[CIFS] Fix umount --force to wake up the pending response queue, not just
[linux-2.6/linux-acpi-2.6/ibm-acpi-2.6.git] / fs / cifs / transport.c
blobf8871196098c9abe371a64a1df5d269cb407f503
1 /*
2 * fs/cifs/transport.c
4 * Copyright (C) International Business Machines Corp., 2002,2005
5 * Author(s): Steve French (sfrench@us.ibm.com)
7 * This library is free software; you can redistribute it and/or modify
8 * it under the terms of the GNU Lesser General Public License as published
9 * by the Free Software Foundation; either version 2.1 of the License, or
10 * (at your option) any later version.
12 * This library is distributed in the hope that it will be useful,
13 * but WITHOUT ANY WARRANTY; without even the implied warranty of
14 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See
15 * the GNU Lesser General Public License for more details.
17 * You should have received a copy of the GNU Lesser General Public License
18 * along with this library; if not, write to the Free Software
19 * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
22 #include <linux/fs.h>
23 #include <linux/list.h>
24 #include <linux/wait.h>
25 #include <linux/net.h>
26 #include <linux/delay.h>
27 #include <asm/uaccess.h>
28 #include <asm/processor.h>
29 #include <linux/mempool.h>
30 #include "cifspdu.h"
31 #include "cifsglob.h"
32 #include "cifsproto.h"
33 #include "cifs_debug.h"
35 extern mempool_t *cifs_mid_poolp;
36 extern kmem_cache_t *cifs_oplock_cachep;
38 static struct mid_q_entry *
39 AllocMidQEntry(struct smb_hdr *smb_buffer, struct cifsSesInfo *ses)
41 struct mid_q_entry *temp;
43 if (ses == NULL) {
44 cERROR(1, ("Null session passed in to AllocMidQEntry"));
45 return NULL;
47 if (ses->server == NULL) {
48 cERROR(1, ("Null TCP session in AllocMidQEntry"));
49 return NULL;
52 temp = (struct mid_q_entry *) mempool_alloc(cifs_mid_poolp,
53 SLAB_KERNEL | SLAB_NOFS);
54 if (temp == NULL)
55 return temp;
56 else {
57 memset(temp, 0, sizeof (struct mid_q_entry));
58 temp->mid = smb_buffer->Mid; /* always LE */
59 temp->pid = current->pid;
60 temp->command = smb_buffer->Command;
61 cFYI(1, ("For smb_command %d", temp->command));
62 /* do_gettimeofday(&temp->when_sent);*/ /* easier to use jiffies */
63 /* when mid allocated can be before when sent */
64 temp->when_alloc = jiffies;
65 temp->ses = ses;
66 temp->tsk = current;
69 spin_lock(&GlobalMid_Lock);
70 list_add_tail(&temp->qhead, &ses->server->pending_mid_q);
71 atomic_inc(&midCount);
72 temp->midState = MID_REQUEST_ALLOCATED;
73 spin_unlock(&GlobalMid_Lock);
74 return temp;
77 static void
78 DeleteMidQEntry(struct mid_q_entry *midEntry)
80 #ifdef CONFIG_CIFS_STATS2
81 unsigned long now;
82 #endif
83 spin_lock(&GlobalMid_Lock);
84 midEntry->midState = MID_FREE;
85 list_del(&midEntry->qhead);
86 atomic_dec(&midCount);
87 spin_unlock(&GlobalMid_Lock);
88 if(midEntry->largeBuf)
89 cifs_buf_release(midEntry->resp_buf);
90 else
91 cifs_small_buf_release(midEntry->resp_buf);
92 #ifdef CONFIG_CIFS_STATS2
93 now = jiffies;
94 /* commands taking longer than one second are indications that
95 something is wrong, unless it is quite a slow link or server */
96 if((now - midEntry->when_alloc) > HZ) {
97 if((cifsFYI & CIFS_TIMER) &&
98 (midEntry->command != SMB_COM_LOCKING_ANDX)) {
99 printk(KERN_DEBUG " CIFS slow rsp: cmd %d mid %d",
