blob: d81e1daeb8f0102d286083f56a9cd59df32a8cc6 [file] [log] [blame]
Steve French1080ef72011-02-24 18:07:19 +00001/*
2 * SMB2 version specific operations
3 *
4 * Copyright (c) 2012, Jeff Layton <jlayton@redhat.com>
5 *
6 * This library is free software; you can redistribute it and/or modify
7 * it under the terms of the GNU General Public License v2 as published
8 * by the Free Software Foundation.
9 *
10 * This library is distributed in the hope that it will be useful,
11 * but WITHOUT ANY WARRANTY; without even the implied warranty of
12 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See
13 * the GNU Lesser General Public License for more details.
14 *
15 * You should have received a copy of the GNU Lesser General Public License
16 * along with this library; if not, write to the Free Software
17 * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
18 */
19
20#include "cifsglob.h"
Pavel Shilovsky2dc7e1c2011-12-26 22:53:34 +040021#include "smb2pdu.h"
22#include "smb2proto.h"
Pavel Shilovsky28ea5292012-05-23 16:18:00 +040023#include "cifsproto.h"
24#include "cifs_debug.h"
25
26static int
27change_conf(struct TCP_Server_Info *server)
28{
29 server->credits += server->echo_credits + server->oplock_credits;
30 server->oplock_credits = server->echo_credits = 0;
31 switch (server->credits) {
32 case 0:
33 return -1;
34 case 1:
35 server->echoes = false;
36 server->oplocks = false;
37 cERROR(1, "disabling echoes and oplocks");
38 break;
39 case 2:
40 server->echoes = true;
41 server->oplocks = false;
42 server->echo_credits = 1;
43 cFYI(1, "disabling oplocks");
44 break;
45 default:
46 server->echoes = true;
47 server->oplocks = true;
48 server->echo_credits = 1;
49 server->oplock_credits = 1;
50 }
51 server->credits -= server->echo_credits + server->oplock_credits;
52 return 0;
53}
54
55static void
56smb2_add_credits(struct TCP_Server_Info *server, const unsigned int add,
57 const int optype)
58{
59 int *val, rc = 0;
60 spin_lock(&server->req_lock);
61 val = server->ops->get_credits_field(server, optype);
62 *val += add;
63 server->in_flight--;
Pavel Shilovskyec2e4522011-12-27 16:12:43 +040064 if (server->in_flight == 0 && (optype & CIFS_OP_MASK) != CIFS_NEG_OP)
Pavel Shilovsky28ea5292012-05-23 16:18:00 +040065 rc = change_conf(server);
66 spin_unlock(&server->req_lock);
67 wake_up(&server->request_q);
68 if (rc)
69 cifs_reconnect(server);
70}
71
72static void
73smb2_set_credits(struct TCP_Server_Info *server, const int val)
74{
75 spin_lock(&server->req_lock);
76 server->credits = val;
77 spin_unlock(&server->req_lock);
78}
79
80static int *
81smb2_get_credits_field(struct TCP_Server_Info *server, const int optype)
82{
83 switch (optype) {
84 case CIFS_ECHO_OP:
85 return &server->echo_credits;
86 case CIFS_OBREAK_OP:
87 return &server->oplock_credits;
88 default:
