Commit | Line | Data |
---|---|---|
1da177e4 LT |
1 | /* |
2 | * fs/cifs/cifsfs.c | |
3 | * | |
2b280fab | 4 | * Copyright (C) International Business Machines Corp., 2002,2008 |
1da177e4 LT |
5 | * Author(s): Steve French (sfrench@us.ibm.com) |
6 | * | |
7 | * Common Internet FileSystem (CIFS) client | |
8 | * | |
9 | * This library is free software; you can redistribute it and/or modify | |
10 | * it under the terms of the GNU Lesser General Public License as published | |
11 | * by the Free Software Foundation; either version 2.1 of the License, or | |
12 | * (at your option) any later version. | |
13 | * | |
14 | * This library is distributed in the hope that it will be useful, | |
15 | * but WITHOUT ANY WARRANTY; without even the implied warranty of | |
16 | * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See | |
17 | * the GNU Lesser General Public License for more details. | |
18 | * | |
19 | * You should have received a copy of the GNU Lesser General Public License | |
20 | * along with this library; if not, write to the Free Software | |
21 | * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA | |
22 | */ | |
23 | ||
24 | /* Note that BB means BUGBUG (ie something to fix eventually) */ | |
25 | ||
26 | #include <linux/module.h> | |
27 | #include <linux/fs.h> | |
28 | #include <linux/mount.h> | |
29 | #include <linux/slab.h> | |
30 | #include <linux/init.h> | |
31 | #include <linux/list.h> | |
32 | #include <linux/seq_file.h> | |
33 | #include <linux/vfs.h> | |
34 | #include <linux/mempool.h> | |
6ab16d24 | 35 | #include <linux/delay.h> |
45af7a0f | 36 | #include <linux/kthread.h> |
7dfb7103 | 37 | #include <linux/freezer.h> |
fec11dd9 | 38 | #include <linux/namei.h> |
b8c32dbb | 39 | #include <linux/random.h> |
3eb9a889 | 40 | #include <net/ipv6.h> |
1da177e4 LT |
41 | #include "cifsfs.h" |
42 | #include "cifspdu.h" | |
43 | #define DECLARE_GLOBALS_HERE | |
44 | #include "cifsglob.h" | |
45 | #include "cifsproto.h" | |
46 | #include "cifs_debug.h" | |
47 | #include "cifs_fs_sb.h" | |
48 | #include <linux/mm.h> | |
84a15b93 | 49 | #include <linux/key-type.h> |
e545937a | 50 | #include "cifs_spnego.h" |
f579cf3c | 51 | #include "fscache.h" |
3792c173 PS |
52 | #ifdef CONFIG_CIFS_SMB2 |
53 | #include "smb2pdu.h" | |
54 | #endif | |
1da177e4 | 55 | |
1da177e4 | 56 | int cifsFYI = 0; |
1da177e4 | 57 | int traceSMB = 0; |
e7504734 | 58 | bool enable_oplocks = true; |
1da177e4 LT |
59 | unsigned int linuxExtEnabled = 1; |
60 | unsigned int lookupCacheEnabled = 1; | |
04912d6a | 61 | unsigned int global_secflags = CIFSSEC_DEF; |
3979877e | 62 | /* unsigned int ntlmv2_support = 0; */ |
1da177e4 | 63 | unsigned int sign_CIFS_PDUs = 1; |
ee9b6d61 | 64 | static const struct super_operations cifs_super_ops; |
1da177e4 | 65 | unsigned int CIFSMaxBufSize = CIFS_MAX_MSGSIZE; |
60654ce0 | 66 | module_param(CIFSMaxBufSize, uint, 0); |
63135e08 SF |
67 | MODULE_PARM_DESC(CIFSMaxBufSize, "Network buffer size (not including header). " |
68 | "Default: 16384 Range: 8192 to 130048"); | |
1da177e4 | 69 | unsigned int cifs_min_rcv = CIFS_MIN_RCV_POOL; |
60654ce0 | 70 | module_param(cifs_min_rcv, uint, 0); |
63135e08 SF |
71 | MODULE_PARM_DESC(cifs_min_rcv, "Network buffers in pool. Default: 4 Range: " |
72 | "1 to 64"); | |
1da177e4 | 73 | unsigned int cifs_min_small = 30; |
60654ce0 | 74 | module_param(cifs_min_small, uint, 0); |
63135e08 SF |
75 | MODULE_PARM_DESC(cifs_min_small, "Small network buffers in pool. Default: 30 " |
76 | "Range: 2 to 256"); | |
1da177e4 | 77 | unsigned int cifs_max_pending = CIFS_MAX_REQ; |
60654ce0 | 78 | module_param(cifs_max_pending, uint, 0444); |
63135e08 | 79 | MODULE_PARM_DESC(cifs_max_pending, "Simultaneous requests to server. " |
10b9b98e | 80 | "Default: 32767 Range: 2 to 32767."); |
e7504734 | 81 | module_param(enable_oplocks, bool, 0644); |
60654ce0 | 82 | MODULE_PARM_DESC(enable_oplocks, "Enable or disable oplocks. Default: y/Y/1"); |
e7504734 | 83 | |
1da177e4 LT |
84 | extern mempool_t *cifs_sm_req_poolp; |
85 | extern mempool_t *cifs_req_poolp; | |
86 | extern mempool_t *cifs_mid_poolp; | |
87 | ||
da472fc8 JL |
88 | struct workqueue_struct *cifsiod_wq; |
89 | ||
b8c32dbb PS |
90 | #ifdef CONFIG_CIFS_SMB2 |
91 | __u8 cifs_client_guid[SMB2_CLIENT_GUID_SIZE]; | |
92 | #endif | |
93 | ||
24261fc2 MG |
94 | /* |
95 | * Bumps refcount for cifs super block. | |
96 | * Note that it should be only called if a referece to VFS super block is | |
97 | * already held, e.g. in open-type syscalls context. Otherwise it can race with | |
98 | * atomic_dec_and_test in deactivate_locked_super. | |
99 | */ | |
100 | void | |
101 | cifs_sb_active(struct super_block *sb) | |
102 | { | |
103 | struct cifs_sb_info *server = CIFS_SB(sb); | |
104 | ||
105 | if (atomic_inc_return(&server->active) == 1) | |
106 | atomic_inc(&sb->s_active); | |
107 | } | |
108 | ||
109 | void | |
110 | cifs_sb_deactive(struct super_block *sb) | |
111 | { | |
112 | struct cifs_sb_info *server = CIFS_SB(sb); | |
113 | ||
114 | if (atomic_dec_and_test(&server->active)) | |
115 | deactivate_super(sb); | |
116 | } | |
117 | ||
1da177e4 | 118 | static int |
97d1152a | 119 | cifs_read_super(struct super_block *sb) |
1da177e4 LT |
120 | { |
121 | struct inode *inode; | |
b2e5cd33 | 122 | struct cifs_sb_info *cifs_sb; |
1da177e4 | 123 | int rc = 0; |
50c2f753 | 124 | |
b2e5cd33 | 125 | cifs_sb = CIFS_SB(sb); |
1da177e4 | 126 | |
2c6292ae AV |
127 | if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_POSIXACL) |
128 | sb->s_flags |= MS_POSIXACL; | |
129 | ||
130 | if (cifs_sb_master_tcon(cifs_sb)->ses->capabilities & CAP_LARGE_FILES) | |
131 | sb->s_maxbytes = MAX_LFS_FILESIZE; | |
132 | else | |
133 | sb->s_maxbytes = MAX_NON_LFS; | |
134 | ||
135 | /* BB FIXME fix time_gran to be larger for LANMAN sessions */ | |
136 | sb->s_time_gran = 100; | |
137 | ||
1da177e4 LT |
138 | sb->s_magic = CIFS_MAGIC_NUMBER; |
139 | sb->s_op = &cifs_super_ops; | |
8044f7f4 | 140 | sb->s_bdi = &cifs_sb->bdi; |
1da177e4 LT |
141 | sb->s_blocksize = CIFS_MAX_MSGSIZE; |
142 | sb->s_blocksize_bits = 14; /* default 2**14 = CIFS_MAX_MSGSIZE */ | |
9b6763e0 | 143 | inode = cifs_root_iget(sb); |
1da177e4 | 144 | |
ce634ab2 DH |
145 | if (IS_ERR(inode)) { |
146 | rc = PTR_ERR(inode); | |
1da177e4 LT |
147 | goto out_no_root; |
148 | } | |
149 | ||
