]>
Commit | Line | Data |
---|---|---|
1da177e4 LT |
1 | /* |
2 | * fs/cifs/cifsfs.c | |
3 | * | |
2b280fab | 4 | * Copyright (C) International Business Machines Corp., 2002,2008 |
1da177e4 LT |
5 | * Author(s): Steve French (sfrench@us.ibm.com) |
6 | * | |
7 | * Common Internet FileSystem (CIFS) client | |
8 | * | |
9 | * This library is free software; you can redistribute it and/or modify | |
10 | * it under the terms of the GNU Lesser General Public License as published | |
11 | * by the Free Software Foundation; either version 2.1 of the License, or | |
12 | * (at your option) any later version. | |
13 | * | |
14 | * This library is distributed in the hope that it will be useful, | |
15 | * but WITHOUT ANY WARRANTY; without even the implied warranty of | |
16 | * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See | |
17 | * the GNU Lesser General Public License for more details. | |
18 | * | |
19 | * You should have received a copy of the GNU Lesser General Public License | |
20 | * along with this library; if not, write to the Free Software | |
21 | * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA | |
22 | */ | |
23 | ||
24 | /* Note that BB means BUGBUG (ie something to fix eventually) */ | |
25 | ||
26 | #include <linux/module.h> | |
27 | #include <linux/fs.h> | |
28 | #include <linux/mount.h> | |
29 | #include <linux/slab.h> | |
30 | #include <linux/init.h> | |
31 | #include <linux/list.h> | |
32 | #include <linux/seq_file.h> | |
33 | #include <linux/vfs.h> | |
34 | #include <linux/mempool.h> | |
6ab16d24 | 35 | #include <linux/delay.h> |
45af7a0f | 36 | #include <linux/kthread.h> |
7dfb7103 | 37 | #include <linux/freezer.h> |
3eb9a889 | 38 | #include <net/ipv6.h> |
1da177e4 LT |
39 | #include "cifsfs.h" |
40 | #include "cifspdu.h" | |
41 | #define DECLARE_GLOBALS_HERE | |
42 | #include "cifsglob.h" | |
43 | #include "cifsproto.h" | |
44 | #include "cifs_debug.h" | |
45 | #include "cifs_fs_sb.h" | |
46 | #include <linux/mm.h> | |
84a15b93 | 47 | #include <linux/key-type.h> |
e545937a | 48 | #include "cifs_spnego.h" |
f579cf3c | 49 | #include "fscache.h" |
1da177e4 LT |
50 | #define CIFS_MAGIC_NUMBER 0xFF534D42 /* the first four bytes of SMB PDUs */ |
51 | ||
1da177e4 LT |
52 | int cifsFYI = 0; |
53 | int cifsERROR = 1; | |
54 | int traceSMB = 0; | |
55 | unsigned int oplockEnabled = 1; | |
1da177e4 LT |
56 | unsigned int linuxExtEnabled = 1; |
57 | unsigned int lookupCacheEnabled = 1; | |
58 | unsigned int multiuser_mount = 0; | |
04912d6a | 59 | unsigned int global_secflags = CIFSSEC_DEF; |
3979877e | 60 | /* unsigned int ntlmv2_support = 0; */ |
1da177e4 | 61 | unsigned int sign_CIFS_PDUs = 1; |
ee9b6d61 | 62 | static const struct super_operations cifs_super_ops; |
1da177e4 LT |
63 | unsigned int CIFSMaxBufSize = CIFS_MAX_MSGSIZE; |
64 | module_param(CIFSMaxBufSize, int, 0); | |
63135e08 SF |
65 | MODULE_PARM_DESC(CIFSMaxBufSize, "Network buffer size (not including header). " |
66 | "Default: 16384 Range: 8192 to 130048"); | |
1da177e4 LT |
67 | unsigned int cifs_min_rcv = CIFS_MIN_RCV_POOL; |
68 | module_param(cifs_min_rcv, int, 0); | |
63135e08 SF |
69 | MODULE_PARM_DESC(cifs_min_rcv, "Network buffers in pool. Default: 4 Range: " |
70 | "1 to 64"); | |
1da177e4 LT |
71 | unsigned int cifs_min_small = 30; |
72 | module_param(cifs_min_small, int, 0); | |
63135e08 SF |
73 | MODULE_PARM_DESC(cifs_min_small, "Small network buffers in pool. Default: 30 " |
74 | "Range: 2 to 256"); | |
1da177e4 LT |
75 | unsigned int cifs_max_pending = CIFS_MAX_REQ; |
76 | module_param(cifs_max_pending, int, 0); | |
63135e08 SF |
77 | MODULE_PARM_DESC(cifs_max_pending, "Simultaneous requests to server. " |
78 | "Default: 50 Range: 2 to 256"); | |
fda35943 SF |
79 | unsigned short echo_retries = 5; |
80 | module_param(echo_retries, ushort, 0644); | |
81 | MODULE_PARM_DESC(echo_retries, "Number of echo attempts before giving up and " | |
82 | "reconnecting server. Default: 5. 0 means " | |
83 | "never reconnect."); | |
1da177e4 LT |
84 | extern mempool_t *cifs_sm_req_poolp; |
85 | extern mempool_t *cifs_req_poolp; | |
86 | extern mempool_t *cifs_mid_poolp; | |
87 | ||
d7c86ff8 JL |
88 | void |
89 | cifs_sb_active(struct super_block *sb) | |
90 | { | |
91 | struct cifs_sb_info *server = CIFS_SB(sb); | |
92 | ||
93 | if (atomic_inc_return(&server->active) == 1) | |
94 | atomic_inc(&sb->s_active); | |
95 | } | |
96 | ||
97 | void | |
98 | cifs_sb_deactive(struct super_block *sb) | |
99 | { | |
100 | struct cifs_sb_info *server = CIFS_SB(sb); | |
101 | ||
102 | if (atomic_dec_and_test(&server->active)) | |
103 | deactivate_super(sb); | |
104 | } | |
105 | ||
1da177e4 | 106 | static int |
b2e5cd33 PS |
107 | cifs_read_super(struct super_block *sb, struct smb_vol *volume_info, |
108 | const char *devname, int silent) | |
1da177e4 LT |
109 | { |
110 | struct inode *inode; | |
b2e5cd33 | 111 | struct cifs_sb_info *cifs_sb; |
1da177e4 | 112 | int rc = 0; |
50c2f753 | 113 | |
b2e5cd33 | 114 | cifs_sb = CIFS_SB(sb); |
1da177e4 | 115 | |
0dd12c21 | 116 | spin_lock_init(&cifs_sb->tlink_tree_lock); |
b647c35f | 117 | cifs_sb->tlink_tree = RB_ROOT; |
0dd12c21 | 118 | |
724d9f1c | 119 | rc = cifs_mount(sb, cifs_sb, volume_info, devname); |
1da177e4 LT |
120 | |
121 | if (rc) { | |
122 | if (!silent) | |
b6b38f70 | 123 | cERROR(1, "cifs_mount failed w/return code = %d", rc); |
dd854466 | 124 | return rc; |
1da177e4 LT |
125 | } |
126 | ||
127 | sb->s_magic = CIFS_MAGIC_NUMBER; | |
128 | sb->s_op = &cifs_super_ops; | |
8044f7f4 | 129 | sb->s_bdi = &cifs_sb->bdi; |
1da177e4 LT |
130 | sb->s_blocksize = CIFS_MAX_MSGSIZE; |
131 | sb->s_blocksize_bits = 14; /* default 2**14 = CIFS_MAX_MSGSIZE */ | |
9b6763e0 | 132 | inode = cifs_root_iget(sb); |
1da177e4 | 133 | |
ce634ab2 DH |
134 | if (IS_ERR(inode)) { |
135 | rc = PTR_ERR(inode); | |
136 | inode = NULL; | |
1da177e4 LT |
137 | goto out_no_root; |
138 | } | |
139 | ||
140 | sb->s_root = d_alloc_root(inode); | |
141 | ||
142 | if (!sb->s_root) { | |
143 | rc = -ENOMEM; | |
144 | goto out_no_root; | |
145 | } | |
50c2f753 | 146 | |
1c929cfe AV |
147 | /* do that *after* d_alloc_root() - we want NULL ->d_op for root here */ |
148 | if (cifs_sb_master_tcon(cifs_sb)->nocase) | |
