2005-04-17 06:20:36 +08:00
|
|
|
/*
|
|
|
|
* fs/cifs/cifsfs.c
|
|
|
|
*
|
2008-05-17 11:12:45 +08:00
|
|
|
* Copyright (C) International Business Machines Corp., 2002,2008
|
2005-04-17 06:20:36 +08:00
|
|
|
* Author(s): Steve French (sfrench@us.ibm.com)
|
|
|
|
*
|
|
|
|
* Common Internet FileSystem (CIFS) client
|
|
|
|
*
|
|
|
|
* This library is free software; you can redistribute it and/or modify
|
|
|
|
* it under the terms of the GNU Lesser General Public License as published
|
|
|
|
* by the Free Software Foundation; either version 2.1 of the License, or
|
|
|
|
* (at your option) any later version.
|
|
|
|
*
|
|
|
|
* This library is distributed in the hope that it will be useful,
|
|
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See
|
|
|
|
* the GNU Lesser General Public License for more details.
|
|
|
|
*
|
|
|
|
* You should have received a copy of the GNU Lesser General Public License
|
|
|
|
* along with this library; if not, write to the Free Software
|
|
|
|
* Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
|
|
|
|
*/
|
|
|
|
|
|
|
|
/* Note that BB means BUGBUG (ie something to fix eventually) */
|
|
|
|
|
|
|
|
#include <linux/module.h>
|
|
|
|
#include <linux/fs.h>
|
|
|
|
#include <linux/mount.h>
|
|
|
|
#include <linux/slab.h>
|
|
|
|
#include <linux/init.h>
|
|
|
|
#include <linux/list.h>
|
|
|
|
#include <linux/seq_file.h>
|
|
|
|
#include <linux/vfs.h>
|
|
|
|
#include <linux/mempool.h>
|
2005-11-30 12:55:11 +08:00
|
|
|
#include <linux/delay.h>
|
2006-04-22 06:52:25 +08:00
|
|
|
#include <linux/kthread.h>
|
2006-12-07 12:34:23 +08:00
|
|
|
#include <linux/freezer.h>
|
2011-07-19 01:50:40 +08:00
|
|
|
#include <linux/namei.h>
|
2012-09-19 21:22:44 +08:00
|
|
|
#include <linux/random.h>
|
2010-09-02 08:06:02 +08:00
|
|
|
#include <net/ipv6.h>
|
2005-04-17 06:20:36 +08:00
|
|
|
#include "cifsfs.h"
|
|
|
|
#include "cifspdu.h"
|
|
|
|
#define DECLARE_GLOBALS_HERE
|
|
|
|
#include "cifsglob.h"
|
|
|
|
#include "cifsproto.h"
|
|
|
|
#include "cifs_debug.h"
|
|
|
|
#include "cifs_fs_sb.h"
|
|
|
|
#include <linux/mm.h>
|
2007-11-03 13:02:24 +08:00
|
|
|
#include <linux/key-type.h>
|
2007-11-03 13:11:06 +08:00
|
|
|
#include "cifs_spnego.h"
|
2010-07-05 20:41:50 +08:00
|
|
|
#include "fscache.h"
|
2012-01-13 02:40:50 +08:00
|
|
|
#ifdef CONFIG_CIFS_SMB2
|
|
|
|
#include "smb2pdu.h"
|
|
|
|
#endif
|
2005-04-17 06:20:36 +08:00
|
|
|
|
|
|
|
int cifsFYI = 0;
|
|
|
|
int traceSMB = 0;
|
2011-10-13 06:47:03 +08:00
|
|
|
bool enable_oplocks = true;
|
2005-04-17 06:20:36 +08:00
|
|
|
unsigned int linuxExtEnabled = 1;
|
|
|
|
unsigned int lookupCacheEnabled = 1;
|
2010-04-24 19:57:45 +08:00
|
|
|
unsigned int global_secflags = CIFSSEC_DEF;
|
2006-06-01 06:40:51 +08:00
|
|
|
/* unsigned int ntlmv2_support = 0; */
|
2005-04-17 06:20:36 +08:00
|
|
|
unsigned int sign_CIFS_PDUs = 1;
|
2007-02-12 16:55:41 +08:00
|
|
|
static const struct super_operations cifs_super_ops;
|
2005-04-17 06:20:36 +08:00
|
|
|
unsigned int CIFSMaxBufSize = CIFS_MAX_MSGSIZE;
|
2012-11-25 21:00:34 +08:00
|
|
|
module_param(CIFSMaxBufSize, uint, 0);
|
2007-07-18 01:34:02 +08:00
|
|
|
MODULE_PARM_DESC(CIFSMaxBufSize, "Network buffer size (not including header). "
|
|
|
|
"Default: 16384 Range: 8192 to 130048");
|
2005-04-17 06:20:36 +08:00
|
|
|
unsigned int cifs_min_rcv = CIFS_MIN_RCV_POOL;
|
2012-11-25 21:00:34 +08:00
|
|
|
module_param(cifs_min_rcv, uint, 0);
|
2007-07-18 01:34:02 +08:00
|
|
|
MODULE_PARM_DESC(cifs_min_rcv, "Network buffers in pool. Default: 4 Range: "
|
|
|
|
"1 to 64");
|
2005-04-17 06:20:36 +08:00
|
|
|
unsigned int cifs_min_small = 30;
|
2012-11-25 21:00:34 +08:00
|
|
|
module_param(cifs_min_small, uint, 0);
|
2007-07-18 01:34:02 +08:00
|
|
|
MODULE_PARM_DESC(cifs_min_small, "Small network buffers in pool. Default: 30 "
|
|
|
|
"Range: 2 to 256");
|
2005-04-17 06:20:36 +08:00
|
|
|
unsigned int cifs_max_pending = CIFS_MAX_REQ;
|
2012-11-25 21:00:34 +08:00
|
|
|
module_param(cifs_max_pending, uint, 0444);
|
2007-07-18 01:34:02 +08:00
|
|
|
MODULE_PARM_DESC(cifs_max_pending, "Simultaneous requests to server. "
|
2012-03-20 17:55:09 +08:00
|
|
|
"Default: 32767 Range: 2 to 32767.");
|
2011-10-13 06:47:03 +08:00
|
|
|
module_param(enable_oplocks, bool, 0644);
|
2012-11-25 21:00:34 +08:00
|
|
|
MODULE_PARM_DESC(enable_oplocks, "Enable or disable oplocks. Default: y/Y/1");
|
2011-10-13 06:47:03 +08:00
|
|
|
|
2005-04-17 06:20:36 +08:00
|
|
|
extern mempool_t *cifs_sm_req_poolp;
|
|
|
|
extern mempool_t *cifs_req_poolp;
|
|
|
|
extern mempool_t *cifs_mid_poolp;
|
|
|
|
|
2012-03-24 02:40:53 +08:00
|
|
|
struct workqueue_struct *cifsiod_wq;
|
|
|
|
|
2013-03-08 23:30:03 +08:00
|
|
|
/*
|
|
|
|
* Bumps refcount for cifs super block.
|
|
|
|
* Note that it should be only called if a referece to VFS super block is
|
|
|
|
* already held, e.g. in open-type syscalls context. Otherwise it can race with
|
|
|
|
* atomic_dec_and_test in deactivate_locked_super.
|
|
|
|
*/
|
|
|
|
void
|
|
|
|
cifs_sb_active(struct super_block *sb)
|
|
|
|
{
|
|
|
|
struct cifs_sb_info *server = CIFS_SB(sb);
|
|
|
|
|
|
|
|
if (atomic_inc_return(&server->active) == 1)
|
|
|
|
atomic_inc(&sb->s_active);
|
|
|
|
}
|
|
|
|
|
|
|
|
void
|
|
|
|
cifs_sb_deactive(struct super_block *sb)
|
|
|
|
{
|
|
|
|
struct cifs_sb_info *server = CIFS_SB(sb);
|
|
|
|
|
|
|
|
if (atomic_dec_and_test(&server->active))
|
|
|
|
deactivate_super(sb);
|
|
|
|
}
|
|
|
|
|
2005-04-17 06:20:36 +08:00
|
|
|
static int
|
2011-06-17 21:29:57 +08:00
|
|
|
cifs_read_super(struct super_block *sb)
|
2005-04-17 06:20:36 +08:00
|
|
|
{
|
|
|
|
struct inode *inode;
|
2011-05-25 17:35:34 +08:00
|
|
|
struct cifs_sb_info *cifs_sb;
|
2013-10-07 03:08:20 +08:00
|
|
|
struct cifs_tcon *tcon;
|
2005-04-17 06:20:36 +08:00
|
|
|
int rc = 0;
|
2007-07-13 08:33:32 +08:00
|
|
|
|
2011-05-25 17:35:34 +08:00
|
|
|
cifs_sb = CIFS_SB(sb);
|
2013-10-07 03:08:20 +08:00
|
|
|
tcon = cifs_sb_master_tcon(cifs_sb);
|
2005-04-17 06:20:36 +08:00
|
|
|
|
2011-06-17 21:05:48 +08:00
|
|
|
if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_POSIXACL)
|
|
|
|
sb->s_flags |= MS_POSIXACL;
|
|
|
|
|
2013-10-07 03:08:20 +08:00
|
|
|
if (tcon->ses->capabilities & tcon->ses->server->vals->cap_large_files)
|
2011-06-17 21:05:48 +08:00
|
|
|
sb->s_maxbytes = MAX_LFS_FILESIZE;
|
|
|
|
else
|
|
|
|
sb->s_maxbytes = MAX_NON_LFS;
|
|
|
|
|
|
|
|
/* BB FIXME fix time_gran to be larger for LANMAN sessions */
|
|
|
|
sb->s_time_gran = 100;
|
|
|
|
|
2005-04-17 06:20:36 +08:00
|
|
|
sb->s_magic = CIFS_MAGIC_NUMBER;
|
|
|
|
sb->s_op = &cifs_super_ops;
|
2010-04-22 18:09:48 +08:00
|
|
|
sb->s_bdi = &cifs_sb->bdi;
|
2005-04-17 06:20:36 +08:00
|
|
|
sb->s_blocksize = CIFS_MAX_MSGSIZE;
|
|
|
|
sb->s_blocksize_bits = 14; /* default 2**14 = CIFS_MAX_MSGSIZE */
|
2011-02-22 13:56:59 +08:00
|
|
|
inode = cifs_root_iget(sb);
|
2005-04-17 06:20:36 +08:00
|
|
|
|
2008-02-07 16:15:33 +08:00
|
|
|
if (IS_ERR(inode)) {
|
|
|
|
rc = PTR_ERR(inode);
|
2005-04-17 06:20:36 +08:00
|
|
|
goto out_no_root;
|
|
|
|
}
|
|
|
|
|
2013-10-07 03:08:20 +08:00
|
|
|
if (tcon->nocase)
|
2013-07-30 23:38:44 +08:00
|
|
|
sb->s_d_op = &cifs_ci_dentry_ops;
|
|
|
|
else
|
|
|
|
sb->s_d_op = &cifs_dentry_ops;
|
|
|
|
|
2012-01-09 11:15:13 +08:00
|
|
|
sb->s_root = d_make_root(inode);
|
2005-04-17 06:20:36 +08:00
|
|
|
if (!sb->s_root) {
|
|
|
|
rc = -ENOMEM;
|
|
|
|
goto out_no_root;
|
|
|
|
}
|
2007-07-13 08:33:32 +08:00
|
|
|
|
2011-10-12 20:14:04 +08:00
|
|
|
#ifdef CONFIG_CIFS_NFSD_EXPORT
|
2007-07-12 02:30:34 +08:00
|
|
|
if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_SERVER_INUM) {
|
2013-05-05 11:12:25 +08:00
|
|
|
cifs_dbg(FYI, "export ops supported\n");
|
2007-07-12 02:30:34 +08:00
|
|
|
sb->s_export_op = &cifs_export_ops;
|
|
|
|
}
|
2011-10-12 20:14:04 +08:00
|
|
|
#endif /* CONFIG_CIFS_NFSD_EXPORT */
|
2005-04-17 06:20:36 +08:00
|
|
|
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
out_no_root:
|
2013-05-05 11:12:25 +08:00
|
|
|
cifs_dbg(VFS, "%s: get root inode failed\n", __func__);
|
2005-04-17 06:20:36 +08:00
|
|
|
return rc;
|
|
|
|
}
|
|
|
|
|
2011-06-17 20:34:57 +08:00
|
|
|
static void cifs_kill_sb(struct super_block *sb)
|
|
|
|
{
|
|
|
|
struct cifs_sb_info *cifs_sb = CIFS_SB(sb);
|
|
|
|
kill_anon_super(sb);
|
2011-06-17 21:32:10 +08:00
|
|
|
cifs_umount(cifs_sb);
|
2005-04-17 06:20:36 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
static int
|
2006-06-23 17:02:58 +08:00
|
|
|
cifs_statfs(struct dentry *dentry, struct kstatfs *buf)
|
2005-04-17 06:20:36 +08:00
|
|
|
{
|
2006-06-23 17:02:58 +08:00
|
|
|
struct super_block *sb = dentry->d_sb;
|
2008-04-28 12:04:34 +08:00
|
|
|
struct cifs_sb_info *cifs_sb = CIFS_SB(sb);
|
2011-05-27 12:34:02 +08:00
|
|
|
struct cifs_tcon *tcon = cifs_sb_master_tcon(cifs_sb);
|
2012-09-19 07:20:33 +08:00
|
|
|
struct TCP_Server_Info *server = tcon->ses->server;
|
2012-06-20 15:21:16 +08:00
|
|
|
unsigned int xid;
|
2012-09-19 07:20:33 +08:00
|
|
|
int rc = 0;
|
2005-04-17 06:20:36 +08:00
|
|
|
|
2012-06-20 15:21:16 +08:00
|
|
|
xid = get_xid();
|
2005-04-17 06:20:36 +08:00
|
|
|
|
2008-04-28 12:04:34 +08:00
|
|
|
/*
|
|
|
|
* PATH_MAX may be too long - it would presumably be total path,
|
|
|
|
* but note that some servers (includinng Samba 3) have a shorter
|
|
|
|
* maximum path.
