2021-06-18 00:31:49 -05:00
|
|
|
// SPDX-License-Identifier: LGPL-2.1
|
2005-04-16 15:20:36 -07:00
|
|
|
/*
|
|
|
|
*
|
|
|
|
* vfs operations that deal with dentries
|
2007-06-05 18:30:44 +00:00
|
|
|
*
|
2009-02-20 04:32:45 +00:00
|
|
|
* Copyright (C) International Business Machines Corp., 2002,2009
|
2005-04-16 15:20:36 -07:00
|
|
|
* Author(s): Steve French (sfrench@us.ibm.com)
|
|
|
|
*
|
|
|
|
*/
|
|
|
|
#include <linux/fs.h>
|
|
|
|
#include <linux/stat.h>
|
|
|
|
#include <linux/slab.h>
|
|
|
|
#include <linux/namei.h>
|
2009-09-21 06:47:50 -04:00
|
|
|
#include <linux/mount.h>
|
2010-06-16 13:40:16 -04:00
|
|
|
#include <linux/file.h>
|
2005-04-16 15:20:36 -07:00
|
|
|
#include "cifsfs.h"
|
|
|
|
#include "cifspdu.h"
|
|
|
|
#include "cifsglob.h"
|
|
|
|
#include "cifsproto.h"
|
|
|
|
#include "cifs_debug.h"
|
|
|
|
#include "cifs_fs_sb.h"
|
2013-09-05 08:38:11 -04:00
|
|
|
#include "cifs_unicode.h"
|
2020-12-09 23:07:12 -06:00
|
|
|
#include "fs_context.h"
|
2021-04-29 00:18:43 -05:00
|
|
|
#include "cifs_ioctl.h"
|
cifs: Support fscache indexing rewrite
Change the cifs filesystem to take account of the changes to fscache's
indexing rewrite and reenable caching in cifs.
The following changes have been made:
(1) The fscache_netfs struct is no more, and there's no need to register
the filesystem as a whole.
(2) The session cookie is now an fscache_volume cookie, allocated with
fscache_acquire_volume(). That takes three parameters: a string
representing the "volume" in the index, a string naming the cache to
use (or NULL) and a u64 that conveys coherency metadata for the
volume.
For cifs, I've made it render the volume name string as:
"cifs,<ipaddress>,<sharename>"
where the sharename has '/' characters replaced with ';'.
This probably needs rethinking a bit as the total name could exceed
the maximum filename component length.
Further, the coherency data is currently just set to 0. It needs
something else doing with it - I wonder if it would suffice simply to
sum the resource_id, vol_create_time and vol_serial_number or maybe
hash them.
(3) The fscache_cookie_def is no more and needed information is passed
directly to fscache_acquire_cookie(). The cache no longer calls back
into the filesystem, but rather metadata changes are indicated at
other times.
fscache_acquire_cookie() is passed the same keying and coherency
information as before.
(4) The functions to set/reset cookies are removed and
fscache_use_cookie() and fscache_unuse_cookie() are used instead.
fscache_use_cookie() is passed a flag to indicate if the cookie is
opened for writing. fscache_unuse_cookie() is passed updates for the
metadata if we changed it (ie. if the file was opened for writing).
These are called when the file is opened or closed.
(5) cifs_setattr_*() are made to call fscache_resize() to change the size
of the cache object.
(6) The functions to read and write data are stubbed out pending a
conversion to use netfslib.
Changes
=======
ver #8:
- Abstract cache invalidation into a helper function.
- Fix some checkpatch warnings[3].
ver #7:
- Removed the accidentally added-back call to get the super cookie in
cifs_root_iget().
- Fixed the right call to cifs_fscache_get_super_cookie() to take account
of the "-o fsc" mount flag.
ver #6:
- Moved the change of gfpflags_allow_blocking() to current_is_kswapd() for
cifs here.
- Fixed one of the error paths in cifs_atomic_open() to jump around the
call to use the cookie.
- Fixed an additional successful return in the middle of cifs_open() to
use the cookie on the way out.
- Only get a volume cookie (and thus inode cookies) when "-o fsc" is
supplied to mount.
ver #5:
- Fixed a couple of bits of cookie handling[2]:
- The cookie should be released in cifs_evict_inode(), not
cifsFileInfo_put_final(). The cookie needs to persist beyond file
closure so that writepages will be able to write to it.
- fscache_use_cookie() needs to be called in cifs_atomic_open() as it is
for cifs_open().
ver #4:
- Fixed the use of sizeof with memset.
- tcon->vol_create_time is __le64 so doesn't need cpu_to_le64().
ver #3:
- Canonicalise the cifs coherency data to make the cache portable.
- Set volume coherency data.
ver #2:
- Use gfpflags_allow_blocking() rather than using flag directly.
- Upgraded to -rc4 to allow for upstream changes[1].
- fscache_acquire_volume() now returns errors.
Signed-off-by: David Howells <dhowells@redhat.com>
Acked-by: Jeff Layton <jlayton@kernel.org>
cc: Steve French <smfrench@gmail.com>
cc: Shyam Prasad N <nspmangalore@gmail.com>
cc: linux-cifs@vger.kernel.org
cc: linux-cachefs@redhat.com
Link: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=23b55d673d7527b093cd97b7c217c82e70cd1af0 [1]
Link: https://lore.kernel.org/r/3419813.1641592362@warthog.procyon.org.uk/ [2]
Link: https://lore.kernel.org/r/CAH2r5muTanw9pJqzAHd01d9A8keeChkzGsCEH6=0rHutVLAF-A@mail.gmail.com/ [3]
Link: https://lore.kernel.org/r/163819671009.215744.11230627184193298714.stgit@warthog.procyon.org.uk/ # v1
Link: https://lore.kernel.org/r/163906982979.143852.10672081929614953210.stgit@warthog.procyon.org.uk/ # v2
Link: https://lore.kernel.org/r/163967187187.1823006.247415138444991444.stgit@warthog.procyon.org.uk/ # v3
Link: https://lore.kernel.org/r/164021579335.640689.2681324337038770579.stgit@warthog.procyon.org.uk/ # v4
Link: https://lore.kernel.org/r/3462849.1641593783@warthog.procyon.org.uk/ # v5
Link: https://lore.kernel.org/r/1318953.1642024578@warthog.procyon.org.uk/ # v6
Signed-off-by: Steve French <stfrench@microsoft.com>
2020-11-17 15:56:59 +00:00
|
|
|
#include "fscache.h"
|
2025-05-28 17:30:03 -03:00
|
|
|
#include "cached_dir.h"
|
2005-04-16 15:20:36 -07:00
|
|
|
|
2007-02-27 05:35:17 +00:00
|
|
|
static void
|
2005-04-16 15:20:36 -07:00
|
|
|
renew_parental_timestamps(struct dentry *direntry)
|
|
|
|
{
|
2007-06-05 18:30:44 +00:00
|
|
|
/* BB check if there is a way to get the kernel to do this or if we
|
|
|
|
really need this */
|
2005-04-16 15:20:36 -07:00
|
|
|
do {
|
2016-09-16 12:44:21 +02:00
|
|
|
cifs_set_time(direntry, jiffies);
|
2005-04-16 15:20:36 -07:00
|
|
|
direntry = direntry->d_parent;
|
2007-06-05 18:30:44 +00:00
|
|
|
} while (!IS_ROOT(direntry));
|
2005-04-16 15:20:36 -07:00
|
|
|
}
|
|
|
|
|
2012-11-28 22:34:41 -06:00
|
|
|
char *
|
2020-12-09 23:07:12 -06:00
|
|
|
cifs_build_path_to_root(struct smb3_fs_context *ctx, struct cifs_sb_info *cifs_sb,
|
2016-12-15 12:31:19 +05:30
|
|
|
struct cifs_tcon *tcon, int add_treename)
|
2012-11-28 22:34:41 -06:00
|
|
|
{
|
2020-12-09 23:07:12 -06:00
|
|
|
int pplen = ctx->prepath ? strlen(ctx->prepath) + 1 : 0;
|
2012-11-28 22:34:41 -06:00
|
|
|
int dfsplen;
|
|
|
|
char *full_path = NULL;
|
|
|
|
|
|
|
|
/* if no prefix path, simply set path to the root of share to "" */
|
|
|
|
if (pplen == 0) {
|
|
|
|
full_path = kzalloc(1, GFP_KERNEL);
|
|
|
|
return full_path;
|
|
|
|
}
|
|
|
|
|
2016-12-15 12:31:19 +05:30
|
|
|
if (add_treename)
|
2022-09-21 14:05:53 -05:00
|
|
|
dfsplen = strnlen(tcon->tree_name, MAX_TREE_SIZE + 1);
|
2012-11-28 22:34:41 -06:00
|
|
|
else
|
|
|
|
dfsplen = 0;
|
|
|
|
|
|
|
|
full_path = kmalloc(dfsplen + pplen + 1, GFP_KERNEL);
|
|
|
|
if (full_path == NULL)
|
|
|
|
return full_path;
|
|
|
|
|
|
|
|
if (dfsplen)
|
2022-09-21 14:05:53 -05:00
|
|
|
memcpy(full_path, tcon->tree_name, dfsplen);
|
2012-12-10 06:10:45 -05:00
|
|
|
full_path[dfsplen] = CIFS_DIR_SEP(cifs_sb);
|
2020-12-09 23:07:12 -06:00
|
|
|
memcpy(full_path + dfsplen + 1, ctx->prepath, pplen);
|
2012-11-28 22:34:41 -06:00
|
|
|
convert_delimiter(full_path, CIFS_DIR_SEP(cifs_sb));
|
|
|
|
return full_path;
|
|
|
|
}
|
|
|
|
|
2005-04-16 15:20:36 -07:00
|
|
|
/* Note: caller must free return buffer */
|
2021-03-18 15:47:35 -04:00
|
|
|
const char *
|
2021-03-05 17:36:04 -05:00
