]> git.proxmox.com Git - mirror_ubuntu-artful-kernel.git/blame - fs/cifs/inode.c
CIFS: Add SMB2 support for is_path_accessible
[mirror_ubuntu-artful-kernel.git] / fs / cifs / inode.c
CommitLineData
1da177e4
LT
1/*
2 * fs/cifs/inode.c
3 *
f19159dc 4 * Copyright (C) International Business Machines Corp., 2002,2010
1da177e4
LT
5 * Author(s): Steve French (sfrench@us.ibm.com)
6 *
7 * This library is free software; you can redistribute it and/or modify
8 * it under the terms of the GNU Lesser General Public License as published
9 * by the Free Software Foundation; either version 2.1 of the License, or
10 * (at your option) any later version.
11 *
12 * This library is distributed in the hope that it will be useful,
13 * but WITHOUT ANY WARRANTY; without even the implied warranty of
14 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See
15 * the GNU Lesser General Public License for more details.
16 *
17 * You should have received a copy of the GNU Lesser General Public License
18 * along with this library; if not, write to the Free Software
19 * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
20 */
21#include <linux/fs.h>
1da177e4 22#include <linux/stat.h>
5a0e3ad6 23#include <linux/slab.h>
1da177e4
LT
24#include <linux/pagemap.h>
25#include <asm/div64.h>
26#include "cifsfs.h"
27#include "cifspdu.h"
28#include "cifsglob.h"
29#include "cifsproto.h"
30#include "cifs_debug.h"
31#include "cifs_fs_sb.h"
9451a9a5 32#include "fscache.h"
1da177e4 33
70eff55d 34
01c64fea 35static void cifs_set_ops(struct inode *inode)
70eff55d
CH
36{
37 struct cifs_sb_info *cifs_sb = CIFS_SB(inode->i_sb);
38
39 switch (inode->i_mode & S_IFMT) {
40 case S_IFREG:
41 inode->i_op = &cifs_file_inode_ops;
42 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_DIRECT_IO) {
43 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_NO_BRL)
44 inode->i_fop = &cifs_file_direct_nobrl_ops;
45 else
46 inode->i_fop = &cifs_file_direct_ops;
8be7e6ba
PS
47 } else if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_STRICT_IO) {
48 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_NO_BRL)
49 inode->i_fop = &cifs_file_strict_nobrl_ops;
50 else
51 inode->i_fop = &cifs_file_strict_ops;
70eff55d
CH
52 } else if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_NO_BRL)
53 inode->i_fop = &cifs_file_nobrl_ops;
54 else { /* not direct, send byte range locks */
55 inode->i_fop = &cifs_file_ops;
56 }
57
70eff55d 58 /* check if server can support readpages */
0d424ad0 59 if (cifs_sb_master_tcon(cifs_sb)->ses->server->maxBuf <
70eff55d
CH
60 PAGE_CACHE_SIZE + MAX_CIFS_HDR_SIZE)
61 inode->i_data.a_ops = &cifs_addr_ops_smallbuf;
62 else
63 inode->i_data.a_ops = &cifs_addr_ops;
64 break;
65 case S_IFDIR:
bc5b6e24 66#ifdef CONFIG_CIFS_DFS_UPCALL
01c64fea 67 if (IS_AUTOMOUNT(inode)) {
7962670e
IM
68 inode->i_op = &cifs_dfs_referral_inode_operations;
69 } else {
bc5b6e24
SF
70#else /* NO DFS support, treat as a directory */
71 {
72#endif
7962670e
IM
73 inode->i_op = &cifs_dir_inode_ops;
74 inode->i_fop = &cifs_dir_ops;
75 }
70eff55d
CH
76 break;
77 case S_IFLNK:
78 inode->i_op = &cifs_symlink_inode_ops;
79 break;
80 default:
81 init_special_inode(inode, inode->i_mode, inode->i_rdev);
82 break;
83 }
84}
85
df2cf170
JL
86/* check inode attributes against fattr. If they don't match, tag the
87 * inode for cache invalidation
88 */
89static void
90cifs_revalidate_cache(struct inode *inode, struct cifs_fattr *fattr)
91{
92 struct cifsInodeInfo *cifs_i = CIFS_I(inode);
93
f19159dc 94 cFYI(1, "%s: revalidating inode %llu", __func__, cifs_i->uniqueid);
df2cf170
JL
95
96 if (inode->i_state & I_NEW) {
f19159dc 97 cFYI(1, "%s: inode %llu is new", __func__, cifs_i->uniqueid);
df2cf170
JL
98 return;
99 }
100
101 /* don't bother with revalidation if we have an oplock */
102 if (cifs_i->clientCanCacheRead) {
f19159dc
SF
103 cFYI(1, "%s: inode %llu is oplocked", __func__,
104 cifs_i->uniqueid);
df2cf170
JL
105 return;
106 }
107
108 /* revalidate if mtime or size have changed */
109 if (timespec_equal(&inode->i_mtime, &fattr->cf_mtime) &&
110 cifs_i->server_eof == fattr->cf_eof) {
f19159dc
SF
111 cFYI(1, "%s: inode %llu is unchanged", __func__,
112 cifs_i->uniqueid);
df2cf170
JL
113 return;
114 }
115
f19159dc
SF
116 cFYI(1, "%s: invalidating inode %llu mapping", __func__,
117 cifs_i->uniqueid);
df2cf170
JL
118 cifs_i->invalid_mapping = true;
119}
120
cc0bad75
JL
121/* populate an inode with info from a cifs_fattr struct */
122void
123cifs_fattr_to_inode(struct inode *inode, struct cifs_fattr *fattr)
75f12983 124{
cc0bad75 125 struct cifsInodeInfo *cifs_i = CIFS_I(inode);
0b8f18e3
JL
126 struct cifs_sb_info *cifs_sb = CIFS_SB(inode->i_sb);
127 unsigned long oldtime = cifs_i->time;
cc0bad75 128
df2cf170
JL
129 cifs_revalidate_cache(inode, fattr);
130
cc0bad75
JL
131 inode->i_atime = fattr->cf_atime;
132 inode->i_mtime = fattr->cf_mtime;
133 inode->i_ctime = fattr->cf_ctime;
cc0bad75 134 inode->i_rdev = fattr->cf_rdev;
bfe86848 135 set_nlink(inode, fattr->cf_nlink);
cc0bad75
JL
136 inode->i_uid = fattr->cf_uid;
137 inode->i_gid = fattr->cf_gid;
138
0b8f18e3
JL
139 /* if dynperm is set, don't clobber existing mode */
140 if (inode->i_state & I_NEW ||
141 !(cifs_sb->mnt_cifs_flags & CIFS_MOUNT_DYNPERM))
142 inode->i_mode = fattr->cf_mode;
143
cc0bad75 144 cifs_i->cifsAttrs = fattr->cf_cifsattrs;
75f12983 145
0b8f18e3
JL
146 if (fattr->cf_flags & CIFS_FATTR_NEED_REVAL)
147 cifs_i->time = 0;
148 else
149 cifs_i->time = jiffies;
150
b6b38f70
JP
151 cFYI(1, "inode 0x%p old_time=%ld new_time=%ld", inode,
152 oldtime, cifs_i->time);
0b8f18e3
JL
153
154 cifs_i->delete_pending = fattr->cf_flags & CIFS_FATTR_DELETE_PENDING;
cc0bad75 155
835a36ca 156 cifs_i->server_eof = fattr->cf_eof;
cc0bad75
JL
157 /*
158 * Can't safely change the file size here if the client is writing to
159 * it due to potential races.
160 */
161 spin_lock(&inode->i_lock);
162 if (is_size_safe_to_change(cifs_i, fattr->cf_eof)) {
163 i_size_write(inode, fattr->cf_eof);
164
165 /*
166 * i_blocks is not related to (i_size / i_blksize),
167 * but instead 512 byte (2**9) size is required for
168 * calculating num blocks.
169 */
170 inode->i_blocks = (512 - 1 + fattr->cf_bytes) >> 9;
171 }
172 spin_unlock(&inode->i_lock);
173
01c64fea
DH
174 if (fattr->cf_flags & CIFS_FATTR_DFS_REFERRAL)
175 inode->i_flags |= S_AUTOMOUNT;
176 cifs_set_ops(inode);
cc0bad75
JL
177}
178
4065c802
JL
179void
180cifs_fill_uniqueid(struct super_block *sb, struct cifs_fattr *fattr)
181{
182 struct cifs_sb_info *cifs_sb = CIFS_SB(sb);
183
184 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_SERVER_INUM)
185 return;
186
187 fattr->cf_uniqueid = iunique(sb, ROOT_I);
188}
189
cc0bad75
JL
190/* Fill a cifs_fattr struct with info from FILE_UNIX_BASIC_INFO. */
191void
192cifs_unix_basic_to_fattr(struct cifs_fattr *fattr, FILE_UNIX_BASIC_INFO *info,
193 struct cifs_sb_info *cifs_sb)
194{
195 memset(fattr, 0, sizeof(*fattr));
196 fattr->cf_uniqueid = le64_to_cpu(info->UniqueId);
197 fattr->cf_bytes = le64_to_cpu(info->NumOfBytes);
198 fattr->cf_eof = le64_to_cpu(info->EndOfFile);
199
200 fattr->cf_atime = cifs_NTtimeToUnix(info->LastAccessTime);
201 fattr->cf_mtime = cifs_NTtimeToUnix(info->LastModificationTime);
202 fattr->cf_ctime = cifs_NTtimeToUnix(info->LastStatusChange);
203 fattr->cf_mode = le64_to_cpu(info->Permissions);
75f12983
CH
204
205 /*
206 * Since we set the inode type below we need to mask off
207 * to avoid strange results if bits set above.
208 */
cc0bad75 209 fattr->cf_mode &= ~S_IFMT;
75f12983
CH
210 switch (le32_to_cpu(info->Type)) {
211 case UNIX_FILE:
cc0bad75
JL
212 fattr->cf_mode |= S_IFREG;
213 fattr->cf_dtype = DT_REG;
75f12983
CH
214 break;
215 case UNIX_SYMLINK:
cc0bad75
JL
216 fattr->cf_mode |= S_IFLNK;
217 fattr->cf_dtype = DT_LNK;
75f12983
CH
218 break;
219 case UNIX_DIR:
cc0bad75
JL
220 fattr->cf_mode |= S_IFDIR;
221 fattr->cf_dtype = DT_DIR;
75f12983
CH
222 break;
223 case UNIX_CHARDEV:
cc0bad75
JL
224 fattr->cf_mode |= S_IFCHR;
225 fattr->cf_dtype = DT_CHR;
226 fattr->cf_rdev = MKDEV(le64_to_cpu(info->DevMajor),
227 le64_to_cpu(info->DevMinor) & MINORMASK);
75f12983
CH
228 break;
229 case UNIX_BLOCKDEV:
cc0bad75
JL
230 fattr->cf_mode |= S_IFBLK;
231 fattr->cf_dtype = DT_BLK;
232 fattr->cf_rdev = MKDEV(le64_to_cpu(info->DevMajor),
233 le64_to_cpu(info->DevMinor) & MINORMASK);
75f12983
CH
234 break;
235 case UNIX_FIFO:
cc0bad75
JL
236 fattr->cf_mode |= S_IFIFO;
237 fattr->cf_dtype = DT_FIFO;
75f12983
CH
238 break;
239 case UNIX_SOCKET:
cc0bad75
JL
240 fattr->cf_mode |= S_IFSOCK;
241 fattr->cf_dtype = DT_SOCK;
75f12983
CH
242 break;
243 default:
244 /* safest to call it a file if we do not know */
cc0bad75
JL
245 fattr->cf_mode |= S_IFREG;
246 fattr->cf_dtype = DT_REG;
b6b38f70 247 cFYI(1, "unknown type %d", le32_to_cpu(info->Type));
75f12983
CH
248 break;
249 }
250
cc0bad75
JL
251 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_OVERR_UID)
252 fattr->cf_uid = cifs_sb->mnt_uid;
75f12983 253 else
cc0bad75 254 fattr->cf_uid = le64_to_cpu(info->Uid);
75f12983 255
cc0bad75
JL
256 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_OVERR_GID)
257 fattr->cf_gid = cifs_sb->mnt_gid;
75f12983 258 else
cc0bad75 259 fattr->cf_gid = le64_to_cpu(info->Gid);
75f12983 260
cc0bad75 261 fattr->cf_nlink = le64_to_cpu(info->Nlinks);
75f12983
CH
262}
263
b9a3260f 264/*
cc0bad75
JL
265 * Fill a cifs_fattr struct with fake inode info.