|
|
|
|
*
|
|
|
|
* Instead could get the real value via SMB_QUERY_FS_ATTRIBUTE_INFO.
|
|
|
|
*/
|
|
|
|
buf->f_namelen = PATH_MAX;
|
2005-04-17 06:20:36 +08:00
|
|
|
buf->f_files = 0; /* undefined */
|
|
|
|
buf->f_ffree = 0; /* unlimited */
|
|
|
|
|
2012-09-19 07:20:33 +08:00
|
|
|
if (server->ops->queryfs)
|
|
|
|
rc = server->ops->queryfs(xid, tcon, buf);
|
2008-04-28 12:04:34 +08:00
|
|
|
|
2012-06-20 15:21:16 +08:00
|
|
|
free_xid(xid);
|
2008-04-28 12:04:34 +08:00
|
|
|
return 0;
|
2005-04-17 06:20:36 +08:00
|
|
|
}
|
|
|
|
|
2014-08-17 21:38:47 +08:00
|
|
|
static long cifs_fallocate(struct file *file, int mode, loff_t off, loff_t len)
|
|
|
|
{
|
2014-10-22 12:25:12 +08:00
|
|
|
struct cifs_sb_info *cifs_sb = CIFS_FILE_SB(file);
|
2014-08-17 21:38:47 +08:00
|
|
|
struct cifs_tcon *tcon = cifs_sb_master_tcon(cifs_sb);
|
|
|
|
struct TCP_Server_Info *server = tcon->ses->server;
|
|
|
|
|
|
|
|
if (server->ops->fallocate)
|
|
|
|
return server->ops->fallocate(file, tcon, mode, off, len);
|
|
|
|
|
|
|
|
return -EOPNOTSUPP;
|
|
|
|
}
|
|
|
|
|
2011-06-21 07:28:19 +08:00
|
|
|
static int cifs_permission(struct inode *inode, int mask)
|
2005-04-17 06:20:36 +08:00
|
|
|
{
|
|
|
|
struct cifs_sb_info *cifs_sb;
|
|
|
|
|
|
|
|
cifs_sb = CIFS_SB(inode->i_sb);
|
|
|
|
|
2008-07-31 19:41:58 +08:00
|
|
|
if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_NO_PERM) {
|
|
|
|
if ((mask & MAY_EXEC) && !execute_ok(inode))
|
|
|
|
return -EACCES;
|
|
|
|
else
|
|
|
|
return 0;
|
|
|
|
} else /* file mode might have been restricted at mount time
|
2007-07-13 08:33:32 +08:00
|
|
|
on the client (above and beyond ACL on servers) for
|
2005-04-17 06:20:36 +08:00
|
|
|
servers which do not support setting and viewing mode bits,
|
2007-07-13 08:33:32 +08:00
|
|
|
so allowing client to check permissions is useful */
|
2011-06-21 07:16:29 +08:00
|
|
|
return generic_permission(inode, mask);
|
2005-04-17 06:20:36 +08:00
|
|
|
}
|
|
|
|
|
2006-12-07 12:33:20 +08:00
|
|
|
static struct kmem_cache *cifs_inode_cachep;
|
|
|
|
static struct kmem_cache *cifs_req_cachep;
|
|
|
|
static struct kmem_cache *cifs_mid_cachep;
|
|
|
|
static struct kmem_cache *cifs_sm_req_cachep;
|
2005-04-17 06:20:36 +08:00
|
|
|
mempool_t *cifs_sm_req_poolp;
|
|
|
|
mempool_t *cifs_req_poolp;
|
|
|
|
mempool_t *cifs_mid_poolp;
|
|
|
|
|
|
|
|
static struct inode *
|
|
|
|
cifs_alloc_inode(struct super_block *sb)
|
|
|
|
{
|
|
|
|
struct cifsInodeInfo *cifs_inode;
|
2006-12-07 12:33:17 +08:00
|
|
|
cifs_inode = kmem_cache_alloc(cifs_inode_cachep, GFP_KERNEL);
|
2005-04-17 06:20:36 +08:00
|
|
|
if (!cifs_inode)
|
|
|
|
return NULL;
|
|
|
|
cifs_inode->cifsAttrs = 0x20; /* default */
|
|
|
|
cifs_inode->time = 0;
|
2012-09-19 21:22:44 +08:00
|
|
|
/*
|
|
|
|
* Until the file is open and we have gotten oplock info back from the
|
|
|
|
* server, can not assume caching of file data or metadata.
|
|
|
|
*/
|
2010-11-03 15:58:57 +08:00
|
|
|
cifs_set_oplock_level(cifs_inode, 0);
|
2014-04-30 21:31:45 +08:00
|
|
|
cifs_inode->flags = 0;
|
2014-03-12 00:11:47 +08:00
|
|
|
spin_lock_init(&cifs_inode->writers_lock);
|
|
|
|
cifs_inode->writers = 0;
|
2005-04-17 06:20:36 +08:00
|
|
|
cifs_inode->vfs_inode.i_blkbits = 14; /* 2**14 = CIFS_MAX_MSGSIZE */
|
2009-04-04 01:44:00 +08:00
|
|
|
cifs_inode->server_eof = 0;
|
2011-01-08 00:30:27 +08:00
|
|
|
cifs_inode->uniqueid = 0;
|
|
|
|
cifs_inode->createtime = 0;
|
2013-09-06 01:30:16 +08:00
|
|
|
cifs_inode->epoch = 0;
|
2012-09-19 21:22:44 +08:00
|
|
|
#ifdef CONFIG_CIFS_SMB2
|
|
|
|
get_random_bytes(cifs_inode->lease_key, SMB2_LEASE_KEY_SIZE);
|
|
|
|
#endif
|
|
|
|
/*
|
|
|
|
* Can not set i_flags here - they get immediately overwritten to zero
|
|
|
|
* by the VFS.
|
|
|
|
*/
|
|
|
|
/* cifs_inode->vfs_inode.i_flags = S_NOATIME | S_NOCMTIME; */
|
2005-04-17 06:20:36 +08:00
|
|
|
INIT_LIST_HEAD(&cifs_inode->openFileList);
|
2012-09-19 21:22:43 +08:00
|
|
|
INIT_LIST_HEAD(&cifs_inode->llist);
|
2005-04-17 06:20:36 +08:00
|
|
|
return &cifs_inode->vfs_inode;
|
|
|
|
}
|
|
|
|
|
2011-01-07 14:49:49 +08:00
|
|
|
static void cifs_i_callback(struct rcu_head *head)
|
|
|
|
{
|
|
|
|
struct inode *inode = container_of(head, struct inode, i_rcu);
|
|
|
|
kmem_cache_free(cifs_inode_cachep, CIFS_I(inode));
|
|
|
|
}
|
|
|
|
|
2005-04-17 06:20:36 +08:00
|
|
|
static void
|
|
|
|
cifs_destroy_inode(struct inode *inode)
|
|
|
|
{
|
2011-01-07 14:49:49 +08:00
|
|
|
call_rcu(&inode->i_rcu, cifs_i_callback);
|
2005-04-17 06:20:36 +08:00
|
|
|
}
|
|
|
|
|
2010-07-05 20:42:45 +08:00
|
|
|
static void
|
2010-06-08 02:34:48 +08:00
|
|
|
cifs_evict_inode(struct inode *inode)
|
2010-07-05 20:42:45 +08:00
|
|
|
{
|
2014-04-04 05:47:49 +08:00
|
|
|
truncate_inode_pages_final(&inode->i_data);
|
2012-05-03 20:48:02 +08:00
|
|
|
clear_inode(inode);
|
2010-07-05 20:42:45 +08:00
|
|
|
cifs_fscache_release_inode_cookie(inode);
|
|
|
|
}
|
|
|
|
|
2009-06-11 22:27:32 +08:00
|
|
|
static void
|
|
|
|
cifs_show_address(struct seq_file *s, struct TCP_Server_Info *server)
|
|
|
|
{
|
2010-12-14 00:08:35 +08:00
|
|
|
struct sockaddr_in *sa = (struct sockaddr_in *) &server->dstaddr;
|
|
|
|
struct sockaddr_in6 *sa6 = (struct sockaddr_in6 *) &server->dstaddr;
|
|
|
|
|
2014-05-14 00:04:17 +08:00
|
|
|
seq_puts(s, ",addr=");
|
2009-06-11 22:27:32 +08:00
|
|
|
|
2010-12-14 00:08:35 +08:00
|
|
|
switch (server->dstaddr.ss_family) {
|
2009-06-11 22:27:32 +08:00
|
|
|
case AF_INET:
|
2010-12-14 00:08:35 +08:00
|
|
|
seq_printf(s, "%pI4", &sa->sin_addr.s_addr);
|
2009-06-11 22:27:32 +08:00
|
|
|
break;
|
|
|
|
case AF_INET6:
|
2010-12-14 00:08:35 +08:00
|
|
|
seq_printf(s, "%pI6", &sa6->sin6_addr.s6_addr);
|
|
|
|
if (sa6->sin6_scope_id)
|
|
|
|
seq_printf(s, "%%%u", sa6->sin6_scope_id);
|
2009-06-11 22:27:32 +08:00
|
|
|
break;
|
|
|
|
default:
|
2014-05-14 00:04:17 +08:00
|
|
|
seq_puts(s, "(unknown)");
|
2009-06-11 22:27:32 +08:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2011-06-13 23:50:41 +08:00
|
|
|
static void
|
2013-05-26 19:01:00 +08:00
|
|
|
cifs_show_security(struct seq_file *s, struct cifs_ses *ses)
|
2011-06-13 23:50:41 +08:00
|
|
|
{
|
2015-09-12 08:24:19 +08:00
|
|
|
if (ses->sectype == Unspecified) {
|
|
|
|
if (ses->user_name == NULL)
|
|
|
|
seq_puts(s, ",sec=none");
|
2013-05-26 19:01:00 +08:00
|
|
|
return;
|
2015-09-12 08:24:19 +08:00
|
|
|
}
|
2013-05-26 19:01:00 +08:00
|
|
|
|
2014-05-14 00:04:17 +08:00
|
|
|
seq_puts(s, ",sec=");
|
2011-06-13 23:50:41 +08:00
|
|
|
|
2013-05-26 19:01:00 +08:00
|
|
|
switch (ses->sectype) {
|
2011-06-13 23:50:41 +08:00
|
|
|
case LANMAN:
|
2014-05-14 00:04:17 +08:00
|
|
|
seq_puts(s, "lanman");
|
2011-06-13 23:50:41 +08:00
|
|
|
break;
|
|
|
|
case NTLMv2:
|
2014-05-14 00:04:17 +08:00
|
|
|
seq_puts(s, "ntlmv2");
|
2011-06-13 23:50:41 +08:00
|
|
|
break;
|
|
|
|
case NTLM:
|
2014-05-14 00:04:17 +08:00
|
|
|
seq_puts(s, "ntlm");
|
2011-06-13 23:50:41 +08:00
|
|
|
break;
|
|
|
|
case Kerberos:
|
2014-05-14 00:04:17 +08:00
|
|
|
seq_puts(s, "krb5");
|
2011-06-13 23:50:41 +08:00
|
|
|
break;
|
|
|
|
case RawNTLMSSP:
|
2014-05-14 00:04:17 +08:00
|
|
|
seq_puts(s, "ntlmssp");
|
2011-06-13 23:50:41 +08:00
|
|
|
break;
|
|
|
|
default:
|
|
|
|
/* shouldn't ever happen */
|
2014-05-14 00:04:17 +08:00
|
|
|
seq_puts(s, "unknown");
|
2011-06-13 23:50:41 +08:00
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
2013-05-26 19:01:00 +08:00
|
|
|
if (ses->sign)
|
2014-05-14 00:04:17 +08:00
|
|
|
seq_puts(s, "i");
|
2011-06-13 23:50:41 +08:00
|
|
|
}
|
|
|
|
|
2012-05-16 19:53:01 +08:00
|
|
|
static void
|
|
|
|
cifs_show_cache_flavor(struct seq_file *s, struct cifs_sb_info *cifs_sb)
|
|
|
|
{
|
2014-05-14 00:04:17 +08:00
|
|
|
seq_puts(s, ",cache=");
|
2012-05-16 19:53:01 +08:00
|
|
|
|
|
|
|
if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_STRICT_IO)
|
2014-05-14 00:04:17 +08:00
|
|
|
seq_puts(s, "strict");
|
2012-05-16 19:53:01 +08:00
|
|
|
else if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_DIRECT_IO)
|
2014-05-14 00:04:17 +08:00
|
|
|
seq_puts(s, "none");
|
2012-05-16 19:53:01 +08:00
|
|
|
else
|
2014-05-14 00:04:17 +08:00
|
|
|
seq_puts(s, "loose");
|
2012-05-16 19:53:01 +08:00
|
|
|
}
|
|
|
|
|
2013-07-31 01:34:40 +08:00
|
|
|
static void
|
|
|
|
cifs_show_nls(struct seq_file *s, struct nls_table *cur)
|
|
|
|
{
|
|
|
|
struct nls_table *def;
|
|
|
|
|
|
|
|
/* Display iocharset= option if it's not default charset */
|
|
|
|
def = load_nls_default();
|
|
|
|
if (def != cur)
|
|
|
|
seq_printf(s, ",iocharset=%s", cur->charset);
|
|
|
|
unload_nls(def);
|
|
|
|
}
|
|
|
|
|
2005-04-17 06:20:36 +08:00
|
|
|
/*
|
|
|
|
* cifs_show_options() is for displaying mount options in /proc/mounts.
