Commit | Line | Data |
---|---|---|
1da177e4 LT |
1 | /* |
2 | * fs/cifs/dir.c | |
3 | * | |
4 | * vfs operations that deal with dentries | |
5fdae1f6 | 5 | * |
ad7a2926 | 6 | * Copyright (C) International Business Machines Corp., 2002,2008 |
1da177e4 LT |
7 | * Author(s): Steve French (sfrench@us.ibm.com) |
8 | * | |
9 | * This library is free software; you can redistribute it and/or modify | |
10 | * it under the terms of the GNU Lesser General Public License as published | |
11 | * by the Free Software Foundation; either version 2.1 of the License, or | |
12 | * (at your option) any later version. | |
13 | * | |
14 | * This library is distributed in the hope that it will be useful, | |
15 | * but WITHOUT ANY WARRANTY; without even the implied warranty of | |
16 | * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See | |
17 | * the GNU Lesser General Public License for more details. | |
18 | * | |
19 | * You should have received a copy of the GNU Lesser General Public License | |
20 | * along with this library; if not, write to the Free Software | |
21 | * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA | |
22 | */ | |
23 | #include <linux/fs.h> | |
24 | #include <linux/stat.h> | |
25 | #include <linux/slab.h> | |
26 | #include <linux/namei.h> | |
27 | #include "cifsfs.h" | |
28 | #include "cifspdu.h" | |
29 | #include "cifsglob.h" | |
30 | #include "cifsproto.h" | |
31 | #include "cifs_debug.h" | |
32 | #include "cifs_fs_sb.h" | |
33 | ||
99ee4dbd | 34 | static void |
1da177e4 LT |
35 | renew_parental_timestamps(struct dentry *direntry) |
36 | { | |
5fdae1f6 SF |
37 | /* BB check if there is a way to get the kernel to do this or if we |
38 | really need this */ | |
1da177e4 LT |
39 | do { |
40 | direntry->d_time = jiffies; | |
41 | direntry = direntry->d_parent; | |
5fdae1f6 | 42 | } while (!IS_ROOT(direntry)); |
1da177e4 LT |
43 | } |
44 | ||
45 | /* Note: caller must free return buffer */ | |
46 | char * | |
47 | build_path_from_dentry(struct dentry *direntry) | |
48 | { | |
49 | struct dentry *temp; | |
2fe87f02 SF |
50 | int namelen; |
51 | int pplen; | |
1da177e4 | 52 | char *full_path; |
88274815 | 53 | char dirsep; |
1da177e4 | 54 | |
5fdae1f6 | 55 | if (direntry == NULL) |
1da177e4 LT |
56 | return NULL; /* not much we can do if dentry is freed and |
57 | we need to reopen the file after it was closed implicitly | |
58 | when the server crashed */ | |
59 | ||
88274815 | 60 | dirsep = CIFS_DIR_SEP(CIFS_SB(direntry->d_sb)); |
2fe87f02 | 61 | pplen = CIFS_SB(direntry->d_sb)->prepathlen; |
1da177e4 | 62 | cifs_bp_rename_retry: |
5fdae1f6 | 63 | namelen = pplen; |
1da177e4 LT |
64 | for (temp = direntry; !IS_ROOT(temp);) { |
65 | namelen += (1 + temp->d_name.len); | |
66 | temp = temp->d_parent; | |
5fdae1f6 SF |
67 | if (temp == NULL) { |
68 | cERROR(1, ("corrupt dentry")); | |
1da177e4 LT |
69 | return NULL; |
70 | } | |
71 | } | |
72 | ||
73 | full_path = kmalloc(namelen+1, GFP_KERNEL); | |
