mirror of
https://github.com/torvalds/linux.git
synced 2024-12-04 18:13:04 +00:00
8e3554150d
When matching DFS connections, we can't rely on the values set in cifs_sb_info::prepath and cifs_tcon::tree_name as they might change during DFS failover. The DFS referrals related to a specific DFS tcon are already matched earlier in match_server(), therefore we can safely skip those checks altogether as the connection is guaranteed to be unique for the DFS tcon. Besides, when creating or finding an SMB session, make sure to also refcount any DFS root session related to it (cifs_ses::dfs_root_ses), so if a new DFS mount ends up reusing the connection from the old mount while there was an umount(2) still in progress (e.g. umount(2) -> cifs_umount() -> reconnect -> cifs_put_tcon()), the connection could potentially be put right after the umount(2) finished. Patch has minor update to include fix for unused variable issue noted by the kernel test robot Reported-by: kernel test robot <lkp@intel.com> Link: https://lore.kernel.org/oe-kbuild-all/202305041040.j7W2xQSy-lkp@intel.com/ Cc: stable@vger.kernel.org # v6.2+ Signed-off-by: Paulo Alcantara (SUSE) <pc@manguebit.com> Signed-off-by: Steve French <stfrench@microsoft.com>
644 lines
16 KiB
C
644 lines
16 KiB
C
// SPDX-License-Identifier: GPL-2.0
|
|
/*
|
|
* Copyright (c) 2022 Paulo Alcantara <palcantara@suse.de>
|
|
*/
|
|
|
|
#include <linux/namei.h>
|
|
#include "cifsproto.h"
|
|
#include "cifs_debug.h"
|
|
#include "dns_resolve.h"
|
|
#include "fs_context.h"
|
|
#include "dfs.h"
|
|
|
|
/**
|
|
* dfs_parse_target_referral - set fs context for dfs target referral
|
|
*
|
|
* @full_path: full path in UNC format.
|
|
* @ref: dfs referral pointer.
|
|
* @ctx: smb3 fs context pointer.
|
|
*
|
|
* Return zero if dfs referral was parsed correctly, otherwise non-zero.
|
|
*/
|
|
int dfs_parse_target_referral(const char *full_path, const struct dfs_info3_param *ref,
|
|
struct smb3_fs_context *ctx)
|
|
{
|
|
int rc;
|
|
const char *prepath = NULL;
|
|
char *path;
|
|
|
|
if (!full_path || !*full_path || !ref || !ctx)
|
|
return -EINVAL;
|
|
|
|
if (WARN_ON_ONCE(!ref->node_name || ref->path_consumed < 0))
|
|
return -EINVAL;
|
|
|
|
if (strlen(full_path) - ref->path_consumed) {
|
|
prepath = full_path + ref->path_consumed;
|
|
/* skip initial delimiter */
|
|
if (*prepath == '/' || *prepath == '\\')
|
|
prepath++;
|
|
}
|
|
|
|
path = cifs_build_devname(ref->node_name, prepath);
|
|
if (IS_ERR(path))
|
|
return PTR_ERR(path);
|
|
|
|
rc = smb3_parse_devname(path, ctx);
|
|
if (rc)
|
|
goto out;
|
|
|
|
rc = dns_resolve_server_name_to_ip(path, (struct sockaddr *)&ctx->dstaddr, NULL);
|
|
|
|
out:
|
|
kfree(path);
|
|
return rc;
|
|
}
|
|
|
|
/*
|
|
* cifs_build_path_to_root returns full path to root when we do not have an
|
|
* existing connection (tcon)
|
|
*/
|
|
static char *build_unc_path_to_root(const struct smb3_fs_context *ctx,
|
|