266 *
267 * Needed to setup cifs_fattr data for the directory which is the
268 * junction to the new submount (ie to setup the fake directory
269 * which represents a DFS referral).
b9a3260f 270 */
f1230c97 271static void
cc0bad75 272cifs_create_dfs_fattr(struct cifs_fattr *fattr, struct super_block *sb)
0e4bbde9 273{
cc0bad75 274 struct cifs_sb_info *cifs_sb = CIFS_SB(sb);
0e4bbde9 275
b6b38f70 276 cFYI(1, "creating fake fattr for DFS referral");
cc0bad75
JL
277
278 memset(fattr, 0, sizeof(*fattr));
279 fattr->cf_mode = S_IFDIR | S_IXUGO | S_IRWXU;
280 fattr->cf_uid = cifs_sb->mnt_uid;
281 fattr->cf_gid = cifs_sb->mnt_gid;
282 fattr->cf_atime = CURRENT_TIME;
283 fattr->cf_ctime = CURRENT_TIME;
284 fattr->cf_mtime = CURRENT_TIME;
285 fattr->cf_nlink = 2;
286 fattr->cf_flags |= CIFS_FATTR_DFS_REFERRAL;
0e4bbde9
SF
287}
288
abab095d
JL
289int cifs_get_file_info_unix(struct file *filp)
290{
291 int rc;
6d5786a3 292 unsigned int xid;
abab095d
JL
293 FILE_UNIX_BASIC_INFO find_data;
294 struct cifs_fattr fattr;
295 struct inode *inode = filp->f_path.dentry->d_inode;
296 struct cifs_sb_info *cifs_sb = CIFS_SB(inode->i_sb);
c21dfb69 297 struct cifsFileInfo *cfile = filp->private_data;
96daf2b0 298 struct cifs_tcon *tcon = tlink_tcon(cfile->tlink);
abab095d 299
6d5786a3 300 xid = get_xid();
abab095d
JL
301 rc = CIFSSMBUnixQFileInfo(xid, tcon, cfile->netfid, &find_data);
302 if (!rc) {
303 cifs_unix_basic_to_fattr(&fattr, &find_data, cifs_sb);
304 } else if (rc == -EREMOTE) {
305 cifs_create_dfs_fattr(&fattr, inode->i_sb);
306 rc = 0;
307 }
308
309 cifs_fattr_to_inode(inode, &fattr);
6d5786a3 310 free_xid(xid);
abab095d
JL
311 return rc;
312}
313
1da177e4 314int cifs_get_inode_info_unix(struct inode **pinode,
cc0bad75 315 const unsigned char *full_path,
6d5786a3 316 struct super_block *sb, unsigned int xid)
1da177e4 317{
cc0bad75 318 int rc;
0e4bbde9 319 FILE_UNIX_BASIC_INFO find_data;
cc0bad75 320 struct cifs_fattr fattr;
96daf2b0 321 struct cifs_tcon *tcon;
7ffec372 322 struct tcon_link *tlink;
1da177e4 323 struct cifs_sb_info *cifs_sb = CIFS_SB(sb);
1da177e4 324
b6b38f70 325 cFYI(1, "Getting info on %s", full_path);
7962670e 326
7ffec372
JL
327 tlink = cifs_sb_tlink(cifs_sb);
328 if (IS_ERR(tlink))
329 return PTR_ERR(tlink);
330 tcon = tlink_tcon(tlink);
331
1da177e4 332 /* could have done a find first instead but this returns more info */
cc0bad75 333 rc = CIFSSMBUnixQPathInfo(xid, tcon, full_path, &find_data,
737b758c
SF
334 cifs_sb->local_nls, cifs_sb->mnt_cifs_flags &
335 CIFS_MOUNT_MAP_SPECIAL_CHR);
7ffec372 336 cifs_put_tlink(tlink);
e911d0cc 337
cc0bad75
JL
338 if (!rc) {
339 cifs_unix_basic_to_fattr(&fattr, &find_data, cifs_sb);
340 } else if (rc == -EREMOTE) {
341 cifs_create_dfs_fattr(&fattr, sb);
342 rc = 0;
343 } else {
344 return rc;
345 }
1da177e4 346
1b12b9c1
SM
347 /* check for Minshall+French symlinks */
348 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_MF_SYMLINKS) {
349 int tmprc = CIFSCheckMFSymlink(&fattr, full_path, cifs_sb, xid);
350 if (tmprc)
351 cFYI(1, "CIFSCheckMFSymlink: %d", tmprc);
352 }
353
0e4bbde9 354 if (*pinode == NULL) {
cc0bad75 355 /* get new inode */
4065c802 356 cifs_fill_uniqueid(sb, &fattr);
cc0bad75
JL
357 *pinode = cifs_iget(sb, &fattr);
358 if (!*pinode)
0e4bbde9 359 rc = -ENOMEM;
cc0bad75
JL
360 } else {
361 /* we already have inode, update it */
362 cifs_fattr_to_inode(*pinode, &fattr);
0e4bbde9 363 }
1da177e4 364
1da177e4
LT
365 return rc;
366}
367
0b8f18e3
JL
368static int
369cifs_sfu_type(struct cifs_fattr *fattr, const unsigned char *path,
6d5786a3 370 struct cifs_sb_info *cifs_sb, unsigned int xid)
d6e2f2a4
SF
371{
372 int rc;
4b18f2a9 373 int oplock = 0;
d6e2f2a4 374 __u16 netfid;
7ffec372 375 struct tcon_link *tlink;
96daf2b0 376 struct cifs_tcon *tcon;
d4ffff1f 377 struct cifs_io_parms io_parms;
86c96b4b 378 char buf[24];
d6e2f2a4 379 unsigned int bytes_read;
fb8c4b14 380 char *pbuf;
d6e2f2a4
SF
381
382 pbuf = buf;
383
0b8f18e3
JL
384 fattr->cf_mode &= ~S_IFMT;
385
386 if (fattr->cf_eof == 0) {
387 fattr->cf_mode |= S_IFIFO;
388 fattr->cf_dtype = DT_FIFO;
d6e2f2a4 389 return 0;
0b8f18e3
JL
390 } else if (fattr->cf_eof < 8) {
391 fattr->cf_mode |= S_IFREG;
392 fattr->cf_dtype = DT_REG;
d6e2f2a4
SF
393 return -EINVAL; /* EOPNOTSUPP? */
394 }
50c2f753 395
7ffec372
JL
396 tlink = cifs_sb_tlink(cifs_sb);
397 if (IS_ERR(tlink))
398 return PTR_ERR(tlink);
399 tcon = tlink_tcon(tlink);
400
401 rc = CIFSSMBOpen(xid, tcon, path, FILE_OPEN, GENERIC_READ,
d6e2f2a4
SF
402 CREATE_NOT_DIR, &netfid, &oplock, NULL,
403 cifs_sb->local_nls,
404 cifs_sb->mnt_cifs_flags &
405 CIFS_MOUNT_MAP_SPECIAL_CHR);
fb8c4b14 406 if (rc == 0) {
ec637e3f 407 int buf_type = CIFS_NO_BUFFER;
d6e2f2a4 408 /* Read header */
d4ffff1f
PS
409 io_parms.netfid = netfid;
410 io_parms.pid = current->tgid;
411 io_parms.tcon = tcon;
412 io_parms.offset = 0;
413 io_parms.length = 24;
414 rc = CIFSSMBRead(xid, &io_parms, &bytes_read, &pbuf,
415 &buf_type);
4523cc30
SF
416 if ((rc == 0) && (bytes_read >= 8)) {
417 if (memcmp("IntxBLK", pbuf, 8) == 0) {
b6b38f70 418 cFYI(1, "Block device");
0b8f18e3
JL
419 fattr->cf_mode |= S_IFBLK;
420 fattr->cf_dtype = DT_BLK;
4523cc30 421 if (bytes_read == 24) {
86c96b4b
SF
422 /* we have enough to decode dev num */
423 __u64 mjr; /* major */
424 __u64 mnr; /* minor */
425 mjr = le64_to_cpu(*(__le64 *)(pbuf+8));
426 mnr = le64_to_cpu(*(__le64 *)(pbuf+16));
0b8f18e3 427 fattr->cf_rdev = MKDEV(mjr, mnr);
86c96b4b 428 }
4523cc30 429 } else if (memcmp("IntxCHR", pbuf, 8) == 0) {
b6b38f70 430 cFYI(1, "Char device");
0b8f18e3
JL
431 fattr->cf_mode |= S_IFCHR;
432 fattr->cf_dtype = DT_CHR;
4523cc30 433 if (bytes_read == 24) {
86c96b4b
SF
434 /* we have enough to decode dev num */
435 __u64 mjr; /* major */
436 __u64 mnr; /* minor */
437 mjr = le64_to_cpu(*(__le64 *)(pbuf+8));
438 mnr = le64_to_cpu(*(__le64 *)(pbuf+16));
0b8f18e3 439 fattr->cf_rdev = MKDEV(mjr, mnr);
fb8c4b14 440 }
4523cc30 441 } else if (memcmp("IntxLNK", pbuf, 7) == 0) {
b6b38f70 442 cFYI(1, "Symlink");
0b8f18e3
JL
443 fattr->cf_mode |= S_IFLNK;
444 fattr->cf_dtype = DT_LNK;
86c96b4b 445 } else {
0b8f18e3
JL
446 fattr->cf_mode |= S_IFREG; /* file? */
447 fattr->cf_dtype = DT_REG;
fb8c4b14 448 rc = -EOPNOTSUPP;
86c96b4b 449 }
3020a1f5 450 } else {
0b8f18e3
JL
451 fattr->cf_mode |= S_IFREG; /* then it is a file */
452 fattr->cf_dtype = DT_REG;
fb8c4b14
SF
453 rc = -EOPNOTSUPP; /* or some unknown SFU type */
454 }
7ffec372 455 CIFSSMBClose(xid, tcon, netfid);
d6e2f2a4 456 }
7ffec372 457 cifs_put_tlink(tlink);
d6e2f2a4 458 return rc;
d6e2f2a4
SF
459}
460
9e294f1c
SF
461#define SFBITS_MASK (S_ISVTX | S_ISGID | S_ISUID) /* SETFILEBITS valid bits */
462
0b8f18e3
JL
463/*
464 * Fetch mode bits as provided by SFU.
465 *
466 * FIXME: Doesn't this clobber the type bit we got from cifs_sfu_type ?
467 */
468static int cifs_sfu_mode(struct cifs_fattr *fattr, const unsigned char *path,
6d5786a3 469 struct cifs_sb_info *cifs_sb, unsigned int xid)
9e294f1c 470{
3020a1f5 471#ifdef CONFIG_CIFS_XATTR
9e294f1c
SF
472 ssize_t rc;
473 char ea_value[4];
474 __u32 mode;
7ffec372 475 struct tcon_link *tlink;
96daf2b0 476 struct cifs_tcon *tcon;
7ffec372
JL
477
478 tlink = cifs_sb_tlink(cifs_sb);
479 if (IS_ERR(tlink))
480 return PTR_ERR(tlink);
481 tcon = tlink_tcon(tlink);
9e294f1c 482
7ffec372 483 rc = CIFSSMBQAllEAs(xid, tcon, path, "SETFILEBITS",
0b8f18e3
JL
484 ea_value, 4 /* size of buf */, cifs_sb->local_nls,
485 cifs_sb->mnt_cifs_flags &
486 CIFS_MOUNT_MAP_SPECIAL_CHR);
7ffec372 487 cifs_put_tlink(tlink);
4523cc30 488 if (rc < 0)
9e294f1c
SF
489 return (int)rc;
490 else if (rc > 3) {
491 mode = le32_to_cpu(*((__le32 *)ea_value));
0b8f18e3 492 fattr->cf_mode &= ~SFBITS_MASK;
b6b38f70
JP
493 cFYI(1, "special bits 0%o org mode 0%o", mode,
494 fattr->cf_mode);
0b8f18e3 495 fattr->cf_mode = (mode & SFBITS_MASK) | fattr->cf_mode;
b6b38f70 496 cFYI(1, "special mode bits 0%o", mode);
9e294f1c 497 }
0b8f18e3
JL
498
499 return 0;
3020a1f5
SF
500#else
501 return -EOPNOTSUPP;
502#endif
9e294f1c
SF
503}
504
0b8f18e3 505/* Fill a cifs_fattr struct with info from FILE_ALL_INFO */
f1230c97 506static void
0b8f18e3
JL
507cifs_all_info_to_fattr(struct cifs_fattr *fattr, FILE_ALL_INFO *info,
508 struct cifs_sb_info *cifs_sb, bool adjust_tz)
b9a3260f 509{
96daf2b0 510 struct cifs_tcon *tcon = cifs_sb_master_tcon(cifs_sb);
0d424ad0 511
0b8f18e3
JL
512 memset(fattr, 0, sizeof(*fattr));
513 fattr->cf_cifsattrs = le32_to_cpu(info->Attributes);
514 if (info->DeletePending)
515 fattr->cf_flags |= CIFS_FATTR_DELETE_PENDING;
516
517 if (info->LastAccessTime)
518 fattr->cf_atime = cifs_NTtimeToUnix(info->LastAccessTime);
519 else
520 fattr->cf_atime = CURRENT_TIME;
521
522 fattr->cf_ctime = cifs_NTtimeToUnix(info->ChangeTime);
523 fattr->cf_mtime = cifs_NTtimeToUnix(info->LastWriteTime);
524
525 if (adjust_tz) {
0d424ad0
JL
526 fattr->cf_ctime.tv_sec += tcon->ses->server->timeAdj;
527 fattr->cf_mtime.tv_sec += tcon->ses->server->timeAdj;
0b8f18e3
JL
528 }
529
530 fattr->cf_eof = le64_to_cpu(info->EndOfFile);
531 fattr->cf_bytes = le64_to_cpu(info->AllocationSize);
20054bd6 532 fattr->cf_createtime = le64_to_cpu(info->CreationTime);
0b8f18e3
JL
533
534 if (fattr->cf_cifsattrs & ATTR_DIRECTORY) {
535 fattr->cf_mode = S_IFDIR | cifs_sb->mnt_dir_mode;
536 fattr->cf_dtype = DT_DIR;
6de2ce42
PS
537 /*
538 * Server can return wrong NumberOfLinks value for directories
539 * when Unix extensions are disabled - fake it.
