smb1ops.c 32 KB

12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667686970717273747576777879808182838485868788899091929394959697989910010110210310410510610710810911011111211311411511611711811912012112212312412512612712812913013113213313413513613713813914014114214314414514614714814915015115215315415515615715815916016116216316416516616716816917017117217317417517617717817918018118218318418518618718818919019119219319419519619719819920020120220320420520620720820921021121221321421521621721821922022122222322422522622722822923023123223323423523623723823924024124224324424524624724824925025125225325425525625725825926026126226326426526626726826927027127227327427527627727827928028128228328428528628728828929029129229329429529629729829930030130230330430530630730830931031131231331431531631731831932032132232332432532632732832933033133233333433533633733833934034134234334434534634734834935035135235335435535635735835936036136236336436536636736836937037137237337437537637737837938038138238338438538638738838939039139239339439539639739839940040140240340440540640740840941041141241341441541641741841942042142242342442542642742842943043143243343443543643743843944044144244344444544644744844945045145245345445545645745845946046146246346446546646746846947047147247347447547647747847948048148248348448548648748848949049149249349449549649749849950050150250350450550650750850951051151251351451551651751851952052152252352452552652752852953053153253353453553653753853954054154254354454554654754854955055155255355455555655755855956056156256356456556656756856957057157257357457557657757857958058158258358458558658758858959059159259359459559659759859960060160260360460560660760860961061161261361461561661761861962062162262362462562662762862963063163263363463563663763863964064164264364464564664764864965065165265365465565665765865966066166266366466566666766866967067167267367467567667767867968068168268368468568668768868969069169269369469569669769869970070170270370470570670770870971071171271371471571671771871972072172272372472572672772872973073173273373473573673773873974074174274374474574674774874975075175275375475575675775875976076176276376476576676776876977077177277377477577677777877978078178278378478578678778878979079179279379479579679779879980080180280380480580680780880981081181281381481581681781881982082182282382482582682782882983083183283383483583683783883984084184284384484584684784884985085185285385485585685785885986086186286386486586686786886987087187287387487587687787887988088188288388488588688788888989089189289389489589689789889990090190290390490590690790890991091191291391491591691791891992092192292392492592692792892993093193293393493593693793893994094194294394494594694794894995095195295395495595695795895996096196296396496596696796896997097197297397497597697797897998098198298398498598698798898999099199299399499599699799899910001001100210031004100510061007100810091010101110121013101410151016101710181019102010211022102310241025102610271028102910301031103210331034103510361037103810391040104110421043104410451046104710481049105010511052105310541055105610571058105910601061106210631064106510661067106810691070107110721073107410751076107710781079108010811082108310841085108610871088108910901091109210931094109510961097109810991100110111021103110411051106110711081109111011111112111311141115111611171118111911201121112211231124112511261127112811291130113111321133
  1. /*
  2. * SMB1 (CIFS) version specific operations
  3. *
  4. * Copyright (c) 2012, Jeff Layton <jlayton@redhat.com>
  5. *
  6. * This library is free software; you can redistribute it and/or modify
  7. * it under the terms of the GNU General Public License v2 as published
  8. * by the Free Software Foundation.
  9. *
  10. * This library is distributed in the hope that it will be useful,
  11. * but WITHOUT ANY WARRANTY; without even the implied warranty of
  12. * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See
  13. * the GNU Lesser General Public License for more details.
  14. *
  15. * You should have received a copy of the GNU Lesser General Public License
  16. * along with this library; if not, write to the Free Software
  17. * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
  18. */
  19. #include <linux/pagemap.h>
  20. #include <linux/vfs.h>
  21. #include "cifsglob.h"
  22. #include "cifsproto.h"
  23. #include "cifs_debug.h"
  24. #include "cifspdu.h"
  25. #include "cifs_unicode.h"
  26. /*
  27. * An NT cancel request header looks just like the original request except:
  28. *
  29. * The Command is SMB_COM_NT_CANCEL
  30. * The WordCount is zeroed out
  31. * The ByteCount is zeroed out
  32. *
  33. * This function mangles an existing request buffer into a
  34. * SMB_COM_NT_CANCEL request and then sends it.
  35. */
  36. static int
  37. send_nt_cancel(struct TCP_Server_Info *server, struct smb_rqst *rqst,
  38. struct mid_q_entry *mid)
  39. {
  40. int rc = 0;
  41. struct smb_hdr *in_buf = (struct smb_hdr *)rqst->rq_iov[0].iov_base;
  42. /* -4 for RFC1001 length and +2 for BCC field */
  43. in_buf->smb_buf_length = cpu_to_be32(sizeof(struct smb_hdr) - 4 + 2);
  44. in_buf->Command = SMB_COM_NT_CANCEL;
  45. in_buf->WordCount = 0;
  46. put_bcc(0, in_buf);
  47. mutex_lock(&server->srv_mutex);
  48. rc = cifs_sign_smb(in_buf, server, &mid->sequence_number);
  49. if (rc) {
  50. mutex_unlock(&server->srv_mutex);
  51. return rc;
  52. }
  53. /*
  54. * The response to this call was already factored into the sequence
  55. * number when the call went out, so we must adjust it back downward
  56. * after signing here.