const struct cifs_sb_info *cifs_sb, bool useppath)
|
|
{
|
|
char *full_path, *pos;
|
|
unsigned int pplen = useppath && ctx->prepath ? strlen(ctx->prepath) + 1 : 0;
|
|
unsigned int unc_len = strnlen(ctx->UNC, MAX_TREE_SIZE + 1);
|
|
|
|
if (unc_len > MAX_TREE_SIZE)
|
|
return ERR_PTR(-EINVAL);
|
|
|
|
full_path = kmalloc(unc_len + pplen + 1, GFP_KERNEL);
|
|
if (full_path == NULL)
|
|
return ERR_PTR(-ENOMEM);
|
|
|
|
memcpy(full_path, ctx->UNC, unc_len);
|
|
pos = full_path + unc_len;
|
|
|
|
if (pplen) {
|
|
*pos = CIFS_DIR_SEP(cifs_sb);
|
|
memcpy(pos + 1, ctx->prepath, pplen);
|
|
pos += pplen;
|
|
}
|
|
|
|
*pos = '\0'; /* add trailing null */
|
|
convert_delimiter(full_path, CIFS_DIR_SEP(cifs_sb));
|
|
cifs_dbg(FYI, "%s: full_path=%s\n", __func__, full_path);
|
|
return full_path;
|
|
}
|
|
|
|
static int get_session(struct cifs_mount_ctx *mnt_ctx, const char *full_path)
|
|
{
|
|
struct smb3_fs_context *ctx = mnt_ctx->fs_ctx;
|
|
int rc;
|
|
|
|
ctx->leaf_fullpath = (char *)full_path;
|
|
rc = cifs_mount_get_session(mnt_ctx);
|
|
ctx->leaf_fullpath = NULL;
|
|
|
|
return rc;
|
|
}
|
|
|
|
static int add_root_smb_session(struct cifs_mount_ctx *mnt_ctx)
|
|
{
|
|
struct smb3_fs_context *ctx = mnt_ctx->fs_ctx;
|
|
struct dfs_root_ses *root_ses;
|
|
struct cifs_ses *ses = mnt_ctx->ses;
|
|
|
|
if (ses) {
|
|
root_ses = kmalloc(sizeof(*root_ses), GFP_KERNEL);
|
|
if (!root_ses)
|
|
return -ENOMEM;
|
|
|
|
INIT_LIST_HEAD(&root_ses->list);
|
|
|
|
spin_lock(&cifs_tcp_ses_lock);
|
|
ses->ses_count++;
|
|
spin_unlock(&cifs_tcp_ses_lock);
|
|
root_ses->ses = ses;
|
|
list_add_tail(&root_ses->list, &mnt_ctx->dfs_ses_list);
|
|
}
|
|
ctx->dfs_root_ses = ses;
|
|
return 0;
|
|
}
|
|
|
|
static int get_dfs_conn(struct cifs_mount_ctx *mnt_ctx, const char *ref_path, const char *full_path,
|
|
const struct dfs_cache_tgt_iterator *tit)
|
|
{
|
|
struct smb3_fs_context *ctx = mnt_ctx->fs_ctx;
|
|
struct dfs_info3_param ref = {};
|
|
bool is_refsrv;
|
|
int rc, rc2;
|
|
|
|
rc = dfs_cache_get_tgt_referral(ref_path + 1, tit, &ref);
|
|
if (rc)
|
|
return rc;
|
|
|
|
rc = dfs_parse_target_referral(full_path + 1, &ref, ctx);
|
|
if (rc)
|
|
goto out;
|
|
|
|
cifs_mount_put_conns(mnt_ctx);
|
|
rc = get_session(mnt_ctx, ref_path);
|
|
if (rc)
|
|
goto out;
|
|
|
|
is_refsrv = !!(ref.flags & DFSREF_REFERRAL_SERVER);
|
|
|
|
rc = -EREMOTE;
|
|
if (ref.flags & DFSREF_STORAGE_SERVER) {
|
|
rc = cifs_mount_get_tcon(mnt_ctx);
|
|
if (rc)
|
|
goto out;
|
|
|
|
/* some servers may not advertise referral capability under ref.flags */
|
|
is_refsrv |= is_tcon_dfs(mnt_ctx->tcon);
|
|
|
|
rc = cifs_is_path_remote(mnt_ctx);
|
|
}
|
|
|
|
dfs_cache_noreq_update_tgthint(ref_path + 1, tit);
|
|
|
|
if (rc == -EREMOTE && is_refsrv) {
|
|
rc2 = add_root_smb_session(mnt_ctx);
|
|
if (rc2)
|
|
rc = rc2;
|
|
}
|
|
|
|
out:
|
|
free_dfs_info_param(&ref);
|
|
return rc;
|
|
}
|
|
|
|
static int __dfs_mount_share(struct cifs_mount_ctx *mnt_ctx)
