]> git.proxmox.com Git - mirror_ubuntu-artful-kernel.git/blame - fs/cifs/inode.c
Merge tag 'char-misc-4.13-rc7' of git://git.kernel.org/pub/scm/linux/kernel/git/gregk...
[mirror_ubuntu-artful-kernel.git] / fs / cifs / inode.c
CommitLineData
1da177e4
LT
1/*
2 * fs/cifs/inode.c
3 *
f19159dc 4 * Copyright (C) International Business Machines Corp., 2002,2010
1da177e4
LT
5 * Author(s): Steve French (sfrench@us.ibm.com)
6 *
7 * This library is free software; you can redistribute it and/or modify
8 * it under the terms of the GNU Lesser General Public License as published
9 * by the Free Software Foundation; either version 2.1 of the License, or
10 * (at your option) any later version.
11 *
12 * This library is distributed in the hope that it will be useful,
13 * but WITHOUT ANY WARRANTY; without even the implied warranty of
14 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See
15 * the GNU Lesser General Public License for more details.
16 *
17 * You should have received a copy of the GNU Lesser General Public License
18 * along with this library; if not, write to the Free Software
19 * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
20 */
21#include <linux/fs.h>
1da177e4 22#include <linux/stat.h>
5a0e3ad6 23#include <linux/slab.h>
1da177e4 24#include <linux/pagemap.h>
4f73c7d3 25#include <linux/freezer.h>
174cd4b1 26#include <linux/sched/signal.h>
5dd43ce2 27#include <linux/wait_bit.h>
174cd4b1 28
1da177e4
LT
29#include <asm/div64.h>
30#include "cifsfs.h"
31#include "cifspdu.h"
32#include "cifsglob.h"
33#include "cifsproto.h"
34#include "cifs_debug.h"
35#include "cifs_fs_sb.h"
2baa2682 36#include "cifs_unicode.h"
9451a9a5 37#include "fscache.h"
1da177e4 38
70eff55d 39
01c64fea 40static void cifs_set_ops(struct inode *inode)
70eff55d
CH
41{
42 struct cifs_sb_info *cifs_sb = CIFS_SB(inode->i_sb);
43
44 switch (inode->i_mode & S_IFMT) {
45 case S_IFREG:
46 inode->i_op = &cifs_file_inode_ops;
47 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_DIRECT_IO) {
48 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_NO_BRL)
49 inode->i_fop = &cifs_file_direct_nobrl_ops;
50 else
51 inode->i_fop = &cifs_file_direct_ops;
8be7e6ba
PS
52 } else if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_STRICT_IO) {
53 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_NO_BRL)
54 inode->i_fop = &cifs_file_strict_nobrl_ops;
55 else
56 inode->i_fop = &cifs_file_strict_ops;
70eff55d
CH
57 } else if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_NO_BRL)
58 inode->i_fop = &cifs_file_nobrl_ops;
59 else { /* not direct, send byte range locks */
60 inode->i_fop = &cifs_file_ops;
61 }
62
70eff55d 63 /* check if server can support readpages */
0d424ad0 64 if (cifs_sb_master_tcon(cifs_sb)->ses->server->maxBuf <
09cbfeaf 65 PAGE_SIZE + MAX_CIFS_HDR_SIZE)
70eff55d
CH
66 inode->i_data.a_ops = &cifs_addr_ops_smallbuf;
67 else
68 inode->i_data.a_ops = &cifs_addr_ops;
69 break;
70 case S_IFDIR:
bc5b6e24 71#ifdef CONFIG_CIFS_DFS_UPCALL
01c64fea 72 if (IS_AUTOMOUNT(inode)) {
7962670e
IM
73 inode->i_op = &cifs_dfs_referral_inode_operations;
74 } else {
bc5b6e24
SF
75#else /* NO DFS support, treat as a directory */
76 {
77#endif
7962670e
IM
78 inode->i_op = &cifs_dir_inode_ops;
79 inode->i_fop = &cifs_dir_ops;
80 }
70eff55d
CH
81 break;
82 case S_IFLNK:
83 inode->i_op = &cifs_symlink_inode_ops;
84 break;
85 default:
86 init_special_inode(inode, inode->i_mode, inode->i_rdev);
87 break;
88 }
89}
90
df2cf170
JL
91/* check inode attributes against fattr. If they don't match, tag the
92 * inode for cache invalidation
93 */
94static void
95cifs_revalidate_cache(struct inode *inode, struct cifs_fattr *fattr)
96{
97 struct cifsInodeInfo *cifs_i = CIFS_I(inode);
98
f96637be
JP
99 cifs_dbg(FYI, "%s: revalidating inode %llu\n",
100 __func__, cifs_i->uniqueid);
df2cf170
JL
101
102 if (inode->i_state & I_NEW) {
f96637be
JP
103 cifs_dbg(FYI, "%s: inode %llu is new\n",
104 __func__, cifs_i->uniqueid);
df2cf170
JL
105 return;
106 }
107
108 /* don't bother with revalidation if we have an oplock */
18cceb6a 109 if (CIFS_CACHE_READ(cifs_i)) {
f96637be
JP
110 cifs_dbg(FYI, "%s: inode %llu is oplocked\n",
111 __func__, cifs_i->uniqueid);
df2cf170
JL
112 return;
113 }
114
115 /* revalidate if mtime or size have changed */
116 if (timespec_equal(&inode->i_mtime, &fattr->cf_mtime) &&
117 cifs_i->server_eof == fattr->cf_eof) {
f96637be
JP
118 cifs_dbg(FYI, "%s: inode %llu is unchanged\n",
119 __func__, cifs_i->uniqueid);
df2cf170
JL
120 return;
121 }
122
f96637be
JP
123 cifs_dbg(FYI, "%s: invalidating inode %llu mapping\n",
124 __func__, cifs_i->uniqueid);
aff8d5ca 125 set_bit(CIFS_INO_INVALID_MAPPING, &cifs_i->flags);
df2cf170
JL
126}
127
74d290da
JM
128/*
129 * copy nlink to the inode, unless it wasn't provided. Provide
130 * sane values if we don't have an existing one and none was provided
131 */
132static void
133cifs_nlink_fattr_to_inode(struct inode *inode, struct cifs_fattr *fattr)
134{
135 /*
136 * if we're in a situation where we can't trust what we
137 * got from the server (readdir, some non-unix cases)
138 * fake reasonable values
139 */
140 if (fattr->cf_flags & CIFS_FATTR_UNKNOWN_NLINK) {
141 /* only provide fake values on a new inode */
142 if (inode->i_state & I_NEW) {
143 if (fattr->cf_cifsattrs & ATTR_DIRECTORY)
144 set_nlink(inode, 2);
145 else
146 set_nlink(inode, 1);
147 }
148 return;
149 }
150
151 /* we trust the server, so update it */
152 set_nlink(inode, fattr->cf_nlink);
153}
154
cc0bad75
JL
155/* populate an inode with info from a cifs_fattr struct */
156void
157cifs_fattr_to_inode(struct inode *inode, struct cifs_fattr *fattr)
75f12983 158{
cc0bad75 159 struct cifsInodeInfo *cifs_i = CIFS_I(inode);
0b8f18e3 160 struct cifs_sb_info *cifs_sb = CIFS_SB(inode->i_sb);
cc0bad75 161
df2cf170
JL
162 cifs_revalidate_cache(inode, fattr);
163
b7ca6928 164 spin_lock(&inode->i_lock);
cc0bad75
JL
165 inode->i_atime = fattr->cf_atime;
166 inode->i_mtime = fattr->cf_mtime;
167 inode->i_ctime = fattr->cf_ctime;
cc0bad75 168 inode->i_rdev = fattr->cf_rdev;
74d290da 169 cifs_nlink_fattr_to_inode(inode, fattr);
cc0bad75
JL
170 inode->i_uid = fattr->cf_uid;
171 inode->i_gid = fattr->cf_gid;
172
0b8f18e3
JL
173 /* if dynperm is set, don't clobber existing mode */
174 if (inode->i_state & I_NEW ||
175 !(cifs_sb->mnt_cifs_flags & CIFS_MOUNT_DYNPERM))
176 inode->i_mode = fattr->cf_mode;
177
cc0bad75 178 cifs_i->cifsAttrs = fattr->cf_cifsattrs;
75f12983 179
0b8f18e3
JL
180 if (fattr->cf_flags & CIFS_FATTR_NEED_REVAL)
181 cifs_i->time = 0;
182 else
183 cifs_i->time = jiffies;
184
aff8d5ca
JL
185 if (fattr->cf_flags & CIFS_FATTR_DELETE_PENDING)
186 set_bit(CIFS_INO_DELETE_PENDING, &cifs_i->flags);
187 else
188 clear_bit(CIFS_INO_DELETE_PENDING, &cifs_i->flags);
cc0bad75 189
835a36ca 190 cifs_i->server_eof = fattr->cf_eof;
cc0bad75
JL
191 /*
192 * Can't safely change the file size here if the client is writing to
193 * it due to potential races.
194 */
cc0bad75
JL
195 if (is_size_safe_to_change(cifs_i, fattr->cf_eof)) {
196 i_size_write(inode, fattr->cf_eof);
197
198 /*
199 * i_blocks is not related to (i_size / i_blksize),
200 * but instead 512 byte (2**9) size is required for
201 * calculating num blocks.
202 */
203 inode->i_blocks = (512 - 1 + fattr->cf_bytes) >> 9;
204 }
205 spin_unlock(&inode->i_lock);
206
01c64fea
DH
207 if (fattr->cf_flags & CIFS_FATTR_DFS_REFERRAL)
208 inode->i_flags |= S_AUTOMOUNT;
c2b93e06
JL
209 if (inode->i_state & I_NEW)
210 cifs_set_ops(inode);
cc0bad75
JL
211}
212
4065c802
JL
213void
214cifs_fill_uniqueid(struct super_block *sb, struct cifs_fattr *fattr)
215{
216 struct cifs_sb_info *cifs_sb = CIFS_SB(sb);
217
218 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_SERVER_INUM)
219 return;
220
221 fattr->cf_uniqueid = iunique(sb, ROOT_I);
222}
223
cc0bad75
JL
224/* Fill a cifs_fattr struct with info from FILE_UNIX_BASIC_INFO. */
225void
226cifs_unix_basic_to_fattr(struct cifs_fattr *fattr, FILE_UNIX_BASIC_INFO *info,
227 struct cifs_sb_info *cifs_sb)
228{
229 memset(fattr, 0, sizeof(*fattr));
230 fattr->cf_uniqueid = le64_to_cpu(info->UniqueId);
231 fattr->cf_bytes = le64_to_cpu(info->NumOfBytes);
232 fattr->cf_eof = le64_to_cpu(info->EndOfFile);
233
234 fattr->cf_atime = cifs_NTtimeToUnix(info->LastAccessTime);
235 fattr->cf_mtime = cifs_NTtimeToUnix(info->LastModificationTime);
236 fattr->cf_ctime = cifs_NTtimeToUnix(info->LastStatusChange);
237 fattr->cf_mode = le64_to_cpu(info->Permissions);
75f12983
CH
238
239 /*
240 * Since we set the inode type below we need to mask off
241 * to avoid strange results if bits set above.
242 */
cc0bad75 243 fattr->cf_mode &= ~S_IFMT;
75f12983
CH
244 switch (le32_to_cpu(info->Type)) {
245 case UNIX_FILE:
cc0bad75
JL
246 fattr->cf_mode |= S_IFREG;
247 fattr->cf_dtype = DT_REG;
75f12983
CH
248 break;
249 case UNIX_SYMLINK:
cc0bad75
JL
250 fattr->cf_mode |= S_IFLNK;
251 fattr->cf_dtype = DT_LNK;
75f12983
CH
252 break;
253 case UNIX_DIR:
cc0bad75
JL
254 fattr->cf_mode |= S_IFDIR;
255 fattr->cf_dtype = DT_DIR;
75f12983
CH
256 break;
257 case UNIX_CHARDEV:
cc0bad75
JL
258 fattr->cf_mode |= S_IFCHR;
259 fattr->cf_dtype = DT_CHR;
260 fattr->cf_rdev = MKDEV(le64_to_cpu(info->DevMajor),
261 le64_to_cpu(info->DevMinor) & MINORMASK);
75f12983
CH
262 break;
263 case UNIX_BLOCKDEV:
cc0bad75
JL
264 fattr->cf_mode |= S_IFBLK;
265 fattr->cf_dtype = DT_BLK;
266 fattr->cf_rdev = MKDEV(le64_to_cpu(info->DevMajor),
267 le64_to_cpu(info->DevMinor) & MINORMASK);
75f12983
CH
268 break;
269 case UNIX_FIFO:
cc0bad75
JL
270 fattr->cf_mode |= S_IFIFO;
271 fattr->cf_dtype = DT_FIFO;
75f12983
CH
272 break;
273 case UNIX_SOCKET:
cc0bad75
JL
274 fattr->cf_mode |= S_IFSOCK;
275 fattr->cf_dtype = DT_SOCK;
75f12983
CH
276 break;
277 default:
278 /* safest to call it a file if we do not know */
cc0bad75
JL
279 fattr->cf_mode |= S_IFREG;
280 fattr->cf_dtype = DT_REG;
f96637be 281 cifs_dbg(FYI, "unknown type %d\n", le32_to_cpu(info->Type));
75f12983
CH
282 break;
283 }
284
46bbc25f
EB
285 fattr->cf_uid = cifs_sb->mnt_uid;
286 if (!(cifs_sb->mnt_cifs_flags & CIFS_MOUNT_OVERR_UID)) {
287 u64 id = le64_to_cpu(info->Uid);
4a2c8cf5
EB
288 if (id < ((uid_t)-1)) {
289 kuid_t uid = make_kuid(&init_user_ns, id);
290 if (uid_valid(uid))
291 fattr->cf_uid = uid;
292 }
46bbc25f
EB
293 }
294
295 fattr->cf_gid = cifs_sb->mnt_gid;
296 if (!(cifs_sb->mnt_cifs_flags & CIFS_MOUNT_OVERR_GID)) {
297 u64 id = le64_to_cpu(info->Gid);
4a2c8cf5
EB
298 if (id < ((gid_t)-1)) {
299 kgid_t gid = make_kgid(&init_user_ns, id);
300 if (gid_valid(gid))
301 fattr->cf_gid = gid;
302 }
46bbc25f 303 }
75f12983 304
cc0bad75 305 fattr->cf_nlink = le64_to_cpu(info->Nlinks);
75f12983
CH
306}
307
b9a3260f 308/*
cc0bad75
JL
309 * Fill a cifs_fattr struct with fake inode info.