48fde701 | 150 | sb->s_root = d_make_root(inode); |
1da177e4 LT |
151 | if (!sb->s_root) { |
152 | rc = -ENOMEM; | |
153 | goto out_no_root; | |
154 | } | |
50c2f753 | 155 | |
ea4b5740 | 156 | /* do that *after* d_make_root() - we want NULL ->d_op for root here */ |
1c929cfe AV |
157 | if (cifs_sb_master_tcon(cifs_sb)->nocase) |
158 | sb->s_d_op = &cifs_ci_dentry_ops; | |
159 | else | |
160 | sb->s_d_op = &cifs_dentry_ops; | |
161 | ||
f3a6a60e | 162 | #ifdef CONFIG_CIFS_NFSD_EXPORT |
7521a3c5 | 163 | if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_SERVER_INUM) { |
f96637be | 164 | cifs_dbg(FYI, "export ops supported\n"); |
7521a3c5 SF |
165 | sb->s_export_op = &cifs_export_ops; |
166 | } | |
f3a6a60e | 167 | #endif /* CONFIG_CIFS_NFSD_EXPORT */ |
1da177e4 LT |
168 | |
169 | return 0; | |
170 | ||
171 | out_no_root: | |
f96637be | 172 | cifs_dbg(VFS, "%s: get root inode failed\n", __func__); |
1da177e4 LT |
173 | return rc; |
174 | } | |
175 | ||
6d686175 AV |
176 | static void cifs_kill_sb(struct super_block *sb) |
177 | { | |
178 | struct cifs_sb_info *cifs_sb = CIFS_SB(sb); | |
179 | kill_anon_super(sb); | |
98ab494d | 180 | cifs_umount(cifs_sb); |
1da177e4 LT |
181 | } |
182 | ||
183 | static int | |
726c3342 | 184 | cifs_statfs(struct dentry *dentry, struct kstatfs *buf) |
1da177e4 | 185 | { |
726c3342 | 186 | struct super_block *sb = dentry->d_sb; |
39da9847 | 187 | struct cifs_sb_info *cifs_sb = CIFS_SB(sb); |
96daf2b0 | 188 | struct cifs_tcon *tcon = cifs_sb_master_tcon(cifs_sb); |
76ec5e33 | 189 | struct TCP_Server_Info *server = tcon->ses->server; |
6d5786a3 | 190 | unsigned int xid; |
76ec5e33 | 191 | int rc = 0; |
1da177e4 | 192 | |
6d5786a3 | 193 | xid = get_xid(); |
1da177e4 | 194 | |
39da9847 SF |
195 | /* |
196 | * PATH_MAX may be too long - it would presumably be total path, | |
197 | * but note that some servers (includinng Samba 3) have a shorter | |
198 | * maximum path. | |
199 | * | |
200 | * Instead could get the real value via SMB_QUERY_FS_ATTRIBUTE_INFO. | |
201 | */ | |
202 | buf->f_namelen = PATH_MAX; | |
1da177e4 LT |
203 | buf->f_files = 0; /* undefined */ |
204 | buf->f_ffree = 0; /* unlimited */ | |
205 | ||
76ec5e33 PS |
206 | if (server->ops->queryfs) |
207 | rc = server->ops->queryfs(xid, tcon, buf); | |
39da9847 | 208 | |
6d5786a3 | 209 | free_xid(xid); |
39da9847 | 210 | return 0; |
1da177e4 LT |
211 | } |
212 | ||
10556cb2 | 213 | static int cifs_permission(struct inode *inode, int mask) |
1da177e4 LT |
214 | { |
215 | struct cifs_sb_info *cifs_sb; | |
216 | ||
217 | cifs_sb = CIFS_SB(inode->i_sb); | |
218 | ||
f696a365 MS |
219 | if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_NO_PERM) { |
220 | if ((mask & MAY_EXEC) && !execute_ok(inode)) | |
221 | return -EACCES; | |
222 | else | |
223 | return 0; | |
224 | } else /* file mode might have been restricted at mount time | |
50c2f753 | 225 | on the client (above and beyond ACL on servers) for |
1da177e4 | 226 | servers which do not support setting and viewing mode bits, |
50c2f753 | 227 | so allowing client to check permissions is useful */ |
2830ba7f | 228 | return generic_permission(inode, mask); |
1da177e4 LT |
229 | } |
230 | ||
e18b890b CL |
231 | static struct kmem_cache *cifs_inode_cachep; |
232 | static struct kmem_cache *cifs_req_cachep; | |
233 | static struct kmem_cache *cifs_mid_cachep; | |
e18b890b | 234 | static struct kmem_cache *cifs_sm_req_cachep; |
1da177e4 LT |
235 | mempool_t *cifs_sm_req_poolp; |
236 | mempool_t *cifs_req_poolp; | |
237 | mempool_t *cifs_mid_poolp; | |
238 | ||
239 | static struct inode * | |
240 | cifs_alloc_inode(struct super_block *sb) | |
241 | { | |
242 | struct cifsInodeInfo *cifs_inode; | |
e94b1766 | 243 | cifs_inode = kmem_cache_alloc(cifs_inode_cachep, GFP_KERNEL); |
1da177e4 LT |
244 | if (!cifs_inode) |
245 | return NULL; | |
246 | cifs_inode->cifsAttrs = 0x20; /* default */ | |
1da177e4 | 247 | cifs_inode->time = 0; |
b8c32dbb PS |
248 | /* |
249 | * Until the file is open and we have gotten oplock info back from the | |
250 | * server, can not assume caching of file data or metadata. | |
251 | */ | |
c6723628 | 252 | cifs_set_oplock_level(cifs_inode, 0); |
9a8165fc | 253 | cifs_inode->delete_pending = false; |
df2cf170 | 254 | cifs_inode->invalid_mapping = false; |
1da177e4 | 255 | cifs_inode->vfs_inode.i_blkbits = 14; /* 2**14 = CIFS_MAX_MSGSIZE */ |
fbec9ab9 | 256 | cifs_inode->server_eof = 0; |
20054bd6 JL |
257 | cifs_inode->uniqueid = 0; |
258 | cifs_inode->createtime = 0; | |
b8c32dbb PS |
259 | #ifdef CONFIG_CIFS_SMB2 |
260 | get_random_bytes(cifs_inode->lease_key, SMB2_LEASE_KEY_SIZE); | |
261 | #endif | |
262 | /* | |
263 | * Can not set i_flags here - they get immediately overwritten to zero | |
264 | * by the VFS. | |
265 | */ | |
266 | /* cifs_inode->vfs_inode.i_flags = S_NOATIME | S_NOCMTIME; */ | |
1da177e4 | 267 | INIT_LIST_HEAD(&cifs_inode->openFileList); |
f45d3416 | 268 | INIT_LIST_HEAD(&cifs_inode->llist); |
1da177e4 LT |
269 | return &cifs_inode->vfs_inode; |
270 | } | |
271 | ||
fa0d7e3d NP |
272 | static void cifs_i_callback(struct rcu_head *head) |
273 | { | |
274 | struct inode *inode = container_of(head, struct inode, i_rcu); | |
fa0d7e3d NP |
275 | kmem_cache_free(cifs_inode_cachep, CIFS_I(inode)); |
276 | } | |
277 | ||
1da177e4 LT |
278 | static void |
279 | cifs_destroy_inode(struct inode *inode) | |
280 | { | |
fa0d7e3d | 281 | call_rcu(&inode->i_rcu, cifs_i_callback); |
1da177e4 LT |
282 | } |
283 | ||
9451a9a5 | 284 | static void |
b57922d9 | 285 | cifs_evict_inode(struct inode *inode) |
9451a9a5 | 286 | { |
b57922d9 | 287 | truncate_inode_pages(&inode->i_data, 0); |
dbd5768f | 288 | clear_inode(inode); |
9451a9a5 SJ |
289 | cifs_fscache_release_inode_cookie(inode); |
290 | } | |
291 | ||
61f98ffd JL |
292 | static void |
293 | cifs_show_address(struct seq_file *s, struct TCP_Server_Info *server) | |
294 | { | |
a9f1b85e PS |
295 | struct sockaddr_in *sa = (struct sockaddr_in *) &server->dstaddr; |
296 | struct sockaddr_in6 *sa6 = (struct sockaddr_in6 *) &server->dstaddr; | |
297 | ||
61f98ffd JL |
298 | seq_printf(s, ",addr="); |
299 | ||
a9f1b85e | 300 | switch (server->dstaddr.ss_family) { |
61f98ffd | 301 | case AF_INET: |
a9f1b85e | 302 | seq_printf(s, "%pI4", &sa->sin_addr.s_addr); |
61f98ffd JL |
303 | break; |
304 | case AF_INET6: | |
a9f1b85e PS |
