proc.c
上传用户:jlfgdled
上传日期:2013-04-10
资源大小:33168k
文件大小:62k
- /*
- * proc.c
- *
- * Copyright (C) 1995, 1996 by Paal-Kr. Engstad and Volker Lendecke
- * Copyright (C) 1997 by Volker Lendecke
- *
- * Please add a note about your changes to smbfs in the ChangeLog file.
- */
- #include <linux/types.h>
- #include <linux/errno.h>
- #include <linux/slab.h>
- #include <linux/fs.h>
- #include <linux/file.h>
- #include <linux/stat.h>
- #include <linux/fcntl.h>
- #include <linux/dcache.h>
- #include <linux/dirent.h>
- #include <linux/nls.h>
- #include <linux/smb_fs.h>
- #include <linux/smbno.h>
- #include <linux/smb_mount.h>
- #include <asm/string.h>
- #include <asm/div64.h>
- #include "smb_debug.h"
- #include "proto.h"
- /* Features. Undefine if they cause problems, this should perhaps be a
- config option. */
- #define SMBFS_POSIX_UNLINK 1
- #define SMB_VWV(packet) ((packet) + SMB_HEADER_LEN)
- #define SMB_CMD(packet) (*(packet+8))
- #define SMB_WCT(packet) (*(packet+SMB_HEADER_LEN - 1))
- #define SMB_BCC(packet) smb_bcc(packet)
- #define SMB_BUF(packet) ((packet) + SMB_HEADER_LEN + SMB_WCT(packet) * 2 + 2)
- #define SMB_DIRINFO_SIZE 43
- #define SMB_STATUS_SIZE 21
- #define SMB_ST_BLKSIZE (PAGE_SIZE)
- #define SMB_ST_BLKSHIFT (PAGE_SHIFT)
- static int
- smb_proc_setattr_ext(struct smb_sb_info *, struct inode *,
- struct smb_fattr *);
- static int
- smb_proc_setattr_core(struct smb_sb_info *server, struct dentry *dentry,
- __u16 attr);
- static int
- smb_proc_do_getattr(struct smb_sb_info *server, struct dentry *dir,
- struct smb_fattr *fattr);
- static void
- str_upper(char *name, int len)
- {
- while (len--)
- {
- if (*name >= 'a' && *name <= 'z')
- *name -= ('a' - 'A');
- name++;
- }
- }
- #if 0
- static void
- str_lower(char *name, int len)
- {
- while (len--)
- {
- if (*name >= 'A' && *name <= 'Z')
- *name += ('a' - 'A');
- name++;
- }
- }
- #endif
- /* reverse a string inline. This is used by the dircache walking routines */
- static void reverse_string(char *buf, int len)
- {
- char c;
- char *end = buf+len-1;
- while(buf < end) {
- c = *buf;
- *(buf++) = *end;
- *(end--) = c;
- }
- }
- /* no conversion, just a wrapper for memcpy. */
- static int convert_memcpy(char *output, int olen,
- const char *input, int ilen,
- struct nls_table *nls_from,
- struct nls_table *nls_to)
- {
- if (olen < ilen)
- return -ENAMETOOLONG;
- memcpy(output, input, ilen);
- return ilen;
- }
- static inline int write_char(unsigned char ch, char *output, int olen)
- {
- if (olen < 4)
- return -ENAMETOOLONG;
- sprintf(output, ":x%02x", ch);
- return 4;
- }
- static inline int write_unichar(wchar_t ch, char *output, int olen)
- {
- if (olen < 5)
- return -ENAMETOOLONG;
- sprintf(output, ":%04x", ch);
- return 5;
- }
- /* convert from one "codepage" to another (possibly being utf8). */
- static int convert_cp(char *output, int olen,
- const char *input, int ilen,
- struct nls_table *nls_from,
- struct nls_table *nls_to)
- {
- int len = 0;
- int n;
- wchar_t ch;
- while (ilen > 0) {
- /* convert by changing to unicode and back to the new cp */
- n = nls_from->char2uni((unsigned char *)input, ilen, &ch);
- if (n == -EINVAL) {
- ilen--;
- n = write_char(*input++, output, olen);
- if (n < 0)
- goto fail;
- output += n;
- olen -= n;
- len += n;
- continue;
- } else if (n < 0)
- goto fail;
- input += n;
- ilen -= n;
- n = nls_to->uni2char(ch, output, olen);
- if (n == -EINVAL)
- n = write_unichar(ch, output, olen);
- if (n < 0)
- goto fail;
- output += n;
- olen -= n;
- len += n;
- }
- return len;
- fail:
- return n;
- }
- static int setcodepage(struct nls_table **p, char *name)
- {
- struct nls_table *nls;
- if (!name || !*name) {
- nls = NULL;
- } else if ( (nls = load_nls(name)) == NULL) {
- printk (KERN_ERR "smbfs: failed to load nls '%s'n", name);
- return -EINVAL;
- }
- /* if already set, unload the previous one. */
- if (*p)
- unload_nls(*p);
- *p = nls;
- return 0;
- }
- /* Handles all changes to codepage settings. */
- int smb_setcodepage(struct smb_sb_info *server, struct smb_nls_codepage *cp)
- {
- int n = 0;
- smb_lock_server(server);
- /* Don't load any nls_* at all, if no remote is requested */
- if (!*cp->remote_name)
- goto out;
- n = setcodepage(&server->local_nls, cp->local_name);
- if (n != 0)
- goto out;
- n = setcodepage(&server->remote_nls, cp->remote_name);
- if (n != 0)
- setcodepage(&server->local_nls, NULL);
- out:
- if (server->local_nls != NULL && server->remote_nls != NULL)
- server->convert = convert_cp;
- else
- server->convert = convert_memcpy;
- smb_unlock_server(server);
- return n;
- }
- /*****************************************************************************/
- /* */
- /* Encoding/Decoding section */
- /* */
- /*****************************************************************************/
- static __u8 *
- smb_encode_smb_length(__u8 * p, __u32 len)
- {
- *p = 0;
- *(p+1) = 0;
- *(p+2) = (len & 0xFF00) >> 8;
- *(p+3) = (len & 0xFF);
- if (len > 0xFFFF)
- {
- *(p+1) = 1;
- }
- return p + 4;
- }
- /*
- * smb_build_path: build the path to entry and name storing it in buf.
- * The path returned will have the trailing ' '.
- */
- static int smb_build_path(struct smb_sb_info *server, char * buf, int maxlen,
- struct dentry * entry, struct qstr * name)
- {
- char *path = buf;
- int len;
- if (maxlen < 2)
- return -ENAMETOOLONG;
- if (maxlen > SMB_MAXPATHLEN + 1)
- maxlen = SMB_MAXPATHLEN + 1;
- if (entry == NULL)
- goto test_name_and_out;
- /*
- * If IS_ROOT, we have to do no walking at all.
- */
- if (IS_ROOT(entry) && !name) {
- *path++ = '\';
- *path++ = ' ';
- return 2;
- }
- /*
- * Build the path string walking the tree backward from end to ROOT
- * and store it in reversed order [see reverse_string()]
- */
- while (!IS_ROOT(entry)) {
- if (maxlen < 3)
- return -ENAMETOOLONG;
- len = server->convert(path, maxlen-2,
- entry->d_name.name, entry->d_name.len,
- server->local_nls, server->remote_nls);
- if (len < 0)
- return len;
- reverse_string(path, len);
- path += len;
- *path++ = '\';
- maxlen -= len+1;
- entry = entry->d_parent;
- if (IS_ROOT(entry))
- break;
- }
- reverse_string(buf, path-buf);
- /* maxlen is at least 1 */
- test_name_and_out:
- if (name) {
- if (maxlen < 3)
- return -ENAMETOOLONG;
- *path++ = '\';
- len = server->convert(path, maxlen-2,
- name->name, name->len,
- server->local_nls, server->remote_nls);
- if (len < 0)
- return len;
- path += len;
- maxlen -= len+1;
- }
- /* maxlen is at least 1 */
- *path++ = ' ';
- return path-buf;
- }
- static int smb_encode_path(struct smb_sb_info *server, char *buf, int maxlen,
- struct dentry *dir, struct qstr *name)
- {
- int result;
- result = smb_build_path(server, buf, maxlen, dir, name);
- if (result < 0)
- goto out;
- if (server->opt.protocol <= SMB_PROTOCOL_COREPLUS)
- str_upper(buf, result);
- out:
- return result;
- }
- static int smb_simple_encode_path(struct smb_sb_info *server, char **p,
- struct dentry * entry, struct qstr * name)
- {
- char *s = *p;
- int res;
- int maxlen = ((char *)server->packet + server->packet_size) - s;
- if (!maxlen)
- return -ENAMETOOLONG;
- *s++ = 4;
- res = smb_encode_path(server, s, maxlen-1, entry, name);
- if (res < 0)
- return res;
- *p = s + res;
- return 0;
- }
- /* The following are taken directly from msdos-fs */
- /* Linear day numbers of the respective 1sts in non-leap years. */
- static int day_n[] =
- {0, 31, 59, 90, 120, 151, 181, 212, 243, 273, 304, 334, 0, 0, 0, 0};
- /* JanFebMarApr May Jun Jul Aug Sep Oct Nov Dec */
- static time_t
- utc2local(struct smb_sb_info *server, time_t time)
- {
- return time - server->opt.serverzone*60;
- }
- static time_t
- local2utc(struct smb_sb_info *server, time_t time)
- {
- return time + server->opt.serverzone*60;
- }
- /* Convert a MS-DOS time/date pair to a UNIX date (seconds since 1 1 70). */
- static time_t
- date_dos2unix(struct smb_sb_info *server, __u16 date, __u16 time)
- {
- int month, year;
- time_t secs;
- /* first subtract and mask after that... Otherwise, if
- date == 0, bad things happen */
- month = ((date >> 5) - 1) & 15;
- year = date >> 9;
- secs = (time & 31) * 2 + 60 * ((time >> 5) & 63) + (time >> 11) * 3600 + 86400 *
- ((date & 31) - 1 + day_n[month] + (year / 4) + year * 365 - ((year & 3) == 0 &&
- month < 2 ? 1 : 0) + 3653);
- /* days since 1.1.70 plus 80's leap day */
- return local2utc(server, secs);
- }
- /* Convert linear UNIX date to a MS-DOS time/date pair. */
- static void
- date_unix2dos(struct smb_sb_info *server,
- int unix_date, __u16 *date, __u16 *time)
- {
- int day, year, nl_day, month;
- unix_date = utc2local(server, unix_date);
- if (unix_date < 315532800)
- unix_date = 315532800;
- *time = (unix_date % 60) / 2 +
- (((unix_date / 60) % 60) << 5) +
- (((unix_date / 3600) % 24) << 11);
- day = unix_date / 86400 - 3652;
- year = day / 365;
- if ((year + 3) / 4 + 365 * year > day)
- year--;
- day -= (year + 3) / 4 + 365 * year;
- if (day == 59 && !(year & 3)) {
- nl_day = day;
- month = 2;
- } else {
- nl_day = (year & 3) || day <= 59 ? day : day - 1;
- for (month = 0; month < 12; month++)
- if (day_n[month] > nl_day)
- break;
- }
- *date = nl_day - day_n[month - 1] + 1 + (month << 5) + (year << 9);
- }
- /* The following are taken from fs/ntfs/util.c */
- #define NTFS_TIME_OFFSET ((u64)(369*365 + 89) * 24 * 3600 * 10000000)
- /*
- * Convert the NT UTC (based 1601-01-01, in hundred nanosecond units)
- * into Unix UTC (based 1970-01-01, in seconds).