310 *
311 * Needed to setup cifs_fattr data for the directory which is the
312 * junction to the new submount (ie to setup the fake directory
313 * which represents a DFS referral).
b9a3260f 314 */
f1230c97 315static void
cc0bad75 316cifs_create_dfs_fattr(struct cifs_fattr *fattr, struct super_block *sb)
0e4bbde9 317{
cc0bad75 318 struct cifs_sb_info *cifs_sb = CIFS_SB(sb);
0e4bbde9 319
f96637be 320 cifs_dbg(FYI, "creating fake fattr for DFS referral\n");
cc0bad75
JL
321
322 memset(fattr, 0, sizeof(*fattr));
323 fattr->cf_mode = S_IFDIR | S_IXUGO | S_IRWXU;
324 fattr->cf_uid = cifs_sb->mnt_uid;
325 fattr->cf_gid = cifs_sb->mnt_gid;
e37fea58
DD
326 ktime_get_real_ts(&fattr->cf_mtime);
327 fattr->cf_mtime = timespec_trunc(fattr->cf_mtime, sb->s_time_gran);
328 fattr->cf_atime = fattr->cf_ctime = fattr->cf_mtime;
cc0bad75
JL
329 fattr->cf_nlink = 2;
330 fattr->cf_flags |= CIFS_FATTR_DFS_REFERRAL;
0e4bbde9
SF
331}
332
4ad65044
PS
333static int
334cifs_get_file_info_unix(struct file *filp)
abab095d
JL
335{
336 int rc;
6d5786a3 337 unsigned int xid;
abab095d
JL
338 FILE_UNIX_BASIC_INFO find_data;
339 struct cifs_fattr fattr;
496ad9aa 340 struct inode *inode = file_inode(filp);
abab095d 341 struct cifs_sb_info *cifs_sb = CIFS_SB(inode->i_sb);
c21dfb69 342 struct cifsFileInfo *cfile = filp->private_data;
96daf2b0 343 struct cifs_tcon *tcon = tlink_tcon(cfile->tlink);
abab095d 344
6d5786a3 345 xid = get_xid();
4b4de76e 346 rc = CIFSSMBUnixQFileInfo(xid, tcon, cfile->fid.netfid, &find_data);
abab095d
JL
347 if (!rc) {
348 cifs_unix_basic_to_fattr(&fattr, &find_data, cifs_sb);
349 } else if (rc == -EREMOTE) {
350 cifs_create_dfs_fattr(&fattr, inode->i_sb);
351 rc = 0;
352 }
353
354 cifs_fattr_to_inode(inode, &fattr);
6d5786a3 355 free_xid(xid);
abab095d
JL
356 return rc;
357}
358
1da177e4 359int cifs_get_inode_info_unix(struct inode **pinode,
cc0bad75 360 const unsigned char *full_path,
6d5786a3 361 struct super_block *sb, unsigned int xid)
1da177e4 362{
cc0bad75 363 int rc;
0e4bbde9 364 FILE_UNIX_BASIC_INFO find_data;
cc0bad75 365 struct cifs_fattr fattr;
96daf2b0 366 struct cifs_tcon *tcon;
7ffec372 367 struct tcon_link *tlink;
1da177e4 368 struct cifs_sb_info *cifs_sb = CIFS_SB(sb);
1da177e4 369
f96637be 370 cifs_dbg(FYI, "Getting info on %s\n", full_path);
7962670e 371
7ffec372
JL
372 tlink = cifs_sb_tlink(cifs_sb);
373 if (IS_ERR(tlink))
374 return PTR_ERR(tlink);
375 tcon = tlink_tcon(tlink);
376
1da177e4 377 /* could have done a find first instead but this returns more info */
cc0bad75 378 rc = CIFSSMBUnixQPathInfo(xid, tcon, full_path, &find_data,
bc8ebdc4 379 cifs_sb->local_nls, cifs_remap(cifs_sb));
7ffec372 380 cifs_put_tlink(tlink);
e911d0cc 381
cc0bad75
JL
382 if (!rc) {
383 cifs_unix_basic_to_fattr(&fattr, &find_data, cifs_sb);
384 } else if (rc == -EREMOTE) {
385 cifs_create_dfs_fattr(&fattr, sb);
386 rc = 0;
387 } else {
388 return rc;
389 }
1da177e4 390
1b12b9c1
SM
391 /* check for Minshall+French symlinks */
392 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_MF_SYMLINKS) {
cb084b1a
SP
393 int tmprc = check_mf_symlink(xid, tcon, cifs_sb, &fattr,
394 full_path);
1b12b9c1 395 if (tmprc)
cb084b1a 396 cifs_dbg(FYI, "check_mf_symlink: %d\n", tmprc);
1b12b9c1
SM
397 }
398
0e4bbde9 399 if (*pinode == NULL) {
cc0bad75 400 /* get new inode */
4065c802 401 cifs_fill_uniqueid(sb, &fattr);
cc0bad75
JL
402 *pinode = cifs_iget(sb, &fattr);
403 if (!*pinode)
0e4bbde9 404 rc = -ENOMEM;
cc0bad75
JL
405 } else {
406 /* we already have inode, update it */
7196ac11
NA
407
408 /* if uniqueid is different, return error */
409 if (unlikely(cifs_sb->mnt_cifs_flags & CIFS_MOUNT_SERVER_INUM &&
410 CIFS_I(*pinode)->uniqueid != fattr.cf_uniqueid)) {
411 rc = -ESTALE;
412 goto cgiiu_exit;
413 }
414
415 /* if filetype is different, return error */
416 if (unlikely(((*pinode)->i_mode & S_IFMT) !=
417 (fattr.cf_mode & S_IFMT))) {
418 rc = -ESTALE;
419 goto cgiiu_exit;
420 }
421
cc0bad75 422 cifs_fattr_to_inode(*pinode, &fattr);
0e4bbde9 423 }
1da177e4 424
7196ac11 425cgiiu_exit:
1da177e4
LT
426 return rc;
427}
428
0b8f18e3 429static int
0360d605 430cifs_sfu_type(struct cifs_fattr *fattr, const char *path,
6d5786a3 431 struct cifs_sb_info *cifs_sb, unsigned int xid)
d6e2f2a4
SF
432{
433 int rc;
db8b631d 434 __u32 oplock;
7ffec372 435 struct tcon_link *tlink;
96daf2b0 436 struct cifs_tcon *tcon;
d81b8a40
PS
437 struct cifs_fid fid;
438 struct cifs_open_parms oparms;
d4ffff1f 439 struct cifs_io_parms io_parms;
86c96b4b 440 char buf[24];
d6e2f2a4 441 unsigned int bytes_read;
fb8c4b14 442 char *pbuf;
0360d605 443 int buf_type = CIFS_NO_BUFFER;
d6e2f2a4
SF
444
445 pbuf = buf;
446
0b8f18e3
JL
447 fattr->cf_mode &= ~S_IFMT;
448
449 if (fattr->cf_eof == 0) {
450 fattr->cf_mode |= S_IFIFO;
451 fattr->cf_dtype = DT_FIFO;
d6e2f2a4 452 return 0;
0b8f18e3
JL
453 } else if (fattr->cf_eof < 8) {
454 fattr->cf_mode |= S_IFREG;
455 fattr->cf_dtype = DT_REG;
d6e2f2a4
SF
456 return -EINVAL; /* EOPNOTSUPP? */
457 }
50c2f753 458
7ffec372
JL
459 tlink = cifs_sb_tlink(cifs_sb);
460 if (IS_ERR(tlink))
461 return PTR_ERR(tlink);
462 tcon = tlink_tcon(tlink);
463
d81b8a40
PS
464 oparms.tcon = tcon;
465 oparms.cifs_sb = cifs_sb;
466 oparms.desired_access = GENERIC_READ;
467 oparms.create_options = CREATE_NOT_DIR;
468 oparms.disposition = FILE_OPEN;
469 oparms.path = path;
470 oparms.fid = &fid;
471 oparms.reconnect = false;
472
db8b631d
SF
473 if (tcon->ses->server->oplocks)
474 oplock = REQ_OPLOCK;
475 else
476 oplock = 0;
477 rc = tcon->ses->server->ops->open(xid, &oparms, &oplock, NULL);
0360d605 478 if (rc) {
db8b631d 479 cifs_dbg(FYI, "check sfu type of %s, open rc = %d\n", path, rc);
0360d605
PS
480 cifs_put_tlink(tlink);
481 return rc;
482 }
483
484 /* Read header */
d81b8a40 485 io_parms.netfid = fid.netfid;
0360d605
PS
486 io_parms.pid = current->tgid;
487 io_parms.tcon = tcon;
488 io_parms.offset = 0;
489 io_parms.length = 24;
490
db8b631d
SF
491 rc = tcon->ses->server->ops->sync_read(xid, &fid, &io_parms,
492 &bytes_read, &pbuf, &buf_type);
0360d605
PS
493 if ((rc == 0) && (bytes_read >= 8)) {
494 if (memcmp("IntxBLK", pbuf, 8) == 0) {
495 cifs_dbg(FYI, "Block device\n");
496 fattr->cf_mode |= S_IFBLK;
497 fattr->cf_dtype = DT_BLK;
498 if (bytes_read == 24) {
499 /* we have enough to decode dev num */
500 __u64 mjr; /* major */
501 __u64 mnr; /* minor */
502 mjr = le64_to_cpu(*(__le64 *)(pbuf+8));
503 mnr = le64_to_cpu(*(__le64 *)(pbuf+16));
504 fattr->cf_rdev = MKDEV(mjr, mnr);
86c96b4b 505 }
0360d605
PS
506 } else if (memcmp("IntxCHR", pbuf, 8) == 0) {
507 cifs_dbg(FYI, "Char device\n");
508 fattr->cf_mode |= S_IFCHR;
509 fattr->cf_dtype = DT_CHR;
510 if (bytes_read == 24) {
511 /* we have enough to decode dev num */
512 __u64 mjr; /* major */
513 __u64 mnr; /* minor */
514 mjr = le64_to_cpu(*(__le64 *)(pbuf+8));
515 mnr = le64_to_cpu(*(__le64 *)(pbuf+16));
516 fattr->cf_rdev = MKDEV(mjr, mnr);
517 }
518 } else if (memcmp("IntxLNK", pbuf, 7) == 0) {
519 cifs_dbg(FYI, "Symlink\n");
520 fattr->cf_mode |= S_IFLNK;
521 fattr->cf_dtype = DT_LNK;
3020a1f5 522 } else {
0360d605 523 fattr->cf_mode |= S_IFREG; /* file? */
0b8f18e3 524 fattr->cf_dtype = DT_REG;
0360d605 525 rc = -EOPNOTSUPP;
fb8c4b14 526 }
0360d605
PS
527 } else {
528 fattr->cf_mode |= S_IFREG; /* then it is a file */
529 fattr->cf_dtype = DT_REG;
530 rc = -EOPNOTSUPP; /* or some unknown SFU type */
d6e2f2a4 531 }
db8b631d
SF
532
533 tcon->ses->server->ops->close(xid, tcon, &fid);
7ffec372 534 cifs_put_tlink(tlink);
d6e2f2a4 535 return rc;
d6e2f2a4
SF
536}
537
9e294f1c
SF
538#define SFBITS_MASK (S_ISVTX | S_ISGID | S_ISUID) /* SETFILEBITS valid bits */
539
0b8f18e3
JL
540/*
541 * Fetch mode bits as provided by SFU.
542 *
543 * FIXME: Doesn't this clobber the type bit we got from cifs_sfu_type ?
544 */
545static int cifs_sfu_mode(struct cifs_fattr *fattr, const unsigned char *path,
6d5786a3 546 struct cifs_sb_info *cifs_sb, unsigned int xid)
9e294f1c 547{
3020a1f5 548#ifdef CONFIG_CIFS_XATTR
9e294f1c
SF
549 ssize_t rc;
550 char ea_value[4];
551 __u32 mode;
7ffec372 552 struct tcon_link *tlink;
96daf2b0 553 struct cifs_tcon *tcon;
7ffec372
JL
554
555 tlink = cifs_sb_tlink(cifs_sb);
556 if (IS_ERR(tlink))
557 return PTR_ERR(tlink);
558 tcon = tlink_tcon(tlink);
9e294f1c 559
d979f3b0
SF
560 if (tcon->ses->server->ops->query_all_EAs == NULL) {
561 cifs_put_tlink(tlink);
562 return -EOPNOTSUPP;
563 }
564
565 rc = tcon->ses->server->ops->query_all_EAs(xid, tcon, path,
566 "SETFILEBITS", ea_value, 4 /* size of buf */,
67b4c889 567 cifs_sb);
7ffec372 568 cifs_put_tlink(tlink);
4523cc30 569 if (rc < 0)
9e294f1c
SF
570 return (int)rc;
571 else if (rc > 3) {
572 mode = le32_to_cpu(*((__le32 *)ea_value));
0b8f18e3 573 fattr->cf_mode &= ~SFBITS_MASK;
f96637be
JP
574 cifs_dbg(FYI, "special bits 0%o org mode 0%o\n",
575 mode, fattr->cf_mode);
0b8f18e3 576 fattr->cf_mode = (mode & SFBITS_MASK) | fattr->cf_mode;
f96637be 577 cifs_dbg(FYI, "special mode bits 0%o\n", mode);
9e294f1c 578 }
0b8f18e3
JL
579
580 return 0;
3020a1f5
SF
581#else
582 return -EOPNOTSUPP;
583#endif
9e294f1c
SF
584}
585
0b8f18e3 586/* Fill a cifs_fattr struct with info from FILE_ALL_INFO */
f1230c97 587static void
0b8f18e3 588cifs_all_info_to_fattr(struct cifs_fattr *fattr, FILE_ALL_INFO *info,
e37fea58 589 struct super_block *sb, bool adjust_tz,
eb85d94b 590 bool symlink)
b9a3260f 591{
e37fea58 592 struct cifs_sb_info *cifs_sb = CIFS_SB(sb);
96daf2b0 593 struct cifs_tcon *tcon = cifs_sb_master_tcon(cifs_sb);
0d424ad0 594
0b8f18e3
JL
595 memset(fattr, 0, sizeof(*fattr));
596 fattr->cf_cifsattrs = le32_to_cpu(info->Attributes);
597 if (info->DeletePending)
598 fattr->cf_flags |= CIFS_FATTR_DELETE_PENDING;
599
600 if (info->LastAccessTime)
601 fattr->cf_atime = cifs_NTtimeToUnix(info->LastAccessTime);
e37fea58
DD
602 else {
603 ktime_get_real_ts(&fattr->cf_atime);
604 fattr->cf_atime = timespec_trunc(fattr->cf_atime, sb->s_time_gran);
605 }
0b8f18e3
JL
606
607 fattr->cf_ctime = cifs_NTtimeToUnix(info->ChangeTime);
608 fattr->cf_mtime = cifs_NTtimeToUnix(info->LastWriteTime);
609
610 if (adjust_tz) {
0d424ad0
JL
611 fattr->cf_ctime.tv_sec += tcon->ses->server->timeAdj;
612 fattr->cf_mtime.tv_sec += tcon->ses->server->timeAdj;
0b8f18e3
JL
613 }
614
615 fattr->cf_eof = le64_to_cpu(info->EndOfFile);
616 fattr->cf_bytes = le64_to_cpu(info->AllocationSize);
20054bd6 617 fattr->cf_createtime = le64_to_cpu(info->CreationTime);
0b8f18e3 618
74d290da 619 fattr->cf_nlink = le32_to_cpu(info->NumberOfLinks);
eb85d94b
PS
620
621 if (symlink) {
622 fattr->cf_mode = S_IFLNK;
623 fattr->cf_dtype = DT_LNK;
624 } else if (fattr->cf_cifsattrs & ATTR_DIRECTORY) {
0b8f18e3
JL
625 fattr->cf_mode = S_IFDIR | cifs_sb->mnt_dir_mode;
626 fattr->cf_dtype = DT_DIR;
6de2ce42
PS
627 /*
628 * Server can return wrong NumberOfLinks value for directories
629 * when Unix extensions are disabled - fake it.