305 | seq_printf(s, "%pI6", &sa6->sin6_addr.s6_addr); |
306 | if (sa6->sin6_scope_id) | |
307 | seq_printf(s, "%%%u", sa6->sin6_scope_id); | |
61f98ffd JL |
308 | break; |
309 | default: | |
310 | seq_printf(s, "(unknown)"); | |
311 | } | |
312 | } | |
313 | ||
3e715513 JL |
314 | static void |
315 | cifs_show_security(struct seq_file *s, struct TCP_Server_Info *server) | |
316 | { | |
317 | seq_printf(s, ",sec="); | |
318 | ||
319 | switch (server->secType) { | |
320 | case LANMAN: | |
321 | seq_printf(s, "lanman"); | |
322 | break; | |
323 | case NTLMv2: | |
324 | seq_printf(s, "ntlmv2"); | |
325 | break; | |
326 | case NTLM: | |
327 | seq_printf(s, "ntlm"); | |
328 | break; | |
329 | case Kerberos: | |
330 | seq_printf(s, "krb5"); | |
331 | break; | |
332 | case RawNTLMSSP: | |
333 | seq_printf(s, "ntlmssp"); | |
334 | break; | |
335 | default: | |
336 | /* shouldn't ever happen */ | |
337 | seq_printf(s, "unknown"); | |
338 | break; | |
339 | } | |
340 | ||
341 | if (server->sec_mode & (SECMODE_SIGN_REQUIRED | SECMODE_SIGN_ENABLED)) | |
342 | seq_printf(s, "i"); | |
343 | } | |
344 | ||
d06b5056 JL |
345 | static void |
346 | cifs_show_cache_flavor(struct seq_file *s, struct cifs_sb_info *cifs_sb) | |
347 | { | |
348 | seq_printf(s, ",cache="); | |
349 | ||
350 | if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_STRICT_IO) | |
351 | seq_printf(s, "strict"); | |
352 | else if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_DIRECT_IO) | |
353 | seq_printf(s, "none"); | |
354 | else | |
355 | seq_printf(s, "loose"); | |
356 | } | |
357 | ||
1da177e4 LT |
358 | /* |
359 | * cifs_show_options() is for displaying mount options in /proc/mounts. | |
360 | * Not all settable options are displayed but most of the important | |
361 | * ones are. | |
362 | */ | |
363 | static int | |
34c80b1d | 364 | cifs_show_options(struct seq_file *s, struct dentry *root) |
1da177e4 | 365 | { |
34c80b1d | 366 | struct cifs_sb_info *cifs_sb = CIFS_SB(root->d_sb); |
96daf2b0 | 367 | struct cifs_tcon *tcon = cifs_sb_master_tcon(cifs_sb); |
3eb9a889 BG |
368 | struct sockaddr *srcaddr; |
369 | srcaddr = (struct sockaddr *)&tcon->ses->server->srcaddr; | |
8616e0fc | 370 | |
23db65f5 | 371 | seq_printf(s, ",vers=%s", tcon->ses->server->vals->version_string); |
3e715513 | 372 | cifs_show_security(s, tcon->ses->server); |
d06b5056 | 373 | cifs_show_cache_flavor(s, cifs_sb); |
3e715513 | 374 | |
29e07c82 JL |
375 | if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_MULTIUSER) |
376 | seq_printf(s, ",multiuser"); | |
8727c8a8 SF |
377 | else if (tcon->ses->user_name) |
378 | seq_printf(s, ",username=%s", tcon->ses->user_name); | |
29e07c82 | 379 | |
8616e0fc JL |
380 | if (tcon->ses->domainName) |
381 | seq_printf(s, ",domain=%s", tcon->ses->domainName); | |
382 | ||
3eb9a889 BG |
383 | if (srcaddr->sa_family != AF_UNSPEC) { |
384 | struct sockaddr_in *saddr4; | |
385 | struct sockaddr_in6 *saddr6; | |
386 | saddr4 = (struct sockaddr_in *)srcaddr; | |
387 | saddr6 = (struct sockaddr_in6 *)srcaddr; | |
388 | if (srcaddr->sa_family == AF_INET6) | |
389 | seq_printf(s, ",srcaddr=%pI6c", | |
390 | &saddr6->sin6_addr); | |
391 | else if (srcaddr->sa_family == AF_INET) | |
392 | seq_printf(s, ",srcaddr=%pI4", | |
393 | &saddr4->sin_addr.s_addr); | |
394 | else | |
395 | seq_printf(s, ",srcaddr=BAD-AF:%i", | |
396 | (int)(srcaddr->sa_family)); | |
397 | } | |
398 | ||
1f68233c EB |
399 | seq_printf(s, ",uid=%u", |
400 | from_kuid_munged(&init_user_ns, cifs_sb->mnt_uid)); | |
340481a3 JL |
401 | if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_OVERR_UID) |
402 | seq_printf(s, ",forceuid"); | |
4486d6ed JL |
403 | else |
404 | seq_printf(s, ",noforceuid"); | |
340481a3 | 405 | |
1f68233c EB |
406 | seq_printf(s, ",gid=%u", |
407 | from_kgid_munged(&init_user_ns, cifs_sb->mnt_gid)); | |
340481a3 JL |
408 | if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_OVERR_GID) |
409 | seq_printf(s, ",forcegid"); | |
4486d6ed JL |
410 | else |
411 | seq_printf(s, ",noforcegid"); | |
8616e0fc | 412 | |
61f98ffd | 413 | cifs_show_address(s, tcon->ses->server); |
1da177e4 | 414 | |
8616e0fc | 415 | if (!tcon->unix_ext) |
5206efd6 | 416 | seq_printf(s, ",file_mode=0%ho,dir_mode=0%ho", |
2b280fab SF |
417 | cifs_sb->mnt_file_mode, |
418 | cifs_sb->mnt_dir_mode); | |
8616e0fc JL |
419 | if (tcon->seal) |
420 | seq_printf(s, ",seal"); | |
421 | if (tcon->nocase) | |
422 | seq_printf(s, ",nocase"); | |
423 | if (tcon->retry) | |
424 | seq_printf(s, ",hard"); | |
d4ffff1f PS |
425 | if (tcon->unix_ext) |
426 | seq_printf(s, ",unix"); | |
427 | else | |
428 | seq_printf(s, ",nounix"); | |
8616e0fc JL |
429 | if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_POSIX_PATHS) |
430 | seq_printf(s, ",posixpaths"); | |
431 | if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_SET_UID) | |
432 | seq_printf(s, ",setuids"); | |
433 | if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_SERVER_INUM) | |
434 | seq_printf(s, ",serverino"); | |
d4ffff1f PS |
435 | if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_RWPIDFORWARD) |
436 | seq_printf(s, ",rwpidforward"); | |
437 | if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_NOPOSIXBRL) | |
438 | seq_printf(s, ",forcemand"); | |
8616e0fc JL |
439 | if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_NO_XATTR) |
440 | seq_printf(s, ",nouser_xattr"); | |
441 | if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_MAP_SPECIAL_CHR) | |
442 | seq_printf(s, ",mapchars"); | |
443 | if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_UNX_EMUL) | |
444 | seq_printf(s, ",sfu"); | |
445 | if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_NO_BRL) | |
446 | seq_printf(s, ",nobrl"); | |
447 | if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_CIFS_ACL) | |
448 | seq_printf(s, ",cifsacl"); | |
449 | if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_DYNPERM) | |
450 | seq_printf(s, ",dynperm"); | |
34c80b1d | 451 | if (root->d_sb->s_flags & MS_POSIXACL) |
8616e0fc | 452 | seq_printf(s, ",acl"); |
736a3320 SM |
453 | if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_MF_SYMLINKS) |
454 | seq_printf(s, ",mfsymlinks"); | |
476428f8 SJ |
455 | if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_FSCACHE) |
456 | seq_printf(s, ",fsc"); | |
71c424ba SF |