|
|
{
|
|
struct cifs_sb_info *cifs_sb = mnt_ctx->cifs_sb;
|
|
struct smb3_fs_context *ctx = mnt_ctx->fs_ctx;
|
|
char *ref_path = NULL, *full_path = NULL;
|
|
struct dfs_cache_tgt_iterator *tit;
|
|
struct TCP_Server_Info *server;
|
|
struct cifs_tcon *tcon;
|
|
char *origin_fullpath = NULL;
|
|
int num_links = 0;
|
|
int rc;
|
|
|
|
ref_path = dfs_get_path(cifs_sb, ctx->UNC);
|
|
if (IS_ERR(ref_path))
|
|
return PTR_ERR(ref_path);
|
|
|
|
full_path = build_unc_path_to_root(ctx, cifs_sb, true);
|
|
if (IS_ERR(full_path)) {
|
|
rc = PTR_ERR(full_path);
|
|
full_path = NULL;
|
|
goto out;
|
|
}
|
|
|
|
origin_fullpath = kstrdup(full_path, GFP_KERNEL);
|
|
if (!origin_fullpath) {
|
|
rc = -ENOMEM;
|
|
goto out;
|
|
}
|
|
|
|
do {
|
|
struct dfs_cache_tgt_list tl = DFS_CACHE_TGT_LIST_INIT(tl);
|
|
|
|
rc = dfs_get_referral(mnt_ctx, ref_path + 1, NULL, &tl);
|
|
if (rc)
|
|
break;
|
|
|
|
tit = dfs_cache_get_tgt_iterator(&tl);
|
|
if (!tit) {
|
|
cifs_dbg(VFS, "%s: dfs referral (%s) with no targets\n", __func__,
|
|
ref_path + 1);
|
|
rc = -ENOENT;
|
|
dfs_cache_free_tgts(&tl);
|
|
break;
|
|
}
|
|
|
|
do {
|
|
rc = get_dfs_conn(mnt_ctx, ref_path, full_path, tit);
|
|
if (!rc)
|
|
break;
|
|
if (rc == -EREMOTE) {
|
|
if (++num_links > MAX_NESTED_LINKS) {
|
|
rc = -ELOOP;
|
|
break;
|
|
}
|
|
kfree(ref_path);
|
|
kfree(full_path);
|
|
ref_path = full_path = NULL;
|
|
|
|
full_path = build_unc_path_to_root(ctx, cifs_sb, true);
|
|
if (IS_ERR(full_path)) {
|
|
rc = PTR_ERR(full_path);
|
|
full_path = NULL;
|
|
} else {
|
|
ref_path = dfs_get_path(cifs_sb, full_path);
|
|
if (IS_ERR(ref_path)) {
|
|
rc = PTR_ERR(ref_path);
|
|
ref_path = NULL;
|
|
}
|
|
}
|
|
break;
|
|
}
|
|
} while ((tit = dfs_cache_get_next_tgt(&tl, tit)));
|
|
dfs_cache_free_tgts(&tl);
|
|
} while (rc == -EREMOTE);
|
|
|
|
if (!rc) {
|
|
server = mnt_ctx->server;
|
|
tcon = mnt_ctx->tcon;
|
|
|
|
mutex_lock(&server->refpath_lock);
|
|
spin_lock(&server->srv_lock);
|
|
if (!server->origin_fullpath) {
|
|
server->origin_fullpath = origin_fullpath;
|
|
origin_fullpath = NULL;
|
|
}
|
|
spin_unlock(&server->srv_lock);
|
|
mutex_unlock(&server->refpath_lock);
|
|
|
|
if (list_empty(&tcon->dfs_ses_list)) {
|
|
list_replace_init(&mnt_ctx->dfs_ses_list,
|
|
&tcon->dfs_ses_list);
|
|
queue_delayed_work(dfscache_wq, &tcon->dfs_cache_work,
|
|
dfs_cache_get_ttl() * HZ);
|
|
} else {
|
|
dfs_put_root_smb_sessions(&mnt_ctx->dfs_ses_list);
|
|
}
|
|
}
|
|
|
|
out:
|
|
kfree(origin_fullpath);
|
|
kfree(ref_path);
|
|
kfree(full_path);
|
|
return rc;
|
|
}
|
|
|
|
int dfs_mount_share(struct cifs_mount_ctx *mnt_ctx, bool *isdfs)
|
|
{
|
|
struct smb3_fs_context *ctx = mnt_ctx->fs_ctx;
|
|
struct cifs_ses *ses;
|
|
char *source = ctx->source;
|
|
bool nodfs = ctx->nodfs;
|
|
int rc;
|
|
|
|
*isdfs = false;
|
|
/* Temporarily set @ctx->source to NULL as we're not matching DFS
|
|
* superblocks yet. See cifs_match_super() and match_server().