5fdae1f6 | 74 | if (full_path == NULL) |
1da177e4 LT |
75 | return full_path; |
76 | full_path[namelen] = 0; /* trailing null */ | |
1da177e4 LT |
77 | for (temp = direntry; !IS_ROOT(temp);) { |
78 | namelen -= 1 + temp->d_name.len; | |
79 | if (namelen < 0) { | |
80 | break; | |
81 | } else { | |
7f57356b | 82 | full_path[namelen] = dirsep; |
1da177e4 LT |
83 | strncpy(full_path + namelen + 1, temp->d_name.name, |
84 | temp->d_name.len); | |
2fe87f02 | 85 | cFYI(0, ("name: %s", full_path + namelen)); |
1da177e4 LT |
86 | } |
87 | temp = temp->d_parent; | |
5fdae1f6 SF |
88 | if (temp == NULL) { |
89 | cERROR(1, ("corrupt dentry")); | |
1da177e4 LT |
90 | kfree(full_path); |
91 | return NULL; | |
92 | } | |
93 | } | |
2fe87f02 | 94 | if (namelen != pplen) { |
1da177e4 | 95 | cERROR(1, |
2fe87f02 | 96 | ("did not end path lookup where expected namelen is %d", |
1da177e4 | 97 | namelen)); |
5fdae1f6 | 98 | /* presumably this is only possible if racing with a rename |
1da177e4 LT |
99 | of one of the parent directories (we can not lock the dentries |
100 | above us to prevent this, but retrying should be harmless) */ | |
101 | kfree(full_path); | |
1da177e4 LT |
102 | goto cifs_bp_rename_retry; |
103 | } | |
2fe87f02 SF |
104 | /* DIR_SEP already set for byte 0 / vs \ but not for |
105 | subsequent slashes in prepath which currently must | |
106 | be entered the right way - not sure if there is an alternative | |
107 | since the '\' is a valid posix character so we can not switch | |
108 | those safely to '/' if any are found in the middle of the prepath */ | |
109 | /* BB test paths to Windows with '/' in the midst of prepath */ | |
5fdae1f6 | 110 | strncpy(full_path, CIFS_SB(direntry->d_sb)->prepath, pplen); |
1da177e4 LT |
111 | return full_path; |
112 | } | |
113 | ||
3979877e | 114 | /* Inode operations in similar order to how they appear in Linux file fs.h */ |
1da177e4 LT |
115 | |
116 | int | |
117 | cifs_create(struct inode *inode, struct dentry *direntry, int mode, | |
118 | struct nameidata *nd) | |
119 | { | |
120 | int rc = -ENOENT; | |
121 | int xid; | |
67750fb9 | 122 | int create_options = CREATE_NOT_DIR; |
1da177e4 LT |
123 | int oplock = 0; |
124 | int desiredAccess = GENERIC_READ | GENERIC_WRITE; | |
125 | __u16 fileHandle; | |
126 | struct cifs_sb_info *cifs_sb; | |
127 | struct cifsTconInfo *pTcon; | |
128 | char *full_path = NULL; | |
fb8c4b14 | 129 | FILE_ALL_INFO *buf = NULL; |
1da177e4 | 130 | struct inode *newinode = NULL; |
fb8c4b14 SF |
131 | struct cifsFileInfo *pCifsFile = NULL; |
132 | struct cifsInodeInfo *pCifsInode; | |
1da177e4 | 133 | int disposition = FILE_OVERWRITE_IF; |
4b18f2a9 | 134 | bool write_only = false; |
1da177e4 LT |
135 | |
136 | xid = GetXid(); | |
137 | ||
138 | cifs_sb = CIFS_SB(inode->i_sb); | |
139 | pTcon = cifs_sb->tcon; | |
140 | ||
1da177e4 | 141 | full_path = build_path_from_dentry(direntry); |
5fdae1f6 | 142 | if (full_path == NULL) { |
1da177e4 LT |
143 | FreeXid(xid); |
