2005-04-17 06:20:36 +08:00
|
|
|
/*
|
|
|
|
* fs/cifs/dir.c
|
|
|
|
*
|
|
|
|
* vfs operations that deal with dentries
|
2007-06-06 02:30:44 +08:00
|
|
|
*
|
2008-02-08 07:25:02 +08:00
|
|
|
* Copyright (C) International Business Machines Corp., 2002,2008
|
2005-04-17 06:20:36 +08:00
|
|
|
* Author(s): Steve French (sfrench@us.ibm.com)
|
|
|
|
*
|
|
|
|
* This library is free software; you can redistribute it and/or modify
|
|
|
|
* it under the terms of the GNU Lesser General Public License as published
|
|
|
|
* by the Free Software Foundation; either version 2.1 of the License, or
|
|
|
|
* (at your option) any later version.
|
|
|
|
*
|
|
|
|
* This library is distributed in the hope that it will be useful,
|
|
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See
|
|
|
|
* the GNU Lesser General Public License for more details.
|
|
|
|
*
|
|
|
|
* You should have received a copy of the GNU Lesser General Public License
|
|
|
|
* along with this library; if not, write to the Free Software
|
|
|
|
* Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
|
|
|
|
*/
|
|
|
|
#include <linux/fs.h>
|
|
|
|
#include <linux/stat.h>
|
|
|
|
#include <linux/slab.h>
|
|
|
|
#include <linux/namei.h>
|
|
|
|
#include "cifsfs.h"
|
|
|
|
#include "cifspdu.h"
|
|
|
|
#include "cifsglob.h"
|
|
|
|
#include "cifsproto.h"
|
|
|
|
#include "cifs_debug.h"
|
|
|
|
#include "cifs_fs_sb.h"
|
|
|
|
|
2007-02-27 13:35:17 +08:00
|
|
|
static void
|
2005-04-17 06:20:36 +08:00
|
|
|
renew_parental_timestamps(struct dentry *direntry)
|
|
|
|
{
|
2007-06-06 02:30:44 +08:00
|
|
|
/* BB check if there is a way to get the kernel to do this or if we
|
|
|
|
really need this */
|
2005-04-17 06:20:36 +08:00
|
|
|
do {
|
|
|
|
direntry->d_time = jiffies;
|
|
|
|
direntry = direntry->d_parent;
|
2007-06-06 02:30:44 +08:00
|
|
|
} while (!IS_ROOT(direntry));
|
2005-04-17 06:20:36 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
/* Note: caller must free return buffer */
|
|
|
|
char *
|
|
|
|
build_path_from_dentry(struct dentry *direntry)
|
|
|
|
{
|
|
|
|
struct dentry *temp;
|
2006-09-21 15:02:52 +08:00
|
|
|
int namelen;
|
|
|
|
int pplen;
|
2008-05-15 09:50:56 +08:00
|
|
|
int dfsplen;
|
2005-04-17 06:20:36 +08:00
|
|
|
char *full_path;
|
2006-03-10 06:21:45 +08:00
|
|
|
char dirsep;
|
2008-05-15 09:50:56 +08:00
|
|
|
struct cifs_sb_info *cifs_sb;
|
2005-04-17 06:20:36 +08:00
|
|
|
|
2007-06-06 02:30:44 +08:00
|
|
|
if (direntry == NULL)
|
2005-04-17 06:20:36 +08:00
|
|
|
return NULL; /* not much we can do if dentry is freed and
|
|
|
|
we need to reopen the file after it was closed implicitly
|
|
|
|
when the server crashed */
|
|
|
|
|
2008-05-15 09:50:56 +08:00
|
|
|
cifs_sb = CIFS_SB(direntry->d_sb);
|
|
|
|
dirsep = CIFS_DIR_SEP(cifs_sb);
|
|
|
|
pplen = cifs_sb->prepathlen;
|
|
|
|
if (cifs_sb->tcon && (cifs_sb->tcon->Flags & SMB_SHARE_IS_IN_DFS))
|
|
|
|
dfsplen = strnlen(cifs_sb->tcon->treeName, MAX_TREE_SIZE + 1);
|
|
|
|
else
|
|
|
|
dfsplen = 0;
|
2005-04-17 06:20:36 +08:00
|
|
|
cifs_bp_rename_retry:
|
2008-05-15 09:50:56 +08:00
|
|
|
namelen = pplen + dfsplen;
|
2005-04-17 06:20:36 +08:00
|
|
|
for (temp = direntry; !IS_ROOT(temp);) {
|
|
|
|
namelen += (1 + temp->d_name.len);
|
|
|
|
temp = temp->d_parent;
|
2007-06-06 02:30:44 +08:00
|
|
|
if (temp == NULL) {
|
|
|
|
cERROR(1, ("corrupt dentry"));
|
2005-04-17 06:20:36 +08:00
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
full_path = kmalloc(namelen+1, GFP_KERNEL);
|
2007-06-06 02:30:44 +08:00
|
|
|
if (full_path == NULL)
|
2005-04-17 06:20:36 +08:00
|
|
|
return full_path;
|
|
|
|