|
|
|
build_path_from_dentry(struct dentry *direntry, void *page)
|
2017-02-13 16:14:17 +01:00
|
|
|
{
|
|
|
|
struct cifs_sb_info *cifs_sb = CIFS_SB(direntry->d_sb);
|
|
|
|
struct cifs_tcon *tcon = cifs_sb_master_tcon(cifs_sb);
|
|
|
|
bool prefix = tcon->Flags & SMB_SHARE_IS_IN_DFS;
|
|
|
|
|
2021-03-05 17:36:04 -05:00
|
|
|
return build_path_from_dentry_optional_prefix(direntry, page,
|
2017-02-13 16:14:17 +01:00
|
|
|
prefix);
|
|
|
|
}
|
|
|
|
|
2022-12-18 14:37:32 -03:00
|
|
|
char *__build_path_from_dentry_optional_prefix(struct dentry *direntry, void *page,
|
|
|
|
const char *tree, int tree_len,
|
|
|
|
bool prefix)
|
2005-04-16 15:20:36 -07:00
|
|
|
{
|
2008-05-15 01:50:56 +00:00
|
|
|
int dfsplen;
|
2016-05-25 19:59:09 +02:00
|
|
|
int pplen = 0;
|
2010-09-20 16:01:35 -07:00
|
|
|
struct cifs_sb_info *cifs_sb = CIFS_SB(direntry->d_sb);
|
2021-03-05 21:53:48 -05:00
|
|
|
char dirsep = CIFS_DIR_SEP(cifs_sb);
|
|
|
|
char *s;
|
2005-04-16 15:20:36 -07:00
|
|
|
|
2021-03-05 17:36:04 -05:00
|
|
|
if (unlikely(!page))
|
|
|
|
return ERR_PTR(-ENOMEM);
|
|
|
|
|
2017-02-13 16:14:17 +01:00
|
|
|
if (prefix)
|
2022-12-18 14:37:32 -03:00
|
|
|
dfsplen = strnlen(tree, tree_len + 1);
|
2008-05-15 01:50:56 +00:00
|
|
|
else
|
|
|
|
dfsplen = 0;
|
2016-05-25 19:59:09 +02:00
|
|
|
|
|
|
|
if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_USE_PREFIX_PATH)
|
|
|
|
pplen = cifs_sb->prepath ? strlen(cifs_sb->prepath) + 1 : 0;
|
|
|
|
|
2021-08-10 16:33:55 +10:00
|
|
|
s = dentry_path_raw(direntry, page, PATH_MAX);
|
2021-03-05 21:53:48 -05:00
|
|
|
if (IS_ERR(s))
|
|
|
|
return s;
|
|
|
|
if (!s[1]) // for root we want "", not "/"
|
|
|
|
s++;
|
|
|
|
if (s < (char *)page + pplen + dfsplen)
|
2021-03-05 17:36:04 -05:00
|
|
|
return ERR_PTR(-ENAMETOOLONG);
|
2016-05-25 19:59:09 +02:00
|
|
|
if (pplen) {
|
|
|
|
cifs_dbg(FYI, "using cifs_sb prepath <%s>\n", cifs_sb->prepath);
|
2021-03-05 21:53:48 -05:00
|
|
|
s -= pplen;
|
|
|
|
memcpy(s + 1, cifs_sb->prepath, pplen - 1);
|
|
|
|
*s = '/';
|
2016-05-25 19:59:09 +02:00
|
|
|
}
|
2021-03-05 21:53:48 -05:00
|
|
|
if (dirsep != '/') {
|
|
|
|
/* BB test paths to Windows with '/' in the midst of prepath */
|
|
|
|
char *p;
|
2016-05-25 19:59:09 +02:00
|
|
|
|
2021-03-05 21:53:48 -05:00
|
|
|
for (p = s; *p; p++)
|
|
|
|
if (*p == '/')
|
|
|
|
*p = dirsep;
|
|
|
|
}
|
2008-05-15 01:50:56 +00:00
|
|
|
if (dfsplen) {
|
2021-03-05 21:53:48 -05:00
|
|
|
s -= dfsplen;
|
2022-12-18 14:37:32 -03:00
|
|
|
memcpy(s, tree, dfsplen);
|
2008-05-15 01:50:56 +00:00
|
|
|
if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_POSIX_PATHS) {
|
|
|
|
int i;
|
|
|
|
for (i = 0; i < dfsplen; i++) {
|
2021-03-05 21:53:48 -05:00
|
|
|
if (s[i] == '\\')
|
|
|
|
s[i] = '/';
|
2008-05-15 01:50:56 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
2021-03-05 21:53:48 -05:00
|
|
|
return s;
|
2005-04-16 15:20:36 -07:00
|
|
|
}
|
|
|
|
|
2022-12-18 14:37:32 -03:00
|
|
|
char *build_path_from_dentry_optional_prefix(struct dentry *direntry, void *page,
|
|
|
|
bool prefix)
|
|
|
|
{
|
|
|
|
struct cifs_sb_info *cifs_sb = CIFS_SB(direntry->d_sb);
|
|
|
|
struct cifs_tcon *tcon = cifs_sb_master_tcon(cifs_sb);
|
|
|
|
|
|
|
|
return __build_path_from_dentry_optional_prefix(direntry, page, tcon->tree_name,
|
|
|
|
MAX_TREE_SIZE, prefix);
|
|
|
|
}
|
|
|
|
|
2012-06-05 15:10:23 +02:00
|
|
|
/*
|
2017-08-23 14:48:14 +10:00
|
|
|
* Don't allow path components longer than the server max.
|
2012-06-05 15:10:23 +02:00
|
|
|
* Don't allow the separator character in a path component.
|
|
|
|
* The VFS will not allow "/", but "\" is allowed by posix.
|
|
|
|
*/
|
|
|
|
static int
|
2017-08-23 14:48:14 +10:00
|
|
|
check_name(struct dentry *direntry, struct cifs_tcon *tcon)
|
2012-06-05 15:10:23 +02:00
|
|
|
{
|
|
|
|
struct cifs_sb_info *cifs_sb = CIFS_SB(direntry->d_sb);
|
|
|
|
int i;
|
|
|
|
|
2017-10-30 13:28:03 +11:00
|
|
|
if (unlikely(tcon->fsAttrInfo.MaxPathNameComponentLength &&
|
|
|
|
direntry->d_name.len >
|
2017-08-27 16:56:08 -05:00
|
|
|
le32_to_cpu(tcon->fsAttrInfo.MaxPathNameComponentLength)))
|
2017-08-23 14:48:14 +10:00
|
|
|
return -ENAMETOOLONG;
|
|
|
|
|
2012-06-05 15:10:23 +02:00
|
|
|
if (!(cifs_sb->mnt_cifs_flags & CIFS_MOUNT_POSIX_PATHS)) {
|
|
|
|
for (i = 0; i < direntry->d_name.len; i++) {
|
|
|
|
if (direntry->d_name.name[i] == '\\') {
|
2013-05-04 22:12:25 -05:00
|
|
|
cifs_dbg(FYI, "Invalid file name\n");
|
2012-06-05 15:10:23 +02:00
|
|
|
return -EINVAL;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2006-05-31 22:40:51 +00:00
|
|
|
/* Inode operations in similar order to how they appear in Linux file fs.h */
|
2005-04-16 15:20:36 -07:00
|
|
|
|
2022-10-03 18:43:50 -03:00
|
|
|
static int cifs_do_create(struct inode *inode, struct dentry *direntry, unsigned int xid,
|
|
|
|
struct tcon_link *tlink, unsigned int oflags, umode_t mode, __u32 *oplock,
|
|
|
|
struct cifs_fid *fid, struct cifs_open_info_data *buf)
|
2005-04-16 15:20:36 -07:00
|
|
|
{
|
|
|
|
int rc = -ENOENT;
|
2008-05-09 22:28:02 +00:00
|
|
|
int create_options = CREATE_NOT_DIR;
|
2012-09-18 16:20:27 -07:00
|
|
|
int desired_access;
|
2012-06-05 15:10:23 +02:00
|
|
|
struct cifs_sb_info *cifs_sb = CIFS_SB(inode->i_sb);
|
|
|
|
struct cifs_tcon *tcon = tlink_tcon(tlink);
|
2021-03-05 17:36:04 -05:00
|
|
|
const char *full_path;
|
|
|
|
void *page = alloc_dentry_path();
|
2005-04-16 15:20:36 -07:00
|
|
|
struct inode *newinode = NULL;
|
2012-06-05 15:10:23 +02:00
|
|
|
int disposition;
|
2012-09-18 16:20:27 -07:00
|
|
|
struct TCP_Server_Info *server = tcon->ses->server;
|
2013-07-05 12:00:30 +04:00
|
|
|
struct cifs_open_parms oparms;
|
2025-07-01 00:23:03 +05:30
|
|
|
struct cached_fid *parent_cfid = NULL;
|
2024-04-02 10:11:35 +01:00
|
|
|
int rdwr_for_fscache = 0;
|
2025-05-28 17:30:03 -03:00
|
|
|
__le32 lease_flags = 0;
|
2005-04-16 15:20:36 -07:00
|
|
|
|
2012-06-05 15:10:23 +02:00
|
|
|
*oplock = 0;
|
2012-03-20 12:55:09 +03:00
|
|
|
if (tcon->ses->server->oplocks)
|
2012-06-05 15:10:23 +02:00
|
|
|
*oplock = REQ_OPLOCK;
|
2009-02-20 04:32:45 +00:00
|
|
|
|
2021-03-05 17:36:04 -05:00
|
|
|
full_path = build_path_from_dentry(direntry, page);
|
|
|
|
if (IS_ERR(full_path)) {
|
|
|
|
free_dentry_path(page);
|
|
|
|
return PTR_ERR(full_path);
|
|
|
|
}
|
2010-09-29 19:51:11 -04:00
|
|
|
|
2024-04-02 10:11:35 +01:00
|
|
|
/* If we're caching, we need to be able to fill in around partial writes. */
|
|
|
|
if (cifs_fscache_enabled(inode) && (oflags & O_ACCMODE) == O_WRONLY)
|
|
|
|
rdwr_for_fscache = 1;
|
|
|
|
|
2022-08-01 11:17:46 -05:00
|
|
|
#ifdef CONFIG_CIFS_ALLOW_INSECURE_LEGACY
|
2012-07-13 13:58:14 +04:00
|
|
|
if (tcon->unix_ext && cap_unix(tcon->ses) && !tcon->broken_posix_open &&
|
2009-02-20 04:32:45 +00:00
|
|
|
(CIFS_UNIX_POSIX_PATH_OPS_CAP &
|
|
|
|
le64_to_cpu(tcon->fsUnixInfo.Capability))) {
|
2012-09-18 16:20:27 -07:00
|
|
|
rc = cifs_posix_open(full_path, &newinode, inode->i_sb, mode,
|
|
|
|
oflags, oplock, &fid->netfid, xid);
|
2012-06-05 15:10:23 +02:00
|
|
|
switch (rc) {
|
|
|
|
case 0:
|
|
|
|
if (newinode == NULL) {
|
|
|
|
/* query inode info */
|
2009-05-08 03:04:30 +00:00
|
|
|
goto cifs_create_get_file_info;
|
2012-06-05 15:10:23 +02:00
|
|
|
}
|
|
|
|
|
2016-07-07 21:28:27 +01:00
|
|
|
if (S_ISDIR(newinode->i_mode)) {
|
|
|
|
CIFSSMBClose(xid, tcon, fid->netfid);
|
|
|
|
iput(newinode);
|
|
|
|
rc = -EISDIR;
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
|
2012-06-05 15:10:23 +02:00
|
|
|
if (!S_ISREG(newinode->i_mode)) {
|
|
|
|
/*
|
|
|
|
* The server may allow us to open things like
|
|
|
|
* FIFOs, but the client isn't set up to deal
|
|
|
|
* with that. If it's not a regular file, just
|
|
|
|
* close it and proceed as if it were a normal
|
|
|
|
* lookup.
