4 * vfs operations that deal with dentries
6 * Copyright (C) International Business Machines Corp., 2002,2003
7 * Author(s): Steve French (sfrench@us.ibm.com)
9 * This library is free software; you can redistribute it and/or modify
10 * it under the terms of the GNU Lesser General Public License as published
11 * by the Free Software Foundation; either version 2.1 of the License, or
12 * (at your option) any later version.
14 * This library is distributed in the hope that it will be useful,
15 * but WITHOUT ANY WARRANTY; without even the implied warranty of
16 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See
17 * the GNU Lesser General Public License for more details.
19 * You should have received a copy of the GNU Lesser General Public License
20 * along with this library; if not, write to the Free Software
21 * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
24 #include <linux/stat.h>
25 #include <linux/slab.h>
26 #include <linux/namei.h>
30 #include "cifsproto.h"
31 #include "cifs_debug.h"
32 #include "cifs_fs_sb.h"
35 renew_parental_timestamps(struct dentry *direntry)
37 /* BB check if there is a way to get the kernel to do this or if we really need this */
39 direntry->d_time = jiffies;
40 direntry = direntry->d_parent;
41 } while (!IS_ROOT(direntry));
44 /* Note: caller must free return buffer */
46 build_path_from_dentry(struct dentry *direntry, const struct cifs_sb_info *cifs_sb)
53 return NULL; /* not much we can do if dentry is freed and
54 we need to reopen the file after it was closed implicitly
55 when the server crashed */
58 for (temp = direntry; !IS_ROOT(temp);) {
59 namelen += (1 + temp->d_name.len);
60 temp = temp->d_parent;
62 cERROR(1,("corrupt dentry"));
67 full_path = kmalloc(namelen+1, GFP_KERNEL);
70 full_path[namelen] = 0; /* trailing null */
72 for (temp = direntry; !IS_ROOT(temp);) {
73 namelen -= 1 + temp->d_name.len;
77 full_path[namelen] = CIFS_DIR_SEP(cifs_sb);
78 strncpy(full_path + namelen + 1, temp->d_name.name,
80 cFYI(0, (" name: %s ", full_path + namelen));
82 temp = temp->d_parent;
84 cERROR(1,("corrupt dentry"));
91 ("We did not end path lookup where we expected namelen is %d",
93 /* presumably this is only possible if we were racing with a rename
94 of one of the parent directories (we can not lock the dentries
95 above us to prevent this, but retrying should be harmless) */
98 goto cifs_bp_rename_retry;
104 /* char * build_wildcard_path_from_dentry(struct dentry *direntry)
106 if(full_path == NULL)
109 full_path[namelen] = '\\';
110 full_path[namelen+1] = '*';
111 full_path[namelen+2] = 0;
112 BB remove above eight lines BB */
114 /* Inode operations in similar order to how they appear in the Linux file fs.h */
117 cifs_create(struct inode *inode, struct dentry *direntry, int mode,
118 struct nameidata *nd)
123 int desiredAccess = GENERIC_READ | GENERIC_WRITE;
125 struct cifs_sb_info *cifs_sb;
126 struct cifsTconInfo *pTcon;
127 char *full_path = NULL;
128 FILE_ALL_INFO * buf = NULL;
129 struct inode *newinode = NULL;
130 struct cifsFileInfo * pCifsFile = NULL;
131 struct cifsInodeInfo * pCifsInode;
132 int disposition = FILE_OVERWRITE_IF;