full_path[namelen] = 0; /* trailing null */
|
|
|
|
for (temp = direntry; !IS_ROOT(temp);) {
|
|
|
|
namelen -= 1 + temp->d_name.len;
|
|
|
|
if (namelen < 0) {
|
|
|
|
break;
|
|
|
|
} else {
|
2005-08-31 02:32:14 +08:00
|
|
|
full_path[namelen] = dirsep;
|
2005-04-17 06:20:36 +08:00
|
|
|
strncpy(full_path + namelen + 1, temp->d_name.name,
|
|
|
|
temp->d_name.len);
|
2006-09-21 15:02:52 +08:00
|
|
|
cFYI(0, ("name: %s", full_path + namelen));
|
2005-04-17 06:20:36 +08:00
|
|
|
}
|
|
|
|
temp = temp->d_parent;
|
2007-06-06 02:30:44 +08:00
|
|
|
if (temp == NULL) {
|
|
|
|
cERROR(1, ("corrupt dentry"));
|
2005-04-17 06:20:36 +08:00
|
|
|
kfree(full_path);
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
}
|
2008-05-15 09:50:56 +08:00
|
|
|
if (namelen != pplen + dfsplen) {
|
2005-04-17 06:20:36 +08:00
|
|
|
cERROR(1,
|
2006-09-21 15:02:52 +08:00
|
|
|
("did not end path lookup where expected namelen is %d",
|
2005-04-17 06:20:36 +08:00
|
|
|
namelen));
|
2007-06-06 02:30:44 +08:00
|
|
|
/* presumably this is only possible if racing with a rename
|
2005-04-17 06:20:36 +08:00
|
|
|
of one of the parent directories (we can not lock the dentries
|
|
|
|
above us to prevent this, but retrying should be harmless) */
|
|
|
|
kfree(full_path);
|
|
|
|
goto cifs_bp_rename_retry;
|
|
|
|
}
|
2006-09-21 15:02:52 +08:00
|
|
|
/* DIR_SEP already set for byte 0 / vs \ but not for
|
|
|
|
subsequent slashes in prepath which currently must
|
|
|
|
be entered the right way - not sure if there is an alternative
|
|
|
|
since the '\' is a valid posix character so we can not switch
|
|
|
|
those safely to '/' if any are found in the middle of the prepath */
|
|
|
|
/* BB test paths to Windows with '/' in the midst of prepath */
|
2008-05-15 09:50:56 +08:00
|
|
|
|
|
|
|
if (dfsplen) {
|
|
|
|
strncpy(full_path, cifs_sb->tcon->treeName, dfsplen);
|
|
|
|
if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_POSIX_PATHS) {
|
|
|
|
int i;
|
|
|
|
for (i = 0; i < dfsplen; i++) {
|
|
|
|
if (full_path[i] == '\\')
|
|
|
|
full_path[i] = '/';
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
strncpy(full_path + dfsplen, CIFS_SB(direntry->d_sb)->prepath, pplen);
|
2005-04-17 06:20:36 +08:00
|
|
|
return full_path;
|
|
|
|
}
|
|
|
|
|
2006-06-01 06:40:51 +08:00
|
|
|
/* Inode operations in similar order to how they appear in Linux file fs.h */
|
2005-04-17 06:20:36 +08:00
|
|
|
|
|
|
|
int
|
|
|
|
cifs_create(struct inode *inode, struct dentry *direntry, int mode,
|
|
|
|
struct nameidata *nd)
|
|
|
|
{
|
|
|
|
int rc = -ENOENT;
|
|
|
|
int xid;
|
2008-05-10 06:28:02 +08:00
|
|
|
int create_options = CREATE_NOT_DIR;
|
2005-04-17 06:20:36 +08:00
|
|
|
int oplock = 0;
|
|
|
|
int desiredAccess = GENERIC_READ | GENERIC_WRITE;
|
|
|
|
__u16 fileHandle;
|
|
|
|
struct cifs_sb_info *cifs_sb;
|
|
|
|
struct cifsTconInfo *pTcon;
|
|
|
|
char *full_path = NULL;
|
2007-07-10 09:16:18 +08:00
|
|
|
FILE_ALL_INFO *buf = NULL;
|
2005-04-17 06:20:36 +08:00
|
|
|
struct inode *newinode = NULL;
|
2007-07-10 09:16:18 +08:00
|
|
|
struct cifsFileInfo *pCifsFile = NULL;
|
|
|
|
struct cifsInodeInfo *pCifsInode;
|
2005-04-17 06:20:36 +08:00
|
|
|
int disposition = FILE_OVERWRITE_IF;
|
2008-04-29 08:06:05 +08:00
|
|
|
bool write_only = false;
|
2005-04-17 06:20:36 +08:00
|
|
|
|
|
|
|
xid = GetXid();
|
|
|
|
|
|
|
|
cifs_sb = CIFS_SB(inode->i_sb);
|
|
|
|
pTcon = cifs_sb->tcon;
|
|
|
|
|
|
|
|
full_path = build_path_from_dentry(direntry);
|
2007-06-06 02:30:44 +08:00
|
|
|
if (full_path == NULL) {
|
2005-04-17 06:20:36 +08:00
|
|
|
FreeXid(xid);
|
|
|
|
return -ENOMEM;
|
|
|
|