|
|
*/
|
|
ctx->source = NULL;
|
|
rc = get_session(mnt_ctx, NULL);
|
|
if (rc)
|
|
goto out;
|
|
|
|
ctx->dfs_root_ses = mnt_ctx->ses;
|
|
/*
|
|
* If called with 'nodfs' mount option, then skip DFS resolving. Otherwise unconditionally
|
|
* try to get an DFS referral (even cached) to determine whether it is an DFS mount.
|
|
*
|
|
* Skip prefix path to provide support for DFS referrals from w2k8 servers which don't seem
|
|
* to respond with PATH_NOT_COVERED to requests that include the prefix.
|
|
*/
|
|
if (!nodfs) {
|
|
rc = dfs_get_referral(mnt_ctx, ctx->UNC + 1, NULL, NULL);
|
|
if (rc) {
|
|
if (rc != -ENOENT && rc != -EOPNOTSUPP)
|
|
goto out;
|
|
nodfs = true;
|
|
}
|
|
}
|
|
if (nodfs) {
|
|
rc = cifs_mount_get_tcon(mnt_ctx);
|
|
if (!rc)
|
|
rc = cifs_is_path_remote(mnt_ctx);
|
|
goto out;
|
|
}
|
|
|
|
*isdfs = true;
|
|
/*
|
|
* Prevent DFS root session of being put in the first call to
|
|
* cifs_mount_put_conns(). If another DFS root server was not found
|
|
* while chasing the referrals (@ctx->dfs_root_ses == @ses), then we
|
|
* can safely put extra refcount of @ses.
|
|
*/
|
|
ses = mnt_ctx->ses;
|
|
mnt_ctx->ses = NULL;
|
|
mnt_ctx->server = NULL;
|
|
rc = __dfs_mount_share(mnt_ctx);
|
|
if (ses == ctx->dfs_root_ses)
|
|
cifs_put_smb_ses(ses);
|
|
out:
|
|
/*
|
|
* Restore previous value of @ctx->source so DFS superblock can be
|
|
* matched in cifs_match_super().