|
|
|
|
*/
|
2012-09-18 16:20:27 -07:00
|
|
|
CIFSSMBClose(xid, tcon, fid->netfid);
|
2012-06-05 15:10:23 +02:00
|
|
|
goto cifs_create_get_file_info;
|
|
|
|
}
|
|
|
|
/* success, no need to query */
|
|
|
|
goto cifs_create_set_dentry;
|
|
|
|
|
|
|
|
case -ENOENT:
|
|
|
|
goto cifs_create_get_file_info;
|
|
|
|
|
|
|
|
case -EIO:
|
|
|
|
case -EINVAL:
|
|
|
|
/*
|
|
|
|
* EIO could indicate that (posix open) operation is not
|
|
|
|
* supported, despite what server claimed in capability
|
|
|
|
* negotiation.
|
|
|
|
*
|
|
|
|
* POSIX open in samba versions 3.3.1 and earlier could
|
|
|
|
* incorrectly fail with invalid parameter.
|
|
|
|
*/
|
|
|
|
tcon->broken_posix_open = true;
|
|
|
|
break;
|
|
|
|
|
|
|
|
case -EREMOTE:
|
|
|
|
case -EOPNOTSUPP:
|
|
|
|
/*
|
|
|
|
* EREMOTE indicates DFS junction, which is not handled
|
|
|
|
* in posix open. If either that or op not supported
|
|
|
|
* returned, follow the normal lookup.
|
|
|
|
*/
|
|
|
|
break;
|
2005-09-06 15:18:26 -07:00
|
|
|
|
2012-06-05 15:10:23 +02:00
|
|
|
default:
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
/*
|
|
|
|
* fallthrough to retry, using older open call, this is case
|
|
|
|
* where server does not support this SMB level, and falsely
|
|
|
|
* claims capability (also get here for DFS case which should be
|
|
|
|
* rare for path not covered on files)
|
|
|
|
*/
|
2005-04-16 15:20:36 -07:00
|
|
|
}
|
2022-08-01 11:17:46 -05:00
|
|
|
#endif /* CONFIG_CIFS_ALLOW_INSECURE_LEGACY */
|
2005-04-16 15:20:36 -07:00
|
|
|
|
2012-09-18 16:20:27 -07:00
|
|
|
desired_access = 0;
|
2012-06-05 15:10:23 +02:00
|
|
|
if (OPEN_FMODE(oflags) & FMODE_READ)
|
2012-09-18 16:20:27 -07:00
|
|
|
desired_access |= GENERIC_READ; /* is this too little? */
|
2012-06-05 15:10:23 +02:00
|
|
|
if (OPEN_FMODE(oflags) & FMODE_WRITE)
|
2012-09-18 16:20:27 -07:00
|
|
|
desired_access |= GENERIC_WRITE;
|
2024-04-02 10:11:35 +01:00
|
|
|
if (rdwr_for_fscache == 1)
|
|
|
|
desired_access |= GENERIC_READ;
|
2012-06-05 15:10:23 +02:00
|
|
|
|
|
|
|
disposition = FILE_OVERWRITE_IF;
|
|
|
|
if ((oflags & (O_CREAT | O_EXCL)) == (O_CREAT | O_EXCL))
|
|
|
|
disposition = FILE_CREATE;
|
|
|
|
else if ((oflags & (O_CREAT | O_TRUNC)) == (O_CREAT | O_TRUNC))
|
|
|
|
disposition = FILE_OVERWRITE_IF;
|
|
|
|
else if ((oflags & O_CREAT) == O_CREAT)
|
|
|
|
disposition = FILE_OPEN_IF;
|
|
|
|
else
|
2013-05-04 22:12:25 -05:00
|
|
|
cifs_dbg(FYI, "Create flag not set in create function\n");
|
2012-06-05 15:10:23 +02:00
|
|
|
|
2012-09-18 16:20:27 -07:00
|
|
|
/*
|
|
|
|
* BB add processing to set equivalent of mode - e.g. via CreateX with
|
|
|
|
* ACLs
|
|
|
|
*/
|
|
|
|
|
|
|
|
if (!server->ops->open) {
|
|
|
|
rc = -ENOSYS;
|
|
|
|
goto out;
|
|
|
|
}
|
2005-04-16 15:20:36 -07:00
|
|
|
|
2008-05-09 22:28:02 +00:00
|
|
|
/*
|
|
|
|
* if we're not using unix extensions, see if we need to set
|
|
|
|
* ATTR_READONLY on the create call
|
|
|
|
*/
|
2009-01-19 02:38:35 +00:00
|
|
|
if (!tcon->unix_ext && (mode & S_IWUGO) == 0)
|
2008-05-09 22:28:02 +00:00
|
|
|
create_options |= CREATE_OPTION_READONLY;
|
|
|
|
|
2025-07-01 00:23:03 +05:30
|
|
|
|
2024-04-02 10:11:35 +01:00
|
|
|
retry_open:
|
2025-05-28 17:30:03 -03:00
|
|
|
if (tcon->cfids && direntry->d_parent && server->dialect >= SMB30_PROT_ID) {
|
2025-07-01 00:23:03 +05:30
|
|
|
parent_cfid = NULL;
|
2025-05-28 17:30:03 -03:00
|
|
|
spin_lock(&tcon->cfids->cfid_list_lock);
|
|
|
|
list_for_each_entry(parent_cfid, &tcon->cfids->entries, entry) {
|
|
|
|
if (parent_cfid->dentry == direntry->d_parent) {
|
|
|
|
cifs_dbg(FYI, "found a parent cached file handle\n");
|
|
|
|
if (parent_cfid->has_lease && parent_cfid->time) {
|
|
|
|
lease_flags
|
|
|
|
|= SMB2_LEASE_FLAG_PARENT_LEASE_KEY_SET_LE;
|
|
|
|
memcpy(fid->parent_lease_key,
|
|
|
|
parent_cfid->fid.lease_key,
|
|
|
|
SMB2_LEASE_KEY_SIZE);
|
2025-07-01 00:23:03 +05:30
|
|
|
parent_cfid->dirents.is_valid = false;
|
2025-05-28 17:30:03 -03:00
|
|
|
}
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
spin_unlock(&tcon->cfids->cfid_list_lock);
|
|
|
|
}
|
|
|
|
|
2023-01-11 12:37:58 +01:00
|
|
|
oparms = (struct cifs_open_parms) {
|
|
|
|
.tcon = tcon,
|
|
|
|
.cifs_sb = cifs_sb,
|
|
|
|
.desired_access = desired_access,
|
|
|
|
.create_options = cifs_create_options(cifs_sb, create_options),
|
|
|
|
.disposition = disposition,
|
|
|
|
.path = full_path,
|
|
|
|
.fid = fid,
|
2025-05-28 17:30:03 -03:00
|
|
|
.lease_flags = lease_flags,
|
2023-01-11 12:37:58 +01:00
|
|
|
.mode = mode,
|
|
|
|
};
|
2013-07-05 12:00:30 +04:00
|
|
|
rc = server->ops->open(xid, &oparms, oplock, buf);
|
2005-04-16 15:20:36 -07:00
|
|
|
if (rc) {
|
2013-05-04 22:12:25 -05:00
|
|
|
cifs_dbg(FYI, "cifs_create returned 0x%x\n", rc);
|
2024-04-02 10:11:35 +01:00
|
|
|
if (rc == -EACCES && rdwr_for_fscache == 1) {
|
|
|
|
desired_access &= ~GENERIC_READ;
|
|
|
|
rdwr_for_fscache = 2;
|
|
|
|
goto retry_open;
|
|
|
|
}
|
2012-06-05 15:10:23 +02:00
|
|
|
goto out;
|
2009-02-20 04:32:45 +00:00
|
|
|
}
|
2024-04-02 10:11:35 +01:00
|
|
|
if (rdwr_for_fscache == 2)
|
|
|
|
cifs_invalidate_cache(inode, FSCACHE_INVAL_DIO_WRITE);
|
2009-02-20 04:32:45 +00:00
|
|
|
|
2022-08-01 11:17:46 -05:00
|
|
|
#ifdef CONFIG_CIFS_ALLOW_INSECURE_LEGACY
|
2012-09-18 16:20:27 -07:00
|
|
|
/*
|
|
|
|
* If Open reported that we actually created a file then we now have to
|
|
|
|
* set the mode if possible.