  57. */
  58. --server->sequence_number;
  59. rc = smb_send(server, in_buf, be32_to_cpu(in_buf->smb_buf_length));
  60. if (rc < 0)
  61. server->sequence_number--;
  62. mutex_unlock(&server->srv_mutex);
  63. cifs_dbg(FYI, "issued NT_CANCEL for mid %u, rc = %d\n",
  64. get_mid(in_buf), rc);
  65. return rc;
  66. }
  67. static bool
  68. cifs_compare_fids(struct cifsFileInfo *ob1, struct cifsFileInfo *ob2)
  69. {
  70. return ob1->fid.netfid == ob2->fid.netfid;
  71. }
  72. static unsigned int
  73. cifs_read_data_offset(char *buf)
  74. {
  75. READ_RSP *rsp = (READ_RSP *)buf;
  76. return le16_to_cpu(rsp->DataOffset);
  77. }
  78. static unsigned int
  79. cifs_read_data_length(char *buf, bool in_remaining)
  80. {
  81. READ_RSP *rsp = (READ_RSP *)buf;
  82. /* It's a bug reading remaining data for SMB1 packets */
  83. WARN_ON(in_remaining);
  84. return (le16_to_cpu(rsp->DataLengthHigh) << 16) +
  85. le16_to_cpu(rsp->DataLength);
  86. }
  87. static struct mid_q_entry *
  88. cifs_find_mid(struct TCP_Server_Info *server, char *buffer)
  89. {
  90. struct smb_hdr *buf = (struct smb_hdr *)buffer;
  91. struct mid_q_entry *mid;
  92. spin_lock(&GlobalMid_Lock);
  93. list_for_each_entry(mid, &server->pending_mid_q, qhead) {
  94. if (compare_mid(mid->mid, buf) &&
  95. mid->mid_state == MID_REQUEST_SUBMITTED &&
  96. le16_to_cpu(mid->command) == buf->Command) {
  97. kref_get(&mid->refcount);
  98. spin_unlock(&GlobalMid_Lock);
  99. return mid;
  100. }
  101. }
  102. spin_unlock(&GlobalMid_Lock);
  103. return NULL;
  104. }
  105. static void
  106. cifs_add_credits(struct TCP_Server_Info *server, const unsigned int add,
  107. const int optype)
  108. {
  109. spin_lock(&server->req_lock);
  110. server->credits += add;
  111. server->in_flight--;
  112. spin_unlock(&server->req_lock);
  113. wake_up(&server->request_q);
  114. }
  115. static void
  116. cifs_set_credits(struct TCP_Server_Info *server, const int val)
  117. {
  118. spin_lock(&server->req_lock);
  119. server->credits = val;
  120. server->oplocks = val > 1 ? enable_oplocks : false;
  121. spin_unlock(&server->req_lock);
  122. }
  123. static int *
  124. cifs_get_credits_field(struct TCP_Server_Info *server, const int optype)
  125. {
  126. return &server->credits;
  127. }
  128. static unsigned int
  129. cifs_get_credits(struct mid_q_entry *mid)
  130. {
  131. return 1;
  132. }
  133. /*
  134. * Find a free multiplex id (SMB mid). Otherwise there could be
  135. * mid collisions which might cause problems, demultiplexing the
  136. * wrong response to this request. Multiplex ids could collide if
  137. * one of a series requests takes much longer than the others, or
  138. * if a very large number of long lived requests (byte range
  139. * locks or FindNotify requests) are pending. No more than
  140. * 64K-1 requests can be outstanding at one time. If no
  141. * mids are available, return zero. A future optimization
  142. * could make the combination of mids and uid the key we use
  143. * to demultiplex on (rather than mid alone).
  144. * In addition to the above check, the cifs demultiplex
  145. * code already used the command code as a secondary
  146. * check of the frame and if signing is negotiated the
  147. * response would be discarded if the mid were the same
  148. * but the signature was wrong. Since the mid is not put in the
  149. * pending queue until later (when it is about to be dispatched)
  150. * we do have to limit the number of outstanding requests
  151. * to somewhat less than 64K-1 although it is hard to imagine
  152. * so many threads being in the vfs at one time.
  153. */
  154. static __u64
  155. cifs_get_next_mid(struct TCP_Server_Info *server)
  156. {
  157. __u64 mid = 0;
  158. __u16 last_mid, cur_mid;
  159. bool collision;
  160. spin_lock(&GlobalMid_Lock);
  161. /* mid is 16 bit only for CIFS/SMB */
  162. cur_mid = (__u16)((server->CurrentMid) & 0xffff);
  163. /* we do not want to loop forever */
  164. last_mid = cur_mid;
  165. cur_mid++;
  166. /* avoid 0xFFFF MID */
  167. if (cur_mid == 0xffff)
  168. cur_mid++;
  169. /*
  170. * This nested loop looks more expensive than it is.
  171. * In practice the list of pending requests is short,
  172. * fewer than 50, and the mids are likely to be unique
  173. * on the first pass through the loop unless some request
  174. * takes longer than the 64 thousand requests before it
  175. * (and it would also have to have been a request that
  176. * did not time out).
  177. */
  178. while (cur_mid != last_mid) {
  179. struct mid_q_entry *mid_entry;
  180. unsigned int num_mids;
  181. collision = false;
  182. if (cur_mid == 0)
  183. cur_mid++;
  184. num_mids = 0;
  185. list_for_each_entry(mid_entry, &server->pending_mid_q, qhead) {
  186. ++num_mids;
  187. if (mid_entry->mid == cur_mid &&
  188. mid_entry->mid_state == MID_REQUEST_SUBMITTED) {
  189. /* This mid is in use, try a different one */
  190. collision = true;
  191. break;
  192. }
  193. }
  194. /*
  195. * if we have more than 32k mids in the list, then something
  196. * is very wrong. Possibly a local user is trying to DoS the
  197. * box by issuing long-running calls and SIGKILL'ing them. If
  198. * we get to 2^16 mids then we're in big trouble as this
  199. * function could loop forever.
  200. *
  201. * Go ahead and assign out the mid in this situation, but force
  202. * an eventual reconnect to clean out the pending_mid_q.