144 | return -ENOMEM; | |
145 | } | |
146 | ||
5fdae1f6 | 147 | if (nd && (nd->flags & LOOKUP_OPEN)) { |
e08fc045 MS |
148 | int oflags = nd->intent.open.flags; |
149 | ||
150 | desiredAccess = 0; | |
151 | if (oflags & FMODE_READ) | |
152 | desiredAccess |= GENERIC_READ; | |
153 | if (oflags & FMODE_WRITE) { | |
154 | desiredAccess |= GENERIC_WRITE; | |
155 | if (!(oflags & FMODE_READ)) | |
4b18f2a9 | 156 | write_only = true; |
1da177e4 LT |
157 | } |
158 | ||
5fdae1f6 | 159 | if ((oflags & (O_CREAT | O_EXCL)) == (O_CREAT | O_EXCL)) |
1da177e4 | 160 | disposition = FILE_CREATE; |
5fdae1f6 | 161 | else if ((oflags & (O_CREAT | O_TRUNC)) == (O_CREAT | O_TRUNC)) |
1da177e4 | 162 | disposition = FILE_OVERWRITE_IF; |
5fdae1f6 | 163 | else if ((oflags & O_CREAT) == O_CREAT) |
1da177e4 | 164 | disposition = FILE_OPEN_IF; |
ad7a2926 | 165 | else |
5fdae1f6 | 166 | cFYI(1, ("Create flag not set in create function")); |
1da177e4 LT |
167 | } |
168 | ||
5fdae1f6 SF |
169 | /* BB add processing to set equivalent of mode - e.g. via CreateX with |
170 | ACLs */ | |
1da177e4 LT |
171 | if (oplockEnabled) |
172 | oplock = REQ_OPLOCK; | |
173 | ||
5fdae1f6 SF |
174 | buf = kmalloc(sizeof(FILE_ALL_INFO), GFP_KERNEL); |
175 | if (buf == NULL) { | |
1da177e4 LT |
176 | kfree(full_path); |
177 | FreeXid(xid); | |
178 | return -ENOMEM; | |
179 | } | |
67750fb9 JL |
180 | |
181 | mode &= ~current->fs->umask; | |
182 | ||
183 | /* | |
184 | * if we're not using unix extensions, see if we need to set | |
185 | * ATTR_READONLY on the create call | |
186 | */ | |
187 | if (!pTcon->unix_ext && (mode & S_IWUGO) == 0) | |
188 | create_options |= CREATE_OPTION_READONLY; | |
189 | ||
5fdae1f6 | 190 | if (cifs_sb->tcon->ses->capabilities & CAP_NT_SMBS) |
5bafd765 | 191 | rc = CIFSSMBOpen(xid, pTcon, full_path, disposition, |
67750fb9 | 192 | desiredAccess, create_options, |
737b758c SF |
193 | &fileHandle, &oplock, buf, cifs_sb->local_nls, |
194 | cifs_sb->mnt_cifs_flags & CIFS_MOUNT_MAP_SPECIAL_CHR); | |
5bafd765 SF |
195 | else |
196 | rc = -EIO; /* no NT SMB support fall into legacy open below */ | |
197 | ||
5fdae1f6 | 198 | if (rc == -EIO) { |
a9d02ad4 SF |
199 | /* old server, retry the open legacy style */ |
200 | rc = SMBLegacyOpen(xid, pTcon, full_path, disposition, | |
67750fb9 | 201 | desiredAccess, create_options, |
a9d02ad4 SF |
202 | &fileHandle, &oplock, buf, cifs_sb->local_nls, |
203 | cifs_sb->mnt_cifs_flags & CIFS_MOUNT_MAP_SPECIAL_CHR); | |
5fdae1f6 | 204 | } |
1da177e4 | 205 | if (rc) { |
26a21b98 | 206 | cFYI(1, ("cifs_create returned 0x%x", rc)); |
1da177e4 LT |
207 | } else { |
208 | /* If Open reported that we actually created a file | |
209 | then we now have to set the mode if possible */ | |
c18c842b | 210 | if ((pTcon->unix_ext) && (oplock & CIFS_CREATE_ACTION)) { |
5fdae1f6 | 211 | if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_SET_UID) { |
1da177e4 | 212 | CIFSSMBUnixSetPerms(xid, pTcon, full_path, mode, |