149 | sb->s_d_op = &cifs_ci_dentry_ops; | |
150 | else | |
151 | sb->s_d_op = &cifs_dentry_ops; | |
152 | ||
25720873 | 153 | #ifdef CIFS_NFSD_EXPORT |
7521a3c5 | 154 | if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_SERVER_INUM) { |
b6b38f70 | 155 | cFYI(1, "export ops supported"); |
7521a3c5 SF |
156 | sb->s_export_op = &cifs_export_ops; |
157 | } | |
25720873 | 158 | #endif /* CIFS_NFSD_EXPORT */ |
1da177e4 LT |
159 | |
160 | return 0; | |
161 | ||
162 | out_no_root: | |
b6b38f70 | 163 | cERROR(1, "cifs_read_super: get root inode failed"); |
1da177e4 LT |
164 | if (inode) |
165 | iput(inode); | |
54b4602d | 166 | |
2c731afb | 167 | cifs_umount(sb, cifs_sb); |
1da177e4 LT |
168 | return rc; |
169 | } | |
170 | ||
171 | static void | |
172 | cifs_put_super(struct super_block *sb) | |
173 | { | |
174 | int rc = 0; | |
175 | struct cifs_sb_info *cifs_sb; | |
176 | ||
b6b38f70 | 177 | cFYI(1, "In cifs_put_super"); |
1da177e4 | 178 | cifs_sb = CIFS_SB(sb); |
4523cc30 | 179 | if (cifs_sb == NULL) { |
b6b38f70 | 180 | cFYI(1, "Empty cifs superblock info passed to unmount"); |
1da177e4 LT |
181 | return; |
182 | } | |
6cfd0148 | 183 | |
790fe579 | 184 | rc = cifs_umount(sb, cifs_sb); |
ad7a2926 | 185 | if (rc) |
b6b38f70 | 186 | cERROR(1, "cifs_umount failed with return code %d", rc); |
e6ab1582 IM |
187 | if (cifs_sb->mountdata) { |
188 | kfree(cifs_sb->mountdata); | |
189 | cifs_sb->mountdata = NULL; | |
190 | } | |
e6ab1582 | 191 | |
1da177e4 LT |
192 | unload_nls(cifs_sb->local_nls); |
193 | kfree(cifs_sb); | |
1da177e4 LT |
194 | } |
195 | ||
196 | static int | |
726c3342 | 197 | cifs_statfs(struct dentry *dentry, struct kstatfs *buf) |
1da177e4 | 198 | { |
726c3342 | 199 | struct super_block *sb = dentry->d_sb; |
39da9847 | 200 | struct cifs_sb_info *cifs_sb = CIFS_SB(sb); |
96daf2b0 | 201 | struct cifs_tcon *tcon = cifs_sb_master_tcon(cifs_sb); |
c81156dd | 202 | int rc = -EOPNOTSUPP; |
39da9847 | 203 | int xid; |
1da177e4 LT |
204 | |
205 | xid = GetXid(); | |
206 | ||
1da177e4 LT |
207 | buf->f_type = CIFS_MAGIC_NUMBER; |
208 | ||
39da9847 SF |
209 | /* |
210 | * PATH_MAX may be too long - it would presumably be total path, | |
211 | * but note that some servers (includinng Samba 3) have a shorter | |
212 | * maximum path. | |
213 | * | |
214 | * Instead could get the real value via SMB_QUERY_FS_ATTRIBUTE_INFO. | |
215 | */ | |
216 | buf->f_namelen = PATH_MAX; | |
1da177e4 LT |
217 | buf->f_files = 0; /* undefined */ |
218 | buf->f_ffree = 0; /* unlimited */ | |
219 | ||
39da9847 SF |
220 | /* |
221 | * We could add a second check for a QFS Unix capability bit | |
222 | */ | |
223 | if ((tcon->ses->capabilities & CAP_UNIX) && | |
224 | (CIFS_POSIX_EXTENSIONS & le64_to_cpu(tcon->fsUnixInfo.Capability))) | |
225 | rc = CIFSSMBQFSPosixInfo(xid, tcon, buf); | |
226 | ||
227 | /* | |
228 | * Only need to call the old QFSInfo if failed on newer one, | |
229 | * e.g. by OS/2. | |
230 | **/ | |
231 | if (rc && (tcon->ses->capabilities & CAP_NT_SMBS)) | |
232 | rc = CIFSSMBQFSInfo(xid, tcon, buf); | |
233 | ||
234 | /* | |
235 | * Some old Windows servers also do not support level 103, retry with | |
236 | * older level one if old server failed the previous call or we | |
237 | * bypassed it because we detected that this was an older LANMAN sess | |
238 | */ | |
4523cc30 | 239 | if (rc) |
39da9847 SF |
240 | rc = SMBOldQFSInfo(xid, tcon, buf); |
241 | ||
1da177e4 | 242 | FreeXid(xid); |
39da9847 | 243 | return 0; |
1da177e4 LT |
244 | } |
245 | ||
b74c79e9 | 246 | static int cifs_permission(struct inode *inode, int mask, unsigned int flags) |
1da177e4 LT |
247 | { |
248 | struct cifs_sb_info *cifs_sb; | |
249 | ||
250 | cifs_sb = CIFS_SB(inode->i_sb); | |
251 | ||
f696a365 MS |
252 | if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_NO_PERM) { |
253 | if ((mask & MAY_EXEC) && !execute_ok(inode)) | |
254 | return -EACCES; | |
255 | else | |
256 | return 0; | |
257 | } else /* file mode might have been restricted at mount time | |
50c2f753 | 258 | on the client (above and beyond ACL on servers) for |
1da177e4 | 259 | servers which do not support setting and viewing mode bits, |
50c2f753 | 260 | so allowing client to check permissions is useful */ |
b74c79e9 | 261 | return generic_permission(inode, mask, flags, NULL); |
1da177e4 LT |
262 | } |
263 | ||
e18b890b CL |
264 | static struct kmem_cache *cifs_inode_cachep; |
265 | static struct kmem_cache *cifs_req_cachep; | |
266 | static struct kmem_cache *cifs_mid_cachep; | |
e18b890b | 267 | static struct kmem_cache *cifs_sm_req_cachep; |
1da177e4 LT |
268 | mempool_t *cifs_sm_req_poolp; |
269 | mempool_t *cifs_req_poolp; | |
270 | mempool_t *cifs_mid_poolp; | |
271 | ||
272 | static struct inode * | |
273 | cifs_alloc_inode(struct super_block *sb) | |
274 | { | |
275 | struct cifsInodeInfo *cifs_inode; | |
e94b1766 | 276 | cifs_inode = kmem_cache_alloc(cifs_inode_cachep, GFP_KERNEL); |
1da177e4 LT |
277 | if (!cifs_inode) |
278 | return NULL; | |
279 | cifs_inode->cifsAttrs = 0x20; /* default */ | |
1da177e4 LT |
280 | cifs_inode->time = 0; |
281 | /* Until the file is open and we have gotten oplock | |
282 | info back from the server, can not assume caching of | |
283 | file data or metadata */ | |
c6723628 | 284 | cifs_set_oplock_level(cifs_inode, 0); |
9a8165fc | 285 | cifs_inode->delete_pending = false; |
df2cf170 | 286 | cifs_inode->invalid_mapping = false; |
1da177e4 | 287 | cifs_inode->vfs_inode.i_blkbits = 14; /* 2**14 = CIFS_MAX_MSGSIZE */ |
fbec9ab9 | 288 | cifs_inode->server_eof = 0; |
20054bd6 JL |
289 | cifs_inode->uniqueid = 0; |
290 | cifs_inode->createtime = 0; | |
50c2f753 | 291 | |
1b2b2126 SF |
292 | /* Can not set i_flags here - they get immediately overwritten |
293 | to zero by the VFS */ | |
294 | /* cifs_inode->vfs_inode.i_flags = S_NOATIME | S_NOCMTIME;*/ | |
1da177e4 LT |
295 | INIT_LIST_HEAD(&cifs_inode->openFileList); |
296 | return &cifs_inode->vfs_inode; | |
297 | } | |
298 | ||
fa0d7e3d NP |
299 | static void cifs_i_callback(struct rcu_head *head) |
300 | { | |
301 | struct inode *inode = container_of(head, struct inode, i_rcu); | |
302 | INIT_LIST_HEAD(&inode->i_dentry); | |
303 | kmem_cache_free(cifs_inode_cachep, CIFS_I(inode)); | |