}
|
|
|
|
|
2007-06-06 02:30:44 +08:00
|
|
|
if (nd && (nd->flags & LOOKUP_OPEN)) {
|
2005-09-07 06:18:26 +08:00
|
|
|
int oflags = nd->intent.open.flags;
|
|
|
|
|
|
|
|
desiredAccess = 0;
|
|
|
|
if (oflags & FMODE_READ)
|
|
|
|
desiredAccess |= GENERIC_READ;
|
|
|
|
if (oflags & FMODE_WRITE) {
|
|
|
|
desiredAccess |= GENERIC_WRITE;
|
|
|
|
if (!(oflags & FMODE_READ))
|
2008-04-29 08:06:05 +08:00
|
|
|
write_only = true;
|
2005-04-17 06:20:36 +08:00
|
|
|
}
|
|
|
|
|
2007-06-06 02:30:44 +08:00
|
|
|
if ((oflags & (O_CREAT | O_EXCL)) == (O_CREAT | O_EXCL))
|
2005-04-17 06:20:36 +08:00
|
|
|
disposition = FILE_CREATE;
|
2007-06-06 02:30:44 +08:00
|
|
|
else if ((oflags & (O_CREAT | O_TRUNC)) == (O_CREAT | O_TRUNC))
|
2005-04-17 06:20:36 +08:00
|
|
|
disposition = FILE_OVERWRITE_IF;
|
2007-06-06 02:30:44 +08:00
|
|
|
else if ((oflags & O_CREAT) == O_CREAT)
|
2005-04-17 06:20:36 +08:00
|
|
|
disposition = FILE_OPEN_IF;
|
2008-02-08 07:25:02 +08:00
|
|
|
else
|
2007-06-06 02:30:44 +08:00
|
|
|
cFYI(1, ("Create flag not set in create function"));
|
2005-04-17 06:20:36 +08:00
|
|
|
}
|
|
|
|
|
2007-06-06 02:30:44 +08:00
|
|
|
/* BB add processing to set equivalent of mode - e.g. via CreateX with
|
|
|
|
ACLs */
|
2005-04-17 06:20:36 +08:00
|
|
|
if (oplockEnabled)
|
|
|
|
oplock = REQ_OPLOCK;
|
|
|
|
|
2007-06-06 02:30:44 +08:00
|
|
|
buf = kmalloc(sizeof(FILE_ALL_INFO), GFP_KERNEL);
|
|
|
|
if (buf == NULL) {
|
2005-04-17 06:20:36 +08:00
|
|
|
kfree(full_path);
|
|
|
|
FreeXid(xid);
|
|
|
|
return -ENOMEM;
|
|
|
|
}
|
2008-05-10 06:28:02 +08:00
|
|
|
|
|
|
|
mode &= ~current->fs->umask;
|
|
|
|
|
|
|
|
/*
|
|
|
|
* if we're not using unix extensions, see if we need to set
|
|
|
|
* ATTR_READONLY on the create call
|
|
|
|
*/
|
|
|
|
if (!pTcon->unix_ext && (mode & S_IWUGO) == 0)
|
|
|
|
create_options |= CREATE_OPTION_READONLY;
|
|
|
|
|
2007-06-06 02:30:44 +08:00
|
|
|
if (cifs_sb->tcon->ses->capabilities & CAP_NT_SMBS)
|
2006-06-07 08:18:43 +08:00
|
|
|
rc = CIFSSMBOpen(xid, pTcon, full_path, disposition,
|
2008-05-10 06:28:02 +08:00
|
|
|
desiredAccess, create_options,
|
2005-04-29 13:41:06 +08:00
|
|
|
&fileHandle, &oplock, buf, cifs_sb->local_nls,
|
|
|
|
cifs_sb->mnt_cifs_flags & CIFS_MOUNT_MAP_SPECIAL_CHR);
|
2006-06-07 08:18:43 +08:00
|
|
|
else
|
|
|
|
rc = -EIO; /* no NT SMB support fall into legacy open below */
|
|
|
|
|
2007-06-06 02:30:44 +08:00
|
|
|
if (rc == -EIO) {
|
2005-08-25 14:06:05 +08:00
|
|
|
/* old server, retry the open legacy style */
|
|
|
|
rc = SMBLegacyOpen(xid, pTcon, full_path, disposition,
|
2008-05-10 06:28:02 +08:00
|
|
|
desiredAccess, create_options,
|
2005-08-25 14:06:05 +08:00
|
|
|
&fileHandle, &oplock, buf, cifs_sb->local_nls,
|
|
|
|
cifs_sb->mnt_cifs_flags & CIFS_MOUNT_MAP_SPECIAL_CHR);
|
2007-06-06 02:30:44 +08:00
|
|
|
}
|
2005-04-17 06:20:36 +08:00
|
|
|
if (rc) {
|
2006-06-01 02:05:34 +08:00
|
|
|
cFYI(1, ("cifs_create returned 0x%x", rc));
|
2005-04-17 06:20:36 +08:00
|
|
|
} else {
|
|
|
|
/* If Open reported that we actually created a file
|
|
|
|
then we now have to set the mode if possible */
|
2007-07-19 07:21:09 +08:00
|
|
|
if ((pTcon->unix_ext) && (oplock & CIFS_CREATE_ACTION)) {
|
2008-08-02 19:26:12 +08:00
|
|
|
struct cifs_unix_set_info_args args = {
|
|
|
|
.mode = mode,
|
|
|
|
.ctime = NO_CHANGE_64,
|
|
|
|
.atime = NO_CHANGE_64,
|
|
|
|
.mtime = NO_CHANGE_64,
|
|
|
|
.device = 0,
|
|
|
|
};
|
|
|
|
|
2007-06-06 02:30:44 +08:00
|
|
|
if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_SET_UID) {
|
2008-08-02 19:26:12 +08:00
|
|
|
args.uid = (__u64) current->fsuid;
|