|
|
|
|
*/
|
2012-06-05 15:10:23 +02:00
|
|
|
if ((tcon->unix_ext) && (*oplock & CIFS_CREATE_ACTION)) {
|
2009-02-20 04:32:45 +00:00
|
|
|
struct cifs_unix_set_info_args args = {
|
2008-08-02 07:26:12 -04:00
|
|
|
.mode = mode,
|
|
|
|
.ctime = NO_CHANGE_64,
|
|
|
|
.atime = NO_CHANGE_64,
|
|
|
|
.mtime = NO_CHANGE_64,
|
|
|
|
.device = 0,
|
2009-02-20 04:32:45 +00:00
|
|
|
};
|
|
|
|
|
|
|
|
if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_SET_UID) {
|
2013-02-06 00:57:56 -08:00
|
|
|
args.uid = current_fsuid();
|
2009-02-20 04:32:45 +00:00
|
|
|
if (inode->i_mode & S_ISGID)
|
2013-02-06 00:57:56 -08:00
|
|
|
args.gid = inode->i_gid;
|
2009-02-20 04:32:45 +00:00
|
|
|
else
|
2013-02-06 00:57:56 -08:00
|
|
|
args.gid = current_fsgid();
|
2007-06-08 14:55:14 +00:00
|
|
|
} else {
|
2013-02-06 00:57:56 -08:00
|
|
|
args.uid = INVALID_UID; /* no change */
|
|
|
|
args.gid = INVALID_GID; /* no change */
|
2005-04-16 15:20:36 -07:00
|
|
|
}
|
2012-09-18 16:20:27 -07:00
|
|
|
CIFSSMBUnixSetFileInfo(xid, tcon, &args, fid->netfid,
|
|
|
|
current->tgid);
|
2009-02-20 04:32:45 +00:00
|
|
|
} else {
|
2012-09-18 16:20:27 -07:00
|
|
|
/*
|
|
|
|
* BB implement mode setting via Windows security
|
|
|
|
* descriptors e.g.
|
|
|
|
*/
|
2009-02-20 04:32:45 +00:00
|
|
|
/* CIFSSMBWinSetPerms(xid,tcon,path,mode,-1,-1,nls);*/
|
|
|
|
|
|
|
|
/* Could set r/o dos attribute if mode & 0222 == 0 */
|
|
|
|
}
|
2005-04-16 15:20:36 -07:00
|
|
|
|
2009-02-20 04:32:45 +00:00
|
|
|
cifs_create_get_file_info:
|
|
|
|
/* server might mask mode so we have to query for it */
|
|
|
|
if (tcon->unix_ext)
|
2012-09-18 16:20:27 -07:00
|
|
|
rc = cifs_get_inode_info_unix(&newinode, full_path, inode->i_sb,
|
|
|
|
xid);
|
2009-02-20 04:32:45 +00:00
|
|
|
else {
|
2022-08-01 11:17:46 -05:00
|
|
|
#else
|
|
|
|
{
|
|
|
|
#endif /* CONFIG_CIFS_ALLOW_INSECURE_LEGACY */
|
2020-06-11 22:43:01 -05:00
|
|
|
/* TODO: Add support for calling POSIX query info here, but passing in fid */
|
2022-10-03 18:43:50 -03:00
|
|
|
rc = cifs_get_inode_info(&newinode, full_path, buf, inode->i_sb, xid, fid);
|
2009-02-20 04:32:45 +00:00
|
|
|
if (newinode) {
|
2012-09-19 06:22:44 -07:00
|
|
|
if (server->ops->set_lease_key)
|
|
|
|
server->ops->set_lease_key(newinode, fid);
|
2021-02-11 15:04:35 -05:00
|
|
|
if ((*oplock & CIFS_CREATE_ACTION) && S_ISREG(newinode->i_mode)) {
|
|
|
|
if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_DYNPERM)
|
|
|
|
newinode->i_mode = mode;
|
|
|
|
if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_SET_UID) {
|
|
|
|
newinode->i_uid = current_fsuid();
|
|
|
|
if (inode->i_mode & S_ISGID)
|
|
|
|
newinode->i_gid = inode->i_gid;
|
|
|
|
else
|
|
|
|
newinode->i_gid = current_fsgid();
|
|
|
|
}
|
2005-11-29 20:20:10 -08:00
|
|
|
}
|
2005-04-16 15:20:36 -07:00
|
|
|
}
|
2009-02-20 04:32:45 +00:00
|
|
|
}
|
2005-04-16 15:20:36 -07:00
|
|
|
|
2022-08-01 11:17:46 -05:00
|
|
|
#ifdef CONFIG_CIFS_ALLOW_INSECURE_LEGACY
|
2009-02-20 04:32:45 +00:00
|
|
|
cifs_create_set_dentry:
|
2022-08-01 11:17:46 -05:00
|
|
|
#endif /* CONFIG_CIFS_ALLOW_INSECURE_LEGACY */
|
2012-06-05 15:10:23 +02:00
|
|
|
if (rc != 0) {
|
2013-05-04 22:12:25 -05:00
|
|
|
cifs_dbg(FYI, "Create worked, get_inode_info failed rc = %d\n",
|
|
|
|
rc);
|
2016-07-07 21:28:27 +01:00
|
|
|
goto out_err;
|
2012-06-05 15:10:23 +02:00
|
|
|
}
|
2016-07-07 21:28:27 +01:00
|
|
|
|
2021-06-22 19:53:08 -05:00
|
|
|
if (newinode)
|
|
|
|
if (S_ISDIR(newinode->i_mode)) {
|
|
|
|
rc = -EISDIR;
|
|
|
|
goto out_err;
|
|
|
|
}
|
2016-07-07 21:28:27 +01:00
|
|
|
|
2012-06-05 15:10:23 +02:00
|
|
|
d_drop(direntry);
|
|
|
|
d_add(direntry, newinode);
|
2009-02-20 04:32:45 +00:00
|
|
|
|
2012-06-05 15:10:23 +02:00
|
|
|
out:
|
2021-03-05 17:36:04 -05:00
|
|
|
free_dentry_path(page);
|
2012-06-05 15:10:23 +02:00
|
|
|
return rc;
|
2016-07-07 21:28:27 +01:00
|
|
|
|
|
|
|
out_err:
|
|
|
|
if (server->ops->close)
|
|
|
|
server->ops->close(xid, tcon, fid);
|
|
|
|
if (newinode)
|
|
|
|
iput(newinode);
|
|
|
|
goto out;
|
2012-06-05 15:10:23 +02:00
|
|
|
}
|
2010-06-16 13:40:16 -04:00
|
|
|
|
2012-06-22 12:39:14 +04:00
|
|
|
int
|
2012-06-05 15:10:23 +02:00
|
|
|
cifs_atomic_open(struct inode *inode, struct dentry *direntry,
|
2018-06-08 13:32:02 -04:00
|
|
|
struct file *file, unsigned oflags, umode_t mode)
|
2012-06-05 15:10:23 +02:00
|
|
|
{
|
|
|
|
int rc;
|
2012-06-20 11:21:16 +04:00
|
|
|
unsigned int xid;
|
2012-06-05 15:10:23 +02:00
|
|
|
struct tcon_link *tlink;
|
|
|
|
struct cifs_tcon *tcon;
|
2012-09-18 16:20:27 -07:00
|
|
|
struct TCP_Server_Info *server;
|
2022-10-14 19:18:32 -05:00
|
|
|
struct cifs_fid fid = {};
|
2012-09-19 06:22:45 -07:00
|
|
|
struct cifs_pending_open open;
|
2012-06-05 15:10:23 +02:00
|
|
|
__u32 oplock;
|
2012-09-18 16:20:26 -07:00
|
|
|
struct cifsFileInfo *file_info;
|
2022-10-03 18:43:50 -03:00
|
|
|
struct cifs_open_info_data buf = {};
|
2012-06-05 15:10:23 +02:00
|
|
|
|
2021-04-29 00:18:43 -05:00
|
|
|
if (unlikely(cifs_forced_shutdown(CIFS_SB(inode->i_sb))))
|
|
|
|
return -EIO;
|
|
|
|
|
2012-09-18 16:20:26 -07:00
|
|
|
/*
|
|
|
|
* Posix open is only called (at lookup time) for file create now. For
|
2012-06-05 15:10:23 +02:00
|
|
|
* opens (rather than creates), because we do not know if it is a file
|
|
|
|
* or directory yet, and current Samba no longer allows us to do posix
|
|
|
|
* open on dirs, we could end up wasting an open call on what turns out
|
|
|
|
* to be a dir. For file opens, we wait to call posix open till
|
|
|
|
* cifs_open. It could be added to atomic_open in the future but the
|
|
|
|
* performance tradeoff of the extra network request when EISDIR or
|
|
|
|
* EACCES is returned would have to be weighed against the 50% reduction
|
|
|
|
* in network traffic in the other paths.
|
|
|
|
*/
|
|
|
|
if (!(oflags & O_CREAT)) {
|
2012-11-05 11:39:32 +00:00
|
|
|
struct dentry *res;
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Check for hashed negative dentry. We have already revalidated
|
|
|
|
* the dentry and it is fine. No need to perform another lookup.
