s): Steve French (sfrench@us.ibm.com)
Steve French14a441a2b2006-07-16 04:32:51 +00006 * Jeremy Allison (jra@samba.org) 2006.
Steve French79a58d12007-07-06 22:44:50 +00007 *
Linus Torvalds1da177e2005-04-16 15:20:36 -07008 * This library is free software; you can redistribute it and/or modify
9 * it under the terms of the GNU Lesser General Public License as published
10 * by the Free Software Foundation; either version 2.1 of the License, or
11 * (at your option) any later version.
12 *
13 * This library is distributed in the hope that it will be useful,
14 * but WITHOUT ANY WARRANTY; without even the implied warranty of
15 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See
16 * the GNU Lesser General Public License for more details.
17 *
18 * You should have received a copy of the GNU Lesser General Public License
19 * along with this library; if not, write to the Free Software
Steve French79a58d12007-07-06 22:44:50 +000020 * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
Linus Torvalds1da177e2005-04-16 15:20:36 -070021 */
22
23#include <linux/fs.h>
24#include <linux/list.h>
Tejun Heo5a0e3ad2010-03-24 17:04:11 +090025#include <linux/gfp.h>
Linus Torvalds1da177e2005-04-16 15:20:36 -070026#include <linux/wait.h>
27#include <linux/net.h>
28#include <linux/delay.h>
Jeff Laytonf06ac722011-10-19 15:30:40 -040029#include <linux/freezer.h>
Linus Torvalds1da177e2005-04-16 15:20:36 -070030#include <asm/uaccess.h>
31#include <asm/processor.h>
32#include <linux/mempool.h>
33#include "cifspdu.h"
34#include "cifsglob.h"
35#include "cifsproto.h"
36#include "cifs_debug.h"
Steve French50c2f752007-07-13 00:33:32 +000037
Pavel Shilovsky2dc7e1c2011-12-26 22:53:34 +040038void
39cifs_wake_up_task(struct mid_q_entry *mid)
Jeff Layton2b84a36c2011-01-11 07:24:21 -050040{
41 wake_up_process(mid->callback_data);
42}
43
Jeff Laytona6827c12011-01-11 07:24:21 -050044struct mid_q_entry *
Jeff Layton24b9b062008-12-01 07:09:34 -050045AllocMidQEntry(const struct smb_hdr *smb_buffer, struct TCP_Server_Info *server)
Linus Torvalds1da177e2005-04-16 15:20:36 -070046{
47 struct mid_q_entry *temp;
48
Jeff Layton24b9b062008-12-01 07:09:34 -050049 if (server == NULL) {
Joe Perchesb6b38f72010-04-21 03:50:45 +000050 cERROR(1, "Null TCP session in AllocMidQEntry");
Linus Torvalds1da177e2005-04-16 15:20:36 -070051 return NULL;
52 }
Steve French50c2f752007-07-13 00:33:32 +000053
Pekka Enberg232087c2008-09-15 13:22:54 +030054 temp = mempool_alloc(cifs_mid_poolp, GFP_NOFS);
Linus Torvalds1da177e2005-04-16 15:20:36 -070055 if (temp == NULL)
56 return temp;
57 else {
Steve French26f57362007-08-30 22:09:15 +000058 memset(temp, 0, sizeof(struct mid_q_entry));
Linus Torvalds1da177e2005-04-16 15:20:36 -070059 temp->mid = smb_buffer->Mid; /* always LE */
60 temp->pid = current->pid;
Pavel Shilovsky7c9421e2012-03-23 14:28:03 -040061 temp->command = cpu_to_le16(smb_buffer->Command);
62 cFYI(1, "For smb_command %d", smb_buffer->Command);
Steve French1047abc2005-10-11 19:58:06 -070063 /* do_gettimeofday(&temp->when_sent);*/ /* easier to use jiffies */
64 /* when mid allocated can be before when sent */
65 temp->when_alloc = jiffies;
Pavel Shilovsky2dc7e1c2011-12-26 22:53:34 +040066 temp->server = server;
Jeff Layton2b84a36c2011-01-11 07:24:21 -050067
68 /*
69 * The default is for the mid to be synchronous, so the
70 * default callback just wakes up the current task.
71 */
Pavel Shilovsky2dc7e1c2011-12-26 22:53:34 +040072 temp->callback = cifs_wake_up_task;
Jeff Layton2b84a36c2011-01-11 07:24:21 -050073 temp->callback_data = current;
Linus Torvalds1da177e2005-04-16 15:20:36 -070074 }
75
Linus Torvalds1da177e2005-04-16 15:20:36 -070076 atomic_inc(&midCount);
Pavel Shilovsky7c9421e2012-03-23 14:28:03 -040077 temp->mid_state = MID_REQUEST_ALLOCATED;
Linus Torvalds1da177e2005-04-16 15:20:36 -070078 return temp;
79}
80
Jeff Layton766fdbb2011-01-11 07:24:21 -050081void
Linus Torvalds1da177e2005-04-16 15:20:36 -070082DeleteMidQEntry(struct mid_q_entry *midEntry)
83{
Steve French1047abc2005-10-11 19:58:06 -070084#ifdef CONFIG_CIFS_STATS2
Pavel Shilovsky2dc7e1c2011-12-26 22:53:34 +040085 __le16 command = midEntry->server->vals->lock_cmd;
Steve French1047abc2005-10-11 19:58:06 -070086 unsigned long now;
87#endif
Pavel Shilovsky7c9421e2012-03-23 14:28:03 -040088 midEntry->mid_state = MID_FREE;
Jeff Layton80975312011-01-11 07:24:02 -050089 atomic_dec(&midCount);
Pavel Shilovsky7c9421e2012-03-23 14:28:03 -040090 if (midEntry->large_buf)
Steve Frenchb8643e12005-04-28 22:41:07 -070091 cifs_buf_release(midEntry->resp_buf);
92 else
93 cifs_small_buf_release(midEntry->resp_buf);
Steve French1047abc2005-10-11 19:58:06 -070094#ifdef CONFIG_CIFS_STATS2
95 now = jiffies;
96 /* commands taking longer than one second are indications that
97 something is wrong, unless it is quite a slow link or server */
Steve French79a58d12007-07-06 22:44:50 +000098 if ((now - midEntry->when_alloc) > HZ) {
Pavel Shilovsky2dc7e1c2011-12-26 22:53:34 +040099 if ((cifsFYI & CIFS_TIMER) && (midEntry->command != command)) {
Pavel Shilovsky7c9421e2012-03-23 14:28:03 -0400100 printk(KERN_DEBUG " CIFS slow rsp: cmd %d mid %llu",
Steve French1047abc2005-10-11 19:58:06 -0700101 midEntry->command, midEntry->mid);
102 printk(" A: 0x%lx S: 0x%lx R: 0x%lx\n",
103 now - midEntry->when_alloc,
104 now - midEntry->when_sent,
105 now - midEntry->when_received);
106 }
107 }
108#endif
Linus Torvalds1da177e2005-04-16 15:20:36 -0700109 mempool_free(midEntry, cifs_mid_poolp);
110}
111
Pavel Shilovsky3c1bf7e2012-09-18 16:20:30 -0700112void
113cifs_delete_mid(struct mid_q_entry *mid)
Jeff Laytonddc8cf82011-01-11 07:24:02 -0500114{
115 spin_lock(&GlobalMid_Lock);
116 list_del(&mid->qhead);
117 spin_unlock(&GlobalMid_Lock);
118
119 DeleteMidQEntry(mid);
120}
121
Jeff Layton6f49f462012-09-18 16:20:34 -0700122/*
123 * smb_send_kvec - send an array of kvecs to the server
124 * @server: Server to send the data to
125 * @iov: Pointer to array of kvecs
126 * @n_vec: length of kvec array
127 * @sent: amount of data sent on socket is stored here
128 *
129 * Our basic "send data to server" function. Should be called with srv_mutex
130 * held. The caller is responsible for handling the results.
