]> git.proxmox.com Git - mirror_ubuntu-artful-kernel.git/blame - fs/cifs/inode.c
Print IP address of unresponsive server
[mirror_ubuntu-artful-kernel.git] / fs / cifs / inode.c
CommitLineData
1da177e4
LT
1/*
2 * fs/cifs/inode.c
3 *
f19159dc 4 * Copyright (C) International Business Machines Corp., 2002,2010
1da177e4
LT
5 * Author(s): Steve French (sfrench@us.ibm.com)
6 *
7 * This library is free software; you can redistribute it and/or modify
8 * it under the terms of the GNU Lesser General Public License as published
9 * by the Free Software Foundation; either version 2.1 of the License, or
10 * (at your option) any later version.
11 *
12 * This library is distributed in the hope that it will be useful,
13 * but WITHOUT ANY WARRANTY; without even the implied warranty of
14 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See
15 * the GNU Lesser General Public License for more details.
16 *
17 * You should have received a copy of the GNU Lesser General Public License
18 * along with this library; if not, write to the Free Software
19 * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
20 */
21#include <linux/fs.h>
1da177e4 22#include <linux/stat.h>
5a0e3ad6 23#include <linux/slab.h>
1da177e4 24#include <linux/pagemap.h>
4f73c7d3 25#include <linux/freezer.h>
1da177e4
LT
26#include <asm/div64.h>
27#include "cifsfs.h"
28#include "cifspdu.h"
29#include "cifsglob.h"
30#include "cifsproto.h"
31#include "cifs_debug.h"
32#include "cifs_fs_sb.h"
2baa2682 33#include "cifs_unicode.h"
9451a9a5 34#include "fscache.h"
1da177e4 35
70eff55d 36
01c64fea 37static void cifs_set_ops(struct inode *inode)
70eff55d
CH
38{
39 struct cifs_sb_info *cifs_sb = CIFS_SB(inode->i_sb);
40
41 switch (inode->i_mode & S_IFMT) {
42 case S_IFREG:
43 inode->i_op = &cifs_file_inode_ops;
44 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_DIRECT_IO) {
45 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_NO_BRL)
46 inode->i_fop = &cifs_file_direct_nobrl_ops;
47 else
48 inode->i_fop = &cifs_file_direct_ops;
8be7e6ba
PS
49 } else if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_STRICT_IO) {
50 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_NO_BRL)
51 inode->i_fop = &cifs_file_strict_nobrl_ops;
52 else
53 inode->i_fop = &cifs_file_strict_ops;
70eff55d
CH
54 } else if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_NO_BRL)
55 inode->i_fop = &cifs_file_nobrl_ops;
56 else { /* not direct, send byte range locks */
57 inode->i_fop = &cifs_file_ops;
58 }
59
70eff55d 60 /* check if server can support readpages */
0d424ad0 61 if (cifs_sb_master_tcon(cifs_sb)->ses->server->maxBuf <
70eff55d
CH
62 PAGE_CACHE_SIZE + MAX_CIFS_HDR_SIZE)
63 inode->i_data.a_ops = &cifs_addr_ops_smallbuf;
64 else
65 inode->i_data.a_ops = &cifs_addr_ops;
66 break;
67 case S_IFDIR:
bc5b6e24 68#ifdef CONFIG_CIFS_DFS_UPCALL
01c64fea 69 if (IS_AUTOMOUNT(inode)) {
7962670e
IM
70 inode->i_op = &cifs_dfs_referral_inode_operations;
71 } else {
bc5b6e24
SF
72#else /* NO DFS support, treat as a directory */
73 {
74#endif
7962670e
IM
75 inode->i_op = &cifs_dir_inode_ops;
76 inode->i_fop = &cifs_dir_ops;
77 }
70eff55d
CH
78 break;
79 case S_IFLNK:
80 inode->i_op = &cifs_symlink_inode_ops;
81 break;
82 default:
83 init_special_inode(inode, inode->i_mode, inode->i_rdev);
84 break;
85 }
86}
87
df2cf170
JL
88/* check inode attributes against fattr. If they don't match, tag the
89 * inode for cache invalidation
90 */
91static void
92cifs_revalidate_cache(struct inode *inode, struct cifs_fattr *fattr)
93{
94 struct cifsInodeInfo *cifs_i = CIFS_I(inode);
95
f96637be
JP
96 cifs_dbg(FYI, "%s: revalidating inode %llu\n",
97 __func__, cifs_i->uniqueid);
df2cf170
JL
98
99 if (inode->i_state & I_NEW) {
f96637be
JP
100 cifs_dbg(FYI, "%s: inode %llu is new\n",
101 __func__, cifs_i->uniqueid);
df2cf170
JL
102 return;
103 }
104
105 /* don't bother with revalidation if we have an oplock */
18cceb6a 106 if (CIFS_CACHE_READ(cifs_i)) {
f96637be
JP
107 cifs_dbg(FYI, "%s: inode %llu is oplocked\n",
108 __func__, cifs_i->uniqueid);
df2cf170
JL
109 return;
110 }
111
112 /* revalidate if mtime or size have changed */
113 if (timespec_equal(&inode->i_mtime, &fattr->cf_mtime) &&
114 cifs_i->server_eof == fattr->cf_eof) {
f96637be
JP
115 cifs_dbg(FYI, "%s: inode %llu is unchanged\n",
116 __func__, cifs_i->uniqueid);
df2cf170
JL
117 return;
118 }
119
f96637be
JP
120 cifs_dbg(FYI, "%s: invalidating inode %llu mapping\n",
121 __func__, cifs_i->uniqueid);
aff8d5ca 122 set_bit(CIFS_INO_INVALID_MAPPING, &cifs_i->flags);
df2cf170
JL
123}
124
74d290da
JM
125/*
126 * copy nlink to the inode, unless it wasn't provided. Provide
127 * sane values if we don't have an existing one and none was provided
128 */
129static void
130cifs_nlink_fattr_to_inode(struct inode *inode, struct cifs_fattr *fattr)
131{
132 /*
133 * if we're in a situation where we can't trust what we
134 * got from the server (readdir, some non-unix cases)
135 * fake reasonable values
136 */
137 if (fattr->cf_flags & CIFS_FATTR_UNKNOWN_NLINK) {
138 /* only provide fake values on a new inode */
139 if (inode->i_state & I_NEW) {
140 if (fattr->cf_cifsattrs & ATTR_DIRECTORY)
141 set_nlink(inode, 2);
142 else
143 set_nlink(inode, 1);
144 }
145 return;
146 }
147
148 /* we trust the server, so update it */
149 set_nlink(inode, fattr->cf_nlink);
150}
151
cc0bad75
JL
152/* populate an inode with info from a cifs_fattr struct */
153void
154cifs_fattr_to_inode(struct inode *inode, struct cifs_fattr *fattr)
75f12983 155{
cc0bad75 156 struct cifsInodeInfo *cifs_i = CIFS_I(inode);
0b8f18e3 157 struct cifs_sb_info *cifs_sb = CIFS_SB(inode->i_sb);
cc0bad75 158
df2cf170
JL
159 cifs_revalidate_cache(inode, fattr);
160
b7ca6928 161 spin_lock(&inode->i_lock);
cc0bad75
JL
162 inode->i_atime = fattr->cf_atime;
163 inode->i_mtime = fattr->cf_mtime;
164 inode->i_ctime = fattr->cf_ctime;
cc0bad75 165 inode->i_rdev = fattr->cf_rdev;
74d290da 166 cifs_nlink_fattr_to_inode(inode, fattr);
cc0bad75
JL
167 inode->i_uid = fattr->cf_uid;
168 inode->i_gid = fattr->cf_gid;
169
0b8f18e3
JL
170 /* if dynperm is set, don't clobber existing mode */
171 if (inode->i_state & I_NEW ||
172 !(cifs_sb->mnt_cifs_flags & CIFS_MOUNT_DYNPERM))
173 inode->i_mode = fattr->cf_mode;
174
cc0bad75 175 cifs_i->cifsAttrs = fattr->cf_cifsattrs;
75f12983 176
0b8f18e3
JL
177 if (fattr->cf_flags & CIFS_FATTR_NEED_REVAL)
178 cifs_i->time = 0;
179 else
180 cifs_i->time = jiffies;
181
aff8d5ca
JL
182 if (fattr->cf_flags & CIFS_FATTR_DELETE_PENDING)
183 set_bit(CIFS_INO_DELETE_PENDING, &cifs_i->flags);
184 else
185 clear_bit(CIFS_INO_DELETE_PENDING, &cifs_i->flags);
cc0bad75 186
835a36ca 187 cifs_i->server_eof = fattr->cf_eof;
cc0bad75
JL
188 /*
189 * Can't safely change the file size here if the client is writing to
190 * it due to potential races.
191 */
cc0bad75
JL
192 if (is_size_safe_to_change(cifs_i, fattr->cf_eof)) {
193 i_size_write(inode, fattr->cf_eof);
194
195 /*
196 * i_blocks is not related to (i_size / i_blksize),
197 * but instead 512 byte (2**9) size is required for
198 * calculating num blocks.
199 */
200 inode->i_blocks = (512 - 1 + fattr->cf_bytes) >> 9;
201 }
202 spin_unlock(&inode->i_lock);
203
01c64fea
DH
204 if (fattr->cf_flags & CIFS_FATTR_DFS_REFERRAL)
205 inode->i_flags |= S_AUTOMOUNT;
c2b93e06
JL
206 if (inode->i_state & I_NEW)
207 cifs_set_ops(inode);
cc0bad75
JL
208}
209
4065c802
JL
210void
211cifs_fill_uniqueid(struct super_block *sb, struct cifs_fattr *fattr)
212{
213 struct cifs_sb_info *cifs_sb = CIFS_SB(sb);
214
215 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_SERVER_INUM)
216 return;
217
218 fattr->cf_uniqueid = iunique(sb, ROOT_I);
219}
220
cc0bad75
JL
221/* Fill a cifs_fattr struct with info from FILE_UNIX_BASIC_INFO. */
222void
223cifs_unix_basic_to_fattr(struct cifs_fattr *fattr, FILE_UNIX_BASIC_INFO *info,
224 struct cifs_sb_info *cifs_sb)
225{
226 memset(fattr, 0, sizeof(*fattr));
227 fattr->cf_uniqueid = le64_to_cpu(info->UniqueId);
228 fattr->cf_bytes = le64_to_cpu(info->NumOfBytes);
229 fattr->cf_eof = le64_to_cpu(info->EndOfFile);
230
231 fattr->cf_atime = cifs_NTtimeToUnix(info->LastAccessTime);
232 fattr->cf_mtime = cifs_NTtimeToUnix(info->LastModificationTime);
233 fattr->cf_ctime = cifs_NTtimeToUnix(info->LastStatusChange);
234 fattr->cf_mode = le64_to_cpu(info->Permissions);
75f12983
CH
235
236 /*
237 * Since we set the inode type below we need to mask off
238 * to avoid strange results if bits set above.
239 */
cc0bad75 240 fattr->cf_mode &= ~S_IFMT;
75f12983
CH
241 switch (le32_to_cpu(info->Type)) {
242 case UNIX_FILE:
cc0bad75
JL
243 fattr->cf_mode |= S_IFREG;
244 fattr->cf_dtype = DT_REG;
75f12983
CH
245 break;
246 case UNIX_SYMLINK:
cc0bad75
JL
247 fattr->cf_mode |= S_IFLNK;
248 fattr->cf_dtype = DT_LNK;
75f12983
CH
249 break;
250 case UNIX_DIR:
cc0bad75
JL
251 fattr->cf_mode |= S_IFDIR;
252 fattr->cf_dtype = DT_DIR;
75f12983
CH
253 break;
254 case UNIX_CHARDEV:
cc0bad75
JL
255 fattr->cf_mode |= S_IFCHR;
256 fattr->cf_dtype = DT_CHR;
257 fattr->cf_rdev = MKDEV(le64_to_cpu(info->DevMajor),
258 le64_to_cpu(info->DevMinor) & MINORMASK);
75f12983
CH
259 break;
260 case UNIX_BLOCKDEV:
cc0bad75
JL
261 fattr->cf_mode |= S_IFBLK;
262 fattr->cf_dtype = DT_BLK;
263 fattr->cf_rdev = MKDEV(le64_to_cpu(info->DevMajor),
264 le64_to_cpu(info->DevMinor) & MINORMASK);
75f12983
CH
265 break;
266 case UNIX_FIFO:
cc0bad75
JL
267 fattr->cf_mode |= S_IFIFO;
268 fattr->cf_dtype = DT_FIFO;
75f12983
CH
269 break;
270 case UNIX_SOCKET:
cc0bad75
JL
271 fattr->cf_mode |= S_IFSOCK;
272 fattr->cf_dtype = DT_SOCK;
75f12983
CH
273 break;
274 default:
275 /* safest to call it a file if we do not know */
cc0bad75
JL
276 fattr->cf_mode |= S_IFREG;
277 fattr->cf_dtype = DT_REG;
f96637be 278 cifs_dbg(FYI, "unknown type %d\n", le32_to_cpu(info->Type));
75f12983
CH
279 break;
280 }
281
46bbc25f
EB
282 fattr->cf_uid = cifs_sb->mnt_uid;
283 if (!(cifs_sb->mnt_cifs_flags & CIFS_MOUNT_OVERR_UID)) {
284 u64 id = le64_to_cpu(info->Uid);
4a2c8cf5
EB
285 if (id < ((uid_t)-1)) {
286 kuid_t uid = make_kuid(&init_user_ns, id);
287 if (uid_valid(uid))
288 fattr->cf_uid = uid;
289 }
46bbc25f
EB
290 }
291
292 fattr->cf_gid = cifs_sb->mnt_gid;
293 if (!(cifs_sb->mnt_cifs_flags & CIFS_MOUNT_OVERR_GID)) {
294 u64 id = le64_to_cpu(info->Gid);
4a2c8cf5
EB
295 if (id < ((gid_t)-1)) {
296 kgid_t gid = make_kgid(&init_user_ns, id);
297 if (gid_valid(gid))
298 fattr->cf_gid = gid;
299 }
46bbc25f 300 }
75f12983 301
cc0bad75 302 fattr->cf_nlink = le64_to_cpu(info->Nlinks);
75f12983
CH
303}
304
b9a3260f 305/*
cc0bad75
JL
306 * Fill a cifs_fattr struct with fake inode info.