  203. */
  204. if (num_mids > 32768)
  205. server->tcpStatus = CifsNeedReconnect;
  206. if (!collision) {
  207. mid = (__u64)cur_mid;
  208. server->CurrentMid = mid;
  209. break;
  210. }
  211. cur_mid++;
  212. }
  213. spin_unlock(&GlobalMid_Lock);
  214. return mid;
  215. }
  216. /*
  217. return codes:
  218. 0 not a transact2, or all data present
  219. >0 transact2 with that much data missing
  220. -EINVAL invalid transact2
  221. */
  222. static int
  223. check2ndT2(char *buf)
  224. {
  225. struct smb_hdr *pSMB = (struct smb_hdr *)buf;
  226. struct smb_t2_rsp *pSMBt;
  227. int remaining;
  228. __u16 total_data_size, data_in_this_rsp;
  229. if (pSMB->Command != SMB_COM_TRANSACTION2)
  230. return 0;
  231. /* check for plausible wct, bcc and t2 data and parm sizes */
  232. /* check for parm and data offset going beyond end of smb */
  233. if (pSMB->WordCount != 10) { /* coalesce_t2 depends on this */
  234. cifs_dbg(FYI, "invalid transact2 word count\n");
  235. return -EINVAL;
  236. }
  237. pSMBt = (struct smb_t2_rsp *)pSMB;
  238. total_data_size = get_unaligned_le16(&pSMBt->t2_rsp.TotalDataCount);
  239. data_in_this_rsp = get_unaligned_le16(&pSMBt->t2_rsp.DataCount);
  240. if (total_data_size == data_in_this_rsp)
  241. return 0;
  242. else if (total_data_size < data_in_this_rsp) {
  243. cifs_dbg(FYI, "total data %d smaller than data in frame %d\n",
  244. total_data_size, data_in_this_rsp);
  245. return -EINVAL;
  246. }
  247. remaining = total_data_size - data_in_this_rsp;
  248. cifs_dbg(FYI, "missing %d bytes from transact2, check next response\n",
  249. remaining);
  250. if (total_data_size > CIFSMaxBufSize) {
  251. cifs_dbg(VFS, "TotalDataSize %d is over maximum buffer %d\n",
  252. total_data_size, CIFSMaxBufSize);
  253. return -EINVAL;
  254. }
  255. return remaining;
  256. }
  257. static int
  258. coalesce_t2(char *second_buf, struct smb_hdr *target_hdr)
  259. {
  260. struct smb_t2_rsp *pSMBs = (struct smb_t2_rsp *)second_buf;
  261. struct smb_t2_rsp *pSMBt = (struct smb_t2_rsp *)target_hdr;
  262. char *data_area_of_tgt;
  263. char *data_area_of_src;
  264. int remaining;
  265. unsigned int byte_count, total_in_tgt;
  266. __u16 tgt_total_cnt, src_total_cnt, total_in_src;
  267. src_total_cnt = get_unaligned_le16(&pSMBs->t2_rsp.TotalDataCount);
  268. tgt_total_cnt = get_unaligned_le16(&pSMBt->t2_rsp.TotalDataCount);
  269. if (tgt_total_cnt != src_total_cnt)
  270. cifs_dbg(FYI, "total data count of primary and secondary t2 differ source=%hu target=%hu\n",
  271. src_total_cnt, tgt_total_cnt);
  272. total_in_tgt = get_unaligned_le16(&pSMBt->t2_rsp.DataCount);
  273. remaining = tgt_total_cnt - total_in_tgt;
  274. if (remaining < 0) {
  275. cifs_dbg(FYI, "Server sent too much data. tgt_total_cnt=%hu total_in_tgt=%u\n",
  276. tgt_total_cnt, total_in_tgt);
  277. return -EPROTO;
  278. }
  279. if (remaining == 0) {
  280. /* nothing to do, ignore */
  281. cifs_dbg(FYI, "no more data remains\n");
  282. return 0;
  283. }
  284. total_in_src = get_unaligned_le16(&pSMBs->t2_rsp.DataCount);
  285. if (remaining < total_in_src)
  286. cifs_dbg(FYI, "transact2 2nd response contains too much data\n");
  287. /* find end of first SMB data area */
  288. data_area_of_tgt = (char *)&pSMBt->hdr.Protocol +
  289. get_unaligned_le16(&pSMBt->t2_rsp.DataOffset);
  290. /* validate target area */
  291. data_area_of_src = (char *)&pSMBs->hdr.Protocol +
  292. get_unaligned_le16(&pSMBs->t2_rsp.DataOffset);
  293. data_area_of_tgt += total_in_tgt;
  294. total_in_tgt += total_in_src;
  295. /* is the result too big for the field? */
  296. if (total_in_tgt > USHRT_MAX) {
  297. cifs_dbg(FYI, "coalesced DataCount too large (%u)\n",
  298. total_in_tgt);
  299. return -EPROTO;
  300. }
  301. put_unaligned_le16(total_in_tgt, &pSMBt->t2_rsp.DataCount);
  302. /* fix up the BCC */
  303. byte_count = get_bcc(target_hdr);
  304. byte_count += total_in_src;
  305. /* is the result too big for the field? */
  306. if (byte_count > USHRT_MAX) {
  307. cifs_dbg(FYI, "coalesced BCC too large (%u)\n", byte_count);
  308. return -EPROTO;
  309. }
  310. put_bcc(byte_count, target_hdr);
  311. byte_count = be32_to_cpu(target_hdr->smb_buf_length);
  312. byte_count += total_in_src;
  313. /* don't allow buffer to overflow */
  314. if (byte_count > CIFSMaxBufSize + MAX_CIFS_HDR_SIZE - 4) {
  315. cifs_dbg(FYI, "coalesced BCC exceeds buffer size (%u)\n",
  316. byte_count);
  317. return -ENOBUFS;
  318. }
  319. target_hdr->smb_buf_length = cpu_to_be32(byte_count);
  320. /* copy second buffer into end of first buffer */
  321. memcpy(data_area_of_tgt, data_area_of_src, total_in_src);
  322. if (remaining != total_in_src) {
  323. /* more responses to go */
  324. cifs_dbg(FYI, "waiting for more secondary responses\n");
  325. return 1;
  326. }
  327. /* we are done */
  328. cifs_dbg(FYI, "found the last secondary response\n");
  329. return 0;
  330. }
  331. static void
  332. cifs_downgrade_oplock(struct TCP_Server_Info *server,
  333. struct cifsInodeInfo *cinode, __u32 oplock,
  334. unsigned int epoch, bool *purge_cache)
  335. {
  336. cifs_set_oplock_level(cinode, oplock);
  337. }
  338. static bool
  339. cifs_check_trans2(struct mid_q_entry *mid, struct TCP_Server_Info *server,
  340. char *buf, int malformed)
  341. {
  342. if (malformed)
  343. return false;
  344. if (check2ndT2(buf) <= 0)
  345. return false;
  346. mid->multiRsp = true;
  347. if (mid->resp_buf) {
  348. /* merge response - fix up 1st*/
  349. malformed = coalesce_t2(buf, mid->resp_buf);
  350. if (malformed > 0)
  351. return true;
  352. /* All parts received or packet is malformed. */
  353. mid->multiEnd = true;
  354. dequeue_mid(mid, malformed);
  355. return true;
  356. }
  357. if (!server->large_buf) {
  358. /*FIXME: switch to already allocated largebuf?*/
  359. cifs_dbg(VFS, "1st trans2 resp needs bigbuf\n");
  360. } else {
  361. /* Have first buffer */
  362. mid->resp_buf = buf;
  363. mid->large_buf = true;
  364. server->bigbuf = NULL;
  365. }
  366. return true;
  367. }
  368. static bool
  369. cifs_need_neg(struct TCP_Server_Info *server)
  370. {
  371. return server->maxBuf == 0;
  372. }
  373. static int
  374. cifs_negotiate(const unsigned int xid, struct cifs_ses *ses)
  375. {
  376. int rc;
  377. rc = CIFSSMBNegotiate(xid, ses);
  378. if (rc == -EAGAIN) {
  379. /* retry only once on 1st time connection */
  380. set_credits(ses->server, 1);
  381. rc = CIFSSMBNegotiate(xid, ses);
  382. if (rc == -EAGAIN)
  383. rc = -EHOSTDOWN;
  384. }
  385. return rc;
  386. }
  387. static unsigned int
  388. cifs_negotiate_wsize(struct cifs_tcon *tcon, struct smb_vol *volume_info)
  389. {
  390. __u64 unix_cap = le64_to_cpu(tcon->fsUnixInfo.Capability);
  391. struct TCP_Server_Info *server = tcon->ses->server;
  392. unsigned int wsize;
  393. /* start with specified wsize, or default */
  394. if (volume_info->wsize)
  395. wsize = volume_info->wsize;
  396. else if (tcon->unix_ext && (unix_cap & CIFS_UNIX_LARGE_WRITE_CAP))
  397. wsize = CIFS_DEFAULT_IOSIZE;
  398. else
  399. wsize = CIFS_DEFAULT_NON_POSIX_WSIZE;
  400. /* can server support 24-bit write sizes? (via UNIX extensions) */
  401. if (!tcon->unix_ext || !(unix_cap & CIFS_UNIX_LARGE_WRITE_CAP))
  402. wsize = min_t(unsigned int, wsize, CIFS_MAX_RFC1002_WSIZE);
  403. /*
  404. * no CAP_LARGE_WRITE_X or is signing enabled without CAP_UNIX set?