100 midEntry->command, midEntry->mid);
101 printk(" A: 0x%lx S: 0x%lx R: 0x%lx\n",
102 now - midEntry->when_alloc,
103 now - midEntry->when_sent,
104 now - midEntry->when_received);
107 #endif
108 mempool_free(midEntry, cifs_mid_poolp);
111 struct oplock_q_entry *
112 AllocOplockQEntry(struct inode * pinode, __u16 fid, struct cifsTconInfo * tcon)
114 struct oplock_q_entry *temp;
115 if ((pinode== NULL) || (tcon == NULL)) {
116 cERROR(1, ("Null parms passed to AllocOplockQEntry"));
117 return NULL;
119 temp = (struct oplock_q_entry *) kmem_cache_alloc(cifs_oplock_cachep,
120 SLAB_KERNEL);
121 if (temp == NULL)
122 return temp;
123 else {
124 temp->pinode = pinode;
125 temp->tcon = tcon;
126 temp->netfid = fid;
127 spin_lock(&GlobalMid_Lock);
128 list_add_tail(&temp->qhead, &GlobalOplock_Q);
129 spin_unlock(&GlobalMid_Lock);
131 return temp;
135 void DeleteOplockQEntry(struct oplock_q_entry * oplockEntry)
137 spin_lock(&GlobalMid_Lock);
138 /* should we check if list empty first? */
139 list_del(&oplockEntry->qhead);
140 spin_unlock(&GlobalMid_Lock);
141 kmem_cache_free(cifs_oplock_cachep, oplockEntry);
145 smb_send(struct socket *ssocket, struct smb_hdr *smb_buffer,
146 unsigned int smb_buf_length, struct sockaddr *sin)
148 int rc = 0;
149 int i = 0;
150 struct msghdr smb_msg;
151 struct kvec iov;
152 unsigned len = smb_buf_length + 4;
154 if(ssocket == NULL)
155 return -ENOTSOCK; /* BB eventually add reconnect code here */
156 iov.iov_base = smb_buffer;
157 iov.iov_len = len;
159 smb_msg.msg_name = sin;
160 smb_msg.msg_namelen = sizeof (struct sockaddr);
161 smb_msg.msg_control = NULL;
162 smb_msg.msg_controllen = 0;
163 smb_msg.msg_flags = MSG_DONTWAIT + MSG_NOSIGNAL; /* BB add more flags?*/
165 /* smb header is converted in header_assemble. bcc and rest of SMB word
166 area, and byte area if necessary, is converted to littleendian in
167 cifssmb.c and RFC1001 len is converted to bigendian in smb_send
168 Flags2 is converted in SendReceive */
170 smb_buffer->smb_buf_length = cpu_to_be32(smb_buffer->smb_buf_length);
171 cFYI(1, ("Sending smb of length %d", smb_buf_length));
172 dump_smb(smb_buffer, len);
174 while (len > 0) {
175 rc = kernel_sendmsg(ssocket, &smb_msg, &iov, 1, len);
176 if ((rc == -ENOSPC) || (rc == -EAGAIN)) {
177 i++;
178 /* smaller timeout here than send2 since smaller size */
179 /* Although it may not be required, this also is smaller
180 oplock break time */
181 if(i > 12) {
182 cERROR(1,
183 ("sends on sock %p stuck for 7 seconds",
184 ssocket));
185 rc = -EAGAIN;
186 break;
188 msleep(1 << i);
189 continue;
191 if (rc < 0)
192 break;
193 else
194 i = 0; /* reset i after each successful send */
195 iov.iov_base += rc;
196 iov.iov_len -= rc;
197 len -= rc;
200 if (rc < 0) {
201 cERROR(1,("Error %d sending data on socket to server", rc));
202 } else {
203 rc = 0;
206 return rc;
209 #ifdef CONFIG_CIFS_EXPERIMENTAL
210 static int
211 smb_send2(struct socket *ssocket, struct kvec *iov, int n_vec,
212 struct sockaddr *sin)
214 int rc = 0;
215 int i = 0;
216 struct msghdr smb_msg;
217 struct smb_hdr *smb_buffer = iov[0].iov_base;
218 unsigned int len = iov[0].iov_len;
219 unsigned int total_len;
220 int first_vec = 0;
222 if(ssocket == NULL)
223 return -ENOTSOCK; /* BB eventually add reconnect code here */
225 smb_msg.msg_name = sin;