|
|
|
|
*/
|
2016-07-05 09:44:53 -04:00
|
|
|
if (!d_in_lookup(direntry))
|
2012-11-05 11:39:32 +00:00
|
|
|
return -ENOENT;
|
|
|
|
|
|
|
|
res = cifs_lookup(inode, direntry, 0);
|
2012-06-05 15:10:23 +02:00
|
|
|
if (IS_ERR(res))
|
2012-06-22 12:39:14 +04:00
|
|
|
return PTR_ERR(res);
|
2012-06-05 15:10:23 +02:00
|
|
|
|
2012-06-10 06:48:09 -04:00
|
|
|
return finish_no_open(file, res);
|
2012-06-05 15:10:23 +02:00
|
|
|
}
|
|
|
|
|
2012-06-20 11:21:16 +04:00
|
|
|
xid = get_xid();
|
2012-06-05 15:10:23 +02:00
|
|
|
|
2014-08-19 20:25:34 -04:00
|
|
|
cifs_dbg(FYI, "parent inode = 0x%p name is: %pd and dentry = 0x%p\n",
|
|
|
|
inode, direntry, direntry);
|
2012-06-05 15:10:23 +02:00
|
|
|
|
|
|
|
tlink = cifs_sb_tlink(CIFS_SB(inode->i_sb));
|
2013-04-04 14:16:21 +08:00
|
|
|
if (IS_ERR(tlink)) {
|
|
|
|
rc = PTR_ERR(tlink);
|
2012-06-20 11:21:16 +04:00
|
|
|
goto out_free_xid;
|
2013-04-04 14:16:21 +08:00
|
|
|
}
|
2012-06-05 15:10:23 +02:00
|
|
|
|
|
|
|
tcon = tlink_tcon(tlink);
|
2017-08-23 14:48:14 +10:00
|
|
|
|
|
|
|
rc = check_name(direntry, tcon);
|
|
|
|
if (rc)
|
2017-10-30 13:28:03 +11:00
|
|
|
goto out;
|
2017-08-23 14:48:14 +10:00
|
|
|
|
2012-09-18 16:20:27 -07:00
|
|
|
server = tcon->ses->server;
|
2012-06-05 15:10:23 +02:00
|
|
|
|
2012-09-19 06:22:44 -07:00
|
|
|
if (server->ops->new_lease_key)
|
|
|
|
server->ops->new_lease_key(&fid);
|
|
|
|
|
2012-09-19 06:22:45 -07:00
|
|
|
cifs_add_pending_open(&fid, tlink, &open);
|
|
|
|
|
2012-06-05 15:10:23 +02:00
|
|
|
rc = cifs_do_create(inode, direntry, xid, tlink, oflags, mode,
|
2022-10-03 18:43:50 -03:00
|
|
|
&oplock, &fid, &buf);
|
2012-09-19 06:22:45 -07:00
|
|
|
if (rc) {
|
|
|
|
cifs_del_pending_open(&open);
|
2012-06-05 15:10:23 +02:00
|
|
|
goto out;
|
2012-09-19 06:22:45 -07:00
|
|
|
}
|
2012-06-05 15:10:23 +02:00
|
|
|
|
2013-12-11 16:29:53 -06:00
|
|
|
if ((oflags & (O_CREAT | O_EXCL)) == (O_CREAT | O_EXCL))
|
2018-06-08 13:22:02 -04:00
|
|
|
file->f_mode |= FMODE_CREATED;
|
2013-12-11 16:29:53 -06:00
|
|
|
|
2018-06-08 11:44:56 -04:00
|
|
|
rc = finish_open(file, direntry, generic_file_open);
|
2012-06-22 12:40:19 +04:00
|
|
|
if (rc) {
|
2012-09-18 16:20:27 -07:00
|
|
|
if (server->ops->close)
|
|
|
|
server->ops->close(xid, tcon, &fid);
|
2012-09-19 06:22:45 -07:00
|
|
|
cifs_del_pending_open(&open);
|
2012-06-05 15:10:23 +02:00
|
|
|
goto out;
|
2007-06-05 18:30:44 +00:00
|
|
|
}
|
2010-06-16 13:40:16 -04:00
|
|
|
|
2014-08-22 14:22:51 +09:00
|
|
|
if (file->f_flags & O_DIRECT &&
|
|
|
|
CIFS_SB(inode->i_sb)->mnt_cifs_flags & CIFS_MOUNT_STRICT_IO) {
|
|
|
|
if (CIFS_SB(inode->i_sb)->mnt_cifs_flags & CIFS_MOUNT_NO_BRL)
|
|
|
|
file->f_op = &cifs_file_direct_nobrl_ops;
|
|
|
|
else
|
|
|
|
file->f_op = &cifs_file_direct_ops;
|
|
|
|
}
|
|
|
|
|
2022-10-03 18:43:50 -03:00
|
|
|
file_info = cifs_new_fileinfo(&fid, file, tlink, oplock, buf.symlink_target);
|
2012-09-18 16:20:26 -07:00
|
|
|
if (file_info == NULL) {
|
2012-09-18 16:20:27 -07:00
|
|
|
if (server->ops->close)
|
|
|
|
server->ops->close(xid, tcon, &fid);
|
2012-09-19 06:22:45 -07:00
|
|
|
cifs_del_pending_open(&open);
|
2012-06-22 12:39:14 +04:00
|
|
|
rc = -ENOMEM;
|
cifs: Support fscache indexing rewrite
Change the cifs filesystem to take account of the changes to fscache's
indexing rewrite and reenable caching in cifs.
The following changes have been made:
(1) The fscache_netfs struct is no more, and there's no need to register
the filesystem as a whole.
(2) The session cookie is now an fscache_volume cookie, allocated with
fscache_acquire_volume(). That takes three parameters: a string
representing the "volume" in the index, a string naming the cache to
use (or NULL) and a u64 that conveys coherency metadata for the
volume.
For cifs, I've made it render the volume name string as:
"cifs,<ipaddress>,<sharename>"
where the sharename has '/' characters replaced with ';'.
This probably needs rethinking a bit as the total name could exceed
the maximum filename component length.
Further, the coherency data is currently just set to 0. It needs
something else doing with it - I wonder if it would suffice simply to
sum the resource_id, vol_create_time and vol_serial_number or maybe
hash them.
(3) The fscache_cookie_def is no more and needed information is passed
directly to fscache_acquire_cookie(). The cache no longer calls back
into the filesystem, but rather metadata changes are indicated at
other times.
fscache_acquire_cookie() is passed the same keying and coherency
information as before.
(4) The functions to set/reset cookies are removed and
fscache_use_cookie() and fscache_unuse_cookie() are used instead.
fscache_use_cookie() is passed a flag to indicate if the cookie is
opened for writing. fscache_unuse_cookie() is passed updates for the
metadata if we changed it (ie. if the file was opened for writing).
These are called when the file is opened or closed.
(5) cifs_setattr_*() are made to call fscache_resize() to change the size
of the cache object.
(6) The functions to read and write data are stubbed out pending a
conversion to use netfslib.
Changes
=======
ver #8:
- Abstract cache invalidation into a helper function.
- Fix some checkpatch warnings[3].
ver #7:
- Removed the accidentally added-back call to get the super cookie in
cifs_root_iget().
- Fixed the right call to cifs_fscache_get_super_cookie() to take account
of the "-o fsc" mount flag.
ver #6:
- Moved the change of gfpflags_allow_blocking() to current_is_kswapd() for
cifs here.
- Fixed one of the error paths in cifs_atomic_open() to jump around the
call to use the cookie.
- Fixed an additional successful return in the middle of cifs_open() to
use the cookie on the way out.
- Only get a volume cookie (and thus inode cookies) when "-o fsc" is
supplied to mount.
ver #5:
- Fixed a couple of bits of cookie handling[2]:
- The cookie should be released in cifs_evict_inode(), not
cifsFileInfo_put_final(). The cookie needs to persist beyond file
closure so that writepages will be able to write to it.
- fscache_use_cookie() needs to be called in cifs_atomic_open() as it is
for cifs_open().
ver #4:
- Fixed the use of sizeof with memset.
- tcon->vol_create_time is __le64 so doesn't need cpu_to_le64().
ver #3:
- Canonicalise the cifs coherency data to make the cache portable.
- Set volume coherency data.
ver #2:
- Use gfpflags_allow_blocking() rather than using flag directly.
- Upgraded to -rc4 to allow for upstream changes[1].
- fscache_acquire_volume() now returns errors.
Signed-off-by: David Howells <dhowells@redhat.com>
Acked-by: Jeff Layton <jlayton@kernel.org>
cc: Steve French <smfrench@gmail.com>
cc: Shyam Prasad N <nspmangalore@gmail.com>
cc: linux-cifs@vger.kernel.org
cc: linux-cachefs@redhat.com
Link: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=23b55d673d7527b093cd97b7c217c82e70cd1af0 [1]
Link: https://lore.kernel.org/r/3419813.1641592362@warthog.procyon.org.uk/ [2]
Link: https://lore.kernel.org/r/CAH2r5muTanw9pJqzAHd01d9A8keeChkzGsCEH6=0rHutVLAF-A@mail.gmail.com/ [3]
Link: https://lore.kernel.org/r/163819671009.215744.11230627184193298714.stgit@warthog.procyon.org.uk/ # v1
Link: https://lore.kernel.org/r/163906982979.143852.10672081929614953210.stgit@warthog.procyon.org.uk/ # v2
Link: https://lore.kernel.org/r/163967187187.1823006.247415138444991444.stgit@warthog.procyon.org.uk/ # v3
Link: https://lore.kernel.org/r/164021579335.640689.2681324337038770579.stgit@warthog.procyon.org.uk/ # v4
Link: https://lore.kernel.org/r/3462849.1641593783@warthog.procyon.org.uk/ # v5
Link: https://lore.kernel.org/r/1318953.1642024578@warthog.procyon.org.uk/ # v6
Signed-off-by: Steve French <stfrench@microsoft.com>
2020-11-17 15:56:59 +00:00
|
|
|
goto out;
|
2012-06-05 15:10:23 +02:00
|
|
|
}
|
|
|
|
|
cifs: Support fscache indexing rewrite
Change the cifs filesystem to take account of the changes to fscache's
indexing rewrite and reenable caching in cifs.
The following changes have been made:
(1) The fscache_netfs struct is no more, and there's no need to register
the filesystem as a whole.
(2) The session cookie is now an fscache_volume cookie, allocated with
fscache_acquire_volume(). That takes three parameters: a string
representing the "volume" in the index, a string naming the cache to
use (or NULL) and a u64 that conveys coherency metadata for the
volume.
For cifs, I've made it render the volume name string as:
"cifs,<ipaddress>,<sharename>"
where the sharename has '/' characters replaced with ';'.
This probably needs rethinking a bit as the total name could exceed
the maximum filename component length.
Further, the coherency data is currently just set to 0. It needs
something else doing with it - I wonder if it would suffice simply to
sum the resource_id, vol_create_time and vol_serial_number or maybe
hash them.
(3) The fscache_cookie_def is no more and needed information is passed
directly to fscache_acquire_cookie(). The cache no longer calls back
into the filesystem, but rather metadata changes are indicated at
other times.
fscache_acquire_cookie() is passed the same keying and coherency
information as before.