133 int write_only = FALSE;
137 cifs_sb = CIFS_SB(inode->i_sb);
138 pTcon = cifs_sb->tcon;
140 down(&direntry->d_sb->s_vfs_rename_sem);
141 full_path = build_path_from_dentry(direntry, cifs_sb);
142 up(&direntry->d_sb->s_vfs_rename_sem);
143 if(full_path == NULL) {
149 if ((nd->intent.open.flags & O_ACCMODE) == O_RDONLY)
150 desiredAccess = GENERIC_READ;
151 else if ((nd->intent.open.flags & O_ACCMODE) == O_WRONLY) {
152 desiredAccess = GENERIC_WRITE;
154 } else if ((nd->intent.open.flags & O_ACCMODE) == O_RDWR) {
155 /* GENERIC_ALL is too much permission to request */
156 /* can cause unnecessary access denied on create */
157 /* desiredAccess = GENERIC_ALL; */
158 desiredAccess = GENERIC_READ | GENERIC_WRITE;
161 if((nd->intent.open.flags & (O_CREAT | O_EXCL)) == (O_CREAT | O_EXCL))
162 disposition = FILE_CREATE;
163 else if((nd->intent.open.flags & (O_CREAT | O_TRUNC)) == (O_CREAT | O_TRUNC))
164 disposition = FILE_OVERWRITE_IF;
165 else if((nd->intent.open.flags & O_CREAT) == O_CREAT)
166 disposition = FILE_OPEN_IF;
168 cFYI(1,("Create flag not set in create function"));
172 /* BB add processing to set equivalent of mode - e.g. via CreateX with ACLs */
176 buf = kmalloc(sizeof(FILE_ALL_INFO),GFP_KERNEL);
183 rc = CIFSSMBOpen(xid, pTcon, full_path, disposition,
184 desiredAccess, CREATE_NOT_DIR,
185 &fileHandle, &oplock, buf, cifs_sb->local_nls,
186 cifs_sb->mnt_cifs_flags & CIFS_MOUNT_MAP_SPECIAL_CHR);
188 cFYI(1, ("cifs_create returned 0x%x ", rc));
190 /* If Open reported that we actually created a file
191 then we now have to set the mode if possible */
192 if ((cifs_sb->tcon->ses->capabilities & CAP_UNIX) &&
193 (oplock & CIFS_CREATE_ACTION))
194 if(cifs_sb->mnt_cifs_flags & CIFS_MOUNT_SET_UID) {
195 CIFSSMBUnixSetPerms(xid, pTcon, full_path, mode,
196 (__u64)current->euid,
197 (__u64)current->egid,
200 cifs_sb->mnt_cifs_flags &
201 CIFS_MOUNT_MAP_SPECIAL_CHR);
203 CIFSSMBUnixSetPerms(xid, pTcon, full_path, mode,
208 cifs_sb->mnt_cifs_flags &
209 CIFS_MOUNT_MAP_SPECIAL_CHR);
212 /* BB implement mode setting via Windows security descriptors */
213 /* eg CIFSSMBWinSetPerms(xid,pTcon,full_path,mode,-1,-1,local_nls);*/
214 /* could set r/o dos attribute if mode & 0222 == 0 */
217 /* BB server might mask mode so we have to query for Unix case*/
218 if (pTcon->ses->capabilities & CAP_UNIX)
219 rc = cifs_get_inode_info_unix(&newinode, full_path,
222 rc = cifs_get_inode_info(&newinode, full_path,
223 buf, inode->i_sb,xid);
225 newinode->i_mode = mode;
230 ("Create worked but get_inode_info failed rc = %d",
234 direntry->d_op = &cifs_ci_dentry_ops;
236 direntry->d_op = &cifs_dentry_ops;
237 d_instantiate(direntry, newinode);
239 if((nd->flags & LOOKUP_OPEN) == FALSE) {
240 /* mknod case - do not leave file open */
241 CIFSSMBClose(xid, pTcon, fileHandle);
242 } else if(newinode) {
244 kmalloc(sizeof (struct cifsFileInfo), GFP_KERNEL);
246 if(pCifsFile == NULL)
247 goto cifs_create_out;
248 memset((char *)pCifsFile, 0,
249 sizeof (struct cifsFileInfo));
250 pCifsFile->netfid = fileHandle;
251 pCifsFile->pid = current->tgid;
252 pCifsFile->pInode = newinode;
253 pCifsFile->invalidHandle = FALSE;