307 *
308 * Needed to setup cifs_fattr data for the directory which is the
309 * junction to the new submount (ie to setup the fake directory
310 * which represents a DFS referral).
b9a3260f 311 */
f1230c97 312static void
cc0bad75 313cifs_create_dfs_fattr(struct cifs_fattr *fattr, struct super_block *sb)
0e4bbde9 314{
cc0bad75 315 struct cifs_sb_info *cifs_sb = CIFS_SB(sb);
0e4bbde9 316
f96637be 317 cifs_dbg(FYI, "creating fake fattr for DFS referral\n");
cc0bad75
JL
318
319 memset(fattr, 0, sizeof(*fattr));
320 fattr->cf_mode = S_IFDIR | S_IXUGO | S_IRWXU;
321 fattr->cf_uid = cifs_sb->mnt_uid;
322 fattr->cf_gid = cifs_sb->mnt_gid;
323 fattr->cf_atime = CURRENT_TIME;
324 fattr->cf_ctime = CURRENT_TIME;
325 fattr->cf_mtime = CURRENT_TIME;
326 fattr->cf_nlink = 2;
327 fattr->cf_flags |= CIFS_FATTR_DFS_REFERRAL;
0e4bbde9
SF
328}
329
4ad65044
PS
330static int
331cifs_get_file_info_unix(struct file *filp)
abab095d
JL
332{
333 int rc;
6d5786a3 334 unsigned int xid;
abab095d
JL
335 FILE_UNIX_BASIC_INFO find_data;
336 struct cifs_fattr fattr;
496ad9aa 337 struct inode *inode = file_inode(filp);
abab095d 338 struct cifs_sb_info *cifs_sb = CIFS_SB(inode->i_sb);
c21dfb69 339 struct cifsFileInfo *cfile = filp->private_data;
96daf2b0 340 struct cifs_tcon *tcon = tlink_tcon(cfile->tlink);
abab095d 341
6d5786a3 342 xid = get_xid();
4b4de76e 343 rc = CIFSSMBUnixQFileInfo(xid, tcon, cfile->fid.netfid, &find_data);
abab095d
JL
344 if (!rc) {
345 cifs_unix_basic_to_fattr(&fattr, &find_data, cifs_sb);
346 } else if (rc == -EREMOTE) {
347 cifs_create_dfs_fattr(&fattr, inode->i_sb);
348 rc = 0;
349 }
350
351 cifs_fattr_to_inode(inode, &fattr);
6d5786a3 352 free_xid(xid);
abab095d
JL
353 return rc;
354}
355
1da177e4 356int cifs_get_inode_info_unix(struct inode **pinode,
cc0bad75 357 const unsigned char *full_path,
6d5786a3 358 struct super_block *sb, unsigned int xid)
1da177e4 359{
cc0bad75 360 int rc;
0e4bbde9 361 FILE_UNIX_BASIC_INFO find_data;
cc0bad75 362 struct cifs_fattr fattr;
96daf2b0 363 struct cifs_tcon *tcon;
7ffec372 364 struct tcon_link *tlink;
1da177e4 365 struct cifs_sb_info *cifs_sb = CIFS_SB(sb);
1da177e4 366
f96637be 367 cifs_dbg(FYI, "Getting info on %s\n", full_path);
7962670e 368
7ffec372
JL
369 tlink = cifs_sb_tlink(cifs_sb);
370 if (IS_ERR(tlink))
371 return PTR_ERR(tlink);
372 tcon = tlink_tcon(tlink);
373
1da177e4 374 /* could have done a find first instead but this returns more info */
cc0bad75 375 rc = CIFSSMBUnixQPathInfo(xid, tcon, full_path, &find_data,
bc8ebdc4 376 cifs_sb->local_nls, cifs_remap(cifs_sb));
7ffec372 377 cifs_put_tlink(tlink);
e911d0cc 378
cc0bad75
JL
379 if (!rc) {
380 cifs_unix_basic_to_fattr(&fattr, &find_data, cifs_sb);
381 } else if (rc == -EREMOTE) {
382 cifs_create_dfs_fattr(&fattr, sb);
383 rc = 0;
384 } else {
385 return rc;
386 }
1da177e4 387
1b12b9c1
SM
388 /* check for Minshall+French symlinks */
389 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_MF_SYMLINKS) {
cb084b1a
SP
390 int tmprc = check_mf_symlink(xid, tcon, cifs_sb, &fattr,
391 full_path);
1b12b9c1 392 if (tmprc)
cb084b1a 393 cifs_dbg(FYI, "check_mf_symlink: %d\n", tmprc);
1b12b9c1
SM
394 }
395
0e4bbde9 396 if (*pinode == NULL) {
cc0bad75 397 /* get new inode */
4065c802 398 cifs_fill_uniqueid(sb, &fattr);
cc0bad75
JL
399 *pinode = cifs_iget(sb, &fattr);
400 if (!*pinode)
0e4bbde9 401 rc = -ENOMEM;
cc0bad75
JL
402 } else {
403 /* we already have inode, update it */
7196ac11
NA
404
405 /* if uniqueid is different, return error */
406 if (unlikely(cifs_sb->mnt_cifs_flags & CIFS_MOUNT_SERVER_INUM &&
407 CIFS_I(*pinode)->uniqueid != fattr.cf_uniqueid)) {
408 rc = -ESTALE;
409 goto cgiiu_exit;
410 }
411
412 /* if filetype is different, return error */
413 if (unlikely(((*pinode)->i_mode & S_IFMT) !=
414 (fattr.cf_mode & S_IFMT))) {
415 rc = -ESTALE;
416 goto cgiiu_exit;
417 }
418
cc0bad75 419 cifs_fattr_to_inode(*pinode, &fattr);
0e4bbde9 420 }
1da177e4 421
7196ac11 422cgiiu_exit:
1da177e4
LT
423 return rc;
424}
425
0b8f18e3 426static int
0360d605 427cifs_sfu_type(struct cifs_fattr *fattr, const char *path,
6d5786a3 428 struct cifs_sb_info *cifs_sb, unsigned int xid)
d6e2f2a4
SF
429{
430 int rc;
db8b631d 431 __u32 oplock;
7ffec372 432 struct tcon_link *tlink;
96daf2b0 433 struct cifs_tcon *tcon;
d81b8a40
PS
434 struct cifs_fid fid;
435 struct cifs_open_parms oparms;
d4ffff1f 436 struct cifs_io_parms io_parms;
86c96b4b 437 char buf[24];
d6e2f2a4 438 unsigned int bytes_read;
fb8c4b14 439 char *pbuf;
0360d605 440 int buf_type = CIFS_NO_BUFFER;
d6e2f2a4
SF
441
442 pbuf = buf;
443
0b8f18e3
JL
444 fattr->cf_mode &= ~S_IFMT;
445
446 if (fattr->cf_eof == 0) {
447 fattr->cf_mode |= S_IFIFO;
448 fattr->cf_dtype = DT_FIFO;
d6e2f2a4 449 return 0;
0b8f18e3
JL
450 } else if (fattr->cf_eof < 8) {
451 fattr->cf_mode |= S_IFREG;
452 fattr->cf_dtype = DT_REG;
d6e2f2a4
SF
453 return -EINVAL; /* EOPNOTSUPP? */
454 }
50c2f753 455
7ffec372
JL
456 tlink = cifs_sb_tlink(cifs_sb);
457 if (IS_ERR(tlink))
458 return PTR_ERR(tlink);
459 tcon = tlink_tcon(tlink);
460
d81b8a40
PS
461 oparms.tcon = tcon;
462 oparms.cifs_sb = cifs_sb;
463 oparms.desired_access = GENERIC_READ;
464 oparms.create_options = CREATE_NOT_DIR;
465 oparms.disposition = FILE_OPEN;
466 oparms.path = path;
467 oparms.fid = &fid;
468 oparms.reconnect = false;
469
db8b631d
SF
470 if (tcon->ses->server->oplocks)
471 oplock = REQ_OPLOCK;
472 else
473 oplock = 0;
474 rc = tcon->ses->server->ops->open(xid, &oparms, &oplock, NULL);
0360d605 475 if (rc) {
db8b631d 476 cifs_dbg(FYI, "check sfu type of %s, open rc = %d\n", path, rc);
0360d605
PS
477 cifs_put_tlink(tlink);
478 return rc;
479 }
480
481 /* Read header */
d81b8a40 482 io_parms.netfid = fid.netfid;
0360d605
PS
483 io_parms.pid = current->tgid;
484 io_parms.tcon = tcon;
485 io_parms.offset = 0;
486 io_parms.length = 24;
487
db8b631d
SF
488 rc = tcon->ses->server->ops->sync_read(xid, &fid, &io_parms,
489 &bytes_read, &pbuf, &buf_type);
0360d605
PS
490 if ((rc == 0) && (bytes_read >= 8)) {
491 if (memcmp("IntxBLK", pbuf, 8) == 0) {
492 cifs_dbg(FYI, "Block device\n");
493 fattr->cf_mode |= S_IFBLK;
494 fattr->cf_dtype = DT_BLK;
495 if (bytes_read == 24) {
496 /* we have enough to decode dev num */
497 __u64 mjr; /* major */
498 __u64 mnr; /* minor */
499 mjr = le64_to_cpu(*(__le64 *)(pbuf+8));
500 mnr = le64_to_cpu(*(__le64 *)(pbuf+16));
501 fattr->cf_rdev = MKDEV(mjr, mnr);
86c96b4b 502 }
0360d605
PS
503 } else if (memcmp("IntxCHR", pbuf, 8) == 0) {
504 cifs_dbg(FYI, "Char device\n");
505 fattr->cf_mode |= S_IFCHR;
506 fattr->cf_dtype = DT_CHR;
507 if (bytes_read == 24) {
508 /* we have enough to decode dev num */
509 __u64 mjr; /* major */
510 __u64 mnr; /* minor */
511 mjr = le64_to_cpu(*(__le64 *)(pbuf+8));
512 mnr = le64_to_cpu(*(__le64 *)(pbuf+16));
513 fattr->cf_rdev = MKDEV(mjr, mnr);
514 }
515 } else if (memcmp("IntxLNK", pbuf, 7) == 0) {
516 cifs_dbg(FYI, "Symlink\n");
517 fattr->cf_mode |= S_IFLNK;
518 fattr->cf_dtype = DT_LNK;
3020a1f5 519 } else {
0360d605 520 fattr->cf_mode |= S_IFREG; /* file? */
0b8f18e3 521 fattr->cf_dtype = DT_REG;
0360d605 522 rc = -EOPNOTSUPP;
fb8c4b14 523 }
0360d605
PS
524 } else {
525 fattr->cf_mode |= S_IFREG; /* then it is a file */
526 fattr->cf_dtype = DT_REG;
527 rc = -EOPNOTSUPP; /* or some unknown SFU type */
d6e2f2a4 528 }
db8b631d
SF
529
530 tcon->ses->server->ops->close(xid, tcon, &fid);
7ffec372 531 cifs_put_tlink(tlink);
d6e2f2a4 532 return rc;
d6e2f2a4
SF
533}
534
9e294f1c
SF
535#define SFBITS_MASK (S_ISVTX | S_ISGID | S_ISUID) /* SETFILEBITS valid bits */
536
0b8f18e3
JL
537/*
538 * Fetch mode bits as provided by SFU.
539 *
540 * FIXME: Doesn't this clobber the type bit we got from cifs_sfu_type ?
541 */
542static int cifs_sfu_mode(struct cifs_fattr *fattr, const unsigned char *path,
6d5786a3 543 struct cifs_sb_info *cifs_sb, unsigned int xid)
9e294f1c 544{
3020a1f5 545#ifdef CONFIG_CIFS_XATTR
9e294f1c
SF
546 ssize_t rc;
547 char ea_value[4];
548 __u32 mode;
7ffec372 549 struct tcon_link *tlink;
96daf2b0 550 struct cifs_tcon *tcon;
7ffec372
JL
551
552 tlink = cifs_sb_tlink(cifs_sb);
553 if (IS_ERR(tlink))
554 return PTR_ERR(tlink);
555 tcon = tlink_tcon(tlink);
9e294f1c 556
d979f3b0
SF
557 if (tcon->ses->server->ops->query_all_EAs == NULL) {
558 cifs_put_tlink(tlink);
559 return -EOPNOTSUPP;
560 }
561
562 rc = tcon->ses->server->ops->query_all_EAs(xid, tcon, path,
563 "SETFILEBITS", ea_value, 4 /* size of buf */,
564 cifs_sb->local_nls,
2baa2682 565 cifs_remap(cifs_sb));
7ffec372 566 cifs_put_tlink(tlink);
4523cc30 567 if (rc < 0)
9e294f1c
SF
568 return (int)rc;
569 else if (rc > 3) {
570 mode = le32_to_cpu(*((__le32 *)ea_value));
0b8f18e3 571 fattr->cf_mode &= ~SFBITS_MASK;
f96637be
JP
572 cifs_dbg(FYI, "special bits 0%o org mode 0%o\n",
573 mode, fattr->cf_mode);
0b8f18e3 574 fattr->cf_mode = (mode & SFBITS_MASK) | fattr->cf_mode;
f96637be 575 cifs_dbg(FYI, "special mode bits 0%o\n", mode);
9e294f1c 576 }
0b8f18e3
JL
577
578 return 0;
3020a1f5
SF
579#else
580 return -EOPNOTSUPP;
581#endif
9e294f1c
SF
582}
583
0b8f18e3 584/* Fill a cifs_fattr struct with info from FILE_ALL_INFO */
f1230c97 585static void
0b8f18e3 586cifs_all_info_to_fattr(struct cifs_fattr *fattr, FILE_ALL_INFO *info,
eb85d94b
PS
587 struct cifs_sb_info *cifs_sb, bool adjust_tz,
588 bool symlink)
b9a3260f 589{
96daf2b0 590 struct cifs_tcon *tcon = cifs_sb_master_tcon(cifs_sb);
0d424ad0 591
0b8f18e3
JL
592 memset(fattr, 0, sizeof(*fattr));
593 fattr->cf_cifsattrs = le32_to_cpu(info->Attributes);
594 if (info->DeletePending)
595 fattr->cf_flags |= CIFS_FATTR_DELETE_PENDING;
596
597 if (info->LastAccessTime)
598 fattr->cf_atime = cifs_NTtimeToUnix(info->LastAccessTime);
599 else
600 fattr->cf_atime = CURRENT_TIME;
601
602 fattr->cf_ctime = cifs_NTtimeToUnix(info->ChangeTime);
603 fattr->cf_mtime = cifs_NTtimeToUnix(info->LastWriteTime);
604
605 if (adjust_tz) {
0d424ad0
JL
606 fattr->cf_ctime.tv_sec += tcon->ses->server->timeAdj;
607 fattr->cf_mtime.tv_sec += tcon->ses->server->timeAdj;
0b8f18e3
JL
608 }
609
610 fattr->cf_eof = le64_to_cpu(info->EndOfFile);
611 fattr->cf_bytes = le64_to_cpu(info->AllocationSize);
20054bd6 612 fattr->cf_createtime = le64_to_cpu(info->CreationTime);
0b8f18e3 613
74d290da 614 fattr->cf_nlink = le32_to_cpu(info->NumberOfLinks);
eb85d94b
PS
615
616 if (symlink) {
617 fattr->cf_mode = S_IFLNK;
618 fattr->cf_dtype = DT_LNK;
619 } else if (fattr->cf_cifsattrs & ATTR_DIRECTORY) {
0b8f18e3
JL
620 fattr->cf_mode = S_IFDIR | cifs_sb->mnt_dir_mode;
621 fattr->cf_dtype = DT_DIR;
6de2ce42
PS
622 /*
623 * Server can return wrong NumberOfLinks value for directories
624 * when Unix extensions are disabled - fake it.