- */
- static time_t
- smb_ntutc2unixutc(u64 ntutc)
- {
- /* FIXME: what about the timezone difference? */
- /* Subtract the NTFS time offset, then convert to 1s intervals. */
- u64 t = ntutc - NTFS_TIME_OFFSET;
- do_div(t, 10000000);
- return (time_t)t;
- }
- #if 0
- /* Convert the Unix UTC into NT time */
- static u64
- smb_unixutc2ntutc(struct smb_sb_info *server, time_t t)
- {
- /* Note: timezone conversion is probably wrong. */
- return ((u64)utc2local(server, t)) * 10000000 + NTFS_TIME_OFFSET;
- }
- #endif
- /*****************************************************************************/
- /* */
- /* Support section. */
- /* */
- /*****************************************************************************/
- __u32
- smb_len(__u8 * p)
- {
- return ((*(p+1) & 0x1) << 16L) | (*(p+2) << 8L) | *(p+3);
- }
- static __u16
- smb_bcc(__u8 * packet)
- {
- int pos = SMB_HEADER_LEN + SMB_WCT(packet) * sizeof(__u16);
- return WVAL(packet, pos);
- }
- /* smb_valid_packet: We check if packet fulfills the basic
- requirements of a smb packet */
- static int
- smb_valid_packet(__u8 * packet)
- {
- return (packet[4] == 0xff
- && packet[5] == 'S'
- && packet[6] == 'M'
- && packet[7] == 'B'
- && (smb_len(packet) + 4 == SMB_HEADER_LEN
- + SMB_WCT(packet) * 2 + SMB_BCC(packet)));
- }
- /* smb_verify: We check if we got the answer we expected, and if we
- got enough data. If bcc == -1, we don't care. */
- static int
- smb_verify(__u8 * packet, int command, int wct, int bcc)
- {
- if (SMB_CMD(packet) != command)
- goto bad_command;
- if (SMB_WCT(packet) < wct)
- goto bad_wct;
- if (bcc != -1 && SMB_BCC(packet) < bcc)
- goto bad_bcc;
- return 0;
- bad_command:
- printk(KERN_ERR "smb_verify: command=%x, SMB_CMD=%x??n",
- command, SMB_CMD(packet));
- goto fail;
- bad_wct:
- printk(KERN_ERR "smb_verify: command=%x, wct=%d, SMB_WCT=%d??n",
- command, wct, SMB_WCT(packet));
- goto fail;
- bad_bcc:
- printk(KERN_ERR "smb_verify: command=%x, bcc=%d, SMB_BCC=%d??n",
- command, bcc, SMB_BCC(packet));
- fail:
- return -EIO;
- }
- /*
- * Returns the maximum read or write size for the "payload". Making all of the
- * packet fit within the negotiated max_xmit size.
- *
- * N.B. Since this value is usually computed before locking the server,
- * the server's packet size must never be decreased!
- */
- static inline int
- smb_get_xmitsize(struct smb_sb_info *server, int overhead)
- {
- return server->opt.max_xmit - overhead;
- }
- /*
- * Calculate the maximum read size
- */
- int
- smb_get_rsize(struct smb_sb_info *server)
- {
- int overhead = SMB_HEADER_LEN + 5 * sizeof(__u16) + 2 + 1 + 2;
- int size = smb_get_xmitsize(server, overhead);
- VERBOSE("packet=%d, xmit=%d, size=%dn",
- server->packet_size, server->opt.max_xmit, size);
- return size;
- }
- /*
- * Calculate the maximum write size
- */
- int
- smb_get_wsize(struct smb_sb_info *server)
- {
- int overhead = SMB_HEADER_LEN + 5 * sizeof(__u16) + 2 + 1 + 2;
- int size = smb_get_xmitsize(server, overhead);
- VERBOSE("packet=%d, xmit=%d, size=%dn",
- server->packet_size, server->opt.max_xmit, size);
- return size;
- }
- /*
- * Convert SMB error codes to -E... errno values.
- */
- int
- smb_errno(struct smb_sb_info *server)
- {
- int errcls = server->rcls;
- int error = server->err;
- char *class = "Unknown";
- VERBOSE("errcls %d code %d from command 0x%xn",
- errcls, error, SMB_CMD(server->packet));
- if (errcls == ERRDOS) {
- switch (error) {
- case ERRbadfunc:
- return -EINVAL;
- case ERRbadfile:
- case ERRbadpath:
- return -ENOENT;
- case ERRnofids:
- return -EMFILE;
- case ERRnoaccess:
- return -EACCES;
- case ERRbadfid:
- return -EBADF;
- case ERRbadmcb:
- return -EREMOTEIO;
- case ERRnomem:
- return -ENOMEM;
- case ERRbadmem:
- return -EFAULT;
- case ERRbadenv:
- case ERRbadformat:
- return -EREMOTEIO;
- case ERRbadaccess:
- return -EACCES;
- case ERRbaddata:
- return -E2BIG;
- case ERRbaddrive:
- return -ENXIO;
- case ERRremcd:
- return -EREMOTEIO;
- case ERRdiffdevice:
- return -EXDEV;
- case ERRnofiles:
- return -ENOENT;
- case ERRbadshare:
- return -ETXTBSY;
- case ERRlock:
- return -EDEADLK;
- case ERRfilexists:
- return -EEXIST;
- case ERROR_INVALID_PARAMETER:
- return -EINVAL;
- case ERROR_DISK_FULL:
- return -ENOSPC;
- case ERROR_INVALID_NAME:
- return -ENOENT;
- case ERROR_DIR_NOT_EMPTY:
- return -ENOTEMPTY;
- case ERROR_NOT_LOCKED:
- return -ENOLCK;
- case ERROR_ALREADY_EXISTS:
- return -EEXIST;
- default:
- class = "ERRDOS";
- goto err_unknown;
- }
- } else if (errcls == ERRSRV) {
- switch (error) {
- /* N.B. This is wrong ... EIO ? */
- case ERRerror:
- return -ENFILE;
- case ERRbadpw:
- return -EINVAL;
- case ERRbadtype:
- return -EIO;
- case ERRaccess:
- return -EACCES;
- /*
- * This is a fatal error, as it means the "tree ID"
- * for this connection is no longer valid. We map
- * to a special error code and get a new connection.
- */
- case ERRinvnid:
- return -EBADSLT;
- default:
- class = "ERRSRV";
- goto err_unknown;
- }
- } else if (errcls == ERRHRD) {
- switch (error) {
- case ERRnowrite:
- return -EROFS;
- case ERRbadunit:
- return -ENODEV;
- case ERRnotready:
- return -EUCLEAN;
- case ERRbadcmd:
- case ERRdata:
- return -EIO;
- case ERRbadreq:
- return -ERANGE;
- case ERRbadshare:
- return -ETXTBSY;
- case ERRlock:
- return -EDEADLK;
- case ERRdiskfull:
- return -ENOSPC;
- default:
- class = "ERRHRD";
- goto err_unknown;
- }
- } else if (errcls == ERRCMD) {
- class = "ERRCMD";
- } else if (errcls == SUCCESS) {
- return 0; /* This is the only valid 0 return */
- }
- err_unknown:
- printk(KERN_ERR "smb_errno: class %s, code %d from command 0x%xn",
- class, error, SMB_CMD(server->packet));
- return -EIO;
- }
- /*
- * smb_retry: This function should be called when smb_request_ok has
- * indicated an error. If the error was indicated because the
- * connection was killed, we try to reconnect. If smb_retry returns 0,
- * the error was indicated for another reason, so a retry would not be
- * of any use.
- * N.B. The server must be locked for this call.
- */
- static int
- smb_retry(struct smb_sb_info *server)
- {
- pid_t pid = server->conn_pid;
- int error, result = 0;
- if (server->state == CONN_VALID || server->state == CONN_RETRYING)
- goto out;
- smb_close_socket(server);
- if (pid == 0) {
- printk(KERN_ERR "smb_retry: no connection processn");
- server->state = CONN_RETRIED;
- goto out;
- }
- /*
- * Change state so that only one retry per server will be started.
