]>
Commit | Line | Data |
---|---|---|
929be906 | 1 | // SPDX-License-Identifier: LGPL-2.1 |
1da177e4 LT |
2 | /* |
3 | * fs/cifs/dir.c | |
4 | * | |
5 | * vfs operations that deal with dentries | |
5fdae1f6 | 6 | * |
c3b2a0c6 | 7 | * Copyright (C) International Business Machines Corp., 2002,2009 |
1da177e4 LT |
8 | * Author(s): Steve French ([email protected]) |
9 | * | |
1da177e4 LT |
10 | */ |
11 | #include <linux/fs.h> | |
12 | #include <linux/stat.h> | |
13 | #include <linux/slab.h> | |
14 | #include <linux/namei.h> | |
3bc303c2 | 15 | #include <linux/mount.h> |
6ca9f3ba | 16 | #include <linux/file.h> |
1da177e4 LT |
17 | #include "cifsfs.h" |
18 | #include "cifspdu.h" | |
19 | #include "cifsglob.h" | |
20 | #include "cifsproto.h" | |
21 | #include "cifs_debug.h" | |
22 | #include "cifs_fs_sb.h" | |
ec71e0e1 | 23 | #include "cifs_unicode.h" |
3fa1c6d1 | 24 | #include "fs_context.h" |
087f757b | 25 | #include "cifs_ioctl.h" |
1da177e4 | 26 | |
99ee4dbd | 27 | static void |
1da177e4 LT |
28 | renew_parental_timestamps(struct dentry *direntry) |
29 | { | |
5fdae1f6 SF |
30 | /* BB check if there is a way to get the kernel to do this or if we |
31 | really need this */ | |
1da177e4 | 32 | do { |
a00be0e3 | 33 | cifs_set_time(direntry, jiffies); |
1da177e4 | 34 | direntry = direntry->d_parent; |
5fdae1f6 | 35 | } while (!IS_ROOT(direntry)); |
1da177e4 LT |
36 | } |
37 | ||
6d3ea7e4 | 38 | char * |
3fa1c6d1 | 39 | cifs_build_path_to_root(struct smb3_fs_context *ctx, struct cifs_sb_info *cifs_sb, |
374402a2 | 40 | struct cifs_tcon *tcon, int add_treename) |
6d3ea7e4 | 41 | { |
3fa1c6d1 | 42 | int pplen = ctx->prepath ? strlen(ctx->prepath) + 1 : 0; |
6d3ea7e4 SF |
43 | int dfsplen; |
44 | char *full_path = NULL; | |
45 | ||
46 | /* if no prefix path, simply set path to the root of share to "" */ | |
47 | if (pplen == 0) { | |
48 | full_path = kzalloc(1, GFP_KERNEL); | |
49 | return full_path; | |
50 | } | |
51 | ||
374402a2 | 52 | if (add_treename) |
6d3ea7e4 SF |
53 | dfsplen = strnlen(tcon->treeName, MAX_TREE_SIZE + 1); |
54 | else | |
55 | dfsplen = 0; | |
56 | ||
57 | full_path = kmalloc(dfsplen + pplen + 1, GFP_KERNEL); | |
58 | if (full_path == NULL) | |
59 | return full_path; | |
60 | ||
61 | if (dfsplen) | |
340625e6 | 62 | memcpy(full_path, tcon->treeName, dfsplen); |
839db3d1 | 63 | full_path[dfsplen] = CIFS_DIR_SEP(cifs_sb); |
3fa1c6d1 | 64 | memcpy(full_path + dfsplen + 1, ctx->prepath, pplen); |
6d3ea7e4 | 65 | convert_delimiter(full_path, CIFS_DIR_SEP(cifs_sb)); |
6d3ea7e4 SF |
66 | return full_path; |
67 | } | |
68 | ||
1da177e4 | 69 | /* Note: caller must free return buffer */ |
8e33cf20 | 70 | const char * |
f6a9bc33 | 71 | build_path_from_dentry(struct dentry *direntry, void *page) |
268a635d AA |
72 | { |
73 | struct cifs_sb_info *cifs_sb = CIFS_SB(direntry->d_sb); | |
74 | struct cifs_tcon *tcon = cifs_sb_master_tcon(cifs_sb); | |
75 | bool prefix = tcon->Flags & SMB_SHARE_IS_IN_DFS; | |
76 | ||
f6a9bc33 | 77 | return build_path_from_dentry_optional_prefix(direntry, page, |
268a635d AA |
78 | prefix); |
79 | } | |
80 | ||
81 | char * | |
f6a9bc33 AV |
82 | build_path_from_dentry_optional_prefix(struct dentry *direntry, void *page, |
83 | bool prefix) | |
1da177e4 | 84 | { |
646dd539 | 85 | int dfsplen; |
a6b5058f | 86 | int pplen = 0; |
0d424ad0 | 87 | struct cifs_sb_info *cifs_sb = CIFS_SB(direntry->d_sb); |
96daf2b0 | 88 | struct cifs_tcon *tcon = cifs_sb_master_tcon(cifs_sb); |
991e72eb AV |
89 | char dirsep = CIFS_DIR_SEP(cifs_sb); |
90 | char *s; | |
1da177e4 | 91 | |
f6a9bc33 AV |
92 | if (unlikely(!page)) |
93 | return ERR_PTR(-ENOMEM); | |
94 | ||
268a635d | 95 | if (prefix) |
0d424ad0 | 96 | dfsplen = strnlen(tcon->treeName, MAX_TREE_SIZE + 1); |
646dd539 SF |
97 | else |
98 | dfsplen = 0; | |
a6b5058f AA |
99 | |
100 | if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_USE_PREFIX_PATH) | |
101 | pplen = cifs_sb->prepath ? strlen(cifs_sb->prepath) + 1 : 0; | |
102 | ||
991e72eb AV |
103 | s = dentry_path_raw(direntry, page, PAGE_SIZE); |
104 | if (IS_ERR(s)) | |
105 | return s; | |
106 | if (!s[1]) // for root we want "", not "/" | |