625 */
74d290da
JM
626 if (!tcon->unix_ext)
627 fattr->cf_flags |= CIFS_FATTR_UNKNOWN_NLINK;
0b8f18e3
JL
628 } else {
629 fattr->cf_mode = S_IFREG | cifs_sb->mnt_file_mode;
630 fattr->cf_dtype = DT_REG;
0b8f18e3 631
d0c280d2
JL
632 /* clear write bits if ATTR_READONLY is set */
633 if (fattr->cf_cifsattrs & ATTR_READONLY)
634 fattr->cf_mode &= ~(S_IWUGO);
0b8f18e3 635
74d290da
JM
636 /*
637 * Don't accept zero nlink from non-unix servers unless
638 * delete is pending. Instead mark it as unknown.
639 */
640 if ((fattr->cf_nlink < 1) && !tcon->unix_ext &&
641 !info->DeletePending) {
642 cifs_dbg(1, "bogus file nlink value %u\n",
6658b9f7 643 fattr->cf_nlink);
74d290da 644 fattr->cf_flags |= CIFS_FATTR_UNKNOWN_NLINK;
6658b9f7 645 }
6de2ce42 646 }
0b8f18e3
JL
647
648 fattr->cf_uid = cifs_sb->mnt_uid;
649 fattr->cf_gid = cifs_sb->mnt_gid;
b9a3260f
SF
650}
651
4ad65044
PS
652static int
653cifs_get_file_info(struct file *filp)
abab095d
JL
654{
655 int rc;
6d5786a3 656 unsigned int xid;
abab095d
JL
657 FILE_ALL_INFO find_data;
658 struct cifs_fattr fattr;
496ad9aa 659 struct inode *inode = file_inode(filp);
abab095d 660 struct cifs_sb_info *cifs_sb = CIFS_SB(inode->i_sb);
c21dfb69 661 struct cifsFileInfo *cfile = filp->private_data;
96daf2b0 662 struct cifs_tcon *tcon = tlink_tcon(cfile->tlink);
4ad65044
PS
663 struct TCP_Server_Info *server = tcon->ses->server;
664
665 if (!server->ops->query_file_info)
666 return -ENOSYS;
abab095d 667
6d5786a3 668 xid = get_xid();
4ad65044 669 rc = server->ops->query_file_info(xid, tcon, &cfile->fid, &find_data);
42274bb2
PS
670 switch (rc) {
671 case 0:
eb85d94b
PS
672 cifs_all_info_to_fattr(&fattr, &find_data, cifs_sb, false,
673 false);
42274bb2
PS
674 break;
675 case -EREMOTE:
676 cifs_create_dfs_fattr(&fattr, inode->i_sb);
677 rc = 0;
678 break;
679 case -EOPNOTSUPP:
680 case -EINVAL:
abab095d
JL
681 /*
682 * FIXME: legacy server -- fall back to path-based call?
ff215713
SF
683 * for now, just skip revalidating and mark inode for
684 * immediate reval.
685 */
abab095d
JL
686 rc = 0;
687 CIFS_I(inode)->time = 0;
42274bb2 688 default:
abab095d 689 goto cgfi_exit;
42274bb2 690 }
abab095d
JL
691
692 /*
693 * don't bother with SFU junk here -- just mark inode as needing
694 * revalidation.
695 */
abab095d
JL
696 fattr.cf_uniqueid = CIFS_I(inode)->uniqueid;
697 fattr.cf_flags |= CIFS_FATTR_NEED_REVAL;
698 cifs_fattr_to_inode(inode, &fattr);
699cgfi_exit:
6d5786a3 700 free_xid(xid);
abab095d
JL
701 return rc;
702}
703
1208ef1f
PS
704int
705cifs_get_inode_info(struct inode **inode, const char *full_path,
706 FILE_ALL_INFO *data, struct super_block *sb, int xid,
42eacf9e 707 const struct cifs_fid *fid)
1da177e4 708{
c052e2b4
SP
709 bool validinum = false;
710 __u16 srchflgs;
711 int rc = 0, tmprc = ENOSYS;
1208ef1f
PS
712 struct cifs_tcon *tcon;
713 struct TCP_Server_Info *server;
7ffec372 714 struct tcon_link *tlink;
1da177e4 715 struct cifs_sb_info *cifs_sb = CIFS_SB(sb);
1da177e4 716 char *buf = NULL;
1208ef1f 717 bool adjust_tz = false;
0b8f18e3 718 struct cifs_fattr fattr;
c052e2b4 719 struct cifs_search_info *srchinf = NULL;
eb85d94b 720 bool symlink = false;
1da177e4 721
7ffec372
JL
722 tlink = cifs_sb_tlink(cifs_sb);
723 if (IS_ERR(tlink))
724 return PTR_ERR(tlink);
1208ef1f
PS
725 tcon = tlink_tcon(tlink);
726 server = tcon->ses->server;
7ffec372 727
f96637be 728 cifs_dbg(FYI, "Getting info on %s\n", full_path);
1da177e4 729
1208ef1f 730 if ((data == NULL) && (*inode != NULL)) {
18cceb6a 731 if (CIFS_CACHE_READ(CIFS_I(*inode))) {
f96637be 732 cifs_dbg(FYI, "No need to revalidate cached inode sizes\n");
7ffec372 733 goto cgii_exit;
1da177e4
LT
734 }
735 }
736
1208ef1f
PS
737 /* if inode info is not passed, get it from server */
738 if (data == NULL) {
739 if (!server->ops->query_path_info) {
740 rc = -ENOSYS;
741 goto cgii_exit;
742 }
1da177e4 743 buf = kmalloc(sizeof(FILE_ALL_INFO), GFP_KERNEL);
7ffec372
JL
744 if (buf == NULL) {
745 rc = -ENOMEM;
746 goto cgii_exit;
747 }
1208ef1f
PS
748 data = (FILE_ALL_INFO *)buf;
749 rc = server->ops->query_path_info(xid, tcon, cifs_sb, full_path,
eb85d94b 750 data, &adjust_tz, &symlink);
1da177e4 751 }
0b8f18e3
JL
752
753 if (!rc) {
eb85d94b
PS
754 cifs_all_info_to_fattr(&fattr, data, cifs_sb, adjust_tz,
755 symlink);
0b8f18e3
JL
756 } else if (rc == -EREMOTE) {
757 cifs_create_dfs_fattr(&fattr, sb);
b9a3260f 758 rc = 0;
c052e2b4
SP
759 } else if (rc == -EACCES && backup_cred(cifs_sb)) {
760 srchinf = kzalloc(sizeof(struct cifs_search_info),
761 GFP_KERNEL);
762 if (srchinf == NULL) {
763 rc = -ENOMEM;
764 goto cgii_exit;
765 }
766
767 srchinf->endOfSearch = false;
768 srchinf->info_level = SMB_FIND_FILE_ID_FULL_DIR_INFO;
769
770 srchflgs = CIFS_SEARCH_CLOSE_ALWAYS |
771 CIFS_SEARCH_CLOSE_AT_END |
772 CIFS_SEARCH_BACKUP_SEARCH;
773
774 rc = CIFSFindFirst(xid, tcon, full_path,
775 cifs_sb, NULL, srchflgs, srchinf, false);
776 if (!rc) {
777 data =
778 (FILE_ALL_INFO *)srchinf->srch_entries_start;
779
780 cifs_dir_info_to_fattr(&fattr,
781 (FILE_DIRECTORY_INFO *)data, cifs_sb);
782 fattr.cf_uniqueid = le64_to_cpu(
783 ((SEARCH_ID_FULL_DIR_INFO *)data)->UniqueId);
784 validinum = true;
785
786 cifs_buf_release(srchinf->ntwrk_buf_start);
787 }
788 kfree(srchinf);
4c5930e8
SF
789 if (rc)
790 goto cgii_exit;
c052e2b4 791 } else
7962670e 792 goto cgii_exit;
1da177e4 793
0b8f18e3
JL
794 /*
795 * If an inode wasn't passed in, then get the inode number
796 *
797 * Is an i_ino of zero legal? Can we use that to check if the server
798 * supports returning inode numbers? Are there other sanity checks we
799 * can use to ensure that the server is really filling in that field?
0b8f18e3 800 */
1208ef1f 801 if (*inode == NULL) {
b9a3260f 802 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_SERVER_INUM) {
c052e2b4
SP
803 if (validinum == false) {
804 if (server->ops->get_srv_inum)
805 tmprc = server->ops->get_srv_inum(xid,
806 tcon, cifs_sb, full_path,
807 &fattr.cf_uniqueid, data);
808 if (tmprc) {
f96637be
JP
809 cifs_dbg(FYI, "GetSrvInodeNum rc %d\n",
810 tmprc);
c052e2b4
SP
811 fattr.cf_uniqueid = iunique(sb, ROOT_I);
812 cifs_autodisable_serverino(cifs_sb);
813 }
132ac7b7 814 }
c052e2b4 815 } else
0b8f18e3 816 fattr.cf_uniqueid = iunique(sb, ROOT_I);
c052e2b4 817 } else
1208ef1f 818 fattr.cf_uniqueid = CIFS_I(*inode)->uniqueid;
b9a3260f 819
0b8f18e3
JL
820 /* query for SFU type info if supported and needed */
821 if (fattr.cf_cifsattrs & ATTR_SYSTEM &&
822 cifs_sb->mnt_cifs_flags & CIFS_MOUNT_UNX_EMUL) {
823 tmprc = cifs_sfu_type(&fattr, full_path, cifs_sb, xid);
824 if (tmprc)
f96637be 825 cifs_dbg(FYI, "cifs_sfu_type failed: %d\n", tmprc);
b9a3260f 826 }
1da177e4 827
79df1bae 828#ifdef CONFIG_CIFS_ACL
b9a3260f
SF
829 /* fill in 0777 bits from ACL */
830 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_CIFS_ACL) {
1208ef1f 831 rc = cifs_acl_to_fattr(cifs_sb, &fattr, *inode, full_path, fid);
78415d2d 832 if (rc) {
f96637be
JP
833 cifs_dbg(FYI, "%s: Getting ACL failed with error: %d\n",
834 __func__, rc);
78415d2d
SP
835 goto cgii_exit;
836 }
b9a3260f 837 }
79df1bae 838#endif /* CONFIG_CIFS_ACL */
b9a3260f 839
0b8f18e3
JL
840 /* fill in remaining high mode bits e.g. SUID, VTX */
841 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_UNX_EMUL)
842 cifs_sfu_mode(&fattr, full_path, cifs_sb, xid);
b9a3260f 843
1b12b9c1
SM
844 /* check for Minshall+French symlinks */
845 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_MF_SYMLINKS) {
cb084b1a
SP
846 tmprc = check_mf_symlink(xid, tcon, cifs_sb, &fattr,
847 full_path);
1b12b9c1 848 if (tmprc)
cb084b1a 849 cifs_dbg(FYI, "check_mf_symlink: %d\n", tmprc);
1b12b9c1
SM
850 }
851
1208ef1f
PS
852 if (!*inode) {
853 *inode = cifs_iget(sb, &fattr);
854 if (!*inode)
0b8f18e3
JL
855 rc = -ENOMEM;
856 } else {
7196ac11
NA
857 /* we already have inode, update it */
858
859 /* if filetype is different, return error */
860 if (unlikely(((*inode)->i_mode & S_IFMT) !=
861 (fattr.cf_mode & S_IFMT))) {
862 rc = -ESTALE;
863 goto cgii_exit;
864 }
865
1208ef1f 866 cifs_fattr_to_inode(*inode, &fattr);
0b8f18e3 867 }
b9a3260f 868
7962670e 869cgii_exit:
1da177e4 870 kfree(buf);
7ffec372 871 cifs_put_tlink(tlink);
1da177e4
LT
872 return rc;
873}
874
7f8ed420
SF
875static const struct inode_operations cifs_ipc_inode_ops = {
876 .lookup = cifs_lookup,
877};
878
cc0bad75
JL
879static int
880cifs_find_inode(struct inode *inode, void *opaque)
881{
882 struct cifs_fattr *fattr = (struct cifs_fattr *) opaque;
883
f30b9c11 884 /* don't match inode with different uniqueid */
cc0bad75
JL
885 if (CIFS_I(inode)->uniqueid != fattr->cf_uniqueid)
886 return 0;
887
20054bd6
JL
888 /* use createtime like an i_generation field */
889 if (CIFS_I(inode)->createtime != fattr->cf_createtime)
890 return 0;
891
f30b9c11
JL
892 /* don't match inode of different type */
893 if ((inode->i_mode & S_IFMT) != (fattr->cf_mode & S_IFMT))
894 return 0;
895
5acfec25 896 /* if it's not a directory or has no dentries, then flag it */
b3d9b7a3 897 if (S_ISDIR(inode->i_mode) && !hlist_empty(&inode->i_dentry))
3d694380 898 fattr->cf_flags |= CIFS_FATTR_INO_COLLISION;
3d694380 899
cc0bad75
JL
900 return 1;
901}
902
903static int
904cifs_init_inode(struct inode *inode, void *opaque)
905{
906 struct cifs_fattr *fattr = (struct cifs_fattr *) opaque;
907
908 CIFS_I(inode)->uniqueid = fattr->cf_uniqueid;
20054bd6 909 CIFS_I(inode)->createtime = fattr->cf_createtime;
cc0bad75
JL
910 return 0;
911}
912
5acfec25
JL
913/*
914 * walk dentry list for an inode and report whether it has aliases that
915 * are hashed. We use this to determine if a directory inode can actually
916 * be used.