457 | if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_NOSSYNC) |
458 | seq_printf(s, ",nostrictsync"); | |
459 | if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_NO_PERM) | |
460 | seq_printf(s, ",noperm"); | |
3c7c87fd | 461 | if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_CIFS_BACKUPUID) |
1f68233c EB |
462 | seq_printf(s, ",backupuid=%u", |
463 | from_kuid_munged(&init_user_ns, | |
464 | cifs_sb->mnt_backupuid)); | |
3c7c87fd | 465 | if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_CIFS_BACKUPGID) |
1f68233c EB |
466 | seq_printf(s, ",backupgid=%u", |
467 | from_kgid_munged(&init_user_ns, | |
468 | cifs_sb->mnt_backupgid)); | |
8616e0fc | 469 | |
28f88810 SP |
470 | seq_printf(s, ",rsize=%u", cifs_sb->rsize); |
471 | seq_printf(s, ",wsize=%u", cifs_sb->wsize); | |
6d20e840 | 472 | /* convert actimeo and display it in seconds */ |
156d1790 | 473 | seq_printf(s, ",actimeo=%lu", cifs_sb->actimeo / HZ); |
8616e0fc | 474 | |
1da177e4 LT |
475 | return 0; |
476 | } | |
477 | ||
42faad99 | 478 | static void cifs_umount_begin(struct super_block *sb) |
68058e75 | 479 | { |
42faad99 | 480 | struct cifs_sb_info *cifs_sb = CIFS_SB(sb); |
96daf2b0 | 481 | struct cifs_tcon *tcon; |
68058e75 | 482 | |
4523cc30 | 483 | if (cifs_sb == NULL) |
9e2e85f8 SF |
484 | return; |
485 | ||
0d424ad0 | 486 | tcon = cifs_sb_master_tcon(cifs_sb); |
f1987b44 | 487 | |
3f9bcca7 | 488 | spin_lock(&cifs_tcp_ses_lock); |
ad8034f1 SF |
489 | if ((tcon->tc_count > 1) || (tcon->tidStatus == CifsExiting)) { |
490 | /* we have other mounts to same share or we have | |
491 | already tried to force umount this and woken up | |
492 | all waiting network requests, nothing to do */ | |
3f9bcca7 | 493 | spin_unlock(&cifs_tcp_ses_lock); |
ad8034f1 SF |
494 | return; |
495 | } else if (tcon->tc_count == 1) | |
5e1253b5 | 496 | tcon->tidStatus = CifsExiting; |
3f9bcca7 | 497 | spin_unlock(&cifs_tcp_ses_lock); |
5e1253b5 | 498 | |
3a5ff61c | 499 | /* cancel_brl_requests(tcon); */ /* BB mark all brl mids as exiting */ |
7b7abfe3 | 500 | /* cancel_notify_requests(tcon); */ |
50c2f753 | 501 | if (tcon->ses && tcon->ses->server) { |
f96637be | 502 | cifs_dbg(FYI, "wake up tasks now - umount begin not complete\n"); |
9e2e85f8 | 503 | wake_up_all(&tcon->ses->server->request_q); |
6ab16d24 SF |
504 | wake_up_all(&tcon->ses->server->response_q); |
505 | msleep(1); /* yield */ | |
506 | /* we have to kick the requests once more */ | |
507 | wake_up_all(&tcon->ses->server->response_q); | |
508 | msleep(1); | |
5e1253b5 | 509 | } |
68058e75 SF |
510 | |
511 | return; | |
512 | } | |
68058e75 | 513 | |
bf97d287 | 514 | #ifdef CONFIG_CIFS_STATS2 |
64132379 | 515 | static int cifs_show_stats(struct seq_file *s, struct dentry *root) |
bf97d287 SF |
516 | { |
517 | /* BB FIXME */ | |
518 | return 0; | |
519 | } | |
520 | #endif | |
521 | ||
1da177e4 LT |
522 | static int cifs_remount(struct super_block *sb, int *flags, char *data) |
523 | { | |
524 | *flags |= MS_NODIRATIME; | |
525 | return 0; | |
526 | } | |
527 | ||
45321ac5 | 528 | static int cifs_drop_inode(struct inode *inode) |
12420ac3 JL |
529 | { |
530 | struct cifs_sb_info *cifs_sb = CIFS_SB(inode->i_sb); | |
531 | ||
45321ac5 AV |
532 | /* no serverino => unconditional eviction */ |
533 | return !(cifs_sb->mnt_cifs_flags & CIFS_MOUNT_SERVER_INUM) || | |
534 | generic_drop_inode(inode); | |
12420ac3 JL |
535 | } |
536 | ||
ee9b6d61 | 537 | static const struct super_operations cifs_super_ops = { |
1da177e4 LT |
538 | .statfs = cifs_statfs, |
539 | .alloc_inode = cifs_alloc_inode, | |
540 | .destroy_inode = cifs_destroy_inode, | |
12420ac3 | 541 | .drop_inode = cifs_drop_inode, |
b57922d9 | 542 | .evict_inode = cifs_evict_inode, |
12420ac3 JL |
543 | /* .delete_inode = cifs_delete_inode, */ /* Do not need above |
544 | function unless later we add lazy close of inodes or unless the | |
50c2f753 SF |
545 | kernel forgets to call us with the same number of releases (closes) |
546 | as opens */ | |
1da177e4 | 547 | .show_options = cifs_show_options, |
7b7abfe3 | 548 | .umount_begin = cifs_umount_begin, |
1da177e4 | 549 | .remount_fs = cifs_remount, |
bf97d287 | 550 | #ifdef CONFIG_CIFS_STATS2 |
f46d3e11 | 551 | .show_stats = cifs_show_stats, |
bf97d287 | 552 | #endif |
1da177e4 LT |
553 | }; |
554 | ||
f87d39d9 SF |
555 | /* |
556 | * Get root dentry from superblock according to prefix path mount option. | |
557 | * Return dentry with refcount + 1 on success and NULL otherwise. | |
558 | */ | |
559 | static struct dentry * | |
560 | cifs_get_root(struct smb_vol *vol, struct super_block *sb) | |
561 | { | |
fec11dd9 | 562 | struct dentry *dentry; |
f87d39d9 | 563 | struct cifs_sb_info *cifs_sb = CIFS_SB(sb); |
fec11dd9 AV |
564 | char *full_path = NULL; |
565 | char *s, *p; | |
f87d39d9 SF |
566 | char sep; |
567 | ||
6d3ea7e4 SF |
568 | full_path = cifs_build_path_to_root(vol, cifs_sb, |
569 | cifs_sb_master_tcon(cifs_sb)); | |
f87d39d9 | 570 | if (full_path == NULL) |
9403c9c5 | 571 | return ERR_PTR(-ENOMEM); |
f87d39d9 | 572 | |
f96637be | 573 | cifs_dbg(FYI, "Get root dentry for %s\n", full_path); |
f87d39d9 | 574 | |
f87d39d9 | 575 | sep = CIFS_DIR_SEP(cifs_sb); |
fec11dd9 AV |
576 | dentry = dget(sb->s_root); |
577 | p = s = full_path; | |
578 | ||
579 | do { | |
580 | struct inode *dir = dentry->d_inode; | |
581 | struct dentry *child; | |
582 | ||
5b980b01 PS |
583 | if (!dir) { |
584 | dput(dentry); | |
585 | dentry = ERR_PTR(-ENOENT); | |
586 | break; | |
587 | } | |
ce2ac521 JL |
588 | if (!S_ISDIR(dir->i_mode)) { |
589 | dput(dentry); | |
590 | dentry = ERR_PTR(-ENOTDIR); | |
591 | break; | |
592 | } | |
5b980b01 | 593 | |
fec11dd9 AV |
594 | /* skip separators */ |
595 | while (*s == sep) | |
596 | s++; | |
597 | if (!*s) | |
598 | break; | |
599 | p = s++; | |
600 | /* next separator */ | |
601 | while (*s && *s != sep) | |
602 | s++; | |
603 | ||
604 | mutex_lock(&dir->i_mutex); | |
605 | child = lookup_one_len(p, dentry, s - p); | |
606 | mutex_unlock(&dir->i_mutex); | |
607 | dput(dentry); | |
608 | dentry = child; | |
609 | } while (!IS_ERR(dentry)); | |
f87d39d9 | 610 | kfree(full_path); |
fec11dd9 | 611 | return dentry; |
f87d39d9 SF |
612 | } |
613 | ||
ee01a14d AV |
614 | static int cifs_set_super(struct super_block *sb, void *data) |
615 | { | |
616 | struct cifs_mnt_data *mnt_data = data; | |
