PageRenderTime 25ms CodeModel.GetById 11ms RepoModel.GetById 0ms app.codeStats 0ms

/fs/cifs/transport.c

https://gitlab.com/LiquidSmooth-Devices/android_kernel_htc_msm8974
C | 865 lines | 684 code | 160 blank | 21 comment | 160 complexity | 912c6688416ea2d6aec2f4b307e7b6eb MD5 | raw file
Possible License(s): GPL-2.0
  1. /*
  2. * fs/cifs/transport.c
  3. *
  4. * Copyright (C) International Business Machines Corp., 2002,2008
  5. * Author(s): Steve French (sfrench@us.ibm.com)
  6. * Jeremy Allison (jra@samba.org) 2006.
  7. *
  8. * This library is free software; you can redistribute it and/or modify
  9. * it under the terms of the GNU Lesser General Public License as published
  10. * by the Free Software Foundation; either version 2.1 of the License, or
  11. * (at your option) any later version.
  12. *
  13. * This library is distributed in the hope that it will be useful,
  14. * but WITHOUT ANY WARRANTY; without even the implied warranty of
  15. * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See
  16. * the GNU Lesser General Public License for more details.
  17. *
  18. * You should have received a copy of the GNU Lesser General Public License
  19. * along with this library; if not, write to the Free Software
  20. * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
  21. */
  22. #include <linux/fs.h>
  23. #include <linux/list.h>
  24. #include <linux/gfp.h>
  25. #include <linux/wait.h>
  26. #include <linux/net.h>
  27. #include <linux/delay.h>
  28. #include <linux/freezer.h>
  29. #include <asm/uaccess.h>
  30. #include <asm/processor.h>
  31. #include <linux/mempool.h>
  32. #include "cifspdu.h"
  33. #include "cifsglob.h"
  34. #include "cifsproto.h"
  35. #include "cifs_debug.h"
  36. extern mempool_t *cifs_mid_poolp;
  37. static void
  38. wake_up_task(struct mid_q_entry *mid)
  39. {
  40. wake_up_process(mid->callback_data);
  41. }
  42. struct mid_q_entry *
  43. AllocMidQEntry(const struct smb_hdr *smb_buffer, struct TCP_Server_Info *server)
  44. {
  45. struct mid_q_entry *temp;
  46. if (server == NULL) {
  47. cERROR(1, "Null TCP session in AllocMidQEntry");
  48. return NULL;
  49. }
  50. temp = mempool_alloc(cifs_mid_poolp, GFP_NOFS);
  51. if (temp == NULL)
  52. return temp;
  53. else {
  54. memset(temp, 0, sizeof(struct mid_q_entry));
  55. temp->mid = smb_buffer->Mid;
  56. temp->pid = current->pid;
  57. temp->command = cpu_to_le16(smb_buffer->Command);
  58. cFYI(1, "For smb_command %d", smb_buffer->Command);
  59. temp->when_alloc = jiffies;
  60. temp->callback = wake_up_task;
  61. temp->callback_data = current;
  62. }
  63. atomic_inc(&midCount);
  64. temp->mid_state = MID_REQUEST_ALLOCATED;
  65. return temp;
  66. }
  67. void
  68. DeleteMidQEntry(struct mid_q_entry *midEntry)
  69. {
  70. #ifdef CONFIG_CIFS_STATS2
  71. unsigned long now;
  72. #endif
  73. midEntry->mid_state = MID_FREE;