89 return &server->credits;
90 }
91}
92
93static unsigned int
94smb2_get_credits(struct mid_q_entry *mid)
95{
96 return le16_to_cpu(((struct smb2_hdr *)mid->resp_buf)->CreditRequest);
97}
Pavel Shilovsky2dc7e1c2011-12-26 22:53:34 +040098
99static __u64
100smb2_get_next_mid(struct TCP_Server_Info *server)
101{
102 __u64 mid;
103 /* for SMB2 we need the current value */
104 spin_lock(&GlobalMid_Lock);
105 mid = server->CurrentMid++;
106 spin_unlock(&GlobalMid_Lock);
107 return mid;
108}
Steve French1080ef72011-02-24 18:07:19 +0000109
Pavel Shilovsky093b2bd2011-06-08 15:51:07 +0400110static struct mid_q_entry *
111smb2_find_mid(struct TCP_Server_Info *server, char *buf)
112{
113 struct mid_q_entry *mid;
114 struct smb2_hdr *hdr = (struct smb2_hdr *)buf;
115
116 spin_lock(&GlobalMid_Lock);
117 list_for_each_entry(mid, &server->pending_mid_q, qhead) {
118 if ((mid->mid == hdr->MessageId) &&
119 (mid->mid_state == MID_REQUEST_SUBMITTED) &&
120 (mid->command == hdr->Command)) {
121 spin_unlock(&GlobalMid_Lock);
122 return mid;
123 }
124 }
125 spin_unlock(&GlobalMid_Lock);
126 return NULL;
127}
128
129static void
130smb2_dump_detail(void *buf)
131{
132#ifdef CONFIG_CIFS_DEBUG2
133 struct smb2_hdr *smb = (struct smb2_hdr *)buf;
134
135 cERROR(1, "Cmd: %d Err: 0x%x Flags: 0x%x Mid: %llu Pid: %d",
136 smb->Command, smb->Status, smb->Flags, smb->MessageId,
137 smb->ProcessId);
138 cERROR(1, "smb buf %p len %u", smb, smb2_calc_size(smb));
139#endif
140}
141
Pavel Shilovskyec2e4522011-12-27 16:12:43 +0400142static bool
143smb2_need_neg(struct TCP_Server_Info *server)
144{
145 return server->max_read == 0;
146}
147
148static int
149smb2_negotiate(const unsigned int xid, struct cifs_ses *ses)
150{
151 int rc;
152 ses->server->CurrentMid = 0;
153 rc = SMB2_negotiate(xid, ses);
154 /* BB we probably don't need to retry with modern servers */
155 if (rc == -EAGAIN)
156 rc = -EHOSTDOWN;
157 return rc;
158}
159
Pavel Shilovsky2503a0d2011-12-26 22:58:46 +0400160static int
161smb2_is_path_accessible(const unsigned int xid, struct cifs_tcon *tcon,
162 struct cifs_sb_info *cifs_sb, const char *full_path)
163{
164 int rc;
165 __u64 persistent_fid, volatile_fid;
166 __le16 *utf16_path;
167
168 utf16_path = cifs_convert_path_to_utf16(full_path, cifs_sb);
169 if (!utf16_path)
170 return -ENOMEM;
171
172 rc = SMB2_open(xid, tcon, utf16_path, &persistent_fid, &volatile_fid,
Pavel Shilovskyf0df7372012-09-18 16:20:26 -0700173 FILE_READ_ATTRIBUTES, FILE_OPEN, 0, 0, NULL);
Pavel Shilovsky2503a0d2011-12-26 22:58:46 +0400174 if (rc) {
175 kfree(utf16_path);
176 return rc;
177 }
178
179 rc = SMB2_close(xid, tcon, persistent_fid, volatile_fid);
180 kfree(utf16_path);
181 return rc;
182}
183
Pavel Shilovskybe4cb9e2011-12-29 17:06:33 +0400184static int
185smb2_get_srv_inum(const unsigned int xid, struct cifs_tcon *tcon,