107 | s++; | |
108 | if (s < (char *)page + pplen + dfsplen) | |
f6a9bc33 | 109 | return ERR_PTR(-ENAMETOOLONG); |
a6b5058f | 110 | if (pplen) { |
a6b5058f | 111 | cifs_dbg(FYI, "using cifs_sb prepath <%s>\n", cifs_sb->prepath); |
991e72eb AV |
112 | s -= pplen; |
113 | memcpy(s + 1, cifs_sb->prepath, pplen - 1); | |
114 | *s = '/'; | |
a6b5058f | 115 | } |
991e72eb AV |
116 | if (dirsep != '/') { |
117 | /* BB test paths to Windows with '/' in the midst of prepath */ | |
118 | char *p; | |
a6b5058f | 119 | |
991e72eb AV |
120 | for (p = s; *p; p++) |
121 | if (*p == '/') | |
122 | *p = dirsep; | |
123 | } | |
646dd539 | 124 | if (dfsplen) { |
991e72eb AV |
125 | s -= dfsplen; |
126 | memcpy(s, tcon->treeName, dfsplen); | |
646dd539 SF |
127 | if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_POSIX_PATHS) { |
128 | int i; | |
129 | for (i = 0; i < dfsplen; i++) { | |
991e72eb AV |
130 | if (s[i] == '\\') |
131 | s[i] = '/'; | |
646dd539 SF |
132 | } |
133 | } | |
134 | } | |
991e72eb | 135 | return s; |
1da177e4 LT |
136 | } |
137 | ||
d2c12719 | 138 | /* |
d3edede2 | 139 | * Don't allow path components longer than the server max. |
d2c12719 MS |
140 | * Don't allow the separator character in a path component. |
141 | * The VFS will not allow "/", but "\" is allowed by posix. | |
142 | */ | |
143 | static int | |
d3edede2 | 144 | check_name(struct dentry *direntry, struct cifs_tcon *tcon) |
d2c12719 MS |
145 | { |
146 | struct cifs_sb_info *cifs_sb = CIFS_SB(direntry->d_sb); | |
147 | int i; | |
148 | ||
f74bc7c6 RS |
149 | if (unlikely(tcon->fsAttrInfo.MaxPathNameComponentLength && |
150 | direntry->d_name.len > | |
6e3c1529 | 151 | le32_to_cpu(tcon->fsAttrInfo.MaxPathNameComponentLength))) |
d3edede2 RS |
152 | return -ENAMETOOLONG; |
153 | ||
d2c12719 MS |
154 | if (!(cifs_sb->mnt_cifs_flags & CIFS_MOUNT_POSIX_PATHS)) { |
155 | for (i = 0; i < direntry->d_name.len; i++) { | |
156 | if (direntry->d_name.name[i] == '\\') { | |
f96637be | 157 | cifs_dbg(FYI, "Invalid file name\n"); |
d2c12719 MS |
158 | return -EINVAL; |
159 | } | |
160 | } | |
161 | } | |
162 | return 0; | |
163 | } | |
164 | ||
165 | ||
3979877e | 166 | /* Inode operations in similar order to how they appear in Linux file fs.h */ |
1da177e4 | 167 | |
6d5786a3 PS |
168 | static int |
169 | cifs_do_create(struct inode *inode, struct dentry *direntry, unsigned int xid, | |
170 | struct tcon_link *tlink, unsigned oflags, umode_t mode, | |
f1e32681 | 171 | __u32 *oplock, struct cifs_fid *fid) |
1da177e4 LT |
172 | { |
173 | int rc = -ENOENT; | |
67750fb9 | 174 | int create_options = CREATE_NOT_DIR; |
25364138 | 175 | int desired_access; |
d2c12719 MS |
176 | struct cifs_sb_info *cifs_sb = CIFS_SB(inode->i_sb); |
177 | struct cifs_tcon *tcon = tlink_tcon(tlink); | |
f6a9bc33 AV |
178 | const char *full_path; |
179 | void *page = alloc_dentry_path(); | |
fb8c4b14 | 180 | FILE_ALL_INFO *buf = NULL; |
1da177e4 | 181 | struct inode *newinode = NULL; |
d2c12719 | 182 | int disposition; |
25364138 | 183 | struct TCP_Server_Info *server = tcon->ses->server; |
226730b4 | 184 | struct cifs_open_parms oparms; |
1da177e4 | 185 | |
d2c12719 | 186 | *oplock = 0; |
10b9b98e | 187 | if (tcon->ses->server->oplocks) |
d2c12719 | 188 | *oplock = REQ_OPLOCK; |
c3b2a0c6 | 189 | |
f6a9bc33 AV |
190 | full_path = build_path_from_dentry(direntry, page); |
191 | if (IS_ERR(full_path)) { | |
192 | free_dentry_path(page); | |
193 | return PTR_ERR(full_path); | |
194 | } | |
7ffec372 | 195 | |
29e20f9c | 196 | if (tcon->unix_ext && cap_unix(tcon->ses) && !tcon->broken_posix_open && |
c3b2a0c6 SF |
197 | (CIFS_UNIX_POSIX_PATH_OPS_CAP & |
198 | le64_to_cpu(tcon->fsUnixInfo.Capability))) { | |
25364138 PS |
199 | rc = cifs_posix_open(full_path, &newinode, inode->i_sb, mode, |
200 | oflags, oplock, &fid->netfid, xid); | |
d2c12719 MS |
201 | switch (rc) { |
202 | case 0: | |
203 | if (newinode == NULL) { | |
204 | /* query inode info */ | |
90e4ee5d | 205 | goto cifs_create_get_file_info; |
d2c12719 MS |
206 | } |
207 | ||
8d9535b6 SP |
208 | if (S_ISDIR(newinode->i_mode)) { |
209 | CIFSSMBClose(xid, tcon, fid->netfid); | |