617 | sb->s_fs_info = mnt_data->cifs_sb; | |
618 | return set_anon_super(sb, NULL); | |
619 | } | |
620 | ||
d753ed97 AV |
621 | static struct dentry * |
622 | cifs_do_mount(struct file_system_type *fs_type, | |
724d9f1c | 623 | int flags, const char *dev_name, void *data) |
1da177e4 LT |
624 | { |
625 | int rc; | |
db719222 | 626 | struct super_block *sb; |
724d9f1c PS |
627 | struct cifs_sb_info *cifs_sb; |
628 | struct smb_vol *volume_info; | |
25c7f41e | 629 | struct cifs_mnt_data mnt_data; |
724d9f1c | 630 | struct dentry *root; |
1da177e4 | 631 | |
f96637be | 632 | cifs_dbg(FYI, "Devname: %s flags: %d\n", dev_name, flags); |
1da177e4 | 633 | |
04db79b0 JL |
634 | volume_info = cifs_get_volume_info((char *)data, dev_name); |
635 | if (IS_ERR(volume_info)) | |
636 | return ERR_CAST(volume_info); | |
724d9f1c PS |
637 | |
638 | cifs_sb = kzalloc(sizeof(struct cifs_sb_info), GFP_KERNEL); | |
639 | if (cifs_sb == NULL) { | |
640 | root = ERR_PTR(-ENOMEM); | |
5c4f1ad7 | 641 | goto out_nls; |
724d9f1c PS |
642 | } |
643 | ||
5d3bc605 AV |
644 | cifs_sb->mountdata = kstrndup(data, PAGE_SIZE, GFP_KERNEL); |
645 | if (cifs_sb->mountdata == NULL) { | |
646 | root = ERR_PTR(-ENOMEM); | |
5c4f1ad7 | 647 | goto out_cifs_sb; |
5d3bc605 AV |
648 | } |
649 | ||
724d9f1c PS |
650 | cifs_setup_cifs_sb(volume_info, cifs_sb); |
651 | ||
97d1152a AV |
652 | rc = cifs_mount(cifs_sb, volume_info); |
653 | if (rc) { | |
654 | if (!(flags & MS_SILENT)) | |
f96637be JP |
655 | cifs_dbg(VFS, "cifs_mount failed w/return code = %d\n", |
656 | rc); | |
97d1152a | 657 | root = ERR_PTR(rc); |
5c4f1ad7 | 658 | goto out_mountdata; |
97d1152a AV |
659 | } |
660 | ||
25c7f41e PS |
661 | mnt_data.vol = volume_info; |
662 | mnt_data.cifs_sb = cifs_sb; | |
663 | mnt_data.flags = flags; | |
664 | ||
9249e17f DH |
665 | /* BB should we make this contingent on mount parm? */ |
666 | flags |= MS_NODIRATIME | MS_NOATIME; | |
667 | ||
668 | sb = sget(fs_type, cifs_match_super, cifs_set_super, flags, &mnt_data); | |
724d9f1c | 669 | if (IS_ERR(sb)) { |
724d9f1c | 670 | root = ERR_CAST(sb); |
97d1152a | 671 | cifs_umount(cifs_sb); |
d757d71b | 672 | goto out; |
724d9f1c | 673 | } |
1da177e4 | 674 | |
ee01a14d | 675 | if (sb->s_root) { |
f96637be | 676 | cifs_dbg(FYI, "Use existing superblock\n"); |
97d1152a | 677 | cifs_umount(cifs_sb); |
5c4f1ad7 | 678 | } else { |
5c4f1ad7 AV |
679 | rc = cifs_read_super(sb); |
680 | if (rc) { | |
681 | root = ERR_PTR(rc); | |
682 | goto out_super; | |
683 | } | |
b2e5cd33 | 684 | |
5c4f1ad7 | 685 | sb->s_flags |= MS_ACTIVE; |
1da177e4 | 686 | } |
724d9f1c | 687 | |
f87d39d9 | 688 | root = cifs_get_root(volume_info, sb); |
9403c9c5 | 689 | if (IS_ERR(root)) |
f87d39d9 | 690 | goto out_super; |
25c7f41e | 691 | |
f96637be | 692 | cifs_dbg(FYI, "dentry root is: %p\n", root); |
641a58d6 | 693 | goto out; |
724d9f1c | 694 | |
641a58d6 | 695 | out_super: |
641a58d6 | 696 | deactivate_locked_super(sb); |
641a58d6 | 697 | out: |
f9e59bcb | 698 | cifs_cleanup_volume_info(volume_info); |
724d9f1c | 699 | return root; |
5c4f1ad7 AV |
700 | |
701 | out_mountdata: | |
702 | kfree(cifs_sb->mountdata); | |
703 | out_cifs_sb: | |
704 | kfree(cifs_sb); | |
705 | out_nls: | |
706 | unload_nls(volume_info->local_nls); | |
707 | goto out; | |
1da177e4 LT |
708 | } |
709 | ||
027445c3 BP |
710 | static ssize_t cifs_file_aio_write(struct kiocb *iocb, const struct iovec *iov, |
711 | unsigned long nr_segs, loff_t pos) | |
1da177e4 | 712 | { |
496ad9aa | 713 | struct inode *inode = file_inode(iocb->ki_filp); |
1da177e4 | 714 | ssize_t written; |
72432ffc | 715 | int rc; |
1da177e4 | 716 | |
027445c3 | 717 | written = generic_file_aio_write(iocb, iov, nr_segs, pos); |
72432ffc PS |
718 | |
719 | if (CIFS_I(inode)->clientCanCacheAll) | |
720 | return written; | |
721 | ||
722 | rc = filemap_fdatawrite(inode->i_mapping); | |
723 | if (rc) | |
f96637be JP |
724 | cifs_dbg(FYI, "cifs_file_aio_write: %d rc on %p inode\n", |
725 | rc, inode); | |
72432ffc | 726 | |
1da177e4 LT |
727 | return written; |
728 | } | |
729 | ||
965c8e59 | 730 | static loff_t cifs_llseek(struct file *file, loff_t offset, int whence) |
c32a0b68 | 731 | { |
06222e49 | 732 | /* |
965c8e59 | 733 | * whence == SEEK_END || SEEK_DATA || SEEK_HOLE => we must revalidate |
06222e49 JB |
734 | * the cached file length |
735 | */ | |
965c8e59 | 736 | if (whence != SEEK_SET && whence != SEEK_CUR) { |
6feb9891 | 737 | int rc; |
496ad9aa | 738 | struct inode *inode = file_inode(file); |
6feb9891 PS |
739 | |
740 | /* | |
741 | * We need to be sure that all dirty pages are written and the | |
742 | * server has the newest file length. | |
743 | */ | |
744 | if (!CIFS_I(inode)->clientCanCacheRead && inode->i_mapping && | |
745 | inode->i_mapping->nrpages != 0) { | |
746 | rc = filemap_fdatawait(inode->i_mapping); | |
156ecb2d SF |
747 | if (rc) { |
748 | mapping_set_error(inode->i_mapping, rc); | |
749 | return rc; | |
750 | } | |
6feb9891 PS |
751 | } |
752 | /* | |
753 | * Some applications poll for the file length in this strange | |
754 | * way so we must seek to end on non-oplocked files by | |
755 | * setting the revalidate time to zero. | |
756 | */ | |
757 | CIFS_I(inode)->time = 0; | |
758 | ||
759 | rc = cifs_revalidate_file_attr(file); | |
760 | if (rc < 0) | |
761 | return (loff_t)rc; | |
c32a0b68 | 762 | } |
965c8e59 | 763 | return generic_file_llseek(file, offset, whence); |
c32a0b68 SF |
764 | } |
765 | ||
84210e91 SF |
766 | static int cifs_setlease(struct file *file, long arg, struct file_lock **lease) |
767 | { | |
b89f4321 AB |
768 | /* note that this is called by vfs setlease with lock_flocks held |
769 | to protect *lease from going away */ | |
496ad9aa | 770 | struct inode *inode = file_inode(file); |
ba00ba64 | 771 | struct cifsFileInfo *cfile = file->private_data; |
84210e91 SF |
772 | |
773 | if (!(S_ISREG(inode->i_mode))) | |
774 | return -EINVAL; | |
775 | ||
776 | /* check if file is oplocked */ | |
777 | if (((arg == F_RDLCK) && | |
778 | (CIFS_I(inode)->clientCanCacheRead)) || | |
779 | ((arg == F_WRLCK) && | |
780 | (CIFS_I(inode)->clientCanCacheAll))) | |
781 | return generic_setlease(file, arg, lease); | |
13cfb733 JL |
782 | else if (tlink_tcon(cfile->tlink)->local_lease && |
783 | !CIFS_I(inode)->clientCanCacheRead) | |
84210e91 SF |
784 | /* If the server claims to support oplock on this |