254 pCifsFile->closePend = FALSE;
255 init_MUTEX(&pCifsFile->fh_sem);
256 /* set the following in open now
257 pCifsFile->pfile = file; */
258 write_lock(&GlobalSMBSeslock);
259 list_add(&pCifsFile->tlist,&pTcon->openFileList);
260 pCifsInode = CIFS_I(newinode);
262 /* if readable file instance put first in list*/
263 if (write_only == TRUE) {
264 list_add_tail(&pCifsFile->flist,
265 &pCifsInode->openFileList);
267 list_add(&pCifsFile->flist,
268 &pCifsInode->openFileList);
270 if((oplock & 0xF) == OPLOCK_EXCLUSIVE) {
271 pCifsInode->clientCanCacheAll = TRUE;
272 pCifsInode->clientCanCacheRead = TRUE;
273 cFYI(1,("Exclusive Oplock for inode %p",
275 } else if((oplock & 0xF) == OPLOCK_READ)
276 pCifsInode->clientCanCacheRead = TRUE;
278 write_unlock(&GlobalSMBSeslock);
288 int cifs_mknod(struct inode *inode, struct dentry *direntry, int mode, dev_t device_number)
292 struct cifs_sb_info *cifs_sb;
293 struct cifsTconInfo *pTcon;
294 char *full_path = NULL;
295 struct inode * newinode = NULL;
297 if (!old_valid_dev(device_number))
302 cifs_sb = CIFS_SB(inode->i_sb);
303 pTcon = cifs_sb->tcon;
305 down(&direntry->d_sb->s_vfs_rename_sem);
306 full_path = build_path_from_dentry(direntry, cifs_sb);
307 up(&direntry->d_sb->s_vfs_rename_sem);
308 if(full_path == NULL)
310 else if (pTcon->ses->capabilities & CAP_UNIX) {
311 if(cifs_sb->mnt_cifs_flags & CIFS_MOUNT_SET_UID) {
312 rc = CIFSSMBUnixSetPerms(xid, pTcon, full_path,
313 mode,(__u64)current->euid,(__u64)current->egid,
314 device_number, cifs_sb->local_nls,
315 cifs_sb->mnt_cifs_flags &
316 CIFS_MOUNT_MAP_SPECIAL_CHR);
318 rc = CIFSSMBUnixSetPerms(xid, pTcon,
319 full_path, mode, (__u64)-1, (__u64)-1,
320 device_number, cifs_sb->local_nls,
321 cifs_sb->mnt_cifs_flags &
322 CIFS_MOUNT_MAP_SPECIAL_CHR);
326 rc = cifs_get_inode_info_unix(&newinode, full_path,
329 direntry->d_op = &cifs_ci_dentry_ops;
331 direntry->d_op = &cifs_dentry_ops;
333 d_instantiate(direntry, newinode);
336 if(cifs_sb->mnt_cifs_flags & CIFS_MOUNT_UNX_EMUL) {
341 cFYI(1,("sfu compat create special file"));
343 buf = kmalloc(sizeof(FILE_ALL_INFO),GFP_KERNEL);
350 rc = CIFSSMBOpen(xid, pTcon, full_path,
351 FILE_CREATE, /* fail if exists */
352 GENERIC_WRITE /* BB would
353 WRITE_OWNER | WRITE_DAC be better? */,
354 /* Create a file and set the
355 file attribute to SYSTEM */
356 CREATE_NOT_DIR | CREATE_OPTION_SPECIAL,
357 &fileHandle, &oplock, buf,
359 cifs_sb->mnt_cifs_flags &
360 CIFS_MOUNT_MAP_SPECIAL_CHR);
363 /* BB Do not bother to decode buf since no
364 local inode yet to put timestamps in */
365 CIFSSMBClose(xid, pTcon, fileHandle);
369 /* add code here to set EAs */
380 cifs_lookup(struct inode *parent_dir_inode, struct dentry *direntry, struct nameidata *nd)
383 int rc = 0; /* to get around spurious gcc warning, set to zero here */
384 struct cifs_sb_info *cifs_sb;
385 struct cifsTconInfo *pTcon;
386 struct inode *newInode = NULL;
387 char *full_path = NULL;
392 (" parent inode = 0x%p name is: %s and dentry = 0x%p",
393 parent_dir_inode, direntry->d_name.name, direntry));
395 /* BB Add check of incoming data - e.g. frame not longer than maximum SMB - let server check the namelen BB */