540 */
541 fattr->cf_nlink = 2;
0b8f18e3
JL
542 } else {
543 fattr->cf_mode = S_IFREG | cifs_sb->mnt_file_mode;
544 fattr->cf_dtype = DT_REG;
0b8f18e3 545
d0c280d2
JL
546 /* clear write bits if ATTR_READONLY is set */
547 if (fattr->cf_cifsattrs & ATTR_READONLY)
548 fattr->cf_mode &= ~(S_IWUGO);
0b8f18e3 549
6de2ce42
PS
550 fattr->cf_nlink = le32_to_cpu(info->NumberOfLinks);
551 }
0b8f18e3
JL
552
553 fattr->cf_uid = cifs_sb->mnt_uid;
554 fattr->cf_gid = cifs_sb->mnt_gid;
b9a3260f
SF
555}
556
abab095d
JL
557int cifs_get_file_info(struct file *filp)
558{
559 int rc;
6d5786a3 560 unsigned int xid;
abab095d
JL
561 FILE_ALL_INFO find_data;
562 struct cifs_fattr fattr;
563 struct inode *inode = filp->f_path.dentry->d_inode;
564 struct cifs_sb_info *cifs_sb = CIFS_SB(inode->i_sb);
c21dfb69 565 struct cifsFileInfo *cfile = filp->private_data;
96daf2b0 566 struct cifs_tcon *tcon = tlink_tcon(cfile->tlink);
abab095d 567
6d5786a3 568 xid = get_xid();
abab095d 569 rc = CIFSSMBQFileInfo(xid, tcon, cfile->netfid, &find_data);
42274bb2
PS
570 switch (rc) {
571 case 0:
572 cifs_all_info_to_fattr(&fattr, &find_data, cifs_sb, false);
573 break;
574 case -EREMOTE:
575 cifs_create_dfs_fattr(&fattr, inode->i_sb);
576 rc = 0;
577 break;
578 case -EOPNOTSUPP:
579 case -EINVAL:
abab095d
JL
580 /*
581 * FIXME: legacy server -- fall back to path-based call?
ff215713
SF
582 * for now, just skip revalidating and mark inode for
583 * immediate reval.
584 */
abab095d
JL
585 rc = 0;
586 CIFS_I(inode)->time = 0;
42274bb2 587 default:
abab095d 588 goto cgfi_exit;
42274bb2 589 }
abab095d
JL
590
591 /*
592 * don't bother with SFU junk here -- just mark inode as needing
593 * revalidation.
594 */
abab095d
JL
595 fattr.cf_uniqueid = CIFS_I(inode)->uniqueid;
596 fattr.cf_flags |= CIFS_FATTR_NEED_REVAL;
597 cifs_fattr_to_inode(inode, &fattr);
598cgfi_exit:
6d5786a3 599 free_xid(xid);
abab095d
JL
600 return rc;
601}
602
1da177e4 603int cifs_get_inode_info(struct inode **pinode,
646dd539 604 const unsigned char *full_path, FILE_ALL_INFO *pfindData,
6d5786a3 605 struct super_block *sb, unsigned int xid, const __u16 *pfid)
1da177e4 606{
0b8f18e3 607 int rc = 0, tmprc;
96daf2b0 608 struct cifs_tcon *pTcon;
7ffec372 609 struct tcon_link *tlink;
1da177e4 610 struct cifs_sb_info *cifs_sb = CIFS_SB(sb);
1da177e4 611 char *buf = NULL;
5ade9dea 612 bool adjustTZ = false;
0b8f18e3 613 struct cifs_fattr fattr;
1da177e4 614
7ffec372
JL
615 tlink = cifs_sb_tlink(cifs_sb);
616 if (IS_ERR(tlink))
617 return PTR_ERR(tlink);
618 pTcon = tlink_tcon(tlink);
619
b6b38f70 620 cFYI(1, "Getting info on %s", full_path);
1da177e4 621
d0d2f2df
SF
622 if ((pfindData == NULL) && (*pinode != NULL)) {
623 if (CIFS_I(*pinode)->clientCanCacheRead) {
b6b38f70 624 cFYI(1, "No need to revalidate cached inode sizes");
7ffec372 625 goto cgii_exit;
1da177e4
LT
626 }
627 }
628
629 /* if file info not passed in then get it from server */
d0d2f2df 630 if (pfindData == NULL) {
1da177e4 631 buf = kmalloc(sizeof(FILE_ALL_INFO), GFP_KERNEL);
7ffec372
JL
632 if (buf == NULL) {
633 rc = -ENOMEM;
634 goto cgii_exit;
635 }
1da177e4 636 pfindData = (FILE_ALL_INFO *)buf;
7962670e 637
1da177e4 638 /* could do find first instead but this returns more info */
7962670e 639 rc = CIFSSMBQPathInfo(xid, pTcon, full_path, pfindData,
acf1a1b1 640 0 /* not legacy */,
6b8edfe0 641 cifs_sb->local_nls, cifs_sb->mnt_cifs_flags &
737b758c 642 CIFS_MOUNT_MAP_SPECIAL_CHR);
6b8edfe0
SF
643 /* BB optimize code so we do not make the above call
644 when server claims no NT SMB support and the above call
645 failed at least once - set flag in tcon or mount */
4523cc30 646 if ((rc == -EOPNOTSUPP) || (rc == -EINVAL)) {
7962670e 647 rc = SMBQueryInformation(xid, pTcon, full_path,
fb8c4b14 648 pfindData, cifs_sb->local_nls,
6b8edfe0
SF
649 cifs_sb->mnt_cifs_flags &
650 CIFS_MOUNT_MAP_SPECIAL_CHR);
4b18f2a9 651 adjustTZ = true;
6b8edfe0 652 }
1da177e4 653 }
0b8f18e3
JL
654
655 if (!rc) {
656 cifs_all_info_to_fattr(&fattr, (FILE_ALL_INFO *) pfindData,
657 cifs_sb, adjustTZ);
658 } else if (rc == -EREMOTE) {
659 cifs_create_dfs_fattr(&fattr, sb);
b9a3260f 660 rc = 0;
0b8f18e3 661 } else {
7962670e 662 goto cgii_exit;
0b8f18e3 663 }
1da177e4 664
0b8f18e3
JL
665 /*
666 * If an inode wasn't passed in, then get the inode number
667 *
668 * Is an i_ino of zero legal? Can we use that to check if the server
669 * supports returning inode numbers? Are there other sanity checks we
670 * can use to ensure that the server is really filling in that field?
671 *
672 * We can not use the IndexNumber field by default from Windows or
673 * Samba (in ALL_INFO buf) but we can request it explicitly. The SNIA
674 * CIFS spec claims that this value is unique within the scope of a
675 * share, and the windows docs hint that it's actually unique
676 * per-machine.
677 *
678 * There may be higher info levels that work but are there Windows
679 * server or network appliances for which IndexNumber field is not
680 * guaranteed unique?
681 */
b9a3260f 682 if (*pinode == NULL) {
b9a3260f
SF
683 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_SERVER_INUM) {
684 int rc1 = 0;
b9a3260f
SF
685
686 rc1 = CIFSGetSrvInodeNumber(xid, pTcon,
0b8f18e3 687 full_path, &fattr.cf_uniqueid,
737b758c
SF
688 cifs_sb->local_nls,
689 cifs_sb->mnt_cifs_flags &
690 CIFS_MOUNT_MAP_SPECIAL_CHR);
ec06aedd 691 if (rc1 || !fattr.cf_uniqueid) {
b6b38f70 692 cFYI(1, "GetSrvInodeNum rc %d", rc1);
0b8f18e3 693 fattr.cf_uniqueid = iunique(sb, ROOT_I);
ec06aedd 694 cifs_autodisable_serverino(cifs_sb);
132ac7b7 695 }
132ac7b7 696 } else {
0b8f18e3 697 fattr.cf_uniqueid = iunique(sb, ROOT_I);
132ac7b7 698 }
b9a3260f 699 } else {
0b8f18e3 700 fattr.cf_uniqueid = CIFS_I(*pinode)->uniqueid;
b9a3260f
SF
701 }
702
0b8f18e3
JL
703 /* query for SFU type info if supported and needed */
704 if (fattr.cf_cifsattrs & ATTR_SYSTEM &&
705 cifs_sb->mnt_cifs_flags & CIFS_MOUNT_UNX_EMUL) {
706 tmprc = cifs_sfu_type(&fattr, full_path, cifs_sb, xid);
707 if (tmprc)
b6b38f70 708 cFYI(1, "cifs_sfu_type failed: %d", tmprc);
b9a3260f 709 }
1da177e4 710
79df1bae 711#ifdef CONFIG_CIFS_ACL
b9a3260f
SF
712 /* fill in 0777 bits from ACL */
713 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_CIFS_ACL) {
78415d2d
SP
714 rc = cifs_acl_to_fattr(cifs_sb, &fattr, *pinode, full_path,
715 pfid);
716 if (rc) {
717 cFYI(1, "%s: Getting ACL failed with error: %d",
718 __func__, rc);
719 goto cgii_exit;
720 }
b9a3260f 721 }
79df1bae 722#endif /* CONFIG_CIFS_ACL */
b9a3260f 723
0b8f18e3
JL
724 /* fill in remaining high mode bits e.g. SUID, VTX */
725 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_UNX_EMUL)
726 cifs_sfu_mode(&fattr, full_path, cifs_sb, xid);
b9a3260f 727
1b12b9c1
SM
728 /* check for Minshall+French symlinks */
729 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_MF_SYMLINKS) {
730 tmprc = CIFSCheckMFSymlink(&fattr, full_path, cifs_sb, xid);
731 if (tmprc)
732 cFYI(1, "CIFSCheckMFSymlink: %d", tmprc);
733 }
734
0b8f18e3
JL
735 if (!*pinode) {
736 *pinode = cifs_iget(sb, &fattr);
737 if (!*pinode)
738 rc = -ENOMEM;
739 } else {
740 cifs_fattr_to_inode(*pinode, &fattr);
741 }
b9a3260f 742
7962670e 743cgii_exit:
1da177e4 744 kfree(buf);
7ffec372 745 cifs_put_tlink(tlink);
1da177e4
LT
746 return rc;
747}
748
7f8ed420
SF
749static const struct inode_operations cifs_ipc_inode_ops = {
750 .lookup = cifs_lookup,
751};
752
f87d39d9 753char *cifs_build_path_to_root(struct smb_vol *vol, struct cifs_sb_info *cifs_sb,
96daf2b0 754 struct cifs_tcon *tcon)
8be0ed44 755{
f87d39d9 756 int pplen = vol->prepath ? strlen(vol->prepath) : 0;
8be0ed44
SF
757 int dfsplen;
758 char *full_path = NULL;
759
760 /* if no prefix path, simply set path to the root of share to "" */
761 if (pplen == 0) {
762 full_path = kmalloc(1, GFP_KERNEL);
763 if (full_path)
764 full_path[0] = 0;
765 return full_path;
766 }
767
0d424ad0
JL
768 if (tcon->Flags & SMB_SHARE_IS_IN_DFS)
769 dfsplen = strnlen(tcon->treeName, MAX_TREE_SIZE + 1);
8be0ed44
SF
770 else
771 dfsplen = 0;
772
773 full_path = kmalloc(dfsplen + pplen + 1, GFP_KERNEL);
774 if (full_path == NULL)
775 return full_path;
776
f9e8c450 777 if (dfsplen)
0d424ad0 778 strncpy(full_path, tcon->treeName, dfsplen);
f87d39d9 779 strncpy(full_path + dfsplen, vol->prepath, pplen);
f9e8c450 780 convert_delimiter(full_path, CIFS_DIR_SEP(cifs_sb));
8be0ed44
SF
781 full_path[dfsplen + pplen] = 0; /* add trailing null */
782 return full_path;
783}
784
cc0bad75
JL
785static int
786cifs_find_inode(struct inode *inode, void *opaque)
787{
788 struct cifs_fattr *fattr = (struct cifs_fattr *) opaque;
789
f30b9c11 790 /* don't match inode with different uniqueid */
cc0bad75
JL
791 if (CIFS_I(inode)->uniqueid != fattr->cf_uniqueid)
792 return 0;
793
20054bd6
JL
794 /* use createtime like an i_generation field */
795 if (CIFS_I(inode)->createtime != fattr->cf_createtime)
796 return 0;
797
f30b9c11
JL
798 /* don't match inode of different type */
799 if ((inode->i_mode & S_IFMT) != (fattr->cf_mode & S_IFMT))
800 return 0;
801
5acfec25 802 /* if it's not a directory or has no dentries, then flag it */
b3d9b7a3 803 if (S_ISDIR(inode->i_mode) && !hlist_empty(&inode->i_dentry))
3d694380 804 fattr->cf_flags |= CIFS_FATTR_INO_COLLISION;
3d694380 805
cc0bad75
JL
806 return 1;
807}
808
809static int
810cifs_init_inode(struct inode *inode, void *opaque)
811{
812 struct cifs_fattr *fattr = (struct cifs_fattr *) opaque;
813
814 CIFS_I(inode)->uniqueid = fattr->cf_uniqueid;
20054bd6 815 CIFS_I(inode)->createtime = fattr->cf_createtime;
cc0bad75
JL
816 return 0;
817}
818
5acfec25
JL
819/*
820 * walk dentry list for an inode and report whether it has aliases that
821 * are hashed. We use this to determine if a directory inode can actually
822 * be used.