131 */
Steve Frenchd6e04ae2005-06-13 13:24:43 -0500132static int
Jeff Layton6f49f462012-09-18 16:20:34 -0700133smb_send_kvec(struct TCP_Server_Info *server, struct kvec *iov, size_t n_vec,
134 size_t *sent)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700135{
136 int rc = 0;
137 int i = 0;
138 struct msghdr smb_msg;
Jeff Layton6f49f462012-09-18 16:20:34 -0700139 unsigned int remaining;
140 size_t first_vec = 0;
Steve Frenchedf1ae42008-10-29 00:47:57 +0000141 struct socket *ssocket = server->ssocket;
Steve French50c2f752007-07-13 00:33:32 +0000142
Jeff Layton6f49f462012-09-18 16:20:34 -0700143 *sent = 0;
144
Steve French79a58d12007-07-06 22:44:50 +0000145 if (ssocket == NULL)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700146 return -ENOTSOCK; /* BB eventually add reconnect code here */
Steve French3e844692005-10-03 13:37:24 -0700147
Pavel Shilovskya9f1b852010-12-13 19:08:35 +0300148 smb_msg.msg_name = (struct sockaddr *) &server->dstaddr;
Steve French26f57362007-08-30 22:09:15 +0000149 smb_msg.msg_namelen = sizeof(struct sockaddr);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700150 smb_msg.msg_control = NULL;
151 smb_msg.msg_controllen = 0;
Jeff Layton0496e022008-12-30 12:39:16 -0500152 if (server->noblocksnd)
Steve Frenchedf1ae42008-10-29 00:47:57 +0000153 smb_msg.msg_flags = MSG_DONTWAIT + MSG_NOSIGNAL;
154 else
155 smb_msg.msg_flags = MSG_NOSIGNAL;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700156
Jeff Layton6f49f462012-09-18 16:20:34 -0700157 remaining = 0;
Steve French3e844692005-10-03 13:37:24 -0700158 for (i = 0; i < n_vec; i++)
Jeff Layton6f49f462012-09-18 16:20:34 -0700159 remaining += iov[i].iov_len;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700160
Shirish Pargaonkar17680352008-07-29 21:26:13 +0000161 i = 0;
Jeff Layton6f49f462012-09-18 16:20:34 -0700162 while (remaining) {
163 /*
164 * If blocking send, we try 3 times, since each can block
165 * for 5 seconds. For nonblocking we have to try more
166 * but wait increasing amounts of time allowing time for
167 * socket to clear. The overall time we wait in either
168 * case to send on the socket is about 15 seconds.
169 * Similarly we wait for 15 seconds for a response from
170 * the server in SendReceive[2] for the server to send
171 * a response back for most types of requests (except
172 * SMB Write past end of file which can be slow, and
173 * blocking lock operations). NFS waits slightly longer
174 * than CIFS, but this can make it take longer for
175 * nonresponsive servers to be detected and 15 seconds
176 * is more than enough time for modern networks to
177 * send a packet. In most cases if we fail to send
178 * after the retries we will kill the socket and
179 * reconnect which may clear the network problem.
180 */
Steve French3e844692005-10-03 13:37:24 -0700181 rc = kernel_sendmsg(ssocket, &smb_msg, &iov[first_vec],
Jeff Layton6f49f462012-09-18 16:20:34 -0700182 n_vec - first_vec, remaining);
183 if (rc == -ENOSPC || rc == -EAGAIN) {
Linus Torvalds1da177e2005-04-16 15:20:36 -0700184 i++;
Jeff Layton6f49f462012-09-18 16:20:34 -0700185 if (i >= 14 || (!server->noblocksnd && (i > 2))) {
186 cERROR(1, "sends on sock %p stuck for 15 "
187 "seconds", ssocket);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700188 rc = -EAGAIN;
189 break;
190 }
Steve French68058e72005-10-10 10:34:22 -0700191 msleep(1 << i);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700192 continue;
193 }
Jeff Layton6f49f462012-09-18 16:20:34 -0700194
Steve French79a58d12007-07-06 22:44:50 +0000195 if (rc < 0)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700196 break;
Steve French3e844692005-10-03 13:37:24 -0700197
Jeff Layton6f49f462012-09-18 16:20:34 -0700198 /* send was at least partially successful */
199 *sent += rc;
200
201 if (rc == remaining) {
202 remaining = 0;
Steve French3e844692005-10-03 13:37:24 -0700203 break;
Steve Frenchd6e04ae2005-06-13 13:24:43 -0500204 }
Jeff Layton6f49f462012-09-18 16:20:34 -0700205
206 if (rc > remaining) {
207 cERROR(1, "sent %d requested %d", rc, remaining);
208 break;
209 }
210
Steve French79a58d12007-07-06 22:44:50 +0000211 if (rc == 0) {
Steve French3e844692005-10-03 13:37:24 -0700212 /* should never happen, letting socket clear before
213 retrying is our only obvious option here */
Joe Perchesb6b38f72010-04-21 03:50:45 +0000214 cERROR(1, "tcp sent no data");
Steve French3e844692005-10-03 13:37:24 -0700215 msleep(500);
216 continue;
217 }
Jeff Layton6f49f462012-09-18 16:20:34 -0700218
219 remaining -= rc;
220
Steve French68058e72005-10-10 10:34:22 -0700221 /* the line below resets i */
Steve French3e844692005-10-03 13:37:24 -0700222 for (i = first_vec; i < n_vec; i++) {
223 if (iov[i].iov_len) {
224 if (rc > iov[i].iov_len) {
225 rc -= iov[i].iov_len;
226 iov[i].iov_len = 0;
227 } else {
228 iov[i].iov_base += rc;
229 iov[i].iov_len -= rc;
230 first_vec = i;
231 break;
232 }
233 }
Steve Frenchd6e04ae2005-06-13 13:24:43 -0500234 }
Jeff Layton6f49f462012-09-18 16:20:34 -0700235
Steve French5e1253b2005-10-10 14:06:37 -0700236 i = 0; /* in case we get ENOSPC on the next send */
Jeff Layton6f49f462012-09-18 16:20:34 -0700237 rc = 0;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700238 }
Jeff Layton6f49f462012-09-18 16:20:34 -0700239 return rc;
240}
241
242static int
243smb_send_rqst(struct TCP_Server_Info *server, struct smb_rqst *rqst)
244{
245 int rc;
246 struct kvec *iov = rqst->rq_iov;
247 int n_vec = rqst->rq_nvec;
248 unsigned int smb_buf_length = get_rfc1002_length(iov[0].iov_base);
249 size_t total_len;
250
251 cFYI(1, "Sending smb: smb_len=%u", smb_buf_length);
252 dump_smb(iov[0].iov_base, iov[0].iov_len);
253
254 rc = smb_send_kvec(server, iov, n_vec, &total_len);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700255
Steve Frenchedf1ae42008-10-29 00:47:57 +0000256 if ((total_len > 0) && (total_len != smb_buf_length + 4)) {
Jeff Layton6f49f462012-09-18 16:20:34 -0700257 cFYI(1, "partial send (wanted=%u sent=%zu): terminating "
258 "session", smb_buf_length + 4, total_len);
259 /*
260 * If we have only sent part of an SMB then the next SMB could
261 * be taken as the remainder of this one. We need to kill the
262 * socket so the server throws away the partial SMB
263 */
Steve Frenchedf1ae42008-10-29 00:47:57 +0000264 server->tcpStatus = CifsNeedReconnect;
265 }
266
Jeff Laytond804d412011-01-28 15:05:43 -0500267 if (rc < 0 && rc != -EINTR)
Joe Perchesb6b38f72010-04-21 03:50:45 +0000268 cERROR(1, "Error %d sending data on socket to server", rc);
Jeff Laytond804d412011-01-28 15:05:43 -0500269 else
Linus Torvalds1da177e2005-04-16 15:20:36 -0700270 rc = 0;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700271
272 return rc;
273}
274
Jeff Layton6f49f462012-09-18 16:20:34 -0700275static int
276smb_sendv(struct TCP_Server_Info *server, struct kvec *iov, int n_vec)
277{
278 struct smb_rqst rqst = { .rq_iov = iov,
279 .rq_nvec = n_vec };
280
281 return smb_send_rqst(server, &rqst);
282}
283
Jeff Layton0496e022008-12-30 12:39:16 -0500284int
285smb_send(struct TCP_Server_Info *server, struct smb_hdr *smb_buffer,
286 unsigned int smb_buf_length)
287{
288 struct kvec iov;
289
290 iov.iov_base = smb_buffer;
291 iov.iov_len = smb_buf_length + 4;
292
293 return smb_sendv(server, &iov, 1);
294}
295
Pavel Shilovskyfc40f9c2012-02-17 17:09:12 +0300296static int
Pavel Shilovskya891f0f2012-05-23 16:14:34 +0400297wait_for_free_credits(struct TCP_Server_Info *server, const int timeout,
Pavel Shilovskybc205ed2012-03-15 13:22:27 +0300298 int *credits)
Jeremy Allison7ee1af72006-08-02 21:56:33 +0000299{
Pavel Shilovsky5bc59492012-02-21 19:56:08 +0300300 int rc;
301
Pavel Shilovskyfc40f9c2012-02-17 17:09:12 +0300302 spin_lock(&server->req_lock);
Pavel Shilovskya891f0f2012-05-23 16:14:34 +0400303 if (timeout == CIFS_ASYNC_OP) {
Jeremy Allison7ee1af72006-08-02 21:56:33 +0000304 /* oplock breaks must not be held up */
Pavel Shilovskyfc40f9c2012-02-17 17:09:12 +0300305 server->in_flight++;
Pavel Shilovskybc205ed2012-03-15 13:22:27 +0300306 *credits -= 1;
Pavel Shilovskyfc40f9c2012-02-17 17:09:12 +0300307 spin_unlock(&server->req_lock);
Volker Lendecke27a97a62008-12-08 20:59:39 +0000308 return 0;
309 }
Jeremy Allison7ee1af72006-08-02 21:56:33 +0000310
Volker Lendecke27a97a62008-12-08 20:59:39 +0000311 while (1) {
Pavel Shilovskybc205ed2012-03-15 13:22:27 +0300312 if (*credits <= 0) {
Pavel Shilovskyfc40f9c2012-02-17 17:09:12 +0300313 spin_unlock(&server->req_lock);
Steve French789e6662011-08-09 18:44:44 +0000314 cifs_num_waiters_inc(server);
Pavel Shilovsky5bc59492012-02-21 19:56:08 +0300315 rc = wait_event_killable(server->request_q,
Pavel Shilovskybc205ed2012-03-15 13:22:27 +0300316 has_credits(server, credits));
Steve French789e6662011-08-09 18:44:44 +0000317 cifs_num_waiters_dec(server);
Pavel Shilovsky5bc59492012-02-21 19:56:08 +0300318 if (rc)
319 return rc;
Pavel Shilovskyfc40f9c2012-02-17 17:09:12 +0300320 spin_lock(&server->req_lock);
Volker Lendecke27a97a62008-12-08 20:59:39 +0000321 } else {
Jeff Laytonc5797a92011-01-11 07:24:01 -0500322 if (server->tcpStatus == CifsExiting) {
Pavel Shilovskyfc40f9c2012-02-17 17:09:12 +0300323 spin_unlock(&server->req_lock);
Volker Lendecke27a97a62008-12-08 20:59:39 +0000324 return -ENOENT;
Jeremy Allison7ee1af72006-08-02 21:56:33 +0000325 }
Volker Lendecke27a97a62008-12-08 20:59:39 +0000326
Pavel Shilovsky2d86dbc2012-02-06 15:59:18 +0400327 /*
328 * Can not count locking commands against total
329 * as they are allowed to block on server.