917 */
918static bool
919inode_has_hashed_dentries(struct inode *inode)
920{
921 struct dentry *dentry;
922
873feea0 923 spin_lock(&inode->i_lock);
946e51f2 924 hlist_for_each_entry(dentry, &inode->i_dentry, d_u.d_alias) {
5acfec25 925 if (!d_unhashed(dentry) || IS_ROOT(dentry)) {
873feea0 926 spin_unlock(&inode->i_lock);
5acfec25
JL
927 return true;
928 }
929 }
873feea0 930 spin_unlock(&inode->i_lock);
5acfec25
JL
931 return false;
932}
933
cc0bad75
JL
934/* Given fattrs, get a corresponding inode */
935struct inode *
936cifs_iget(struct super_block *sb, struct cifs_fattr *fattr)
937{
938 unsigned long hash;
939 struct inode *inode;
940
3d694380 941retry_iget5_locked:
f96637be 942 cifs_dbg(FYI, "looking for uniqueid=%llu\n", fattr->cf_uniqueid);
cc0bad75
JL
943
944 /* hash down to 32-bits on 32-bit arch */
945 hash = cifs_uniqueid_to_ino_t(fattr->cf_uniqueid);
946
947 inode = iget5_locked(sb, hash, cifs_find_inode, cifs_init_inode, fattr);
cc0bad75 948 if (inode) {
5acfec25 949 /* was there a potentially problematic inode collision? */
3d694380 950 if (fattr->cf_flags & CIFS_FATTR_INO_COLLISION) {
3d694380 951 fattr->cf_flags &= ~CIFS_FATTR_INO_COLLISION;
5acfec25
JL
952
953 if (inode_has_hashed_dentries(inode)) {
954 cifs_autodisable_serverino(CIFS_SB(sb));
955 iput(inode);
956 fattr->cf_uniqueid = iunique(sb, ROOT_I);
957 goto retry_iget5_locked;
958 }
3d694380
JL
959 }
960
cc0bad75
JL
961 cifs_fattr_to_inode(inode, fattr);
962 if (sb->s_flags & MS_NOATIME)
963 inode->i_flags |= S_NOATIME | S_NOCMTIME;
964 if (inode->i_state & I_NEW) {
965 inode->i_ino = hash;
0ccd4802 966#ifdef CONFIG_CIFS_FSCACHE
9451a9a5
SJ
967 /* initialize per-inode cache cookie pointer */
968 CIFS_I(inode)->fscache = NULL;
0ccd4802 969#endif
cc0bad75
JL
970 unlock_new_inode(inode);
971 }
972 }
973
974 return inode;
975}
976
1da177e4 977/* gets root inode */
9b6763e0 978struct inode *cifs_root_iget(struct super_block *sb)
1da177e4 979{
6d5786a3 980 unsigned int xid;
0d424ad0 981 struct cifs_sb_info *cifs_sb = CIFS_SB(sb);
cc0bad75 982 struct inode *inode = NULL;
ce634ab2 983 long rc;
96daf2b0 984 struct cifs_tcon *tcon = cifs_sb_master_tcon(cifs_sb);
ce634ab2 985
6d5786a3 986 xid = get_xid();
b5b374ea 987 if (tcon->unix_ext) {
f87d39d9 988 rc = cifs_get_inode_info_unix(&inode, "", sb, xid);
b5b374ea
SF
989 /* some servers mistakenly claim POSIX support */
990 if (rc != -EOPNOTSUPP)
991 goto iget_no_retry;
992 cifs_dbg(VFS, "server does not support POSIX extensions");
993 tcon->unix_ext = false;
994 }
995
996 rc = cifs_get_inode_info(&inode, "", NULL, sb, xid, NULL);
0b8f18e3 997
b5b374ea 998iget_no_retry:
a7851ce7
OS
999 if (!inode) {
1000 inode = ERR_PTR(rc);
1001 goto out;
1002 }
cc0bad75 1003
0ccd4802 1004#ifdef CONFIG_CIFS_FSCACHE
d03382ce 1005 /* populate tcon->resource_id */
0d424ad0 1006 tcon->resource_id = CIFS_I(inode)->uniqueid;
0ccd4802 1007#endif
d03382ce 1008
0d424ad0 1009 if (rc && tcon->ipc) {
f96637be 1010 cifs_dbg(FYI, "ipc connection - fake read inode\n");
b7ca6928 1011 spin_lock(&inode->i_lock);
7f8ed420 1012 inode->i_mode |= S_IFDIR;
bfe86848 1013 set_nlink(inode, 2);
7f8ed420
SF
1014 inode->i_op = &cifs_ipc_inode_ops;
1015 inode->i_fop = &simple_dir_operations;
1016 inode->i_uid = cifs_sb->mnt_uid;
1017 inode->i_gid = cifs_sb->mnt_gid;
b7ca6928 1018 spin_unlock(&inode->i_lock);
ad661334 1019 } else if (rc) {
ce634ab2 1020 iget_failed(inode);
a7851ce7 1021 inode = ERR_PTR(rc);
7f8ed420
SF
1022 }
1023
a7851ce7 1024out:
6d5786a3 1025 /* can not call macro free_xid here since in a void func
ce634ab2
DH
1026 * TODO: This is no longer true
1027 */
6d5786a3 1028 _free_xid(xid);
ce634ab2 1029 return inode;
1da177e4
LT
1030}
1031
ed6875e0 1032int
6d5786a3 1033cifs_set_file_info(struct inode *inode, struct iattr *attrs, unsigned int xid,
ed6875e0 1034 char *full_path, __u32 dosattr)
388e57b2 1035{
388e57b2 1036 bool set_time = false;
388e57b2 1037 struct cifs_sb_info *cifs_sb = CIFS_SB(inode->i_sb);
6bdf6dbd 1038 struct TCP_Server_Info *server;
388e57b2
SF
1039 FILE_BASIC_INFO info_buf;
1040
1adcb710
SF
1041 if (attrs == NULL)
1042 return -EINVAL;
1043
6bdf6dbd
PS
1044 server = cifs_sb_master_tcon(cifs_sb)->ses->server;
1045 if (!server->ops->set_file_info)
1046 return -ENOSYS;
1047
388e57b2
SF
1048 if (attrs->ia_valid & ATTR_ATIME) {
1049 set_time = true;
1050 info_buf.LastAccessTime =
1051 cpu_to_le64(cifs_UnixTimeToNT(attrs->ia_atime));
1052 } else
1053 info_buf.LastAccessTime = 0;
1054
1055 if (attrs->ia_valid & ATTR_MTIME) {
1056 set_time = true;
1057 info_buf.LastWriteTime =
1058 cpu_to_le64(cifs_UnixTimeToNT(attrs->ia_mtime));
1059 } else
1060 info_buf.LastWriteTime = 0;
1061
1062 /*
1063 * Samba throws this field away, but windows may actually use it.
1064 * Do not set ctime unless other time stamps are changed explicitly
1065 * (i.e. by utimes()) since we would then have a mix of client and
1066 * server times.
1067 */
1068 if (set_time && (attrs->ia_valid & ATTR_CTIME)) {
f96637be 1069 cifs_dbg(FYI, "CIFS - CTIME changed\n");
388e57b2
SF
1070 info_buf.ChangeTime =
1071 cpu_to_le64(cifs_UnixTimeToNT(attrs->ia_ctime));
1072 } else
1073 info_buf.ChangeTime = 0;
1074
1075 info_buf.CreationTime = 0; /* don't change */
1076 info_buf.Attributes = cpu_to_le32(dosattr);
1077
6bdf6dbd 1078 return server->ops->set_file_info(inode, full_path, &info_buf, xid);
388e57b2
SF
1079}
1080
a12a1ac7 1081/*
ed6875e0 1082 * Open the given file (if it isn't already), set the DELETE_ON_CLOSE bit
a12a1ac7
JL
1083 * and rename it to a random name that hopefully won't conflict with
1084 * anything else.
1085 */
ed6875e0
PS
1086int
1087cifs_rename_pending_delete(const char *full_path, struct dentry *dentry,
1088 const unsigned int xid)
a12a1ac7
JL
1089{
1090 int oplock = 0;
1091 int rc;
d81b8a40
PS
1092 struct cifs_fid fid;
1093 struct cifs_open_parms oparms;
2b0143b5 1094 struct inode *inode = d_inode(dentry);
a12a1ac7
JL
1095 struct cifsInodeInfo *cifsInode = CIFS_I(inode);
1096 struct cifs_sb_info *cifs_sb = CIFS_SB(inode->i_sb);
7ffec372 1097 struct tcon_link *tlink;
96daf2b0 1098 struct cifs_tcon *tcon;
3270958b
SF
1099 __u32 dosattr, origattr;
1100 FILE_BASIC_INFO *info_buf = NULL;
a12a1ac7 1101
7ffec372
JL
1102 tlink = cifs_sb_tlink(cifs_sb);
1103 if (IS_ERR(tlink))
1104 return PTR_ERR(tlink);
1105 tcon = tlink_tcon(tlink);
1106
c483a984
SP
1107 /*
1108 * We cannot rename the file if the server doesn't support
1109 * CAP_INFOLEVEL_PASSTHRU
1110 */
1111 if (!(tcon->ses->capabilities & CAP_INFOLEVEL_PASSTHRU)) {
1112 rc = -EBUSY;
1113 goto out;
1114 }
1115
d81b8a40
PS
1116 oparms.tcon = tcon;
1117 oparms.cifs_sb = cifs_sb;
1118 oparms.desired_access = DELETE | FILE_WRITE_ATTRIBUTES;
1119 oparms.create_options = CREATE_NOT_DIR;
1120 oparms.disposition = FILE_OPEN;
1121 oparms.path = full_path;
1122 oparms.fid = &fid;
1123 oparms.reconnect = false;
1124
1125 rc = CIFS_open(xid, &oparms, &oplock, NULL);
a12a1ac7
JL
1126 if (rc != 0)
1127 goto out;
1128
3270958b
SF
1129 origattr = cifsInode->cifsAttrs;
1130 if (origattr == 0)
1131 origattr |= ATTR_NORMAL;
1132
1133 dosattr = origattr & ~ATTR_READONLY;
a12a1ac7
JL
1134 if (dosattr == 0)
1135 dosattr |= ATTR_NORMAL;
1136 dosattr |= ATTR_HIDDEN;
1137
3270958b
SF
1138 /* set ATTR_HIDDEN and clear ATTR_READONLY, but only if needed */
1139 if (dosattr != origattr) {
1140 info_buf = kzalloc(sizeof(*info_buf), GFP_KERNEL);
1141 if (info_buf == NULL) {
1142 rc = -ENOMEM;
1143 goto out_close;
1144 }
1145 info_buf->Attributes = cpu_to_le32(dosattr);
d81b8a40 1146 rc = CIFSSMBSetFileInfo(xid, tcon, info_buf, fid.netfid,
3270958b
SF
1147 current->tgid);
1148 /* although we would like to mark the file hidden
1149 if that fails we will still try to rename it */
72d282dc 1150 if (!rc)
3270958b
SF
1151 cifsInode->cifsAttrs = dosattr;
1152 else
1153 dosattr = origattr; /* since not able to change them */
a12a1ac7 1154 }
a12a1ac7 1155
dd1db2de 1156 /* rename the file */
d81b8a40
PS
1157 rc = CIFSSMBRenameOpenFile(xid, tcon, fid.netfid, NULL,
1158 cifs_sb->local_nls,
2baa2682 1159 cifs_remap(cifs_sb));
3270958b 1160 if (rc != 0) {
47c78f4a 1161 rc = -EBUSY;
3270958b
SF
1162 goto undo_setattr;
1163 }
6d22f098 1164
3270958b 1165 /* try to set DELETE_ON_CLOSE */
aff8d5ca 1166 if (!test_bit(CIFS_INO_DELETE_PENDING, &cifsInode->flags)) {
d81b8a40 1167 rc = CIFSSMBSetFileDisposition(xid, tcon, true, fid.netfid,
3270958b
SF
1168 current->tgid);
1169 /*
1170 * some samba versions return -ENOENT when we try to set the
1171 * file disposition here. Likely a samba bug, but work around
1172 * it for now. This means that some cifsXXX files may hang
1173 * around after they shouldn't.
1174 *
1175 * BB: remove this hack after more servers have the fix
1176 */
1177 if (rc == -ENOENT)
1178 rc = 0;
1179 else if (rc != 0) {
47c78f4a 1180 rc = -EBUSY;
3270958b
SF
1181 goto undo_rename;
1182 }
aff8d5ca 1183 set_bit(CIFS_INO_DELETE_PENDING, &cifsInode->flags);
3270958b 1184 }
7ce86d5a 1185
a12a1ac7 1186out_close:
d81b8a40 1187 CIFSSMBClose(xid, tcon, fid.netfid);
a12a1ac7 1188out:
3270958b 1189 kfree(info_buf);
7ffec372 1190 cifs_put_tlink(tlink);
a12a1ac7 1191 return rc;
3270958b
SF
1192
1193 /*
1194 * reset everything back to the original state. Don't bother
1195 * dealing with errors here since we can't do anything about
1196 * them anyway.