823 */
824static bool
825inode_has_hashed_dentries(struct inode *inode)
826{
827 struct dentry *dentry;
b3d9b7a3 828 struct hlist_node *p;
5acfec25 829
873feea0 830 spin_lock(&inode->i_lock);
b3d9b7a3 831 hlist_for_each_entry(dentry, p, &inode->i_dentry, d_alias) {
5acfec25 832 if (!d_unhashed(dentry) || IS_ROOT(dentry)) {
873feea0 833 spin_unlock(&inode->i_lock);
5acfec25
JL
834 return true;
835 }
836 }
873feea0 837 spin_unlock(&inode->i_lock);
5acfec25
JL
838 return false;
839}
840
cc0bad75
JL
841/* Given fattrs, get a corresponding inode */
842struct inode *
843cifs_iget(struct super_block *sb, struct cifs_fattr *fattr)
844{
845 unsigned long hash;
846 struct inode *inode;
847
3d694380 848retry_iget5_locked:
b6b38f70 849 cFYI(1, "looking for uniqueid=%llu", fattr->cf_uniqueid);
cc0bad75
JL
850
851 /* hash down to 32-bits on 32-bit arch */
852 hash = cifs_uniqueid_to_ino_t(fattr->cf_uniqueid);
853
854 inode = iget5_locked(sb, hash, cifs_find_inode, cifs_init_inode, fattr);
cc0bad75 855 if (inode) {
5acfec25 856 /* was there a potentially problematic inode collision? */
3d694380 857 if (fattr->cf_flags & CIFS_FATTR_INO_COLLISION) {
3d694380 858 fattr->cf_flags &= ~CIFS_FATTR_INO_COLLISION;
5acfec25
JL
859
860 if (inode_has_hashed_dentries(inode)) {
861 cifs_autodisable_serverino(CIFS_SB(sb));
862 iput(inode);
863 fattr->cf_uniqueid = iunique(sb, ROOT_I);
864 goto retry_iget5_locked;
865 }
3d694380
JL
866 }
867
cc0bad75
JL
868 cifs_fattr_to_inode(inode, fattr);
869 if (sb->s_flags & MS_NOATIME)
870 inode->i_flags |= S_NOATIME | S_NOCMTIME;
871 if (inode->i_state & I_NEW) {
872 inode->i_ino = hash;
522440ed
JL
873 if (S_ISREG(inode->i_mode))
874 inode->i_data.backing_dev_info = sb->s_bdi;
0ccd4802 875#ifdef CONFIG_CIFS_FSCACHE
9451a9a5
SJ
876 /* initialize per-inode cache cookie pointer */
877 CIFS_I(inode)->fscache = NULL;
0ccd4802 878#endif
cc0bad75
JL
879 unlock_new_inode(inode);
880 }
881 }
882
883 return inode;
884}
885
1da177e4 886/* gets root inode */
9b6763e0 887struct inode *cifs_root_iget(struct super_block *sb)
1da177e4 888{
6d5786a3 889 unsigned int xid;
0d424ad0 890 struct cifs_sb_info *cifs_sb = CIFS_SB(sb);
cc0bad75 891 struct inode *inode = NULL;
ce634ab2 892 long rc;
96daf2b0 893 struct cifs_tcon *tcon = cifs_sb_master_tcon(cifs_sb);
ce634ab2 894
6d5786a3 895 xid = get_xid();
0d424ad0 896 if (tcon->unix_ext)
f87d39d9 897 rc = cifs_get_inode_info_unix(&inode, "", sb, xid);
0b8f18e3 898 else
f87d39d9 899 rc = cifs_get_inode_info(&inode, "", NULL, sb, xid, NULL);
0b8f18e3 900
a7851ce7
OS
901 if (!inode) {
902 inode = ERR_PTR(rc);
903 goto out;
904 }
cc0bad75 905
0ccd4802 906#ifdef CONFIG_CIFS_FSCACHE
d03382ce 907 /* populate tcon->resource_id */
0d424ad0 908 tcon->resource_id = CIFS_I(inode)->uniqueid;
0ccd4802 909#endif
d03382ce 910
0d424ad0 911 if (rc && tcon->ipc) {
b6b38f70 912 cFYI(1, "ipc connection - fake read inode");
7f8ed420 913 inode->i_mode |= S_IFDIR;
bfe86848 914 set_nlink(inode, 2);
7f8ed420
SF
915 inode->i_op = &cifs_ipc_inode_ops;
916 inode->i_fop = &simple_dir_operations;
917 inode->i_uid = cifs_sb->mnt_uid;
918 inode->i_gid = cifs_sb->mnt_gid;
ad661334 919 } else if (rc) {
ce634ab2 920 iget_failed(inode);
a7851ce7 921 inode = ERR_PTR(rc);
7f8ed420
SF
922 }
923
a7851ce7 924out:
6d5786a3 925 /* can not call macro free_xid here since in a void func
ce634ab2
DH
926 * TODO: This is no longer true
927 */
6d5786a3 928 _free_xid(xid);
ce634ab2 929 return inode;
1da177e4
LT
930}
931
388e57b2 932static int
6d5786a3 933cifs_set_file_info(struct inode *inode, struct iattr *attrs, unsigned int xid,
388e57b2
SF
934 char *full_path, __u32 dosattr)
935{
936 int rc;
937 int oplock = 0;
938 __u16 netfid;
939 __u32 netpid;
940 bool set_time = false;
941 struct cifsFileInfo *open_file;
942 struct cifsInodeInfo *cifsInode = CIFS_I(inode);
943 struct cifs_sb_info *cifs_sb = CIFS_SB(inode->i_sb);
7ffec372 944 struct tcon_link *tlink = NULL;
96daf2b0 945 struct cifs_tcon *pTcon;
388e57b2
SF
946 FILE_BASIC_INFO info_buf;
947
1adcb710
SF
948 if (attrs == NULL)
949 return -EINVAL;
950
388e57b2
SF
951 if (attrs->ia_valid & ATTR_ATIME) {
952 set_time = true;
953 info_buf.LastAccessTime =
954 cpu_to_le64(cifs_UnixTimeToNT(attrs->ia_atime));
955 } else
956 info_buf.LastAccessTime = 0;
957
958 if (attrs->ia_valid & ATTR_MTIME) {
959 set_time = true;
960 info_buf.LastWriteTime =
961 cpu_to_le64(cifs_UnixTimeToNT(attrs->ia_mtime));
962 } else
963 info_buf.LastWriteTime = 0;
964
965 /*
966 * Samba throws this field away, but windows may actually use it.
967 * Do not set ctime unless other time stamps are changed explicitly
968 * (i.e. by utimes()) since we would then have a mix of client and
969 * server times.
970 */
971 if (set_time && (attrs->ia_valid & ATTR_CTIME)) {
b6b38f70 972 cFYI(1, "CIFS - CTIME changed");
388e57b2
SF
973 info_buf.ChangeTime =
974 cpu_to_le64(cifs_UnixTimeToNT(attrs->ia_ctime));
975 } else
976 info_buf.ChangeTime = 0;
977
978 info_buf.CreationTime = 0; /* don't change */
979 info_buf.Attributes = cpu_to_le32(dosattr);
980
981 /*
982 * If the file is already open for write, just use that fileid
983 */
6508d904 984 open_file = find_writable_file(cifsInode, true);
388e57b2
SF
985 if (open_file) {
986 netfid = open_file->netfid;
987 netpid = open_file->pid;
13cfb733 988 pTcon = tlink_tcon(open_file->tlink);
388e57b2
SF
989 goto set_via_filehandle;
990 }
991
7ffec372
JL
992 tlink = cifs_sb_tlink(cifs_sb);
993 if (IS_ERR(tlink)) {
994 rc = PTR_ERR(tlink);
995 tlink = NULL;
996 goto out;
997 }
998 pTcon = tlink_tcon(tlink);
ba00ba64 999
388e57b2
SF
1000 /*
1001 * NT4 apparently returns success on this call, but it doesn't
1002 * really work.
1003 */
1004 if (!(pTcon->ses->flags & CIFS_SES_NT4)) {
1005 rc = CIFSSMBSetPathInfo(xid, pTcon, full_path,
1006 &info_buf, cifs_sb->local_nls,
1007 cifs_sb->mnt_cifs_flags &
1008 CIFS_MOUNT_MAP_SPECIAL_CHR);
6b37faa1
JL
1009 if (rc == 0) {
1010 cifsInode->cifsAttrs = dosattr;
1011 goto out;
1012 } else if (rc != -EOPNOTSUPP && rc != -EINVAL)
388e57b2
SF
1013 goto out;
1014 }
1015
b6b38f70
JP
1016 cFYI(1, "calling SetFileInfo since SetPathInfo for "
1017 "times not supported by this server");
388e57b2
SF
1018 rc = CIFSSMBOpen(xid, pTcon, full_path, FILE_OPEN,
1019 SYNCHRONIZE | FILE_WRITE_ATTRIBUTES,
1020 CREATE_NOT_DIR, &netfid, &oplock,
1021 NULL, cifs_sb->local_nls,
1022 cifs_sb->mnt_cifs_flags &
1023 CIFS_MOUNT_MAP_SPECIAL_CHR);
1024
1025 if (rc != 0) {
1026 if (rc == -EIO)
1027 rc = -EINVAL;
1028 goto out;
1029 }
1030
1031 netpid = current->tgid;
1032
1033set_via_filehandle:
1034 rc = CIFSSMBSetFileInfo(xid, pTcon, &info_buf, netfid, netpid);
d388908e
SF
1035 if (!rc)
1036 cifsInode->cifsAttrs = dosattr;
1037
388e57b2
SF
1038 if (open_file == NULL)
1039 CIFSSMBClose(xid, pTcon, netfid);
1040 else
6ab409b5 1041 cifsFileInfo_put(open_file);
388e57b2 1042out:
7ffec372
JL
1043 if (tlink != NULL)
1044 cifs_put_tlink(tlink);
388e57b2
SF
1045 return rc;
1046}
1047
a12a1ac7
JL
1048/*
1049 * open the given file (if it isn't already), set the DELETE_ON_CLOSE bit
1050 * and rename it to a random name that hopefully won't conflict with
1051 * anything else.
1052 */
1053static int
6d5786a3
PS
1054cifs_rename_pending_delete(char *full_path, struct dentry *dentry,
1055 unsigned int xid)
a12a1ac7
JL
1056{
1057 int oplock = 0;
1058 int rc;
1059 __u16 netfid;
3270958b 1060 struct inode *inode = dentry->d_inode;
a12a1ac7
JL
1061 struct cifsInodeInfo *cifsInode = CIFS_I(inode);
1062 struct cifs_sb_info *cifs_sb = CIFS_SB(inode->i_sb);
7ffec372 1063 struct tcon_link *tlink;
96daf2b0 1064 struct cifs_tcon *tcon;
3270958b
SF
1065 __u32 dosattr, origattr;
1066 FILE_BASIC_INFO *info_buf = NULL;
a12a1ac7 1067
7ffec372
JL
1068 tlink = cifs_sb_tlink(cifs_sb);
1069 if (IS_ERR(tlink))
1070 return PTR_ERR(tlink);
1071 tcon = tlink_tcon(tlink);
1072
a12a1ac7 1073 rc = CIFSSMBOpen(xid, tcon, full_path, FILE_OPEN,
dd1db2de 1074 DELETE|FILE_WRITE_ATTRIBUTES, CREATE_NOT_DIR,
a12a1ac7
JL
1075 &netfid, &oplock, NULL, cifs_sb->local_nls,
1076 cifs_sb->mnt_cifs_flags & CIFS_MOUNT_MAP_SPECIAL_CHR);
1077 if (rc != 0)
1078 goto out;
1079
3270958b
SF
1080 origattr = cifsInode->cifsAttrs;
1081 if (origattr == 0)
1082 origattr |= ATTR_NORMAL;
1083
1084 dosattr = origattr & ~ATTR_READONLY;
a12a1ac7
JL
1085 if (dosattr == 0)
1086 dosattr |= ATTR_NORMAL;
1087 dosattr |= ATTR_HIDDEN;
1088
3270958b
SF
1089 /* set ATTR_HIDDEN and clear ATTR_READONLY, but only if needed */
1090 if (dosattr != origattr) {
1091 info_buf = kzalloc(sizeof(*info_buf), GFP_KERNEL);
1092 if (info_buf == NULL) {
1093 rc = -ENOMEM;
1094 goto out_close;
1095 }
1096 info_buf->Attributes = cpu_to_le32(dosattr);
1097 rc = CIFSSMBSetFileInfo(xid, tcon, info_buf, netfid,
1098 current->tgid);
1099 /* although we would like to mark the file hidden
1100 if that fails we will still try to rename it */
41346098 1101 if (rc != 0)
3270958b
SF
1102 cifsInode->cifsAttrs = dosattr;
1103 else
1104 dosattr = origattr; /* since not able to change them */
a12a1ac7 1105 }
a12a1ac7 1106
dd1db2de
JL
1107 /* rename the file */
1108 rc = CIFSSMBRenameOpenFile(xid, tcon, netfid, NULL, cifs_sb->local_nls,
a12a1ac7
JL
1109 cifs_sb->mnt_cifs_flags &
1110 CIFS_MOUNT_MAP_SPECIAL_CHR);
3270958b
SF
1111 if (rc != 0) {
1112 rc = -ETXTBSY;
1113 goto undo_setattr;
1114 }
6d22f098 1115
3270958b
SF
1116 /* try to set DELETE_ON_CLOSE */
1117 if (!cifsInode->delete_pending) {
1118 rc = CIFSSMBSetFileDisposition(xid, tcon, true, netfid,
1119 current->tgid);
1120 /*
1121 * some samba versions return -ENOENT when we try to set the
1122 * file disposition here. Likely a samba bug, but work around
1123 * it for now. This means that some cifsXXX files may hang
1124 * around after they shouldn't.
1125 *
1126 * BB: remove this hack after more servers have the fix
1127 */
1128 if (rc == -ENOENT)
1129 rc = 0;
1130 else if (rc != 0) {
1131 rc = -ETXTBSY;
1132 goto undo_rename;
1133 }
1134 cifsInode->delete_pending = true;
1135 }
7ce86d5a 1136
a12a1ac7
JL
1137out_close:
1138 CIFSSMBClose(xid, tcon, netfid);
1139out:
3270958b 1140 kfree(info_buf);
7ffec372 1141 cifs_put_tlink(tlink);
a12a1ac7 1142 return rc;
3270958b
SF
1143
1144 /*
1145 * reset everything back to the original state. Don't bother
1146 * dealing with errors here since we can't do anything about
1147 * them anyway.
1148 */
1149undo_rename:
1150 CIFSSMBRenameOpenFile(xid, tcon, netfid, dentry->d_name.name,
1151 cifs_sb->local_nls, cifs_sb->mnt_cifs_flags &
1152 CIFS_MOUNT_MAP_SPECIAL_CHR);
1153undo_setattr:
1154 if (dosattr != origattr) {
1155 info_buf->Attributes = cpu_to_le32(origattr);
1156 if (!CIFSSMBSetFileInfo(xid, tcon, info_buf, netfid,
1157 current->tgid))
1158 cifsInode->cifsAttrs = origattr;
1159 }
1160
1161 goto out_close;
a12a1ac7
JL
1162}
1163
ff694527
SF
1164
1165/*
1166 * If dentry->d_inode is null (usually meaning the cached dentry
1167 * is a negative dentry) then we would attempt a standard SMB delete, but
af901ca1
AGR
1168 * if that fails we can not attempt the fall back mechanisms on EACCESS
1169 * but will return the EACCESS to the caller. Note that the VFS does not call
ff694527
SF
1170 * unlink on negative dentries currently.