785 | file, then we still need to check oplock even | |
786 | if the local_lease mount option is set, but there | |
787 | are servers which do not support oplock for which | |
788 | this mount option may be useful if the user | |
789 | knows that the file won't be changed on the server | |
790 | by anyone else */ | |
791 | return generic_setlease(file, arg, lease); | |
51ee4b84 | 792 | else |
84210e91 SF |
793 | return -EAGAIN; |
794 | } | |
84210e91 | 795 | |
e6ab1582 | 796 | struct file_system_type cifs_fs_type = { |
1da177e4 LT |
797 | .owner = THIS_MODULE, |
798 | .name = "cifs", | |
d753ed97 | 799 | .mount = cifs_do_mount, |
6d686175 | 800 | .kill_sb = cifs_kill_sb, |
1da177e4 LT |
801 | /* .fs_flags */ |
802 | }; | |
3e64fe5b | 803 | MODULE_ALIAS_FS("cifs"); |
754661f1 | 804 | const struct inode_operations cifs_dir_inode_ops = { |
1da177e4 | 805 | .create = cifs_create, |
d2c12719 | 806 | .atomic_open = cifs_atomic_open, |
1da177e4 LT |
807 | .lookup = cifs_lookup, |
808 | .getattr = cifs_getattr, | |
809 | .unlink = cifs_unlink, | |
810 | .link = cifs_hardlink, | |
811 | .mkdir = cifs_mkdir, | |
812 | .rmdir = cifs_rmdir, | |
813 | .rename = cifs_rename, | |
814 | .permission = cifs_permission, | |
815 | /* revalidate:cifs_revalidate, */ | |
816 | .setattr = cifs_setattr, | |
817 | .symlink = cifs_symlink, | |
818 | .mknod = cifs_mknod, | |
819 | #ifdef CONFIG_CIFS_XATTR | |
820 | .setxattr = cifs_setxattr, | |
821 | .getxattr = cifs_getxattr, | |
822 | .listxattr = cifs_listxattr, | |
823 | .removexattr = cifs_removexattr, | |
824 | #endif | |
825 | }; | |
826 | ||
754661f1 | 827 | const struct inode_operations cifs_file_inode_ops = { |
1da177e4 LT |
828 | /* revalidate:cifs_revalidate, */ |
829 | .setattr = cifs_setattr, | |
830 | .getattr = cifs_getattr, /* do we need this anymore? */ | |
831 | .rename = cifs_rename, | |
832 | .permission = cifs_permission, | |
833 | #ifdef CONFIG_CIFS_XATTR | |
834 | .setxattr = cifs_setxattr, | |
835 | .getxattr = cifs_getxattr, | |
836 | .listxattr = cifs_listxattr, | |
837 | .removexattr = cifs_removexattr, | |
50c2f753 | 838 | #endif |
1da177e4 LT |
839 | }; |
840 | ||
754661f1 | 841 | const struct inode_operations cifs_symlink_inode_ops = { |
50c2f753 | 842 | .readlink = generic_readlink, |
1da177e4 LT |
843 | .follow_link = cifs_follow_link, |
844 | .put_link = cifs_put_link, | |
845 | .permission = cifs_permission, | |
846 | /* BB add the following two eventually */ | |
847 | /* revalidate: cifs_revalidate, | |
848 | setattr: cifs_notify_change, *//* BB do we need notify change */ | |
849 | #ifdef CONFIG_CIFS_XATTR | |
850 | .setxattr = cifs_setxattr, | |
851 | .getxattr = cifs_getxattr, | |
852 | .listxattr = cifs_listxattr, | |
853 | .removexattr = cifs_removexattr, | |
50c2f753 | 854 | #endif |
1da177e4 LT |
855 | }; |
856 | ||
4b6f5d20 | 857 | const struct file_operations cifs_file_ops = { |
87c89dd7 SF |
858 | .read = do_sync_read, |
859 | .write = do_sync_write, | |
87c89dd7 SF |
860 | .aio_read = generic_file_aio_read, |
861 | .aio_write = cifs_file_aio_write, | |
1da177e4 LT |
862 | .open = cifs_open, |
863 | .release = cifs_close, | |
864 | .lock = cifs_lock, | |
865 | .fsync = cifs_fsync, | |
866 | .flush = cifs_flush, | |
867 | .mmap = cifs_file_mmap, | |
5ffc4ef4 | 868 | .splice_read = generic_file_splice_read, |
c32a0b68 | 869 | .llseek = cifs_llseek, |
c67593a0 | 870 | #ifdef CONFIG_CIFS_POSIX |
f9ddcca4 | 871 | .unlocked_ioctl = cifs_ioctl, |
c67593a0 | 872 | #endif /* CONFIG_CIFS_POSIX */ |
84210e91 | 873 | .setlease = cifs_setlease, |
1da177e4 LT |
874 | }; |
875 | ||
8be7e6ba PS |
876 | const struct file_operations cifs_file_strict_ops = { |
877 | .read = do_sync_read, | |
878 | .write = do_sync_write, | |
a70307ee | 879 | .aio_read = cifs_strict_readv, |
72432ffc | 880 | .aio_write = cifs_strict_writev, |
8be7e6ba PS |
881 | .open = cifs_open, |
882 | .release = cifs_close, | |
883 | .lock = cifs_lock, | |
884 | .fsync = cifs_strict_fsync, | |
885 | .flush = cifs_flush, | |
7a6a19b1 | 886 | .mmap = cifs_file_strict_mmap, |
8be7e6ba PS |
887 | .splice_read = generic_file_splice_read, |
888 | .llseek = cifs_llseek, | |
889 | #ifdef CONFIG_CIFS_POSIX | |
890 | .unlocked_ioctl = cifs_ioctl, | |
891 | #endif /* CONFIG_CIFS_POSIX */ | |
892 | .setlease = cifs_setlease, | |
893 | }; | |
894 | ||
4b6f5d20 | 895 | const struct file_operations cifs_file_direct_ops = { |
0b81c1c4 PS |
896 | /* BB reevaluate whether they can be done with directio, no cache */ |
897 | .read = do_sync_read, | |
898 | .write = do_sync_write, | |
899 | .aio_read = cifs_user_readv, | |
900 | .aio_write = cifs_user_writev, | |
1da177e4 LT |
901 | .open = cifs_open, |
902 | .release = cifs_close, | |
903 | .lock = cifs_lock, | |
904 | .fsync = cifs_fsync, | |
905 | .flush = cifs_flush, | |
a994b8fa | 906 | .mmap = cifs_file_mmap, |
5ffc4ef4 | 907 | .splice_read = generic_file_splice_read, |
c67593a0 | 908 | #ifdef CONFIG_CIFS_POSIX |
f9ddcca4 | 909 | .unlocked_ioctl = cifs_ioctl, |
c67593a0 | 910 | #endif /* CONFIG_CIFS_POSIX */ |
c32a0b68 | 911 | .llseek = cifs_llseek, |
84210e91 | 912 | .setlease = cifs_setlease, |
1da177e4 | 913 | }; |
8be7e6ba | 914 | |
4b6f5d20 | 915 | const struct file_operations cifs_file_nobrl_ops = { |
87c89dd7 SF |
916 | .read = do_sync_read, |
917 | .write = do_sync_write, | |
87c89dd7 SF |
918 | .aio_read = generic_file_aio_read, |
919 | .aio_write = cifs_file_aio_write, | |
920 | .open = cifs_open, | |
921 | .release = cifs_close, | |
922 | .fsync = cifs_fsync, | |
923 | .flush = cifs_flush, | |
924 | .mmap = cifs_file_mmap, | |
5ffc4ef4 | 925 | .splice_read = generic_file_splice_read, |
c32a0b68 | 926 | .llseek = cifs_llseek, |
8b94bcb9 | 927 | #ifdef CONFIG_CIFS_POSIX |
f9ddcca4 | 928 | .unlocked_ioctl = cifs_ioctl, |
8b94bcb9 | 929 | #endif /* CONFIG_CIFS_POSIX */ |
84210e91 | 930 | .setlease = cifs_setlease, |
8b94bcb9 SF |
931 | }; |
932 | ||
8be7e6ba PS |
933 | const struct file_operations cifs_file_strict_nobrl_ops = { |
934 | .read = do_sync_read, | |
935 | .write = do_sync_write, | |
a70307ee | 936 | .aio_read = cifs_strict_readv, |
72432ffc | 937 | .aio_write = cifs_strict_writev, |
8be7e6ba PS |
938 | .open = cifs_open, |
939 | .release = cifs_close, | |
940 | .fsync = cifs_strict_fsync, | |
941 | .flush = cifs_flush, | |