1197 */
1198undo_rename:
d81b8a40 1199 CIFSSMBRenameOpenFile(xid, tcon, fid.netfid, dentry->d_name.name,
2baa2682 1200 cifs_sb->local_nls, cifs_remap(cifs_sb));
3270958b
SF
1201undo_setattr:
1202 if (dosattr != origattr) {
1203 info_buf->Attributes = cpu_to_le32(origattr);
d81b8a40 1204 if (!CIFSSMBSetFileInfo(xid, tcon, info_buf, fid.netfid,
3270958b
SF
1205 current->tgid))
1206 cifsInode->cifsAttrs = origattr;
1207 }
1208
1209 goto out_close;
a12a1ac7
JL
1210}
1211
b7ca6928
SF
1212/* copied from fs/nfs/dir.c with small changes */
1213static void
1214cifs_drop_nlink(struct inode *inode)
1215{
1216 spin_lock(&inode->i_lock);
1217 if (inode->i_nlink > 0)
1218 drop_nlink(inode);
1219 spin_unlock(&inode->i_lock);
1220}
ff694527
SF
1221
1222/*
2b0143b5 1223 * If d_inode(dentry) is null (usually meaning the cached dentry
ff694527 1224 * is a negative dentry) then we would attempt a standard SMB delete, but
af901ca1
AGR
1225 * if that fails we can not attempt the fall back mechanisms on EACCESS
1226 * but will return the EACCESS to the caller. Note that the VFS does not call
ff694527
SF
1227 * unlink on negative dentries currently.
1228 */
5f0319a7 1229int cifs_unlink(struct inode *dir, struct dentry *dentry)
1da177e4
LT
1230{
1231 int rc = 0;
6d5786a3 1232 unsigned int xid;
1da177e4 1233 char *full_path = NULL;
2b0143b5 1234 struct inode *inode = d_inode(dentry);
ff694527 1235 struct cifsInodeInfo *cifs_inode;
5f0319a7
JL
1236 struct super_block *sb = dir->i_sb;
1237 struct cifs_sb_info *cifs_sb = CIFS_SB(sb);
7ffec372 1238 struct tcon_link *tlink;
96daf2b0 1239 struct cifs_tcon *tcon;
ed6875e0 1240 struct TCP_Server_Info *server;
6050247d
SF
1241 struct iattr *attrs = NULL;
1242 __u32 dosattr = 0, origattr = 0;
1da177e4 1243
f96637be 1244 cifs_dbg(FYI, "cifs_unlink, dir=0x%p, dentry=0x%p\n", dir, dentry);
1da177e4 1245
7ffec372
JL
1246 tlink = cifs_sb_tlink(cifs_sb);
1247 if (IS_ERR(tlink))
1248 return PTR_ERR(tlink);
1249 tcon = tlink_tcon(tlink);
ed6875e0 1250 server = tcon->ses->server;
7ffec372 1251
6d5786a3 1252 xid = get_xid();
1da177e4 1253
5f0319a7
JL
1254 /* Unlink can be called from rename so we can not take the
1255 * sb->s_vfs_rename_mutex here */
1256 full_path = build_path_from_dentry(dentry);
1da177e4 1257 if (full_path == NULL) {
0f3bc09e 1258 rc = -ENOMEM;
7ffec372 1259 goto unlink_out;
1da177e4 1260 }
2d785a50 1261
29e20f9c
PS
1262 if (cap_unix(tcon->ses) && (CIFS_UNIX_POSIX_PATH_OPS_CAP &
1263 le64_to_cpu(tcon->fsUnixInfo.Capability))) {
5f0319a7 1264 rc = CIFSPOSIXDelFile(xid, tcon, full_path,
2d785a50 1265 SMB_POSIX_UNLINK_FILE_TARGET, cifs_sb->local_nls,
2baa2682 1266 cifs_remap(cifs_sb));
f96637be 1267 cifs_dbg(FYI, "posix del rc %d\n", rc);
2d785a50
SF
1268 if ((rc == 0) || (rc == -ENOENT))
1269 goto psx_del_no_retry;
1270 }
1da177e4 1271
6050247d 1272retry_std_delete:
ed6875e0
PS
1273 if (!server->ops->unlink) {
1274 rc = -ENOSYS;
1275 goto psx_del_no_retry;
1276 }
1277
1278 rc = server->ops->unlink(xid, tcon, full_path, cifs_sb);
6050247d 1279
2d785a50 1280psx_del_no_retry:
1da177e4 1281 if (!rc) {
5f0319a7 1282 if (inode)
b7ca6928 1283 cifs_drop_nlink(inode);
1da177e4 1284 } else if (rc == -ENOENT) {
5f0319a7 1285 d_drop(dentry);
47c78f4a 1286 } else if (rc == -EBUSY) {
ed6875e0
PS
1287 if (server->ops->rename_pending_delete) {
1288 rc = server->ops->rename_pending_delete(full_path,
1289 dentry, xid);
1290 if (rc == 0)
1291 cifs_drop_nlink(inode);
1292 }
ff694527 1293 } else if ((rc == -EACCES) && (dosattr == 0) && inode) {
388e57b2
SF
1294 attrs = kzalloc(sizeof(*attrs), GFP_KERNEL);
1295 if (attrs == NULL) {
1296 rc = -ENOMEM;
1297 goto out_reval;
1da177e4 1298 }
388e57b2
SF
1299
1300 /* try to reset dos attributes */
ff694527
SF
1301 cifs_inode = CIFS_I(inode);
1302 origattr = cifs_inode->cifsAttrs;
6050247d
SF
1303 if (origattr == 0)
1304 origattr |= ATTR_NORMAL;
1305 dosattr = origattr & ~ATTR_READONLY;
388e57b2
SF
1306 if (dosattr == 0)
1307 dosattr |= ATTR_NORMAL;
1308 dosattr |= ATTR_HIDDEN;
1309
1310 rc = cifs_set_file_info(inode, attrs, xid, full_path, dosattr);
388e57b2
SF
1311 if (rc != 0)
1312 goto out_reval;
6050247d
SF
1313
1314 goto retry_std_delete;
1da177e4 1315 }
6050247d
SF
1316
1317 /* undo the setattr if we errored out and it's needed */
1318 if (rc != 0 && dosattr != 0)
1319 cifs_set_file_info(inode, attrs, xid, full_path, origattr);
1320
388e57b2 1321out_reval:
4523cc30 1322 if (inode) {
ff694527
SF
1323 cifs_inode = CIFS_I(inode);
1324 cifs_inode->time = 0; /* will force revalidate to get info
5f0319a7
JL
1325 when needed */
1326 inode->i_ctime = current_fs_time(sb);
06bcfedd 1327 }
5f0319a7 1328 dir->i_ctime = dir->i_mtime = current_fs_time(sb);
ff694527 1329 cifs_inode = CIFS_I(dir);
6050247d 1330 CIFS_I(dir)->time = 0; /* force revalidate of dir as well */
7ffec372 1331unlink_out:
1da177e4 1332 kfree(full_path);
6050247d 1333 kfree(attrs);
6d5786a3 1334 free_xid(xid);
7ffec372 1335 cifs_put_tlink(tlink);
1da177e4
LT
1336 return rc;
1337}
1338
ff691e96 1339static int
101b92d9 1340cifs_mkdir_qinfo(struct inode *parent, struct dentry *dentry, umode_t mode,
ff691e96
PS
1341 const char *full_path, struct cifs_sb_info *cifs_sb,
1342 struct cifs_tcon *tcon, const unsigned int xid)
1343{
1344 int rc = 0;
101b92d9 1345 struct inode *inode = NULL;
ff691e96
PS
1346
1347 if (tcon->unix_ext)
101b92d9 1348 rc = cifs_get_inode_info_unix(&inode, full_path, parent->i_sb,
ff691e96
PS
1349 xid);
1350 else
101b92d9
JL
1351 rc = cifs_get_inode_info(&inode, full_path, NULL, parent->i_sb,
1352 xid, NULL);
1353
ff691e96
PS
1354 if (rc)
1355 return rc;
1356
ff691e96
PS
1357 /*
1358 * setting nlink not necessary except in cases where we failed to get it
101b92d9
JL
1359 * from the server or was set bogus. Also, since this is a brand new
1360 * inode, no need to grab the i_lock before setting the i_nlink.
ff691e96 1361 */
101b92d9
JL
1362 if (inode->i_nlink < 2)
1363 set_nlink(inode, 2);
ff691e96
PS
1364 mode &= ~current_umask();
1365 /* must turn on setgid bit if parent dir has it */
101b92d9 1366 if (parent->i_mode & S_ISGID)
ff691e96
PS
1367 mode |= S_ISGID;
1368
1369 if (tcon->unix_ext) {
1370 struct cifs_unix_set_info_args args = {
1371 .mode = mode,
1372 .ctime = NO_CHANGE_64,
1373 .atime = NO_CHANGE_64,
1374 .mtime = NO_CHANGE_64,
1375 .device = 0,
1376 };
1377 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_SET_UID) {
49418b2c 1378 args.uid = current_fsuid();
101b92d9 1379 if (parent->i_mode & S_ISGID)
49418b2c 1380 args.gid = parent->i_gid;
ff691e96 1381 else
49418b2c 1382 args.gid = current_fsgid();
ff691e96 1383 } else {
49418b2c
EB
1384 args.uid = INVALID_UID; /* no change */
1385 args.gid = INVALID_GID; /* no change */
ff691e96
PS
1386 }
1387 CIFSSMBUnixSetPathInfo(xid, tcon, full_path, &args,
1388 cifs_sb->local_nls,
2baa2682 1389 cifs_remap(cifs_sb));
ff691e96 1390 } else {
f436720e 1391 struct TCP_Server_Info *server = tcon->ses->server;
ff691e96 1392 if (!(cifs_sb->mnt_cifs_flags & CIFS_MOUNT_CIFS_ACL) &&
f436720e 1393 (mode & S_IWUGO) == 0 && server->ops->mkdir_setinfo)
101b92d9 1394 server->ops->mkdir_setinfo(inode, full_path, cifs_sb,
f436720e 1395 tcon, xid);
101b92d9
JL
1396 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_DYNPERM)
1397 inode->i_mode = (mode | S_IFDIR);
1398
1399 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_SET_UID) {
1400 inode->i_uid = current_fsuid();
1401 if (inode->i_mode & S_ISGID)
1402 inode->i_gid = parent->i_gid;
1403 else
1404 inode->i_gid = current_fsgid();
ff691e96
PS
1405 }
1406 }
101b92d9 1407 d_instantiate(dentry, inode);
ff691e96
PS
1408 return rc;
1409}
1410
1411static int
1412cifs_posix_mkdir(struct inode *inode, struct dentry *dentry, umode_t mode,
1413 const char *full_path, struct cifs_sb_info *cifs_sb,
1414 struct cifs_tcon *tcon, const unsigned int xid)
1415{
1416 int rc = 0;
1417 u32 oplock = 0;
1418 FILE_UNIX_BASIC_INFO *info = NULL;
1419 struct inode *newinode = NULL;
1420 struct cifs_fattr fattr;
1421
1422 info = kzalloc(sizeof(FILE_UNIX_BASIC_INFO), GFP_KERNEL);
1423 if (info == NULL) {
1424 rc = -ENOMEM;
1425 goto posix_mkdir_out;
1426 }
1427
1428 mode &= ~current_umask();
1429 rc = CIFSPOSIXCreate(xid, tcon, SMB_O_DIRECTORY | SMB_O_CREAT, mode,
1430 NULL /* netfid */, info, &oplock, full_path,
2baa2682 1431 cifs_sb->local_nls, cifs_remap(cifs_sb));
ff691e96
PS
1432 if (rc == -EOPNOTSUPP)
1433 goto posix_mkdir_out;
1434 else if (rc) {
f96637be 1435 cifs_dbg(FYI, "posix mkdir returned 0x%x\n", rc);
ff691e96
PS
1436 d_drop(dentry);
1437 goto posix_mkdir_out;
1438 }
1439
1440 if (info->Type == cpu_to_le32(-1))
1441 /* no return info, go query for it */
1442 goto posix_mkdir_get_info;
1443 /*
1444 * BB check (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_SET_UID ) to see if
1445 * need to set uid/gid.
1446 */
1447
1448 cifs_unix_basic_to_fattr(&fattr, info, cifs_sb);
1449 cifs_fill_uniqueid(inode->i_sb, &fattr);
1450 newinode = cifs_iget(inode->i_sb, &fattr);
1451 if (!newinode)
1452 goto posix_mkdir_get_info;
1453
1454 d_instantiate(dentry, newinode);
1455
1456#ifdef CONFIG_CIFS_DEBUG2
35c265e0
AV
1457 cifs_dbg(FYI, "instantiated dentry %p %pd to inode %p\n",
1458 dentry, dentry, newinode);
ff691e96
PS
1459
1460 if (newinode->i_nlink != 2)
f96637be
JP
1461 cifs_dbg(FYI, "unexpected number of links %d\n",
1462 newinode->i_nlink);
ff691e96
PS
1463#endif
1464
1465posix_mkdir_out:
1466 kfree(info);
1467 return rc;
1468posix_mkdir_get_info:
1469 rc = cifs_mkdir_qinfo(inode, dentry, mode, full_path, cifs_sb, tcon,
1470 xid);
1471 goto posix_mkdir_out;
1472}
1473
18bb1db3 1474int cifs_mkdir(struct inode *inode, struct dentry *direntry, umode_t mode)
1da177e4 1475{
ff691e96 1476 int rc = 0;
6d5786a3 1477 unsigned int xid;
1da177e4 1478 struct cifs_sb_info *cifs_sb;
7ffec372 1479 struct tcon_link *tlink;
29e20f9c 1480 struct cifs_tcon *tcon;
f436720e 1481 struct TCP_Server_Info *server;
ff691e96 1482 char *full_path;
1da177e4 1483
f96637be
JP
1484 cifs_dbg(FYI, "In cifs_mkdir, mode = 0x%hx inode = 0x%p\n",
1485 mode, inode);
1da177e4 1486
1da177e4 1487 cifs_sb = CIFS_SB(inode->i_sb);
7ffec372
JL
1488 tlink = cifs_sb_tlink(cifs_sb);
1489 if (IS_ERR(tlink))
1490 return PTR_ERR(tlink);
29e20f9c 1491 tcon = tlink_tcon(tlink);
7ffec372 1492
6d5786a3 1493 xid = get_xid();
1da177e4 1494
7f57356b 1495 full_path = build_path_from_dentry(direntry);
1da177e4 1496 if (full_path == NULL) {
0f3bc09e 1497 rc = -ENOMEM;
7ffec372 1498 goto mkdir_out;
1da177e4 1499 }
50c2f753 1500
29e20f9c
PS
1501 if (cap_unix(tcon->ses) && (CIFS_UNIX_POSIX_PATH_OPS_CAP &
1502 le64_to_cpu(tcon->fsUnixInfo.Capability))) {
ff691e96
PS
1503 rc = cifs_posix_mkdir(inode, direntry, mode, full_path, cifs_sb,
1504 tcon, xid);
1505 if (rc != -EOPNOTSUPP)
2dd29d31 1506 goto mkdir_out;
fb8c4b14 1507 }
ff691e96 1508
f436720e
PS
1509 server = tcon->ses->server;
1510
1511 if (!server->ops->mkdir) {
1512 rc = -ENOSYS;
1513 goto mkdir_out;
1514 }
1515
1da177e4 1516 /* BB add setting the equivalent of mode via CreateX w/ACLs */
f436720e 1517 rc = server->ops->mkdir(xid, tcon, full_path, cifs_sb);
1da177e4 1518 if (rc) {
f96637be 1519 cifs_dbg(FYI, "cifs_mkdir returned 0x%x\n", rc);
1da177e4 1520 d_drop(direntry);
ff691e96 1521 goto mkdir_out;
1da177e4 1522 }
ff691e96
PS
1523
1524 rc = cifs_mkdir_qinfo(inode, direntry, mode, full_path, cifs_sb, tcon,
1525 xid);
fb8c4b14 1526mkdir_out:
6de2ce42
PS
1527 /*
1528 * Force revalidate to get parent dir info when needed since cached
1529 * attributes are invalid now.