|
|
|
|
* Not all settable options are displayed but most of the important
|
|
|
|
* ones are.
|
|
|
|
*/
|
|
|
|
static int
|
2011-12-09 10:32:45 +08:00
|
|
|
cifs_show_options(struct seq_file *s, struct dentry *root)
|
2005-04-17 06:20:36 +08:00
|
|
|
{
|
2011-12-09 10:32:45 +08:00
|
|
|
struct cifs_sb_info *cifs_sb = CIFS_SB(root->d_sb);
|
2011-05-27 12:34:02 +08:00
|
|
|
struct cifs_tcon *tcon = cifs_sb_master_tcon(cifs_sb);
|
2010-09-02 08:06:02 +08:00
|
|
|
struct sockaddr *srcaddr;
|
|
|
|
srcaddr = (struct sockaddr *)&tcon->ses->server->srcaddr;
|
2009-06-11 22:27:28 +08:00
|
|
|
|
fs: create and use seq_show_option for escaping
Many file systems that implement the show_options hook fail to correctly
escape their output which could lead to unescaped characters (e.g. new
lines) leaking into /proc/mounts and /proc/[pid]/mountinfo files. This
could lead to confusion, spoofed entries (resulting in things like
systemd issuing false d-bus "mount" notifications), and who knows what
else. This looks like it would only be the root user stepping on
themselves, but it's possible weird things could happen in containers or
in other situations with delegated mount privileges.
Here's an example using overlay with setuid fusermount trusting the
contents of /proc/mounts (via the /etc/mtab symlink). Imagine the use
of "sudo" is something more sneaky:
$ BASE="ovl"
$ MNT="$BASE/mnt"
$ LOW="$BASE/lower"
$ UP="$BASE/upper"
$ WORK="$BASE/work/ 0 0
none /proc fuse.pwn user_id=1000"
$ mkdir -p "$LOW" "$UP" "$WORK"
$ sudo mount -t overlay -o "lowerdir=$LOW,upperdir=$UP,workdir=$WORK" none /mnt
$ cat /proc/mounts
none /root/ovl/mnt overlay rw,relatime,lowerdir=ovl/lower,upperdir=ovl/upper,workdir=ovl/work/ 0 0
none /proc fuse.pwn user_id=1000 0 0
$ fusermount -u /proc
$ cat /proc/mounts
cat: /proc/mounts: No such file or directory
This fixes the problem by adding new seq_show_option and
seq_show_option_n helpers, and updating the vulnerable show_option
handlers to use them as needed. Some, like SELinux, need to be open
coded due to unusual existing escape mechanisms.
[akpm@linux-foundation.org: add lost chunk, per Kees]
[keescook@chromium.org: seq_show_option should be using const parameters]
Signed-off-by: Kees Cook <keescook@chromium.org>
Acked-by: Serge Hallyn <serge.hallyn@canonical.com>
Acked-by: Jan Kara <jack@suse.com>
Acked-by: Paul Moore <paul@paul-moore.com>
Cc: J. R. Okajima <hooanon05g@gmail.com>
Signed-off-by: Kees Cook <keescook@chromium.org>
Cc: <stable@vger.kernel.org>
Signed-off-by: Andrew Morton <akpm@linux-foundation.org>
Signed-off-by: Linus Torvalds <torvalds@linux-foundation.org>
2015-09-05 06:44:57 +08:00
|
|
|
seq_show_option(s, "vers", tcon->ses->server->vals->version_string);
|
2013-05-26 19:01:00 +08:00
|
|
|
cifs_show_security(s, tcon->ses);
|
2012-05-16 19:53:01 +08:00
|
|
|
cifs_show_cache_flavor(s, cifs_sb);
|
2011-06-13 23:50:41 +08:00
|
|
|
|
2010-09-30 07:51:12 +08:00
|
|
|
if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_MULTIUSER)
|
2014-05-14 00:04:17 +08:00
|
|
|
seq_puts(s, ",multiuser");
|
2011-02-25 15:11:56 +08:00
|
|
|
else if (tcon->ses->user_name)
|
fs: create and use seq_show_option for escaping
Many file systems that implement the show_options hook fail to correctly
escape their output which could lead to unescaped characters (e.g. new
lines) leaking into /proc/mounts and /proc/[pid]/mountinfo files. This
could lead to confusion, spoofed entries (resulting in things like
systemd issuing false d-bus "mount" notifications), and who knows what
else. This looks like it would only be the root user stepping on
themselves, but it's possible weird things could happen in containers or
in other situations with delegated mount privileges.
Here's an example using overlay with setuid fusermount trusting the
contents of /proc/mounts (via the /etc/mtab symlink). Imagine the use
of "sudo" is something more sneaky:
$ BASE="ovl"
$ MNT="$BASE/mnt"
$ LOW="$BASE/lower"
$ UP="$BASE/upper"
$ WORK="$BASE/work/ 0 0
none /proc fuse.pwn user_id=1000"
$ mkdir -p "$LOW" "$UP" "$WORK"
$ sudo mount -t overlay -o "lowerdir=$LOW,upperdir=$UP,workdir=$WORK" none /mnt
$ cat /proc/mounts
none /root/ovl/mnt overlay rw,relatime,lowerdir=ovl/lower,upperdir=ovl/upper,workdir=ovl/work/ 0 0
none /proc fuse.pwn user_id=1000 0 0
$ fusermount -u /proc
$ cat /proc/mounts
cat: /proc/mounts: No such file or directory
This fixes the problem by adding new seq_show_option and
seq_show_option_n helpers, and updating the vulnerable show_option
handlers to use them as needed. Some, like SELinux, need to be open
coded due to unusual existing escape mechanisms.
[akpm@linux-foundation.org: add lost chunk, per Kees]
[keescook@chromium.org: seq_show_option should be using const parameters]
Signed-off-by: Kees Cook <keescook@chromium.org>
Acked-by: Serge Hallyn <serge.hallyn@canonical.com>
Acked-by: Jan Kara <jack@suse.com>
Acked-by: Paul Moore <paul@paul-moore.com>
Cc: J. R. Okajima <hooanon05g@gmail.com>
Signed-off-by: Kees Cook <keescook@chromium.org>
Cc: <stable@vger.kernel.org>
Signed-off-by: Andrew Morton <akpm@linux-foundation.org>
Signed-off-by: Linus Torvalds <torvalds@linux-foundation.org>
2015-09-05 06:44:57 +08:00
|
|
|
seq_show_option(s, "username", tcon->ses->user_name);
|
2010-09-30 07:51:12 +08:00
|
|
|
|
2009-06-11 22:27:28 +08:00
|
|
|
if (tcon->ses->domainName)
|
fs: create and use seq_show_option for escaping
Many file systems that implement the show_options hook fail to correctly
escape their output which could lead to unescaped characters (e.g. new
lines) leaking into /proc/mounts and /proc/[pid]/mountinfo files. This
could lead to confusion, spoofed entries (resulting in things like
systemd issuing false d-bus "mount" notifications), and who knows what
else. This looks like it would only be the root user stepping on
themselves, but it's possible weird things could happen in containers or
in other situations with delegated mount privileges.
Here's an example using overlay with setuid fusermount trusting the
contents of /proc/mounts (via the /etc/mtab symlink). Imagine the use
of "sudo" is something more sneaky:
$ BASE="ovl"
$ MNT="$BASE/mnt"
$ LOW="$BASE/lower"
$ UP="$BASE/upper"
$ WORK="$BASE/work/ 0 0
none /proc fuse.pwn user_id=1000"
$ mkdir -p "$LOW" "$UP" "$WORK"
$ sudo mount -t overlay -o "lowerdir=$LOW,upperdir=$UP,workdir=$WORK" none /mnt
$ cat /proc/mounts
none /root/ovl/mnt overlay rw,relatime,lowerdir=ovl/lower,upperdir=ovl/upper,workdir=ovl/work/ 0 0
none /proc fuse.pwn user_id=1000 0 0
$ fusermount -u /proc
$ cat /proc/mounts
cat: /proc/mounts: No such file or directory
This fixes the problem by adding new seq_show_option and
seq_show_option_n helpers, and updating the vulnerable show_option
handlers to use them as needed. Some, like SELinux, need to be open
coded due to unusual existing escape mechanisms.