(4) The functions to set/reset cookies are removed and
fscache_use_cookie() and fscache_unuse_cookie() are used instead.
fscache_use_cookie() is passed a flag to indicate if the cookie is
opened for writing. fscache_unuse_cookie() is passed updates for the
metadata if we changed it (ie. if the file was opened for writing).
These are called when the file is opened or closed.
(5) cifs_setattr_*() are made to call fscache_resize() to change the size
of the cache object.
(6) The functions to read and write data are stubbed out pending a
conversion to use netfslib.
Changes
=======
ver #8:
- Abstract cache invalidation into a helper function.
- Fix some checkpatch warnings[3].
ver #7:
- Removed the accidentally added-back call to get the super cookie in
cifs_root_iget().
- Fixed the right call to cifs_fscache_get_super_cookie() to take account
of the "-o fsc" mount flag.
ver #6:
- Moved the change of gfpflags_allow_blocking() to current_is_kswapd() for
cifs here.
- Fixed one of the error paths in cifs_atomic_open() to jump around the
call to use the cookie.
- Fixed an additional successful return in the middle of cifs_open() to
use the cookie on the way out.
- Only get a volume cookie (and thus inode cookies) when "-o fsc" is
supplied to mount.
ver #5:
- Fixed a couple of bits of cookie handling[2]:
- The cookie should be released in cifs_evict_inode(), not
cifsFileInfo_put_final(). The cookie needs to persist beyond file
closure so that writepages will be able to write to it.
- fscache_use_cookie() needs to be called in cifs_atomic_open() as it is
for cifs_open().
ver #4:
- Fixed the use of sizeof with memset.
- tcon->vol_create_time is __le64 so doesn't need cpu_to_le64().
ver #3:
- Canonicalise the cifs coherency data to make the cache portable.
- Set volume coherency data.
ver #2:
- Use gfpflags_allow_blocking() rather than using flag directly.
- Upgraded to -rc4 to allow for upstream changes[1].
- fscache_acquire_volume() now returns errors.
Signed-off-by: David Howells <dhowells@redhat.com>
Acked-by: Jeff Layton <jlayton@kernel.org>
cc: Steve French <smfrench@gmail.com>
cc: Shyam Prasad N <nspmangalore@gmail.com>
cc: linux-cifs@vger.kernel.org
cc: linux-cachefs@redhat.com
Link: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=23b55d673d7527b093cd97b7c217c82e70cd1af0 [1]
Link: https://lore.kernel.org/r/3419813.1641592362@warthog.procyon.org.uk/ [2]
Link: https://lore.kernel.org/r/CAH2r5muTanw9pJqzAHd01d9A8keeChkzGsCEH6=0rHutVLAF-A@mail.gmail.com/ [3]
Link: https://lore.kernel.org/r/163819671009.215744.11230627184193298714.stgit@warthog.procyon.org.uk/ # v1
Link: https://lore.kernel.org/r/163906982979.143852.10672081929614953210.stgit@warthog.procyon.org.uk/ # v2
Link: https://lore.kernel.org/r/163967187187.1823006.247415138444991444.stgit@warthog.procyon.org.uk/ # v3
Link: https://lore.kernel.org/r/164021579335.640689.2681324337038770579.stgit@warthog.procyon.org.uk/ # v4
Link: https://lore.kernel.org/r/3462849.1641593783@warthog.procyon.org.uk/ # v5
Link: https://lore.kernel.org/r/1318953.1642024578@warthog.procyon.org.uk/ # v6
Signed-off-by: Steve French <stfrench@microsoft.com>
2020-11-17 15:56:59 +00:00
|
|
|
fscache_use_cookie(cifs_inode_cookie(file_inode(file)),
|
|
|
|
file->f_mode & FMODE_WRITE);
|
|
|
|
|
2012-06-05 15:10:23 +02:00
|
|
|
out:
|
|
|
|
cifs_put_tlink(tlink);
|
2012-06-20 11:21:16 +04:00
|
|
|
out_free_xid:
|
|
|
|
free_xid(xid);
|
2022-10-03 18:43:50 -03:00
|
|
|
cifs_free_open_info(&buf);
|
2012-06-22 12:39:14 +04:00
|
|
|
return rc;
|
2012-06-05 15:10:23 +02:00
|
|
|
}
|
|
|
|
|
2023-01-13 12:49:13 +01:00
|
|
|
int cifs_create(struct mnt_idmap *idmap, struct inode *inode,
|
2021-01-21 14:19:43 +01:00
|
|
|
struct dentry *direntry, umode_t mode, bool excl)
|
2012-06-05 15:10:23 +02:00
|
|
|
{
|
|
|
|
int rc;
|
2012-06-20 11:21:16 +04:00
|
|
|
unsigned int xid = get_xid();
|
2012-06-05 15:10:23 +02:00
|
|
|
/*
|
|
|
|
* BB below access is probably too much for mknod to request
|
|
|
|
* but we have to do query and setpathinfo so requesting
|
|
|
|
* less could fail (unless we want to request getatr and setatr
|
|
|
|
* permissions (only). At least for POSIX we do not have to
|
|
|
|
* request so much.
|
|
|
|
*/
|
|
|
|
unsigned oflags = O_EXCL | O_CREAT | O_RDWR;
|
|
|
|
struct tcon_link *tlink;
|
2012-09-18 16:20:27 -07:00
|
|
|
struct cifs_tcon *tcon;
|
|
|
|
struct TCP_Server_Info *server;
|
|
|
|
struct cifs_fid fid;
|
2012-06-05 15:10:23 +02:00
|
|
|
__u32 oplock;
|
2022-10-03 18:43:50 -03:00
|
|
|
struct cifs_open_info_data buf = {};
|
2012-06-05 15:10:23 +02:00
|
|
|
|
2014-08-19 20:25:34 -04:00
|
|
|
cifs_dbg(FYI, "cifs_create parent inode = 0x%p name is: %pd and dentry = 0x%p\n",
|
|
|
|
inode, direntry, direntry);
|
2012-06-05 15:10:23 +02:00
|
|
|
|
2022-10-17 22:45:21 +08:00
|
|
|
if (unlikely(cifs_forced_shutdown(CIFS_SB(inode->i_sb)))) {
|
|
|
|
rc = -EIO;
|
|
|
|
goto out_free_xid;
|
|
|
|
}
|
2021-04-29 00:18:43 -05:00
|
|
|
|
2012-06-05 15:10:23 +02:00
|
|
|
tlink = cifs_sb_tlink(CIFS_SB(inode->i_sb));
|
|
|
|
rc = PTR_ERR(tlink);
|
|
|
|
if (IS_ERR(tlink))
|
2012-06-20 11:21:16 +04:00
|
|
|
goto out_free_xid;
|
2012-06-05 15:10:23 +02:00
|
|
|
|
2012-09-18 16:20:27 -07:00
|
|
|
tcon = tlink_tcon(tlink);
|
|
|
|
server = tcon->ses->server;
|
2012-09-19 06:22:44 -07:00
|
|
|
|
|
|
|
if (server->ops->new_lease_key)
|
|
|
|
server->ops->new_lease_key(&fid);
|
|
|
|
|
2022-10-03 18:43:50 -03:00
|
|
|
rc = cifs_do_create(inode, direntry, xid, tlink, oflags, mode, &oplock, &fid, &buf);
|
2012-09-18 16:20:27 -07:00
|
|
|
if (!rc && server->ops->close)
|
|
|
|
server->ops->close(xid, tcon, &fid);
|
2012-06-05 15:10:23 +02:00
|
|
|
|
2022-10-03 18:43:50 -03:00
|
|
|
cifs_free_open_info(&buf);
|
2010-09-29 19:51:11 -04:00
|
|
|
cifs_put_tlink(tlink);
|
2012-06-20 11:21:16 +04:00
|
|
|
out_free_xid:
|
|
|
|
free_xid(xid);
|
2005-04-16 15:20:36 -07:00
|
|
|
return rc;
|
|
|
|
}
|
|
|
|
|
2023-01-13 12:49:16 +01:00
|
|
|
int cifs_mknod(struct mnt_idmap *idmap, struct inode *inode,
|
2021-01-21 14:19:43 +01:00
|
|
|
struct dentry *direntry, umode_t mode, dev_t device_number)
|
2005-04-16 15:20:36 -07:00
|
|
|
{
|
|
|
|
int rc = -EPERM;
|
2012-06-20 11:21:16 +04:00
|
|
|
unsigned int xid;
|
2005-04-16 15:20:36 -07:00
|
|
|
struct cifs_sb_info *cifs_sb;
|
2010-09-29 19:51:11 -04:00
|
|
|
struct tcon_link *tlink;
|
2014-01-16 15:53:34 +04:00
|
|
|
struct cifs_tcon *tcon;
|
2021-03-05 17:36:04 -05:00
|
|
|
const char *full_path;
|
|
|
|
void *page;
|
2005-04-16 15:20:36 -07:00
|
|
|
|
|
|
|
if (!old_valid_dev(device_number))
|
|
|
|
return -EINVAL;
|
|
|
|
|
|
|
|
cifs_sb = CIFS_SB(inode->i_sb);
|
2021-04-29 00:18:43 -05:00
|
|
|
if (unlikely(cifs_forced_shutdown(cifs_sb)))
|
|
|
|
return -EIO;
|
|
|
|
|
2010-09-29 19:51:11 -04:00
|
|
|
tlink = cifs_sb_tlink(cifs_sb);
|
|
|
|
if (IS_ERR(tlink))
|
|
|
|
return PTR_ERR(tlink);
|
|
|
|
|
2021-03-05 17:36:04 -05:00
|
|
|
page = alloc_dentry_path();
|
2014-01-16 15:53:34 +04:00
|
|
|
tcon = tlink_tcon(tlink);
|
2012-06-20 11:21:16 +04:00
|
|
|
xid = get_xid();
|
2005-04-16 15:20:36 -07:00