|
|
*/
|
|
ctx->source = source;
|
|
return rc;
|
|
}
|
|
|
|
/* Update dfs referral path of superblock */
|
|
static int update_server_fullpath(struct TCP_Server_Info *server, struct cifs_sb_info *cifs_sb,
|
|
const char *target)
|
|
{
|
|
int rc = 0;
|
|
size_t len = strlen(target);
|
|
char *refpath, *npath;
|
|
|
|
if (unlikely(len < 2 || *target != '\\'))
|
|
return -EINVAL;
|
|
|
|
if (target[1] == '\\') {
|
|
len += 1;
|
|
refpath = kmalloc(len, GFP_KERNEL);
|
|
if (!refpath)
|
|
return -ENOMEM;
|
|
|
|
scnprintf(refpath, len, "%s", target);
|
|
} else {
|
|
len += sizeof("\\");
|
|
refpath = kmalloc(len, GFP_KERNEL);
|
|
if (!refpath)
|
|
return -ENOMEM;
|
|
|
|
scnprintf(refpath, len, "\\%s", target);
|
|
}
|
|
|
|
npath = dfs_cache_canonical_path(refpath, cifs_sb->local_nls, cifs_remap(cifs_sb));
|
|
kfree(refpath);
|
|
|
|
if (IS_ERR(npath)) {
|
|
rc = PTR_ERR(npath);
|
|
} else {
|
|
mutex_lock(&server->refpath_lock);
|
|
spin_lock(&server->srv_lock);
|
|
kfree(server->leaf_fullpath);
|
|
server->leaf_fullpath = npath;
|
|
spin_unlock(&server->srv_lock);
|
|
mutex_unlock(&server->refpath_lock);
|
|
}
|
|
return rc;
|
|
}
|
|
|
|
static int target_share_matches_server(struct TCP_Server_Info *server, char *share,
|
|
bool *target_match)
|
|
{
|
|
int rc = 0;
|
|
const char *dfs_host;
|
|
size_t dfs_host_len;
|
|
|
|
*target_match = true;
|
|
extract_unc_hostname(share, &dfs_host, &dfs_host_len);
|
|
|
|
/* Check if hostnames or addresses match */
|
|
cifs_server_lock(server);
|
|
if (dfs_host_len != strlen(server->hostname) ||
|
|
strncasecmp(dfs_host, server->hostname, dfs_host_len)) {
|
|
cifs_dbg(FYI, "%s: %.*s doesn't match %s\n", __func__,
|
|
(int)dfs_host_len, dfs_host, server->hostname);
|
|
rc = match_target_ip(server, dfs_host, dfs_host_len, target_match);
|
|
if (rc)
|
|
cifs_dbg(VFS, "%s: failed to match target ip: %d\n", __func__, rc);
|
|
}
|
|
cifs_server_unlock(server);
|
|
return rc;
|
|
}
|
|
|
|
static void __tree_connect_ipc(const unsigned int xid, char *tree,
|
|
struct cifs_sb_info *cifs_sb,
|
|
struct cifs_ses *ses)
|
|
{
|
|
struct TCP_Server_Info *server = ses->server;
|
|
struct cifs_tcon *tcon = ses->tcon_ipc;
|
|
int rc;
|
|
|
|
spin_lock(&ses->ses_lock);
|
|
spin_lock(&ses->chan_lock);
|
|
if (cifs_chan_needs_reconnect(ses, server) ||
|
|
ses->ses_status != SES_GOOD) {
|
|
spin_unlock(&ses->chan_lock);
|
|
spin_unlock(&ses->ses_lock);
|
|
cifs_server_dbg(FYI, "%s: skipping ipc reconnect due to disconnected ses\n",
|
|
__func__);
|
|
return;
|
|
}
|
|
spin_unlock(&ses->chan_lock);
|
|
spin_unlock(&ses->ses_lock);
|
|
|
|
cifs_server_lock(server);
|
|
scnprintf(tree, MAX_TREE_SIZE, "\\\\%s\\IPC$", server->hostname);
|
|
cifs_server_unlock(server);
|
|
|
|
rc = server->ops->tree_connect(xid, ses, tree, tcon,
|
|
cifs_sb->local_nls);
|
|
cifs_server_dbg(FYI, "%s: tree_reconnect %s: %d\n", __func__, tree, rc);
|
|
spin_lock(&tcon->tc_lock);
|
|
if (rc) {
|
|
tcon->status = TID_NEED_TCON;
|
|
} else {
|
|
tcon->status = TID_GOOD;
|
|
tcon->need_reconnect = false;
|
|
}
|
|
spin_unlock(&tcon->tc_lock);
|
|
}
|
|
|
|
static void tree_connect_ipc(const unsigned int xid, char *tree,
|
|
struct cifs_sb_info *cifs_sb,
|
|
struct cifs_tcon *tcon)
|
|
{
|
|
struct cifs_ses *ses = tcon->ses;
|
|
|