[akpm@linux-foundation.org: add lost chunk, per Kees]
[keescook@chromium.org: seq_show_option should be using const parameters]
Signed-off-by: Kees Cook <keescook@chromium.org>
Acked-by: Serge Hallyn <serge.hallyn@canonical.com>
Acked-by: Jan Kara <jack@suse.com>
Acked-by: Paul Moore <paul@paul-moore.com>
Cc: J. R. Okajima <hooanon05g@gmail.com>
Signed-off-by: Kees Cook <keescook@chromium.org>
Cc: <stable@vger.kernel.org>
Signed-off-by: Andrew Morton <akpm@linux-foundation.org>
Signed-off-by: Linus Torvalds <torvalds@linux-foundation.org>
2015-09-05 06:44:57 +08:00
|
|
|
seq_show_option(s, "domain", tcon->ses->domainName);
|
2009-06-11 22:27:28 +08:00
|
|
|
|
2010-09-02 08:06:02 +08:00
|
|
|
if (srcaddr->sa_family != AF_UNSPEC) {
|
|
|
|
struct sockaddr_in *saddr4;
|
|
|
|
struct sockaddr_in6 *saddr6;
|
|
|
|
saddr4 = (struct sockaddr_in *)srcaddr;
|
|
|
|
saddr6 = (struct sockaddr_in6 *)srcaddr;
|
|
|
|
if (srcaddr->sa_family == AF_INET6)
|
|
|
|
seq_printf(s, ",srcaddr=%pI6c",
|
|
|
|
&saddr6->sin6_addr);
|
|
|
|
else if (srcaddr->sa_family == AF_INET)
|
|
|
|
seq_printf(s, ",srcaddr=%pI4",
|
|
|
|
&saddr4->sin_addr.s_addr);
|
|
|
|
else
|
|
|
|
seq_printf(s, ",srcaddr=BAD-AF:%i",
|
|
|
|
(int)(srcaddr->sa_family));
|
|
|
|
}
|
|
|
|
|
2013-02-06 17:20:20 +08:00
|
|
|
seq_printf(s, ",uid=%u",
|
|
|
|
from_kuid_munged(&init_user_ns, cifs_sb->mnt_uid));
|
2009-06-11 22:27:29 +08:00
|
|
|
if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_OVERR_UID)
|
2014-05-14 00:04:17 +08:00
|
|
|
seq_puts(s, ",forceuid");
|
2009-08-04 00:45:10 +08:00
|
|
|
else
|
2014-05-14 00:04:17 +08:00
|
|
|
seq_puts(s, ",noforceuid");
|
2009-06-11 22:27:29 +08:00
|
|
|
|
2013-02-06 17:20:20 +08:00
|
|
|
seq_printf(s, ",gid=%u",
|
|
|
|
from_kgid_munged(&init_user_ns, cifs_sb->mnt_gid));
|
2009-06-11 22:27:29 +08:00
|
|
|
if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_OVERR_GID)
|
2014-05-14 00:04:17 +08:00
|
|
|
seq_puts(s, ",forcegid");
|
2009-08-04 00:45:10 +08:00
|
|
|
else
|
2014-05-14 00:04:17 +08:00
|
|
|
seq_puts(s, ",noforcegid");
|
2009-06-11 22:27:28 +08:00
|
|
|
|
2009-06-11 22:27:32 +08:00
|
|
|
cifs_show_address(s, tcon->ses->server);
|
2005-04-17 06:20:36 +08:00
|
|
|
|
2009-06-11 22:27:28 +08:00
|
|
|
if (!tcon->unix_ext)
|
2011-07-26 15:22:14 +08:00
|
|
|
seq_printf(s, ",file_mode=0%ho,dir_mode=0%ho",
|
2008-05-17 11:12:45 +08:00
|
|
|
cifs_sb->mnt_file_mode,
|
|
|
|
cifs_sb->mnt_dir_mode);
|
2013-07-31 01:34:40 +08:00
|
|
|
|
|
|
|
cifs_show_nls(s, cifs_sb->local_nls);
|
|
|
|
|
2009-06-11 22:27:28 +08:00
|
|
|
if (tcon->seal)
|
2014-05-14 00:04:17 +08:00
|
|
|
seq_puts(s, ",seal");
|
2009-06-11 22:27:28 +08:00
|
|
|
if (tcon->nocase)
|
2014-05-14 00:04:17 +08:00
|
|
|
seq_puts(s, ",nocase");
|
2009-06-11 22:27:28 +08:00
|
|
|
if (tcon->retry)
|
2014-05-14 00:04:17 +08:00
|
|
|
seq_puts(s, ",hard");
|
2015-10-01 10:07:59 +08:00
|
|
|
if (tcon->use_persistent)
|
|
|
|
seq_puts(s, ",persistenthandles");
|
2015-11-04 00:08:53 +08:00
|
|
|
else if (tcon->use_resilient)
|
|
|
|
seq_puts(s, ",resilienthandles");
|
2011-05-26 14:02:00 +08:00
|
|
|
if (tcon->unix_ext)
|
2014-05-14 00:04:17 +08:00
|
|
|
seq_puts(s, ",unix");
|
2011-05-26 14:02:00 +08:00
|
|
|
else
|
2014-05-14 00:04:17 +08:00
|
|
|
seq_puts(s, ",nounix");
|
2009-06-11 22:27:28 +08:00
|
|
|
if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_POSIX_PATHS)
|
2014-05-14 00:04:17 +08:00
|
|
|
seq_puts(s, ",posixpaths");
|
2009-06-11 22:27:28 +08:00
|
|
|
if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_SET_UID)
|
2014-05-14 00:04:17 +08:00
|
|
|
seq_puts(s, ",setuids");
|
2009-06-11 22:27:28 +08:00
|
|
|
if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_SERVER_INUM)
|
2014-05-14 00:04:17 +08:00
|
|
|
seq_puts(s, ",serverino");
|
2011-05-26 14:02:00 +08:00
|
|
|
if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_RWPIDFORWARD)
|
2014-05-14 00:04:17 +08:00
|
|
|
seq_puts(s, ",rwpidforward");
|
2011-05-26 14:02:00 +08:00
|
|
|
if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_NOPOSIXBRL)
|
2014-05-14 00:04:17 +08:00
|
|
|
seq_puts(s, ",forcemand");
|
2009-06-11 22:27:28 +08:00
|
|
|
if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_NO_XATTR)
|
2014-05-14 00:04:17 +08:00
|
|
|
seq_puts(s, ",nouser_xattr");
|
2009-06-11 22:27:28 +08:00
|
|
|
if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_MAP_SPECIAL_CHR)
|
2014-05-14 00:04:17 +08:00
|
|
|
seq_puts(s, ",mapchars");
|
2015-02-13 14:35:58 +08:00
|
|
|
if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_MAP_SFM_CHR)
|
|
|
|
seq_puts(s, ",mapposix");
|
2009-06-11 22:27:28 +08:00
|
|
|
if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_UNX_EMUL)
|
2014-05-14 00:04:17 +08:00
|
|
|
seq_puts(s, ",sfu");
|
2009-06-11 22:27:28 +08:00
|
|
|
if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_NO_BRL)
|
2014-05-14 00:04:17 +08:00
|
|
|
seq_puts(s, ",nobrl");
|
2009-06-11 22:27:28 +08:00
|
|
|
if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_CIFS_ACL)
|
2014-05-14 00:04:17 +08:00
|
|
|
seq_puts(s, ",cifsacl");
|
2009-06-11 22:27:28 +08:00
|
|
|
if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_DYNPERM)
|
2014-05-14 00:04:17 +08:00
|
|
|
seq_puts(s, ",dynperm");
|
2011-12-09 10:32:45 +08:00
|
|
|
if (root->d_sb->s_flags & MS_POSIXACL)
|
2014-05-14 00:04:17 +08:00
|
|
|
seq_puts(s, ",acl");
|
2010-07-30 20:56:00 +08:00
|
|
|
if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_MF_SYMLINKS)
|
2014-05-14 00:04:17 +08:00
|
|
|
seq_puts(s, ",mfsymlinks");
|
2010-11-24 20:19:07 +08:00
|
|
|
if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_FSCACHE)
|
2014-05-14 00:04:17 +08:00
|
|
|
seq_puts(s, ",fsc");
|
2011-10-20 09:44:48 +08:00
|
|
|
if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_NOSSYNC)
|
2014-05-14 00:04:17 +08:00
|
|
|
seq_puts(s, ",nostrictsync");
|
2011-10-20 09:44:48 +08:00
|
|
|
if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_NO_PERM)
|
2014-05-14 00:04:17 +08:00
|
|
|
seq_puts(s, ",noperm");
|
2012-04-24 22:28:14 +08:00
|
|
|
if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_CIFS_BACKUPUID)
|
2013-02-06 17:20:20 +08:00
|
|
|
seq_printf(s, ",backupuid=%u",
|
|
|
|
from_kuid_munged(&init_user_ns,
|
|
|
|
cifs_sb->mnt_backupuid));
|
2012-04-24 22:28:14 +08:00
|
|
|
if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_CIFS_BACKUPGID)
|
2013-02-06 17:20:20 +08:00
|
|
|
seq_printf(s, ",backupgid=%u",
|
|
|
|
from_kgid_munged(&init_user_ns,
|
|
|
|
cifs_sb->mnt_backupgid));
|
2009-06-11 22:27:28 +08:00
|
|
|
|
2012-04-24 22:28:30 +08:00
|
|
|
seq_printf(s, ",rsize=%u", cifs_sb->rsize);
|
|
|
|
seq_printf(s, ",wsize=%u", cifs_sb->wsize);
|
2010-12-01 17:12:28 +08:00
|
|
|
/* convert actimeo and display it in seconds */
|
2012-04-25 19:10:14 +08:00
|
|
|
seq_printf(s, ",actimeo=%lu", cifs_sb->actimeo / HZ);
|
2009-06-11 22:27:28 +08:00
|
|
|
|
2005-04-17 06:20:36 +08:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2008-04-24 19:21:56 +08:00
|
|
|
static void cifs_umount_begin(struct super_block *sb)
|
2005-10-11 01:34:22 +08:00
|
|
|
{
|
2008-04-24 19:21:56 +08:00
|
|
|
struct cifs_sb_info *cifs_sb = CIFS_SB(sb);
|
2011-05-27 12:34:02 +08:00
|
|
|
struct cifs_tcon *tcon;
|
2005-10-11 01:34:22 +08:00
|
|
|
|
2007-05-01 04:13:06 +08:00
|
|
|
if (cifs_sb == NULL)
|
2005-10-11 05:28:38 +08:00
|
|
|
return;
|
|
|
|
|
2010-09-21 07:01:35 +08:00
|
|
|
tcon = cifs_sb_master_tcon(cifs_sb);
|
2008-11-16 00:12:47 +08:00
|
|
|
|
2010-10-19 01:59:37 +08:00
|
|
|
spin_lock(&cifs_tcp_ses_lock);
|
2009-06-26 11:25:49 +08:00
|
|
|
if ((tcon->tc_count > 1) || (tcon->tidStatus == CifsExiting)) {
|
|
|
|
/* we have other mounts to same share or we have
|
|
|
|
already tried to force umount this and woken up
|
|
|
|
all waiting network requests, nothing to do */
|
2010-10-19 01:59:37 +08:00
|
|
|
spin_unlock(&cifs_tcp_ses_lock);
|
2009-06-26 11:25:49 +08:00
|
|
|
return;
|
|
|
|
} else if (tcon->tc_count == 1)
|
2005-10-11 05:06:37 +08:00
|
|
|
tcon->tidStatus = CifsExiting;
|
2010-10-19 01:59:37 +08:00
|
|
|
spin_unlock(&cifs_tcp_ses_lock);
|
2005-10-11 05:06:37 +08:00
|
|
|
|
2006-07-15 06:37:11 +08:00
|
|
|
/* cancel_brl_requests(tcon); */ /* BB mark all brl mids as exiting */
|
2005-11-10 07:21:09 +08:00
|
|
|
/* cancel_notify_requests(tcon); */
|
2007-07-13 08:33:32 +08:00
|
|
|
if (tcon->ses && tcon->ses->server) {
|
2013-05-05 11:12:25 +08:00
|
|
|
cifs_dbg(FYI, "wake up tasks now - umount begin not complete\n");
|
2005-10-11 05:28:38 +08:00
|
|
|
wake_up_all(&tcon->ses->server->request_q);
|
2005-11-30 12:55:11 +08:00
|
|
|
wake_up_all(&tcon->ses->server->response_q);
|
|
|
|
msleep(1); /* yield */
|
|
|
|
/* we have to kick the requests once more */
|
|
|
|
wake_up_all(&tcon->ses->server->response_q);
|
|
|
|
msleep(1);
|
2005-10-11 05:06:37 +08:00
|
|
|
}
|
2005-10-11 01:34:22 +08:00
|
|
|
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2006-09-29 05:34:06 +08:00
|
|
|
#ifdef CONFIG_CIFS_STATS2
|
2011-12-09 09:51:13 +08:00
|
|
|
static int cifs_show_stats(struct seq_file *s, struct dentry *root)
|
2006-09-29 05:34:06 +08:00
|
|
|
{
|
|
|
|
/* BB FIXME */
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
|
2005-04-17 06:20:36 +08:00
|
|
|
static int cifs_remount(struct super_block *sb, int *flags, char *data)
|
|
|
|
{
|
2014-03-13 22:14:33 +08:00
|
|
|
sync_filesystem(sb);
|
2005-04-17 06:20:36 +08:00
|
|
|
*flags |= MS_NODIRATIME;
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2010-06-08 01:43:19 +08:00
|
|
|
static int cifs_drop_inode(struct inode *inode)
|
2010-06-02 02:47:40 +08:00
|
|
|
{
|
|
|
|
struct cifs_sb_info *cifs_sb = CIFS_SB(inode->i_sb);
|
|
|
|
|
2010-06-08 01:43:19 +08:00
|
|
|
/* no serverino => unconditional eviction */
|
|
|
|
return !(cifs_sb->mnt_cifs_flags & CIFS_MOUNT_SERVER_INUM) ||
|
|
|
|
generic_drop_inode(inode);
|
2010-06-02 02:47:40 +08:00
|
|
|
}
|
|
|
|
|
2007-02-12 16:55:41 +08:00
|
|
|
static const struct super_operations cifs_super_ops = {
|
2005-04-17 06:20:36 +08:00
|
|
|
.statfs = cifs_statfs,
|
|
|
|
.alloc_inode = cifs_alloc_inode,
|
|
|
|
.destroy_inode = cifs_destroy_inode,
|
2010-06-02 02:47:40 +08:00
|
|
|
.drop_inode = cifs_drop_inode,
|
2010-06-08 02:34:48 +08:00
|
|
|
.evict_inode = cifs_evict_inode,
|
2010-06-02 02:47:40 +08:00
|
|
|
/* .delete_inode = cifs_delete_inode, */ /* Do not need above
|
|
|
|
function unless later we add lazy close of inodes or unless the
|
2007-07-13 08:33:32 +08:00
|
|
|
kernel forgets to call us with the same number of releases (closes)
|
|
|
|
as opens */
|
2005-04-17 06:20:36 +08:00
|
|
|
.show_options = cifs_show_options,
|
2005-11-10 07:21:09 +08:00
|
|
|
.umount_begin = cifs_umount_begin,
|
2005-04-17 06:20:36 +08:00
|
|
|
.remount_fs = cifs_remount,
|
2006-09-29 05:34:06 +08:00
|
|
|
#ifdef CONFIG_CIFS_STATS2
|
2006-09-30 09:08:55 +08:00
|
|
|
.show_stats = cifs_show_stats,
|
2006-09-29 05:34:06 +08:00
|
|
|
#endif
|
2005-04-17 06:20:36 +08:00
|
|
|
};
|
|
|
|
|
2011-05-27 11:50:55 +08:00
|
|
|
/*
|
|
|
|
* Get root dentry from superblock according to prefix path mount option.