210 | iput(newinode); | |
211 | rc = -EISDIR; | |
212 | goto out; | |
213 | } | |
214 | ||
d2c12719 MS |
215 | if (!S_ISREG(newinode->i_mode)) { |
216 | /* | |
217 | * The server may allow us to open things like | |
218 | * FIFOs, but the client isn't set up to deal | |
219 | * with that. If it's not a regular file, just | |
220 | * close it and proceed as if it were a normal | |
221 | * lookup. | |
222 | */ | |
25364138 | 223 | CIFSSMBClose(xid, tcon, fid->netfid); |
d2c12719 MS |
224 | goto cifs_create_get_file_info; |
225 | } | |
226 | /* success, no need to query */ | |
227 | goto cifs_create_set_dentry; | |
228 | ||
229 | case -ENOENT: | |
230 | goto cifs_create_get_file_info; | |
231 | ||
232 | case -EIO: | |
233 | case -EINVAL: | |
234 | /* | |
235 | * EIO could indicate that (posix open) operation is not | |
236 | * supported, despite what server claimed in capability | |
237 | * negotiation. | |
238 | * | |
239 | * POSIX open in samba versions 3.3.1 and earlier could | |
240 | * incorrectly fail with invalid parameter. | |
241 | */ | |
242 | tcon->broken_posix_open = true; | |
243 | break; | |
244 | ||
245 | case -EREMOTE: | |
246 | case -EOPNOTSUPP: | |
247 | /* | |
248 | * EREMOTE indicates DFS junction, which is not handled | |
249 | * in posix open. If either that or op not supported | |
250 | * returned, follow the normal lookup. | |
251 | */ | |
252 | break; | |
e08fc045 | 253 | |
d2c12719 MS |
254 | default: |
255 | goto out; | |
256 | } | |
257 | /* | |
258 | * fallthrough to retry, using older open call, this is case | |
259 | * where server does not support this SMB level, and falsely | |
260 | * claims capability (also get here for DFS case which should be | |
261 | * rare for path not covered on files) | |
262 | */ | |
1da177e4 LT |
263 | } |
264 | ||
25364138 | 265 | desired_access = 0; |
d2c12719 | 266 | if (OPEN_FMODE(oflags) & FMODE_READ) |
25364138 | 267 | desired_access |= GENERIC_READ; /* is this too little? */ |
d2c12719 | 268 | if (OPEN_FMODE(oflags) & FMODE_WRITE) |
25364138 | 269 | desired_access |= GENERIC_WRITE; |
d2c12719 MS |
270 | |
271 | disposition = FILE_OVERWRITE_IF; | |
272 | if ((oflags & (O_CREAT | O_EXCL)) == (O_CREAT | O_EXCL)) | |
273 | disposition = FILE_CREATE; | |
274 | else if ((oflags & (O_CREAT | O_TRUNC)) == (O_CREAT | O_TRUNC)) | |
275 | disposition = FILE_OVERWRITE_IF; | |
276 | else if ((oflags & O_CREAT) == O_CREAT) | |
277 | disposition = FILE_OPEN_IF; | |
278 | else | |
f96637be | 279 | cifs_dbg(FYI, "Create flag not set in create function\n"); |
d2c12719 | 280 | |
25364138 PS |
281 | /* |
282 | * BB add processing to set equivalent of mode - e.g. via CreateX with | |
283 | * ACLs | |
284 | */ | |
285 | ||
286 | if (!server->ops->open) { | |
287 | rc = -ENOSYS; | |
288 | goto out; | |
289 | } | |
1da177e4 | 290 | |
5fdae1f6 SF |
291 | buf = kmalloc(sizeof(FILE_ALL_INFO), GFP_KERNEL); |
292 | if (buf == NULL) { | |
232341ba | 293 | rc = -ENOMEM; |
d2c12719 | 294 | goto out; |
1da177e4 | 295 | } |
67750fb9 | 296 | |
67750fb9 JL |
297 | /* |
298 | * if we're not using unix extensions, see if we need to set | |
299 | * ATTR_READONLY on the create call | |
300 | */ | |
f818dd55 | 301 | if (!tcon->unix_ext && (mode & S_IWUGO) == 0) |
67750fb9 JL |
302 | create_options |= CREATE_OPTION_READONLY; |
303 | ||
226730b4 PS |
304 | oparms.tcon = tcon; |
305 | oparms.cifs_sb = cifs_sb; | |
306 | oparms.desired_access = desired_access; | |
0f060936 | 307 | oparms.create_options = cifs_create_options(cifs_sb, create_options); |
226730b4 PS |
308 | oparms.disposition = disposition; |
309 | oparms.path = full_path; | |
310 | oparms.fid = fid; | |
9cbc0b73 | 311 | oparms.reconnect = false; |
ce558b0e | 312 | oparms.mode = mode; |
226730b4 | 313 | rc = server->ops->open(xid, &oparms, oplock, buf); |
1da177e4 | 314 | if (rc) { |
f96637be | 315 | cifs_dbg(FYI, "cifs_create returned 0x%x\n", rc); |
d2c12719 | 316 | goto out; |
c3b2a0c6 SF |
317 | } |
318 | ||
25364138 PS |
319 | /* |
320 | * If Open reported that we actually created a file then we now have to | |
321 | * set the mode if possible. | |
322 | */ | |