630 */
74d290da
JM
631 if (!tcon->unix_ext)
632 fattr->cf_flags |= CIFS_FATTR_UNKNOWN_NLINK;
0b8f18e3
JL
633 } else {
634 fattr->cf_mode = S_IFREG | cifs_sb->mnt_file_mode;
635 fattr->cf_dtype = DT_REG;
0b8f18e3 636
d0c280d2
JL
637 /* clear write bits if ATTR_READONLY is set */
638 if (fattr->cf_cifsattrs & ATTR_READONLY)
639 fattr->cf_mode &= ~(S_IWUGO);
0b8f18e3 640
74d290da
JM
641 /*
642 * Don't accept zero nlink from non-unix servers unless
643 * delete is pending. Instead mark it as unknown.
644 */
645 if ((fattr->cf_nlink < 1) && !tcon->unix_ext &&
646 !info->DeletePending) {
647 cifs_dbg(1, "bogus file nlink value %u\n",
6658b9f7 648 fattr->cf_nlink);
74d290da 649 fattr->cf_flags |= CIFS_FATTR_UNKNOWN_NLINK;
6658b9f7 650 }
6de2ce42 651 }
0b8f18e3
JL
652
653 fattr->cf_uid = cifs_sb->mnt_uid;
654 fattr->cf_gid = cifs_sb->mnt_gid;
b9a3260f
SF
655}
656
4ad65044
PS
657static int
658cifs_get_file_info(struct file *filp)
abab095d
JL
659{
660 int rc;
6d5786a3 661 unsigned int xid;
abab095d
JL
662 FILE_ALL_INFO find_data;
663 struct cifs_fattr fattr;
496ad9aa 664 struct inode *inode = file_inode(filp);
c21dfb69 665 struct cifsFileInfo *cfile = filp->private_data;
96daf2b0 666 struct cifs_tcon *tcon = tlink_tcon(cfile->tlink);
4ad65044
PS
667 struct TCP_Server_Info *server = tcon->ses->server;
668
669 if (!server->ops->query_file_info)
670 return -ENOSYS;
abab095d 671
6d5786a3 672 xid = get_xid();
4ad65044 673 rc = server->ops->query_file_info(xid, tcon, &cfile->fid, &find_data);
42274bb2
PS
674 switch (rc) {
675 case 0:
e37fea58 676 cifs_all_info_to_fattr(&fattr, &find_data, inode->i_sb, false,
eb85d94b 677 false);
42274bb2
PS
678 break;
679 case -EREMOTE:
680 cifs_create_dfs_fattr(&fattr, inode->i_sb);
681 rc = 0;
682 break;
683 case -EOPNOTSUPP:
684 case -EINVAL:
abab095d
JL
685 /*
686 * FIXME: legacy server -- fall back to path-based call?
ff215713
SF
687 * for now, just skip revalidating and mark inode for
688 * immediate reval.
689 */
abab095d
JL
690 rc = 0;
691 CIFS_I(inode)->time = 0;
42274bb2 692 default:
abab095d 693 goto cgfi_exit;
42274bb2 694 }
abab095d
JL
695
696 /*
697 * don't bother with SFU junk here -- just mark inode as needing
698 * revalidation.
699 */
abab095d
JL
700 fattr.cf_uniqueid = CIFS_I(inode)->uniqueid;
701 fattr.cf_flags |= CIFS_FATTR_NEED_REVAL;
702 cifs_fattr_to_inode(inode, &fattr);
703cgfi_exit:
6d5786a3 704 free_xid(xid);
abab095d
JL
705 return rc;
706}
707
1208ef1f
PS
708int
709cifs_get_inode_info(struct inode **inode, const char *full_path,
710 FILE_ALL_INFO *data, struct super_block *sb, int xid,
42eacf9e 711 const struct cifs_fid *fid)
1da177e4 712{
c052e2b4
SP
713 bool validinum = false;
714 __u16 srchflgs;
715 int rc = 0, tmprc = ENOSYS;
1208ef1f
PS
716 struct cifs_tcon *tcon;
717 struct TCP_Server_Info *server;
7ffec372 718 struct tcon_link *tlink;
1da177e4 719 struct cifs_sb_info *cifs_sb = CIFS_SB(sb);
1da177e4 720 char *buf = NULL;
1208ef1f 721 bool adjust_tz = false;
0b8f18e3 722 struct cifs_fattr fattr;
c052e2b4 723 struct cifs_search_info *srchinf = NULL;
eb85d94b 724 bool symlink = false;
1da177e4 725
7ffec372
JL
726 tlink = cifs_sb_tlink(cifs_sb);
727 if (IS_ERR(tlink))
728 return PTR_ERR(tlink);
1208ef1f
PS
729 tcon = tlink_tcon(tlink);
730 server = tcon->ses->server;
7ffec372 731
f96637be 732 cifs_dbg(FYI, "Getting info on %s\n", full_path);
1da177e4 733
1208ef1f 734 if ((data == NULL) && (*inode != NULL)) {
18cceb6a 735 if (CIFS_CACHE_READ(CIFS_I(*inode))) {
f96637be 736 cifs_dbg(FYI, "No need to revalidate cached inode sizes\n");
7ffec372 737 goto cgii_exit;
1da177e4
LT
738 }
739 }
740
1208ef1f
PS
741 /* if inode info is not passed, get it from server */
742 if (data == NULL) {
743 if (!server->ops->query_path_info) {
744 rc = -ENOSYS;
745 goto cgii_exit;
746 }
1da177e4 747 buf = kmalloc(sizeof(FILE_ALL_INFO), GFP_KERNEL);
7ffec372
JL
748 if (buf == NULL) {
749 rc = -ENOMEM;
750 goto cgii_exit;
751 }
1208ef1f
PS
752 data = (FILE_ALL_INFO *)buf;
753 rc = server->ops->query_path_info(xid, tcon, cifs_sb, full_path,
eb85d94b 754 data, &adjust_tz, &symlink);
1da177e4 755 }
0b8f18e3
JL
756
757 if (!rc) {
e37fea58 758 cifs_all_info_to_fattr(&fattr, data, sb, adjust_tz,
eb85d94b 759 symlink);
0b8f18e3
JL
760 } else if (rc == -EREMOTE) {
761 cifs_create_dfs_fattr(&fattr, sb);
b9a3260f 762 rc = 0;
c052e2b4
SP
763 } else if (rc == -EACCES && backup_cred(cifs_sb)) {
764 srchinf = kzalloc(sizeof(struct cifs_search_info),
765 GFP_KERNEL);
766 if (srchinf == NULL) {
767 rc = -ENOMEM;
768 goto cgii_exit;
769 }
770
771 srchinf->endOfSearch = false;
772 srchinf->info_level = SMB_FIND_FILE_ID_FULL_DIR_INFO;
773
774 srchflgs = CIFS_SEARCH_CLOSE_ALWAYS |
775 CIFS_SEARCH_CLOSE_AT_END |
776 CIFS_SEARCH_BACKUP_SEARCH;
777
778 rc = CIFSFindFirst(xid, tcon, full_path,
779 cifs_sb, NULL, srchflgs, srchinf, false);
780 if (!rc) {
781 data =
782 (FILE_ALL_INFO *)srchinf->srch_entries_start;
783
784 cifs_dir_info_to_fattr(&fattr,
785 (FILE_DIRECTORY_INFO *)data, cifs_sb);
786 fattr.cf_uniqueid = le64_to_cpu(
787 ((SEARCH_ID_FULL_DIR_INFO *)data)->UniqueId);
788 validinum = true;
789
790 cifs_buf_release(srchinf->ntwrk_buf_start);
791 }
792 kfree(srchinf);
4c5930e8
SF
793 if (rc)
794 goto cgii_exit;
c052e2b4 795 } else
7962670e 796 goto cgii_exit;
1da177e4 797
0b8f18e3
JL
798 /*
799 * If an inode wasn't passed in, then get the inode number
800 *
801 * Is an i_ino of zero legal? Can we use that to check if the server
802 * supports returning inode numbers? Are there other sanity checks we
803 * can use to ensure that the server is really filling in that field?
0b8f18e3 804 */
1208ef1f 805 if (*inode == NULL) {
b9a3260f 806 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_SERVER_INUM) {
c052e2b4
SP
807 if (validinum == false) {
808 if (server->ops->get_srv_inum)
809 tmprc = server->ops->get_srv_inum(xid,
810 tcon, cifs_sb, full_path,
811 &fattr.cf_uniqueid, data);
812 if (tmprc) {
f96637be
JP
813 cifs_dbg(FYI, "GetSrvInodeNum rc %d\n",
814 tmprc);
c052e2b4
SP
815 fattr.cf_uniqueid = iunique(sb, ROOT_I);
816 cifs_autodisable_serverino(cifs_sb);
817 }
132ac7b7 818 }
c052e2b4 819 } else
0b8f18e3 820 fattr.cf_uniqueid = iunique(sb, ROOT_I);
a108471b
RL
821 } else {
822 if ((cifs_sb->mnt_cifs_flags & CIFS_MOUNT_SERVER_INUM) &&
823 validinum == false && server->ops->get_srv_inum) {
824 /*
825 * Pass a NULL tcon to ensure we don't make a round
826 * trip to the server. This only works for SMB2+.
827 */
828 tmprc = server->ops->get_srv_inum(xid,
829 NULL, cifs_sb, full_path,
830 &fattr.cf_uniqueid, data);
831 if (tmprc)
832 fattr.cf_uniqueid = CIFS_I(*inode)->uniqueid;
833 } else
834 fattr.cf_uniqueid = CIFS_I(*inode)->uniqueid;
835 }
b9a3260f 836
0b8f18e3
JL
837 /* query for SFU type info if supported and needed */
838 if (fattr.cf_cifsattrs & ATTR_SYSTEM &&
839 cifs_sb->mnt_cifs_flags & CIFS_MOUNT_UNX_EMUL) {
840 tmprc = cifs_sfu_type(&fattr, full_path, cifs_sb, xid);
841 if (tmprc)
f96637be 842 cifs_dbg(FYI, "cifs_sfu_type failed: %d\n", tmprc);
b9a3260f 843 }
1da177e4 844
79df1bae 845#ifdef CONFIG_CIFS_ACL
b9a3260f
SF
846 /* fill in 0777 bits from ACL */
847 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_CIFS_ACL) {
1208ef1f 848 rc = cifs_acl_to_fattr(cifs_sb, &fattr, *inode, full_path, fid);
78415d2d 849 if (rc) {
f96637be
JP
850 cifs_dbg(FYI, "%s: Getting ACL failed with error: %d\n",
851 __func__, rc);
78415d2d
SP
852 goto cgii_exit;
853 }
b9a3260f 854 }
79df1bae 855#endif /* CONFIG_CIFS_ACL */
b9a3260f 856
0b8f18e3
JL
857 /* fill in remaining high mode bits e.g. SUID, VTX */
858 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_UNX_EMUL)
859 cifs_sfu_mode(&fattr, full_path, cifs_sb, xid);
b9a3260f 860
1b12b9c1
SM
861 /* check for Minshall+French symlinks */
862 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_MF_SYMLINKS) {
cb084b1a
SP
863 tmprc = check_mf_symlink(xid, tcon, cifs_sb, &fattr,
864 full_path);
1b12b9c1 865 if (tmprc)
cb084b1a 866 cifs_dbg(FYI, "check_mf_symlink: %d\n", tmprc);
1b12b9c1
SM
867 }
868
1208ef1f
PS
869 if (!*inode) {
870 *inode = cifs_iget(sb, &fattr);
871 if (!*inode)
0b8f18e3
JL
872 rc = -ENOMEM;
873 } else {
7196ac11
NA
874 /* we already have inode, update it */
875
a108471b
RL
876 /* if uniqueid is different, return error */
877 if (unlikely(cifs_sb->mnt_cifs_flags & CIFS_MOUNT_SERVER_INUM &&
878 CIFS_I(*inode)->uniqueid != fattr.cf_uniqueid)) {
879 rc = -ESTALE;
880 goto cgii_exit;
881 }
882
7196ac11
NA
883 /* if filetype is different, return error */
884 if (unlikely(((*inode)->i_mode & S_IFMT) !=
885 (fattr.cf_mode & S_IFMT))) {
886 rc = -ESTALE;
887 goto cgii_exit;
888 }
889
1208ef1f 890 cifs_fattr_to_inode(*inode, &fattr);
0b8f18e3 891 }
b9a3260f 892
7962670e 893cgii_exit:
1da177e4 894 kfree(buf);
7ffec372 895 cifs_put_tlink(tlink);
1da177e4
LT
896 return rc;
897}
898
7f8ed420
SF
899static const struct inode_operations cifs_ipc_inode_ops = {
900 .lookup = cifs_lookup,
901};
902
cc0bad75
JL
903static int
904cifs_find_inode(struct inode *inode, void *opaque)
905{
906 struct cifs_fattr *fattr = (struct cifs_fattr *) opaque;
907
f30b9c11 908 /* don't match inode with different uniqueid */
cc0bad75
JL
909 if (CIFS_I(inode)->uniqueid != fattr->cf_uniqueid)
910 return 0;
911
20054bd6
JL
912 /* use createtime like an i_generation field */
913 if (CIFS_I(inode)->createtime != fattr->cf_createtime)
914 return 0;
915
f30b9c11
JL
916 /* don't match inode of different type */
917 if ((inode->i_mode & S_IFMT) != (fattr->cf_mode & S_IFMT))
918 return 0;
919
5acfec25 920 /* if it's not a directory or has no dentries, then flag it */
b3d9b7a3 921 if (S_ISDIR(inode->i_mode) && !hlist_empty(&inode->i_dentry))
3d694380 922 fattr->cf_flags |= CIFS_FATTR_INO_COLLISION;
3d694380 923
cc0bad75
JL
924 return 1;
925}
926
927static int
928cifs_init_inode(struct inode *inode, void *opaque)
929{
930 struct cifs_fattr *fattr = (struct cifs_fattr *) opaque;
931
932 CIFS_I(inode)->uniqueid = fattr->cf_uniqueid;
20054bd6 933 CIFS_I(inode)->createtime = fattr->cf_createtime;
cc0bad75
JL
934 return 0;
935}
936
5acfec25
JL
937/*
938 * walk dentry list for an inode and report whether it has aliases that
939 * are hashed. We use this to determine if a directory inode can actually
940 * be used.