  74. atomic_dec(&midCount);
  75. if (midEntry->large_buf)
  76. cifs_buf_release(midEntry->resp_buf);
  77. else
  78. cifs_small_buf_release(midEntry->resp_buf);
  79. #ifdef CONFIG_CIFS_STATS2
  80. now = jiffies;
  81. if ((now - midEntry->when_alloc) > HZ) {
  82. if ((cifsFYI & CIFS_TIMER) &&
  83. (midEntry->command != cpu_to_le16(SMB_COM_LOCKING_ANDX))) {
  84. printk(KERN_DEBUG " CIFS slow rsp: cmd %d mid %llu",
  85. midEntry->command, midEntry->mid);
  86. printk(" A: 0x%lx S: 0x%lx R: 0x%lx\n",
  87. now - midEntry->when_alloc,
  88. now - midEntry->when_sent,
  89. now - midEntry->when_received);
  90. }
  91. }
  92. #endif
  93. mempool_free(midEntry, cifs_mid_poolp);
  94. }
  95. static void
  96. delete_mid(struct mid_q_entry *mid)
  97. {
  98. spin_lock(&GlobalMid_Lock);
  99. list_del(&mid->qhead);
  100. spin_unlock(&GlobalMid_Lock);
  101. DeleteMidQEntry(mid);
  102. }
  103. static int
  104. smb_sendv(struct TCP_Server_Info *server, struct kvec *iov, int n_vec)
  105. {
  106. int rc = 0;
  107. int i = 0;
  108. struct msghdr smb_msg;
  109. __be32 *buf_len = (__be32 *)(iov[0].iov_base);
  110. unsigned int len = iov[0].iov_len;
  111. unsigned int total_len;
  112. int first_vec = 0;
  113. unsigned int smb_buf_length = get_rfc1002_length(iov[0].iov_base);
  114. struct socket *ssocket = server->ssocket;
  115. if (ssocket == NULL)
  116. return -ENOTSOCK;
  117. smb_msg.msg_name = (struct sockaddr *) &server->dstaddr;
  118. smb_msg.msg_namelen = sizeof(struct sockaddr);
  119. smb_msg.msg_control = NULL;
  120. smb_msg.msg_controllen = 0;
  121. if (server->noblocksnd)
  122. smb_msg.msg_flags = MSG_DONTWAIT + MSG_NOSIGNAL;
  123. else
  124. smb_msg.msg_flags = MSG_NOSIGNAL;
  125. total_len = 0;
  126. for (i = 0; i < n_vec; i++)
  127. total_len += iov[i].iov_len;
  128. cFYI(1, "Sending smb: total_len %d", total_len);
  129. dump_smb(iov[0].iov_base, len);
  130. i = 0;
  131. while (total_len) {
  132. rc = kernel_sendmsg(ssocket, &smb_msg, &iov[first_vec],
  133. n_vec - first_vec, total_len);
  134. if ((rc == -ENOSPC) || (rc == -EAGAIN)) {
  135. i++;
  136. if ((i >= 14) || (!server->noblocksnd && (i > 2))) {
  137. cERROR(1, "sends on sock %p stuck for 15 seconds",
  138. ssocket);
  139. rc = -EAGAIN;
  140. break;
  141. }
  142. msleep(1 << i);
  143. continue;
  144. }
  145. if (rc < 0)
  146. break;
  147. if (rc == total_len) {
  148. total_len = 0;
  149. break;
  150. } else if (rc > total_len) {
  151. cERROR(1, "sent %d requested %d", rc, total_len);
  152. break;
  153. }
  154. if (rc == 0) {
  155. cERROR(1, "tcp sent no data");
  156. msleep(500);
  157. continue;
  158. }
  159. total_len -= rc;
  160. for (i = first_vec; i < n_vec; i++) {
  161. if (iov[i].iov_len) {
  162. if (rc > iov[i].iov_len) {
  163. rc -= iov[i].iov_len;
  164. iov[i].iov_len = 0;
  165. } else {
  166. iov[i].iov_base += rc;