304 | } | |
305 | ||
1da177e4 LT |
306 | static void |
307 | cifs_destroy_inode(struct inode *inode) | |
308 | { | |
fa0d7e3d | 309 | call_rcu(&inode->i_rcu, cifs_i_callback); |
1da177e4 LT |
310 | } |
311 | ||
9451a9a5 | 312 | static void |
b57922d9 | 313 | cifs_evict_inode(struct inode *inode) |
9451a9a5 | 314 | { |
b57922d9 AV |
315 | truncate_inode_pages(&inode->i_data, 0); |
316 | end_writeback(inode); | |
9451a9a5 SJ |
317 | cifs_fscache_release_inode_cookie(inode); |
318 | } | |
319 | ||
61f98ffd JL |
320 | static void |
321 | cifs_show_address(struct seq_file *s, struct TCP_Server_Info *server) | |
322 | { | |
a9f1b85e PS |
323 | struct sockaddr_in *sa = (struct sockaddr_in *) &server->dstaddr; |
324 | struct sockaddr_in6 *sa6 = (struct sockaddr_in6 *) &server->dstaddr; | |
325 | ||
61f98ffd JL |
326 | seq_printf(s, ",addr="); |
327 | ||
a9f1b85e | 328 | switch (server->dstaddr.ss_family) { |
61f98ffd | 329 | case AF_INET: |
a9f1b85e | 330 | seq_printf(s, "%pI4", &sa->sin_addr.s_addr); |
61f98ffd JL |
331 | break; |
332 | case AF_INET6: | |
a9f1b85e PS |
333 | seq_printf(s, "%pI6", &sa6->sin6_addr.s6_addr); |
334 | if (sa6->sin6_scope_id) | |
335 | seq_printf(s, "%%%u", sa6->sin6_scope_id); | |
61f98ffd JL |
336 | break; |
337 | default: | |
338 | seq_printf(s, "(unknown)"); | |
339 | } | |
340 | } | |
341 | ||
3e715513 JL |
342 | static void |
343 | cifs_show_security(struct seq_file *s, struct TCP_Server_Info *server) | |
344 | { | |
345 | seq_printf(s, ",sec="); | |
346 | ||
347 | switch (server->secType) { | |
348 | case LANMAN: | |
349 | seq_printf(s, "lanman"); | |
350 | break; | |
351 | case NTLMv2: | |
352 | seq_printf(s, "ntlmv2"); | |
353 | break; | |
354 | case NTLM: | |
355 | seq_printf(s, "ntlm"); | |
356 | break; | |
357 | case Kerberos: | |
358 | seq_printf(s, "krb5"); | |
359 | break; | |
360 | case RawNTLMSSP: | |
361 | seq_printf(s, "ntlmssp"); | |
362 | break; | |
363 | default: | |
364 | /* shouldn't ever happen */ | |
365 | seq_printf(s, "unknown"); | |
366 | break; | |
367 | } | |
368 | ||
369 | if (server->sec_mode & (SECMODE_SIGN_REQUIRED | SECMODE_SIGN_ENABLED)) | |
370 | seq_printf(s, "i"); | |
371 | } | |
372 | ||
1da177e4 LT |
373 | /* |
374 | * cifs_show_options() is for displaying mount options in /proc/mounts. | |
375 | * Not all settable options are displayed but most of the important | |
376 | * ones are. | |
377 | */ | |
378 | static int | |
379 | cifs_show_options(struct seq_file *s, struct vfsmount *m) | |
380 | { | |
8e047d09 | 381 | struct cifs_sb_info *cifs_sb = CIFS_SB(m->mnt_sb); |
96daf2b0 | 382 | struct cifs_tcon *tcon = cifs_sb_master_tcon(cifs_sb); |
3eb9a889 BG |
383 | struct sockaddr *srcaddr; |
384 | srcaddr = (struct sockaddr *)&tcon->ses->server->srcaddr; | |
8616e0fc | 385 | |
3e715513 JL |
386 | cifs_show_security(s, tcon->ses->server); |
387 | ||
8e047d09 | 388 | seq_printf(s, ",unc=%s", tcon->treeName); |
29e07c82 JL |
389 | |
390 | if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_MULTIUSER) | |
391 | seq_printf(s, ",multiuser"); | |
8727c8a8 SF |
392 | else if (tcon->ses->user_name) |
393 | seq_printf(s, ",username=%s", tcon->ses->user_name); | |
29e07c82 | 394 | |
8616e0fc JL |
395 | if (tcon->ses->domainName) |
396 | seq_printf(s, ",domain=%s", tcon->ses->domainName); | |
397 | ||
3eb9a889 BG |
398 | if (srcaddr->sa_family != AF_UNSPEC) { |
399 | struct sockaddr_in *saddr4; | |
400 | struct sockaddr_in6 *saddr6; | |
401 | saddr4 = (struct sockaddr_in *)srcaddr; | |
402 | saddr6 = (struct sockaddr_in6 *)srcaddr; | |
403 | if (srcaddr->sa_family == AF_INET6) | |
404 | seq_printf(s, ",srcaddr=%pI6c", | |
405 | &saddr6->sin6_addr); | |
406 | else if (srcaddr->sa_family == AF_INET) | |
407 | seq_printf(s, ",srcaddr=%pI4", | |
408 | &saddr4->sin_addr.s_addr); | |
409 | else | |
410 | seq_printf(s, ",srcaddr=BAD-AF:%i", | |
411 | (int)(srcaddr->sa_family)); | |
412 | } | |
413 | ||
8616e0fc | 414 | seq_printf(s, ",uid=%d", cifs_sb->mnt_uid); |
340481a3 JL |
415 | if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_OVERR_UID) |
416 | seq_printf(s, ",forceuid"); | |
4486d6ed JL |
417 | else |
418 | seq_printf(s, ",noforceuid"); | |
340481a3 | 419 | |
8616e0fc | 420 | seq_printf(s, ",gid=%d", cifs_sb->mnt_gid); |
340481a3 JL |
421 | if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_OVERR_GID) |
422 | seq_printf(s, ",forcegid"); | |
4486d6ed JL |
423 | else |
424 | seq_printf(s, ",noforcegid"); | |
8616e0fc | 425 | |
61f98ffd | 426 | cifs_show_address(s, tcon->ses->server); |
1da177e4 | 427 | |
8616e0fc JL |
428 | if (!tcon->unix_ext) |
429 | seq_printf(s, ",file_mode=0%o,dir_mode=0%o", | |
2b280fab SF |
430 | cifs_sb->mnt_file_mode, |
431 | cifs_sb->mnt_dir_mode); | |
8616e0fc JL |
432 | if (tcon->seal) |
433 | seq_printf(s, ",seal"); | |
434 | if (tcon->nocase) | |
435 | seq_printf(s, ",nocase"); | |
436 | if (tcon->retry) | |
437 | seq_printf(s, ",hard"); | |
d4ffff1f PS |
438 | if (tcon->unix_ext) |
439 | seq_printf(s, ",unix"); | |
440 | else | |
441 | seq_printf(s, ",nounix"); | |
8616e0fc JL |
442 | if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_POSIX_PATHS) |
443 | seq_printf(s, ",posixpaths"); | |
444 | if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_SET_UID) | |
445 | seq_printf(s, ",setuids"); | |
446 | if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_SERVER_INUM) | |
447 | seq_printf(s, ",serverino"); | |
d4ffff1f PS |
448 | if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_RWPIDFORWARD) |
449 | seq_printf(s, ",rwpidforward"); | |
450 | if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_NOPOSIXBRL) | |
451 | seq_printf(s, ",forcemand"); | |
8616e0fc JL |
452 | if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_DIRECT_IO) |
453 | seq_printf(s, ",directio"); | |
454 | if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_NO_XATTR) | |
455 | seq_printf(s, ",nouser_xattr"); | |
456 | if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_MAP_SPECIAL_CHR) | |
457 | seq_printf(s, ",mapchars"); | |
458 | if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_UNX_EMUL) | |
459 | seq_printf(s, ",sfu"); | |
460 | if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_NO_BRL) | |