  405. * Limit it to max buffer offered by the server, minus the size of the
  406. * WRITEX header, not including the 4 byte RFC1001 length.
  407. */
  408. if (!(server->capabilities & CAP_LARGE_WRITE_X) ||
  409. (!(server->capabilities & CAP_UNIX) && server->sign))
  410. wsize = min_t(unsigned int, wsize,
  411. server->maxBuf - sizeof(WRITE_REQ) + 4);
  412. /* hard limit of CIFS_MAX_WSIZE */
  413. wsize = min_t(unsigned int, wsize, CIFS_MAX_WSIZE);
  414. return wsize;
  415. }
  416. static unsigned int
  417. cifs_negotiate_rsize(struct cifs_tcon *tcon, struct smb_vol *volume_info)
  418. {
  419. __u64 unix_cap = le64_to_cpu(tcon->fsUnixInfo.Capability);
  420. struct TCP_Server_Info *server = tcon->ses->server;
  421. unsigned int rsize, defsize;
  422. /*
  423. * Set default value...
  424. *
  425. * HACK alert! Ancient servers have very small buffers. Even though
  426. * MS-CIFS indicates that servers are only limited by the client's
  427. * bufsize for reads, testing against win98se shows that it throws
  428. * INVALID_PARAMETER errors if you try to request too large a read.
  429. * OS/2 just sends back short reads.
  430. *
  431. * If the server doesn't advertise CAP_LARGE_READ_X, then assume that
  432. * it can't handle a read request larger than its MaxBufferSize either.
  433. */
  434. if (tcon->unix_ext && (unix_cap & CIFS_UNIX_LARGE_READ_CAP))
  435. defsize = CIFS_DEFAULT_IOSIZE;
  436. else if (server->capabilities & CAP_LARGE_READ_X)
  437. defsize = CIFS_DEFAULT_NON_POSIX_RSIZE;
  438. else
  439. defsize = server->maxBuf - sizeof(READ_RSP);
  440. rsize = volume_info->rsize ? volume_info->rsize : defsize;
  441. /*
  442. * no CAP_LARGE_READ_X? Then MS-CIFS states that we must limit this to
  443. * the client's MaxBufferSize.
  444. */
  445. if (!(server->capabilities & CAP_LARGE_READ_X))
  446. rsize = min_t(unsigned int, CIFSMaxBufSize, rsize);
  447. /* hard limit of CIFS_MAX_RSIZE */
  448. rsize = min_t(unsigned int, rsize, CIFS_MAX_RSIZE);
  449. return rsize;
  450. }
  451. static void
  452. cifs_qfs_tcon(const unsigned int xid, struct cifs_tcon *tcon)
  453. {
  454. CIFSSMBQFSDeviceInfo(xid, tcon);
  455. CIFSSMBQFSAttributeInfo(xid, tcon);
  456. }
  457. static int
  458. cifs_is_path_accessible(const unsigned int xid, struct cifs_tcon *tcon,
  459. struct cifs_sb_info *cifs_sb, const char *full_path)
  460. {
  461. int rc;
  462. FILE_ALL_INFO *file_info;
  463. file_info = kmalloc(sizeof(FILE_ALL_INFO), GFP_KERNEL);
  464. if (file_info == NULL)
  465. return -ENOMEM;
  466. rc = CIFSSMBQPathInfo(xid, tcon, full_path, file_info,
  467. 0 /* not legacy */, cifs_sb->local_nls,
  468. cifs_remap(cifs_sb));
  469. if (rc == -EOPNOTSUPP || rc == -EINVAL)
  470. rc = SMBQueryInformation(xid, tcon, full_path, file_info,
  471. cifs_sb->local_nls, cifs_remap(cifs_sb));
  472. kfree(file_info);
  473. return rc;
  474. }
  475. static int
  476. cifs_query_path_info(const unsigned int xid, struct cifs_tcon *tcon,
  477. struct cifs_sb_info *cifs_sb, const char *full_path,
  478. FILE_ALL_INFO *data, bool *adjustTZ, bool *symlink)
  479. {
  480. int rc;
  481. *symlink = false;
  482. /* could do find first instead but this returns more info */
  483. rc = CIFSSMBQPathInfo(xid, tcon, full_path, data, 0 /* not legacy */,
  484. cifs_sb->local_nls, cifs_remap(cifs_sb));
  485. /*
  486. * BB optimize code so we do not make the above call when server claims
  487. * no NT SMB support and the above call failed at least once - set flag
  488. * in tcon or mount.