83451879 SF |
213 | (__u64)current->fsuid, |
214 | (__u64)current->fsgid, | |
1da177e4 | 215 | 0 /* dev */, |
5fdae1f6 SF |
216 | cifs_sb->local_nls, |
217 | cifs_sb->mnt_cifs_flags & | |
737b758c | 218 | CIFS_MOUNT_MAP_SPECIAL_CHR); |
1da177e4 LT |
219 | } else { |
220 | CIFSSMBUnixSetPerms(xid, pTcon, full_path, mode, | |
221 | (__u64)-1, | |
222 | (__u64)-1, | |
223 | 0 /* dev */, | |
737b758c | 224 | cifs_sb->local_nls, |
5fdae1f6 | 225 | cifs_sb->mnt_cifs_flags & |
737b758c | 226 | CIFS_MOUNT_MAP_SPECIAL_CHR); |
1da177e4 | 227 | } |
3ce53fc4 | 228 | } else { |
5fdae1f6 SF |
229 | /* BB implement mode setting via Windows security |
230 | descriptors e.g. */ | |
231 | /* CIFSSMBWinSetPerms(xid,pTcon,path,mode,-1,-1,nls);*/ | |
232 | ||
233 | /* Could set r/o dos attribute if mode & 0222 == 0 */ | |
1da177e4 LT |
234 | } |
235 | ||
c18c842b SF |
236 | /* server might mask mode so we have to query for it */ |
237 | if (pTcon->unix_ext) | |
1da177e4 | 238 | rc = cifs_get_inode_info_unix(&newinode, full_path, |
5fdae1f6 | 239 | inode->i_sb, xid); |
1da177e4 LT |
240 | else { |
241 | rc = cifs_get_inode_info(&newinode, full_path, | |
8b1327f6 SF |
242 | buf, inode->i_sb, xid, |
243 | &fileHandle); | |
5fdae1f6 | 244 | if (newinode) { |
1da177e4 | 245 | newinode->i_mode = mode; |
5fdae1f6 SF |
246 | if ((oplock & CIFS_CREATE_ACTION) && |
247 | (cifs_sb->mnt_cifs_flags & | |
6473a559 SF |
248 | CIFS_MOUNT_SET_UID)) { |
249 | newinode->i_uid = current->fsuid; | |
250 | newinode->i_gid = current->fsgid; | |
251 | } | |
252 | } | |
1da177e4 LT |
253 | } |
254 | ||
255 | if (rc != 0) { | |
4a6d87f1 SF |
256 | cFYI(1, |
257 | ("Create worked but get_inode_info failed rc = %d", | |
1da177e4 LT |
258 | rc)); |
259 | } else { | |
b92327fe SF |
260 | if (pTcon->nocase) |
261 | direntry->d_op = &cifs_ci_dentry_ops; | |
262 | else | |
263 | direntry->d_op = &cifs_dentry_ops; | |
1da177e4 LT |
264 | d_instantiate(direntry, newinode); |
265 | } | |
7521a3c5 | 266 | if ((nd == NULL /* nfsd case - nfs srv does not set nd */) || |
4b18f2a9 | 267 | (!(nd->flags & LOOKUP_OPEN))) { |
1da177e4 LT |
268 | /* mknod case - do not leave file open */ |
269 | CIFSSMBClose(xid, pTcon, fileHandle); | |
5fdae1f6 | 270 | } else if (newinode) { |
d14537f1 | 271 | pCifsFile = |
92ad9b93 | 272 | kzalloc(sizeof(struct cifsFileInfo), GFP_KERNEL); |
221601c3 | 273 | |
5fdae1f6 | 274 | if (pCifsFile == NULL) |
d14537f1 | 275 | goto cifs_create_out; |
d14537f1 SF |
276 | pCifsFile->netfid = fileHandle; |
277 | pCifsFile->pid = current->tgid; | |
278 | pCifsFile->pInode = newinode; | |
4b18f2a9 SF |
279 | pCifsFile->invalidHandle = false; |
280 | pCifsFile->closePend = false; | |
d14537f1 | 281 | init_MUTEX(&pCifsFile->fh_sem); |
796e5661 | 282 | mutex_init(&pCifsFile->lock_mutex); |
e466e487 | 283 | INIT_LIST_HEAD(&pCifsFile->llist); |
5fdae1f6 | 284 | atomic_set(&pCifsFile->wrtPending, 0); |
e466e487 | 285 | |
5fdae1f6 | 286 | /* set the following in open now |