  167. iov[i].iov_len -= rc;
  168. first_vec = i;
  169. break;
  170. }
  171. }
  172. }
  173. i = 0;
  174. }
  175. if ((total_len > 0) && (total_len != smb_buf_length + 4)) {
  176. cFYI(1, "partial send (%d remaining), terminating session",
  177. total_len);
  178. server->tcpStatus = CifsNeedReconnect;
  179. }
  180. if (rc < 0 && rc != -EINTR)
  181. cERROR(1, "Error %d sending data on socket to server", rc);
  182. else
  183. rc = 0;
  184. *buf_len = cpu_to_be32(smb_buf_length);
  185. return rc;
  186. }
  187. int
  188. smb_send(struct TCP_Server_Info *server, struct smb_hdr *smb_buffer,
  189. unsigned int smb_buf_length)
  190. {
  191. struct kvec iov;
  192. iov.iov_base = smb_buffer;
  193. iov.iov_len = smb_buf_length + 4;
  194. return smb_sendv(server, &iov, 1);
  195. }
  196. static int
  197. wait_for_free_credits(struct TCP_Server_Info *server, const int optype,
  198. int *credits)
  199. {
  200. int rc;
  201. spin_lock(&server->req_lock);
  202. if (optype == CIFS_ASYNC_OP) {
  203. server->in_flight++;
  204. *credits -= 1;
  205. spin_unlock(&server->req_lock);
  206. return 0;
  207. }
  208. while (1) {
  209. if (*credits <= 0) {
  210. spin_unlock(&server->req_lock);
  211. cifs_num_waiters_inc(server);
  212. rc = wait_event_killable(server->request_q,
  213. has_credits(server, credits));
  214. cifs_num_waiters_dec(server);
  215. if (rc)
  216. return rc;
  217. spin_lock(&server->req_lock);
  218. } else {
  219. if (server->tcpStatus == CifsExiting) {
  220. spin_unlock(&server->req_lock);
  221. return -ENOENT;
  222. }
  223. if (optype != CIFS_BLOCKING_OP) {
  224. *credits -= 1;
  225. server->in_flight++;
  226. }
  227. spin_unlock(&server->req_lock);
  228. break;
  229. }
  230. }
  231. return 0;
  232. }
  233. static int
  234. wait_for_free_request(struct TCP_Server_Info *server, const int optype)
  235. {
  236. return wait_for_free_credits(server, optype, get_credits_field(server));
  237. }
  238. static int allocate_mid(struct cifs_ses *ses, struct smb_hdr *in_buf,
  239. struct mid_q_entry **ppmidQ)
  240. {
  241. if (ses->server->tcpStatus == CifsExiting) {
  242. return -ENOENT;
  243. }
  244. if (ses->server->tcpStatus == CifsNeedReconnect) {
  245. cFYI(1, "tcp session dead - return to caller to retry");
  246. return -EAGAIN;
  247. }
  248. if (ses->status != CifsGood) {
  249. if ((in_buf->Command != SMB_COM_SESSION_SETUP_ANDX) &&
  250. (in_buf->Command != SMB_COM_NEGOTIATE))
  251. return -EAGAIN;
  252. }
  253. *ppmidQ = AllocMidQEntry(in_buf, ses->server);
  254. if (*ppmidQ == NULL)
  255. return -ENOMEM;
  256. spin_lock(&GlobalMid_Lock);
  257. list_add_tail(&(*ppmidQ)->qhead, &ses->server->pending_mid_q);
  258. spin_unlock(&GlobalMid_Lock);
  259. return 0;
  260. }
  261. static int
  262. wait_for_response(struct TCP_Server_Info *server, struct mid_q_entry *midQ)
  263. {