330 */
Volker Lendecke27a97a62008-12-08 20:59:39 +0000331
332 /* update # of requests on the wire to server */
Pavel Shilovskya891f0f2012-05-23 16:14:34 +0400333 if (timeout != CIFS_BLOCKING_OP) {
Pavel Shilovskybc205ed2012-03-15 13:22:27 +0300334 *credits -= 1;
Pavel Shilovskyfc40f9c2012-02-17 17:09:12 +0300335 server->in_flight++;
Pavel Shilovsky2d86dbc2012-02-06 15:59:18 +0400336 }
Pavel Shilovskyfc40f9c2012-02-17 17:09:12 +0300337 spin_unlock(&server->req_lock);
Volker Lendecke27a97a62008-12-08 20:59:39 +0000338 break;
Jeremy Allison7ee1af72006-08-02 21:56:33 +0000339 }
340 }
341 return 0;
342}
343
Pavel Shilovskybc205ed2012-03-15 13:22:27 +0300344static int
Pavel Shilovskya891f0f2012-05-23 16:14:34 +0400345wait_for_free_request(struct TCP_Server_Info *server, const int timeout,
346 const int optype)
Pavel Shilovskybc205ed2012-03-15 13:22:27 +0300347{
Pavel Shilovskya891f0f2012-05-23 16:14:34 +0400348 return wait_for_free_credits(server, timeout,
349 server->ops->get_credits_field(server, optype));
Pavel Shilovskybc205ed2012-03-15 13:22:27 +0300350}
351
Steve French96daf2b2011-05-27 04:34:02 +0000352static int allocate_mid(struct cifs_ses *ses, struct smb_hdr *in_buf,
Jeremy Allison7ee1af72006-08-02 21:56:33 +0000353 struct mid_q_entry **ppmidQ)
354{
355 if (ses->server->tcpStatus == CifsExiting) {
356 return -ENOENT;
Volker Lendecke8fbbd362008-12-06 13:12:34 +0100357 }
358
359 if (ses->server->tcpStatus == CifsNeedReconnect) {
Joe Perchesb6b38f72010-04-21 03:50:45 +0000360 cFYI(1, "tcp session dead - return to caller to retry");
Jeremy Allison7ee1af72006-08-02 21:56:33 +0000361 return -EAGAIN;
Volker Lendecke8fbbd362008-12-06 13:12:34 +0100362 }
363
364 if (ses->status != CifsGood) {
Jeremy Allison7ee1af72006-08-02 21:56:33 +0000365 /* check if SMB session is bad because we are setting it up */
Steve French79a58d12007-07-06 22:44:50 +0000366 if ((in_buf->Command != SMB_COM_SESSION_SETUP_ANDX) &&
Steve Frenchad7a2922008-02-07 23:25:02 +0000367 (in_buf->Command != SMB_COM_NEGOTIATE))
Jeremy Allison7ee1af72006-08-02 21:56:33 +0000368 return -EAGAIN;
Steve Frenchad7a2922008-02-07 23:25:02 +0000369 /* else ok - we are setting up session */
Jeremy Allison7ee1af72006-08-02 21:56:33 +0000370 }
Jeff Layton24b9b062008-12-01 07:09:34 -0500371 *ppmidQ = AllocMidQEntry(in_buf, ses->server);
Steve French26f57362007-08-30 22:09:15 +0000372 if (*ppmidQ == NULL)
Jeremy Allison7ee1af72006-08-02 21:56:33 +0000373 return -ENOMEM;
Jeff Laytonddc8cf82011-01-11 07:24:02 -0500374 spin_lock(&GlobalMid_Lock);
375 list_add_tail(&(*ppmidQ)->qhead, &ses->server->pending_mid_q);
376 spin_unlock(&GlobalMid_Lock);
Jeremy Allison7ee1af72006-08-02 21:56:33 +0000377 return 0;
378}
379
Jeff Layton0ade6402011-01-11 07:24:02 -0500380static int
381wait_for_response(struct TCP_Server_Info *server, struct mid_q_entry *midQ)
Jeremy Allison7ee1af72006-08-02 21:56:33 +0000382{
Jeff Layton0ade6402011-01-11 07:24:02 -0500383 int error;
Jeremy Allison7ee1af72006-08-02 21:56:33 +0000384
Jeff Laytonf06ac722011-10-19 15:30:40 -0400385 error = wait_event_freezekillable(server->response_q,
Pavel Shilovsky7c9421e2012-03-23 14:28:03 -0400386 midQ->mid_state != MID_REQUEST_SUBMITTED);
Jeff Layton0ade6402011-01-11 07:24:02 -0500387 if (error < 0)
388 return -ERESTARTSYS;
Jeremy Allison7ee1af72006-08-02 21:56:33 +0000389
Jeff Layton0ade6402011-01-11 07:24:02 -0500390 return 0;
Jeremy Allison7ee1af72006-08-02 21:56:33 +0000391}
392
Pavel Shilovsky45740842012-06-01 14:26:18 +0400393int
Pavel Shilovsky792af7b2012-03-23 14:28:02 -0400394cifs_setup_async_request(struct TCP_Server_Info *server, struct kvec *iov,
395 unsigned int nvec, struct mid_q_entry **ret_mid)
396{
397 int rc;
398 struct smb_hdr *hdr = (struct smb_hdr *)iov[0].iov_base;
399 struct mid_q_entry *mid;
400
401 /* enable signing if server requires it */
402 if (server->sec_mode & (SECMODE_SIGN_REQUIRED | SECMODE_SIGN_ENABLED))
403 hdr->Flags2 |= SMBFLG2_SECURITY_SIGNATURE;
404
405 mid = AllocMidQEntry(hdr, server);
406 if (mid == NULL)
407 return -ENOMEM;
408
Jeff Layton762a4202012-07-23 13:28:38 -0400409 rc = cifs_sign_smbv(iov, nvec, server, &mid->sequence_number);
Sachin Prabhuffc61cc2012-07-11 12:28:05 +0100410 if (rc) {
411 DeleteMidQEntry(mid);
412 return rc;
413 }
414
Pavel Shilovsky792af7b2012-03-23 14:28:02 -0400415 *ret_mid = mid;
Sachin Prabhuffc61cc2012-07-11 12:28:05 +0100416 return 0;
Pavel Shilovsky792af7b2012-03-23 14:28:02 -0400417}
Steve French133672e2007-11-13 22:41:37 +0000418
419/*
Jeff Laytona6827c12011-01-11 07:24:21 -0500420 * Send a SMB request and set the callback function in the mid to handle
421 * the result. Caller is responsible for dealing with timeouts.