|
|
|
|
* Return dentry with refcount + 1 on success and NULL otherwise.
|
|
|
|
*/
|
|
|
|
static struct dentry *
|
|
|
|
cifs_get_root(struct smb_vol *vol, struct super_block *sb)
|
|
|
|
{
|
2011-07-19 01:50:40 +08:00
|
|
|
struct dentry *dentry;
|
2011-05-27 11:50:55 +08:00
|
|
|
struct cifs_sb_info *cifs_sb = CIFS_SB(sb);
|
2011-07-19 01:50:40 +08:00
|
|
|
char *full_path = NULL;
|
|
|
|
char *s, *p;
|
2011-05-27 11:50:55 +08:00
|
|
|
char sep;
|
|
|
|
|
2012-11-29 12:34:41 +08:00
|
|
|
full_path = cifs_build_path_to_root(vol, cifs_sb,
|
|
|
|
cifs_sb_master_tcon(cifs_sb));
|
2011-05-27 11:50:55 +08:00
|
|
|
if (full_path == NULL)
|
2011-06-17 22:02:59 +08:00
|
|
|
return ERR_PTR(-ENOMEM);
|
2011-05-27 11:50:55 +08:00
|
|
|
|
2013-05-05 11:12:25 +08:00
|
|
|
cifs_dbg(FYI, "Get root dentry for %s\n", full_path);
|
2011-05-27 11:50:55 +08:00
|
|
|
|
|
|
|
sep = CIFS_DIR_SEP(cifs_sb);
|
2011-07-19 01:50:40 +08:00
|
|
|
dentry = dget(sb->s_root);
|
|
|
|
p = s = full_path;
|
|
|
|
|
|
|
|
do {
|
2015-03-18 06:25:59 +08:00
|
|
|
struct inode *dir = d_inode(dentry);
|
2011-07-19 01:50:40 +08:00
|
|
|
struct dentry *child;
|
|
|
|
|
2011-08-21 23:30:15 +08:00
|
|
|
if (!dir) {
|
|
|
|
dput(dentry);
|
|
|
|
dentry = ERR_PTR(-ENOENT);
|
|
|
|
break;
|
|
|
|
}
|
2013-02-02 04:11:01 +08:00
|
|
|
if (!S_ISDIR(dir->i_mode)) {
|
|
|
|
dput(dentry);
|
|
|
|
dentry = ERR_PTR(-ENOTDIR);
|
|
|
|
break;
|
|
|
|
}
|
2011-08-21 23:30:15 +08:00
|
|
|
|
2011-07-19 01:50:40 +08:00
|
|
|
/* skip separators */
|
|
|
|
while (*s == sep)
|
|
|
|
s++;
|
|
|
|
if (!*s)
|
|
|
|
break;
|
|
|
|
p = s++;
|
|
|
|
/* next separator */
|
|
|
|
while (*s && *s != sep)
|
|
|
|
s++;
|
|
|
|
|
|
|
|
mutex_lock(&dir->i_mutex);
|
|
|
|
child = lookup_one_len(p, dentry, s - p);
|
|
|
|
mutex_unlock(&dir->i_mutex);
|
|
|
|
dput(dentry);
|
|
|
|
dentry = child;
|
|
|
|
} while (!IS_ERR(dentry));
|
2011-05-27 11:50:55 +08:00
|
|
|
kfree(full_path);
|
2011-07-19 01:50:40 +08:00
|
|
|
return dentry;
|
2011-05-27 11:50:55 +08:00
|
|
|
}
|
|
|
|
|
2011-06-17 21:47:23 +08:00
|
|
|
static int cifs_set_super(struct super_block *sb, void *data)
|
|
|
|
{
|
|
|
|
struct cifs_mnt_data *mnt_data = data;
|
|
|
|
sb->s_fs_info = mnt_data->cifs_sb;
|
|
|
|
return set_anon_super(sb, NULL);
|
|
|
|
}
|
|
|
|
|
2010-07-26 16:52:33 +08:00
|
|
|
static struct dentry *
|
|
|
|
cifs_do_mount(struct file_system_type *fs_type,
|
2011-05-05 17:55:12 +08:00
|
|
|
int flags, const char *dev_name, void *data)
|
2005-04-17 06:20:36 +08:00
|
|
|
{
|
|
|
|
int rc;
|
2010-08-16 04:51:10 +08:00
|
|
|
struct super_block *sb;
|
2011-05-05 17:55:12 +08:00
|
|
|
struct cifs_sb_info *cifs_sb;
|
|
|
|
struct smb_vol *volume_info;
|
2011-05-27 03:35:47 +08:00
|
|
|
struct cifs_mnt_data mnt_data;
|
2011-05-05 17:55:12 +08:00
|
|
|
struct dentry *root;
|
2005-04-17 06:20:36 +08:00
|
|
|
|
2013-05-05 11:12:25 +08:00
|
|
|
cifs_dbg(FYI, "Devname: %s flags: %d\n", dev_name, flags);
|
2005-04-17 06:20:36 +08:00
|
|
|
|
2011-07-06 20:10:38 +08:00
|
|
|
volume_info = cifs_get_volume_info((char *)data, dev_name);
|
|
|
|
if (IS_ERR(volume_info))
|
|
|
|
return ERR_CAST(volume_info);
|
2011-05-05 17:55:12 +08:00
|
|
|
|
|
|
|
cifs_sb = kzalloc(sizeof(struct cifs_sb_info), GFP_KERNEL);
|
|
|
|
if (cifs_sb == NULL) {
|
|
|
|
root = ERR_PTR(-ENOMEM);
|
2011-06-17 21:56:55 +08:00
|
|
|
goto out_nls;
|
2011-05-05 17:55:12 +08:00
|
|
|
}
|
|
|
|
|
2011-06-17 21:17:28 +08:00
|
|
|
cifs_sb->mountdata = kstrndup(data, PAGE_SIZE, GFP_KERNEL);
|
|
|
|
if (cifs_sb->mountdata == NULL) {
|
|
|
|
root = ERR_PTR(-ENOMEM);
|
2011-06-17 21:56:55 +08:00
|
|
|
goto out_cifs_sb;
|
2011-06-17 21:17:28 +08:00
|
|
|
}
|
|
|
|
|
2011-05-05 17:55:12 +08:00
|
|
|
cifs_setup_cifs_sb(volume_info, cifs_sb);
|
|
|
|
|
2011-06-17 21:29:57 +08:00
|
|
|
rc = cifs_mount(cifs_sb, volume_info);
|
|
|
|
if (rc) {
|
|
|
|
if (!(flags & MS_SILENT))
|
2013-05-05 11:12:25 +08:00
|
|
|
cifs_dbg(VFS, "cifs_mount failed w/return code = %d\n",
|
|
|
|
rc);
|
2011-06-17 21:29:57 +08:00
|
|
|
root = ERR_PTR(rc);
|
2011-06-17 21:56:55 +08:00
|
|
|
goto out_mountdata;
|
2011-06-17 21:29:57 +08:00
|
|
|
}
|
|
|
|
|
2011-05-27 03:35:47 +08:00
|
|
|
mnt_data.vol = volume_info;
|
|
|
|
mnt_data.cifs_sb = cifs_sb;
|
|
|
|
mnt_data.flags = flags;
|
|
|
|
|
2012-06-25 19:55:37 +08:00
|
|
|
/* BB should we make this contingent on mount parm? */
|
|
|
|
flags |= MS_NODIRATIME | MS_NOATIME;
|
|
|
|
|
|
|
|
sb = sget(fs_type, cifs_match_super, cifs_set_super, flags, &mnt_data);
|
2011-05-05 17:55:12 +08:00
|
|
|
if (IS_ERR(sb)) {
|
|
|
|
root = ERR_CAST(sb);
|
2011-06-17 21:29:57 +08:00
|
|
|
cifs_umount(cifs_sb);
|
2011-06-17 21:42:43 +08:00
|
|
|
goto out;
|
2011-05-05 17:55:12 +08:00
|
|
|
}
|
2005-04-17 06:20:36 +08:00
|
|
|
|
2011-06-17 21:47:23 +08:00
|
|
|
if (sb->s_root) {
|
2013-05-05 11:12:25 +08:00
|
|
|
cifs_dbg(FYI, "Use existing superblock\n");
|
2011-06-17 21:29:57 +08:00
|
|
|
cifs_umount(cifs_sb);
|
2011-06-17 21:56:55 +08:00
|
|
|
} else {
|
|
|
|
rc = cifs_read_super(sb);
|
|
|
|
if (rc) {
|
|
|
|
root = ERR_PTR(rc);
|
|
|
|
goto out_super;
|
|
|
|
}
|
2011-05-25 17:35:34 +08:00
|
|
|
|
2011-06-17 21:56:55 +08:00
|
|
|
sb->s_flags |= MS_ACTIVE;
|
2005-04-17 06:20:36 +08:00
|
|
|
}
|
2011-05-05 17:55:12 +08:00
|
|
|
|
2011-05-27 11:50:55 +08:00
|
|
|
root = cifs_get_root(volume_info, sb);
|
2011-06-17 22:02:59 +08:00
|
|
|
if (IS_ERR(root))
|
2011-05-27 11:50:55 +08:00
|
|
|
goto out_super;
|
2011-05-27 03:35:47 +08:00
|
|
|
|
2013-05-05 11:12:25 +08:00
|
|
|
cifs_dbg(FYI, "dentry root is: %p\n", root);
|
2011-05-26 04:02:16 +08:00
|
|
|
goto out;
|
2011-05-05 17:55:12 +08:00
|
|
|
|
2011-05-26 04:02:16 +08:00
|
|
|
out_super:
|
|
|
|
deactivate_locked_super(sb);
|
|
|
|
out:
|
2011-07-06 20:10:37 +08:00
|
|
|
cifs_cleanup_volume_info(volume_info);
|
2011-05-05 17:55:12 +08:00
|
|
|
return root;
|
2011-06-17 21:56:55 +08:00
|
|
|
|
|
|
|
out_mountdata:
|
|
|
|
kfree(cifs_sb->mountdata);
|
|
|
|
out_cifs_sb:
|
|
|
|
kfree(cifs_sb);
|
|
|
|
out_nls:
|
|
|
|
unload_nls(volume_info->local_nls);
|
|
|
|
goto out;
|
2005-04-17 06:20:36 +08:00
|
|
|
}
|
|
|
|
|
2014-05-23 18:50:21 +08:00
|
|
|
static ssize_t
|
|
|
|
cifs_loose_read_iter(struct kiocb *iocb, struct iov_iter *iter)
|
|
|
|
{
|
|
|
|
ssize_t rc;
|
|
|
|
struct inode *inode = file_inode(iocb->ki_filp);
|
|
|
|
|
|
|
|
rc = cifs_revalidate_mapping(inode);
|
|
|
|
if (rc)
|
|
|
|
return rc;
|
|
|
|
|
|
|
|
return generic_file_read_iter(iocb, iter);
|
|
|
|
}
|
|
|
|
|
2014-04-04 00:05:17 +08:00
|
|
|
static ssize_t cifs_file_write_iter(struct kiocb *iocb, struct iov_iter *from)
|
2005-04-17 06:20:36 +08:00
|
|
|
{
|
2013-01-24 06:07:38 +08:00
|
|
|
struct inode *inode = file_inode(iocb->ki_filp);
|
2014-03-12 00:11:47 +08:00
|
|
|
struct cifsInodeInfo *cinode = CIFS_I(inode);
|
2005-04-17 06:20:36 +08:00
|
|
|
ssize_t written;
|
2011-01-25 03:16:35 +08:00
|
|
|
int rc;
|
2005-04-17 06:20:36 +08:00
|
|
|
|
2014-03-12 00:11:47 +08:00
|
|
|
written = cifs_get_writer(cinode);
|
|
|
|
if (written)
|
|
|
|
return written;
|
|
|
|
|
2014-04-04 00:05:17 +08:00
|
|
|
written = generic_file_write_iter(iocb, from);
|
2011-01-25 03:16:35 +08:00
|
|
|
|
2013-09-05 17:01:06 +08:00
|
|
|
if (CIFS_CACHE_WRITE(CIFS_I(inode)))
|
2014-03-12 00:11:47 +08:00
|
|
|
goto out;
|
2011-01-25 03:16:35 +08:00
|
|
|
|
|
|
|
rc = filemap_fdatawrite(inode->i_mapping);
|
|
|
|
if (rc)
|
2014-04-04 00:05:17 +08:00
|
|
|
cifs_dbg(FYI, "cifs_file_write_iter: %d rc on %p inode\n",
|
2013-05-05 11:12:25 +08:00
|
|
|
rc, inode);
|
2011-01-25 03:16:35 +08:00
|
|
|
|
2014-03-12 00:11:47 +08:00
|
|
|
out:
|
|
|
|
cifs_put_writer(cinode);
|
2005-04-17 06:20:36 +08:00
|
|
|
return written;
|
|
|
|
}
|
|
|
|
|
2012-12-18 07:59:39 +08:00
|
|
|
static loff_t cifs_llseek(struct file *file, loff_t offset, int whence)
|
2006-01-13 06:41:28 +08:00
|
|
|
{
|
2011-07-19 01:21:38 +08:00
|
|
|
/*
|
2012-12-18 07:59:39 +08:00
|
|
|
* whence == SEEK_END || SEEK_DATA || SEEK_HOLE => we must revalidate
|
2011-07-19 01:21:38 +08:00
|
|
|
* the cached file length
|
|
|
|
*/
|
2012-12-18 07:59:39 +08:00
|
|
|
if (whence != SEEK_SET && whence != SEEK_CUR) {
|
2011-04-07 22:18:11 +08:00
|
|
|
int rc;
|
2013-01-24 06:07:38 +08:00
|
|
|
struct inode *inode = file_inode(file);
|
2011-04-07 22:18:11 +08:00
|
|
|
|
|
|
|
/*
|
|
|
|
* We need to be sure that all dirty pages are written and the
|
|
|
|
* server has the newest file length.