- */
- server->state = CONN_RETRYING;
- /*
- * Note: use the "priv" flag, as a user process may need to reconnect.
- */
- error = kill_proc(pid, SIGUSR1, 1);
- if (error) {
- /* FIXME: this is fatal */
- printk(KERN_ERR "smb_retry: signal failed, error=%dn", error);
- goto out;
- }
- VERBOSE("signalled pid %d, waiting for new connectionn", pid);
- /*
- * Wait for the new connection.
- */
- smb_unlock_server(server);
- interruptible_sleep_on_timeout(&server->wait, server->mnt->timeo*HZ);
- smb_lock_server(server);
- if (signal_pending(current))
- printk(KERN_INFO "smb_retry: caught signaln");
- /*
- * Check for a valid connection.
- */
- if (server->state == CONN_VALID) {
- /* This should be changed to VERBOSE, except many smbfs
- problems is with the userspace daemon not reconnecting. */
- PARANOIA("successful, new pid=%d, generation=%dn",
- server->conn_pid, server->generation);
- result = 1;
- } else if (server->state == CONN_RETRYING) {
- /* allow further attempts later */
- server->state = CONN_RETRIED;
- }
- out:
- return result;
- }
- /* smb_request_ok: We expect the server to be locked. Then we do the
- request and check the answer completely. When smb_request_ok
- returns 0, you can be quite sure that everything went well. When
- the answer is <=0, the returned number is a valid unix errno. */
- static int
- smb_request_ok(struct smb_sb_info *s, int command, int wct, int bcc)
- {
- int result = -EIO;
- s->rcls = 0;
- s->err = 0;
- /* Make sure we have a connection */
- if (s->state != CONN_VALID) {
- if (!smb_retry(s))
- goto out;
- }
- if (smb_request(s) < 0) {
- DEBUG1("smb_request failedn");
- goto out;
- }
- if (smb_valid_packet(s->packet) != 0) {
- PARANOIA("invalid packet!n");
- goto out;
- }
- /*
- * Check for server errors.
- */
- if (s->rcls != 0) {
- result = smb_errno(s);
- if (!result)
- printk(KERN_DEBUG "smb_request_ok: rcls=%d, err=%d mapped to 0n",
- s->rcls, s->err);
- /*
- * Exit now even if the error was squashed ...
- * packet verify will fail anyway.
- */
- goto out;
- }
- result = smb_verify(s->packet, command, wct, bcc);
- out:
- return result;
- }
- /*
- * This implements the NEWCONN ioctl. It installs the server pid,
- * sets server->state to CONN_VALID, and wakes up the waiting process.
- */
- int
- smb_newconn(struct smb_sb_info *server, struct smb_conn_opt *opt)
- {
- struct file *filp;
- int error;
- VERBOSE("fd=%d, pid=%dn", opt->fd, current->pid);
- smb_lock_server(server);
- /*
- * Make sure we don't already have a valid connection ...
- */
- error = -EINVAL;
- if (server->state == CONN_VALID)
- goto out;
- error = -EACCES;
- if (current->uid != server->mnt->mounted_uid &&
- !capable(CAP_SYS_ADMIN))
- goto out;
- error = -EBADF;
- filp = fget(opt->fd);
- if (!filp)
- goto out;
- if (!smb_valid_socket(filp->f_dentry->d_inode))
- goto out_putf;
- server->sock_file = filp;
- server->conn_pid = current->pid;
- smb_catch_keepalive(server);
- server->opt = *opt;
- server->generation += 1;
- server->state = CONN_VALID;
- error = 0;
- /* check if we have an old smbmount that uses seconds for the
- serverzone */
- if (server->opt.serverzone > 12*60 || server->opt.serverzone < -12*60)
- server->opt.serverzone /= 60;
- /* now that we have an established connection we can detect the server
- type and enable bug workarounds */
- if (server->opt.protocol == SMB_PROTOCOL_NT1 &&
- (server->opt.max_xmit < 0x1000) &&
- !(server->opt.capabilities & SMB_CAP_NT_SMBS)) {
- server->mnt->flags |= SMB_MOUNT_WIN95;
- VERBOSE("smb_newconn: detected WIN95 servern");
- }
- VERBOSE("protocol=%d, max_xmit=%d, pid=%d capabilities=0x%xn",
- server->opt.protocol, server->opt.max_xmit, server->conn_pid,
- server->opt.capabilities);
- /* Make sure we can fit a message of the negotiated size in our
- packet buffer. */
- if (server->opt.max_xmit > server->packet_size) {
- int len = smb_round_length(server->opt.max_xmit);
- char *buf = smb_vmalloc(len);
- if (buf) {
- if (server->packet)
- smb_vfree(server->packet);
- server->packet = buf;
- server->packet_size = len;
- } else {
- /* else continue with the too small buffer? */
- PARANOIA("Failed to allocate new packet buffer: "
- "max_xmit=%d, packet_size=%dn",
- server->opt.max_xmit, server->packet_size);
- server->opt.max_xmit = server->packet_size;
- }
- }
- out:
- smb_unlock_server(server);
- smb_wakeup(server);
- return error;
- out_putf:
- fput(filp);
- goto out;
- }
- int
- smb_wakeup(struct smb_sb_info *server)
- {
- wake_up_interruptible(&server->wait);
- return 0;
- }
- /* smb_setup_header: We completely set up the packet. You only have to
- insert the command-specific fields */
- __u8 *
- smb_setup_header(struct smb_sb_info * server, __u8 command, __u16 wct, __u16 bcc)
- {
- __u32 xmit_len = SMB_HEADER_LEN + wct * sizeof(__u16) + bcc + 2;
- __u8 *p = server->packet;
- __u8 *buf = server->packet;
- if (xmit_len > server->packet_size)
- printk(KERN_DEBUG "smb_setup_header: "
- "Aieee, xmit len > packet! len=%d, size=%dn",
- xmit_len, server->packet_size);
- p = smb_encode_smb_length(p, xmit_len - 4);
- *p++ = 0xff;
- *p++ = 'S';
- *p++ = 'M';
- *p++ = 'B';
- *p++ = command;
- memset(p, ' ', 19);
- p += 19;
- p += 8;
- WSET(buf, smb_tid, server->opt.tid);
- WSET(buf, smb_pid, 1);
- WSET(buf, smb_uid, server->opt.server_uid);
- WSET(buf, smb_mid, 1);
- if (server->opt.protocol > SMB_PROTOCOL_CORE)
- {
- *(buf+smb_flg) = 0x8;
- WSET(buf, smb_flg2, 0x3);
- }
- *p++ = wct; /* wct */
- p += 2 * wct;
- WSET(p, 0, bcc);
- return p + 2;
- }
- static void
- smb_setup_bcc(struct smb_sb_info *server, __u8 * p)
- {
- __u8 *packet = server->packet;
- __u8 *pbcc = packet + SMB_HEADER_LEN + 2 * SMB_WCT(packet);
- __u16 bcc = p - (pbcc + 2);
- WSET(pbcc, 0, bcc);
- smb_encode_smb_length(packet,
- SMB_HEADER_LEN + 2 * SMB_WCT(packet) - 2 + bcc);
- }
- /*
- * Called with the server locked
- */
- static int
- smb_proc_seek(struct smb_sb_info *server, __u16 fileid,
- __u16 mode, off_t offset)
- {
- int result;
- smb_setup_header(server, SMBlseek, 4, 0);
- WSET(server->packet, smb_vwv0, fileid);
- WSET(server->packet, smb_vwv1, mode);
- DSET(server->packet, smb_vwv2, offset);
- result = smb_request_ok(server, SMBlseek, 2, 0);
- if (result < 0) {
- result = 0;
- goto out;
- }
- result = DVAL(server->packet, smb_vwv0);
- out:
- return result;
- }
- /*
- * We're called with the server locked, and we leave it that way.
- */
- static int
- smb_proc_open(struct smb_sb_info *server, struct dentry *dentry, int wish)
- {
- struct inode *ino = dentry->d_inode;
- int mode, read_write = 0x42, read_only = 0x40;
- int res;
- char *p;
- /*
- * Attempt to open r/w, unless there are no write privileges.
- */
- mode = read_write;
- if (!(ino->i_mode & (S_IWUSR | S_IWGRP | S_IWOTH)))
- mode = read_only;
- #if 0
- /* FIXME: why is this code not in? below we fix it so that a caller
- wanting RO doesn't get RW. smb_revalidate_inode does some
- optimization based on access mode. tail -f needs it to be correct.
- We must open rw since we don't do the open if called a second time
- with different 'wish'. Is that not supported by smb servers? */
- if (!(wish & (O_WRONLY | O_RDWR)))
- mode = read_only;
- #endif
- retry:
- p = smb_setup_header(server, SMBopen, 2, 0);
- WSET(server->packet, smb_vwv0, mode);
- WSET(server->packet, smb_vwv1, aSYSTEM | aHIDDEN | aDIR);
- res = smb_simple_encode_path(server, &p, dentry, NULL);
- if (res < 0)
- goto out;
- smb_setup_bcc(server, p);
- res = smb_request_ok(server, SMBopen, 7, 0);
- if (res != 0) {
- if (smb_retry(server))
- goto retry;
- if (mode == read_write &&
- (res == -EACCES || res == -ETXTBSY || res == -EROFS))
- {
- VERBOSE("%s/%s R/W failed, error=%d, retrying R/On",
- DENTRY_PATH(dentry), res);
- mode = read_only;
- goto retry;
- }
- goto out;
- }
- /* We should now have data in vwv[0..6]. */
- ino->u.smbfs_i.fileid = WVAL(server->packet, smb_vwv0);
- ino->u.smbfs_i.attr = WVAL(server->packet, smb_vwv1);
- /* smb_vwv2 has mtime */
- /* smb_vwv4 has size */
- ino->u.smbfs_i.access = (WVAL(server->packet, smb_vwv6) & SMB_ACCMASK);
- ino->u.smbfs_i.open = server->generation;
- out:
- return res;
- }
- /*
- * Make sure the file is open, and check that the access
- * is compatible with the desired access.