d14537f1 SF |
287 | pCifsFile->pfile = file; */ |
288 | write_lock(&GlobalSMBSeslock); | |
5fdae1f6 | 289 | list_add(&pCifsFile->tlist, &pTcon->openFileList); |
d14537f1 | 290 | pCifsInode = CIFS_I(newinode); |
5fdae1f6 | 291 | if (pCifsInode) { |
1da177e4 | 292 | /* if readable file instance put first in list*/ |
4b18f2a9 | 293 | if (write_only) { |
5fdae1f6 | 294 | list_add_tail(&pCifsFile->flist, |
d14537f1 SF |
295 | &pCifsInode->openFileList); |
296 | } else { | |
297 | list_add(&pCifsFile->flist, | |
298 | &pCifsInode->openFileList); | |
1da177e4 | 299 | } |
5fdae1f6 | 300 | if ((oplock & 0xF) == OPLOCK_EXCLUSIVE) { |
4b18f2a9 SF |
301 | pCifsInode->clientCanCacheAll = true; |
302 | pCifsInode->clientCanCacheRead = true; | |
221601c3 | 303 | cFYI(1, ("Exclusive Oplock inode %p", |
d14537f1 | 304 | newinode)); |
5fdae1f6 | 305 | } else if ((oplock & 0xF) == OPLOCK_READ) |
4b18f2a9 | 306 | pCifsInode->clientCanCacheRead = true; |
1da177e4 | 307 | } |
d14537f1 | 308 | write_unlock(&GlobalSMBSeslock); |
1da177e4 | 309 | } |
5fdae1f6 | 310 | } |
d14537f1 SF |
311 | cifs_create_out: |
312 | kfree(buf); | |
313 | kfree(full_path); | |
1da177e4 | 314 | FreeXid(xid); |
1da177e4 LT |
315 | return rc; |
316 | } | |
317 | ||
5fdae1f6 SF |
318 | int cifs_mknod(struct inode *inode, struct dentry *direntry, int mode, |
319 | dev_t device_number) | |
1da177e4 LT |
320 | { |
321 | int rc = -EPERM; | |
322 | int xid; | |
323 | struct cifs_sb_info *cifs_sb; | |
324 | struct cifsTconInfo *pTcon; | |
325 | char *full_path = NULL; | |
fb8c4b14 | 326 | struct inode *newinode = NULL; |
1da177e4 LT |
327 | |
328 | if (!old_valid_dev(device_number)) | |
329 | return -EINVAL; | |
330 | ||
331 | xid = GetXid(); | |
332 | ||
333 | cifs_sb = CIFS_SB(inode->i_sb); | |
334 | pTcon = cifs_sb->tcon; | |
335 | ||
1da177e4 | 336 | full_path = build_path_from_dentry(direntry); |
5fdae1f6 | 337 | if (full_path == NULL) |
1da177e4 | 338 | rc = -ENOMEM; |
c18c842b | 339 | else if (pTcon->unix_ext) { |
3ce53fc4 | 340 | mode &= ~current->fs->umask; |
5fdae1f6 | 341 | if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_SET_UID) { |
1da177e4 | 342 | rc = CIFSSMBUnixSetPerms(xid, pTcon, full_path, |
5fdae1f6 SF |
343 | mode, (__u64)current->fsuid, |
344 | (__u64)current->fsgid, | |
737b758c | 345 | device_number, cifs_sb->local_nls, |
5fdae1f6 | 346 | cifs_sb->mnt_cifs_flags & |
737b758c | 347 | CIFS_MOUNT_MAP_SPECIAL_CHR); |
1da177e4 LT |
348 | } else { |
349 | rc = CIFSSMBUnixSetPerms(xid, pTcon, | |
350 | full_path, mode, (__u64)-1, (__u64)-1, | |
737b758c | 351 | device_number, cifs_sb->local_nls, |
5fdae1f6 | 352 | cifs_sb->mnt_cifs_flags & |
737b758c | 353 | CIFS_MOUNT_MAP_SPECIAL_CHR); |
1da177e4 LT |
354 | } |
355 | ||
5fdae1f6 | 356 | if (!rc) { |
1da177e4 | 357 | rc = cifs_get_inode_info_unix(&newinode, full_path, |
5fdae1f6 | 358 | inode->i_sb, xid); |
b92327fe SF |
359 | if (pTcon->nocase) |
360 | direntry->d_op = &cifs_ci_dentry_ops; | |