2008-08-06 12:39:02 +08:00
|
|
|
if (inode->i_mode & S_ISGID)
|
|
|
|
args.gid = (__u64) inode->i_gid;
|
|
|
|
else
|
|
|
|
args.gid = (__u64) current->fsgid;
|
2005-04-17 06:20:36 +08:00
|
|
|
} else {
|
2008-08-02 19:26:12 +08:00
|
|
|
args.uid = NO_CHANGE_64;
|
|
|
|
args.gid = NO_CHANGE_64;
|
2005-04-17 06:20:36 +08:00
|
|
|
}
|
2008-08-02 19:26:12 +08:00
|
|
|
CIFSSMBUnixSetInfo(xid, pTcon, full_path, &args,
|
|
|
|
cifs_sb->local_nls,
|
|
|
|
cifs_sb->mnt_cifs_flags &
|
|
|
|
CIFS_MOUNT_MAP_SPECIAL_CHR);
|
2007-06-08 22:55:14 +08:00
|
|
|
} else {
|
2007-06-06 02:30:44 +08:00
|
|
|
/* BB implement mode setting via Windows security
|
|
|
|
descriptors e.g. */
|
|
|
|
/* CIFSSMBWinSetPerms(xid,pTcon,path,mode,-1,-1,nls);*/
|
|
|
|
|
|
|
|
/* Could set r/o dos attribute if mode & 0222 == 0 */
|
2005-04-17 06:20:36 +08:00
|
|
|
}
|
|
|
|
|
2007-07-19 07:21:09 +08:00
|
|
|
/* server might mask mode so we have to query for it */
|
|
|
|
if (pTcon->unix_ext)
|
2005-04-17 06:20:36 +08:00
|
|
|
rc = cifs_get_inode_info_unix(&newinode, full_path,
|
2007-06-06 02:30:44 +08:00
|
|
|
inode->i_sb, xid);
|
2005-04-17 06:20:36 +08:00
|
|
|
else {
|
|
|
|
rc = cifs_get_inode_info(&newinode, full_path,
|
2008-03-15 06:37:16 +08:00
|
|
|
buf, inode->i_sb, xid,
|
|
|
|
&fileHandle);
|
2007-06-06 02:30:44 +08:00
|
|
|
if (newinode) {
|
when creating new inodes, use file_mode/dir_mode exclusively on mount without unix extensions
When CIFS creates a new inode on a mount without unix extensions, it
temporarily assigns the mode that was passed to it in the create/mkdir
call. Eventually, when the inode is revalidated, it changes to have the
file_mode or dir_mode for the mount. This is confusing to users who
expect that the mode shouldn't change this way. It's also problematic
since only the mode is treated this way, not the uid or gid. Suppose you
have a CIFS mount that's mounted with:
uid=0,gid=0,file_mode=0666,dir_mode=0777
...if an unprivileged user comes along and does this on the mount:
mkdir -m 0700 foo
touch foo/bar
...there is a period of time where the touch will fail, since the dir
will initially be owned by root and have mode 0700. If the user waits
long enough, then "foo" will be revalidated and will get the correct
dir_mode permissions.
This patch changes cifs_mkdir and cifs_create to not overwrite the
mode found by the initial cifs_get_inode_info call after the inode is
created on the server. Legacy behavior can be reenabled with the
new "dynperm" mount option.
Signed-off-by: Jeff Layton <jlayton@redhat.com>
Signed-off-by: Steve French <sfrench@us.ibm.com>
2008-05-22 21:33:34 +08:00
|
|
|
if (cifs_sb->mnt_cifs_flags &
|
|
|
|
CIFS_MOUNT_DYNPERM)
|
|
|
|
newinode->i_mode = mode;
|
2007-06-06 02:30:44 +08:00
|
|
|
if ((oplock & CIFS_CREATE_ACTION) &&
|
|
|
|
(cifs_sb->mnt_cifs_flags &
|
2005-11-30 12:20:10 +08:00
|
|
|
CIFS_MOUNT_SET_UID)) {
|
|
|
|
newinode->i_uid = current->fsuid;
|
2008-08-06 12:39:02 +08:00
|
|
|
if (inode->i_mode & S_ISGID)
|
|
|
|
newinode->i_gid =
|
|
|
|
inode->i_gid;
|
|
|
|
else
|
|
|
|
newinode->i_gid =
|
|
|
|
current->fsgid;
|
2005-11-30 12:20:10 +08:00
|
|
|
}
|
|
|
|
}
|
2005-04-17 06:20:36 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
if (rc != 0) {
|
2005-08-13 23:15:54 +08:00
|
|
|
cFYI(1,
|
|
|
|
("Create worked but get_inode_info failed rc = %d",
|
2005-04-17 06:20:36 +08:00
|
|
|
rc));
|
|
|
|
} else {
|
2005-08-23 11:09:43 +08:00
|
|
|
if (pTcon->nocase)
|
|
|
|
direntry->d_op = &cifs_ci_dentry_ops;
|
|
|
|
else
|
|
|
|
direntry->d_op = &cifs_dentry_ops;
|
2005-04-17 06:20:36 +08:00
|
|
|