- */
- int
- smb_open(struct dentry *dentry, int wish)
- {
- struct inode *inode = dentry->d_inode;
- int result;
- result = -ENOENT;
- if (!inode) {
- printk(KERN_ERR "smb_open: no inode for dentry %s/%sn",
- DENTRY_PATH(dentry));
- goto out;
- }
- if (!smb_is_open(inode)) {
- struct smb_sb_info *server = server_from_inode(inode);
- smb_lock_server(server);
- result = 0;
- if (!smb_is_open(inode))
- result = smb_proc_open(server, dentry, wish);
- smb_unlock_server(server);
- if (result) {
- PARANOIA("%s/%s open failed, result=%dn",
- DENTRY_PATH(dentry), result);
- goto out;
- }
- /*
- * A successful open means the path is still valid ...
- */
- smb_renew_times(dentry);
- }
- /*
- * Check whether the access is compatible with the desired mode.
- */
- result = 0;
- if (inode->u.smbfs_i.access != wish &&
- inode->u.smbfs_i.access != SMB_O_RDWR)
- {
- PARANOIA("%s/%s access denied, access=%x, wish=%xn",
- DENTRY_PATH(dentry), inode->u.smbfs_i.access, wish);
- result = -EACCES;
- }
- out:
- return result;
- }
- /* We're called with the server locked */
- static int
- smb_proc_close(struct smb_sb_info *server, __u16 fileid, __u32 mtime)
- {
- smb_setup_header(server, SMBclose, 3, 0);
- WSET(server->packet, smb_vwv0, fileid);
- DSET(server->packet, smb_vwv1, utc2local(server, mtime));
- return smb_request_ok(server, SMBclose, 0, 0);
- }
- /*
- * Called with the server locked.
- *
- * Win NT 4.0 has an apparent bug in that it fails to update the
- * modify time when writing to a file. As a workaround, we update
- * both modify and access time locally, and post the times to the
- * server when closing the file.
- */
- static int
- smb_proc_close_inode(struct smb_sb_info *server, struct inode * ino)
- {
- int result = 0;
- if (smb_is_open(ino))
- {
- /*
- * We clear the open flag in advance, in case another
- * process observes the value while we block below.
- */
- ino->u.smbfs_i.open = 0;
- /*
- * Kludge alert: SMB timestamps are accurate only to
- * two seconds ... round the times to avoid needless
- * cache invalidations!
- */
- if (ino->i_mtime & 1)
- ino->i_mtime--;
- if (ino->i_atime & 1)
- ino->i_atime--;
- /*
- * If the file is open with write permissions,
- * update the time stamps to sync mtime and atime.
- */
- if ((server->opt.protocol >= SMB_PROTOCOL_LANMAN2) &&
- !(ino->u.smbfs_i.access == SMB_O_RDONLY))
- {
- struct smb_fattr fattr;
- smb_get_inode_attr(ino, &fattr);
- smb_proc_setattr_ext(server, ino, &fattr);
- }
- result = smb_proc_close(server, ino->u.smbfs_i.fileid,
- ino->i_mtime);
- /*
- * Force a revalidation after closing ... some servers
- * don't post the size until the file has been closed.
- */
- if (server->opt.protocol < SMB_PROTOCOL_NT1)
- ino->u.smbfs_i.oldmtime = 0;
- ino->u.smbfs_i.closed = jiffies;
- }
- return result;
- }
- int
- smb_close(struct inode *ino)
- {
- int result = 0;
- if (smb_is_open(ino)) {
- struct smb_sb_info *server = server_from_inode(ino);
- smb_lock_server(server);
- result = smb_proc_close_inode(server, ino);
- smb_unlock_server(server);
- }
- return result;
- }
- /*
- * This is used to close a file following a failed instantiate.
- * Since we don't have an inode, we can't use any of the above.
- */
- int
- smb_close_fileid(struct dentry *dentry, __u16 fileid)
- {
- struct smb_sb_info *server = server_from_dentry(dentry);
- int result;
- smb_lock_server(server);
- result = smb_proc_close(server, fileid, CURRENT_TIME);
- smb_unlock_server(server);
- return result;
- }
- /* In smb_proc_read and smb_proc_write we do not retry, because the
- file-id would not be valid after a reconnection. */
- int
- smb_proc_read(struct inode *inode, off_t offset, int count, char *data)
- {
- struct smb_sb_info *server = server_from_inode(inode);
- __u16 returned_count, data_len;
- unsigned char *buf;
- int result;
- smb_lock_server(server);
- smb_setup_header(server, SMBread, 5, 0);
- buf = server->packet;
- WSET(buf, smb_vwv0, inode->u.smbfs_i.fileid);
- WSET(buf, smb_vwv1, count);
- DSET(buf, smb_vwv2, offset);
- WSET(buf, smb_vwv4, 0);
- result = smb_request_ok(server, SMBread, 5, -1);
- if (result < 0)
- goto out;
- returned_count = WVAL(server->packet, smb_vwv0);
- buf = SMB_BUF(server->packet);
- data_len = WVAL(buf, 1);
- /* we can NOT simply trust the data_len given by the server ... */
- if (data_len > server->packet_size - (buf+3 - server->packet)) {
- printk(KERN_ERR "smb_proc_read: invalid data length!! "
- "%d > %d - (%p - %p)n",
- data_len, server->packet_size, buf+3, server->packet);
- result = -EIO;
- goto out;
- }
- memcpy(data, buf+3, data_len);
- if (returned_count != data_len) {
- printk(KERN_NOTICE "smb_proc_read: returned != data_lenn");
- printk(KERN_NOTICE "smb_proc_read: ret_c=%d, data_len=%dn",
- returned_count, data_len);
- }
- result = data_len;
- out:
- VERBOSE("ino=%ld, fileid=%d, count=%d, result=%dn",
- inode->i_ino, inode->u.smbfs_i.fileid, count, result);
- smb_unlock_server(server);
- return result;
- }
- int
- smb_proc_write(struct inode *inode, off_t offset, int count, const char *data)
- {
- struct smb_sb_info *server = server_from_inode(inode);
- int result;
- __u8 *p;
- __u16 fileid = inode->u.smbfs_i.fileid;
- VERBOSE("ino=%ld, fileid=%d, count=%d@%ld, packet_size=%dn",
- inode->i_ino, inode->u.smbfs_i.fileid, count, offset,
- server->packet_size);
- smb_lock_server(server);
- p = smb_setup_header(server, SMBwrite, 5, count + 3);
- WSET(server->packet, smb_vwv0, fileid);
- WSET(server->packet, smb_vwv1, count);
- DSET(server->packet, smb_vwv2, offset);
- WSET(server->packet, smb_vwv4, 0);
- *p++ = 1;
- WSET(p, 0, count);
- memcpy(p+2, data, count);
- result = smb_request_ok(server, SMBwrite, 1, 0);
- if (result >= 0)
- result = WVAL(server->packet, smb_vwv0);
- smb_unlock_server(server);
- return result;
- }
- int
- smb_proc_create(struct dentry *dentry, __u16 attr, time_t ctime, __u16 *fileid)
- {
- struct smb_sb_info *server = server_from_dentry(dentry);
- char *p;
- int result;
- smb_lock_server(server);
- retry:
- p = smb_setup_header(server, SMBcreate, 3, 0);
- WSET(server->packet, smb_vwv0, attr);
- DSET(server->packet, smb_vwv1, utc2local(server, ctime));
- result = smb_simple_encode_path(server, &p, dentry, NULL);
- if (result < 0)
- goto out;
- smb_setup_bcc(server, p);
- result = smb_request_ok(server, SMBcreate, 1, 0);
- if (result < 0) {
- if (smb_retry(server))
- goto retry;
- goto out;
- }
- *fileid = WVAL(server->packet, smb_vwv0);
- result = 0;
- out:
- smb_unlock_server(server);
- return result;
- }
- int
- smb_proc_mv(struct dentry *old_dentry, struct dentry *new_dentry)
- {
- struct smb_sb_info *server = server_from_dentry(old_dentry);
- char *p;
- int result;
- smb_lock_server(server);
- retry:
- p = smb_setup_header(server, SMBmv, 1, 0);
- WSET(server->packet, smb_vwv0, aSYSTEM | aHIDDEN | aDIR);
- result = smb_simple_encode_path(server, &p, old_dentry, NULL);
- if (result < 0)
- goto out;
- result = smb_simple_encode_path(server, &p, new_dentry, NULL);
- if (result < 0)
- goto out;
- smb_setup_bcc(server, p);
- if ((result = smb_request_ok(server, SMBmv, 0, 0)) < 0) {
- if (smb_retry(server))
- goto retry;
- goto out;
- }
- result = 0;
- out:
- smb_unlock_server(server);
- return result;
- }
- /*
- * Code common to mkdir and rmdir.
- */
- static int
- smb_proc_generic_command(struct dentry *dentry, __u8 command)
- {
- struct smb_sb_info *server = server_from_dentry(dentry);
- char *p;
- int result;
- smb_lock_server(server);
- retry:
- p = smb_setup_header(server, command, 0, 0);
- result = smb_simple_encode_path(server, &p, dentry, NULL);
- if (result < 0)
- goto out;
- smb_setup_bcc(server, p);
- result = smb_request_ok(server, command, 0, 0);
- if (result < 0) {
- if (smb_retry(server))
- goto retry;
- goto out;
- }
- result = 0;
- out:
- smb_unlock_server(server);
- return result;
- }
- int
- smb_proc_mkdir(struct dentry *dentry)
- {
- return smb_proc_generic_command(dentry, SMBmkdir);
- }
- int
- smb_proc_rmdir(struct dentry *dentry)
- {
- return smb_proc_generic_command(dentry, SMBrmdir);
- }
- #if SMBFS_POSIX_UNLINK
- /*
- * Removes readonly attribute from a file. Used by unlink to give posix
- * semantics.