186 struct cifs_sb_info *cifs_sb, const char *full_path,
187 u64 *uniqueid, FILE_ALL_INFO *data)
188{
189 *uniqueid = le64_to_cpu(data->IndexNumber);
190 return 0;
191}
192
Pavel Shilovskyb7546bc2012-09-18 16:20:27 -0700193static int
194smb2_query_file_info(const unsigned int xid, struct cifs_tcon *tcon,
195 struct cifs_fid *fid, FILE_ALL_INFO *data)
196{
197 int rc;
198 struct smb2_file_all_info *smb2_data;
199
200 smb2_data = kzalloc(sizeof(struct smb2_file_all_info) + MAX_NAME * 2,
201 GFP_KERNEL);
202 if (smb2_data == NULL)
203 return -ENOMEM;
204
205 rc = SMB2_query_info(xid, tcon, fid->persistent_fid, fid->volatile_fid,
206 smb2_data);
207 if (!rc)
208 move_smb2_info_to_cifs(data, smb2_data);
209 kfree(smb2_data);
210 return rc;
211}
212
Pavel Shilovsky25e26632012-05-27 20:44:23 +0400213static char *
214smb2_build_path_to_root(struct smb_vol *vol, struct cifs_sb_info *cifs_sb,
215 struct cifs_tcon *tcon)
216{
217 int pplen = vol->prepath ? strlen(vol->prepath) : 0;
218 char *full_path = NULL;
219
220 /* if no prefix path, simply set path to the root of share to "" */
221 if (pplen == 0) {
222 full_path = kzalloc(2, GFP_KERNEL);
223 return full_path;
224 }
225
226 cERROR(1, "prefixpath is not supported for SMB2 now");
227 return NULL;
228}
229
Pavel Shilovsky9094fad2012-07-12 18:30:44 +0400230static bool
231smb2_can_echo(struct TCP_Server_Info *server)
232{
233 return server->echoes;
234}
235
Pavel Shilovskyd60622e2012-05-28 15:19:39 +0400236static void
237smb2_clear_stats(struct cifs_tcon *tcon)
238{
239#ifdef CONFIG_CIFS_STATS
240 int i;
241 for (i = 0; i < NUMBER_OF_SMB2_COMMANDS; i++) {
242 atomic_set(&tcon->stats.smb2_stats.smb2_com_sent[i], 0);
243 atomic_set(&tcon->stats.smb2_stats.smb2_com_failed[i], 0);
244 }
245#endif
246}
247
248static void
249smb2_print_stats(struct seq_file *m, struct cifs_tcon *tcon)
250{
251#ifdef CONFIG_CIFS_STATS
252 atomic_t *sent = tcon->stats.smb2_stats.smb2_com_sent;
253 atomic_t *failed = tcon->stats.smb2_stats.smb2_com_failed;
254 seq_printf(m, "\nNegotiates: %d sent %d failed",
255 atomic_read(&sent[SMB2_NEGOTIATE_HE]),
256 atomic_read(&failed[SMB2_NEGOTIATE_HE]));
257 seq_printf(m, "\nSessionSetups: %d sent %d failed",
258 atomic_read(&sent[SMB2_SESSION_SETUP_HE]),
259 atomic_read(&failed[SMB2_SESSION_SETUP_HE]));
260#define SMB2LOGOFF 0x0002 /* trivial request/resp */
261 seq_printf(m, "\nLogoffs: %d sent %d failed",
262 atomic_read(&sent[SMB2_LOGOFF_HE]),
263 atomic_read(&failed[SMB2_LOGOFF_HE]));
264 seq_printf(m, "\nTreeConnects: %d sent %d failed",
265 atomic_read(&sent[SMB2_TREE_CONNECT_HE]),
266 atomic_read(&failed[SMB2_TREE_CONNECT_HE]));
267 seq_printf(m, "\nTreeDisconnects: %d sent %d failed",
268 atomic_read(&sent[SMB2_TREE_DISCONNECT_HE]),
269 atomic_read(&failed[SMB2_TREE_DISCONNECT_HE]));
