]> git.proxmox.com Git - mirror_ubuntu-artful-kernel.git/blame - fs/cifs/inode.c
Merge tag 'scsi-for-linus' of git://git.kernel.org/pub/scm/linux/kernel/git/jejb...
[mirror_ubuntu-artful-kernel.git] / fs / cifs / inode.c
CommitLineData
1da177e4
LT
1/*
2 * fs/cifs/inode.c
3 *
f19159dc 4 * Copyright (C) International Business Machines Corp., 2002,2010
1da177e4
LT
5 * Author(s): Steve French (sfrench@us.ibm.com)
6 *
7 * This library is free software; you can redistribute it and/or modify
8 * it under the terms of the GNU Lesser General Public License as published
9 * by the Free Software Foundation; either version 2.1 of the License, or
10 * (at your option) any later version.
11 *
12 * This library is distributed in the hope that it will be useful,
13 * but WITHOUT ANY WARRANTY; without even the implied warranty of
14 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See
15 * the GNU Lesser General Public License for more details.
16 *
17 * You should have received a copy of the GNU Lesser General Public License
18 * along with this library; if not, write to the Free Software
19 * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
20 */
21#include <linux/fs.h>
1da177e4 22#include <linux/stat.h>
5a0e3ad6 23#include <linux/slab.h>
1da177e4
LT
24#include <linux/pagemap.h>
25#include <asm/div64.h>
26#include "cifsfs.h"
27#include "cifspdu.h"
28#include "cifsglob.h"
29#include "cifsproto.h"
30#include "cifs_debug.h"
31#include "cifs_fs_sb.h"
9451a9a5 32#include "fscache.h"
1da177e4 33
70eff55d 34
01c64fea 35static void cifs_set_ops(struct inode *inode)
70eff55d
CH
36{
37 struct cifs_sb_info *cifs_sb = CIFS_SB(inode->i_sb);
38
39 switch (inode->i_mode & S_IFMT) {
40 case S_IFREG:
41 inode->i_op = &cifs_file_inode_ops;
42 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_DIRECT_IO) {
43 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_NO_BRL)
44 inode->i_fop = &cifs_file_direct_nobrl_ops;
45 else
46 inode->i_fop = &cifs_file_direct_ops;
8be7e6ba
PS
47 } else if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_STRICT_IO) {
48 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_NO_BRL)
49 inode->i_fop = &cifs_file_strict_nobrl_ops;
50 else
51 inode->i_fop = &cifs_file_strict_ops;
70eff55d
CH
52 } else if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_NO_BRL)
53 inode->i_fop = &cifs_file_nobrl_ops;
54 else { /* not direct, send byte range locks */
55 inode->i_fop = &cifs_file_ops;
56 }
57
70eff55d 58 /* check if server can support readpages */
0d424ad0 59 if (cifs_sb_master_tcon(cifs_sb)->ses->server->maxBuf <
70eff55d
CH
60 PAGE_CACHE_SIZE + MAX_CIFS_HDR_SIZE)
61 inode->i_data.a_ops = &cifs_addr_ops_smallbuf;
62 else
63 inode->i_data.a_ops = &cifs_addr_ops;
64 break;
65 case S_IFDIR:
bc5b6e24 66#ifdef CONFIG_CIFS_DFS_UPCALL
01c64fea 67 if (IS_AUTOMOUNT(inode)) {
7962670e
IM
68 inode->i_op = &cifs_dfs_referral_inode_operations;
69 } else {
bc5b6e24
SF
70#else /* NO DFS support, treat as a directory */
71 {
72#endif
7962670e
IM
73 inode->i_op = &cifs_dir_inode_ops;
74 inode->i_fop = &cifs_dir_ops;
75 }
70eff55d
CH
76 break;
77 case S_IFLNK:
78 inode->i_op = &cifs_symlink_inode_ops;
79 break;
80 default:
81 init_special_inode(inode, inode->i_mode, inode->i_rdev);
82 break;
83 }
84}
85
df2cf170
JL
86/* check inode attributes against fattr. If they don't match, tag the
87 * inode for cache invalidation
88 */
89static void
90cifs_revalidate_cache(struct inode *inode, struct cifs_fattr *fattr)
91{
92 struct cifsInodeInfo *cifs_i = CIFS_I(inode);
93
f96637be
JP
94 cifs_dbg(FYI, "%s: revalidating inode %llu\n",
95 __func__, cifs_i->uniqueid);
df2cf170
JL
96
97 if (inode->i_state & I_NEW) {
f96637be
JP
98 cifs_dbg(FYI, "%s: inode %llu is new\n",
99 __func__, cifs_i->uniqueid);
df2cf170
JL
100 return;
101 }
102
103 /* don't bother with revalidation if we have an oplock */
18cceb6a 104 if (CIFS_CACHE_READ(cifs_i)) {
f96637be
JP
105 cifs_dbg(FYI, "%s: inode %llu is oplocked\n",
106 __func__, cifs_i->uniqueid);
df2cf170
JL
107 return;
108 }
109
110 /* revalidate if mtime or size have changed */
111 if (timespec_equal(&inode->i_mtime, &fattr->cf_mtime) &&
112 cifs_i->server_eof == fattr->cf_eof) {
f96637be
JP
113 cifs_dbg(FYI, "%s: inode %llu is unchanged\n",
114 __func__, cifs_i->uniqueid);
df2cf170
JL
115 return;
116 }
117
f96637be
JP
118 cifs_dbg(FYI, "%s: invalidating inode %llu mapping\n",
119 __func__, cifs_i->uniqueid);
df2cf170
JL
120 cifs_i->invalid_mapping = true;
121}
122
74d290da
JM
123/*
124 * copy nlink to the inode, unless it wasn't provided. Provide
125 * sane values if we don't have an existing one and none was provided
126 */
127static void
128cifs_nlink_fattr_to_inode(struct inode *inode, struct cifs_fattr *fattr)
129{
130 /*
131 * if we're in a situation where we can't trust what we
132 * got from the server (readdir, some non-unix cases)
133 * fake reasonable values
134 */
135 if (fattr->cf_flags & CIFS_FATTR_UNKNOWN_NLINK) {
136 /* only provide fake values on a new inode */
137 if (inode->i_state & I_NEW) {
138 if (fattr->cf_cifsattrs & ATTR_DIRECTORY)
139 set_nlink(inode, 2);
140 else
141 set_nlink(inode, 1);
142 }
143 return;
144 }
145
146 /* we trust the server, so update it */
147 set_nlink(inode, fattr->cf_nlink);
148}
149
cc0bad75
JL
150/* populate an inode with info from a cifs_fattr struct */
151void
152cifs_fattr_to_inode(struct inode *inode, struct cifs_fattr *fattr)
75f12983 153{
cc0bad75 154 struct cifsInodeInfo *cifs_i = CIFS_I(inode);
0b8f18e3 155 struct cifs_sb_info *cifs_sb = CIFS_SB(inode->i_sb);
cc0bad75 156
df2cf170
JL
157 cifs_revalidate_cache(inode, fattr);
158
b7ca6928 159 spin_lock(&inode->i_lock);
cc0bad75
JL
160 inode->i_atime = fattr->cf_atime;
161 inode->i_mtime = fattr->cf_mtime;
162 inode->i_ctime = fattr->cf_ctime;
cc0bad75 163 inode->i_rdev = fattr->cf_rdev;
74d290da 164 cifs_nlink_fattr_to_inode(inode, fattr);
cc0bad75
JL
165 inode->i_uid = fattr->cf_uid;
166 inode->i_gid = fattr->cf_gid;
167
0b8f18e3
JL
168 /* if dynperm is set, don't clobber existing mode */
169 if (inode->i_state & I_NEW ||
170 !(cifs_sb->mnt_cifs_flags & CIFS_MOUNT_DYNPERM))
171 inode->i_mode = fattr->cf_mode;
172
cc0bad75 173 cifs_i->cifsAttrs = fattr->cf_cifsattrs;
75f12983 174
0b8f18e3
JL
175 if (fattr->cf_flags & CIFS_FATTR_NEED_REVAL)
176 cifs_i->time = 0;
177 else
178 cifs_i->time = jiffies;
179
0b8f18e3 180 cifs_i->delete_pending = fattr->cf_flags & CIFS_FATTR_DELETE_PENDING;
cc0bad75 181
835a36ca 182 cifs_i->server_eof = fattr->cf_eof;
cc0bad75
JL
183 /*
184 * Can't safely change the file size here if the client is writing to
185 * it due to potential races.
186 */
cc0bad75
JL
187 if (is_size_safe_to_change(cifs_i, fattr->cf_eof)) {
188 i_size_write(inode, fattr->cf_eof);
189
190 /*
191 * i_blocks is not related to (i_size / i_blksize),
192 * but instead 512 byte (2**9) size is required for
193 * calculating num blocks.
194 */
195 inode->i_blocks = (512 - 1 + fattr->cf_bytes) >> 9;
196 }
197 spin_unlock(&inode->i_lock);
198
01c64fea
DH
199 if (fattr->cf_flags & CIFS_FATTR_DFS_REFERRAL)
200 inode->i_flags |= S_AUTOMOUNT;
c2b93e06
JL
201 if (inode->i_state & I_NEW)
202 cifs_set_ops(inode);
cc0bad75
JL
203}
204
4065c802
JL
205void
206cifs_fill_uniqueid(struct super_block *sb, struct cifs_fattr *fattr)
207{
208 struct cifs_sb_info *cifs_sb = CIFS_SB(sb);
209
210 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_SERVER_INUM)
211 return;
212
213 fattr->cf_uniqueid = iunique(sb, ROOT_I);
214}
215
cc0bad75
JL
216/* Fill a cifs_fattr struct with info from FILE_UNIX_BASIC_INFO. */
217void
218cifs_unix_basic_to_fattr(struct cifs_fattr *fattr, FILE_UNIX_BASIC_INFO *info,
219 struct cifs_sb_info *cifs_sb)
220{
221 memset(fattr, 0, sizeof(*fattr));
222 fattr->cf_uniqueid = le64_to_cpu(info->UniqueId);
223 fattr->cf_bytes = le64_to_cpu(info->NumOfBytes);
224 fattr->cf_eof = le64_to_cpu(info->EndOfFile);
225
226 fattr->cf_atime = cifs_NTtimeToUnix(info->LastAccessTime);
227 fattr->cf_mtime = cifs_NTtimeToUnix(info->LastModificationTime);
228 fattr->cf_ctime = cifs_NTtimeToUnix(info->LastStatusChange);
229 fattr->cf_mode = le64_to_cpu(info->Permissions);
75f12983
CH
230
231 /*
232 * Since we set the inode type below we need to mask off
233 * to avoid strange results if bits set above.
234 */
cc0bad75 235 fattr->cf_mode &= ~S_IFMT;
75f12983
CH
236 switch (le32_to_cpu(info->Type)) {
237 case UNIX_FILE:
cc0bad75
JL
238 fattr->cf_mode |= S_IFREG;
239 fattr->cf_dtype = DT_REG;
75f12983
CH
240 break;
241 case UNIX_SYMLINK:
cc0bad75
JL
242 fattr->cf_mode |= S_IFLNK;
243 fattr->cf_dtype = DT_LNK;
75f12983
CH
244 break;
245 case UNIX_DIR:
cc0bad75
JL
246 fattr->cf_mode |= S_IFDIR;
247 fattr->cf_dtype = DT_DIR;
75f12983
CH
248 break;
249 case UNIX_CHARDEV:
cc0bad75
JL
250 fattr->cf_mode |= S_IFCHR;
251 fattr->cf_dtype = DT_CHR;
252 fattr->cf_rdev = MKDEV(le64_to_cpu(info->DevMajor),
253 le64_to_cpu(info->DevMinor) & MINORMASK);
75f12983
CH
254 break;
255 case UNIX_BLOCKDEV:
cc0bad75
JL
256 fattr->cf_mode |= S_IFBLK;
257 fattr->cf_dtype = DT_BLK;
258 fattr->cf_rdev = MKDEV(le64_to_cpu(info->DevMajor),
259 le64_to_cpu(info->DevMinor) & MINORMASK);
75f12983
CH
260 break;
261 case UNIX_FIFO:
cc0bad75
JL
262 fattr->cf_mode |= S_IFIFO;
263 fattr->cf_dtype = DT_FIFO;
75f12983
CH
264 break;
265 case UNIX_SOCKET:
cc0bad75
JL
266 fattr->cf_mode |= S_IFSOCK;
267 fattr->cf_dtype = DT_SOCK;
75f12983
CH
268 break;
269 default:
270 /* safest to call it a file if we do not know */
cc0bad75
JL
271 fattr->cf_mode |= S_IFREG;
272 fattr->cf_dtype = DT_REG;
f96637be 273 cifs_dbg(FYI, "unknown type %d\n", le32_to_cpu(info->Type));
75f12983
CH
274 break;
275 }
276
46bbc25f
EB
277 fattr->cf_uid = cifs_sb->mnt_uid;
278 if (!(cifs_sb->mnt_cifs_flags & CIFS_MOUNT_OVERR_UID)) {
279 u64 id = le64_to_cpu(info->Uid);
4a2c8cf5
EB
280 if (id < ((uid_t)-1)) {
281 kuid_t uid = make_kuid(&init_user_ns, id);
282 if (uid_valid(uid))
283 fattr->cf_uid = uid;
284 }
46bbc25f
EB
285 }
286
287 fattr->cf_gid = cifs_sb->mnt_gid;
288 if (!(cifs_sb->mnt_cifs_flags & CIFS_MOUNT_OVERR_GID)) {
289 u64 id = le64_to_cpu(info->Gid);
4a2c8cf5
EB
290 if (id < ((gid_t)-1)) {
291 kgid_t gid = make_kgid(&init_user_ns, id);
292 if (gid_valid(gid))
293 fattr->cf_gid = gid;
294 }
46bbc25f 295 }
75f12983 296
cc0bad75 297 fattr->cf_nlink = le64_to_cpu(info->Nlinks);
75f12983
CH
298}
299
b9a3260f 300/*
cc0bad75
JL
301 * Fill a cifs_fattr struct with fake inode info.