- * Note: called with the server locked.
- */
- static int
- smb_set_rw(struct dentry *dentry,struct smb_sb_info *server)
- {
- int result;
- struct smb_fattr fattr;
- /* first get current attribute */
- result = smb_proc_do_getattr(server, dentry, &fattr);
- if (result < 0)
- return result;
- /* if RONLY attribute is set, remove it */
- if (fattr.attr & aRONLY) { /* read only attribute is set */
- fattr.attr &= ~aRONLY;
- result = smb_proc_setattr_core(server, dentry, fattr.attr);
- }
- return result;
- }
- #endif
- int
- smb_proc_unlink(struct dentry *dentry)
- {
- struct smb_sb_info *server = server_from_dentry(dentry);
- int flag = 0;
- char *p;
- int result;
- smb_lock_server(server);
- retry:
- p = smb_setup_header(server, SMBunlink, 1, 0);
- WSET(server->packet, smb_vwv0, aSYSTEM | aHIDDEN);
- result = smb_simple_encode_path(server, &p, dentry, NULL);
- if (result < 0)
- goto out;
- smb_setup_bcc(server, p);
- if ((result = smb_request_ok(server, SMBunlink, 0, 0)) < 0) {
- #if SMBFS_POSIX_UNLINK
- if (result == -EACCES && !flag) {
- /* Posix semantics is for the read-only state
- of a file to be ignored in unlink(). In the
- SMB world a unlink() is refused on a
- read-only file. To make things easier for
- unix users we try to override the files
- permission if the unlink fails with the
- right error.
- This introduces a race condition that could
- lead to a file being written by someone who
- shouldn't have access, but as far as I can
- tell that is unavoidable */
- /* remove RONLY attribute and try again */
- result = smb_set_rw(dentry,server);
- if (result == 0) {
- flag = 1;
- goto retry;
- }
- }
- #endif
- if (smb_retry(server))
- goto retry;
- goto out;
- }
- result = 0;
- out:
- smb_unlock_server(server);
- return result;
- }
- /*
- * Called with the server locked
- */
- int
- smb_proc_flush(struct smb_sb_info *server, __u16 fileid)
- {
- smb_setup_header(server, SMBflush, 1, 0);
- WSET(server->packet, smb_vwv0, fileid);
- return smb_request_ok(server, SMBflush, 0, 0);
- }
- int
- smb_proc_trunc(struct smb_sb_info *server, __u16 fid, __u32 length)
- {
- char *p;
- int result;
- smb_lock_server(server);
- retry:
- p = smb_setup_header(server, SMBwrite, 5, 3);
- WSET(server->packet, smb_vwv0, fid);
- WSET(server->packet, smb_vwv1, 0);
- DSET(server->packet, smb_vwv2, length);
- WSET(server->packet, smb_vwv4, 0);
- *p++ = 1;
- WSET(p, 0, 0);
- if ((result = smb_request_ok(server, SMBwrite, 1, 0)) < 0) {
- if (smb_retry(server))
- goto retry;
- goto out;
- }
- /*
- * win9x doesn't appear to update the size immediately.
- * It will return the old file size after the truncate,
- * confusing smbfs.
- * NT and Samba return the new value immediately.
- */
- if (server->mnt->flags & SMB_MOUNT_WIN95)
- smb_proc_flush(server, fid);
- out:
- smb_unlock_server(server);
- return result;
- }
- static void
- smb_init_dirent(struct smb_sb_info *server, struct smb_fattr *fattr)
- {
- memset(fattr, 0, sizeof(*fattr));
- fattr->f_nlink = 1;
- fattr->f_uid = server->mnt->uid;
- fattr->f_gid = server->mnt->gid;
- fattr->f_blksize = SMB_ST_BLKSIZE;
- }
- static void
- smb_finish_dirent(struct smb_sb_info *server, struct smb_fattr *fattr)
- {
- fattr->f_mode = server->mnt->file_mode;
- if (fattr->attr & aDIR)
- {
- fattr->f_mode = server->mnt->dir_mode;
- fattr->f_size = SMB_ST_BLKSIZE;
- }
- /* Check the read-only flag */
- if (fattr->attr & aRONLY)
- fattr->f_mode &= ~(S_IWUSR | S_IWGRP | S_IWOTH);
- /* How many 512 byte blocks do we need for this file? */
- fattr->f_blocks = 0;
- if (fattr->f_size != 0)
- fattr->f_blocks = 1 + ((fattr->f_size-1) >> 9);
- return;
- }
- void
- smb_init_root_dirent(struct smb_sb_info *server, struct smb_fattr *fattr)
- {
- smb_init_dirent(server, fattr);
- fattr->attr = aDIR;
- fattr->f_ino = 2; /* traditional root inode number */
- fattr->f_mtime = CURRENT_TIME;
- smb_finish_dirent(server, fattr);
- }
- /*
- * Decode a dirent for old protocols
- *
- * qname is filled with the decoded, and possibly translated, name.
- * fattr receives decoded attributes
- *
- * Bugs Noted:
- * (1) Pathworks servers may pad the name with extra spaces.
- */
- static char *
- smb_decode_short_dirent(struct smb_sb_info *server, char *p,
- struct qstr *qname, struct smb_fattr *fattr)
- {
- int len;
- /*
- * SMB doesn't have a concept of inode numbers ...
- */
- smb_init_dirent(server, fattr);
- fattr->f_ino = 0; /* FIXME: do we need this? */
- p += SMB_STATUS_SIZE; /* reserved (search_status) */
- fattr->attr = *p;
- fattr->f_mtime = date_dos2unix(server, WVAL(p, 3), WVAL(p, 1));
- fattr->f_size = DVAL(p, 5);
- fattr->f_ctime = fattr->f_mtime;
- fattr->f_atime = fattr->f_mtime;
- qname->name = p + 9;
- len = strnlen(qname->name, 12);
- /*
- * Trim trailing blanks for Pathworks servers
- */
- while (len > 2 && qname->name[len-1] == ' ')
- len--;
- qname->len = len;
- smb_finish_dirent(server, fattr);
- #if 0
- /* FIXME: These only work for ascii chars, and recent smbmount doesn't
- allow the flag to be set anyway. It kills const. Remove? */
- switch (server->opt.case_handling) {
- case SMB_CASE_UPPER:
- str_upper(entry->name, len);
- break;
- case SMB_CASE_LOWER:
- str_lower(entry->name, len);
- break;
- default:
- break;
- }
- #endif
- qname->len = 0;
- len = server->convert(server->name_buf, SMB_MAXNAMELEN,
- qname->name, len,
- server->remote_nls, server->local_nls);
- if (len > 0) {
- qname->len = len;
- qname->name = server->name_buf;
- DEBUG1("len=%d, name=%.*sn",qname->len,qname->len,qname->name);
- }
- return p + 22;
- }
- /*
- * This routine is used to read in directory entries from the network.
- * Note that it is for short directory name seeks, i.e.: protocol <
- * SMB_PROTOCOL_LANMAN2
- */
- static int
- smb_proc_readdir_short(struct file *filp, void *dirent, filldir_t filldir,
- struct smb_cache_control *ctl)
- {
- struct dentry *dir = filp->f_dentry;
- struct smb_sb_info *server = server_from_dentry(dir);
- struct qstr qname;
- struct smb_fattr fattr;
- char *p;
- int result;
- int i, first, entries_seen, entries;
- int entries_asked = (server->opt.max_xmit - 100) / SMB_DIRINFO_SIZE;
- __u16 bcc;
- __u16 count;
- char status[SMB_STATUS_SIZE];
- static struct qstr mask = { "*.*", 3, 0 };
- unsigned char *last_status;
- VERBOSE("%s/%sn", DENTRY_PATH(dir));
- smb_lock_server(server);
- first = 1;
- entries = 0;
- entries_seen = 2; /* implicit . and .. */
- while (1) {
- p = smb_setup_header(server, SMBsearch, 2, 0);
- WSET(server->packet, smb_vwv0, entries_asked);
- WSET(server->packet, smb_vwv1, aDIR);
- if (first == 1) {
- result = smb_simple_encode_path(server, &p, dir, &mask);
- if (result < 0)
- goto unlock_return;
- if (p + 3 > (char*)server->packet+server->packet_size) {
- result = -ENAMETOOLONG;
- goto unlock_return;
- }
- *p++ = 5;
- WSET(p, 0, 0);
- p += 2;
- first = 0;
- } else {
- if (p + 5 + SMB_STATUS_SIZE >
- (char*)server->packet + server->packet_size) {
- result = -ENAMETOOLONG;
- goto unlock_return;
- }
-
- *p++ = 4;
- *p++ = 0;
- *p++ = 5;
- WSET(p, 0, SMB_STATUS_SIZE);
- p += 2;
- memcpy(p, status, SMB_STATUS_SIZE);
- p += SMB_STATUS_SIZE;
- }
- smb_setup_bcc(server, p);
- result = smb_request_ok(server, SMBsearch, 1, -1);
- if (result < 0) {
- if ((server->rcls == ERRDOS) &&
- (server->err == ERRnofiles))
- break;
- if (smb_retry(server)) {
- ctl->idx = -1; /* retry */
- result = 0;
- }
- goto unlock_return;
- }
- p = SMB_VWV(server->packet);
- count = WVAL(p, 0);
- if (count <= 0)
- break;
- result = -EIO;
- bcc = WVAL(p, 2);
- if (bcc != count * SMB_DIRINFO_SIZE + 3)
- goto unlock_return;
- p += 7;
- /* Make sure the response fits in the buffer. Fixed sized
- entries means we don't have to check in the decode loop. */
- last_status = SMB_BUF(server->packet) + 3 + (count - 1) *
- SMB_DIRINFO_SIZE;
- if (last_status + SMB_DIRINFO_SIZE >=
- server->packet + server->packet_size) {
- printk(KERN_ERR "smb_proc_readdir_short: "
- "last dir entry outside buffer! "
- "%d@%p %d@%pn", SMB_DIRINFO_SIZE, last_status,
- server->packet_size, server->packet);
- goto unlock_return;
- }
- /* Read the last entry into the status field. */
- memcpy(status, last_status, SMB_STATUS_SIZE);
- /* Now we are ready to parse smb directory entries. */
- for (i = 0; i < count; i++) {
- p = smb_decode_short_dirent(server, p,
- &qname, &fattr);
- if (qname.len == 0)
- continue;
- if (entries_seen == 2 && qname.name[0] == '.') {
- if (qname.len == 1)
- continue;
- if (qname.name[1] == '.' && qname.len == 2)
- continue;
- }
- if (!smb_fill_cache(filp, dirent, filldir, ctl,
- &qname, &fattr))
- ; /* stop reading? */
- entries_seen++;
- }
- }
- result = entries;
- unlock_return:
- smb_unlock_server(server);
- return result;
- }
- /*
- * Interpret a long filename structure using the specified info level:
- * level 1 for anything below NT1 protocol
- * level 260 for NT1 protocol
- *
- * qname is filled with the decoded, and possibly translated, name
- * fattr receives decoded attributes.