  264. int error;
  265. error = wait_event_freezekillable(server->response_q,
  266. midQ->mid_state != MID_REQUEST_SUBMITTED);
  267. if (error < 0)
  268. return -ERESTARTSYS;
  269. return 0;
  270. }
  271. static int
  272. cifs_setup_async_request(struct TCP_Server_Info *server, struct kvec *iov,
  273. unsigned int nvec, struct mid_q_entry **ret_mid)
  274. {
  275. int rc;
  276. struct smb_hdr *hdr = (struct smb_hdr *)iov[0].iov_base;
  277. struct mid_q_entry *mid;
  278. if (server->sec_mode & (SECMODE_SIGN_REQUIRED | SECMODE_SIGN_ENABLED))
  279. hdr->Flags2 |= SMBFLG2_SECURITY_SIGNATURE;
  280. mid = AllocMidQEntry(hdr, server);
  281. if (mid == NULL)
  282. return -ENOMEM;
  283. spin_lock(&GlobalMid_Lock);
  284. list_add_tail(&mid->qhead, &server->pending_mid_q);
  285. spin_unlock(&GlobalMid_Lock);
  286. rc = cifs_sign_smb2(iov, nvec, server, &mid->sequence_number);
  287. if (rc)
  288. delete_mid(mid);
  289. *ret_mid = mid;
  290. return rc;
  291. }
  292. int
  293. cifs_call_async(struct TCP_Server_Info *server, struct kvec *iov,
  294. unsigned int nvec, mid_receive_t *receive,
  295. mid_callback_t *callback, void *cbdata, bool ignore_pend)
  296. {
  297. int rc;
  298. struct mid_q_entry *mid;
  299. rc = wait_for_free_request(server, ignore_pend ? CIFS_ASYNC_OP : 0);
  300. if (rc)
  301. return rc;
  302. mutex_lock(&server->srv_mutex);
  303. rc = cifs_setup_async_request(server, iov, nvec, &mid);
  304. if (rc) {
  305. mutex_unlock(&server->srv_mutex);
  306. cifs_add_credits(server, 1);
  307. wake_up(&server->request_q);
  308. return rc;
  309. }
  310. mid->receive = receive;
  311. mid->callback = callback;
  312. mid->callback_data = cbdata;
  313. mid->mid_state = MID_REQUEST_SUBMITTED;
  314. cifs_in_send_inc(server);
  315. rc = smb_sendv(server, iov, nvec);
  316. cifs_in_send_dec(server);
  317. cifs_save_when_sent(mid);
  318. mutex_unlock(&server->srv_mutex);
  319. if (rc)
  320. goto out_err;
  321. return rc;
  322. out_err:
  323. delete_mid(mid);
  324. cifs_add_credits(server, 1);
  325. wake_up(&server->request_q);
  326. return rc;
  327. }
  328. int
  329. SendReceiveNoRsp(const unsigned int xid, struct cifs_ses *ses,
  330. char *in_buf, int flags)
  331. {
  332. int rc;
  333. struct kvec iov[1];
  334. int resp_buf_type;
  335. iov[0].iov_base = in_buf;
  336. iov[0].iov_len = get_rfc1002_length(in_buf) + 4;
  337. flags |= CIFS_NO_RESP;
  338. rc = SendReceive2(xid, ses, iov, 1, &resp_buf_type, flags);
  339. cFYI(DBG2, "SendRcvNoRsp flags %d rc %d", flags, rc);
  340. return rc;
  341. }
  342. static int
  343. cifs_sync_mid_result(struct mid_q_entry *mid, struct TCP_Server_Info *server)
  344. {
  345. int rc = 0;
  346. cFYI(1, "%s: cmd=%d mid=%llu state=%d", __func__,
  347. le16_to_cpu(mid->command), mid->mid, mid->mid_state);
  348. spin_lock(&GlobalMid_Lock);
  349. switch (mid->mid_state) {