|
|
|
|
*/
|
2013-09-05 17:01:06 +08:00
|
|
|
if (!CIFS_CACHE_READ(CIFS_I(inode)) && inode->i_mapping &&
|
2011-04-07 22:18:11 +08:00
|
|
|
inode->i_mapping->nrpages != 0) {
|
|
|
|
rc = filemap_fdatawait(inode->i_mapping);
|
2011-05-21 01:00:01 +08:00
|
|
|
if (rc) {
|
|
|
|
mapping_set_error(inode->i_mapping, rc);
|
|
|
|
return rc;
|
|
|
|
}
|
2011-04-07 22:18:11 +08:00
|
|
|
}
|
|
|
|
/*
|
|
|
|
* Some applications poll for the file length in this strange
|
|
|
|
* way so we must seek to end on non-oplocked files by
|
|
|
|
* setting the revalidate time to zero.
|
|
|
|
*/
|
|
|
|
CIFS_I(inode)->time = 0;
|
|
|
|
|
|
|
|
rc = cifs_revalidate_file_attr(file);
|
|
|
|
if (rc < 0)
|
|
|
|
return (loff_t)rc;
|
2006-01-13 06:41:28 +08:00
|
|
|
}
|
2012-12-18 07:59:39 +08:00
|
|
|
return generic_file_llseek(file, offset, whence);
|
2006-01-13 06:41:28 +08:00
|
|
|
}
|
|
|
|
|
2014-08-22 22:40:25 +08:00
|
|
|
static int
|
|
|
|
cifs_setlease(struct file *file, long arg, struct file_lock **lease, void **priv)
|
2008-10-23 12:42:37 +08:00
|
|
|
{
|
2013-09-05 17:01:06 +08:00
|
|
|
/*
|
|
|
|
* Note that this is called by vfs setlease with i_lock held to
|
|
|
|
* protect *lease from going away.
|
|
|
|
*/
|
2013-01-24 06:07:38 +08:00
|
|
|
struct inode *inode = file_inode(file);
|
2010-09-21 07:01:31 +08:00
|
|
|
struct cifsFileInfo *cfile = file->private_data;
|
2008-10-23 12:42:37 +08:00
|
|
|
|
|
|
|
if (!(S_ISREG(inode->i_mode)))
|
|
|
|
return -EINVAL;
|
|
|
|
|
2014-08-09 22:16:44 +08:00
|
|
|
/* Check if file is oplocked if this is request for new lease */
|
|
|
|
if (arg == F_UNLCK ||
|
|
|
|
((arg == F_RDLCK) && CIFS_CACHE_READ(CIFS_I(inode))) ||
|
2013-09-05 17:01:06 +08:00
|
|
|
((arg == F_WRLCK) && CIFS_CACHE_WRITE(CIFS_I(inode))))
|
2014-08-22 22:40:25 +08:00
|
|
|
return generic_setlease(file, arg, lease, priv);
|
2010-09-30 07:51:11 +08:00
|
|
|
else if (tlink_tcon(cfile->tlink)->local_lease &&
|
2013-09-05 17:01:06 +08:00
|
|
|
!CIFS_CACHE_READ(CIFS_I(inode)))
|
|
|
|
/*
|
|
|
|
* If the server claims to support oplock on this file, then we
|
|
|
|
* still need to check oplock even if the local_lease mount
|
|
|
|
* option is set, but there are servers which do not support
|
|
|
|
* oplock for which this mount option may be useful if the user
|
|
|
|
* knows that the file won't be changed on the server by anyone
|
|
|
|
* else.
|
|
|
|
*/
|
2014-08-22 22:40:25 +08:00
|
|
|
return generic_setlease(file, arg, lease, priv);
|
2010-10-31 20:35:10 +08:00
|
|
|
else
|
2008-10-23 12:42:37 +08:00
|
|
|
return -EAGAIN;
|
|
|
|
}
|
|
|
|
|
2008-01-11 09:49:48 +08:00
|
|
|
struct file_system_type cifs_fs_type = {
|
2005-04-17 06:20:36 +08:00
|
|
|
.owner = THIS_MODULE,
|
|
|
|
.name = "cifs",
|
2010-07-26 16:52:33 +08:00
|
|
|
.mount = cifs_do_mount,
|
2011-06-17 20:34:57 +08:00
|
|
|
.kill_sb = cifs_kill_sb,
|
2005-04-17 06:20:36 +08:00
|
|
|
/* .fs_flags */
|
|
|
|
};
|
2013-03-11 22:05:42 +08:00
|
|
|
MODULE_ALIAS_FS("cifs");
|
2007-02-12 16:55:38 +08:00
|
|
|
const struct inode_operations cifs_dir_inode_ops = {
|
2005-04-17 06:20:36 +08:00
|
|
|
.create = cifs_create,
|
2012-06-05 21:10:23 +08:00
|
|
|
.atomic_open = cifs_atomic_open,
|
2005-04-17 06:20:36 +08:00
|
|
|
.lookup = cifs_lookup,
|
|
|
|
.getattr = cifs_getattr,
|
|
|
|
.unlink = cifs_unlink,
|
|
|
|
.link = cifs_hardlink,
|
|
|
|
.mkdir = cifs_mkdir,
|
|
|
|
.rmdir = cifs_rmdir,
|
2014-07-23 21:15:36 +08:00
|
|
|
.rename2 = cifs_rename2,
|
2005-04-17 06:20:36 +08:00
|
|
|
.permission = cifs_permission,
|
|
|
|
/* revalidate:cifs_revalidate, */
|
|
|
|
.setattr = cifs_setattr,
|
|
|
|
.symlink = cifs_symlink,
|
|
|
|
.mknod = cifs_mknod,
|
|
|
|
#ifdef CONFIG_CIFS_XATTR
|
|
|
|
.setxattr = cifs_setxattr,
|
|
|
|
.getxattr = cifs_getxattr,
|
|
|
|
.listxattr = cifs_listxattr,
|
|
|
|
.removexattr = cifs_removexattr,
|
|
|
|
#endif
|
|
|
|
};
|
|
|
|
|
2007-02-12 16:55:38 +08:00
|
|
|
const struct inode_operations cifs_file_inode_ops = {
|
2005-04-17 06:20:36 +08:00
|
|
|
/* revalidate:cifs_revalidate, */
|
|
|
|
.setattr = cifs_setattr,
|
|
|
|
.getattr = cifs_getattr, /* do we need this anymore? */
|
|
|
|
.permission = cifs_permission,
|
|
|
|
#ifdef CONFIG_CIFS_XATTR
|
|
|
|
.setxattr = cifs_setxattr,
|
|
|
|
.getxattr = cifs_getxattr,
|
|
|
|
.listxattr = cifs_listxattr,
|
|
|
|
.removexattr = cifs_removexattr,
|
2007-07-13 08:33:32 +08:00
|
|
|
#endif
|
2005-04-17 06:20:36 +08:00
|
|
|
};
|
|
|
|
|
2007-02-12 16:55:38 +08:00
|
|
|
const struct inode_operations cifs_symlink_inode_ops = {
|
2007-07-13 08:33:32 +08:00
|
|
|
.readlink = generic_readlink,
|
2005-04-17 06:20:36 +08:00
|
|
|
.follow_link = cifs_follow_link,
|
2013-09-16 22:30:04 +08:00
|
|
|
.put_link = kfree_put_link,
|
2005-04-17 06:20:36 +08:00
|
|
|
.permission = cifs_permission,
|
|
|
|
/* BB add the following two eventually */
|
|
|
|
/* revalidate: cifs_revalidate,
|
|
|
|
setattr: cifs_notify_change, *//* BB do we need notify change */
|
|
|
|
#ifdef CONFIG_CIFS_XATTR
|
|
|
|
.setxattr = cifs_setxattr,
|
|
|
|
.getxattr = cifs_getxattr,
|
|
|
|
.listxattr = cifs_listxattr,
|
|
|
|
.removexattr = cifs_removexattr,
|
2007-07-13 08:33:32 +08:00
|
|
|
#endif
|
2005-04-17 06:20:36 +08:00
|
|
|
};
|
|
|
|
|
2006-03-28 17:56:42 +08:00
|
|
|
const struct file_operations cifs_file_ops = {
|
2014-05-23 18:50:21 +08:00
|
|
|
.read_iter = cifs_loose_read_iter,
|
2014-04-04 00:05:17 +08:00
|
|
|
.write_iter = cifs_file_write_iter,
|
2005-04-17 06:20:36 +08:00
|
|
|
.open = cifs_open,
|
|
|
|
.release = cifs_close,
|
|
|
|
.lock = cifs_lock,
|
|
|
|
.fsync = cifs_fsync,
|
|
|
|
.flush = cifs_flush,
|
|
|
|
.mmap = cifs_file_mmap,
|
2007-06-01 17:49:19 +08:00
|
|
|
.splice_read = generic_file_splice_read,
|
2006-01-13 06:41:28 +08:00
|
|
|
.llseek = cifs_llseek,
|
2008-05-15 13:51:55 +08:00
|
|
|
.unlocked_ioctl = cifs_ioctl,
|
2008-10-23 12:42:37 +08:00
|
|
|
.setlease = cifs_setlease,
|
2014-08-17 21:38:47 +08:00
|
|
|
.fallocate = cifs_fallocate,
|
2005-04-17 06:20:36 +08:00
|
|
|
};
|
|
|
|
|
2010-12-12 18:11:13 +08:00
|
|
|
const struct file_operations cifs_file_strict_ops = {
|
2014-04-03 07:53:36 +08:00
|
|
|
.read_iter = cifs_strict_readv,
|
2014-04-04 00:05:17 +08:00
|
|
|
.write_iter = cifs_strict_writev,
|
2010-12-12 18:11:13 +08:00
|
|
|
.open = cifs_open,
|
|
|
|
.release = cifs_close,
|
|
|
|
.lock = cifs_lock,
|
|
|
|
.fsync = cifs_strict_fsync,
|
|
|
|
.flush = cifs_flush,
|
2010-12-14 16:29:51 +08:00
|
|
|
.mmap = cifs_file_strict_mmap,
|
2010-12-12 18:11:13 +08:00
|
|
|
.splice_read = generic_file_splice_read,
|
|
|
|
.llseek = cifs_llseek,
|
|
|
|
.unlocked_ioctl = cifs_ioctl,
|
|
|
|
.setlease = cifs_setlease,
|
2014-08-17 21:38:47 +08:00
|
|
|
.fallocate = cifs_fallocate,
|
2010-12-12 18:11:13 +08:00
|
|
|
};
|
|
|
|
|
2006-03-28 17:56:42 +08:00
|
|
|
const struct file_operations cifs_file_direct_ops = {
|
2011-03-10 15:11:05 +08:00
|
|
|
/* BB reevaluate whether they can be done with directio, no cache */
|
2014-04-03 07:53:36 +08:00
|
|
|
.read_iter = cifs_user_readv,
|
2014-04-04 00:05:17 +08:00
|
|
|
.write_iter = cifs_user_writev,
|
2005-04-17 06:20:36 +08:00
|
|
|
.open = cifs_open,
|
|
|
|
.release = cifs_close,
|
|
|
|
.lock = cifs_lock,
|
|
|
|
.fsync = cifs_fsync,
|
|
|
|
.flush = cifs_flush,
|
2009-12-07 13:44:46 +08:00
|
|
|
.mmap = cifs_file_mmap,
|
2007-06-01 17:49:19 +08:00
|
|
|
.splice_read = generic_file_splice_read,
|
2008-05-15 13:51:55 +08:00
|
|
|
.unlocked_ioctl = cifs_ioctl,
|
2006-01-13 06:41:28 +08:00
|
|
|
.llseek = cifs_llseek,
|
2008-10-23 12:42:37 +08:00
|
|
|
.setlease = cifs_setlease,
|
2014-08-17 21:38:47 +08:00
|
|
|
.fallocate = cifs_fallocate,
|