|
__tree_connect_ipc(xid, tree, cifs_sb, ses);
|
|
__tree_connect_ipc(xid, tree, cifs_sb, CIFS_DFS_ROOT_SES(ses));
|
|
}
|
|
|
|
static int __tree_connect_dfs_target(const unsigned int xid, struct cifs_tcon *tcon,
|
|
struct cifs_sb_info *cifs_sb, char *tree, bool islink,
|
|
struct dfs_cache_tgt_list *tl)
|
|
{
|
|
int rc;
|
|
struct TCP_Server_Info *server = tcon->ses->server;
|
|
const struct smb_version_operations *ops = server->ops;
|
|
struct cifs_ses *root_ses = CIFS_DFS_ROOT_SES(tcon->ses);
|
|
char *share = NULL, *prefix = NULL;
|
|
struct dfs_cache_tgt_iterator *tit;
|
|
bool target_match;
|
|
|
|
tit = dfs_cache_get_tgt_iterator(tl);
|
|
if (!tit) {
|
|
rc = -ENOENT;
|
|
goto out;
|
|
}
|
|
|
|
/* Try to tree connect to all dfs targets */
|
|
for (; tit; tit = dfs_cache_get_next_tgt(tl, tit)) {
|
|
const char *target = dfs_cache_get_tgt_name(tit);
|
|
struct dfs_cache_tgt_list ntl = DFS_CACHE_TGT_LIST_INIT(ntl);
|
|
|
|
kfree(share);
|
|
kfree(prefix);
|
|
share = prefix = NULL;
|
|
|
|
/* Check if share matches with tcp ses */
|
|
rc = dfs_cache_get_tgt_share(server->leaf_fullpath + 1, tit, &share, &prefix);
|
|
if (rc) {
|
|
cifs_dbg(VFS, "%s: failed to parse target share: %d\n", __func__, rc);
|
|
break;
|
|
}
|
|
|
|
rc = target_share_matches_server(server, share, &target_match);
|
|
if (rc)
|
|
break;
|
|
if (!target_match) {
|
|
rc = -EHOSTUNREACH;
|
|
continue;
|
|
}
|
|
|
|
dfs_cache_noreq_update_tgthint(server->leaf_fullpath + 1, tit);
|
|
tree_connect_ipc(xid, tree, cifs_sb, tcon);
|
|
|
|
scnprintf(tree, MAX_TREE_SIZE, "\\%s", share);
|
|
if (!islink) {
|
|
rc = ops->tree_connect(xid, tcon->ses, tree, tcon, cifs_sb->local_nls);
|
|
break;
|
|
}
|
|
|
|
/*
|
|
* If no dfs referrals were returned from link target, then just do a TREE_CONNECT
|
|
* to it. Otherwise, cache the dfs referral and then mark current tcp ses for
|
|
* reconnect so either the demultiplex thread or the echo worker will reconnect to
|
|
* newly resolved target.
|
|
*/
|
|
if (dfs_cache_find(xid, root_ses, cifs_sb->local_nls, cifs_remap(cifs_sb), target,
|
|
NULL, &ntl)) {
|
|
rc = ops->tree_connect(xid, tcon->ses, tree, tcon, cifs_sb->local_nls);
|
|
if (rc)
|
|
continue;
|
|
|
|
rc = cifs_update_super_prepath(cifs_sb, prefix);
|
|
} else {
|
|
/* Target is another dfs share */
|
|
rc = update_server_fullpath(server, cifs_sb, target);
|
|
dfs_cache_free_tgts(tl);
|
|
|
|
if (!rc) {
|
|
rc = -EREMOTE;
|
|
list_replace_init(&ntl.tl_list, &tl->tl_list);
|
|
} else
|
|
dfs_cache_free_tgts(&ntl);
|
|
}
|
|
break;
|
|
}
|
|
|
|
out:
|
|
kfree(share);
|
|
kfree(prefix);
|
|
|
|
return rc;
|
|
}
|
|
|
|
static int tree_connect_dfs_target(const unsigned int xid, struct cifs_tcon *tcon,
|
|
struct cifs_sb_info *cifs_sb, char *tree, bool islink,
|
|
struct dfs_cache_tgt_list *tl)
|
|
{
|
|
int rc;
|
|
int num_links = 0;
|
|
struct TCP_Server_Info *server = tcon->ses->server;
|
|
char *old_fullpath = server->leaf_fullpath;
|
|
|
|
do {
|
|
rc = __tree_connect_dfs_target(xid, tcon, cifs_sb, tree, islink, tl);
|
|
if (!rc || rc != -EREMOTE)
|
|
break;
|
|
} while (rc = -ELOOP, ++num_links < MAX_NESTED_LINKS);
|
|
/*
|
|
* If we couldn't tree connect to any targets from last referral path, then
|
|
* retry it from newly resolved dfs referral.