270 seq_printf(m, "\nCreates: %d sent %d failed",
271 atomic_read(&sent[SMB2_CREATE_HE]),
272 atomic_read(&failed[SMB2_CREATE_HE]));
273 seq_printf(m, "\nCloses: %d sent %d failed",
274 atomic_read(&sent[SMB2_CLOSE_HE]),
275 atomic_read(&failed[SMB2_CLOSE_HE]));
276 seq_printf(m, "\nFlushes: %d sent %d failed",
277 atomic_read(&sent[SMB2_FLUSH_HE]),
278 atomic_read(&failed[SMB2_FLUSH_HE]));
279 seq_printf(m, "\nReads: %d sent %d failed",
280 atomic_read(&sent[SMB2_READ_HE]),
281 atomic_read(&failed[SMB2_READ_HE]));
282 seq_printf(m, "\nWrites: %d sent %d failed",
283 atomic_read(&sent[SMB2_WRITE_HE]),
284 atomic_read(&failed[SMB2_WRITE_HE]));
285 seq_printf(m, "\nLocks: %d sent %d failed",
286 atomic_read(&sent[SMB2_LOCK_HE]),
287 atomic_read(&failed[SMB2_LOCK_HE]));
288 seq_printf(m, "\nIOCTLs: %d sent %d failed",
289 atomic_read(&sent[SMB2_IOCTL_HE]),
290 atomic_read(&failed[SMB2_IOCTL_HE]));
291 seq_printf(m, "\nCancels: %d sent %d failed",
292 atomic_read(&sent[SMB2_CANCEL_HE]),
293 atomic_read(&failed[SMB2_CANCEL_HE]));
294 seq_printf(m, "\nEchos: %d sent %d failed",
295 atomic_read(&sent[SMB2_ECHO_HE]),
296 atomic_read(&failed[SMB2_ECHO_HE]));
297 seq_printf(m, "\nQueryDirectories: %d sent %d failed",
298 atomic_read(&sent[SMB2_QUERY_DIRECTORY_HE]),
299 atomic_read(&failed[SMB2_QUERY_DIRECTORY_HE]));
300 seq_printf(m, "\nChangeNotifies: %d sent %d failed",
301 atomic_read(&sent[SMB2_CHANGE_NOTIFY_HE]),
302 atomic_read(&failed[SMB2_CHANGE_NOTIFY_HE]));
303 seq_printf(m, "\nQueryInfos: %d sent %d failed",
304 atomic_read(&sent[SMB2_QUERY_INFO_HE]),
305 atomic_read(&failed[SMB2_QUERY_INFO_HE]));
306 seq_printf(m, "\nSetInfos: %d sent %d failed",
307 atomic_read(&sent[SMB2_SET_INFO_HE]),
308 atomic_read(&failed[SMB2_SET_INFO_HE]));
309 seq_printf(m, "\nOplockBreaks: %d sent %d failed",
310 atomic_read(&sent[SMB2_OPLOCK_BREAK_HE]),
311 atomic_read(&failed[SMB2_OPLOCK_BREAK_HE]));
312#endif
313}
314
Pavel Shilovskyf0df7372012-09-18 16:20:26 -0700315static void
316smb2_set_fid(struct cifsFileInfo *cfile, struct cifs_fid *fid, __u32 oplock)
317{
318 /* struct cifsInodeInfo *cinode = CIFS_I(cfile->dentry->d_inode); */
319 cfile->fid.persistent_fid = fid->persistent_fid;
320 cfile->fid.volatile_fid = fid->volatile_fid;
321 /* cifs_set_oplock_level(cinode, oplock); */
322 /* cinode->can_cache_brlcks = cinode->clientCanCacheAll; */
323}
324
325static int
326smb2_close_file(const unsigned int xid, struct cifs_tcon *tcon,
327 struct cifs_fid *fid)
328{
329 return SMB2_close(xid, tcon, fid->persistent_fid, fid->volatile_fid);
330}
331
Pavel Shilovsky7a5cfb12012-09-18 16:20:28 -0700332static int
333smb2_flush_file(const unsigned int xid, struct cifs_tcon *tcon,
334 struct cifs_fid *fid)
335{
336 return SMB2_flush(xid, tcon, fid->persistent_fid, fid->volatile_fid);