302 *
303 * Needed to setup cifs_fattr data for the directory which is the
304 * junction to the new submount (ie to setup the fake directory
305 * which represents a DFS referral).
b9a3260f 306 */
f1230c97 307static void
cc0bad75 308cifs_create_dfs_fattr(struct cifs_fattr *fattr, struct super_block *sb)
0e4bbde9 309{
cc0bad75 310 struct cifs_sb_info *cifs_sb = CIFS_SB(sb);
0e4bbde9 311
f96637be 312 cifs_dbg(FYI, "creating fake fattr for DFS referral\n");
cc0bad75
JL
313
314 memset(fattr, 0, sizeof(*fattr));
315 fattr->cf_mode = S_IFDIR | S_IXUGO | S_IRWXU;
316 fattr->cf_uid = cifs_sb->mnt_uid;
317 fattr->cf_gid = cifs_sb->mnt_gid;
318 fattr->cf_atime = CURRENT_TIME;
319 fattr->cf_ctime = CURRENT_TIME;
320 fattr->cf_mtime = CURRENT_TIME;
321 fattr->cf_nlink = 2;
322 fattr->cf_flags |= CIFS_FATTR_DFS_REFERRAL;
0e4bbde9
SF
323}
324
4ad65044
PS
325static int
326cifs_get_file_info_unix(struct file *filp)
abab095d
JL
327{
328 int rc;
6d5786a3 329 unsigned int xid;
abab095d
JL
330 FILE_UNIX_BASIC_INFO find_data;
331 struct cifs_fattr fattr;
496ad9aa 332 struct inode *inode = file_inode(filp);
abab095d 333 struct cifs_sb_info *cifs_sb = CIFS_SB(inode->i_sb);
c21dfb69 334 struct cifsFileInfo *cfile = filp->private_data;
96daf2b0 335 struct cifs_tcon *tcon = tlink_tcon(cfile->tlink);
abab095d 336
6d5786a3 337 xid = get_xid();
4b4de76e 338 rc = CIFSSMBUnixQFileInfo(xid, tcon, cfile->fid.netfid, &find_data);
abab095d
JL
339 if (!rc) {
340 cifs_unix_basic_to_fattr(&fattr, &find_data, cifs_sb);
341 } else if (rc == -EREMOTE) {
342 cifs_create_dfs_fattr(&fattr, inode->i_sb);
343 rc = 0;
344 }
345
346 cifs_fattr_to_inode(inode, &fattr);
6d5786a3 347 free_xid(xid);
abab095d
JL
348 return rc;
349}
350
1da177e4 351int cifs_get_inode_info_unix(struct inode **pinode,
cc0bad75 352 const unsigned char *full_path,
6d5786a3 353 struct super_block *sb, unsigned int xid)
1da177e4 354{
cc0bad75 355 int rc;
0e4bbde9 356 FILE_UNIX_BASIC_INFO find_data;
cc0bad75 357 struct cifs_fattr fattr;
96daf2b0 358 struct cifs_tcon *tcon;
7ffec372 359 struct tcon_link *tlink;
1da177e4 360 struct cifs_sb_info *cifs_sb = CIFS_SB(sb);
1da177e4 361
f96637be 362 cifs_dbg(FYI, "Getting info on %s\n", full_path);
7962670e 363
7ffec372
JL
364 tlink = cifs_sb_tlink(cifs_sb);
365 if (IS_ERR(tlink))
366 return PTR_ERR(tlink);
367 tcon = tlink_tcon(tlink);
368
1da177e4 369 /* could have done a find first instead but this returns more info */
cc0bad75 370 rc = CIFSSMBUnixQPathInfo(xid, tcon, full_path, &find_data,
737b758c
SF
371 cifs_sb->local_nls, cifs_sb->mnt_cifs_flags &
372 CIFS_MOUNT_MAP_SPECIAL_CHR);
7ffec372 373 cifs_put_tlink(tlink);
e911d0cc 374
cc0bad75
JL
375 if (!rc) {
376 cifs_unix_basic_to_fattr(&fattr, &find_data, cifs_sb);
377 } else if (rc == -EREMOTE) {
378 cifs_create_dfs_fattr(&fattr, sb);
379 rc = 0;
380 } else {
381 return rc;
382 }
1da177e4 383
1b12b9c1
SM
384 /* check for Minshall+French symlinks */
385 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_MF_SYMLINKS) {
cb084b1a
SP
386 int tmprc = check_mf_symlink(xid, tcon, cifs_sb, &fattr,
387 full_path);
1b12b9c1 388 if (tmprc)
cb084b1a 389 cifs_dbg(FYI, "check_mf_symlink: %d\n", tmprc);
1b12b9c1
SM
390 }
391
0e4bbde9 392 if (*pinode == NULL) {
cc0bad75 393 /* get new inode */
4065c802 394 cifs_fill_uniqueid(sb, &fattr);
cc0bad75
JL
395 *pinode = cifs_iget(sb, &fattr);
396 if (!*pinode)
0e4bbde9 397 rc = -ENOMEM;
cc0bad75
JL
398 } else {
399 /* we already have inode, update it */
400 cifs_fattr_to_inode(*pinode, &fattr);
0e4bbde9 401 }
1da177e4 402
1da177e4
LT
403 return rc;
404}
405
0b8f18e3 406static int
0360d605 407cifs_sfu_type(struct cifs_fattr *fattr, const char *path,
6d5786a3 408 struct cifs_sb_info *cifs_sb, unsigned int xid)
d6e2f2a4
SF
409{
410 int rc;
4b18f2a9 411 int oplock = 0;
7ffec372 412 struct tcon_link *tlink;
96daf2b0 413 struct cifs_tcon *tcon;
d81b8a40
PS
414 struct cifs_fid fid;
415 struct cifs_open_parms oparms;
d4ffff1f 416 struct cifs_io_parms io_parms;
86c96b4b 417 char buf[24];
d6e2f2a4 418 unsigned int bytes_read;
fb8c4b14 419 char *pbuf;
0360d605 420 int buf_type = CIFS_NO_BUFFER;
d6e2f2a4
SF
421
422 pbuf = buf;
423
0b8f18e3
JL
424 fattr->cf_mode &= ~S_IFMT;
425
426 if (fattr->cf_eof == 0) {
427 fattr->cf_mode |= S_IFIFO;
428 fattr->cf_dtype = DT_FIFO;
d6e2f2a4 429 return 0;
0b8f18e3
JL
430 } else if (fattr->cf_eof < 8) {
431 fattr->cf_mode |= S_IFREG;
432 fattr->cf_dtype = DT_REG;
d6e2f2a4
SF
433 return -EINVAL; /* EOPNOTSUPP? */
434 }
50c2f753 435
7ffec372
JL
436 tlink = cifs_sb_tlink(cifs_sb);
437 if (IS_ERR(tlink))
438 return PTR_ERR(tlink);
439 tcon = tlink_tcon(tlink);
440
d81b8a40
PS
441 oparms.tcon = tcon;
442 oparms.cifs_sb = cifs_sb;
443 oparms.desired_access = GENERIC_READ;
444 oparms.create_options = CREATE_NOT_DIR;
445 oparms.disposition = FILE_OPEN;
446 oparms.path = path;
447 oparms.fid = &fid;
448 oparms.reconnect = false;
449
450 rc = CIFS_open(xid, &oparms, &oplock, NULL);
0360d605
PS
451 if (rc) {
452 cifs_put_tlink(tlink);
453 return rc;
454 }
455
456 /* Read header */
d81b8a40 457 io_parms.netfid = fid.netfid;
0360d605
PS
458 io_parms.pid = current->tgid;
459 io_parms.tcon = tcon;
460 io_parms.offset = 0;
461 io_parms.length = 24;
462
463 rc = CIFSSMBRead(xid, &io_parms, &bytes_read, &pbuf, &buf_type);
464 if ((rc == 0) && (bytes_read >= 8)) {
465 if (memcmp("IntxBLK", pbuf, 8) == 0) {
466 cifs_dbg(FYI, "Block device\n");
467 fattr->cf_mode |= S_IFBLK;
468 fattr->cf_dtype = DT_BLK;
469 if (bytes_read == 24) {
470 /* we have enough to decode dev num */
471 __u64 mjr; /* major */
472 __u64 mnr; /* minor */
473 mjr = le64_to_cpu(*(__le64 *)(pbuf+8));
474 mnr = le64_to_cpu(*(__le64 *)(pbuf+16));
475 fattr->cf_rdev = MKDEV(mjr, mnr);
86c96b4b 476 }
0360d605
PS
477 } else if (memcmp("IntxCHR", pbuf, 8) == 0) {
478 cifs_dbg(FYI, "Char device\n");
479 fattr->cf_mode |= S_IFCHR;
480 fattr->cf_dtype = DT_CHR;
481 if (bytes_read == 24) {
482 /* we have enough to decode dev num */
483 __u64 mjr; /* major */
484 __u64 mnr; /* minor */
485 mjr = le64_to_cpu(*(__le64 *)(pbuf+8));
486 mnr = le64_to_cpu(*(__le64 *)(pbuf+16));
487 fattr->cf_rdev = MKDEV(mjr, mnr);
488 }
489 } else if (memcmp("IntxLNK", pbuf, 7) == 0) {
490 cifs_dbg(FYI, "Symlink\n");
491 fattr->cf_mode |= S_IFLNK;
492 fattr->cf_dtype = DT_LNK;
3020a1f5 493 } else {
0360d605 494 fattr->cf_mode |= S_IFREG; /* file? */
0b8f18e3 495 fattr->cf_dtype = DT_REG;
0360d605 496 rc = -EOPNOTSUPP;
fb8c4b14 497 }
0360d605
PS
498 } else {
499 fattr->cf_mode |= S_IFREG; /* then it is a file */
500 fattr->cf_dtype = DT_REG;
501 rc = -EOPNOTSUPP; /* or some unknown SFU type */
d6e2f2a4 502 }
d81b8a40 503 CIFSSMBClose(xid, tcon, fid.netfid);
7ffec372 504 cifs_put_tlink(tlink);
d6e2f2a4 505 return rc;
d6e2f2a4
SF
506}
507
9e294f1c
SF
508#define SFBITS_MASK (S_ISVTX | S_ISGID | S_ISUID) /* SETFILEBITS valid bits */
509
0b8f18e3
JL
510/*
511 * Fetch mode bits as provided by SFU.
512 *
513 * FIXME: Doesn't this clobber the type bit we got from cifs_sfu_type ?
514 */
515static int cifs_sfu_mode(struct cifs_fattr *fattr, const unsigned char *path,
6d5786a3 516 struct cifs_sb_info *cifs_sb, unsigned int xid)
9e294f1c 517{
3020a1f5 518#ifdef CONFIG_CIFS_XATTR
9e294f1c
SF
519 ssize_t rc;
520 char ea_value[4];
521 __u32 mode;
7ffec372 522 struct tcon_link *tlink;
96daf2b0 523 struct cifs_tcon *tcon;
7ffec372
JL
524
525 tlink = cifs_sb_tlink(cifs_sb);
526 if (IS_ERR(tlink))
527 return PTR_ERR(tlink);
528 tcon = tlink_tcon(tlink);
9e294f1c 529
d979f3b0
SF
530 if (tcon->ses->server->ops->query_all_EAs == NULL) {
531 cifs_put_tlink(tlink);
532 return -EOPNOTSUPP;
533 }
534
535 rc = tcon->ses->server->ops->query_all_EAs(xid, tcon, path,
536 "SETFILEBITS", ea_value, 4 /* size of buf */,
537 cifs_sb->local_nls,
538 cifs_sb->mnt_cifs_flags & CIFS_MOUNT_MAP_SPECIAL_CHR);
7ffec372 539 cifs_put_tlink(tlink);
4523cc30 540 if (rc < 0)
9e294f1c
SF
541 return (int)rc;
542 else if (rc > 3) {
543 mode = le32_to_cpu(*((__le32 *)ea_value));
0b8f18e3 544 fattr->cf_mode &= ~SFBITS_MASK;
f96637be
JP
545 cifs_dbg(FYI, "special bits 0%o org mode 0%o\n",
546 mode, fattr->cf_mode);
0b8f18e3 547 fattr->cf_mode = (mode & SFBITS_MASK) | fattr->cf_mode;
f96637be 548 cifs_dbg(FYI, "special mode bits 0%o\n", mode);
9e294f1c 549 }
0b8f18e3
JL
550
551 return 0;
3020a1f5
SF
552#else
553 return -EOPNOTSUPP;
554#endif
9e294f1c
SF
555}
556
0b8f18e3 557/* Fill a cifs_fattr struct with info from FILE_ALL_INFO */
f1230c97 558static void
0b8f18e3 559cifs_all_info_to_fattr(struct cifs_fattr *fattr, FILE_ALL_INFO *info,
eb85d94b
PS
560 struct cifs_sb_info *cifs_sb, bool adjust_tz,
561 bool symlink)
b9a3260f 562{
96daf2b0 563 struct cifs_tcon *tcon = cifs_sb_master_tcon(cifs_sb);
0d424ad0 564
0b8f18e3
JL
565 memset(fattr, 0, sizeof(*fattr));
566 fattr->cf_cifsattrs = le32_to_cpu(info->Attributes);
567 if (info->DeletePending)
568 fattr->cf_flags |= CIFS_FATTR_DELETE_PENDING;
569
570 if (info->LastAccessTime)
571 fattr->cf_atime = cifs_NTtimeToUnix(info->LastAccessTime);
572 else
573 fattr->cf_atime = CURRENT_TIME;
574
575 fattr->cf_ctime = cifs_NTtimeToUnix(info->ChangeTime);
576 fattr->cf_mtime = cifs_NTtimeToUnix(info->LastWriteTime);
577
578 if (adjust_tz) {
0d424ad0
JL
579 fattr->cf_ctime.tv_sec += tcon->ses->server->timeAdj;
580 fattr->cf_mtime.tv_sec += tcon->ses->server->timeAdj;
0b8f18e3
JL
581 }
582
583 fattr->cf_eof = le64_to_cpu(info->EndOfFile);
584 fattr->cf_bytes = le64_to_cpu(info->AllocationSize);
20054bd6 585 fattr->cf_createtime = le64_to_cpu(info->CreationTime);
0b8f18e3 586
74d290da 587 fattr->cf_nlink = le32_to_cpu(info->NumberOfLinks);
eb85d94b
PS
588
589 if (symlink) {
590 fattr->cf_mode = S_IFLNK;
591 fattr->cf_dtype = DT_LNK;
592 } else if (fattr->cf_cifsattrs & ATTR_DIRECTORY) {
0b8f18e3
JL
593 fattr->cf_mode = S_IFDIR | cifs_sb->mnt_dir_mode;
594 fattr->cf_dtype = DT_DIR;
6de2ce42
PS
595 /*
596 * Server can return wrong NumberOfLinks value for directories
597 * when Unix extensions are disabled - fake it.