d_instantiate(direntry, newinode);
|
|
|
|
}
|
2007-07-12 02:30:34 +08:00
|
|
|
if ((nd == NULL /* nfsd case - nfs srv does not set nd */) ||
|
2008-04-29 08:06:05 +08:00
|
|
|
(!(nd->flags & LOOKUP_OPEN))) {
|
2005-04-17 06:20:36 +08:00
|
|
|
/* mknod case - do not leave file open */
|
|
|
|
CIFSSMBClose(xid, pTcon, fileHandle);
|
2007-06-06 02:30:44 +08:00
|
|
|
} else if (newinode) {
|
2005-04-29 13:41:05 +08:00
|
|
|
pCifsFile =
|
2007-09-29 13:21:58 +08:00
|
|
|
kzalloc(sizeof(struct cifsFileInfo), GFP_KERNEL);
|
2007-06-06 04:35:06 +08:00
|
|
|
|
2007-06-06 02:30:44 +08:00
|
|
|
if (pCifsFile == NULL)
|
2005-04-29 13:41:05 +08:00
|
|
|
goto cifs_create_out;
|
|
|
|
pCifsFile->netfid = fileHandle;
|
|
|
|
pCifsFile->pid = current->tgid;
|
|
|
|
pCifsFile->pInode = newinode;
|
2008-04-29 08:06:05 +08:00
|
|
|
pCifsFile->invalidHandle = false;
|
|
|
|
pCifsFile->closePend = false;
|
2005-04-29 13:41:05 +08:00
|
|
|
init_MUTEX(&pCifsFile->fh_sem);
|
2007-05-03 12:33:45 +08:00
|
|
|
mutex_init(&pCifsFile->lock_mutex);
|
2006-08-15 21:07:18 +08:00
|
|
|
INIT_LIST_HEAD(&pCifsFile->llist);
|
2007-06-06 02:30:44 +08:00
|
|
|
atomic_set(&pCifsFile->wrtPending, 0);
|
2006-08-15 21:07:18 +08:00
|
|
|
|
2007-06-06 02:30:44 +08:00
|
|
|
/* set the following in open now
|
2005-04-29 13:41:05 +08:00
|
|
|
pCifsFile->pfile = file; */
|
|
|
|
write_lock(&GlobalSMBSeslock);
|
2007-06-06 02:30:44 +08:00
|
|
|
list_add(&pCifsFile->tlist, &pTcon->openFileList);
|
2005-04-29 13:41:05 +08:00
|
|
|
pCifsInode = CIFS_I(newinode);
|
2007-06-06 02:30:44 +08:00
|
|
|
if (pCifsInode) {
|
2005-04-17 06:20:36 +08:00
|
|
|
/* if readable file instance put first in list*/
|
2008-04-29 08:06:05 +08:00
|
|
|
if (write_only) {
|
2007-06-06 02:30:44 +08:00
|
|
|
list_add_tail(&pCifsFile->flist,
|
2005-04-29 13:41:05 +08:00
|
|
|
&pCifsInode->openFileList);
|
|
|
|
} else {
|
|
|
|
list_add(&pCifsFile->flist,
|
|
|
|
&pCifsInode->openFileList);
|
2005-04-17 06:20:36 +08:00
|
|
|
}
|
2007-06-06 02:30:44 +08:00
|
|
|
if ((oplock & 0xF) == OPLOCK_EXCLUSIVE) {
|
2008-04-29 08:06:05 +08:00
|
|
|
pCifsInode->clientCanCacheAll = true;
|
|
|
|
pCifsInode->clientCanCacheRead = true;
|
2007-06-06 04:35:06 +08:00
|
|
|
cFYI(1, ("Exclusive Oplock inode %p",
|
2005-04-29 13:41:05 +08:00
|
|
|
newinode));
|
2007-06-06 02:30:44 +08:00
|
|
|
} else if ((oplock & 0xF) == OPLOCK_READ)
|
2008-04-29 08:06:05 +08:00
|
|
|
pCifsInode->clientCanCacheRead = true;
|
2005-04-17 06:20:36 +08:00
|
|
|
}
|
2005-04-29 13:41:05 +08:00
|
|
|
write_unlock(&GlobalSMBSeslock);
|
2005-04-17 06:20:36 +08:00
|
|
|
}
|
2007-06-06 02:30:44 +08:00
|
|
|
}
|
2005-04-29 13:41:05 +08:00
|
|
|
cifs_create_out:
|
|
|
|
kfree(buf);
|
|
|
|
kfree(full_path);
|
2005-04-17 06:20:36 +08:00
|
|
|
FreeXid(xid);
|
|
|
|
return rc;
|
|
|
|
}
|
|
|
|
|
2007-06-06 02:30:44 +08:00
|
|
|
int cifs_mknod(struct inode *inode, struct dentry *direntry, int mode,
|
|
|
|
dev_t device_number)
|
2005-04-17 06:20:36 +08:00
|
|
|
{
|
|
|
|
int rc = -EPERM;
|
|
|
|
int xid;
|
|
|
|
struct cifs_sb_info *cifs_sb;
|
|
|
|
struct cifsTconInfo *pTcon;
|
|
|
|
char *full_path = NULL;
|
2007-07-10 09:16:18 +08:00
|
|
|
struct inode *newinode = NULL;
|
2005-04-17 06:20:36 +08:00
|
|
|
|
|
|
|
if (!old_valid_dev(device_number))
|
|
|
|
return -EINVAL;
|
|
|
|
|
|
|
|
xid = GetXid();
|
|
|
|
|
|
|
|
cifs_sb = CIFS_SB(inode->i_sb);
|
|
|
|
pTcon = cifs_sb->tcon;
|
|
|
|
|
|
|
|
full_path = build_path_from_dentry(direntry);
|
2007-06-06 02:30:44 +08:00
|
|
|
if (full_path == NULL)
|
2005-04-17 06:20:36 +08:00
|
|
|
rc = -ENOMEM;
|
2007-07-19 07:21:09 +08:00