226 smb_msg.msg_namelen = sizeof (struct sockaddr);
227 smb_msg.msg_control = NULL;
228 smb_msg.msg_controllen = 0;
229 smb_msg.msg_flags = MSG_DONTWAIT + MSG_NOSIGNAL; /* BB add more flags?*/
231 /* smb header is converted in header_assemble. bcc and rest of SMB word
232 area, and byte area if necessary, is converted to littleendian in
233 cifssmb.c and RFC1001 len is converted to bigendian in smb_send
234 Flags2 is converted in SendReceive */
237 total_len = 0;
238 for (i = 0; i < n_vec; i++)
239 total_len += iov[i].iov_len;
241 smb_buffer->smb_buf_length = cpu_to_be32(smb_buffer->smb_buf_length);
242 cFYI(1, ("Sending smb: total_len %d", total_len));
243 dump_smb(smb_buffer, len);
245 while (total_len) {
246 rc = kernel_sendmsg(ssocket, &smb_msg, &iov[first_vec],
247 n_vec - first_vec, total_len);
248 if ((rc == -ENOSPC) || (rc == -EAGAIN)) {
249 i++;
250 if(i >= 14) {
251 cERROR(1,
252 ("sends on sock %p stuck for 15 seconds",
253 ssocket));
254 rc = -EAGAIN;
255 break;
257 msleep(1 << i);
258 continue;
260 if (rc < 0)
261 break;
263 if (rc >= total_len) {
264 WARN_ON(rc > total_len);
265 break;
267 if(rc == 0) {
268 /* should never happen, letting socket clear before
269 retrying is our only obvious option here */
270 cERROR(1,("tcp sent no data"));
271 msleep(500);
272 continue;
274 total_len -= rc;
275 /* the line below resets i */
276 for (i = first_vec; i < n_vec; i++) {
277 if (iov[i].iov_len) {
278 if (rc > iov[i].iov_len) {
279 rc -= iov[i].iov_len;
280 iov[i].iov_len = 0;
281 } else {
282 iov[i].iov_base += rc;
283 iov[i].iov_len -= rc;
284 first_vec = i;
285 break;
289 i = 0; /* in case we get ENOSPC on the next send */
292 if (rc < 0) {
293 cERROR(1,("Error %d sending data on socket to server", rc));
294 } else
295 rc = 0;
297 return rc;
301 SendReceive2(const unsigned int xid, struct cifsSesInfo *ses,
302 struct kvec *iov, int n_vec, int *pbytes_returned,
303 const int long_op)
305 int rc = 0;
306 unsigned int receive_len;
307 unsigned long timeout;
308 struct mid_q_entry *midQ;
309 struct smb_hdr *in_buf = iov[0].iov_base;
311 if (ses == NULL) {
312 cERROR(1,("Null smb session"));
313 return -EIO;
315 if(ses->server == NULL) {
316 cERROR(1,("Null tcp session"));
317 return -EIO;
320 if(ses->server->tcpStatus == CifsExiting)
321 return -ENOENT;
323 /* Ensure that we do not send more than 50 overlapping requests
324 to the same server. We may make this configurable later or
325 use ses->maxReq */
326 if(long_op == -1) {
327 /* oplock breaks must not be held up */
328 atomic_inc(&ses->server->inFlight);
329 } else {
330 spin_lock(&GlobalMid_Lock);
331 while(1) {
332 if(atomic_read(&ses->server->inFlight) >=
333 cifs_max_pending){
334 spin_unlock(&GlobalMid_Lock);
335 #ifdef CONFIG_CIFS_STATS2
336 atomic_inc(&ses->server->num_waiters);
337 #endif
338 wait_event(ses->server->request_q,
339 atomic_read(&ses->server->inFlight)
340 < cifs_max_pending);
341 #ifdef CONFIG_CIFS_STATS2
342 atomic_dec(&ses->server->num_waiters);
343 #endif
344 spin_lock(&GlobalMid_Lock);
345 } else {
346 if(ses->server->tcpStatus == CifsExiting) {
347 spin_unlock(&GlobalMid_Lock);
348 return -ENOENT;
351 /* can not count locking commands against total since
352 they are allowed to block on server */
354 if(long_op < 3) {
355 /* update # of requests on the wire to server */