461 | seq_printf(s, ",nobrl"); | |
462 | if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_CIFS_ACL) | |
463 | seq_printf(s, ",cifsacl"); | |
464 | if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_DYNPERM) | |
465 | seq_printf(s, ",dynperm"); | |
466 | if (m->mnt_sb->s_flags & MS_POSIXACL) | |
467 | seq_printf(s, ",acl"); | |
736a3320 SM |
468 | if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_MF_SYMLINKS) |
469 | seq_printf(s, ",mfsymlinks"); | |
476428f8 SJ |
470 | if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_FSCACHE) |
471 | seq_printf(s, ",fsc"); | |
8616e0fc JL |
472 | |
473 | seq_printf(s, ",rsize=%d", cifs_sb->rsize); | |
474 | seq_printf(s, ",wsize=%d", cifs_sb->wsize); | |
6d20e840 SJ |
475 | /* convert actimeo and display it in seconds */ |
476 | seq_printf(s, ",actimeo=%lu", cifs_sb->actimeo / HZ); | |
8616e0fc | 477 | |
1da177e4 LT |
478 | return 0; |
479 | } | |
480 | ||
42faad99 | 481 | static void cifs_umount_begin(struct super_block *sb) |
68058e75 | 482 | { |
42faad99 | 483 | struct cifs_sb_info *cifs_sb = CIFS_SB(sb); |
96daf2b0 | 484 | struct cifs_tcon *tcon; |
68058e75 | 485 | |
4523cc30 | 486 | if (cifs_sb == NULL) |
9e2e85f8 SF |
487 | return; |
488 | ||
0d424ad0 | 489 | tcon = cifs_sb_master_tcon(cifs_sb); |
f1987b44 | 490 | |
3f9bcca7 | 491 | spin_lock(&cifs_tcp_ses_lock); |
ad8034f1 SF |
492 | if ((tcon->tc_count > 1) || (tcon->tidStatus == CifsExiting)) { |
493 | /* we have other mounts to same share or we have | |
494 | already tried to force umount this and woken up | |
495 | all waiting network requests, nothing to do */ | |
3f9bcca7 | 496 | spin_unlock(&cifs_tcp_ses_lock); |
ad8034f1 SF |
497 | return; |
498 | } else if (tcon->tc_count == 1) | |
5e1253b5 | 499 | tcon->tidStatus = CifsExiting; |
3f9bcca7 | 500 | spin_unlock(&cifs_tcp_ses_lock); |
5e1253b5 | 501 | |
3a5ff61c | 502 | /* cancel_brl_requests(tcon); */ /* BB mark all brl mids as exiting */ |
7b7abfe3 | 503 | /* cancel_notify_requests(tcon); */ |
50c2f753 | 504 | if (tcon->ses && tcon->ses->server) { |
b6b38f70 | 505 | cFYI(1, "wake up tasks now - umount begin not complete"); |
9e2e85f8 | 506 | wake_up_all(&tcon->ses->server->request_q); |
6ab16d24 SF |
507 | wake_up_all(&tcon->ses->server->response_q); |
508 | msleep(1); /* yield */ | |
509 | /* we have to kick the requests once more */ | |
510 | wake_up_all(&tcon->ses->server->response_q); | |
511 | msleep(1); | |
5e1253b5 | 512 | } |
68058e75 SF |
513 | |
514 | return; | |
515 | } | |
68058e75 | 516 | |
bf97d287 SF |
517 | #ifdef CONFIG_CIFS_STATS2 |
518 | static int cifs_show_stats(struct seq_file *s, struct vfsmount *mnt) | |
519 | { | |
520 | /* BB FIXME */ | |
521 | return 0; | |
522 | } | |
523 | #endif | |
524 | ||
1da177e4 LT |
525 | static int cifs_remount(struct super_block *sb, int *flags, char *data) |
526 | { | |
527 | *flags |= MS_NODIRATIME; | |
528 | return 0; | |
529 | } | |
530 | ||
45321ac5 | 531 | static int cifs_drop_inode(struct inode *inode) |
12420ac3 JL |
532 | { |
533 | struct cifs_sb_info *cifs_sb = CIFS_SB(inode->i_sb); | |
534 | ||
45321ac5 AV |
535 | /* no serverino => unconditional eviction */ |
536 | return !(cifs_sb->mnt_cifs_flags & CIFS_MOUNT_SERVER_INUM) || | |
537 | generic_drop_inode(inode); | |
12420ac3 JL |
538 | } |
539 | ||
ee9b6d61 | 540 | static const struct super_operations cifs_super_ops = { |
1da177e4 LT |
541 | .put_super = cifs_put_super, |
542 | .statfs = cifs_statfs, | |
543 | .alloc_inode = cifs_alloc_inode, | |
544 | .destroy_inode = cifs_destroy_inode, | |
12420ac3 | 545 | .drop_inode = cifs_drop_inode, |
b57922d9 | 546 | .evict_inode = cifs_evict_inode, |
12420ac3 JL |
547 | /* .delete_inode = cifs_delete_inode, */ /* Do not need above |
548 | function unless later we add lazy close of inodes or unless the | |
50c2f753 SF |
549 | kernel forgets to call us with the same number of releases (closes) |
550 | as opens */ | |
1da177e4 | 551 | .show_options = cifs_show_options, |
7b7abfe3 | 552 | .umount_begin = cifs_umount_begin, |
1da177e4 | 553 | .remount_fs = cifs_remount, |
bf97d287 | 554 | #ifdef CONFIG_CIFS_STATS2 |
f46d3e11 | 555 | .show_stats = cifs_show_stats, |
bf97d287 | 556 | #endif |
1da177e4 LT |
557 | }; |
558 | ||
f87d39d9 SF |
559 | /* |
560 | * Get root dentry from superblock according to prefix path mount option. | |
561 | * Return dentry with refcount + 1 on success and NULL otherwise. | |
562 | */ | |
563 | static struct dentry * | |
564 | cifs_get_root(struct smb_vol *vol, struct super_block *sb) | |
565 | { | |
566 | int xid, rc; | |
567 | struct inode *inode; | |
568 | struct qstr name; | |
569 | struct dentry *dparent = NULL, *dchild = NULL, *alias; | |
570 | struct cifs_sb_info *cifs_sb = CIFS_SB(sb); | |
571 | unsigned int i, full_len, len; | |
572 | char *full_path = NULL, *pstart; | |
573 | char sep; | |
574 | ||
575 | full_path = cifs_build_path_to_root(vol, cifs_sb, | |
576 | cifs_sb_master_tcon(cifs_sb)); | |
577 | if (full_path == NULL) | |
578 | return NULL; | |
579 | ||
580 | cFYI(1, "Get root dentry for %s", full_path); | |
581 | ||
582 | xid = GetXid(); | |
583 | sep = CIFS_DIR_SEP(cifs_sb); | |
584 | dparent = dget(sb->s_root); | |
585 | full_len = strlen(full_path); | |
586 | full_path[full_len] = sep; | |
587 | pstart = full_path + 1; | |
588 | ||
589 | for (i = 1, len = 0; i <= full_len; i++) { | |
590 | if (full_path[i] != sep || !len) { | |
591 | len++; | |
592 | continue; | |
593 | } | |
594 | ||
595 | full_path[i] = 0; | |
596 | cFYI(1, "get dentry for %s", pstart); | |
597 | ||
598 | name.name = pstart; | |
599 | name.len = len; | |
600 | name.hash = full_name_hash(pstart, len); | |
601 | dchild = d_lookup(dparent, &name); | |
602 | if (dchild == NULL) { | |
603 | cFYI(1, "not exists"); | |
604 | dchild = d_alloc(dparent, &name); | |
605 | if (dchild == NULL) { | |
606 | dput(dparent); | |
607 | dparent = NULL; | |
608 | goto out; | |
609 | } | |
610 | } | |
611 | ||
612 | cFYI(1, "get inode"); | |
613 | if (dchild->d_inode == NULL) { | |
614 | cFYI(1, "not exists"); | |
615 | inode = NULL; | |
616 | if (cifs_sb_master_tcon(CIFS_SB(sb))->unix_ext) | |
617 | rc = cifs_get_inode_info_unix(&inode, full_path, | |
618 | sb, xid); | |
619 | else | |