  489. */
  490. if ((rc == -EOPNOTSUPP) || (rc == -EINVAL)) {
  491. rc = SMBQueryInformation(xid, tcon, full_path, data,
  492. cifs_sb->local_nls,
  493. cifs_remap(cifs_sb));
  494. *adjustTZ = true;
  495. }
  496. if (!rc && (le32_to_cpu(data->Attributes) & ATTR_REPARSE)) {
  497. int tmprc;
  498. int oplock = 0;
  499. struct cifs_fid fid;
  500. struct cifs_open_parms oparms;
  501. oparms.tcon = tcon;
  502. oparms.cifs_sb = cifs_sb;
  503. oparms.desired_access = FILE_READ_ATTRIBUTES;
  504. oparms.create_options = 0;
  505. oparms.disposition = FILE_OPEN;
  506. oparms.path = full_path;
  507. oparms.fid = &fid;
  508. oparms.reconnect = false;
  509. /* Need to check if this is a symbolic link or not */
  510. tmprc = CIFS_open(xid, &oparms, &oplock, NULL);
  511. if (tmprc == -EOPNOTSUPP)
  512. *symlink = true;
  513. else if (tmprc == 0)
  514. CIFSSMBClose(xid, tcon, fid.netfid);
  515. }
  516. return rc;
  517. }
  518. static int
  519. cifs_get_srv_inum(const unsigned int xid, struct cifs_tcon *tcon,
  520. struct cifs_sb_info *cifs_sb, const char *full_path,
  521. u64 *uniqueid, FILE_ALL_INFO *data)
  522. {
  523. /*
  524. * We can not use the IndexNumber field by default from Windows or
  525. * Samba (in ALL_INFO buf) but we can request it explicitly. The SNIA
  526. * CIFS spec claims that this value is unique within the scope of a
  527. * share, and the windows docs hint that it's actually unique
  528. * per-machine.
  529. *
  530. * There may be higher info levels that work but are there Windows
  531. * server or network appliances for which IndexNumber field is not
  532. * guaranteed unique?
  533. */
  534. return CIFSGetSrvInodeNumber(xid, tcon, full_path, uniqueid,
  535. cifs_sb->local_nls,
  536. cifs_remap(cifs_sb));
  537. }
  538. static int
  539. cifs_query_file_info(const unsigned int xid, struct cifs_tcon *tcon,
  540. struct cifs_fid *fid, FILE_ALL_INFO *data)
  541. {
  542. return CIFSSMBQFileInfo(xid, tcon, fid->netfid, data);
  543. }
  544. static void
  545. cifs_clear_stats(struct cifs_tcon *tcon)
  546. {
  547. atomic_set(&tcon->stats.cifs_stats.num_writes, 0);
  548. atomic_set(&tcon->stats.cifs_stats.num_reads, 0);
  549. atomic_set(&tcon->stats.cifs_stats.num_flushes, 0);
  550. atomic_set(&tcon->stats.cifs_stats.num_oplock_brks, 0);
  551. atomic_set(&tcon->stats.cifs_stats.num_opens, 0);
  552. atomic_set(&tcon->stats.cifs_stats.num_posixopens, 0);
  553. atomic_set(&tcon->stats.cifs_stats.num_posixmkdirs, 0);
  554. atomic_set(&tcon->stats.cifs_stats.num_closes, 0);
  555. atomic_set(&tcon->stats.cifs_stats.num_deletes, 0);
  556. atomic_set(&tcon->stats.cifs_stats.num_mkdirs, 0);
  557. atomic_set(&tcon->stats.cifs_stats.num_rmdirs, 0);
  558. atomic_set(&tcon->stats.cifs_stats.num_renames, 0);
  559. atomic_set(&tcon->stats.cifs_stats.num_t2renames, 0);
  560. atomic_set(&tcon->stats.cifs_stats.num_ffirst, 0);
  561. atomic_set(&tcon->stats.cifs_stats.num_fnext, 0);
  562. atomic_set(&tcon->stats.cifs_stats.num_fclose, 0);
  563. atomic_set(&tcon->stats.cifs_stats.num_hardlinks, 0);
  564. atomic_set(&tcon->stats.cifs_stats.num_symlinks, 0);
  565. atomic_set(&tcon->stats.cifs_stats.num_locks, 0);
  566. atomic_set(&tcon->stats.cifs_stats.num_acl_get, 0);
  567. atomic_set(&tcon->stats.cifs_stats.num_acl_set, 0);
  568. }
  569. static void
  570. cifs_print_stats(struct seq_file *m, struct cifs_tcon *tcon)
  571. {
  572. seq_printf(m, " Oplocks breaks: %d",
  573. atomic_read(&tcon->stats.cifs_stats.num_oplock_brks));
  574. seq_printf(m, "\nReads: %d Bytes: %llu",
  575. atomic_read(&tcon->stats.cifs_stats.num_reads),
  576. (long long)(tcon->bytes_read));
  577. seq_printf(m, "\nWrites: %d Bytes: %llu",
  578. atomic_read(&tcon->stats.cifs_stats.num_writes),
  579. (long long)(tcon->bytes_written));
  580. seq_printf(m, "\nFlushes: %d",
  581. atomic_read(&tcon->stats.cifs_stats.num_flushes));
  582. seq_printf(m, "\nLocks: %d HardLinks: %d Symlinks: %d",
  583. atomic_read(&tcon->stats.cifs_stats.num_locks),
  584. atomic_read(&tcon->stats.cifs_stats.num_hardlinks),
  585. atomic_read(&tcon->stats.cifs_stats.num_symlinks));
  586. seq_printf(m, "\nOpens: %d Closes: %d Deletes: %d",
  587. atomic_read(&tcon->stats.cifs_stats.num_opens),
  588. atomic_read(&tcon->stats.cifs_stats.num_closes),
  589. atomic_read(&tcon->stats.cifs_stats.num_deletes));
  590. seq_printf(m, "\nPosix Opens: %d Posix Mkdirs: %d",
  591. atomic_read(&tcon->stats.cifs_stats.num_posixopens),
  592. atomic_read(&tcon->stats.cifs_stats.num_posixmkdirs));
  593. seq_printf(m, "\nMkdirs: %d Rmdirs: %d",
  594. atomic_read(&tcon->stats.cifs_stats.num_mkdirs),
  595. atomic_read(&tcon->stats.cifs_stats.num_rmdirs));
  596. seq_printf(m, "\nRenames: %d T2 Renames %d",
  597. atomic_read(&tcon->stats.cifs_stats.num_renames),
  598. atomic_read(&tcon->stats.cifs_stats.num_t2renames));