356 atomic_inc(&ses->server->inFlight);
358 spin_unlock(&GlobalMid_Lock);
359 break;
363 /* make sure that we sign in the same order that we send on this socket
364 and avoid races inside tcp sendmsg code that could cause corruption
365 of smb data */
367 down(&ses->server->tcpSem);
369 if (ses->server->tcpStatus == CifsExiting) {
370 rc = -ENOENT;
371 goto out_unlock2;
372 } else if (ses->server->tcpStatus == CifsNeedReconnect) {
373 cFYI(1,("tcp session dead - return to caller to retry"));
374 rc = -EAGAIN;
375 goto out_unlock2;
376 } else if (ses->status != CifsGood) {
377 /* check if SMB session is bad because we are setting it up */
378 if((in_buf->Command != SMB_COM_SESSION_SETUP_ANDX) &&
379 (in_buf->Command != SMB_COM_NEGOTIATE)) {
380 rc = -EAGAIN;
381 goto out_unlock2;
382 } /* else ok - we are setting up session */
384 midQ = AllocMidQEntry(in_buf, ses);
385 if (midQ == NULL) {
386 up(&ses->server->tcpSem);
387 /* If not lock req, update # of requests on wire to server */
388 if(long_op < 3) {
389 atomic_dec(&ses->server->inFlight);
390 wake_up(&ses->server->request_q);
392 return -ENOMEM;
395 /* BB FIXME */
396 /* rc = cifs_sign_smb2(iov, n_vec, ses->server, &midQ->sequence_number); */
398 midQ->midState = MID_REQUEST_SUBMITTED;
399 #ifdef CONFIG_CIFS_STATS2
400 atomic_inc(&ses->server->inSend);
401 #endif
402 rc = smb_send2(ses->server->ssocket, iov, n_vec,
403 (struct sockaddr *) &(ses->server->addr.sockAddr));
404 #ifdef CONFIG_CIFS_STATS2
405 atomic_dec(&ses->server->inSend);
406 midQ->when_sent = jiffies;
407 #endif
408 if(rc < 0) {
409 DeleteMidQEntry(midQ);
410 up(&ses->server->tcpSem);
411 /* If not lock req, update # of requests on wire to server */
412 if(long_op < 3) {
413 atomic_dec(&ses->server->inFlight);
414 wake_up(&ses->server->request_q);
416 return rc;
417 } else
418 up(&ses->server->tcpSem);
419 if (long_op == -1)
420 goto cifs_no_response_exit2;
421 else if (long_op == 2) /* writes past end of file can take loong time */
422 timeout = 180 * HZ;
423 else if (long_op == 1)
424 timeout = 45 * HZ; /* should be greater than
425 servers oplock break timeout (about 43 seconds) */
426 else if (long_op > 2) {
427 timeout = MAX_SCHEDULE_TIMEOUT;
428 } else
429 timeout = 15 * HZ;
430 /* wait for 15 seconds or until woken up due to response arriving or
431 due to last connection to this server being unmounted */
432 if (signal_pending(current)) {
433 /* if signal pending do not hold up user for full smb timeout
434 but we still give response a change to complete */
435 timeout = 2 * HZ;
438 /* No user interrupts in wait - wreaks havoc with performance */
439 if(timeout != MAX_SCHEDULE_TIMEOUT) {
440 timeout += jiffies;
441 wait_event(ses->server->response_q,
442 (!(midQ->midState & MID_REQUEST_SUBMITTED)) ||
443 time_after(jiffies, timeout) ||
444 ((ses->server->tcpStatus != CifsGood) &&
445 (ses->server->tcpStatus != CifsNew)));
446 } else {
447 wait_event(ses->server->response_q,
448 (!(midQ->midState & MID_REQUEST_SUBMITTED)) ||
449 ((ses->server->tcpStatus != CifsGood) &&
450 (ses->server->tcpStatus != CifsNew)));
453 spin_lock(&GlobalMid_Lock);
454 if (midQ->resp_buf) {
455 spin_unlock(&GlobalMid_Lock);
456 receive_len = midQ->resp_buf->smb_buf_length;
457 } else {
458 cERROR(1,("No response to cmd %d mid %d",