|
|
*/
|
|
if (rc && server->leaf_fullpath != old_fullpath)
|
|
cifs_signal_cifsd_for_reconnect(server, true);
|
|
|
|
dfs_cache_free_tgts(tl);
|
|
return rc;
|
|
}
|
|
|
|
int cifs_tree_connect(const unsigned int xid, struct cifs_tcon *tcon, const struct nls_table *nlsc)
|
|
{
|
|
int rc;
|
|
struct TCP_Server_Info *server = tcon->ses->server;
|
|
const struct smb_version_operations *ops = server->ops;
|
|
struct super_block *sb = NULL;
|
|
struct cifs_sb_info *cifs_sb;
|
|
struct dfs_cache_tgt_list tl = DFS_CACHE_TGT_LIST_INIT(tl);
|
|
char *tree;
|
|
struct dfs_info3_param ref = {0};
|
|
|
|
/* only send once per connect */
|
|
spin_lock(&tcon->tc_lock);
|
|
if (tcon->status != TID_NEW &&
|
|
tcon->status != TID_NEED_TCON) {
|
|
spin_unlock(&tcon->tc_lock);
|
|
return -EHOSTDOWN;
|
|
}
|
|
|
|
if (tcon->status == TID_GOOD) {
|
|
spin_unlock(&tcon->tc_lock);
|
|
return 0;
|
|
}
|
|
tcon->status = TID_IN_TCON;
|
|
spin_unlock(&tcon->tc_lock);
|
|
|
|
tree = kzalloc(MAX_TREE_SIZE, GFP_KERNEL);
|
|
if (!tree) {
|
|
rc = -ENOMEM;
|
|
goto out;
|
|
}
|
|
|
|
if (tcon->ipc) {
|
|
cifs_server_lock(server);
|
|
scnprintf(tree, MAX_TREE_SIZE, "\\\\%s\\IPC$", server->hostname);
|
|
cifs_server_unlock(server);
|
|
rc = ops->tree_connect(xid, tcon->ses, tree, tcon, nlsc);
|
|
goto out;
|
|
}
|
|
|
|
sb = cifs_get_tcp_super(server);
|
|
if (IS_ERR(sb)) {
|
|
rc = PTR_ERR(sb);
|
|
cifs_dbg(VFS, "%s: could not find superblock: %d\n", __func__, rc);
|
|
goto out;
|
|
}
|
|
|
|
cifs_sb = CIFS_SB(sb);
|
|
|
|
/* If it is not dfs or there was no cached dfs referral, then reconnect to same share */
|
|
if (!server->leaf_fullpath ||
|
|
dfs_cache_noreq_find(server->leaf_fullpath + 1, &ref, &tl)) {
|
|
rc = ops->tree_connect(xid, tcon->ses, tcon->tree_name, tcon, cifs_sb->local_nls);
|
|
goto out;
|
|
}
|
|
|
|
rc = tree_connect_dfs_target(xid, tcon, cifs_sb, tree, ref.server_type == DFS_TYPE_LINK,
|
|
&tl);
|
|
free_dfs_info_param(&ref);
|
|
|
|
out:
|
|
kfree(tree);
|
|
cifs_put_tcp_super(sb);
|
|
|
|
if (rc) {
|
|
spin_lock(&tcon->tc_lock);
|
|
if (tcon->status == TID_IN_TCON)
|
|
tcon->status = TID_NEED_TCON;
|
|
spin_unlock(&tcon->tc_lock);
|
|
} else {
|
|
spin_lock(&tcon->tc_lock);
|
|
if (tcon->status == TID_IN_TCON)
|
|
tcon->status = TID_GOOD;
|
|
spin_unlock(&tcon->tc_lock);
|
|
tcon->need_reconnect = false;
|
|
}
|
|
|
|
return rc;
|
|
}
|