620 | rc = cifs_get_inode_info(&inode, full_path, | |
621 | NULL, sb, xid, NULL); | |
622 | if (rc) { | |
623 | dput(dchild); | |
624 | dput(dparent); | |
625 | dparent = NULL; | |
626 | goto out; | |
627 | } | |
628 | alias = d_materialise_unique(dchild, inode); | |
629 | if (alias != NULL) { | |
630 | dput(dchild); | |
631 | if (IS_ERR(alias)) { | |
632 | dput(dparent); | |
633 | dparent = NULL; | |
634 | goto out; | |
635 | } | |
636 | dchild = alias; | |
637 | } | |
638 | } | |
639 | cFYI(1, "parent %p, child %p", dparent, dchild); | |
640 | ||
641 | dput(dparent); | |
642 | dparent = dchild; | |
643 | len = 0; | |
644 | pstart = full_path + i + 1; | |
645 | full_path[i] = sep; | |
646 | } | |
647 | out: | |
648 | _FreeXid(xid); | |
649 | kfree(full_path); | |
650 | return dparent; | |
651 | } | |
652 | ||
d753ed97 AV |
653 | static struct dentry * |
654 | cifs_do_mount(struct file_system_type *fs_type, | |
724d9f1c | 655 | int flags, const char *dev_name, void *data) |
1da177e4 LT |
656 | { |
657 | int rc; | |
db719222 | 658 | struct super_block *sb; |
724d9f1c PS |
659 | struct cifs_sb_info *cifs_sb; |
660 | struct smb_vol *volume_info; | |
25c7f41e | 661 | struct cifs_mnt_data mnt_data; |
724d9f1c | 662 | struct dentry *root; |
1da177e4 | 663 | |
b6b38f70 | 664 | cFYI(1, "Devname: %s flags: %d ", dev_name, flags); |
1da177e4 | 665 | |
724d9f1c PS |
666 | rc = cifs_setup_volume_info(&volume_info, (char *)data, dev_name); |
667 | if (rc) | |
668 | return ERR_PTR(rc); | |
669 | ||
670 | cifs_sb = kzalloc(sizeof(struct cifs_sb_info), GFP_KERNEL); | |
671 | if (cifs_sb == NULL) { | |
672 | root = ERR_PTR(-ENOMEM); | |
673 | goto out; | |
674 | } | |
675 | ||
676 | cifs_setup_cifs_sb(volume_info, cifs_sb); | |
677 | ||
25c7f41e PS |
678 | mnt_data.vol = volume_info; |
679 | mnt_data.cifs_sb = cifs_sb; | |
680 | mnt_data.flags = flags; | |
681 | ||
682 | sb = sget(fs_type, cifs_match_super, set_anon_super, &mnt_data); | |
724d9f1c | 683 | if (IS_ERR(sb)) { |
724d9f1c | 684 | root = ERR_CAST(sb); |
641a58d6 | 685 | goto out_cifs_sb; |
724d9f1c | 686 | } |
1da177e4 | 687 | |
25c7f41e PS |
688 | if (sb->s_fs_info) { |
689 | cFYI(1, "Use existing superblock"); | |
690 | goto out_shared; | |
691 | } | |
692 | ||
724d9f1c PS |
693 | /* |
694 | * Copy mount params for use in submounts. Better to do | |
695 | * the copy here and deal with the error before cleanup gets | |
696 | * complicated post-mount. | |
697 | */ | |
b2e5cd33 PS |
698 | cifs_sb->mountdata = kstrndup(data, PAGE_SIZE, GFP_KERNEL); |
699 | if (cifs_sb->mountdata == NULL) { | |
724d9f1c | 700 | root = ERR_PTR(-ENOMEM); |
641a58d6 | 701 | goto out_super; |
724d9f1c PS |
702 | } |
703 | ||
b2e5cd33 PS |
704 | sb->s_flags = flags; |
705 | /* BB should we make this contingent on mount parm? */ | |
706 | sb->s_flags |= MS_NODIRATIME | MS_NOATIME; | |
707 | sb->s_fs_info = cifs_sb; | |
708 | ||
709 | rc = cifs_read_super(sb, volume_info, dev_name, | |
724d9f1c | 710 | flags & MS_SILENT ? 1 : 0); |
1da177e4 | 711 | if (rc) { |
724d9f1c | 712 | root = ERR_PTR(rc); |
641a58d6 | 713 | goto out_super; |
1da177e4 | 714 | } |
724d9f1c | 715 | |
1da177e4 | 716 | sb->s_flags |= MS_ACTIVE; |
724d9f1c | 717 | |
f87d39d9 SF |
718 | root = cifs_get_root(volume_info, sb); |
719 | if (root == NULL) | |
720 | goto out_super; | |
25c7f41e | 721 | |
f87d39d9 | 722 | cFYI(1, "dentry root is: %p", root); |
641a58d6 | 723 | goto out; |
724d9f1c | 724 | |
25c7f41e PS |
725 | out_shared: |
726 | root = cifs_get_root(volume_info, sb); | |
727 | if (root) | |
728 | cFYI(1, "dentry root is: %p", root); | |
729 | goto out; | |
730 | ||
641a58d6 | 731 | out_super: |
b2e5cd33 | 732 | kfree(cifs_sb->mountdata); |
641a58d6 PS |
733 | deactivate_locked_super(sb); |
734 | ||
735 | out_cifs_sb: | |
b2e5cd33 | 736 | unload_nls(cifs_sb->local_nls); |
724d9f1c | 737 | kfree(cifs_sb); |
641a58d6 PS |
738 | |
739 | out: | |
724d9f1c PS |
740 | cifs_cleanup_volume_info(&volume_info); |
741 | return root; | |
1da177e4 LT |
742 | } |
743 | ||
027445c3 BP |
744 | static ssize_t cifs_file_aio_write(struct kiocb *iocb, const struct iovec *iov, |
745 | unsigned long nr_segs, loff_t pos) | |
1da177e4 | 746 | { |
e6a00296 | 747 | struct inode *inode = iocb->ki_filp->f_path.dentry->d_inode; |
1da177e4 | 748 | ssize_t written; |
72432ffc | 749 | int rc; |
1da177e4 | 750 | |
027445c3 | 751 | written = generic_file_aio_write(iocb, iov, nr_segs, pos); |
72432ffc PS |
752 | |
753 | if (CIFS_I(inode)->clientCanCacheAll) | |
754 | return written; | |
755 | ||
756 | rc = filemap_fdatawrite(inode->i_mapping); | |
757 | if (rc) | |
758 | cFYI(1, "cifs_file_aio_write: %d rc on %p inode", rc, inode); | |
759 | ||
1da177e4 LT |
760 | return written; |
761 | } | |
762 | ||
c32a0b68 SF |
763 | static loff_t cifs_llseek(struct file *file, loff_t offset, int origin) |
764 | { | |
765 | /* origin == SEEK_END => we must revalidate the cached file length */ | |
0889a944 | 766 | if (origin == SEEK_END) { |
6feb9891 PS |
767 | int rc; |
768 | struct inode *inode = file->f_path.dentry->d_inode; | |
769 | ||
770 | /* | |
771 | * We need to be sure that all dirty pages are written and the | |
772 | * server has the newest file length. | |
773 | */ | |
774 | if (!CIFS_I(inode)->clientCanCacheRead && inode->i_mapping && | |
775 | inode->i_mapping->nrpages != 0) { | |
776 | rc = filemap_fdatawait(inode->i_mapping); | |
156ecb2d SF |
777 | if (rc) { |
778 | mapping_set_error(inode->i_mapping, rc); | |
779 | return rc; | |
780 | } | |
6feb9891 PS |
781 | } |
782 | /* | |
783 | * Some applications poll for the file length in this strange | |
784 | * way so we must seek to end on non-oplocked files by | |
785 | * setting the revalidate time to zero. | |
786 | */ | |
787 | CIFS_I(inode)->time = 0; | |
788 | ||
789 | rc = cifs_revalidate_file_attr(file); | |
790 | if (rc < 0) | |
791 | return (loff_t)rc; | |
c32a0b68 | 792 | } |
9465efc9 | 793 | return generic_file_llseek_unlocked(file, offset, origin); |
c32a0b68 SF |
794 | } |
795 | ||
84210e91 SF |
796 | static int cifs_setlease(struct file *file, long arg, struct file_lock **lease) |
797 | { | |
b89f4321 AB |
798 | /* note that this is called by vfs setlease with lock_flocks held |