1171 */
5f0319a7 1172int cifs_unlink(struct inode *dir, struct dentry *dentry)
1da177e4
LT
1173{
1174 int rc = 0;
6d5786a3 1175 unsigned int xid;
1da177e4 1176 char *full_path = NULL;
5f0319a7 1177 struct inode *inode = dentry->d_inode;
ff694527 1178 struct cifsInodeInfo *cifs_inode;
5f0319a7
JL
1179 struct super_block *sb = dir->i_sb;
1180 struct cifs_sb_info *cifs_sb = CIFS_SB(sb);
7ffec372 1181 struct tcon_link *tlink;
96daf2b0 1182 struct cifs_tcon *tcon;
6050247d
SF
1183 struct iattr *attrs = NULL;
1184 __u32 dosattr = 0, origattr = 0;
1da177e4 1185
b6b38f70 1186 cFYI(1, "cifs_unlink, dir=0x%p, dentry=0x%p", dir, dentry);
1da177e4 1187
7ffec372
JL
1188 tlink = cifs_sb_tlink(cifs_sb);
1189 if (IS_ERR(tlink))
1190 return PTR_ERR(tlink);
1191 tcon = tlink_tcon(tlink);
1192
6d5786a3 1193 xid = get_xid();
1da177e4 1194
5f0319a7
JL
1195 /* Unlink can be called from rename so we can not take the
1196 * sb->s_vfs_rename_mutex here */
1197 full_path = build_path_from_dentry(dentry);
1da177e4 1198 if (full_path == NULL) {
0f3bc09e 1199 rc = -ENOMEM;
7ffec372 1200 goto unlink_out;
1da177e4 1201 }
2d785a50 1202
5f0319a7 1203 if ((tcon->ses->capabilities & CAP_UNIX) &&
2d785a50 1204 (CIFS_UNIX_POSIX_PATH_OPS_CAP &
5f0319a7
JL
1205 le64_to_cpu(tcon->fsUnixInfo.Capability))) {
1206 rc = CIFSPOSIXDelFile(xid, tcon, full_path,
2d785a50 1207 SMB_POSIX_UNLINK_FILE_TARGET, cifs_sb->local_nls,
737b758c 1208 cifs_sb->mnt_cifs_flags & CIFS_MOUNT_MAP_SPECIAL_CHR);
b6b38f70 1209 cFYI(1, "posix del rc %d", rc);
2d785a50
SF
1210 if ((rc == 0) || (rc == -ENOENT))
1211 goto psx_del_no_retry;
1212 }
1da177e4 1213
6050247d 1214retry_std_delete:
5f0319a7 1215 rc = CIFSSMBDelFile(xid, tcon, full_path, cifs_sb->local_nls,
2d785a50 1216 cifs_sb->mnt_cifs_flags & CIFS_MOUNT_MAP_SPECIAL_CHR);
6050247d 1217
2d785a50 1218psx_del_no_retry:
1da177e4 1219 if (!rc) {
5f0319a7
JL
1220 if (inode)
1221 drop_nlink(inode);
1da177e4 1222 } else if (rc == -ENOENT) {
5f0319a7 1223 d_drop(dentry);
1da177e4 1224 } else if (rc == -ETXTBSY) {
3270958b 1225 rc = cifs_rename_pending_delete(full_path, dentry, xid);
a12a1ac7
JL
1226 if (rc == 0)
1227 drop_nlink(inode);
ff694527 1228 } else if ((rc == -EACCES) && (dosattr == 0) && inode) {
388e57b2
SF
1229 attrs = kzalloc(sizeof(*attrs), GFP_KERNEL);
1230 if (attrs == NULL) {
1231 rc = -ENOMEM;
1232 goto out_reval;
1da177e4 1233 }
388e57b2
SF
1234
1235 /* try to reset dos attributes */
ff694527
SF
1236 cifs_inode = CIFS_I(inode);
1237 origattr = cifs_inode->cifsAttrs;
6050247d
SF
1238 if (origattr == 0)
1239 origattr |= ATTR_NORMAL;
1240 dosattr = origattr & ~ATTR_READONLY;
388e57b2
SF
1241 if (dosattr == 0)
1242 dosattr |= ATTR_NORMAL;
1243 dosattr |= ATTR_HIDDEN;
1244
1245 rc = cifs_set_file_info(inode, attrs, xid, full_path, dosattr);
388e57b2
SF
1246 if (rc != 0)
1247 goto out_reval;
6050247d
SF
1248
1249 goto retry_std_delete;
1da177e4 1250 }
6050247d
SF
1251
1252 /* undo the setattr if we errored out and it's needed */
1253 if (rc != 0 && dosattr != 0)
1254 cifs_set_file_info(inode, attrs, xid, full_path, origattr);
1255
388e57b2 1256out_reval:
4523cc30 1257 if (inode) {
ff694527
SF
1258 cifs_inode = CIFS_I(inode);
1259 cifs_inode->time = 0; /* will force revalidate to get info
5f0319a7
JL
1260 when needed */
1261 inode->i_ctime = current_fs_time(sb);
06bcfedd 1262 }
5f0319a7 1263 dir->i_ctime = dir->i_mtime = current_fs_time(sb);
ff694527 1264 cifs_inode = CIFS_I(dir);
6050247d 1265 CIFS_I(dir)->time = 0; /* force revalidate of dir as well */
7ffec372 1266unlink_out:
1da177e4 1267 kfree(full_path);
6050247d 1268 kfree(attrs);
6d5786a3 1269 free_xid(xid);
7ffec372 1270 cifs_put_tlink(tlink);
1da177e4
LT
1271 return rc;
1272}
1273
18bb1db3 1274int cifs_mkdir(struct inode *inode, struct dentry *direntry, umode_t mode)
1da177e4 1275{
6b37faa1 1276 int rc = 0, tmprc;
6d5786a3 1277 unsigned int xid;
1da177e4 1278 struct cifs_sb_info *cifs_sb;
7ffec372 1279 struct tcon_link *tlink;
96daf2b0 1280 struct cifs_tcon *pTcon;
1da177e4
LT
1281 char *full_path = NULL;
1282 struct inode *newinode = NULL;
cc0bad75 1283 struct cifs_fattr fattr;
1da177e4 1284
18bb1db3 1285 cFYI(1, "In cifs_mkdir, mode = 0x%hx inode = 0x%p", mode, inode);
1da177e4 1286
1da177e4 1287 cifs_sb = CIFS_SB(inode->i_sb);
7ffec372
JL
1288 tlink = cifs_sb_tlink(cifs_sb);
1289 if (IS_ERR(tlink))
1290 return PTR_ERR(tlink);
1291 pTcon = tlink_tcon(tlink);
1292
6d5786a3 1293 xid = get_xid();
1da177e4 1294
7f57356b 1295 full_path = build_path_from_dentry(direntry);
1da177e4 1296 if (full_path == NULL) {
0f3bc09e 1297 rc = -ENOMEM;
7ffec372 1298 goto mkdir_out;
1da177e4 1299 }
50c2f753 1300
fb8c4b14
SF
1301 if ((pTcon->ses->capabilities & CAP_UNIX) &&
1302 (CIFS_UNIX_POSIX_PATH_OPS_CAP &
2dd29d31
SF
1303 le64_to_cpu(pTcon->fsUnixInfo.Capability))) {
1304 u32 oplock = 0;
f6d09982 1305 FILE_UNIX_BASIC_INFO *pInfo =
2dd29d31 1306 kzalloc(sizeof(FILE_UNIX_BASIC_INFO), GFP_KERNEL);
fb8c4b14 1307 if (pInfo == NULL) {
2dd29d31
SF
1308 rc = -ENOMEM;
1309 goto mkdir_out;
1310 }
50c2f753 1311
ce3b0f8d 1312 mode &= ~current_umask();
2dd29d31
SF
1313 rc = CIFSPOSIXCreate(xid, pTcon, SMB_O_DIRECTORY | SMB_O_CREAT,
1314 mode, NULL /* netfid */, pInfo, &oplock,
fb8c4b14
SF
1315 full_path, cifs_sb->local_nls,
1316 cifs_sb->mnt_cifs_flags &
2dd29d31 1317 CIFS_MOUNT_MAP_SPECIAL_CHR);
c45d707f
SF
1318 if (rc == -EOPNOTSUPP) {
1319 kfree(pInfo);
1320 goto mkdir_retry_old;
1321 } else if (rc) {
b6b38f70 1322 cFYI(1, "posix mkdir returned 0x%x", rc);
2dd29d31
SF
1323 d_drop(direntry);
1324 } else {
8f2376ad
CG
1325 if (pInfo->Type == cpu_to_le32(-1)) {
1326 /* no return info, go query for it */
5a07cdf8 1327 kfree(pInfo);
fb8c4b14 1328 goto mkdir_get_info;
5a07cdf8 1329 }
fb8c4b14
SF
1330/*BB check (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_SET_UID ) to see if need
1331 to set uid/gid */
cbac3cba 1332
cc0bad75 1333 cifs_unix_basic_to_fattr(&fattr, pInfo, cifs_sb);
4065c802 1334 cifs_fill_uniqueid(inode->i_sb, &fattr);
cc0bad75
JL
1335 newinode = cifs_iget(inode->i_sb, &fattr);
1336 if (!newinode) {
5a07cdf8 1337 kfree(pInfo);
cbac3cba 1338 goto mkdir_get_info;
5a07cdf8 1339 }
6b37faa1 1340
2dd29d31 1341 d_instantiate(direntry, newinode);
cbac3cba 1342
cbac3cba 1343#ifdef CONFIG_CIFS_DEBUG2
b6b38f70
JP
1344 cFYI(1, "instantiated dentry %p %s to inode %p",
1345 direntry, direntry->d_name.name, newinode);
cbac3cba 1346
fb8c4b14 1347 if (newinode->i_nlink != 2)
b6b38f70
JP
1348 cFYI(1, "unexpected number of links %d",
1349 newinode->i_nlink);
cbac3cba 1350#endif
2dd29d31
SF
1351 }
1352 kfree(pInfo);
1353 goto mkdir_out;
fb8c4b14 1354 }
c45d707f 1355mkdir_retry_old:
1da177e4 1356 /* BB add setting the equivalent of mode via CreateX w/ACLs */
737b758c
SF
1357 rc = CIFSSMBMkDir(xid, pTcon, full_path, cifs_sb->local_nls,
1358 cifs_sb->mnt_cifs_flags & CIFS_MOUNT_MAP_SPECIAL_CHR);
1da177e4 1359 if (rc) {
b6b38f70 1360 cFYI(1, "cifs_mkdir returned 0x%x", rc);
1da177e4
LT
1361 d_drop(direntry);
1362 } else {
fb8c4b14 1363mkdir_get_info:
c18c842b 1364 if (pTcon->unix_ext)
1da177e4 1365 rc = cifs_get_inode_info_unix(&newinode, full_path,
fb8c4b14 1366 inode->i_sb, xid);
1da177e4
LT
1367 else
1368 rc = cifs_get_inode_info(&newinode, full_path, NULL,
8b1327f6 1369 inode->i_sb, xid, NULL);
1da177e4 1370
1da177e4 1371 d_instantiate(direntry, newinode);
2dd29d31 1372 /* setting nlink not necessary except in cases where we
fb8c4b14 1373 * failed to get it from the server or was set bogus */
2dd29d31 1374 if ((direntry->d_inode) && (direntry->d_inode->i_nlink < 2))
bfe86848 1375 set_nlink(direntry->d_inode, 2);
95089910 1376
ce3b0f8d 1377 mode &= ~current_umask();
95089910
JL
1378 /* must turn on setgid bit if parent dir has it */
1379 if (inode->i_mode & S_ISGID)
1380 mode |= S_ISGID;
1381
c18c842b 1382 if (pTcon->unix_ext) {
4e1e7fb9
JL
1383 struct cifs_unix_set_info_args args = {
1384 .mode = mode,
1385 .ctime = NO_CHANGE_64,
1386 .atime = NO_CHANGE_64,
1387 .mtime = NO_CHANGE_64,
1388 .device = 0,
1389 };
d0d2f2df 1390 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_SET_UID) {
a001e5b5 1391 args.uid = (__u64)current_fsuid();
95089910
JL
1392 if (inode->i_mode & S_ISGID)
1393 args.gid = (__u64)inode->i_gid;
1394 else
a001e5b5 1395 args.gid = (__u64)current_fsgid();
1da177e4 1396 } else {
4e1e7fb9
JL
1397 args.uid = NO_CHANGE_64;
1398 args.gid = NO_CHANGE_64;
1da177e4 1399 }
01ea95e3
JL
1400 CIFSSMBUnixSetPathInfo(xid, pTcon, full_path, &args,
1401 cifs_sb->local_nls,
1402 cifs_sb->mnt_cifs_flags &
1403 CIFS_MOUNT_MAP_SPECIAL_CHR);
3ce53fc4 1404 } else {
67750fb9
JL
1405 if (!(cifs_sb->mnt_cifs_flags & CIFS_MOUNT_CIFS_ACL) &&
1406 (mode & S_IWUGO) == 0) {
1407 FILE_BASIC_INFO pInfo;
6b37faa1
JL
1408 struct cifsInodeInfo *cifsInode;
1409 u32 dosattrs;
1410
67750fb9 1411 memset(&pInfo, 0, sizeof(pInfo));
6b37faa1
JL
1412 cifsInode = CIFS_I(newinode);
1413 dosattrs = cifsInode->cifsAttrs|ATTR_READONLY;
1414 pInfo.Attributes = cpu_to_le32(dosattrs);
1415 tmprc = CIFSSMBSetPathInfo(xid, pTcon,
1416 full_path, &pInfo,
1417 cifs_sb->local_nls,
67750fb9
JL
1418 cifs_sb->mnt_cifs_flags &
1419 CIFS_MOUNT_MAP_SPECIAL_CHR);
6b37faa1
JL
1420 if (tmprc == 0)
1421 cifsInode->cifsAttrs = dosattrs;
67750fb9 1422 }
fb8c4b14 1423 if (direntry->d_inode) {
b0fd30d3
JL
1424 if (cifs_sb->mnt_cifs_flags &
1425 CIFS_MOUNT_DYNPERM)
1426 direntry->d_inode->i_mode =
1427 (mode | S_IFDIR);
4e94a105 1428
fb8c4b14 1429 if (cifs_sb->mnt_cifs_flags &
6473a559 1430 CIFS_MOUNT_SET_UID) {
fb8c4b14 1431 direntry->d_inode->i_uid =
a001e5b5 1432 current_fsuid();
95089910
JL
1433 if (inode->i_mode & S_ISGID)
1434 direntry->d_inode->i_gid =
1435 inode->i_gid;
1436 else
1437 direntry->d_inode->i_gid =
a001e5b5 1438 current_fsgid();
6473a559
SF
1439 }
1440 }
2a138ebb 1441 }
1da177e4 1442 }
fb8c4b14 1443mkdir_out:
6de2ce42
PS
1444 /*
1445 * Force revalidate to get parent dir info when needed since cached
1446 * attributes are invalid now.