361 | else | |
362 | direntry->d_op = &cifs_dentry_ops; | |
5fdae1f6 | 363 | if (rc == 0) |
1da177e4 LT |
364 | d_instantiate(direntry, newinode); |
365 | } | |
d7245c2c | 366 | } else { |
5fdae1f6 | 367 | if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_UNX_EMUL) { |
eda3c029 SF |
368 | int oplock = 0; |
369 | u16 fileHandle; | |
ad7a2926 | 370 | FILE_ALL_INFO *buf; |
d7245c2c | 371 | |
5fdae1f6 | 372 | cFYI(1, ("sfu compat create special file")); |
d7245c2c | 373 | |
5fdae1f6 SF |
374 | buf = kmalloc(sizeof(FILE_ALL_INFO), GFP_KERNEL); |
375 | if (buf == NULL) { | |
eda3c029 SF |
376 | kfree(full_path); |
377 | FreeXid(xid); | |
378 | return -ENOMEM; | |
379 | } | |
380 | ||
381 | rc = CIFSSMBOpen(xid, pTcon, full_path, | |
382 | FILE_CREATE, /* fail if exists */ | |
5fdae1f6 | 383 | GENERIC_WRITE /* BB would |
eda3c029 SF |
384 | WRITE_OWNER | WRITE_DAC be better? */, |
385 | /* Create a file and set the | |
386 | file attribute to SYSTEM */ | |
387 | CREATE_NOT_DIR | CREATE_OPTION_SPECIAL, | |
388 | &fileHandle, &oplock, buf, | |
389 | cifs_sb->local_nls, | |
5fdae1f6 | 390 | cifs_sb->mnt_cifs_flags & |
eda3c029 SF |
391 | CIFS_MOUNT_MAP_SPECIAL_CHR); |
392 | ||
5bafd765 SF |
393 | /* BB FIXME - add handling for backlevel servers |
394 | which need legacy open and check for all | |
5fdae1f6 SF |
395 | calls to SMBOpen for fallback to SMBLeagcyOpen */ |
396 | if (!rc) { | |
eda3c029 | 397 | /* BB Do not bother to decode buf since no |
86c96b4b SF |
398 | local inode yet to put timestamps in, |
399 | but we can reuse it safely */ | |
77159b4d | 400 | unsigned int bytes_written; |
86c96b4b SF |
401 | struct win_dev *pdev; |
402 | pdev = (struct win_dev *)buf; | |
5fdae1f6 | 403 | if (S_ISCHR(mode)) { |
86c96b4b SF |
404 | memcpy(pdev->type, "IntxCHR", 8); |
405 | pdev->major = | |
406 | cpu_to_le64(MAJOR(device_number)); | |
5fdae1f6 | 407 | pdev->minor = |
86c96b4b SF |
408 | cpu_to_le64(MINOR(device_number)); |
409 | rc = CIFSSMBWrite(xid, pTcon, | |
410 | fileHandle, | |
411 | sizeof(struct win_dev), | |
412 | 0, &bytes_written, (char *)pdev, | |
413 | NULL, 0); | |
5fdae1f6 | 414 | } else if (S_ISBLK(mode)) { |
86c96b4b SF |
415 | memcpy(pdev->type, "IntxBLK", 8); |
416 | pdev->major = | |
417 | cpu_to_le64(MAJOR(device_number)); | |
418 | pdev->minor = | |
419 | cpu_to_le64(MINOR(device_number)); | |
420 | rc = CIFSSMBWrite(xid, pTcon, | |
421 | fileHandle, | |
422 | sizeof(struct win_dev), | |
423 | 0, &bytes_written, (char *)pdev, | |
424 | NULL, 0); | |
425 | } /* else if(S_ISFIFO */ | |
eda3c029 SF |
426 | CIFSSMBClose(xid, pTcon, fileHandle); |
427 | d_drop(direntry); | |
428 | } | |
429 | kfree(buf); | |
d7245c2c SF |
430 | /* add code here to set EAs */ |
431 | } | |
1da177e4 LT |
432 | } |
433 | ||
d14537f1 | 434 | kfree(full_path); |
1da177e4 | 435 | FreeXid(xid); |
1da177e4 LT |
436 | return rc; |
437 | } | |
438 | ||
439 | ||
440 | struct dentry * | |
5fdae1f6 SF |