799 | to protect *lease from going away */ | |
84210e91 | 800 | struct inode *inode = file->f_path.dentry->d_inode; |
ba00ba64 | 801 | struct cifsFileInfo *cfile = file->private_data; |
84210e91 SF |
802 | |
803 | if (!(S_ISREG(inode->i_mode))) | |
804 | return -EINVAL; | |
805 | ||
806 | /* check if file is oplocked */ | |
807 | if (((arg == F_RDLCK) && | |
808 | (CIFS_I(inode)->clientCanCacheRead)) || | |
809 | ((arg == F_WRLCK) && | |
810 | (CIFS_I(inode)->clientCanCacheAll))) | |
811 | return generic_setlease(file, arg, lease); | |
13cfb733 JL |
812 | else if (tlink_tcon(cfile->tlink)->local_lease && |
813 | !CIFS_I(inode)->clientCanCacheRead) | |
84210e91 SF |
814 | /* If the server claims to support oplock on this |
815 | file, then we still need to check oplock even | |
816 | if the local_lease mount option is set, but there | |
817 | are servers which do not support oplock for which | |
818 | this mount option may be useful if the user | |
819 | knows that the file won't be changed on the server | |
820 | by anyone else */ | |
821 | return generic_setlease(file, arg, lease); | |
51ee4b84 | 822 | else |
84210e91 SF |
823 | return -EAGAIN; |
824 | } | |
84210e91 | 825 | |
e6ab1582 | 826 | struct file_system_type cifs_fs_type = { |
1da177e4 LT |
827 | .owner = THIS_MODULE, |
828 | .name = "cifs", | |
d753ed97 | 829 | .mount = cifs_do_mount, |
1da177e4 LT |
830 | .kill_sb = kill_anon_super, |
831 | /* .fs_flags */ | |
832 | }; | |
754661f1 | 833 | const struct inode_operations cifs_dir_inode_ops = { |
1da177e4 LT |
834 | .create = cifs_create, |
835 | .lookup = cifs_lookup, | |
836 | .getattr = cifs_getattr, | |
837 | .unlink = cifs_unlink, | |
838 | .link = cifs_hardlink, | |
839 | .mkdir = cifs_mkdir, | |
840 | .rmdir = cifs_rmdir, | |
841 | .rename = cifs_rename, | |
842 | .permission = cifs_permission, | |
843 | /* revalidate:cifs_revalidate, */ | |
844 | .setattr = cifs_setattr, | |
845 | .symlink = cifs_symlink, | |
846 | .mknod = cifs_mknod, | |
847 | #ifdef CONFIG_CIFS_XATTR | |
848 | .setxattr = cifs_setxattr, | |
849 | .getxattr = cifs_getxattr, | |
850 | .listxattr = cifs_listxattr, | |
851 | .removexattr = cifs_removexattr, | |
852 | #endif | |
853 | }; | |
854 | ||
754661f1 | 855 | const struct inode_operations cifs_file_inode_ops = { |
1da177e4 LT |
856 | /* revalidate:cifs_revalidate, */ |
857 | .setattr = cifs_setattr, | |
858 | .getattr = cifs_getattr, /* do we need this anymore? */ | |
859 | .rename = cifs_rename, | |
860 | .permission = cifs_permission, | |
861 | #ifdef CONFIG_CIFS_XATTR | |
862 | .setxattr = cifs_setxattr, | |
863 | .getxattr = cifs_getxattr, | |
864 | .listxattr = cifs_listxattr, | |
865 | .removexattr = cifs_removexattr, | |
50c2f753 | 866 | #endif |
1da177e4 LT |
867 | }; |
868 | ||
754661f1 | 869 | const struct inode_operations cifs_symlink_inode_ops = { |
50c2f753 | 870 | .readlink = generic_readlink, |
1da177e4 LT |
871 | .follow_link = cifs_follow_link, |
872 | .put_link = cifs_put_link, | |
873 | .permission = cifs_permission, | |
874 | /* BB add the following two eventually */ | |
875 | /* revalidate: cifs_revalidate, | |
876 | setattr: cifs_notify_change, *//* BB do we need notify change */ | |
877 | #ifdef CONFIG_CIFS_XATTR | |
878 | .setxattr = cifs_setxattr, | |
879 | .getxattr = cifs_getxattr, | |
880 | .listxattr = cifs_listxattr, | |
881 | .removexattr = cifs_removexattr, | |
50c2f753 | 882 | #endif |
1da177e4 LT |
883 | }; |
884 | ||
4b6f5d20 | 885 | const struct file_operations cifs_file_ops = { |
87c89dd7 SF |
886 | .read = do_sync_read, |
887 | .write = do_sync_write, | |
87c89dd7 SF |
888 | .aio_read = generic_file_aio_read, |
889 | .aio_write = cifs_file_aio_write, | |
1da177e4 LT |
890 | .open = cifs_open, |
891 | .release = cifs_close, | |
892 | .lock = cifs_lock, | |
893 | .fsync = cifs_fsync, | |
894 | .flush = cifs_flush, | |
895 | .mmap = cifs_file_mmap, | |
5ffc4ef4 | 896 | .splice_read = generic_file_splice_read, |
c32a0b68 | 897 | .llseek = cifs_llseek, |
c67593a0 | 898 | #ifdef CONFIG_CIFS_POSIX |
f9ddcca4 | 899 | .unlocked_ioctl = cifs_ioctl, |
c67593a0 | 900 | #endif /* CONFIG_CIFS_POSIX */ |
84210e91 | 901 | .setlease = cifs_setlease, |
1da177e4 LT |
902 | }; |
903 | ||
8be7e6ba PS |
904 | const struct file_operations cifs_file_strict_ops = { |
905 | .read = do_sync_read, | |
906 | .write = do_sync_write, | |
a70307ee | 907 | .aio_read = cifs_strict_readv, |
72432ffc | 908 | .aio_write = cifs_strict_writev, |
8be7e6ba PS |
909 | .open = cifs_open, |
910 | .release = cifs_close, | |
911 | .lock = cifs_lock, | |
912 | .fsync = cifs_strict_fsync, | |
913 | .flush = cifs_flush, | |
7a6a19b1 | 914 | .mmap = cifs_file_strict_mmap, |
8be7e6ba PS |
915 | .splice_read = generic_file_splice_read, |
916 | .llseek = cifs_llseek, | |
917 | #ifdef CONFIG_CIFS_POSIX | |
918 | .unlocked_ioctl = cifs_ioctl, | |
919 | #endif /* CONFIG_CIFS_POSIX */ | |
920 | .setlease = cifs_setlease, | |
921 | }; | |
922 | ||
4b6f5d20 | 923 | const struct file_operations cifs_file_direct_ops = { |
0b81c1c4 PS |
924 | /* BB reevaluate whether they can be done with directio, no cache */ |
925 | .read = do_sync_read, | |
926 | .write = do_sync_write, | |
927 | .aio_read = cifs_user_readv, | |
928 | .aio_write = cifs_user_writev, | |
1da177e4 LT |
929 | .open = cifs_open, |
930 | .release = cifs_close, | |
931 | .lock = cifs_lock, | |
932 | .fsync = cifs_fsync, | |
933 | .flush = cifs_flush, | |
a994b8fa | 934 | .mmap = cifs_file_mmap, |
5ffc4ef4 | 935 | .splice_read = generic_file_splice_read, |
c67593a0 | 936 | #ifdef CONFIG_CIFS_POSIX |
f9ddcca4 | 937 | .unlocked_ioctl = cifs_ioctl, |
c67593a0 | 938 | #endif /* CONFIG_CIFS_POSIX */ |
c32a0b68 | 939 | .llseek = cifs_llseek, |
84210e91 | 940 | .setlease = cifs_setlease, |
1da177e4 | 941 | }; |
8be7e6ba | 942 | |
4b6f5d20 | 943 | const struct file_operations cifs_file_nobrl_ops = { |
87c89dd7 SF |
944 | .read = do_sync_read, |
945 | .write = do_sync_write, | |
87c89dd7 SF |
946 | .aio_read = generic_file_aio_read, |
947 | .aio_write = cifs_file_aio_write, | |
948 | .open = cifs_open, | |
949 | .release = cifs_close, | |
950 | .fsync = cifs_fsync, | |
951 | .flush = cifs_flush, | |
952 | .mmap = cifs_file_mmap, | |