2005-04-17 06:20:36 +08:00
|
|
|
};
|
2010-12-12 18:11:13 +08:00
|
|
|
|
2006-03-28 17:56:42 +08:00
|
|
|
const struct file_operations cifs_file_nobrl_ops = {
|
2014-05-23 18:50:21 +08:00
|
|
|
.read_iter = cifs_loose_read_iter,
|
2014-04-04 00:05:17 +08:00
|
|
|
.write_iter = cifs_file_write_iter,
|
2005-11-18 09:03:00 +08:00
|
|
|
.open = cifs_open,
|
|
|
|
.release = cifs_close,
|
|
|
|
.fsync = cifs_fsync,
|
|
|
|
.flush = cifs_flush,
|
|
|
|
.mmap = cifs_file_mmap,
|
2007-06-01 17:49:19 +08:00
|
|
|
.splice_read = generic_file_splice_read,
|
2006-01-13 06:41:28 +08:00
|
|
|
.llseek = cifs_llseek,
|
2008-05-15 13:51:55 +08:00
|
|
|
.unlocked_ioctl = cifs_ioctl,
|
2008-10-23 12:42:37 +08:00
|
|
|
.setlease = cifs_setlease,
|
2014-08-17 21:38:47 +08:00
|
|
|
.fallocate = cifs_fallocate,
|
2005-11-12 03:41:00 +08:00
|
|
|
};
|
|
|
|
|
2010-12-12 18:11:13 +08:00
|
|
|
const struct file_operations cifs_file_strict_nobrl_ops = {
|
2014-04-03 07:53:36 +08:00
|
|
|
.read_iter = cifs_strict_readv,
|
2014-04-04 00:05:17 +08:00
|
|
|
.write_iter = cifs_strict_writev,
|
2010-12-12 18:11:13 +08:00
|
|
|
.open = cifs_open,
|
|
|
|
.release = cifs_close,
|
|
|
|
.fsync = cifs_strict_fsync,
|
|
|
|
.flush = cifs_flush,
|
2010-12-14 16:29:51 +08:00
|
|
|
.mmap = cifs_file_strict_mmap,
|
2010-12-12 18:11:13 +08:00
|
|
|
.splice_read = generic_file_splice_read,
|
|
|
|
.llseek = cifs_llseek,
|
|
|
|
.unlocked_ioctl = cifs_ioctl,
|
|
|
|
.setlease = cifs_setlease,
|
2014-08-17 21:38:47 +08:00
|
|
|
.fallocate = cifs_fallocate,
|
2010-12-12 18:11:13 +08:00
|
|
|
};
|
|
|
|
|
2006-03-28 17:56:42 +08:00
|
|
|
const struct file_operations cifs_file_direct_nobrl_ops = {
|
2011-03-10 15:11:05 +08:00
|
|
|
/* BB reevaluate whether they can be done with directio, no cache */
|
2014-04-03 07:53:36 +08:00
|
|
|
.read_iter = cifs_user_readv,
|
2014-04-04 00:05:17 +08:00
|
|
|
.write_iter = cifs_user_writev,
|
2005-11-18 09:03:00 +08:00
|
|
|
.open = cifs_open,
|
|
|
|
.release = cifs_close,
|
|
|
|
.fsync = cifs_fsync,
|
|
|
|
.flush = cifs_flush,
|
2010-03-27 10:00:49 +08:00
|
|
|
.mmap = cifs_file_mmap,
|
2007-06-01 17:49:19 +08:00
|
|
|
.splice_read = generic_file_splice_read,
|
2008-05-15 13:51:55 +08:00
|
|
|
.unlocked_ioctl = cifs_ioctl,
|
2006-01-13 06:41:28 +08:00
|
|
|
.llseek = cifs_llseek,
|
2008-10-23 12:42:37 +08:00
|
|
|
.setlease = cifs_setlease,
|
2014-08-17 21:38:47 +08:00
|
|
|
.fallocate = cifs_fallocate,
|
2005-11-12 03:41:00 +08:00
|
|
|
};
|
2005-04-17 06:20:36 +08:00
|
|
|
|
2006-03-28 17:56:42 +08:00
|
|
|
const struct file_operations cifs_dir_ops = {
|
2013-05-23 04:17:25 +08:00
|
|
|
.iterate = cifs_readdir,
|
2005-04-17 06:20:36 +08:00
|
|
|
.release = cifs_closedir,
|
|
|
|
.read = generic_read_dir,
|
2008-05-15 13:51:55 +08:00
|
|
|
.unlocked_ioctl = cifs_ioctl,
|
2008-09-04 03:53:01 +08:00
|
|
|
.llseek = generic_file_llseek,
|
2005-04-17 06:20:36 +08:00
|
|
|
};
|
|
|
|
|
|
|
|
static void
|
2008-07-26 10:45:34 +08:00
|
|
|
cifs_init_once(void *inode)
|
2005-04-17 06:20:36 +08:00
|
|
|
{
|
|
|
|
struct cifsInodeInfo *cifsi = inode;
|
|
|
|
|
2007-05-17 13:10:57 +08:00
|
|
|
inode_init_once(&cifsi->vfs_inode);
|
2012-09-19 21:22:44 +08:00
|
|
|
init_rwsem(&cifsi->lock_sem);
|
2005-04-17 06:20:36 +08:00
|
|
|
}
|
|
|
|
|
2014-04-04 05:46:30 +08:00
|
|
|
static int __init
|
2005-04-17 06:20:36 +08:00
|
|
|
cifs_init_inodecache(void)
|
|
|
|
{
|
|
|
|
cifs_inode_cachep = kmem_cache_create("cifs_inode_cache",
|
2007-08-31 06:09:15 +08:00
|
|
|
sizeof(struct cifsInodeInfo),
|
2006-03-24 19:16:06 +08:00
|
|
|
0, (SLAB_RECLAIM_ACCOUNT|
|
|
|
|
SLAB_MEM_SPREAD),
|
2007-07-20 09:11:58 +08:00
|
|
|
cifs_init_once);
|
2005-04-17 06:20:36 +08:00
|
|
|
if (cifs_inode_cachep == NULL)
|
|
|
|
return -ENOMEM;
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
static void
|
|
|
|
cifs_destroy_inodecache(void)
|
|
|
|
{
|
2012-09-26 09:33:07 +08:00
|
|
|
/*
|
|
|
|
* Make sure all delayed rcu free inodes are flushed before we
|
|
|
|
* destroy cache.
|
|
|
|
*/
|
|
|
|
rcu_barrier();
|
2006-09-27 16:49:40 +08:00
|
|
|
kmem_cache_destroy(cifs_inode_cachep);
|
2005-04-17 06:20:36 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
static int
|
|
|
|
cifs_init_request_bufs(void)
|
|
|
|
{
|
2012-01-13 02:40:50 +08:00
|
|
|
size_t max_hdr_size = MAX_CIFS_HDR_SIZE;
|
|
|
|
#ifdef CONFIG_CIFS_SMB2
|
|
|
|
/*
|
|
|
|
* SMB2 maximum header size is bigger than CIFS one - no problems to
|
|
|
|
* allocate some more bytes for CIFS.
|
|
|
|
*/
|
|
|
|
max_hdr_size = MAX_SMB2_HDR_SIZE;
|
|
|
|
#endif
|
2007-05-01 04:13:06 +08:00
|
|
|
if (CIFSMaxBufSize < 8192) {
|
2005-04-17 06:20:36 +08:00
|
|
|
/* Buffer size can not be smaller than 2 * PATH_MAX since maximum
|
|
|
|
Unicode path name has to fit in any SMB/CIFS path based frames */
|
|
|
|
CIFSMaxBufSize = 8192;
|
|
|
|
} else if (CIFSMaxBufSize > 1024*127) {
|
|
|
|
CIFSMaxBufSize = 1024 * 127;
|
|
|
|
} else {
|
|
|
|
CIFSMaxBufSize &= 0x1FE00; /* Round size to even 512 byte mult*/
|
|
|
|
}
|
2013-05-05 11:12:25 +08:00
|
|
|
/*
|
|
|
|
cifs_dbg(VFS, "CIFSMaxBufSize %d 0x%x\n",
|
|
|
|
CIFSMaxBufSize, CIFSMaxBufSize);
|
|
|
|
*/
|
2005-04-17 06:20:36 +08:00
|
|
|
cifs_req_cachep = kmem_cache_create("cifs_request",
|
2012-01-13 02:40:50 +08:00
|
|
|
CIFSMaxBufSize + max_hdr_size, 0,
|
2007-07-20 09:11:58 +08:00
|
|
|
SLAB_HWCACHE_ALIGN, NULL);
|
2005-04-17 06:20:36 +08:00
|
|
|
if (cifs_req_cachep == NULL)
|
|
|
|
return -ENOMEM;
|
|
|
|
|
2007-05-01 04:13:06 +08:00
|
|
|
if (cifs_min_rcv < 1)
|
2005-04-17 06:20:36 +08:00
|
|
|
cifs_min_rcv = 1;
|
|
|
|
else if (cifs_min_rcv > 64) {
|
|
|
|
cifs_min_rcv = 64;
|
2013-05-05 11:12:25 +08:00
|
|
|
cifs_dbg(VFS, "cifs_min_rcv set to maximum (64)\n");
|
2005-04-17 06:20:36 +08:00
|
|
|
}
|
|
|
|
|
2006-03-26 17:37:50 +08:00
|
|
|
cifs_req_poolp = mempool_create_slab_pool(cifs_min_rcv,
|
|
|
|
cifs_req_cachep);
|
2005-04-17 06:20:36 +08:00
|
|
|
|
2007-05-01 04:13:06 +08:00
|
|
|
if (cifs_req_poolp == NULL) {
|
2005-04-17 06:20:36 +08:00
|
|
|
kmem_cache_destroy(cifs_req_cachep);
|
|
|
|
return -ENOMEM;
|
|
|
|
}
|
2005-12-13 12:53:18 +08:00
|
|
|
/* MAX_CIFS_SMALL_BUFFER_SIZE bytes is enough for most SMB responses and
|
2005-04-17 06:20:36 +08:00
|
|
|
almost all handle based requests (but not write response, nor is it
|
|
|
|
sufficient for path based requests). A smaller size would have
|
2007-07-13 08:33:32 +08:00
|
|
|
been more efficient (compacting multiple slab items on one 4k page)
|
2005-04-17 06:20:36 +08:00
|
|
|
for the case in which debug was on, but this larger size allows
|
|
|
|
more SMBs to use small buffer alloc and is still much more
|
2007-07-07 07:13:06 +08:00
|
|
|
efficient to alloc 1 per page off the slab compared to 17K (5page)
|
2005-04-17 06:20:36 +08:00
|
|
|
alloc of large cifs buffers even when page debugging is on */
|
|
|
|
cifs_sm_req_cachep = kmem_cache_create("cifs_small_rq",
|
2007-07-07 07:13:06 +08:00
|
|
|
MAX_CIFS_SMALL_BUFFER_SIZE, 0, SLAB_HWCACHE_ALIGN,
|
2007-07-20 09:11:58 +08:00
|
|
|
NULL);
|
2005-04-17 06:20:36 +08:00
|
|
|
if (cifs_sm_req_cachep == NULL) {
|
|
|
|
mempool_destroy(cifs_req_poolp);
|
|
|
|
kmem_cache_destroy(cifs_req_cachep);
|
2007-07-07 07:13:06 +08:00
|
|
|
return -ENOMEM;
|
2005-04-17 06:20:36 +08:00
|
|
|
}
|
|
|
|
|
2007-05-01 04:13:06 +08:00
|
|
|
if (cifs_min_small < 2)
|
2005-04-17 06:20:36 +08:00
|
|
|
cifs_min_small = 2;
|
|
|
|
else if (cifs_min_small > 256) {
|
|
|
|
cifs_min_small = 256;
|
2013-05-05 11:12:25 +08:00
|
|
|
cifs_dbg(FYI, "cifs_min_small set to maximum (256)\n");
|
2005-04-17 06:20:36 +08:00
|
|
|
}
|
|
|
|
|
2006-03-26 17:37:50 +08:00
|
|
|