|
|
|
|
2021-03-05 17:36:04 -05:00
|
|
|
full_path = build_path_from_dentry(direntry, page);
|
|
|
|
if (IS_ERR(full_path)) {
|
|
|
|
rc = PTR_ERR(full_path);
|
2010-08-05 13:58:22 -04:00
|
|
|
goto mknod_out;
|
|
|
|
}
|
|
|
|
|
2025-01-18 21:03:30 +01:00
|
|
|
trace_smb3_mknod_enter(xid, tcon->tid, tcon->ses->Suid, full_path);
|
2024-03-24 00:01:02 -05:00
|
|
|
|
2019-03-14 00:29:17 -05:00
|
|
|
rc = tcon->ses->server->ops->make_node(xid, inode, direntry, tcon,
|
|
|
|
full_path, mode,
|
|
|
|
device_number);
|
2010-08-05 13:58:22 -04:00
|
|
|
|
|
|
|
mknod_out:
|
2024-03-24 00:01:02 -05:00
|
|
|
if (rc)
|
2025-01-18 21:03:30 +01:00
|
|
|
trace_smb3_mknod_err(xid, tcon->tid, tcon->ses->Suid, rc);
|
2024-03-24 00:01:02 -05:00
|
|
|
else
|
2025-01-18 21:03:30 +01:00
|
|
|
trace_smb3_mknod_done(xid, tcon->tid, tcon->ses->Suid);
|
2024-03-24 00:01:02 -05:00
|
|
|
|
2021-03-05 17:36:04 -05:00
|
|
|
free_dentry_path(page);
|
2012-06-20 11:21:16 +04:00
|
|
|
free_xid(xid);
|
2010-09-29 19:51:11 -04:00
|
|
|
cifs_put_tlink(tlink);
|
2005-04-16 15:20:36 -07:00
|
|
|
return rc;
|
|
|
|
}
|
|
|
|
|
|
|
|
struct dentry *
|
2007-06-05 18:30:44 +00:00
|
|
|
cifs_lookup(struct inode *parent_dir_inode, struct dentry *direntry,
|
2012-06-10 17:13:09 -04:00
|
|
|
unsigned int flags)
|
2005-04-16 15:20:36 -07:00
|
|
|
{
|
2012-06-20 11:21:16 +04:00
|
|
|
unsigned int xid;
|
2005-04-16 15:20:36 -07:00
|
|
|
int rc = 0; /* to get around spurious gcc warning, set to zero here */
|
|
|
|
struct cifs_sb_info *cifs_sb;
|
2010-09-29 19:51:11 -04:00
|
|
|
struct tcon_link *tlink;
|
2011-05-27 04:34:02 +00:00
|
|
|
struct cifs_tcon *pTcon;
|
2005-04-16 15:20:36 -07:00
|
|
|
struct inode *newInode = NULL;
|
2021-03-05 17:36:04 -05:00
|
|
|
const char *full_path;
|
|
|
|
void *page;
|
2021-06-15 13:42:56 -03:00
|
|
|
int retry_count = 0;
|
2005-04-16 15:20:36 -07:00
|
|
|
|
2012-06-20 11:21:16 +04:00
|
|
|
xid = get_xid();
|
2005-04-16 15:20:36 -07:00
|
|
|
|
2014-08-19 20:25:34 -04:00
|
|
|
cifs_dbg(FYI, "parent inode = 0x%p name is: %pd and dentry = 0x%p\n",
|
|
|
|
parent_dir_inode, direntry, direntry);
|
2005-04-16 15:20:36 -07:00
|
|
|
|
|
|
|
/* check whether path exists */
|
|
|
|
|
|
|
|
cifs_sb = CIFS_SB(parent_dir_inode->i_sb);
|
2010-09-29 19:51:11 -04:00
|
|
|
tlink = cifs_sb_tlink(cifs_sb);
|
|
|
|
if (IS_ERR(tlink)) {
|
2012-06-20 11:21:16 +04:00
|
|
|
free_xid(xid);
|
2018-05-14 21:42:29 -04:00
|
|
|
return ERR_CAST(tlink);
|
2010-09-29 19:51:11 -04:00
|
|
|
}
|
|
|
|
pTcon = tlink_tcon(tlink);
|
2005-04-16 15:20:36 -07:00
|
|
|
|
2017-08-23 14:48:14 +10:00
|
|
|
rc = check_name(direntry, pTcon);
|
2018-05-14 21:42:29 -04:00
|
|
|
if (unlikely(rc)) {
|
|
|
|
cifs_put_tlink(tlink);
|
|
|
|
free_xid(xid);
|
|
|
|
return ERR_PTR(rc);
|
|
|
|
}
|
2009-07-05 11:01:02 -04:00
|
|
|
|
2005-04-16 15:20:36 -07:00
|
|
|
/* can not grab the rename sem here since it would
|
|
|
|
deadlock in the cases (beginning of sys_rename itself)
|
|
|
|
in which we already have the sb rename sem */
|
2021-03-05 17:36:04 -05:00
|
|
|
page = alloc_dentry_path();
|
|
|
|
full_path = build_path_from_dentry(direntry, page);
|
|
|
|
if (IS_ERR(full_path)) {
|
2018-05-14 21:42:29 -04:00
|
|
|
cifs_put_tlink(tlink);
|
|
|
|
free_xid(xid);
|
2021-03-05 17:36:04 -05:00
|
|
|
free_dentry_path(page);
|
|
|
|
return ERR_CAST(full_path);
|
2005-04-16 15:20:36 -07:00
|
|
|
}
|
|
|
|
|
2015-03-17 22:25:59 +00:00
|
|
|
if (d_really_is_positive(direntry)) {
|
2013-05-04 22:12:25 -05:00
|
|
|
cifs_dbg(FYI, "non-NULL inode in lookup\n");
|
2005-04-16 15:20:36 -07:00
|
|
|
} else {
|
2013-05-04 22:12:25 -05:00
|
|
|
cifs_dbg(FYI, "NULL inode in lookup\n");
|
2005-04-16 15:20:36 -07:00
|
|
|
}
|
2013-05-04 22:12:25 -05:00
|
|
|
cifs_dbg(FYI, "Full path: %s inode = 0x%p\n",
|
2015-03-17 22:25:59 +00:00
|
|
|
full_path, d_inode(direntry));
|
2005-04-16 15:20:36 -07:00
|
|
|
|
2021-06-15 13:42:56 -03:00
|
|
|
again:
|
2023-11-25 23:55:03 -03:00
|
|
|
if (pTcon->posix_extensions) {
|
|
|
|
rc = smb311_posix_get_inode_info(&newInode, full_path, NULL,
|
|
|
|
parent_dir_inode->i_sb, xid);
|
|
|
|
} else if (pTcon->unix_ext) {
|
2012-06-05 15:10:23 +02:00
|
|
|
rc = cifs_get_inode_info_unix(&newInode, full_path,
|
|
|
|
parent_dir_inode->i_sb, xid);
|
|
|
|
} else {
|
2005-04-16 15:20:36 -07:00
|
|
|
rc = cifs_get_inode_info(&newInode, full_path, NULL,
|
2009-04-09 01:14:32 +00:00
|
|
|
parent_dir_inode->i_sb, xid, NULL);
|
2012-06-05 15:10:23 +02:00
|
|
|
}
|
2005-04-16 15:20:36 -07:00
|
|
|
|
2018-05-14 21:26:32 -04:00
|
|
|
if (rc == 0) {
|
2007-06-05 18:30:44 +00:00
|
|
|
/* since paths are not looked up by component - the parent
|
2005-11-28 08:16:13 -08:00
|
|
|
directories are presumed to be good here */
|
2005-04-16 15:20:36 -07:00
|
|
|
renew_parental_timestamps(direntry);
|
2021-06-15 13:42:56 -03:00
|
|
|
} else if (rc == -EAGAIN && retry_count++ < 10) {
|
|
|
|
goto again;
|
2005-04-16 15:20:36 -07:00
|
|
|
} else if (rc == -ENOENT) {
|
2016-09-16 12:44:21 +02:00
|
|
|
cifs_set_time(direntry, jiffies);
|
2018-05-14 21:42:29 -04:00
|
|
|
newInode = NULL;
|
|
|
|
} else {
|
|
|
|
if (rc != -EACCES) {
|
|
|
|
cifs_dbg(FYI, "Unexpected lookup error %d\n", rc);
|
|
|
|
/* We special case check for Access Denied - since that
|
|
|
|
is a common return code */
|
|
|
|
}
|
|
|
|
newInode = ERR_PTR(rc);
|
2005-04-16 15:20:36 -07:00
|
|
|
}
|
2021-03-05 17:36:04 -05:00
|
|
|
free_dentry_path(page);
|
2010-09-29 19:51:11 -04:00
|
|
|
cifs_put_tlink(tlink);
|
2012-06-20 11:21:16 +04:00
|
|
|
free_xid(xid);
|
2018-05-14 21:42:29 -04:00
|
|
|
return d_splice_alias(newInode, direntry);
|
2005-04-16 15:20:36 -07:00
|
|
|
}
|
|
|
|
|
|
|
|
static int
|
Pass parent directory inode and expected name to ->d_revalidate()
->d_revalidate() often needs to access dentry parent and name; that has
to be done carefully, since the locking environment varies from caller
to caller. We are not guaranteed that dentry in question will not be
moved right under us - not unless the filesystem is such that nothing
on it ever gets renamed.
It can be dealt with, but that results in boilerplate code that isn't
even needed - the callers normally have just found the dentry via dcache
lookup and want to verify that it's in the right place; they already
have the values of ->d_parent and ->d_name stable. There is a couple
of exceptions (overlayfs and, to less extent, ecryptfs), but for the
majority of calls that song and dance is not needed at all.
It's easier to make ecryptfs and overlayfs find and pass those values if
there's a ->d_revalidate() instance to be called, rather than doing that
in the instances.
This commit only changes the calling conventions; making use of supplied
values is left to followups.
NOTE: some instances need more than just the parent - things like CIFS
may need to build an entire path from filesystem root, so they need
more precautions than the usual boilerplate. This series doesn't
do anything to that need - these filesystems have to keep their locking
mechanisms (rename_lock loops, use of dentry_path_raw(), private rwsem
a-la v9fs).