441 | cifs_lookup(struct inode *parent_dir_inode, struct dentry *direntry, |
442 | struct nameidata *nd) | |
1da177e4 LT |
443 | { |
444 | int xid; | |
445 | int rc = 0; /* to get around spurious gcc warning, set to zero here */ | |
446 | struct cifs_sb_info *cifs_sb; | |
447 | struct cifsTconInfo *pTcon; | |
448 | struct inode *newInode = NULL; | |
449 | char *full_path = NULL; | |
450 | ||
451 | xid = GetXid(); | |
452 | ||
92ad9b93 | 453 | cFYI(1, (" parent inode = 0x%p name is: %s and dentry = 0x%p", |
1da177e4 LT |
454 | parent_dir_inode, direntry->d_name.name, direntry)); |
455 | ||
1da177e4 LT |
456 | /* check whether path exists */ |
457 | ||
458 | cifs_sb = CIFS_SB(parent_dir_inode->i_sb); | |
459 | pTcon = cifs_sb->tcon; | |
460 | ||
296034f7 SF |
461 | /* |
462 | * Don't allow the separator character in a path component. | |
463 | * The VFS will not allow "/", but "\" is allowed by posix. | |
464 | */ | |
465 | if (!(cifs_sb->mnt_cifs_flags & CIFS_MOUNT_POSIX_PATHS)) { | |
466 | int i; | |
467 | for (i = 0; i < direntry->d_name.len; i++) | |
468 | if (direntry->d_name.name[i] == '\\') { | |
469 | cFYI(1, ("Invalid file name")); | |
470 | FreeXid(xid); | |
471 | return ERR_PTR(-EINVAL); | |
472 | } | |
473 | } | |
474 | ||
1da177e4 LT |
475 | /* can not grab the rename sem here since it would |
476 | deadlock in the cases (beginning of sys_rename itself) | |
477 | in which we already have the sb rename sem */ | |
478 | full_path = build_path_from_dentry(direntry); | |
5fdae1f6 | 479 | if (full_path == NULL) { |
1da177e4 LT |
480 | FreeXid(xid); |
481 | return ERR_PTR(-ENOMEM); | |
482 | } | |
483 | ||
484 | if (direntry->d_inode != NULL) { | |
485 | cFYI(1, (" non-NULL inode in lookup")); | |
486 | } else { | |
487 | cFYI(1, (" NULL inode in lookup")); | |
488 | } | |
489 | cFYI(1, | |
490 | (" Full path: %s inode = 0x%p", full_path, direntry->d_inode)); | |
491 | ||
c18c842b | 492 | if (pTcon->unix_ext) |
1da177e4 | 493 | rc = cifs_get_inode_info_unix(&newInode, full_path, |
5fdae1f6 | 494 | parent_dir_inode->i_sb, xid); |
1da177e4 LT |
495 | else |
496 | rc = cifs_get_inode_info(&newInode, full_path, NULL, | |
8b1327f6 | 497 | parent_dir_inode->i_sb, xid, NULL); |
1da177e4 LT |
498 | |
499 | if ((rc == 0) && (newInode != NULL)) { | |
b92327fe SF |
500 | if (pTcon->nocase) |
501 | direntry->d_op = &cifs_ci_dentry_ops; | |
502 | else | |
503 | direntry->d_op = &cifs_dentry_ops; | |
1da177e4 LT |
504 | d_add(direntry, newInode); |
505 | ||
5fdae1f6 | 506 | /* since paths are not looked up by component - the parent |
3abb9272 | 507 | directories are presumed to be good here */ |
1da177e4 LT |
508 | renew_parental_timestamps(direntry); |
509 | ||
510 | } else if (rc == -ENOENT) { | |
511 | rc = 0; | |
3abb9272 SF |
512 | direntry->d_time = jiffies; |
513 | if (pTcon->nocase) | |
514 | direntry->d_op = &cifs_ci_dentry_ops; | |
515 | else | |
516 | direntry->d_op = &cifs_dentry_ops; | |
1da177e4 | 517 | d_add(direntry, NULL); |