d2c12719 | 323 | if ((tcon->unix_ext) && (*oplock & CIFS_CREATE_ACTION)) { |
c3b2a0c6 | 324 | struct cifs_unix_set_info_args args = { |
4e1e7fb9 JL |
325 | .mode = mode, |
326 | .ctime = NO_CHANGE_64, | |
327 | .atime = NO_CHANGE_64, | |
328 | .mtime = NO_CHANGE_64, | |
329 | .device = 0, | |
c3b2a0c6 SF |
330 | }; |
331 | ||
332 | if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_SET_UID) { | |
49418b2c | 333 | args.uid = current_fsuid(); |
c3b2a0c6 | 334 | if (inode->i_mode & S_ISGID) |
49418b2c | 335 | args.gid = inode->i_gid; |
c3b2a0c6 | 336 | else |
49418b2c | 337 | args.gid = current_fsgid(); |
3ce53fc4 | 338 | } else { |
49418b2c EB |
339 | args.uid = INVALID_UID; /* no change */ |
340 | args.gid = INVALID_GID; /* no change */ | |
1da177e4 | 341 | } |
25364138 PS |
342 | CIFSSMBUnixSetFileInfo(xid, tcon, &args, fid->netfid, |
343 | current->tgid); | |
c3b2a0c6 | 344 | } else { |
25364138 PS |
345 | /* |
346 | * BB implement mode setting via Windows security | |
347 | * descriptors e.g. | |
348 | */ | |
c3b2a0c6 SF |
349 | /* CIFSSMBWinSetPerms(xid,tcon,path,mode,-1,-1,nls);*/ |
350 | ||
351 | /* Could set r/o dos attribute if mode & 0222 == 0 */ | |
352 | } | |
1da177e4 | 353 | |
c3b2a0c6 SF |
354 | cifs_create_get_file_info: |
355 | /* server might mask mode so we have to query for it */ | |
356 | if (tcon->unix_ext) | |
25364138 PS |
357 | rc = cifs_get_inode_info_unix(&newinode, full_path, inode->i_sb, |
358 | xid); | |
c3b2a0c6 | 359 | else { |
d313852d | 360 | /* TODO: Add support for calling POSIX query info here, but passing in fid */ |
25364138 | 361 | rc = cifs_get_inode_info(&newinode, full_path, buf, inode->i_sb, |
42eacf9e | 362 | xid, fid); |
c3b2a0c6 | 363 | if (newinode) { |
b8c32dbb PS |
364 | if (server->ops->set_lease_key) |
365 | server->ops->set_lease_key(newinode, fid); | |
4ab5260d AV |
366 | if ((*oplock & CIFS_CREATE_ACTION) && S_ISREG(newinode->i_mode)) { |
367 | if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_DYNPERM) | |
368 | newinode->i_mode = mode; | |
369 | if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_SET_UID) { | |
370 | newinode->i_uid = current_fsuid(); | |
371 | if (inode->i_mode & S_ISGID) | |
372 | newinode->i_gid = inode->i_gid; | |
373 | else | |
374 | newinode->i_gid = current_fsgid(); | |
375 | } | |
6473a559 | 376 | } |
1da177e4 | 377 | } |
c3b2a0c6 | 378 | } |
1da177e4 | 379 | |
c3b2a0c6 | 380 | cifs_create_set_dentry: |
d2c12719 | 381 | if (rc != 0) { |
f96637be JP |
382 | cifs_dbg(FYI, "Create worked, get_inode_info failed rc = %d\n", |
383 | rc); | |
8d9535b6 | 384 | goto out_err; |
d2c12719 | 385 | } |
8d9535b6 | 386 | |
0917310b SF |
387 | if (newinode) |
388 | if (S_ISDIR(newinode->i_mode)) { | |
389 | rc = -EISDIR; | |
390 | goto out_err; | |
391 | } | |
8d9535b6 | 392 | |
d2c12719 MS |
393 | d_drop(direntry); |
394 | d_add(direntry, newinode); | |
c3b2a0c6 | 395 | |
d2c12719 MS |
396 | out: |
397 | kfree(buf); | |
f6a9bc33 | 398 | free_dentry_path(page); |
d2c12719 | 399 | return rc; |
8d9535b6 SP |
400 | |
401 | out_err: | |
402 | if (server->ops->close) | |
403 | server->ops->close(xid, tcon, fid); | |
404 | if (newinode) | |
405 | iput(newinode); | |
406 | goto out; | |
d2c12719 | 407 | } |
6ca9f3ba | 408 | |
d9585277 | 409 | int |
d2c12719 | 410 | cifs_atomic_open(struct inode *inode, struct dentry *direntry, |
44907d79 | 411 | struct file *file, unsigned oflags, umode_t mode) |
d2c12719 MS |
412 | { |
413 | int rc; | |
6d5786a3 | 414 | unsigned int xid; |
d2c12719 MS |
415 | struct tcon_link *tlink; |
416 | struct cifs_tcon *tcon; | |
25364138 | 417 | struct TCP_Server_Info *server; |
fb1214e4 | 418 | struct cifs_fid fid; |
233839b1 | 419 | struct cifs_pending_open open; |
d2c12719 | 420 | __u32 oplock; |
fb1214e4 | 421 | struct cifsFileInfo *file_info; |
d2c12719 | 422 | |
087f757b SF |
423 | if (unlikely(cifs_forced_shutdown(CIFS_SB(inode->i_sb)))) |
424 | return -EIO; | |
425 | ||
fb1214e4 PS |
426 | /* |
427 | * Posix open is only called (at lookup time) for file create now. For | |
d2c12719 MS |
428 | * opens (rather than creates), because we do not know if it is a file |