422 */
423int
Jeff Laytonfcc31cb2011-05-19 16:22:53 -0400424cifs_call_async(struct TCP_Server_Info *server, struct kvec *iov,
Jeff Layton44d22d82011-10-19 15:29:49 -0400425 unsigned int nvec, mid_receive_t *receive,
Pavel Shilovskya891f0f2012-05-23 16:14:34 +0400426 mid_callback_t *callback, void *cbdata, const int flags)
Jeff Laytona6827c12011-01-11 07:24:21 -0500427{
Pavel Shilovskya891f0f2012-05-23 16:14:34 +0400428 int rc, timeout, optype;
Jeff Laytona6827c12011-01-11 07:24:21 -0500429 struct mid_q_entry *mid;
430
Pavel Shilovskya891f0f2012-05-23 16:14:34 +0400431 timeout = flags & CIFS_TIMEOUT_MASK;
432 optype = flags & CIFS_OP_MASK;
433
434 rc = wait_for_free_request(server, timeout, optype);
Jeff Laytona6827c12011-01-11 07:24:21 -0500435 if (rc)
436 return rc;
437
438 mutex_lock(&server->srv_mutex);
Pavel Shilovsky45740842012-06-01 14:26:18 +0400439 rc = server->ops->setup_async_request(server, iov, nvec, &mid);
Pavel Shilovsky792af7b2012-03-23 14:28:02 -0400440 if (rc) {
Jeff Laytona6827c12011-01-11 07:24:21 -0500441 mutex_unlock(&server->srv_mutex);
Pavel Shilovskya891f0f2012-05-23 16:14:34 +0400442 add_credits(server, 1, optype);
Pavel Shilovsky0193e072011-08-03 23:12:18 +0400443 wake_up(&server->request_q);
Pavel Shilovsky792af7b2012-03-23 14:28:02 -0400444 return rc;
Jeff Laytona6827c12011-01-11 07:24:21 -0500445 }
446
Jeff Layton44d22d82011-10-19 15:29:49 -0400447 mid->receive = receive;
Jeff Laytona6827c12011-01-11 07:24:21 -0500448 mid->callback = callback;
449 mid->callback_data = cbdata;
Pavel Shilovsky7c9421e2012-03-23 14:28:03 -0400450 mid->mid_state = MID_REQUEST_SUBMITTED;
Steve French789e6662011-08-09 18:44:44 +0000451
Sachin Prabhuffc61cc2012-07-11 12:28:05 +0100452 /* put it on the pending_mid_q */
453 spin_lock(&GlobalMid_Lock);
454 list_add_tail(&mid->qhead, &server->pending_mid_q);
455 spin_unlock(&GlobalMid_Lock);
456
457
Steve French789e6662011-08-09 18:44:44 +0000458 cifs_in_send_inc(server);
Jeff Laytonfcc31cb2011-05-19 16:22:53 -0400459 rc = smb_sendv(server, iov, nvec);
Steve French789e6662011-08-09 18:44:44 +0000460 cifs_in_send_dec(server);
461 cifs_save_when_sent(mid);
Jeff Laytona6827c12011-01-11 07:24:21 -0500462 mutex_unlock(&server->srv_mutex);
Steve French789e6662011-08-09 18:44:44 +0000463
Sachin Prabhuffc61cc2012-07-11 12:28:05 +0100464 if (rc == 0)
465 return 0;
Jeff Laytona6827c12011-01-11 07:24:21 -0500466
Pavel Shilovsky3c1bf7e2012-09-18 16:20:30 -0700467 cifs_delete_mid(mid);
Pavel Shilovskya891f0f2012-05-23 16:14:34 +0400468 add_credits(server, 1, optype);
Jeff Laytona6827c12011-01-11 07:24:21 -0500469 wake_up(&server->request_q);
470 return rc;
471}
472
473/*
Steve French133672e2007-11-13 22:41:37 +0000474 *
475 * Send an SMB Request. No response info (other than return code)
476 * needs to be parsed.
477 *
478 * flags indicate the type of request buffer and how long to wait
479 * and whether to log NT STATUS code (error) before mapping it to POSIX error
480 *
481 */
482int
Steve French96daf2b2011-05-27 04:34:02 +0000483SendReceiveNoRsp(const unsigned int xid, struct cifs_ses *ses,
Pavel Shilovsky792af7b2012-03-23 14:28:02 -0400484 char *in_buf, int flags)
Steve French133672e2007-11-13 22:41:37 +0000485{
486 int rc;
487 struct kvec iov[1];
488 int resp_buf_type;
489
Pavel Shilovsky792af7b2012-03-23 14:28:02 -0400490 iov[0].iov_base = in_buf;
491 iov[0].iov_len = get_rfc1002_length(in_buf) + 4;
Steve French133672e2007-11-13 22:41:37 +0000492 flags |= CIFS_NO_RESP;
493 rc = SendReceive2(xid, ses, iov, 1, &resp_buf_type, flags);
Joe Perchesb6b38f72010-04-21 03:50:45 +0000494 cFYI(DBG2, "SendRcvNoRsp flags %d rc %d", flags, rc);
Steve French90c81e02008-02-12 20:32:36 +0000495
Steve French133672e2007-11-13 22:41:37 +0000496 return rc;
497}
498
Jeff Layton053d5032011-01-11 07:24:02 -0500499static int
Jeff Layton3c1105d2011-05-22 07:09:13 -0400500cifs_sync_mid_result(struct mid_q_entry *mid, struct TCP_Server_Info *server)
Jeff Layton053d5032011-01-11 07:24:02 -0500501{
502 int rc = 0;
503
Pavel Shilovsky7c9421e2012-03-23 14:28:03 -0400504 cFYI(1, "%s: cmd=%d mid=%llu state=%d", __func__,
505 le16_to_cpu(mid->command), mid->mid, mid->mid_state);
Jeff Layton053d5032011-01-11 07:24:02 -0500506
Jeff Layton74dd92a2011-01-11 07:24:02 -0500507 spin_lock(&GlobalMid_Lock);
Pavel Shilovsky7c9421e2012-03-23 14:28:03 -0400508 switch (mid->mid_state) {
Jeff Layton74dd92a2011-01-11 07:24:02 -0500509 case MID_RESPONSE_RECEIVED:
Jeff Layton053d5032011-01-11 07:24:02 -0500510 spin_unlock(&GlobalMid_Lock);
511 return rc;
Jeff Layton74dd92a2011-01-11 07:24:02 -0500512 case MID_RETRY_NEEDED:
513 rc = -EAGAIN;
514 break;
Jeff Layton71823ba2011-02-10 08:03:50 -0500515 case MID_RESPONSE_MALFORMED:
516 rc = -EIO;
517 break;
Jeff Layton3c1105d2011-05-22 07:09:13 -0400518 case MID_SHUTDOWN:
519 rc = -EHOSTDOWN;
520 break;
Jeff Layton74dd92a2011-01-11 07:24:02 -0500521 default:
Jeff Layton3c1105d2011-05-22 07:09:13 -0400522 list_del_init(&mid->qhead);
Pavel Shilovsky7c9421e2012-03-23 14:28:03 -0400523 cERROR(1, "%s: invalid mid state mid=%llu state=%d", __func__,
524 mid->mid, mid->mid_state);
Jeff Layton74dd92a2011-01-11 07:24:02 -0500525 rc = -EIO;
Jeff Layton053d5032011-01-11 07:24:02 -0500526 }
527 spin_unlock(&GlobalMid_Lock);
528
Jeff Layton2b84a36c2011-01-11 07:24:21 -0500529 DeleteMidQEntry(mid);
Jeff Layton053d5032011-01-11 07:24:02 -0500530 return rc;
531}
532
Jeff Layton121b0462012-05-15 12:21:10 -0400533static inline int
534send_cancel(struct TCP_Server_Info *server, void *buf, struct mid_q_entry *mid)
Jeff Layton76dcc262011-01-11 07:24:24 -0500535{
Jeff Layton121b0462012-05-15 12:21:10 -0400536 return server->ops->send_cancel ?