  350. case MID_RESPONSE_RECEIVED:
  351. spin_unlock(&GlobalMid_Lock);
  352. return rc;
  353. case MID_RETRY_NEEDED:
  354. rc = -EAGAIN;
  355. break;
  356. case MID_RESPONSE_MALFORMED:
  357. rc = -EIO;
  358. break;
  359. case MID_SHUTDOWN:
  360. rc = -EHOSTDOWN;
  361. break;
  362. default:
  363. list_del_init(&mid->qhead);
  364. cERROR(1, "%s: invalid mid state mid=%llu state=%d", __func__,
  365. mid->mid, mid->mid_state);
  366. rc = -EIO;
  367. }
  368. spin_unlock(&GlobalMid_Lock);
  369. DeleteMidQEntry(mid);
  370. return rc;
  371. }
  372. static int
  373. send_nt_cancel(struct TCP_Server_Info *server, struct smb_hdr *in_buf,
  374. struct mid_q_entry *mid)
  375. {
  376. int rc = 0;
  377. in_buf->smb_buf_length = cpu_to_be32(sizeof(struct smb_hdr) - 4 + 2);
  378. in_buf->Command = SMB_COM_NT_CANCEL;
  379. in_buf->WordCount = 0;
  380. put_bcc(0, in_buf);
  381. mutex_lock(&server->srv_mutex);
  382. rc = cifs_sign_smb(in_buf, server, &mid->sequence_number);
  383. if (rc) {
  384. mutex_unlock(&server->srv_mutex);
  385. return rc;
  386. }
  387. rc = smb_send(server, in_buf, be32_to_cpu(in_buf->smb_buf_length));
  388. mutex_unlock(&server->srv_mutex);
  389. cFYI(1, "issued NT_CANCEL for mid %u, rc = %d",
  390. in_buf->Mid, rc);
  391. return rc;
  392. }
  393. int
  394. cifs_check_receive(struct mid_q_entry *mid, struct TCP_Server_Info *server,
  395. bool log_error)
  396. {
  397. unsigned int len = get_rfc1002_length(mid->resp_buf) + 4;
  398. dump_smb(mid->resp_buf, min_t(u32, 92, len));
  399. if (server->sec_mode & (SECMODE_SIGN_REQUIRED | SECMODE_SIGN_ENABLED)) {
  400. struct kvec iov;
  401. iov.iov_base = mid->resp_buf;
  402. iov.iov_len = len;
  403. if (cifs_verify_signature(&iov, 1, server,
  404. mid->sequence_number + 1) != 0)
  405. cERROR(1, "Unexpected SMB signature");
  406. }
  407. return map_smb_to_linux_error(mid->resp_buf, log_error);
  408. }
  409. static int
  410. cifs_setup_request(struct cifs_ses *ses, struct kvec *iov,
  411. unsigned int nvec, struct mid_q_entry **ret_mid)
  412. {
  413. int rc;
  414. struct smb_hdr *hdr = (struct smb_hdr *)iov[0].iov_base;
  415. struct mid_q_entry *mid;
  416. rc = allocate_mid(ses, hdr, &mid);
  417. if (rc)
  418. return rc;
  419. rc = cifs_sign_smb2(iov, nvec, ses->server, &mid->sequence_number);
  420. if (rc)
  421. delete_mid(mid);
  422. *ret_mid = mid;
  423. return rc;
  424. }
  425. int
  426. SendReceive2(const unsigned int xid, struct cifs_ses *ses,
  427. struct kvec *iov, int n_vec, int *pRespBufType ,
  428. const int flags)
  429. {
  430. int rc = 0;
  431. int long_op;
  432. struct mid_q_entry *midQ;
  433. char *buf = iov[0].iov_base;
  434. long_op = flags & CIFS_TIMEOUT_MASK;
  435. *pRespBufType = CIFS_NO_BUFFER;
  436. if ((ses == NULL) || (ses->server == NULL)) {
  437. cifs_small_buf_release(buf);
  438. cERROR(1, "Null session");