429 | * or directory yet, and current Samba no longer allows us to do posix | |
430 | * open on dirs, we could end up wasting an open call on what turns out | |
431 | * to be a dir. For file opens, we wait to call posix open till | |
432 | * cifs_open. It could be added to atomic_open in the future but the | |
433 | * performance tradeoff of the extra network request when EISDIR or | |
434 | * EACCES is returned would have to be weighed against the 50% reduction | |
435 | * in network traffic in the other paths. | |
436 | */ | |
437 | if (!(oflags & O_CREAT)) { | |
3798f47a SP |
438 | struct dentry *res; |
439 | ||
440 | /* | |
441 | * Check for hashed negative dentry. We have already revalidated | |
442 | * the dentry and it is fine. No need to perform another lookup. | |
443 | */ | |
00699ad8 | 444 | if (!d_in_lookup(direntry)) |
3798f47a SP |
445 | return -ENOENT; |
446 | ||
447 | res = cifs_lookup(inode, direntry, 0); | |
d2c12719 | 448 | if (IS_ERR(res)) |
d9585277 | 449 | return PTR_ERR(res); |
d2c12719 | 450 | |
e45198a6 | 451 | return finish_no_open(file, res); |
d2c12719 MS |
452 | } |
453 | ||
6d5786a3 | 454 | xid = get_xid(); |
d2c12719 | 455 | |
35c265e0 AV |
456 | cifs_dbg(FYI, "parent inode = 0x%p name is: %pd and dentry = 0x%p\n", |
457 | inode, direntry, direntry); | |
d2c12719 MS |
458 | |
459 | tlink = cifs_sb_tlink(CIFS_SB(inode->i_sb)); | |
efb79f28 WY |
460 | if (IS_ERR(tlink)) { |
461 | rc = PTR_ERR(tlink); | |
6d5786a3 | 462 | goto out_free_xid; |
efb79f28 | 463 | } |
d2c12719 MS |
464 | |
465 | tcon = tlink_tcon(tlink); | |
d3edede2 RS |
466 | |
467 | rc = check_name(direntry, tcon); | |
468 | if (rc) | |
f74bc7c6 | 469 | goto out; |
d3edede2 | 470 | |
25364138 | 471 | server = tcon->ses->server; |
d2c12719 | 472 | |
b8c32dbb PS |
473 | if (server->ops->new_lease_key) |
474 | server->ops->new_lease_key(&fid); | |
475 | ||
233839b1 PS |
476 | cifs_add_pending_open(&fid, tlink, &open); |
477 | ||
d2c12719 | 478 | rc = cifs_do_create(inode, direntry, xid, tlink, oflags, mode, |
f1e32681 | 479 | &oplock, &fid); |
d2c12719 | 480 | |
233839b1 PS |
481 | if (rc) { |
482 | cifs_del_pending_open(&open); | |
d2c12719 | 483 | goto out; |
233839b1 | 484 | } |
d2c12719 | 485 | |
f1e32681 | 486 | if ((oflags & (O_CREAT | O_EXCL)) == (O_CREAT | O_EXCL)) |
73a09dd9 | 487 | file->f_mode |= FMODE_CREATED; |
f1e32681 | 488 | |
be12af3e | 489 | rc = finish_open(file, direntry, generic_file_open); |
30d90494 | 490 | if (rc) { |
25364138 PS |
491 | if (server->ops->close) |
492 | server->ops->close(xid, tcon, &fid); | |
233839b1 | 493 | cifs_del_pending_open(&open); |
d2c12719 | 494 | goto out; |
5fdae1f6 | 495 | } |
2422f676 | 496 | |
787aded6 NJ |
497 | if (file->f_flags & O_DIRECT && |
498 | CIFS_SB(inode->i_sb)->mnt_cifs_flags & CIFS_MOUNT_STRICT_IO) { | |
499 | if (CIFS_SB(inode->i_sb)->mnt_cifs_flags & CIFS_MOUNT_NO_BRL) | |
500 | file->f_op = &cifs_file_direct_nobrl_ops; | |
501 | else | |
502 | file->f_op = &cifs_file_direct_ops; | |
503 | } | |
504 | ||
fb1214e4 PS |
505 | file_info = cifs_new_fileinfo(&fid, file, tlink, oplock); |
506 | if (file_info == NULL) { | |
25364138 PS |
507 | if (server->ops->close) |
508 | server->ops->close(xid, tcon, &fid); | |
233839b1 | 509 | cifs_del_pending_open(&open); |
d9585277 | 510 | rc = -ENOMEM; |
d2c12719 MS |
511 | } |
512 | ||
513 | out: | |
514 | cifs_put_tlink(tlink); | |
6d5786a3 PS |
515 | out_free_xid: |
516 | free_xid(xid); | |
d9585277 | 517 | return rc; |
d2c12719 MS |
518 | } |
519 | ||
549c7297 CB |
520 | int cifs_create(struct user_namespace *mnt_userns, struct inode *inode, |
521 | struct dentry *direntry, umode_t mode, bool excl) | |
d2c12719 MS |
522 | { |
523 | int rc; | |
6d5786a3 | 524 | unsigned int xid = get_xid(); |
d2c12719 MS |
525 | /* |
526 | * BB below access is probably too much for mknod to request | |
527 | * but we have to do query and setpathinfo so requesting | |
528 | * less could fail (unless we want to request getatr and setatr | |
529 | * permissions (only). At least for POSIX we do not have to | |
530 | * request so much. | |
531 | */ | |
532 | unsigned oflags = O_EXCL | O_CREAT | O_RDWR; | |