- *
- * Bugs Noted:
- * (1) Win NT 4.0 appends a null byte to names and counts it in the length!
- */
- static char *
- smb_decode_long_dirent(struct smb_sb_info *server, char *p, int level,
- struct qstr *qname, struct smb_fattr *fattr)
- {
- char *result;
- unsigned int len = 0;
- int n;
- __u16 date, time;
- /*
- * SMB doesn't have a concept of inode numbers ...
- */
- smb_init_dirent(server, fattr);
- fattr->f_ino = 0; /* FIXME: do we need this? */
- switch (level) {
- case 1:
- len = *((unsigned char *) p + 22);
- qname->name = p + 23;
- result = p + 24 + len;
- date = WVAL(p, 0);
- time = WVAL(p, 2);
- fattr->f_ctime = date_dos2unix(server, date, time);
- date = WVAL(p, 4);
- time = WVAL(p, 6);
- fattr->f_atime = date_dos2unix(server, date, time);
- date = WVAL(p, 8);
- time = WVAL(p, 10);
- fattr->f_mtime = date_dos2unix(server, date, time);
- fattr->f_size = DVAL(p, 12);
- /* ULONG allocation size */
- fattr->attr = WVAL(p, 20);
- VERBOSE("info 1 at %p, len=%d, name=%.*sn",
- p, len, len, qname->name);
- break;
- case 260:
- result = p + WVAL(p, 0);
- len = DVAL(p, 60);
- if (len > 255) len = 255;
- /* NT4 null terminates */
- qname->name = p + 94;
- if (len && qname->name[len-1] == ' ')
- len--;
- fattr->f_ctime = smb_ntutc2unixutc(LVAL(p, 8));
- fattr->f_atime = smb_ntutc2unixutc(LVAL(p, 16));
- fattr->f_mtime = smb_ntutc2unixutc(LVAL(p, 24));
- /* change time (32) */
- fattr->f_size = DVAL(p, 40);
- /* alloc size (48) */
- fattr->attr = DVAL(p, 56);
- VERBOSE("info 260 at %p, len=%d, name=%.*sn",
- p, len, len, qname->name);
- break;
- default:
- PARANOIA("Unknown info level %dn", level);
- result = p + WVAL(p, 0);
- goto out;
- }
- smb_finish_dirent(server, fattr);
- #if 0
- /* FIXME: These only work for ascii chars, and recent smbmount doesn't
- allow the flag to be set anyway. Remove? */
- switch (server->opt.case_handling) {
- case SMB_CASE_UPPER:
- str_upper(qname->name, len);
- break;
- case SMB_CASE_LOWER:
- str_lower(qname->name, len);
- break;
- default:
- break;
- }
- #endif
- qname->len = 0;
- n = server->convert(server->name_buf, SMB_MAXNAMELEN,
- qname->name, len,
- server->remote_nls, server->local_nls);
- if (n > 0) {
- qname->len = n;
- qname->name = server->name_buf;
- }
- out:
- return result;
- }
- /* findfirst/findnext flags */
- #define SMB_CLOSE_AFTER_FIRST (1<<0)
- #define SMB_CLOSE_IF_END (1<<1)
- #define SMB_REQUIRE_RESUME_KEY (1<<2)
- #define SMB_CONTINUE_BIT (1<<3)
- /*
- * Note: samba-2.0.7 (at least) has a very similar routine, cli_list, in
- * source/libsmb/clilist.c. When looking for smb bugs in the readdir code,
- * go there for advise.
- *
- * Bugs Noted:
- * (1) When using Info Level 1 Win NT 4.0 truncates directory listings
- * for certain patterns of names and/or lengths. The breakage pattern
- * is completely reproducible and can be toggled by the creation of a
- * single file. (E.g. echo hi >foo breaks, rm -f foo works.)
- */
- static int
- smb_proc_readdir_long(struct file *filp, void *dirent, filldir_t filldir,
- struct smb_cache_control *ctl)
- {
- struct dentry *dir = filp->f_dentry;
- struct smb_sb_info *server = server_from_dentry(dir);
- struct qstr qname;
- struct smb_fattr fattr;
- unsigned char *p, *lastname;
- char *mask, *param = server->temp_buf;
- __u16 command;
- int first, entries_seen;
- /* Both NT and OS/2 accept info level 1 (but see note below). */
- int info_level = 260;
- const int max_matches = 512;
- unsigned char *resp_data = NULL;
- unsigned char *resp_param = NULL;
- int resp_data_len = 0;
- int resp_param_len = 0;
- int ff_searchcount = 0;
- int ff_eos = 0;
- int ff_lastname = 0;
- int ff_dir_handle = 0;
- int loop_count = 0;
- int mask_len, i, result;
- static struct qstr star = { "*", 1, 0 };
- /*
- * use info level 1 for older servers that don't do 260
- */
- if (server->opt.protocol < SMB_PROTOCOL_NT1)
- info_level = 1;
- smb_lock_server(server);
- /*
- * Encode the initial path
- */
- mask = param + 12;
- mask_len = smb_encode_path(server, mask, SMB_MAXPATHLEN+1, dir, &star);
- if (mask_len < 0) {
- result = mask_len;
- goto unlock_return;
- }
- mask_len--; /* mask_len is strlen, not #bytes */
- first = 1;
- VERBOSE("starting mask_len=%d, mask=%sn", mask_len, mask);
- result = 0;
- entries_seen = 2;
- ff_eos = 0;
- while (ff_eos == 0) {
- loop_count += 1;
- if (loop_count > 10) {
- printk(KERN_WARNING "smb_proc_readdir_long: "
- "Looping in FIND_NEXT??n");
- result = -EIO;
- break;
- }
- if (first != 0) {
- command = TRANSACT2_FINDFIRST;
- WSET(param, 0, aSYSTEM | aHIDDEN | aDIR);
- WSET(param, 2, max_matches); /* max count */
- WSET(param, 4, SMB_CLOSE_IF_END);
- WSET(param, 6, info_level);
- DSET(param, 8, 0);
- } else {
- command = TRANSACT2_FINDNEXT;
- VERBOSE("handle=0x%X, lastname=%d, mask=%sn",
- ff_dir_handle, ff_lastname, mask);
- WSET(param, 0, ff_dir_handle); /* search handle */
- WSET(param, 2, max_matches); /* max count */
- WSET(param, 4, info_level);
- DSET(param, 6, 0);
- WSET(param, 10, SMB_CONTINUE_BIT|SMB_CLOSE_IF_END);
- }
- result = smb_trans2_request(server, command,
- 0, NULL, 12 + mask_len + 1, param,
- &resp_data_len, &resp_data,
- &resp_param_len, &resp_param);
- if (result < 0) {
- if (smb_retry(server)) {
- PARANOIA("error=%d, retryingn", result);
- ctl->idx = -1; /* retry */
- result = 0;
- goto unlock_return;
- }
- PARANOIA("error=%d, breakingn", result);
- break;
- }
- if (server->rcls == ERRSRV && server->err == ERRerror) {
- /* a damn Win95 bug - sometimes it clags if you
- ask it too fast */
- current->state = TASK_INTERRUPTIBLE;
- schedule_timeout(HZ/5);
- continue;
- }
- if (server->rcls != 0) {
- result = smb_errno(server);
- PARANOIA("name=%s, result=%d, rcls=%d, err=%dn",
- mask, result, server->rcls, server->err);
- break;
- }
- /* parse out some important return info */
- if (first != 0) {
- ff_dir_handle = WVAL(resp_param, 0);
- ff_searchcount = WVAL(resp_param, 2);
- ff_eos = WVAL(resp_param, 4);
- ff_lastname = WVAL(resp_param, 8);
- } else {
- ff_searchcount = WVAL(resp_param, 0);
- ff_eos = WVAL(resp_param, 2);
- ff_lastname = WVAL(resp_param, 6);
- }
- if (ff_searchcount == 0)
- break;
- /*
- * We might need the lastname for continuations.
- *
- * Note that some servers (win95?) point to the filename and
- * others (NT4, Samba using NT1) to the dir entry. We assume
- * here that those who do not point to a filename do not need
- * this info to continue the listing.
- *
- * OS/2 needs this and talks infolevel 1
- * NetApps want lastname with infolevel 260
- *
- * Both are happy if we return the data they point to. So we do.