1530 */
1531 CIFS_I(inode)->time = 0;
1da177e4 1532 kfree(full_path);
6d5786a3 1533 free_xid(xid);
7ffec372 1534 cifs_put_tlink(tlink);
1da177e4
LT
1535 return rc;
1536}
1537
1538int cifs_rmdir(struct inode *inode, struct dentry *direntry)
1539{
1540 int rc = 0;
6d5786a3 1541 unsigned int xid;
1da177e4 1542 struct cifs_sb_info *cifs_sb;
7ffec372 1543 struct tcon_link *tlink;
f958ca5d
PS
1544 struct cifs_tcon *tcon;
1545 struct TCP_Server_Info *server;
1da177e4
LT
1546 char *full_path = NULL;
1547 struct cifsInodeInfo *cifsInode;
1548
f96637be 1549 cifs_dbg(FYI, "cifs_rmdir, inode = 0x%p\n", inode);
1da177e4 1550
6d5786a3 1551 xid = get_xid();
1da177e4 1552
7f57356b 1553 full_path = build_path_from_dentry(direntry);
1da177e4 1554 if (full_path == NULL) {
0f3bc09e 1555 rc = -ENOMEM;
7ffec372 1556 goto rmdir_exit;
1da177e4
LT
1557 }
1558
7ffec372
JL
1559 cifs_sb = CIFS_SB(inode->i_sb);
1560 tlink = cifs_sb_tlink(cifs_sb);
1561 if (IS_ERR(tlink)) {
1562 rc = PTR_ERR(tlink);
1563 goto rmdir_exit;
1564 }
f958ca5d
PS
1565 tcon = tlink_tcon(tlink);
1566 server = tcon->ses->server;
1567
1568 if (!server->ops->rmdir) {
1569 rc = -ENOSYS;
1570 cifs_put_tlink(tlink);
1571 goto rmdir_exit;
1572 }
7ffec372 1573
f958ca5d 1574 rc = server->ops->rmdir(xid, tcon, full_path, cifs_sb);
7ffec372 1575 cifs_put_tlink(tlink);
1da177e4
LT
1576
1577 if (!rc) {
2b0143b5
DH
1578 spin_lock(&d_inode(direntry)->i_lock);
1579 i_size_write(d_inode(direntry), 0);
1580 clear_nlink(d_inode(direntry));
1581 spin_unlock(&d_inode(direntry)->i_lock);
1da177e4
LT
1582 }
1583
2b0143b5 1584 cifsInode = CIFS_I(d_inode(direntry));
6de2ce42
PS
1585 /* force revalidate to go get info when needed */
1586 cifsInode->time = 0;
42c24544
SF
1587
1588 cifsInode = CIFS_I(inode);
6de2ce42
PS
1589 /*
1590 * Force revalidate to get parent dir info when needed since cached
1591 * attributes are invalid now.
1592 */
1593 cifsInode->time = 0;
42c24544 1594
2b0143b5 1595 d_inode(direntry)->i_ctime = inode->i_ctime = inode->i_mtime =
1da177e4
LT
1596 current_fs_time(inode->i_sb);
1597
7ffec372 1598rmdir_exit:
1da177e4 1599 kfree(full_path);
6d5786a3 1600 free_xid(xid);
1da177e4
LT
1601 return rc;
1602}
1603
ee2fd967 1604static int
8ceb9843
PS
1605cifs_do_rename(const unsigned int xid, struct dentry *from_dentry,
1606 const char *from_path, struct dentry *to_dentry,
1607 const char *to_path)
ee2fd967
SF
1608{
1609 struct cifs_sb_info *cifs_sb = CIFS_SB(from_dentry->d_sb);
7ffec372 1610 struct tcon_link *tlink;
8ceb9843
PS
1611 struct cifs_tcon *tcon;
1612 struct TCP_Server_Info *server;
d81b8a40
PS
1613 struct cifs_fid fid;
1614 struct cifs_open_parms oparms;
ee2fd967
SF
1615 int oplock, rc;
1616
7ffec372
JL
1617 tlink = cifs_sb_tlink(cifs_sb);
1618 if (IS_ERR(tlink))
1619 return PTR_ERR(tlink);
8ceb9843
PS
1620 tcon = tlink_tcon(tlink);
1621 server = tcon->ses->server;
1622
1623 if (!server->ops->rename)
1624 return -ENOSYS;
7ffec372 1625
ee2fd967 1626 /* try path-based rename first */
8ceb9843 1627 rc = server->ops->rename(xid, tcon, from_path, to_path, cifs_sb);
ee2fd967
SF
1628
1629 /*
8ceb9843
PS
1630 * Don't bother with rename by filehandle unless file is busy and
1631 * source. Note that cross directory moves do not work with
ee2fd967
SF
1632 * rename by filehandle to various Windows servers.
1633 */
47c78f4a 1634 if (rc == 0 || rc != -EBUSY)
7ffec372 1635 goto do_rename_exit;
ee2fd967 1636
ed0e3ace
JL
1637 /* open-file renames don't work across directories */
1638 if (to_dentry->d_parent != from_dentry->d_parent)
7ffec372 1639 goto do_rename_exit;
ed0e3ace 1640
d81b8a40
PS
1641 oparms.tcon = tcon;
1642 oparms.cifs_sb = cifs_sb;
ee2fd967 1643 /* open the file to be renamed -- we need DELETE perms */
d81b8a40
PS
1644 oparms.desired_access = DELETE;
1645 oparms.create_options = CREATE_NOT_DIR;
1646 oparms.disposition = FILE_OPEN;
1647 oparms.path = from_path;
1648 oparms.fid = &fid;
1649 oparms.reconnect = false;
1650
1651 rc = CIFS_open(xid, &oparms, &oplock, NULL);
ee2fd967 1652 if (rc == 0) {
d81b8a40 1653 rc = CIFSSMBRenameOpenFile(xid, tcon, fid.netfid,
ee2fd967 1654 (const char *) to_dentry->d_name.name,
2baa2682 1655 cifs_sb->local_nls, cifs_remap(cifs_sb));
d81b8a40 1656 CIFSSMBClose(xid, tcon, fid.netfid);
ee2fd967 1657 }
7ffec372
JL
1658do_rename_exit:
1659 cifs_put_tlink(tlink);
ee2fd967
SF
1660 return rc;
1661}
1662
8ceb9843 1663int
7c33d597
MS
1664cifs_rename2(struct inode *source_dir, struct dentry *source_dentry,
1665 struct inode *target_dir, struct dentry *target_dentry,
1666 unsigned int flags)
1da177e4 1667{
8ceb9843
PS
1668 char *from_name = NULL;
1669 char *to_name = NULL;
639e7a91 1670 struct cifs_sb_info *cifs_sb;
7ffec372 1671 struct tcon_link *tlink;
96daf2b0 1672 struct cifs_tcon *tcon;
ee2fd967
SF
1673 FILE_UNIX_BASIC_INFO *info_buf_source = NULL;
1674 FILE_UNIX_BASIC_INFO *info_buf_target;
6d5786a3
PS
1675 unsigned int xid;
1676 int rc, tmprc;
1da177e4 1677
7c33d597
MS
1678 if (flags & ~RENAME_NOREPLACE)
1679 return -EINVAL;
1680
639e7a91 1681 cifs_sb = CIFS_SB(source_dir->i_sb);
7ffec372
JL
1682 tlink = cifs_sb_tlink(cifs_sb);
1683 if (IS_ERR(tlink))
1684 return PTR_ERR(tlink);
1685 tcon = tlink_tcon(tlink);
1da177e4 1686
6d5786a3 1687 xid = get_xid();
ee2fd967 1688
ee2fd967
SF
1689 /*
1690 * we already have the rename sem so we do not need to
1691 * grab it again here to protect the path integrity
1692 */
8ceb9843
PS
1693 from_name = build_path_from_dentry(source_dentry);
1694 if (from_name == NULL) {
ee2fd967
SF
1695 rc = -ENOMEM;
1696 goto cifs_rename_exit;
1697 }
1698
8ceb9843
PS
1699 to_name = build_path_from_dentry(target_dentry);
1700 if (to_name == NULL) {
1da177e4
LT
1701 rc = -ENOMEM;
1702 goto cifs_rename_exit;
1703 }
1704
8ceb9843
PS
1705 rc = cifs_do_rename(xid, source_dentry, from_name, target_dentry,
1706 to_name);
ee2fd967 1707
7c33d597
MS
1708 /*
1709 * No-replace is the natural behavior for CIFS, so skip unlink hacks.
1710 */
1711 if (flags & RENAME_NOREPLACE)
1712 goto cifs_rename_exit;
1713
14121bdc
JL
1714 if (rc == -EEXIST && tcon->unix_ext) {
1715 /*
8ceb9843
PS
1716 * Are src and dst hardlinks of same inode? We can only tell
1717 * with unix extensions enabled.
14121bdc
JL
1718 */
1719 info_buf_source =
1720 kmalloc(2 * sizeof(FILE_UNIX_BASIC_INFO),
1721 GFP_KERNEL);
1722 if (info_buf_source == NULL) {
1723 rc = -ENOMEM;
1724 goto cifs_rename_exit;
1725 }
1726
1727 info_buf_target = info_buf_source + 1;
8ceb9843
PS
1728 tmprc = CIFSSMBUnixQPathInfo(xid, tcon, from_name,
1729 info_buf_source,
1730 cifs_sb->local_nls,
2baa2682 1731 cifs_remap(cifs_sb));
8d281efb 1732 if (tmprc != 0)
14121bdc 1733 goto unlink_target;
ee2fd967 1734
8ceb9843
PS
1735 tmprc = CIFSSMBUnixQPathInfo(xid, tcon, to_name,
1736 info_buf_target,
1737 cifs_sb->local_nls,
2baa2682 1738 cifs_remap(cifs_sb));
14121bdc 1739
8d281efb 1740 if (tmprc == 0 && (info_buf_source->UniqueId ==
ae6884a9 1741 info_buf_target->UniqueId)) {
14121bdc 1742 /* same file, POSIX says that this is a noop */
ae6884a9 1743 rc = 0;
14121bdc 1744 goto cifs_rename_exit;
ae6884a9 1745 }
8ceb9843
PS
1746 }
1747 /*
1748 * else ... BB we could add the same check for Windows by
1749 * checking the UniqueId via FILE_INTERNAL_INFO
1750 */
14121bdc 1751
ee2fd967 1752unlink_target:
fc6f3943 1753 /* Try unlinking the target dentry if it's not negative */
2b0143b5 1754 if (d_really_is_positive(target_dentry) && (rc == -EACCES || rc == -EEXIST)) {
a07d3220
PS
1755 if (d_is_dir(target_dentry))
1756 tmprc = cifs_rmdir(target_dir, target_dentry);
1757 else
1758 tmprc = cifs_unlink(target_dir, target_dentry);
14121bdc
JL
1759 if (tmprc)
1760 goto cifs_rename_exit;
8ceb9843
PS
1761 rc = cifs_do_rename(xid, source_dentry, from_name,
1762 target_dentry, to_name);
1da177e4
LT
1763 }
1764
b46799a8
PS
1765 /* force revalidate to go get info when needed */
1766 CIFS_I(source_dir)->time = CIFS_I(target_dir)->time = 0;
1767
1768 source_dir->i_ctime = source_dir->i_mtime = target_dir->i_ctime =
1769 target_dir->i_mtime = current_fs_time(source_dir->i_sb);
1770
1da177e4 1771cifs_rename_exit:
ee2fd967 1772 kfree(info_buf_source);
8ceb9843
PS
1773 kfree(from_name);
1774 kfree(to_name);
6d5786a3 1775 free_xid(xid);
7ffec372 1776 cifs_put_tlink(tlink);
1da177e4
LT
1777 return rc;
1778}
1779
df2cf170
JL
1780static bool
1781cifs_inode_needs_reval(struct inode *inode)
1da177e4 1782{
df2cf170 1783 struct cifsInodeInfo *cifs_i = CIFS_I(inode);
6d20e840 1784 struct cifs_sb_info *cifs_sb = CIFS_SB(inode->i_sb);
1da177e4 1785
18cceb6a 1786 if (CIFS_CACHE_READ(cifs_i))
df2cf170 1787 return false;
1da177e4 1788
df2cf170
JL
1789 if (!lookupCacheEnabled)
1790 return true;
1da177e4 1791
df2cf170
JL
1792 if (cifs_i->time == 0)
1793 return true;
1da177e4 1794
a87c9ad9
JL
1795 if (!cifs_sb->actimeo)
1796 return true;
1797
6d20e840
SJ
1798 if (!time_in_range(jiffies, cifs_i->time,
1799 cifs_i->time + cifs_sb->actimeo))
df2cf170
JL
1800 return true;
1801
db19272e 1802 /* hardlinked files w/ noserverino get "special" treatment */
6d20e840 1803 if (!(cifs_sb->mnt_cifs_flags & CIFS_MOUNT_SERVER_INUM) &&
db19272e
JL
1804 S_ISREG(inode->i_mode) && inode->i_nlink != 1)
1805 return true;
1806
df2cf170
JL
1807 return false;
1808}
1809
523fb8c8
SJ
1810/*
1811 * Zap the cache. Called when invalid_mapping flag is set.