  439. return -EIO;
  440. }
  441. if (ses->server->tcpStatus == CifsExiting) {
  442. cifs_small_buf_release(buf);
  443. return -ENOENT;
  444. }
  445. rc = wait_for_free_request(ses->server, long_op);
  446. if (rc) {
  447. cifs_small_buf_release(buf);
  448. return rc;
  449. }
  450. mutex_lock(&ses->server->srv_mutex);
  451. rc = cifs_setup_request(ses, iov, n_vec, &midQ);
  452. if (rc) {
  453. mutex_unlock(&ses->server->srv_mutex);
  454. cifs_small_buf_release(buf);
  455. cifs_add_credits(ses->server, 1);
  456. return rc;
  457. }
  458. midQ->mid_state = MID_REQUEST_SUBMITTED;
  459. cifs_in_send_inc(ses->server);
  460. rc = smb_sendv(ses->server, iov, n_vec);
  461. cifs_in_send_dec(ses->server);
  462. cifs_save_when_sent(midQ);
  463. mutex_unlock(&ses->server->srv_mutex);
  464. if (rc < 0) {
  465. cifs_small_buf_release(buf);
  466. goto out;
  467. }
  468. if (long_op == CIFS_ASYNC_OP) {
  469. cifs_small_buf_release(buf);
  470. goto out;
  471. }
  472. rc = wait_for_response(ses->server, midQ);
  473. if (rc != 0) {
  474. send_nt_cancel(ses->server, (struct smb_hdr *)buf, midQ);
  475. spin_lock(&GlobalMid_Lock);
  476. if (midQ->mid_state == MID_REQUEST_SUBMITTED) {
  477. midQ->callback = DeleteMidQEntry;
  478. spin_unlock(&GlobalMid_Lock);
  479. cifs_small_buf_release(buf);
  480. cifs_add_credits(ses->server, 1);
  481. return rc;
  482. }
  483. spin_unlock(&GlobalMid_Lock);
  484. }
  485. cifs_small_buf_release(buf);
  486. rc = cifs_sync_mid_result(midQ, ses->server);
  487. if (rc != 0) {
  488. cifs_add_credits(ses->server, 1);
  489. return rc;
  490. }
  491. if (!midQ->resp_buf || midQ->mid_state != MID_RESPONSE_RECEIVED) {
  492. rc = -EIO;
  493. cFYI(1, "Bad MID state?");
  494. goto out;
  495. }
  496. buf = (char *)midQ->resp_buf;
  497. iov[0].iov_base = buf;
  498. iov[0].iov_len = get_rfc1002_length(buf) + 4;
  499. if (midQ->large_buf)
  500. *pRespBufType = CIFS_LARGE_BUFFER;
  501. else
  502. *pRespBufType = CIFS_SMALL_BUFFER;
  503. rc = cifs_check_receive(midQ, ses->server, flags & CIFS_LOG_ERROR);
  504. if ((flags & CIFS_NO_RESP) == 0)
  505. midQ->resp_buf = NULL;
  506. out:
  507. delete_mid(midQ);
  508. cifs_add_credits(ses->server, 1);
  509. return rc;
  510. }
  511. int
  512. SendReceive(const unsigned int xid, struct cifs_ses *ses,
  513. struct smb_hdr *in_buf, struct smb_hdr *out_buf,
  514. int *pbytes_returned, const int long_op)
  515. {
  516. int rc = 0;
  517. struct mid_q_entry *midQ;
  518. if (ses == NULL) {
  519. cERROR(1, "Null smb session");
  520. return -EIO;
  521. }
  522. if (ses->server == NULL) {
  523. cERROR(1, "Null tcp session");
  524. return -EIO;
  525. }
  526. if (ses->server->tcpStatus == CifsExiting)
  527. return -ENOENT;
  528. if (be32_to_cpu(in_buf->smb_buf_length) > CIFSMaxBufSize +
  529. MAX_CIFS_HDR_SIZE - 4) {