|
|
|
else if (pTcon->unix_ext) {
|
2008-08-02 19:26:12 +08:00
|
|
|
struct cifs_unix_set_info_args args = {
|
|
|
|
.mode = mode & ~current->fs->umask,
|
|
|
|
.ctime = NO_CHANGE_64,
|
|
|
|
.atime = NO_CHANGE_64,
|
|
|
|
.mtime = NO_CHANGE_64,
|
|
|
|
.device = device_number,
|
|
|
|
};
|
2007-06-06 02:30:44 +08:00
|
|
|
if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_SET_UID) {
|
2008-08-02 19:26:12 +08:00
|
|
|
args.uid = (__u64) current->fsuid;
|
|
|
|
args.gid = (__u64) current->fsgid;
|
2005-04-17 06:20:36 +08:00
|
|
|
} else {
|
2008-08-02 19:26:12 +08:00
|
|
|
args.uid = NO_CHANGE_64;
|
|
|
|
args.gid = NO_CHANGE_64;
|
2005-04-17 06:20:36 +08:00
|
|
|
}
|
2008-08-02 19:26:12 +08:00
|
|
|
rc = CIFSSMBUnixSetInfo(xid, pTcon, full_path,
|
|
|
|
&args, cifs_sb->local_nls,
|
|
|
|
cifs_sb->mnt_cifs_flags &
|
|
|
|
CIFS_MOUNT_MAP_SPECIAL_CHR);
|
2005-04-17 06:20:36 +08:00
|
|
|
|
2007-06-06 02:30:44 +08:00
|
|
|
if (!rc) {
|
2005-04-17 06:20:36 +08:00
|
|
|
rc = cifs_get_inode_info_unix(&newinode, full_path,
|
2007-06-06 02:30:44 +08:00
|
|
|
inode->i_sb, xid);
|
2005-08-23 11:09:43 +08:00
|
|
|
if (pTcon->nocase)
|
|
|
|
direntry->d_op = &cifs_ci_dentry_ops;
|
|
|
|
else
|
|
|
|
direntry->d_op = &cifs_dentry_ops;
|
2007-06-06 02:30:44 +08:00
|
|
|
if (rc == 0)
|
2005-04-17 06:20:36 +08:00
|
|
|
d_instantiate(direntry, newinode);
|
|
|
|
}
|
2005-07-15 07:25:12 +08:00
|
|
|
} else {
|
2007-06-06 02:30:44 +08:00
|
|
|
if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_UNX_EMUL) {
|
2005-07-22 06:20:28 +08:00
|
|
|
int oplock = 0;
|
|
|
|
u16 fileHandle;
|
2008-02-08 07:25:02 +08:00
|
|
|
FILE_ALL_INFO *buf;
|
2005-07-15 07:25:12 +08:00
|
|
|
|
2007-06-06 02:30:44 +08:00
|
|
|
cFYI(1, ("sfu compat create special file"));
|
2005-07-15 07:25:12 +08:00
|
|
|
|
2007-06-06 02:30:44 +08:00
|
|
|
buf = kmalloc(sizeof(FILE_ALL_INFO), GFP_KERNEL);
|
|
|
|
if (buf == NULL) {
|
2005-07-22 06:20:28 +08:00
|
|
|
kfree(full_path);
|
|
|
|
FreeXid(xid);
|
|
|
|
return -ENOMEM;
|
|
|
|
}
|
|
|
|
|
|
|
|
rc = CIFSSMBOpen(xid, pTcon, full_path,
|
|
|
|
FILE_CREATE, /* fail if exists */
|
2007-06-06 02:30:44 +08:00
|
|
|
GENERIC_WRITE /* BB would
|
2005-07-22 06:20:28 +08:00
|
|
|
WRITE_OWNER | WRITE_DAC be better? */,
|
|
|
|
/* Create a file and set the
|
|
|
|
file attribute to SYSTEM */
|
|
|
|
CREATE_NOT_DIR | CREATE_OPTION_SPECIAL,
|
|
|
|
&fileHandle, &oplock, buf,
|
|
|
|
cifs_sb->local_nls,
|
2007-06-06 02:30:44 +08:00
|
|
|
cifs_sb->mnt_cifs_flags &
|
2005-07-22 06:20:28 +08:00
|
|
|
CIFS_MOUNT_MAP_SPECIAL_CHR);
|
|
|
|
|
2006-06-07 08:18:43 +08:00
|
|
|
/* BB FIXME - add handling for backlevel servers
|
|
|
|
which need legacy open and check for all
|
2007-06-06 02:30:44 +08:00
|
|
|
calls to SMBOpen for fallback to SMBLeagcyOpen */
|
|
|
|
if (!rc) {
|
2005-07-22 06:20:28 +08:00
|
|
|
/* BB Do not bother to decode buf since no
|
2005-11-19 12:25:31 +08:00
|
|
|
local inode yet to put timestamps in,
|
|
|
|
but we can reuse it safely */
|
2007-08-31 09:10:17 +08:00
|
|
|
unsigned int bytes_written;
|
2005-11-19 12:25:31 +08:00
|
|
|
struct win_dev *pdev;
|
|
|
|
pdev = (struct win_dev *)buf;
|
2007-06-06 02:30:44 +08:00
|
|
|
if (S_ISCHR(mode)) {
|
2005-11-19 12:25:31 +08:00
|
|
|
memcpy(pdev->type, "IntxCHR", 8);
|
|
|
|
pdev->major =
|
|
|
|
cpu_to_le64(MAJOR(device_number));
|
2007-06-06 02:30:44 +08:00
|
|
|
pdev->minor =
|
2005-11-19 12:25:31 +08:00
|
|
|
cpu_to_le64(MINOR(device_number));
|
|
|
|
rc = CIFSSMBWrite(xid, pTcon,
|
|
|
|
fileHandle,
|
|
|
|
sizeof(struct win_dev),
|
|
|
|
0, &bytes_written, (char *)pdev,
|