941 */
942static bool
943inode_has_hashed_dentries(struct inode *inode)
944{
945 struct dentry *dentry;
946
873feea0 947 spin_lock(&inode->i_lock);
946e51f2 948 hlist_for_each_entry(dentry, &inode->i_dentry, d_u.d_alias) {
5acfec25 949 if (!d_unhashed(dentry) || IS_ROOT(dentry)) {
873feea0 950 spin_unlock(&inode->i_lock);
5acfec25
JL
951 return true;
952 }
953 }
873feea0 954 spin_unlock(&inode->i_lock);
5acfec25
JL
955 return false;
956}
957
cc0bad75
JL
958/* Given fattrs, get a corresponding inode */
959struct inode *
960cifs_iget(struct super_block *sb, struct cifs_fattr *fattr)
961{
962 unsigned long hash;
963 struct inode *inode;
964
3d694380 965retry_iget5_locked:
f96637be 966 cifs_dbg(FYI, "looking for uniqueid=%llu\n", fattr->cf_uniqueid);
cc0bad75
JL
967
968 /* hash down to 32-bits on 32-bit arch */
969 hash = cifs_uniqueid_to_ino_t(fattr->cf_uniqueid);
970
971 inode = iget5_locked(sb, hash, cifs_find_inode, cifs_init_inode, fattr);
cc0bad75 972 if (inode) {
5acfec25 973 /* was there a potentially problematic inode collision? */
3d694380 974 if (fattr->cf_flags & CIFS_FATTR_INO_COLLISION) {
3d694380 975 fattr->cf_flags &= ~CIFS_FATTR_INO_COLLISION;
5acfec25
JL
976
977 if (inode_has_hashed_dentries(inode)) {
978 cifs_autodisable_serverino(CIFS_SB(sb));
979 iput(inode);
980 fattr->cf_uniqueid = iunique(sb, ROOT_I);
981 goto retry_iget5_locked;
982 }
3d694380
JL
983 }
984
cc0bad75
JL
985 cifs_fattr_to_inode(inode, fattr);
986 if (sb->s_flags & MS_NOATIME)
987 inode->i_flags |= S_NOATIME | S_NOCMTIME;
988 if (inode->i_state & I_NEW) {
989 inode->i_ino = hash;
0ccd4802 990#ifdef CONFIG_CIFS_FSCACHE
9451a9a5
SJ
991 /* initialize per-inode cache cookie pointer */
992 CIFS_I(inode)->fscache = NULL;
0ccd4802 993#endif
cc0bad75
JL
994 unlock_new_inode(inode);
995 }
996 }
997
998 return inode;
999}
1000
1da177e4 1001/* gets root inode */
9b6763e0 1002struct inode *cifs_root_iget(struct super_block *sb)
1da177e4 1003{
6d5786a3 1004 unsigned int xid;
0d424ad0 1005 struct cifs_sb_info *cifs_sb = CIFS_SB(sb);
cc0bad75 1006 struct inode *inode = NULL;
ce634ab2 1007 long rc;
96daf2b0 1008 struct cifs_tcon *tcon = cifs_sb_master_tcon(cifs_sb);
a6b5058f
AA
1009 char *path = NULL;
1010 int len;
1011
1012 if ((cifs_sb->mnt_cifs_flags & CIFS_MOUNT_USE_PREFIX_PATH)
1013 && cifs_sb->prepath) {
1014 len = strlen(cifs_sb->prepath);
1015 path = kzalloc(len + 2 /* leading sep + null */, GFP_KERNEL);
1016 if (path == NULL)
1017 return ERR_PTR(-ENOMEM);
1018 path[0] = '/';
1019 memcpy(path+1, cifs_sb->prepath, len);
1020 } else {
1021 path = kstrdup("", GFP_KERNEL);
1022 if (path == NULL)
1023 return ERR_PTR(-ENOMEM);
1024 }
ce634ab2 1025
6d5786a3 1026 xid = get_xid();
b5b374ea 1027 if (tcon->unix_ext) {
a6b5058f 1028 rc = cifs_get_inode_info_unix(&inode, path, sb, xid);
b5b374ea
SF
1029 /* some servers mistakenly claim POSIX support */
1030 if (rc != -EOPNOTSUPP)
1031 goto iget_no_retry;
1032 cifs_dbg(VFS, "server does not support POSIX extensions");
1033 tcon->unix_ext = false;
1034 }
1035
a6b5058f
AA
1036 convert_delimiter(path, CIFS_DIR_SEP(cifs_sb));
1037 rc = cifs_get_inode_info(&inode, path, NULL, sb, xid, NULL);
0b8f18e3 1038
b5b374ea 1039iget_no_retry:
a7851ce7
OS
1040 if (!inode) {
1041 inode = ERR_PTR(rc);
1042 goto out;
1043 }
cc0bad75 1044
0ccd4802 1045#ifdef CONFIG_CIFS_FSCACHE
d03382ce 1046 /* populate tcon->resource_id */
0d424ad0 1047 tcon->resource_id = CIFS_I(inode)->uniqueid;
0ccd4802 1048#endif
d03382ce 1049
0d424ad0 1050 if (rc && tcon->ipc) {
f96637be 1051 cifs_dbg(FYI, "ipc connection - fake read inode\n");
b7ca6928 1052 spin_lock(&inode->i_lock);
7f8ed420 1053 inode->i_mode |= S_IFDIR;
bfe86848 1054 set_nlink(inode, 2);
7f8ed420
SF
1055 inode->i_op = &cifs_ipc_inode_ops;
1056 inode->i_fop = &simple_dir_operations;
1057 inode->i_uid = cifs_sb->mnt_uid;
1058 inode->i_gid = cifs_sb->mnt_gid;
b7ca6928 1059 spin_unlock(&inode->i_lock);
ad661334 1060 } else if (rc) {
ce634ab2 1061 iget_failed(inode);
a7851ce7 1062 inode = ERR_PTR(rc);
7f8ed420
SF
1063 }
1064
a7851ce7 1065out:
a6b5058f 1066 kfree(path);
6d5786a3 1067 /* can not call macro free_xid here since in a void func
ce634ab2
DH
1068 * TODO: This is no longer true
1069 */
6d5786a3 1070 _free_xid(xid);
ce634ab2 1071 return inode;
1da177e4
LT
1072}
1073
ed6875e0 1074int
6d5786a3 1075cifs_set_file_info(struct inode *inode, struct iattr *attrs, unsigned int xid,
ed6875e0 1076 char *full_path, __u32 dosattr)
388e57b2 1077{
388e57b2 1078 bool set_time = false;
388e57b2 1079 struct cifs_sb_info *cifs_sb = CIFS_SB(inode->i_sb);
6bdf6dbd 1080 struct TCP_Server_Info *server;
388e57b2
SF
1081 FILE_BASIC_INFO info_buf;
1082
1adcb710
SF
1083 if (attrs == NULL)
1084 return -EINVAL;
1085
6bdf6dbd
PS
1086 server = cifs_sb_master_tcon(cifs_sb)->ses->server;
1087 if (!server->ops->set_file_info)
1088 return -ENOSYS;
1089
388e57b2
SF
1090 if (attrs->ia_valid & ATTR_ATIME) {
1091 set_time = true;
1092 info_buf.LastAccessTime =
1093 cpu_to_le64(cifs_UnixTimeToNT(attrs->ia_atime));
1094 } else
1095 info_buf.LastAccessTime = 0;
1096
1097 if (attrs->ia_valid & ATTR_MTIME) {
1098 set_time = true;
1099 info_buf.LastWriteTime =
1100 cpu_to_le64(cifs_UnixTimeToNT(attrs->ia_mtime));
1101 } else
1102 info_buf.LastWriteTime = 0;
1103
1104 /*
1105 * Samba throws this field away, but windows may actually use it.
1106 * Do not set ctime unless other time stamps are changed explicitly
1107 * (i.e. by utimes()) since we would then have a mix of client and
1108 * server times.
1109 */
1110 if (set_time && (attrs->ia_valid & ATTR_CTIME)) {
f96637be 1111 cifs_dbg(FYI, "CIFS - CTIME changed\n");
388e57b2
SF
1112 info_buf.ChangeTime =
1113 cpu_to_le64(cifs_UnixTimeToNT(attrs->ia_ctime));
1114 } else
1115 info_buf.ChangeTime = 0;
1116
1117 info_buf.CreationTime = 0; /* don't change */
1118 info_buf.Attributes = cpu_to_le32(dosattr);
1119
6bdf6dbd 1120 return server->ops->set_file_info(inode, full_path, &info_buf, xid);
388e57b2
SF
1121}
1122
a12a1ac7 1123/*
ed6875e0 1124 * Open the given file (if it isn't already), set the DELETE_ON_CLOSE bit
a12a1ac7
JL
1125 * and rename it to a random name that hopefully won't conflict with
1126 * anything else.
1127 */
ed6875e0
PS
1128int
1129cifs_rename_pending_delete(const char *full_path, struct dentry *dentry,
1130 const unsigned int xid)
a12a1ac7
JL
1131{
1132 int oplock = 0;
1133 int rc;
d81b8a40
PS
1134 struct cifs_fid fid;
1135 struct cifs_open_parms oparms;
2b0143b5 1136 struct inode *inode = d_inode(dentry);
a12a1ac7
JL
1137 struct cifsInodeInfo *cifsInode = CIFS_I(inode);
1138 struct cifs_sb_info *cifs_sb = CIFS_SB(inode->i_sb);
7ffec372 1139 struct tcon_link *tlink;
96daf2b0 1140 struct cifs_tcon *tcon;
3270958b
SF
1141 __u32 dosattr, origattr;
1142 FILE_BASIC_INFO *info_buf = NULL;
a12a1ac7 1143
7ffec372
JL
1144 tlink = cifs_sb_tlink(cifs_sb);
1145 if (IS_ERR(tlink))
1146 return PTR_ERR(tlink);
1147 tcon = tlink_tcon(tlink);
1148
c483a984
SP
1149 /*
1150 * We cannot rename the file if the server doesn't support
1151 * CAP_INFOLEVEL_PASSTHRU
1152 */
1153 if (!(tcon->ses->capabilities & CAP_INFOLEVEL_PASSTHRU)) {
1154 rc = -EBUSY;
1155 goto out;
1156 }
1157
d81b8a40
PS
1158 oparms.tcon = tcon;
1159 oparms.cifs_sb = cifs_sb;
1160 oparms.desired_access = DELETE | FILE_WRITE_ATTRIBUTES;
1161 oparms.create_options = CREATE_NOT_DIR;
1162 oparms.disposition = FILE_OPEN;
1163 oparms.path = full_path;
1164 oparms.fid = &fid;
1165 oparms.reconnect = false;
1166
1167 rc = CIFS_open(xid, &oparms, &oplock, NULL);
a12a1ac7
JL
1168 if (rc != 0)
1169 goto out;
1170
3270958b
SF
1171 origattr = cifsInode->cifsAttrs;
1172 if (origattr == 0)
1173 origattr |= ATTR_NORMAL;
1174
1175 dosattr = origattr & ~ATTR_READONLY;
a12a1ac7
JL
1176 if (dosattr == 0)
1177 dosattr |= ATTR_NORMAL;
1178 dosattr |= ATTR_HIDDEN;
1179
3270958b
SF
1180 /* set ATTR_HIDDEN and clear ATTR_READONLY, but only if needed */
1181 if (dosattr != origattr) {
1182 info_buf = kzalloc(sizeof(*info_buf), GFP_KERNEL);
1183 if (info_buf == NULL) {
1184 rc = -ENOMEM;
1185 goto out_close;
1186 }
1187 info_buf->Attributes = cpu_to_le32(dosattr);
d81b8a40 1188 rc = CIFSSMBSetFileInfo(xid, tcon, info_buf, fid.netfid,
3270958b
SF
1189 current->tgid);
1190 /* although we would like to mark the file hidden
1191 if that fails we will still try to rename it */
72d282dc 1192 if (!rc)
3270958b
SF
1193 cifsInode->cifsAttrs = dosattr;
1194 else
1195 dosattr = origattr; /* since not able to change them */
a12a1ac7 1196 }
a12a1ac7 1197
dd1db2de 1198 /* rename the file */
d81b8a40
PS
1199 rc = CIFSSMBRenameOpenFile(xid, tcon, fid.netfid, NULL,
1200 cifs_sb->local_nls,
2baa2682 1201 cifs_remap(cifs_sb));
3270958b 1202 if (rc != 0) {
47c78f4a 1203 rc = -EBUSY;
3270958b
SF
1204 goto undo_setattr;
1205 }
6d22f098 1206
3270958b 1207 /* try to set DELETE_ON_CLOSE */
aff8d5ca 1208 if (!test_bit(CIFS_INO_DELETE_PENDING, &cifsInode->flags)) {
d81b8a40 1209 rc = CIFSSMBSetFileDisposition(xid, tcon, true, fid.netfid,
3270958b
SF
1210 current->tgid);
1211 /*
1212 * some samba versions return -ENOENT when we try to set the
1213 * file disposition here. Likely a samba bug, but work around
1214 * it for now. This means that some cifsXXX files may hang
1215 * around after they shouldn't.