397 /* check whether path exists */
399 cifs_sb = CIFS_SB(parent_dir_inode->i_sb);
400 pTcon = cifs_sb->tcon;
402 /* can not grab the rename sem here since it would
403 deadlock in the cases (beginning of sys_rename itself)
404 in which we already have the sb rename sem */
405 full_path = build_path_from_dentry(direntry, cifs_sb);
406 if(full_path == NULL) {
408 return ERR_PTR(-ENOMEM);
411 if (direntry->d_inode != NULL) {
412 cFYI(1, (" non-NULL inode in lookup"));
414 cFYI(1, (" NULL inode in lookup"));
417 (" Full path: %s inode = 0x%p", full_path, direntry->d_inode));
419 if (pTcon->ses->capabilities & CAP_UNIX)
420 rc = cifs_get_inode_info_unix(&newInode, full_path,
421 parent_dir_inode->i_sb,xid);
423 rc = cifs_get_inode_info(&newInode, full_path, NULL,
424 parent_dir_inode->i_sb,xid);
426 if ((rc == 0) && (newInode != NULL)) {
428 direntry->d_op = &cifs_ci_dentry_ops;
430 direntry->d_op = &cifs_dentry_ops;
431 d_add(direntry, newInode);
433 /* since paths are not looked up by component - the parent directories are presumed to be good here */
434 renew_parental_timestamps(direntry);
436 } else if (rc == -ENOENT) {
438 d_add(direntry, NULL);
440 cERROR(1,("Error 0x%x on cifs_get_inode_info in lookup of %s",
442 /* BB special case check for Access Denied - watch security
443 exposure of returning dir info implicitly via different rc
444 if file exists or not but no access BB */
453 cifs_d_revalidate(struct dentry *direntry, struct nameidata *nd)
457 /* lock_kernel(); *//* surely we do not want to lock the kernel for a whole network round trip which could take seconds */
459 if (direntry->d_inode) {
460 if (cifs_revalidate(direntry)) {
461 /* unlock_kernel(); */
466 ("In cifs_d_revalidate with no inode but name = %s and dentry 0x%p",
467 direntry->d_name.name, direntry));
470 /* unlock_kernel(); */
475 /* static int cifs_d_delete(struct dentry *direntry)
479 cFYI(1, ("In cifs d_delete, name = %s", direntry->d_name.name));
484 struct dentry_operations cifs_dentry_ops = {
485 .d_revalidate = cifs_d_revalidate,
486 /* d_delete: cifs_d_delete, *//* not needed except for debugging */
487 /* no need for d_hash, d_compare, d_release, d_iput ... yet. BB confirm this BB */
490 static int cifs_ci_hash(struct dentry *dentry, struct qstr *q)
492 struct nls_table *codepage = CIFS_SB(dentry->d_inode->i_sb)->local_nls;
496 hash = init_name_hash();
497 for (i = 0; i < q->len; i++)
498 hash = partial_name_hash(nls_tolower(codepage, q->name[i]),
500 q->hash = end_name_hash(hash);
505 static int cifs_ci_compare(struct dentry *dentry, struct qstr *a,
508 struct nls_table *codepage = CIFS_SB(dentry->d_inode->i_sb)->local_nls;
510 if ((a->len == b->len) &&
511 (nls_strnicmp(codepage, a->name, b->name, a->len) == 0)) {
513 * To preserve case, don't let an existing negative dentry's
514 * case take precedence. If a is not a negative dentry, this
515 * should have no side effects
517 memcpy((unsigned char *)a->name, b->name, a->len);
523 struct dentry_operations cifs_ci_dentry_ops = {
524 .d_revalidate = cifs_d_revalidate,
525 .d_hash = cifs_ci_hash,
526 .d_compare = cifs_ci_compare,