5fdae1f6 SF |
518 | /* if it was once a directory (but how can we tell?) we could do |
519 | shrink_dcache_parent(direntry); */ | |
ed2b9170 SF |
520 | } else if (rc != -EACCES) { |
521 | cERROR(1, ("Unexpected lookup error %d", rc)); | |
522 | /* We special case check for Access Denied - since that | |
523 | is a common return code */ | |
1da177e4 LT |
524 | } |
525 | ||
d14537f1 | 526 | kfree(full_path); |
1da177e4 LT |
527 | FreeXid(xid); |
528 | return ERR_PTR(rc); | |
529 | } | |
530 | ||
1da177e4 LT |
531 | static int |
532 | cifs_d_revalidate(struct dentry *direntry, struct nameidata *nd) | |
533 | { | |
534 | int isValid = 1; | |
535 | ||
1da177e4 | 536 | if (direntry->d_inode) { |
ad7a2926 | 537 | if (cifs_revalidate(direntry)) |
1da177e4 | 538 | return 0; |
1da177e4 | 539 | } else { |
3abb9272 SF |
540 | cFYI(1, ("neg dentry 0x%p name = %s", |
541 | direntry, direntry->d_name.name)); | |
5fdae1f6 | 542 | if (time_after(jiffies, direntry->d_time + HZ) || |
3abb9272 SF |
543 | !lookupCacheEnabled) { |
544 | d_drop(direntry); | |
545 | isValid = 0; | |
5fdae1f6 | 546 | } |
1da177e4 LT |
547 | } |
548 | ||
1da177e4 LT |
549 | return isValid; |
550 | } | |
551 | ||
552 | /* static int cifs_d_delete(struct dentry *direntry) | |
553 | { | |
554 | int rc = 0; | |
555 | ||
556 | cFYI(1, ("In cifs d_delete, name = %s", direntry->d_name.name)); | |
557 | ||
558 | return rc; | |
559 | } */ | |
560 | ||
561 | struct dentry_operations cifs_dentry_ops = { | |
562 | .d_revalidate = cifs_d_revalidate, | |
5fdae1f6 | 563 | /* d_delete: cifs_d_delete, */ /* not needed except for debugging */ |
1da177e4 | 564 | }; |
b92327fe SF |
565 | |
566 | static int cifs_ci_hash(struct dentry *dentry, struct qstr *q) | |
567 | { | |
568 | struct nls_table *codepage = CIFS_SB(dentry->d_inode->i_sb)->local_nls; | |
569 | unsigned long hash; | |
570 | int i; | |
571 | ||
572 | hash = init_name_hash(); | |
573 | for (i = 0; i < q->len; i++) | |
574 | hash = partial_name_hash(nls_tolower(codepage, q->name[i]), | |
575 | hash); | |
576 | q->hash = end_name_hash(hash); | |
577 | ||
578 | return 0; | |
579 | } | |
580 | ||
581 | static int cifs_ci_compare(struct dentry *dentry, struct qstr *a, | |
582 | struct qstr *b) | |
583 | { | |
584 | struct nls_table *codepage = CIFS_SB(dentry->d_inode->i_sb)->local_nls; | |
585 | ||
586 | if ((a->len == b->len) && | |
587 | (nls_strnicmp(codepage, a->name, b->name, a->len) == 0)) { | |
588 | /* | |
589 | * To preserve case, don't let an existing negative dentry's | |
590 | * case take precedence. If a is not a negative dentry, this | |
591 | * should have no side effects | |
592 | */ | |
44093ca2 | 593 | memcpy(a->name, b->name, a->len); |
b92327fe SF |
594 | return 0; |
595 | } | |
596 | return 1; | |
597 | } | |
598 | ||
599 | struct dentry_operations cifs_ci_dentry_ops = { | |
600 | .d_revalidate = cifs_d_revalidate, | |
601 | .d_hash = cifs_ci_hash, | |
602 | .d_compare = cifs_ci_compare, | |
603 | }; |