7a6a19b1 | 942 | .mmap = cifs_file_strict_mmap, |
8be7e6ba PS |
943 | .splice_read = generic_file_splice_read, |
944 | .llseek = cifs_llseek, | |
945 | #ifdef CONFIG_CIFS_POSIX | |
946 | .unlocked_ioctl = cifs_ioctl, | |
947 | #endif /* CONFIG_CIFS_POSIX */ | |
948 | .setlease = cifs_setlease, | |
949 | }; | |
950 | ||
4b6f5d20 | 951 | const struct file_operations cifs_file_direct_nobrl_ops = { |
0b81c1c4 PS |
952 | /* BB reevaluate whether they can be done with directio, no cache */ |
953 | .read = do_sync_read, | |
954 | .write = do_sync_write, | |
955 | .aio_read = cifs_user_readv, | |
956 | .aio_write = cifs_user_writev, | |
87c89dd7 SF |
957 | .open = cifs_open, |
958 | .release = cifs_close, | |
959 | .fsync = cifs_fsync, | |
960 | .flush = cifs_flush, | |
810627a0 | 961 | .mmap = cifs_file_mmap, |
5ffc4ef4 | 962 | .splice_read = generic_file_splice_read, |
8b94bcb9 | 963 | #ifdef CONFIG_CIFS_POSIX |
f9ddcca4 | 964 | .unlocked_ioctl = cifs_ioctl, |
8b94bcb9 | 965 | #endif /* CONFIG_CIFS_POSIX */ |
c32a0b68 | 966 | .llseek = cifs_llseek, |
84210e91 | 967 | .setlease = cifs_setlease, |
8b94bcb9 | 968 | }; |
1da177e4 | 969 | |
4b6f5d20 | 970 | const struct file_operations cifs_dir_ops = { |
1da177e4 LT |
971 | .readdir = cifs_readdir, |
972 | .release = cifs_closedir, | |
973 | .read = generic_read_dir, | |
f9ddcca4 | 974 | .unlocked_ioctl = cifs_ioctl, |
3222a3e5 | 975 | .llseek = generic_file_llseek, |
1da177e4 LT |
976 | }; |
977 | ||
978 | static void | |
51cc5068 | 979 | cifs_init_once(void *inode) |
1da177e4 LT |
980 | { |
981 | struct cifsInodeInfo *cifsi = inode; | |
982 | ||
a35afb83 | 983 | inode_init_once(&cifsi->vfs_inode); |
1b4b55a1 | 984 | init_rwsem(&cifsi->lock_sem); |
1da177e4 LT |
985 | } |
986 | ||
987 | static int | |
988 | cifs_init_inodecache(void) | |
989 | { | |
990 | cifs_inode_cachep = kmem_cache_create("cifs_inode_cache", | |
26f57364 | 991 | sizeof(struct cifsInodeInfo), |
fffb60f9 PJ |
992 | 0, (SLAB_RECLAIM_ACCOUNT| |
993 | SLAB_MEM_SPREAD), | |
20c2df83 | 994 | cifs_init_once); |
1da177e4 LT |
995 | if (cifs_inode_cachep == NULL) |
996 | return -ENOMEM; | |
997 | ||
998 | return 0; | |
999 | } | |
1000 | ||
1001 | static void | |
1002 | cifs_destroy_inodecache(void) | |
1003 | { | |
8c0a8537 KS |
1004 | /* |
1005 | * Make sure all delayed rcu free inodes are flushed before we | |
1006 | * destroy cache. | |
1007 | */ | |
1008 | rcu_barrier(); | |
1a1d92c1 | 1009 | kmem_cache_destroy(cifs_inode_cachep); |
1da177e4 LT |
1010 | } |
1011 | ||
1012 | static int | |
1013 | cifs_init_request_bufs(void) | |
1014 | { | |
3792c173 PS |
1015 | size_t max_hdr_size = MAX_CIFS_HDR_SIZE; |
1016 | #ifdef CONFIG_CIFS_SMB2 | |
1017 | /* | |
1018 | * SMB2 maximum header size is bigger than CIFS one - no problems to | |
1019 | * allocate some more bytes for CIFS. | |
1020 | */ | |
1021 | max_hdr_size = MAX_SMB2_HDR_SIZE; | |
1022 | #endif | |
4523cc30 | 1023 | if (CIFSMaxBufSize < 8192) { |
1da177e4 LT |
1024 | /* Buffer size can not be smaller than 2 * PATH_MAX since maximum |
1025 | Unicode path name has to fit in any SMB/CIFS path based frames */ | |
1026 | CIFSMaxBufSize = 8192; | |
1027 | } else if (CIFSMaxBufSize > 1024*127) { | |
1028 | CIFSMaxBufSize = 1024 * 127; | |
1029 | } else { | |
1030 | CIFSMaxBufSize &= 0x1FE00; /* Round size to even 512 byte mult*/ | |
1031 | } | |
f96637be JP |
1032 | /* |
1033 | cifs_dbg(VFS, "CIFSMaxBufSize %d 0x%x\n", | |
1034 | CIFSMaxBufSize, CIFSMaxBufSize); | |
1035 | */ | |
1da177e4 | 1036 | cifs_req_cachep = kmem_cache_create("cifs_request", |
3792c173 | 1037 | CIFSMaxBufSize + max_hdr_size, 0, |
20c2df83 | 1038 | SLAB_HWCACHE_ALIGN, NULL); |
1da177e4 LT |
1039 | if (cifs_req_cachep == NULL) |
1040 | return -ENOMEM; | |
1041 | ||
4523cc30 | 1042 | if (cifs_min_rcv < 1) |
1da177e4 LT |
1043 | cifs_min_rcv = 1; |
1044 | else if (cifs_min_rcv > 64) { | |
1045 | cifs_min_rcv = 64; | |
f96637be | 1046 | cifs_dbg(VFS, "cifs_min_rcv set to maximum (64)\n"); |
1da177e4 LT |
1047 | } |
1048 | ||
93d2341c MD |
1049 | cifs_req_poolp = mempool_create_slab_pool(cifs_min_rcv, |
1050 | cifs_req_cachep); | |
1da177e4 | 1051 | |
4523cc30 | 1052 | if (cifs_req_poolp == NULL) { |
1da177e4 LT |
1053 | kmem_cache_destroy(cifs_req_cachep); |
1054 | return -ENOMEM; | |
1055 | } | |
ec637e3f | 1056 | /* MAX_CIFS_SMALL_BUFFER_SIZE bytes is enough for most SMB responses and |
1da177e4 LT |
1057 | almost all handle based requests (but not write response, nor is it |
1058 | sufficient for path based requests). A smaller size would have | |
50c2f753 | 1059 | been more efficient (compacting multiple slab items on one 4k page) |
1da177e4 LT |
1060 | for the case in which debug was on, but this larger size allows |
1061 | more SMBs to use small buffer alloc and is still much more | |
6dc0f87e | 1062 | efficient to alloc 1 per page off the slab compared to 17K (5page) |
1da177e4 LT |
1063 | alloc of large cifs buffers even when page debugging is on */ |
1064 | cifs_sm_req_cachep = kmem_cache_create("cifs_small_rq", | |
6dc0f87e | 1065 | MAX_CIFS_SMALL_BUFFER_SIZE, 0, SLAB_HWCACHE_ALIGN, |
20c2df83 | 1066 | NULL); |
1da177e4 LT |
1067 | if (cifs_sm_req_cachep == NULL) { |
1068 | mempool_destroy(cifs_req_poolp); | |
1069 | kmem_cache_destroy(cifs_req_cachep); | |
6dc0f87e | 1070 | return -ENOMEM; |
1da177e4 LT |
1071 | } |
1072 | ||
4523cc30 | 1073 | if (cifs_min_small < 2) |
1da177e4 LT |
1074 | cifs_min_small = 2; |
1075 | else if (cifs_min_small > 256) { | |
1076 | cifs_min_small = 256; | |
f96637be | 1077 | cifs_dbg(FYI, "cifs_min_small set to maximum (256)\n"); |
1da177e4 LT |
1078 | } |
1079 | ||
93d2341c MD |
1080 | cifs_sm_req_poolp = mempool_create_slab_pool(cifs_min_small, |
1081 | cifs_sm_req_cachep); | |
1da177e4 | 1082 | |
4523cc30 | 1083 | if (cifs_sm_req_poolp == NULL) { |
1da177e4 LT |
1084 | mempool_destroy(cifs_req_poolp); |
1085 | kmem_cache_destroy(cifs_req_cachep); | |
1086 | kmem_cache_destroy(cifs_sm_req_cachep); | |
1087 | return -ENOMEM; | |
1088 | } | |
1089 | ||
1090 | return 0; | |
1091 | } | |
1092 | ||
1093 | static void | |
1094 | cifs_destroy_request_bufs(void) | |
1095 | { | |
1096 | mempool_destroy(cifs_req_poolp); | |
1a1d92c1 | 1097 | kmem_cache_destroy(cifs_req_cachep); |
1da177e4 | 1098 | mempool_destroy(cifs_sm_req_poolp); |
1a1d92c1 | 1099 | kmem_cache_destroy(cifs_sm_req_cachep); |