|
|
|
NULL, 0);
|
2007-06-06 02:30:44 +08:00
|
|
|
} else if (S_ISBLK(mode)) {
|
2005-11-19 12:25:31 +08:00
|
|
|
memcpy(pdev->type, "IntxBLK", 8);
|
|
|
|
pdev->major =
|
|
|
|
cpu_to_le64(MAJOR(device_number));
|
|
|
|
pdev->minor =
|
|
|
|
cpu_to_le64(MINOR(device_number));
|
|
|
|
rc = CIFSSMBWrite(xid, pTcon,
|
|
|
|
fileHandle,
|
|
|
|
sizeof(struct win_dev),
|
|
|
|
0, &bytes_written, (char *)pdev,
|
|
|
|
NULL, 0);
|
|
|
|
} /* else if(S_ISFIFO */
|
2005-07-22 06:20:28 +08:00
|
|
|
CIFSSMBClose(xid, pTcon, fileHandle);
|
|
|
|
d_drop(direntry);
|
|
|
|
}
|
|
|
|
kfree(buf);
|
2005-07-15 07:25:12 +08:00
|
|
|
/* add code here to set EAs */
|
|
|
|
}
|
2005-04-17 06:20:36 +08:00
|
|
|
}
|
|
|
|
|
2005-04-29 13:41:05 +08:00
|
|
|
kfree(full_path);
|
2005-04-17 06:20:36 +08:00
|
|
|
FreeXid(xid);
|
|
|
|
return rc;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
struct dentry *
|
2007-06-06 02:30:44 +08:00
|
|
|
cifs_lookup(struct inode *parent_dir_inode, struct dentry *direntry,
|
|
|
|
struct nameidata *nd)
|
2005-04-17 06:20:36 +08:00
|
|
|
{
|
|
|
|
int xid;
|
|
|
|
int rc = 0; /* to get around spurious gcc warning, set to zero here */
|
|
|
|
struct cifs_sb_info *cifs_sb;
|
|
|
|
struct cifsTconInfo *pTcon;
|
|
|
|
struct inode *newInode = NULL;
|
|
|
|
char *full_path = NULL;
|
|
|
|
|
|
|
|
xid = GetXid();
|
|
|
|
|
2007-09-29 13:21:58 +08:00
|
|
|
cFYI(1, (" parent inode = 0x%p name is: %s and dentry = 0x%p",
|
2005-04-17 06:20:36 +08:00
|
|
|
parent_dir_inode, direntry->d_name.name, direntry));
|
|
|
|
|
|
|
|
/* check whether path exists */
|
|
|
|
|
|
|
|
cifs_sb = CIFS_SB(parent_dir_inode->i_sb);
|
|
|
|
pTcon = cifs_sb->tcon;
|
|
|
|
|
2006-04-22 02:18:37 +08:00
|
|
|
/*
|
|
|
|
* Don't allow the separator character in a path component.
|
|
|
|
* The VFS will not allow "/", but "\" is allowed by posix.
|
|
|
|
*/
|
|
|
|
if (!(cifs_sb->mnt_cifs_flags & CIFS_MOUNT_POSIX_PATHS)) {
|
|
|
|
int i;
|
|
|
|
for (i = 0; i < direntry->d_name.len; i++)
|
|
|
|
if (direntry->d_name.name[i] == '\\') {
|
|
|
|
cFYI(1, ("Invalid file name"));
|
|
|
|
FreeXid(xid);
|
|
|
|
return ERR_PTR(-EINVAL);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2005-04-17 06:20:36 +08:00
|
|
|
/* can not grab the rename sem here since it would
|
|
|
|
deadlock in the cases (beginning of sys_rename itself)
|
|
|
|
in which we already have the sb rename sem */
|
|
|
|
full_path = build_path_from_dentry(direntry);
|
2007-06-06 02:30:44 +08:00
|
|
|
if (full_path == NULL) {
|
2005-04-17 06:20:36 +08:00
|
|
|
FreeXid(xid);
|
|
|
|
return ERR_PTR(-ENOMEM);
|
|
|
|
}
|
|
|
|
|
|
|
|
if (direntry->d_inode != NULL) {
|
|
|
|
cFYI(1, (" non-NULL inode in lookup"));
|
|
|
|
} else {
|
|
|
|
cFYI(1, (" NULL inode in lookup"));
|
|
|
|
}
|
|
|
|
cFYI(1,
|
|
|
|
(" Full path: %s inode = 0x%p", full_path, direntry->d_inode));
|
|
|
|
|
2007-07-19 07:21:09 +08:00
|
|
|
if (pTcon->unix_ext)
|
2005-04-17 06:20:36 +08:00
|
|
|
rc = cifs_get_inode_info_unix(&newInode, full_path,
|
2007-06-06 02:30:44 +08:00
|
|
|
parent_dir_inode->i_sb, xid);
|
2005-04-17 06:20:36 +08:00
|
|
|
else
|
|
|
|
rc = cifs_get_inode_info(&newInode, full_path, NULL,
|
2008-03-15 06:37:16 +08:00
|
|
|
parent_dir_inode->i_sb, xid, NULL);
|
2005-04-17 06:20:36 +08:00
|
|
|
|
|
|
|
if ((rc == 0) && (newInode != NULL)) {
|
2005-08-23 11:09:43 +08:00
|
|
|
if (pTcon->nocase)
|
|
|
|
direntry->d_op = &cifs_ci_dentry_ops;
|
|
|
|
else
|
|
|
|
direntry->d_op = &cifs_dentry_ops;
|
2005-04-17 06:20:36 +08:00
|
|
|
d_add(direntry, newInode);
|
|
|
|
|
2007-06-06 02:30:44 +08:00
|
|
|