  599. seq_printf(m, "\nFindFirst: %d FNext %d FClose %d",
  600. atomic_read(&tcon->stats.cifs_stats.num_ffirst),
  601. atomic_read(&tcon->stats.cifs_stats.num_fnext),
  602. atomic_read(&tcon->stats.cifs_stats.num_fclose));
  603. }
  604. static void
  605. cifs_mkdir_setinfo(struct inode *inode, const char *full_path,
  606. struct cifs_sb_info *cifs_sb, struct cifs_tcon *tcon,
  607. const unsigned int xid)
  608. {
  609. FILE_BASIC_INFO info;
  610. struct cifsInodeInfo *cifsInode;
  611. u32 dosattrs;
  612. int rc;
  613. memset(&info, 0, sizeof(info));
  614. cifsInode = CIFS_I(inode);
  615. dosattrs = cifsInode->cifsAttrs|ATTR_READONLY;
  616. info.Attributes = cpu_to_le32(dosattrs);
  617. rc = CIFSSMBSetPathInfo(xid, tcon, full_path, &info, cifs_sb->local_nls,
  618. cifs_remap(cifs_sb));
  619. if (rc == 0)
  620. cifsInode->cifsAttrs = dosattrs;
  621. }
  622. static int
  623. cifs_open_file(const unsigned int xid, struct cifs_open_parms *oparms,
  624. __u32 *oplock, FILE_ALL_INFO *buf)
  625. {
  626. if (!(oparms->tcon->ses->capabilities & CAP_NT_SMBS))
  627. return SMBLegacyOpen(xid, oparms->tcon, oparms->path,
  628. oparms->disposition,
  629. oparms->desired_access,
  630. oparms->create_options,
  631. &oparms->fid->netfid, oplock, buf,
  632. oparms->cifs_sb->local_nls,
  633. cifs_remap(oparms->cifs_sb));
  634. return CIFS_open(xid, oparms, oplock, buf);
  635. }
  636. static void
  637. cifs_set_fid(struct cifsFileInfo *cfile, struct cifs_fid *fid, __u32 oplock)
  638. {
  639. struct cifsInodeInfo *cinode = CIFS_I(d_inode(cfile->dentry));
  640. cfile->fid.netfid = fid->netfid;
  641. cifs_set_oplock_level(cinode, oplock);
  642. cinode->can_cache_brlcks = CIFS_CACHE_WRITE(cinode);
  643. }
  644. static void
  645. cifs_close_file(const unsigned int xid, struct cifs_tcon *tcon,
  646. struct cifs_fid *fid)
  647. {
  648. CIFSSMBClose(xid, tcon, fid->netfid);
  649. }
  650. static int
  651. cifs_flush_file(const unsigned int xid, struct cifs_tcon *tcon,
  652. struct cifs_fid *fid)
  653. {
  654. return CIFSSMBFlush(xid, tcon, fid->netfid);
  655. }
  656. static int
  657. cifs_sync_read(const unsigned int xid, struct cifs_fid *pfid,
  658. struct cifs_io_parms *parms, unsigned int *bytes_read,
  659. char **buf, int *buf_type)
  660. {
  661. parms->netfid = pfid->netfid;
  662. return CIFSSMBRead(xid, parms, bytes_read, buf, buf_type);
  663. }
  664. static int
  665. cifs_sync_write(const unsigned int xid, struct cifs_fid *pfid,
  666. struct cifs_io_parms *parms, unsigned int *written,
  667. struct kvec *iov, unsigned long nr_segs)
  668. {
  669. parms->netfid = pfid->netfid;
  670. return CIFSSMBWrite2(xid, parms, written, iov, nr_segs);
  671. }
  672. static int
  673. smb_set_file_info(struct inode *inode, const char *full_path,
  674. FILE_BASIC_INFO *buf, const unsigned int xid)
  675. {
  676. int oplock = 0;
  677. int rc;
  678. __u32 netpid;
  679. struct cifs_fid fid;
  680. struct cifs_open_parms oparms;
  681. struct cifsFileInfo *open_file;
  682. struct cifsInodeInfo *cinode = CIFS_I(inode);
  683. struct cifs_sb_info *cifs_sb = CIFS_SB(inode->i_sb);
  684. struct tcon_link *tlink = NULL;
  685. struct cifs_tcon *tcon;
  686. /* if the file is already open for write, just use that fileid */
  687. open_file = find_writable_file(cinode, true);
  688. if (open_file) {
  689. fid.netfid = open_file->fid.netfid;
  690. netpid = open_file->pid;
  691. tcon = tlink_tcon(open_file->tlink);
  692. goto set_via_filehandle;
  693. }
  694. tlink = cifs_sb_tlink(cifs_sb);
  695. if (IS_ERR(tlink)) {
  696. rc = PTR_ERR(tlink);
  697. tlink = NULL;
  698. goto out;
  699. }
  700. tcon = tlink_tcon(tlink);
  701. rc = CIFSSMBSetPathInfo(xid, tcon, full_path, buf, cifs_sb->local_nls,
  702. cifs_remap(cifs_sb));
  703. if (rc == 0) {
  704. cinode->cifsAttrs = le32_to_cpu(buf->Attributes);
  705. goto out;
  706. } else if (rc != -EOPNOTSUPP && rc != -EINVAL) {
  707. goto out;
  708. }
  709. oparms.tcon = tcon;
  710. oparms.cifs_sb = cifs_sb;
  711. oparms.desired_access = SYNCHRONIZE | FILE_WRITE_ATTRIBUTES;
  712. oparms.create_options = CREATE_NOT_DIR;
  713. oparms.disposition = FILE_OPEN;
  714. oparms.path = full_path;
  715. oparms.fid = &fid;
  716. oparms.reconnect = false;
  717. cifs_dbg(FYI, "calling SetFileInfo since SetPathInfo for times not supported by this server\n");
  718. rc = CIFS_open(xid, &oparms, &oplock, NULL);
  719. if (rc != 0) {
  720. if (rc == -EIO)
  721. rc = -EINVAL;
  722. goto out;
  723. }
  724. netpid = current->tgid;
  725. set_via_filehandle:
  726. rc = CIFSSMBSetFileInfo(xid, tcon, buf, fid.netfid, netpid);
  727. if (!rc)
  728. cinode->cifsAttrs = le32_to_cpu(buf->Attributes);
  729. if (open_file == NULL)
  730. CIFSSMBClose(xid, tcon, fid.netfid);
  731. else
  732. cifsFileInfo_put(open_file);
  733. out:
  734. if (tlink != NULL)