One thing to keep in mind when using name is that name->name will normally
point into the pathname being resolved; the filename in question occupies
name->len bytes starting at name->name, and there is NUL somewhere after it,
but it the next byte might very well be '/' rather than '\0'. Do not
ignore name->len.
Reviewed-by: Jeff Layton <jlayton@kernel.org>
Reviewed-by: Gabriel Krisman Bertazi <gabriel@krisman.be>
Signed-off-by: Al Viro <viro@zeniv.linux.org.uk>
2024-12-08 00:28:51 -05:00
|
|
|
cifs_d_revalidate(struct inode *dir, const struct qstr *name,
|
|
|
|
struct dentry *direntry, unsigned int flags)
|
2005-04-16 15:20:36 -07:00
|
|
|
{
|
2019-09-30 10:06:20 -07:00
|
|
|
struct inode *inode;
|
2021-02-05 15:42:48 +01:00
|
|
|
int rc;
|
2019-09-30 10:06:20 -07:00
|
|
|
|
2012-06-10 16:03:43 -04:00
|
|
|
if (flags & LOOKUP_RCU)
|
2011-01-07 17:49:57 +11:00
|
|
|
return -ECHILD;
|
|
|
|
|
2015-03-17 22:25:59 +00:00
|
|
|
if (d_really_is_positive(direntry)) {
|
2019-09-30 10:06:20 -07:00
|
|
|
inode = d_inode(direntry);
|
|
|
|
if ((flags & LOOKUP_REVAL) && !CIFS_CACHE_READ(CIFS_I(inode)))
|
|
|
|
CIFS_I(inode)->time = 0; /* force reval */
|
|
|
|
|
2021-02-05 15:42:48 +01:00
|
|
|
rc = cifs_revalidate_dentry(direntry);
|
|
|
|
if (rc) {
|
|
|
|
cifs_dbg(FYI, "cifs_revalidate_dentry failed with rc=%d", rc);
|
|
|
|
switch (rc) {
|
|
|
|
case -ENOENT:
|
|
|
|
case -ESTALE:
|
|
|
|
/*
|
|
|
|
* Those errors mean the dentry is invalid
|
|
|
|
* (file was deleted or recreated)
|
|
|
|
*/
|
|
|
|
return 0;
|
|
|
|
default:
|
|
|
|
/*
|
|
|
|
* Otherwise some unexpected error happened
|
|
|
|
* report it as-is to VFS layer
|
|
|
|
*/
|
|
|
|
return rc;
|
|
|
|
}
|
|
|
|
}
|
2011-10-18 10:58:50 +02:00
|
|
|
else {
|
|
|
|
/*
|
2012-05-02 07:19:09 -04:00
|
|
|
* If the inode wasn't known to be a dfs entry when
|
|
|
|
* the dentry was instantiated, such as when created
|
|
|
|
* via ->readdir(), it needs to be set now since the
|
|
|
|
* attributes will have been updated by
|
|
|
|
* cifs_revalidate_dentry().
|
2011-10-18 10:58:50 +02:00
|
|
|
*/
|
2019-09-30 10:06:20 -07:00
|
|
|
if (IS_AUTOMOUNT(inode) &&
|
2012-05-02 07:19:09 -04:00
|
|
|
!(direntry->d_flags & DCACHE_NEED_AUTOMOUNT)) {
|
|
|
|
spin_lock(&direntry->d_lock);
|
|
|
|
direntry->d_flags |= DCACHE_NEED_AUTOMOUNT;
|
|
|
|
spin_unlock(&direntry->d_lock);
|
|
|
|
}
|
|
|
|
|
2010-11-11 18:42:16 +11:00
|
|
|
return 1;
|
2011-10-18 10:58:50 +02:00
|
|
|
}
|
2005-04-16 15:20:36 -07:00
|
|
|
}
|
|
|
|
|
2010-11-11 18:42:16 +11:00
|
|
|
/*
|
|
|
|
* This may be nfsd (or something), anyway, we can't see the
|
|
|
|
* intent of this. So, since this can be for creation, drop it.
|
|
|
|
*/
|
2012-06-10 16:03:43 -04:00
|
|
|
if (!flags)
|
2010-11-11 18:42:16 +11:00
|
|
|
return 0;
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Drop the negative dentry, in order to make sure to use the
|
|
|
|
* case sensitive name which is specified by user if this is
|
|
|
|
* for creation.
|
|
|
|
*/
|
2012-06-10 16:03:43 -04:00
|
|
|
if (flags & (LOOKUP_CREATE | LOOKUP_RENAME_TARGET))
|
2011-06-25 21:37:18 -04:00
|
|
|
return 0;
|
2010-11-11 18:42:16 +11:00
|
|
|
|
2016-09-16 12:44:21 +02:00
|
|
|
if (time_after(jiffies, cifs_get_time(direntry) + HZ) || !lookupCacheEnabled)
|
2010-11-11 18:42:16 +11:00
|
|
|
return 0;
|
|
|
|
|
|
|
|
return 1;
|
2005-04-16 15:20:36 -07:00
|
|
|
}
|
|
|
|
|
|
|
|
/* static int cifs_d_delete(struct dentry *direntry)
|
|
|
|
{
|
|
|
|
int rc = 0;
|
|
|
|
|
2014-08-19 20:25:34 -04:00
|
|
|
cifs_dbg(FYI, "In cifs d_delete, name = %pd\n", direntry);
|
2005-04-16 15:20:36 -07:00
|
|
|
|
|
|
|
return rc;
|
|
|
|
} */
|
|
|
|
|
2009-02-20 05:57:07 +00:00
|
|
|
const struct dentry_operations cifs_dentry_ops = {
|
2005-04-16 15:20:36 -07:00
|
|
|
.d_revalidate = cifs_d_revalidate,
|
2023-08-17 12:34:04 -03:00
|
|
|
.d_automount = cifs_d_automount,
|
2007-06-05 18:30:44 +00:00
|
|
|
/* d_delete: cifs_d_delete, */ /* not needed except for debugging */
|
2005-04-16 15:20:36 -07:00
|
|
|
};
|
2005-08-22 20:09:43 -07:00
|
|
|
|
2013-05-21 15:22:44 -07:00
|
|
|
static int cifs_ci_hash(const struct dentry *dentry, struct qstr *q)
|
2005-08-22 20:09:43 -07:00
|
|
|
{
|
2011-01-07 17:49:28 +11:00
|
|
|
struct nls_table *codepage = CIFS_SB(dentry->d_sb)->local_nls;
|
2005-08-22 20:09:43 -07:00
|
|
|
unsigned long hash;
|
2013-09-05 08:38:11 -04:00
|
|
|
wchar_t c;
|
|
|
|
int i, charlen;
|
2005-08-22 20:09:43 -07:00
|
|
|
|
2016-06-10 07:51:30 -07:00
|
|
|
hash = init_name_hash(dentry);
|
2013-09-05 08:38:11 -04:00
|
|
|
for (i = 0; i < q->len; i += charlen) {
|
|
|
|
charlen = codepage->char2uni(&q->name[i], q->len - i, &c);
|
|
|
|
/* error out if we can't convert the character */
|
|
|
|
if (unlikely(charlen < 0))
|
|
|
|
return charlen;
|
|
|
|
hash = partial_name_hash(cifs_toupper(c), hash);
|
|
|
|
}
|
2005-08-22 20:09:43 -07:00
|
|
|
q->hash = end_name_hash(hash);
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2016-07-31 16:37:25 -04:00
|
|
|
static int cifs_ci_compare(const struct dentry *dentry,
|
2011-01-07 17:49:27 +11:00
|
|
|
unsigned int len, const char *str, const struct qstr *name)
|
2005-08-22 20:09:43 -07:00
|
|
|
{
|
2016-07-29 18:23:59 -04:00
|
|
|
struct nls_table *codepage = CIFS_SB(dentry->d_sb)->local_nls;
|
2013-09-05 08:38:11 -04:00
|
|
|
wchar_t c1, c2;
|
|
|
|
int i, l1, l2;
|
2005-08-22 20:09:43 -07:00
|
|
|
|
2013-09-05 08:38:11 -04:00
|
|
|
/*
|
|
|
|
* We make the assumption here that uppercase characters in the local
|
|
|
|
* codepage are always the same length as their lowercase counterparts.
|
|
|
|
*
|
|
|
|
* If that's ever not the case, then this will fail to match it.
|
|
|
|
*/
|
|
|
|
if (name->len != len)
|
|
|
|
return 1;
|
|
|
|
|
|
|
|
for (i = 0; i < len; i += l1) {
|
|
|
|
/* Convert characters in both strings to UTF-16. */
|
|
|
|
l1 = codepage->char2uni(&str[i], len - i, &c1);
|
|
|
|
l2 = codepage->char2uni(&name->name[i], name->len - i, &c2);
|
|
|
|
|
|
|
|
/*
|
|
|
|
* If we can't convert either character, just declare it to
|
|
|
|
* be 1 byte long and compare the original byte.
|
|
|
|
*/
|
|
|
|
if (unlikely(l1 < 0 && l2 < 0)) {
|
|
|
|
if (str[i] != name->name[i])
|
|
|
|
return 1;
|
|
|
|
l1 = 1;
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Here, we again ass|u|me that upper/lowercase versions of
|
|
|
|
* a character are the same length in the local NLS.
|
|
|
|
*/
|
|
|
|
if (l1 != l2)
|
|
|
|
return 1;
|
|
|
|
|
|
|
|
/* Now compare uppercase versions of these characters */
|
|
|
|
if (cifs_toupper(c1) != cifs_toupper(c2))
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
|
|
|
return 0;
|
2005-08-22 20:09:43 -07:00
|
|
|
}
|
|
|
|
|
2009-02-20 05:57:07 +00:00
|
|
|
const struct dentry_operations cifs_ci_dentry_ops = {
|
2005-08-22 20:09:43 -07:00
|
|
|
.d_revalidate = cifs_d_revalidate,
|
|
|
|
.d_hash = cifs_ci_hash,
|
|
|
|
.d_compare = cifs_ci_compare,
|
2023-08-17 12:34:04 -03:00
|
|
|
.d_automount = cifs_d_automount,
|
2005-08-22 20:09:43 -07:00
|
|
|
};
|