/* since paths are not looked up by component - the parent
|
2005-11-29 00:16:13 +08:00
|
|
|
directories are presumed to be good here */
|
2005-04-17 06:20:36 +08:00
|
|
|
renew_parental_timestamps(direntry);
|
|
|
|
|
|
|
|
} else if (rc == -ENOENT) {
|
|
|
|
rc = 0;
|
2005-11-29 00:16:13 +08:00
|
|
|
direntry->d_time = jiffies;
|
|
|
|
if (pTcon->nocase)
|
|
|
|
direntry->d_op = &cifs_ci_dentry_ops;
|
|
|
|
else
|
|
|
|
direntry->d_op = &cifs_dentry_ops;
|
2005-04-17 06:20:36 +08:00
|
|
|
d_add(direntry, NULL);
|
2007-06-06 02:30:44 +08:00
|
|
|
/* if it was once a directory (but how can we tell?) we could do
|
|
|
|
shrink_dcache_parent(direntry); */
|
2008-01-20 08:30:29 +08:00
|
|
|
} else if (rc != -EACCES) {
|
|
|
|
cERROR(1, ("Unexpected lookup error %d", rc));
|
|
|
|
/* We special case check for Access Denied - since that
|
|
|
|
is a common return code */
|
2005-04-17 06:20:36 +08:00
|
|
|
}
|
|
|
|
|
2005-04-29 13:41:05 +08:00
|
|
|
kfree(full_path);
|
2005-04-17 06:20:36 +08:00
|
|
|
FreeXid(xid);
|
|
|
|
return ERR_PTR(rc);
|
|
|
|
}
|
|
|
|
|
|
|
|
static int
|
|
|
|
cifs_d_revalidate(struct dentry *direntry, struct nameidata *nd)
|
|
|
|
{
|
|
|
|
int isValid = 1;
|
|
|
|
|
|
|
|
if (direntry->d_inode) {
|
2008-02-08 07:25:02 +08:00
|
|
|
if (cifs_revalidate(direntry))
|
2005-04-17 06:20:36 +08:00
|
|
|
return 0;
|
|
|
|
} else {
|
2005-11-29 00:16:13 +08:00
|
|
|
cFYI(1, ("neg dentry 0x%p name = %s",
|
|
|
|
direntry, direntry->d_name.name));
|
2007-06-06 02:30:44 +08:00
|
|
|
if (time_after(jiffies, direntry->d_time + HZ) ||
|
2005-11-29 00:16:13 +08:00
|
|
|
!lookupCacheEnabled) {
|
|
|
|
d_drop(direntry);
|
|
|
|
isValid = 0;
|
2007-06-06 02:30:44 +08:00
|
|
|
}
|
2005-04-17 06:20:36 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
return isValid;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* static int cifs_d_delete(struct dentry *direntry)
|
|
|
|
{
|
|
|
|
int rc = 0;
|
|
|
|
|
|
|
|
cFYI(1, ("In cifs d_delete, name = %s", direntry->d_name.name));
|
|
|
|
|
|
|
|
return rc;
|
|
|
|
} */
|
|
|
|
|
|
|
|
struct dentry_operations cifs_dentry_ops = {
|
|
|
|
.d_revalidate = cifs_d_revalidate,
|
2007-06-06 02:30:44 +08:00
|
|
|
/* d_delete: cifs_d_delete, */ /* not needed except for debugging */
|
2005-04-17 06:20:36 +08:00
|
|
|
};
|
2005-08-23 11:09:43 +08:00
|
|
|
|
|
|
|
static int cifs_ci_hash(struct dentry *dentry, struct qstr *q)
|
|
|
|
{
|
|
|
|
struct nls_table *codepage = CIFS_SB(dentry->d_inode->i_sb)->local_nls;
|
|
|
|
unsigned long hash;
|
|
|
|
int i;
|
|
|
|
|
|
|
|
hash = init_name_hash();
|
|
|
|
for (i = 0; i < q->len; i++)
|
|
|
|
hash = partial_name_hash(nls_tolower(codepage, q->name[i]),
|
|
|
|
hash);
|
|
|
|
q->hash = end_name_hash(hash);
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int cifs_ci_compare(struct dentry *dentry, struct qstr *a,
|
|
|
|
struct qstr *b)
|
|
|
|
{
|
|
|
|
struct nls_table *codepage = CIFS_SB(dentry->d_inode->i_sb)->local_nls;
|
|
|
|
|
|
|
|
if ((a->len == b->len) &&
|
|
|
|
(nls_strnicmp(codepage, a->name, b->name, a->len) == 0)) {
|
|
|
|
/*
|
|
|
|
* To preserve case, don't let an existing negative dentry's
|
|
|
|
* case take precedence. If a is not a negative dentry, this
|
|
|
|
* should have no side effects
|
|
|
|
*/
|
2008-05-15 13:41:54 +08:00
|
|
|
memcpy((void *)a->name, b->name, a->len);
|
2005-08-23 11:09:43 +08:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
|
|
|
struct dentry_operations cifs_ci_dentry_ops = {
|
|
|
|
.d_revalidate = cifs_d_revalidate,
|
|
|
|
.d_hash = cifs_ci_hash,
|
|
|
|
.d_compare = cifs_ci_compare,
|
|
|
|
};
|