1447 */
1448 CIFS_I(inode)->time = 0;
1da177e4 1449 kfree(full_path);
6d5786a3 1450 free_xid(xid);
7ffec372 1451 cifs_put_tlink(tlink);
1da177e4
LT
1452 return rc;
1453}
1454
1455int cifs_rmdir(struct inode *inode, struct dentry *direntry)
1456{
1457 int rc = 0;
6d5786a3 1458 unsigned int xid;
1da177e4 1459 struct cifs_sb_info *cifs_sb;
7ffec372 1460 struct tcon_link *tlink;
96daf2b0 1461 struct cifs_tcon *pTcon;
1da177e4
LT
1462 char *full_path = NULL;
1463 struct cifsInodeInfo *cifsInode;
1464
b6b38f70 1465 cFYI(1, "cifs_rmdir, inode = 0x%p", inode);
1da177e4 1466
6d5786a3 1467 xid = get_xid();
1da177e4 1468
7f57356b 1469 full_path = build_path_from_dentry(direntry);
1da177e4 1470 if (full_path == NULL) {
0f3bc09e 1471 rc = -ENOMEM;
7ffec372 1472 goto rmdir_exit;
1da177e4
LT
1473 }
1474
7ffec372
JL
1475 cifs_sb = CIFS_SB(inode->i_sb);
1476 tlink = cifs_sb_tlink(cifs_sb);
1477 if (IS_ERR(tlink)) {
1478 rc = PTR_ERR(tlink);
1479 goto rmdir_exit;
1480 }
1481 pTcon = tlink_tcon(tlink);
1482
737b758c
SF
1483 rc = CIFSSMBRmDir(xid, pTcon, full_path, cifs_sb->local_nls,
1484 cifs_sb->mnt_cifs_flags & CIFS_MOUNT_MAP_SPECIAL_CHR);
7ffec372 1485 cifs_put_tlink(tlink);
1da177e4
LT
1486
1487 if (!rc) {
3677db10 1488 spin_lock(&direntry->d_inode->i_lock);
fb8c4b14 1489 i_size_write(direntry->d_inode, 0);
ce71ec36 1490 clear_nlink(direntry->d_inode);
3677db10 1491 spin_unlock(&direntry->d_inode->i_lock);
1da177e4
LT
1492 }
1493
1494 cifsInode = CIFS_I(direntry->d_inode);
6de2ce42
PS
1495 /* force revalidate to go get info when needed */
1496 cifsInode->time = 0;
42c24544
SF
1497
1498 cifsInode = CIFS_I(inode);
6de2ce42
PS
1499 /*
1500 * Force revalidate to get parent dir info when needed since cached
1501 * attributes are invalid now.
1502 */
1503 cifsInode->time = 0;
42c24544 1504
1da177e4
LT
1505 direntry->d_inode->i_ctime = inode->i_ctime = inode->i_mtime =
1506 current_fs_time(inode->i_sb);
1507
7ffec372 1508rmdir_exit:
1da177e4 1509 kfree(full_path);
6d5786a3 1510 free_xid(xid);
1da177e4
LT
1511 return rc;
1512}
1513
ee2fd967 1514static int
6d5786a3
PS
1515cifs_do_rename(unsigned int xid, struct dentry *from_dentry,
1516 const char *fromPath, struct dentry *to_dentry,
1517 const char *toPath)
ee2fd967
SF
1518{
1519 struct cifs_sb_info *cifs_sb = CIFS_SB(from_dentry->d_sb);
7ffec372 1520 struct tcon_link *tlink;
96daf2b0 1521 struct cifs_tcon *pTcon;
ee2fd967
SF
1522 __u16 srcfid;
1523 int oplock, rc;
1524
7ffec372
JL
1525 tlink = cifs_sb_tlink(cifs_sb);
1526 if (IS_ERR(tlink))
1527 return PTR_ERR(tlink);
1528 pTcon = tlink_tcon(tlink);
1529
ee2fd967
SF
1530 /* try path-based rename first */
1531 rc = CIFSSMBRename(xid, pTcon, fromPath, toPath, cifs_sb->local_nls,
1532 cifs_sb->mnt_cifs_flags &
1533 CIFS_MOUNT_MAP_SPECIAL_CHR);
1534
1535 /*
1536 * don't bother with rename by filehandle unless file is busy and
1537 * source Note that cross directory moves do not work with
1538 * rename by filehandle to various Windows servers.
1539 */
1540 if (rc == 0 || rc != -ETXTBSY)
7ffec372 1541 goto do_rename_exit;
ee2fd967 1542
ed0e3ace
JL
1543 /* open-file renames don't work across directories */
1544 if (to_dentry->d_parent != from_dentry->d_parent)
7ffec372 1545 goto do_rename_exit;
ed0e3ace 1546
ee2fd967
SF
1547 /* open the file to be renamed -- we need DELETE perms */
1548 rc = CIFSSMBOpen(xid, pTcon, fromPath, FILE_OPEN, DELETE,
1549 CREATE_NOT_DIR, &srcfid, &oplock, NULL,
1550 cifs_sb->local_nls, cifs_sb->mnt_cifs_flags &
1551 CIFS_MOUNT_MAP_SPECIAL_CHR);
1552
1553 if (rc == 0) {
1554 rc = CIFSSMBRenameOpenFile(xid, pTcon, srcfid,
1555 (const char *) to_dentry->d_name.name,
1556 cifs_sb->local_nls, cifs_sb->mnt_cifs_flags &
1557 CIFS_MOUNT_MAP_SPECIAL_CHR);
1558
1559 CIFSSMBClose(xid, pTcon, srcfid);
1560 }
7ffec372
JL
1561do_rename_exit:
1562 cifs_put_tlink(tlink);
ee2fd967
SF
1563 return rc;
1564}
1565
14121bdc
JL
1566int cifs_rename(struct inode *source_dir, struct dentry *source_dentry,
1567 struct inode *target_dir, struct dentry *target_dentry)
1da177e4 1568{
ee2fd967
SF
1569 char *fromName = NULL;
1570 char *toName = NULL;
639e7a91 1571 struct cifs_sb_info *cifs_sb;
7ffec372 1572 struct tcon_link *tlink;
96daf2b0 1573 struct cifs_tcon *tcon;
ee2fd967
SF
1574 FILE_UNIX_BASIC_INFO *info_buf_source = NULL;
1575 FILE_UNIX_BASIC_INFO *info_buf_target;
6d5786a3
PS
1576 unsigned int xid;
1577 int rc, tmprc;
1da177e4 1578
639e7a91 1579 cifs_sb = CIFS_SB(source_dir->i_sb);
7ffec372
JL
1580 tlink = cifs_sb_tlink(cifs_sb);
1581 if (IS_ERR(tlink))
1582 return PTR_ERR(tlink);
1583 tcon = tlink_tcon(tlink);
1da177e4 1584
6d5786a3 1585 xid = get_xid();
ee2fd967 1586
ee2fd967
SF
1587 /*
1588 * we already have the rename sem so we do not need to
1589 * grab it again here to protect the path integrity
1590 */
14121bdc 1591 fromName = build_path_from_dentry(source_dentry);
ee2fd967
SF
1592 if (fromName == NULL) {
1593 rc = -ENOMEM;
1594 goto cifs_rename_exit;
1595 }
1596
14121bdc 1597 toName = build_path_from_dentry(target_dentry);
ee2fd967 1598 if (toName == NULL) {
1da177e4
LT
1599 rc = -ENOMEM;
1600 goto cifs_rename_exit;
1601 }
1602
14121bdc
JL
1603 rc = cifs_do_rename(xid, source_dentry, fromName,
1604 target_dentry, toName);
ee2fd967 1605
14121bdc
JL
1606 if (rc == -EEXIST && tcon->unix_ext) {
1607 /*
1608 * Are src and dst hardlinks of same inode? We can
1609 * only tell with unix extensions enabled
1610 */
1611 info_buf_source =
1612 kmalloc(2 * sizeof(FILE_UNIX_BASIC_INFO),
1613 GFP_KERNEL);
1614 if (info_buf_source == NULL) {
1615 rc = -ENOMEM;
1616 goto cifs_rename_exit;
1617 }
1618
1619 info_buf_target = info_buf_source + 1;
8d281efb 1620 tmprc = CIFSSMBUnixQPathInfo(xid, tcon, fromName,
14121bdc 1621 info_buf_source,
639e7a91
JL
1622 cifs_sb->local_nls,
1623 cifs_sb->mnt_cifs_flags &
14121bdc 1624 CIFS_MOUNT_MAP_SPECIAL_CHR);
8d281efb 1625 if (tmprc != 0)
14121bdc 1626 goto unlink_target;
ee2fd967 1627
639e7a91
JL
1628 tmprc = CIFSSMBUnixQPathInfo(xid, tcon, toName,
1629 info_buf_target,
1630 cifs_sb->local_nls,
1631 cifs_sb->mnt_cifs_flags &
14121bdc
JL
1632 CIFS_MOUNT_MAP_SPECIAL_CHR);
1633
8d281efb 1634 if (tmprc == 0 && (info_buf_source->UniqueId ==
ae6884a9 1635 info_buf_target->UniqueId)) {
14121bdc 1636 /* same file, POSIX says that this is a noop */
ae6884a9 1637 rc = 0;
14121bdc 1638 goto cifs_rename_exit;
ae6884a9 1639 }
14121bdc 1640 } /* else ... BB we could add the same check for Windows by
ee2fd967 1641 checking the UniqueId via FILE_INTERNAL_INFO */
14121bdc 1642
ee2fd967 1643unlink_target:
fc6f3943
JL
1644 /* Try unlinking the target dentry if it's not negative */
1645 if (target_dentry->d_inode && (rc == -EACCES || rc == -EEXIST)) {
8d281efb 1646 tmprc = cifs_unlink(target_dir, target_dentry);
14121bdc
JL
1647 if (tmprc)
1648 goto cifs_rename_exit;
1649
14121bdc
JL
1650 rc = cifs_do_rename(xid, source_dentry, fromName,
1651 target_dentry, toName);
1da177e4
LT
1652 }
1653
1654cifs_rename_exit:
ee2fd967 1655 kfree(info_buf_source);
1da177e4
LT
1656 kfree(fromName);
1657 kfree(toName);
6d5786a3 1658 free_xid(xid);
7ffec372 1659 cifs_put_tlink(tlink);
1da177e4
LT
1660 return rc;
1661}
1662
df2cf170
JL
1663static bool
1664cifs_inode_needs_reval(struct inode *inode)
1da177e4 1665{
df2cf170 1666 struct cifsInodeInfo *cifs_i = CIFS_I(inode);
6d20e840 1667 struct cifs_sb_info *cifs_sb = CIFS_SB(inode->i_sb);
1da177e4 1668
df2cf170
JL
1669 if (cifs_i->clientCanCacheRead)
1670 return false;
1da177e4 1671
df2cf170
JL
1672 if (!lookupCacheEnabled)
1673 return true;
1da177e4 1674
df2cf170
JL
1675 if (cifs_i->time == 0)
1676 return true;
1da177e4 1677
6d20e840
SJ
1678 if (!time_in_range(jiffies, cifs_i->time,
1679 cifs_i->time + cifs_sb->actimeo))
df2cf170
JL
1680 return true;
1681
db19272e 1682 /* hardlinked files w/ noserverino get "special" treatment */
6d20e840 1683 if (!(cifs_sb->mnt_cifs_flags & CIFS_MOUNT_SERVER_INUM) &&
db19272e
JL
1684 S_ISREG(inode->i_mode) && inode->i_nlink != 1)
1685 return true;
1686
df2cf170
JL
1687 return false;
1688}
1689
523fb8c8
SJ
1690/*
1691 * Zap the cache. Called when invalid_mapping flag is set.