  530. cERROR(1, "Illegal length, greater than maximum frame, %d",
  531. be32_to_cpu(in_buf->smb_buf_length));
  532. return -EIO;
  533. }
  534. rc = wait_for_free_request(ses->server, long_op);
  535. if (rc)
  536. return rc;
  537. mutex_lock(&ses->server->srv_mutex);
  538. rc = allocate_mid(ses, in_buf, &midQ);
  539. if (rc) {
  540. mutex_unlock(&ses->server->srv_mutex);
  541. cifs_add_credits(ses->server, 1);
  542. return rc;
  543. }
  544. rc = cifs_sign_smb(in_buf, ses->server, &midQ->sequence_number);
  545. if (rc) {
  546. mutex_unlock(&ses->server->srv_mutex);
  547. goto out;
  548. }
  549. midQ->mid_state = MID_REQUEST_SUBMITTED;
  550. cifs_in_send_inc(ses->server);
  551. rc = smb_send(ses->server, in_buf, be32_to_cpu(in_buf->smb_buf_length));
  552. cifs_in_send_dec(ses->server);
  553. cifs_save_when_sent(midQ);
  554. mutex_unlock(&ses->server->srv_mutex);
  555. if (rc < 0)
  556. goto out;
  557. if (long_op == CIFS_ASYNC_OP)
  558. goto out;
  559. rc = wait_for_response(ses->server, midQ);
  560. if (rc != 0) {
  561. send_nt_cancel(ses->server, in_buf, midQ);
  562. spin_lock(&GlobalMid_Lock);
  563. if (midQ->mid_state == MID_REQUEST_SUBMITTED) {
  564. midQ->callback = DeleteMidQEntry;
  565. spin_unlock(&GlobalMid_Lock);
  566. cifs_add_credits(ses->server, 1);
  567. return rc;
  568. }
  569. spin_unlock(&GlobalMid_Lock);
  570. }
  571. rc = cifs_sync_mid_result(midQ, ses->server);
  572. if (rc != 0) {
  573. cifs_add_credits(ses->server, 1);
  574. return rc;
  575. }
  576. if (!midQ->resp_buf || !out_buf ||
  577. midQ->mid_state != MID_RESPONSE_RECEIVED) {
  578. rc = -EIO;
  579. cERROR(1, "Bad MID state?");
  580. goto out;
  581. }
  582. *pbytes_returned = get_rfc1002_length(midQ->resp_buf);
  583. memcpy(out_buf, midQ->resp_buf, *pbytes_returned + 4);
  584. rc = cifs_check_receive(midQ, ses->server, 0);
  585. out:
  586. delete_mid(midQ);
  587. cifs_add_credits(ses->server, 1);
  588. return rc;
  589. }
  590. static int
  591. send_lock_cancel(const unsigned int xid, struct cifs_tcon *tcon,
  592. struct smb_hdr *in_buf,
  593. struct smb_hdr *out_buf)
  594. {
  595. int bytes_returned;
  596. struct cifs_ses *ses = tcon->ses;
  597. LOCK_REQ *pSMB = (LOCK_REQ *)in_buf;
  598. pSMB->LockType = LOCKING_ANDX_CANCEL_LOCK|LOCKING_ANDX_LARGE_FILES;
  599. pSMB->Timeout = 0;
  600. pSMB->hdr.Mid = GetNextMid(ses->server);
  601. return SendReceive(xid, ses, in_buf, out_buf,
  602. &bytes_returned, 0);
  603. }
  604. int
  605. SendReceiveBlockingLock(const unsigned int xid, struct cifs_tcon *tcon,
  606. struct smb_hdr *in_buf, struct smb_hdr *out_buf,
  607. int *pbytes_returned)
  608. {
  609. int rc = 0;
  610. int rstart = 0;
  611. struct mid_q_entry *midQ;
  612. struct cifs_ses *ses;
  613. if (tcon == NULL || tcon->ses == NULL) {
  614. cERROR(1, "Null smb session");
  615. return -EIO;
  616. }
  617. ses = tcon->ses;