459 midQ->command, midQ->mid));
460 if(midQ->midState == MID_REQUEST_SUBMITTED) {
461 if(ses->server->tcpStatus == CifsExiting)
462 rc = -EHOSTDOWN;
463 else {
464 ses->server->tcpStatus = CifsNeedReconnect;
465 midQ->midState = MID_RETRY_NEEDED;
469 if (rc != -EHOSTDOWN) {
470 if(midQ->midState == MID_RETRY_NEEDED) {
471 rc = -EAGAIN;
472 cFYI(1,("marking request for retry"));
473 } else {
474 rc = -EIO;
477 spin_unlock(&GlobalMid_Lock);
478 DeleteMidQEntry(midQ);
479 /* If not lock req, update # of requests on wire to server */
480 if(long_op < 3) {
481 atomic_dec(&ses->server->inFlight);
482 wake_up(&ses->server->request_q);
484 return rc;
487 if (receive_len > CIFSMaxBufSize + MAX_CIFS_HDR_SIZE) {
488 cERROR(1, ("Frame too large received. Length: %d Xid: %d",
489 receive_len, xid));
490 rc = -EIO;
491 } else { /* rcvd frame is ok */
493 if (midQ->resp_buf &&
494 (midQ->midState == MID_RESPONSE_RECEIVED)) {
495 in_buf->smb_buf_length = receive_len;
496 /* BB verify that length would not overrun small buf */
497 memcpy((char *)in_buf + 4,
498 (char *)midQ->resp_buf + 4,
499 receive_len);
501 dump_smb(in_buf, 80);
502 /* convert the length into a more usable form */
503 if((receive_len > 24) &&
504 (ses->server->secMode & (SECMODE_SIGN_REQUIRED |
505 SECMODE_SIGN_ENABLED))) {
506 rc = cifs_verify_signature(in_buf,
507 ses->server->mac_signing_key,
508 midQ->sequence_number+1);
509 if(rc) {
510 cERROR(1,("Unexpected SMB signature"));
511 /* BB FIXME add code to kill session */
515 *pbytes_returned = in_buf->smb_buf_length;
517 /* BB special case reconnect tid and uid here? */
518 /* BB special case Errbadpassword and pwdexpired here */
519 rc = map_smb_to_linux_error(in_buf);
521 /* convert ByteCount if necessary */
522 if (receive_len >=
523 sizeof (struct smb_hdr) -
524 4 /* do not count RFC1001 header */ +
525 (2 * in_buf->WordCount) + 2 /* bcc */ )
526 BCC(in_buf) = le16_to_cpu(BCC_LE(in_buf));
527 } else {
528 rc = -EIO;
529 cFYI(1,("Bad MID state?"));
532 cifs_no_response_exit2:
533 DeleteMidQEntry(midQ);
535 if(long_op < 3) {
536 atomic_dec(&ses->server->inFlight);
537 wake_up(&ses->server->request_q);
540 return rc;
542 out_unlock2:
543 up(&ses->server->tcpSem);
544 /* If not lock req, update # of requests on wire to server */
545 if(long_op < 3) {
546 atomic_dec(&ses->server->inFlight);
547 wake_up(&ses->server->request_q);
550 return rc;
552 #endif /* CIFS_EXPERIMENTAL */
555 SendReceive(const unsigned int xid, struct cifsSesInfo *ses,
556 struct smb_hdr *in_buf, struct smb_hdr *out_buf,
557 int *pbytes_returned, const int long_op)
559 int rc = 0;
560 unsigned int receive_len;
561 unsigned long timeout;
562 struct mid_q_entry *midQ;
564 if (ses == NULL) {
565 cERROR(1,("Null smb session"));
566 return -EIO;
568 if(ses->server == NULL) {
569 cERROR(1,("Null tcp session"));
570 return -EIO;
573 if(ses->server->tcpStatus == CifsExiting)
574 return -ENOENT;
576 /* Ensure that we do not send more than 50 overlapping requests
577 to the same server. We may make this configurable later or
578 use ses->maxReq */
579 if(long_op == -1) {
580 /* oplock breaks must not be held up */
581 atomic_inc(&ses->server->inFlight);
582 } else {
583 spin_lock(&GlobalMid_Lock);
584 while(1) {
585 if(atomic_read(&ses->server->inFlight) >=
586 cifs_max_pending){