537 server->ops->send_cancel(server, buf, mid) : 0;
Jeff Layton76dcc262011-01-11 07:24:24 -0500538}
539
Linus Torvalds1da177e2005-04-16 15:20:36 -0700540int
Jeff Layton2c8f9812011-05-19 16:22:52 -0400541cifs_check_receive(struct mid_q_entry *mid, struct TCP_Server_Info *server,
542 bool log_error)
543{
Pavel Shilovsky792af7b2012-03-23 14:28:02 -0400544 unsigned int len = get_rfc1002_length(mid->resp_buf) + 4;
Jeff Layton826a95e2011-10-11 06:41:32 -0400545
546 dump_smb(mid->resp_buf, min_t(u32, 92, len));
Jeff Layton2c8f9812011-05-19 16:22:52 -0400547
548 /* convert the length into a more usable form */
Steve French96daf2b2011-05-27 04:34:02 +0000549 if (server->sec_mode & (SECMODE_SIGN_REQUIRED | SECMODE_SIGN_ENABLED)) {
Jeff Layton826a95e2011-10-11 06:41:32 -0400550 struct kvec iov;
Steve French985e4ff02012-08-03 09:42:45 -0500551 int rc = 0;
Jeff Laytonbf5ea0e2012-09-18 16:20:34 -0700552 struct smb_rqst rqst = { .rq_iov = &iov,
553 .rq_nvec = 1 };
Jeff Layton826a95e2011-10-11 06:41:32 -0400554
555 iov.iov_base = mid->resp_buf;
556 iov.iov_len = len;
Jeff Layton2c8f9812011-05-19 16:22:52 -0400557 /* FIXME: add code to kill session */
Jeff Laytonbf5ea0e2012-09-18 16:20:34 -0700558 rc = cifs_verify_signature(&rqst, server,
Steve French985e4ff02012-08-03 09:42:45 -0500559 mid->sequence_number + 1);
560 if (rc)
561 cERROR(1, "SMB signature verification returned error = "
562 "%d", rc);
Jeff Layton2c8f9812011-05-19 16:22:52 -0400563 }
564
565 /* BB special case reconnect tid and uid here? */
566 return map_smb_to_linux_error(mid->resp_buf, log_error);
567}
568
Pavel Shilovsky082d0642012-05-17 12:18:21 +0400569int
Pavel Shilovsky792af7b2012-03-23 14:28:02 -0400570cifs_setup_request(struct cifs_ses *ses, struct kvec *iov,
571 unsigned int nvec, struct mid_q_entry **ret_mid)
572{
573 int rc;
574 struct smb_hdr *hdr = (struct smb_hdr *)iov[0].iov_base;
575 struct mid_q_entry *mid;
576
577 rc = allocate_mid(ses, hdr, &mid);
578 if (rc)
579 return rc;
Jeff Layton762a4202012-07-23 13:28:38 -0400580 rc = cifs_sign_smbv(iov, nvec, ses->server, &mid->sequence_number);
Pavel Shilovsky792af7b2012-03-23 14:28:02 -0400581 if (rc)
Pavel Shilovsky3c1bf7e2012-09-18 16:20:30 -0700582 cifs_delete_mid(mid);
Pavel Shilovsky792af7b2012-03-23 14:28:02 -0400583 *ret_mid = mid;
584 return rc;
585}
586
Jeff Layton2c8f9812011-05-19 16:22:52 -0400587int
Steve French96daf2b2011-05-27 04:34:02 +0000588SendReceive2(const unsigned int xid, struct cifs_ses *ses,
Pavel Shilovskya891f0f2012-05-23 16:14:34 +0400589 struct kvec *iov, int n_vec, int *resp_buf_type /* ret */,
Steve French133672e2007-11-13 22:41:37 +0000590 const int flags)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700591{
592 int rc = 0;
Pavel Shilovskya891f0f2012-05-23 16:14:34 +0400593 int timeout, optype;
Steve Frenchd6e04ae2005-06-13 13:24:43 -0500594 struct mid_q_entry *midQ;
Pavel Shilovsky792af7b2012-03-23 14:28:02 -0400595 char *buf = iov[0].iov_base;
Pavel Shilovskya891f0f2012-05-23 16:14:34 +0400596 unsigned int credits = 1;
Steve French50c2f752007-07-13 00:33:32 +0000597
Pavel Shilovskya891f0f2012-05-23 16:14:34 +0400598 timeout = flags & CIFS_TIMEOUT_MASK;
599 optype = flags & CIFS_OP_MASK;
Steve French133672e2007-11-13 22:41:37 +0000600
Pavel Shilovskya891f0f2012-05-23 16:14:34 +0400601 *resp_buf_type = CIFS_NO_BUFFER; /* no response buf yet */
Linus Torvalds1da177e2005-04-16 15:20:36 -0700602
Steve French4b8f9302006-02-26 16:41:18 +0000603 if ((ses == NULL) || (ses->server == NULL)) {
Pavel Shilovsky792af7b2012-03-23 14:28:02 -0400604 cifs_small_buf_release(buf);
Joe Perchesb6b38f72010-04-21 03:50:45 +0000605 cERROR(1, "Null session");
Linus Torvalds1da177e2005-04-16 15:20:36 -0700606 return -EIO;
607 }
Linus Torvalds1da177e2005-04-16 15:20:36 -0700608
Steve French79a58d12007-07-06 22:44:50 +0000609 if (ses->server->tcpStatus == CifsExiting) {
Pavel Shilovsky792af7b2012-03-23 14:28:02 -0400610 cifs_small_buf_release(buf);
Steve French31ca3bc2005-04-28 22:41:11 -0700611 return -ENOENT;
Steve French4b8f9302006-02-26 16:41:18 +0000612 }
Steve French31ca3bc2005-04-28 22:41:11 -0700613
Pavel Shilovsky792af7b2012-03-23 14:28:02 -0400614 /*
615 * Ensure that we do not send more than 50 overlapping requests
616 * to the same server. We may make this configurable later or
617 * use ses->maxReq.
618 */
Linus Torvalds1da177e2005-04-16 15:20:36 -0700619
Pavel Shilovskya891f0f2012-05-23 16:14:34 +0400620 rc = wait_for_free_request(ses->server, timeout, optype);
Jeremy Allison7ee1af72006-08-02 21:56:33 +0000621 if (rc) {
Pavel Shilovsky792af7b2012-03-23 14:28:02 -0400622 cifs_small_buf_release(buf);
Jeremy Allison7ee1af72006-08-02 21:56:33 +0000623 return rc;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700624 }
Jeremy Allison7ee1af72006-08-02 21:56:33 +0000625
Pavel Shilovsky792af7b2012-03-23 14:28:02 -0400626 /*
627 * Make sure that we sign in the same order that we send on this socket
628 * and avoid races inside tcp sendmsg code that could cause corruption
629 * of smb data.