598 */
74d290da
JM
599 if (!tcon->unix_ext)
600 fattr->cf_flags |= CIFS_FATTR_UNKNOWN_NLINK;
0b8f18e3
JL
601 } else {
602 fattr->cf_mode = S_IFREG | cifs_sb->mnt_file_mode;
603 fattr->cf_dtype = DT_REG;
0b8f18e3 604
d0c280d2
JL
605 /* clear write bits if ATTR_READONLY is set */
606 if (fattr->cf_cifsattrs & ATTR_READONLY)
607 fattr->cf_mode &= ~(S_IWUGO);
0b8f18e3 608
74d290da
JM
609 /*
610 * Don't accept zero nlink from non-unix servers unless
611 * delete is pending. Instead mark it as unknown.
612 */
613 if ((fattr->cf_nlink < 1) && !tcon->unix_ext &&
614 !info->DeletePending) {
615 cifs_dbg(1, "bogus file nlink value %u\n",
6658b9f7 616 fattr->cf_nlink);
74d290da 617 fattr->cf_flags |= CIFS_FATTR_UNKNOWN_NLINK;
6658b9f7 618 }
6de2ce42 619 }
0b8f18e3
JL
620
621 fattr->cf_uid = cifs_sb->mnt_uid;
622 fattr->cf_gid = cifs_sb->mnt_gid;
b9a3260f
SF
623}
624
4ad65044
PS
625static int
626cifs_get_file_info(struct file *filp)
abab095d
JL
627{
628 int rc;
6d5786a3 629 unsigned int xid;
abab095d
JL
630 FILE_ALL_INFO find_data;
631 struct cifs_fattr fattr;
496ad9aa 632 struct inode *inode = file_inode(filp);
abab095d 633 struct cifs_sb_info *cifs_sb = CIFS_SB(inode->i_sb);
c21dfb69 634 struct cifsFileInfo *cfile = filp->private_data;
96daf2b0 635 struct cifs_tcon *tcon = tlink_tcon(cfile->tlink);
4ad65044
PS
636 struct TCP_Server_Info *server = tcon->ses->server;
637
638 if (!server->ops->query_file_info)
639 return -ENOSYS;
abab095d 640
6d5786a3 641 xid = get_xid();
4ad65044 642 rc = server->ops->query_file_info(xid, tcon, &cfile->fid, &find_data);
42274bb2
PS
643 switch (rc) {
644 case 0:
eb85d94b
PS
645 cifs_all_info_to_fattr(&fattr, &find_data, cifs_sb, false,
646 false);
42274bb2
PS
647 break;
648 case -EREMOTE:
649 cifs_create_dfs_fattr(&fattr, inode->i_sb);
650 rc = 0;
651 break;
652 case -EOPNOTSUPP:
653 case -EINVAL:
abab095d
JL
654 /*
655 * FIXME: legacy server -- fall back to path-based call?
ff215713
SF
656 * for now, just skip revalidating and mark inode for
657 * immediate reval.
658 */
abab095d
JL
659 rc = 0;
660 CIFS_I(inode)->time = 0;
42274bb2 661 default:
abab095d 662 goto cgfi_exit;
42274bb2 663 }
abab095d
JL
664
665 /*
666 * don't bother with SFU junk here -- just mark inode as needing
667 * revalidation.
668 */
abab095d
JL
669 fattr.cf_uniqueid = CIFS_I(inode)->uniqueid;
670 fattr.cf_flags |= CIFS_FATTR_NEED_REVAL;
671 cifs_fattr_to_inode(inode, &fattr);
672cgfi_exit:
6d5786a3 673 free_xid(xid);
abab095d
JL
674 return rc;
675}
676
1208ef1f
PS
677int
678cifs_get_inode_info(struct inode **inode, const char *full_path,
679 FILE_ALL_INFO *data, struct super_block *sb, int xid,
42eacf9e 680 const struct cifs_fid *fid)
1da177e4 681{
c052e2b4
SP
682 bool validinum = false;
683 __u16 srchflgs;
684 int rc = 0, tmprc = ENOSYS;
1208ef1f
PS
685 struct cifs_tcon *tcon;
686 struct TCP_Server_Info *server;
7ffec372 687 struct tcon_link *tlink;
1da177e4 688 struct cifs_sb_info *cifs_sb = CIFS_SB(sb);
1da177e4 689 char *buf = NULL;
1208ef1f 690 bool adjust_tz = false;
0b8f18e3 691 struct cifs_fattr fattr;
c052e2b4 692 struct cifs_search_info *srchinf = NULL;
eb85d94b 693 bool symlink = false;
1da177e4 694
7ffec372
JL
695 tlink = cifs_sb_tlink(cifs_sb);
696 if (IS_ERR(tlink))
697 return PTR_ERR(tlink);
1208ef1f
PS
698 tcon = tlink_tcon(tlink);
699 server = tcon->ses->server;
7ffec372 700
f96637be 701 cifs_dbg(FYI, "Getting info on %s\n", full_path);
1da177e4 702
1208ef1f 703 if ((data == NULL) && (*inode != NULL)) {
18cceb6a 704 if (CIFS_CACHE_READ(CIFS_I(*inode))) {
f96637be 705 cifs_dbg(FYI, "No need to revalidate cached inode sizes\n");
7ffec372 706 goto cgii_exit;
1da177e4
LT
707 }
708 }
709
1208ef1f
PS
710 /* if inode info is not passed, get it from server */
711 if (data == NULL) {
712 if (!server->ops->query_path_info) {
713 rc = -ENOSYS;
714 goto cgii_exit;
715 }
1da177e4 716 buf = kmalloc(sizeof(FILE_ALL_INFO), GFP_KERNEL);
7ffec372
JL
717 if (buf == NULL) {
718 rc = -ENOMEM;
719 goto cgii_exit;
720 }
1208ef1f
PS
721 data = (FILE_ALL_INFO *)buf;
722 rc = server->ops->query_path_info(xid, tcon, cifs_sb, full_path,
eb85d94b 723 data, &adjust_tz, &symlink);
1da177e4 724 }
0b8f18e3
JL
725
726 if (!rc) {
eb85d94b
PS
727 cifs_all_info_to_fattr(&fattr, data, cifs_sb, adjust_tz,
728 symlink);
0b8f18e3
JL
729 } else if (rc == -EREMOTE) {
730 cifs_create_dfs_fattr(&fattr, sb);
b9a3260f 731 rc = 0;
c052e2b4
SP
732 } else if (rc == -EACCES && backup_cred(cifs_sb)) {
733 srchinf = kzalloc(sizeof(struct cifs_search_info),
734 GFP_KERNEL);
735 if (srchinf == NULL) {
736 rc = -ENOMEM;
737 goto cgii_exit;
738 }
739
740 srchinf->endOfSearch = false;
741 srchinf->info_level = SMB_FIND_FILE_ID_FULL_DIR_INFO;
742
743 srchflgs = CIFS_SEARCH_CLOSE_ALWAYS |
744 CIFS_SEARCH_CLOSE_AT_END |
745 CIFS_SEARCH_BACKUP_SEARCH;
746
747 rc = CIFSFindFirst(xid, tcon, full_path,
748 cifs_sb, NULL, srchflgs, srchinf, false);
749 if (!rc) {
750 data =
751 (FILE_ALL_INFO *)srchinf->srch_entries_start;
752
753 cifs_dir_info_to_fattr(&fattr,
754 (FILE_DIRECTORY_INFO *)data, cifs_sb);
755 fattr.cf_uniqueid = le64_to_cpu(
756 ((SEARCH_ID_FULL_DIR_INFO *)data)->UniqueId);
757 validinum = true;
758
759 cifs_buf_release(srchinf->ntwrk_buf_start);
760 }
761 kfree(srchinf);
762 } else
7962670e 763 goto cgii_exit;
1da177e4 764
0b8f18e3
JL
765 /*
766 * If an inode wasn't passed in, then get the inode number
767 *
768 * Is an i_ino of zero legal? Can we use that to check if the server
769 * supports returning inode numbers? Are there other sanity checks we
770 * can use to ensure that the server is really filling in that field?
0b8f18e3 771 */
1208ef1f 772 if (*inode == NULL) {
b9a3260f 773 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_SERVER_INUM) {
c052e2b4
SP
774 if (validinum == false) {
775 if (server->ops->get_srv_inum)
776 tmprc = server->ops->get_srv_inum(xid,
777 tcon, cifs_sb, full_path,
778 &fattr.cf_uniqueid, data);
779 if (tmprc) {
f96637be
JP
780 cifs_dbg(FYI, "GetSrvInodeNum rc %d\n",
781 tmprc);
c052e2b4
SP
782 fattr.cf_uniqueid = iunique(sb, ROOT_I);
783 cifs_autodisable_serverino(cifs_sb);
784 }
132ac7b7 785 }
c052e2b4 786 } else
0b8f18e3 787 fattr.cf_uniqueid = iunique(sb, ROOT_I);
c052e2b4 788 } else
1208ef1f 789 fattr.cf_uniqueid = CIFS_I(*inode)->uniqueid;
b9a3260f 790
0b8f18e3
JL
791 /* query for SFU type info if supported and needed */
792 if (fattr.cf_cifsattrs & ATTR_SYSTEM &&
793 cifs_sb->mnt_cifs_flags & CIFS_MOUNT_UNX_EMUL) {
794 tmprc = cifs_sfu_type(&fattr, full_path, cifs_sb, xid);
795 if (tmprc)
f96637be 796 cifs_dbg(FYI, "cifs_sfu_type failed: %d\n", tmprc);
b9a3260f 797 }
1da177e4 798
79df1bae 799#ifdef CONFIG_CIFS_ACL
b9a3260f
SF
800 /* fill in 0777 bits from ACL */
801 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_CIFS_ACL) {
1208ef1f 802 rc = cifs_acl_to_fattr(cifs_sb, &fattr, *inode, full_path, fid);
78415d2d 803 if (rc) {
f96637be
JP
804 cifs_dbg(FYI, "%s: Getting ACL failed with error: %d\n",
805 __func__, rc);
78415d2d
SP
806 goto cgii_exit;
807 }
b9a3260f 808 }
79df1bae 809#endif /* CONFIG_CIFS_ACL */
b9a3260f 810
0b8f18e3
JL
811 /* fill in remaining high mode bits e.g. SUID, VTX */
812 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_UNX_EMUL)
813 cifs_sfu_mode(&fattr, full_path, cifs_sb, xid);
b9a3260f 814
1b12b9c1
SM
815 /* check for Minshall+French symlinks */
816 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_MF_SYMLINKS) {
cb084b1a
SP
817 tmprc = check_mf_symlink(xid, tcon, cifs_sb, &fattr,
818 full_path);
1b12b9c1 819 if (tmprc)
cb084b1a 820 cifs_dbg(FYI, "check_mf_symlink: %d\n", tmprc);
1b12b9c1
SM
821 }
822
1208ef1f
PS
823 if (!*inode) {
824 *inode = cifs_iget(sb, &fattr);
825 if (!*inode)
0b8f18e3
JL
826 rc = -ENOMEM;
827 } else {
1208ef1f 828 cifs_fattr_to_inode(*inode, &fattr);
0b8f18e3 829 }
b9a3260f 830
7962670e 831cgii_exit:
1da177e4 832 kfree(buf);
7ffec372 833 cifs_put_tlink(tlink);
1da177e4
LT
834 return rc;
835}
836
7f8ed420
SF
837static const struct inode_operations cifs_ipc_inode_ops = {
838 .lookup = cifs_lookup,
839};
840
cc0bad75
JL
841static int
842cifs_find_inode(struct inode *inode, void *opaque)
843{
844 struct cifs_fattr *fattr = (struct cifs_fattr *) opaque;
845
f30b9c11 846 /* don't match inode with different uniqueid */
cc0bad75
JL
847 if (CIFS_I(inode)->uniqueid != fattr->cf_uniqueid)
848 return 0;
849
20054bd6
JL
850 /* use createtime like an i_generation field */
851 if (CIFS_I(inode)->createtime != fattr->cf_createtime)
852 return 0;
853
f30b9c11
JL
854 /* don't match inode of different type */
855 if ((inode->i_mode & S_IFMT) != (fattr->cf_mode & S_IFMT))
856 return 0;
857
5acfec25 858 /* if it's not a directory or has no dentries, then flag it */
b3d9b7a3 859 if (S_ISDIR(inode->i_mode) && !hlist_empty(&inode->i_dentry))
3d694380 860 fattr->cf_flags |= CIFS_FATTR_INO_COLLISION;
3d694380 861
cc0bad75
JL
862 return 1;
863}
864
865static int
866cifs_init_inode(struct inode *inode, void *opaque)
867{
868 struct cifs_fattr *fattr = (struct cifs_fattr *) opaque;
869
870 CIFS_I(inode)->uniqueid = fattr->cf_uniqueid;
20054bd6 871 CIFS_I(inode)->createtime = fattr->cf_createtime;
cc0bad75
JL
872 return 0;
873}
874
5acfec25
JL
875/*
876 * walk dentry list for an inode and report whether it has aliases that
877 * are hashed. We use this to determine if a directory inode can actually
878 * be used.