587 spin_unlock(&GlobalMid_Lock);
588 #ifdef CONFIG_CIFS_STATS2
589 atomic_inc(&ses->server->num_waiters);
590 #endif
591 wait_event(ses->server->request_q,
592 atomic_read(&ses->server->inFlight)
593 < cifs_max_pending);
594 #ifdef CONFIG_CIFS_STATS2
595 atomic_dec(&ses->server->num_waiters);
596 #endif
597 spin_lock(&GlobalMid_Lock);
598 } else {
599 if(ses->server->tcpStatus == CifsExiting) {
600 spin_unlock(&GlobalMid_Lock);
601 return -ENOENT;
604 /* can not count locking commands against total since
605 they are allowed to block on server */
607 if(long_op < 3) {
608 /* update # of requests on the wire to server */
609 atomic_inc(&ses->server->inFlight);
611 spin_unlock(&GlobalMid_Lock);
612 break;
616 /* make sure that we sign in the same order that we send on this socket
617 and avoid races inside tcp sendmsg code that could cause corruption
618 of smb data */
620 down(&ses->server->tcpSem);
622 if (ses->server->tcpStatus == CifsExiting) {
623 rc = -ENOENT;
624 goto out_unlock;
625 } else if (ses->server->tcpStatus == CifsNeedReconnect) {
626 cFYI(1,("tcp session dead - return to caller to retry"));
627 rc = -EAGAIN;
628 goto out_unlock;
629 } else if (ses->status != CifsGood) {
630 /* check if SMB session is bad because we are setting it up */
631 if((in_buf->Command != SMB_COM_SESSION_SETUP_ANDX) &&
632 (in_buf->Command != SMB_COM_NEGOTIATE)) {
633 rc = -EAGAIN;
634 goto out_unlock;
635 } /* else ok - we are setting up session */
637 midQ = AllocMidQEntry(in_buf, ses);
638 if (midQ == NULL) {
639 up(&ses->server->tcpSem);
640 /* If not lock req, update # of requests on wire to server */
641 if(long_op < 3) {
642 atomic_dec(&ses->server->inFlight);
643 wake_up(&ses->server->request_q);
645 return -ENOMEM;
648 if (in_buf->smb_buf_length > CIFSMaxBufSize + MAX_CIFS_HDR_SIZE - 4) {
649 up(&ses->server->tcpSem);
650 cERROR(1,
651 ("Illegal length, greater than maximum frame, %d ",
652 in_buf->smb_buf_length));
653 DeleteMidQEntry(midQ);
654 /* If not lock req, update # of requests on wire to server */
655 if(long_op < 3) {
656 atomic_dec(&ses->server->inFlight);
657 wake_up(&ses->server->request_q);
659 return -EIO;
662 rc = cifs_sign_smb(in_buf, ses->server, &midQ->sequence_number);
664 midQ->midState = MID_REQUEST_SUBMITTED;
665 #ifdef CONFIG_CIFS_STATS2
666 atomic_inc(&ses->server->inSend);
667 #endif
668 rc = smb_send(ses->server->ssocket, in_buf, in_buf->smb_buf_length,
669 (struct sockaddr *) &(ses->server->addr.sockAddr));
670 #ifdef CONFIG_CIFS_STATS2
671 atomic_dec(&ses->server->inSend);
672 midQ->when_sent = jiffies;
673 #endif
674 if(rc < 0) {
675 DeleteMidQEntry(midQ);
676 up(&ses->server->tcpSem);
677 /* If not lock req, update # of requests on wire to server */
678 if(long_op < 3) {
679 atomic_dec(&ses->server->inFlight);
680 wake_up(&ses->server->request_q);
682 return rc;
683 } else
684 up(&ses->server->tcpSem);
685 if (long_op == -1)
686 goto cifs_no_response_exit;
687 else if (long_op == 2) /* writes past end of file can take loong time */
688 timeout = 180 * HZ;
689 else if (long_op == 1)
690 timeout = 45 * HZ; /* should be greater than
691 servers oplock break timeout (about 43 seconds) */
692 else if (long_op > 2) {
693 timeout = MAX_SCHEDULE_TIMEOUT;
694 } else
695 timeout = 15 * HZ;