1216 *
1217 * BB: remove this hack after more servers have the fix
1218 */
1219 if (rc == -ENOENT)
1220 rc = 0;
1221 else if (rc != 0) {
47c78f4a 1222 rc = -EBUSY;
3270958b
SF
1223 goto undo_rename;
1224 }
aff8d5ca 1225 set_bit(CIFS_INO_DELETE_PENDING, &cifsInode->flags);
3270958b 1226 }
7ce86d5a 1227
a12a1ac7 1228out_close:
d81b8a40 1229 CIFSSMBClose(xid, tcon, fid.netfid);
a12a1ac7 1230out:
3270958b 1231 kfree(info_buf);
7ffec372 1232 cifs_put_tlink(tlink);
a12a1ac7 1233 return rc;
3270958b
SF
1234
1235 /*
1236 * reset everything back to the original state. Don't bother
1237 * dealing with errors here since we can't do anything about
1238 * them anyway.
1239 */
1240undo_rename:
d81b8a40 1241 CIFSSMBRenameOpenFile(xid, tcon, fid.netfid, dentry->d_name.name,
2baa2682 1242 cifs_sb->local_nls, cifs_remap(cifs_sb));
3270958b
SF
1243undo_setattr:
1244 if (dosattr != origattr) {
1245 info_buf->Attributes = cpu_to_le32(origattr);
d81b8a40 1246 if (!CIFSSMBSetFileInfo(xid, tcon, info_buf, fid.netfid,
3270958b
SF
1247 current->tgid))
1248 cifsInode->cifsAttrs = origattr;
1249 }
1250
1251 goto out_close;
a12a1ac7
JL
1252}
1253
b7ca6928
SF
1254/* copied from fs/nfs/dir.c with small changes */
1255static void
1256cifs_drop_nlink(struct inode *inode)
1257{
1258 spin_lock(&inode->i_lock);
1259 if (inode->i_nlink > 0)
1260 drop_nlink(inode);
1261 spin_unlock(&inode->i_lock);
1262}
ff694527
SF
1263
1264/*
2b0143b5 1265 * If d_inode(dentry) is null (usually meaning the cached dentry
ff694527 1266 * is a negative dentry) then we would attempt a standard SMB delete, but
af901ca1
AGR
1267 * if that fails we can not attempt the fall back mechanisms on EACCESS
1268 * but will return the EACCESS to the caller. Note that the VFS does not call
ff694527
SF
1269 * unlink on negative dentries currently.
1270 */
5f0319a7 1271int cifs_unlink(struct inode *dir, struct dentry *dentry)
1da177e4
LT
1272{
1273 int rc = 0;
6d5786a3 1274 unsigned int xid;
1da177e4 1275 char *full_path = NULL;
2b0143b5 1276 struct inode *inode = d_inode(dentry);
ff694527 1277 struct cifsInodeInfo *cifs_inode;
5f0319a7
JL
1278 struct super_block *sb = dir->i_sb;
1279 struct cifs_sb_info *cifs_sb = CIFS_SB(sb);
7ffec372 1280 struct tcon_link *tlink;
96daf2b0 1281 struct cifs_tcon *tcon;
ed6875e0 1282 struct TCP_Server_Info *server;
6050247d
SF
1283 struct iattr *attrs = NULL;
1284 __u32 dosattr = 0, origattr = 0;
1da177e4 1285
f96637be 1286 cifs_dbg(FYI, "cifs_unlink, dir=0x%p, dentry=0x%p\n", dir, dentry);
1da177e4 1287
7ffec372
JL
1288 tlink = cifs_sb_tlink(cifs_sb);
1289 if (IS_ERR(tlink))
1290 return PTR_ERR(tlink);
1291 tcon = tlink_tcon(tlink);
ed6875e0 1292 server = tcon->ses->server;
7ffec372 1293
6d5786a3 1294 xid = get_xid();
1da177e4 1295
5f0319a7
JL
1296 /* Unlink can be called from rename so we can not take the
1297 * sb->s_vfs_rename_mutex here */
1298 full_path = build_path_from_dentry(dentry);
1da177e4 1299 if (full_path == NULL) {
0f3bc09e 1300 rc = -ENOMEM;
7ffec372 1301 goto unlink_out;
1da177e4 1302 }
2d785a50 1303
29e20f9c
PS
1304 if (cap_unix(tcon->ses) && (CIFS_UNIX_POSIX_PATH_OPS_CAP &
1305 le64_to_cpu(tcon->fsUnixInfo.Capability))) {
5f0319a7 1306 rc = CIFSPOSIXDelFile(xid, tcon, full_path,
2d785a50 1307 SMB_POSIX_UNLINK_FILE_TARGET, cifs_sb->local_nls,
2baa2682 1308 cifs_remap(cifs_sb));
f96637be 1309 cifs_dbg(FYI, "posix del rc %d\n", rc);
2d785a50
SF
1310 if ((rc == 0) || (rc == -ENOENT))
1311 goto psx_del_no_retry;
1312 }
1da177e4 1313
6050247d 1314retry_std_delete:
ed6875e0
PS
1315 if (!server->ops->unlink) {
1316 rc = -ENOSYS;
1317 goto psx_del_no_retry;
1318 }
1319
1320 rc = server->ops->unlink(xid, tcon, full_path, cifs_sb);
6050247d 1321
2d785a50 1322psx_del_no_retry:
1da177e4 1323 if (!rc) {
5f0319a7 1324 if (inode)
b7ca6928 1325 cifs_drop_nlink(inode);
1da177e4 1326 } else if (rc == -ENOENT) {
5f0319a7 1327 d_drop(dentry);
47c78f4a 1328 } else if (rc == -EBUSY) {
ed6875e0
PS
1329 if (server->ops->rename_pending_delete) {
1330 rc = server->ops->rename_pending_delete(full_path,
1331 dentry, xid);
1332 if (rc == 0)
1333 cifs_drop_nlink(inode);
1334 }
ff694527 1335 } else if ((rc == -EACCES) && (dosattr == 0) && inode) {
388e57b2
SF
1336 attrs = kzalloc(sizeof(*attrs), GFP_KERNEL);
1337 if (attrs == NULL) {
1338 rc = -ENOMEM;
1339 goto out_reval;
1da177e4 1340 }
388e57b2
SF
1341
1342 /* try to reset dos attributes */
ff694527
SF
1343 cifs_inode = CIFS_I(inode);
1344 origattr = cifs_inode->cifsAttrs;
6050247d
SF
1345 if (origattr == 0)
1346 origattr |= ATTR_NORMAL;
1347 dosattr = origattr & ~ATTR_READONLY;
388e57b2
SF
1348 if (dosattr == 0)
1349 dosattr |= ATTR_NORMAL;
1350 dosattr |= ATTR_HIDDEN;
1351
1352 rc = cifs_set_file_info(inode, attrs, xid, full_path, dosattr);
388e57b2
SF
1353 if (rc != 0)
1354 goto out_reval;
6050247d
SF
1355
1356 goto retry_std_delete;
1da177e4 1357 }
6050247d
SF
1358
1359 /* undo the setattr if we errored out and it's needed */
1360 if (rc != 0 && dosattr != 0)
1361 cifs_set_file_info(inode, attrs, xid, full_path, origattr);
1362
388e57b2 1363out_reval:
4523cc30 1364 if (inode) {
ff694527
SF
1365 cifs_inode = CIFS_I(inode);
1366 cifs_inode->time = 0; /* will force revalidate to get info
5f0319a7 1367 when needed */
e37fea58 1368 inode->i_ctime = current_time(inode);
06bcfedd 1369 }
e37fea58 1370 dir->i_ctime = dir->i_mtime = current_time(dir);
ff694527 1371 cifs_inode = CIFS_I(dir);
6050247d 1372 CIFS_I(dir)->time = 0; /* force revalidate of dir as well */
7ffec372 1373unlink_out:
1da177e4 1374 kfree(full_path);
6050247d 1375 kfree(attrs);
6d5786a3 1376 free_xid(xid);
7ffec372 1377 cifs_put_tlink(tlink);
1da177e4
LT
1378 return rc;
1379}
1380
ff691e96 1381static int
101b92d9 1382cifs_mkdir_qinfo(struct inode *parent, struct dentry *dentry, umode_t mode,
ff691e96
PS
1383 const char *full_path, struct cifs_sb_info *cifs_sb,
1384 struct cifs_tcon *tcon, const unsigned int xid)
1385{
1386 int rc = 0;
101b92d9 1387 struct inode *inode = NULL;
ff691e96
PS
1388
1389 if (tcon->unix_ext)
101b92d9 1390 rc = cifs_get_inode_info_unix(&inode, full_path, parent->i_sb,
ff691e96
PS
1391 xid);
1392 else
101b92d9
JL
1393 rc = cifs_get_inode_info(&inode, full_path, NULL, parent->i_sb,
1394 xid, NULL);
1395
ff691e96
PS
1396 if (rc)
1397 return rc;
1398
ff691e96
PS
1399 /*
1400 * setting nlink not necessary except in cases where we failed to get it
101b92d9
JL
1401 * from the server or was set bogus. Also, since this is a brand new
1402 * inode, no need to grab the i_lock before setting the i_nlink.
ff691e96 1403 */
101b92d9
JL
1404 if (inode->i_nlink < 2)
1405 set_nlink(inode, 2);
ff691e96
PS
1406 mode &= ~current_umask();
1407 /* must turn on setgid bit if parent dir has it */
101b92d9 1408 if (parent->i_mode & S_ISGID)
ff691e96
PS
1409 mode |= S_ISGID;
1410
1411 if (tcon->unix_ext) {
1412 struct cifs_unix_set_info_args args = {
1413 .mode = mode,
1414 .ctime = NO_CHANGE_64,
1415 .atime = NO_CHANGE_64,
1416 .mtime = NO_CHANGE_64,
1417 .device = 0,
1418 };
1419 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_SET_UID) {
49418b2c 1420 args.uid = current_fsuid();
101b92d9 1421 if (parent->i_mode & S_ISGID)
49418b2c 1422 args.gid = parent->i_gid;
ff691e96 1423 else
49418b2c 1424 args.gid = current_fsgid();
ff691e96 1425 } else {
49418b2c
EB
1426 args.uid = INVALID_UID; /* no change */
1427 args.gid = INVALID_GID; /* no change */
ff691e96
PS
1428 }
1429 CIFSSMBUnixSetPathInfo(xid, tcon, full_path, &args,
1430 cifs_sb->local_nls,
2baa2682 1431 cifs_remap(cifs_sb));
ff691e96 1432 } else {
f436720e 1433 struct TCP_Server_Info *server = tcon->ses->server;
ff691e96 1434 if (!(cifs_sb->mnt_cifs_flags & CIFS_MOUNT_CIFS_ACL) &&
f436720e 1435 (mode & S_IWUGO) == 0 && server->ops->mkdir_setinfo)
101b92d9 1436 server->ops->mkdir_setinfo(inode, full_path, cifs_sb,
f436720e 1437 tcon, xid);
101b92d9
JL
1438 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_DYNPERM)
1439 inode->i_mode = (mode | S_IFDIR);
1440
1441 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_SET_UID) {
1442 inode->i_uid = current_fsuid();
1443 if (inode->i_mode & S_ISGID)
1444 inode->i_gid = parent->i_gid;
1445 else
1446 inode->i_gid = current_fsgid();
ff691e96
PS
1447 }
1448 }
101b92d9 1449 d_instantiate(dentry, inode);
ff691e96
PS
1450 return rc;
1451}
1452
1453static int
1454cifs_posix_mkdir(struct inode *inode, struct dentry *dentry, umode_t mode,
1455 const char *full_path, struct cifs_sb_info *cifs_sb,
1456 struct cifs_tcon *tcon, const unsigned int xid)
1457{
1458 int rc = 0;
1459 u32 oplock = 0;
1460 FILE_UNIX_BASIC_INFO *info = NULL;
1461 struct inode *newinode = NULL;
1462 struct cifs_fattr fattr;
1463
1464 info = kzalloc(sizeof(FILE_UNIX_BASIC_INFO), GFP_KERNEL);
1465 if (info == NULL) {
1466 rc = -ENOMEM;
1467 goto posix_mkdir_out;
1468 }
1469
1470 mode &= ~current_umask();
1471 rc = CIFSPOSIXCreate(xid, tcon, SMB_O_DIRECTORY | SMB_O_CREAT, mode,
1472 NULL /* netfid */, info, &oplock, full_path,
2baa2682 1473 cifs_sb->local_nls, cifs_remap(cifs_sb));
ff691e96
PS
1474 if (rc == -EOPNOTSUPP)
1475 goto posix_mkdir_out;
1476 else if (rc) {
f96637be 1477 cifs_dbg(FYI, "posix mkdir returned 0x%x\n", rc);
ff691e96
PS
1478 d_drop(dentry);
1479 goto posix_mkdir_out;
1480 }
1481
1482 if (info->Type == cpu_to_le32(-1))
1483 /* no return info, go query for it */
1484 goto posix_mkdir_get_info;
1485 /*
1486 * BB check (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_SET_UID ) to see if
1487 * need to set uid/gid.