630 */
Linus Torvalds1da177e2005-04-16 15:20:36 -0700631
Jeff Layton72ca5452008-12-01 07:09:36 -0500632 mutex_lock(&ses->server->srv_mutex);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700633
Pavel Shilovsky082d0642012-05-17 12:18:21 +0400634 rc = ses->server->ops->setup_request(ses, iov, n_vec, &midQ);
Jeremy Allison7ee1af72006-08-02 21:56:33 +0000635 if (rc) {
Jeff Layton72ca5452008-12-01 07:09:36 -0500636 mutex_unlock(&ses->server->srv_mutex);
Pavel Shilovsky792af7b2012-03-23 14:28:02 -0400637 cifs_small_buf_release(buf);
Jeremy Allison7ee1af72006-08-02 21:56:33 +0000638 /* Update # of requests on wire to server */
Pavel Shilovskya891f0f2012-05-23 16:14:34 +0400639 add_credits(ses->server, 1, optype);
Jeremy Allison7ee1af72006-08-02 21:56:33 +0000640 return rc;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700641 }
Linus Torvalds1da177e2005-04-16 15:20:36 -0700642
Pavel Shilovsky7c9421e2012-03-23 14:28:03 -0400643 midQ->mid_state = MID_REQUEST_SUBMITTED;
Steve French789e6662011-08-09 18:44:44 +0000644 cifs_in_send_inc(ses->server);
Jeff Layton0496e022008-12-30 12:39:16 -0500645 rc = smb_sendv(ses->server, iov, n_vec);
Steve French789e6662011-08-09 18:44:44 +0000646 cifs_in_send_dec(ses->server);
647 cifs_save_when_sent(midQ);
Jeremy Allison7ee1af72006-08-02 21:56:33 +0000648
Jeff Layton72ca5452008-12-01 07:09:36 -0500649 mutex_unlock(&ses->server->srv_mutex);
Jeremy Allison7ee1af72006-08-02 21:56:33 +0000650
Jeff Layton2db7c582011-01-28 07:08:28 -0500651 if (rc < 0) {
Pavel Shilovsky792af7b2012-03-23 14:28:02 -0400652 cifs_small_buf_release(buf);
Jeremy Allison7ee1af72006-08-02 21:56:33 +0000653 goto out;
Jeff Layton2db7c582011-01-28 07:08:28 -0500654 }
Steve French4b8f9302006-02-26 16:41:18 +0000655
Pavel Shilovskya891f0f2012-05-23 16:14:34 +0400656 if (timeout == CIFS_ASYNC_OP) {
Pavel Shilovsky792af7b2012-03-23 14:28:02 -0400657 cifs_small_buf_release(buf);
Steve French133672e2007-11-13 22:41:37 +0000658 goto out;
Jeff Layton2db7c582011-01-28 07:08:28 -0500659 }
Jeff Layton0ade6402011-01-11 07:24:02 -0500660
661 rc = wait_for_response(ses->server, midQ);
Jeff Layton1be912d2011-01-28 07:08:28 -0500662 if (rc != 0) {
Jeff Layton121b0462012-05-15 12:21:10 -0400663 send_cancel(ses->server, buf, midQ);
Jeff Layton1be912d2011-01-28 07:08:28 -0500664 spin_lock(&GlobalMid_Lock);
Pavel Shilovsky7c9421e2012-03-23 14:28:03 -0400665 if (midQ->mid_state == MID_REQUEST_SUBMITTED) {
Jeff Layton1be912d2011-01-28 07:08:28 -0500666 midQ->callback = DeleteMidQEntry;
667 spin_unlock(&GlobalMid_Lock);
Pavel Shilovsky792af7b2012-03-23 14:28:02 -0400668 cifs_small_buf_release(buf);
Pavel Shilovskya891f0f2012-05-23 16:14:34 +0400669 add_credits(ses->server, 1, optype);
Jeff Layton1be912d2011-01-28 07:08:28 -0500670 return rc;
671 }
672 spin_unlock(&GlobalMid_Lock);
673 }
Steve Frenchd6e04ae2005-06-13 13:24:43 -0500674
Pavel Shilovsky792af7b2012-03-23 14:28:02 -0400675 cifs_small_buf_release(buf);
Jeff Layton2db7c582011-01-28 07:08:28 -0500676
Jeff Layton3c1105d2011-05-22 07:09:13 -0400677 rc = cifs_sync_mid_result(midQ, ses->server);
Jeff Layton053d5032011-01-11 07:24:02 -0500678 if (rc != 0) {
Pavel Shilovskya891f0f2012-05-23 16:14:34 +0400679 add_credits(ses->server, 1, optype);
Steve Frenchd6e04ae2005-06-13 13:24:43 -0500680 return rc;
681 }
Steve French50c2f752007-07-13 00:33:32 +0000682
Pavel Shilovsky7c9421e2012-03-23 14:28:03 -0400683 if (!midQ->resp_buf || midQ->mid_state != MID_RESPONSE_RECEIVED) {
Steve Frenchd6e04ae2005-06-13 13:24:43 -0500684 rc = -EIO;
Jeff Layton2c8f9812011-05-19 16:22:52 -0400685 cFYI(1, "Bad MID state?");
Steve French2b2bdfb2008-12-11 17:26:54 +0000686 goto out;
687 }
Steve French84afc292005-12-02 13:32:45 -0800688
Pavel Shilovsky792af7b2012-03-23 14:28:02 -0400689 buf = (char *)midQ->resp_buf;
690 iov[0].iov_base = buf;
691 iov[0].iov_len = get_rfc1002_length(buf) + 4;
Pavel Shilovsky7c9421e2012-03-23 14:28:03 -0400692 if (midQ->large_buf)
Pavel Shilovskya891f0f2012-05-23 16:14:34 +0400693 *resp_buf_type = CIFS_LARGE_BUFFER;
Jeff Layton2c8f9812011-05-19 16:22:52 -0400694 else
Pavel Shilovskya891f0f2012-05-23 16:14:34 +0400695 *resp_buf_type = CIFS_SMALL_BUFFER;
696
697 credits = ses->server->ops->get_credits(midQ);
Steve Frenchd6e04ae2005-06-13 13:24:43 -0500698
Pavel Shilovsky082d0642012-05-17 12:18:21 +0400699 rc = ses->server->ops->check_receive(midQ, ses->server,
700 flags & CIFS_LOG_ERROR);
Steve French2b2bdfb2008-12-11 17:26:54 +0000701
Pavel Shilovsky3c1bf7e2012-09-18 16:20:30 -0700702 /* mark it so buf will not be freed by cifs_delete_mid */
Jeff Layton2c8f9812011-05-19 16:22:52 -0400703 if ((flags & CIFS_NO_RESP) == 0)
704 midQ->resp_buf = NULL;
Jeremy Allison7ee1af72006-08-02 21:56:33 +0000705out:
Pavel Shilovsky3c1bf7e2012-09-18 16:20:30 -0700706 cifs_delete_mid(midQ);
Pavel Shilovskya891f0f2012-05-23 16:14:34 +0400707 add_credits(ses->server, credits, optype);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700708
709 return rc;
710}
Linus Torvalds1da177e2005-04-16 15:20:36 -0700711
712int
Steve French96daf2b2011-05-27 04:34:02 +0000713SendReceive(const unsigned int xid, struct cifs_ses *ses,
Linus Torvalds1da177e2005-04-16 15:20:36 -0700714 struct smb_hdr *in_buf, struct smb_hdr *out_buf,
Pavel Shilovskya891f0f2012-05-23 16:14:34 +0400715 int *pbytes_returned, const int timeout)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700716{
717 int rc = 0;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700718 struct mid_q_entry *midQ;
719
720 if (ses == NULL) {
Joe Perchesb6b38f72010-04-21 03:50:45 +0000721 cERROR(1, "Null smb session");
Linus Torvalds1da177e2005-04-16 15:20:36 -0700722 return -EIO;
723 }
Steve French79a58d12007-07-06 22:44:50 +0000724 if (ses->server == NULL) {
Joe Perchesb6b38f72010-04-21 03:50:45 +0000725 cERROR(1, "Null tcp session");
Linus Torvalds1da177e2005-04-16 15:20:36 -0700726 return -EIO;
727 }
728
Steve French79a58d12007-07-06 22:44:50 +0000729 if (ses->server->tcpStatus == CifsExiting)
Steve French31ca3bc2005-04-28 22:41:11 -0700730 return -ENOENT;
731
Steve French79a58d12007-07-06 22:44:50 +0000732 /* Ensure that we do not send more than 50 overlapping requests
Linus Torvalds1da177e2005-04-16 15:20:36 -0700733 to the same server. We may make this configurable later or
734 use ses->maxReq */
Linus Torvalds1da177e2005-04-16 15:20:36 -0700735
Steve Frenchbe8e3b02011-04-29 05:40:20 +0000736 if (be32_to_cpu(in_buf->smb_buf_length) > CIFSMaxBufSize +
737 MAX_CIFS_HDR_SIZE - 4) {
Joe Perchesb6b38f72010-04-21 03:50:45 +0000738 cERROR(1, "Illegal length, greater than maximum frame, %d",