1da177e4 LT |
1100 | } |
1101 | ||
1102 | static int | |
1103 | cifs_init_mids(void) | |
1104 | { | |
1105 | cifs_mid_cachep = kmem_cache_create("cifs_mpx_ids", | |
26f57364 SF |
1106 | sizeof(struct mid_q_entry), 0, |
1107 | SLAB_HWCACHE_ALIGN, NULL); | |
1da177e4 LT |
1108 | if (cifs_mid_cachep == NULL) |
1109 | return -ENOMEM; | |
1110 | ||
93d2341c MD |
1111 | /* 3 is a reasonable minimum number of simultaneous operations */ |
1112 | cifs_mid_poolp = mempool_create_slab_pool(3, cifs_mid_cachep); | |
4523cc30 | 1113 | if (cifs_mid_poolp == NULL) { |
1da177e4 LT |
1114 | kmem_cache_destroy(cifs_mid_cachep); |
1115 | return -ENOMEM; | |
1116 | } | |
1117 | ||
1da177e4 LT |
1118 | return 0; |
1119 | } | |
1120 | ||
1121 | static void | |
1122 | cifs_destroy_mids(void) | |
1123 | { | |
1124 | mempool_destroy(cifs_mid_poolp); | |
1a1d92c1 | 1125 | kmem_cache_destroy(cifs_mid_cachep); |
1da177e4 LT |
1126 | } |
1127 | ||
1da177e4 LT |
1128 | static int __init |
1129 | init_cifs(void) | |
1130 | { | |
1131 | int rc = 0; | |
1da177e4 | 1132 | cifs_proc_init(); |
e7ddee90 | 1133 | INIT_LIST_HEAD(&cifs_tcp_ses_list); |
0eff0e26 | 1134 | #ifdef CONFIG_CIFS_DNOTIFY_EXPERIMENTAL /* unused temporarily */ |
4ca9c190 SF |
1135 | INIT_LIST_HEAD(&GlobalDnotifyReqList); |
1136 | INIT_LIST_HEAD(&GlobalDnotifyRsp_Q); | |
0eff0e26 | 1137 | #endif /* was needed for dnotify, and will be needed for inotify when VFS fix */ |
1da177e4 LT |
1138 | /* |
1139 | * Initialize Global counters | |
1140 | */ | |
1141 | atomic_set(&sesInfoAllocCount, 0); | |
1142 | atomic_set(&tconInfoAllocCount, 0); | |
6dc0f87e | 1143 | atomic_set(&tcpSesAllocCount, 0); |
1da177e4 LT |
1144 | atomic_set(&tcpSesReconnectCount, 0); |
1145 | atomic_set(&tconInfoReconnectCount, 0); | |
1146 | ||
1147 | atomic_set(&bufAllocCount, 0); | |
4498eed5 SF |
1148 | atomic_set(&smBufAllocCount, 0); |
1149 | #ifdef CONFIG_CIFS_STATS2 | |
1150 | atomic_set(&totBufAllocCount, 0); | |
1151 | atomic_set(&totSmBufAllocCount, 0); | |
1152 | #endif /* CONFIG_CIFS_STATS2 */ | |
1153 | ||
1da177e4 LT |
1154 | atomic_set(&midCount, 0); |
1155 | GlobalCurrentXid = 0; | |
1156 | GlobalTotalActiveXid = 0; | |
1157 | GlobalMaxActiveXid = 0; | |
3f9bcca7 | 1158 | spin_lock_init(&cifs_tcp_ses_lock); |
4477288a | 1159 | spin_lock_init(&cifs_file_list_lock); |
1da177e4 LT |
1160 | spin_lock_init(&GlobalMid_Lock); |
1161 | ||
b8c32dbb PS |
1162 | #ifdef CONFIG_CIFS_SMB2 |
1163 | get_random_bytes(cifs_client_guid, SMB2_CLIENT_GUID_SIZE); | |
1164 | #endif | |
1165 | ||
4523cc30 | 1166 | if (cifs_max_pending < 2) { |
1da177e4 | 1167 | cifs_max_pending = 2; |
f96637be | 1168 | cifs_dbg(FYI, "cifs_max_pending set to min of 2\n"); |
10b9b98e PS |
1169 | } else if (cifs_max_pending > CIFS_MAX_REQ) { |
1170 | cifs_max_pending = CIFS_MAX_REQ; | |
f96637be JP |
1171 | cifs_dbg(FYI, "cifs_max_pending set to max of %u\n", |
1172 | CIFS_MAX_REQ); | |
1da177e4 LT |
1173 | } |
1174 | ||
da472fc8 JL |
1175 | cifsiod_wq = alloc_workqueue("cifsiod", WQ_FREEZABLE|WQ_MEM_RECLAIM, 0); |
1176 | if (!cifsiod_wq) { | |
1177 | rc = -ENOMEM; | |
1178 | goto out_clean_proc; | |
1179 | } | |
1180 | ||
f579cf3c SJ |
1181 | rc = cifs_fscache_register(); |
1182 | if (rc) | |
da472fc8 | 1183 | goto out_destroy_wq; |
f579cf3c | 1184 | |
1da177e4 | 1185 | rc = cifs_init_inodecache(); |
45af7a0f | 1186 | if (rc) |
d3bf5221 | 1187 | goto out_unreg_fscache; |
45af7a0f SF |
1188 | |
1189 | rc = cifs_init_mids(); | |
1190 | if (rc) | |
1191 | goto out_destroy_inodecache; | |
1192 | ||
1193 | rc = cifs_init_request_bufs(); | |
1194 | if (rc) | |
1195 | goto out_destroy_mids; | |
1196 | ||
84a15b93 JL |
1197 | #ifdef CONFIG_CIFS_UPCALL |
1198 | rc = register_key_type(&cifs_spnego_key_type); | |
1199 | if (rc) | |
4d79dba0 SP |
1200 | goto out_destroy_request_bufs; |
1201 | #endif /* CONFIG_CIFS_UPCALL */ | |
1202 | ||
1203 | #ifdef CONFIG_CIFS_ACL | |
1204 | rc = init_cifs_idmap(); | |
1205 | if (rc) | |
c4aca0c0 | 1206 | goto out_register_key_type; |
4d79dba0 SP |
1207 | #endif /* CONFIG_CIFS_ACL */ |
1208 | ||
1209 | rc = register_filesystem(&cifs_fs_type); | |
1210 | if (rc) | |
c4aca0c0 | 1211 | goto out_init_cifs_idmap; |
45af7a0f | 1212 | |
45af7a0f SF |
1213 | return 0; |
1214 | ||
c4aca0c0 | 1215 | out_init_cifs_idmap: |
4d79dba0 SP |
1216 | #ifdef CONFIG_CIFS_ACL |
1217 | exit_cifs_idmap(); | |
c4aca0c0 | 1218 | out_register_key_type: |
4d79dba0 | 1219 | #endif |
84a15b93 | 1220 | #ifdef CONFIG_CIFS_UPCALL |
4d79dba0 | 1221 | unregister_key_type(&cifs_spnego_key_type); |
c4aca0c0 | 1222 | out_destroy_request_bufs: |
1fc7995d | 1223 | #endif |
45af7a0f | 1224 | cifs_destroy_request_bufs(); |
d3bf5221 | 1225 | out_destroy_mids: |
45af7a0f | 1226 | cifs_destroy_mids(); |
d3bf5221 | 1227 | out_destroy_inodecache: |
45af7a0f | 1228 | cifs_destroy_inodecache(); |
d3bf5221 | 1229 | out_unreg_fscache: |
f579cf3c | 1230 | cifs_fscache_unregister(); |
da472fc8 JL |
1231 | out_destroy_wq: |
1232 | destroy_workqueue(cifsiod_wq); | |
d3bf5221 SF |
1233 | out_clean_proc: |
1234 | cifs_proc_clean(); | |
1da177e4 LT |
1235 | return rc; |
1236 | } | |
1237 | ||
1238 | static void __exit | |
1239 | exit_cifs(void) | |
1240 | { | |
f96637be | 1241 | cifs_dbg(NOISY, "exit_cifs\n"); |
3dd93306 | 1242 | unregister_filesystem(&cifs_fs_type); |
78d31a3a | 1243 | cifs_dfs_release_automount_timer(); |
4d79dba0 | 1244 | #ifdef CONFIG_CIFS_ACL |
4d79dba0 SP |
1245 | exit_cifs_idmap(); |
1246 | #endif | |
84a15b93 JL |
1247 | #ifdef CONFIG_CIFS_UPCALL |
1248 | unregister_key_type(&cifs_spnego_key_type); | |
1da177e4 | 1249 | #endif |
1da177e4 | 1250 | cifs_destroy_request_bufs(); |
3dd93306 JL |
1251 | cifs_destroy_mids(); |
1252 | cifs_destroy_inodecache(); | |
1253 | cifs_fscache_unregister(); | |
da472fc8 | 1254 | destroy_workqueue(cifsiod_wq); |
3dd93306 | 1255 | cifs_proc_clean(); |
1da177e4 LT |
1256 | } |
1257 | ||
1258 | MODULE_AUTHOR("Steve French <sfrench@us.ibm.com>"); | |
6dc0f87e | 1259 | MODULE_LICENSE("GPL"); /* combination of LGPL + GPL source behaves as GPL */ |
1da177e4 | 1260 | MODULE_DESCRIPTION |
63135e08 SF |
1261 | ("VFS to access servers complying with the SNIA CIFS Specification " |
1262 | "e.g. Samba and Windows"); | |
1da177e4 LT |
1263 | MODULE_VERSION(CIFS_VERSION); |
1264 | module_init(init_cifs) | |
1265 | module_exit(exit_cifs) |