1488 */
1489
1490 cifs_unix_basic_to_fattr(&fattr, info, cifs_sb);
1491 cifs_fill_uniqueid(inode->i_sb, &fattr);
1492 newinode = cifs_iget(inode->i_sb, &fattr);
1493 if (!newinode)
1494 goto posix_mkdir_get_info;
1495
1496 d_instantiate(dentry, newinode);
1497
1498#ifdef CONFIG_CIFS_DEBUG2
35c265e0
AV
1499 cifs_dbg(FYI, "instantiated dentry %p %pd to inode %p\n",
1500 dentry, dentry, newinode);
ff691e96
PS
1501
1502 if (newinode->i_nlink != 2)
f96637be
JP
1503 cifs_dbg(FYI, "unexpected number of links %d\n",
1504 newinode->i_nlink);
ff691e96
PS
1505#endif
1506
1507posix_mkdir_out:
1508 kfree(info);
1509 return rc;
1510posix_mkdir_get_info:
1511 rc = cifs_mkdir_qinfo(inode, dentry, mode, full_path, cifs_sb, tcon,
1512 xid);
1513 goto posix_mkdir_out;
1514}
1515
18bb1db3 1516int cifs_mkdir(struct inode *inode, struct dentry *direntry, umode_t mode)
1da177e4 1517{
ff691e96 1518 int rc = 0;
6d5786a3 1519 unsigned int xid;
1da177e4 1520 struct cifs_sb_info *cifs_sb;
7ffec372 1521 struct tcon_link *tlink;
29e20f9c 1522 struct cifs_tcon *tcon;
f436720e 1523 struct TCP_Server_Info *server;
ff691e96 1524 char *full_path;
1da177e4 1525
f96637be
JP
1526 cifs_dbg(FYI, "In cifs_mkdir, mode = 0x%hx inode = 0x%p\n",
1527 mode, inode);
1da177e4 1528
1da177e4 1529 cifs_sb = CIFS_SB(inode->i_sb);
7ffec372
JL
1530 tlink = cifs_sb_tlink(cifs_sb);
1531 if (IS_ERR(tlink))
1532 return PTR_ERR(tlink);
29e20f9c 1533 tcon = tlink_tcon(tlink);
7ffec372 1534
6d5786a3 1535 xid = get_xid();
1da177e4 1536
7f57356b 1537 full_path = build_path_from_dentry(direntry);
1da177e4 1538 if (full_path == NULL) {
0f3bc09e 1539 rc = -ENOMEM;
7ffec372 1540 goto mkdir_out;
1da177e4 1541 }
50c2f753 1542
29e20f9c
PS
1543 if (cap_unix(tcon->ses) && (CIFS_UNIX_POSIX_PATH_OPS_CAP &
1544 le64_to_cpu(tcon->fsUnixInfo.Capability))) {
ff691e96
PS
1545 rc = cifs_posix_mkdir(inode, direntry, mode, full_path, cifs_sb,
1546 tcon, xid);
1547 if (rc != -EOPNOTSUPP)
2dd29d31 1548 goto mkdir_out;
fb8c4b14 1549 }
ff691e96 1550
f436720e
PS
1551 server = tcon->ses->server;
1552
1553 if (!server->ops->mkdir) {
1554 rc = -ENOSYS;
1555 goto mkdir_out;
1556 }
1557
1da177e4 1558 /* BB add setting the equivalent of mode via CreateX w/ACLs */
f436720e 1559 rc = server->ops->mkdir(xid, tcon, full_path, cifs_sb);
1da177e4 1560 if (rc) {
f96637be 1561 cifs_dbg(FYI, "cifs_mkdir returned 0x%x\n", rc);
1da177e4 1562 d_drop(direntry);
ff691e96 1563 goto mkdir_out;
1da177e4 1564 }
ff691e96
PS
1565
1566 rc = cifs_mkdir_qinfo(inode, direntry, mode, full_path, cifs_sb, tcon,
1567 xid);
fb8c4b14 1568mkdir_out:
6de2ce42
PS
1569 /*
1570 * Force revalidate to get parent dir info when needed since cached
1571 * attributes are invalid now.
1572 */
1573 CIFS_I(inode)->time = 0;
1da177e4 1574 kfree(full_path);
6d5786a3 1575 free_xid(xid);
7ffec372 1576 cifs_put_tlink(tlink);
1da177e4
LT
1577 return rc;
1578}
1579
1580int cifs_rmdir(struct inode *inode, struct dentry *direntry)
1581{
1582 int rc = 0;
6d5786a3 1583 unsigned int xid;
1da177e4 1584 struct cifs_sb_info *cifs_sb;
7ffec372 1585 struct tcon_link *tlink;
f958ca5d
PS
1586 struct cifs_tcon *tcon;
1587 struct TCP_Server_Info *server;
1da177e4
LT
1588 char *full_path = NULL;
1589 struct cifsInodeInfo *cifsInode;
1590
f96637be 1591 cifs_dbg(FYI, "cifs_rmdir, inode = 0x%p\n", inode);
1da177e4 1592
6d5786a3 1593 xid = get_xid();
1da177e4 1594
7f57356b 1595 full_path = build_path_from_dentry(direntry);
1da177e4 1596 if (full_path == NULL) {
0f3bc09e 1597 rc = -ENOMEM;
7ffec372 1598 goto rmdir_exit;
1da177e4
LT
1599 }
1600
7ffec372
JL
1601 cifs_sb = CIFS_SB(inode->i_sb);
1602 tlink = cifs_sb_tlink(cifs_sb);
1603 if (IS_ERR(tlink)) {
1604 rc = PTR_ERR(tlink);
1605 goto rmdir_exit;
1606 }
f958ca5d
PS
1607 tcon = tlink_tcon(tlink);
1608 server = tcon->ses->server;
1609
1610 if (!server->ops->rmdir) {
1611 rc = -ENOSYS;
1612 cifs_put_tlink(tlink);
1613 goto rmdir_exit;
1614 }
7ffec372 1615
f958ca5d 1616 rc = server->ops->rmdir(xid, tcon, full_path, cifs_sb);
7ffec372 1617 cifs_put_tlink(tlink);
1da177e4
LT
1618
1619 if (!rc) {
2b0143b5
DH
1620 spin_lock(&d_inode(direntry)->i_lock);
1621 i_size_write(d_inode(direntry), 0);
1622 clear_nlink(d_inode(direntry));
1623 spin_unlock(&d_inode(direntry)->i_lock);
1da177e4
LT
1624 }
1625
2b0143b5 1626 cifsInode = CIFS_I(d_inode(direntry));
6de2ce42
PS
1627 /* force revalidate to go get info when needed */
1628 cifsInode->time = 0;
42c24544
SF
1629
1630 cifsInode = CIFS_I(inode);
6de2ce42
PS
1631 /*
1632 * Force revalidate to get parent dir info when needed since cached
1633 * attributes are invalid now.
1634 */
1635 cifsInode->time = 0;
42c24544 1636
2b0143b5 1637 d_inode(direntry)->i_ctime = inode->i_ctime = inode->i_mtime =
e37fea58 1638 current_time(inode);
1da177e4 1639
7ffec372 1640rmdir_exit:
1da177e4 1641 kfree(full_path);
6d5786a3 1642 free_xid(xid);
1da177e4
LT
1643 return rc;
1644}
1645
ee2fd967 1646static int
8ceb9843
PS
1647cifs_do_rename(const unsigned int xid, struct dentry *from_dentry,
1648 const char *from_path, struct dentry *to_dentry,
1649 const char *to_path)
ee2fd967
SF
1650{
1651 struct cifs_sb_info *cifs_sb = CIFS_SB(from_dentry->d_sb);
7ffec372 1652 struct tcon_link *tlink;
8ceb9843
PS
1653 struct cifs_tcon *tcon;
1654 struct TCP_Server_Info *server;
d81b8a40
PS
1655 struct cifs_fid fid;
1656 struct cifs_open_parms oparms;
ee2fd967
SF
1657 int oplock, rc;
1658
7ffec372
JL
1659 tlink = cifs_sb_tlink(cifs_sb);
1660 if (IS_ERR(tlink))
1661 return PTR_ERR(tlink);
8ceb9843
PS
1662 tcon = tlink_tcon(tlink);
1663 server = tcon->ses->server;
1664
1665 if (!server->ops->rename)
1666 return -ENOSYS;
7ffec372 1667
ee2fd967 1668 /* try path-based rename first */
8ceb9843 1669 rc = server->ops->rename(xid, tcon, from_path, to_path, cifs_sb);
ee2fd967
SF
1670
1671 /*
8ceb9843
PS
1672 * Don't bother with rename by filehandle unless file is busy and
1673 * source. Note that cross directory moves do not work with
ee2fd967
SF
1674 * rename by filehandle to various Windows servers.
1675 */
47c78f4a 1676 if (rc == 0 || rc != -EBUSY)
7ffec372 1677 goto do_rename_exit;
ee2fd967 1678
ed0e3ace
JL
1679 /* open-file renames don't work across directories */
1680 if (to_dentry->d_parent != from_dentry->d_parent)
7ffec372 1681 goto do_rename_exit;
ed0e3ace 1682
d81b8a40
PS
1683 oparms.tcon = tcon;
1684 oparms.cifs_sb = cifs_sb;
ee2fd967 1685 /* open the file to be renamed -- we need DELETE perms */
d81b8a40
PS
1686 oparms.desired_access = DELETE;
1687 oparms.create_options = CREATE_NOT_DIR;
1688 oparms.disposition = FILE_OPEN;
1689 oparms.path = from_path;
1690 oparms.fid = &fid;
1691 oparms.reconnect = false;
1692
1693 rc = CIFS_open(xid, &oparms, &oplock, NULL);
ee2fd967 1694 if (rc == 0) {
d81b8a40 1695 rc = CIFSSMBRenameOpenFile(xid, tcon, fid.netfid,
ee2fd967 1696 (const char *) to_dentry->d_name.name,
2baa2682 1697 cifs_sb->local_nls, cifs_remap(cifs_sb));
d81b8a40 1698 CIFSSMBClose(xid, tcon, fid.netfid);
ee2fd967 1699 }
7ffec372
JL
1700do_rename_exit:
1701 cifs_put_tlink(tlink);
ee2fd967
SF
1702 return rc;
1703}
1704
8ceb9843 1705int
7c33d597
MS
1706cifs_rename2(struct inode *source_dir, struct dentry *source_dentry,
1707 struct inode *target_dir, struct dentry *target_dentry,
1708 unsigned int flags)
1da177e4 1709{
8ceb9843
PS
1710 char *from_name = NULL;
1711 char *to_name = NULL;
639e7a91 1712 struct cifs_sb_info *cifs_sb;
7ffec372 1713 struct tcon_link *tlink;
96daf2b0 1714 struct cifs_tcon *tcon;
ee2fd967
SF
1715 FILE_UNIX_BASIC_INFO *info_buf_source = NULL;
1716 FILE_UNIX_BASIC_INFO *info_buf_target;
6d5786a3
PS
1717 unsigned int xid;
1718 int rc, tmprc;
1da177e4 1719
7c33d597
MS
1720 if (flags & ~RENAME_NOREPLACE)
1721 return -EINVAL;
1722
639e7a91 1723 cifs_sb = CIFS_SB(source_dir->i_sb);
7ffec372
JL
1724 tlink = cifs_sb_tlink(cifs_sb);
1725 if (IS_ERR(tlink))
1726 return PTR_ERR(tlink);
1727 tcon = tlink_tcon(tlink);
1da177e4 1728
6d5786a3 1729 xid = get_xid();
ee2fd967 1730
ee2fd967
SF
1731 /*
1732 * we already have the rename sem so we do not need to
1733 * grab it again here to protect the path integrity
1734 */
8ceb9843
PS
1735 from_name = build_path_from_dentry(source_dentry);
1736 if (from_name == NULL) {
ee2fd967
SF
1737 rc = -ENOMEM;
1738 goto cifs_rename_exit;
1739 }
1740
8ceb9843
PS
1741 to_name = build_path_from_dentry(target_dentry);
1742 if (to_name == NULL) {
1da177e4
LT
1743 rc = -ENOMEM;
1744 goto cifs_rename_exit;
1745 }
1746
8ceb9843
PS
1747 rc = cifs_do_rename(xid, source_dentry, from_name, target_dentry,
1748 to_name);
ee2fd967 1749
7c33d597
MS
1750 /*
1751 * No-replace is the natural behavior for CIFS, so skip unlink hacks.
1752 */
1753 if (flags & RENAME_NOREPLACE)
1754 goto cifs_rename_exit;
1755
14121bdc
JL
1756 if (rc == -EEXIST && tcon->unix_ext) {
1757 /*
8ceb9843
PS
1758 * Are src and dst hardlinks of same inode? We can only tell
1759 * with unix extensions enabled.
14121bdc
JL
1760 */
1761 info_buf_source =
1762 kmalloc(2 * sizeof(FILE_UNIX_BASIC_INFO),
1763 GFP_KERNEL);
1764 if (info_buf_source == NULL) {
1765 rc = -ENOMEM;
1766 goto cifs_rename_exit;
1767 }
1768
1769 info_buf_target = info_buf_source + 1;
8ceb9843
PS
1770 tmprc = CIFSSMBUnixQPathInfo(xid, tcon, from_name,
1771 info_buf_source,
1772 cifs_sb->local_nls,
2baa2682 1773 cifs_remap(cifs_sb));
8d281efb 1774 if (tmprc != 0)
14121bdc 1775 goto unlink_target;
ee2fd967 1776
8ceb9843
PS
1777 tmprc = CIFSSMBUnixQPathInfo(xid, tcon, to_name,
1778 info_buf_target,
1779 cifs_sb->local_nls,
2baa2682 1780 cifs_remap(cifs_sb));
14121bdc 1781
8d281efb 1782 if (tmprc == 0 && (info_buf_source->UniqueId ==
ae6884a9 1783 info_buf_target->UniqueId)) {
14121bdc 1784 /* same file, POSIX says that this is a noop */
ae6884a9 1785 rc = 0;
14121bdc 1786 goto cifs_rename_exit;
ae6884a9 1787 }
8ceb9843
PS
1788 }
1789 /*
1790 * else ... BB we could add the same check for Windows by
1791 * checking the UniqueId via FILE_INTERNAL_INFO
1792 */
14121bdc 1793
ee2fd967 1794unlink_target:
fc6f3943 1795 /* Try unlinking the target dentry if it's not negative */
2b0143b5 1796 if (d_really_is_positive(target_dentry) && (rc == -EACCES || rc == -EEXIST)) {
a07d3220
PS
1797 if (d_is_dir(target_dentry))
1798 tmprc = cifs_rmdir(target_dir, target_dentry);
1799 else
1800 tmprc = cifs_unlink(target_dir, target_dentry);
14121bdc
JL
1801 if (tmprc)
1802 goto cifs_rename_exit;
8ceb9843
PS
1803 rc = cifs_do_rename(xid, source_dentry, from_name,
1804 target_dentry, to_name);
1da177e4
LT
1805 }
1806
b46799a8
PS
1807 /* force revalidate to go get info when needed */
1808 CIFS_I(source_dir)->time = CIFS_I(target_dir)->time = 0;
1809
1810 source_dir->i_ctime = source_dir->i_mtime = target_dir->i_ctime =
e37fea58 1811 target_dir->i_mtime = current_time(source_dir);
b46799a8 1812
1da177e4 1813cifs_rename_exit:
ee2fd967 1814 kfree(info_buf_source);
8ceb9843
PS
1815 kfree(from_name);
1816 kfree(to_name);
6d5786a3 1817 free_xid(xid);
7ffec372 1818 cifs_put_tlink(tlink);
1da177e4
LT
1819 return rc;
1820}
1821
df2cf170
JL
1822static bool
1823cifs_inode_needs_reval(struct inode *inode)
1da177e4 1824{
df2cf170 1825 struct cifsInodeInfo *cifs_i = CIFS_I(inode);
6d20e840 1826 struct cifs_sb_info *cifs_sb = CIFS_SB(inode->i_sb);
1da177e4 1827
18cceb6a 1828 if (CIFS_CACHE_READ(cifs_i))
df2cf170 1829 return false;
1da177e4 1830
df2cf170
JL
1831 if (!lookupCacheEnabled)
1832 return true;
1da177e4 1833
df2cf170
JL
1834 if (cifs_i->time == 0)
1835 return true;
1da177e4 1836
a87c9ad9
JL
1837 if (!cifs_sb->actimeo)
1838 return true;
1839
6d20e840
SJ
1840 if (!time_in_range(jiffies, cifs_i->time,
1841 cifs_i->time + cifs_sb->actimeo))
df2cf170
JL
1842 return true;
1843
db19272e 1844 /* hardlinked files w/ noserverino get "special" treatment */
6d20e840 1845 if (!(cifs_sb->mnt_cifs_flags & CIFS_MOUNT_SERVER_INUM) &&
db19272e
JL
1846 S_ISREG(inode->i_mode) && inode->i_nlink != 1)
1847 return true;
1848
df2cf170
JL
1849 return false;
1850}
1851
523fb8c8
SJ
1852/*
1853 * Zap the cache. Called when invalid_mapping flag is set.