879 */
880static bool
881inode_has_hashed_dentries(struct inode *inode)
882{
883 struct dentry *dentry;
884
873feea0 885 spin_lock(&inode->i_lock);
b67bfe0d 886 hlist_for_each_entry(dentry, &inode->i_dentry, d_alias) {
5acfec25 887 if (!d_unhashed(dentry) || IS_ROOT(dentry)) {
873feea0 888 spin_unlock(&inode->i_lock);
5acfec25
JL
889 return true;
890 }
891 }
873feea0 892 spin_unlock(&inode->i_lock);
5acfec25
JL
893 return false;
894}
895
cc0bad75
JL
896/* Given fattrs, get a corresponding inode */
897struct inode *
898cifs_iget(struct super_block *sb, struct cifs_fattr *fattr)
899{
900 unsigned long hash;
901 struct inode *inode;
902
3d694380 903retry_iget5_locked:
f96637be 904 cifs_dbg(FYI, "looking for uniqueid=%llu\n", fattr->cf_uniqueid);
cc0bad75
JL
905
906 /* hash down to 32-bits on 32-bit arch */
907 hash = cifs_uniqueid_to_ino_t(fattr->cf_uniqueid);
908
909 inode = iget5_locked(sb, hash, cifs_find_inode, cifs_init_inode, fattr);
cc0bad75 910 if (inode) {
5acfec25 911 /* was there a potentially problematic inode collision? */
3d694380 912 if (fattr->cf_flags & CIFS_FATTR_INO_COLLISION) {
3d694380 913 fattr->cf_flags &= ~CIFS_FATTR_INO_COLLISION;
5acfec25
JL
914
915 if (inode_has_hashed_dentries(inode)) {
916 cifs_autodisable_serverino(CIFS_SB(sb));
917 iput(inode);
918 fattr->cf_uniqueid = iunique(sb, ROOT_I);
919 goto retry_iget5_locked;
920 }
3d694380
JL
921 }
922
cc0bad75
JL
923 cifs_fattr_to_inode(inode, fattr);
924 if (sb->s_flags & MS_NOATIME)
925 inode->i_flags |= S_NOATIME | S_NOCMTIME;
926 if (inode->i_state & I_NEW) {
927 inode->i_ino = hash;
522440ed
JL
928 if (S_ISREG(inode->i_mode))
929 inode->i_data.backing_dev_info = sb->s_bdi;
0ccd4802 930#ifdef CONFIG_CIFS_FSCACHE
9451a9a5
SJ
931 /* initialize per-inode cache cookie pointer */
932 CIFS_I(inode)->fscache = NULL;
0ccd4802 933#endif
cc0bad75
JL
934 unlock_new_inode(inode);
935 }
936 }
937
938 return inode;
939}
940
1da177e4 941/* gets root inode */
9b6763e0 942struct inode *cifs_root_iget(struct super_block *sb)
1da177e4 943{
6d5786a3 944 unsigned int xid;
0d424ad0 945 struct cifs_sb_info *cifs_sb = CIFS_SB(sb);
cc0bad75 946 struct inode *inode = NULL;
ce634ab2 947 long rc;
96daf2b0 948 struct cifs_tcon *tcon = cifs_sb_master_tcon(cifs_sb);
ce634ab2 949
6d5786a3 950 xid = get_xid();
0d424ad0 951 if (tcon->unix_ext)
f87d39d9 952 rc = cifs_get_inode_info_unix(&inode, "", sb, xid);
0b8f18e3 953 else
f87d39d9 954 rc = cifs_get_inode_info(&inode, "", NULL, sb, xid, NULL);
0b8f18e3 955
a7851ce7
OS
956 if (!inode) {
957 inode = ERR_PTR(rc);
958 goto out;
959 }
cc0bad75 960
0ccd4802 961#ifdef CONFIG_CIFS_FSCACHE
d03382ce 962 /* populate tcon->resource_id */
0d424ad0 963 tcon->resource_id = CIFS_I(inode)->uniqueid;
0ccd4802 964#endif
d03382ce 965
0d424ad0 966 if (rc && tcon->ipc) {
f96637be 967 cifs_dbg(FYI, "ipc connection - fake read inode\n");
b7ca6928 968 spin_lock(&inode->i_lock);
7f8ed420 969 inode->i_mode |= S_IFDIR;
bfe86848 970 set_nlink(inode, 2);
7f8ed420
SF
971 inode->i_op = &cifs_ipc_inode_ops;
972 inode->i_fop = &simple_dir_operations;
973 inode->i_uid = cifs_sb->mnt_uid;
974 inode->i_gid = cifs_sb->mnt_gid;
b7ca6928 975 spin_unlock(&inode->i_lock);
ad661334 976 } else if (rc) {
ce634ab2 977 iget_failed(inode);
a7851ce7 978 inode = ERR_PTR(rc);
7f8ed420
SF
979 }
980
a7851ce7 981out:
6d5786a3 982 /* can not call macro free_xid here since in a void func
ce634ab2
DH
983 * TODO: This is no longer true
984 */
6d5786a3 985 _free_xid(xid);
ce634ab2 986 return inode;
1da177e4
LT
987}
988
ed6875e0 989int
6d5786a3 990cifs_set_file_info(struct inode *inode, struct iattr *attrs, unsigned int xid,
ed6875e0 991 char *full_path, __u32 dosattr)
388e57b2 992{
388e57b2 993 bool set_time = false;
388e57b2 994 struct cifs_sb_info *cifs_sb = CIFS_SB(inode->i_sb);
6bdf6dbd 995 struct TCP_Server_Info *server;
388e57b2
SF
996 FILE_BASIC_INFO info_buf;
997
1adcb710
SF
998 if (attrs == NULL)
999 return -EINVAL;
1000
6bdf6dbd
PS
1001 server = cifs_sb_master_tcon(cifs_sb)->ses->server;
1002 if (!server->ops->set_file_info)
1003 return -ENOSYS;
1004
388e57b2
SF
1005 if (attrs->ia_valid & ATTR_ATIME) {
1006 set_time = true;
1007 info_buf.LastAccessTime =
1008 cpu_to_le64(cifs_UnixTimeToNT(attrs->ia_atime));
1009 } else
1010 info_buf.LastAccessTime = 0;
1011
1012 if (attrs->ia_valid & ATTR_MTIME) {
1013 set_time = true;
1014 info_buf.LastWriteTime =
1015 cpu_to_le64(cifs_UnixTimeToNT(attrs->ia_mtime));
1016 } else
1017 info_buf.LastWriteTime = 0;
1018
1019 /*
1020 * Samba throws this field away, but windows may actually use it.
1021 * Do not set ctime unless other time stamps are changed explicitly
1022 * (i.e. by utimes()) since we would then have a mix of client and
1023 * server times.
1024 */
1025 if (set_time && (attrs->ia_valid & ATTR_CTIME)) {
f96637be 1026 cifs_dbg(FYI, "CIFS - CTIME changed\n");
388e57b2
SF
1027 info_buf.ChangeTime =
1028 cpu_to_le64(cifs_UnixTimeToNT(attrs->ia_ctime));
1029 } else
1030 info_buf.ChangeTime = 0;
1031
1032 info_buf.CreationTime = 0; /* don't change */
1033 info_buf.Attributes = cpu_to_le32(dosattr);
1034
6bdf6dbd 1035 return server->ops->set_file_info(inode, full_path, &info_buf, xid);
388e57b2
SF
1036}
1037
a12a1ac7 1038/*
ed6875e0 1039 * Open the given file (if it isn't already), set the DELETE_ON_CLOSE bit
a12a1ac7
JL
1040 * and rename it to a random name that hopefully won't conflict with
1041 * anything else.
1042 */
ed6875e0
PS
1043int
1044cifs_rename_pending_delete(const char *full_path, struct dentry *dentry,
1045 const unsigned int xid)
a12a1ac7
JL
1046{
1047 int oplock = 0;
1048 int rc;
d81b8a40
PS
1049 struct cifs_fid fid;
1050 struct cifs_open_parms oparms;
3270958b 1051 struct inode *inode = dentry->d_inode;
a12a1ac7
JL
1052 struct cifsInodeInfo *cifsInode = CIFS_I(inode);
1053 struct cifs_sb_info *cifs_sb = CIFS_SB(inode->i_sb);
7ffec372 1054 struct tcon_link *tlink;
96daf2b0 1055 struct cifs_tcon *tcon;
3270958b
SF
1056 __u32 dosattr, origattr;
1057 FILE_BASIC_INFO *info_buf = NULL;
a12a1ac7 1058
7ffec372
JL
1059 tlink = cifs_sb_tlink(cifs_sb);
1060 if (IS_ERR(tlink))
1061 return PTR_ERR(tlink);
1062 tcon = tlink_tcon(tlink);
1063
c483a984
SP
1064 /*
1065 * We cannot rename the file if the server doesn't support
1066 * CAP_INFOLEVEL_PASSTHRU
1067 */
1068 if (!(tcon->ses->capabilities & CAP_INFOLEVEL_PASSTHRU)) {
1069 rc = -EBUSY;
1070 goto out;
1071 }
1072
d81b8a40
PS
1073 oparms.tcon = tcon;
1074 oparms.cifs_sb = cifs_sb;
1075 oparms.desired_access = DELETE | FILE_WRITE_ATTRIBUTES;
1076 oparms.create_options = CREATE_NOT_DIR;
1077 oparms.disposition = FILE_OPEN;
1078 oparms.path = full_path;
1079 oparms.fid = &fid;
1080 oparms.reconnect = false;
1081
1082 rc = CIFS_open(xid, &oparms, &oplock, NULL);
a12a1ac7
JL
1083 if (rc != 0)
1084 goto out;
1085
3270958b
SF
1086 origattr = cifsInode->cifsAttrs;
1087 if (origattr == 0)
1088 origattr |= ATTR_NORMAL;
1089
1090 dosattr = origattr & ~ATTR_READONLY;
a12a1ac7
JL
1091 if (dosattr == 0)
1092 dosattr |= ATTR_NORMAL;
1093 dosattr |= ATTR_HIDDEN;
1094
3270958b
SF
1095 /* set ATTR_HIDDEN and clear ATTR_READONLY, but only if needed */
1096 if (dosattr != origattr) {
1097 info_buf = kzalloc(sizeof(*info_buf), GFP_KERNEL);
1098 if (info_buf == NULL) {
1099 rc = -ENOMEM;
1100 goto out_close;
1101 }
1102 info_buf->Attributes = cpu_to_le32(dosattr);
d81b8a40 1103 rc = CIFSSMBSetFileInfo(xid, tcon, info_buf, fid.netfid,
3270958b
SF
1104 current->tgid);
1105 /* although we would like to mark the file hidden
1106 if that fails we will still try to rename it */
72d282dc 1107 if (!rc)
3270958b
SF
1108 cifsInode->cifsAttrs = dosattr;
1109 else
1110 dosattr = origattr; /* since not able to change them */
a12a1ac7 1111 }
a12a1ac7 1112
dd1db2de 1113 /* rename the file */
d81b8a40
PS
1114 rc = CIFSSMBRenameOpenFile(xid, tcon, fid.netfid, NULL,
1115 cifs_sb->local_nls,
a12a1ac7
JL
1116 cifs_sb->mnt_cifs_flags &
1117 CIFS_MOUNT_MAP_SPECIAL_CHR);
3270958b 1118 if (rc != 0) {
47c78f4a 1119 rc = -EBUSY;
3270958b
SF
1120 goto undo_setattr;
1121 }
6d22f098 1122
3270958b
SF
1123 /* try to set DELETE_ON_CLOSE */
1124 if (!cifsInode->delete_pending) {
d81b8a40 1125 rc = CIFSSMBSetFileDisposition(xid, tcon, true, fid.netfid,
3270958b
SF
1126 current->tgid);
1127 /*
1128 * some samba versions return -ENOENT when we try to set the
1129 * file disposition here. Likely a samba bug, but work around
1130 * it for now. This means that some cifsXXX files may hang
1131 * around after they shouldn't.
1132 *
1133 * BB: remove this hack after more servers have the fix
1134 */
1135 if (rc == -ENOENT)
1136 rc = 0;
1137 else if (rc != 0) {
47c78f4a 1138 rc = -EBUSY;
3270958b
SF
1139 goto undo_rename;
1140 }
1141 cifsInode->delete_pending = true;
1142 }
7ce86d5a 1143
a12a1ac7 1144out_close:
d81b8a40 1145 CIFSSMBClose(xid, tcon, fid.netfid);
a12a1ac7 1146out:
3270958b 1147 kfree(info_buf);
7ffec372 1148 cifs_put_tlink(tlink);
a12a1ac7 1149 return rc;
3270958b
SF
1150
1151 /*
1152 * reset everything back to the original state. Don't bother
1153 * dealing with errors here since we can't do anything about
1154 * them anyway.
1155 */
1156undo_rename:
d81b8a40 1157 CIFSSMBRenameOpenFile(xid, tcon, fid.netfid, dentry->d_name.name,
3270958b
SF
1158 cifs_sb->local_nls, cifs_sb->mnt_cifs_flags &
1159 CIFS_MOUNT_MAP_SPECIAL_CHR);
1160undo_setattr:
1161 if (dosattr != origattr) {
1162 info_buf->Attributes = cpu_to_le32(origattr);
d81b8a40 1163 if (!CIFSSMBSetFileInfo(xid, tcon, info_buf, fid.netfid,
3270958b
SF
1164 current->tgid))
1165 cifsInode->cifsAttrs = origattr;
1166 }
1167
1168 goto out_close;
a12a1ac7
JL
1169}
1170
b7ca6928
SF
1171/* copied from fs/nfs/dir.c with small changes */
1172static void
1173cifs_drop_nlink(struct inode *inode)
1174{
1175 spin_lock(&inode->i_lock);
1176 if (inode->i_nlink > 0)
1177 drop_nlink(inode);
1178 spin_unlock(&inode->i_lock);
1179}
ff694527
SF
1180
1181/*
1182 * If dentry->d_inode is null (usually meaning the cached dentry
1183 * is a negative dentry) then we would attempt a standard SMB delete, but
af901ca1
AGR
1184 * if that fails we can not attempt the fall back mechanisms on EACCESS
1185 * but will return the EACCESS to the caller. Note that the VFS does not call
ff694527
SF
1186 * unlink on negative dentries currently.