1812 */
6feb9891 1813int
df2cf170
JL
1814cifs_invalidate_mapping(struct inode *inode)
1815{
6feb9891 1816 int rc = 0;
df2cf170 1817
df2cf170 1818 if (inode->i_mapping && inode->i_mapping->nrpages != 0) {
257fb1f1 1819 rc = invalidate_inode_pages2(inode->i_mapping);
4f73c7d3 1820 if (rc)
f96637be
JP
1821 cifs_dbg(VFS, "%s: could not invalidate inode %p\n",
1822 __func__, inode);
df2cf170 1823 }
257fb1f1 1824
9451a9a5 1825 cifs_fscache_reset_inode_cookie(inode);
6feb9891 1826 return rc;
df2cf170
JL
1827}
1828
4f73c7d3
JL
1829/**
1830 * cifs_wait_bit_killable - helper for functions that are sleeping on bit locks
1831 * @word: long word containing the bit lock
1832 */
1833static int
dfd01f02 1834cifs_wait_bit_killable(struct wait_bit_key *key, int mode)
4f73c7d3 1835{
4f73c7d3 1836 freezable_schedule_unsafe();
dfd01f02
PZ
1837 if (signal_pending_state(mode, current))
1838 return -ERESTARTSYS;
4f73c7d3
JL
1839 return 0;
1840}
1841
e284e53f
JL
1842int
1843cifs_revalidate_mapping(struct inode *inode)
1844{
4f73c7d3
JL
1845 int rc;
1846 unsigned long *flags = &CIFS_I(inode)->flags;
1847
74316201
N
1848 rc = wait_on_bit_lock_action(flags, CIFS_INO_LOCK, cifs_wait_bit_killable,
1849 TASK_KILLABLE);
4f73c7d3
JL
1850 if (rc)
1851 return rc;
1852
1853 if (test_and_clear_bit(CIFS_INO_INVALID_MAPPING, flags)) {
1854 rc = cifs_invalidate_mapping(inode);
1855 if (rc)
1856 set_bit(CIFS_INO_INVALID_MAPPING, flags);
1857 }
1858
1859 clear_bit_unlock(CIFS_INO_LOCK, flags);
b1cce803 1860 smp_mb__after_atomic();
4f73c7d3
JL
1861 wake_up_bit(flags, CIFS_INO_LOCK);
1862
1863 return rc;
1864}
1865
1866int
1867cifs_zap_mapping(struct inode *inode)
1868{
1869 set_bit(CIFS_INO_INVALID_MAPPING, &CIFS_I(inode)->flags);
1870 return cifs_revalidate_mapping(inode);
e284e53f
JL
1871}
1872
6feb9891 1873int cifs_revalidate_file_attr(struct file *filp)
abab095d
JL
1874{
1875 int rc = 0;
496ad9aa 1876 struct inode *inode = file_inode(filp);
ba00ba64 1877 struct cifsFileInfo *cfile = (struct cifsFileInfo *) filp->private_data;
abab095d
JL
1878
1879 if (!cifs_inode_needs_reval(inode))
6feb9891 1880 return rc;
abab095d 1881
13cfb733 1882 if (tlink_tcon(cfile->tlink)->unix_ext)
abab095d
JL
1883 rc = cifs_get_file_info_unix(filp);
1884 else
1885 rc = cifs_get_file_info(filp);
1886
abab095d
JL
1887 return rc;
1888}
1889
6feb9891 1890int cifs_revalidate_dentry_attr(struct dentry *dentry)
df2cf170 1891{
6d5786a3 1892 unsigned int xid;
df2cf170 1893 int rc = 0;
2b0143b5 1894 struct inode *inode = d_inode(dentry);
df2cf170 1895 struct super_block *sb = dentry->d_sb;
6feb9891 1896 char *full_path = NULL;
df2cf170
JL
1897
1898 if (inode == NULL)
1899 return -ENOENT;
1da177e4 1900
df2cf170 1901 if (!cifs_inode_needs_reval(inode))
6feb9891
PS
1902 return rc;
1903
6d5786a3 1904 xid = get_xid();
1da177e4
LT
1905
1906 /* can not safely grab the rename sem here if rename calls revalidate
1907 since that would deadlock */
df2cf170 1908 full_path = build_path_from_dentry(dentry);
1da177e4 1909 if (full_path == NULL) {
0f3bc09e 1910 rc = -ENOMEM;
6feb9891 1911 goto out;
1da177e4
LT
1912 }
1913
f96637be
JP
1914 cifs_dbg(FYI, "Update attributes: %s inode 0x%p count %d dentry: 0x%p d_time %ld jiffies %ld\n",
1915 full_path, inode, inode->i_count.counter,
f19159dc 1916 dentry, dentry->d_time, jiffies);
1da177e4 1917
0d424ad0 1918 if (cifs_sb_master_tcon(CIFS_SB(sb))->unix_ext)
df2cf170
JL
1919 rc = cifs_get_inode_info_unix(&inode, full_path, sb, xid);
1920 else
1921 rc = cifs_get_inode_info(&inode, full_path, NULL, sb,
1922 xid, NULL);
1da177e4 1923
6feb9891 1924out:
1da177e4 1925 kfree(full_path);
6d5786a3 1926 free_xid(xid);
1da177e4
LT
1927 return rc;
1928}
1929
6feb9891
PS
1930int cifs_revalidate_file(struct file *filp)
1931{
1932 int rc;
496ad9aa 1933 struct inode *inode = file_inode(filp);
6feb9891
PS
1934
1935 rc = cifs_revalidate_file_attr(filp);
1936 if (rc)
1937 return rc;
1938
e284e53f 1939 return cifs_revalidate_mapping(inode);
6feb9891
PS
1940}
1941
1942/* revalidate a dentry's inode attributes */
1943int cifs_revalidate_dentry(struct dentry *dentry)
1944{
1945 int rc;
2b0143b5 1946 struct inode *inode = d_inode(dentry);
6feb9891
PS
1947
1948 rc = cifs_revalidate_dentry_attr(dentry);
1949 if (rc)
1950 return rc;
1951
e284e53f 1952 return cifs_revalidate_mapping(inode);
6feb9891
PS
1953}
1954
1da177e4 1955int cifs_getattr(struct vfsmount *mnt, struct dentry *dentry,
1c456013 1956 struct kstat *stat)
1da177e4 1957{
3aa1c8c2 1958 struct cifs_sb_info *cifs_sb = CIFS_SB(dentry->d_sb);
96daf2b0 1959 struct cifs_tcon *tcon = cifs_sb_master_tcon(cifs_sb);
2b0143b5 1960 struct inode *inode = d_inode(dentry);
6feb9891 1961 int rc;
3aa1c8c2 1962
6feb9891
PS
1963 /*
1964 * We need to be sure that all dirty pages are written and the server
1965 * has actual ctime, mtime and file length.
1966 */
18cceb6a 1967 if (!CIFS_CACHE_READ(CIFS_I(inode)) && inode->i_mapping &&
6feb9891
PS
1968 inode->i_mapping->nrpages != 0) {
1969 rc = filemap_fdatawait(inode->i_mapping);
156ecb2d
SF
1970 if (rc) {
1971 mapping_set_error(inode->i_mapping, rc);
1972 return rc;
1973 }
6feb9891 1974 }
1c456013 1975
6feb9891
PS
1976 rc = cifs_revalidate_dentry_attr(dentry);
1977 if (rc)
1978 return rc;
1979
1980 generic_fillattr(inode, stat);
1981 stat->blksize = CIFS_MAX_MSGSIZE;
1982 stat->ino = CIFS_I(inode)->uniqueid;
1983
1984 /*
d3d1fce1
JL
1985 * If on a multiuser mount without unix extensions or cifsacl being
1986 * enabled, and the admin hasn't overridden them, set the ownership
1987 * to the fsuid/fsgid of the current process.
6feb9891
PS
1988 */
1989 if ((cifs_sb->mnt_cifs_flags & CIFS_MOUNT_MULTIUSER) &&
d3d1fce1 1990 !(cifs_sb->mnt_cifs_flags & CIFS_MOUNT_CIFS_ACL) &&
6feb9891
PS
1991 !tcon->unix_ext) {
1992 if (!(cifs_sb->mnt_cifs_flags & CIFS_MOUNT_OVERR_UID))
1993 stat->uid = current_fsuid();
1994 if (!(cifs_sb->mnt_cifs_flags & CIFS_MOUNT_OVERR_GID))
1995 stat->gid = current_fsgid();
5fe14c85 1996 }
6feb9891 1997 return rc;
1da177e4
LT
1998}
1999
2000static int cifs_truncate_page(struct address_space *mapping, loff_t from)
2001{
2002 pgoff_t index = from >> PAGE_CACHE_SHIFT;
2003 unsigned offset = from & (PAGE_CACHE_SIZE - 1);
2004 struct page *page;
1da177e4
LT
2005 int rc = 0;
2006
2007 page = grab_cache_page(mapping, index);
2008 if (!page)
2009 return -ENOMEM;
2010
eebd2aa3 2011 zero_user_segment(page, offset, PAGE_CACHE_SIZE);
1da177e4
LT
2012 unlock_page(page);
2013 page_cache_release(page);
2014 return rc;
2015}
2016
1b947463 2017static void cifs_setsize(struct inode *inode, loff_t offset)
3677db10 2018{
ba6a46a0 2019 spin_lock(&inode->i_lock);
3677db10 2020 i_size_write(inode, offset);
ba6a46a0 2021 spin_unlock(&inode->i_lock);
1b947463 2022
7caef267 2023 truncate_pagecache(inode, offset);
3677db10
SF
2024}
2025
8efdbde6
JL
2026static int
2027cifs_set_file_size(struct inode *inode, struct iattr *attrs,
6d5786a3 2028 unsigned int xid, char *full_path)
8efdbde6
JL
2029{
2030 int rc;
2031 struct cifsFileInfo *open_file;
2032 struct cifsInodeInfo *cifsInode = CIFS_I(inode);
2033 struct cifs_sb_info *cifs_sb = CIFS_SB(inode->i_sb);
7ffec372 2034 struct tcon_link *tlink = NULL;
d1433418
PS
2035 struct cifs_tcon *tcon = NULL;
2036 struct TCP_Server_Info *server;
8efdbde6
JL
2037
2038 /*
2039 * To avoid spurious oplock breaks from server, in the case of
2040 * inodes that we already have open, avoid doing path based
2041 * setting of file size if we can do it by handle.
2042 * This keeps our caching token (oplock) and avoids timeouts
2043 * when the local oplock break takes longer to flush
2044 * writebehind data than the SMB timeout for the SetPathInfo
2045 * request would allow
2046 */
6508d904 2047 open_file = find_writable_file(cifsInode, true);
8efdbde6 2048 if (open_file) {
d1433418
PS
2049 tcon = tlink_tcon(open_file->tlink);
2050 server = tcon->ses->server;
2051 if (server->ops->set_file_size)
2052 rc = server->ops->set_file_size(xid, tcon, open_file,
2053 attrs->ia_size, false);
2054 else
2055 rc = -ENOSYS;
6ab409b5 2056 cifsFileInfo_put(open_file);
f96637be 2057 cifs_dbg(FYI, "SetFSize for attrs rc = %d\n", rc);
8efdbde6
JL
2058 } else
2059 rc = -EINVAL;
2060
d1433418
PS
2061 if (!rc)
2062 goto set_size_out;
2063
2064 if (tcon == NULL) {
2065 tlink = cifs_sb_tlink(cifs_sb);
2066 if (IS_ERR(tlink))
2067 return PTR_ERR(tlink);
2068 tcon = tlink_tcon(tlink);
2069 server = tcon->ses->server;
2070 }
ba00ba64 2071
d1433418
PS
2072 /*
2073 * Set file size by pathname rather than by handle either because no
2074 * valid, writeable file handle for it was found or because there was
2075 * an error setting it by handle.
2076 */
2077 if (server->ops->set_path_size)
2078 rc = server->ops->set_path_size(xid, tcon, full_path,
2079 attrs->ia_size, cifs_sb, false);
2080 else
2081 rc = -ENOSYS;
f96637be 2082 cifs_dbg(FYI, "SetEOF by path (setattrs) rc = %d\n", rc);
d1433418 2083
d1433418
PS
2084 if (tlink)
2085 cifs_put_tlink(tlink);
8efdbde6 2086
d1433418 2087set_size_out:
8efdbde6 2088 if (rc == 0) {
fbec9ab9 2089 cifsInode->server_eof = attrs->ia_size;
1b947463 2090 cifs_setsize(inode, attrs->ia_size);
8efdbde6
JL
2091 cifs_truncate_page(inode->i_mapping, inode->i_size);
2092 }
2093
2094 return rc;
2095}
2096
3fe5c1dd
JL
2097static int
2098cifs_setattr_unix(struct dentry *direntry, struct iattr *attrs)
2099{
2100 int rc;
6d5786a3 2101 unsigned int xid;
3fe5c1dd 2102 char *full_path = NULL;
2b0143b5 2103 struct inode *inode = d_inode(direntry);
3fe5c1dd
JL
2104 struct cifsInodeInfo *cifsInode = CIFS_I(inode);
2105 struct cifs_sb_info *cifs_sb = CIFS_SB(inode->i_sb);
7ffec372 2106 struct tcon_link *tlink;
96daf2b0 2107 struct cifs_tcon *pTcon;
3fe5c1dd 2108 struct cifs_unix_set_info_args *args = NULL;
3bbeeb3c 2109 struct cifsFileInfo *open_file;
3fe5c1dd 2110
35c265e0
AV
2111 cifs_dbg(FYI, "setattr_unix on file %pd attrs->ia_valid=0x%x\n",
2112 direntry, attrs->ia_valid);
3fe5c1dd 2113
6d5786a3 2114 xid = get_xid();
3fe5c1dd 2115
db78b877
CH
2116 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_NO_PERM)
2117 attrs->ia_valid |= ATTR_FORCE;
2118
2119 rc = inode_change_ok(inode, attrs);
2120 if (rc < 0)
2121 goto out;
3fe5c1dd
JL
2122
2123 full_path = build_path_from_dentry(direntry);
2124 if (full_path == NULL) {
2125 rc = -ENOMEM;
2126 goto out;
2127 }
2128
0f4d634c
JL
2129 /*
2130 * Attempt to flush data before changing attributes. We need to do
2131 * this for ATTR_SIZE and ATTR_MTIME for sure, and if we change the
2132 * ownership or mode then we may also need to do this. Here, we take
2133 * the safe way out and just do the flush on all setattr requests. If
2134 * the flush returns error, store it to report later and continue.