- */
- mask_len = 0;
- if (ff_lastname > 0 && ff_lastname < resp_data_len) {
- lastname = resp_data + ff_lastname;
- switch (info_level) {
- case 260:
- mask_len = resp_data_len - ff_lastname;
- break;
- case 1:
- /* lastname points to a length byte */
- mask_len = *lastname++;
- if (ff_lastname + 1 + mask_len > resp_data_len)
- mask_len = resp_data_len - ff_lastname - 1;
- break;
- }
- /*
- * Update the mask string for the next message.
- */
- if (mask_len < 0)
- mask_len = 0;
- if (mask_len > 255)
- mask_len = 255;
- if (mask_len)
- strncpy(mask, lastname, mask_len);
- }
- mask_len = strnlen(mask, mask_len);
- VERBOSE("new mask, len=%d@%d of %d, mask=%.*sn",
- mask_len, ff_lastname, resp_data_len, mask_len, mask);
- /* Now we are ready to parse smb directory entries. */
- /* point to the data bytes */
- p = resp_data;
- for (i = 0; i < ff_searchcount; i++) {
- /* make sure we stay within the buffer */
- if (p >= resp_data + resp_data_len) {
- printk(KERN_ERR "smb_proc_readdir_long: "
- "dirent pointer outside buffer! "
- "%p %d@%p %d@%pn",
- p, resp_data_len, resp_data,
- server->packet_size, server->packet);
- result = -EIO; /* always a comm. error? */
- goto unlock_return;
- }
- p = smb_decode_long_dirent(server, p, info_level,
- &qname, &fattr);
- if (qname.len == 0)
- continue;
- /* ignore . and .. from the server */
- if (entries_seen == 2 && qname.name[0] == '.') {
- if (qname.len == 1)
- continue;
- if (qname.name[1] == '.' && qname.len == 2)
- continue;
- }
- if (!smb_fill_cache(filp, dirent, filldir, ctl,
- &qname, &fattr))
- ; /* stop reading? */
- entries_seen++;
- }
- VERBOSE("received %d entries, eos=%dn", ff_searchcount,ff_eos);
- first = 0;
- loop_count = 0;
- }
- unlock_return:
- smb_unlock_server(server);
- return result;
- }
- int
- smb_proc_readdir(struct file *filp, void *dirent, filldir_t filldir,
- struct smb_cache_control *ctl)
- {
- struct smb_sb_info *server = server_from_dentry(filp->f_dentry);
- if (server->opt.protocol >= SMB_PROTOCOL_LANMAN2)
- return smb_proc_readdir_long(filp, dirent, filldir, ctl);
- else
- return smb_proc_readdir_short(filp, dirent, filldir, ctl);
- }
- /*
- * This version uses the trans2 TRANSACT2_FINDFIRST message
- * to get the attribute data.
- * Note: called with the server locked.
- *
- * Bugs Noted:
- */
- static int
- smb_proc_getattr_ff(struct smb_sb_info *server, struct dentry *dentry,
- struct smb_fattr *fattr)
- {
- char *param = server->temp_buf, *mask = param + 12;
- __u16 date, time;
- unsigned char *resp_data = NULL;
- unsigned char *resp_param = NULL;
- int resp_data_len = 0;
- int resp_param_len = 0;
- int mask_len, result;
- retry:
- mask_len = smb_encode_path(server, mask, SMB_MAXPATHLEN+1, dentry, NULL);
- if (mask_len < 0) {
- result = mask_len;
- goto out;
- }
- VERBOSE("name=%s, len=%dn", mask, mask_len);
- WSET(param, 0, aSYSTEM | aHIDDEN | aDIR);
- WSET(param, 2, 1); /* max count */
- WSET(param, 4, 1); /* close after this call */
- WSET(param, 6, 1); /* info_level */
- DSET(param, 8, 0);
- result = smb_trans2_request(server, TRANSACT2_FINDFIRST,
- 0, NULL, 12 + mask_len, param,
- &resp_data_len, &resp_data,
- &resp_param_len, &resp_param);
- if (result < 0)
- {
- if (smb_retry(server))
- goto retry;
- goto out;
- }
- if (server->rcls != 0)
- {
- result = smb_errno(server);
- #ifdef SMBFS_PARANOIA
- if (result != -ENOENT)
- PARANOIA("error for %s, rcls=%d, err=%dn",
- mask, server->rcls, server->err);
- #endif
- goto out;
- }
- /* Make sure we got enough data ... */
- result = -EINVAL;
- if (resp_data_len < 22 || WVAL(resp_param, 2) != 1)
- {
- PARANOIA("bad result for %s, len=%d, count=%dn",
- mask, resp_data_len, WVAL(resp_param, 2));
- goto out;
- }
- /*
- * Decode the response into the fattr ...
- */
- date = WVAL(resp_data, 0);
- time = WVAL(resp_data, 2);
- fattr->f_ctime = date_dos2unix(server, date, time);
- date = WVAL(resp_data, 4);
- time = WVAL(resp_data, 6);
- fattr->f_atime = date_dos2unix(server, date, time);
- date = WVAL(resp_data, 8);
- time = WVAL(resp_data, 10);
- fattr->f_mtime = date_dos2unix(server, date, time);
- VERBOSE("name=%s, date=%x, time=%x, mtime=%ldn",
- mask, date, time, fattr->f_mtime);
- fattr->f_size = DVAL(resp_data, 12);
- /* ULONG allocation size */
- fattr->attr = WVAL(resp_data, 20);
- result = 0;
- out:
- return result;
- }
- /*
- * Note: called with the server locked.
- */
- static int
- smb_proc_getattr_core(struct smb_sb_info *server, struct dentry *dir,
- struct smb_fattr *fattr)
- {
- int result;
- char *p;
- retry:
- p = smb_setup_header(server, SMBgetatr, 0, 0);
- result = smb_simple_encode_path(server, &p, dir, NULL);
- if (result < 0)
- goto out;
- smb_setup_bcc(server, p);
- if ((result = smb_request_ok(server, SMBgetatr, 10, 0)) < 0)
- {
- if (smb_retry(server))
- goto retry;
- goto out;
- }
- fattr->attr = WVAL(server->packet, smb_vwv0);
- fattr->f_mtime = local2utc(server, DVAL(server->packet, smb_vwv1));
- fattr->f_size = DVAL(server->packet, smb_vwv3);
- fattr->f_ctime = fattr->f_mtime;
- fattr->f_atime = fattr->f_mtime;
- #ifdef SMBFS_DEBUG_TIMESTAMP
- printk("getattr_core: %s/%s, mtime=%ldn",
- DENTRY_PATH(dir), fattr->f_mtime);
- #endif
- result = 0;
- out:
- return result;
- }
- /*
- * Note: called with the server locked.
- *
- * Bugs Noted:
- * (1) Win 95 swaps the date and time fields in the standard info level.
- */
- static int
- smb_proc_getattr_trans2(struct smb_sb_info *server, struct dentry *dir,
- struct smb_fattr *attr)
- {
- char *p, *param = server->temp_buf;
- __u16 date, time;
- int off_date = 0, off_time = 2;
- unsigned char *resp_data = NULL;
- unsigned char *resp_param = NULL;
- int resp_data_len = 0;
- int resp_param_len = 0;
- int result;
- retry:
- WSET(param, 0, 1); /* Info level SMB_INFO_STANDARD */
- DSET(param, 2, 0);
- result = smb_encode_path(server, param+6, SMB_MAXPATHLEN+1, dir, NULL);
- if (result < 0)
- goto out;
- p = param + 6 + result;
- result = smb_trans2_request(server, TRANSACT2_QPATHINFO,
- 0, NULL, p - param, param,
- &resp_data_len, &resp_data,
- &resp_param_len, &resp_param);
- if (result < 0)
- {
- if (smb_retry(server))
- goto retry;
- goto out;
- }
- if (server->rcls != 0)
- {
- VERBOSE("for %s: result=%d, rcls=%d, err=%dn",
- ¶m[6], result, server->rcls, server->err);
- result = smb_errno(server);
- goto out;
- }
- result = -ENOENT;
- if (resp_data_len < 22)
- {
- PARANOIA("not enough data for %s, len=%dn",
- ¶m[6], resp_data_len);
- goto out;
- }
- /*
- * Kludge alert: Win 95 swaps the date and time field,
- * contrary to the CIFS docs and Win NT practice.
- */
- if (server->mnt->flags & SMB_MOUNT_WIN95) {
- off_date = 2;
- off_time = 0;
- }
- date = WVAL(resp_data, off_date);
- time = WVAL(resp_data, off_time);
- attr->f_ctime = date_dos2unix(server, date, time);
- date = WVAL(resp_data, 4 + off_date);
- time = WVAL(resp_data, 4 + off_time);
- attr->f_atime = date_dos2unix(server, date, time);
- date = WVAL(resp_data, 8 + off_date);
- time = WVAL(resp_data, 8 + off_time);
- attr->f_mtime = date_dos2unix(server, date, time);
- #ifdef SMBFS_DEBUG_TIMESTAMP
- printk(KERN_DEBUG "getattr_trans2: %s/%s, date=%x, time=%x, mtime=%ldn",
- DENTRY_PATH(dir), date, time, attr->f_mtime);
- #endif
- attr->f_size = DVAL(resp_data, 12);
- attr->attr = WVAL(resp_data, 20);
- result = 0;
- out:
- return result;
- }
- /*
- * Note: called with the server locked
- */
- static int
- smb_proc_do_getattr(struct smb_sb_info *server, struct dentry *dir,
- struct smb_fattr *fattr)
- {
- int result;
- struct inode *inode = dir->d_inode;
- smb_init_dirent(server, fattr);
- /*
- * Select whether to use core or trans2 getattr.
- * Win 95 appears to break with the trans2 getattr.