696 /* wait for 15 seconds or until woken up due to response arriving or
697 due to last connection to this server being unmounted */
698 if (signal_pending(current)) {
699 /* if signal pending do not hold up user for full smb timeout
700 but we still give response a change to complete */
701 timeout = 2 * HZ;
704 /* No user interrupts in wait - wreaks havoc with performance */
705 if(timeout != MAX_SCHEDULE_TIMEOUT) {
706 timeout += jiffies;
707 wait_event(ses->server->response_q,
708 (!(midQ->midState & MID_REQUEST_SUBMITTED)) ||
709 time_after(jiffies, timeout) ||
710 ((ses->server->tcpStatus != CifsGood) &&
711 (ses->server->tcpStatus != CifsNew)));
712 } else {
713 wait_event(ses->server->response_q,
714 (!(midQ->midState & MID_REQUEST_SUBMITTED)) ||
715 ((ses->server->tcpStatus != CifsGood) &&
716 (ses->server->tcpStatus != CifsNew)));
719 spin_lock(&GlobalMid_Lock);
720 if (midQ->resp_buf) {
721 spin_unlock(&GlobalMid_Lock);
722 receive_len = midQ->resp_buf->smb_buf_length;
723 } else {
724 cERROR(1,("No response for cmd %d mid %d",
725 midQ->command, midQ->mid));
726 if(midQ->midState == MID_REQUEST_SUBMITTED) {
727 if(ses->server->tcpStatus == CifsExiting)
728 rc = -EHOSTDOWN;
729 else {
730 ses->server->tcpStatus = CifsNeedReconnect;
731 midQ->midState = MID_RETRY_NEEDED;
735 if (rc != -EHOSTDOWN) {
736 if(midQ->midState == MID_RETRY_NEEDED) {
737 rc = -EAGAIN;
738 cFYI(1,("marking request for retry"));
739 } else {
740 rc = -EIO;
743 spin_unlock(&GlobalMid_Lock);
744 DeleteMidQEntry(midQ);
745 /* If not lock req, update # of requests on wire to server */
746 if(long_op < 3) {
747 atomic_dec(&ses->server->inFlight);
748 wake_up(&ses->server->request_q);
750 return rc;
753 if (receive_len > CIFSMaxBufSize + MAX_CIFS_HDR_SIZE) {
754 cERROR(1, ("Frame too large received. Length: %d Xid: %d",
755 receive_len, xid));
756 rc = -EIO;
757 } else { /* rcvd frame is ok */
759 if (midQ->resp_buf && out_buf
760 && (midQ->midState == MID_RESPONSE_RECEIVED)) {
761 out_buf->smb_buf_length = receive_len;
762 memcpy((char *)out_buf + 4,
763 (char *)midQ->resp_buf + 4,
764 receive_len);
766 dump_smb(out_buf, 92);
767 /* convert the length into a more usable form */
768 if((receive_len > 24) &&
769 (ses->server->secMode & (SECMODE_SIGN_REQUIRED |
770 SECMODE_SIGN_ENABLED))) {
771 rc = cifs_verify_signature(out_buf,
772 ses->server->mac_signing_key,
773 midQ->sequence_number+1);
774 if(rc) {
775 cERROR(1,("Unexpected SMB signature"));
776 /* BB FIXME add code to kill session */
780 *pbytes_returned = out_buf->smb_buf_length;
782 /* BB special case reconnect tid and uid here? */
783 rc = map_smb_to_linux_error(out_buf);
785 /* convert ByteCount if necessary */
786 if (receive_len >=
787 sizeof (struct smb_hdr) -
788 4 /* do not count RFC1001 header */ +
789 (2 * out_buf->WordCount) + 2 /* bcc */ )
790 BCC(out_buf) = le16_to_cpu(BCC_LE(out_buf));
791 } else {
792 rc = -EIO;
793 cERROR(1,("Bad MID state? "));
796 cifs_no_response_exit:
797 DeleteMidQEntry(midQ);
799 if(long_op < 3) {
800 atomic_dec(&ses->server->inFlight);
801 wake_up(&ses->server->request_q);
804 return rc;
806 out_unlock:
807 up(&ses->server->tcpSem);
808 /* If not lock req, update # of requests on wire to server */
809 if(long_op < 3) {
810 atomic_dec(&ses->server->inFlight);
811 wake_up(&ses->server->request_q);
814 return rc;