2135 *
2136 * BB: This should be smarter. Why bother flushing pages that
2137 * will be truncated anyway? Also, should we error out here if
2138 * the flush returns error?
2139 */
2140 rc = filemap_write_and_wait(inode->i_mapping);
eb4b756b
JL
2141 mapping_set_error(inode->i_mapping, rc);
2142 rc = 0;
3fe5c1dd
JL
2143
2144 if (attrs->ia_valid & ATTR_SIZE) {
2145 rc = cifs_set_file_size(inode, attrs, xid, full_path);
2146 if (rc != 0)
2147 goto out;
2148 }
2149
2150 /* skip mode change if it's just for clearing setuid/setgid */
2151 if (attrs->ia_valid & (ATTR_KILL_SUID|ATTR_KILL_SGID))
2152 attrs->ia_valid &= ~ATTR_MODE;
2153
2154 args = kmalloc(sizeof(*args), GFP_KERNEL);
2155 if (args == NULL) {
2156 rc = -ENOMEM;
2157 goto out;
2158 }
2159
2160 /* set up the struct */
2161 if (attrs->ia_valid & ATTR_MODE)
2162 args->mode = attrs->ia_mode;
2163 else
2164 args->mode = NO_CHANGE_64;
2165
2166 if (attrs->ia_valid & ATTR_UID)
2167 args->uid = attrs->ia_uid;
2168 else
49418b2c 2169 args->uid = INVALID_UID; /* no change */
3fe5c1dd
JL
2170
2171 if (attrs->ia_valid & ATTR_GID)
2172 args->gid = attrs->ia_gid;
2173 else
49418b2c 2174 args->gid = INVALID_GID; /* no change */
3fe5c1dd
JL
2175
2176 if (attrs->ia_valid & ATTR_ATIME)
2177 args->atime = cifs_UnixTimeToNT(attrs->ia_atime);
2178 else
2179 args->atime = NO_CHANGE_64;
2180
2181 if (attrs->ia_valid & ATTR_MTIME)
2182 args->mtime = cifs_UnixTimeToNT(attrs->ia_mtime);
2183 else
2184 args->mtime = NO_CHANGE_64;
2185
2186 if (attrs->ia_valid & ATTR_CTIME)
2187 args->ctime = cifs_UnixTimeToNT(attrs->ia_ctime);
2188 else
2189 args->ctime = NO_CHANGE_64;
2190
2191 args->device = 0;
6508d904 2192 open_file = find_writable_file(cifsInode, true);
3bbeeb3c 2193 if (open_file) {
4b4de76e 2194 u16 nfid = open_file->fid.netfid;
3bbeeb3c 2195 u32 npid = open_file->pid;
13cfb733 2196 pTcon = tlink_tcon(open_file->tlink);
3bbeeb3c 2197 rc = CIFSSMBUnixSetFileInfo(xid, pTcon, args, nfid, npid);
6ab409b5 2198 cifsFileInfo_put(open_file);
3bbeeb3c 2199 } else {
7ffec372
JL
2200 tlink = cifs_sb_tlink(cifs_sb);
2201 if (IS_ERR(tlink)) {
2202 rc = PTR_ERR(tlink);
2203 goto out;
2204 }
2205 pTcon = tlink_tcon(tlink);
3bbeeb3c 2206 rc = CIFSSMBUnixSetPathInfo(xid, pTcon, full_path, args,
01ea95e3 2207 cifs_sb->local_nls,
bc8ebdc4 2208 cifs_remap(cifs_sb));
7ffec372 2209 cifs_put_tlink(tlink);
3bbeeb3c 2210 }
3fe5c1dd 2211
1025774c
CH
2212 if (rc)
2213 goto out;
ccd4bb1b 2214
1025774c 2215 if ((attrs->ia_valid & ATTR_SIZE) &&
1b947463
CH
2216 attrs->ia_size != i_size_read(inode))
2217 truncate_setsize(inode, attrs->ia_size);
1025774c
CH
2218
2219 setattr_copy(inode, attrs);
2220 mark_inode_dirty(inode);
2221
2222 /* force revalidate when any of these times are set since some
2223 of the fs types (eg ext3, fat) do not have fine enough
2224 time granularity to match protocol, and we do not have a
2225 a way (yet) to query the server fs's time granularity (and
2226 whether it rounds times down).
2227 */
2228 if (attrs->ia_valid & (ATTR_MTIME | ATTR_CTIME))
2229 cifsInode->time = 0;
3fe5c1dd
JL
2230out:
2231 kfree(args);
2232 kfree(full_path);
6d5786a3 2233 free_xid(xid);
3fe5c1dd
JL
2234 return rc;
2235}
2236
0510eeb7
JL
2237static int
2238cifs_setattr_nounix(struct dentry *direntry, struct iattr *attrs)
1da177e4 2239{
6d5786a3 2240 unsigned int xid;
8abf2775
EB
2241 kuid_t uid = INVALID_UID;
2242 kgid_t gid = INVALID_GID;
2b0143b5 2243 struct inode *inode = d_inode(direntry);
3fe5c1dd 2244 struct cifs_sb_info *cifs_sb = CIFS_SB(inode->i_sb);
3fe5c1dd 2245 struct cifsInodeInfo *cifsInode = CIFS_I(inode);
1da177e4
LT
2246 char *full_path = NULL;
2247 int rc = -EACCES;
feb3e20c 2248 __u32 dosattr = 0;
4e1e7fb9 2249 __u64 mode = NO_CHANGE_64;
3fe5c1dd 2250
6d5786a3 2251 xid = get_xid();
1da177e4 2252
35c265e0
AV
2253 cifs_dbg(FYI, "setattr on file %pd attrs->iavalid 0x%x\n",
2254 direntry, attrs->ia_valid);
6473a559 2255
db78b877
CH
2256 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_NO_PERM)
2257 attrs->ia_valid |= ATTR_FORCE;
2258
2259 rc = inode_change_ok(inode, attrs);
2260 if (rc < 0) {
6d5786a3 2261 free_xid(xid);
db78b877 2262 return rc;
6473a559 2263 }
50c2f753 2264
7f57356b 2265 full_path = build_path_from_dentry(direntry);
1da177e4 2266 if (full_path == NULL) {
0f3bc09e 2267 rc = -ENOMEM;
6d5786a3 2268 free_xid(xid);
0f3bc09e 2269 return rc;
1da177e4 2270 }
1da177e4 2271
0f4d634c
JL
2272 /*
2273 * Attempt to flush data before changing attributes. We need to do
2274 * this for ATTR_SIZE and ATTR_MTIME for sure, and if we change the
2275 * ownership or mode then we may also need to do this. Here, we take
2276 * the safe way out and just do the flush on all setattr requests. If
2277 * the flush returns error, store it to report later and continue.
2278 *
2279 * BB: This should be smarter. Why bother flushing pages that
2280 * will be truncated anyway? Also, should we error out here if
2281 * the flush returns error?
2282 */
2283 rc = filemap_write_and_wait(inode->i_mapping);
eb4b756b
JL
2284 mapping_set_error(inode->i_mapping, rc);
2285 rc = 0;
cea21805 2286
50531444 2287 if (attrs->ia_valid & ATTR_SIZE) {
8efdbde6
JL
2288 rc = cifs_set_file_size(inode, attrs, xid, full_path);
2289 if (rc != 0)
e30dcf3a 2290 goto cifs_setattr_exit;
1da177e4 2291 }
4ca691a8 2292
a5ff3769
SP
2293 if (attrs->ia_valid & ATTR_UID)
2294 uid = attrs->ia_uid;
2295
2296 if (attrs->ia_valid & ATTR_GID)
2297 gid = attrs->ia_gid;
2298
2299#ifdef CONFIG_CIFS_ACL
2300 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_CIFS_ACL) {
8abf2775 2301 if (uid_valid(uid) || gid_valid(gid)) {
a5ff3769
SP
2302 rc = id_mode_to_cifs_acl(inode, full_path, NO_CHANGE_64,
2303 uid, gid);
2304 if (rc) {
f96637be
JP
2305 cifs_dbg(FYI, "%s: Setting id failed with error: %d\n",
2306 __func__, rc);
a5ff3769
SP
2307 goto cifs_setattr_exit;
2308 }
2309 }
2310 } else
2311#endif /* CONFIG_CIFS_ACL */
3fe5c1dd 2312 if (!(cifs_sb->mnt_cifs_flags & CIFS_MOUNT_SET_UID))
4ca691a8 2313 attrs->ia_valid &= ~(ATTR_UID | ATTR_GID);
1da177e4 2314
d32c4f26
JL
2315 /* skip mode change if it's just for clearing setuid/setgid */
2316 if (attrs->ia_valid & (ATTR_KILL_SUID|ATTR_KILL_SGID))
2317 attrs->ia_valid &= ~ATTR_MODE;
2318
1da177e4 2319 if (attrs->ia_valid & ATTR_MODE) {
1da177e4 2320 mode = attrs->ia_mode;
cdbce9c8 2321 rc = 0;
79df1bae 2322#ifdef CONFIG_CIFS_ACL
78415d2d 2323 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_CIFS_ACL) {
a5ff3769 2324 rc = id_mode_to_cifs_acl(inode, full_path, mode,
8abf2775 2325 INVALID_UID, INVALID_GID);
78415d2d 2326 if (rc) {
f96637be
JP
2327 cifs_dbg(FYI, "%s: Setting ACL failed with error: %d\n",
2328 __func__, rc);
78415d2d
SP
2329 goto cifs_setattr_exit;
2330 }
2331 } else
79df1bae 2332#endif /* CONFIG_CIFS_ACL */
5132861a
JL
2333 if (((mode & S_IWUGO) == 0) &&
2334 (cifsInode->cifsAttrs & ATTR_READONLY) == 0) {
feb3e20c
JL
2335
2336 dosattr = cifsInode->cifsAttrs | ATTR_READONLY;
2337
5132861a
JL
2338 /* fix up mode if we're not using dynperm */
2339 if ((cifs_sb->mnt_cifs_flags & CIFS_MOUNT_DYNPERM) == 0)
2340 attrs->ia_mode = inode->i_mode & ~S_IWUGO;
2341 } else if ((mode & S_IWUGO) &&
2342 (cifsInode->cifsAttrs & ATTR_READONLY)) {
feb3e20c
JL
2343
2344 dosattr = cifsInode->cifsAttrs & ~ATTR_READONLY;
2345 /* Attributes of 0 are ignored */
2346 if (dosattr == 0)
2347 dosattr |= ATTR_NORMAL;
5132861a
JL
2348
2349 /* reset local inode permissions to normal */
2350 if (!(cifs_sb->mnt_cifs_flags & CIFS_MOUNT_DYNPERM)) {
2351 attrs->ia_mode &= ~(S_IALLUGO);
2352 if (S_ISDIR(inode->i_mode))
2353 attrs->ia_mode |=
2354 cifs_sb->mnt_dir_mode;
2355 else
2356 attrs->ia_mode |=
2357 cifs_sb->mnt_file_mode;
2358 }
2359 } else if (!(cifs_sb->mnt_cifs_flags & CIFS_MOUNT_DYNPERM)) {
2360 /* ignore mode change - ATTR_READONLY hasn't changed */
2361 attrs->ia_valid &= ~ATTR_MODE;
1da177e4 2362 }
1da177e4
LT
2363 }
2364
feb3e20c
JL
2365 if (attrs->ia_valid & (ATTR_MTIME|ATTR_ATIME|ATTR_CTIME) ||
2366 ((attrs->ia_valid & ATTR_MODE) && dosattr)) {
2367 rc = cifs_set_file_info(inode, attrs, xid, full_path, dosattr);
2368 /* BB: check for rc = -EOPNOTSUPP and switch to legacy mode */
1da177e4 2369
e30dcf3a
SF
2370 /* Even if error on time set, no sense failing the call if
2371 the server would set the time to a reasonable value anyway,
2372 and this check ensures that we are not being called from
2373 sys_utimes in which case we ought to fail the call back to
2374 the user when the server rejects the call */
fb8c4b14 2375 if ((rc) && (attrs->ia_valid &
feb3e20c 2376 (ATTR_MODE | ATTR_GID | ATTR_UID | ATTR_SIZE)))
e30dcf3a 2377 rc = 0;
1da177e4
LT
2378 }
2379
2380 /* do not need local check to inode_check_ok since the server does
2381 that */
1025774c
CH
2382 if (rc)
2383 goto cifs_setattr_exit;
2384
2385 if ((attrs->ia_valid & ATTR_SIZE) &&
1b947463
CH
2386 attrs->ia_size != i_size_read(inode))
2387 truncate_setsize(inode, attrs->ia_size);
1025774c
CH
2388
2389 setattr_copy(inode, attrs);
2390 mark_inode_dirty(inode);
1025774c 2391
e30dcf3a 2392cifs_setattr_exit:
1da177e4 2393 kfree(full_path);
6d5786a3 2394 free_xid(xid);
1da177e4
LT
2395 return rc;
2396}
2397
0510eeb7
JL
2398int
2399cifs_setattr(struct dentry *direntry, struct iattr *attrs)
2400{
2b0143b5 2401 struct inode *inode = d_inode(direntry);
0510eeb7 2402 struct cifs_sb_info *cifs_sb = CIFS_SB(inode->i_sb);
96daf2b0 2403 struct cifs_tcon *pTcon = cifs_sb_master_tcon(cifs_sb);
0510eeb7
JL
2404
2405 if (pTcon->unix_ext)
2406 return cifs_setattr_unix(direntry, attrs);
2407
2408 return cifs_setattr_nounix(direntry, attrs);
2409
2410 /* BB: add cifs_setattr_legacy for really old servers */
2411}
2412
99ee4dbd 2413#if 0
1da177e4
LT
2414void cifs_delete_inode(struct inode *inode)
2415{
f96637be 2416 cifs_dbg(FYI, "In cifs_delete_inode, inode = 0x%p\n", inode);
1da177e4
LT
2417 /* may have to add back in if and when safe distributed caching of
2418 directories added e.g. via FindNotify */
2419}
99ee4dbd 2420#endif