  735. cifs_put_tlink(tlink);
  736. return rc;
  737. }
  738. static int
  739. cifs_set_compression(const unsigned int xid, struct cifs_tcon *tcon,
  740. struct cifsFileInfo *cfile)
  741. {
  742. return CIFSSMB_set_compression(xid, tcon, cfile->fid.netfid);
  743. }
  744. static int
  745. cifs_query_dir_first(const unsigned int xid, struct cifs_tcon *tcon,
  746. const char *path, struct cifs_sb_info *cifs_sb,
  747. struct cifs_fid *fid, __u16 search_flags,
  748. struct cifs_search_info *srch_inf)
  749. {
  750. int rc;
  751. rc = CIFSFindFirst(xid, tcon, path, cifs_sb,
  752. &fid->netfid, search_flags, srch_inf, true);
  753. if (rc)
  754. cifs_dbg(FYI, "find first failed=%d\n", rc);
  755. return rc;
  756. }
  757. static int
  758. cifs_query_dir_next(const unsigned int xid, struct cifs_tcon *tcon,
  759. struct cifs_fid *fid, __u16 search_flags,
  760. struct cifs_search_info *srch_inf)
  761. {
  762. return CIFSFindNext(xid, tcon, fid->netfid, search_flags, srch_inf);
  763. }
  764. static int
  765. cifs_close_dir(const unsigned int xid, struct cifs_tcon *tcon,
  766. struct cifs_fid *fid)
  767. {
  768. return CIFSFindClose(xid, tcon, fid->netfid);
  769. }
  770. static int
  771. cifs_oplock_response(struct cifs_tcon *tcon, struct cifs_fid *fid,
  772. struct cifsInodeInfo *cinode)
  773. {
  774. return CIFSSMBLock(0, tcon, fid->netfid, current->tgid, 0, 0, 0, 0,
  775. LOCKING_ANDX_OPLOCK_RELEASE, false,
  776. CIFS_CACHE_READ(cinode) ? 1 : 0);
  777. }
  778. static int
  779. cifs_queryfs(const unsigned int xid, struct cifs_tcon *tcon,
  780. struct kstatfs *buf)
  781. {
  782. int rc = -EOPNOTSUPP;
  783. buf->f_type = CIFS_MAGIC_NUMBER;
  784. /*
  785. * We could add a second check for a QFS Unix capability bit
  786. */
  787. if ((tcon->ses->capabilities & CAP_UNIX) &&
  788. (CIFS_POSIX_EXTENSIONS & le64_to_cpu(tcon->fsUnixInfo.Capability)))
  789. rc = CIFSSMBQFSPosixInfo(xid, tcon, buf);
  790. /*
  791. * Only need to call the old QFSInfo if failed on newer one,
  792. * e.g. by OS/2.
  793. **/
  794. if (rc && (tcon->ses->capabilities & CAP_NT_SMBS))
  795. rc = CIFSSMBQFSInfo(xid, tcon, buf);
  796. /*
  797. * Some old Windows servers also do not support level 103, retry with
  798. * older level one if old server failed the previous call or we
  799. * bypassed it because we detected that this was an older LANMAN sess
  800. */
  801. if (rc)
  802. rc = SMBOldQFSInfo(xid, tcon, buf);
  803. return rc;
  804. }
  805. static int
  806. cifs_mand_lock(const unsigned int xid, struct cifsFileInfo *cfile, __u64 offset,
  807. __u64 length, __u32 type, int lock, int unlock, bool wait)
  808. {
  809. return CIFSSMBLock(xid, tlink_tcon(cfile->tlink), cfile->fid.netfid,
  810. current->tgid, length, offset, unlock, lock,
  811. (__u8)type, wait, 0);
  812. }
  813. static int
  814. cifs_unix_dfs_readlink(const unsigned int xid, struct cifs_tcon *tcon,
  815. const unsigned char *searchName, char **symlinkinfo,
  816. const struct nls_table *nls_codepage)
  817. {
  818. #ifdef CONFIG_CIFS_DFS_UPCALL
  819. int rc;
  820. unsigned int num_referrals = 0;
  821. struct dfs_info3_param *referrals = NULL;
  822. rc = get_dfs_path(xid, tcon->ses, searchName, nls_codepage,
  823. &num_referrals, &referrals, 0);
  824. if (!rc && num_referrals > 0) {
  825. *symlinkinfo = kstrndup(referrals->node_name,
  826. strlen(referrals->node_name),
  827. GFP_KERNEL);
  828. if (!*symlinkinfo)
  829. rc = -ENOMEM;
  830. free_dfs_info_array(referrals, num_referrals);
  831. }
  832. return rc;
  833. #else /* No DFS support */
  834. return -EREMOTE;
  835. #endif
  836. }
  837. static int
  838. cifs_query_symlink(const unsigned int xid, struct cifs_tcon *tcon,
  839. const char *full_path, char **target_path,
  840. struct cifs_sb_info *cifs_sb)
  841. {
  842. int rc;
  843. int oplock = 0;
  844. struct cifs_fid fid;
  845. struct cifs_open_parms oparms;
  846. cifs_dbg(FYI, "%s: path: %s\n", __func__, full_path);
  847. /* Check for unix extensions */
  848. if (cap_unix(tcon->ses)) {
  849. rc = CIFSSMBUnixQuerySymLink(xid, tcon, full_path, target_path,
  850. cifs_sb->local_nls,
  851. cifs_remap(cifs_sb));
  852. if (rc == -EREMOTE)
  853. rc = cifs_unix_dfs_readlink(xid, tcon, full_path,
  854. target_path,
  855. cifs_sb->local_nls);
  856. goto out;
  857. }
  858. oparms.tcon = tcon;
  859. oparms.cifs_sb = cifs_sb;
  860. oparms.desired_access = FILE_READ_ATTRIBUTES;
  861. oparms.create_options = OPEN_REPARSE_POINT;
  862. oparms.disposition = FILE_OPEN;
  863. oparms.path = full_path;
  864. oparms.fid = &fid;
  865. oparms.reconnect = false;
  866. rc = CIFS_open(xid, &oparms, &oplock, NULL);
  867. if (rc)
  868. goto out;
  869. rc = CIFSSMBQuerySymLink(xid, tcon, fid.netfid, target_path,
  870. cifs_sb->local_nls);
  871. if (rc)
  872. goto out_close;
  873. convert_delimiter(*target_path, '/');