Steve Frenchbe8e3b02011-04-29 05:40:20 +0000739 be32_to_cpu(in_buf->smb_buf_length));
Volker Lendecke6d9c6d52008-12-08 20:50:24 +0000740 return -EIO;
741 }
742
Pavel Shilovskya891f0f2012-05-23 16:14:34 +0400743 rc = wait_for_free_request(ses->server, timeout, 0);
Jeremy Allison7ee1af72006-08-02 21:56:33 +0000744 if (rc)
745 return rc;
746
Steve French79a58d12007-07-06 22:44:50 +0000747 /* make sure that we sign in the same order that we send on this socket
Linus Torvalds1da177e2005-04-16 15:20:36 -0700748 and avoid races inside tcp sendmsg code that could cause corruption
749 of smb data */
750
Jeff Layton72ca5452008-12-01 07:09:36 -0500751 mutex_lock(&ses->server->srv_mutex);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700752
Jeremy Allison7ee1af72006-08-02 21:56:33 +0000753 rc = allocate_mid(ses, in_buf, &midQ);
754 if (rc) {
Jeff Layton72ca5452008-12-01 07:09:36 -0500755 mutex_unlock(&ses->server->srv_mutex);
Jeremy Allison7ee1af72006-08-02 21:56:33 +0000756 /* Update # of requests on wire to server */
Pavel Shilovskya891f0f2012-05-23 16:14:34 +0400757 add_credits(ses->server, 1, 0);
Jeremy Allison7ee1af72006-08-02 21:56:33 +0000758 return rc;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700759 }
760
Steve Frenchad009ac2005-04-28 22:41:05 -0700761 rc = cifs_sign_smb(in_buf, ses->server, &midQ->sequence_number);
Volker Lendecke829049c2008-12-06 16:00:53 +0100762 if (rc) {
763 mutex_unlock(&ses->server->srv_mutex);
764 goto out;
765 }
Linus Torvalds1da177e2005-04-16 15:20:36 -0700766
Pavel Shilovsky7c9421e2012-03-23 14:28:03 -0400767 midQ->mid_state = MID_REQUEST_SUBMITTED;
Steve French789e6662011-08-09 18:44:44 +0000768
769 cifs_in_send_inc(ses->server);
Steve Frenchbe8e3b02011-04-29 05:40:20 +0000770 rc = smb_send(ses->server, in_buf, be32_to_cpu(in_buf->smb_buf_length));
Steve French789e6662011-08-09 18:44:44 +0000771 cifs_in_send_dec(ses->server);
772 cifs_save_when_sent(midQ);
Jeff Layton72ca5452008-12-01 07:09:36 -0500773 mutex_unlock(&ses->server->srv_mutex);
Jeremy Allison7ee1af72006-08-02 21:56:33 +0000774
Steve French79a58d12007-07-06 22:44:50 +0000775 if (rc < 0)
Jeremy Allison7ee1af72006-08-02 21:56:33 +0000776 goto out;
777
Pavel Shilovskya891f0f2012-05-23 16:14:34 +0400778 if (timeout == CIFS_ASYNC_OP)
Steve French133672e2007-11-13 22:41:37 +0000779 goto out;
Jeff Layton0ade6402011-01-11 07:24:02 -0500780
781 rc = wait_for_response(ses->server, midQ);
Jeff Layton1be912d2011-01-28 07:08:28 -0500782 if (rc != 0) {
Jeff Layton121b0462012-05-15 12:21:10 -0400783 send_cancel(ses->server, in_buf, midQ);
Jeff Layton1be912d2011-01-28 07:08:28 -0500784 spin_lock(&GlobalMid_Lock);
Pavel Shilovsky7c9421e2012-03-23 14:28:03 -0400785 if (midQ->mid_state == MID_REQUEST_SUBMITTED) {
Jeff Layton1be912d2011-01-28 07:08:28 -0500786 /* no longer considered to be "in-flight" */
787 midQ->callback = DeleteMidQEntry;
788 spin_unlock(&GlobalMid_Lock);
Pavel Shilovskya891f0f2012-05-23 16:14:34 +0400789 add_credits(ses->server, 1, 0);
Jeff Layton1be912d2011-01-28 07:08:28 -0500790 return rc;
791 }
792 spin_unlock(&GlobalMid_Lock);
793 }
Linus Torvalds1da177e2005-04-16 15:20:36 -0700794
Jeff Layton3c1105d2011-05-22 07:09:13 -0400795 rc = cifs_sync_mid_result(midQ, ses->server);
Jeff Layton053d5032011-01-11 07:24:02 -0500796 if (rc != 0) {
Pavel Shilovskya891f0f2012-05-23 16:14:34 +0400797 add_credits(ses->server, 1, 0);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700798 return rc;
799 }
Steve French50c2f752007-07-13 00:33:32 +0000800
Jeff Layton2c8f9812011-05-19 16:22:52 -0400801 if (!midQ->resp_buf || !out_buf ||
Pavel Shilovsky7c9421e2012-03-23 14:28:03 -0400802 midQ->mid_state != MID_RESPONSE_RECEIVED) {
Linus Torvalds1da177e2005-04-16 15:20:36 -0700803 rc = -EIO;
Jeff Layton2c8f9812011-05-19 16:22:52 -0400804 cERROR(1, "Bad MID state?");
Steve French2b2bdfb2008-12-11 17:26:54 +0000805 goto out;
806 }
Linus Torvalds1da177e2005-04-16 15:20:36 -0700807
Pavel Shilovskyd4e48542012-03-23 14:28:02 -0400808 *pbytes_returned = get_rfc1002_length(midQ->resp_buf);
Jeff Layton2c8f9812011-05-19 16:22:52 -0400809 memcpy(out_buf, midQ->resp_buf, *pbytes_returned + 4);
810 rc = cifs_check_receive(midQ, ses->server, 0);
Jeremy Allison7ee1af72006-08-02 21:56:33 +0000811out:
Pavel Shilovsky3c1bf7e2012-09-18 16:20:30 -0700812 cifs_delete_mid(midQ);
Pavel Shilovskya891f0f2012-05-23 16:14:34 +0400813 add_credits(ses->server, 1, 0);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700814
815 return rc;
Jeremy Allison7ee1af72006-08-02 21:56:33 +0000816}
Linus Torvalds1da177e2005-04-16 15:20:36 -0700817
Jeremy Allison7ee1af72006-08-02 21:56:33 +0000818/* We send a LOCKINGX_CANCEL_LOCK to cause the Windows
819 blocking lock to return. */
820
821static int
Steve French96daf2b2011-05-27 04:34:02 +0000822send_lock_cancel(const unsigned int xid, struct cifs_tcon *tcon,
Jeremy Allison7ee1af72006-08-02 21:56:33 +0000823 struct smb_hdr *in_buf,
824 struct smb_hdr *out_buf)
825{
826 int bytes_returned;
Steve French96daf2b2011-05-27 04:34:02 +0000827 struct cifs_ses *ses = tcon->ses;
Jeremy Allison7ee1af72006-08-02 21:56:33 +0000828 LOCK_REQ *pSMB = (LOCK_REQ *)in_buf;
829
830 /* We just modify the current in_buf to change
831 the type of lock from LOCKING_ANDX_SHARED_LOCK
832 or LOCKING_ANDX_EXCLUSIVE_LOCK to
833 LOCKING_ANDX_CANCEL_LOCK. */
834
835 pSMB->LockType = LOCKING_ANDX_CANCEL_LOCK|LOCKING_ANDX_LARGE_FILES;
836 pSMB->Timeout = 0;
Pavel Shilovsky88257362012-05-23 14:01:59 +0400837 pSMB->hdr.Mid = get_next_mid(ses->server);
Jeremy Allison7ee1af72006-08-02 21:56:33 +0000838
839 return SendReceive(xid, ses, in_buf, out_buf,
Jeff Layton77499812011-01-11 07:24:23 -0500840 &bytes_returned, 0);
Jeremy Allison7ee1af72006-08-02 21:56:33 +0000841}
842
843int
Steve French96daf2b2011-05-27 04:34:02 +0000844SendReceiveBlockingLock(const unsigned int xid, struct cifs_tcon *tcon,
Jeremy Allison7ee1af72006-08-02 21:56:33 +0000845 struct smb_hdr *in_buf, struct smb_hdr *out_buf,
846 int *pbytes_returned)
847{
848 int rc = 0;
849 int rstart = 0;
Jeremy Allison7ee1af72006-08-02 21:56:33 +0000850 struct mid_q_entry *midQ;
Steve French96daf2b2011-05-27 04:34:02 +0000851 struct cifs_ses *ses;
Jeremy Allison7ee1af72006-08-02 21:56:33 +0000852
853 if (tcon == NULL || tcon->ses == NULL) {
Joe Perchesb6b38f72010-04-21 03:50:45 +0000854 cERROR(1, "Null smb session");
Jeremy Allison7ee1af72006-08-02 21:56:33 +0000855 return -EIO;
856 }
857 ses = tcon->ses;
858
Steve French79a58d12007-07-06 22:44:50 +0000859 if (ses->server == NULL) {
Joe Perchesb6b38f72010-04-21 03:50:45 +0000860 cERROR(1, "Null tcp session");