533 | struct tcon_link *tlink; | |
25364138 PS |
534 | struct cifs_tcon *tcon; |
535 | struct TCP_Server_Info *server; | |
536 | struct cifs_fid fid; | |
d2c12719 | 537 | __u32 oplock; |
d2c12719 | 538 | |
35c265e0 AV |
539 | cifs_dbg(FYI, "cifs_create parent inode = 0x%p name is: %pd and dentry = 0x%p\n", |
540 | inode, direntry, direntry); | |
d2c12719 | 541 | |
087f757b SF |
542 | if (unlikely(cifs_forced_shutdown(CIFS_SB(inode->i_sb)))) |
543 | return -EIO; | |
544 | ||
d2c12719 MS |
545 | tlink = cifs_sb_tlink(CIFS_SB(inode->i_sb)); |
546 | rc = PTR_ERR(tlink); | |
547 | if (IS_ERR(tlink)) | |
6d5786a3 | 548 | goto out_free_xid; |
d2c12719 | 549 | |
25364138 PS |
550 | tcon = tlink_tcon(tlink); |
551 | server = tcon->ses->server; | |
b8c32dbb PS |
552 | |
553 | if (server->ops->new_lease_key) | |
554 | server->ops->new_lease_key(&fid); | |
555 | ||
556 | rc = cifs_do_create(inode, direntry, xid, tlink, oflags, mode, | |
f1e32681 | 557 | &oplock, &fid); |
25364138 PS |
558 | if (!rc && server->ops->close) |
559 | server->ops->close(xid, tcon, &fid); | |
d2c12719 | 560 | |
7ffec372 | 561 | cifs_put_tlink(tlink); |
6d5786a3 PS |
562 | out_free_xid: |
563 | free_xid(xid); | |
1da177e4 LT |
564 | return rc; |
565 | } | |
566 | ||
549c7297 CB |
567 | int cifs_mknod(struct user_namespace *mnt_userns, struct inode *inode, |
568 | struct dentry *direntry, umode_t mode, dev_t device_number) | |
1da177e4 LT |
569 | { |
570 | int rc = -EPERM; | |
6d5786a3 | 571 | unsigned int xid; |
1da177e4 | 572 | struct cifs_sb_info *cifs_sb; |
7ffec372 | 573 | struct tcon_link *tlink; |
dd120671 | 574 | struct cifs_tcon *tcon; |
f6a9bc33 AV |
575 | const char *full_path; |
576 | void *page; | |
1da177e4 LT |
577 | |
578 | if (!old_valid_dev(device_number)) | |
579 | return -EINVAL; | |
580 | ||
1da177e4 | 581 | cifs_sb = CIFS_SB(inode->i_sb); |
087f757b SF |
582 | if (unlikely(cifs_forced_shutdown(cifs_sb))) |
583 | return -EIO; | |
584 | ||
7ffec372 JL |
585 | tlink = cifs_sb_tlink(cifs_sb); |
586 | if (IS_ERR(tlink)) | |
587 | return PTR_ERR(tlink); | |
588 | ||
f6a9bc33 | 589 | page = alloc_dentry_path(); |
dd120671 | 590 | tcon = tlink_tcon(tlink); |
6d5786a3 | 591 | xid = get_xid(); |
1da177e4 | 592 | |
f6a9bc33 AV |
593 | full_path = build_path_from_dentry(direntry, page); |
594 | if (IS_ERR(full_path)) { | |
595 | rc = PTR_ERR(full_path); | |
5d9ac7fd JL |
596 | goto mknod_out; |
597 | } | |
598 | ||
c847dccf AA |
599 | rc = tcon->ses->server->ops->make_node(xid, inode, direntry, tcon, |
600 | full_path, mode, | |
601 | device_number); | |
5d9ac7fd JL |
602 | |
603 | mknod_out: | |
f6a9bc33 | 604 | free_dentry_path(page); |
6d5786a3 | 605 | free_xid(xid); |
7ffec372 | 606 | cifs_put_tlink(tlink); |
1da177e4 LT |
607 | return rc; |
608 | } | |
609 | ||
1da177e4 | 610 | struct dentry * |
5fdae1f6 | 611 | cifs_lookup(struct inode *parent_dir_inode, struct dentry *direntry, |
00cd8dd3 | 612 | unsigned int flags) |
1da177e4 | 613 | { |
6d5786a3 | 614 | unsigned int xid; |
1da177e4 LT |
615 | int rc = 0; /* to get around spurious gcc warning, set to zero here */ |
616 | struct cifs_sb_info *cifs_sb; | |
7ffec372 | 617 | struct tcon_link *tlink; |
96daf2b0 | 618 | struct cifs_tcon *pTcon; |
1da177e4 | 619 | struct inode *newInode = NULL; |
f6a9bc33 AV |
620 | const char *full_path; |
621 | void *page; | |
6efa994e | 622 | int retry_count = 0; |
1da177e4 | 623 | |
6d5786a3 | 624 | xid = get_xid(); |
1da177e4 | 625 | |
35c265e0 AV |
626 | cifs_dbg(FYI, "parent inode = 0x%p name is: %pd and dentry = 0x%p\n", |
627 | parent_dir_inode, direntry, direntry); | |
1da177e4 | 628 | |
1da177e4 LT |
629 | /* check whether path exists */ |
630 | ||
631 | cifs_sb = CIFS_SB(parent_dir_inode->i_sb); | |
7ffec372 JL |
632 | tlink = cifs_sb_tlink(cifs_sb); |
633 | if (IS_ERR(tlink)) { | |
6d5786a3 | 634 | free_xid(xid); |
11f17c9b | 635 | return ERR_CAST(tlink); |
7ffec372 JL |
636 | } |
637 | pTcon = tlink_tcon(tlink); | |
1da177e4 | 638 | |
d3edede2 | 639 | rc = check_name(direntry, pTcon); |
11f17c9b AV |
640 | if (unlikely(rc)) { |
641 | cifs_put_tlink(tlink); | |
642 | free_xid(xid); | |