- */
- if (server->opt.protocol < SMB_PROTOCOL_LANMAN2 ||
- (server->mnt->flags & (SMB_MOUNT_OLDATTR|SMB_MOUNT_WIN95)) ) {
- result = smb_proc_getattr_core(server, dir, fattr);
- } else {
- if (server->mnt->flags & SMB_MOUNT_DIRATTR)
- result = smb_proc_getattr_ff(server, dir, fattr);
- else
- result = smb_proc_getattr_trans2(server, dir, fattr);
- }
- /*
- * None of the getattr versions here can make win9x return the right
- * filesize if there are changes made to an open file.
- * A seek-to-end does return the right size, but we only need to do
- * that on files we have written.
- */
- if (server->mnt->flags & SMB_MOUNT_WIN95 &&
- inode &&
- inode->u.smbfs_i.flags & SMB_F_LOCALWRITE &&
- smb_is_open(inode))
- {
- __u16 fileid = inode->u.smbfs_i.fileid;
- fattr->f_size = smb_proc_seek(server, fileid, 2, 0);
- }
- smb_finish_dirent(server, fattr);
- return result;
- }
- int
- smb_proc_getattr(struct dentry *dir, struct smb_fattr *fattr)
- {
- struct smb_sb_info *server = server_from_dentry(dir);
- int result;
- smb_lock_server(server);
- result = smb_proc_do_getattr(server, dir, fattr);
- smb_unlock_server(server);
- return result;
- }
- /*
- * Called with the server locked. Because of bugs in the
- * core protocol, we use this only to set attributes. See
- * smb_proc_settime() below for timestamp handling.
- *
- * Bugs Noted:
- * (1) If mtime is non-zero, both Win 3.1 and Win 95 fail
- * with an undocumented error (ERRDOS code 50). Setting
- * mtime to 0 allows the attributes to be set.
- * (2) The extra parameters following the name string aren't
- * in the CIFS docs, but seem to be necessary for operation.
- */
- static int
- smb_proc_setattr_core(struct smb_sb_info *server, struct dentry *dentry,
- __u16 attr)
- {
- char *p;
- int result;
- retry:
- p = smb_setup_header(server, SMBsetatr, 8, 0);
- WSET(server->packet, smb_vwv0, attr);
- DSET(server->packet, smb_vwv1, 0); /* mtime */
- WSET(server->packet, smb_vwv3, 0); /* reserved values */
- WSET(server->packet, smb_vwv4, 0);
- WSET(server->packet, smb_vwv5, 0);
- WSET(server->packet, smb_vwv6, 0);
- WSET(server->packet, smb_vwv7, 0);
- result = smb_simple_encode_path(server, &p, dentry, NULL);
- if (result < 0)
- goto out;
- if (p + 2 > (char *)server->packet + server->packet_size) {
- result = -ENAMETOOLONG;
- goto out;
- }
- *p++ = 4;
- *p++ = 0;
- smb_setup_bcc(server, p);
- result = smb_request_ok(server, SMBsetatr, 0, 0);
- if (result < 0) {
- if (smb_retry(server))
- goto retry;
- goto out;
- }
- result = 0;
- out:
- return result;
- }
- /*
- * Because of bugs in the trans2 setattr messages, we must set
- * attributes and timestamps separately. The core SMBsetatr
- * message seems to be the only reliable way to set attributes.
- */
- int
- smb_proc_setattr(struct dentry *dir, struct smb_fattr *fattr)
- {
- struct smb_sb_info *server = server_from_dentry(dir);
- int result;
- VERBOSE("setting %s/%s, open=%dn",
- DENTRY_PATH(dir), smb_is_open(dir->d_inode));
- smb_lock_server(server);
- result = smb_proc_setattr_core(server, dir, fattr->attr);
- smb_unlock_server(server);
- return result;
- }
- /*
- * Called with the server locked. Sets the timestamps for an
- * file open with write permissions.
- */
- static int
- smb_proc_setattr_ext(struct smb_sb_info *server,
- struct inode *inode, struct smb_fattr *fattr)
- {
- __u16 date, time;
- int result;
- retry:
- smb_setup_header(server, SMBsetattrE, 7, 0);
- WSET(server->packet, smb_vwv0, inode->u.smbfs_i.fileid);
- /* We don't change the creation time */
- WSET(server->packet, smb_vwv1, 0);
- WSET(server->packet, smb_vwv2, 0);
- date_unix2dos(server, fattr->f_atime, &date, &time);
- WSET(server->packet, smb_vwv3, date);
- WSET(server->packet, smb_vwv4, time);
- date_unix2dos(server, fattr->f_mtime, &date, &time);
- WSET(server->packet, smb_vwv5, date);
- WSET(server->packet, smb_vwv6, time);
- #ifdef SMBFS_DEBUG_TIMESTAMP
- printk(KERN_DEBUG "smb_proc_setattr_ext: date=%d, time=%d, mtime=%ldn",
- date, time, fattr->f_mtime);
- #endif
- result = smb_request_ok(server, SMBsetattrE, 0, 0);
- if (result < 0) {
- if (smb_retry(server))
- goto retry;
- goto out;
- }
- result = 0;
- out:
- return result;
- }
- /*
- * Note: called with the server locked.
- *
- * Bugs Noted:
- * (1) The TRANSACT2_SETPATHINFO message under Win NT 4.0 doesn't
- * set the file's attribute flags.
- */
- static int
- smb_proc_setattr_trans2(struct smb_sb_info *server,
- struct dentry *dir, struct smb_fattr *fattr)
- {
- __u16 date, time;
- char *p, *param = server->temp_buf;
- unsigned char *resp_data = NULL;
- unsigned char *resp_param = NULL;
- int resp_data_len = 0;
- int resp_param_len = 0;
- int result;
- char data[26];
- retry:
- WSET(param, 0, 1); /* Info level SMB_INFO_STANDARD */
- DSET(param, 2, 0);
- result = smb_encode_path(server, param+6, SMB_MAXPATHLEN+1, dir, NULL);
- if (result < 0)
- goto out;
- p = param + 6 + result;
- WSET(data, 0, 0); /* creation time */
- WSET(data, 2, 0);
- date_unix2dos(server, fattr->f_atime, &date, &time);
- WSET(data, 4, date);
- WSET(data, 6, time);
- date_unix2dos(server, fattr->f_mtime, &date, &time);
- WSET(data, 8, date);
- WSET(data, 10, time);
- #ifdef SMBFS_DEBUG_TIMESTAMP
- printk(KERN_DEBUG "setattr_trans2: %s/%s, date=%x, time=%x, mtime=%ldn",
- DENTRY_PATH(dir), date, time, fattr->f_mtime);
- #endif
- DSET(data, 12, 0); /* size */
- DSET(data, 16, 0); /* blksize */
- WSET(data, 20, 0); /* attr */
- DSET(data, 22, 0); /* ULONG EA size */
- result = smb_trans2_request(server, TRANSACT2_SETPATHINFO,
- 26, data, p - param, param,
- &resp_data_len, &resp_data,
- &resp_param_len, &resp_param);
- if (result < 0)
- {
- if (smb_retry(server))
- goto retry;
- goto out;
- }
- result = 0;
- if (server->rcls != 0)
- result = smb_errno(server);
- out:
- return result;
- }
- /*
- * Set the modify and access timestamps for a file.
- *
- * Incredibly enough, in all of SMB there is no message to allow
- * setting both attributes and timestamps at once.
- *
- * Bugs Noted:
- * (1) Win 95 doesn't support the TRANSACT2_SETFILEINFO message
- * with info level 1 (INFO_STANDARD).
- * (2) Win 95 seems not to support setting directory timestamps.
- * (3) Under the core protocol apparently the only way to set the
- * timestamp is to open and close the file.
- */
- int
- smb_proc_settime(struct dentry *dentry, struct smb_fattr *fattr)
- {
- struct smb_sb_info *server = server_from_dentry(dentry);
- struct inode *inode = dentry->d_inode;
- int result;
- VERBOSE("setting %s/%s, open=%dn",
- DENTRY_PATH(dentry), smb_is_open(inode));
- smb_lock_server(server);
- /* setting the time on a Win95 server fails (tridge) */
- if (server->opt.protocol >= SMB_PROTOCOL_LANMAN2 &&
- !(server->mnt->flags & SMB_MOUNT_WIN95)) {
- if (smb_is_open(inode) &&
- inode->u.smbfs_i.access != SMB_O_RDONLY)
- result = smb_proc_setattr_ext(server, inode, fattr);
- else
- result = smb_proc_setattr_trans2(server, dentry, fattr);
- } else {
- /*
- * Fail silently on directories ... timestamp can't be set?
- */
- result = 0;
- if (S_ISREG(inode->i_mode)) {
- /*
- * Set the mtime by opening and closing the file.
- * Note that the file is opened read-only, but this
- * still allows us to set the date (tridge)
- */
- result = -EACCES;
- if (!smb_is_open(inode))
- smb_proc_open(server, dentry, SMB_O_RDONLY);
- if (smb_is_open(inode)) {
- inode->i_mtime = fattr->f_mtime;
- result = smb_proc_close_inode(server, inode);
- }
- }
- }
- smb_unlock_server(server);
- return result;
- }
- int
- smb_proc_dskattr(struct super_block *sb, struct statfs *attr)
- {
- struct smb_sb_info *server = &(sb->u.smbfs_sb);
- int result;
- char *p;
- long unit;
- smb_lock_server(server);
- retry:
- smb_setup_header(server, SMBdskattr, 0, 0);
- if ((result = smb_request_ok(server, SMBdskattr, 5, 0)) < 0) {
- if (smb_retry(server))
- goto retry;
- goto out;
- }
- p = SMB_VWV(server->packet);
- unit = (WVAL(p, 2) * WVAL(p, 4)) >> SMB_ST_BLKSHIFT;
- attr->f_blocks = WVAL(p, 0) * unit;
- attr->f_bsize = SMB_ST_BLKSIZE;
- attr->f_bavail = attr->f_bfree = WVAL(p, 6) * unit;
- result = 0;
- out:
- smb_unlock_server(server);
- return result;
- }