1187 */
5f0319a7 1188int cifs_unlink(struct inode *dir, struct dentry *dentry)
1da177e4
LT
1189{
1190 int rc = 0;
6d5786a3 1191 unsigned int xid;
1da177e4 1192 char *full_path = NULL;
5f0319a7 1193 struct inode *inode = dentry->d_inode;
ff694527 1194 struct cifsInodeInfo *cifs_inode;
5f0319a7
JL
1195 struct super_block *sb = dir->i_sb;
1196 struct cifs_sb_info *cifs_sb = CIFS_SB(sb);
7ffec372 1197 struct tcon_link *tlink;
96daf2b0 1198 struct cifs_tcon *tcon;
ed6875e0 1199 struct TCP_Server_Info *server;
6050247d
SF
1200 struct iattr *attrs = NULL;
1201 __u32 dosattr = 0, origattr = 0;
1da177e4 1202
f96637be 1203 cifs_dbg(FYI, "cifs_unlink, dir=0x%p, dentry=0x%p\n", dir, dentry);
1da177e4 1204
7ffec372
JL
1205 tlink = cifs_sb_tlink(cifs_sb);
1206 if (IS_ERR(tlink))
1207 return PTR_ERR(tlink);
1208 tcon = tlink_tcon(tlink);
ed6875e0 1209 server = tcon->ses->server;
7ffec372 1210
6d5786a3 1211 xid = get_xid();
1da177e4 1212
5f0319a7
JL
1213 /* Unlink can be called from rename so we can not take the
1214 * sb->s_vfs_rename_mutex here */
1215 full_path = build_path_from_dentry(dentry);
1da177e4 1216 if (full_path == NULL) {
0f3bc09e 1217 rc = -ENOMEM;
7ffec372 1218 goto unlink_out;
1da177e4 1219 }
2d785a50 1220
29e20f9c
PS
1221 if (cap_unix(tcon->ses) && (CIFS_UNIX_POSIX_PATH_OPS_CAP &
1222 le64_to_cpu(tcon->fsUnixInfo.Capability))) {
5f0319a7 1223 rc = CIFSPOSIXDelFile(xid, tcon, full_path,
2d785a50 1224 SMB_POSIX_UNLINK_FILE_TARGET, cifs_sb->local_nls,
737b758c 1225 cifs_sb->mnt_cifs_flags & CIFS_MOUNT_MAP_SPECIAL_CHR);
f96637be 1226 cifs_dbg(FYI, "posix del rc %d\n", rc);
2d785a50
SF
1227 if ((rc == 0) || (rc == -ENOENT))
1228 goto psx_del_no_retry;
1229 }
1da177e4 1230
6050247d 1231retry_std_delete:
ed6875e0
PS
1232 if (!server->ops->unlink) {
1233 rc = -ENOSYS;
1234 goto psx_del_no_retry;
1235 }
1236
1237 rc = server->ops->unlink(xid, tcon, full_path, cifs_sb);
6050247d 1238
2d785a50 1239psx_del_no_retry:
1da177e4 1240 if (!rc) {
5f0319a7 1241 if (inode)
b7ca6928 1242 cifs_drop_nlink(inode);
1da177e4 1243 } else if (rc == -ENOENT) {
5f0319a7 1244 d_drop(dentry);
47c78f4a 1245 } else if (rc == -EBUSY) {
ed6875e0
PS
1246 if (server->ops->rename_pending_delete) {
1247 rc = server->ops->rename_pending_delete(full_path,
1248 dentry, xid);
1249 if (rc == 0)
1250 cifs_drop_nlink(inode);
1251 }
ff694527 1252 } else if ((rc == -EACCES) && (dosattr == 0) && inode) {
388e57b2
SF
1253 attrs = kzalloc(sizeof(*attrs), GFP_KERNEL);
1254 if (attrs == NULL) {
1255 rc = -ENOMEM;
1256 goto out_reval;
1da177e4 1257 }
388e57b2
SF
1258
1259 /* try to reset dos attributes */
ff694527
SF
1260 cifs_inode = CIFS_I(inode);
1261 origattr = cifs_inode->cifsAttrs;
6050247d
SF
1262 if (origattr == 0)
1263 origattr |= ATTR_NORMAL;
1264 dosattr = origattr & ~ATTR_READONLY;
388e57b2
SF
1265 if (dosattr == 0)
1266 dosattr |= ATTR_NORMAL;
1267 dosattr |= ATTR_HIDDEN;
1268
1269 rc = cifs_set_file_info(inode, attrs, xid, full_path, dosattr);
388e57b2
SF
1270 if (rc != 0)
1271 goto out_reval;
6050247d
SF
1272
1273 goto retry_std_delete;
1da177e4 1274 }
6050247d
SF
1275
1276 /* undo the setattr if we errored out and it's needed */
1277 if (rc != 0 && dosattr != 0)
1278 cifs_set_file_info(inode, attrs, xid, full_path, origattr);
1279
388e57b2 1280out_reval:
4523cc30 1281 if (inode) {
ff694527
SF
1282 cifs_inode = CIFS_I(inode);
1283 cifs_inode->time = 0; /* will force revalidate to get info
5f0319a7
JL
1284 when needed */
1285 inode->i_ctime = current_fs_time(sb);
06bcfedd 1286 }
5f0319a7 1287 dir->i_ctime = dir->i_mtime = current_fs_time(sb);
ff694527 1288 cifs_inode = CIFS_I(dir);
6050247d 1289 CIFS_I(dir)->time = 0; /* force revalidate of dir as well */
7ffec372 1290unlink_out:
1da177e4 1291 kfree(full_path);
6050247d 1292 kfree(attrs);
6d5786a3 1293 free_xid(xid);
7ffec372 1294 cifs_put_tlink(tlink);
1da177e4
LT
1295 return rc;
1296}
1297
ff691e96 1298static int
101b92d9 1299cifs_mkdir_qinfo(struct inode *parent, struct dentry *dentry, umode_t mode,
ff691e96
PS
1300 const char *full_path, struct cifs_sb_info *cifs_sb,
1301 struct cifs_tcon *tcon, const unsigned int xid)
1302{
1303 int rc = 0;
101b92d9 1304 struct inode *inode = NULL;
ff691e96
PS
1305
1306 if (tcon->unix_ext)
101b92d9 1307 rc = cifs_get_inode_info_unix(&inode, full_path, parent->i_sb,
ff691e96
PS
1308 xid);
1309 else
101b92d9
JL
1310 rc = cifs_get_inode_info(&inode, full_path, NULL, parent->i_sb,
1311 xid, NULL);
1312
ff691e96
PS
1313 if (rc)
1314 return rc;
1315
ff691e96
PS
1316 /*
1317 * setting nlink not necessary except in cases where we failed to get it
101b92d9
JL
1318 * from the server or was set bogus. Also, since this is a brand new
1319 * inode, no need to grab the i_lock before setting the i_nlink.
ff691e96 1320 */
101b92d9
JL
1321 if (inode->i_nlink < 2)
1322 set_nlink(inode, 2);
ff691e96
PS
1323 mode &= ~current_umask();
1324 /* must turn on setgid bit if parent dir has it */
101b92d9 1325 if (parent->i_mode & S_ISGID)
ff691e96
PS
1326 mode |= S_ISGID;
1327
1328 if (tcon->unix_ext) {
1329 struct cifs_unix_set_info_args args = {
1330 .mode = mode,
1331 .ctime = NO_CHANGE_64,
1332 .atime = NO_CHANGE_64,
1333 .mtime = NO_CHANGE_64,
1334 .device = 0,
1335 };
1336 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_SET_UID) {
49418b2c 1337 args.uid = current_fsuid();
101b92d9 1338 if (parent->i_mode & S_ISGID)
49418b2c 1339 args.gid = parent->i_gid;
ff691e96 1340 else
49418b2c 1341 args.gid = current_fsgid();
ff691e96 1342 } else {
49418b2c
EB
1343 args.uid = INVALID_UID; /* no change */
1344 args.gid = INVALID_GID; /* no change */
ff691e96
PS
1345 }
1346 CIFSSMBUnixSetPathInfo(xid, tcon, full_path, &args,
1347 cifs_sb->local_nls,
1348 cifs_sb->mnt_cifs_flags &
1349 CIFS_MOUNT_MAP_SPECIAL_CHR);
1350 } else {
f436720e 1351 struct TCP_Server_Info *server = tcon->ses->server;
ff691e96 1352 if (!(cifs_sb->mnt_cifs_flags & CIFS_MOUNT_CIFS_ACL) &&
f436720e 1353 (mode & S_IWUGO) == 0 && server->ops->mkdir_setinfo)
101b92d9 1354 server->ops->mkdir_setinfo(inode, full_path, cifs_sb,
f436720e 1355 tcon, xid);
101b92d9
JL
1356 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_DYNPERM)
1357 inode->i_mode = (mode | S_IFDIR);
1358
1359 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_SET_UID) {
1360 inode->i_uid = current_fsuid();
1361 if (inode->i_mode & S_ISGID)
1362 inode->i_gid = parent->i_gid;
1363 else
1364 inode->i_gid = current_fsgid();
ff691e96
PS
1365 }
1366 }
101b92d9 1367 d_instantiate(dentry, inode);
ff691e96
PS
1368 return rc;
1369}
1370
1371static int
1372cifs_posix_mkdir(struct inode *inode, struct dentry *dentry, umode_t mode,
1373 const char *full_path, struct cifs_sb_info *cifs_sb,
1374 struct cifs_tcon *tcon, const unsigned int xid)
1375{
1376 int rc = 0;
1377 u32 oplock = 0;
1378 FILE_UNIX_BASIC_INFO *info = NULL;
1379 struct inode *newinode = NULL;
1380 struct cifs_fattr fattr;
1381
1382 info = kzalloc(sizeof(FILE_UNIX_BASIC_INFO), GFP_KERNEL);
1383 if (info == NULL) {
1384 rc = -ENOMEM;
1385 goto posix_mkdir_out;
1386 }
1387
1388 mode &= ~current_umask();
1389 rc = CIFSPOSIXCreate(xid, tcon, SMB_O_DIRECTORY | SMB_O_CREAT, mode,
1390 NULL /* netfid */, info, &oplock, full_path,
1391 cifs_sb->local_nls, cifs_sb->mnt_cifs_flags &
1392 CIFS_MOUNT_MAP_SPECIAL_CHR);
1393 if (rc == -EOPNOTSUPP)
1394 goto posix_mkdir_out;
1395 else if (rc) {
f96637be 1396 cifs_dbg(FYI, "posix mkdir returned 0x%x\n", rc);
ff691e96
PS
1397 d_drop(dentry);
1398 goto posix_mkdir_out;
1399 }
1400
1401 if (info->Type == cpu_to_le32(-1))
1402 /* no return info, go query for it */
1403 goto posix_mkdir_get_info;
1404 /*
1405 * BB check (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_SET_UID ) to see if
1406 * need to set uid/gid.
1407 */
1408
1409 cifs_unix_basic_to_fattr(&fattr, info, cifs_sb);
1410 cifs_fill_uniqueid(inode->i_sb, &fattr);
1411 newinode = cifs_iget(inode->i_sb, &fattr);
1412 if (!newinode)
1413 goto posix_mkdir_get_info;
1414
1415 d_instantiate(dentry, newinode);
1416
1417#ifdef CONFIG_CIFS_DEBUG2
f96637be
JP
1418 cifs_dbg(FYI, "instantiated dentry %p %s to inode %p\n",
1419 dentry, dentry->d_name.name, newinode);
ff691e96
PS
1420
1421 if (newinode->i_nlink != 2)
f96637be
JP
1422 cifs_dbg(FYI, "unexpected number of links %d\n",
1423 newinode->i_nlink);
ff691e96
PS
1424#endif
1425
1426posix_mkdir_out:
1427 kfree(info);
1428 return rc;
1429posix_mkdir_get_info:
1430 rc = cifs_mkdir_qinfo(inode, dentry, mode, full_path, cifs_sb, tcon,
1431 xid);
1432 goto posix_mkdir_out;
1433}
1434
18bb1db3 1435int cifs_mkdir(struct inode *inode, struct dentry *direntry, umode_t mode)
1da177e4 1436{
ff691e96 1437 int rc = 0;
6d5786a3 1438 unsigned int xid;
1da177e4 1439 struct cifs_sb_info *cifs_sb;
7ffec372 1440 struct tcon_link *tlink;
29e20f9c 1441 struct cifs_tcon *tcon;
f436720e 1442 struct TCP_Server_Info *server;
ff691e96 1443 char *full_path;
1da177e4 1444
f96637be
JP
1445 cifs_dbg(FYI, "In cifs_mkdir, mode = 0x%hx inode = 0x%p\n",
1446 mode, inode);
1da177e4 1447
1da177e4 1448 cifs_sb = CIFS_SB(inode->i_sb);
7ffec372
JL
1449 tlink = cifs_sb_tlink(cifs_sb);
1450 if (IS_ERR(tlink))
1451 return PTR_ERR(tlink);
29e20f9c 1452 tcon = tlink_tcon(tlink);
7ffec372 1453
6d5786a3 1454 xid = get_xid();
1da177e4 1455
7f57356b 1456 full_path = build_path_from_dentry(direntry);
1da177e4 1457 if (full_path == NULL) {
0f3bc09e 1458 rc = -ENOMEM;
7ffec372 1459 goto mkdir_out;
1da177e4 1460 }
50c2f753 1461
29e20f9c
PS
1462 if (cap_unix(tcon->ses) && (CIFS_UNIX_POSIX_PATH_OPS_CAP &
1463 le64_to_cpu(tcon->fsUnixInfo.Capability))) {
ff691e96
PS
1464 rc = cifs_posix_mkdir(inode, direntry, mode, full_path, cifs_sb,
1465 tcon, xid);
1466 if (rc != -EOPNOTSUPP)
2dd29d31 1467 goto mkdir_out;
fb8c4b14 1468 }
ff691e96 1469
f436720e
PS
1470 server = tcon->ses->server;
1471
1472 if (!server->ops->mkdir) {
1473 rc = -ENOSYS;
1474 goto mkdir_out;
1475 }
1476
1da177e4 1477 /* BB add setting the equivalent of mode via CreateX w/ACLs */
f436720e 1478 rc = server->ops->mkdir(xid, tcon, full_path, cifs_sb);
1da177e4 1479 if (rc) {
f96637be 1480 cifs_dbg(FYI, "cifs_mkdir returned 0x%x\n", rc);
1da177e4 1481 d_drop(direntry);
ff691e96 1482 goto mkdir_out;
1da177e4 1483 }
ff691e96
PS
1484
1485 rc = cifs_mkdir_qinfo(inode, direntry, mode, full_path, cifs_sb, tcon,
1486 xid);
fb8c4b14 1487mkdir_out:
6de2ce42
PS
1488 /*
1489 * Force revalidate to get parent dir info when needed since cached
1490 * attributes are invalid now.