643 | return ERR_PTR(rc); | |
644 | } | |
5ddf1e0f | 645 | |
1da177e4 LT |
646 | /* can not grab the rename sem here since it would |
647 | deadlock in the cases (beginning of sys_rename itself) | |
648 | in which we already have the sb rename sem */ | |
f6a9bc33 AV |
649 | page = alloc_dentry_path(); |
650 | full_path = build_path_from_dentry(direntry, page); | |
651 | if (IS_ERR(full_path)) { | |
11f17c9b AV |
652 | cifs_put_tlink(tlink); |
653 | free_xid(xid); | |
f6a9bc33 AV |
654 | free_dentry_path(page); |
655 | return ERR_CAST(full_path); | |
1da177e4 LT |
656 | } |
657 | ||
2b0143b5 | 658 | if (d_really_is_positive(direntry)) { |
f96637be | 659 | cifs_dbg(FYI, "non-NULL inode in lookup\n"); |
1da177e4 | 660 | } else { |
f96637be | 661 | cifs_dbg(FYI, "NULL inode in lookup\n"); |
1da177e4 | 662 | } |
f96637be | 663 | cifs_dbg(FYI, "Full path: %s inode = 0x%p\n", |
2b0143b5 | 664 | full_path, d_inode(direntry)); |
1da177e4 | 665 | |
6efa994e | 666 | again: |
790434ff SF |
667 | if (pTcon->posix_extensions) |
668 | rc = smb311_posix_get_inode_info(&newInode, full_path, parent_dir_inode->i_sb, xid); | |
669 | else if (pTcon->unix_ext) { | |
d2c12719 MS |
670 | rc = cifs_get_inode_info_unix(&newInode, full_path, |
671 | parent_dir_inode->i_sb, xid); | |
672 | } else { | |
1da177e4 | 673 | rc = cifs_get_inode_info(&newInode, full_path, NULL, |
a6ce4932 | 674 | parent_dir_inode->i_sb, xid, NULL); |
d2c12719 | 675 | } |
1da177e4 | 676 | |
a8b75f66 | 677 | if (rc == 0) { |
5fdae1f6 | 678 | /* since paths are not looked up by component - the parent |
3abb9272 | 679 | directories are presumed to be good here */ |
1da177e4 | 680 | renew_parental_timestamps(direntry); |
6efa994e TRB |
681 | } else if (rc == -EAGAIN && retry_count++ < 10) { |
682 | goto again; | |
1da177e4 | 683 | } else if (rc == -ENOENT) { |
a00be0e3 | 684 | cifs_set_time(direntry, jiffies); |
11f17c9b AV |
685 | newInode = NULL; |
686 | } else { | |
687 | if (rc != -EACCES) { | |
688 | cifs_dbg(FYI, "Unexpected lookup error %d\n", rc); | |
689 | /* We special case check for Access Denied - since that | |
690 | is a common return code */ | |
691 | } | |
692 | newInode = ERR_PTR(rc); | |
1da177e4 | 693 | } |
f6a9bc33 | 694 | free_dentry_path(page); |
7ffec372 | 695 | cifs_put_tlink(tlink); |
6d5786a3 | 696 | free_xid(xid); |
11f17c9b | 697 | return d_splice_alias(newInode, direntry); |
1da177e4 LT |
698 | } |
699 | ||
1da177e4 | 700 | static int |
0b728e19 | 701 | cifs_d_revalidate(struct dentry *direntry, unsigned int flags) |
1da177e4 | 702 | { |
0b3d0ef9 | 703 | struct inode *inode; |
21b200d0 | 704 | int rc; |
0b3d0ef9 | 705 | |
0b728e19 | 706 | if (flags & LOOKUP_RCU) |
34286d66 NP |
707 | return -ECHILD; |
708 | ||
2b0143b5 | 709 | if (d_really_is_positive(direntry)) { |
0b3d0ef9 PS |
710 | inode = d_inode(direntry); |
711 | if ((flags & LOOKUP_REVAL) && !CIFS_CACHE_READ(CIFS_I(inode))) | |
712 | CIFS_I(inode)->time = 0; /* force reval */ | |
713 | ||
21b200d0 AA |
714 | rc = cifs_revalidate_dentry(direntry); |
715 | if (rc) { | |
716 | cifs_dbg(FYI, "cifs_revalidate_dentry failed with rc=%d", rc); | |
717 | switch (rc) { | |
718 | case -ENOENT: | |
719 | case -ESTALE: | |
720 | /* | |
721 | * Those errors mean the dentry is invalid | |
722 | * (file was deleted or recreated) | |
723 | */ | |
724 | return 0; | |
725 | default: | |
726 | /* | |
727 | * Otherwise some unexpected error happened | |
728 | * report it as-is to VFS layer | |
729 | */ | |
730 | return rc; | |
731 | } | |
732 | } | |
ad4778fb GF |
733 | else { |
734 | /* | |
936ad909 IK |
735 | * If the inode wasn't known to be a dfs entry when |
736 | * the dentry was instantiated, such as when created | |
737 | * via ->readdir(), it needs to be set now since the | |
738 | * attributes will have been updated by | |
739 | * cifs_revalidate_dentry(). | |
ad4778fb | 740 | */ |
0b3d0ef9 | 741 | if (IS_AUTOMOUNT(inode) && |
936ad909 IK |
742 | !(direntry->d_flags & DCACHE_NEED_AUTOMOUNT)) { |
743 | spin_lock(&direntry->d_lock); | |
744 | direntry->d_flags |= DCACHE_NEED_AUTOMOUNT; | |
745 | spin_unlock(&direntry->d_lock); | |
746 | } | |