Jeremy Allison7ee1af72006-08-02 21:56:33 +0000861 return -EIO;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700862 }
863
Steve French79a58d12007-07-06 22:44:50 +0000864 if (ses->server->tcpStatus == CifsExiting)
Jeremy Allison7ee1af72006-08-02 21:56:33 +0000865 return -ENOENT;
866
Steve French79a58d12007-07-06 22:44:50 +0000867 /* Ensure that we do not send more than 50 overlapping requests
Jeremy Allison7ee1af72006-08-02 21:56:33 +0000868 to the same server. We may make this configurable later or
869 use ses->maxReq */
870
Steve Frenchbe8e3b02011-04-29 05:40:20 +0000871 if (be32_to_cpu(in_buf->smb_buf_length) > CIFSMaxBufSize +
872 MAX_CIFS_HDR_SIZE - 4) {
Joe Perchesb6b38f72010-04-21 03:50:45 +0000873 cERROR(1, "Illegal length, greater than maximum frame, %d",
Steve Frenchbe8e3b02011-04-29 05:40:20 +0000874 be32_to_cpu(in_buf->smb_buf_length));
Volker Lendecke6d9c6d52008-12-08 20:50:24 +0000875 return -EIO;
876 }
877
Pavel Shilovskya891f0f2012-05-23 16:14:34 +0400878 rc = wait_for_free_request(ses->server, CIFS_BLOCKING_OP, 0);
Jeremy Allison7ee1af72006-08-02 21:56:33 +0000879 if (rc)
880 return rc;
881
Steve French79a58d12007-07-06 22:44:50 +0000882 /* make sure that we sign in the same order that we send on this socket
Jeremy Allison7ee1af72006-08-02 21:56:33 +0000883 and avoid races inside tcp sendmsg code that could cause corruption
884 of smb data */
885
Jeff Layton72ca5452008-12-01 07:09:36 -0500886 mutex_lock(&ses->server->srv_mutex);
Jeremy Allison7ee1af72006-08-02 21:56:33 +0000887
888 rc = allocate_mid(ses, in_buf, &midQ);
889 if (rc) {
Jeff Layton72ca5452008-12-01 07:09:36 -0500890 mutex_unlock(&ses->server->srv_mutex);
Jeremy Allison7ee1af72006-08-02 21:56:33 +0000891 return rc;
892 }
893
Jeremy Allison7ee1af72006-08-02 21:56:33 +0000894 rc = cifs_sign_smb(in_buf, ses->server, &midQ->sequence_number);
Volker Lendecke829049c2008-12-06 16:00:53 +0100895 if (rc) {
Pavel Shilovsky3c1bf7e2012-09-18 16:20:30 -0700896 cifs_delete_mid(midQ);
Volker Lendecke829049c2008-12-06 16:00:53 +0100897 mutex_unlock(&ses->server->srv_mutex);
898 return rc;
899 }
Jeremy Allison7ee1af72006-08-02 21:56:33 +0000900
Pavel Shilovsky7c9421e2012-03-23 14:28:03 -0400901 midQ->mid_state = MID_REQUEST_SUBMITTED;
Steve French789e6662011-08-09 18:44:44 +0000902 cifs_in_send_inc(ses->server);
Steve Frenchbe8e3b02011-04-29 05:40:20 +0000903 rc = smb_send(ses->server, in_buf, be32_to_cpu(in_buf->smb_buf_length));
Steve French789e6662011-08-09 18:44:44 +0000904 cifs_in_send_dec(ses->server);
905 cifs_save_when_sent(midQ);
Jeff Layton72ca5452008-12-01 07:09:36 -0500906 mutex_unlock(&ses->server->srv_mutex);
Jeremy Allison7ee1af72006-08-02 21:56:33 +0000907
Steve French79a58d12007-07-06 22:44:50 +0000908 if (rc < 0) {
Pavel Shilovsky3c1bf7e2012-09-18 16:20:30 -0700909 cifs_delete_mid(midQ);
Jeremy Allison7ee1af72006-08-02 21:56:33 +0000910 return rc;
911 }
912
913 /* Wait for a reply - allow signals to interrupt. */
914 rc = wait_event_interruptible(ses->server->response_q,
Pavel Shilovsky7c9421e2012-03-23 14:28:03 -0400915 (!(midQ->mid_state == MID_REQUEST_SUBMITTED)) ||
Jeremy Allison7ee1af72006-08-02 21:56:33 +0000916 ((ses->server->tcpStatus != CifsGood) &&
917 (ses->server->tcpStatus != CifsNew)));
918
919 /* Were we interrupted by a signal ? */
920 if ((rc == -ERESTARTSYS) &&
Pavel Shilovsky7c9421e2012-03-23 14:28:03 -0400921 (midQ->mid_state == MID_REQUEST_SUBMITTED) &&
Jeremy Allison7ee1af72006-08-02 21:56:33 +0000922 ((ses->server->tcpStatus == CifsGood) ||
923 (ses->server->tcpStatus == CifsNew))) {
924
925 if (in_buf->Command == SMB_COM_TRANSACTION2) {
926 /* POSIX lock. We send a NT_CANCEL SMB to cause the
927 blocking lock to return. */
Jeff Layton121b0462012-05-15 12:21:10 -0400928 rc = send_cancel(ses->server, in_buf, midQ);
Jeremy Allison7ee1af72006-08-02 21:56:33 +0000929 if (rc) {
Pavel Shilovsky3c1bf7e2012-09-18 16:20:30 -0700930 cifs_delete_mid(midQ);
Jeremy Allison7ee1af72006-08-02 21:56:33 +0000931 return rc;
932 }
933 } else {
934 /* Windows lock. We send a LOCKINGX_CANCEL_LOCK
935 to cause the blocking lock to return. */
936
937 rc = send_lock_cancel(xid, tcon, in_buf, out_buf);
938
939 /* If we get -ENOLCK back the lock may have
940 already been removed. Don't exit in this case. */
941 if (rc && rc != -ENOLCK) {
Pavel Shilovsky3c1bf7e2012-09-18 16:20:30 -0700942 cifs_delete_mid(midQ);
Jeremy Allison7ee1af72006-08-02 21:56:33 +0000943 return rc;
944 }
945 }
946
Jeff Layton1be912d2011-01-28 07:08:28 -0500947 rc = wait_for_response(ses->server, midQ);
948 if (rc) {
Jeff Layton121b0462012-05-15 12:21:10 -0400949 send_cancel(ses->server, in_buf, midQ);
Jeff Layton1be912d2011-01-28 07:08:28 -0500950 spin_lock(&GlobalMid_Lock);
Pavel Shilovsky7c9421e2012-03-23 14:28:03 -0400951 if (midQ->mid_state == MID_REQUEST_SUBMITTED) {
Jeff Layton1be912d2011-01-28 07:08:28 -0500952 /* no longer considered to be "in-flight" */
953 midQ->callback = DeleteMidQEntry;
954 spin_unlock(&GlobalMid_Lock);
955 return rc;
956 }
957 spin_unlock(&GlobalMid_Lock);
Jeremy Allison7ee1af72006-08-02 21:56:33 +0000958 }
Jeff Layton1be912d2011-01-28 07:08:28 -0500959
960 /* We got the response - restart system call. */
961 rstart = 1;
Jeremy Allison7ee1af72006-08-02 21:56:33 +0000962 }
963
Jeff Layton3c1105d2011-05-22 07:09:13 -0400964 rc = cifs_sync_mid_result(midQ, ses->server);
Jeff Layton053d5032011-01-11 07:24:02 -0500965 if (rc != 0)
Jeremy Allison7ee1af72006-08-02 21:56:33 +0000966 return rc;
Steve French50c2f752007-07-13 00:33:32 +0000967
Volker Lendecke17c8bfe2008-12-06 16:38:19 +0100968 /* rcvd frame is ok */
Pavel Shilovsky7c9421e2012-03-23 14:28:03 -0400969 if (out_buf == NULL || midQ->mid_state != MID_RESPONSE_RECEIVED) {
Volker Lendecke17c8bfe2008-12-06 16:38:19 +0100970 rc = -EIO;
Joe Perchesb6b38f72010-04-21 03:50:45 +0000971 cERROR(1, "Bad MID state?");
Volker Lendecke698e96a2008-12-06 16:39:31 +0100972 goto out;
Volker Lendecke17c8bfe2008-12-06 16:38:19 +0100973 }
974
Pavel Shilovskyd4e48542012-03-23 14:28:02 -0400975 *pbytes_returned = get_rfc1002_length(midQ->resp_buf);
Jeff Layton2c8f9812011-05-19 16:22:52 -0400976 memcpy(out_buf, midQ->resp_buf, *pbytes_returned + 4);
977 rc = cifs_check_receive(midQ, ses->server, 0);
Volker Lendecke17c8bfe2008-12-06 16:38:19 +0100978out:
Pavel Shilovsky3c1bf7e2012-09-18 16:20:30 -0700979 cifs_delete_mid(midQ);
Jeremy Allison7ee1af72006-08-02 21:56:33 +0000980 if (rstart && rc == -EACCES)
981 return -ERESTARTSYS;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700982 return rc;
983}