  874. out_close:
  875. CIFSSMBClose(xid, tcon, fid.netfid);
  876. out:
  877. if (!rc)
  878. cifs_dbg(FYI, "%s: target path: %s\n", __func__, *target_path);
  879. return rc;
  880. }
  881. static bool
  882. cifs_is_read_op(__u32 oplock)
  883. {
  884. return oplock == OPLOCK_READ;
  885. }
  886. static unsigned int
  887. cifs_wp_retry_size(struct inode *inode)
  888. {
  889. return CIFS_SB(inode->i_sb)->wsize;
  890. }
  891. static bool
  892. cifs_dir_needs_close(struct cifsFileInfo *cfile)
  893. {
  894. return !cfile->srch_inf.endOfSearch && !cfile->invalidHandle;
  895. }
  896. static bool
  897. cifs_can_echo(struct TCP_Server_Info *server)
  898. {
  899. if (server->tcpStatus == CifsGood)
  900. return true;
  901. return false;
  902. }
  903. struct smb_version_operations smb1_operations = {
  904. .send_cancel = send_nt_cancel,
  905. .compare_fids = cifs_compare_fids,
  906. .setup_request = cifs_setup_request,
  907. .setup_async_request = cifs_setup_async_request,
  908. .check_receive = cifs_check_receive,
  909. .add_credits = cifs_add_credits,
  910. .set_credits = cifs_set_credits,
  911. .get_credits_field = cifs_get_credits_field,
  912. .get_credits = cifs_get_credits,
  913. .wait_mtu_credits = cifs_wait_mtu_credits,
  914. .get_next_mid = cifs_get_next_mid,
  915. .read_data_offset = cifs_read_data_offset,
  916. .read_data_length = cifs_read_data_length,
  917. .map_error = map_smb_to_linux_error,
  918. .find_mid = cifs_find_mid,
  919. .check_message = checkSMB,
  920. .dump_detail = cifs_dump_detail,
  921. .clear_stats = cifs_clear_stats,
  922. .print_stats = cifs_print_stats,
  923. .is_oplock_break = is_valid_oplock_break,
  924. .downgrade_oplock = cifs_downgrade_oplock,
  925. .check_trans2 = cifs_check_trans2,
  926. .need_neg = cifs_need_neg,
  927. .negotiate = cifs_negotiate,
  928. .negotiate_wsize = cifs_negotiate_wsize,
  929. .negotiate_rsize = cifs_negotiate_rsize,
  930. .sess_setup = CIFS_SessSetup,
  931. .logoff = CIFSSMBLogoff,
  932. .tree_connect = CIFSTCon,
  933. .tree_disconnect = CIFSSMBTDis,
  934. .get_dfs_refer = CIFSGetDFSRefer,
  935. .qfs_tcon = cifs_qfs_tcon,
  936. .is_path_accessible = cifs_is_path_accessible,
  937. .can_echo = cifs_can_echo,
  938. .query_path_info = cifs_query_path_info,
  939. .query_file_info = cifs_query_file_info,
  940. .get_srv_inum = cifs_get_srv_inum,
  941. .set_path_size = CIFSSMBSetEOF,
  942. .set_file_size = CIFSSMBSetFileSize,
  943. .set_file_info = smb_set_file_info,
  944. .set_compression = cifs_set_compression,
  945. .echo = CIFSSMBEcho,
  946. .mkdir = CIFSSMBMkDir,
  947. .mkdir_setinfo = cifs_mkdir_setinfo,
  948. .rmdir = CIFSSMBRmDir,
  949. .unlink = CIFSSMBDelFile,
  950. .rename_pending_delete = cifs_rename_pending_delete,
  951. .rename = CIFSSMBRename,
  952. .create_hardlink = CIFSCreateHardLink,
  953. .query_symlink = cifs_query_symlink,
  954. .open = cifs_open_file,
  955. .set_fid = cifs_set_fid,
  956. .close = cifs_close_file,
  957. .flush = cifs_flush_file,
  958. .async_readv = cifs_async_readv,
  959. .async_writev = cifs_async_writev,
  960. .sync_read = cifs_sync_read,
  961. .sync_write = cifs_sync_write,
  962. .query_dir_first = cifs_query_dir_first,
  963. .query_dir_next = cifs_query_dir_next,
  964. .close_dir = cifs_close_dir,
  965. .calc_smb_size = smbCalcSize,
  966. .oplock_response = cifs_oplock_response,
  967. .queryfs = cifs_queryfs,
  968. .mand_lock = cifs_mand_lock,
  969. .mand_unlock_range = cifs_unlock_range,
  970. .push_mand_locks = cifs_push_mandatory_locks,
  971. .query_mf_symlink = cifs_query_mf_symlink,
  972. .create_mf_symlink = cifs_create_mf_symlink,
  973. .is_read_op = cifs_is_read_op,
  974. .wp_retry_size = cifs_wp_retry_size,
  975. .dir_needs_close = cifs_dir_needs_close,
  976. .select_sectype = cifs_select_sectype,
  977. #ifdef CONFIG_CIFS_XATTR
  978. .query_all_EAs = CIFSSMBQAllEAs,
  979. .set_EA = CIFSSMBSetEA,
  980. #endif /* CIFS_XATTR */
  981. #ifdef CONFIG_CIFS_ACL
  982. .get_acl = get_cifs_acl,
  983. .get_acl_by_fid = get_cifs_acl_by_fid,
  984. .set_acl = set_cifs_acl,
  985. #endif /* CIFS_ACL */
  986. };
  987. struct smb_version_values smb1_values = {
  988. .version_string = SMB1_VERSION_STRING,
  989. .large_lock_type = LOCKING_ANDX_LARGE_FILES,
  990. .exclusive_lock_type = 0,
  991. .shared_lock_type = LOCKING_ANDX_SHARED_LOCK,
  992. .unlock_lock_type = 0,
  993. .header_preamble_size = 4,
  994. .header_size = sizeof(struct smb_hdr),
  995. .max_header_size = MAX_CIFS_HDR_SIZE,
  996. .read_rsp_size = sizeof(READ_RSP),
  997. .lock_cmd = cpu_to_le16(SMB_COM_LOCKING_ANDX),
  998. .cap_unix = CAP_UNIX,
  999. .cap_nt_find = CAP_NT_SMBS | CAP_NT_FIND,
  1000. .cap_large_files = CAP_LARGE_FILES,
  1001. .signing_enabled = SECMODE_SIGN_ENABLED,
  1002. .signing_required = SECMODE_SIGN_REQUIRED,
  1003. };