1692 */
6feb9891 1693int
df2cf170
JL
1694cifs_invalidate_mapping(struct inode *inode)
1695{
6feb9891 1696 int rc = 0;
df2cf170
JL
1697 struct cifsInodeInfo *cifs_i = CIFS_I(inode);
1698
1699 cifs_i->invalid_mapping = false;
1700
df2cf170 1701 if (inode->i_mapping && inode->i_mapping->nrpages != 0) {
257fb1f1
PS
1702 rc = invalidate_inode_pages2(inode->i_mapping);
1703 if (rc) {
1704 cERROR(1, "%s: could not invalidate inode %p", __func__,
1705 inode);
1706 cifs_i->invalid_mapping = true;
1707 }
df2cf170 1708 }
257fb1f1 1709
9451a9a5 1710 cifs_fscache_reset_inode_cookie(inode);
6feb9891 1711 return rc;
df2cf170
JL
1712}
1713
6feb9891 1714int cifs_revalidate_file_attr(struct file *filp)
abab095d
JL
1715{
1716 int rc = 0;
1717 struct inode *inode = filp->f_path.dentry->d_inode;
ba00ba64 1718 struct cifsFileInfo *cfile = (struct cifsFileInfo *) filp->private_data;
abab095d
JL
1719
1720 if (!cifs_inode_needs_reval(inode))
6feb9891 1721 return rc;
abab095d 1722
13cfb733 1723 if (tlink_tcon(cfile->tlink)->unix_ext)
abab095d
JL
1724 rc = cifs_get_file_info_unix(filp);
1725 else
1726 rc = cifs_get_file_info(filp);
1727
abab095d
JL
1728 return rc;
1729}
1730
6feb9891 1731int cifs_revalidate_dentry_attr(struct dentry *dentry)
df2cf170 1732{
6d5786a3 1733 unsigned int xid;
df2cf170 1734 int rc = 0;
df2cf170
JL
1735 struct inode *inode = dentry->d_inode;
1736 struct super_block *sb = dentry->d_sb;
6feb9891 1737 char *full_path = NULL;
df2cf170
JL
1738
1739 if (inode == NULL)
1740 return -ENOENT;
1da177e4 1741
df2cf170 1742 if (!cifs_inode_needs_reval(inode))
6feb9891
PS
1743 return rc;
1744
6d5786a3 1745 xid = get_xid();
1da177e4
LT
1746
1747 /* can not safely grab the rename sem here if rename calls revalidate
1748 since that would deadlock */
df2cf170 1749 full_path = build_path_from_dentry(dentry);
1da177e4 1750 if (full_path == NULL) {
0f3bc09e 1751 rc = -ENOMEM;
6feb9891 1752 goto out;
1da177e4
LT
1753 }
1754
6feb9891
PS
1755 cFYI(1, "Update attributes: %s inode 0x%p count %d dentry: 0x%p d_time "
1756 "%ld jiffies %ld", full_path, inode, inode->i_count.counter,
f19159dc 1757 dentry, dentry->d_time, jiffies);
1da177e4 1758
0d424ad0 1759 if (cifs_sb_master_tcon(CIFS_SB(sb))->unix_ext)
df2cf170
JL
1760 rc = cifs_get_inode_info_unix(&inode, full_path, sb, xid);
1761 else
1762 rc = cifs_get_inode_info(&inode, full_path, NULL, sb,
1763 xid, NULL);
1da177e4 1764
6feb9891 1765out:
1da177e4 1766 kfree(full_path);
6d5786a3 1767 free_xid(xid);
1da177e4
LT
1768 return rc;
1769}
1770
6feb9891
PS
1771int cifs_revalidate_file(struct file *filp)
1772{
1773 int rc;
1774 struct inode *inode = filp->f_path.dentry->d_inode;
1775
1776 rc = cifs_revalidate_file_attr(filp);
1777 if (rc)
1778 return rc;
1779
1780 if (CIFS_I(inode)->invalid_mapping)
1781 rc = cifs_invalidate_mapping(inode);
1782 return rc;
1783}
1784
1785/* revalidate a dentry's inode attributes */
1786int cifs_revalidate_dentry(struct dentry *dentry)
1787{
1788 int rc;
1789 struct inode *inode = dentry->d_inode;
1790
1791 rc = cifs_revalidate_dentry_attr(dentry);
1792 if (rc)
1793 return rc;
1794
1795 if (CIFS_I(inode)->invalid_mapping)
1796 rc = cifs_invalidate_mapping(inode);
1797 return rc;
1798}
1799
1da177e4 1800int cifs_getattr(struct vfsmount *mnt, struct dentry *dentry,
1c456013 1801 struct kstat *stat)
1da177e4 1802{
3aa1c8c2 1803 struct cifs_sb_info *cifs_sb = CIFS_SB(dentry->d_sb);
96daf2b0 1804 struct cifs_tcon *tcon = cifs_sb_master_tcon(cifs_sb);
6feb9891
PS
1805 struct inode *inode = dentry->d_inode;
1806 int rc;
3aa1c8c2 1807
6feb9891
PS
1808 /*
1809 * We need to be sure that all dirty pages are written and the server
1810 * has actual ctime, mtime and file length.
1811 */
1812 if (!CIFS_I(inode)->clientCanCacheRead && inode->i_mapping &&
1813 inode->i_mapping->nrpages != 0) {
1814 rc = filemap_fdatawait(inode->i_mapping);
156ecb2d
SF
1815 if (rc) {
1816 mapping_set_error(inode->i_mapping, rc);
1817 return rc;
1818 }
6feb9891 1819 }
1c456013 1820
6feb9891
PS
1821 rc = cifs_revalidate_dentry_attr(dentry);
1822 if (rc)
1823 return rc;
1824
1825 generic_fillattr(inode, stat);
1826 stat->blksize = CIFS_MAX_MSGSIZE;
1827 stat->ino = CIFS_I(inode)->uniqueid;
1828
1829 /*
1830 * If on a multiuser mount without unix extensions, and the admin hasn't
1831 * overridden them, set the ownership to the fsuid/fsgid of the current
1832 * process.
1833 */
1834 if ((cifs_sb->mnt_cifs_flags & CIFS_MOUNT_MULTIUSER) &&
1835 !tcon->unix_ext) {
1836 if (!(cifs_sb->mnt_cifs_flags & CIFS_MOUNT_OVERR_UID))
1837 stat->uid = current_fsuid();
1838 if (!(cifs_sb->mnt_cifs_flags & CIFS_MOUNT_OVERR_GID))
1839 stat->gid = current_fsgid();
5fe14c85 1840 }
6feb9891 1841 return rc;
1da177e4
LT
1842}
1843
1844static int cifs_truncate_page(struct address_space *mapping, loff_t from)
1845{
1846 pgoff_t index = from >> PAGE_CACHE_SHIFT;
1847 unsigned offset = from & (PAGE_CACHE_SIZE - 1);
1848 struct page *page;
1da177e4
LT
1849 int rc = 0;
1850
1851 page = grab_cache_page(mapping, index);
1852 if (!page)
1853 return -ENOMEM;
1854
eebd2aa3 1855 zero_user_segment(page, offset, PAGE_CACHE_SIZE);
1da177e4
LT
1856 unlock_page(page);
1857 page_cache_release(page);
1858 return rc;
1859}
1860
1b947463 1861static void cifs_setsize(struct inode *inode, loff_t offset)
3677db10 1862{
c08d3b0e 1863 loff_t oldsize;
3677db10 1864
ba6a46a0 1865 spin_lock(&inode->i_lock);
c08d3b0e 1866 oldsize = inode->i_size;
3677db10 1867 i_size_write(inode, offset);
ba6a46a0 1868 spin_unlock(&inode->i_lock);
1b947463 1869
c08d3b0e 1870 truncate_pagecache(inode, oldsize, offset);
3677db10
SF
1871}
1872
8efdbde6
JL
1873static int
1874cifs_set_file_size(struct inode *inode, struct iattr *attrs,
6d5786a3 1875 unsigned int xid, char *full_path)
8efdbde6
JL
1876{
1877 int rc;
1878 struct cifsFileInfo *open_file;
1879 struct cifsInodeInfo *cifsInode = CIFS_I(inode);
1880 struct cifs_sb_info *cifs_sb = CIFS_SB(inode->i_sb);
7ffec372 1881 struct tcon_link *tlink = NULL;
96daf2b0 1882 struct cifs_tcon *pTcon = NULL;
fa2989f4 1883 struct cifs_io_parms io_parms;
8efdbde6
JL
1884
1885 /*
1886 * To avoid spurious oplock breaks from server, in the case of
1887 * inodes that we already have open, avoid doing path based
1888 * setting of file size if we can do it by handle.
1889 * This keeps our caching token (oplock) and avoids timeouts
1890 * when the local oplock break takes longer to flush
1891 * writebehind data than the SMB timeout for the SetPathInfo
1892 * request would allow
1893 */
6508d904 1894 open_file = find_writable_file(cifsInode, true);
8efdbde6
JL
1895 if (open_file) {
1896 __u16 nfid = open_file->netfid;
1897 __u32 npid = open_file->pid;
13cfb733 1898 pTcon = tlink_tcon(open_file->tlink);
8efdbde6
JL
1899 rc = CIFSSMBSetFileSize(xid, pTcon, attrs->ia_size, nfid,
1900 npid, false);
6ab409b5 1901 cifsFileInfo_put(open_file);
b6b38f70 1902 cFYI(1, "SetFSize for attrs rc = %d", rc);
8efdbde6
JL
1903 if ((rc == -EINVAL) || (rc == -EOPNOTSUPP)) {
1904 unsigned int bytes_written;
fa2989f4
PS
1905
1906 io_parms.netfid = nfid;
1907 io_parms.pid = npid;
1908 io_parms.tcon = pTcon;
1909 io_parms.offset = 0;
1910 io_parms.length = attrs->ia_size;
1911 rc = CIFSSMBWrite(xid, &io_parms, &bytes_written,
1912 NULL, NULL, 1);
b6b38f70 1913 cFYI(1, "Wrt seteof rc %d", rc);
8efdbde6
JL
1914 }
1915 } else
1916 rc = -EINVAL;
1917
1918 if (rc != 0) {
7ffec372
JL
1919 if (pTcon == NULL) {
1920 tlink = cifs_sb_tlink(cifs_sb);
1921 if (IS_ERR(tlink))
1922 return PTR_ERR(tlink);
1923 pTcon = tlink_tcon(tlink);
1924 }
ba00ba64 1925
8efdbde6
JL
1926 /* Set file size by pathname rather than by handle
1927 either because no valid, writeable file handle for
1928 it was found or because there was an error setting
1929 it by handle */
1930 rc = CIFSSMBSetEOF(xid, pTcon, full_path, attrs->ia_size,
1931 false, cifs_sb->local_nls,
1932 cifs_sb->mnt_cifs_flags &
1933 CIFS_MOUNT_MAP_SPECIAL_CHR);
b6b38f70 1934 cFYI(1, "SetEOF by path (setattrs) rc = %d", rc);
8efdbde6
JL
1935 if ((rc == -EINVAL) || (rc == -EOPNOTSUPP)) {
1936 __u16 netfid;
1937 int oplock = 0;
1938
1939 rc = SMBLegacyOpen(xid, pTcon, full_path,
1940 FILE_OPEN, GENERIC_WRITE,
1941 CREATE_NOT_DIR, &netfid, &oplock, NULL,
1942 cifs_sb->local_nls,
1943 cifs_sb->mnt_cifs_flags &
1944 CIFS_MOUNT_MAP_SPECIAL_CHR);
1945 if (rc == 0) {
1946 unsigned int bytes_written;
fa2989f4
PS
1947
1948 io_parms.netfid = netfid;
1949 io_parms.pid = current->tgid;
1950 io_parms.tcon = pTcon;
1951 io_parms.offset = 0;
1952 io_parms.length = attrs->ia_size;
1953 rc = CIFSSMBWrite(xid, &io_parms,
1954 &bytes_written,
1955 NULL, NULL, 1);
b6b38f70 1956 cFYI(1, "wrt seteof rc %d", rc);
8efdbde6
JL
1957 CIFSSMBClose(xid, pTcon, netfid);
1958 }
1959 }
7ffec372
JL
1960 if (tlink)
1961 cifs_put_tlink(tlink);
8efdbde6
JL
1962 }
1963
1964 if (rc == 0) {
fbec9ab9 1965 cifsInode->server_eof = attrs->ia_size;
1b947463 1966 cifs_setsize(inode, attrs->ia_size);
8efdbde6
JL
1967 cifs_truncate_page(inode->i_mapping, inode->i_size);
1968 }
1969
1970 return rc;
1971}
1972
3fe5c1dd
JL
1973static int
1974cifs_setattr_unix(struct dentry *direntry, struct iattr *attrs)
1975{
1976 int rc;
6d5786a3 1977 unsigned int xid;
3fe5c1dd
JL
1978 char *full_path = NULL;
1979 struct inode *inode = direntry->d_inode;
1980 struct cifsInodeInfo *cifsInode = CIFS_I(inode);
1981 struct cifs_sb_info *cifs_sb = CIFS_SB(inode->i_sb);
7ffec372 1982 struct tcon_link *tlink;
96daf2b0 1983 struct cifs_tcon *pTcon;
3fe5c1dd 1984 struct cifs_unix_set_info_args *args = NULL;
3bbeeb3c 1985 struct cifsFileInfo *open_file;
3fe5c1dd 1986
b6b38f70
JP
1987 cFYI(1, "setattr_unix on file %s attrs->ia_valid=0x%x",
1988 direntry->d_name.name, attrs->ia_valid);
3fe5c1dd 1989
6d5786a3 1990 xid = get_xid();
3fe5c1dd 1991
db78b877
CH
1992 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_NO_PERM)
1993 attrs->ia_valid |= ATTR_FORCE;
1994
1995 rc = inode_change_ok(inode, attrs);
1996 if (rc < 0)
1997 goto out;
3fe5c1dd
JL
1998
1999 full_path = build_path_from_dentry(direntry);
2000 if (full_path == NULL) {
2001 rc = -ENOMEM;
2002 goto out;
2003 }
2004
0f4d634c
JL
2005 /*
2006 * Attempt to flush data before changing attributes. We need to do
2007 * this for ATTR_SIZE and ATTR_MTIME for sure, and if we change the
2008 * ownership or mode then we may also need to do this. Here, we take
2009 * the safe way out and just do the flush on all setattr requests. If
2010 * the flush returns error, store it to report later and continue.