  618. if (ses->server == NULL) {
  619. cERROR(1, "Null tcp session");
  620. return -EIO;
  621. }
  622. if (ses->server->tcpStatus == CifsExiting)
  623. return -ENOENT;
  624. if (be32_to_cpu(in_buf->smb_buf_length) > CIFSMaxBufSize +
  625. MAX_CIFS_HDR_SIZE - 4) {
  626. cERROR(1, "Illegal length, greater than maximum frame, %d",
  627. be32_to_cpu(in_buf->smb_buf_length));
  628. return -EIO;
  629. }
  630. rc = wait_for_free_request(ses->server, CIFS_BLOCKING_OP);
  631. if (rc)
  632. return rc;
  633. mutex_lock(&ses->server->srv_mutex);
  634. rc = allocate_mid(ses, in_buf, &midQ);
  635. if (rc) {
  636. mutex_unlock(&ses->server->srv_mutex);
  637. return rc;
  638. }
  639. rc = cifs_sign_smb(in_buf, ses->server, &midQ->sequence_number);
  640. if (rc) {
  641. delete_mid(midQ);
  642. mutex_unlock(&ses->server->srv_mutex);
  643. return rc;
  644. }
  645. midQ->mid_state = MID_REQUEST_SUBMITTED;
  646. cifs_in_send_inc(ses->server);
  647. rc = smb_send(ses->server, in_buf, be32_to_cpu(in_buf->smb_buf_length));
  648. cifs_in_send_dec(ses->server);
  649. cifs_save_when_sent(midQ);
  650. mutex_unlock(&ses->server->srv_mutex);
  651. if (rc < 0) {
  652. delete_mid(midQ);
  653. return rc;
  654. }
  655. rc = wait_event_interruptible(ses->server->response_q,
  656. (!(midQ->mid_state == MID_REQUEST_SUBMITTED)) ||
  657. ((ses->server->tcpStatus != CifsGood) &&
  658. (ses->server->tcpStatus != CifsNew)));
  659. if ((rc == -ERESTARTSYS) &&
  660. (midQ->mid_state == MID_REQUEST_SUBMITTED) &&
  661. ((ses->server->tcpStatus == CifsGood) ||
  662. (ses->server->tcpStatus == CifsNew))) {
  663. if (in_buf->Command == SMB_COM_TRANSACTION2) {
  664. rc = send_nt_cancel(ses->server, in_buf, midQ);
  665. if (rc) {
  666. delete_mid(midQ);
  667. return rc;
  668. }
  669. } else {
  670. rc = send_lock_cancel(xid, tcon, in_buf, out_buf);
  671. if (rc && rc != -ENOLCK) {
  672. delete_mid(midQ);
  673. return rc;
  674. }
  675. }
  676. rc = wait_for_response(ses->server, midQ);
  677. if (rc) {
  678. send_nt_cancel(ses->server, in_buf, midQ);
  679. spin_lock(&GlobalMid_Lock);
  680. if (midQ->mid_state == MID_REQUEST_SUBMITTED) {
  681. midQ->callback = DeleteMidQEntry;
  682. spin_unlock(&GlobalMid_Lock);
  683. return rc;
  684. }
  685. spin_unlock(&GlobalMid_Lock);
  686. }
  687. rstart = 1;
  688. }
  689. rc = cifs_sync_mid_result(midQ, ses->server);
  690. if (rc != 0)
  691. return rc;
  692. if (out_buf == NULL || midQ->mid_state != MID_RESPONSE_RECEIVED) {
  693. rc = -EIO;
  694. cERROR(1, "Bad MID state?");
  695. goto out;
  696. }
  697. *pbytes_returned = get_rfc1002_length(midQ->resp_buf);
  698. memcpy(out_buf, midQ->resp_buf, *pbytes_returned + 4);
  699. rc = cifs_check_receive(midQ, ses->server, 0);
  700. out:
  701. delete_mid(midQ);
  702. if (rstart && rc == -EACCES)
  703. return -ERESTARTSYS;
  704. return rc;
  705. }