1491 */
1492 CIFS_I(inode)->time = 0;
1da177e4 1493 kfree(full_path);
6d5786a3 1494 free_xid(xid);
7ffec372 1495 cifs_put_tlink(tlink);
1da177e4
LT
1496 return rc;
1497}
1498
1499int cifs_rmdir(struct inode *inode, struct dentry *direntry)
1500{
1501 int rc = 0;
6d5786a3 1502 unsigned int xid;
1da177e4 1503 struct cifs_sb_info *cifs_sb;
7ffec372 1504 struct tcon_link *tlink;
f958ca5d
PS
1505 struct cifs_tcon *tcon;
1506 struct TCP_Server_Info *server;
1da177e4
LT
1507 char *full_path = NULL;
1508 struct cifsInodeInfo *cifsInode;
1509
f96637be 1510 cifs_dbg(FYI, "cifs_rmdir, inode = 0x%p\n", inode);
1da177e4 1511
6d5786a3 1512 xid = get_xid();
1da177e4 1513
7f57356b 1514 full_path = build_path_from_dentry(direntry);
1da177e4 1515 if (full_path == NULL) {
0f3bc09e 1516 rc = -ENOMEM;
7ffec372 1517 goto rmdir_exit;
1da177e4
LT
1518 }
1519
7ffec372
JL
1520 cifs_sb = CIFS_SB(inode->i_sb);
1521 tlink = cifs_sb_tlink(cifs_sb);
1522 if (IS_ERR(tlink)) {
1523 rc = PTR_ERR(tlink);
1524 goto rmdir_exit;
1525 }
f958ca5d
PS
1526 tcon = tlink_tcon(tlink);
1527 server = tcon->ses->server;
1528
1529 if (!server->ops->rmdir) {
1530 rc = -ENOSYS;
1531 cifs_put_tlink(tlink);
1532 goto rmdir_exit;
1533 }
7ffec372 1534
f958ca5d 1535 rc = server->ops->rmdir(xid, tcon, full_path, cifs_sb);
7ffec372 1536 cifs_put_tlink(tlink);
1da177e4
LT
1537
1538 if (!rc) {
3677db10 1539 spin_lock(&direntry->d_inode->i_lock);
fb8c4b14 1540 i_size_write(direntry->d_inode, 0);
ce71ec36 1541 clear_nlink(direntry->d_inode);
3677db10 1542 spin_unlock(&direntry->d_inode->i_lock);
1da177e4
LT
1543 }
1544
1545 cifsInode = CIFS_I(direntry->d_inode);
6de2ce42
PS
1546 /* force revalidate to go get info when needed */
1547 cifsInode->time = 0;
42c24544
SF
1548
1549 cifsInode = CIFS_I(inode);
6de2ce42
PS
1550 /*
1551 * Force revalidate to get parent dir info when needed since cached
1552 * attributes are invalid now.
1553 */
1554 cifsInode->time = 0;
42c24544 1555
1da177e4
LT
1556 direntry->d_inode->i_ctime = inode->i_ctime = inode->i_mtime =
1557 current_fs_time(inode->i_sb);
1558
7ffec372 1559rmdir_exit:
1da177e4 1560 kfree(full_path);
6d5786a3 1561 free_xid(xid);
1da177e4
LT
1562 return rc;
1563}
1564
ee2fd967 1565static int
8ceb9843
PS
1566cifs_do_rename(const unsigned int xid, struct dentry *from_dentry,
1567 const char *from_path, struct dentry *to_dentry,
1568 const char *to_path)
ee2fd967
SF
1569{
1570 struct cifs_sb_info *cifs_sb = CIFS_SB(from_dentry->d_sb);
7ffec372 1571 struct tcon_link *tlink;
8ceb9843
PS
1572 struct cifs_tcon *tcon;
1573 struct TCP_Server_Info *server;
d81b8a40
PS
1574 struct cifs_fid fid;
1575 struct cifs_open_parms oparms;
ee2fd967
SF
1576 int oplock, rc;
1577
7ffec372
JL
1578 tlink = cifs_sb_tlink(cifs_sb);
1579 if (IS_ERR(tlink))
1580 return PTR_ERR(tlink);
8ceb9843
PS
1581 tcon = tlink_tcon(tlink);
1582 server = tcon->ses->server;
1583
1584 if (!server->ops->rename)
1585 return -ENOSYS;
7ffec372 1586
ee2fd967 1587 /* try path-based rename first */
8ceb9843 1588 rc = server->ops->rename(xid, tcon, from_path, to_path, cifs_sb);
ee2fd967
SF
1589
1590 /*
8ceb9843
PS
1591 * Don't bother with rename by filehandle unless file is busy and
1592 * source. Note that cross directory moves do not work with
ee2fd967
SF
1593 * rename by filehandle to various Windows servers.
1594 */
47c78f4a 1595 if (rc == 0 || rc != -EBUSY)
7ffec372 1596 goto do_rename_exit;
ee2fd967 1597
ed0e3ace
JL
1598 /* open-file renames don't work across directories */
1599 if (to_dentry->d_parent != from_dentry->d_parent)
7ffec372 1600 goto do_rename_exit;
ed0e3ace 1601
d81b8a40
PS
1602 oparms.tcon = tcon;
1603 oparms.cifs_sb = cifs_sb;
ee2fd967 1604 /* open the file to be renamed -- we need DELETE perms */
d81b8a40
PS
1605 oparms.desired_access = DELETE;
1606 oparms.create_options = CREATE_NOT_DIR;
1607 oparms.disposition = FILE_OPEN;
1608 oparms.path = from_path;
1609 oparms.fid = &fid;
1610 oparms.reconnect = false;
1611
1612 rc = CIFS_open(xid, &oparms, &oplock, NULL);
ee2fd967 1613 if (rc == 0) {
d81b8a40 1614 rc = CIFSSMBRenameOpenFile(xid, tcon, fid.netfid,
ee2fd967
SF
1615 (const char *) to_dentry->d_name.name,
1616 cifs_sb->local_nls, cifs_sb->mnt_cifs_flags &
1617 CIFS_MOUNT_MAP_SPECIAL_CHR);
d81b8a40 1618 CIFSSMBClose(xid, tcon, fid.netfid);
ee2fd967 1619 }
7ffec372
JL
1620do_rename_exit:
1621 cifs_put_tlink(tlink);
ee2fd967
SF
1622 return rc;
1623}
1624
8ceb9843
PS
1625int
1626cifs_rename(struct inode *source_dir, struct dentry *source_dentry,
1627 struct inode *target_dir, struct dentry *target_dentry)
1da177e4 1628{
8ceb9843
PS
1629 char *from_name = NULL;
1630 char *to_name = NULL;
639e7a91 1631 struct cifs_sb_info *cifs_sb;
7ffec372 1632 struct tcon_link *tlink;
96daf2b0 1633 struct cifs_tcon *tcon;
ee2fd967
SF
1634 FILE_UNIX_BASIC_INFO *info_buf_source = NULL;
1635 FILE_UNIX_BASIC_INFO *info_buf_target;
6d5786a3
PS
1636 unsigned int xid;
1637 int rc, tmprc;
1da177e4 1638
639e7a91 1639 cifs_sb = CIFS_SB(source_dir->i_sb);
7ffec372
JL
1640 tlink = cifs_sb_tlink(cifs_sb);
1641 if (IS_ERR(tlink))
1642 return PTR_ERR(tlink);
1643 tcon = tlink_tcon(tlink);
1da177e4 1644
6d5786a3 1645 xid = get_xid();
ee2fd967 1646
ee2fd967
SF
1647 /*
1648 * we already have the rename sem so we do not need to
1649 * grab it again here to protect the path integrity
1650 */
8ceb9843
PS
1651 from_name = build_path_from_dentry(source_dentry);
1652 if (from_name == NULL) {
ee2fd967
SF
1653 rc = -ENOMEM;
1654 goto cifs_rename_exit;
1655 }
1656
8ceb9843
PS
1657 to_name = build_path_from_dentry(target_dentry);
1658 if (to_name == NULL) {
1da177e4
LT
1659 rc = -ENOMEM;
1660 goto cifs_rename_exit;
1661 }
1662
8ceb9843
PS
1663 rc = cifs_do_rename(xid, source_dentry, from_name, target_dentry,
1664 to_name);
ee2fd967 1665
14121bdc
JL
1666 if (rc == -EEXIST && tcon->unix_ext) {
1667 /*
8ceb9843
PS
1668 * Are src and dst hardlinks of same inode? We can only tell
1669 * with unix extensions enabled.
14121bdc
JL
1670 */
1671 info_buf_source =
1672 kmalloc(2 * sizeof(FILE_UNIX_BASIC_INFO),
1673 GFP_KERNEL);
1674 if (info_buf_source == NULL) {
1675 rc = -ENOMEM;
1676 goto cifs_rename_exit;
1677 }
1678
1679 info_buf_target = info_buf_source + 1;
8ceb9843
PS
1680 tmprc = CIFSSMBUnixQPathInfo(xid, tcon, from_name,
1681 info_buf_source,
1682 cifs_sb->local_nls,
1683 cifs_sb->mnt_cifs_flags &
1684 CIFS_MOUNT_MAP_SPECIAL_CHR);
8d281efb 1685 if (tmprc != 0)
14121bdc 1686 goto unlink_target;
ee2fd967 1687
8ceb9843
PS
1688 tmprc = CIFSSMBUnixQPathInfo(xid, tcon, to_name,
1689 info_buf_target,
1690 cifs_sb->local_nls,
1691 cifs_sb->mnt_cifs_flags &
1692 CIFS_MOUNT_MAP_SPECIAL_CHR);
14121bdc 1693
8d281efb 1694 if (tmprc == 0 && (info_buf_source->UniqueId ==
ae6884a9 1695 info_buf_target->UniqueId)) {
14121bdc 1696 /* same file, POSIX says that this is a noop */
ae6884a9 1697 rc = 0;
14121bdc 1698 goto cifs_rename_exit;
ae6884a9 1699 }
8ceb9843
PS
1700 }
1701 /*
1702 * else ... BB we could add the same check for Windows by
1703 * checking the UniqueId via FILE_INTERNAL_INFO
1704 */
14121bdc 1705
ee2fd967 1706unlink_target:
fc6f3943
JL
1707 /* Try unlinking the target dentry if it's not negative */
1708 if (target_dentry->d_inode && (rc == -EACCES || rc == -EEXIST)) {
8d281efb 1709 tmprc = cifs_unlink(target_dir, target_dentry);
14121bdc
JL
1710 if (tmprc)
1711 goto cifs_rename_exit;
8ceb9843
PS
1712 rc = cifs_do_rename(xid, source_dentry, from_name,
1713 target_dentry, to_name);
1da177e4
LT
1714 }
1715
1716cifs_rename_exit:
ee2fd967 1717 kfree(info_buf_source);
8ceb9843
PS
1718 kfree(from_name);
1719 kfree(to_name);
6d5786a3 1720 free_xid(xid);
7ffec372 1721 cifs_put_tlink(tlink);
1da177e4
LT
1722 return rc;
1723}
1724
df2cf170
JL
1725static bool
1726cifs_inode_needs_reval(struct inode *inode)
1da177e4 1727{
df2cf170 1728 struct cifsInodeInfo *cifs_i = CIFS_I(inode);
6d20e840 1729 struct cifs_sb_info *cifs_sb = CIFS_SB(inode->i_sb);
1da177e4 1730
18cceb6a 1731 if (CIFS_CACHE_READ(cifs_i))
df2cf170 1732 return false;
1da177e4 1733
df2cf170
JL
1734 if (!lookupCacheEnabled)
1735 return true;
1da177e4 1736
df2cf170
JL
1737 if (cifs_i->time == 0)
1738 return true;
1da177e4 1739
a87c9ad9
JL
1740 if (!cifs_sb->actimeo)
1741 return true;
1742
6d20e840
SJ
1743 if (!time_in_range(jiffies, cifs_i->time,
1744 cifs_i->time + cifs_sb->actimeo))
df2cf170
JL
1745 return true;
1746
db19272e 1747 /* hardlinked files w/ noserverino get "special" treatment */
6d20e840 1748 if (!(cifs_sb->mnt_cifs_flags & CIFS_MOUNT_SERVER_INUM) &&
db19272e
JL
1749 S_ISREG(inode->i_mode) && inode->i_nlink != 1)
1750 return true;
1751
df2cf170
JL
1752 return false;
1753}
1754
523fb8c8
SJ
1755/*
1756 * Zap the cache. Called when invalid_mapping flag is set.