5ffc4ef4 | 953 | .splice_read = generic_file_splice_read, |
c32a0b68 | 954 | .llseek = cifs_llseek, |
8b94bcb9 | 955 | #ifdef CONFIG_CIFS_POSIX |
f9ddcca4 | 956 | .unlocked_ioctl = cifs_ioctl, |
8b94bcb9 | 957 | #endif /* CONFIG_CIFS_POSIX */ |
84210e91 | 958 | .setlease = cifs_setlease, |
8b94bcb9 SF |
959 | }; |
960 | ||
8be7e6ba PS |
961 | const struct file_operations cifs_file_strict_nobrl_ops = { |
962 | .read = do_sync_read, | |
963 | .write = do_sync_write, | |
a70307ee | 964 | .aio_read = cifs_strict_readv, |
72432ffc | 965 | .aio_write = cifs_strict_writev, |
8be7e6ba PS |
966 | .open = cifs_open, |
967 | .release = cifs_close, | |
968 | .fsync = cifs_strict_fsync, | |
969 | .flush = cifs_flush, | |
7a6a19b1 | 970 | .mmap = cifs_file_strict_mmap, |
8be7e6ba PS |
971 | .splice_read = generic_file_splice_read, |
972 | .llseek = cifs_llseek, | |
973 | #ifdef CONFIG_CIFS_POSIX | |
974 | .unlocked_ioctl = cifs_ioctl, | |
975 | #endif /* CONFIG_CIFS_POSIX */ | |
976 | .setlease = cifs_setlease, | |
977 | }; | |
978 | ||
4b6f5d20 | 979 | const struct file_operations cifs_file_direct_nobrl_ops = { |
0b81c1c4 PS |
980 | /* BB reevaluate whether they can be done with directio, no cache */ |
981 | .read = do_sync_read, | |
982 | .write = do_sync_write, | |
983 | .aio_read = cifs_user_readv, | |
984 | .aio_write = cifs_user_writev, | |
87c89dd7 SF |
985 | .open = cifs_open, |
986 | .release = cifs_close, | |
987 | .fsync = cifs_fsync, | |
988 | .flush = cifs_flush, | |
810627a0 | 989 | .mmap = cifs_file_mmap, |
5ffc4ef4 | 990 | .splice_read = generic_file_splice_read, |
8b94bcb9 | 991 | #ifdef CONFIG_CIFS_POSIX |
f9ddcca4 | 992 | .unlocked_ioctl = cifs_ioctl, |
8b94bcb9 | 993 | #endif /* CONFIG_CIFS_POSIX */ |
c32a0b68 | 994 | .llseek = cifs_llseek, |
84210e91 | 995 | .setlease = cifs_setlease, |
8b94bcb9 | 996 | }; |
1da177e4 | 997 | |
4b6f5d20 | 998 | const struct file_operations cifs_dir_ops = { |
1da177e4 LT |
999 | .readdir = cifs_readdir, |
1000 | .release = cifs_closedir, | |
1001 | .read = generic_read_dir, | |
f9ddcca4 | 1002 | .unlocked_ioctl = cifs_ioctl, |
3222a3e5 | 1003 | .llseek = generic_file_llseek, |
1da177e4 LT |
1004 | }; |
1005 | ||
1006 | static void | |
51cc5068 | 1007 | cifs_init_once(void *inode) |
1da177e4 LT |
1008 | { |
1009 | struct cifsInodeInfo *cifsi = inode; | |
1010 | ||
a35afb83 CL |
1011 | inode_init_once(&cifsi->vfs_inode); |
1012 | INIT_LIST_HEAD(&cifsi->lockList); | |
1da177e4 LT |
1013 | } |
1014 | ||
1015 | static int | |
1016 | cifs_init_inodecache(void) | |
1017 | { | |
1018 | cifs_inode_cachep = kmem_cache_create("cifs_inode_cache", | |
26f57364 | 1019 | sizeof(struct cifsInodeInfo), |
fffb60f9 PJ |
1020 | 0, (SLAB_RECLAIM_ACCOUNT| |
1021 | SLAB_MEM_SPREAD), | |
20c2df83 | 1022 | cifs_init_once); |
1da177e4 LT |
1023 | if (cifs_inode_cachep == NULL) |
1024 | return -ENOMEM; | |
1025 | ||
1026 | return 0; | |
1027 | } | |
1028 | ||
1029 | static void | |
1030 | cifs_destroy_inodecache(void) | |
1031 | { | |
1a1d92c1 | 1032 | kmem_cache_destroy(cifs_inode_cachep); |
1da177e4 LT |
1033 | } |
1034 | ||
1035 | static int | |
1036 | cifs_init_request_bufs(void) | |
1037 | { | |
4523cc30 | 1038 | if (CIFSMaxBufSize < 8192) { |
1da177e4 LT |
1039 | /* Buffer size can not be smaller than 2 * PATH_MAX since maximum |
1040 | Unicode path name has to fit in any SMB/CIFS path based frames */ | |
1041 | CIFSMaxBufSize = 8192; | |
1042 | } else if (CIFSMaxBufSize > 1024*127) { | |
1043 | CIFSMaxBufSize = 1024 * 127; | |
1044 | } else { | |
1045 | CIFSMaxBufSize &= 0x1FE00; /* Round size to even 512 byte mult*/ | |
1046 | } | |
b6b38f70 | 1047 | /* cERROR(1, "CIFSMaxBufSize %d 0x%x",CIFSMaxBufSize,CIFSMaxBufSize); */ |
1da177e4 LT |
1048 | cifs_req_cachep = kmem_cache_create("cifs_request", |
1049 | CIFSMaxBufSize + | |
1050 | MAX_CIFS_HDR_SIZE, 0, | |
20c2df83 | 1051 | SLAB_HWCACHE_ALIGN, NULL); |
1da177e4 LT |
1052 | if (cifs_req_cachep == NULL) |
1053 | return -ENOMEM; | |
1054 | ||
4523cc30 | 1055 | if (cifs_min_rcv < 1) |
1da177e4 LT |
1056 | cifs_min_rcv = 1; |
1057 | else if (cifs_min_rcv > 64) { | |
1058 | cifs_min_rcv = 64; | |
b6b38f70 | 1059 | cERROR(1, "cifs_min_rcv set to maximum (64)"); |
1da177e4 LT |
1060 | } |
1061 | ||
93d2341c MD |
1062 | cifs_req_poolp = mempool_create_slab_pool(cifs_min_rcv, |
1063 | cifs_req_cachep); | |
1da177e4 | 1064 | |
4523cc30 | 1065 | if (cifs_req_poolp == NULL) { |
1da177e4 LT |
1066 | kmem_cache_destroy(cifs_req_cachep); |
1067 | return -ENOMEM; | |
1068 | } | |
ec637e3f | 1069 | /* MAX_CIFS_SMALL_BUFFER_SIZE bytes is enough for most SMB responses and |
1da177e4 LT |
1070 | almost all handle based requests (but not write response, nor is it |
1071 | sufficient for path based requests). A smaller size would have | |
50c2f753 | 1072 | been more efficient (compacting multiple slab items on one 4k page) |
1da177e4 LT |
1073 | for the case in which debug was on, but this larger size allows |
1074 | more SMBs to use small buffer alloc and is still much more | |
6dc0f87e | 1075 | efficient to alloc 1 per page off the slab compared to 17K (5page) |
1da177e4 LT |
1076 | alloc of large cifs buffers even when page debugging is on */ |
1077 | cifs_sm_req_cachep = kmem_cache_create("cifs_small_rq", | |
6dc0f87e | 1078 | MAX_CIFS_SMALL_BUFFER_SIZE, 0, SLAB_HWCACHE_ALIGN, |
20c2df83 | 1079 | NULL); |
1da177e4 LT |
1080 | if (cifs_sm_req_cachep == NULL) { |
1081 | mempool_destroy(cifs_req_poolp); | |
1082 | kmem_cache_destroy(cifs_req_cachep); | |
6dc0f87e | 1083 | return -ENOMEM; |
1da177e4 LT |
1084 | } |
1085 | ||
4523cc30 | 1086 | if (cifs_min_small < 2) |
1da177e4 LT |
1087 | cifs_min_small = 2; |
1088 | else if (cifs_min_small > 256) { | |
1089 | cifs_min_small = 256; | |
b6b38f70 | 1090 | cFYI(1, "cifs_min_small set to maximum (256)"); |
1da177e4 LT |
1091 | } |
1092 | ||
93d2341c MD |
1093 | cifs_sm_req_poolp = mempool_create_slab_pool(cifs_min_small, |
1094 | cifs_sm_req_cachep); | |
1da177e4 | 1095 | |
4523cc30 | 1096 | if (cifs_sm_req_poolp == NULL) { |
1da177e4 LT |
1097 | mempool_destroy(cifs_req_poolp); |
1098 | kmem_cache_destroy(cifs_req_cachep); | |
1099 | kmem_cache_destroy(cifs_sm_req_cachep); | |
1100 | return -ENOMEM; | |
1101 | } | |
1102 | ||