2011 *
2012 * BB: This should be smarter. Why bother flushing pages that
2013 * will be truncated anyway? Also, should we error out here if
2014 * the flush returns error?
2015 */
2016 rc = filemap_write_and_wait(inode->i_mapping);
eb4b756b
JL
2017 mapping_set_error(inode->i_mapping, rc);
2018 rc = 0;
3fe5c1dd
JL
2019
2020 if (attrs->ia_valid & ATTR_SIZE) {
2021 rc = cifs_set_file_size(inode, attrs, xid, full_path);
2022 if (rc != 0)
2023 goto out;
2024 }
2025
2026 /* skip mode change if it's just for clearing setuid/setgid */
2027 if (attrs->ia_valid & (ATTR_KILL_SUID|ATTR_KILL_SGID))
2028 attrs->ia_valid &= ~ATTR_MODE;
2029
2030 args = kmalloc(sizeof(*args), GFP_KERNEL);
2031 if (args == NULL) {
2032 rc = -ENOMEM;
2033 goto out;
2034 }
2035
2036 /* set up the struct */
2037 if (attrs->ia_valid & ATTR_MODE)
2038 args->mode = attrs->ia_mode;
2039 else
2040 args->mode = NO_CHANGE_64;
2041
2042 if (attrs->ia_valid & ATTR_UID)
2043 args->uid = attrs->ia_uid;
2044 else
2045 args->uid = NO_CHANGE_64;
2046
2047 if (attrs->ia_valid & ATTR_GID)
2048 args->gid = attrs->ia_gid;
2049 else
2050 args->gid = NO_CHANGE_64;
2051
2052 if (attrs->ia_valid & ATTR_ATIME)
2053 args->atime = cifs_UnixTimeToNT(attrs->ia_atime);
2054 else
2055 args->atime = NO_CHANGE_64;
2056
2057 if (attrs->ia_valid & ATTR_MTIME)
2058 args->mtime = cifs_UnixTimeToNT(attrs->ia_mtime);
2059 else
2060 args->mtime = NO_CHANGE_64;
2061
2062 if (attrs->ia_valid & ATTR_CTIME)
2063 args->ctime = cifs_UnixTimeToNT(attrs->ia_ctime);
2064 else
2065 args->ctime = NO_CHANGE_64;
2066
2067 args->device = 0;
6508d904 2068 open_file = find_writable_file(cifsInode, true);
3bbeeb3c
JL
2069 if (open_file) {
2070 u16 nfid = open_file->netfid;
2071 u32 npid = open_file->pid;
13cfb733 2072 pTcon = tlink_tcon(open_file->tlink);
3bbeeb3c 2073 rc = CIFSSMBUnixSetFileInfo(xid, pTcon, args, nfid, npid);
6ab409b5 2074 cifsFileInfo_put(open_file);
3bbeeb3c 2075 } else {
7ffec372
JL
2076 tlink = cifs_sb_tlink(cifs_sb);
2077 if (IS_ERR(tlink)) {
2078 rc = PTR_ERR(tlink);
2079 goto out;
2080 }
2081 pTcon = tlink_tcon(tlink);
3bbeeb3c 2082 rc = CIFSSMBUnixSetPathInfo(xid, pTcon, full_path, args,
01ea95e3
JL
2083 cifs_sb->local_nls,
2084 cifs_sb->mnt_cifs_flags &
2085 CIFS_MOUNT_MAP_SPECIAL_CHR);
7ffec372 2086 cifs_put_tlink(tlink);
3bbeeb3c 2087 }
3fe5c1dd 2088
1025774c
CH
2089 if (rc)
2090 goto out;
ccd4bb1b 2091
1025774c 2092 if ((attrs->ia_valid & ATTR_SIZE) &&
1b947463
CH
2093 attrs->ia_size != i_size_read(inode))
2094 truncate_setsize(inode, attrs->ia_size);
1025774c
CH
2095
2096 setattr_copy(inode, attrs);
2097 mark_inode_dirty(inode);
2098
2099 /* force revalidate when any of these times are set since some
2100 of the fs types (eg ext3, fat) do not have fine enough
2101 time granularity to match protocol, and we do not have a
2102 a way (yet) to query the server fs's time granularity (and
2103 whether it rounds times down).
2104 */
2105 if (attrs->ia_valid & (ATTR_MTIME | ATTR_CTIME))
2106 cifsInode->time = 0;
3fe5c1dd
JL
2107out:
2108 kfree(args);
2109 kfree(full_path);
6d5786a3 2110 free_xid(xid);
3fe5c1dd
JL
2111 return rc;
2112}
2113
0510eeb7
JL
2114static int
2115cifs_setattr_nounix(struct dentry *direntry, struct iattr *attrs)
1da177e4 2116{
6d5786a3 2117 unsigned int xid;
a5ff3769
SP
2118 uid_t uid = NO_CHANGE_32;
2119 gid_t gid = NO_CHANGE_32;
3fe5c1dd
JL
2120 struct inode *inode = direntry->d_inode;
2121 struct cifs_sb_info *cifs_sb = CIFS_SB(inode->i_sb);
3fe5c1dd 2122 struct cifsInodeInfo *cifsInode = CIFS_I(inode);
1da177e4
LT
2123 char *full_path = NULL;
2124 int rc = -EACCES;
feb3e20c 2125 __u32 dosattr = 0;
4e1e7fb9 2126 __u64 mode = NO_CHANGE_64;
3fe5c1dd 2127
6d5786a3 2128 xid = get_xid();
1da177e4 2129
b6b38f70
JP
2130 cFYI(1, "setattr on file %s attrs->iavalid 0x%x",
2131 direntry->d_name.name, attrs->ia_valid);
6473a559 2132
db78b877
CH
2133 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_NO_PERM)
2134 attrs->ia_valid |= ATTR_FORCE;
2135
2136 rc = inode_change_ok(inode, attrs);
2137 if (rc < 0) {
6d5786a3 2138 free_xid(xid);
db78b877 2139 return rc;
6473a559 2140 }
50c2f753 2141
7f57356b 2142 full_path = build_path_from_dentry(direntry);
1da177e4 2143 if (full_path == NULL) {
0f3bc09e 2144 rc = -ENOMEM;
6d5786a3 2145 free_xid(xid);
0f3bc09e 2146 return rc;
1da177e4 2147 }
1da177e4 2148
0f4d634c
JL
2149 /*
2150 * Attempt to flush data before changing attributes. We need to do
2151 * this for ATTR_SIZE and ATTR_MTIME for sure, and if we change the
2152 * ownership or mode then we may also need to do this. Here, we take
2153 * the safe way out and just do the flush on all setattr requests. If
2154 * the flush returns error, store it to report later and continue.
2155 *
2156 * BB: This should be smarter. Why bother flushing pages that
2157 * will be truncated anyway? Also, should we error out here if
2158 * the flush returns error?
2159 */
2160 rc = filemap_write_and_wait(inode->i_mapping);
eb4b756b
JL
2161 mapping_set_error(inode->i_mapping, rc);
2162 rc = 0;
cea21805 2163
50531444 2164 if (attrs->ia_valid & ATTR_SIZE) {
8efdbde6
JL
2165 rc = cifs_set_file_size(inode, attrs, xid, full_path);
2166 if (rc != 0)
e30dcf3a 2167 goto cifs_setattr_exit;
1da177e4 2168 }
4ca691a8 2169
a5ff3769
SP
2170 if (attrs->ia_valid & ATTR_UID)
2171 uid = attrs->ia_uid;
2172
2173 if (attrs->ia_valid & ATTR_GID)
2174 gid = attrs->ia_gid;
2175
2176#ifdef CONFIG_CIFS_ACL
2177 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_CIFS_ACL) {
2178 if (uid != NO_CHANGE_32 || gid != NO_CHANGE_32) {
2179 rc = id_mode_to_cifs_acl(inode, full_path, NO_CHANGE_64,
2180 uid, gid);
2181 if (rc) {
2182 cFYI(1, "%s: Setting id failed with error: %d",
2183 __func__, rc);
2184 goto cifs_setattr_exit;
2185 }
2186 }
2187 } else
2188#endif /* CONFIG_CIFS_ACL */
3fe5c1dd 2189 if (!(cifs_sb->mnt_cifs_flags & CIFS_MOUNT_SET_UID))
4ca691a8 2190 attrs->ia_valid &= ~(ATTR_UID | ATTR_GID);
1da177e4 2191
d32c4f26
JL
2192 /* skip mode change if it's just for clearing setuid/setgid */
2193 if (attrs->ia_valid & (ATTR_KILL_SUID|ATTR_KILL_SGID))
2194 attrs->ia_valid &= ~ATTR_MODE;
2195
1da177e4 2196 if (attrs->ia_valid & ATTR_MODE) {
1da177e4 2197 mode = attrs->ia_mode;
cdbce9c8 2198 rc = 0;
79df1bae 2199#ifdef CONFIG_CIFS_ACL
78415d2d 2200 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_CIFS_ACL) {
a5ff3769
SP
2201 rc = id_mode_to_cifs_acl(inode, full_path, mode,
2202 NO_CHANGE_32, NO_CHANGE_32);
78415d2d
SP
2203 if (rc) {
2204 cFYI(1, "%s: Setting ACL failed with error: %d",
2205 __func__, rc);
2206 goto cifs_setattr_exit;
2207 }
2208 } else
79df1bae 2209#endif /* CONFIG_CIFS_ACL */
5132861a
JL
2210 if (((mode & S_IWUGO) == 0) &&
2211 (cifsInode->cifsAttrs & ATTR_READONLY) == 0) {
feb3e20c
JL
2212
2213 dosattr = cifsInode->cifsAttrs | ATTR_READONLY;
2214
5132861a
JL
2215 /* fix up mode if we're not using dynperm */
2216 if ((cifs_sb->mnt_cifs_flags & CIFS_MOUNT_DYNPERM) == 0)
2217 attrs->ia_mode = inode->i_mode & ~S_IWUGO;
2218 } else if ((mode & S_IWUGO) &&
2219 (cifsInode->cifsAttrs & ATTR_READONLY)) {
feb3e20c
JL
2220
2221 dosattr = cifsInode->cifsAttrs & ~ATTR_READONLY;
2222 /* Attributes of 0 are ignored */
2223 if (dosattr == 0)
2224 dosattr |= ATTR_NORMAL;
5132861a
JL
2225
2226 /* reset local inode permissions to normal */
2227 if (!(cifs_sb->mnt_cifs_flags & CIFS_MOUNT_DYNPERM)) {
2228 attrs->ia_mode &= ~(S_IALLUGO);
2229 if (S_ISDIR(inode->i_mode))
2230 attrs->ia_mode |=
2231 cifs_sb->mnt_dir_mode;
2232 else
2233 attrs->ia_mode |=
2234 cifs_sb->mnt_file_mode;
2235 }
2236 } else if (!(cifs_sb->mnt_cifs_flags & CIFS_MOUNT_DYNPERM)) {
2237 /* ignore mode change - ATTR_READONLY hasn't changed */
2238 attrs->ia_valid &= ~ATTR_MODE;
1da177e4 2239 }
1da177e4
LT
2240 }
2241
feb3e20c
JL
2242 if (attrs->ia_valid & (ATTR_MTIME|ATTR_ATIME|ATTR_CTIME) ||
2243 ((attrs->ia_valid & ATTR_MODE) && dosattr)) {
2244 rc = cifs_set_file_info(inode, attrs, xid, full_path, dosattr);
2245 /* BB: check for rc = -EOPNOTSUPP and switch to legacy mode */
1da177e4 2246
e30dcf3a
SF
2247 /* Even if error on time set, no sense failing the call if
2248 the server would set the time to a reasonable value anyway,
2249 and this check ensures that we are not being called from
2250 sys_utimes in which case we ought to fail the call back to
2251 the user when the server rejects the call */
fb8c4b14 2252 if ((rc) && (attrs->ia_valid &
feb3e20c 2253 (ATTR_MODE | ATTR_GID | ATTR_UID | ATTR_SIZE)))
e30dcf3a 2254 rc = 0;
1da177e4
LT
2255 }
2256
2257 /* do not need local check to inode_check_ok since the server does
2258 that */
1025774c
CH
2259 if (rc)
2260 goto cifs_setattr_exit;
2261
2262 if ((attrs->ia_valid & ATTR_SIZE) &&
1b947463
CH
2263 attrs->ia_size != i_size_read(inode))
2264 truncate_setsize(inode, attrs->ia_size);
1025774c
CH
2265
2266 setattr_copy(inode, attrs);
2267 mark_inode_dirty(inode);
1025774c 2268
e30dcf3a 2269cifs_setattr_exit:
1da177e4 2270 kfree(full_path);
6d5786a3 2271 free_xid(xid);
1da177e4
LT
2272 return rc;
2273}
2274
0510eeb7
JL
2275int
2276cifs_setattr(struct dentry *direntry, struct iattr *attrs)
2277{
2278 struct inode *inode = direntry->d_inode;
2279 struct cifs_sb_info *cifs_sb = CIFS_SB(inode->i_sb);
96daf2b0 2280 struct cifs_tcon *pTcon = cifs_sb_master_tcon(cifs_sb);
0510eeb7
JL
2281
2282 if (pTcon->unix_ext)
2283 return cifs_setattr_unix(direntry, attrs);
2284
2285 return cifs_setattr_nounix(direntry, attrs);
2286
2287 /* BB: add cifs_setattr_legacy for really old servers */
2288}
2289
99ee4dbd 2290#if 0
1da177e4
LT
2291void cifs_delete_inode(struct inode *inode)
2292{
b6b38f70 2293 cFYI(1, "In cifs_delete_inode, inode = 0x%p", inode);
1da177e4
LT
2294 /* may have to add back in if and when safe distributed caching of
2295 directories added e.g. via FindNotify */
2296}
99ee4dbd 2297#endif