1854 */
6feb9891 1855int
df2cf170
JL
1856cifs_invalidate_mapping(struct inode *inode)
1857{
6feb9891 1858 int rc = 0;
df2cf170 1859
df2cf170 1860 if (inode->i_mapping && inode->i_mapping->nrpages != 0) {
257fb1f1 1861 rc = invalidate_inode_pages2(inode->i_mapping);
4f73c7d3 1862 if (rc)
f96637be
JP
1863 cifs_dbg(VFS, "%s: could not invalidate inode %p\n",
1864 __func__, inode);
df2cf170 1865 }
257fb1f1 1866
9451a9a5 1867 cifs_fscache_reset_inode_cookie(inode);
6feb9891 1868 return rc;
df2cf170
JL
1869}
1870
4f73c7d3
JL
1871/**
1872 * cifs_wait_bit_killable - helper for functions that are sleeping on bit locks
1873 * @word: long word containing the bit lock
1874 */
1875static int
dfd01f02 1876cifs_wait_bit_killable(struct wait_bit_key *key, int mode)
4f73c7d3 1877{
4f73c7d3 1878 freezable_schedule_unsafe();
dfd01f02
PZ
1879 if (signal_pending_state(mode, current))
1880 return -ERESTARTSYS;
4f73c7d3
JL
1881 return 0;
1882}
1883
e284e53f
JL
1884int
1885cifs_revalidate_mapping(struct inode *inode)
1886{
4f73c7d3
JL
1887 int rc;
1888 unsigned long *flags = &CIFS_I(inode)->flags;
1889
74316201
N
1890 rc = wait_on_bit_lock_action(flags, CIFS_INO_LOCK, cifs_wait_bit_killable,
1891 TASK_KILLABLE);
4f73c7d3
JL
1892 if (rc)
1893 return rc;
1894
1895 if (test_and_clear_bit(CIFS_INO_INVALID_MAPPING, flags)) {
1896 rc = cifs_invalidate_mapping(inode);
1897 if (rc)
1898 set_bit(CIFS_INO_INVALID_MAPPING, flags);
1899 }
1900
1901 clear_bit_unlock(CIFS_INO_LOCK, flags);
b1cce803 1902 smp_mb__after_atomic();
4f73c7d3
JL
1903 wake_up_bit(flags, CIFS_INO_LOCK);
1904
1905 return rc;
1906}
1907
1908int
1909cifs_zap_mapping(struct inode *inode)
1910{
1911 set_bit(CIFS_INO_INVALID_MAPPING, &CIFS_I(inode)->flags);
1912 return cifs_revalidate_mapping(inode);
e284e53f
JL
1913}
1914
6feb9891 1915int cifs_revalidate_file_attr(struct file *filp)
abab095d
JL
1916{
1917 int rc = 0;
496ad9aa 1918 struct inode *inode = file_inode(filp);
ba00ba64 1919 struct cifsFileInfo *cfile = (struct cifsFileInfo *) filp->private_data;
abab095d
JL
1920
1921 if (!cifs_inode_needs_reval(inode))
6feb9891 1922 return rc;
abab095d 1923
13cfb733 1924 if (tlink_tcon(cfile->tlink)->unix_ext)
abab095d
JL
1925 rc = cifs_get_file_info_unix(filp);
1926 else
1927 rc = cifs_get_file_info(filp);
1928
abab095d
JL
1929 return rc;
1930}
1931
6feb9891 1932int cifs_revalidate_dentry_attr(struct dentry *dentry)
df2cf170 1933{
6d5786a3 1934 unsigned int xid;
df2cf170 1935 int rc = 0;
2b0143b5 1936 struct inode *inode = d_inode(dentry);
df2cf170 1937 struct super_block *sb = dentry->d_sb;
6feb9891 1938 char *full_path = NULL;
df2cf170
JL
1939
1940 if (inode == NULL)
1941 return -ENOENT;
1da177e4 1942
df2cf170 1943 if (!cifs_inode_needs_reval(inode))
6feb9891
PS
1944 return rc;
1945
6d5786a3 1946 xid = get_xid();
1da177e4
LT
1947
1948 /* can not safely grab the rename sem here if rename calls revalidate
1949 since that would deadlock */
df2cf170 1950 full_path = build_path_from_dentry(dentry);
1da177e4 1951 if (full_path == NULL) {
0f3bc09e 1952 rc = -ENOMEM;
6feb9891 1953 goto out;
1da177e4
LT
1954 }
1955
f96637be
JP
1956 cifs_dbg(FYI, "Update attributes: %s inode 0x%p count %d dentry: 0x%p d_time %ld jiffies %ld\n",
1957 full_path, inode, inode->i_count.counter,
a00be0e3 1958 dentry, cifs_get_time(dentry), jiffies);
1da177e4 1959
0d424ad0 1960 if (cifs_sb_master_tcon(CIFS_SB(sb))->unix_ext)
df2cf170
JL
1961 rc = cifs_get_inode_info_unix(&inode, full_path, sb, xid);
1962 else
1963 rc = cifs_get_inode_info(&inode, full_path, NULL, sb,
1964 xid, NULL);
1da177e4 1965
6feb9891 1966out:
1da177e4 1967 kfree(full_path);
6d5786a3 1968 free_xid(xid);
1da177e4
LT
1969 return rc;
1970}
1971
6feb9891
PS
1972int cifs_revalidate_file(struct file *filp)
1973{
1974 int rc;
496ad9aa 1975 struct inode *inode = file_inode(filp);
6feb9891
PS
1976
1977 rc = cifs_revalidate_file_attr(filp);
1978 if (rc)
1979 return rc;
1980
e284e53f 1981 return cifs_revalidate_mapping(inode);
6feb9891
PS
1982}
1983
1984/* revalidate a dentry's inode attributes */
1985int cifs_revalidate_dentry(struct dentry *dentry)
1986{
1987 int rc;
2b0143b5 1988 struct inode *inode = d_inode(dentry);
6feb9891
PS
1989
1990 rc = cifs_revalidate_dentry_attr(dentry);
1991 if (rc)
1992 return rc;
1993
e284e53f 1994 return cifs_revalidate_mapping(inode);
6feb9891
PS
1995}
1996
a528d35e
DH
1997int cifs_getattr(const struct path *path, struct kstat *stat,
1998 u32 request_mask, unsigned int flags)
1da177e4 1999{
a528d35e 2000 struct dentry *dentry = path->dentry;
3aa1c8c2 2001 struct cifs_sb_info *cifs_sb = CIFS_SB(dentry->d_sb);
96daf2b0 2002 struct cifs_tcon *tcon = cifs_sb_master_tcon(cifs_sb);
2b0143b5 2003 struct inode *inode = d_inode(dentry);
6feb9891 2004 int rc;
3aa1c8c2 2005
6feb9891
PS
2006 /*
2007 * We need to be sure that all dirty pages are written and the server
2008 * has actual ctime, mtime and file length.
2009 */
18cceb6a 2010 if (!CIFS_CACHE_READ(CIFS_I(inode)) && inode->i_mapping &&
6feb9891
PS
2011 inode->i_mapping->nrpages != 0) {
2012 rc = filemap_fdatawait(inode->i_mapping);
156ecb2d
SF
2013 if (rc) {
2014 mapping_set_error(inode->i_mapping, rc);
2015 return rc;
2016 }
6feb9891 2017 }
1c456013 2018
6feb9891
PS
2019 rc = cifs_revalidate_dentry_attr(dentry);
2020 if (rc)
2021 return rc;
2022
2023 generic_fillattr(inode, stat);
2024 stat->blksize = CIFS_MAX_MSGSIZE;
2025 stat->ino = CIFS_I(inode)->uniqueid;
2026
2027 /*
d3d1fce1
JL
2028 * If on a multiuser mount without unix extensions or cifsacl being
2029 * enabled, and the admin hasn't overridden them, set the ownership
2030 * to the fsuid/fsgid of the current process.
6feb9891
PS
2031 */
2032 if ((cifs_sb->mnt_cifs_flags & CIFS_MOUNT_MULTIUSER) &&
d3d1fce1 2033 !(cifs_sb->mnt_cifs_flags & CIFS_MOUNT_CIFS_ACL) &&
6feb9891
PS
2034 !tcon->unix_ext) {
2035 if (!(cifs_sb->mnt_cifs_flags & CIFS_MOUNT_OVERR_UID))
2036 stat->uid = current_fsuid();
2037 if (!(cifs_sb->mnt_cifs_flags & CIFS_MOUNT_OVERR_GID))
2038 stat->gid = current_fsgid();
5fe14c85 2039 }
6feb9891 2040 return rc;
1da177e4
LT
2041}
2042
2043static int cifs_truncate_page(struct address_space *mapping, loff_t from)
2044{
09cbfeaf
KS
2045 pgoff_t index = from >> PAGE_SHIFT;
2046 unsigned offset = from & (PAGE_SIZE - 1);
1da177e4 2047 struct page *page;
1da177e4
LT
2048 int rc = 0;
2049
2050 page = grab_cache_page(mapping, index);
2051 if (!page)
2052 return -ENOMEM;
2053
09cbfeaf 2054 zero_user_segment(page, offset, PAGE_SIZE);
1da177e4 2055 unlock_page(page);
09cbfeaf 2056 put_page(page);
1da177e4
LT
2057 return rc;
2058}
2059
1b947463 2060static void cifs_setsize(struct inode *inode, loff_t offset)
3677db10 2061{
ba6a46a0 2062 spin_lock(&inode->i_lock);
3677db10 2063 i_size_write(inode, offset);
ba6a46a0 2064 spin_unlock(&inode->i_lock);
1b947463 2065
7caef267 2066 truncate_pagecache(inode, offset);
3677db10
SF
2067}
2068
8efdbde6
JL
2069static int
2070cifs_set_file_size(struct inode *inode, struct iattr *attrs,
6d5786a3 2071 unsigned int xid, char *full_path)
8efdbde6
JL
2072{
2073 int rc;
2074 struct cifsFileInfo *open_file;
2075 struct cifsInodeInfo *cifsInode = CIFS_I(inode);
2076 struct cifs_sb_info *cifs_sb = CIFS_SB(inode->i_sb);
7ffec372 2077 struct tcon_link *tlink = NULL;
d1433418
PS
2078 struct cifs_tcon *tcon = NULL;
2079 struct TCP_Server_Info *server;
8efdbde6
JL
2080
2081 /*
2082 * To avoid spurious oplock breaks from server, in the case of
2083 * inodes that we already have open, avoid doing path based
2084 * setting of file size if we can do it by handle.
2085 * This keeps our caching token (oplock) and avoids timeouts
2086 * when the local oplock break takes longer to flush
2087 * writebehind data than the SMB timeout for the SetPathInfo
2088 * request would allow
2089 */
6508d904 2090 open_file = find_writable_file(cifsInode, true);
8efdbde6 2091 if (open_file) {
d1433418
PS
2092 tcon = tlink_tcon(open_file->tlink);
2093 server = tcon->ses->server;
2094 if (server->ops->set_file_size)
2095 rc = server->ops->set_file_size(xid, tcon, open_file,
2096 attrs->ia_size, false);
2097 else
2098 rc = -ENOSYS;
6ab409b5 2099 cifsFileInfo_put(open_file);
f96637be 2100 cifs_dbg(FYI, "SetFSize for attrs rc = %d\n", rc);
8efdbde6
JL
2101 } else
2102 rc = -EINVAL;
2103
d1433418
PS
2104 if (!rc)
2105 goto set_size_out;
2106
2107 if (tcon == NULL) {
2108 tlink = cifs_sb_tlink(cifs_sb);
2109 if (IS_ERR(tlink))
2110 return PTR_ERR(tlink);
2111 tcon = tlink_tcon(tlink);
2112 server = tcon->ses->server;
2113 }
ba00ba64 2114
d1433418
PS
2115 /*
2116 * Set file size by pathname rather than by handle either because no
2117 * valid, writeable file handle for it was found or because there was
2118 * an error setting it by handle.
2119 */
2120 if (server->ops->set_path_size)
2121 rc = server->ops->set_path_size(xid, tcon, full_path,
2122 attrs->ia_size, cifs_sb, false);
2123 else
2124 rc = -ENOSYS;
f96637be 2125 cifs_dbg(FYI, "SetEOF by path (setattrs) rc = %d\n", rc);
d1433418 2126
d1433418
PS
2127 if (tlink)
2128 cifs_put_tlink(tlink);
8efdbde6 2129
d1433418 2130set_size_out:
8efdbde6 2131 if (rc == 0) {
fbec9ab9 2132 cifsInode->server_eof = attrs->ia_size;
1b947463 2133 cifs_setsize(inode, attrs->ia_size);
8efdbde6
JL
2134 cifs_truncate_page(inode->i_mapping, inode->i_size);
2135 }
2136
2137 return rc;
2138}
2139
3fe5c1dd
JL
2140static int
2141cifs_setattr_unix(struct dentry *direntry, struct iattr *attrs)
2142{
2143 int rc;
6d5786a3 2144 unsigned int xid;
3fe5c1dd 2145 char *full_path = NULL;
2b0143b5 2146 struct inode *inode = d_inode(direntry);
3fe5c1dd
JL
2147 struct cifsInodeInfo *cifsInode = CIFS_I(inode);
2148 struct cifs_sb_info *cifs_sb = CIFS_SB(inode->i_sb);
7ffec372 2149 struct tcon_link *tlink;
96daf2b0 2150 struct cifs_tcon *pTcon;
3fe5c1dd 2151 struct cifs_unix_set_info_args *args = NULL;
3bbeeb3c 2152 struct cifsFileInfo *open_file;
3fe5c1dd 2153
35c265e0
AV
2154 cifs_dbg(FYI, "setattr_unix on file %pd attrs->ia_valid=0x%x\n",
2155 direntry, attrs->ia_valid);
3fe5c1dd 2156
6d5786a3 2157 xid = get_xid();
3fe5c1dd 2158
db78b877
CH
2159 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_NO_PERM)
2160 attrs->ia_valid |= ATTR_FORCE;
2161
31051c85 2162 rc = setattr_prepare(direntry, attrs);
db78b877
CH
2163 if (rc < 0)
2164 goto out;
3fe5c1dd
JL
2165
2166 full_path = build_path_from_dentry(direntry);
2167 if (full_path == NULL) {
2168 rc = -ENOMEM;
2169 goto out;
2170 }
2171
0f4d634c
JL
2172 /*
2173 * Attempt to flush data before changing attributes. We need to do
2174 * this for ATTR_SIZE and ATTR_MTIME for sure, and if we change the
2175 * ownership or mode then we may also need to do this. Here, we take
2176 * the safe way out and just do the flush on all setattr requests. If
2177 * the flush returns error, store it to report later and continue.