1757 */
6feb9891 1758int
df2cf170
JL
1759cifs_invalidate_mapping(struct inode *inode)
1760{
6feb9891 1761 int rc = 0;
df2cf170
JL
1762 struct cifsInodeInfo *cifs_i = CIFS_I(inode);
1763
1764 cifs_i->invalid_mapping = false;
1765
df2cf170 1766 if (inode->i_mapping && inode->i_mapping->nrpages != 0) {
257fb1f1
PS
1767 rc = invalidate_inode_pages2(inode->i_mapping);
1768 if (rc) {
f96637be
JP
1769 cifs_dbg(VFS, "%s: could not invalidate inode %p\n",
1770 __func__, inode);
257fb1f1
PS
1771 cifs_i->invalid_mapping = true;
1772 }
df2cf170 1773 }
257fb1f1 1774
9451a9a5 1775 cifs_fscache_reset_inode_cookie(inode);
6feb9891 1776 return rc;
df2cf170
JL
1777}
1778
6feb9891 1779int cifs_revalidate_file_attr(struct file *filp)
abab095d
JL
1780{
1781 int rc = 0;
496ad9aa 1782 struct inode *inode = file_inode(filp);
ba00ba64 1783 struct cifsFileInfo *cfile = (struct cifsFileInfo *) filp->private_data;
abab095d
JL
1784
1785 if (!cifs_inode_needs_reval(inode))
6feb9891 1786 return rc;
abab095d 1787
13cfb733 1788 if (tlink_tcon(cfile->tlink)->unix_ext)
abab095d
JL
1789 rc = cifs_get_file_info_unix(filp);
1790 else
1791 rc = cifs_get_file_info(filp);
1792
abab095d
JL
1793 return rc;
1794}
1795
6feb9891 1796int cifs_revalidate_dentry_attr(struct dentry *dentry)
df2cf170 1797{
6d5786a3 1798 unsigned int xid;
df2cf170 1799 int rc = 0;
df2cf170
JL
1800 struct inode *inode = dentry->d_inode;
1801 struct super_block *sb = dentry->d_sb;
6feb9891 1802 char *full_path = NULL;
df2cf170
JL
1803
1804 if (inode == NULL)
1805 return -ENOENT;
1da177e4 1806
df2cf170 1807 if (!cifs_inode_needs_reval(inode))
6feb9891
PS
1808 return rc;
1809
6d5786a3 1810 xid = get_xid();
1da177e4
LT
1811
1812 /* can not safely grab the rename sem here if rename calls revalidate
1813 since that would deadlock */
df2cf170 1814 full_path = build_path_from_dentry(dentry);
1da177e4 1815 if (full_path == NULL) {
0f3bc09e 1816 rc = -ENOMEM;
6feb9891 1817 goto out;
1da177e4
LT
1818 }
1819
f96637be
JP
1820 cifs_dbg(FYI, "Update attributes: %s inode 0x%p count %d dentry: 0x%p d_time %ld jiffies %ld\n",
1821 full_path, inode, inode->i_count.counter,
f19159dc 1822 dentry, dentry->d_time, jiffies);
1da177e4 1823
0d424ad0 1824 if (cifs_sb_master_tcon(CIFS_SB(sb))->unix_ext)
df2cf170
JL
1825 rc = cifs_get_inode_info_unix(&inode, full_path, sb, xid);
1826 else
1827 rc = cifs_get_inode_info(&inode, full_path, NULL, sb,
1828 xid, NULL);
1da177e4 1829
6feb9891 1830out:
1da177e4 1831 kfree(full_path);
6d5786a3 1832 free_xid(xid);
1da177e4
LT
1833 return rc;
1834}
1835
6feb9891
PS
1836int cifs_revalidate_file(struct file *filp)
1837{
1838 int rc;
496ad9aa 1839 struct inode *inode = file_inode(filp);
6feb9891
PS
1840
1841 rc = cifs_revalidate_file_attr(filp);
1842 if (rc)
1843 return rc;
1844
1845 if (CIFS_I(inode)->invalid_mapping)
1846 rc = cifs_invalidate_mapping(inode);
1847 return rc;
1848}
1849
1850/* revalidate a dentry's inode attributes */
1851int cifs_revalidate_dentry(struct dentry *dentry)
1852{
1853 int rc;
1854 struct inode *inode = dentry->d_inode;
1855
1856 rc = cifs_revalidate_dentry_attr(dentry);
1857 if (rc)
1858 return rc;
1859
1860 if (CIFS_I(inode)->invalid_mapping)
1861 rc = cifs_invalidate_mapping(inode);
1862 return rc;
1863}
1864
1da177e4 1865int cifs_getattr(struct vfsmount *mnt, struct dentry *dentry,
1c456013 1866 struct kstat *stat)
1da177e4 1867{
3aa1c8c2 1868 struct cifs_sb_info *cifs_sb = CIFS_SB(dentry->d_sb);
96daf2b0 1869 struct cifs_tcon *tcon = cifs_sb_master_tcon(cifs_sb);
6feb9891
PS
1870 struct inode *inode = dentry->d_inode;
1871 int rc;
3aa1c8c2 1872
6feb9891
PS
1873 /*
1874 * We need to be sure that all dirty pages are written and the server
1875 * has actual ctime, mtime and file length.
1876 */
18cceb6a 1877 if (!CIFS_CACHE_READ(CIFS_I(inode)) && inode->i_mapping &&
6feb9891
PS
1878 inode->i_mapping->nrpages != 0) {
1879 rc = filemap_fdatawait(inode->i_mapping);
156ecb2d
SF
1880 if (rc) {
1881 mapping_set_error(inode->i_mapping, rc);
1882 return rc;
1883 }
6feb9891 1884 }
1c456013 1885
6feb9891
PS
1886 rc = cifs_revalidate_dentry_attr(dentry);
1887 if (rc)
1888 return rc;
1889
1890 generic_fillattr(inode, stat);
1891 stat->blksize = CIFS_MAX_MSGSIZE;
1892 stat->ino = CIFS_I(inode)->uniqueid;
1893
1894 /*
d3d1fce1
JL
1895 * If on a multiuser mount without unix extensions or cifsacl being
1896 * enabled, and the admin hasn't overridden them, set the ownership
1897 * to the fsuid/fsgid of the current process.
6feb9891
PS
1898 */
1899 if ((cifs_sb->mnt_cifs_flags & CIFS_MOUNT_MULTIUSER) &&
d3d1fce1 1900 !(cifs_sb->mnt_cifs_flags & CIFS_MOUNT_CIFS_ACL) &&
6feb9891
PS
1901 !tcon->unix_ext) {
1902 if (!(cifs_sb->mnt_cifs_flags & CIFS_MOUNT_OVERR_UID))
1903 stat->uid = current_fsuid();
1904 if (!(cifs_sb->mnt_cifs_flags & CIFS_MOUNT_OVERR_GID))
1905 stat->gid = current_fsgid();
5fe14c85 1906 }
6feb9891 1907 return rc;
1da177e4
LT
1908}
1909
1910static int cifs_truncate_page(struct address_space *mapping, loff_t from)
1911{
1912 pgoff_t index = from >> PAGE_CACHE_SHIFT;
1913 unsigned offset = from & (PAGE_CACHE_SIZE - 1);
1914 struct page *page;
1da177e4
LT
1915 int rc = 0;
1916
1917 page = grab_cache_page(mapping, index);
1918 if (!page)
1919 return -ENOMEM;
1920
eebd2aa3 1921 zero_user_segment(page, offset, PAGE_CACHE_SIZE);
1da177e4
LT
1922 unlock_page(page);
1923 page_cache_release(page);
1924 return rc;
1925}
1926
1b947463 1927static void cifs_setsize(struct inode *inode, loff_t offset)
3677db10 1928{
ba6a46a0 1929 spin_lock(&inode->i_lock);
3677db10 1930 i_size_write(inode, offset);
ba6a46a0 1931 spin_unlock(&inode->i_lock);
1b947463 1932
7caef267 1933 truncate_pagecache(inode, offset);
3677db10
SF
1934}
1935
8efdbde6
JL
1936static int
1937cifs_set_file_size(struct inode *inode, struct iattr *attrs,
6d5786a3 1938 unsigned int xid, char *full_path)
8efdbde6
JL
1939{
1940 int rc;
1941 struct cifsFileInfo *open_file;
1942 struct cifsInodeInfo *cifsInode = CIFS_I(inode);
1943 struct cifs_sb_info *cifs_sb = CIFS_SB(inode->i_sb);
7ffec372 1944 struct tcon_link *tlink = NULL;
d1433418
PS
1945 struct cifs_tcon *tcon = NULL;
1946 struct TCP_Server_Info *server;
fa2989f4 1947 struct cifs_io_parms io_parms;
8efdbde6
JL
1948
1949 /*
1950 * To avoid spurious oplock breaks from server, in the case of
1951 * inodes that we already have open, avoid doing path based
1952 * setting of file size if we can do it by handle.
1953 * This keeps our caching token (oplock) and avoids timeouts
1954 * when the local oplock break takes longer to flush
1955 * writebehind data than the SMB timeout for the SetPathInfo
1956 * request would allow
1957 */
6508d904 1958 open_file = find_writable_file(cifsInode, true);
8efdbde6 1959 if (open_file) {
d1433418
PS
1960 tcon = tlink_tcon(open_file->tlink);
1961 server = tcon->ses->server;
1962 if (server->ops->set_file_size)
1963 rc = server->ops->set_file_size(xid, tcon, open_file,
1964 attrs->ia_size, false);
1965 else
1966 rc = -ENOSYS;
6ab409b5 1967 cifsFileInfo_put(open_file);
f96637be 1968 cifs_dbg(FYI, "SetFSize for attrs rc = %d\n", rc);
8efdbde6
JL
1969 if ((rc == -EINVAL) || (rc == -EOPNOTSUPP)) {
1970 unsigned int bytes_written;
fa2989f4 1971
d1433418
PS
1972 io_parms.netfid = open_file->fid.netfid;
1973 io_parms.pid = open_file->pid;
1974 io_parms.tcon = tcon;
fa2989f4
PS
1975 io_parms.offset = 0;
1976 io_parms.length = attrs->ia_size;
1977 rc = CIFSSMBWrite(xid, &io_parms, &bytes_written,
1978 NULL, NULL, 1);
f96637be 1979 cifs_dbg(FYI, "Wrt seteof rc %d\n", rc);
8efdbde6
JL
1980 }
1981 } else
1982 rc = -EINVAL;
1983
d1433418
PS
1984 if (!rc)
1985 goto set_size_out;
1986
1987 if (tcon == NULL) {
1988 tlink = cifs_sb_tlink(cifs_sb);
1989 if (IS_ERR(tlink))
1990 return PTR_ERR(tlink);
1991 tcon = tlink_tcon(tlink);
1992 server = tcon->ses->server;
1993 }
ba00ba64 1994
d1433418
PS
1995 /*
1996 * Set file size by pathname rather than by handle either because no
1997 * valid, writeable file handle for it was found or because there was
1998 * an error setting it by handle.
1999 */
2000 if (server->ops->set_path_size)
2001 rc = server->ops->set_path_size(xid, tcon, full_path,
2002 attrs->ia_size, cifs_sb, false);
2003 else
2004 rc = -ENOSYS;
f96637be 2005 cifs_dbg(FYI, "SetEOF by path (setattrs) rc = %d\n", rc);
d1433418
PS
2006 if ((rc == -EINVAL) || (rc == -EOPNOTSUPP)) {
2007 __u16 netfid;
2008 int oplock = 0;
2009
2010 rc = SMBLegacyOpen(xid, tcon, full_path, FILE_OPEN,
2011 GENERIC_WRITE, CREATE_NOT_DIR, &netfid,
2012 &oplock, NULL, cifs_sb->local_nls,
8efdbde6 2013 cifs_sb->mnt_cifs_flags &
d1433418
PS
2014 CIFS_MOUNT_MAP_SPECIAL_CHR);
2015 if (rc == 0) {
2016 unsigned int bytes_written;
2017
2018 io_parms.netfid = netfid;
2019 io_parms.pid = current->tgid;
2020 io_parms.tcon = tcon;
2021 io_parms.offset = 0;
2022 io_parms.length = attrs->ia_size;
2023 rc = CIFSSMBWrite(xid, &io_parms, &bytes_written, NULL,
2024 NULL, 1);
f96637be 2025 cifs_dbg(FYI, "wrt seteof rc %d\n", rc);
d1433418 2026 CIFSSMBClose(xid, tcon, netfid);
8efdbde6
JL
2027 }
2028 }
d1433418
PS
2029 if (tlink)
2030 cifs_put_tlink(tlink);
8efdbde6 2031
d1433418 2032set_size_out:
8efdbde6 2033 if (rc == 0) {
fbec9ab9 2034 cifsInode->server_eof = attrs->ia_size;
1b947463 2035 cifs_setsize(inode, attrs->ia_size);
8efdbde6
JL
2036 cifs_truncate_page(inode->i_mapping, inode->i_size);
2037 }
2038
2039 return rc;
2040}
2041
3fe5c1dd
JL
2042static int
2043cifs_setattr_unix(struct dentry *direntry, struct iattr *attrs)
2044{
2045 int rc;
6d5786a3 2046 unsigned int xid;
3fe5c1dd
JL
2047 char *full_path = NULL;
2048 struct inode *inode = direntry->d_inode;
2049 struct cifsInodeInfo *cifsInode = CIFS_I(inode);
2050 struct cifs_sb_info *cifs_sb = CIFS_SB(inode->i_sb);
7ffec372 2051 struct tcon_link *tlink;
96daf2b0 2052 struct cifs_tcon *pTcon;
3fe5c1dd 2053 struct cifs_unix_set_info_args *args = NULL;
3bbeeb3c 2054 struct cifsFileInfo *open_file;
3fe5c1dd 2055
f96637be 2056 cifs_dbg(FYI, "setattr_unix on file %s attrs->ia_valid=0x%x\n",
b6b38f70 2057 direntry->d_name.name, attrs->ia_valid);
3fe5c1dd 2058
6d5786a3 2059 xid = get_xid();
3fe5c1dd 2060
db78b877
CH
2061 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_NO_PERM)
2062 attrs->ia_valid |= ATTR_FORCE;
2063
2064 rc = inode_change_ok(inode, attrs);
2065 if (rc < 0)
2066 goto out;
3fe5c1dd
JL
2067
2068 full_path = build_path_from_dentry(direntry);
2069 if (full_path == NULL) {
2070 rc = -ENOMEM;
2071 goto out;
2072 }
2073
0f4d634c
JL
2074 /*
2075 * Attempt to flush data before changing attributes. We need to do
2076 * this for ATTR_SIZE and ATTR_MTIME for sure, and if we change the
2077 * ownership or mode then we may also need to do this. Here, we take
2078 * the safe way out and just do the flush on all setattr requests. If
2079 * the flush returns error, store it to report later and continue.