1103 | return 0; | |
1104 | } | |
1105 | ||
1106 | static void | |
1107 | cifs_destroy_request_bufs(void) | |
1108 | { | |
1109 | mempool_destroy(cifs_req_poolp); | |
1a1d92c1 | 1110 | kmem_cache_destroy(cifs_req_cachep); |
1da177e4 | 1111 | mempool_destroy(cifs_sm_req_poolp); |
1a1d92c1 | 1112 | kmem_cache_destroy(cifs_sm_req_cachep); |
1da177e4 LT |
1113 | } |
1114 | ||
1115 | static int | |
1116 | cifs_init_mids(void) | |
1117 | { | |
1118 | cifs_mid_cachep = kmem_cache_create("cifs_mpx_ids", | |
26f57364 SF |
1119 | sizeof(struct mid_q_entry), 0, |
1120 | SLAB_HWCACHE_ALIGN, NULL); | |
1da177e4 LT |
1121 | if (cifs_mid_cachep == NULL) |
1122 | return -ENOMEM; | |
1123 | ||
93d2341c MD |
1124 | /* 3 is a reasonable minimum number of simultaneous operations */ |
1125 | cifs_mid_poolp = mempool_create_slab_pool(3, cifs_mid_cachep); | |
4523cc30 | 1126 | if (cifs_mid_poolp == NULL) { |
1da177e4 LT |
1127 | kmem_cache_destroy(cifs_mid_cachep); |
1128 | return -ENOMEM; | |
1129 | } | |
1130 | ||
1da177e4 LT |
1131 | return 0; |
1132 | } | |
1133 | ||
1134 | static void | |
1135 | cifs_destroy_mids(void) | |
1136 | { | |
1137 | mempool_destroy(cifs_mid_poolp); | |
1a1d92c1 | 1138 | kmem_cache_destroy(cifs_mid_cachep); |
1da177e4 LT |
1139 | } |
1140 | ||
1da177e4 LT |
1141 | static int __init |
1142 | init_cifs(void) | |
1143 | { | |
1144 | int rc = 0; | |
1da177e4 | 1145 | cifs_proc_init(); |
e7ddee90 | 1146 | INIT_LIST_HEAD(&cifs_tcp_ses_list); |
0eff0e26 | 1147 | #ifdef CONFIG_CIFS_DNOTIFY_EXPERIMENTAL /* unused temporarily */ |
4ca9c190 SF |
1148 | INIT_LIST_HEAD(&GlobalDnotifyReqList); |
1149 | INIT_LIST_HEAD(&GlobalDnotifyRsp_Q); | |
0eff0e26 | 1150 | #endif /* was needed for dnotify, and will be needed for inotify when VFS fix */ |
1da177e4 LT |
1151 | /* |
1152 | * Initialize Global counters | |
1153 | */ | |
1154 | atomic_set(&sesInfoAllocCount, 0); | |
1155 | atomic_set(&tconInfoAllocCount, 0); | |
6dc0f87e | 1156 | atomic_set(&tcpSesAllocCount, 0); |
1da177e4 LT |
1157 | atomic_set(&tcpSesReconnectCount, 0); |
1158 | atomic_set(&tconInfoReconnectCount, 0); | |
1159 | ||
1160 | atomic_set(&bufAllocCount, 0); | |
4498eed5 SF |
1161 | atomic_set(&smBufAllocCount, 0); |
1162 | #ifdef CONFIG_CIFS_STATS2 | |
1163 | atomic_set(&totBufAllocCount, 0); | |
1164 | atomic_set(&totSmBufAllocCount, 0); | |
1165 | #endif /* CONFIG_CIFS_STATS2 */ | |
1166 | ||
1da177e4 LT |
1167 | atomic_set(&midCount, 0); |
1168 | GlobalCurrentXid = 0; | |
1169 | GlobalTotalActiveXid = 0; | |
1170 | GlobalMaxActiveXid = 0; | |
3f9bcca7 | 1171 | spin_lock_init(&cifs_tcp_ses_lock); |
4477288a | 1172 | spin_lock_init(&cifs_file_list_lock); |
1da177e4 LT |
1173 | spin_lock_init(&GlobalMid_Lock); |
1174 | ||
4523cc30 | 1175 | if (cifs_max_pending < 2) { |
1da177e4 | 1176 | cifs_max_pending = 2; |
b6b38f70 | 1177 | cFYI(1, "cifs_max_pending set to min of 2"); |
4523cc30 | 1178 | } else if (cifs_max_pending > 256) { |
1da177e4 | 1179 | cifs_max_pending = 256; |
b6b38f70 | 1180 | cFYI(1, "cifs_max_pending set to max of 256"); |
1da177e4 LT |
1181 | } |
1182 | ||
f579cf3c SJ |
1183 | rc = cifs_fscache_register(); |
1184 | if (rc) | |
d3bf5221 | 1185 | goto out_clean_proc; |
f579cf3c | 1186 | |
1da177e4 | 1187 | rc = cifs_init_inodecache(); |
45af7a0f | 1188 | if (rc) |
d3bf5221 | 1189 | goto out_unreg_fscache; |
45af7a0f SF |
1190 | |
1191 | rc = cifs_init_mids(); | |
1192 | if (rc) | |
1193 | goto out_destroy_inodecache; | |
1194 | ||
1195 | rc = cifs_init_request_bufs(); | |
1196 | if (rc) | |
1197 | goto out_destroy_mids; | |
1198 | ||
84a15b93 JL |
1199 | #ifdef CONFIG_CIFS_UPCALL |
1200 | rc = register_key_type(&cifs_spnego_key_type); | |
1201 | if (rc) | |
4d79dba0 SP |
1202 | goto out_destroy_request_bufs; |
1203 | #endif /* CONFIG_CIFS_UPCALL */ | |
1204 | ||
1205 | #ifdef CONFIG_CIFS_ACL | |
1206 | rc = init_cifs_idmap(); | |
1207 | if (rc) | |
c4aca0c0 | 1208 | goto out_register_key_type; |
4d79dba0 SP |
1209 | #endif /* CONFIG_CIFS_ACL */ |
1210 | ||
1211 | rc = register_filesystem(&cifs_fs_type); | |
1212 | if (rc) | |
c4aca0c0 | 1213 | goto out_init_cifs_idmap; |
45af7a0f | 1214 | |
45af7a0f SF |
1215 | return 0; |
1216 | ||
c4aca0c0 | 1217 | out_init_cifs_idmap: |
4d79dba0 SP |
1218 | #ifdef CONFIG_CIFS_ACL |
1219 | exit_cifs_idmap(); | |
c4aca0c0 | 1220 | out_register_key_type: |
4d79dba0 | 1221 | #endif |
84a15b93 | 1222 | #ifdef CONFIG_CIFS_UPCALL |
4d79dba0 | 1223 | unregister_key_type(&cifs_spnego_key_type); |
c4aca0c0 | 1224 | out_destroy_request_bufs: |
1fc7995d | 1225 | #endif |
45af7a0f | 1226 | cifs_destroy_request_bufs(); |
d3bf5221 | 1227 | out_destroy_mids: |
45af7a0f | 1228 | cifs_destroy_mids(); |
d3bf5221 | 1229 | out_destroy_inodecache: |
45af7a0f | 1230 | cifs_destroy_inodecache(); |
d3bf5221 | 1231 | out_unreg_fscache: |
f579cf3c | 1232 | cifs_fscache_unregister(); |
d3bf5221 SF |
1233 | out_clean_proc: |
1234 | cifs_proc_clean(); | |
1da177e4 LT |
1235 | return rc; |
1236 | } | |
1237 | ||
1238 | static void __exit | |
1239 | exit_cifs(void) | |
1240 | { | |
b6b38f70 | 1241 | cFYI(DBG2, "exit_cifs"); |
1da177e4 | 1242 | cifs_proc_clean(); |
f579cf3c | 1243 | cifs_fscache_unregister(); |
6103335d | 1244 | #ifdef CONFIG_CIFS_DFS_UPCALL |
78d31a3a | 1245 | cifs_dfs_release_automount_timer(); |
6103335d | 1246 | #endif |
4d79dba0 SP |
1247 | #ifdef CONFIG_CIFS_ACL |
1248 | cifs_destroy_idmaptrees(); | |
1249 | exit_cifs_idmap(); | |
1250 | #endif | |
84a15b93 JL |
1251 | #ifdef CONFIG_CIFS_UPCALL |
1252 | unregister_key_type(&cifs_spnego_key_type); | |
1da177e4 LT |
1253 | #endif |
1254 | unregister_filesystem(&cifs_fs_type); | |
1255 | cifs_destroy_inodecache(); | |
1256 | cifs_destroy_mids(); | |
1257 | cifs_destroy_request_bufs(); | |
1da177e4 LT |
1258 | } |
1259 | ||
1260 | MODULE_AUTHOR("Steve French <sfrench@us.ibm.com>"); | |
6dc0f87e | 1261 | MODULE_LICENSE("GPL"); /* combination of LGPL + GPL source behaves as GPL */ |
1da177e4 | 1262 | MODULE_DESCRIPTION |
63135e08 SF |
1263 | ("VFS to access servers complying with the SNIA CIFS Specification " |
1264 | "e.g. Samba and Windows"); | |
1da177e4 LT |
1265 | MODULE_VERSION(CIFS_VERSION); |
1266 | module_init(init_cifs) | |
1267 | module_exit(exit_cifs) |