2178 *
2179 * BB: This should be smarter. Why bother flushing pages that
2180 * will be truncated anyway? Also, should we error out here if
2181 * the flush returns error?
2182 */
2183 rc = filemap_write_and_wait(inode->i_mapping);
eb4b756b
JL
2184 mapping_set_error(inode->i_mapping, rc);
2185 rc = 0;
3fe5c1dd
JL
2186
2187 if (attrs->ia_valid & ATTR_SIZE) {
2188 rc = cifs_set_file_size(inode, attrs, xid, full_path);
2189 if (rc != 0)
2190 goto out;
2191 }
2192
2193 /* skip mode change if it's just for clearing setuid/setgid */
2194 if (attrs->ia_valid & (ATTR_KILL_SUID|ATTR_KILL_SGID))
2195 attrs->ia_valid &= ~ATTR_MODE;
2196
2197 args = kmalloc(sizeof(*args), GFP_KERNEL);
2198 if (args == NULL) {
2199 rc = -ENOMEM;
2200 goto out;
2201 }
2202
2203 /* set up the struct */
2204 if (attrs->ia_valid & ATTR_MODE)
2205 args->mode = attrs->ia_mode;
2206 else
2207 args->mode = NO_CHANGE_64;
2208
2209 if (attrs->ia_valid & ATTR_UID)
2210 args->uid = attrs->ia_uid;
2211 else
49418b2c 2212 args->uid = INVALID_UID; /* no change */
3fe5c1dd
JL
2213
2214 if (attrs->ia_valid & ATTR_GID)
2215 args->gid = attrs->ia_gid;
2216 else
49418b2c 2217 args->gid = INVALID_GID; /* no change */
3fe5c1dd
JL
2218
2219 if (attrs->ia_valid & ATTR_ATIME)
2220 args->atime = cifs_UnixTimeToNT(attrs->ia_atime);
2221 else
2222 args->atime = NO_CHANGE_64;
2223
2224 if (attrs->ia_valid & ATTR_MTIME)
2225 args->mtime = cifs_UnixTimeToNT(attrs->ia_mtime);
2226 else
2227 args->mtime = NO_CHANGE_64;
2228
2229 if (attrs->ia_valid & ATTR_CTIME)
2230 args->ctime = cifs_UnixTimeToNT(attrs->ia_ctime);
2231 else
2232 args->ctime = NO_CHANGE_64;
2233
2234 args->device = 0;
6508d904 2235 open_file = find_writable_file(cifsInode, true);
3bbeeb3c 2236 if (open_file) {
4b4de76e 2237 u16 nfid = open_file->fid.netfid;
3bbeeb3c 2238 u32 npid = open_file->pid;
13cfb733 2239 pTcon = tlink_tcon(open_file->tlink);
3bbeeb3c 2240 rc = CIFSSMBUnixSetFileInfo(xid, pTcon, args, nfid, npid);
6ab409b5 2241 cifsFileInfo_put(open_file);
3bbeeb3c 2242 } else {
7ffec372
JL
2243 tlink = cifs_sb_tlink(cifs_sb);
2244 if (IS_ERR(tlink)) {
2245 rc = PTR_ERR(tlink);
2246 goto out;
2247 }
2248 pTcon = tlink_tcon(tlink);
3bbeeb3c 2249 rc = CIFSSMBUnixSetPathInfo(xid, pTcon, full_path, args,
01ea95e3 2250 cifs_sb->local_nls,
bc8ebdc4 2251 cifs_remap(cifs_sb));
7ffec372 2252 cifs_put_tlink(tlink);
3bbeeb3c 2253 }
3fe5c1dd 2254
1025774c
CH
2255 if (rc)
2256 goto out;
ccd4bb1b 2257
1025774c 2258 if ((attrs->ia_valid & ATTR_SIZE) &&
1b947463
CH
2259 attrs->ia_size != i_size_read(inode))
2260 truncate_setsize(inode, attrs->ia_size);
1025774c
CH
2261
2262 setattr_copy(inode, attrs);
2263 mark_inode_dirty(inode);
2264
2265 /* force revalidate when any of these times are set since some
2266 of the fs types (eg ext3, fat) do not have fine enough
2267 time granularity to match protocol, and we do not have a
2268 a way (yet) to query the server fs's time granularity (and
2269 whether it rounds times down).
2270 */
2271 if (attrs->ia_valid & (ATTR_MTIME | ATTR_CTIME))
2272 cifsInode->time = 0;
3fe5c1dd
JL
2273out:
2274 kfree(args);
2275 kfree(full_path);
6d5786a3 2276 free_xid(xid);
3fe5c1dd
JL
2277 return rc;
2278}
2279
0510eeb7
JL
2280static int
2281cifs_setattr_nounix(struct dentry *direntry, struct iattr *attrs)
1da177e4 2282{
6d5786a3 2283 unsigned int xid;
8abf2775
EB
2284 kuid_t uid = INVALID_UID;
2285 kgid_t gid = INVALID_GID;
2b0143b5 2286 struct inode *inode = d_inode(direntry);
3fe5c1dd 2287 struct cifs_sb_info *cifs_sb = CIFS_SB(inode->i_sb);
3fe5c1dd 2288 struct cifsInodeInfo *cifsInode = CIFS_I(inode);
1da177e4
LT
2289 char *full_path = NULL;
2290 int rc = -EACCES;
feb3e20c 2291 __u32 dosattr = 0;
4e1e7fb9 2292 __u64 mode = NO_CHANGE_64;
3fe5c1dd 2293
6d5786a3 2294 xid = get_xid();
1da177e4 2295
35c265e0
AV
2296 cifs_dbg(FYI, "setattr on file %pd attrs->iavalid 0x%x\n",
2297 direntry, attrs->ia_valid);
6473a559 2298
db78b877
CH
2299 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_NO_PERM)
2300 attrs->ia_valid |= ATTR_FORCE;
2301
31051c85 2302 rc = setattr_prepare(direntry, attrs);
db78b877 2303 if (rc < 0) {
6d5786a3 2304 free_xid(xid);
db78b877 2305 return rc;
6473a559 2306 }
50c2f753 2307
7f57356b 2308 full_path = build_path_from_dentry(direntry);
1da177e4 2309 if (full_path == NULL) {
0f3bc09e 2310 rc = -ENOMEM;
6d5786a3 2311 free_xid(xid);
0f3bc09e 2312 return rc;
1da177e4 2313 }
1da177e4 2314
0f4d634c
JL
2315 /*
2316 * Attempt to flush data before changing attributes. We need to do
2317 * this for ATTR_SIZE and ATTR_MTIME for sure, and if we change the
2318 * ownership or mode then we may also need to do this. Here, we take
2319 * the safe way out and just do the flush on all setattr requests. If
2320 * the flush returns error, store it to report later and continue.
2321 *
2322 * BB: This should be smarter. Why bother flushing pages that
2323 * will be truncated anyway? Also, should we error out here if
2324 * the flush returns error?
2325 */
2326 rc = filemap_write_and_wait(inode->i_mapping);
eb4b756b
JL
2327 mapping_set_error(inode->i_mapping, rc);
2328 rc = 0;
cea21805 2329
50531444 2330 if (attrs->ia_valid & ATTR_SIZE) {
8efdbde6
JL
2331 rc = cifs_set_file_size(inode, attrs, xid, full_path);
2332 if (rc != 0)
e30dcf3a 2333 goto cifs_setattr_exit;
1da177e4 2334 }
4ca691a8 2335
a5ff3769
SP
2336 if (attrs->ia_valid & ATTR_UID)
2337 uid = attrs->ia_uid;
2338
2339 if (attrs->ia_valid & ATTR_GID)
2340 gid = attrs->ia_gid;
2341
2342#ifdef CONFIG_CIFS_ACL
2343 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_CIFS_ACL) {
8abf2775 2344 if (uid_valid(uid) || gid_valid(gid)) {
a5ff3769
SP
2345 rc = id_mode_to_cifs_acl(inode, full_path, NO_CHANGE_64,
2346 uid, gid);
2347 if (rc) {
f96637be
JP
2348 cifs_dbg(FYI, "%s: Setting id failed with error: %d\n",
2349 __func__, rc);
a5ff3769
SP
2350 goto cifs_setattr_exit;
2351 }
2352 }
2353 } else
2354#endif /* CONFIG_CIFS_ACL */
3fe5c1dd 2355 if (!(cifs_sb->mnt_cifs_flags & CIFS_MOUNT_SET_UID))
4ca691a8 2356 attrs->ia_valid &= ~(ATTR_UID | ATTR_GID);
1da177e4 2357
d32c4f26
JL
2358 /* skip mode change if it's just for clearing setuid/setgid */
2359 if (attrs->ia_valid & (ATTR_KILL_SUID|ATTR_KILL_SGID))
2360 attrs->ia_valid &= ~ATTR_MODE;
2361
1da177e4 2362 if (attrs->ia_valid & ATTR_MODE) {
1da177e4 2363 mode = attrs->ia_mode;
cdbce9c8 2364 rc = 0;
79df1bae 2365#ifdef CONFIG_CIFS_ACL
78415d2d 2366 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_CIFS_ACL) {
a5ff3769 2367 rc = id_mode_to_cifs_acl(inode, full_path, mode,
8abf2775 2368 INVALID_UID, INVALID_GID);
78415d2d 2369 if (rc) {
f96637be
JP
2370 cifs_dbg(FYI, "%s: Setting ACL failed with error: %d\n",
2371 __func__, rc);
78415d2d
SP
2372 goto cifs_setattr_exit;
2373 }
2374 } else
79df1bae 2375#endif /* CONFIG_CIFS_ACL */
5132861a
JL
2376 if (((mode & S_IWUGO) == 0) &&
2377 (cifsInode->cifsAttrs & ATTR_READONLY) == 0) {
feb3e20c
JL
2378
2379 dosattr = cifsInode->cifsAttrs | ATTR_READONLY;
2380
5132861a
JL
2381 /* fix up mode if we're not using dynperm */
2382 if ((cifs_sb->mnt_cifs_flags & CIFS_MOUNT_DYNPERM) == 0)
2383 attrs->ia_mode = inode->i_mode & ~S_IWUGO;
2384 } else if ((mode & S_IWUGO) &&
2385 (cifsInode->cifsAttrs & ATTR_READONLY)) {
feb3e20c
JL
2386
2387 dosattr = cifsInode->cifsAttrs & ~ATTR_READONLY;
2388 /* Attributes of 0 are ignored */
2389 if (dosattr == 0)
2390 dosattr |= ATTR_NORMAL;
5132861a
JL
2391
2392 /* reset local inode permissions to normal */
2393 if (!(cifs_sb->mnt_cifs_flags & CIFS_MOUNT_DYNPERM)) {
2394 attrs->ia_mode &= ~(S_IALLUGO);
2395 if (S_ISDIR(inode->i_mode))
2396 attrs->ia_mode |=
2397 cifs_sb->mnt_dir_mode;
2398 else
2399 attrs->ia_mode |=
2400 cifs_sb->mnt_file_mode;
2401 }
2402 } else if (!(cifs_sb->mnt_cifs_flags & CIFS_MOUNT_DYNPERM)) {
2403 /* ignore mode change - ATTR_READONLY hasn't changed */
2404 attrs->ia_valid &= ~ATTR_MODE;
1da177e4 2405 }
1da177e4
LT
2406 }
2407
feb3e20c
JL
2408 if (attrs->ia_valid & (ATTR_MTIME|ATTR_ATIME|ATTR_CTIME) ||
2409 ((attrs->ia_valid & ATTR_MODE) && dosattr)) {
2410 rc = cifs_set_file_info(inode, attrs, xid, full_path, dosattr);
2411 /* BB: check for rc = -EOPNOTSUPP and switch to legacy mode */
1da177e4 2412
e30dcf3a
SF
2413 /* Even if error on time set, no sense failing the call if
2414 the server would set the time to a reasonable value anyway,
2415 and this check ensures that we are not being called from
2416 sys_utimes in which case we ought to fail the call back to
2417 the user when the server rejects the call */
fb8c4b14 2418 if ((rc) && (attrs->ia_valid &
feb3e20c 2419 (ATTR_MODE | ATTR_GID | ATTR_UID | ATTR_SIZE)))
e30dcf3a 2420 rc = 0;
1da177e4
LT
2421 }
2422
2423 /* do not need local check to inode_check_ok since the server does
2424 that */
1025774c
CH
2425 if (rc)
2426 goto cifs_setattr_exit;
2427
2428 if ((attrs->ia_valid & ATTR_SIZE) &&
1b947463
CH
2429 attrs->ia_size != i_size_read(inode))
2430 truncate_setsize(inode, attrs->ia_size);
1025774c
CH
2431
2432 setattr_copy(inode, attrs);
2433 mark_inode_dirty(inode);
1025774c 2434
e30dcf3a 2435cifs_setattr_exit:
1da177e4 2436 kfree(full_path);
6d5786a3 2437 free_xid(xid);
1da177e4
LT
2438 return rc;
2439}
2440
0510eeb7
JL
2441int
2442cifs_setattr(struct dentry *direntry, struct iattr *attrs)
2443{
fc64005c 2444 struct cifs_sb_info *cifs_sb = CIFS_SB(direntry->d_sb);
96daf2b0 2445 struct cifs_tcon *pTcon = cifs_sb_master_tcon(cifs_sb);
0510eeb7
JL
2446
2447 if (pTcon->unix_ext)
2448 return cifs_setattr_unix(direntry, attrs);
2449
2450 return cifs_setattr_nounix(direntry, attrs);
2451
2452 /* BB: add cifs_setattr_legacy for really old servers */
2453}
2454
99ee4dbd 2455#if 0
1da177e4
LT
2456void cifs_delete_inode(struct inode *inode)
2457{
f96637be 2458 cifs_dbg(FYI, "In cifs_delete_inode, inode = 0x%p\n", inode);
1da177e4
LT
2459 /* may have to add back in if and when safe distributed caching of
2460 directories added e.g. via FindNotify */
2461}
99ee4dbd 2462#endif