2080 *
2081 * BB: This should be smarter. Why bother flushing pages that
2082 * will be truncated anyway? Also, should we error out here if
2083 * the flush returns error?
2084 */
2085 rc = filemap_write_and_wait(inode->i_mapping);
eb4b756b
JL
2086 mapping_set_error(inode->i_mapping, rc);
2087 rc = 0;
3fe5c1dd
JL
2088
2089 if (attrs->ia_valid & ATTR_SIZE) {
2090 rc = cifs_set_file_size(inode, attrs, xid, full_path);
2091 if (rc != 0)
2092 goto out;
2093 }
2094
2095 /* skip mode change if it's just for clearing setuid/setgid */
2096 if (attrs->ia_valid & (ATTR_KILL_SUID|ATTR_KILL_SGID))
2097 attrs->ia_valid &= ~ATTR_MODE;
2098
2099 args = kmalloc(sizeof(*args), GFP_KERNEL);
2100 if (args == NULL) {
2101 rc = -ENOMEM;
2102 goto out;
2103 }
2104
2105 /* set up the struct */
2106 if (attrs->ia_valid & ATTR_MODE)
2107 args->mode = attrs->ia_mode;
2108 else
2109 args->mode = NO_CHANGE_64;
2110
2111 if (attrs->ia_valid & ATTR_UID)
2112 args->uid = attrs->ia_uid;
2113 else
49418b2c 2114 args->uid = INVALID_UID; /* no change */
3fe5c1dd
JL
2115
2116 if (attrs->ia_valid & ATTR_GID)
2117 args->gid = attrs->ia_gid;
2118 else
49418b2c 2119 args->gid = INVALID_GID; /* no change */
3fe5c1dd
JL
2120
2121 if (attrs->ia_valid & ATTR_ATIME)
2122 args->atime = cifs_UnixTimeToNT(attrs->ia_atime);
2123 else
2124 args->atime = NO_CHANGE_64;
2125
2126 if (attrs->ia_valid & ATTR_MTIME)
2127 args->mtime = cifs_UnixTimeToNT(attrs->ia_mtime);
2128 else
2129 args->mtime = NO_CHANGE_64;
2130
2131 if (attrs->ia_valid & ATTR_CTIME)
2132 args->ctime = cifs_UnixTimeToNT(attrs->ia_ctime);
2133 else
2134 args->ctime = NO_CHANGE_64;
2135
2136 args->device = 0;
6508d904 2137 open_file = find_writable_file(cifsInode, true);
3bbeeb3c 2138 if (open_file) {
4b4de76e 2139 u16 nfid = open_file->fid.netfid;
3bbeeb3c 2140 u32 npid = open_file->pid;
13cfb733 2141 pTcon = tlink_tcon(open_file->tlink);
3bbeeb3c 2142 rc = CIFSSMBUnixSetFileInfo(xid, pTcon, args, nfid, npid);
6ab409b5 2143 cifsFileInfo_put(open_file);
3bbeeb3c 2144 } else {
7ffec372
JL
2145 tlink = cifs_sb_tlink(cifs_sb);
2146 if (IS_ERR(tlink)) {
2147 rc = PTR_ERR(tlink);
2148 goto out;
2149 }
2150 pTcon = tlink_tcon(tlink);
3bbeeb3c 2151 rc = CIFSSMBUnixSetPathInfo(xid, pTcon, full_path, args,
01ea95e3
JL
2152 cifs_sb->local_nls,
2153 cifs_sb->mnt_cifs_flags &
2154 CIFS_MOUNT_MAP_SPECIAL_CHR);
7ffec372 2155 cifs_put_tlink(tlink);
3bbeeb3c 2156 }
3fe5c1dd 2157
1025774c
CH
2158 if (rc)
2159 goto out;
ccd4bb1b 2160
1025774c 2161 if ((attrs->ia_valid & ATTR_SIZE) &&
1b947463
CH
2162 attrs->ia_size != i_size_read(inode))
2163 truncate_setsize(inode, attrs->ia_size);
1025774c
CH
2164
2165 setattr_copy(inode, attrs);
2166 mark_inode_dirty(inode);
2167
2168 /* force revalidate when any of these times are set since some
2169 of the fs types (eg ext3, fat) do not have fine enough
2170 time granularity to match protocol, and we do not have a
2171 a way (yet) to query the server fs's time granularity (and
2172 whether it rounds times down).
2173 */
2174 if (attrs->ia_valid & (ATTR_MTIME | ATTR_CTIME))
2175 cifsInode->time = 0;
3fe5c1dd
JL
2176out:
2177 kfree(args);
2178 kfree(full_path);
6d5786a3 2179 free_xid(xid);
3fe5c1dd
JL
2180 return rc;
2181}
2182
0510eeb7
JL
2183static int
2184cifs_setattr_nounix(struct dentry *direntry, struct iattr *attrs)
1da177e4 2185{
6d5786a3 2186 unsigned int xid;
8abf2775
EB
2187 kuid_t uid = INVALID_UID;
2188 kgid_t gid = INVALID_GID;
3fe5c1dd
JL
2189 struct inode *inode = direntry->d_inode;
2190 struct cifs_sb_info *cifs_sb = CIFS_SB(inode->i_sb);
3fe5c1dd 2191 struct cifsInodeInfo *cifsInode = CIFS_I(inode);
1da177e4
LT
2192 char *full_path = NULL;
2193 int rc = -EACCES;
feb3e20c 2194 __u32 dosattr = 0;
4e1e7fb9 2195 __u64 mode = NO_CHANGE_64;
3fe5c1dd 2196
6d5786a3 2197 xid = get_xid();
1da177e4 2198
f96637be 2199 cifs_dbg(FYI, "setattr on file %s attrs->iavalid 0x%x\n",
b6b38f70 2200 direntry->d_name.name, attrs->ia_valid);
6473a559 2201
db78b877
CH
2202 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_NO_PERM)
2203 attrs->ia_valid |= ATTR_FORCE;
2204
2205 rc = inode_change_ok(inode, attrs);
2206 if (rc < 0) {
6d5786a3 2207 free_xid(xid);
db78b877 2208 return rc;
6473a559 2209 }
50c2f753 2210
7f57356b 2211 full_path = build_path_from_dentry(direntry);
1da177e4 2212 if (full_path == NULL) {
0f3bc09e 2213 rc = -ENOMEM;
6d5786a3 2214 free_xid(xid);
0f3bc09e 2215 return rc;
1da177e4 2216 }
1da177e4 2217
0f4d634c
JL
2218 /*
2219 * Attempt to flush data before changing attributes. We need to do
2220 * this for ATTR_SIZE and ATTR_MTIME for sure, and if we change the
2221 * ownership or mode then we may also need to do this. Here, we take
2222 * the safe way out and just do the flush on all setattr requests. If
2223 * the flush returns error, store it to report later and continue.
2224 *
2225 * BB: This should be smarter. Why bother flushing pages that
2226 * will be truncated anyway? Also, should we error out here if
2227 * the flush returns error?
2228 */
2229 rc = filemap_write_and_wait(inode->i_mapping);
eb4b756b
JL
2230 mapping_set_error(inode->i_mapping, rc);
2231 rc = 0;
cea21805 2232
50531444 2233 if (attrs->ia_valid & ATTR_SIZE) {
8efdbde6
JL
2234 rc = cifs_set_file_size(inode, attrs, xid, full_path);
2235 if (rc != 0)
e30dcf3a 2236 goto cifs_setattr_exit;
1da177e4 2237 }
4ca691a8 2238
a5ff3769
SP
2239 if (attrs->ia_valid & ATTR_UID)
2240 uid = attrs->ia_uid;
2241
2242 if (attrs->ia_valid & ATTR_GID)
2243 gid = attrs->ia_gid;
2244
2245#ifdef CONFIG_CIFS_ACL
2246 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_CIFS_ACL) {
8abf2775 2247 if (uid_valid(uid) || gid_valid(gid)) {
a5ff3769
SP
2248 rc = id_mode_to_cifs_acl(inode, full_path, NO_CHANGE_64,
2249 uid, gid);
2250 if (rc) {
f96637be
JP
2251 cifs_dbg(FYI, "%s: Setting id failed with error: %d\n",
2252 __func__, rc);
a5ff3769
SP
2253 goto cifs_setattr_exit;
2254 }
2255 }
2256 } else
2257#endif /* CONFIG_CIFS_ACL */
3fe5c1dd 2258 if (!(cifs_sb->mnt_cifs_flags & CIFS_MOUNT_SET_UID))
4ca691a8 2259 attrs->ia_valid &= ~(ATTR_UID | ATTR_GID);
1da177e4 2260
d32c4f26
JL
2261 /* skip mode change if it's just for clearing setuid/setgid */
2262 if (attrs->ia_valid & (ATTR_KILL_SUID|ATTR_KILL_SGID))
2263 attrs->ia_valid &= ~ATTR_MODE;
2264
1da177e4 2265 if (attrs->ia_valid & ATTR_MODE) {
1da177e4 2266 mode = attrs->ia_mode;
cdbce9c8 2267 rc = 0;
79df1bae 2268#ifdef CONFIG_CIFS_ACL
78415d2d 2269 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_CIFS_ACL) {
a5ff3769 2270 rc = id_mode_to_cifs_acl(inode, full_path, mode,
8abf2775 2271 INVALID_UID, INVALID_GID);
78415d2d 2272 if (rc) {
f96637be
JP
2273 cifs_dbg(FYI, "%s: Setting ACL failed with error: %d\n",
2274 __func__, rc);
78415d2d
SP
2275 goto cifs_setattr_exit;
2276 }
2277 } else
79df1bae 2278#endif /* CONFIG_CIFS_ACL */
5132861a
JL
2279 if (((mode & S_IWUGO) == 0) &&
2280 (cifsInode->cifsAttrs & ATTR_READONLY) == 0) {
feb3e20c
JL
2281
2282 dosattr = cifsInode->cifsAttrs | ATTR_READONLY;
2283
5132861a
JL
2284 /* fix up mode if we're not using dynperm */
2285 if ((cifs_sb->mnt_cifs_flags & CIFS_MOUNT_DYNPERM) == 0)
2286 attrs->ia_mode = inode->i_mode & ~S_IWUGO;
2287 } else if ((mode & S_IWUGO) &&
2288 (cifsInode->cifsAttrs & ATTR_READONLY)) {
feb3e20c
JL
2289
2290 dosattr = cifsInode->cifsAttrs & ~ATTR_READONLY;
2291 /* Attributes of 0 are ignored */
2292 if (dosattr == 0)
2293 dosattr |= ATTR_NORMAL;
5132861a
JL
2294
2295 /* reset local inode permissions to normal */
2296 if (!(cifs_sb->mnt_cifs_flags & CIFS_MOUNT_DYNPERM)) {
2297 attrs->ia_mode &= ~(S_IALLUGO);
2298 if (S_ISDIR(inode->i_mode))
2299 attrs->ia_mode |=
2300 cifs_sb->mnt_dir_mode;
2301 else
2302 attrs->ia_mode |=
2303 cifs_sb->mnt_file_mode;
2304 }
2305 } else if (!(cifs_sb->mnt_cifs_flags & CIFS_MOUNT_DYNPERM)) {
2306 /* ignore mode change - ATTR_READONLY hasn't changed */
2307 attrs->ia_valid &= ~ATTR_MODE;
1da177e4 2308 }
1da177e4
LT
2309 }
2310
feb3e20c
JL
2311 if (attrs->ia_valid & (ATTR_MTIME|ATTR_ATIME|ATTR_CTIME) ||
2312 ((attrs->ia_valid & ATTR_MODE) && dosattr)) {
2313 rc = cifs_set_file_info(inode, attrs, xid, full_path, dosattr);
2314 /* BB: check for rc = -EOPNOTSUPP and switch to legacy mode */
1da177e4 2315
e30dcf3a
SF
2316 /* Even if error on time set, no sense failing the call if
2317 the server would set the time to a reasonable value anyway,
2318 and this check ensures that we are not being called from
2319 sys_utimes in which case we ought to fail the call back to
2320 the user when the server rejects the call */
fb8c4b14 2321 if ((rc) && (attrs->ia_valid &
feb3e20c 2322 (ATTR_MODE | ATTR_GID | ATTR_UID | ATTR_SIZE)))
e30dcf3a 2323 rc = 0;
1da177e4
LT
2324 }
2325
2326 /* do not need local check to inode_check_ok since the server does
2327 that */
1025774c
CH
2328 if (rc)
2329 goto cifs_setattr_exit;
2330
2331 if ((attrs->ia_valid & ATTR_SIZE) &&
1b947463
CH
2332 attrs->ia_size != i_size_read(inode))
2333 truncate_setsize(inode, attrs->ia_size);
1025774c
CH
2334
2335 setattr_copy(inode, attrs);
2336 mark_inode_dirty(inode);
1025774c 2337
e30dcf3a 2338cifs_setattr_exit:
1da177e4 2339 kfree(full_path);
6d5786a3 2340 free_xid(xid);
1da177e4
LT
2341 return rc;
2342}
2343
0510eeb7
JL
2344int
2345cifs_setattr(struct dentry *direntry, struct iattr *attrs)
2346{
2347 struct inode *inode = direntry->d_inode;
2348 struct cifs_sb_info *cifs_sb = CIFS_SB(inode->i_sb);
96daf2b0 2349 struct cifs_tcon *pTcon = cifs_sb_master_tcon(cifs_sb);
0510eeb7
JL
2350
2351 if (pTcon->unix_ext)
2352 return cifs_setattr_unix(direntry, attrs);
2353
2354 return cifs_setattr_nounix(direntry, attrs);
2355
2356 /* BB: add cifs_setattr_legacy for really old servers */
2357}
2358
99ee4dbd 2359#if 0
1da177e4
LT
2360void cifs_delete_inode(struct inode *inode)
2361{
f96637be 2362 cifs_dbg(FYI, "In cifs_delete_inode, inode = 0x%p\n", inode);
1da177e4
LT
2363 /* may have to add back in if and when safe distributed caching of
2364 directories added e.g. via FindNotify */
2365}
99ee4dbd 2366#endif