337}
338
Steve French1080ef72011-02-24 18:07:19 +0000339struct smb_version_operations smb21_operations = {
Pavel Shilovsky2dc7e1c2011-12-26 22:53:34 +0400340 .setup_request = smb2_setup_request,
Pavel Shilovskyc95b8ee2012-07-11 14:45:28 +0400341 .setup_async_request = smb2_setup_async_request,
Pavel Shilovsky2dc7e1c2011-12-26 22:53:34 +0400342 .check_receive = smb2_check_receive,
Pavel Shilovsky28ea5292012-05-23 16:18:00 +0400343 .add_credits = smb2_add_credits,
344 .set_credits = smb2_set_credits,
345 .get_credits_field = smb2_get_credits_field,
346 .get_credits = smb2_get_credits,
Pavel Shilovsky2dc7e1c2011-12-26 22:53:34 +0400347 .get_next_mid = smb2_get_next_mid,
Pavel Shilovsky093b2bd2011-06-08 15:51:07 +0400348 .find_mid = smb2_find_mid,
349 .check_message = smb2_check_message,
350 .dump_detail = smb2_dump_detail,
Pavel Shilovskyd60622e2012-05-28 15:19:39 +0400351 .clear_stats = smb2_clear_stats,
352 .print_stats = smb2_print_stats,
Pavel Shilovskyec2e4522011-12-27 16:12:43 +0400353 .need_neg = smb2_need_neg,
354 .negotiate = smb2_negotiate,
Pavel Shilovsky5478f9b2011-12-27 16:22:00 +0400355 .sess_setup = SMB2_sess_setup,
356 .logoff = SMB2_logoff,
Pavel Shilovskyfaaf9462011-12-27 16:04:00 +0400357 .tree_connect = SMB2_tcon,
358 .tree_disconnect = SMB2_tdis,
Pavel Shilovsky2503a0d2011-12-26 22:58:46 +0400359 .is_path_accessible = smb2_is_path_accessible,
Pavel Shilovsky9094fad2012-07-12 18:30:44 +0400360 .can_echo = smb2_can_echo,
361 .echo = SMB2_echo,
Pavel Shilovskybe4cb9e2011-12-29 17:06:33 +0400362 .query_path_info = smb2_query_path_info,
363 .get_srv_inum = smb2_get_srv_inum,
Pavel Shilovskyb7546bc2012-09-18 16:20:27 -0700364 .query_file_info = smb2_query_file_info,
Pavel Shilovsky25e26632012-05-27 20:44:23 +0400365 .build_path_to_root = smb2_build_path_to_root,
Pavel Shilovskya0e73182011-07-19 12:56:37 +0400366 .mkdir = smb2_mkdir,
367 .mkdir_setinfo = smb2_mkdir_setinfo,
Pavel Shilovsky1a500f02012-07-10 16:14:38 +0400368 .rmdir = smb2_rmdir,
Pavel Shilovskycbe6f432012-09-18 16:20:25 -0700369 .unlink = smb2_unlink,
Pavel Shilovskyf0df7372012-09-18 16:20:26 -0700370 .open = smb2_open_file,
371 .set_fid = smb2_set_fid,
372 .close = smb2_close_file,
Pavel Shilovsky7a5cfb12012-09-18 16:20:28 -0700373 .flush = smb2_flush_file,
Steve French1080ef72011-02-24 18:07:19 +0000374};
375
376struct smb_version_values smb21_values = {
377 .version_string = SMB21_VERSION_STRING,
Pavel Shilovsky093b2bd2011-06-08 15:51:07 +0400378 .header_size = sizeof(struct smb2_hdr),
379 .max_header_size = MAX_SMB2_HDR_SIZE,
Pavel Shilovsky2dc7e1c2011-12-26 22:53:34 +0400380 .lock_cmd = SMB2_LOCK,
Pavel Shilovsky29e20f92012-07-13 13:58:14 +0400381 .cap_unix = 0,
382 .cap_nt_find = SMB2_NT_FIND,
383 .cap_large_files = SMB2_LARGE_FILES,
Steve French1080ef72011-02-24 18:07:19 +0000384};