747 | ||
262f86ad | 748 | return 1; |
ad4778fb | 749 | } |
1da177e4 LT |
750 | } |
751 | ||
262f86ad NP |
752 | /* |
753 | * This may be nfsd (or something), anyway, we can't see the | |
754 | * intent of this. So, since this can be for creation, drop it. | |
755 | */ | |
0b728e19 | 756 | if (!flags) |
262f86ad NP |
757 | return 0; |
758 | ||
759 | /* | |
760 | * Drop the negative dentry, in order to make sure to use the | |
761 | * case sensitive name which is specified by user if this is | |
762 | * for creation. | |
763 | */ | |
0b728e19 | 764 | if (flags & (LOOKUP_CREATE | LOOKUP_RENAME_TARGET)) |
407938e7 | 765 | return 0; |
262f86ad | 766 | |
a00be0e3 | 767 | if (time_after(jiffies, cifs_get_time(direntry) + HZ) || !lookupCacheEnabled) |
262f86ad NP |
768 | return 0; |
769 | ||
770 | return 1; | |
1da177e4 LT |
771 | } |
772 | ||
773 | /* static int cifs_d_delete(struct dentry *direntry) | |
774 | { | |
775 | int rc = 0; | |
776 | ||
35c265e0 | 777 | cifs_dbg(FYI, "In cifs d_delete, name = %pd\n", direntry); |
1da177e4 LT |
778 | |
779 | return rc; | |
780 | } */ | |
781 | ||
4fd03e84 | 782 | const struct dentry_operations cifs_dentry_ops = { |
1da177e4 | 783 | .d_revalidate = cifs_d_revalidate, |
01c64fea | 784 | .d_automount = cifs_dfs_d_automount, |
5fdae1f6 | 785 | /* d_delete: cifs_d_delete, */ /* not needed except for debugging */ |
1da177e4 | 786 | }; |
b92327fe | 787 | |
da53be12 | 788 | static int cifs_ci_hash(const struct dentry *dentry, struct qstr *q) |
b92327fe | 789 | { |
b1e6a015 | 790 | struct nls_table *codepage = CIFS_SB(dentry->d_sb)->local_nls; |
b92327fe | 791 | unsigned long hash; |
ec71e0e1 JL |
792 | wchar_t c; |
793 | int i, charlen; | |
b92327fe | 794 | |
8387ff25 | 795 | hash = init_name_hash(dentry); |
ec71e0e1 JL |
796 | for (i = 0; i < q->len; i += charlen) { |
797 | charlen = codepage->char2uni(&q->name[i], q->len - i, &c); | |
798 | /* error out if we can't convert the character */ | |
799 | if (unlikely(charlen < 0)) | |
800 | return charlen; | |
801 | hash = partial_name_hash(cifs_toupper(c), hash); | |
802 | } | |
b92327fe SF |
803 | q->hash = end_name_hash(hash); |
804 | ||
805 | return 0; | |
806 | } | |
807 | ||
6fa67e70 | 808 | static int cifs_ci_compare(const struct dentry *dentry, |
621e155a | 809 | unsigned int len, const char *str, const struct qstr *name) |
b92327fe | 810 | { |
d3fe1985 | 811 | struct nls_table *codepage = CIFS_SB(dentry->d_sb)->local_nls; |
ec71e0e1 JL |
812 | wchar_t c1, c2; |
813 | int i, l1, l2; | |
b92327fe | 814 | |
ec71e0e1 JL |
815 | /* |
816 | * We make the assumption here that uppercase characters in the local | |
817 | * codepage are always the same length as their lowercase counterparts. | |
818 | * | |
819 | * If that's ever not the case, then this will fail to match it. | |
820 | */ | |
821 | if (name->len != len) | |
822 | return 1; | |
823 | ||
824 | for (i = 0; i < len; i += l1) { | |
825 | /* Convert characters in both strings to UTF-16. */ | |
826 | l1 = codepage->char2uni(&str[i], len - i, &c1); | |
827 | l2 = codepage->char2uni(&name->name[i], name->len - i, &c2); | |
828 | ||
829 | /* | |
830 | * If we can't convert either character, just declare it to | |
831 | * be 1 byte long and compare the original byte. | |
832 | */ | |
833 | if (unlikely(l1 < 0 && l2 < 0)) { | |
834 | if (str[i] != name->name[i]) | |
835 | return 1; | |
836 | l1 = 1; | |
837 | continue; | |
838 | } | |
839 | ||
840 | /* | |
841 | * Here, we again ass|u|me that upper/lowercase versions of | |
842 | * a character are the same length in the local NLS. | |
843 | */ | |
844 | if (l1 != l2) | |
845 | return 1; | |
846 | ||
847 | /* Now compare uppercase versions of these characters */ | |
848 | if (cifs_toupper(c1) != cifs_toupper(c2)) | |
849 | return 1; | |
850 | } | |
851 | ||
852 | return 0; | |
b92327fe SF |
853 | } |
854 | ||
4fd03e84 | 855 | const struct dentry_operations cifs_ci_dentry_ops = { |
b92327fe SF |
856 | .d_revalidate = cifs_d_revalidate, |
857 | .d_hash = cifs_ci_hash, | |
858 | .d_compare = cifs_ci_compare, | |
01c64fea | 859 | .d_automount = cifs_dfs_d_automount, |
b92327fe | 860 | }; |