cifs_sm_req_poolp = mempool_create_slab_pool(cifs_min_small,
|
|
|
|
cifs_sm_req_cachep);
|
2005-04-17 06:20:36 +08:00
|
|
|
|
2007-05-01 04:13:06 +08:00
|
|
|
if (cifs_sm_req_poolp == NULL) {
|
2005-04-17 06:20:36 +08:00
|
|
|
mempool_destroy(cifs_req_poolp);
|
|
|
|
kmem_cache_destroy(cifs_req_cachep);
|
|
|
|
kmem_cache_destroy(cifs_sm_req_cachep);
|
|
|
|
return -ENOMEM;
|
|
|
|
}
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
static void
|
|
|
|
cifs_destroy_request_bufs(void)
|
|
|
|
{
|
|
|
|
mempool_destroy(cifs_req_poolp);
|
2006-09-27 16:49:40 +08:00
|
|
|
kmem_cache_destroy(cifs_req_cachep);
|
2005-04-17 06:20:36 +08:00
|
|
|
mempool_destroy(cifs_sm_req_poolp);
|
2006-09-27 16:49:40 +08:00
|
|
|
kmem_cache_destroy(cifs_sm_req_cachep);
|
2005-04-17 06:20:36 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
static int
|
|
|
|
cifs_init_mids(void)
|
|
|
|
{
|
|
|
|
cifs_mid_cachep = kmem_cache_create("cifs_mpx_ids",
|
2007-08-31 06:09:15 +08:00
|
|
|
sizeof(struct mid_q_entry), 0,
|
|
|
|
SLAB_HWCACHE_ALIGN, NULL);
|
2005-04-17 06:20:36 +08:00
|
|
|
if (cifs_mid_cachep == NULL)
|
|
|
|
return -ENOMEM;
|
|
|
|
|
2006-03-26 17:37:50 +08:00
|
|
|
/* 3 is a reasonable minimum number of simultaneous operations */
|
|
|
|
cifs_mid_poolp = mempool_create_slab_pool(3, cifs_mid_cachep);
|
2007-05-01 04:13:06 +08:00
|
|
|
if (cifs_mid_poolp == NULL) {
|
2005-04-17 06:20:36 +08:00
|
|
|
kmem_cache_destroy(cifs_mid_cachep);
|
|
|
|
return -ENOMEM;
|
|
|
|
}
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
static void
|
|
|
|
cifs_destroy_mids(void)
|
|
|
|
{
|
|
|
|
mempool_destroy(cifs_mid_poolp);
|
2006-09-27 16:49:40 +08:00
|
|
|
kmem_cache_destroy(cifs_mid_cachep);
|
2005-04-17 06:20:36 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
static int __init
|
|
|
|
init_cifs(void)
|
|
|
|
{
|
|
|
|
int rc = 0;
|
|
|
|
cifs_proc_init();
|
2008-11-15 02:44:38 +08:00
|
|
|
INIT_LIST_HEAD(&cifs_tcp_ses_list);
|
2011-02-24 13:39:23 +08:00
|
|
|
#ifdef CONFIG_CIFS_DNOTIFY_EXPERIMENTAL /* unused temporarily */
|
2005-10-11 10:52:13 +08:00
|
|
|
INIT_LIST_HEAD(&GlobalDnotifyReqList);
|
|
|
|
INIT_LIST_HEAD(&GlobalDnotifyRsp_Q);
|
2011-02-24 13:39:23 +08:00
|
|
|
#endif /* was needed for dnotify, and will be needed for inotify when VFS fix */
|
2005-04-17 06:20:36 +08:00
|
|
|
/*
|
|
|
|
* Initialize Global counters
|
|
|
|
*/
|
|
|
|
atomic_set(&sesInfoAllocCount, 0);
|
|
|
|
atomic_set(&tconInfoAllocCount, 0);
|
2007-07-07 07:13:06 +08:00
|
|
|
atomic_set(&tcpSesAllocCount, 0);
|
2005-04-17 06:20:36 +08:00
|
|
|
atomic_set(&tcpSesReconnectCount, 0);
|
|
|
|
atomic_set(&tconInfoReconnectCount, 0);
|
|
|
|
|
|
|
|
atomic_set(&bufAllocCount, 0);
|
2005-12-04 05:58:57 +08:00
|
|
|
atomic_set(&smBufAllocCount, 0);
|
|
|
|
#ifdef CONFIG_CIFS_STATS2
|
|
|
|
atomic_set(&totBufAllocCount, 0);
|
|
|
|
atomic_set(&totSmBufAllocCount, 0);
|
|
|
|
#endif /* CONFIG_CIFS_STATS2 */
|
|
|
|
|
2005-04-17 06:20:36 +08:00
|
|
|
atomic_set(&midCount, 0);
|
|
|
|
GlobalCurrentXid = 0;
|
|
|
|
GlobalTotalActiveXid = 0;
|
|
|
|
GlobalMaxActiveXid = 0;
|
2010-10-19 01:59:37 +08:00
|
|
|
spin_lock_init(&cifs_tcp_ses_lock);
|
2010-10-16 03:34:03 +08:00
|
|
|
spin_lock_init(&cifs_file_list_lock);
|
2005-04-17 06:20:36 +08:00
|
|
|
spin_lock_init(&GlobalMid_Lock);
|
|
|
|
|
2007-05-01 04:13:06 +08:00
|
|
|
if (cifs_max_pending < 2) {
|
2005-04-17 06:20:36 +08:00
|
|
|
cifs_max_pending = 2;
|
2013-05-05 11:12:25 +08:00
|
|
|
cifs_dbg(FYI, "cifs_max_pending set to min of 2\n");
|
2012-03-20 17:55:09 +08:00
|
|
|
} else if (cifs_max_pending > CIFS_MAX_REQ) {
|
|
|
|
cifs_max_pending = CIFS_MAX_REQ;
|
2013-05-05 11:12:25 +08:00
|
|
|
cifs_dbg(FYI, "cifs_max_pending set to max of %u\n",
|
|
|
|
CIFS_MAX_REQ);
|
2005-04-17 06:20:36 +08:00
|
|
|
}
|
|
|
|
|
2012-03-24 02:40:53 +08:00
|
|
|
cifsiod_wq = alloc_workqueue("cifsiod", WQ_FREEZABLE|WQ_MEM_RECLAIM, 0);
|
|
|
|
if (!cifsiod_wq) {
|
|
|
|
rc = -ENOMEM;
|
|
|
|
goto out_clean_proc;
|
|
|
|
}
|
|
|
|
|
2010-07-05 20:41:50 +08:00
|
|
|
rc = cifs_fscache_register();
|
|
|
|
if (rc)
|
2012-03-24 02:40:53 +08:00
|
|
|
goto out_destroy_wq;
|
2010-07-05 20:41:50 +08:00
|
|
|
|
2005-04-17 06:20:36 +08:00
|
|
|
rc = cifs_init_inodecache();
|
2006-04-22 06:52:25 +08:00
|
|
|
if (rc)
|
2010-09-23 03:15:36 +08:00
|
|
|
goto out_unreg_fscache;
|
2006-04-22 06:52:25 +08:00
|
|
|
|
|
|
|
rc = cifs_init_mids();
|
|
|
|
if (rc)
|
|
|
|
goto out_destroy_inodecache;
|
|
|
|
|
|
|
|
rc = cifs_init_request_bufs();
|
|
|
|
if (rc)
|
|
|
|
goto out_destroy_mids;
|
|
|
|
|
2007-11-03 13:02:24 +08:00
|
|
|
#ifdef CONFIG_CIFS_UPCALL
|
|
|
|
rc = register_key_type(&cifs_spnego_key_type);
|
|
|
|
if (rc)
|
2011-04-28 12:34:35 +08:00
|
|
|
goto out_destroy_request_bufs;
|
|
|
|
#endif /* CONFIG_CIFS_UPCALL */
|
|
|
|
|
|
|
|
#ifdef CONFIG_CIFS_ACL
|
|
|
|
rc = init_cifs_idmap();
|
|
|
|
if (rc)
|
2011-05-06 15:35:00 +08:00
|
|
|
goto out_register_key_type;
|
2011-04-28 12:34:35 +08:00
|
|
|
#endif /* CONFIG_CIFS_ACL */
|
|
|
|
|
|
|
|
rc = register_filesystem(&cifs_fs_type);
|
|
|
|
if (rc)
|
2011-05-06 15:35:00 +08:00
|
|
|
goto out_init_cifs_idmap;
|
2006-04-22 06:52:25 +08:00
|
|
|
|
|
|
|
return 0;
|
|
|
|
|
2011-05-06 15:35:00 +08:00
|
|
|
out_init_cifs_idmap:
|
2011-04-28 12:34:35 +08:00
|
|
|
#ifdef CONFIG_CIFS_ACL
|
|
|
|
exit_cifs_idmap();
|
2011-05-06 15:35:00 +08:00
|
|
|
out_register_key_type:
|
2011-04-28 12:34:35 +08:00
|
|
|
#endif
|
2007-11-03 13:02:24 +08:00
|
|
|
#ifdef CONFIG_CIFS_UPCALL
|
2011-04-28 12:34:35 +08:00
|
|
|
unregister_key_type(&cifs_spnego_key_type);
|
2011-05-06 15:35:00 +08:00
|
|
|
out_destroy_request_bufs:
|
2010-08-08 03:54:46 +08:00
|
|
|
#endif
|
2006-04-22 06:52:25 +08:00
|
|
|
cifs_destroy_request_bufs();
|
2010-09-23 03:15:36 +08:00
|
|
|
out_destroy_mids:
|
2006-04-22 06:52:25 +08:00
|
|
|
cifs_destroy_mids();
|
2010-09-23 03:15:36 +08:00
|
|
|
out_destroy_inodecache:
|
2006-04-22 06:52:25 +08:00
|
|
|
cifs_destroy_inodecache();
|
2010-09-23 03:15:36 +08:00
|
|
|
out_unreg_fscache:
|
2010-07-05 20:41:50 +08:00
|
|
|
cifs_fscache_unregister();
|
2012-03-24 02:40:53 +08:00
|
|
|
out_destroy_wq:
|
|
|
|
destroy_workqueue(cifsiod_wq);
|
2010-09-23 03:15:36 +08:00
|
|
|
out_clean_proc:
|
|
|
|
cifs_proc_clean();
|
2005-04-17 06:20:36 +08:00
|
|
|
return rc;
|
|
|
|
}
|
|
|
|
|
|
|
|
static void __exit
|
|
|
|
exit_cifs(void)
|
|
|
|
{
|
2013-05-05 11:12:25 +08:00
|
|
|
cifs_dbg(NOISY, "exit_cifs\n");
|
2012-03-21 18:27:55 +08:00
|
|
|
unregister_filesystem(&cifs_fs_type);
|
2008-04-24 16:56:07 +08:00
|
|
|
cifs_dfs_release_automount_timer();
|
2011-04-28 12:34:35 +08:00
|
|
|
#ifdef CONFIG_CIFS_ACL
|
|
|
|
exit_cifs_idmap();
|
|
|
|
#endif
|
2007-11-03 13:02:24 +08:00
|
|
|
#ifdef CONFIG_CIFS_UPCALL
|
|
|
|
unregister_key_type(&cifs_spnego_key_type);
|
2005-04-17 06:20:36 +08:00
|
|
|
#endif
|
|
|
|
cifs_destroy_request_bufs();
|
2012-03-21 18:27:55 +08:00
|
|
|
cifs_destroy_mids();
|
|
|
|
cifs_destroy_inodecache();
|
|
|
|
cifs_fscache_unregister();
|
2012-03-24 02:40:53 +08:00
|
|
|
destroy_workqueue(cifsiod_wq);
|
2012-03-21 18:27:55 +08:00
|
|
|
cifs_proc_clean();
|
2005-04-17 06:20:36 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
MODULE_AUTHOR("Steve French <sfrench@us.ibm.com>");
|
2007-07-07 07:13:06 +08:00
|
|
|
MODULE_LICENSE("GPL"); /* combination of LGPL + GPL source behaves as GPL */
|
2005-04-17 06:20:36 +08:00
|
|
|
MODULE_DESCRIPTION
|
2007-07-18 01:34:02 +08:00
|
|
|
("VFS to access servers complying with the SNIA CIFS Specification "
|
|
|
|
"e.g. Samba and Windows");
|
2005-04-17 06:20:36 +08:00
|
|
|
MODULE_VERSION(CIFS_VERSION);
|
|
|
|
module_init(init_cifs)
|
|
|
|
module_exit(exit_cifs)
|